Aware 360 Pro Application

Predator Typologies & Intent Profiles

Aware360 Pro – Module 9: Predator Typologies & Intent Profiles (Advanced)
Module 9 • Predator Typologies & Intent Profiles • Aware360 Pro

Predator Typologies & Intent Profiles (Advanced)

Predators rarely “snap.” They follow identifiable psychological patterns, behavioural scripts, and intent cycles before attacking.

Module 9 goes far deeper than BTI. Here you will learn to recognise:

  • How predators think
  • How they choose victims
  • The psychological profiles behind violence
  • Pre-attack rituals and stalking patterns
  • Manipulation and coercive strategies
This is advanced threat psychology: spot the predator before they decide to engage.

1. The Predator Spectrum

All violent predators fall into one of **three psychological classes**:

Predator Spectrum
Opportunistic
Manipulative
Calculated

A. Opportunistic Predators

These individuals attack when a quick opportunity appears — usually due to distraction, isolation, or vulnerability.

B. Manipulative Predators

These offenders use charm, grooming, deception, and influence to get close to a victim.

C. Calculated Predators

The most dangerous type. These predators plan, observe, and stalk. They target with purpose, not emotion.

2. Advanced Intent Profiles

Understanding intent is critical — it reveals why violence is happening and what type it will be.

Intent Profiles
Hunting Intent
Dominance Intent
Emotional Intent
Chaotic Intent

A. Hunting Intent

Calculated violence. Offenders take their time, observe prey, and strike when advantage is guaranteed.

B. Dominance Intent

Driven by ego, control, and intimidation. Common in street aggression and social violence.

C. Emotional Intent

Fueled by anger, shame, jealousy, or intoxication. Highly unpredictable.

D. Chaotic Intent

Violence from unstable or unbalanced individuals. Least predictable and hardest to de-escalate.

3. Target Selection Algorithms

Predators choose targets using psychological “filters.” Remove a filter → you often remove the threat.

Target Selection Filters
Access
Isolation
Control
Risk
Reward

Most predators disengage if any of these filters become unfavourable.

4. Predatory Rituals

Offenders follow pre-attack rituals, often subconsciously.

A. The Interview Ritual

Testing boundaries, probing for weakness, fake friendliness, or charm.

B. The Positioning Ritual

Closing distance, blocking escape paths, moving to blind angles.

C. The Preparation Ritual

  • Looking around for witnesses
  • Touching waistband (weapon check)
  • Psyching themselves up
  • Hiding hands
Spot these rituals → you can break the script.

5. Manipulative Predator Archetypes

These types use psychological weapons instead of physical ones.

  • The Charmer – Uses likeability to disarm.
  • The Confuser – Creates uncertainty or panic.
  • The Rescuer – Offers “help” to gain trust.
  • The Authority Faker – Pretends to be police/security.
  • The Observer – Watches from a distance for long periods.

6. Threat Mapping Sequence

Threat Mapping Sequence
Observe
Profile
Interpret
Position
Act

This sequence makes threat detection reliable and repeatable.

7. Pattern Recognition Drills

A. 10-Second Scan

  • Hands
  • Eyes
  • Feet
  • Posture
  • Movement

B. Shadow Reading

Read emotional state from behind—posture tells the story.

C. Script Breaker

Interrupt the approach early to reduce predatory interest.

🧠 Module 9 Knowledge Test – 10 Questions

1. Calculated predators are:
2. Target selection filters include:
3. Hunting intent is:
4. Manipulative predators rely on:
5. Pre-attack rituals include:
6. The “Flanker” attempts to:
7. Shadow reading identifies:
8. Dominance intent is about:
9. Predatory positioning often includes:
10. You can disrupt target selection by: