Cargo Theft Is Exploiting the In-Transit Visibility Blind Spots

March 26, 2026
J. Spencer
J. Spencer

Table of Contents:

  • Truck Level Tracking Alone Is Costly  
  • Disabled GPS: The Invisible Impact
  • Why the Defense and Aerospace Sector Faces Elevated In-Transit Risk
  • Vehicle Tracking Versus Asset-Level Tracking (With A Lifetime Digital Thread): The Distinction
  • Enhanced Solution Built on Four Capabilities
  • The In-Transit Window Is Now a Weapon. The Response Cannot Wait.
  • References  

KEY TAKEAWAY

Asset-level tracking with a digital thread assigns a unique, cryptographically verifiable digital identity to each component, separate from the container or vehicle transporting it.  When GPS tracking at the vehicle or container level fails or is deliberately disabled, asset-level tracking maintains visibility of every asset inside the container. For defense and aerospace programs operating under DFARS and AS9100D traceability requirements, this solution distinction is not a feature upgrade.  It is an operational necessity.


Why Is Asset-Level Tracking Needed for High-Value Defense Components?  

Truck-level tracking alone for high-value assets can be costly. $725 million in 2025 to be exact. A Washington Post article published in March 2026 highlighted the financial impact of increasing cargo theft activities. Organized cargo theft has matured into a supply chain threat, not a security inconvenience. The targets are deliberate, and the methods are sophisticated and organized.

According to theft prevention firm Verisk CargoNet, theft impacts have increased year over year across multiple areas. In 2025, across the U.S. and Canada, there were 3,594 confirmed cargo theft incidents, resulting in a 60 percent increase in financial losses totaling $725 million. The average individual theft incident is currently valued at $273,990, a 36% increase. To make matters worse, according to an October 2025 American Transportation Research Institute (ATRI) report, 74 percent of stolen cargo is never recovered, and it is very likely that these estimates are substantially low.  

Analysts from the Transported Asset Protection Association assess that true losses more likely run 10 to 15 times higher than official counts, reflecting both underreporting across jurisdictions and the reluctance of shippers, brokers, and carriers to publicize losses that invite additional scrutiny and insurance consequences. The ATRI report estimates that the true annual scale of U.S. cargo theft reaches $6.6 billion when underreported incidents are factored in. While financial losses are mounting, it does not necessarily mean the quantities are seeing the same trajectory. Why? The target has changed.  

Food continues to hold the top spot for the most stolen type of product; however, there is an alarming trend of higher-value items securing the remaining top spots, even though they are not as easy to resell. High-value, high-density technology components have displaced consumer goods as the primary focus of organized theft networks. Enterprise computing hardware, AI server racks, RAM modules, and advanced semiconductors have cost density. This is the maximum recoverable value relative to the physical effort required to acquire and move the stolen cargo.  

How Does Disabled GPS Create an Invisibility Gap in Defense Logistics?

Several incidents in 2025 highlight the gaps when tracking by only GPS at the vehicle level.

In Salt Lake City, Utah, a fraudulent driver inserted himself into a legitimate logistics chain process for a shipment bound for El Paso, Texas. He presented credible documentation, agreed to have his GPS-tracked phone monitored as required for high-value loads, and departed the shipping facility without raising suspicion. His GPS trail went cold approximately one hour outside the destination. The trailer was discovered days later near the Port of Long Beach in California. Its cargo, 40 AI server racks and 108,230 memory modules commonly used in AI data centers, was gone. The estimated loss was $31 million not including the risk from reverse engineering and trojan injections.  

In Reno, Nevada, a targeted trailer's GPS tracking device was removed within minutes of the trailer being stolen from the unsecured facility. The device was later found with wires cut near Interstate 80, and the trailer containing $15 million worth of Apple products and AMD semiconductors was gone. The entire visibility of that shipment was lost in 14 minutes.

These are just two of the many incidents that are on the increase, raising awareness of the deliberate exploitation of the specific gaps in only vehicle-level tracking solutions. Thieves operate within the GPS limitations. Vehicle tracking confirms the trailer's last known location; however, it provides no visibility information about the individual items inside. The moment the items leave the trailer, they become invisible.  

In defense logistics, this invisibility is not a gap between a thief and a trailer. It is a critical gap between a command and the components that will be installed in an aircraft, communications platform or leveraged to sustain mission readiness. The commercial logistics sector is absorbing these losses in dollars. For defense and aerospace, exposure is measured in something far more consequential than revenue.

Why Does the Defense and Aerospace Sector Faces Elevated In-Transit Risk?

Commercial logistics theft targets the highest value-to-weight products moving through the supply chain at a given time. In 2025 and into 2026, that profile describes precisely the components at the center of defense and aerospace modernization: advanced semiconductors, computing hardware for autonomous systems, electronic components for weapons guidance and communications, and AI-enabled processing infrastructure.

Defense programs operating under DFARS clause 252.246-7007 and AS9100D quality management requirements carry a specific traceability obligation. Every component must be traceable to its origin, and that traceability must be documentable at any point in the asset lifecycle.  When a component loses verified custody during transit, that obligation cannot be met through documentation alone. Several factors compound this in-transit risk for defense programs specifically.  

