If you suspend your transcription on amara.org, please add a timestamp below to indicate how far you progressed! This will help others to resume your work!
Please do not press “publish” on amara.org to save your progress, use “save draft” instead. Only press “publish” when you're done with quality control.
This talk will go into details about the Five Eyes (FVEY), covering its origins in the aftermath of World War II, its expansion in the cold war, ECHELON, and further expansion in the the era of counter-terrorism, through today, where the Five Eyes have set their sights on enabling mass surveillance and stopping strong encryption.
The discussion will include:
- The history and background of the Five Eyes
Origins
Cold War (ECHELON)
Terrorism
- How the FVEY spying and intelligence sharing works
- Malware
- Backdoors
- Routers
- Internet exchanges
- Domestic sharing: when one member spies on another’s citizens, and shares the information back to get around prohibitions on domestic surveillance.
- More Eyes, More Problems. Proposals to expand the number of eyes, including many within the EU
- Whistleblowers: What the documents shared by Edward Snowden revealed about the Five Eyes
- The Five Eyes latest fight: Against strong encryption. FVEY member claim to aim to "thwart the encryption of terrorist messaging,” and the UK and Australia have taken steps through legislation to weaken security.
- Why this matters - the legal and policy framework for communications surveillance and the application of human rights principles for surveillance.