. . . "Said threats may then be directed to information transmitted in the system, or to the hardware comprised in the system, such as transmission lines, terminal stations, or personal data carriers." .