Statements (75)
Predicate | Object |
---|---|
gptkbp:instance_of |
gptkb:program
|
gptkbp:aims_to |
enhance national security
|
gptkbp:associated_with |
gptkb:intelligence_gathering
|
gptkbp:collaborates_with |
other intelligence agencies
|
gptkbp:developed_by |
gptkb:CIA
|
gptkbp:has_collaborated_with |
private sector companies
|
gptkbp:has_goal |
disrupt enemy operations
|
gptkbp:has_impact_on |
gptkb:international_relations
|
https://www.w3.org/2000/01/rdf-schema#label |
CIA's AURORA program
|
gptkbp:involves |
data analysis
surveillance |
gptkbp:is_collaborative_with |
gptkb:international_partners
defense contractors foreign intelligence services |
gptkbp:is_criticized_for |
privacy concerns
lack of transparency |
gptkbp:is_critiqued_by |
civil liberties organizations
|
gptkbp:is_designed_to |
counter cyber threats
|
gptkbp:is_discussed_in |
gptkb:academic_research
|
gptkbp:is_documented_in |
government publications
intelligence assessments intelligence briefings classified reports |
gptkbp:is_evaluated_by |
gptkb:Compliance_Management
effectiveness risk management resource allocation internal audits effectiveness metrics external audits operational success |
gptkbp:is_focused_on |
data protection
emerging technologies threat mitigation strategic intelligence |
gptkbp:is_influenced_by |
technological advancements
|
gptkbp:is_informed_by |
policy analysis
threat assessments intelligence analysis |
gptkbp:is_integrated_with |
other intelligence tools
|
gptkbp:is_involved_in |
counterintelligence efforts
|
gptkbp:is_linked_to |
national security threats
national defense strategies cyber espionage efforts |
gptkbp:is_part_of |
gptkb:covert_operations
strategic initiatives national security policy intelligence gathering efforts cyber defense strategy intelligence community operations national intelligence strategy cyber warfare strategy CIA's broader strategy |
gptkbp:is_related_to |
cybersecurity initiatives
|
gptkbp:is_subject_to |
gptkb:legal_frameworks
government oversight |
gptkbp:is_supported_by |
funding
technological infrastructure |
gptkbp:is_utilized_by |
CIA operatives
|
gptkbp:is_utilized_for |
strategic planning
information warfare covert actions |
gptkbp:is_utilized_in |
gptkb:intelligence_operations
field operations |
gptkbp:operates_in |
cyber domain
|
gptkbp:operational_since |
2000s
|
gptkbp:originated_in |
more sophisticated programs
|
gptkbp:purpose |
gptkb:cyber_operations
|
gptkbp:reported_by |
gptkb:government_officials
gptkb:media_outlets |
gptkbp:targets |
foreign adversaries
|
gptkbp:uses |
gptkb:advanced_technology
|
gptkbp:utilizes |
cyber tools
|
gptkbp:bfsParent |
gptkb:Lockheed_Martin_RQ-170_Sentinel
|
gptkbp:bfsLayer |
6
|