The “Five Eyes”: a Global Strategy for a Panoptic State.

Sukhvir Gill
11 min readApr 10, 2015

Introduction

In 2013, it was revealed that the global coalition “Five Eyes”[1] had built an intricate global framework for the surveillance and storage of all communications (Ball, 2013). The “Five Eyes” alliance is a direct result of the UKUSA Signals Intelligence Agreement, first signed in 1946, and is just one of the hundreds of other revelations made public through the Snowden files. Various agencies from within the “Five Eyes” are fully involved in mass data gathering, a process initiated by the NSA. These agencies include the Government Communications Headquarters (GCHQ) (UK), Communications Security Establishment (CSE) (Canada), Canadian Security Intelligence Service (CSIS) (Canada), and many more (Rudner, 2008). From the first leak showing the recording “of millions of Verizon customers daily” (Greenwald, 2013) to the latest leak that showcases New Zealand’s role in “spying on Pacific allies for ‘Five Eyes’ and [the] NSA” (Manhire, 2015), it is clear that a global strategy to “knowing it all” (Greenwald, 2014) is underway. The expansion of these surveillance programs has been justified as targeting terrorism and protecting state sovereignty, and in many cases is kept secret. While terrorism is a real threat in our world today, it is not a scapegoat for programs that clearly breach the freedoms and rights of all people. These programs bring forth concerns regarding state sovereignty, privacy, and the eventual panoptical state[2]. Furthermore, the global effort by the “Five Eyes” is in itself a greater threat than that which it tries to combat.

State Sovereignty

With the rise of the smartphone and more importantly internet use, regulation and policing has become increasingly difficult. The freedom that the internet implies scares global leaders because, in their eyes, it harms state sovereignty (Sassen, 1999). However, I argue that politics and state sovereignty in the post-911, mobile world must evolve as technology in the world does. Trade, communications and agriculture in our world depend on technology and the internet; this platform has expanded to new heights and in the process, connected the whole world together (Sassen, 1999). However, with the release of the Snowden files, we are seeing that the “Five Eyes” play a much larger role in the world and the internet than previously imagined. Phone calls, emails, photographs, and other documents are all being recorded and stored by P­RISM, a program that relies on backchannels and partnerships with large technology companies and until the leaks, was kept secret (Gellman & Poitras, 2013). The NSA also, through their Boundless Informant program, records and stores metadata[3] which is far easier to organize and analyze than the content in itself (Greenwald & MacAskill, 2013). And the expansion of CCTV systems that watch the unconnected world completes the panoptic state (Moss, 2014). World leaders (Spiegel, 2013), activists (Johnston, 1990; Hanson 1982), journalists, and entrepreneurs (Quilliam, 2013) are being blacklisted and targeted by these surveillance agencies, and all of this data ends up in the servers of the NSA (Gellman & Poitras, 2013). These measures are all done in defense of state sovereignty and combatting terrorism.­ Is it really a battle of state sovereignty if the only state that ultimately gets to remain sovereign is the US? No, it is a dangerous example of the abuse of power and authority, it is ironic that the same politicians advocating for the secrecy of these programs and their vitality to national security, also tell the public they should not have a problem with surveillance if they have nothing to hide.

Got Something To Hide?

The argument ‘If You Have Nothing to Hide, You Have Nothing to Fear’ (Lizza, 2013) is often made when discussing the NSA and the Snowden files; this is a false pretense. We do have something to hide, all of us. Depending on where you live, personal information such as sexuality, race, cultural background, and personal biases can be open to biased interpretation and in many cases misinterpretation. While some of us might not want to admit it, the world is divided by differences. That is why this personal information can be manipulated and be used against everyone.

On the other hand it is argued that these intelligence agencies only want to target terrorists, but data and metadata is being collected on everyone, not just those who are labelled terrorists. The NSA uses what is called a “three degree” system which allows the NSA to target up to 27 million people for one suspected terrorist (The Guardian, 2013) . As outlined by a leaked government document, the definition for labelling terrorists is vast and includes everything from “actions that fall far short of bombings” to acts that are “intended to influence government policy through intimidation” (Scahill & Devereaunx, 2014). This falls dangerously close to potentially limiting freedom of speech and freedom of association as the interpretation of intimidation can be very varied. The definition of terrorism used by the NSA is so broad (Greenwald, 2013) and the power to label someone a terrorist lies with so many people in the 19 different US agencies and countless other foreign agencies, that it is essentially uncontrollable and the possibility for mistakes is huge (Scahill & Devereaunx, 2014). The judgement to label someone a terrorist is really in the eyes of the beholder as cultural and social biases may lead individuals to come to various, different conclusions. Moreover, these labels are not something that we can dispute, no one is told they are blacklisted and there is no opportunity given to dispute the label, “not even death provides a guarantee of getting off the list” (Scahill & Devereaunx, 2014).

As all this data is kept private from the public, the opportunity for the government or any other body that has access to this information to abuse and manipulate this data exists. If someone were to be charged for a crime on the basis of ‘evidence’ found via NSA data collecting, how do we know it has not been manipulated and/or some other data has not been included in the charge that may help the charged? Some examples of this kind of manipulation can be seen within the CSIS when they destroyed wiretap evidence directly relating to the 1985 Air India Flight 182 (Mansbridge, 1987) and more recently when the “CSIS kept [a federal] judge in the dark on foreign spying” (Bronskill, 2014). Furthermore, how can we be assured that we should have nothing to hide if even some of the highest ranking politicians are worried about their privacy? Recently, it was revealed that Hilary Clinton used a private, personal email account instead of using a federal account as required while she was Secretary of State (Schmidt, 2015). Not only is this hypocritical, but it shows that privacy is important for everyone, not just Hilary Clinton.

The Panoptical State

Since the initial Snowden leaks, it has since been revealed that, through very strategic loopholes, for the most part, the “five eyes” alliance is in fact operating legally in their own respective states (Lord, 2014; Tencer, 2013; Roberts, 2013; Greenwald & Gallagher, 2014; BBC, 2014). I argue that the large scale of these surveillance programs is an abuse of power, a gross violation of the authority that these states have been granted by the people and an attempt to transform the world into a panoptic society.

The US is currently the world’s largest economy (World Bank, 2014) and is unmatched in military and scientific output (BBC, 2012; SCIENCEWATCH, 2009). Therefore, when the US wants to establish a global surveillance program, it makes sense that states such as Canada and the UK, who have vested interests with the US, would support them in the process. The NSA program tries to combat terrorism, and the ultimate goal of terrorism is to accomplish various ideological and political goals through the use of fear and intimidation (Richardson, 2008). The NSA while trying to combat terrorism has become a victim of their own demise; people are more scared of the NSA watching them than they are of being bombed by some terrorist group (PewResearchCenter, 2013; Newport, 2013).

In his book Discipline and Punish, Michel Foucault demonstrates the complex and outreaching nature of Panopticism, a social theory that I argue perfectly describes the efforts of the NSA to become omniscient. Foucault describes a society in which it does not actually matter if one is in fact being watched; the ability for the state to do so forces the people to obey and abide by all rules in risk of being caught (Foucault, 1975). These surveillance programs do exactly this; they separate the connection between the state and the people that democracy once advocated for. These surveillance programs capture all forms of communication, including the connected and unconnected world and, through the fear of being caught, society will now contort itself to the image that the state wants it to be.

Conclusion

In its efforts to curb terrorism, the “Five Eyes” surveillance alliance spreads more fear than any terrorist could ever hope to imagine. Democracy has failed; we are now living in a world which is ruled by the bourgeoisie and the proletariat must conform to these new standards or face the wrath of the state. For now, the people will not fight back, these systems have not put enough of a strain on individuals but it will, and when it does, the people will fight back and bring the system down to its knees and tear off the head of the beast that is the state.

[1] The Five Eyes alliance includes Australia, Canada, New Zealand, the United Kingdom and the United States.

[2] Panopticism is a social theory that Michel Foucault builds on and connects power and punishment together through elaborate detail. It is derived from Jeremy Bentham’s Panoticon, an intricate prison design which allows a single person to watch and observe all prisoners individually. It is designed in a way so that the prisoners never know if at a single moment they are being watched so therefore they are always suspecting and consequently obeying by the rules.

[3] Metadata is information about content and not the content in itself: name, time, size, location, etc.

References

Ball, J. (2013, Nov 20). US and UK struck secret deal to allow NSA to ‘unmask’ Britons’ personal data. The Guardian. Retrieved from http://www.theguardian.com/world/2013/nov/20/us-uk-secret-deal-surveillance-personal-data

BBC. (2014, July 15). Commons passes emergency data laws despite criticism. Retrieved from http://www.bbc.com/news/uk-28305309

BBC. (2012, Jan 10). United States of America country profile. London, UK. Retrieved from http://news.bbc.co.uk/2/hi/americas/country_profiles/1217752.stm

Bronskill, J. (2014, Nov 04). CSIS kept judge in the dark on foreign spying, Appeals Court says in upholding ruling. CBCNEWS. Retrieved from http://www.cbc.ca/news/politics/csis-kept-judge-in-the-dark-on-foreign-spying-appeals-court-says-in-upholding-ruling-1.2823921

Chadwick, A., & Howard, P. (2008). Handbook of Internet Politics. New York, NY: Routledge. Retrieved from http://reader.eblib.com.ezproxy.library.uvic.ca/(S(cyq5assweamvcn1yijo24lzb))/Reader.aspx?p=356393&o=38&u=OtijGjSnffy5kus5qehB1g%3d%3d&t=1424340032&h=C7813332B596C22A0B956E1C63622F0E88927C63&s=32887225&ut=78&pg=1&r=img&c=-1&pat=n&cms=-1&sd=2#

Cornell University Law School. (2015). U.S. Code. Retrieved from https://www.law.cornell.edu/uscode/text/50/1802#a_1

Der Spiegel (2013, June 7). Embassy Espionage: The NSA’s Secret Spy Hub in Berlin. Retrieved from http://www.spiegel.de/international/germany/cover-story-how-nsa-spied-on-merkel-cell-phone-from-berlin-embassy-a-930205.html

Foucault, M. (1975). Discipline and Punish. France: Gallimard.

Freeze, C. (2013, Oct 29). Canadian embassies eavesdrop, leak says. The Globe and Mail. Retrieved from http://www.theglobeandmail.com/news/world/canada-involved-in-us-spying-efforts-abroad-leaked-document-says/article15133508/

Gellman, B., & Poitras, L. (2013, June 7). U.S., British intelligence mining data from nine U.S. Internet companies in broad secret program. The Washington Post. Retrieved from http://www.washingtonpost.com/investigations/us-intelligence-mining-data-from-nine-us-internet-companies-in-broad-secret-program/2013/06/06/3a0c0da8-cebf-11e2-8845-d970ccb04497_story.html

Greenpeace International. (2001, Dec 14). GREENPEACE REJECTS TERRORISM LABEL. Retrieved from http://web.archive.org/web/20120510164356/http://archive.greenpeace.org/pressreleases/oceans/2001dec14.html

Greenwald, G., & Ball, J. (2013, June 12). The top secret rules that allow NSA to use US data without a warrant. The Guardian. Retrieved from http://www.theguardian.com/world/2013/jun/20/fisa-court-nsa-without-warrant

Greenwald, G., & Gallagher, R. (2014, Sept 14). NEW ZEALAND LAUNCHED MASS SURVEILLANCE PROJECT WHILE PUBLICLY DENYING IT. The Intercept. Retrieved from https://firstlook.org/theintercept/2014/09/15/new-zealand-gcsb-speargun-mass-surveillance/

Greenwald, G., MacAskill, E. (2013, Jun 11). Boundless Informant: the NSA’s secret tool to track global surveillance data. The Guardian. Retrieved from http://www.theguardian.com/world/2013/jun/08/nsa-boundless-informant-global-datamining

Greenwald, G., MacAskil, E., & Poitras, L. (2013, June 11). Edward Snowden: the whistleblower behind the NSA surveillance revelations. The Guardian. Retrieved from http://www.theguardian.com/world/2013/jun/09/edward-snowden-nsa-whistleblower-surveillance

Greenwald, G. (2014). NO PLACE TO HIDE. New York City, New York: Metropolitan Publishing. Retrieved from http://hbpub.vo.llnwd.net/o16/video/olmk/holt/greenwald/NoPlaceToHide-Documents-Uncompressed.pdf

Greenwald, G. (2013, June 6). NSA collecting phone records of millions of Verizon customers daily. The Guardian. Retrieved from http://www.theguardian.com/world/2013/jun/06/nsa-phone-records-verizon-court-order/

Hanson, C. (1982, Aug 13). British ‘helped U.S. in spying on activist’. The Vancouver Sun. Retrieved from http://news.google.com/newspapers?id=t6FlAAAAIBAJ&sjid=VowNAAAAIBAJ&pg=1101,1439296&dq

Johnton, D. (1990, June 10). C.I.A. TIE REPORTED IN MANDELA ARREST. The New York Times. Retrieved from http://www.nytimes.com/1990/06/10/world/cia-tie-reported-in-mandela-arrest.html

Lizza, R. (2013, December 16). STATE OF DECEPTION. The New Yorker. Retrieved from http://www.newyorker.com/magazine/2013/12/16/state-of-deception

Lord, G. (2014, July 25). Privacy fears as Australian surveillance laws are dragged into the digital era. The Guardian. Retrieved from http://www.theguardian.com/world/2014/jul/26/privacy-fears-australian-surveillance-laws-digital-era

Maass, P. (2013, Aug 13). How Laura Poitras Helped Snowden Spill His Secrets. The New York Times. Retrieved from http://www.nytimes.com/2013/08/18/magazine/laura-poitras-snowden.html?_r=0

Manhire, T. (2015, Mar 5). New Zealand spying on Pacific allies for ‘Five Eyes’ and NSA, Snowden files show. The Guardian. Retrieved from http://www.theguardian.com/us-news/2015/mar/05/new-zealand-spying-on-pacific-allies-for-five-eyes-and-nsa-snowden-files-show

