Skopenow | OSINT Blog

A Break in the Chain: Stolen KitKats, OSINT, and Cargo Theft

Written by Steve Adams | Apr 13, 2026 6:18:17 PM

As bizarre or unexpected as it sounds, KitKat recently confirmed in a public statement in March of 2026 that a shipment of more than 12 tonnes of chocolate bars—over 400,000 units—had been stolen while in transit across Europe. The truck itself also remains missing.

There were no signs of violence, and the whole thing was over before anyone knew what had happened. In just a few minutes, a globe-spanning supply chain was cut off at the knees.

While unique in the amount of attention it garnered, the incident is hardly isolated. Cargo theft is a systemic risk across global supply chains. Between 2022 and 2024 alone, more than 157,000 cargo theft incidents were recorded globally, generating losses exceeding $3 billion. In the United States, around 18% of all thefts are attributable to strategic cargo theft.

This incident serves as a reminder that cargo theft is a significant problem that all supply chains must contend with.

Understanding the Modern Cargo Theft Landscape

Cargo theft is not a single tactic. It is a collection of methods that often overlap and evolve. These include:

Straight theft, centered on predictable vulnerabilities like unsecured parking, drop lots, staging areas, and roadside theft during driver breaks. Even as newer tactics emerge, these traditional methods remain persistent.

Fraud-based theft, exploiting trust, identity, and process gaps. It often involves phantom carriers, fictitious pickups, identity theft targeting logistics providers, and fraudulent documentation or manipulated bookings. These operations increasingly depend on digital access and manipulation, including compromised freight accounts, falsified paperwork, and impersonation tactics.

Pilferage and leakage, which tend to be lower-level, repeated theft events, whereby small quantities are skimmed off shipments over time. These incidents are often enabled by insider access and can be difficult to detect quickly. They are frequently underreported, but their cumulative impact is significant.

Truck and asset theft, involving the theft of entire vehicles or trailers, as well as cloned trucks, impersonation tactics, and container or asset substitution. Insider threats add another layer of risk, with employees or subcontractors leaking information or using shipment data to enable targeted theft.

Diversion and interception, which are becoming more common. These schemes may involve false emergencies, route manipulation, unauthorized cargo rerouting, and coordination between digital and physical actors.

Why OSINT Is Critical in Disrupting Cargo Theft

Open-source intelligence (OSINT) is the collection and analysis of publicly available information to support decision-making. In the context of cargo theft, OSINT enables a shift from incident response to risk detection and prevention. Here’s how it applies to cargo protection:

OSINT Workflows for Disrupting Cargo Theft

1. Pre-Load Due Diligence

Before cargo is handed over, due diligence can help identify risks of deception. Investigators can validate company registrations, analyze domains and digital presence, review historical business records, and identify inconsistencies across sources. This is especially important given the rise in fraudulent carriers using lookalike domains, spoofed communications, and stolen credentials. In many cases, this is the only stage where theft can still be prevented.

2. Route and Location Risk Awareness

Route and location risk awareness is equally important because cargo theft is often geographically patterned. Data shows strong clustering along major transport corridors, around logistics hubs, and at unsecured parking and rest areas. By reviewing crime trends such as theft and robbery, traffic and incident data, local news reporting, and environmental risks, teams can make better real-time decisions around routing and staging. This can also help account for situations where drivers are misled into changing course because a route is falsely presented as blocked.

3. Network and Link Analysis

Network analysis helps show that cargo theft is rarely isolated and is often carried out by organized criminal groups. Investigators can map relationships across entities, identify shared infrastructure, and detect patterns across incidents. This creates opportunities to disrupt activity beyond a single event.

Cargo Theft as an Intelligence Problem

Cargo theft is becoming more deceptive, more scalable, and more intelligence-driven. At the same time, it is becoming more visible to those who know where to look. Those who know how to protect their supply chains amid rising attacks will be the ones who pull ahead of their competition.