30.09.2015 Views

Predictive Profiling

Predictive Profiling - Chameleon Associates

Predictive Profiling - Chameleon Associates

SHOW MORE
SHOW LESS
  • No tags were found...

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

<strong>Predictive</strong> <strong>Profiling</strong><br />

THE MOST EFFECTIVE TECHNIQUE FOR CATCHING<br />

TERRORISTS AND CRIMINALS


PREDICTIVE PROFILING<br />

THE MOST EFFECTIVE TECHNIQUE FOR CATCHING TERRORISTS AND CRIMINALS<br />

A seminar by Chameleon Associates Pte Ltd<br />

March 8 th – 9 th 2010, The Legends, Fort Canning Park, Singapore<br />

<strong>Predictive</strong> <strong>Profiling</strong> is a proprietary security methodology of situation<br />

assessment developed by Chameleon Associates to predict and<br />

categorize the potential for inappropriate, harmful, criminal and/or<br />

terrorist behavior. This methodology leads to the deployment of<br />

procedures and actions necessary to confirm, reduce, neutralize<br />

and/or eliminate such threats.<br />

<strong>Predictive</strong> <strong>Profiling</strong> focuses on categorizing terrorists & criminals into<br />

behavioral (situational) profiles as opposed to racial, religious or<br />

ethnic profiles. The use of “mules”, the falsification of identities<br />

and the variety of international and domestic criminal and terrorist<br />

groups in operation, have rendered racial profiling an inefficient<br />

method for threat mitigation. Chameleon’s <strong>Predictive</strong> <strong>Profiling</strong><br />

methodology provides the complete situational profile for a criminal<br />

or terrorist scenario, from the planning of the attack to the<br />

execution, focusing on what terrorists and criminals do, and not who<br />

they are.<br />

2


Chameleon presenters bring a rich operational<br />

background to the classroom. All of Chameleon’s<br />

trainer use their extensive professional experience to<br />

back the information and methodologies presented in<br />

the course. In addition to being expert in their field,<br />

Chameleon presenters are also experienced trainers<br />

and teachers skilled with transferring the course<br />

material in a constructive and entertaining manner.<br />

COURSE OBJECTIVES<br />

! To train security professionals to conduct threat and<br />

situational assessment of a potential terrorist or criminal<br />

situation.<br />

! Develop the skills for detection of Suspicion Indicators<br />

relating to the adversary’s methods of operations and the<br />

protected environment.<br />

! Learn to Implement the Chameleon’s Cyclical Security<br />

Engineering Process<br />

! Know the principles and guidelines for security questioning<br />

This course is a one-of-a-kind educational experience<br />

aimed at changing mindsets and at scientifically<br />

articulating the methods and skills behind proactive<br />

security operations. We would be happy to see you at our<br />

seminar and enjoy what thousands of security and<br />

intelligence professionals around the world have already<br />

experienced.<br />

3


SEMINAR PROGRAM<br />

DAY ONE Description<br />

09:00 - 09:10 Introduction to the course and the instructors<br />

09:10 - 10:30 The Nature of the Terrorist Threat -Audience will learn of the guiding principles<br />

for planning and executing a terrorist attack.<br />

10:30 - 10:45 Break<br />

10:45 - 11:30 Means of Aggression - Audience will learn about bomb configurations as well as<br />

concealment methods of means of aggression.<br />

11:30 - 11:40 Break<br />

11:40 – 12:30 Adversary’s Workshop - Audience will develop terrorist methods of operations<br />

through a red teaming table top exercise. Groups will present the terrorist methods<br />

of operations that they developed as a group. This exercise will be used to predict<br />

plausible terrorist methods of operations and subsequent suspicion indicators.<br />

12:30 - 13:30 Lunch<br />

13:30 - 15:00 Suicide Bombers - Methods of operations and the mitigation procedures used to<br />

thwart and prevent suicide terrorism<br />

15:00 – 15:15 Break<br />

15:45 – 17:00 <strong>Predictive</strong> <strong>Profiling</strong> - Audience will learn about the <strong>Predictive</strong> <strong>Profiling</strong> methodology<br />

and how to utilize it in threat assessments of people, objects and situations.<br />

DAY TWO Description<br />

09:00– 09:10 Recap<br />

09:10 – 10:10 Principles of Security System Testing & The Cyclical Security Engineering Process<br />

Audience will learn how to plan and implement Security System Testing drills and<br />

the effectiveness of a test for keeping the security system threat oriented. Audience<br />

will learn how to engineer predictive profiling into security operations in an<br />

effective manner.<br />

10:10 – 10:25 Break<br />

10:25 -11:15 Psychology of Threat Assessment and Decision Making – This module covers the<br />

psychological elements that influence decision making for both the adversary and<br />

the questioning officer.<br />

11:15 – 12:30 Principles of Questioning – This module general questioning techniques and the<br />

differences between law enforcement approaches, intelligence driven questioning,<br />

security questioning and interrogation.<br />

12:30 -13:30 Lunch<br />

13:30 – 15:00 Security Questioning – This module discusses the methods for effective security<br />

questioning and some of the suspicion indicators associated with individuals being<br />

questioned.<br />

15:00 – 15:15 Break<br />

15:15 – 16:00 Questioning and Technology - Audience will learn how to integrate questioning<br />

into a screening process that uses technology. Questioning is necessary to refute<br />

suspicion or threat that was identified using technology<br />

16:00 – 16:30 Questioning workshop – Trainees will exercise questioning a source under different<br />

scenarios such as: a volunteering source, a potentially betraying source and other…<br />

16:30 -17:00 Q & A – Conclusion & Handing Out Certificates<br />

!"#$%&$%&'()&'*&+#)&,)%+&-./%%)%&012)&/++)(3)3&$(&45&-/6))67&&"#)&'(.5&<br />

-'48./$(+&0&#/2)&$%&$+&$%&*/6&+''&%#'6+&+'&,)&+69.5&)**)-+$2)7&&0+&%#'9.3&,)&/&<br />

4$($494:&'()&4'(+#&.'(;7


Speaker Profile<br />

Amotz Brandes<br />

Chameleon Associates Managing Partner<br />

!<br />

Mr. Brandes is a veteran of the Israeli Defense Forces’ Special<br />

Reconnaissance Unit. He began his career as a Security Agent<br />

for El Al Israeli Airlines in Los Angeles. Since joining the<br />

Chameleon Group, he developed educational programs in<br />

“Security Questioning”, “<strong>Predictive</strong> <strong>Profiling</strong>” and “Field<br />

Intelligence”. These courses have being delivered to agencies<br />

and organizations around the world to include the U.S military,<br />

the EU commission, The Australian Federal Police, The<br />

Canadian and the New Zealand Governments to name a few.<br />

Mr. Brandes managed and implemented counter-terrorism and<br />

security projects for corporations and government agencies worldwide. He is the<br />

author of the Terrorist Threat Mitigation Reference Guide and a speaker and trainer<br />

on counter-terrorism and security worldwide.<br />

ABOUT CHAMELEON ASSOCIATES<br />

Chameleon Associates is a privately owned security training and consulting company<br />

established in the USA since 1992, with offices in Singapore and Australia. Its<br />

mission is to provide exceptional service to meet the growing global demands for<br />

professional, reliable and cutting-edge security and intelligence training and<br />

consulting services. Chameleon trainers share from actual experiences acquired from<br />

their successful careers in intelligence, covert operations and counter-terrorism;<br />

giving unique insights and practical applications that is highly sought after by our<br />

clients.<br />

SOME CUSTOMER TESTIMONIALS<br />

!<br />

!"#)& 6)/.& ='6.3& )>8)6$)(-)& /(3& ('(?*$-+$'(& )>/48.)%& '*& +#)& /88.$-/+$'(& '*& +#)$6& 4)+#'3'.';5& =)6)&<br />

%98)6,7&"#)5&())3&+'&,)&,6$)*$(;&988)6&.)2).%&'*&+#)&@A&B'2)6(4)(+7


Chameleon Associates<br />

Security through intelligence<br />

Contact:<br />

33 Ubi Ave 3, Vertex, #04-27<br />

Singapore, 408868<br />

http://chameleonassociates.com.sg<br />

andrew@chameleonassociates.com.sg

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!