5 Eyes Alliance

All You Need to Know about 5 Eyes Alliance

Have you, at some point in your life ever gotten the feeling that somebody is watching you?

Maybe someone is watching all your moves as you move up and down the streets. Perhaps you catch them staring at you on the train, or maybe a system of international spying agencies/networks built for the sole purpose of spying on you.

Long gone are the days when such kind of ideas was thought to be in the movies only. In case you don’t know, it’s here, and it’s pretty real. Not so long ago, Edward Snowden revealed shocking details about the true extent of surveillance that regular citizens are subjected to on a daily basis. And surprisingly, it wasn’t the Russians or the Chinese undertaking these operations.

According to Snowden, it was the United Kingdom and the United States’ intelligence agencies that were primarily carrying out these operations, with permissions from their governments. So, have you ever asked yourself or come across the term the Five Eyes? At what time did it begin, and what roles do they play today?

Let’s explore what there’s to know about the Five Eyes, the largest intelligence-sharing group in existence.

The Five Eyes Alliance: Who are they?

The Five Eyes alliance is made up of a group of intelligence entities from several countries that work together in unison and exchange information with one another. As it currently stands, the nations that are involved include:

  • Canada
  • Australia
  • United States
  • United Kingdom
  • New Zealand
5 Eyes Alliance

Photo Credits: Medium

Each of the above five members shares chunks of intelligence strictly with the others. While the alliance primarily deals with matters to do with signals intelligence, the Five Eyes also involves itself in the gathering of geospatial information and human knowledge. In this group, undercover agents are used, as well as debriefings, interrogations, and even media exploitation.

But again, it’s important to note that there’s more than just the collection and sharing of data. Each member has got its technology to guard, while also having to be privy to some of the potential threats that threaten the globe.

The Five Eyes network has in place some agreements and how they have to work with the network allowing each member to focus on particular regions while maintaining the integrity of their systems.

A Brief Look at the Key Intelligence Agencies

Looking at each member country that is a party to the Five Eyes alliance, several intelligence agencies take part in the process of gathering and sharing data. The following is a brief look of every individual player’s intelligence agencies:

  • Australia – Security Intelligence Association, Australian Signals Directorate, Geospatial-Intelligence Organization, Secret Intelligence Service, Defense Intelligence Organization.
  • New Zealand – Security Intelligence Service, Government Communications Security Bureau, and Defense Intelligence and Security.
  • Canada – Security Intelligence Service, Communications Security Establishment, and Forces Intelligence Command.
  • United Kingdom – Defense Intelligence, Government Communications Headquarters, and the Secret Intelligence Service.
  • United States – the Federal Bureau of Investigation, National Security Agency, the Defense Intelligence Agency, and the Geospatial-Intelligence Agency.

The United States of America and Britain are the leading players, while Canada, New Zealand, and Australia act as “second parties.”

Shaping the Post-War World Era

How did the Five Eyes intelligent system begin? It all started as an intelligence-gathering and sharing agreement between the United Kingdom and the United States, immediately after the Second World War came to an end.

America and Britain wanted to work jointly against the axis powers, and sharing deciphered intelligence and intercepted communications became a big part of their cooperation. After all, the United Kingdom had managed to crack Germany’s hard-to-crack encryption with the United States achieving the same goal with the Purple cipher of Japan.

Immediately after the end of World War II, a secret treaty was immediately sealed by the USA and the U.K, a move that saw the formalization of an intelligent network that worked very well. Ten years later, Australia, Canada, and New Zealand joined the alliance making the total number of members to grow to five.

The collaboration was perceived as the best way of preventing the escalation, or the start of new conflicts with information about the activities of China, and the Soviet Union. The two were perceived as the most significant threats during the Cold War era. Of importance to note is that the activities of the Five Eyes aren’t strictly limited to keeping a check on Russia and China alone.

Four Most High-Profiles Incidents with the Five Eyes Involvement

Here is a brief look at some of the most talked-about incidents where the Five Eyes have been involved before:

  • Iran – It was in the 1950S when Britain’s Secret Intelligence Service and the Central Intelligence Agency worked in unison to incite a coup in Iran. This is a move that saw the country’s democratically elected Prime Minister toppled after nationalizing oil production.
  • D.R. Congo – Five Eyes was also involved in the assassination of D.R Congo’s first Prime Minister, Patrice Lumumba.
  • Chile – the CIA had invested a lot of money to prevent Salvador Allende from ascending to power. However, in 1970, Allende came into force with Australian Intelligence officers involved in the toppling of Allende.
  • China – in China, the Five Eyes has been involved in a lot of issues across the country. For instance, the Five Eyes assisted Chinese dissidents to escape arrests, among other actions.

Five Eyes in the Modern Era

Events that caused serious damage in areas across the globe are what a majority of people justify the need to have intelligence-sharing networks. The Five Eyes members think that preventing further attacks on innocent citizens and national infrastructure is their biggest priority.

Surveillance Programs Mainly Used by the Five Eyes

There are quite a several surveillance programs that the Five Eyes use to collect people’s data. While the list of such programs is somewhat vast, here is a brief look of some of the most known ones:

  • ECHELON

Undoubtedly, ECHELON is the most well-know surveillance program used in spying or gathering information. Created way back in the 1960s, the primary purpose of ECHELON was mainly to monitor military and diplomatic communications of the Eastern Bloc and the Soviet Union.

ECHELON gathers phrases, keywords, addresses, names, and other details. It then attempts to build something tangible out of the information it has gathered.

  • PRISM

This is also another surveillance tool used by the Five Eyes alliance. PRISM works by collecting information and any other data that travels over the internet.

What you need to be aware of here is that PRISM, used by Five Eyes intelligent officials can go to Google, Yahoo, and Facebook, forcing these firms to provide them with information of persons deemed people of interest.

  • Tempora

Even though Tempora is a newcomer when it comes to matters about surveillance, this surveillance program can effectively intercept personal data that is traveling along with the fiber optic cables that we usually use. Some of the information that this program can snipe and store includes:

  • The contents of email messages
  • The browsing history of any internet user
  • Recordings of phone calls
  • Entries made on Facebook

As you can see, there are quite many ways that the Five Eyes use to capture user information without the user not being even aware of. Besides Mr. Snowden has revealed a ton of information regarding surveillance activities of the Five Eyes. In today’s digital age, you need to be mindful that probably, there’s somebody somewhere watching all your moves and monitoring your data without you even knowing.

There is a confirmation that this intelligence gathering network is continuing to grow with the addition of new members. While the additional countries are deemed third-parties, nevertheless, this network continues to grow. Some of the original members include the following countries:

  • Denmark
  • Holland
  • France
  • Norway
  • Italy
  • Sweden
  • Germany
  • Belgium
  • Spain

Conclusion 

While it may not sound good at all, you may have to live with the fact that your private information is being collected, inspected, and shared, especially between government officials. There are chances that information that you would like to keep secret are in the servers of other countries.

It’s not easy to avoid being tracked while you are browsing online, especially now that we have the Five Eyes in place. While member countries justify that intelligence gathering is vital, there is some information that must remain private at all times and a VPN is here for that very reason.

A VPN provides you with robust encryption that encodes your online activities, rendering them of no use to a snooper. PureVPN, renowned for online privacy and security provides military-grade AES 256-bit encryption that keeps your online communications private. Even if someone were to tap on your VPN connection, all they’ll get is gibberish information.

Ather Owais Ather Owais is a tech and cybersecurity enthusiast. He is a strong advocate for online privacy and security, following technological trends and their impact on today's digital era.

Have Your Say!!

Join 3 million+ users to embrace internet freedom

Signup for PureVPN to get complete online security and privacy with a hidden IP address and encrypted internet traffic.

Shares