Now, you can chat with Barbie®!
Using WiFi and speech recognition technology, Hello Barbie™ doll can interact uniquely with each child by holding conversations, playing games, sharing stories and even telling jokes!
It's a whole new way to interact with Barbie®.
She's ready to discuss anything in an outfit that blends trendy and techie for a cool look.
Use is simple after set up -- push the doll's belt buckle to start a conversation, and release to hear her respond.
More than 8,000 lines of recorded content means countless hours of fun!
Just like a real friend, Hello Barbie™ doll listens and remembers the user's likes and dislikes, giving everyone their own unique experience.
To get started, download the Hello Barbie™ companion app to your own smart device from your device's app store (not included). 
Parents must also set up a ToyTalk account and connect the doll to use the conversational features.
Hello Barbie™ doll can remember up to three different WiFi locations and does not require a smart device after WiFi configuration.
More here

Two articles from Medium by 'Insurge Intelligence,' a crowd-funded investigative journalism project, tell the story of how the United States intelligence community funded, nurtured and incubated Google as part of a drive to dominate the world through control of information. Seed-funded by the NSA and CIA, Google was merely the first among a plethora of private sector start-ups co-opted by US intelligence to retain 'information superiority.'

By Nafeez Ahmed.

 

Part One: How the CIA made Google

From inception, in other words, Google was incubated, nurtured and financed by interests that were directly affiliated or closely aligned with the US military intelligence community: many of whom were embedded in the Pentagon Highlands Forum.

The US intelligence community’s incubation of Google from inception occurred through a combination of direct sponsorship and informal networks of financial influence, themselves closely aligned with Pentagon interests.

The Highlands Forum itself has used the informal relationship building of such private networks to bring together defense and industry sectors, enabling the fusion of corporate and military interests in expanding the covert surveillance apparatus in the name of national security. The power wielded by the shadow network represented in the Forum can, however, be gauged most clearly from its impact during the Bush administration, when it played a direct role in literally writing the strategies and doctrines behind US efforts to achieve ‘information superiority.’

Noting Google's genesis with DARPA funding, the expansion of the empire today in the realm of Google's actions with GeoEye and Keyhole; Boston Dynamics, DeepMind, Nest Labs, Dropcam, etc---the trajectory becomes clear.

 

Part Two: Why Google made the NSA

Mass surveillance is about control. It’s promulgators may well claim, and even believe, that it is about control for the greater good, a control that is needed to keep a cap on disorder, to be fully vigilant to the next threat. But in a context of rampant political corruption, widening economic inequalities, and escalating resource stress due to climate change and energy volatility, mass surveillance can become a tool of power to merely perpetuate itself, at the public’s expense.

A major function of mass surveillance that is often overlooked is that of knowing the adversary to such an extent that they can be manipulated into defeat. The problem is that the adversary is not just terrorists. It’s you and me. To this day, the role of information warfare as propaganda has been in full swing, though systematically ignored by much of the media.

Here, INSURGE INTELLIGENCE exposes how the Pentagon Highlands Forum’s co-optation of tech giants like Google to pursue mass surveillance, has played a key role in secret efforts to manipulate the media as part of an information war against the American government, the American people, and the rest of the world: to justify endless war, and ceaseless military expansionism.


Source: https://medium.com/@NafeezAhmed/how-the-ci...

“From the privacy perspective, we are of course pleased to see Google drop this product,” Marc Rotenberg, president of the Electronic Privacy Information Center, wrote in an email. “And it is a very big deal when Google backs down, particularly after its big push.”

He continued: “But it is also speaks to a larger issue in tech design about privacy. Eyeglass-mounted web display and phone for those who wanted it? Not really a problem. Surveillance and recording of those around the user? Yeah, that’s a problem.”

More here

More here

"The technology titan is putting brakes on an "explorer" program that let people interested in dabbling with Glass buy eyewear for $1,500 apiece.

"Glass was in its infancy, and you took those very first steps and taught us how to walk," the team said of its "explorer" clients in a post on the Google+ social network.

"Well, we still have some work to do, but now we're ready to put on our big kid shoes and learn how to run."

The last day to buy Glass as part of the Explorer program will be Monday and Google did not indicate when a general consumer version of the eyewear might debut.

"Google Glass hasn't truly been released as a product yet -- it's been in long-term beta for over two years," said Forrester analyst J.P. Gownder.

"This organizational move will help to clarify the go to market strategy for both consumer and for enterprise customers."

The Glass test, or beta, program was later expanded to Britain.

During the Explorer testing phase, developers are creating apps for Google Glass, which can range from getting weather reports to sharing videos to playing games.

Glass connects to the Internet using Wi-Fi hot spots or, more typically, by being wirelessly tethered to mobile phones. Pictures or video may be shared through the Google+ social network.

- Outgrown the lab -

"As we look to the road ahead, we realize that we've outgrown the lab and so we're officially graduating from Google X to be our own team," the Glass post said.

"We're thrilled to be moving even more from concept to reality."

Instead of being part of the Google X lab working on innovations such as self-driving cars, the Glass team will become a separate unit answering to Tony Fadell, co-founder of Nest.

Google bought the smart thermostat maker early last year in a multi-billion-dollar deal and brought the former Apple executive on board in the process.

Google has announced alliances with the frame giant behind Ray-Ban and other high-end brands to create and sell Glass eyewear in the United States.

A partnership with Luxottica was portrayed as Google's "biggest step yet into the emerging smart eyewear market."

Luxottica brands include Oakley, Alain Mikli, Ray-Ban and Vogue-Eyewear.

The first smart glasses by Luxottica for Google Glass will go on sale this year, the Italian eyewear group has forecast.

Google has been working to burnish the image of Glass, which has triggered concerns about privacy since the devices are capable of capturing pictures and video.

Forrester data shows that while 43 percent of consumers are interested in Glass, even more have worries about privacy problems caused by the eyewear.

"Google needs to construct a consumer image for the product, and deal with privacy concerns if they want it to be mass market," Gownder said.

German researchers have discovered security flaws that could let hackers, spies and criminals listen to private phone calls and intercept text messages on a potentially massive scale – even when cellular networks are using the most advanced encryption now available.

The flaws, to be reported at a hacker conference in Hamburg this month, are the latest evidence of widespread insecurity on SS7, the global network that allows the world’s cellular carriers to route calls, texts and other services to each other. Experts say it’s increasingly clear that SS7, first designed in the 1980s, is riddled with serious vulnerabilities that undermine the privacy of the world’s billions of cellular customers.

The flaws discovered by the German researchers are actually functions built into SS7 for other purposes – such as keeping calls connected as users speed down highways, switching from cell tower to cell tower – that hackers can repurpose for surveillance because of the lax security on the network.

Those skilled at the myriad functions built into SS7 can locate callers anywhere in the world, listen to calls as they happen or record hundreds of encrypted calls and texts at a time for later decryption. There also is potential to defraud users and cellular carriers by using SS7 functions, the researchers say.

These vulnerabilities continue to exist even as cellular carriers invest billions of dollars to upgrade to advanced 3G technology aimed, in part, at securing communications against unauthorized eavesdropping. But even as individual carriers harden their systems, they still must communicate with each other over SS7, leaving them open to any of thousands of companies worldwide with access to the network. That means that a single carrier in Congo or Kazakhstan, for example, could be used to hack into cellular networks in the United States, Europe or anywhere else.

“It’s like you secure the front door of the house, but the back door is wide open,” said Tobias Engel, one of the German researchers.

Engel, founder of Sternraute, and Karsten Nohl, chief scientist for Security Research Labs, separately discovered these security weaknesses as they studied SS7 networks in recent months, after The Washington Post reported the widespread marketing of surveillance systems that use SS7 networks to locate callers anywhere in the world. The Post reported that dozens of nations had bought such systems to track surveillance targets and that skilled hackers or criminals could do the same using functions built into SS7. (The term is short for Signaling System 7 and replaced previous networks called SS6, SS5, etc.)

The researchers did not find evidence that their latest discoveries, which allow for the interception of calls and texts, have been marketed to governments on a widespread basis. But vulnerabilities publicly reported by security researchers often turn out to be tools long used by secretive intelligence services, such as the National Security Agency or Britain’s GCHQ, but not revealed to the public.

“Many of the big intelligence agencies probably have teams that do nothing but SS7 research and exploitation,” said Christopher Soghoian, principal technologist for the ACLU and an expert on surveillance technology. “They’ve likely sat on these things and quietly exploited them.”

The GSMA, a global cellular industry group based in London, did not respond to queries seeking comment about the vulnerabilities that Nohl and Engel have found. For the Post’s article in August on location tracking systems that use SS7, GSMA officials acknowledged problems with the network and said it was due to be replaced over the next decade because of a growing list of security and technical issues.

The German researchers found two distinct ways to eavesdrop on calls using SS7 technology. In the first, commands sent over SS7 could be used to hijack a cell phone’s “forwarding” function — a service offered by many carriers. Hackers would redirect calls to themselves, for listening or recording, and then onward to the intended recipient of a call. Once that system was in place, the hackers could eavesdrop on all incoming and outgoing calls indefinitely, from anywhere in the world.

The second technique requires physical proximity but could be deployed on a much wider scale. Hackers would use radio antennas to collect all the calls and texts passing through the airwaves in an area. For calls or texts transmitted using strong encryption, such as is commonly used for advanced 3G connections, hackers could request through SS7 that each caller’s carrier release a temporary encryption key to unlock the communication after it has been recorded.

Nohl on Wednesday demonstrated the ability to collect and decrypt a text message using the phone of a German senator, who cooperated in the experiment. But Nohl said the process could be automated to allow massive decryption of calls and texts collected across an entire city or a large section of a country, using multiple antennas.

“It’s all automated, at the push of a button,” Nohl said. “It would strike me as a perfect spying capability, to record and decrypt pretty much any network… Any network we have tested, it works.”

Those tests have included more than 20 networks worldwide, including T-Mobile in the United States. The other major U.S. carriers have not been tested, though Nohl and Engel said it’s likely at least some of them have similar vulnerabilities. (Several smartphone-based text messaging systems, such as Apple’s iMessage and Whatsapp, use end-to-end encryption methods that sidestep traditional cellular text systems and likely would defeat the technique described by Nohl and Engel.)
In a statement, T-Mobile said: “T-Mobile remains vigilant in our work with other mobile operators, vendors and standards bodies to promote measures that can detect and prevent these attacks.”

The issue of cell phone interception is particularly sensitive in Germany because of news reports last year, based on documents provided by former NSA contractor Edward Snowden, that a phone belonging to Chancellor Angela Merkel was the subject of NSA surveillance. The techniques of that surveillance have not become public, though Nohl said that the SS7 hacking method that he and Engel discovered is one of several possibilities.

U.S. embassies and consulates in dozens of foreign cities, including Berlin, are outfitted with antennas for collecting cellular signals, according to reports by German magazine Der Spiegel, based on documents released by Snowden. Many cell phone conversations worldwide happen with either no encryption or weak encryption.

The move to 3G networks offers far better encryption and the prospect of private communications, but the hacking techniques revealed by Nohl and Engel undermine that possibility. Carriers can potentially guard their networks against efforts by hackers to collect encryption keys, but it’s unclear how many have done so. One network that operates in Germany, Vodafone, recently began blocking such requests after Nohl reported the problem to the company two weeks ago.

Nohl and Engel also have discovered new ways to track the locations of cell phone users through SS7. The Post story, in August, reported that several companies were offering governments worldwide the ability to find virtually any cell phone user, virtually anywhere in the world, by learning the location of their cell phones through an SS7 function called an “Any Time Interrogation” query.

Some carriers block such requests, and several began doing so after the Post’s report. But the researchers in recent months have found several other techniques that hackers could use to find the locations of callers by using different SS7 queries. All networks must track their customers in order to route calls to the nearest cellular towers, but they are not required to share that information with other networks or foreign governments.

Carriers everywhere must turn over location information and allow eavesdropping of calls when ordered to by government officials in whatever country they are operating in. But the techniques discovered by Nohl and Engel offer the possibility of much broader collection of caller locations and conversations, by anyone with access to SS7 and the required technical skills to send the appropriate queries.

“I doubt we are the first ones in the world who realize how open the SS7 network is,” Engel said.

Secretly eavesdropping on calls and texts would violate laws in many countries, including the United States, except when done with explicit court or other government authorization. Such restrictions likely do little to deter criminals or foreign spies, say surveillance experts, who say that embassies based in Washington likely collect cellular signals.

The researchers also found that it was possible to use SS7 to learn the phone numbers of people whose cellular signals are collected using surveillance devices. The calls transmit a temporary identification number which, by sending SS7 queries, can lead to the discovery of the phone number. That allows location tracking within a certain area, such as near government buildings.

The German senator who cooperated in Nohl’s demonstration of the technology, Thomas Jarzombek of Merkel’s Christian Democratic Union party, said that while many in that nation have been deeply angered by revelations about NSA spying, few are surprised that such intrusions are possible.

“After all the NSA and Snowden things we’ve heard, I guess nobody believes it’s possible to have a truly private conversation on a mobile phone,” he said. “When I really need a confidential conversation, I use a fixed-line” phone.
Source: http://www.washingtonpost.com/blogs/the-sw...

Now compare to the narrative clip.