Posts by Chameleon Associates

Predictive Profiling of Mobile Apps

Recently it was reported that a popular and supposedly secure communication app known as “ToTok” had been exposed to be a tool used to spy on its users by the United Arab Emirates Intelligence Service. It is probably not the first nor the last time a government agency infiltrates or publishes public technologies such as…

Read More

2019 Recap

2019 was a great year for Chameleon. Two successful sessions (spring and fall) of the Israel Security Model Executive Seminar took place, with some participants joining us for a second time around.  Others who had been planning for years to come, finally did and were so happy to do so.  Chameleon has been hosting these…

Read More

Boarding Pass Safety

Over 32 million passengers will be traveling by air over this week’s Thanksgiving holidays, in the U.S.  This time of year is particularly heavy for travel but overall annual passenger numbers are growing exponentially, across the globe.  Four billion people flew in 2017, a 7.3% over 2016 and 4.5 billion people have flown so far…

Read More

One Phish, Two Phish

While a friend and I were having coffee he took a second to check his office email.  “OH OH,” he said.  “What is it?” I asked.  “Well, it could be a malicious phishing message or … maybe not.”  After thinking a moment about it, he decided not to open the message. He explained that his…

Read More

The Versatility of Protective Intelligence

This Guest Blog was originally produced by Ontic Technologies, a protective intelligence software firm.  Learn more about Ontic Technologies and their protective intelligence solutions at Ontic.ai. +++++++++++++++++++++++++++++++++++++++++++++++++++++ The concept of “protective intelligence” was originally founded on the assumption that those actors that attempt to harm public figures share a common behavior & way of thinking. Additionally,…

Read More

Russian Surveillance is Nothing New

Russian surveillance is nothing new.  Back in 1945, the Russians gave U.S. Ambassador Harriman a gift of a wall plaque that years later was revealed to be bugged. (Link here to that story.) The desire to have current, usable intelligence is a powerful motivator.  It’s surely no surprise that power-hungry states with the means and…

Read More

Hashtag Security

Tik Tok is the world’s leading short video platform, an app used for creating and sharing short videos ranging from 5 to 15 seconds, in some cases up to 60 seconds in length, enjoyed by over 500 million users across the globe.  It’s the world’s most downloaded iPhone app. As with other social media, a…

Read More

G4S Pulse Club Case Ruling

It’s been almost three years since the shooting attack at the Pulse nightclub in Orlando, Florida in June 2016.  The gunman Omar Seddique Mateen was employed as an armed security guard by G4S, although he was not working for them at the time of the attack.  Mateen had received firearms training during the nine years…

Read More

Facebook’s Robust Security

There may be complaints about Facebook’s ability to secure its users’ data, or to secure against criminals using Facebook as a platform for illicit activities, but on the home front it seems Facebook has security covered pretty well. When you think about how ubiquitous Facebook is, how beloved, hated and controversial, it’s easy to see…

Read More

Offensive OSINT: Exploiting Social Media

A NATO affiliated research group published a report this week showing results of a test they conducted using OSINT.  They wanted to see how much they could influence real world NATO soldiers via social media manipulation. The three main questions the researchers posed were: (1) What can be found out about a military exercise through…

Read More