Category Archives: Whitehat

Overwatch – The Five Eyes Espionage Alliance

The “Five Eyes” (FVEY‍) is an intel‍ alliance that unifies elements of the national alphabet agencies of theunited Kingdom, the United States, Australia, canada and New Zealand and their intel gathering infrastructures.

The AA’s in each member country and the terms of their information exchange mandate is encapsulated in the multilateral‍ agreement called the “UKUSA Agreement”.

The origins of the FVEY can be traced to the closing months of World War II when the Atlantic Charter was issued by the Allies to lay out their “goals” for a post-war world.

Signals Intelligence (SIGINT)

The espionagealliance‍ was conceived in order to deliver trans- jurisdictionalcoordination‍ andcooperation‍ for signals intelligence (SIGINT‍) but has expanded into many other areas especially in the last 20 years and most aggressively since the beginning of the vaguely defined parameters of the ” War‍ on Terror‍ “.

Not just a reactive program it is specifically proactive. The FVEY can count in many thousands theirdeployment of various rootkit‍ hacks, backdoors‍ , trojans‍ , worms‍ , spyware‍ , malware‍ , keystroke logging, PGP private key reversal and voice comms undermining projects. It has an eye watering arsenal of BH tactics‍ at its disposal. Take a peak at a tiny subset of them here .

GEMALTO & Public Scrutiny

But probably their most effective hack was undermining the integrity of sim card encryption after the highly successful (for them) Gemalto hack.

No citizen based protests or national laws or international regulations or Privacy advocates or leaks or “net neutrality” activists or whistleblowers will ever affect the activities of the Five Eyes.

It is and will remain the most pervasive, extensive, expansive and secretive (independent and to the large part unregulated) espionage alliance in history.

The ECHELON Program

During the course of the Cold War, the ECHELONsurveillance‍ system was initially developed by the FVEY to monitor the communications of the USSR‍ and European countries on the wrong side of the Iron Curtain.

The FVEY has been accused of monitor trillions of privatecommunications‍ worldwide.

In the late 1990s, the existence of ECHELON was disclosed and triggered a major debate in brusselsand to a lesser extent in Congress. As part of efforts in the ongoing, vaguely defined, War on Terror since 2001, the FVEY further expanded their surveillance‍ capabilities.

Internet Backbone

The bulk of the current focus is placed on monitoring digital comms across the internet backbones and much if not all of the cables delivering the service have FVEY listeners at the receiving stations and national termination points and not just in the member countries.

The current face-off between the US and china in South East asia – aside from the sabre rattling over the Paracel & Spratly issue and Chinese territorial claims in the South China Sea – is who will get to deliver and therefore control the internet backbone to Cambodia, terminating in Sihanoukville.

That cable will service the needs of the region (Laos, Myanmar, Thailand, Vietnam, Cambodia, and unofficially parts of China, Malaysia, Indonesia and Singapore)

Snowden (Again)

NSAwhistleblower / traitor (depending on your viewpoint) edward snowden described the Five Eyes as asupranational‍ intelligence organisation that doesn’t answer to the known laws of its own countries”.

Snowden’s leaks revealed that the alliance were spying on one another’s citizens and sharing the collected information with each other in order to circumvent restrictive domesticregulations‍ on surveillance of sovereign nations’ citizens in “peace time”.

Again the definition of “peace time” and its current status is in the eye of the beholder so to speak.

The Main Surveillance Programs

The main surveillance programs jointly operated by the Five Eyes are:

  • PRISM‍ – Operated by the NSA‍ together with the GCHQ‍ and the ASD
  • XKEYSCORE‍ – Operated by the NSA with contributions from the ASD and the GCSB
  • Tempora‍ – Operated by the GCHQ with contributions from the NSA
  • MUSCULAR‍ – Operated by the GCHQ and the NSA
  • STATEROOM‍ – Operated by the ASD, CIA‍ , csec‍ , GCHQ, and NSA

END

Privacy‍ , National Security

So You Want To Be A Digital Ghost – Introduction

This series of posts are provided as a guide to the private citizen who holds concerns regarding their information security and the protection of their data from unauthorized access from state and non-state actors.

This information is not intended for use for any other purpose in particular to access the deep web or dark net to conduct illegal transactions or engage in illegal activities.

Caveat

The implementation of these guides are intended for legal use and not to facilitate acts of criminality – these guides are for those of us who seek to protect our privacy in the belief that in a democracy every law abiding individual is entitled to a private life.

Caveat on the Caveat 

These posts are not intended to be Blackhat however like any hints and tips on any subject they can be used the wrong way.

If you are the type of person who feels the need to use internet to hire a hit-man to shoot your dog, buy poor viagra substitutes online or trade bomb making tips with your jihadi buddies then these guides are just as effective but …..

You also leave non-digital footprints and the forums which you may intend to visit, using the anonymity tools and tips described herein, are no doubt compromised and riddled with honeypots and lurking super secret squirrels and in those we trust.

Getting What You Want 

Some readers looking for answers / hacks / links / shortcuts will be aware of elements of the content of these posts and to avoid frustration a section at the top of each new post will call out what subject is being discussed in that post and what sub categories it contains – for example:

POST: Internet Censorship Software & Workarounds
Sub-Categories: Blue Coat Systems; SmartFilter; Fortinet; Websense; Netsweeper; Making Invisible Spyware Footprints Visible; Keyloggers; Malware Detection; Man in the Middle; TSCM; 

You will then be able to jump to the section you are interested in – or wholly ignore the post – or patiently wait for your section of interest. This series will run for twelve months with three posts per week so thats 156 pearls of wisdom riddled, real life expertise indispensable posts for you.

A complete contents and navigation guide will be included in the next post with the subject of each post, sub-categories, a clickable link and an intended publication date.

Subscribe to New Posts

To be notified as each post is published please subscribe to the blog – over there on the right – yes over there in the right column at the top where it says “Follow by Email”.

No new content, no email for you – ever – and we won’t sell your email details to the NSA either and we are subpoena proof too so we can’t be forced to either.

END.