{"id":100280,"date":"2022-11-13T21:22:25","date_gmt":"2022-11-13T21:22:25","guid":{"rendered":"https:\/\/yogaesoteric.net\/?p=100280"},"modified":"2022-11-13T21:23:27","modified_gmt":"2022-11-13T21:23:27","slug":"five-eyes-the-international-syndicate-that-spies-on-the-entire-world-2","status":"publish","type":"post","link":"https:\/\/yogaesoteric.net\/en\/five-eyes-the-international-syndicate-that-spies-on-the-entire-world-2\/","title":{"rendered":"Five Eyes: the international syndicate that spies on the entire world (2)"},"content":{"rendered":"<p>Read <a href=\"https:\/\/yogaesoteric.net\/en\/five-eyes-the-international-syndicate-that-spies-on-the-entire-world-1\/\">the first part<\/a> of the article<\/p>\n<p><strong>The China Syndrome<\/strong><\/p>\n<p>In the 21st century, mere national monopolies are no longer sufficient for Silicon Valley moguls and their shepherds in the intelligence community. Firms like Google, Apple, Facebook and Twitter command near-global monopolies in their respective markets. This means that as long as those Western firms permeate and dominate the planetary information space, Five Eyes operatives only require a backdoor into a handful of these firms to surveil and control almost every aspect of public (and even private) life.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-100281 aligncenter\" src=\"https:\/\/yogaesoteric.net\/wp-content\/uploads\/2022\/11\/fe1.png\" alt=\"\" width=\"560\" height=\"350\" srcset=\"https:\/\/yogaesoteric.net\/wp-content\/uploads\/2022\/11\/fe1.png 1280w, https:\/\/yogaesoteric.net\/wp-content\/uploads\/2022\/11\/fe1-300x188.png 300w, https:\/\/yogaesoteric.net\/wp-content\/uploads\/2022\/11\/fe1-1024x640.png 1024w, https:\/\/yogaesoteric.net\/wp-content\/uploads\/2022\/11\/fe1-768x480.png 768w\" sizes=\"auto, (max-width: 560px) 100vw, 560px\" \/><\/p>\n<p>Controlling technology markets has become a matter of paramount concern for the Five Eyes. That includes keeping out any foreign product which could cause a wrinkle in their control matrix.<\/p>\n<p>As expected, this situation feeds neatly into a ready-made geopolitical drama, especially if the Trojan Horse in question arrives in the form of a Chinese firm. As Britain expedites the roll-out of its controversial high-frequency 5G network, new security concerns have surfaced at the heart of the Five Eyes as politicians and spooks debate the possibility a foreign actor could compromise the alliance from within.<\/p>\n<p>Western technocrats have rushed to finalise preparations to create a grid of \u201c<em>smart cities<\/em>\u201d and smart infrastructure including fleets of self-driving cars on \u201c<em>smart highways<\/em>,\u201d as well as a host of public services \u2013 all linked as part of the \u201c<em>internet of things<\/em>.\u201d To make this project work, the UK has to partner with the only company who can deliver enough advanced equipment on time and on budget \u2013 Chinese telecommunications giant Huawei.<\/p>\n<p>In theory, Five Eyes fears may be warranted. With 5G set to provide the new framework for real-time spying and data monitoring, Western spy chiefs and politicians are afraid of becoming too reliant on potential geopolitical and commercial rival China.<\/p>\n<p>Practically speaking, Huawei\u2019s hardware is fairly standardised and compatible with other components used to configure the UK\u2019s new 5G network, and to date, there is no proof of any latent Chinese spyware in any of the components in question.<\/p>\n<p>UK spy chiefs are already lining up in defence of the realm, with former MI6 head Richard Dearlove chiming in: \u201c<em>\u2026we need to conclude the engagement of Huawei presents a potential security risk to the UK. The key question that follows is can that risk be sufficiently mitigated to render it negligible?<\/em>\u201d<\/p>\n<p>A number of tertiary arguments against Huawei are being employed by Western officials including charges that China steals Western intellectual property, or that Chinese firms are inherently \u2018anti-competitive\u2019 because of state subsidies given to many enterprises.<\/p>\n<p>Reading between the lines, more of a worry for the Five Eyes (or a privatised Spectre syndicate) is the fact that a whole range of other Huawei products could employ a different proprietary Chinese encryption protocol that would give not only Chinese officials and intelligence workers a privacy edge, but the public mass-consumer too \u2013 keeping the NSA from intercepting a user\u2019s communications, or at least making it much more difficult. Thus, keeping Chinese products out of Western surveillance zones could be a major priority for Five Eyes technocrats.<\/p>\n<p>Earlier in 2020, US President Donald Trump escalated the technology war with China by signing an executive order that prohibits US companies from installing any \u201c<em>foreign-made<\/em>\u201d telecoms equipment which the US deems a national security threat, meaning that Huawei requires a special license issued at the discretion of Washington.<\/p>\n<p>Huawei Chairman Liang Hua responded at an industry press conference during the China-Germany-USA Media Forum, saying that the US placing Huawei on its entity list has had \u201c<em>no substantial impact<\/em>\u201d on Huawei\u2019s business and that all of the company\u2019s flagship products are shipping as normal.<\/p>\n<p>Liang Hua remarked that in only two or three years, Huawei will have developed a complete technological and commercial \u201c<em>ecosystem<\/em>\u201d for its range of products, making it more difficult for the Five Eyes syndicate to maintain their digital hegemony by aiming to shut Huawei out of international markets.<\/p>\n<p>Naturally, this poses a direct threat to the West\u2019s global digital media and communications mafia, and its overlapping fraternal network of government agencies, corporations and \u2018white-collar\u2019 organised criminal syndicates.<\/p>\n<p><strong>The War On Encryption<\/strong><\/p>\n<p>Aside from concerns about statecraft, most independent-conscience citizens might be alarmed by the unbridled Orwellian power of such a global operation. On this point, there is little advice one can offer other than to stay off social media or go \u2018off-grid\u2019 (offline) as much as possible to avoid leaving a detailed digital footprint that can be used to build a profile on you.<\/p>\n<p>For those who depend on the internet for their day-to-day existence, going off-grid is not really a practical option, but there are tools available that can help make surveillance difficult for 5, 9, and 14 Eyes member governments.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-100284\" src=\"https:\/\/yogaesoteric.net\/wp-content\/uploads\/2022\/11\/fe2.jpg\" alt=\"\" width=\"560\" height=\"315\" srcset=\"https:\/\/yogaesoteric.net\/wp-content\/uploads\/2022\/11\/fe2.jpg 650w, https:\/\/yogaesoteric.net\/wp-content\/uploads\/2022\/11\/fe2-300x169.jpg 300w\" sizes=\"auto, (max-width: 560px) 100vw, 560px\" \/><\/p>\n<p>Besides using a reliable encrypted chat or messaging service, if you are not already using a Virtual Private Network (VPN), then now may be a good time to start. VPN encrypts all of your internet traffic and scrambles your IP address, making it difficult for anyone monitoring you online to pinpoint your identity, device, and physical location.<\/p>\n<p>One key requirement is pursueing to use a service based outside the Fourteen Eyes countries. This means you may not be immediately exposed should your service provider\u2019s host country ask for back door access to your internet records. If you are using a service within the Fourteen, then be sure to choose a company that has a \u2018no logs\u2019 policy. In other words, should a US or UK agency like the NSA or GCHQ make a formal request from a service provider to hand over all your internet search data, then there will be nothing they can hand over.<\/p>\n<p>Likewise, you can use a number of encrypted instant messaging services like Telegram, or encrypted email services like Proton Mail, and also consider using an internet browser that doesn\u2019t keep data on your surfing like Brave, or a search engine like Duck Duck Go which doesn\u2019t save data on all of your search activity.<\/p>\n<p>Perhaps the biggest obstacle to Five Eyes hegemony are digital services that use end-to-end encryption. This means only the sender and receiver can view the content, concealing communications from the prying eyes of Western spy agencies.<\/p>\n<p>Needless to say, insatiable state authoritarians are not happy about this and have laid down a harrowing ultimatum to tech companies, demanding write-in backdoor access protocols supposedly for \u201c<em>law enforcement<\/em>.\u201d If firms do not comply, government officials threaten they should be ready for brute force intrusions by agents of the state.<\/p>\n<p>Knowing they do not have the public on their side, governments have resorted to intimidation and scare tactics in order to swing public opinion in their favour.<\/p>\n<p>While served as Home Secretary in 2015, former UK Prime Minister Theresa May authored a rather opprobrious piece of legislation entitled the Investigatory Powers Act (IPA), which outlines where the British police state is heading in terms of privacy and encryption. The bill requires that any \u201c<em>communications service provider<\/em>\u201d (ISPs, social media platforms, VOIP, email providers and messaging service) \u201c<em>must<\/em>\u201d comply with a secret warrant signed by the Home Secretary which names any persons or organisations the government wishes to spy on. One watchdog organisation who has followed the IPA is the Electronic Frontier Foundation (EFF).<\/p>\n<p>According to researchers, the draconian decree, also known as the \u2018<em>Snooper\u2019s Charter<\/em>\u2019, requires tech companies to insert special malware onto their systems so the spooks can use their platforms to \u201c<em>interfere with any other system<\/em>.\u201d The secret warrant explicitly allows those companies to violate any other laws in complying with the warrant. Essentially, the warrant enables said tech firms to violate the law in the process of complying with the government\u2019s secret snooper\u2019s warrant.<\/p>\n<p>This would also include the Home Secretary ordering firms like Facebook, Samsung or Apple to quietly remove their \u2018<em>secure communication<\/em>\u2019 features from products without notifying the public about it. In terms of its legality (or lack thereof), the devil is in the absence of detail. Danny O\u2019Brien from EFF noted how the UK government has been very careful not to pin itself down with any specifics, explaining, \u201c<em>Sure enough, the word \u2018encryption\u2019 does not appear in the Investigatory Powers Act (IPA). That\u2019s because it is written so broadly it doesn\u2019t need to<\/em>.\u201d<\/p>\n<p>EFF describes the severity of the IPA in terms of riding roughshod over basic civil rights and protections: \u201c<em>The Investigatory Powers Bill, one of the first laws to explicitly permit such techniques for law enforcement and intelligence work, contains very little in the way of oversight, and grants the British government an almost blank check for deploying malware against<\/em> <em>individual users as well as the heart of the internet\u2019s infrastructure.<\/em><\/p>\n<p><em>It also demands that private companies and<\/em> <em>persons assist in the deployment of this spyware, no matter where they operate in the world, and requires that this assistance be kept permanently secret from customers, partners, and the general public.<\/em><\/p>\n<p><em>IPA provisions might also include the government forcing a chain of coffee shops to use the company\u2019s free WiFi service to deploy British spy agency malware against its customers.<\/em><\/p>\n<p><em>The state\u2019s intrusion goes even further with the IPA laying the parameters for the UK government to demand tech companies supply them with new product designs\u2026 in advance of commercial release.<\/em><\/p>\n<p><em>This is a shocking act of overreach by the British state \u2013 one that exceeds even the most invasive state intervention in a country like China.<\/em><\/p>\n<p><em>One has to ask: given the chance, would the UK government eventually pursue a complete ban on encryption?<\/em><\/p>\n<p><em><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-100287 aligncenter\" src=\"https:\/\/yogaesoteric.net\/wp-content\/uploads\/2022\/11\/fe3-e1668374478271.jpg\" alt=\"\" width=\"560\" height=\"402\" srcset=\"https:\/\/yogaesoteric.net\/wp-content\/uploads\/2022\/11\/fe3-e1668374478271.jpg 1800w, https:\/\/yogaesoteric.net\/wp-content\/uploads\/2022\/11\/fe3-e1668374478271-300x215.jpg 300w, https:\/\/yogaesoteric.net\/wp-content\/uploads\/2022\/11\/fe3-e1668374478271-1024x734.jpg 1024w, https:\/\/yogaesoteric.net\/wp-content\/uploads\/2022\/11\/fe3-e1668374478271-768x551.jpg 768w, https:\/\/yogaesoteric.net\/wp-content\/uploads\/2022\/11\/fe3-e1668374478271-1536x1102.jpg 1536w\" sizes=\"auto, (max-width: 560px) 100vw, 560px\" \/><\/em><\/p>\n<p><em>While there is considerable push-back from tech companies and public advocacy groups, there\u2019s surprisingly little rebellion from most mainline politicians, partly because they are not being pressured from their constituents on this issue.<\/em><\/p>\n<p><em>What anti-privacy initiatives like the IPA clearly demonstrate is that Britain is the one clearly setting the dark tone and aggressive pace for the Five Eyes cohort.<\/em><\/p>\n<p><em>The agenda clearly seeks a renewed license to put tech firms in a corner by deploying emotive language and invoking evermore dramatic conspiracy claims.<\/em><\/p>\n<p><em>In her article written for the Telegraph, current UK Home Secretary Priti Patel even went so far as to equate Facebook\u2019s noncompliance with aiding and abetting \u2018child abusers, drug traffickers and terrorists plotting attacks.\u2019<\/em>\u201d<\/p>\n<p>Of course, Patel\u2019s comments shouldn\u2019t surprise anyone who has followed the issue of privacy over the years, particularly in the post-9\/11 era where politicians and national security state operatives routinely gaslight the public to justify every intrusion or roll-back of privacy rights by citing the most extreme and infrequent instances of \u2018<em>terrorism<\/em>\u2019.<\/p>\n<p>For the 21st century technocracy and police state, that\u2019s been the gift that just keeps giving, but by the same token the public have become increasingly wary of such dramatic government claims due to the fact that very rarely, if ever, has government wiretapping or backdoor spying actually thwarted a terrorist attack in what is popularly referred to in national security rhetoric and Hollywood propaganda lore as \u2018the ticking bomb\u2019 scenario.<\/p>\n<p>According to a report by security experts Sophos, at a recent Five Eyes security summit officials left no doubt as to their intentions, stating: \u201c<em>Tech companies should include mechanisms in the design of their encrypted products and services whereby governments, acting with appropriate legal authority, can obtain access to data in a readable and usable format<\/em>.\u201d<\/p>\n<p>Five Eyes member Australia took the matter even further, threatening to \u201c<em>break in<\/em>\u201d if tech companies do not facilitate the access requirements of the state.<\/p>\n<p>This new policy initiative was expressed unabashedly in a memo issued by the Australian Dept of Home Affairs on behalf of the Five Eyes alliance:<\/p>\n<p>\u201c<em>The Governments of the Five Eyes encourage information and communications technology service providers to voluntarily establish lawful access solutions to their products and services that they create or operate in our countries<\/em>\u2026.<\/p>\n<p><em>Should governments continue to encounter impediments to lawful access to information necessary to aid the protection of the citizens of our countries, we may pursue technological, enforcement, legislative or other measures to achieve lawful access solutions.<\/em>\u201d<\/p>\n<p>A closer look at the memo reveals that Australia\u2019s authoritarian designs are not restricted to stopping terrorists and paedophiles but appear to target any entities they feel are \u201c<em>sowing discord<\/em>\u201d (including any popular dissenting opinion and analysis), that supposedly threatens our vaunted \u201c<em>democratic institutions<\/em>.\u201d<\/p>\n<p>This may also include any foreign media (as depicted in the heavily promoted \u2018<em>Russian disinformation<\/em>\u2019 narrative), independent media, and free-thinking persons on social media.<\/p>\n<p><strong>The language could not be more arbitrary:<\/strong><\/p>\n<p>We are determined to ensure that the technologies that have been developed to enhance prosperity and freedom are not exploited by those who seek to promote terrorism and violent extremism; prey upon and exploit our children; or spread disinformation and discord to undermine our democratic institutions.<\/p>\n<p>This, alongside Britain\u2019s notorious \u2018<em>Snooper\u2019s Charter<\/em>\u2019, demonstrates how Five Eyes partners are working in concert by gradually laying down an alliance-wide legal framework that will legitimise what would normally be unwarranted activity by state agencies. This is done by suspending any constitutional provisions or rights \u2013 all in the name of protecting national security, or even the national interest as the state defines it.<\/p>\n<p>Many leading VPNs and messaging services can protect your data with 256-bit encryption, now used in most modern encryption algorithms and protocols. For the moment, this technology offers fairly robust protection from the prying eyes of the intelligence services, but advances in computing power may eventually put many of these protections at grave risk.<\/p>\n<p>New advances in quantum computing threaten to usher in a new event horizon whereby the next generation of computers could conceivably crack today\u2019s industry-standard 256-bit encryption key in a relatively short period of time \u2013 in mere minutes, or even seconds. Researchers at the Massachusetts Institute of Technology (MIT) have shown how a quantum processor can crack a seemingly impenetrable 2,048-bit RSA encryption in only eight hours. Exactly how far off we are to this quantum revolution is anyone\u2019s guess but when it arrives it could tip the scales of privacy away from the consumer and in favour of those organisations who control this new technology, namely Silicon Valley monopolists and the intergovernmental Five Eyes complex.<\/p>\n<p>On the flip side, advances in quantum decryption may also coincide with new methods of encryption that could slow down quantum crackers enough to make decryption impractical. It\u2019s incredible to think that these technological battles waged in binary virtual space may end up defining our relationship with the state in the physical world.<\/p>\n<p>Things are moving extremely fast right now. Such a dystopic state of affairs is necessary to be resisted on every level. Our future depends on it.<\/p>\n<p>&nbsp;<\/p>\n<p><strong>yogaesoteric<br \/>\nNovember 13, 2022 <\/strong><\/p>\n<p><strong>\u00a0<\/strong><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Read the first part of the article The China Syndrome In the 21st century, mere national monopolies are no longer sufficient for Silicon Valley moguls and their shepherds in the intelligence community. Firms like Google, Apple, Facebook and Twitter command near-global monopolies in their respective markets. This means that as long as those Western firms [&hellip;]<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_uf_show_specific_survey":0,"_uf_disable_surveys":false,"footnotes":""},"categories":[1180],"tags":[],"class_list":["post-100280","post","type-post","status-publish","format-standard","hentry","category-information-control-for-social-manipulation-3480-en"],"_links":{"self":[{"href":"https:\/\/yogaesoteric.net\/en\/wp-json\/wp\/v2\/posts\/100280","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/yogaesoteric.net\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/yogaesoteric.net\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/yogaesoteric.net\/en\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/yogaesoteric.net\/en\/wp-json\/wp\/v2\/comments?post=100280"}],"version-history":[{"count":2,"href":"https:\/\/yogaesoteric.net\/en\/wp-json\/wp\/v2\/posts\/100280\/revisions"}],"predecessor-version":[{"id":100292,"href":"https:\/\/yogaesoteric.net\/en\/wp-json\/wp\/v2\/posts\/100280\/revisions\/100292"}],"wp:attachment":[{"href":"https:\/\/yogaesoteric.net\/en\/wp-json\/wp\/v2\/media?parent=100280"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/yogaesoteric.net\/en\/wp-json\/wp\/v2\/categories?post=100280"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/yogaesoteric.net\/en\/wp-json\/wp\/v2\/tags?post=100280"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}