What is the Five Eyes Alliance, and how does it fuel global surveillance?
Countries around the world have formed alliances to track what their citizens do online. The Five Eyes Alliance, the most popular of all, collaborates to share this information between member nations. While they claim to be working for the greater good, the concerns for citizens’ privacy are significant. Here’s what it means for you if you live in one of these countries.
Table of Contents
Table of Contents
What is the Five Eyes Alliance?
The Five Eyes Alliance, also known as FVEY, is an intelligence coalition, which includes Australia, Canada, New Zealand, the United Kingdom, and the United States. Established after World War II, it is the oldest and most prominent of the global intelligence-sharing agreements. The alliance originated from the UKUSA Agreement, in which the above countries agreed to cooperate for signals intelligence (SIGINT). These partner countries collaborate closely, exchanging a wide spectrum of intelligence in a highly coordinated and unified manner, making it one of the most integrated multilateral intelligence arrangements globally.
The danger of the Five Eyes Alliance
Privacy experts have raised concerns that the cooperation within the Five Eyes enables extensive and potentially invasive monitoring of individuals in member countries, allowing them to gather information on their own people by proxy. For instance, while it may not be legal for the UK to directly surveil its citizens, the UK could request the US, a fellow FVEY member, to conduct the surveillance and share the information.
Another significant threat posed by the Five Eyes is the lack of transparency and accountability in its operations. The alliance’s secretive nature means that citizens have little insight into how their data is being collected, shared, and used, making it difficult to hold governments accountable for potential abuses of power. The Snowden revelations in 2013, which revealed the NSA’s spying, also brought to light the FVEY’s involvement.
What can you do to avoid the Five Eyes Alliance?
While it’s challenging to achieve complete privacy on the internet, there are steps you can take to reduce the risks posed by the Five Eyes Alliance. By being proactive and using various tools, you can enhance your online security and protect your personal information. Here’s what steps you can take to do so:
- Use encrypted communication tools. Only use messaging apps that offer end-to-end encryption. They will ensure your chats stay confidential.
- Use a VPN. A virtual private network (VPN) hides your internet activity by sending your data through its encrypted servers instead of the commercial ones owned by your ISP. So the chance to be tracked with a VPN is very low. If anyone tried to decipher your traffic, it would be total gibberish to them. For example, while your ISP will see that you’re using a VPN, it won’t be able to see what you do or which websites you visit. Select a reputable VPN service with a no-logs policy, like NordVPN, to ensure your activity isn’t recorded. VPNs are legal in all Five Eyes Alliance countries and most others, but it’s wise to check your local laws.
- Use secure browsers and search engines. Simply using private browsing options like incognito mode will not hide your browsing from your ISP. They just ensure that your activity isn’t saved in the device’s history and remove any cookies after the session. Browsers like Tor and secure search engines keep your online footprint private.
- Avoid tracking cookies. Cookies track your online behavior across different websites, compromising your privacy. Clear your cookies regularly and use a tracker blocker.
- Minimize data sharing. Be cautious about what personal information you share online and with whom, because it can be used for profiling and surveillance. Adjust privacy settings on social media to make your posts and personal information available only to your network.
- Secure your devices. Make sure your operating system and applications are always up to date because outdated software can contain vulnerabilities that hackers can exploit, potentially exposing you to spyware and other threats.