Understanding the Pathway to Violence
Learn the key behaviors of each phase in the Pathway to Violence and how to use this knowledge to protect your organization

As a corporate security professional, one of your greatest concerns is the possibility of missing the early signs of a workplace violence threat. In an ideal world, you’d be able to recognize and understand behaviors that may not initially seem threatening but could indicate potential risks — and then take proactive steps to prevent incidents from occurring.
This is easier said than done, but a standardized approach to identifying and addressing potential threats before they escalate can help. That’s why it’s important to understand the Pathway to Violence framework.
The Pathway to Violence framework outlines distinct behavioral stages that often precede violent acts. Understanding this framework provides a critical foundation for fostering vigilance and taking preventative measures to protect your organization’s people and assets from workplace violence incidents long before they occur.
At Ontic, we believe prevention is the most powerful form of protection. We created this guide to demystify the Pathway to Violence and show how to use this knowledge to keep your organization safe. It equips your security team with practical tools to stay ahead of emerging threats, building on proven models while integrating our unique insights to address the complexities of today’s workplace.
The 5 core stages of the Pathway to Violence
The better you understand the stages of the Pathway to Violence, the more effective you’ll be at taking early action and mitigating workplace violence threats. Each stage highlights critical behaviors and moments that indicate opportunities for intervention. The Pathway model provides a roadmap for understanding risks while emphasizing that early detection, collaboration, and intervention are key to successful prevention efforts. Here’s an exploration of each stage in detail.
00
Pre-ideation
Pre-ideation is not traditionally part of the Pathway to Violence, but it’s an important concept to understand — and an early opportunity for flagging potential threats and perhaps even intervening. Pre-ideation is a time when the seeds of a harmful act take root before an individual reaches the ideation stage. This early stage is defined by emotional triggers, life events, and unbearable stressors. It represents the motivational underpinnings that may eventually lead to the ideation phase.
While grievances can play a role in the Pathway to Violence, they aren’t always as clear-cut as they may seem in hindsight. Some individuals “shop” for grievances (finding a cause to channel their desperation), while others may act based on distorted perceptions rather than concrete wrongs. Security teams can’t afford to wait for an explicit grievance to emerge — pre-incident behaviors often provide earlier, more actionable warning signs. (For a deeper look at this topic, see “Grievances: Not always what they seem.”)
Key behaviors to identify
During the pre-ideation stage, individuals may exhibit:
- Expressions of despondency or hopelessness: This includes indicators of internal struggles, such as remarks about feeling trapped, powerless, or desperate for a resolution.
- Fixation on grievances: An obsessive focus on perceived injustices is common. It can be accompanied by comments or behaviors that indicate escalating frustration.
- Ambiguous early signals: Unusual or concerning behaviors may be evident, even if they don’t clearly indicate violent intent. Examples include sudden withdrawal from colleagues, erratic communication, increased absence or decline in work product, unkempt appearance, or subtle changes in demeanor.
How to take action
The pre-ideation stage underscores the importance of proactive observation and communication. While few individuals experiencing grievances will progress further along the Pathway, recognizing these early signs can provide important opportunities to intervene and prevent potential harm.
Safety tips
- Prioritize observable behaviors without overanalyzing: Focus on what individuals are doing rather than trying to decipher why they are doing it. Observable behaviors provide clear, actionable insights that can guide your intervention efforts without requiring a full understanding of the individual’s mindset. For example, if one of your employees starts avoiding team meetings or exhibiting sudden irritability, these behaviors are observable and actionable — even if the underlying motivations are unclear.
- Act early: The earlier behaviors are identified and flagged, the more opportunities exist for intervention. Proactive observation and communication are key to disrupting potential pathways to violence before they escalate.
- Provide baseline training: Reports from employees are important in catching early warning signs, but people need to understand what they should be observing before you can report anything. Offer training on identifying unusual behavior, fixations, or other precursors that may indicate risks.
- Encourage a culture of reporting: With an understanding of what to report, employees should then feel confident reporting concerning behaviors without fear or retribution. Create an environment where individuals feel supported and encouraged to report, even if they think the behavior may be insignificant or inaccurate. Additionally, develop clear reporting mechanisms (like an intake form that connects directly with your case management solution) and use accessible language customized to your organization’s culture.
- Emphasize alternative interventions: Recognize that some reported behaviors may not indicate progression on the Pathway to Violence but instead suggest that the individual needs support in other ways. Educate employees to view reporting as an opportunity to help, not punish.
- Balance intervention with awareness: It’s important to remain vigilant while working with the appropriate business functions to offer support and resources. If concerning behaviors persist or escalate, introduce security measures to mitigate risks. For example, restricting access to certain areas or data may be necessary as a precaution.
Grievances: Not always what they seem
It can be easy to look back after a workplace violence incident and pinpoint a grievance (real or perceived) that seemed to drive an individual’s action. But in the moment, grievances are not always obvious and can manifest in various ways. Here are important things to remember:
Grievance can be subjective. What appears to be a minor issue to one person may be perceived as a profound wrong to another. A change in company policy or being passed over for an assignment can affect people differently. While rarely does someone resort to violence to express their dissatisfaction, it is important to stay vigilant and address any warning signs early. For example, in the Santa Clara Valley Transportation Authority shooting, Samuel Cassidy was angry over a policy change ending payouts for unused sick days (this case was one of the catalysts for California Senate Bill 553).
Grievances are not always based on actual events. The 2013 Navy Yard shooter believed electromagnetic pulses were targeting him — his grievance wasn’t grounded in reality, but it was real to him.
Some individuals “shop” for grievances, becoming obsessed with prior events. In cases involving deteriorating mental health, an individual may latch onto a grievance over time rather than having one clear catalyst or reason. This can confuse a threat assessor when no clear link exists between the person of interest and the “cause.”
Grievances can manifest in different ways. The recent Southport triple murderer was known to be preoccupied with mass attacks, genocide in particular, while the British Museum cyber incident was an act of retaliation by a dismissed contractor. One case involved physical violence; the other did not. However, both individuals followed a behavioral pathway that, if understood, potentially could have been addressed and managed before harm occurred.
Perception matters more than reality. In many cases, perceived wrongs or delusional beliefs shape motivations rather than actual injustices.
Pre-incident behavior is more reliable than waiting for a grievance to surface. Teams should focus on behavior patterns over time rather than searching for a clear grievance.
The key takeaway? Define the behaviors you’re monitoring before an incident occurs, not after. Scenario-based training and a regular cadence of meetings and discsussion can help keep your team informed and aware of the key behaviors to watch for. Security teams that proactively track behavioral shifts (regardless of grievance) are best positioned to intervene before a situation escalates.
01
Ideation
The ideation stage marks the point where an individual begins to conceptualize violence as a solution to their perceived problems or a means to achieve their goals. At this stage, the idea of committing an act of harm starts to take form, often accompanied by a growing fixation on the means and motivations behind the actions.
Key behaviors to identify
During the ideation stage, these behaviors may be observable:
- Admiring past attackers: Those on the Pathway to Violence often express admiration for or emulate individuals who have carried out similar acts. This could include referencing notorious attackers in conversations, social media posts, or other writings.
- Exploring methods of harm: They may show interest in violent methods through research or casual remarks about potential tactics.
- Communicating early intent: This stage often includes comments, posts, or other communications hinting at a growing fixation to carry out a harmful act. These communications may appear online, in private conversations, or as cryptic messages. Typically, these messages lack specificity — they’re often vague and do not contain a direct threat.
How to take action
Recognizing the ideation stage is critical to preventing escalation. While individuals at this stage may not have solidified their plans, the early signs of intent offer valuable opportunities for intervention. With the right tools and vigilance, you and your team can disrupt the Pathway before it progresses.
Safety tips
- Look for patterns and shifts in behavior: Identifying someone in the ideation phase requires piecing together subtle changes over time. Your team should focus on shifts in language, tone, or interests that indicate increasing preoccupation with violence.
