Fraud Prevention

    You Verified the MC Number. You Didn't Verify the Person. That's Where Identity Fraud Gets In.

    Carrier identity verification requires checking the human, not just the database. Learn the 8-step protocol that catches MC cloning, fake dispatchers, and stolen identities.

    March 18, 202614 min readBy CarrierBrief Team

    A broker in Phoenix ran a standard carrier check on MC-892451. Active authority, granted in 2019. Insurance on file with a $1M cargo policy and $5M liability. Satisfactory safety rating. 186 inspections over the past 24 months. The carrier looked clean. The broker booked the load, sent the rate confirmation, and dispatched the truck. The freight never arrived. When the broker called the carrier's main office, the person who answered had never heard of the load, the dispatcher name the broker had been talking to, or the phone number the broker had been calling. The MC number was real. The carrier was real. The person who called the broker was not.

    That scenario plays out hundreds of times a month across the US freight industry. The broker did what most brokers do: they verified the carrier's data. Authority status, insurance, safety rating, inspection history. Every data point checked out. What they didn't verify was whether the person they were talking to actually worked for that carrier. That's the gap that identity fraud exploits, and it's the gap that most carrier vetting processes don't close.

    To verify a carrier identity means confirming not only that the MC number belongs to a legitimate, active carrier but that the specific person contacting you is authorized to dispatch loads on that carrier's behalf. Standard carrier vetting checks the database. Identity verification checks the human. Doing only the first and skipping the second is like checking that a house has a valid deed while handing the keys to whoever shows up at the door. This post breaks down the exact difference between data verification and identity verification, the 8-step protocol that covers both, and the specific signals that indicate a carrier's identity has been stolen.

    Verification TypeWhat It ConfirmsWhat It MissesFraud Types It Catches
    Data verification (MC check)Authority is active, insurance on file, safety rating existsWhether the person contacting you is affiliated with the carrierNone by itself
    Phone verification (FMCSA callback)The person on the phone is reachable at the carrier's registered numberNothing if the carrier's phone has been compromisedMC cloning, fake dispatchers, voice phishing
    Email domain verificationThe contact uses the carrier's corporate emailSmall carriers using personal email (requires phone fallback)Most phishing and impersonation attempts
    Network verificationThe carrier's officers/addresses aren't linked to revoked entitiesNewly created shell entities with no prior historyChameleon carriers, authority recycling
    Driver verification at dockThe truck and driver match the dispatched carrierSubcontracted drivers on legitimate arrangementsFictitious pickup, double brokering

    The Difference Between Verifying a Carrier and Verifying an Identity

    Carrier verification confirms that an MC number belongs to a real, active, insured motor carrier. Identity verification confirms that the person contacting you about a load actually represents that carrier. These are two different checks, and most brokerages only do the first.

    Here's why that distinction matters. When a scammer clones an MC number, every piece of carrier data the broker checks is accurate. The authority is active because it belongs to the real carrier. The insurance is valid because it's the real carrier's insurance. The safety rating is clean because the real carrier earned it. The scammer isn't creating fake data. They're borrowing real data and putting a fake person behind it.

    A carrier verification answers: "Is MC-892451 a good carrier?" An identity verification answers: "Is the person calling me from MC-892451 actually someone who works there?" The first question is easy. FMCSA data answers it in seconds. The second question requires a phone call, and most brokers skip it because the first answer was so reassuring.

    This is exactly what carrier identity theft and MC cloning operations are designed to exploit. The better the real carrier's record, the more valuable their identity is to a scammer, because brokers who see a Satisfactory rating and 186 inspections feel confident enough to skip the identity check.

    The 8-Step Carrier Identity Verification Protocol

    This protocol verifies both the carrier and the human in under 5 minutes. Steps 1-4 are data verification. Steps 5-8 are identity verification. Doing only steps 1-4 leaves you exposed to every identity-based fraud type.

