The Myth of Delegated Security
True protection demands personal responsibility.
What do Iryna Zarutska’s murder in North Carolina, the killing of Charlie Kirk in Utah and the shooting of President Donald Trump in Pennsylvania have in common?
They highlight the fallacy of delegated security.
Many people don’t grasp the necessity of taking ownership of their personal security. We have been conditioned to believe it is the responsibility of law enforcement and security professionals who are obligated to protect us, or that we can purchase a service, program or device that will ensure our security. But the notion that we can rely solely on other people or items for protection is a myth that must be debunked.
Let’s be clear. Law enforcement and security professionals are valuable resources, but we are not omnipresent, omnipotent protective entities who can intervene in every situation or neutralize every security threat.
Until all of us realize that the good guys charging over the hill to save the day is a fantasy – and that ultimately your security rests on your shoulders – a serious protection gap will exist that only you can fix.
A Fundamental Misinterpretation
At its core, the myth of delegated security stems from a fundamental misinterpretation of what security really is. Many people envision it as a product that can be purchased, installed or activated and then left to operate on its own. Others perceive security as a static concept that can be effectively managed through one-size-fits-all procedures or delegated to third-party services. However, these oversimplified views overlook the fact that security isn’t an inconvenient distraction; it’s a complex, potentially lethal issue.
Security is protection against intentional harm that requires active participation and attention. It’s a process – an ongoing, active verb that represents a continuous cycle of vigilance, adaptation and effort. Security cameras, motion detectors, fences, badging systems and locks are tools. Law enforcement, guards, monitoring companies and consultants are resources. The challenge is to apply the right tools and utilize the right resources.
The reality is that it is all on you to develop and implement effective security and proactive protection. This is a crucial point to understand because when it comes to security – as recent tragic events have so painfully demonstrated – you must get it right every time. The assailant only needs to get it right once.
Flawed sociopolitical messaging is another factor fueling misconceptions. The use of security as a political football is so common that it has become cliché. Politicians have both exaggerated and minimized security threats. They have criticized, demonized and dismissed the importance of self-protection. They have praised law enforcement one moment and vilified them the next. This continually shifting political messaging creates confusion and fatigue.
The media generally offers little to no help on this issue, with its disempowering messages and misinformation discouraging people from taking personal responsibility. Press outlets have sensationalized threats, mocked self-protection attempts and portrayed security as a complex issue best left to experts.
Your Security is Up to You
Hubris – rooted in the erroneous assumption that we live in a serene, secure world – is often at the core of the myth of delegated security. Some people genuinely believe violence simply won’t happen to them, that if they refuse to accept the possibility of a threat, that threat does not exist.
However, a significant amount of lethargy and complacency are at play. People find comfort in believing that someone else is always protecting them. They assume every security issue is somehow being handled without their involvement. To them, complacency is far simpler and less stressful than acknowledging that evil exists and they need to assume responsibility for their own well-being.
Recent tragic events underscore the painful truth that depending solely on external protection is not a viable security strategy. From the time a critical incident begins until third-party help arrives, you must remain vigilant and prepared to protect yourself. You cannot successfully delegate the task to others. Ultimately, your security is up to you.
About the Author: Jim Willis, M.Sc., CMAS, CHS-V, is the president of InDev Tactical, a security training and consulting firm. He is a utility engineer, credentialed homeland security specialist and anti-terrorism expert. To discuss utility-focused security training or consulting assistance, contact Jim at 703-623-6819 or jim.willis@indevtactical.net.