Fraud Prevention

    How to Spot a Fake Carrier: The One Verification That Catches Every Impersonation

    Today's fake carriers don't create new MCs. They steal real ones. Here's the one verification step that catches them every time.

    February 25, 202617 min readBy CarrierBrief Team

    A brokerage ran their standard vetting on a carrier and got all green lights. Active MC number. Six years of authority. Clean BASIC scores. Insurance on file. Satisfactory safety rating. They booked a $280,000 load of consumer electronics. The freight disappeared. The real carrier, the one whose MC number appeared on every piece of paperwork, had never heard of the brokerage, never accepted the load, and had no idea their identity was being used.

    The broker didn't fail to vet. They vetted the wrong entity. Every data point they checked was real. The MC number was real. The authority was real. The insurance was real. The person on the phone was not.

    Knowing how to spot a fake carrier in 2026 means understanding one thing: you don't look for fake data. You verify that the real data connects to the real person. The entire modern carrier fraud ecosystem, from identity theft to double brokering to cargo theft, depends on a single gap. Brokers verify the MC number but not the person behind it. The Federal Motor Carrier Safety Administration (FMCSA) record lists a phone number from the carrier's MCS-150 filing that requires the carrier's personal PIN to change. A fraudster cannot alter it. That makes it the one unforgeable verification point in the system, and it is the check that most brokers skip when they're under time pressure.

    Quick Reference: Fake Carrier Detection by Fraud Type

    Fraud TypeHow the Fake Carrier PresentsWhat Standard Vetting CatchesWhat Standard Vetting MissesThe Check That Catches It
    Identity theft (MC cloning)Uses a real carrier's MC/DOT. Clean record. Years of authority.Nothing. The record is real.The person isn't connected to the carrier.Call the FMCSA-registered phone number. Ask if they accepted your load.
    Chameleon carrierNew authority under a new name. Same person from a shut-down carrier.New authority flag (if you check age).The officer name matches a revoked carrier's officer.Check officer names against recently revoked carriers.
    Double broker frontReal or stolen MC. Accepts load. Re-brokers to unknown carrier.Nothing, if using a stolen MC. New authority flag, if using their own.They have no trucks. The actual hauler is unvetted.Ask for unit number and driver name. Verify truck DOT at pickup.
    Paper carrierNewly registered MC. No trucks, no driver, no terminal. Exists only on paper.New authority flag. Zero inspections.Everything else looks normal for a "new" carrier.Ask operational questions. Request photos of truck and trailer.
    Cargo theft operationUsually identity theft variant. Sends a rented or borrowed truck.Nothing (using stolen clean MC).Truck DOT number at pickup doesn't match booked carrier.Require shipper to verify DOT on truck matches booked carrier's DOT.

    Why Standard Vetting Doesn't Catch Fake Carriers Anymore

    Standard carrier vetting fails against modern fraud because it verifies the carrier record, not the person presenting it. A fraudster using a stolen MC number from a legitimate carrier will pass every traditional check: authority status, insurance, safety scores, and inspection history all come back clean because the data belongs to a real carrier.

    The underlying assumption behind standard vetting broke around 2023. That assumption was simple: the person presenting an MC number is the carrier who owns it. In a world where bad carriers were the threat, checking the record was enough. In a world where identity theft is the threat, the record is irrelevant because the fraudster chose it specifically because it's clean.

    FMCSA's public Safety and Fitness Electronic Records (SAFER) database publishes everything needed to impersonate a legitimate carrier: MC number, DOT number, legal name, physical address, company officers, insurance company, policy numbers, equipment count, and safety scores. All of it is free and searchable. The transparency that makes carrier vetting possible is the same transparency that makes carrier identity theft possible.

    A fraudster doesn't hack anything. They search the database for a carrier with clean data, copy the MC number, and present themselves as that carrier. When the broker runs the MC, every field comes back green because every field is real. The only thing that's fake is the voice on the phone.

    Standard vetting answers "Is this a good carrier?" It does not answer "Am I talking to this carrier?" Until you verify identity, not just data, you're exposed to every fraud variant in the table above.

    How to Spot a Fake Carrier: The Five-Tier Verification Hierarchy

    The most reliable way to spot a fake carrier is to verify the person's identity through the FMCSA-registered phone number, then layer additional checks based on risk level. Not all checks are equal. The hierarchy below is ranked by detection power, from the single check that catches 90% of fraud down to the last line of defense at the shipping dock.

    Tier 1: Call the FMCSA-Registered Phone Number

    This single check catches approximately 90% of carrier fraud attempts, and it is the check most commonly skipped under time pressure.

    The MCS-150 form is the biennial filing every carrier submits to FMCSA. MCS-150 stands for Motor Carrier Safety form 150, and it contains the carrier's registered phone number, address, equipment count, and operational data. Changing the phone number on this filing requires the carrier's FMCSA PIN. A fraudster who has stolen an MC number does not have the PIN and cannot alter the registered phone number.

