Statements (68)
Predicate | Object |
---|---|
gptkbp:instance_of |
gptkb:Cylon
|
gptkbp:access |
human communications
|
gptkbp:allies |
other Cylons
|
gptkbp:amended_by |
human perceptions
|
gptkbp:are_infiltrated_by |
human resistance
|
gptkbp:are_part_of |
Cylon strategy
Cylon military strategy Cylon infiltration tactics |
gptkbp:are_programmed_to |
follow orders
|
gptkbp:can_be_configured_for |
mimic human behavior
execute complex missions execute sabotage missions |
gptkbp:can_be_used_to |
disguises
manipulate public opinion create chaos gather resources influence human decisions create distrust disrupt human alliances gather political intelligence monitor human activities |
gptkbp:can_detect |
advanced sensors
|
gptkbp:can_gather_data_on |
human military movements
|
gptkbp:can_perform |
gptkb:covert_operations
|
gptkbp:can_sabotage |
human technology
|
gptkbp:communication |
gptkb:Cylon_ships
|
gptkbp:controls |
human emotions
|
gptkbp:costume_design |
gptkb:humans
|
gptkbp:created_by |
gptkb:Cylons
|
gptkbp:deployment |
high-risk areas
various environments |
gptkbp:has_access_to |
Cylon databases
|
gptkbp:has_implications_for |
multiple identities
|
https://www.w3.org/2000/01/rdf-schema#label |
Cylon espionage units
|
gptkbp:initiated_by |
Cylon command
|
gptkbp:is_critical_for |
Cylon operations
Cylon survival |
gptkbp:is_designed_to |
infiltrate human society
|
gptkbp:is_equipped_with |
gptkb:advanced_technology
|
gptkbp:is_essential_for |
Cylon intelligence operations
|
gptkbp:is_involved_in |
strategic planning
information warfare Cylon attacks Cylon expansion efforts |
gptkbp:is_often_compared_to |
highly intelligent
highly skilled undercover agents highly secretive highly adaptable emotionally detached self-aware highly resourceful emotionally manipulative integrated into Cylon forces loyal to Cylon cause trained in deception |
gptkbp:is_subject_to |
gptkb:Cylon_hierarchy
|
gptkbp:is_trained_in |
combat tactics
perform specific tasks blend in |
gptkbp:is_used_in |
gptkb:Battlestar_Galactica
|
gptkbp:is_utilized_in |
gptkb:psychological_warfare
|
gptkbp:is_vulnerable_to |
human detection methods
|
gptkbp:meets |
gptkb:military_intelligence
sensitive information |
gptkbp:purpose |
gather intelligence
|
gptkbp:bfsParent |
gptkb:Cylon_hierarchy
|
gptkbp:bfsLayer |
7
|