| http://www.w3.org/ns/prov#value | - In the first, computer search programs search the world???s entire daily electronic traffic (to the extent feasible) for messages that are suspicious because of names or word clusters in the message, social security numbers or other personal identifying information besides names, the origin or destination of the message, and other suspicious characteristics.
|