OPERATION G.E.M.S. | FIELD MANUAL
MODULE 01: FIRST RESPONDER
LESSON 1.2: THE WALL OF TRUTH (MULTI-TIERED CORDONS)
STATUS: AUTHORIZED FOR DISSEMINATION
CLEARANCE: LEVEL 01
01: THE PERIMETER FALLACY
Most rookie investigators treat a crime scene like a construction site—they pull a single string of yellow tape and walk away. In the G.E.M.S. framework, we call this the Perimeter Fallacy.
A single line of tape is not a barrier; it is a funnel for contamination. If you only have one line, authorized personnel (police, EMS, investigators) will congregate directly on top of the evidence because there is nowhere else for them to stand. To protect the Temporal Integrity you learned in Lesson 1.1, you must build the Wall of Truth.
02: THE THREE CONCENTRIC ZONES
We utilize a multi-tiered system to separate the Evidence from the Operations, and the Operations from the Public.
Zone 1: The Inner Cordon (The Hot Zone)
-
Purpose: Houses the “Sacred Data” (Body, blood, weapons, digital devices).
-
Protocol: Zero Entry. No one enters until the Scribe has authorized a “Path of Contamination.”
-
Visual: Marked by your yellow “CAUTION” tape and Evidence Markers 1–5.
Zone 2: The Outer Cordon (The Warm Zone)
-
Purpose: Operational Staging.
-
Protocol: This is where you set up your G.E.M.S. Field Manual station, PPE (Gloves/Masks), and lighting. It acts as a “Buffer Zone” to ensure that if someone accidentally trips or drops an item, it lands in the buffer—not on the evidence.
Zone 3: The Exclusion Zone (The Cold Zone)
-
Purpose: Crowd Control and Media Management.
-
Protocol: This is the area beyond your outermost tape. It is the “Public Facing” side of the investigation.
03: THE PATH OF CONTAMINATION
Even in a secure scene, you eventually have to enter the Hot Zone to process it. To do this, we establish a Path of Contamination (PoC).
The PoC is a single, designated trail—ideally marked with tape or floor markers—that every person MUST use.
-
If we find a “mystery” footprint later, and it is on the PoC, we know it belongs to an investigator.
-
If we find a footprint off the PoC, we know we have a suspect lead.
Investigator Note: If you don’t define where people can walk, you can’t prove where the suspect did walk.
04: APPLYING THE G.E.M.S. METHOD
When establishing your wall, follow this sequence:
| Step | Action | Objective |
| G | GAUGE the Spread | Walk the perimeter without entering. Find the furthest piece of debris. Your Inner Cordon must be at least 1.5x the distance of the furthest piece of evidence. |
| E | EVALUATEEntry | Choose one entry point. Every other side of the Cordon should be a “Dead End.” |
| M | MARK the Buffer | Use your second roll of tape to create the Warm Zone (The 5–10 foot gap). |
| S | SECUREthe Scribe | Place your Entry Log at the single entry point. If they aren’t on the list, they don’t cross the tape. |
05: FIELD DEPLOYMENT ACTIVITY
Deployment 1.2: Architecting the Wall
-
Select Your Scene: Use the 5×5 area from Lesson 1.1.
-
The Inner Wrap: Use your “CAUTION” tape to wrap the immediate area. Place your Evidence Markers near “suspect” items.
-
The Outer Wrap: Create a second perimeter 3 feet outside the first.
-
Identify the PoC: Place a piece of tape on the floor marking the “Safe Path” to Evidence Marker #1.
SUBMISSION: Take a “Tactical Photo” of your dual-cordon setup. Upload it to the Notion Dashboard under [Module 01: Logistics]. Ensure the “Entry Point” is clearly visible in the photo.
A scene is only as secure as the person standing at the tape. Be the Scribe.