Skip to main content

The Five Eyes - Intelligence Alliance

 The Five Eyes intelligence alliance is a secretive coalition and surveillance arrangement of countries internationally which include the United States National Security Agency (NSA), Canada’s Communications Security Establishment Canada (CSEC), the United Kingdom’s Government Communications Headquarters (GCHQ), New Zealand’s Government Communications Security Bureau (GCSB) and the Australian Signals Directorate (ASD).

A series of bilateral agreements were developed in the beginning of 1946 by an alliance of five English-speaking countries over a period of time and became to known as the UKUSA agreement. This agreement established the Five Eyes alliance to share intelligence especially signals intelligence (SIGINT).

These five English-speaking countries for almost 70 years have been involved in the global surveillance spying on the communications all over the world and build an infrastructure to master the internet for surveillance.



What does the Five Eyes agreement states?

The agreements amongst the Five countries are not known despite being 70 years old. A very little information about the agreements between the Five Eyes countries is present in the books of history and usually references become the part of intelligence agency reporting. Also, limited information about what exactly the arrangement comprises the services themselves.

There has been a minimum appreciation for the extent of the arrangement within the governments of the five countries, which the intelligence agencies are meant to serve. The arrangement is so secretive that the Prime Minister of Australia was not informed of its reality until 1973 and it was not acknowledged officially by the government by its name until 1999. Yet, only a few documents have been released that discuss the surveillance by the Five Eyes.

The agreement states that interception, collection, analysis, acquisition, and decryption practiced by the individual country within their territory and all intelligence information are shared by default. The scope of the agreement is wide and jointly-run operation centers are established under the agreement where operatives from a number of intelligence agencies of the states from the Five Eyes work alongside each other.

To ensure that the Five Eyes alliance is more than just a set of collaboration principles, tasks are divided between SIGNIT agencies. The national product becomes so impossible to differentiate when the level of cooperation is complete.

Level of collaboration between the Five Eyes?

Specific technical programs of collection and analysis were developed and collaborated by the Five Eyes. A senior member of Britain’s intelligence community said “When you get a GCHQ pass it gives you access to the NSA too. You can walk into the NSA and find GCHQ staff holding senior management positions, and vice versa. When the NSA has a piece of intelligence, it will very often ask GCHQ for a second opinion. There have been ups and downs over the years, of course. But in general, the NSA and GCHQ are extremely close allies. They rely on each other.”

Recent documents revealed by Edward Snowden show the close alliance between the five countries. The classification “TOP SECRET//COMINT//REL TO USA, AUS, CAN, GBR, NZL” or “TOP SECRET//COMINT//REL TO USA, FVEY” included in almost all documents. The classification markings specify that the stuff is top-secret communications intelligence (aka SIGNIT) material which can be given out to Australia, Canada, US, United Kingdom and New Zealand. The main objective of REL TO is to recognize the information that has been classified which a party has already determined to be released through established foreign disclosure channels and methods, to an international organization or a foreign country.

Under the UKUSA agreement, the level of co-operation is so complete that the national product usually becomes hard to differentiate.

There is no embargo despite rumors of a “no-spy pact” on gathering the intelligence from the citizens of Five Eyes countries. There is a common understanding that the residents will not be targeted directly and where communications can be intercepted incidentally there will be an effort to lessen the employment and analysis of these communications by the intercepting state.

Some more surveillance alliances

Besides the Five Eyes alliance, there are a few of other surveillance partnerships also:
  • 9 Eyes: an addition in the Five Eyes which includes Denmark, France, Norway, and Netherlands.
  • 14 Eyes: an addition to the 9 Eyes which include Spain, Sweden, Italy, Belgium, and Germany.
  • 41 Eyes: includes all of the above with the allied coalition in Afghanistan.
  • Tier B countries with which the Five Eyes have “focused cooperation” on the network exploitation of the computer. The countries include Austria, Denmark, Czech Republic, Belgium, Hungry, Germany, Greece, Italy, Iceland, Japan, Norway, Luxembourg, Netherland, Poland, Spain, South Korea, Portugal, Turkey, Switzerland, and Sweden.
  • Club of Berne: 17 members excluding the US and including primarily European states.
  • The Counter Terrorist Group: it is a broad membership that includes the 17 European States of Club of Berne and also includes the US.
  • NATO Special Committee: it comprises of the head of the security services of member countries of NATO.
To fight against terrorism the ongoing war on terror since 2001 has led the Five Eyes to expand their surveillance activities with a greater focus on monitoring World Wide Web. Edward Snowden, the former NSA contractor has described the Five Eyes as supra-national intelligence organization that does not respond to their own countries laws.
The documents that were revealed by Edward Snowden in 2013 showed that these Five states have been involved in spying the one another’s citizens and share the gathered details with each other in order to evade restrictive domestic regulations on the citizen’s surveillance.
Some professionals of intelligence community despite the disclosures of Snowden believe that nothing can affect the coalition of the Five Eyes and which is regarded as one of the most comprehensive known intelligence alliances in history.

Comments

Popular posts from this blog

Fix HTTPS issue in browser - Burp Suite

If you get message "Software is Preventing Firefox From Safely Connecting to This Site. Most likely a safe site, but a secure connection could not be established. This issue is caused by The original certificate provided by the web server is untrusted., which is either software on your computer or your network." lets see the tutorial. 1. With Burp suite running, visit http://burp in your browser and click the "CA Certificate" link to download and save your Burp CA certificate. Remember where you save the Burp CA certificate.

Artillery - Binary Defense Project

Project Artillery is an open source project aimed at the detection of early warning indicators and attacks. The concept is that Artillery will spawn multiple ports on a system giving the attacker the idea that multiple ports are exposed. Additionally, Artillery actively monitors the filesystem for changes, brute force attacks, and other indicators of compromise. Artillery is a full suite for protection against attack on Linux and Windows based devices. It can be used as an early warning indicator of attackers on your network. Additionally, Artillery integrates into threat intelligence feeds which can notify when a previously seen attacker IP address has been identified. Artillery supports multiple configuration types, different versions of Linux, and can be deployed across multiple systems and events sent centrally. Artillery is a combination of a honeypot, monitoring tool, and alerting system. Eventually this will evolve into a hardening monitoring platform as well to detect ins...

How To Enable DNS over HTTPS

  DNS over HTTPS (DoH) is a protocol for performing remote Domain Name System (DNS) resolution via the HTTPS protocol. A goal of the method is to increase user privacy and security by preventing eavesdropping and manipulation of DNS data by man-in-the-middle attacks by using the HTTPS protocol to encrypt the data between the DoH client and the DoH-based DNS resolver. An alternative to DoH is the DNS over TLS (DoT) protocol, a similar standard for encrypting DNS queries, differing only in the methods used for encryption and delivery. On the basis of privacy and security, whether or not a superior protocol exists among the two is a matter of controversial debate, while others argue the merits of either depend on the specific use case. Benefits DoH improves privacy by hiding domain name lookups from someone lurking on public WiFi, your ISP, or anyone else on your local network. DoH, when enabled, ensures that your ISP cannot collect and sell personal information related to your br...