US Agreement With The UK Allows Data Access To Private Companies

The US and UK authorities are working on a secret agreement that would allow a mutual access to data of their private companies.

The imperative is “monitor everything,” for espionage, business, and homeland security. Now the British Government is negotiating with the US Government the possibility to allow the British intelligence to tap into servers the US companies.

The Washington Post has seen a draft proposal that would allow the agents of the British Security Service MI5 to access overseas servers run by American companies. The document allows the British services to conduct live wiretaps as needed, of course the secret agreement will give the same opportunity to the US intelligence.

MI5 and the US counterpart already collaborate, but the mutual access to data managed by private companies is a time-consuming process.
Under the proposed deal, US companies would be compelled to hand over the data on request. The new deal aims to speed up the process, it states that US companies would be compelled to hand over the data on request.

“To obtain stored emails, a foreign government must rely on a mutual legal assistance treaty (MLAT) by which the country makes a formal diplomatic request for the data and the Justice Department then seeks a court order on its behalf, a process that is said to take an average of 10 months.”
 
“This has been an issue with the UK and other countries for a number of years,” said one senior administration official, who similar to several others, spoke on the condition of anonymity to discuss the negotiations.

Because of technological changes, the UK can no longer access data in the UK like they used to be able to, and more and more, UK nationals, including criminals in their country, are using providers like Google, Facebook, Hotmail. The more they are having challenges getting access to the data, the more our US providers are facing a conflict of laws.”

The mutual legal agreement may face legal issued due to the current law in UK, where wiretap orders, can be issued by the British Home Secretary.

“If US officials or Congress do not seek changes in the British standards, “what it means is they’re going to allow a country that doesn’t require independent judicial authorization before getting a wiretap to continue that practice, which seems to be a pretty fundamental constitutional protection in the United States,” said Eric King, a privacy advocate and visiting lecturer in surveillance law at Queen Mary University of London. “That’s being traded away.”

Despite the heated debate about users’ privacy, the US Government doesn’t seem to be worried by the proposals because the British authorities already adopt important procedural protections for privacy.

Security Affairs:  

 

 

« Twitter Steps Up Efforts To Combat ISIS
Protect Your Data From Internal Attacks »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

Exclusive Networks

Exclusive Networks

Exclusive Networks accelerate market entry and growth for innovative cybersecurity, networking and infrastructure technologies.

DeviceLock

DeviceLock

DeviceLock is a leading provider of endpoint device/port control and data leak prevention software.

Stott & May

Stott & May

Stott & May is a specialist cyber security recruitment agency.

Lares Consulting

Lares Consulting

Lares is a security consulting firm that helps companies secure electronic, physical, intellectual, and financial assets through a unique blend of assessment, testing and coaching.

Australian Signals Directorate (ASD)

Australian Signals Directorate (ASD)

The Australian Signals Directorate is an intelligence agency in the Australian Government Department of Defence.

The Data Privacy Group

The Data Privacy Group

The Data Privacy Group provide expert professional services underpinned by world leading automation tools and a consulting team specialized in privacy and data protection.

VIBE Cybersecurity International

VIBE Cybersecurity International

VIBE’s certificate-less authenticated encryption enables scalable, flexible key exchange, and other advanced cryptographic functions using identity-based elliptic curve cryptosystems (ECC).

Silicon Cloud International

Silicon Cloud International

Silicon Cloud is a high performance and secure cloud computing platform for engineering and scientific applications.

Nagios

Nagios

Nagios is a powerful tool that provides you with instant awareness of your organization’s mission-critical IT infrastructure.

eaziSecurity

eaziSecurity

eaziSecurity has built an eco-system of technology and services that bring enterprise scale security solutions to the SME marketplace.

ThreatDefence

ThreatDefence

ThreatDefence provides innovative SIEM, SOC-as-a-Service, and proactive cyber defence solutions to MSP’s and Enterprises.

Buguard

Buguard

Buguard is a multi-award-winning supplier of Application Security Assessments and GRC services.

Auxilion

Auxilion

Auxilion is an award-winning provider of consulting and IT support services, technologies and consulting for public and private organisations in the UK and Ireland.

Kusari

Kusari

Securing your software supply chain starts with understanding. Kusari is on a mission to bring transparency to your software supply chain and power secure development.

Acumenis

Acumenis

At Acumenis, we help organisations of all sizes to manage information security effectively. Our key services are penetration testing, ISO 27001 implementations, and security

Anjolen

Anjolen

Anjolen provides expertise in cybersecurity, compliance and cyber forensic services.