Predictive Profiling
Predictive Profiling - Chameleon Associates
Predictive Profiling - Chameleon Associates
- No tags were found...
You also want an ePaper? Increase the reach of your titles
YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.
<strong>Predictive</strong> <strong>Profiling</strong><br />
THE MOST EFFECTIVE TECHNIQUE FOR CATCHING<br />
TERRORISTS AND CRIMINALS
PREDICTIVE PROFILING<br />
THE MOST EFFECTIVE TECHNIQUE FOR CATCHING TERRORISTS AND CRIMINALS<br />
A seminar by Chameleon Associates Pte Ltd<br />
March 8 th – 9 th 2010, The Legends, Fort Canning Park, Singapore<br />
<strong>Predictive</strong> <strong>Profiling</strong> is a proprietary security methodology of situation<br />
assessment developed by Chameleon Associates to predict and<br />
categorize the potential for inappropriate, harmful, criminal and/or<br />
terrorist behavior. This methodology leads to the deployment of<br />
procedures and actions necessary to confirm, reduce, neutralize<br />
and/or eliminate such threats.<br />
<strong>Predictive</strong> <strong>Profiling</strong> focuses on categorizing terrorists & criminals into<br />
behavioral (situational) profiles as opposed to racial, religious or<br />
ethnic profiles. The use of “mules”, the falsification of identities<br />
and the variety of international and domestic criminal and terrorist<br />
groups in operation, have rendered racial profiling an inefficient<br />
method for threat mitigation. Chameleon’s <strong>Predictive</strong> <strong>Profiling</strong><br />
methodology provides the complete situational profile for a criminal<br />
or terrorist scenario, from the planning of the attack to the<br />
execution, focusing on what terrorists and criminals do, and not who<br />
they are.<br />
2
Chameleon presenters bring a rich operational<br />
background to the classroom. All of Chameleon’s<br />
trainer use their extensive professional experience to<br />
back the information and methodologies presented in<br />
the course. In addition to being expert in their field,<br />
Chameleon presenters are also experienced trainers<br />
and teachers skilled with transferring the course<br />
material in a constructive and entertaining manner.<br />
COURSE OBJECTIVES<br />
! To train security professionals to conduct threat and<br />
situational assessment of a potential terrorist or criminal<br />
situation.<br />
! Develop the skills for detection of Suspicion Indicators<br />
relating to the adversary’s methods of operations and the<br />
protected environment.<br />
! Learn to Implement the Chameleon’s Cyclical Security<br />
Engineering Process<br />
! Know the principles and guidelines for security questioning<br />
This course is a one-of-a-kind educational experience<br />
aimed at changing mindsets and at scientifically<br />
articulating the methods and skills behind proactive<br />
security operations. We would be happy to see you at our<br />
seminar and enjoy what thousands of security and<br />
intelligence professionals around the world have already<br />
experienced.<br />
3
SEMINAR PROGRAM<br />
DAY ONE Description<br />
09:00 - 09:10 Introduction to the course and the instructors<br />
09:10 - 10:30 The Nature of the Terrorist Threat -Audience will learn of the guiding principles<br />
for planning and executing a terrorist attack.<br />
10:30 - 10:45 Break<br />
10:45 - 11:30 Means of Aggression - Audience will learn about bomb configurations as well as<br />
concealment methods of means of aggression.<br />
11:30 - 11:40 Break<br />
11:40 – 12:30 Adversary’s Workshop - Audience will develop terrorist methods of operations<br />
through a red teaming table top exercise. Groups will present the terrorist methods<br />
of operations that they developed as a group. This exercise will be used to predict<br />
plausible terrorist methods of operations and subsequent suspicion indicators.<br />
12:30 - 13:30 Lunch<br />
13:30 - 15:00 Suicide Bombers - Methods of operations and the mitigation procedures used to<br />
thwart and prevent suicide terrorism<br />
15:00 – 15:15 Break<br />
