Code name

Last updated

A code name, codename, call sign or cryptonym is a code word or name used, sometimes clandestinely, to refer to another name, word, project, or person. Code names are often used for military purposes, or in espionage. They may also be used in industrial counter-espionage to protect secret projects and the like from business rivals, or to give names to projects whose marketing name has not yet been determined. Another reason for the use of names and phrases in the military is that they transmit with a lower level of cumulative errors over a walkie-talkie or radio link than actual names.

Contents

Military origins

During World War I, names common to the Allies referring to nations, cities, geographical features, military units, military operations, diplomatic meetings, places, and individual persons were agreed upon, adapting pre-war naming procedures in use by the governments concerned. In the British case names were administered and controlled by the Inter Services Security Board (ISSB) staffed by the War Office. [1] This procedure was coordinated with the United States when it entered the war. Random lists of names were issued to users in alphabetical blocks of ten words and were selected as required. Words became available for re-use after six months and unused allocations could be reassigned at discretion and according to need. Judicious selection from the available allocation could result in clever meanings and result in an aptronym or backronym, although policy was to select words that had no obviously deducible connection with what they were supposed to be concealing. Those for the major conference meetings had a partial naming sequence referring to devices or instruments which had a number as part of their meaning, e.g., the third meeting was "TRIDENT". Joseph Stalin, whose last name means "man of steel", was given the name "GLYPTIC", meaning "an image carved out of stone".

German code names

Ewen Montagu, a British Naval intelligence officer, discloses in Beyond Top Secret Ultra that during World War II, Nazi Germany habitually used ad hoc code names as nicknames which often openly revealed or strongly hinted at their content or function.

Some German code names:

Conversely, Operation Wacht am Rhein (Watch on the Rhine) was deliberately named to suggest the opposite of its purpose  a defensive "watch" as opposed to a massive blitzkrieg operation, just as was Operation Weserübung (Weser-exercise), which signified the plans to invade Norway and Denmark in April 1940.

Code names of other powers

Britain and the United States developed the security policy of assigning code names intended to give no such clues to the uninitiated. For example, the British counter measures against the V-2 was called Operation Crossbow . The atomic bomb project centered in New Mexico was called the Manhattan Project, derived from the Manhattan Engineer District which managed the program. The code name for the American A-12 / SR-71 spy plane project, producing the fastest, highest-flying aircraft in the world, was Oxcart. The American group that planned that country's first ICBM was called the Teapot Committee.

Although the word could stand for a menace to shipping (in this case, that of Japan), the American code name for the attack on the subtropical island of Okinawa in World War II was Operation Iceberg . The Soviet Union's project to base missiles in Cuba was named Operation Anadyr after their closest bomber base to the US (just across the Bering Strait from Nome, Alaska). The names of colors are generally avoided in American practice to avoid confusion with meteorological reporting practices. Britain, in contrast, made deliberately non-meaningful use of them, through the system of rainbow codes.

Aircraft recognition reporting names

Although German and Italian aircraft were not given code names by their Allied opponents, in 1942, Captain Frank T. McCoy, an intelligence officer of the USAAF, invented a system for the identification of Japanese military aircraft. Initially using short, "hillbilly" boys' names such as "Pete", "Jake", and "Rufe", the system was later extended to include girls' names and names of trees and birds, and became widely used by the Allies throughout the Pacific theater of war. This type of naming scheme differs from the other use of code names in that it does not have to be kept secret, but is a means of identification where the official nomenclature is unknown or uncertain.

The policy of recognition reporting names was continued into the Cold War for Soviet, other Warsaw Pact, and Communist Chinese aircraft. Although this was started by the Air Standards Co-ordinating Committee (ASCC) formed by the United States, United Kingdom, Canada, Australia, and New Zealand, it was extended throughout NATO as the NATO reporting name for aircraft, rockets and missiles. These names were considered by the Soviets as being like a nickname given to one's unit by the opponents in a battle. The Soviets did not like the Sukhoi Su-25 getting the code name "Frogfoot". [ citation needed ] However, some names were appropriate, such as "Condor" for the Antonov An-124, or, most famously, "Fulcrum" for the Mikoyan MiG-29, which had a "pivotal" role in Soviet air-strategy.

Code names were adopted by the following process. Aerial or space reconnaissance would note a new aircraft at a Warsaw Pact airbase. The intelligence units would then assign it a code name consisting of the official abbreviation of the base, then a letter, for example, "Ram-A", signifying an aircraft sighted at Ramenskoye Airport. Missiles were given designations like "TT-5", for the fifth rocket seen at Tyura-Tam. When more information resulted in knowing a bit about what a missile was used for, it would be given a designation like "SS-6", for the sixth surface-to-surface missile design reported. Finally, when either an aircraft or a missile was able to be photographed with a hand-held camera, instead of a reconnaissance aircraft, it was given a name like "Flanker" or "Scud"  always an English word, as international pilots worldwide are required to learn English. The Soviet manufacturer or designation – which may be mistakenly inferred by NATO – has nothing to do with it.

Jet-powered aircraft received two-syllable names like Foxbat, while propeller aircraft were designated with short names like Bull. Fighter names began with an "F", bombers with a "B", cargo aircraft with a "C". Training aircraft and reconnaissance aircraft were grouped under the word "miscellaneous", and received "M". The same convention applies to missiles, with air-launched ground attack missiles beginning with the letter "K" and surface-to-surface missiles (ranging from intercontinental ballistic missiles to antitank rockets) with the letter "S", air-to-air missiles "A", and surface-to-air missiles "G".

Military operations since Churchill

Throughout the Second World War, the British allocation practice favored one-word code names (Jubilee, Frankton). That of the Americans favored longer compound words, although the name Overlord was personally chosen by Winston Churchill himself. Many examples of both types can be cited, as can exceptions.

Winston Churchill was particular about the quality of code names. He insisted that code words, especially for dangerous operations, would be not overly grand nor petty nor common. One emotional goal he mentions is to never have to report to anyone that their son "was killed in an operation called 'Bunnyhug' or 'Ballyhoo'." [5]

Presently, British forces tend to use one-word names, presumably in keeping with their post-World War II policy of reserving single words for operations and two-word names for exercises. British operation code names are usually randomly generated by a computer and rarely reveal its components or any political implications unlike the American names (e.g., the 2003 invasion of Iraq was called "Operation Telic" compared to Americans' "Operation Iraqi Freedom", obviously chosen for propaganda rather than secrecy). Americans prefer two-word names, whereas the Canadians and Australians use either. The French military currently prefer names drawn from nature (such as colors or the names of animals), for instance Opération Daguet ("brocket deer") or Opération Baliste ("Triggerfish"). The CIA uses alphabetical prefixes to designate the part of the agency supporting an operation.

In many cases with the United States, the first word of the name has to do with the intent of the program. Programs with "have" as the first word, such as Have Blue for the stealth fighter development, are developmental programs, not meant to produce a production aircraft. Programs that start with Senior, such as Senior Trend for the F-117, are for aircraft in testing meant to enter production.[ citation needed ]

In the United States code names are commonly set entirely in upper case. [6] This is not done in other countries, though for the UK in British documents the code name is in upper case while operation is shortened to OP e.g., "Op. TELIC".

This presents an opportunity for a bit of public-relations (Operation Just Cause), or for controversy over the naming choice (Operation Infinite Justice, renamed Operation Enduring Freedom). Computers are now used to aid in the selection. And further, there is a distinction between the secret names during former wars and the published names of recent ones.

Project code name

A project code name is a code name (usually a single word, short phrase or acronym) which is given to a project being developed by industry, academia, government, and other concerns.

Project code names are typically used for several reasons:

Different organizations have different policies regarding the use and publication of project code names. Some companies take great pains to never discuss or disclose project code names outside of the company (other than with outside entities who have a need to know, and typically are bound with a non-disclosure agreement). Other companies never use them in official or formal communications, but widely disseminate project code names through informal channels (often in an attempt to create a marketing buzz for the project). Still others (such as Microsoft) discuss code names publicly, and routinely use project code names on beta releases and such, but remove them from final product(s). In the case of Windows 95, the code name "CHICAGO" was left embedded in the INF File structure and remained required through Windows Me. At the other end of the spectrum, Apple includes the project code names for Mac OS X as part of the official name of the final product, a practice that was started in 2002 with Mac OS X v10.2 "Jaguar". Google and the AOSP also used this for their Android operating system until 2013, where the code name was different from the release name.

