SlideShare a Scribd company logo
1 of 4
PROTECTIVE PROTOCOLS FOR SHEEPDOG PROFESSIONALS
by Stanley I. White, IACSP, ATO
The expanding cloud of evil can be seen today in every area of society. You don't have to try very hard
to find it just open the newspaper, surf the web or tune into your local cable network. A majority of
society walks around in a world of denial never acknowledging that evil can visit their door step at
anytime. Evil is perpetrated by predators on all levels. If we are to acknowledge the existence of
predators then we have to acknowledge the existence of prey. The prey in this case are the general
populace of society. The final component is a question. “Who stands between the predator and the
prey?” The answer is simple the protectors stand between the two. Three types of persona match up
with these three categories. They are the wolf (predators), sheep (prey) and sheepdog (protectors)
persona. Summarized below are brief descriptions of each:
Wolf- these are the individuals who place their agenda and goals above the safety and well being of
others. They will kill and maim to achieve their objectives at all cost without empathy toward anyone
else. Acts of violence and aggression are the tools of their trade. They consume and use sheep
indiscriminately to accomplish their agenda. They even masquerade as sheep and sheepdogs to create
chaos and to infiltrate the flock.
Sheep- these are the majority of individuals that represent today's society they exist in their own little
world. They abide by the laws and regulations of society. The live peacefully with others and would
only harm another individual in the most extreme circumstances. Personal acts of aggression and
violence are something they see in the movies and are seldom personally acquainted with in their
world. They live in a world of denial as it pertains to evil's direct and indirect effect on them and their
loved ones. They are the prime targets of the wolf. Sometimes however, sheep may pretend to be
sheepdogs to elevate themselves among members of the flock but they are easily unmasked when the
wolf appears.
Sheepdog- these are the individuals that put the needs of others before their own. They sacrifice to
insure the safety of those who are weaker and can not or will not protect themselves. They despise
chaos and the abuse of others. Their selfless acts do not come from personal desires of fame and
fortune. These actions of bravery come from a desired peace and an orderly state of things.
These three persona are very broad characterizations of human beings. Everyone has traces of all three
in their personality depending on the circumstance. One example can involve a battle harden warrior
known for his or her bravery in combat that makes them a sheepdog, however, when they are faced
with confronting a loved one they become the biggest sheep in the world. This piece will approach the
above mentioned subject matter from the most dominate of the three found in an individuals life. This
persona controls the majority of the individual's decisions. Sheepdogs can be found in all areas of life
they can be dedicated parents babysitters, ministers, teachers, mentors etc. However, the core audience
for this paper are those individuals that are professional protectors their chosen professions in military,
law enforcement and security require them to have the sheepdog persona to protect others as well as
themselves. Due to this fact these individuals are called sheepdog professionals.
Unlike anytime in recent history one group of sheepdog professionals is currently enduring public
vilification and humiliation. This group consists of those in law enforcement. These individuals are
tasked with the protection of the flock and the enforcement of society's laws 24 hours a day, 365 days a
year. Their successes are always over shadowed by their failures and mistakes. They are and should be
held to a higher standard. When they break the law they are sworn to protect they must face the
consequences, as to not impugn the entire profession. If the entire law enforcement community is
muzzled for the errors of a few the wolves will be emboldened and society as a whole will find itself in
peril.
The only thing worst than not aggressively engaging a wolf is to embolden one. Those in law
enforcement must increase their awareness of the threats that are currently increasing and loaming
around them. This is needed for their own protection as well as that of those they protect. These men
and women face threats today from both foreign and domestic actors. Summarized below are such
targeted attacks that have occurred against law enforcement:
September 2014- Abu Muhammad al Adnani a representative of the Islamic State released an audio
message urging home grown radical Islamist in the US to attack law enforcement officers, military and
government personnel.
October 2014- a self radicalized individual, Zale H. Thompson, attacked 4 New York City Police
Officers with a hatchet before he was shot to death.
December 2014- 2 New York City Police Officers ( Rafael Ramos and Wenjian Liu) were ambushed
and killed by Ishmaaiyl Brinley on a city street. Brinley was later killed by New York City Police
following the ambush. Prior to the attack he made anti-police statements and threats on line toward law
enforcement officers.
December 2014 – 2 unidentified men in Durham North Carolina attempted to ambush a police officer
while he was sitting in his patrol car. The assault resulted in a gunfight, the suspects escaped and the
officer was unharmed.
February 2015- an unidentified Tunisian supporter of the Islamic State published an article on line
detailing how radicalized Islamist can collect and share intelligence on law enforcement and their
families to aid in future attacks. This information includes but is not limited to home and work
addresses, family photographs, locations of children's schools, personal vehicle information etc.
April 2015- during anti-police riots in Baltimore intelligence from law enforcement officials revealed
that three known rival street gangs (Black Gorilla Family, Bloods and Crips) had entered into a pact to
target law enforcement officers.
June 2015- Terror watch list suspect Usaama Rahim was shot and killed by Boston Police after he
lunged at them with a knife. Mr. Rahim had been under surveillance by federal agents and was plotting
to kill and behead law enforcement officers.
During the height of the 2015 Baltimore anti-police riots protesting the death of Freddie Grey local
government officials taking a page from the sheep handbook issued directives to law enforcement stand
down and not to engage rioters and allow them to destroy public and private property. These riots to
could cost the city of Baltimore upwards of approximately 20 million dollars. In addition to monetary
damage this action embarrassed and humiliated law enforcement in Baltimore and nationwide. A sheep
dominated leadership can not humiliate their protectors and expect them to be self sacrificing and
brave. June 2015 New Jersey State Police in riot gear engaged a large group of individuals attempting
to illegally enter the Hot 97 Summer Jam Concert at the Metlife Stadium. Approximately 60 people
were arrested and several officers received minor injuries. During the melee teargas was deployed in
response to the crowd throwing rocks and bottles. It can't be overstated enough, if the wolves in society
are emboldened and feel the sheepdog professionals are either afraid or restrained from acting these
criminal and terrorist elements will only continue to grow stronger and act out. Following the
Baltimore Riots incidents of criminal and aggressive behavior directed toward law enforcement have
increased in many urban areas. Sheepdog professionals are not just unpopular with wolves but are also
disliked by the sheep populace. Generally speaking sheep don't like to be told to move along, turn
down their music or told they've had a little too much to drink. Many of those in the flock would like to
de-fang and de-claw their protectors as well as paint them white and put them at the rear of the flock.
However, this opinion changes when the flock feels the hot breath of wolves on their necks.
As this dark cloud of vilification hovers over law enforcement and other sheepdog professionals, one
major character flaw can be found in many of these protectors; they suffer from the fact that they are so
engaged in the protection of others that they neglect their own well being. Documented below are
simple protocols that protectors can implement to enhance their safety:
1. Always keep your travel/vacation plans and work schedule private, only share this information
with a few trusted individuals.
2. Keep information regarding your family and associates private and off the Internet and social
media sites. Remember what you tweet and text about yourself can be seen by the world.
Structure your social media sites to restrict who can view them. Utilize strong passwords and
regularly change them.
3. Limit the distribution of your personal information on line this includes banking statements,
credit card numbers, social security numbers, bank account information, passwords and other
sensitive information.
4. Avoid leaving personal mail with your address on your desk and in your vehicle. Shred all
waste mailings prior to disposing of them in the trash.
5. Do not open suspicious emails or access unfamiliar websites. These sites may attempt to extract
personal information from your computer system.
6. Regularly perform an Internet search of your name and agency to obtain what information is
being circulated about yourself and agency.
7. Always keep your cell phone charged and fully functional (this includes keeping the charger
accessible). Due to the fact these phone hold photographs, personal information, text messages
etc. Safe guard these devices. Avoid leaving them out of your sight (unattended in your vehicle
or on your desk ).
8. Avoid using your personal laptop in Internet cafes or locations with free wifi.
9. Keep your personal vehicle stocked with a full first aid kit, blanket, flashlight, small pocket
multi-tool, fire extinguisher, a gallon of fresh water and some form of non perishable nutrients
(ie. energy bars).
10. Develop alternate routes to work and home; stagger your schedule as much as possible. This
will make hostile surveillance difficult.
11. During routine travel to work, home and other destinations always check to detect if you are
being followed. Take note of seeing the same individuals in different locations during your
travels take note of what they are doing ( these individuals could be conducting surveillance on
your daily routine and that of your family).
12. At least 2 times a month check the perimeter of your residence look for signs of trespassing and
attempted entry into your residence. Keep plantings, shrubs, small trees etc. maintained so that
trespassers and intruders will not be provided cover. Take note of signs of potential forced
entry, strange footprints and damaged vegetation adjacent to your residence.
13. Install solid doors, heavy duty locks and a sound security system for your residence.
14. Develop an emergency plan for you and your family complete with meeting locations and
passwords in case of natural disaster or terrorist attack.
Many of the above recommendations are known to law enforcement, military and security
professionals. But these individuals will find it easy to convey these tactics to others but difficult to
implement in their own lives. However, it should be noted that as this piece is being published attacks
against sheepdog professionals and their vilification is likely to increase before it lessens. Due to the
fact that sheepdog professionals are tasked with the protection of others they first must be able to
secure their own well being and that of their loved ones. This will allow them to have an undivided
focus on evolving threats and the security of those they are tasked to protect. If these professionals
were to have a motto it might read “ Forever protecting the intimidated while vanquishing the
intimidators”. As the evil in the world becomes more and more pervasive the flock becomes more
vulnerable. This why those men and women who stand between the predator and the prey must be
supported and hailed for their selfless daily efforts. May God Bless and Protect the Sheepdog
Professionals of our society.
About the Author:
Stanley I. White is currently the CI Advisor for the IACSP as well as a defensive tactics instructor who has trained
personnel from numerous local, state and federal law enforcement agencies. He is a certified Anti- Terrorism Officer and
also holds an active membership with the AFIO. He is also an internationally published author on the topics of personal
security and counter terrorism. Mr White can be reached for comment at swhite@atix.riss.net.

