

54
FFI-RAPPORT 16/00707
Failure/malfunction:
Harmful emission
o
Chemical
o
Biological
o
Radioactive
Conventional accidents
o
Explosions/fire
o
Structural collapse
o
Transport accident
Failure of service or utility supply
o
Failure of vital infrastructure
o
Failure of vital societal functions
All of the events identified to have an impact on the security of a nation are also relevant risks
to the Piql Preservation Services. Hence, they will form part of the sample space when the final
selection of scenario classes is chosen and the specific scenarios descriptions are written out.
6.3.2
Applied to Issues of Security
Morphological analysis works well with events caused by intentional acts, deliberation and
calculation. We have here created our own morphological box adapted to the problem in the
report.
The process is separated into two phases: the analysis phase and the synthesis phase. We must
begin with the first step of the analysis phase, which is to concisely define the problem. In this
report a relevant question/problem would be:
What are all intentional threats and challenges
that the Piql Preservation Services may face today and for 500 years to come?
The next step is to define the parameters which best characterise the problem we have defined in
the preceding step. As we focus on intentional acts, the threats would have to be directed at the
Piql Preservation Services itself, apart from nuclear war and terrorism as explained previously.
A logical place to start is therefore to characterise the threat actors with an interest in attacking
the Piql Preservation Services, their intentions and capacities.
Hence, the following parameters were defined:
-
Actor
-
Goal
-
Method
-
Means
The next step is to assign a range of relevant values, or conditions, that each parameter might
have. Here it is very important to define the values very clearly. The values should be mutually
exclusive and exhaustive for the given parameter in accordance with the problem. We have
made broad assumptions and cast wide nets when it comes to our parameters and definitions.