The PPP document includes five appendices: Security Classification Guide (SCG), Counterintelligence Support Plan (CISP), Criticality Analysis, Anti-Tamper (AT) Plan, and the Cybersecurity Strategy.
PPP Sections and Appendices Sections Section 1: Introduction--Purpose and Update Plan Section 2: Program Protection Summary Section 3: Critical Program Information (CPI) and Critical Components Section 4: Horizontal Protection Section 5: Threat, Vulnerabilities and Countermeasures Section 6: Other System Security-Related Plans and Documents Section 7: Program Protection Risks Section 8: Foreign Involvement Section 9: Processes for Management and Implementation of PPP Section 10: Processes for Monitoring and Reporting Compromises Section 11: Program Protection Costs Appendices Appendix A: Security Classification Guide Appendix B: Counterintelligence Support Plan Appendix C: Criticality Analysis Appendix D: Anti-Tamper Plan Appendix E: Cybersecurity Strategy Table 3.
Before an ARNORTH JTF deploys to respond to a DSCA event, the ARNORTH G2X establishes contact with the FBI Joint Terrorism Task Force (JTTF) in the JOA to ensure the JTF has counterintelligence support
for threat awareness and reporting.
Finally, I agree with the consensus that the intelligence community must, above all, provide counterintelligence support
The LASER ACTD is actually an expansion of some technologies demonstrated in the Human Intelligence Counterintelligence Support
Tools (HICIST) ACTD.
Likewise, on 20 February 1976, the 2d Ml Company deployed to Korea and provided counterintelligence support
and intelligence analysis to the 2 ID (L).