More Related Content

What's hot

More Guns, Less Crime
More Guns, Less CrimeMore Guns, Less Crime
More Guns, Less Crimetwnicely
 
Learning Unit 7: Stalking and D.V.-CRJ 461
Learning Unit 7: Stalking and D.V.-CRJ 461Learning Unit 7: Stalking and D.V.-CRJ 461
Learning Unit 7: Stalking and D.V.-CRJ 461Bonnie Black
 
7 MEDIA AND CRIME POWERPOINT
7 MEDIA AND CRIME POWERPOINT7 MEDIA AND CRIME POWERPOINT
7 MEDIA AND CRIME POWERPOINTmattyp99
 
9/12 child sex trafficking
9/12 child sex trafficking9/12 child sex trafficking
9/12 child sex traffickingStopTrafficking
 
2016 Presidential Election: Marketing Lessons
2016 Presidential Election: Marketing Lessons2016 Presidential Election: Marketing Lessons
2016 Presidential Election: Marketing LessonsInternet Marketing Muscle
 
Crime News, Criminal Investigations, Lawsuits
Crime News, Criminal Investigations, LawsuitsCrime News, Criminal Investigations, Lawsuits
Crime News, Criminal Investigations, Lawsuitscarpenterpvvwztqiey
 
Racial profiling presentation
Racial profiling presentationRacial profiling presentation
Racial profiling presentationchinkys
 
Rape Victims Are A Class Of Persons Often Defined By Gender Medical ...
Rape  Victims Are A  Class Of  Persons  Often  Defined  By  Gender  Medical  ...Rape  Victims Are A  Class Of  Persons  Often  Defined  By  Gender  Medical  ...
Rape Victims Are A Class Of Persons Often Defined By Gender Medical ...MedicalWhistleblower
 
Presidential Presentation Power
Presidential Presentation PowerPresidential Presentation Power
Presidential Presentation PowerEthos3
 
Hillaryclintonvsdonaldtrumpempoweredpres 160130042256
Hillaryclintonvsdonaldtrumpempoweredpres 160130042256Hillaryclintonvsdonaldtrumpempoweredpres 160130042256
Hillaryclintonvsdonaldtrumpempoweredpres 160130042256Vera Kovaleva
 
Dmst educational power_point_presentation
Dmst educational power_point_presentationDmst educational power_point_presentation
Dmst educational power_point_presentationCold Case Public Unit
 
HomegrownViolentExtremismAwarenessBrief
HomegrownViolentExtremismAwarenessBriefHomegrownViolentExtremismAwarenessBrief
HomegrownViolentExtremismAwarenessBriefBenjamin James Davila
 
Muslims in Machine Learning workshop (NeurlPS 2021) - Automatically Identifyi...
Muslims in Machine Learning workshop (NeurlPS 2021) - Automatically Identifyi...Muslims in Machine Learning workshop (NeurlPS 2021) - Automatically Identifyi...
Muslims in Machine Learning workshop (NeurlPS 2021) - Automatically Identifyi...University of Minnesota, Duluth
 
HumanTraffickingPresentation
HumanTraffickingPresentationHumanTraffickingPresentation
HumanTraffickingPresentationRachel Brewer
 
#TeamClinton vs. #TeamTrump #Election2016
#TeamClinton vs. #TeamTrump #Election2016#TeamClinton vs. #TeamTrump #Election2016
#TeamClinton vs. #TeamTrump #Election2016Empowered Presentations
 
BaltimoreDetroitChicago
BaltimoreDetroitChicagoBaltimoreDetroitChicago
BaltimoreDetroitChicagoAshley Weaver
 

What's hot (19)

More Guns, Less Crime
More Guns, Less CrimeMore Guns, Less Crime
More Guns, Less Crime
 
Learning Unit 7: Stalking and D.V.-CRJ 461
Learning Unit 7: Stalking and D.V.-CRJ 461Learning Unit 7: Stalking and D.V.-CRJ 461
Learning Unit 7: Stalking and D.V.-CRJ 461
 
7 MEDIA AND CRIME POWERPOINT
7 MEDIA AND CRIME POWERPOINT7 MEDIA AND CRIME POWERPOINT
7 MEDIA AND CRIME POWERPOINT
 
9/12 child sex trafficking
9/12 child sex trafficking9/12 child sex trafficking
9/12 child sex trafficking
 
Gangs And The Military 5of7
Gangs And The Military 5of7Gangs And The Military 5of7
Gangs And The Military 5of7
 
2016 Presidential Election: Marketing Lessons
2016 Presidential Election: Marketing Lessons2016 Presidential Election: Marketing Lessons
2016 Presidential Election: Marketing Lessons
 
Crime News, Criminal Investigations, Lawsuits
Crime News, Criminal Investigations, LawsuitsCrime News, Criminal Investigations, Lawsuits
Crime News, Criminal Investigations, Lawsuits
 
Racial profiling presentation
Racial profiling presentationRacial profiling presentation
Racial profiling presentation
 
Riots research paper
Riots research paperRiots research paper
Riots research paper
 
Rape Victims Are A Class Of Persons Often Defined By Gender Medical ...
Rape  Victims Are A  Class Of  Persons  Often  Defined  By  Gender  Medical  ...Rape  Victims Are A  Class Of  Persons  Often  Defined  By  Gender  Medical  ...
Rape Victims Are A Class Of Persons Often Defined By Gender Medical ...
 
Presidential Presentation Power
Presidential Presentation PowerPresidential Presentation Power
Presidential Presentation Power
 
Hillaryclintonvsdonaldtrumpempoweredpres 160130042256
Hillaryclintonvsdonaldtrumpempoweredpres 160130042256Hillaryclintonvsdonaldtrumpempoweredpres 160130042256
Hillaryclintonvsdonaldtrumpempoweredpres 160130042256
 
Dmst educational power_point_presentation
Dmst educational power_point_presentationDmst educational power_point_presentation
Dmst educational power_point_presentation
 
HomegrownViolentExtremismAwarenessBrief
HomegrownViolentExtremismAwarenessBriefHomegrownViolentExtremismAwarenessBrief
HomegrownViolentExtremismAwarenessBrief
 
Muslims in Machine Learning workshop (NeurlPS 2021) - Automatically Identifyi...
Muslims in Machine Learning workshop (NeurlPS 2021) - Automatically Identifyi...Muslims in Machine Learning workshop (NeurlPS 2021) - Automatically Identifyi...
Muslims in Machine Learning workshop (NeurlPS 2021) - Automatically Identifyi...
 
Made in america terrorist
Made in america terroristMade in america terrorist
Made in america terrorist
 
HumanTraffickingPresentation
HumanTraffickingPresentationHumanTraffickingPresentation
HumanTraffickingPresentation
 
#TeamClinton vs. #TeamTrump #Election2016
#TeamClinton vs. #TeamTrump #Election2016#TeamClinton vs. #TeamTrump #Election2016
#TeamClinton vs. #TeamTrump #Election2016
 
BaltimoreDetroitChicago
BaltimoreDetroitChicagoBaltimoreDetroitChicago
BaltimoreDetroitChicago
 

Viewers also liked

Resumen de las exposociones
Resumen de las exposocionesResumen de las exposociones
Resumen de las exposocioneskatival95
 
