1,779
Views
0
CrossRef citations to date
0
Altmetric
Articles

Improved conceptualising of hybrid interference below the threshold of armed conflict

ORCID Icon & ORCID Icon
Pages 169-195 | Received 08 Jun 2023, Accepted 03 Oct 2023, Published online: 26 Oct 2023

ABSTRACT

European policymakers have identified the need to understand influence operations on social media, cyber-attacks or hidden economic investments – activities that can be characterised as hybrid threats or hybrid warfare. Yet, the difference between hybrid threats and hybrid warfare is unclear. In 2019, Mikael Wigell therefore coined the term “hybrid interference” to clarify the distinction between “hybrid warfare” and “hybrid threats”. However, less attention has been given to the activities hybrid interference may consist of. To address this gap we have used a morphological analysis, which is a structured tool for analysis that addresses all aspects of a concept. Through this method, we propose categories that make more sense of the complex phenomenon of hybrid interference. These five categories are international politics, coercive diplomacy, priming, covert coercion, and sabotage and assassinations. This article also identifies problems with referring to activities in the category of international politics as hybrid interference activities. The result is novel because we place all combinations of tools and methods within the concept of hybrid interferences in one of the five above-mentioned categories, and as such have provided a detailed operationalising of the concept in a transparent manner.

Introduction

Hybrid interference refers to “non-military practices for the mostly covert manipulation of other states’ strategic interests” (Wigell Citation2021, p. 51), often with different activities simultaneously, as “hybrid” refers to a combination (Cullen and Reichborn-Kjennerud Citation2017). This can for instance be influence operations on social media (Applebaum et al. Citation2017, Bergh Citation2020, Douglas Citation2021), cyber-attacks on critical infrastructure and gas lines (Juurvee and Arold Citation2021, Connolly Citation2022) or hack-and-leak operations in relation to national elections (Shires Citation2020). Even though hybrid interference is not a new phenomenon, it has received growing international attention (Hoffman Citation2014, Palmer Citation2015, Wither Citation2016, Cantwell Citation2017, Wigell Citation2019, Hadzhiev Citation2020, Carment Citation2021, Wigell Citation2021), also of the critical sort (Stoker and Whiteside Citation2020). There is an urgency to better understand hybrid interference under the threshold of armed conflict as governments in Europe have started implementing counter-measures against a concept that remains ambiguous (Janičatová and Mlejnková Citation2021). The unintended consequences of implementing policies against an unclear concept can be problematic. Due to the ambiguity, and what Wigell (Citation2021, p. 13) named a “terminological Babel” in the field, it is necessary to understand which activities the concept of hybrid interference consists of. In other words, there is a need to operationalise the concept. We, therefore, seek to answer the question: How can hybrid interference be systematically conceptualised?

To build on the existing literature, and systematically move the discussion further, this article contributes a refined and improved conceptualisation of hybrid interference. For this, we use morphological analysis. This method helps reduce blind spots because it forces the researches to address every combination a complex problem can consist of (Zwicky Citation1969, Ritchey Citation2013b). The morphological analysis is useful because it allows us to create a typology of hybrid interference activities and removes those combinations that are inconsistent, before organising the remaining activities in categories. This method is one of many approaches to developing typologies, but we chose the morphological analysis because of its strength in transparency. Using the morphological analysis to conceptualise and operationalise hybrid interference is, to our knowledge, completely novel.

The focus of this article is the integral components of the hybrid interference term, i.e. the interference activities, rather than how these activities in combination may cause escalating effects. This is to give the content of the concept further meaning, as Janičatová et al. (Citation2021, p. 334) argue, “conceptualizing hybrid warfare raises the question whether hybrid warfare is not really just a label primarily used for political purposes and it is really more suitable to research particular components such as information or cyber warfare”. Therefore, we seek to identify interference activities, that can provide a building block study for further research.

We have selected Europe as a starting point for conceptualising hybrid interference. Nonetheless, we do not reject the possibility of the results being relevant beyond the scope of Europe. If so, the parameters and parameter values going into the consistency analysis must be re-evaluated.

The article has the following structure: We first present the morphological method, followed by the analysis and thereafter present different categories the hybrid interference concept includes. These five categories are international politics, coercive diplomacy, priming, covert coercion, and sabotage and assassinations. Together, these five categories are all-encompassing activities that hybrid interference under the threshold of armed conflict can consist of, but an important distinction is identified when it comes to the category of international politics. After having identified the categories, we present an updated conceptualisation of hybrid interference before we conclude. These updated categories matter for our understanding of the contemporary security environment because the categorisation helps identify the different levels of challenges, as well as identify what should be separated from the concept of hybrid interference. This, in turn, can help policymakers in their efforts to detect, deter and counter these types of security threats without compromising the democratic values to be protected.

Materials and methods

Understanding hybrid interference

The “hybrid” concept is known by many names: hybrid threats, hybrid warfare, and grey zone conflict. The concept has different names and different understandings. Frank G. Hoffman, who popularised the term, refers to “competitors who will employ all forms of war, perhaps simultaneously” (Hoffman Citation2009, p. 1). Later, Hoffman (Citation2010, p. 443) described hybrid threats as “any adversary that simultaneously and adaptively employs a fused mix of conventional weapons, irregular tactics, terrorism, and criminal behaviour in the battlespace to obtain their political objectives” and as such he has a full-spectrum approach the definition. Wither (Citation2016, p. 74) presents hybrid warfare as “the concurrent use of both conventional and irregular forces in the same military campaign”. Wigell (Citation2021, p. 51) refers to hybrid interference as “non-military practices for the mostly covert manipulation of other states’ strategic interests”. These three approaches treat somewhat different yet related challenges, but the terms are used as synonyms by policymakers. In the United Kingdom, for instance, policymakers have used term “hybrid warfare” when referring to disinformation and cyber-attacks in the UK (Janičatová et al. Citation2021, p. 320), activities that according to the above-mentioned definitions are better defined as hybrid interference.

We regard hybrid interference, as introduced by Wigell (Citation2019, Citation2021), as the most fitting term to address state actors’ illegitimate meddling activities when they are conducted under the threshold of armed conflict. Firstly, we see it as problematic to use the label “war” or “warfare” for activities under the threshold of armed conflict. Secondly, the term “interference” is preferred because it more clearly communicates the nature and purpose to create change than “threats”. It is useful to read Wigell’s (Citation2019) definition in relation to the definition of “interference” itself. Interference has negative connotations, according to Berzina and Soula (Citation2020), who refer to the Cambridge Dictionary (Citationn.d.) definition of interference being “to involve yourself in a situation when your involvement is not wanted or is not helpful”. Yet, we do not concur with Wigell (Citation2021) when he does not include military instruments as part of hybrid interference strategies. Certainly, the show of arms or muscle flexing, as seen in recent years (Halas Citation2022, Kristian Åtland et al. Citation2022) can be part of the conceptualisation. Therefore, our approach to this concept relies on parts of Wigell’s (Citation2021, p. 51) definition of hybrid interference, namely, that it is “practices for the mostly covert manipulation of other states’ strategic interests”. Henceforth, we will exclusively refer to the concept as hybrid interference in our conceptualisation.

Morphological analysis

The General Morphological Analysis (GMA) was initially developed by Fritz Zwicky and is a method of structuring and analysing multidimensional problems (Zwicky Citation1969, Ritchey Citation2013a, Citation2013b). The method is especially suitable for analysing complex questions because the concept that is analysed must be divided into all its sub-parts (Rittel and Webber Citation1973, Ritchey Citation2013a). In the field of security and defence, this method has been used for military scenario modelling (Johansen Citation2018) and analysis of social media influence operations (Buvarp Citation2023). The morphological analysis is useful for hybrid interference because of the many components the concept consists of. While we use Zwicky’s method throughout the article, the approach is similar to fuzzy set theory (Ragin Citation2005) and typology development in political science (Ewers-Peters Citation2022). Our analysis follows a similar logic to typology development as proposed by George and Bennett (Citation2005). Both George and Bennett (Citation2005) and Zwicky (Citation1969) seek to (i) define the overarching concept, (ii) specify the concept’s internal construction, (iii) remove combinations that are highly unlikely or impossible, (iv) propose a model for understanding the concept and (v) simplify the model (Zwicky Citation1969, George and Bennett Citation2005). While several typology development methods are useful, morphological analysis is a particularly transparent and rigid method.

The morphological analysis is described in detail elsewhere (Ritchey Citation2013a, Citation2013b), therefore, only a short description is given here. Morphological analysis has the following steps: (1) Formulation of the problem to be solved; (2) identification and analysis of all parameters that are relevant to the problem; (3) construction of the morphological space; (4) conduct a consistency analysis to remove logically or empirically inconsistent combinations.Footnote1 The result is the solution space; (5) evaluation of steps 1–4 and creation of appropriate and meaningful categories within the solution space.

Formulation of the research problem and choice of parameters

The analytical problem treated in this study is:

How can hybrid interference be systematically conceptualised?

Understanding the activities of hybrid interference is identified as a key problem to understand within the European security context. Murphy (Citation2022, p. 2) argues that “security professionals remain trapped in outdated frameworks that rely on a nation-state’s traditional constructs”. We seek to avoid this by aligning ourselves with scholars seeking to widen and deepen the conceptual security lens. The intention of this article is not to debate security theory or different definitions of security, but we want to highlight that by “deeper” security, we mean a referent object beyond the state, and with “wider”, we mean sectors beyond the military (Buzan and Hansen Citation2009, p. 188).

Six parameters describe the research problem. The parameters are based on the following questions, inspired by the morphological analysis for scenario planning in the defence sector written by Johansen (Citation2018):

  1. Threat actor: What type of actors pose a threat to European security?

  2. Objective: What overall objectives are motivating these threat actors?

  3. Target: What societal areas and/or values can be targeted, to reach these objectives?

  4. Method: What methods can the threat actors use to reach their objectives?

  5. Instrument: Which instruments are necessary for utilising a specific method?

  6. Concealment: Will the threat actor conceal its actions?

Parameter values should not overlap, nor should the number of parameter values be too large because this will make the analysis unnecessarily complex. Together the parameters provide a basis for describing an action.

Choice of parameter values

The choice of parameter values is vital for the conceptual understanding. It is important that the parameter values are unspecified to sectors or incidents because too narrow parameter values will create a solution space with blind spots. When we keep the parameter values more general, we can catch the breadth of hybrid interference. This opens the analysis to include incidents that have not yet happened but may in the future. Keeping the analysis open to previously unforeseen incidents is vital for the relevance of the analysis. However, we have no intention to create an exhaustive list of all specific actions, nor would it be possible.

The first parameter value is the threat actor. In the EU conceptual model for hybrid interference, both state and non-state threat actors are included (Giannopoulos et al. Citation2021). As mentioned, the purpose of this study is to contribute to an increased understanding of state actors’ use of hybrid interference. Non-state actors have therefore been excluded from the analysis. It also is beyond the scope of this article to distinguish between state actor and coalition of states. This is because both a coalition of states and a single state will pose the same challenge. While we acknowledge that actions by separate state actors can have mutually reinforcing effects, for the purpose of this study, we will consider a single state actor and as such only have one value within the actor parameter. Furthermore, we chose not to look at specific individual states but rather a generic state actor that may intend to endanger security in Europe. We will still give examples from specific state actors to illustrate contemporary relevance. Through this, the study will help increase the overall understanding of how state actors can threaten security in Europe through hybrid interference, without attempting to consider the unknown limits of a specific state’s capability.

The parameter value objective means what the threat actor wants to achieve with the intended action. The upper value for the objective will be to deprive governments of all sovereignty. Such an objective can be characterised as changing political governance. While we acknowledge the emerging research on democratic backsliding in Europe (Sitter and Bakke Citation2019, Anna Vachudova Citation2020), the majority of European countries today are democracies according to democracy indexes provided by for instance Freedom House (Citation2022) and the Economist, with the Nordic and Western European states are most democratic (The Economist Intelligence Unit Citation2022a, Citation2022b). In such stable states, changing political governance will require military control over the territory, argues Johansen (Citation2018). For this study, changing political governance is therefore outside the scope. Hybrid interference can, however, be used to influence political decisions by “influencing public and governmental policy” or “destabilizing public institutions” (Bernal et al. Citation2020, p. 3). This may be in the form of forcing political concessions in individual cases or forcing more protracted changes in policy that are beneficial to the threat actor. In this study, we group these objectives in the parameter value-creating change in policy. Another goal may be to weaken agency. To weaken a state’s agency could be related to access to information, technology, or resources, gaining a better negotiating position, or laying the groundwork for more serious, intentional actions. A third parameter value, undermine trust in societal institutions, aims to cover a distinctive feature of a state actor’s use of hybrid interference, as identified by Giannopoulos et al. (Citation2021). This can for instance be to make (parts of) the population believe democratic elections were rigged. Undermining trust in societal institutions can undermine the legitimacy of the authorities (Lipset Citation1968, p. 74, Haugsgjerd and Segaard Citation2020) or make the population more vulnerable to conspiracy theories and the spread of incorrect or misleading information (Dyrendal and Emberland Citation2019, Bergh Citation2020). By utilising these three parameter values of objectives, it is possible to create a distinction between different tactics that aim to harm (a) policies, (b) the ability to form policies, and (c) the trust the population has in policies.

To identify a target in this study, we have used Cullen and Reichborn-Kjennerud (Citation2017) as a starting point. Cullen and Reichborn-Kjennerud (Citation2017) rely on the PMESII domains, i.e. political (P), military (M), economic (E), social (S), informational (I) and infrastructure (I). We have attempted to be more specific in what these PMESII domains can entail, and the following four categories of target groups are identified: government agencies/civil service (covering political in PMESII domains), the Armed Forces/military (covering military in PMESII domains), the population (covering social in PMESII domains) and business/infrastructure/natural resources (covering infrastructure in PMESII domains).Footnote2 For the purposes of this study, government agencies comprise both the political level and civil servants in ministries and other institutions of the central government. These targets encapsulate the public, private, civilian, and military aspects of a target group.

The parameter method can be described as the plan or procedure for action the threat actor will use to achieve its objective, for example by exploiting vulnerabilities in the target group. We seek to identify escalating levels of severity within the parameter method. The suggested parameter values are influence, coercion, and damage. Influence can be understood as the “ability to get others to act, think, or feel as one intends” (Banfield Citation2003, p. 3). A more aggressive method than influence is to exert pressure to achieve a concrete outcome. We refer to this as coercion. Coercion is “a bargaining strategy that states implement to compel their adversaries to alter their behavior” (Helal Citation2019, p. 4). This can involve threats to destabilise the adversary, or to get the adversary to do something it would otherwise not have done (Hodgson Citation2018, Giannopoulos et al. Citation2021). In other words, we concur with Helal (Citation2019) that coercion can include, but is not limited to, the use of military force, or the threat of it.Footnote3 The most aggressive method is warfare in which the conflict enters a phase of open use of military instruments. As this study looks at hybrid interference below the threshold for armed conflict, warfare is not included. Nevertheless, to cause harm to people and infrastructure, for example through terrorist attacks by proxy actors (non-state actors), can be a component of hybrid interference (Giannopoulos et al. Citation2021, p. 42). We refer to this method as damage, to address violent actions, which do not reach the level of armed conflict. This type of method will have the potential to cause physical harmFootnote4 and destroy infrastructure or property.

To implement a method to achieve an objective, it is necessary to use an instrument. In the literature, several different instruments have been proposed as part of hybrid interference, both military and non-military instruments (Cullen and Reichborn-Kjennerud Citation2017, Karlsen Citation2019, Giannopoulos et al. Citation2021). For this study, we use the so-called MPECI framework utilised by Cullen and Reichborn-Kjennerud (Citation2017) as a starting point because of its structured nature. MPECI stands for military (M), political (P), economic (E), civilian (C) and information and cyber-related (I). We separate civilian and military instruments, where weapons used by civilians (as proxy actors of states), or military forces operating covertly, have been differentiated from military as an instrument. In this article, we refer to these instruments under the category physical. Such physical devices may be firearms, stabbing weapons, vehicles against a crowd, or improvised explosives. Physical devices may also be non-kinetic devices such as chemical, biological or radiological agents. For political, we rely on Hay (Citation2002), who argues that politics is the arena for (overt) decision-making of the government. This can be can be diplomacy, negotiations or expressing support for extremist groups or protest movements. Economic instrumentsFootnote5 can be foreign direct investments in the form of new establishments, mergers and acquisitions, portfolio investments, as well as loans and other financial support like aid, manipulation of import or export flows (e.g. trade barriers imposed as economic sanctions), manipulation or promotion of currency, and several other instruments (Waage et al. Citation2021, pp. 37–39). Illegal economic instruments such as corruption are included here, as scholars have identified strategic corruption as a potential national security threat (Bellows Citation2020, Giannopoulos et al. Citation2021, Waage et al. Citation2021a, Citation2021b). An example of strategic corruption is how Russia illegitimately finances far right parties such as Front National in France and AfD in Germany, argues Huss and Pozsgai-Alvarez (Citation2022). We also include judicial/law instruments. Judicial/law instruments can for instance be the use of law to exploit weaknesses or ambiguities in rules and legislation or to overburden the judiciary system or use law for a strategic advantage (Kittrie Citation2016, Munoz Mosquera and Bachmann Citation2016, Dunlap Citation2017).

The parameter values informational and cyber instruments include a wide range of possibilities to obtain, manipulate or destroy information (Hodgson Citation2018). While we acknowledge that it is useful to see these tools in combination, for the purpose of this method, we have chosen to separate the two. The National Institute of Standards and Technology at the US Department of Commerce (NIST) defines “information environment” as “[t]he aggregate of individuals, organizations, and systems that collect, process, disseminate, or act on information” (NIST Citationn.d.-b). Examples of such instruments could be the use of social media to spread misinformation or reinforce existing contradictions and conflicts in a population (Bergh Citation2019). A report by EUvsDisinfo gives several examples of how disinformation narratives can look like and debunks these narratives. One of these examples is when Russia in 2023 claimed that “Ukrainian refugees smuggle weapons and bring crime to Europe” (EUvsDisinfo Citation2023a, Citation2023b).

NIST defines cyberspace as “[a] global domain within the information environment consisting of the interdependent network of information systems infrastructures including the Internet, telecommunications networks, computer systems, and embedded processors and controllers” (NIST Citationn.d.-a). This can for instance include denial-of-service (DOS) attacks that block radio signals, also known as jamming (Pelechrinis et al. Citation2011). An example of this is Estonia’s experience of a cyber-attack in 2007. Large amounts of spam overloading internet, making banks, journalists and government bodies unable to do their jobs are some examples of what happened in Estonia (BBC News Citation2017). Cyber instruments can be seen as part of the military, so although we acknowledge this overlap, for the purpose of this study we have decided to specifically identify cyber as a tool separate from the armed forces in the military. By military, we refer to armed forces within the traditional land, maritime and air domains (NATO Citation2022).

