ABSTRACT

Chapters 3 and 4 portrayed hunters and howlers, respectively. For hunters, we focused on the types of behaviors in which they engage as they traverse the path to intended violence. Since crossing the path requires engaging in noticeable activities, the threat manager should always be alert to any reports suggesting attack-related behaviors. Because of that emphasis on behavior, our description of hunters zeroed in on the actions they take rather than discerning the reasons prompting those behaviors. This approach mirrored the reality that threat managers confront. Frequently, the threat manager will receive reports describing suspicious behaviors without any clue concerning the subject’s motive. Although the threat manager knows with certainty that the hunter has a grievance, the hunter may not choose to reveal exactly what that grievance is. As a result, threat managers often must manage the hunter without knowing what prompted the hunt.