Despite all of these evolutions, it seems impossible to completely escape controversy in naming operations that are, at their core, violent and often messy. DBACHILLES: 1995 effort to support a military coup in Iraq. But German generals added code names to increase operational secrecy and give them a shorthand for referring to individual parts of the hugely complex battles on the Western Front. Any amount helps. By all accounts, Gerald Ford's press secretary had a great sense of humor (he even hosted Saturday Night Live once!). Preceded by. Cold War Soviet Union Deputy Chairman Colonel V. Konoplenko describes the counterintelligence operation known as HORIZON in general terms and tasks the Lithuanian KGB and its branches with specific counterintelligence tasks. 2023 Minute Media - All Rights Reserved. Are Big Consumer Facing Tech Companies Redeemable? By the end of the war, the practice was well-established on all sides, with code names given for everything from post-war Nazi insurgencies (Operation Werwolf) to psychological mail campaigns (Operation Cornflakes) to fake missions altogether (Operation Mincemeat). As it turns out, "mermaid" has long been a nickname for Tripoli, which helps explain Operation Mermaid Dawn. the world is wide, and intelligent thought will readily supply an unlimited number of well-sounding names which do not suggest the character of the operation or disparage it in any way and do not enable some widow or mother to say that her son was killed in an operation called "Bunnyhug" or "Ballyhoo." Although the word could stand for a menace to shipping (in this case, that of Japan), the American code name for the attack on the subtropical island of Okinawa in World War II was Operation Iceberg. "DO NOT allow network traffic, such as C2 packets, to be re-playable." Though OXCART was the only officially assigned government code word, under NICKA, both the contract code word, ARCHANGEL and the A-12s nickname Cygnus, would equally be archived to prevent duplicate use. QKELUSION: West German Social Democratic Party (SPD). TROPIC: Air operations flown over North Korea, China, and the Soviet Union by CAT pilots during the 1950s. Similar to the disclosures from Edward Snowden on the National Security Agencys global cyberspying in 2013, this new document dump is loaded with bizarre, classified code names purportedly used by the CIA that sound like they were borrowed straight from the pages of a pulpy spy thriller. Most are classified at the Secret level, including things as innocuous as a guide to getting started with Microsoft Visual Studio, apparently the preferred development tool of the EDG's Applied Engineering Department (AED). NICKA outlines three distinctive types of monikers that can be used within the DoD: In NICKA, acode word is a single word thats assigned to any program or operational plan that's classified confidential or higher. Details Or fastest delivery Friday, February 17. 2. Although this was started by the Air Standards Co-ordinating Committee (ASCC) formed by the United States, United Kingdom, Canada, Australia, and New Zealand, it was extended throughout NATO as the NATO reporting name for aircraft, rockets and missiles. AEROPLANE) or can be read out as a simple phrase (e.g. The naming of military operations is thought to have begun with the German Empire in the final two years of World War I. MAGPIE: US Army Labor Service Organization. Proper names are good in this field. In fact, some of the comments left by CIA developers in 2013 pointed out how dated the practices were. Words became available for re-use after six months and unused allocations could be reassigned at discretion and according to need. In the intelligence business there are a number of different types of words and phrases to replace real inform. AMTHUG: Fidel Castro, Prime Minister of Cuba 1959-1976. As the world's premier foreign intelligence agency, the work we do at CIA is vital to U.S. national security. However, shortly after the close of the Vietnam War, the Joint Chiefs of Staff (JCS) decided it was time to formalize the use of code words and nicknames by unveiling the Code Word Nickname and Exercise Term System, colloquially known as NICKA. Many operations or programs emerging from within the intelligence community use their own separate naming system. ZR/RIFLE, and sometimes in one sequence, e.g. Sofor the most part, the damage done by the documents isn't what they expose about the CIA's hacking and network espionage capabilities. Jet-powered aircraft received two-syllable names like Foxbat, while propeller aircraft were designated with short names like