When you purchase through links on our site, we may earn an affiliate commission. Here’s how it works.

5 Eyes, 9 Eyes, & 14 Eyes Alliance

Last updated March 17, 2023
Written by:
Novak Bozovic
Novak Bozovic
Tech & VPN Content Specialist

The Five Eyes, Nine Eyes, and Fourteen Eyes Alliances are often hot topics in discussions about Internet privacy and safe usage. The three alliances comprise several key countries who have the common goal of monitoring and sharing mass Internet surveillance data for the stated purposes of national security.  

Today, these allied countries use sophisticated and invasive methods to collect Internet data of their citizens. These efforts include, but are not limited to, tapping key infrastructure, using proxies to gather intelligence, and working directly with local Internet service providers (ISPs) to access logged data of users. 

A foolproof way to keep your Internet activities safe from the prying eyes of government agencies is to use a capable VPN that is headquartered outside the allied countries.

In this article, we will discuss the history and current operations of the alliances and explain how their existence impacts you. You will also learn different ways of keeping your sensitive information safe online. 

So, without any further ado, let’s get into it!

What Are the 5 Eyes, 9 Eyes, and 14 Eyes Alliances?

5 Eyes, 9 Eyes, and 14 Eyes Alliances are a collaborative effort of different governments to monitor and share the private Internet and communication data of their citizens. 

The first of these alliances was the Five Eyes Alliance (also known as FVEY), which was formed shortly after World War II and consisted of Canada, the US, Australia, New Zealand, and the UK. FVEY has always been shrouded in secrecy, and its existence wasn’t made public until 2005. 

The original Five Eyes Alliance later expanded into the Nine Eyes Alliance with the addition of France, the Netherlands, Denmark, and Norway. Eventually, the Fourteen Eyes Alliance was formed after adding five more countries, including Belgium, Italy, Spain, Sweden, and Germany. 

Today, countries in these alliances collaborate with each other to varying degrees and gather mass Internet surveillance data by tapping key infrastructure. So, what does this mean for you? Well, for one example, your Internet service provider continuously logs your activity and allows government agencies to access that data

Many intelligence alliances are typically based on a barter system. Five Eyes, Nine Eyes, and Fourteen Eyes are unique in that they allow a free flow of information instead of requiring an exchange of data.

What’s concerning is that these alliances are still expanding and could potentially include other countries in the future. Possible candidates include Japan, South Korea, Japan, Singapore, and India. 

Differences Between the 5 Eyes, 9 Eyes, and 14 Eyes Alliances

There are some key differences between the 5 Eyes, 9 Eyes, and 14 Eyes Alliances in terms of countries, formal treaties, levels of responsibility, and rights. 

Generally, the Five Eyes is considered to be the strongest due to a formal agreement between the members. However, the other alliances also regularly assist with intelligence gathering and sharing. On top of that, third-party contributors consisting of friendly countries also play a key role in making global mass surveillance possible.

Let us take a look at the details of each of these alliances and their different third-party contributors.

Five Eyes Alliance

The Five Eyes Alliance consists of five countries: 

Countries that are a part of the Five Eyes are under an agreement to share signals intelligence (SIGINT) with each other. This can include communication intelligence (Internet activity, emails, text messages, and phone calls) and electronic intelligence (signals from surface-to-air missile systems and radars).

The original purpose of FVEY was to gather counter-intelligence data against the Soviet Union after the Second World War. However, the alliance’s objectives evolved with a change in the international political landscape and the start of the war on terror

Today, NSA (in the US) and GCHQ (in the UK) mainly direct their mass surveillance activities toward adversaries like Iran, Russia, and China. The other FVEY countries provide assistance in the surveillance. More recently, reports suggest that India will join the Five Eyes Alliance in the near future, as it is slowly entering the “inner circle.”

Nine Eyes Alliance

The Nine Eyes Alliance consists of four additional countries on top of the countries present in FVEY:

The main goal of the Nine Eyes was to further build upon the intelligence-sharing network for national security. The additional countries in this alliance simply act as third parties and do not have a formal treaty with SIGINT agencies

Hence, little is known about their official roles in the alliance. However, even though they are third-party participants, it’s important to remember that these countries are not exempt from mass surveillance.

Fourteen Eyes Alliance

The Fourteen Eyes further extend upon the Five Eyes and Nine Eyes Alliances by adding additional states collectively known as SIGINT Seniors Europe (SSEUR). This consists of the following countries: 

Like the Nine Eyes, the exact details of the agreement between the Fourteen Eyes and Five Eyes is not known. What we do know is countries in SSEUR regularly collaborate with FVEY to share and receive intelligence data. However, since they do not have a formal agreement, their level of responsibilities and rights in the alliance are unclear. 

Third-Party Contributors

Several additional countries are suspected to be third-party contributors to the surveillance conducted by the Fourteen Eyes. 

Possible third-party contributors include the NATO countries like: 

Countries that are generally globally allied among each other are also suspected to enable mass surveillance by the Fourteen Eyes. These include:

It has been reported that the Five Eyes Alliance might expand to include France, South Korea, and Japan to track China and North Korea’s moves. 

None of these third-party contributors are confirmed as part of the Alliance yet. That said, they can still receive and share surveillance and intelligence data from the Fourteen Eyes countries. 

The History Behind the 5 Eyes

As previously mentioned, the 5 Eyes is not new—its history dates back to World War II. The alliance has matured over the last few decades, and its focus has constantly shifted from one target to another. 

Let’s take a look at the brief history of the 5 Eyes Alliance and see where it stands today:

What Information Do These Alliances Collect?

The Five Eyes, Nine Eyes, and Fourteen Eyes Alliances collect and store your online activity data such as your search history and the websites you visit. They also track your emails, phone calls, video calls, and private messages based on data extracted from your ISP, online tracking tools, and other third-party methods. 

Theoretically speaking, the purpose of collecting this data is to maintain national security. The NSA has indeed foiled many international terrorism threats and caught criminals on the dark web using these surveillance tactics

However, let us not forget that the privacy of average citizens is also at risk here. Agencies in the past have been exposed for using unlawful methods of spying on their citizens. For instance, Edward Snowden leaked classified documents and exposed the NSA for collecting bulk phone records of American citizens as part of its surveillance program. These actions were later found in violation of the Foreign Intelligence Surveillance Act and ruled unlawful.

Instead of collecting their own intelligence data illegally, FVEY countries ask other allied agencies to run surveillance programs externally and share the gathered data. This loophole allows countries to spy on their citizens without breaking local privacy laws. Such use of proxies extends to all the alliance members. This means that your privacy could be at risk if you live in any of the allied countries.

What’s surprising is that the Five Eyes countries are also capable of tapping your phone lines. Under the Patriot Act enacted after the 9/11 attacks in the US, tapping phones is legal. Over the last few years, several attempts have been made to restrict such access, but the surveillance still continues to this day.  

How to Protect Yourself from 5 Eyes, 9 Eyes, & 14 Eyes Alliances

You may go to sleep at night believing you are not being watched, but the truth is that government agencies can easily access data such as your emails, private call history, online search history, and much more

Even if you are protected by local privacy laws in your country, nobody can guarantee that the government is not using foreign agencies or proxies to spy on you. Nowadays, the Internet and social media are a big part of our lives, so online privacy is of prime importance. 

Fortunately, there are a number of safety precautions you can take to avoid the mass surveillance tactics of the 5 Eyes, 9 Eyes, and 14 Eyes Alliances. In this section, we will discuss each of these methods in detail. 

Using a VPN

A VPN hides your IP address and protects your online data using various security protocols. VPNs route your Internet traffic through their own secure servers and temporarily assign you a different IP address that cannot be tied to you.

However, some VPNs will log your real IP address and Internet activities. If these VPNs are located in one of the Fourteen Eyes countries, they might be liable to share logs with government agencies. Here are some examples of such occurrences: 

To efficiently secure your Internet activities, you need a capable VPN based outside of the Fourteen Eyes countries. Additionally, the best VPNs employ military-grade encryption and strong security protocols to ensure your identity is protected online.

Only a few VPNs check all the necessary boxes. ExpressVPN is our top recommendation for hiding your data from the Fourteen Eyes Alliance and their associated intelligence agencies

Using an Anonymous Email and Alias

An anonymous email address or an alias can help you shield your identity on the Internet. Anonymous emails cannot be traced or tied to you. Furthermore, quality anonymous email services encrypt the emails, which means no one can view their content, even if they get intercepted during delivery

ProtonMail is a popular secure email service that uses end-to-end and open-source encryptions like AES, OpenPGP, and RSA. You can also choose from many other options like Mailfence, Tutanota, and CounterMail.

If you are not using an anonymous email service, another good option is to use an alias online, which is essentially an assumed name. However, the use of an alias is situational and may not be desirable in professional settings. 

