Statements (67)
Predicate | Object |
---|---|
gptkbp:instanceOf |
organization
|
gptkbp:appearsIn |
gptkb:Mr._Robot
|
gptkbp:associatedWith |
gptkb:Elliot_Alderson
Whiterose |
gptkbp:createdBy |
gptkb:Sam_Esmail
|
gptkbp:hasCitations |
revenge
|
gptkbp:hasConflictWith |
gptkb:E_Corp
|
gptkbp:hasGoals |
disrupt global systems
|
gptkbp:hasMember |
hackers
Whiterose |
gptkbp:hasTheme |
various underground groups
|
https://www.w3.org/2000/01/rdf-schema#label |
The Dark Army
|
gptkbp:isAssociatedWith |
the concept of control
the concept of digital warfare |
gptkbp:isBasedOn |
gptkb:China
|
gptkbp:isCharacterizedBy |
its secrecy
its advanced technology mysterious operations |
gptkbp:isCitedBy |
governments
|
gptkbp:isConnectedTo |
the character of Whiterose
Dark_Army's_hacking_group |
gptkbp:isCriticizedFor |
its methods
|
gptkbp:isDescribedAs |
a global threat
a cybercriminal organization |
gptkbp:isExpectedTo |
some in the hacking community
|
gptkbp:isFeaturedIn |
multiple_seasons_of_Mr._Robot
|
gptkbp:isInfluencedBy |
real-world hacking groups
|
gptkbp:isInvolvedIn |
data breaches
espionage activities financial crimes political manipulation international incidents the manipulation of public perception the manipulation of information manipulating stock markets political sabotage the creation of chaos the creation of false narratives the destabilization of governments the disruption of communications the orchestration of attacks the theft of sensitive data corporate_espionage |
gptkbp:isKnownFor |
anonymity
its global reach its strategic planning its strategic alliances its ruthless tactics high-profile attacks its elaborate schemes |
gptkbp:isLinkedTo |
the concept of digital anarchy
the_theme_of_control_in_Mr._Robot |
gptkbp:isOrganizedBy |
law enforcement agencies
fsociety |
gptkbp:isPartOf |
the_larger_narrative_of_Mr._Robot
the_overarching_plot_of_Mr._Robot |
gptkbp:isPortrayedAs |
a formidable opponent
a powerful adversary a puppet master a complex organization. a necessary antagonist in the series a shadowy figure in the series a_necessary_evil |
gptkbp:isSymbolicOf |
modern cyber threats
|
gptkbp:operatesIn |
cyber warfare
|
gptkbp:usesTechnology |
hacking
|
gptkbp:utilizes |
social engineering
|