Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Top Guard and Security Officer CompaniesPhysical Security

The Dangers from Knife and Weapon Slashing

By Robert Kaiser
Slashing Areas
The most vulnerable targets on a human body for ‘slashing.'
January 23, 2019

On Monday morning, April 18, 2018, an 8 year-old boy left home with a kitchen knife and walked into his central Minnesota elementary school. Minutes later, he slashed three fellow pupils, ages 8, 9 and 13 years. 

It was an example of how once again, a perpetrator doesn't need intense knife training to cause damage to others, and homeland security professionals or enforcement agents must accept that anyone carrying a knife represents a real danger, even if he/she appears that they don't have a clue as to what they are doing.

Those who know how to effectively use a knife understand that with knife combat, stabbing and blood loss will not necessarily and quickly incapacitate an attacker. Combat expert and author Michael Janich has done excellent research on this topic, and after careful analysis of forensic data, modern trauma medicine and consulting with experts on this subject matter, Janich’s research concluded the same sentiments.

In an article, “The Realities of Knife Stopping Power”, Janich discusses a case where a combatant received 50 stab wounds and still managed to fight for five minutes before collapsing due to collective blood loss.

In a self-defense situation (or in a situation where your operation requires you to incapacitate an assailant), every second counts. If you wound an attacker, but he still has the ability to do the same to you, you still may die.

When/if someone is knowledgeable enough and his intention is to immediately incapacitate you, it's important to understand human anatomy.

To hold anything in your hand, such as a baton, CS gas or shield (if you are a police officer), the muscles of your forearm contract and pull on the flexor tendons, which pass through your wrist and are attached to your fingers. If someone cuts or slashes the tendons or the muscles that power them, this connection is broken and your hand will no longer be able to close or to hold your baton, CS gas, shield or anything else.

This concept applies to all muscle groups, tendons and limbs. If someone cuts or slashes the key tissues responsible for moving a limb, the attacker would most likely disable or at least severely hinder your limb’s function. Sometimes this is referred to as "biomechanical cutting."

Therefore, your flexors tendons or muscles of the forearm, the biceps and triceps muscles of your upper arms, and the major quadriceps muscles just above the knee, require reliable and effective protection from a deliberate attack or cut.

Just above the knee, where the muscles narrow and connect to the patellar tendon, this area is typically covered by a just single layer of trousers material. It is a comparatively large target, and if someone is close enough to reach your body, that person will clearly also be close enough to reach your quadriceps. Cutting this target is called "mobility kill", and it means that you will no longer be able to effectively defend yourself.

Although many will claim that this approach doesn’t work, historical evidence from sources suggests differently. Perhaps the best-known reference comes from the Filipino martial arts. Their key tactic is called “defanging the snake”… or targeting the attacking limb to destroy its structure and function. According to their symbolism, the weapon is the “fang” and the arm wielding it is the “snake.” Removing the fang from the snake immediately eliminates the primary threat to the defender -- the attacker’s weapon.

In the traditional Filipino knife arts, one of the prime objectives is to cut the attacker’s wrist or forearm. The goal is to sever the flexor tendons that connect the forearm muscles to the fingers, destroying the attacker’s ability to grip his weapon. Cutting the muscles on the inside of the forearm can produce the same effect.

Can you see the risks involved when confronted by someone wielding a knife? Most are concerned about being stabbed, but many trained specialists might have other plans, and that’s when slash resistant clothing makes sense.

Please refer to the photo included with this article to understand the most vulnerable "slashing targets."  Each "successful" cut or slash can or will either lead to rapid blood loss and subsequent death (most likely caused by shock and blood loss, or dramatically decrease your mobility.) The photo does not feature all targets, but is a selection of some of the key targets of the front of a human torso. 

  1. The side of the neck and throat just about even with the Adam’s apple. This area contains the Carotid Artery and Jugular Vein. If either is cut the attacker will bleed to death very rapidly. The Carotid is approximately 1.5″ below the surface of the skin, and if severed unconsciousness, will result in death in approximately 5-15 seconds.
  2. A powerful cut to the outer side of the Pectoral muscle can potentially sever the cephalic vein, which will bleed profusely.
  3. A powerful cut across the front of the Deltoid muscle may sever the cephalic vein.
  4. A slashing cut across the biceps can disable any motion of the arm and can cause rapid blood loss.
  5. A slashing cut across the inside of the elbow joint. In addition to the numerous veins, this area also contains the ligaments that enable motion in the forearm.
  6. A horizontal cut across the neck and throat will not only sever your Jugular Vein and cause death, but will also cut the trachea and ligaments that control movement of the head.
  7. A powerful slash across your Pectoral muscle will destroy your ability to throw punches with any power.
  8. A powerful vertical slash, leading to the penetration of the abdominal wall, will result in loss of motion and possible disembowelment.
  9. A powerful horizontal slash to the abdomen, leading to the successful penetration of the abdominal wall, will result in loss of motion and possible disembowelment.
  10. A more than one-inch penetrating slash to the inside of the forearm between the radius and ulna bones will sever the radial artery (this artery runs across the top of the radius bone 2-4 inches behind the base of your thumb). Severing the radial artery can result in unconsciousness in as little as 30 seconds, and death in as little as two minutes.
  11. The Brachial artery runs along the inside of your arms. This artery is deep, but severing it will result in unconsciousness in as little as 15 seconds, and death in as little as 90 seconds.

We are extremely passionate about safety, and our mission is to let the world know that personal safety can be improved dramatically without compromising the ability to effectively operate and function. 

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Robert kaiser

Robert Kaiser is the CEO and Founder of PPSS Group, a U.K. headquartered company specializing in design, production and supply of high-performance body armor. Robert and his senior team all have significant level of operational frontline experience in military, law enforcement or homeland security. His written word has been featured in several industry-leading, international publications.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Security Education & Training
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

The Lourve

The Lourve Heist: What Was the State of the Museum’s Security?

Office supplies

Security Leaders Share Why 77% Organizations Lose Data Due to Insider Risks

American Airlines

Security Leaders Discuss Cyberattack on American Airlines Subsidiary

The 2025 Security Benchmark Report

The 2025 Security Benchmark Report

Going Down with the Ship

Going Down with the Ship

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

November 13, 2025

Inside the 2025 Security Benchmark Report

The 2025 Security Benchmark Report unveils the top trends CSOs and enterprise security executives are facing in today’s current climate and how each of these trends could potentially impact the enterprise’s global reputation with the public, governments, and business partners. 

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • police helmet

    Blunt force: Examining the underreported security threat

    See More
  • slashpro-1

    How Slash Resistant Clothing Can Help Protect Security Professionals

    See More
  • multicolor wires plugged in

    The hidden dangers of ‘low risk’ data

    See More

Related Products

See More Products
  • 9780367221942.jpg

    From Visual Surveillance to Internet of Things: Technology and Applications

  • Optimizing Social Media from a B2B Perspective

  • The Complete Guide to Physical Security

See More Products

Events

View AllSubmit An Event
  • January 6, 2011

    From Here to There - Advancing in the Security Field

    Learn the three components that are critical for your advancement.
View AllSubmit An Event
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing