Earlier this year, the United Kingdom, Australia, Canada and New Zealand – which along with the United States are members of the “Five Eyes” alliance – came together to collectively attribute to Russia what may be the most costly cyber attack in history. This public affirmation provided a rare glimpse into the depth of defense cooperation among the world’s English-speaking democracies.
Formalized in 1955, Five Eyes collaboration has proven a remarkable success both throughout the Cold War and in the post-9/11 era of counterterrorism. The informal alliance has until now remained rooted in intelligence sharing. However, in a world of complex and rapidly evolving security challenges, the Five Eye countries should consider a new area of shared focus: leveraging the commercial technology sector to address common national security concerns.
This new focus would complement existing collaboration among the United States, the United Kingdom, Australia, Canada, and New Zealand. The five countries already cooperate on defense science and research through The Technical Cooperation Program, an arrangement that today covers 11 major areas, including electronic warfare, conventional weapons and materials processing, and involves 1,000 scientists. Collaboration under the TTCP is likely set to expand: last year, the U.S. Congress added Australia and the United Kingdom to the National Technology and Industrial Base – a legal framework previously limited to the United States and Canada – creating new opportunities for joint R&D and controlled technology transfer.
Members of the Five Eyes have also long worked to standardize operating practices and technical specifications, efforts critical to allowing military forces of the five countries to operate together. Cooperation in this area includes the Air and Space Interoperability Council, the Australia, Canada, New Zealand, UK and U.S. Naval C4 Organization, and the Combined Communications-Electronics Board. Military embeds and liaison officers – some serving in senior roles – further bolster interoperability.
Read the Full Article at Defense One
More from CNAS
PodcastWhen your data is held hostage
Technology and security expert Kara Frederick explains how and why U.S. local governments and electoral rolls are vulnerable to ransomware and what can be done about it. List...
By Kara Frederick
CommentarySetting the Stage for U.S. Leadership in 6G
Every day there are more headlines about China’s rise in 5G, the next generation of wireless communications technologies, and the economic and national security risksto the Un...
By Martijn Rasser
CommentaryChina’s Quantum Future
China should be a “global leader in innovation” by 2035, President Xi Jinping declared during the Chinese Communist Party’s 19th National Congress last October. His remarks re...
By Elsa B. Kania
PodcastTechnology and Innovation in an Era of U.S.-China Strategic Competition
China has taken significant steps to implement national strategies and encourage investment aimed at surpassing the U.S. in high-tech fields like artificial intelligence. In t...
By Elsa B. Kania