General
US Cargo Theft Was Up 29% in 2025 And Your Routing Engine Should Care Now
May 19, 2026
16 mins read

Key Takeaways
- US cargo theft jumped 29% year-over-year in Q3 2025, with 645 recorded incidents in the quarter alone, according to FreightWaves data cited in the WWEX Group 2026 State of Shipping and Logistics Report. California and Texas concentrate the incident volume; electronics and food-and-beverage remain top targets; auto parts and pharmaceuticals are showing the fastest growth in theft rates. The standard industry response treats theft as a security problem — better locks, more guards, GPS trackers, insurance claim processes. The shippers winning here are treating it as something else: a routing problem.
- In 2026, cargo theft risk is a routing input. Which corridors carry elevated risk for which categories. Which truck stops and rest areas have incident histories. Which dwell-time patterns expose freight unnecessarily. Which carriers have theft-vulnerability profiles. Time-of-day patterns that affect when freight should and shouldn’t be staged or stopped. Routing engines that incorporate theft data as one input alongside cost, time, and service-level constraints make materially different dispatch decisions than engines that don’t.
- Criminal tactics have evolved beyond pilferage to full-truckload thefts and deceptive pickup fraud at scale. Pilferage — the historical pattern where small portions of a load disappeared — is still common but no longer the dominant cost driver. Full-truckload thefts mean the entire shipment vanishes. Deceptive pickup fraud means a fraudulent operator presents as the legitimate carrier, takes possession of the freight at origin, and the load disappears before anyone realizes the pickup was unauthorized. The architectural implication: theft is no longer a problem the receiving location discovers — it’s a problem that starts at the origin facility and unfolds across the lane.
- Category-specific theft patterns reshape routing decisions for shippers in vulnerable verticals. Electronics shippers face concentrated risk in California corridors and around major distribution hubs. Food and beverage shippers face risk concentrated around port-of-entry regions and major metro distribution centers. Auto parts shippers — facing some of the fastest theft growth — face risk where high-value components dwell at consolidation points. Pharmaceutical shippers face risk concentrated around regional distribution networks and cold-chain handoff points. The category-specific patterns mean uniform “theft is a problem everywhere” framing produces less actionable routing decisions than category-specific risk modeling.
- The practical playbook for NA shippers in 2026 involves five operational shifts: integrate theft incident data into routing decisions at the corridor level, model dwell-time exposure as a risk variable rather than an operational neutral, validate carrier credentials at pickup against the rising deceptive pickup pattern, treat high-theft-category freight differently in carrier selection and route planning, and build the cross-functional connection between Loss Prevention, Transportation, and Operations that most shipper organizations historically didn’t need.
A US electronics distributor’s VP of Logistics Operations reviews the previous quarter’s loss reports. The pattern is consistent and getting worse. Three deceptive pickups in Q3 alone — fraudulent operators presenting as legitimate carriers, taking possession of high-value freight at origin facilities, and disappearing before the freight was reported missing. Two full-truckload thefts on California corridors, one in the Inland Empire and one near the Los Angeles port complex. Pilferage incidents at standard truck stops along the I-5 corridor. The combined loss for the quarter exceeded the annual loss budget the company had set in the year before.
The Loss Prevention team is doing what loss prevention teams traditionally do, coordinating with law enforcement, filing insurance claims, reviewing facility security footage, hiring additional yard security. The VP of Operations asks a different question in the next executive review: why are we still routing high-value electronics shipments through the same corridors and the same dwell points where the incidents keep happening?
This is the operational shift that the 29% increase reported in the WWEX Group 2026 State of Shipping and Logistics Report is forcing on US shippers. According to FreightWaves data cited in the WWEX report, US cargo theft jumped 29% YoY in Q3 2025 with 645 recorded incidents, major concentration in California and Texas, electronics and food-and-beverage as top targets, and auto parts and pharmaceuticals showing the fastest growth. The standard industry response — better locks, more guards, GPS trackers, insurance claim processes — addresses theft as a security problem after the fact. The operational reality in 2026 is that theft is also a routing problem before the fact, and the shippers reducing theft losses are the ones treating it that way.
