HOME

TheInfoList



OR:

A code name, codename, call sign, or cryptonym is a code word or name used, sometimes clandestinely, to refer to another name, word, project, or person. Code names are often used for military purposes, or in espionage. They may also be used in industrial counter-espionage to protect secret projects and the like from business rivals, or to give names to projects whose marketing name has not yet been determined. Another reason for the use of names and phrases in the military is that they transmit with a lower level of cumulative errors over a
walkie-talkie A walkie-talkie, more formally known as a handheld transceiver, HT, or handheld radio, is a hand-held, portable, two-way radio transceiver. Its development during the Second World War has been variously credited to Donald Hings, radio engineer A ...
or radio link than actual names.


Origins


Achaemenid Empire

The
Achaemenid Empire The Achaemenid Empire or Achaemenian Empire, also known as the Persian Empire or First Persian Empire (; , , ), was an Iranian peoples, Iranian empire founded by Cyrus the Great of the Achaemenid dynasty in 550 BC. Based in modern-day Iran, i ...
under
Darius I Darius I ( ; – 486 BCE), commonly known as Darius the Great, was the third King of Kings of the Achaemenid Empire, reigning from 522 BCE until his death in 486 BCE. He ruled the empire at its territorial peak, when it included much of West A ...
employed a network of spies called the King’s Eye or the King’s Ear. These agents operated under anonymity, and “King’s Eye” was not a specific person but rather a code name for the intelligence network that reported directly to the king.


Punic Wars

The Carthaginian general Hannibal Barca reportedly used coded references for his agents and informants in Rome and among allied territories. Some sources suggest that key figures in his intelligence operations were identified using nicknames instead of real names to avoid detection by Roman counterintelligence.


Rome

Julius Caesar Gaius Julius Caesar (12 or 13 July 100 BC – 15 March 44 BC) was a Roman general and statesman. A member of the First Triumvirate, Caesar led the Roman armies in the Gallic Wars before defeating his political rival Pompey in Caesar's civil wa ...
used
ciphers In cryptography, a cipher (or cypher) is an algorithm for performing encryption or decryption—a series of well-defined steps that can be followed as a procedure. An alternative, less common term is ''encipherment''. To encipher or encode i ...
to encode messages and likely employed code names for key operatives. His famous
Caesar cipher In cryptography, a Caesar cipher, also known as Caesar's cipher, the shift cipher, Caesar's code, or Caesar shift, is one of the simplest and most widely known encryption techniques. It is a type of substitution cipher in which each letter in t ...
(simple letter-shifting
encryption In Cryptography law, cryptography, encryption (more specifically, Code, encoding) is the process of transforming information in a way that, ideally, only authorized parties can decode. This process converts the original representation of the inf ...
) was used to disguise military commands. He also referred to
Marc Antony Marcus Antonius (14 January 1 August 30 BC), commonly known in English as Mark Antony, was a Roman politician and general who played a critical role in the transformation of the Roman Republic from a constitutional republic into the au ...
and other generals with shortened or altered names in correspondence to prevent interception from revealing strategic plans.


Jewish code names in the Bible

During the Jewish revolts against Rome, leaders and messengers used symbolic or misleading names in communications. The Dead Sea Scrolls reference figures such as the “
Teacher of Righteousness The Teacher of Righteousness () is a mysterious figure found in some of the Dead Sea Scrolls at Qumran, most prominently in the Damascus Document (CD), which speaks briefly of the origins of the sect, 390 years after the Neo-Babylonian Empire ca ...
” and the “ Wicked Priest,” which may have functioned as code names to obscure real identities.


Byzantine Empire

The Byzantine Empire’s intelligence agents, particularly under Emperor Justinian I, operated under codenames or titles rather than real identities.
Procopius Procopius of Caesarea (; ''Prokópios ho Kaisareús''; ; – 565) was a prominent Late antiquity, late antique Byzantine Greeks, Greek scholar and historian from Caesarea Maritima. Accompanying the Roman general Belisarius in Justinian I, Empe ...
suggests that spies within the Persian and Gothic courts were assigned allegorical names to protect them from discovery.


Military origins

During
World War I World War I or the First World War (28 July 1914 – 11 November 1918), also known as the Great War, was a World war, global conflict between two coalitions: the Allies of World War I, Allies (or Entente) and the Central Powers. Fighting to ...
, names common to the
Allies An alliance is a relationship among people, groups, or states that have joined together for mutual benefit or to achieve some common purpose, whether or not an explicit agreement has been worked out among them. Members of an alliance are calle ...
referring to nations, cities, geographical features, military units, military operations, diplomatic meetings, places, and individual persons were agreed upon, adapting pre-war naming procedures in use by the governments concerned. In the British case names were administered and controlled by the Inter Services Security Board (ISSB) staffed by the
War Office The War Office has referred to several British government organisations throughout history, all relating to the army. It was a department of the British Government responsible for the administration of the British Army between 1857 and 1964, at ...
. This procedure was coordinated with the United States when it entered the war. Random lists of names were issued to users in alphabetical blocks of ten words and were selected as required. Words became available for re-use after six months and unused allocations could be reassigned at discretion and according to need. Judicious selection from the available allocation could result in clever meanings and result in an
aptronym An aptronym, aptonym, or euonym is a personal name aptly or peculiarly suited to its owner (e.g. their occupation). Gene Weingarten of ''The Washington Post'' coined the word inaptonym as an antonym for "aptonym". The word "euonym" ( eu- + -o ...
or
backronym A backronym is an acronym formed from an already existing word by expanding its letters into the words of a phrase. Backronyms may be invented with either serious or humorous intent, or they may be a type of false etymology or folk etymology. The ...
, although policy was to select words that had no obviously deducible connection with what they were supposed to be concealing. Those for the major conference meetings had a partial naming sequence referring to devices or instruments which had a number as part of their meaning, e.g., the third meeting was "TRIDENT".
Joseph Stalin Joseph Vissarionovich Stalin (born Dzhugashvili; 5 March 1953) was a Soviet politician and revolutionary who led the Soviet Union from 1924 until Death and state funeral of Joseph Stalin, his death in 1953. He held power as General Secret ...
, whose last name means "man of steel", was given the name "GLYPTIC", meaning "an image carved out of stone". * Reference: Glossary of Names from U.S. Army in
World War II World War II or the Second World War (1 September 1939 – 2 September 1945) was a World war, global conflict between two coalitions: the Allies of World War II, Allies and the Axis powers. World War II by country, Nearly all of the wo ...
– Washington Command Post: The Operations Division ** World War II Allied Operations ** Abbreviations, Acronyms, Codewords, Terms Appearing in WW II Histories and Documents ** Information from original files held at
The National Archives National archives are the archives of a country. The concept evolved in various nations at the dawn of modernity based on the impact of nationalism upon bureaucratic processes of paperwork retention. Conceptual development From the Middle Ages i ...
(formerly The Public Record Office) which hold the publicly available records of central government for the UK


