Phantom carriers and double brokering account for the fastest growing fraud loss class in European road freight.
TT Club . BSI cargo theft report
Every carrier and every sub of every carrier verified directly from authoritative registries, to any depth. Your shipper gets a single signed answer: this chain is trusted and authorised. Margins and intermediaries stay private. If something goes wrong, an automated deep audit unseals the full chain for the investigator.
Tier N
Any depth, recursive authorisation
Yes / no
Chain proof to the shipper
Sealed
Full chain only on incident audit
Shipper sees
Chain trusted.
Under the seal
Lead forwarder
You
Pair A β B
sealed
Pair B β C
sealed
Tier N
any depth
Audit on incident only
Tier N Β· any depth
Why this matters
Phantom carriers and double brokering account for the fastest growing fraud loss class in European road freight.
TT Club . BSI cargo theft report
KRAVAG put the 2024 phantom carrier loss in DACH at about 859 million euros across the insured book.
KRAVAG market briefing 2024
The EU Mobility Package shifts compliance from annual paper filings toward continuous, machine readable evidence.
European Commission, Mobility Package
What you actually get
Each pillar maps to one thing your dispatch desk can do without changing TMS, without exposing pricing, and without rebuilding the carrier file.
Each link only authorises the next link. The chain extends as far as it needs to. Every link stays private to its pair. The shipper never sees who subcontracted to whom. They get one answer: the chain is trusted and authorised, or it is not.
Look alike VAT numbers, recycled licences, and four day old domains never reach your tender list. Verified only dispatch removes the most common attack surface.
Licence lapses, sanctions hits, and beneficial owner changes surface across your portfolio the same day, not at the next annual review.
Day to day, the chain stays sealed. The moment a theft, claim or public sector request opens a case, the full chain unseals automatically for the investigating party. Source cited, signed, end to end.
How a chain verification flows
Signature view
The bespoke lane visual: how a verified record actually looks where this lane lives.
Shipper sees
Chain trusted.
Under the seal
Lead forwarder
You
Pair A β B
sealed
Pair B β C
sealed
Tier N
any depth
Audit on incident only
Tier N Β· any depth
Illustrative metrics
Modeled ranges from field deployments. Your numbers depend on the share of subcontracted volume and how many of your tenders already require chain proof.
Freight forwarder scenarios
Each scenario is one concrete situation, with the same verification primitive underneath.
Trusted Carrier sources HRB, transport licence, VAT, insurance and beneficial-owner KYC of every operator in the network. directly from authoritative registries, in any of the EU-27 languages. You consume the verified record, not 14 PDFs.
When you sign for the chain, you sign for everyone in it. The platform makes the chain provable to any depth, while keeping every link sealed. The shipper gets one signed answer: the chain is trusted and authorised, or it is broken. The full chain only unseals on incident, for an automated deep audit.
Phantom-carrier fraud cost the EU 859 M⬠in claims at KRAVAG alone in 2024. Trusted Carrier removes the attack surface: only verified operators receive briefings, only verified drivers pass the gate.
Order spoofing succeeds because briefings flow over plain email. The platform exposes only verified contact data and routes orders through verified channels. look-alike inboxes never appear.
The platform watches every operator's licence, insurance, sanctions and ADR status against authoritative sources, around the clock. You stop running the spreadsheet and start consuming the alerts.
Objections we hear most
Claim
Our margins must stay invisible to the shipper.
Reply
They do. The shipper gets a yes or no on chain integrity, never the carriers in it and never the price. The full chain only unseals if an incident triggers an audit.
Claim
We already vet subcontractors annually.
Reply
Annual vetting misses the lapses that happen between reviews. Continuous source verification keeps the policy intact and removes most of the manual handling.
Claim
Our TMS already manages our carrier base.
Reply
Keep your TMS. The verified record sits underneath and feeds back where it helps. There is no required swap and no migration project to start.
Claim
Deep chain proof is unrealistic in spot.
Reply
Pairwise authorisation makes any depth tractable. Each link only proves its own next step. The shipper still gets one signed yes or no answer, no matter how long the chain.
FAQ
A single signed answer for the shipment: the chain is trusted and authorised, or a link is missing or unauthorised. The shipper does not see who is in the chain, what they paid, or your commercial relationships. Day to day the chain is sealed.
Only on incident. If a theft, claim, public sector request or dispute opens a case, an automated deep audit unseals the full chain for the investigating party. Source cited, signed, end to end. No manual digging through emails.
The same way. New carriers complete a guided registration in about five minutes. Already verified carriers approve the next link in one click. The chain proof is available even on a same shift booking.
No. They authorise the next link through the same email or message flow you already use. A portal is available, but never required.
The platform flags the lapse the same day across every shipment that depends on it, so dispatch sees it immediately and the shipper's chain proof flips to broken until it is resolved.
National operator registries, national operator and driver registers, VAT registers, sanctions lists, the carrier's insurer for live cover, and the issuing bodies for licences and certifications. Every fact is signed and source cited.
Verified once. Trusted everywhere.
Free to start. One sub or your entire network.