“High-profile” individuals targeted by UK security services

Up to 20 people were spied upon by British intelligence

Around 20 celebrities were spied on by British security services and these operations may not have been justified or warranted.

The disclosure came to light at an investigatory powers tribunal brought by campaigning organisation Privacy International.

According to a report by the Guardian, government lawyers on behalf of GCHQ and MI5 showed that between 2009 and 2013, three searches into high-profile people were "not operationally justifiable."

Another 17 searches, carried out by five officers were said to be possibly not "operationally justifiable". The lawyers added that conversations with those officers were not recorded, meaning it is "not possible to ascertain whether they were in fact operationally justifiable".

Advertisement
Advertisement - Article continues below
Advertisement - Article continues below

The report said that these individuals were not notified of the surveillance and officers were warned that if they were caught misusing their powers they could face disciplinary action.

Government lawyers initially refused to release the figures on grounds of "damage to national security", but documents were released on the second day of the hearing following repeated request by Privacy International.

The intelligence officers have since been banned from using the security services' data to "search for and/or access information other than that which is necessary and proportionate for [their] current work".

Millie Graham Wood, legal officer at Privacy International, said the security services should have informed the celebrities involved they were being spied upon. She said it should be a serious concern that there is no procedure to notify victims.

"Without such a mechanism, and in the absence of independent or judicial authorisation, a victim of abuse has no prospect of ever securing a remedy."

Featured Resources

Digitally perfecting the supply chain

How new technologies are being leveraged to transform the manufacturing supply chain

Download now

Three keys to maximise application migration and modernisation success

Harness the benefits that modernised applications can offer

Download now

Your enterprise cloud solutions guide

Infrastructure designed to meet your company's IT needs for next-generation cloud applications

Download now

The 3 approaches of Breach and Attack Simulation technologies

A guide to the nuances of BAS, helping you stay one step ahead of cyber criminals

Download now
Advertisement

Recommended

Visit/cyber-security/33079/gchq-boss-says-uk-must-be-vigilant-againt-chinese-tech-firms
cyber security

GCHQ boss says UK must be vigilant againt Chinese tech firms

25 Feb 2019
Visit/security/internet-security/354417/avast-and-avg-extensions-pulled-from-chrome
internet security

Avast and AVG extensions pulled from Chrome

19 Dec 2019
Visit/security/354156/google-confirms-android-cameras-can-be-hijacked-to-spy-on-you
Security

Google confirms Android cameras can be hijacked to spy on you

20 Nov 2019

Most Popular

Visit/microsoft-windows/32066/what-to-do-if-youre-still-running-windows-7
Microsoft Windows

What to do if you're still running Windows 7

14 Jan 2020
Visit/operating-systems/25802/17-windows-10-problems-and-how-to-fix-them
operating systems

17 Windows 10 problems - and how to fix them

13 Jan 2020
Visit/operating-systems/microsoft-windows/354526/memes-and-viking-funerals-the-internet-reacts-to-the
Microsoft Windows

Memes and Viking funerals: The internet reacts to the death of Windows 7

14 Jan 2020
Visit/hardware/laptops/354533/dell-xps-13-new-9300-hands-on-review-chasing-perfection
Laptops

Dell XPS 13 (New 9300) hands-on review: Chasing perfection

14 Jan 2020