Killer Surveillance

Surveillance is a critical tool for any adversary.  Yet, so often in security it is discounted.  Anyone from a pickpocket trailing their next victim, to a high level assassination team following their target, depends on surveillance as part of their operational planning and attack execution. Let’s look at it from an adversarial angle, from the…

Read More

New IDF Red Unit

A new ‘Red Unit’ is being created by the Israeli Defense Forces (IDF) to specifically help in its fight against terrorist groups like Hamas and Hezbollah.  Terrorists and insurgents differ in many ways from traditional military.  They operate in densely populated areas and engage in asymmetrical warfare.  Terrorists target civilians; for them, the regular rules…

Read More

COVID-19 and Crime

The COVID-19 crisis offers abundant opportunities for criminals and it provokes individuals who are already on edge – to act out.  COVID-19 home quarantines have the effect of making us go ‘stir crazy’.  But this crisis also tends to stir up those folks who are already primed to violence.  The unknowns, danger, disruption and isolation…

Read More

Hospital Security in Times of Covid-19

Hospitals that only a few months ago were hosting kidney transplants and mending accident victims are now full time Covid-19 triage and acute care centers. Medical centers as perhaps never before are on the forefront of a global battle. Frustrated, overworked personnel are being forced to make hard decisions about distribution of limited resources. The…

Read More

Predictive Profiling of Mobile Apps

Recently it was reported that a popular and supposedly secure communication app known as “ToTok” had been exposed to be a tool used to spy on its users by the United Arab Emirates Intelligence Service. It is probably not the first nor the last time a government agency infiltrates or publishes public technologies such as…

Read More

Three Levels of Security Deterrence

In security there are three basic levels of deterrence. Deterrence levels are measured based on the cognitive assessment an adversary makes and their emotional experience when facing the security system he is about to attack. Deterrence Level 1 is achieved in a security system that incorporates detection technology such as x-ray machines, metal detectors or…

Read More

2019 Recap

2019 was a great year for Chameleon. Two successful sessions (spring and fall) of the Israel Security Model Executive Seminar took place, with some participants joining us for a second time around.  Others who had been planning for years to come, finally did and were so happy to do so.  Chameleon has been hosting these…

Read More

Boarding Pass Safety

Over 32 million passengers will be traveling by air over this week’s Thanksgiving holidays, in the U.S.  This time of year is particularly heavy for travel but overall annual passenger numbers are growing exponentially, across the globe.  Four billion people flew in 2017, a 7.3% over 2016 and 4.5 billion people have flown so far…

Read More

One Phish, Two Phish

While a friend and I were having coffee he took a second to check his office email.  “OH OH,” he said.  “What is it?” I asked.  “Well, it could be a malicious phishing message or … maybe not.”  After thinking a moment about it, he decided not to open the message. He explained that his…

Read More