- Centralize information: Centralizing data across teams helps identify ideation patterns more quickly and accurately. This may include managers documenting unusual comments or HR placing an employee on a performance improvement plan. This is easier to achieve if your security system is designed to gather and connect relevant information (no matter how insignificant it may seem) across departments.
- Build on previous investigations: Unless this is where you’re first capturing the behavior (like an IT team member observing unusual online activity), you may already have an investigation open in your system based on earlier observations from the pre-ideation stage. Use this stage to gather additional pieces of the puzzle, such as online behavior or new reports from coworkers.
- Engage directly with the individual (if possible): This stage is an opportunity to conduct a conversation or interview with the person (ideally, alongside HR if possible) to discuss the behaviors observed or reported. This interaction can provide new insights, serving as another part of the bigger picture. It may also reveal that the individual is not necessarily violent but instead needs support or resources to address personal challenges.
02
Planning
The planning stage is where intent turns into strategy. During this stage, individuals actively research and organize the details of an intended act. This stage often involves collecting information, analyzing potential targets, and rehearsing steps to ensure the success of a plan.
Key behaviors to identify
Look for the following in the planning stage:
- Researching past attacks or methods: It is common for individuals to study prior incidents to understand tactics, outcomes, and potential pitfalls. This research often involves consuming content about similar events or analyzing the success or failure of past attackers.
- Scouting locations or testing vulnerabilities: It’s also common for individuals to target sites or simulate scenarios to identify security weaknesses. This may include observing access points, monitoring patterns, or testing how their presence is perceived.
How to take action
The planning stage provides a crucial window for intervention. You can act by recognizing behaviors like site reconnaissance or detailed research before the individual transitions into preparation (stage 3). Proactive data-sharing and collaboration across departments are essential to disrupting plans and safeguarding employees, assets, and the broader community.
Safety tips
- Foster cross-team collaboration: Effective intervention requires coordination across HR, cyber, insider risk, executive protection, and physical security teams. Sharing insights helps identify suspicious behavior that might go unnoticed in silos. For example, a guard may overlook an employee’s odd-hour access attempt if unaware of an ongoing investigation. A centralized security platform ensures alignment by consolidating incident and investigation data for a common operating picture.
- Leverage cross-departmental data: If you’ve established a centralized location for data and information, ensure that relevant stakeholders can contribute to it. Whether it’s online activity flagged by cyber teams, on-site observations from physical security, unusual behavior reported by an executive protection team, or internal reports from HR, integrating this information helps identify risks and individuals advancing through the planning stage.
- Expand the search for additional information: If the behavior is internal, consider speaking with coworkers or others who may have observed concerning actions. Additionally, leverage a security solution that connects you with external data like criminal activity and other public records. Collecting input from multiple perspectives and sources can reveal critical details and help create a clearer picture of the individual’s activities.
- If the behavior is coming from someone not affiliated with the company, adjust operational procedures: Even if limited information is available, physical security and executive protection (EP) teams need to be aware of what you know so that they can adjust operational procedures accordingly. This might include monitoring the individual and situation more closely or revising existing security protocols.
- Continuously assess and adapt protective measures: As investigations progress, assess risks while simultaneously implementing safeguards. Protective measures can be adjusted as new information is uncovered. For example, you might issue a “Be on the Lookout” (BOLO) alert for your physical security team, restrict the individual’s access to sensitive data or property, or direct the EP team to alter how they handle a protectee.
03
Preparation
The preparation stage is where intent takes its final form, and individuals begin acquiring the tools and resources needed to carry out the plan. This stage often includes rehearsing actions, solidifying logistics, and exhibiting behaviors that signal a heightened commitment. Preparation is frequently the “point of no return,” where intervention becomes critical.
Key behaviors to identify
An individual may exhibit these behaviors in the preparation stage:
- Acquiring tools and practicing attack methods: Obtaining weapons, materials, or other resources needed for the planned act is common. This can include purchasing firearms, creating explosive devices, or rehearsing techniques at firing ranges. These behaviors may become apparent through social media posts, where individuals share images or comments about their actions, or through reports from coworkers who observe or hear about these activities.
