Aware 360 Pro Application

Behavioural Threat Identification (BTI)

Aware360 Pro – Module 8: Behavioural Threat Identification (BTI)
Module 8 • BTI • Aware360 Pro

Behavioural Threat Identification (BTI)

Violence does not “come out of nowhere.” People broadcast intent long before they act — through behaviour, body language, movement, emotional state, and micro-patterns.

The purpose of BTI is simple:

Spot danger BEFORE it becomes physical. This is the single greatest survival skill anyone can learn.

BTI gives you a systematic framework for identifying predatory behaviour, emotional volatility, violent intent, and situational danger early enough to avoid, escape, or intervene.

1. The Three Types of Threat Signals

All dangerous behaviour falls into three categories:

Threat Signal Categories
Predatory
Reactive
Situational
A. Predatory (Planned)
  • Target scanning
  • Positioning for advantage
  • Hiding hands or objects
  • Approaching with no social purpose
B. Reactive (Emotional)
  • Escalating anger
  • Staring / tunnel vision
  • Voice tightening
  • Rapid breathing
C. Situational (Environmental)
  • Concealed spaces
  • Limited exits
  • Unusual silence
  • Sudden crowd movement

2. Pre-Attack Behavioural Cues

These are the behaviours people display seconds or minutes before aggression.

A. The “Cluster Rule”

One cue alone means little. A **cluster** of cues = escalating danger.

B. Common Pre-Attack Cues
  • Jaw clenching
  • Hands disappearing into pockets
  • Exaggerated breathing
  • Pacing in a small line
  • Fixed stare at target area
  • Preening (adjusting clothes)
  • Shoulder roll (loosening up for attack)
  • Weight shifting onto lead leg
If someone shifts weight onto the front foot while staring at you — **they are seconds from action.**

3. Intent Profiles – Why People Become Violent

Understanding intent is half the battle. People commit violence for different reasons.

Primary Intent Types
Instrumental
Expressive
Defensive
Predatory
A. Instrumental Violence

Used to gain something (robbery, mugging, intimidation).

B. Expressive Violence

Driven by emotions: anger, jealousy, intoxication.

C. Defensive Violence

Fear-driven: someone believes they must strike first.

D. Predatory Violence

Cold, calculated, controlled — the most dangerous kind.

4. Predator Typologies

Predators operate with patterns — learn them, and you can see them early.

  • The Interviewer: Tests boundaries, asks odd questions.
  • The Approacher: Moves closer using excuses.
  • The Distractor: Creates confusion to close distance.
  • The Flanker: Moves to your blind side.
  • The Ambusher: Waits behind concealment.
  • The Posture Predator: Stares, squares shoulders, expands chest.
Predators follow scripts — break the script, break the attack.

5. The Threat Recognition Algorithm

Threat Algorithm
Notice
Interpret
Evaluate
Position
Act

This system makes threat detection replicable, consistent, and fast.

6. Behavioural Drills

A. People-Watching Exercise

Spend 10 minutes per day identifying:

  • Emotional state
  • Movement pattern
  • Distance behaviour
  • Hand visibility
B. Cluster Recognition Drill
  • Identify 3 cues in quick succession
  • Practice predicting outcomes
C. Silent Conversation Drill

Read someone’s posture & emotion without hearing their words.

🧠 Module 8 Knowledge Test – 10 Questions

1. BTI is primarily about:
2. A cluster of cues means:
3. Which is a common pre-attack cue?
4. Predatory violence is:
5. The Flanker predator tries to:
6. “Hands disappearing into pockets” is a sign of:
7. The Threat Algorithm begins with:
8. Predators often “interview” a target to:
9. Preening (adjusting clothing) often indicates:
10. BTI helps you: