Why Carrier Fraud Is Increasing: The Three Structural Shifts That Won't Reverse When Rates Recover
Carrier fraud isn't a cycle. It's a structural shift created by three conditions that arrived simultaneously and aren't going away.
Cargo theft losses hit $725 million in 2025, up 60% from 2024. Deceptive pickup schemes (identity-based fraud) grew 35% year over year. Double brokering complaints to FMCSA increased for the fourth consecutive year. And carrier identity theft is now the primary mechanism for both cargo theft and payment fraud in the freight industry.
The common explanation is that fraud increases during freight recessions because desperate operators cut corners. That's partially true. But it doesn't explain why fraud continued accelerating through 2025 even as spot rates recovered and carrier margins improved. If the recession caused the fraud, the recovery should have reduced it. It didn't.
Carrier fraud is increasing because three structural changes arrived simultaneously, and none of them reverse when market conditions improve.
| Structural Shift | What Changed | Why It Doesn't Reverse | Impact on Fraud |
|---|---|---|---|
| MC number flood | Hundreds of thousands of new MC numbers issued during 2020-2023, many to entities with no trucks | The MC numbers still exist in FMCSA's database even after the entities are abandoned. The identity supply is permanent. | Provides unlimited raw material for identity theft. Every abandoned MC number is a clean identity waiting to be stolen. |
| Fraud professionalization | Criminal networks discovered freight fraud is lower-risk and higher-reward than other financial crimes | The knowledge, tools, and networks don't disappear. Once a criminal operation learns to exploit freight, they don't un-learn it. | Fraud operations are organized, repeatable, and scalable. Not amateur one-offs. |
| Public database vulnerability | FMCSA publishes every data point needed to impersonate a carrier (DOT, MC, insurance, address, officers) for free | Transparency is a design feature, not a bug. It can't be removed without breaking legitimate vetting. | The attack surface for identity theft is the same system that enables carrier verification. |
The MC Number Flood: How the Pandemic Created the Identity Supply
Between 2020 and 2023, FMCSA processed an unprecedented surge in new MC authority applications. During peak months of the pandemic freight boom, new authority applications exceeded revocations by a ratio that hadn't been seen in decades. The carrier population exploded.
Many of these new authorities were obtained by legitimate first-time owner-operators taking advantage of historically high spot rates. But a significant portion were obtained by entities that never operated a truck: paper carriers created to access load boards, shell companies established to double broker, and fraudulent entities formed specifically to facilitate cargo theft.
What Happened When the Boom Ended
When spot rates collapsed in late 2022 and 2023, many of the boom-era carriers went out of business. Their authorities were revoked or abandoned. But their MC numbers, DOT numbers, and the associated FMCSA records didn't disappear. They're still in the database. A revoked MC number with a clean pre-revocation record (no violations, active insurance at the time of operation, satisfactory history) is a perfect identity to steal.
The fraud operators who emerged during the boom didn't exit when rates fell. They adapted. Instead of obtaining their own new authorities (which FMCSA's new entrant screening was improving at catching), they shifted to stealing the identities of the abandoned authorities and the carriers that were still operating.
The Scale of the Problem
At the peak, the US had over 1 million registered motor carriers for the first time in history. Many of those registrations are now inactive or revoked, but the data associated with them remains accessible in FMCSA's public database. Each abandoned registration is a complete identity package: legal name, DOT number, MC number, physical address, company officers, and historical insurance information. Everything a fraudster needs to impersonate a carrier is sitting in a free, public system.
Read our carrier identity theft guide for exactly how fraudsters weaponize this publicly available data and the 5 verification points that catch the impersonation.
Fraud Professionalization: This Is Organized Crime, Not Opportunism
The freight fraud of 2020 was amateur. A desperate carrier re-brokers a load because they can't cover it and pockets the spread. That type of fraud still exists. But the fraud of 2026 is professional, organized, and operated as a business.
What Professional Freight Fraud Looks Like
Multiple simultaneous identities. A single fraud operation may control 5 to 10 stolen or freshly obtained MC numbers at any given time. When one identity gets flagged or reported, they switch to another. The operation continues without interruption.
