Skip to main content

ORIGINAL RESEARCH article

Front. Psychiatry, 23 February 2022
Sec. Child and Adolescent Psychiatry
This article is part of the Research Topic Radicalization Among Adolescents View all 9 articles

Evidence of Psychological Manipulation in the Process of Violent Radicalization: An Investigation of the 17-A Cell

  • 1Department of Psychology, University of Cordoba, Cordoba, Spain
  • 2Department of Psychology, Marbella International University Centre, Marbella, Spain
  • 3Department of Methodology for Behavioral Sciences, University of Granada, Granada, Spain

Introduction: Radicalization leading to violence is a complex social process that frequently targets young people. In this study, we examine the 17-A cell, which carried out terrorist attacks in the Spanish cities of Barcelona and Cambrils on August 17, 2017. We focus on the psychological manipulation techniques used to radicalized members of the cell.

Methods: Using deductive content analysis, we examined the judicial order of the National High Court related to “Operation Ramblas” and the police proceedings of Cuerpo de Mossos d'Esquadra (CME) associated with the Barcelona and Cambrils attacks. Our goal was to determine whether psychological manipulation was used on the cell members and, if so, how frequently.

Results: Our results suggest that different psychological manipulation techniques were used on the 17-A cell members to facilitate their use of ideological violence. The most frequent strategies were cognitive control (control of attention, group identification, and denigration of critical thinking), environmental control (control of information), and emotional control (authoritarian leadership).

Conclusions: This study provides evidence that psychological manipulation techniques were used in the radicalization of 17-A cell members. The results are discussed in the context of previous research on the psychology of violent extremism and terrorism. We highlight the need for prevention and psychosocial interventions to steer young people away from violent extremism.

Introduction

Violent radicalization poses a growing concern for European societies. In recent decades, cities like Barcelona, Berlin, Brussels, London, Nice, and Vienna have been targeted by political-religious terrorism. According to the 2020 European Union Terrorism Situation and Trend Report (1), in 2019, there were 119 attacks and more than 1,000 terrorism-related arrests in EU-member states. Among the perpetrators, approximately 70% were between 20 and 28 years old and roughly 60% were citizens of the country where the attack took place. Given these trends, it is necessary to study terrorism from a global perspective, with the aim of understanding the multiple motivations that lead young people to engage in political-religious violence.

In this research, we examine a topic that has been understudied in the terrorism literature: the use of psychological manipulation techniques in the process of violent radicalization (2). Research has found that young people are particularly vulnerable to propaganda and the influence of extremist recruiters (3, 4). Understanding how recruiters and groups use these techniques to radicalize youth is imperative to create effective prevention programs.

The present research focuses on the members of the cell that carried out the attacks on Barcelona and Cambrils on August 17, 2017 (commonly referred to as the 17-A attacks), which killed 16 people and injured several others (57). The cell that perpetrated these attacks consisted of nine young people and a leader (Abdelbaki Es Satty) who contributed to their violent radicalization (8). Therefore, the aim of this research is to shed light on the use of psychological strategies of manipulation in the violent radicalization of the 17-A cell members.

Process of Radicalization

Radicalization is described as a “social and psychological process of incrementally experienced commitment to extremist political or religious ideology” (9). This process is unique to each individual although common recurring features can be identified. In recent years, terrorism researchers have moved away from a profile-based understanding of radicalization to focus on the different pathways leading to radicalization (10). This has led to greater attention on group factors and dynamics (11)—including social identity (12, 13) and social networks (2, 1418).

Although group dynamics appear to play a crucial role in the radicalization process, there are important blind spots in our understanding of this complex phenomenon. One of them is the extent to which recruiters facilitate radicalization leading to violence. While some authors posit that recruiters play a minimal role—referred to as “bottom-up” radicalization (12)—others suggest a top-down process whereby the recruiter's role is more central due to their use of psychological manipulation techniques (19, 20). There seems to be evidence for both perspectives (21, 22). And yet, when research suggests a top-down approach, the manipulation strategies used by recruiters are typically unclear (2).

Recent theorizing on manipulation techniques, like the psychosocial model of recruitment and violent mobilization (19, 20, 23), suggests that the process of radicalization follows several phases, during which the recruiters indoctrinate and prepare young people for the use of violence. According to this model, recruiters identify their targets in vulnerable contexts—such as marginal neighborhoods, education centers, or places of worship. Recruiters then befriend their targets to build trust. As soon as the recruiter is accepted by the young person, he or she starts the radicalization process, which consists of three phases. The first phase is psychological submission (emotional radicalization), whereby the young person loses their autonomy and becomes dependent on their friendship with recruiter and cell members. This is achieved by using persuasive and aggressive communication strategies, such as social isolation and inducing confusion between reality and fantasy. The second phase is political-religious indoctrination (doctrinal radicalization), whereby the recruiter induces a new ideology using psychological manipulation techniques. Some of these techniques appear to be like those used by totalitarian cults and are aimed at eliminating the personal identity of the target by reinforcing a new social identity with the extremist group (24). Finally, in the third phase of violent disinhibition and legitimization (violent radicalization), the recruit validates the use of violence by associating with the mistreatment and oppression allegedly suffered by their new group, identifies the enemy, and shifts responsibility by making an attack essential to improving their situation (19, 20).

Providing evidence for this model, some studies have found a relationship between radicalization and the use of different psychological manipulation strategies. For instance, researchers have concluded that, in terrorist groups like al-Qaeda, there can be high levels of “group psychological abuse” similar to or higher than those of some cults (5, 24, 25), which use persuasion and manipulation to influence attitudes and behaviors, with the ultimate goal of inducing participation in terrorist acts.

Youth and Violent Radicalization

According to EUROPOL's annual report (1), the majority of those arrested for terrorist offenses in the European Union during 2019 were young people between 20 and 28 years old. In Spain, 45% of radicals arrested for recruiting young Muslims to commit acts of political-religious terrorism targeted adolescents under the age of 18 (26). These data are consistent with previous analyses and in line with other systematic reviews that have emphasized that youth is a particularly relevant stage in the radicalization process, and as such, prevention strategies must focus on young people (20, 2730).

Looking more closely at the radicalization risk factors presented by young people, Adam-Troian et al. (3) consider three specific components: (1) the experience of more extreme and variable emotions, (2) greater threat/stress sensitivity, and (3) commitment with violence. According to this perspective, adolescents experience more extreme and variable emotions given deficits in both emotional regulation and emotion reactivity (sensitivity) (4, 31). Likewise, young people are more sensitive to grievances and peer influence, especially social rejection (32). Indeed, peer ostracism outweighs other negative decision outcomes (33). In the same way, young people can be particularly sensitive to propaganda efforts from violent extremist organizations' recruiters (34), engage more frequently in risky behaviors (35) and commit more violence than other age groups (36). Males are more prone to aggressive behavior that females due to both biological and socialization factors (37).

In conclusion, because some developmental characteristics make youth more sensitive to threats that can lead them to engage in political violence, age could be considered a risk factor for radicalization (38). In this context, the religious knowledge of recruiters may be a factor of interest and admiration among young Muslim Europeans of the second and third generation, who typically lack religious training, adaptive social models, and critical thinking skills. Providing evidence, Schmid (39) found that some youths who join political-religious terrorist groups “know little of Islam, that their knowledge is “a la carte”—an eclectic mix of out of context Koran and Hadith quotes gained from websites rather than acquired from a study of more trustworthy sources” (p35).

Given these risk factors, it is clear that the aim of recruiters is to lead young people to emotional and cognitive states that facilitate violent disinhibition (24). Therefore, to better understand the process of youth radicalization, greater attention must be paid to the interaction between young people, potential recruiters, and group dynamics.

Psychological Manipulation

Psychological manipulation is a directed and systematic process carried out by an indoctrinating hierarchy with the application of specific techniques and strategies (5, 4042). Manipulation is contemplated as something subtle, imperceptible, and gradual without the application of violence or force. Defined in this way, individuals are unaware of the manipulation, which undermines their volitional capacity (43).

Some scientific studies have compared terrorist dynamics with those applied in cults, highlighting certain similarities between the two. Trujillo et al. (24) evaluated the psychological manipulation processes that take place within terrorist groups, showing the use of these dynamics by certain leaders. According to Cuevas (44), terrorist and cultist dynamics are nearly identical, with the only difference being the use of fear and violence by terrorist groups as a means of self-assertion. In any case, the possibility that terrorist groups use this type of technique has not been studied in detail.

By collecting the previously identified psychological manipulation techniques from cult victims (42, 45, 46), Cuevas, using the Coercive Persuasion Interview (CPI), proposes a new classification to group them (40). He highlights four groups of manipulation strategies. The first is formed by environmental techniques with the objective to distance the subject from their previous environment and routines, promoting immersion in the group and restricting their freedom or will. These techniques include isolation, control of information, creation of a state of existential dependence, and psychophysical weakening. The second group includes emotional techniques aimed at influencing the feelings and emotions of the subjects to generate greater submission to the group. Among these techniques we find emotional activation of joy, activation of fear, guilt, and anxiety, as well as rewards and punishments. The third group comprises cognitive techniques used to confuse and alter mental processes. Among these techniques are denigration of critical thinking, lies and deception, demand for condescension and group identification, control of attention, control over language, and alteration of sources of authority. The fourth group includes techniques to induce dissociative states, which have the aim of altering general awareness or behavioral, cognitive, and emotional inhibition/disinhibition. Methods in this group include use of drugs, refusal of treatment, medical help and/or refusal to take prescribed medication, chanting, mantras, speaking in tongues, praying, meditating, and other methods of dissociation such as suggestion and hypnosis.

In combination, these techniques are used to distance individuals from relatives and friends, generate peer pressure, and override individuality and critical judgment (40, 42). In other words, the autonomous will of the individual is conditioned or overridden in order to accept and satisfy the will of the group (40, 47).

The Present Study

Based on the information presented above, the aim of the present study is to provide evidence for the top-down radicalization process and manipulation techniques used within a terrorist cell. This study focuses on two research questions: (1) Were psychological manipulation techniques used to radicalize young people into the 17-A cell? And, if so, (2), Which techniques were used most frequently? To answer these questions, we conducted a systematic analysis of the radicalization process of the members of the 17-A cell.

Methods

To answer the research questions posed, we designed a case study based on the 17-A cell. The 17-A cell was formed in the municipality of Ripoll (Gerona, inner Catalonia) and included 10 members: the leader, who drove recruitment (imam), and nine young people among them there were four pairs of siblings among the members of the cell, each of whom were second generation migrants (48). The age of the members ranged from 17–28 at the time of the Barcelona and Cambrils attacks; four were not over 20 and one was under the age of 18. All of them were residents of Ripoll, and most shared family or friendship bonds within the group. According to different analyses, the leader, allegedly inspired by the jihadist Salafist doctrine Takfir wal-Hijra (5, 49, 50), was a key element in facilitating the radicalization process by bringing the other members together.

While the cell intended to carry out larger attacks using three vans loaded with explosives at neuralgic points with a high influx of people (8), it had to improvise after their operating base in the municipality of Alcanar (Tarragona) exploded, killing two members, including the recruiter and leader (8). Following this operational mistake, the group, without a clear figurehead, took the following actions: On August 17, 2017, faced with the impossibility of carrying out the original plan, decided to establish the city of Barcelona as its initial target. Once there, one of the members drove a vehicle into the well-known pedestrian street of Las Ramblas (one of the most crowded streets in the city) killing 14 and injuring a large number of people (8). During the escape, this same person killed a young man with a knife. The next day, in Cambrils, a town frequented by tourists in the summer, five members of the group drove a car into a seafront promenade, running over pedestrians. They then exited their vehicle and attacked pedestrians with bladed weapons acquired hours earlier in a bazaar. One person was killed and several others injured before the terrorists were shot by police (8).

According to the testimony of citizens in Ripoll, the perpetrators were “apparently integrated” young people (6), meaning they were perceived to have access to good schools and jobs, participated in their communities, spoke the local language, and except one of them, had no previous criminal records. The alleged recruiter, had established contact with these young individuals in 2015, 1 year before the attacks, when he served as an imam in a local mosque in Ripoll. According to the legal resources consulted (51, 52), although the mosque was the place where he initially contacted the youth, the subsequent meetings were held in the recruits' homes. It was during these meetings where Es Satty acted as the primary radicalizing agent and guided them toward an exclusionary and belligerent view of Islam that facilitated the legitimization of violence.

Materials

To test our research questions, we compiled public official documents relative to the 17-A attacks in Barcelona and Cambrils. The first document used was the Summary Judicial Prosecution Order No. 5/2018 (51), dated October 10, 2018, of the Central Court of Instruction Number 4 of the Spanish National Court. This 43-page document was written by Most Illustrious Fernando Andreu Merelles, Magistrate-Central Examining Judge Number 4 of the National Court, based in Madrid, Spain. The document is open source and subject to the judge's interpretation of the evidence gathered during the investigation. The second document is the police proceedings number 680566/17 (52) relative to “Operation Ramblas” led by the Mossos d'Esquadra (CME) police force on December 10, 2018. This document consists of 101 pages and was co-written by the police instructor with Professional Identification Card number 8261, and the police secretary with Professional Identification Card number 7603. Both documents are open source and subject to interpretation, but the systematic procedures of the system help improve the impartiality of these data sources.

Analytical Procedure

To analyze the compiled documents and search for evidence of psychological manipulation, we used a deductive method of content analysis (53), which made it possible to identify the frequency of appearance of different strategies and techniques. To this end, an information gathering instrument was designed, based on the CPI model developed by Cuevas (40).

The CPI is a semi-structured interview instrument for the evaluation of psychological manipulation of groups and cults. The interview script incorporates 66 questions that seek to identify the presence of 17 manipulation techniques categorized in four groups of manipulation strategies: environmental, emotional, cognitive, and dissociative. In Spain, the CPI has been applied in forensic processes related to victimization of abusive groups (40). To adapt it for our analysis of the 17-A cell, all questions included in the CPI were reviewed by two experts from the research team, eliminating those that were cult-specific and adjusting others to the terrorism context. Using this approach, we were left with 14 manipulation techniques clustered in four groups: strategies of environmental control, emotional control, cognitive control, and inducing dissociative states (see Table 1). For the coding of the data, a record sheet was designed to list the indicators found, the page number where it was detected, and the total number of locations of that indicator.

TABLE 1
www.frontiersin.org

Table 1. Strategies, techniques, definitions, and indicators of psychological manipulation adapted from the CPI.

Using this tool, a trained coder evaluated the material. The minimum coding unit was one sentence. If the same topic was expressed in more than one sentence, the entire coherent segment was marked with the corresponding indicator. Similarly, when the code indicator was coded in different segments of the text of a single page, the segments were considered as different codes of the same indicator. Moreover, the indicators were not exclusive, thus, a single coding unit could have two or more indicators assigned. Subsequently, another coder reviewed all the extracts to determine whether they corresponded to the assigned indicators. When this second coder disagreed with the assigned indicator, the discrepancies were discussed with the first coder until agreement was reached. Finally, we calculated the frequencies and percentages of appearance of each of the variables according to the sum of the coded indicators.

Results

The results summarized in Figure 1 refer to the frequency of appearance for each technique of psychological manipulation found in the Summary Judicial Prosecution Order No. 5/2018 (51) and police proceedings number 680566/17 of the CME (52). Next, we present the combined results derived from both documents.

FIGURE 1
www.frontiersin.org

Figure 1. Evidence of psychological manipulation (strategies and techniques) in the 17A cell.

These results suggest that different psychological manipulation strategies and techniques were applied, facilitating the recruitment, indoctrination, and legitimation of violence by the young people who were part of the 17-A cell. The most frequently used manipulation strategies were those included in the cognitive control strategies (66%). Among them, the techniques control of attention (28%), group identification (12%), and denigration of critical thinking (13%) were the most prominent. The second group of strategies that appeared most frequently was that of environmental control (19%), with the technique control of information (14%) standing out. The third group in order of frequency was emotional control strategies (14%), with the authoritarian leadership technique being the most prominent (10%). Finally, the fourth strategy, corresponding to the induction of dissociative states (such as use of drugs, chanting, and meditation) had a low frequency in the data sources (1%) and is not elaborated here.

Cognitive control strategies were present through attention control techniques, techniques of group identification, and techniques of denigration of critical thinking. Regarding attention control, the leader used planned group activities to encourage commitment to and attainment of the group's goals, which gave the recruits a sense of purpose—a feeling of achievement, competence, and meaning (heroes, martyrs). These activities were logistical, spiritual, and related to the consumption of propaganda (51, 52).

The logistical activities encouraged the involvement of young people, which in turn encouraged pro-group behavior (54, 55). Some examples were finding information on the internet on how to manufacture explosives, and indoctrination meetings. For examples, the documents state: “In May and June 2017, Abdelbaki ES SATTY began to prepare the rest of the members of the group to commit the terrorist act by using the explosives they were preparing, telling them they would be martyrs” (A5, p17). Reports from indoctrination meetings are also explicit:

During these last months (before the attacks) the group would meet more assiduously, approximately two or three times a week in Ripoll (Girona) mainly in the street or in the mosque. The subjects that they approached in these meetings would be centered in speaking about the objectives of the attacks and about the use of explosives, atrocities and knives, justifying such acts since, according to what the imam Abdelbaki ES SATTY would have told them, to make this type of act was to be part of the Islam (A9, p17).

As for spiritual activities, these were realized through increased prayer and mosque attendance. The leader brought them closer to the faith (Islam) and their Muslim identity and therefore, to remember what they should and should not do (like avoiding Western behaviors, such as drinking or going to discotheques). For example, as one document noted: “Younes ABOUYAAQOUB, Youssef AALLA and Mohamed HICHAMY three years ago already started to modify their behavior as they stopped going out in groups and meeting to play soccer and stopped maintaining the close relationships they had maintained years before. The declarant himself related this to the frequency of attendance at the mosque” (D10, p11).

Regarding the consumption of propaganda, activities were carried out that included a massive consumption of jihadist materials that legitimized violence and self-sacrifice. As one document put it: “The content found in several of the electronic terminals of those investigated also reflects a profuse consumption of jihadist videos, predominantly DAESH productions, as well as the continuous listening of anasheeds that extol and encourage to achieve the goodness of the jihadist imaginary through martyrdom” (D1, p6).

For the group identification techniques, the coded data indicated that the leader managed to merge members' “personal self” with the “group self,” which promoted a feeling of belongingness that compensated for the conflict of identity and restored the meaning of individuality. This included: “The life of each one of them developed exclusively together with that of their cellmates, sharing housing, meals, trips and, therefore, participating in the necessary acts to carry out an attack against those considered “their enemies,” that is, the Western world” (D1, p10). The establishment of this exclusiveness model among the members fostered, on the one hand, relative distancing (from relatives and friends) and the progressive abandonment of previous routines, and, on the other hand, strengthened the ideas and beliefs of the group (shared values and norms), which increased their willingness to sacrifice themselves and participate in violence in the name of the group. With the latter dynamics, the leader activated the disposition of the members to fight for those shared values and beliefs that they considered sacred and non-negotiable, as denoted in the following observation:

The members of the cell present themselves as chosen by Allah, chosen among thousands of Muslims […] to defend Islam, using violence. In this period of time, they dispose of the necessary means to commit the attacks and they finalize the identification of the targets to perpetrate them looking for the maximum injurious capacity, understanding the jihad as an obligation and the murder as a norm (D8, p74).

Using denigration of critical thinking techniques, the leader motivated members toward extremist ideas using a bias view of the Holy Scriptures. For example: “Mohamed HICHAMY, Younes ABOUYAAQOUB and Youssef AALLA went to the imam's house after prayers and justified the use of violence in the name of Islam” (D23, p3). The frequent and prolonged exposure to violent radical material (such as Islamic State jihadist propaganda) was also used: “The massive and shared consumption of jihadist propaganda, mostly published by the production companies of the terrorist organization Islamic State-DAESH, has led to the rapid indoctrination of the youngest” (D1, p96). This established a unique and exclusive group thinking (56) based on the political-religious ideology that strengthened and validated the internal postulates of the group. The recruiter also used audio techniques, such as anasheed (chants) and audiovisual material from sheikhs within the Islamic State terrorist group, which could have contributed to the annulment of members' critical thinking, furthering an embrace of group dogma at the expense of autonomic thinking: The constant and repetitive listening of anasheeds inciting to martyrdom got the members of the local cell into a state of mind favorable to the sacrifice of their lives (D96, p1).

The second-most prevalent manipulation strategies, environmental controls, were detected through information control techniques (51, 52). Although the leader established some restrictions on the instruments used for group training and communication (computers, tablets, mobile), such control was not absolute since all the members had smartphones and other electronic devices with access to the internet. In this way, although the leader did not limit the access to information sources, he did guide and manipulate them toward the alternatives he wanted them to access, which may have played a role in reducing their critical thinking and inducing a greater need for cognitive closure. For example: “Youssef AALLA, Younes ABOUYAAQOUB and Mohamed HICHAMY would do everything that the imam Abdelbaki ES SATTY told them, who would provide them with the propaganda material of the terrorist organization DAESH on a tablet that they would pass to each other, which contained jihadist videos, among other contents” (A10, p4). The fact that the leader offered clear and simple answers to members' questions of doubt (57) could have favored the restoration of personal meaning as observed in this example: “In this last phase, the members of the cell are fully determined to perpetrate them [the attacks], under the auspices of the legitimacy granted by the figure of their emir or spiritual leader, the one exercised by Abdelbaki ES SATTY, impregnating the concept of martyrdom by Islam” (D4, p74). The leader's actions also prevented the appearance of discrepancies on the decisions taken by the group regarding logistical planning, as is observed in the following quote:

Driss OUKABIR's hesitation is argued for not making the logistical arrangements and not for making them against his will. Moussa OUKABIR answers him that this is “Shaitan (devil)” and tries to give courage to his brother for justifying the violent [extremist] actions of believers in Islam against apostates in the name of God, transmitting courage and condemning the one who runs away from this duty. “Read Anfal. Listen to me. That is the truth” (D10, p7).

Analysis of the documents suggested that the members of the cell were indoctrinated and radicalized in ideological precepts compatible with those of the group Jamaatu At Takfir wal-Hijra (5, 49, 50). The doctrine of this group is usually associated with three principles: (1) the obligation to fight against all those who do not submit to Islam, (2) migrating or isolating from the ignorant or ungodly in society, and (3) the Taqiyya (58). Taqiyya corresponds to the act of concealing or hiding one's beliefs when under threat, persecution, or coercion, or when these behaviors and activities serve the pursuit of group ideology and goals (e.g., jihad). Therefore, the application of this strategy by terrorist groups could allow them to carry out criminal acts that would be prohibited in Islam in order to finance their fight against the infidels, in which the end justifies the means (49, 59, 60). Based on the analyzed data, the Taqiyya doctrine may have been applied in the 17-A cell, allowing its members to fulfill their obligations as non-Muslims (5, 50). For example, in the cell, the youth carried out activities forbidden in Islam, such as squatting in houses (gasb in Arabic) to remain undetectable (sura Al-Baqarah): “The group decided to occupy a house in Gombrèn (Girona) where they would hold their meetings” (A20, p5). Somehow, this made it easier for them to adopt behaviors that would be forbidden without restraining themselves from certain previous habits, such as drinking alcohol, smoking, dressing in Western fashion, not having a beard, having sexual intercourse with Western women, using drugs, and skipping the mandatory prayers (5, 49, 50).

The third-most common manipulation strategies, emotional control, were detected through authoritarian leadership techniques. The leader set the goals and the means to attain them. With a spiritual role, the leader managed to guide group members in a biased view of their shared belief (religion). The vast knowledge of the leader in religious matters, and the youths' need for self-determination, made it easy to present his word as dogma and his presence as divine.

It is important to highlight that the leader did not create a narrative; that is, he did not generate ideas of his own. Rather, based his discourse on a distorted view of the Holy Scriptures, on which he applied a system of reflective logic to justify and exploit the vulnerabilities of the cell members. Thus, the leader controlled the interactions between and with group members, as evidenced by this observation: “Abdelbaki ES SATTY, adopting the security measures in telephone communications described in the chronology of the day 09/08/17, tried to communicate from his conspiratorial telephone […] with the personal telephone and the conspiratorial telephone of Younes ABOUYAAQOUB as well as with the personal telephone of Youssef AALLA” (D18, p50). He was also seen as a higher or divine authority with unique knowledge and wisdom: “Mohamed HOULI CHEMLAL ratifies the group relationship between the investigated and Abdelbaki ES SATTY, giving him the role of leader or emir” (D1, p23). And he demonstrated behaviors of submission and obedience within the group that favored ingroup cohesion: “The leader also established the goals to be achieved and the means to achieve them: the cell had its “Emir,” or leader, a figure given to Abdelbaki ESSATTY, who indoctrinated them in violence and convinced them to carry out a terrorist action” (D26, p95).

Nonetheless, despite the leader's intellectual role, the group adopted a network structure through collaborative participation without restrictions. Among the cell members, an information flow was established, which acted as a distributed network where the hierarchy was flattened and there was free connection between the members and the world outside the group. This can be seen in the witness statement made by someone close to two of the members of the cell, in which the declarant states that “the last time he saw Moussa OUKABIR and Said AALLA were on the sport facilities 4 days before the attacks” (D5, p14). Given that there were four pairs of siblings among the members of the cell, the leader also used these family and friendship relational structures to guarantee control, submission, and secrecy. This could be facilitated because the members shared similar circumstances, the same origin, and common values (religion), as can be observed in the following quote: “All of them had known each other since they were children, having grown up and become friends as they were all neighbors of Ripoll” (A26, p3).

Finally, there are two indicators included in the CPI instrument that were not found in the documents analyzed in this study: the use of drugs and the affective or sexual needs of group members. However, evidence of these indicators was found in other documentary sources (such as media reports) collected during the research process (61, 62). Thus, for the strategy to induce dissociative states, we found that the leader allowed the use of drugs as a facilitating element for behavioral, cognitive, and emotional inhibition/disinhibition toward the objectives of the group. This could enable certain members to maintain previous habits, contributing to their loyalty and group commitment. Likewise, for the emotional control strategy, the leader used recruitment maneuvers such as covering the affective or sexual needs of the youths by allowing them to go to brothels or to keep certain previous romantic relationships. Moreover, this may have minimized defection from the group by allowing activities that would help satisfy members' emotional needs.

Discussion and Conclusions

Although the group dynamics involved in radicalization constitute a broad field of study, aspects such as the use of psychological techniques of manipulation have received less attention. The aim of this study was to provide evidence for the top-down radicalization process that occurred in the 17-A cell and to document the type of psychological manipulation techniques that were used to radicalize its members.

Our results indicate that several manipulation techniques were used on cell members by its leader. The most frequent strategies were cognitive control (control of attention, group identification, denigration of critical thinking), environmental control (control of information), and emotional control (authoritarian leadership). The results reveal the hierarchical use of manipulative strategies to facilitate recruitment, indoctrinate, and enable violence, persuasive techniques that were used to undermine youth's volitional capacity. Nonetheless, these techniques were also used by other members of the cell who came to reproduce the leader's model.

These psychological manipulation methods in turn could help the leader to attract, induce, and control group members. Of note, we identified that the use of these techniques was premediated (5, 24). Our results indicate that the psychological manipulation techniques were subtle and progressively played a role in convincing members of the cell that ideological violence was absolutely necessary to attain their goals.

These results are in line with various theories positing that social networks play an important role in the radicalization process leading to terrorism (24, 63). Particularly, these results provide some evidence for the psychosocial model of recruitment and violent mobilization (19, 20, 23). The evidence suggests that terrorist groups use psychological manipulation techniques to radicalize young people by creating psychological submission, political-religious indoctrination, and violent disinhibition. Moreover, the results of this study have theoretical implications, such as the adaptation of the manipulative dynamics by the recruiters to the social context and needs of young people. This involves focusing manipulation strategies on empathic and emotional aspects—such as making the individual feel identified, understood, and valued. At the same time, the more that coercive and abusive aspects are eliminated, the greater the chance of establishing an imperceptible and gradual persuasion without the involvement of violence or power.

This research has a number of potential practical implications. In particular, the results highlight the importance of paying attention to young people because they are a vulnerable target population for violent radicalization. Some common characteristics of the youth, such as the experience of extreme emotions, their sensitivity to threats, and their commitment with violence (3), potentially make them more vulnerable to these psychological manipulation strategies.

Despite adhering to rigorous research guidelines, this study has some limitations that may affect the interpretation of the results. First, this case study was only intended to describe the use of these techniques. Future studies should focus on the psychological effects of these techniques and how they facilitate the use of violence. Second, to facilitate the search for manipulation techniques, the interview designed by Cuevas (40) was adapted, marking the first time the instrument was used in this way. Future studies should be tested against other data sources and on other cases of group radicalization. Third, the sources used were secondary. Due to the death of most members of the cell, the only reliable information available is found in police reports. Thus, future studies should focus on other groups made up of young people, in which first-hand information can be obtained to confirm if techniques like those found in this research are used extensively.

Taken together, this study highlights the presence of psychological manipulation techniques (40) in the process of radicalization of the young members of the 17-A cell. Among these techniques, those aimed at controlling cognitions, environment, and emotions seem to be the most frequently used techniques and the most useful in generating group cohesion and disinhibiting ideological violence. Thus, we emphasized the need for comprehensive programs to prevent violent extremism among the youth. Therefore, it is crucial to provide young people with protective factors, such as self-control, empathy, education, employment, and basic attachment to society (64). In brief, there is a great need for governments and organizations that work with young people to be active where radicalization agents may be present. Any space of influence in which the system, the institutions, or adults are not proactively present can be a fertile ground for terrorist recruitment (65).

Data Availability Statement

The original contributions presented in this study are available and can be requested from the corresponding authors.

Author Contributions

IG and MM: conceptualization, investigation, methodology, formal analysis, writing—original draft, and writing—review and editing. RL and HT: methodology, formal analysis, and writing—review and editing. All authors contributed to the article and approved the submitted version.

Funding

This work was funded by Centro Mixto UGR-MADOC (18/16 CEMIX UGR-MADOC), MCIN/AEI/10.13039/501100011033/ and European Union “NextGenerationEU”/PRTR under Grant PID2020-116646RB-I00.

Conflict of Interest

The authors declare that the research was conducted in the absence of any commercial or financial relationships that could be construed as a potential conflict of interest.

Publisher's Note

All claims expressed in this article are solely those of the authors and do not necessarily represent those of their affiliated organizations, or those of the publisher, the editors and the reviewers. Any product that may be evaluated in this article, or claim that may be made by its manufacturer, is not guaranteed or endorsed by the publisher.

References

1. Europol. European Union Terrorism Situation and Trend Report 2020 (TE-SAT). (2020). Available online at: https://www.europol.europa.eu/activities-services/main-reports/european-union-terrorism-situation-and-trend-report-te-sat-2020 (accessed July 27, 2021).

2. Hegghammer T. The recruiter's dilemma: Signalling and rebel recruitment tactics. J Peace Res. (2013) 50:3–16. doi: 10.1177/0022343312452287

CrossRef Full Text | Google Scholar

3. Adam-Troian J, Tecmen A, Kaya A. Youth extremism as a response to global threats?: a threat-regulation perspective on violent extremism among the youth. Eur Psychol. (2021) 26:15–28. doi: 10.1027/1016-9040/a000415

CrossRef Full Text | Google Scholar

4. Larson RW, Moneta G, Richards MH, Wilson S. Continuity, stability, and change in daily emotional experience across adolescence. Child Dev. (2002) 73:1151–65. doi: 10.1111/1467-8624.00464

PubMed Abstract | CrossRef Full Text | Google Scholar

5. Trujillo HM, Alonso F, Cuevas JM, Moyano M. Evidencias empíricas de manipulación y abuso psicológico en el proceso de adoctrinamiento y radicalización yihadista inducida [Empirical evidence of manipulation and psychological abuse in the indoctrination and induced radicalization of jihadists]. Rev Estud Soc. (2018) 6:42–54. doi: 10.7440/res66.2018.05

CrossRef Full Text | Google Scholar

6. Bourekba M. Atentados de Barcelona: Reacciones, explicaciones y debates pendientes [Barcelona attacks: Reactions, Explanations Pending Debates]. Barcelona Centre for International Affairs (2018). Available online at: https://www.cidob.org/es/publicaciones/serie_de_publicacion/cidob_report/cidob_report/atentados_de_barcelona_reacciones_explicaciones_y_debates_pendientes (accessed July 27, 2021).

7. Reinares F, García-Calvo C. Marroquíes y segundas generaciones entre los yihadistas en España [Moroccans Second Generations Among Jihadists in Spain]. Real Instituto Elcano (2018). Available online at: http://www.realinstitutoelcano.org/wps/portal/rielcano_es/contenido?WCM_GLOBAL_CONTEXT=/elcano/elcano_es/zonas_es/terrorismo+internacional/ari61-2018-reinares-garciacalvo-marroquies-segundas-generaciones (accessed July 27, 2021).

Google Scholar

8. Igualada C. International links and the role of the islamic state in the Barcelona and Cambrils attacks in 2017. Perspect Terror. (2021) 15:65–75.

Google Scholar

9. Horgan J. Walking Away From Terrorism: Accounts of Disengagement From Radical and Extremist Movements. New York, NY: Routledge. (2009).

Google Scholar

10. Horgan J. From profiles to pathways and roots to routes: Perspectives from psychology on radicalization into terrorism. Ann Am Acad Pol Soc Sc. (2008) 618:80–94. doi: 10.1177/0002716208317539

CrossRef Full Text | Google Scholar

11. Smith LGE, Blackwood L, Thomas EF. The need to refocus on the group as the site of radicalization. Perspect Psychol Sci. (2020) 15:327–52. doi: 10.1177/1745691619885870

PubMed Abstract | CrossRef Full Text | Google Scholar

12. Sageman M. Turning to Political Violence: The Emergence of Terrorism. Philadelphia: University of Pennsylvania Press (2017).

Google Scholar

13. Turner JC, Hogg MA, Oakes PJ, Reicher SD, Wetherell MS. Rediscovering the Social Group: A Self-Categorization Theory. Oxford, UK: Basil Blackwell (1987).

PubMed Abstract | Google Scholar

14. Bélanger JJ, Robbins BG, Muhammad H, Moyano M, Nisa CF, Schumpe BM, et al. Supporting political violence: the role of ideological passion and social network. Gr Process Intergr Relations. (2020) 23:1187–203. doi: 10.1177/1368430220933954

CrossRef Full Text | Google Scholar

15. Vicente Á. Vínculos sociales y terrorismo yihadista: ¿Qué conduce de la radicalización violenta a la implicación terrorista? [Social Links Jihadist Terrorism: What Leads From Violent Radicalization to Terrorist Involvement?]. Real Instituto Elcano (2021). Available online at: http://www.realinstitutoelcano.org/wps/portal/rielcano_es/contenido?WCM_GLOBAL_CONTEXT=/elcano/elcano_es/zonas_es/ari39-2021-vicente-vinculos-sociales-y-terrorismo-yihadista-que-conduce-de-radicalizacion-violenta-a-implicacion-terrorista (accessed July 27, 2021).

Google Scholar

16. Bloom M. Constructing expertise: Terrorist recruitment and “talent spotting” in the PIRA, Al Qaeda, and ISIS. Stud Confl Terror. (2017) 40:603–23. doi: 10.1080/1057610X.2016.1237219

CrossRef Full Text | Google Scholar

17. Joosse P, Bucerius SM, Thompson SK. Narratives and counternarratives: Somali-Canadians on recruitment as foreign fighters to al-shabaab. Br J Criminol. (2015) 55:811–32. doi: 10.1093/bjc/azu103

CrossRef Full Text | Google Scholar

18. Neumann P. Recruitment Mobilization for the Islamist Militant Movement in Europe. (2007). Available online at: https://icsr.info/wp-content/uploads/2008/10/1234516791ICSREUResearchReport_Proof1.pdf (accessed July 27, 2021)

Google Scholar

19. Trujillo HM, Lobato RM, Moyano M. El reclutamiento yihadista. Claves psicosociales para su comprensión y prevención [Jihadist recruitment. Psychosocial keys to its understanding and prevention]. In: Gómez Á, Vázquez A, editors. Extremismo, Radicalización Violenta y Terrorismo. Madrid: Sanz y Torres (2020). p. 105–128.

20. Trujillo HM, Moyano M. Towards the study and prevention of the recruitment of jihadists in Europe: a comprehensive psychosocial proposal. In: Marrero I, Trujillo HM, editors. Jihadism, Foreign Fighters and Radicalisation in the European Union: Legal, Functional and Psychosocial Responses. London: Routledge (2020). p. 211–230.

21. McGilloway A, Ghosh P, Bhui K. A systematic review of pathways to and processes associated with radicalization and extremism amongst Muslims in Western societies. Int Rev Psychiatry. (2015) 27:39–50. doi: 10.3109/09540261.2014.992008

PubMed Abstract | CrossRef Full Text | Google Scholar

22. Jensen MA, Seate AA, James PA. Radicalization to violence: a pathway approach to studying extremism. Terror Polit Violence. (2018) 32:1067–90. doi: 10.1080/09546553.2018.1442330

CrossRef Full Text | Google Scholar

23. Trujillo HM. Procesos de radicalización off-line [Off-line radicalisation processes]. In: Bermejo R, Bazaga I, editors. Radicalización Violenta en España: Detección, Gestión y Respuesta. Valencia: Tirant lo Blanch (2019). p. 92–108.

Google Scholar

24. Trujillo HM, Ramírez JJ, Alonso F. Indicios de persuasión coercitiva en el adoctrinamiento de terroristas yihadistas: hacia la radicalización violenta [Evidences of persuasion coercive for indoctrination of jihadists terrorists: towards violent radicalization]. Univ Psychol. (2009) 8:721–36.

Google Scholar

25. Dole AA. Are terrorists cultists? Cultic Stud Rev. (2006) 5:1–21.

Google Scholar

26. Vicente Á. Fórmulas utilizadas para la radicalización y el reclutamiento yihadista de menores en España [Formulas Used for the Radicalization Jihadist Recruitment of Minors in Spain]. Real Instituto Elcano (2018). Available online at: http://www.realinstitutoelcano.org/wps/portal/rielcano_es/contenido?WCM_GLOBAL_CONTEXT=/elcano/elcano_es/zonas_es/terrorismo+internacional/ari76-2018-vicente-formulas-utilizadas-radicalizacion-reclutamiento-menores-espana (accessed July 27, 2021).

Google Scholar

27. Bélanger JJ. The rise and fall of violent extremism: the science behind community-based interventions. In: Kopetz CE, Fishbach A, editors. The Motivation-Cognition Interface: From the Lab to the Real World: A Festschrift in Honor of Arie W. Kruglanski. New York, NY: Routledge (2018). p. 170–195.

Google Scholar

28. Moyano M, Trujillo HM. Radicalización islamista y terrorismo: Claves psicosociales [Islamist Radicalisation and Terrorism psychosocial Keys]. Granada: Universidad de Granada (2013).

Google Scholar

29. Wolfowicz M, Litmanovitz Y, Weisburd D, Hasisi B. Cognitive and behavioral radicalization: a systematic review of the putative risk and protective factors. Campbell Syst Rev. (2021) 17:e1174. doi: 10.1002/cl2.1174

CrossRef Full Text | Google Scholar

30. Campelo N, Oppetit A, Neau F, Cohen D, Bronsard G. Who are the European youths willing to engage in radicalisation? A multidisciplinary review of their psychological and social profiles. Eur Psychiatry. (2018) 52:1–14. doi: 10.1016/j.eurpsy.2018.03.001

PubMed Abstract | CrossRef Full Text | Google Scholar

31. Silvers JA, McRae K, Gabrieli JDE, Gross JJ, Remy KA, Ochsner KN. Age-related differences in emotional reactivity, regulation, and rejection sensitivity in adolescence. Emotion. (2012) 12:1235–47. doi: 10.1037/a0028297

PubMed Abstract | CrossRef Full Text | Google Scholar

32. Sebastian C, Viding E, Williams KD, Blakemore SJ. Social brain development and the affective consequences of ostracism in adolescence. Brain Cogn. (2010) 72:134–45. doi: 10.1016/j.bandc.2009.06.008

PubMed Abstract | CrossRef Full Text | Google Scholar

33. Blakemore SJ. Avoiding social risk in adolescence. Curr Dir Psychol Sci. (2018) 27:116–22. doi: 10.1177/0963721417738144

CrossRef Full Text | Google Scholar

34. Heinke DH, Mareike P. Youth specific factors in radicalization. Cent Excell Def Against Terror. (2016) 1375:53–66.

Google Scholar

35. Leather NC. Risk-taking behaviour in adolescence: a literature review. J Child Heal Care. (2009) 13:295–304. doi: 10.1177/1367493509337443

PubMed Abstract | CrossRef Full Text | Google Scholar

36. Malti T, Averdijk M. Severe youth violence: developmental perspectives introduction to the special section. Child Dev. (2017) 88:5–15. doi: 10.1111/cdev.12694

PubMed Abstract | CrossRef Full Text | Google Scholar

37. Buss DM, Shackelford TK. Human aggression in evolutionary psychological perspective. Clin Psychol Rev. (1997) 17:605–19. doi: 10.1016/S0272-7358(97)00037-8

PubMed Abstract | CrossRef Full Text | Google Scholar

38. Euer K, Van Vossole A, Groenen A, van Bouchaute K. Strengthening Resilience Against Violent Radicalization (STRESAVIORA). Thomas More Hogeschool (2014). Available at: https://www.bounce-resilience-tools.eu/sites/default/files/downloads/2018-03/STRESAVIORA Research Report part 1- Literature Analysis %28EN%29.pdf (accessed July 27, 2021)

39. Schmid AP. Radicalisation, De-Radicalisation, Counter-Radicalisation: A Conceptual Discussion Literature Review. International Centre for Counter-Terrorism – The Hague (2013). Available at: http://www.icct.nl/download/file/ICCT-Schmid-Radicalisation-De-Radicalisation-Counter-Radicalisatin-March-2013.pdf (accessed July 27, 2021)

Google Scholar

40. Cuevas JM. Evaluación de persuasión coercitiva en contextos grupales [Evaluation of Coercive Persuasion in Group Contexts]. Málaga: Universidad de Málaga (2016).

41. Hassan S. Combating Cult Mind Control: The Best-Selling Guide to Protection, Rescue, and Recovery From Destructive Cults. Newton: Park Street Press (2015).

Google Scholar

42. Rodríguez-Carballeira Á, Martín-Peña J, Almendros C, Escartín J, Porrúa C, Bertacco M. Un análisis psicosocial del grupo terrorista como secta [A social psychological analysis of the terrorist group as a cult]. Rev Psicol Soc. (2014) 24:183–95. doi: 10.1174/021347409788041435

CrossRef Full Text | Google Scholar

43. Bardavio C. Coercive persuasion as a specific type of violence in criminal law. Int J Coerc Abus Manip. (2020) 1:61–72. doi: 10.54208/ooo1/1004

CrossRef Full Text

44. Cuevas JM, Canto Ortiz JM. Sectas: Cómo funcionan, cómo son sus líderes, efectos destructivos y cómo combatirlas [Cults: How They Work, What Their Leaders are like, Destructive Effects and how to Combat Them]. Málaga: Aljibe (2006).

45. Lifton RJ. Through Reform and the Psychology of Totalism: A study of “Brainwashing” in China. Nueva York, NY: WW Norton & Co (1961).

Google Scholar

46. Singer MT, Lalich J. Las sectas entre nosotros [Cults in Our Midst]. Barcelona: Gedisa (1997).

47. Castaño A, Bélanger JJ, Moyano M. Cult conversion from the perspective of families: Implications for prevention and psychosocial intervention. Psycholog Relig Spiritual. (2021). doi: 10.1037/rel0000410

CrossRef Full Text | Google Scholar

48. Reinares F, García-Calvo C. Un análisis de los atentados terroristas en Barcelona y Cambrils [An Analysis of the Terrorist Attacks in Barcelona Cambrils]. Real Instituto Elcano (2018). Available online at: http://www.realinstitutoelcano.org/wps/wcm/connect/f103751f-aa09-46d7-8818-075769a298ff/ARI12-2018-Reinares-GarciaCalvo-analisis-atentados-terroristas-Barcelona-Cambrils.pdf?MOD=AJPERES&CACHEID=f103751f-aa09-46d7-8818-075769a298ff (accessed July 27, 2021).

Google Scholar

49. Ventura ÓP. Takfir wal-Hijra, entre la doctrina radical y el terrorismo yihadista [Takfir wal-Hijra, between radical doctrine and jihadist terrorism]. Doc Opinión IEEE. (2013) 3:1–28.

Google Scholar

50. Irujo JM. El imán aleccionó a los terroristas en la corriente más clandestina del salafismo [The Imam Taught Terrorists in the Most Clandestine Stream of Salafism]. El País (2017). Available online at: https://elpais.com/politica/2017/08/24/actualidad/1503585337_048149.html (accessed July 27, 2021)

51. Audiencia Nacional. Auto de procesamiento: Sumario No 5/2018. Administración de Justicia (2018). Available online at: https://e00-elmundo.uecdn.es/documentos/2018/10/09/auto_atentados.pdf (accessed July 27, 2021)

Google Scholar

52. Mossos d'Esquadra. Diligencias policiales número 680566/2017. Comissaria Superior de Coordinació Central (2018). Available online at: https://es.scribd.com/document/420373419/Informe-18-12-18#download&from_embed (accessed July 27, 2021)

53. Elo S, Kyngäs H. The qualitative content analysis process. J Adv Nurs. (2008) 62:107–15. doi: 10.1111/j.1365-2648.2007.04569.x

PubMed Abstract | CrossRef Full Text | Google Scholar

54. Gómez Á, López-Rodríguez L, Vázquez A, Paredes B, Martínez M. Dying and killing for a group or for values: strategies to avoid, reduce, and/or eradicate extremist group behavior. Anu Psicol Juridica. (2016) 26:122–9. doi: 10.1016/j.apj.2016.04.001

CrossRef Full Text | Google Scholar

55. Lobato RM. En busca de los extremos: Tres modelos para comprender la radicalización [The pursuit of extremes: three models to understand radicalization]. Rev Estud en Segur Int. (2019) 5:113–32. doi: 10.18847/1.10.7

CrossRef Full Text | Google Scholar

56. Janis I. Groupthink In: Griffin E, editor. A first Look Communication Theory. New York, NY: McGrawHill (1991). p. 235–46.

Google Scholar

57. Webber D, Babush M, Schori-Eyal N, Vazeou-Nieuwenhuis A, Hettiarachchi M, Bélanger JJ, et al. The road to extremism: field and experimental evidence that significance loss-induced need for closure fosters radicalization. J Pers Soc Psychol. (2018) 114:270–85. doi: 10.1037/pspi0000111

PubMed Abstract | CrossRef Full Text | Google Scholar

58. Fuente I. El Fenómeno Yihadista en marruecos: desde sus orígenes hasta los atentados de Casablanca de 2003 [The Jihadist Phenomenon in Morocco: From its Origins to the Casablanca Bombings of 2003]. Instituto Español de Estudios Estratégicos (2016). Available online at: https://www.ieee.es/publicaciones-new/documentos-de-analisis/2016/DIEEEA38-2016.html

Google Scholar

59. Campbell A. “Taqiyya”: how Islamic extremists deceive the West. Nat Obs. (2005) 65:11–23.

Google Scholar

60. Yitzak Eduard. Taqiyya, mentir en el nombre de Alá [Taqiyya, Lying in Allah's Name]. Grupo de Estudios Estratégicos (2019). Available online at: http://www.gees.org/articulos/taqiyya-mentir-en-nombre-de-ali (accessed July 27, 2021).

61. Rendueles L, Lozano V. Los terroristas del 17-A acudían a locales de prostitución mientras preparaban los atentados [The 17-A Terrorists Went to Prostitution Establishments While They Were Preparing the Attacks]. Diario de León (2018). Available online at: https://www.diariodeleon.es/articulo/espana/terroristas-17-acudian-locales-prostitucion-mientras-preparaban-atentados/201808152004201787712.html (accessed July 27, 2021).

62. García M. Cocaína, alcohol, casinos, violaciones… La vida disoluta de los terroristas del 17-A [Cocaine, Alcohol, Casinos, Rape… The Dissolute Life of the 17-A Terrorists]. El Confidencial (2018). Available from: https://www.elconfidencial.com/espana/2018-08-08/cocaina-alcohol-delincuencia-celula-yihad-ripoll_1602360/ (accessed July 27, 2021).

63. Moyano M. Factores psicosociales contribuyentes a la radicalización islamista de jóvenes en España: Construcción de un instrumento de evaluación. Granada: Universidad de Granada (2010).

64. Lösel F, King S, Bender D, Jugl I. Protective factors against extremism and violent radicalization: a systematic review of research. Int J Dev Sci. (2018) 12:89–102. doi: 10.3233/DEV-170241

CrossRef Full Text | Google Scholar

65. Moyano M, González I. Jóvenes y radicalización violenta: La encrucijada de la prevención [Youth and violent radicalization: the crossroads of prevention]. In: Pàmies Rovira J, Carrasco S, editors. Una aproximación a los procesos de radicalización y extremismo violento (PREDEIN). Bellaterra: Universitat Autònoma de Barcelona (2021). p. 36–41.

Google Scholar

Keywords: psychological manipulation, terrorism, violent extremism, recruitment, violent radicalization, 17-A cell

Citation: González I, Moyano M, Lobato RM and Trujillo HM (2022) Evidence of Psychological Manipulation in the Process of Violent Radicalization: An Investigation of the 17-A Cell. Front. Psychiatry 13:789051. doi: 10.3389/fpsyt.2022.789051

Received: 04 October 2021; Accepted: 21 January 2022;
Published: 23 February 2022.

Edited by:

Floris Vermeulen, University of Amsterdam, Netherlands

Reviewed by:

Rui Mateus Joaquim, Universidade Federal de Minas Gerais, Brazil
Adrian Cherney, The University of Queensland, Australia

Copyright © 2022 González, Moyano, Lobato and Trujillo. This is an open-access article distributed under the terms of the Creative Commons Attribution License (CC BY). The use, distribution or reproduction in other forums is permitted, provided the original author(s) and the copyright owner(s) are credited and that the original publication in this journal is cited, in accordance with accepted academic practice. No use, distribution or reproduction is permitted which does not comply with these terms.

*Correspondence: Irene González, aXJnb2ppbSYjeDAwMDQwO2dtYWlsLmNvbQ==; Manuel Moyano, bW1veWFubyYjeDAwMDQwO3Vjby5lcw==

Disclaimer: All claims expressed in this article are solely those of the authors and do not necessarily represent those of their affiliated organizations, or those of the publisher, the editors and the reviewers. Any product that may be evaluated in this article or claim that may be made by its manufacturer is not guaranteed or endorsed by the publisher.