At PMI, we specialize in detecting and mitigating threats before they escalate. Our Pre-Incident Indicators (PINs) Analysis Service is designed to identify patterns, behaviors, and communications that suggest an individual may be progressing toward a violent or unlawful act. This service empowers schools, businesses, law enforcement agencies, and private clients to take proactive measures grounded in intelligence, not fear.
🔍 What Are Pre-Incident Indicators?
Pre-Incident Indicators (PINs) are observable behavioral cues, communication patterns, and lifestyle changes that often precede acts of violence, targeted attacks, or criminal events. These indicators are frequently present — but overlooked — in the days, weeks, or even months leading up to an incident.
Examples of PINs include:
Obsession with a person, place, or ideology.
Expressions of grievance or persecution.
Sudden interest in weapons or violent content.
Posting cryptic or threatening messages online.
Withdrawal from social networks or employment.
Behavioral "leakage" through social media or conversations.
Our PINs Analysis Service leverages behavioral science, open-source intelligence (OSINT), and law enforcement-grade investigative techniques to assess these indicators and guide appropriate intervention.
🛠️ How PMI Conducts PINs Analysis
Our investigative and analytical process is multi-layered, discreet, and legally compliant. Here's how we approach each case:
1. Case Intake & Risk Triggering
Each investigation begins with a detailed report or referral. Whether from a school, workplace, law enforcement partner, or concerned family member, our analysts gather all available information about the subject, their behavior, and the circumstances.
2. Behavioral Baseline & Deviation Detection
We build a behavioral profile based on past conduct, personality, known history, and digital footprint. Sudden changes in speech, routine, or demeanor are flagged as potential indicators of threat escalation.
3. Threat Progression Mapping
Utilizing industry-standard threat models — such as the FBI’s Pathway to Violence and the Leakage Model — we determine where the subject falls on the threat escalation timeline:
Grievance
Ideation
Research & Planning
Preparation
Implementation
Each stage reflects growing intent and capability, helping us advise clients on urgency and response.
4. OSINT & Social Media Analysis
Using specialized tools, we monitor:
Public social media posts.
Online searches, interests, and affiliations.
References to violence, weapons, or manifestos.
Visual cues such as photos with weapons, surveillance of a target location, or coded messages.
When necessary, our team also investigates fringe forums, encrypted chat platforms, and dark web sources (within legal boundaries).
5. Background & Criminal Records Check
We cross-reference the subject’s identity through public records, court databases, FDLE tools, and local law enforcement resources. Arrest history, restraining orders, domestic violence calls, or Baker Acts may inform the risk level.
6. Structured Threat Assessment
We prepare a professional Risk Intelligence Report that includes:
A summary of observed PINs.
Threat classification (low, moderate, high).
Evidence timeline and digital findings.
Legal risk factors and public safety concerns.
Recommended actions (e.g., law enforcement referral, mental health evaluation, workplace safety plan).
7. Client Advisory & Threat Management
We work directly with client leadership, school resource officers, HR teams, or law enforcement to help implement:
Behavioral intervention strategies.
Security modifications.
Temporary protective orders (TPOs) or stay-away orders.
Monitoring protocols for continued risk assessment.
🧭 Real-World Use Cases
School Threats: A student posts disturbing images and veiled threats on TikTok. PINs Analysis confirms ideation and planning stages, prompting early intervention.
Workplace Concern: An employee terminated for misconduct begins sending vague emails referencing revenge. Our assessment identifies grievance and weapons research.
Domestic Spillover: A known domestic abuser threatens to confront their partner at their workplace. PMI detects escalation indicators and advises legal steps.
Fixated Individual: A person obsessed with a public official begins exhibiting stalking behaviors. We detect and document PINs for law enforcement handoff.
📈 Why Choose PMI for PINs Analysis?
Proactive Intelligence: We stop incidents before they occur.
Law Enforcement-Grade Tools: Our analysts use the same platforms trusted by government agencies.
Discreet & Confidential: Investigations are handled professionally, minimizing disruption and liability.
Custom Reports: Actionable insights, not generic assessments.
Threat Management Support: We help clients implement solutions — not just identify problems.
🗂️ Who Benefits From This Service?
School Administrators & Campus Security
Corporations & Human Resources Teams
Property Management Groups & HOAs
Houses of Worship
Event Security Firms
Government Agencies
Concerned Families
📞 Schedule a Confidential Consultation
If you’ve received a threat, noticed concerning behavior, or need a professional assessment of a situation, contact PMI today. We’ll conduct a private evaluation and advise you on the appropriate steps — whether it's monitoring, reporting, or intervention.
📧 Email: zporter.pmi@gmail.com
📞 Office Phone: (386)-236-6990
📍 Serving Volusia County & Beyond