Oversight: Thank you for volunteering, citizen.

Oversight: Thank you for volunteering, citizen.


Welcome to Oversight. You’re now part of the
front line that protects our country from terrorists, predators, illegal immigrants
and benefit fraudsters. Thank you for volunteering. Oversight is contracted by the government
to operate their automated filter. The filter looks at every bit of internet traffic that
travels through the UK. When it finds something suspicious, it’ll pass it on to you or one
of the thousands of volunteers like yourself. When you log in to your dashboard, you’ll
see a list of possible incidents. Click on any to investigate. Is this a jokey email between friends, or
a serious incident worth reporting to the police? You’ve got the tools to find out.
You can read the subject lines of emails; the web sites they’ve visited; information
from social networks; location history; credit card purchases; and information about their
friends and family. If you need to access more personal information,
like the contents of their emails and documents, or the individual web pages they’ve read,
click to apply for a search warrant: it’ll normally be granted within 15 to 30 seconds.
In many cases, this isn’t necessary: 34% of UK adults have opted-in to our Clearway program,
giving you immediate access to help prevent crime. If you find someone too difficult to investigate,
don’t waste time: immediately escalate to a supervisor. We find that deliberately hiding
your tracks is usually a sign of criminal activity. Thanks to our agreements with Oversight’s
sister companies around the world, that same information is now available about citizens
of over 70 countries. If you speak a second language, you may sometimes be assigned to
jurisdictions outside the UK. Legal and social restrictions in other countries may differ
from your own: remember to be impartial, and follow the instructions on screen. And finally: don’t tell your friends that
you’re part of our team. Our filtering systems are effective because they’re universal: there
really is no way to avoid them, and you never know who might be part of Oversight… including
that person you’re bragging to. So thank you once again for volunteering.
With your help, we can keep ourselves, our children, and our world safe. [Translating these subtitles? Add your name here!]

Comments

  1. Post
    Author
    A. O.

    The part – "Don't tell your friends, it's our advantage that we are everywhere[…]" reminds me of the GDR and the surveillance carried out by inofficial cooperators that collect information.

  2. Post
    Author
  3. Post
    Author
  4. Post
    Author
  5. Post
    Author
  6. Post
    Author
  7. Post
    Author
  8. Post
    Author
    drdca

    I suspect that if such a system were to be put into place, that, in addition to the other abuses that it could be used for (such as people stalking romantic interests, corporate espionage, etc.), that while terrorists might not be able to use it to throw other people off their trail, they might be able to use it for information gathering in order to more effectively plan their attacks.
    Such an abuse would of course be risky on the attacker's end, because of the risk of being caught, but any operation they would engage in would also be risky.
    It is possible to secretly communicate secrets (I.e. To communicate a secret without third parties discovering that a secret has been communicated). It can be made quite difficult, but some adversaries will have very good opsec (though the majority of adversaries will make mistakes from time to time).

    The second amendment to the US constitution ought to be interpreted as protecting the right to use strong (unbackdoored, military grade) encryption and cryptography.
    A society in which strong cryptography is forbidden is not a free society.

  9. Post
    Author
  10. Post
    Author
  11. Post
    Author
  12. Post
    Author
  13. Post
    Author
  14. Post
    Author
    Fuzzyscarfandmittens

    I love that bit at the end showing that the guys doing the investigating are themselves being investigated.

  15. Post
    Author
  16. Post
    Author
  17. Post
    Author
    Needleworker's Realm

    This sounds a lot like the game "Orwell", but I think this video is older than the game.

  18. Post
    Author
  19. Post
    Author
  20. Post
    Author
  21. Post
    Author
    CJEsque

    Its horrifying about how much you can find out about someone via their search history, relations and locations. Heres what i gathered on Daniel Brown:
    Daniel Brown is married to Chloe Brown and has been for 4 years.
    He regularly visits a website called MarriedDating, where he met Anna Stevens.
    They booked a holiday, presumably to Devon together and withdrew £50 for the holiday.
    Oliver (who works at Oversight), found this out too and told Chloe that Daniel was cheating on him.
    From small snippets of information about 1 person, you can ruin their life. This is, quite frankly, absolutely terrifying

  22. Post
    Author
  23. Post
    Author
  24. Post
    Author
  25. Post
    Author
  26. Post
    Author
  27. Post
    Author
    Felix Klenk

    "opted into Clearway by government" is one of the creepiest things I have read in this video.
    Then I remembered that Germany is doing just that.

