Mader, Julius. Dr. Sorge Reports. East Berlin: Military Publications of the GDR, 1984.
Wilcox: "East German account of Richard Sorge."
Mader, Julius. Who's Who in CIA. East Berlin: Julius Mader, 1968.
Petersen comments that this work was "[s]ponsored by German Democratic Republic." Brandt's NameBase review says that "Mader paints with a broad brush. He admits ... that his listings include former OSS, military intelligence (even during WW2), State Department personnel who have done 'work for CIA,' FBI counterintelligence, and also the occasional politician who sat on this or that intelligence committee. Generally when Mader includes a name, it's merely an indication that Mader found this person interesting for one reason or another, and further research and corroboration is needed before any conclusions can be drawn."
See Paul Maddrell, "What We Have Discovered about the Cold War Is What We Already Knew: Julius Mader and the Western Secret Services during the Cold War, Cold War History 5, no. 2 (May 2005): 235-258.
Madsen, Chris. "Strategy, Fleet Logistics, and the Lethbridge Mission to the Pacific and Indian Oceans 1943-1944." Journal of Strategic Studies 31, no. 6 (2008): 951-981.
Madsen, Wayne. "Intelligence Agency Threats to Computer Security." International Journal of Intelligence and Counterintelligence 6, no. 4 (Winter 1993): 413-488.
Includes country-by-country listing of the "Computer-Communications Espionage Capabilities of Intelligence and Law Enforcement Agencies" (pp. 446-488).
Maechling, Charles, Jr. "Improving the Intelligence System." Foreign Service Journal 57, no. 6 (Jun. 1980): 10-13, 41-42.
Maechling, Charles, Jr. "Official Secrets: British Style/American Style." International Journal of Intelligence and Counterintelligence 2, no. 3 (Fall 1988): 359-380.
Maechling, Charles, Jr. "Scandal in Wartime Washington: The Craufurd-Stuart Affair of 1918." International Journal of Intelligence and Counterintelligence 4, no. 3 (Fall 1990): 357-370. See also, Egerton, "Diplomacy, Scandal, and Military Intelligence: The Craufurd-Stuart Affair and Anglo-American Relations, 1918-20," I&NS 2.4 (Oct. 1987): 110-134.
[WWI/UK & U.S.][c]
Maertens, Thomas R.
1. "'Shootdown' Shotdown." International Journal of Intelligence and Counterintelligence 1, no. 2 (1986): 137-145.
This review article of Johnson's Shootdown is better than the book itself. Maertens supports the strong conclusion that "Johnson has manipulated and distorted the evidence beyond recognition."
2. "Tragedy of Errors." Foreign Service Journal 62 (Sep. 1985): 24-31. [Petersen]
Maffei, Riccardo. Tr., Robert L. Miller. "Fedor Butenko: One Man Against Bolshevism." International Journal of Intelligence and Counterintelligence 23, no. 3 (Fall 2010): 534-566.
Butenko was a Soviet diplomat who defected to Mussolini's Italy in 1938. It is this choice that differentiates Butenko from other Soviet defectors of the period.
Maffei, Riccardo. "Il 'caso Helfand': La defezione nel 1940 del diplomatico sovietico a Roma nei documenti americani." Nuova Storia Contemporanea 18, no. 5 (Sep.-Oct. 2014): 49-74.
Lev Helfand, Soviet Charge d'affaires in Italy, defected with his family to the United States in 1940.
Maffei, Riccardo. "L'ombra della GPU a Roma. Lo spionaggio sovietico nell'Italia fascista attraverso le carte di polizia (1926-38)." Nuova Storia Contemporanea 15, no. 2 (Mar.-Apr. 2011): 25-52.
Maffeo, Steven E. Most Secret and Confidential: Intelligence in the Age of Nelson. Annapolis, MD: U.S. Naval Institute Press, 2000. London: Chatham, 2000.
Bath, NIPQ, Summer 2001, recommends Maffeo's work. The author "illustrates the role of the commander as an intelligence officer through examples drawn mainly from the life of Lord Nelson and focusing on his use of intelligence against the Danish fleet in the Battle of Copenhagen in 1801 and against Napoleon's French Mediterranean forces in the Battle of the Nile in 1798."
