| http://www.w3.org/ns/prov#value | - CIA had agreed not to monitor the activity of the aides when it set up the secure facility, but it may have violated that understanding either by actually accessing what was being done on the computers, or, quite possibly, noting and analyzing the types of documents that were being viewed and the length of time they were being used, relatively easy to do through the security forensic system now in
|