Notable code names

Military

Commercial

See also

Related Research Articles

<span class="mw-page-title-main">Cuban Missile Crisis</span> 1962 confrontation between the US and USSR

The Cuban Missile Crisis, also known as the October Crisis in Cuba, or the Caribbean Crisis, was a 13-day confrontation between the governments of the United States and the Soviet Union, when American deployments of nuclear missiles in Italy and Turkey were matched by Soviet deployments of nuclear missiles in Cuba. The crisis lasted from 16 to 28 October 1962. The confrontation is widely considered the closest the Cold War came to escalating into full-scale nuclear war.

<span class="mw-page-title-main">Smiling Buddha</span> Indias first successful nuclear weapons test (1974)

Operation Smiling Buddha or Operation Happy Krishna was the assigned code name of India's first successful nuclear bomb test on 18 May 1974. The bomb was detonated on the army base Pokhran Test Range (PTR), in Rajasthan, by the Indian Army under the supervision of several key Indian generals.

<span class="mw-page-title-main">Lockheed U-2</span> American single-jet-engined, subsonic, ultra-high-altitude reconnaissance aircraft

The Lockheed U-2, nicknamed "Dragon Lady", is an American single-engine, high altitude reconnaissance aircraft operated from the 1950s by the United States Air Force (USAF) and the Central Intelligence Agency (CIA). It provides day and night, high-altitude, all-weather intelligence gathering.

CIA cryptonyms are code names or code words used by the U.S. Central Intelligence Agency (CIA) to refer to projects, operations, persons, agencies, etc.

<span class="mw-page-title-main">Cold War espionage</span> Aspect of the Cold War

Cold War espionage describes the intelligence gathering activities during the Cold War between the Western allies and the Eastern Bloc. Both relied on a wide variety of military and civilian agencies in this pursuit.

The Venona project was a United States counterintelligence program initiated during World War II by the United States Army's Signal Intelligence Service and later absorbed by the National Security Agency (NSA), that ran from February 1, 1943, until October 1, 1980. It was intended to decrypt messages transmitted by the intelligence agencies of the Soviet Union. Initiated when the Soviet Union was an ally of the US, the program continued during the Cold War, when the Soviet Union was considered an enemy.

<span class="mw-page-title-main">Operation Paperclip</span> Secret post-WWII United States program

Operation Paperclip was a secret United States intelligence program in which more than 1,600 German scientists, engineers, and technicians were taken from the former Nazi Germany to the U.S. for government employment after the end of World War II in Europe, between 1945 and 1959. Conducted by the Joint Intelligence Objectives Agency (JIOA), it was largely carried out by special agents of the U.S. Army's Counterintelligence Corps (CIC). Many of these Germans were former members and some were former leaders of the Nazi Party.

SSE2 is one of the Intel SIMD processor supplementary instruction sets introduced by Intel with the initial version of the Pentium 4 in 2000. It extends the earlier SSE instruction set, and is intended to fully replace MMX. Intel extended SSE2 to create SSE3 in 2004. SSE2 added 144 new instructions to SSE, which has 70 instructions. Competing chip-maker AMD added support for SSE2 with the introduction of their Opteron and Athlon 64 ranges of AMD64 64-bit CPUs in 2003.

<span class="mw-page-title-main">Technology during World War II</span> Role and use of available technology in World War II

Technology played a significant role in World War II. Some of the technologies used during the war were developed during the interwar years of the 1920s and 1930s, much was developed in response to needs and lessons learned during the war, while others were beginning to be developed as the war ended. Many wars have had major effects on the technologies that we use in our daily lives, but World War II had the greatest effect on the technology and devices that are used today. Technology also played a greater role in the conduct of World War II than in any other war in history, and had a critical role in its outcome.

<span class="mw-page-title-main">Nuclear arms race</span> Part of the Post-WWII era and the Cold War

The nuclear arms race was an arms race competition for supremacy in nuclear warfare between the United States, the Soviet Union, and their respective allies during the Cold War. During this same period, in addition to the American and Soviet nuclear stockpiles, other countries developed nuclear weapons, though none engaged in warhead production on nearly the same scale as the two superpowers.

<i>Firefox</i> (novel) 1977 thriller novel written by Craig Thomas

Firefox is a thriller novel written by Craig Thomas and published in 1977. The Cold War plot involves an attempt by the CIA and MI6 to steal a highly advanced experimental Soviet fighter aircraft. The chief protagonist is fighter pilot turned spy Mitchell Gant. The book was subject to a 1982 film adaptation produced and directed by Clint Eastwood who also played the role of Gant in the film.

Mitchell Gant is a fictional character in a series of books written by Craig Thomas. His first appearance occurs in the 1977 novel Firefox as a US Air Force major that steals a Russian MiG-31 Firefox fighter aircraft prototype. The prototype uses experimental interfaces between pilot and plane to allow for "thought-activated" flying and combat solutions. Gant, however, has to think in Russian to enable the technology to work.

The Rainbow Codes were a series of code names used to disguise the nature of various British military research projects. They were mainly used by the Ministry of Supply from the end of the Second World War until 1958, when the ministry was broken up and its functions distributed among the forces. The codes were replaced by an alphanumeric code system.

<span class="mw-page-title-main">Operation Most III</span> WW2 Anglo-Polish intelligence operation

Operation Most III or Operation Wildhorn III was a World War II operation in which Poland's Armia Krajowa provided the Allies with crucial intelligence on the German V-2 rocket.

<span class="mw-page-title-main">Swiftfox</span> Discontinued web browser based on Mozilla Firefox

Swiftfox was a web browser based on Mozilla Firefox. It was available for Linux platforms and distributed by Jason Halme. Swiftfox was a set of builds of Firefox optimized for different Intel and AMD microprocessors. Swiftfox was freely downloadable with open source code and proprietary binaries. Firefox extensions and plugins were compatible with Swiftfox, with notable exceptions. The name Swiftfox comes from the animal swift fox. Swiftfox differs from Firefox by a limited number of changes, and builds for different processors. Swiftfox was discontinued at some point prior to April 2017, and the project homepage now redirects to the creator's private Twitter account.

<span class="mw-page-title-main">Atomic tourism</span> Tourism involving travel to nuclear sites

Atomic tourism or nuclear tourism is a recent form of tourism in which visitors learn about the Atomic Age by traveling to significant sites in atomic history such as nuclear test reactors, museums with nuclear weapon artifacts, delivery vehicles, sites where atomic weapons were detonated, and nuclear power plants.

Reverse engineering is a process or method through which one attempts to understand through deductive reasoning how a previously made device, process, system, or piece of software accomplishes a task with very little insight into exactly how it does so. Depending on the system under consideration and the technologies employed, the knowledge gained during reverse engineering can help with repurposing obsolete objects, doing security analysis, or learning how something works.

Direct2D is a 2D vector graphics application programming interface (API) designed by Microsoft and implemented in Windows 10, Windows 8, Windows 7 and Windows Server 2008 R2, and also Windows Vista and Windows Server 2008.

References

  1. Webster, Graham (2013). "History of the British Inter-Services Security Board and the Allocation of Code-Names in the Second World War". Intelligence and National Security. 29 (5): 1–31. doi:10.1080/02684527.2013.846731. S2CID   153643351.
  2. "Glossary of Code Names". www.army.mil. Archived from the original on 16 October 2007. Retrieved 27 March 2018.
  3. "WORLD WAR II ALLIED CODE NAMES". Archived from the original on 2016-03-04. Retrieved 2005-05-02.
  4. "HyperWar: Glossary of Abbreviations, Acronyms, Codewords, Terms of WWII". www.ibiblio.org. Archived from the original on 1 May 2018. Retrieved 27 March 2018.
  5. Jablonsky, David (2013-09-13). Churchill, the Great Game and Total War. Routledge. p. 95. ISBN   9781135199296.
  6. "CIA Cryptonyms". Mary Ferrell Foundation . Archived from the original on 2023-02-07. Retrieved 2023-02-07.
  7. "OS X Mountain Lion – Move your Mac even further ahead". Apple. Archived from the original on 2002-08-29. Retrieved 2012-11-10.