The last parameter, concealment, describes whether the threat actor chooses to perform open or covert actions. In Wigell’s (Citation2019, p. 263) definition, hybrid interference is characterised as “more or less concealed”. Based on this understanding, both open and covert forms of actions must be included in the morphological analysis. Cormac and Aldrich (Citation2018, p. 478) write that “[t]he orthodox consensus assumes that states engage in covert action when they can plausibly deny sponsorship”. Cormac et al. (Citation2018, p. 478) continue to problematise the concept of “plausible deniability”, referring rather to “non-acknowledged intervention as performance” (Cormac et al. Citation2018, p. 493). We rely on this understanding and refer to overt actions as those that are acknowledged by the actor. According to Stout (Citation2017, p. 94), a covert action is “something done to produce an effect in the world while obscuring who is responsible for it”, and it is not limited to lethal actions. For the purpose of this study, covert here then refers to both actions that are hidden (clandestine activities) and actions that have a hidden actor (or at least unacknowledged activities) (Cormac et al. Citation2018, Lamb and Tucker Citation2019).

Some parameters and parameter values have not been included in this analysis. While investigating the role of non-state actors is interesting, it has been regarded beyond the scope of this article. One parameter that could have been part of this study is the element of legality of the action conduction. A legal analysis could provide value for decision-makers for setting thresholds when developing counter-measures. This has however not been included because the analysis does not seek to go into the extensive detail needed to identify the legality of all actions within the solution space. Rather, the focus of the study is on the descriptive level.

Put together, the parameter values for threat actor, objective, method, instruments and concealment provide the morphological space summarised in .

Table 1. Morphological space for hybrid interference parameter values.

Limitations

Some of the limitations of this research must be addressed. Our analysis is limited to actions under the threshold of armed conflict and conducted by state actors. Most of the limitations pertain to the use of morphological analysis as our method for conceptualising hybrid interference. As Johansen (Citation2018) explains, common limitation with the morphological analysis are the use of judgmental evaluations throughout the process. As such, it must be highlighted that the method remains subjective. Certainly, there are weaknesses from the point of using only Europe, choosing parameter values and the exclusion of possible combinations. Buvarp (Citation2023), in his updated version of the morphological analysis of influence operations on social media, also highlights that the selection of parameters has large consequences for the analysis. While this is true, the morphological analysis is a particularly transparent and reproducible method that allows readers to see exactly how the results were derived and therefore allows critics of our analysis to precisely identify possible weaknesses within the analysis and suggest changes to the morphological matrix (Ritchey Citation2013a, Johansen Citation2018).

Consistency analysis

The next step in the morphological methods is to conduct a consistency analysis and remove inconsistent combinations.Footnote6 Inconsistent combinations mean pair-wise combinations that cannot co-occur. This is for instance the combination “open” with “damage”, as our analysis is below the threshold of armed conflict. We include two types of inconsistencies: (i) logical and (ii) empirical (Ritchey Citation2013a). Logical inconsistency, or logical contradictions, occurs when the paired combination is contradictory, while empirical inconsistency occurs when the paired combination is considered not relevant or highly unlikely given the conditions of the analysed problem.

The first step in the synthesis phase is an analysis of internal consistency in the morphological space provided in . The consistency analysis is based on the question: “Can value X and value Y occur simultaneously?”. The answer to this question can be based on both empirical data and logic but is not considering the likelihood of the action taking place. We avoid considering the likelihood to avoid a common issue in defence planning, which is “to confuse the unfamiliar with the improbable” (Schelling Citation1962, p. vii, Beadle Citation2016). In other words, the consistency analysis contributes to identifying the unfamiliar. It is not suitable to discuss every combination of parameter values in this study. The discussion is therefore limited to the combinations where the consistency analysis is not immediately evident. In this study, we award most attention to the combinations that have been removed ().

Table 2. The consistency matrix, including the rejected combinations illustrated by a black “X” or black square.

Removing combinations escalating to armed conflict

Several of the combinations in the matrix are removed based on the possibility of the combinations constituting actions that can cross the threshold of armed conflict. Among the combinations that have been removed are military instruments and damage as a method, military instruments against the population, and military instruments towards business, infrastructure or natural resources.

Damage, through either cyber or physical instruments, for instance, sabotage, are likely to be covert to avoid unintended escalation into armed conflict. We also remove the combination of open and damage from the consistency matrix. Physical instruments will most likely be used covertly, as the Skripal poisoning in Salisbury, United Kingdom (UK), is an example of (Wood and Henke Citation2018, Corera Citation2020). The combination of open physical instruments will become dangerously close to warfare argues Diesen (Citation2018), and hence beyond the scope of this analysis.

Removing logical inconsistencies

Other combinations have been removed from the consistency matrix. For example, the definition of damage used in this study involves violent, non-military, incidents with the potential to cause direct physical harm. It will not be possible to damage with political, judicial/law and informational instruments. These combinations are therefore removed. We also draw upon definitions by Hay (Citation2002) to identify what political is, namely (overt) decision-making of the government. Based on that definition, it is logically inconsistent that political instruments of another state can be used covertly. This combination is therefore removed.

