Trusted Recovery and Defensive Information Warfare by