{"id":34610,"date":"2020-04-23T07:33:10","date_gmt":"2020-04-23T07:33:10","guid":{"rendered":"https:\/\/www.threatshub.org\/blog\/why-should-the-uk-pensions-watchdog-be-able-to-spy-on-your-internet-activities-same-reason-as-the-environment-agency-and-many-more\/"},"modified":"2020-04-23T07:33:10","modified_gmt":"2020-04-23T07:33:10","slug":"why-should-the-uk-pensions-watchdog-be-able-to-spy-on-your-internet-activities-same-reason-as-the-environment-agency-and-many-more","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/why-should-the-uk-pensions-watchdog-be-able-to-spy-on-your-internet-activities-same-reason-as-the-environment-agency-and-many-more\/","title":{"rendered":"Why should the UK pensions watchdog be able to spy on your internet activities? Same reason as the Environment Agency and many more"},"content":{"rendered":"<div><img decoding=\"async\" src=\"https:\/\/regmedia.co.uk\/2020\/04\/23\/shutterstock_spying_uk3.jpg\" class=\"ff-og-image-inserted\"><\/div>\n<p>It has been <a target=\"_blank\" href=\"https:\/\/twitter.com\/Snowden\/status\/799371508808302596\" rel=\"noopener noreferrer\">called<\/a> the \u201cmost extreme surveillance in the history of Western democracy.\u201d It has not <a target=\"_blank\" href=\"https:\/\/www.theregister.co.uk\/2018\/01\/30\/ukgov_mass_data_slurping_ruled_illegal_again\/\" rel=\"noopener noreferrer\">once<\/a> but <a target=\"_blank\" href=\"https:\/\/www.theregister.co.uk\/2017\/11\/30\/investigatory_powers_act_illegal_under_eu_law\/\" rel=\"noopener noreferrer\">twice<\/a> been found to be illegal. It sparked the largest ever protest of senior lawyers who <a target=\"_blank\" href=\"https:\/\/www.theregister.co.uk\/2016\/03\/15\/uk_spying_bill_not_fit_for_purpose\/\" rel=\"noopener noreferrer\">called it<\/a> \u201cnot fit for purpose.\u201d<\/p>\n<p>And now the UK&#8217;s <a target=\"_blank\" rel=\"nofollow noopener noreferrer\" href=\"http:\/\/www.legislation.gov.uk\/ukpga\/2016\/25\/contents\">Investigatory Powers Act<\/a> of 2016 \u2013 better known as the Snooper\u2019s Charter \u2013 is set to expand to allow government agencies you may never have heard of to trawl through your web histories, emails, or mobile phone records.<\/p>\n<p>In a <a target=\"_blank\" href=\"http:\/\/www.legislation.gov.uk\/ukdsi\/2020\/9780111195499\/pdfs\/ukdsiod_9780111195499_en.pdf\" rel=\"noopener noreferrer\">memorandum<\/a> [PDF] first <a target=\"_blank\" href=\"https:\/\/www.theguardian.com\/world\/2020\/apr\/22\/ministers-plan-to-give-more-uk-public-bodies-power-to-hack-phones\" rel=\"noopener noreferrer\">spotted<\/a> by The Guardian, the British government is asking that five more public authorities be added to the list of bodies that can access data scooped up under the nation&#8217;s mass-surveillance laws: the Civil Nuclear Constabulary, the Environment Agency, the Insolvency Service, the UK National Authority for Counter Eavesdropping (UKNACE), and the Pensions Regulator.<\/p>\n<p>The memo explains why each should be given the extraordinary powers, in general and specifically. In general, the five agencies \u201care increasingly unable to rely on local police forces to investigate crimes on their behalf,\u201d and so should be given direct access to the data pipe itself.<\/p>\n<h3 class=\"crosshead\"><span>Five Whys<\/span><\/h3>\n<p>The Civil Nuclear Constabulary (CNC) is a special armed police force that does security at the UK\u2019s nuclear sites and when nuclear materials are being moved. It should be given access even though \u201cthe current threat to nuclear sites in the UK is assessed as low\u201d because \u201cit can also be difficult to accurately assess risk without the full information needed.\u201d<\/p>\n<p>The Environment Agency investigates \u201cover 40,000 suspected offences each year,\u201d the memo stated. Which is why it should also be able to ask ISPs to hand over people\u2019s most sensitive communications information, in order \u201cto tackle serious and organised waste crime.\u201d<\/p>\n<p>The Insolvency Service investigates breaches of company director disqualification orders. Some of those it investigates get put in jail so it is essential that the service be allowed \u201cto attribute subscribers to telephone numbers and analyse itemised billings\u201d as well as be able to see what IP addresses are accessing specific email accounts.<\/p>\n<p>UKNACE, a little known agency that we have <a target=\"_blank\" href=\"https:\/\/www.theregister.co.uk\/2013\/07\/05\/geeks_guide_hanslope_park\/\" rel=\"noopener noreferrer\">taken a look at<\/a> in the past, is home of the real-life Qs, and one of its jobs is to detect attempts to eavesdrop on UK government offices. It needs access to the nation&#8217;s communications data \u201cin order to identify and locate an attacker or an illegal transmitting device\u201d, the memo claimed.<\/p>\n<p>And lastly, the Pensions Regulator, which checks that companies have added their employees to their pension schemes, need to be able to delve into anyone\u2019s emails so it can \u201csecure compliance and punish wrongdoing.\u201d<\/p>\n<p>Taken together, the requests reflect exactly what critics of the Investigatory Powers Act feared would happen: that a once-shocking power that was granted on the back of terrorism fears is being slowly extended to even the most obscure government agency for no reason other that it will make bureaucrats&#8217; lives easier.<\/p>\n<p>None of the agencies would be required to apply for warrants to access people\u2019s internet connection data, and they would be added to another 50-plus agencies that already have access, including the Food Standards Agency, Gambling Commission, and NHS Business Services Authority.<\/p>\n<h3 class=\"crosshead\"><span>Safeguards<\/span><\/h3>\n<p>One of the biggest concerns remains that there are insufficient safeguards in place to prevent the system being abused; concerns that only grow as the number of people that have access to the country&#8217;s electronic communications grows.<\/p>\n<p>It is also still not known precisely how all these agencies access the data that is accumulated, or what restrictions are in place beyond a broad-brush \u201cdouble lock\u201d authorization process that requires a former judge (a judicial commissioner, or JCs) to approve a minister\u2019s approval.<\/p>\n<p>A report published earlier this month by the Investigatory Powers Commissioner&#8217;s Office (IPCO), which was setup to oversee the spying law, covering 2018, gave the entire process a <a target=\"_blank\" href=\"https:\/\/www.theregister.co.uk\/2020\/03\/06\/ipco_annual_report_2018_mi5_naughty\/\" rel=\"noopener noreferrer\">clean bill of health<\/a> while revealing a self-contained process brimming with self-congratulation.<\/p>\n<p>\u201cWe have been increasingly impressed by the advantage of IPCO\u2019s dual role: first, undertaking the review of warrants and, second, having retrospective oversight of the use of investigatory powers,\u201d the report noted. \u201cJCs regularly ask the inspectors to focus on particular issues during the latter\u2019s\u2019 oversight visits and the inspectors similarly share information relevant to the warrantry process with the JCs. In other words, these two functions \u2013 warrantry and ex post facto (retrospective) inspection \u2013 serve significantly to enhance each other and the confidence in the overall system.\u201d<\/p>\n<p>The report noted that 2018 was a \u201cyear of transition\u201d but only in a separate section explained that was as a result of the fact that the law had to be changed because it had been found to be illegal since it did not limit the public authorities\u2019 access to retained communications data solely for fighting serious crime.<\/p>\n<p>It was the second time the law was <a target=\"_blank\" href=\"https:\/\/www.theregister.co.uk\/2018\/01\/30\/ukgov_mass_data_slurping_ruled_illegal_again\/\" rel=\"noopener noreferrer\">found to be illegal<\/a> in part. And last year the entire law was <a target=\"_blank\" href=\"https:\/\/www.theregister.co.uk\/2019\/07\/29\/investigatory_powers_act_compatible_human_rights_high_court\/\" rel=\"noopener noreferrer\">challenged<\/a> as being incompatible with human-rights laws.<\/p>\n<h3 class=\"crosshead\"><span>Everything is peachy<\/span><\/h3>\n<p>Despite the \u201ctransition\u201d resulting in what the report acknowledged is inaccurate data (\u201cthe statistics at the end of the report do not provide as full a picture as they will in future years\u201d), it was encouraged by the fact that \u201cit is clear that there were only a few refusals by the JCs of the applications they considered.\u201d<\/p>\n<p>The IPCO then immediately defended both the JCs and the government: \u201cIt is critical that this should not be interpreted as a failure by the JCs to provide rigorous scrutiny of the applications. Nothing could be further from the truth. These applications only come to IPCO after there has been detailed, multi-layered consideration within the organisation requesting the authorisation and, when applicable, the Warrant Granting Department.\u201d<\/p>\n<p>There is no indication in the new memo that seeks to expand the Investigatory Powers Act&#8217;s surveillance powers to five new agencies whether the resources of the Investigatory Powers Commissioner (IPC), which currently employs \u201capproximately 50 people,&#8221; will also be expanded.<\/p>\n<p>That, and whether the new agencies\u2019 investigatory work can be considered &#8220;serious crimes&#8221; and sufficient to grant them access to millions of people\u2019s personal data, will have to be decided by MPs and peers as it progresses through the Parliamentary process. \u00ae<\/p>\n<p class=\"wptl btm\"><span>Sponsored:<\/span> <a href=\"https:\/\/go.theregister.co.uk\/tl\/1925\/-8451\/build-the-next-generation-of-your-business-in-the-public-cloud?td=wptl1925\">Webcast: Build the next generation of your business in the public cloud<\/a><\/p>\n<p>READ MORE <a href=\"https:\/\/go.theregister.co.uk\/feed\/www.theregister.co.uk\/2020\/04\/23\/uk_snoopers_charter_sequel\/\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Extraordinary surveillance powers set to be injected into govt orgs It has been called the \u201cmost extreme surveillance in the history of Western democracy.