The origins of the FVEY can be traced back to the post–World War II period, when the Atlantic Charter was issued by the Allies to lay out their goals for a post-war world. During the course of the Cold War, the ECHELON surveillance system was initially developed by the FVEY to monitor the communications of the former Soviet Union and the Eastern Bloc, although it is now used to monitor billions of private communications worldwide.
In the late 1990s, the existence of ECHELON was disclosed to the public, triggering a major debate in the European Parliament and, to a lesser extent, the United States Congress. As part of efforts in the ongoing War on Terror since 2001, the FVEY further expanded their surveillance capabilities, with much emphasis placed on monitoring the World Wide Web. The former NSA contractor Edward Snowden described the Five Eyes as a "supra-national intelligence organisation that does not answer to the known laws of its own countries". Documents leaked by Snowden in 2013 revealed that the FVEY have been spying on one another's citizens and sharing the collected information with each other in order to circumvent restrictive domestic regulations on surveillance of citizens.
In spite of continued controversy over its methods, the Five Eyes relationship remains one of the most comprehensive known espionage alliances in history.
NSA Headquarters, Fort Meade, Maryland, United States
In 1948, the treaty was extended to include Canada, followed by Norway (1952), Denmark (1954), West Germany (1955), Australia (1956), and New Zealand (1956). These countries participated in the alliance as "third parties". By 1955, the formal status of the remaining Five Eyes countries was officially acknowledged in a newer version of the UKUSA Agreement that contained the following statement:
The "Five Eyes" term has its origins as a shorthand for a "AUS/CAN/NZ/UK/US EYES ONLY" (AUSCANNZUKUS) classification level.
Cold War (1950s–1990s)
During the Cold War, the GCHQ and the NSA shared intelligence on the Soviet Union, the People's Republic of China, and several eastern European countries (known as Exotics). Over the course of several decades, the ECHELON surveillance network was developed to monitor the military and diplomatic communications of the Soviet Union and its Eastern Bloc allies.
During the Vietnam War, Australian and New Zealand operators in the Asia-Pacific region worked directly to support the United States, while GCHQ operators stationed in the (then) British colony of Hong Kong were tasked with monitoring North Vietnamese air defence networks. During the Falklands War, the British received intelligence data from its FVEY allies such as Australia, as well as from third parties such as Norway and France. In the aftermath of the Gulf War, a technician of the ASIS was used by SIS to bug Kuwaiti government offices.
By the end of the 20th century, the ECHELON surveillance network had evolved into a global system capable of sweeping up massive amounts of private and commercial communications, including telephone calls, fax, e-mail and other data traffic. This was done through the interception of communication bearers such as satellite transmission and public switched telephone networks.
The Five Eyes has two types of information collection methods: the PRISM program and the Upstream collection system. The PRISM program gathers user information from technology firms such as Google, Apple and Microsoft, while the Upstream system gathers information directly from the communications of civilians via fiber cables and infrastructure as data flows past. In 1988, Duncan Campbell revealed in the New Statesman the existence of ECHELON, an extension of the UKUSA Agreement on global signals intelligence [Sigint]. The story, 'Somebody's listening,' detailed how the eavesdropping operations were not only being employed in the interests of 'national security,' but were regularly abused for corporate espionage in the service of US business interests. The piece passed largely unnoticed outside of journalism circles.
In 1996, a detailed description of ECHELON was provided by New Zealand journalist Nicky Hager in a book titled "Secret Power – New Zealand's Role in the International Spy Network", which was cited by the European Parliament in a 1998 report titled "An Appraisal of the Technology of Political Control" (PE 168.184). On 16 March 2000, the Parliament called for a resolution on the Five Eyes and their ECHELON surveillance network, which, if passed, would have called for the "complete dismantling of ECHELON".
During the run-up to the Iraq War, the communications of UN weapons inspector Hans Blix were monitored by the Five Eyes. The office of UN Secretary-General Kofi Annan was bugged by British agents. An NSA memo detailed plans of the Five Eyes to boost eavesdropping on UN delegations of six countries as part of a "dirty tricks" campaign to apply pressure on these six countries to vote in favour of using force against Iraq.
As of 2010, the Five Eyes also have access to SIPRNet, the U.S. government's classified version of the Internet.
In 2013, documents leaked by the former NSA contractor Edward Snowden revealed the existence of numerous surveillance programs jointly operated by the Five Eyes. The following list includes several notable examples reported in the media:
PRISM – Operated by the NSA together with the GCHQ and the ASD
XKeyscore – Operated by the NSA with contributions from the ASD and the GCSB
In recent years, documents of the FVEY have shown that they are intentionally spying on one another's citizens and sharing the collected information with each other in order to circumvent restrictive domestic regulations on spying.
Shami Chakrabarti, the director of the advocacy group Liberty, claimed that the FVEY alliance increases the ability of member states to "subcontract their dirty work" to each other. The former NSA contractor Edward Snowden described the FVEY as a "supra-national intelligence organisation that doesn't answer to the laws of its own countries".
As a result of Snowden's disclosures, the FVEY alliance has become the subject of a growing amount of controversy in parts of the world:
Canada: In late 2013, Canadian federal judge Richard Mosley strongly rebuked the CSIS for outsourcing its surveillance of Canadians to overseas partner agencies. A 51-page court ruling asserts that the CSIS and other Canadian federal agencies have been illegally enlisting FVEY allies in global surveillance dragnets, while keeping domestic federal courts in the dark.
New Zealand: In 2014, the NZSIS and the GCSB of New Zealand were asked by the New Zealand Parliament to clarify if they had received any monetary contributions from members of the FVEY alliance. Both agencies withheld relevant information and refused to disclose any possible monetary contributions from the FVEY.David Cunliffe, leader of the Labour Party, asserted that the public is entitled to be informed.
Since the addition of two members in 1956, the specific Five Eyes consist of Australia (accepted 1956), Canada (accepted 1948), New Zealand (accepted 1956), the United Kingdom (co-creator 1946), and the United States (co-creator 1946). Further, there is a group of nations termed '3rd Party Partners', which share their intelligence with the 5 Eyes.
While the Five Eyes is a very specific agreement with specific operations amongst the five nations, other non-FVEY sharing agreements have been set up independently and for specific purposes. For example, according to Edward Snowden, the NSA has a "massive body" called the Foreign Affairs Directorate that is responsible for partnering with foreign countries.
According to the news magazineL'Obs, in 2009, the United States proposed to France to join the Five Eyes, that would then have become the "Six Eyes". Nicolas Sarkozy however made the requirement to be granted the same status as other allies, including the signing of a "no-spy agreement". This requirement was approved by the director of the NSA, but not by the director of the CIA, and furthermore not by President Barack Obama, resulting in a refusal from France.
As spelled out by Privacy International, there are a number of issue-specific intelligence agreements that include some or all the above nations and numerous others, such as:
An area specific sharing amongst the 41 nations that formed the allied coalition in Afghanistan;
A shared effort of the Five Eyes nations in "focused cooperation" on computer network exploitation with Austria, Belgium, Czech Republic, Denmark, Germany, Greece, Hungary, Iceland, Italy, Japan, Luxembourg, the Netherlands, Norway, Poland, Portugal, South Korea, Spain, Sweden, Switzerland and Turkey;
Club of Berne: 17 members including primarily European States; the US is not a member;
The Counterterrorist Group: a wider membership than the 17 European States that make up the Club of Berne, and includes the US;
NATO Special Committee: made up of the heads of the security services of NATO's 28 member countries;
List of FVEY surveillance targets
As the surveillance capabilities of the FVEY continue to increase to keep up to pace with technological advancements, a global surveillance system has been gradually developed to capture the communications of entire populations across national borders. The following list contains a handful of targets of the FVEY who are public figures in various fields. In order for a person to be included in the list, there must be well-documented evidence based on reliable sources, such as leaked or declassified documents or whistleblower accounts, which demonstrate that the person involved is, or was, intentionally targeted for FVEY surveillance.
A British comedian, filmmaker, and composer who rose to fame in the silent era, Charlie Chaplin became one of the most important figures in the film industry through his screen persona "the Tramp". Due to his alleged ties to communism, he was placed under surveillance in the early 1950s by MI5 agents, who acted on behalf of the FBI as part of a campaign to banish him from the United States.
A South African activist, lawyer, and philanthropist who served as President of South Africa from 1994 to 1999, Nelson Mandela was denounced as a terrorist by critics and was placed under surveillance by British SIS agents. In 1962, Mandela was arrested after details of his terrorist activities were picked up by the CIA and handed over to local authorities.
An American actress, writer, political activist and former fashion model. Due to her political activism, her communications as well as those of her husband, Tom Hayden, were intercepted by the GCHQ and handed over to the NSA.
A British musician, songwriter, and a lead singer of The Beatles, John Lennon engaged in anti-war activism through several iconic songs such as "Give Peace a Chance" and "Happy Xmas (War Is Over)". In 1971, he moved to New York City to join activists in the United States to protest against the Vietnam War. Over the next 12 months, the U.S. government launched an extensive surveillance operation to monitor his activities and to deport him back to Britain. The operation was conducted by the FBI with the help of MI5.
A firm opponent of the international usage of land mines, the Princess of Wales was placed under surveillance by the GCHQ and the NSA, which kept a top secret file on her containing more than 1,000 pages. The contents of Diana's NSA file cannot be disclosed because of national security concerns.
A German-Finnish Internet entrepreneur, businessman, and hacktivist, Kim Dotcom (born Kim Schmitz) is the founder of the file hosting service Megaupload. On behalf of the FBI, the GCSB of New Zealand conducted illegal surveillance on Dotcom. Prime Minister John Key later issued an apology for the GCSB's illegal surveillance.
^Anderlini, Jamil (1 June 2014). "Tiananmen Square: the long shadow". Financial Times. Retrieved 2 June 2014. The extraction missions, aided by MI6, the UK’s Secret Intelligence Service, and the CIA, according to many accounts, had scrambler devices, infrared signallers, night-vision goggles and weapons.
This page is based on a Wikipedia article written by authors
Text is available under the CC BY-SA 3.0 license; additional terms may apply.
Images, videos and audio are available under their respective licenses.