{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,3]],"date-time":"2025-09-03T10:45:17Z","timestamp":1756896317095,"version":"3.41.2"},"reference-count":62,"publisher":"Emerald","issue":"3","license":[{"start":{"date-parts":[[2020,4,29]],"date-time":"2020-04-29T00:00:00Z","timestamp":1588118400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.emerald.com\/insight\/site-policies"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["TG"],"published-print":{"date-parts":[[2020,4,29]]},"abstract":"<jats:sec><jats:title content-type=\"abstract-subheading\">Purpose<\/jats:title><jats:p>This paper aims to understand whether Portugal, being a relatively peripheral country \u2013 in political, economic and military terms \u2013 of Southwest Europe, was recently a target of hybrid threats. The prevalence of a specific type of threat was found. Thus, this paper analyses the non-kinetic hybrid threats in Portugal, in a temporary hiatus of two years (2017-2018).<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-subheading\">Design\/methodology\/approach<\/jats:title><jats:p>This study has two parts: a conceptual analysis of hybrid threats created by us and, based on the typology previously presented, an analysis of the hybrid threats in Portugal between 2017 and 2018. The first part relied on source analysis, as the result of a desk review methodology, supported by monographs, declassified official documents and reports. The second part is also the result of source analysis, but more extensive. In addition to the desk review methodology, the study included semi-structured interviews with different stakeholders from the Portuguese security and armed forces, who asked not to be quoted. Media content analysis was also carried out \u2013 for trends and fact-check \u2013 mostly for the events related to the \u201cnarratives led operations\u201d (for propaganda, misinformation, counter-information and strategic leaks).<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-subheading\">Findings<\/jats:title><jats:p>To date, Portugal \u2013 compared with other European states \u2013 has not been a significant target for hybrid threats. It is diluted in the Portuguese geopolitical dimension. Nevertheless, not escaping what is happening in Europe, it has also been the target of non-kinetic hybrid threats, especially in cyberspace. In the field of so-called \u201cnarrative-driven operations\u201d, there have been some occurrences \u2013 whether related to fake news, far-right movements or strategic leaks. In addition, cyberattacks from foreign groups for information and data gathering have increased in recent years, making governmental and private critical infrastructures more vulnerable.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-subheading\">Research limitations\/implications<\/jats:title><jats:p>One of the characteristics of hybrid threats is their difficult identification. Therefore, information is scarce, which has complicated the research, leading us to assume, in many cases, speculation about the threat. It should also be taken into account that, in the case of cyberspace, until 2018, 90% of the occurrences were not reported, and the study has dealt with only official numbers.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-subheading\">Originality\/value<\/jats:title><jats:p>It is not a policy paper. Although it neither points out national vulnerabilities to this type of threat nor makes procedural recommendations or considerations, it is fundamental in identifying the peculiarity of hybrid threats in a democratic state.<\/jats:p><\/jats:sec>","DOI":"10.1108\/tg-01-2020-0011","type":"journal-article","created":{"date-parts":[[2020,5,4]],"date-time":"2020-05-04T04:44:49Z","timestamp":1588567489000},"page":"433-451","source":"Crossref","is-referenced-by-count":6,"title":["Non-kinetic hybrid threats in Europe \u2013 the Portuguese case study (2017-18)"],"prefix":"10.1108","volume":"14","author":[{"given":"Felipe","family":"Pathe Duarte","sequence":"first","affiliation":[]}],"member":"140","reference":[{"unstructured":"Armed Forces General Staff (2019), Portuguese International Missions, available at: www.emgfa.pt\/miss\u00f5es\/miss\u00f5es-no-estrangeiro","key":"key2020101608281999500_ref050"},{"key":"key2020101608281999500_ref001","article-title":"Looking for little green men: understanding Russia\u2019s employment of Hybrid warfare","volume":"17","year":"2017","journal-title":"Canadian Military Journal"},{"volume-title":"World at Risk","year":"2008","key":"key2020101608281999500_ref002"},{"volume-title":"Conceito Estrat\u00e9gico de Defesa Nacional \u2013 Contributos e Debate P\u00fablico","year":"2013","article-title":"Portugal como actor e produtor de seguran\u00e7a internacional","key":"key2020101608281999500_ref003"},{"volume-title":"Propagandes","year":"1990","key":"key2020101608281999500_ref004"},{"unstructured":"Krek\u00f3, P. and Gyori, L. (2016), \u201cDon\u2019t ignore the left! Connections between Europe\u2019s radical left and Russia\u201d, Open Democracy, available at: www.opendemocracy.net\/od-russia\/peter-kreko-lorant-gyori\/don-t-ignore-left-connections-between-europe-s-radical-left-and-ru","key":"key2020101608281999500_ref005"},{"volume-title":"War in 140 Characters: How Social Media is Reshaping Conflict in the Twenty-First Century","year":"2017","key":"key2020101608281999500_ref006"},{"unstructured":"Pomeranstev, P. (2014), \u201cHow Putin is reinventing warfare\u201d, Foreign Policy, available at: https:\/\/foreignpolicy.com\/2014\/05\/05\/how-putin-is-reinventing-warfare\/ (accessed 5 May 2014).","key":"key2020101608281999500_ref007"},{"volume-title":"LikeWar: The Weaponization of Social Media","year":"2018","key":"key2020101608281999500_ref008"},{"volume-title":"ISIS: The State of Terror","year":"2015","key":"key2020101608281999500_ref034"},{"unstructured":"Bruijne, M., van Eeten, M., Ganan, C.H. and Pieters, W. (2017), Towards a new cyber threat actor typology A hybrid method for the NCSC cyber security assessment, Delft University of Technology, Delft.","key":"key2020101608281999500_ref010"},{"unstructured":"Common Taxonomy for Law Enforcement and National Network of CSIRTs (2017), Europol-EC3 and ENISA.","key":"key2020101608281999500_ref011"},{"unstructured":"Digital News Report \u2013 Portugal (2018), Reuters Institute for the Study of Journalism, available at: https:\/\/obercom.pt\/wp-content\/uploads\/2018\/09\/DNR_PT_2018.pdf).","key":"key2020101608281999500_ref012"},{"unstructured":"EU Terrorism Situation and Trend Report (TESAT) (2018), and Europol, available at: www.europol.europa.eu\/activities-services\/main-reports\/european-union-terrorism-situation-and-trend-report-2018-tesat-2018","key":"key2020101608281999500_ref013"},{"doi-asserted-by":"crossref","unstructured":"KLAPSIS, Antonis (2015), An Unholy Alliance the European Far Right and Putin\u2019s Russia, Wilfried Martens Centre for European Studies.","key":"key2020101608281999500_ref07a","DOI":"10.1007\/s12290-015-0359-1"},{"unstructured":"Nissen, T. (2015), The Weaponization of Social Media \u2013 Characteristics of Contemporary Conflicts, Royal Danish Defence College.","key":"key2020101608281999500_ref014"},{"unstructured":"Not\u00edcias (2016), \u201cFake News\u201d e a Participa\u00e7\u00e3o Online; Relat\u00f3rios OberCom; Dezembro de 2016, available at: https:\/\/obercom.pt\/wp-content\/uploads\/2017\/02\/2017_OBERCOM_noticias-fake-news-participa\u00e7ao-online.pdf.","key":"key2020101608281999500_ref015"},{"unstructured":"Obercom (2016), As Fake News numa sociedade p\u00f3s-verdade \u2013 Contextualiza\u00e7\u00e3o, potenciais solu\u00e7\u00f5es e an\u00e1lise, Relat\u00f3rios OberCom, available at: https:\/\/obercom.pt\/wp-content\/uploads\/2018\/06\/2018-Relatorios-Obercom-Fake-News.pdf","key":"key2020101608281999500_ref048"},{"unstructured":"RASI, Relatorio Anual de Seguran\u00e7a Interna de 2017 (2018), Sistema de Seguran\u00e7a Interna \u2013 Gabinete do Secret\u00e1rio-Geral.","key":"key2020101608281999500_ref051"},{"unstructured":"The Russian Connection (2014), The spread of pro-Russian policies on the European far right; Political Capital Institute, available at: www.riskandforecast.com\/useruploads\/files\/pc_flash_report_ussian_connection.pdf","key":"key2020101608281999500_ref016"},{"unstructured":"Treverton, G.F., Thvedt, A., Chen, A.R., Lee, K. and McCue, M. (2018), Addressing Hybrid Threats, Swedish Defence University.","key":"key2020101608281999500_ref035"},{"year":"2013","author":"Conceito Estrat\u00e9gico de Defesa Nacional","article-title":"Governo de Portugal","key":"key2020101608281999500_ref017"},{"unstructured":"NATO StratCom COE (2016), Social Media as a Tool of Hybrid Warfare, NATO Strategic Communications Centre of Excellence.","key":"key2020101608281999500_ref055"},{"unstructured":"Al-Arabiya (2018), \u201cIran\u2019s selective approach to hybrid war\u201d, in Al-Arabiya, available at: https:\/\/english.alarabiya.net\/en\/views\/news\/middle-east\/2018\/02\/23\/Iran-s-selective-approach-to-hybrid-war (accessed 23 February 2018).","key":"key2020101608281999500_ref07b"},{"unstructured":"BBC (2017), \u201cMacron leaks: the anatomy of a hack\u201d, BBC, available at: www.bbc.com\/news\/blogs-trending-39845105 (accessed 9 May 2017).","key":"key2020101608281999500_ref018"},{"unstructured":"Di\u00e1rio de Not\u00edcias (2018), \u201cO neg\u00f3cio da desinforma\u00e7\u00e3o: empresa canadiana faz fake news em Portugal\u201d, Di\u00e1rio de Not\u00edcias, available at: www.dn.pt\/edicao-do-dia\/25-nov-2018\/interior\/o-negocio-da-desinformacao-empresa-canadiana-faz-fake-news-em-portugal\u201310231174.html (accessed 25 November 2018).","key":"key2020101608281999500_ref009"},{"unstructured":"Di\u00e1rio de Not\u00edcias (2018a), \u201cLajes: H\u00e1 uma campanha de desinforma\u00e7\u00e3o contra a ilha Terceira - Santos silva\u201d, Di\u00e1rio de Not\u00edcias, available at: www.dn.pt\/lusa\/interior\/lajes-ha-uma-campanha-de-desinformacao-contra-a-ilha-terceira\u2014santos-silva-9151633.html (accessed 25 February 2018).","key":"key2020101608281999500_ref019"},{"unstructured":"Di\u00e1rio de Not\u00edcias (2018b), \u201cFascistas do terceiro mil\u00e9nio\u201d est\u00e3o em Portugal. Russos e italianos apoiam\u201d, Di\u00e1rio de Not\u00edcias, available at: www.dn.pt\/edicao-do-dia\/12-ago-2018\/interior\/fascistas-do-terceiro-milenio-estao-em-portugal-russos-e-italianos-apoiam-9705711.html (accessed 12 August 2018).","key":"key2020101608281999500_ref020"},{"unstructured":"Di\u00e1rio de Not\u00edcias (2018c), \u201cFake news: sites portugueses com mais de dois milh\u00f5es de seguidores\u201d, Di\u00e1rio de Not\u00edcias, available at: www.dn.pt\/edicao-do-dia\/11-nov-2018\/interior\/fake-news-sites-portugueses-com-mais-de-dois-milhoes-de-seguidores\u201310160885.html (accessed 11 November 2018).","key":"key2020101608281999500_ref021"},{"year":"2018","article-title":"Ciberespa\u00e7o, elei\u00e7\u00f5es e propaganda intrusiva","key":"key2020101608281999500_ref022"},{"unstructured":"Expresso (2017), \u201cParadise papers. E os portugueses?\u201d, Expresso, available at: https:\/\/expresso.pt\/internacional\/2017-11-05-Paradise-Papers.-E-os-portugueses-#gs.aUZ4sglB (accessed 5 November 2017).","key":"key2020101608281999500_ref023"},{"year":"2019","article-title":"Portugal, as redes 5G e a Huawei","key":"key2020101608281999500_ref024"},{"unstructured":"Observador (2017), \u201cAtaque inform\u00e1tico. O que foi, como se espalhou, quem o\u00a0travou\u201d, in Observador, available at: https:\/\/observador.pt\/2017\/05\/13\/ataque-informatico-o-que-foi-como-se-espalhou-quem-o-travou\/ (accessed 13 May 2017).","key":"key2020101608281999500_ref07c"},{"unstructured":"Observador (2019), \u201cFootball leaks. Os neg\u00f3cios milion\u00e1rios, as cl\u00e1usulas estranhas, Ronaldo e o delator portugu\u00eas\u201d, Observador, available at: https:\/\/observador.pt\/especiais\/football-leaks-os-negocios-milionarios-as-clausulas-estranhas-ronaldo-e-o-delator-portugues\/ (accessed 18 February 2019).","key":"key2020101608281999500_ref027"},{"doi-asserted-by":"crossref","unstructured":"P\u00fablico (2016), \u201cBahamas leaks: 28 empres\u00e1rios portugueses identificados\u201d, P\u00fablico, available at: www.publico.pt\/2016\/09\/21\/mundo\/noticia\/bahama-leaks-28-empresarios-portugueses-identificados-1744817#gs.sd50kQXO (accessed 21 September 2016).","key":"key2020101608281999500_ref028","DOI":"10.20344\/amp.5526"},{"unstructured":"P\u00fablico (2017), \u201cPortugal \u00e9 o pa\u00eds da UE onde o investimento chin\u00eas tem mais peso\u201d, P\u00fablico, available at: www.publico.pt\/2017\/04\/03\/economia\/noticia\/portugal-e-o-pais-da-ue-onde-o-investimento-chines-tem-mais-peso-1767250#gs.uiukIqJA (accessed 3 April 2017).","key":"key2020101608281999500_ref029"},{"unstructured":"P\u00fablico (2019), \u201cN\u00famero de pr\u00e9-avisos de greve em 2018 foi o mais alto dos \u00faltimos tr\u00eas anos\u201d, P\u00fablico, available at: www.publico.pt\/2019\/01\/29\/sociedade\/noticia\/ultimos-tres-anos-2018-ano-preavisos-greve-1859788#gs.vdgo9wfM (accessed 29 January 2019).","key":"key2020101608281999500_ref030"},{"unstructured":"Reuters (2017), \u201cSpain sees Russian interference in Catalonia separatist vote\u201d, Reuters, available at: www.reuters.com\/article\/us-spain-politics-catalonia-russia\/spain-sees-russian-interference-in-catalonia-separatist-vote-idUSKBN1DD20Y (accessed 13 November 2017).","key":"key2020101608281999500_ref031"},{"unstructured":"S\u00e1bado (2017), \u201cAtaque inform\u00e1tico NotPetya: o que aconteceu\u201d, Revista S\u00e1bado, available at: www.sabado.pt\/ciencia\u2014saude\/tecnologia\/detalhe\/ataque-informatico-notpetya-o-que-ja-se-sabe (accessed 27 June 2017).","key":"key2020101608281999500_ref032"},{"unstructured":"S\u00e1bado (2018), \u201cA China, os novos donos de Portugal\u201d, S\u00e1bado, available at: www.sabado.pt\/dinheiro\/detalhe\/a-china-os-novos-donos-de-portugal (accessed 4 December 2018).","key":"key2020101608281999500_ref033"},{"unstructured":"TSF (2016), \u201cGoverno confirma que tr\u00eas entidades p\u00fablicas usaram para\u00edsos fiscais\u201d, TSF, available at: www.tsf.pt\/economia\/interior\/governo-confirma-que-tres-entidades-publicas-usaram-paraisos-fiscais-5184680.html (accessed 20 May 2016).","key":"key2020101608281999500_ref036"},{"unstructured":"TSF (2018), \u201cLiga\u00e7\u00e3o Portuguesa aos Panam\u00e1 papers: muito mais pessoas do que empresas\u201d, TSF, available at: www.tsf.pt\/economia\/interior\/ligacao-portuguesa-aos-panama-papers-muito-mais-pessoas-do-que-empresas-9376133.html (accessed 24 May 2018).","key":"key2020101608281999500_ref037"},{"unstructured":"The Guardian (2018), \u201cGilets jaunes: grassroots heroes or tools of the Kremlin?\u201d, in The Guardian, available at: www.theguardian.com\/world\/2018\/dec\/17\/gilets-jaunes-grassroots-heroes-or-kremlin-tools (accessed 17 December 2018).","key":"key2020101608281999500_ref07d"},{"unstructured":"The New York Times (2016), \u201c5 Accused of stealing drug secrets from GlaxoSmithKline\u201d, The New York Times, available at: www.nytimes.com\/2016\/01\/21\/business\/5-accused-of-stealing-drug-secrets-from-glaxosmithkline.html (accessed 20 January 2016).","key":"key2020101608281999500_ref025"},{"unstructured":"The New York Times (2018), \u201cIn the Balkans, Russia and the West fight a Disinformation-Age battle\u201d, New York Times, available at: www.nytimes.com\/2018\/09\/16\/world\/europe\/macedonia-referendum-russia-nato.html (accessed 16 September 2018).","key":"key2020101608281999500_ref026"},{"year":"2018","author":"Vis\u00e3o","article-title":"Hackers espiam neg\u00f3cios estrangeiros","key":"key2020101608281999500_ref038"},{"volume-title":"5th International Conference on Cyber Conflict","year":"2013","article-title":"The dawn of kinetic cyber","key":"key2020101608281999500_ref039"},{"unstructured":"Bartles, C. (2016), \u201cGetting Gerasimov right\u201d, Military Review; Jan-Fev., available at: https:\/\/usacac.army.mil\/CAC2\/MilitaryReview\/Archives\/English\/MilitaryReview_20160228_art008.pdf","key":"key2020101608281999500_ref040"},{"key":"key2020101608281999500_ref041","article-title":"Ag\u00eancia oficial chinesa Xinhua lan\u00e7ou portal em portugu\u00eas","author":"Di\u00e1rio de Not\u00edcias","year":"2016","journal-title":"Di\u00e1rio de Not\u00edcias"},{"unstructured":"European Centre of Excellence for Countering Hybrid Threat (2019), Countering Hybrid Threats, available at: www.hybridcoe.fi\/hybrid-threats\/ (accessed 6 February 2019).","key":"key2020101608281999500_ref07f"},{"volume-title":"Fellowship Monogprah 9","year":"2016","article-title":"Handbook of Russia information warfare","key":"key2020101608281999500_ref042"},{"volume-title":"Conflict in the 21st Century: The Rise of Hybrid Wars","year":"2007","key":"key2020101608281999500_ref043"},{"unstructured":"International CRISIS GROUP (2018), Iraq\u2019s Paramilitary Groups: The Challenge of Rebuilding a Functioning State, Middle East Report N\u00b0188, (accessed 30 July 2018).","key":"key2020101608281999500_ref07e"},{"volume-title":"Hybrid Warfare: Fighting Complex Opponents from the Ancient World to the Present","year":"2012","key":"key2020101608281999500_ref044"},{"volume-title":"Future War and Chechnya: A Case for Hybrid Warfare","year":"2002","key":"key2020101608281999500_ref045"},{"volume-title":"O Conceito de Multidom\u00ednio e as Poss\u00edveis Aplica\u00e7\u00f5es \u00e0s For\u00e7as Armadas Portuguesas","year":"2018","key":"key2020101608281999500_ref046"},{"issue":"4","key":"key2020101608281999500_ref047","first-page":"61","article-title":"The combat potential and the security strategy of Russia \u2013 towards rebuilding the position in the international arena","volume":"16","year":"2018","journal-title":"Yearbook of the Institute of East-Central Europe"},{"unstructured":"Office of the Director of National Intelligence (2017), Background to \u201cAssessing Russian Activities and Intentions in Recent US Elections\u201d: The Analytic Process and Cyber Incident Attribution; Office of the Director of National Intelligence.","key":"key2020101608281999500_ref049"},{"unstructured":"NATO (2014), \u201cWales summit declaration\u201d, available at: www.nato.int\/cps\/en\/natohq\/official_texts_112964.htm).","key":"key2020101608281999500_ref052"},{"unstructured":"NATO (2020), Assured Security; Dynamic Engagement, May 2010, available at: www.nato.int\/strategic-concept\/expertsreport.pdf (accessed 5 February 2019).","key":"key2020101608281999500_ref053"},{"unstructured":"P\u00fablico. (2015), \u201cCriador do tugaleaks detido por ataque inform\u00e1tico \u00e0 procuradoria de Lisboa\u201d, P\u00fablico, available at: www.publico.pt\/2015\/02\/26\/sociedade\/noticia\/criador-do-tugaleaks-detido-por-ataque-informatico-a-procuradoria-de-lisboa-1687398#gs.Oj5HIJyf (accessed 26 February 2015).","key":"key2020101608281999500_ref054"},{"year":"2010","author":"U.S. Army Training Circular (TC) 7-100","key":"key2020101608281999500_ref056"}],"container-title":["Transforming Government: People, Process and Policy"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/TG-01-2020-0011\/full\/xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/TG-01-2020-0011\/full\/html","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,24]],"date-time":"2025-07-24T21:34:53Z","timestamp":1753392893000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.emerald.com\/tg\/article\/14\/3\/433-451\/374934"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,4,29]]},"references-count":62,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2020,4,29]]}},"alternative-id":["10.1108\/TG-01-2020-0011"],"URL":"https:\/\/doi.org\/10.1108\/tg-01-2020-0011","relation":{},"ISSN":["1750-6166","1750-6166"],"issn-type":[{"type":"print","value":"1750-6166"},{"type":"print","value":"1750-6166"}],"subject":[],"published":{"date-parts":[[2020,4,29]]}}}