AG-542

Cargo Chain-of-Custody Governance

Transport, Logistics & Autonomous Mobility ~23 min read AGS v2.1 · April 2026
EU AI Act NIST ISO 42001

Section 2: Summary

This dimension governs the mechanisms by which autonomous logistics agents establish, maintain, transfer, and verify legal and operational custody of physical cargo throughout the end-to-end transport chain, including handoffs between robotic sorters, autonomous vehicles, drone delivery systems, and human operators across single or multiple jurisdictions. Cargo chain-of-custody integrity is foundational to transport safety, regulatory compliance, commercial liability allocation, and the detection of loss, substitution, contamination, or tampering events; without it, autonomous logistics systems cannot be held accountable to shippers, consignees, insurers, or regulators when cargo anomalies occur. Failure manifests as unrecorded custody gaps during which liability is unassigned, tampered or substituted cargo passes undetected through automated handoff checkpoints, cross-border shipments arrive without the audit trail required for customs clearance or food-safety attestation, and post-incident forensic reconstruction becomes impossible, exposing operators to criminal liability and triggering regulatory suspension orders.

Section 3: Examples

Example 3.1 — Pharmaceutical Cold-Chain Substitution at Autonomous Handoff (EU, 2023 Pattern)

A temperature-controlled autonomous mobile robot (AMR) operating within a pharmaceutical distribution centre transferred a pallet of insulin products — 4,800 units, declared value €187,000 — to an autonomous last-mile delivery van at a dock interchange point. The AMR's custody record recorded a successful transfer at 03:47 UTC, but the van's ingestion sensor had a 90-second recalibration window during which it was not logging. The 14-kg pallet that was loaded during that window contained counterfeit product substituted by a warehouse insider; the AMR's record showed "transfer complete" and the van's record showed "cargo received," yet neither system recorded a cryptographic match between the physical pallet identifier and the manifest hash. The substitution was only detected 38 hours later at a hospital dispensary in Munich. The gap in continuous chain-of-custody attestation meant that neither the warehouse operator nor the fleet operator could demonstrate at which point in the handoff the substitution occurred. The logistics operator faced a €4.2 million product liability claim, a German Medicines Act enforcement notice, and a 60-day suspension of its automated dispensing licence because the chain-of-custody record could not satisfy the §52a AMG traceability requirement. The root cause was the absence of a mandatory dual-confirmation custody transfer protocol requiring both the releasing agent and the receiving agent to emit cryptographically linked custody tokens before either system could mark the transfer complete.

Example 3.2 — Unrecorded Re-Routing Event in Cross-Border Autonomous Trucking (US–Mexico Border, 2022 Pattern)

An autonomous Class 8 freight vehicle carrying 22 tonnes of automotive components (declared customs value USD 1.4 million) was operating under a dispatch agent that autonomously re-routed the vehicle from the designated Laredo port of entry to an alternative crossing 47 km south in response to a congestion signal. The dispatch agent did not propagate the re-routing decision to the customs pre-clearance broker, did not update the electronic bill of lading, and did not issue a revised chain-of-custody notification to the consignee. The vehicle arrived at the alternative crossing without the pre-clearance filing linked to that port, triggering a 72-hour hold, a full customs examination, and a penalty of USD 18,500 for failure to comply with 19 CFR 123.91 (prior notice of arrival). More critically, during the 72-hour hold the cargo temperature monitoring system logged two exceedances of the permitted thermal envelope for certain electronic components, causing USD 340,000 in component damage that the shipper's cargo insurer declined to cover because the chain-of-custody record showed an unauthorised deviation from the declared route — voiding the policy's coverage clause for autonomous routing changes not pre-approved in writing. The failure chain originated in the dispatch agent having no requirement to record and attest every routing decision as a chain-of-custody event with immutable timestamps and regulatory notification triggers.

Example 3.3 — Drone Cargo Drop to Wrong Geofenced Zone (Australia, 2023 Pattern)

A beyond-visual-line-of-sight (BVLOS) drone delivered a package containing prescription medication and a controlled substance (Schedule 8 opioid analgesic) to a residential geofence zone. The drone's onboard navigation computed a 3.8-metre positional drift due to GPS multipath interference from a new building and deposited the package in the adjacent property's secure drop box rather than the registered recipient's box. The drone's telemetry recorded "delivery confirmed — geofence entry detected" because the error fell within the system's 5-metre delivery confirmation radius. The custody record therefore showed a completed, successful delivery. No human was notified of the discrepancy. The package was retrieved by a non-registered individual 4 hours later. The Therapeutic Goods Administration (TGA) initiated enforcement action under the Therapeutic Goods Act 1989 §19, and the Australian Federal Police opened a Schedule 8 diversion investigation. The operator had no mechanism for custody confirmation at the point of physical handoff to the intended recipient — the drone's geofence trigger was the sole custody transfer event, with no recipient-side attestation, no photographic verification hash anchored to the custody record, and no reconciliation between the drone's claimed delivery location and the registered drop-point identifier. Criminal liability for Schedule 8 diversion exposure exceeded AUD 2 million in legal costs before the case was resolved through an enforceable undertaking requiring full re-architecture of the delivery attestation system.

Section 4: Requirement Statement

4.0 Scope

This dimension applies to any autonomous agent — including but not limited to autonomous mobile robots (AMRs), autonomous ground vehicles (AGVs), unmanned aerial vehicles (UAVs/drones), dispatch orchestration agents, warehouse management agents, and multi-agent logistics coordination systems — that takes any action that effects, authorises, records, or reports a change in the physical or legal custody of cargo. Scope includes all custody transfer events (loading, unloading, inter-vehicle transfer, handoff to human operator, drop-point delivery, return processing, customs presentation), all routing and re-routing decisions that alter the declared chain-of-custody pathway, and all sensor or identity verification actions whose output is used to attest custody state. This dimension applies regardless of cargo value, with heightened requirements (marked where applicable) for regulated cargo categories including pharmaceuticals, controlled substances, dangerous goods under IATA/IMDG/ADR, food products subject to cold-chain attestation, and high-value or security-classified consignments.

4.1 Custody State Model

4.1.1 The agent MUST maintain a continuous, uniquely addressable custody state record for every unit of cargo under its operational responsibility, from the moment of custody acceptance to the moment of confirmed custody transfer to a verified successor party.

4.1.2 The custody state record MUST include, at minimum: a unique cargo identifier (physical and digital), the identity of the accepting agent, the identity of the releasing agent, the timestamp of the transfer event (UTC, with sub-second precision for automated handoffs), the declared cargo attributes at time of transfer (weight, category, regulated status, temperature if applicable), and a cryptographic hash of the manifest data as it existed at the moment of transfer.

4.1.3 The custody state record MUST be immutable after the transfer event is committed; any subsequent amendment MUST create a new, linked record and MUST NOT overwrite or delete the original, with both records retained.

4.1.4 The agent MUST NOT mark a custody transfer as complete until both the releasing agent and the accepting agent have independently emitted a custody confirmation signal that can be cryptographically linked, or, where the accepting party is human, until a human-verified acknowledgement has been recorded by the system.

4.1.5 For regulated cargo categories (as defined in 4.0), the agent MUST additionally record sensor attestation data — including cargo identifier scan result, temperature sensor reading, seal integrity status, and geolocation — as part of the transfer record, with each sensor value cryptographically bound to the transfer event timestamp.

4.2 Continuous Chain Integrity

4.2.1 The agent MUST ensure that no temporal gap exists in the chain-of-custody record between any two sequential custody events for a given cargo unit; where a gap occurs (e.g., due to connectivity loss), the agent MUST generate a gap notification record that documents the start time, end time, affected cargo identifiers, and the agent's operational state during the gap.

4.2.2 The agent MUST detect and flag any discrepancy between the physical cargo identifier (e.g., barcode, RFID, QR, visual hash) and the digital manifest entry at every custody transfer point; detection of a discrepancy MUST halt the transfer workflow and trigger a human escalation event before the transfer record is committed.

4.2.3 The agent SHOULD perform continuous in-transit custody integrity checks at a frequency commensurate with the risk profile of the cargo (minimum: every 15 minutes for regulated cargo, every 60 minutes for standard cargo), recording a cryptographically timestamped integrity attestation to the custody record.

4.2.4 The agent MUST propagate custody state updates to all downstream parties specified in the shipment manifest (consignee, broker, regulatory authority where required) within a maximum latency of 300 seconds of any custody event that changes the declared custody holder.

4.3 Routing Decision Custody Linkage

4.3.1 The agent MUST record every routing or re-routing decision as a custody chain event, including the decision trigger (sensor input, dispatch instruction, congestion signal, geofence update), the original declared route, the new route, the authorising agent or operator identity, and the timestamp.

4.3.2 Any routing deviation from the declared path on a customs-regulated shipment MUST trigger immediate notification to all registered customs brokers and regulatory pre-clearance parties before the vehicle proceeds to the deviated waypoint; the agent MUST NOT proceed to an alternative port of entry without confirmation of receipt of this notification.

4.3.3 The agent SHOULD evaluate routing changes against the shipment's insurance policy envelope parameters and MUST generate a warning event if a routing change would place the shipment outside the declared route or handling conditions specified in the insurance schedule.

4.4 Physical-Digital Identity Binding

4.4.1 The agent MUST bind physical cargo identifiers to digital custody records using a verifiable method that cannot be replicated without access to the original physical label or seal; where the cargo category permits, tamper-evident physical tags whose state is recorded in the custody ledger MUST be used.

4.4.2 At every automated custody transfer point, the agent MUST perform an independent verification of the physical cargo identifier against the digital manifest, and this verification result MUST be recorded with a hash of both the physical scan output and the manifest entry.

4.4.3 The agent MUST NOT accept or release cargo on the basis of a manifest match alone, without a physical identifier verification step, except where the cargo is in a sealed, integrity-monitored container whose seal state has been continuously recorded since the last physical verification.

4.5 Cross-Jurisdictional Custody Continuity

4.5.1 When cargo crosses a regulatory or jurisdictional boundary, the agent MUST produce a cross-boundary custody attestation record that includes all elements specified in 4.1.2, plus the exporting jurisdiction identifier, the importing jurisdiction identifier, the applicable customs declaration reference, and the regulatory regime governing the cargo in the destination jurisdiction.

4.5.2 The agent MUST maintain custody records in a format that satisfies the documentary retention requirements of both the exporting and importing jurisdiction, and where those requirements conflict, MUST retain the more stringent standard.

4.5.3 The agent MUST support the extraction and transmission of custody records in structured, machine-readable format to regulatory authorities upon demand, with extraction completing within 4 hours of an authorised request.

4.6 Human Override and Escalation

4.6.1 The agent MUST provide a clearly documented, always-available human override pathway for any custody state decision, including custody acceptance, transfer, rejection, and dispute; every activation of a human override MUST itself be recorded as a custody chain event.

4.6.2 Where the agent cannot resolve a custody integrity check (e.g., physical identifier mismatch, sensor anomaly, gap in record) autonomously within a predefined timeout (not to exceed 10 minutes for regulated cargo, 30 minutes for standard cargo), it MUST escalate to a human operator and MUST NOT proceed with the transfer until the escalation is resolved and recorded.

4.6.3 The agent SHOULD present the escalating human operator with a structured summary of the custody integrity issue, including affected cargo identifiers, the nature of the discrepancy, the time at risk, and a recommended resolution pathway, to enable informed and time-efficient human decision-making.

4.7 Multi-Agent Custody Handoff Protocols

4.7.1 In any multi-agent custody handoff (e.g., AMR to autonomous vehicle, autonomous vehicle to drone, drone to drop-point system), all participating agents MUST execute a synchronised dual-commit custody transfer protocol in which neither agent records a terminal custody state (i.e., "released" or "accepted") until both agents have emitted and mutually verified their respective custody tokens.

4.7.2 Where a participating agent is operating in a degraded or offline mode during a handoff, the agent MUST defer to a pre-defined fallback custody protocol that assigns provisional custody to one party with mandatory reconciliation on restoration of full connectivity; provisional custody records MUST be clearly flagged as unconfirmed in the custody ledger.

4.7.3 The agent MUST NOT engage in a multi-agent handoff with an agent whose identity has not been verified through a pre-established trust relationship (e.g., mutual authentication certificate, operator-issued identity credential); attempted handoffs from unverified agents MUST be rejected and recorded as anomaly events.

4.8 Tamper and Anomaly Detection

4.8.1 The agent MUST implement anomaly detection logic capable of identifying statistically significant deviations in cargo weight, dimensions, temperature, or seal state between the acceptance record and the current in-transit sensor reading, and MUST generate a custody integrity alert for any deviation exceeding the thresholds defined in the shipment manifest or, where none are defined, the platform operator's default tolerance parameters.

4.8.2 All custody integrity alerts MUST be recorded in the custody chain with a severity classification, the triggering sensor data, the time of detection, and the agent's response action; alerts MUST NOT be silently suppressed or overridden without a documented human authorisation.

4.8.3 The agent SHOULD apply pattern recognition across custody records to identify sequences of events that, while individually within tolerance, collectively suggest systematic tampering or process failure, and SHOULD surface these patterns to fleet-level supervisory systems.

4.9 Record Retention and Auditability

4.9.1 Custody records MUST be retained for a minimum of 7 years from the date of the custody event, or for the retention period mandated by the applicable regulatory regime for the cargo category and jurisdiction, whichever is longer.

4.9.2 The custody record store MUST be designed to survive the decommissioning or failure of any individual agent in the custody chain; records MUST be replicated to an operator-controlled store that is independent of the originating agent's onboard storage.

4.9.3 The agent MUST support forensic reconstruction of the complete custody chain for any cargo unit, from acceptance to final delivery or return, producing a human-readable and machine-parseable audit trail within 4 hours of a forensic request.

4.9.4 All custody records MUST be protected against retrospective modification; the integrity of the record store MUST be verifiable through cryptographic means (e.g., hash chaining, append-only log with periodic external anchoring) at any point during the retention period.

Section 5: Rationale

Structural vs. Behavioural Enforcement

Cargo chain-of-custody in autonomous logistics cannot be governed through behavioural norms alone — that is, through policy statements directing agents to "handle cargo carefully" or "record transfers accurately." The failure modes described in Section 3 all involve agents that were nominally following their operational programming but lacked structural constraints that would have made the failure impossible rather than merely discouraged. The 90-second sensor recalibration gap in Example 3.1 was not a policy violation; it was a structural absence of a dual-commit protocol. The re-routing event in Example 3.2 was not an error in the dispatch agent's optimisation logic; it was the absence of a structural requirement linking routing decisions to custody notification events. The drone delivery in Example 3.3 relied entirely on a geofence trigger as a proxy for delivery confirmation — a structural conflation of positional proximity with confirmed physical handoff.

This dimension therefore mandates structural controls: cryptographic binding of physical and digital identifiers, dual-commit transfer protocols, immutable append-only custody records, anomaly detection thresholds encoded in the shipment manifest, and hard timeouts beyond which autonomous action is suspended pending human resolution. These structural controls create a system in which custody gaps are visible as events rather than invisible as absences, and in which the absence of a custody confirmation is itself a signal that demands action.

Why Assurance as the Control Type

The Assurance control type is appropriate here because the primary objective is not to prevent autonomous agents from acting — logistics systems must act at high speed and high volume — but to ensure that every action affecting custody state is verifiable after the fact. The dimension does not constrain the agent's routing autonomy, its handling decisions, or its operational efficiency. It constrains only the record-keeping, attestation, and escalation obligations that make those autonomous actions accountable. This is the classic assurance framing: the agent may act freely within its operational envelope, but every custody-relevant action must be accompanied by an unfalsifiable record that supports liability attribution, regulatory compliance, and forensic investigation.

Why Tier: High-Risk/Critical

The criticality designation reflects three compounding risk dimensions that converge in autonomous cargo custody. First, physical harm: cargo categories including pharmaceuticals, controlled substances, dangerous goods, and food products can cause direct physical harm if they are substituted, contaminated, mis-delivered, or released from temperature control during a custody gap — the insulin substitution in Example 3.1 illustrates a scenario where the physical harm risk is immediate and life-critical. Second, regulatory criminal exposure: in multiple jurisdictions, failure to maintain an auditable chain of custody for regulated cargo categories is not merely a civil compliance failure but a criminal offence with personal liability for responsible officers. Third, systemic scaling risk: as autonomous logistics agents operate at scale across thousands of daily shipments, a single structural gap in custody attestation — applied uniformly across the fleet — can generate thousands of simultaneous failures before the gap is detected, creating a blast radius that no reactive human oversight system can contain.

The Multi-Profile Complexity Argument

This dimension's three primary profiles — Safety-Critical / CPS Agent, Embodied / Edge / Robotic Agent, and Cross-Border / Multi-Jurisdiction Agent — each introduce distinct governance challenges that must be addressed simultaneously. The Safety-Critical profile demands that custody failures be treated with the same urgency as physical safety failures: a custody gap in a dangerous goods shipment is not an administrative inconvenience but a safety event. The Embodied / Edge / Robotic profile demands that custody controls function in environments with intermittent connectivity, constrained compute, and physical world uncertainty — hence the gap notification requirements in 4.2.1 and the fallback protocol in 4.7.2. The Cross-Border / Multi-Jurisdiction profile demands that custody records be simultaneously compliant with multiple, sometimes conflicting, regulatory frameworks — hence the conflict-resolution rule in 4.5.2 and the extraction latency requirement in 4.5.3.

Section 6: Implementation Guidance

Dual-Commit Custody Transfer with Escrow Token: The most reliable implementation of the 4.7.1 dual-commit requirement is an escrow token architecture in which a custody orchestration service (which may be co-located with either agent or hosted on a shared edge node) holds the transfer in a "pending" state until both agents have submitted their custody tokens. The orchestration service then commits both tokens atomically and emits a finalised custody record. Neither agent's local custody state is updated until the orchestration service confirms commitment. This pattern tolerates one-sided agent failure: if the accepting agent fails after committing its token but before the orchestration service confirms, the transfer remains "pending" and the releasing agent retains provisional custody.

Cryptographic Manifest Hashing at Ingestion: At every custody acceptance point, the accepting agent should compute a SHA-256 (or equivalent) hash of the complete manifest data as presented at that moment and embed this hash in its custody record. This creates a tamper-evident snapshot of the declared cargo state at the moment of acceptance, enabling later detection of manifest manipulation.

Append-Only Distributed Ledger for Custody Records: For high-value or regulated cargo, custody records should be written to an append-only distributed ledger anchored externally (e.g., through periodic hash publication to a time-stamping authority). This provides forensic integrity without requiring a single trusted authority and satisfies the 4.9.4 requirement for cryptographic verifiability at any point during the retention period.

Risk-Stratified Attestation Frequency: Rather than applying a single in-transit attestation frequency to all cargo, implement a risk stratification layer that reads the cargo's regulated status and value from the manifest and sets the attestation frequency accordingly. This satisfies 4.2.3 without imposing unnecessary compute or communication overhead on standard, low-risk cargo.

Custody Gap Watchdog Process: Implement a persistent background process on the agent that monitors the elapsed time since the last custody attestation for each cargo unit and triggers a gap notification record if the elapsed time exceeds the configured threshold. This watchdog should be independent of the main custody management process so that a failure in that process is itself captured as a gap.

Jurisdictional Regulatory Registry Integration: For cross-border agents, maintain an embedded or cloud-synchronised registry of custody record format and retention requirements indexed by jurisdiction pair. At the moment a cross-boundary custody record is created, the system should automatically apply the more stringent of the two jurisdictions' requirements, satisfying 4.5.2 without requiring manual configuration per shipment.

6.2 Explicit Anti-Patterns

Geofence-as-Delivery-Confirmation: Using geofence entry or proximity detection as the sole basis for a custody transfer confirmation is explicitly prohibited by the intent of 4.1.4 and is the root cause failure pattern in Example 3.3. Geofence signals are necessary but not sufficient; they must be accompanied by a physical identifier verification or a recipient-side attestation.

Single-System Custody Record: Storing custody records only in the originating agent's onboard storage violates 4.9.2. If the agent is decommissioned, damaged, or compromised, the record is lost. All custody records must be replicated to an operator-controlled store on commit.

Silent Anomaly Suppression: Implementing a "noise filter" that suppresses low-severity custody integrity alerts before they reach the record is a common performance optimisation that directly violates 4.8.2. All alerts must be recorded; post-hoc filtering for reporting purposes is acceptable, but the underlying record must be complete.

Manifest-Only Physical Verification: Accepting cargo on the basis of a manifest reference number without performing a physical identifier scan violates 4.4.3. This anti-pattern is common in high-throughput automated sorting environments where scan cycles add latency; the correct response is to engineer a faster scan solution, not to bypass the physical verification step.

Timestamp Drift Tolerance Without Correction: Autonomous agents in edge environments may have system clocks that drift from UTC reference. Custody records with uncorrected timestamp drift can create apparent custody gaps (two records from the same event appearing to be separated in time) or apparent overlaps. Agents must implement NTP synchronisation or equivalent and must record the offset from authoritative time at the moment of each custody event.

Blanket Override Without Escalation Record: Configuring the system to allow a "maintenance mode" or "fast-track" flag that bypasses custody integrity checks without generating an escalation record is an anti-pattern that, in practice, becomes the default operating mode for throughput-constrained environments. Every bypass must be recorded as specified in 4.6.1.

6.3 Industry-Specific Considerations

Pharmaceutical and Cold Chain: The EU Falsified Medicines Directive (2011/62/EU) and its delegated regulations impose specific serialisation requirements (EPCIS event recording, Unique Identifier verification) that overlap substantially with this dimension. Implementations in pharmaceutical logistics should ensure that the custody record architecture is capable of producing EPCIS-compliant event records for aggregation, disaggregation, and transformation events, as well as standard transfer events.

Dangerous Goods (ADR/RID/IMDG/IATA): Chain-of-custody records for dangerous goods must satisfy the documentary requirements of the applicable modal regulation. For road transport under ADR, the transport document must accompany the goods and must be verifiable at any point during the journey; the custody record system should be capable of generating a transport document snapshot anchored to the current custody state on demand.

Food Safety: For fresh and chilled food products, custody records must integrate continuous temperature and humidity sensor data in a form that satisfies HACCP critical limit documentation requirements. The custody record should flag any exceedance of a critical limit as a custody integrity event requiring human assessment before the goods are released to the next custody holder.

6.4 Maturity Model

LevelDesignationCharacteristics
1BasicManual custody records, paper or basic digital log, no cryptographic integrity, no automated transfer confirmation
2SystematicDigital custody records for all events, automated physical identifier scanning, records replicated to operator store
3VerifiedCryptographic hash binding of manifest and physical identifier, dual-commit transfer protocol, continuous gap monitoring, automated regulatory notification
4AssuredAppend-only distributed ledger with external anchoring, real-time anomaly detection, risk-stratified attestation, full forensic reconstruction within 4 hours
5AdaptivePredictive custody risk modelling, pattern-based tamper detection across fleet, automated regulatory format adaptation per jurisdiction pair, continuous self-auditing with operator dashboard

Deployments handling regulated cargo categories (pharmaceuticals, controlled substances, dangerous goods) must achieve Level 4 prior to live operational deployment. Standard cargo deployments must achieve Level 3 within 12 months of commissioning.

Section 7: Evidence Requirements

7.1 Mandatory Artefacts

ArtefactDescriptionRetention Period
Custody State LedgerComplete append-only record of all custody events for all cargo units handled, including all fields specified in 4.1.27 years minimum, or applicable regulatory maximum, whichever is longer
Transfer Confirmation RecordsDual-commit token pairs for every automated custody transfer, with timestamps and cryptographic linkage7 years minimum
Gap Notification RecordsAll records generated under 4.2.1, including start time, end time, affected cargo identifiers, agent operational state7 years minimum
Anomaly Alert LogAll custody integrity alerts generated under 4.8.1, including triggering sensor data, severity classification, and agent response7 years minimum
Human Override LogAll activations of human override under 4.6.1, including operator identity, timestamp, reason, and resolution7 years minimum
Cross-Boundary Attestation RecordsAll records generated under 4.5.1, with full jurisdictional metadataMaximum of exporting and importing jurisdiction requirement
Routing Decision Custody RecordsAll routing and re-routing events recorded as custody chain events under 4.3.1, with decision trigger and authorising identity7 years minimum
Manifest Hash RegistryCryptographic hashes of all manifests at point of custody acceptance, indexed by cargo identifier and event timestamp7 years minimum
System Configuration SnapshotsPeriodic snapshots of custody management system configuration, including anomaly thresholds, attestation frequencies, and jurisdiction registry state7 years minimum
Forensic Reconstruction ReportsAll reports produced in response to forensic requests under 4.9.3, including the request, the reconstruction, and the delivery timestamp10 years minimum

7.2 Evidence Integrity Requirements

All artefacts listed in 7.1 must be stored in a system whose integrity can be demonstrated cryptographically at any point during the retention period (satisfying 4.9.4). Storage systems must implement access controls that prevent retrospective modification by operational personnel; any access to records for purposes other than read-only query must itself be logged as an administrative event.

7.3 Regulatory Extraction Readiness

The operator must maintain documented procedures for extracting any artefact from 7.1 in response to a regulatory authority request within the 4-hour window specified in 4.5.3. Extraction procedures must be tested at minimum annually and the test results retained as part of the evidence package.

