Mari - Marko


Marinos, Themistocles. Tr., Petros Ladas. Harling Mission--1942: The Gorgopotamos Operation. Athens: Papazisis Publications, 1993.

Surveillant 3.4/5 identifies this book as an "account of the destruction of the Gorgopotamos Bridge in Greece in WWII, one of the key railway bridges, northwest of Athens, used by Rommel to supply troops on the African front." Although this book is about a "single special operation," Potts, FILS 12.6, sees that operation as "one of the most effective and significant of its kind." The book "offers much practical insight into wartime resistance in Greece," and is to be "highly commended" for its "broad and balanced view."

[OtherCountries/Greece/WWII; UK/WWII/Med]

Marion, Pierre. La Mission Impossible: A la tête des Services Secrets. Paris: Calmann-Levy, 1991.

Mark, Eduard. "The OSS in Romania, 1944-45: An Intelligence Operation of the Early Cold War." Intelligence and National Security 9, no. 2 (Apr. 1994): 320-344.

Wisner's "first priority was to establish 'the intentions of the Soviet Union regarding Romania'.... The vaunted 'Bishop traffic' ... consisted of fabrications, ambitious but crude.... The best that can be said of the 'Bishop traffic' is that it met with little acceptance outside of the American legation in Bucharest. Even there its influence should not be exaggerated.... Probably the most immediately [?useful] information from Bucharest was the German order of battle information that Madison and Roberts obtained from Soviet headquarters through a Romanian intermediary.... In sum, OSS Bucharest was an indifferently conducted operation in difficult circumstances, which none the less produced some useful if unspectacular[] information."

[OtherCountries/Romania; WWII/OSS/OtherOps][c]

Mark, Eduard. "Venona's Source 19 and the 'Trident' Conference of May 1943: Diplomacy or Espionage." Intelligence and National Security 13, no. 2 (Summer 1998): 1-31.

The author carefully builds a case that cryptonym 19 in Venona message No. 812 refers to Harry Hopkins. He does not, however, conclude that this means Hopkins was either a spy or an unwitting agent of influence. In fact, Mark leans toward a Sudoplatovian explanation that Hopkins dealt with Soviet officials on instruction of the President, but concludes that this single message does not answer the question of the nature of Hopkins' contacts with Soviet intelligence.


Mark, Eduard. "Who Was 'Venona's' 'Ales'? Cryptanalysis and the Hiss Case." Intelligence and National Security 18, no. 3 (Autumn 2003): 45-72.

The author effectively refutes John Lowenthal, "Venona and Alger Hiss," Intelligence and National Security 15, no. 3 (Autumn 2000): 98-130, who argues that the Venona team "employed false premises and flawed comparative logic to reach the desired conclusion that Alger Hiss was the spy Ales." Mark concludes that Lowenthal's reading of Venona Cable No. 1822 is incorrect and suggests that Cable No. 195 from Moscow to New York adds further support to the case against Hiss.


Markham, James M.

1. "Patrols in Germany: Postwar Vestige." New York Times, 29 Mar. 1985.

2. "Soviet Lets Bonn Aides Peek into Truck." New York Times, 23 Jul. 1984.

3. "The West Germans Stop Soviet Truck." New York Times, 21 Jul. 1984.


Markle, Donald E. Spies and Spy Masters of the Civil War. New York: Hippocrene, 1994. 1995 [pb]. Rev. & exp. ed. New York: Hippocrene, 2004.

According to Surveillant 3.4/5, this is "one of the most comprehensive treatments of Civil War spies..., covering the entire history of the war and the espionage activities by both Union and Confederate spies." Surveillant 4.4/5 adds that Markle gives "special focus" to women spies, and includes an appendix listing 432 Civil War spies. Acknowledging the 2004 edition, Kruh, Cryptologia 30.3 (Jul.-Sep. 2006), notes that the author has added several new chapters to this "comprehensive guide" to Civil War espionage on both sides.

