| http://www.w3.org/ns/prov#value | - To conduct the surveillance,??? reads the report, ???the NSA. is temporarily copying and then sifting through the contents of what is apparently most e-mails and other text-based communications that cross the border???[the] computer searches the data for the identifying keywords or other ???selectors??? and stores those that match so that human analysts could later examine them.???
|