522
Views
0
CrossRef citations to date
0
Altmetric
Research Article

The Coercion-Manipulation-Persuasion Framework: Analyzing the Modus Operandi of Systems of Non-State Actors

ORCID Icon & ORCID Icon

ABSTRACT

Non-state actors conducting terrorist attacks have shown to also rely on a mosaic of tactics to advance their strategic agendas, such as misusing educational curricula, infiltrating political institutions, and providing welfare, among others. Nevertheless, when analyzing their modus operandi, the attention has focused on violent and illegal tactics, to the detriment of non-violent and legal tactics. In light of this, and inspired by the literature on hybrid threats, this paper introduces the Coercion-Manipulation-Persuasion framework (CMPf) to holistically analyze the modus operandi of such actors, conceptually labelled as Systems of Non-State Actors (SNSAs). The CMPf is an analytical framework that combines influence modes (i.e., coercion, manipulation, and persuasion) with different categories (i.e., physical/material, symbolic, institutional, and strategic) to hypothesize over the tactics that could be used by SNSAs, thus facilitating analyses and assessments on their activities and providing anticipation and understanding. To exemplify this, three cases are non-exhaustively analyzed through the CMPf: the Nordic Resistance Movement, the Muslim Brotherhood, and Euskadi Ta Askatasuna. This study is a first step towards exploring how studies on terrorism and hybrid threats intersect, and answers the call of the EU Security Union Strategy for mainstreaming hybrid threat considerations into all policy initiatives.

Background

Over the last decades, the field of terrorism studies has undergone a transformational period facilitated amongst others by increases in researchers and research budget, the establishment of research networks and collaborations, graduate and post-graduate courses on the topic, and contributions from multiple disciplines.Footnote1 Scholars have investigated a variety of issues related to terrorism, such as the definitions of terrorism,Footnote2 its causes,Footnote3 ideologies,Footnote4 network structures,Footnote5 radicalization processes,Footnote6 and counter-terrorism strategies.Footnote7 The modus operandi of terrorist networks has been mainly understood as the use of physically violent activities. Consequently, researchers have explored attacks, kidnappings, shootings, hijacks, hostages, and the use of explosives and non-conventional weapons.Footnote8 Besides, researchers have focused on activities targeting cognition, such as the use of indoctrination and propaganda.Footnote9 To a lesser extent, researchers have explored the activities of terrorist networks that aim at depicting a positive picture of them and legitimizing their actions, such as the use of social services,Footnote10 welfare provision and formation of political groups,Footnote11 the use of transnational advocacy networks,Footnote12 and infiltration into institutional and administrative structures.Footnote13

In order to achieve their ends, organizations using terror may engage in a broad variety of tactics. Firstly, the activities that are based on “the power to hurt,” which can be understood as coercive, are exemplified by the abovementioned physically violent tactics. Secondly, the activities based on “the power to deceive,” which can be understood as manipulative, are exemplified by the tactics targeting cognition. Thirdly, activities based on “the power to convince,” which can be understood as persuasive, are exemplified by the abovementioned seemingly positive tactics. While not all non-state actors use coercive, manipulative, and persuasive tactics, analytically prioritizing the first to the detriment of the other two may lead to incomplete threat and situational assessments, and leave unaddressed potential threats to security. On the contrary, approaching the threat of such organizations from a holistic perspective, including the analysis of coercive, manipulative, and persuasive tactics, can help to improve threat assessment, situational awareness, and counter-terrorism strategies.

This study is inspired by pieces of evidence of multiple tactics used coordinately by terrorist organizations and their so-called collaborators, wings, branches, or milieus; and thus, the need of analyzing them as a whole. So far, the analysis of modus operandi has prioritized the most visible coercive tactics over the rest, and has often approached them in silos, partially missing their potential interconnections and cascading effects. For this reason, in order to facilitate the holistic analysis of a modus operandi, this study introduces the Coercion-Manipulation-Persuasion framework (CMPf). The CMPf is an analytical framework that combines three different influence modes (i.e., coercion, manipulation, and persuasion) with four categories (i.e., physical/material, symbolic, institutional, and strategic) to facilitate the elaboration of hypotheses on the tactics that could be used, and to guide their analysis.

The present paper is structured as follows: firstly, the CMPf is introduced and explained; secondly, three cases are non-exhaustively analyzed the approach of the CMPf to exemplify how the CMPf could be applied: the Nordic Resistance Movement, the Muslim Brotherhood, and Euskadi Ta Askatasuna; and, finally, the CMPf is discussed within the current security paradigm.

The Coercion-Manipulation-Persuasion (CMP) framework

Inspired by previous studies in knowledge and no-knowledge, the former US Secretary for Defense Donald Rumsfeld popularized in 2002 the distinction between the known knowns (things we know that we know), the known unknowns (things we know that we do not know), and the unknown unknowns (things we do not know that we do not know). An additional category was added later, namely the unknown knowns (the things we do not know we know). Unknown knowns have been argued to be the most intriguing category of uncertainty, an “uncomfortable knowledge” that must be included in policy debates, especially when this knowledge is crucial to understand a problem but is excluded from the accepted version of such problem.Footnote14 In the field of international security, Daase and Kessler described the unknown knowns as “situations in which factual knowledge is available in principle, but not used because it is ignored or repressed.”Footnote15 This is particularly relevant for the current study because while there is evidence of manipulative and persuasive tactics being used by terrorist networks, they are seldomly considered as part of their overall modus operandi. This disregard may consequently depict an incomplete picture of their modus operandi and, in turn, become a threat to security.

During the last decades, several theories and labels have been developed to describe the changing nature of warfare.Footnote16 These approaches acknowledge that manpower and military equipment are not the only ways used by state and non-state actors to exert influence; instead, activities such as disinformation, manipulation of education, engagement of diasporas, and direct investment, among others, have become important and have enabled actors to remain under the legal threshold and hinder attribution. Drawing from these lines of thought, the European Union has introduced the hybrid threats perspective,Footnote17 which argues that state and non-state actors seek to exploit systemic vulnerabilities of societies through a broad variety of conventional and non-conventional tools in order to achieve their strategic goals, which attempt against human rights and democratic values and institutions. While the perspective of hybrid threats has been applied to understand and analyze the behavior of state actors, non-state actors still remain comparatively under-researched and have been mainly approached as proxies of state actors.Footnote18

Inspired by the literature on hybrid threats, particularly its approach to understanding the modus operandi of hostile actors, the Coercion-Manipulation-Persuasion framework (CMPf) is introduced. The CMPf is an analytical framework developed to approach the modus operandi of a System of Non-State Actors (SNSA) from a holistic perspective. It combines influence modes (i.e., coercion, manipulation, and persuasion) with different categories (i.e., physical/material, symbolic, institutional, and strategic) to facilitate the elaboration of hypotheses on the tactics that could be used, and to guide their analysis. The need for this framework lies on the fact that physically violent activities are normally the immediate focus of attention given the visible immediate damage they can create. Meanwhile, non-physically violent activities often remain overlooked, as also proxies can be used to hinder attribution and hide connections to illegal activities, enabling actors to remain under the legal threshold. As Galtung argued, “[t]radition has been to think about violence as personal [direct] violence only, with one important subdivision in terms of ‘violence vs. the threat of violence’, another in terms of ‘physical vs. psychological war’, still another (important in ethical and legal thinking) about ‘intended vs. unintended’, and so on.”Footnote19 However, he sustains, “violence is present when human beings are being influenced so that their actual somatic and mental realizations are below their potential realizations.”Footnote20 Violence is thus broader than the direct visible damage, and tactics of a very different nature can contribute to the achievement of the same strategic objectives and, combined, pose a threat to security.

The CMPf enables to assess as modus operandi tactics that range from terrorist attacks (physical coercion) and the enforcement of cultural elements, including language or religion (symbolic coercion), to the use of front organizations (institutional manipulation) and the provision of welfare (material persuasion). For this reason, the entities directly responsible for each of those actions might not be the same, even when they behave in a coordinated manner and/or under the same leadership (e.g., armed commandos, a front company, and an NGO, respectively). Therefore, when holistically analyzing the modus operandi of an actor through the CMPf, we might not only be looking at a ‘single’ non-state actor but, instead, at a coordinated system of non-state actors (some of which might be legally considered terrorist organizations, while others might exploit legal grey areas or even be considered legal). Consequently, the basic unit of analysis whose modus operandi is analyzed through the CMPf is labelled as “System of Non-State Actors” (SNSA). By approaching these actors as a SNSA it is possible to include in the same analytical unit different types of non-state actors who share a specific ideology and political strategic objectives, and whose leadership works towards them with some degree of coordination and/or collaboration (e.g., a terrorist branch, a political group, a business, and an NGO), while acknowledging that not all may be incurring in a legally prosecuted crime with their activities. Thus, important to highlight is that, despite being analytically approached as SNSAs, this label does not substitute their eventual consideration as terrorist organizations.

Key premises of the CMPf

The CMPf is based on two key premises: (1) the modus operandi shall be approached from a holistic perspective, understood as a “method of procedure” and not restricted to criminal activities; and (2) the label terrorist organization may not be suited for acquiring a complete analytical understanding of these actors for assessment and anticipation purposes, and a neutral-value label, i.e., System of Non-State Actors (SNSA), should be used instead.

The modus operandi as a method of procedure

The CMPf is inspired by several pieces of research that evidence the engagement of SNSAs in persuasive tactics, including legal activities. Thus, understanding the modus operandi in its broadest meaning as a “method of procedure”Footnote21 is essential. Other definitions of modus operandi depend on the perpetration of criminal offences, but they are too narrow for the CMPf approach. Considering the modus operandi as a “method of procedure” enables looking at the different tactics that SNSAs can use to advance their agendas, including different types of influence and different types of legalities. For instance, while terrorist attacks clearly cause tremendous damage to society, tactics that aim to influence society by creating an immediate seemingly-positive impact may become a threat to security in the mid-to-long term. In this line, Ly argued that “charitable investments by terrorist groups [are] a way for them to advertise their ideals among potential sympathizers. Indeed, charities not only provide a conduit for money laundering, but they also truly benefit people in need. As a result, those who at least partly share the goals of the terrorist group are likely to be more willing to make their contribution to the fight.”Footnote22 Differentiating between the relevance of influence modes has been argued to be counterproductive. For instance, Levitt criticized the European Union for drawing “a fallacious distinction between the nonviolent and violent activities of terrorist groups. For example, by distinguishing between the terrorist and welfare wings of Hamas, the EU lends legitimacy to the activities of charitable organizations that facilitate terrorist operations.”Footnote23

Recently, some authors have highlighted the use of legal tactics by terrorist organizations as a strategic choice to operate within the EU territory. About the pan-European network of the Muslim Brotherhood, Vidino and Altuna argued that “[t]he movement has generally understood that being seen as a moderate and reliable interlocutor of European establishment is the best tactic to further its aims.”Footnote24 Similarly, Bjørgo and Ravndal concluded that the “[Nordic Revolutionary Movement (NRM)] leadership does not at least in principle have any moral restraints against political violence, including mass murder, and that the main reason why the NRM refrains from using terrorist methods is strategic calculation: such methods are perceived as counter-productive and likely to undermine the NRM’s prospects of gaining popular support and opportunities to propagate its political views via public and legal channels.”Footnote25 Because of this, it is important to analyze these actors holistically, including their ideology, strategic goals, and their whole modus operandi, and not only their eventual use of coercive and/or illegal tactics. SNSAs can change their modus operandi over time in order to adapt themselves to new contexts and use more efficient tactics to advance their agendas. As Busher et al. argued, several logics can lead militants to limit their own use of violence, among which is included the strategic logic, in which violence is considered counterproductive in specific circumstances.Footnote26 Besides, low intensity and legal tactics can be used to influence and interfere with society leveraging grey areas and systemic vulnerabilities, potentially posing a threat in the mid- to long-term.Footnote27

An analytical label for an analytical framework: System of Non-State Actors (SNSA)

The terrorist organization label can be extremely useful in legal prosecution, counter-terrorism operations, and policy-making. However, when used for analytical purposes, two key weaknesses arise: its definitional issues and the intrinsic limits of the concept. On the one hand, terrorism has become an umbrella term for an overly-defined phenomenon. For decades, scholars have maintained an ongoing debate on the definitions of terrorism, leading to over a hundred academic definitions and different approaches to potential solutions.Footnote28 Besides, national and international legal frameworks have developed their own definitions in order to count with mechanisms to prosecute these crimes.Footnote29 Thus, while the concept of terrorism is widely used, there is no consensus on what a terrorist organization is.

On the other hand, when used for analytical purposes, the concept of terrorist organization may reproduce anchoring and confirmation biases.Footnote30 The anchoring bias is a heuristic in which the selection of a starting point (anchor) is adapted gradually to fit new information as it is received, influencing the outcome of the analysis.Footnote31 The label terrorist organization is intrinsically based upon selecting a tactic, a terrorist attack, which is then used to characterize an organization as a whole. Terrorist attacks thus may become the anchor of the analysis and guide the attention towards physically violent activities. Furthermore, this may be reinforced by confirmation bias, as “people often tend to seek only, or primarily, information that will support that hypothesis or belief in a particular way.”Footnote32 Once the focus is located on physically violent activities, it is easier to look for other physically violent activities than for new non-physically violent ones, thus reinforcing the focus on the first ones.

Calls for using value-neutral labels such as violent non-state actors (VNSAs)Footnote33 and non-state armed groups (NSAGs)Footnote34 have already been done. Nevertheless, although these new labels are argued to “not highlight the use of one tactic over another,”Footnote35 far from adopting a value-neutral approach, they continue reproducing biases towards physically violent activities. Labels that grasp the hybridity of tactics have also been introduced. For instance, Ganor’s hybrid terrorist organization referred to the classic terrorist organization that, in addition, has a political branch and/or a social welfare branch.Footnote36 Nevertheless, his approach is based on the premise that there is, indeed, a classic terrorist organization. These labels thus do not suit the CMPf approach, as they mirror the modus operandi used by the actors, and do not reflect the complexity of interconnected actors, as they often refer to one single entity. Thus, when analyzed through the CMPf, the System of Non-State Actors (SNSA) label is chosen instead.

A SNSA is understood as a set of entities (persons and/or organizations) that share specific ideology and political strategic objectives, and whose leadership works towards them with some degree of coordination and/or collaboration. A SNSA can pose a security threat when its ideology and strategic goals attempt against human rights and/or seek to undermine democratic values and institutions. While SNSAs can potentially engage in physically violent activities, the absence of materialization of violent actions does not necessarily make them less threatening: they may exploit systemic vulnerabilities of societies, coordinately use several tactics as force multipliers to create cascading effects, and remain under the legal threshold to avoid attribution. Thus, their activities, both legal and illegal, can all together pose a threat to security when used strategically. For example, when analyzing a SNSA, part of its involved actors can use coercive tactics like terrorist attacks, while another part uses persuasive tactics like the provision of social services. As both are coordinately working towards the same strategic objectives, not only the tactics that incur terrorist or criminal offences pose a threat to security. On the contrary, the tactics which do not, provide SNSAs a way of performing with plausible deniability and hindering attribution and prosecution. Therefore, far from criminalizing non-violent movements, or civil society protest against authoritarian drifts of governments, the CMPf acknowledges that non-violent activities, even while being legal, can pose a security threat when their responsible leaders’ ideology and strategic objectives ultimately attempt against human rights and/or democratic values and institutions, or when they contribute to a broader system whose ideology and strategic objectives does. Thus, such actors and tactics must be also considered when analyzing the modus operandi of a SNSA.

Although a SNSA is composed of several coordinated and/or collaborating entities, it is understood as an interconnected whole and not only the sum of these entities. Thus, drawing from the literatures on organizational theoryFootnote37 and on complex systemsFootnote38 enables the understanding of a SNSA and its modus operandi in its entirety. In this way, its internal dynamics, structures, and performance, can be assessed as a whole, facilitating the detection of internal feedback loops and cascading effects that could show unnoticed leverage points and unknown knowns.

The dimensions of CMPf

The CMPf is composed of two dimensions: influence modes (i.e., coercion, manipulation, and persuasion) and categories (i.e., physical/material, symbolic, institutional, and strategic). Combining them can facilitate detecting potential tactics used by SNSAs, by elaborating questions such as “what tactics of symbolic coercion could be used?” and “what tactics of institutional persuasion could be used?” Nevertheless, given the complexity of the tactics and the different shapes they can take in reality, the limits between categories are blurred and only orientational. provides a non-exhaustive example list of possible tactics resulting from these combinations.

Table 1. The CMPf and a non-exhaustive list of examples of tactics clustered according to influence modes and categories

Influence modes are the first dimension of CMPf. Influence is understood as “the power to have an effect on people or things.”Footnote39 The definition is purposefully wide enough to include coercion, manipulation, and persuasion. In the current study, influence is considered a continuum that goes from coercion to persuasion, with manipulation located between them, as inspired by Sorlin’s manipulative spectrum.Footnote40 On it, while overtness characterizes both sides, coercion obligates the target to comply and persuasion leaves them the freedom to counter-argue. Meanwhile, manipulation is conceived as covert and is characterized by the purposeful distortion of facts that leads targets to change their beliefs and ideas, and act against their own interests.

On the one hand, coercion is based on “the power to hurt” which is often “communicated by some performance of it.”Footnote41 In Schelling’s taxonomy, coercion encompasses both deterrence and compellence. Deterrence refers to a threat intended to prevent the target from doing something by fear of consequences, in which punishment will be imposed if the target acts; in contrast, compellence refers to a threat intended to make a target do something, in which punishment is imposed until the target acts. A key characteristic of both deterrence and compellence is that, ultimately, they depend on the cooperation of the target of the threat, which is “by no means friendly cooperation, but it is cooperation nonetheless.”Footnote42 In contrast to coercion, Schelling argues that “brute force can only accomplish what requires no collaboration.”Footnote43 The distinguishing element between the use of brute force and coercive tactics is their strategic purpose. “Terror campaigns are coercive in that any given terrorist act (and the destruction it produces) is less important than the fear it raises about repeat (and perhaps escalated) acts.”Footnote44 Whereas a tactic may rely on brute force, it becomes coercive when its strategic purpose is more important for the perpetrator than the immediate damage it causes. For the purpose of facilitating the application of the CMPf, coercive tactics include both deterrence and compellence.

On the other hand, persuasion is based on the power to convince, “a symbolic process in which communicators try to convince other people to change their own attitudes or behaviors regarding an issue through the transmission of a message in an atmosphere of free choice.”Footnote45 Thus, while coercive activities depend on the unwilling cooperation of the party receiving the threat, persuasive activities depend on the seemingly free choice of the targeted party. Thus, the target will act, believe or think in a certain way because it has been convinced to do so. Most theories on persuasion focus on tactics of linguistic nature, such as the construction of messages or arguments to convince an audience. However, persuasion is here understood in a broader sense, including tactics of different natures. This is inspired by Watzlawick’s human communication theory, which argues that “one cannot not communicate” as even silence communicates.Footnote46 Tactics like the provision of financial aid or healthcare do not only send very specific messages depicting a positive picture of SNSAs, but also support them with facts that can be used to gain legitimacy and justify other types of activities.

Located in between coercion and persuasion, manipulation is based on the power to deceive, a process in which facts are purposefully distorted to serve the sender’s interests to the detriment of the receivers. Such process is often developed with low but increasing intensity over time, facilitating the adoption of distorted facts as factual truths by the target audience. Practices such as denial, the withhold of accurate information, and deception, the provision of misleading information respectively, have been widely used to gain advantage over a target. Often combined, they are used to misdirect or mislead a target about the deceiver.Footnote47 Besides, manipulation does not consist of the direct imposition of somebody’s will onto a target, but rather of transferring the target the basis for concluding that somebody’s will is the correct decision to take.Footnote48 Ultimately, the individual manipulating a target would gain over this person what Lefebvre theorized as reflexive control.Footnote49 Given that manipulative tactics aim to shift the perception of the target audience, they are primarily symbolic, institutional, and strategic in nature.

The second dimension of the CMPf is the category of the tactics. By category, it is meant the essence of the actions, whether physical action, using material resources or economic elements, symbols, written or oral text, using institutions and organizations, decision-making, etc. In the CMPf, this dimension is subdivided into the following types: physical/material, meaning any action that involves a physical interaction facilitated by brute force and/or a material resource (e.g., physical attacks, money laundry, and the provision of welfare); symbolic, meaning any action that involves the use, exploitation, or resignification of symbols (e.g., the destruction of cultural heritage, propaganda, and symbolic representation); institutional, meaning any action that involves the use or misuse of private entities, or public powers and institutions (e.g., legalization or illegalization of specific actions, inference in electoral processes, and use of existing institutions); and strategic, meaning any action that involves a strategic decision (e.g., alliances with criminal organizations, continuous exploitation of legal thresholds, and establishments of legal proxies).

Applying the CMPf

The Coercion-Manipulation-Persuasion framework (CMPf) is an analytical framework that can be used to maintain a holistic approach towards the modus operandi of a System of Non-State Actors (SNSAs) and detect the tactics used by elaborating questions such as “what tactics of symbolic coercion could be used?” and “what tactics of institutional persuasion could be used?” To exemplify this, the CMPf has been applied to non-exhaustively analyze the modus operandi of the Nordic Resistance Movement, the Muslim Brotherhood, and Euskadi ta Askatasuna. The first two have been selected because there is no consensus on whether or not they are terrorist organizations; the third one, because despite having the terrorist organization been recently officially dissolved, its former militants and collaborators continue to promote its agenda exploiting legal thresholds. When referring to the broad System of Non-State Actors, the nomenclature used is SNSA‘ORGANIZATION’: i.e., SNSANRM, SNSAMB, and SNSAETA; when the organization is mentioned alone (e.g., NRM), the organization itself and formal members are referred to, excluding collaborating entities.

Nordic Resistance Movement

The Nordic Resistance Movement (NRM) is a transnational organization of a neo-Nazi ideology that aims to establish a national socialist state in the Nordic region, overthrowing the democratic order.Footnote50 It originated in 1997 from the Swedish Resistance Movement, an elitist organization whose leaders decided to focus on the “long-term ambition of radicalizing people through steadfast propaganda and street activism,”Footnote51 as this was considered to be more effective than using extreme tactics like terrorism. Nevertheless, far from being rejected, the use of violence has thus far been essential. The NRM’s handbook for activists states that “[t]he Resistance Movement is not pacifist. We are aware that we can only be victorious through physical struggle. […] In the future our weapons will be decisive on the battlefield, but at present, as long as we can act legally, there is no reason for the Resistance movement to arm itself with guns or explosives.”Footnote52

The NRM has official branches in Sweden, Finland, and Norway, and a notable support in Denmark, and Iceland.Footnote53 Among these countries, the NRM has only been proscribed by Finland, as the other countries lack of mechanisms for proscribing organizations.Footnote54 The official number of members of the NRM is relatively small, with less than 1,000 core members in 2015—although it should be considered that, until 2016, they consciously chose to build “an inner core of fanatic activists who can increasingly bring the national message out to the masses” instead of recruiting “as many [individuals] as possible.”Footnote55 However, the SNSANRM has been capable of mobilizing hundreds of sympathizers in demonstrations, and has been able to reach an online audience of about 300,000–400,000 per month, according to their numbers.Footnote56

Coercive tactics

Regardless of considering the physical struggle to be essential, the NRM has a strict policy against extreme violence written on its handbook for activists. Bjørgo and Ravndal argue that NRM’s restrain in using physical violence is mainly due to considering violence as counterproductive in the present circumstances (i.e., a strategic logic) and, to a lesser extent, due to considering themselves as a non-violent organization (i.e., the logic of ego maintenance) which evolves in ways that undermine the logics of violent escalation (i.e., organizational logic).Footnote57 Nevertheless, some NRM activists have carried out severe offensive violent actions, assassinations, and bombings (tactics of physical/material coercion); and, by 2018, the Swedish Security Police believed the NRM to have a large capacity for violence.Footnote58 Besides, they have eventually threatened Nordic governments to turn into terrorism should they be banned and have intimidated politicians into silenceFootnote59 (tactics of symbolic coercion), and have supported other affine Nazi groups, and even the terrorist organization Hamas for being willing to destroy IsraelFootnote60 (tactics of strategic coercion).

Manipulative tactics

Since the 2000s, the SNSANRM has included a wide network of websites, magazines, online stores, digital communication channels, media channels on social media, several radio and web TV initiatives, and a publishing house and bookstore. They aimed at reaching out politically, normalizing the NRM and projecting its reputation internationallyFootnote61 (tactics of institutional persuasion and institutional manipulation, respectively). According to the NRM leader Simon Lindberg, the objective was to continuously broadcast in radio and TV channels in order to create a “Nordic unity mindset”Footnote62 (tactics of symbolic manipulation). Thus, the SNSANRM adopted several normalization strategies in order to frame their ideology in a way that is protected from direct public condemnation. Among others, they maintain a “‘borderline discourse,’ merging uncivil (hate speech, antisemitism, and unmitigated racism) with civil discourse borrowed from the ideas of right-wing populism”Footnote63 and have tried to rebrand and clean up neo-Nazism, promoting antidemocracy and extremism without making explicit references to violence to remain within legality.Footnote64 In addition, the SNSANRM has systematically used Nazi, Norse, and Viking iconography, and has revised history through Holocaust denialism and re-signification of specific dates and meanings.Footnote65 Their content is carefully edited to avoid stepping out of legality and being censored or removedFootnote66 (tactics of symbolic manipulation).

Persuasive tactics

The SNSANRM has leveraged legal frameworks to promote their ideals within existing political systems. In addition to its broad network of media and cultural production channels, the SNSANRM has also established political parties (tactics of institutional/strategic persuasion). In Sweden, a political party was created in 2014, entered several local governments between 2014–2018, and participated in the 2019 elections to the European Parliament, although with poor results.Footnote67 In Finland, in light of the upcoming banning of the Finish branch of NRM, its militants created in 2018 another political party called Kansan Yhtenäisyys, and formed numerous new associations.Footnote68 Despite this preventive move, the proscription of the NRM-Finland did not cover every association registered as member of the NRM, which enabled some of them to continue operating.Footnote69 Besides, the SNSANRM has also explored the use of NGOs to attract new member and voters, such as through establishing the Finish charity SuomalaisapuFootnote70 (tactics of physical/material persuasion).

Muslim Brotherhood

The Muslim Brotherhood (MB) is a transnational Sunni organization that was founded in Egypt in 1928 by Hassan al Banna. Fleeing prosecution in their home countries, several members established themselves in Europe between the 1960s and 1980s. Over time, they consolidated a formal pan-European structure with networks in every major European country. Vidino and Altuna argue that the MB decided to create a binary structure (non-public/secret and public) to be “more effective at conducting engagement with Muslim communities and European societies.”Footnote71 While the non-public/secret part includes the Pure Brothers, rigorously recruited and sworn members, the public structure includes a web of organizations devoted to a broad range of activities that often deny having ties with the Brotherhood, but some of whose members have extensive organizational and personal ties with the Brotherhood. In Europe, although the number of Pure Brothers is quite small, they exert their influence by controlling a series of satellite entities whose members are not directly related to the MB nor even genuinely know about MB’s influence and, who, in turn, enable and sustain their secrecy.Footnote72

The objectives of the SNSAMB are adjusted on a country bases, depending on whether they perform in non-Muslim majority societies in Europe or the Arab world. In Europe, they pursue their vision for a “fully Islamised Europe in a distant future” and have shown a pattern of “highly problematic (anti-integration, anti-Semitic, homophobic, misogynistic …) views consistently expressed by the upper echelons of the movements.”Footnote73 Within the European Union, Austria has been the only country to ban the Muslim Brotherhood through its anti-terrorism law.

Coercive tactics

The SNSAMB active in Europe does not engage in terrorist activities inside the continent. However, it has supported the EU designated terrorist organizations such as HamasFootnote74 and other violent groups that operate outside Europe.Footnote75 In the Muslim Brotherhood’s official English website, they state that “[t]o confront the Western and US domination, the Muslim Brotherhood thinks that fighting domination requires adopting several factors, including: 1- Spreading Islamic concepts that reject submission to humiliation, and incite to fighting it, and to be on to rise to support the oppressed […]”Footnote76 (tactics of physical/material and strategic coercion, respectively). Narratives and elements of hostile nature have been expressed by different entities. For instance, the ECFR (a SNSAMB’s jurisprudential body) has stated that “jihad with its conditions, rulings and restrictions cannot be incorporated in the framework of what is called today ‘terrorism’” legitimizing the armed jihad as lawful meansFootnote77 (tactics of symbolic/institutional coercion). Although they, in general, do not directly call for terrorist actions and are open to dialogue, Baran has argued that considering them a ‘moderate’ organization seems to disregard its ideology, history, and strategy […] [and] the Brotherhood’s own statements.”Footnote78

Manipulative tactics

The SNSAMB has been argued to be “engaged in a long-term social engineering project, whereby they hope to lead Muslims to reject Western norms of pluralism, individual rights, and the rule of law.”Footnote79 Since the last century, the worldview of Brotherhood ideologues such as Hassan al Banna and Sayyid Qutb has had a huge influence in religious extremism. Their thoughts and reinterpretation of the Quran and Muslim concepts such as the da’wah, the jihad, and the Jahiliya, consolidated narratives prone to radicalization.Footnote80 Al-Anani has argued that, knowingly or unknowingly, al Banna created the cognitive system that guided MB members in everyday life, which still plays a pivotal role in constructing their identities and behaviours.Footnote81 Currently, the SNSAMB’s entities active in Europe are said to use a “deceptive double discourse,” showing a moderate position within Europe, and supporting different views to internal and more conservative audiencesFootnote82 (tactics of symbolic manipulation). For instance, while the European leadership of the SNSAMB has engaged in interreligious dialogues with other religious groups, they have also expressed antagonistic views towards them.

Persuasive tactics

In European countries, “the movement has generally understood that being seen as a moderate and reliable interlocutor of European establishment is the best tactic to further its aims.”Footnote83 The SNSAMB includes legal institutions established in Europe, such as the Federation of Islamic Organizations in Europe (currently the Council of European Muslims), which has created several specialized entities, including the FEMYSO (youth and student organization), the IESH (network of religious schools devoted to train imams), the ECFR (a jurisprudential body), and Europe Trust (for financial activities) (tactics of institutional/strategic persuasion). In addition, humanitarian and development work is conducted through the Islamic Relief WorldwideFootnote84 (tactics of material persuasion). While these entities may genuinely provide for people in legal ways, they are run by and respond to the Pure Brothers’ strategy who, ultimately, pursue in the long term the establishment of a Sharia-based state. In the cases of supposedly non-violent extremist leaders, like those of the MB, Schmid has argued that “official collaboration with them only provides them with respectability and legitimacy,”Footnote85 which can be problematic, as “[t]he idea that one can hold extremist beliefs without being inclining to use extremist methods to realise them when the opportunity presents itself—something attributed to non-violent extremists - is naïve and dangerous.”Footnote86

Euskadi Ta Askatasuna

Euskadi Ta Askatasuna (ETA) was founded in 1958 by a group of university students that pursued the independence of their so-called Euskal Herria, a territory composed of Spanish and French provinces. ETA assassinated 829 people according to official numbersFootnote87—although the numbers have been argued to be higher.Footnote88 Since the early 1970s, in the light of the democratic transition, ETA followed their so-called splitting strategy (“desdoblamiento,” in Spanish), and purposefully created legal organizations that performed following its leadership. ETA strategically decided to separate the covert and illegal tactics from the public and legal ones;Footnote89 in this way, terrorism and violence were used to coerce the government and society, and legal entities were used to advance the agenda within the existing legal framework. Ultimately, they aimed to mobilize and coordinate society towards creating a parallel alternative system.Footnote90 Throughout the years, ETA consolidated what was named the “civil plot” of ETA, a broad system of political parties, social associations, civil associations, NGOs, educative institutions, media production channels, companies, and international groups, which behaved under the leadership of the legally considered terrorist organization ETA.Footnote91 Since the 1990s, several large court trials were conducted against the organizations that collaborated with ETA, which led to the illegalization and cease of many of them—although they continued their activities under new names and organizations. ETA officially said to stop the armed fight in 2011 and formally disbanded in 2018. However, Spain has continued to be the scenario of tributes and acts of public support to ETA prosecuted terrorists,Footnote92 often justified under the right of freedom of speech. Besides, former ETA prosecuted terrorists, even some with blood crimes, have joined the lists of political parties,Footnote93 and through the political coalition EH Bildu, whose leader was imprisoned for kidnapping for ETA, have reached the Spanish national politics, using their position as a bargaining chip.

Coercive tactics

Since its early years, ETA considered the use of violence as a key tactic of its repertory, and terrorism was consistently used.Footnote94 During its active period, ETA carried out over 3,000 attacks in Spain (and abroad, to a much lesser extent), and attempted an unknown number of unsuccessful attacks. Among others, they committed terrorist attacks, kidnapped as a financing method, engaged in urban violence through the kale borroka, forced people to contribute financially with their so-called ‘revolutionary tax,’ and threatened opposers and the families of their targets through letters and communicationsFootnote95 (tactics of physical/material and, the last, symbolic coercion). Besides, they used the public space as a symbolic battlefield, promoting the passive occupation of the urban environment though unregulated actions such as graffiti, murals, and panels, which served to echo their ideology and symbolically occupy the streetsFootnote96 (tactics of symbolic coercion). In this way, the SNSAETA used fear as a consistent strategy to condition the population’s behaviour.Footnote97 They created the so-called ‘spiral of silence’ in which those who opposed their ideals, mainly in the Basque provinces and Navarra, were not able to express their thoughts freely nor show Spanish-like identity/cultural elements, as they were considered a hostile act against SNSAETA’s interpretation of the Basque.Footnote98 In addition, in order to justify assassinations or attacks, colloquial expressions such as “they must have done something” were spread in the civil society (tactics of symbolic coercion). As a result of their use of terror and violence, between 60,000 and 200,000 people, without including their families, were forced to relocate outside the Basque provinces and Navarra, although the numbers varyFootnote99 (tactics of physical/material coercion).

Manipulative tactics

For decades, the SNSAETA established font companies to funnel finances, and constantly changed the names of their institutions to avoid prosecution. They used the strategy of the ‘double militancy,’ in which militants of the terrorist organization ETA and its administrative organ KAS-EKIN were positioned in the leadership of legal entities in order to direct their activities (tactics of institutional manipulation). Since its inception, the SNSAETA consistently spread narratives to justify their violence, such as depicting ETA as a pro-democratic movement created during the dictatorship, although the vast majority of assassinations took place once the democracy was installed in Spain. Since the 1990s, they followed what was called the ‘socialization of suffering,’ a tactical approach through which everyone became a legit target of terrorist attacks. The ‘socialization of suffering’ was used to dehumanize victims and re-signify them as a political objective, promoting in ETA militants the vision of an existing war in which all opposers are the enemyFootnote100 (symbolic manipulation). After the official disband of the terrorist organization ETA in 2018, the battle for the narratives and reinterpretation of the historical memory has been vivid in the Spanish political arena. The fact that the terrorist network disappeared from the SNSAETA has been used as an argument to negate any possible threat to security, while their supporters have engaged in hundreds of tributes and public acts of support yearly. Disinformation narratives have been spread to the extent in which these recent acts of support to ETA and prosecuted ETA terrorists, including those with blood crimes, are argued to be covered under the right to freedom of expression and not be incitement of terrorismFootnote101 (tactics of institutional and strategic manipulation).

Persuasive tactics

Since the beginning of the Spanish democracy, the SNSAETA has been strategically formed by a broad mosaic of entities. As PorteroFootnote102 argues, these entities can be classified as follow: entities of a political character, including but not restricted to, KAS, EKIN, Herri Batasuna, Euskal Herritarrok, Batasuna, Udalbiltza, PCTV and ANV; entities focused on communication and culture, like Egin, Egunkaria, and AEK; entities of an international profile who helped ETA militants and their families abroad, such as KHK, KEA, and XAKI; entities committed to social and labour activities, like ASK, the Foundation Joxemi Zumalabe, Jarrai-Haika-Segi, Gestoras Pro-Amnistía, Askatasuna, and the trade union Lab; and entities dedicated to finances, like the herriko tabernas and front companies. During the trials against the ETA’s “civil plot” of the 1990s and 2000s, most of these entities were either declared illegal or suspended for having ties with the terrorist organization ETA. However, some of them had managed to operate legally for over 20 years before investigations started. Currently, entities like EH Bildu and Etxerat engage in activism for the imprisoned terrorists (who they call ‘political prisoners’), and continue to pursue the objectives of SNSAETA without rejecting nor condemning ETA’s violence, nor collaborating with law enforcement to clarify the crimes of ETA that remain unsolved.

The CMPf in the current security paradigm

The CMPf holistic approach to the assessment of SNSAs is supported by the current EU security paradigm. For a couple of decades, the tendency of both state and non-state actors to use physically violent and non-physically violent activities has been acknowledged and argued in the literature.Footnote103 Currently conceptualized as hybrid threats by the European Union,Footnote104 this perspective argues that actors aiming to undermine democratic values and institutions coordinately engage in a broad range of activities in order to advance their agendas. Thus, they aim at blurring decision-making processes, creating cascading effects, and combining actions as force multipliers while remaining under the legal threshold. The European Union Security Union Strategy called for “mainstreaming hybrid [threat] considerations into policy making.”Footnote105 In light of this, the current study offers insights into how to mainstream hybrid threat considerations into the analysis of terrorism. Particularly, the introduction of the CMPf acknowledges that it is possible for terrorist organizations and their collaborating entities to use coercive, manipulative, and/or persuasive activities in a strategically coordinated way in order to remain under the legal threshold and yet still pose a threat to security, as seen in the three cases. In light of this, approaching terrorist organizations through a neutral-value label like SNSAs enables flexibility to think about the tactics they can use to advance their agendas. This is particularly relevant in cases when there is an absence of consensus on the legal consideration as a terrorist organization, as in the cases of the SNSANRM and the SNSAMB; and in cases when the part of the system that is in charge of terrorist attacks (e.g., terrorist cells, commandos, armed branches, etc.) is dismantled by law enforcement units or claims to have been dissolved, as in the case of the SNSAETA. In the latter case, on the one hand, the threat to national security may indeed end there, particularly in the case of a classic terrorist organization. On the other hand, this shift can be an adaptation of the modus operandi of the SNSA, without rejecting the use of violence eventually decides not to use violence and promotes its hostile aims with other tactics, still being a threat to security.

Using CMPf to approach SNSAs’ modus operandi, the connection with other analytical frameworks is facilitated. For instance, the CMPf can be easily combined with the Conceptual Model on Hybrid ThreatsFootnote106 and the Comprehensive Resilience Ecosystem (CORE),Footnote107 both developed by the Joint Research Centre of the European Commission (JRC) and the Hybrid Centre of Excellence for Countering Hybrid Threats (Hybrid CoE). Firstly, the Conceptual Model on Hybrid Threats structures the analysis of hybrid threats into four pillars: the actors and their strategic objectives, the tools used, the domains targeted, and the phases of hybrid threat activities. Currently, the Conceptual Model on Hybrid Threats proposes a non-exhaustive list of tools that could be used in hybrid threat activities; nevertheless, it does not introduce a way of detecting other tools, nor any categorization for them. Thus, the CMPf can be combined with the Hybrid Threats Conceptual Model in order to conceptually point out potential tactics, by combining various influence tactics and natures. Furthermore, in this way, the analysis of the tactics used by SNSAs can account for the domains and the phase in which they are used. For instance, tactics like community activism (material and symbolic persuasion), seen in the three cases, will most likely have an impact on the Social and/or Cultural domains, probably creating cascading effects into the Information and Political domains, but remaining in the Priming phase (low-intensity) and being often enabled by the legal frameworks. Meanwhile, a tactic like physical violence (physical coercion), used directly by the SNSANRM and SNSAETA, and supported outside Europe by the SNSAMB, will directly impact the Social and Military/Defense domains, probably creating cascading effects into the Political and Information domains, most likely being used in the Destabilization and/or Coercion phase (mid- to high-intensity, up to hybrid warfare/war level). Locating the activities of SNSAs in this escalation spectrum can enable accounting for low-, mid-, and high-intensity activities, and detecting potential force multipliers or trends among them.

Secondly, the CORE Model proposes a way to analyze how the tools used by hostile actors impact society, which is understood from a comprehensive approach, including the civil, governance, and services spaces. The CORE Model enables visualizing the trajectory of the tools used while they impact society, create cascading effects, and exploit current vulnerabilities. In addition, combining the CORE Model and the CMPf, the impact trajectories of different tactics can be simultaneously visualized, accounting for the effect of coercive tactics (e.g., how and how much a society is hurt by the SNSA), manipulative tactics (e.g., how and how much a society is deceived by the SNSA), and persuasive tactics (e.g., how and how much a society is convinced by the SNSA).

Conclusions

Inspired by evidence on the use of persuasive and legal tactics by terrorist organizations, this study introduces the Coercion-Manipulation-Persuasion framework (CMPf) to facilitate the analysis of terrorist organizations by conceptualizing them as SNSAs, and understanding their modus operandi as a method of procedure that includes tactics resulting from the combination of influence modes (i.e., coercion, manipulation, and persuasion) and categories (i.e., physical/material, symbolic, institutional, and strategic). Analyzing a SNSA and its modus operandi in its entirety is crucial to assess its overall influence and the security threat it entails (e.g., from taking into account the efforts to carry on terrorist attacks, to also considering the implications that its persuasive tactics, like welfare provision, may have for society—which could in turn make benefitted communities support the narratives of the terrorists). Such comprehensive analysis could potentially benefit the efforts on threat assessment, situational awareness, and counter-terrorism strategies, as it broadens the research scope and enables the detection of potential feedback loops and cascading effects among tactics and involved actors. Further research could explore the implications of the CMPf in this regard.

The CMPf can also enable a dialogue with current conceptual and analytical models on hybrid threats, such as the Conceptual Model on Hybrid Threats and the Comprehensive Resilience Ecosystem, both developed jointly by the JRC-Hybrid CoE. Combining the CMPf approach with these models, it is possible to elaborate hypotheses on tactics used by hostile actors, detect the impact of SNSAs into different domains and determine in which phase are these tactics being used, which could in turn facilitate the assessment of their escalation potential. Furthermore, the impact trajectory of the tactics used by SNSAs can be visualized through the CORE Model, allowing analysts to map how and where the effect of coercive, manipulative, and persuasive tactics (e.g., how and how much a society is hurt, deceived, and convinced by the SNSA, respectively) is spread. In this way, the introduction of the CMPf is also a first step in responding to the European Union Security Union Strategy call for mainstreaming hybrid threat considerations into all policy initiatives, by building bridges between the fields of hybrid threats and terrorism studies.

CRediT (Contributor Roles Taxonomy)

Marina Alonso-Villota: Conceptualization, Methodology, Formal analysis, Investigation, Writing – Original Draft, Visualization, Project administration. Rubén Arcos: Conceptualization, Methodology, Writing - Review Editing, Supervision.

Acknowledgments

The authors would like to thank Prof. Dr. Pickl (Universität der Bundeswehr München), Dr. Rainer Jungwirth (Joint Research Centre, European Commission), and Dr. Dr. Budde (Universität der Bundeswehr München) for their constructive advice. The authors would also like to express their gratitude to the anonymous reviewers for their valuable comments and suggestions.

Disclosure statement

No potential conflict of interest was reported by the author(s).

Additional information

Notes on contributors

Marina Alonso-Villota

Marina Alonso-Villota is a Ph.D. candidate in International Security at the Instituto Universitario General Gutiérrez Mellado, National University of Distance Education (IUGM-UNED) in Madrid, Spain. She works as researcher at the Universität der Bundeswehr München (Germany). Her research interests include terrorism, hybrid threats, and cognitive warfare.

Rubén Arcos

Rubén Arcos is an associate professor at the School of Communication Sciences of University Rey Juan Carlos (URJC) in Madrid, Spain. He is also a Visiting Professor at the EU International Relations and Diplomacy Studies Department of the College of Europe in Bruges. Arcos is faculty of the PhD program in international security at IUGM-UNED. He serves as Vice-Chair of the Intelligence Studies Section at the International Studies Association (ISA). His main research interests are intelligence and intelligence analysis, strategic communication, hybrid threats, foreign information manipulation and interference.

Notes

1. Silke and Schmidt-Petersen, “The Golden Age?”; Silke and Morrison, “Contemplating a Research Agenda.”

2. Schmid and Jongman, Political Terrorism; Schmid, Defining Terrorism.

3. Tinnes, “Root Causes of Terrorism.”

4. Tinnes, “Terrorism and Ideology.”

5. Sageman, Understanding Terror Networks.

6. Hofmann, “Review Essay.”

7. Sinai, “Terrorism Bookshelf”; Sinai, Fuller, and Seal, “Effectiveness in CT and CVE.”

8. Hoffman, “Terrorist Targeting”; De La Calle and Sánchez-Cuenca, “How Armed Groups Fight.”

9. Tinnes, “Terrorism and the Media.”

10. Grynkewich, “Welfare as Warfare.”

11. Ganor, “The Hybrid Terrorist Organization and Incitement.”

12. Asal, Nussbaum, and Harrington, “Terrorism as Transnational Advocacy.”

13. Vidino and Altuna, “The Muslim Brotherhood.”

14. Rayner, “Uncomfortable Knowledge.”

15. Daase and Kessler, “Knowns and Unknowns,” 413–14.

16. Lind et al., “Changing Face of War”; Hueber, Compound Warfare; Qiao and Wang, Unrestricted Warfare; Hoffman, “Conflict in 21st Century.”

17. European Commission, “JOIN (2016) 18 Final.”

18. Giannopoulos, Smith, and Theocharidou, Landscape of Hybrid Threats.

19. Galtung, “Violence, Peace, Peace Research,” 173.

20. Ibid., 168.

21. Merriam-Webster, “Modus operandi Definition & Meaning”

22. Ly, “Charitable Activities Terrorist Organizations,” 168.

23. Levitt, “Working with Europe.”

24. Vidino and Altuna, “The Muslim Brotherhood,” 2.

25. Bjørgo and Ravndal, “Nordic Resistance Movement,” 38.

26. Busher, Holbrook, and Macklin, “Internal Brakes Violent Escalation:”

27. See note 18 above.

28. Schmid, Defining Terrorism.

29. The International Consortium on Closing Civic Space (iCon), “Database of Legislation Definitions.”

30. Bammer, “Understanding and Managing Bias.”

31. Tversky and Kahneman, “Judgment Under Uncertainty.”

32. Nickerson, “Confirmation Bias,” 177.

33. Chaudhry, “Violent Non-State Actors”; and Williams, “Violent Non-State Actors.”

34. Berger Hobson and Moghadam, “Terrorism, Guerrilla, Militant Groups.”

35. Ibid., 2.

36. Ganor, “The Hybrid Terrorist Organization.”

37. Crenshaw, “Theories of Terrorism”; Ligon et al., “The ‘O’ in VEOs.”

38. Mesjasz, “Complex Systems Studies and Terrorism”; and Meadows, Thinking in Systems.

39. Cambridge Academic Content Dictionary, “Influence.”

40. Sorlin, “Manipulative Moves.”

41. Schelling, Arms and Influence, 3.

42. Biddle, “Coercion Theory,” 98.

43. Schelling, Arms and Influence, 8.

44. Biddle, “Coercion Theory.”

45. Perloff, The Dynamics of Persuasion, 22

46. Watzlawick, Beavin, and Jackson, Pragmatics of Human Communication, 30.

47. Godson and Wirtz, Strategic Denial and Deception; and ibid.

48. Lefebvre, Conflicting Structures, 42–3.

49. Ibid.

50. Kenes, “NMR,” 10.

51. Ibid., 8.

52. Bjørgo and Ravndal, “Nordic Resistance Movement,” 37.

53. Counter Extremism Project, “Nordic Resistance Movement.”

54. Zeller and Vaughan, “Proscribing Right-Wing Extremist Organizations,” 2.

55. Counter Extremism Project, “Nordic Resistance Movement,” 5–6.

56. The Nordic Resistance Movement (2016:133) in Ravndal, “Transnational Militancy” 24.

57. Bjørgo and Ravndal, “Nordic Resistance Movement.”

58. Kenes, “NMR,” 26.

59. Bjørgo and Ravndal, “Nordic Resistance Movement,” 46.

60. Kenes, “NMR.”

61. Ibid., 27–8.

62. Lodenius, Anna-Lena (2020) ibid., 28.

63. Ibid., 9.

64. Askanius, “Cultural expressions neo-Nazism,” 24–5.

65. Kenes, “NMR,” 12–5.

66. Askanius, “Nordic Resistance Movement.”

67. Europaparlamentsval, “Röster—Val 2019.”

68. Zeller and Vaughan, “Proscribing Right-Wing Extremist Organizations,” 18.

69. Sallamaa and Kotonen, “Nordic Resistance Movement.”

70. Counter Extremism Project, “Nordic Resistance Movement.”

71. Vidino and Altuna, “The Muslim Brotherhood,” 6–7.

72. Vidino, The Closed Circle, Interview with Kamal Helbawy.

73. Vidino and Altuna, “The Muslim Brotherhood,” 10.

74. Muslim Brotherhood, “The Muslim Brotherhood’s Documents.”

75. Vidino and Altuna, “The Muslim Brotherhood,” 11.

76. Muslim Brotherhood, “The Muslim Brotherhood’s Documents.”

77. Resolution 40, 11/06 ECFR Vidino and Altuna, “The Muslim Brotherhood.”

78. Baran, “Countering Ideological Support Terrorism,” 22.

79. Ibid., 25.

80. Azoulay, “The Power of Ideas.”

81. Al-Anani, “The Power of the Jama‘A.”

82. Vidino and Altuna, “The Muslim Brotherhood,” 186.

83. Ibid., 10.

84. See note 13 above.

85. Schmid, “Violent and Non-Violent Extremism,” 24.

86. Ibid., 20.

87. Policia Nacional, Gobierno de España, “Victoria de La Libertad.”

88. Loosemore and Johnson, “Impact of Terrorist Organisations.”

89. ETAm, “ETAren Agiria.”

90. Audiencia Nacional, Sentencia 73, Sumario 18/98.

91. Portero, Trama Civil de ETA.

92. Colectivo de Víctimas del Terrorismo (COVITE), “Observatorio de radicalización.”

93. Colectivo de Víctimas del Terrorismo (COVITE), “COVITE denuncia.”

94. Mahoney, “End of the Cycle.”

95. Loosemore and Johnson, “Impact of Terrorist Organisations.”

96. Escudero, “Urbanismo y revolución.”

97. Domínguez Ibarren, Las Raices Del Miedo.

98. Llera and Leonisio, “La Estrategia Del Miedo,” 15.

99. de la Cuesta et al., “Proyecto Retorno.”

100. Sierra, “Terrorismo, Legitimidad y Militancia.”

101. Colectivo de Víctimas del Terrorismo (COVITE), “Lucha Contra El Enaltecimiento.”

102. Portero, Trama Civil de ETA.

103. Lind et al., “The Changing Face of War”; Hueber, Compound Warfare; Qiao and Wang, Unrestricted Warfare; and Hoffman, “Conflict in the 21st Century.”

104. European Commission, “JOIN(2016) 18 Final”; and Giannopoulos, Smith, and Theocharidou, Landscape of Hybrid Threats.

105. European Commission, “COM(2020) 605 Final,” 14

106. See note 18 above.

107. Jungwirth et al., Hybrid Threats.

References

  • Anani, Khalil al-., “The Power of the Jama‘A: The Role of Hasan Al-Banna in Constructing the Muslim Brotherhood’s Collective Identity,” Sociology of Islam 1, no. 1–2 (2013): 41–63. doi:10.1163/22131418-00101003.
  • Asal, Victor, Brian Nussbaum, and D. William Harrington, “Terrorism as Transnational Advocacy: An Organizational and Tactical Examination,” Studies in Conflict & Terrorism 30, no. 1 (January 2007): 15–39. doi:10.1080/10576100600959713.
  • Askanius, Tina, “‘I just want to be the friendly face of national socialism’: The turn to civility in the cultural expressions of neo-Nazism in Sweden,” Nordicom Review 42, no. s1 (March 1, 2021): 17–35.
  • Askanius, Tina, “Studying the Nordic Resistance Movement: Three Urgent Questions for Researchers of Contemporary Neo-Nazis and Their Media Practices,” Media, Culture & Society 41, no. 6 (2019): 878–88. doi:10.1177/0163443719831181.
  • Audiencia Nacional, Rollo, “Sentencia Número 73, Rollo de Sala 27/02, Sumario 18/98, Juzgado central cinco” ( Audiencia Nacional, Sección Tercera, Sala de lo Penal December 19, 2007).
  • Azoulay, Ronnie, “The Power of Ideas. The Influence of Hassan al-Banna and Syyid Qutb on the Muslim Brotherhood Organization,” Przegląd Strategiczny 8 (2015): 171–82. doi:10.14746/ps.2015.1.12.
  • Bammer, Gabriele. ed. “Understanding and Managing Bias,” in Dealing with Uncertainties in Policing Serious Crime, 87–100. Canberra ACT 0200 (Australia: ANU E Press, 2010). https://library.oapen.org/bitstream/handle/20.500.12657/33778/458937.pdf?sequence=1#page=99.
  • Baran, Zeyno, “Countering Ideological Support for Terrorism in Europe: Muslim Brotherhood and Hizb Ut-Tahrir – Allies or Enemies?” Connections: The Quarterly Journal 05, no. 3 (2006): 19–34. doi:10.11610/Connections.05.3.03.
  • Berger Hobson, Ronit, and Assaf Moghadam, “Terrorism, Guerrilla, and the Labeling of Militant Groups,” Terrorism and Political Violence, March 8, 2023, 1–18. doi:10.1080/09546553.2023.2183052.
  • Biddle, Tami Davis, “Coercion Theory: A Basic Introduction for Practitioners,” Texas National Security Review 3, no. 2 (2020): 94–109.
  • Bjørgo, Tore, and Jacob Aasland Ravndal, “Why the Nordic Resistance Movement Restrains Its Use of Violence,” Perspectives on Terrorism 14, no. 6 (2020): 37–48.
  • Busher, Joel, Donald Holbrook, and Graham Macklin, “The Internal Brakes on Violent Escalation: A Typology,” Behavioral Sciences of Terrorism and Political Aggression 11, no. 1 (2019): 3–25.
  • Cambridge Academic Content Dictionary, “Influence,” 2023. https://dictionary.cambridge.org/dictionary/english/influence.
  • Chaudhry, Rajeev, “Violent Non-State Actors: Contours, Challenges and Consequences,” CLAWS Journal, 2013, 167–87.
  • Colectivo de Víctimas del Terrorismo (COVITE), “COVITE denuncia que hay 44 integrantes en las listas de EH Bildu a las elecciones del 28-M que estuvieron condenados por pertenencia a ETA - Covite,” May 9, 2023. https://covite.org/destacada/covite-denuncia-que-hay-44-integrantes-en-las-listas-de-eh-bildu-a-las-elecciones-del-28-m-que-estuvieron-condenados-por-pertenencia-a-eta/.
  • Colectivo de Víctimas del Terrorismo (COVITE), “Lucha Contra El Enaltecimiento Del Terrorismo y La Legitimación de ETA,” 2021. https://covite.org/wp-content/uploads/2021/04/boleti%CC%81n-COVITE-enero-abril-2021.pdf.
  • Colectivo de Víctimas del Terrorismo (COVITE), “Observatorio de radicalización,” 2024. https://covite.org/observatorio/.
  • Counter Extremism Project, “Nordic Resistance Movement (NRM),” Counter Extremism Project, 2021, 20.
  • Crenshaw, Martha, “Theories of Terrorism. Instrumental and Organizational Approaches,” The Journal of Strategic Studies 10, no. 4 (1987): 13–31. doi:10.1080/01402398708437313.
  • Cuesta, Jose Luis de la, Gema Varona, Virginia Mayordomo, and Cesar San Juan, Proyecto Retorno (Donostia, San Sebastian: Instituto Vasco de Criminología, 2011). https://www.euskadi.eus/contenidos/informacion/informe_retorno/es_info/adjuntos/Retorno%20Informe%20final%206%20JLC.pdf.
  • Daase, Christopher, and Oliver Kessler, “Knowns and Unknowns in the ‘War on Terror’: Uncertainty and the Political Construction of Danger,” Security Dialogue 38, no. 4 (December 2007): 411–34. doi:10.1177/0967010607084994.
  • De La Calle, Luis, and Ignacio Sánchez-Cuenca, “How Armed Groups Fight: Territorial Control and Violent Tactics,” Studies in Conflict & Terrorism 38, no. 10 (October 3, 2015): 795–813. doi:10.1080/1057610X.2015.1059103.
  • Domínguez Ibarren, Florencio DOMÍNGUEZ, Las Raíces Del Miedo. Euskadi, una sociedad atemorizada (Aguilar. Madrid, 2003).
  • Escudero, Miguel Angel Ajuriaguerra, “Urbanismo y revolución. Pintadas, murales y carteles de ETA (1969–2011),” Araucaria 24, no. 50 (August 12, 2022). doi:10.12795/araucaria.2022.i50.11.
  • ETAm, “ETAren Agiria,” 1974. https://aginteahausten.files.wordpress.com/2021/03/wp-1614689055717.pdf.
  • Europaparlamentsval, “Röster - Val 2019,” 2019. https://web.archive.org/web/20190619143130/https:/data.val.se/val/ep2019/slutresultat/E/rike/index.html.
  • European Commission, “Communication from the Commission to the European Parliament, The European Council, The Council, The European Economic and Social Committee and The Committee of the Regions on the EU Security Union Strategy,” (Brussels, July 24, 2020). https://eur-lex.europa.eu/legal-content/EN/TXT/PDF/?uri=CELEX:52020DC0605&from=EN.
  • European Commission, “Joint Communication to the European Parliament and the Council Joint Framework on Countering Hybrid Threats a European Union Response,” (Brussels, June 4, 2016). https://eur-lex.europa.eu/legal-content/EN/TXT/PDF/?uri=CELEX:52016JC0018&from=EN.
  • European Commission, Joint Framework on Countering Hybrid Threats - a European Union Response (Oxford University Press, June 4, 2016). doi:10.1093/law-oeeul/e66.013.66.
  • Galtung, Johan, “Violence, Peace, and Peace Research,” Journal of Peace Research 6, no. 3 (1969): 167–91.
  • Ganor, Boaz, “The Hybrid Terrorist Organization and Incitement,” in The Changing forms of Incitement to Terror and Violence: The Need for a New International Response, (Jesulam Center for Public Affairs, 2011), 13–19.
  • Giannopoulos, Georgios, Hanna Smith, and Mariante Theocharidou, eds. The Landscape of Hybrid Threats: A Conceptual Model (Luxembourg: Publications Office of the European Union, 2021).
  • Godson, Roy, and James J. Wirtz, Strategic Denial and Deception: The Twenty-First Century Challenge (Transaction Publishers, 2011).
  • Grynkewich, Alexus G., “Welfare as Warfare: How Violent Non-State Groups Use Social Services to Attack the State,” Studies in Conflict & Terrorism 31, no. 4 (2008): 350–70.
  • Hoffman, Bruce, “Terrorist Targeting: Tactics, Trends, and Potentialities,” Terrorism and Political Violence 5, no. 2 (June 1993): 12–29. doi:10.1080/09546559308427205.
  • Hoffman, Frank G., “Conflict in the 21st Century: The Rise of Hybrid Wars,” Potomac Institute for Policy Studies, 2007, 72.
  • Hofmann, David, “Review Essay: Twenty Important Journal Articles on Radicalisation to, and De-Radicalisation from, Terrorism,” Perspectives on Terrorism 6, no. 6 (2012): 104–13.
  • Hueber, Thomas M., ed. Compoud Warfare. That Fatal Knot (Fort Leavenworth, Kansas: U.S. Army Command and General Staff College Press, 2002). https://www.armyupress.army.mil/Portals/7/combat-studies-institute/csi-books/compound_warfare.pdf.
  • Jungwirth, Rainer, Hanna Smith, Etienne Willkomm, Jukka Savolainen, Marina Alonso Villota, Maxime Lebrun, Aleksi Aho, and Georgios Giannopoulos, Hybrid Threats: A Comprehensive Resilience Ecosystem (Luxembourg: Publications Office of the European Union, 2023). doi:10.2760/37899.
  • Kenes, Bulent, “NMR: A Nordic Neo-Nazi Organization with Aims of Establishing Totalitarian Rule across Scandinavia,” European Center for Populism Studies (ECPS), 2021. doi:10.55271/op0008.
  • Lefebvre, Vladimir, “Conflicting Structures,” in First Publication in 1967 (Los Angeles: Leaf and Oaks Publishers, 2015).
  • Levitt, Matthew, “The Network of Terrorist Financing,” (International Institute for Counter-Terrorism (ICT), August 15, 2002). https://ict.org.il/the-network-of-terrorist-financing/.
  • Ligon, Gina S., Pete Simi, Mackenzie Harms, and Daniel J Harris, “Putting the ‘O’ in VEOs. What Makes an Organization,” Dynamics of Asymmetric Conflict 6, no. 1–3 (2013): 110–1134. doi:10.1080/17467586.2013.814069.
  • Lind, William S, Col Keith Nightengale, Cap John F. Schmitt, Col Joseph W. Sutton, and LtCol Gary I. Wilson, “The Changing Face of War: Into the Fourth Generation,” Marine Corps Gazette (Pre-1994) 73, no. 10 (1989): 22.
  • Llera, Francisco J., and Rafael Leonisio, “La Estrategia Del Miedo. ETA y La Espiral Del Silencio En El País Vasco.” Centro Memorial de las Víctimas del Terrorismo, 2017. https://www.memorialvt.com/wp-content/uploads/2017/04/Informe01links.pdf.
  • Loosemore, Kathryn, and Matthew Johnson, “The Challenge of Establishing the Impact of Terrorist Organisations: Development of a Database on ETA’s Activities,” Critical Studies on Terrorism 16, no. 2 (April 3, 2023): 396–406. doi:10.1080/17539153.2023.2170514.
  • Ly, Pierre-Emmanuel, “The Charitable Activities of Terrorist Organizations,” Public Choice 131 (2007): 177–95. doi:10.1007/s11127-006-9112-2.
  • Mahoney, Charles W., “End of the Cycle: Assessing ETA’s Strategies of Terrorism,” Small Wars & Insurgencies 29, no. 5–6 (November 2, 2018): 916–40. doi:10.1080/09592318.2018.1519300.
  • Meadows, H. Donella, Thinking in Systems (White Rivr Junction, Vermont: Chelsea Green Publishing, 2008). https://www.amazon.de/-/en/Thinking-Systems-Primer-International-Bestseller/dp/1603580557.
  • Merriam-Webster, “Modus Operandi Definition & Meaning,” 2023. https://www.merriam-webster.com/dictionary/modus%20operandi.
  • Mesjasz, Czeslaw, “Complex Systems Studies and Terrorism,” in Conflict and Complexity, eds. Philip Vos Fellman, Yaneer Bar-Yam, and Ali A. Minai, Understanding Complex Systems (New York, NY: Springer New York, 2015), 35–71. doi:10.1007/978-1-4939-1705-1_2.
  • Muslim Brotherhood, “Reading into the Muslim Brotherhood’s Documents.” Ikhwanweb - Muslim Brotherhood’s Official English Website. https://ikhwanweb.com/reading-into-the-muslim-brothe/ (Accessed February 5, 2024).
  • Nickerson, Raymond S., “Confirmation Bias: A Ubiquitous Phenomenon in Many Guises,” Review of General Psychology 2, no. 2 (1998): 175–220. doi:10.1037/1089-2680.2.2.175.
  • Perloff, Richard M., The Dynamics of Persuasion: Communication and Attitudes in the Twenty-First Century, 6th ed. (New York: Routledge, 2017). doi:10.4324/9781315657714.
  • Policia Nacional, Gobierno de España, “La Victoria de La Libertad: La Policía Nacional Contra El Terrorismo,” 2024. https://www.policia.es/_es/tupolicia_memorial_victimas.php#.
  • Portero, Daniel, La Trama Civil de ETA: El Final Está Muy Cerca (Spain: Documentos Arcopress, 2008).
  • Qiao, Liang, and Xiangsui Wang, Unrestricted Warfare (Beijing: PLA Literature and Arts Publishing House, 1999). https://www.c4i.org/unrestricted.pdf.
  • Ravndal, Jacob Aasland, “Transnational Militancy in the Making: A Primer on the Nordic Resistance Movement and Generation Identity,” in Center for Research on Extremism, The Extreme Right, Hate Crime and Political Violence (University of Oslo, 2019).
  • Rayner, Steve, “Uncomfortable Knowledge: The Social Construction of Ignorance in Science and Environmental Policy Discourses,” Economy and Society 41, no. 1 (February 1, 2012): 107–25. doi:10.1080/03085147.2011.637335.
  • Sageman, Marc, “Understanding Terror Networks,” 2004. https://www.upenn.edu/pennpress/book/14036.html.
  • Sallamaa, Daniel, and Tommi Kotonen, “The Case against the Nordic Resistance Movement in Finland: An Overview and Some Explanations,” Center for Research on Extremism, University of Oslo. 2020. https://www.sv.uio.no/c-rex/english/news-and-events/right-now/2020/the-case-against-the-nordic-resistance-movement.html.
  • Schelling, Thomas C., Arms and Influence. 2020th ed. (USA: Yale University Press, 1966). https://yalebooks.yale.edu/9780300246742/arms-and-influence.
  • Schmid, Alex, “Violent and Non-Violent Extremism: Two Sides of the Same Coin?” Terrorism and Counter-Terrorism Studies, 2014. doi:10.19165/2014.1.05.
  • Schmid, Alex P., Defining Terrorism (International Centre for Counter-Terrorism, 2023). https://www.icct.nl/sites/default/files/2023-03/Schmidt%20-%20Defining%20Terrorism_1.pdf.
  • Schmid, Alex P., and A. J. Jongman, Political Terrorism: A New Guide to Actors, Authors, Concepts, Data Bases, Theories, and Literature. Rev. Expanded and Updated ed. (New Brunswick (USA) and London (UK): Transaction Publishers, 1988).
  • Sierra, Jerónimo Ríos, “Terrorismo, Legitimidad y Militancia: Un Análisis Discursivo sobre ETA,” Dados 64, no. 4 (2021): e20190258. doi:10.1590/dados.2021.64.4.246.
  • Silke, Andrew, Lara A. Frumkin, and John F. Morrison, “Contemplating a Research Agenda for Terrorism Studies,” in Research Agenda Terrorism Studies, eds. Lara Frumkin, John Morrison, and Andrew Silke, (Edward Elgar Publishing, 2023), 1–20. doi:10.4337/9781789909104.00005.
  • Silke, Andrew, and Jennifer Schmidt-Petersen, “The Golden Age? What the 100 Most Cited Articles in Terrorism Studies Tell Us,” Terrorism and Political Violence 29, no. 4 (July 4, 2017): 692–712. doi:10.1080/09546553.2015.1064397.
  • Sinai, Joshua, “Terrorism Bookshelf: Top 150 Books on Terrorism and Counter-Terrorism,” Perspectives on Terrorism 6, no. 2 (2012): 74–116.
  • Sinai, Joshua, Jeffry Fuller, and Tiffany Seal, “Effectiveness in Counter-Terrorism and Countering Violent Extremism,” Perspectives on Terrorism 13, no. 6 (2019): 90–108.
  • Sorlin, Sandrine, “Manipulative Moves: Between Persuasion and Coercion,” in Language and Manipulation in House of Cards, by Sandrine Sorlin (London: Palgrave Macmillan UK, 2016), 107–41. doi:10.1057/978-1-137-55848-0_4.
  • The International Consortium on Closing Civic Space (iCon), “Database of Legislation on the Definition of Terrorism,” (Center for Strategic and International Studies (CSIS), February 2018). https://csis-website-prod.s3.amazonaws.com/s3fs-public/Matrix_AligningSecurity_Final.pdf?M7izhWzLETVPaLbybV3nql.sz4yYdj38.
  • Tinnes, Judith, “Bibliography: Root Causes of Terrorism,” Perspectives on Terrorism 11, no. 4 (2017): 102–42. doi:10.1057/978-1-349-94960-1.
  • Tinnes, Judith, “Bibliography: Terrorism and Ideology,” Perspectives on Behavior Science 12, no. 3 (2018): 119–58.
  • Tinnes, Judith, “Bibliography: Terrorism and the Media (Including the Internet),” Perspectives on Terrorism, Bibliographic Series of Perspectives on Terrorism, 13, no. 2 (2019): 79–144. doi:10.2139/ssrn.2320598.
  • Tversky, Amos, and Daniel Kahneman, “Judgment under Uncertainty: Heuristics and Biases,” 185 (1974).
  • Vidino, Lorenzo, The Closed Circle: Joining and Leaving the Muslim Brotherhood in the West. The Closed Circle (Columbia University Press, 2020). doi:10.7312/vidi19366.
  • Vidino, Lorenzo, and Sergio Altuna, “The Muslim Brotherhood: Pan-European Structure.” Austrian Fund for the Documentation of Religiously Motivated Political Extremism (Documentation Centre Political Islam), 2021. https://www.dokumentationsstelle.at/wp-content/uploads/2021/10/Report_EU_Strukturen_final.pdf.
  • Watzlawick, Paul, Janet H. Beavin, and Don D. Jackson, Pragmatics of Human Communication: A Study of Interactional Patterns, Pathologies and Paradoxes (London: Faber & Faber, 1969).
  • Williams, Phil, “Violent Non-State Actors and National and International Security,” Table of Contents International Relations and Security Network (ISN), 2008, 4–20.
  • Zeller, Michael C., and Michael Vaughan, “Proscribing Right-Wing Extremist Organizations in Europe: Variations, Trends, and Prospects,” Terrorism and Political Violence, August 8, 2023, 1–23. doi:10.1080/09546553.2023.2240446.