The Five Eye Alliance ( FVEY -United States, United Kingdom, Canada, Australia, and New Zealand) was front and center at the 2024 Department of Defense Intelligence Information System (DoDIIS) Worldwide Conference, with the need for joint collaboration as a key to the alliance’s ability to be successful.

A plenary session was held with the Five Eye Panel, moderated by Major-General Dominic J.A. Goulet, CD, deputy director for Commonwealth integration DIA.

The panelists were:

  • Mr. Austin Martin, assistant director FVEY IT interoperability, DIA;
  • Jack Martin, chief information officer for Defence Intelligence, United Kingdom Ministry of Defence;
  • Brigadier Andrew McBaron, AM – director general – Intelligence Data and Targeting, Department of Defence Australia;
  • Captain Brendon Oakley, RNZN deputy chief of Defence Intelligence, New Zealand Defense Force; and
  • Brigadier-General Eric Vandenberg, director, General Intelligence Enterprise, Department of National Defence Canada.

It’s often said, the FVEY, are five nations separated by a common language, and within the partnership it is not just a saying, it is a reality. Close and continuous collaboration and shared understanding of the nuances of each other’s meaning is paramount, and requires a good deal of shared patience. The investment ensures that meaning and intent are understood universally.

General Vandenberg noted how policies and technologies “have a natural tension” and legacy systems replacement serves to drive policy advancement, in tandem, as policy development has to keep up with directives and vice versa.  Austin Martin aded the assembled when pushing forward initiatives, specifically those which are to the benefit of the FVEY, that one should not stop at the first, “NO.” That answer may just be indicative of a “policy hiccup” or “having the wrong stakeholders in the room.”  While, Jack Martin emphasized how the “FVEY tech landscape was complex.”

The consensus of the panel was for intelligence organizations and the FVEY would benefit greatly if the underlying systems were designed to share, collectors and systems collecting intelligence collected with sharing in mind and that those writing intelligence reports, briefs, alerts, advisories, etc, would write to share, the alliance works more smoothly as all have available the same information to make collaborative decisions. With Brigadier McBaron noting that interoperability must be built in at the forefront, by decision.

Five Eye Secure Innovation

Contemporaneously, the FVEY members issued a joint security advice campaign “Secure Innovation”  for technology startups. “The Five Eyes partners face unprecedented threats to our emerging tech ecosystems. So, today we’re arming tech firms across our nations with guidance on how to secure the innovation so critical to our future,” said Mike Casey, Director of the National Counterintelligence and Security Center (NCSC). “This guidance is designed to help tech startups protect their innovation, reputation, and growth, while also helping tech investors fortify their portfolio companies against security risks.”

1. Know the threats.

Innovative companies, particularly those with weak security, are targets for state actors, competitors, and criminals looking to steal technology for their benefit. Protect your innovation, your people, and your reputation.

2. Secure your environment.

Manage your business security risks. Appoint a Board-level security lead who factors security into business decisions and initiates a security dialogue within the business. Identify what matters most to your business. Assess security risks alongside other risks to your business. Focus security measures around your critical assets.

3. Secure your products.

Build security into your products from the start. Ensure you are actively protecting and managing your intellectual property and assets.

4. Secure your partnerships.

Build secure partnerships with investors, suppliers, and collaborators. Think about who you are working with, what you are sharing, and how you protect your innovation.

5. Secure your growth.

Expand safely into new markets by considering how U.S. laws and local laws and regulations in foreign countries could affect your business. As your team grows, foster a positive security culture and use pre-employment screening, security training, and role-specific security support to build a trusted workforce. The damage caused by a security breach can be reduced through a well-planned and executed response.

Related News

Christopher Burgess (@burgessct) is an author and speaker on the topic of security strategy. Christopher, served 30+ years within the Central Intelligence Agency. He lived and worked in South Asia, Southeast Asia, the Middle East, Central Europe, and Latin America. Upon his retirement, the CIA awarded him the Career Distinguished Intelligence Medal, the highest level of career recognition. Christopher co-authored the book, “Secrets Stolen, Fortunes Lost, Preventing Intellectual Property Theft and Economic Espionage in the 21st Century” (Syngress, March 2008). He is the founder of securelytravel.com