German code names

Ewen Montagu Ewen Edward Samuel Montagu (29 March 1901 – 19 July 1985) was a British judge, Naval intelligence officer, and author. He is best known for his leading role in Operation Mincemeat, a critical military deception operation that misdirected G ...
, a British Naval intelligence officer, discloses in ''Beyond Top Secret Ultra'' that during
World War II World War II or the Second World War (1 September 1939 – 2 September 1945) was a World war, global conflict between two coalitions: the Allies of World War II, Allies and the Axis powers. World War II by country, Nearly all of the wo ...
,
Nazi Germany Nazi Germany, officially known as the German Reich and later the Greater German Reich, was the German Reich, German state between 1933 and 1945, when Adolf Hitler and the Nazi Party controlled the country, transforming it into a Totalit ...
habitually used ''ad hoc'' code names as nicknames which often openly revealed or strongly hinted at their content or function. Some German code names: * Golfplatz (German for "golf course") – Britain, employed by the
Abwehr The (German language, German for ''resistance'' or ''defence'', though the word usually means ''counterintelligence'' in a military context) ) was the German military intelligence , military-intelligence service for the ''Reichswehr'' and the ...
* Samland – The United States (from
Uncle Sam Uncle Sam (with the same initials as ''United States'') is a common national personification of the United States, depicting the federal government of the United States, federal government or the country as a whole. Since the early 19th centu ...
), employed by the
Abwehr The (German language, German for ''resistance'' or ''defence'', though the word usually means ''counterintelligence'' in a military context) ) was the German military intelligence , military-intelligence service for the ''Reichswehr'' and the ...
*
Heimdall In Norse mythology, Heimdall (from Old Norse Heimdallr; modern Icelandic language, Icelandic Heimdallur) is a Æsir, god. He is the son of Odin and nine mothers. Heimdall keeps watch for invaders and the onset of Ragnarök from his dwelling Himi ...
(a god whose power was "to see for a hundred miles") – long-range radar *
Wotan (''The Ring of the Nibelung''), WWV 86, is a cycle of four German-language epic music dramas composed by Richard Wagner. The works are based loosely on characters from Germanic heroic legend, namely Norse legendary sagas and the . The compos ...
– an aerial bombing navigation system. Knowing that the god Wotan had only one eye, R. V. Jones, a British scientist working for
Air Intelligence An atmosphere () is a layer of gases that envelop an astronomical object, held in place by the gravity of the object. A planet retains an atmosphere when the gravity is great and the temperature of the atmosphere is low. A stellar atmosphere ...
of the British
Air Ministry The Air Ministry was a department of the Government of the United Kingdom with the responsibility of managing the affairs of the Royal Air Force and civil aviation that existed from 1918 to 1964. It was under the political authority of the ...
and SIS inferred that the device used a single beam and from that determined, correctly, how it must work. A counter-system was quickly created which made Wotan useless. * Operation Seelöwe ( Sea-lion) – plans to invade Britain (lions being prominent in the
coat of arms of the United Kingdom The royal coat of arms of the United Kingdom, also referred to as the royal arms, are the arms of dominion of the British monarch, currently Charles III. They are used by the Government of the United Kingdom and by other The Crown, Crown instit ...
) *
Operation Barbarossa Operation Barbarossa was the invasion of the Soviet Union by Nazi Germany and several of its European Axis allies starting on Sunday, 22 June 1941, during World War II. More than 3.8 million Axis troops invaded the western Soviet Union along ...
(
Frederick Barbarossa Frederick Barbarossa (December 1122 – 10 June 1190), also known as Frederick I (; ), was the Holy Roman Emperor from 1155 until his death in 1190. He was elected King of Germany in Frankfurt on 4 March 1152 and crowned in Aachen on 9 March 115 ...
) – plans to go east and invade the Soviet Union Conversely,
Operation Wacht am Rhein The Battle of the Bulge, also known as the Ardennes Offensive or Unternehmen Die Wacht am Rhein, Wacht am Rhein, was the last major German Offensive (military), offensive Military campaign, campaign on the Western Front (World War II), Western ...
(Watch on the
Rhine The Rhine ( ) is one of the List of rivers of Europe, major rivers in Europe. The river begins in the Swiss canton of Graubünden in the southeastern Swiss Alps. It forms part of the Swiss-Liechtenstein border, then part of the Austria–Swit ...
) was deliberately named to suggest the opposite of its purpose a defensive "watch" as opposed to a massive
blitzkrieg ''Blitzkrieg'(Lightning/Flash Warfare)'' is a word used to describe a combined arms surprise attack, using a rapid, overwhelming force concentration that may consist of armored and motorized or mechanized infantry formations, together with ...
operation, just as was
Operation Weserübung Operation Weserübung ( , , 9 April – 10 June 1940) was the invasion of Denmark and Norway by Nazi Germany during World War II. It was the opening operation of the Norwegian Campaign. In the early morning of 9 April 1940 (, "Weser Day"), Ge ...
(
Weser The Weser () is a river of Lower Saxony in north-west Germany. It begins at Hannoversch Münden through the confluence of the Werra and Fulda. It passes through the Hanseatic city of Bremen. Its mouth is further north against the ports o ...
-exercise), which signified the plans to invade
Norway Norway, officially the Kingdom of Norway, is a Nordic countries, Nordic country located on the Scandinavian Peninsula in Northern Europe. The remote Arctic island of Jan Mayen and the archipelago of Svalbard also form part of the Kingdom of ...
and
Denmark Denmark is a Nordic countries, Nordic country in Northern Europe. It is the metropole and most populous constituent of the Kingdom of Denmark,, . also known as the Danish Realm, a constitutionally unitary state that includes the Autonomous a ...
in April 1940.


Code names of other powers

Britain and the United States developed the security policy of assigning code names intended to give no such clues to the uninitiated. For example, the British counter measures against the V-2 was called ''
Operation Crossbow ''Crossbow'' was the code name in World War II for Anglo-American operations against the German V-weapons, long range reprisal weapons (V-weapons) programme. The primary V-weapons were the V-1 flying bomb and V-2 rocket, which were launched agai ...
''. The
atomic bomb A nuclear weapon is an explosive device that derives its destructive force from nuclear reactions, either fission (fission or atomic bomb) or a combination of fission and fusion reactions (thermonuclear weapon), producing a nuclear expl ...
project centered in
New Mexico New Mexico is a state in the Southwestern United States, Southwestern region of the United States. It is one of the Mountain States of the southern Rocky Mountains, sharing the Four Corners region with Utah, Colorado, and Arizona. It also ...
was called the
Manhattan Project The Manhattan Project was a research and development program undertaken during World War II to produce the first nuclear weapons. It was led by the United States in collaboration with the United Kingdom and Canada. From 1942 to 1946, the ...
, derived from the Manhattan Engineer District which managed the program. The code name for the American A-12 /
SR-71 The Lockheed SR-71 "Blackbird" is a retired Range (aeronautics), long-range, high-altitude, Mach number, Mach 3+ military strategy, strategic reconnaissance aircraft developed and manufactured by the American aerospace company Lockheed Co ...
spy plane project, producing the fastest, highest-flying aircraft in the world, was ''Oxcart''. The American group that planned that country's first
ICBM An intercontinental ballistic missile (ICBM) is a ballistic missile with a range (aeronautics), range greater than , primarily designed for nuclear weapons delivery (delivering one or more Thermonuclear weapon, thermonuclear warheads). Conven ...
was called the Teapot Committee. Although the word could stand for a menace to shipping (in this case, that of Japan), the American code name for the attack on the subtropical island of
Okinawa most commonly refers to: * Okinawa Prefecture, Japan's southernmost prefecture * Okinawa Island, the largest island of Okinawa Prefecture * Okinawa Islands, an island group including Okinawa itself * Okinawa (city), the second largest city in th ...
in World War II was '' Operation Iceberg''. The Soviet Union's project to base missiles in Cuba was named ''
Operation Anadyr Operation Anadyr () was the code name used by the Soviet Union for its Cold War secret operation in 1962 of deploying ballistic missiles, medium-range bombers, and a division of mechanized infantry to Cuba to create an army group that would be a ...
'' after their closest bomber base to the US (just across the Bering Strait from Nome, Alaska). The names of colors are generally avoided in American practice to avoid confusion with meteorological reporting practices. Britain, in contrast, made deliberately non-meaningful use of them, through the system of rainbow codes.


Aircraft recognition reporting names

Although German and Italian aircraft were not given code names by their Allied opponents, in 1942, Captain Frank T. McCoy, an intelligence officer of the
USAAF The United States Army Air Forces (USAAF or AAF) was the major land-based aerial warfare service component of the United States Army and ''de facto'' aerial warfare service branch of the United States during and immediately after World War II ...
, invented a system for the identification of Japanese military aircraft. Initially using short, "
hillbilly ''Hillbilly'' is a term historically used for White people who dwell in rural area, rural, mountainous areas in the United States, primarily in the Appalachian region and Ozarks. As people migrated out of the region during the Great Depression, ...
" boys' names such as " Pete", "
Jake Jake may refer to: Name * Jake (given name), including a list of persons and fictional characters with the name * Katrin Jäke (born c. 1975), German swimmer * Jake (gamer), American ''Overwatch'' player and coach * Jake, a member of the band Enhy ...
", and " Rufe", the system was later extended to include girls' names and names of trees and birds, and became widely used by the Allies throughout the Pacific theater of war. This type of naming scheme differs from the other use of code names in that it does not have to be kept secret, but is a means of identification where the official nomenclature is unknown or uncertain. The policy of recognition reporting names was continued into the
Cold War The Cold War was a period of global Geopolitics, geopolitical rivalry between the United States (US) and the Soviet Union (USSR) and their respective allies, the capitalist Western Bloc and communist Eastern Bloc, which lasted from 1947 unt ...
for Soviet, other
Warsaw Pact The Warsaw Pact (WP), formally the Treaty of Friendship, Co-operation and Mutual Assistance (TFCMA), was a Collective security#Collective defense, collective defense treaty signed in Warsaw, Polish People's Republic, Poland, between the Sovi ...
, and Communist Chinese aircraft. Although this was started by the Air Standards Co-ordinating Committee (ASCC) formed by the United States, United Kingdom, Canada, Australia, and New Zealand, it was extended throughout
NATO The North Atlantic Treaty Organization (NATO ; , OTAN), also called the North Atlantic Alliance, is an intergovernmental organization, intergovernmental Transnationalism, transnational military alliance of 32 Member states of NATO, member s ...
as the
NATO reporting name NATO uses a system of code names, called reporting names, to denote military aircraft and other equipment used by post-Soviet states, former Warsaw Pact countries, China, and other countries. The system assists military communications by providi ...
for aircraft, rockets and missiles. These names were considered by the Soviets as being like a nickname given to one's unit by the opponents in a battle. The Soviets did not like the
Sukhoi Su-25 The Sukhoi Su-25 ''Grach'' ( ('' rook''); NATO reporting name: Frogfoot) is a subsonic, single-seat, twin-engine jet aircraft developed in the Soviet Union by Sukhoi. It was designed to provide close air support for Soviet Ground Forces. Th ...
getting the code name " Frogfoot". However, some names were appropriate, such as "Condor" for the
Antonov An-124 The Antonov An-124 Ruslan (; ; NATO reporting name: Condor) is a large, strategic airlift, four-engined aircraft that was designed in the 1980s by the Antonov design bureau in the Ukrainian SSR of the Soviet Union (USSR). The An-124 is the ...
, or, most famously, "Fulcrum" for the
Mikoyan MiG-29 The Mikoyan MiG-29 (; NATO reporting name: Fulcrum) is a twin-engine fighter aircraft designed in the Soviet Union. Developed by the Mikoyan design bureau as an air superiority fighter during the 1970s, the MiG-29, along with the larger Suk ...
, which had a "pivotal" role in Soviet air-strategy. Code names were adopted by the following process. Aerial or space reconnaissance would note a new aircraft at a
Warsaw Pact The Warsaw Pact (WP), formally the Treaty of Friendship, Co-operation and Mutual Assistance (TFCMA), was a Collective security#Collective defense, collective defense treaty signed in Warsaw, Polish People's Republic, Poland, between the Sovi ...
airbase. The intelligence units would then assign it a code name consisting of the official abbreviation of the base, then a letter, for example, "Ram-A", signifying an aircraft sighted at
Ramenskoye Airport Zhukovsky (), formerly (and still occasionally) known as Ramenskoye () is an international airport, located in Moscow Oblast, Russia, southeast of central Moscow, in the city of Zhukovsky, a few kilometers south-east of the closed Bykovo Airp ...
. Missiles were given designations like "TT-5", for the fifth rocket seen at Tyura-Tam. When more information resulted in knowing a bit about what a missile was used for, it would be given a designation like "SS-6", for the sixth surface-to-surface missile design reported. Finally, when either an aircraft or a missile was able to be photographed with a hand-held camera, instead of a reconnaissance aircraft, it was given a name like " Flanker" or "
Scud A Scud missile is one of a series of tactical ballistic missiles developed by the Soviet Union during the Cold War. It was exported widely to both Second and Third World countries. The term comes from the NATO reporting name attached to the m ...
" always an English word, as international pilots worldwide are required to learn English. The Soviet manufacturer or designation – which may be mistakenly inferred by NATO – has nothing to do with it. Jet-powered aircraft received two-syllable names like Foxbat, while propeller aircraft were designated with short names like
Bull A bull is an intact (i.e., not Castration, castrated) adult male of the species ''Bos taurus'' (cattle). More muscular and aggressive than the females of the same species (i.e. cows proper), bulls have long been an important symbol cattle in r ...
. Fighter names began with an "F", bombers with a "B", cargo aircraft with a "C". Training aircraft and reconnaissance aircraft were grouped under the word "miscellaneous", and received "M". The same convention applies to missiles, with air-launched ground attack missiles beginning with the letter "K" and surface-to-surface missiles (ranging from
intercontinental ballistic missiles An intercontinental ballistic missile (ICBM) is a ballistic missile with a range (aeronautics), range greater than , primarily designed for nuclear weapons delivery (delivering one or more Thermonuclear weapon, thermonuclear warheads). Conven ...
to
antitank Anti-tank warfare refers to the military strategies, tactics, and weapon systems designed to counter and destroy enemy armored vehicles, particularly tanks. It originated during World War I following the first deployment of tanks in 1916, and ...
rockets) with the letter "S", air-to-air missiles "A", and surface-to-air missiles "G".


Military operations since Churchill

Throughout the Second World War, the British allocation practice favored one-word code names (
Jubilee A jubilee is often used to refer to the celebration of a particular anniversary of an event, usually denoting the 25th, 40th, 50th, 60th, and the 70th anniversary. The term comes from the Hebrew Bible (see, "Old Testament"), initially concerning ...
, Frankton). That of the Americans favored longer compound words, although the name
Overlord An overlord in the English feudal system was a lord of a manor who had subinfeudated a particular manor, estate or fee, to a tenant. The tenant thenceforth owed to the overlord one of a variety of services, usually military service or ...
was personally chosen by
Winston Churchill Sir Winston Leonard Spencer Churchill (30 November 1874 – 24 January 1965) was a British statesman, military officer, and writer who was Prime Minister of the United Kingdom from 1940 to 1945 (Winston Churchill in the Second World War, ...
himself. Many examples of both types can be cited, as can exceptions. Winston Churchill was particular about the quality of code names. He insisted that code words, especially for dangerous operations, would be not overly grand nor petty nor common. One emotional goal he mentions is to never have to report to anyone that their son "was killed in an operation called 'Bunnyhug' or 'Ballyhoo'." Presently, British forces tend to use one-word names, presumably in keeping with their post-World War II policy of reserving single words for operations and two-word names for exercises. British operation code names are usually randomly generated by a computer and rarely reveal its components or any political implications unlike the American names (e.g., the 2003 invasion of Iraq was called "Operation Telic" compared to Americans' "Operation Iraqi Freedom", obviously chosen for propaganda rather than secrecy). Americans prefer two-word names, whereas the Canadians and Australians use either. The French military currently prefer names drawn from nature (such as colors or the names of animals), for instance '' Opération Daguet'' ("brocket deer") or '' Opération Baliste'' ("Triggerfish"). The CIA uses alphabetical prefixes to designate the part of the agency supporting an operation. In many cases with the United States, the first word of the name has to do with the intent of the program. Programs with "have" as the first word, such as Have Blue for the stealth fighter development, are developmental programs, not meant to produce a production aircraft. Programs that start with Senior, such as Senior Trend for the F-117, are for aircraft in testing meant to enter production. In the United States code names are commonly set entirely in upper case. This is not done in other countries, though for the UK in British documents the code name is in upper case while operation is shortened to OP e.g., "Op. TELIC". This presents an opportunity for a bit of public-relations (
Operation Just Cause Operation or Operations may refer to: Arts, entertainment and media * ''Operation'' (game), a battery-operated board game that challenges dexterity * Operation (music), a term used in musical set theory * ''Operations'' (magazine), Multi-Man ...
), or for controversy over the naming choice (Operation Infinite Justice, renamed
Operation Enduring Freedom Operation Enduring Freedom (OEF) was the official name used by the U.S. government for both the first stage (2001–2014) of the War in Afghanistan (2001–2021) and the larger-scale Global War on Terrorism. On 7 October 2001, in response ...
). Computers are now used to aid in the selection. And further, there is a distinction between the ''secret'' names during former wars and the ''published'' names of recent ones.


Project code name

A project code name is a code name (usually a single word, short phrase or acronym) which is given to a
project A project is a type of assignment, typically involving research or design, that is carefully planned to achieve a specific objective. An alternative view sees a project managerially as a sequence of events: a "set of interrelated tasks to be ...
being developed by
industry Industry may refer to: Economics * Industry (economics), a generally categorized branch of economic activity * Industry (manufacturing), a specific branch of economic activity, typically in factories with machinery * The wider industrial sector ...
,
academia An academy (Attic Greek: Ἀκαδήμεια; Koine Greek Ἀκαδημία) is an institution of tertiary education. The name traces back to Plato's school of philosophy, founded approximately 386 BC at Akademia, a sanctuary of Athena, the go ...
, government, and other concerns. Project code names are typically used for several reasons: * To uniquely identify the project within the organization. Code names are frequently chosen to be outside the normal business/domain jargon that the organization uses, in order to not conflict with established terminology. * To assist with maintaining
secrecy Secrecy is the practice of hiding information from certain individuals or groups who do not have the "need to know", perhaps while sharing it with other individuals. That which is kept hidden is known as the secret. Secrecy is often controver ...
of the project against rival concerns. Some corporations routinely change project names in order to further confuse competitors. * When the goal of the project is to develop one or more commercial ''products'', use of a code name allows the eventual choice of product nomenclature (the name the product(s) are marketed and sold under) to be decoupled from the development effort. This is especially important when one project generates multiple products, or multiple projects are needed to produce a single product. This allows for ''subprojects'' to be given a separate identity from the main project. * To decouple an early phase of a development effort (which may have failed) from a subsequent phase (which may be given a "fresh start") as a political tool. * To prevent casual observers from concluding that a pre-release version is a new release of the product, thus helping reduce confusion. Different organizations have different policies regarding the use and publication of project code names. Some companies take great pains to ''never'' discuss or disclose project code names outside of the company (other than with outside entities who have a need to know, and typically are bound with a
non-disclosure agreement A non-disclosure agreement (NDA), also known as a confidentiality agreement (CA), confidential disclosure agreement (CDA), proprietary information agreement (PIA), or secrecy agreement (SA), is a legal contract or part of a contract between at le ...
). Other companies never use them in official or formal communications, but widely disseminate project code names through informal channels (often in an attempt to create a
marketing buzz Marketing buzz or simply buzz—a term used in viral marketing—is the interaction of consumers and users with a product or service which amplifies or alters the original marketing message. This emotion, energy, excitement, or anticipation about a ...
for the project). Still others (such as
Microsoft Microsoft Corporation is an American multinational corporation and technology company, technology conglomerate headquartered in Redmond, Washington. Founded in 1975, the company became influential in the History of personal computers#The ear ...
) discuss code names publicly, and routinely use project code names on beta releases and such, but remove them from final product(s). In the case of Windows 95, the code name "CHICAGO" was left embedded in the INF File structure and remained required through Windows Me. At the other end of the spectrum,
Apple An apple is a round, edible fruit produced by an apple tree (''Malus'' spp.). Fruit trees of the orchard or domestic apple (''Malus domestica''), the most widely grown in the genus, are agriculture, cultivated worldwide. The tree originated ...
includes the project code names for
Mac OS X macOS, previously OS X and originally Mac OS X, is a Unix, Unix-based operating system developed and marketed by Apple Inc., Apple since 2001. It is the current operating system for Apple's Mac (computer), Mac computers. With ...
as part of the official name of the final product, a practice that was started in 2002 with Mac OS X v10.2 "Jaguar". Google and the AOSP also used this for their Android operating system until 2013, where the code name was different from the release name.


Notable code names


Military

*
Operation Anthropoid Reinhard Heydrich, the commander of the German Reich Security Main Office (RSHA), the acting governor of the Protectorate of Bohemia and Moravia and a principal architect of the Holocaust, was assassinated during the Second World War in a coordin ...
– assassination of top Nazi
Reinhard Heydrich Reinhard Tristan Eugen Heydrich ( , ; 7 March 1904 – 4 June 1942) was a German high-ranking SS and police official during the Nazi era and a principal architect of the Holocaust. He held the rank of SS-. Many historians regard Heydrich ...
in Prague * Operation Arc Light
United States Air Force The United States Air Force (USAF) is the Air force, air service branch of the United States Department of Defense. It is one of the six United States Armed Forces and one of the eight uniformed services of the United States. Tracing its ori ...
B-52 bombing campaign during the
Vietnam War The Vietnam War (1 November 1955 – 30 April 1975) was an armed conflict in Vietnam, Laos, and Cambodia fought between North Vietnam (Democratic Republic of Vietnam) and South Vietnam (Republic of Vietnam) and their allies. North Vietnam w ...
*
Operation Barbarossa Operation Barbarossa was the invasion of the Soviet Union by Nazi Germany and several of its European Axis allies starting on Sunday, 22 June 1941, during World War II. More than 3.8 million Axis troops invaded the western Soviet Union along ...
– German invasion of the
Soviet Union The Union of Soviet Socialist Republics. (USSR), commonly known as the Soviet Union, was a List of former transcontinental countries#Since 1700, transcontinental country that spanned much of Eurasia from 1922 until Dissolution of the Soviet ...
* Operation Black Tornado – began on 26 November 2008 and lasted until 29 November when India's National Security Guards (NSG) conducted Operation Black Tornado to flush out the attackers from the Hotel Taj Mahal, Mumbai *
Operation Blue Star Operation Blue Star was a military operation by the Indian Armed Forces conducted between 1 and 10 June 1984 to remove Jarnail Singh Bhindranwale and other Sikh militants from the Golden Temple (Harmandir Sahib), a holy site of Sikhism, and i ...
– was an
Indian military The Indian Armed Forces are the armed forces, military forces of the India, Republic of India. It consists of three professional uniformed services: the Indian Army, the Indian Navy, and the Indian Air Force.—— Additionally, the Indian Ar ...
operation which took place 3–8 June 1984, in order to remove Jarnail Singh Bhindranwale and his armed followers from the
Harmandir Sahib The Golden Temple is a gurdwara located in Amritsar, Punjab, India. It is the pre-eminent spiritual site of Sikhism. It is one of the Holy place, holiest sites in Sikhism, alongside the Gurdwara Darbar Sahib Kartarpur in Kartarpur, Pakistan, ...
in
Amritsar Amritsar, also known as Ambarsar, is the second-List of cities in Punjab, India by population, largest city in the India, Indian state of Punjab, India, Punjab, after Ludhiana. Located in the Majha region, it is a major cultural, transportatio ...
,
Punjab, India Punjab () is a States and union territories of India, state in northwestern India. Forming part of the larger Punjab, Punjab region of the Indian subcontinent, the state is bordered by the States and union territories of India, Indian states ...
. * Operation Market Garden – failed invasion of Germany (1944) * Operation MoreroSouth African Special Forces sent to the
Central African Republic The Central African Republic (CAR) is a landlocked country in Central Africa. It is bordered by Chad to Central African Republic–Chad border, the north, Sudan to Central African Republic–Sudan border, the northeast, South Sudan to Central ...
to protect president
François Bozizé François Bozizé Yangouvonda (born 14 October 1946) is a Central African Republic, Central African politician who was List of heads of state of the Central African Republic, President of the Central African Republic from 2003 to 2013. He was th ...
. *
Operation Neptune Spear On 2 May 2011, the United States conducted Operation Neptune Spear, in which SEAL Team Six shot and killed Osama bin Laden at his " Waziristan Haveli" in Abbottabad, Pakistan. Bin Laden, who founded al-Qaeda and orchestrated the September ...
– The operation, was carried out in a Central Intelligence Agency-led operation in which
Osama bin Laden Osama bin Laden (10 March 19572 May 2011) was a militant leader who was the founder and first general emir of al-Qaeda. Ideologically a pan-Islamist, Bin Laden participated in the Afghan ''mujahideen'' against the Soviet Union, and support ...
, the founder and head of the Islamist militant group
al-Qaeda , image = Flag of Jihad.svg , caption = Jihadist flag, Flag used by various al-Qaeda factions , founder = Osama bin Laden{{Assassinated, Killing of Osama bin Laden , leaders = {{Plainlist, * Osama bin Lad ...
, was killed in Pakistan on May 2, 2011, by Navy SEALs of the U.S. Naval Special Warfare Development Group. ** "Geronimo", the code name for Osama bin Laden during Operation Neptune's Spear *
Operation Desert Storm Operation or Operations may refer to: Arts, entertainment and media * ''Operation'' (game), a battery-operated board game that challenges dexterity * Operation (music), a term used in musical set theory * ''Operations'' (magazine), Multi-Man ...
– The US code name of the airland conflict from 17 January 1991, through 11 April 1991 in
Kuwait Kuwait, officially the State of Kuwait, is a country in West Asia and the geopolitical region known as the Middle East. It is situated in the northern edge of the Arabian Peninsula at the head of the Persian Gulf, bordering Iraq to Iraq–Kuwait ...
during the First Gulf War. *
Operation Overlord Operation Overlord was the codename for the Battle of Normandy, the Allies of World War II, Allied operation that launched the successful liberation of German-occupied Western Front (World War II), Western Europe during World War II. The ope ...
Allied invasion of
Normandy Normandy (; or ) is a geographical and cultural region in northwestern Europe, roughly coextensive with the historical Duchy of Normandy. Normandy comprises Normandy (administrative region), mainland Normandy (a part of France) and insular N ...
*
Operation Rolling Thunder Operation Rolling Thunder was a gradual and sustained aerial bombardment campaign conducted by the United States (U.S.) 2nd Air Division (later Seventh Air Force), U.S. Navy, and Republic of Vietnam Air Force (RVNAF) against North Vietnam from 2 ...
– the sustained bombing campaign conducted against
North Vietnam North Vietnam, officially the Democratic Republic of Vietnam (DRV; ; VNDCCH), was a country in Southeast Asia from 1945 to 1976, with sovereignty fully recognized in 1954 Geneva Conference, 1954. A member of the communist Eastern Bloc, it o ...
by the United States and
South Vietnam South Vietnam, officially the Republic of Vietnam (RVN; , VNCH), was a country in Southeast Asia that existed from 1955 to 1975. It first garnered Diplomatic recognition, international recognition in 1949 as the State of Vietnam within the ...
*
Operation Sea Lion Operation Sea Lion, also written as Operation Sealion (), was Nazi Germany's code name for their planned invasion of the United Kingdom. It was to have taken place during the Battle of Britain, nine months after the start of the Second World ...
– the planned invasion of Britain by
Nazi Germany Nazi Germany, officially known as the German Reich and later the Greater German Reich, was the German Reich, German state between 1933 and 1945, when Adolf Hitler and the Nazi Party controlled the country, transforming it into a Totalit ...
which was never carried out *
Operation Shakti Pokhran-II (''Operation Shakti'') was a series of five nuclear weapon tests conducted by India in May 1998. The bombs were detonated at the Indian Army's Pokhran Test Range in Rajasthan. It was the second instance of nuclear testing conducted ...
– (
Pokhran-II Pokhran-II (''Operation Shakti'') was a series of five nuclear weapon tests conducted by India in May 1998. The bombs were detonated at the Indian Army's Pokhran Test Range in Rajasthan. It was the second instance of nuclear testing conducted ...
) refers to the series of five nuclear bomb test explosions conducted by
India India, officially the Republic of India, is a country in South Asia. It is the List of countries and dependencies by area, seventh-largest country by area; the List of countries by population (United Nations), most populous country since ...
at the
Indian Army The Indian Army (IA) (ISO 15919, ISO: ) is the Land warfare, land-based branch and largest component of the Indian Armed Forces. The President of India is the Commander-in-Chief, Supreme Commander of the Indian Army, and its professional head ...
's
Pokhran Pokhran (official spelling Pokaran; ) is a town and a municipality located 112 km east of Jaisalmer city in the Jaisalmer district of the Indian state of Rajasthan. It is situated in the Thar Desert region. Surrounded by rocks, sand and ...
Test Range in May 1998. It was initiated with the detonation of one fusion and three fission bombs. *
Operation Torch Operation Torch (8–16 November 1942) was an Allies of World War II, Allied invasion of French North Africa during the Second World War. Torch was a compromise operation that met the British objective of securing victory in North Africa whil ...
– British-American invasion of North Africa in 1942 *
Manhattan Project The Manhattan Project was a research and development program undertaken during World War II to produce the first nuclear weapons. It was led by the United States in collaboration with the United Kingdom and Canada. From 1942 to 1946, the ...
(with
Trinity The Trinity (, from 'threefold') is the Christian doctrine concerning the nature of God, which defines one God existing in three, , consubstantial divine persons: God the Father, God the Son (Jesus Christ) and God the Holy Spirit, thr ...
,
Little Boy Little Boy was a type of atomic bomb created by the Manhattan Project during World War II. The name is also often used to describe the specific bomb (L-11) used in the bombing of the Japanese city of Hiroshima by the Boeing B-29 Superfortress ...
, and
Fat Man "Fat Man" (also known as Mark III) was the design of the nuclear weapon the United States used for seven of the first eight nuclear weapons ever detonated in history. It is also the most powerful design to ever be used in warfare. A Fat Man ...
) – U.S.
nuclear weapons A nuclear weapon is an explosive device that derives its destructive force from nuclear reactions, either nuclear fission, fission (fission or atomic bomb) or a combination of fission and nuclear fusion, fusion reactions (thermonuclear weap ...
program during
World War II World War II or the Second World War (1 September 1939 – 2 September 1945) was a World war, global conflict between two coalitions: the Allies of World War II, Allies and the Axis powers. World War II by country, Nearly all of the wo ...
*
MKULTRA MKUltra was an illegal human experimentation program designed and undertaken by the U.S. Central Intelligence Agency (CIA) to develop procedures and identify drugs that could be used during interrogations to weaken individuals and force confes ...
– CIA project (an attempt at mind control technology & technique) *
Smiling Buddha Smiling Buddha (Ministry of External Affairs (India), MEA designation: Pokhran-I) was the code name of India's first successful Nuclear weapons testing, nuclear weapon test on 18 May 1974. The nuclear fission bomb was detonated in the Pokhran#P ...
– (
Pokhran-I Smiling Buddha ( MEA designation: Pokhran-I) was the code name of India's first successful nuclear weapon test on 18 May 1974. The nuclear fission bomb was detonated in the Pokhran Test Range of the Indian Army in Rajasthan. As per the United ...
), was an assigned code name of India's first nuclear weapon explosion, which took place on 18 May 1974. The device was detonated by the Indian Army in the long-constructed army base,
Pokhran Pokhran (official spelling Pokaran; ) is a town and a municipality located 112 km east of Jaisalmer city in the Jaisalmer district of the Indian state of Rajasthan. It is situated in the Thar Desert region. Surrounded by rocks, sand and ...
Test Range. It was also the first confirmed nuclear test by a nation outside the five permanent members of the United Nations Security Council. * Project-706 (with
Chagai-I Chagai-I is the code name of five simultaneous underground nuclear tests conducted by Pakistan at 15:15 hrs Pakistan Standard Time, PKT on 28 May 1998. The tests were performed at Ras Koh Hills in the Chagai District of Balochistan Province. C ...
and Chagai-II) – an early Pakistani secret code name for its nuclear weapons programme during the Cold War *
Tank A tank is an armoured fighting vehicle intended as a primary offensive weapon in front-line ground combat. Tank designs are a balance of heavy firepower, strong armour, and battlefield mobility provided by tracks and a powerful engine; ...
– originally a code name adopted in 1915 by the British government for the first tracked armoured vehicles, which were then under development *
Tube Alloys Tube Alloys was the research and development programme authorised by the United Kingdom, with participation from Canada, to develop nuclear weapons during the Second World War. Starting before the Manhattan Project in the United States, the Bri ...
– British nuclear program * Operation Unthinkable - Winston Churchill's plan to invade the Soviet Union
USSR The Union of Soviet Socialist Republics. (USSR), commonly known as the Soviet Union, was a List of former transcontinental countries#Since 1700, transcontinental country that spanned much of Eurasia from 1922 until Dissolution of the Soviet ...
* SVO, euphemism for 2022
Russian invasion of Ukraine On 24 February 2022, , starting the largest and deadliest war in Europe since World War II, in a major escalation of the Russo-Ukrainian War, conflict between the two countries which began in 2014. The fighting has caused hundreds of thou ...


Commercial

*
AMD Advanced Micro Devices, Inc. (AMD) is an American multinational corporation and technology company headquartered in Santa Clara, California and maintains significant operations in Austin, Texas. AMD is a hardware and fabless company that de ...
have also been naming their CPUs since 90 nm generations under the K8 micro-architecture after the name of cities around the world. For the CPUs under the Phenom brand, the names of stars were used as code names. For
Opteron Opteron is AMD's x86 former server and workstation Microprocessor, processor line, and was the first processor which supported the AMD64 instruction set architecture (known generically as x86-64). It was released on April 22, 2003, with the ''Sl ...
server CPUs and platforms, cities related to the Ferrari Formula One team were used. Mobile platforms are named after birds (except for Puma). For example: ** Single-core
Athlon 64 The Athlon 64 is a ninth-generation, AMD64-architecture microprocessor produced by Advanced Micro Devices (AMD), released on September 23, 2003. It is the third processor to bear the name ''Athlon'', and the immediate successor to the Athlon XP. ...
and
Athlon 64 FX The Athlon 64 is a ninth-generation, AMD64-architecture microprocessor produced by Advanced Micro Devices (AMD), released on September 23, 2003. It is the third processor to bear the name ''Athlon'', and the immediate successor to the Athlon XP. T ...
: Newcastle, Venice, San Diego and Lima ** Dual-core
Athlon 64 X2 The Athlon 64 X2 is the first native dual-core desktop central processing unit (CPU) designed by Advanced Micro Devices (AMD). It was designed from scratch as native dual-core by using an already multi-CPU enabled Athlon 64, joining it with anoth ...
and
Athlon 64 FX The Athlon 64 is a ninth-generation, AMD64-architecture microprocessor produced by Advanced Micro Devices (AMD), released on September 23, 2003. It is the third processor to bear the name ''Athlon'', and the immediate successor to the Athlon XP. T ...
: Manchester, Toledo, Windsor and Brisbane ** Phenom CPUs: Agena (
Beta Centauri Beta Centauri is a triple star system in the southern constellation of Centaurus. It is officially called Hadar (). The Bayer designation of Beta Centauri is Latinised from β Centauri, and abbreviated Beta Cen or β Cen. The syst ...
), Toliman (
Alpha Centauri Alpha Centauri (, α Cen, or Alpha Cen) is a star system in the southern constellation of Centaurus (constellation), Centaurus. It consists of three stars: Rigil Kentaurus (), Toliman (), and Proxima Centauri (). Proxima Centauri ...
), Kuma ( Nu Draconis),
Deneb Deneb () is a blue supergiant star in the constellation of Cygnus. It is the brightest star in the constellation and the 19th brightest in the night sky, with an apparent magnitude slightly varying between +1.21 and +1.29. Deneb is one ...
(Alpha Cygni), Propus (
Eta Geminorum Eta Geminorum (η Geminorum, abbreviated Eta Gem, η Gem), formally named Propus , is a triple star system in the constellation of Gemini. It is a variable star visible to the naked eye, around 380 light years from the Sun. The positi ...
), Heka ( Lambda Orionis), Rana ( Delta Eridani), Regor ( Gamma Velorum) ** Opteron CPUs: Barcelona, Shanghai, São Paulo, Istanbul ** Server platforms: Catalunya, Fiorano, Maranello ** Mobile CPUs: Griffin, Lion, Swift ** Mobile platforms: Kite, Puma, Shrike, Eagle *
Apple An apple is a round, edible fruit produced by an apple tree (''Malus'' spp.). Fruit trees of the orchard or domestic apple (''Malus domestica''), the most widely grown in the genus, are agriculture, cultivated worldwide. The tree originated ...
currently names the major releases of
macOS macOS, previously OS X and originally Mac OS X, is a Unix, Unix-based operating system developed and marketed by Apple Inc., Apple since 2001. It is the current operating system for Apple's Mac (computer), Mac computers. With ...
(previously known as Mac OS X) after major California landmarks, such as Mavericks ( 10.9), Yosemite ( 10.10), El Capitan ( 10.11), Sierra ( 10.12 ), High Sierra ( 10.13) Mojave ( 10.14), Catalina ( 10.15), Big Sur ( 11.0), Monterey ( 12.0), Ventura ( 13.0), and Sonoma ( 14.0). Previous releases were named after
big cats The term "big cat" is typically used to refer to any of the five living members of the genus ''Panthera'', namely the tiger, lion, jaguar, leopard, and snow leopard. All cats descend from the ''Felidae'' family, sharing similar musculature, c ...
: Cheetah ( 10.0), Puma ( 10.1), Jaguar ( 10.2), Panther ( 10.3), Tiger ( 10.4), Leopard ( 10.5), Snow Leopard ( 10.6), Lion ( 10.7), and Mountain Lion ( 10.8). Other former code names include: ** Composers, such as Copland, after composer
Aaron Copland Aaron Copland (, ; November 14, 1900December 2, 1990) was an American composer, critic, writer, teacher, pianist, and conductor of his own and other American music. Copland was referred to by his peers and critics as the "Dean of American Compos ...
; and Gershwin, after
George Gershwin George Gershwin (; born Jacob Gershwine; September 26, 1898 – July 11, 1937) was an American composer and pianist whose compositions spanned jazz, popular music, popular and classical music. Among his best-known works are the songs "Swan ...
. ** Women's names, e.g. Jennifer (rumored for the Macintosh IIx), and
Lisa Lisa or LISA may refer to: People People with the mononym * Lisa (Japanese musician, born 1974), stylized "LISA" * Lisa, stagename of Japanese singer Lisa Komine (born 1978) * Lisa (South Korean singer) (born 1980) * Lisa (Japanese musician, b ...
. ** Varieties of apples, including Cortland for the
Apple IIGS The Apple IIGS (styled as II) is a 16-bit personal computer produced by Apple Inc., Apple Computer beginning in September 1986. It is the fifth and most powerful model of the Apple II family. The "GS" in the name stands for "Graphics and Sound" ...
, and
Macintosh Mac is a brand of personal computers designed and marketed by Apple Inc., Apple since 1984. The name is short for Macintosh (its official name until 1999), a reference to the McIntosh (apple), McIntosh apple. The current product lineup inclu ...
(from McIntosh). ** Carl Sagan, which was used for the Power Macintosh 7100 while it was under development. In 1994 astronomer
Carl Sagan Carl Edward Sagan (; ; November 9, 1934December 20, 1996) was an American astronomer, planetary scientist and science communicator. His best known scientific contribution is his research on the possibility of extraterrestrial life, including e ...
filed two lawsuits against Apple related to that usage, and lost both, reaching an out-of-court settlement with the company. *
Intel Intel Corporation is an American multinational corporation and technology company headquartered in Santa Clara, California, and Delaware General Corporation Law, incorporated in Delaware. Intel designs, manufactures, and sells computer compo ...
often names CPU projects after rivers in the American West, particularly in the state of
Oregon Oregon ( , ) is a U.S. state, state in the Pacific Northwest region of the United States. It is a part of the Western U.S., with the Columbia River delineating much of Oregon's northern boundary with Washington (state), Washington, while t ...