For US VPs of Operations, Heads of Transportation, Directors of Loss Prevention, and Heads of Last-Mile at shippers in vulnerable categories — electronics, food and beverage, auto parts, pharmaceuticals — this is a practical look at why theft risk is now a routing input, what changes when dispatch decisions incorporate theft data, the category-specific patterns that matter most, and the five operational shifts that separate shippers reducing theft losses from shippers absorbing them.
1. The 29% Reality: What’s Actually Driving the Escalation
The 29% year-over-year increase isn’t a single trend — it’s three operational patterns running simultaneously.
Pilferage remains common but is no longer the dominant pattern. Pilferage — small portions of a load disappearing during transit or at dwell points — has been the historical theft pattern most operations were built to handle. Pilferage still happens; the WWEX report confirms it remains common. But the escalating loss numbers aren’t driven primarily by pilferage growth. They’re driven by larger-magnitude theft patterns that pilferage-era operations weren’t designed to detect or prevent.
Full-truckload thefts have increased materially. Rather than small portions disappearing, the entire load vanishes — driver, trailer, and cargo. Sometimes the trailer is recovered empty; sometimes the trailer doesn’t surface for months. Full-truckload thefts concentrate where high-value loads dwell at vulnerable points: unsecured truck stops, distribution center yards with inadequate access control, port-area staging facilities, and certain corridor segments where theft rings have established operational patterns.
Deceptive pickup fraud is the fastest-evolving pattern. A fraudulent operator presents as the legitimate scheduled carrier, picks up the freight at origin, and disappears with the load before the legitimate carrier — or the shipper — realizes the pickup was unauthorized. The fraud often involves spoofed carrier credentials, hijacked load board postings, and increasingly sophisticated impersonation of legitimate operators. Operations relying on traditional carrier verification at pickup are systematically exposed.
The three patterns combined explain the 29% increase. They also explain why traditional security responses don’t address the operational reality — yard security at the receiving facility doesn’t prevent deceptive pickup at origin, GPS trackers don’t help when the entire truck is stolen and tracking devices are disabled, and insurance claims don’t reduce loss exposure prospectively.
2. Why Theft Is Now a Routing Input
Routing decisions traditionally optimize across cost, time, service-level commitments, and capacity constraints. Theft risk has historically lived in a different organizational silo — Loss Prevention rather than Transportation, security rather than dispatch. The 29% increase is changing that for shippers in vulnerable categories.
Corridor risk varies materially across the US road network. Some corridors carry elevated theft risk for specific freight categories because theft rings have established operational patterns there; some corridors are operationally lower-risk because of geographic, infrastructure, or law enforcement factors. The WWEX report identifies California and Texas as concentrated incident geographies — but within those states, specific corridor segments concentrate risk further. Operations routing high-value freight through high-risk corridors without considering the risk concentration are absorbing avoidable exposure.
Dwell-time exposure is a controllable variable. Freight at rest is freight at higher theft risk. Dwell time at truck stops, at staging facilities, at consolidation points, and in carrier yards correlates directly with theft exposure. Routing engines that minimize dwell time at high-risk points reduce theft exposure operationally rather than relying on security infrastructure to compensate for prolonged exposure.
Carrier vulnerability profiles vary. Some carriers have stronger driver-verification protocols, more robust credential management, better-secured equipment, and lower historical incident rates. Other carriers — particularly newer entrants with less mature security operations — carry higher theft vulnerability. Carrier selection that incorporates theft-vulnerability profile alongside cost and service-level performance produces different decisions than carrier selection that doesn’t.
