Since I am unemployed, I am optimistic about working as an intelligence analyst in the US Department of Justice and Investigation. My primary responsibilities will be the preparation of briefings for the FBI officials, reviewing special reports of agents, and creating a liaison between law enforcement agencies. The signing of the mobility agreement is essential for my profession. Therefore, operational security is a crucial aspect of my job. The paper has illustrated how I will use operation security when I am employed as an intelligence analyst.
Negligent employees and the perpetrators of crime are possible threats when I become an intelligence analyst. Negligent employees sometimes can send classified documents without encrypting them. Also, during coordination between law enforcement agencies, the third party is a potential threat. If the information reaches to an unintended party, all the operation can be compromised. The social media platform is another threat. Office gadgets should never be used to log into social media accounts since hackers can use them to monitor all the Bureau’s activities.
Since I deal with information regarding national security, I am supposed to analyze possible vulnerabilities and security holes. First, the position itself is vulnerable since I analyze and locate sensitive evidence by using the database. The information system is another vulnerable tool since the technology keeps evolving, making it susceptible to hackers. The information should be stored in both hard copy and soft copy to minimize the data being lost. The bureau should ensure the software I am using is updated.
The probability of an external perpetrator hacking into my system of evidence database is minimal, though there is a possibility of an attack. The recovery up to the full functioning of the system will require 72 hours. The agency will need to access the information stored in the cloud and cross-check with the one stored in the hard copy before continuing use. Assessment of the risk is very crucial since it determines the mitigation protocol.