Behavioural strategies during business robberies

March 2003 Security Services & Risk Management

Despite today’s highly technological world where security systems and devices play a significant role in protecting us against the threat of crime, we must not lose sight of the fact that our behaviour is often determinant and may, in certain situations, mean the difference between life and death.

This is particularly true when we are faced by a group of dangerous and well-armed criminals demanding that we hand over all our money and valuables.

Some facts on commercial robberies in South Africa

According to recent information released by the Robbery Intelligence Desk of the South African Police Service for the period from April to August 2002, there are high levels of reported armed robberies and increased concern at the aggravating circumstances in which the crime is committed.

The most targeted businesses during the above-mentioned period were supermarkets with 54 robbery events, followed by clothing stores (33), jewellery stores (18) and furniture stores (10). Most of these businesses are situated in shopping complexes and central business districts. The highest incidence of robbery against supermarkets could possibly be linked to the time risk factor, in that they are usually open until late.

Hot spot provinces identified during the said period included Western Cape with 34 recorded incidents, followed by Gauteng (28), KwaZulu-Natal (11) and Free State (10).

There is a clear indication that most robberies occur during opening time (07:00-09:30) in the case of clothing, jewellery and furniture stores; whereas at supermarkets the preferred time is at closing between 20:00 and 22:00. Most robbery attacks are carried out over weekends, ie, Fridays, Saturdays and Sundays. This is probably due to the criminals' perception that, over weekends, larger amounts of money are available due to restricted banking hours.

A brief description of the criminal modus operandi indicates that the perpetrators usually gain entrance by posing as customers; act in groups of between one and eight persons; hold staff and customers at gun point, tie them up or lock them in a storeroom; gain access to where the cash and valuables are kept by threatening a specific member of staff (usually the safe key holder) and escape from the scene either on foot or in a hi-jacked or stolen motor vehicle.

How can we behave during and immediately after a robbery attack?

Because criminals can rely on the surprise factor, ie, choosing time, place and method of attack, it is possible that, in spite of all preventative measures, we may fall victim to an armed robbery.

Armed robbery is a violent crime, committed by means of intimidation or actual physical violence. It is always ready to degenerate into other extreme forms of criminal behaviour, such as assault with grievous bodily harm, rape and even murder.

According to criminological studies conducted in the USA by Wright and Decker (1997), which involved interviewing robbers in a dangerous field research, when confronted by armed robbers a victim should immediately co-operate with the robbers and avoid staring at them during the robbery event.

Furthermore, additional research conducted in SA by the Institute for Security Studies in 2000, found that the victim's reaction during the robbery, usually determines whether a weapon will be used or not. Physical or verbal resistance to a robbery makes it more likely that the robbery will fail, but substantially increases the risk of injuries to the victim.

There are obvious reasons to be worried about such an eventuality. However, we should not accept this as 'passive victims', as this attitude allows criminals to act freely and achieve their goals with impunity. On the contrary, much can be done to prevent robbery and, in the event of its occurrence, we should become 'active victims', in order to avoid further victimisation (serious injuries and even death) and assist the police in putting the culprits behind bars.

During a robbery it is vital for the victims to avoid irrational forms of behaviour that may seriously compromise theirs and others' safety. The following behavioural strategies can be adopted:

* Safeguard lives: your priority at this very moment is to safeguard your life and the lives of others.

* Do not offer resistance and stay calm: in the event of a robbery, do not offer any resistance. Stay calm and obey the robber(s)' orders without hesitation. Do not think that by doing so, you are a coward.

* Obey orders: robbers want to complete their crime in the shortest possible time in order to avoid apprehension, that is why it is necessary to comply with their demands. They may turn violent if one delays their action.

* Avoid abrupt movements: hold your hands well in sight without making any sudden action which may cause the robber(s) to react with violence, such as for instance by trying to reach for a panic button or a firearm.

* Avoid provocative actions: an attitude of defiance or the passing of provocative remarks may cause a reprisal by the robbers. This behaviour will only draw the criminal's attention and seriously increase the risk of you being further victimised.

* If safe to do so, activate panic system: activate the emergency 'panic' button only if you are absolutely sure that the robber(s) cannot see you in the process, as when, for instance, a panic button situated in a strategic position may be reached with the action of a knee or foot.

* Concentrate your attention on the physical features of the robber(s): features such as gender, race, age, height, weight, hair colour and style, eye colour and facial hair are all important. In the event of a confrontation by more than one robber, try to memorise the features of only one in particular. By doing so, you will be able to furnish the police with sufficient details which will help them reconstruct a reliable identikit of the criminal(s), which will facilitate their investigations.

* Do not, however, stare at the robber(s): do not stare at the robber(s) as this may cause him/them to react violently.

* Memorise as many particulars as possible, such as the presence of scars and tattoos which may, however, be part of the criminal's disguising tactics. The type of clothing and items such as jewellery worn by the robber(s), as well as the type of weapons are also important.

* Pay attention to the criminal's behaviour: bodily movements, language used, slang, accent and tone of voice are also important aspects which can help the police obtain a behavioural typology or modus operandi of the criminal(s), thanks to which the police may link different robberies to a single robber or group of robbers with a similar modus operandi.

* Do not hinder the robber(s) while escaping: the time when the robber(s) escapes the scene of the crime is critical; do not attempt to obstruct his way as this may have fatal consequences. Your primary consideration must be the preservation of your safety, and the safety of your colleagues or clients who may happen to be inside the premises at the time of the robbery.

* In the event of a shoot-out: a quick police or security reaction may cause a shoot out with the criminals; in such a case, immediately look for cover behind a counter or any object which may be utilised to protect yourself. In any event, throw yourself to the ground in order to reduce the size of your body; protect your head from stray or ricochet bullets or any fragment caused by them, by wrapping your arms around it.

Immediately after the robbery

The time immediately after the robbery is to be considered as vital for a positive outcome of a police investigation. In fact it can be stated that our actions after a robbery may well make the difference between a successful or unsuccessful outcome. Some important rules of behaviour which should be adopted are as follows:

* Do not rush after the robbers: there have been cases where marksmen have been used to kill any pursuers on the spot.

* Approach exit with caution: once the robber(s) has left, approach the exit with extreme caution and try to identify their getaway vehicle and escape route, the make of the vehicle, the colour, the number plate and the number of persons on board.

* Protect the crime scene: extremely important is the preservation and protection of the crime scene. Do not interfere with the evidence left by the criminal(s) such as, for instance, possible fingerprints on glass, shoe prints on the floor, or different objects which have fallen during the escape, eg a packet of cigarettes, a handkerchief, ammunition or spent cartridges. Do not allow anybody, with the exception of the police, to approach the crime scene or tamper with the evidence, which may prove vital for the identification and conviction of the offender(s).

* Do not discuss details of the robbery: refrain from discussing with other witnesses about the dynamics of the robbery as this could create confusion and lead to a misrepresentation of the events: speak to the police only.

* Compile a crime incident information form: after the robbery, when the memory of the events is still fresh, compile a 'Crime Incident Information Form' in order to provide police with a valuable source of information in the shortest possible period of time. Always keep a copy of this form for future reference.

Conclusion

It must be emphasised that the behavioural strategies discussed above are applicable not only in the workplace, but also in other daily routine activities, eg during leisure time. Through the adoption of rational behavioural responses, business owners (or individuals) can defend themselves against potentially life threatening situations such as a robbery event.

ABOUT THE AUTHOR

Elio Zannoni is a criminologist and specialist in crime risk factors and prevention strategies. He can be contacted at International Threat Analysis - a division of Corporate Confidential Solutions - a company involved in the analysis of crime threats and risks worldwide on 011 792 3739, fax: 011 791 6352, e-mail: ita@c-c-s.co.za





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

“This Is Theft!” SASA slams Mafoko Security
News & Events Security Services & Risk Management Associations
The Security Association of South Africa (SASA) has issued a stark warning that the long-running Mafoko Security Patrols scandal is no longer an isolated case of employer misconduct, but evidence of a systemic failure in South Africa’s regulatory and governance structures.

Read more...
Making a mesh for security
Information Security Security Services & Risk Management
Credential-based attacks have reached epidemic levels. For African CISOs in particular, the message is clear: identity is now the perimeter, and defences must reflect that reality with coherence and context.

Read more...
Privacy by design or by accident
Security Services & Risk Management Infrastructure
Africa’s data future depends on getting it right at the start. If privacy controls do not withstand real-world conditions, such as unstable power, fragile last-mile connectivity, shared devices, and decentralised branch environments, then privacy exists only on paper.

Read more...
From friction to trust
Information Security Security Services & Risk Management Financial (Industry)
Historically, fraud prevention has been viewed as a trade-off between robust security and a seamless customer journey, with security often prevailing. However, this can impair business functionality or complicate the customer journey with multiple logins and authentication steps.

Read more...
Security ready to move out of the basement
AI & Data Analytics Security Services & Risk Management
Panaseer believes that in 2026, a board member at a major corporation will lose their job amid rising breaches and legal scrutiny, as organisations recognise that cyber risk is a business risk that CISOs cannot shoulder alone.

Read more...
Cyber remains top business risk, but AI fastest riser at #2
News & Events Security Services & Risk Management
The Allianz Risk Barometer 2026 ranks cybersecurity, especially ransomware attacks, as the #1 risk, while AI is the biggest riser and jumps from #10 to #2, highlighting the emerging risks for companies in almost all industry sectors.

Read more...
OT calculator to align cyber investments with business goals
Industrial (Industry) Information Security Security Services & Risk Management
The OT Calculator has been developed specifically for industrial organisations to assess the potential costs of insufficient operational technology (OT) security. By offering detailed financial forecasts, the calculator empowers senior management to make well-informed decisions.

Read more...
From digital transformation to digital sovereignty
Security Services & Risk Management IoT & Automation
As cyberthreats grow, data regulations tighten, and AI becomes central to economic competitiveness, countries are recognising the need to control and protect their own digital assets.

Read more...
The age of Lean 4.0: Orchestrating intelligence and efficiency
Security Services & Risk Management
The convergence of Lean principles and AI (what we now call Lean 4.0) is no longer a theoretical exercise; it is the defining operational paradigm for survival and growth in a complex, data-intensive economy.

Read more...
Risks of open-source intelligence escalating in crime
Security Services & Risk Management Residential Estate (Industry) Smart Home Automation
CMS estimates that open-source intelligence has played a role in 20 - 30% of robberies over the past 12 months. In cybercrime, global research consistently shows that many offences rely on some form of open-source data exploitation.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.