Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
ColumnsManagementSecurity Talk ColumnSecurity Leadership and Management

Why We're Milling, and Why It's Wrong

By Diane Ritchey
Security Talk Default
June 1, 2018

In an emergency situation, such as an active shooter, people will take several actions. They will seek information, they will prepare for evacuation and evacuate, and they will inform and help others. And then there’s milling.

The theory is coined by Thomas E. Drabek, Ph.D., Department of Sociology and Criminology at the University of Denver, to explain how during an emergency, people will experience such emotional trauma that they literally freeze – they psychologically and physically shut down. The event is so out of the norm for them in their day-to-day reliance upon norms that they are unable to function. Therefore, they may develop new norms and behavior patterns to guide their actions, which includes not acting. According to Dr. Drabek, “milling is most pronounced when existing organizations and institutional procedures are inadequate or inappropriate for the situation at hand.”

The solution, says threat management and workplace violence expert Dr. Laurence Barton, is that employers should encourage workers to trust their instincts and remain “situationally aware” on the job, instead of solely focusing on shooting drills and tactical exercises. Dr. Barton is one of the world’s leading experts in crisis management and threat assessment. He serves as the Distinguished University Professor of Crisis Management and Public Safety at the University of Central Florida. For the past decade, Dr. Barton has remained the highest rated instructor at The FBI Academy and U.S. Marshals Service, where he teaches three courses in threat evaluation to federal and state law enforcement. He stages high impact simulations and scenarios for corporate teams on issues including the insider threat, radicalization, data breaches and active shooter scenarios.

Laurence Barton - Security Magazine

Dr. Laurence Barton

Every human being at birth is given a sense of intuition, but is that being taught in security drills and lockdown training?

Dr. Barton advocates enterprise security adopting flexible emergency plans and policies that empower employees to trust their intuition, rather than static plans. For example, instead of telling workers to evacuate the building and meet up at another location, Barton suggests ordering employees to evacuate and keep moving until they feel safe. Static plans can endanger lives, in the event of unforeseen circumstances, such as an attacker who is familiar with the contingency plans. A flexible plan should encourage individuals to do whatever they need to do to make themselves safe.

Dr. Barton also notes that workers struggle to follow their intuition at work, because they are fearful of appearing paranoid in the workplace. He has interviewed numerous survivors of violent workplace incidents, many of whom describe milling and not acting on the opportunity to flee. A situationally-aware person, he says, would identify a potential threat, such as loud popping sounds, trust their instincts and take decisive action, such as evacuating the building.

“I’m not saying that what security is doing is wrong,” he says, “but there’s a high emphasis on surveillance and other security products, while I believe that the best security measures are strategic and counterbalanced. Most people are innocent and don’t believe that anything will happen to them when they go to work, so security needs to create awareness without creating paranoia. It’s amazing at the amount of money that is spent on executive protection and on cyber threats, but so little on just educating the rank and file,” Dr. Barton notes.

For example, he says, every human being at birth is given a sense of intuition, but is that being taught in security drills and lockdown training? “A woman who is on the 30th floor in a building in Chicago…the elevator opens and there’s a man on that elevator, alone…does she get into the elevator with him, or does her intuition kick in and she decides against it? If she’s situationally aware, she will question the decision, either way. We all need to have that.”

“We still have a massive amount of work to do [with physical security],” he adds. “Implementing security turnstiles with an ID badge is a very effective form of physical security, but people still piggyback every day. We are too gracious, and we want to be polite. But that’s also a great example of where the employer needs to be more of an enforcer. For example, tell employees: ‘If you don’t badge in and out every day, after three infractions, we’re going to have an employment discussion.’ Security needs to ratchet it up in terms of the dialogue. In Europe you don’t find that at all. Employees stop, they close the door and the next person badges in and enters.”

Overall, Dr. Barton advocates a strong combination of security technology and employee awareness. “I do see more employees wanting awareness training, and that’s a positive sign,” he says. “Employees should be their own directors of security so that their first instinct when they hear shots fired or an alarm go off is not to stay put. They need to be taught, over and over, to be aware, scatter, help others who are in distress and to get out of harm’s way. Milling is not an option.”

KEYWORDS: active shooter emergency response evacuation security training

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Diane 2016 200

Diane Ritchey was former Editor, Communications and Content for Security magazine beginning in 2009. She has an experienced background in publishing, public relations, content creation and management, internal and external communications. Within her role at Security, Ritchey organized and executed the annual Security 500 conference, researched and wrote exclusive cover stories, managed social media, and authored the monthly Security Talk column.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Security Leadership and Management
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Cybersecurity
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    New Security Technology
    By: Charles Denyer
Manage My Account
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

Popular Stories

Rendered computer with keyboard

16B Login Credentials Exposed in World’s Largest Data Breach

Verizon on phone screen

61M Records Listed for Sale Online, Allegedly Belong to Verizon

Security’s 2025 Women in Security

Security’s 2025 Women in Security

Red spiderweb

From Retail to Insurance, Scattered Spider Changes Targets

blurry multicolored text on black screen

PowerSchool Education Technology Company Announces Data Breach

Events

August 7, 2025

Threats to the Energy Sector: Implications for Corporate and National Security

The energy sector has found itself in the crosshairs of virtually every bad actor on the global stage.

August 27, 2025

Risk Mitigation as a Competitive Edge

In today’s volatile environment, a robust risk management strategy isn’t just a requirement—it’s a foundation for organizational resilience. From cyber threats to climate disruptions, the ability to anticipate, withstand, and adapt to disruption is becoming a hallmark of industry leaders.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Tactical medical training

    Why You Need Tactical Medical Training

    See More
  • Security Talk Default

    6 Reasons Why Your Enterprise Needs a CRO

    See More
  • SEC0220-talk-Feat-slide1_900px

    Why We Need to Overcome ‘Everyday Blindness’

    See More

Related Products

See More Products
  • operations center.jpg

    Security Operations Center Guidebook

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing