Sie sind auf Seite 1von 26

Why should a professional military engage with issues clustered under the label of Non-Traditional Security?

INTRODUCTION SecurityInsecurity is defined in relation to vulnerabilities both internal and external that threaten or have the potential to bring down or weaken state structures, both territorial and institutional, and governing regimes1

September 11 attacks, 2001; Severe Acute Respiratory Syndrome (SARs), 2003; Boxing Day Tsunami, 2004; Mumbai Terrorist attack, 2008; Global Financial Crisis, 2009.

Since the end of Cold War in 1991, the world has been confronted with new security challenges and have forced nation-state to view security with a new set of lens. Juxtapose that with the effects of globalisation, legitimate governments are finding the task of providing a secure environment for her people getting more and more complex.

Traditional/ Realist view of security has always been narrowed. It has always viewed security in geo-political terms, encompassing aspects such as deterrence, power balance and military strategy.2 It concerns itself with the preservation of a nation's territorial integrity against other state actors and against an foreign military force. It is the preservation of a state sovereignty through the prosecution of a full conflict war, and other than the traditional foreign policy, the primary state institution to maintain that state sovereignty is a legitimate, professional military. However, with war being a less likely scenario in our globalization world, and with Nation-States preferring to wield other elements of national power to further its

1 Mohammed Ayoob. (1995). The Third World Security Predicament: State Making, Regional Conflict and The International System. Lynne Rienner Publishers, Boulder, CO. 2 Andrew T.H. Tan, J.D. Kenneth Boutin, (2001), Non-Traditional Security in the Asia Pacific, The Dynamism of Securitisation, Selected Publishing, pp1.

political agenda, liberalist have lobbied for employment of the military, along with other state institution, to handle Non-Traditional Security (NTS) threats. Indeed, a legitimate, professional armed body these days are more often than not called upon to perform a multitude of operations, ranging from defence diplomacy, to maritime security, peace enforcement and peace keeping, combating terrorism, and humanitarian assistance disaster relief operations.

Due to the complexity in the emerging field of Non-Traditional Security, this paper will first (1) provide an understanding of the term Non-Traditional Security by examining the effects of globalisation to security, and by defining what traditional security is. This would be followed up by offering 6 major characteristics of NTS. (2) It will then look at a professional military in terms of its purpose and organisation, and the Clausewitzian view of the military's utility to the state. After having

understood what NTS is and the purpose of the military, (3) this paper will conclude by examining military's involvement in the NTS realm and provide further thoughts on the role of the military in negating NTS threats that confronts the world today.

While many literature opined that NTS are non-military concerns and requires a non-military response, this paper will draw linkages to illustrate that the military can, and should, and have a role to play in minimising the effects of NTS threats.

NON-TRADITIONAL SECURITY IN TODAY'S GLOBALISED WORLD Globalisation and Security Globalisation is a complex process, driven by a mixture of political and economical influences. It is changing everyday life, particularly in the developed countries, at the same time, as it is creating new transnational system and forces. It is more than just the back drop to contemporary policies: taken as a whole, globalisation is transforming the institutions of these societies in which we live in3

Up till the end of Cold War, security has always been addressed in the tradition sense. However, with the collapse of the Soviet Union, globalisation has witnessed unprecedented rise and have brought the world meteoric economic progress and affluence. Globalisation has also created an nexus of shared interest between states, societies, and individuals, and have increased international economic liberalization, trade and financial flows4.

Globalization has made the world interconnected. To this end, globalisation has made inter-state wars a less likely scenario. But that does not mean

globalisation has eliminated the possibility of an inter-state war. It just means that disincentives for waging war has emerged.5 It has created a poisonous shrimp6 syndrome where it would be a high price to pay, not just in military terms, for the adversarial military and country to wield military actions against another country.

3 Anthony Giddens, (1998), The Third Way: The Renewal of Social Democracy, Cambridge: Polity Press, pp 33. 4 Ralf Emmers, (Mar 04), IDSS Working Paper, No. 62: Globalization and Non-Traditional Security Issues. A study of Human and Drug Trafficking in East Asia, Institute of Defence and Strategic Studies, Singapore, pp 2. 5 Abdur Rob Khan, (2001), Globalisation and Non-Traditional Security in South Asia, Academic Press and Publisher Limited, Dhaka, for Regional Centre for Strategic Studies, Colombo, pp16. 6 Poisonous shrimp was used and explained by the current Prime Minister, Mr Lee Hsien Loong back in 1984 during an interview with ASEAN Forecast, Vol 4, No. 10 (pp 164). He describe Singapore needing a strategy like a poisonous shrimp, where a potential adversary would pay a high price for trying to subdue me (Singapore) and you may still not succeed.

Traditional vs Non-Traditional Security Security, is about survival. It is when an issue is presented as posing an existential threat to a designated referent object (traditionally but not necessarily the state, incorporating government, societal and political security)7

While it is clear that globalization has enhanced security in the traditional sense, globalisation has also brought other security challenges. It has, for one, broaden the understanding of security and added a non-traditional dimension to the mix. Human security and environmental degradation have become hotly discussed security topics.

Globalisation has also brought advancement in information technology and mass media. While information technology and mass media have shrunk the

world, it can have a destabilising effect as can be seen in the recent uprisings in the Arab regions (Egypt, Libya etc). NTS threats remains an iffy term to define and academic literature review only offers a limited list of examples. To provide a clearer understanding of NTS, it is inevitable to talk about traditional security.

As highlighted earlier, traditional security concerns with issues such as territorial integrity, preservation of state boundaries and sovereignty. Traditional

security is a military-centric concern about power balance and providing a secure environment for her people within the nation state, to provide a secure way from life: a freedom from fear against a geographical neighbour. It is also very clear that, other than foreign policy, a professional military is the only state institution

7 Barry Buzan, Ole Waever, Jaap de Wilde, (1998), Security: A New Framework for Analysis, Boulder, CO: Lynne Rienner, pp 21

established to preserve and protect a nation-state's national interest, her territorial integrity and her sovereignty, failing which, the nation-state cease to exist.

If Traditional and Non-Traditional Security are 2 diametrically opposing concepts, then it can be inferred that any security threats that do not fall into traditional security realm would hence be considered as Non-Traditional Security. The Copenhagen School identifies 5 categories of security8, both traditional and nontraditional (see Table 1), and each category poses a first-order threat to a referent object directly.
Category of Security Referent Object Military Environment Economic Societal Political State Species or habitats Economy Collective identities National Sovereignty/ Idealogy Type Traditional Non-Traditional Non-Traditional Non-Traditional Traditional

Table 1: 5 categories of security threats (Buzan).

As the list of threats is inexhaustive, another way to add clarity to NonTraditional Security threats is to review the characteristics of NTS. NTS exhibits the following 6 attributes:

(1)

NTS threats are contextual and lies in the eye of the beholder,

that is what one nation-state view as an NTS threat, may not be an NTS threat to another nation-state. Take for example a developed country like the United States which considers terrorism and proliferation of weapons of mass destruction as NTS threats, while less developed regions such as countries in

8 Barry Buzan, Ole Waever, Jaap de Wilde, (1998), Security: A New Framework for Analysis, Boulder, CO: Lynne Rienner, pp 22-23

the Middle East would be more concerned about the lack of fixed income and water supply.9

(2)

NTS threats are transnational in nature, and hence affect more The issue also need to be large in Recent

than one state at the same time.

magnitude and of sufficient importance to a country or a region.

examples of medical pandemic such as the H1N1 outbreak in 2008/ 09 caused 18,449 fatalities in 214 countries10, while a case of food poisoning affecting a few individuals would hardly be considered as a state-level concern.

Figure 1: Spread of H1N1 in 214 countries (World Health Organisation).

(3)

NTS threats often occur quietly and inconspicuously in the form

of faint signals masked by noises and are often hard to detect, causing surprise when they are detected.11 The financial crisis that started with the
9 Wang Yizhou, Defining Non-Traditional Security and Its Implications For China, pp 4. 10 World Health Organisation, (Aug 2010), Global Alert and Response (GAR): Pandemic (H1N1) 2009 update 112, available from: <<http://www.who.int/csr/don/2010_08_06/en/index.html>>, [12 Apr 11]. 11 COL Ong Yu Lin, (2011), The Utility of Military Force Against Non-Traditional Threats, Pointer, Vol. 36, No. 3-4, pp 15.

governmental take over of Fannie Mae and Freddie Mac resulted in the collapse of the stock market leading to a global recession.

(4)

While Copenhagen school offered 5 distinct categories, NTS

threats have 2nd order, 3rd order effects that impacts other referent objects. The tsunami in Japan (Environment: species and habitats) resulted in a human security issues in the form of nuclear radiation scare and lack of basic amenities (Social: collective identities). The tsunami has also caused the

Japanese economy to suffer as a result12 (Economic: economy). See also Figure 2.13

12 Tim Webb (13 Mar 2011), Japan's Economy Heads Into Freefall After Earthquake And Tsunami, available from The Guardian, UK: <<http://www.guardian.co.uk/world/2011/mar/13/japaneconomy-recession-earthquake-tsunami>>, [16 Apr 11]. 13 Ben Rooney (11 Mar 2011), World Market Falls (CNN Money), available from CNNMoney.com: <<http://money.cnn.com/2011/03/11/markets/world_markets/index.htm?cnn=yes&eref=edition>> [16 Apr 2011]

(5)

NTS focuses on non-military challenges to security14 and extend

beyond the military sphere. Consequently, military options alone will seldom achieve the required effects. During Humanitarian Assistance Disaster Relief, the military can provide the first-level on-scene responder role but have to quickly transfer the responsibility to other civil agencies and NGOs after the initial disaster relief phase is over. Similarly, the Maritime Security Task Force framework that Singapore adopts to combat maritime piracy involves not just the Republic of Singapore Navy, but also civil agencies such as the Police Coast Guards, the Maritime and Port Authority of Singapore (MPA), the Immigration and Checkpoints Authority (ICA) and the Singapore Customs.15

(6)

NTS threats are frequently interwoven with traditional security

threats and usually emanate from non-state actors.16 The recent Egyptian Uprising, social network such as Facebook and Twitter, were used to rally mass demonstrations. And when the Egyptian government shut down the internet, the Friday of Anger protest began and resulted in civil unrest. The situation in Libya was no different. The Day of Rage demonstrations against Colonel Muammar Gaddafi's regime, again, organised by youths using social media17, resulted in the employment of the Libyan military against the demonstration. This triggered an international military coalition response against Colonel Gaddafi's regime.
14 Ralf Emmers, Mely Caballero,-Anthony, Amitav Acharya, (2006), Studying Non-Traditional Security in Asia: Trends and Issues, Marshall Cavendis Academic, pp XIV 15 Mindef, (23 Feb 2009), Fact Sheet: Maritime Security Task Force, Available from Mindef: <<http:// www.mindef.gov.sg/imindef/news_and_events/nr/2009/feb/23feb09_nr/23feb09_fs2.html>>, [20 Apr 2011]. 16 COL Ong Yu Lin, (2011), The Utility of Military Force Against Non-Traditional Threats, Pointer, Vol. 36, No. 3-4, pp 15 17 Kim Sengupta, (17 Feb 2011), Gaddafi sweats as wave of Arab unrest reaches Libya, available from The Independent: <<http://www.independent.co.uk/news/world/middle-east/gaddafi-sweatsas-wave-of-arab-unrest-reaches-libya-2217151.html>>, [17 Apr 11].

While it is much easier to conceptually differentiate Traditional and NonTraditional Security, in practise, they are not 2 separate dichotomies. Very often, they exhibits certain spill over effects as seen apparently in attributes (4) and (6). As such, a professional military, established to provide traditional security, is often employed to handle non-traditional security issues. Is this diluting the true role of a professional military?

WHAT IS A PROFESSIONAL MILITARY

Having understood the effects of globalisation to security and characterising Non-Traditional Security, the paper will focus on the organisation and purpose of a professional military, and its utility to a legitimate government.

Organisation of a Professional Military There are many ways an organisation is considered an armed force, but not all armed forces can be considered a professional military. Militias and

mercenaries, while armed, are not considered a professional military due to their lack of legitimacy, while a police force, though recognized to be a legitimate, armed force, is also not considered to be a one as well. According to Rupert Smith, a legitimate professional military force exhibits the following 4 attributes.18 They should

(1)

Be an organized military body;

18 Rupert Smith, (2008), The Utility of Force: The Art of War in Modern World, First Vintage Books Edition, pp 10

(2)

Possess a hierarchical structure answerable to the highest in the

entity or the state;

(3)

Have a legal status to bear arms and to have a separate

disciplinary code;

(4)

Have a centralised funding for the purchase of warlike material.

The most important of all is that a legitimate, professional military force must be employed to serve a political purpose decided upon by a lawful government, which instructs the military, as a legally sanctioned and formed body answerable to the government, to apply that force.19 This is also in congruence with Clausewitz, that military is to serve a political purpose.

Purpose of a Professional Military


Category of Security Referent Object Military Environment Economic Societal Political State Species or habitats Economy Collective identities National Sovereignty/ Idealogy Type Traditional Non-Traditional Non-Traditional Non-Traditional Traditional

Table 1: 5 categories of security threats (Buzan). The military is entrusted with preserving the referent object associated with the State and National Sovereignty/ Ideology.

While globalisation have reduced the possibility of an interstate war, no country would dissolve her military. Referring back to Table 1, a professional armed body is tasked to preserve the referent object of the State and National Sovereignty.
19 Rupert Smith, (2008), The Utility of Force: The Art of War in Modern World, First Vintage Books Edition (Feb 2008), pp 9

10

It is entrusted with the sacred task of defending the sovereignty and territorial integrity of a country, and if necessary, wage a full conflict war: a confrontation where organised armies lock horns in sustained combat operations with the ultimate aim of defeating the adversary.20 Military institutions and war fighting doctrines have also traditionally emphasised and reinforced this biases, that real war is primarily a conventional one.21

However, increasingly, a professional military, more often than not, would be called upon to perform a multitude of Military Operations Other Than War (MOOTW), ranging from Combating Crimes, Peace Keeping Operations, Peace Enforcement Operations, to Counter Insurgency Operations, and Combating Terrorism and Humanitarian Assistance Disaster Relief.22

So, what then is the true purpose of the military, given that they are used in a multitude of operations today? When vom Kriege was first published in 1832, Clausewitz provided an indication to the question.

The Clausewitzian Axiom The political objective is the goal, war is the means of reaching it, and the means can never be considered in isolation from their purpose23 - Carl von Clausewitz
20 MAJ Tay Kwang Leong, (2011), Should the Armed Forces be Employed To Fight The War Or Win The Peace? - A Look At The Military's Involvement In Humanitarian Assistance Disaster Relief, Pointer, Vol. 36, No. 3-4, pp 22 21 Lawrence A Yates, (2006), The US Militarys Experience in Stability Operations, 1789 2005, available from: <<http://www.au.af.mil/au/awc/awcgate/army/csi_yates_stab_ops_hist.pdf>>, [14 Apr 2011], pp 1. 22 MAJ Tay Kwang Leong, (2011), Should The Armed Forces be Employed To Fight The War Or Win The Peace? - A Look At The Military's Involvement In Humanitarian Assistance Disaster Relief, Pointer, Vol. 36, No. 3-4, pp 20 23 Carl von Clausewitz, (1984), On War, trans. and ed. Michael Howard and Peter Paret, Princeton University Press, pp.119.

11

Clausewitz theorised that war should serve politics. Indeed, war and politics go hand in hand. To understand this relationship, one would first need to understand that the strategic level of war derives from political and policy objectives, and is the sole authoritative basis for military operations.24 The ultimate objective at the strategic level of war is to coordinate and focus all the elements of national power to achieve the policy objectives.25

Politics, Policy and War

Employs policy as a means

Politics
Must serve

Policy

Figure 3 Policy must satisfy Politics.

Politics and policies are inter-related, with one being an enabler of the other (see Figure 3). Politics deals with the activities associated with inter and intra governmental issues and the decisions made by the government. Simply put, politics lays down the who, what, where, and to a certain extent, when. Policies, on the other hand, are the selection of goals26 or formulation of rules-of-the-game to operationalise those decisions made (a means to an end, the how).

24 Department of the Navy, United States Marine Corps, (Sept 2001), MCDP 1-0: Marine Corps Operations, US Government Printing Office, pp. 1-8 25 US Marine Corps, (June 1997), MCDP 1: Warfighting. U.S. Government Printing Office, pp 28. 26 Victoria University of Wellington, School of Information Management (2005). Policy Development Process, Online, available from: <<http://www.sim.vuw.ac.nz/activities/mfat/workshops/workshop1/ day-1.ppt>> [28 Dec 2009], pp2

12

Employs policy as a means

Politics
Must serve

Policy

Military - one element of national power available to a country

Must serve

Employs war as a means

Military

carries out

War

Figure 4: Clausewitzian axiom that wars, as carried out by the military, are a continuation of politics, by other means.

And if war should serve politics, and policy is the how of achieving a political aim, then it follows that war (a means), must satisfy policy (enabler to the end) which is to serve politics. In essence, war, as carried out by the military, is just a means to an end, and it is a continuation of politics as theorised by Clausewitz (see Figure 4).

Figure 5: Extension of the Clausewitzian axiom, that actions by the military, not just war, are a continuation of politics, by other means.

13

Extension of the Clausewitzian Axiom When vom Kriege was written, it was against the backdrop of the Napoleonic wars and the military, up to that point in history, had been employed to wage a interstate conflicts. Although the role of the military has evolved over the years, Clausewitz's principle still hold true, that actions by the military should ultimately culminate to serve politics (see Figure 5), be it through waging and winning wars or preserving peace.

Full Spectrum Operations ... in the future our military will not only be called upon to carry out traditional combat operations, but will also have to respond to security contingencies that manifest in unexpected places and in unexpected ways.27

There is a distinction to be made regarding a professional military of a developed nation-state viz-a-viz a professional military of a developing or a failed state. Armed forces of developing states or failed states are concerned with issues surrounding traditional security, and providing a safe and lawful environment for her people. arena. It is concerned with establishing legitimacy in the international political

Professional military of developed countries, however, are raised and equipped to conduct a full spectrum of operations. The United States, recognized as the sole military superpower immediately after the Cold War, and the Republic of

27 Speech by Minister of Defence, Teo Chee Hean (05 Mar 2007), Trends in our Security Environment at the committee of Supply Debate on Defence Budget 2007 , available from Mindef: <<http://www.mindef.gov.sg/imindef/news_and_events/nr/2007/mar/05mar07_nr.html>> [5 Apr 2011]

14

Singapore, both have an established professional military. The mission statement of United States Army and the Singapore Armed Forces (SAF) are as follows:

(1)

US Army: The Army's mission is to fight and win our Nation's

war by providing prompt, sustained land dominance across the full range of military operations and spectrum of conflict in support of combatant commanders28.

(2)

Singapore Armed Forces: Our Army is to deter aggression, and

should deterrence fail, to secure a swift and decisive victory. In peacetime, our Army is to be ready and capable of conducting a spectrum of operations to protect our national interests and the well-being of our citizens.29

The US Army included the need and ability to execute the full range of military operations and spectrum of conflict, while the SAF included conducting a spectrum of operations. Both military's have exhibited the need and desired ability to conduct a full spectrum of operations (as shown in Figure 630), both traditional and non-traditional in nature.

However, while it has been said that a professional military is raised, equipped and prepared to conduct a full spectrum of conflict, it is still, first and

28 US Army, (20 Apr 2011), Organisation of US Army, available from US Army.Mil: <<http://www.army.mil/info/organization/>>, [21 Apr 2011] 29 Mindef, (01 Apr 2011), Our Army Mission, available from Mindef: <<http://www.mindef.gov.sg/imindef/mindef_websites/atozlistings/army/About_Us.html>>, [21 Apr 11]. 30 Department of the Army, (14 Jan 2006), Organsation of the United States Army, available from:<<http://www.apd.army.mil/pdffiles/p10_1.pdf>> [21 Apr 2011]

15

foremost, established to serve the primary purpose: that is to deter aggression and if necessary, engage, and win, an interstate conflict.

However, as the most established state institution of a nation, the military is often tasked to handle non-traditional security threats as well, and the need to deal with both traditional and non-traditional threats has increase the burden of the military.31 To alleviate this burden and to achieve a strategic outcome, an integrated Whole-Of-Government (W.O.G) approach is required.32

WHOLE OF GOVERNMENT APPROACH You [military professionals] must know something about strategy and tactics and logistics, but also economics and politics and diplomacy and history. You must know everything you can know about military power, and you must also understand the limits of military power. You must understand that few of the important problems of our time have, in the final analysis, been finally solved by military power alone33 - John F. Kennedy
31 COL Ong Yu Lin, (2011), The Utility of Military Force Against Non-Traditional Threats, Pointer, Vol. 36, No. 3-4, pp 13 32 Rupert Smith, (Jan 2007), The Utility of Force: The Art of War in the Modern World, Knofp Publishing, pp 378. 33 President John F. Kennedy (remarks to the graduating class of the U.S. Naval Academy, Annapolis, Maryland, 7 June 1961), (2011). Available from History Central: <<http://www.historycentral.com/JFK/Speeches/Naval.html>> [17 Apr 2011]

16

History has shown that prior to the start of any conflict, there are other acts of statecraft at work. Economic sanctions were imposed on Libya Investment Authority and the employment of Central Intelligence Agency (CIA) operatives to gather intelligence were underway before the implementation of No-Fly Zone and commencement of ground operations in Tripoli. Such W.O.G approach should also be adopted when handling NTS issues as well, as a purely military-only option is not going to be effective.

Military's role in handling traditional threats (Military and Political) has already been established. As such, the paper will next address the military's participation in the remaining 3 clusters of Non-Traditional Security threats (Environmental, Economic, Societal).

Military's Role in Environmental Security

Figure 7: Level of involvement between the military and non military agencies along the Disaster Management Continuum.

17

The military has a role to play in Environmental Security. While there is not very much the military could do to curb ozone gases emission or global warming, or ensure resource sustainability and energy security, the military has a role to play in a the aftermath of a natural disaster. This has been articulated by MAJ TAY KWANG LEONG on the recent Pointer issue. Along the Disaster Management Continuum, the military's involvement tapers down after disaster relief and recovery, and plays a supporting role in disaster mitigation and disaster preparedness (refer to Figure 7)34.

Military's Role in Economic Security The economic success of a nation can only be founded on the backdrop of a secure and stable society. Having a

strong military would boost the confidence and attract foreign investors. And as the economy grows, more budget can be invested back into the military to
Figure 8: Symbiotic relationship between economy and defense.

strengthen its defence capabilities. This symbiotic relationship forms the military's role in providing economic security (see Figure 8).35

34 MAJ Tay Kwang Leong, (2011), Should The Armed Forces be Employed To Fight The War Or Win The Peace? - A Look At The Military's Involvement In Humanitarian Assistance Disaster Relief, Pointer, Vol. 36, No. 3-4, pp 27 35 Adrian Kuah, S3-01: Non Violent Approaches to Security Singapore's Economic Strategies, presentation to 42nd GKS CSC, Slide #5.

18

Military's Role in Societal Security One may argue that the recent Libya's uprising is an anti-thesis to miltary's role in Societal Security due to Colonel Gaddafi's military and their acts against the Libyan citizens. This, however, cannot stand as the military at that point in time, cease to act in the capacity as a legitimate, professional military. This is also the case for the Rwanda Genocide in 1994. With a strong military, backed by a

legitimate government, crimes on humanity could be minimised. A conscript military system can also be used as a nation building tool in galvanising Societal Security and eliminate perceived ethnic differences. Increasingly, the military is involved in maritime security, combating drug trafficking or preventing other transnational crimes as these transnational crimes could destabilise the society and upset the social fabric of a nation.

