![]() ![]() Samaritan has on several occasions influenced the ISA to further its goals: on one occasion, it changes to objectives of ISA operatives to secure a lethal virus (“ Honor Among Thieves”) and on another, it manipulated information to frame innocent men it wanted dead, as terrorists. Therefore, operatives are simply given action orders, green-lit by Control, and investigation on their behalf isn't needed. (“ Proteus”) (“ Honor Among Thieves”) The information Samaritan gives is far more comprehensive and operatives can access it from a mainframe inside the Pentagon. As far as they are concerned, "Research" is a secret group working out of an unknown location.Īfter the government is forced to officially sever ties with the Machine, Samaritan replaces it, creating Research 2.0 in collaboration with Decima. ISA Operatives aren't told of the true nature of "Research" and speculate the numbers originate in Guantanamo or other places after torture. ![]() It sends the ISA the Social Security numbers of persons of threats relevant to national security. "Research" is the program's codename for the Machine. (“ Relevance”) It is later used to pay Decima for access to Samaritan. This, along with the ISA's operations comprise the "Program". A project that included the Machine's development and the construction, led by Daniel Aquino, of a facility to house it. Large amounts of it were coded to "Northern Lights". The ISA has a budget that stretches back over several years. ![]() According to Reese, it is "an obscure unit that does black-ops so dark, technically they don't exist". The ISA's main task is to eliminate threats to national security.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |