This HTML5 document contains 50 embedded RDF statements represented using HTML+Microdata notation.

The embedded RDF content will be recognized by any processor of HTML5 Microdata.

Namespace Prefixes

PrefixIRI
dctermshttp://purl.org/dc/terms/
dbohttp://dbpedia.org/ontology/
foafhttp://xmlns.com/foaf/0.1/
n16https://global.dbpedia.org/id/
dbthttp://dbpedia.org/resource/Template:
rdfshttp://www.w3.org/2000/01/rdf-schema#
n14https://regmedia.co.uk/2016/03/29/
n9https://www.documentcloud.org/documents/2830408-MozillaMotion.html%23document/
rdfhttp://www.w3.org/1999/02/22-rdf-syntax-ns#
owlhttp://www.w3.org/2002/07/owl#
wikipedia-enhttp://en.wikipedia.org/wiki/
dbchttp://dbpedia.org/resource/Category:
dbphttp://dbpedia.org/property/
provhttp://www.w3.org/ns/prov#
xsdhhttp://www.w3.org/2001/XMLSchema#
n8https://www.documentcloud.org/documents/2166606-ferrell-warrant-1.html%23document/p11/
wikidatahttp://www.wikidata.org/entity/
dbrhttp://dbpedia.org/resource/

Statements

Subject Item
dbr:Network_Investigative_Technique
rdfs:label
Network Investigative Technique
rdfs:comment
Network Investigative Technique, or NIT, is a form of malware (or hacking) employed by the FBI since at least 2002. It is a drive-by download computer program designed to provide access to a computer.
dcterms:subject
dbc:Digital_forensics_software dbc:Computer_security_exploits dbc:Federal_Bureau_of_Investigation
dbo:wikiPageID
50374425
dbo:wikiPageRevisionID
1115674161
dbo:wikiPageWikiLink
dbc:Digital_forensics_software dbc:Federal_Bureau_of_Investigation dbr:Drive-by_download dbr:Hacking_(computer_security) dbr:Operation_Pacifier dbr:Mozilla dbc:Computer_security_exploits dbr:Fifth_Amendment_to_the_United_States_Constitution dbr:Fruit_of_the_poison_tree dbr:Jurisdiction dbr:FBI dbr:Tor_(anonymity_network) dbr:Firefox dbr:Operation_Torpedo dbr:Malware dbr:American_Civil_Liberties_Union dbr:Pedophilia dbr:Fourth_Amendment_to_the_United_States_Constitution dbr:Electronic_Frontier_Foundation dbr:Computer_and_Internet_Protocol_Address_Verifier dbr:National_Association_of_Criminal_Defense_Lawyers dbr:Amicus_curiae dbr:Rule_41
dbo:wikiPageExternalLink
n8:a227236 n9:p1 n14:alfin.pdf
owl:sameAs
n16:2MAoP wikidata:Q24965414
dbp:wikiPageUsesTemplate
dbt:Portal dbt:Short_description dbt:Reflist
dbo:abstract
Network Investigative Technique, or NIT, is a form of malware (or hacking) employed by the FBI since at least 2002. It is a drive-by download computer program designed to provide access to a computer.
prov:wasDerivedFrom
wikipedia-en:Network_Investigative_Technique?oldid=1115674161&ns=0
dbo:wikiPageLength
6258
foaf:isPrimaryTopicOf
wikipedia-en:Network_Investigative_Technique
Subject Item
dbr:Nit
dbo:wikiPageWikiLink
dbr:Network_Investigative_Technique
dbo:wikiPageDisambiguates
dbr:Network_Investigative_Technique
Subject Item
dbr:Operation_Torpedo
dbo:wikiPageWikiLink
dbr:Network_Investigative_Technique
Subject Item
dbr:Computer_and_Internet_Protocol_Address_Verifier
dbo:wikiPageWikiLink
dbr:Network_Investigative_Technique
Subject Item
dbr:Playpen_(website)
dbo:wikiPageWikiLink
dbr:Network_Investigative_Technique
Subject Item
dbr:Tor_(network)
dbo:wikiPageWikiLink
dbr:Network_Investigative_Technique
Subject Item
dbr:Government_hacking
dbo:wikiPageWikiLink
dbr:Network_Investigative_Technique
Subject Item
wikipedia-en:Network_Investigative_Technique
foaf:primaryTopic
dbr:Network_Investigative_Technique