  • Adversarial interest in specific component categories:  
    The organized criminal networks exploiting commercial logistics vulnerabilities in 2025 and 2026 have demonstrated the capability to identify and selectively target specific high-value component categories. Defense components represent a higher-order target than consumer electronics, carrying both economic value and potential adversarial intelligence value. This is the compounding risk that separates defense in-transit exposure from commercial logistics exposure.  
  • Multi-tier supply chains with limited sub-tier visibility  
    Defense prime contractors manage first-tier supplier relationships, but components often move through multiple independent logistics facilities before reaching a program facility. Each facility represents a chain of custody handoff. Each handoff is a potential gap in the asset-level digital thread if the transfer is not tracked and verified at the asset level.
  • Long transit journeys with adversarial exposure
    Defense components move through the same commercial logistics infrastructure as civilian goods. That infrastructure passes through ports, intermodal hubs, and distribution facilities that are identified in industry data as high-risk zones for organized theft and cargo diversion. According to CargoNet, California, Texas, and Illinois account for 52 percent of U.S. cargo theft incidents. Not surprising, California and Texas are also main hubs for defense shipments based on data and spend, according to the Defense Logistics Agency.  
  • Extended time-in-transit creating additional exposure windows  
    Unlike commercial logistics optimized for rapid delivery cycles, defense procurement timelines involve components that may spend weeks or months in transit or in intermediate storage between manufacture and final installation. Extended transit creates extended exposure to diversion, substitution, and identity fraud.

What Is the Distinction Between Vehicle Tracking Versus Asset-Level Tracking?

Defense and aerospace supply chains have invested significantly in tracking technology. GPS-equipped containers and RFID-tagged pallets and assets have materially improved location awareness for shipments in transit. The question is not whether these investments have value. The question is what problem still exists.

Container-level and vehicle tracking answers one question: where is the shipment? It does not answer the questions that the current threat environment requires: what is in the shipment, is each item what it is represented to be, who has had custody of each item at every transfer point, and has any item been accessed, substituted, or diverted since its last verified checkpoint.

Asset-level tracking is the ability to uniquely identify and monitor each individual component throughout its lifecycle, independent of the container or vehicle transporting it. Combining a digital thread that assigns a unique, cryptographically verifiable digital identity to each individual asset makes traceability secure and efficient. The visibility persists regardless of what happens to the vehicle. Consider the Salt Lake City incident. If each of the 108,230 memory modules carried an individual asset-level digital fingerprint tied to a tracking sensor at the case, every movement would have generated a verifiable record. The vehicle level GPS trail going cold would have marked the beginning of a traceable custody gap, not the end of visibility.  

The current environment requires an enhanced solution built on four capabilities:

  • Asset-level digital thread:
    A unique identifier that is securely linked to each individual component to the sensor(s) tracking the asset(s). The digital thread travels with the asset, not with the container. The identity persists even if the tracking modality changes from GPS to LoRaWAN or BLE.  
  • Sensor-based verifiable custody transfers:  
    Every transfer of custody between organizations or logistics facilities is recorded by the sensor in addition to the signed transaction requiring authentication by both the transferring and receiving parties. Documentation-based handoffs are augmented, not replaced, creating a dual verification record.  
  • The immutable chain of custody record captures gaps:  
    In a continuous custody record, an absence of documented transfer events is itself auditable evidence. The detection interval between checkpoints is not silent. It is recorded as an interval without verified custody activity, which is a risk signal rather than a blind spot. This directly satisfies DFARS and AS9100D traceability requirements in a way that documentation alone cannot.  
  • Near real-time anomaly detection:  
    Geofencing by sensor highlights any deviation from planned transit routes and can feed the data that generates alerts at the moment they occur rather than during post-transit reconciliation. An unauthorized route change, an unexpected stop in a high-theft corridor, or a custody transfer to an unverified party triggers immediate notification rather than a post-incident recovery.  

The In-Transit Window Is Now a Weapon. The Response Cannot Wait.

The convergence of escalating in-transit theft tactics and the specific targeting of high-density technology components creates a direct operational requirement for defense program and logistics managers responsible for component procurement and logistics oversight. The need to act is now.  

The commercial cargo theft crisis documented in 2025 and early 2026 is not a logistics industry problem that defense and aerospace can observe from a distance. It is a public-facing demonstration of the same structural vulnerability present in every in-transit supply chain that relies on container-level location tracking as its primary visibility mechanism. The adversarial method is consistent: exploit the interval between what a shipment record claims about its contents and what the contents actually are.

The tactics have matured to the point where GPS removal, identity fraud, and documentation forgery are routine operational methods for organized criminal networks. The defense sector faces those same tactics plus an additional adversarial dimension: the deliberate substitution of counterfeit components with the intent of compromising system integrity rather than simply generating resale revenue. DFARS clause 252.246-7007 requires defense contractors to maintain risk-based counterfeit part detection programs at every subcontract tier. That requirement is architecturally unenforceable without an asset-level digital thread that persists across the full journey from manufacturer to installation and retirement.

Responding to both threats requires the same solution approach: cryptographically verifiable digital thread tied to each individual item, immutable chain of custody records that cannot be altered without detection, and in-transit visibility that operates at the asset level rather than the shipping container level.

Knowing where a container is located is a necessary starting point. For defense and aerospace, it cannot be the endpoint of the in-transit visibility solution.

Reference links: