This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more.
This Website Uses Cookies
By closing this message or continuing to use our site, you agree to our cookie policy. Learn More
This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more.
Subscribe
  • Sign In
  • Create Account
  • Sign Out
  • My Account
  • Home
  • News
    • Security Newswire
    • Technologies
    • Security Blog
    • Newsletter
    • Web Exclusives
  • Columns
    • Career Intelligence
    • Security Talk
    • The Corner Office
    • Leadership & Management
    • Cyber Tactics
    • Overseas and Secure
  • Management
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • More
  • Physical
    • Access Management
    • Video Surveillance
    • Identity Management
    • More
  • Cyber
  • Sectors
    • Education: University
    • Hospitals & Medical Centers
    • Critical Infrastructure
    • More
  • Exclusives
    • Security 500 Report
    • Most Influential People in Security
    • Top Guard and Security Officer Companies
    • The Security Leadership Issue
    • Annual Innovations, Technology, & Services Report
  • Events
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
    • Security 500 West
  • Resources
    • The Magazine
      • This Month's Issue
      • Digital Edition
      • Archives
      • Professional Security Canada
    • Videos
      • ISC West 2018
      • ASIS 2017
    • Photo Galleries
    • Polls
    • Classifieds & Job Listings
    • White Papers
    • Mobile App
    • Store
    • Sponsor Insights
  • InfoCenters
    • Video Management Systems
  • Contact
    • Editorial Guidelines
  • Advertise
Home » The Dangers from Knife and Weapon Slashing
Physical SecurityTop Guard and Security Officer Companies

The Dangers from Knife and Weapon Slashing

Slashing Areas
The most vulnerable targets on a human body for ‘slashing.'
January 23, 2019
Robert Kaiser
Reprints
No Comments

On Monday morning, April 18, 2018, an 8 year-old boy left home with a kitchen knife and walked into his central Minnesota elementary school. Minutes later, he slashed three fellow pupils, ages 8, 9 and 13 years. 

It was an example of how once again, a perpetrator doesn't need intense knife training to cause damage to others, and homeland security professionals or enforcement agents must accept that anyone carrying a knife represents a real danger, even if he/she appears that they don't have a clue as to what they are doing.

Those who know how to effectively use a knife understand that with knife combat, stabbing and blood loss will not necessarily and quickly incapacitate an attacker. Combat expert and author Michael Janich has done excellent research on this topic, and after careful analysis of forensic data, modern trauma medicine and consulting with experts on this subject matter, Janich’s research concluded the same sentiments.

In an article, “The Realities of Knife Stopping Power”, Janich discusses a case where a combatant received 50 stab wounds and still managed to fight for five minutes before collapsing due to collective blood loss.

In a self-defense situation (or in a situation where your operation requires you to incapacitate an assailant), every second counts. If you wound an attacker, but he still has the ability to do the same to you, you still may die.

When/if someone is knowledgeable enough and his intention is to immediately incapacitate you, it's important to understand human anatomy.

To hold anything in your hand, such as a baton, CS gas or shield (if you are a police officer), the muscles of your forearm contract and pull on the flexor tendons, which pass through your wrist and are attached to your fingers. If someone cuts or slashes the tendons or the muscles that power them, this connection is broken and your hand will no longer be able to close or to hold your baton, CS gas, shield or anything else.

This concept applies to all muscle groups, tendons and limbs. If someone cuts or slashes the key tissues responsible for moving a limb, the attacker would most likely disable or at least severely hinder your limb’s function. Sometimes this is referred to as "biomechanical cutting."

Therefore, your flexors tendons or muscles of the forearm, the biceps and triceps muscles of your upper arms, and the major quadriceps muscles just above the knee, require reliable and effective protection from a deliberate attack or cut.

Just above the knee, where the muscles narrow and connect to the patellar tendon, this area is typically covered by a just single layer of trousers material. It is a comparatively large target, and if someone is close enough to reach your body, that person will clearly also be close enough to reach your quadriceps. Cutting this target is called "mobility kill", and it means that you will no longer be able to effectively defend yourself.

Although many will claim that this approach doesn’t work, historical evidence from sources suggests differently. Perhaps the best-known reference comes from the Filipino martial arts. Their key tactic is called “defanging the snake”… or targeting the attacking limb to destroy its structure and function. According to their symbolism, the weapon is the “fang” and the arm wielding it is the “snake.” Removing the fang from the snake immediately eliminates the primary threat to the defender -- the attacker’s weapon.

In the traditional Filipino knife arts, one of the prime objectives is to cut the attacker’s wrist or forearm. The goal is to sever the flexor tendons that connect the forearm muscles to the fingers, destroying the attacker’s ability to grip his weapon. Cutting the muscles on the inside of the forearm can produce the same effect.

Can you see the risks involved when confronted by someone wielding a knife? Most are concerned about being stabbed, but many trained specialists might have other plans, and that’s when slash resistant clothing makes sense.

Please refer to the photo included with this article to understand the most vulnerable "slashing targets."  Each "successful" cut or slash can or will either lead to rapid blood loss and subsequent death (most likely caused by shock and blood loss, or dramatically decrease your mobility.) The photo does not feature all targets, but is a selection of some of the key targets of the front of a human torso. 