\u201d It has not once but twice been found to be illegal. It sparked the largest ever protest of senior lawyers who called it \u201cnot fit for purpose.\u201d\u2026  READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":34611,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[63],"tags":[],"class_list":["post-34610","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-the-register"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Why should the UK pensions watchdog be able to spy on your internet activities? Same reason as the Environment Agency and many more 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/why-should-the-uk-pensions-watchdog-be-able-to-spy-on-your-internet-activities-same-reason-as-the-environment-agency-and-many-more\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Why should the UK pensions watchdog be able to spy on your internet activities? Same reason as the Environment Agency and many more 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/why-should-the-uk-pensions-watchdog-be-able-to-spy-on-your-internet-activities-same-reason-as-the-environment-agency-and-many-more\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2020-04-23T07:33:10+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/04\/why-should-the-uk-pensions-watchdog-be-able-to-spy-on-your-internet-activities-same-reason-as-the-environment-agency-and-many-more.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1000\" \/>\n\t<meta property=\"og:image:height\" content=\"625\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/why-should-the-uk-pensions-watchdog-be-able-to-spy-on-your-internet-activities-same-reason-as-the-environment-agency-and-many-more\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/why-should-the-uk-pensions-watchdog-be-able-to-spy-on-your-internet-activities-same-reason-as-the-environment-agency-and-many-more\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Why should the UK pensions watchdog be able to spy on your internet activities? Same reason as the Environment Agency and many more\",\"datePublished\":\"2020-04-23T07:33:10+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/why-should-the-uk-pensions-watchdog-be-able-to-spy-on-your-internet-activities-same-reason-as-the-environment-agency-and-many-more\\\/\"},\"wordCount\":1085,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/why-should-the-uk-pensions-watchdog-be-able-to-spy-on-your-internet-activities-same-reason-as-the-environment-agency-and-many-more\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/04\\\/why-should-the-uk-pensions-watchdog-be-able-to-spy-on-your-internet-activities-same-reason-as-the-environment-agency-and-many-more.jpg\",\"articleSection\":[\"The Register\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/why-should-the-uk-pensions-watchdog-be-able-to-spy-on-your-internet-activities-same-reason-as-the-environment-agency-and-many-more\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/why-should-the-uk-pensions-watchdog-be-able-to-spy-on-your-internet-activities-same-reason-as-the-environment-agency-and-many-more\\\/\",\"name\":\"Why should the UK pensions watchdog be able to spy on your internet activities? Same reason as the Environment Agency and many more 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/why-should-the-uk-pensions-watchdog-be-able-to-spy-on-your-internet-activities-same-reason-as-the-environment-agency-and-many-more\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/why-should-the-uk-pensions-watchdog-be-able-to-spy-on-your-internet-activities-same-reason-as-the-environment-agency-and-many-more\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/04\\\/why-should-the-uk-pensions-watchdog-be-able-to-spy-on-your-internet-activities-same-reason-as-the-environment-agency-and-many-more.jpg\",\"datePublished\":\"2020-04-23T07:33:10+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/why-should-the-uk-pensions-watchdog-be-able-to-spy-on-your-internet-activities-same-reason-as-the-environment-agency-and-many-more\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/why-should-the-uk-pensions-watchdog-be-able-to-spy-on-your-internet-activities-same-reason-as-the-environment-agency-and-many-more\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/why-should-the-uk-pensions-watchdog-be-able-to-spy-on-your-internet-activities-same-reason-as-the-environment-agency-and-many-more\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/04\\\/why-should-the-uk-pensions-watchdog-be-able-to-spy-on-your-internet-activities-same-reason-as-the-environment-agency-and-many-more.