counterintelligence support

counterintelligence support

Conducting counterintelligence activities to protect against espionage and other foreign intelligence activities, sabotage, international terrorist activities, or assassinations conducted for or on behalf of foreign powers, organizations, or persons. See also counterintelligence.
Dictionary of Military and Associated Terms. US Department of Defense 2005.
References in periodicals archive ?
The PPP document includes five appendices: Security Classification Guide (SCG), Counterintelligence Support Plan (CISP), Criticality Analysis, Anti-Tamper (AT) Plan, and the Cybersecurity Strategy.
PPP Sections and Appendices Sections Section 1: Introduction--Purpose and Update Plan Section 2: Program Protection Summary Section 3: Critical Program Information (CPI) and Critical Components Section 4: Horizontal Protection Section 5: Threat, Vulnerabilities and Countermeasures Section 6: Other System Security-Related Plans and Documents Section 7: Program Protection Risks Section 8: Foreign Involvement Section 9: Processes for Management and Implementation of PPP Section 10: Processes for Monitoring and Reporting Compromises Section 11: Program Protection Costs Appendices Appendix A: Security Classification Guide Appendix B: Counterintelligence Support Plan Appendix C: Criticality Analysis Appendix D: Anti-Tamper Plan Appendix E: Cybersecurity Strategy Table 3.
Before an ARNORTH JTF deploys to respond to a DSCA event, the ARNORTH G2X establishes contact with the FBI Joint Terrorism Task Force (JTTF) in the JOA to ensure the JTF has counterintelligence support for threat awareness and reporting.
Finally, I agree with the consensus that the intelligence community must, above all, provide counterintelligence support to U.S.
The LASER ACTD is actually an expansion of some technologies demonstrated in the Human Intelligence Counterintelligence Support Tools (HICIST) ACTD.
Likewise, on 20 February 1976, the 2d Ml Company deployed to Korea and provided counterintelligence support and intelligence analysis to the 2 ID (L).
Full browser ?