(where most of Intel's CPU projects are designed). Examples include Willamette, Deschutes, Yamhill, Tualatin, and Clackamas. See
List of Intel codenames Intel has historically named integrated circuit (IC) development projects after geographical names of towns, rivers or mountains near the location of the Intel facility responsible for the IC. Many of these are in the American West, particularly ...
. *
Microsoft Microsoft Corporation is an American multinational corporation and technology company, technology conglomerate headquartered in Redmond, Washington. Founded in 1975, the company became influential in the History of personal computers#The ear ...
often names projects (in particular, versions of the
Microsoft Windows Windows is a Product lining, product line of Proprietary software, proprietary graphical user interface, graphical operating systems developed and marketed by Microsoft. It is grouped into families and subfamilies that cater to particular sec ...
operating systems) after place names. Examples include Chicago (
Windows 95 Windows 95 is a consumer-oriented operating system developed by Microsoft and the first of its Windows 9x family of operating systems, released to manufacturing on July 14, 1995, and generally to retail on August 24, 1995. Windows 95 merged ...
), Daytona ( Windows NT 3.5), Memphis (
Windows 98 Windows 98 is a consumer-oriented operating system developed by Microsoft as part of its Windows 9x family of Microsoft Windows operating systems. It was the second operating system in the 9x line, as the successor to Windows 95. It was Software ...
), Whistler (
Windows XP Windows XP is a major release of Microsoft's Windows NT operating system. It was released to manufacturing on August 24, 2001, and later to retail on October 25, 2001. It is a direct successor to Windows 2000 for high-end and business users a ...
) and Longhorn (
Windows Vista Windows Vista is a major release of the Windows NT operating system developed by Microsoft. It was the direct successor to Windows XP, released five years earlier, which was then the longest time span between successive releases of Microsoft W ...
). * For a period of time,
Mozilla Mozilla is a free software community founded in 1998 by members of Netscape. The Mozilla community uses, develops, publishes and supports Mozilla products, thereby promoting free software and open standards. The community is supported institution ...
used code names which are mostly named after
national park A national park is a nature park designated for conservation (ethic), conservation purposes because of unparalleled national natural, historic, or cultural significance. It is an area of natural, semi-natural, or developed land that is protecte ...
s to reference different versions of the
Mozilla Firefox Mozilla Firefox, or simply Firefox, is a free and open-source web browser developed by the Mozilla Foundation and its subsidiary, the Mozilla Corporation. It uses the Gecko rendering engine to display web pages, which implements curren ...
browser: ** Firefox 2.0: Bon Echo ** Firefox 3.0:
Gran Paradiso The Gran Paradiso () or Grand Paradis ( ) is a mountain in the Graian Alps in Italy, located between the Aosta Valley and Piedmont regions. It is located in Gran Paradiso National Park. Etymology The Italian toponym ''Gran Paradiso'' deriv ...
** Firefox 3.5: Shiretoko ** Firefox 3.6: Namoroka ** Firefox 4.0: Tumucumaque ** Firefox pre-beta: Aurora ** Firefox trunk builds: Nightly *
Nintendo is a Japanese Multinational corporation, multinational video game company headquartered in Kyoto. It develops, publishes, and releases both video games and video game consoles. The history of Nintendo began when craftsman Fusajiro Yamauchi ...
often uses code names for new consoles. The best-known is that of
Wii The Wii ( ) is a home video game console developed and marketed by Nintendo. It was released on November 19, 2006, in North America, and in December 2006 for most other regions of the world. It is Nintendo's fifth major home game console, f ...
, which was code-named Revolution for over a year. Others include the
GameCube The is a PowerPC-based home video game console developed and marketed by Nintendo. It was released in Japan on September 14, 2001, in North America on November 18, 2001, in Europe on May 3, 2002, and in Australia on May 17, 2002. It is the suc ...
's code name of Dolphin, the
Game Boy Advance The (GBA) is a 32-bit handheld game console, manufactured by Nintendo, which was released in Japan on March 21, 2001, and to international markets that June. It was later released in mainland China in 2004, under the name iQue Game Boy Advanc ...
's code name of
Atlantis Atlantis () is a fictional island mentioned in Plato's works '' Timaeus'' and ''Critias'' as part of an allegory on the hubris of nations. In the story, Atlantis is described as a naval empire that ruled all Western parts of the known world ...
, the
Nintendo 64 The (N64) is a home video game console developed and marketed by Nintendo. It was released in Japan on June 23, 1996, in North America on September 29, 1996, and in Europe and Australia on March 1, 1997. As the successor to the Super Nintendo E ...
as Project Reality, the DS code name Project Nitro, the
Game Boy Micro The Game Boy Micro is a 32-bit handheld game console made by Nintendo. It was released in Japan on September 13, 2005, and to international markets later that year. It is a miniaturized version of the Game Boy Advance. The console was the last in ...
code name Oxygen, the
Wii U The Wii U ( ) is a home video game console developed by Nintendo as the successor to the Wii. Released in late 2012, it is the first eighth-generation video game console and competed with Microsoft's Xbox One and Sony's PlayStation 4. The W ...
code name Project Cafe, the
Switch In electrical engineering, a switch is an electrical component that can disconnect or connect the conducting path in an electrical circuit, interrupting the electric current or diverting it from one conductor to another. The most common type o ...
code name NX, and the Switch 2 code name Ounce. * ''
Return of the Jedi ''Return of the Jedi'' (also known as ''Star Wars: Episode VI – Return of the Jedi'' is a 1983 American epic space opera film directed by Richard Marquand from a screenplay by Lawrence Kasdan and George Lucas. The sequel to '' The Empire ...
'' was code-named "Blue Harvest" while in production and principal photography. This was reportedly to prevent disruption by fans and the media as well as to avoid
price gouging Price gouging is the practice of increasing the prices of goods, services, or commodities to a level much higher than is considered reasonable or fair by some. This commonly applies to price increases of basic necessities after natural disaste ...
by local merchants and vendors. * '' The Chamber of Secrets'' sequel of the ''Harry Potter'' film series was code-named "Incident of 57th Street" to disguise the production from its increasingly rabid fanbase, who would seek out filming locations and disrupt production.


See also

*
List of computer technology code names Following is a list of code names that have been used to identify computer hardware and software products while in development. In some cases, the code name became the completed product's name, but most of these code names are no longer used once t ...
* CIA cryptonyms *
Code word (figure of speech) A code word is a word or a phrase designed to convey a predetermined meaning to an audience who know the phrase, while remaining inconspicuous to the uninitiated. For example, a public address system may be used to make an announcement asking fo ...
*
List of U.S. Department of Defense and partner code names This is an incomplete list of U.S. Department of Defense code names primarily the two-word series variety. Officially, Arkin (2005) says that there are three types of code name: * ''Nicknames'' – a combination of two separate unassociated and ...
*
List of Microsoft codenames Microsoft codenames are given by Microsoft to products it has in development before these products are given the names by which they appear on store shelves. Many of these products (new versions of Windows in particular) are of major significance ...
* Military Operations listed by code name * Rainbow Codes *
NATO reporting name NATO uses a system of code names, called reporting names, to denote military aircraft and other equipment used by post-Soviet states, former Warsaw Pact countries, China, and other countries. The system assists military communications by providi ...
*
Pseudonym A pseudonym (; ) or alias () is a fictitious name that a person assumes for a particular purpose, which differs from their original or true meaning ( orthonym). This also differs from a new name that entirely or legally replaces an individual's o ...
, the term for a code name when applied to a single person *
Secret Service codename The United States Secret Service uses code names for U.S. presidents, first ladies, and other prominent persons and locations. The use of such names was originally for security purposes and dates to a time when sensitive electronic communica ...
*
Sensitive Compartmented Information Sensitive compartmented information (SCI) is a type of United States classified information concerning or derived from sensitive intelligence sources, methods, or analytical processes. All SCI must be handled within formal access control systems ...
*
Working title A working title is a preliminary name for a product or project. The usage is especially common in film and TV, gaming, music and publishing. It is often styled in trade publications as (wt) and is synonymous with production title and tentative ...


References


External links

* *
Code Names: A Look Behind Secret U.S. Military Plans in the Middle East, Africa and at Home
– Broadcast on ''
Democracy Now! ''Democracy Now!'' is an hour-long TV, radio, and Internet news program based in Manhattan and hosted by journalists Amy Goodman (who also acts as the show's executive producer), Juan González, and Nermeen Shaikh. The show, which airs live ...
'' January 27, 2005. * {{DEFAULTSORT:Code Name Project management Names