<http://webisa.webdatacommons.org/36450685> <http://www.w3.org/ns/prov#wasQuotedFrom> <newsmax.com> . <http://webisa.webdatacommons.org/prov/96614448> <http://www.w3.org/ns/prov#wasDerivedFrom> <http://webisa.webdatacommons.org/36450685> . <http://webisa.webdatacommons.org/prov/419691399> <http://www.w3.org/ns/prov#wasDerivedFrom> <http://webisa.webdatacommons.org/36450685> . <http://webisa.webdatacommons.org/prov/97017222> <http://www.w3.org/ns/prov#wasDerivedFrom> <http://webisa.webdatacommons.org/36450685> . <http://webisa.webdatacommons.org/prov/145229747> <http://www.w3.org/ns/prov#wasDerivedFrom> <http://webisa.webdatacommons.org/36450685> . <http://webisa.webdatacommons.org/36450685> <http://www.w3.org/ns/prov#value> "It has turned to new software to exploit the flood of images included in emails, text messages, social media, videoconferences and other communications, the N.S.A. documents reveal, according to the Times." . <http://webisa.webdatacommons.org/36450685> <http://www.w3.org/1999/02/22-rdf-syntax-ns#type> <http://www.w3.org/ns/prov#Entity> .