Bull. Operations in which large numbers of men may lose their lives ought not to be described by code words which imply a boastful or overconfident sentiment. ESSENCE: Guatemalan anti-communist leader. RYBAT: Indicates that the information is very sensitive. "Ever since four years ago, when I was put on the spot and told 'two syllables' and 'it has to start with an s,'" she wrote in a Slate essay in 1997, "I have been cringing in the back seat when identified as 'Smurfette.'". Later moved into. KEYHOLE: Compartment created August 1960 for satellite intelligence. We venture into the dark, fascinating, and often misunderstood world of the Defense Departments code word and nickname generating processes. Dirty words, such as hacker terms, may cause unwarranted scrutiny of the binary file in question.". IVY BELLS: Monitoring of a Soviet communications cable lying on the bottom of the Sea of Okhotsk. That said, the military has a bad habit of not sticking to DoD rules when it comes to publicizing or describing training exercises, often describing them as "operations. That could render a tool dead on arrival if it isn't carefully developed. That means communications between the tool and the command and control server running it should be time-and-date sensitive so that the adversary can't record the traffic and send it back at the tool in an attempt to reverse-engineer what it's doing. The CIA's Leaked Hacking Code Names Are Silly as Hell - Gizmodo Finally, when either an aircraft or a missile was able to be photographed with a hand-held camera, instead of a reconnaissance aircraft, it was given a name like "Flanker" or "Scud" always an English word, as international pilots worldwide are required to learn English. In short, varying the size and time of communications back to a command and control server will make the packets you send over the network less of an announcement of your tool's presence. These names were considered by the Soviets as being like a nickname given to one's unit by the opponents in a battle. We often only know a few months out what our advertising revenue will be, which makes it hard to plan ahead. In 2001, when President Bush launched the War on Terror, the invasion of Afghanistan was initially called Operation Infinite Justice (a name Churchill might have taken issue with). "DO NOT perform Disk I/O operations that will cause the system to become unresponsive to the user or alerting to a System Administrator." 1. The Last Days in Saigon In our example, the words DOOM, IDEAL, MOON, or STEREO would all fit the criteria as being acceptable first words for a DIA nickname. However, it also warns, "This can be a risk vs gain balance that requires careful consideration and should not be haphazardly done with in-development software It is well known that PSP/AV products with a live internet connection can and do upload samples software based varying criteria.". Quite an appropriate name, given that it's in its third decade of use. Contents 1 Introduction JENNIFER: Document control system for Project AZORIAN. First Lady Nancy was only ever called Mrs. Reagan. Central Intelligence Agency | USAGov One emotional goal he mentions is to never have to report to anyone that their son "was killed in an operation called 'Bunnyhug' or 'Ballyhoo'."[5]. 6, Box 47, National Archives, College Park, MD. Bissell, Richard M., Jr., "[] Cable Handling Procedures," SAPC-21143, CIA, Washington, DC, 8 November 1957. Weeping Angel, Brutal Kangaroo and other secret CIA code names - Vox 3 Insane CIA Operations That You've (Probably) Never Heard Of Operation Mockingbird - Wikipedia Code names are frequently chosen to be outside the normal business/domain jargon that the organization uses, in order to not conflict with established terminology. For example, using the now obsolete and unclassified NICKA block assignments, if a program within the Defense Intelligence Agency (DIA) needed to come up with a nickname, one would start by identifying the four numerical blocks assigned to the DIA (15, 33, 51, and 76). 6 Traitorous Cold War Spies | HISTORY WikiLeaks shared nearly 9,000 pages of leaked documents from the Central Intelligence Agency today. The CIA's Secret Quest For Mind Control: Torture, LSD And A - NPR In the context of discussing code words used in the President's Daily Brief (PDB) during the Johnson and Nixon administrations, former CIA Director Richard Helms wrote:[1], "At the time, the highest security classification was known as Top Secret/Code Word. - Mar 8, 2017 10:00 pm UTC. This fascinating 1957 CIA documentary called "The Inquisitive Angel" by Jim Jarboe and Don Downie, tells the story of the beginnings of one of the world's worst-kept secrets, and the now heavily. Because, per Secret Service rules, immediate family members need code names that begin with the same first letter, Meghan wound up with "Peter Sellers." As the name implies, exercise terms are monikers assigned to tests, drills, or exercises, which are assigned for the purpose of emphasizing the event is not an actual real-world operation. Here Is How The Pentagon Comes Up With Code Words And - The Drive The classified operation was informally named Project FF after the CIA's unflattering nickname for Farouk: "Fat Fucker." "Test on all SKUs where possible. Osama Bin Laden Operation Ended With Coded Message 'Geronimo-E KIA' Other code names include Fine Dining, Cutthroat and HarpyEagle. Wilson's camp was concerned that the public wouldn't take well to his being in a new relationship so soon, and his protectiontook to referring toEdithby the decidedly unsexycode name"Grandma. We're not really sure why Reagan's Attorney General from 1981-1985 was called "Flivver," but it's not a terribly flattering termit's slang for a cheap car in poor condition. PSP is an acronym for "personal security products"one previously referenced in the NSA tools exposed by the Shadowbrokers dump. Protection of nature of Agency's functions 3508. Although the rebels might have not given us the best name to bandy around in the press, it certainly fared better than Operation Ripper (Part II: The Final Rip) would have. When the congressional inquiry got under way in 1976, the panel's most energetic investigators zeroed in on the CIA's anti-Castro operation as the nest from which the JFK plot had sprungand . In most cases, names were chosen by mid-level officers in charge of planning, but frequent interventions took place when tagging significant campaigns. Below are some of the more entertaining monikers that have been chosen over the years. We are the Nation's first line of defense - CIA Winston Churchill, who personally named the Normandy invasion, warned against the dangers of revelatory code names. But atiny fraction of the data is highly classified, according to document marks. "DO NOT RELY ON THE OPERATING SYSTEM TO DO THIS UPON TERMINATION OF EXECUTION.". Project JBEDICT: Tripartite Stay-Behind project. DO NOT leave around stale network connections." Joseph Stalin, whose last name means "man of steel", was given the name "GLYPTIC", meaning "an image carved out of stone". The coup was to be organized in an operation referred to by the code name AJAX and led by Kermit Roosevelt, the CIA's top Middle East operations officer at the time (Woodhouse, pp. "Geronimo", the code name for Osama bin Laden during, This page was last edited on 22 June 2023, at 05:51. as a consequence. Blackbriar: a secret training programme from the Bourne novels and films, or an NSA program gathering phone call data from mobile operators? Whereas NICKA only assigns single-word code words, by policy, nicknames must be comprised of two separate words. Names of living people--Ministers and Commanders--should be avoided. Then in 2003, the presidents press secretary referred to the Iraq war as Operation Iraqi Liberation, providing fodder for conspiracy theorists everywhere with the acronym O.I.L. How Military Operations Get Their Code Names | Mental Floss Random lists of names were issued to users in alphabetical blocks of ten words and were selected as required. So lets talk about those code names, in some particular order. When the goal of the project is to develop one or more commercial. Out of the first batch of just over 1,000 documents, there are two paragraphs marked at that level. It wasnt until 1989 and the invasion of Panama that a new trend was born. Once, when a member of his security detail, Larry Rowlett, was asked if he ever called the president "Rawhide" to his face, he replied, "Yeshe was always very congenial and just kind of one of the guys. It was only after the Joint Chiefs nixed Peninsula Shield, then Crescent Shield, that Operation Desert Shield (and then Desert Storm) became a reality. 