Back Defense Protocol

bjjdefensesystembackprotocolescape

System Properties

  • System ID: DS004
  • Target Threats: Back control, rear naked choke, back collar chokes, back armbar, crucifix
  • Defensive Priority: Prevention > Escape > Counter-attack
  • Energy Efficiency: High
  • Complexity Level: Intermediate

System Description

The Back Defense Protocol represents a comprehensive defensive system for addressing one of BJJ’s most dominant controlling positions. Unlike isolated escape techniques, this protocol establishes a systematic approach to back defense that integrates preventative measures, escape mechanics, and strategic decision-making into a unified framework. This system addresses the full spectrum of back threats from initial back take attempts through fully established back control to submission attempts.

This protocol prioritizes prevention over escape, recognizing that defending early back take attempts requires significantly less energy and carries less risk than escaping fully established back control. When prevention fails, the system provides a structured decision framework for selecting and executing the most appropriate escape based on the specific control mechanisms employed by the opponent and the defensive resources available to the practitioner.

The Back Defense Protocol serves as a critical defensive capability that addresses what many consider BJJ’s most dominant position, providing practitioners with the tools to systematically address and escape from positions that frequently lead to match-ending submissions in both competition and self-defense scenarios.

Core Defensive Principles

  • Protect the neck at all costs, prioritizing prevention of choke threats
  • Maintain defensive hand positioning that provides immediate neck protection
  • Control opponent’s choking arm during all phases of defense and escape
  • Prevent opponent from establishing fully locked body triangle or hooks
  • Utilize precise hip movement to disrupt opponent’s control and create escape opportunities
  • Recognize and exploit imbalances in opponent’s back control
  • Consolidate incremental improvements rather than seeking direct full escapes
  • Maintain defensive awareness throughout escape sequences
  • Create and exploit asymmetrical control to enable progressive escape
  • Prevent opponent from establishing second layer attacks after defending initial threats

Preventative Measures

  • Defensive Hand Framework - Establish and maintain proper hand positioning with one hand protecting the neck’s vulnerable side while the other controls opponent’s attacking arm
  • Chin Protection - Tuck chin to chest and use shoulder elevation to protect neck from choke attempts
  • Hip Elevation Control - Manage hip position to prevent opponent from establishing low hooks or body triangle and to maintain mobility for escape
  • Connection Point Disruption - Continuously work to break or control the opponent’s primary control mechanisms (hooks, harness grip, seatbelt)
  • Shoulder Protection - Maintain shoulder positioning that prevents opponent from establishing deep choking grips or transitioning to technical back control
  • Space Preservation - Create and maintain micro-spaces between your back and opponent’s chest to enable defensive movement

Primary Escape Sequence

  1. Assess back control variation and opponent’s primary control mechanisms
  2. Establish proper defensive hand position to protect against immediate submission threats
  3. Control opponent’s choking arm to neutralize primary attack vector
  4. Disrupt opponent’s lower body control (hooks or body triangle)
  5. Create space and angle by rotating toward opponent’s weak side
  6. Establish defensive base and connection points
  7. Execute appropriate escape based on control assessment
  8. Transition to safer intermediary position (typically half guard or side control)
  9. Prevent opponent from reestablishing back control
  10. Consolidate improved position before attempting further advancement

Decision Tree

Counter-Offensive Opportunities

Common Errors

  • Focusing on escape before addressing immediate submission threats → Choke vulnerability
  • Turning toward opponent’s choking arm → Increased submission exposure
  • Defending flat on back with hips down → Limited escape mobility
  • Static defensive positioning → Progressive control consolidation
  • Attempting explosive escapes without disrupting control points → Wasted energy
  • Exposing the back during escape attempts → Position regression
  • Neglecting proper hand positioning during transitions → Submission vulnerability

Expert Insights

  • Danaher System: Approaches back defense as a systematic problem requiring preventative measures and precise mechanical solutions rather than explosive movement. Emphasizes establishing a clear hierarchy of defensive priorities, with protecting against the rear naked choke as the absolute first priority before any escape sequence can be initiated. Places particular focus on the “hand fighting framework” that disrupts the opponent’s primary attack mechanisms while simultaneously setting up escape opportunities. Advocates for incremental positional improvement rather than attempting direct full escapes against established control.

