About: Infiltration protocol   Sponge Permalink

An Entity of Type : owl:Thing, within Data Space : 134.155.108.49:8890 associated with source dataset(s)

The Decepticons in the IDW continuity, under Megatron's command, follow a strict infiltration protocol -- a carefully staged process of destabilizing and conquering inhabited planets. The staged conquest is highly secretive, with soldiers under strict orders not to break cover till late in process. Though brutal in its later phases, this tactic is still constrained by the Code of Interplanetary Conflict.

AttributesValues
rdfs:label
  • Infiltration protocol
rdfs:comment
  • The Decepticons in the IDW continuity, under Megatron's command, follow a strict infiltration protocol -- a carefully staged process of destabilizing and conquering inhabited planets. The staged conquest is highly secretive, with soldiers under strict orders not to break cover till late in process. Though brutal in its later phases, this tactic is still constrained by the Code of Interplanetary Conflict.
dcterms:subject
dbkwik:transformer...iPageUsesTemplate
abstract
  • The Decepticons in the IDW continuity, under Megatron's command, follow a strict infiltration protocol -- a carefully staged process of destabilizing and conquering inhabited planets. The staged conquest is highly secretive, with soldiers under strict orders not to break cover till late in process. Though brutal in its later phases, this tactic is still constrained by the Code of Interplanetary Conflict.
Alternative Linked Data Views: ODE     Raw Data in: CXML | CSV | RDF ( N-Triples N3/Turtle JSON XML ) | OData ( Atom JSON ) | Microdata ( JSON HTML) | JSON-LD    About   
This material is Open Knowledge   W3C Semantic Web Technology [RDF Data] Valid XHTML + RDFa
OpenLink Virtuoso version 07.20.3217, on Linux (x86_64-pc-linux-gnu), Standard Edition
Data on this page belongs to its respective rights holders.
Virtuoso Faceted Browser Copyright © 2009-2012 OpenLink Software