15:45 – 17:00 <strong>Predictive</strong> <strong>Profiling</strong> - Audience will learn about the <strong>Predictive</strong> <strong>Profiling</strong> methodology<br />
and how to utilize it in threat assessments of people, objects and situations.<br />
DAY TWO Description<br />
09:00– 09:10 Recap<br />
09:10 – 10:10 Principles of Security System Testing & The Cyclical Security Engineering Process<br />
Audience will learn how to plan and implement Security System Testing drills and<br />
the effectiveness of a test for keeping the security system threat oriented. Audience<br />
will learn how to engineer predictive profiling into security operations in an<br />
effective manner.<br />
10:10 – 10:25 Break<br />
10:25 -11:15 Psychology of Threat Assessment and Decision Making – This module covers the<br />
psychological elements that influence decision making for both the adversary and<br />
the questioning officer.<br />
11:15 – 12:30 Principles of Questioning – This module general questioning techniques and the<br />
differences between law enforcement approaches, intelligence driven questioning,<br />
security questioning and interrogation.<br />
12:30 -13:30 Lunch<br />
13:30 – 15:00 Security Questioning – This module discusses the methods for effective security<br />
questioning and some of the suspicion indicators associated with individuals being<br />
questioned.<br />
15:00 – 15:15 Break<br />
15:15 – 16:00 Questioning and Technology - Audience will learn how to integrate questioning<br />
into a screening process that uses technology. Questioning is necessary to refute<br />
suspicion or threat that was identified using technology<br />
16:00 – 16:30 Questioning workshop – Trainees will exercise questioning a source under different<br />
scenarios such as: a volunteering source, a potentially betraying source and other…<br />
16:30 -17:00 Q & A – Conclusion & Handing Out Certificates<br />
!"#$%&$%&'()&'*&+#)&,)%+&-./%%)%&012)&/++)(3)3&$(&45&-/6))67&&"#)&'(.5&<br />
-'48./$(+&0&#/2)&$%&$+&$%&*/6&+''&%#'6+&+'&,)&+69.5&)**)-+$2)7&&0+&%#'9.3&,)&/&<br />
4$($494:&'()&4'(+#&.'(;7
Speaker Profile<br />
Amotz Brandes<br />
Chameleon Associates Managing Partner<br />
!<br />
Mr. Brandes is a veteran of the Israeli Defense Forces’ Special<br />
Reconnaissance Unit. He began his career as a Security Agent<br />
for El Al Israeli Airlines in Los Angeles. Since joining the<br />
Chameleon Group, he developed educational programs in<br />
“Security Questioning”, “<strong>Predictive</strong> <strong>Profiling</strong>” and “Field<br />
Intelligence”. These courses have being delivered to agencies<br />
and organizations around the world to include the U.S military,<br />
the EU commission, The Australian Federal Police, The<br />
Canadian and the New Zealand Governments to name a few.<br />
Mr. Brandes managed and implemented counter-terrorism and<br />
security projects for corporations and government agencies worldwide. He is the<br />
author of the Terrorist Threat Mitigation Reference Guide and a speaker and trainer<br />
on counter-terrorism and security worldwide.<br />
ABOUT CHAMELEON ASSOCIATES<br />
Chameleon Associates is a privately owned security training and consulting company<br />
established in the USA since 1992, with offices in Singapore and Australia. Its<br />
mission is to provide exceptional service to meet the growing global demands for<br />
professional, reliable and cutting-edge security and intelligence training and<br />
consulting services. Chameleon trainers share from actual experiences acquired from<br />
their successful careers in intelligence, covert operations and counter-terrorism;<br />
giving unique insights and practical applications that is highly sought after by our<br />
clients.<br />
SOME CUSTOMER TESTIMONIALS<br />
!<br />
!"#)& 6)/.& ='6.3& )>8)6$)(-)& /(3& ('(?*$-+$'(& )>/48.)%& '*& +#)& /88.$-/+$'(& '*& +#)$6& 4)+#'3'.';5& =)6)&<br />
%98)6,7&"#)5&())3&+'&,)&,6$)*$(;&988)6&.)2).%&'*&+#)&@A&B'2)6(4)(+7
Chameleon Associates<br />
Security through intelligence<br />
Contact:<br />
33 Ubi Ave 3, Vertex, #04-27<br />
Singapore, 408868<br />
http://chameleonassociates.com.sg<br />
andrew@chameleonassociates.com.sg