Skip to content
Search

Latest Stories

NatSecEdge
cipherbrief

Welcome! Log in to stay connected and make the most of your experience.

Input clean

Intelligence Sharing in a Complicated World: The Future of Five Eyes

Intelligence Sharing in a Complicated World: The Future of Five Eyes

High Detailed World Map and All Flags - borders, countries and cities - vector illustration

In the midst of World War II, facing multiple threats in a complicated series of engagements around the world, the US and the UK entered into a highly-secret, trusted agreement to share signals intelligence they gathered on the enemy.  In the decade that followed WWII, the agreement was expanded to include Canada, Australia and New Zealand.  The group that was formed with the purpose of sharing signals intelligence with trusted partners that shared core values,  became known as the 'Five Eyes'.

Not much was known about the ‘Five Eyes’ publicly until the damaging national security leaks made by Edward Snowden in 2013.  Since then, other countries have been eager to seek a seat at the table, but in a world more complicated than that of 1945, that can be a tall order.  Today, disagreements among the core Five Eyes countries over how to tackle 5G security concerns and how to counter an aggressive China, can make matters even more complicated.

BACKGROUND:

  • The Five Eyes Alliance (FVEY) is an intelligence-sharing alliance that includes the US, the UK, Canada, Australia and New Zealand.
  • The alliance grew out of intelligence sharing partnerships forged during World War II and has, until recently, rarely been discussed in public.
  • The alliance is based on an agreement between the US and the UK in 1946, known as the UKUSA Agreement that set forth a treaty for the sharing of signals intelligence (SIGINT).
  • Between 1946 – 1956, additional appendices were introduced that expanded the relationship to include Australia, Canada and New Zealand.
Keep reading...Show less
Access all of The Cipher Brief’s national security-focused expert insight by becoming a Cipher Brief Subscriber+ Member.
Watch Now

Related Articles

Two Existential Threats: CIA’s Reputation vs. Democracy’s Survival

OPINION -- In his recent Cipher Brief essay, CIA's Latest Existential Challenge, former CIA senior officer Mark Kelton argues that the Central [...] More

To Counter China, Reform U.S. Intelligence for the Digital Age

EXPERT PERSPECTIVE / OPINION -- The United States is facing a quiet and rapidly growing threat across the digital landscape, an unseen mathematical [...] More

The Cipher Brief's Hottest Summer Reading

The Cipher Brief's Hottest Summer Reading

CIPHER BRIEF FEATURE REPORTING -- With the 4th of July holiday fast approaching, now is a good time for our annual summer list of recommended beach [...] More

Former CIA Director on the Priority Intelligence Requirement in Iran

Former CIA Director on the Priority Intelligence Requirement in Iran

EXPERT INTERVIEW – Tehran’s response on Monday to U.S. attacks against its nuclear facilities over the weekend was measured and possibly calibrated [...] More

Chinese Ghost Machines: The Hidden Risk in Australia's Energy Infrastructure

EXPERT PERSPECTIVE — The recent revelations from Reuters and other U.S. news outlets, detailing the discovery of "rogue" communication devices [...] More

OPINION: Assessing the State of our National Security

OPINION: Assessing the State of our National Security

EXPERT PERSPECTIVE / OPINION – I had the pleasure of delivering the opening address at the recent Cipher Brief HONORS Dinner where we recognized some [...] More