Research & Development
Chameleon assists technology manufacturers, Fortune 100 defense contractors, systems integrators and government R&D departments to develop solutions, conceptualize strategies and create new tools for threat mitigation. Using Predictive Profiling methods we construct and streamline security processes to connect technology with end users.
Software Applications
Using our domain expertise in threat mitigation and Predictive Profiling Chameleon provides the fundamentals for effective threat mitigation software applications. We do that by applying the following processes:
- Articulating Aggressor's Methods of Operation
- Articulating normal and abnormal behaviors
- Articulating data input requirements
- Articulating processes for suspicion refutation
- Articulating decision making matrixes for end users
- Articulating mitigation procedures for use by end users
- Establishing back-up and contingency plans
Screening Technology
Chameleon designs processes for best use of security screening technology. This is done to expand the capabilities and effectiveness of Explosive Trace Detection Systems, X-Ray Machines, Metal Detectors and more:
- Defining the aggressive means to be used by an aggressor in a given environment
- Defining the effective range of such means of aggression
- Constructing physical design of the technology to meet the end user's needs
- Configuring detection sensitivity requirements
- Estimating operational, and legal considerations
- Establishing decision making matrixes for machine operators
- Establishing deployment procedures for detection follow-up
- Establishing back-up solutions for system failure
- Creating training manuals, videos, collateral material for technology end users
Data Mining
Chameleon can articulate Suspicion Indicators and refutation procedures for data mining applications. Chameleon's systematic threat-driven approach creates query, assessment and dissemination protocols that provide the following:
- Elimination of false positives
- Non-Intrusive methods for data sharing
- Dissemination of information to end users in the more effective form of Aggressor's Methods of Operation and Suspicion Indicators