<http://webisa.webdatacommons.org/36450685>	<http://www.w3.org/ns/prov#wasQuotedFrom>	<newsmax.com> .
<http://webisa.webdatacommons.org/prov/96614448>	<http://www.w3.org/ns/prov#wasDerivedFrom>	<http://webisa.webdatacommons.org/36450685> .
<http://webisa.webdatacommons.org/prov/419691399>	<http://www.w3.org/ns/prov#wasDerivedFrom>	<http://webisa.webdatacommons.org/36450685> .
<http://webisa.webdatacommons.org/prov/97017222>	<http://www.w3.org/ns/prov#wasDerivedFrom>	<http://webisa.webdatacommons.org/36450685> .
<http://webisa.webdatacommons.org/prov/145229747>	<http://www.w3.org/ns/prov#wasDerivedFrom>	<http://webisa.webdatacommons.org/36450685> .
<http://webisa.webdatacommons.org/36450685>	<http://www.w3.org/ns/prov#value>	"It has turned to new software to exploit the flood of images included in emails, text messages, social media, videoconferences and other communications, the N.S.A. documents reveal, according to the Times." .
<http://webisa.webdatacommons.org/36450685>	<http://www.w3.org/1999/02/22-rdf-syntax-ns#type>	<http://www.w3.org/ns/prov#Entity> .