AUKUS Defence Pact Between US, Britain & Australia

AUKUS was announced by US President Joe Biden, UK Prime Minister Boris Johnson and Australia’s Scott Morrison on Wednesday 15th September. The new security partnership is one of the most  significant  international agreements since the end of the Cold War.  

While they did not mention China, AUKUS is being widely viewed as an effort to counter Chinese influence in the South China Sea. The pact, which will also see the allies share cyber capabilities, artificial intelligence and quantum  technologies, is a major strategic shift and is clearly an effort to counter China that will see the US and UK give Australia the technology to build nuclear-powered submarines.

The Chines government reacted swiftly to denounce the technology-sharing pact  as a threat to peace in the Indo-Pacific region. Chinese Foreign Ministry spokesperson Zhao Lijian said “outdated Cold War zero-sum mentality and narrow-minded geopolitical perception” that "intensified" a regional arms race and harmed international non-proliferation efforts. Some Australian strategists and politicians also share similar concerns and New Zealand, another member of the Five Eyes Alliance, is also aware of the danger from the new AUKUS pact and wants to stay away from it, especially Australian nuclear submarines. 

It means Australia will become just the seventh nation in the world to operate nuclear-powered submarines and the pact has raised fears that it could provoke China to armed conflict, although  British Prime Minister Boris Johnson told parliament that the agreement was "not intended to be adversarial" to China. It now seems likely that Britain will establish a more fixed presence in the Indo-Pacific under the auspices of AUKUS that might include basing British nuclear submarines in Australia or embedding British armed forces in the region. 

Chinese military experts warned that such a move will potentially make Australia a target of a nuclear strike if a nuclear war breaks out even although the US has said it won't arm Australia with nuclear weapons. “Through AUKUS our governments will strengthen the ability of each to support our security and defense interests, building on our longstanding and ongoing bilateral ties. We will promote deeper information and technology sharing.... We will foster deeper integration of security and defence-related science, technology, industrial bases, and supply chains. And in particular, we will significantly deepen cooperation on a range of security and defence capabilities,” says the US Government statement.

“A landmark defence and security partnership has been agreed by the leaders of the UK, the United States and Australia today which will protect and defend our shared interests in the Indo-Pacific... The development of Australia’s nuclear-powered submarines would be a joint endeavour between the three nations, with a focus on interoperability, commonality, and mutual benefit.”says a British government statement.

But  the US and UK are now facing growing international criticism over AUKUS and it is thought that Australia could now be a nuclear strike target by China following this security agreement and France is angered by Australia’s decision to cancel plans to buy a French-built fleet of submarines.  

The Chinese Ministry of Foreign Affairs has voiced criticism over the new trilateral agreement, which will see nuclear submarines built in Adelaide via a knowledge sharing and cyber security arrangement.

Meanwhile Washington has sought to address French anger over the loss of a multibillion-dollar submarine deal France had signed with Australia. France's Foreign Minister Jean-Yves Le Drian called the announcement a "stab in the back" and French diplomats cancelled a gala event in Washington celebrating historic ties between the US and France.

The White House:   Global Times:   Gov.UK:      Politico:    Defence Connect:   ASPI Strategist:

BBC:        Guardian:       Telegraph:        Independent:   

You Might Also Read: 

Australia Assaulted By Severe State-Backed Cyber Attacks:

 

« Everything You Need To Know About Business Password Safety
Zero Trust Architecture - No Longer A ‘Nice to Have’ »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 7,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Wizard Computing

Wizard Computing

Wizard Computer Services is a full service IT solutions provider that offers managed services, consultation, installation, and support to small and large businesses in New England.

Rohde & Schwarz Cybersecurity

Rohde & Schwarz Cybersecurity

Rohde & Schwarz Cybersecurity provide solutions for Secure Networks, Secure Communications, Network Analysis, and Endpoint Security.

Custodio Technologies

Custodio Technologies

Custodio Technologies was established as a Singaporean R&D Centre of Israel Aerospace Industries (IAI) in order to spearhead R&D activities in the field of cyber early warning.

Me Learning

Me Learning

Me Learning provides engaging, informative and clearly explained learning materials for complex and challenging professional environments in areas including GDPR and Information Governance.

Dhound

Dhound

Dhound is a cybersecurity company providing web application penetration testing.

CWSI

CWSI

CWSI provide a full suite of enterprise mobility, security and productivity solutions to many of Ireland and the UK’s most respected organisations across a wide range of industry and public sectors.

GeoEdge

GeoEdge

GeoEdge is the premier provider of ad security and quality solutions for the online and mobile advertising ecosystem.

Cyber1

Cyber1

CYBER1 is a leader in cyber security advisory and solutions. We are uniquely placed to help customers achieve cyber resilience and thus, safeguard reputation and value.

European Union Agency for Network and Information Security (ENISA)

European Union Agency for Network and Information Security (ENISA)

The European Union Agency for Cybersecurity, ENISA, is the Union’s agency dedicated to achieving a high common level of cybersecurity across Europe.

G-71

G-71

G-71 LeaksID is a cutting-edge ITM technology aimed at safeguarding sensitive documents from insider threats.

CentriVault

CentriVault

CentriVault is a leading independent provider of Cyber Security and Data protection services to small and medium enterprises (SMEs).

Kodem Security

Kodem Security

Our mission is to make AppSec simple. Meet the world’s first dynamic software composition analysis platform. Only Kodem uses runtime intelligence to determine application risk.

ZoobeTek

ZoobeTek

ZoobeTek are a company focused on preventing leaks related to the security of business information3.

SecureKloud Technologies

SecureKloud Technologies

SecureKloud is a global leader in the Cloud services arena. Our experience in cloud consulting and servicing for highly regulated industries extends more than a decade.

Cytacs

Cytacs

Cytacs is the AI-powered cyber security platform specifically designed for small and medium-scale enterprises.

Security Mind

Security Mind

Security Mind is an innovative Cyber Security Awareness program that aims to increase the awareness of each member of the organization and develop the ability to recognize potential cyber threats.