{"id":56944,"date":"2020-06-24T13:16:41","date_gmt":"2020-06-24T03:16:41","guid":{"rendered":"https:\/\/www.aspistrategist.ru\/?p=56944"},"modified":"2020-06-24T13:16:41","modified_gmt":"2020-06-24T03:16:41","slug":"lets-stop-using-the-term-non-traditional-about-security-threats","status":"publish","type":"post","link":"https:\/\/www.aspistrategist.ru\/lets-stop-using-the-term-non-traditional-about-security-threats\/","title":{"rendered":"Let\u2019s stop using the term \u2018non-traditional\u2019 about security threats"},"content":{"rendered":"
<\/figure>\n

As a former naval officer and current student of maritime affairs, I have long been infuriated by the blanket use of the term \u2018non-traditional\u2019 to describe security threats external to those directly generated by the conflicting interests of nation-states.<\/p>\n

In the maritime domain, piracy, smuggling, slave trading and illegal fishing are just a few of the threats to which the \u2018non-traditional\u2019 label has been attached. The pundits would know better if they gave the slightest thought to history.<\/p>\n

In humanity\u2019s use of the sea, it\u2019s difficult to decide which activity should be counted as seafarers\u2019 \u2018second oldest profession\u2019, but piracy and smuggling probably vie for the prize. Illegal fishing follows not far behind. It\u2019s no coincidence that the Fishery Protection Squadron is the oldest formed squadron of Britain\u2019s Royal Navy. Or that the international pennant to distinguish vessels on fishery protection duties dates back nearly 140 years.<\/p>\n

Natural disasters and the mechanisms to respond to them are another example. Those interested in understanding how humanitarian assistance can be coordinated by rival great powers and their navies would do well to study the interventions that followed the Messina earthquake in Sicily. It occurred 112 years ago.<\/p>\n

The latest misapplication of the term\u2014to pandemics\u2014is perhaps the most egregious example. Pandemics are indeed occasional, even rare, but the idea that they are \u2018non-traditional\u2019 is ludicrous. Such disasters for civilisations can be traced back to the beginning of recorded history. Even in the early Christian era, the Antonine Plague of the second century, the Plague of Justinian in the sixth century and that of Emmaeus in the seventh all had profound social, economic and political and thus strategic effects. The Black Death of the 14th century and the Great Plague of London in the 17th are just two more examples.<\/p>\n

There are good reasons why this unthinking application of jargon must stop. First, \u2018non-traditional\u2019 implies something new. Adopting the label too often means that the historical record is not consulted, the voice of experience is ignored, and the mistakes of the past are all too often repeated.<\/p>\n

As in the case of pandemics, it also contributes to our neglecting threats that are recurrent but rare. We discount the need to prepare for them because we pay too little attention to their catastrophic effects, which we have never studied. The belated rush to examine the experience of the Spanish influenza pandemic of 1918\u201319 is a case in point.<\/p>\n

Next, it implicitly minimises the importance of such threats for countries and communities\u2014particularly the smallest nation-states, which have always had them at the forefront of their security concerns. This dynamic is particularly apparent amongst the Pacific island countries. They have reason to be impatient with those preoccupied with nation-state rivalries at the expense of what the islands perceive to be existential threats.<\/p>\n

The label also makes it more difficult to identify what really is new in the forms of emerging threats\u2014and new in the shape of the customary ones. Transnational crime is hardly an innovation; it is criminal methods that are evolving. To give another example, the effect of climate change on natural disasters is a major cause for concern. Just what will more severe and frequent weather events mean for us? What needs to change in our preparations as well as in the mechanics of any humanitarian response? These are difficult questions but treating such subjects as something wholly new will lead at best to the reinvention of many wheels\u2014and, most likely, to a failure to achieve the most effective change and adaptation.<\/p>\n

I have suggested elsewhere<\/a> that what most military services need is less tradition and more history. In this matter, what many analysts of contemporary affairs need is less \u2018non-tradition\u2019 and more history. It might help them see through the glass, less darkly.<\/p>\n","protected":false},"excerpt":{"rendered":"

As a former naval officer and current student of maritime affairs, I have long been infuriated by the blanket use of the term \u2018non-traditional\u2019 to describe security threats external to those directly generated by the …<\/p>\n","protected":false},"author":76,"featured_media":56946,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_mi_skip_tracking":false,"footnotes":""},"categories":[1],"tags":[283,301,983],"class_list":["post-56944","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-general","tag-climate-change","tag-national-security-2","tag-pandemic"],"acf":[],"yoast_head":"\nLet\u2019s stop using the term \u2018non-traditional\u2019 about security threats | The Strategist<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.aspistrategist.ru\/lets-stop-using-the-term-non-traditional-about-security-threats\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Let\u2019s stop using the term \u2018non-traditional\u2019 about security threats | The Strategist\" \/>\n<meta property=\"og:description\" content=\"As a former naval officer and current student of maritime affairs, I have long been infuriated by the blanket use of the term \u2018non-traditional\u2019 to describe security threats external to those directly generated by the ...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.aspistrategist.ru\/lets-stop-using-the-term-non-traditional-about-security-threats\/\" \/>\n<meta property=\"og:site_name\" content=\"The Strategist\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/ASPI.org\" \/>\n<meta property=\"article:published_time\" content=\"2020-06-24T03:16:41+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2020\/06\/pirates2406.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1000\" \/>\n\t<meta property=\"og:image:height\" content=\"675\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"James Goldrick\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@ASPI_org\" \/>\n<meta name=\"twitter:site\" content=\"@ASPI_org\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"James Goldrick\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.aspistrategist.ru\/#website\",\"url\":\"https:\/\/www.aspistrategist.ru\/\",\"name\":\"The Strategist\",\"description\":\"ASPI's analysis and commentary site\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.aspistrategist.ru\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-AU\"},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-AU\",\"@id\":\"https:\/\/www.aspistrategist.ru\/lets-stop-using-the-term-non-traditional-about-security-threats\/#primaryimage\",\"url\":\"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2020\/06\/pirates2406.jpg\",\"contentUrl\":\"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2020\/06\/pirates2406.jpg\",\"width\":1000,\"height\":675},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.aspistrategist.ru\/lets-stop-using-the-term-non-traditional-about-security-threats\/\",\"url\":\"https:\/\/www.aspistrategist.ru\/lets-stop-using-the-term-non-traditional-about-security-threats\/\",\"name\":\"Let\u2019s stop using the term \u2018non-traditional\u2019 about security threats | The Strategist\",\"isPartOf\":{\"@id\":\"https:\/\/www.aspistrategist.ru\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.aspistrategist.ru\/lets-stop-using-the-term-non-traditional-about-security-threats\/#primaryimage\"},\"datePublished\":\"2020-06-24T03:16:41+00:00\",\"dateModified\":\"2020-06-24T03:16:41+00:00\",\"author\":{\"@id\":\"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/a9ee56242a6eb913591d14a06b13f9be\"},\"breadcrumb\":{\"@id\":\"https:\/\/www.aspistrategist.ru\/lets-stop-using-the-term-non-traditional-about-security-threats\/#breadcrumb\"},\"inLanguage\":\"en-AU\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.aspistrategist.ru\/lets-stop-using-the-term-non-traditional-about-security-threats\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.aspistrategist.ru\/lets-stop-using-the-term-non-traditional-about-security-threats\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.aspistrategist.ru\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Let\u2019s stop using the term \u2018non-traditional\u2019 about security threats\"}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/a9ee56242a6eb913591d14a06b13f9be\",\"name\":\"James Goldrick\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-AU\",\"@id\":\"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/009826d42ec0f0972bfc27d573118e26?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/009826d42ec0f0972bfc27d573118e26?s=96&d=mm&r=g\",\"caption\":\"James Goldrick\"},\"url\":\"https:\/\/www.aspistrategist.ru\/author\/james-goldrick\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Let\u2019s stop using the term \u2018non-traditional\u2019 about security threats | The Strategist","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.aspistrategist.ru\/lets-stop-using-the-term-non-traditional-about-security-threats\/","og_locale":"en_US","og_type":"article","og_title":"Let\u2019s stop using the term \u2018non-traditional\u2019 about security threats | The Strategist","og_description":"As a former naval officer and current student of maritime affairs, I have long been infuriated by the blanket use of the term \u2018non-traditional\u2019 to describe security threats external to those directly generated by the ...","og_url":"https:\/\/www.aspistrategist.ru\/lets-stop-using-the-term-non-traditional-about-security-threats\/","og_site_name":"The Strategist","article_publisher":"https:\/\/www.facebook.com\/ASPI.org","article_published_time":"2020-06-24T03:16:41+00:00","og_image":[{"width":1000,"height":675,"url":"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2020\/06\/pirates2406.jpg","type":"image\/jpeg"}],"author":"James Goldrick","twitter_card":"summary_large_image","twitter_creator":"@ASPI_org","twitter_site":"@ASPI_org","twitter_misc":{"Written by":"James Goldrick","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebSite","@id":"https:\/\/www.aspistrategist.ru\/#website","url":"https:\/\/www.aspistrategist.ru\/","name":"The Strategist","description":"ASPI's analysis and commentary site","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.aspistrategist.ru\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-AU"},{"@type":"ImageObject","inLanguage":"en-AU","@id":"https:\/\/www.aspistrategist.ru\/lets-stop-using-the-term-non-traditional-about-security-threats\/#primaryimage","url":"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2020\/06\/pirates2406.jpg","contentUrl":"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2020\/06\/pirates2406.jpg","width":1000,"height":675},{"@type":"WebPage","@id":"https:\/\/www.aspistrategist.ru\/lets-stop-using-the-term-non-traditional-about-security-threats\/","url":"https:\/\/www.aspistrategist.ru\/lets-stop-using-the-term-non-traditional-about-security-threats\/","name":"Let\u2019s stop using the term \u2018non-traditional\u2019 about security threats | The Strategist","isPartOf":{"@id":"https:\/\/www.aspistrategist.ru\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.aspistrategist.ru\/lets-stop-using-the-term-non-traditional-about-security-threats\/#primaryimage"},"datePublished":"2020-06-24T03:16:41+00:00","dateModified":"2020-06-24T03:16:41+00:00","author":{"@id":"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/a9ee56242a6eb913591d14a06b13f9be"},"breadcrumb":{"@id":"https:\/\/www.aspistrategist.ru\/lets-stop-using-the-term-non-traditional-about-security-threats\/#breadcrumb"},"inLanguage":"en-AU","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.aspistrategist.ru\/lets-stop-using-the-term-non-traditional-about-security-threats\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.aspistrategist.ru\/lets-stop-using-the-term-non-traditional-about-security-threats\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.aspistrategist.ru\/"},{"@type":"ListItem","position":2,"name":"Let\u2019s stop using the term \u2018non-traditional\u2019 about security threats"}]},{"@type":"Person","@id":"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/a9ee56242a6eb913591d14a06b13f9be","name":"James Goldrick","image":{"@type":"ImageObject","inLanguage":"en-AU","@id":"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/009826d42ec0f0972bfc27d573118e26?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/009826d42ec0f0972bfc27d573118e26?s=96&d=mm&r=g","caption":"James Goldrick"},"url":"https:\/\/www.aspistrategist.ru\/author\/james-goldrick\/"}]}},"_links":{"self":[{"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/posts\/56944"}],"collection":[{"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/users\/76"}],"replies":[{"embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/comments?post=56944"}],"version-history":[{"count":4,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/posts\/56944\/revisions"}],"predecessor-version":[{"id":56949,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/posts\/56944\/revisions\/56949"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/media\/56946"}],"wp:attachment":[{"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/media?parent=56944"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/categories?post=56944"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/tags?post=56944"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}