    Data Verification (the carrier)

    1. Check the MC/DOT number for active authority status. Use CarrierBrief's MC/DOT lookup tool, which shows authority status, grant date, insurance, safety rating, and operating details for any MC or DOT number. Confirm the authority is active and has been for at least 90 days.
    1. Verify insurance is current and adequate. Check that liability coverage meets the federal minimum ($750,000 for general freight, $1,000,000 for hazmat, $5,000,000 for passenger carriers) and that cargo insurance is on file if required. Note the insurer name and policy effective date. Insurance filed within the last 30 days on a new authority is a yellow flag.
    1. Check inspection history. A carrier with active authority and zero roadside inspections in FMCSA data has no verifiable proof of operating trucks on actual roads. Carriers with 12+ months of active authority and no inspections are among the highest-risk profiles for identity fraud, because cloned MC numbers inherit the real carrier's inspection count but shell entities built to facilitate fraud have none.
    1. Review network connections. Check whether the carrier's officers, registered agent, or physical address are shared with revoked or out-of-service entities. Shared connections with revoked carriers are the primary signal for chameleon carrier operations. CarrierBrief's carrier network analysis shows every entity connected to a carrier through shared officers, addresses, and phone numbers.

    Identity Verification (the human)

    1. Record the contact information the caller provides. Write down their name, phone number, and email address. Do not verify any of it yet. You need this as a baseline to compare against the carrier's registered information.
    1. Look up the carrier's FMCSA-registered phone number independently. Do not use the number the caller gave you. Pull the registered number from FMCSA data or CarrierBrief and note it. If the caller's number matches the registered number exactly, that's a positive signal (but not conclusive, since scammers can spoof caller ID).
    1. Call the carrier's FMCSA-registered phone number. This is the single most important step in the entire protocol. Call the registered number, ask to speak with the person who just contacted you about the load, and confirm they placed the call. If the receptionist or dispatch office confirms, the identity is verified. If they have no record of the call or don't recognize the name, you've caught an impersonation attempt.
    1. Verify the email domain. The contact's email address should use the carrier's corporate domain (e.g., @redlinetransport.com), not a free email provider (Gmail, Yahoo, Outlook). If the carrier uses a personal email address (common for owner-operators and micro-fleets), the phone verification in step 7 becomes mandatory rather than optional. Our guide to voice phishing and fake dispatchers covers email domain verification in detail.

    What the Callback Test Actually Proves (And Its Limits)

    The FMCSA callback test is the single highest-value identity check available to brokers. Calling the carrier's registered phone number and confirming the dispatcher's identity takes 60 seconds and catches the majority of MC cloning and impersonation attempts.

    Here's what it proves: the person who contacted you is reachable through the carrier's official phone number, which means they either work there or have access to the carrier's phone system. A scammer operating from a burner phone in another state cannot intercept a call to the real carrier's registered number. The callback forces the verification through a channel the scammer doesn't control.

    Here's what it doesn't prove: the callback doesn't verify that the carrier's phone number hasn't been changed fraudulently in the FMCSA system. In rare cases, scammers have filed fraudulent MCS-150 updates to change a carrier's registered phone number to one they control. MCS-150 is the biennial update form that carriers file with FMCSA to update their registration information, including phone numbers and addresses. If the carrier's phone number was changed recently (within the last 60 days), verify the number through a second channel: the carrier's website, a previous invoice or rate confirmation from the same carrier, or a direct call to the carrier's insurance agent listed on the FMCSA filing.

    The callback also doesn't verify the carrier's legitimacy if the entire carrier is a fraud operation. A chameleon carrier with a real MC number, a real phone number, and real people answering that phone will pass the callback test because they are the carrier. For chameleon carriers, network analysis (step 4 above) is the primary detection method, not the callback.

    Signs a Carrier's Identity Has Been Stolen

    These are the specific signals that indicate someone is using a legitimate carrier's MC number without authorization. No single signal is proof of identity theft, but two or more signals on the same carrier contact should trigger the full verification protocol.

    The caller's phone number doesn't match the carrier's FMCSA-registered number. This is the highest-confidence signal. If the person calling you about a load can't be reached at the carrier's official number, something is wrong. There are legitimate explanations (cell phone, dispatcher working remote), but every one of them can be resolved by the callback test. A scammer cannot survive the callback test. A legitimate dispatcher can.

