Five Eyes Spies Turn To Commercial Innovation

Earlier this year, the United Kingdom, Australia, Canada and New Zealand, which along with the United States are members of the “Five Eyes” alliance, agrred to collectively attribute to Russia what may be the most costly cyber-attack in historyThis public affirmation provided a rare glimpse into the depth of defense cooperation among the world’s English-speaking democracies.

Formalised in 1955, Five Eyes collaboration has proven a remarkable success both throughout the Cold War and in the post-9/11 era of counter-terrorism. The informal alliance has until now remained rooted in intelligence sharing. However, in a world of complex and rapidly evolving security challenges, the Five Eye countries should consider a new area of shared focus: leveraging the commercial technology sector to address common national security concerns.

This new focus would complement existing collaboration among the United States, the United Kingdom, Australia, Canada, and New Zealand. 

The five countries already cooperate on defense science and research through The Technical Cooperation Program, an arrangement that today covers 11 major areas, including electronic warfare, conventional weapons and materials processing, and involves 1,000 scientists. 

Collaboration under the TTCP is likely set to expand: last year, the US Congress added Australia and the United Kingdom to the National Technology and Industrial Base, a legal framework previously limited to the United States and Canada, creating new opportunities for joint R&D and controlled technology transfer.

Members of the Five Eyes have also long worked to standardise operating practices and technical specifications, efforts critical to allowing military forces of the five countries to operate together. 

Cooperation in this area includes the Air and Space Interoperability Council, the Australia, Canada, New Zealand, UK and US Naval C4 Organization, and the Combined Communications-Electronics Board. Military embeds and liaison officers, some serving in senior roles, further bolster interoperability. However, the Five Eye countries have yet to come together to fully leverage one of their most impressive assets: commercial technology sectors. 

Unlike during the Cold War, R&D spending today is largely driven by private industry, while advances in cutting-edge fields, such as artificial intelligence, often originate from outside government labs and traditional defense companies. 
Sustaining qualitative military advantage and generating concrete solutions to specific national security challenges will increasingly hinge on harvesting commercial technology. 

Individually, members of the Five Eyes are starting to move in this direction.

  • The United States has established the DIUx in Silicon Valley and elsewhere, as well as more tailored platforms such as AFWERX and SOFWERX, which are intended to build innovative communities around a specific service or combatant command’s requirements. 
  • The UK has jHub based in its Joint Forces Command. Australia recently set up the Defence Innovation Hub, focused on facilitating new technologies that may have a defense application. 
  • Canada recently launched the Innovation for Defence Excellence and Security which is designed to create competitive projects around thematic defense areas for the commercial sector.
  • New Zealand has its own similar initiatives on a smaller scale.

Now is the moment for Five Eye members to build on these individual efforts and collectively focus on a set of shared defense challenges and emerging technology opportunities.

One immediate area for cooperation is addressing the burgeoning threat to Five Eye country space assets from both the kinetic and non-kinetic capabilities of potential adversaries. With growing overlap between commercial and defense activities in space, this is an area ripe for governments to collaborate with the commercial technology sector. Indeed, many of the most promising solutions to space threats, such as constellations of small satellites and short-notice launch from diverse locations, will rely on innovations emerging from the non-traditional space industry.

Another challenge to Five Eye members that may be suited to solutions from the commercial technology sector is monitoring wide geographic expanses for military activities undertaken by newly capable competitors. 

As China’s ability to project naval and air power deep into the Indo-Pacific continues to improve, the United States, Australia and New Zealand will experience an uptick in the need for more persistent and ubiquitous maritime sensors. In the North Atlantic, Russia’s reinvigorated submarine presence will similarly create a growing demand for the United States, the United Kingdom, and Canada to develop and deploy new types of sensors for undersea warfare.
Beyond addressing shared operational problems, Five Eyes members could in concert engage the commercial sector to unlock the potential of emerging technology areas to contribute to defense. 

Three opportunities stand out.

The first technology area is artificial intelligence, specifically, its less controversial national security applications such as tracking online influence attempts by potential adversaries and monitoring financial flows for sanctions violations. 

The second is quantum technology. Advances in this field could have defense applications, ranging from creating more secure communications to detecting submarines. Already, a number of private quantum technology companies are beginning to appear in Five Eye members. 

The third area is virtual reality, a technology that could improve the war gaming and simulations central to designing new military operational concepts. DIUx has already begun exploring this avenue, awarding the UK-based simulations company Improbable a $5.8 million contact in 2016.

The members of the Five Eyes collectively have some of the most abundant venture capital markets, diverse commercial technology sectors, and dynamic entrepreneurs in the world. The challenge is how to best integrate these assets to advance their shared security needs.

