Legal Nude Photos Pose Potential Security Risks, Expert Warns

The information about Tobias Thyberg's sexual images was never known during the security clearance. To get hold of these vulnerabilities, you have to dig very far, says Johan Åkerlund who works with security clearances.

» Published: May 10 2025 at 12:16

Legal Nude Photos Pose Potential Security Risks, Expert Warns
Photo: Linus Sundahl-Djerf/SVD/TT

Why the sensitive pictures of Sweden's new national security adviser Tobias Thyberg did not come up during the security clearance is unclear.

Johan Åkerlund works with security clearances at the company 2secure.

He explains that several parts are included in a security clearance. The more sensitive the service, the more comprehensive the control.

Great emphasis is placed on the security clearance interview.

During the interview, one should go through the person's entire character. Can the person be trusted, is the person loyal or are there any vulnerabilities that an antagonist can exploit, says Åkerlund.

Risk of dating many

In the clearance, one also searches the internet to see how exposed the person is. But things sent in closed groups or private chats are usually not accessible.

It's something the person has to tell about themselves, he says.

At the same time, he emphasizes that the responsibility does not solely lie with the applicant.

The person who wants the job must be mature enough and understand what it means so that they want to tell. But the interviewer must also be senior and competent in their role to understand that I need to get as much as I can.

It's important to have a good conversation before the interview so that the person understands why it's so important that everything comes up.

Are questions asked about sexual behavior and dating?

The question is not posed directly, but should come up if it's something that stands out from a security perspective. Regardless of one's sexual inclination, it can, for example, be a risk behavior to date different people every night.

We know that foreign powers use "social engineering" as a tool, a classic way to approach someone. The risk is that you meet someone who has an explicit goal to approach you to get information.

Nude pictures can become a vulnerability

How do you view a person sending nude pictures?

It's a risk that can become a vulnerability in the end. It could also be a kind of maturity assessment that can affect reliability.

Then it's a matter of whether the recipient has asked for it and thinks it's fun and wants it. But if one spreads it to recipients who may not want it, one can start wondering about the judgment and how reliable the person is.

Johan Åkerlund reminds us that even the Swedish security services have made mistakes and names Peyman Kia, who for several years infiltrated Must and Säpo on behalf of Russia.

Security clearances are extremely complex and difficult. In this case (Thyberg), it came up before it became a security incident. It's unfortunate, but as far as we know, it didn't become a threat to Sweden's security.

Background check.

Register check, if the employment is placed in a security class.

References from a security perspective.

A security clearance interview. Here, one looks at background, life situation, economy, and discrepancies between background check/references and what is stated.

A special person investigation, if the employment is placed in security class 1 or 2.

Grades, certificates, and references. CV verification.

Source: 2secure

Loading related articles...

Tags

TTT
By TTTranslated and adapted by Sweden Herald
Loading related posts...