Introduction

The theft of goods poses a significant problem across the globe. The European Union (EU) estimates cargo theft at €8.2 billion annually, which, in the context of all transport, is an average of €6.72 per trip (EP 2007). According to Boone et al. (2016) is cargo theft estimated to cost companies $10B annually (in the U.S.) and $30B worldwide. Furthermore, Boone et al. (2016) stresses that the vast majority of the incidents occurs under the transport part of the supply chain. These numbers, like most figures on cargo theft, are conservative, primarily because of two reasons; namely, underreporting of actual theft, and if reported, only the direct loss is stated (value of the stolen items, sales, or invoice value). The theft of cargo and cargo carriers is an old and more or less constant business risk that has always been a part of the overall business risk portfolio. Within the understanding that the problem of cargo theft will be very difficult to eradicate, as it always has been around the flow of goods globally, it is important to understand the current form of the problem. Therefore, there will always be a need for new research within this field. According to an industry report (TT Club 2022) trends are changing as they point out port congestion, insider threat and weak spots in digitalisation around freight services as increasing problem areas. Furthermore, the report stresses the also the changes in supplier location and mode shifts in transports as linked to increased problems with cargo theft.

The current understanding of risks and uncertainties within global supply chains stems from the area of supply chain risk and resilience research following 9/11 2001. Sheffi (2001) points out the effects of the World Trade Centre terrorist attacks on the global flow of goods. The effects may be indirect but was devastating, nevertheless. This event and non-antagonistic events such as the Hurricane Katrina and other natural disasters demonstrated the power to disrupt or cause uncertainty in supply chains (Elliott 2005; Peck and Juttner 2002). The increase in cargo theft means that if has become a global problem which primarily leads to the effects, financial losses and disruptions in supply chain operations (Liang et al. 2022). The impact is stated to be up to six times the value of the stolen products because of costs of product replacement, accident handling, increased insurance premium, loss of sales, and negative impact on the business reputation (Burges 2022).

The research concerning risks in a supply chain is fairly new and it started with risks and purchases (Khan and Bernard 2007). Since then, several authors have addressed the relationship between risk and supply chains (Robinson et al. 1967; Burnes and Dale 1998; Burnes and New 1996; Cousins et al. 2004; Hood and Young 2005; March and Shapira 1987; Johnson and Haug 2021; Alora and Barua 2022; Ekwall and Lantz 2021). Studies of supply chain risks seldom address specific causes of risk (Christopher and Lee 2004; Christopher and Peck 2004; Juttner 2005; and Sheffi 2001). They simply mention supply chain risk sources without discussing causes such as theft, smuggling, sabotage, and criminal activity. Even within these four areas, the causes need to be understood in more detail as the variety in modus operandi, expected outcome from the perpetrators' point of view and presented security features all affect the actual events. This leads to a more detailed understanding of each risk source, from a supply chain perspective, is needed.

Linked to the area of supply chain risk, one can talk about the vulnerability of supply chains. Within this field, cargo theft is one of the main ‘unwanted effects’, which represents the root causes of supply chain disruptions (Waters 2007; Ekwall and Lantz 2016; Justus et al. 2018; Nagurney et al. 2018). Juttner (2005) defines supply chain vulnerability as ‘an exposure to serious disturbance arising from supply chain risks and affecting the supply chain’s ability to effectively serve the end customer market’. This definition opens up to the understanding that different geographical locations, as well as other business aspects, lead to differences in the actual business risk, this follows the stress of risk factors in cargo theft (Liang et al. 2022).

In the EU, the majority of freight transport takes place on the road, this leads to that road-related cargo theft incidents thereby can be considered a threat against one of the core principles for the EU, namely the free movement of goods (Europol 2009). There is an estimation of losses due to cargo theft, both globally and in different regions, and most of these numbers are, at best, unreliable. These figures are calculated extraordinarily conservatively since most cargo theft goes unreported, and these figures reflect only the value of the items, hence, disregarding indirect losses from, for example, production downtime due to lack of components. (Barth and White 1998). There are predictions that the real figures for cargo theft are either grossly underestimated or overestimated in official reports (Gips 2006). Gathering accurate numbers for cargo theft losses is difficult or impossible in many cases, due to limited reporting by the transport industry and the lack of a national law enforcement system requiring reporting and tracking uniformity (ECMT 2001).

Statistics on cargo theft indicate patterns and trends that compose a broad picture of the many differences in the occurrence of cargo theft. About 41% of all incidents occur during the driving phase of transportation (EP 2007). In 15% of incidents, the truck is stolen along with the goods. Another 15% represents hijacking and robbery (EP 2007). According to a report by the International Road Transport Union (IRU) (2008), trucks and their loads were targeted in 63% of all thefts, while 43% were either direct thefts of transported goods or included the theft of the drivers’ personal belongings. Of these thefts, 42% occurred in truck parking lots and a further 19% on motorways (IRU 2008). This implies that 61% of all thefts occurred at a temporary rest area along a road. Cargo theft typically occurs in trucks that are temporarily parked along the road, often waiting for loading and unloading opportunities (EP 2007; TruckPol 2007; IRU 2008). In this context, prior research shows that a violent modus operandi has a greater impact in terms of the value of stolen goods (Ekwall and Lantz 2013, 2015a, b, 2016; Justus et al. 2018; Nagurney et al. 2018; Lorenc and Kuznar 2018).

This paper addresses a limited array of risks and uncertainties that are defined as antagonistic threats. According to Ekwall (2009), antagonistic threats can be defined as “deliberately caused illegal and hostile threats against the planned or wanted logistics process, function, and structure”. Based on this definition, the core element for antagonistic threats is motivated perpetrators with hostile intentions toward the object and/or third party that violate any international, country, or local law. The antagonistic threat is therefore a crime and can be understood with the use of theories from criminology, or the scientific study of crime in combination with logistics theories.

According to Liang et al. (2022), there are 22 different risk factors linked to cargo theft, of these can 11 be stated as having risk factor 1, on a scale from 1 to 9. The top 6 factors, having a risk factor from 5 to 8 are (in falling order); Cargo type (8), Location type (8), Geographical region (7), Transportation mode (7), Seasonality (6) and Security level (5). All together, these six risk factors stand for about 63% of the total risk. In this paper, we focus on Seasonality (value, mean value and frequency) both for week (day of the week) and annually (month) linked to reported incident categories. With the purpose to explore weekly and annual seasonality of incident categories in cargo crime in order to find patterns and trends that can be used to mitigate cargo theft, this paper uses an interdisciplinary exchange of views, ideas, and theories which is needed to develop as an applied science (Klaus et al. 1993; Stock 1997). This is achieved by forming the framework model consisting of theories from both logistics and criminology and within this model utilizes the secondary data provided by the TAPA global IIS database to find patterns and trends in cargo theft within the three regions of TAPA, namely EMEA, Asia–Pacific and Americas. This study follows the quantitative analysis tradition in risk management (Behzadi et al. 2018; Ionita et al. 2018) by addressing an operational problem (Leone and Porretta 2018; Lewis 2003; Skorna and Bode 2011).

Frame of reference

According to Christopher (2005), supply chains are defined as ‘The network of organisations that are involved through upstream and downstream relationships in the different processes and activities that produce value in the form of products and services in the hands of the ultimate customer’. This shall be compared with the definition of logistics. ‘The process of strategically managing the procurement, movement and storage of material, parts and finished inventory (and the related information flow) through the organization and its marketing channels in such a way that current and future profitability are maximized through the cost-effective fulfilment of orders’ (Christopher 2005). The two definitions work together to fulfil the scope of logistics, which aims to provide the right product at the right time and the right place (Christopher 1998), by alignment of all activities from the supplier to the end customer. The purpose of the transport network is to physically move the goods within a certain supply chain to fulfil the scope of logistics. An integrated supply chain is normally modelled with different building blocks, which can be located throughout the world and connected through a transport network (Gibson et al. 2005). The transport network will need geographical fixed constructions and infrastructure to fulfil the scope of logistics (cf Christopher 2005). The cargo thief aims to remove goods from the goods flow by attacking the movement of resources and/or the infrastructure it uses. A popular statement here is that the weakest link (offers the best theft opportunity) also is the most utilized attack point in the supply chain (Jażdżewska-Gutta and Borkowski 2022). A potential perpetrator can also utilize the information flow to better plan the theft of goods or commit fraud which targets the flow of capital.

There are several different risks attached to transport activities within the supply chain, one of which is the risk of product theft, primarily during road transport (Ekwall and Lantz 2013; Skorna and Bode 2011; Lorenc and Kuznar 2018). Cargo thieves attempt to remove goods (products) from a supply chain by using different methods to attack different transport chain locations (Farrell 2015). All location types can, for short periods, be considered geographically fixed. For example, vehicles (En route) are moveable; however, this movement is predictable in place, yet less predictable in time. Within Supply Chain Management (SCM), it is common to discuss risk and reward sharing is a key component (Mentzer et al. 2001). This implies that a full understanding of the different supply chain risks is needed to reduce the ripple effects of all magnitudes. It also stresses the need for interdisciplinary research, because risk management practices are included in SCM (Sanders and Wagner 2011).

Criminology distinguishes three elements of a crime that are present in all sorts of crime ranging from occasional violence to advance and complex economic crimes (Sarnecki 2003; Sherman et al. 1989; Sampson et al. 2010). The elements are:

  1. 1.

    Motivated perpetrator

  2. 2.

    Target (goods and equipment)

  3. 3.

    Location (the place where perpetrator and target meet)

Motivated perpetrator

The perpetrator is an individual that, based on the outcome of the decision process, commits a certain action or prepares for a certain action that is prohibited by a locality or country of international law. The perpetrator’s behaviour can be modelled as acting rationally on the margin or limited (by circumstance, choice or mixture of both) rational choice.

Target

The desirable outcomes or targets for the motivated perpetrator differ greatly depending on the motivated perpetrator’s decision process. Normally is it suitable to describe the target as the primary or direct reason for the action, but also as secondary or indirect reasons. The primary targets can be shipped products, resources used, and infrastructure for normal property crimes.

Location

The location or place where the motivated perpetrator and the target meet. The characteristics of the location include different security measures or crime preventive features directly linked to the location. A good example of this is CCTV surveillance of areas may lead to a relocation of the crime instead of prevention of it (Weisburd et al. 2006; Waples and Gill 2006; Tilley 1993).

The theory of elements of crime states that a crime only occurs when all three elements come together at the same time/place. This means that if one of the three elements is missing then is crime impossible. Any combination of location and target is normally referred to as a crime opportunity. According to Clarke and Cornish (2003) are both motivated perpetrators and a crime opportunity is needed for a crime to occur.

Crime opportunities depend on routines or predictability within certain boundaries. This statement also includes more principles than the original, implying that system predictability or routine provides crime opportunities. This is the routine activity theory (RAT) in criminology (Cohen and Felson 1979). This theory provides a strong theoretical foundation for understanding crime and opportunities for crime. RAT argues that normal movement and other routine activities play a significant role in potential crime (Roncek and Maier 1991; Mustaine and Tewksbury 1998; Smith et al. 2000; and Sherman et al. 1989). A key understanding with RAT is that potential perpetrators may seek locations where their victims or targets are numerous, available, convenient, and/or vulnerable (i.e., lack security features, from the perpetrator point-of-view). Felson (1987) uses the illustration of “how lions look for deer near their watering hole” to explain the practical relevance of RAT.

RAT states that predictability in infrastructure and resource movement will significantly contribute to establishing crime opportunities. The flow of material varies to a higher extent but depends on the actors within the supply chain. Therefore, it is possible to predict the flow of goods to some extent. RAT provides a theoretical foundation regarding antagonistic threats against the transport. Thus, when the transport network changes, so do the theft opportunity.

The different theft opportunities can be exploited in different ways. Within criminology, it is common to, based on how a theft opportunity was exploited, classify it into either modus operandi or incident categories. Modus operandi (MO) can simply be described as one´s habit of work or mode of operating and is often used in criminology and police work to describe perpetrators way of committing a specific crime. The term incident category is an overlapping term but shift the focus from a grouping of individual perpetrators MO towards the combination of location and MO.

According to Kroneberg et al. (2010), actors often ‘stick to a particular action alternative in an automatic-spontaneous mode of decision making, which leaves aside other alternatives and incentives. The only common characteristic across all parts of the supply chain, including the transport network, is the perpetrator’s choice of whether, where, when, and how to commit the cargo theft. Based on the ‘opportunity’ theories of crime, namely RAT, crime pattern theory, and the rational choice perspective, the seasonality in crimes can be viewed differently. According to the RAT, crime opportunities are concentrated in time and place concerning the three elements of crime. This implies that changes in any one of these three elements can influence seasonality differently. According to Hylleberg (1995), exogenous causes of crime are important for understanding seasonality. These causes are calendar events, weather, and time of year, which can all increase or decrease criminal behaviour depending on the local contextual surrounding. The time of year can affect crime opportunities in several different ways, for example, the Christmas shopping season. In short, seasonality in crimes may be influenced by the time of year depending on the number of available targets and potential customers for stolen goods. It can also be found in calendar events such as day of the week for similar reasons; however, in that case, it largely depends on the number of available targets. Furthermore, there will be differences in seasonality for different incident categories as crime opportunities differ across incident categories.

The flipside of the RAT is that crime can be predicted, so-called crime forecasting (Gorr et al. 2003), a technique police forces can use to recognize expected hot spots and criminality at certain places (Langworthy and Jefferis 2000). The main limitation in crime forecasting is the reliability, especially where small samples are used (Gorr et al. 2003).

Based on the above framework, the following research hypotheses may be formulated:

  • H1: There are annual seasonality patterns for different incident types in cargo theft

  • H2: There are weekly seasonality patterns for different incident types in cargo theft

These two hypotheses fall within the majority of the top six risk factors of cargo theft (cf. Liang et al. 2022) but stresses the seasonality factor a little more. The focus on seasonality in cargo theft can be found in other research (Justus et al. 2018; Ekwall and Lantz 2013, 2015a, b).

Method

All data utilized in this paper is secondary data. According to Rabinovich and Cheon (2011), the use of secondary data analysis is overlooked in logistics research and should be used to address contemporary challenges in logistics and supply chain research. The database analysed in this paper is the TAPA EMEA Incident Information Service, IIS, which contains about 27,000 unique reported incidents of crimes against road transport operations globally during the years 2000–2022. Hence, the TAPA IIS data must be assumed to provide the most representative image of the true occurrence of cargo theft incidents.

The research presented in this paper follows the tradition from criminology research about time and place for crime presented by Brantingham and Brantingham (1981), where the three levels are macro-, meso- and microlevel. According to this classification is this research is macro-oriented where the analysis is focusing on the global level, as well as on the different TAPA regions level, and the sampling is multistate. The usefulness of this tripartite classification is that any empirical analysis of crime can focus on one or more of these spatial levels of analysis. Normally is research in criminology a mixture of levels and the different levels serve as a reminder for the researchers for greater understanding about the aetiology of crime (causes), in another word, that crime is contextual depended (Barclay and Donnermeyer 2009).

The different categories are analysed concerning weekly and annual seasonality. We describe and analyse incident values and frequencies with appropriate statistics. Comparisons of mean values are conducted with one-way ANOVA if Levene's test does not reveal significant heteroscedasticity, and with the Brown-Forsythe test otherwise. If the ANOVA or Brown-Forsythe test is rejected, post hoc analysis is conducted with pairwise t-tests with Bonferroni correction. Comparisons of frequencies are conducted with chi-square tests. If the overall chi-square test is rejected, post hoc analysis is conducted with pairwise chi-square tests with Bonferroni correction.

The TAPA EMEA IIS database

The TAPA IIS databases comprise approximately 57,000 individual reported incidents of road transport crimes committed between 2009–2022 (EMEA and APAC) and 2015–2022 (Americas). The global TAPA structure is based on the aforementioned three regions (the Americas, EMEA, and APAC), each of which has its IIS database. The crime statistics in the TAPA IIS database are prepared by TAPA members and various law enforcement agencies (LEAs). The identities of the companies involved, directly and indirectly, are not disclosed in the reports, to avoid negative publicity and ensure better data reliability. Further, the reporting entity determines the extent of disclosure of the incident details, thus suggesting that the quality of data varies across incidents and countries.

Reports on the database are generally created using the online reporting interface on the website www.tapaemea.com. The reports include several mandatory facts, such as the details of the reporter (name and contact details), incident date, and description. Further, there are several fixed descriptions about the incident in the following categories: incident type, modus operandi, product type, type of location, country of occurrence, and product and loss value in euros. It is also possible to add additional data to the report. In this paper, we use the stated loss, in Euros, in the database. If a report lacks one of the points we are analysing for, that report is considered incomplete and not included in the final analysis. This means that there are more reports in the TAPA IIS database for the included years than we are utilizing in this paper.

Typology road-related cargo theft

This paper uses the same definition for different road-related cargo theft that is used by TAPA IIS. For an incident to be qualified to be reported, the expected loss needs to be greater than 1000 Euro.

  • Hijacking - occasions, where force, violence or threats are used against a driver and the vehicle/goods, is stolen. Hijack includes a forced stop of a vehicle.

  • Robbery - occasions, where force, violence or threats are used against humans and the vehicle/goods, is stolen. Robbery does not include a forced stop of a vehicle.

  • Theft ofVehicle, Container or Trailer - where an unattended vehicle and/or Container and/or trailer are stolen with the load.

  • Theft fromContainer, Facility, Trailer, Train or Vehicles - thefts of load from stationary vehicles, containers, trains, trailers or from a facility. Theft from unattended delivery vehicles is included here.

  • Fraud - occasions, where intentional deceptions are used against humans and the vehicle/goods, is stolen.

  • Truck Theft - Theft of empty truck.

  • Clandestine - secretly added cargo to a shipment. This can be stowaway, illegal products etc.

Results

Table 1 and Fig. 1 describes the observed total incident value for all combinations of month and incident category in EMEA while Fig. 1 describes the total incident value for the different incident categories in EMEA. As one might have expected, there are large differences between months for many of the incident categories. Hence, a deeper analysis is needed.

Table 1 Total values (in thousands of EUR) for all combinations of month and incident category in EMEA
Fig. 1
figure 1

Total values (in thousands of EUR) for all combinations of month and incident category in EMEA

Table 2 and Fig. 2 displays the frequencies for all combinations of month and incident categories in EMEA. Clandestine, Hijacking, Theft from Container, Theft from Train, Theft of Container, and Theft of Trailer are not characterized by significant differences between months in incident frequency. Fraud is characterized by a significant monthly difference in incident frequency (χ2 = 25.7, p = 0.007), but post hoc analysis does not reveal any significant pairwise differences between months. Robbery is characterized by a significant monthly difference in incident frequency (χ2 = 31.1, p = 0.001). Post hoc analysis shows that the Robbery frequency is significantly lower in July than in October.

Table 2 Frequencies for all combinations of month and incident category in EMEA
Fig. 2
figure 2

Frequencies for all incident categories in EMEA

Theft is characterized by a significant monthly difference in incident frequency (χ2 = 467.9, p < 0.001). Post hoc analysis shows that the Theft frequency is significantly lower in July and August than in all other months but June, September, and December. Theft frequency is also significantly lower in June and September than in January, February, March, April, May, October, and November. In addition, Theft frequency is significantly lower in December than in January, February, March, and November. Furthermore, Theft frequency is significantly lower in April than in January, February, and March. Finally, Theft frequency is significantly lower in May, October, and November than in January and February.

Theft from Facility is characterized by a significant monthly difference in incident frequency (χ2 = 28.0, p = 0.008), but post hoc analysis does not reveal any significant pairwise differences between months. Theft from Trailer is characterized by a significant monthly difference in incident frequency (χ2 = 45.9, p < 0.001). Post hoc analysis shows that the Theft from Trailer frequency is significantly lower in June than in January, February, and October.

Theft from Vehicle is characterized by a significant monthly difference in incident frequency (χ2 = 642.3, p < 0.001). Post hoc analysis shows that the Theft from Vehicle frequency is significantly lower in May, June, July, and August than in all other months but April. In addition, the Theft from Vehicle frequency is significantly lower in March, April, September, and December than in January, February, and November. Finally, the Theft from Vehicle frequency is significantly lower in October than in January and November.

Theft of Vehicle is characterized by a significant monthly difference in incident frequency (χ2 = 159.7, p < 0.001). Post hoc analysis shows that the Theft of Vehicle frequency is significantly lower in June and July than in January, February, November, and December. In addition, the Theft of Vehicle frequency is significantly lower in April, May, and September than in November and December. Finally, the Theft of Vehicle frequency is significantly lower in March, August, and October than in December.

Truck Theft is characterized by a significant monthly difference in incident frequency (χ2 = 243.0, p < 0.001). Post hoc analysis shows that the Truck Theft frequency is significantly lower in November and December than in January, February, March, and June. In addition, the Truck Theft frequency is significantly lower in April, July, August, September, and October than in January, February, and March. Finally, the Truck Theft frequency is significantly lower in May and June than in January.

Table 3 and Fig. 3 describes the observed mean incident value for all combinations of month and incident category in EMEA while Fig. 3 describes the mean incident value for the different incident categories in EMEA. Clandestine, Hijacking, Robbery, Theft, Theft from Facility, Theft from Trailer, Theft from Train, Theft from Vehicle, Theft of Container, Theft of Trailer, Theft of Vehicle, and Truck Theft are not characterized by significant differences between months in mean incident value.

Table 3 Mean values (in thousands of EUR) for all combinations of month and incident category in EMEA
Fig. 3
figure 3

Mean incident values (in thousands of EUR) for the incident categories in EMEA

Fraud is characterized by a significant monthly difference in mean incident value (F = 3.0, p < 0.001). Post hoc analysis shows that the Fraud mean incident value in September is significantly higher than in all other months but October.

Theft from Container is characterized by a significant monthly difference in mean incident value (F = 2.4, p = 0.011). Post hoc analysis shows that the Theft from Container means incident value in August is significantly higher than in all other months but March, June, and July.

Table 4 and Fig. 4 describes the observed total incident value for all combinations of the day of the week and incident category in EMEA. As one might have expected, there are large differences between months for many of the incident categories. Hence, a deeper analysis is needed.

Table 4 Total values (in thousands of EUR) for all combinations of the day of the week and incident category in EMEA
Fig. 4
figure 4

Total values (in thousands of EUR) for all combinations of the day of the week and incident category in EMEA

In Table 5 and Fig. 5, the frequencies for all combinations of the day of the week and incident category in EMEA are displayed. Clandestine, Theft from Container, Theft from Train, Theft from Facility Theft of Container, Theft of Trailer, Theft of Vehicle, and Truck Theft are not characterized by significant differences between days of the week in incident frequency.

Table 5 Frequencies for all combinations of the day of the week and incident category in EMEA
Fig. 5
figure 5

Frequencies for all combinations of the day of the week and incident category in EMEA

Fraud is characterized by a significant day of the week difference in incident frequency (χ2 = 140.3, p < 0.001). Post hoc analysis shows that the Fraud frequency is significantly lower on Saturdays and Sundays than on all other days of the week.

Hijacking is characterized by a significant day of the week difference in incident frequency (χ2 = 39.4, p < 0.001). Post hoc analysis shows that the Hijacking frequency is significantly lower on Saturdays than on all other days of the week but Sundays, and significantly lower on Sundays than on all other days of the week but Fridays and Saturdays.

Robbery is characterized by a significant day of the week difference in incident frequency (χ2 = 34.5, p < 0.001). Post hoc analysis shows that the Robbery frequency is significantly lower on Saturdays than on all other days of the week but Sundays, and significantly lower on Sundays than on all other days of the week but Wednesdays and Saturdays.

Theft is characterized by a significant day of the week difference in incident frequency (χ2 = 397.6, p < 0.001). Post hoc analysis shows that the Theft frequency is significantly lower on Saturdays and Sundays than on all other days of the week.

Theft from Trailer is characterized by a significant day of the week difference in incident frequency (χ2 = 397.6, p < 0.001). Post hoc analysis shows that the Theft from Trailer frequency is significantly lower on Saturdays and Sundays than on all other days of the week.

Theft from Vehicle is characterized by a significant day of the week difference in incident frequency (χ2 = 2279.4, p < 0.001). Post hoc analysis shows that the Theft from Vehicle frequency is significantly lower on Saturdays and Sundays than on all other days of the week. In addition, the Theft from Vehicle frequency is significantly lower on Mondays and Fridays than on Tuesdays, Wednesdays, and Thursdays.

Table 6 and Fig. 6 shows the mean total incident value for all combinations of the day of the week and incident category in EMEA. Clandestine, Fraud, Hijacking, Robbery, Theft, Theft from Container, Theft from Facility, Theft from Trailer, Theft from Train, Theft of Container, Theft of Vehicle, and Truck Theft are not characterized by significant differences between months in mean incident value.

Table 6 Mean values (in thousands of EUR) for all combinations of the day of the week and incident category in EMEA
Fig. 6
figure 6

Mean values (in thousands of EUR) for all combinations of the day of the week and incident category in EMEA

Theft from Vehicle is characterized by a significant day of the week difference in mean incident value (F = 4.8, p < 0.001). Post hoc analysis shows that the Theft from Vehicle mean incident value on Sundays is significantly higher than on Mondays, Fridays, and Saturdays.

Theft of Trailer is characterized by a significant day of the week difference in mean incident value (F = 2.3, p = 0.033). Post hoc analysis shows that the Theft of Trailer mean incident value on Tuesdays is significantly higher than on Mondays and Saturdays.

The same types of Tables as 1, 2, 3, 4, 5,  and 6, but for APAC and Americas, can be found in the Appendix. In a descriptive perspective, the patterns regarding annual and weekly seasonality are similar, however, because of the much smaller sample sizes for these two areas than for EMEA, the only statistically significant difference is that Hijacking in the Americas is characterized by a significant day of the week difference in incident frequency (χ2 = 24.1, p = 0.012). Post hoc analysis, in this case, shows that the Hijacking frequency in the Americas is significantly lower on Saturdays than on Mondays, Wednesdays and Fridays.

