This HTML5 document contains 13 embedded RDF statements represented using HTML+Microdata notation.

The embedded RDF content will be recognized by any processor of HTML5 Microdata.

PrefixNamespace IRI
n11http://dbkwik.webdatacommons.org/ontology/
dctermshttp://purl.org/dc/terms/
n6http://dbkwik.webdatacommons.org/resource/so3RlV8kRYf2Rd1vUY-GsA==
n3http://dbkwik.webdatacommons.org/personofinterest/property/
n14http://dbkwik.webdatacommons.org/resource/vE_OvsJDtPK9JuuabwAXPg==
n8http://dbkwik.webdatacommons.org/resource/CtbwyQYmNwQoLg1jlcAdlg==
n12http://dbkwik.webdatacommons.org/resource/reB84sx1q3ABqTD9Bf7Oaw==
n2http://dbkwik.webdatacommons.org/resource/o72wmFq-QjEitj9fkxTtGA==
rdfshttp://www.w3.org/2000/01/rdf-schema#
n13http://dbkwik.webdatacommons.org/resource/MGzcDbdTK4Lg6U-4QkLVRA==
n16http://dbkwik.webdatacommons.org/resource/MlKhWCmxwc2npIAuWDgBUQ==
n5http://dbkwik.webdatacommons.org/resource/SMgq8DEVr-7GQ8SkMyI2Kw==
n4http://dbkwik.webdatacommons.org/resource/dHGZTLqzJHfyxvBjT9hd7Q==
rdfhttp://www.w3.org/1999/02/22-rdf-syntax-ns#
xsdhhttp://www.w3.org/2001/XMLSchema#
n15http://dbkwik.webdatacommons.org/resource/m5268hoCy0FopVdhvAYd7w==
n9http://dbkwik.webdatacommons.org/resource/fWMf5lkq1nmqKJkadhJj4g==
Subject Item
n2:
rdf:type
n16:
rdfs:label
Forced Pairing
rdfs:comment
Originally provided by Finch to Reese, the two have since passed the program on to Carter (“In Extremis”), Fusco (“Bad Code”) and Shaw (“Nothing to Hide”). Finch can quickly implement the program on a just-bought pre-paid cell phone despite his equipment in the library having been compromised by Root's hack and him having to abandon all of his technology for protection. This indicates he can either recover the program quickly or replicate it. (“Root Cause”)
dcterms:subject
n8: n9:
n3:wikiPageUsesTemplate
n4: n6: n12:
n15:
Forced Pairing
n5:
350
n13:
Team Machine
n14:
Monitoring Targets
n11:abstract
Originally provided by Finch to Reese, the two have since passed the program on to Carter (“In Extremis”), Fusco (“Bad Code”) and Shaw (“Nothing to Hide”). Finch can quickly implement the program on a just-bought pre-paid cell phone despite his equipment in the library having been compromised by Root's hack and him having to abandon all of his technology for protection. This indicates he can either recover the program quickly or replicate it. (“Root Cause”) Rick Dillinger also used the program but his had a different interface, possibly because he worked with Finch in 2010 and may have been using an older version of the program. (“RAM”)