Application of Operations Security as an Intelligence Analyst

Published: 2021-07-19 01:10:07
essay essay

Category: Computer Sciences

Type of paper: Essay

This essay has been submitted by a student. This is not an example of the work written by our professional essay writers.

Hey! We can write a custom essay for you.

All possible types of assignments. Written by academics

GET MY ESSAY
Since I am unemployed, am optimistic to work as an intelligence analyst in the US Department of Justice and Investigation. My primary responsibilities will be the preparation of briefing for the FBI officials, reviewing special reports of agents, and creating a liaison between the law enforcement agencies. The signing of the mobility agreement is essential for my profession. Therefore, operational security is a crucial aspect of my job. The paper has illustrated how I will use operation security when I am employed as an intelligence analyst.Identifying critical information in the profession of the intelligence analyst is essential. I will map the available data to determine the ones containing critical information. The information regarding the communications with national security agencies such as the Federal Investigation Bureau (FBI), Homeland security, and the Central Intelligent Agency (CIA) is critical. The files containing the ongoing investigations are critical in ensuring the success of the investigation (Campbell, 2010). Also, my profession deals with the analysis of immediate threats to the national security such as potential terrorist attack and such information are very critical. Finally, the reports containing analyzed intelligence data is essential.Negligent employees and the crime perpetrator are my possible threats when I become an Intelligence analyst. Negligent employees sometimes can send classified documents without encrypting. Also, during coordination between the law enforcement agencies, the third party is the potential threat. If the information reaches to an unintended party, all the operation can be compromised. Social media platform is another threat (State, 2011). Office gadget should never be used to login to the social media accounts since the hacker can use to monitor all the Bureau activities.Since I deal with information regarding the national security am supposed to analyze possible vulnerabilities and security loopholes. First, the position itself is vulnerable since I analyze and locate sensitive evidence through using the database. The information system is another vulnerable tool since the technology keeps evolving making it susceptible to hackers. The information should be stored in both hard copy and soft copy to minimize the data being lost. The bureau should ensure the software am using is updated (White, 2004).The probability of an external perpetrator hacking into my evidence database is minimal though there is a possibility of an attack happening. The recovery up to the full functioning of the system will require 72 hours. The agency will need to access the information stored in the cloud and cross check with the one stored in the hard copy before continue using. Assessment of the risk is very crucial since it determines the mitigation protocol.I will apply the appropriate countermeasure strategies to prevent the information from reaching the wrong hands. The employees will be provided with adequate training on the sound security practices. I will ensure that sensitive data is not transmitted via email or posted on social media platforms. The intelligence data sent to various security agencies will be through protected communication methods such as encryption to ensure data security. The files containing ongoing investigations will be protected, and only the vital employees in the investigation will be granted access to the files (Maniscalco, P. M., & Christen, H. T, 2011).ConclusionOperations security measure is critical in preventing enemies from hacking into the system thus denying them access to critical information. It requires the appropriate use of modern technologies and appropriate organizational culture. I will apply the operations securities techniques to ensure successful operations.ReferencesCampbell, L. J. (2010). Los Zetas: operational assessment. Small Wars & Insurgencies, 21(1), 55-80.Maniscalco, P. M., & Christen, H. T. (2011). Homeland security: Principles and practice of terrorism response. Sudbury, Mass: Jones and Bartlett Publishers.States, U. (2011). Operations security (OPSEC). Washington, D.C.: Department of the Air Force.White, J. M. (2004). Security Risk Assessment: Managing Physical and Operational Security. Burlington: Elsevier Science.

Warning! This essay is not original. Get 100% unique essay within 45 seconds!

GET UNIQUE ESSAY

We can write your paper just for 11.99$

i want to copy...

This essay has been submitted by a student and contain not unique content

People also read