US Agreement With The UK Allows Data Access To Private Companies

The US and UK authorities are working on a secret agreement that would allow a mutual access to data of their private companies.

The imperative is “monitor everything,” for espionage, business, and homeland security. Now the British Government is negotiating with the US Government the possibility to allow the British intelligence to tap into servers the US companies.

The Washington Post has seen a draft proposal that would allow the agents of the British Security Service MI5 to access overseas servers run by American companies. The document allows the British services to conduct live wiretaps as needed, of course the secret agreement will give the same opportunity to the US intelligence.

MI5 and the US counterpart already collaborate, but the mutual access to data managed by private companies is a time-consuming process.
Under the proposed deal, US companies would be compelled to hand over the data on request. The new deal aims to speed up the process, it states that US companies would be compelled to hand over the data on request.

“To obtain stored emails, a foreign government must rely on a mutual legal assistance treaty (MLAT) by which the country makes a formal diplomatic request for the data and the Justice Department then seeks a court order on its behalf, a process that is said to take an average of 10 months.”
 
“This has been an issue with the UK and other countries for a number of years,” said one senior administration official, who similar to several others, spoke on the condition of anonymity to discuss the negotiations.

Because of technological changes, the UK can no longer access data in the UK like they used to be able to, and more and more, UK nationals, including criminals in their country, are using providers like Google, Facebook, Hotmail. The more they are having challenges getting access to the data, the more our US providers are facing a conflict of laws.”

The mutual legal agreement may face legal issued due to the current law in UK, where wiretap orders, can be issued by the British Home Secretary.

“If US officials or Congress do not seek changes in the British standards, “what it means is they’re going to allow a country that doesn’t require independent judicial authorization before getting a wiretap to continue that practice, which seems to be a pretty fundamental constitutional protection in the United States,” said Eric King, a privacy advocate and visiting lecturer in surveillance law at Queen Mary University of London. “That’s being traded away.”

Despite the heated debate about users’ privacy, the US Government doesn’t seem to be worried by the proposals because the British authorities already adopt important procedural protections for privacy.

Security Affairs:  

 

 

« Twitter Steps Up Efforts To Combat ISIS
Protect Your Data From Internal Attacks »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

IX Associates

IX Associates

IX Associates is a UK based IT Integration business specialising in risk, compliance, eDefence, and network security solutions.

itWatch

itWatch

itWatch is focused on data loss prevention (DLP), endpoint security, mobile security, encryption, and cost reducing solutions for IT operations.

CalCom

CalCom

CalCom Hardening Solution (CHS) for Microsoft OMS is a security baseline-hardening solution designed to address the needs of IT operations and security teams.

SecuTech Solutions

SecuTech Solutions

SecuTech is a global leader in providing strong authentication and software licensing management solutions.

Aversafe

Aversafe

Aversafe provides individuals, employers and certificate issuers around the world with a first line of defense against credential fraud.

Redwall Technologies

Redwall Technologies

Redwall provides cybersecurity expertise and technology to prevent and respond to emerging threats against mobile applications and connected infrastructures.

River Loop Security

River Loop Security

River Loop Security specialize in solving complex cybersecurity challenges in the IoT and embedded devices space.

VariQ

VariQ

VariQ is a premier provider of Cybersecurity, Software Development and Cloud services to federal, state, and local government.

Sentrium Security

Sentrium Security

Sentrium is committed to helping organisations protect their technology, information and people. Our range of bespoke services provide solutions to tackle a broad range of cyber security challenges.

LogicBoost Labs

LogicBoost Labs

LogicBoost Labs has the expertise, experience, funding and connections to make your startup succeed. We are always interested in new ways to change the world for the better.

Questex Asia Total Security Conference

Questex Asia Total Security Conference

Questex Asia’s Total Security Conferences is one of the industry’s most prestigious and engaging forums for the region's top information security leaders and business decision-makers.

Epoch Concepts

Epoch Concepts

Offering a full line of IT services, solutions, and integration capabilities, Epoch Concepts is the trusted partner of the US military, federal agencies, private enterprises, and systems integrators.

HWG Sababa

HWG Sababa

HWG Sababa is a cybersecurity provider that offers a comprehensive suite of strategic managed security solutions, services, and consultancy.

Hummingbird International

Hummingbird International

Hummingbird International, LLC offers services for the collection, audit, computer recycling and safe disposal of laptops, monitor/LCD, hard drives, and IT disposal.

Nagomi Security

Nagomi Security

Nagomi is changing the way security teams balance risk and defense, empowering customers to focus on what matters now.

Chorology

Chorology

Chorology is a leading provider of intelligently automated, data compliance and posture enforcement solutions.