Removing empirical inconsistencies

Military and political instruments are removed from the consistency matrix, in combination with undermine trust in societal institutions because of the lack of direct link. We have not seen empirical examples of a direct link between the foreign state actors’ use of these instruments and lower levels of trust in another state. It is also regarded as unlikely to weaken agency of European states by targeting the population directly. The people are not able to influence decision-makers’ ability to make decisions directly. We admit that states operating with a higher frequency of direct democracy may be more vulnerable to this parameter value combination (Feld and Kirchgässner Citation2000). We nevertheless remove the combination of population and weaken agency.

Results

The results, or solution space as it is called in the morphological method, is the final step of the method. In this stage, the subcategories of combination with matching criteria are presented (Ritchey Citation2013a). In other words, the solution space illustrates the subsets of the concept of hybrid interference, based on the information put into the morphological model. As such, the concept has been operationalised. This operationalisation provides a more precise understanding of the components of hybrid interference. The following five categories are identified: international politics, coercive diplomacy, priming, covert coercion, and sabotage and assassinations. A typology of these categories is presented in and a detailed list of subset activities for each category is made available in Appendix.

Table 3. Overview of categories developed through the morphological analysis as well as the parameter values included in those categories.

International politics

We introduced the concept of hybrid interference as something that seemingly covers all parts of society in which everything can be targeted. Yet, as Mälksoo (Citation2018, p. 379) asks: “if everyone becomes connected and potentially targeted in the global ‘hybrid war’ zone, what is left of politics, and the delicate balancing act between security and democratic liberties?”. We, therefore, group activities that by themselves cannot be covered by a term such as hybrid interference, in order to avoid the so-called “militant democracy whereby the very attempt to defend democracy might inadvertently damage it” (Müller 2016, p. 253 in Mälksoo Citation2018, p. 379). Berzina et al. (Citation2020, p. 8) also highlight the need to distinguish international politics from foreign interference, arguing that “public diplomacy has an emphasis on open communication, it should not be confused with foreign interference”.

The morphological analysis is a helpful instrument to identify this group of activities, which should be excluded from the hybrid interference term. One category of activities we seek to identify is the open use of influence, with economic, military, informational political or judicial/law instruments. This is simply international politics. Possible examples of this type of action may include economic investments (Waage et al. Citation2021a, Waage and Lindgren Citationn.d.), economic sanctions (Martin Citation1992, Walentek et al. Citation2021), military exercises expressing military ability through parades or general deterrence (Ametbek Citation2017, Bukkvoll et al. Citation2017, Sørensen Citation2017, BBC News Citation2019).

Activities within the international politics category can form part of longer-term plans of foreign actors, used to prepare for other more forceful or covert activities, similar to coercive diplomacy and priming. Foreign policy is often openly stated and can, of course, include obtaining power on the international stage. Gaining ownership over parts of the infrastructure can be legal, and even encouraged in an open economy and democratic society, and the risk involved must be acknowledged. Yet, these activities by themselves largely constitute legitimate actions any state engages in or encourages.

This is in line with what Wigell (Citation2021, p. 63) has proposed, namely that “democracy and human rights promotion is overt and transparent, and therefore a form of legitimate public diplomacy […] In contrast with hybrid interference”. Indeed, it is important to highlight that even though some activities are not wanted, they are a natural part of international affairs.

Identifying that these activities are not hybrid interference by themselves is important to separate the legitimate actions of international politics from the non-legitimate actions. This is imperative, as Mälksoo (Citation2018, p. 276) writes, “because the inherent danger of becoming a monster in the course of fighting monsters”. In other words, it is important to make the distinction for the principle of not jeopardising the values we seek to protect, in our protective efforts.

Coercive diplomacy (blackmail strategy)

We use the category coercive diplomacy to cover similar instruments to that of international politics, but with coercion as a method rather than influence. This is to identify an increase in the intensity of activities. In this study, coercion as a method is identified as the exertion of pressure, for instance through threats, to change behaviour (Giannopoulos et al. Citation2021, pp. 40–41). While George (Citation1994) presents both a defensive and offensive definition of coercive diplomacy in his work, we regard coercive diplomacy in this context through the offensive definition. The offensive definition of coercive diplomacy, or blackmail strategy as George (Citation1994, p. 8) has termed it, is “offensive uses of coercive threats”.

Coercion as a concept in international law is prohibited, for instance through the United Nations Declaration on Friendly Relations (UNGA Citation1970, p. 122) stating “Recalling the duty of States to refrain in their international relations from military, political, economic or any other form of coercion aimed against the political independence or territorial integrity of any State”. Yet, as Farer (Citation1985, p. 406) points out: “ … if read literally, it would outlaw diplomacy”, and indeed diplomacy is not outlawed. Farer (Citation1985, p. 406) continues: “Threats, more or less subtle, have always been an important feature of the intercourse of states, even among allies”. Limitation of export between the US and USSR during the Cold War, “whose legitimacy is rarely, if ever, questioned”, is an example of this (Farer Citation1985, p. 406). Helal (Citation2019, p. 5) echoes this, stating, “the practice of coercion is not limited to the use of force. States pressure their friends and coerce their foes using military, economic, political, and more recently, cyber instruments of statecraft”. George (Citation1994) highlights that the goal is to remain under the threshold of armed conflict to avoid the high military costs that an escalation would entail. This category of actions can include coercing government agents through threats with ultimatums, short deadlines, descriptions of possible escalation, to try to force politicians or civil servants and institutions involved in carrying out policies, to change policies.

