Monday, September 29, 2014

Unmasking the Five Eyes’ Global Surveillance Practices

Five Eyes 

The question nobody ever seems to ask in all this...if they have this global ability to peer up our proverbial "bung hole" as it were, then how is it that groups like ISIS/ISIL, have any a ghost of a chance of ever arising? The answer is of course...because they want them too!   No budgets without any threats... institutional bureaucratic self-interest prevails!   Someone once said to do a great evil takes a bureaucracy... and Hitler had his IBM punch cards didn't he to round up all those concentration camp victims...  Humans are quite capable of astounding atrocities, but when it becomes bureaucratized, institutionalized, corporatized, and securitized on Wall Street it reaches levels not heard of in this universe....  -AK

Unmasking the Five Eyes’ Global Surveillance Practices

September 29th, 2014

Via: GIS Watch:

The Five Eyes alliance – comprised of the United States National Security Agency (NSA), the United Kingdom’s Government Communications Headquarters (GCHQ), Canada’s Communications Security Establishment Canada (CSEC), the Australian Signals Directorate (ASD), and New Zealand’s Government Communications Security Bureau (GCSB) – is the continuation of an intelligence partnership formed in the aftermath of the Second World War. The patchwork of secret spying programmes and intelligence-sharing agreements implemented by parties to the Five Eyes arrangement constitutes an integrated global surveillance arrangement that now covers the majority of the world’s communications. Operating in the shadows and misleading the public, the Five Eyes agencies boast in secret how they “have adapted in innovative and creative ways that have led some to describe the current day as ‘the golden age of SIGINT [signals intelligence]’.”

The Five Eyes agencies are playing a dirty game. They have found ways to infiltrate all aspects of modern communications networks: forcing companies to hand over their customers’ data under secret orders, and secretly tapping fibre optic cables between the same companies’ data centres anyway; accessing sensitive financial data through SWIFT, the world’s financial messaging system; spending years negotiating an international agreement to regulate access to the data through a democratic and accountable process, and then hacking the networks to get direct access; threatening politicians with trumped-up threats of impending cyber war while conducting intrusion operations that weaken the security of networks globally; and sabotaging encryption standards and standards bodies, thereby undermining the ability of internet users to secure information.

Australian monitoring station

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.

This blog is supported by ads and donations. If you enjoy this blog please consider supporting it with a contribution via PayPal.