  1. The side of the neck and throat just about even with the Adam’s apple. This area contains the Carotid Artery and Jugular Vein. If either is cut the attacker will bleed to death very rapidly. The Carotid is approximately 1.5″ below the surface of the skin, and if severed unconsciousness, will result in death in approximately 5-15 seconds.
  2. A powerful cut to the outer side of the Pectoral muscle can potentially sever the cephalic vein, which will bleed profusely.
  3. A powerful cut across the front of the Deltoid muscle may sever the cephalic vein.
  4. A slashing cut across the biceps can disable any motion of the arm and can cause rapid blood loss.
  5. A slashing cut across the inside of the elbow joint. In addition to the numerous veins, this area also contains the ligaments that enable motion in the forearm.
  6. A horizontal cut across the neck and throat will not only sever your Jugular Vein and cause death, but will also cut the trachea and ligaments that control movement of the head.
  7. A powerful slash across your Pectoral muscle will destroy your ability to throw punches with any power.
  8. A powerful vertical slash, leading to the penetration of the abdominal wall, will result in loss of motion and possible disembowelment.
  9. A powerful horizontal slash to the abdomen, leading to the successful penetration of the abdominal wall, will result in loss of motion and possible disembowelment.
  10. A more than one-inch penetrating slash to the inside of the forearm between the radius and ulna bones will sever the radial artery (this artery runs across the top of the radius bone 2-4 inches behind the base of your thumb). Severing the radial artery can result in unconsciousness in as little as 30 seconds, and death in as little as two minutes.
  11. The Brachial artery runs along the inside of your arms. This artery is deep, but severing it will result in unconsciousness in as little as 15 seconds, and death in as little as 90 seconds.

We are extremely passionate about safety, and our mission is to let the world know that personal safety can be improved dramatically without compromising the ability to effectively operate and function. 

Subscribe to Security Magazine

Robert-kaiser

Robert Kaiser is the CEO of PPSS Group. During his operational career, Robert has been involved in, or responsible for countless security operations in some of the most challenging environments on foreign soil. His hands on approach and experience working in these environments has proven to be invaluable during the development of SlashPRO® Slash Resistant Clothing. He is a widely respected expert in body armor, aiming to effectively help protect homeland security professionals from firearms, edged weapons and blunt force trauma.

Related Articles

1200 Weapons Taken from NYC Students Last School Year

The Danger Within: Confronting the Insider Threat

Report Lists the Most Dangerous Cities in the US

Hazards Ahead: The Dangers of Runaway Technology

Related Products

Optimizing Social Media from a B2B Perspective

Risk Analysis and the Security Survey, 4th Edition

The Database Hacker's Handbook: Defending Database Servers

The Web Application Hacker's Handbook: Discovering and Exploiting Security Flaws 2E

Related Events

From Here to There - Advancing in the Security Field

The Security 500 Conference

A Changing Tide: The Importance of Video Data Management in Enterprise Environments

The Amphion Forum

You must login or register in order to post a comment.

Report Abusive Comment

Subscribe For Free!
  • Print & Digital Edition Subscriptions
  • Security eNewsletter & Other eNews Alerts
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Popular Stories

security-center

The Top 5 Reasons Why Your Security Program Needs Intelligence Personnel

Globe

Which Countries Have the Worst and Best Cybersecurity?

SEC0219-cover-Feat-slide_900px

The Road to CSO: Meet Microsoft's New Security Leader

password1-900px.jpg

New Vulnerabilities Found in Top Password Managers

password1-900px.jpg

How Americans Leave their Personal Info Open to Thieves

20180226SEC_DataminrFeb_360x184customcontent

Events

February 26, 2019

Harness Real-time Public Information to Improve Active Shooter Response

Corporate security teams hope never to respond to an active shooter situation. But given today’s realities, companies spend a great deal of time developing guidelines, holding training sessions, and carrying out drills to ensure that their staff will be prepared in case an active shooter event occurs.
March 7, 2019

Finding Your Physical Security Blind Spots with Artificial Intelligence (A.I.)

Security infrastructures are undergoing a digital transformation with growing adoption of intelligent access control, video surveillance and analytics as well as IoT devices and sensors – generating more data to than ever before. Harnessed properly with artificial intelligence and a risk-based model, this data can be exposed and leveraged to improve life safety, minimize risk and increase operational efficiency.
View All Submit An Event

Poll

Employee Background Screening

How Often Does Your Organization Conduct Background Screening on Employees?
View Results Poll Archive

Products

Effective Security Management, 6th Edition

Effective Security Management, 6th Edition

 Effective Security Management, 5e, teaches practicing security professionals how to build their careers by mastering the fundamentals of good management. Charles Sennewald brings a time-tested blend of common sense, wisdom, and humor to this bestselling introduction to workplace dynamics. 

See More Products
Security-500

Security Magazine

SEC-Feb-2019-Cover_144px

2019 February

In Security’s February 2019 issue, meet Brian Tuskan, Microsoft's New Security Leader. Learn how he has used technology, his reputation, networking and a desire to help people to become Microsoft’s new CSO. Read about the Next Generation of White Hat Hackers, How to Evaluate Security's Role, and more.

View More Subscribe
  • More
    • Market Research
    • Custom Content & Marketing Services
    • Security Group
    • Editorial Guidelines
    • Privacy Policy
    • Survey And Sample
  • Want More
    • Subscribe
    • Connect
    • Partners

Copyright ©2019. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing