Download as pdf or txt
Download as pdf or txt
You are on page 1of 7

features 13

The Utility of Military Force Against


Non-Traditional Threats

by COL Ong Yu Lin, LTC Tan Cheng Kwee and MAJ Fredie Tan

Abstract:
Non-Traditional (NT) threats have made the national security landscape more complex and uncertain than
before. This requires the state to anticipate threats which are increasingly multi-dimensional, asymmetric in
nature, sudden and unexpected. The vital and only effective weapon against such threats is knowledge and an
integrated whole-of-government response is preferred. Knowledge is nothing without understanding, and to
achieve understanding, there is a need to make sense of the situation. It is only appropriate that a proper
understanding be achieved at the national level, before making decisions on utilising elements of national
power, to deal with the NT threat. Although the ongoing structural and capability transformation in the military
has made the military a more useful tool within the national toolkit against NT threats, it should not be
distracted from its primary mission of defending the state’s sovereignty and territorial integrity.

Keywords: Non-Traditional Threats, OOTW, Joint Force Transformation

INTRODUCTION grapple with maintaining and promoting security


One effect of globalisation is that states are against a widened spectrum of threats that are
increasingly vulnerable to shocks, contagion effects increasingly transnational and non-traditional in
and spillover consequences of developments far nature. These non-traditional threats are often
beyond the confines of any state’s geographical undefined, unpredictable and unexpected. They
boundaries. Seemingly unimportant events in a faraway also have both internal and external drivers and
land can have significant impact and manifest as threats ramifications. These threats are often interwoven
to national security. International security, regional with traditional security threats, are capable of
security and national security are now intricately exploiting multiple vulnerabilities, and can put the
linked, forming a seamless web. States now have to state at serious risk.

The military has been the key national institution


of the state in defending its independence and
territorial integrity against traditional military threats
from other states. Although such traditional threats of
inter-state conflict have receded into the background,
Cyberpioneer

they have not disappeared. States continue to


retain and build up their military forces as it is the
state’s primary responsibility to secure its territorial
integrity. Emerging threats are, however, increasingly
non-traditional in nature, which many states are not
prepared to deal with. The need to simultaneously
deal with both traditional and non-traditional
ISAF Troops From Singapore, Helping with Reconstruction threats has therefore increased the burden on the

POINTER, JOURNAL OF THE SINGAPORE ARMED FORCES VOL.36 NO.3-4

2. 13-19 The Utility Of Military Force Against Non-traditional Threats.indd 13 16/03/2011 17:01
features 14

state. More importantly, the use of military force CHANGING NATURE OF CONFLICT AND
alone is unlikely to achieve a strategic outcome, and RESPONSES
an integrated whole-of-government (W.O.G) approach The changing nature of conflict and its challenges
is required.1 are best described by Charles Krulak’s “3-Block War”,
The changing security paradigm and the reduced and Rupert Smith’s “war amongst the people”. The
likelihood of conventional inter-state wars have “3-Block War” is one where “soldiers may be confronted
brought into question the relevance, purpose and utility with the entire spectrum of tactical challenges in the
of the military force beyond its traditional security span of a few hours and within the space of three
roles. This paper argues that the changing nature of contiguous city blocks”. These soldiers may be required
conflict has forced the military to change its operating to conduct a full scale of military actions, including
procedures, warfighting concepts and organisation, peace support operations and humanitarian relief.3
not only to win wars decisively, but also to win the These military activities will also take place amongst
peace. In doing so, the current military transformation the people and the opponents will extend beyond
has also extended the utility of the military to combat traditional state actors to include non-state ones.
non-traditional threats. New military capabilities to The operation continuum is also being redefined, as
win the peace can be easily adapted for use against war is unlikely to be followed by victory and peace,
non-traditional threats, and we will examine how these but by continued conflict.4
military capabilities can be used in non-traditional The need to operate in such a complex and dynamic
security roles. operational environment has forced the military to
build new capabilities to win wars decisively and to
While the military remains an win the post-war conflicts swiftly. These new
important instrument of national capabilities to win wars amongst the people allow
the military to execute operational concepts such as
security, the military is not a dominant manoeuvre, focused combat service support,
comprehensive instrument to pit multi-dimensional force protection, and knowledge-
based command, control, and communication.
against the entire spectrum of In addition, there are also intelligence, precision
non-traditional threats. engagement, information operations, and civil-military
and media operations. Increasingly, the definition of
While the military remains an important instrument combat power is extending beyond the traditional
of national security, the military is not a comprehensive domains of firepower, protection and mobility to
instrument to pit against the entire spectrum of include an expanding suite of non-kinetic capabilities
non-traditional threats. Employing the military against that focus on understanding the culture, shaping
all non-traditional security threats will seriously the minds and swaying the will of the opposing
jeopardize its main mission: defending national combatants and non-combatants. These new
sovereignty and territorial integrity. However, the military capabilities can be adapted for use against
military will remain the most versatile and flexible non-traditional threats in continued conflicts and
state institution as the military force undergoes Operations Other Than War (OOTW).5
further transformation to meet the demands of
future military operations which are becoming an The changing security paradigm is one where
interwoven mix of traditional and non-traditional military threats are becoming interwoven with
threats. Such operations will demand multi-national non-military threats, and the distinction between
cooperation involving coalition military forces and combatants and non-combatants is increasingly
coalition government and non-government agencies. difficult. Destroying an opposing state’s infrastructure
Paradoxically, this trend will also continue to make to reduce its war fighting capacities will also have
the military the most relevant state institution against significant consequences on its civil population.
the enemies of the state as well as ensuring a As a result, future operations will have to be more
fundamental new role for the military in the future.2 precise, using precision weapons and higher quality

POINTER, JOURNAL OF THE SINGAPORE ARMED FORCES VOL.36 NO.3-4

2. 13-19 The Utility Of Military Force Against Non-traditional Threats.indd 14 16/03/2011 17:01
features 15

troops possessing the exactitude and stealth of main purpose of defending national sovereignty
current Special Forces units. Future operations will and territorial integrity. Hence, the military can be
also include both violent and non-violent applications employed against certain NT threats either as the
of military power, conducted in conjunction with lead agency or as a supporting agency. This will be
government and non-government agencies as well as elaborated on in the following paragraphs:
coalition partners to deal with a widened spectrum
of post-conflict consequences. Moreover, shrinking (A) Transnational Crime
defence budgets and rising costs of military equipment Transnational crime refers to activities such as
dictate the need to employ all available military assets narcotics and arms trafficking, human smuggling,
available from the Army, Navy and Air Force to achieve prostitution, credit card fraud, extortion, gambling,
the desired effects. Future operations will necessarily contract murders, and money laundering. It is a
be more integrated across the Services and the real and protracted threat to the nation-state as
conduct of operations will go beyond operating it can undermine political institutions, erode the
jointly to operating in a seamless manner.6 Military legitimacy and credibility of governments to provide
forces will continue to undergo transformation; a minimum level of protection for individuals.
structurally, doctrinally and conceptually to fulfil Criminal activity can also cause widespread death and
new missions and roles and also improve cooperation social destruction. Money laundering can threaten a
with external agencies. nation’s banking system and undermine confidence
in the entire financial system.
EMPLOYMENT OF MILITARY CAPABILITIES
AGAINST NON-TRADITIONAL THREATS Under normal circumstances, the civil police force
is the lead agency in the fight against transnational
The term ‘non-traditional (NT) threat’ is a difficult crime. The military can be employed as a supporting
term to define and literature reviews only offer a list agency in remote border regions and territorial
of examples. Moreover, there is also no agreement on waters to curb illegal migration, drug and arms
the number of such threats. Amidst this discussion, trafficking. The military may employ its intelligence
non-traditional threats do share four key characteristics: and surveillance systems for intelligence collection
(1) transnational in nature and hence affect more and early warning especially if such capabilities are
than one state at the same time; (2) extend beyond not available to the civil police force. However, the
the military sphere and consequently military options military is not designed for and should not be used
alone will seldom achieve the required effects; (3) to deal with other types of transnational crime.
often occur quietly and inconspicuously in the form
of faint signals, masked by noise and are often hard Transnational terrorism includes
to detect, causing surprise when they are detected;
and (4) are frequently interwoven with traditional activities that seek to destabilise,
security threats, and usually emanate from non-state instil fear and erode the legitimacy
actors.
of the state, through methods
With the receding threat of inter-state conflict,
states are now facing a clear and present security
such as assassination, kidnapping,
challenge from non-traditional threats. Given this hijacking, cyber-attacks, and the use
reality, it is natural that the military has been
increasingly employed for these non-war military
of chemical, biological, radiological
operations both domestically and internationally. In and explosive devices.
many countries the military is the most important and
best developed state instrument, and governments (B) Transnational Terrorism
are discovering that civilian agencies simply cannot Transnational terrorism includes activities that
cope with the magnitude of these problems. However, seek to destabilise, instil fear and erode the legitimacy
employing the military against all non-traditional of the state, through methods such as assassination,
security threats will seriously distract it from its kidnapping, hijacking, cyber-attacks, and the use

POINTER, JOURNAL OF THE SINGAPORE ARMED FORCES VOL.36 NO.3-4

2. 13-19 The Utility Of Military Force Against Non-traditional Threats.indd 15 16/03/2011 17:01
features 16

of chemical, biological, radiological and explosive (D) Natural Disaster


devices. Significantly, the trend of terrorism has The range of natural disasters include forest
evolved; targeting state infrastructure and citizens fires, cyclones/hurricanes, earthquakes, floods and
to erode confidence in the legitimacy and competency droughts. The impact of natural disasters on human
of the state. Terrorist attacks against financial life and sustainable economic development can be
targets can spark financial panic and cause financial disastrous. Damage caused by natural disasters often
turmoil. Cyber-terrorism against a nation’s power produce social disorder, environmental degradation
grid or IT infrastructure can bring a nation and an and medical endemics. These consequences are often
inter-connected world to a stand-still. Bio-terrorism exacerbated in fragile or weak states, as seen in
can cause widespread human and social destruction. Haiti where fragile state institutions disintegrated
after the devastating earthquake in January 2010.
Counter-terrorism is a national effort with public
vigilance and police action as the first level of response. No country, no matter how big or developed,
In the event that terrorist groups become capable of can mobilise sufficient resources and the specialised
conducting large scale military operations, the military capabilities necessary to alleviate the suffering of
should be the lead agency. The military can also be all victims of a natural disaster. However, international
employed to assist the Police to protect national key organisations, aid agencies, and other international
installations of strategic or symbolic significance. Most rescue services can provide the necessary assistance.7
militaries today also possess a Chemical, Biological, The current transformation of the military, however,
makes it well placed to operate with these
Radiological and Explosive (CBRE) unit that can be
organisations to swiftly and effectively deliver relief
the lead agency against bio-terrorism threats or as a
to the victims.
supporting agency to a developed Civil Defence force
with similar CBRE capability. Military forces have a critical role to play
in Humanitarian Assistance and Disaster Relief
(C) Medical Epidemics
(HADR) operations as they possess the necessary
Medical epidemics include the widespread transportation, engineering resources and manpower
transmission of infectious diseases such as SARS, to provide a critical quick response in the initial
cholera or malaria. The dramatic growth in personal stages of disaster relief and rescue operations. The
travel for business or pleasure, and the expansion of military can transport aid to affected areas and
global trade has increased the risk of rapid spread assist in its distribution, especially in remote and
of infectious disease from one part of the world to difficult-to-reach areas. While the military force
another. Infectious diseases affect the quality of is unlikely to provide complete relief to all victims,
a nation’s human capital. Medical endemics erode through its initial actions it can stabilise the situation
national confidence and investor confidence, which for international organisations and aid agencies to
translates into economic issues affecting national follow up in the subsequent phases.
development and hence future security and stability.
Infectious diseases can devastate the economy,
potentially contributing to increased unemployment,
reduce social stability and, in the worse case, cause
political collapse.

The military can be employed as either the lead


agency in a national consequence management team
or as a supporting agency to the national health
agency. The military can assist in the management of
quarantine areas and in contact tracing, as the SAF
did during the SARS epidemic in Singapore. This is
the employment of the managerial leadership
capability of the military, rather than its warfighting
capability. Sail Banda 2010

POINTER, JOURNAL OF THE SINGAPORE ARMED FORCES VOL.36 NO.3-4

2. 13-19 The Utility Of Military Force Against Non-traditional Threats.indd 16 16/03/2011 17:01
features 17

The military with its lift and engineering assets is by becoming hotbeds for crime, disease and terrorism.12
well-equipped to be the lead agency in disaster relief The provision of aid is critical to the development of
operations, but it can be subordinated to a national these states, but an acceptable level of security and
emergency management stability is needed before
agency to support the international aid can be
Civil Defence force. It can flown in. The military
also play an important is by far the most
role in the evacuation suitable foreign policy
of citizenry before the instrument to establish
disaster. Its surveillance an acceptable level of
and intelligence assets security by preventing
can also be used for or suppressing any
damage assessments conflicts so that aid
to aid the national agencies can alleviate
disaster coordinating the consequences of a
agency make plans and conflict and/or a fragile
coordinate relief efforts. state. Military forces are
If necessary, the military usually deployed as part
can also be employed as of a United Nations led or
a first response force to sanctioned multinational
restore an acceptable peace support
level of security against operation to execute
armed local gangs that conflict prevention,
might have emerged in the post-disaster period. peacemaking, peace enforcement, peacekeeping, peace
building and/or humanitarian operations. Ongoing
(E) Intra-State or Regional Conflicts military transformation to increase the versatility
According to a World Bank report, about a billion of the military force to operate in a complex war
people live in countries affected by fragility and environment has also provided the military a capability
conflict.8 Fragile states are defined as “countries facing to conduct such peace support operations. While the
severe development challenges, weak institutional military can play a crucial initial role to establish
capacity, poor governance, and political instability. security, a multi-dimensional whole-of-government
Often these countries experience ongoing violence approach is needed to provide the initial expertise
as the residue of past severe conflict. Ongoing armed while developing indigenous capabilities to rebuild
conflicts affect three out of four fragile states.”9 national institutions. This whole-of-government
Conflicted affected or post-conflict countries can approach focuses on (1) promoting governance, (2)
be countries that have (1) suffered a severe and protecting civil population, (3) improving security,
long-lasting conflict, (2) experienced a short, but (4) restoring essential services and (5) stimulating
highly intensive, conflict leading to a disruption sustainable economic development.13
of development or (3) a newly sovereign state that
has emerged through the violent break-up of a CONCLUSION
former sovereign entity. More importantly, these How and in what role the military is employed
conflict-affected and fragile states have “a one in domestically against NT threats will depend on the
six chance of falling into civil war in any five year state of development, competency and capability of
period, and that a typical post-conflict country has the other national agencies vis-a-vis the nature of the
a 50-50 chance of slipping back into war”.11 non-traditional threat the state is facing. Generally,
when the other national agencies are well developed;
Conflict-affected and fragile states also affect the the military is likely to be employed in a supporting
national security and economic development of their role. Likewise, immature national agencies necessitate
neighbouring countries and produce global insecurity a larger role for the military.

POINTER, JOURNAL OF THE SINGAPORE ARMED FORCES VOL.36 NO.3-4

2. 13-19 The Utility Of Military Force Against Non-traditional Threats.indd 17 16/03/2011 17:01
features 18

The military in developed states is most likely to ENDNOTES


be undergoing transformation to cope with changes 1. Rupert Smith, The Utility of Force: The Art of War in the
in the battlefield. At the same time, while the other Modern World (Knofp Publishing, January 2007), p. 378.
state agencies are also developing to deal with NT
2. Ong Yu-Lin, “Employment of the Military Against Non-
threats, they may not be adequate for the task and the
Traditional Threats: An Isomorphism or a Metamorphism
military then has to be re-organized to handle certain
of Roles”, World Military Review, Number 5, Issue 433
NT threats, either in a leading or augmenting role. (2009), pp. 42-45.
This process is aided by the current transformation
of military, thus making it relatively easy to adapt 3. Gen. Charles C. Krulak, “The Strategic Corporal: Leadership
in the Three Block War”, Marines Magazine (January 1999).
its new capabilities for application against NT threats
and to work in a coordinated or a seamless manner 4. Smith, pp. 5-6.
with other state agencies. As the capacity and 5. According to the Army Operations Manual (October
capability of the other state agencies are developed 2006), OOTW encompasses the use of military capabilities
over time, the military should relinquish its lead across the range of military operations short of war. It
role and focus on its primary mission of defending can be applied to complement any combination of other
state sovereignty and territorial integrity. instruments of national power. OOTW focus on deterring
war, resolving conflicts and promoting our wider national
The severity that non-traditional threats pose to interests. These could also include protecting our overseas
national security cannot be understated and the role citizens and offshore assets, and even contributing to
the military can possibly perform is dependent on promote regional stability.
both the state of development of the military and the 6. Ong Yu-Lin, “The Future of Joint Operations”, World
capacity and competency of other state instruments. Military Review, Number 12, Issue 428 (2008), pp. 54-56.
These NT threats affect the national security of all 7. Teo Chee Hean, “Modes Of Security Cooperation:
types of states.14 Some countries or regions are more Confidence-Building, Partnerships, Alliances”, Keynote
prone to insecurity depending on their exposure to Address at 7th IISS Asian Security Summit Shangri-La
globalization. It is in states with weak sovereignty Dialogue, Singapore (1 June 2007).
that the emergence of insecurity is most strongly 8. World Bank Group, http://web.worldbank.org/WBSITE/
felt and these are often located in the developing EXTERNAL/PROJECTS/STRATEGIES/EXTLICUS/0, contentM
and post-colonial world. Ironically, it is also in these DK:22230573~menuPK:6434002~pagePK:64171531~piPK:
countries that the military is employed as the main 64171507~theSitePK:511778,00.html
state instrument against all threats.
9. World Bank Group, http://www.worldbank.org
These NT threats have made the national security 10. Paul Collier, The Bottom Billion: Why the Poorest Countries
landscape more complex and uncertain than before. are Failing and What can be Done About it, (Oxford: Oxford
This requires the state to anticipate threats which are University Press, 2007), p. 32; Paul Collier and Anke
increasingly multi-dimensional, asymmetric in nature, Hoeffler, “Post Conflict Risks”, Journal of Peace Research,
sudden and unexpected. The vital and only effective Vol. 45, No. 4 (2008), pp. 461-478.
weapon against such threats is knowledge and an 11. Ibid.
integrated whole-of-government response is preferred.15 12. Paul Collier, “Breaking the Conflict Trap”, A World Bank
Knowledge is nothing without understanding, and to Policy Research Report (2003).
achieve understanding, there is a need to make sense
13. Peter Chiarelli and Patrick Michaelis, “Winning the Peace:
of the situation. It is only appropriate that a proper
The Requirement for Full Spectrum Operations”, Military
understanding be achieved at the national level, before
Review (Jul-Aug 2005), pp. 4-17.
making decisions on utilizing elements of national
power, to deal with the NT threat. Although the 14. Thomas Quiggin, Seeing the Invisible: National Security
ongoing structural and capability transformation Intelligence in an Uncertain Age (World Scientific
Publishing, 2007), p. 231; Implications for the Asia-Pacific
in the military has made the military a more useful
(Barton: Australian Strategic Policy Institute, 2006), p6.
tool within the national toolkit against NT threats, it
should not be distracted from its primary mission
of defending the state’s sovereignty and territorial
integrity. ß

POINTER, JOURNAL OF THE SINGAPORE ARMED FORCES VOL.36 NO.3-4

2. 13-19 The Utility Of Military Force Against Non-traditional Threats.indd 18 16/03/2011 17:01
features 19

COL Ong Yu Lin is a Guards Officer by training. He is currently a Senior Project


Officer in HQ Guards where he was the previous Deputy Chief Guards Officer.
He holds a Bachelor of Science in Physics from the National University of
Singapore, a Master of Management in Defence Studies from the University
of Canberra, Australia, and a MBA from the Nanyang Fellows Programme in
Nanyang Business School, Nanyang Technological University. COL Ong has
also attended the Royal Military Academy at Sandhurst, U.K., the U.S. Army
Infantry School at Fort Benning, the Australian Command and Staff College,
and the Chinese People’s Liberation Army National Defence University.
COL Ong previously held the appointments of Commanding Officer, 1st
Battalion Singapore Guards, Commander, 3rd Singapore Infantry Brigade and
Commander, Officer Cadet School (OCS).

LTC Tan Cheng Kwee is a Guards officer by training. He is currently the


Commanding Officer, 1st Battalion Singapore Guards. He is a recipient of
the SAF Overseas Scholarship. He holds a Bachelor of Science (Electrical
Engineering) (Highest Honours) from the University of Illinois at Urbana-
Champaign. LTC Tan attended The Basic School, U.S. Marine Corps in 2000
and the Indonesian Command and Staff College (Seskoad) in 2008 where he
emerged the top international student graduate. LTC Tan has formerly held
the appointments of Operations Officer, 7th Singapore Infantry Brigade, and
Officer-Commanding of ‘B’ Company, 3rd Battalion Singapore Guards.

MAJ Tan Eng Han, Fredie is currently the the Commanding Officer, 3rd
Battalion Singapore Guards. He is a Guards Officer by vocation and was
commissioned in 1997 at Officer Cadet School, SAFTI MI. He is a recipient
of the Academic Training Award (Local) in 2000 and holds a Bachelor of
Commerce (Management) from the University of Adelaide, Australia. He
attended the USMC Expeditionary Warfare School (class of 2006) and the
Singapore Command and Staff College in 2009. He previously held the
appointments of Head Capability Development Branch, (2010) and Doctrine
Officer (2006-2008) in HQ Guards, Coy Commander, 3rd Bn Gds (2004) and
Platoon Commander/ Instructor, OCS (1999 thru 2003).

POINTER, JOURNAL OF THE SINGAPORE ARMED FORCES VOL.36 NO.3-4

2. 13-19 The Utility Of Military Force Against Non-traditional Threats.indd 19 16/03/2011 17:01

You might also like