Searching...
English
EnglishEnglish
EspañolSpanish
简体中文Chinese
FrançaisFrench
DeutschGerman
日本語Japanese
PortuguêsPortuguese
ItalianoItalian
한국어Korean
РусскийRussian
NederlandsDutch
العربيةArabic
PolskiPolish
हिन्दीHindi
Tiếng ViệtVietnamese
SvenskaSwedish
ΕλληνικάGreek
TürkçeTurkish
ไทยThai
ČeštinaCzech
RomânăRomanian
MagyarHungarian
УкраїнськаUkrainian
Bahasa IndonesiaIndonesian
DanskDanish
SuomiFinnish
БългарскиBulgarian
עבריתHebrew
NorskNorwegian
HrvatskiCroatian
CatalàCatalan
SlovenčinaSlovak
LietuviųLithuanian
SlovenščinaSlovenian
СрпскиSerbian
EestiEstonian
LatviešuLatvian
فارسیPersian
മലയാളംMalayalam
தமிழ்Tamil
اردوUrdu
Sheep No More

Sheep No More

The Art of Awareness and Attack Survival
by Jonathan T. Gilliam 2017 224 pages
3.95
100+ ratings
Listen
Try Full Access for 7 Days
Unlock listening & more!
Continue

Key Takeaways

1. Understand the Attacker Mindset

Attacking another human being is the closest a person can get to exiting the human existence and stepping into the animalistic world, where life is based on survival of the fittest.

See through their eyes. To defend effectively, you must understand how an attacker thinks and plans. This involves adopting their perspective, free from typical morals or ethics, to identify weaknesses they would exploit. Attackers, whether criminals or terrorists, often display predictable characteristics during planning and imminent attack phases.

Animalistic focus. Human attackers, unlike most animals, kill consciously for reasons beyond instinctual survival, often feeling justified by ideology or mood. They approach targeting with a mindset void of typical human consciousness, focusing on maximizing impact. Serial killers are meticulous planners, but ideological killers, like fundamental jihadists, are arguably more dangerous due to their systematic justification and scale of violence.

Exploiting vulnerabilities. Attackers systematically build target packages by identifying critical areas, times, vulnerabilities, and avenues of approach. They look for indicators like complacency or lack of awareness. By understanding this process, you can anticipate their actions and use their own targeting methods against them to strengthen your defenses.

2. Build Your Own Target Package

The secret to gaining defensive awareness is first understanding how an attacker views potential targets.

Know your criticalities. A target package defines why a target is chosen, what's needed for an attack, and the best approach. For personal defense, build a package on yourself and your surroundings by identifying:

  • Critical Assets (what's valuable to you: family, home, car, etc.)
  • Critical Areas (locations of assets or high vulnerability: specific rooms, yard, garage)
  • Critical Times (when areas are most vulnerable: empty house, asleep, commuting)
  • Vulnerabilities (exploitable weaknesses: unlocked doors, predictable routines, lack of awareness)
  • Attackers' Avenues of Approach (routes attackers would use: nearby roads, access points)

The Target Equation. This framework helps organize information: (CA+CAR+CT+V+AVP) + (TAC+TQS+P+M) = Target Equation. The second part includes historical information on attacker Tactics, Techniques, Procedures, and Motivation. Compiling this allows you to predict who, why, where, when, and how you could be attacked.

Beyond physical defenses. Attackers look for more than just physical security. Complacency is a major indicator they exploit. By charting your own criticalities, you see your life from their perspective, revealing vulnerabilities you might otherwise overlook, like predictable routines or reliance on others for safety.

3. Collect Information Like an Attacker

Remember, most attackers would rather never set foot near a target location before an attack if possible, as this is the most vulnerable area and time for their attack to be thwarted.

Remote reconnaissance. Information collection starts remotely, often online. Attackers gather general information like hours of operation, event schedules, addresses, demographics, and past incidents. This is easy to find and helps them identify potential targets and their criticalities without risk.

  • Internet searches
  • Mapping programs (Google Maps, etc.)
  • Public records
  • Social media (reveals routines, locations, assets)

On-site verification. Ground surveillance (vehicle or foot) is riskier but necessary for specific details. Attackers verify remote findings and gather intelligence on:

  • Security presence and routines
  • Building layouts and access points
  • Foot traffic patterns and demographics
  • Best escape routes and standoff distances
  • Specific vulnerabilities missed online

Mimic their methods. By performing remote and on-site "surveillance" on your own life sectors (home, work, school, etc.), you gain the same detailed understanding an attacker would. This process reveals the breadth and scope of potential attacks and helps you see how easily your information can be obtained and exploited.

4. Learn from History and Attacker Tactics

History is also a great teacher when learning about the tactics of a specific group of attackers.

History's lessons. Studying past attacks reveals patterns in attacker behavior, target selection, and tactics. History shows that actions beat reactions, a principle often ignored by authorities who rely on outdated policies or political considerations. Learning from historical failures (like reactive responses to active shooters) is crucial for developing effective defenses.

Evolving tactics. Attacker methods change with technology and experience. Pre-9/11 hijackings aimed for negotiation; post-9/11, they became suicide attacks. Criminal tactics also evolve, from simple robbery to complex online scams. Understanding these shifts helps predict future attack methods and targets.

  • Changes in weapons used
  • New technologies exploited
  • Adaptation to security measures
  • Trending target types (e.g., shift to soft targets like malls, concerts)

Predictive power. By researching the history of attacks relevant to your life sectors (e.g., school shootings, mall attacks, online scams), you can identify typical attacker TTPs and motivations. This historical knowledge, combined with your target package, allows for educated predictions about the most likely types of attacks you might face and when they are most probable.

5. Develop a Proactive Defender Mindset

In order to live a carefree life, you either have to walk around in a clueless stupor or you must develop SOPs so that structured awareness exists.

Flip the switch. Once you understand the attacker's perspective and have built your target package, you must flip to the defender mindset. This isn't just about reacting; it's about proactively establishing defenses and Standard Operating Procedures (SOPs) based on the vulnerabilities you've identified.

Forging defenses. Building defenses is like forging a samurai sword – constantly working, evaluating, and perfecting plans. New defenses can create new vulnerabilities, so continuous assessment is necessary. This forging process makes your defenses stronger and more adaptable.

Beyond theatrics. Effective defenses are based on mitigating real vulnerabilities, not just appearing secure. Defensive theatrics (like appearing tough or relying on visible but ineffective measures) are easily seen through by experienced attackers. True security comes from understanding your criticalities and implementing measures that actually address them, often through simple, consistent actions.

6. Master Your Action Options: Escape, Evade, Fight

Knowing when to run is very important when you are caught up in a fluid situation, especially if bullets are flying.

Analyze before acting. In a violent encounter, your options are Escape, Evade, or Fight (Run, Hide, Fight). However, immediate, unthinking reaction can be dangerous. Analyze the situation (source/direction of threat) before moving to avoid running into more danger.

Escape effectively. Running isn't just about speed; it's about escaping to safety. Consider the threat type (shooter, vehicle, knife) and the environment. Know your escape routes beforehand. In vehicle attacks, running perpendicular to the threat is often safer than running in the same direction.

Evade strategically. Hiding (concealment) offers little protection from bullets; seek cover (protection). Evading means moving strategically to avoid the attacker, using cover, and always being ready to transition to escape or fight. Don't resign yourself to just hiding; maintain options.

Commit to fight. Fighting is a last resort but requires commitment. Mental preparation and pre-committed will are crucial. If escape or evasion is impossible, fighting aggressively and decisively is necessary for survival. Rehearse scenarios mentally to prepare for this possibility.

7. Conquer Fear Through Preparation

Fear is the primary obstacle that you must overcome if you ever find yourself in an attack situation.

Fear's paralyzing effect. Fear is an emotion designed for fight or flight, but unchecked, it can cause paralysis or irrational decisions. In high-stress situations, adrenaline combined with fear impairs clear thinking, leading to chaotic reactions.

Preparation controls fear. Overcoming fear in a crisis isn't spontaneous; it's a skill developed beforehand. By creating contingency plans for predictable issues (based on your target package), you visualize your actions, making you less likely to panic.

  • Outline potential scenarios
  • Identify necessary "equipment" (phone, keys, etc.)
  • Rehearse actions mentally or physically
  • Mitigate contingencies (e.g., backup keys, meeting points)

Action beats reaction. Prepared actions are directed by critical thinking, protecting you from chaos. Reactive responses are driven by emotion and fear. By preparing, you train your mind to act, not just react, allowing you to maintain focus even in chaotic situations.

8. Reject Learned Helplessness, Embrace Responsibility

Not knowing the answers to this question is called learned helplessness, and wherever you see it, you will also see a cultural cancer of unawareness.

The dependency epidemic. Modern society fosters learned helplessness, a state of mind where individuals become overly dependent on others (government, experts, technology) for safety and other aspects of life. This manufactured dependency suppresses free thinking and personal awareness.

Blind reliance is dangerous. Relying blindly on external protection or expertise without understanding the underlying principles leaves you vulnerable. Just as people fail to manage their finances or cyber security effectively due to dependency, they fail to manage their personal safety.

