As a Senior IT Professional, I have been tasked with multiple classified and confidential projects during my career.
While I obviously cannot go into significant detail due to non-disclosure agreements, I can give a broad overview.
Several projects required in-depth research of new technologies that could be deployed in secret to corporate-wide, and in some cases very specific, endpoints.
The results of several projects resulted in liaison with law enforcement as criminal activity was detected. The data I gathered was used as evidence in court on more than one occasion.
Digital forensic examination of employee hardware was carried out to resolve certain questions. In some cases, this lead to employee termination.
I was required to sign the Official Secrets Act of the United Kingdom in order to work with confidential government data.
Active monitoring technologies for electronic and physical tracking were employed in some very targeted cases.
A project with a US defense contractor required me to purchase specific laptops with certain features physically disabled, in order to meet security clearance requirements. This project also required physically secure storage, with access to US Citizens only, of a dedicated server that was specifically purchased to meet security requirements.
On more than one occasion I was tasked with providing support for one of our US political parties, including providing support for a US Presidential candidate. In addition, I was frequently assigned to support radio and television reporters with their IT needs while on-site.
Liaison with the US Department of State was required to ensure security requirements were met and to establish a clear division between company and personal data.
On several occasions, I was assigned projects directly by senior executive management outside of the IT department. These projects were so sensitive that my chain of command was not informed. All work took place directly between myself and the requestor to ensure it remained siloed.
I scheduled and supported a classified out of hours meeting for a very senior executive and several other attendees, whom I cannot identify. The meeting was held via Webex with an individual specialist in the northwest United States. The topic of the meeting was incredibly sensitive and had political implications. My role was to support IT requirements of all attendees and to ensure the meeting was not disturbed or discovered. All preparations were conducted in secret from the office of the requesting executive.
In the late 1990s I traveled to a corporate location in Europe. The organization was a law enforcement supplier. In response to threats from a terror group, the trip was disguised as a vacation.
A specific project required me to travel, in secret, to an out of state company location. Once there I served as a liaison for Human Resources and seized equipment. This equipment was then transported by me to another company location for examination.