CONCLUSION With the end of Cold War, the ambit of security studies have expanded to include human, environmental, social and economic security. Military security is still perhaps the dominant paradigm, but it is being increasingly realized that military security cannot respond to some of mankind's fundamental needs like freedom from poverty, threats to individuals and groups from multiple source.36

The paper is in the opinion that a professional military should engaged with NTS issues, provided the task of safeguarding the territorial integrity and sovereignty of the country is satisfied. The reasons are:

(1)

NTS often have a spill over effect and are often interwoven

with traditional security threat. As such, the military should divert part of her
36 Abdur Rob Khan, (2011), Globalization and Non-Traditional Security in South Asia, Academic Press and Publisher Lmited, Dhaka, for Regional Centre for Strategic Studies, Colombo, pp12

19

resource, and contend with NTS as a secondary mission, provided her primary mission is met.

(2)

The military underpins traditional and non-traditional security

issues and has a role to play in the 5 clusters of security threats. As the most established state institution, the military is well poised to offer the moral obligation of providing a safe and secure environment for her people.

(3)

As the military is an extension of statecraft of a legitimate

government, actions by a professional military should be a continuation of politics, be it in the traditional or non-traditional manner.

While the paper holds the stance that the military should content with NTS threats, one needs to be in cognisant that, in today's globalized world, for a solution to be enduring and sustaining, a W.O.G approach, with the military working in tandem with other civil agencies is necessary, and that a military-only option is not going to be effective nor enduring.

Moving forward, however, as the list of NTS issues is seemingly infinite and changes over time, more work is needed to critically examine the specific roles that the military can play to deal with specific NTS issues. One thing is certain: That a professional military should engage with NTS issues, either directly or indirectly, one way or the other.

20

REFERENCES Books/ Articles/ Periodicals

Mohammed Ayoob. (1995). The Third World Security Predicament: State Making, Regional Conflict and The International System. Lynne Rienner Publishers, Boulder, CO. Andrew T.H. Tan, J.D. Kenneth Boutin, (2001), Non-Traditional Security in the Asia Pacific, The Dynamism of Securitisation, Selected Publishing. Anthony Giddens, (1998), The Third Way: The Renewal of Social Democracy, Cambridge: Polity Press. Ralf Emmers, (Mar 04), IDSS Working Paper, No. 62: Globalization and NonTraditional Security Issues. A study of Human and Drug Trafficking in East Asia, Institute of Defence and Strategic Studies, Singapore. Abdur Rob Khan, (2001), Globalisation and Non-Traditional Security in South Asia, Academic Press and Publisher Limited, Dhaka, for Regional Centre for Strategic Studies, Colombo. Barry Buzan, Ole Waever, Jaap de Wilde, (1998), Security: Framework for Analysis, Boulder, CO: Lynne Rienner. A New

Wang Yizhou, Defining Non-Traditional Security and Its Implications For China. COL Ong Yu Lin, (2011), The Utility of Military Force Against Non-Traditional Threats, Pointer, Vol. 36, No. 3-4. Ralf Emmers, Mely Caballero,-Anthony, Amitav Acharya, (2006), Studying Non-Traditional Security in Asia: Trends and Issues, Marshall Cavendis Academic. Rupert Smith, (2008), The Utility of Force: The Art of War in Modern World, First Vintage Books Edition MAJ Tay Kwang Leong, (2011), Should the Armed Forces be Employed To Fight The War Or Win The Peace? - A Look At The Military's Involvement In Humanitarian Assistance Disaster Relief, Pointer, Vol. 36, No. 3-4 Carl von Clausewitz, (1984), On War, trans. and ed. Michael Howard and Peter Paret, Princeton University Press. Department of the Navy, United States Marine Corps, (Sept 2001), MCDP 1-0: Marine Corps Operations, US Government Printing Office. US Marine Corps, (June 1997), MCDP 1: Warfighting. U.S. Government Printing Office.

21

Adrian Kuah, S3-01: Non Violent Approaches to Security Singapore's Economic Strategies, presentation to 42nd GKS CSC, Slide #5.

Online Resource

World Health Organisation, (Aug 2010), Global Alert and Response (GAR): Pandemic (H1N1) 2009 update 112, available from: <<http://www.who.int/csr/don/2010_08_06/en/index.html>> [12 Apr 11]. Tim Webb (13 Mar 2011), Japan's Economy Heads Into Freefall After Earthquake And Tsunami, available from The Guardian, UK: <<http://www.guardian.co.uk/world/2011/mar/13/japan-economy-recessionearthquake-tsunami>> [16 Apr 11]. Speech by Minister of Defence, Teo Chee Hean (05 Mar 2007), Trends in our Security Environment at the committee of Supply Debate on Defence Budget 2007, available from Mindef. <<http://www.mindef.gov.sg/imindef/news_and_events/nr/2007/mar/05mar07 _nr.html>> [5 Apr 2011] Ben Rooney (11 Mar 2011), World Market Falls (CNN Money), available from CNNMoney.com: <<http://money.cnn.com/2011/03/11/markets/world_markets/index.htm? cnn=yes&eref=edition>> [16 Apr 2011] Mindef, (23 Feb 2009), Fact Sheet: Maritime Security Task Force, available from Mindef: <<http://www.mindef.gov.sg/imindef/news_and_events/nr/2009/feb/23feb09_n r/23feb09_fs2.html>> [20 Apr 2011] Kim Sengupta, (17 Feb 2011), Gaddafi sweats as wave of Arab unrest reaches Libya, available from The Independent: <<http://www.independent.co.uk/news/world/middle-east/gaddafi-sweats-aswave-of-arab-unrest-reaches-libya-2217151.html>> [17 Apr 11] Lawrence A Yates, (2006), The US Militarys Experience in Stability Operations, 1789 2005, available from: <<http://www.au.af.mil/au/awc/awcgate/army/csi_yates_stab_ops_hist.pdf>>, [14 Apr 2011] Victoria University of Wellington, School of Information Management (2005). Policy Development Process, available from: <<http://www.sim.vuw.ac.nz/activities/mfat/workshops/workshop1/day-1.ppt>>

22

[28 Dec 2009].

US Army, (20 Apr 2011), Organisation of US Army, available from US Army.Mil: <<http://www.army.mil/info/organization/>> [21 Apr 2011] Department of the Army, (14 Jan 2006), Organsation of the United States Army, available from: <<http://www.apd.army.mil/pdffiles/p10_1.pdf>> [21 Apr 2011] Mindef, (01 Apr 2011), Our Army Mission, available from Mindef: <<http://www.mindef.gov.sg/imindef/mindef_websites/atozlistings/army/About _Us.html>> [21 Apr 11]. President John F. Kennedy (remarks to the graduating class of the U.S. Naval Academy, Annapolis, Maryland, 7 June 1961), (2011), available from History Central: <<http://www.historycentral.com/JFK/Speeches/Naval.html>> [17 Apr 2011]

23

BIBLOGRAPHY Books/ Articles/ Periodicals

Alan Collins, (2010). Contemporary Security Studies. Press.

Oxford University

Amy Eckert, Laura Sjoberg, (2009). New Problems, Old Solutions: Rethinking the 21st Century, Zed Books Ltd, NY Ralf Emmers (2004), Non-Traditional Security IN the Asia Pacific: Synamics of Securitisation, Marshall Cavendish International The

Online Resource

J. Peter Burgess, (2007), Non-Military Security Challenges, available from: <<http://www.isn.ethz.ch/isn/Digital-Library/Publications/Detail/? ots591=0c54e3b3-1e9c-be1e-2c24-a6a8c7060233&lng=en&id=38292>> Marianne Stone, (2009), Security According to Buzan: A Comprehensive Security Analysis., available from <<http://geest.msh-paris.fr/IMG/pdf/Security_for_Buzan.mp3.pdf>>

24

Das könnte Ihnen auch gefallen