The Five Eyes intelligence agencies are the most powerful they’ve ever been


The Five Eyes alliance of States – comprised of the United States National Security Agency (NSA), the United Kingdom’s Government Communications Headquarters (GCHQ), Canada’s Communications Security Establishment Canada (CSEC), the Australian Signals Directorate (ASD), and New Zealand’s Government Communications Security Bureau (GCSB) – is the continuation of an intelligence partnership formed in the aftermath of the Second World War. Today, the Five Eyes has infiltrated every aspect of modern global communications systems.  

Contrary to the complaints of the NSA and other Five Eyes agencies that they are ‘going dark’ and losing the visibility they once had, the Five Eyes intelligence agencies are in fact the most powerful they’ve ever been. Operating in the shadows and misleading the public, the agencies boast in secret how they “have adapted in innovative and creative ways that have led some to describe the current day as ‘the golden age of SIGINT’.”

The agencies are playing a dirty game; not content with following the already permissive legal processes under which they operate, they’ve found ways to infiltrate all aspects of modern communications networks. Forcing companies to handover their customers’ data under secret orders, and secretly tapping fibre optic cables between the same companies’ data centers anyway. Accessing sensitive financial data through SWIFT, the world’s financial messaging system, spending years negotiating an international agreement to regulate access to the data through a democratic and accountable process, and then hacking the networks to get direct access. Threatening politicians with trumped up threats of impending cyber-war while operating intrusion operations that weaken the security of networks globally; sabotaging encryption standards and standards bodies thereby undermining the ability of internet users to secure information.

Each of these actions have been justified in secret, on the basis of secret interpretations of law and classified agreements. By remaining in the shadows, our intelligence agencies – and the governments who control them – have removed our ability to challenge their actions and their impact upon our human rights. We cannot hold our governments accountable when their actions are obfuscated through secret deals and covert legal frameworks. Secret law has never been law, and we cannot allow our intelligence agencies to justify their activities on the basis of it.

A top secret United States National Security Agency map shows that the US and its “Five Eyes” intelligence partners tap high speed fibre optic cables at 20 locations worldwide. The interception operation involves cooperation with local governments and telecommunications companies or else through “covert, clandestine” operations.
The undersea cable interception operations are part of a global web that in the words of another leaked NSA planning document enables the “Five Eyes” partners – the US, United Kingdom, Australia, Canada and New Zealand – to trace “anyone, anywhere, anytime” in what is described as “the golden age” signals intelligence.


The NSA map, published by Dutch newspaper NRC Handelsblad overnight, shows that the United States maintains a stranglehold on trans-Pacific communications channels with interception facilities on the West coast of the United States and at Hawaii and Guam, tapping all cable traffic across the Pacific Ocean as well as links between Australia and Japan.


The map confirms that Singapore, one of the world’s most significant telecommunications hubs, is a key “third party” working with the “Five Eyes” intelligence partners:

We must move towards an understanding of global surveillance practices as fundamentally opposed to the rule of law and to the well-established international human right to privacy. In doing so, we must break down legal frameworks that obscure the activities of the intelligence agencies or that preference the citizens or residents of Five Eyes countries over the global internet population. These governments have carefully constructed legal frameworks that provide differing levels of protections for internal versus external communications, or those relating to nationals versus non-nationals, attempt to circumvent national constitutional or human rights protections governing interferences with the right to privacy of communications.


Start the Conversation

Your email address will not be published.