About: CIP device   Sponge Permalink

An Entity of Type : owl:Thing, within Data Space : 134.155.108.49:8890 associated with source dataset(s)

The CIP device was a module specifically designed to breach the Classified Infrastructure Portal firewall. The CIP firewall protected most major U.S. infrastructure (telecommunication, transportation, and power grids); if it were breached, they would all be vulnerable to hacking. It was created by a captured Michael Latham at the behest of Sangalan war criminal Iké Dubaku. The device was used to perpetrate two terrorist attacks against the United States in an attempt to coerce President Allison Taylor into calling off the US invasion of Sangala. However, the device was destroyed during an undercover operation to capture Dubaku.

AttributesValues
rdfs:label
  • CIP device
rdfs:comment
  • The CIP device was a module specifically designed to breach the Classified Infrastructure Portal firewall. The CIP firewall protected most major U.S. infrastructure (telecommunication, transportation, and power grids); if it were breached, they would all be vulnerable to hacking. It was created by a captured Michael Latham at the behest of Sangalan war criminal Iké Dubaku. The device was used to perpetrate two terrorist attacks against the United States in an attempt to coerce President Allison Taylor into calling off the US invasion of Sangala. However, the device was destroyed during an undercover operation to capture Dubaku.
dcterms:subject
LastSeen
  • "Day 7: 2:00pm-3:00pm"
dbkwik:24/property/wikiPageUsesTemplate
CreatedBy
usedby
firstseen
  • "Day 7: 8:00am-9:00am"
Seasons
  • 7(xsd:integer)
abstract
  • The CIP device was a module specifically designed to breach the Classified Infrastructure Portal firewall. The CIP firewall protected most major U.S. infrastructure (telecommunication, transportation, and power grids); if it were breached, they would all be vulnerable to hacking. It was created by a captured Michael Latham at the behest of Sangalan war criminal Iké Dubaku. The device was used to perpetrate two terrorist attacks against the United States in an attempt to coerce President Allison Taylor into calling off the US invasion of Sangala. However, the device was destroyed during an undercover operation to capture Dubaku.
Alternative Linked Data Views: ODE     Raw Data in: CXML | CSV | RDF ( N-Triples N3/Turtle JSON XML ) | OData ( Atom JSON ) | Microdata ( JSON HTML) | JSON-LD    About   
This material is Open Knowledge   W3C Semantic Web Technology [RDF Data] Valid XHTML + RDFa
OpenLink Virtuoso version 07.20.3217, on Linux (x86_64-pc-linux-gnu), Standard Edition
Data on this page belongs to its respective rights holders.
Virtuoso Faceted Browser Copyright © 2009-2012 OpenLink Software