Specialized roles. Modern freight fraud operations have dedicated functions: one person monitors load boards, another handles broker calls, another manages the documents (W-9s, COIs, carrier packets), and another coordinates the trucks (rented, borrowed, or stolen) that pick up the freight. This is not one person running a scam from their phone. It's an organized operation with division of labor.
Technology exploitation. Phishing attacks against broker TMS systems, compromised load board accounts, VoIP phone numbers that appear to originate from the carrier's registered area code, and spoofed email domains that pass casual inspection. The technology tools used for legitimate freight operations are the same tools repurposed for fraud.
Volume-based economics. A professional freight fraud ring doesn't steal one load and disappear. They run 50 to 100 loads through multiple identities over weeks, collecting payments and either re-brokering the freight (taking the spread) or stealing the cargo. The operation generates hundreds of thousands of dollars before the identities get burned and the operators cycle to new ones.
Why This Doesn't Reverse
Amateur fraud decreases when market conditions improve because the motivation (financial desperation) decreases. Professional fraud doesn't follow this pattern because the operators are professional criminals, not desperate carriers. They discovered that freight fraud produces high returns with low prosecution risk (federal law enforcement has limited resources for freight-specific crime, and the losses are spread across many victims in many jurisdictions). The cost-benefit analysis that brought them into freight fraud hasn't changed.
The knowledge base, the operational playbooks, the criminal networks, and the infrastructure don't dissolve when spot rates go up. Once organized crime learns to exploit a market, the exploitation becomes permanent until the vulnerability is closed or the enforcement risk increases enough to change the economics.
The Public Database Paradox: Transparency Enables Both Vetting and Fraud
FMCSA's public database is simultaneously the most powerful carrier vetting tool available and the primary attack surface for carrier identity theft. The same transparency that allows a broker to verify a carrier's authority, insurance, and safety record in 5 minutes also allows a fraudster to assemble everything needed to impersonate that carrier in the same 5 minutes.
What's Published for Free
Every registered carrier's DOT number, MC number, legal name, DBA, physical address, mailing address, phone number, email, company officers, fleet size, cargo types, insurance company, insurance coverage type, safety rating, inspection history, crash data, and BASIC scores are all published in FMCSA's public databases, accessible to anyone with a web browser.
This transparency is by design. FMCSA publishes this data so that brokers, shippers, and the public can verify carriers before doing business with them. The transparency protects the market from unvetted carriers. Removing it would make carrier vetting impossible and create more problems than it solves.
The Paradox
The data that enables vetting is the same data that enables impersonation. A broker uses the DOT number and insurance information to verify a carrier. A fraudster uses the same DOT number and insurance information to pretend to be that carrier. The data serves both purposes simultaneously, and there's no way to make it available for one purpose without making it available for the other.
The Verification Gap
The database verifies the carrier. It does not verify the person claiming to be the carrier. This is the structural gap that every identity-based fraud exploits. The MC number is real. The authority is active. The insurance is on file. The safety record is clean. All of that checks out because it belongs to a real carrier. The person on the phone, sending the email, and booking the load is not that carrier.
Closing this gap requires verification of the person, not just the record. That means calling the FMCSA-listed phone number independently, verifying the email domain, cross-referencing the W-9, and confirming the DOT number on the truck at pickup. These steps verify that the human behind the transaction is actually the carrier whose data passes the check.
Use our MC/DOT lookup to pull the FMCSA-listed phone number and contact information alongside authority and insurance data, so you can compare what the carrier provided against what FMCSA shows. Read our load board fraud guide for the 60-second verification process that catches impersonation at load-board speed.
Why the Fraud Won't Decrease When Rates Recover
The standard industry narrative says freight fraud is cyclical: it increases during downturns (when carriers are desperate) and decreases during recoveries (when legitimate freight pays well enough that cutting corners isn't necessary).
This narrative was accurate for the type of fraud that dominated the pre-2020 freight market: small-scale double brokering by marginal carriers. That type of fraud is financially motivated and does decrease when rates recover.
But the dominant fraud type in 2026 is not small-scale double brokering by marginal carriers. It's organized identity theft and fictitious pickup schemes operated by professional criminals who have no connection to the legitimate freight industry. These operators don't have trucks. They don't have freight relationships. They don't benefit from rate recoveries because they were never hauling freight to begin with. Their "revenue" comes from stealing cargo and defrauding payment systems, and those opportunities exist regardless of what spot rates are doing.
