Skip to main content

Home/ All Things TOK/ Group items matching ""social networking"" in title, tags, annotations or url

Group items matching
in title, tags, annotations or url

Sort By: Relevance | Date Filter: All | Bookmarks | Topics Simple Middle
anonymous

'Pre-crime' Comes to the HR Dept. - Datamation.com - 0 views

  •  
    "A Santa Barbara, Calif., startup called Social Intelligence data-mines the social networks to help companies decide if they really want to hire you. While background checks, which mainly look for a criminal record, and even credit checks have become more common, Social Intelligence is the first company that I'm aware of that systematically trolls social networks for evidence of bad character. Using automation software that slogs through Facebook, Twitter, Flickr, YouTube, LinkedIn, blogs, and "thousands of other sources," the company develops a report on the "real you" -- not the carefully crafted you in your resume. The service is called Social Intelligence Hiring. The company promises a 48-hour turn-around. Because it's illegal to consider race, religion, age, sexual orientation and other factors, the company doesn't include that information in its reports. Humans review the reports to eliminate false positives. And the company uses only publically shared data -- it doesn't "friend" targets to get private posts, for example. The reports feature a visual snapshot of what kind of person you are, evaluating you in categories like "Poor Judgment," "Gangs," "Drugs and Drug Lingo" and "Demonstrating Potentially Violent Behavior." The company mines for rich nuggets of raw sewage in the form of racy photos, unguarded commentary about drugs and alcohol and much more. "
anonymous

The Autistic Hacker - IEEE Spectrum - 0 views

  •  
    "A few months after the World Trade Center attacks, a strange message appeared on a U.S. Army computer: "Your security system is crap," it read. "I am Solo. I will continue to disrupt at the highest levels." Solo scanned thousands of U.S. government machines and discovered glaring security flaws in many of them. Between February 2001 and March 2002, Solo broke into almost a hundred PCs within the Army, Navy, Air Force, NASA, and the Department of Defense. He surfed around for months, copying files and passwords. At one point he brought down the U.S. Army's entire Washington, D.C., network, taking about 2000 computers out of service for three days. U.S. attorney Paul McNulty called his campaign "the biggest military computer hack of all time." But despite his expertise, Solo didn't cover his tracks. He was soon traced to a small apartment in London. In March 2002, the United Kingdom's National Hi-Tech Crime Unit arrested Gary McKinnon, a quiet 36-year-old Scot with elfin features and Spock-like upswept eyebrows. He'd been a systems administrator, but he didn't have a job at the time of his arrest; he spent his days indulging his obsession with UFOs. In fact, McKinnon claimed that UFOs were the reason for his hack. Convinced that the government was hiding alien antigravity devices and advanced energy technologies, he planned to find and release the information for the benefit of humanity. He said his intrusion was detected just as he was downloading a photo from NASA's Johnson Space Center of what he believed to be a UFO. Despite the outlandishness of his claims, McKinnon now faces extradition to the United States under a controversial treaty that could land him in prison for years-and possibly for the rest of his life. The case has transformed McKinnon into a cause célèbre. Supporters have rallied outside Parliament with picket signs. There are "Free Gary" websites, T-shirts, posters. Rock star David Gilmour, the former guitarist for Pink Floyd, even recorded
1 - 2 of 2
Showing 20 items per page