The ‘Eyes’ are on Us: 5/9/14 Eyes

Ali Qamar  - Cybersecurity Analyst
Last updated: August 25, 2024
Read time: 17 minutes
Share

Find out everything about 5 Eyes, 9 Eyes, and 14 Eyes in detail. Know what countries boast these intelligence-sharing agreements and who are not a part of them.

THE TAKEAWAYS

The terms 5, 9, and 14 Eyes belong to government alliances between different well-established countries that log, monitor, and exchange surveillance information. These member nations gather data about their residents and share it when needed. It refers to the number of countries each alliance has. Here is a quick outline:

  • 5 Eyes: US, UK, Australia, Canada, and New Zealand
  • 9 Eyes: US, UK, Canada, Denmark, Australia, France, New Zealand, Norway, and the Netherlands
  • 14 Eyes: US, UK, Canada, New Zealand, Australia, Denmark, the Netherlands, France, Spain, Germany, Belgium, Norway, Italy, and Sweden.

Five Eyes, Nine Eyes, and Fourteen Eyes are the world’s famous state intelligence alliances. The member countries have unanimously announced monitoring and sharing the online activities of their internet users. The idea behind these grand surveillance alliances links back to the UK-USA agreement signed after WWII.

At first, five countries agreed to share signals intelligence and mass surveillance data. Later, some other countries joined them, creating the 9- and 14-Eyes alliances.

This article will teach you everything you need to know about the Five Eyes, Nine Eyes, and Nine Eyes.

What is the 5 Eyes alliance?

The Five Eyes (abbreviated as FVEY) refers to the countries constituting the surveillance alliance. The members of the five eyes include:

  • The United States of America (USA)
  • The United Kingdom (UK)
  • New Zealand
  • Canada
  • Australia

Understanding the 5 Eyes concept

The Five Eyes share all the personal information and activities of their citizens. So it does not matter how big of a figure you may be in the public’s eye; your data is theirs in the Five Eyes.

Understanding the 5 Eyes concept

There are other organizations within the Five Eyes of each country. For example, in the USA, the CIA, FBI, NSA, and DIA collect and share information among the governments.

The history of the Five Eyes dates back to World War II and the USA-UK agreement (explained below). In short, it was an agreement that ensured all the countries would share every information they received.

The United Kingdom’s Investigatory Powers Act of 2016 shows the power of the Five Eyes government. This Act allowed the government to record every text message and browsing history of people. This data would be stored and kept available for the government for two years and can be used without a warrant.

There have been other large agencies that have helped the Five Eyes claim people’s data. These agencies are a part of what is known as the PRISM program. In 2017, some ISPs were allowed to record every user’s activities and were given legal permission to sell them to other third parties. No one could reject this program legally.

The Five Eyes can force different large-scale companies into handing over customer data. Many people have tried to reveal the activities of the Five Eyes. However, the public remains blind and unaware of what is being done with their private online information and how government agencies can exploit it.

Your favorite social media platform may very well be on this game of selling your private data to the government. Facebook and Google are well-known platforms in this case. However, the Five Eyes have global surveillance almost everywhere.


UK-USA Agreement

UK-USA Agreement

This agreement was first put forward in 1943 and was known as the British-US Communication Intelligence Agreement (BRUSA). It was connected with the following:

  • Signal intercept networks of the UK
  • Government Communications Headquarters (GCHQ)
  • The US National Security Agency (NSA)

It was an agreement for cooperation between the five countries regarding information sharing. In short, it was known as the ‘Five Eyes.’

The information-sharing was done through the STONEGHOST network, and it is through this network that people believe it holds the Western world’s top secrets. Besides the UK-USA agreement laying down the rules for intelligence sharing, it was an agreement that created a special relationship between the UK and the USA.

Many governments were unaware of its existence until it was disclosed to the public in 2005. By 2010, the full text of the agreement was revealed to the public and can easily be found online. It is said to be the most significant text in history.


