PropertyValue
http://www.w3.org/1999/02/22-rdf-syntax-ns#type
http://www.w3.org/ns/prov#value
  • Eimiller did not give exact details of how investigators found the suspect, who remains anonymous at this point. ???These types of cases generally come to our attention when someone is extorted or realizes their computer has been compromised,??? Eimiller said. ???We don???t discuss investigative techniques, but our agents use a combination of computer forensic analysis and good old detective work.
http://www.w3.org/ns/prov#wasQuotedFrom
  • ieweekly.com