Justin Trudeau and the Five Eyes: A Controversial Alliance

Canadian Prime Minister Justin Trudeau jumped the gun when he alleged that India was involved in the death of Hardeep Singh Nijjar, a Khalistani separatist on the basis of an intelligence report by the Five Eyes intelligence alliance. While India has vehemently denied the allegation, calling it "baseless" and "unfounded," the evidence in the public domain so far is inconclusive, and more information is needed to determine the truth of the matter

By Neeraj Mahajan

Opinion


Canadian Prime Minister Justin Trudeau dropped a virtual bombshell last week (September 29, 2023) by alleging that India was involved in the death of Hardeep Singh Nijjar the leader of a Khalistani separatist group outside a Gurdwara in Surrey, British Columbia, Canada on June 14, 2023.

The Indian government vehemently denied Trudeau’s allegation, calling it “baseless” and “unfounded.” New Delhi has instead accused Canada of harbouring Khalistani separatists. There is no publicly available evidence that India was involved.

The Canadian police have arrested a suspect in Nijjar’s murder, but the motive for the killing is still under investigation.

To support his claim Trudeau, said that his allegation was based on “credible” intelligence provided by Canada’s Five Eyes intelligence partners, which include the United States, the United Kingdom, Australia, and New Zealand.

The Five Eyes intelligence alliance is known for its secrecy. It is unlikely that any of its members will publicly release the evidence that they have on India’s involvement in Nijjar’s death.

According to sources intelligence gathering is a complex and challenging process. It requires the collection, analysis, and synthesis of information from a variety of sources. It also requires intelligence analysts to be able to think critically and assess the credibility of information.

There are many different ways to gather intelligence, including:

Human intelligence (HUMINT): HUMINT is intelligence that is collected from human sources, such as informants and spies. HUMINT can be very valuable in providing insights into the activities of terrorist organizations and other criminal groups. However, it is important to note that HUMINT can also be unreliable, as informants may sometimes provide false or misleading information.

The Indian government vehemently denied Trudeau’s allegation, calling it “baseless” and “unfounded.” New Delhi has instead accused Canada of harbouring Khalistani separatists. There is no publicly available evidence that India was involved. The Canadian police have arrested a suspect in Nijjar’s murder, but the motive for the killing is still under investigation

Signals intelligence (SIGINT): SIGINT is intelligence that is collected from electronic signals, such as telephone conversations, radio transmissions, and email messages. SIGINT can be very effective in tracking the movements of individuals and organizations. However, it is important to note that SIGINT can also be difficult to interpret, as it can be easy to confuse innocent communications with hostile communications.

Imagery intelligence (IMINT): IMINT is intelligence that is collected from optical and radar images. IMINT can be very useful in identifying individuals and objects, as well as in tracking their movements. However, it is important to note that IMINT can also be difficult to interpret, as it can be easy to misidentify individuals and objects.

Open-source intelligence (OSINT): OSINT is intelligence that is collected from publicly available sources, such as news articles, social media, and government websites. OSINT can be very useful in gathering information on a wide range of topics. However, it is important to note that OSINT can also be unreliable, as it can be difficult to verify the authenticity of information that is collected from open sources.

Here are some examples of how intelligence gathering is used:

  • A government may use intelligence gathering to track the movements of a terrorist group and to prevent them from carrying out an attack.
  • A law enforcement agency may use intelligence gathering to identify and arrest drug traffickers or other criminals.
  • A company may use intelligence gathering to identify and protect itself from cyberattacks.

The evidence made public regarding the death of Hardeep Singh Nijjar so far is inconclusive. Apart from Trudeau himself, no other Five Eyes intelligence alliance member has released any specific details or issued a statement about India’s involvement in Nijjar’s death.  Australian PM Anthony Albanese refused to be drawn into the controversy and merely said, “I don’t talk about Five Eyes intelligence at a press conference…we don’t speculate on what intelligence is.”

It is possible that the intelligence gathered by the Five Eyes alliance was unreliable or misinterpreted.

It is also likely that the ISI and other such agencies may be directly or indirectly involved in Nijjar’s death. However, there is no evidence so far to support this claim at this time. In 2010, a Canadian inquiry into the 1985 Air India bombing found that the ISI was involved in the planning and execution of the attack. The inquiry also found that the ISI had provided support to Khalistani separatists in Canada.

The term “Five Eyes” officially known as FVEY refers to an exclusive alliance of five English-speaking nations to collect and share intelligence with each other. Over the decades, the Five Eyes alliance has evolved as the most powerful and secretive intelligence-sharing network in the world.

Origin and evolution of the Five Eyes Alliance

The term “Five Eyes” officially known as FVEY refers to an exclusive alliance of five English-speaking nations to collect and share intelligence with each other. Over the decades, the Five Eyes alliance has evolved as the most powerful and secretive intelligence-sharing network in the world

The history of the Five Eyes alliance can be traced back to the early stages of World War II when the United States and the United Kingdom started sharing signals intelligence, code-breaking and intercepted communications. The initial collaboration was mainly focused on countering Axis powers, but it laid the groundwork for a more extensive intelligence-sharing arrangement after the war. In 1941, the UK and the US signed the “BRUSA Agreement” (later known as the UKUSA Agreement), which laid the foundation for intelligence cooperation. This agreement aimed to share and analyze intercepted communications, particularly those of the Axis powers. After World War II, Canada, Australia, and New Zealand formally joined the alliance and the intelligence-sharing arrangement continued. The partnership was formalized with the “UKUSA Agreement” in 1946, which established the terms and conditions for intelligence sharing among these five countries.

The Five Eyes alliance remains a highly secretive and close-knit partnership, with its members sharing intelligence on a wide range of global security issues. It’s worth noting that there are additional intelligence-sharing partnerships, such as the Nine Eyes (which includes the Five Eyes countries plus Denmark, France, the Netherlands, and Norway) and the Fourteen Eyes (which adds Germany, Belgium, Italy, Spain, and Sweden to the Nine Eyes). These expanded alliances have different levels of information sharing and cooperation.

Structure and Functioning of the Five Eyes

The Five Eyes is structured as a loose alliance, with no formal charter or governing body. The member countries share intelligence directly with each other, without the need for intermediaries. This allows for the rapid and efficient exchange of information, which is essential for countering threats to national security.

The Five Eyes alliance functions through a variety of channels, including:

  • Regular meetings: Representatives from the member countries meet regularly to discuss intelligence priorities and share information.
  • Secure communication networks: The Five Eyes countries maintain secure communication networks that allow them to exchange intelligence information quickly and easily.
  • Joint intelligence operations: The Five Eyes countries often collaborate on joint intelligence operations, such as monitoring terrorist groups or tracking the proliferation of weapons of mass destruction.
  • The Five Eyes alliance plays a vital role in protecting the national security of its member countries. The alliance has been instrumental in countering a wide range of threats, including terrorism, espionage, and cyberattacks.

Here are some examples of the Five Eyes alliance in action:

  • In 2013, the Five Eyes alliance played a key role in the discovery of the Edward Snowden leaks. Snowden, a former NSA contractor, leaked classified documents to the media that revealed the extent of the US government’s surveillance programs.
  • In 2015, the Five Eyes alliance collaborated to track down the perpetrators of the Paris terrorist attacks. The alliance used its intelligence-sharing capabilities to identify and track the suspects, which ultimately led to their capture or killing.
  • In 2022, the Five Eyes alliance warned its members of the potential for Russia to launch cyberattacks against critical infrastructure in the wake of the Ukraine war. The alliance urged its members to take steps to protect their infrastructure from these attacks.

Controversies Surrounding Five Eyes

The Five Eyes intelligence alliance has been the subject of a number of controversies over the years. Some of the most common criticisms include:

  • Lack of transparency and accountability: The Five Eyes Alliance is a very secretive organization. Its members do not disclose much information about its operations, and there is no independent oversight of its activities. This has led to concerns that the alliance could be abusing its powers or engaging in illegal activities.
  • Mass surveillance: The Five Eyes alliance has been accused of engaging in mass surveillance of its citizens. In 2013, Edward Snowden leaked classified documents that revealed the extent of the NSA’s surveillance programs, which included the collection of data on millions of Americans’ phone calls and internet activity. The other Four Eyes members were also found to be involved in similar surveillance programs.
  • Privacy violations: The Five Eyes Alliance’s surveillance programs have been criticized for violating the privacy rights of individuals. The alliance collects vast amounts of data on its citizens, including their phone calls, emails, and internet activity. This data is then stored and analyzed, often without the knowledge or consent of the individuals concerned.
  • Double standards: The Five Eyes alliance has been accused of applying double standards when it comes to surveillance. The alliance’s member countries are very quick to criticize other countries for surveillance practices, but they are reluctant to acknowledge their own wrongdoing.

The Five Eyes alliance has also been involved in a number of other controversies over the years. For example, in 2019, the alliance was criticized for its role in the extradition of Julian Assange from the UK to the US. Assange is the founder of WikiLeaks, which has published classified information leaked by government whistleblowers. The Five Eyes alliance played a key role in Assange’s extradition, which many people saw as an attack on freedom of the press.

The Five Eyes Alliance is a powerful organization that plays an important role in protecting the national security of its member countries. However, it is important to be aware of the controversies surrounding the alliance and to hold its members accountable for their actions.

The Five Eyes alliance remains an important player in global intelligence cooperation in the modern world. The alliance’s member countries face a range of common threats, including terrorism, cyberattacks, and foreign espionage. The Five Eyes alliance allows them to share intelligence and coordinate their responses to these threats more effectively.

-The writer is a seasoned media professional with over three decades of experience in print, electronic, and web media. He is presently Editor of Taazakhabar News. The views expressed are personal and do not necessarily reflect the views of Raksha Anirveda