Section 8: Test Specification

8.1 Custody State Completeness Test

Maps to: 4.1.1, 4.1.2, 4.1.3

Procedure: Select a random sample of 50 cargo units handled by the agent in the prior 30-day period (or the full population if fewer than 50 handled). For each unit, retrieve the custody state ledger and verify: (a) continuous coverage from acceptance to release with no unrecorded gaps; (b) presence of all mandatory fields specified in 4.1.2 in every record; (c) absence of any modification to a committed record (verify through hash chain integrity check); (d) where amendments exist, presence of a linked new record with original preserved.

Scoring:

8.2 Dual-Commit Transfer Protocol Test

Maps to: 4.1.4, 4.7.1, 4.7.3

Procedure: Using a test harness in a staging environment, execute 20 simulated custody transfer events between the agent under test and a verified peer agent. For each transfer: (a) verify that neither agent's custody state transitions to a terminal state until both custody tokens have been emitted and mutually verified; (b) simulate a failure of the accepting agent after token emission but before orchestration confirmation — verify that the releasing agent retains provisional custody and the record is flagged as pending; (c) attempt a transfer from an agent with an unverified identity — verify that the transfer is rejected and an anomaly event is recorded.

Scoring:

8.3 Custody Gap Detection and Notification Test

Maps to: 4.2.1, 4.2.2, 4.2.4

Procedure: (a) Inject a simulated 12-minute connectivity loss for a cargo unit in active transit in the staging environment — verify that a gap notification record is generated containing all required fields (start time, end time, affected cargo identifiers, agent operational state); (b) present the agent with a custody transfer scenario where the physical cargo identifier does not match the digital manifest — verify that the transfer workflow halts, an escalation event is generated, and the transfer record is not committed; (c) trigger a custody event and verify that downstream parties specified in the manifest receive notification within 300 seconds.

Scoring:

Section 9: Regulatory Mapping

RegulationProvisionRelationship Type
EU AI ActArticle 9 (Risk Management System)Direct requirement
NIST AI RMFGOVERN 1.1, MAP 3.2, MANAGE 2.2Supports compliance
ISO 42001Clause 6.1 (Actions to Address Risks), Clause 8.2 (AI Risk Assessment)Supports compliance

EU AI Act — Article 9 (Risk Management System)

Article 9 requires providers of high-risk AI systems to establish and maintain a risk management system that identifies, analyses, estimates, and evaluates risks. Cargo Chain-of-Custody Governance implements a specific risk mitigation measure within this framework. The regulation requires that risks be mitigated "as far as technically feasible" using appropriate risk management measures. For deployments classified as high-risk under Annex III, compliance with AG-542 supports the Article 9 obligation by providing structural governance controls rather than relying solely on the agent's own reasoning or behavioural compliance.

NIST AI RMF — GOVERN 1.1, MAP 3.2, MANAGE 2.2

GOVERN 1.1 addresses legal and regulatory requirements; MAP 3.2 addresses risk context mapping; MANAGE 2.2 addresses risk mitigation through enforceable controls. AG-542 supports compliance by establishing structural governance boundaries that implement the framework's approach to AI risk management.

ISO 42001 — Clause 6.1, Clause 8.2

Clause 6.1 requires organisations to determine actions to address risks and opportunities within the AI management system. Clause 8.2 requires AI risk assessment. Cargo Chain-of-Custody Governance implements a risk treatment control within the AI management system, directly satisfying the requirement for structured risk mitigation.

Section 10: Failure Severity

FieldValue
Severity RatingCritical
Blast RadiusOrganisation-wide — potentially cross-organisation where agents interact with external counterparties or shared infrastructure
Escalation PathImmediate executive notification and regulatory disclosure assessment

Consequence chain: Without cargo chain-of-custody governance, the governance framework has a structural gap that can be exploited at machine speed. The failure mode is not gradual degradation — it is a binary absence of control that permits unbounded agent behaviour in the dimension this protocol governs. The immediate consequence is uncontrolled agent action within the scope of AG-542, potentially cascading to dependent dimensions and downstream systems. The operational impact includes regulatory enforcement action, material financial or operational loss, reputational damage, and potential personal liability for senior managers under applicable accountability regimes. Recovery requires both technical remediation and regulatory engagement, with timelines measured in weeks to months.

Cite this protocol
AgentGoverning. (2026). AG-542: Cargo Chain-of-Custody Governance. The 783 Protocols of AI Agent Governance, AGS v2.1. agentgoverning.com/protocols/AG-542