The PPP document includes five appendices: Security Classification Guide (SCG), Counterintelligence Support Plan (CISP), Criticality Analysis, Anti-Tamper (AT) Plan, and the Cybersecurity Strategy.
PPP Sections and Appendices Sections Section 1: Introduction--Purpose and Update Plan Section 2: Program Protection Summary Section 3: Critical Program Information (CPI) and Critical Components Section 4: Horizontal Protection Section 5: Threat, Vulnerabilities and Countermeasures Section 6: Other System Security-Related Plans and Documents Section 7: Program Protection Risks Section 8: Foreign Involvement Section 9: Processes for Management and Implementation of PPP Section 10: Processes for Monitoring and Reporting Compromises Section 11: Program Protection Costs Appendices Appendix A: Security Classification Guide Appendix B: Counterintelligence Support Plan Appendix C: Criticality Analysis Appendix D: Anti-Tamper Plan Appendix E: Cybersecurity Strategy Table 3.
Before an ARNORTH JTF deploys to respond to a DSCA event, the ARNORTH G2X establishes contact with the FBI Joint Terrorism Task Force (JTTF) in the JOA to ensure the JTF has
counterintelligence support for threat awareness and reporting.
Finally, I agree with the consensus that the intelligence community must, above all, provide
counterintelligence support to U.S.
The LASER ACTD is actually an expansion of some technologies demonstrated in the Human Intelligence
Counterintelligence Support Tools (HICIST) ACTD.
Likewise, on 20 February 1976, the 2d Ml Company deployed to Korea and provided
counterintelligence support and intelligence analysis to the 2 ID (L).