By the end of 1935 he was fully operational, with the cryptonym Dionysus. From Wordnik.com. [Final Resting Place of The Pen] Reference
The agent's cryptonym was Night Stock, and his real name was Marcel Tiraque. From Wordnik.com. [Final Resting Place of The Pen] Reference
It was not the mark of the infamous “Mendez”, but some newcomer with the lame cryptonym of “Radar”. From Wordnik.com. [Approaching grumpy old man status | Letter Never Sent] Reference
Alex was the cryptonym for Colonel Oleg Vladimirovich Penkovsky of the GRU, a man who had provided the British and American intelligence services with information beyond price. From Wordnik.com. [Final Resting Place of The Pen] Reference
Once, sixteen tempo engineers, summarily banished to Asia Minor, decided to build a time main to escape, under the guise of constructing some sort of tower or dome; the name given to it was the cryptonym-password of their plot Banished Asian Builder's Escape League. From Wordnik.com. [Archive 2001-04-01] Reference
If you don't mind my parsing the cryptonym, the habit of every Potter reader. From Wordnik.com. [HogwartsProfessor.com] Reference
Maclean and had the crptonym "Homer" and one was named Guy Burgess that had the cryptonym. From Wordnik.com. [Security Bloggers Network] Reference
The American operation came to be known as Operation Ajax in America, after its CIA cryptonym, and as the. From Wordnik.com. [WN.com - Articles related to Centre to compensate States for their revenue losses: Pranab Mukherjee] Reference
America, after its CIA cryptonym, and as the 28 Mordad 1332 coup in Iran, after its date on the Iranian calendar. From Wordnik.com. [WN.com - Articles related to Centre to compensate States for their revenue losses: Pranab Mukherjee] Reference
Preliminary interrogation, surveillance, case officer, courier, and cryptonym are official terms and transparent in the sense that they might be used in any context. From Wordnik.com. [VERBATIM: The Language Quarterly Vol IX No 2] Reference
A code name or cryptonym is a word or name used clandestinely to refer to another name or word, in order to protect secret projects and the like from business rivals. From Wordnik.com. [xml's Blinklist.com] Reference
He sometimes borrows rather dry terms like fieldman, deskman, preliminary interrogation, surveillance, case officer, operational subsistence, courier, and cryptonym -- all of which are literal and transparent enough for the layman to understand. From Wordnik.com. [VERBATIM: The Language Quarterly Vol VIII No 4] Reference
An East German agent resident in Leipzig would have to be "exfiltrated" to be brought out permanently, as opposed to coming out for a short visit. fieldman, deskman, preliminary interrogation, surveillance, case officer, operational subsistence, courier, and cryptonym are lumped together by Mr. Lasseter as "literal and transparent enough for the layman to understand.". From Wordnik.com. [VERBATIM: The Language Quarterly Vol IX No 2] Reference
Whereas an illfitting cryptonym can stimulate insights by wrenching one's mind-set out of context. ". From Wordnik.com. [Armageddon Now?] Reference
The man's cryptonym is Dionysus. From Wordnik.com. [Final Resting Place of The Pen] Reference
The effort was absorbed into the MKULTRA program and the QKHILLTOP cryptonym became obsolete. ". From Wordnik.com. [Comments for Damn Interesting] Reference
Original cryptonym Webpage – http://web. archive.org/web/20000301191546/http://www. cryptonym.com/. From Wordnik.com. [Stop ACTA NOW !] Reference
"QKHILLTOP was a cryptonym assigned in 1954 to a project to study Chinese Communist brainwashing techniques and to develop interrogation techniques. From Wordnik.com. [Comments for Damn Interesting] Reference
"preliminary" interrogation, or the precise meanings of cryptonym, pseudonym, and alias, which are three totally different animals, with no overlap whatsover. From Wordnik.com. [VERBATIM: The Language Quarterly Vol IX No 2] Reference
Radiance and Rosebud, the Secret Service code names for President Obama's daughters): cryptonym the view that grammatical constructions do not have strict boundaries but occur on a continuum: squish. From Wordnik.com. [About.com Grammar & Composition] Reference
The story (or lack of a story) of its failure to sweep the world (it was only downloaded 574,964 times) can be found on http://www. cryptonym.com/which used to be the site of the famed ReplaceNsaKey. zip (83. 57K) file that could be used to subvert the capability inside the Microsoft ADVAPI. DLL file. From Wordnik.com. [Stop ACTA NOW !] Reference
LearnThatWord and the Open Dictionary of English are programs by LearnThat Foundation, a 501(c)3 nonprofit.
Questions? Feedback? We want to hear from you!
Email us
or click here for instant support.
Copyright © 2005 and after - LearnThat Foundation. Patents pending.