There are several contemporary examples of this, and China’s coercive diplomacy is on the rise in Scandinavia (Forsby and Sverdrup-Thygeson Citation2022, Waage et al. Citation2022). For instance, Sweden in 2020 was subjected to warnings about “the negative impact on China-Sweden cooperation and the Swedish businesses operating in China” after Swedish authorities chose to ban Huawei from the digital infrastructure (Forsby et al. Citation2022, p. 1). The Diplomatic isolation from China for those states with friendly relations with the Tibetan leader Dalai Lama has also been experienced by for instance Denmark (2009), Estonia (2011) and Lithuania (2013) (Forsby et al. Citation2022). Other scholars have also found links between limitations on trade and receiving Dalai Lama on an official visit (Fuchs and Klann Citation2013). These are examples of coercive diplomacy that can form part of hybrid interference.

Priming

After having identified what we regard as part of global affairs, on different levels of intensity, we now seek to identify the more troublesome categories of activities. The combination of parameters of covert, influence, political, economic, judicial/law and informational, is what we can categorise as priming. The covert nature moves the activities away from acceptable and legitimate actions in international affairs, into an arena that challenges the established understanding of sovereignty and territorial integrity. The actions are like those of international politics, but the actor will typically use a third party, in order to appear disinterested, which can also give the impression of a broader base of support for its views than there is in reality.

Giannopoulos et al. (Citation2021) and Gjørv et al. (Citation2022) have also identified “priming” as a key part of hybrid interference. Priming, according to these authors, refers to the “long game effect” that can change perceptions in the population (Gjørv et al. Citation2022, p. 91). We argue that the activities identified in this category are a type of priming because these activities can manipulate states’ strategic interests as they increase the dependency on an external (state) actor. This contributes to aligning the policies to the strategic interests of the foreign state actor, yet while remaining covert. Examples of what this can entail are influence operations in social media (Wither Citation2016, Applebaum et al. Citation2017, Bergh Citation2020), corruption of persons of interest (Goldberg Citation2018, Karlsen Citation2019, Ron and Singer Citation2020) and economic investments through other actors such as shell companies (Waage et al. Citation2021a).

An example of this type of hidden activity that may have long-term effects is the case of foreign ownership of islands in Finland (Ellehuus Citation2020). In September 2018, the Finnish security and intelligence services raided several islands, one of which was owned through shell companies by a Russian oligarch, named Pavel Melnikov. There were built Several piers, a landing spot for helicopters and satellite dishes on the island were built, which the newspaper The Independent described as having “enough housing to accommodate a small army” (Higgins Citation2018). The island could have been useful and important later, due to the strategic geographical location of the island (Higgins Citation2018, Ellehuus Citation2020). This illustrates how certain actions undertaken today can be for the strategic effect gained in the future.

Covert coercion

Like the distinction between international politics and coercive diplomacy, we here distinguish between priming and covert coercion. Basing his work on that of Nutter (Citation2009), Wittmer (Citation2013, p. 15) refers to covert coercion as including “a wide array of tasks such as asset development, political action, propaganda and disinformation, economic warfare, and paramilitary action just to name the main categories”. While we have removed political action as part of covert activities, our approaches to covert coercion align. Covert coercive actions meddle with the established norms of territorial integrity and sovereignty beyond the priming category. We have chosen to distinguish covert coercion from priming, because of the intensified aggression these actions represent through the method of coercing over influencing.

An example of covert coercion is China’s economic coercion against Lithuania through an export embargo, as a response to Lithuania opening a Taiwan “representative office” in Vilnius in November 2021. China was not open about its process (Blockmans Citation2021, Reynolds and Goodman Citation2022). Another example is presented by Hodos (Citation2022), who explored how Russia supported Western political extremists and paramilitary groups, i.e. groups that are willing to use violence, in countries such as Montenegro, Hungary, Czechia, Slovakia, Serbia and Bosnia Herzegovina. While the direct link between Russian intelligence and extremist groups lacks clear evidence, the possibility of it is an action that can be categorised as covert coercion. GPS jamming during the NATO military exercise Trident Juncture in 2018 (Westbrook Citation2019) and ransomware (Egloff Citation2020) can also be categorised as covert coercion.

Sabotage and assassinations

Some of the interference activities are characteristically different from the rest due to their potential to cause physical harm. These activities are categorised as “sabotage and assignations”, and have greater hostile potential for people, property, and infrastructure. Within this category, we place the covert use of the cyber and physical instruments. Overt activities of such kind would cause much greater attention and possible unwanted escalation.

