Acts of violence, suicide, theft, and other threats occur too frequently in society and effect millions of people each year. Post incident reports reveal that warning signs were present before a majority of these acts which prompts this question:
If we can find the Red Flags in Post Incident Reports, then why can’t we can find them in Pre-incident Reports first.
One person can always predict when an act violence will occur, that person is the perpetrator. The perpetrator will over the course of years, months, weeks or days, leak information or “Red Flags” that indicate their pending act of violence.
Securable Alternatives focuses in on these Red Flags and “Key Threat Indicators” or KTI’s that exist in our schools, places of worship, the workplace and our communities and works to identify those behaviors and characteristics of the Pathway to Violence.
A new tactic is needed, we must adopt a methodology that embraces Data Driven Decision making and allows us to collect, inspect and connect the “KTI’s” and Red Flags as threats emerge.
“The GREATEST COUNTERMEASURE IS A DATA DRIVEN DECISION” - JASON DESTEIN
We have a choice: