Jihadist Infiltration of Migrant Flows to Europe: Perpetrators, Modus Operandi and Policy Implications

This document was uploaded by one of our users. The uploader already confirmed that they had the permission to publish it. If you are author/publisher or own the copyright of this documents, please report to us by using this DMCA report form.

Simply click on the Download Book button.

Yes, Book downloads on Ebookily are 100% Free.

Sometimes the book is free on Amazon As well, so go ahead and hit "Search on Amazon"

This book explores one of the most topical and controversial issues of recent years –jihadist terrorist infiltration of irregular migrant flows to Europe. Utilizing robust sampling criteria, more than a hundred such cases are identified and rigorously assessed. The analysis reveals the characteristics of offenders, their travel patterns and operational activities, and critically evaluates subsequent law enforcement and judicial responses. The author draws upon interviews with a range of European security officials, as well as non-governmental organization employees, and a recent refugee, in order to provide a series of practical recommendations.

Author(s): Sam Mullins
Publisher: Palgrave Pivot
Year: 2019

Language: English
Pages: 188
City: Cham

Acknowledgements
Disclaimer
Contents
List of Figures
Chapter 1 Introduction
Abstract
Terminology
Methodology
Bibliography
Chapter 2 Jihadist Infiltration of Europe Since 2011: An Overview
Abstract
Scale of the Problem
Individual Classifications
Confidence Ratings
Status in the Asylum System
Geographic Distribution
Nationality of Terrorist Offenders
Demographic and Personal Characteristics
Bibliography
Chapter 3 Travel
Abstract
Migration Routes
Timing
Methods
Exfiltration
Bibliography
Chapter 4 Operational Activity and Connections
Abstract
Offender Typology
Connections to FTOs
Plots and Attacks
“Non-violent” Support Activities
Connections to Crime
Bibliography
Chapter 5 Investigations and Prosecutions
Abstract
Point of Detection
Sources of Investigation
Judicial Outcomes
Bibliography
Chapter 6 Counter-Terrorism
Abstract
Key Developments in CT
Challenges
Recommendations
Concluding Remarks
Bibliography
Appendix A: List of Cases Included in the Analysis
Appendix B: List of Notable Cases Excluded from the Analysis
Index