Examples of this may include sabotage of critical infrastructure and physical harm to persons of interests, through other actors. The damage on the Nord Stream gas lines in September 2022 was by both Swedish and Danish authorities categorised as deliberate sabotage (Connolly Citation2022). The Skripal poisoning in Salisbury, UK, is an example that illustrates that the capability to physically harm individuals exists (Wood et al. Citation2018, Corera Citation2020). The cyber-attacks in Estonia in 2007 in relation to the Bronze Soldier Crisis, is another relevant example of covert damage that makes sense to categorise within the sabotage category (Government Citation2020, Juurvee and Mattiisen Citation2020).

Discussion

Thus far, we have dissected the term hybrid interference by splitting the term into its different parts. Thereafter, we developed categories to illustrate commonalities in how the identified activities within each category may operate. While hybrid interference is a concept that addresses activities in combination, the concept addresses more than that. As Wigell (Citation2019, p. 255) explains, hybrid interference “makes use of the liberal values that characterize western democracy, exploiting them as opportunities to drive wedges through democratic societies and undermine governability”. Our operationalisation has illustrated the different possibilities that lie within the concept. We have illustrated some differences in severity between the categories and why international politics is distinguished from the rest.

Scholars critical of the “hybrid warfare” and “grey zone conflict” terms argue that these concepts should not be used because they “cause more harm than good and contribute to an increasingly dangerous distortion of the concepts of war, peace, and geopolitical competition” (Stoker et al. Citation2020, p. 2). We argue that it indeed is important to not to distort the concepts of war, peace and geopolitical competition, but simultaneously policy makers must manage to address multisector threats that can be harmful to democracy and national security. With the categories developed in this paper, we have addressed this potential for distortion by filtering out the category of “international politics”.

We argue that it is the covertness and/or coercion and damage as a method that moves actions into the interference category. Hénin (Citation2021), at the EU DisinfoLab, states that “foreign interference is defined as activities going beyond routine diplomatic influence practiced by governments, that may take place in isolation or alongside espionage activities” (Bentzen and Service Citation2020, p. 3). Berzina and Soula. (Citation2020) conceptualise interference as being with intent and lack of transparency. These arguments illustrate that despite our work to reconceptualise and operationalise the concept, our analysis aligns with that of other experts on the topic. Hybrid interference then becomes a combination of activities within the categories of coercive diplomacy (blackmail strategy), priming, covert coercion, and sabotage and assassinations. Activities within the category of international politics can be part of the activities taking place, but solely relying on actions within this category ought not to be categorised as hybrid interference.

Conclusion

Through the morphological analysis, we have operationalised the concept of hybrid interference and identified several avenues for interference activities and categorised these activities according to their characteristics. Our contribution is the development of a refined conceptual understanding of hybrid interference, with categories to identify the different characteristics. We argue that interference activities can be categorised as either coercive diplomacy, priming, covert coercion or sabotage and assassinations. The combination of interference activities within or across these categories is hybrid interference. The category of international politics has been filtered out of the hybrid interference concept, as its nature provides it with an acceptable place in international affairs. The analysis illustrates the many other forms of harm that can be caused by hybrid interference, despite avoiding direct open military operations. Future research could work to identify the legal and legitimate frames of the categories we have developed and investigate the extent to which our categories also are relevant to other parts of the world. This would be of value to move research on hybrid interference forward and for policymakers in their attempt to detect, deter and counter security threats in the twenty-first century.

Acknowledgements

Earlier versions of this paper were presented at a seminar at the University of Oslo 2–6 May 2022 and the hybrid threat workshop at Nord University, 1–2 June 2022. We are grateful to Ketil Bonesmo, Professor Scott Gates, Associate Professor Stian Kjeksrud, Lea Bjørgul, Kristin Waage, Cassandra Granlund and the participants in the workshop and seminar for their useful feedback. All remaining inconsistencies remain our responsibility.

Disclosure statement

No potential conflict of interest was reported by the author(s).

Additional information

Funding

This work was supported by the Norwegian Ministry of Defence.

Notes

1 In the original method, normative inconsistencies are also removed. We, however, have chosen to only use empirical evidence and logical arguments in this work, to avoid setting up normative blinders in our work.

2 More concrete targets, such as specific vital societal functions, can be included in similar but more detailed morphological analyses of hybrid interference.

3 The use of military force and the threat of using military force is prohibited by international law but the legal considerations are beyond the scope of this study.

4 We use damage to not be confused with the word “attack”, which in international law specifically refers to “a particular category of military operations”. Article 49(1) of the 1977 Additional Protocol I to the 1949 Geneva Conventions defines “attacks” as “acts of violence against the adversary, whether in offence or in defence” (Schmitt Citation2012, p. 285).

5 For a more extensive analysis of economic measures to harm national security, see Waage et al. (Citation2021a, Citation2021b).

6 One way of conducting this analysis could be to do a cost-benefit analysis of undertaking actions. However, as our study is not looking into the budget or capabilities of a specific state as a threat actor, the economic reasoning approach has not been utilized for this study.

References

Appendix

International politics

Coercive diplomacy

Covert coercion

Sabotage and assassinations