I’ve been in internal training this week and will be for the remainder of the week. Now while this is listed as “internal” training, it’s merely a class dedicated to company employees for this presentation. Normally this class is given to our customers and people who use our products in the power system.
I got home tonight and saw the following on twitter and proceeded to laugh hysterically.
Now you may not know why I started laughing hysterically so let me explain. You see 99.9% of the time when there is a question involving protection on a power system the correct answer begins with the following statement.
Well that depends…
For instance when protecting a transmission line, the type of protection used will depend specifically on the characteristics of the system involved. Numerous assumptions must be made in order to create the correct solution.
In this case, the number of bullets required to stop an assailant, the correct answer is, “well that depends…”
- What caliber was the assailant shot with?
- What type of bullet were they shot with?
- Where did the bullet strike the assailant?
All of these are critical for determining the number of shots required. If it always took 2-3 shots, I doubt the .22 LR would kills as many people as it does merely by accidental discharge. The fact is a lot of the lethality of a bullet is whether or not it connects with a major blood supply source or organ. Penetration is what determines if a bullet is able to achieve access to a lethal area.
So, the correct answer regarding the number of shots to take down an attacker is, “It depends”. And honestly, when it comes to modern pistol cartridges, the arguments are mainly pointless.
Barron is the owner, editor, and principal author at The Minuteman, a competitive shooter, and staff member for Boomershoot. Even in his free time he’s merging his love and knowledge of computers and technology with his love of firearms.
He has a BS in electrical engineering from Washington State University. Immediately after college he went into work on embedded software and hardware for use in critical infrastructure. This included cryptographic communications equipment as well as command and control devices that were using that communications equipment. Since then he’s worked on just about everything ranging from toys, phones, other critical infrastructure, and even desktop applications. Doing everything from hardware system design, to software architecture, to actually writing software that makes your athletic band do its thing.