This HTML5 document contains 31 embedded RDF statements represented using HTML+Microdata notation.

The embedded RDF content will be recognized by any processor of HTML5 Microdata.

PrefixNamespace IRI
n28http://dbkwik.webdatacommons.org/resource/isSwO416qsV3_RSh6kU7Ig==
n7http://dbkwik.webdatacommons.org/ontology/
n15http://dbkwik.webdatacommons.org/resource/KJSgh2Ffds14Ne_RZLlpOQ==
n3http://dbkwik.webdatacommons.org/resource/Y8xgfvNftRDOVVq_MO6sqQ==
n31http://dbkwik.webdatacommons.org/resource/F9Zi42v4TovYoFgJyL4i_A==
n32http://dbkwik.webdatacommons.org/resource/DT6ZA4IwIPOL7daegGCiyQ==
n19http://dbkwik.webdatacommons.org/resource/VO1zrZDBlZWs6vsct09JqQ==
n24http://dbkwik.webdatacommons.org/resource/kB6sDaJpKkP7ooVoYVQg7g==
n12http://dbkwik.webdatacommons.org/resource/8s6evwQpNxS87NSsyn6ZKw==
n13http://dbkwik.webdatacommons.org/resource/S2OU4qMtmtiyPykqt_aSWA==
n26http://dbkwik.webdatacommons.org/resource/C8izKoP-oF0ErXMtgNeESg==
n18http://dbkwik.webdatacommons.org/resource/HHwY06lwddcNG_y9R5GmhQ==
rdfshttp://www.w3.org/2000/01/rdf-schema#
n6http://dbkwik.webdatacommons.org/resource/1sN1GpqYACvUmuD9eWfIPA==
n23http://dbkwik.webdatacommons.org/resource/26-2CMDDbet6slGuzG3dCA==
n20http://dbkwik.webdatacommons.org/resource/YfALRO47b4wTiS5b6KspPg==
n25http://dbkwik.webdatacommons.org/resource/u9CoJLveKa3hQjUy9NRJUg==
n5http://dbkwik.webdatacommons.org/resource/ZB0DzDzU3BHEflTttFtdLA==
n14http://dbkwik.webdatacommons.org/resource/WGeegpUA6BxRRKND7eEMUQ==
n16http://dbkwik.webdatacommons.org/resource/8jKHd--HKCG-HFraIj4mGg==
n30http://dbkwik.webdatacommons.org/resource/D33kE5_XtJngdF7qmJrjug==
rdfhttp://www.w3.org/1999/02/22-rdf-syntax-ns#
n27http://dbkwik.webdatacommons.org/resource/PmZay_pA85VyH0du6MThdA==
n34http://dbkwik.webdatacommons.org/resource/COJUcWKhbOjbZtAPu0HmjQ==
n2http://dbkwik.webdatacommons.org/resource/KfUtYa-ystj6EBDFHjQ83g==
n21http://dbkwik.webdatacommons.org/resource/b3WwsOfqgSAk3z7GeJHSpA==
n22http://dbkwik.webdatacommons.org/resource/KnYB9hQ0gxsgEydD0jsWBw==
n33http://dbkwik.webdatacommons.org/resource/JkwpzT9xuqphTOKCsZWMPg==
n11http://dbkwik.webdatacommons.org/resource/J1uNi6fP8xSumlGfpf-avg==
n10http://dbkwik.webdatacommons.org/resource/gENZalaX0SdPvpR0mOHFog==
xsdhhttp://www.w3.org/2001/XMLSchema#
n29http://dbkwik.webdatacommons.org/resource/m5268hoCy0FopVdhvAYd7w==
n4http://dbkwik.webdatacommons.org/cnc/property/
n17http://dbkwik.webdatacommons.org/resource/mAk6_YiXfJ5k-WFAP4X_Ew==
n8http://dbkwik.webdatacommons.org/resource/6f3-8P6yYH9voy_YDegOjw==
Subject Item
n2:
rdfs:label
Spy (Red Alert 2)
rdfs:comment
Spies were deployed directly in battle for the first time by the Allies during the Second World War, though usually they were used as intelligence gathering operatives behind enemy lines or in enemy command centers and bases. The deployment of battlefield spies by the Allies continued during Third World War and its second iteration, providing Allied commanders with valuable information about plans and vulnerabilities of Soviet and Yuri bases. The spy was also used as a sabotage unit to wreak havoc in enemy bases. A spy would disguise himself as an enemy soldier to pass unnoticed to most other units and infiltrate buildings, sabotaging them or stealing enemy resources and technologies from them.
n23:
4
n34:
Flak
n18:
20
n11:
5
n19:
n20:
n3:
Machine gun Makeup kit Usually unarmed
n10:
Light
n4:wikiPageUsesTemplate
n5: n12: n14: n17: n28: n32:
n6:
6
n30:
n31:
n15:
n16:
n22:
3
n24:
Infiltrator
n29:
Spy
n13:
autosize
n8:
Disguise
n25:
1000.0
n26:
9
n33:
100
n27:
40.0
n21:
No
n7:abstract
Spies were deployed directly in battle for the first time by the Allies during the Second World War, though usually they were used as intelligence gathering operatives behind enemy lines or in enemy command centers and bases. The deployment of battlefield spies by the Allies continued during Third World War and its second iteration, providing Allied commanders with valuable information about plans and vulnerabilities of Soviet and Yuri bases. The spy was also used as a sabotage unit to wreak havoc in enemy bases. A spy would disguise himself as an enemy soldier to pass unnoticed to most other units and infiltrate buildings, sabotaging them or stealing enemy resources and technologies from them. Spies were vital to the Allies' victory, especially during Operation Dark Night, where they proved themselves valuable when it came to sabotaging reactors powering a nuclear facility in Soviet Poland. The Soviets were not ignorant of the Allies' use of the spy and trained attack dogs. These dogs were trained to know the scent of base personnel and if they noticed a strange smell among the Soviet men, they would attack and kill the Allied spy. On the other hand, Yuri uses his mind-control units and towers (including the Psychic radar) to detect spies. For some reason, Spies were not issued any weapons, even basic pistols or knives, so they had to overcome the enemy defenses completely by the use for stealth and discretion.