6a slide design project.final
6a slide design project.final6a slide design project.final
6a slide design project.finalAlison Hamilton
 
Don’t let your company culture just happen
Don’t let your company culture just happenDon’t let your company culture just happen
Don’t let your company culture just happennarinder kumar
 
Town planning in india
Town planning in indiaTown planning in india
Town planning in indiagauravashist
 
SoluForce Pipes for Pipe Brochure 2016
SoluForce Pipes for Pipe Brochure 2016SoluForce Pipes for Pipe Brochure 2016
SoluForce Pipes for Pipe Brochure 2016duta firza
 
BOYKIN Resume - Genentech (February 2017)
BOYKIN Resume - Genentech (February 2017)BOYKIN Resume - Genentech (February 2017)
BOYKIN Resume - Genentech (February 2017)Ian Boykin, MBA
 
Withings activity pop
Withings activity popWithings activity pop
Withings activity popGEEKYWIK
 
Daphne R. Serrano, Human Resource 2017
Daphne R. Serrano, Human Resource 2017Daphne R. Serrano, Human Resource 2017
Daphne R. Serrano, Human Resource 2017Daphne Serrano
 
Surat keterangan kesalahan tanggal bulan lahir 2016
Surat keterangan       kesalahan tanggal bulan lahir 2016Surat keterangan       kesalahan tanggal bulan lahir 2016
Surat keterangan kesalahan tanggal bulan lahir 2016Dimaz Raider's
 

Viewers also liked (14)

Resumen de las exposociones
Resumen de las exposocionesResumen de las exposociones
Resumen de las exposociones
 
Cuadro explicativo
Cuadro explicativoCuadro explicativo
Cuadro explicativo
 
Pensamiento economico
Pensamiento economicoPensamiento economico
Pensamiento economico
 
Tabla de contenido
Tabla de contenidoTabla de contenido
Tabla de contenido
 
Silabus Matematika Bisnis
Silabus Matematika BisnisSilabus Matematika Bisnis
Silabus Matematika Bisnis
 
Pendidikan kewarganegaraan di malaysia
Pendidikan kewarganegaraan di malaysiaPendidikan kewarganegaraan di malaysia
Pendidikan kewarganegaraan di malaysia
 
6a slide design project.final
6a slide design project.final6a slide design project.final
6a slide design project.final
 
Don’t let your company culture just happen
Don’t let your company culture just happenDon’t let your company culture just happen
Don’t let your company culture just happen
 
Town planning in india
Town planning in indiaTown planning in india
Town planning in india
 
SoluForce Pipes for Pipe Brochure 2016
SoluForce Pipes for Pipe Brochure 2016SoluForce Pipes for Pipe Brochure 2016
SoluForce Pipes for Pipe Brochure 2016
 
BOYKIN Resume - Genentech (February 2017)
BOYKIN Resume - Genentech (February 2017)BOYKIN Resume - Genentech (February 2017)
BOYKIN Resume - Genentech (February 2017)
 
Withings activity pop
Withings activity popWithings activity pop
Withings activity pop
 
Daphne R. Serrano, Human Resource 2017
Daphne R. Serrano, Human Resource 2017Daphne R. Serrano, Human Resource 2017
Daphne R. Serrano, Human Resource 2017
 
Surat keterangan kesalahan tanggal bulan lahir 2016
Surat keterangan       kesalahan tanggal bulan lahir 2016Surat keterangan       kesalahan tanggal bulan lahir 2016
Surat keterangan kesalahan tanggal bulan lahir 2016
 

Similar to Protective Protocals for Sheepdog Professionals

Hackers and Harm Reduction / 29c3 / CCC
Hackers and Harm Reduction /  29c3 / CCCHackers and Harm Reduction /  29c3 / CCC
Hackers and Harm Reduction / 29c3 / CCCviolet blue
 
The Flyers #flushyourmeds
The Flyers #flushyourmedsThe Flyers #flushyourmeds
The Flyers #flushyourmedsflushmeds
 
Crimes Of Corrupt Leaders And Implications.pdf
Crimes Of Corrupt Leaders And Implications.pdfCrimes Of Corrupt Leaders And Implications.pdf
Crimes Of Corrupt Leaders And Implications.pdfDC Diew
 
Blazing the Trail for Corruption
Blazing the Trail for CorruptionBlazing the Trail for Corruption
Blazing the Trail for CorruptionGerald Furnkranz
 
Week 4 Profiling and VictimsOne of the most horrific nightmares.docx
Week 4 Profiling and VictimsOne of the most horrific nightmares.docxWeek 4 Profiling and VictimsOne of the most horrific nightmares.docx
Week 4 Profiling and VictimsOne of the most horrific nightmares.docxtroutmanboris
 
Racial Discrimination Essay
Racial Discrimination EssayRacial Discrimination Essay
Racial Discrimination EssayTia Chen
 
Common Application Transfer Essay Prompts
Common Application Transfer Essay PromptsCommon Application Transfer Essay Prompts
Common Application Transfer Essay PromptsPaula Poer
 
015 Essay Example Cite An Step Version How To We
015 Essay Example Cite An Step Version How To We015 Essay Example Cite An Step Version How To We
015 Essay Example Cite An Step Version How To WeLisa Graves
 
008 Essay Example Stopwaiting Inspirational
008 Essay Example Stopwaiting Inspirational008 Essay Example Stopwaiting Inspirational
008 Essay Example Stopwaiting InspirationalLindsay Alston
 
KLL4327
KLL4327   KLL4327
KLL4327 KLIBEL
 

Similar to Protective Protocals for Sheepdog Professionals (11)

Hackers and Harm Reduction / 29c3 / CCC
Hackers and Harm Reduction /  29c3 / CCCHackers and Harm Reduction /  29c3 / CCC
Hackers and Harm Reduction / 29c3 / CCC
 
The Flyers #flushyourmeds
The Flyers #flushyourmedsThe Flyers #flushyourmeds
The Flyers #flushyourmeds
 
Crimes Of Corrupt Leaders And Implications.pdf
Crimes Of Corrupt Leaders And Implications.pdfCrimes Of Corrupt Leaders And Implications.pdf
Crimes Of Corrupt Leaders And Implications.pdf
 
Blazing the Trail for Corruption
Blazing the Trail for CorruptionBlazing the Trail for Corruption
Blazing the Trail for Corruption
 
Traditional Terrorists
Traditional TerroristsTraditional Terrorists
Traditional Terrorists
 
Week 4 Profiling and VictimsOne of the most horrific nightmares.docx
Week 4 Profiling and VictimsOne of the most horrific nightmares.docxWeek 4 Profiling and VictimsOne of the most horrific nightmares.docx
Week 4 Profiling and VictimsOne of the most horrific nightmares.docx
 
Racial Discrimination Essay
Racial Discrimination EssayRacial Discrimination Essay
Racial Discrimination Essay
 
Common Application Transfer Essay Prompts
Common Application Transfer Essay PromptsCommon Application Transfer Essay Prompts
Common Application Transfer Essay Prompts
 
015 Essay Example Cite An Step Version How To We
015 Essay Example Cite An Step Version How To We015 Essay Example Cite An Step Version How To We
015 Essay Example Cite An Step Version How To We
 
008 Essay Example Stopwaiting Inspirational
008 Essay Example Stopwaiting Inspirational008 Essay Example Stopwaiting Inspirational
008 Essay Example Stopwaiting Inspirational
 
KLL4327
KLL4327   KLL4327
KLL4327
 

Protective Protocals for Sheepdog Professionals

  • 1. PROTECTIVE PROTOCOLS FOR SHEEPDOG PROFESSIONALS by Stanley I. White, IACSP, ATO The expanding cloud of evil can be seen today in every area of society. You don't have to try very hard to find it just open the newspaper, surf the web or tune into your local cable network. A majority of society walks around in a world of denial never acknowledging that evil can visit their door step at anytime. Evil is perpetrated by predators on all levels. If we are to acknowledge the existence of predators then we have to acknowledge the existence of prey. The prey in this case are the general populace of society. The final component is a question. “Who stands between the predator and the prey?” The answer is simple the protectors stand between the two. Three types of persona match up with these three categories. They are the wolf (predators), sheep (prey) and sheepdog (protectors) persona. Summarized below are brief descriptions of each: Wolf- these are the individuals who place their agenda and goals above the safety and well being of others. They will kill and maim to achieve their objectives at all cost without empathy toward anyone else. Acts of violence and aggression are the tools of their trade. They consume and use sheep indiscriminately to accomplish their agenda. They even masquerade as sheep and sheepdogs to create chaos and to infiltrate the flock. Sheep- these are the majority of individuals that represent today's society they exist in their own little world. They abide by the laws and regulations of society. The live peacefully with others and would only harm another individual in the most extreme circumstances. Personal acts of aggression and violence are something they see in the movies and are seldom personally acquainted with in their world. They live in a world of denial as it pertains to evil's direct and indirect effect on them and their loved ones. They are the prime targets of the wolf. Sometimes however, sheep may pretend to be sheepdogs to elevate themselves among members of the flock but they are easily unmasked when the wolf appears. Sheepdog- these are the individuals that put the needs of others before their own. They sacrifice to insure the safety of those who are weaker and can not or will not protect themselves. They despise chaos and the abuse of others. Their selfless acts do not come from personal desires of fame and fortune. These actions of bravery come from a desired peace and an orderly state of things. These three persona are very broad characterizations of human beings. Everyone has traces of all three in their personality depending on the circumstance. One example can involve a battle harden warrior known for his or her bravery in combat that makes them a sheepdog, however, when they are faced with confronting a loved one they become the biggest sheep in the world. This piece will approach the above mentioned subject matter from the most dominate of the three found in an individuals life. This persona controls the majority of the individual's decisions. Sheepdogs can be found in all areas of life they can be dedicated parents babysitters, ministers, teachers, mentors etc. However, the core audience for this paper are those individuals that are professional protectors their chosen professions in military, law enforcement and security require them to have the sheepdog persona to protect others as well as themselves. Due to this fact these individuals are called sheepdog professionals. Unlike anytime in recent history one group of sheepdog professionals is currently enduring public vilification and humiliation. This group consists of those in law enforcement. These individuals are
  • 2. tasked with the protection of the flock and the enforcement of society's laws 24 hours a day, 365 days a year. Their successes are always over shadowed by their failures and mistakes. They are and should be held to a higher standard. When they break the law they are sworn to protect they must face the consequences, as to not impugn the entire profession. If the entire law enforcement community is muzzled for the errors of a few the wolves will be emboldened and society as a whole will find itself in peril. The only thing worst than not aggressively engaging a wolf is to embolden one. Those in law enforcement must increase their awareness of the threats that are currently increasing and loaming around them. This is needed for their own protection as well as that of those they protect. These men and women face threats today from both foreign and domestic actors. Summarized below are such targeted attacks that have occurred against law enforcement: September 2014- Abu Muhammad al Adnani a representative of the Islamic State released an audio message urging home grown radical Islamist in the US to attack law enforcement officers, military and government personnel. October 2014- a self radicalized individual, Zale H. Thompson, attacked 4 New York City Police Officers with a hatchet before he was shot to death. December 2014- 2 New York City Police Officers ( Rafael Ramos and Wenjian Liu) were ambushed and killed by Ishmaaiyl Brinley on a city street. Brinley was later killed by New York City Police following the ambush. Prior to the attack he made anti-police statements and threats on line toward law enforcement officers. December 2014 – 2 unidentified men in Durham North Carolina attempted to ambush a police officer while he was sitting in his patrol car. The assault resulted in a gunfight, the suspects escaped and the officer was unharmed. February 2015- an unidentified Tunisian supporter of the Islamic State published an article on line detailing how radicalized Islamist can collect and share intelligence on law enforcement and their families to aid in future attacks. This information includes but is not limited to home and work addresses, family photographs, locations of children's schools, personal vehicle information etc. April 2015- during anti-police riots in Baltimore intelligence from law enforcement officials revealed that three known rival street gangs (Black Gorilla Family, Bloods and Crips) had entered into a pact to target law enforcement officers. June 2015- Terror watch list suspect Usaama Rahim was shot and killed by Boston Police after he lunged at them with a knife. Mr. Rahim had been under surveillance by federal agents and was plotting to kill and behead law enforcement officers. During the height of the 2015 Baltimore anti-police riots protesting the death of Freddie Grey local government officials taking a page from the sheep handbook issued directives to law enforcement stand down and not to engage rioters and allow them to destroy public and private property. These riots to could cost the city of Baltimore upwards of approximately 20 million dollars. In addition to monetary damage this action embarrassed and humiliated law enforcement in Baltimore and nationwide. A sheep dominated leadership can not humiliate their protectors and expect them to be self sacrificing and brave. June 2015 New Jersey State Police in riot gear engaged a large group of individuals attempting
  • 3. to illegally enter the Hot 97 Summer Jam Concert at the Metlife Stadium. Approximately 60 people were arrested and several officers received minor injuries. During the melee teargas was deployed in response to the crowd throwing rocks and bottles. It can't be overstated enough, if the wolves in society are emboldened and feel the sheepdog professionals are either afraid or restrained from acting these criminal and terrorist elements will only continue to grow stronger and act out. Following the Baltimore Riots incidents of criminal and aggressive behavior directed toward law enforcement have increased in many urban areas. Sheepdog professionals are not just unpopular with wolves but are also disliked by the sheep populace. Generally speaking sheep don't like to be told to move along, turn down their music or told they've had a little too much to drink. Many of those in the flock would like to de-fang and de-claw their protectors as well as paint them white and put them at the rear of the flock. However, this opinion changes when the flock feels the hot breath of wolves on their necks. As this dark cloud of vilification hovers over law enforcement and other sheepdog professionals, one major character flaw can be found in many of these protectors; they suffer from the fact that they are so engaged in the protection of others that they neglect their own well being. Documented below are simple protocols that protectors can implement to enhance their safety: 1. Always keep your travel/vacation plans and work schedule private, only share this information with a few trusted individuals. 2. Keep information regarding your family and associates private and off the Internet and social media sites. Remember what you tweet and text about yourself can be seen by the world. Structure your social media sites to restrict who can view them. Utilize strong passwords and regularly change them. 3. Limit the distribution of your personal information on line this includes banking statements, credit card numbers, social security numbers, bank account information, passwords and other sensitive information. 4. Avoid leaving personal mail with your address on your desk and in your vehicle. Shred all waste mailings prior to disposing of them in the trash. 5. Do not open suspicious emails or access unfamiliar websites. These sites may attempt to extract personal information from your computer system. 6. Regularly perform an Internet search of your name and agency to obtain what information is being circulated about yourself and agency. 7. Always keep your cell phone charged and fully functional (this includes keeping the charger accessible). Due to the fact these phone hold photographs, personal information, text messages etc. Safe guard these devices. Avoid leaving them out of your sight (unattended in your vehicle or on your desk ). 8. Avoid using your personal laptop in Internet cafes or locations with free wifi. 9. Keep your personal vehicle stocked with a full first aid kit, blanket, flashlight, small pocket multi-tool, fire extinguisher, a gallon of fresh water and some form of non perishable nutrients (ie. energy bars). 10. Develop alternate routes to work and home; stagger your schedule as much as possible. This will make hostile surveillance difficult. 11. During routine travel to work, home and other destinations always check to detect if you are being followed. Take note of seeing the same individuals in different locations during your travels take note of what they are doing ( these individuals could be conducting surveillance on your daily routine and that of your family). 12. At least 2 times a month check the perimeter of your residence look for signs of trespassing and attempted entry into your residence. Keep plantings, shrubs, small trees etc. maintained so that trespassers and intruders will not be provided cover. Take note of signs of potential forced
  • 4. entry, strange footprints and damaged vegetation adjacent to your residence. 13. Install solid doors, heavy duty locks and a sound security system for your residence. 14. Develop an emergency plan for you and your family complete with meeting locations and passwords in case of natural disaster or terrorist attack. Many of the above recommendations are known to law enforcement, military and security professionals. But these individuals will find it easy to convey these tactics to others but difficult to implement in their own lives. However, it should be noted that as this piece is being published attacks against sheepdog professionals and their vilification is likely to increase before it lessens. Due to the fact that sheepdog professionals are tasked with the protection of others they first must be able to secure their own well being and that of their loved ones. This will allow them to have an undivided focus on evolving threats and the security of those they are tasked to protect. If these professionals were to have a motto it might read “ Forever protecting the intimidated while vanquishing the intimidators”. As the evil in the world becomes more and more pervasive the flock becomes more vulnerable. This why those men and women who stand between the predator and the prey must be supported and hailed for their selfless daily efforts. May God Bless and Protect the Sheepdog Professionals of our society. About the Author: Stanley I. White is currently the CI Advisor for the IACSP as well as a defensive tactics instructor who has trained personnel from numerous local, state and federal law enforcement agencies. He is a certified Anti- Terrorism Officer and also holds an active membership with the AFIO. He is also an internationally published author on the topics of personal security and counter terrorism. Mr White can be reached for comment at swhite@atix.riss.net.