The report addresses the survivability and assured availability of esential US. information infrastructures, especially when they are under various forms of information warfare attack. DAFTAR ISI: 1. INTRODUCTION 2. THE INFORMATION WARFARE THREAT AND THE MEII RESPONSE 3. VULNERABILITIES 4. RESPONSIVE SECURITY TECHNIQUES 5. IDENTIFYING SECURITY TECHNIQUES