What You Should Know About the 5 Eyes, 9 Eyes, and 14 Eyes Alliances

The 5, 9, and 14 Eyes countries are likely surveying your internet activity, but a VPN from a non-alliance country could save your privacy.
We receive compensation from the products and services mentioned in this story, but the opinions are the author's own. Compensation may impact where offers appear. We have not included all available products or offers. Learn more about how we make money and our editorial policies.

The Five Eyes Alliance (FVEY) may be the largest intelligence gathering alliance you’ve never heard of before today. The mass surveillance and data interception by the Five Eyes nations are touted as intelligence services for national security but seem to have more of the hallmark traits of global surveillance.

This anglosphere of surveillance feels unheard of, given the prevalence of information in the media about the Russian and Chinese intelligence community. China, Russia, India, and, to lesser extents, Japan and India all have their own intelligence network outside of these alliances.

Whether you live in a Five Eyes, Nine Eyes, or Fourteen Eyes country, here’s what you should know about the alliances and how to protect your online privacy by using tools like secure VPN services.

In this article
What are the 5 Eyes, 9 Eyes, and 14 Eyes alliances?
The countries involved in the 5 Eyes, 9 Eyes, and 14 Eyes alliances and their partners
What can the alliances do?
Tips to protect your data online
VPNs outside the alliances
Surveillance FAQs
Bottom line

What are the 5 Eyes, 9 Eyes, and 14 Eyes alliances?

The Five, Nine, and Fourteen Eyes alliances are alliances of countries that have entered into intelligence-sharing agreements. The original group, the Five Eyes, was formed after World War II to share intelligence in the interest of national security.

After the Second World War, the UKUSA agreement was signed between what would become the (National Security Agency (NSA) and Britain’s Government Communications Headquarters (GCHQ). As it grew, eventually ramping up during the Cold War, British and U.S. intelligence agencies banded together to share signals intelligence.

Signals intelligence, defined by the NSA as “intelligence derived from electronic signals and systems used by foreign targets,” has only become more sophisticated as technology has advanced.

In recent years, the alliances came under scrutiny due to their impact on data privacy and the use of virtual private networks (VPNs).

As countries become more literate in online activity, they want to have access to the information provided by this type of surveillance — and it’s become evident that more and more data is being collected from everyday citizens. These intelligence-sharing arrangements can run the gambit between simple spying all the way to human rights violations.

Officially, each group consists of the countries listed below, but there are more countries that are allies of the 14 and may also be involved in information sharing. This means that software made in those countries may not technically share your information, but it’s still a possibility.

The countries involved in the 5 Eyes, 9 Eyes, and 14 Eyes alliances and their partners

  • Five Eyes countries: United States, United Kingdom, Canada, Australia, and New Zealand
  • Nine Eyes countries: The Five Eyes plus Netherlands, Norway, Denmark, and France
  • Fourteen Eyes countries: The Nine Eyes plus Italy, Germany, Belgium, Sweden, and Spain
  • Partners of the Fourteen Eyes: Israel, Japan, South Korea, Singapore, British Overseas Territories

It’s worth noting that although all countries in the Fourteen Eyes share information within their group, the Nine Eyes and Five Eyes are both more secretive.

While the Five Eyes are privy to the information collected by the Nine Eyes, Fourteen Eyes, and the partners, not all the information collected by the Five Eyes is available to the others. The same is true of the Nine Eyes. The partners, while they do share information they collect with the other alliances, do not have any access to the information collected by the alliances on alliance countries.

As the want for increased surveillance grows, more countries apparently align themselves with this global surveillance system. This system of alliances seems to have a hierarchy of secrets.

What can the alliances do?

The alliances can collect and store your internet activity from your internet service provider (ISP), third-party surveillance, or activity trackers.

This data includes your IP address, browsing history, search history, phone calls, video calls, private messages, emails, and anything else that passes through your internet connection. Basically, if it’s sent via an internet connection, it can be tracked, recorded, and stored.

The Fourteen Eyes also have the ability to tap phone lines. In the U.S., this is legal under the Patriot Act, which was enacted after 9/11. Several attempts in recent years have been made to restrict the access granted by the Patriot Act, but Congress has continually struck them down and allowed the surveillance to continue.

The U.S. isn’t the only country gathering information on everyday people. Although it’s technically illegal for Britain to spy on its citizens, it can ask Canada to do it for them as an FVEY country. That example extends to any of the alliance countries. This means that privacy laws can be moot if you live in one of these regions.

