Statements (122)
Predicate | Object |
---|---|
gptkbp:instance_of |
gptkb:military_organization
gptkb:organization |
gptkbp:affiliated_with |
gptkb:APT10
|
gptkbp:allies |
Dark Army members
|
gptkbp:appears_in |
gptkb:Mr._Robot
|
gptkbp:associated_with |
gptkb:Elliot_Alderson
cyber warfare |
gptkbp:created_by |
gptkb:Sam_Esmail
|
gptkbp:engages_in |
espionage
|
gptkbp:has_a_website |
gptkb:Chinese_intelligence_services
|
gptkbp:has_been_accused_of |
stealing trade secrets
|
gptkbp:has_been_identified_by |
security researchers
|
gptkbp:has_collaborated_with |
other hacking groups
|
gptkbp:has_conflict_with |
government agencies
|
gptkbp:has_goal |
anarchy
|
gptkbp:has_influence_on |
gptkb:international_relations
|
gptkbp:has_members |
gptkb:fsociety
|
gptkbp:has_performed_at |
cyber espionage campaigns
|
https://www.w3.org/2000/01/rdf-schema#label |
The Dark Army
|
gptkbp:is_active_against |
foreign entities
|
gptkbp:is_active_in |
sensitive sectors
|
gptkbp:is_associated_with |
the character Angela Moss
the character Darlene Alderson the character Irving |
gptkbp:is_based_in |
gptkb:China
|
gptkbp:is_believed_to |
have state support
|
gptkbp:is_characterized_by |
its ruthlessness
mysterious operations its loyalty to its cause |
gptkbp:is_connected_to |
the concept of surveillance
|
gptkbp:is_considered |
gptkb:advanced_persistent_threat
a symbol of resistance a threat to society a sophisticated adversary threat to cybersecurity a significant threat to national security a major player in the series a key player in global cyber espionage. a major player in cybercrime a major threat to privacy |
gptkbp:is_criticized_for |
its methods
|
gptkbp:is_described_as |
a formidable opponent
a revolutionary force a digital army a shadowy group a tech-savvy group |
gptkbp:is_featured_in |
multiple episodes of Mr. Robot
the series finale of Mr. Robot |
gptkbp:is_influenced_by |
real-world hacktivism
|
gptkbp:is_involved_in |
data breaches
intellectual property theft cyber warfare political activism the struggle for power information warfare corporate espionage the fight against oppression international incidents supply chain attacks financial theft political hacking hacking operations the manipulation of information the plot of Mr. Robot the rise of hacktivism theft of personal information |
gptkbp:is_known_for |
data breaches
sophisticated techniques cyber attacks its secrecy its global reach its strategic planning exploiting vulnerabilities its advanced technology disrupting services its recruitment tactics targeting sensitive data using zero-day exploits |
gptkbp:is_known_to |
manipulate events
|
gptkbp:is_led_by |
gptkb:Whiterose
|
gptkbp:is_linked_to |
the concept of freedom
the concept of chaos the theme of control various cyber incidents the idea of digital freedom various cyber attacks |
gptkbp:is_monitored_by |
government agencies
|
gptkbp:is_motivated_by |
ideological beliefs
|
gptkbp:is_opposed_by |
gptkb:E_Corp
capitalism government control |
gptkbp:is_part_of |
gptkb:Chinese_state-sponsored_hacking
global cyber threat landscape the conflict in Mr. Robot the larger narrative of Mr. Robot |
gptkbp:is_portrayed_as |
a global network
a powerful entity a clandestine organization |
gptkbp:is_recognized_by |
its logo
|
gptkbp:is_recognized_for |
its impact on the narrative
|
gptkbp:is_symbolic_of |
digital resistance
|
gptkbp:is_targeted_at |
gptkb:governments
corporations Japanese companies U. S. government agencies |
gptkbp:known_for |
hacking activities
|
gptkbp:operates_in |
cyberspace
|
gptkbp:operational_since |
2010s
|
gptkbp:origin |
gptkb:China
|
gptkbp:reported_by |
cybersecurity firms
target critical infrastructure have a large network of operatives target academic institutions use social engineering tactics |
gptkbp:targets |
defense contractors
|
gptkbp:type |
gptkb:Espionage
|
gptkbp:uses |
gptkb:virus
encryption techniques |
gptkbp:utilizes |
social engineering
spear phishing |
gptkbp:bfsParent |
gptkb:Mr._Robot
|
gptkbp:bfsLayer |
4
|