Tehrik-i-Taliban Pakistan: emerging threats and Pakistan's counterstrategies

Arif Ahmad*, Dalbir Ahlawat

*Corresponding author for this work

    Research output: Contribution to journalArticlepeer-review

    1 Citation (Scopus)

    Abstract

    Following the US withdrawal from Afghanistan in August 2021 and the subsequent takeover by the Taliban, the Tehrik-i-Taliban Pakistan (TTP) has intensified its efforts with a primary objective of establishing Sharia law in Pakistan. While posing a grave threat to the country’s security, the TTP has displayed a heightened level of organizational strength and has carried out lethal terrorist attacks on both military and civilians across the nation. To counter the strategic maneuvers of the TTP, Pakistan has followed a two-pronged approach of negotiations and military operations. However, these efforts have fallen short of countering the TTP threat effectively. The findings of this study suggest that Pakistan is likely to continue countering the TTP primarily through military operations. The primary objective of this article is to outline the factors contributing to the resurgence of the TTP and to assess the strategies implemented by Pakistan in response to this threat. This research utilizes qualitative research methods, involving the analysis of research articles, newspapers, reports, and statements from government officials. The paper recommends that to mitigate the challenges, Pakistan should address the root causes of terrorism, strengthen governance structures, engage in constructive dialogue with various stakeholders, and foster regional cooperation.

    Original languageEnglish
    Article number1
    Pages (from-to)221-230
    Number of pages10
    JournalMankind Quarterly
    Volume64
    Issue number2
    DOIs
    Publication statusPublished - 2023

    Keywords

    • Counterterrorism
    • Pakistan
    • Taliban
    • Tehrik-i-Taliban Pakistan

    Fingerprint

    Dive into the research topics of 'Tehrik-i-Taliban Pakistan: emerging threats and Pakistan's counterstrategies'. Together they form a unique fingerprint.

    Cite this