HYBRID THREAT ASSESSMENT THROUGH SECURITY ANALYTICS: A CLARK–HEUER INTEGRATIVE MODEL
Abstract
Review paper
DOI: https://doi.org/10.37458/ssj.6.2.9
This paper develops an integrative analytical framework for assessing hybrid threats by combining Robert M. Clark’s target-centric (PMESII) approach and Richard J. Heuer Jr.’s cognitive-analytical (ACH) model. The study argues that merging systemic mapping and cognitive safeguards enhances both the external validity and internal reliability of intelligence analysis. Employing a qualitative, theory-driven design, the research contrasts the added value and operational limitations of the Clark–Heuer dual framework across Euro-Atlantic security contexts. Three illustrative cases, the Baltic States, Moldova, and the Israel–Hamas conflict, demonstrate how the model improves attribution confidence, analytical timeliness, and proportionality in hybrid threat assessment. The integration of PMESII and ACH enables real-time validation checkpoints within crisis-monitoring processes, reducing analytical error and reinforcing institutional resilience. Findings confirm that the Clark–Heuer model bridges the gap between academic theory and operational practice, offering a replicable meta-framework that strengthens analytical accountability, adaptability, and democratic legitimacy in security governance.
References
Balzacq, T. (2010). Securitization theory: How security problems emerge and dissolve. Routledge. https://doi.org/10.4324/9780203868508
Bigo, D. (2002). Security and immigration: Toward a critique of the governmentality of unease. Alternatives: Global, Local, Political, 27 (1_suppl), 63–92. https://doi.org/10.1177/03043754020270S105
Borch, O. J., & Heier, T. (Eds.). (2024). Preparing for hybrid threats to security: Collaborative preparedness and response (1st ed.). Routledge. https://doi.org/10.4324/9781032617916
Buzan, B., Wæver, O., & de Wilde, J. (1998). Security: A new framework for analysis. Boulder, CO: Lynne Rienner Publishers.
Clark, R. M. (2016). Intelligence analysis: A target-centric approach (5th ed.). CQ Press/SAGE Publications.
NATO (2024, June). Hybrid threats and hybrid warfare: Reference curriculum. Brussels: NATO Headquarters https://www.nato.int/nato_static_fl2014/assets/pdf/2024/7/pdf/241007-hybrid-threats-and-hybrid-warfare.pdf
Côté-Boucher, K. (2008). The diffuse border: Intelligence-sharing, control and confinement along Canada’s smart border. Surveillance & Society, 5(2), 142–165. https://doi.org/10.24908/ss.v5i2.3432
Glapiak, A. (2023). Implications of the war in Ukraine for the strategic communication system of the Polish Ministry of National Defence. Security and Defence Quarterly, 43(3), 22–45. https://doi.org/10.35467/sdq/173070
Hansen, L. (2006). Security as practice: Discourse analysis and the Bosnian war. London: Routledge. https://doi.org/10.4324/9780203236338
Heuer, R. J., Jr. (1999). Psychology of intelligence analysis. Washington, DC: Center for the Study of Intelligence, Central Intelligence Agency.
Hicks, M.-L., Guest, E., Whittlestone, J., Ohrvik-Stott, J., Zakaria, S., Ang, C., Wade, I., & Gunashekar, S. (2023). Exploring red teaming to identify new and emerging risks from AI foundation models: Summary workshop report (Workshop Report No. CFA3031-1). RAND Corporation. https://www.rand.org/content/dam/rand/pubs/conf_proceedings/CFA3000/CFA3031-1/RAND_CFA3031-1.pdf
Huysmans, J. (2006). The Politics of Insecurity: Fear, Migration and Asylum in the EU (1st ed.). Routledge. https://doi.org/10.4324/9780203008690
Ionita, C. (2023). Conventional and hybrid actions in the Russia’s invasion of Ukraine. Security and Defence Quarterly, 44(4), 5–20. https://doi.org/10.35467/sdq/168870
Iskandarov, K. I., Gawliczek, P. & Soboń, A. (2024). Violation of territorial integrity as a tool for waging long-term hybrid warfare (against the backdrop of power games in the South Caucasus region). Security and Defence Quarterly, 45(1), 1–17. https://doi.org/10.35467/sdq/174507
Jervis, R. (2010). Why intelligence fails: Lessons from the Iranian Revolution and the Iraq War. Ithaca, NY: Cornell University Press.
Juberte Krūmiņa, L. (2024). Role of the private sector within Latvia’s strategic defence documents: Dimensions of psychological resilience and strategic communication. Security and Defence Quarterly, 47(3), 19–37. https://doi.org/10.35467/sdq/186719
Lasoen, K. (2022). Realising the EU hybrid toolbox: Opportunities and pitfalls. Policy Brief. The Hague: Clingendael Institute. https://www.clingendael.org/sites/default/files/2022-12/Policy_brief_EU_Hybrid_Toolbox.pdf
Marrin, S. (2012). Evaluating the Quality of Intelligence Analysis: By What (Mis) Measure? Intelligence and National Security, 27(6), 896–912. https://doi.org/10.1080/02684527.2012.699290
McDonald, M. (2008). Securitization and the Construction of Security. European Journal of International Relations, 14(4), 563-587. https://doi.org/10.1177/1354066108097553
Microsoft Threat Intelligence. (2024, February 26). Iran surges cyber-enabled influence operations in support of Hamas. Microsoft Security Insider. https://www.microsoft.com/en-us/security/security-insider/threat-landscape/iran-surges-cyber-enabled-influence-operations-in-support-of-hamas
Miętkiewicz, R. (2025). Hybrid threats in the Baltic Sea: The results of analysis of countermeasure options. Terrorism – Studies, Analyses, Prevention (Special Issue), 35–70. https://doi.org/10.4467/27204383TER.25.014.21517
Mitrovic, M. (2018). The Balkans and non-military security threats – quality comparative analyses of resilience capabilities regarding hybrid threats. Security and Defence Quarterly, 22(5), 20–45. https://doi.org/10.5604/01.3001.0012.7224
Mitrovic, M. (2019). Influence of global security environment on collective security and defence science. Security and Defence Quarterly, 24(2), 5–20. https://doi.org/10.35467/sdq/106088
Mitrovic, M. (2021). Assessments and foreign policy implementation of the national security of Republic of Serbia. Security and Defence Quarterly, 34(2), 7–19. https://doi.org/10.35467/sdq/135592
Mitrovic, M. (2025). Invisible fronts: Hybrid warfare and the future of conflict. Columbia, SC: Independently published.
Onwubiko, C., & Ouazzane, K. (2022). Multidimensional cybersecurity framework for strategic foresight (arXiv preprint arXiv:2202.02537). arXiv. https://doi.org/10.48550/arXiv.2202.02537
Phythian, M. (2009). Intelligence Analysis Today and Tomorrow. Security Challenges, 5(1), 67–83. http://www.jstor.org/stable/26459162
Praks, H. (2024 May). Hybrid CoE Working Paper 32: Russia’s hybrid threat tactics against the Baltic Sea region: From disinformation to sabotage. European Centre of Excellence for Countering Hybrid Threats. https://www.hybridcoe.fi/publications/hybrid-coe-working-paper-32-russias-hybrid-threat-tactics-against-the-baltic-sea-region-from-disinformation-to-sabotage
Ram, Y., & Antebi, L. (2023, November 5). Deep fake in Swords of Iron: A battle for public opinion (Insight No 1779). Institute for National Security Studies. https://www.inss.org.il/publication/war-deep-fake
Renn, O. (2020). New challenges for risk analysis: systemic risks. Journal of Risk Research, 24(1), 127–133. https://doi.org/10.1080/13669877.2020.1779787
Renz, B., & Smith, H. (2016). Russia and hybrid warfare: Going beyond the label. Aleksanteri Papers No. 1/2016. Kikimora Publications, University of Helsinki. https://helda.helsinki.fi/server/api/core/bitstreams/9514b166-0249-42a4-a408-9195e7d32292/content
Rid, T. (2020). Active measures: The secret history of disinformation and political warfare. New York, NY: Farrar, Straus and Giroux.
Pociumban, A. (2023, October 31). Moldova’s response to hybrid attacks: A learning-by-doing strategy (Campaigning Against Hybrid Threats Paper Series). The Hague Centre for Strategic Studies. https://www.hcss.nl/report/moldovas-response-to-hybrid-attacks
Vu, A. V., Hutchings, A., & Anderson, R. (2025). Yet another diminishing spark: Low-level cyberattacks in the Israel–Gaza conflict (arXiv preprint arXiv:2504.15592). arXiv. https://doi.org/10.48550/arXiv.2504.15592
Weissmann, M. (2025). Future threat landscapes: The impact on intelligence and security services. Security and Defence Quarterly, 49(1), 40–57. https://doi.org/10.35467/sdq/197248
SSJ conforms to open access (OA) policy. SSJ - Security Science JournalTM


