ยท 10 min read ยท Wingston Sharon

Why the CLOUD Act Makes Your EU AI Infrastructure Vulnerable

---

By Wingston Sharon | March 2026


Your AI models are running in Frankfurt. Your data is stored in Amsterdam. Your contracts are governed by Dutch law.

And the US government can compel access to all of it.

This isn't speculation. It's the legal architecture established by the Clarifying Lawful Overseas Use of Data Act (CLOUD Act, 18 U.S.C. ยง 2713), signed into US law in 2018. For European enterprises building AI infrastructure on AWS, Azure, or Google Cloud, the CLOUD Act is not an abstract legal concern โ€” it's a structural conflict between US federal law and GDPR obligations that has no clean resolution.


What the CLOUD Act Actually Says

The CLOUD Act amended the Stored Communications Act to clarify that US providers must comply with US government demands for data stored on their servers โ€” regardless of where those servers are physically located.

Before 2018, this was contested. Microsoft famously refused a DOJ demand for emails stored in its Dublin datacenter, arguing that the warrant had no extraterritorial reach. Microsoft fought the case to the Second Circuit Court of Appeals. Congress mooted the argument by passing the CLOUD Act before the Court ruled, explicitly authorizing extraterritorial reach.

The law allows US agencies to compel disclosure through:

  • National Security Letters: Issued by FBI, no judicial oversight required, often accompanied by gag orders preventing the recipient from disclosing the demand
  • FISA Section 702: Foreign intelligence surveillance, reauthorized in April 2024 via the Reforming Intelligence and Securing America Act (RISAA). The 2024 reauthorization notably expanded the definition of "electronic communication service providers" subject to compelled assistance โ€” a scope expansion that civil liberties organizations flagged as significant
  • Standard criminal process: Traditional warrants, subpoenas, court orders

Critically, the law does not require notification to the data subject. Your cloud provider can receive a legal demand for your data, comply with it, and โ€” if accompanied by a gag order โ€” cannot tell you it happened.


Real Requests, Real Compliance

These are not theoretical scenarios. US cloud providers receive government requests and publish transparency reports documenting compliance.

Microsoft: In 2022, Microsoft received between 0 and 499 FISA orders seeking content disclosures, affecting between 11,500 and 11,999 customer accounts globally. The law limits providers to reporting ranges, not exact numbers. EU-specific breakdowns are not published โ€” the figures cover all customers globally.

Google Cloud: Google publishes transparency reports at transparencyreport.google.com. For US national security requests, Google is legally restricted to reporting ranges rather than exact figures. Published reports show consistent compliance with the vast majority of law enforcement requests that survive legal challenge.

AWS: Published a similar range of 0-499 national security orders in 2022. AWS explicitly notes in its legal documentation that it will comply with US law even when it conflicts with local data protection law, and will challenge demands it believes are unlawful โ€” but compliance remains the default.

In each case, European customers whose data was included in these requests received no notification.


Why AI Workloads Are Specifically Exposed

For generic cloud storage, the CLOUD Act creates legal and compliance risk. For AI workloads, it creates something more specific: a fundamental threat to proprietary models and training data.

Training data: If you train AI models on proprietary customer data hosted on a US cloud provider, that training data is potentially accessible to US agencies. This includes customer emails, financial records, health information, or any other sensitive data used to fine-tune or train models.

Inference logs: Every API call to a US-hosted AI service generates a log entry. Prompt content, response content, timestamps, user identifiers. Subject to CLOUD Act demands.

Model weights: Proprietary models stored on US cloud infrastructure can be compelled. If you've invested in fine-tuning a foundation model on proprietary data, that model checkpoint is potentially accessible.

The GDPR conflict: GDPR Article 44 prohibits transferring personal data to third countries without adequate protection. When a US agency compels disclosure of EU personal data stored on a US provider's servers, that transfer happens without consent, contract, or adequacy decision. EU law says it cannot happen. US law says it can. The provider is caught between two legal systems, and US federal law has domestic enforcement mechanisms that GDPR does not.

