A history of the Five Eyes Alliance: Possibility for reform and additions

  title={A history of the Five Eyes Alliance: Possibility for reform and additions},
  author={Corey Pfluke},
  journal={Comparative Strategy},
  pages={302 - 315}
  • Corey Pfluke
  • Published 4 July 2019
  • Political Science
  • Comparative Strategy
Abstract At the end of World War II, the United States and the United Kingdom continued their intelligence-sharing efforts by signing the British-U.S. Communication Agreement, later renamed UKUSA. The purpose of the agreement was to streamline the intelligence-sharing process between the two nations in order to better handle global threats, most notably the Soviet Union. The addition of Canada, Australia, and New Zealand led to what is now known as the Five Eyes Alliance. Despite its global… Expand
5G Security – The Politics of Huawei Equipment in the United Kingdom
While the US Congress has long viewed Huawei as a security threat, this only recently became part of US foreign policy, with efforts by the Trump Administration to press allies to exclude commercialExpand
How to Classify Intelligence Relations: Partnership Types in the Intelligence Community
An intelligence relationship is a delicate and sensitive matter, as the sharing of information puts one’s methods and assets at risk. Cooperation over time, common interests, cost-benefitExpand
Strategic Overview of European Space and Security Governance
The importance of security is increasing in strategic policies, activities, and programs of European countries, the European Union (EU), and the European Space Agency (ESA). Each European country hasExpand
From secrecy privilege to information management: A comparative analysis of classification reforms
The classification frameworks in case countries have moved away from a dichotomous understanding of secrecy and transparency toward a gradient logic embedded within broader considerations regarding information management, exploitation and sharing. Expand
Circulation, not cooperation: towards a new understanding of intelligence agencies as transnationally constituted knowledge providers
ABSTRACT Theoretical approaches to international intelligence relations primarily rely on the inadequate concept of cooperation. I offer an alternative analytical framework based on the concept ofExpand
Cybersecurity of consumer products against the background of the EU model of cyberspace protection
The possible role of competition and consumer protection authorities in shaping a future model of EU cybersecurity is discussed and the existing mechanisms in EU law that allow supervisory authorities to shape the consumer product safety market are considered. Expand
La inteligencia como organización burocrática: disfunciones del modelo weberiano
Despite the disparity of the intelligence services’ historical development during the 20th century, a comparative approach reveals that most of today’s democratic political regimes’ intelligenceExpand
Transforming the Australian intelligence community: mapping change, impact and challenges
ABSTRACT 9/11 produced significant changes to the US intelligence community, while in contrast the attacks resulted in incremental changes in the Australian intelligence community (AIC). Fast forwardExpand
National Leaders’ Usage of Twitter in Response to COVID-19: A Sentiment Analysis
Results showed that of the leaders, President Trump tweeted the most, with Prime Minister Morrison posting the least number of tweets, and the majority of each leaders’ tweets were positive, while President Trump had the most negative tweets. Expand
An analysis of the graph processing landscape
An overview of different aspects of the graph processing landscape is provided, different types of systems to use, coordination and communication models in distributed graph processing, partitioning techniques and different definitions related to the potential for a graph to be updated are described. Expand


Australia and the ‘Five Eyes’ intelligence network: the perils of an asymmetric alliance
ABSTRACT Aside from NATO, the Five Eyes intelligence network between the USA, the UK, Canada, Australia and New Zealand is the world’s most enduring multilateral arrangement of its type. While theExpand
After the Avalanche: The Post-Snowden Intelligence Politics between the United States, the United Kingdom, and Germany
The revelations of PRISM and XKeyscore by ex-National Security Agency (NSA) analyst Edward Snowden resulted in arguably the largest intelligence leak so far in the 21 century. The leak revealed thatExpand
The partnership : the inside story of the US-Australian alliance under Bush and Howard
Tells the inside story of the US-Australia alliance under John Howard and George W Bush. It features explosive behind-the-scenes conversations between Australian and American leaders that reveal theExpand
European (British and French) geostrategy in the Indo–Pacific
Abstract The rise and integration of the Indian Ocean region and the Pacific rim over the past decade – into an ‘Indo–Pacific’ zone – and the emerging competition between the region's major powers,Expand
Rethinking ‘Five Eyes’ Security Intelligence Collection Policies and Practice Post Snowden
Abstract The Edward Snowden leaks challenge policy makers and the public's understanding and perspectives on the role of security intelligence in liberal democratic states. This article explores theExpand
This Is Australia
Part of an international series embracing exotic travel destinations, this volume explores all aspects of Australia, its people and wildlife. Introductory text establishes historical perspective andExpand
  • J. Gilchrist
  • Computer Science
  • Encyclopedia of Information Systems
  • 2002
The sample code provided is for demonstrating the use of Relais public-key for encryption and may not be of production quality but is provided as a guide for getting one started. Expand
An Exclusive Club: The 5 Countries That Don’t Spy On Each Other,
  • PBS News Hour, October
  • 2013
Australia First to Admit We’re Part of Global Surveillance System,
  • Heise Online, May 28,
  • 1999
Australia Pushes for Weaker Encryption at Five Eyes Meeting,
  • CNET Magazine, June
  • 2017