“High-profile” individuals targeted by UK security services

Up to 20 people were spied upon by British intelligence

Around 20 celebrities were spied on by British security services and these operations may not have been justified or warranted.

The disclosure came to light at an investigatory powers tribunal brought by campaigning organisation Privacy International.

According to a report by the Guardian, government lawyers on behalf of GCHQ and MI5 showed that between 2009 and 2013, three searches into high-profile people were "not operationally justifiable."

Advertisement - Article continues below

Another 17 searches, carried out by five officers were said to be possibly not "operationally justifiable". The lawyers added that conversations with those officers were not recorded, meaning it is "not possible to ascertain whether they were in fact operationally justifiable".

The report said that these individuals were not notified of the surveillance and officers were warned that if they were caught misusing their powers they could face disciplinary action.

Government lawyers initially refused to release the figures on grounds of "damage to national security", but documents were released on the second day of the hearing following repeated request by Privacy International.

The intelligence officers have since been banned from using the security services' data to "search for and/or access information other than that which is necessary and proportionate for [their] current work".

Advertisement
Advertisement - Article continues below

Millie Graham Wood, legal officer at Privacy International, said the security services should have informed the celebrities involved they were being spied upon. She said it should be a serious concern that there is no procedure to notify victims.

"Without such a mechanism, and in the absence of independent or judicial authorisation, a victim of abuse has no prospect of ever securing a remedy."

Featured Resources

Navigating the new normal: A fast guide to remote working

A smooth transition will support operations for years to come

Download now

Putting a spotlight on cyber security

An examination of the current cyber security landscape

Download now

The economics of infrastructure scalability

Find the most cost-effective and least risky way to scale

Download now

IT operations overload hinders digital transformation

Clearing the path towards a modernised system of agreement

Download now
Advertisement

Recommended

Visit/security/ransomware/356292/university-of-california-gets-fleeced-by-hackers-for-114-million
ransomware

University of California gets fleeced by hackers for $1.14 million

30 Jun 2020
Visit/security/cyber-security/356289/australia-announces-135b-investment-in-cybersecurity
cyber security

Australia announces $1.35 billion investment in cyber security

30 Jun 2020
Visit/cloud/cloud-security/356288/csa-and-issa-form-cybersecurity-partnership
cloud security

CSA and ISSA form cyber security partnership

30 Jun 2020
Visit/business/policy-legislation/356215/senators-propose-a-bill-aimed-at-ending-warrant-proof-encryption
Policy & legislation

Senators propose a bill aimed at ending warrant-proof encryption

24 Jun 2020

Most Popular

Visit/laptops/29190/how-to-find-ram-speed-size-and-type
Laptops

How to find RAM speed, size and type

24 Jun 2020
Visit/security/vulnerability/356295/microsoft-patches-high-risk-flaws-that-can-be-exploited-with-a
vulnerability

Microsoft releases urgent patch for high-risk Windows 10 flaws

1 Jul 2020
Visit/policy-legislation/data-protection/356344/eu-institutions-warned-against-purchasing-any-further
data protection

EU institutions told to avoid Microsoft software after licence spat

3 Jul 2020