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/04\\\/why-should-the-uk-pensions-watchdog-be-able-to-spy-on-your-internet-activities-same-reason-as-the-environment-agency-and-many-more.jpg\",\"width\":1000,\"height\":625},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/why-should-the-uk-pensions-watchdog-be-able-to-spy-on-your-internet-activities-same-reason-as-the-environment-agency-and-many-more\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Why should the UK pensions watchdog be able to spy on your internet activities? Same reason as the Environment Agency and many more\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Why should the UK pensions watchdog be able to spy on your internet activities? Same reason as the Environment Agency and many more 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/why-should-the-uk-pensions-watchdog-be-able-to-spy-on-your-internet-activities-same-reason-as-the-environment-agency-and-many-more\/","og_locale":"en_US","og_type":"article","og_title":"Why should the UK pensions watchdog be able to spy on your internet activities? Same reason as the Environment Agency and many more 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/why-should-the-uk-pensions-watchdog-be-able-to-spy-on-your-internet-activities-same-reason-as-the-environment-agency-and-many-more\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2020-04-23T07:33:10+00:00","og_image":[{"width":1000,"height":625,"url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/04\/why-should-the-uk-pensions-watchdog-be-able-to-spy-on-your-internet-activities-same-reason-as-the-environment-agency-and-many-more.jpg","type":"image\/jpeg"}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/why-should-the-uk-pensions-watchdog-be-able-to-spy-on-your-internet-activities-same-reason-as-the-environment-agency-and-many-more\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/why-should-the-uk-pensions-watchdog-be-able-to-spy-on-your-internet-activities-same-reason-as-the-environment-agency-and-many-more\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Why should the UK pensions watchdog be able to spy on your internet activities? Same reason as the Environment Agency and many more","datePublished":"2020-04-23T07:33:10+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/why-should-the-uk-pensions-watchdog-be-able-to-spy-on-your-internet-activities-same-reason-as-the-environment-agency-and-many-more\/"},"wordCount":1085,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/why-should-the-uk-pensions-watchdog-be-able-to-spy-on-your-internet-activities-same-reason-as-the-environment-agency-and-many-more\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/04\/why-should-the-uk-pensions-watchdog-be-able-to-spy-on-your-internet-activities-same-reason-as-the-environment-agency-and-many-more.jpg","articleSection":["The Register"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/why-should-the-uk-pensions-watchdog-be-able-to-spy-on-your-internet-activities-same-reason-as-the-environment-agency-and-many-more\/","url":"https:\/\/www.threatshub.org\/blog\/why-should-the-uk-pensions-watchdog-be-able-to-spy-on-your-internet-activities-same-reason-as-the-environment-agency-and-many-more\/","name":"Why should the UK pensions watchdog be able to spy on your internet activities? Same reason as the Environment Agency and many more 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/why-should-the-uk-pensions-watchdog-be-able-to-spy-on-your-internet-activities-same-reason-as-the-environment-agency-and-many-more\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/why-should-the-uk-pensions-watchdog-be-able-to-spy-on-your-internet-activities-same-reason-as-the-environment-agency-and-many-more\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/04\/why-should-the-uk-pensions-watchdog-be-able-to-spy-on-your-internet-activities-same-reason-as-the-environment-agency-and-many-more.jpg","datePublished":"2020-04-23T07:33:10+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/why-should-the-uk-pensions-watchdog-be-able-to-spy-on-your-internet-activities-same-reason-as-the-environment-agency-and-many-more\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/why-should-the-uk-pensions-watchdog-be-able-to-spy-on-your-internet-activities-same-reason-as-the-environment-agency-and-many-more\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/why-should-the-uk-pensions-watchdog-be-able-to-spy-on-your-internet-activities-same-reason-as-the-environment-agency-and-many-more\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/04\/why-should-the-uk-pensions-watchdog-be-able-to-spy-on-your-internet-activities-same-reason-as-the-environment-agency-and-many-more.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/04\/why-should-the-uk-pensions-watchdog-be-able-to-spy-on-your-internet-activities-same-reason-as-the-environment-agency-and-many-more.jpg","width":1000,"height":625},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/why-should-the-uk-pensions-watchdog-be-able-to-spy-on-your-internet-activities-same-reason-as-the-environment-agency-and-many-more\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"Why should the UK pensions watchdog be able to spy on your internet activities? Same reason as the Environment Agency and many more"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/34610","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=34610"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/34610\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/34611"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=34610"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=34610"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=34610"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}