top of page

When Security Experience Isn't Enough: Why Hawaii Organizations Need BTAM-Trained Consultants

Last fall, a Honolulu school district hired what appeared to be an ideal security consultant—someone with 25 years in law enforcement, strong local connections, and an impressive track record. Three months later, when a student began making concerning online statements, the consultant's advice was straightforward: expel the student and increase security patrols.


The district followed the recommendation. Two weeks later, the expelled student attempted to bring weapons onto a neighboring campus.


What went wrong? The consultant had extensive security experience but zero training in Behavioral Threat Assessment and Management (BTAM)—the evidence-based discipline that focuses on identifying and intervening with individuals who may pose a threat of violence. He knew how to respond to incidents but had never learned how to conduct proper threat assessments by recognizing behavioral warning signs and implementing intervention strategies.


This scenario isn't unique to Hawaii, but the islands' tight-knit communities and limited options for "sending problems away" make the consequences particularly acute. Understanding the difference between traditional security consulting and BTAM expertise has become critical for Hawaii organizations across every sector.


The Foundation: What Makes BTAM Different


Behavioral Threat Assessment and Management emerged from decades of research by the U.S. Secret Service, FBI, and Department of Homeland Security into how targeted violence actually unfolds. Their conclusion fundamentally challenged conventional security thinking: violence is rarely spontaneous.


Attackers typically follow an observable pathway that includes identifiable warning signs, behavioral changes, and communications. When properly trained professionals recognize these indicators early, intervention becomes possible before weapons appear and while de-escalation can still work.


Traditional security consultants ask "How do we keep bad people out?" BTAM specialists ask fundamentally different questions: "How do we identify concerning behavior early? What interventions might prevent someone from choosing violence? How do we connect troubled individuals to support services while maintaining safety?"


The distinction matters because physical security measures—cameras, access control, security guards—primarily address external threats. According to FBI data, most workplace violence and school attacks come from insiders: employees, students, or known individuals who have legitimate access. No amount of perimeter security stops an authorized person who's reached a crisis point.


This is why comprehensive threat assessment services must go beyond traditional security consulting to include behavioral analysis capabilities.


Where Traditional Security Expertise Ends


Hawaii's security consultants typically excel at what might be called "hardware and procedures": designing surveillance systems, developing emergency response plans, training security staff, and ensuring regulatory compliance. These capabilities are essential for physical threat assessments and building security infrastructure.


A mainland healthcare system learned the limitations of this approach after investing $250,000 in upgraded access control and surveillance systems based on a traditional security audit. Six months later, an employee with growing behavioral concerns—someone who possessed valid credentials—assaulted a supervisor. The cameras captured excellent footage of the incident. But no one in the organization had been trained to recognize or report the warning signs that appeared weeks earlier: increasing social isolation, paranoid statements about management, and angry outbursts that colleagues dismissed as "just stress."


The distinction isn't about whether traditional security expertise has value—it does. Rather, it's about recognizing where that expertise reaches its limits. Physical security prevents unauthorized access. BTAM addresses what happens when the threat comes from someone who already has access.


The BTAM Knowledge Gap


University of Hawaii West Oahu offers one of the state's few comprehensive BTAM training programs, teaching methodologies that most security professionals never encounter:

The Pathway to Violence Model identifies observable stages that precede targeted attacks: grievance development, ideation about violence as a solution, research and planning, preparation, and finally breach. Each stage presents different intervention opportunities. Traditional security consulting typically only addresses the final breach stage—when someone appears with a weapon. BTAM practitioners work across the entire pathway, with intervention ideally occurring during the grievance or ideation phases when de-escalation remains possible.


As detailed in The Prepared Leader, effective threat assessment requires understanding these behavioral progressions rather than simply reacting to final-stage incidents.

Structured Professional Judgment replaces gut feelings with systematic assessment frameworks. BTAM-trained specialists gather information from multiple sources, analyze behavior against research-backed threat indicators, evaluate individual circumstances and protective factors, develop case management plans, and document everything according to legal and ethical standards. This isn't security theater or safety checklists—it's methodical evaluation rooted in decades of research into how targeted violence actually develops.


Multi-Disciplinary Teams recognize that threat assessment isn't a solo activity. Professional assessment requires mental health professionals who understand psychiatric concerns, legal counsel familiar with privacy and liability issues, HR representatives managing employment matters, security professionals addressing physical safety, and law enforcement liaisons for situations involving criminal activity. Consultants without BTAM training often don't know how to convene or lead such teams—or may not recognize that this multi-disciplinary approach is necessary.


The Hawaii Context


The islands' unique characteristics make behavioral threat assessment particularly important. In tight-knit communities on Maui or Kauai, threatening individuals often can't simply be "banned" from premises—they're neighbors, family friends, or connected through local networks. BTAM's emphasis on intervention and management fits Hawaii's community-oriented culture better than zero-tolerance approaches that work in larger mainland cities where anonymity is more common.


Hawaii's tourism and hospitality sector faces distinct challenges: transient populations, high-stress customer service environments, and employees from diverse cultural backgrounds. Workplace violence prevention in hotels and resorts requires understanding behavioral escalation patterns, not just posting security guards at entrances.


Educational institutions from University of Hawaii campuses to K-12 schools must balance safety with educational mission. School threat assessments provide frameworks for addressing concerning student behavior without criminalizing adolescent development or cultural differences that security-focused approaches might misinterpret. The research on whether armed guards actually prevent school shootings reveals that behavioral intervention often proves more effective than purely physical security measures.


Healthcare facilities across the islands face insider threat risks from employees with access to vulnerable patients and controlled substances. A comprehensive 10-step insider threat audit addresses these vulnerabilities systematically. Badge readers and cameras can't address behavioral deterioration in trusted staff members.


Verifying BTAM Training: What to Ask


Most Hawaii security consultants will claim "threat assessment" expertise when asked. Here's how organizations can verify actual BTAM training versus informal experience:


Question 1: Where did you receive your BTAM training? Legitimate answers name specific accredited institutions: University of Hawaii West Oahu, University of Nebraska, University of Denver, FBI Behavioral Analysis programs, or Association of Threat Assessment Professionals certification courses. Red flags include vague references to "various trainings" or claims that law enforcement experience alone provided BTAM knowledge.


Question 2: What threat assessment model do you use? Trained specialists can articulate specific evidence-based frameworks: WAVR-21, Structured Assessment of Violence Risk in Youth, Secret Service threat assessment protocols, or Cornell's CSTAG model for schools. "My own approach based on experience" or "common sense" suggests absence of formal methodology. The Threat Assessment Handbook outlines these evidence-based frameworks in detail.


Question 3: Tell me about a case you managed without involving law enforcement or termination. This reveals whether consultants have intervention tools beyond punishment. BTAM practitioners should describe de-escalation, connection to mental health resources, monitoring without exclusion, and successful case management. If every example ends in arrest or firing, the consultant likely only has punitive options available.


Question 4: How do you document threat assessments? Professional answers discuss legal considerations, HIPAA and FERPA compliance, structured documentation tools, and defensible record-keeping. Vague responses or "I write a report" without understanding legal frameworks indicate gaps in formal training.


The Cost of Credential Gaps


When Hawaii organizations hire consultants without BTAM training for behavioral threat work, several problematic outcomes commonly occur:


Over-reaction scenarios see consultants recommend immediate termination, criminal referral, or exclusion orders for concerning behavior. Without training in behavioral assessment, they default to law enforcement tactics that may escalate situations, trigger litigation, and damage organizational culture while missing intervention opportunities that could prevent violence.


Under-reaction scenarios happen when consultants dismiss genuine warning signs as "not a real threat" based on intuition rather than structured assessment. They miss subtle indicators that research shows precede targeted violence because they lack frameworks for evaluating behavioral patterns systematically.


Liability exposure increases significantly if violence occurs after a "threat assessment" conducted by someone without BTAM training. Plaintiff attorneys will emphasize that gap: "You hired someone to assess threats who had no formal education in threat assessment methodology." Leadership liability in crisis situations has become an increasingly important consideration for executives making security decisions.


Resource misallocation occurs when organizations invest heavily in physical security infrastructure while completely missing behavioral components. It's analogous to building a fortress but leaving the doors unlocked—external threats are addressed while insider violence risk remains unmanaged.


Campus Safety: A Case Study in BTAM Application


A Hawaii university took a different path when a student began making concerning online posts about isolation, grievances with professors, and cryptic references to "making them pay attention." Campus security contacted a consultant with formal BTAM training from University of Hawaii West Oahu.


The consultant convened a multi-disciplinary team including the counseling center, dean of students, campus security, and legal counsel. Information gathering drew from multiple sources: professors, roommates, social media monitoring, and academic records. Using evidence-based assessment frameworks detailed in Campus Under Siege, the team identified both risk factors—social isolation, recent academic failures—and protective factors: family support, no weapons access, previous positive response to counseling.

The case management plan included regular check-ins, connection to mental health services, academic support, and continued monitoring. The student received treatment, improved steadily over the semester, and graduated two years later. In a follow-up letter to the dean, the former student wrote: "You saw I was struggling and helped instead of just kicking me out. That saved my life."


The intervention cost approximately $4,000 in assessment and coordination. Compare that to the average workplace violence incident cost of $250,000 to $5 million, not counting reputational damage and trauma to the community. Effective campus security assessments must include this behavioral component.


Federal Training That Complements BTAM


While BTAM training provides the behavioral assessment foundation, complementary federal certifications strengthen overall capability. The Federal Emergency Management Agency offers specialized courses that many Hawaii consultants overlook:


FEMA IS-906 covers workplace violence awareness using federal emergency management frameworks. IS-907 addresses active shooter response beyond basic "run, hide-fight" guidance. IS-915 focuses specifically on insider threat protection for critical infrastructure. These courses provide systematic, evidence-based approaches that complement behavioral assessment skills.


Organizations can verify federal training by asking consultants to provide specific FEMA course numbers and completion certificates. Many local consultants have zero federal certifications despite claiming comprehensive threat assessment expertise. The gap matters because federal training ensures consistency with national standards and best practices rather than approaches based solely on individual experience.


Understanding what active shooter preparedness actually requires goes far beyond hiring guards or conducting lockdown drills. It requires comprehensive behavioral threat assessment capability combined with evidence-based physical security measures.


Executive Protection and High-Profile Threats


Hawaii's corporate sector and high-net-worth residents face unique executive protection challenges that require specialized threat assessment expertise. Rising threats to CEOs documented in recent research demonstrate why behavioral threat assessment has become essential for executive protection programs, not just physical security details.


The integration of executive protection with threat assessment represents a significant shift in how organizations protect leadership. Traditional executive protection focused on physical barriers and armed personnel. Modern approaches recognize that identifying threats early through behavioral analysis proves more effective than reactive security measures.

For Hawaii organizations considering corporate security consulting, understanding this evolution from reactive to predictive threat management is critical.


Building Organizational Capability


Hawaii organizations have several options for developing BTAM capability:

Partner with trained consultants who can demonstrate formal BTAM education through documentation from university programs, federal training, or professional certifications. Request certificates, course syllabi, or other proof beyond claims of webinar attendance. Professional threat assessment services should include verifiable BTAM credentials.


Send internal staff for training to create sustainable capability rather than consultant dependency. HR directors, campus safety officers, or security managers can complete BTAM programs through University of Hawaii West Oahu, online courses from mainland universities, or Association of Threat Assessment Professionals workshops.


Leverage Hawaii resources including Threat Team Hawaii for multi-agency consultation, the Hawaii State Fusion Center for training and coordination, and University of Hawaii West Oahu's BTAM Initiative for education and community resources. These complement rather than replace the need for internal capability and expert consultation.