[CivWar/Overviews & Women/Conf & Union][c]

Markle Foundation Task Force on National Security in the Information Age. Nation At Risk: Policy Makers Need Better Information to Protect the Country. Mar. 2009. []

From "Executive Summary": "[W]e remain vulnerable to terrorist attack and emerging national security threats because we have not adequately improved our ability to know what we know about these threats.... To improve decision making, the new administration needs to take immediate steps to improve information sharing.... At the same time, civil liberties are at risk because we don't have the government-wide policies in place to protect them as intelligence collection has expanded."

Siobhan Gorman, "Group Finds Intelligence Gap Persists," Wall Street Journal, 10 Mar. 2009, quotes outgoing DNI Mike McConnell as saying that "the group's advice is similar to what he told his successor, Dennis Blair. 'It was my recommendation that he make [intelligence sharing] one of his top priorities,' said Mr. McConnell, who praised the task force's efforts to focus attention on the issue."

[GenPostCW/00s/Gen; Reform/00s/09]

Markoff, John. "C.I.A.'s Artistic Enigma Yields All but Final Clue." New York Times, 16 Jun. 1999. []

Jim Gillogly, a Southern California computer scientist, has broken 768 of the 865 characters etched into Jim Sanborn's Kryptos sculpture dedicated at the CIA in October 1990. The three sections uncovered "include a poetic phrase, a reference to a point near the C.I.A.'s headquarters in Langley, Va. (with the enticing passage, 'Who knows the exact location? Only WW'), and an excerpt from an account of the opening of King Tut's tomb in 1922."


Markoff, John. "C.I.A. to Nurture Companies Dealing in High Technology." New York Times, 29 Sep. 1999. []

The CIA's new venture capital company "will be headed by Gilman Louie, an executive in the Hasbro toy company's online business group.... In-Q-It is being financed with $28 million appropriated last year by Congress as part of the C.I.A.'s budget."


Markoff, John. "A Mysterious Component Roils Microsoft." New York Times, 4 Sep. 1999. []

Andrew Fernandes, chief scientist of Cryptonym Corporation, a Canadian software firm, "dissecting a piece of Microsoft security software, made an unexpected find: an element in the Windows operating system labeled 'NSAKey.' When his discovery was made known on his company's Web site, it set off a firestorm of Orwellian visions in Internet discussion groups." See also, John Schwartz, "Microsoft Denies NSA Has Keys To Windows," Washington Post, 4 Sep. 1999, E1.


Markoff, John. "New Center Will Combat Computer Security Threats: U.S. and Financial Concerns in Joint Effort." New York Times, 1 Oct. 1999. []

The Treasury Department announced on 1 October 1999 "that the Federal Government and the financial services industry have established an information clearinghouse to combat threats to computer security and vulnerabilities in computer systems. The center, which will be managed exclusively by private industry, will be known as the Financial Services Information Sharing and Analysis Center."


Markoff, John. "Questions Raised for Phone Giants in Spy Data Furor." New York Times, 13 May 2006. []

With the exception of Qwest, the nation's fourth-largest phone company, the big phone companies -- AT&T, BellSouth and Verizon -- complied with an effort by the NSA "to build a vast database of calling records, without warrants, to increase its surveillance capabilities after the Sept. 11 attacks." The database reportedly assembled by NSA "from calling records has dozens of fields of information, including called and calling numbers and the duration of calls, but nothing related to the substance of the calls. But it could permit what intelligence analysts and commercial data miners refer to as 'link analysis,' a statistical technique for investigators to identify calling patterns in a seemingly impenetrable mountain of digital data."


Markoff, John. "U.S. Drafting Plan for Computer Monitoring System." New York Times, 28 Jul. 1999. []

"The Clinton Administration has developed a plan for an extensive computer monitoring system, overseen by the Federal Bureau of Investigation, to protect the nation's crucial data networks from intruders.... As part of the plan, networks of thousands of software monitoring programs would constantly track computer activities looking for indications of computer network intrusions and other illegal acts. The plan calls for the creation of a Federal Intrusion Detection Network, or Fidnet, and specifies that the data it collects will be gathered at the National Infrastructure Protection Center, an interagency task force housed at the Federal Bureau of Investigation."


Markon, Jerry [Washington Post].

Return to M Table of Contents

Return to Alphabetical Table of Contents