One option would be to launch a “Five Eyes Grand Challenge” modeled after DARPA’s highly successful series, but open to engineering teams and entrepreneurs from all five countries focusing on developing solutions to a common military operational problem. 

Another would be to directly connect the growing number of defense innovation hubs in Five Eyes countries. Establishing a Five Eye liaison cell within DIUx, or embedding DIUx personnel within similar organizations in Five Eye countries would start to build a network that would complement the more traditional defense science work of the TTCP. One of the advantages of collaboration among Five Eye members to harness commercial technology for national security applications is the opportunity to share the investment burden, making limited resources go farther. 

Establishing a Five Eyes fund, managed by DIUx or a similar organisation that would make targeted prototype contracts on innovations relevant to all members would be one way to do this. 

Another would be to build a “Five Eyes Foundry” with public and private sector funding, bringing entrepreneurs and engineers together to build companies around particular national security themes. 

If successful, the foundry could be expanded and specialised so that, for example, the United States might host a space-focused model, while Australia could choose to build one around the burgeoning field of quantum technology.
Many of these options will face significant bureaucratic hurdles, ranging from export controls to barriers to Five Eye nationals working on sensitive projects in each other’s defense industries. 

The expansion of the National Technology Industry Base may go some way to addressing these issues; early “Pathfinder” projects are already underway exploring how the recent legislation will open new avenues for cooperation involving the United States, Canada, Australia, and the United Kingdom. 

A potentially more intractable challenge is domestic politics: each country has a strong incentive to favor its own industry, even if taking this approach will create redundancies and reduce Five Eye members’ overall access to commercial innovation relevant to national security.

Cooperation among Five Eye countries has proven effective and successful in intelligence, defense science, and military standardisation. 

With growing civil-military fusion among some of their competitors and a widening array of national security challenges, the group should look to new ways to bolster the innovation that underpins its qualitative military advantage. 

Five Eye members may individually succeed in harnessing commercial technology for defense; the sum of their collaboration will far outweigh these national-level efforts.

DefenseOne:

You Might Also Read: 

Top Cyber Spy Warns Against AI:

Canada’s Electronic Spies Unleashed:

Getting Intelligence Agencies To Adapt To Life Out Of The Shadows:

 

« Snowden Describes Russian Government As 'corrupt'
Facebook Loses $123 Billion In Value »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Assure Technical

Assure Technical

Assure Technical offers a holistic approach to Technical Security. Our expertise and services span across the Physical, Cyber and Counter Surveillance domains.

SI-CERT

SI-CERT

SI-CERT (Slovenian Computer Emergency Response Team) is the national cyber scurity incident response center for Slovenia.

Superscript

Superscript

Superscript (formerly Digital Risks) is an insurance broker for small businesses, sole-traders, landlords and high-growth tech firms. Our services include Cyber Liability insurance.

TeleTrusT

TeleTrusT

TeleTrust is an IT Security association and network for IT security comprising members from industry, administration, consultancy and research.

2Secure

2Secure

2Secure is one of Sweden's largest private security companies. Service inlcude personal security, corporate security, information and cyber security.

PCI Pal

PCI Pal

PCI Pal’s secure cloud payment solutions are certified to the highest level of security by the leading card companies.

Cyberens

Cyberens

Cyberens provide cybersecurity consulting services in IT sectors relating to defense and space, banking, industrial control systems and IoT.

Clavis Information Security

Clavis Information Security

Clavis is an Information Security company offering a complete portfolio of solutions from Pentesting and Security Assessments to Managed Security Services and Training.

Ten Eleven Ventures

Ten Eleven Ventures

Ten Eleven is a specialized venture capital firm exclusively dedicated to helping cybersecurity companies thrive.

Aristi Technologies

Aristi Technologies

Aristi provides cybersecurity risk and compliance services to help manage your unique cyber risks, safeguarding your systems and data and complying with government and industry standards.

Open Data Security (ODS)

Open Data Security (ODS)

Open Data Security is a market leader in the information security sector, offering services to companies, governments and individuals, helping them shield from hackers and cyber attacks.

Dr Web

Dr Web

Since 1992 the Russian anti-virus Dr.Web has been helping companies to keep their digital assets protected and operate in a secure digital environment.

Celcom

Celcom

Celcom is the oldest mobile telecommunications provider in Malaysia, providing solutions and services to consumers and businesses.

SubCom

SubCom

How Much Do You Trust Your Endpoint? With our ‘Habituation Neural Fabric’ based endpoint security platform, you can observe and manage the Trust Score of your endpoints in real-time.

WeVerify

WeVerify

WeVerify is a platform for collaborative, decentralised content verification, tracking, and debunking.

Internet Initiative Japan (IIJ)

Internet Initiative Japan (IIJ)

IIJ is one of Japan's leading Internet-access and comprehensive network solutions providers.