
Cyberconicts, Cyberwars and Cyberpower 163
For example, in the Wikileaks case, it was a soldier (part of the human
infrastructure) who contributed to making the contents of secret les available
to others. This could be seen as an insider agent of a cyber-threat. Without
access to ICT facilities (part of the technical infrastructure), he would not have
had the opportunity to record, store, and transmit information.
Figure 6.11 Three inter-related and inter-dependent infrastructures.
Information as a weapon
Information itself (and not only malicious software) can be a weapon, espe-
cially when it is employed in ideological campaigns designed to ...