US Agreement With The UK Allows Data Access To Private Companies

The US and UK authorities are working on a secret agreement that would allow a mutual access to data of their private companies.

The imperative is “monitor everything,” for espionage, business, and homeland security. Now the British Government is negotiating with the US Government the possibility to allow the British intelligence to tap into servers the US companies.

The Washington Post has seen a draft proposal that would allow the agents of the British Security Service MI5 to access overseas servers run by American companies. The document allows the British services to conduct live wiretaps as needed, of course the secret agreement will give the same opportunity to the US intelligence.

MI5 and the US counterpart already collaborate, but the mutual access to data managed by private companies is a time-consuming process.
Under the proposed deal, US companies would be compelled to hand over the data on request. The new deal aims to speed up the process, it states that US companies would be compelled to hand over the data on request.

“To obtain stored emails, a foreign government must rely on a mutual legal assistance treaty (MLAT) by which the country makes a formal diplomatic request for the data and the Justice Department then seeks a court order on its behalf, a process that is said to take an average of 10 months.”
 
“This has been an issue with the UK and other countries for a number of years,” said one senior administration official, who similar to several others, spoke on the condition of anonymity to discuss the negotiations.

Because of technological changes, the UK can no longer access data in the UK like they used to be able to, and more and more, UK nationals, including criminals in their country, are using providers like Google, Facebook, Hotmail. The more they are having challenges getting access to the data, the more our US providers are facing a conflict of laws.”

The mutual legal agreement may face legal issued due to the current law in UK, where wiretap orders, can be issued by the British Home Secretary.

“If US officials or Congress do not seek changes in the British standards, “what it means is they’re going to allow a country that doesn’t require independent judicial authorization before getting a wiretap to continue that practice, which seems to be a pretty fundamental constitutional protection in the United States,” said Eric King, a privacy advocate and visiting lecturer in surveillance law at Queen Mary University of London. “That’s being traded away.”

Despite the heated debate about users’ privacy, the US Government doesn’t seem to be worried by the proposals because the British authorities already adopt important procedural protections for privacy.

Security Affairs:  

 

 

« Twitter Steps Up Efforts To Combat ISIS
Protect Your Data From Internal Attacks »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Hex Security

Hex Security

Hex Security Limited is a specialist Information Assurance (IA) consultancy working with associates and partners to deliver security certification and accreditation support.

Jumpsec

Jumpsec

Jumpsec provides penetration testing, security assessments, social engineering testing, cyber incident response, training and consultancy services.

Cyber Security & Information Systems Information Analysis Center (CSIAC)

Cyber Security & Information Systems Information Analysis Center (CSIAC)

CSIAC is chartered to leverage best practices and expertise from government, industry, and academia on cyber security and information technology.

Dual Layer IT Solutions

Dual Layer IT Solutions

Dual Layer offer a full range of IT Services and Solutions for businesses from IT infrastructure design to cloud/hosted solutions, cybersecurity, disaster recovery and IT training.

Seavus Accelerator

Seavus Accelerator

Seavus Accelerator's goal is to create an enabling and stimulating environment for start-ups growth and provide continuous high quality acceleration and investment support.

PatrOwl

PatrOwl

Automate your SecOps with PatrOwl, and start defending your assets efficiently.

RhodeCode

RhodeCode

RhodeCode is an open source repository management platform. It provides unified security and team collaboration across Git, Subversion, and Mercurial.

SecureData

SecureData

SecureData provide professional data recovery services, digital forensics, data recovery software and FIPS 140-2 Level 3 Validated hardware encrypted drives.

CYMOTIVE Technologies

CYMOTIVE Technologies

Combining Israeli cyber innovation with a century of German automotive engineering. CYMOTIVE operates under the assumption that connectivity is a game changer for the automotive industry.

LGMS - LE Global Services

LGMS - LE Global Services

LGMS is a leading cyber security penetration testing and assessment firm in the Asia Pacific region.

Xalient

Xalient

Xalient is an IT consulting and managed services business, specialising in modern, software-defined networking, security and communications technologies.

gener8tor

gener8tor

The gener8tor Cybersecurity Accelerator offers a cutting-edge program in San Antonio, home to the second-largest concentration of cybersecurity experts in the United States.

Halogen Group

Halogen Group

Halogen Group is the leading Security Solutions Provider in West Africa. Services encompass Physical Security, Electronic Security, Virtual & Cyber Security, Risk Assessments and Training.

Rhodian Group

Rhodian Group

Rhodian Group (formerly Adar) specialize in providing Technology, Cybersecurity, and Compliance services to the insurance industry.

XONA Systems

XONA Systems

XONA is The Zero Trust user access platform for the OT enterprise. Secure operational access to critical systems - from anywhere.

Palindrome Technologies

Palindrome Technologies

Palindrome Technologies help clients defend against cyberattacks across all attack surfaces, including hardware, software, network-to-cloud, people, and emerging technologies.