The Fourteen Eyes countries also have the power to gather information from your ISP through warrants or other judicial means. In some countries, such as the U.S., it may not even be necessary to obtain a warrant to gather your data.

If you want to avoid your ISP collecting what you transmit over the internet, you’ll need to use a VPN with a country of origin outside of the Fourteen Eyes.

Tips to protect your data online

  • Data encryption via a VPN is a great way to protect sensitive data. But if the VPN is based in an alliance country, there’s still a chance your security can be compromised.
  • VPN providers based in a Fourteen Eyes country can be legally required to hand over your internet activity if it’s requested by the surveillance team. So be sure to use a VPN that’s not based in an alliance country.
  • In addition to a VPN, good internet hygiene includes being aware of the sites you visit and the amount of personal data you share. If a site looks spammy or fishy, it’s best to try to find what you’re looking for from a more reputable source.
  • Knowing the country of origin is very important for the software you use. Many programs touted as protection come from places where the surveillance itself is happening. It’s crucial for a VPN’s potency to be located outside of the Fourteen Eyes.

VPNs outside the alliances

If you want to make sure you have a VPN that can’t be forced to share your data, find out where the software is made. Choosing a VPN from a country outside the alliances ensures your encrypted data stays private.

You’ll also need to make sure the VPN doesn’t keep logs of your internet activity because logs can be compromised if their servers are ever breached. Below are some of the most secure VPN providers with strict no-logs policies outside of intelligence-sharing government alliances. 

Price $2.99–$17.99/mo Free–$9.99/mo $2.03–$6.99/mo
Free version
Max # of connected devices 10 10 7
# of servers 6,800+ servers in 111 countries9,100+ servers in 112 countries Unlisted in 100 countries
VPN protocol NordLynx (WireGuard), OpenVPN, IKEv2/IPsec WireGuard, OpenVPN, IKEv2, Stealth WireGuard, OpenVPN, IKEv2
Encryption AES-256 AES-256 or ChaCha20 AES-256
No-logs policy No logs No logs No logs
Headquarters Panama Switzerland Romania
Netflix access
Learn more Get NordVPN Get Proton VPN Get CyberGhost

Surveillance FAQs


+

Can the government track you if you’re using a VPN?

The short answer is no. If you use a reliable VPN service, your web activity and IP address will definitely be protected. But the information you provide to third-party sites, such as your address or your phone number, can still be accessed from that third-party site. For example, if you enter your data into a shopping website, that site saves your information for payments and shipping. Your address can then be accessed from that individual company rather than from your personal device.


+

Can the government tell if I’m using a VPN?

Yes. Both your ISP and the government can see that your data is encrypted and therefore you’re using a VPN. They can’t, however, see the data being encrypted if the country of origin of the VPN is outside of the Fourteen Eyes.


+

Can the police track VPN activity?

Maybe. If you’re using a reputable VPN outside of the alliances, they won’t be able to track what’s being transferred. If you use a VPN within the alliance countries, the police may obtain a search warrant to serve to the VPN provider and collect your data.

Bottom line

Edward Snowden once said, “Arguing that you don't care about the right to privacy because you have nothing to hide is no different than saying you don't care about free speech because you have nothing to say.” In other words, it doesn’t matter if you’re not breaking the law; you still have the right to privacy.

Using a trusted virtual private network service makes sense, not just for the privacy aspect of the intelligence-sharing countries but also to keep you safe from cybercriminals. Data encryption provides a sense of security as well as a shield against what you don’t know. There’s a lot of stuff out there, and making sure you keep your information safe is your right.

Most people reading this will never do anything to compromise national security, but that doesn’t mean the right to privacy doesn’t belong to all of us. Using a VPN outside of these surveillance states can help keep your information and data private, even if all it consists of is sending cat memes to your best friend.

Customizable Coverage That is Simple to Use
5.0
Editorial Rating
Learn More
On NordVPN's website
VPN
NordVPN
BLACK FRIDAY: Up to 74% off + 3 free months
  • Ultra-secure, high-speed VPN complete with malware protection and automatic blocking of intrusive ads and third-party trackers
  • Other benefits include a premium password manager, dark web monitoring, and access to IP-restricted content
  • 3 plans to choose from for custom protection on up to 10 devices

Author Details
Mary is a seasoned cybersecurity writer with over seven years of experience. With a B.S. in Liberal Arts from Clarion University and an M.F.A. in Creative Writing from Point Park University, she educates audiences on scams, antivirus software, and more. Her passion lies in educating audiences on helpful ways to protect their data.