Monday, October 28, 2013

Russians Discover Chinese Home Appliances Designed for Crime


We are told to accept Globalization as inevitable and beneficial. Just trust us, says Congress, as they pass free trade act after free trade act, and pass exemptions to polluting transport companies to lower costs for container ships. It may be that most Americans are impoverished in the short run, says Congress, perhaps for the first 50 or 100 years, and are thrown out in the street giving up all hope of having a home or family, but ultimately no doubt Globalization will benefit all Americans and not just the rich, they promise. Really.  One day.

But what if all those cheap devices that flood our shores contain Trojan Horses that are secretly working for our destruction? Sound far fetched? Maybe not.

We believe that Americans are in denial about the extent of cybercrime and cyber-espionage that is going on in the world. Russia in particular seems to be the home of cybercrime whereas China seems to be home of cyber-espionage, although all countries dabble in all the black arts, perhaps.

Many Americans have come to rely upon their home appliances.  What could be more trustworthy than a coffee maker that helps us wake up in the morning?  Or a blow dryer that dries our hair?  What about a blender or food processor?   We rely on these instruments of modern convenience and it is inconceivable that these items could be turned against us.   They are as American as Apple Pie even if they are no longer made in America in order to increase the profits of the wealthy.

Now something has happened that may yet wake Americans out of their complacency, and it comes, ironically from the Russians. They have been discovering for some time covert cyber penetration devices in home appliances manufactured by that supposedly "friend of cheap manufacturing", the People's Republic of China, and they have gone public with this shocking news just recently.

Home appliances of all types including irons, blenders and even the beloved toaster oven have been found kitted out with the most devious of devices, including and especially WIFI hardware designed to penetrate any unsecured WIFI within 600 feet or so of the appliance. Once such a WIFI is found, the innocent-looking home appliance transforms itself into a network-based spy (or "Snowden" as they are known these days) and tries to penetrate any computer it can find on the local network in order to insert viruses (virii?) into the defenseless computers. Of course these home appliances phone home to their masters in Beijing as well.






Are these innocent looking home appliances in fact criminal devices from the East?


The Russians believe that the primary purpose of these devices is to find and make robot slaves for Spam delivery, but we don't buy that. The Chinese are guilty of the largest espionage program in history in their attacks against the United States and have totally raped this country of both military and industrial intellectual property. The theft is vast, persistent and hostile and we are just now starting to calculate the costs, billions of dollars, of changing various military-related apparatus (e.g. electronic warfare) based on the knowledge of this theft. I propose that countries only do this level of espionage if they believe that they are going to war.

Now on top of the previous attacks, we learn of the Russians under attack by home electric appliances. Are Americans also under attack in the same manner? How can we tell? I call on the President and Congress to pass a Homeland Appliance Defense Act and investigate this potential threat to our freedom at once.

For one article on this emerging crisis, see here.



Sunday, October 27, 2013

Sexual Perversity in Blog Posts or What I Have Learned from Blog Statistics


One of the reasons for writing GlobalWahrman is to get first hand experience about what is involved in writing a blog. As part of that I am writing various meta-posts, posts about the writing of the blog, from time to time.

This blog meta-post discusses some of what I have learned about who reads my blog and what that says about the blogging process, at least in my case. There are some surprises here for me, but mostly what I have discovered is both encouraging and even somewhat positive.

I know its hard to believe, coming from me, but its true, a lot of what I say below is along the lines of "hard work is rewarded".

1. The more energy I put into the blog, the more the readership increases. In other words, I can increase readership, in both the short and medium term, by putting more energy into the blog on a regular basis. The half life of any improvement is several weeks, perhaps.  (For this discussion, short term changes in readership is measured in days, medium term in weeks, and long term in months).

2. Inversely, when I am not contributing actively to the blog, this is clearly reflected in the statistics particularly in short term hits, but also in the medium and long terms but more slowly.

3. There is also a fine art in increasing readership on top of the above "hard work is rewarded" meme, and that involves how one structures posts to be found by search engines and the extent to which I promote some of the posts in social media. If the goal of this blog was to demonstrate a large readership, there is a vast number of details and things that one can do to help people find the blog that are ethical. There are also unethical ones, which lots of people use but I find obnoxious.

4. Some posts become perennial favorites and generate a large percentage of the total usage. It is interesting and surprising to see which ones these are. Some may be by accident (e.g. "Bin Laden" in the title getting a hit on a search engine) but some are not. Some of my favorite posts are completely ignored.

5. The theory that a blog has to reach a critical mass of content before it finds its stable readership is not contradicted by the data. I figure I am roughly two years at least from basic critical mass. I think that there is some luck involved here as well.  In other words, a post may have to go viral in order to introduce the blog to a larger group of people, some of whom may become regular or occasional readers.   I also suspect that critical mass will require paying serious attention to the issues discussed in point 3 above.   Global Wahrman is intended to be eclectic, whatever its long term readership may be, it is unlikely to be a mass market blog.

6. Understanding the statistics requires work. They are not well documented and there are default options that need to be changed to get rational numbers. Basically all defaults are set to generate the largest possible numbers, e.g. counting your own page hits on your website and counting someone reading 10 pages as 10 different users.  One must penetrate the incredibly badly documented blogspot/blogger infrastructure and change the settings or the numbers will just be inflated or wrong.

7. Underlying all statistics is a constant murmer of fraud and crime from Eastern Europe, Russia, China and India. Occassionally also Brazil. In other words, the BRIC countries. There is some theory in the blog forums that what the criminals are doing is getting paid for every page hit that they stimulate on certain web sites. Why anyone would pay them for that I do not know, but that is the theory.

8. The post about "repressed lust of CIA analysts" generated the most traffic on a single day in the history of Global Wahrman.  In other words, "sex sells" just as we have been told.

Saturday, October 26, 2013

GlobalWahrman Reveals Highly Secret NSA Project from the Cold War !!


From time to time when working at the RAND Corporation, I would occassionally pick up information that I was not supposed to hear. It was very rare, and no harm was done. In all cases, the specific information had been printed in the NY Times or similar venue anyway.

I do have one story that I think is amusing and which I plan to tell you here.

I hope that by telling you this, I don't accidentally become internationally famous, have my picture in every newspaper, have beautiful women throwing themselves at my feet, get offered huge fees as a freedom-loving journalist, and be acclaimed a hero. I doubt however that any of these things will happen because by telling you this story I am not intentionally or actually damaging America and violating trust based on narcissistic self-delusion, unlike some self-righteous assholes people I could name.

The RAND Corporation was an early site on the ARPAnet, which was the prototype of what we now call the Internet. Much, but not all, of the fundamental technology of the Internet was invented for the ARPAnet and then scaled up.   (Actually, this becomes less and less true every year as the Internet evolves, but it was true at the beginning).

Among other things, the ARPAnet allowed heterogenous computers to communicate in a way that was reliable even if parts of the network went down. This is the famous "packet switching" concept, in which a message is disassembled into packets, the packets are sent by the best available route, and reassembled at the destination.

The computers that handled all this disassembly, re-transmission, reassembly, etc was all in the background and were called IMPs and TIPs and they were highly reliable, special purpose computers built by Bolt Beranak and Newman (BBN) under contract to ARPA. Although very reliable, BBN had maintenance people in various places to fix anything that broke. One of those maintenance people, the one who handled the west coast, was a good friend of ours, for some reason. He had long hair and a beard, was a surfer, was very straight and had a Top Secret / CRYPTO clearance.

CRYPTO is the clearance you need to handle cryptographic material. All cryptographic material is managed by the NSA.

Why he had that clearance was not entirely clear to me, but I think it was because there were places he had to go to fix various computers that were inside places where people did highly secret work. The ARPAnet was completely open and not secret at all, but we were aware that there was a secure version of it inside the basement of NSA, there was a version used between some military commands called MILNET, and so forth.

One day my friend got a call from his boss who told him to grab his kit of spare boards and his passport because they were sending him to London and he was leaving that afternoon. All he was told was to keep his kit of spare boards with him, fly to London, go to his hotel and wait. He would be contacted. I am not exactly sure when this was, but it was probably 1978 plus or minus a year.

So he did that. He got on a plane to London and checked into the hotel they told him to go to, and when he had been there for a few hours, trying to get some sleep, some people came to his hotel and asked him to take his parts kit and whatever tools he needed and come with them. They took him to the basement parking garage of the hotel, put him in a car, put his head down so that he could not see where they were going, and proceeded to drive over an hour somewhere.

At some point, the car stopped and they let him sit up. They were in another underground parking garage for a different hotel somewhere, but of course he had no idea where he was.

They took him upstairs to a hotel room and there, in that hotel room, was an IMP, sitting there looking completely alien and out of place. It had obviously just been moved from somewhere else. They told him it was broken and could he fix it please. Indeed it was broken, he ran diagnostics, swapped some boards and fixed it.

The people who were escorting him, and who stayed with him the entire time he was fixing the computer, then reversed the process: they took him down to the basement, put him in the car, put his head down, proceeded to drive somewhere for an hour or so, and delivered him back to the basement of the hotel he was staying at. They thanked him and told him he could go home now.

So he did.

What does it all mean ? It probably means that there was a special project somewhere that was using a very secure version of the ARPAnet for communication. It was so secret that when one of their IMPs broke, they took the trouble to move it someplace else to have it fixed, and then presumably took it back to where it was being used.

So far as I know, we never heard what project it was.

Friday, October 25, 2013

The Mighty Sphere


About two years ago, I decided to learn NVIDIA's GPU programming environment, CUDA. I wrote a volume renderer in it which can render anything you want as long as it is a sphere.

The problem of course with volume rendering is getting data to render. Volume datasets are usually associated with scientific visualization and when you can get them at all they are not trivial to process. They are real data about real things and it requires serious work to make something of them.

So, for my tests I used normal 3D objects but made every vertex a sphere. It turned out pretty well. Here are two test images, one with glowy spheres and one with spheres that were more hardedged.

You get extra credit if you can figure out what they were originally.








Give up?  The one on the bottom is an upside down SR-71.   The one on top is something with a backbone, you can see the vertebrae clearly.  Dont remember what it was, though.

Tuesday, October 22, 2013

The Repressed Lust of the CIA Analyst in ZDT

[revised 11/24/2013]

I just saw ZDT, or Zero Dark Thirty, that controversial film by Kathryn Bigelow. I expected to hate it, but I actually loved it and I believe, modestly, that most people have misunderstood this movie but that I understand the director's vision.

This is not a movie about Osama Bin Laden, terrorism, torture, or any of that.

This is a movie about the repressed lust within obsessed CIA analysts.








This is a beltway bodice ripper 1 about Maya, the waif-like, strong yet vulnerable, intelligent yet feminine, CIA analyst who single handedly finds the bad guy and saves the world. Why don't you men just listen to me?, she seems to be saying. I am woman! I am strong! I wear a conservatively tailored suit!

But deep inside that slender, athletic, neurotic, nearly anorexic female form lurks a hot volcano of repressed sexual desire.

In the shadows of the secret hanger, surrounded by 30 or so alpha males any one of which could rip her apart like a fried chicken wing, Maya is turned loose by her long-suffering CIA bosses to tell these bearded, athletic, casually dressed, men what their secret mission is.  

Does our angry CIA analyst enjoy the intense attention that these men pay to her?   They *do* pay attention to her, in the hanger, in the desert and God only knows where else.

And Kathryn Bigelow knows only too well what men like our Seal Team 6 find attractive: sports, stealth helicopters in secret hangers, and intense 26 year old repressed redheads.

Completely deadpan, the total professional, she basks in their attention and explains where she believes Bin Laden is hiding.   The men are gruff, uncertain, hostile.   A mistake could land them in Pakistani prison for a very long time.

But her confidence wins them over.

Notice how much more relaxed she appears after spending a week or two "training" with her men in the desert.   There in the desert the M-to-F ratio is probably about 75 to 2 or 3.   If that.   She could have her pick of the litter.   



She looks more relaxed and happier, somehow.

ZDT on IMDB

____________________________________________________

Notes

-1.  The sequence of the briefing of the Seal Team by Maya is also a brilliant example of an explanatory scene, the highest form of filmmaking.  In explanation cinema, the characters just talk to each other and explain things, no actual action is necessary.   In this case, notice how the Special Forces guys make the context switch between thinking they are there for a mission in Libya to the much more interesting project of taking out UBL.   Their reaction is very amusing and is one of the reasons that I think that this movie has value.
http://www.youtube.com/watch?v=6kG4k21PoCs

0.  The day that this post went live my blog received the single largest number of views / hits of any other single day in its life.  Proving one more time that sex sells.

1. A bodice ripper is a type of romance novel. Wikipedia has a good introduction to the categories of the genre and how it has evolved.
http://en.wikipedia.org/wiki/Romance_novel

2.  Has "Beltway bodice ripper" been used before?   Did I just make it up?   The Beltway, for those who don't know, is the term locals use for Washington DC.

Monday, October 21, 2013

Why I Did Not Attend the Keynote Speech at SIGGRAPH 2013


When I declined to attend the SIGGRAPH 2013 Keynote Speech, a friend was surprised and concerned. The Keynote speech was a collection of talks by successful directors of computer animation as organized by the Academy (of Motion Pictures Arts and Sciences). He simply could not understand why I would not want to listen to the publicity machine grind out more material about those chosen by the powerful to be successful, but I will try to explain.

The reason was not because I fundamentally believe that a Keynote speech by a healthy organization is going to be by someone in the field who helped to create it, and who has something to say about how the field is doing, where it has been and where it might be headed. SIGGRAPH has gone away from that years ago, in fact the last talk of that type that I recall was Ed Catmull, president of PIXAR, and even he might have been selected for the wrong reasons.

But I understand why we do not have a keynote speech of that more serious type, and instead usually have someone else who has nothing to do with the field.  The reason is that SIGGRAPH uses the Keynote speech as a way of advertising the conference to the people who might not attend otherwise. Its also a way to generate publicity for the conference, seeing as how our media could not care less about a computer science conference, but give them Hollywood and they jump to. So they choose people who have media appeal to give a "Keynote" speech that isn't.

But that is ok with me because I think that they do need to attract people and there are other ways to get the effect of a Keynote speech. In fact, I think that the Awards speeches which was initiated this year come very close to what I am looking for.

I did not attend because of something else entirely, something ineffable. Something about my past. Something about being in computer animation in Los Angeles in the 1980s.

Voice echoes and camera defocuses to indicate a flashback.

In the 1980s, I chose to destroy my life by working to help invent computer animation. (1) Being an intellectual out of water (any intellectual in Los Angeles is out of water) I attended no less than 20 or so courses at UCLA, the American Film Institute, and attended many lectures at the Academy. Had I not been a complete idiot, I would have enrolled in a degree program and gotten my terminal degree in some field, that would have done me some good. But instead, I decided to learn about the glamourous and rewarding motion picture industry from a series of continuing education classes taught by working professionals. Not less than 300 individual lectures by my reckoning.

And I had a wonderful time. I attended Robert McKee's story structure course when it was ten 4-hour lectures (and not the weekend thing it became). I attended classes with Lynda Obst, Debra Hill, Lauren Shuler, John Dykstra, Bruce Berman, the VP of Finance of Warner Bros, John Badham, Richard Donner, Joel Schumacher, George Roy Hill. Directors, writers, producers, and even a few "movie stars" (Jody Foster, Women in Film, etc).

Writers on writing. Producers on producing. Directors on directing. And I learned a lot, I think. But after a while one has a diminishing return from such things. Hearing Martha Coolidge speak at WIF is entertaining but it does not pay the bills. Hearing Douglas Trumbull talk about doing all the effects on 2001 is enlightening until you realize that he did not do all the effects on 2001. He just managed to figure out how to get the credit for the work (2)

Then, as with anything, knowledge and experience begins to show you the dark side of these innocent events.

So what do we have with these seven so-called "directors of computer animation".

First, very few of these people are directors in the way that term is used in the rest of the motion picture industry. They are at best managers of part of the production process whose creative content (e.g. script, design) has been created by a studio system that may have nothing to do with the director, who in general is partnered with another person to spearhead and organize the production process.

Second, the people chosen to be directors are chosen for a variety of reasons, of which talent and accomplishment are only two, and probably not the most important ones. The people doing the choosing are people who do not have a clue about computer animation, for the most part.

Third, how many of the people up there sacrificed anything to help bring computer animation into existence? None, I reckon. Why in fact, one of them is a stop motion animator who hates computer animation and was dragged into it kicking and screaming.   To glorify such a person at SIGGRAPH is at best ironic but probably worse.

Fourth, isn't it rude to have a presentation celebrating and glorifying people who had nothing to do with inventing a field at this conference while so many of the inventors of the field are unemployed and impoverished for doing so, are walking around outside?

I think it is rude.

There are two other reasons why I did not attend.  First, I do not have enough time at SIGGRAPH as it is to do the work I need to do there and thus consider it a waste of time to listen to talks I could just as easily hear at some other time or venue.   There was nothing about those particular talks that was unique to SIGGRAPH.    Second, I know, from vast personal experience, that while talks of this type might be entertaining, they do not lead to anything.  Ever.

So that is why I did not attend.

_____________________________________________

1. In order to do so, I had to turn down opportunities that almost certainly would have made me independently wealthy. Those opportunities are gone, they were part of that time. And being involved in computer animation did not result in being able to make a living. Therefore, since I did not come from a wealthy family and since being wealthy or being able to generate wealth is a sine qua non of our society,  I had destroyed my life by making this choice.

2. He was so egregious at this that Stanley Kubrick took out an ad in the trades reminding everyone that the credits for visual effects for 2001 had five names, the first being Stanley Kubrick.  I think the ad ran about 1982 but I am not sure.


Friday, October 18, 2013

Bad User Interface Design: Celebrate the Nightmare from Hell that is Gimp


Many philosophers over the centuries have asked: "what makes bad user interface design?" Oh the arguments that have raged over that apparently simple question. Is it all inspiration, accident or genius that leads to bad user interface design? Are there principles we can deduce to help new and inexperienced designers write bad user interface code, maybe even dreadful user interface code?

I believe that the answer is yes, we can help people design and write bad user interface code, code that demeans the user, insults the user, makes their life worse, and makes their work impossible or nearly so. True inspiration may be beyond our capability to teach, true genius may break these principles we write down here, but for the great majority we can deduce principles that can act as guidelines for a truly bad user interface or "user experience" as we say.

We will take the case study approach as pioneered by Harvard Business School and from these case studies try to create principles to apply to new situations.

I recently sat down to learn GIMP, the Gnu Image Processing program, and was thrilled by its bad user interface ideas. From these I derived some principles and will then discuss how GIMP achieves these worthwhile goals.

Principle #1: Make a bad first impression.

If you can make a bad first impression, then you may even be able to make the user give up entirely. But how, specifically, can one make a bad first impression?

Principle #2:  Increase frustration by focusing on what the beginning user has to do and make that more difficult

In other words, concentrate your bad design into those areas that the beginner has to work through, it is less important to inconvenience the advanced user as they are far fewer in number and have more capability and skills to work through your stupidity.

Principle #3:  Use a GUI design or principle from a similar program that  the beginner almost certainly knows but give it a completely different meaning, and actually hide something important that the user needs to do under that category.

Our third principle here is a particularly nasty one. It solves several problems at once, it confuses the user, and makes them less confident that they bring skills to your program that will be useful.

Let us examine how GIMP achieves these three principles in a truly elegant manner. What is the first thing a beginner of a "paint" program might wish to do? Well I would argue that finding a paint brush and setting a color is pretty much right at the top of the list for a beginning user. What Gimp does for this is to make it ok to find a paint brush, although there is some good confusion there, but then it completely makes it inscrutable to choose a color. How does it do this?  It does this by hiding the pick-a-color function under a glyph that means something else entirely in Photoshop.

Then ask yourself how many new users of Gimp will have been exposed to Photoshop? I would argue that at least 80% of any user of Gimp will have learned at least something of Photoshop and the percentage may well be higher. Then what could be more devious and self-defeating than to hide "pick a color" under a graphic that has nothing to do with picking a color from Photoshop? And that is exactly what they do. In Gimp, pick a color is carefully hidden under the following icon:




which means of course to exchange a foreground color with a background color in Photoshop and has nothing to do, actually with choosing a color.

What genius ! What mad genius ! What a clever and nasty person whoever did this must be !!

No one would ever think to look under switch fg/bg color, and they have to look up how to pick color in Gimp on the internet (of course there is no online documentation for Gimp) and eventually they find it, but not after many minutes or even hours of frustration and hairpulling.

So our first case study suggests: find something a beginner certainly has to do, and hide it in a place he will explicitly not look for it based on previous experience.

In future posts we will examine other examples of genius bad user interface design.

Thursday, October 17, 2013

Global Wahrman Retreats from Dynamic Views


I think that I must have unrealistic expectations about how these things are documented.  It makes perfect sense to me that I would want to have my posts truncated to 4 lines, no, wait, that doesn't make any sense at all.  In fact, that would be nutty.  Oh well, I guess making billions of dollars as Blogspot and Google do is no guarantee of quality.  

We temporarily retreat from dynamic views, but we will return to the subject one day soon!


Global Wahrman Tests Dynamic Views


We are testing a new blog format.   I have my doubts, but apparently the only way to find out is to try it, so I made a backup and here we go !

MW

Tuesday, October 15, 2013

The NSA and the Mystery of Tito and Eliza Doolittle


As everyone knows, the rain in Spain falls mainly on the plain.   Poor Eliza Doolittle had to repeat that phrase over and over again, under the tutelage of her cruel taskmaster, the domineering patriarch Henry Higgins in order to achieve the goals not just for herself but for her language teachers.  She wanted a chance to elevate herself from desperate poverty, but her masters wanted to put one over on British society, to fool English society into believing that this poverty-stricken seller of flowers, Eliza Doolittle, was in fact of the upper classes.   Technically speaking this was a conspiracy.

