| http://www.w3.org/ns/prov#value | - All of these are deployed -- and are often combined -- to carry out the gathering of information to gain unauthorized access to a user's private information or, in some cases, to create identifying documents and other physical media such as duplicate debit and credit cards for the purposes of conducting fraud and theft.
|