Discussion

The analysis regarding annual seasonality is challenging as the exogenous causes of the seasonality of crime is linked to averaged temperature in any given month, while the regions EMEA, APAC and Americas all include countries in both the northern and the southern hemisphere. Nevertheless, the vast majority of reported incidents, especially in the EMEA, took place in the northern hemisphere. Furthermore, due to that small sample sizes for both the regions APAC and Americas, the statistical effects were too small to yield statistically significant results. The only exception is Hijacks in the Americas, which seems to be fewer on Saturdays and a little more common on Mondays, Wednesdays and Fridays (see Appendix Table 17). But it is important to point out the low overall number of incidents in general for both the region Americas and Asia–Pacific. This leads to that the discussion is mainly based on the TAPA EMEA IIS content.

The overall conclusion is that there are seasonal variations of incident categories. This variation is found both between months of the year and between days of the week for many of the incident categories, but the patterns are different for different incident categories. In terms of seasonality on the month of the year based on frequency (see Table 2), there are a few incident categories that show seasonality, in terms of statistical significance. Interestingly, the patterns vary among incident categories.

Many patterns were not statistically significant but interesting from a more descriptive viewpoint. Within this understanding, there are many changes in hot spots, modus operandi, theft endangered objects and handling methods during the time, but the basic theoretical frame of reference is still more or less the same. On overall understanding of the seasonality for time of week indicates that certain potential perpetrators are more prone to change when that attack takes place then how and what they what to steal. The reasoning from the perpetrators’ point-of-view is simple. The black-market demand tells them what to steal and the three elements of crime tells how. Also, in accordance with RAT, any changes in the normal movement/routines of the targets (cargo carriers and facilities) will be reflected into the theft opportunity. Therefore, it is also possible that the seasonal variation in need of transports (Roso and Lumsden 2009) together with the weekly rhythm of the perpetrators affects the theft pattern.

A look at Table 3 (mean value and month of year, EMEA) leads to the conclusion that some incident categories inflict more losses per incident than other categories. Hijacking, Robbery, Theft from Facilities, Theft of Container and Theft of Trailer, all have large losses per incident. Within that understanding, violent MOs like Hijacking and Robbery leads to greater value lost per incident. This is in line with other studies (Ekwall and Lantz 2018). In terms of seasonality for the time of year, the data in Table 2 do not support the common idea that violent crimes can be expected to be more common during the warmer season. On the contrary, there is a general summer reduction in the total number of incidents for most categories. Based on this data, we speculate that, as the low point is closely related to the vacation period in Europe that either the thieves and/or the buyers of the stolen products focus on something else during these months.

Seasonal variations in the frequency of incidents during the week (Table 6) show a similar pattern for most incident categories. It seems to be a question of working day duties as most of the different categories have a frequency drop during the weekend. The drops for incident categories Theft from Vehicle, Theft from Trailer, Hijacking, Robbery and Fraud are all large. Three of these categories, namely Hijacking, Robbery and Fraud, require normal working activities to be able to commit. Both Hijacking and Robbery need personnel to threaten with violence and there are more people available for these activities during a normal working day than during the weekend. The same reasoning is valid for Fraud as they also require the deception (not violence) of normal personnel. Comparisons with the mean value for these categories (Hijacking, Fraud and Robbery) do not give the same picture. This may depend on the lower number of available targets leads to that the perpetrators are better prepared and thereby have the possibility of attacking larger shipments and stealing a higher value during weekends than during a normal working day. Both these conclusions around seasonal variations weekly for Hijacking, Fraud and Robbery fall back on the RAT from criminology.

The analysis of TAPA IIS statistics concerning seasonality in different incident categories indicates that there is such seasonality and that different categories have somewhat different seasonality’s both over the year and over the week. This study can’t make any deeper conclusion than that the different perpetrators ability to utilize the different crime opportunities together with seasonality demand for stolen products is the key issue. The theft opportunity depends on the perpetrator’s ability to use the routines of the target in combination with the lack of security at a certain location (Ekwall 2010). This signals that the different risk factors for cargo theft (Liang et al. 2022), needs to be seen together as different perspectives while analysis certain theft patterns based on cargo type, location, types, geographical region, mode of transport and security level which together makes up the theft opportunity.

One likely conclusion is that the different decision process outcomes from different perpetrators lead to a perpetrator having a favour time/place/method combination for cargo theft. According to Kroneberg et al. (2010) do actors often “stick to a particular action alternative in an automatic-spontaneous mode of decision making, which leaves aside other alternatives and incentives”. Thus, criminal behaviour both can be easy to predict (repeating earlier behaviour regardless of incentives or security efforts) and at the same time very dynamic due to the bounded rationality of the perpetrator (Ekwall 2012).

Conclusion

We can conclude that both research hypotheses were supported. Firstly, there are seasonality patterns in incident types for the time of year in cargo theft. The yearly seasonality is mainly demonstrated as a reduction of crimes during the late spring and summer. This may depend on a reduction in the number of available targets from a perpetrator point of view. The primary annual seasonal effect for incident types in cargo theft seems, in general, to be a reduction of attacks during the summer months, while the mean value per incident says about the same throughout the year. Thus, the change in total value is linked more to theft occurrences than to lost values, as about the same mean value, in the same incident category, do not vary significantly.

Secondly, there are seasonality patterns in incident types for the time of the week in cargo theft. The weekly seasonality is demonstrated as a reduction of crimes during the weekend. This may depend on a reduction in the number of available targets from a perpetrator point-of-view or that some of the incident categories are not discovered directly when the crime is committed but is detected at the start of a new work week, normally a Monday or in some cases a Sunday. The lack of reliable time of day in the TAPA IIS database means that there is no solid answer here. The incident types Hijacking, Robbery and Fraud do all require a person to either threaten or foul, which may lead to these types of incidents having working day seasonality. Furthermore, this would also lead to that the data about these incidents are more reliable than for other incidents. For the incident types Hijacking and Robbery, the idea of the weakest link work here as if the physical security is considered too good, from the perpetrators point-of-view, violence towards the personal becomes an alternative solution to bypass security efforts (Ekwall and Lantz 2018).

The differences in the mean value for an attack for different incident categories may indicate that crime often reflects the risk, effort, and payoff as assessed by the perpetrator (Clarke 1995). A perpetrator acts according to RAT, seeking to maximize his utility concerning a particular time and available resources (Bodman, and Maultby 1997). This may lead to the understanding that different theft opportunities are repeated or re-created on a regular basis. This may very well depend on the endeavour for predictability and routines, from the supply chain operational actors, which then can be utilized as a repeating theft opportunity by a potential perpetrator. This follows the logic of the weakest link (cf. Jażdżewska-Gutta and Borkowski 2022) and the understanding of risk factors (Liang et al. 2022). In terms of practical implications, it is important that stakeholders understand how their decisions and actions affects the different theft opportunities thru alterations of the risk factors. For instance, decisions leading up to longer waiting time for trucks before delivery, increases the time window for a theft opportunity (cf. TT Club 2022). Thus, perpetrators may specialisation in a certain incident type (combination of the target, modus operandi and time/place) to maximize their effort. Incident types like Hijacking and Robbery are normally linked to higher attention from authorities (higher conviction risk) as well as a more severe punishment, if convicted. This leads to that the profit for each attack needs to be higher to cover the crime risk/cost viewed from the perpetrator’s perspective (Tables 2 and 5). The data in the TAPA IIS database needs to be further analysed to provide a better understanding of the potential effects from perpetrators’ specialisation on specific incident types (including MOs), cargo types and geographical locations.

Implications for research

Following the understanding of the impact on business from cargo theft, globally, this paper adds to the body on knowledge about the problem by analysing seasonality in incident types. More research is needed, using different method and data sources (Liang et al. 2022), to better understand the research gaps. Furthermore, the analysis of cargo theft needs to be framed within the needs and demands from the actors in and context of the regular supply chain including the global freight system as well as the international regulatory frame for each actor’s liability in a specific incident. Hence, cargo theft can be described as a root cause for Supply Chain Disruption (cf. Ekwall and Lantz 2018).

Implications for practitioners

The practical understanding to RAT is that routines in SCM and transport chains also comes with a downside. The obvious upside is stressed in any regular textbook about logistics and SCM. Simply put, routines provide predictability, but this predictability can be utilized by cargo thieves. As stressed by TT Club (2022), insiders are becoming an increasing source of theft. Because they know the routines and procedures in place, they are well equipped to utilize theft opportunities. However, as this paper explores seasonality patterns on an aggregated level, it may look like the predictability of the movement of goods is better than it actually is.

The six major risk factors in cargo theft (Liang et al. 2022), all together stresses the understanding to what contributes to theft opportunities. The knowledge that perpetrators may specialize in a certain method of theft to maximize their results could aid the development of managerial approaches to security. Furthermore, a better understanding for black market demand for certain products (cf. Ekwall 2009; Ekwall and Kovacs 2021) also would guide the security professionals what to protect better.