Posts by Chameleon Associates

The Versatility of Protective Intelligence

This Guest Blog was originally produced by Ontic Technologies, a protective intelligence software firm.  Learn more about Ontic Technologies and their protective intelligence solutions at Ontic.ai. +++++++++++++++++++++++++++++++++++++++++++++++++++++ The concept of “protective intelligence” was originally founded on the assumption that those actors that attempt to harm public figures share a common behavior & way of thinking. Additionally,…

Read More

Russian Surveillance is Nothing New

Russian surveillance is nothing new.  Back in 1945, the Russians gave U.S. Ambassador Harriman a gift of a wall plaque that years later was revealed to be bugged. (Link here to that story.) The desire to have current, usable intelligence is a powerful motivator.  It’s surely no surprise that power-hungry states with the means and…

Read More

Hashtag Security

Tik Tok is the world’s leading short video platform, an app used for creating and sharing short videos ranging from 5 to 15 seconds, in some cases up to 60 seconds in length, enjoyed by over 500 million users across the globe.  It’s the world’s most downloaded iPhone app. As with other social media, a…

Read More

G4S Pulse Club Case Ruling

It’s been almost three years since the shooting attack at the Pulse nightclub in Orlando, Florida in June 2016.  The gunman Omar Seddique Mateen was employed as an armed security guard by G4S, although he was not working for them at the time of the attack.  Mateen had received firearms training during the nine years…

Read More

Facebook’s Robust Security

There may be complaints about Facebook’s ability to secure its users’ data, or to secure against criminals using Facebook as a platform for illicit activities, but on the home front it seems Facebook has security covered pretty well. When you think about how ubiquitous Facebook is, how beloved, hated and controversial, it’s easy to see…

Read More

Offensive OSINT: Exploiting Social Media

A NATO affiliated research group published a report this week showing results of a test they conducted using OSINT.  They wanted to see how much they could influence real world NATO soldiers via social media manipulation. The three main questions the researchers posed were: (1) What can be found out about a military exercise through…

Read More

Security Dogs

Humans and dogs enjoy a special relationship, both social and professional.  For the latter, there are many examples with which we are all familiar: SWAT teams use dogs to help clear a room, soldiers use dogs to detect IEDs, isolated facilities use dogs to guard against perimeter breaches, customs agencies use dogs to sniff out…

Read More

Parking Lot Security

Parking lots are an integral part of our modern lives.  They are attached to the places we go to shop or for work.  They can serve a logistical function as in “Let’s meet at the Walmart parking lot to carpool to the picnic.”  And parking lots can also be dangerous places.   They are convenient locales…

Read More

First Female Suicide Bomber

It may seem that suicide bombers are an artifact of our modern age, a product of a world that has become more violent over the last century.  While there is plenty of room to dispute whether violence is on the rise or descending, you may not be aware of the story of the first suicide…

Read More

New CCTV Operator Training

                          CCTV today is ubiquitous, so many businesses and municipalities (and homeowners) use cameras; they are everywhere.  But when it comes to CCTV training, it’s almost always around learning to use the equipment itself.  The training that exists is such as a camera…

Read More