http://www.w3.org/ns/prov#value | - After the older brother sent the group information including the target's e-mail address, the names of friends and colleagues, and examples of topics that interested him, the hackers sent an e-mail to the target that seemed as if it had come from an acquaintance.
|