This document discusses techniques for sourcing talent using unconventional methods. It describes how recruiters and sourcers can leverage publicly available online data and digital technologies to identify and engage with candidates. Some of the techniques discussed include sourcing CVs from Google and social media sites, using location data and WiFi to identify people at conferences, and simulating phone calls and messages to reach targets. The document also mentions potential ethical issues with some of these approaches.
14. Who is using it?
The Good
Social Engineers (yes,
it’s a job)
Salesmen
Marketing
Sourcing/Recruitment
Candidates (guerrilla
techniques)
Law enforcement
The Bad
Corporate espionage
Organized crime
Phishers/Vishers
Scammers
Hackers/Crackers
Phreakers
Script kiddies
21. (payroll OR accountant OR ucetni) (german OR french) intitle:cv OR
intitle:resume OR intitle:vitae OR intitle:zivotopis filetype:pdf OR
filetype:doc OR filetype:docx OR filetype:rtf site:.cz OR site:.sk
49. How you can do it
SpoofCard
www.spoofcard.com
+ group spoofing
+ background noises
+ change your voice
+ any mobile platform
bitphone
www.bitphone.net
+ pay by bitcoins
+ encrypted communication
+ call directly from your browser
X
50. Possible sourcing scenarios
Fake number is more effective than a hidden number
Calling a foreign candidate with a local number
Overcoming reception to reach a candidate at work by
calling as e.g. an internal employee, branch number, etc.
Attract a candidate who will Google the unknown
miscalled number back - e.g. from the CEO of some
company (establishing engagement with a candidate)
and many other bad things: )
55. Why care?
Global Analysis
~ 500+ million LinkedIn users
~ 1,7 billion active Facebook users
~ 3,1 billion people online
~ 4,3 billion unique mobile phone subscribers
Source: Wiki, gsmamobileeconomy.com, internetworldstats.com
56. Why care?
Czech Republic breakdown
~ 10,5 million inhabitants
~ 1,1 million LinkedIn users
~ 4,7 million active Facebook users
~ 7,7 million people online
~ 14 million SIM cards
66. Possible sourcing scenarios
Approaching attendees of conferences,
summits and meet-ups
Approaching employees of targeted companies
Engage with people passing by your company
premises
Track habits, schedule and location of
particular people/employees
Complete GSM stalking and hijack … ouch
68. How you can do it
Bird Catcher
www.toplinkpac.com
www.gammagroup.com
www.neosoft.ch
83. Possible sourcing scenarios
Collecting contact information and
identities at conferences and meet-ups
Sniffing traffic for more data about
connected people