For Meilinger, Aerospace Power Journal (Winter 2000), "one of the more enlightening discussions" was the author's "description of how sparse and small the typical commander's staff was and, therefore, how personality-dependent ... intelligence operations were at the close of the eighteenth century." He concludes that Most Secret and Confidential "is a fascinating and rewarding account."
Brooks, Studies 11 (Fall-Winter 2001) and NIPQ 18.2/3, calls this an "exquisitely researched and documented book.... Although scholarly, [it] is engagingly written, and the subject will fascinate anyone who has an abiding interest in the role of intelligence in support of command and, indeed, the role of intelligence in shaping history."
Maffet, Meri W. "Open Secrets: Protecting the Identity of the CIA's Intelligence Gatherers in a First Amendment Society." Hastings Law Journal 32, no. 6 (Jul. 1981): 1723-1775.
Magagnini, Stephen. "An Inside Look at a CIA Secret War." Capitol Hill Blue, 31 Aug. 2000. [http://capitolhillblue.com]
Tony Poe talks (minimally) about the war in Laos. See also, Dick Gay, "Tony This and Tony That," CIRA Newsletter 28, no. 2 (Summer 2003): 30-35.
Magan, Clila, and Eytan Gilboa. "Communicating from Within the Shadows: The Israeli Security Agency and the Media." International Journal of Intelligence and CounterIntelligence 27, no. 3 (Fall 2014): 285-508.
"Beginning in the early 1990s, the ISA invested a great deal of effort into developing a communication response that was proportional to the challenges presented by critical events.This was manifested through media briefings, appointing a semi-formal spokesperson, issuing press releases, and creating a Website."
Magan, William. Middle Eastern Approaches: Experiences and Travels of an Intelligence Officer, 1939-1948. Wilby, Norwich: Michael Russell, 2001.
Magee, Aden C. "Countering Nontraditional HUMINT Collection Threats." International Journal of Intelligence and Counterintelligence 23, no. 3 (Fall 2010): 509-520.
"The CI community cannot assume that the intelligence collection efforts of nontraditional organizations can be effectively countered within the construct of current CI programs and processes."
Magee, Aden C. "Counterintelligence in Irregular Warfare: A Void in the Full-Spectrum Joint Force Capability." American Intelligence Journal 26, no. 2 (Winter 2008-2009): 54-60.
"Correcting the CI void in joint force capability is reliant on the realization that an adversarial HUMINT capability exists -- a capability for which it is the CI mission to counter."
Maggs, John. "Secrets Shanghaied: Warhead Design, Missile and Satellite Technology, Machine Tools -- You Name It, the Cox Committee Says China Stole It." National Journal, 29 May 1999, 1454-1461.
The Cox Committee report "builds a largely circumstantial but overwhelming case for the claim that China has gained crucial design information for all of the U.S. nuclear arsenal ... -- yet, the report sticks close to its mandate in avoiding sweeping judgments on the significance of these losses."
Magnan, Stephen W. "Are We Our Own Worst Enemy? Safeguarding Information Operations." Studies in Intelligence 9 (Summer 2000): 97-103.
Magner, Denise K. "At Rochester Institute, a Spectrum of Opinions on Links with the CIA." Chronicle of Higher Education, 10 Jul. 1991, A1, 11, 14.
Controversy erupts on campus over ties between the Rochester Institute of Technology and the CIA. RIT President Richard Rose's April-June sabbatical at the CIA seems to have been the spark. The discussion centers around the CIA's role in RIT's program in imaging science. See also, Jean A. Douthwright, "Rochester Institute of Technology: A CIA Subsidiary?" Covert Action Information Bulletin (Fall 1991): 4-9.
Magnuson, Stew. "Struggling Spy Satellite Agency Tries to Right Itself." National Defense, Jan. 2010. [http://www.nationaldefensemagazine.org]
NRO Director, retired Air Force Gen. Bruce Carlson, said at the Geo-Int conference that the agency "has work to do to regain the confidence of Congress.... Carlson said he had intimate knowledge of the failed process [of the development of the future imagery architecture], having served on the joint chiefs of staff as the director for force structure, resources and assessment in the early part of the decade when the program was being developed."
Maguire, Keith. "The Intelligence War in Northern Ireland." International Journal of Intelligence and Counterintelligence 4, no. 2 (Summer 1990): 145-165.
Return to M Table of Contents
Return to Alphabetical Table of Contents