The Three Conditions Are Self-Reinforcing
The identity supply grows. Every carrier that goes out of business adds another usable identity to the database. The 2023-2024 freight recession drove thousands of carriers out of business. Their records remain. The identity supply is larger today than it was during the recession.
The criminal infrastructure persists. The fraud networks that professionalized during 2022-2025 are still operating. They've refined their methods, expanded their reach, and trained new operators. The infrastructure doesn't dissolve.
The public database remains unchanged. FMCSA hasn't modified the data access model. The same information is available for free to the same audience (everyone). The attack surface is identical to what it was when fraud started accelerating.
For fraud to decrease structurally, at least one of these three conditions would need to change: the identity supply would need to be cleaned up (removing abandoned records from public access), the criminal infrastructure would need to be disrupted (through law enforcement action at scale), or the verification gap would need to be closed (through mandatory identity verification at the transaction level, not just the registration level).
None of these changes are imminent.
What This Means for Brokers
Your Vetting Process Is Your Primary Defense
The structural nature of the fraud problem means it's not going to get better on its own. The broker's defense is the same as it's been throughout this guide series: verify the person, not just the record.
The specific verification steps that address each structural condition:
Against the identity supply: Check authority age and prior revocation flags. Carriers using stolen identities from abandoned registrations often show a gap in the authority history (active for years, then inactive, then suddenly "active" again through a new entity). Use our authority checker, which shows grant date, current status, and the prior revocation flag. Read our authority history guide for how to read the timeline between revocation and reinstatement.
Against professional fraud: The 60-second verification (phone match, email domain check, authority age, operational question) catches the majority of impersonation attempts regardless of how professional the fraud operation is. The fraudster can be sophisticated in every other way, but they can't answer the FMCSA-listed phone number because it rings at the real carrier's terminal.
Against the public database vulnerability: Since you can't close the vulnerability (it's FMCSA's database design), you defend against it by using the database plus independent verification. The database confirms the carrier exists. The phone call confirms the person is the carrier. Both steps together close the gap that either step alone leaves open.
Read our carrier vetting checklist guide for the full 12-step process that addresses each of these fraud vectors systematically.
Monitor Your Existing Carrier Base
Fraud doesn't only come from new carriers. Established carriers you've worked with can have their identities stolen by fraudsters who contact you using the carrier's MC number but from a different phone number. If a carrier you know calls from a new number, re-verify before booking. Read our carrier monitoring guide for the signals that require immediate investigation.
Report Fraud Aggressively
Every unreported fraud incident allows the same operator to victimize other brokers using the same identity. Report to FMCSA's National Consumer Complaint Database, to CargoNet, to your load board, and to the real carrier whose identity was stolen. Read our FMCSA complaint guide for how to structure the report so it gets prioritized.
What This Means for Carriers
Your Identity Is a Target
If you're a carrier with clean FMCSA data, active authority, and good safety scores, you are the exact profile that fraudsters want to steal. Your clean record is what makes the impersonation convincing.
Monitor for unauthorized use of your MC number. If brokers start calling about loads you didn't accept, your identity is being used. Read our carrier identity theft guide for the 5-step response plan.
Keep your MCS-150 current. An outdated MCS-150 filing means your phone number and address in FMCSA's records may not match your current contact information, which makes it harder for brokers to verify your identity by calling the number on file.
New Carriers Face Extra Scrutiny
The MC number flood means that new authority carriers face more vetting skepticism than at any point in the industry's history. Brokers have been burned by new authorities used for fraud, and their policies reflect that experience. If you're a legitimate new carrier, expect stricter vetting and be prepared to provide additional verification (references, proof of equipment ownership, facility photos) that the carrier you're competing against with 10-year authority doesn't have to provide.