    Here is the verification process:

    1. Pull the carrier's record using the MC/DOT lookup, which shows the FMCSA-listed phone number alongside authority status and insurance data.
    2. Compare the FMCSA-listed phone number to the number the person used to contact you.
    3. If the numbers don't match, call the FMCSA-listed number directly.
    4. Ask one question: "This is [your name] at [your brokerage]. Did someone from your company just accept a load from us on lane X?"
    5. If they say no, you have caught a fraud attempt. Do not book.
    6. If they say yes, you have verified identity. Proceed with booking.

    Total time: ten seconds for the comparison, ten more if you need to make the call. The fraudster's entire business model depends on you not spending those twenty seconds.

    Tier 2: Verify the Contact Email Domain

    Checking the email domain catches approximately 70% of fake carrier attempts because fraudsters rarely have access to the real carrier's email system. Legitimate carriers use email addresses tied to their business name. A carrier named Midwest Express Logistics will typically operate from @midwestexpresslogistics.com or similar.

    Three email patterns that signal fraud:

    1. Free email provider. A registered business with 50 trucks and 8 years of authority emailing from a Gmail address is unusual. Some small owner-operators legitimately use Gmail. A 50-truck carrier does not.
    2. Lookalike domain. The real carrier uses @midwestexpress.com. The fraudster registered @midwest-express.com or @midwestexpressllc.com. Close at a glance. Wrong on inspection.
    3. Recently registered domain. You can check domain registration dates with a WHOIS lookup. A carrier with 6 years of authority operating from a domain registered last Tuesday is a fraud signal.

    Tier 3: Ask Operational Questions That Require a Real Truck

    Asking specific dispatch questions catches approximately 60% of fraud because a fraudster cannot answer questions about equipment they don't have. A real carrier dispatching a real truck has immediate, specific answers. A fraudster deflects.

    Ask these four questions:

    1. "What unit number are you sending?" A real dispatcher knows which truck is assigned. A fraudster will say "I'll confirm that shortly."
    2. "Who is the driver?" A real carrier knows the driver's name before the truck leaves. A fraudster doesn't.
    3. "What's your driver's ETA to the shipper?" A real carrier estimates based on current truck position. A fraudster gives a vague answer about a truck they don't have.
    4. "Can you send a current photo of the assigned truck and trailer?" Aggressive, and some legitimate carriers will push back. But for high-value freight or when other signals are present, a photo with a visible DOT number eliminates identity theft instantly.

    These questions test for the one thing a fraudster cannot copy from a public database: an actual trucking operation.

    Tier 4: Check Authority Age and Inspection History

    New authority with zero inspections is the signature of both chameleon carriers and paper carriers, though legitimate new carriers also fit this profile. A chameleon carrier is a previously shut-down operation that reopened under a new name and new authority to escape its enforcement history. A paper carrier is an entity registered with FMCSA that has no trucks, no drivers, and no terminal. It exists only as a filing.

    When new authority combines with other signals (phone mismatch, Gmail address, instant load acceptance, no operational details), it shifts from "new carrier" to "probable fraud."

    Check the authority checker, which shows the authority grant date, the prior revocation flag, and the current status. A carrier with authority less than 90 days old and zero inspections warrants elevated scrutiny. A carrier with a prior revocation flag and new authority under a different name is a chameleon carrier until proven otherwise.

    Tier 5: Verify the DOT Number at the Dock

    This is the last line of defense. Every check above happens before booking. This one happens at pickup, and it is your final chance to stop fraud before the freight leaves the facility.

    The verification is simple:

    1. Provide the shipper with the DOT number of the carrier you booked.
    2. Ask the shipper to verify that the DOT number painted on the truck at the dock matches the DOT you provided.
    3. If the numbers don't match, do not release the freight. The truck at the dock does not belong to your carrier.

    This catches the final variant of identity theft: a fraudster who passed all pre-booking checks but sends a different truck to the dock. The DOT number on the physical truck is the one thing a fraudster cannot fake without painting a stolen number on a truck, which is a federal offense most fraud operations avoid.

    How Modern Fake Carrier Operations Actually Work

    A modern carrier fraud operation is a structured, repeatable business that targets the gap between record verification and identity verification. Understanding the lifecycle makes the detection methods intuitive rather than mechanical.

    Week 1: Identity harvesting. The fraudster searches FMCSA's public database for impersonation targets. The ideal target has 5 or more years of authority, clean Behavior Analysis and Safety Improvement Categories (BASIC) scores, active insurance, and a fleet between 10 and 50 trucks. Large enough to look professional. Small enough that the carrier isn't a household name a broker would recognize by voice. The fraudster compiles a list of 20 to 30 target identities.

    Week 2: Infrastructure setup. The fraudster registers burner phone numbers, creates Gmail or lookalike email accounts, and builds carrier packets using each target's real information. The MC number, DOT number, and insurance certificate come directly from the FMCSA database. The W-9 is modified with the fraudster's bank account. They register on load boards using the stolen MC numbers.

    Week 3: Operations begin. The fraudster monitors load boards for high-value loads with tight pickup windows. When they find one, they call the broker using the stolen identity. If the broker books without calling the FMCSA-listed phone number, the fraud proceeds. If the broker calls the real carrier, the fraud is dead.

    Week 4: Execution and rotation. Double brokering is the process of re-brokering a load to another carrier without the original broker's knowledge. For double brokering: the fraudster re-brokers the load at a lower rate, collects the spread, and disappears. For cargo theft: they send a rented or borrowed truck to pick up the freight, divert it, and sell it through a fencing network. Either way, each stolen identity is used for 1 to 3 loads before rotating to the next one.

    The entire operation hinges on Week 3. If the broker makes one phone call to the FMCSA-listed number, the real carrier says "we didn't accept that load," and the scheme collapses. Every piece of the infrastructure exists to exploit the assumption that brokers won't make that call.

    What Fake Carriers Can Fake vs. What They Cannot

    The mental model that makes fake carrier detection intuitive is understanding the asymmetry between public data and controlled data. Once you know what a fraudster can copy and what they can't, you know exactly where to look.

    What Fraudsters CAN Copy (Public Data)What Fraudsters CANNOT Access (Controlled Data)
    MC number (published in FMCSA database)The phone number on the MCS-150 filing (requires carrier's PIN to change)
    DOT number (published in FMCSA database)The DOT number physically painted on the real carrier's truck
    Insurance certificate (publicly available)A live call to the insurance company confirming the actual carrier's coverage
    Carrier packet and W-9 (easily modified)The bank account on the real carrier's W-9 (they substitute their own)
    Email from a lookalike domainEmail from the real carrier's actual domain
    A verbal claim of truck availabilityA specific unit number, driver name, and current GPS location
    A clean safety record (chosen because it's clean)Detailed answers about specific trucks, drivers, and operational history

    The left column is everything in a standard vetting process. The right column is what catches fraud. If your process only checks the left column, a skilled identity theft operation will pass it every time. The process was built for a world where the person presenting the MC owned the MC. That world ended in 2023.

    Worked Scenario: Catching a Fake Carrier in Real Time

    The load: 36,000 lbs of automotive parts, pickup in Dallas in 3 hours, delivery in Memphis. The original carrier canceled. The broker reposts on a load board.

    Minute 4: A carrier calls. "We have a truck in Irving, 20 minutes from the shipper. We can cover it." Provides MC-445921.

    Standard vetting result: MC-445921 is active. Authority granted 5 years ago. Insurance on file. Vehicle Maintenance BASIC at the 32nd percentile. 38 inspections, clean history. Every field is green.

    Minute 6: The broker runs the verification hierarchy.

    1. Phone check. Broker pulls MC-445921 on the MC/DOT lookup. FMCSA-listed phone number is (817) 555-0192. The caller used (469) 555-0847. Numbers don't match.
    2. Broker calls (817) 555-0192. Real carrier answers: "This is Westbound Freight."
    3. Broker asks: "Did someone from your company just accept a load from us on a Dallas-to-Memphis lane?"
    4. Real carrier: "No. We don't have any trucks in Dallas right now. Is someone using our MC number?"

    Fraud caught. Total elapsed time from first call: 90 seconds.

    The broker reports the fraudulent phone number to the load board's fraud team. They find a legitimate carrier 25 minutes later. The automotive parts arrive in Memphis safely.

    Now consider the alternative. The broker doesn't make the call. The MC checked out. The data was clean. Everything looked legitimate. The difference between saving the freight and losing it was a 10-second phone call to a number that was freely available on the FMCSA record.

    How Fake Carriers Target Specific Brokerage Weaknesses

    Fraud operations don't target brokerages randomly. They target operational patterns that predict which brokers will skip verification.

    After-hours loads. Loads needing coverage on Friday evening or over the weekend are prime targets. The broker on duty may be less experienced, less likely to have access to verification tools, or more willing to cut corners because backup support isn't available.

    New employees. A broker who started last month follows the checklist they were trained on. If that checklist doesn't include calling the FMCSA-listed phone number, and many don't, the new broker is more vulnerable than a veteran who has been burned before.

    High-volume peak season. When a brokerage covers 200 loads a day, the 60-second verification feels expensive. Fraudsters know this. Peak season is when fraud volume spikes because the verification-to-load ratio drops across the industry.

