Table of Contents Table of Contents
Previous Page  93 / 177 Next Page
Information
Show Menu
Previous Page 93 / 177 Next Page
Page Background

FFI-RAPPORT 16/00707

91

chemical plant is built in the vicinity or if someday someone decides to bomb a neighbouring

business. If the piqlVaults and production sites are protected from the risks we can predict, they

should be well-prepared for most of the ones we cannot.

The inside threat was highlighted in chapter 9 as one of the biggest security challenges the Piql

Preservation Services faces. Fortunately, there are several things that can be done to mitigate

this threat:

1) One can make sure sound procedures for vetting of potential employees are in place during

the hiring processes. These can include full security clearance or criminal record and credit

check depending on sector.

2) It is important to perform such checks at regular intervals, not just at the start of the

employment. This is to ascertain whether any changes in circumstance has come about

which can have a negative effect on the way an employee conducts him- or herself at work.

3) It is possible to put in place even stricter procedures when it comes to accessing certain

parts of the service, making sure only a few highly trusted people have access to the most

critical parts of the service.

4) Some sort of control system can be implemented which ensure that the piqlFilms cannot be

removed from the grid without being signed out by a second Piql operator.

5) Similarly, a control system can be implemented which does not allow piqlFilms to leave the

storage facility unless authorised by two or more authorised personnel.

6) A working schedule can be worked out which ensures that no one person works alone. This

applies to the writing process, during storage and it applies to the security personnel. For

instance, a Piql operator working alone can simply put a memory stick into the computer

and download the original file, and a security guard working the night shift can be bribed to

give unauthorised access to threat actors.

Besides these specific measures, mitigating the inside threat mostly comes down to building a

relationship of trust between employees.

In chapter 5.4 of this report, when we outlined the location and description of the piqlVault, we

alluded to the fact that perhaps not all users would wish to store their sensitive information in a

regular office building. We were referring to the so-called high demanding user. When such

users believe that a regular office building will not provide sufficient safety and security

measures, our recommendation is to instead place their piqlVault system in a mountain

repository.

46

The additional safety and security benefits of placing the information in a mountain

hall include the location, which is somewhere off the beaten track, the exact location possibly

being unknown to most people, multiple backup generators as energy redundancy, and fortified

walls with additional protection against a nuclear blast, radiation, electromagnetic pulses and

CBR agents. If the user does not have access to storage facilities such as these themselves, it is

possible to rent a room in a mountain hall, which is called hosting.

46

The high demanding user may also wish to use a manual storage system instead of an automated one.