Take ownership. Reversing learned helplessness requires taking ownership of your own protection and responsibility for your actions. The Attack and Defend technique is fundamentally about self-analysis and taking back control. By dissecting your life's criticalities and making conscious choices, you eliminate surprise issues and increase awareness, moving away from dependency towards empowerment.

9. Apply Awareness to Everyday Life

Had the parents and to some extent the young people realized how easy it is to identify a soft target area, they could have combined that knowledge and understanding and realized they were walking into a critical area at a critical time.

Awareness is a guide. Applying the Attack and Defend technique to everyday life transforms awareness from a burden into a guide. By systematically evaluating sectors of your life (commuting, shopping, events, travel) through the lens of critical areas, times, vulnerabilities, and avenues of approach, you make informed decisions.

Case studies illustrate. Real-world examples, like the Manchester concert bombing or the Boston Marathon attack, highlight how attackers exploit predictable criticalities and how victims' lack of awareness contributed to casualties. Conversely, stories like Cleo's trip show how applying these techniques proactively can lead to successful avoidance or navigation of dangerous situations.

  • Manchester: Attack at concert exit (critical area/time)
  • Boston Marathon: Attack at finish line (critical area/time), lack of screening (vulnerability)
  • Cleo's trip: Identifying cab ride as critical area/time, planning actions (escape/evade/fight)

Empower yourself and others. Share your newfound awareness with family and friends. Collective awareness is the best defense system. By understanding potential threats and having pre-determined plans, you increase not only your own safety but also the safety of those around you, turning passive "sheep" into aware, prepared individuals.

Last updated:

Review Summary

3.95 out of 5
Average of 100+ ratings from Goodreads and Amazon.

Sheep No More receives mixed reviews, with an average rating of 3.95/5. Readers appreciate the book's advice on situational awareness and personal safety but criticize its repetitive nature and writing style. Some find the information valuable and eye-opening, while others feel it's common sense or overly paranoid. Gilliam's expertise is acknowledged, but his self-aggrandizement and use of jargon are off-putting to some. Critics suggest the book could have been more concise and better edited, while supporters praise its potential to change readers' perspectives on safety.

Your rating:
4.57
3 ratings

About the Author

Jonathan T. Gilliam is a former Navy SEAL, FBI special agent, Federal Air Marshal, and police officer with over 20 years of experience in various security and law enforcement roles. He has also worked as a private security contractor, public speaker, and media commentator. Gilliam's extensive background in high-risk environments and threat assessment informs his approach to personal safety and security. He aims to educate civilians on taking responsibility for their own protection through increased awareness and proactive strategies. Gilliam's expertise has led him to become a recognized voice in the field of personal and national security, often appearing as a guest on radio and television programs to share his insights.

Download PDF

To save this Sheep No More summary for later, download the free PDF. You can print it out, or read offline at your convenience.
Download PDF
File size: 0.24 MB     Pages: 13

Download EPUB

To read this Sheep No More summary on your e-reader device or app, download the free EPUB. The .epub digital book format is ideal for reading ebooks on phones, tablets, and e-readers.
Download EPUB
File size: 2.97 MB     Pages: 12
Listen to Summary
0:00
-0:00
1x
Dan
Andrew
Michelle
Lauren
Select Speed
1.0×
+
200 words per minute
Home
Library
Get App
Create a free account to unlock:
Requests: Request new book summaries
Bookmarks: Save your favorite books
History: Revisit books later
Recommendations: Personalized for you
Ratings: Rate books & see your ratings
100,000+ readers
Try Full Access for 7 Days
Listen, bookmark, and more
Compare Features Free Pro
📖 Read Summaries
All summaries are free to read in 40 languages
🎧 Listen to Summaries
Listen to unlimited summaries in 40 languages
❤️ Unlimited Bookmarks
Free users are limited to 10
📜 Unlimited History
Free users are limited to 10
Risk-Free Timeline
Today: Get Instant Access
Listen to full summaries of 73,530 books. That's 12,000+ hours of audio!
Day 4: Trial Reminder
We'll send you a notification that your trial is ending soon.
Day 7: Your subscription begins
You'll be charged on May 16,
cancel anytime before.
Consume 2.8x More Books
2.8x more books Listening Reading
Our users love us
100,000+ readers
"...I can 10x the number of books I can read..."
"...exceptionally accurate, engaging, and beautifully presented..."
"...better than any amazon review when I'm making a book-buying decision..."
Save 62%
Yearly
$119.88 $44.99/year
$3.75/mo
Monthly
$9.99/mo
Try Free & Unlock
7 days free, then $44.99/year. Cancel anytime.
Scanner
Find a barcode to scan

Settings
General
Widget
Loading...