The Infinite Analyst: Why I’m Digitizing 30 Years of Threat Experience To Redefine Success
I’ve participated in numerous of threat assessment meetings over the last thirty years, and while the faces change, the feeling in the room rarely does. It isn't usually panic; it is a quiet, pervasive anxiety.
You know the room I’m talking about. It’s a Tuesday morning. Sitting around the table is an HR Director, a Legal Counsel, maybe a Vice President of Operations or an Assistant Principal. They are smart, capable professionals who are excellent at their day jobs. But when a threat lands on the table—a cryptic email, a rumor about a hit list, or a strange interaction in the parking lot—they are suddenly asked to be something else entirely.
They are asked to be behavioral psychologists. They are asked to be threat analysts and in many organizations, they are being asked to do it with minimal formal training.
This is the reality of the "Part-Time Protector."
We have built a safety model that relies heavily on generalists. We hand them a binder of policies they haven't read in six months and ask them to predict the future actions of a desperate person. The result is almost always the same: the team relies on "gut feeling" rather than behavioral science. They over-react to the loud, scary-sounding threats that are actually harmless, and they under-react to the quiet, subtle leakage that signals real danger.
That isn't a failure of character; it is a failure of the system. We have assigned the weight of safety to people we haven't equipped to carry it.
What bothered me wasn’t just the risk involved, but the unfairness of it. The largest Fortune 500 companies and elite universities can afford to hire dedicated teams of former federal agents and psychologists to sit in that chair. But the mid-sized school district, the community hospital, and the local manufacturing plant simply cannot. They have the same exposure to violence, but they face it with a fraction of the support.
Duty of care shouldn't be a premium service, and safety shouldn't depend on your budget.
About ten months ago, I looked at that empty chair at the conference table—the one where the expert should be sitting—and asked myself a question: What if we could fill that seat without hiring another person?
I wasn't looking for a tool to replace the HR Director or the Principal. I was looking for a partner that could support them. I wanted to build a system that understands the rigid frameworks of threat assessment, speaks in plain English, and references the specific policy on the table—explaining its reasoning so the team can explain theirs.
That idea became Threatalytics AI.
It is designed to be the missing expert in the room. It gives the "Part-Time Protector" a place to stand so they aren't relying on bias or guesswork. The point isn’t to predict the future; it is to ensure consistency in the present.
I watched it work recently on a case that is typical of what these teams face every day. An employee had made a vague, unsettling comment about "burning it all down" after a performance review. In the old rhythm, the untrained team would have likely done one of two things: ignored it as "just venting," or panicked and fired him immediately, potentially triggering the very violence they wanted to avoid.
This time, the system walked them through the assessment. It mapped the behavior to observable indicators, highlighting that while there was a "grievance," there was no "target selection" or "planning capability." It suggested a pathway of de-escalation rather than confrontation, citing the specific clause in their own handbook that allowed for a fitness-for-duty evaluation.
The temperature in the room went down. The anxiety was replaced by a plan. By the end of the meeting, there wasn't a crisis; there was a record of care that was proportionate, documented, and safe.
That is the pivot we need to make.
We need to move from relying on one person’s gut feeling to relying on a shared, validated way of thinking. We need to shift from tools that simply watch people to tools that support the people doing the protecting.
People ask if it’s working, and the answer is yes. But more importantly, it is bringing dignity and confidence back to the conference room.
If you have ever felt that quiet anxiety when a threat file hits your desk, this series—The Perimeter Check - Pivot Points—is for you. You might be the one responsible for safety, but you shouldn't have to carry that weight alone.
Welcome to the perimeter check pivot point.