Learn

Understand the threat landscape behind lemon theft.

Most loss events concentrate around predictable control failures: informal access, unowned staging zones, weak chain-of-custody discipline, and short evidence retention.

Common theft modes

  • Organized theft targeting staging and pickup points
  • Opportunistic theft through weak perimeter access
  • Insider-enabled diversion during harvest or loading
  • Transit theft leveraging custody ambiguity and delayed receiving checks
  • Loading and storage theft when dock zones lack visibility
  • “Shrink” masked by inconsistent reconciliation and paperwork gaps

Common attack paths and exposure points

Exposure often begins with informal access: a secondary gate, a shared service road, or predictable after-hours activity. From there, theft tends to exploit one of two constraints: low visibility or unclear accountability.

Operators can reduce risk by treating staging and handoffs as controlled processes—owned, documented, and monitored—rather than “in-between” spaces.

Seasonality

Seasonal patterns and operational drivers

PeriodWhat changesTypical exposure
Pre-harvestPerimeter preparation and staffing transitionsGate schedules, lighting gaps, incomplete camera testing
Peak harvestHigh throughput, expanded staging, more handoffsBin variance, overnight exposure, unverified pickups
Shoulder weeksReduced staffing, relaxed oversightAfter-hours access, deferred reconciliation, short retention
Next step

Turn threat knowledge into layered controls.

Use a defense-in-depth model: perimeter hardening, procedural discipline, and evidence-grade visibility at every handoff.