At PMI, we specialize in detecting and mitigating threats before they escalate. Our Pre-Incident Indicators (PINs) Analysis Service is designed to identify patterns, behaviors, and communications that suggest an individual may be progressing toward a violent or unlawful act. This service empowers schools, businesses, law enforcement agencies, and private clients to take proactive measures grounded in intelligence, not fear.

🔍 What Are Pre-Incident Indicators?

Pre-Incident Indicators (PINs) are observable behavioral cues, communication patterns, and lifestyle changes that often precede acts of violence, targeted attacks, or criminal events. These indicators are frequently present — but overlooked — in the days, weeks, or even months leading up to an incident.

Examples of PINs include:

  • Obsession with a person, place, or ideology.

  • Expressions of grievance or persecution.

  • Sudden interest in weapons or violent content.

  • Posting cryptic or threatening messages online.

  • Withdrawal from social networks or employment.

  • Behavioral "leakage" through social media or conversations.

Our PINs Analysis Service leverages behavioral science, open-source intelligence (OSINT), and law enforcement-grade investigative techniques to assess these indicators and guide appropriate intervention.

🛠️ How PMI Conducts PINs Analysis

Our investigative and analytical process is multi-layered, discreet, and legally compliant. Here's how we approach each case:

1. Case Intake & Risk Triggering

Each investigation begins with a detailed report or referral. Whether from a school, workplace, law enforcement partner, or concerned family member, our analysts gather all available information about the subject, their behavior, and the circumstances.

2. Behavioral Baseline & Deviation Detection

We build a behavioral profile based on past conduct, personality, known history, and digital footprint. Sudden changes in speech, routine, or demeanor are flagged as potential indicators of threat escalation.

3. Threat Progression Mapping

Utilizing industry-standard threat models — such as the FBI’s Pathway to Violence and the Leakage Model — we determine where the subject falls on the threat escalation timeline:

  • Grievance

  • Ideation

  • Research & Planning

  • Preparation

  • Implementation

Each stage reflects growing intent and capability, helping us advise clients on urgency and response.

4. OSINT & Social Media Analysis

Using specialized tools, we monitor:

  • Public social media posts.

  • Online searches, interests, and affiliations.

  • References to violence, weapons, or manifestos.

  • Visual cues such as photos with weapons, surveillance of a target location, or coded messages.

When necessary, our team also investigates fringe forums, encrypted chat platforms, and dark web sources (within legal boundaries).

5. Background & Criminal Records Check

We cross-reference the subject’s identity through public records, court databases, FDLE tools, and local law enforcement resources. Arrest history, restraining orders, domestic violence calls, or Baker Acts may inform the risk level.

6. Structured Threat Assessment

We prepare a professional Risk Intelligence Report that includes:

  • A summary of observed PINs.

  • Threat classification (low, moderate, high).

  • Evidence timeline and digital findings.

  • Legal risk factors and public safety concerns.

  • Recommended actions (e.g., law enforcement referral, mental health evaluation, workplace safety plan).

7. Client Advisory & Threat Management

We work directly with client leadership, school resource officers, HR teams, or law enforcement to help implement:

  • Behavioral intervention strategies.

  • Security modifications.

  • Temporary protective orders (TPOs) or stay-away orders.

  • Monitoring protocols for continued risk assessment.

🧭 Real-World Use Cases

  • School Threats: A student posts disturbing images and veiled threats on TikTok. PINs Analysis confirms ideation and planning stages, prompting early intervention.

  • Workplace Concern: An employee terminated for misconduct begins sending vague emails referencing revenge. Our assessment identifies grievance and weapons research.

  • Domestic Spillover: A known domestic abuser threatens to confront their partner at their workplace. PMI detects escalation indicators and advises legal steps.

  • Fixated Individual: A person obsessed with a public official begins exhibiting stalking behaviors. We detect and document PINs for law enforcement handoff.

📈 Why Choose PMI for PINs Analysis?

  • Proactive Intelligence: We stop incidents before they occur.

  • Law Enforcement-Grade Tools: Our analysts use the same platforms trusted by government agencies.

  • Discreet & Confidential: Investigations are handled professionally, minimizing disruption and liability.

  • Custom Reports: Actionable insights, not generic assessments.

  • Threat Management Support: We help clients implement solutions — not just identify problems.

🗂️ Who Benefits From This Service?

  • School Administrators & Campus Security

  • Corporations & Human Resources Teams

  • Property Management Groups & HOAs

  • Houses of Worship

  • Event Security Firms

  • Government Agencies

  • Concerned Families

📞 Schedule a Confidential Consultation

If you’ve received a threat, noticed concerning behavior, or need a professional assessment of a situation, contact PMI today. We’ll conduct a private evaluation and advise you on the appropriate steps — whether it's monitoring, reporting, or intervention.

📧 Email: zporter.pmi@gmail.com
📞 Office Phone: (386)-236-6990

📍 Serving Volusia County & Beyond