Only espionage is realy valid, propaganda is realy back to the old days of 'site defacment' and as for destruction of critical infrastructure, well if system designers would stand up to accountants and the like then this would not be possible, and as an issue could be mainly solved by legislation and the correct use of secure data diodes" and secure operating procedures.