http://www.w3.org/ns/prov#value | - While much of the attention regarding leaked NSA documents has been centered around actual Agency espionage and data collection operations, there has also been a wealth of information made available regarding the kinds of tools and software they use.
|