Is there a risk that 'Five Eyes' will invade the public's privacy?



On August 14, 2020, Defense Minister Taro Kono expressed his willingness to participate in “Five Eyes,” which is a framework for sharing confidential information in five English-speaking countries such as the United States and the United Kingdom. It's okay to be exposed.' Regarding the privacy of the people threatened by such Five Eyes, in 2014, Mr. Kali Nyst and Anna Crow of

Privacy International , a group of privacy rights, pointed out.

Unmasking the Five Eyes' global surveillance practices | Global Information Society Watch
https://www.giswatch.org/en/communications-surveillance/unmasking-five-eyes-global-surveillance-practices

Immediately after the end of World War II, in 1946, the United Kingdom and the United States of America Agreement ( UKUSA Agreement ), a bilateral intelligence agreement that the United States and the United Kingdom have continued for more than 10 years, With the addition of Australia and New Zealand, the National Security Agency (NSA) in the United States, the Government Communications Headquarters (GCHQ) in the United Kingdom, the Communications Security Agency (CSEC) in Canada, the Signaling Directorate General in Australia (ASD), and the Government Communications Security Agency in New Zealand. The Five Fives Alliance has been formed by (GCSB). The Five Eyes has a very secret existence due to its 'intelligence-related' characteristic, and has not been mentioned in public documents for a long time.

The Five Eyes is a tightly-coupled alliance, and the cooperation is so close that it is hard to tell which intelligence agency was responsible for the operation. In addition, many of the information facilities owned by the Five Eyes participating countries are to be staffed not only in their own countries but also in other participating countries, and the operation of the information facilities themselves seems to be shared.



According to Neist and others, Five Eyes seeks every possible way to break into modern telecommunications networks, forcing companies to impose customer data, eavesdropping fiber optic cables between data centers, and financial data via the

International Interbank Communications Association . Access control, the establishment of international agreements to regulate data access, and the decline in the ability to protect information on the Internet due to obstruction of encryption groups and standardization groups, all kinds of intelligence operations have been carried out.

It is Edward Snowden who has uncovered a part of the intelligence activities of the Five Eyes. Snowden revealed that Five Eyes was conducting an operation called ' TEMPORA ' to intercept the British submarine fiber optic cable management station, which was assigned 250 people from GCHQ in the UK and 300 people from the NSA in the United States. I said that.

According to Snowden, the content intercepted by Operation TEMPORA was stored for 3 days and metadata was stored for 30 days, and only those containing important information were extracted by filtering etc. during the storage period. Immediately after the TEMPORA operation started, filtering was basic such as word search, but from some time NSA's confidential surveillance system ' XKeyscore ' seems to be used. Snowden said of the operation of TEMPORA, 'By installing a tap for interception on an optical fiber cave and applying word recognition and voice recognition to communication data, almost complete control of remote communication and online communication can be achieved', the danger It is said that sex is pointed out.



Prior to World War II, confidential information was physically stored in file cabinets, etc., but nowadays, confidential information is stored in servers, etc., and can be stolen online. Mr. Neist and others pointed out that the legal system of the five countries that join the Five Eyes does not assume that the Five Eyes may intercept private communication of the people and residents. As Snowden accused, the Five Eyes surveillance activity could jeopardize the privacy of the public.

'We can say that mass interception technology is indiscriminate surveillance technology, which copies and monitors all communications in a specific country or region, and cannot intercept communications individually,' Snowden said. He said that it is impossible to extract and monitor only the communications of criminal groups such as terrorists. He points out the danger that even the information of the people will be violated by the surveillance network implemented by Five Eyes.

in Security, Posted by darkhorse_log