  28. Post
    Author
  29. Post
    Author
  30. Post
    Author
  31. Post
    Author
  32. Post
    Author
  33. Post
    Author
  34. Post
    Author
  35. Post
    Author
    *kas :*

    I love the story of the graphics, how Dan's cheating on his wife of 4 years with Anna the activist, a peruser of married dating websites and buying tickets to run off with her

  36. Post
    Author
  37. Post
    Author
  38. Post
    Author
  39. Post
    Author
  40. Post
    Author
  41. Post
    Author
  42. Post
    Author
  43. Post
    Author
  44. Post
    Author
  45. Post
    Author
  46. Post
    Author
  47. Post
    Author
  48. Post
    Author
  49. Post
    Author
  50. Post
    Author
  51. Post
    Author
  52. Post
    Author
    Xystem 4

    1:25 the subtle inclusion of things like “VPN” and “tor” as keywords to search for, when they’re common practice privacy tools today was quite clever

  53. Post
    Author
  54. Post
    Author
  55. Post
    Author
  56. Post
    Author
    Incognito Mode

    “Opted into Clearway by government” I guess they don’t really have a choice if you are in Clearway or not. Really strange to think this could be happening soon.

  57. Post
    Author
  58. Post
    Author
  59. Post
    Author
  60. Post
    Author
  61. Post
    Author
  62. Post
    Author
    Mimu Mi

    The problem is always the same. The people who'd need the most to learn from this, are the ones who won't understand a thing. Things like "hiding information is typically a sign of criminal activity". Typically the kind of irony that will go over most people's head.

  63. Post
    Author
  64. Post
    Author
  65. Post
    Author
  66. Post
    Author
  67. Post
    Author
  68. Post
    Author
  69. Post
    Author
    Lucy Tycho

    Years late, but if anyone finds this comment and wants to play a game with this premise, there's one called Orwell.

  70. Post
    Author
  71. Post
    Author
  72. Post
    Author
  73. Post
    Author
  74. Post
    Author
  75. Post
    Author
    Wthie Ribabt

    This looks really cool, but how do I actually join? I tried Googling but couldn't find anything about how to participate in this program. Has it been discontinued?

  76. Post
    Author
  77. Post
    Author
    Lilly like da flower

    1:35 Previously flagged: homosexuality
    Ahh…gotta love Russia

    I think the saddest thing about this video is I can't tell if this is satire or not… This seems like something the government would think was fine and all the sheeple would agree and sign their life away.

  78. Post
    Author
  79. Post
    Author
  80. Post
    Author
  81. Post
    Author
    Eddie Willers

    " Christ, Marx, Wood and Wei,
    Led us to this perfect day.
    Marx, Wood, Wei and Christ,
    All but Wei were sacrificed.
    Wood, Wei, Christ and Marx,
    Gave us lovely schools and parks.
    Wei, Christ, Marx and Wood,
    Made us humble, made us good."

  82. Post
    Author
    Nicholas Bos

    if "VPN" and other cybersecurity-related words are red flags, then I'm going to prison for a long time.

  83. Post
    Author
  84. Post
    Author
  85. Post
    Author
  86. Post
    Author
  87. Post
    Author
  88. Post
    Author
  89. Post
    Author
  90. Post
    Author
  91. Post
    Author
  92. Post
    Author
  93. Post
    Author
    Luna Granger

    I love how these are written to seem normal, even slightly temping/desirable. Paints it as safer and thus minimises the underlying concerns.

  94. Post
    Author
  95. Post
    Author
  96. Post
    Author
  97. Post
    Author
  98. Post
    Author
  99. Post
    Author
    Anonymous faggot

    Well that's scary… Especially because if it werent because encryption gets better every time they try to implement this, they would've already done it.

  100. Post
    Author
    Jonathan Stiles

    I feel like I’d be good at this.

    The same cannot be said for anyone THEY would actually recruit for it.

    P.S.
    “We believe that deliberately hiding your tracks is usually a sign of criminal activity. Some keywords to look for: ‘Tor’ or ‘Onion routing,’ ‘Bitcoin’ or ‘BitTorrent,’ ‘VPN,’ ‘TrueCrypt.’”
    There are so many things wrong with that statement I cannot express how loud the alarms in my brain are blaring about it. That is simply completely, scientifically, unequivocally false.

Leave a Reply

Your email address will not be published. Required fields are marked *