Ontology Version:
2.2.0
Toggle navigation
RDF knowledge graph (82 ontologies)
Entities A-Z
Classes
Properties
SKOS
Shapes
Statistics
Classes (1961)
cacontology-abduction:AbductionExploitationPattern
cacontology-abduction:AbductionSceneEvidence
cacontology-abduction:AgeBasedVulnerability
cacontology-abduction:ApartmentIsolation
cacontology-abduction:BluntObjectThreats
cacontology-abduction:ClothingDisguise
cacontology-abduction:ComplianceEnforcement
cacontology-abduction:ComplianceUnderThreat
cacontology-abduction:ControlledEnvironmentExploitation
cacontology-abduction:DelayedDisclosure
cacontology-abduction:DisguiseBasedConcealment
cacontology-abduction:DisguiseEvidence
cacontology-abduction:EscapeAttempt
cacontology-abduction:ExploitationSceneEvidence
cacontology-abduction:FacialConcealment
cacontology-abduction:FireEscapeEntry
cacontology-abduction:FirearmThreats
cacontology-abduction:ForcedLocationEntry
cacontology-abduction:HoodedConcealment
cacontology-abduction:HumiliationBasedExploitation
cacontology-abduction:ImmediateDisclosure
cacontology-abduction:ImmediateExploitation
cacontology-abduction:ImpliedWeaponThreats
cacontology-abduction:InitialResistance
cacontology-abduction:IsolatedChildTargeting
cacontology-abduction:IsolationVulnerability
cacontology-abduction:KnifeThreats
cacontology-abduction:LocationBasedExploitation
cacontology-abduction:LocationIsolation
cacontology-abduction:MaskConcealment
cacontology-abduction:MovementRestriction
cacontology-abduction:OpportunisticPredation
cacontology-abduction:OpportunityBasedTargeting
cacontology-abduction:PhysicalForceWithWeapon
cacontology-abduction:PhysicalIntimidation
cacontology-abduction:PostAbductionReporting
cacontology-abduction:PublicSpaceAbduction
cacontology-abduction:RandomVictimSelection
cacontology-abduction:RitualizedExploitation
cacontology-abduction:RoutineActivityTargeting
cacontology-abduction:SchoolRouteAbduction
cacontology-abduction:SchoolRouteTargeting
cacontology-abduction:SecondaryLocationControl
cacontology-abduction:SilenceEnforcement
cacontology-abduction:SizeBasedVulnerability
cacontology-abduction:SkiMaskConcealment
cacontology-abduction:StrangerAbduction
cacontology-abduction:StrangerAbductionInvestigation
cacontology-abduction:StreetLevelAbduction
cacontology-abduction:SurveillanceEvidence
cacontology-abduction:SurvivalBehavior
cacontology-abduction:ThreatBasedControl
cacontology-abduction:UnconventionalEntry
cacontology-abduction:VehicleConcealment
cacontology-abduction:VerbalThreats
cacontology-abduction:VictimAbductionResponse
cacontology-abduction:VictimControlMechanism
cacontology-abduction:VictimTargetingPattern
cacontology-abduction:VulnerabilityExploitation
cacontology-abduction:WeaponBasedCoercion
cacontology-abduction:WeaponDisplayIntimidation
cacontology-abduction:WeaponEvidence
cacontology-abduction:WindowEntry
cacontology-abduction:WitnessEvidence
cacontology-ai:AIAlteredCSAM
cacontology-ai:AICSAMInvestigation
cacontology-ai:AIContentDetection
cacontology-ai:AIContentGeneration
cacontology-ai:AIContentInvestigationSituation
cacontology-ai:AIDetectionPhase
cacontology-ai:AIDetectionTool
cacontology-ai:AIForensicAnalyst
cacontology-ai:AIGeneratedCSAM
cacontology-ai:AIModelAnalyst
cacontology-ai:AgeProgression
cacontology-ai:ArtifactAnalysis
cacontology-ai:BiometricInconsistencyAnalysis
cacontology-ai:ContentGenerationPhase
cacontology-ai:CrossPlatformDetectionSituation
cacontology-ai:DeepfakeCSAM
cacontology-ai:DeepfakeDetection
cacontology-ai:DeepfakeDetectionSpecialist
cacontology-ai:DeepfakeDetectionTool
cacontology-ai:FaceSwapping
cacontology-ai:ForensicAnalysisPhase
cacontology-ai:GenerationSourceTracking
cacontology-ai:HybridCSAM
cacontology-ai:ImageGeneration
cacontology-ai:MetadataAnalysisTool
cacontology-ai:ModelIdentification
cacontology-ai:ModelTraining
cacontology-ai:SyntheticImageDetector
cacontology-ai:SyntheticMediaAnalysis
cacontology-ai:SyntheticMediaCSAM
cacontology-ai:SyntheticMediaExaminer
cacontology-ai:TechnicalAnalysisSituation
cacontology-ai:TrainingDataAnalysis
cacontology-ai:VideoGeneration
cacontology-asset-forfeiture:AssetAssessmentAction
cacontology-asset-forfeiture:AssetForfeitureAction
cacontology-asset-forfeiture:AssetForfeitureOfficer
cacontology-asset-forfeiture:AssetIdentificationPhase
cacontology-asset-forfeiture:AssetValuationExpert
cacontology-asset-forfeiture:CACTInvestigation
cacontology-asset-forfeiture:CompleteForfeiture
cacontology-asset-forfeiture:ConsentOrder
cacontology-asset-forfeiture:CriminalAssetsConfiscationTaskforce
cacontology-asset-forfeiture:EquipmentSeizureAction
cacontology-asset-forfeiture:FinancialAccount
cacontology-asset-forfeiture:FinancialPenaltyAction
cacontology-asset-forfeiture:ForensicAccountant
cacontology-asset-forfeiture:ForfeitureOutcome
cacontology-asset-forfeiture:HouseholdItems
cacontology-asset-forfeiture:InstrumentOfOffense
cacontology-asset-forfeiture:JurisdictionalCoordination
cacontology-asset-forfeiture:LegalBasisForForfeiture
cacontology-asset-forfeiture:LegalCounsel
cacontology-asset-forfeiture:LegalProceedingsPhase
cacontology-asset-forfeiture:LegalProceedingsSituation
cacontology-asset-forfeiture:MultiStateForfeiture
cacontology-asset-forfeiture:NonProfitOffenderAssets
cacontology-asset-forfeiture:PartialForfeiture
cacontology-asset-forfeiture:ProceedsOfCrime
cacontology-asset-forfeiture:PropertyForfeitureAction
cacontology-asset-forfeiture:PropertyManager
cacontology-asset-forfeiture:PropertyRestraintAction
cacontology-asset-forfeiture:RecoveryPhase
cacontology-asset-forfeiture:ResidentialProperty
cacontology-asset-forfeiture:RestraintPhase
cacontology-asset-forfeiture:StateSupremeCourt
cacontology-asset-forfeiture:TechnicalEquipment
cacontology-asset-forfeiture:Vehicle
cacontology-athletic:AnatomyFocusedExploitation
cacontology-athletic:AssistantCoachRole
cacontology-athletic:AthleticCoachRole
cacontology-athletic:AthleticCoachingExploitation
cacontology-athletic:AthleticContactEscalation
cacontology-athletic:AthleticExploitationDiscovery
cacontology-athletic:AthleticFacility
cacontology-athletic:AthleticFacilityExploitation
cacontology-athletic:AthleticFieldExploitation
cacontology-athletic:AthleticOpportunityThreats
cacontology-athletic:AuthorityEstablishmentPhase
cacontology-athletic:CommunityBasedReporting
cacontology-athletic:ConditioningCoercion
cacontology-athletic:DiscoveryPhase
cacontology-athletic:DualCoachingRoleExploitation
cacontology-athletic:ExerciseComplianceCoercion
cacontology-athletic:ExhaustionBasedCoercion
cacontology-athletic:ExploitationPhase
cacontology-athletic:GroomingPhase
cacontology-athletic:GroupExploitationDynamics
cacontology-athletic:GymExploitation
cacontology-athletic:HeadCoachRole
cacontology-athletic:InappropriateSexualEducation
cacontology-athletic:InstitutionalEmploymentTermination
cacontology-athletic:LegitimateContactExploitation
cacontology-athletic:LockerRoomExploitation
cacontology-athletic:MasturbationDiscussionExploitation
cacontology-athletic:MaterialBenefitCoercion
cacontology-athletic:OverClothingToUnderClothingEscalation
cacontology-athletic:ParentNetworkDiscovery
cacontology-athletic:PhysicalCoercionPhase
cacontology-athletic:PhysicalContactEscalation
cacontology-athletic:PhysicalEnduranceExploitation
cacontology-athletic:PhysicalTrainingCoercion
cacontology-athletic:PracticeSessionExploitation
cacontology-athletic:PubicHairFocusedExploitation
cacontology-athletic:RumorCirculationDiscovery
cacontology-athletic:SchoolAthleticCoachRole
cacontology-athletic:SchoolAthleticExploitation
cacontology-athletic:SchoolBasedInvestigation
cacontology-athletic:SexualEducationExploitation
cacontology-athletic:SexualTopicGrooming
cacontology-athletic:SportsContextPhysicalAbuse
cacontology-athletic:TeamBasedExploitation
cacontology-athletic:TeamDynamicsExploitation
cacontology-athletic:TeamMembershipCoercion
cacontology-athletic:TeamSelectionCoercion
cacontology-athletic:TrainingBasedTouching
cacontology-athletic:TrainingCampExploitation
cacontology-athletic:TrainingDrillCoercion
cacontology-athletic:TravelTeamCoachRole
cacontology-athletic:TravelTeamExploitation
cacontology-case:ActiveInvestigationPhase
cacontology-case:AdministrativeReview
cacontology-case:AnalystAssignment
cacontology-case:ArrestWarrant
cacontology-case:CaseAnalystRole
cacontology-case:CaseAssignment
cacontology-case:CaseClosure
cacontology-case:CaseDocumentation
cacontology-case:CaseDurationMetrics
cacontology-case:CaseInitiationPhase
cacontology-case:CaseManagement
cacontology-case:CaseManagerRole
cacontology-case:CaseMetrics
cacontology-case:CaseProsecutorRole
cacontology-case:CaseReport
cacontology-case:CaseReview
cacontology-case:CaseTracking
cacontology-case:CaseWorkflow
cacontology-case:ColdCaseManagement
cacontology-case:ComplexCaseManagement
cacontology-case:CostPerCaseMetrics
cacontology-case:CourtFiling
cacontology-case:CourtProceedingsPhase
cacontology-case:DispositionPhase
cacontology-case:DispositionWorkflow
cacontology-case:EvidenceLog
cacontology-case:ExpertReport
cacontology-case:ExternalReview
cacontology-case:HighPriorityCaseManagement
cacontology-case:IntakeWorkflow
cacontology-case:InterviewNotes
cacontology-case:InvestigationWorkflow
cacontology-case:InvestigatorAssignment
cacontology-case:LeadInvestigatorRole
cacontology-case:LegalReview
cacontology-case:MultiJurisdictionalCaseManagement
cacontology-case:PeerReview
cacontology-case:PrimaryInvestigatorAssignment
cacontology-case:ProsecutionPreparationPhase
cacontology-case:ProsecutionWorkflow
cacontology-case:ProsecutorAssignment
cacontology-case:QualityAssuranceReview
cacontology-case:QualityScoreMetrics
cacontology-case:ResolutionRateMetrics
cacontology-case:ResourceUtilizationMetrics
cacontology-case:SearchWarrant
cacontology-case:SecondaryInvestigatorAssignment
cacontology-case:SupervisorAssignment
cacontology-case:SupervisoryReview
cacontology-coord:CaseInformationSharing
cacontology-coord:CaseResolutionTimeMetrics
cacontology-coord:CommunicationProtocol
cacontology-coord:CoordinationAgreement
cacontology-coord:CoordinationEffectivenessMetrics
cacontology-coord:CoordinationMetrics
cacontology-coord:CostEfficiencyMetrics
cacontology-coord:EmergencyCommunicationChannel
cacontology-coord:EncryptedCommunicationChannel
cacontology-coord:EquipmentSharing
cacontology-coord:EvidenceSharing
cacontology-coord:ExpertiseSharing
cacontology-coord:FacilitySharing
cacontology-coord:FederalCoordination
cacontology-coord:FormalAgreement
cacontology-coord:FormalCommunicationChannel
cacontology-coord:FundingSharing
cacontology-coord:InformalAgreement
cacontology-coord:InformalCommunicationChannel
cacontology-coord:InformationSharing
cacontology-coord:InformationSharingRateMetrics
cacontology-coord:IntelligenceLiaison
cacontology-coord:IntelligenceSharing
cacontology-coord:InternationalCoordination
cacontology-coord:InvestigationCoordination
cacontology-coord:JointInvestigation
cacontology-coord:JointOperationsPlan
cacontology-coord:LegalLiaison
cacontology-coord:LiaisonCommunicationChannel
cacontology-coord:LiaisonOfficer
cacontology-coord:LocalCoordination
cacontology-coord:MemorandumOfAgreement
cacontology-coord:MemorandumOfUnderstanding
cacontology-coord:MultiAgencyCoordination
cacontology-coord:MultiStateCoordination
cacontology-coord:OperationalLiaison
cacontology-coord:ParallelInvestigation
cacontology-coord:PersonnelSharing
cacontology-coord:PrimaryLiaison
cacontology-coord:RegionalCoordination
cacontology-coord:ResourceSharing
cacontology-coord:ResourceUtilizationMetrics
cacontology-coord:ResponseTimeMetrics
cacontology-coord:SecondaryLiaison
cacontology-coord:SecureCommunicationChannel
cacontology-coord:StateCoordination
cacontology-coord:SuspectInformationSharing
cacontology-coord:TaskForceCharter
cacontology-coord:TaskForceCoordination
cacontology-coord:TechnicalDataSharing
cacontology-coord:TechnicalLiaison
cacontology-coord:TechnologySharing
cacontology-coord:VictimInformationSharing
cacontology-corruption:AccessPrivilegeAbuse
cacontology-corruption:AuthoritySymbolExploitation
cacontology-corruption:BadgeDisplayedProduction
cacontology-corruption:CorruptArmyReservist
cacontology-corruption:CorruptLawEnforcementOfficer
cacontology-corruption:CorruptMetropolitanPoliceDepartmentOfficer
cacontology-corruption:CorruptStateTrooper
cacontology-corruption:DatabaseAccessAbuse
cacontology-corruption:EvidenceManipulation
cacontology-corruption:ExternalOversightInvestigation
cacontology-corruption:FormerLawEnforcementOfficer
cacontology-corruption:InformationLeakage
cacontology-corruption:InsiderThreat
cacontology-corruption:InsiderThreatDetection
cacontology-corruption:InternalAffairsInvestigation
cacontology-corruption:InvestigativeAuthorityAbuse
cacontology-corruption:LawEnforcementCorruption
cacontology-corruption:MilitaryUniformProduction
cacontology-corruption:OfficerChildTrafficking
cacontology-corruption:OfficerProducedCSAM
cacontology-corruption:OfficialVehicleExploitation
cacontology-corruption:PoliceUniformProduction
cacontology-corruption:PositionOfAuthorityAbuse
cacontology-corruption:PublicIntegrityInvestigation
cacontology-corruption:UniformBasedExploitation
cacontology-corruption:UniformEnhancedProduction
cacontology-corruption:WhistleblowerReport
cacontology-custodial:ActiveCustodyPhase
cacontology-custodial:AuthorityAbuse
cacontology-custodial:AuthorityFigure
cacontology-custodial:Babysitter
cacontology-custodial:BackgroundCheck
cacontology-custodial:BreachOfCare
cacontology-custodial:CaregiverRelationship
cacontology-custodial:ChildcareProvider
cacontology-custodial:Coach
cacontology-custodial:CustodialAbuse
cacontology-custodial:CustodialAuthorization
cacontology-custodial:CustodialCrisisSituation
cacontology-custodial:CustodialRelationship
cacontology-custodial:CustodyArrangement
cacontology-custodial:EmergencyCustody
cacontology-custodial:FamilialRelationship
cacontology-custodial:FamilyFriend
cacontology-custodial:FormalCustody
cacontology-custodial:Guardian
cacontology-custodial:InformalCustody
cacontology-custodial:Mentor
cacontology-custodial:ParentalConsent
cacontology-custodial:PositionOfTrust
cacontology-custodial:ProbationaryCustodyPhase
cacontology-custodial:ProfessionalCareRelationship
cacontology-custodial:Relative
cacontology-custodial:SupervisionBreakdownSituation
cacontology-custodial:SupervisionFailure
cacontology-custodial:SuspendedCustodyPhase
cacontology-custodial:Teacher
cacontology-custodial:TemporaryCustody
cacontology-custodial:TerminatedCustodyPhase
cacontology-custodial:TrustBreachSituation
cacontology-custodial:TrustViolation
cacontology-custodial:VisitationArrangement
cacontology-custodial:VulnerabilityExposureSituation
cacontology-detection:AutomatedDetectionAction
cacontology-detection:COPINEClassificationScheme
cacontology-detection:ClassificationResult
cacontology-detection:ContentAnalystRole
cacontology-detection:ContentHashingAction
cacontology-detection:ContentHashingTool
cacontology-detection:CrossPlatformDetectionSituation
cacontology-detection:DatabaseMatchAction
cacontology-detection:DatabaseMatchingTool
cacontology-detection:DetectionResult
cacontology-detection:FalsePositiveAnalysisAction
cacontology-detection:FalsePositiveManagementSituation
cacontology-detection:HashAnalystRole
cacontology-detection:HashComparisonPhase
cacontology-detection:InitialDetectionPhase
cacontology-detection:MachineLearningDetectionTool
cacontology-detection:MachineLearningSpecialistRole
cacontology-detection:ManualClassificationAction
cacontology-detection:ManualReviewPhase
cacontology-detection:ManualReviewTool
cacontology-detection:MassContentAnalysisSituation
cacontology-detection:PerceptualHash
cacontology-detection:PhotoDNAHash
cacontology-detection:QualityAssuranceAnalystRole
cacontology-detection:ReportingPhase
cacontology-detection:SARClassificationScheme
cacontology-detection:ValidationPhase
cacontology-educational1:AcademicActivityExploitation
cacontology-educational1:AcademicIntimidation
cacontology-educational1:AcademicPowerVulnerability
cacontology-educational1:AcademicTermPhase
cacontology-educational1:AdministratorRole
cacontology-educational1:AfterHoursClassroomExploitation
cacontology-educational1:AgeDeception
cacontology-educational1:AgeSpecificTargeting
cacontology-educational1:AssignmentCompletionExploitation
cacontology-educational1:AssignmentHarassment
cacontology-educational1:ClassroomBasedExploitation
cacontology-educational1:ClassroomExploitationContext
cacontology-educational1:ClassroomIsolationVulnerability
cacontology-educational1:CoachRole
cacontology-educational1:CounselorRole
cacontology-educational1:CrossInstitutionalExploitation
cacontology-educational1:CrossInstitutionalInvestigationSituation
cacontology-educational1:DegradingWrittenComments
cacontology-educational1:DigitalCommunicationEvidence
cacontology-educational1:DigitalImpersonation
cacontology-educational1:EducationalExploitationSituation
cacontology-educational1:EducationalInstitution
cacontology-educational1:EducationalInstitutionInvestigation
cacontology-educational1:EducatorPerpetratedExploitation
cacontology-educational1:EducatorRole
cacontology-educational1:EliteEducationalInstitution
cacontology-educational1:EmploymentPhase
cacontology-educational1:ExploitationEscalationPhase
cacontology-educational1:ForcibleTouching
cacontology-educational1:GymTeacherRole
cacontology-educational1:IPAddressEvidence
cacontology-educational1:ImmediatePhysicalContactExploitation
cacontology-educational1:IndependentSchool
cacontology-educational1:InstitutionalResponseSituation
cacontology-educational1:InstitutionalSafeguarding
cacontology-educational1:InstitutionalVulnerability
cacontology-educational1:IntermediateSchool
cacontology-educational1:InvestigationPhase
cacontology-educational1:MathTeacherRole
cacontology-educational1:MiddleSchool
cacontology-educational1:MultiVictimExploitationSituation
cacontology-educational1:MultipleAccountDeception
cacontology-educational1:OneOnOneAcademicExploitation
cacontology-educational1:OpportunisticTouching
cacontology-educational1:PhysicalContactPattern
cacontology-educational1:PoliceNotification
cacontology-educational1:PositionOfTrustExploitation
cacontology-educational1:PostReleaseSuperVision
cacontology-educational1:PrincipalNotification
cacontology-educational1:PrivateSchool
cacontology-educational1:PublicSchool
cacontology-educational1:SchoolStaffReporting
cacontology-educational1:SexOffenderRegistration
cacontology-educational1:SexualPerformanceSolicitation
cacontology-educational1:StudentVictimTargeting
cacontology-educational1:SubstituteTeacherRole
cacontology-educational1:TeacherRole
cacontology-educational1:TeacherStudentExploitation
cacontology-educational1:TestTakingExploitation
cacontology-educational1:UseOfChildInSexualPerformance
cacontology-educational1:VictimAccountEvidence
cacontology-educational1:VictimDisclosureToStaff
cacontology-educational1:VulnerableStudentTargeting
cacontology-educational1:WitnessTestimonyEvidence
cacontology-educational1:WrittenHarassment
cacontology-educational1:WrittenHarassmentEvidence
cacontology-enterprises:AccelerationistGroup
cacontology-enterprises:AccessControlSystem
cacontology-enterprises:AlternateAccountSystem
cacontology-enterprises:AnimalAbuseCoercion
cacontology-enterprises:ChildExploitationEnterprise
cacontology-enterprises:ContentBasedRecruitment
cacontology-enterprises:ContentCompilationSystem
cacontology-enterprises:ContentCurationAction
cacontology-enterprises:ContentCurrencySystem
cacontology-enterprises:ContentEditingProcess
cacontology-enterprises:ContentProducerRole
cacontology-enterprises:ContentValueAssessment
cacontology-enterprises:CoordinatorRole
cacontology-enterprises:CovertEmployeeOperation
cacontology-enterprises:CrossPlatformCoordination
cacontology-enterprises:CrossPlatformEvidenceCorrelation
cacontology-enterprises:CyberExtremistNetwork
cacontology-enterprises:EncryptedChannelInfiltration
cacontology-enterprises:EncryptedChannelNetwork
cacontology-enterprises:EnterpriseHierarchy
cacontology-enterprises:EnterpriseLeaderRole
cacontology-enterprises:EnterpriseRole
cacontology-enterprises:ExtremeDegradationCoercion
cacontology-enterprises:ExtremistNetworkCell
cacontology-enterprises:IdentityCorrelationAnalysis
cacontology-enterprises:InnerCore
cacontology-enterprises:InnerCoreMemberRole
cacontology-enterprises:LeadershipStructure
cacontology-enterprises:Lorebook
cacontology-enterprises:MembershipAdvancementSystem
cacontology-enterprises:MembershipTier
cacontology-enterprises:MentalHealthVulnerabilityTargeting
cacontology-enterprises:NameCuttingCoercion
cacontology-enterprises:NetworkMappingInvestigation
cacontology-enterprises:NihilisticViolentExtremismNetwork
cacontology-enterprises:PlatformMigrationStrategy
cacontology-enterprises:PrivateGroupManagement
cacontology-enterprises:RecruitmentHierarchy
cacontology-enterprises:RecruitmentSpecialistRole
cacontology-enterprises:SelfHarmCoercion
cacontology-enterprises:SelfImmolationCoercion
cacontology-enterprises:SiblingAbuseCoercion
cacontology-enterprises:SocialEngineeringCampaign
cacontology-enterprises:SuicideCoercion
cacontology-enterprises:TrustBuildingProcess
cacontology-enterprises:VictimContentCompilation
cacontology-enterprises:VictimProfileDevelopment
cacontology-enterprises:VulnerablePopulationTargeting
cacontology-forensics:AcquisitionPhase
cacontology-forensics:AdvancedSearchTechnique
cacontology-forensics:AnalysisPhase
cacontology-forensics:AutomatedContentAnalysis
cacontology-forensics:BehavioralFingerprinting
cacontology-forensics:ChainOfCustodyAction
cacontology-forensics:CommunicationPatternAnalysis
cacontology-forensics:ContentCorrelationAnalysis
cacontology-forensics:CrossPlatformCorrelation
cacontology-forensics:CrossReferenceAnalysis
cacontology-forensics:CustodyDocument
cacontology-forensics:DatabaseIntelligenceIntegration
cacontology-forensics:DetectionDogAssist
cacontology-forensics:DistributedForensicProcessing
cacontology-forensics:ElectronicStorageDeviceDetection
cacontology-forensics:EvidenceCustodianRole
cacontology-forensics:EvidenceTriageSystem
cacontology-forensics:EvidenceVerificationAction
cacontology-forensics:ExtendedInvestigationTimeline
cacontology-forensics:ForensicAcquisitionAction
cacontology-forensics:ForensicExaminerRole
cacontology-forensics:ForensicImage
cacontology-forensics:ForensicImagingTool
cacontology-forensics:GeospatialCorrelation
cacontology-forensics:HashingTool
cacontology-forensics:HiddenDeviceRecovery
cacontology-forensics:ImageAnalysisForVictimID
cacontology-forensics:InternationalEvidenceProcessing
cacontology-forensics:K9AssistedForensics
cacontology-forensics:MachineLearningCorrelation
cacontology-forensics:MassDigitalEvidenceProcessing
cacontology-forensics:MemoryDump
cacontology-forensics:MemoryForensicTool
cacontology-forensics:MetadataCorrelation
cacontology-forensics:MetadataExtractionAction
cacontology-forensics:MobileForensicTool
cacontology-forensics:NetworkCapture
cacontology-forensics:NetworkForensicTool
cacontology-forensics:NetworkTrafficAnalysis
cacontology-forensics:RealTimeCorrelation
cacontology-forensics:RecoveredFile
cacontology-forensics:ReportingPhase
cacontology-forensics:ScalableHashAnalysis
cacontology-forensics:TemporalPatternAnalysis
cacontology-forensics:TestimonyPhase
cacontology-forensics:TimelineAnalysisAction
cacontology-forensics:UserBehaviorForensics
cacontology-forensics:VictimIdentificationProcess
cacontology-forensics:VictimIdentificationSpecialist
cacontology-forensics:VictimRemovalAction
cacontology-grooming:AcceleratedTrustExploitation
cacontology-grooming:AlcoholFacilitatedGrooming
cacontology-grooming:AnonymousInitiation
cacontology-grooming:AnonymousPlatformContact
cacontology-grooming:BluntRecruitmentGrooming
cacontology-grooming:ChildVictim
cacontology-grooming:CrossInstitutionalGrooming
cacontology-grooming:DirectTraffickingPropositionGrooming
cacontology-grooming:EconomicIncentiveGrooming
cacontology-grooming:EducatorGrooming
cacontology-grooming:EliteInstitutionTargeting
cacontology-grooming:Enticement
cacontology-grooming:EscalationPattern
cacontology-grooming:ExplicitCommercialOfferGrooming
cacontology-grooming:ExploitationPhase
cacontology-grooming:GraphicConversationGrooming
cacontology-grooming:GroomingBehavior
cacontology-grooming:GroomingMessage
cacontology-grooming:GroomingPattern
cacontology-grooming:GroomingPhase
cacontology-grooming:ImmediateExploitationAttempt
cacontology-grooming:ImmediateMonetizationGrooming
cacontology-grooming:ImpairmentBasedGrooming
cacontology-grooming:InappropriateGift
cacontology-grooming:InitialContactPhase
cacontology-grooming:InitiatorContentSending
cacontology-grooming:InterstateTransportPlan
cacontology-grooming:IsolationBasedGrooming
cacontology-grooming:IsolationBehavior
cacontology-grooming:IsolationPhase
cacontology-grooming:LocationSpecificGrooming
cacontology-grooming:MaintenancePhase
cacontology-grooming:ManipulationPattern
cacontology-grooming:MarijuanaFacilitatedGrooming
cacontology-grooming:MultipleAccountGrooming
cacontology-grooming:NormalizationBehavior
cacontology-grooming:NormalizationGrooming
cacontology-grooming:OfflineControlEstablishment
cacontology-grooming:OnlineGrooming
cacontology-grooming:OnlineGroomingSituation
cacontology-grooming:OnlinePredationSituation
cacontology-grooming:OnlinePredator
cacontology-grooming:OnlineToOfflineProgression
cacontology-grooming:OpportunisticGrooming
cacontology-grooming:PeerPersonaGrooming
cacontology-grooming:PhysicalMeetingArrangement
cacontology-grooming:PhysicalSpaceGrooming
cacontology-grooming:PlatformAnonymityFeature
cacontology-grooming:PositionOfTrustGrooming
cacontology-grooming:PreyBehaviorPattern
cacontology-grooming:PrivilegedVictimTargeting
cacontology-grooming:PublicToPrivateGrooming
cacontology-grooming:RapidEscalationGrooming
cacontology-grooming:ReciprocityGrooming
cacontology-grooming:ReputationBasedSilencing
cacontology-grooming:SameDayProgression
cacontology-grooming:SecrecyRequest
cacontology-grooming:SexualConsequenceGameGrooming
cacontology-grooming:SexualContentExchangeGrooming
cacontology-grooming:SexualExploitation
cacontology-grooming:SexualSolicitation
cacontology-grooming:SexualizationPhase
cacontology-grooming:SkippedGroomingPhases
cacontology-grooming:StreetBasedGrooming
cacontology-grooming:SubstanceFacilitatedGrooming
cacontology-grooming:SubstanceInducedVulnerabilityGrooming
cacontology-grooming:TeenageImpersonationGrooming
cacontology-grooming:TravelArrangement
cacontology-grooming:TrustBuildingBehavior
cacontology-grooming:TrustBuildingPhase
cacontology-grooming:TrustThroughAnonymity
cacontology-grooming:UnverifiedUserProfile
cacontology-grooming:VehicleBasedGrooming
cacontology-grooming:VictimComplianceInPhysicalMeeting
cacontology-grooming:VictimResponse
cacontology-grooming:VictimTargeting
cacontology-grooming:VictimVulnerability
cacontology-grooming:VictimVulnerabilitySituation
cacontology-gufo:EvidencePhase
cacontology-gufo:Investigation
cacontology-gufo:LegalProcessPhase
cacontology-impact:AcuteImpactPhase
cacontology-impact:AcuteTrauma
cacontology-impact:BehavioralIndicator
cacontology-impact:ChildExploitationTaskForce
cacontology-impact:ChronicTrauma
cacontology-impact:CognitiveBehavioralTherapy
cacontology-impact:CognitiveIndicator
cacontology-impact:CommunitySupport
cacontology-impact:ComplexTrauma
cacontology-impact:ComprehensiveImpactAssessment
cacontology-impact:CrisisIntervention
cacontology-impact:DevelopmentalImpact
cacontology-impact:EducationalSupport
cacontology-impact:EmergencyHelpSeeking
cacontology-impact:EmergencyResponse
cacontology-impact:EmotionalIndicator
cacontology-impact:FamilyReunification
cacontology-impact:FamilyTherapy
cacontology-impact:FearlessHudsonValleySupport
cacontology-impact:GroupTherapy
cacontology-impact:HelpSeekingBarrier
cacontology-impact:HelpSeekingFacilitator
cacontology-impact:HometownReturn
cacontology-impact:HospitalDischarge
cacontology-impact:HospitalIntervention
cacontology-impact:HumanTraffickingSquad
cacontology-impact:InitialImpactAssessment
cacontology-impact:InterstateVictimServices
cacontology-impact:LegalSupport
cacontology-impact:LongTermEffect
cacontology-impact:LongTermMonitoringPhase
cacontology-impact:MedicalTraumaAssessment
cacontology-impact:MentalHealthProfessional
cacontology-impact:MultiAgencyVictimResponse
cacontology-impact:NineOneOneCall
cacontology-impact:OngoingDangerAssessment
cacontology-impact:OngoingImpactMonitoring
cacontology-impact:PhysicalIndicator
cacontology-impact:PortAuthorityYouthServices
cacontology-impact:PsychologicalHarm
cacontology-impact:RecoveryBarriers
cacontology-impact:RecoveryMilestone
cacontology-impact:RecoveryPhase
cacontology-impact:RecoveryProcess
cacontology-impact:ReintegrationPhase
cacontology-impact:ResilienceFactors
cacontology-impact:SafetyPlanning
cacontology-impact:SocialIndicator
cacontology-impact:SuicidalIdeationResponse
cacontology-impact:TherapeuticIntervention
cacontology-impact:TherapistRole
cacontology-impact:TherapyParticipant
cacontology-impact:TraffickerControlBarrier
cacontology-impact:TraumaIndicator
cacontology-impact:TraumaTherapy
cacontology-impact:TraumatizedVictim
cacontology-impact:VictimAdvocacy
cacontology-impact:VictimAdvocateRole
cacontology-impact:VictimBehavior
cacontology-impact:VictimExtraction
cacontology-impact:VictimImpactAssessment
cacontology-impact:VictimInRecovery
cacontology-impact:VictimReintegration
cacontology-impact:VictimSafetyPlanning
cacontology-impact:VictimSelfReporting
cacontology-impact:VictimServiceCoordination
cacontology-impact:VictimSupport
cacontology-impact:VictimTransportationAssistance
cacontology-infrastructure:AccountFreezing
cacontology-infrastructure:AnalystRole
cacontology-infrastructure:AnonymityInfrastructure
cacontology-infrastructure:ContentDeliveryNetwork
cacontology-infrastructure:CryptocurrencyInfrastructure
cacontology-infrastructure:DataMirrorCreation
cacontology-infrastructure:DatabaseInfrastructure
cacontology-infrastructure:DomainInfrastructure
cacontology-infrastructure:DomainSinkholing
cacontology-infrastructure:EncryptionInfrastructure
cacontology-infrastructure:FinancialFlowAnalysis
cacontology-infrastructure:FinancialObfuscation
cacontology-infrastructure:GeographicDistribution
cacontology-infrastructure:HostingProvider
cacontology-infrastructure:InfrastructureAnalysis
cacontology-infrastructure:InfrastructureCompromiseSituation
cacontology-infrastructure:InfrastructureDecommissionPhase
cacontology-infrastructure:InfrastructureDeploymentPhase
cacontology-infrastructure:InfrastructureDiscoverySituation
cacontology-infrastructure:InfrastructureFailureSituation
cacontology-infrastructure:InfrastructureMaintenancePhase
cacontology-infrastructure:InfrastructureOperationalPhase
cacontology-infrastructure:InfrastructureTakedown
cacontology-infrastructure:LoadBalancer
cacontology-infrastructure:NetworkInfrastructure
cacontology-infrastructure:NetworkTopologyAnalysis
cacontology-infrastructure:PaymentProcessing
cacontology-infrastructure:PlatformInfrastructure
cacontology-infrastructure:ProxyInfrastructure
cacontology-infrastructure:SecurityInfrastructure
cacontology-infrastructure:SecurityOperatorRole
cacontology-infrastructure:ServerInfrastructure
cacontology-infrastructure:ServerSeizure
cacontology-infrastructure:SubscriptionManagement
cacontology-infrastructure:SystemAdministratorRole
cacontology-infrastructure:TakedownOperatorRole
cacontology-infrastructure:UserAccessPatternAnalysis
cacontology-institutional:AbandonedChild
cacontology-institutional:AdultVictimTestimony
cacontology-institutional:CareProviderExploitation
cacontology-institutional:CareProviderRole
cacontology-institutional:CharitableCoverExploitation
cacontology-institutional:CharitableFundingMisuse
cacontology-institutional:CharitableOrganization
cacontology-institutional:CharitableOrganizationLeader
cacontology-institutional:ChildCareInstitution
cacontology-institutional:CrossBorderPersonalTravel
cacontology-institutional:DependencyExploitation
cacontology-institutional:DonorManipulation
cacontology-institutional:FinancialControlMechanism
cacontology-institutional:ForeignCommerceOffense
cacontology-institutional:ForeignCommerceTravel
cacontology-institutional:ForeignPlaceOffense
cacontology-institutional:ForeignResidenceExploitation
cacontology-institutional:FosterCareInstitution
cacontology-institutional:HumanitarianOrganization
cacontology-institutional:HumanitarianTravelCover
cacontology-institutional:ImpoverishedChild
cacontology-institutional:InstitutionalAbuseEvidence
cacontology-institutional:InstitutionalAuthorityExploitation
cacontology-institutional:InstitutionalExploitation
cacontology-institutional:InstitutionalFounder
cacontology-institutional:IsolationBasedControl
cacontology-institutional:LongTermAbusePattern
cacontology-institutional:LongTermInstitutionalControl
cacontology-institutional:MultiModalInstitutionalAbuse
cacontology-institutional:MultiVictimForeignOffense
cacontology-institutional:MultipleVictimTestimony
cacontology-institutional:Orphanage
cacontology-institutional:OrphanageDirector
cacontology-institutional:OrphanageExploitation
cacontology-institutional:OrphanedChild
cacontology-institutional:PositionOfTrustAbuse
cacontology-institutional:ReligiousInstitution
cacontology-institutional:RepeatedCrossBorderTravel
cacontology-institutional:SupportNetworkDeception
cacontology-institutional:SystematicInstitutionalAbuse
cacontology-institutional:TrustedAdultRole
cacontology-institutional:USProsecutionForeignCrimes
cacontology-institutional:VulnerableChildInCare
cacontology-institutional:VulnerablePopulationTargeting
cacontology-institutional:YouthHome
cacontology-international:AutomatedCrossMatching
cacontology-international:CountryPartnership
cacontology-international:CrossBorderDeviceSeizure
cacontology-international:CrossBorderEffectiveness
cacontology-international:CrossBorderForensics
cacontology-international:CrossBorderInvestigation
cacontology-international:CrossBorderOperation
cacontology-international:CrossBorderThreatAlert
cacontology-international:CrossJurisdictionalInvestigation
cacontology-international:CrossReferenceAnalysis
cacontology-international:CrossReferralProtocol
cacontology-international:DataExchangeProtocol
cacontology-international:DistributedIntelligenceProcessing
cacontology-international:EmergencyCoordinationProtocol
cacontology-international:EuropeanCooperationFramework
cacontology-international:EuropolCoordination
cacontology-international:EuropolOperation
cacontology-international:ExtraditionAgreement
cacontology-international:FederatedDatabaseQuery
cacontology-international:GlobalCaseTracking
cacontology-international:GlobalDatabaseNetwork
cacontology-international:GlobalHotlineNetwork
cacontology-international:GlobalInvestigativeTeam
cacontology-international:GlobalMissingChildrenCenter
cacontology-international:GlobalPlatformTakedown
cacontology-international:GlobalReach
cacontology-international:GlobalTakedownCoordination
cacontology-international:InformationSharingAgreement
cacontology-international:InstantAlertSystem
cacontology-international:IntelligenceDataLake
cacontology-international:IntelligenceFusion
cacontology-international:InternationalAlert
cacontology-international:InternationalAnalyst
cacontology-international:InternationalCoordination
cacontology-international:InternationalCoordinator
cacontology-international:InternationalDatabase
cacontology-international:InternationalEvidence
cacontology-international:InternationalEvidenceSharing
cacontology-international:InternationalHotlineCoordination
cacontology-international:InternationalImpact
cacontology-international:InternationalIntelligenceSharing
cacontology-international:InternationalNetworkDisruption
cacontology-international:InternationalPartnership
cacontology-international:InternationalProsecution
cacontology-international:InternationalReferral
cacontology-international:InternationalResourceCoordination
cacontology-international:InternationalTaskForce
cacontology-international:InternationalWarrant
cacontology-international:JurisdictionalCoordination
cacontology-international:LiaisonOfficer
cacontology-international:LiveIntelligenceFeed
cacontology-international:MassUserAnalysis
cacontology-international:MultiCountryTakedown
cacontology-international:MultilingualSupport
cacontology-international:MutualLegalAssistance
cacontology-international:MutualLegalAssistanceTreatyOperation
cacontology-international:OperationalSyncronization
cacontology-international:RealTimeIntelligenceSharing
cacontology-international:RegionalCoordination
cacontology-international:SecureChannel
cacontology-international:SecureCommunicationChannel
cacontology-international:ThreatAssessmentSharing
cacontology-international:USAustraliaCoordination
cacontology-legal:BestPractice
cacontology-legal:CSAMCriminalization
cacontology-legal:CSAMModelLaw
cacontology-legal:CapacityBuilding
cacontology-legal:ChildTraffickingLaw
cacontology-legal:ComplianceBenchmark
cacontology-legal:ComplianceMetrics
cacontology-legal:ExtraditionAgreement
cacontology-legal:GlobalLegalReview
cacontology-legal:HarmonizationProgress
cacontology-legal:InternationalLawEnforcement
cacontology-legal:InternationalStandard
cacontology-legal:JurisdictionalCoordination
cacontology-legal:JurisdictionalVariation
cacontology-legal:LegalCompliance
cacontology-legal:LegalCoverageAssessment
cacontology-legal:LegalEffectiveness
cacontology-legal:LegalFrameworkGap
cacontology-legal:LegalReform
cacontology-legal:LegalSystemCompatibility
cacontology-legal:LegislativeAssessment
cacontology-legal:LegislativeDrafting
cacontology-legal:MandatoryReportingLaw
cacontology-legal:MinimumStandard
cacontology-legal:MutualLegalAssistance
cacontology-legal:NationalLegislation
cacontology-legal:OnlineGroomingLaw
cacontology-legal:PolicyDevelopment
cacontology-legal:PolicyHarmonization
cacontology-legal:RegionalFramework
cacontology-legal:TechnicalAssistance
cacontology-legal:TreatyFramework
cacontology-legal:VictimProtectionLaw
cacontology-multi:AllFBIFieldOfficesOperation
cacontology-multi:AutomatedEvidenceDistribution
cacontology-multi:CEOSCoordinatedOperation
cacontology-multi:ChildRescueCoordination
cacontology-multi:CommunityOutreachTriggeredInvestigation
cacontology-multi:ComplianceMonitoringOperation
cacontology-multi:ComplianceVisitCoordination
cacontology-multi:CoordinatedArrestWave
cacontology-multi:CoordinatedCharging
cacontology-multi:CoordinatingAgent
cacontology-multi:CrossBorderOperation
cacontology-multi:CrossStateEvidence
cacontology-multi:DistributedProsecutionTeam
cacontology-multi:ExtraditionRequest
cacontology-multi:FederalAgency
cacontology-multi:FederalJurisdiction
cacontology-multi:FederalJurisdictionTrigger
cacontology-multi:HandsOnOffenseInvestigation
cacontology-multi:InformationSharing
cacontology-multi:InformationSharingAgreement
cacontology-multi:InformationSynthesisPhase
cacontology-multi:InitialCoordinationPhase
cacontology-multi:InteragencyAgreement
cacontology-multi:InteragencyCooperationSituation
cacontology-multi:InternationalAgency
cacontology-multi:InternationalJurisdiction
cacontology-multi:InternationalLegalHarmonization
cacontology-multi:InternationalProsecutionFramework
cacontology-multi:InterstateCoordination
cacontology-multi:InterstateFlightFromProsecution
cacontology-multi:InterstateTraffickingNetwork
cacontology-multi:InterstateTransportationOffense
cacontology-multi:InterstateVictimTransport
cacontology-multi:JointExecutionPhase
cacontology-multi:JointInvestigation
cacontology-multi:Jurisdiction
cacontology-multi:JurisdictionalConflictSituation
cacontology-multi:JurisdictionalHandoff
cacontology-multi:JurisdictionalNegotiationPhase
cacontology-multi:JurisdictionalWarrant
cacontology-multi:LargeScaleOperation
cacontology-multi:LawEnforcementAgency
cacontology-multi:LeadAgency
cacontology-multi:LiaisonOfficer
cacontology-multi:LocalAgency
cacontology-multi:LocalJurisdiction
cacontology-multi:MassChildRescueOperation
cacontology-multi:MassProsecutionCoordination
cacontology-multi:MassUserJurisdictionMapping
cacontology-multi:MultiJurisdictionalInvestigation
cacontology-multi:MultiJurisdictionalOperation
cacontology-multi:MultiJurisdictionalSituation
cacontology-multi:MultiStateTraffickingInvestigation
cacontology-multi:MutualAidRequest
cacontology-multi:NamedMultiJurisdictionalOperation
cacontology-multi:NationalCoordinatedOperation
cacontology-multi:NationwideChildRescueCoordination
cacontology-multi:NationwideOperation
cacontology-multi:OperationMetricsTracking
cacontology-multi:OperationSafeOnlineSummerType
cacontology-multi:ParticipatingAgency
cacontology-multi:PriorityProsecutionTrack
cacontology-multi:ProactiveInvestigationCampaign
cacontology-multi:ProjectSafeChildhoodOperation
cacontology-multi:ProsecutionCapacityAnalysis
cacontology-multi:RapidResponseCoordination
cacontology-multi:RegistrationComplianceViolation
cacontology-multi:ResourceSharing
cacontology-multi:SchoolPresentationDisclosureWorkflow
cacontology-multi:SexOffenderComplianceCheck
cacontology-multi:SimultaneousChildRescue
cacontology-multi:StateAgency
cacontology-multi:StateJurisdiction
cacontology-multi:StateLineCrossing
cacontology-multi:StatewideSweep
cacontology-multi:TaskForce
cacontology-multi:TaskForceHostedOperation
cacontology-multi:TaskForceLeader
cacontology-multi:TaskForceOperation
cacontology-multi:TraffickingCoordinationCenter
cacontology-multi:TraffickingInvestigationTask
cacontology-multi:TransportationForIllegalPurpose
cacontology-multi:USAttorneyOfficeParticipation
cacontology-multi:UserTriageProsecution
cacontology-multi:VictimIdentificationTask
cacontology-partnerships:AICooperation
cacontology-partnerships:AcademicPartner
cacontology-partnerships:AcademicPartnership
cacontology-partnerships:ActiveCooperationPhase
cacontology-partnerships:CivilSocietyEngagement
cacontology-partnerships:CivilSocietyPartner
cacontology-partnerships:CollaborativeInvestigationSituation
cacontology-partnerships:CommunityAnalysis
cacontology-partnerships:ContentDetectionCooperation
cacontology-partnerships:CoordinationMechanism
cacontology-partnerships:CrowdsourcingInvestigation
cacontology-partnerships:DataSharingAgreement
cacontology-partnerships:EmergencyCoordination
cacontology-partnerships:EvaluationPhase
cacontology-partnerships:GeolocationRequest
cacontology-partnerships:HashSharingProtocol
cacontology-partnerships:InformationSharingFramework
cacontology-partnerships:InformationSharingSituation
cacontology-partnerships:IntelligenceSharing
cacontology-partnerships:JointOperation
cacontology-partnerships:LawEnforcementPartner
cacontology-partnerships:MultiStakeholderInitiative
cacontology-partnerships:NGOCoordination
cacontology-partnerships:NGOPartner
cacontology-partnerships:OSINTInvestigation
cacontology-partnerships:ObjectIdentificationRequest
cacontology-partnerships:PartnerRole
cacontology-partnerships:PartnershipFormationPhase
cacontology-partnerships:PlatformMonitoring
cacontology-partnerships:PublicPrivatePartnership
cacontology-partnerships:PublicTip
cacontology-partnerships:RegularMeeting
cacontology-partnerships:RenewalPhase
cacontology-partnerships:TaskForceCoordination
cacontology-partnerships:TechIndustryCooperation
cacontology-partnerships:TechnicalIntegration
cacontology-partnerships:TechnologyCooperation
cacontology-partnerships:TechnologyPartner
cacontology-partnerships:ToolDevelopment
cacontology-physical:AbuseFacilitationItem
cacontology-physical:ChainOfCustodyBreachSituation
cacontology-physical:ChildTargetedItem
cacontology-physical:CommunicationDevice
cacontology-physical:ComputerEquipment
cacontology-physical:CriminalProcurement
cacontology-physical:DisguiseItem
cacontology-physical:DocumentaryEvidence
cacontology-physical:EvidenceAnalysisPhase
cacontology-physical:EvidenceCollectionPhase
cacontology-physical:EvidenceContaminationSituation
cacontology-physical:EvidenceCustodianRole
cacontology-physical:EvidenceDispositionPhase
cacontology-physical:EvidenceRecoverySituation
cacontology-physical:EvidenceSeizure
cacontology-physical:EvidenceStoragePhase
cacontology-physical:ForensicAnalystRole
cacontology-physical:ItemModification
cacontology-physical:OnlinePurchase
cacontology-physical:PersonalItem
cacontology-physical:PhysicalEvidence
cacontology-physical:PhysicalPurchase
cacontology-physical:PhysicalSearch
cacontology-physical:RecordingEquipment
cacontology-physical:ResidenceSearch
cacontology-physical:RestraintItem
cacontology-physical:SearchOfficerRole
cacontology-physical:StorageMedia
cacontology-physical:VehicleSearch
cacontology-physical:WorkplaceSearch
cacontology-platforms:AccountMetadata
cacontology-platforms:AccountSuspensionAction
cacontology-platforms:AnonymityProtectionLevel
cacontology-platforms:AnonymousChatPlatform
cacontology-platforms:AnonymousContactOpportunity
cacontology-platforms:ContentHashingAction
cacontology-platforms:ContentModerationAction
cacontology-platforms:ContentModerationCapability
cacontology-platforms:CrossPlatformEvidence
cacontology-platforms:CryptocurrencyService
cacontology-platforms:DarkWebService
cacontology-platforms:DataPreservationAction
cacontology-platforms:DataRetentionPolicy
cacontology-platforms:DeviceSocialMediaCorrelation
cacontology-platforms:DigitalEvidenceCorrelation
cacontology-platforms:ElectronicDeviceEvidence
cacontology-platforms:ElectronicServiceProvider
cacontology-platforms:FileHostingService
cacontology-platforms:GamePlatform
cacontology-platforms:GuestChatFeature
cacontology-platforms:IdentityDisclosurePolicy
cacontology-platforms:LargeScalePlatformTakedown
cacontology-platforms:LegalComplianceCapability
cacontology-platforms:LegalDataDisclosureAction
cacontology-platforms:MassUserBehaviorAnalysis
cacontology-platforms:MassUserDatabase
cacontology-platforms:MassivePlatformSituation
cacontology-platforms:MessagingService
cacontology-platforms:MinimalVerificationRequirement
cacontology-platforms:MultiPlatformSituation
cacontology-platforms:OnlineDatingPlatform
cacontology-platforms:OpenChatRooms
cacontology-platforms:PlatformCooperationSituation
cacontology-platforms:PlatformDeploymentPhase
cacontology-platforms:PlatformGrowthPhase
cacontology-platforms:PlatformInvestigationCoordination
cacontology-platforms:PlatformInvestigationPhase
cacontology-platforms:PlatformModerationPhase
cacontology-platforms:PlatformOperation
cacontology-platforms:PlatformTakedownPhase
cacontology-platforms:PrivateMessage
cacontology-platforms:ProfileBrowsingAnonymous
cacontology-platforms:RandomUserMatching
cacontology-platforms:SimultaneousSearchWarrant
cacontology-platforms:SocialMediaAccount
cacontology-platforms:SocialMediaAppData
cacontology-platforms:SocialMediaEvidence
cacontology-platforms:SocialMediaPlatform
cacontology-platforms:SocialMediaPost
cacontology-platforms:StoredSocialMediaContent
cacontology-platforms:TechnicalServiceProvider
cacontology-platforms:TemporaryAccountSystem
cacontology-platforms:UserRiskClassification
cacontology-platforms:UserScaleClassification
cacontology-platforms:UserVerificationSystem
cacontology-platforms:VideoStreamingPlatform
cacontology-prevention:AffiliateCoordination
cacontology-prevention:AffiliateResourceSharing
cacontology-prevention:AgeTargetedEducation
cacontology-prevention:ArchivePublicationSystem
cacontology-prevention:BehavioralPrevention
cacontology-prevention:BullyingPrevention
cacontology-prevention:ChildAbusePreventionMonth
cacontology-prevention:ChildSafetyEducation
cacontology-prevention:CommunityEducation
cacontology-prevention:CommunityEducator
cacontology-prevention:CommunityEmailList
cacontology-prevention:CommunityEngagement
cacontology-prevention:CommunityEngagementMetrics
cacontology-prevention:CommunityNewsletterSystem
cacontology-prevention:CommunityOutreach
cacontology-prevention:CommunityOutreachEffectiveness
cacontology-prevention:CommunityPartnershipInitiative
cacontology-prevention:CourseCompletionTracking
cacontology-prevention:DigitalLiteracy
cacontology-prevention:DigitalSafety
cacontology-prevention:DisclosureBarrierReduction
cacontology-prevention:DisclosureEncouragementStrategy
cacontology-prevention:DiscreetAccessSystem
cacontology-prevention:EducationPlatformIntegration
cacontology-prevention:EducationPortal
cacontology-prevention:EducationalOutreach
cacontology-prevention:EducationalPosterCampaign
cacontology-prevention:EducationalResource
cacontology-prevention:EducatorTraining
cacontology-prevention:EmailListEngagementMetrics
cacontology-prevention:EnvironmentalPrevention
cacontology-prevention:FAQKnowledgeBase
cacontology-prevention:FAQUsageMetrics
cacontology-prevention:HealthcareProviderTraining
cacontology-prevention:ICACAffiliateNetwork
cacontology-prevention:InformationPoster
cacontology-prevention:InteractiveCourseMetrics
cacontology-prevention:InteractiveCourseSystem
cacontology-prevention:MultimediaEducationContent
cacontology-prevention:NationwideAwarenessInitiative
cacontology-prevention:OnlineSafetyEducation
cacontology-prevention:OutreachTriggeredInvestigation
cacontology-prevention:ParentCommunityEmailList
cacontology-prevention:ParentEducation
cacontology-prevention:ParentalControl
cacontology-prevention:ParentalVigilanceProgram
cacontology-prevention:PlatformSafety
cacontology-prevention:PodcastEducationSeries
cacontology-prevention:PodcastEngagementMetrics
cacontology-prevention:PostPresentationDisclosure
cacontology-prevention:PosterDistributionMetrics
cacontology-prevention:PreventionAdvocate
cacontology-prevention:PreventionCampaign
cacontology-prevention:PreventionCurriculum
cacontology-prevention:PreventionEffectiveness
cacontology-prevention:PreventionMaterial
cacontology-prevention:PreventionMetrics
cacontology-prevention:PreventionProgram
cacontology-prevention:PreventionSpecialist
cacontology-prevention:PrimaryPrevention
cacontology-prevention:PublicAwareness
cacontology-prevention:QRCodeEngagementMetrics
cacontology-prevention:QRCodeIntegration
cacontology-prevention:RapidResponseDisclosureWorkflow
cacontology-prevention:RiskAssessmentTool
cacontology-prevention:RiskPrevention
cacontology-prevention:RiskReduction
cacontology-prevention:SafeDisclosureEnvironment
cacontology-prevention:SafetyCoordinator
cacontology-prevention:SafetyEducationEvent
cacontology-prevention:SafetyGuideline
cacontology-prevention:SafetyProtocol
cacontology-prevention:SchoolAllegationProtocol
cacontology-prevention:SchoolCounselorTraining
cacontology-prevention:SchoolDistribution
cacontology-prevention:SchoolPolicy
cacontology-prevention:SchoolPresentationProgram
cacontology-prevention:SchoolSafetyProgram
cacontology-prevention:SecondaryPrevention
cacontology-prevention:SextortionAwareness
cacontology-prevention:SextortionEducation
cacontology-prevention:SextortionResponse
cacontology-prevention:SextortionWarningSign
cacontology-prevention:StatewideCampaignMetrics
cacontology-prevention:StudentEducation
cacontology-prevention:TeacherTraining
cacontology-prevention:TertiaryPrevention
cacontology-prevention:TrustedAdultIdentification
cacontology-prevention:TwelvePlusEducation
cacontology-prevention:VictimDisclosureTriggering
cacontology-production:ActiveProductionPhase
cacontology-production:BathroomSurveillance
cacontology-production:BedroomSurveillance
cacontology-production:ConcealmentContainer
cacontology-production:ContentCreation
cacontology-production:ControlledEnvironment
cacontology-production:DeviceConcealment
cacontology-production:DigitalManipulation
cacontology-production:EditedContent
cacontology-production:EditingEquipment
cacontology-production:ExtendedProductionPeriod
cacontology-production:HiddenRecordingDevice
cacontology-production:LiveProductionEvent
cacontology-production:LiveStreamContent
cacontology-production:MobileRecordingDevice
cacontology-production:PhysicalDeviceModification
cacontology-production:PrivateSpaceSurveillance
cacontology-production:ProducedContent
cacontology-production:ProducedImage
cacontology-production:ProducedVideo
cacontology-production:Producer
cacontology-production:ProductionDistributionPhase
cacontology-production:ProductionEquipment
cacontology-production:ProductionFacilitator
cacontology-production:ProductionLocation
cacontology-production:ProductionOffense
cacontology-production:ProductionPreparationPhase
cacontology-production:ProductionSeries
cacontology-production:ProductionSession
cacontology-production:ProductionVictim
cacontology-production:RecordingAction
cacontology-production:RecordingDevice
cacontology-production:ResidentialProductionSite
cacontology-production:StationaryCamera
cacontology-recruitment:AcademicStruggles
cacontology-recruitment:AfterSchoolRecruitment
cacontology-recruitment:AttendanceProblems
cacontology-recruitment:ClassmateIntroduction
cacontology-recruitment:ClassmateRecruitmentNetwork
cacontology-recruitment:CoercedPeerRecruitment
cacontology-recruitment:EducationalInstitution
cacontology-recruitment:ExtracurricularRecruitment
cacontology-recruitment:FriendshipExploitation
cacontology-recruitment:LunchBreakRecruitment
cacontology-recruitment:MandatoryReportingActivation
cacontology-recruitment:PeerInfluenceRecruitment
cacontology-recruitment:PeerPressureVulnerability
cacontology-recruitment:PeerRecruitmentNetwork
cacontology-recruitment:RecruitmentIncentive
cacontology-recruitment:RecruitmentPunishment
cacontology-recruitment:RecruitmentQuota
cacontology-recruitment:RecruitmentTiming
cacontology-recruitment:SchoolBasedRecruitment
cacontology-recruitment:SchoolBasedReporting
cacontology-recruitment:SchoolCounselor
cacontology-recruitment:SchoolHoursRecruitment
cacontology-recruitment:SchoolPoliceContact
cacontology-recruitment:SchoolSocialWorker
cacontology-recruitment:SchoolStaffMember
cacontology-recruitment:SchoolVulnerabilityFactor
cacontology-recruitment:SocialConnectionLeverage
cacontology-recruitment:SocialIsolationAtSchool
cacontology-recruitment:SocialWorkerReport
cacontology-recruitment:StudentNetworkExploitation
cacontology-recruitment:TeacherReporter
cacontology-recruitment:VictimMediatedRecruitment
cacontology-recruitment:VictimSchoolDisclosure
cacontology-registry:AddressHistory
cacontology-registry:AgeAwareExploitation
cacontology-registry:Alias
cacontology-registry:AnnualRegistrationReview
cacontology-registry:BidirectionalContentExchange
cacontology-registry:CommunityNotification
cacontology-registry:ComplianceBasedArrest
cacontology-registry:ComplianceHistory
cacontology-registry:ComplianceScheduleCoordination
cacontology-registry:ComplianceViolation
cacontology-registry:ContactRestriction
cacontology-registry:ConvictingOffense
cacontology-registry:CourtOrder
cacontology-registry:CrossStateDigitalInvestigation
cacontology-registry:CrossStateRecidivism
cacontology-registry:DigitalRecidivismPattern
cacontology-registry:EducationInformation
cacontology-registry:EmploymentInformation
cacontology-registry:EmploymentRestriction
cacontology-registry:FailureToRegisterOffense
cacontology-registry:FalseInformationRegistrationOffense
cacontology-registry:GeographicRestriction
cacontology-registry:HighVolumeDigitalExploitation
cacontology-registry:IdentifyingMark
cacontology-registry:InternetInformation
cacontology-registry:InternetRestriction
cacontology-registry:InternetServiceProvider
cacontology-registry:MultiModalDigitalEvidence
cacontology-registry:NotificationTier
cacontology-registry:OffenderDeviceSearchWarrant
cacontology-registry:OffenderProfile
cacontology-registry:OffenseClassification
cacontology-registry:OnlineIdentifier
cacontology-registry:PersonalIdentifiers
cacontology-registry:Photograph
cacontology-registry:PhysicalDescription
cacontology-registry:PrimaryResidence
cacontology-registry:ProfessionalLicense
cacontology-registry:PublicWebsite
cacontology-registry:RecidivistSexOffender
cacontology-registry:RegisteredAddress
cacontology-registry:RegisteredSexOffender
cacontology-registry:RegisteredVehicle
cacontology-registry:RegistrationAlert
cacontology-registry:RegistrationRecord
cacontology-registry:RegistrationRequirement
cacontology-registry:RegistrationRestriction
cacontology-registry:RegistrationReviewArrest
cacontology-registry:RegistrationStatus
cacontology-registry:RegistrationUpdate
cacontology-registry:RegistryAgency
cacontology-registry:RegistryOfficer
cacontology-registry:RegistrySystem
cacontology-registry:SchoolLocation
cacontology-registry:SexOffenderRegistry
cacontology-registry:SocialMediaAccount
cacontology-registry:TemporaryAddress
cacontology-registry:VehicleInformation
cacontology-registry:VerificationCheck
cacontology-registry:VictimDeviceForensics
cacontology-registry:VictimInformation
cacontology-registry:WorkLocation
cacontology-sentencing:AppealProcess
cacontology-sentencing:ArraignmentProceeding
cacontology-sentencing:CSAM_AccessingAndViewing
cacontology-sentencing:CSAM_CausingProduction
cacontology-sentencing:CSAM_Distribution
cacontology-sentencing:CSAM_Possession
cacontology-sentencing:CSAM_Production
cacontology-sentencing:CSAM_ReceivingOnCellularDevice
cacontology-sentencing:CarriageServiceCSAMTransmission
cacontology-sentencing:CarriageServiceIndecentCommunication
cacontology-sentencing:CommonwealthChildAbuseOffense
cacontology-sentencing:CommunityService
cacontology-sentencing:CriminalCharge
cacontology-sentencing:CriminalSentence
cacontology-sentencing:DefendantRole
cacontology-sentencing:DefenseAttorneyRole
cacontology-sentencing:FederalCharge
cacontology-sentencing:JudgeRole
cacontology-sentencing:JudicialSystemSituation
cacontology-sentencing:JuryRole
cacontology-sentencing:LegalCaseSituation
cacontology-sentencing:LegalProceeding
cacontology-sentencing:LiveStreamingOffense
cacontology-sentencing:MandatoryMinimumSentencing
cacontology-sentencing:MonetaryPenalty
cacontology-sentencing:OnlineEnticement
cacontology-sentencing:PleaBargaining
cacontology-sentencing:PostConvictionPhase
cacontology-sentencing:PreTrialPhase
cacontology-sentencing:PrisonSentence
cacontology-sentencing:ProbationOfficerRole
cacontology-sentencing:ProbationSentence
cacontology-sentencing:ProsecutorRole
cacontology-sentencing:SentencingHearing
cacontology-sentencing:SentencingPhase
cacontology-sentencing:SexTrafficking
cacontology-sentencing:SextortionCharge
cacontology-sentencing:SolicitingExplicitMaterial
cacontology-sentencing:StateCharge
cacontology-sentencing:SupervisedRelease
cacontology-sentencing:TrialPhase
cacontology-sentencing:TrialProceeding
cacontology-sentencing:VictimRole
cacontology-sextortion:AdditionalContentDemand
cacontology-sextortion:AgeDeceptionSextortion
cacontology-sextortion:AgeDeceptionTactic
cacontology-sextortion:ComplianceResponse
cacontology-sextortion:ContactListThreat
cacontology-sextortion:ConversationReconstruction
cacontology-sextortion:DemandMessage
cacontology-sextortion:DeviceForensicAnalysis
cacontology-sextortion:DisappearingMessageFeature
cacontology-sextortion:EmotionalManipulation
cacontology-sextortion:ExtortionDemand
cacontology-sextortion:ExtortionPhase
cacontology-sextortion:FalseProfileCreation
cacontology-sextortion:GiftCardDemand
cacontology-sextortion:IdentityImpersonation
cacontology-sextortion:ImageAcquisitionPhase
cacontology-sextortion:ImageSharingFeature
cacontology-sextortion:ImageSolicitationMessage
cacontology-sextortion:InitialDeceptionPhase
cacontology-sextortion:InstantMessagingPlatform
cacontology-sextortion:InstantMessagingSextortion
cacontology-sextortion:ManipulationTactic
cacontology-sextortion:MonetaryDemand
cacontology-sextortion:PeerImpersonation
cacontology-sextortion:PersonalMeetingDemand
cacontology-sextortion:PrivateMessagingFeature
cacontology-sextortion:ProgressiveEscalation
cacontology-sextortion:RefusalResponse
cacontology-sextortion:ReportingResponse
cacontology-sextortion:ScreenshotThreat
cacontology-sextortion:SextortionCommunication
cacontology-sextortion:SextortionIncident
cacontology-sextortion:SextortionInvestigation
cacontology-sextortion:SextortionProgression
cacontology-sextortion:SexualSolicitationPhase
cacontology-sextortion:SexuallyExplicitConversation
cacontology-sextortion:SharingThreat
cacontology-sextortion:SilentVictimization
cacontology-sextortion:SocialMediaSextortion
cacontology-sextortion:SocialMediaSharingThreat
cacontology-sextortion:ThreatMechanism
cacontology-sextortion:ThreatMessage
cacontology-sextortion:TrustBuildingPhase
cacontology-sextortion:VictimIdentification
cacontology-sextortion:VictimIsolation
cacontology-sextortion:VictimResponse
cacontology-specialized:AnalystRole
cacontology-specialized:CollegeParkBarrack
cacontology-specialized:CommunityEngagementK9
cacontology-specialized:CoordinatedArrest
cacontology-specialized:CountyPoliceSupport
cacontology-specialized:CriticalIncidentDebriefing
cacontology-specialized:CyberCrimeUnit
cacontology-specialized:DetectionDog
cacontology-specialized:DeviceDetection
cacontology-specialized:DigitalForensicsUnit
cacontology-specialized:ElectronicStorageDeviceK9
cacontology-specialized:InteragencyOperationSituation
cacontology-specialized:K9DetectionProgram
cacontology-specialized:K9Officer
cacontology-specialized:K9SearchOperation
cacontology-specialized:K9TrainingProgram
cacontology-specialized:MarylandStatePoliceComputerCrimesUnit
cacontology-specialized:MentalHealthSupport
cacontology-specialized:MultiJurisdictionalOperation
cacontology-specialized:MultiUnitCoordinationSituation
cacontology-specialized:NamedOperation
cacontology-specialized:OfficerWellnessProgram
cacontology-specialized:OperationEvaluationPhase
cacontology-specialized:OperationExecutionPhase
cacontology-specialized:OperationMetrics
cacontology-specialized:OperationPlanningPhase
cacontology-specialized:OperationSafeOnlineSummer
cacontology-specialized:OperationUnhinged
cacontology-specialized:PeerSupport
cacontology-specialized:PrinceGeorgesCountyPolice
cacontology-specialized:SpecializedCapabilitySituation
cacontology-specialized:SpecializedInvestigativeUnit
cacontology-specialized:SpecializedOperatorRole
cacontology-specialized:StatePoliceBarrack
cacontology-specialized:StatePoliceComputerCrimesUnit
cacontology-specialized:StressManagement
cacontology-specialized:TacticalUnit
cacontology-specialized:TechnicalSpecialistRole
cacontology-specialized:TherapyDog
cacontology-specialized:UndercoverUnit
cacontology-specialized:UnitCommanderRole
cacontology-specialized:UnitDeploymentPhase
cacontology-specialized:UnitMaintenancePhase
cacontology-specialized:UnitTrainingPhase
cacontology-specialized:VictimServicesUnit
cacontology-specialized:WellnessCheck
cacontology-strategy:AIGenerationPattern
cacontology-strategy:CapabilityPattern
cacontology-strategy:CompliancePattern
cacontology-strategy:CoordinationSituationPattern
cacontology-strategy:CriminalOrganizationPattern
cacontology-strategy:CrossBorderPattern
cacontology-strategy:EducationalPattern
cacontology-strategy:EvidenceObjectPattern
cacontology-strategy:ForensicsLifecyclePattern
cacontology-strategy:HighPriorityModule
cacontology-strategy:IdeologyPattern
cacontology-strategy:InstitutionalRolePattern
cacontology-strategy:JudicialPhasePattern
cacontology-strategy:LegalEventPattern
cacontology-strategy:LowPriorityModule
cacontology-strategy:MediumPriorityModule
cacontology-strategy:ModuleIntegrationStrategy
cacontology-strategy:OntologicalConsistency
cacontology-strategy:OrganizationalPattern
cacontology-strategy:Phase3Wave1
cacontology-strategy:Phase3Wave2
cacontology-strategy:Phase3Wave3
cacontology-strategy:PhaseConsistency
cacontology-strategy:PreventiveActionPattern
cacontology-strategy:RegistrationPattern
cacontology-strategy:RoleConsistency
cacontology-strategy:SpecializedRolePattern
cacontology-strategy:SyntheticArtifactPattern
cacontology-strategy:TaskforceRolePattern
cacontology-strategy:TemporalConsistency
cacontology-strategy:TotalPhase3Implementation
cacontology-strategy:TreatyPattern
cacontology-strategy:ValidationStrategy
cacontology-street:AgeVulnerabilityIndicator
cacontology-street:AlcoholFacilitation
cacontology-street:BehavioralVulnerabilityIndicator
cacontology-street:BodySellingProposition
cacontology-street:CasualConversationApproach
cacontology-street:CommercialDistrict
cacontology-street:DelayedReporting
cacontology-street:DemographicTargeting
cacontology-street:DigitalFollowUp
cacontology-street:DigitalToPhysicalBridge
cacontology-street:DirectSolicitationApproach
cacontology-street:DirectTraffickingProposition
cacontology-street:DisclosureToAuthorities
cacontology-street:DrugFacilitatedVulnerability
cacontology-street:EconomicIncentivePresentation
cacontology-street:EscapeAttempt
cacontology-street:ExplicitCommercialOffer
cacontology-street:FoodOfferApproach
cacontology-street:HelpOfferApproach
cacontology-street:HelpSeekingBehavior
cacontology-street:HighTrafficArea
cacontology-street:HighwayLocation
cacontology-street:ImmediateExploitationAttempt
cacontology-street:ImmediateIsolation
cacontology-street:ImmediateReporting
cacontology-street:ImpairmentExploitation
cacontology-street:InitialStreetContact
cacontology-street:IsolatedLocation
cacontology-street:IsolationVulnerabilityIndicator
cacontology-street:LocationTransition
cacontology-street:MarijuanaFacilitation
cacontology-street:NeighborhoodTargeting
cacontology-street:NextDayFollowUp
cacontology-street:OpportunisticExploitation
cacontology-street:PersistenceAfterRejection
cacontology-street:PhoneChargingOffer
cacontology-street:PhysicalVulnerabilityIndicator
cacontology-street:PostContactReinforcement
cacontology-street:PretextBasedApproach
cacontology-street:ProstitutionProposition
cacontology-street:PublicSpaceTargeting
cacontology-street:RapidEscalationRecruitment
cacontology-street:ResidentialArea
cacontology-street:SameDayProgression
cacontology-street:SecondaryLocationExploitation
cacontology-street:SocioeconomicVulnerabilityIndicator
cacontology-street:StreetBasedRecruitment
cacontology-street:StreetRecruitmentLocation
cacontology-street:StreetVulnerabilityAssessment
cacontology-street:StrippingProposition
cacontology-street:SubstanceBasedControl
cacontology-street:SubstanceFacilitatedRecruitment
cacontology-street:TextMessageFollowUp
cacontology-street:TraffickingPropositionReinforcement
cacontology-street:TraffickingPropositionRejection
cacontology-street:TransitArea
cacontology-street:TransportationOfferApproach
cacontology-street:VehicleBasedIsolation
cacontology-street:VehicleLocation
cacontology-street:VictimReporting
cacontology-street:VictimResistance
cacontology-street:VictimStreetResponse
cacontology-street:VulnerabilityIndicator
cacontology-street:VulnerableNeighborhood
cacontology-tactical:BarricadeSituation
cacontology-tactical:Breacher
cacontology-tactical:BreachingTool
cacontology-tactical:CommunicationEquipment
cacontology-tactical:DynamicEntry
cacontology-tactical:HighRiskArrest
cacontology-tactical:LessLethalWeapon
cacontology-tactical:LocationIntelligence
cacontology-tactical:Marksman
cacontology-tactical:Negotiator
cacontology-tactical:ProtectiveGear
cacontology-tactical:SWATOperation
cacontology-tactical:SurrenderNegotiation
cacontology-tactical:SurveillanceEquipment
cacontology-tactical:SuspectProfile
cacontology-tactical:TacticalCommander
cacontology-tactical:TacticalEquipment
cacontology-tactical:TacticalOperation
cacontology-tactical:TacticalTeamMember
cacontology-tactical:TeamLeader
cacontology-tactical:ThreatAssessment
cacontology-taskforce:AnalyticsUnit
cacontology-taskforce:AnnualPerformance
cacontology-taskforce:ArrestMetrics
cacontology-taskforce:AssessmentPhase
cacontology-taskforce:AttorneyGeneralHost
cacontology-taskforce:CaliforniaRegionalSystem
cacontology-taskforce:CertificationProgram
cacontology-taskforce:CoordinationMechanism
cacontology-taskforce:CoordinationPhase
cacontology-taskforce:CountyBasedTaskForce
cacontology-taskforce:CyberTipMetrics
cacontology-taskforce:DeploymentPhase
cacontology-taskforce:DigitalForensicsUnit
cacontology-taskforce:DistrictAttorneyHost
cacontology-taskforce:EquipmentSharing
cacontology-taskforce:ExecutionPhase
cacontology-taskforce:ExpertiseSharing
cacontology-taskforce:FederalICACtaskForce
cacontology-taskforce:FederalLawEnforcementPartner
cacontology-taskforce:FloridaRegionalSystem
cacontology-taskforce:GovernorsOfficeCrimePreventionFunding
cacontology-taskforce:HistoricalMetrics
cacontology-taskforce:ICACtaskForce
cacontology-taskforce:IllinoisICACtaskForce
cacontology-taskforce:IntelligenceSharing
cacontology-taskforce:InterAgencyCoordination
cacontology-taskforce:JointOperation
cacontology-taskforce:LocalICACtaskForce
cacontology-taskforce:LocalLawEnforcementPartner
cacontology-taskforce:LocalPoliceHost
cacontology-taskforce:MarylandICACtaskForce
cacontology-taskforce:MetropolitanTaskForce
cacontology-taskforce:MilitaryICACtaskForce
cacontology-taskforce:MultiRegionalState
cacontology-taskforce:NationalHotline
cacontology-taskforce:NationalICACtaskForceDirectory
cacontology-taskforce:NetworkPerformance
cacontology-taskforce:NewYorkRegionalSystem
cacontology-taskforce:PersonnelSharing
cacontology-taskforce:PlanningPhase
cacontology-taskforce:ProactiveOperation
cacontology-taskforce:ReactiveOperation
cacontology-taskforce:RegionalCoordination
cacontology-taskforce:RegionalTaskForce
cacontology-taskforce:RegionalTaskForceCoordination
cacontology-taskforce:ResourceSharing
cacontology-taskforce:SheriffOfficeHost
cacontology-taskforce:SpecializedUnit
cacontology-taskforce:StateAgencyHost
cacontology-taskforce:StateBureauHost
cacontology-taskforce:StateICACtaskForce
cacontology-taskforce:StateLocalFundingCombination
cacontology-taskforce:StatePoliceHost
cacontology-taskforce:StatewideTaskForce
cacontology-taskforce:SweepOperation
cacontology-taskforce:TacticalUnit
cacontology-taskforce:TaskForceAlliance
cacontology-taskforce:TaskForceAnalyst
cacontology-taskforce:TaskForceCommander
cacontology-taskforce:TaskForceContactInformation
cacontology-taskforce:TaskForceCoordinator
cacontology-taskforce:TaskForceForensicExaminer
cacontology-taskforce:TaskForceHostOrganization
cacontology-taskforce:TaskForceHotline
cacontology-taskforce:TaskForceInvestigator
cacontology-taskforce:TaskForceMember
cacontology-taskforce:TaskForceMetrics
cacontology-taskforce:TaskForceOperation
cacontology-taskforce:TaskForceTraining
cacontology-taskforce:TaskForceWebsite
cacontology-taskforce:TexasRegionalSystem
cacontology-taskforce:TrainingReachMetrics
cacontology-taskforce:TrainingUnit
cacontology-taskforce:UndercoverUnit
cacontology-taskforce:VictimServiceUnit
cacontology-temporal:Age
cacontology-temporal:AgeAtTimeSituation
cacontology-temporal:AnalysisTransitionEvent
cacontology-temporal:ClosureEvent
cacontology-temporal:ConcurrentInvestigationSituation
cacontology-temporal:EventSequence
cacontology-temporal:EvidenceTransitionEvent
cacontology-temporal:InitiationEvent
cacontology-temporal:InvestigationLifecycle
cacontology-temporal:LegalProcessTransitionEvent
cacontology-temporal:MultiJurisdictionCoordinationSituation
cacontology-temporal:ParallelEventCluster
cacontology-temporal:ParallelEvidenceCollectionSituation
cacontology-temporal:PhaseTransitionEvent
cacontology-temporal:ResolutionTransitionEvent
cacontology-temporal:ResumptionEvent
cacontology-temporal:RoleConflictSituation
cacontology-temporal:RoleEscalation
cacontology-temporal:RoleReassignment
cacontology-temporal:RoleTransition
cacontology-temporal:SimultaneousRoleSituation
cacontology-temporal:SuspendedSituation
cacontology-temporal:SuspensionEvent
cacontology-temporal:UrgentRescueLifecycle
cacontology-trafficking:AdultTraffickingVictimRole
cacontology-trafficking:AgingOutVictimProfile
cacontology-trafficking:AssociateTraffickerRole
cacontology-trafficking:CommercialSexualExploitation
cacontology-trafficking:CrossJurisdictionalControl
cacontology-trafficking:DisruptionPhase
cacontology-trafficking:EarningsCollection
cacontology-trafficking:EstablishmentPhase
cacontology-trafficking:ExpansionPhase
cacontology-trafficking:FinancialFacilitatorRole
cacontology-trafficking:InterstateVictimTransport
cacontology-trafficking:MinorTraffickingVictimRole
cacontology-trafficking:MultiJurisdictionalSituation
cacontology-trafficking:MultiStateTraffickingConspiracy
cacontology-trafficking:OngoingDangerResponse
cacontology-trafficking:OperationalPhase
cacontology-trafficking:PrimaryTraffickerRole
cacontology-trafficking:RecruitmentFacilitatorRole
cacontology-trafficking:RunawayVictimProfile
cacontology-trafficking:TraffickerRole
cacontology-trafficking:TraffickingCell
cacontology-trafficking:TraffickingEnterprise
cacontology-trafficking:TraffickingHierarchy
cacontology-trafficking:TraffickingNetworkSituation
cacontology-trafficking:TraffickingOperation
cacontology-trafficking:TraffickingRing
cacontology-trafficking:TraffickingVictimRescue
cacontology-trafficking:TraffickingVictimRole
cacontology-trafficking:TransportationFacilitatorRole
cacontology-trafficking:VictimControl
cacontology-trafficking:VictimControlSituation
cacontology-trafficking:VictimEmergencyResponse
cacontology-trafficking:VictimRecruitment
cacontology-trafficking:VictimRotation
cacontology-trafficking:VictimSafetyAssessment
cacontology-trafficking:VictimTransportation
cacontology-trafficking:VictimVulnerabilityProfile
cacontology-training:AssessmentPhase
cacontology-training:CapacityBuildingPartner
cacontology-training:CapacityBuildingProgram
cacontology-training:CapacityBuildingSituation
cacontology-training:CertificationBody
cacontology-training:CertificationPhase
cacontology-training:CertifiedProfessional
cacontology-training:ChildProtectionTraining
cacontology-training:CompetencyAssessment
cacontology-training:ContentDevelopmentPhase
cacontology-training:ContinuingEducation
cacontology-training:CriminalJusticeTraining
cacontology-training:DigitalForensicsTraining
cacontology-training:GlobalTrainingReach
cacontology-training:GlobalTrainingSituation
cacontology-training:HotlineTraining
cacontology-training:HybridTraining
cacontology-training:InPersonTraining
cacontology-training:InternationalTrainer
cacontology-training:InternationalTraining
cacontology-training:InvestigationTraining
cacontology-training:K9ProgramMetrics
cacontology-training:LegalTraining
cacontology-training:MentorshipProgram
cacontology-training:MultiStakeholderTrainingSituation
cacontology-training:OnlineTraining
cacontology-training:OperationalTrainingMetrics
cacontology-training:OutreachEventMetrics
cacontology-training:ProfessionalCertification
cacontology-training:ProfessionalDevelopment
cacontology-training:ProfessionalTrainingMetrics
cacontology-training:ProgramPlanningPhase
cacontology-training:SkillsDevelopmentProgram
cacontology-training:SkillsValidation
cacontology-training:SubjectMatterExpert
cacontology-training:TrainingCertificate
cacontology-training:TrainingCoordinator
cacontology-training:TrainingCurriculum
cacontology-training:TrainingDeliveryPhase
cacontology-training:TrainingEffectiveness
cacontology-training:TrainingInstitution
cacontology-training:TrainingMetrics
cacontology-training:TrainingModule
cacontology-training:TrainingParticipant
cacontology-training:VictimServiceTraining
cacontology-undercover:AdvertisementPhotographyEvidence
cacontology-undercover:ApartmentStingOperation
cacontology-undercover:BathroomViolationEvidence
cacontology-undercover:ChatInvestigationAgent
cacontology-undercover:ChatRoomInfiltration
cacontology-undercover:ChildPersona
cacontology-undercover:ClientCommunicationInterception
cacontology-undercover:ClientResponseInterception
cacontology-undercover:ControlledMeeting
cacontology-undercover:CriminalSolicitation
cacontology-undercover:EvidenceGatheringPhase
cacontology-undercover:ExtractionPhase
cacontology-undercover:InPersonMeetingSolicitation
cacontology-undercover:IncriminatingStatement
cacontology-undercover:InfiltrationPhase
cacontology-undercover:LiveAdvertisementMonitoring
cacontology-undercover:MinorPersonaAgent
cacontology-undercover:MinorPersonaOperation
cacontology-undercover:MultiPlatformUndercoverOperation
cacontology-undercover:OnlinePlatformSurveillance
cacontology-undercover:OperationHandler
cacontology-undercover:OperationalEvidence
cacontology-undercover:ParentPersona
cacontology-undercover:PhoneInstructionMonitoring
cacontology-undercover:PhysicalLocationSting
cacontology-undercover:PlatformAccount
cacontology-undercover:PredatorTargetingOperation
cacontology-undercover:PreparationPhase
cacontology-undercover:PrivacyViolationInvestigation
cacontology-undercover:ResidentialStingLocation
cacontology-undercover:SocialMediaAgent
cacontology-undercover:SocialMediaUndercoverOperation
cacontology-undercover:StingOperation
cacontology-undercover:SurveillancePosition
cacontology-undercover:TechnicalSupport
cacontology-undercover:UndercoverAgent
cacontology-undercover:UndercoverChatInvestigation
cacontology-undercover:UndercoverCommunication
cacontology-undercover:UndercoverEvidence
cacontology-undercover:UndercoverIdentity
cacontology-undercover:UndercoverOperation
cacontology-undercover:VictimInstructionEvidence
cacontology-undercover:WebsiteAdvertisementResponse
cacontology-us-ncmec:AccountLinking
cacontology-us-ncmec:CSAMSolicitationAnnotation
cacontology-us-ncmec:ChildSexTourismIncident
cacontology-us-ncmec:ChildSexTraffickingIncident
cacontology-us-ncmec:ContentIdentification
cacontology-us-ncmec:CyberTipAnalysis
cacontology-us-ncmec:FederalReferral
cacontology-us-ncmec:InvestigationTrigger
cacontology-us-ncmec:LocalLawEnforcementReferral
cacontology-us-ncmec:MinorToMinorInteractionAnnotation
cacontology-us-ncmec:NCMECCybertipReport
cacontology-us-ncmec:NCMECIncidentType
cacontology-us-ncmec:NCMECReportAnnotation
cacontology-us-ncmec:OnlineEnticementIncident
cacontology-us-ncmec:PhoneNumberTrace
cacontology-us-ncmec:PlatformCooperation
cacontology-us-ncmec:PossessionIndicator
cacontology-us-ncmec:SextortionAnnotation
cacontology-us-ncmec:SpamAnnotation
cacontology-us-ncmec:TaskForceReferral
cacontology-us-ncmec:TipEnrichment
cacontology-us-ncmec:TipPrioritization
cacontology-us-ncmec:TipProcessing
cacontology-us-ncmec:TipValidation
cacontology-us-ncmec:TransferDetection
cacontology-usa-federal:AbusiveContactWithMinor
cacontology-usa-federal:AggravatedSexualAbuse
cacontology-usa-federal:CEOSAttorneyRole
cacontology-usa-federal:CEOSdivision
cacontology-usa-federal:ChildPornographyDistribution
cacontology-usa-federal:ChildPornographyPossession
cacontology-usa-federal:ChildPornographyProduction
cacontology-usa-federal:ChildPornographyReceipt
cacontology-usa-federal:ChildSupportEnforcementLaw
cacontology-usa-federal:ChildSupportEvasion
cacontology-usa-federal:ChildSupportExploitationLink
cacontology-usa-federal:CommercialSexualExploitation
cacontology-usa-federal:ExtraterritorialProduction
cacontology-usa-federal:ExtraterritorialSexualExploitationLaw
cacontology-usa-federal:FederalChildExploitationLaw
cacontology-usa-federal:FederalChildPornographyLaw
cacontology-usa-federal:FederalChildSexTraffickingLaw
cacontology-usa-federal:FederalChildSexualAbuseLaw
cacontology-usa-federal:FederalDefendantRole
cacontology-usa-federal:FederalInvestigation
cacontology-usa-federal:FederalInvestigatorRole
cacontology-usa-federal:FederalObscenityLaw
cacontology-usa-federal:FederalProsecution
cacontology-usa-federal:FederalProsecutorRole
cacontology-usa-federal:FederalVictimRole
cacontology-usa-federal:FinancialControlPattern
cacontology-usa-federal:ForeignCommerceExploitation
cacontology-usa-federal:ObscenityDistribution
cacontology-usa-federal:ObscenityImportation
cacontology-usa-federal:ObscenityTransportation
cacontology-usa-federal:OnlineObscenityDistribution
cacontology-usa-federal:PostConvictionPhase
cacontology-usa-federal:PreTrialPhase
cacontology-usa-federal:SentencingPhase
cacontology-usa-federal:SexTourism
cacontology-usa-federal:SexTraffickingConspiracy
cacontology-usa-federal:SexTraffickingOfMinors
cacontology-usa-federal:SexualAbuseOfMinor
cacontology-usa-federal:TransportationForSexualExploitation
cacontology-usa-federal:TrialPhase
cacontology1:AnalysisPhase
cacontology1:AnalystRole
cacontology1:CACInvestigation
cacontology1:CSAMCurationAction
cacontology1:CSAMIncident
cacontology1:ChildSexualAbuseEvent
cacontology1:ChildSexualExploitation
cacontology1:ChildSexualExploitationCharge
cacontology1:ConclusionPhase
cacontology1:ConspiracyLeaderRole
cacontology1:ConspiracyMemberRole
cacontology1:ConspiracyRole
cacontology1:ConspiracyToCommitCSA
cacontology1:CoordinatedOffensePattern
cacontology1:CriminalEnterprise
cacontology1:DigitallyGeneratedCSAMIncident
cacontology1:EvidencePhase
cacontology1:EvidenceReviewAction
cacontology1:GroomingSolicitation
cacontology1:InitialPhase
cacontology1:Investigation
cacontology1:InvestigationLifecycleSituation
cacontology1:InvestigatorRole
cacontology1:LegalProcessAction
cacontology1:LegalProcessPhase
cacontology1:LiveStreamingCSA
cacontology1:MultiDefendantIndictment
cacontology1:OffenderRole
cacontology1:ReceiveCybertipAction
cacontology1:RescuerRole
cacontology1:ReviewCybertipAction
cacontology1:Sextortion
cacontology1:UnknownVictimSubmission
cacontology1:VictimPhase
cacontology1:VictimRescueAction
cacontology1:VictimRole
cacontology2:Investigation
case-investigation:Investigation
gufo:AbstractArtifact
gufo:Action
gufo:Artifact
gufo:Event
gufo:FunctionalComplex
gufo:IntrinsicMode
gufo:IntrinsicMoment
gufo:Norm
gufo:Object
gufo:Organization
gufo:ParticipationSituation
gufo:Phase
gufo:Plan
gufo:Process
gufo:Quality
gufo:QualityValueAttributionSituation
gufo:Relator
gufo:Role
gufo:Situation
gufo:TemporaryParthoodSituation
hotline:ActionPhase
hotline:AutomatedReporterAgent
hotline:ClosurePhase
hotline:ESPReport
hotline:EvidenceItem
hotline:ForensicsSpecialistRole
hotline:ForwardToLEAction
hotline:HashFeedbackAction
hotline:HashSubmissionAction
hotline:HotlineAction
hotline:HotlineAnalystRole
hotline:HotlineOrganization
hotline:HotlineReport
hotline:ImageEvidence
hotline:IntakeChannel
hotline:IntakePhase
hotline:InternationalCoordination
hotline:LiaisonRole
hotline:MultiAgencyCoordination
hotline:PublicReport
hotline:ReportReviewAction
hotline:ReporterRole
hotline:ReviewPhase
hotline:TakedownRequestAction
hotline:URLReference
hotline:VideoEvidence
skos:Concept
uco-action:Action
uco-action:Crime
uco-channel:DigitalService
uco-core:Observable
uco-core:Relationship
uco-core:Role
uco-core:UcoObject
uco-identity:Identity
uco-identity:Organization
uco-identity:Person
uco-identity:Role
uco-identity:Software
uco-location:Location
uco-observable:Account
uco-observable:DigitalAccount
uco-observable:DigitalArtifact
uco-observable:DigitalDevice
uco-observable:DigitalService
uco-observable:DigitalServiceFeature
uco-observable:File
uco-observable:Hash
uco-observable:Image
uco-observable:Message
uco-observable:MessageThread
uco-observable:ObservableObject
uco-observable:Observation
uco-observable:PhoneCall
uco-observable:PhoneNumber
uco-observable:URL
uco-observable:WebPage
uco-pattern:Pattern
uco-role:OffenderRole
uco-role:Role
uco-role:SubjectRole
uco-role:VictimRole
uco-tool:AnalyticTool
uco-tool:Tool
uco-types:Hash
Properties (2214)
cacontology-abduction:abductionDuration
cacontology-abduction:abductionLocation
cacontology-abduction:accessDifficulty
cacontology-abduction:approachMethod
cacontology-abduction:complianceReason
cacontology-abduction:concealmentLevel
cacontology-abduction:concealsIdentityWith
cacontology-abduction:disclosesTo
cacontology-abduction:disclosureMethod
cacontology-abduction:disguiseEffectiveness
cacontology-abduction:disguiseType
cacontology-abduction:documentsAbduction
cacontology-abduction:employsCoercion
cacontology-abduction:entryMethod
cacontology-abduction:escalatesTo
cacontology-abduction:escapeRoutes
cacontology-abduction:evidenceRecoveryRate
cacontology-abduction:exercisesControl
cacontology-abduction:exhibitsVulnerability
cacontology-abduction:exploitsVulnerability
cacontology-abduction:facilitatesExploitation
cacontology-abduction:forcesEntryTo
cacontology-abduction:investigatesAbduction
cacontology-abduction:investigationDuration
cacontology-abduction:isolatesAt
cacontology-abduction:locationIsolationLevel
cacontology-abduction:occursAt
cacontology-abduction:opportunityWindow
cacontology-abduction:perpetratesAbduction
cacontology-abduction:recoveredFrom
cacontology-abduction:reportingDelay
cacontology-abduction:reportsAbduction
cacontology-abduction:resistanceLevel
cacontology-abduction:resistsAbduction
cacontology-abduction:respondsTo
cacontology-abduction:supportsCharge
cacontology-abduction:surveillanceDuration
cacontology-abduction:targetingCriteria
cacontology-abduction:targetsVictim
cacontology-abduction:threatEffectiveness
cacontology-abduction:threatSpecificity
cacontology-abduction:threatensWith
cacontology-abduction:timeOfDay
cacontology-abduction:transitionsTo
cacontology-abduction:triggersInvestigation
cacontology-abduction:usesDisguise
cacontology-abduction:usesWeapon
cacontology-abduction:victimActivity
cacontology-abduction:victimsOf
cacontology-abduction:weaponDisplayed
cacontology-abduction:weaponType
cacontology-abduction:witnessCount
cacontology-ai:aiModelUsed
cacontology-ai:analyzesTrainingData
cacontology-ai:artifactsDetected
cacontology-ai:artificialnessLevel
cacontology-ai:basedOnModel
cacontology-ai:challengesLegalFramework
cacontology-ai:complicatesVictimIdentification
cacontology-ai:detectedBy
cacontology-ai:detectionConfidence
cacontology-ai:detectionMethod
cacontology-ai:evidenceAdmissibility
cacontology-ai:falsePositiveRate
cacontology-ai:generatedUsing
cacontology-ai:generationComplexity
cacontology-ai:generationTechnique
cacontology-ai:investigationChallengeLevel
cacontology-ai:legalFrameworkChallenges
cacontology-ai:processingTime
cacontology-ai:prosecutionDifficulty
cacontology-ai:realVictimDepicted
cacontology-ai:renderingQuality
cacontology-ai:requiresSpecializedProsecution
cacontology-ai:revealsArtifacts
cacontology-ai:sourceTraceability
cacontology-ai:subjectOfInvestigation
cacontology-ai:technicalExpertiseRequired
cacontology-ai:tracesToSource
cacontology-ai:usesDetectionTool
cacontology-ai:utilizesTool
cacontology-ai:victimIdentificationDifficulty
cacontology-asset-forfeiture:accountFunds
cacontology-asset-forfeiture:assignedRole
cacontology-asset-forfeiture:courtJurisdiction
cacontology-asset-forfeiture:currentPhase
cacontology-asset-forfeiture:equipmentType
cacontology-asset-forfeiture:estimatedValue
cacontology-asset-forfeiture:financialPenaltyAmount
cacontology-asset-forfeiture:forfeitureDate
cacontology-asset-forfeiture:forfeiturePercentage
cacontology-asset-forfeiture:hasPhaseTransition
cacontology-asset-forfeiture:involvesCoordination
cacontology-asset-forfeiture:involvesTaskforce
cacontology-asset-forfeiture:itemCount
cacontology-asset-forfeiture:marketValue
cacontology-asset-forfeiture:playsRole
cacontology-asset-forfeiture:precedentSetting
cacontology-asset-forfeiture:relatedCriminalCharges
cacontology-asset-forfeiture:restraintDate
cacontology-asset-forfeiture:targetedAsset
cacontology-athletic:coachesTeam
cacontology-athletic:coachingExperience
cacontology-athletic:currentPhase
cacontology-athletic:hasPhaseTransition
cacontology-athletic:holdsCoachingRole
cacontology-athletic:multipleRoles
cacontology-athletic:occursInFacility
cacontology-athletic:participatesInSituation
cacontology-athletic:playsOnTeam
cacontology-athletic:practiceFrequency
cacontology-athletic:sportType
cacontology-athletic:teamType
cacontology-athletic:utilizesAthleticSpace
cacontology-case:accessLevel
cacontology-case:appealStatus
cacontology-case:approvedBy
cacontology-case:archivalDate
cacontology-case:archivedAt
cacontology-case:assignedBy
cacontology-case:assignedInvestigator
cacontology-case:assignedTo
cacontology-case:assignedToRole
cacontology-case:assignmentDate
cacontology-case:assignmentStatus
cacontology-case:assignmentType
cacontology-case:benchmarkValue
cacontology-case:benchmarkedAgainst
cacontology-case:caseCloseDate
cacontology-case:caseOpenDate
cacontology-case:casePriority
cacontology-case:caseStatus
cacontology-case:caseType
cacontology-case:caseloadCount
cacontology-case:certificationLevel
cacontology-case:classificationLevel
cacontology-case:closedBy
cacontology-case:closureDate
cacontology-case:closureReason
cacontology-case:conductsReview
cacontology-case:creationDate
cacontology-case:currentPhase
cacontology-case:documentStatus
cacontology-case:documentType
cacontology-case:documentedBy
cacontology-case:finalDisposition
cacontology-case:followsStage
cacontology-case:followsWorkflow
cacontology-case:generatesMetrics
cacontology-case:hasAssignment
cacontology-case:hasDocumentation
cacontology-case:hasPhaseTransition
cacontology-case:holdsRole
cacontology-case:investigatorExperience
cacontology-case:jurisdictionLevel
cacontology-case:lastModified
cacontology-case:lastUpdate
cacontology-case:managesCase
cacontology-case:measurementUnit
cacontology-case:measuresPerformance
cacontology-case:metricType
cacontology-case:metricValue
cacontology-case:participatesInManagement
cacontology-case:precedesStage
cacontology-case:recommendationsCount
cacontology-case:reportingPeriod
cacontology-case:resultsInClosure
cacontology-case:retentionPeriod
cacontology-case:reviewDate
cacontology-case:reviewOutcome
cacontology-case:reviewType
cacontology-case:reviewedBy
cacontology-case:reviewerRole
cacontology-case:reviewsCase
cacontology-case:specialization
cacontology-case:stageDuration
cacontology-case:stageEndDate
cacontology-case:stageOutcome
cacontology-case:stageStartDate
cacontology-case:supervisedBy
cacontology-case:trackedBy
cacontology-case:trackingNumber
cacontology-case:trackingSystem
cacontology-case:undergoesReview
cacontology-case:updateFrequency
cacontology-case:workflowStage
cacontology-case:workloadPercentage
cacontology-coord:agreementScope
cacontology-coord:agreementType
cacontology-coord:assignedBy
cacontology-coord:assignmentDuration
cacontology-coord:assignsLiaison
cacontology-coord:authorizedBy
cacontology-coord:availabilityLevel
