Anti-Tamper (AT) is defined as the Systems Engineering and System Security Engineering activities intended to prevent and/or delay exploitation of critical technologies in U.S. weapon systems, training devices, and maintenance support equipment. AT measures are developed and implement to protect Critical Program Information (CPI) in U.S. defense systems developed using co-development agreements; sold to foreign governments; or no longer within U.S. control. [1, 2]
Website: DoD Anti-Tamper
AT considerations and design needs to be initiated as early as possible during program development, preferably in the Technology Maturation & Risk Reduction (TMRR) Phase, in conjunction with the identification of program CPI: :
- AT is also applicable to DoD systems during a Pre-Planned Product Improvement upgrade or a deployed system technology insertion; and
- Additionally, AT should be specifically addressed in all transfer or sales of fielded systems and in direct commercial sales to foreign governments if those systems have CPI to protect.
The Program Manager (PM) addresses AT in the Program Protection Plan which is submitted at Milestone B and updated at Milestone C. The PM also needs to develop a AT validation, Testing, and funding plan that should be a included the Life-Cycle Sustainment Plan (LCSP) and the Acquisition Strategy.
The Anti-Tamper information included in the Program Protection Plan (PPP) should include: 
- Identification of the critical technology being protected and a description of its criticality to system performance;
- Foreign Teaming and foreign countries / companies participating;
- Threat assessment and countermeasure attack tree;
- AT system level techniques and subsystem AT techniques investigated;
- System maintenance plan with respect to AT;
- Recommended solution to include system, subsystem and component level;
- Determination of how long AT is intended to delay hostile or foreign exploitation or reverse-engineering efforts;
- The effect that compromise would have on the acquisition program if AT were not implemented;
- The estimated time and cost required for system or component redesign if a compromise occurs;
- The PM recommendation and the Milestone Decision Authority (MDA) decision on AT; and
- The program AT point of contact.
- The DoD AT Executive Agent has established a network of DoD Component AT points of contact to assist program managers in responding to AT technology and/or implementation questions. View the DoD Anti-Tamper Website.
AcqLinks and References:
- Defense Acquisition Guidebook (DAG)
- DoD Instruction 5200.39 “CPI Identification and Protection Within RDT&E” – 17 Nov 2017
- Air Force Policy Directive 63-17 “Technology and Acquisition Systems Security Program Protection” – 26 Nov 01
- Website: DoD Anti-Tamper