    The email address uses a free provider or a lookalike domain. A carrier's email should match their business identity. An email from "swlft.dispatch@gmail.com" referencing Swift Transportation's MC number is not from Swift Transportation. Check the domain character by character. Scammers exploit visual similarities: "rn" looks like "m" in many fonts, "1" looks like "l," and extra or missing letters are hard to spot at scanning speed.

    The carrier's physical address is far from the load's origin. A carrier registered in Maine with no inspection history in the Southeast calling about a Florida pickup is geographically implausible. Check whether the carrier has inspection records in states near the load origin. A carrier with 200 inspections, all in the upper Midwest, calling about a load in Texas might be legitimate (they could be repositioning), but it warrants verification.

    The contact is unfamiliar with details about "their own" carrier. Ask the caller about their fleet size, their primary operating region, or the name of their safety director. A real dispatcher can answer these questions instantly. A scammer reading from an FMCSA printout may stumble, provide overly precise numbers that match the database exactly (real people round up or estimate), or deflect with "I'm new" or "I just handle dispatch."

    The carrier wants to use non-standard communication channels. "Can you text the rate con to my cell?" "Send it to my personal email, the company server is down." "I'll have the driver call you from his phone, our system doesn't do tracking." Each of these redirects communication away from channels the real carrier controls and toward channels the scammer controls. Legitimate carriers occasionally have IT issues. Scammers systematically avoid corporate channels because they don't have access to them.

    The rate is significantly below market. We've covered this in detail in our guide to freight rate manipulation. A below-market rate combined with any identity signal above makes the probability of fraud very high.

    Side-by-Side: How Identity Fraud Looks vs. Legitimate First Contact

    The scenario: You posted a reefer load, Miami to Chicago, 1,380 miles, pickup Thursday. Two carriers call within 30 minutes.

    Carrier A (legitimate):

    The dispatcher calls from a 305 area code (Miami, matches carrier's FL registration). She gives her name, the MC number, and quotes $3,850. You ask for her email. She provides jessica@continentalreefer.com. You look up MC-445920: active authority since 2017, 420 inspections, Satisfactory rating, registered in Miami. You call the registered number. The receptionist says "Yeah, Jessica's right here, she's working on your lane." You book the load.

    Carrier B (identity fraud):

    A dispatcher calls from a 470 area code (Atlanta, carrier is registered in California). He gives his name, the same MC number as a well-known CA carrier, and quotes $3,200 (17% below Carrier A). You ask for his email. He provides "cal.logistics.dispatch@gmail.com." You look up the MC: active since 2015, 680 inspections, Satisfactory rating, registered in Fresno, CA. Everything checks out. You call the registered number. The receptionist in Fresno says "Nobody by that name works here. We didn't call you about a Miami load." The MC number is real. The person on the phone is not.

    The differences: mismatched area code, below-market rate, Gmail address, and the callback test fails. Without the callback, Carrier B's data looks better than Carrier A's (more inspections, longer operating history). The data verification actually makes the scam more convincing, not less.

    When to Run the Full Protocol vs. the Quick Check

    Not every carrier interaction requires the full 8-step protocol. The full protocol takes about 5 minutes. Here's when to apply each level.

    Full 8-step protocol (all steps, no shortcuts):

    • First-time carrier you've never worked with
    • Any carrier quoting more than 15% below lane average
    • Any carrier with authority granted in the last 6 months
    • Any load valued over $100,000
    • Any carrier that contacts you (inbound) vs. one you contacted (outbound)
    • Any carrier that requests a non-corporate email for the rate confirmation

    Quick check (steps 1-2 plus step 7 callback only):

    • Carrier you've worked with before, same dispatcher, same phone number
    • Carrier you contacted proactively (outbound), not one who contacted you
    • Load value under $25,000 with standard commodity

    No additional verification needed:

    • Carrier with an established relationship, verified contact information already on file, and no changes to their communication details since the last load

    The inbound vs. outbound distinction matters. When a carrier calls you about a posted load, you don't know who they are. When you call a carrier from your approved list, you dialed their number. The identity risk profile is fundamentally different, and your verification level should match.

    FAQ

    How do I verify a carrier is who they say they are?

    Call the carrier's FMCSA-registered phone number (not the number the caller provided) and ask to confirm the dispatcher who just contacted you. This single step verifies that the person claiming to represent the carrier actually works there. It takes 60 seconds and catches the majority of MC cloning and impersonation fraud. Before the callback, verify the MC number shows active authority, current insurance, and inspection history. After the callback, verify the email domain matches the carrier's business name.

    What does carrier identity verification include?

    Carrier identity verification includes two distinct layers: data verification and human verification. Data verification confirms the MC number has active authority, valid insurance, an acceptable safety rating, and real inspection history. Human verification confirms the person contacting you actually works for that carrier through a callback to the FMCSA-registered phone number and email domain verification. Most brokerages only do data verification, which leaves them exposed to MC cloning, fake dispatchers, and voice phishing attacks that use legitimate carrier data as cover.

    Can you verify a carrier with just an MC number?

    No. An MC number verifies the carrier exists and has active authority, but it does not verify that the person using the MC number is affiliated with that carrier. MC cloning fraud works specifically because scammers provide real MC numbers that pass every data check. The MC number tells you the carrier is legitimate. It tells you nothing about whether the person on the phone works there. You need the MC number check plus a callback to the FMCSA-registered phone number to verify both the carrier and the human.

    What is MC cloning in freight?

    MC cloning is a fraud tactic where a scammer uses a legitimate carrier's MC number and identity to book and steal loads. The scammer provides the real carrier's MC, DOT, insurance, and safety data to pass the broker's vetting checks, then picks up the freight using their own truck and disappears. The real carrier has no knowledge of the transaction. MC cloning is undetectable through data verification alone because all the data is accurate. It is detectable through identity verification (the FMCSA callback test), because the scammer cannot answer the phone at the real carrier's registered number.

    Why does a carrier's phone number matter for verification?

    The FMCSA-registered phone number is the only carrier contact channel that a scammer cannot control or redirect. A scammer can clone an MC number, fabricate a BOL, create a lookalike email domain, and rehearse a dispatcher script, but they cannot intercept calls to the real carrier's registered phone line. When you call that number and ask "Did your dispatcher just call me about a Miami-to-Chicago load?", the answer either confirms or breaks the scammer's cover. This is why the phone callback is the single highest-value identity check in carrier vetting.

    How do I check if a carrier's MC number has been cloned?

    Look for these signals: the person contacting you cannot be reached at the carrier's FMCSA-registered phone number, the email address uses a free provider instead of the carrier's corporate domain, the carrier's registered address is in a different region than the load origin with no inspection history nearby, and the quoted rate is significantly below market. If two or more of these signals appear together, the MC is likely being used by someone other than the registered carrier. Call the carrier's registered number to confirm.

    What should I do if I discover a carrier's identity was stolen?

    Notify the real carrier immediately by calling their FMCSA-registered number. They may not know their MC is being used fraudulently, and they need to take protective action. File a complaint with FMCSA through the complaint filing process, including the phone number and email the scammer used. Report the incident to your load board provider so they can flag or ban the scammer's account. Document every detail of the interaction for law enforcement and insurance purposes. If freight was already tendered, contact the shipper immediately to halt or verify the pickup.

    How often should I re-verify an existing carrier?

    Re-verify carrier identity any time their communication details change. A new phone number, new email address, new dispatcher name, or new bank account information should each trigger the full verification protocol, even for carriers you've worked with for years. Scammers specifically target established broker-carrier relationships by compromising the carrier's email and initiating changes during what looks like a routine update. For carriers with no changes, a quarterly data verification (authority, insurance, inspection history) is sufficient to catch deteriorating safety profiles.

    The Bottom Line

    The broker in Phoenix who lost a load to MC-892451 checked authority status, insurance, safety rating, and 186 inspections. Every line item was accurate. The one thing they didn't check was whether the person on the other end of the phone actually worked at that carrier. One callback to the FMCSA-registered number, 60 seconds, a question and an answer. That's the difference between verifying a database record and verifying a human being. The database can't steal your freight. The human can.