five-eyes-fvey-group-of-nations

  • India joins the UK in drive known as ‘Five Eyes’ group of nations, as a seventh member against encrypted social media messages.

‘Five Eyes’ group of nations:

  • The Five Eyes (FVEY) is an intelligence alliance comprising Australia, Canada, New Zealand, the United Kingdom and the United States.
  • The origins of the Five Eyes alliance can be traced back to the Atlantic Charter, which was issued in August 1941 to lay out the Allied goals for the post-war world.
  • These countries are parties to the multilateral UK-USA Agreement, a treaty for joint cooperation in signals intelligence.
  • India is among seven countries to back a UK-led campaign against end-to-end encryption of messages by social media giants such as Facebook, which they say hinder law enforcement by blocking all access to them.

A formal expansion :

  • The UK and India joined this group to ensure they do not blind themselves to illegal activity on their platforms, including child abuse images.
  • This marks an expansion of the so-called “Five Eyes” group of nations, a global alliance on intelligence issues, to include India and Japan.

For a common cause :

  • All members claim that end-to-end encryption policies such as those employed by the social media giant erode the public’s safety online.
  • They have made it clear that when end-to-end encryption is applied with no access to content, it severely undermines the ability of companies to take action against illegal activity on their own platforms.
  • It also prevents law enforcement investigating and prosecuting the most serious crimes being committed on these services such as online child sexual abuse, grooming and terrorist content.

End-to-end encryption :

  • End-to-end encryption (E2EE) is a system of communication where only communicating users can read the messages.
  • It is regarded as the most secure way to communicate privately and securely online.
  • By encrypting messages at both ends of a conversation, end-to-end encryption prevents anyone in the middle from reading private communications.
  • In principle, it prevents potential eavesdroppers – including telecom providers, Internet providers, and even the provider of the communication service – from being able to access the cryptographic keys needed to decrypt the conversation.