Five Eyes Spies Turn To Commercial Innovation

Earlier this year, the United Kingdom, Australia, Canada and New Zealand, which along with the United States are members of the “Five Eyes” alliance, agrred to collectively attribute to Russia what may be the most costly cyber-attack in historyThis public affirmation provided a rare glimpse into the depth of defense cooperation among the world’s English-speaking democracies.

Formalised in 1955, Five Eyes collaboration has proven a remarkable success both throughout the Cold War and in the post-9/11 era of counter-terrorism. The informal alliance has until now remained rooted in intelligence sharing. However, in a world of complex and rapidly evolving security challenges, the Five Eye countries should consider a new area of shared focus: leveraging the commercial technology sector to address common national security concerns.

This new focus would complement existing collaboration among the United States, the United Kingdom, Australia, Canada, and New Zealand. 

The five countries already cooperate on defense science and research through The Technical Cooperation Program, an arrangement that today covers 11 major areas, including electronic warfare, conventional weapons and materials processing, and involves 1,000 scientists. 

Collaboration under the TTCP is likely set to expand: last year, the US Congress added Australia and the United Kingdom to the National Technology and Industrial Base, a legal framework previously limited to the United States and Canada, creating new opportunities for joint R&D and controlled technology transfer.

Members of the Five Eyes have also long worked to standardise operating practices and technical specifications, efforts critical to allowing military forces of the five countries to operate together. 

Cooperation in this area includes the Air and Space Interoperability Council, the Australia, Canada, New Zealand, UK and US Naval C4 Organization, and the Combined Communications-Electronics Board. Military embeds and liaison officers, some serving in senior roles, further bolster interoperability. However, the Five Eye countries have yet to come together to fully leverage one of their most impressive assets: commercial technology sectors. 

Unlike during the Cold War, R&D spending today is largely driven by private industry, while advances in cutting-edge fields, such as artificial intelligence, often originate from outside government labs and traditional defense companies. 
Sustaining qualitative military advantage and generating concrete solutions to specific national security challenges will increasingly hinge on harvesting commercial technology. 

Individually, members of the Five Eyes are starting to move in this direction.

  • The United States has established the DIUx in Silicon Valley and elsewhere, as well as more tailored platforms such as AFWERX and SOFWERX, which are intended to build innovative communities around a specific service or combatant command’s requirements. 
  • The UK has jHub based in its Joint Forces Command. Australia recently set up the Defence Innovation Hub, focused on facilitating new technologies that may have a defense application. 
  • Canada recently launched the Innovation for Defence Excellence and Security which is designed to create competitive projects around thematic defense areas for the commercial sector.
  • New Zealand has its own similar initiatives on a smaller scale.

Now is the moment for Five Eye members to build on these individual efforts and collectively focus on a set of shared defense challenges and emerging technology opportunities.

One immediate area for cooperation is addressing the burgeoning threat to Five Eye country space assets from both the kinetic and non-kinetic capabilities of potential adversaries. With growing overlap between commercial and defense activities in space, this is an area ripe for governments to collaborate with the commercial technology sector. Indeed, many of the most promising solutions to space threats, such as constellations of small satellites and short-notice launch from diverse locations, will rely on innovations emerging from the non-traditional space industry.

Another challenge to Five Eye members that may be suited to solutions from the commercial technology sector is monitoring wide geographic expanses for military activities undertaken by newly capable competitors. 

As China’s ability to project naval and air power deep into the Indo-Pacific continues to improve, the United States, Australia and New Zealand will experience an uptick in the need for more persistent and ubiquitous maritime sensors. In the North Atlantic, Russia’s reinvigorated submarine presence will similarly create a growing demand for the United States, the United Kingdom, and Canada to develop and deploy new types of sensors for undersea warfare.
Beyond addressing shared operational problems, Five Eyes members could in concert engage the commercial sector to unlock the potential of emerging technology areas to contribute to defense. 

Three opportunities stand out.

The first technology area is artificial intelligence, specifically, its less controversial national security applications such as tracking online influence attempts by potential adversaries and monitoring financial flows for sanctions violations. 

The second is quantum technology. Advances in this field could have defense applications, ranging from creating more secure communications to detecting submarines. Already, a number of private quantum technology companies are beginning to appear in Five Eye members. 

The third area is virtual reality, a technology that could improve the war gaming and simulations central to designing new military operational concepts. DIUx has already begun exploring this avenue, awarding the UK-based simulations company Improbable a $5.8 million contact in 2016.

The members of the Five Eyes collectively have some of the most abundant venture capital markets, diverse commercial technology sectors, and dynamic entrepreneurs in the world. The challenge is how to best integrate these assets to advance their shared security needs.

One option would be to launch a “Five Eyes Grand Challenge” modeled after DARPA’s highly successful series, but open to engineering teams and entrepreneurs from all five countries focusing on developing solutions to a common military operational problem. 

Another would be to directly connect the growing number of defense innovation hubs in Five Eyes countries. Establishing a Five Eye liaison cell within DIUx, or embedding DIUx personnel within similar organizations in Five Eye countries would start to build a network that would complement the more traditional defense science work of the TTCP. One of the advantages of collaboration among Five Eye members to harness commercial technology for national security applications is the opportunity to share the investment burden, making limited resources go farther. 

Establishing a Five Eyes fund, managed by DIUx or a similar organisation that would make targeted prototype contracts on innovations relevant to all members would be one way to do this. 

Another would be to build a “Five Eyes Foundry” with public and private sector funding, bringing entrepreneurs and engineers together to build companies around particular national security themes. 

If successful, the foundry could be expanded and specialised so that, for example, the United States might host a space-focused model, while Australia could choose to build one around the burgeoning field of quantum technology.
Many of these options will face significant bureaucratic hurdles, ranging from export controls to barriers to Five Eye nationals working on sensitive projects in each other’s defense industries. 

The expansion of the National Technology Industry Base may go some way to addressing these issues; early “Pathfinder” projects are already underway exploring how the recent legislation will open new avenues for cooperation involving the United States, Canada, Australia, and the United Kingdom. 

A potentially more intractable challenge is domestic politics: each country has a strong incentive to favor its own industry, even if taking this approach will create redundancies and reduce Five Eye members’ overall access to commercial innovation relevant to national security.

Cooperation among Five Eye countries has proven effective and successful in intelligence, defense science, and military standardisation. 

With growing civil-military fusion among some of their competitors and a widening array of national security challenges, the group should look to new ways to bolster the innovation that underpins its qualitative military advantage. 

Five Eye members may individually succeed in harnessing commercial technology for defense; the sum of their collaboration will far outweigh these national-level efforts.

DefenseOne:

You Might Also Read: 

Top Cyber Spy Warns Against AI:

Canada’s Electronic Spies Unleashed:

Getting Intelligence Agencies To Adapt To Life Out Of The Shadows:

 

« Snowden Describes Russian Government As 'corrupt'
Facebook Loses $123 Billion In Value »

CyberSecurity Jobsite
Check Point

Directory of Suppliers

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Covenco

Covenco

Covenco is a data management and IT infrastructure specialist. Working with customers to transform their IT environments, with data protection and security at the forefront of everything we do.

Code Dx

Code Dx

Code Dx is a software application vulnerability correlation and management system.

Duo Security

Duo Security

Duo combines security expertise with a user-centered philosophy to provide two-factor authentication, endpoint remediation and secure single sign-on tools.

Intelligent Waves

Intelligent Waves

Intelligent Waves holds and manages contracts to provide an array of intelligence, operational, communications and IT support to the USG in austere, forward-deployed, hazardous duty environments.

Golden Frog

Golden Frog

Golden Frog is a Virtual Private Network services provider offering secure encrypted access to the internet.

Travelers

Travelers

Travelers is a leading writer of US commercial property casualty insurance and one of the world’s largest global insurers for cyber insurance.

Axonius

Axonius

Axonius is the only solution that offers a unified view of all assets and their coverage, empowering customers to take action to enforce their organization’s security policies.

SITA

SITA

SITA is a multinational information technology company providing IT and telecommunication services to the air transport industry including vulnerability assessments and managed security services.

CYBRScore

CYBRScore

CYBRScore is a premium, performance-based cyber skills training and assessment provider that quantifies a user’s ability to defend a network.

Glocomp Systems

Glocomp Systems

Glocomp Systems is one of Malaysia’s premier ICT infrastructure distributor offering a comprehensive portfolio of solutions including cybersecurity and privacy.

AnaVation

AnaVation

AnaVation is a trusted partner delivering high-value, cost-effective solutions that solve the most complex technical and analytical problems for our customers.

Adversa AI

Adversa AI

Adversa's mission is to build trust in AI and protect AI from cyber threats, privacy issues, and safety incidents.

Securious

Securious

If you need to improve your cyber security or achieve cyber security accreditations, Securious provide an independent service that will identify and address your issues quickly and efficiently.

Q-Bird

Q-Bird

Q*Bird's mission is to provide equipment for the current, and future European quantum internet.

Nexsan

Nexsan

Nexsan offers versatile and robust data storage solutions tailored to adapt seamlessly across a diverse range of sectors, ensuring reliable performance for critical data management.

Click Studios

Click Studios

Click Studios is an Agile software development company specialising in the development of a secure Enterprise Password Management solution called Passwordstate.