Time-of-day patterns affect risk. Theft incidents concentrate around specific time-of-day patterns — overnight dwell, weekend dwell at unstaffed facilities, holiday-period exposure. Dispatch decisions that consider time-of-day risk produce different scheduling outcomes than dispatch decisions that don’t.
| Also Read: The ETA-to-Trust Chain: How ML Architecture Converts Delivery Predictions into Customer Loyalty |
3. Category-Specific Theft Patterns
The WWEX report identifies category-specific theft patterns that should reshape category-specific routing decisions. Uniform “theft is a problem” framing produces less actionable operational changes than category-specific risk modeling.
Electronics face concentrated theft risk in California corridors and around major distribution hubs. High value per pound, established resale markets, and infrastructure concentration around Los Angeles, the Inland Empire, and Northern California ports create operational targets that theft rings have organized around. Electronics shippers routing through these geographies without elevated theft-aware dispatch decisions face structurally higher loss exposure than the same shippers would face routing identical freight through lower-risk corridors.
Food and beverage theft concentrates around port-of-entry regions and major metro distribution centers. Lower per-pound value than electronics, but volume-driven theft economics work for established rings with established fence networks. Cold chain F&B carries additional complexity because theft can ruin entire loads if temperature control is compromised during the incident.
Auto parts are showing some of the fastest theft growth according to the WWEX report. The pattern follows from established resale markets for high-value components — catalytic converters, specific electronic modules, premium tires and wheels — combined with the rise of online marketplaces that have enabled theft monetization at scale. Auto parts shippers face risk where high-value components dwell at consolidation points and at carrier yards.
Pharmaceuticals face risk concentrated around regional distribution networks and cold-chain handoff points. Pharmaceutical theft has higher complexity than other categories because of regulatory chain-of-custody requirements, controlled substance considerations, and the operational reality that pharmaceutical theft often involves credentialed insiders rather than purely external operators. Pharmaceutical shippers face theft risk integrated with compliance risk in ways other categories don’t.
4. The Five Operational Shifts for 2026
For NA shippers in vulnerable categories, five operational shifts separate operations reducing theft losses from operations absorbing them.
Integrate theft incident data into routing decisions at the corridor level. Industry incident databases, regional law enforcement reporting, and shipper-aggregated data should feed routing engines as operational input alongside cost, time, and service-level constraints. Model dwell-time exposure as a risk variable. Routing decisions that minimize dwell time at high-risk points reduce theft exposure operationally rather than depending on security infrastructure to compensate.
Validate carrier credentials at pickup against the deceptive pickup pattern. Traditional carrier verification (calling the carrier dispatch number on file, checking insurance certificates) is increasingly bypassed by sophisticated deceptive pickup operations. Operations updating pickup verification protocols — driver identity verification at origin facility, cross-reference against multiple data sources, real-time confirmation with carrier operations centers — reduce deceptive pickup exposure.
Treat high-theft-category freight differently in carrier selection. Carrier selection that incorporates theft-vulnerability profile alongside cost and service-level performance produces different decisions for high-theft-category freight than for general freight. Build cross-functional connection between Loss Prevention, Transportation, and Operations. Most shipper organizations historically separated these functions. The 2026 reality is that they need to operate as integrated decision-making rather than separate silos.
The strategic question for US shipper operations leaders is concrete: given that cargo theft is up 29% year-over-year in the US, criminal tactics have evolved beyond pilferage to full-truckload thefts and deceptive pickup fraud, and category-specific patterns make uniform security responses inadequate, are we treating theft as a routing decision input — or accepting losses that better dispatch decisions could prevent?
FAQs
Why did US cargo theft increase in 2025?
According to FreightWaves data cited in the WWEX Group 2026 State of Shipping and Logistics Report, US cargo theft jumped 29% year-over-year in Q3 2025 with 645 recorded incidents in the quarter. The escalation is driven by three operational patterns running simultaneously. Pilferage remains common — small portions of loads disappearing during transit or at dwell points — but pilferage growth isn’t driving the loss numbers; pilferage-era operations were built to handle this pattern. Full-truckload thefts have increased materially, with entire loads vanishing rather than small portions; trailers sometimes recover empty months later, sometimes not at all. Full-truckload thefts concentrate where high-value loads dwell at vulnerable points like unsecured truck stops, distribution center yards with inadequate access control, and port-area staging facilities. Deceptive pickup fraud is the fastest-evolving pattern — fraudulent operators presenting as legitimate scheduled carriers, picking up freight at origin, and disappearing before the legitimate carrier or shipper realizes the pickup was unauthorized. The fraud often involves spoofed carrier credentials, hijacked load board postings, and increasingly sophisticated impersonation.
How does treating cargo theft as a routing input differ from treating it as a security problem?
Routing decisions traditionally optimize across cost, time, service-level commitments, and capacity constraints. Theft risk has historically lived in a different organizational silo — Loss Prevention rather than Transportation, security rather than dispatch. The 29% increase is changing that for shippers in vulnerable categories. Treating theft as a routing input means incorporating four dimensions into dispatch decisions. Corridor risk varies materially across the US road network — some corridors carry elevated theft risk for specific freight categories because theft rings have established operational patterns there. Dwell-time exposure is a controllable variable — freight at rest is freight at higher theft risk, and routing engines that minimize dwell time at high-risk points reduce theft exposure operationally rather than relying on security infrastructure to compensate. Carrier vulnerability profiles vary — some carriers have stronger driver-verification protocols, more robust credential management, better-secured equipment, and lower historical incident rates. Time-of-day patterns affect risk — theft incidents concentrate around specific time-of-day patterns including overnight dwell, weekend dwell at unstaffed facilities, and holiday-period exposure.
Which freight categories face the highest cargo theft risk in 2026?
The WWEX report identifies category-specific theft patterns. Electronics face concentrated theft risk in California corridors and around major distribution hubs. High value per pound, established resale markets, and infrastructure concentration around Los Angeles, the Inland Empire, and Northern California ports create operational targets that theft rings have organized around. Food and beverage theft concentrates around port-of-entry regions and major metro distribution centers — lower per-pound value than electronics, but volume-driven theft economics work for established rings with established fence networks; cold chain F&B carries additional complexity because theft can ruin entire loads if temperature control is compromised. Auto parts are showing some of the fastest theft growth — the pattern follows established resale markets for high-value components (catalytic converters, specific electronic modules, premium tires and wheels) combined with the rise of online marketplaces enabling theft monetization at scale. Pharmaceuticals face risk concentrated around regional distribution networks and cold-chain handoff points, with higher complexity because of regulatory chain-of-custody requirements, controlled substance considerations, and the operational reality that pharmaceutical theft often involves credentialed insiders rather than purely external operators.
What is deceptive pickup fraud and how should shippers protect against it?
Deceptive pickup fraud is the fastest-evolving cargo theft pattern. A fraudulent operator presents as the legitimate scheduled carrier, picks up freight at origin, and disappears with the load before the legitimate carrier or the shipper realizes the pickup was unauthorized. The fraud often involves spoofed carrier credentials, hijacked load board postings, and increasingly sophisticated impersonation of legitimate operators. Traditional carrier verification protocols at pickup — calling the carrier dispatch number on file, checking insurance certificates — are increasingly bypassed by sophisticated deceptive pickup operations because fraudulent operators have learned to anticipate and circumvent these checks. Operations updating pickup verification protocols reduce deceptive pickup exposure: driver identity verification at origin facility through multiple identification sources; cross-reference against multiple independent data sources rather than relying on documents the driver presents; real-time confirmation with carrier operations centers through pre-established channels rather than numbers the driver provides; tracking technology activation at pickup that can be monitored even if vehicle telematics are subsequently disabled. The architectural shift is from document-based verification to identity-based, multi-source verification.
Why are California and Texas the concentrated cargo theft hotspots?
California and Texas concentrate cargo theft incident volume because of infrastructure, geographic, and economic factors that align with theft operations. California concentrates theft risk because of the Los Angeles and Long Beach port complex (one of the largest container volumes in North America), the Inland Empire warehouse and distribution concentration, the I-5 corridor as a major freight artery, and established theft ring operations that have organized around the infrastructure. Texas concentrates risk because of Dallas-Fort Worth as a major freight crossroads, Houston port operations, the I-10 and I-35 corridors as major freight arteries, and proximity to the Mexico border that creates cross-border cargo flows. Within each state, specific corridor segments concentrate risk further — operations routing high-value freight through these geographies without elevated theft-aware dispatch decisions face structurally higher loss exposure than the same shippers would face routing identical freight through lower-risk corridors. The concentration also reflects the simple operational reality that theft rings establish operations where high-value freight volumes are largest and easiest to monetize through established fence networks.
What practical operational changes should US shippers make in 2026 to reduce theft losses?
Five operational shifts separate operations reducing theft losses from operations absorbing them. First: integrate theft incident data into routing decisions at the corridor level — industry incident databases, regional law enforcement reporting, and shipper-aggregated data should feed routing engines as operational input alongside cost, time, and service-level constraints. Second: model dwell-time exposure as a risk variable rather than an operational neutral — routing decisions that minimize dwell time at high-risk points reduce theft exposure operationally. Third: validate carrier credentials at pickup against the deceptive pickup pattern — driver identity verification at origin facility, cross-reference against multiple independent data sources, real-time confirmation with carrier operations centers through pre-established channels. Fourth: treat high-theft-category freight differently in carrier selection — carrier selection that incorporates theft-vulnerability profile alongside cost and service-level performance produces different decisions for high-theft-category freight than for general freight. Fifth: build cross-functional connection between Loss Prevention, Transportation, and Operations — most shipper organizations historically separated these functions, but the 2026 reality is that they need to operate as integrated decision-making rather than separate silos.
Focus Keywords
cargo theft 2025, US cargo theft routing, theft risk dispatch decisions, NA shipper security, electronics cargo theft, food beverage theft, deceptive pickup fraud, freight theft California Texas, full-truckload theft, auto parts cargo theft, pharmaceutical cargo theft, corridor risk routing, dwell-time theft exposure, carrier vulnerability profile, theft-aware dispatch, cross-functional loss prevention transportation, 645 incidents Q3 2025, 29% year-over-year theft increase
Sources referenced: FreightWaves cargo theft data cited in WWEX Group 2026 State of Shipping and Logistics Report. Specific operational outcomes vary materially across NA shipper implementations based on category mix, geographic footprint, freight value profile, carrier portfolio, and operational maturity at deployment. Cargo theft patterns continue to evolve; operations should verify current incident patterns against industry reporting and regional law enforcement data when making routing decisions.
Nachiket leads Product Marketing at Locus, bringing over seven years of experience across financial analysis, corporate strategy, governance, and investor relations. With a multidisciplinary lens and strong analytical rigor, he shapes sharp narratives that connect business priorities with market perspectives.
Related Tags:
General
The Sehri-and-Iftar Architecture: How Saudi Arabia’s 15 Million Ramadan Parcels Reshape Last-Mile Operations
Saudi Arabia's 15 million Ramadan parcels operate on a bimodal daily pattern. How Sehri and Iftar timing reshape last-mile architecture for KSA logistics operators.
Read more
General
What 200,000 Drivers in Limbo in US Means for Your Routing Decisions
~200,000 drivers lost CDL eligibility overnight before a court stay. What this means for NA shipper and 3PL routing decisions this week, regardless of legal outcome.
Read moreInsights Worth Your Time
US Cargo Theft Was Up 29% in 2025 And Your Routing Engine Should Care Now