Key Takeaways
1. Understand the Attacker Mindset
Attacking another human being is the closest a person can get to exiting the human existence and stepping into the animalistic world, where life is based on survival of the fittest.
See through their eyes. To defend effectively, you must understand how an attacker thinks and plans. This involves adopting their perspective, free from typical morals or ethics, to identify weaknesses they would exploit. Attackers, whether criminals or terrorists, often display predictable characteristics during planning and imminent attack phases.
Animalistic focus. Human attackers, unlike most animals, kill consciously for reasons beyond instinctual survival, often feeling justified by ideology or mood. They approach targeting with a mindset void of typical human consciousness, focusing on maximizing impact. Serial killers are meticulous planners, but ideological killers, like fundamental jihadists, are arguably more dangerous due to their systematic justification and scale of violence.
Exploiting vulnerabilities. Attackers systematically build target packages by identifying critical areas, times, vulnerabilities, and avenues of approach. They look for indicators like complacency or lack of awareness. By understanding this process, you can anticipate their actions and use their own targeting methods against them to strengthen your defenses.
2. Build Your Own Target Package
The secret to gaining defensive awareness is first understanding how an attacker views potential targets.
Know your criticalities. A target package defines why a target is chosen, what's needed for an attack, and the best approach. For personal defense, build a package on yourself and your surroundings by identifying:
- Critical Assets (what's valuable to you: family, home, car, etc.)
- Critical Areas (locations of assets or high vulnerability: specific rooms, yard, garage)
- Critical Times (when areas are most vulnerable: empty house, asleep, commuting)
- Vulnerabilities (exploitable weaknesses: unlocked doors, predictable routines, lack of awareness)
- Attackers' Avenues of Approach (routes attackers would use: nearby roads, access points)
The Target Equation. This framework helps organize information: (CA+CAR+CT+V+AVP) + (TAC+TQS+P+M) = Target Equation. The second part includes historical information on attacker Tactics, Techniques, Procedures, and Motivation. Compiling this allows you to predict who, why, where, when, and how you could be attacked.
Beyond physical defenses. Attackers look for more than just physical security. Complacency is a major indicator they exploit. By charting your own criticalities, you see your life from their perspective, revealing vulnerabilities you might otherwise overlook, like predictable routines or reliance on others for safety.
3. Collect Information Like an Attacker
Remember, most attackers would rather never set foot near a target location before an attack if possible, as this is the most vulnerable area and time for their attack to be thwarted.
Remote reconnaissance. Information collection starts remotely, often online. Attackers gather general information like hours of operation, event schedules, addresses, demographics, and past incidents. This is easy to find and helps them identify potential targets and their criticalities without risk.
- Internet searches
- Mapping programs (Google Maps, etc.)
- Public records
- Social media (reveals routines, locations, assets)
On-site verification. Ground surveillance (vehicle or foot) is riskier but necessary for specific details. Attackers verify remote findings and gather intelligence on:
- Security presence and routines
- Building layouts and access points
- Foot traffic patterns and demographics
- Best escape routes and standoff distances
- Specific vulnerabilities missed online
Mimic their methods. By performing remote and on-site "surveillance" on your own life sectors (home, work, school, etc.), you gain the same detailed understanding an attacker would. This process reveals the breadth and scope of potential attacks and helps you see how easily your information can be obtained and exploited.
4. Learn from History and Attacker Tactics
History is also a great teacher when learning about the tactics of a specific group of attackers.
History's lessons. Studying past attacks reveals patterns in attacker behavior, target selection, and tactics. History shows that actions beat reactions, a principle often ignored by authorities who rely on outdated policies or political considerations. Learning from historical failures (like reactive responses to active shooters) is crucial for developing effective defenses.
Evolving tactics. Attacker methods change with technology and experience. Pre-9/11 hijackings aimed for negotiation; post-9/11, they became suicide attacks. Criminal tactics also evolve, from simple robbery to complex online scams. Understanding these shifts helps predict future attack methods and targets.
- Changes in weapons used
- New technologies exploited
- Adaptation to security measures
- Trending target types (e.g., shift to soft targets like malls, concerts)
Predictive power. By researching the history of attacks relevant to your life sectors (e.g., school shootings, mall attacks, online scams), you can identify typical attacker TTPs and motivations. This historical knowledge, combined with your target package, allows for educated predictions about the most likely types of attacks you might face and when they are most probable.
5. Develop a Proactive Defender Mindset
In order to live a carefree life, you either have to walk around in a clueless stupor or you must develop SOPs so that structured awareness exists.
Flip the switch. Once you understand the attacker's perspective and have built your target package, you must flip to the defender mindset. This isn't just about reacting; it's about proactively establishing defenses and Standard Operating Procedures (SOPs) based on the vulnerabilities you've identified.
Forging defenses. Building defenses is like forging a samurai sword – constantly working, evaluating, and perfecting plans. New defenses can create new vulnerabilities, so continuous assessment is necessary. This forging process makes your defenses stronger and more adaptable.