Using a Burner Phone to Register for Services

We highly recommend using a burner phone when you are registering for non-essential services on the Internet, especially the ones that are suspected of logging and/or sharing user data. This helps secure your privacy because the burner number is not related to your identity in any way

Burner phones also come in handy when you are purchasing goods from strangers on Facebook or Craigslist. Since you will dispose of the burner number after using it, you will not become the target of scam calls or spam advertisements in the future.

It is not recommended to use a burner phone for essential services that require your phone number as an added security measure because you may lose access to your accounts permanently. This includes services like iCloud, Google, and other similar accounts.

Using Encrypted Messaging Services

Standard SMS texting doesn’t use any encryption, so it can be monitored by anyone looking to drop in on your private conversations. Encrypted messaging services require encryption keys to read messages’ content, and no one apart from the sender and recipient will have this key.

Some messaging services that claim to support end-to-end encryption include WhatsApp, Wickr, and Signal. Among these, the most prominent one is WhatsApp, which is owned by Facebook. 

We already know from the leaks by Snowden that the NSA has collected communications data from tech companies in the US like Facebook. This means that so-called “encrypted” services like Whatsapp that are owned by the data-sharing parent companies could also potentially be leaking information. For instance, the FBI was able to recover Signal and Whatsapp data from Trump's attorney's phone in 2018. 

While encrypted messaging services may not be fully safe, they are still better options than non-encrypted messengers.

Using a Privacy-Focused Browser

If you want maximum online protection, using the Tor browser might be your best bet. It is a good choice if you want to avoid fingerprinting on the Internet, as long as you use Tor’s standard settings. If you don’t install add-ons and stick to the default window sizing, it will be nearly impossible for someone to create your digital fingerprint. 

Regardless of the browser that you are using, it is important to follow some good privacy practices, such as: 

Avoiding Sharing Personal Information

This one might seem like a no-brainer, but it is best practice to avoid providing your personal information to people or services that you do not fully trust

Using an alias is a good way to hide your true name in many scenarios. You can also use throwaway email accounts, assumed addresses, and burner phones when you are registering for non-essential services so you can minimize sharing sensitive data. 

These methods ensure the safety of your personal information even if the service provider leaks it to government agencies—or in the case of a data breach. Limiting what you share online can keep you safe from stalkers and reduce the risk of getting doxxed, especially on social media platforms and online marketplaces.

Final Thoughts

Government agencies in Five Eyes, Nine Eyes, and Fourteen Eyes Alliance countries regularly collaborate with ISPs and big tech companies like Google, Meta, and Twitter to spy on citizens. 

Alliance members also tend to bypass their local privacy laws by using their allies as proxies to get their hands on mass surveillance data. So, if you reside in any of the Fourteen Eyes countries, your sensitive information may not be private

The best way to protect your data from surveillance measures is to use a high-security VPN. We recommend ExpressVPN because it’s one of the most capable VPNs on the market. It offers military-grade encryption and supports the latest and greatest security protocols, so you can trust that your online activities will remain private. 

FAQ

What Surveillance Systems Does the 5 Eyes Alliance Use?

The 5 Eyes Alliance uses the ECHELON Surveillance System, which dates back to the Cold War. Over time, this system evolved with new technology to focus on the online activities of citizens in various countries. 

How Can You Keep Your Online Data Secure?

You can keep your online data secure by using a capable VPN that has military-grade encryption and high-security protocols. We recommend ExpressVPN due to its strict no-logs policy and impressive privacy standards. 

Is Using a VPN Legal in 5 Eyes, 9 Eyes, u0026 14 Eyes Alliance Countries?

Yes, using a VPN is legal in Five Eyes, Nine Eyes, and Fourteen Eyes Alliance countries. However, it is recommended to use a VPN that is not headquartered in any of the allied countries to ensure your data is truly private.

Is ExpressVPN Part of the 14 Eyes?

No, ExpressVPN is not a part of the Fourteen Eyes Alliance because it is headquartered in the British Virgin Islands.

Who Is the Sixth Member of Five Eyes?

Japan is reported to be the sixth potential member of the Five Eyes Alliance. However, its integration into the alliance has not been fully confirmed yet and depends on the country’s political situation in the near future.

That’s all for our guide to the Five Eyes, 9 Eyes, and Fourteen Eyes Alliances. If you have any questions, you can drop a comment below. Thanks for reading!



For a better user experience we recommend using a more modern browser. We support the latest version of the following browsers: For a better user experience we recommend using the latest version of the following browsers: