GENEGEE.COM
  • Home
  • Security Protocols Overview
  • Protocols Overview
  • L.A.V.A. Trust Protocol
  • Blog
  • About
  • Contact
  • Home
  • Security Protocols Overview
  • Protocols Overview
  • L.A.V.A. Trust Protocol
  • Blog
  • About
  • Contact
Search
Picture

 
R.A.P.I.D. Security Protocol©
Research-Anticipate-Plan-Implement-Detect ©

Eugene F. Gee III
May 31, 2022



​This is how the protocol begins:

The goal is not to stop crime and nefarious acts. The goal is to stop crime and nefarious acts at your location.

The following outlines a highly effective protocol that is easily tailored to fit a specific industry or location. Done correctly, this five-step series will provide an effective barrier to most amateur and organized incursions.


 
This is how it ends:

Most of the people who will attempt to steal, disrupt, disturb, or sabotage you are not high-minded criminals. This means that with a well-researched, well anticipated, well planned, well implemented, and well executed detection process you are in a very good position to reach the objective of a safe and secure environment that gives your guests and staff peace of mind.

The goal is not to stop crime and nefarious acts.
The goal is to stop crime and nefarious acts at your location(s).

========================================================

L.A.V.A. Trust Protocol ©
For Personal Safety
Leery-Aware-Vigilant-Avoid-Trust©

 Eugene F. Gee III
 August 10, 2022


 
 This is how the protocol begins:
 
Purpose
The goal is to help people not be an easy target. This training will substantially reduce or eliminate the need to enter a ’defensive’ or ‘survivor’ mode.
One should know basic self-defense. If desired, a person should be trained and regularly practiced with the weapon(s) of choice.
These will give peace of mind. But this is a reactive peace of mind.



  This is how the protocol ends:
 
Intentional peace of mind by helping you to not be a target.
You are too valuable to risk.
Stay aware. Stay vigilant. Stay safe.

================================================================


Contact me about the complete protocol, training on the protocol for you and/or your team, or a speaking engagements.
Thank you for visiting
  • Home
  • Security Protocols Overview
  • Protocols Overview
  • L.A.V.A. Trust Protocol
  • Blog
  • About
  • Contact