  • Gordon Ryan: Implements back defense with emphasis on early-stage prevention and grip fighting dominance. Rather than focusing exclusively on escaping established positions, emphasizes disrupting the opponent’s control mechanisms before they can be fully implemented. Particularly focuses on controlling the opponent’s choking arm throughout defensive sequences, using precise grip configurations that simultaneously defend against submissions while creating escape leverage. Emphasizes creating and exploiting “defensive angles” that make control maintenance mechanically disadvantageous for the opponent.

  • Eddie Bravo: Has developed specialized back defense approaches within his 10th Planet system that often utilize more dynamic movement patterns and unconventional escapes. Emphasizes creating scramble opportunities that can transition directly into offensive positions rather than simply escaping to neutral positions. Places particular focus on defending the body triangle through specific pressure relief mechanisms and unconventional escape angles. Advocates developing “scramble awareness” where defensive movements are immediately linked to counter-offensive opportunities.

Training Methodology

  • Preventative Grip Fighting - Develop hand fighting skills to prevent initial back control establishment
  • Defensive Hand Position Drills - Practice establishing and maintaining proper defensive hand frameworks
  • Hook Prevention Exercises - Train specific mechanics to prevent or remove hook control
  • Submission Defense Sequences - Develop defensive responses to common back submission attacks
  • Progressive Escape Pathways - Practice complete escape sequences from various back control variations
  • Position Recovery Drills - Train stabilization of recovered positions after successful escape
  • Counter-transition Awareness - Develop recognition of opponent’s positional adjustment attempts

Progressive Resistance Training

  • Stage 1: Partner attempts back control establishment with limited pressure, allowing practice of preventative measures and defensive positioning. Focus on developing proper hand fighting, hook prevention, and defensive posture without time pressure or submission threats.
  • Stage 2: Partner establishes moderate back control with controlled pressure, requiring proper defensive structure before escape initiation. Defense must address specific control mechanisms with appropriate responses, including defending against controlled submission attempts during the escape process.
  • Stage 3: Full resistance back control with dynamic pressure, submission attempts, and positional adjustments, requiring complete integration of threat defense, escape mechanics, and counter-transition awareness. Defense must be executed against actively resistant control, including adapting to the opponent’s adjustments during escape attempts and defending secondary attacks.

Computer Science Analogy

The Back Defense Protocol functions as a “security system” in the BJJ state machine, implementing a multi-layered defense framework that protects critical system vulnerabilities (particularly the neck/choke defense) while working systematically to restore the system to secure operational states. This protocol demonstrates principles of “defense in depth” where multiple security layers must be sequentially bypassed before system compromise can occur.

Similar to how computer security implements firewalls, intrusion detection, and authentication systems as successive defensive barriers, the Back Defense Protocol establishes progressive defensive mechanisms that an attacker must overcome. The hand fighting framework functions as the “firewall” that filters initial attack attempts, while defensive posture serves as “access control” that restricts the opponent’s ability to reach vulnerable targets.

The decision tree implements a form of “threat assessment algorithm” that continuously evaluates attack vectors and prioritizes defensive resources based on threat severity and probability. Each defensive component acts as a specialized security module designed to address specific vulnerabilities in the system architecture, working together to maintain system integrity even under sophisticated attack scenarios.

The protocol demonstrates principles of “graceful degradation” where even when primary defenses are compromised, secondary systems engage to prevent catastrophic failure. Like how robust security architecture isolates system components to contain breaches, the Back Defense Protocol compartmentalizes defensive resources to ensure that compromise in one area (such as hook control) doesn’t automatically lead to submission vulnerability, providing multiple opportunities for system recovery throughout the defensive process.