- Finalizing plans: Writing manifestos, creating videos, or even a more positive change in behavior can reveal an increased focus and resolve on execution. These actions might include tidying personal affairs or broadcasting intentions to specific audiences.
How to take action
The preparation stage is your final opportunity for intervention and the highest stakes. Recognizing and acting on the behaviors exhibited in this stage can be the difference between prevention and escalation. With the right tools and level of vigilance, your team can intervene decisively, protecting lives and minimizing risks.
Safety tips
- Recognize last resort, or “point of no return” behaviors: Actions in this stage often signal a firm commitment to carrying out the plan. Your team should focus on identifying the behaviors outlined above so you can act swiftly to intervene and execute a plan to reduce risk.
- Notify law enforcement for immediate intervention: If an individual’s activities indicate clear preparation for an attack (like purchasing weapons or rehearsing), involve law enforcement immediately. At this stage, extreme security measures may be required to prevent escalation.
- Notify intended targets (if any): If intended targets have been expressed or identified, notification should be made so that personal protective measures can be taken.
- Leverage social media and reports to monitor activities: Stay vigilant for signs on social media (like posts showing weapons or cryptic messages) or reports from employees who may have observed concerning behaviors. These sources often provide critical insights that can guide timely intervention.
- Use technology to accelerate intervention: You can respond more quickly with access to real-time data and analysis. For example, in platforms like Ontic, you can set up alerts for vehicle sightings or social media posts from a threat actor. Automating threat monitoring saves time on manual searches, helping you spot warning signs before it’s too late.
04
Implementation
The implementation stage is where the individual attempts to carry out the plan, representing the culmination of the Pathway. This stage is marked by direct action, with little room for proactive intervention. For you and your team, the focus shifts to mitigating harm, responding swiftly, and protecting lives and assets.
Key behaviors to identify
Progression to the implementation stage is marked by these behaviors:
- Engaging in direct action: The individual may attempt acts of violence or harm, such as physical attacks, sabotage, or other disruptive behaviors targeting individuals, groups, or locations.
- Exhibiting a “point of no return” mentality: Behaviors like “suicide by cop,” escape attempts, or efforts to maximize damage indicate that the individual is fully committed to the plan.
How to take action
While the implementation stage leaves little room for prevention, swift and decisive action can minimize harm and save lives. Investing in preparation, training, and cross-functional collaboration makes you better equipped to respond effectively. Mitigation during the implementation stage depends on your pre-planned protocols. Rapid communication, clearly defined roles, and rehearsed response strategies are essential to containing the situation.
Safety tips
- Adhere to established security protocols: Follow your organization’s pre-planned security procedures to maintain clarity and order during an incident. Real-time data sharing with external teams promotes better coordination, enabling swift and precise responses to critical situations.
- Coordinate with law enforcement: Establish strong communication channels with local law enforcement to ensure they are informed of any potential threats or incidents. Their involvement can enhance your ability to respond effectively and mitigate harm.
- Ensure continuous monitoring and containment: A key aspect of managing incidents during this stage is maintaining awareness of the individual’s status. Know where they are, confirm they are contained, and ensure the situation remains stable. Continuous monitoring is key to preventing re-escalation.
- Develop a post-incident management plan: Once the situation is contained, create a management plan to ensure the threat remains neutralized. Conduct a thorough after-action review to analyze what went right, what went wrong, and how your team can improve processes for future incidents.
For corporate security professionals working to prevent and mitigate workplace violence, it’s essential to understand the behaviors on the Pathway to Violence and know how to respond appropriately. By recognizing key behaviors in each phase, you can collaborate with the right teams to address potential threats before they escalate. Prioritizing prevention reduces risk and strengthens overall organizational security and business resilience.
Stay one step ahead of potential threats
The Ontic Platform is your comprehensive solution for workplace violence prevention. By fostering collaboration, delivering actionable insights, and enabling early detection, Ontic empowers your team to stay proactive, protect the organization, and build a safer and stronger workplace.
Ready to enhance your threat management process and stay one step ahead of potential risks? Explore Ontic’s Incidents, Investigations, and Case Management solution to see how your team can take workplace violence prevention to the next level.