Adopt a hybrid approach by developing basic BTAM awareness internally while partnering with specialists for complex cases, program development, and staff training. This often proves most cost-effective for small to mid-sized organizations. Access control and security system design should integrate with behavioral threat assessment programs for comprehensive protection.


Business Continuity and Threat Assessment Integration


Effective threat management doesn't exist in isolation from broader organizational resilience. Case studies of SMBs that survived disasters versus those that collapsed reveal that integrated security and continuity planning proves essential. Organizations that treat threat assessment as separate from business continuity often fail to recognize how behavioral threats can cascade into operational crises.


This integration becomes particularly important for Hawaii's small and medium businesses. Business continuity playbooks for SMBs should incorporate threat assessment protocols alongside traditional disaster recovery planning.


The comprehensive business continuity resources available to Hawaii organizations demonstrate how threat assessment fits within broader risk management frameworks rather than functioning as an isolated security activity.


The Liability Reality


Courts increasingly expect organizations to demonstrate threat assessment capability. When workplace violence occurs, litigation focuses on a fundamental question: "What system did you have in place to identify and manage concerning behavior before the incident?"

"We had security guards and cameras" no longer constitutes adequate duty of care.


Organizations need documented threat assessment programs—which require BTAM-trained personnel to implement properly.


Federal guidance from the Department of Homeland Security, FBI, and Department of Education increasingly references BTAM as best practice for schools under Clery Act requirements, healthcare facilities meeting CMS and Joint Commission expectations, and federal contractors complying with insider threat program standards.


Insurance carriers have begun asking whether organizations maintain behavioral threat assessment programs. As liability markets tighten, expect BTAM capability to influence both coverage availability and premium pricing.



Taking Action Before Crisis Forces It


The pattern plays out repeatedly across the United States: an organization experiences workplace violence, investigations reveal warning signs were present but unrecognized, and the organization then invests in threat assessment capability—training, consultants, policies, teams.


All of that expertise was available before the incident.


Hawaii organizations can choose to be proactive rather than reactive. The training exists locally through University of Hawaii West Oahu. The research is clear about what works. Federal resources provide implementation frameworks through FEMA emergency management certifications and Department of Homeland Security guidance. The question isn't whether BTAM capability matters—it demonstrably does. The question is whether organizations will invest before tragedy forces their hand or after headlines and lawsuits leave no other choice.


Organizations serious about preventing targeted violence need consultants with formal BTAM training, not just traditional security experience. The distinction isn't semantic—it's the difference between responding to violence and preventing it before anyone gets hurt.

For more information about implementing comprehensive threat assessment programs, explore CrisisWire's threat assessment resources and latest threat intelligence insights.


📧 Need Professional BTAM-Trained Threat Assessment?


Contact CrisisWire for consultation from a specialist with completed BTAM training at University of Hawaii West Oahu, 20+ FEMA certifications, and 40 years of experience preventing violence across military, law enforcement, diplomatic, and civilian environments.


Available 24/7 for Hawaii organizations across Oahu, Maui, Kauai, and the Big Island. Learn more about comprehensive security services including workplace violence prevention, campus safety, and corporate security consulting.


About the Author


Warren Pulley is founder of CrisisWire, bringing 40 years of experience across military service (U.S. Air Force nuclear security and paralegal), law enforcement (12 years LAPD plus former private investigation background), diplomatic protection (U.S. Embassy Baghdad), corporate security (Fortune 500 executive protection, VP Security Operations), and university safety leadership (former Director at Chaminade University). He completed BTAM training at University of Hawaii West Oahu, holds 20+ FEMA certifications, and is the author of five books including The Prepared Leader, Threat Assessment Handbook, Campus Under Siege, Locked Down: The Access Control Playbook, and Uniformed Silence.


This article provides educational information about behavioral threat assessment. Organizations should consult qualified professionals for specific threat assessment needs.

Comments

Rated 0 out of 5 stars.
No ratings yet

Add a rating
bottom of page