Research & Development

res devChameleon assists technology manufacturers, Fortune 100 defense contractors, systems integrators and government R&D departments to develop solutions, conceptualize strategies and create new tools for threat mitigation. Using Predictive Profiling methods we construct and streamline security processes to connect technology with end users.

Software Applications

Using our domain expertise in threat mitigation and Predictive Profiling Chameleon provides the fundamentals for effective threat mitigation software applications. We do that by applying the following processes:

  • Articulating Aggressor's Methods of Operation
  • Articulating normal and abnormal behaviors
  • Articulating data input requirements
  • Articulating processes for suspicion refutation
  • Articulating decision making matrixes for end users
  • Articulating mitigation procedures for use by end users
  • Establishing back-up and contingency plans

Screening Technology

Chameleon designs processes for best use of security screening technology. This is done to expand the capabilities and effectiveness of Explosive Trace Detection Systems, X-Ray Machines, Metal Detectors and more:

  • Defining the aggressive means to be used by an aggressor in a given environment
  • Defining the effective range of such means of aggression
  • Constructing physical design of the technology to meet the end user's needs
  • Configuring detection sensitivity requirements
  • Estimating operational, and legal considerations
  • Establishing decision making matrixes for machine operators
  • Establishing deployment procedures for detection follow-up
  • Establishing back-up solutions for system failure
  • Creating training manuals, videos, collateral material for technology end users

Data Mining

Chameleon can articulate Suspicion Indicators and refutation procedures for data mining applications. Chameleon's systematic threat-driven approach creates query, assessment and dissemination protocols that provide the following:

  • Elimination of false positives
  • Non-Intrusive methods for data sharing
  • Dissemination of information to end users in the more effective form of Aggressor's Methods of Operation and Suspicion Indicators

Seminars & Events

There are no events in the selected category

Follow Us

Connect with us on LinkedIN Follow us on Twitter Connect with us on Facebook Subscribe to our RSS feed