"Non-traditional threats such as terrorism, piracy, and cyber attacks require a different set of capabilities." . . . .