Statements (65)
Predicate | Object |
---|---|
gptkbp:instance_of |
gptkb:government_agency
|
gptkbp:bfsLayer |
6
|
gptkbp:bfsParent |
gptkb:Helghast
|
gptkbp:analyzes |
gptkb:Database_Management_System
|
gptkbp:collaborates_with |
Helghast military
|
gptkbp:collects |
gptkb:military_base
|
gptkbp:conducts |
Interrogations
|
gptkbp:develops |
Intelligence reports
|
gptkbp:employs |
gptkb:government_agency
|
gptkbp:focuses_on |
gptkb:Detective
|
gptkbp:has |
gptkb:military_base
Training programs Field agents |
https://www.w3.org/2000/01/rdf-schema#label |
Helghast Intelligence
|
gptkbp:is_associated_with |
Helghast military operations
|
gptkbp:is_considered |
gptkb:Ruthless
A key player A vital asset A shadowy organization A threat to enemies |
gptkbp:is_criticized_for |
gptkb:Human_rights_violations
|
gptkbp:is_engaged_in |
Cyber operations
|
gptkbp:is_involved_in |
Counter-terrorism
Data collection Strategic planning Military operations Threat detection Intelligence sharing Field operations Operational planning Covert missions Surveillance operations Information warfare Intelligence analysis Propaganda efforts Recruitment of spies Political espionage Counter-espionage efforts |
gptkbp:is_known_for |
gptkb:Secrecy
Covert operations High-tech surveillance Intelligence operations Intimidation tactics Aggressive tactics Brutal tactics Strategic intelligence gathering Manipulation of information |
gptkbp:is_opposed_by |
gptkb:ISA
|
gptkbp:is_part_of |
Helghast government
Helghast military structure |
gptkbp:is_subject_to |
International scrutiny
|
gptkbp:is_tasked_with |
gptkb:National_security
Threat assessment Monitoring threats |
gptkbp:is_utilized_in |
gptkb:Helghast_forces
|
gptkbp:led_to |
gptkb:Film_Director
|
gptkbp:maintains |
Network of informants
|
gptkbp:operates_in |
gptkb:Helghan
|
gptkbp:operates_under |
Helghast regime
|
gptkbp:part_of |
gptkb:Helghast
|
gptkbp:provides_access_to |
Classified information
|
gptkbp:reports_to |
Helghast High Command
|
gptkbp:responsible_for |
gptkb:government_agency
|
gptkbp:uses |
Surveillance methods
|
gptkbp:utilizes |
Advanced technology
|