Citrus Security Alliance

Protect the Golden Crop.

Lemon theft is a serious agricultural crime and economic risk. CSA provides prevention playbooks, operational intelligence, and reporting tools that strengthen evidence integrity and coordination across orchards, facilities, transport partners, and rural communities.

At a glance

Operational signals and control priorities

Indicators designed to reflect real exposure points and the controls that reduce ambiguity across harvest, facility, and transport operations.

Peak exposure window
6–10 weeks
Loss risk rises sharply during harvest cycles when bins, staging areas, and transport handoffs increase.
Chain-of-custody breakpoints
4+
Typical shipments traverse multiple custody points: field pickup, staging, dock loading, linehaul, and receiving.
Recommended footage retention
30–90 days
Retention should reflect incident discovery lag, reconciliation cadence, and investigative timelines.
Reconciliation cadence
Daily
End-of-shift counts and load verification reduce ambiguity and support faster, cleaner reporting.
High-value coverage zones
5
Gates, staging, loading, perimeter corners, and egress routes typically produce the most actionable evidence.
Community reporting benefit
Faster patterning
Consistent reporting improves pattern recognition and helps prioritize prevention investments.
Operational knock-on effects
Labor + logistics
Loss creates rework: re-picking, re-scheduling, dispatch changes, claims, and customer fulfillment disruption.
Minimum defense layers
3
Physical, procedural, and visibility controls work best as a layered model rather than single-point fixes.
Featured report

A comprehensive framework for layered defense

Align perimeter hardening, process controls, and evidence-grade visibility into a repeatable program.

Open report →
Operations 2026-02-25

Layered Defense Model for Lemon Theft Prevention

A practical framework that aligns perimeter hardening, operational process controls, and evidence-grade visibility into one repeatable program.

FrameworkControlsProgram design
Latest alerts

Seasonal exposure and advisories

Short, actionable guidance for peak windows and common control failures.

View all alerts →
Latest news

Field notes and operational analysis

Coverage focused on practical failures and prevention patterns operators can act on.

View all news →
Prevention pillars

A layered control system, not a single device.

High-performing operators combine physical security, process discipline, and evidence-grade visibility across every handoff.

Perimeter & Access

Make access predictable, visible, and accountable at gates, corners, and shared roads—especially during shoulder hours.

Harvest Operations

Assign staging ownership, standardize shift-end reconciliation, and document exceptions while memories and evidence are fresh.

Chain of Custody

Verify pickups and receiving consistently: driver ID, plate capture, counts, seals, signoffs, and a defined variance protocol.

Facility Integrity

Define zones and standardize dock controls so high throughput doesn’t create ambiguity: monitoring, audits, and outbound verification.

Surveillance & Evidence

Use targeted control-point coverage with lighting overlap, time sync, retention planning, and a repeatable evidence export workflow.

Reporting & Coordination

Document incidents consistently to support patterning and professional coordination across neighbors, partners, and investigators.

Grower resources

Templates designed for real operations

Checklists and worksheets that reduce drift across shifts and strengthen incident documentation quality.

Browse resources →
Checklist Threat Landscape

Perimeter Security Checklist

A practical checklist for fencing, gates, signage, lighting overlap, and camera coverage at control points.

PerimeterGatesLighting
Template Operations

Harvest Shift Reconciliation Template

Shift-end count sheet for bins, partial loads, variances, and supervisor signoff with escalation notes.

HarvestReconciliation
Template Research

Incident Documentation Template

A standardized incident packet format: timeline, location, custody, quantity estimate, evidence list, and contacts.

ReportingEvidenceCoordination
Policy Guide Surveillance

Camera Retention Policy Guide

Guidance to set retention targets, manage storage, ensure time sync, and define evidence export workflows.

RetentionEvidencePolicy
Kit Threat Landscape

Grower Signage Kit

A set of sign templates aligned to access rules, surveillance presence, and reporting contact pathways.

SignageDeterrence
Worksheet Community

Suspicious Vehicle Logging Sheet

A simple, consistent log for time/location/plate capture and escalation notes—usable by crews and neighbors.

Community watchReporting
Community watch

Rural coordination that stays ethical and effective.

A community watch program succeeds when it is disciplined: consistent observation documentation, defined escalation thresholds, and professional coordination—without confrontation.

Read guidance →
Voices from the field

Operator perspectives

Expert quotes highlighting what consistently works across high-throughput environments.

Theft prevention is not one device or one policy. It’s a disciplined operating system: access, accountability, and visibility at every handoff.

Elena Marquez
Orchard Operations Director · Central Valley Citrus Cooperative

Investigations move faster when crews document time, location, custody, and vehicle observations. The basics matter—and they add up.

D. K. Holloway
Rural Investigations Liaison · Regional Agricultural Crimes Unit

Chain-of-custody failures are rarely dramatic. They’re small gaps: unverified pickups, incomplete seals, or a missing signature at a dock.

Monique Patel
Fleet & Dispatch Lead · Fresh Logistics Partner Network
Final CTA

Treat lemon theft as a solvable operational risk.

Start with a layered model, standardize verification, and preserve evidence integrity so incidents can be reported cleanly and acted on quickly.