    Reposted loads. A load that's been posted, pulled, and reposted signals desperation. The fraudster monitors for this pattern because a broker on their third attempt to cover a load is the most likely to accept the first qualified-looking response without full verification. Our load board fraud guide covers how this targeting works in detail.

    The defensive response isn't to avoid these situations. It's to make the verification non-negotiable regardless of circumstances. The 60-second process works at 11 PM on a Friday the same as it works at 10 AM on a Tuesday. The fraudster is betting you won't do it when conditions are stressful. Don't confirm that bet.

    Frequently Asked Questions

    How do you spot a fake carrier before booking a load?

    Call the phone number listed on the carrier's FMCSA record and ask if they accepted your load. A fraudster using a stolen MC number cannot change the FMCSA-registered phone number, so calling it connects you to the real carrier. If they say they didn't accept the load, you have caught the fraud. Beyond the phone check, verify the email domain matches the business name, ask operational questions that require a real truck (unit number, driver name), and check whether the authority is less than 90 days old with zero inspections.

    Can a fake carrier pass a standard safety vetting check?

    Yes. If the fraudster uses a stolen MC number from a legitimate carrier, every data point in a standard vetting check will come back clean. Authority status, insurance, safety scores, and inspection history all belong to a real carrier with a real operating history. Standard vetting verifies the record. It does not verify the person presenting it. Identity verification through the FMCSA-registered phone number is the only check that catches this type of fraud reliably.

    What are the strongest red flags of carrier fraud in trucking?

    The strongest red flags ranked by reliability: the caller's phone number doesn't match the FMCSA record, the email uses Gmail or a lookalike domain, the carrier accepted instantly with no questions about the load, the carrier can't provide a unit number or driver name when asked, the authority is under 90 days old with zero roadside inspections, and the carrier demands same-day wire payment on the first load. Any single signal warrants caution. Two or more together warrant refusal.

    How do fraudsters steal carrier MC numbers?

    They don't steal them in a technical sense. They copy them from FMCSA's freely accessible public database, which publishes every data point needed to impersonate a carrier: MC number, DOT number, legal name, address, insurance details, and safety scores. The fraudster presents themselves as the real carrier using this copied information. Read our carrier identity theft guide for the full five-step attack chain and where each step can be broken.

    Why is carrier identity theft increasing in the freight industry?

    Three structural factors converged: the flood of MC numbers issued during 2020 through 2023 created an oversupply of clean identities available for theft, FMCSA's public database provides every data point needed to impersonate a carrier for free, and criminal networks have professionalized freight fraud because it carries lower risk and higher reward than other financial crimes. Read our analysis of why carrier fraud is increasing for the full breakdown of these structural shifts.

    What should I do if I discover I booked a fake carrier?

    Act immediately based on whether the freight has been picked up. If the freight is still at the shipper: cancel the dispatch and instruct the shipper not to release freight to any truck. If the freight is already in transit: contact law enforcement, file a cargo theft report, and notify your insurance carrier. In all cases, report the fraud to FMCSA's National Consumer Complaint Database, notify the load board if applicable, and contact the real carrier whose identity was stolen so they can take protective action. Our FMCSA complaint guide covers the reporting process step by step.

    Should I stop using load boards because of fake carrier risk?

    No. Load boards are a standard and necessary tool for matching freight with capacity. The fraud risk comes from how carriers found on boards are verified, not from the boards themselves. Brokers who perform identity verification on every booking (FMCSA phone check, email domain verification, operational questions) use load boards safely and profitably. The fraud exploits brokers who skip verification under time pressure, not brokers who maintain process discipline.

    How common is carrier identity theft in freight?

    Deceptive pickup schemes, which are primarily identity-theft-based, increased 35% year over year in 2025. Identity theft is now the primary mechanism for both cargo theft and payment fraud in the freight industry. The reported numbers understate the true volume because many double brokering incidents, which also rely on stolen identities, go unreported when the freight ultimately arrives and the broker absorbs the loss rather than filing a complaint.

    Bottom Line

    The brokerage in the opening scenario checked the MC number and got all green lights. Active authority. Clean scores. Insurance on file. Six years of history. They booked $280,000 in electronics based on data that was entirely real and entirely irrelevant, because the person on the phone wasn't the carrier.

    One phone call would have stopped it. Not a call to the number the fraudster provided. A call to the number on the FMCSA record. Ten seconds. "Did you accept this load?" "No." Freight saved.

    Every piece of data in the FMCSA database can be copied by anyone with a web browser. The registered phone number on the MCS-150 filing cannot be changed by anyone except the carrier who filed it with their PIN. That asymmetry is the entire foundation of fake carrier detection. Use the carrier's data to vet the record. Use the carrier's registered phone number to vet the person. Skip the second step and you're trusting a stranger's voice with a quarter-million dollars in freight.