In The Boardroom™ Let's Talk™ Press Room About Us Research Reports Contact Us
In the Boardroom™
Risk Mitigation Technologies, LLC

Risk Mitigation Technologies, LLC


IN THE BOARDROOM™ with...

Joseph Paul Manley
Founder, Owner
Principal Security Consultant
Risk Mitigation Technologies, LLC

Connect with Joseph Paul Manley on LinkedIn

UPDATE 6/21/23:

SecuritySolutionsWatch.com: Thank you for joining us again today,  Paul. We  understand that you have recently launched a Residential Home Security Checkup Service?  It sounds like a wonderful concept. What led you to offer this very timely service? 

Paul Manley: Your home is your safe place - your sanctuary. Are you, and your loved ones, as safe as you can be? Would additional peace-of-mind enhance the quality of life and enjoyment in your home? Of course, it would!

Now is the time for your Residential Home Security Checkup!

As a former Police Officer with more than 30 years’ experience working the street, I have seen a great deal. One thing that always amazed me was how lackadaisical some people were at securing their homes. To be honest, it is no wonder why people’s homes are burglarized as often as they are with this lackadaisical approach to home security.

When I was promoted to lieutenant, I jumped at the opportunity to command the patrol operations divisions. One of the first things I did was to offer free residential security assessments to our residents to educate homeowners on potential security measures. The feedback we received was phenomenal and we began to see a steady decline in residential burglaries. In fact, local business owners asked that we provide this service to them as well. And we did! 

Since retiring from police work, I have been performing residential security check-ups for my inner circle for some time now and have been very gratified by the results and feedback. 

Although the definition of certain crimes differ from state to state, according to the FBI, a burglary occurs every 25 seconds in the United States. As a result, an estimated 685,000 homes are burglarized every year with victims suffering property losses of more than $3 billion. Residential burglaries account for more than 60% of all reported burglaries. I find these numbers frightening and, to some extent, preventable!

Afterall, your home is your sanctuary. The SAFE PLACE for you and your loved ones. Let’s make it as safe as it can possibly be!.

SecuritySolutionsWatch.com:  It makes perfect sense , Paul !  How does it work…what do you do on the scene?

Paul Manley:  Our professional residential home security checkups evaluate numerous areas including:

  1. Systems technology (e.g., alarms, cameras, and monitoring)
  2. Physical security (e.g., fencing, gates, windows, and hardware)
  3. Network architecture (e.g., Internet connections, wireless network, and ports). Anyone who operates a computer network is susceptible to security threats and vulnerabilities. Hackers, criminals, and other malicious actors often exploit these weaknesses to steal data or disrupt service. To protect your network from these threats, it is important to be able to identify them and take appropriate steps to mitigate risks. We will provide you an overview of some of the most common security threats and vulnerabilities as well as tips on how to detect them. 
  4. Emergency preparedness (e.g., safe rooms, evacuation, and relocation)
  5. Liaison with critical third parties and first responders (e.g., police, fire, and emergency medical) 

Your residential home security checkup will include a review of your home’s interior and exterior, as well as the immediate perimeter and surrounding neighborhood in which you live.

We have designed a comprehensive Home Safety and Security guide based on decades of experience in order to provide YOU with a residential home security checkup that will make your home as safe as it can possibly be and provide priceless peace-of- mind for you and your loved ones.

Our recommendations for your residential home security checkup are intended to create multiple security layers. The more layers you have, the more difficult it becomes to force entry into your home. 

We will also discuss your family’s evacuation plan - you might never need it, and we hope you don’t, but if the time ever comes - you’ll be so relieved that your evacuation plan is in place. 

Risk Mitigation Technologies, LLC’s Residential Home Security Checkups are based on industry standards and guidelines as recommended by ASIS International, the world’s largest association for security management; and conducted in a method recommended by the International Association of Professional Security Consultants, the most widely respected and recognized security consultant association in the industry.

Take the initiative, and give your family more peace-of-mind by booking a residential home security checkup with me today!

SecuritySolutionsWatch.com: What has the feedback been from your clients?

Paul Manley: We are living in dangerous times, and my mission is to provide YOU, and your family, with additional peace of mind in your home, in your safe place!

I am pleased to share with you these testimonials:

“Thanks Paul, for visiting me at my home to do your security check up. The security issues you identified were simply eye-opening. I also appreciate you helping me negotiate a better vendor contract. What you did to help me, and my family was amazing. I will be recommending this service to my extended family and friends. In fact, I will be calling you in about six months to have another checkup. To me it makes sense to schedule this like an annual doctor appointment or maintenance on our cars every few months. Thanks again.”  - George P

“As you know Paul, I spent a good part of my time away from home traveling on business. I never gave it much thought about having a residential security checkup. If it were not for George telling me about what you did for him and his family, I would not be telling you how much my family and I appreciate what you have done for us. I am happy to say that I replaced the doors, added the window protection as recommended, trimmed the bushes and trees away from the house and will be planning to move my shed to a better location in the backyard. To be honest, having additional layers of security that you recommended has provided peace of mind for me and my family. Thank you.” - Scott G

As a result of the positive feedback I have received, we are now making this Residential Security Check-Up Service available on a wider scale.

SecuritySolutionsWatch.com: Let me ask you, Paul, every home is obviously different and every family, obviously, has different needs and concerns. Please discuss this in greater detail.

Paul Manley: We tailor our residential home security checkups for each client, as we understand that each client has individual needs that are unique to them. 

The foundation of Risk Mitigation Technologies, LLC’s Residential Home Security Checkups are more than 35 years of law enforcement and security management experience. We have studied most of the assessment methodologies and continue to keep up with the latest trends and developments in security and risk assessment.  

SecuritySolutionsWatch.com:  What about families moving into new homes – it seems to us that a Residential Security Check-Up is perhaps even more important when a family is moving into a new home…a new area. Your thoughts, Paul?

Paul Manley: I couldn’t agree more ! It’s exciting to move into a new house and we understand all the energy that goes into redecorating …but remember, security should always be your number one priority. 

There are 2.5 million burglaries annually in the United States, according to the United States Department of Justice yearly data, with over half of these being home invasions. While these numbers are frightening, adding protective security measures to your home is easier than ever.

To adequately provide security, we must think about how to properly secure the windows and entrances into a private residence, apartment building, condominiums, houses of worship and commercial properties. Here are five questions that immediately come to mind.

  1. What might attract a burglar to your home?
  2. Is there good visibility in and out of your property?
  3. How difficult is it to break the doors and windows?
  4. Is there a monitored security alarm system in place?
  5. What could make your home a risky target?

Your uniquely tailored residential home security checkup requirements may depend upon answers to the following questions:

  1. Have there been any recent break-ins in your neighborhood? Criminals may attempt to recreate a successful break-in by targeting similar houses in the area. If a nearby house has been broken into, you could face an increased risk of burglary.
  2. Does your neighborhood have improved street lighting? Well-lit communities provide better visibility from dusk to dawn, increasing the potential for neighbors and police patrols to observe burglars in the act. Adequate lighting reduces the risk of break-ins.
  3. Is there a neighborhood watch program on your street? When the community is educated on how to watch for crime, the entire community benefits from increased surveillance. Actively looking out for one another can reduce the risk of burglary.

Here are five of the many potential vulnerabilities of your home’s perimeter, exterior and interior to consider as you start making your security plan.

  1. It is crucial to maintain the visibility of sidewalks, driveways, doors, windows, and gates. Eliminate obstacles in your home’s perimeter that potential burglars can use to hide. Are there shrubs, vines, or trees that obstruct the front door or windows? Make sure that there are several feet between vegetation and the sides of the house. Do trees offer access to the second story? Trim trees as necessary to eliminate access to upper windows. Are expensive items such as stereos, big screen televisions, DVD/CD racks visible from the street? Either move the items or install opaque window treatments. Do not invite a burglar to think about your residence.
  2. Store sensitive documents and personal information in a fire-proof safe. Select the right safe to protect valuables. Also, your safe should be bolted down and may be disguised in a false enclosure for added security.
  3. Install high security keyed deadbolt locks on all your doors. Are exterior doors solid wood or steel construction? If not, I recommend immediate replacement. Hollow-core wood doors provide little protection. On average, a burglary occurs every 25 seconds in the United States, outfitting your home’s front and back door with a hardened steel bolt is your first line of defense against a burglar because it makes the door much more difficult to kick in. Do any of the exterior doors open out? If yes, install a long headless screw into one of the hinge screw holes that extends through the other leaf when the door is closed. This will stop the exterior door from being taken off if the hinge pins are removed. As an alternative, you can install Non-Removable Pin (NRP) hinges.
  4. Create an emergency evacuation plan. A burglar trying to break-in is a homeowner’s worst nightmare. You can never be too prepared for the unthinkable. Take time to establish and practice an emergency evacuation plan with your family several times a year to make sure everyone is prepared in case of a break-in. Break-ins are only one type of emergency for which you should prepare. Be ready for anything. For example,
  • Who should you call first in an emergency?
  • Do you have an emergency plan for your whole household?
  • Have you stocked your pantry with emergency food planning?
  • Do you have the best emergency survival kits?
  • Are fire extinguishers easily accessible throughout your home? Did you know that on average, there is a home structure fire reported every 85 seconds in America? If a fire were to break out in your home right now is your fire extinguisher operational? Do you even have a fire extinguisher? Do not forget to add smoke and fire detection systems to your home security plan so your family will be alerted the moment trouble is detected.
  1. Child safety at home.
  • Will you be home, or will there be other responsible adult supervision for your children?
  • If guns are on the premises, are they stored & locked safely? And ammunition locked separately?
  • Are prescription drugs, alcohol, and other medicines or vitamins locked up?
  • Are all cleaning supplies, chemicals, matches, and flammable liquids safely stored?
  • Are 9-1-1 and other emergency numbers posted by the phone?
  • Have you trained your children how to handle someone at the door?
  • Do your children know what to do in an emergency?

There is a lot to think about and our recommendations for your residential home security checkup are intended to create multiple security layers. The more layers you have, the more difficult it becomes to force entry into your home. We will evaluate the safety of your neighborhood and identify weaknesses across your property, so you can make the most valuable adaptations. We also recommend taking a close look at your family’s evacuation plans, sleeping areas, and storage areas to better identify and consider any lurking security risks or threats.

SecuritySolutionsWatch.com:  Thank you again for joining us today. Your Residential Home Security Checkup Service is truly a solution for these troubling times…a service whose time has come. How can homeowners best reach you ? 

Paul Manley: Thank you for the opportunity to speak with your community today about our Home Security Residential CheckUp Service.  There is much more information here on my website: https://www.riskmitigationtechnologiesllc.com and I invite your readers here to contact me directly via email: paul@risktechllc.com  or phone: 781-632-2953.

UPDATE 5/16/23:

SecuritySolutionsWatch.com: Thank you for joining us again today Paul. In our previous discussion, we talked about the shocking increase of violence at Houses Of Worship. We encourage all of our readers to benefit from your insights and security tips.

Violence at schools, is also, tragically, on the rise. What are your thoughts, Paul, regarding school security ?

Paul Manley: No matter how carefully designed a school is to ensure safety, the school is not safe unless the school community uses its safety features as they are intended every day. Here are a few of the basic security measures that I recommend all schools seriously consider:

Limit access to one main monitored entrance. One of the most important security measures a school can take to prevent intruders or other unwanted visitors is to have only one main entrance where people may enter, and which is always monitored (with all other outside doors locked). Modified entry plans should be in place for times when there are many visitors, for example, election days (I am not an advocate for using our schools as a voting place) or assemblies. While this limited access could be seen as unavoidable, it can also serve as a way for a school to consistently connect with students, parents, and visitors. A friendly face or even voice upon entrance is critical for a welcoming community.

The “one door access” strategies only work if staff and students do not let anyone into any other entrances. A known, clear, and workable policy is needed to enforce this. For example, staff can be told to routinely give directions to the main office and guide visitors around the outside of the building. If a staff member determines it is not safe for the visitor to do this (e.g., it is pouring rain and the visitor walks with a cane), they escort the person to the main office. Students are told to never let anyone in, including staff, students, or parents. Staff and parents should be reminded of this, to avoid putting students in confusing situations.

Visible visitor name badges are another measure to increase security while welcoming visitors. Visitor badges allow staff to immediately identify a visitor. Staff can be told to greet all visitors in a friendly fashion and, if possible, to ask them if they need any help. Even frequent visitors (e.g., parent volunteers) are expected to wear visitor badges to set an example. Ensuring teachers can lock classroom doors from the inside without using a key is another simple security measure that does not interfere with learning. The ability to lock a door quickly and easily during an incident may prevent potential intruders from entering.

Reducing opportunities for student disorderly behavior. To reduce student violence, the school can determine where and when disorderly behavior occurs the most, for example, in congested areas or when students have unstructured time (e.g., lunch, just before or after school). Routines or schedules can be switched to decrease congestion (e.g., stagger class schedules, encourage students to take different routes through the building), or staff can be assigned to monitor these areas. For isolated areas, especially those that attract students, video surveillance can be used.

It is worth repeating that security measures only have value if all community members consistently follow them every day.

A threat assessment needs to be completed as well. I recommend having the assessment completed by an expert. When a threat assessment is not done correctly, it may cause more harm than good. There needs to be a systematic effort to identify potentially violent students and should not begin until a school has a robust system for referring students to appropriate professional help. Below are components of an effective strategy to identify and help students who may pose a threat of harm to others or themselves.

  • A Threat Assessment Team made up of trained school-based staff (including principals, guidance, mental health professionals and security), police, and fire personnel, as well as social service agencies, and, if appropriate, clergy.
  • Training specific to threat assessment for all Threat Assessment Team members. General mental health, law enforcement, or fire professionals are not necessarily trained in school-based threat assessment. In addition, the Threat Assessment Team would do well to have contact with a trauma expert who can conduct specialized clinical risk assessments when appropriate. Note that this risk assessment is different from an emergency psychiatric evaluation.
  • A specific process for screening and referring students reported for threatening or violent behavior, consistent with the school or district system for helping all struggling students.
  • Specific procedures to manage bomb threats, including procedures for deciding the appropriate level of response given the common occurrence of bomb threats.
  • Protocols to encourage staff, students, and parents to report threatening or worrisome behavior. The school community should know that the hostile intruders or school shooters have almost always told someone in the community of their plans. Reporting threatening or worrisome behavior allows for proper interventions to prevent school violence and help struggling students.
  • Providing an anonymous hotline to report threatening behavior. Reports from the hotline are treated with the same care as any other report.
  • A procedure to track reports of threats and worrisome behaviors over time.

You must have procedures tailored to fit a particular school. A school district neither needs nor wants to “re-invent the wheel” when it comes to School Safety Plans. There are many proven emergency policies and practices widely used by emergency responders and adapted for school use, such as evacuation or lockdown. Prescribing commonly used policies and protocols not only improves in-district coordination, but it also means out-of-district first responders and counseling staff will be familiar with the school’s protocols and hence, be more effective. While adopting proven and commonly used frameworks and procedures is key, if they are to be effective on the ground, they must be tailored to a school’s particular circumstances. Here are three that stand out to me.

  1. Modifying procedures for the age and characteristics of the student population. Protocols or training may differ between elementary schools, middle schools, and high schools. For example, the protocol for accounting for students during an incident is more complex at a high school, especially one with an open campus, than at an elementary school.
  2. Accommodating students and staff with disabilities or other special considerations. You may want to institute an “emergency plan” discussion at students’ IEP (Individual Education Plan) meetings.
  3. Adapting common procedures to fit the specifications of the school’s building and grounds. For example, Crime Prevention through Environmental Design.

The importance of having effective School Resource Officers. A School Resource Officer can play a key role in keeping a school both physically and psychologically safe through balancing the three roles of educator, informal counselor, and law enforcement officer. Due to their key roles in school safety, SROs should have experience as a patrol officer and be carefully selected and trained for work in schools at the secondary level. The selection process works best when shared by the superintendent and police chief.

Here are my five traits of an effective School Resource Officer

  1. Genuinely enjoys working with students and has a deep commitment to helping them.
  2. Applies crisis intervention training and skills to help students in crisis.
  3. Builds positive relationships with students, staff, and parents both to support students individually and to strengthen cooperation between the school community and the town’s police department.Supports students while following through on her/his law enforcement duties. Always treats students and parents with respect and is ready to take as much time as needed to listen and explain patiently to students and parents the reasons for his/her actions. Knows about options beyond arrest and follows through on them when appropriate and safe.
  4. Becomes an integral part of the school staff, especially as an active member of the school’s Crisis Response Team. Shares knowledge of first responder procedures and protocols.
  5. Has a proven ability to work hard, be dependable, and possess high integrity with minimal supervision. The SRO displayed these traits while serving as a patrol officer.

While SROs are less likely to be placed in elementary schools, young students still need to develop positive attitudes toward and relationships with law enforcement officers. Some towns address this need through an “adopt-a-school” program, where each elementary school is assigned a police officer who visits the school weekly and presents safety programs a few times a year. In addition, patrol officers can do regular “walk throughs” at schools.

UPDATE 3/15/23:

Update Regarding Violence and
Hate Crimes At Houses Of Worship

SecuritySolutionsWatch.com: Thank you for joining us today, Paul. We read with great interest on your site about the Houses Of Worship Consulting Services which you provide. Just a few days ago there was a tragic intentional fire at a historic Church in Texas and, unfortunately, hate crimes and violence at Houses of Worship are on the rise.

The White House, and the United States Department Of Justice, have naturally weighed in on this various serious issue.

Please tell us more, Paul, about the security consulting services you provide regarding Houses Of Worship.

Joseph Paul Manley: Thank you for having me. I always enjoy discussing these important topics with you.

Houses of Worship including, Churches, Synagogues, Mosques, and Temples are places of faith, religion, ideology, and emotions. It is a place where most individuals should feel safe and supported by their community while sharing common views and morals. Unfortunately, in recent years, there has been an unprecedented increase of religion-based Hate Crimes here in the U.S. and around the world.

These soft targets are vulnerable, and recently they have been attractive targets for crime, mass shootings and other threats. Just recently the Austin Texas Fire Department investigators concluded an “incendiary device” started the tragic fire at the Goodwill Baptist Church earlier this month causing $200,000 worth of damages, in total. According to the Austin Fire Department someone intentionally set the fire. This and other types of violence against Houses of Worship are no longer strange to the world, and security must be at the best interest of every House of Worship.

As you know, every religious institution is different in size and design. Houses of worship may be a single building with a few attendees. Other places may contain multiple buildings and entrances with thousands attending services and events every day from morning to night with activities for all ages. Therefore, each facility will have different security concerns.

For example, a small House of Worship of one hundred will have a different list of concerns than a House of Worship of 1,000. However, it is imperative that each religious institution strive to enhance its level of security and determine what is appropriate for their facility. You might remember June 17, 20015, when a 21-year-old shooter entered the Emanuel African Methodist Episcopal Church in Charleston, South Carolina, he chose a location with only twelve witnesses. Yet, when a pedophile is looking for a victim, he may look for a larger religious institution where it is easy to slide right in, unnoticed and unobserved.

I cannot stress enough about the importance of having exterior security controls. Why? Because exterior security controls encourage us to think about how best to secure the perimeter of our Houses of Worship, their parking lots, playground areas, and mass drop-off areas. We need to start thinking critically about the vulnerability of crowds and how they can be attacked, both outside and inside buildings. Check this out. According to the FBI, in a 15-year study of the most violent crimes at faith-based organizations, more than 70% of the acts occurred outside the building on ministry grounds or parking lots. That is too high and unacceptable to me.

Each House of Worship has its own unique challenges if they are to create a safe place to worship. Various security precautions can be implemented in a non-intrusive manner, completely unknown and unobserved by congregants. For example, implementing a “Welcoming Committee” that includes individuals observing and welcoming people as they enter the facility will be unnoticed as a security program, yet it is highly effective when the members are trained in security detection.

You know how I feel about training. I believe in it. I believe in physical training. Houses of Worship have a responsibility to safeguard their members from harm and work to educate and equip their staff and volunteers on how to physically respond in time of crisis. A religious institution that fails to prepare – prepares to fail.

Here are ten questions we NEED to be thinking about now!

  1. Have you designated “security” as a priority and are you committed to developing a security plan?
  2. Do you ensure that all workers and volunteers pass a background check with fingerprints and ensure the references are verified? NOTE: It is recommended that you know individuals at least six months before allowing them to volunteer and/or work with children.
  3. Do you have security observing who is coming into the parking lots, then the building, and what they are carrying with them?
  4. Is each entrance clearly marked with your address and is each entrance well-lighted?
  5. Is each entrance to the building attended by someone acting as a greeter during worship times?
  6. If a hostile intruder enters the sanctuary, do you have a plan?
  7. If volunteers, staff, and/or security personnel need to summon additional personnel, do you have a system?
  8. At any given time, how do you know how many people are in the building and who they are?
  9. Do you have an emergency preparedness plan that addresses weather emergencies, medical emergencies, and man-made emergencies that could happen at your facility or adjacent to your facility?
  10. Do you have opening and closing procedures for each building with a designated person?

The security challenges facing Houses of Worship are growing each day. We cannot do a “one size fits all” approach because of the age of the House of Worship, the size, the design and even the location make a big difference as to the types of protocols that are recommended. This is why Houses of Worship must have a security assessment completed by an independent security consultant as soon as practical. There needs to be a safety and security plan in place and security training for staff and volunteers to help reduce the risk of violence. It is important to note that as you begin to evaluate your property, keep in mind two distinct threats: a threat from the outside coming in or a threat from the inside that is already there.

Remember, your first goal is to eliminate the threat from coming in. However, if the threat is already inside, the first layer of your security has failed, and you must then react to the threat. At that point, you have no choice. You must react.

As experts specializing in security design and emergency preparation for hostile intruder events, my team of independent security consultants at Risk Mitigation Technologies, LLC assist in assessing the vulnerability and readiness of houses of worship, religious schools, and retreat centers against risks of violence.

SecuritySolutionsWatch.com: We also noted on your LinkedIn page that you have highlighted several significant security tips for Houses Of Worship. Care to elaborate?

Joseph Paul Manley: All organizations that are open to the public need to consider the security of their staff, volunteers and visitors while on the premises. Even though religious institutions and their properties are safe sanctuaries, they are not immune to the same security issues that affect society in general.

I recommend all religious institutions have a security assessment. Completing a security vulnerability assessment is the first step in addressing your safety and security exposures and it will provide you with answers to my Linkedin post that you referenced. It is essential to have an understanding of the threats and dangers typically faced by your surrounding community, including other businesses and Houses of Worship in your area. Develop a team of staff and volunteers and begin to identify their common concerns related to safety and security for the programs and services you provide. Keep in mind that safety and security needs will vary. For example, an annual carnival event will require different security precautions than your regular Sunday services.

Also, having a security vulnerability assessment is especially important because it examines the safety, accessibility, and emergency preparedness of the House of Worship’s buildings and grounds. The assessment should include, but not limited to, a review of building access, visibility around the exterior of buildings, compliance with standards for individuals with disabilities and others with access and functional needs, and emergency vehicle access.

We must not forget to assess our own people. We should have an inventory of every position and person within the congregation who has access to children. This list should include individuals who transport and teach children; people who assist in the dining room, gym, and playground; mentors; youth pastors; ministers; counselors; clergy; kohen; rabbi; volunteers; and even security personnel. Make sure to have your applicants and volunteers sign paperwork agreeing to a background check. Officials should then conduct a national, state, and local record check on anyone who has access to children. They should also contact former and current neighbors and people who attended other places of worship or organizations with the applicants.

Once individuals have passed through the background check, I recommend that Houses of Worship rotate staff and volunteers on a regular basis to reduce the potential for predators to develop long-term relationships with victims. Officials can also watch to see if, after rotated, a staff member reaches back for a particular child to be included in his or her new role.

SecuritySolutionsWatch.com: Regarding your firm, Risk Mitigation Technologies, LLC,  are there any recent case studies, or projects at Houses Of Worship, that you would like to mention here for our readers?

Joseph Paul Manley: You know, several weeks ago, I was on my way to the local hardware store. As I was driving by the catholic church, out of the corner of my eye I saw an individual standing and leaning up against the side of the church partially concealing himself or herself from public view. Honestly, I did not think anything of it at first. I was concentrated on getting to the hardware store and back home before the afternoon school traffic.

As I was driving by the catholic church on my way home from the hardware store, I saw that same individual walking out from behind the church. Once the person saw me looking from my car, he or she turned right around and walked quickly back behind the church. It was a cold day, and the person was wearing a heavy coat, hoodie with the hood pulled up over the head, and the hood strings pulled tight making it difficult to see the persons face.

I turned my car around and headed back towards the church. I parked my car across the street from the church to better see what was going on. I did not see anyone; therefore, the person was still behind the building. There were no construction or utility vehicles of any kind parked on church property, along the street or in the parking lot across from the church. I had not seen anyone coming and going from the church but yet this person was on private property and did not seem to be conducting legitimate business and he or she was trying to conceal themselves.

The police department was only one block away, so I got out of my car and walked to the police station to report my observations.  

When I returned to my car, the police were arriving on scene. Soon I saw the officer walking out from behind the church escorting a male who had been placed in handcuffs. The officer transported the man away from the scene.

Later that afternoon, I received a phone call from the arresting officer. I was told that the male had “outstanding warrants for his arrest” and had a criminal history for drug possession, trespassing, and theft. The officer informed me that there were no signs or reports of unlawful entry or vandalism to property. The officer thanked me for reporting the incident and mentioned that he informed the leadership staff at the catholic church what had happened.

No one knows for sure what was going through the mind of my suspicious person. What is important is that YOU pay attention to your surroundings and when contacting the police, it is important for you to be able to articulate:

  1. Who you observed (a description)
  2. What did you see, be specific?
  3. Where was it?
  4. When did you see it?
  5. Why in your opinion was it suspicious?  Remember, you are more aware of what’s normal for your community than anyone else, but you need to be able to communicate that.

You can make a difference!

SecuritySolutionsWatch.com: Any upcoming events or speaking engagement you’d like to mention Paul?

Joseph Paul Manley:  I do. Thank you for asking. I am extremely excited to be presenting on March 21, 2023, at the Firehouse Center for The Arts in Newburyport, Massachusetts. The subject matter is Customer Service: De-escalating Difficult Customers.

This scenario based interactive training will help front line personnel with situational awareness and strategies to recognize and respond to problematic behavior. Participants will be learning about body language, tone of voice and active/reflective listening to de-escalate situations and create a safer and more productive environment. I am very appreciative of this opportunity. The training is sold out. The demand is such that we are in the process of scheduling a second class in Newburyport before the end of the month.

SecuritySolutionsWatch.com: Thank you again for joining us today, Paul. We look forward to future updates. Are there any other subjects you would like to talk about today?

Joseph Paul Manley:  Yes, thank you. I want people to understand that the risk of targeted violence is substantial. Anyone or any organization can be at risk.

As I mentioned earlier in our discussion, as you begin to evaluate your organization, keep in mind two distinct threats: A threat from the outside coming in or a threat from the inside that is already there. Your first goal is to eliminate the threat from coming in. However, if the threat is already inside, your first layer of security has failed you.

We are here to help you. Our customized security programs are focused on YOU, your industry, your vulnerabilities, your specific risks, your goals, and objectives. Not all organizations have the same concerns and issues so partner with us to get the desired outcomes that you want and need. We will do the research, the interviews, the planning and whatever it takes to deliver the value to you and your organization.

Do not hesitate to give us a call or send us an email for more information. Our website provides further detail, but we always appreciate a call!

UPDATE 1/4/23:

SecuritySolutionsWatch.com: Thank you for joining us again today, Paul. When read with great interest on your LinkedIn Profile, “As a specialist in negligent security, I consult on unsafe conditions related to third-party attacks on visitors and customers of businesses and property owners who allegedly fail to implement reasonable security measures to prevent foreseeable crimes. My 30+ years of real-life experience in law enforcement (Police Lt. Ret.), security management, physical security, university teaching, and the study of criminal behavior, provide the framework to serve you as an expert witness in litigation. Through effective communication and applying my experience, I will give you professional unbiased recommendations based solely on your needs and proven industry-accepted best practices and standards as recommended by ASIS, the International Association of Professional Security Consultants, and the International Public Safety Association where I served on its Board.”  

Please tell us more about “negligent security,” your “Security Risk Assessment Process” and the journey your clients take with you to improve their security readiness.

Joseph Paul Manley: Thanks for having me. It’s always a pleasure to be discussing these important topics with you.

Negligent security law is a subset of premises liability law, and stems from situations in which a person is injured by another person and seeks to hold liable the owner or possessor of a premises on which injury occurred. Normally, no one can be held responsible for actions of third parties. However, there are some exceptions. The injured victim (known as the plaintiff in a lawsuit) has legal standing to pursue litigation against a property owner or possessor because the law requires those entities provide reasonable security measures to protect certain individuals from foreseeable harmful acts by third parties.

Basically, had the property owner taken reasonable steps to protect lawful visitors against foreseeable risks, the attack and subsequent injury would not have occurred.

A negligent security claim could be based on anything from poor lighting, poorly trained security personnel, elevator and stairwell attacks, and injuries and deaths that have happened because of workplace violence.

Here are some examples of places in which crimes might occur and issues of negligent security could arise:

  • Bars or restaurants
  • Parking lots and garages
  • Hotels
  • Hospitals
  • College campuses and dorm rooms
  • Nursing homes and assisted living residences
  • Malls and shopping centers
  • Stadiums
  • Apartment complexes
  • Parks
  • Government buildings
  • Schools
  • Gated communities

It’s worth noting that property owners don’t have to guarantee that everyone who enters the property will be safe or free of harm. What they are required to do is respond appropriately when there is a foreseeable risk.

In weighing whether a risk is foreseeable, courts will analyze where the property is located, how attractive it might be to criminals and whether there is a history of criminal behavior there. For example, owners of a nightclub where two shootings were reported in the last six months would be held to a higher standard in terms of security than a similar business in a low-crime area with no prior violent acts reported.

Similarly, a bar that serves alcohol into the early morning hours will be held to a higher standard of security than a family-style restaurant that closes at 9 p.m.
A college dorm room, for example, is legally obligated to keep the premises free from hazards and to protect the residence in their dorms by keeping the doors to the building’s locked and having guests sign in with security.

Plaintiffs need to show the property owner knew or should have known someone would be victimized on that property, either because the area was high crime or because of the nature of the establishment and the property owners still failed to take reasonable action to mitigate risk.
In many cases, a plaintiff’s legal team will need to hire an expert security consultant who will analyze evidence and testify as to whether the property owner failed to meet those expectations. That security expert witness will need to review the frequency and nature of crimes reported in the area, the kinds of security measures that were taken and whether additional action was reasonably required.

Equally important, plaintiffs need to show they were on the property lawfully. That is, they were not trespassing and were invited as a tenant, social guest, business invitee or member of the public.

Security Risk Assessments are an excellent way to evaluate your existing security program and a great first step to take prior to making security improvements.

Risk Mitigation Technologies, LLC’s Security Risk Assessments are based on industry standards and guidelines as recommended by ASIS International, the world’s largest association for security management; and conducted in a method recommended by the International Association of Professional Security Consultants, the most widely respected and recognized security consultant association in the industry.

We customize our Security Risk Assessments for each client, as we understand that each client has individual needs that are unique to their operations. Our purpose is to collaborate with clients to build trust and provide quality services that promote professionalism, ensures fiscal responsibility, reduces the risk of crime, reduces the fear of crime, and promotes safety.

During our assessment, all aspects of your security program are examined, weaknesses are identified, and suggestions for security improvements are made. In addition, opportunities where costs can be reduced or where security operations can be made more efficient are identified.

As I mentioned, our practice is to follow industry best practices and established industry standards and guidelines, as we feel that these are proven methods and can offer the most protection for the client. This assessment process is constantly evolving, allowing us to take advantage of lessons learned from previous assessments, and to keep up with the latest security best practices.

Our Security Risk Assessment uses a structured, formal analysis process that allows us to develop a deep understanding of your business, properties, operating conditions, corporate culture, and unique security risks and threats.

While client involvement is crucial to success, we facilitate the assessment every step of the way, keeping the project on track, and making sure that all essential elements are examined.

So, what can you expect when we conduct a Security Assessment at your facility?

The budget number that we provide you will be firm. So, unless there is a change order, an addendum, or amendments to the project’s scope approved in writing by you the client in advance, you will not pay a penny more than our quoted budget for the project.

We don't sell security equipment or software; therefore, these items are NOT included in our pricing. We greatly value our independence and go out of our way to avoid business arrangements that pose a potential for a conflict of interest.

Prior to coming to your site, we will request several documents for our use during the assessment. These typically include plans of the site and buildings, copies of any existing security policies and procedures, samples of several types of forms, company telephone directory, employee handbook, and other related items. We only want what you already have; if there is something on our request list that is not available, it is not a problem.

We will collaborate with you to identify the people within your organization that we would like to interview. The goal is to get a good cross-representation of all the major operating and support departments within your organization. We include members of senior leadership, department heads, and people who occupy roles which are related to security, such as building receptionist’s, security officers, and shipping/receiving personnel. The typical interview session lasts between 45 and 60 minutes.

When we first arrive on site, we will start by conducting an in-depth interview with the person who presently serves as “security manager” for the facility. This may be an actual security manager or may be the facilities manager or other person who manages the security function for the organization. This interview session covers a lot of details, and typically takes 2 to 3 hours. After this interview, we ask this person to give us a brief guided tour of the facility.

At the conclusion of the interviews, we will conduct detailed inspections of certain areas of the facility and site. We may also spend extended periods of time observing certain areas of your facility, such as the building lobby or shipping/receiving loading docks.

During evening hours, we will be onsite to observe the night operations of the campus, and we will conduct a lighting assessment of the building’s exterior and parking areas.

At the conclusion of our visit to your site, we will meet with you to give you an update on our progress and to discuss the next steps in the process. At this point it may be possible to offer some preliminary findings and recommendations, but in most cases, we will need time to process and analyze the data gathered before we can give you any meaningful guidance.

We then return to our office and begin our formal Security Assessment process. During this process, we identify your critical assets, analyze potential threats, review loss history, study crime forecasts for your site, evaluate existing security measures, and identify potential weaknesses and areas for improvements. At the conclusion of this process, we begin to write the Security Assessment Report. It normally takes between two and three weeks from the time we complete our site visit to the time when we complete our draft report.

While we are preparing the report, we often uncover things that require further investigation and study. In some cases, this may require that we return to the site to conduct additional interviews or to examine certain things more closely. We may also request certain additional documents or other information that is available from within your organization.

We will send you a draft copy of the Security Assessment Report for your review once it is completed. After you have had an opportunity to digest the document, we will meet with you in person or via teleconference to review the report in detail and respond to any of your questions or comments.
After we have obtained your input, we will prepare a final Security Assessment Report that incorporates your comments. If desired, we can make a formal presentation of the Security Assessment Report to your senior management team or others.

At the conclusion of the assessment process, we remain available to assist you with implementation of the recommendations contained within our report. This can include identifying vendors and sources of products and services, reviewing bid proposals, developing security policies and procedures, providing training, and assisting in other ways.

SecuritySolutionsWatch.com: Your LinkedIn tips and discussions are extremely useful, Paul, and we encourage all our readers to connect with you on LinkedIn to immediately benefit from your expertise and insights in a wide range of security topics such as:

  • As a business owner, do you have a plan for communicating with employees in the event of a security emergency?
  • If your workplace experiences a violent situation or can prevent one from occurring, are you following up with an analysis?
  • To de-escalate a situation – “treat people with dignity.”
  • Why has domestic violence in the workplace been a hidden threat?

Please give us an overview of the Security Consulting, Services and Training you provide.

Joseph Paul Manley: We are a full-service security consultancy specializing in Forensic Security Consulting for matters arising from personal injury/death, premises liability, negligent security, and violent crime victimization.

In addition to expert witness support, we are Board Certified Workplace Violence & Threat Specialists, Certified Crisis Intervention Specialists, and Law Enforcement and Security Instructors with extensive training and experience in security and risk assessments of all venues, including critical infrastructure.
We can help you create a safer and more productive environment by helping you reduce your operational risk and preventing safety and security incidents from occurring. In other words, we help businesses stay in business.

Our multidisciplinary approach looks at safety and security from every angle to mitigate risks—from the physical environment to the human element to the role of technology.

We deliver expert consulting and litigation support that will help all groups in business and government sectors make more knowledgeable decisions and reduce their risks.

Aside from our consultations, litigation support, and keynotes, we offer training programs to both private and public entities that will lower the risk of injury, reduce potential liability, and improve relationships both in and out of the workplace.

Our evidence informed; experience applied programs combine academic research with significant “real life” experience.

Our courses are designed to provide the knowledge and skills that you and your employees need to be able to recognize threats, inappropriate and concerning behavior, intervene in a non-confrontational manner and respond appropriately to protect themselves and others.
We are experienced trainers with experience teaching in higher education. Our courses that are highly interactive, engaging and use positive reinforcement, in a story-telling format.

Our goal is to provide a memorable learning experience for you and your employees. We leverage “real life” experiences, education, and research to create an engaging training session.

Examples of our Trainings Include:

  • Workplace Violence Mitigation & Programming
  • Behavior Awareness & Verbal De-escalation
  • Law enforcement & Security Training
  • Scenario Based Training
  • Situational Awareness
  • Domestic Violence Training for Awareness and Advocacy

Every employer needs to have a policy that addresses the issue of domestic violence. Your policy should be comprehensive and apart from a workplace violence prevention plan or harassment policy.
As with any business initiative, executive buy-in and a comprehensive plan are essential because the program’s success will depend on its integration into the company’s culture and business practices.
An effective Workplace Domestic Violence Program must include training. A segment of our Workplace Domestic Violence Training teaches employees to recognize the signs of domestic violence (or intimate partner violence) and how to direct both abusers and victims to resources and help. It’s been my experience that presenting the issue in a group setting can reduce any embarrassment or shame that many victims feel. You must make this mandatory training. People that need to hear the message get the opportunity to hear it, but don’t feel that they self-identified as an abuser or victim just because they voluntarily went to the session. If you don’t make it mandatory, people won’t go. Also, this training should include issues of privacy and confidentiality.

Here are some critical statistics surrounding intimate partner violence (IPV):

  • IPV affects over twelve million people annually
  • Almost half of both women and men have experienced physical aggression from their partner
  • Although women are more often victims of IPV, 4% of men also report domestic violence
  • Almost 33% of women killed on the job in the U.S. were killed by an intimate partner

I find these statistics alarming. To protect your employees and the people you serve, domestic violence training is crucial. Workplace Domestic Violence Training must outline how to respond sensitively and confidentially when victimized employees are identified; how to communicate with a victim or a perpetrator, and what referrals are available.

Most violence is preventable, and the chances of violence are significantly reduced if people practice good violence prevention and crisis communication skills. After all, how you manage conflict and aggressive behavior is extremely important regardless of your profession. Your safety may depend on it. You must have strategies for ensuring personal safety in potentially stressful situations.

In any conflict you have a choice, you can either escalate the incident further or you can de-escalate the situation. Escalating conflict doesn’t resolve anything. Personally, I’d rather de-escalate conflict. We offer De-escalation strategies and techniques that can have great benefits for you and your organization. For example,

  • Less workplace violence incidents
  • Less use of force incidents
  • Decreased disciplinary actions
  • Decreased customer complaints
  • Increased customer satisfaction
  • Less stress

There are Two Key Concepts you need to Remember

  1. Reasoning with an angry person is not possible. The goal of de-escalation is to reduce the level of agitation so that discussion becomes possible.
  2. De-escalation techniques are inherently abnormal. They go against our natural ‘fight or flight’ reflexes. To be effective, we must remain calm and centered. We need to be professionally detached.

Therefore, these skills require practice to become useful.

A well-trained staff within your organization is critical to success in today’s highly competitive and challenging environment.

I want to emphasize that our training programs are practical and engaging, designed to raise awareness without creating fear, and focus on developing new behaviors. After all, knowledge is key. Our programs are always tailored to meet your unique needs and challenges.

SecuritySolutionsWatch.com: The headlines shocked us all again on November 22, 2022, "6 victims shot and killed in a Virginia Walmart". What is your take-aways, Paul, from this tragic situation?



Joseph Paul Manley: Although I have not analyzed the police reports or any factual analysis, I will say the Virginia Walmart shooting is another example of why we must have violence prevention training at work.

Many companies provide active shooter training. However, more focus is needed on how to prevent workplace violence, particularly how to identify and address problematic behavior.
A lot of time has been spent on trying to figure out the best way to lock bad guys out. We are heavily invested in physical security measure like metal detectors, cameras, and armed protection officers, but too often in workplace shootings, the “bad guy” already has access to the building.

When I talk to people about behavior awareness and workplace violence prevention, I am stunned how many people don’t know how to recognize warning signs, and they don’t know how to report suspicious or problematic behavior. Most people do not even feel empowered to do so for one reason or another.

The Walmart shooting is a prime example.

The reality is most people think they will never become involved in a workplace violence incident until it happens. Now more than ever, it’s important to prepare for them because they are becoming more commonplace.

SecuritySolutionsWatch.com: Any upcoming speaking engagements we should know about?

Joseph Paul Manley: I do. I will be speaking on January 24, 2023, at the Enterprise Center on the campus of Salem State University in Salem, Massachusetts. The subject matter is Customer Service:

De-escalating Difficult Customers.

Business owners and frontline employees interact with a variety of customers and behavior. This inter-active workshop will help front line personnel with situational awareness and strategies to recognize and respond to problematic behavior. Participants will learn about body language, tone of voice and active/reflective listening to de-escalate situations and create a safer and more productive environment.

The workshop is being Co-Sponsored by Salem Main Streets, and the North Shore Alliance for Economic Development. Salem Main Streets is a coalition of Salem Massachusetts residents and business owners focused on strengthening the downtown’s economic base and working to gradually expand it by helping existing businesses become safer and stronger. The North Shore Alliance works with the business community; local, municipal, and state elected officials; economic development organizations; institutions of higher education; the regional and local Chambers of Commerce; workforce development professionals and many others on collaborative economic development issues.

As you know, I have been informing and entertaining audiences as a speaker on optimizing workplace safety and security initiatives for more than 25 years.

My stuff is relevant. Your organization needs data from legitimate sources to make superior decisions. The narratives I bring are jammed full of the information leaders need after my workshop or presentation is done. This one is no exception. I am being told that the response has been excellent. It should be a full house. To be honest, I am really looking forward to it.

SecuritySolutionsWatch.com: Thank you again for joining us today, Paul? Is there anything else you would like to discuss today?

Joseph Paul Manley: Yes, thank you. I want people to understand that the risk of targeted violence is substantial. Anyone or any organization can be at risk.
Recent reports of workplace violence coupled with an increase in certain violent crimes, generally means it’s time for employers to update their workplace violence prevention and mitigation plans. Have you?

Here’s something I want the audience to think about.

If You Haven’t Assessed Your Security Risks in the Past Three Years,

  • Are you confident your security program is prioritizing the risks that pose the greatest threat?
  • Can you state with certainty that your organization is using best security practices to control and manage your vulnerabilities?
  • Will you be able to withstand the scrutiny of an OSHA investigation or properly defend against a negligent security or premises liability allegation?

Think of it this way, the assessment is an evaluation of your readiness. It is your chance to get out ahead of it, cover yourself, protect your employees, customers, invited guests and your business before something happens. It’s hard to put a price on that.

If you are interested in learning more about our services, please contact us. We would be happy to talk with you about your security needs at no cost or obligation.

Board Certified Workplace Violence & Threat Specialist

Joseph Paul Manley
Founder, Owner
Principal Security Consultant
Risk Mitigation Technologies, LLC

Paul has been a public safety professional for more than 30 years and has more than 12 years of college teaching experience educating students in criminal justice, behavioral sciences, and security studies.

Aside from being this company's founder, Paul is a retired Lieutenant and Executive Officer for a Massachusetts Police Department. He graduated from Anna Maria College with a master’s degree in Criminal Justice Administration and served on the Board of Directors of the International Public Safety Association.

Paul is holding several industry specific credentials to include Board-Certified Workplace Violence and Threat Specialist (WVTS), Certified De-escalation Instructor (NCI), Certified Protection Officer Instructor (CPOI), Certified Situational Awareness Advanced Practitioner (SAS-AP), and a Certified Crisis Intervention Specialist (CCIS), among others. Paul is a member of several professional associations to include the International Association of Professional Security Consultants, ASIS, the International Public Safety Association, the National Anger Management Association, and the Crisis Prevention Institute.

Risk Mitigation Technologies, LLC offers litigation support, various safety training courses and independent consulting services.

We offer case review, expert testimony, and consultation on security standards and best practices in all areas of security negligence and premises liability, with special expertise in Workplace Place Violence and Threat Management.

Venues we have worked with include hospitals, hotels, bars, apartment complexes, condominium associations, schools, universities, retail outlets and public spaces. We collaborate with both plaintiff and defense counsel.

SecuritySolutionsWatch.com: Thank you for joining us today, Paul. It’s an honor to speak to speak with you – as a public safety professional for more than 30 years and retired Lieutenant and Executive Officer for a Massachusetts Police Department, your background, credentials, and experience are truly impressive. Before we discuss in detail the services capabilities of your firm, Risk Mitigation Technologies, please tell us more about your impressive background.

Joseph Paul Manley: Thank you for having me. Many know that I have made it my mission to drive continuous safety by evaluating security risks, creating crisis interventions plans, developing policies, and providing training, education, consulting and management for clients and citizens with diverse security needs.

I help people both in and out of business create a safer and more productive environment by helping them manage their risk and preventing safety and security incidents from occurring.

Utilizing my real-life experiences in Security Management and Law Enforcement and Physical Security consulting, I will give you professional unbiased recommendations based solely on your needs and proven industry accepted best practices and standards. You will benefit from my deep understanding of the security challenges organizations face when addressing acts of targeted violence or threatening behavior because I have studied, evaluated, planned for, and responded to them with risk mitigation strategies that have proved effective.

SecuritySolutionsWatch.com: One will read on your site, “At Risk Mitigation Technologies, LLC, we can help you manage your risk, build resilience and protect your assets. We have consulted with and trained public agencies and private companies in a classroom setting and on the job.” Please give us an overview, Paul, of the services you provide.

Joseph Paul Manley: In July 2016, I launched Risk Mitigation Technologies, LLC. Since that time, we have designed and managed an effective security operation plan for Salem's annual Halloween event of 1,000+ attendees at a Massachusetts hotel, ensuring optimal safety, security, and a peaceful event. For a Metro Boston university, we collaborated with University Administrators to build a world-class security operational management plan that minimized risk and maximized security for 3,000+ participants at the university's commencement in Metro Boston. We have also conducted a security evaluation for an elementary school in Massachusetts, improving security and reducing labor costs by using advanced technologies.

Leveraging more than 30 years of working as a law enforcement officer, particularly in the physical security realm, we are able to address the growing need in the private sector for comprehensive vulnerability studies on critical infrastructure.

We also provide expert workplace violence prevention solutions that help prepare you and your employees to detect, prevent, respond, and recover from emergency situations in and out of the workplace. Our workplace violence prevention training utilizes a story-based approach with nuanced scenarios. Learners must decide how they would respond to several issues that could arise in a workplace violence situation.

We talk a lot about situational awareness and strategies to recognize and respond to aggressive behavior. One way of responding is using practical de-escalation strategies that work. During this segment of the program our presentation covers three core concepts that I believe are the foundation for de-escalation aggressive behaviors.

1. Body language
2. Tone of voice
3. Active/Reflective listening

Joseph Paul Manley
Founder, Owner
Principal Security Consultant
Risk Mitigation Technologies, LLCDuring the power point lecture, we share firsthand experiences to highlight how the three core concepts work. There are several short videos that also highlight and demonstrate the three core concepts. The videos are geared towards how to recognize and respond to aggressive behaviors. In addition, your staff will go through dynamic, realistic scenarios which will help develop stress inoculation, muscle memory, self-confidence, and confidence in each other. You and your staff will also get real time feedback as to what was done right and what can be tweaked and done differently. Because the course provides opportunities for the participants to participate in practical skill building, when they complete the training, they are well on their way to becoming more effective professionals in communication.

What I want to emphasize is our programs are practical and engaging, designed to raise awareness without creating fear, and focus on developing new behaviors.

Advocating and caring for someone experiencing a crisis can be extremely stressful. It’s important to have a plan in place, know the best techniques to de-escalate the situation and know where to turn when you need help.

We offer case review, expert testimony, and consultation on security standards and best practices in all areas of security negligence and premises liability, with special expertise in Workplace Place Violence Prevention and Threat Management. We are available to consult and testify on crime foreseeability, risk assessment, workplace violence detection, prevention, response and recovery, private and corporate training, and industry standards. Our experience in law enforcement and public safety, security management, physical security consulting and university teaching provides us the framework to serve as expert witnesses in litigation.

As a professional speaker my presentations are based on real-life experiences and solid information. I have been researching and analyzing what puts people at risk or protects them from violence for years. Your organization needs data from legitimate sources to make superior decisions. The narratives are jammed full of the information leaders need after the speech is done. Every presentation given is packed full of recent examples and the latest information, straight out of my personal database. All my talks are tailored to meet your needs.

SecuritySolutionsWatch.com: The Case Studies here and Testimonials about your services speak volumes about the respect and confidence that your clients have for you, Paul, and your firm. Please tell us more about your Special Event Security Services and Elementary School Security Plans.

Joseph Paul Manley: Risk Mitigation technologies, LLC is the premier provider of security services for special events, from shareholder meetings, boards of directors’ meetings, discreet private events, and major celebrations, to highly publicized conferences and high-profile spectator events.

It was a matter of weeks after launching Risk Mitigation Technologies, LLC that the organizers of a high-profile annual event was concerned about their ability to react effectively to disruptive incidents that might occur at the annual Haunted Happenings events taking place at a downtown Salem, Massachusetts hotel. There were layers of uncoordinated security infrastructure including the private security teams of high net worth and celebrity attendees, high profile political and government officials as well as government security forces, and emergency services.

We were engaged to redesign, implement, and manage a security plan for the event comprising of a proactive and reactive intervention capability. We provided a detailed evaluation of the threats surrounding the event, practical mitigation strategies and crisis management support in case of a serious incident. We trained security, safety and emergency support teams working within the event to ensure an effective response to incidents that utilized the capabilities of each group.

The client relied upon our expertise to ensure that the risk of disruptive incidents was mitigated to the greatest extent possible and could be effectively confined if they were to occur. The client also relied upon Risk Mitigation Technologies, LLC’s wider risk mitigation capability. This gave the client peace of mind and enhanced the overall safety of the event.

Our meticulous planning, preparation and global expertise allow our clients to focus on the narrative of their events and any pressing business at hand in a safe and secure operating environment for all concerned.

We were engaged by an elementary school in Massachusetts who were looking for a comprehensive security program.

The Main building on campus and monitoring vehicle traffic provided unique security challenges. The school sought recommendations on improving the institute’s overall security program and a way to monitor traffic flow in and out of the campus. We were contacted to see what security solutions we could provide. We conducted a detailed Risk Assessment to determine security needs and proposed a customized, integrated program. Collaborating with the School’s Technology team, the school was provided a detailed map of the camera locations. The types of equipment/services recommended included:

  • Exterior cameras in selected locations around the facility to monitor communal areas and enhance the overall security of the campus.
  • Two high-definition video surveillance cameras with analytics technology at the main entrance to monitor vehicles.
  • A high-quality CCTV system with remote viewing access and remote video surveillance capabilities.
  • A Network Video Recorder (NVR) via a wireless access point

The school community was incredibly happy with the outcome. The Risk Mitigation Technologies, LLC security program now in place has benefited the school by providing an overall enhancement of campus security and reducing labor costs. The cameras with analytic technology provide a count of vehicles entering and exiting the campus. The remote viewing capabilities assist the staff with monitoring the entire campus. The NVR provides a record of activity around the school property during sporting and other events.

SecuritySolutionsWatch.com: We understand Paul that domestic violence is a particular area of passion of yours and we read with great interest in your blog, “Domestic Violence is a hidden threat because businesses typically do not know that there could be an employee with a domestic violence problem. Often, even if the employer does know, the information usually does not end up in the hands of the security team or upper management who are able to help the employee. Therefore, the entire organization is at risk if there is a domestic violence victim in the organization and nobody knows about it. They do not know how to help because they do not know there is a problem, and the security team does not know who to keep an eye out for because they have not been alerted.” We couldn’t agree more about this “hidden threat”. Please elaborate on this subject for us?

Joseph Paul Manley: When we think of domestic violence, we typically don’t think about the workplace, but we should because domestic violence has no boundaries, and doesn’t stay at home. We need to change our thinking.

Domestic Violence is a hidden threat because businesses typically do not know that there could be an employee with a domestic violence problem. If they do know about it, they are reluctant to dig into employees’ personal lives. Often, the information does not end up in the hands of the security team or upper management who are able to help the employee. Therefore, the entire organization is at risk if there is a domestic violence victim in the organization and nobody knows about it. They do not know how to help because they do not know there is a problem, and the security team does not know who to keep an eye out for because they have not been alerted.

In a recent survey completed by the Society for Human Resource Management (SHRM), 21 percent of full-time employed adults said they were victims of domestic violence and 74 percent of that group said they’ve been harassed at work. Yet 65 percent of companies don’t have a formal workplace domestic violence prevention policy, according to research conducted by the Society for Human Resource Management (SHRM). Only 20 percent offer training on domestic violence, the 2020 survey found.

One in every four women and one in ten men will experience domestic violence in their lifetime, according to the Centers for Disease Control and Prevention (CDC). The Department of Labor reports that victims of domestic violence lose nearly eight million days of paid work per year in the U.S., resulting in a $1.8 billion loss in productivity for employers. These statistics are disturbing.

Ignorance of the issue is no longer an excuse for employers. You owe it to your employees to keep them safe. The Centers for Disease Control reports that alarmingly 1 in 4 women and 1 in 10 men have experienced some form of domestic violence in their lifetimes. In the U.S., an average of twenty people experiences intimate partner physical violence every minute, which equates to more than ten million abuse victims annually, according to The National Coalition Against Domestic Violence. Domestic violence affects people of any race, age, gender, sexuality, religion, education level, or economic status; anyone can be a victim or offender of domestic violence.

The biggest impact an employer can make for his or her employees in terms of having a domestic violence policy is through education. Executive buy-in and a comprehensive plan are essential for a companywide initiative. Also, it is important that the workplace have an open-door policy so employees will feel like they have someone with whom they can talk. If we incorporate this into our ongoing educational training, employees may be more willing to talk with someone.

Safety must be a top priority because domestic violence thrives in a culture of silence. Workplaces and communities can support victims, their children, and families by working together to create a safe working environment through awareness, education, and a commitment to safety and security as part of a comprehensive workplace violence prevention program.

SecuritySolutionsWatch.com: The world we live in has certainly changed quite a bit during the past couple of years. Violence where we work, where we live and send our kids to schools, Covid, political unrest, a breakdown of law & order in some parts of the country, and other security issues are, unfortunately, headline news all the time. In this constant threat environment, what is your message about “best practices” that we should be thinking about to minimize risk and provide greater safety and protection.

Joseph Paul Manley: The best way to keep yourself safe is to be aware of your surroundings. Knowing your surroundings and being aware of potential hazards will help you avoid unnecessary or dangerous situations. Best practices are important for processes that you need to work correctly. They are simply the best way to do things and have been worked out through trial and error and are found to be the most sensible way to proceed. Given the broad impact a single workplace violence incident can have; employers should consider these two best practices when reviewing or developing a workplace violence prevention program.

1. Conduct Thorough Background Checks

An employer’s first line of defense against hiring individuals who may present a risk of engaging in workplace violence is to conduct background screening. If an individual has a history of violence or abuse, they may go to great lengths to hide that history from a future employer. Ex-offenders may not disclose it during the interview process or may use false identifying information such as an incorrect social security number, name, or home address to escape detection. Recommended background checks include criminal record, driving record, credit check, sex offender registry, employment eligibility verification, professional reference checks and Social Security checks. Such searches can help reveal any false identifying information or negative past behaviors that would increase an individual’s risk of committing violent acts.

2. Implement A Violence Prevention Policy

As with any companywide initiative, executive buy-in and a comprehensive plan are essential. The violence prevention policy should explicitly state the consequences of making threats or committing acts of violence in the workplace. A comprehensive workplace violence prevention policy and program should also include procedures and responsibilities to be taken in the event of aggressive behavior or a violent incident in the workplace. Its goal should be to make employees, including supervisors and managers, aware of the potential for violence in the workplace, to increase their abilities to recognize early warning signs of potentially violent situations, and to understand how to respond to actual or potential incidents. Again, as with any companywide initiative, executive buy-in and a comprehensive plan are essential.

To ensure that any threats or violent acts are dealt with in a timely and effective manner, employers should consider identifying multiple channels through which concerns can be reported, including a hotline and dedicated HR appointee. The SHRM Workplace Violence Study found that 78 percent of organizations with more than 2,500 workers leverage a dedicated hotline.

Regardless of the reporting methods chosen, if employees are aware of reporting channels or protocols, they are more likely to report potential concerns. This reduces the risk of a violent offender remaining at large to commit further abuses. Having a reporting protocol in place, also provides a source of empowerment and guidance to victims, who might otherwise be hesitant to act due to stress and intimidation. Having a policy and good procedures demonstrates your commitment to tackling violence and ensuring the safety of your staff. You should make sure that all your staff, including new and part-time employees, are aware of these procedures and policies and know what they are expected to do.

Despite the benefits, best practices alone don't guarantee the success of an organization. For one thing, they won't always be applicable to every single instance; they only serve as guidelines. Also, they are only as good as the managers who implement them.

SecuritySolutionsWatch.com: Let’s talk about your teaching, mentoring, and speaking activities for a moment. Please fill us in.

Joseph Paul Manley: I am blessed with having more than 12 years of college teaching experience educating students in criminal justice, behavioral sciences, and security studies. What I love most about teaching is that I get to do something that might have a real impact, even a small one.

While at North Shore Community College, I taught Intro to Sociology, Intro to Criminal Justice, Criminology, Law Enforcement Management and Planning, Criminal Investigations and Crisis Intervention. At Endicott College I have taught the American Court System and Intimate Partner and Family Violence.

Mentoring future generations of public safety and security personnel is a privilege and responsibility that is why as a founding member of the International Public Safety Association I helped drive the development and implementation of the Mentoring Committee. Currently I am volunteering my time as a mentor with ASIS Security Leaders Mentoring Program.

Because I enjoy actively participating in the learning process I often speak on public safety and security related topics. For example, when speaking on “Recognizing and Responding to Aggressive Behaviors in The Workplace,” you learn simple, effective ways to protect yourself, your co-workers, and as an employer, your employees. This interactive program focuses on enabling individuals to rapidly identify early signs of potentially aggressive or threatening behavior and provide tactics to respond to those situations appropriately and safely.

One of the tactics that I teach is Verbal De-escalation Strategies. Verbal de-escalation can help you regain control of a situation before it turns violent. It can also promote a culture of safety where employees feel less anxious around unpredictable customers. Being prepared does not mean being paranoid.

We have been fortunate to present to various mavens including healthcare workers, retail, hospitality, college educators, public safety, security, HR professionals, and students, etc.

SecuritySolutionsWatch.com: Thank you again for joining us today, Paul. We look forward to future updates. Are there any other subjects you would like to talk about today?

Joseph Paul Manley: We are an independent security consultancy. Independence means integrity. Our consultation, advice, and expertise are based on real-life experiences, education, best practices, and professional industry guidelines. We do not endorse or recommend any security product or outside technology vendor. We may enlist the expertise of other consultants; however, we always ensure they prescribe to the same set of industry guidelines.

With any industry professional, you expect a security consultant and advisor to possess advanced education, industry specific training, and a significant level of real-life experience; Master’s in Criminal Justice Administration, Board Certified Workplace Violence & Threat Specialist, Certified Crisis Intervention Specialist and more than 30 years of real-life public safety and security experience validates these qualifications and enhances the value of our service to your organization.


Risk Mitigation Technologies, LLC