Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Physical Security

Cluster-in-Chief

Correcting Violence Management Failures

By Christopher A. Hertig
police1-900px.jpg
August 13, 2019

Mass violence, primarily shootings, is growing and can only continue to do so. Some of the factors giving rise to it such as mental illness, the internet, and the copycat phenomenon that we have no real control over. That said, as security professionals, we have a professional obligation to analyze where the failures are in order to take corrective action to mitigate future events. Good ethics is also good branding. If we are seen as the initiators of safe measures, it will be positive.

What are our mass violence failures?

First, I believe that media are failing us as they sensationalize these mass violence events. The focus on heroics and first responders after an event takes our eye off the ball. Effective responses require immediate action. “Initial Responders” need to be incorporated into the equation. We saw Walmart employees save multiple lives in the El Paso situation. At the same time, we continually see security officers saving people, but we downplay it. Security leaders and professional organizations should take the media to task for this. It’s a public safety issue, plain and simple.

In addition, the media continues to publish the scrawlings of these active shooters and calls them “manifestos”. Our Canadian brethren began referring to lone wolves as “lone fools” a few years ago. Protection professionals, as well as media folks, need to eliminate any reference to mad dogs that could be construed as enhancing their brand.

Another issue that we continue to deal with with regards to mass violence is reliable information. My Criminology professor in college used to say that “figures lie and liars figure”. He was painfully correct. In dealing with mass violence, there are no reliable databases. Existing statistics only include incidents with multiple fatalities, which is the tip of the tip of the iceberg. But the loss of empirical data doesn’t end there: aside from the exemplary efforts of PrivateOfficer.com, there is no entity that tracks security officers who are murdered in the line of duty. This gap is appalling by itself, but even more troubling as it relates to mass violence. We can’t manage what we can’t measure.

Third, a threat reporting system is not a threat management system. School security expert Rick Shaw posits that the failures aren’t in collecting threats; they are in making sure they get to the right people and that they are correctly acted upon. As we’ve seen this movie before, it would be prudent to initiate and maintain an audit process for our threat management systems.

Fourth, time is not on our side! Violence is fast, and most people have no concept of this. There’s a real gap here! When under attack an individual, has at most, 3 seconds to act. Defensive Tactics guru Tony Blauer  has spent years studying how people naturally react to an assault.He’s developed programs to incorporate Mother Nature. In active shootings, many people hide under tables and desks. This must be studied and worked with as Blauer has done. The Force Science Institute also has some important information regarding reaction time. Therefore, we need to fully understand the dimension of time before developing future countermeasures.  

In addition, Police also need to incorporate security personnel into their active shooter planning. They need to be called on this if diplomatic outreach to them is unsuccessful. This is unconscionable; it goes against the “protect and serve” brand that law enforcement agencies have strived to project. It also opens a very wide door for negligence actions.

Last, let's talk about civil liability. Property owners, security service providers and police agencies are facing serious negligence actions with some of these events. Institutionalized arrogance and complacency magnifies the vulnerability. Plaintiffs will correct many of the protection failures over time, as will insurance carriers. Perhaps viewing this through the eyes of a plaintiff’s attorney will provide the optimal audit process.

I've developed the CANE Model with regards to mass violence events.

The CANE Model is an “instructional roadmap” or “overlay”. It aids in ensuring people are instructed in what they need to do before and during an attack. Victim-centered, it helps ensure that all the bases are covered. It can/should be incorporated or overlaid with other programs such as ALICE, or Run/Hide/Fight and others. It also helps to provide a realistic use of those critical seconds when action must be taken.

C is for Cover, Concealment, Calming. Cover (shielding), Concealment (hiding) and Calming (defusing the aggressor)

A is for Assessment (pre-attack such as threats, fixation with violence, etc.) or attack (weapons, unusual gait, accomplices)

N is for  Notification Properly communicating when an attack happens. Tactical communications which can be bundled within existing communications training.

E is for Escape (run, sneak away,)  or Engage (fight)

CANE enables tailoring in the face of time and budgetary constraints.

KEYWORDS: active shooter mass shooting mass shootings mass violence

Share This Story

Sec1111 edu inbody 150px

Chris Hertig is a retired college professor who has written and taught about professional development of security personnel, violence management and the history of policing and security for 4 decades. Hertig is a Certified Protection Professional as well as a Certified Protection Officer Instructor. He is an active member of several professional organization including ASIS, IFPO and ILEETA.

Blog Topics

Security Blog

On the Track of OSAC

Blog Roll

Security Industry Association

Security Magazine's Daily News

SIA FREE Email News

SDM Blog

Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

Pills spilled

More than 20,000 sensitive medical records exposed

Laptop in darkness

Verizon 2025 Data Breach Investigations Report shows rise in cyberattacks

Coding on screen

Research reveals mass scanning and exploitation campaigns

White post office truck

Department of Labor Sues USPS Over Texas Whistleblower Termination

Computer with binary code hovering nearby

Cyberattacks Targeting US Increased by 136%

2025 Security Benchmark banner

Events

May 22, 2025

Proactive Crisis Communication

Crisis doesn't wait for the right time - it strikes when least expected. Is your team prepared to communicate clearly and effectively when it matters most?

September 29, 2025

Global Security Exchange (GSX)

 

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing