Predator Typologies & Intent Profiles (Advanced)
Predators rarely “snap.” They follow identifiable psychological patterns, behavioural scripts, and intent cycles before attacking.
Module 9 goes far deeper than BTI. Here you will learn to recognise:
- How predators think
- How they choose victims
- The psychological profiles behind violence
- Pre-attack rituals and stalking patterns
- Manipulation and coercive strategies
1. The Predator Spectrum
All violent predators fall into one of **three psychological classes**:
A. Opportunistic Predators
These individuals attack when a quick opportunity appears — usually due to distraction, isolation, or vulnerability.
B. Manipulative Predators
These offenders use charm, grooming, deception, and influence to get close to a victim.
C. Calculated Predators
The most dangerous type. These predators plan, observe, and stalk. They target with purpose, not emotion.
2. Advanced Intent Profiles
Understanding intent is critical — it reveals why violence is happening and what type it will be.
A. Hunting Intent
Calculated violence. Offenders take their time, observe prey, and strike when advantage is guaranteed.
B. Dominance Intent
Driven by ego, control, and intimidation. Common in street aggression and social violence.
C. Emotional Intent
Fueled by anger, shame, jealousy, or intoxication. Highly unpredictable.
D. Chaotic Intent
Violence from unstable or unbalanced individuals. Least predictable and hardest to de-escalate.
3. Target Selection Algorithms
Predators choose targets using psychological “filters.” Remove a filter → you often remove the threat.
Most predators disengage if any of these filters become unfavourable.
4. Predatory Rituals
Offenders follow pre-attack rituals, often subconsciously.
A. The Interview Ritual
Testing boundaries, probing for weakness, fake friendliness, or charm.
B. The Positioning Ritual
Closing distance, blocking escape paths, moving to blind angles.
C. The Preparation Ritual
- Looking around for witnesses
- Touching waistband (weapon check)
- Psyching themselves up
- Hiding hands
5. Manipulative Predator Archetypes
These types use psychological weapons instead of physical ones.
- The Charmer – Uses likeability to disarm.
- The Confuser – Creates uncertainty or panic.
- The Rescuer – Offers “help” to gain trust.
- The Authority Faker – Pretends to be police/security.
- The Observer – Watches from a distance for long periods.
6. Threat Mapping Sequence
This sequence makes threat detection reliable and repeatable.
7. Pattern Recognition Drills
A. 10-Second Scan
- Hands
- Eyes
- Feet
- Posture
- Movement
B. Shadow Reading
Read emotional state from behind—posture tells the story.
C. Script Breaker
Interrupt the approach early to reduce predatory interest.