1208, title VI, 601(b), 68 Stat. Global War on Terrorism, though often applied solely to operations in Afghanistan), Iraqi Freedom, (the 2003 invasion of Iraq and subsequent occupation), or Inherent Resolve, (the U.S. military intervention in Iraq and Syria to combat ISIS), are not merely nicknames, these phrases are meant to inspire and express the overarching intent of military involvement. For example, Enduring Freedom, (the U.S. . However, given the Department of Defenses fondness of rigid structure, it should be no surprise that when it comes to nicknames, theres a policy for them, too. DO proper cleanup of network connections. You also don't want something inappropriately glib, either because it's not macho enough (the US invasion of Grenada was briefly named "Blue Spoon") or sends the wrong message, such as the unfortunately named Korean War-era plan "Operation Killer.". Must be why the CIA calls these tools magic. "It was the intelligence coup of the century," the CIA . ", "Peter Sellers" was my secret service nickname and has been my pseudonym at hotels for YEARS (whenever a crazy person threatening my family), The former Speaker of the House had a Secret Service detail when he was a presidential candidate in 2012 and chose his code name based on his love of dinosaurs. When more information resulted in knowing a bit about what a missile was used for, it would be given a designation like "SS-6", for the sixth surface-to-surface missile design reported. And some of the chestnuts on overall coding practices include: AED's developers were warned against doing things in developing tools that would make it easier for an adversary to figure out where the tool, implant, or malware they developed had come from. PBHISTORY: CIA project to gather and analyze documents from the Arbenz government in Guatemala that would incriminate Arbenz as a communist. Code Words Nicknames Exercise Terms The two-word names of highly regarded secret programs like Tacit Blue, which was centered around Northrop's very stealthy "Whale" demonstrator (seen above),. The Soviets did not like the Sukhoi Su-25 getting the code name "Frogfoot". BYEMAN: A retired control system covering certain overhead collection systems, including CORONA and OXCART. Central Intelligence Agency - Wikipedia As we briefly mentioned, when it comes to the designation of nicknames, NICKA offers some flexibility and gives military commanders the ability to be a little more creative. [1] This procedure was coordinated with the United States when America entered the war. Exotic words, trite expressions or well-known commercial trademarks. Scared tech workers are scrambling to reinvent themselves as AI experts, How Frog and Toad became queer anti-capitalist cottagecore icons. By submitting your email, you agree to our, Weeping Angel, Brutal Kangaroo and other secret CIA code names from the WikiLeaks surveillance leak, The Supreme Court decides not to destroy democracy in the United States, A desert fungus that infects humans is spreading, Sign up for the Something went wrong. ODACID: United States Department of State/, ODEARL: United States Department of Defense, ODYOKE: Federal government of the United States. "Even the female agents, who end up getting called Fatgirls.". "My Secret Service detail loved the code name," Bolten once said. Military operation code names can be tricky to pull off. Each component agency in the Department of Defense are assigned blocks of code words by the Joint Staff. Any two-word combination voice call sign found in the Joint Army Navy Air Force Publication Call Sign Book (JANAP-119). Examples from publications by former CIA personnel show that the terms "code name" and "cryptonym" can refer to the names of operations as well as to individual persons. "[4] A secret joint program between the Mexico City CIA station and the Mexican secret police to wiretap the Soviet and Cuban embassies was code-named ENVOY.[5]. Operation Mockingbird is an alleged large-scale program of the United States Central Intelligence Agency (CIA) that began in the early years of the Cold War and attempted to manipulate domestic American news media organizations for propaganda purposes. This ensures that they performed consistently and didn't give up any particular time zone bias. It also sounds like an episode of Ren and Stimpy. "DO NOT write plain-text collection data to disk," because that could get awkward fast. Include the words, Project, Exercise, or Operation., Words that may be used correctly either as a single word or as two words, such as moonlight.. And though she has lifetime Secret Service protection as a former First Lady, she would have needed it anyway in her high-profile roles as secretary of state and presidential candidate. An Army Ranger who was killed in Afghanistan earlier this month was part of a secret program that helps the CIA hunt down militant leaders, according to three former . Rounding out NICKAs trifecta of officially sanctioned phrases, are exercise terms.
Occupation Is What Type Of Variable In Statistics,
Most Reliable Wake Boat Brands For The Money,
Kathy Reichs Stand-alone Books,
Big Trials In America Right Now,
Articles C