A Comparison: Freight Fraud in 2020 vs. 2026
| Dimension | 2020 Freight Fraud | 2026 Freight Fraud |
|---|---|---|
| Primary type | Double brokering by marginal carriers | Identity theft, fictitious pickups, organized cargo theft |
| Operator profile | Struggling carrier cutting corners | Professional criminal organization with no trucks |
| Scale | One load at a time | 50+ loads across multiple identities simultaneously |
| Technology | Phone calls and email | VoIP spoofing, phishing, TMS compromises, domain spoofing |
| Motivation | Financial desperation from low rates | Permanent criminal enterprise targeting freight as a market |
| Identity source | Operator's own MC number | Stolen from legitimate carriers or abandoned registrations |
| Response to rate recovery | Decreases as margins improve | Continues regardless of market conditions |
| Detection difficulty | Moderate (carrier's own record shows the behavior) | High (stolen identity's record is clean because it belongs to someone else) |
Frequently Asked Questions
Why is carrier fraud increasing in trucking?
Three structural conditions arrived simultaneously: the pandemic-era MC registration surge created hundreds of thousands of identities that fraudsters can steal, professional criminal networks discovered freight fraud is lower-risk and higher-reward than other financial crimes, and FMCSA's public database provides every data point needed to impersonate a carrier for free. These conditions don't reverse when freight rates improve.
Will freight fraud decrease when the market recovers?
Amateur double brokering (struggling carriers re-brokering loads) may decrease as margins improve. Organized identity theft, fictitious pickups, and cargo theft will not, because the operators are professional criminals who don't have trucks and don't benefit from rate recoveries. The fraud infrastructure they've built persists regardless of market conditions.
What types of carrier fraud are most common in 2026?
Carrier identity theft (using a legitimate carrier's MC number to book loads), fictitious pickup schemes (sending unauthorized trucks to pick up cargo), and organized double brokering are the fastest-growing types. Physical cargo theft (breaking into trailers) still accounts for the largest share of incidents by count but is growing more slowly. Read our cargo theft guide for the full breakdown.
How do I protect my brokerage from carrier fraud?
Verify the person, not just the record. Call the FMCSA-listed phone number independently. Check the email domain. Verify the W-9 against FMCSA registration. Confirm the DOT number on the truck at pickup. These steps close the verification gap between confirming a carrier exists and confirming the person you're talking to is actually that carrier. Read our carrier vetting checklist guide for the full process.
How do I protect my carrier identity from being stolen?
Keep your MCS-150 current so your FMCSA contact information is accurate. Monitor for calls from brokers about loads you didn't accept. If you discover your identity is being used, report to FMCSA, notify your insurer, and alert load boards. Read our identity theft guide for the full response plan.
Is FMCSA doing anything about freight fraud?
FMCSA has increased new-entrant screening, improved chameleon carrier detection in their systems, and processed more fraud-related complaints through the NCCDB. The structural challenge is that FMCSA's enforcement resources are limited relative to the scale of the problem, and the public database that enables fraud also enables the legitimate vetting that the freight market depends on.
Should brokers stop using load boards because of fraud?
No. Load boards are a standard and necessary marketplace tool. The fraud exploits brokers who skip verification under time pressure, not the platform itself. Brokers who perform the 60-second verification (phone match, email domain, authority age, operational question) use load boards safely. The platform isn't the vulnerability. The urgency is.
How much does carrier fraud cost the freight industry?
Cargo theft alone accounted for an estimated $725 million in losses in 2025. Double brokering losses, payment fraud, and the operational costs of fraud prevention add significantly to this total. The true cost is difficult to quantify because many fraud incidents go unreported, particularly double brokering schemes where the freight ultimately delivers and the broker absorbs the financial loss without filing a report.
Bottom Line
Carrier fraud hit $725 million in cargo theft alone in 2025, grew 35% in identity-based methods, and is projected to increase another 13% in 2026. The industry keeps waiting for the problem to cycle back down with rate recovery. It won't, because the three conditions that created this fraud environment are structural, not cyclical.
The identity supply from the MC registration surge is permanent. The criminal infrastructure is professionalized. The public database vulnerability is a design feature that can't be removed. These conditions don't respond to rate charts.
The defense is the same whether the fraud is amateur or professional, cyclical or structural: verify the person, not just the record. Call the FMCSA number. Check the email. Confirm the truck at the dock. Sixty seconds of verification, performed every time, regardless of market conditions. The fraud isn't going away. The verification process that stops it doesn't need to change. It just needs to happen.