The Schrems II ruling (Case C-311/18) invalidated the EU-US Privacy Shield framework precisely because US surveillance law โ€” including FISA Section 702 โ€” prevents adequate data protection guarantees. The subsequent EU-US Data Privacy Framework attempted to address some concerns but did not eliminate FISA 702 collection authority.

EU AI Act implications: High-risk AI systems under the EU AI Act (Regulation 2024/1689) require robust data governance and protection guarantees under Article 9. CLOUD Act exposure creates a compliance gap that auditors will increasingly flag.


Three Cases That Show the Stakes

Case 1: The Microsoft Ireland Precedent

In 2013, a federal magistrate issued a warrant demanding that Microsoft produce emails stored on its Dublin servers. Microsoft refused, arguing the warrant lacked extraterritorial authority. Microsoft won at the Second Circuit. The DOJ appealed to the Supreme Court. Congress passed the CLOUD Act in March 2018 to resolve the question in the government's favor. The Supreme Court case became moot.

The lesson: even US companies fighting on behalf of EU data subjects cannot ultimately prevail against US legislation.

Case 2: What "Data Residency" Actually Guarantees

Most enterprise cloud agreements include "data residency" commitments โ€” promises that your data will only be stored in specified geographic regions. These commitments address GDPR storage requirements and are genuinely valuable.

They do not address CLOUD Act exposure. Data residency in Frankfurt means your data is on AWS hardware in Frankfurt, managed by AWS's European legal entity. AWS's US parent company remains a US person subject to US law. A CLOUD Act demand goes to AWS, not to the Frankfurt datacenter.

This is a well-documented legal reality, not speculation. AWS, Google, and Microsoft all acknowledge it in their legal documentation when pressed.

Case 3: FISA 702 and EU User Data

Section 702 authorizes collection of communications of non-US persons located outside the United States. The 2024 RISAA reauthorization expanded which types of organizations can be compelled to assist โ€” potentially including data centers, colocation providers, and building landlords where servers are located. This expansion was not widely publicized but has significant implications for any organization that processes EU user data through US-affiliated services.


What "GDPR-Compliant" Cloud Actually Means

The term "GDPR-compliant" is used in marketing to mean many things. Here's what major providers actually guarantee:

What they guarantee:
- Data stored in specified EU regions (data residency)
- GDPR-compliant data processing agreements (DPAs)
- Standard contractual clauses (SCCs) for international transfers
- Breach notification within 72 hours
- Data subject access request support

What they do not guarantee:
- Protection from CLOUD Act demands
- Immunity from FISA 702 surveillance
- Notification if US agencies access your data
- The ability to refuse lawful US government demands

When an EU regulator asks your CISO "can the US government access this data?", the honest answer for US-provider-hosted infrastructure is: potentially yes.


The Agentosaurus Architecture

We built our infrastructure around EU-native compute specifically to avoid this exposure.

100% EU datacenters: Production infrastructure runs on Oracle Cloud Infrastructure's Frankfurt region. All data at rest is in Frankfurt. OCI's European entity is Oracle Deutschland B.V. & Co. KG, a German company.

An honest caveat: Oracle Corporation is a US company, and Oracle Deutschland is ultimately a subsidiary. This introduces legal complexity that we're transparent about. We're pursuing Dutch KVK registration and evaluating additional EU-domiciled infrastructure providers as the regulatory environment clarifies. We don't claim to have a perfectly clean solution โ€” we claim to have a materially better one than AWS, Azure, or GCP, and to be actively working toward the cleaner version.

GDPR-native design: Organization data is stored with explicit data minimization. No data is retained beyond its operational purpose. Article 30 records of processing activities are maintained.

Peer-to-peer GPU network: The distributed GPU evaluation network runs on contributor hardware across Europe. Evaluation jobs run locally on contributor machines. Benchmark results are submitted cryptographically signed but without raw data exposure.


Your CLOUD Act Exposure Audit: Five Questions

Before migrating or building new AI infrastructure, answer these five questions:

1. Which companies store your AI training data?
If any are incorporated in the US, your training data has CLOUD Act exposure. This includes AWS, Azure, GCP, and any US-incorporated SaaS vendor that stores your data.

2. Where are your inference logs stored?
If you're running models on US cloud infrastructure, the logs of every inference request are stored on servers subject to CLOUD Act demands.

3. Do you have model weights on US cloud storage?
Fine-tuned models represent IP. If they're stored on S3 or Azure Blob Storage, they're reachable by US government request.

4. What does your GDPR Article 30 record say about US transfers?
Your record of processing activities should document all international data transfers. If it lists US cloud providers as processors without a valid transfer mechanism, you have a documented compliance gap.

5. Have you assessed EU AI Act applicability?
If your AI systems are classified as high-risk under the EU AI Act (Regulation 2024/1689), the CLOUD Act exposure creates specific compliance obligations to document and address.


Practical Steps for EU Organizations

If you have AI workloads currently running on US cloud providers and want to reduce CLOUD Act exposure, here is a realistic approach:

Step 1: Audit your AI workload data sensitivity
Not all data carries the same risk. Internal tooling processing publicly available data has different exposure than a system processing patient health records. Prioritize high-sensitivity workloads.

Step 2: Identify US provider dependencies
Map every service in your AI pipeline: LLM API calls, vector databases, training infrastructure, inference endpoints. Document which are US providers.

Step 3: Calculate actual exposure
For each US-provider dependency, assess: What data does it process? How sensitive? What would disclosure mean for your customers and regulatory standing?

Step 4: Pilot EU-native alternatives on lower-sensitivity workloads
EU-native AI infrastructure is less mature than US options but improving rapidly. Start with non-sensitive workloads to evaluate performance and operational complexity before migrating critical systems.

Step 5: Contract for law enforcement transparency
Some providers offer contractual provisions committing to notify customers of government requests where legally permitted (i.e., where no gag order exists). This does not prevent disclosure, but it improves visibility.

Step 6: Set a realistic migration timeline
There's no magic number for how long this takes โ€” it depends on the complexity of your AI stack, your team's capacity, and how sensitive your workloads are. Don't let "perfect" be the enemy of "meaningfully better."


The Regulatory Timeline

Three regulatory developments are tightening the window for voluntary compliance:

EU AI Act enforcement began for prohibited AI systems in February 2025, with high-risk system requirements phased in through August 2026. Organizations with CLOUD Act exposure on high-risk workloads need compliance documentation.

EDPB enforcement actions on US cloud transfer mechanisms are increasing. Several EU data protection authorities have issued enforcement actions against US cloud use without adequate transfer mechanisms.

EU-US Data Privacy Framework stability: The framework that replaced Privacy Shield remains subject to potential Schrems III litigation. Organizations that treat compliance as purely framework-dependent may face disruption if the framework is challenged.


The Bottom Line

The CLOUD Act is not going away. US surveillance law has expanded consistently since 2001 and there's no legislative momentum toward restriction. The question for European enterprises is not whether to address the exposure, but when.

Early movers gain competitive advantage: sovereignty certification as part of procurement responses, GDPR compliance documentation that satisfies regulatory review, and infrastructure costs meaningfully below hyperscaler rates for continuous workloads.

Your AI infrastructure choices are compliance decisions. Act accordingly.


This post is not legal advice. The CLOUD Act legal landscape continues to evolve, and organizations should consult with EU data protection counsel regarding their specific circumstances.

Questions about EU-native AI infrastructure? hello@agentosaurus.com

References:
- CLOUD Act: 18 U.S.C. ยง 2713
- Schrems II: Case C-311/18
- EU AI Act: Regulation (EU) 2024/1689
- FISA 702 / RISAA: H.R.7888 (2024)
- Microsoft Transparency Report: microsoft.com/en-us/corporate-responsibility/reports
- Google Transparency Report: transparencyreport.google.com

Share: X (Twitter) LinkedIn

Build This Infrastructure?

We help AI teams build sovereign GPU clouds and autonomous systems. Free 30-minute consultation. Fixed-price projects from โ‚ฌ5K.

Schedule Free Consultation