Mansbridge, P. (1987, Dec 14). CSIS destroys tapes relating to Air India bombing. Canadian Broadcasting Corporation. Retrieved from http://www.cbc.ca/archives/categories/society/crime-justice/the-air-india-investigation/the-vanishing-trail.html

Mead, D. (2013, Sept 17). How Congress and the Patriot Act Legalized the NSA’s Phone Data Collection. Vice. Retrieved from http://motherboard.vice.com/blog/how-congress-and-the-patriot-act-made-the-nsas-phone-data-collection-legal

Moss, S. (2014, Dec 19). Neighbourhood watch: how domestic CCTV is sweeping the UK. The Guardian. Retrieved from http://www.theguardian.com/world/2014/dec/19/neighbourhood-watch-domestic-cctv-sweeping-uk

Newport, F. (2013, June 12). Americans Disapprove of Government Surveillance Programs. Gallup. Retrieved from http://www.gallup.com/poll/163043/americans-disapprove-government-surveillance-programs.aspx

PewResearchCenter (2013, July 26). Few See Adequate Limits on NSA Surveillance Program. Washington, D.C. Retrieved from http://www.people-press.org/2013/07/26/few-see-adequate-limits-on-nsa-surveillance-program/

Quilliam, R. (2013, Aug 29). GCSB spying illegal, but no charges laid. The New Zealand Herald. Retrieved from http://www.nzherald.co.nz/nz/news/article.cfm?c_id=1&objectid=11116460

Reidenberg, J. R. (1996). GOVERNING NETWORKS AND RULE-MAKING IN CYBERSPACE. Emory Law Journal, 45(3), 911–930. Retrieved from http://heinonline.org.ezproxy.library.uvic.ca/HOL/Page?handle=hein.journals/emlj45&id=7

Richardson, L. (2008, Feb 20). What Terrorists Want: Understanding the Enemy, Containing the Threat. Retrieved from http://web.mit.edu/ssp/seminars/wed_archives08spring/richardson.htm

Roberts, D. (2013, Dec 27). NSA Mass collection of phone data is legal, federal judge rules. The Guardian. Retrieved from http://www.theguardian.com/world/2013/dec/27/judge-rules-nsa-phone-data-collection-legal

Rudner, M. (2008). Canada’s Communications Security Establishment, Signals Intelligence and counter-terrorism. Intelligence and National Security, 22(4), 473–490. Retrieved from http://www.tandfonline.com.ezproxy.library.uvic.ca/doi/pdf/10.1080/02684520701640449

Sassen, S. (1999). The Impact of the Internet on Sovereignty: Unfounded and Real Worries. In document presented at the Symposium “Understanding the Impact of Global Networks in Local Social, Political and Cultural Values” (Dresden, Germany, February). Retrieved from https://www.coll.mpg.de/sites/www.coll.mpg.de/files/text/sassen.pdf

Scahill, J., & Devereaux, R., (2014, July 23). THE SECRET GOVERNMENT RULEBOOK FOR LABELING YOU A TERRORIST. The Intercept. Retrieved from https://firstlook.org/theintercept/2014/07/23/blacklisted/

Schmidt, M. (2015, Mar 2). Hillary Clinton Used Personal Email Account at State Dept., Possibly Breaking Rules. The New York Times. Retrieved from http://www.nytimes.com/2015/03/03/us/politics/hillary-clintons-use-of-private-email-at-state-department-raises-flags.html?ref=topics

SCIENCEWATCH (2009, DEC). Top 20 Countries in ALL FIELDS, 1999-August 31, 2009. Retrieved from http://archive.sciencewatch.com/dr/cou/2009/09decALL/

Tencer, D. (2013, June 08). NSA Spying On Canadians, CSEC Capable Of Similar Surveillance: Experts. Huffington Post. Retrieved from http://www.huffingtonpost.ca/2013/06/08/nsa-spying-canada_n_3408662.html

The Guardian (2013, Oct 28). Three degrees of separation: breaking down the NSA’s ‘hops’ surveillance method. Retrieved from http://www.theguardian.com/world/interactive/2013/oct/28/nsa-files-decoded-hops

The World Bank. (2014). GDP (current US$). Washington, D.C. Retrieved from http://data.worldbank.org/indicator/NY.GDP.MKTP.CD

The World Bank. (2014). United States Country Profile. Washington, D.C. Retrieved from http://data.worldbank.org/country/united-states

Originally published at sukhvirgill.com on March 16, 2015.

--

--

Sukhvir Gill
0 Followers

Sukhvir is an undergraduate at the University of Victoria pursuing an political science and philosophy major (ever-changing). Read more: http://sukhvirgill.com/