IDEAS home Printed from https://ideas.repec.org/a/taf/uterxx/v38y2015i2p85-112.html
   My bibliography  Save this article

Disaggregating and Defeating Terrorist Safe Havens

Author

Listed:
  • Elizabeth Grimm Arsenault
  • Tricia Bacon

Abstract

Terrorist organizations’ physical safe havens continue to shape the terrorist threat to the United States by extending the groups’ longevity and increasing the threat they pose. As a result, eliminating terrorist safe havens has been a key component of U.S. counterterrorism policy since at least 2001. However, some scholars challenged the post-9/11 policy consensus that terrorists find sanctuary in weak states and so-called ungoverned spaces. This article seeks to bridge this gap between scholarship and policy by offering a typology for disaggregating different kinds of terrorist safe havens. Our typology operates on two axes based on host government will (i.e., the host government's posture toward each group with haven inside its borders), as well as government capability, (specifically whether the host government possesses the specific capabilities needed to oust each group). This intersection of will and capability produces three types of havens. We briefly illustrate each type of haven using the exemplar case study of Pakistan—a location often described as an overarching safe haven, but which is actually home to several sanctuaries—and offer policy recommendations for addressing them. A need exists to disaggregate and identify how the United States can approach haven elimination. This typology and the analysis that stems from it offer a starting point for devising such strategies.

Suggested Citation

Handle: RePEc:taf:uterxx:v:38:y:2015:i:2:p:85-112
DOI: 10.1080/1057610X.2014.977605
as

Download full text from publisher

File URL: http://hdl.handle.net/10.1080/1057610X.2014.977605
Download Restriction: Access to full text is restricted to subscribers.

File URL: https://libkey.io/10.1080/1057610X.2014.977605?utm_source=ideas
LibKey link: if access is restricted and if your library uses this service, LibKey will redirect you to where you can use your library subscription to access this item
---><---

As the access to this document is restricted, you may want to search for a different version of it.

More about this item

Statistics

Access and download statistics

Corrections

All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:taf:uterxx:v:38:y:2015:i:2:p:85-112. See general information about how to correct material in RePEc.

If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

We have no bibliographic references for this item. You can help adding them by using this form .

If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Chris Longhurst (email available below). General contact details of provider: http://www.tandfonline.com/uter20 .

Please note that corrections may take a couple of weeks to filter through the various RePEc services.

IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.