Across mid-market fleet engagements over the past 24 months, the same conversation keeps happening: an operator describes a recent cargo loss, calls it "a fictitious pickup," and we discover it was actually a double-brokering incident — or vice versa. The two patterns are different, and they require different controls. Confusing them is one of the reasons the same operator gets hit twice.
This article distinguishes the two, walks through the realistic 2026 prevention controls for each, and shows how to build a single defense program that addresses both at the operating level.
Definitions and how the two patterns differ
Fictitious pickup (physical fraud)
An imposter physically takes possession of freight at the shipper's dock by impersonating a legitimate carrier. The fraud uses stolen MC numbers, fabricated DOT credentials, real-looking emails to your dispatch team, and increasingly sophisticated identity documents to pass shipper verification. The freight is gone before anyone realizes the legitimate carrier wasn't the one that picked it up.
Double brokering (contractual fraud)
A broker — or someone posing as one — accepts a load assignment from a shipper or another broker, then re-brokers that same load to an unsuspecting carrier without authorization. The fraud broker typically intercepts the carrier's payment, disappears, and leaves both the shipper and the carrier dealing with the loss. In the most sophisticated variant, the load is then stolen by the fraud network using the unsuspecting carrier's legitimate paperwork as operational cover.
The key difference
Fictitious pickup is a physical-world fraud. Someone shows up at a dock, presents fake credentials, and drives off with freight. Double brokering is a contractual fraud. Someone in the brokerage chain accepts an assignment they shouldn't have and re-brokers it deceptively.
These can be combined — a sophisticated fraud network may use double brokering to place freight in the hands of an unsuspecting carrier whose load is then stolen via a fictitious-pickup operation downstream — but the prevention controls for each are different.
Why both have surged in 2025–2026
Three structural shifts have made both patterns more attractive to organized crime:
- The dispatcher attack surface has grown. Most carrier and broker dispatch operations now run on portals, APIs, and integrations that did not exist five years ago. Each integration is a potential phishing or credential-theft vector. The FBI/IC3 has issued multiple alerts on cyber-enabled strategic cargo theft tied to these vectors.
- The recovery rate has not improved. Cargo recovered after theft remains low — frequently under 25 percent for high-value loads. The risk-reward calculation favors the fraud operator, especially in jurisdictions where prosecution of cargo crimes is deprioritized.
- The defense has not kept pace. Most carrier and shipper SOPs were written before strategic cargo theft was a category. The default identity verification at most docks is "did the driver show up roughly when expected with the right paperwork." That is not enough in 2026.
Verisk CargoNet's 2025 analysis put total U.S. cargo theft losses at nearly $725 million — up 27 percent year over year. Strategic cargo theft, including both fictitious pickup and double brokering, was the fastest-growing category.
How to prevent fictitious pickup
Five controls form the operating defense:
- Driver and credential verification at the gate. Photo ID + DOT credential verification + plate verification before the trailer is even backed up. Train your dock team on what real CDL credentials look like in your operating states.
- Carrier identity confirmation through verified channels. Before releasing freight, the shipper or broker calls the carrier's official phone number — pulled from FMCSA SAFER, not from the paperwork the driver presents — to confirm the assignment.
- Rolling pickup confirmation codes. The carrier provides a unique pickup confirmation number directly to the shipper through a verified channel. The driver must present this number at pickup.
- Video coverage of every pickup. Driver, tractor, trailer plate. Recorded, timestamped, retained for at least 90 days. This is your evidence base if something goes wrong.
- Seal verification before departure. The seal applied at loading must be verified before the trailer leaves the dock. Discrepancies are immediate red flags.
These five controls together eliminate roughly 80 percent of fictitious pickup risk before any freight moves. They cost roughly nothing to implement — they're SOP and training work, not technology purchases. The reason most operators don't implement them is not cost. It's that nobody owns the entire workflow.
How to prevent double brokering
Five controls form the operating defense:
- Broker vetting against multiple databases. FMCSA broker authority, complaint history, surety bond status, days in business, and any industry blacklists. New brokers should require multi-source verification before first load.
- Re-brokering disclosure required in writing. Broker contracts should explicitly require disclosure of any intent to re-broker, with penalties for unauthorized re-brokering written in.
- Payment controls. Where possible, pay the hauling carrier directly. Where that's not possible, require the broker to provide proof of carrier payment before broker payment is issued. Many fraud networks rely on the float between when the broker is paid and when the carrier expects to be paid.
- Load tracking through every party. GPS-verified telematics from pickup to delivery, with the data accessible to all legitimate parties in the chain — not just the broker.
- Exception monitoring. Any anomaly in pickup time, route, or delivery against the dispatched plan triggers an automated review workflow. Pattern detection across loads catches systematic fraud.
Your role in the chain determines your control points
| Your role | Primary fictitious pickup control | Primary double brokering control |
|---|---|---|
| Shipper | Driver and credential verification at dock; rolling pickup codes | Broker vetting; direct carrier payment where possible |
| Carrier | Verify dispatcher emails are legitimate; verify pickup assignment through carrier channels | Vet brokers before accepting loads; require written re-broker disclosure |
| Broker | Provide rolling codes to shipper; verify carrier identity | Don't accept assignments you don't intend to own; vet downstream carriers |
| 3PL / Forwarder | End-to-end visibility; identity verification at every handoff | Contract enforcement; payment-flow control across multi-party chains |
Insurance, liability, and contract exposure
Many operators assume their cargo policy covers fictitious pickup and double-brokering losses. That assumption is increasingly wrong.
Carriers have been updating cargo policy language with specific exclusions or conditional coverage for "theft by fraud," "mysterious disappearance," and fraud-induced loss of possession. Some policies now require specific identity verification protocols at pickup as a condition of coverage — meaning if the protocol wasn't followed, the loss isn't covered.
Review your cargo policy language with your broker before assuming a fraud loss is fully covered. If your underwriter offers a premium reduction for documented adherence to specific verification protocols, the math typically favors implementing the protocols.
Who owns this defense at your company?
Defense against fictitious pickup and double brokering is multi-functional — not a single role.
- Operations owns dispatch verification SOPs and gate controls
- Risk / Insurance owns contract language, broker vetting standards, carrier insurance verification
- Security owns training, video coverage, incident response
- IT / IS owns email security, dispatcher portal access controls, credential protection
The most effective programs designate a single coordinator — often the COO, VP Operations, or fractional security leader — to ensure all four functions are operating in concert. Without that coordinator, the controls exist in silos and the fraud finds the seams.
Next step
If you want to know which of the controls above are missing or weak in your specific operation, Fleet Security Group offers a free Fleet Vulnerability Assessment — $25,000 value — that maps your fictitious pickup and double-brokering exposure against the 2026 Fortune 500 reference architecture. Five business days from form submission to written report. Use the form below to request yours.
See also: What does a cargo theft incident actually cost? and How insurance underwriters evaluate fleet security programs.