Relations with other countries

Relations with other countries

It won’t surprise anyone that the Five Eyes have been involved with more countries than those within their group. There are said to be other countries also involved in the Five Eyes but are not officially part of it. These countries include:

  • South Korea
  • Japan
  • Singapore
  • Israel

Five Eyes and China

Undoubtedly, China is a powerhouse, and many countries fear what it may end up doing. That is why the Five Eyes and its third parties are very much against China.

The distrust against China is so high that all of the Five Eyes have something or the other against their well-known phone brand, Huawei. Five Eyes and Huawei have had issues for a while now, especially since Five Eyes believes that through these mobiles, China may try to break into their security systems.

Anyone owning a phone from Huawei may not get the full benefits of a 5G network in most Five Eyes countries. For example, in Australia, Huawei products have been banned from accessing their 5G network. The USA has even prohibited the brand from its government network. That was then followed by New Zealand as well. While Canada still seems to stay neutral in this matter by not doing anything.

However, China is not the only country on the Five Eyes radar. Russia and North Korea, too, seem to have some issues with them. Moreover, both countries are well known for their nuclear power. Thus, it’s not surprising that they are scrutinized.

India also wants to create relations with the Five Eyes. However, it does not want to play the younger brother’s role within Five Eyes. The Five Eyes and India have a more complicated relationship as the latter seems to plan on keeping good relations with the US, China, and Russia.


5 Eyes surveillance systems

Five Eyes Intelligence Alliance doesn’t rely on a single surveillance strategy. Instead, they have implemented numerous surveillance systems that separately track users, ensuring comprehensive data collection. While not all of them are precisely disclosed, the following are some known systems.

  • ECHELON: You may think of it as one of the oldest surveillance systems dating back to the Cold War era. It was formally established in 1971 to intercept military and diplomatic communications between the then-Soviet Union and the Eastern countries. Following its success, the program continues to expand its capabilities to include online tracking.
  • PRISM: A new surveillance system has been working since 2007. The PRISM program collects data from companies like Google, Yahoo, Facebook, and Microsoft.
  • XKeyScore: This one is a newer addition to the existing surveillance programs. XKeyScore (or XKS) typically traces back to the NSA. It performs real-time collection and monitoring across the global internet system. Edward Snowden dubs the system a “one-stop-shop for access” as it exhibits almost unlimited and unrestricted surveillance capabilities.

What are the 9 Eyes?

The Nine Eyes are similar to the Five Eyes, with an addition of four new countries, making up to 9 countries. The members of the nine eyes include:

  • The Five Eyes
  • Norway
  • Netherlands
  • France
  • Denmark

These countries were revealed to be a part of the 5 Eyes global surveillance. However, they are seen as a mere extension of the Five Eyes alliance. By expanding their group, the Five Eyes have a greater chance of getting cooperation from other countries and additional data from their members.

These four additional countries do not have the same amount of access or high-level authority as the Five Eyes members do. However, they get access to data and information from other countries, which is still in their favor.

The goal is to share information and data, including mass surveillance data.

What is the 14 Eyes alliance?

The Fourteen Eyes are also similar to the Five Eyes and Nine Eyes, with further addition of countries. Countries within the Fourteen Eyes include:

  • The Five and Nine Eyes
  • Germany
  • Belgium
  • Italy
  • Sweden
  • Spain

The Five Eyes still try to maintain a high power amongst these groups of countries by focusing on surveillance collection and sharing of data amongst the nations. Most of their third parties’ headquarters are within the Five Eyes or their unofficial group members.

The relationship between the Fourteen Eyes and Five Eyes is even less close than the Nine Eyes. Nevertheless, they still benefit from gaining access to information, recourses, and intelligence, which they might not have usually had.

These groups’ countries’ official names are SIGINT Seniors Europe (SSEUR). The primary purpose is to exchange military signals and intelligence among their members.

What are third-party contributors?

Apart from the 5-9-14 Eyes countries, there are other third-party contributors to the UKUSA Agreement alliance. These Eyes nations exchange intelligence data with the Eyes group but possess fewer rights and responsibilities. 

Some of these contributors include NATO countries like Greece, the Baltics, Iceland, Hungary, and Romania, among other European nations. Other countries such as Japan, Singapore, Israel, and South Korea are strategic allies.

What data do these alliances collect and share?

All countries within the 14-Eyes alliance claim to surveil their citizens for national security. That is true to some extent, given how these countries frequently foil terror threats by proactive tracking. Also, sharing the details with other countries makes sense if the intention is to prevent terrorist activities across borders.

But of course, such vigilance clearly shows the deep tracking practices the governments employ on every citizen. While it’s difficult to list out everything, the authorities may log. But to sum it up, we can say ‘everything‘ – more precisely, ‘everything online.’

Collecting such data requires profound control over the service providers. Thus, those countries have implemented mandatory data logging laws for key entities serving the public. Two of these include telecom operators and internet service providers (ISPs).

So now, it’s clear that governments track your internet search history, browsing practices, phone calls, video chats, messages, browsing data, and the details of the devices you use.

Impact of Eyes Alliances on user privacy?

The intricate and secretive surveillance that 5, 9, and 14 Eyes Alliance conduct raises significant concerns regarding user privacy and online anonymity. Below, we’ve outlined some of the most pressing issues: 

  1. Mass surveillance: The Alliance amasss vast amounts of data, often without discrimination. Even individuals not suspected of any wrongdoing can have their data collected and scrutinized, a blatant violation of user privacy. 
  2. Undermining encryption: It has tried to weaken encryption, a fundamental tool for safeguarding privacy and online security. For instance, in 2020, the Alliance cautioned internet companies about the risks of end-to-end encryption and advised them to install backdoors for intelligence and law enforcement agencies. 
  3. Data sharing: The Alliance collects and shares data, establishing a global surveillance network. Intelligence agencies in one nation can gather and share information about citizens in another country without adhering to privacy regulations. Under programs like PRISM, US citizens’ data was collected by the United Kingdom and later shared with the NSA. 
  4. Compromising Anonymity: Besides undermining encryption, the Alliance has tried to compromise online anonymity by mandating ISPs and third-party service providers to log user data and grant access when necessary, as discussed above. Furthermore, member countries often require VPN providers to share user logs for law enforcement purposes. Notably, IPVanish disclosed user information to Homeland Security despite claiming a no-log policy, leading to a Comcast IP address. Similarly, the Riseup VPN provider chose to comply with FBI warrants instead of facing contempt of court.

Can I avoid 14-Eyes tracking?

Although you cannot achieve fool-proof security against 14-eyes surveillance, you can largely escape it (at least, the unwanted tracking things) by using privacy tools.

The most important tool here is the VPN. Since VPNs mask your IP address and encrypt your data in transit, your ISPs and other tracking authorities find it challenging to log your exact online activities.

It gets trickier when you secure all your communication means by using dedicated tools like secure messaging apps, email services, anti-trackers, and adblockers and ensuring IP leak protection.

But all these tools only become effective when you first protect your online activities via a robust VPN. And that’s where you need to know more since you cannot use just any random VPN here.

Below are the best VPNs outside 14 eyes’ sight so that you may feel safe and secure while you browse:

  • NordVPN
  • ExpressVPN
  • Surfshark
  • PerfectPrivacy
  • TrustZone

VPNs located in 5 Eyes, 9 Eyes, and 14 Eyes countries

Which VPN to trust can be tricky business. Knowing who may work with the 5, 9, and 14 Eyes is hard. There are thousands of VPNs available online. Some you may have heard of, while others you have never seen.

What is double VPN

However, you would be shocked to know how many VPNs are involved with the 5, 9, and 14 Eyes. Many VPNs are located within these countries as well. Just because they are located within the country does not mean everyone is passing your data to the government.

When you decide to purchase a VPN, look into the following things:

  • Fast connection (99% uptime)
  • No data logging of any sort
  • DNS and IP must be protected
  • AES encryption
  • Several servers
  • An automatic kill switch

Here’s a small list of VPNs within and outside the 14 Eyes. Look into them wisely, as they will be your protectors from corruption:

VPN nameCountry
AceVPNUSA
ActiVPNFrance
BlocklessCanada
DefenceVPNBarbados
IVPNGibraltar
LiquidVPNUSA
ProXPNNetherlands
PRQSweden
TorVPNUK
TunnelBearCanada
ZenmateGermany

Trust

You might do your best research when choosing a VPN, but you may likely miss a few points here and there when looking into them.

Remember, every company can claim they do not do a sure thing. But they very well may be doing it. For example, you may choose a VPN because it says it does not back up your data, but this can be a lie. Nonetheless, you will have to trust one or the other.

VPN is essential for your data security as the government has advanced companies backing them up when tracking you and getting your personal information.


Security

The 5 Eyes, 9 Eyes, and 14 Eyes have their own “security” measures they take care of regarding VPNs. Unfortunately, these security measures can be a massive blow for many VPN users who want to use a secure VPN where their data isn’t provided to the government 24/7.

VPNs use encryption to prevent data leaks to other people. However, several cyberstalking cases have occurred due to the lack of proper VPN measures.


What is a VPN jurisdiction?

Every country has its laws, meaning they have jurisdiction over almost anything. The same goes for VPNs. Some countries ban VPNs, making them illegal, while others only allow a few service providers.

lesser known VPN benefits

Access to VPNs within your country depends on several policies, laws, and regulations that your government puts forward. Every country can decide to allow a specific VPN or ban it whenever they like.

The only way you can dodge the bullet of a strict country policy against VPNs is to move to one that doesn’t have the same laws. However, if you look at it, this may not be the best move.

These few VPNs may very well be workers under the government trying to gain access to your data. Below is a list of the five eyes countries’ VPN policies:

CountryPolicy
AustraliaVPNs are legal in Australia. However, any data that passes through the VPN or is stored by them can be accessed by the government.
USAVPNs are legal in the USA. However, although the USA is one of the countries that preach about human rights, it still has several controversies about monitoring user data through ISP.
The UKVPNs are legal in the UK. However, even though they are legal, they may still be subject to policies and laws put on ISPs.
New ZealandVPNs are legal in New Zealand. However, whatever you do on it must also be permitted. That is because the government may very well have access to your data if it is needed.
CanadaVPNs are legal in Canada. Besides having strict policies relating to data retention and banning certain websites, Canada focuses its intelligence agencies on sharing data with other nations.

Privacy measures to guard yourself against Eyes Alliances

To stay away from the Eyes’ sight, you must learn about the different privacy services on the internet. There are several ways to secure a safe line and browse without worrying.

What is Catfishing

These privacy services include tools such as VPNs, Search Engines, and Secure Emails. All these tools can become an essential part of your privacy security.

You may not know this, but even Microsoft, Google, Yahoo, and Apple work with the 14 Eyes. Thus, you should look into getting a new operating system as well. You can try using Linux as an alternative operating system.

Secure search engines

Google, Yahoo, Bing, and many other search engines keep a record of your private information, such as:

  • IP address
  • Unique identifier
  • The search terms you use

They use several data collection tools and share your data with other third parties. That means your privacy has been abused for so long without your knowledge. Google is the guiltiest since it is at the top of its users’ data collection.

Sadly, you cannot stop these search engines from collecting your data if you keep using them. However, you can protect your privacy by changing your search engine to a private one.

Besides, you can further increase your security if you combine the use of private search engines with VPNs.

Below are some of the best search engines to use for your security:

  • Startpage
  • Qwant
  • Searx
  • Disconnect Search
  • DuckDuckGo

Some of these search engines may save some of your data, but they do not use it for personal use or give it to any other third party.


Secure email services

Other than using secure search engines, it is also essential for you to change your email. That is because your government can easily access your email, especially since the most common ones used are Gmail and Yahoo mail, which are both parts of Google and Yahoo.

How To Encrypt Your Emails

As discussed before, Google and Yahoo work with Fourteen Eyes. Thus, your information is readily provided to the government whenever needed.

A secure email service is crucial as your email is something only you should have access to and no one else. Your private matters are connected to this service and should not be violated by the government.

Below are some of the factors you should consider when trying to pick a secure email:

  • Jurisdiction
  • PGP support
  • Import features
  • Email apps
  • Encryption
  • Privacy
  • Security
  • Features

The goal of private email is to keep your other personal data secure. Thus, you must look into the following emails to invest in for future use:

  • Tutanota
  • ProtonMail
  • Mailbox.org
  • Posteo
  • Mailfence
  • Runbox
  • CounterMail
  • CTemplar
  • KolabNow
  • Severin

Use a reliable VPN provider

Even though privacy-oriented browsers and messaging services encrypt some of your online data, a considerable portion remains vulnerable. For example, your IP address remains exposed to websites on the internet. This is where a VPN becomes invaluable, as it encrypts all your online activities, shielding them from prying eyes.

However, a crucial point to consider is the VPN’s headquarters. If you value your privacy, you should avoid VPN companies based in 5 Eyes, 9 Eyes, and 14 Eyes Alliance, a cohort of countries that collect and share intelligence. They surveil their citizens on the internet and compel companies to collect user data.


Best VPNs to protect your privacy

Thousands of VPNs are available online, but only a few are worth looking into. Most VPNs are not secure enough or work with third parties by sharing your personal information.

Online safety tips

The whole purpose behind VPNs is to secure your privacy, yet most fail to do so. Out of the Fourteen Eyes, you must be aware of the Five Eyes more than anyone else, as they share and access the most data.

Below are some of the best VPNs outside 5 Eyes that we tested, and they are also the best against 9 Eyes and 14 Eyes:

  • NordVPN
  • SaferVPN
  • CyberGhost
  • ExpressVPN
  • VyprVPN
  • Trust.Zone

FAQs

You can significantly evade mass surveillance of your privacy by using essential privacy tools like a VPN, secure messaging and email apps, and anti-tracking features on your browser. However, remember that no method can ever ensure 100% protection. So, ensure you never perform any grey or illegal activities online.

Yes. If you use a robust VPN service like ExpressVPN and NordVPN, you can trust to have received thorough privacy protection. These services never log your activities or share your data with any authorities.

Share this article

About the Author

Ali Qamar

Ali Qamar

Cybersecurity Analyst
46 Posts

A strong passion drives Ali Qamar. He wants to empower internet users with privacy knowledge. He founded PrivacySavvy, an authority dedicated to fostering a security-conscious online community. Ali believes in individual liberty. He has been a vocal advocate for digital privacy rights long before Edward Snowden's mass surveillance revelation shook the world. Ali recently co-authored a book called "The VPN Imperative." It is available on Amazon. The book is a testament to his relentless quest to raise awareness about the importance of online privacy and security. Ali has a computing degree from Pakistan's top IT institution. He understands the details of encryption, VPNs, and privacy well. Many see Ali as an authority in his field. The local press often seeks his insights. His work has appeared in many famous publications. These include SecurityAffairs, Ehacking, HackRead, Lifewire, Business.com, Intego, and Infosec Magazine. He is inclined to transformative ideas. This is clear in his work. It aims to reshape how people approach and prioritize their online privacy. Through PrivacySavvy and his writing, Ali Qamar champions digital freedom. He gives internet users the knowledge and tools they need. They use these to reclaim control over their data. They can then navigate the online world with confidence and security.

More from Ali Qamar

Comments

No comments.