Gamer.Site Web Search

Search results

  1. Results From The WOW.Com Content Network
  2. Code name - Wikipedia

    en.wikipedia.org/wiki/Code_name

    A code name, codename, call sign or cryptonym is a code word or name used, sometimes clandestinely, to refer to another name, word, project, or person. Code names are often used for military purposes, or in espionage. They may also be used in industrial counter-espionage to protect secret projects and the like from business rivals, or to give ...

  3. CIA cryptonym - Wikipedia

    en.wikipedia.org/wiki/CIA_cryptonym

    [citation needed] TRIGON, for example, was the code name for Aleksandr Ogorodnik, a member of the Ministry of Foreign Affairs in the former Soviet Union, whom the CIA developed as a spy; HERO was the code name for Col. Oleg Penkovsky, who supplied data on the nuclear readiness of the Soviet Union during the Cuban Missile Crisis of 1962.

  4. List of U.S. Department of Defense and partner code names

    en.wikipedia.org/wiki/List_of_U.S._Department_of...

    Baker Mint – Conducted by the US Army and Malaysia in 1997. Baker Mint 99-1 – Conducted by the US Army and Malaysia in 1999. Trained on military intelligence and photo-surveillance. Baker Mint Lens 99 – Conducted by the US Army and Malaysia in 1999. Baker Mondial V – Conducted by the US Army and Mongolia in 1997.

  5. Secret Service code name - Wikipedia

    en.wikipedia.org/wiki/Secret_Service_code_name

    President John F. Kennedy, codename "Lancer" with First Lady Jacqueline Kennedy, codename "Lace". The United States Secret Service uses code names for U.S. presidents, first ladies, and other prominent persons and locations. [1] The use of such names was originally for security purposes and dates to a time when sensitive electronic ...

  6. Tempest (codename) - Wikipedia

    en.wikipedia.org/wiki/Tempest_(codename)

    Tempest (codename) TEMPEST is a U.S. National Security Agency specification and a NATO certification [1] [2] referring to spying on information systems through leaking emanations, including unintentional radio or electrical signals, sounds, and vibrations. [3] [4] TEMPEST covers both methods to spy upon others and how to shield equipment ...

  7. Joint Electronics Type Designation System - Wikipedia

    en.wikipedia.org/wiki/Joint_Electronics_Type...

    Type designators for definitive Systems, Subsystems, Centers, Central, and Sets (e.g. AN/SPY-1) Type designators for definitive Groups (e.g. OK-198/G) Type designators for definitive Units (e.g. R-1641A/GSQ) Item Name. The Type Designation is used in conjunction with an approved Item Name drawn from the H-6 Item Name Directory. For example:

  8. List of World War II military operations - Wikipedia

    en.wikipedia.org/wiki/List_of_World_War_II...

    Bishop (1945) – covering operation for Dracula. Diplomat (1944) – Allied exercise in preparation for joint operations against the Japanese. Dukedom (1945) – British search and destroy operation for Japanese cruiser Haguro. Exporter (1941) – British and Commonwealth invasion of Vichy French -held Syria.

  9. List of NATO reporting names for fighter aircraft - Wikipedia

    en.wikipedia.org/wiki/List_of_NATO_reporting...

    They have also become known as "NATO reporting names". The ASCC became the Five Eyes Air Force Interoperability Council and no longer has responsibility for generating reporting names. NATO reporting name. Common name. Faceplate. Mikoyan-Gurevich Ye-2. Fagin.