Code name
This article needs additional citations for verification. (November 2009) |
Part of a series on |
Intelligence |
---|
![]() |
Phases of Intelligence |
Framework |
Areas of Intelligence |
|
Corporate sector |
People |
Culture |
A code name, codename, call sign, or cryptonym is a code word or name used, sometimes clandestinely, to refer to another name, word, project, or person. Code names are often used for military purposes, or in espionage. They may also be used in industrial counter-espionage to protect secret projects and the like from business rivals, or to give names to projects whose marketing name has not yet been determined. Another reason for the use of names and phrases in the military is that they transmit with a lower level of cumulative errors over a walkie-talkie or radio link than actual names.
Origins
Achaemenid Empire
The Achaemenid Empire under Darius I employed a network of spies called the King’s Eye or the King’s Ear.[1][2] These agents operated under anonymity, and “King’s Eye” was not a specific person but rather a code name for the intelligence network that reported directly to the king.[2]
Punic Wars
The Carthaginian general Hannibal Barca reportedly used coded references for his agents and informants in Rome and among allied territories.[3] Some sources suggest that key figures in his intelligence operations were identified using nicknames instead of real names to avoid detection by Roman counterintelligence.[3]
Rome
Julius Caesar used ciphers to encode messages and likely employed code names for key operatives.[4] His famous Caesar cipher (simple letter-shifting encryption) was used to disguise military commands.[4] He also referred to Marc Antony and other generals with shortened or altered names in correspondence to prevent interception from revealing strategic plans.[4]
Jewish code names in the Bible
During the Jewish revolts against Rome, leaders and messengers used symbolic or misleading names in communications.[5][6] The Dead Sea Scrolls reference figures such as the “Teacher of Righteousness” and the “Wicked Priest,” which may have functioned as code names to obscure real identities.[5][6]
Byzantine Empire
The Byzantine Empire’s intelligence agents, particularly under Emperor Justinian I, operated under codenames or titles rather than real identities.[7] Procopius suggests that spies within the Persian and Gothic courts were assigned allegorical names to protect them from discovery.[7]
Military origins
During
- Reference: Glossary of NamesU.S. Army in World War II– Washington Command Post: The Operations Division
- World War II Allied Operations[10]
- Abbreviations, Acronyms, Codewords, Terms Appearing in WW II Histories and Documents[11]
- Information from original files held at The National Archives (formerly The Public Record Office) which hold the publicly available records of central government for the UK
German code names
Ewen Montagu, a British Naval intelligence officer, discloses in Beyond Top Secret Ultra that during World War II, Nazi Germany habitually used ad hoc code names as nicknames which often openly revealed or strongly hinted at their content or function.
Some German code names:
- Golfplatz (German for "golf course") – Britain, employed by the Abwehr
- Samland – The United States (from Uncle Sam), employed by the Abwehr
- Heimdall (a god whose power was "to see for a hundred miles") – long-range radar
- SISinferred that the device used a single beam and from that determined, correctly, how it must work. A counter-system was quickly created which made Wotan useless.
- Operation Seelöwe (Sea-lion) – plans to invade Britain (lions being prominent in the coat of arms of the United Kingdom)
- Operation Barbarossa (Frederick Barbarossa) – plans to go east and invade the Soviet Union
Conversely,
Code names of other powers
Britain and the United States developed the security policy of assigning code names intended to give no such clues to the uninitiated. For example, the British counter measures against the
Although the word could stand for a menace to shipping (in this case, that of Japan), the American code name for the attack on the subtropical island of
Aircraft recognition reporting names
Although German and Italian aircraft were not given code names by their Allied opponents, in 1942, Captain Frank T. McCoy, an intelligence officer of the
The policy of recognition reporting names was continued into the
Code names were adopted by the following process. Aerial or space reconnaissance would note a new aircraft at a
Jet-powered aircraft received two-syllable names like
Military operations since Churchill
Throughout the Second World War, the British allocation practice favored one-word code names (
Winston Churchill was particular about the quality of code names. He insisted that code words, especially for dangerous operations, would be not overly grand nor petty nor common. One emotional goal he mentions is to never have to report to anyone that their son "was killed in an operation called 'Bunnyhug' or 'Ballyhoo'."[12]
Presently, British forces tend to use one-word names, presumably in keeping with their post-World War II policy of reserving single words for operations and two-word names for exercises. British operation code names are usually randomly generated by a computer and rarely reveal its components or any political implications unlike the American names (e.g., the 2003 invasion of Iraq was called "Operation Telic" compared to Americans' "Operation Iraqi Freedom", obviously chosen for propaganda rather than secrecy). Americans prefer two-word names, whereas the Canadians and Australians use either. The French military currently prefer names drawn from nature (such as colors or the names of animals), for instance Opération Daguet ("brocket deer") or Opération Baliste ("Triggerfish"). The CIA uses alphabetical prefixes to designate the part of the agency supporting an operation.
In many cases with the United States, the first word of the name has to do with the intent of the program. Programs with "have" as the first word, such as Have Blue for the stealth fighter development, are developmental programs, not meant to produce a production aircraft. Programs that start with Senior, such as Senior Trend for the F-117, are for aircraft in testing meant to enter production.[citation needed]
In the United States code names are commonly set entirely in upper case.[13] This is not done in other countries, though for the UK in British documents the code name is in upper case while operation is shortened to OP e.g., "Op. TELIC".
This presents an opportunity for a bit of public-relations (
Project code name
A project code name is a code name (usually a single word, short phrase or acronym) which is given to a
Project code names are typically used for several reasons:
- To uniquely identify the project within the organization. Code names are frequently chosen to be outside the normal business/domain jargon that the organization uses, in order to not conflict with established terminology.
- To assist with maintaining secrecy of the project against rival concerns. Some corporations routinely change project names in order to further confuse competitors.
- When the goal of the project is to develop one or more commercial products, use of a code name allows the eventual choice of product nomenclature (the name the product(s) are marketed and sold under) to be decoupled from the development effort. This is especially important when one project generates multiple products, or multiple projects are needed to produce a single product. This allows for subprojects to be given a separate identity from the main project.
- To decouple an early phase of a development effort (which may have failed) from a subsequent phase (which may be given a "fresh start") as a political tool.
- To prevent casual observers from concluding that a pre-release version is a new release of the product, thus helping reduce confusion.
Different organizations have different policies regarding the use and publication of project code names. Some companies take great pains to never discuss or disclose project code names outside of the company (other than with outside entities who have a need to know, and typically are bound with a
Notable code names
![]() |
Military
- Operation Anthropoid – assassination of top Nazi Reinhard Heydrichin Prague
- B-52 bombing campaign during the Vietnam War
- Operation Barbarossa – German invasion of the Soviet Union
- Operation Hotel Taj Mahal, Mumbai
- Harmandir Sahib in Amritsar, Punjab, India.
- Operation Market Garden – failed invasion of Germany (1944)
- Operation Morero – South African Special Forces sent to the Central African Republic to protect president François Bozizé.
- U.S. Naval Special Warfare Development Group.
- "Geronimo", the code name for Osama bin Laden during Operation Neptune's Spear
- "Geronimo", the code name for Osama bin Laden during
- Operation Desert Storm – The US code name of the airland conflict from 17 January 1991, through 11 April 1991 in Kuwait during the First Gulf War.
- Operation Overlord – Allied invasion of Normandy
- Operation Rolling Thunder – the sustained bombing campaign conducted against North Vietnam by the United States and South Vietnam
- Operation Sea Lion – the planned invasion of Britain by Nazi Germany which was never carried out
- Operation Shakti – (Pokhran-II) refers to the series of five nuclear bomb test explosions conducted by India at the Indian Army's PokhranTest Range in May 1998. It was initiated with the detonation of one fusion and three fission bombs.
- Operation Torch – British-American invasion of North Africa in 1942
- nuclear weapons program during World War II
- MKULTRA– CIA project (an attempt at mind control technology & technique)
- Pokhran-I), was an assigned code name of India's first nuclear weapon explosion, which took place on 18 May 1974. The device was detonated by the Indian Army in the long-constructed army base, PokhranTest Range. It was also the first confirmed nuclear test by a nation outside the five permanent members of the United Nations Security Council.
- Project-706 (with Chagai-I and Chagai-II) – an early Pakistani secret code name for its nuclear weapons programme during the Cold War
- Tank – originally a code name adopted in 1915 by the British government for the first tracked armoured vehicles, which were then under development
- Tube Alloys – British nuclear program
- USSR
- SVO, euphemism for 2022 Russian invasion of Ukraine
Commercial
- 90 nm generations under the K8 micro-architecture after the name of cities around the world. For the CPUs under the Phenom brand, the names of stars were used as code names. For Opteron server CPUs and platforms, cities related to the Ferrari Formula One teamwere used. Mobile platforms are named after birds (except for Puma). For example:
- Single-core Athlon 64 FX: Newcastle, Venice, San Diego and Lima
- Dual-core Athlon 64 FX: Manchester, Toledo, Windsor and Brisbane
- Phenom CPUs: Agena (Lambda Orionis), Rana (Delta Eridani), Regor (Gamma Velorum)
- Opteron CPUs: Barcelona, Shanghai, São Paulo, Istanbul
- Server platforms: Catalunya, Fiorano, Maranello
- Mobile CPUs: Griffin, Lion, Swift
- Mobile platforms: Kite, Puma, Shrike, Eagle
- Single-core
- 10.8).[14]Other former code names include:
- Composers, such as Gershwin, after George Gershwin.
- Women's names, e.g. Jennifer (rumored for the Macintosh IIx), and Lisa.
- Varieties of apples, including Cortland for the Apple IIGS, and Macintosh (from McIntosh).
- Carl Sagan, which was used for the two lawsuits against Applerelated to that usage, and lost both, reaching an out-of-court settlement with the company.
- Composers, such as
- Intel often names CPU projects after rivers in the American West, particularly in the state of Oregon (where most of Intel's CPU projects are designed). Examples include Willamette, Deschutes, Yamhill, Tualatin, and Clackamas. See List of Intel codenames.
- Microsoft often names projects (in particular, versions of the Microsoft Windows operating systems) after place names. Examples include Chicago (Windows 95), Daytona (Windows NT 3.5), Memphis (Windows 98), Whistler (Windows XP) and Longhorn (Windows Vista).
- For a period of time, Mozilla Firefoxbrowser:
- Firefox 2.0: Bon Echo
- Firefox 3.0: Gran Paradiso
- Firefox 3.5: Shiretoko
- Firefox 3.6: Namoroka
- Firefox 4.0: Tumucumaque
- Firefox pre-beta: Aurora
- Firefox trunk builds: Nightly
- Nintendo often uses code names for new consoles. The best-known is that of Wii, which was code-named Revolution for over a year. Others include the GameCube's code name of Dolphin, the Game Boy Advance's code name of Atlantis, the Nintendo 64 as Project Reality, the DS code name Project Nitro, the Game Boy Micro code name Oxygen, the Wii U code name Project Cafe, and the Switch as NX.
- Return of the Jedi was code-named "Blue Harvest" while in production and principal photography. This was reportedly to prevent disruption by fans and the media as well as to avoid price gouging by local merchants and vendors.
- The Chamber of Secrets sequel of the Harry Potter film series was code-named "Incident of 57th Street" to disguise the production from its increasingly rabid fanbase, who would seek out filming locations and disrupt production.
See also
- List of computer technology code names
- CIA cryptonyms
- Code word (figure of speech)
- List of U.S. Department of Defense and partner code names
- List of Microsoft codenames
- Military Operations listed by code name
- Rainbow Codes
- NATO reporting name
- Pseudonym, the term for a code name when applied to a single person
- Secret Service codename
- Sensitive Compartmented Information
- Working title
References
- ^ "Herodotus, The Histories, Book 1, chapter 1, section 0". www.perseus.tufts.edu. Retrieved 2025-03-06.
- ^ a b "The Eyes and Ears of the King". A dead man fell from the sky... 2010-01-09. Retrieved 2025-03-06.
- ^ a b "Titus Livius (Livy), The History of Rome, Book 21, chapter 30". www.perseus.tufts.edu. Retrieved 2025-03-06.
- ^ ISBN 978-0-486-83023-0.
- ^ a b "Wicked Priest | Encyclopedia.com". www.encyclopedia.com. Retrieved 2025-03-06.
- ^ a b Wacholder, Ben Zion. "Who Is the Teacher of Righteousness?". The BAS Library. Retrieved 2025-03-06.
- ^ ISBN 978-1-01-943447-5.
- S2CID 153643351.
- ^ "Glossary of Code Names". www.army.mil. Archived from the original on 16 October 2007. Retrieved 27 March 2018.
- ^ "WORLD WAR II ALLIED CODE NAMES". Archived from the original on 2016-03-04. Retrieved 2005-05-02.
- ^ "HyperWar: Glossary of Abbreviations, Acronyms, Codewords, Terms of WWII". www.ibiblio.org. Archived from the original on 1 May 2018. Retrieved 27 March 2018.
- ISBN 9781135199296.
- Mary Ferrell Foundation. Archivedfrom the original on 2023-02-07. Retrieved 2023-02-07.
- ^ "OS X Mountain Lion – Move your Mac even further ahead". Apple. Archived from the original on 2002-08-29. Retrieved 2012-11-10.
External links
- ISBN 978-1-58642-083-3.
- Gehrs-Pahl, Andreas; Parsch, Andreas (4 October 2006). "Code Names for U.S. Military Projects and Operations". www.designation-systems.net. Retrieved 25 April 2020.
- Code Names: A Look Behind Secret U.S. Military Plans in the Middle East, Africa and at Home – Broadcast on Democracy Now! January 27, 2005.
- Sieminski, Gregory C. (Autumn 1995). "The Art of Naming Operations" (PDF). PARAMETERS, US Army War College Quarterly. XXV (3). from the original on 7 June 2010. Retrieved 25 April 2020.