Beyond theatrics. Effective defenses are based on mitigating real vulnerabilities, not just appearing secure. Defensive theatrics (like appearing tough or relying on visible but ineffective measures) are easily seen through by experienced attackers. True security comes from understanding your criticalities and implementing measures that actually address them, often through simple, consistent actions.
6. Master Your Action Options: Escape, Evade, Fight
Knowing when to run is very important when you are caught up in a fluid situation, especially if bullets are flying.
Analyze before acting. In a violent encounter, your options are Escape, Evade, or Fight (Run, Hide, Fight). However, immediate, unthinking reaction can be dangerous. Analyze the situation (source/direction of threat) before moving to avoid running into more danger.
Escape effectively. Running isn't just about speed; it's about escaping to safety. Consider the threat type (shooter, vehicle, knife) and the environment. Know your escape routes beforehand. In vehicle attacks, running perpendicular to the threat is often safer than running in the same direction.
Evade strategically. Hiding (concealment) offers little protection from bullets; seek cover (protection). Evading means moving strategically to avoid the attacker, using cover, and always being ready to transition to escape or fight. Don't resign yourself to just hiding; maintain options.
Commit to fight. Fighting is a last resort but requires commitment. Mental preparation and pre-committed will are crucial. If escape or evasion is impossible, fighting aggressively and decisively is necessary for survival. Rehearse scenarios mentally to prepare for this possibility.
7. Conquer Fear Through Preparation
Fear is the primary obstacle that you must overcome if you ever find yourself in an attack situation.
Fear's paralyzing effect. Fear is an emotion designed for fight or flight, but unchecked, it can cause paralysis or irrational decisions. In high-stress situations, adrenaline combined with fear impairs clear thinking, leading to chaotic reactions.
Preparation controls fear. Overcoming fear in a crisis isn't spontaneous; it's a skill developed beforehand. By creating contingency plans for predictable issues (based on your target package), you visualize your actions, making you less likely to panic.
- Outline potential scenarios
- Identify necessary "equipment" (phone, keys, etc.)
- Rehearse actions mentally or physically
- Mitigate contingencies (e.g., backup keys, meeting points)
Action beats reaction. Prepared actions are directed by critical thinking, protecting you from chaos. Reactive responses are driven by emotion and fear. By preparing, you train your mind to act, not just react, allowing you to maintain focus even in chaotic situations.
8. Reject Learned Helplessness, Embrace Responsibility
Not knowing the answers to this question is called learned helplessness, and wherever you see it, you will also see a cultural cancer of unawareness.
The dependency epidemic. Modern society fosters learned helplessness, a state of mind where individuals become overly dependent on others (government, experts, technology) for safety and other aspects of life. This manufactured dependency suppresses free thinking and personal awareness.
Blind reliance is dangerous. Relying blindly on external protection or expertise without understanding the underlying principles leaves you vulnerable. Just as people fail to manage their finances or cyber security effectively due to dependency, they fail to manage their personal safety.
Take ownership. Reversing learned helplessness requires taking ownership of your own protection and responsibility for your actions. The Attack and Defend technique is fundamentally about self-analysis and taking back control. By dissecting your life's criticalities and making conscious choices, you eliminate surprise issues and increase awareness, moving away from dependency towards empowerment.
9. Apply Awareness to Everyday Life
Had the parents and to some extent the young people realized how easy it is to identify a soft target area, they could have combined that knowledge and understanding and realized they were walking into a critical area at a critical time.
Awareness is a guide. Applying the Attack and Defend technique to everyday life transforms awareness from a burden into a guide. By systematically evaluating sectors of your life (commuting, shopping, events, travel) through the lens of critical areas, times, vulnerabilities, and avenues of approach, you make informed decisions.
Case studies illustrate. Real-world examples, like the Manchester concert bombing or the Boston Marathon attack, highlight how attackers exploit predictable criticalities and how victims' lack of awareness contributed to casualties. Conversely, stories like Cleo's trip show how applying these techniques proactively can lead to successful avoidance or navigation of dangerous situations.
- Manchester: Attack at concert exit (critical area/time)
- Boston Marathon: Attack at finish line (critical area/time), lack of screening (vulnerability)
- Cleo's trip: Identifying cab ride as critical area/time, planning actions (escape/evade/fight)
Empower yourself and others. Share your newfound awareness with family and friends. Collective awareness is the best defense system. By understanding potential threats and having pre-determined plans, you increase not only your own safety but also the safety of those around you, turning passive "sheep" into aware, prepared individuals.
Last updated:
Review Summary
Sheep No More receives mixed reviews, with an average rating of 3.95/5. Readers appreciate the book's advice on situational awareness and personal safety but criticize its repetitive nature and writing style. Some find the information valuable and eye-opening, while others feel it's common sense or overly paranoid. Gilliam's expertise is acknowledged, but his self-aggrandizement and use of jargon are off-putting to some. Critics suggest the book could have been more concise and better edited, while supporters praise its potential to change readers' perspectives on safety.
Similar Books










Download PDF
Download EPUB
.epub
digital book format is ideal for reading ebooks on phones, tablets, and e-readers.