Code name
Encyclopedia
A code name or cryptonym is a word or name used clandestinely to refer to another name or word. Code names are often used for military
Military
A military is an organization authorized by its greater society to use lethal force, usually including use of weapons, in defending its country by combating actual or perceived threats. The military may have additional functions of use to its greater society, such as advancing a political agenda e.g...

 purposes, or in espionage
Espionage
Espionage or spying involves an individual obtaining information that is considered secret or confidential without the permission of the holder of the information. Espionage is inherently clandestine, lest the legitimate holder of the information change plans or take other countermeasures once it...

. They may also be used in industry
Industry
Industry refers to the production of an economic good or service within an economy.-Industrial sectors:There are four key industrial economic sectors: the primary sector, largely raw material extraction industries such as mining and farming; the secondary sector, involving refining, construction,...

 to protect secret projects and the like from business rivals.

Military origins

In the First World War, code names common to the Allies
Allies
In everyday English usage, allies are people, groups, or nations that have joined together in an association for mutual benefit or to achieve some common purpose, whether or not explicit agreement has been worked out between them...

 referring to nations, cities, geographical features, military units, military operations, diplomatic meetings, places, and individual persons were agreed upon, adapting pre-war naming procedures in use by the governments concerned. In the British case code names were administered and controlled by ISSB (The Inter-Services Security Board) staffed by the War Office
War Office
The War Office was a department of the British Government, responsible for the administration of the British Army between the 17th century and 1964, when its functions were transferred to the Ministry of Defence...

 with the word list generated and randomised by GC&CS (later GCHQ). This procedure was coordinated with the USA when America entered the war. Random lists of code names were issued to users in alphabetical blocks of ten words and were selected as required. Code words became available for re-use after six months and unused allocations could be re-assigned at discretion and according to need. Capricious selection from the available allocation could result in clever meanings and result in an aptronym
Aptronym
An aptronym is a name aptly suited to its owner. Fictional examples of aptronyms include Mr. Talkative and Mr. Worldly Wiseman in John Bunyan's The Pilgrim's Progress , Truman Burbank , the lead character in the 1998 film The Truman Show, the principal cast of the Mr...

 or backronym
Backronym
A backronym or bacronym is a phrase constructed purposely, such that an acronym can be formed to a specific desired word. Backronyms may be invented with serious or humorous intent, or may be a type of false or folk etymology....

 although policy was to select words that had no obviously deducible connection with what they were supposed to be concealing. Those for the major conference meetings had a partial naming sequence referring to devices or instruments which had an ordinal number
Ordinal number
In set theory, an ordinal number, or just ordinal, is the order type of a well-ordered set. They are usually identified with hereditarily transitive sets. Ordinals are an extension of the natural numbers different from integers and from cardinals...

 as part of their meaning, e.g. the third meeting was "TRIDENT." Joseph Stalin
Joseph Stalin
Joseph Vissarionovich Stalin was the Premier of the Soviet Union from 6 May 1941 to 5 March 1953. He was among the Bolshevik revolutionaries who brought about the October Revolution and had held the position of first General Secretary of the Communist Party of the Soviet Union's Central Committee...

, whose last name means "man of steel", was given the code name "GLYPTIC," meaning "an image carved out of stone."
  • Reference: Glossary of Code Names from U.S. Army in World War II
    World War II
    World War II, or the Second World War , was a global conflict lasting from 1939 to 1945, involving most of the world's nations—including all of the great powers—eventually forming two opposing military alliances: the Allies and the Axis...

     - Washington Command Post: The Operations Division
  • WWII Allied Operations
  • Abbreviations, Acronyms, Codewords, Terms Appearing in WW II Histories and Documents
  • Information from original files held at The National Archives formerly The Public Record Office
    Public Record Office
    The Public Record Office of the United Kingdom is one of the three organisations that make up the National Archives...

     which hold the publicly available records of central government for the UK
    United Kingdom
    The United Kingdom of Great Britain and Northern IrelandIn the United Kingdom and Dependencies, other languages have been officially recognised as legitimate autochthonous languages under the European Charter for Regional or Minority Languages...


German code names

Ewen Montagu
Ewen Montagu
Captain The Hon. Ewen Edward Samuel Montagu, CBE, QC, DL, RNR was a British judge, writer and Naval intelligence officer....

, a British Naval intelligence officer, discloses in Beyond Top Secret Ultra that during World War II
World War II
World War II, or the Second World War , was a global conflict lasting from 1939 to 1945, involving most of the world's nations—including all of the great powers—eventually forming two opposing military alliances: the Allies and the Axis...

, Nazi Germany
Nazi Germany
Nazi Germany , also known as the Third Reich , but officially called German Reich from 1933 to 1943 and Greater German Reich from 26 June 1943 onward, is the name commonly used to refer to the state of Germany from 1933 to 1945, when it was a totalitarian dictatorship ruled by...

 habitually used ad hoc code names as nickname
Nickname
A nickname is "a usually familiar or humorous but sometimes pointed or cruel name given to a person or place, as a supposedly appropriate replacement for or addition to the proper name.", or a name similar in origin and pronunciation from the original name....

s which frequently openly revealed or strongly hinted at their content or function.

List of German code names:
  • Golfplatz (German: Golfcourse) — Britain - employed by the Abwehr
    Abwehr
    The Abwehr was a German military intelligence organisation from 1921 to 1944. The term Abwehr was used as a concession to Allied demands that Germany's post-World War I intelligence activities be for "defensive" purposes only...

  • Samland — The United States (From Uncle Sam
    Uncle Sam
    Uncle Sam is a common national personification of the American government originally used during the War of 1812. He is depicted as a stern elderly man with white hair and a goatee beard...

    ) - employed by the Abwehr
    Abwehr
    The Abwehr was a German military intelligence organisation from 1921 to 1944. The term Abwehr was used as a concession to Allied demands that Germany's post-World War I intelligence activities be for "defensive" purposes only...

  • Heimdall
    Heimdall
    In Norse mythology, Heimdallr is a god who possesses the resounding horn Gjallarhorn, owns the golden-maned horse Gulltoppr, has gold teeth, and is the son of Nine Mothers...

     (A god whose power was "to see for a hundred miles") — long range radar.
  • Wotan (one-eyed god) — Based on nothing more than this and the knowledge it was a radar system, R.V. Jones, a British scientist working for Air Intelligence
    RAF Intelligence
    Intelligence services in the Royal Air Force is delivered by Officers of the Royal Air Force Operations Support Intelligence Branch and Airmen from the Intelligence Analyst Trade and Intelligence Analyst Trade...

     of the British Air Ministry
    Air Ministry
    The Air Ministry was a department of the British Government with the responsibility of managing the affairs of the Royal Air Force, that existed from 1918 to 1964...

     and SIS
    Secret Intelligence Service
    The Secret Intelligence Service is responsible for supplying the British Government with foreign intelligence. Alongside the internal Security Service , the Government Communications Headquarters and the Defence Intelligence , it operates under the formal direction of the Joint Intelligence...

     assumed that it used a single beam and from that determined the system it would have to use. His shrewd assessment was exactly correct. A counter-system was quickly created which made Wotan useless.
  • Operation Seelöwe (Sealion) — Plans to invade Britain (The Royal Coat of Arms of England depicting three lions passant guardant).
  • Operation Barbarossa
    Operation Barbarossa
    Operation Barbarossa was the code name for Germany's invasion of the Soviet Union during World War II that began on 22 June 1941. Over 4.5 million troops of the Axis powers invaded the USSR along a front., the largest invasion in the history of warfare...

     (Frederick Barbarossa) — Plans to go east and invade the Soviet Union.


Conversely, Operation Wacht am Rhein (Watch on the Rhine) was deliberately named to suggest the opposite of its purpose - a defensive "watch" as opposed to a massive blitzkrieg
Blitzkrieg
For other uses of the word, see: Blitzkrieg Blitzkrieg is an anglicized word describing all-motorised force concentration of tanks, infantry, artillery, combat engineers and air power, concentrating overwhelming force at high speed to break through enemy lines, and, once the lines are broken,...

 operation, just as was Operation Weserübung
Operation Weserübung
Operation Weserübung was the code name for Germany's assault on Denmark and Norway during the Second World War and the opening operation of the Norwegian Campaign...

 (Weser-exercise), which signified the plans to invade Norway
Norway
Norway , officially the Kingdom of Norway, is a Nordic unitary constitutional monarchy whose territory comprises the western portion of the Scandinavian Peninsula, Jan Mayen, and the Arctic archipelago of Svalbard and Bouvet Island. Norway has a total area of and a population of about 4.9 million...

 and Denmark
Denmark
Denmark is a Scandinavian country in Northern Europe. The countries of Denmark and Greenland, as well as the Faroe Islands, constitute the Kingdom of Denmark . It is the southernmost of the Nordic countries, southwest of Sweden and south of Norway, and bordered to the south by Germany. Denmark...

 in April 1940.

By comparison as a result of the German practice and relative ease of deciphering some element of its content in the post War period the British Ministry of Supply adopted the Rainbow Codes
Rainbow Codes
The Rainbow Codes were a series of code names used to disguise the nature of various British military research projects. They were mainly used from after the Second World War until 1958, when they were replaced by an alphanumeric code system.-History:...

 system which randomly combined a color and a noun (from a list) to create the name for projects. Though memorable, the names were unrelated to content.

Code names of other powers

Britain and the United States developed the security policy of assigning code names intended to give no such clues to the uninitiated. For example, the British counter measures against the V-2
V-2 rocket
The V-2 rocket , technical name Aggregat-4 , was a ballistic missile that was developed at the beginning of the Second World War in Germany, specifically targeted at London and later Antwerp. The liquid-propellant rocket was the world's first long-range combat-ballistic missile and first known...

 was called Operation Crossbow
Operation Crossbow
Crossbow was the code name of the World War II campaign of Anglo-American "operations against all phases of the German long-range weapons programme—operations against research and development of the weapons, their manufacture, transportation and their launching sites, and against missiles in flight"...

. The atomic bomb
Nuclear weapon
A nuclear weapon is an explosive device that derives its destructive force from nuclear reactions, either fission or a combination of fission and fusion. Both reactions release vast quantities of energy from relatively small amounts of matter. The first fission bomb test released the same amount...

 project centered in New Mexico
New Mexico
New Mexico is a state located in the southwest and western regions of the United States. New Mexico is also usually considered one of the Mountain States. With a population density of 16 per square mile, New Mexico is the sixth-most sparsely inhabited U.S...

 was called the Manhattan Project
Manhattan Project
The Manhattan Project was a research and development program, led by the United States with participation from the United Kingdom and Canada, that produced the first atomic bomb during World War II. From 1942 to 1946, the project was under the direction of Major General Leslie Groves of the US Army...

, derived from the Manhattan Engineer District which managed the program. The code name for the American SR-71 spy plane project, producing the fastest, highest-flying aircraft in the world, was Oxcart. The American group that planned that country's first ICBM
Intercontinental ballistic missile
An intercontinental ballistic missile is a ballistic missile with a long range typically designed for nuclear weapons delivery...

 was called the Teapot Committee
Teapot Committee
The Strategic Missiles Evaluation Group, generally referred to by its codename as the Teapot Committee was a committee set up to evaluate strategic missiles of the U.S. Air Force.-Establishment:In October 1953, the Assistant Secretary of the U.S...

.

Although the word could stand for a menace to shipping (in this case, that of Japan), the American code name for the attack on the steamy jungle island of Okinawa in World War II was Operation Iceberg
Battle of Okinawa
The Battle of Okinawa, codenamed Operation Iceberg, was fought on the Ryukyu Islands of Okinawa and was the largest amphibious assault in the Pacific War of World War II. The 82-day-long battle lasted from early April until mid-June 1945...

. And the Russian code name for the project to base missiles in Cuba was that named after their closest bomber base to the US (just across the Bering Strait from Nome, Alaska), Operation Anadyr
Operation Anadyr
Operation Anadyr was the code name used by the Soviet Union for their Cold War secret operation of deploying ballistic missiles, medium-range bombers, and a division of mechanized infantry in Cuba to create the army group that would be able to prevent an invasion of the island by U.S. forces...

. The names of colors are generally avoided in American practice to avoid confusion with meteorological reporting practices. Britain, in contrast, made deliberately non-meaningful use of them, through the system of rainbow codes
Rainbow Codes
The Rainbow Codes were a series of code names used to disguise the nature of various British military research projects. They were mainly used from after the Second World War until 1958, when they were replaced by an alphanumeric code system.-History:...

.

Aircraft recognition reporting names

Although the names of the German and Italian aircraft were not given code names by their Allied opponents, in 1942, Captain Frank T. McCoy, an intelligence officer of the USAAF, invented a system for the identification of Japanese military aircraft. Initially using short "hillbilly
Hillbilly
Hillbilly is a term referring to certain people who dwell in rural, mountainous areas of the United States, primarily Appalachia but also the Ozarks. Owing to its strongly stereotypical connotations, the term is frequently considered derogatory, and so is usually offensive to those Americans of...

" boy's names such as "Pete
Mitsubishi F1M
-See also:-Bibliography:* Francillon, R.J. Japanese Aircraft of the Pacific War. London:Putnam, 1970. ISBN 370 00033 1.* Green, William. War Planes of the Second World War, Volume Six: Floatplanes. London: Macdonald & Co., Ltd., 1962....

", "Jake
Aichi E13A
-See also:-References:NotesBibliography* Dorr, Robert E. and Chris Bishop. Vietnam Air War Debrief. London: Aerospace Publishing, 1996. ISBN 1-874023-78-6....

" and "Rufe", the system was later extended to include girl's names and names of trees and birds, and became widely used by the Allies throughout the Pacific theater of war. This type of naming scheme differs from the other use of code names in that it doesn't have to be kept secret, but is a means of identification where the official nomenclature is unknown or uncertain.

The policy of recognition reporting names was continued into the Cold War
Cold War
The Cold War was the continuing state from roughly 1946 to 1991 of political conflict, military tension, proxy wars, and economic competition between the Communist World—primarily the Soviet Union and its satellite states and allies—and the powers of the Western world, primarily the United States...

 for Soviet, other Warsaw Pact
Warsaw Pact
The Warsaw Treaty Organization of Friendship, Cooperation, and Mutual Assistance , or more commonly referred to as the Warsaw Pact, was a mutual defense treaty subscribed to by eight communist states in Eastern Europe...

, and Communist Chinese aircraft. Although this was started by the Air Standards Co-ordinating Committee (ASCC) formed by the USA, UK, Canada, Australia and New Zealand, it was extended throughout NATO as the NATO reporting name
NATO reporting name
NATO reporting names are classified code names for military equipment of the Eastern Bloc...

 for aircraft, rockets and missiles. These names were considered by the Soviets as being like a nickname given to one's unit by the opponents in a battle, such as the US Marines were called by the Germans in France "Devil Dogs", which they appreciated as a feather in their cap. The Soviets did not like the Sukhoi Su-25
Sukhoi Su-25
The Sukhoi Su-25 is a single-seat, twin-engine jet aircraft developed in the Soviet Union by the Sukhoi Design Bureau. It was designed to provide close air support for the Soviet Ground Forces. The first prototype made its maiden flight on 22 February 1975...

 getting the code name "Frogfoot
Sukhoi Su-25
The Sukhoi Su-25 is a single-seat, twin-engine jet aircraft developed in the Soviet Union by the Sukhoi Design Bureau. It was designed to provide close air support for the Soviet Ground Forces. The first prototype made its maiden flight on 22 February 1975...

". However, some names were appropriate, such as "Condor" for the Antonov An-124
Antonov An-124
The Antonov An-124 Ruslan is a strategic airlift jet aircraft. It was designed by the Ukrainian SSR's Antonov design bureau, then part of the Soviet Union. It is the world's largest ever serially-manufactured cargo airplane and world's second largest operating cargo aircraft...

.

The sequence by which a code name was given is as follows: aerial or space reconnaissance would note a new aircraft at a Warsaw Pact airbase. The intelligence units would then assign it a code name consisting of the official abbreviation of the base, then a letter, for example, "Ram-A", signifying an aircraft sighted at Ramenskoye Airport
Ramenskoye
Ramenskoye is a town and the administrative center of Ramensky District of Moscow Oblast, Russia, located southeast of Moscow. Population: 69,000 ; 28,000 ....

. Missiles were given designations like "TT-5", for the fifth rocket seen at Tyura-Tam
Baikonur
Baikonur , formerly known as Leninsk, is a city in Kyzylorda Province of Kazakhstan, rented and administered by the Russian Federation. It was constructed to service the Baikonur Cosmodrome and was officially renamed Baikonur by Russian president Boris Yeltsin on December 20, 1995.The shape of the...

. When more information resulted in knowing a bit about what a missile was used for, it would be given a designation like "SS-6", for the sixth surface-to-surface missile design reported. Finally, when either an aircraft or a missile was able to be photographed "with a hand-held camera", instead of a reconnaissance aircraft, it was given a name like "Flanker
Sukhoi Su-27
The Sukhoi Su-27 is a twin-engine supermanoeuverable fighter aircraft designed by Sukhoi. It was intended as a direct competitor for the large United States fourth generation fighters, with range, heavy armament, sophisticated avionics and high manoeuvrability...

" or "Scud
Scud
Scud is a series of tactical ballistic missiles developed by the Soviet Union during the Cold War, and exported widely to other countries. The term comes from the NATO reporting name SS-1 Scud which was attached to the missile by Western intelligence agencies...

" -- always an English word, as international pilots worldwide are required to learn English. The Soviet manufacturer or designation has nothing to do with it, and can even be mistaken by the Allies.

Jet-powered aircraft received two-syllable names (like Foxbat
Mikoyan-Gurevich MiG-25
The Mikoyan-Gurevich MiG-25 is a supersonic interceptor and reconnaissance aircraft that was among the fastest military aircraft to enter service. Designed by the Soviet Union's Mikoyan-Gurevich bureau the first prototype flew in 1964 with entry into service in 1970...

), while propeller aircraft were designated with short names (like Bull
Tupolev Tu-4
The Tupolev Tu-4 was a piston-engined Soviet strategic bomber that served the Soviet Air Force from the late 1940s to mid 1960s...

). Fighter names began with an "F", bombers with a "B", cargo aircraft with a "C". Training aircraft and reconnaissance aircraft were grouped under the word "miscellaneous", and received "M". The same convention applies to missiles, with air launched ground attack missiles beginning with the letter "K" and surface-to-surface missiles (ranging from Intercontinental Ballistic Missiles to antitank rockets) with the letter "S", Air-to-Air Missiles "A", and Surface-to-Air Missiles "G".

Military operations since Churchill

Throughout the Second World War, the British allocation practice favored one-word code names (Jubilee, Frankton
Operation Frankton
Operation Frankton was a commando raid on shipping in the German occupied French port of Bordeaux in the Bay of Biscay during the Second World War. The raid was carried out by a small unit of Royal Marines known as the Royal Marines Boom Patrol Detachment , part of Combined Operations.The plan was...

). That of the Americans favored longer compound words, although the name Overlord
Operation Overlord
Operation Overlord was the code name for the Battle of Normandy, the operation that launched the invasion of German-occupied western Europe during World War II by Allied forces. The operation commenced on 6 June 1944 with the Normandy landings...

 was personally chosen by Winston Churchill
Winston Churchill
Sir Winston Leonard Spencer-Churchill, was a predominantly Conservative British politician and statesman known for his leadership of the United Kingdom during the Second World War. He is widely regarded as one of the greatest wartime leaders of the century and served as Prime Minister twice...

 himself. Many examples of both types can be cited, as can exceptions.

Presently, British forces tend to use one-word names, presumably in keeping with their post-World War II policy of reserving single words for operations and two-word names for exercises. Americans prefer two-word names. The Canadians and Australians use either. The French military currently prefer names drawn from nature (such as colors or the names of animals), for instance Opération Daguet
Opération Daguet
Opération Daguet was the codename for French operations during the 1991 Gulf War...

("brocket deer") or Opération Baliste
Opération Baliste
Opération Baliste is the codename for the French aeronaval operation off Lebanon aiming at securing citizens of the European Union, since July 2006, in the context of the 2006 Lebanon War.- Components :...

("Triggerfish"). The American CIA uses alphabetical prefixes to designate the part of the agency supporting an operation.

In many cases with the U.S. the first word of the name has to do with the intent of the program, programs with HAVE as the first word, such as HAVE BLUE
Lockheed Have Blue
Lockheed Have Blue was the code name for Lockheed's "proof of concept" that preceded the F-117 Nighthawk production stealth aircraft. Have Blue was designed by Lockheed's Skunk Works division, and tested at Groom Lake, Nevada...

 for the stealth fighter development, are developmental programs, not meant to produce a production aircraft, while programs that start with Senior, such as Senior Trend for the F-117, are for aircraft in testing meant to enter production.

In the US, code names are commonly set entirely in upper case. This is not done in other countries - though for the UK in British documents the code name is in upper case while operation is shortened to OP e.g. "Op. TELIC."

This presents an opportunity for a bit of public-relations (Operation Just Cause), or for controversy over the naming choice (Operation Infinite Justice, renamed Operation Enduring Freedom). Computers are now used to aid in the selection. And further, there is a distinction between the secret names during former wars and the published names of recent ones. Operation Desert Shield was what the build-up in Saudi Arabia was blatantly referred to in the press, before war was declared. During this time, "Desert Storm" was secret. When the war broke out, the name Operation Desert Storm -- but not the tactical details—was also broken to the press.

Another reason for the use of code names and code phrases in the military is that they transmit with a lower level of cumulative errors
Chinese whispers
Chinese whispers is one name for a game played around the world, in which one person whispers a message to another, which is passed through a line of people until the last player announces the message to the entire group...

 over a walkie-talkie or radio link than actual names.

Project code name

A project code name is a code name (usually a single word, short phrase or acronym) which is given to a project
Project
A project in business and science is typically defined as a collaborative enterprise, frequently involving research or design, that is carefully planned to achieve a particular aim. Projects can be further defined as temporary rather than permanent social systems that are constituted by teams...

 being developed by industry
Industry
Industry refers to the production of an economic good or service within an economy.-Industrial sectors:There are four key industrial economic sectors: the primary sector, largely raw material extraction industries such as mining and farming; the secondary sector, involving refining, construction,...

, academia
Academia
Academia is the community of students and scholars engaged in higher education and research.-Etymology:The word comes from the akademeia in ancient Greece. Outside the city walls of Athens, the gymnasium was made famous by Plato as a center of learning...

, government
Government
Government refers to the legislators, administrators, and arbitrators in the administrative bureaucracy who control a state at a given time, and to the system of government by which they are organized...

, and other concerns.

Project code names are typically used for several reasons:
  • To uniquely identify the project within the organization. Code names are frequently chosen to be outside the normal business/domain jargon that the organization uses, in order to not conflict with established terminology.
  • To assist with maintaining secrecy
    Secrecy
    Secrecy is the practice of hiding information from certain individuals or groups, perhaps while sharing it with other individuals...

     of the project against rival concerns. Some corporations routinely change project names in order to further confuse competitors.
  • When the goal of the project is to develop one or more commercial products, use of a code name allows the eventual choice of product nomenclature (the name the product(s) are marketed and sold under) to be decoupled from the development effort. This is especially important when one project generates multiple products, or multiple projects are needed to produce a single product. This allows for subprojects to be given a separate identity from the main project.
  • As a political tool by management, to decouple an early phase of a development effort (which may have failed) from a subsequent phase (which may be given a "fresh start").
  • To prevent casual observers from concluding that a pre-release version is a new release of the product, thus helping reduce confusion.


Different organizations have different policies regarding the use and publication of project code names. Some companies take great pains to never discuss or disclose project code names outside of the company (other than with outside entities who have a need to know, and typically are bound with a non-disclosure agreement
Non-disclosure agreement
A non-disclosure agreement , also known as a confidentiality agreement , confidential disclosure agreement , proprietary information agreement , or secrecy agreement, is a legal contract between at least two parties that outlines confidential material, knowledge, or information that the parties...

). Other companies never use them in official or formal communications, but widely disseminate project code names through informal channels (often in an attempt to create a marketing "buzz" for the project). Still others (such as Microsoft
Microsoft
Microsoft Corporation is an American public multinational corporation headquartered in Redmond, Washington, USA that develops, manufactures, licenses, and supports a wide range of products and services predominantly related to computing through its various product divisions...

) discuss code names publicly, and routinely use project code names on beta releases and such, but remove them from final product(s). At the other end of the spectrum, Apple Computer
Apple Computer
Apple Inc. is an American multinational corporation that designs and markets consumer electronics, computer software, and personal computers. The company's best-known hardware products include the Macintosh line of computers, the iPod, the iPhone and the iPad...

 includes the project code names for Mac OS X
Mac OS X
Mac OS X is a series of Unix-based operating systems and graphical user interfaces developed, marketed, and sold by Apple Inc. Since 2002, has been included with all new Macintosh computer systems...

 as part of the official name of the final product, a practice that was started in 2002 with Mac OS X v10.2
Mac OS X v10.2
Mac OS X version 10.2 "Jaguar" is the third major release of Mac OS X, Apple's desktop and server operating system. It superseded Mac OS X v10.1 code name Puma and preceded Mac OS X Panther...

 "Jaguar".

Military

  • Operation Anthropoid
    Operation Anthropoid
    Operation Anthropoid was the code name for the targeted killing of top German SS leader Reinhard Heydrich. He was the chief of the Reich Main Security Office , the acting Protector of Bohemia and Moravia, and a chief planner of the Final Solution, the Nazi German programme for the genocide of the...

     - assassination of top Nazi Reinhard Heydrich
    Reinhard Heydrich
    Reinhard Tristan Eugen Heydrich , also known as The Hangman, was a high-ranking German Nazi official.He was SS-Obergruppenführer and General der Polizei, chief of the Reich Main Security Office and Stellvertretender Reichsprotektor of Bohemia and Moravia...

     in Prague
    Prague
    Prague is the capital and largest city of the Czech Republic. Situated in the north-west of the country on the Vltava river, the city is home to about 1.3 million people, while its metropolitan area is estimated to have a population of over 2.3 million...

  • Operation Barbarossa
    Operation Barbarossa
    Operation Barbarossa was the code name for Germany's invasion of the Soviet Union during World War II that began on 22 June 1941. Over 4.5 million troops of the Axis powers invaded the USSR along a front., the largest invasion in the history of warfare...

     - German invasion of the Soviet Union
    Soviet Union
    The Soviet Union , officially the Union of Soviet Socialist Republics , was a constitutionally socialist state that existed in Eurasia between 1922 and 1991....

  • Operation Overlord
    Operation Overlord
    Operation Overlord was the code name for the Battle of Normandy, the operation that launched the invasion of German-occupied western Europe during World War II by Allied forces. The operation commenced on 6 June 1944 with the Normandy landings...

     - Allied
    Western Allies
    The Western Allies were a political and geographic grouping among the Allied Powers of the Second World War. It generally includes the United Kingdom and British Commonwealth, the United States, France and various other European and Latin American countries, but excludes China, the Soviet Union,...

     invasion of Normandy
    Normandy
    Normandy is a geographical region corresponding to the former Duchy of Normandy. It is in France.The continental territory covers 30,627 km² and forms the preponderant part of Normandy and roughly 5% of the territory of France. It is divided for administrative purposes into two régions:...

  • Manhattan Project
    Manhattan Project
    The Manhattan Project was a research and development program, led by the United States with participation from the United Kingdom and Canada, that produced the first atomic bomb during World War II. From 1942 to 1946, the project was under the direction of Major General Leslie Groves of the US Army...

     (with Trinity, Little Boy
    Little Boy
    "Little Boy" was the codename of the atomic bomb dropped on Hiroshima on August 6, 1945 by the Boeing B-29 Superfortress Enola Gay, piloted by Colonel Paul Tibbets of the 393rd Bombardment Squadron, Heavy, of the United States Army Air Forces. It was the first atomic bomb to be used as a weapon...

    , and Fat Man
    Fat Man
    "Fat Man" is the codename for the atomic bomb that was detonated over Nagasaki, Japan, by the United States on August 9, 1945. It was the second of the only two nuclear weapons to be used in warfare to date , and its detonation caused the third man-made nuclear explosion. The name also refers more...

    ) - early U.S. nuclear weapons program during World War II
    World War II
    World War II, or the Second World War , was a global conflict lasting from 1939 to 1945, involving most of the world's nations—including all of the great powers—eventually forming two opposing military alliances: the Allies and the Axis...

  • MKULTRA - CIA project (an attempt at "mind control")
  • Tube Alloys
    Tube Alloys
    Tube Alloys was the code-name for the British nuclear weapon directorate during World War II, when the development of nuclear weapons was kept at such a high level of secrecy that it had to be referred to by code even in the highest circles of government...

     - British nuclear program
  • Project-706
    Project-706
    Project-706, also known as Project-726 or as the Kahuta Project, was a science effort codename of a project conducted during the Cold War and Russo-Afghan War whose objective was to develop Pakistan' first atomic weapon. The mainstream goal of the project was the development of an atomic bomb using...

     (with Chagai-I
    Chagai-I
    The Chagai-I was a codename referring to the five underground nuclear tests conducted by Pakistan at 15:15hrs in 28th May of 1998. It was named Chagai-I, as the tests were conducted in the Chagai District...

     and Chagai-II) — an early Pakistan's secret code name for developing the nuclear weapons programme during Cold war.
  • Operation Sea Lion - the planned invasion of Britain by Nazi Germany
    Nazi Germany
    Nazi Germany , also known as the Third Reich , but officially called German Reich from 1933 to 1943 and Greater German Reich from 26 June 1943 onward, is the name commonly used to refer to the state of Germany from 1933 to 1945, when it was a totalitarian dictatorship ruled by...

     which was never carried out.

Commercial

  • AMD
    Advanced Micro Devices
    Advanced Micro Devices, Inc. or AMD is an American multinational semiconductor company based in Sunnyvale, California, that develops computer processors and related technologies for commercial and consumer markets...

     have also been naming their CPUs since 90 nm generations under the K8
    AMD K8
    The AMD K8 is a computer processor microarchitecture designed by AMD as the successor to the AMD K7 microarchitecture. The K8 was the first implementation of the AMD64 64-bit extension to the x86 processor architecture.Processors based on the K8 core include:...

     micro-architecture after the name of cities around the world. For the CPUs under the Phenom brand, name of stars will be used as code names. For Opteron
    Opteron
    Opteron is AMD's x86 server and workstation processor line, and was the first processor which supported the AMD64 instruction set architecture . It was released on April 22, 2003 with the SledgeHammer core and was intended to compete in the server and workstation markets, particularly in the same...

     server CPUs and platforms, cities related to the Formula One
    Formula One
    Formula One, also known as Formula 1 or F1 and referred to officially as the FIA Formula One World Championship, is the highest class of single seater auto racing sanctioned by the Fédération Internationale de l'Automobile . The "formula" designation in the name refers to a set of rules with which...

     team Ferrari were used as codenames. Mobile platforms are named after birds (except for Puma). Examples such as:-
    • Single-core Athlon 64
      Athlon 64
      The Athlon 64 is an eighth-generation, AMD64-architecture microprocessor produced by AMD, released on September 23, 2003. It is the third processor to bear the name Athlon, and the immediate successor to the Athlon XP...

       and Athlon 64 FX : Newcastle, Venice, San Diego and Lima
    • Dual-core Athlon 64 X2
      Athlon 64 X2
      The Athlon 64 X2 is the first dual-core desktop CPU designed by AMD. It was designed from scratch as native dual-core by using an already multi-CPU enabled Athlon 64, joining it with another functional core on one die, and connecting both via a shared dual-channel memory controller/north bridge and...

       and Athlon 64 FX: Manchester, Toledo, Windsor and Brisbane
    • Phenom CPUs: Agena (Beta Centauri
      Beta Centauri
      Beta Centauri , also known as Hadar or Agena, is the second brightest star in the constellation Centaurus and the tenth brightest star in the night sky. Beta Centauri is a B1 III blue-white giant star that the astrometric Hipparcos satellite calculates as about 161 parsecs or 525 light-years from...

      ), Toliman (Alpha Centauri
      Alpha Centauri
      Alpha Centauri is the brightest star in the southern constellation of Centaurus...

      ), Kuma (Nu Draconis
      Nu Draconis
      Nu Draconis is a double star in the constellation Draco. The respective components are designated ν1 Draconis and ν2 Draconis...

      ), Deneb
      Deneb
      Deneb is the brightest star in the constellation Cygnus and one of the vertices of the Summer Triangle. It is the 19th brightest star in the night sky, with an apparent magnitude of 1.25. A blue-white supergiant, Deneb is also one of the most luminous nearby stars...

      (Alpha Cygni), Propus (Eta Geminorum
      Eta Geminorum
      Eta Geminorum is a triple star system in the constellation Gemini. It has the traditional names Tejat Prior, Propus and Praepes and Pish Pai ....

      ), Heka (Lambda Orionis
      Lambda Orionis
      Lambda Orionis is a star in the constellation Orion. It has the traditional names Meissa or Heka. "Meissa" derives from the Arabic "Al-Maisan" which means "The Shining One". This term was used for Gamma Gemini , but was somehow also mistakenly applied to λ Orionis and the name stuck...

      ), Rana (Delta Eridani
      Delta Eridani
      Delta Eridani is a 3.54 magnitude star in the constellation of Eridanus. It is also called Rana. The name Rana means "the frog" in Latin...

      ), Regor (Gamma Velorum
      Gamma Velorum
      Gamma Velorum is a star system in the constellation Vela. At magnitude +1.7, it is one of the brightest stars in the night sky. It has the traditional names Suhail and Suhail al Muhlif, which confusingly also apply to Lambda Velorum...

      )
    • Opteron CPUs: Barcelona, Shanghai, São Paulo, Istanbul
    • Server platforms: Catalunya, Fiorano, Maranello
    • Mobile CPUs: Griffin, Lion, Swift
    • Mobile platforms: Kite, Puma, Shirke, Eagle

  • Apple Inc. (previously Apple Computer) has named the various major releases of Mac OS X
    Mac OS X
    Mac OS X is a series of Unix-based operating systems and graphical user interfaces developed, marketed, and sold by Apple Inc. Since 2002, has been included with all new Macintosh computer systems...

     after big cats, such as Jaguar, Panther, Tiger, Leopard and the most recent Lion. Previously, Apple had used music-related codenames for operating system projects, such as Copland
    Copland (operating system)
    Copland was a project at Apple Computer to create an updated version of the Macintosh operating system. It was to have introduced protected memory, preemptive multitasking and a number of new underlying operating system features, yet still be compatible with existing Mac software...

    , after composer
    Composer
    A composer is a person who creates music, either by musical notation or oral tradition, for interpretation and performance, or through direct manipulation of sonic material through electronic media...

     Aaron Copland
    Aaron Copland
    Aaron Copland was an American composer, composition teacher, writer, and later in his career a conductor of his own and other American music. He was instrumental in forging a distinctly American style of composition, and is often referred to as "the Dean of American Composers"...

     and Gershwin, after George Gershwin
    George Gershwin
    George Gershwin was an American composer and pianist. Gershwin's compositions spanned both popular and classical genres, and his most popular melodies are widely known...

    . Two other sources of popular Apple code-names, at least before the 1990s, appear to have been women's names (e.g., Jennifer
    Jennifer (given name)
    Jennifer is a female given name; it became a common first name for females in English-speaking countries during the 20th century. The name Jennifer is a Cornish variant of Guinevere, meaning The White Fay or White Ghost...

    , rumored for the Macintosh IIx
    Macintosh IIx
    The Macintosh IIx was introduced by Apple in 1988 as an incremental update of the original Macintosh II model. It replaced the 16 MHz Motorola 68020 CPU and 68881 FPU of the II with a 68030 CPU and 68882 FPU ; and the 800 KB floppy drive with the 1.44 MB SuperDrive...

    ; Lisa
    Lisa (given name)
    The given name Lisa can be a short form of Elizabeth or Elisabeth.In the United Kingdom, it began to gain popularity during the 1960s and by 1974 was the fifth most popular female name there, and a decade later was still as high as 14th. However, by 1996 it had fallen out of the top 100...

    , actually sold as the Apple Lisa
    Apple Lisa
    The Apple Lisa—also known as the Lisa—is a :personal computer designed by Apple Computer, Inc. during the early 1980s....

    ) and varieties of apple
    Apple
    The apple is the pomaceous fruit of the apple tree, species Malus domestica in the rose family . It is one of the most widely cultivated tree fruits, and the most widely known of the many members of genus Malus that are used by humans. Apple grow on small, deciduous trees that blossom in the spring...

    s (e.g., Cortland
    Cortland (apple)
    Cortland is a cultivar of apple.After the many attributes of McIntosh were discovered, plant breeders began crossing it with other varieties to enhance its traits. One of the earliest was the Cortland, combined with the Ben Davis variety...

     → Apple IIgs
    Apple IIGS
    The Apple , the fifth and most powerful model in the Apple II series of personal computers produced by Apple Computer. The "GS" in the name stands for Graphics and Sound, referring to its enhanced graphics and sound capabilities, both of which greatly surpassed previous models of the line...

    ; Macintosh [from McIntosh], actually sold as the Macintosh
    Macintosh
    The Macintosh , or Mac, is a series of several lines of personal computers designed, developed, and marketed by Apple Inc. The first Macintosh was introduced by Apple's then-chairman Steve Jobs on January 24, 1984; it was the first commercially successful personal computer to feature a mouse and a...

    )

  • Intel often names CPU projects after river
    River
    A river is a natural watercourse, usually freshwater, flowing towards an ocean, a lake, a sea, or another river. In a few cases, a river simply flows into the ground or dries up completely before reaching another body of water. Small rivers may also be called by several other names, including...

    s in the American West, particularly in the state of Oregon
    Oregon
    Oregon is a state in the Pacific Northwest region of the United States. It is located on the Pacific coast, with Washington to the north, California to the south, Nevada on the southeast and Idaho to the east. The Columbia and Snake rivers delineate much of Oregon's northern and eastern...

     (where most of Intel's CPU projects are designed). Examples include Willamette, Deschutes, Yamhill, Tualatin, and Clackamas. See List of Intel codenames.

  • Microsoft
    Microsoft
    Microsoft Corporation is an American public multinational corporation headquartered in Redmond, Washington, USA that develops, manufactures, licenses, and supports a wide range of products and services predominantly related to computing through its various product divisions...

     often names projects (in particular, versions of the Microsoft Windows
    Microsoft Windows
    Microsoft Windows is a series of operating systems produced by Microsoft.Microsoft introduced an operating environment named Windows on November 20, 1985 as an add-on to MS-DOS in response to the growing interest in graphical user interfaces . Microsoft Windows came to dominate the world's personal...

     operating systems) after place names. Examples include Chicago (Windows 95
    Windows 95
    Windows 95 is a consumer-oriented graphical user interface-based operating system. It was released on August 24, 1995 by Microsoft, and was a significant progression from the company's previous Windows products...

    ), Daytona (Windows NT 3.5
    Windows NT 3.5
    Windows NT 3.5 is the second release of the Microsoft Windows NT operating system. It was released on 21 September 1994.One of the primary goals during Windows NT 3.5's development was to increase the speed of the operating system; as a result, the project was given the codename "Daytona" in...

    ), Memphis (Windows 98
    Windows 98
    Windows 98 is a graphical operating system by Microsoft. It is the second major release in the Windows 9x line of operating systems. It was released to manufacturing on 15 May 1998 and to retail on 25 June 1998. Windows 98 is the successor to Windows 95. Like its predecessor, it is a hybrid...

    ), Whistler (Windows XP
    Windows XP
    Windows XP is an operating system produced by Microsoft for use on personal computers, including home and business desktops, laptops and media centers. First released to computer manufacturers on August 24, 2001, it is the second most popular version of Windows, based on installed user base...

    ), Longhorn (Windows Vista
    Windows Vista
    Windows Vista is an operating system released in several variations developed by Microsoft for use on personal computers, including home and business desktops, laptops, tablet PCs, and media center PCs...

    ), Blackcomb/Vienna Windows 7 and Cairo (originally thought to be Windows NT 4.0
    Windows NT 4.0
    Windows NT 4.0 is a preemptive, graphical and business-oriented operating system designed to work with either uniprocessor or symmetric multi-processor computers. It was the next release of Microsoft's Windows NT line of operating systems and was released to manufacturing on 31 July 1996...

    , though many observers now believe that Cairo never turned into a project). It is not uncommon for Microsoft to reuse codenames a few years after a previous usage has been abandoned. See Microsoft codenames.

  • Mozilla
    Mozilla
    Mozilla is a term used in a number of ways in relation to the Mozilla.org project and the Mozilla Foundation, their defunct commercial predecessor Netscape Communications Corporation, and their related application software....

     uses code names which are mostly named after national park
    National park
    A national park is a reserve of natural, semi-natural, or developed land that a sovereign state declares or owns. Although individual nations designate their own national parks differently A national park is a reserve of natural, semi-natural, or developed land that a sovereign state declares or...

    s to reference different versions of the Mozilla Firefox
    Mozilla Firefox
    Mozilla Firefox is a free and open source web browser descended from the Mozilla Application Suite and managed by Mozilla Corporation. , Firefox is the second most widely used browser, with approximately 25% of worldwide usage share of web browsers...

     browser:
    • Firefox 2.0: Bon Echo
      Bon Echo Provincial Park
      Bon Echo Provincial Park is a provincial park in South Central Ontario north of Kaladar, Ontario, approximately 6 km north of Cloyne.Bon Echo features several lakes, including part of Mazinaw Lake, the second-deepest lake in Ontario...

    • Firefox 3.0: Gran Paradiso
      Gran Paradiso
      The Gran Paradiso is a mountain group between the Aosta Valley and Piedmont regions of north-west Italy. The peak, the 7th highest mountain in the Graian Alps with an elevation of 4,061 m, is close to Mont Blanc on the nearby border with France. On the French side of the border, the park is...

    • Firefox 3.5: Shiretoko
      Shiretoko National Park
      covers most of the Shiretoko Peninsula at the northeastern tip of the island of Hokkaidō, Japan.The word "Shiretoko" is derived form an Ainu word "sir etok", meaning "end of the Earth"....

    • Firefox 3.6: Namoroka
      Tsingy de Namoroka Strict Nature Reserve
      Tsingy de Namoroka Strict Nature Reserve, also known as Namoroka National Park, is a strict nature reserve located in the northwestern part of Madagascar in the Mahajanga Province, specifically, the Soalala District.- Climate and geography :...

    • Firefox 4.0: Tumucumaque
      Tumucumaque National Park
      The Tumucumaque National Park is situated in northwestern Brazil inside the Amazon Rainforest state of Amapá. It’s bordered to the north by French Guyana and Suriname....

    • Firefox pre-beta: Aurora
    • Firefox trunk builds: Nightly

  • Nintendo
    Nintendo
    is a multinational corporation located in Kyoto, Japan. Founded on September 23, 1889 by Fusajiro Yamauchi, it produced handmade hanafuda cards. By 1963, the company had tried several small niche businesses, such as a cab company and a love hotel....

     often uses code names for new consoles. The best-known is that of Wii
    Wii
    The Wii is a home video game console released by Nintendo on November 19, 2006. As a seventh-generation console, the Wii primarily competes with Microsoft's Xbox 360 and Sony's PlayStation 3. Nintendo states that its console targets a broader demographic than that of the two others...

    , which was code-named Revolution for over a year. Others include the GameCube
    Nintendo GameCube
    The , officially abbreviated to NGC in Japan and GCN in other regions, is a sixth generation video game console released by Nintendo on September 15, 2001 in Japan, November 18, 2001 in North America, May 3, 2002 in Europe, and May 17, 2002 in Australia...

    's code name of Dolphin, the Game Boy Advance
    Game Boy Advance
    The is a 32-bit handheld video game console developed, manufactured, and marketed by Nintendo. It is the successor to the Game Boy Color. It was released in Japan on March 21, 2001; in North America on June 11, 2001; in Australia and Europe on June 22, 2001; and in the People's Republic of China...

    's code name of Atlantis
    Atlantis
    Atlantis is a legendary island first mentioned in Plato's dialogues Timaeus and Critias, written about 360 BC....

    , the Nintendo 64
    Nintendo 64
    The , often referred to as N64, was Nintendo′s third home video game console for the international market. Named for its 64-bit CPU, it was released in June 1996 in Japan, September 1996 in North America, March 1997 in Europe and Australia, September 1997 in France and December 1997 in Brazil...

     as Project Reality, the DS
    Nintendo DS
    The is a portable game console produced by Nintendo, first released on November 21, 2004. A distinctive feature of the system is the presence of two separate LCD screens, the lower of which is a touchscreen, encompassed within a clamshell design, similar to the Game Boy Advance SP...

     code name Project Nitro, the Game Boy Micro
    Game Boy Micro
    is a handheld game console developed and manufactured by Nintendo. It was first released in September 2005 in the market. The system is the last console of the Game Boy line...

     code name Oxygen and most recently the Wii U, codenamed Project Cafe.

See also

  • CIA cryptonym
    CIA cryptonym
    CIA cryptonyms are code names or code words used by the U.S. Central Intelligence Agency to reference projects, operations, persons, agencies, etc. The cryptonyms as described in this article were in use at least from the 1950s to the 1980s...

  • Military Operations listed by Codename
  • NATO reporting name
    NATO reporting name
    NATO reporting names are classified code names for military equipment of the Eastern Bloc...

  • Pseudonym
    Pseudonym
    A pseudonym is a name that a person assumes for a particular purpose and that differs from his or her original orthonym...

    , the term for a code name when applied to a single person.
  • Rainbow Codes
  • Secret Service codename
    Secret Service codename
    The United States Secret Service uses code names for U.S. presidents, first ladies, and other prominent persons and locations. The use of such names was originally for security purposes and dates to a time when sensitive electronic communications were not routinely encrypted; today, the names...


External links

The source of this article is wikipedia, the free encyclopedia.  The text of this article is licensed under the GFDL.
 
x
OK