In a similar manner,  we have a story from the Cold War, a mystery if you will, about someone who did not learn to pronounce his H's properly and so was unmasked as an impostor.  Of course in his case, since he was the ruler of a Communist dictatorship, it didn't really matter.

This person was probably a plant of a Russian trained agent to lead the resistance of communist and other partisan forces in a war they expected with Nazi Germany.   The mysterious Russian, if he was Russian, whose real name we do not know, was secretly proven to not be who he said he was after WW II and during the cold war.  It was his failure to learn to pronounce his H's, figuratively speaking, that revealed him.

The organization that succeeded in revealing the truth (secretly) to our leaders was the newly formed and much maligned National Security Agency.   Yes, that poor, misunderstood guardian of freedom, the NSA.

Our story begins in the 1930s in what was the Kingdom of Yugoslavia, formed after WW I out of parts of the Austro Hungarian Empire and the Kingdom of Slovenia.  A former locksmith and metal worker, Josip Broz of Kumrovec, near Zagreb, took the underground cover name of Tito, and led the Communist faction of the partisans in resistance to the Germans who had occupied their country.

When the Germans were defeated, he was able to keep the Kingdom united and create a new country that included Croatia, Serbia, Slovenia and five other distinct provinces and ethinic groups.   He was able to forge his own path for his newly Communist nation, separate from the Soviet Union, and create his own version of Socialism.  (1) When he died, the country split apart violently along ethnic lines. Without him, it could not hold together.

The problem is, or the mystery, is that it was not clear, it still is not clear, who Marshal Tito was.  But whoever he was, it isn't who he said he was.

Marshal Tito was supposedly born Josip Broz in 1892 in Kumrovec to a Croat Father and a Slovene mother.  His first language was Serbo-Croat.    He fought in the Austro Hungarian army, was captured and imprisoned in Russia, fought in the Russian revolution, and returned to Yugoslavia where he was involved in various activities that also got him imprisoned.  After serving time, he went underground and joined the Yugoslav Communist party.   From there he rose in prominence in the Party and led the resistance to the Germans.

But mysteriously the people of Kumrovec did not recognize him.   And when Josip aka Tito spoke his native language, he made mistakes that no native would make.   Serbo-Croat was apparently not his native language.

One job of our intelligence community is to understand what is happening in the world and what is likely to happen. Who the leaders of important countries are, and what they are likely to do, is part of their job. Its a nearly impossible job to do, but certain things can be done. But one is certainly at a disadvantage if you do not even know who the leader of a country is.

What does any of this have to do with the NSA?

The NSA is considered one of the centers of excellence in linguistics in the world. They took a speech that Tito gave and analyzed it, asking the question of whether Tito was a native speaker of Serbo Croat. I do not know when the report was originally written, but it was recently released.  Their answer was: he was not a native speaker of Serbo Croat.  He was an impostor, just like Eliza Doolittle!  But an Eliza Doolittle who did not learn her lessons!  (2) 








So whoever Marshall Tito, one of the great revolutionaries of the 20th Century and a national hero of the former country of Yugoslavia, was he wasn't who he said he was. Most people who know about the issue speculate that Tito was a Russian who was put in place of Josip Broz sometime in the 1930s, well before WW II. But it is speculation.

For a good discussion of the Tito mystery, see this post.

Wikipedia claims this story isn't true.  Well, maybe.  As you would imagine, partisans of Tito would want to deny the story.  Finding out the truth here would be difficult, it might in fact, be impossible. (3)

I hope this little story will help to convince you of two things.  First, the importance of studying musical theatre for understanding the Cold War.  And second, to give you some idea of what the NSA does for a living.   They do not give a fuck  hoot about your pornography or your mistress, they have other fish to fry.

The original report is on the NSA web site at:

__________________________________________________


1. In Stalin's desk after he died was a letter from Tito. It said that they had caught another Soviet assassination squad trying to kill him (Tito) but that they had missed, and that if Stalin tried that again Tito would send his own squad after Stalin and they would not miss.

2. My Fair Lady, of course.

3. One could imagine exhuming the body of Tito, extracting DNA, and comparing that DNA with the DNA of other living members of his family, if any exist, or with people from that part of the world.  One might then have evidence that he was related to those people or not.   This is not something that I, or anyone I know, is going to cause to happen.