सोमवार, 10 जून 2013

Why and how you must improve your social score before you target that job

The socially enabled résumé

Why and how you must improve your social score before you target that job

First Published: Sun, Jun 09 2013. 03 12 PM IST

We’ll let you in on a secret. If you are looking for a job, we’ll tell you five things that shouldn’t be in your application or résumé.
So, without further ado, here goes: Avoid using the word “innovative” to describe yourself or your work. Seriously, what was the last truly innovative thing you did, other than wipe up your noodles with nachos? Ditto for “passionate”. Get real, no one believes that word has any meaning. Stop saying you are “motivated”—what’s new? Everyone applying for the job is motivated. Otherwise, why would they apply? Stop kidding yourself that you have “vision”. Some of the biggest companies in the world don’t have it. And, finally, don’t even go near the phrase “have great networking skills” because the human resources (HR) person is about to google the daylights out of you and look up everything you have been up to on social networks. Instead, make sure you demonstrate your networking skills through a classy, riveting, socially savvy résumé.
If you are not certain which words to avoid, here’s a way to cheat: LinkedIn publishes an annual list of the most frequently used words in profiles. Look that up and banish those overused, tired and abused words from your résumé.
Your social presence is your unofficial résumé. According to Bangalore-based Anuradha Sharma, founder of The HR Practice and The Search Practice, those applying for senior positions need to pay more attention to their social presence. The HR Practice is an outsourced HR partner for companies like InMobi, TATA AIG General Insurance Co. Ltd, Cricinfo and redBus. “Companies are keen to know what your peers and clients are saying about you. They don’t want to call up a reference provided by the applicant. Who will believe that reference when the reference can obviously be influenced?” asks Sharma. “Social media has become the mass reference of choice.”
Listed here are our top five ways to make your application socially savvy. All the best with that job hunt!
Tweet résumé
photo
Blow everyone away with live tweets in your job application or résumé. Turn your résumé into real-time communication using TweetResume for $34.95 (around Rs.1,990). TweetResume allows you to embed your tweets right into a Word document. Of course, when the document is opened, the user needs to be online for the tweets to update. In a world where companies are integrating social technologies right into their recruitment process, get a step ahead by changing the tweets in the document at each point in the recruitment process, from shortlisting to actual interview to group discussion.
Using Linkedin
photo
According to a recent research paper titled “Use of Social Networking Sites for Recruitment” from the Institute of Professional Studies, Pune, by Prof. Sharayu Patil and institute director G.B. Patil, 83% of firms feel that social networking sites will emerge as a new-age recruitment tool. Their research shows that after the US, India contributes the highest traffic to LinkedIn (13.7%). Which means what you have on LinkedIn is going to be critical to your job application. Anuradha Sharma agrees. Her advice to job seekers is to clean up their LinkedIn profiles, avoid getting hundreds of pointless ratings on various parameters such as “team management” and “business strategy” from peers, and generally communicate their personalities clearly. Also, make your LinkedIn profile public so that others can find it in a Web search. Include a link to your LinkedIn profile in your résumé or application.
Facebook posts
photo
Clean up your pictures on Facebook (and elsewhere on the Internet). Look up the pictures you have been tagged in. Remove what you consider digital dirt. Many recruitment teams look up Facebook to see if you are actually the fun guy who gets along with people that you claim to be in your résumé. Then they stumble upon those strange and embarrassing pictures that make them turn their noses up and junk your résumé. Facebook has a method of finding all the pictures you are tagged in and removing the tags. Remember to use this capability before applying for a job. Then, add your Facebook page to your résumé.
YouTube link
photo
Use YouTube, creatively. Did we forget to tell you not to use the word “creative” to describe yourself in the résumé? Okay, we meant to, but it slipped our mind. Instead, make sure you use YouTube to show how creative you are. Do you have a special skill or hobby, say, you juggle or go deep-sea diving? Create a small video of yourself, demonstrating your skill or your hobby—and in the process ensure your confidence and personality are showcased. It’s a great way to let your prospective employer meet you face to face. Place your YouTube link in your résumé.
Quick Reader Code
photo
Create a Quick Reader (QR) Code for your blog (don’t have a blog? Go to Blogger, Typepad or WordPress). Place the QR Code in your résumé. QR Codes can be easily generated for any URL using a service like QuickQR (http://www.quikqr.com/). You can use the QR Code in your email signature or even your personal card. But a QR Code in your résumé is bound to make the recruitment officer take a second look and mutter, “Now this one I have to speak to!” 
 
Arun Katiyar is a content and communication consultant with a focus on technology companies.
Courtesy- Mint

शनिवार, 8 जून 2013

Through the PRISM, Big Brother is watching

    -Glenn Greenwald
    -Ewen MacAskill
  • U.S. Director of National Intelligence James Clapper has called
the exposé ‘reprehensible and a threat to security.’
     
    AP U.S. Director of National Intelligence James Clapper has called the exposé ‘reprehensible and a threat to security.’ 
     
The U.S. National Security Agency (NSA) has obtained direct access to the systems of Google, Facebook, Apple and other U.S. internet giants, according to a top secret document obtained by The Guardian.
The NSA access is part of a previously undisclosed programme called PRISM, which allows officials to collect material including search history, the content of emails, file transfers and live chats, the document says.
The Guardian has verified the authenticity of the document, a 41-slide PowerPoint presentation — classified as top secret with no distribution to foreign allies — which was apparently used to train intelligence operatives on the capabilities of the programme. The document claims “collection directly from the servers” of major U.S. service providers.

Firms react

Although the presentation claims the programme is run with the assistance of the companies, all those who responded to a Guardian request for comment on Thursday, June 6, denied knowledge of any such programme.
In a statement, Google said: “Google cares deeply about the security of our users’ data. We disclose user data to government in accordance with the law, and we review all such requests carefully. From time to time, people allege that we have created a government ‘back door’ into our systems, but Google does not have a back door for the government to access private user data.” Several senior tech executives insisted that they had no knowledge of PRISM or of any similar scheme. They said they would never have been involved in such a programme. “If they are doing this, they are doing it without our knowledge,” one said.
An Apple spokesman said it had “never heard” of PRISM.
The NSA access was enabled by changes to U.S. surveillance law introduced under President Bush and renewed under President Obama in December 2012.
The programme facilitates extensive, in-depth surveillance on live communications and stored information. The law allows for the targeting of any customers of participating firms who live outside the U.S., or those Americans whose communications include people outside the U.S.
It also opens the possibility of communications made entirely within the U.S. being collected without warrants.

Verizon revelation

Disclosure of the PRISM programme follows a leak to the Guardian on Wednesday of a top-secret court order compelling telecoms provider Verizon to turn over the telephone records of millions of U.S. customers.
The participation of the internet companies in PRISM will add to the debate, ignited by the Verizon revelation, about the scale of surveillance by the intelligence services. Unlike the collection of those call records, this surveillance can include the content of communications and not just the metadata.
Some of the world’s largest internet brands are claimed to be part of the information-sharing programme since its introduction in 2007. Microsoft — which is currently running an advertising campaign with the slogan “Your privacy is our priority” — was the first, with collection beginning in December 2007.
It was followed by Yahoo in 2008; Google, Facebook and PalTalk in 2009; YouTube in 2010; Skype and AOL in 2011; and finally Apple, which joined the programme in 2012. The programme is continuing to expand, with other providers due to come online.
Collectively, the companies cover the vast majority of online email, search, video and communications networks.
The extent and nature of the data collected from each company varies.
Companies are legally obliged to comply with requests for users’ communications under U.S. law, but the PRISM programme allows the intelligence services direct access to the companies’ servers.
The NSA document notes the operations have “assistance of communications providers in the U.S.”
The revelation also supports concerns raised by several U.S. senators during the renewal of the Fisa Amendments Act in December 2012, who warned about the scale of surveillance the law might enable, and shortcomings in the safeguards it introduces.
When the FAA was first enacted, defenders of the statute argued that a significant check on abuse would be the NSA’s inability to obtain electronic communications without the consent of the telecom and internet companies that control the data. But the PRISM programme renders that consent unnecessary, as it allows the agency to directly and unilaterally seize the communications off the companies’ servers.

Range of data

A chart prepared by the NSA, contained within the top-secret document obtained by The Guardian, underscores the breadth of the data it is able to obtain: email, video and voice chat, videos, photos, voice-over-IP (Skype, for example) chats, file transfers, social networking details, and more.
The document is recent, dating to April 2013. Such a leak is extremely rare in the history of the NSA, which prides itself on maintaining a high level of secrecy.
The PRISM programme allows the NSA, the world’s largest surveillance organisation, to obtain targeted communications without having to request them from the service providers and without having to obtain individual court orders.
With this programme, the NSA is able to reach directly into the servers of the participating companies and obtain both stored communications as well as perform real-time collection on targeted users.
The presentation claims PRISM was introduced to overcome what the NSA regarded as shortcomings of Fisa warrants in tracking suspected foreign terrorists. It noted that the U.S. has a “home-field advantage” due to housing much of the internet’s architecture. But the presentation claimed “Fisa constraints restricted our home-field advantage” because Fisa required individual warrants and confirmations that both the sender and receiver of a communication were outside the U.S.
“Fisa was broken because it provided privacy protections to people who were not entitled to them,” the presentation claimed. “It took a Fisa court order to collect on foreigners overseas who were communicating with other foreigners overseas simply because the government was collecting off a wire in the United States. There were too many email accounts to be practical to seek Fisas for all.” The new measures introduced in the FAA redefines “electronic surveillance” to cover anyone “reasonably believed” to be outside the U.S. — a technical change which reduces the bar to initiating surveillance.
The act also gives the director of national intelligence and the attorney general power to permit obtaining intelligence information, and indemnifies internet companies against any actions arising as a result of cooperating with authorities’ requests.
In short, where previously the NSA needed individual authorisations, and confirmation that all parties were outside the U.S., they now need only reasonable suspicion that one of the parties was outside the country at the time the records were collected by the NSA.

FBI as intermediary

The document also shows the FBI acts as an intermediary between other agencies and the tech companies, and stresses its reliance on the participation of U.S. internet firms, claiming “access is 100% dependent on ISP provisioning.”
In the document, the NSA hails the PRISM programme as “one of the most valuable, unique and productive accesses for NSA.”
It boasts of what it calls “strong growth” in its use of the PRISM programme to obtain communications. The document highlights the number of obtained communications increased in 2012 by 248 per cent for Skype — leading the notes to remark there was “exponential growth in Skype reporting; looks like the word is getting out about our capability against Skype.” There was also a 131 per cent increase in requests for Facebook data, and 63 per cent for Google.
The NSA document indicates that it is planning to add Dropbox as a PRISM provider. The agency also seeks, in its words, to “expand collection services from existing providers.”

Political concerns

The revelations echo fears raised on the Senate floor last year during the expedited debate on the renewal of the FAA powers which underpin the PRISM programme, which occurred just days before the act expired.
Senator Christopher Coons of Delaware specifically warned that the secrecy surrounding the various surveillance programmes meant there was no way to know if safeguards within the act were working.
“The problem is: we here in the Senate and the citizens we represent don’t know how well any of these safeguards actually work,” he said.
“The law doesn’t forbid purely domestic information from being collected. We know that at least one Fisa court has ruled that the surveillance programme violated the law. Why? Those who know can’t say and average Americans can’t know.” Other senators also raised concerns. Senator Ron Wyden of Oregon attempted, without success, to find out any information on how many phone calls or emails had been intercepted under the programme.
When the law was enacted, defenders of the FAA argued that a significant check on abuse would be the NSA’s inability to obtain electronic communications without the consent of the telecom and internet companies that control the data. But the PRISM programme renders that consent unnecessary, as it allows the agency to directly and unilaterally seize the communications off the companies’ servers.
When the NSA reviews a communication it believes merits further investigation, it issues what it calls a “report.” According to the NSA, “over 2,000 PRISM-based reports” are now issued every month. There were 24,005 in 2012, a 27 per cent increase on the previous year.
In total, more than 77,000 intelligence reports have cited the PRISM programme.

‘Unprecedented militarisation’

Jameel Jaffer, director of the [American Civil Liberties Union] ACLU’s Center for Democracy, that it was astonishing the NSA would even ask technology companies to grant direct access to user data.
“It’s shocking enough just that the NSA is asking companies to do this,” he said. “The NSA is part of the military. The military has been granted unprecedented access to civilian communications.
“This is unprecedented militarisation of domestic communications infrastructure. That’s profoundly troubling to anyone who is concerned about that separation.” A senior administration official said in a statement: “The Guardian and Washington Post articles refer to collection of communications pursuant to Section 702 of the Foreign Intelligence Surveillance Act. This law does not allow the targeting of any U.S. citizen or of any person located within the United States.
“The program is subject to oversight by the Foreign Intelligence Surveillance Court, the Executive Branch, and Congress. It involves extensive procedures, specifically approved by the court, to ensure that only non-U.S. persons outside the U.S. are targeted, and that minimize the acquisition, retention and dissemination of incidentally acquired information about U.S. persons.
“This program was recently reauthorized by Congress after extensive hearings and debate.
“Information collected under this program is among the most important and valuable intelligence information we collect, and is used to protect our nation from a wide variety of threats.
“The Government may only use Section 702 to acquire foreign intelligence information, which is specifically, and narrowly, defined in the Foreign Intelligence Surveillance Act. This requirement applies across the board, regardless of the nationality of the target.”
(Additional reporting by James Ball and Dominic Rushe.) © Guardian Newspapers Limited, 2013
Keywords: National Security 
http://www.thehindu.com/opinion/op-ed/through-the-prism-big-brother-is-watching/article4792108.ece

शुक्रवार, 7 जून 2013

U.S. Confirms That It Gathers Online Data Overseas


Alex Wong/Getty Images
Senators Dianne Feinstein and Saxby Chambliss spoke to reporters Thursday about the National Security Agency’s collection of millions of Verizon phone records.




WASHINGTON — The federal government has been secretly collecting information on foreigners overseas for nearly six years from the nation’s largest Internet companies like Google, Facebook and, most recently, Apple, in search of national security threats, the director of national intelligence confirmed Thursday night.
Multimedia

Related in Opinion

Patrick Semansky/Associated Press
The N.S.A. and other government agencies declined to comment about the disclosures.

Readers’ Comments

"Security or Privacy? Both sides have consequences. Americans must choose."
AlennaM, Laurel, MD
The confirmation of the classified program came just hours after government officials acknowledged a separate seven-year effort to sweep up records of telephone calls inside the United States. Together, the unfolding revelations opened a window into the growth of government surveillance that began under the Bush administration after the terrorist attacks of Sept. 11, 2001, and has clearly been embraced and even expanded under the Obama administration.
Government officials defended the two surveillance initiatives as authorized under law, known to Congress and necessary to guard the country against terrorist threats. But an array of civil liberties advocates and libertarian conservatives said the disclosures provided the most detailed confirmation yet of what has been long suspected about what the critics call an alarming and ever-widening surveillance state.
The Internet surveillance program collects data from online providers including e-mail, chat services, videos, photos, stored data, file transfers, video conferencing and log-ins, according to classified documents obtained and posted by The Washington Post and then The Guardian on Thursday afternoon.
In confirming its existence, officials said that the program, called Prism, is authorized under a foreign intelligence law that was recently renewed by Congress, and maintained that it minimizes the collection and retention of information “incidentally acquired” about Americans and permanent residents. Several of the Internet companies said they did not allow the government open-ended access to their servers but complied with specific lawful requests for information.
“It cannot be used to intentionally target any U.S. citizen, any other U.S. person, or anyone located within the United States,” James Clapper, the director of national intelligence, said in a statement, describing the law underlying the program. “Information collected under this program is among the most important and valuable intelligence information we collect, and is used to protect our nation from a wide variety of threats.”
The Prism program grew out of the National Security Agency’s desire several years ago to begin addressing the agency’s need to keep up with the explosive growth of social media, according to people familiar with the matter.
The dual revelations, in rapid succession, also suggested that someone with access to high-level intelligence secrets had decided to unveil them in the midst of furor over leak investigations. Both were reported by The Guardian, while The Post, relying upon the same presentation, almost simultaneously reported the Internet company tapping. The Post said a disenchanted intelligence official provided it with the documents to expose government overreach.
Before the disclosure of the Internet company surveillance program on Thursday, the White House and Congressional leaders defended the phone program, saying it was legal and necessary to protect national security.
Josh Earnest, a White House spokesman, told reporters aboard Air Force One that the kind of surveillance at issue “has been a critical tool in protecting the nation from terror threats as it allows counterterrorism personnel to discover whether known or suspected terrorists have been in contact with other persons who may be engaged in terrorist activities, particularly people located inside the United States.” He added: “The president welcomes a discussion of the trade-offs between security and civil liberties.”
The Guardian and The Post posted several slides from the 41-page presentation about the Internet program, listing the companies involved — which included Yahoo, Microsoft, Paltalk, AOL, Skype and YouTube — and the dates they joined the program, as well as listing the types of information collected under the program.
The reports came as President Obama was traveling to meet President Xi Jinping of China at an estate in Southern California, a meeting intended to address among other things complaints about Chinese cyberattacks and spying. Now that conversation will take place amid discussion of America’s own vast surveillance operations.

But while the administration and lawmakers who supported the telephone records program emphasized that all three branches of government had signed off on it, Anthony Romero of the American Civil Liberties Union denounced the surveillance as an infringement of fundamental individual liberties, no matter how many parts of the government approved of it.
Multimedia


“A pox on all the three houses of government,” Mr. Romero said. “On Congress, for legislating such powers, on the FISA court for being such a paper tiger and rubber stamp, and on the Obama administration for not being true to its values.”
Readers’ Comments

"Security or Privacy? Both sides have consequences. Americans must choose."
AlennaM, Laurel, MD
Others raised concerns about whether the telephone program was effective.
Word of the program emerged when The Guardian posted an April order from the secret foreign intelligence court directing a subsidiary of Verizon Communications to give the N.S.A. “on an ongoing daily basis” until July logs of communications “between the United States and abroad” or “wholly within the United States, including local telephone calls.”
On Thursday, Senators Dianne Feinstein of California and Saxby Chambliss of Georgia, the top Democrat and top Republican on the Intelligence Committee, said the court order appeared to be a routine reauthorization as part of a broader program that lawmakers have long known about and supported.
“As far as I know, this is an exact three-month renewal of what has been the case for the past seven years,” Ms. Feinstein said, adding that it was carried out by the Foreign Intelligence Surveillance Court “under the business records section of the Patriot Act.”
“Therefore, it is lawful,” she said. “It has been briefed to Congress.”
While refusing to confirm or to directly comment on the reported court order, Verizon, in an internal e-mail to employees, defended its release of calling information to the N.S.A. Randy Milch, an executive vice president and general counsel, wrote that “the law authorizes the federal courts to order a company to provide information in certain circumstances, and if Verizon were to receive such an order, we would be required to comply.”
Sprint and AT&T have also received demands for data from national security officials, according to people familiar with the requests. Those companies as well as T-Mobile and CenturyLink declined to say Thursday whether they were or had been under a similar court order.
Lawmakers and administration officials who support the phone program defended it in part by noting that it was only for “metadata” — like logs of calls sent and received — and did not involve listening in on people’s conversations.
The Internet company program appeared to involve eavesdropping on the contents of communications of foreigners. The senior administration official said its legal basis was the so-called FISA Amendments Act, a 2008 law that allows the government to obtain an order from a national security court to conduct blanket surveillance of foreigners abroad without individualized warrants even if the interception takes place on American soil.
The law, which Congress reauthorized in late 2012, is controversial in part because Americans’ e-mails and phone calls can be swept into the database without an individualized court order when they communicate with people overseas. While the newspapers portrayed the classified documents as indicating that the N.S.A. obtained direct access to the companies’ servers, several of the companies — including Google, Facebook, Microsoft and Apple — denied that the government could do so. Instead, the companies have negotiated with the government technical means to provide specific data in response to court orders, according to people briefed on the arrangements.
“Google cares deeply about the security of our users’ data,” the company said in a statement. “We disclose user data to government in accordance with the law and we review all such requests carefully. From time to time, people allege that we have created a government ‘backdoor’ into our systems, but Google does not have a ‘backdoor’ for the government to access private user data.”

While murky questions remained about the Internet company program, the confirmation of the calling log program solved a mystery that has puzzled national security legal policy observers in Washington for years: why a handful of Democrats on the Senate Intelligence Committee were raising cryptic alarms about Section 215 of the Patriot Act, the law Congress enacted after the 9/11 attacks.


Section 215 made it easier for the government to obtain a secret order for business records, so long as they were deemed relevant to a national security investigation.
Related

Related in Opinion

Readers’ Comments

"Security or Privacy? Both sides have consequences. Americans must choose."
AlennaM, Laurel, MD
Section 215 is among the sections of the Patriot Act that have periodically come up for renewal. Since around 2009, a handful of Democratic senators briefed on the program — including Ron Wyden of Oregon — have sought to tighten that standard to require a specific nexus to terrorism before someone’s records could be obtained, while warning that the statute was being interpreted in an alarming way that they could not detail because it was classified.
On Thursday, Mr. Wyden confirmed that the program is what he and others have been expressing concern about. He said he hoped the disclosure would “force a real debate” about whether such “sweeping, dragnet surveillance” should be permitted — or is even effective.
But just as efforts by Mr. Wyden and fellow skeptics, including Senators Richard J. Durbin of Illinois and Mark Udall of Colorado, to tighten standards on whose communications logs could be obtained under the Patriot Act have repeatedly failed, their criticism was engulfed in a clamor of broad, bipartisan support for the program.
“If we don’t do it,” said Senator Lindsey Graham, Republican of South Carolina, “we’re crazy.”
And Representative Mike Rogers, Republican of Michigan and the chairman of the House Intelligence Committee, claimed in a news conference that the program helped stop a significant domestic terrorist attack in the United States in the last few years. He gave no details.
It has long been known that one aspect of the Bush administration’s program of surveillance without court oversight involved vacuuming up communications metadata and mining the database to identify associates — called a “community of interest” — of a suspected terrorist.
In December 2005, The New York Times revealed the existence of elements of that program, setting off a debate about civil liberties and the rule of law. But in early 2007, Alberto R. Gonzales, then the attorney general, announced that after months of extensive negotiation, the Foreign Intelligence Surveillance Court had approved “innovative” and “complex” orders bringing the surveillance programs under its authority.
Reporting was contributed by Eric Schmitt, Jonathan Weisman and James Risen from Washington; Brian X. Chen from New York; Vindu Goel, Claire Cain Miller, Nicole Perlroth, Somini Sengupta and Michael S. Schmidt from San Francisco; and Nick Wingfield from Seattle.


बुधवार, 5 जून 2013

Ab to Cinema Hall Ki Ek Seat Bhi Khali Hai

कमरें खाली हैं 
दीवारें खाली हैं 
अब तो किचन के कुछ बर्तन भी खाली हैं 
इन छोटे से जहान की हवा भी खाली है 
तुम्हारा देर से उठना खाली है 
और रात देर से सोना खाली है 
तुम्हारा आना खाली है 
तुम्हारा जाना खाली है 
परेशानी में चुप रहना खाली है 
जोश में खूब बोलना खाली है 
तुम्हारी माया नगरी खाली है 
तुम्हारी कहानी खाली है 
तुम्हारी मोहब्बत खाली है 
तुम्हारी नफ़रत खाली है 
तुम्हारी दोस्ती खाली है 
तुम्हारी दुश्मनी खाली है  
तुम्हारी पसंद खाली है 
तुम्हारी नापसंद खाली है 
अब तो सिनेमा हाल की एक सीट भी खाली है
बहुत कुछ खाली है वो इस खालीपन से न भर पायेगा

Kisi Ke Jaane ke Baad Khaali Pan ko Bharne ki Koshish Mein...Jo Bhara Nahi Ja Sakta.