cacontology-coord:benchmarkComparison
cacontology-coord:benchmarkedAgainst
cacontology-coord:classificationLevel
cacontology-coord:clearanceLevel
cacontology-coord:communicationAuthority
cacontology-coord:communicationFrequency
cacontology-coord:concernsCase
cacontology-coord:concernsParticipant
cacontology-coord:concernsTemporaryPart
cacontology-coord:concernsTemporaryWhole
cacontology-coord:connectsAgencies
cacontology-coord:coordinationLevel
cacontology-coord:coordinationStatus
cacontology-coord:coordinationType
cacontology-coord:costSharing
cacontology-coord:effectiveDate
cacontology-coord:escalationProcedure
cacontology-coord:evaluatesCoordination
cacontology-coord:expirationDate
cacontology-coord:facilitatesCommunication
cacontology-coord:governsAgreement
cacontology-coord:hasAccuracy
cacontology-coord:hasActionability
cacontology-coord:hasComplexityLevel
cacontology-coord:hasComponent
cacontology-coord:hasCoordinationEffectiveness
cacontology-coord:hasCoordinationIntensity
cacontology-coord:hasDataCompleteness
cacontology-coord:hasDataConsistency
cacontology-coord:hasDataQuality
cacontology-coord:hasIntelligenceValue
cacontology-coord:hasLiaisonEffectiveness
cacontology-coord:hasReliability
cacontology-coord:hasResponsiveness
cacontology-coord:hasSecurityLevel
cacontology-coord:hasSharingEfficiency
cacontology-coord:hasSubInvestigation
cacontology-coord:hasSuccessRate
cacontology-coord:hasTimeliness
cacontology-coord:hasTrustLevel
cacontology-coord:hasUnificationLevel
cacontology-coord:hasValidationLevel
cacontology-coord:informationAccuracy
cacontology-coord:intelligenceType
cacontology-coord:investigationScope
cacontology-coord:involvesAgency
cacontology-coord:involvesPersonnel
cacontology-coord:isComponentOf
cacontology-coord:isSubInvestigationOf
cacontology-coord:leadAgency
cacontology-coord:liaisonRole
cacontology-coord:liaisonWith
cacontology-coord:measurementPeriod
cacontology-coord:measuresPerformance
cacontology-coord:metricType
cacontology-coord:metricValue
cacontology-coord:participatesIn
cacontology-coord:participatesInSharing
cacontology-coord:participatingAgencies
cacontology-coord:personnelCount
cacontology-coord:protocolType
cacontology-coord:providesResource
cacontology-coord:receivesResource
cacontology-coord:reciprocity
cacontology-coord:reimbursement
cacontology-coord:renewalClause
cacontology-coord:representsAgency
cacontology-coord:resourcePooling
cacontology-coord:resourceType
cacontology-coord:responseTimeRequirement
cacontology-coord:securityClearance
cacontology-coord:sharedCommand
cacontology-coord:sharesFromAgency
cacontology-coord:sharesInformation
cacontology-coord:sharesResources
cacontology-coord:sharesWithAgency
cacontology-coord:sharingAgreement
cacontology-coord:sharingDuration
cacontology-coord:sharingMechanism
cacontology-coord:sharingType
cacontology-coord:signedByAgency
cacontology-coord:sourceReliability
cacontology-coord:specialization
cacontology-coord:standsInQualifiedParthood
cacontology-coord:standsInQualifiedParticipation
cacontology-coord:terminationClause
cacontology-coord:unifiedReporting
cacontology-coord:usesProtocol
cacontology-corruption:abusesAccess
cacontology-corruption:accessLevel
cacontology-corruption:authorityLevel
cacontology-corruption:badgeVisible
cacontology-corruption:concernsCorruptOfficer
cacontology-corruption:corruptionDuration
cacontology-corruption:corruptsEvidence
cacontology-corruption:departmentAffiliation
cacontology-corruption:detectedBy
cacontology-corruption:displaysAuthority
cacontology-corruption:employmentStatus
cacontology-corruption:employsOfficer
cacontology-corruption:exploitsPosition
cacontology-corruption:hasAuthorityAbuseDegree
cacontology-corruption:hasAuthorityEnhancementLevel
cacontology-corruption:hasCorruptionDependency
cacontology-corruption:hasCorruptionImpact
cacontology-corruption:hasCorruptionSeverity
cacontology-corruption:hasDataCompleteness
cacontology-corruption:hasDataQuality
cacontology-corruption:hasDetectionDifficulty
cacontology-corruption:hasEvidenceIntegrity
cacontology-corruption:hasIntimidationFactor
cacontology-corruption:hasInvestigationComplexity
cacontology-corruption:hasPositionExploitationLevel
cacontology-corruption:hasSymbolVisibility
cacontology-corruption:hasTrustBetrayalLevel
cacontology-corruption:hasValidationLevel
cacontology-corruption:hasVictimVulnerability
cacontology-corruption:investigatedBy
cacontology-corruption:isDetectedBy
cacontology-corruption:leaksInformation
cacontology-corruption:participatesIn
cacontology-corruption:reportedBy
cacontology-corruption:standsInQualifiedCorruption
cacontology-corruption:uniformDisplayed
cacontology-corruption:uniformType
cacontology-corruption:victimCount
cacontology-corruption:wearsUniform
cacontology-corruption:yearsOfService
cacontology-custodial:accessLevel
cacontology-custodial:aggravatingFactor
cacontology-custodial:authorityLevel
cacontology-custodial:authorityScope
cacontology-custodial:authorizationLevel
cacontology-custodial:breachDuration
cacontology-custodial:checkScope
cacontology-custodial:checkStatus
cacontology-custodial:consentScope
cacontology-custodial:consentStatus
cacontology-custodial:createsCustodialSituation
cacontology-custodial:custodyDuration
cacontology-custodial:custodySchedule
cacontology-custodial:custodyType
cacontology-custodial:hasAuthority
cacontology-custodial:hasCustodyBeginPoint
cacontology-custodial:hasCustodyEndPoint
cacontology-custodial:hasCustodyPhase
cacontology-custodial:hasRoleBeginPoint
cacontology-custodial:hasRoleEndPoint
cacontology-custodial:hasViolationBeginPoint
cacontology-custodial:hasViolationEndPoint
cacontology-custodial:holdsPositionOf
cacontology-custodial:inCustodyPhase
cacontology-custodial:involvesChild
cacontology-custodial:involvesCustodian
cacontology-custodial:involvesParent
cacontology-custodial:occursInCustodialSituation
cacontology-custodial:perpetratedBy
cacontology-custodial:relationshipDuration
cacontology-custodial:relationshipFrequency
cacontology-custodial:relationshipIntimacy
cacontology-custodial:relationshipType
cacontology-custodial:relevantToInvestigation
cacontology-custodial:subjectTo
cacontology-custodial:supervisionLevel
cacontology-custodial:trustLevel
cacontology-custodial:violatesPosition
cacontology-custodial:violatesRelationship
cacontology-custodial:violationPattern
cacontology-custodial:violationSeverity
cacontology-custodial:violationType
cacontology-custodial:vulnerabilityFactor
cacontology-detection:ageEstimate
cacontology-detection:confidenceScore
cacontology-detection:copineClassification
cacontology-detection:detectedContent
cacontology-detection:detectionDuration
cacontology-detection:detectionThreshold
cacontology-detection:falsePositiveReason
cacontology-detection:generatedHash
cacontology-detection:hasDetectionBeginPoint
cacontology-detection:hasDetectionEndPoint
cacontology-detection:hasPhaseBeginPoint
cacontology-detection:hasPhaseEndPoint
cacontology-detection:hasRoleBeginPoint
cacontology-detection:hasRoleEndPoint
cacontology-detection:hashAlgorithm
cacontology-detection:matchType
cacontology-detection:matchedDatabase
cacontology-detection:modelVersion
cacontology-detection:perceptualHashValue
cacontology-detection:phaseDuration
cacontology-detection:photoDNAValue
cacontology-detection:reviewDecision
cacontology-detection:reviewedBy
cacontology-detection:roleDuration
cacontology-detection:sarClassification
cacontology-detection:similarityScore
cacontology-detection:tannerStage
cacontology-educational1:academicActivity
cacontology-educational1:accessLevel
cacontology-educational1:activatesMandatoryReporting
cacontology-educational1:actualAge
cacontology-educational1:addressesVulnerability
cacontology-educational1:assignmentType
cacontology-educational1:attendsInstitution
cacontology-educational1:bailAmount
cacontology-educational1:bodyPartTouched
cacontology-educational1:bondAmount
cacontology-educational1:chargeCount
cacontology-educational1:chargeDegree
cacontology-educational1:chargesDefendant
cacontology-educational1:classroomNumber
cacontology-educational1:collectsEvidence
cacontology-educational1:communicatesVia
cacontology-educational1:contactDuration
cacontology-educational1:contactFrequency
cacontology-educational1:contactType
cacontology-educational1:coordinatesWith
cacontology-educational1:corroboratesAccount
cacontology-educational1:deceivesVictim
cacontology-educational1:deceptionDuration
cacontology-educational1:degradationLevel
cacontology-educational1:degradesVictim
cacontology-educational1:disclosesTo
cacontology-educational1:disclosureMethod
cacontology-educational1:documentsExploitation
cacontology-educational1:documentsHarassment
cacontology-educational1:duringActivity
cacontology-educational1:educatorAge
cacontology-educational1:employedAt
cacontology-educational1:employmentDuration
cacontology-educational1:enhancedBy
cacontology-educational1:escalatesTo
cacontology-educational1:evidenceLocation
cacontology-educational1:evidenceType
cacontology-educational1:exploitationDuration
cacontology-educational1:exploitationLocation
cacontology-educational1:exploitationMethod
cacontology-educational1:exploitsIsolation
cacontology-educational1:exploitsPosition
cacontology-educational1:exploitsVulnerability
cacontology-educational1:fakeAccountCount
cacontology-educational1:followedBySupervision
cacontology-educational1:forceLevel
cacontology-educational1:forciblyTouches
cacontology-educational1:gradeLevel
cacontology-educational1:gradeRange
cacontology-educational1:harassmentContent
cacontology-educational1:harassmentFrequency
cacontology-educational1:harassmentMedium
cacontology-educational1:hasVulnerability
cacontology-educational1:identifiesVulnerability
cacontology-educational1:impersonatedAge
cacontology-educational1:impersonatesAge
cacontology-educational1:implementsSafeguarding
cacontology-educational1:institutionCount
cacontology-educational1:institutionLocation
cacontology-educational1:institutionReputation
cacontology-educational1:institutionType
cacontology-educational1:interviewsVictim
cacontology-educational1:intimidatesStudent
cacontology-educational1:investigatesExploitation
cacontology-educational1:involvesPhysicalContact
cacontology-educational1:involvesWrittenHarassment
cacontology-educational1:isolationLevel
cacontology-educational1:leveragesAcademicPower
cacontology-educational1:linkedToLocation
cacontology-educational1:maintainsMultipleAccounts
cacontology-educational1:mandatoryReportingTriggered
cacontology-educational1:maximumSentence
cacontology-educational1:notifiesPrincipal
cacontology-educational1:occursInContext
cacontology-educational1:platformUsed
cacontology-educational1:policeResponseTime
cacontology-educational1:providedBy
cacontology-educational1:providesEvidence
cacontology-educational1:receivesReport
cacontology-educational1:reportingDelay
cacontology-educational1:reportingStaffRole
cacontology-educational1:reportsTo
cacontology-educational1:requiresRegistration
cacontology-educational1:resultsinCharge
cacontology-educational1:schoolAddress
cacontology-educational1:selectsVictim
cacontology-educational1:sendsContent
cacontology-educational1:sentenceLength
cacontology-educational1:solicitsFrom
cacontology-educational1:studentPopulation
cacontology-educational1:studentsPresent
cacontology-educational1:subjectTaught
cacontology-educational1:supervisionDuration
cacontology-educational1:takesPlaceIn
cacontology-educational1:targetAgeRange
cacontology-educational1:targetGender
cacontology-educational1:targetingMethod
cacontology-educational1:targetsAgeGroup
cacontology-educational1:targetsStudent
cacontology-educational1:targetsVictim
cacontology-educational1:timeOfDay
cacontology-educational1:touchesVictim
cacontology-educational1:triggersPoliceNotification
cacontology-educational1:usesImpersonation
cacontology-educational1:usesMethod
cacontology-educational1:victimCount
cacontology-educational1:vulnerabilityFactor
cacontology-educational1:witnessesExploitation
cacontology-educational1:writtenContent
cacontology-educational1:writtenOn
cacontology-educational1:yearsOfExperience
cacontology-enterprises:accessLevel
cacontology-enterprises:advancementCriteria
cacontology-enterprises:altAccountCount
cacontology-enterprises:buildsVictimTrust
cacontology-enterprises:channelCount
cacontology-enterprises:coercesIntoSelfHarm
cacontology-enterprises:coercionEffectiveness
cacontology-enterprises:coercionSeverity
cacontology-enterprises:compilationComplexity
cacontology-enterprises:compilesContent
cacontology-enterprises:containsVictimContent
cacontology-enterprises:contentNotoriety
cacontology-enterprises:contentValue
cacontology-enterprises:contentVolumeItems
cacontology-enterprises:coordinatesAcrossPlatforms
cacontology-enterprises:coordinatesActivities
cacontology-enterprises:correlatesEvidence
cacontology-enterprises:createsVictimizationSituation
cacontology-enterprises:degradationLevel
cacontology-enterprises:editingQuality
cacontology-enterprises:encryptionLevel
cacontology-enterprises:evidenceQuality
cacontology-enterprises:exploitsVictim
cacontology-enterprises:hasCoercionEventBeginDate
cacontology-enterprises:hasEncryptionCapability
cacontology-enterprises:hasExploitationRelation
cacontology-enterprises:hasFormationEvent
cacontology-enterprises:hasHierarchy
cacontology-enterprises:hasInnerCore
cacontology-enterprises:hasInvestigationBeginDate
cacontology-enterprises:hasLeadershipRelation
cacontology-enterprises:hasMember
cacontology-enterprises:hasNetworkCell
cacontology-enterprises:hasNetworkComponent
cacontology-enterprises:hasNetworkNotorietyQuality
cacontology-enterprises:hasOperationalBeginDate
cacontology-enterprises:hasOperationalEndDate
cacontology-enterprises:hasOperationalPeriod
cacontology-enterprises:hasRecruitmentMode
cacontology-enterprises:hierarchyComplexity
cacontology-enterprises:historicallyDependsOn
cacontology-enterprises:holdsLeadershipRole
cacontology-enterprises:identifiesNetworkMember
cacontology-enterprises:identityCorrelationAccuracy
cacontology-enterprises:ideologicalFramework
cacontology-enterprises:infiltratesNetwork
cacontology-enterprises:infiltrationDuration
cacontology-enterprises:innerCoreSize
cacontology-enterprises:leadershipCount
cacontology-enterprises:maintainsAltAccounts
cacontology-enterprises:managesPrivateGroups
cacontology-enterprises:mapsNetworkStructure
cacontology-enterprises:membershipLevel
cacontology-enterprises:membershipRequirements
cacontology-enterprises:networkMappingCompleteness
cacontology-enterprises:networkNotoriety
cacontology-enterprises:networkSize
cacontology-enterprises:operatesEnterprise
cacontology-enterprises:operatesInSituation
cacontology-enterprises:operationalScope
cacontology-enterprises:participatesInCoercion
cacontology-enterprises:participatesInInnerCore
cacontology-enterprises:participatesInRecruitment
cacontology-enterprises:platformCount
cacontology-enterprises:producesLorebook
cacontology-enterprises:recruitsMembers
cacontology-enterprises:selfHarmType
cacontology-enterprises:socialEngineeringComplexity
cacontology-enterprises:targetingPrecision
cacontology-enterprises:targetsVulnerability
cacontology-enterprises:trustBuildingDuration
cacontology-enterprises:usesAsCurrency
cacontology-enterprises:utilizesEncryptedChannels
cacontology-enterprises:vulnerabilityType
cacontology-forensics:acquisitionMethod
cacontology-forensics:analysesUserBehavior
cacontology-forensics:analyzesCommunicationPatterns
cacontology-forensics:analyzesNetworkTraffic
cacontology-forensics:analyzesTemporalPatterns
cacontology-forensics:arrestsResulting
cacontology-forensics:automationPercentage
cacontology-forensics:behaviorPatternsIdentified
cacontology-forensics:behavioralFingerprintsCreated
cacontology-forensics:caseExhibitNumber
cacontology-forensics:communicationGraphComplexity
cacontology-forensics:coordinatesInternationalProcessing
cacontology-forensics:correlatesAcrossPlatforms
cacontology-forensics:correlatesContent
cacontology-forensics:correlationLatency
cacontology-forensics:correlationStrength
cacontology-forensics:createsBehavioralFingerprints
cacontology-forensics:crossBorderDataSharing
cacontology-forensics:crossPlatformMatches
cacontology-forensics:custodyReason
cacontology-forensics:custodyTransferredFrom
cacontology-forensics:custodyTransferredTo
cacontology-forensics:dataTransferVolume
cacontology-forensics:databasesIntegrated
cacontology-forensics:detectionAccuracy
cacontology-forensics:detectionMethod
cacontology-forensics:devicesRecovered
cacontology-forensics:discoversNetworks
cacontology-forensics:distributesProcessing
cacontology-forensics:enablesRealTimeCorrelation
cacontology-forensics:evidenceLocation
cacontology-forensics:evidenceSeized
cacontology-forensics:evidenceVolumeTerabytes
cacontology-forensics:falsePositiveRate
cacontology-forensics:featureVectorsUsed
cacontology-forensics:filesProcessedMillions
cacontology-forensics:fingerprintAccuracy
cacontology-forensics:forensicCopy
cacontology-forensics:forensicLabsInvolved
cacontology-forensics:forensicPhaseDuration
cacontology-forensics:forensicReport
cacontology-forensics:generatesRealTimeAlerts
cacontology-forensics:generatesTriageResults
cacontology-forensics:geographicDistribution
cacontology-forensics:geographicRadius
cacontology-forensics:geospatialAccuracy
cacontology-forensics:hasForensicPhaseBeginPoint
cacontology-forensics:hasForensicPhaseEndPoint
cacontology-forensics:hasRoleBeginPoint
cacontology-forensics:hasRoleEndPoint
cacontology-forensics:hashDatabaseSize
cacontology-forensics:hashMatchesFound
cacontology-forensics:identifiesCrossPlatformActivity
cacontology-forensics:identifiesGeographicClusters
cacontology-forensics:identifiesNetworkAnomalies
cacontology-forensics:identifiesPatterns
cacontology-forensics:identifiesTemporalClusters
cacontology-forensics:integratesIntelligenceDatabases
cacontology-forensics:intelligenceHits
cacontology-forensics:investigationDuration
cacontology-forensics:involvesForensicLab
cacontology-forensics:k9AssistanceProvided
cacontology-forensics:locationPointsAnalyzed
cacontology-forensics:mlModelAccuracy
cacontology-forensics:networkConnectionsFound
cacontology-forensics:networkSessionsAnalyzed
cacontology-forensics:parallelProcessingEnabled
cacontology-forensics:performsGeospatialAnalysis
cacontology-forensics:performsHashAnalysis
cacontology-forensics:platformCorrelationScore
cacontology-forensics:platformsAnalyzed
cacontology-forensics:priorityClassification
cacontology-forensics:processesEvidence
cacontology-forensics:processingNodes
cacontology-forensics:processingSpeed
cacontology-forensics:processingTimeframeDays
cacontology-forensics:producesIntelligence
cacontology-forensics:queriesIntelligenceDatabase
cacontology-forensics:queryResponseTime
cacontology-forensics:realTimeAlerts
cacontology-forensics:recoveryMethod
cacontology-forensics:referralsReceived
cacontology-forensics:riskLevelsAssigned
cacontology-forensics:searchWarrantAssisted
cacontology-forensics:sharesProcessingLoad
cacontology-forensics:sourceHash
cacontology-forensics:standardizedProcessing
cacontology-forensics:streamingDataRate
cacontology-forensics:suspiciousConnectionsIdentified
cacontology-forensics:temporalPatternsIdentified
cacontology-forensics:temporalResolution
cacontology-forensics:timeRangeAnalyzed
cacontology-forensics:timelineEvent
cacontology-forensics:trainingDataSize
cacontology-forensics:trainsCorrelationModel
cacontology-forensics:triageAccuracy
cacontology-forensics:triagesEvidence
cacontology-forensics:userAccountsAnalyzed
cacontology-forensics:utilisesSystem
cacontology-forensics:utilizesMachineLearning
cacontology-forensics:verificationHash
cacontology-forensics:victimAgeRange
cacontology-forensics:victimGeographicOrigin
cacontology-forensics:victimsIdentifiedCount
cacontology-forensics:writeBlockingUsed
cacontology-grooming:acceleratesTrust
cacontology-grooming:accountsUsed
cacontology-grooming:administrationMethod
cacontology-grooming:anonymousContactMethod
cacontology-grooming:behaviorDuration
cacontology-grooming:bypassesPhase
cacontology-grooming:commercialOfferType
cacontology-grooming:communicationFrequency
cacontology-grooming:contactFrequency
cacontology-grooming:contentType
cacontology-grooming:crossesStateBoundaries
cacontology-grooming:distressIndicators
cacontology-grooming:economicIncentiveAmount
cacontology-grooming:emotionalTone
cacontology-grooming:escalationRate
cacontology-grooming:escalationTimeframe
cacontology-grooming:evidenceValue
cacontology-grooming:exchangesContent
cacontology-grooming:exhibitsPattern
cacontology-grooming:explicitnessLevel
cacontology-grooming:exploitsOpportunity
cacontology-grooming:exploitsReputation
cacontology-grooming:facilitatesWithSubstance
cacontology-grooming:gameContext
cacontology-grooming:groomingPhaseDuration
cacontology-grooming:groomingStage
cacontology-grooming:hasGroomingPhaseBeginPoint
cacontology-grooming:hasGroomingPhaseEndPoint
cacontology-grooming:hasRoleBeginPoint
cacontology-grooming:hasRoleEndPoint
cacontology-grooming:hasVulnerability
cacontology-grooming:identityVerificationRequired
cacontology-grooming:impairmentLevel
cacontology-grooming:impersonatedRole
cacontology-grooming:impersonatesRole
cacontology-grooming:initialContactPretense
cacontology-grooming:initiationMethod
cacontology-grooming:institutionPrestige
cacontology-grooming:institutionsTargeted
cacontology-grooming:involvesInterstateTransport
cacontology-grooming:isolationMethod
cacontology-grooming:leveragesPosition
cacontology-grooming:manipulationTechnique
cacontology-grooming:meetingLocationSpecified
cacontology-grooming:monetizationTimeframe
cacontology-grooming:occursInSpace
cacontology-grooming:opportunityType
cacontology-grooming:participantCount
cacontology-grooming:patternConfidence
cacontology-grooming:physicalLocation
cacontology-grooming:platformAnonymityLevel
cacontology-grooming:primaryPlatform
cacontology-grooming:progressesToPhysicalMeeting
cacontology-grooming:progressionDuration
cacontology-grooming:propositionExplicitness
cacontology-grooming:prosecutionRelevance
cacontology-grooming:recruitmentDirectness
cacontology-grooming:requestsSecrecy
cacontology-grooming:rolePlayingTactic
cacontology-grooming:ruleStructureDescription
cacontology-grooming:sameDayProgression
cacontology-grooming:seekingHelp
cacontology-grooming:skippedPhases
cacontology-grooming:substanceType
cacontology-grooming:targetsInstitution
cacontology-grooming:targetsVictim
cacontology-grooming:timeOfContact
cacontology-grooming:transitionSpeed
cacontology-grooming:transitionsToLocation
cacontology-grooming:transportationProposed
cacontology-grooming:trustExploitationSpeed
cacontology-grooming:usesGifts
cacontology-grooming:usesThreats
cacontology-grooming:utilizesPlatformFeature
cacontology-grooming:victimCompliance
cacontology-grooming:victimImpact
cacontology-grooming:vulnerabilityType
cacontology-gufo:academicYearBeginTimePoint
cacontology-gufo:aiGenerationTimePoint
cacontology-gufo:analysisCompletionTimePoint
cacontology-gufo:assignmentBeginTime
cacontology-gufo:assignmentEndTime
cacontology-gufo:closureBeginTime
cacontology-gufo:closureTime
cacontology-gufo:coercionBeginTime
cacontology-gufo:coercionEndTime
cacontology-gufo:coordinationBeginTime
cacontology-gufo:detectionTimePoint
cacontology-gufo:discoveryBeginTime
cacontology-gufo:dispositionBeginTime
cacontology-gufo:employmentTerminationTimePoint
cacontology-gufo:escalationBeginTime
cacontology-gufo:escalationPeakTime
cacontology-gufo:evidenceCollectionTime
cacontology-gufo:exploitationBeginTime
cacontology-gufo:exploitationDuration
cacontology-gufo:exploitationEndTime
cacontology-gufo:exploitationFirstIncidentTimePoint
cacontology-gufo:forfeitureBeginTime
cacontology-gufo:forfeitureCompletionTime
cacontology-gufo:forfeitureEndTime
cacontology-gufo:generationDuration
cacontology-gufo:institutionalReportingTimePoint
cacontology-gufo:intakeBeginTime
cacontology-gufo:investigationBeginTime
cacontology-gufo:penaltyImpositionTime
cacontology-gufo:phaseTransitionTime
cacontology-gufo:practiceSessionBeginTime
cacontology-gufo:practiceSessionEndTime
cacontology-gufo:prosecutionBeginTime
cacontology-gufo:reportingTime
cacontology-gufo:restraintBeginTime
cacontology-gufo:reviewBeginTime
cacontology-gufo:reviewEndTime
cacontology-gufo:seizureTime
cacontology-gufo:sentencingTime
cacontology-gufo:triageCompletionTime
cacontology-gufo:trialBeginTime
cacontology-gufo:workflowBeginTime
cacontology-gufo:workflowEndTime
cacontology-impact:addressesHarm
cacontology-impact:admissionReason
cacontology-impact:agencyCount
cacontology-impact:assessesVictim
cacontology-impact:assessmentDate
cacontology-impact:assessmentType
cacontology-impact:coordinatedBy
cacontology-impact:coordinationComplexity
cacontology-impact:dischargeCondition
cacontology-impact:dischargeDate
cacontology-impact:documentedBy
cacontology-impact:duration
cacontology-impact:emergencyCallLocation
cacontology-impact:extractionComplexity
cacontology-impact:facilitatedBy
cacontology-impact:facilitatedByFactor
cacontology-impact:facilitatesReintegration
cacontology-impact:familyContactEstablished
cacontology-impact:followedByDischarge
cacontology-impact:frequency
cacontology-impact:functioningLevel
cacontology-impact:hasImpactPhaseBeginPoint
cacontology-impact:hasImpactPhaseEndPoint
cacontology-impact:hasRoleBeginPoint
cacontology-impact:hasRoleEndPoint
cacontology-impact:hometownLocation
cacontology-impact:hospitalName
cacontology-impact:hospitalStayDuration
cacontology-impact:identifiesHarm
cacontology-impact:impactArea
cacontology-impact:impactPhaseDuration
cacontology-impact:impactSeverity
cacontology-impact:impededBy
cacontology-impact:impededByBarrier
cacontology-impact:includesTransportation
cacontology-impact:indicatorType
cacontology-impact:informsRestitution
cacontology-impact:informsSafetyPlanning
cacontology-impact:intensity
cacontology-impact:interventionType
cacontology-impact:jurisdictionsInvolved
cacontology-impact:lifeAreaAffected
cacontology-impact:manifestsAs
cacontology-impact:milestoneDate
cacontology-impact:milestoneDescription
cacontology-impact:necessitatesAssessment
cacontology-impact:ongoingDangerLevel
cacontology-impact:onsetDate
cacontology-impact:partOfRecovery
cacontology-impact:participatesInResponse
cacontology-impact:prognosis
cacontology-impact:progressionPattern
cacontology-impact:providedBy
cacontology-impact:providesSpecializedSupport
cacontology-impact:receivedTreatment
cacontology-impact:recoveryStage
cacontology-impact:recoveryTimeframe
cacontology-impact:reintegrationDuration
cacontology-impact:relevantToSentencing
cacontology-impact:reportedSituation
cacontology-impact:responseTime
cacontology-impact:resultedFrom
cacontology-impact:resultsinExtraction
cacontology-impact:resultsinHospitalization
cacontology-impact:returnsTo
cacontology-impact:reunitesWith
cacontology-impact:safetyPlanType
cacontology-impact:serviceDuration
cacontology-impact:serviceProvider
cacontology-impact:serviceType
cacontology-impact:sessionCount
cacontology-impact:severity
cacontology-impact:severityLevel
cacontology-impact:transportationCost
cacontology-impact:transportationDestination
cacontology-impact:transportationType
cacontology-impact:traumaType
cacontology-impact:treatedAt
cacontology-impact:treatmentDuration
cacontology-impact:treatmentModality
cacontology-impact:treatmentOutcome
cacontology-impact:triggersResponse
cacontology-infrastructure:accountsFrozen
cacontology-infrastructure:analysesAccess
cacontology-infrastructure:analysesInfrastructure
cacontology-infrastructure:anonymityLevel
cacontology-infrastructure:bandwidthCapacity
cacontology-infrastructure:cloudPlatform
cacontology-infrastructure:containsComponent
cacontology-infrastructure:cryptoCurrencyTypes
cacontology-infrastructure:dataVolumeMirrored
cacontology-infrastructure:distributedAcross
cacontology-infrastructure:domainCount
cacontology-infrastructure:domainsSinkholed
cacontology-infrastructure:encryptionStrength
cacontology-infrastructure:financialComplexity
cacontology-infrastructure:freezesAccounts
cacontology-infrastructure:geographicLocations
cacontology-infrastructure:hasAnalysisAccuracy
cacontology-infrastructure:hasAnalysisBeginPoint
cacontology-infrastructure:hasAnalysisDepth
cacontology-infrastructure:hasAnalysisEndPoint
cacontology-infrastructure:hasAnalysisTimeliness
cacontology-infrastructure:hasAnonymityEffectiveness
cacontology-infrastructure:hasFinancialComplexity
cacontology-infrastructure:hasFinancialTraceability
cacontology-infrastructure:hasInfrastructureBeginPoint
cacontology-infrastructure:hasInfrastructureEndPoint
cacontology-infrastructure:hasInfrastructurePerformance
cacontology-infrastructure:hasInfrastructureReliability
cacontology-infrastructure:hasInfrastructureScalability
cacontology-infrastructure:hasInfrastructureVulnerability
cacontology-infrastructure:hasObfuscationComplexity
cacontology-infrastructure:hasPhaseBeginPoint
cacontology-infrastructure:hasPhaseEndPoint
cacontology-infrastructure:hasRoleBeginPoint
cacontology-infrastructure:hasRoleEndPoint
cacontology-infrastructure:hasSecurityStrength
cacontology-infrastructure:hasTakedownBeginPoint
cacontology-infrastructure:hasTakedownCompleteness
cacontology-infrastructure:hasTakedownEffectiveness
cacontology-infrastructure:hasTakedownEndPoint
cacontology-infrastructure:hasTakedownSpeed
cacontology-infrastructure:hostedBy
cacontology-infrastructure:hostingProvider
cacontology-infrastructure:leadsToCriminalCharges
cacontology-infrastructure:monthlyRevenue
cacontology-infrastructure:networkComplexity
cacontology-infrastructure:obfuscationMethods
cacontology-infrastructure:paymentMethods
cacontology-infrastructure:protectedBy
cacontology-infrastructure:providesEvidence
cacontology-infrastructure:resultsinSeizure
cacontology-infrastructure:revealsTopology
cacontology-infrastructure:seizesServers
cacontology-infrastructure:serverCount
cacontology-infrastructure:serversSeized
cacontology-infrastructure:sinkholeDomains
cacontology-infrastructure:storageCapacity
cacontology-infrastructure:subscriptionTiers
cacontology-infrastructure:takedownDuration
cacontology-infrastructure:targetsInfrastructure
cacontology-infrastructure:tracesPayments
cacontology-infrastructure:userGeographicSpread
cacontology-infrastructure:usesPaymentSystem
cacontology-institutional:abuseEndYear
cacontology-institutional:abuseStartYear
cacontology-institutional:authorityLevel
cacontology-institutional:chargeCount
cacontology-institutional:childrenServed
cacontology-institutional:concealsFrom
cacontology-institutional:concealsTravel
cacontology-institutional:documentsPattern
cacontology-institutional:donorCount
cacontology-institutional:enablesExploitation
cacontology-institutional:exercisesAuthorityOver
cacontology-institutional:existentiallyDependsOn
cacontology-institutional:experiencesExploitation
cacontology-institutional:exploitationTypeCount
cacontology-institutional:exploitsRole
cacontology-institutional:exploitsVulnerability
cacontology-institutional:facilitatedBy
cacontology-institutional:foreignResidenceDuration
cacontology-institutional:foundedBy
cacontology-institutional:foundingYear
cacontology-institutional:fundingAmount
cacontology-institutional:genericallyDependsOn
cacontology-institutional:hasAuthorityLevel
cacontology-institutional:hasExploitationEndDate
cacontology-institutional:hasExploitationSeverityLevel
cacontology-institutional:hasExploitationStartDate
cacontology-institutional:hasInstitutionFoundingDate
cacontology-institutional:hasInstitutionalReputationLevel
cacontology-institutional:hasIsolationDegree
cacontology-institutional:hasOperationEndDate
cacontology-institutional:hasOversightLevel
cacontology-institutional:hasRoleEndDate
cacontology-institutional:hasRoleStartDate
cacontology-institutional:hasSystematicityDegree
cacontology-institutional:hasTravelDate
cacontology-institutional:hasTrustLevel
cacontology-institutional:hasVulnerabilityLevel
cacontology-institutional:historicallyDependsOn
cacontology-institutional:holdsRole
cacontology-institutional:impactsVictim
cacontology-institutional:investigatedBy
cacontology-institutional:isComponentOfExploitation
cacontology-institutional:isPartOfInstitution
cacontology-institutional:isPartOfInvestigation
cacontology-institutional:isolationDegree
cacontology-institutional:maintainedBy
cacontology-institutional:manipulates
cacontology-institutional:manipulationTactics
cacontology-institutional:occursInContext
cacontology-institutional:occursWithin
cacontology-institutional:operatesInCountry
cacontology-institutional:operatesInJurisdictionalContext
cacontology-institutional:operationDurationYears
cacontology-institutional:participatesInInstitution
cacontology-institutional:perpetratesExploitation
cacontology-institutional:prosecutedInContext
cacontology-institutional:prosecutedUnder
cacontology-institutional:prosecutionJurisdiction
cacontology-institutional:providesTestimony
cacontology-institutional:receivesSupport
cacontology-institutional:resultsInSentence
cacontology-institutional:revealsPattern
cacontology-institutional:sentenceLength
cacontology-institutional:servesPopulation
cacontology-institutional:targetsPopulation
cacontology-institutional:travelFrequency
cacontology-institutional:travelPatternYears
cacontology-institutional:travelPurposeClaimed
cacontology-institutional:travelsFrom
cacontology-institutional:travelsTo
cacontology-institutional:trustLevelExploited
cacontology-institutional:undertakesTravelFor
cacontology-institutional:victimCount
cacontology-institutional:victimTestimoniesCount
cacontology-institutional:vulnerabilityType
cacontology-institutional:yearsFromVictimizationToTestimony
cacontology-international:alertResponseTime
cacontology-international:alertingPartner
cacontology-international:analysesUsers
cacontology-international:automatedMatchAccuracy
cacontology-international:channelsMonitored
cacontology-international:communicationLatency
cacontology-international:contributesToFusion
cacontology-international:cooperationResponseTime
cacontology-international:coordinatedByEuropol
cacontology-international:coordinatesGlobalTakedown
cacontology-international:coordinatesHotlines
cacontology-international:coordinatesInternationalEffort
cacontology-international:coordinatesProsecution
cacontology-international:coordinatesResources
cacontology-international:coordinatesWith
cacontology-international:coordinatingAgency
cacontology-international:coordinationComplexity
cacontology-international:coordinationComplexityLevel
cacontology-international:coordinationMethod
cacontology-international:crossBorderCapability
cacontology-international:crossReferencesFound
cacontology-international:dataLakeSize
cacontology-international:databasesIntegrated
cacontology-international:deploysTeam
cacontology-international:disruptionEffectiveness
cacontology-international:disruptsInternationalNetwork
cacontology-international:emergencyResponseTime
cacontology-international:enablesAutomatedMatching
cacontology-international:enablesRealTimeSharing
cacontology-international:encryptionLevel
cacontology-international:europeanMemberStatesInvolved
cacontology-international:evidenceSharingVolume
cacontology-international:evidenceVolumeInternational
cacontology-international:executesQuery
cacontology-international:feedsDataLake
cacontology-international:forensicTeamsDeployed
cacontology-international:fusionAccuracy
cacontology-international:generatesThreatAssessment
cacontology-international:globalCoverage
cacontology-international:informationSharingLevel
cacontology-international:integratesToNetwork
cacontology-international:intelligenceChannels
cacontology-international:intelligenceSources
cacontology-international:internationalPartnersInvolved
cacontology-international:investigativeTeamSize
cacontology-international:involvesCountries
cacontology-international:jurisdictionCount
cacontology-international:languageSupport
cacontology-international:managedBy
cacontology-international:multilateralAgreement
cacontology-international:operatesInCountry
cacontology-international:operationContext
cacontology-international:operationDurationMonths
cacontology-international:participatesIn
cacontology-international:partnerCountryCount
cacontology-international:performsCrossReference
cacontology-international:processesDistributed
cacontology-international:processesEvidence
cacontology-international:processingNodeCount
cacontology-international:prosecutionsCrossCountry
cacontology-international:providesExpertise
cacontology-international:queryPerformanceMs
cacontology-international:receivesIntelligenceFeed
cacontology-international:referredTo
cacontology-international:requiresAssistance
cacontology-international:resourcesCoordinated
cacontology-international:responseTimeInternational
cacontology-international:resultsInSeizure
cacontology-international:sharesDataWith
cacontology-international:sharesEvidenceInternationally
cacontology-international:sharesIntelligence
cacontology-international:simultaneousCountries
cacontology-international:simultaneousOperations
cacontology-international:specializedExpertiseAreas
cacontology-international:supportedBy
cacontology-international:synchronizationAccuracy
cacontology-international:synchronizesOperations
cacontology-international:targetsPlatform
cacontology-international:threatLevelAssessed
cacontology-international:transmitsAlert
cacontology-international:treatyBasis
cacontology-international:treatyMechanism
cacontology-international:triggersAlert
cacontology-international:triggersEmergencyProtocol
cacontology-international:undercoverCoordination
cacontology-international:userCountriesAffected
cacontology-international:usersAnalyzedMillions
cacontology-international:utilizesSecureChannel
cacontology-legal:appliesToCountry
cacontology-legal:assessedBy
cacontology-legal:basedOnModel
cacontology-legal:concernsLegalFramework
cacontology-legal:countriesAnalyzed
cacontology-legal:coveragePercentage
cacontology-legal:effectivenessScore
cacontology-legal:enablesExtradition
cacontology-legal:facilitatesCooperation
cacontology-legal:harmonizationProgress
cacontology-legal:hasAssessmentReliability
cacontology-legal:hasCapacityLevel
cacontology-legal:hasComplianceLevel
cacontology-legal:hasCooperationIntensity
cacontology-legal:hasCoverageCompleteness
cacontology-legal:hasDataQuality
cacontology-legal:hasDevelopmentProgress
cacontology-legal:hasExtraditionEfficiency
cacontology-legal:hasGapSeverity
cacontology-legal:hasHarmonizationDegree
cacontology-legal:hasImplementationQuality
cacontology-legal:hasLegalEffectiveness
cacontology-legal:hasLegalRobustness
cacontology-legal:hasReformUrgency
cacontology-legal:hasStandardCompliance
cacontology-legal:hasTreatyStrength
cacontology-legal:identifiesGap
cacontology-legal:implementationStatus
cacontology-legal:isAssessedBy
cacontology-legal:isComponentOf
cacontology-legal:legalAlignmentLevel
cacontology-legal:legalSystemType
cacontology-legal:legislativeCompliance
cacontology-legal:measuredBy
cacontology-legal:partOfFramework
cacontology-legal:participatesIn
cacontology-legal:policyGapSeverity
cacontology-legal:providesAssistance
cacontology-legal:reformPriority
cacontology-legal:requiresReform
cacontology-legal:standsInQualifiedCompliance
cacontology-multi:agencyCount
cacontology-multi:agencyLevelsMixed
cacontology-multi:agencyParticipantCount
cacontology-multi:agentParticipantCount
cacontology-multi:arrestsNationwide
cacontology-multi:authorizedBy
cacontology-multi:casesSubmittedForProsecution
cacontology-multi:chargeTypesDiversity
cacontology-multi:childrenRescued
cacontology-multi:childrenRescuedCount
cacontology-multi:communicationBarriers
cacontology-multi:communicationProtocol
cacontology-multi:communityOutreachEffectiveness
cacontology-multi:complianceViolationsFound
cacontology-multi:complianceVisitsCount
cacontology-multi:coordinatedBy
cacontology-multi:coordinatesAgencies
cacontology-multi:coordinatesComplianceChecks
cacontology-multi:coordinatesNationwide
cacontology-multi:coordinationCenterLocation
cacontology-multi:coordinationChallenges
cacontology-multi:coordinationComplexity
cacontology-multi:coordinationMechanism
cacontology-multi:coordinationPhaseDuration
cacontology-multi:costSharingArrangement
cacontology-multi:countiesInvolved
cacontology-multi:coversState
cacontology-multi:crossStateCommunication
cacontology-multi:crossesBorders
cacontology-multi:crossingDocumentation
cacontology-multi:deploysAgents
cacontology-multi:destinationState
cacontology-multi:diplomaticChannels
cacontology-multi:disclosureToArrestHours
cacontology-multi:enablesRapidResponse
cacontology-multi:facilitatedByCoordination
cacontology-multi:facilitatesChildRescue
cacontology-multi:fbiFieldOfficesInvolved
cacontology-multi:governedByAgreement
cacontology-multi:grandJuryAcceptances
cacontology-multi:handoffType
cacontology-multi:handsOnArrestsCount
cacontology-multi:hasCoordinationPhaseBeginPoint
cacontology-multi:hasCoordinationPhaseEndPoint
cacontology-multi:hasRoleBeginPoint
cacontology-multi:hasRoleEndPoint
cacontology-multi:hostedBy
cacontology-multi:identifiesVictims
cacontology-multi:informationSharingLevel
cacontology-multi:investigationScope
cacontology-multi:investigationsInitiated
cacontology-multi:involvesAgency
cacontology-multi:involvesFBIFieldOffice
cacontology-multi:involvesStateLineCrossing
cacontology-multi:involvesTraffickingInvestigation
cacontology-multi:jurisdictionCount
cacontology-multi:jurisdictionTriggerType
cacontology-multi:jurisdictionalConflicts
cacontology-multi:languageBarriers
cacontology-multi:leadBy
cacontology-multi:legalComplexity
cacontology-multi:meetingFrequency
cacontology-multi:memberAgencyCount
cacontology-multi:newVictimsIdentified
cacontology-multi:operatesInJurisdiction
cacontology-multi:operationDuration
cacontology-multi:operationDurationDays
cacontology-multi:operationName
cacontology-multi:operationPhase
cacontology-multi:operationSuccessRating
cacontology-multi:originatingState
cacontology-multi:personnelAssigned
cacontology-multi:primaryJurisdiction
cacontology-multi:prosecutionAvoidanceBehavior
cacontology-multi:providesAssistanceTo
cacontology-multi:requestsAssistanceFrom
cacontology-multi:requiresHandoff
cacontology-multi:rescuesChildren
cacontology-multi:resourceType
cacontology-multi:resourceValue
cacontology-multi:searchWarrantsExecuted
cacontology-multi:sharesInformationWith
cacontology-multi:sharesResourcesWith
cacontology-multi:sharingDuration
cacontology-multi:spansCounties
cacontology-multi:specializedUnitsDeployed
cacontology-multi:statesCrossed
cacontology-multi:statesInvolved
cacontology-multi:statewideCoverage
cacontology-multi:successMetrics
cacontology-multi:targetStrategy
cacontology-multi:targetTypeCount
cacontology-multi:targetsOffenderType
cacontology-multi:taskForceDuration
cacontology-multi:taskForceType
cacontology-multi:taskForcesInvolved
cacontology-multi:timeZoneChallenges
cacontology-multi:totalArrests
cacontology-multi:traffickingCasesIdentified
cacontology-multi:transportationIntent
cacontology-multi:transportationMethod
cacontology-multi:treatyBasis
cacontology-multi:triggeredByOutreach
cacontology-multi:triggersJurisdiction
cacontology-multi:uncoversCrossStateEvidence
cacontology-multi:usAttorneyOfficesInvolved
cacontology-multi:usersForProsecutionMillions
cacontology-multi:utilizesCoordination
cacontology-partnerships:contributesToAnalysis
cacontology-partnerships:cooperatesOn
cacontology-partnerships:cooperationDuration
cacontology-partnerships:coordinatedBy
cacontology-partnerships:coordinatedThrough
cacontology-partnerships:enablesSharing
cacontology-partnerships:generatesRequests
cacontology-partnerships:governedBy
cacontology-partnerships:hasCooperationBeginPoint
cacontology-partnerships:hasCooperationEndPoint
cacontology-partnerships:hasPartnershipBeginPoint
cacontology-partnerships:hasPartnershipEndPoint
cacontology-partnerships:hasPhaseBeginPoint
cacontology-partnerships:hasPhaseEndPoint
cacontology-partnerships:hasRole
cacontology-partnerships:hasRoleBeginPoint
cacontology-partnerships:hasRoleEndPoint
cacontology-partnerships:includesPartner
cacontology-partnerships:participatesInDevelopment
cacontology-partnerships:participatesInOperation
cacontology-partnerships:partnershipDuration
cacontology-partnerships:phaseDuration
cacontology-partnerships:providesMonitoring
cacontology-partnerships:respondsToEmergency
cacontology-partnerships:roleDuration
cacontology-partnerships:sharesIntelligence
cacontology-partnerships:solicitsHelp
cacontology-physical:associatedWithSubject
cacontology-physical:chainOfCustody
cacontology-physical:containsItem
cacontology-physical:criminalPurpose
cacontology-physical:deviceBrand
cacontology-physical:deviceModel
cacontology-physical:digitalContentFound
cacontology-physical:encryptionStatus
cacontology-physical:evidenceTag
cacontology-physical:evidenceType
cacontology-physical:evidentiarySignificance
cacontology-physical:forensicAnalysisRequired
cacontology-physical:functionalStatus
cacontology-physical:hasAcquisitionRisk
cacontology-physical:hasAnalysisAccuracy
cacontology-physical:hasAnalysisReliability
cacontology-physical:hasContaminationLevel
cacontology-physical:hasCustodyIntegrity
cacontology-physical:hasDocumentationCompleteness
cacontology-physical:hasEvidenceBeginPoint
cacontology-physical:hasEvidenceEndPoint
cacontology-physical:hasEvidenceIntegrity
cacontology-physical:hasEvidenceReliability
cacontology-physical:hasForensicValue
cacontology-physical:hasMethodValidation
cacontology-physical:hasPhaseBeginPoint
cacontology-physical:hasPhaseEndPoint
cacontology-physical:hasPreservationQuality
cacontology-physical:hasProcurementBeginPoint
cacontology-physical:hasProcurementEndPoint
cacontology-physical:hasProcurementSuspicion
cacontology-physical:hasRoleBeginPoint
cacontology-physical:hasRoleEndPoint
cacontology-physical:hasSearchBeginPoint
cacontology-physical:hasSearchCompleteness
cacontology-physical:hasSearchEfficiency
cacontology-physical:hasSearchEndPoint
cacontology-physical:hasSearchThoroughness
cacontology-physical:hasTraceability
cacontology-physical:hiddenCompartment
cacontology-physical:modificationPurpose
cacontology-physical:paymentMethod
cacontology-physical:physicalCondition
cacontology-physical:procuredBy
cacontology-physical:procurementCost
cacontology-physical:procurementDate
cacontology-physical:procurementMethod
cacontology-physical:procurementSource
cacontology-physical:searchDuration
cacontology-physical:searchScope
cacontology-physical:searchWarrant
cacontology-physical:searchingOfficer
cacontology-physical:seizedDuring
cacontology-physical:seizureDate
cacontology-physical:seizureLocation
cacontology-physical:serialNumber
cacontology-physical:storageCapacity
cacontology-physical:tamperEvidence
cacontology-physical:targetAgeGroup
cacontology-physical:witnessPresent
cacontology-platforms:acceptsLegalProcess
cacontology-platforms:accountStatus
cacontology-platforms:accountUsername
cacontology-platforms:actionDuration
cacontology-platforms:ageVerificationMethod
cacontology-platforms:ageVerificationRequired
cacontology-platforms:allowsAnonymousChat
cacontology-platforms:anonymityLevel
cacontology-platforms:anonymousUserDataRetention
cacontology-platforms:contactInitiationMethod
cacontology-platforms:contentRetentionPeriod
cacontology-platforms:contentType
cacontology-platforms:conversationLogging
cacontology-platforms:coordinatedBy
cacontology-platforms:correlatesWithAccount
cacontology-platforms:correlatesWithDevice
cacontology-platforms:crossPlatformAnonymity
cacontology-platforms:crossPlatformMatch
cacontology-platforms:csaiDetectionEnabled
cacontology-platforms:dataDisclosed
cacontology-platforms:deviceType
cacontology-platforms:devicesSearched
cacontology-platforms:discoveredDuring
cacontology-platforms:discoveryTimestamp
cacontology-platforms:emergencyDisclosureCapable
cacontology-platforms:enablesTemporaryAccounts
cacontology-platforms:encryptionLevel
cacontology-platforms:evidenceCategory
cacontology-platforms:evidenceTimestamp
cacontology-platforms:facilitatesRandomMatching
cacontology-platforms:foundOnDevice
cacontology-platforms:foundOnSocialMedia
cacontology-platforms:governedByDisclosurePolicy
cacontology-platforms:guestAccountsAllowed
cacontology-platforms:hasActionBeginPoint
cacontology-platforms:hasActionEndPoint
cacontology-platforms:hasContentModerationCapability
cacontology-platforms:hasDataRetentionPolicy
cacontology-platforms:hasLegalComplianceCapability
cacontology-platforms:hasPhaseBeginPoint
cacontology-platforms:hasPhaseEndPoint
cacontology-platforms:hasPlatformBeginPoint
cacontology-platforms:hasPlatformEndPoint
cacontology-platforms:hasUserVerificationSystem
cacontology-platforms:hashMatchingEnabled
cacontology-platforms:headquarteredIn
cacontology-platforms:identityDisclosureCircumstances
cacontology-platforms:identityVerificationRequired
cacontology-platforms:legalAuthority
cacontology-platforms:legalProcessContactInfo
cacontology-platforms:legalProcessUsed
cacontology-platforms:logRetentionPeriod
cacontology-platforms:maintainsAnonymityLevel
cacontology-platforms:moderationDecision
cacontology-platforms:moderationMethod
cacontology-platforms:moderationPresence
cacontology-platforms:offersContactOpportunity
cacontology-platforms:operatedBy
cacontology-platforms:operatesInJurisdiction
cacontology-platforms:phaseDuration
cacontology-platforms:platformDuration
cacontology-platforms:platformType
cacontology-platforms:platformsInvestigated
cacontology-platforms:preservationPeriod
cacontology-platforms:primaryUserBase
cacontology-platforms:providesAnonymousFeature
cacontology-platforms:providesOpenChatAccess
cacontology-platforms:requiresRegistration
cacontology-platforms:responseTimeFrame
cacontology-platforms:searchWarrantRequired
cacontology-platforms:socialMediaPlatform
cacontology-platforms:subsidiaryOf
cacontology-platforms:suspensionDuration
cacontology-platforms:suspensionReason
cacontology-platforms:userDataRetentionPeriod
cacontology-platforms:verificationStrength
cacontology-prevention:accessesArchive
cacontology-prevention:activeParticipantCount
cacontology-prevention:addressesSextortion
cacontology-prevention:affiliateOrganizationCount
cacontology-prevention:affiliatedWith
cacontology-prevention:ageGroup
cacontology-prevention:arrestsFromDisclosures
cacontology-prevention:assessesRisk
cacontology-prevention:averageDisclosureTime
cacontology-prevention:averageHelpSeekingTime
cacontology-prevention:averageListeningDuration
cacontology-prevention:communityParticipation
cacontology-prevention:communityReportingIncrease
cacontology-prevention:coordinatedBy
cacontology-prevention:coordinatedWith
cacontology-prevention:coordinatesWith
cacontology-prevention:coordinationMeetingFrequency
cacontology-prevention:courseCompletionRate
cacontology-prevention:courseModuleCount
cacontology-prevention:deliveredBy
cacontology-prevention:disclosureBarriersAddressed
cacontology-prevention:disclosuresGenerated
cacontology-prevention:discreteAccessCount
cacontology-prevention:distributedViaEmailList
cacontology-prevention:distributedsTo
cacontology-prevention:educatesOn
cacontology-prevention:educationPortalReach
cacontology-prevention:emailListSubscriberCount
cacontology-prevention:emailOpenRate
cacontology-prevention:enablesDiscreetAccess
cacontology-prevention:enablesRapidResponse
cacontology-prevention:engagesCommunity
cacontology-prevention:engagesParents
cacontology-prevention:enhancedBy
cacontology-prevention:faqAccessCount
cacontology-prevention:faqItemCount
cacontology-prevention:hostsContentOn
cacontology-prevention:identifiesTrustedAdult
cacontology-prevention:implementationStatus
cacontology-prevention:implementsProtocol
cacontology-prevention:integratesQRCode
cacontology-prevention:integratesToPlatform
cacontology-prevention:languageAvailability
cacontology-prevention:maintainsEmailList
cacontology-prevention:measuresEngagementOf
cacontology-prevention:monitorsUsageOf
cacontology-prevention:parentalEngagementRate
cacontology-prevention:participantCount
cacontology-prevention:podcastDownloadCount
cacontology-prevention:podcastEpisodeCount
cacontology-prevention:postersDistributed
cacontology-prevention:presentationAttendance
cacontology-prevention:preventionEffectiveness
cacontology-prevention:preventsBullying
cacontology-prevention:preventsMechanism
cacontology-prevention:programDuration
cacontology-prevention:providesResource
cacontology-prevention:publicationArchiveSize
cacontology-prevention:publishesToArchive
cacontology-prevention:qrCodeEnabled
cacontology-prevention:qrCodeScans
cacontology-prevention:queriesFAQ
cacontology-prevention:rapidResponseCapability
cacontology-prevention:reducesBarrier
cacontology-prevention:reducesShaming
cacontology-prevention:resourceSharingFrequency
cacontology-prevention:resultsInArrest
cacontology-prevention:riskReductionLevel
cacontology-prevention:schoolsTargeted
cacontology-prevention:sextortionWarningSignsCount
cacontology-prevention:sharesResourcesWith
cacontology-prevention:statewideCoverage
cacontology-prevention:supportedBy
cacontology-prevention:targetAgeGroup
cacontology-prevention:targetAudience
cacontology-prevention:targetsAudience
cacontology-prevention:tracksPodcastMetrics
cacontology-prevention:tracksProgressOf
cacontology-prevention:triggersDisclosure
cacontology-prevention:trustedAdultsIdentified
cacontology-production:concealmentLocation
cacontology-production:concealmentMethod
cacontology-production:developmentalDocumentation
cacontology-production:deviceBrand
cacontology-production:deviceModel
cacontology-production:distributionIntent
cacontology-production:editedWith
cacontology-production:evidenceOf
cacontology-production:evidenceRecovered
cacontology-production:facilitatedBy
cacontology-production:forensicValue
cacontology-production:hasProductionPhaseBeginPoint
cacontology-production:hasProductionPhaseEndPoint
cacontology-production:hasRoleBeginPoint
cacontology-production:hasRoleEndPoint
cacontology-production:imageCount
cacontology-production:immediateDistribution
cacontology-production:involvestVictim
cacontology-production:locationAccess
cacontology-production:locationSecurity
cacontology-production:metadataPreserved
cacontology-production:modificationDescription
cacontology-production:partOfSeries
cacontology-production:privacyExpectation
cacontology-production:producedAt
cacontology-production:producedBy
cacontology-production:produces
cacontology-production:productionComplexity
cacontology-production:productionEndDate
cacontology-production:productionMethod
cacontology-production:productionPeriod
cacontology-production:productionStartDate
cacontology-production:recordedWith
cacontology-production:recordingCapability
cacontology-production:recordingQuality
cacontology-production:resultingContent
cacontology-production:sessionCount
cacontology-production:sessionDuration
cacontology-production:sessionLocation
cacontology-production:storageCapacity
cacontology-production:surveillanceAngle
cacontology-production:systematicNature
cacontology-production:totalContentVolume
cacontology-production:triggeredInvestigation
cacontology-production:usesEquipment
cacontology-production:victimAge
cacontology-production:victimAgeProgression
cacontology-production:victimAwareness
cacontology-production:victimCount
cacontology-production:videoCount
cacontology-recruitment:academicPerformanceLevel
cacontology-recruitment:attendanceRate
cacontology-recruitment:attendsSchool
cacontology-recruitment:averageRecruitmentTime
cacontology-recruitment:contactsLawEnforcement
cacontology-recruitment:employedAt
cacontology-recruitment:exhibitsVulnerability
cacontology-recruitment:exploitsVulnerability
cacontology-recruitment:facilitatedBy
cacontology-recruitment:gradeLevel
cacontology-recruitment:includesRecruitingVictim
cacontology-recruitment:introducesTo
cacontology-recruitment:mandatoryReportingTrigger
cacontology-recruitment:mitigatesVulnerability
cacontology-recruitment:networkSize
cacontology-recruitment:operatesInNetwork
cacontology-recruitment:receivesReport
cacontology-recruitment:recruitmentAttempts
cacontology-recruitment:recruitsVictim
cacontology-recruitment:reportingDelay
cacontology-recruitment:reportingStaffRole
cacontology-recruitment:reportsToSchool
cacontology-recruitment:schoolType
cacontology-recruitment:schoolsInvolved
cacontology-recruitment:socioeconomicLevel
cacontology-recruitment:studentPopulation
cacontology-recruitment:successfulRecruitments
cacontology-recruitment:targetsSchool
cacontology-recruitment:triggersInvestigation
cacontology-recruitment:victimRecruitersCount
cacontology-recruitment:vulnerabilityScore
cacontology-registry:ageAcknowledgmentMethod
cacontology-registry:arrestTiming
cacontology-registry:attendsSchool
cacontology-registry:basedOnOffense
cacontology-registry:complianceType
cacontology-registry:contentTypesReceived
cacontology-registry:contentTypesSent
cacontology-registry:convictionDate
cacontology-registry:coordinatedWithCompliance
cacontology-registry:coordinatesBetweenAgencies
cacontology-registry:coordinationTimeframe
cacontology-registry:crossesStates
cacontology-registry:dateOfBirth
cacontology-registry:demonstratesAgeAwareness
cacontology-registry:employedAt
cacontology-registry:executedAt
cacontology-registry:executedDuring
cacontology-registry:exhibitsRecidivism
cacontology-registry:expirationDate
cacontology-registry:exploitationDurationMonths
cacontology-registry:eyeColor
cacontology-registry:fullName
cacontology-registry:hairColor
cacontology-registry:hasAlias
cacontology-registry:hasCompliance
cacontology-registry:hasOnlineIdentifier
cacontology-registry:hasProfile
cacontology-registry:hasRegistrationRecord
cacontology-registry:height
cacontology-registry:involvesBidirectionalExchange
cacontology-registry:involvesHighVolumeExploitation
cacontology-registry:involvesPattern
cacontology-registry:lastUpdate
cacontology-registry:lifetimeRegistration
cacontology-registry:lifetimeSupervision
cacontology-registry:managedBy
cacontology-registry:mandatoryMinimumYears
cacontology-registry:maximumSentenceYears
cacontology-registry:messageCount
cacontology-registry:offenseDescription
cacontology-registry:ownsVehicle
cacontology-registry:postRegistrationEvent
cacontology-registry:priorConvictionCount
cacontology-registry:race
cacontology-registry:recidivismPattern
cacontology-registry:recoversEvidence
cacontology-registry:registeredIn
cacontology-registry:registrationDate
cacontology-registry:registrationFrequency
cacontology-registry:registrationNumber
cacontology-registry:residesAt
cacontology-registry:sentenceLength
cacontology-registry:sentenceServed
cacontology-registry:sex
cacontology-registry:socialSecurityNumber
cacontology-registry:subjectToRestriction
cacontology-registry:targetsCrossState
cacontology-registry:tier
cacontology-registry:triggersInvestigation
cacontology-registry:verifiedBy
cacontology-registry:victimAge
cacontology-registry:victimAgeAcknowledged
cacontology-registry:victimCount
cacontology-registry:victimRelationship
cacontology-registry:violationCategory
cacontology-registry:weight
cacontology-registry:yearsBetweenOffenses
cacontology-sentencing:appliesTo
cacontology-sentencing:bailStatus
cacontology-sentencing:concurrentWith
cacontology-sentencing:currentPhase
cacontology-sentencing:hasCharge
cacontology-sentencing:hasLegalPhase
cacontology-sentencing:hasPhaseBeginPoint
cacontology-sentencing:hasPhaseEndPoint
cacontology-sentencing:hasProceedingBeginPoint
cacontology-sentencing:hasProceedingEndPoint
cacontology-sentencing:hasRole
cacontology-sentencing:hasRoleBeginPoint
cacontology-sentencing:hasRoleEndPoint
cacontology-sentencing:hasSentenceBeginPoint
cacontology-sentencing:hasSentenceEndPoint
cacontology-sentencing:involvesChargeCount
cacontology-sentencing:involvesParticipantCount
cacontology-sentencing:participatesInProceeding
cacontology-sentencing:phaseDuration
cacontology-sentencing:proceedingDuration
cacontology-sentencing:resultsSentence
cacontology-sentencing:roleDuration
cacontology-sentencing:sentenceConcurrency
cacontology-sentencing:sentenceDuration
cacontology-sentencing:situationComplexity
cacontology-sentencing:transitionsToPhase
cacontology-sextortion:actualAge
cacontology-sextortion:analyzesDevice
cacontology-sextortion:claimedAge
cacontology-sextortion:conductsOnPlatform
cacontology-sextortion:containsCommunication
cacontology-sextortion:conversationCount
cacontology-sextortion:conversationLength
cacontology-sextortion:demandType
cacontology-sextortion:deviceCount
cacontology-sextortion:employsThreat
cacontology-sextortion:escalationSpeed
cacontology-sextortion:evidenceRecovered
cacontology-sextortion:explicitnessLevel
cacontology-sextortion:falsePersonaType
cacontology-sextortion:followsProgression
cacontology-sextortion:giftCardType
cacontology-sextortion:identifiesVictim
cacontology-sextortion:imageType
cacontology-sextortion:incidentDuration
cacontology-sextortion:investigatedBy
cacontology-sextortion:involvesDeception
cacontology-sextortion:makesDemand
cacontology-sextortion:monetaryAmount
cacontology-sextortion:nextPhase
cacontology-sextortion:previousPhase
cacontology-sextortion:progressionStage
cacontology-sextortion:providesEvidence
cacontology-sextortion:reconstructsConversation
cacontology-sextortion:resultsinCharge
cacontology-sextortion:threatFollowThrough
cacontology-sextortion:threatSpecificity
cacontology-sextortion:threatType
cacontology-sextortion:triggersPhase
cacontology-sextortion:usesManipulation
cacontology-sextortion:utilizesFeature
cacontology-sextortion:victimAgeGroup
cacontology-sextortion:victimCount
cacontology-specialized:hasOperationBeginPoint
cacontology-specialized:hasOperationEndPoint
cacontology-specialized:hasPhaseBeginPoint
cacontology-specialized:hasPhaseEndPoint
cacontology-specialized:hasRoleBeginPoint
cacontology-specialized:hasRoleEndPoint
cacontology-specialized:hasUnitBeginPoint
cacontology-specialized:hasUnitEndPoint
cacontology-specialized:operationDuration
cacontology-specialized:phaseDuration
cacontology-specialized:roleDuration
cacontology-specialized:unitDuration
cacontology-strategy:dependsOnPattern
cacontology-strategy:extendsPattern
cacontology-strategy:hasIntegrationPattern
cacontology-strategy:hasIntegrationPriority
cacontology-strategy:hasIntegrationTimeline
cacontology-strategy:hasValidationQuery
cacontology-strategy:hasValidationRule
cacontology-strategy:requiresValidation
cacontology-street:administrationMethod
cacontology-street:apparentAge
cacontology-street:approachMethod
cacontology-street:assessesVulnerability
cacontology-street:contactDuration
cacontology-street:conversationTopic
cacontology-street:distanceFromContact
cacontology-street:distressIndicators
cacontology-street:documentsRecruitment
cacontology-street:economicIncentive
cacontology-street:escalatesTo
cacontology-street:escalationTimeframe
cacontology-street:exhibitsIndicator
cacontology-street:explicitnessLevel
cacontology-street:exploitationLocation
cacontology-street:exploitsVulnerability
cacontology-street:facilitatesTransition
cacontology-street:facilitatesWithSubstance
cacontology-street:followUpDelay
cacontology-street:followUpMethod
cacontology-street:followsUpWith
cacontology-street:helpOfferType
cacontology-street:impairmentLevel
cacontology-street:initialContactLocation
cacontology-street:initiatesContact
cacontology-street:isolatesAt
cacontology-street:isolationLevel
cacontology-street:makesProposition
cacontology-street:moneyAmountMentioned
cacontology-street:occursAt
cacontology-street:persistenceLevel
cacontology-street:persistsAfter
cacontology-street:pretextUsed
cacontology-street:propositionType
cacontology-street:reinforcementAttempts
cacontology-street:reinforces
cacontology-street:rejects
cacontology-street:reportingDelay
cacontology-street:reportingMethod
cacontology-street:reportsTo
cacontology-street:resistanceLevel
cacontology-street:respondsTo
cacontology-street:responseType
cacontology-street:sameDayProgression
cacontology-street:substanceType
cacontology-street:supportsCharge
cacontology-street:targetsVictim
cacontology-street:transitionsTo
cacontology-street:transportationMethod
cacontology-street:usesPretext
cacontology-street:vulnerabilityIndicators
cacontology-tactical:afterActionReport
cacontology-tactical:backupTeamAvailable
cacontology-tactical:briefingConducted
cacontology-tactical:commandedBy
cacontology-tactical:deployedDuring
cacontology-tactical:entryMethod
cacontology-tactical:equipmentType
cacontology-tactical:evacuationRequired
cacontology-tactical:flightRisk
cacontology-tactical:forceUsed
cacontology-tactical:injuriesOccurred
cacontology-tactical:mediaPresent
cacontology-tactical:negotiationAttempted
cacontology-tactical:negotiationDuration
cacontology-tactical:negotiationOutcome
cacontology-tactical:operatedBy
cacontology-tactical:operationAuthorization
cacontology-tactical:operationDuration
cacontology-tactical:operationLocation
cacontology-tactical:operationOutcome
cacontology-tactical:operationType
cacontology-tactical:participatingMember
cacontology-tactical:perimeterEstablished
cacontology-tactical:planningDuration
cacontology-tactical:propertyDamage
cacontology-tactical:publicSafetyThreat
cacontology-tactical:resistanceEncountered
cacontology-tactical:riskLevel
cacontology-tactical:specialApprovalRequired
cacontology-tactical:standoffDuration
cacontology-tactical:suicidalRisk
cacontology-tactical:suspectsArrested
cacontology-tactical:teamSize
cacontology-tactical:threatLevel
cacontology-tactical:useOfForceJustified
cacontology-tactical:weaponsDeployed
cacontology-tactical:weaponsPossible
cacontology-taskforce:accessibleVia
cacontology-taskforce:agencyCount
cacontology-taskforce:agencyType
cacontology-taskforce:arrestsSince2006
cacontology-taskforce:arrestsSince2019
cacontology-taskforce:assignedToUnit
cacontology-taskforce:capabilityLevel
cacontology-taskforce:certificationStatus
cacontology-taskforce:certificationValid
cacontology-taskforce:certifiedIn
cacontology-taskforce:collaboratesWith
cacontology-taskforce:commandedBy
cacontology-taskforce:completionRate
cacontology-taskforce:conductedBy
cacontology-taskforce:coordinatedBy
cacontology-taskforce:coordinatedThrough
cacontology-taskforce:coordinatesWith
cacontology-taskforce:coordinatesWithCivilian
cacontology-taskforce:coordinationDuration
cacontology-taskforce:coordinationLevel
cacontology-taskforce:coordinationModel
cacontology-taskforce:countyName
cacontology-taskforce:coverageArea
cacontology-taskforce:coverageType
cacontology-taskforce:cyberTipsProcessed
cacontology-taskforce:cyberTipsReceived
cacontology-taskforce:cyberTipsSince2019
cacontology-taskforce:dojGrantFunded
cacontology-taskforce:emailAddress
cacontology-taskforce:establishmentDate
cacontology-taskforce:experienceLevel
cacontology-taskforce:federalPartner
cacontology-taskforce:handledInvestigation
cacontology-taskforce:hasContactInformation
cacontology-taskforce:hasMember
cacontology-taskforce:hasMetrics
cacontology-taskforce:hasOperationPhaseBeginPoint
cacontology-taskforce:hasOperationPhaseEndPoint
cacontology-taskforce:hasRegionalTaskForce
cacontology-taskforce:hasRoleBeginPoint
cacontology-taskforce:hasRoleEndPoint
cacontology-taskforce:hasUnit
cacontology-taskforce:hostJurisdictionLevel
cacontology-taskforce:hostOrganizationType
cacontology-taskforce:hostedBy
cacontology-taskforce:hostsTaskForce
cacontology-taskforce:hotlineType
cacontology-taskforce:includesTaskForce
cacontology-taskforce:involvedUnit
cacontology-taskforce:jurisdictionPopulation
cacontology-taskforce:leadsUnit
cacontology-taskforce:localPartner
cacontology-taskforce:maintainsWebsite
cacontology-taskforce:managedByCoordination
cacontology-taskforce:measuresPerformance
cacontology-taskforce:memberCount
cacontology-taskforce:memberRole
cacontology-taskforce:metropolitanArea
cacontology-taskforce:militaryBranches
cacontology-taskforce:militaryJurisdiction
cacontology-taskforce:nationalCoveragePercentage
cacontology-taskforce:nationalHotlineNumber
cacontology-taskforce:nationalTaskForceNetwork
cacontology-taskforce:operatesHotline
cacontology-taskforce:operationDuration
cacontology-taskforce:operationOutcome
cacontology-taskforce:operationPhaseDuration
cacontology-taskforce:operationScale
cacontology-taskforce:operationType
cacontology-taskforce:organizationName
cacontology-taskforce:parentsEducated
cacontology-taskforce:participatedIn
cacontology-taskforce:participatingUnits
cacontology-taskforce:partnerAgencyCount
cacontology-taskforce:partnersWith
cacontology-taskforce:performancePeriod
cacontology-taskforce:phoneNumber
cacontology-taskforce:professionalsTrained
cacontology-taskforce:providesRegionalCoverage
cacontology-taskforce:providesTraining
cacontology-taskforce:receivedTraining
cacontology-taskforce:regionCovered
cacontology-taskforce:regionalTaskForceCount
cacontology-taskforce:reportingYear
cacontology-taskforce:resourceCapacity
cacontology-taskforce:servesCounty
cacontology-taskforce:servesMetropolitanArea
cacontology-taskforce:servesMilitaryBranch
cacontology-taskforce:sexualPredatorArrests
cacontology-taskforce:sharesResourcesWith
cacontology-taskforce:sharingAgreement
cacontology-taskforce:sharingDuration
cacontology-taskforce:sharingType
cacontology-taskforce:specializationArea
cacontology-taskforce:statesWithMultipleTaskForces
cacontology-taskforce:studentsEducated
cacontology-taskforce:supportedInvestigation
cacontology-taskforce:taskForceId
cacontology-taskforce:taskForceNumber
cacontology-taskforce:teachersEducated
cacontology-taskforce:totalTaskForces
cacontology-taskforce:trainingDuration
cacontology-taskforce:trainingType
cacontology-taskforce:websiteURL
cacontology-taskforce:yearOverYearIncrease
cacontology-taskforce:yearsOfService
cacontology-temporal:EvidencePreservationDeadline
cacontology-temporal:StatuteOfLimitationsDeadline
cacontology-temporal:WarrantExpirationDate
cacontology-temporal:ageSubject
cacontology-temporal:concernsAgeQuality
cacontology-temporal:createsSuspension
cacontology-temporal:hasActiveDuration
cacontology-temporal:hasAgeInYears
cacontology-temporal:hasConsequentEvent
cacontology-temporal:hasLegalDeadline
cacontology-temporal:hasMaximumDuration
cacontology-temporal:hasMinimumDuration
cacontology-temporal:hasParallelEvent
cacontology-temporal:hasPrerequisiteEvent
cacontology-temporal:hasSuspendedDuration
cacontology-temporal:hasTimeToFirstAction
cacontology-temporal:hasTimeToResolution
cacontology-temporal:hasTypicalDuration
cacontology-temporal:phaseCompletionRate
cacontology-temporal:phaseEfficiency
cacontology-temporal:resumes
cacontology-temporal:suspends
cacontology-temporal:temporallyContains
cacontology-temporal:temporallyOverlapsWith
cacontology-temporal:temporallyPrecedes
cacontology-temporal:terminatesSuspension
cacontology-temporal:transitionsFrom
cacontology-temporal:transitionsTo
cacontology-temporal:triggersTransition
cacontology-temporal:urgencyLevel
cacontology-trafficking:controlsVictim
cacontology-trafficking:crossesJurisdiction
cacontology-trafficking:destinationLocation
cacontology-trafficking:earningsAmount
cacontology-trafficking:earningsPeriod
cacontology-trafficking:enterpriseDuration
cacontology-trafficking:hasControlMethod
cacontology-trafficking:hasEnterpriseBeginPoint
cacontology-trafficking:hasEnterpriseEndPoint
cacontology-trafficking:hasEnterprisePhase
cacontology-trafficking:hasHierarchyLevel
cacontology-trafficking:hasPhaseBeginPoint
cacontology-trafficking:hasPhaseEndPoint
cacontology-trafficking:hasRoleBeginPoint
cacontology-trafficking:hasRoleEndPoint
cacontology-trafficking:involvesJurisdictionCount
cacontology-trafficking:involvesTraffickerCount
cacontology-trafficking:involvesVictimCount
cacontology-trafficking:operatesInJurisdiction
cacontology-trafficking:originLocation
cacontology-trafficking:phaseDuration
cacontology-trafficking:requiresCoordination
cacontology-trafficking:roleDuration
cacontology-trafficking:situationComplexity
cacontology-trafficking:transitionsToPhase
cacontology-trafficking:transportationMethod
cacontology-trafficking:vulnerabilityExploited
cacontology-training:assessedBy
cacontology-training:buildsCapacityFor
cacontology-training:capacityLevel
cacontology-training:certificationStatus
cacontology-training:certificationValidityPeriod
cacontology-training:certifiedBy
cacontology-training:competencyLevel
cacontology-training:completionRate
cacontology-training:deliveredBy
cacontology-training:hasPhaseBeginPoint
cacontology-training:hasPhaseEndPoint
cacontology-training:hasRoleBeginPoint
cacontology-training:hasRoleEndPoint
cacontology-training:hasTrainingBeginPoint
cacontology-training:hasTrainingEndPoint
cacontology-training:improvesProficiency
cacontology-training:includedInCurriculum
cacontology-training:k9PublicPresentations
cacontology-training:k9SearchWarrantsAssisted
cacontology-training:mentors
cacontology-training:operationalDeploymentCount
cacontology-training:outreachEventsCount
cacontology-training:participatedIn
cacontology-training:participationRate
cacontology-training:phaseDuration
cacontology-training:professionalsTrained
cacontology-training:professionalsTrainedCount
cacontology-training:roleDuration
cacontology-training:skillsAcquired
cacontology-training:supportedBy
cacontology-training:totalAttendeesReached
cacontology-training:trainingDuration
cacontology-training:trainingEffectiveness
cacontology-training:trainingLanguage
cacontology-training:trainingReachCount
cacontology-training:trainingToOperationEffectiveness
cacontology-training:validatesSkills
cacontology-undercover:advertisementLiveTime
cacontology-undercover:advertisementURL
cacontology-undercover:agentOperatesAs
cacontology-undercover:apartmentType
cacontology-undercover:backstoryDetails
cacontology-undercover:backupTeamAssigned
cacontology-undercover:chatDurationHours
cacontology-undercover:chatPlatformType
cacontology-undercover:chatRoomTopic
cacontology-undercover:clientContactMethod
cacontology-undercover:communicationMethod
cacontology-undercover:communicationPlatform
cacontology-undercover:conductedOnPlatform
cacontology-undercover:containsCriminalContent
cacontology-undercover:conversationCount
cacontology-undercover:coversTimeframe
cacontology-undercover:documentsViolationAt
cacontology-undercover:emergencySignal
cacontology-undercover:evidenceCollected
cacontology-undercover:evidentiaryValue
cacontology-undercover:floorLevel
cacontology-undercover:generatesEvidence
cacontology-undercover:handledBy
cacontology-undercover:hasOperationPhaseBeginPoint
cacontology-undercover:hasOperationPhaseEndPoint
cacontology-undercover:hasRoleBeginPoint
cacontology-undercover:hasRoleEndPoint
cacontology-undercover:hasSecureExit
cacontology-undercover:identificationSuccessRate
cacontology-undercover:identifiesPredator
cacontology-undercover:identifiesVictimPhotos
cacontology-undercover:infiltrationDuration
cacontology-undercover:instructionType
cacontology-undercover:interceptsInstruction
cacontology-undercover:investigatesViolation
cacontology-undercover:involvesChatInvestigation
cacontology-undercover:judicialAuthorization
cacontology-undercover:leadsToDevelopment
cacontology-undercover:leadsToSolicitation
cacontology-undercover:maintainsSurveillance
cacontology-undercover:meetingSolicitationAttempts
cacontology-undercover:monitorsPhoneCommunication
cacontology-undercover:operatesAtLocation
cacontology-undercover:operatesUnderIdentity
cacontology-undercover:operationClassification
cacontology-undercover:operationOutcome
cacontology-undercover:operationPhaseDuration
cacontology-undercover:participantCount
cacontology-undercover:personaAge
cacontology-undercover:personaGender
cacontology-undercover:personaLocation
cacontology-undercover:personaProfile
cacontology-undercover:phoneNumberMonitored
cacontology-undercover:platformUsername
cacontology-undercover:portraysAge
cacontology-undercover:predatorContactAttempts
cacontology-undercover:respondsToAdvertisement
cacontology-undercover:safetyProtocol
cacontology-undercover:socialMediaPlatformsUsed
cacontology-undercover:supervisoryApproval
cacontology-undercover:surveillanceTeamCount
cacontology-undercover:targetBehaviorType
cacontology-undercover:targetsIndividual
cacontology-undercover:targetsSubject
cacontology-undercover:utilizesPersona
cacontology-undercover:victimPhotoCount
cacontology-undercover:violationLocation
cacontology-undercover:violationType
cacontology-undercover:websitePlatform
cacontology-us-ncmec:accountConfidence
cacontology-us-ncmec:analysisConfidence
cacontology-us-ncmec:analysisOf
cacontology-us-ncmec:cooperationLevel
cacontology-us-ncmec:dataProvided
cacontology-us-ncmec:enrichmentType
cacontology-us-ncmec:hasNCMECIncidentType
cacontology-us-ncmec:hasNCMECReportAnnotation
cacontology-us-ncmec:identifiedContent
cacontology-us-ncmec:incidentCode
cacontology-us-ncmec:indicatorStrength
cacontology-us-ncmec:involvesPlatform
cacontology-us-ncmec:linkedToAccount
cacontology-us-ncmec:phoneVerificationStatus
cacontology-us-ncmec:platformResponseTime
cacontology-us-ncmec:priorityLevel
cacontology-us-ncmec:processedTip
cacontology-us-ncmec:processingTime
cacontology-us-ncmec:referralJurisdiction
cacontology-us-ncmec:resultedInInvestigation
cacontology-us-ncmec:supportedBy
cacontology-us-ncmec:tracedToPhone
cacontology-us-ncmec:transferFrequency
cacontology-us-ncmec:transferVolume
cacontology-us-ncmec:triggerCriteria
cacontology-us-ncmec:triggeredBy
cacontology-us-ncmec:urgencyLevel
cacontology-us-ncmec:validationStatus
cacontology-usa-federal:collaboratesWith
cacontology-usa-federal:collectsEvidence
cacontology-usa-federal:crimeJurisdiction
cacontology-usa-federal:crimeSeverityLevel
cacontology-usa-federal:defendedBy
cacontology-usa-federal:followsPhase
cacontology-usa-federal:foreignCountriesInvolved
cacontology-usa-federal:hasDivision
cacontology-usa-federal:hasInterstateNexus
cacontology-usa-federal:hasLegalPhase
cacontology-usa-federal:hasPhaseBeginPoint
cacontology-usa-federal:hasPhaseEndPoint
cacontology-usa-federal:hasProsecutionBeginPoint
cacontology-usa-federal:hasProsecutionEndPoint
cacontology-usa-federal:hasRoleBeginPoint
cacontology-usa-federal:hasRoleEndPoint
cacontology-usa-federal:investigatedBy
cacontology-usa-federal:involvesDigitalEvidence
cacontology-usa-federal:involvesInternationalElements
cacontology-usa-federal:involvesMultipleStates
cacontology-usa-federal:isPhaseOf
cacontology-usa-federal:mandatoryMinimumSentence
cacontology-usa-federal:phaseDuration
cacontology-usa-federal:precedesPhase
cacontology-usa-federal:prosecutedBy
cacontology-usa-federal:prosecutionComplexity
cacontology-usa-federal:prosecutionDuration
cacontology-usa-federal:prosecutionSeverity
cacontology-usa-federal:prosecutionStatus
cacontology-usa-federal:requiresForensicAnalysis
cacontology-usa-federal:requiresRole
cacontology-usa-federal:roleDuration
cacontology-usa-federal:roleExperience
cacontology-usa-federal:roleSpecialization
cacontology-usa-federal:usesEvidence
cacontology-usa-federal:victimizedBy
cacontology1:conspiracyDuration
cacontology1:conspiracyMemberCount
cacontology1:currentPhase
cacontology1:depictsChild
cacontology1:hasAgeSituation
cacontology1:hasOffenderAgeSituation
cacontology1:hasPhase
cacontology1:hasPhaseBeginPoint
cacontology1:hasPhaseEndPoint
cacontology1:hasRoleBeginPoint
cacontology1:hasRoleEndPoint
cacontology1:hasStep
cacontology1:hasVictimAgeSituation
cacontology1:indictmentCounts
cacontology1:investigationStatus
cacontology1:involvesOffender
cacontology1:involvesVictim
cacontology1:leadsConspiracy
cacontology1:legalInstrument
cacontology1:nextStep
cacontology1:occursDuringPhase
cacontology1:participatesInConspiracy
cacontology1:phaseDuration
cacontology1:phaseProgress
cacontology1:previousStep
cacontology1:producesArtifact
cacontology1:rescuedVictim
cacontology1:resultsinIndictment
cacontology1:severityLevel
cacontology1:submittedTo
cacontology1:targetsService
cacontology1:transitionsTo
cacontology1:usesChannel
cacontology1:usesClassification
hotline:assignedRole
hotline:classification
hotline:coordinationBeginTime
hotline:currentPhase
hotline:feedbackType
hotline:firstSeen
hotline:forwardsTo
hotline:foundAtURL
hotline:hasEvidence
hotline:hasPhaseTransition
hotline:intakeChannel
hotline:involvesCoordination
hotline:isAnonymous
hotline:linkedInvestigation
hotline:phaseBeginTime
hotline:phaseDuration
hotline:phaseEndTime
hotline:playsRole
hotline:producesHash
hotline:receivedBy
hotline:referencesHash
hotline:reportedBy
hotline:roleAssignmentTime
hotline:status
hotline:triggersAction
Concepts (21)
cacontology-detection:copine-1
cacontology-detection:copine-10
cacontology-detection:copine-4
cacontology-detection:copine-7
cacontology-detection:copine-8
cacontology-detection:sar-1
cacontology-detection:sar-2
cacontology-detection:sar-3
cacontology-detection:sar-4
cacontology-detection:sar-5
hotline:classification-confirmed
hotline:classification-false-positive
hotline:classification-legal-concern
hotline:classification-other
hotline:classification-uncertain
hotline:status-closed
hotline:status-forwarded
hotline:status-in-progress
hotline:status-in-review
hotline:status-new
hotline:status-reopened
Home
Entities A-Z
Entities A-Z
Classes (1961)
cacontology-abduction:AbductionExploitationPattern
cacontology-abduction:AbductionSceneEvidence
cacontology-abduction:AgeBasedVulnerability
cacontology-abduction:ApartmentIsolation
cacontology-abduction:BluntObjectThreats
cacontology-abduction:ClothingDisguise
cacontology-abduction:ComplianceEnforcement
cacontology-abduction:ComplianceUnderThreat
cacontology-abduction:ControlledEnvironmentExploitation
cacontology-abduction:DelayedDisclosure
cacontology-abduction:DisguiseBasedConcealment
cacontology-abduction:DisguiseEvidence
cacontology-abduction:EscapeAttempt
cacontology-abduction:ExploitationSceneEvidence
cacontology-abduction:FacialConcealment
cacontology-abduction:FireEscapeEntry
cacontology-abduction:FirearmThreats
cacontology-abduction:ForcedLocationEntry
cacontology-abduction:HoodedConcealment
cacontology-abduction:HumiliationBasedExploitation
cacontology-abduction:ImmediateDisclosure
cacontology-abduction:ImmediateExploitation
cacontology-abduction:ImpliedWeaponThreats
cacontology-abduction:InitialResistance
cacontology-abduction:IsolatedChildTargeting
cacontology-abduction:IsolationVulnerability
cacontology-abduction:KnifeThreats
cacontology-abduction:LocationBasedExploitation
cacontology-abduction:LocationIsolation
cacontology-abduction:MaskConcealment
cacontology-abduction:MovementRestriction
cacontology-abduction:OpportunisticPredation
cacontology-abduction:OpportunityBasedTargeting
cacontology-abduction:PhysicalForceWithWeapon
cacontology-abduction:PhysicalIntimidation
cacontology-abduction:PostAbductionReporting
cacontology-abduction:PublicSpaceAbduction
cacontology-abduction:RandomVictimSelection
cacontology-abduction:RitualizedExploitation
cacontology-abduction:RoutineActivityTargeting
cacontology-abduction:SchoolRouteAbduction
cacontology-abduction:SchoolRouteTargeting
cacontology-abduction:SecondaryLocationControl
cacontology-abduction:SilenceEnforcement
cacontology-abduction:SizeBasedVulnerability
cacontology-abduction:SkiMaskConcealment
cacontology-abduction:StrangerAbduction
cacontology-abduction:StrangerAbductionInvestigation
cacontology-abduction:StreetLevelAbduction
cacontology-abduction:SurveillanceEvidence
cacontology-abduction:SurvivalBehavior
cacontology-abduction:ThreatBasedControl
cacontology-abduction:UnconventionalEntry
cacontology-abduction:VehicleConcealment
cacontology-abduction:VerbalThreats
cacontology-abduction:VictimAbductionResponse
cacontology-abduction:VictimControlMechanism
cacontology-abduction:VictimTargetingPattern
cacontology-abduction:VulnerabilityExploitation
cacontology-abduction:WeaponBasedCoercion
cacontology-abduction:WeaponDisplayIntimidation
cacontology-abduction:WeaponEvidence
cacontology-abduction:WindowEntry
cacontology-abduction:WitnessEvidence
cacontology-ai:AIAlteredCSAM
cacontology-ai:AICSAMInvestigation
cacontology-ai:AIContentDetection
cacontology-ai:AIContentGeneration
cacontology-ai:AIContentInvestigationSituation
cacontology-ai:AIDetectionPhase
cacontology-ai:AIDetectionTool
cacontology-ai:AIForensicAnalyst
cacontology-ai:AIGeneratedCSAM
cacontology-ai:AIModelAnalyst
cacontology-ai:AgeProgression
cacontology-ai:ArtifactAnalysis
cacontology-ai:BiometricInconsistencyAnalysis
cacontology-ai:ContentGenerationPhase
cacontology-ai:CrossPlatformDetectionSituation
cacontology-ai:DeepfakeCSAM
cacontology-ai:DeepfakeDetection
cacontology-ai:DeepfakeDetectionSpecialist
cacontology-ai:DeepfakeDetectionTool
cacontology-ai:FaceSwapping
cacontology-ai:ForensicAnalysisPhase
cacontology-ai:GenerationSourceTracking
cacontology-ai:HybridCSAM
cacontology-ai:ImageGeneration
cacontology-ai:MetadataAnalysisTool
cacontology-ai:ModelIdentification
cacontology-ai:ModelTraining
cacontology-ai:SyntheticImageDetector
cacontology-ai:SyntheticMediaAnalysis
cacontology-ai:SyntheticMediaCSAM
cacontology-ai:SyntheticMediaExaminer
cacontology-ai:TechnicalAnalysisSituation
cacontology-ai:TrainingDataAnalysis
cacontology-ai:VideoGeneration
cacontology-asset-forfeiture:AssetAssessmentAction
cacontology-asset-forfeiture:AssetForfeitureAction
cacontology-asset-forfeiture:AssetForfeitureOfficer
cacontology-asset-forfeiture:AssetIdentificationPhase
cacontology-asset-forfeiture:AssetValuationExpert
cacontology-asset-forfeiture:CACTInvestigation
cacontology-asset-forfeiture:CompleteForfeiture
cacontology-asset-forfeiture:ConsentOrder
cacontology-asset-forfeiture:CriminalAssetsConfiscationTaskforce
cacontology-asset-forfeiture:EquipmentSeizureAction
cacontology-asset-forfeiture:FinancialAccount
cacontology-asset-forfeiture:FinancialPenaltyAction
cacontology-asset-forfeiture:ForensicAccountant
cacontology-asset-forfeiture:ForfeitureOutcome
cacontology-asset-forfeiture:HouseholdItems
cacontology-asset-forfeiture:InstrumentOfOffense
cacontology-asset-forfeiture:JurisdictionalCoordination
cacontology-asset-forfeiture:LegalBasisForForfeiture
cacontology-asset-forfeiture:LegalCounsel
cacontology-asset-forfeiture:LegalProceedingsPhase
cacontology-asset-forfeiture:LegalProceedingsSituation
cacontology-asset-forfeiture:MultiStateForfeiture
cacontology-asset-forfeiture:NonProfitOffenderAssets
cacontology-asset-forfeiture:PartialForfeiture
cacontology-asset-forfeiture:ProceedsOfCrime
cacontology-asset-forfeiture:PropertyForfeitureAction
cacontology-asset-forfeiture:PropertyManager
cacontology-asset-forfeiture:PropertyRestraintAction
cacontology-asset-forfeiture:RecoveryPhase
cacontology-asset-forfeiture:ResidentialProperty
cacontology-asset-forfeiture:RestraintPhase
cacontology-asset-forfeiture:StateSupremeCourt
cacontology-asset-forfeiture:TechnicalEquipment
cacontology-asset-forfeiture:Vehicle
cacontology-athletic:AnatomyFocusedExploitation
cacontology-athletic:AssistantCoachRole
cacontology-athletic:AthleticCoachRole
cacontology-athletic:AthleticCoachingExploitation
cacontology-athletic:AthleticContactEscalation
cacontology-athletic:AthleticExploitationDiscovery
cacontology-athletic:AthleticFacility
cacontology-athletic:AthleticFacilityExploitation
cacontology-athletic:AthleticFieldExploitation
cacontology-athletic:AthleticOpportunityThreats
cacontology-athletic:AuthorityEstablishmentPhase
cacontology-athletic:CommunityBasedReporting
cacontology-athletic:ConditioningCoercion
cacontology-athletic:DiscoveryPhase
cacontology-athletic:DualCoachingRoleExploitation
cacontology-athletic:ExerciseComplianceCoercion
cacontology-athletic:ExhaustionBasedCoercion
cacontology-athletic:ExploitationPhase
cacontology-athletic:GroomingPhase
cacontology-athletic:GroupExploitationDynamics
cacontology-athletic:GymExploitation
cacontology-athletic:HeadCoachRole
cacontology-athletic:InappropriateSexualEducation
cacontology-athletic:InstitutionalEmploymentTermination
cacontology-athletic:LegitimateContactExploitation
cacontology-athletic:LockerRoomExploitation
cacontology-athletic:MasturbationDiscussionExploitation
cacontology-athletic:MaterialBenefitCoercion
cacontology-athletic:OverClothingToUnderClothingEscalation
cacontology-athletic:ParentNetworkDiscovery
cacontology-athletic:PhysicalCoercionPhase
cacontology-athletic:PhysicalContactEscalation
cacontology-athletic:PhysicalEnduranceExploitation
cacontology-athletic:PhysicalTrainingCoercion
cacontology-athletic:PracticeSessionExploitation
cacontology-athletic:PubicHairFocusedExploitation
cacontology-athletic:RumorCirculationDiscovery
cacontology-athletic:SchoolAthleticCoachRole
cacontology-athletic:SchoolAthleticExploitation
cacontology-athletic:SchoolBasedInvestigation
cacontology-athletic:SexualEducationExploitation
cacontology-athletic:SexualTopicGrooming
cacontology-athletic:SportsContextPhysicalAbuse
cacontology-athletic:TeamBasedExploitation
cacontology-athletic:TeamDynamicsExploitation
cacontology-athletic:TeamMembershipCoercion
cacontology-athletic:TeamSelectionCoercion
cacontology-athletic:TrainingBasedTouching
cacontology-athletic:TrainingCampExploitation
cacontology-athletic:TrainingDrillCoercion
cacontology-athletic:TravelTeamCoachRole
cacontology-athletic:TravelTeamExploitation
cacontology-case:ActiveInvestigationPhase
cacontology-case:AdministrativeReview
cacontology-case:AnalystAssignment
cacontology-case:ArrestWarrant
cacontology-case:CaseAnalystRole
cacontology-case:CaseAssignment
cacontology-case:CaseClosure
cacontology-case:CaseDocumentation
cacontology-case:CaseDurationMetrics
cacontology-case:CaseInitiationPhase
cacontology-case:CaseManagement
cacontology-case:CaseManagerRole
cacontology-case:CaseMetrics
cacontology-case:CaseProsecutorRole
cacontology-case:CaseReport
cacontology-case:CaseReview
cacontology-case:CaseTracking
cacontology-case:CaseWorkflow
cacontology-case:ColdCaseManagement
cacontology-case:ComplexCaseManagement
cacontology-case:CostPerCaseMetrics
cacontology-case:CourtFiling
cacontology-case:CourtProceedingsPhase
cacontology-case:DispositionPhase
cacontology-case:DispositionWorkflow
cacontology-case:EvidenceLog
cacontology-case:ExpertReport
cacontology-case:ExternalReview
cacontology-case:HighPriorityCaseManagement
cacontology-case:IntakeWorkflow
cacontology-case:InterviewNotes
cacontology-case:InvestigationWorkflow
cacontology-case:InvestigatorAssignment
cacontology-case:LeadInvestigatorRole
cacontology-case:LegalReview
cacontology-case:MultiJurisdictionalCaseManagement
cacontology-case:PeerReview
cacontology-case:PrimaryInvestigatorAssignment
cacontology-case:ProsecutionPreparationPhase
cacontology-case:ProsecutionWorkflow
cacontology-case:ProsecutorAssignment
cacontology-case:QualityAssuranceReview
cacontology-case:QualityScoreMetrics
cacontology-case:ResolutionRateMetrics
cacontology-case:ResourceUtilizationMetrics
cacontology-case:SearchWarrant
cacontology-case:SecondaryInvestigatorAssignment
cacontology-case:SupervisorAssignment
cacontology-case:SupervisoryReview
cacontology-coord:CaseInformationSharing
cacontology-coord:CaseResolutionTimeMetrics
cacontology-coord:CommunicationProtocol
cacontology-coord:CoordinationAgreement
cacontology-coord:CoordinationEffectivenessMetrics
cacontology-coord:CoordinationMetrics
cacontology-coord:CostEfficiencyMetrics
cacontology-coord:EmergencyCommunicationChannel
cacontology-coord:EncryptedCommunicationChannel
cacontology-coord:EquipmentSharing
cacontology-coord:EvidenceSharing
cacontology-coord:ExpertiseSharing
cacontology-coord:FacilitySharing
cacontology-coord:FederalCoordination
cacontology-coord:FormalAgreement
cacontology-coord:FormalCommunicationChannel
cacontology-coord:FundingSharing
cacontology-coord:InformalAgreement
cacontology-coord:InformalCommunicationChannel
cacontology-coord:InformationSharing
cacontology-coord:InformationSharingRateMetrics
cacontology-coord:IntelligenceLiaison
cacontology-coord:IntelligenceSharing
cacontology-coord:InternationalCoordination
cacontology-coord:InvestigationCoordination
cacontology-coord:JointInvestigation
cacontology-coord:JointOperationsPlan
cacontology-coord:LegalLiaison
cacontology-coord:LiaisonCommunicationChannel
cacontology-coord:LiaisonOfficer
cacontology-coord:LocalCoordination
cacontology-coord:MemorandumOfAgreement
cacontology-coord:MemorandumOfUnderstanding
cacontology-coord:MultiAgencyCoordination
cacontology-coord:MultiStateCoordination
cacontology-coord:OperationalLiaison
cacontology-coord:ParallelInvestigation
cacontology-coord:PersonnelSharing
cacontology-coord:PrimaryLiaison
cacontology-coord:RegionalCoordination
cacontology-coord:ResourceSharing
cacontology-coord:ResourceUtilizationMetrics
cacontology-coord:ResponseTimeMetrics
cacontology-coord:SecondaryLiaison
cacontology-coord:SecureCommunicationChannel
cacontology-coord:StateCoordination
cacontology-coord:SuspectInformationSharing
cacontology-coord:TaskForceCharter
cacontology-coord:TaskForceCoordination
cacontology-coord:TechnicalDataSharing
cacontology-coord:TechnicalLiaison
cacontology-coord:TechnologySharing
cacontology-coord:VictimInformationSharing
cacontology-corruption:AccessPrivilegeAbuse
cacontology-corruption:AuthoritySymbolExploitation
cacontology-corruption:BadgeDisplayedProduction
cacontology-corruption:CorruptArmyReservist
cacontology-corruption:CorruptLawEnforcementOfficer
cacontology-corruption:CorruptMetropolitanPoliceDepartmentOfficer
cacontology-corruption:CorruptStateTrooper
cacontology-corruption:DatabaseAccessAbuse
cacontology-corruption:EvidenceManipulation
cacontology-corruption:ExternalOversightInvestigation
cacontology-corruption:FormerLawEnforcementOfficer
cacontology-corruption:InformationLeakage
cacontology-corruption:InsiderThreat
cacontology-corruption:InsiderThreatDetection
cacontology-corruption:InternalAffairsInvestigation
cacontology-corruption:InvestigativeAuthorityAbuse
cacontology-corruption:LawEnforcementCorruption
cacontology-corruption:MilitaryUniformProduction
cacontology-corruption:OfficerChildTrafficking
cacontology-corruption:OfficerProducedCSAM
cacontology-corruption:OfficialVehicleExploitation
cacontology-corruption:PoliceUniformProduction
cacontology-corruption:PositionOfAuthorityAbuse
cacontology-corruption:PublicIntegrityInvestigation
cacontology-corruption:UniformBasedExploitation
cacontology-corruption:UniformEnhancedProduction
cacontology-corruption:WhistleblowerReport
cacontology-custodial:ActiveCustodyPhase
cacontology-custodial:AuthorityAbuse
cacontology-custodial:AuthorityFigure
cacontology-custodial:Babysitter
cacontology-custodial:BackgroundCheck
cacontology-custodial:BreachOfCare
cacontology-custodial:CaregiverRelationship
cacontology-custodial:ChildcareProvider
cacontology-custodial:Coach
cacontology-custodial:CustodialAbuse
cacontology-custodial:CustodialAuthorization
cacontology-custodial:CustodialCrisisSituation
cacontology-custodial:CustodialRelationship
cacontology-custodial:CustodyArrangement
cacontology-custodial:EmergencyCustody
cacontology-custodial:FamilialRelationship
cacontology-custodial:FamilyFriend
cacontology-custodial:FormalCustody
cacontology-custodial:Guardian
cacontology-custodial:InformalCustody
cacontology-custodial:Mentor
cacontology-custodial:ParentalConsent
cacontology-custodial:PositionOfTrust
cacontology-custodial:ProbationaryCustodyPhase
cacontology-custodial:ProfessionalCareRelationship
cacontology-custodial:Relative
cacontology-custodial:SupervisionBreakdownSituation
cacontology-custodial:SupervisionFailure
cacontology-custodial:SuspendedCustodyPhase
cacontology-custodial:Teacher
cacontology-custodial:TemporaryCustody
cacontology-custodial:TerminatedCustodyPhase
cacontology-custodial:TrustBreachSituation
cacontology-custodial:TrustViolation
cacontology-custodial:VisitationArrangement
cacontology-custodial:VulnerabilityExposureSituation
cacontology-detection:AutomatedDetectionAction
cacontology-detection:COPINEClassificationScheme
cacontology-detection:ClassificationResult
cacontology-detection:ContentAnalystRole
cacontology-detection:ContentHashingAction
cacontology-detection:ContentHashingTool
cacontology-detection:CrossPlatformDetectionSituation
cacontology-detection:DatabaseMatchAction
cacontology-detection:DatabaseMatchingTool
cacontology-detection:DetectionResult
cacontology-detection:FalsePositiveAnalysisAction
cacontology-detection:FalsePositiveManagementSituation
cacontology-detection:HashAnalystRole
cacontology-detection:HashComparisonPhase
cacontology-detection:InitialDetectionPhase
cacontology-detection:MachineLearningDetectionTool
cacontology-detection:MachineLearningSpecialistRole
cacontology-detection:ManualClassificationAction
cacontology-detection:ManualReviewPhase
cacontology-detection:ManualReviewTool
cacontology-detection:MassContentAnalysisSituation
cacontology-detection:PerceptualHash
cacontology-detection:PhotoDNAHash
cacontology-detection:QualityAssuranceAnalystRole
cacontology-detection:ReportingPhase
cacontology-detection:SARClassificationScheme
cacontology-detection:ValidationPhase
cacontology-educational1:AcademicActivityExploitation
cacontology-educational1:AcademicIntimidation
cacontology-educational1:AcademicPowerVulnerability
cacontology-educational1:AcademicTermPhase
cacontology-educational1:AdministratorRole
cacontology-educational1:AfterHoursClassroomExploitation
cacontology-educational1:AgeDeception
cacontology-educational1:AgeSpecificTargeting
cacontology-educational1:AssignmentCompletionExploitation
cacontology-educational1:AssignmentHarassment
cacontology-educational1:ClassroomBasedExploitation
cacontology-educational1:ClassroomExploitationContext
cacontology-educational1:ClassroomIsolationVulnerability
cacontology-educational1:CoachRole
cacontology-educational1:CounselorRole
cacontology-educational1:CrossInstitutionalExploitation
cacontology-educational1:CrossInstitutionalInvestigationSituation
cacontology-educational1:DegradingWrittenComments
cacontology-educational1:DigitalCommunicationEvidence
cacontology-educational1:DigitalImpersonation
cacontology-educational1:EducationalExploitationSituation
cacontology-educational1:EducationalInstitution
cacontology-educational1:EducationalInstitutionInvestigation
cacontology-educational1:EducatorPerpetratedExploitation
cacontology-educational1:EducatorRole
cacontology-educational1:EliteEducationalInstitution
cacontology-educational1:EmploymentPhase
cacontology-educational1:ExploitationEscalationPhase
cacontology-educational1:ForcibleTouching
cacontology-educational1:GymTeacherRole
cacontology-educational1:IPAddressEvidence
cacontology-educational1:ImmediatePhysicalContactExploitation
cacontology-educational1:IndependentSchool
cacontology-educational1:InstitutionalResponseSituation
cacontology-educational1:InstitutionalSafeguarding
cacontology-educational1:InstitutionalVulnerability
cacontology-educational1:IntermediateSchool
cacontology-educational1:InvestigationPhase
cacontology-educational1:MathTeacherRole
cacontology-educational1:MiddleSchool
cacontology-educational1:MultiVictimExploitationSituation
cacontology-educational1:MultipleAccountDeception
cacontology-educational1:OneOnOneAcademicExploitation
cacontology-educational1:OpportunisticTouching
cacontology-educational1:PhysicalContactPattern
cacontology-educational1:PoliceNotification
cacontology-educational1:PositionOfTrustExploitation
cacontology-educational1:PostReleaseSuperVision
cacontology-educational1:PrincipalNotification
cacontology-educational1:PrivateSchool
cacontology-educational1:PublicSchool
cacontology-educational1:SchoolStaffReporting
cacontology-educational1:SexOffenderRegistration
cacontology-educational1:SexualPerformanceSolicitation
cacontology-educational1:StudentVictimTargeting
cacontology-educational1:SubstituteTeacherRole
cacontology-educational1:TeacherRole
cacontology-educational1:TeacherStudentExploitation
cacontology-educational1:TestTakingExploitation
cacontology-educational1:UseOfChildInSexualPerformance
cacontology-educational1:VictimAccountEvidence
cacontology-educational1:VictimDisclosureToStaff
cacontology-educational1:VulnerableStudentTargeting
cacontology-educational1:WitnessTestimonyEvidence
cacontology-educational1:WrittenHarassment
cacontology-educational1:WrittenHarassmentEvidence
cacontology-enterprises:AccelerationistGroup
cacontology-enterprises:AccessControlSystem
cacontology-enterprises:AlternateAccountSystem
cacontology-enterprises:AnimalAbuseCoercion
cacontology-enterprises:ChildExploitationEnterprise
cacontology-enterprises:ContentBasedRecruitment
cacontology-enterprises:ContentCompilationSystem
cacontology-enterprises:ContentCurationAction
cacontology-enterprises:ContentCurrencySystem
cacontology-enterprises:ContentEditingProcess
cacontology-enterprises:ContentProducerRole
cacontology-enterprises:ContentValueAssessment
cacontology-enterprises:CoordinatorRole
cacontology-enterprises:CovertEmployeeOperation
cacontology-enterprises:CrossPlatformCoordination
cacontology-enterprises:CrossPlatformEvidenceCorrelation
cacontology-enterprises:CyberExtremistNetwork
cacontology-enterprises:EncryptedChannelInfiltration
cacontology-enterprises:EncryptedChannelNetwork
cacontology-enterprises:EnterpriseHierarchy
cacontology-enterprises:EnterpriseLeaderRole
cacontology-enterprises:EnterpriseRole
cacontology-enterprises:ExtremeDegradationCoercion
cacontology-enterprises:ExtremistNetworkCell
cacontology-enterprises:IdentityCorrelationAnalysis
cacontology-enterprises:InnerCore
cacontology-enterprises:InnerCoreMemberRole
cacontology-enterprises:LeadershipStructure
cacontology-enterprises:Lorebook
cacontology-enterprises:MembershipAdvancementSystem
cacontology-enterprises:MembershipTier
cacontology-enterprises:MentalHealthVulnerabilityTargeting
cacontology-enterprises:NameCuttingCoercion
cacontology-enterprises:NetworkMappingInvestigation
cacontology-enterprises:NihilisticViolentExtremismNetwork
cacontology-enterprises:PlatformMigrationStrategy
cacontology-enterprises:PrivateGroupManagement
cacontology-enterprises:RecruitmentHierarchy
cacontology-enterprises:RecruitmentSpecialistRole
cacontology-enterprises:SelfHarmCoercion
cacontology-enterprises:SelfImmolationCoercion
cacontology-enterprises:SiblingAbuseCoercion
cacontology-enterprises:SocialEngineeringCampaign
cacontology-enterprises:SuicideCoercion
cacontology-enterprises:TrustBuildingProcess
cacontology-enterprises:VictimContentCompilation
cacontology-enterprises:VictimProfileDevelopment
cacontology-enterprises:VulnerablePopulationTargeting
cacontology-forensics:AcquisitionPhase
cacontology-forensics:AdvancedSearchTechnique
cacontology-forensics:AnalysisPhase
cacontology-forensics:AutomatedContentAnalysis
cacontology-forensics:BehavioralFingerprinting
cacontology-forensics:ChainOfCustodyAction
cacontology-forensics:CommunicationPatternAnalysis
cacontology-forensics:ContentCorrelationAnalysis
cacontology-forensics:CrossPlatformCorrelation
cacontology-forensics:CrossReferenceAnalysis
cacontology-forensics:CustodyDocument
cacontology-forensics:DatabaseIntelligenceIntegration
cacontology-forensics:DetectionDogAssist
cacontology-forensics:DistributedForensicProcessing
cacontology-forensics:ElectronicStorageDeviceDetection
cacontology-forensics:EvidenceCustodianRole
cacontology-forensics:EvidenceTriageSystem
cacontology-forensics:EvidenceVerificationAction
cacontology-forensics:ExtendedInvestigationTimeline
cacontology-forensics:ForensicAcquisitionAction
cacontology-forensics:ForensicExaminerRole
cacontology-forensics:ForensicImage
cacontology-forensics:ForensicImagingTool
cacontology-forensics:GeospatialCorrelation
cacontology-forensics:HashingTool
cacontology-forensics:HiddenDeviceRecovery
cacontology-forensics:ImageAnalysisForVictimID
cacontology-forensics:InternationalEvidenceProcessing
cacontology-forensics:K9AssistedForensics
cacontology-forensics:MachineLearningCorrelation
cacontology-forensics:MassDigitalEvidenceProcessing
cacontology-forensics:MemoryDump
cacontology-forensics:MemoryForensicTool
cacontology-forensics:MetadataCorrelation
cacontology-forensics:MetadataExtractionAction
cacontology-forensics:MobileForensicTool
cacontology-forensics:NetworkCapture
cacontology-forensics:NetworkForensicTool
cacontology-forensics:NetworkTrafficAnalysis
cacontology-forensics:RealTimeCorrelation
cacontology-forensics:RecoveredFile
cacontology-forensics:ReportingPhase
cacontology-forensics:ScalableHashAnalysis
cacontology-forensics:TemporalPatternAnalysis
cacontology-forensics:TestimonyPhase
cacontology-forensics:TimelineAnalysisAction
cacontology-forensics:UserBehaviorForensics
cacontology-forensics:VictimIdentificationProcess
cacontology-forensics:VictimIdentificationSpecialist
cacontology-forensics:VictimRemovalAction
cacontology-grooming:AcceleratedTrustExploitation
cacontology-grooming:AlcoholFacilitatedGrooming
cacontology-grooming:AnonymousInitiation
cacontology-grooming:AnonymousPlatformContact
cacontology-grooming:BluntRecruitmentGrooming
cacontology-grooming:ChildVictim
cacontology-grooming:CrossInstitutionalGrooming
cacontology-grooming:DirectTraffickingPropositionGrooming
cacontology-grooming:EconomicIncentiveGrooming
cacontology-grooming:EducatorGrooming
cacontology-grooming:EliteInstitutionTargeting
cacontology-grooming:Enticement
cacontology-grooming:EscalationPattern
cacontology-grooming:ExplicitCommercialOfferGrooming
cacontology-grooming:ExploitationPhase
cacontology-grooming:GraphicConversationGrooming
cacontology-grooming:GroomingBehavior
cacontology-grooming:GroomingMessage
cacontology-grooming:GroomingPattern
cacontology-grooming:GroomingPhase
cacontology-grooming:ImmediateExploitationAttempt
cacontology-grooming:ImmediateMonetizationGrooming
cacontology-grooming:ImpairmentBasedGrooming
cacontology-grooming:InappropriateGift
cacontology-grooming:InitialContactPhase
cacontology-grooming:InitiatorContentSending
cacontology-grooming:InterstateTransportPlan
cacontology-grooming:IsolationBasedGrooming
cacontology-grooming:IsolationBehavior
cacontology-grooming:IsolationPhase
cacontology-grooming:LocationSpecificGrooming
cacontology-grooming:MaintenancePhase
cacontology-grooming:ManipulationPattern
cacontology-grooming:MarijuanaFacilitatedGrooming
cacontology-grooming:MultipleAccountGrooming
cacontology-grooming:NormalizationBehavior
cacontology-grooming:NormalizationGrooming
cacontology-grooming:OfflineControlEstablishment
cacontology-grooming:OnlineGrooming
cacontology-grooming:OnlineGroomingSituation
cacontology-grooming:OnlinePredationSituation
cacontology-grooming:OnlinePredator
cacontology-grooming:OnlineToOfflineProgression
cacontology-grooming:OpportunisticGrooming
cacontology-grooming:PeerPersonaGrooming
cacontology-grooming:PhysicalMeetingArrangement
cacontology-grooming:PhysicalSpaceGrooming
cacontology-grooming:PlatformAnonymityFeature
cacontology-grooming:PositionOfTrustGrooming
cacontology-grooming:PreyBehaviorPattern
cacontology-grooming:PrivilegedVictimTargeting
cacontology-grooming:PublicToPrivateGrooming
cacontology-grooming:RapidEscalationGrooming
cacontology-grooming:ReciprocityGrooming
cacontology-grooming:ReputationBasedSilencing
cacontology-grooming:SameDayProgression
cacontology-grooming:SecrecyRequest
cacontology-grooming:SexualConsequenceGameGrooming
cacontology-grooming:SexualContentExchangeGrooming
cacontology-grooming:SexualExploitation
cacontology-grooming:SexualSolicitation
cacontology-grooming:SexualizationPhase
cacontology-grooming:SkippedGroomingPhases
cacontology-grooming:StreetBasedGrooming
cacontology-grooming:SubstanceFacilitatedGrooming
cacontology-grooming:SubstanceInducedVulnerabilityGrooming
cacontology-grooming:TeenageImpersonationGrooming
cacontology-grooming:TravelArrangement
cacontology-grooming:TrustBuildingBehavior
cacontology-grooming:TrustBuildingPhase
cacontology-grooming:TrustThroughAnonymity
cacontology-grooming:UnverifiedUserProfile
cacontology-grooming:VehicleBasedGrooming
cacontology-grooming:VictimComplianceInPhysicalMeeting
cacontology-grooming:VictimResponse
cacontology-grooming:VictimTargeting
cacontology-grooming:VictimVulnerability
cacontology-grooming:VictimVulnerabilitySituation
cacontology-gufo:EvidencePhase
cacontology-gufo:Investigation
cacontology-gufo:LegalProcessPhase
cacontology-impact:AcuteImpactPhase
cacontology-impact:AcuteTrauma
cacontology-impact:BehavioralIndicator
cacontology-impact:ChildExploitationTaskForce
cacontology-impact:ChronicTrauma
cacontology-impact:CognitiveBehavioralTherapy
cacontology-impact:CognitiveIndicator
cacontology-impact:CommunitySupport
cacontology-impact:ComplexTrauma
cacontology-impact:ComprehensiveImpactAssessment
cacontology-impact:CrisisIntervention
cacontology-impact:DevelopmentalImpact
cacontology-impact:EducationalSupport
cacontology-impact:EmergencyHelpSeeking
cacontology-impact:EmergencyResponse
cacontology-impact:EmotionalIndicator
cacontology-impact:FamilyReunification
cacontology-impact:FamilyTherapy
cacontology-impact:FearlessHudsonValleySupport
cacontology-impact:GroupTherapy
cacontology-impact:HelpSeekingBarrier
cacontology-impact:HelpSeekingFacilitator
cacontology-impact:HometownReturn
cacontology-impact:HospitalDischarge
cacontology-impact:HospitalIntervention
cacontology-impact:HumanTraffickingSquad
cacontology-impact:InitialImpactAssessment
cacontology-impact:InterstateVictimServices
cacontology-impact:LegalSupport
cacontology-impact:LongTermEffect
cacontology-impact:LongTermMonitoringPhase
cacontology-impact:MedicalTraumaAssessment
cacontology-impact:MentalHealthProfessional
cacontology-impact:MultiAgencyVictimResponse
cacontology-impact:NineOneOneCall
cacontology-impact:OngoingDangerAssessment
cacontology-impact:OngoingImpactMonitoring
cacontology-impact:PhysicalIndicator
cacontology-impact:PortAuthorityYouthServices
cacontology-impact:PsychologicalHarm
cacontology-impact:RecoveryBarriers
cacontology-impact:RecoveryMilestone
cacontology-impact:RecoveryPhase
cacontology-impact:RecoveryProcess
cacontology-impact:ReintegrationPhase
cacontology-impact:ResilienceFactors
cacontology-impact:SafetyPlanning
cacontology-impact:SocialIndicator
cacontology-impact:SuicidalIdeationResponse
cacontology-impact:TherapeuticIntervention
cacontology-impact:TherapistRole
cacontology-impact:TherapyParticipant
cacontology-impact:TraffickerControlBarrier
cacontology-impact:TraumaIndicator
cacontology-impact:TraumaTherapy
cacontology-impact:TraumatizedVictim
cacontology-impact:VictimAdvocacy
cacontology-impact:VictimAdvocateRole
cacontology-impact:VictimBehavior
cacontology-impact:VictimExtraction
cacontology-impact:VictimImpactAssessment
cacontology-impact:VictimInRecovery
cacontology-impact:VictimReintegration
cacontology-impact:VictimSafetyPlanning
cacontology-impact:VictimSelfReporting
cacontology-impact:VictimServiceCoordination
cacontology-impact:VictimSupport
cacontology-impact:VictimTransportationAssistance
cacontology-infrastructure:AccountFreezing
cacontology-infrastructure:AnalystRole
cacontology-infrastructure:AnonymityInfrastructure
cacontology-infrastructure:ContentDeliveryNetwork
cacontology-infrastructure:CryptocurrencyInfrastructure
cacontology-infrastructure:DataMirrorCreation
cacontology-infrastructure:DatabaseInfrastructure
cacontology-infrastructure:DomainInfrastructure
cacontology-infrastructure:DomainSinkholing
cacontology-infrastructure:EncryptionInfrastructure
cacontology-infrastructure:FinancialFlowAnalysis
cacontology-infrastructure:FinancialObfuscation
cacontology-infrastructure:GeographicDistribution
cacontology-infrastructure:HostingProvider
cacontology-infrastructure:InfrastructureAnalysis
cacontology-infrastructure:InfrastructureCompromiseSituation
cacontology-infrastructure:InfrastructureDecommissionPhase
cacontology-infrastructure:InfrastructureDeploymentPhase
cacontology-infrastructure:InfrastructureDiscoverySituation
cacontology-infrastructure:InfrastructureFailureSituation
cacontology-infrastructure:InfrastructureMaintenancePhase
cacontology-infrastructure:InfrastructureOperationalPhase
cacontology-infrastructure:InfrastructureTakedown
cacontology-infrastructure:LoadBalancer
cacontology-infrastructure:NetworkInfrastructure
cacontology-infrastructure:NetworkTopologyAnalysis
cacontology-infrastructure:PaymentProcessing
cacontology-infrastructure:PlatformInfrastructure
cacontology-infrastructure:ProxyInfrastructure
cacontology-infrastructure:SecurityInfrastructure
cacontology-infrastructure:SecurityOperatorRole
cacontology-infrastructure:ServerInfrastructure
cacontology-infrastructure:ServerSeizure
cacontology-infrastructure:SubscriptionManagement
cacontology-infrastructure:SystemAdministratorRole
cacontology-infrastructure:TakedownOperatorRole
cacontology-infrastructure:UserAccessPatternAnalysis
cacontology-institutional:AbandonedChild
cacontology-institutional:AdultVictimTestimony
cacontology-institutional:CareProviderExploitation
cacontology-institutional:CareProviderRole
cacontology-institutional:CharitableCoverExploitation
cacontology-institutional:CharitableFundingMisuse
cacontology-institutional:CharitableOrganization
cacontology-institutional:CharitableOrganizationLeader
cacontology-institutional:ChildCareInstitution
cacontology-institutional:CrossBorderPersonalTravel
cacontology-institutional:DependencyExploitation
cacontology-institutional:DonorManipulation
cacontology-institutional:FinancialControlMechanism
cacontology-institutional:ForeignCommerceOffense
cacontology-institutional:ForeignCommerceTravel
cacontology-institutional:ForeignPlaceOffense
cacontology-institutional:ForeignResidenceExploitation
cacontology-institutional:FosterCareInstitution
cacontology-institutional:HumanitarianOrganization
cacontology-institutional:HumanitarianTravelCover
cacontology-institutional:ImpoverishedChild
cacontology-institutional:InstitutionalAbuseEvidence
cacontology-institutional:InstitutionalAuthorityExploitation
cacontology-institutional:InstitutionalExploitation
cacontology-institutional:InstitutionalFounder
cacontology-institutional:IsolationBasedControl
cacontology-institutional:LongTermAbusePattern
cacontology-institutional:LongTermInstitutionalControl
cacontology-institutional:MultiModalInstitutionalAbuse
cacontology-institutional:MultiVictimForeignOffense
cacontology-institutional:MultipleVictimTestimony
cacontology-institutional:Orphanage
cacontology-institutional:OrphanageDirector
cacontology-institutional:OrphanageExploitation
cacontology-institutional:OrphanedChild
cacontology-institutional:PositionOfTrustAbuse
cacontology-institutional:ReligiousInstitution
cacontology-institutional:RepeatedCrossBorderTravel
cacontology-institutional:SupportNetworkDeception
cacontology-institutional:SystematicInstitutionalAbuse
cacontology-institutional:TrustedAdultRole
cacontology-institutional:USProsecutionForeignCrimes
cacontology-institutional:VulnerableChildInCare
cacontology-institutional:VulnerablePopulationTargeting
cacontology-institutional:YouthHome
cacontology-international:AutomatedCrossMatching
cacontology-international:CountryPartnership
cacontology-international:CrossBorderDeviceSeizure
cacontology-international:CrossBorderEffectiveness
cacontology-international:CrossBorderForensics
cacontology-international:CrossBorderInvestigation
cacontology-international:CrossBorderOperation
cacontology-international:CrossBorderThreatAlert
cacontology-international:CrossJurisdictionalInvestigation
cacontology-international:CrossReferenceAnalysis
cacontology-international:CrossReferralProtocol
cacontology-international:DataExchangeProtocol
cacontology-international:DistributedIntelligenceProcessing
cacontology-international:EmergencyCoordinationProtocol
cacontology-international:EuropeanCooperationFramework
cacontology-international:EuropolCoordination
cacontology-international:EuropolOperation
cacontology-international:ExtraditionAgreement
cacontology-international:FederatedDatabaseQuery
cacontology-international:GlobalCaseTracking
cacontology-international:GlobalDatabaseNetwork
cacontology-international:GlobalHotlineNetwork
cacontology-international:GlobalInvestigativeTeam
cacontology-international:GlobalMissingChildrenCenter
cacontology-international:GlobalPlatformTakedown
cacontology-international:GlobalReach
cacontology-international:GlobalTakedownCoordination
cacontology-international:InformationSharingAgreement
cacontology-international:InstantAlertSystem
cacontology-international:IntelligenceDataLake
cacontology-international:IntelligenceFusion
cacontology-international:InternationalAlert
cacontology-international:InternationalAnalyst
cacontology-international:InternationalCoordination
cacontology-international:InternationalCoordinator
cacontology-international:InternationalDatabase
cacontology-international:InternationalEvidence
cacontology-international:InternationalEvidenceSharing
cacontology-international:InternationalHotlineCoordination
cacontology-international:InternationalImpact
cacontology-international:InternationalIntelligenceSharing
cacontology-international:InternationalNetworkDisruption
cacontology-international:InternationalPartnership
cacontology-international:InternationalProsecution
cacontology-international:InternationalReferral
cacontology-international:InternationalResourceCoordination
cacontology-international:InternationalTaskForce
cacontology-international:InternationalWarrant
cacontology-international:JurisdictionalCoordination
cacontology-international:LiaisonOfficer
cacontology-international:LiveIntelligenceFeed
cacontology-international:MassUserAnalysis
cacontology-international:MultiCountryTakedown
cacontology-international:MultilingualSupport
cacontology-international:MutualLegalAssistance
cacontology-international:MutualLegalAssistanceTreatyOperation
cacontology-international:OperationalSyncronization
cacontology-international:RealTimeIntelligenceSharing
cacontology-international:RegionalCoordination
cacontology-international:SecureChannel
cacontology-international:SecureCommunicationChannel
cacontology-international:ThreatAssessmentSharing
cacontology-international:USAustraliaCoordination
cacontology-legal:BestPractice
cacontology-legal:CSAMCriminalization
cacontology-legal:CSAMModelLaw
cacontology-legal:CapacityBuilding
cacontology-legal:ChildTraffickingLaw
cacontology-legal:ComplianceBenchmark
cacontology-legal:ComplianceMetrics
cacontology-legal:ExtraditionAgreement
cacontology-legal:GlobalLegalReview
cacontology-legal:HarmonizationProgress
cacontology-legal:InternationalLawEnforcement
cacontology-legal:InternationalStandard
cacontology-legal:JurisdictionalCoordination
cacontology-legal:JurisdictionalVariation
cacontology-legal:LegalCompliance
cacontology-legal:LegalCoverageAssessment
cacontology-legal:LegalEffectiveness
cacontology-legal:LegalFrameworkGap
cacontology-legal:LegalReform
cacontology-legal:LegalSystemCompatibility
cacontology-legal:LegislativeAssessment
cacontology-legal:LegislativeDrafting
cacontology-legal:MandatoryReportingLaw
cacontology-legal:MinimumStandard
cacontology-legal:MutualLegalAssistance
cacontology-legal:NationalLegislation
cacontology-legal:OnlineGroomingLaw
cacontology-legal:PolicyDevelopment
cacontology-legal:PolicyHarmonization
cacontology-legal:RegionalFramework
cacontology-legal:TechnicalAssistance
cacontology-legal:TreatyFramework
cacontology-legal:VictimProtectionLaw
cacontology-multi:AllFBIFieldOfficesOperation
cacontology-multi:AutomatedEvidenceDistribution
cacontology-multi:CEOSCoordinatedOperation
cacontology-multi:ChildRescueCoordination
cacontology-multi:CommunityOutreachTriggeredInvestigation
cacontology-multi:ComplianceMonitoringOperation
cacontology-multi:ComplianceVisitCoordination
cacontology-multi:CoordinatedArrestWave
cacontology-multi:CoordinatedCharging
cacontology-multi:CoordinatingAgent
cacontology-multi:CrossBorderOperation
cacontology-multi:CrossStateEvidence
cacontology-multi:DistributedProsecutionTeam
cacontology-multi:ExtraditionRequest
cacontology-multi:FederalAgency
cacontology-multi:FederalJurisdiction
cacontology-multi:FederalJurisdictionTrigger
cacontology-multi:HandsOnOffenseInvestigation
cacontology-multi:InformationSharing
cacontology-multi:InformationSharingAgreement
cacontology-multi:InformationSynthesisPhase
cacontology-multi:InitialCoordinationPhase
cacontology-multi:InteragencyAgreement
cacontology-multi:InteragencyCooperationSituation
cacontology-multi:InternationalAgency
cacontology-multi:InternationalJurisdiction
cacontology-multi:InternationalLegalHarmonization
cacontology-multi:InternationalProsecutionFramework
cacontology-multi:InterstateCoordination
cacontology-multi:InterstateFlightFromProsecution
cacontology-multi:InterstateTraffickingNetwork
cacontology-multi:InterstateTransportationOffense
cacontology-multi:InterstateVictimTransport
cacontology-multi:JointExecutionPhase
cacontology-multi:JointInvestigation
cacontology-multi:Jurisdiction
cacontology-multi:JurisdictionalConflictSituation
cacontology-multi:JurisdictionalHandoff
cacontology-multi:JurisdictionalNegotiationPhase
cacontology-multi:JurisdictionalWarrant
cacontology-multi:LargeScaleOperation
cacontology-multi:LawEnforcementAgency
cacontology-multi:LeadAgency
cacontology-multi:LiaisonOfficer
cacontology-multi:LocalAgency
cacontology-multi:LocalJurisdiction
cacontology-multi:MassChildRescueOperation
cacontology-multi:MassProsecutionCoordination
cacontology-multi:MassUserJurisdictionMapping
cacontology-multi:MultiJurisdictionalInvestigation
cacontology-multi:MultiJurisdictionalOperation
cacontology-multi:MultiJurisdictionalSituation
cacontology-multi:MultiStateTraffickingInvestigation
cacontology-multi:MutualAidRequest
cacontology-multi:NamedMultiJurisdictionalOperation
cacontology-multi:NationalCoordinatedOperation
cacontology-multi:NationwideChildRescueCoordination
cacontology-multi:NationwideOperation
cacontology-multi:OperationMetricsTracking
cacontology-multi:OperationSafeOnlineSummerType
cacontology-multi:ParticipatingAgency
cacontology-multi:PriorityProsecutionTrack
cacontology-multi:ProactiveInvestigationCampaign
cacontology-multi:ProjectSafeChildhoodOperation
cacontology-multi:ProsecutionCapacityAnalysis
cacontology-multi:RapidResponseCoordination
cacontology-multi:RegistrationComplianceViolation
cacontology-multi:ResourceSharing
cacontology-multi:SchoolPresentationDisclosureWorkflow
cacontology-multi:SexOffenderComplianceCheck
cacontology-multi:SimultaneousChildRescue
cacontology-multi:StateAgency
cacontology-multi:StateJurisdiction
cacontology-multi:StateLineCrossing
cacontology-multi:StatewideSweep
cacontology-multi:TaskForce
cacontology-multi:TaskForceHostedOperation
cacontology-multi:TaskForceLeader
cacontology-multi:TaskForceOperation
cacontology-multi:TraffickingCoordinationCenter
cacontology-multi:TraffickingInvestigationTask
cacontology-multi:TransportationForIllegalPurpose
cacontology-multi:USAttorneyOfficeParticipation
cacontology-multi:UserTriageProsecution
cacontology-multi:VictimIdentificationTask
cacontology-partnerships:AICooperation
cacontology-partnerships:AcademicPartner
cacontology-partnerships:AcademicPartnership
cacontology-partnerships:ActiveCooperationPhase
cacontology-partnerships:CivilSocietyEngagement
cacontology-partnerships:CivilSocietyPartner
cacontology-partnerships:CollaborativeInvestigationSituation
cacontology-partnerships:CommunityAnalysis
cacontology-partnerships:ContentDetectionCooperation
cacontology-partnerships:CoordinationMechanism
cacontology-partnerships:CrowdsourcingInvestigation
cacontology-partnerships:DataSharingAgreement
cacontology-partnerships:EmergencyCoordination
cacontology-partnerships:EvaluationPhase
cacontology-partnerships:GeolocationRequest
cacontology-partnerships:HashSharingProtocol
cacontology-partnerships:InformationSharingFramework
cacontology-partnerships:InformationSharingSituation
cacontology-partnerships:IntelligenceSharing
cacontology-partnerships:JointOperation
cacontology-partnerships:LawEnforcementPartner
cacontology-partnerships:MultiStakeholderInitiative
cacontology-partnerships:NGOCoordination
cacontology-partnerships:NGOPartner
cacontology-partnerships:OSINTInvestigation
cacontology-partnerships:ObjectIdentificationRequest
cacontology-partnerships:PartnerRole
cacontology-partnerships:PartnershipFormationPhase
cacontology-partnerships:PlatformMonitoring
cacontology-partnerships:PublicPrivatePartnership
cacontology-partnerships:PublicTip
cacontology-partnerships:RegularMeeting
cacontology-partnerships:RenewalPhase
cacontology-partnerships:TaskForceCoordination
cacontology-partnerships:TechIndustryCooperation
cacontology-partnerships:TechnicalIntegration
cacontology-partnerships:TechnologyCooperation
cacontology-partnerships:TechnologyPartner
cacontology-partnerships:ToolDevelopment
cacontology-physical:AbuseFacilitationItem
cacontology-physical:ChainOfCustodyBreachSituation
cacontology-physical:ChildTargetedItem
cacontology-physical:CommunicationDevice
cacontology-physical:ComputerEquipment
cacontology-physical:CriminalProcurement
cacontology-physical:DisguiseItem
cacontology-physical:DocumentaryEvidence
cacontology-physical:EvidenceAnalysisPhase
cacontology-physical:EvidenceCollectionPhase
cacontology-physical:EvidenceContaminationSituation
cacontology-physical:EvidenceCustodianRole
cacontology-physical:EvidenceDispositionPhase
cacontology-physical:EvidenceRecoverySituation
cacontology-physical:EvidenceSeizure
cacontology-physical:EvidenceStoragePhase
cacontology-physical:ForensicAnalystRole
cacontology-physical:ItemModification
cacontology-physical:OnlinePurchase
cacontology-physical:PersonalItem
cacontology-physical:PhysicalEvidence
cacontology-physical:PhysicalPurchase
cacontology-physical:PhysicalSearch
cacontology-physical:RecordingEquipment
cacontology-physical:ResidenceSearch
cacontology-physical:RestraintItem
cacontology-physical:SearchOfficerRole
cacontology-physical:StorageMedia
cacontology-physical:VehicleSearch
cacontology-physical:WorkplaceSearch
cacontology-platforms:AccountMetadata
cacontology-platforms:AccountSuspensionAction
cacontology-platforms:AnonymityProtectionLevel
cacontology-platforms:AnonymousChatPlatform
cacontology-platforms:AnonymousContactOpportunity
cacontology-platforms:ContentHashingAction
cacontology-platforms:ContentModerationAction
cacontology-platforms:ContentModerationCapability
cacontology-platforms:CrossPlatformEvidence
cacontology-platforms:CryptocurrencyService
cacontology-platforms:DarkWebService
cacontology-platforms:DataPreservationAction
cacontology-platforms:DataRetentionPolicy
cacontology-platforms:DeviceSocialMediaCorrelation
cacontology-platforms:DigitalEvidenceCorrelation
cacontology-platforms:ElectronicDeviceEvidence
cacontology-platforms:ElectronicServiceProvider
cacontology-platforms:FileHostingService
cacontology-platforms:GamePlatform
cacontology-platforms:GuestChatFeature
cacontology-platforms:IdentityDisclosurePolicy
cacontology-platforms:LargeScalePlatformTakedown
cacontology-platforms:LegalComplianceCapability
cacontology-platforms:LegalDataDisclosureAction
cacontology-platforms:MassUserBehaviorAnalysis
cacontology-platforms:MassUserDatabase
cacontology-platforms:MassivePlatformSituation
cacontology-platforms:MessagingService
cacontology-platforms:MinimalVerificationRequirement
cacontology-platforms:MultiPlatformSituation
cacontology-platforms:OnlineDatingPlatform
cacontology-platforms:OpenChatRooms
cacontology-platforms:PlatformCooperationSituation
cacontology-platforms:PlatformDeploymentPhase
cacontology-platforms:PlatformGrowthPhase
cacontology-platforms:PlatformInvestigationCoordination
cacontology-platforms:PlatformInvestigationPhase
cacontology-platforms:PlatformModerationPhase
cacontology-platforms:PlatformOperation
cacontology-platforms:PlatformTakedownPhase
cacontology-platforms:PrivateMessage
cacontology-platforms:ProfileBrowsingAnonymous
cacontology-platforms:RandomUserMatching
cacontology-platforms:SimultaneousSearchWarrant
cacontology-platforms:SocialMediaAccount
cacontology-platforms:SocialMediaAppData
cacontology-platforms:SocialMediaEvidence
cacontology-platforms:SocialMediaPlatform
cacontology-platforms:SocialMediaPost
cacontology-platforms:StoredSocialMediaContent
cacontology-platforms:TechnicalServiceProvider
cacontology-platforms:TemporaryAccountSystem
cacontology-platforms:UserRiskClassification
cacontology-platforms:UserScaleClassification
cacontology-platforms:UserVerificationSystem
cacontology-platforms:VideoStreamingPlatform
cacontology-prevention:AffiliateCoordination
cacontology-prevention:AffiliateResourceSharing
cacontology-prevention:AgeTargetedEducation
cacontology-prevention:ArchivePublicationSystem
cacontology-prevention:BehavioralPrevention
cacontology-prevention:BullyingPrevention
cacontology-prevention:ChildAbusePreventionMonth
cacontology-prevention:ChildSafetyEducation
cacontology-prevention:CommunityEducation
cacontology-prevention:CommunityEducator
cacontology-prevention:CommunityEmailList
cacontology-prevention:CommunityEngagement
cacontology-prevention:CommunityEngagementMetrics
cacontology-prevention:CommunityNewsletterSystem
cacontology-prevention:CommunityOutreach
cacontology-prevention:CommunityOutreachEffectiveness
cacontology-prevention:CommunityPartnershipInitiative
cacontology-prevention:CourseCompletionTracking
cacontology-prevention:DigitalLiteracy
cacontology-prevention:DigitalSafety
cacontology-prevention:DisclosureBarrierReduction
cacontology-prevention:DisclosureEncouragementStrategy
cacontology-prevention:DiscreetAccessSystem
cacontology-prevention:EducationPlatformIntegration
cacontology-prevention:EducationPortal
cacontology-prevention:EducationalOutreach
cacontology-prevention:EducationalPosterCampaign
cacontology-prevention:EducationalResource
cacontology-prevention:EducatorTraining
cacontology-prevention:EmailListEngagementMetrics
cacontology-prevention:EnvironmentalPrevention
cacontology-prevention:FAQKnowledgeBase
cacontology-prevention:FAQUsageMetrics
cacontology-prevention:HealthcareProviderTraining
cacontology-prevention:ICACAffiliateNetwork
cacontology-prevention:InformationPoster
cacontology-prevention:InteractiveCourseMetrics
cacontology-prevention:InteractiveCourseSystem
cacontology-prevention:MultimediaEducationContent
cacontology-prevention:NationwideAwarenessInitiative
cacontology-prevention:OnlineSafetyEducation
cacontology-prevention:OutreachTriggeredInvestigation
cacontology-prevention:ParentCommunityEmailList
cacontology-prevention:ParentEducation
cacontology-prevention:ParentalControl
cacontology-prevention:ParentalVigilanceProgram
cacontology-prevention:PlatformSafety
cacontology-prevention:PodcastEducationSeries
cacontology-prevention:PodcastEngagementMetrics
cacontology-prevention:PostPresentationDisclosure
cacontology-prevention:PosterDistributionMetrics
cacontology-prevention:PreventionAdvocate
cacontology-prevention:PreventionCampaign
cacontology-prevention:PreventionCurriculum
cacontology-prevention:PreventionEffectiveness
cacontology-prevention:PreventionMaterial
cacontology-prevention:PreventionMetrics
cacontology-prevention:PreventionProgram
cacontology-prevention:PreventionSpecialist
cacontology-prevention:PrimaryPrevention
cacontology-prevention:PublicAwareness
cacontology-prevention:QRCodeEngagementMetrics
cacontology-prevention:QRCodeIntegration
cacontology-prevention:RapidResponseDisclosureWorkflow
cacontology-prevention:RiskAssessmentTool
cacontology-prevention:RiskPrevention
cacontology-prevention:RiskReduction
cacontology-prevention:SafeDisclosureEnvironment
cacontology-prevention:SafetyCoordinator
cacontology-prevention:SafetyEducationEvent
cacontology-prevention:SafetyGuideline
cacontology-prevention:SafetyProtocol
cacontology-prevention:SchoolAllegationProtocol
cacontology-prevention:SchoolCounselorTraining
cacontology-prevention:SchoolDistribution
cacontology-prevention:SchoolPolicy
cacontology-prevention:SchoolPresentationProgram
cacontology-prevention:SchoolSafetyProgram
cacontology-prevention:SecondaryPrevention
cacontology-prevention:SextortionAwareness
cacontology-prevention:SextortionEducation
cacontology-prevention:SextortionResponse
cacontology-prevention:SextortionWarningSign
cacontology-prevention:StatewideCampaignMetrics
cacontology-prevention:StudentEducation
cacontology-prevention:TeacherTraining
cacontology-prevention:TertiaryPrevention
cacontology-prevention:TrustedAdultIdentification
cacontology-prevention:TwelvePlusEducation
cacontology-prevention:VictimDisclosureTriggering
cacontology-production:ActiveProductionPhase
cacontology-production:BathroomSurveillance
cacontology-production:BedroomSurveillance
cacontology-production:ConcealmentContainer
cacontology-production:ContentCreation
cacontology-production:ControlledEnvironment
cacontology-production:DeviceConcealment
cacontology-production:DigitalManipulation
cacontology-production:EditedContent
cacontology-production:EditingEquipment
cacontology-production:ExtendedProductionPeriod
cacontology-production:HiddenRecordingDevice
cacontology-production:LiveProductionEvent
cacontology-production:LiveStreamContent
cacontology-production:MobileRecordingDevice
cacontology-production:PhysicalDeviceModification
cacontology-production:PrivateSpaceSurveillance
cacontology-production:ProducedContent
cacontology-production:ProducedImage
cacontology-production:ProducedVideo
cacontology-production:Producer
cacontology-production:ProductionDistributionPhase
cacontology-production:ProductionEquipment
cacontology-production:ProductionFacilitator
cacontology-production:ProductionLocation
cacontology-production:ProductionOffense
cacontology-production:ProductionPreparationPhase
cacontology-production:ProductionSeries
cacontology-production:ProductionSession
cacontology-production:ProductionVictim
cacontology-production:RecordingAction
cacontology-production:RecordingDevice
cacontology-production:ResidentialProductionSite
cacontology-production:StationaryCamera
cacontology-recruitment:AcademicStruggles
cacontology-recruitment:AfterSchoolRecruitment
cacontology-recruitment:AttendanceProblems
cacontology-recruitment:ClassmateIntroduction
cacontology-recruitment:ClassmateRecruitmentNetwork
cacontology-recruitment:CoercedPeerRecruitment
cacontology-recruitment:EducationalInstitution
cacontology-recruitment:ExtracurricularRecruitment
cacontology-recruitment:FriendshipExploitation
cacontology-recruitment:LunchBreakRecruitment
cacontology-recruitment:MandatoryReportingActivation
cacontology-recruitment:PeerInfluenceRecruitment
cacontology-recruitment:PeerPressureVulnerability
cacontology-recruitment:PeerRecruitmentNetwork
cacontology-recruitment:RecruitmentIncentive
cacontology-recruitment:RecruitmentPunishment
cacontology-recruitment:RecruitmentQuota
cacontology-recruitment:RecruitmentTiming
cacontology-recruitment:SchoolBasedRecruitment
cacontology-recruitment:SchoolBasedReporting
cacontology-recruitment:SchoolCounselor
cacontology-recruitment:SchoolHoursRecruitment
cacontology-recruitment:SchoolPoliceContact
cacontology-recruitment:SchoolSocialWorker
cacontology-recruitment:SchoolStaffMember
cacontology-recruitment:SchoolVulnerabilityFactor
cacontology-recruitment:SocialConnectionLeverage
cacontology-recruitment:SocialIsolationAtSchool
cacontology-recruitment:SocialWorkerReport
cacontology-recruitment:StudentNetworkExploitation
cacontology-recruitment:TeacherReporter
cacontology-recruitment:VictimMediatedRecruitment
cacontology-recruitment:VictimSchoolDisclosure
cacontology-registry:AddressHistory
cacontology-registry:AgeAwareExploitation
cacontology-registry:Alias
cacontology-registry:AnnualRegistrationReview
cacontology-registry:BidirectionalContentExchange
cacontology-registry:CommunityNotification
cacontology-registry:ComplianceBasedArrest
cacontology-registry:ComplianceHistory
cacontology-registry:ComplianceScheduleCoordination
cacontology-registry:ComplianceViolation
cacontology-registry:ContactRestriction
cacontology-registry:ConvictingOffense
cacontology-registry:CourtOrder
cacontology-registry:CrossStateDigitalInvestigation
cacontology-registry:CrossStateRecidivism
cacontology-registry:DigitalRecidivismPattern
cacontology-registry:EducationInformation
cacontology-registry:EmploymentInformation
cacontology-registry:EmploymentRestriction
cacontology-registry:FailureToRegisterOffense
cacontology-registry:FalseInformationRegistrationOffense
cacontology-registry:GeographicRestriction
cacontology-registry:HighVolumeDigitalExploitation
cacontology-registry:IdentifyingMark
cacontology-registry:InternetInformation
cacontology-registry:InternetRestriction
cacontology-registry:InternetServiceProvider
cacontology-registry:MultiModalDigitalEvidence
cacontology-registry:NotificationTier
cacontology-registry:OffenderDeviceSearchWarrant
cacontology-registry:OffenderProfile
cacontology-registry:OffenseClassification
cacontology-registry:OnlineIdentifier
cacontology-registry:PersonalIdentifiers
cacontology-registry:Photograph
cacontology-registry:PhysicalDescription
cacontology-registry:PrimaryResidence
cacontology-registry:ProfessionalLicense
cacontology-registry:PublicWebsite
cacontology-registry:RecidivistSexOffender
cacontology-registry:RegisteredAddress
cacontology-registry:RegisteredSexOffender
cacontology-registry:RegisteredVehicle
cacontology-registry:RegistrationAlert
cacontology-registry:RegistrationRecord
cacontology-registry:RegistrationRequirement
cacontology-registry:RegistrationRestriction
cacontology-registry:RegistrationReviewArrest
cacontology-registry:RegistrationStatus
cacontology-registry:RegistrationUpdate
cacontology-registry:RegistryAgency
cacontology-registry:RegistryOfficer
cacontology-registry:RegistrySystem
cacontology-registry:SchoolLocation
cacontology-registry:SexOffenderRegistry
cacontology-registry:SocialMediaAccount
cacontology-registry:TemporaryAddress
cacontology-registry:VehicleInformation
cacontology-registry:VerificationCheck
cacontology-registry:VictimDeviceForensics
cacontology-registry:VictimInformation
cacontology-registry:WorkLocation
cacontology-sentencing:AppealProcess
cacontology-sentencing:ArraignmentProceeding
cacontology-sentencing:CSAM_AccessingAndViewing
cacontology-sentencing:CSAM_CausingProduction
cacontology-sentencing:CSAM_Distribution
cacontology-sentencing:CSAM_Possession
cacontology-sentencing:CSAM_Production
cacontology-sentencing:CSAM_ReceivingOnCellularDevice
cacontology-sentencing:CarriageServiceCSAMTransmission
cacontology-sentencing:CarriageServiceIndecentCommunication
cacontology-sentencing:CommonwealthChildAbuseOffense
cacontology-sentencing:CommunityService
cacontology-sentencing:CriminalCharge
cacontology-sentencing:CriminalSentence
cacontology-sentencing:DefendantRole
cacontology-sentencing:DefenseAttorneyRole
cacontology-sentencing:FederalCharge
cacontology-sentencing:JudgeRole
cacontology-sentencing:JudicialSystemSituation
cacontology-sentencing:JuryRole
cacontology-sentencing:LegalCaseSituation
cacontology-sentencing:LegalProceeding
cacontology-sentencing:LiveStreamingOffense
cacontology-sentencing:MandatoryMinimumSentencing
cacontology-sentencing:MonetaryPenalty
cacontology-sentencing:OnlineEnticement
cacontology-sentencing:PleaBargaining
cacontology-sentencing:PostConvictionPhase
cacontology-sentencing:PreTrialPhase
cacontology-sentencing:PrisonSentence
cacontology-sentencing:ProbationOfficerRole
cacontology-sentencing:ProbationSentence
cacontology-sentencing:ProsecutorRole
cacontology-sentencing:SentencingHearing
cacontology-sentencing:SentencingPhase
cacontology-sentencing:SexTrafficking
cacontology-sentencing:SextortionCharge
cacontology-sentencing:SolicitingExplicitMaterial
cacontology-sentencing:StateCharge
cacontology-sentencing:SupervisedRelease
cacontology-sentencing:TrialPhase
cacontology-sentencing:TrialProceeding
cacontology-sentencing:VictimRole
cacontology-sextortion:AdditionalContentDemand
cacontology-sextortion:AgeDeceptionSextortion
cacontology-sextortion:AgeDeceptionTactic
cacontology-sextortion:ComplianceResponse
cacontology-sextortion:ContactListThreat
cacontology-sextortion:ConversationReconstruction
cacontology-sextortion:DemandMessage
cacontology-sextortion:DeviceForensicAnalysis
cacontology-sextortion:DisappearingMessageFeature
cacontology-sextortion:EmotionalManipulation
cacontology-sextortion:ExtortionDemand
cacontology-sextortion:ExtortionPhase
cacontology-sextortion:FalseProfileCreation
cacontology-sextortion:GiftCardDemand
cacontology-sextortion:IdentityImpersonation
cacontology-sextortion:ImageAcquisitionPhase
cacontology-sextortion:ImageSharingFeature
cacontology-sextortion:ImageSolicitationMessage
cacontology-sextortion:InitialDeceptionPhase
cacontology-sextortion:InstantMessagingPlatform
cacontology-sextortion:InstantMessagingSextortion
cacontology-sextortion:ManipulationTactic
cacontology-sextortion:MonetaryDemand
cacontology-sextortion:PeerImpersonation
cacontology-sextortion:PersonalMeetingDemand
cacontology-sextortion:PrivateMessagingFeature
cacontology-sextortion:ProgressiveEscalation
cacontology-sextortion:RefusalResponse
cacontology-sextortion:ReportingResponse
cacontology-sextortion:ScreenshotThreat
cacontology-sextortion:SextortionCommunication
cacontology-sextortion:SextortionIncident
cacontology-sextortion:SextortionInvestigation
cacontology-sextortion:SextortionProgression
cacontology-sextortion:SexualSolicitationPhase
cacontology-sextortion:SexuallyExplicitConversation
cacontology-sextortion:SharingThreat
cacontology-sextortion:SilentVictimization
cacontology-sextortion:SocialMediaSextortion
cacontology-sextortion:SocialMediaSharingThreat
cacontology-sextortion:ThreatMechanism
cacontology-sextortion:ThreatMessage
cacontology-sextortion:TrustBuildingPhase
cacontology-sextortion:VictimIdentification
cacontology-sextortion:VictimIsolation
cacontology-sextortion:VictimResponse
cacontology-specialized:AnalystRole
cacontology-specialized:CollegeParkBarrack
cacontology-specialized:CommunityEngagementK9
cacontology-specialized:CoordinatedArrest
cacontology-specialized:CountyPoliceSupport
cacontology-specialized:CriticalIncidentDebriefing
cacontology-specialized:CyberCrimeUnit
cacontology-specialized:DetectionDog
cacontology-specialized:DeviceDetection
cacontology-specialized:DigitalForensicsUnit
cacontology-specialized:ElectronicStorageDeviceK9
cacontology-specialized:InteragencyOperationSituation
cacontology-specialized:K9DetectionProgram
cacontology-specialized:K9Officer
cacontology-specialized:K9SearchOperation
cacontology-specialized:K9TrainingProgram
cacontology-specialized:MarylandStatePoliceComputerCrimesUnit
cacontology-specialized:MentalHealthSupport
cacontology-specialized:MultiJurisdictionalOperation
cacontology-specialized:MultiUnitCoordinationSituation
cacontology-specialized:NamedOperation
cacontology-specialized:OfficerWellnessProgram
cacontology-specialized:OperationEvaluationPhase
cacontology-specialized:OperationExecutionPhase
cacontology-specialized:OperationMetrics
cacontology-specialized:OperationPlanningPhase
cacontology-specialized:OperationSafeOnlineSummer
cacontology-specialized:OperationUnhinged
cacontology-specialized:PeerSupport
cacontology-specialized:PrinceGeorgesCountyPolice
cacontology-specialized:SpecializedCapabilitySituation
cacontology-specialized:SpecializedInvestigativeUnit
cacontology-specialized:SpecializedOperatorRole
cacontology-specialized:StatePoliceBarrack
cacontology-specialized:StatePoliceComputerCrimesUnit
cacontology-specialized:StressManagement
cacontology-specialized:TacticalUnit
cacontology-specialized:TechnicalSpecialistRole
cacontology-specialized:TherapyDog
cacontology-specialized:UndercoverUnit
cacontology-specialized:UnitCommanderRole
cacontology-specialized:UnitDeploymentPhase
cacontology-specialized:UnitMaintenancePhase
cacontology-specialized:UnitTrainingPhase
cacontology-specialized:VictimServicesUnit
cacontology-specialized:WellnessCheck
cacontology-strategy:AIGenerationPattern
cacontology-strategy:CapabilityPattern
cacontology-strategy:CompliancePattern
cacontology-strategy:CoordinationSituationPattern
cacontology-strategy:CriminalOrganizationPattern
cacontology-strategy:CrossBorderPattern
cacontology-strategy:EducationalPattern
cacontology-strategy:EvidenceObjectPattern
cacontology-strategy:ForensicsLifecyclePattern
cacontology-strategy:HighPriorityModule
cacontology-strategy:IdeologyPattern
cacontology-strategy:InstitutionalRolePattern
cacontology-strategy:JudicialPhasePattern
cacontology-strategy:LegalEventPattern
cacontology-strategy:LowPriorityModule
cacontology-strategy:MediumPriorityModule
cacontology-strategy:ModuleIntegrationStrategy
cacontology-strategy:OntologicalConsistency
cacontology-strategy:OrganizationalPattern
cacontology-strategy:Phase3Wave1
cacontology-strategy:Phase3Wave2
cacontology-strategy:Phase3Wave3
cacontology-strategy:PhaseConsistency
cacontology-strategy:PreventiveActionPattern
cacontology-strategy:RegistrationPattern
cacontology-strategy:RoleConsistency
cacontology-strategy:SpecializedRolePattern
cacontology-strategy:SyntheticArtifactPattern
cacontology-strategy:TaskforceRolePattern
cacontology-strategy:TemporalConsistency
cacontology-strategy:TotalPhase3Implementation
cacontology-strategy:TreatyPattern
cacontology-strategy:ValidationStrategy
cacontology-street:AgeVulnerabilityIndicator
cacontology-street:AlcoholFacilitation
cacontology-street:BehavioralVulnerabilityIndicator
cacontology-street:BodySellingProposition
cacontology-street:CasualConversationApproach
cacontology-street:CommercialDistrict
cacontology-street:DelayedReporting
cacontology-street:DemographicTargeting
cacontology-street:DigitalFollowUp
cacontology-street:DigitalToPhysicalBridge
cacontology-street:DirectSolicitationApproach
cacontology-street:DirectTraffickingProposition
cacontology-street:DisclosureToAuthorities
cacontology-street:DrugFacilitatedVulnerability
cacontology-street:EconomicIncentivePresentation
cacontology-street:EscapeAttempt
cacontology-street:ExplicitCommercialOffer
cacontology-street:FoodOfferApproach
cacontology-street:HelpOfferApproach
cacontology-street:HelpSeekingBehavior
cacontology-street:HighTrafficArea
cacontology-street:HighwayLocation
cacontology-street:ImmediateExploitationAttempt
cacontology-street:ImmediateIsolation
cacontology-street:ImmediateReporting
cacontology-street:ImpairmentExploitation
cacontology-street:InitialStreetContact
cacontology-street:IsolatedLocation
cacontology-street:IsolationVulnerabilityIndicator
cacontology-street:LocationTransition
cacontology-street:MarijuanaFacilitation
cacontology-street:NeighborhoodTargeting
cacontology-street:NextDayFollowUp
cacontology-street:OpportunisticExploitation
cacontology-street:PersistenceAfterRejection
cacontology-street:PhoneChargingOffer
cacontology-street:PhysicalVulnerabilityIndicator
cacontology-street:PostContactReinforcement
cacontology-street:PretextBasedApproach
cacontology-street:ProstitutionProposition
cacontology-street:PublicSpaceTargeting
cacontology-street:RapidEscalationRecruitment
cacontology-street:ResidentialArea
cacontology-street:SameDayProgression
cacontology-street:SecondaryLocationExploitation
cacontology-street:SocioeconomicVulnerabilityIndicator
cacontology-street:StreetBasedRecruitment
cacontology-street:StreetRecruitmentLocation
cacontology-street:StreetVulnerabilityAssessment
cacontology-street:StrippingProposition
cacontology-street:SubstanceBasedControl
cacontology-street:SubstanceFacilitatedRecruitment
cacontology-street:TextMessageFollowUp
cacontology-street:TraffickingPropositionReinforcement
cacontology-street:TraffickingPropositionRejection
cacontology-street:TransitArea
cacontology-street:TransportationOfferApproach
cacontology-street:VehicleBasedIsolation
cacontology-street:VehicleLocation
cacontology-street:VictimReporting
cacontology-street:VictimResistance
cacontology-street:VictimStreetResponse
cacontology-street:VulnerabilityIndicator
cacontology-street:VulnerableNeighborhood
cacontology-tactical:BarricadeSituation
cacontology-tactical:Breacher
cacontology-tactical:BreachingTool
cacontology-tactical:CommunicationEquipment
cacontology-tactical:DynamicEntry
cacontology-tactical:HighRiskArrest
cacontology-tactical:LessLethalWeapon
cacontology-tactical:LocationIntelligence
cacontology-tactical:Marksman
cacontology-tactical:Negotiator
cacontology-tactical:ProtectiveGear
cacontology-tactical:SWATOperation
cacontology-tactical:SurrenderNegotiation
cacontology-tactical:SurveillanceEquipment
cacontology-tactical:SuspectProfile
cacontology-tactical:TacticalCommander
cacontology-tactical:TacticalEquipment
cacontology-tactical:TacticalOperation
cacontology-tactical:TacticalTeamMember
cacontology-tactical:TeamLeader
cacontology-tactical:ThreatAssessment
cacontology-taskforce:AnalyticsUnit
cacontology-taskforce:AnnualPerformance
cacontology-taskforce:ArrestMetrics
cacontology-taskforce:AssessmentPhase
cacontology-taskforce:AttorneyGeneralHost
cacontology-taskforce:CaliforniaRegionalSystem
cacontology-taskforce:CertificationProgram
cacontology-taskforce:CoordinationMechanism
cacontology-taskforce:CoordinationPhase
cacontology-taskforce:CountyBasedTaskForce
cacontology-taskforce:CyberTipMetrics
cacontology-taskforce:DeploymentPhase
cacontology-taskforce:DigitalForensicsUnit
cacontology-taskforce:DistrictAttorneyHost
cacontology-taskforce:EquipmentSharing
cacontology-taskforce:ExecutionPhase
cacontology-taskforce:ExpertiseSharing
cacontology-taskforce:FederalICACtaskForce
cacontology-taskforce:FederalLawEnforcementPartner
cacontology-taskforce:FloridaRegionalSystem
cacontology-taskforce:GovernorsOfficeCrimePreventionFunding
cacontology-taskforce:HistoricalMetrics
cacontology-taskforce:ICACtaskForce
cacontology-taskforce:IllinoisICACtaskForce
cacontology-taskforce:IntelligenceSharing
cacontology-taskforce:InterAgencyCoordination
cacontology-taskforce:JointOperation
cacontology-taskforce:LocalICACtaskForce
cacontology-taskforce:LocalLawEnforcementPartner
cacontology-taskforce:LocalPoliceHost
cacontology-taskforce:MarylandICACtaskForce
cacontology-taskforce:MetropolitanTaskForce
cacontology-taskforce:MilitaryICACtaskForce
cacontology-taskforce:MultiRegionalState
cacontology-taskforce:NationalHotline
cacontology-taskforce:NationalICACtaskForceDirectory
cacontology-taskforce:NetworkPerformance
cacontology-taskforce:NewYorkRegionalSystem
cacontology-taskforce:PersonnelSharing
cacontology-taskforce:PlanningPhase
cacontology-taskforce:ProactiveOperation
cacontology-taskforce:ReactiveOperation
cacontology-taskforce:RegionalCoordination
cacontology-taskforce:RegionalTaskForce
cacontology-taskforce:RegionalTaskForceCoordination
cacontology-taskforce:ResourceSharing
cacontology-taskforce:SheriffOfficeHost
cacontology-taskforce:SpecializedUnit
cacontology-taskforce:StateAgencyHost
cacontology-taskforce:StateBureauHost
cacontology-taskforce:StateICACtaskForce
cacontology-taskforce:StateLocalFundingCombination
cacontology-taskforce:StatePoliceHost
cacontology-taskforce:StatewideTaskForce
cacontology-taskforce:SweepOperation
cacontology-taskforce:TacticalUnit
cacontology-taskforce:TaskForceAlliance
cacontology-taskforce:TaskForceAnalyst
cacontology-taskforce:TaskForceCommander
cacontology-taskforce:TaskForceContactInformation
cacontology-taskforce:TaskForceCoordinator
cacontology-taskforce:TaskForceForensicExaminer
cacontology-taskforce:TaskForceHostOrganization
cacontology-taskforce:TaskForceHotline
cacontology-taskforce:TaskForceInvestigator
cacontology-taskforce:TaskForceMember
cacontology-taskforce:TaskForceMetrics
cacontology-taskforce:TaskForceOperation
cacontology-taskforce:TaskForceTraining
cacontology-taskforce:TaskForceWebsite
cacontology-taskforce:TexasRegionalSystem
cacontology-taskforce:TrainingReachMetrics
cacontology-taskforce:TrainingUnit
cacontology-taskforce:UndercoverUnit
cacontology-taskforce:VictimServiceUnit
cacontology-temporal:Age
cacontology-temporal:AgeAtTimeSituation
cacontology-temporal:AnalysisTransitionEvent
cacontology-temporal:ClosureEvent
cacontology-temporal:ConcurrentInvestigationSituation
cacontology-temporal:EventSequence
cacontology-temporal:EvidenceTransitionEvent
cacontology-temporal:InitiationEvent
cacontology-temporal:InvestigationLifecycle
cacontology-temporal:LegalProcessTransitionEvent
cacontology-temporal:MultiJurisdictionCoordinationSituation
cacontology-temporal:ParallelEventCluster
cacontology-temporal:ParallelEvidenceCollectionSituation
cacontology-temporal:PhaseTransitionEvent
cacontology-temporal:ResolutionTransitionEvent
cacontology-temporal:ResumptionEvent
cacontology-temporal:RoleConflictSituation
cacontology-temporal:RoleEscalation
cacontology-temporal:RoleReassignment
cacontology-temporal:RoleTransition
cacontology-temporal:SimultaneousRoleSituation
cacontology-temporal:SuspendedSituation
cacontology-temporal:SuspensionEvent
cacontology-temporal:UrgentRescueLifecycle
cacontology-trafficking:AdultTraffickingVictimRole
cacontology-trafficking:AgingOutVictimProfile
cacontology-trafficking:AssociateTraffickerRole
cacontology-trafficking:CommercialSexualExploitation
cacontology-trafficking:CrossJurisdictionalControl
cacontology-trafficking:DisruptionPhase
cacontology-trafficking:EarningsCollection
cacontology-trafficking:EstablishmentPhase
cacontology-trafficking:ExpansionPhase
cacontology-trafficking:FinancialFacilitatorRole
cacontology-trafficking:InterstateVictimTransport
cacontology-trafficking:MinorTraffickingVictimRole
cacontology-trafficking:MultiJurisdictionalSituation
cacontology-trafficking:MultiStateTraffickingConspiracy
cacontology-trafficking:OngoingDangerResponse
cacontology-trafficking:OperationalPhase
cacontology-trafficking:PrimaryTraffickerRole
cacontology-trafficking:RecruitmentFacilitatorRole
cacontology-trafficking:RunawayVictimProfile
cacontology-trafficking:TraffickerRole
cacontology-trafficking:TraffickingCell
cacontology-trafficking:TraffickingEnterprise
cacontology-trafficking:TraffickingHierarchy
cacontology-trafficking:TraffickingNetworkSituation
cacontology-trafficking:TraffickingOperation
cacontology-trafficking:TraffickingRing
cacontology-trafficking:TraffickingVictimRescue
cacontology-trafficking:TraffickingVictimRole
cacontology-trafficking:TransportationFacilitatorRole
cacontology-trafficking:VictimControl
cacontology-trafficking:VictimControlSituation
cacontology-trafficking:VictimEmergencyResponse
cacontology-trafficking:VictimRecruitment
cacontology-trafficking:VictimRotation
cacontology-trafficking:VictimSafetyAssessment
cacontology-trafficking:VictimTransportation
cacontology-trafficking:VictimVulnerabilityProfile
cacontology-training:AssessmentPhase
cacontology-training:CapacityBuildingPartner
cacontology-training:CapacityBuildingProgram
cacontology-training:CapacityBuildingSituation
cacontology-training:CertificationBody
cacontology-training:CertificationPhase
cacontology-training:CertifiedProfessional
cacontology-training:ChildProtectionTraining
cacontology-training:CompetencyAssessment
cacontology-training:ContentDevelopmentPhase
cacontology-training:ContinuingEducation
cacontology-training:CriminalJusticeTraining
cacontology-training:DigitalForensicsTraining
cacontology-training:GlobalTrainingReach
cacontology-training:GlobalTrainingSituation
cacontology-training:HotlineTraining
cacontology-training:HybridTraining
cacontology-training:InPersonTraining
cacontology-training:InternationalTrainer
cacontology-training:InternationalTraining
cacontology-training:InvestigationTraining
cacontology-training:K9ProgramMetrics
cacontology-training:LegalTraining
cacontology-training:MentorshipProgram
cacontology-training:MultiStakeholderTrainingSituation
cacontology-training:OnlineTraining
cacontology-training:OperationalTrainingMetrics
cacontology-training:OutreachEventMetrics
cacontology-training:ProfessionalCertification
cacontology-training:ProfessionalDevelopment
cacontology-training:ProfessionalTrainingMetrics
cacontology-training:ProgramPlanningPhase
cacontology-training:SkillsDevelopmentProgram
cacontology-training:SkillsValidation
cacontology-training:SubjectMatterExpert
cacontology-training:TrainingCertificate
cacontology-training:TrainingCoordinator
cacontology-training:TrainingCurriculum
cacontology-training:TrainingDeliveryPhase
cacontology-training:TrainingEffectiveness
cacontology-training:TrainingInstitution
cacontology-training:TrainingMetrics
cacontology-training:TrainingModule
cacontology-training:TrainingParticipant
cacontology-training:VictimServiceTraining
cacontology-undercover:AdvertisementPhotographyEvidence
cacontology-undercover:ApartmentStingOperation
cacontology-undercover:BathroomViolationEvidence
cacontology-undercover:ChatInvestigationAgent
cacontology-undercover:ChatRoomInfiltration
cacontology-undercover:ChildPersona
cacontology-undercover:ClientCommunicationInterception
cacontology-undercover:ClientResponseInterception
cacontology-undercover:ControlledMeeting
cacontology-undercover:CriminalSolicitation
cacontology-undercover:EvidenceGatheringPhase
cacontology-undercover:ExtractionPhase
cacontology-undercover:InPersonMeetingSolicitation
cacontology-undercover:IncriminatingStatement
cacontology-undercover:InfiltrationPhase
cacontology-undercover:LiveAdvertisementMonitoring
cacontology-undercover:MinorPersonaAgent
cacontology-undercover:MinorPersonaOperation
cacontology-undercover:MultiPlatformUndercoverOperation
cacontology-undercover:OnlinePlatformSurveillance
cacontology-undercover:OperationHandler
cacontology-undercover:OperationalEvidence
cacontology-undercover:ParentPersona
cacontology-undercover:PhoneInstructionMonitoring
cacontology-undercover:PhysicalLocationSting
cacontology-undercover:PlatformAccount
cacontology-undercover:PredatorTargetingOperation
cacontology-undercover:PreparationPhase
cacontology-undercover:PrivacyViolationInvestigation
cacontology-undercover:ResidentialStingLocation
cacontology-undercover:SocialMediaAgent
cacontology-undercover:SocialMediaUndercoverOperation
cacontology-undercover:StingOperation
cacontology-undercover:SurveillancePosition
cacontology-undercover:TechnicalSupport
cacontology-undercover:UndercoverAgent
cacontology-undercover:UndercoverChatInvestigation
cacontology-undercover:UndercoverCommunication
cacontology-undercover:UndercoverEvidence
cacontology-undercover:UndercoverIdentity
cacontology-undercover:UndercoverOperation
cacontology-undercover:VictimInstructionEvidence
cacontology-undercover:WebsiteAdvertisementResponse
cacontology-us-ncmec:AccountLinking
cacontology-us-ncmec:CSAMSolicitationAnnotation
cacontology-us-ncmec:ChildSexTourismIncident
cacontology-us-ncmec:ChildSexTraffickingIncident
cacontology-us-ncmec:ContentIdentification
cacontology-us-ncmec:CyberTipAnalysis
cacontology-us-ncmec:FederalReferral
cacontology-us-ncmec:InvestigationTrigger
cacontology-us-ncmec:LocalLawEnforcementReferral
cacontology-us-ncmec:MinorToMinorInteractionAnnotation
cacontology-us-ncmec:NCMECCybertipReport
cacontology-us-ncmec:NCMECIncidentType
cacontology-us-ncmec:NCMECReportAnnotation
cacontology-us-ncmec:OnlineEnticementIncident
cacontology-us-ncmec:PhoneNumberTrace
cacontology-us-ncmec:PlatformCooperation
cacontology-us-ncmec:PossessionIndicator
cacontology-us-ncmec:SextortionAnnotation
cacontology-us-ncmec:SpamAnnotation
cacontology-us-ncmec:TaskForceReferral
cacontology-us-ncmec:TipEnrichment
cacontology-us-ncmec:TipPrioritization
cacontology-us-ncmec:TipProcessing
cacontology-us-ncmec:TipValidation
cacontology-us-ncmec:TransferDetection
cacontology-usa-federal:AbusiveContactWithMinor
cacontology-usa-federal:AggravatedSexualAbuse
cacontology-usa-federal:CEOSAttorneyRole
cacontology-usa-federal:CEOSdivision
cacontology-usa-federal:ChildPornographyDistribution
cacontology-usa-federal:ChildPornographyPossession
cacontology-usa-federal:ChildPornographyProduction
cacontology-usa-federal:ChildPornographyReceipt
cacontology-usa-federal:ChildSupportEnforcementLaw
cacontology-usa-federal:ChildSupportEvasion
cacontology-usa-federal:ChildSupportExploitationLink
cacontology-usa-federal:CommercialSexualExploitation
cacontology-usa-federal:ExtraterritorialProduction
cacontology-usa-federal:ExtraterritorialSexualExploitationLaw
cacontology-usa-federal:FederalChildExploitationLaw
cacontology-usa-federal:FederalChildPornographyLaw
cacontology-usa-federal:FederalChildSexTraffickingLaw
cacontology-usa-federal:FederalChildSexualAbuseLaw
cacontology-usa-federal:FederalDefendantRole
cacontology-usa-federal:FederalInvestigation
cacontology-usa-federal:FederalInvestigatorRole
cacontology-usa-federal:FederalObscenityLaw
cacontology-usa-federal:FederalProsecution
cacontology-usa-federal:FederalProsecutorRole
cacontology-usa-federal:FederalVictimRole
cacontology-usa-federal:FinancialControlPattern
cacontology-usa-federal:ForeignCommerceExploitation
cacontology-usa-federal:ObscenityDistribution
cacontology-usa-federal:ObscenityImportation
cacontology-usa-federal:ObscenityTransportation
cacontology-usa-federal:OnlineObscenityDistribution
cacontology-usa-federal:PostConvictionPhase
cacontology-usa-federal:PreTrialPhase
cacontology-usa-federal:SentencingPhase
cacontology-usa-federal:SexTourism
cacontology-usa-federal:SexTraffickingConspiracy
cacontology-usa-federal:SexTraffickingOfMinors
cacontology-usa-federal:SexualAbuseOfMinor
cacontology-usa-federal:TransportationForSexualExploitation
cacontology-usa-federal:TrialPhase
cacontology1:AnalysisPhase
cacontology1:AnalystRole
cacontology1:CACInvestigation
cacontology1:CSAMCurationAction
cacontology1:CSAMIncident
cacontology1:ChildSexualAbuseEvent
cacontology1:ChildSexualExploitation
cacontology1:ChildSexualExploitationCharge
cacontology1:ConclusionPhase
cacontology1:ConspiracyLeaderRole
cacontology1:ConspiracyMemberRole
cacontology1:ConspiracyRole
cacontology1:ConspiracyToCommitCSA
cacontology1:CoordinatedOffensePattern
cacontology1:CriminalEnterprise
cacontology1:DigitallyGeneratedCSAMIncident
cacontology1:EvidencePhase
cacontology1:EvidenceReviewAction
cacontology1:GroomingSolicitation
cacontology1:InitialPhase
cacontology1:Investigation
cacontology1:InvestigationLifecycleSituation
cacontology1:InvestigatorRole
cacontology1:LegalProcessAction
cacontology1:LegalProcessPhase
cacontology1:LiveStreamingCSA
cacontology1:MultiDefendantIndictment
cacontology1:OffenderRole
cacontology1:ReceiveCybertipAction
cacontology1:RescuerRole
cacontology1:ReviewCybertipAction
cacontology1:Sextortion
cacontology1:UnknownVictimSubmission
cacontology1:VictimPhase
cacontology1:VictimRescueAction
cacontology1:VictimRole
cacontology2:Investigation
case-investigation:Investigation
gufo:AbstractArtifact
gufo:Action
gufo:Artifact
gufo:Event
gufo:FunctionalComplex
gufo:IntrinsicMode
gufo:IntrinsicMoment
gufo:Norm
gufo:Object
gufo:Organization
gufo:ParticipationSituation
gufo:Phase
gufo:Plan
gufo:Process
gufo:Quality
gufo:QualityValueAttributionSituation
gufo:Relator
gufo:Role
gufo:Situation
gufo:TemporaryParthoodSituation
hotline:ActionPhase
hotline:AutomatedReporterAgent
hotline:ClosurePhase
hotline:ESPReport
hotline:EvidenceItem
hotline:ForensicsSpecialistRole
hotline:ForwardToLEAction
hotline:HashFeedbackAction
hotline:HashSubmissionAction
hotline:HotlineAction
hotline:HotlineAnalystRole
hotline:HotlineOrganization
hotline:HotlineReport
hotline:ImageEvidence
hotline:IntakeChannel
hotline:IntakePhase
hotline:InternationalCoordination
hotline:LiaisonRole
hotline:MultiAgencyCoordination
hotline:PublicReport
hotline:ReportReviewAction
hotline:ReporterRole
hotline:ReviewPhase
hotline:TakedownRequestAction
hotline:URLReference
hotline:VideoEvidence
skos:Concept
uco-action:Action
uco-action:Crime
uco-channel:DigitalService
uco-core:Observable
uco-core:Relationship
uco-core:Role
uco-core:UcoObject
uco-identity:Identity
uco-identity:Organization
uco-identity:Person
uco-identity:Role
uco-identity:Software
uco-location:Location
uco-observable:Account
uco-observable:DigitalAccount
uco-observable:DigitalArtifact
uco-observable:DigitalDevice
uco-observable:DigitalService
uco-observable:DigitalServiceFeature
uco-observable:File
uco-observable:Hash
uco-observable:Image
uco-observable:Message
uco-observable:MessageThread
uco-observable:ObservableObject
uco-observable:Observation
uco-observable:PhoneCall
uco-observable:PhoneNumber
uco-observable:URL
uco-observable:WebPage
uco-pattern:Pattern
uco-role:OffenderRole
uco-role:Role
uco-role:SubjectRole
uco-role:VictimRole
uco-tool:AnalyticTool
uco-tool:Tool
uco-types:Hash
Concepts (21)
cacontology-detection:copine-1
cacontology-detection:copine-10
cacontology-detection:copine-4
cacontology-detection:copine-7
cacontology-detection:copine-8
cacontology-detection:sar-1
cacontology-detection:sar-2
cacontology-detection:sar-3
cacontology-detection:sar-4
cacontology-detection:sar-5
hotline:classification-confirmed
hotline:classification-false-positive
hotline:classification-legal-concern
hotline:classification-other
hotline:classification-uncertain
hotline:status-closed
hotline:status-forwarded
hotline:status-in-progress
hotline:status-in-review
hotline:status-new
hotline:status-reopened
Properties (2214)
cacontology-abduction:abductionDuration
cacontology-abduction:abductionLocation
cacontology-abduction:accessDifficulty
cacontology-abduction:approachMethod
cacontology-abduction:complianceReason
cacontology-abduction:concealmentLevel
cacontology-abduction:concealsIdentityWith
cacontology-abduction:disclosesTo
cacontology-abduction:disclosureMethod
cacontology-abduction:disguiseEffectiveness
cacontology-abduction:disguiseType
cacontology-abduction:documentsAbduction
cacontology-abduction:employsCoercion
cacontology-abduction:entryMethod
cacontology-abduction:escalatesTo
cacontology-abduction:escapeRoutes
cacontology-abduction:evidenceRecoveryRate
cacontology-abduction:exercisesControl
cacontology-abduction:exhibitsVulnerability
cacontology-abduction:exploitsVulnerability
cacontology-abduction:facilitatesExploitation
cacontology-abduction:forcesEntryTo
cacontology-abduction:investigatesAbduction
cacontology-abduction:investigationDuration
cacontology-abduction:isolatesAt
cacontology-abduction:locationIsolationLevel
cacontology-abduction:occursAt
cacontology-abduction:opportunityWindow
cacontology-abduction:perpetratesAbduction
cacontology-abduction:recoveredFrom
cacontology-abduction:reportingDelay
cacontology-abduction:reportsAbduction
cacontology-abduction:resistanceLevel
cacontology-abduction:resistsAbduction
cacontology-abduction:respondsTo
cacontology-abduction:supportsCharge
cacontology-abduction:surveillanceDuration
cacontology-abduction:targetingCriteria
cacontology-abduction:targetsVictim
cacontology-abduction:threatEffectiveness
cacontology-abduction:threatSpecificity
cacontology-abduction:threatensWith
cacontology-abduction:timeOfDay
cacontology-abduction:transitionsTo
cacontology-abduction:triggersInvestigation
cacontology-abduction:usesDisguise
cacontology-abduction:usesWeapon
cacontology-abduction:victimActivity
cacontology-abduction:victimsOf
cacontology-abduction:weaponDisplayed
cacontology-abduction:weaponType
cacontology-abduction:witnessCount
cacontology-ai:aiModelUsed
cacontology-ai:analyzesTrainingData
cacontology-ai:artifactsDetected
cacontology-ai:artificialnessLevel
cacontology-ai:basedOnModel
cacontology-ai:challengesLegalFramework
cacontology-ai:complicatesVictimIdentification
cacontology-ai:detectedBy
cacontology-ai:detectionConfidence
cacontology-ai:detectionMethod
cacontology-ai:evidenceAdmissibility
cacontology-ai:falsePositiveRate
cacontology-ai:generatedUsing
cacontology-ai:generationComplexity
cacontology-ai:generationTechnique
cacontology-ai:investigationChallengeLevel
cacontology-ai:legalFrameworkChallenges
cacontology-ai:processingTime
cacontology-ai:prosecutionDifficulty
cacontology-ai:realVictimDepicted
cacontology-ai:renderingQuality
cacontology-ai:requiresSpecializedProsecution
cacontology-ai:revealsArtifacts
cacontology-ai:sourceTraceability
cacontology-ai:subjectOfInvestigation
cacontology-ai:technicalExpertiseRequired
cacontology-ai:tracesToSource
cacontology-ai:usesDetectionTool
cacontology-ai:utilizesTool
cacontology-ai:victimIdentificationDifficulty
cacontology-asset-forfeiture:accountFunds
cacontology-asset-forfeiture:assignedRole
cacontology-asset-forfeiture:courtJurisdiction
cacontology-asset-forfeiture:currentPhase
cacontology-asset-forfeiture:equipmentType
cacontology-asset-forfeiture:estimatedValue
cacontology-asset-forfeiture:financialPenaltyAmount
cacontology-asset-forfeiture:forfeitureDate
cacontology-asset-forfeiture:forfeiturePercentage
cacontology-asset-forfeiture:hasPhaseTransition
cacontology-asset-forfeiture:involvesCoordination
cacontology-asset-forfeiture:involvesTaskforce
cacontology-asset-forfeiture:itemCount
cacontology-asset-forfeiture:marketValue
cacontology-asset-forfeiture:playsRole
cacontology-asset-forfeiture:precedentSetting
cacontology-asset-forfeiture:relatedCriminalCharges
cacontology-asset-forfeiture:restraintDate
cacontology-asset-forfeiture:targetedAsset
cacontology-athletic:coachesTeam
cacontology-athletic:coachingExperience
cacontology-athletic:currentPhase
cacontology-athletic:hasPhaseTransition
cacontology-athletic:holdsCoachingRole
cacontology-athletic:multipleRoles
cacontology-athletic:occursInFacility
cacontology-athletic:participatesInSituation
cacontology-athletic:playsOnTeam
cacontology-athletic:practiceFrequency
cacontology-athletic:sportType
cacontology-athletic:teamType
cacontology-athletic:utilizesAthleticSpace
cacontology-case:accessLevel
cacontology-case:appealStatus
cacontology-case:approvedBy
cacontology-case:archivalDate
cacontology-case:archivedAt
cacontology-case:assignedBy
cacontology-case:assignedInvestigator
cacontology-case:assignedTo
cacontology-case:assignedToRole
cacontology-case:assignmentDate
cacontology-case:assignmentStatus
cacontology-case:assignmentType
cacontology-case:benchmarkValue
cacontology-case:benchmarkedAgainst
cacontology-case:caseCloseDate
cacontology-case:caseOpenDate
cacontology-case:casePriority
cacontology-case:caseStatus
cacontology-case:caseType
cacontology-case:caseloadCount
cacontology-case:certificationLevel
cacontology-case:classificationLevel
cacontology-case:closedBy
cacontology-case:closureDate
cacontology-case:closureReason
cacontology-case:conductsReview
cacontology-case:creationDate
cacontology-case:currentPhase
cacontology-case:documentStatus
cacontology-case:documentType
cacontology-case:documentedBy
cacontology-case:finalDisposition
cacontology-case:followsStage
cacontology-case:followsWorkflow
cacontology-case:generatesMetrics
cacontology-case:hasAssignment
cacontology-case:hasDocumentation
cacontology-case:hasPhaseTransition
cacontology-case:holdsRole
cacontology-case:investigatorExperience
cacontology-case:jurisdictionLevel
cacontology-case:lastModified
cacontology-case:lastUpdate
cacontology-case:managesCase
cacontology-case:measurementUnit
cacontology-case:measuresPerformance
cacontology-case:metricType
cacontology-case:metricValue
cacontology-case:participatesInManagement
cacontology-case:precedesStage
cacontology-case:recommendationsCount
cacontology-case:reportingPeriod
cacontology-case:resultsInClosure
cacontology-case:retentionPeriod
cacontology-case:reviewDate
cacontology-case:reviewOutcome
cacontology-case:reviewType
cacontology-case:reviewedBy
cacontology-case:reviewerRole
cacontology-case:reviewsCase
cacontology-case:specialization
cacontology-case:stageDuration
cacontology-case:stageEndDate
cacontology-case:stageOutcome
cacontology-case:stageStartDate
cacontology-case:supervisedBy
cacontology-case:trackedBy
cacontology-case:trackingNumber
cacontology-case:trackingSystem
cacontology-case:undergoesReview
cacontology-case:updateFrequency
cacontology-case:workflowStage
cacontology-case:workloadPercentage
cacontology-coord:agreementScope
cacontology-coord:agreementType
cacontology-coord:assignedBy
cacontology-coord:assignmentDuration
cacontology-coord:assignsLiaison
cacontology-coord:authorizedBy
cacontology-coord:availabilityLevel
cacontology-coord:benchmarkComparison
cacontology-coord:benchmarkedAgainst
cacontology-coord:classificationLevel
cacontology-coord:clearanceLevel
cacontology-coord:communicationAuthority
cacontology-coord:communicationFrequency
cacontology-coord:concernsCase
cacontology-coord:concernsParticipant
cacontology-coord:concernsTemporaryPart
cacontology-coord:concernsTemporaryWhole
cacontology-coord:connectsAgencies
cacontology-coord:coordinationLevel
cacontology-coord:coordinationStatus
cacontology-coord:coordinationType
cacontology-coord:costSharing
cacontology-coord:effectiveDate
cacontology-coord:escalationProcedure
cacontology-coord:evaluatesCoordination
cacontology-coord:expirationDate
cacontology-coord:facilitatesCommunication
cacontology-coord:governsAgreement
cacontology-coord:hasAccuracy
cacontology-coord:hasActionability
cacontology-coord:hasComplexityLevel
cacontology-coord:hasComponent
cacontology-coord:hasCoordinationEffectiveness
cacontology-coord:hasCoordinationIntensity
cacontology-coord:hasDataCompleteness
cacontology-coord:hasDataConsistency
cacontology-coord:hasDataQuality
cacontology-coord:hasIntelligenceValue
cacontology-coord:hasLiaisonEffectiveness
cacontology-coord:hasReliability
cacontology-coord:hasResponsiveness
cacontology-coord:hasSecurityLevel
cacontology-coord:hasSharingEfficiency
cacontology-coord:hasSubInvestigation
cacontology-coord:hasSuccessRate
cacontology-coord:hasTimeliness
cacontology-coord:hasTrustLevel
cacontology-coord:hasUnificationLevel
cacontology-coord:hasValidationLevel
cacontology-coord:informationAccuracy
cacontology-coord:intelligenceType
cacontology-coord:investigationScope
cacontology-coord:involvesAgency
cacontology-coord:involvesPersonnel
cacontology-coord:isComponentOf
cacontology-coord:isSubInvestigationOf
cacontology-coord:leadAgency
cacontology-coord:liaisonRole
cacontology-coord:liaisonWith
cacontology-coord:measurementPeriod
cacontology-coord:measuresPerformance
cacontology-coord:metricType
cacontology-coord:metricValue
cacontology-coord:participatesIn
cacontology-coord:participatesInSharing
cacontology-coord:participatingAgencies
cacontology-coord:personnelCount
cacontology-coord:protocolType
cacontology-coord:providesResource
cacontology-coord:receivesResource
cacontology-coord:reciprocity
cacontology-coord:reimbursement
cacontology-coord:renewalClause
cacontology-coord:representsAgency
cacontology-coord:resourcePooling
cacontology-coord:resourceType
cacontology-coord:responseTimeRequirement
cacontology-coord:securityClearance
cacontology-coord:sharedCommand
cacontology-coord:sharesFromAgency
cacontology-coord:sharesInformation
cacontology-coord:sharesResources
cacontology-coord:sharesWithAgency
cacontology-coord:sharingAgreement
cacontology-coord:sharingDuration
cacontology-coord:sharingMechanism
cacontology-coord:sharingType
cacontology-coord:signedByAgency
cacontology-coord:sourceReliability
cacontology-coord:specialization
cacontology-coord:standsInQualifiedParthood
cacontology-coord:standsInQualifiedParticipation
cacontology-coord:terminationClause
cacontology-coord:unifiedReporting
cacontology-coord:usesProtocol
cacontology-corruption:abusesAccess
cacontology-corruption:accessLevel
cacontology-corruption:authorityLevel
cacontology-corruption:badgeVisible
cacontology-corruption:concernsCorruptOfficer
cacontology-corruption:corruptionDuration
cacontology-corruption:corruptsEvidence
cacontology-corruption:departmentAffiliation
cacontology-corruption:detectedBy
cacontology-corruption:displaysAuthority
cacontology-corruption:employmentStatus
cacontology-corruption:employsOfficer
cacontology-corruption:exploitsPosition
cacontology-corruption:hasAuthorityAbuseDegree
cacontology-corruption:hasAuthorityEnhancementLevel
cacontology-corruption:hasCorruptionDependency
cacontology-corruption:hasCorruptionImpact
cacontology-corruption:hasCorruptionSeverity
cacontology-corruption:hasDataCompleteness
cacontology-corruption:hasDataQuality
cacontology-corruption:hasDetectionDifficulty
cacontology-corruption:hasEvidenceIntegrity
cacontology-corruption:hasIntimidationFactor
cacontology-corruption:hasInvestigationComplexity
cacontology-corruption:hasPositionExploitationLevel
cacontology-corruption:hasSymbolVisibility
cacontology-corruption:hasTrustBetrayalLevel
cacontology-corruption:hasValidationLevel
cacontology-corruption:hasVictimVulnerability
cacontology-corruption:investigatedBy
cacontology-corruption:isDetectedBy
cacontology-corruption:leaksInformation
cacontology-corruption:participatesIn
cacontology-corruption:reportedBy
cacontology-corruption:standsInQualifiedCorruption
cacontology-corruption:uniformDisplayed
cacontology-corruption:uniformType
cacontology-corruption:victimCount
cacontology-corruption:wearsUniform
cacontology-corruption:yearsOfService
cacontology-custodial:accessLevel
cacontology-custodial:aggravatingFactor
cacontology-custodial:authorityLevel
cacontology-custodial:authorityScope
cacontology-custodial:authorizationLevel
cacontology-custodial:breachDuration
cacontology-custodial:checkScope
cacontology-custodial:checkStatus
cacontology-custodial:consentScope
cacontology-custodial:consentStatus
cacontology-custodial:createsCustodialSituation
cacontology-custodial:custodyDuration
cacontology-custodial:custodySchedule
cacontology-custodial:custodyType
cacontology-custodial:hasAuthority
cacontology-custodial:hasCustodyBeginPoint
cacontology-custodial:hasCustodyEndPoint
cacontology-custodial:hasCustodyPhase
cacontology-custodial:hasRoleBeginPoint
cacontology-custodial:hasRoleEndPoint
cacontology-custodial:hasViolationBeginPoint
cacontology-custodial:hasViolationEndPoint
cacontology-custodial:holdsPositionOf
cacontology-custodial:inCustodyPhase
cacontology-custodial:involvesChild
cacontology-custodial:involvesCustodian
cacontology-custodial:involvesParent
cacontology-custodial:occursInCustodialSituation
cacontology-custodial:perpetratedBy
cacontology-custodial:relationshipDuration
cacontology-custodial:relationshipFrequency
cacontology-custodial:relationshipIntimacy
cacontology-custodial:relationshipType
cacontology-custodial:relevantToInvestigation
cacontology-custodial:subjectTo
cacontology-custodial:supervisionLevel
cacontology-custodial:trustLevel
cacontology-custodial:violatesPosition
cacontology-custodial:violatesRelationship
cacontology-custodial:violationPattern
cacontology-custodial:violationSeverity
cacontology-custodial:violationType
cacontology-custodial:vulnerabilityFactor
cacontology-detection:ageEstimate
cacontology-detection:confidenceScore
cacontology-detection:copineClassification
cacontology-detection:detectedContent
cacontology-detection:detectionDuration
cacontology-detection:detectionThreshold
cacontology-detection:falsePositiveReason
cacontology-detection:generatedHash
cacontology-detection:hasDetectionBeginPoint
cacontology-detection:hasDetectionEndPoint
cacontology-detection:hasPhaseBeginPoint
cacontology-detection:hasPhaseEndPoint
cacontology-detection:hasRoleBeginPoint
cacontology-detection:hasRoleEndPoint
cacontology-detection:hashAlgorithm
cacontology-detection:matchType
cacontology-detection:matchedDatabase
cacontology-detection:modelVersion
cacontology-detection:perceptualHashValue
cacontology-detection:phaseDuration
cacontology-detection:photoDNAValue
cacontology-detection:reviewDecision
cacontology-detection:reviewedBy
cacontology-detection:roleDuration
cacontology-detection:sarClassification
cacontology-detection:similarityScore
cacontology-detection:tannerStage
cacontology-educational1:academicActivity
cacontology-educational1:accessLevel
cacontology-educational1:activatesMandatoryReporting
cacontology-educational1:actualAge
cacontology-educational1:addressesVulnerability
cacontology-educational1:assignmentType
cacontology-educational1:attendsInstitution
cacontology-educational1:bailAmount
cacontology-educational1:bodyPartTouched
cacontology-educational1:bondAmount
cacontology-educational1:chargeCount
cacontology-educational1:chargeDegree
cacontology-educational1:chargesDefendant
cacontology-educational1:classroomNumber
cacontology-educational1:collectsEvidence
cacontology-educational1:communicatesVia
cacontology-educational1:contactDuration
cacontology-educational1:contactFrequency
cacontology-educational1:contactType
cacontology-educational1:coordinatesWith
cacontology-educational1:corroboratesAccount
cacontology-educational1:deceivesVictim
cacontology-educational1:deceptionDuration
cacontology-educational1:degradationLevel
cacontology-educational1:degradesVictim
cacontology-educational1:disclosesTo
cacontology-educational1:disclosureMethod
cacontology-educational1:documentsExploitation
cacontology-educational1:documentsHarassment
cacontology-educational1:duringActivity
cacontology-educational1:educatorAge
cacontology-educational1:employedAt
cacontology-educational1:employmentDuration
cacontology-educational1:enhancedBy
cacontology-educational1:escalatesTo
cacontology-educational1:evidenceLocation
cacontology-educational1:evidenceType
cacontology-educational1:exploitationDuration
cacontology-educational1:exploitationLocation
cacontology-educational1:exploitationMethod
cacontology-educational1:exploitsIsolation
cacontology-educational1:exploitsPosition
cacontology-educational1:exploitsVulnerability
cacontology-educational1:fakeAccountCount
cacontology-educational1:followedBySupervision
cacontology-educational1:forceLevel
cacontology-educational1:forciblyTouches
cacontology-educational1:gradeLevel
cacontology-educational1:gradeRange
cacontology-educational1:harassmentContent
cacontology-educational1:harassmentFrequency
cacontology-educational1:harassmentMedium
cacontology-educational1:hasVulnerability
cacontology-educational1:identifiesVulnerability
cacontology-educational1:impersonatedAge
cacontology-educational1:impersonatesAge
cacontology-educational1:implementsSafeguarding
cacontology-educational1:institutionCount
cacontology-educational1:institutionLocation
cacontology-educational1:institutionReputation
cacontology-educational1:institutionType
cacontology-educational1:interviewsVictim
cacontology-educational1:intimidatesStudent
cacontology-educational1:investigatesExploitation
cacontology-educational1:involvesPhysicalContact
cacontology-educational1:involvesWrittenHarassment
cacontology-educational1:isolationLevel
cacontology-educational1:leveragesAcademicPower
cacontology-educational1:linkedToLocation
cacontology-educational1:maintainsMultipleAccounts
cacontology-educational1:mandatoryReportingTriggered
cacontology-educational1:maximumSentence
cacontology-educational1:notifiesPrincipal
cacontology-educational1:occursInContext
cacontology-educational1:platformUsed
cacontology-educational1:policeResponseTime
cacontology-educational1:providedBy
cacontology-educational1:providesEvidence
cacontology-educational1:receivesReport
cacontology-educational1:reportingDelay
cacontology-educational1:reportingStaffRole
cacontology-educational1:reportsTo
cacontology-educational1:requiresRegistration
cacontology-educational1:resultsinCharge
cacontology-educational1:schoolAddress
cacontology-educational1:selectsVictim
cacontology-educational1:sendsContent
cacontology-educational1:sentenceLength
cacontology-educational1:solicitsFrom
cacontology-educational1:studentPopulation
cacontology-educational1:studentsPresent
cacontology-educational1:subjectTaught
cacontology-educational1:supervisionDuration
cacontology-educational1:takesPlaceIn
cacontology-educational1:targetAgeRange
cacontology-educational1:targetGender
cacontology-educational1:targetingMethod
cacontology-educational1:targetsAgeGroup
cacontology-educational1:targetsStudent
cacontology-educational1:targetsVictim
cacontology-educational1:timeOfDay
cacontology-educational1:touchesVictim
cacontology-educational1:triggersPoliceNotification
cacontology-educational1:usesImpersonation
cacontology-educational1:usesMethod
cacontology-educational1:victimCount
cacontology-educational1:vulnerabilityFactor
cacontology-educational1:witnessesExploitation
cacontology-educational1:writtenContent
cacontology-educational1:writtenOn
cacontology-educational1:yearsOfExperience
cacontology-enterprises:accessLevel
cacontology-enterprises:advancementCriteria
cacontology-enterprises:altAccountCount
cacontology-enterprises:buildsVictimTrust
cacontology-enterprises:channelCount
cacontology-enterprises:coercesIntoSelfHarm
cacontology-enterprises:coercionEffectiveness
cacontology-enterprises:coercionSeverity
cacontology-enterprises:compilationComplexity
cacontology-enterprises:compilesContent
cacontology-enterprises:containsVictimContent
cacontology-enterprises:contentNotoriety
cacontology-enterprises:contentValue
cacontology-enterprises:contentVolumeItems
cacontology-enterprises:coordinatesAcrossPlatforms
cacontology-enterprises:coordinatesActivities
cacontology-enterprises:correlatesEvidence
cacontology-enterprises:createsVictimizationSituation
cacontology-enterprises:degradationLevel
cacontology-enterprises:editingQuality
cacontology-enterprises:encryptionLevel
cacontology-enterprises:evidenceQuality
cacontology-enterprises:exploitsVictim
cacontology-enterprises:hasCoercionEventBeginDate
cacontology-enterprises:hasEncryptionCapability
cacontology-enterprises:hasExploitationRelation
cacontology-enterprises:hasFormationEvent
cacontology-enterprises:hasHierarchy
cacontology-enterprises:hasInnerCore
cacontology-enterprises:hasInvestigationBeginDate
cacontology-enterprises:hasLeadershipRelation
cacontology-enterprises:hasMember
cacontology-enterprises:hasNetworkCell
cacontology-enterprises:hasNetworkComponent
cacontology-enterprises:hasNetworkNotorietyQuality
cacontology-enterprises:hasOperationalBeginDate
cacontology-enterprises:hasOperationalEndDate
cacontology-enterprises:hasOperationalPeriod
cacontology-enterprises:hasRecruitmentMode
cacontology-enterprises:hierarchyComplexity
cacontology-enterprises:historicallyDependsOn
cacontology-enterprises:holdsLeadershipRole
cacontology-enterprises:identifiesNetworkMember
cacontology-enterprises:identityCorrelationAccuracy
cacontology-enterprises:ideologicalFramework
cacontology-enterprises:infiltratesNetwork
cacontology-enterprises:infiltrationDuration
cacontology-enterprises:innerCoreSize
cacontology-enterprises:leadershipCount
cacontology-enterprises:maintainsAltAccounts
cacontology-enterprises:managesPrivateGroups
cacontology-enterprises:mapsNetworkStructure
cacontology-enterprises:membershipLevel
cacontology-enterprises:membershipRequirements
cacontology-enterprises:networkMappingCompleteness
cacontology-enterprises:networkNotoriety
cacontology-enterprises:networkSize
cacontology-enterprises:operatesEnterprise
cacontology-enterprises:operatesInSituation
cacontology-enterprises:operationalScope
cacontology-enterprises:participatesInCoercion
cacontology-enterprises:participatesInInnerCore
cacontology-enterprises:participatesInRecruitment
cacontology-enterprises:platformCount
cacontology-enterprises:producesLorebook
cacontology-enterprises:recruitsMembers
cacontology-enterprises:selfHarmType
cacontology-enterprises:socialEngineeringComplexity
cacontology-enterprises:targetingPrecision
cacontology-enterprises:targetsVulnerability
cacontology-enterprises:trustBuildingDuration
cacontology-enterprises:usesAsCurrency
cacontology-enterprises:utilizesEncryptedChannels
cacontology-enterprises:vulnerabilityType
cacontology-forensics:acquisitionMethod
cacontology-forensics:analysesUserBehavior
cacontology-forensics:analyzesCommunicationPatterns
cacontology-forensics:analyzesNetworkTraffic
cacontology-forensics:analyzesTemporalPatterns
cacontology-forensics:arrestsResulting
cacontology-forensics:automationPercentage
cacontology-forensics:behaviorPatternsIdentified
cacontology-forensics:behavioralFingerprintsCreated
cacontology-forensics:caseExhibitNumber
cacontology-forensics:communicationGraphComplexity
cacontology-forensics:coordinatesInternationalProcessing
cacontology-forensics:correlatesAcrossPlatforms
cacontology-forensics:correlatesContent
cacontology-forensics:correlationLatency
cacontology-forensics:correlationStrength
cacontology-forensics:createsBehavioralFingerprints
cacontology-forensics:crossBorderDataSharing
cacontology-forensics:crossPlatformMatches
cacontology-forensics:custodyReason
cacontology-forensics:custodyTransferredFrom
cacontology-forensics:custodyTransferredTo
cacontology-forensics:dataTransferVolume
cacontology-forensics:databasesIntegrated
cacontology-forensics:detectionAccuracy
cacontology-forensics:detectionMethod
cacontology-forensics:devicesRecovered
cacontology-forensics:discoversNetworks
cacontology-forensics:distributesProcessing
cacontology-forensics:enablesRealTimeCorrelation
cacontology-forensics:evidenceLocation
cacontology-forensics:evidenceSeized
cacontology-forensics:evidenceVolumeTerabytes
cacontology-forensics:falsePositiveRate
cacontology-forensics:featureVectorsUsed
cacontology-forensics:filesProcessedMillions
cacontology-forensics:fingerprintAccuracy
cacontology-forensics:forensicCopy
cacontology-forensics:forensicLabsInvolved
cacontology-forensics:forensicPhaseDuration
cacontology-forensics:forensicReport
cacontology-forensics:generatesRealTimeAlerts
cacontology-forensics:generatesTriageResults
cacontology-forensics:geographicDistribution
cacontology-forensics:geographicRadius
cacontology-forensics:geospatialAccuracy
cacontology-forensics:hasForensicPhaseBeginPoint
cacontology-forensics:hasForensicPhaseEndPoint
cacontology-forensics:hasRoleBeginPoint
cacontology-forensics:hasRoleEndPoint
cacontology-forensics:hashDatabaseSize
cacontology-forensics:hashMatchesFound
cacontology-forensics:identifiesCrossPlatformActivity
cacontology-forensics:identifiesGeographicClusters
cacontology-forensics:identifiesNetworkAnomalies
cacontology-forensics:identifiesPatterns
cacontology-forensics:identifiesTemporalClusters
cacontology-forensics:integratesIntelligenceDatabases
cacontology-forensics:intelligenceHits
cacontology-forensics:investigationDuration
cacontology-forensics:involvesForensicLab
cacontology-forensics:k9AssistanceProvided
cacontology-forensics:locationPointsAnalyzed
cacontology-forensics:mlModelAccuracy
cacontology-forensics:networkConnectionsFound
cacontology-forensics:networkSessionsAnalyzed
cacontology-forensics:parallelProcessingEnabled
cacontology-forensics:performsGeospatialAnalysis
cacontology-forensics:performsHashAnalysis
cacontology-forensics:platformCorrelationScore
cacontology-forensics:platformsAnalyzed
cacontology-forensics:priorityClassification
cacontology-forensics:processesEvidence
cacontology-forensics:processingNodes
cacontology-forensics:processingSpeed
cacontology-forensics:processingTimeframeDays
cacontology-forensics:producesIntelligence
cacontology-forensics:queriesIntelligenceDatabase
cacontology-forensics:queryResponseTime
cacontology-forensics:realTimeAlerts
cacontology-forensics:recoveryMethod
cacontology-forensics:referralsReceived
cacontology-forensics:riskLevelsAssigned
cacontology-forensics:searchWarrantAssisted
cacontology-forensics:sharesProcessingLoad
cacontology-forensics:sourceHash
cacontology-forensics:standardizedProcessing
cacontology-forensics:streamingDataRate
cacontology-forensics:suspiciousConnectionsIdentified
cacontology-forensics:temporalPatternsIdentified
cacontology-forensics:temporalResolution
cacontology-forensics:timeRangeAnalyzed
cacontology-forensics:timelineEvent
cacontology-forensics:trainingDataSize
cacontology-forensics:trainsCorrelationModel
cacontology-forensics:triageAccuracy
cacontology-forensics:triagesEvidence
cacontology-forensics:userAccountsAnalyzed
cacontology-forensics:utilisesSystem
cacontology-forensics:utilizesMachineLearning
cacontology-forensics:verificationHash
cacontology-forensics:victimAgeRange
cacontology-forensics:victimGeographicOrigin
cacontology-forensics:victimsIdentifiedCount
cacontology-forensics:writeBlockingUsed
cacontology-grooming:acceleratesTrust
cacontology-grooming:accountsUsed
cacontology-grooming:administrationMethod
cacontology-grooming:anonymousContactMethod
cacontology-grooming:behaviorDuration
cacontology-grooming:bypassesPhase
cacontology-grooming:commercialOfferType
cacontology-grooming:communicationFrequency
cacontology-grooming:contactFrequency
cacontology-grooming:contentType
cacontology-grooming:crossesStateBoundaries
cacontology-grooming:distressIndicators
cacontology-grooming:economicIncentiveAmount
cacontology-grooming:emotionalTone
cacontology-grooming:escalationRate
cacontology-grooming:escalationTimeframe
cacontology-grooming:evidenceValue
cacontology-grooming:exchangesContent
cacontology-grooming:exhibitsPattern
cacontology-grooming:explicitnessLevel
cacontology-grooming:exploitsOpportunity
cacontology-grooming:exploitsReputation
cacontology-grooming:facilitatesWithSubstance
cacontology-grooming:gameContext
cacontology-grooming:groomingPhaseDuration
cacontology-grooming:groomingStage
cacontology-grooming:hasGroomingPhaseBeginPoint
cacontology-grooming:hasGroomingPhaseEndPoint
cacontology-grooming:hasRoleBeginPoint
cacontology-grooming:hasRoleEndPoint
cacontology-grooming:hasVulnerability
cacontology-grooming:identityVerificationRequired
cacontology-grooming:impairmentLevel
cacontology-grooming:impersonatedRole
cacontology-grooming:impersonatesRole
cacontology-grooming:initialContactPretense
cacontology-grooming:initiationMethod
cacontology-grooming:institutionPrestige
cacontology-grooming:institutionsTargeted
cacontology-grooming:involvesInterstateTransport
cacontology-grooming:isolationMethod
cacontology-grooming:leveragesPosition
cacontology-grooming:manipulationTechnique
cacontology-grooming:meetingLocationSpecified
cacontology-grooming:monetizationTimeframe
cacontology-grooming:occursInSpace
cacontology-grooming:opportunityType
cacontology-grooming:participantCount
cacontology-grooming:patternConfidence
cacontology-grooming:physicalLocation
cacontology-grooming:platformAnonymityLevel
cacontology-grooming:primaryPlatform
cacontology-grooming:progressesToPhysicalMeeting
cacontology-grooming:progressionDuration
cacontology-grooming:propositionExplicitness
cacontology-grooming:prosecutionRelevance
cacontology-grooming:recruitmentDirectness
cacontology-grooming:requestsSecrecy
cacontology-grooming:rolePlayingTactic
cacontology-grooming:ruleStructureDescription
cacontology-grooming:sameDayProgression
cacontology-grooming:seekingHelp
cacontology-grooming:skippedPhases
cacontology-grooming:substanceType
cacontology-grooming:targetsInstitution
cacontology-grooming:targetsVictim
cacontology-grooming:timeOfContact
cacontology-grooming:transitionSpeed
cacontology-grooming:transitionsToLocation
cacontology-grooming:transportationProposed
cacontology-grooming:trustExploitationSpeed
cacontology-grooming:usesGifts
cacontology-grooming:usesThreats
cacontology-grooming:utilizesPlatformFeature
cacontology-grooming:victimCompliance
cacontology-grooming:victimImpact
cacontology-grooming:vulnerabilityType
cacontology-gufo:academicYearBeginTimePoint
cacontology-gufo:aiGenerationTimePoint
cacontology-gufo:analysisCompletionTimePoint
cacontology-gufo:assignmentBeginTime
cacontology-gufo:assignmentEndTime
cacontology-gufo:closureBeginTime
cacontology-gufo:closureTime
cacontology-gufo:coercionBeginTime
cacontology-gufo:coercionEndTime
cacontology-gufo:coordinationBeginTime
cacontology-gufo:detectionTimePoint
cacontology-gufo:discoveryBeginTime
cacontology-gufo:dispositionBeginTime
cacontology-gufo:employmentTerminationTimePoint
cacontology-gufo:escalationBeginTime
cacontology-gufo:escalationPeakTime
cacontology-gufo:evidenceCollectionTime
cacontology-gufo:exploitationBeginTime
cacontology-gufo:exploitationDuration
cacontology-gufo:exploitationEndTime
cacontology-gufo:exploitationFirstIncidentTimePoint
cacontology-gufo:forfeitureBeginTime
cacontology-gufo:forfeitureCompletionTime
cacontology-gufo:forfeitureEndTime
cacontology-gufo:generationDuration
cacontology-gufo:institutionalReportingTimePoint
cacontology-gufo:intakeBeginTime
cacontology-gufo:investigationBeginTime
cacontology-gufo:penaltyImpositionTime
cacontology-gufo:phaseTransitionTime
cacontology-gufo:practiceSessionBeginTime
cacontology-gufo:practiceSessionEndTime
cacontology-gufo:prosecutionBeginTime
cacontology-gufo:reportingTime
cacontology-gufo:restraintBeginTime
cacontology-gufo:reviewBeginTime
cacontology-gufo:reviewEndTime
cacontology-gufo:seizureTime
cacontology-gufo:sentencingTime
cacontology-gufo:triageCompletionTime
cacontology-gufo:trialBeginTime
cacontology-gufo:workflowBeginTime
cacontology-gufo:workflowEndTime
cacontology-impact:addressesHarm
cacontology-impact:admissionReason
cacontology-impact:agencyCount
cacontology-impact:assessesVictim
cacontology-impact:assessmentDate
cacontology-impact:assessmentType
cacontology-impact:coordinatedBy
cacontology-impact:coordinationComplexity
cacontology-impact:dischargeCondition
cacontology-impact:dischargeDate
cacontology-impact:documentedBy
cacontology-impact:duration
cacontology-impact:emergencyCallLocation
cacontology-impact:extractionComplexity
cacontology-impact:facilitatedBy
cacontology-impact:facilitatedByFactor
cacontology-impact:facilitatesReintegration
cacontology-impact:familyContactEstablished
cacontology-impact:followedByDischarge
cacontology-impact:frequency
cacontology-impact:functioningLevel
cacontology-impact:hasImpactPhaseBeginPoint
cacontology-impact:hasImpactPhaseEndPoint
cacontology-impact:hasRoleBeginPoint
cacontology-impact:hasRoleEndPoint
cacontology-impact:hometownLocation
cacontology-impact:hospitalName
cacontology-impact:hospitalStayDuration
cacontology-impact:identifiesHarm
cacontology-impact:impactArea
cacontology-impact:impactPhaseDuration
cacontology-impact:impactSeverity
cacontology-impact:impededBy
cacontology-impact:impededByBarrier
cacontology-impact:includesTransportation
cacontology-impact:indicatorType
cacontology-impact:informsRestitution
cacontology-impact:informsSafetyPlanning
cacontology-impact:intensity
cacontology-impact:interventionType
cacontology-impact:jurisdictionsInvolved
cacontology-impact:lifeAreaAffected
cacontology-impact:manifestsAs
cacontology-impact:milestoneDate
cacontology-impact:milestoneDescription
cacontology-impact:necessitatesAssessment
cacontology-impact:ongoingDangerLevel
cacontology-impact:onsetDate
cacontology-impact:partOfRecovery
cacontology-impact:participatesInResponse
cacontology-impact:prognosis
cacontology-impact:progressionPattern
cacontology-impact:providedBy
cacontology-impact:providesSpecializedSupport
cacontology-impact:receivedTreatment
cacontology-impact:recoveryStage
cacontology-impact:recoveryTimeframe
cacontology-impact:reintegrationDuration
cacontology-impact:relevantToSentencing
cacontology-impact:reportedSituation
cacontology-impact:responseTime
cacontology-impact:resultedFrom
cacontology-impact:resultsinExtraction
cacontology-impact:resultsinHospitalization
cacontology-impact:returnsTo
cacontology-impact:reunitesWith
cacontology-impact:safetyPlanType
cacontology-impact:serviceDuration
cacontology-impact:serviceProvider
cacontology-impact:serviceType
cacontology-impact:sessionCount
cacontology-impact:severity
cacontology-impact:severityLevel
cacontology-impact:transportationCost
cacontology-impact:transportationDestination
cacontology-impact:transportationType
cacontology-impact:traumaType
cacontology-impact:treatedAt
cacontology-impact:treatmentDuration
cacontology-impact:treatmentModality
cacontology-impact:treatmentOutcome
cacontology-impact:triggersResponse
cacontology-infrastructure:accountsFrozen
cacontology-infrastructure:analysesAccess
cacontology-infrastructure:analysesInfrastructure
cacontology-infrastructure:anonymityLevel
cacontology-infrastructure:bandwidthCapacity
cacontology-infrastructure:cloudPlatform
cacontology-infrastructure:containsComponent
cacontology-infrastructure:cryptoCurrencyTypes
cacontology-infrastructure:dataVolumeMirrored
cacontology-infrastructure:distributedAcross
cacontology-infrastructure:domainCount
cacontology-infrastructure:domainsSinkholed
cacontology-infrastructure:encryptionStrength
cacontology-infrastructure:financialComplexity
cacontology-infrastructure:freezesAccounts
cacontology-infrastructure:geographicLocations
cacontology-infrastructure:hasAnalysisAccuracy
cacontology-infrastructure:hasAnalysisBeginPoint
cacontology-infrastructure:hasAnalysisDepth
cacontology-infrastructure:hasAnalysisEndPoint
cacontology-infrastructure:hasAnalysisTimeliness
cacontology-infrastructure:hasAnonymityEffectiveness
cacontology-infrastructure:hasFinancialComplexity
cacontology-infrastructure:hasFinancialTraceability
cacontology-infrastructure:hasInfrastructureBeginPoint
cacontology-infrastructure:hasInfrastructureEndPoint
cacontology-infrastructure:hasInfrastructurePerformance
cacontology-infrastructure:hasInfrastructureReliability
cacontology-infrastructure:hasInfrastructureScalability
cacontology-infrastructure:hasInfrastructureVulnerability
cacontology-infrastructure:hasObfuscationComplexity
cacontology-infrastructure:hasPhaseBeginPoint
cacontology-infrastructure:hasPhaseEndPoint
cacontology-infrastructure:hasRoleBeginPoint
cacontology-infrastructure:hasRoleEndPoint
cacontology-infrastructure:hasSecurityStrength
cacontology-infrastructure:hasTakedownBeginPoint
cacontology-infrastructure:hasTakedownCompleteness
cacontology-infrastructure:hasTakedownEffectiveness
cacontology-infrastructure:hasTakedownEndPoint
cacontology-infrastructure:hasTakedownSpeed
cacontology-infrastructure:hostedBy
cacontology-infrastructure:hostingProvider
cacontology-infrastructure:leadsToCriminalCharges
cacontology-infrastructure:monthlyRevenue
cacontology-infrastructure:networkComplexity
cacontology-infrastructure:obfuscationMethods
cacontology-infrastructure:paymentMethods
cacontology-infrastructure:protectedBy
cacontology-infrastructure:providesEvidence
cacontology-infrastructure:resultsinSeizure
cacontology-infrastructure:revealsTopology
cacontology-infrastructure:seizesServers
cacontology-infrastructure:serverCount
cacontology-infrastructure:serversSeized
cacontology-infrastructure:sinkholeDomains
cacontology-infrastructure:storageCapacity
cacontology-infrastructure:subscriptionTiers
cacontology-infrastructure:takedownDuration
cacontology-infrastructure:targetsInfrastructure
cacontology-infrastructure:tracesPayments
cacontology-infrastructure:userGeographicSpread
cacontology-infrastructure:usesPaymentSystem
cacontology-institutional:abuseEndYear
cacontology-institutional:abuseStartYear
cacontology-institutional:authorityLevel
cacontology-institutional:chargeCount
cacontology-institutional:childrenServed
cacontology-institutional:concealsFrom
cacontology-institutional:concealsTravel
cacontology-institutional:documentsPattern
cacontology-institutional:donorCount
cacontology-institutional:enablesExploitation
cacontology-institutional:exercisesAuthorityOver
cacontology-institutional:existentiallyDependsOn
cacontology-institutional:experiencesExploitation
cacontology-institutional:exploitationTypeCount
cacontology-institutional:exploitsRole
cacontology-institutional:exploitsVulnerability
cacontology-institutional:facilitatedBy
cacontology-institutional:foreignResidenceDuration
cacontology-institutional:foundedBy
cacontology-institutional:foundingYear
cacontology-institutional:fundingAmount
cacontology-institutional:genericallyDependsOn
cacontology-institutional:hasAuthorityLevel
cacontology-institutional:hasExploitationEndDate
cacontology-institutional:hasExploitationSeverityLevel
cacontology-institutional:hasExploitationStartDate
cacontology-institutional:hasInstitutionFoundingDate
cacontology-institutional:hasInstitutionalReputationLevel
cacontology-institutional:hasIsolationDegree
cacontology-institutional:hasOperationEndDate
cacontology-institutional:hasOversightLevel
cacontology-institutional:hasRoleEndDate
cacontology-institutional:hasRoleStartDate
cacontology-institutional:hasSystematicityDegree
cacontology-institutional:hasTravelDate
cacontology-institutional:hasTrustLevel
cacontology-institutional:hasVulnerabilityLevel
cacontology-institutional:historicallyDependsOn
cacontology-institutional:holdsRole
cacontology-institutional:impactsVictim
cacontology-institutional:investigatedBy
cacontology-institutional:isComponentOfExploitation
cacontology-institutional:isPartOfInstitution
cacontology-institutional:isPartOfInvestigation
cacontology-institutional:isolationDegree
cacontology-institutional:maintainedBy
cacontology-institutional:manipulates
cacontology-institutional:manipulationTactics
cacontology-institutional:occursInContext
cacontology-institutional:occursWithin
cacontology-institutional:operatesInCountry
cacontology-institutional:operatesInJurisdictionalContext
cacontology-institutional:operationDurationYears
cacontology-institutional:participatesInInstitution
cacontology-institutional:perpetratesExploitation
cacontology-institutional:prosecutedInContext
cacontology-institutional:prosecutedUnder
cacontology-institutional:prosecutionJurisdiction
cacontology-institutional:providesTestimony
cacontology-institutional:receivesSupport
cacontology-institutional:resultsInSentence
cacontology-institutional:revealsPattern
cacontology-institutional:sentenceLength
cacontology-institutional:servesPopulation
cacontology-institutional:targetsPopulation
cacontology-institutional:travelFrequency
cacontology-institutional:travelPatternYears
cacontology-institutional:travelPurposeClaimed
cacontology-institutional:travelsFrom
cacontology-institutional:travelsTo
cacontology-institutional:trustLevelExploited
cacontology-institutional:undertakesTravelFor
cacontology-institutional:victimCount
cacontology-institutional:victimTestimoniesCount
cacontology-institutional:vulnerabilityType
cacontology-institutional:yearsFromVictimizationToTestimony
cacontology-international:alertResponseTime
cacontology-international:alertingPartner
cacontology-international:analysesUsers
cacontology-international:automatedMatchAccuracy
cacontology-international:channelsMonitored
cacontology-international:communicationLatency
cacontology-international:contributesToFusion
cacontology-international:cooperationResponseTime
cacontology-international:coordinatedByEuropol
cacontology-international:coordinatesGlobalTakedown
cacontology-international:coordinatesHotlines
cacontology-international:coordinatesInternationalEffort
cacontology-international:coordinatesProsecution
cacontology-international:coordinatesResources
cacontology-international:coordinatesWith
cacontology-international:coordinatingAgency
cacontology-international:coordinationComplexity
cacontology-international:coordinationComplexityLevel
cacontology-international:coordinationMethod
cacontology-international:crossBorderCapability
cacontology-international:crossReferencesFound
cacontology-international:dataLakeSize
cacontology-international:databasesIntegrated
cacontology-international:deploysTeam
cacontology-international:disruptionEffectiveness
cacontology-international:disruptsInternationalNetwork
cacontology-international:emergencyResponseTime
cacontology-international:enablesAutomatedMatching
cacontology-international:enablesRealTimeSharing
cacontology-international:encryptionLevel
cacontology-international:europeanMemberStatesInvolved
cacontology-international:evidenceSharingVolume
cacontology-international:evidenceVolumeInternational
cacontology-international:executesQuery
cacontology-international:feedsDataLake
cacontology-international:forensicTeamsDeployed
cacontology-international:fusionAccuracy
cacontology-international:generatesThreatAssessment
cacontology-international:globalCoverage
cacontology-international:informationSharingLevel
cacontology-international:integratesToNetwork
cacontology-international:intelligenceChannels
cacontology-international:intelligenceSources
cacontology-international:internationalPartnersInvolved
cacontology-international:investigativeTeamSize
cacontology-international:involvesCountries
cacontology-international:jurisdictionCount
cacontology-international:languageSupport
cacontology-international:managedBy
cacontology-international:multilateralAgreement
cacontology-international:operatesInCountry
cacontology-international:operationContext
cacontology-international:operationDurationMonths
cacontology-international:participatesIn
cacontology-international:partnerCountryCount
cacontology-international:performsCrossReference
cacontology-international:processesDistributed
cacontology-international:processesEvidence
cacontology-international:processingNodeCount
cacontology-international:prosecutionsCrossCountry
cacontology-international:providesExpertise
cacontology-international:queryPerformanceMs
cacontology-international:receivesIntelligenceFeed
cacontology-international:referredTo
cacontology-international:requiresAssistance
cacontology-international:resourcesCoordinated
cacontology-international:responseTimeInternational
cacontology-international:resultsInSeizure
cacontology-international:sharesDataWith
cacontology-international:sharesEvidenceInternationally
cacontology-international:sharesIntelligence
cacontology-international:simultaneousCountries
cacontology-international:simultaneousOperations
cacontology-international:specializedExpertiseAreas
cacontology-international:supportedBy
cacontology-international:synchronizationAccuracy
cacontology-international:synchronizesOperations
cacontology-international:targetsPlatform
cacontology-international:threatLevelAssessed
cacontology-international:transmitsAlert
cacontology-international:treatyBasis
cacontology-international:treatyMechanism
cacontology-international:triggersAlert
cacontology-international:triggersEmergencyProtocol
cacontology-international:undercoverCoordination
cacontology-international:userCountriesAffected
cacontology-international:usersAnalyzedMillions
cacontology-international:utilizesSecureChannel
cacontology-legal:appliesToCountry
cacontology-legal:assessedBy
cacontology-legal:basedOnModel
cacontology-legal:concernsLegalFramework
cacontology-legal:countriesAnalyzed
cacontology-legal:coveragePercentage
cacontology-legal:effectivenessScore
cacontology-legal:enablesExtradition
cacontology-legal:facilitatesCooperation
cacontology-legal:harmonizationProgress
cacontology-legal:hasAssessmentReliability
cacontology-legal:hasCapacityLevel
cacontology-legal:hasComplianceLevel
cacontology-legal:hasCooperationIntensity
cacontology-legal:hasCoverageCompleteness
cacontology-legal:hasDataQuality
cacontology-legal:hasDevelopmentProgress
cacontology-legal:hasExtraditionEfficiency
cacontology-legal:hasGapSeverity
cacontology-legal:hasHarmonizationDegree
cacontology-legal:hasImplementationQuality
cacontology-legal:hasLegalEffectiveness
cacontology-legal:hasLegalRobustness
cacontology-legal:hasReformUrgency
cacontology-legal:hasStandardCompliance
cacontology-legal:hasTreatyStrength
cacontology-legal:identifiesGap
cacontology-legal:implementationStatus
cacontology-legal:isAssessedBy
cacontology-legal:isComponentOf
cacontology-legal:legalAlignmentLevel
cacontology-legal:legalSystemType
cacontology-legal:legislativeCompliance
cacontology-legal:measuredBy
cacontology-legal:partOfFramework
cacontology-legal:participatesIn
cacontology-legal:policyGapSeverity
cacontology-legal:providesAssistance
cacontology-legal:reformPriority
cacontology-legal:requiresReform
cacontology-legal:standsInQualifiedCompliance
cacontology-multi:agencyCount
cacontology-multi:agencyLevelsMixed
cacontology-multi:agencyParticipantCount
cacontology-multi:agentParticipantCount
cacontology-multi:arrestsNationwide
cacontology-multi:authorizedBy
cacontology-multi:casesSubmittedForProsecution
cacontology-multi:chargeTypesDiversity
cacontology-multi:childrenRescued
cacontology-multi:childrenRescuedCount
cacontology-multi:communicationBarriers
cacontology-multi:communicationProtocol
cacontology-multi:communityOutreachEffectiveness
cacontology-multi:complianceViolationsFound
cacontology-multi:complianceVisitsCount
cacontology-multi:coordinatedBy
cacontology-multi:coordinatesAgencies
cacontology-multi:coordinatesComplianceChecks
cacontology-multi:coordinatesNationwide
cacontology-multi:coordinationCenterLocation
cacontology-multi:coordinationChallenges
cacontology-multi:coordinationComplexity
cacontology-multi:coordinationMechanism
cacontology-multi:coordinationPhaseDuration
cacontology-multi:costSharingArrangement
cacontology-multi:countiesInvolved
cacontology-multi:coversState
cacontology-multi:crossStateCommunication
cacontology-multi:crossesBorders
cacontology-multi:crossingDocumentation
cacontology-multi:deploysAgents
cacontology-multi:destinationState
cacontology-multi:diplomaticChannels
cacontology-multi:disclosureToArrestHours
cacontology-multi:enablesRapidResponse
cacontology-multi:facilitatedByCoordination
cacontology-multi:facilitatesChildRescue
cacontology-multi:fbiFieldOfficesInvolved
cacontology-multi:governedByAgreement
cacontology-multi:grandJuryAcceptances
cacontology-multi:handoffType
cacontology-multi:handsOnArrestsCount
cacontology-multi:hasCoordinationPhaseBeginPoint
cacontology-multi:hasCoordinationPhaseEndPoint
cacontology-multi:hasRoleBeginPoint
cacontology-multi:hasRoleEndPoint
cacontology-multi:hostedBy
cacontology-multi:identifiesVictims
cacontology-multi:informationSharingLevel
cacontology-multi:investigationScope
cacontology-multi:investigationsInitiated
cacontology-multi:involvesAgency
cacontology-multi:involvesFBIFieldOffice
cacontology-multi:involvesStateLineCrossing
cacontology-multi:involvesTraffickingInvestigation
cacontology-multi:jurisdictionCount
cacontology-multi:jurisdictionTriggerType
cacontology-multi:jurisdictionalConflicts
cacontology-multi:languageBarriers
cacontology-multi:leadBy
cacontology-multi:legalComplexity
cacontology-multi:meetingFrequency
cacontology-multi:memberAgencyCount
cacontology-multi:newVictimsIdentified
cacontology-multi:operatesInJurisdiction
cacontology-multi:operationDuration
cacontology-multi:operationDurationDays
cacontology-multi:operationName
cacontology-multi:operationPhase
cacontology-multi:operationSuccessRating
cacontology-multi:originatingState
cacontology-multi:personnelAssigned
cacontology-multi:primaryJurisdiction
cacontology-multi:prosecutionAvoidanceBehavior
cacontology-multi:providesAssistanceTo
cacontology-multi:requestsAssistanceFrom
cacontology-multi:requiresHandoff
cacontology-multi:rescuesChildren
cacontology-multi:resourceType
cacontology-multi:resourceValue
cacontology-multi:searchWarrantsExecuted
cacontology-multi:sharesInformationWith
cacontology-multi:sharesResourcesWith
cacontology-multi:sharingDuration
cacontology-multi:spansCounties
cacontology-multi:specializedUnitsDeployed
cacontology-multi:statesCrossed
cacontology-multi:statesInvolved
cacontology-multi:statewideCoverage
cacontology-multi:successMetrics
cacontology-multi:targetStrategy
cacontology-multi:targetTypeCount
cacontology-multi:targetsOffenderType
cacontology-multi:taskForceDuration
cacontology-multi:taskForceType
cacontology-multi:taskForcesInvolved
cacontology-multi:timeZoneChallenges
cacontology-multi:totalArrests
cacontology-multi:traffickingCasesIdentified
cacontology-multi:transportationIntent
cacontology-multi:transportationMethod
cacontology-multi:treatyBasis
cacontology-multi:triggeredByOutreach
cacontology-multi:triggersJurisdiction
cacontology-multi:uncoversCrossStateEvidence
cacontology-multi:usAttorneyOfficesInvolved
cacontology-multi:usersForProsecutionMillions
cacontology-multi:utilizesCoordination
cacontology-partnerships:contributesToAnalysis
cacontology-partnerships:cooperatesOn
cacontology-partnerships:cooperationDuration
cacontology-partnerships:coordinatedBy
cacontology-partnerships:coordinatedThrough
cacontology-partnerships:enablesSharing
cacontology-partnerships:generatesRequests
cacontology-partnerships:governedBy
cacontology-partnerships:hasCooperationBeginPoint
cacontology-partnerships:hasCooperationEndPoint
cacontology-partnerships:hasPartnershipBeginPoint
cacontology-partnerships:hasPartnershipEndPoint
cacontology-partnerships:hasPhaseBeginPoint
cacontology-partnerships:hasPhaseEndPoint
cacontology-partnerships:hasRole
cacontology-partnerships:hasRoleBeginPoint
cacontology-partnerships:hasRoleEndPoint
cacontology-partnerships:includesPartner
cacontology-partnerships:participatesInDevelopment
cacontology-partnerships:participatesInOperation
cacontology-partnerships:partnershipDuration
cacontology-partnerships:phaseDuration
cacontology-partnerships:providesMonitoring
cacontology-partnerships:respondsToEmergency
cacontology-partnerships:roleDuration
cacontology-partnerships:sharesIntelligence
cacontology-partnerships:solicitsHelp
cacontology-physical:associatedWithSubject
cacontology-physical:chainOfCustody
cacontology-physical:containsItem
cacontology-physical:criminalPurpose
cacontology-physical:deviceBrand
cacontology-physical:deviceModel
cacontology-physical:digitalContentFound
cacontology-physical:encryptionStatus
cacontology-physical:evidenceTag
cacontology-physical:evidenceType
cacontology-physical:evidentiarySignificance
cacontology-physical:forensicAnalysisRequired
cacontology-physical:functionalStatus
cacontology-physical:hasAcquisitionRisk
cacontology-physical:hasAnalysisAccuracy
cacontology-physical:hasAnalysisReliability
cacontology-physical:hasContaminationLevel
cacontology-physical:hasCustodyIntegrity
cacontology-physical:hasDocumentationCompleteness
cacontology-physical:hasEvidenceBeginPoint
cacontology-physical:hasEvidenceEndPoint
cacontology-physical:hasEvidenceIntegrity
cacontology-physical:hasEvidenceReliability
cacontology-physical:hasForensicValue
cacontology-physical:hasMethodValidation
cacontology-physical:hasPhaseBeginPoint
cacontology-physical:hasPhaseEndPoint
cacontology-physical:hasPreservationQuality
cacontology-physical:hasProcurementBeginPoint
cacontology-physical:hasProcurementEndPoint
cacontology-physical:hasProcurementSuspicion
cacontology-physical:hasRoleBeginPoint
cacontology-physical:hasRoleEndPoint
cacontology-physical:hasSearchBeginPoint
cacontology-physical:hasSearchCompleteness
cacontology-physical:hasSearchEfficiency
cacontology-physical:hasSearchEndPoint
cacontology-physical:hasSearchThoroughness
cacontology-physical:hasTraceability
cacontology-physical:hiddenCompartment
cacontology-physical:modificationPurpose
cacontology-physical:paymentMethod
cacontology-physical:physicalCondition
cacontology-physical:procuredBy
cacontology-physical:procurementCost
cacontology-physical:procurementDate
cacontology-physical:procurementMethod
cacontology-physical:procurementSource
cacontology-physical:searchDuration
cacontology-physical:searchScope
cacontology-physical:searchWarrant
cacontology-physical:searchingOfficer
cacontology-physical:seizedDuring
cacontology-physical:seizureDate
cacontology-physical:seizureLocation
cacontology-physical:serialNumber
cacontology-physical:storageCapacity
cacontology-physical:tamperEvidence
cacontology-physical:targetAgeGroup
cacontology-physical:witnessPresent
cacontology-platforms:acceptsLegalProcess
cacontology-platforms:accountStatus
cacontology-platforms:accountUsername
cacontology-platforms:actionDuration
cacontology-platforms:ageVerificationMethod
cacontology-platforms:ageVerificationRequired
cacontology-platforms:allowsAnonymousChat
cacontology-platforms:anonymityLevel
cacontology-platforms:anonymousUserDataRetention
cacontology-platforms:contactInitiationMethod
cacontology-platforms:contentRetentionPeriod
cacontology-platforms:contentType
cacontology-platforms:conversationLogging
cacontology-platforms:coordinatedBy
cacontology-platforms:correlatesWithAccount
cacontology-platforms:correlatesWithDevice
cacontology-platforms:crossPlatformAnonymity
cacontology-platforms:crossPlatformMatch
cacontology-platforms:csaiDetectionEnabled
cacontology-platforms:dataDisclosed
cacontology-platforms:deviceType
cacontology-platforms:devicesSearched
cacontology-platforms:discoveredDuring
cacontology-platforms:discoveryTimestamp
cacontology-platforms:emergencyDisclosureCapable
cacontology-platforms:enablesTemporaryAccounts
cacontology-platforms:encryptionLevel
cacontology-platforms:evidenceCategory
cacontology-platforms:evidenceTimestamp
cacontology-platforms:facilitatesRandomMatching
cacontology-platforms:foundOnDevice
cacontology-platforms:foundOnSocialMedia
cacontology-platforms:governedByDisclosurePolicy
cacontology-platforms:guestAccountsAllowed
cacontology-platforms:hasActionBeginPoint
cacontology-platforms:hasActionEndPoint
cacontology-platforms:hasContentModerationCapability
cacontology-platforms:hasDataRetentionPolicy
cacontology-platforms:hasLegalComplianceCapability
cacontology-platforms:hasPhaseBeginPoint
cacontology-platforms:hasPhaseEndPoint
cacontology-platforms:hasPlatformBeginPoint
cacontology-platforms:hasPlatformEndPoint
cacontology-platforms:hasUserVerificationSystem
cacontology-platforms:hashMatchingEnabled
cacontology-platforms:headquarteredIn
cacontology-platforms:identityDisclosureCircumstances
cacontology-platforms:identityVerificationRequired
cacontology-platforms:legalAuthority
cacontology-platforms:legalProcessContactInfo
cacontology-platforms:legalProcessUsed
cacontology-platforms:logRetentionPeriod
cacontology-platforms:maintainsAnonymityLevel
cacontology-platforms:moderationDecision
cacontology-platforms:moderationMethod
cacontology-platforms:moderationPresence
cacontology-platforms:offersContactOpportunity
cacontology-platforms:operatedBy
cacontology-platforms:operatesInJurisdiction
cacontology-platforms:phaseDuration
cacontology-platforms:platformDuration
cacontology-platforms:platformType
cacontology-platforms:platformsInvestigated
cacontology-platforms:preservationPeriod
cacontology-platforms:primaryUserBase
cacontology-platforms:providesAnonymousFeature
cacontology-platforms:providesOpenChatAccess
cacontology-platforms:requiresRegistration
cacontology-platforms:responseTimeFrame
cacontology-platforms:searchWarrantRequired
cacontology-platforms:socialMediaPlatform
cacontology-platforms:subsidiaryOf
cacontology-platforms:suspensionDuration
cacontology-platforms:suspensionReason
cacontology-platforms:userDataRetentionPeriod
cacontology-platforms:verificationStrength
cacontology-prevention:accessesArchive
cacontology-prevention:activeParticipantCount
cacontology-prevention:addressesSextortion
cacontology-prevention:affiliateOrganizationCount
cacontology-prevention:affiliatedWith
cacontology-prevention:ageGroup
cacontology-prevention:arrestsFromDisclosures
cacontology-prevention:assessesRisk
cacontology-prevention:averageDisclosureTime
cacontology-prevention:averageHelpSeekingTime
cacontology-prevention:averageListeningDuration
cacontology-prevention:communityParticipation
cacontology-prevention:communityReportingIncrease
cacontology-prevention:coordinatedBy
cacontology-prevention:coordinatedWith
cacontology-prevention:coordinatesWith
cacontology-prevention:coordinationMeetingFrequency
cacontology-prevention:courseCompletionRate
cacontology-prevention:courseModuleCount
cacontology-prevention:deliveredBy
cacontology-prevention:disclosureBarriersAddressed
cacontology-prevention:disclosuresGenerated
cacontology-prevention:discreteAccessCount
cacontology-prevention:distributedViaEmailList
cacontology-prevention:distributedsTo
cacontology-prevention:educatesOn
cacontology-prevention:educationPortalReach
cacontology-prevention:emailListSubscriberCount
cacontology-prevention:emailOpenRate
cacontology-prevention:enablesDiscreetAccess
cacontology-prevention:enablesRapidResponse
cacontology-prevention:engagesCommunity
cacontology-prevention:engagesParents
cacontology-prevention:enhancedBy
cacontology-prevention:faqAccessCount
cacontology-prevention:faqItemCount
cacontology-prevention:hostsContentOn
cacontology-prevention:identifiesTrustedAdult
cacontology-prevention:implementationStatus
cacontology-prevention:implementsProtocol
cacontology-prevention:integratesQRCode
cacontology-prevention:integratesToPlatform
cacontology-prevention:languageAvailability
cacontology-prevention:maintainsEmailList
cacontology-prevention:measuresEngagementOf
cacontology-prevention:monitorsUsageOf
cacontology-prevention:parentalEngagementRate
cacontology-prevention:participantCount
cacontology-prevention:podcastDownloadCount
cacontology-prevention:podcastEpisodeCount
cacontology-prevention:postersDistributed
cacontology-prevention:presentationAttendance
cacontology-prevention:preventionEffectiveness
cacontology-prevention:preventsBullying
cacontology-prevention:preventsMechanism
cacontology-prevention:programDuration
cacontology-prevention:providesResource
cacontology-prevention:publicationArchiveSize
cacontology-prevention:publishesToArchive
cacontology-prevention:qrCodeEnabled
cacontology-prevention:qrCodeScans
cacontology-prevention:queriesFAQ
cacontology-prevention:rapidResponseCapability
cacontology-prevention:reducesBarrier
cacontology-prevention:reducesShaming
cacontology-prevention:resourceSharingFrequency
cacontology-prevention:resultsInArrest
cacontology-prevention:riskReductionLevel
cacontology-prevention:schoolsTargeted
cacontology-prevention:sextortionWarningSignsCount
cacontology-prevention:sharesResourcesWith
cacontology-prevention:statewideCoverage
cacontology-prevention:supportedBy
cacontology-prevention:targetAgeGroup
cacontology-prevention:targetAudience
cacontology-prevention:targetsAudience
cacontology-prevention:tracksPodcastMetrics
cacontology-prevention:tracksProgressOf
cacontology-prevention:triggersDisclosure
cacontology-prevention:trustedAdultsIdentified
cacontology-production:concealmentLocation
cacontology-production:concealmentMethod
cacontology-production:developmentalDocumentation
cacontology-production:deviceBrand
cacontology-production:deviceModel
cacontology-production:distributionIntent
cacontology-production:editedWith
cacontology-production:evidenceOf
cacontology-production:evidenceRecovered
cacontology-production:facilitatedBy
cacontology-production:forensicValue
cacontology-production:hasProductionPhaseBeginPoint
cacontology-production:hasProductionPhaseEndPoint
cacontology-production:hasRoleBeginPoint
cacontology-production:hasRoleEndPoint
cacontology-production:imageCount
cacontology-production:immediateDistribution
cacontology-production:involvestVictim
cacontology-production:locationAccess
cacontology-production:locationSecurity
cacontology-production:metadataPreserved
cacontology-production:modificationDescription
cacontology-production:partOfSeries
cacontology-production:privacyExpectation
cacontology-production:producedAt
cacontology-production:producedBy
cacontology-production:produces
cacontology-production:productionComplexity
cacontology-production:productionEndDate
cacontology-production:productionMethod
cacontology-production:productionPeriod
cacontology-production:productionStartDate
cacontology-production:recordedWith
cacontology-production:recordingCapability
cacontology-production:recordingQuality
cacontology-production:resultingContent
cacontology-production:sessionCount
cacontology-production:sessionDuration
cacontology-production:sessionLocation
cacontology-production:storageCapacity
cacontology-production:surveillanceAngle
cacontology-production:systematicNature
cacontology-production:totalContentVolume
cacontology-production:triggeredInvestigation
cacontology-production:usesEquipment
cacontology-production:victimAge
cacontology-production:victimAgeProgression
cacontology-production:victimAwareness
cacontology-production:victimCount
cacontology-production:videoCount
cacontology-recruitment:academicPerformanceLevel
cacontology-recruitment:attendanceRate
cacontology-recruitment:attendsSchool
cacontology-recruitment:averageRecruitmentTime
cacontology-recruitment:contactsLawEnforcement
cacontology-recruitment:employedAt
cacontology-recruitment:exhibitsVulnerability
cacontology-recruitment:exploitsVulnerability
cacontology-recruitment:facilitatedBy
cacontology-recruitment:gradeLevel
cacontology-recruitment:includesRecruitingVictim
cacontology-recruitment:introducesTo
cacontology-recruitment:mandatoryReportingTrigger
cacontology-recruitment:mitigatesVulnerability
cacontology-recruitment:networkSize
cacontology-recruitment:operatesInNetwork
cacontology-recruitment:receivesReport
cacontology-recruitment:recruitmentAttempts
cacontology-recruitment:recruitsVictim
cacontology-recruitment:reportingDelay
cacontology-recruitment:reportingStaffRole
cacontology-recruitment:reportsToSchool
cacontology-recruitment:schoolType
cacontology-recruitment:schoolsInvolved
cacontology-recruitment:socioeconomicLevel
cacontology-recruitment:studentPopulation
cacontology-recruitment:successfulRecruitments
cacontology-recruitment:targetsSchool
cacontology-recruitment:triggersInvestigation
cacontology-recruitment:victimRecruitersCount
cacontology-recruitment:vulnerabilityScore
cacontology-registry:ageAcknowledgmentMethod
cacontology-registry:arrestTiming
cacontology-registry:attendsSchool
cacontology-registry:basedOnOffense
cacontology-registry:complianceType
cacontology-registry:contentTypesReceived
cacontology-registry:contentTypesSent
cacontology-registry:convictionDate
cacontology-registry:coordinatedWithCompliance
cacontology-registry:coordinatesBetweenAgencies
cacontology-registry:coordinationTimeframe
cacontology-registry:crossesStates
cacontology-registry:dateOfBirth
cacontology-registry:demonstratesAgeAwareness
cacontology-registry:employedAt
cacontology-registry:executedAt
cacontology-registry:executedDuring
cacontology-registry:exhibitsRecidivism
cacontology-registry:expirationDate
cacontology-registry:exploitationDurationMonths
cacontology-registry:eyeColor
cacontology-registry:fullName
cacontology-registry:hairColor
cacontology-registry:hasAlias
cacontology-registry:hasCompliance
cacontology-registry:hasOnlineIdentifier
cacontology-registry:hasProfile
cacontology-registry:hasRegistrationRecord
cacontology-registry:height
cacontology-registry:involvesBidirectionalExchange
cacontology-registry:involvesHighVolumeExploitation
cacontology-registry:involvesPattern
cacontology-registry:lastUpdate
cacontology-registry:lifetimeRegistration
cacontology-registry:lifetimeSupervision
cacontology-registry:managedBy
cacontology-registry:mandatoryMinimumYears
cacontology-registry:maximumSentenceYears
cacontology-registry:messageCount
cacontology-registry:offenseDescription
cacontology-registry:ownsVehicle
cacontology-registry:postRegistrationEvent
cacontology-registry:priorConvictionCount
cacontology-registry:race
cacontology-registry:recidivismPattern
cacontology-registry:recoversEvidence
cacontology-registry:registeredIn
cacontology-registry:registrationDate
cacontology-registry:registrationFrequency
cacontology-registry:registrationNumber
cacontology-registry:residesAt
cacontology-registry:sentenceLength
cacontology-registry:sentenceServed
cacontology-registry:sex
cacontology-registry:socialSecurityNumber
cacontology-registry:subjectToRestriction
cacontology-registry:targetsCrossState
cacontology-registry:tier
cacontology-registry:triggersInvestigation
cacontology-registry:verifiedBy
cacontology-registry:victimAge
cacontology-registry:victimAgeAcknowledged
cacontology-registry:victimCount
cacontology-registry:victimRelationship
cacontology-registry:violationCategory
cacontology-registry:weight
cacontology-registry:yearsBetweenOffenses
cacontology-sentencing:appliesTo
cacontology-sentencing:bailStatus
cacontology-sentencing:concurrentWith
cacontology-sentencing:currentPhase
cacontology-sentencing:hasCharge
cacontology-sentencing:hasLegalPhase
cacontology-sentencing:hasPhaseBeginPoint
cacontology-sentencing:hasPhaseEndPoint
cacontology-sentencing:hasProceedingBeginPoint
cacontology-sentencing:hasProceedingEndPoint
cacontology-sentencing:hasRole
cacontology-sentencing:hasRoleBeginPoint
cacontology-sentencing:hasRoleEndPoint
cacontology-sentencing:hasSentenceBeginPoint
cacontology-sentencing:hasSentenceEndPoint
cacontology-sentencing:involvesChargeCount
cacontology-sentencing:involvesParticipantCount
cacontology-sentencing:participatesInProceeding
cacontology-sentencing:phaseDuration
cacontology-sentencing:proceedingDuration
cacontology-sentencing:resultsSentence
cacontology-sentencing:roleDuration
cacontology-sentencing:sentenceConcurrency
cacontology-sentencing:sentenceDuration
cacontology-sentencing:situationComplexity
cacontology-sentencing:transitionsToPhase
cacontology-sextortion:actualAge
cacontology-sextortion:analyzesDevice
cacontology-sextortion:claimedAge
cacontology-sextortion:conductsOnPlatform
cacontology-sextortion:containsCommunication
cacontology-sextortion:conversationCount
cacontology-sextortion:conversationLength
cacontology-sextortion:demandType
cacontology-sextortion:deviceCount
cacontology-sextortion:employsThreat
cacontology-sextortion:escalationSpeed
cacontology-sextortion:evidenceRecovered
cacontology-sextortion:explicitnessLevel
cacontology-sextortion:falsePersonaType
cacontology-sextortion:followsProgression
cacontology-sextortion:giftCardType
cacontology-sextortion:identifiesVictim
cacontology-sextortion:imageType
cacontology-sextortion:incidentDuration
cacontology-sextortion:investigatedBy
cacontology-sextortion:involvesDeception
cacontology-sextortion:makesDemand
cacontology-sextortion:monetaryAmount
cacontology-sextortion:nextPhase
cacontology-sextortion:previousPhase
cacontology-sextortion:progressionStage
cacontology-sextortion:providesEvidence
cacontology-sextortion:reconstructsConversation
cacontology-sextortion:resultsinCharge
cacontology-sextortion:threatFollowThrough
cacontology-sextortion:threatSpecificity
cacontology-sextortion:threatType
cacontology-sextortion:triggersPhase
cacontology-sextortion:usesManipulation
cacontology-sextortion:utilizesFeature
cacontology-sextortion:victimAgeGroup
cacontology-sextortion:victimCount
cacontology-specialized:hasOperationBeginPoint
cacontology-specialized:hasOperationEndPoint
cacontology-specialized:hasPhaseBeginPoint
cacontology-specialized:hasPhaseEndPoint
cacontology-specialized:hasRoleBeginPoint
cacontology-specialized:hasRoleEndPoint
cacontology-specialized:hasUnitBeginPoint
cacontology-specialized:hasUnitEndPoint
cacontology-specialized:operationDuration
cacontology-specialized:phaseDuration
cacontology-specialized:roleDuration
cacontology-specialized:unitDuration
cacontology-strategy:dependsOnPattern
cacontology-strategy:extendsPattern
cacontology-strategy:hasIntegrationPattern
cacontology-strategy:hasIntegrationPriority
cacontology-strategy:hasIntegrationTimeline
cacontology-strategy:hasValidationQuery
cacontology-strategy:hasValidationRule
cacontology-strategy:requiresValidation
cacontology-street:administrationMethod
cacontology-street:apparentAge
cacontology-street:approachMethod
cacontology-street:assessesVulnerability
cacontology-street:contactDuration
cacontology-street:conversationTopic
cacontology-street:distanceFromContact
cacontology-street:distressIndicators
cacontology-street:documentsRecruitment
cacontology-street:economicIncentive
cacontology-street:escalatesTo
cacontology-street:escalationTimeframe
cacontology-street:exhibitsIndicator
cacontology-street:explicitnessLevel
cacontology-street:exploitationLocation
cacontology-street:exploitsVulnerability
cacontology-street:facilitatesTransition
cacontology-street:facilitatesWithSubstance
cacontology-street:followUpDelay
cacontology-street:followUpMethod
cacontology-street:followsUpWith
cacontology-street:helpOfferType
cacontology-street:impairmentLevel
cacontology-street:initialContactLocation
cacontology-street:initiatesContact
cacontology-street:isolatesAt
cacontology-street:isolationLevel
cacontology-street:makesProposition
cacontology-street:moneyAmountMentioned
cacontology-street:occursAt
cacontology-street:persistenceLevel
cacontology-street:persistsAfter
cacontology-street:pretextUsed
cacontology-street:propositionType
cacontology-street:reinforcementAttempts
cacontology-street:reinforces
cacontology-street:rejects
cacontology-street:reportingDelay
cacontology-street:reportingMethod
cacontology-street:reportsTo
cacontology-street:resistanceLevel
cacontology-street:respondsTo
cacontology-street:responseType
cacontology-street:sameDayProgression
cacontology-street:substanceType
cacontology-street:supportsCharge
cacontology-street:targetsVictim
cacontology-street:transitionsTo
cacontology-street:transportationMethod
cacontology-street:usesPretext
cacontology-street:vulnerabilityIndicators
cacontology-tactical:afterActionReport
cacontology-tactical:backupTeamAvailable
cacontology-tactical:briefingConducted
cacontology-tactical:commandedBy
cacontology-tactical:deployedDuring
cacontology-tactical:entryMethod
cacontology-tactical:equipmentType
cacontology-tactical:evacuationRequired
cacontology-tactical:flightRisk
cacontology-tactical:forceUsed
cacontology-tactical:injuriesOccurred
cacontology-tactical:mediaPresent
cacontology-tactical:negotiationAttempted
cacontology-tactical:negotiationDuration
cacontology-tactical:negotiationOutcome
cacontology-tactical:operatedBy
cacontology-tactical:operationAuthorization
cacontology-tactical:operationDuration
cacontology-tactical:operationLocation
cacontology-tactical:operationOutcome
cacontology-tactical:operationType
cacontology-tactical:participatingMember
cacontology-tactical:perimeterEstablished
cacontology-tactical:planningDuration
cacontology-tactical:propertyDamage
cacontology-tactical:publicSafetyThreat
cacontology-tactical:resistanceEncountered
cacontology-tactical:riskLevel
cacontology-tactical:specialApprovalRequired
cacontology-tactical:standoffDuration
cacontology-tactical:suicidalRisk
cacontology-tactical:suspectsArrested
cacontology-tactical:teamSize
cacontology-tactical:threatLevel
cacontology-tactical:useOfForceJustified
cacontology-tactical:weaponsDeployed
cacontology-tactical:weaponsPossible
cacontology-taskforce:accessibleVia
cacontology-taskforce:agencyCount
cacontology-taskforce:agencyType
cacontology-taskforce:arrestsSince2006
cacontology-taskforce:arrestsSince2019
cacontology-taskforce:assignedToUnit
cacontology-taskforce:capabilityLevel
cacontology-taskforce:certificationStatus
cacontology-taskforce:certificationValid
cacontology-taskforce:certifiedIn
cacontology-taskforce:collaboratesWith
cacontology-taskforce:commandedBy
cacontology-taskforce:completionRate
cacontology-taskforce:conductedBy
cacontology-taskforce:coordinatedBy
cacontology-taskforce:coordinatedThrough
cacontology-taskforce:coordinatesWith
cacontology-taskforce:coordinatesWithCivilian
cacontology-taskforce:coordinationDuration
cacontology-taskforce:coordinationLevel
cacontology-taskforce:coordinationModel
cacontology-taskforce:countyName
cacontology-taskforce:coverageArea
cacontology-taskforce:coverageType
cacontology-taskforce:cyberTipsProcessed
cacontology-taskforce:cyberTipsReceived
cacontology-taskforce:cyberTipsSince2019
cacontology-taskforce:dojGrantFunded
cacontology-taskforce:emailAddress
cacontology-taskforce:establishmentDate
cacontology-taskforce:experienceLevel
cacontology-taskforce:federalPartner
cacontology-taskforce:handledInvestigation
cacontology-taskforce:hasContactInformation
cacontology-taskforce:hasMember
cacontology-taskforce:hasMetrics
cacontology-taskforce:hasOperationPhaseBeginPoint
cacontology-taskforce:hasOperationPhaseEndPoint
cacontology-taskforce:hasRegionalTaskForce
cacontology-taskforce:hasRoleBeginPoint
cacontology-taskforce:hasRoleEndPoint
cacontology-taskforce:hasUnit
cacontology-taskforce:hostJurisdictionLevel
cacontology-taskforce:hostOrganizationType
cacontology-taskforce:hostedBy
cacontology-taskforce:hostsTaskForce
cacontology-taskforce:hotlineType
cacontology-taskforce:includesTaskForce
cacontology-taskforce:involvedUnit
cacontology-taskforce:jurisdictionPopulation
cacontology-taskforce:leadsUnit
cacontology-taskforce:localPartner
cacontology-taskforce:maintainsWebsite
cacontology-taskforce:managedByCoordination
cacontology-taskforce:measuresPerformance
cacontology-taskforce:memberCount
cacontology-taskforce:memberRole
cacontology-taskforce:metropolitanArea
cacontology-taskforce:militaryBranches
cacontology-taskforce:militaryJurisdiction
cacontology-taskforce:nationalCoveragePercentage
cacontology-taskforce:nationalHotlineNumber
cacontology-taskforce:nationalTaskForceNetwork
cacontology-taskforce:operatesHotline
cacontology-taskforce:operationDuration
cacontology-taskforce:operationOutcome
cacontology-taskforce:operationPhaseDuration
cacontology-taskforce:operationScale
cacontology-taskforce:operationType
cacontology-taskforce:organizationName
cacontology-taskforce:parentsEducated
cacontology-taskforce:participatedIn
cacontology-taskforce:participatingUnits
cacontology-taskforce:partnerAgencyCount
cacontology-taskforce:partnersWith
cacontology-taskforce:performancePeriod
cacontology-taskforce:phoneNumber
cacontology-taskforce:professionalsTrained
cacontology-taskforce:providesRegionalCoverage
cacontology-taskforce:providesTraining
cacontology-taskforce:receivedTraining
cacontology-taskforce:regionCovered
cacontology-taskforce:regionalTaskForceCount
cacontology-taskforce:reportingYear
cacontology-taskforce:resourceCapacity
cacontology-taskforce:servesCounty
cacontology-taskforce:servesMetropolitanArea
cacontology-taskforce:servesMilitaryBranch
cacontology-taskforce:sexualPredatorArrests
cacontology-taskforce:sharesResourcesWith
cacontology-taskforce:sharingAgreement
cacontology-taskforce:sharingDuration
cacontology-taskforce:sharingType
cacontology-taskforce:specializationArea
cacontology-taskforce:statesWithMultipleTaskForces
cacontology-taskforce:studentsEducated
cacontology-taskforce:supportedInvestigation
cacontology-taskforce:taskForceId
cacontology-taskforce:taskForceNumber
cacontology-taskforce:teachersEducated
cacontology-taskforce:totalTaskForces
cacontology-taskforce:trainingDuration
cacontology-taskforce:trainingType
cacontology-taskforce:websiteURL
cacontology-taskforce:yearOverYearIncrease
cacontology-taskforce:yearsOfService
cacontology-temporal:EvidencePreservationDeadline
cacontology-temporal:StatuteOfLimitationsDeadline
cacontology-temporal:WarrantExpirationDate
cacontology-temporal:ageSubject
cacontology-temporal:concernsAgeQuality
cacontology-temporal:createsSuspension
cacontology-temporal:hasActiveDuration
cacontology-temporal:hasAgeInYears
cacontology-temporal:hasConsequentEvent
cacontology-temporal:hasLegalDeadline
cacontology-temporal:hasMaximumDuration
cacontology-temporal:hasMinimumDuration
cacontology-temporal:hasParallelEvent
cacontology-temporal:hasPrerequisiteEvent
cacontology-temporal:hasSuspendedDuration
cacontology-temporal:hasTimeToFirstAction
cacontology-temporal:hasTimeToResolution
cacontology-temporal:hasTypicalDuration
cacontology-temporal:phaseCompletionRate
cacontology-temporal:phaseEfficiency
cacontology-temporal:resumes
cacontology-temporal:suspends
cacontology-temporal:temporallyContains
cacontology-temporal:temporallyOverlapsWith
cacontology-temporal:temporallyPrecedes
cacontology-temporal:terminatesSuspension
cacontology-temporal:transitionsFrom
cacontology-temporal:transitionsTo
cacontology-temporal:triggersTransition
cacontology-temporal:urgencyLevel
cacontology-trafficking:controlsVictim
cacontology-trafficking:crossesJurisdiction
cacontology-trafficking:destinationLocation
cacontology-trafficking:earningsAmount
cacontology-trafficking:earningsPeriod
cacontology-trafficking:enterpriseDuration
cacontology-trafficking:hasControlMethod
cacontology-trafficking:hasEnterpriseBeginPoint
cacontology-trafficking:hasEnterpriseEndPoint
cacontology-trafficking:hasEnterprisePhase
cacontology-trafficking:hasHierarchyLevel
cacontology-trafficking:hasPhaseBeginPoint
cacontology-trafficking:hasPhaseEndPoint
cacontology-trafficking:hasRoleBeginPoint
cacontology-trafficking:hasRoleEndPoint
cacontology-trafficking:involvesJurisdictionCount
cacontology-trafficking:involvesTraffickerCount
cacontology-trafficking:involvesVictimCount
cacontology-trafficking:operatesInJurisdiction
cacontology-trafficking:originLocation
cacontology-trafficking:phaseDuration
cacontology-trafficking:requiresCoordination
cacontology-trafficking:roleDuration
cacontology-trafficking:situationComplexity
cacontology-trafficking:transitionsToPhase
cacontology-trafficking:transportationMethod
cacontology-trafficking:vulnerabilityExploited
cacontology-training:assessedBy
cacontology-training:buildsCapacityFor
cacontology-training:capacityLevel
cacontology-training:certificationStatus
cacontology-training:certificationValidityPeriod
cacontology-training:certifiedBy
cacontology-training:competencyLevel
cacontology-training:completionRate
cacontology-training:deliveredBy
cacontology-training:hasPhaseBeginPoint
cacontology-training:hasPhaseEndPoint
cacontology-training:hasRoleBeginPoint
cacontology-training:hasRoleEndPoint
cacontology-training:hasTrainingBeginPoint
cacontology-training:hasTrainingEndPoint
cacontology-training:improvesProficiency
cacontology-training:includedInCurriculum
cacontology-training:k9PublicPresentations
cacontology-training:k9SearchWarrantsAssisted
cacontology-training:mentors
cacontology-training:operationalDeploymentCount
cacontology-training:outreachEventsCount
cacontology-training:participatedIn
cacontology-training:participationRate
cacontology-training:phaseDuration
cacontology-training:professionalsTrained
cacontology-training:professionalsTrainedCount
cacontology-training:roleDuration
cacontology-training:skillsAcquired
cacontology-training:supportedBy
cacontology-training:totalAttendeesReached
cacontology-training:trainingDuration
cacontology-training:trainingEffectiveness
cacontology-training:trainingLanguage
cacontology-training:trainingReachCount
cacontology-training:trainingToOperationEffectiveness
cacontology-training:validatesSkills
cacontology-undercover:advertisementLiveTime
cacontology-undercover:advertisementURL
cacontology-undercover:agentOperatesAs
cacontology-undercover:apartmentType
cacontology-undercover:backstoryDetails
cacontology-undercover:backupTeamAssigned
cacontology-undercover:chatDurationHours
cacontology-undercover:chatPlatformType
cacontology-undercover:chatRoomTopic
cacontology-undercover:clientContactMethod
cacontology-undercover:communicationMethod
cacontology-undercover:communicationPlatform
cacontology-undercover:conductedOnPlatform
cacontology-undercover:containsCriminalContent
cacontology-undercover:conversationCount
cacontology-undercover:coversTimeframe
cacontology-undercover:documentsViolationAt
cacontology-undercover:emergencySignal
cacontology-undercover:evidenceCollected
cacontology-undercover:evidentiaryValue
cacontology-undercover:floorLevel
cacontology-undercover:generatesEvidence
cacontology-undercover:handledBy
cacontology-undercover:hasOperationPhaseBeginPoint
cacontology-undercover:hasOperationPhaseEndPoint
cacontology-undercover:hasRoleBeginPoint
cacontology-undercover:hasRoleEndPoint
cacontology-undercover:hasSecureExit
cacontology-undercover:identificationSuccessRate
cacontology-undercover:identifiesPredator
cacontology-undercover:identifiesVictimPhotos
cacontology-undercover:infiltrationDuration
cacontology-undercover:instructionType
cacontology-undercover:interceptsInstruction
cacontology-undercover:investigatesViolation
cacontology-undercover:involvesChatInvestigation
cacontology-undercover:judicialAuthorization
cacontology-undercover:leadsToDevelopment
cacontology-undercover:leadsToSolicitation
cacontology-undercover:maintainsSurveillance
cacontology-undercover:meetingSolicitationAttempts
cacontology-undercover:monitorsPhoneCommunication
cacontology-undercover:operatesAtLocation
cacontology-undercover:operatesUnderIdentity
cacontology-undercover:operationClassification
cacontology-undercover:operationOutcome
cacontology-undercover:operationPhaseDuration
cacontology-undercover:participantCount
cacontology-undercover:personaAge
cacontology-undercover:personaGender
cacontology-undercover:personaLocation
cacontology-undercover:personaProfile
cacontology-undercover:phoneNumberMonitored
cacontology-undercover:platformUsername
cacontology-undercover:portraysAge
cacontology-undercover:predatorContactAttempts
cacontology-undercover:respondsToAdvertisement
cacontology-undercover:safetyProtocol
cacontology-undercover:socialMediaPlatformsUsed
cacontology-undercover:supervisoryApproval
cacontology-undercover:surveillanceTeamCount
cacontology-undercover:targetBehaviorType
cacontology-undercover:targetsIndividual
cacontology-undercover:targetsSubject
cacontology-undercover:utilizesPersona
cacontology-undercover:victimPhotoCount
cacontology-undercover:violationLocation
cacontology-undercover:violationType
cacontology-undercover:websitePlatform
cacontology-us-ncmec:accountConfidence
cacontology-us-ncmec:analysisConfidence
cacontology-us-ncmec:analysisOf
cacontology-us-ncmec:cooperationLevel
cacontology-us-ncmec:dataProvided
cacontology-us-ncmec:enrichmentType
cacontology-us-ncmec:hasNCMECIncidentType
cacontology-us-ncmec:hasNCMECReportAnnotation
cacontology-us-ncmec:identifiedContent
cacontology-us-ncmec:incidentCode
cacontology-us-ncmec:indicatorStrength
cacontology-us-ncmec:involvesPlatform
cacontology-us-ncmec:linkedToAccount
cacontology-us-ncmec:phoneVerificationStatus
cacontology-us-ncmec:platformResponseTime
cacontology-us-ncmec:priorityLevel
cacontology-us-ncmec:processedTip
cacontology-us-ncmec:processingTime
cacontology-us-ncmec:referralJurisdiction
cacontology-us-ncmec:resultedInInvestigation
cacontology-us-ncmec:supportedBy
cacontology-us-ncmec:tracedToPhone
cacontology-us-ncmec:transferFrequency
cacontology-us-ncmec:transferVolume
cacontology-us-ncmec:triggerCriteria
cacontology-us-ncmec:triggeredBy
cacontology-us-ncmec:urgencyLevel
cacontology-us-ncmec:validationStatus
cacontology-usa-federal:collaboratesWith
cacontology-usa-federal:collectsEvidence
cacontology-usa-federal:crimeJurisdiction
cacontology-usa-federal:crimeSeverityLevel
cacontology-usa-federal:defendedBy
cacontology-usa-federal:followsPhase
cacontology-usa-federal:foreignCountriesInvolved
cacontology-usa-federal:hasDivision
cacontology-usa-federal:hasInterstateNexus
cacontology-usa-federal:hasLegalPhase
cacontology-usa-federal:hasPhaseBeginPoint
cacontology-usa-federal:hasPhaseEndPoint
cacontology-usa-federal:hasProsecutionBeginPoint
cacontology-usa-federal:hasProsecutionEndPoint
cacontology-usa-federal:hasRoleBeginPoint
cacontology-usa-federal:hasRoleEndPoint
cacontology-usa-federal:investigatedBy
cacontology-usa-federal:involvesDigitalEvidence
cacontology-usa-federal:involvesInternationalElements
cacontology-usa-federal:involvesMultipleStates
cacontology-usa-federal:isPhaseOf
cacontology-usa-federal:mandatoryMinimumSentence
cacontology-usa-federal:phaseDuration
cacontology-usa-federal:precedesPhase
cacontology-usa-federal:prosecutedBy
cacontology-usa-federal:prosecutionComplexity
cacontology-usa-federal:prosecutionDuration
cacontology-usa-federal:prosecutionSeverity
cacontology-usa-federal:prosecutionStatus
cacontology-usa-federal:requiresForensicAnalysis
cacontology-usa-federal:requiresRole
cacontology-usa-federal:roleDuration
cacontology-usa-federal:roleExperience
cacontology-usa-federal:roleSpecialization
cacontology-usa-federal:usesEvidence
cacontology-usa-federal:victimizedBy
cacontology1:conspiracyDuration
cacontology1:conspiracyMemberCount
cacontology1:currentPhase
cacontology1:depictsChild
cacontology1:hasAgeSituation
cacontology1:hasOffenderAgeSituation
cacontology1:hasPhase
cacontology1:hasPhaseBeginPoint
cacontology1:hasPhaseEndPoint
cacontology1:hasRoleBeginPoint
cacontology1:hasRoleEndPoint
cacontology1:hasStep
cacontology1:hasVictimAgeSituation
cacontology1:indictmentCounts
cacontology1:investigationStatus
cacontology1:involvesOffender
cacontology1:involvesVictim
cacontology1:leadsConspiracy
cacontology1:legalInstrument
cacontology1:nextStep
cacontology1:occursDuringPhase
cacontology1:participatesInConspiracy
cacontology1:phaseDuration
cacontology1:phaseProgress
cacontology1:previousStep
cacontology1:producesArtifact
cacontology1:rescuedVictim
cacontology1:resultsinIndictment
cacontology1:severityLevel
cacontology1:submittedTo
cacontology1:targetsService
cacontology1:transitionsTo
cacontology1:usesChannel
cacontology1:usesClassification
hotline:assignedRole
hotline:classification
hotline:coordinationBeginTime
hotline:currentPhase
hotline:feedbackType
hotline:firstSeen
hotline:forwardsTo
hotline:foundAtURL
hotline:hasEvidence
hotline:hasPhaseTransition
hotline:intakeChannel
hotline:involvesCoordination
hotline:isAnonymous
hotline:linkedInvestigation
hotline:phaseBeginTime
hotline:phaseDuration
hotline:phaseEndTime
hotline:playsRole
hotline:producesHash
hotline:receivedBy
hotline:referencesHash
hotline:reportedBy
hotline:roleAssignmentTime
hotline:status
hotline:triggersAction
Shapes (1337)
cacontology-ai:AICSAMInvestigationShape
cacontology-ai:AIContentDetectionShape
cacontology-ai:AIContentGenerationShape
cacontology-ai:AIContentInvestigationSituationShape
cacontology-ai:AIDetectionPhaseShape
cacontology-ai:AIDetectionToolShape
cacontology-ai:AIForensicAnalystShape
cacontology-ai:AIGeneratedCSAMShape
cacontology-ai:AIGenerationCrossReferenceShape
cacontology-ai:AntiRigidityValidationShape
cacontology-ai:ContentGenerationPhaseShape
cacontology-ai:DeepfakeCSAMShape
cacontology-ai:DetectionSequenceValidationShape
cacontology-ai:DetectionToolCrossReferenceShape
cacontology-ai:ForensicIntegrityValidationShape
cacontology-ai:GUFODataQualityShape
cacontology-ai:GUFOTemporalValidationShape
cacontology-ai:HybridCSAMShape
cacontology-ai:ModelTrainingShape
cacontology-ai:SyntheticMediaAnalysisShape
cacontology-ai:SyntheticMediaCSAMShape
cacontology-ai:SyntheticMediaExaminerShape
cacontology-ai:TechnicalAnalysisSituationShape
cacontology-asset-forfeiture:AntiRigidityValidationShape
cacontology-asset-forfeiture:AssetForfeitureActionShape
cacontology-asset-forfeiture:AssetForfeitureOfficerShape
cacontology-asset-forfeiture:AssetIdentificationPhaseShape
cacontology-asset-forfeiture:AssetTargetingCrossReferenceShape
cacontology-asset-forfeiture:AssetValuationExpertShape
cacontology-asset-forfeiture:CACTInvestigationShape
cacontology-asset-forfeiture:CompleteForfeitureShape
cacontology-asset-forfeiture:CriminalAssetsConfiscationTaskforceShape
cacontology-asset-forfeiture:FinancialAccountShape
cacontology-asset-forfeiture:FinancialPenaltyActionShape
cacontology-asset-forfeiture:ForensicAccountantShape
cacontology-asset-forfeiture:GUFODataQualityShape
cacontology-asset-forfeiture:GUFOTemporalValidationShape
cacontology-asset-forfeiture:JurisdictionalCoordinationShape
cacontology-asset-forfeiture:LegalIntegrityValidationShape
cacontology-asset-forfeiture:LegalProceedingsPhaseShape
cacontology-asset-forfeiture:LegalProceedingsSituationShape
cacontology-asset-forfeiture:MultiStateForfeitureShape
cacontology-asset-forfeiture:PartialForfeitureShape
cacontology-asset-forfeiture:PhaseSequenceValidationShape
cacontology-asset-forfeiture:PrecedentValidationShape
cacontology-asset-forfeiture:PropertyForfeitureActionShape
cacontology-asset-forfeiture:PropertyRestraintActionShape
cacontology-asset-forfeiture:RecoveryPhaseShape
cacontology-asset-forfeiture:ResidentialPropertyShape
cacontology-asset-forfeiture:RestraintPhaseShape
cacontology-asset-forfeiture:TaskforceInvolvementCrossReferenceShape
cacontology-asset-forfeiture:TechnicalEquipmentShape
cacontology-athletic:AntiRigidityValidationShape
cacontology-athletic:AthleticCoachRoleShape
cacontology-athletic:AthleticCoachingExploitationShape
cacontology-athletic:AthleticExploitationCrossReferenceShape
cacontology-athletic:AthleticExploitationDiscoveryShape
cacontology-athletic:AthleticFacilityExploitationShape
cacontology-athletic:AthleticFacilityShape
cacontology-athletic:AuthorityEstablishmentPhaseShape
cacontology-athletic:CoachingIntegrityValidationShape
cacontology-athletic:ConditioningCoercionShape
cacontology-athletic:DiscoveryPhaseShape
cacontology-athletic:DualCoachingRoleExploitationShape
cacontology-athletic:ExhaustionBasedCoercionShape
cacontology-athletic:ExploitationPhaseShape
cacontology-athletic:GUFODataQualityShape
cacontology-athletic:GUFOTemporalValidationShape
cacontology-athletic:GroomingPhaseShape
cacontology-athletic:HeadCoachRoleShape
cacontology-athletic:InstitutionalOversightValidationShape
cacontology-athletic:MaterialBenefitCoercionShape
cacontology-athletic:ParentNetworkDiscoveryShape
cacontology-athletic:PhaseSequenceValidationShape
cacontology-athletic:PhysicalCoercionPhaseShape
cacontology-athletic:PhysicalTrainingCoercionShape
cacontology-athletic:RumorCirculationDiscoveryShape
cacontology-athletic:TeamBasedExploitationShape
cacontology-athletic:TeamDynamicsValidationShape
cacontology-athletic:TeamMembershipCoercionShape
cacontology-athletic:TravelTeamCoachRoleShape
cacontology-athletic:TravelTeamExploitationShape
cacontology-case:ActiveInvestigationPhaseShape
cacontology-case:AntiRigidityValidationShape
cacontology-case:CaseAssignmentShape
cacontology-case:CaseDocumentationShape
cacontology-case:CaseInitiationPhaseShape
cacontology-case:CaseManagementCrossReferenceShape
cacontology-case:CaseManagementShape
cacontology-case:CaseManagerRoleShape
cacontology-case:CaseReviewShape
cacontology-case:CaseWorkflowShape
cacontology-case:GUFODataQualityShape
cacontology-case:GUFOTemporalValidationShape
cacontology-case:IntakeWorkflowShape
cacontology-case:MultiJurisdictionalCaseManagementShape
cacontology-case:WorkflowIntegrityValidationShape
cacontology-coord:AgreementValidityShape
cacontology-coord:AssignsLiaisonShape
cacontology-coord:CommunicationProtocolShape
cacontology-coord:CoordinationAgreementShape
cacontology-coord:CoordinationAgreementTemporalShape
cacontology-coord:CoordinationCrossReferenceShape
cacontology-coord:CoordinationEffectivenessSuccessBusinessRule
cacontology-coord:CoordinationEventTypeValidationShape
cacontology-coord:CoordinationMetricsShape
cacontology-coord:CoordinationSituationTypeValidationShape
cacontology-coord:DataQualityShape
cacontology-coord:GovernsAgreementShape
cacontology-coord:InformationSharingParticipationShape
cacontology-coord:InformationSharingSecurityBusinessRule
cacontology-coord:InformationSharingShape
cacontology-coord:IntelligenceSharingShape
cacontology-coord:InvestigationCoordinationParticipationShape
cacontology-coord:InvestigationCoordinationShape
cacontology-coord:InvestigationCoordinationTemporalShape
cacontology-coord:InvolvesAgencyShape
cacontology-coord:JointInvestigationCompositionShape
cacontology-coord:JointInvestigationResourceIntegrationBusinessRule
cacontology-coord:JointInvestigationShape
cacontology-coord:LiaisonAssignmentShape
cacontology-coord:LiaisonAuthorityAlignmentBusinessRule
cacontology-coord:LiaisonOfficerShape
cacontology-coord:LiaisonRoleValidationShape
cacontology-coord:MeasuresPerformanceShape
cacontology-coord:MetricsObjectValidationShape
cacontology-coord:MultiAgencyCompositionShape
cacontology-coord:MultiAgencyCoordinationComplexityBusinessRule
cacontology-coord:PersonnelSharingShape
cacontology-coord:ResourceSharingDurationShape
cacontology-coord:ResourceSharingParticipationShape
cacontology-coord:ResourceSharingShape
cacontology-coord:ResourceSharingTemporalShape
cacontology-coord:SharesInformationShape
cacontology-coord:SharesResourcesShape
cacontology-coord:TaskForceCompositionShape
cacontology-coord:TemporalValidationShape
cacontology-coord:UsesProtocolShape
cacontology-corruption-shapes:AuthorityEnhancementRule
cacontology-corruption-shapes:AuthoritySymbolExploitationShape
cacontology-corruption-shapes:CorruptLawEnforcementOfficerShape
cacontology-corruption-shapes:CorruptOfficerRoleValidationShape
cacontology-corruption-shapes:CorruptionDataQualityShape
cacontology-corruption-shapes:CorruptionEventTypeValidationShape
cacontology-corruption-shapes:CorruptionParticipationShape
cacontology-corruption-shapes:CorruptionTemporalShape
cacontology-corruption-shapes:DetectionActivityTypeValidationShape
cacontology-corruption-shapes:DetectionDifficultyRule
cacontology-corruption-shapes:DetectionParticipationShape
cacontology-corruption-shapes:DetectionTemporalShape
cacontology-corruption-shapes:EvidenceIntegrityRule
cacontology-corruption-shapes:HighSeverityCorruptionRule
cacontology-corruption-shapes:InsiderThreatDetectionShape
cacontology-corruption-shapes:InsiderThreatShape
cacontology-corruption-shapes:LawEnforcementCorruptionShape
cacontology-corruption-shapes:OfficerCareerTemporalShape
cacontology-corruption-shapes:OfficerParticipationShape
cacontology-corruption-shapes:PositionOfAuthorityAbuseShape
cacontology-corruption-shapes:QualifiedCorruptionParticipationShape
cacontology-corruption-shapes:TrustBetrayalRule
cacontology-corruption-shapes:UniformBasedExploitationShape
cacontology-custodial:ActiveCustodyPhaseShape
cacontology-custodial:AuthorityFigureGUFOShape
cacontology-custodial:AuthorityPositionShape
cacontology-custodial:AuthorityRoleExclusivityShape
cacontology-custodial:AuthorizationProcessShape
cacontology-custodial:BackgroundCheckShape
cacontology-custodial:BackgroundCheckValidityShape
cacontology-custodial:CaregiverRelationshipShape
cacontology-custodial:CustodialCrossReferenceShape
cacontology-custodial:CustodialFoundationalTypeShape
cacontology-custodial:CustodialParticipationShape
cacontology-custodial:CustodialRelationshipGUFOShape
cacontology-custodial:CustodialRelationshipShape
cacontology-custodial:CustodialSituationGUFOShape
cacontology-custodial:CustodialTemporalConsistencyShape
cacontology-custodial:CustodyPhaseGUFOShape
cacontology-custodial:DataQualityShape
cacontology-custodial:InvolvesChildShape
cacontology-custodial:InvolvesCustodianShape
cacontology-custodial:NeighborRelationshipShape
cacontology-custodial:PositionOfTrustGUFOShape
cacontology-custodial:PositionOfTrustShape
cacontology-custodial:RequiresAuthorizationShape
cacontology-custodial:ResidentialProximityAccessShape
cacontology-custodial:ResultsInSupervisionFailureShape
cacontology-custodial:SubjectToBackgroundCheckShape
cacontology-custodial:SupervisionFailureShape
cacontology-custodial:TemporalValidationShape
cacontology-custodial:TerminatedCustodyPhaseShape
cacontology-custodial:TrustBreachSituationShape
cacontology-custodial:TrustLevelConsistencyShape
cacontology-custodial:TrustViolationGUFOShape
cacontology-custodial:TrustViolationShape
cacontology-custodial:ViolatesPositionShape
cacontology-detection:AutomatedDetectionActionGUFOShape
cacontology-detection:COPINEClassificationGUFOShape
cacontology-detection:ClassificationActionResultCrossReferenceShape
cacontology-detection:ClassificationResultObjectShape
cacontology-detection:ClassificationSchemeGUFOShape
cacontology-detection:ConfidenceScoreValidationShape
cacontology-detection:ContentHashingActionGUFOShape
cacontology-detection:ContentHashingToolGUFOShape
cacontology-detection:DatabaseMatchInputCrossReferenceShape
cacontology-detection:DetectionActionGUFOShape
cacontology-detection:DetectionActionResultCrossReferenceShape
cacontology-detection:DetectionDataQualityShape
cacontology-detection:DetectionFoundationalTypeShape
cacontology-detection:DetectionPhaseGUFOShape
cacontology-detection:DetectionPhaseSequenceShape
cacontology-detection:DetectionResultGUFOShape
cacontology-detection:DetectionResultObjectShape
cacontology-detection:DetectionRoleGUFOShape
cacontology-detection:DetectionRoleParticipationShape
cacontology-detection:DetectionSituationGUFOShape
cacontology-detection:DetectionTemporalConsistencyShape
cacontology-detection:DetectionToolGUFOShape
cacontology-detection:DetectionWorkflowTemporalShape
cacontology-detection:HashArtifactGUFOShape
cacontology-detection:HashFormatValidationShape
cacontology-detection:HashingActionResultCrossReferenceShape
cacontology-detection:MachineLearningDetectionToolGUFOShape
cacontology-detection:ManualClassificationActionGUFOShape
cacontology-detection:MassContentAnalysisSituationShape
cacontology-detection:PerceptualHashGUFOShape
cacontology-detection:PhotoDNAHashGUFOShape
cacontology-detection:SARClassificationGUFOShape
cacontology-educational:shapes/AcademicIntimidationGUFOShape
cacontology-educational:shapes/AcademicTermPhaseGUFOShape
cacontology-educational:shapes/AssignmentHarassmentGUFOShape
cacontology-educational:shapes/ClassroomExploitationContextGUFOShape
cacontology-educational:shapes/CrossReferenceValidationShape
cacontology-educational:shapes/DataQualityValidationShape
cacontology-educational:shapes/EducationalExploitationSituationGUFOShape
cacontology-educational:shapes/EducationalInstitutionGUFOShape
cacontology-educational:shapes/EducationalInvestigationGUFOShape
cacontology-educational:shapes/EducatorPerpetratedExploitationGUFOShape
cacontology-educational:shapes/EducatorRoleGUFOShape
cacontology-educational:shapes/EliteEducationalInstitutionGUFOShape
cacontology-educational:shapes/EmploymentPhaseGUFOShape
cacontology-educational:shapes/EvidenceObjectGUFOShape
cacontology-educational:shapes/FoundationalTypeComplianceShape
cacontology-educational:shapes/InstitutionalResponseSituationGUFOShape
cacontology-educational:shapes/IntermediateSchoolGUFOShape
cacontology-educational:shapes/MathTeacherRoleGUFOShape
cacontology-educational:shapes/MultiVictimExploitationSituationGUFOShape
cacontology-educational:shapes/RoleParticipationValidationShape
cacontology-educational:shapes/TemporalConsistencyValidationShape
cacontology-educational:shapes/WrittenHarassmentGUFOShape
cacontology-enterprises:AlternateAccountSystemShape
cacontology-enterprises:ChildExploitationEnterpriseShape
cacontology-enterprises:CoercionSeverityConsistencyShape
cacontology-enterprises:ContentCurrencyBusinessRule
cacontology-enterprises:ContentCurrencySystemShape
cacontology-enterprises:ContentEditingProcessShape
cacontology-enterprises:ContentValueAssessmentShape
cacontology-enterprises:CovertEmployeeOperationShape
cacontology-enterprises:CrossPlatformCoordinationShape
cacontology-enterprises:EncryptedChannelInfiltrationShape
cacontology-enterprises:EncryptedChannelNetworkShape
cacontology-enterprises:EnterpriseHierarchyBusinessRule
cacontology-enterprises:EnterpriseHierarchyShape
cacontology-enterprises:EnterpriseLeadershipValidationShape
cacontology-enterprises:ExtremeDegradationCoercionShape
cacontology-enterprises:GufoCoercionEventValidation
cacontology-enterprises:GufoCollectionMembershipRule
cacontology-enterprises:GufoComponentValidationShape
cacontology-enterprises:GufoEnterpriseStructureValidation
cacontology-enterprises:GufoEventDurationRule
cacontology-enterprises:GufoEventTemporalExistenceRule
cacontology-enterprises:GufoEventTemporalShape
cacontology-enterprises:GufoEventTypeValidationShape
cacontology-enterprises:GufoFunctionalComplexPartRule
cacontology-enterprises:GufoKindIdentityBusinessRule
cacontology-enterprises:GufoKindValidationShape
cacontology-enterprises:GufoMembershipValidationShape
cacontology-enterprises:GufoModeInherentRule
cacontology-enterprises:GufoModeValidationShape
cacontology-enterprises:GufoNetworkCellValidation
cacontology-enterprises:GufoObjectExistenceRule
cacontology-enterprises:GufoParticipationValidationShape
cacontology-enterprises:GufoQualityInherentRule
cacontology-enterprises:GufoQualityValidationShape
cacontology-enterprises:GufoRelatorMediationRule
cacontology-enterprises:GufoRelatorValidationShape
cacontology-enterprises:GufoRoleAntiRigidityRule
cacontology-enterprises:GufoRoleInstantiationValidation
cacontology-enterprises:GufoRoleValidationShape
cacontology-enterprises:GufoSituationFactualRule
cacontology-enterprises:GufoSituationValidationShape
cacontology-enterprises:GufoTemporalConsistencyShape
cacontology-enterprises:GufoTemporalConsistencyValidation
cacontology-enterprises:GufoVictimizationSituationShape
cacontology-enterprises:IdentityCorrelationAnalysisShape
cacontology-enterprises:InnerCoreAccessValidationShape
cacontology-enterprises:InnerCoreShape
cacontology-enterprises:InvestigationQualityBusinessRule
cacontology-enterprises:LorebookContentValidationShape
cacontology-enterprises:LorebookShape
cacontology-enterprises:MembershipAdvancementSystemShape
cacontology-enterprises:MembershipTierShape
cacontology-enterprises:NetworkMappingInvestigationShape
cacontology-enterprises:NetworkSizeConsistencyShape
cacontology-enterprises:NihilisticViolentExtremismNetworkShape
cacontology-enterprises:PlatformCoordinationConsistencyShape
cacontology-enterprises:SelfHarmCoercionShape
cacontology-enterprises:SocialEngineeringCampaignShape
cacontology-enterprises:TrustBuildingProcessShape
cacontology-enterprises:VulnerablePopulationTargetingShape
cacontology-forensics:AutomatedContentAnalysisShape
cacontology-forensics:BehavioralFingerprintingShape
cacontology-forensics:ChainOfCustodyActionShape
cacontology-forensics:ChainOfCustodyIntegrityBusinessRule
cacontology-forensics:ChainOfCustodyTemporalOrderingShape
cacontology-forensics:CrossPlatformCorrelationShape
cacontology-forensics:CustodyDocumentShape
cacontology-forensics:DataQualityShape
cacontology-forensics:ElectronicStorageDeviceDetectionShape
cacontology-forensics:EvidenceCustodianRoleShape
cacontology-forensics:EvidenceTriageSystemShape
cacontology-forensics:EvidenceVerificationActionExtendedShape
cacontology-forensics:EvidenceVerificationActionShape
cacontology-forensics:EvidenceVerificationCompletenessBusinessRule
cacontology-forensics:ExaminerCertificationBusinessRule
cacontology-forensics:ForensicAcquisitionActionExtendedShape
cacontology-forensics:ForensicAcquisitionActionShape
cacontology-forensics:ForensicAcquisitionCrossReferenceShape
cacontology-forensics:ForensicActionTemporalShape
cacontology-forensics:ForensicEventParticipationShape
cacontology-forensics:ForensicEventTypeValidationShape
cacontology-forensics:ForensicExaminerRoleShape
cacontology-forensics:ForensicFunctionalComplexValidationShape
cacontology-forensics:ForensicImageExtendedShape
cacontology-forensics:ForensicImageShape
cacontology-forensics:ForensicInvestigationCompositionShape
cacontology-forensics:ForensicKindValidationShape
cacontology-forensics:ForensicRoleValidationShape
cacontology-forensics:ForensicToolShape
cacontology-forensics:ForensicToolValidationBusinessRule
cacontology-forensics:HasVerificationHashShape
cacontology-forensics:HiddenDeviceRecoveryShape
cacontology-forensics:ImageAnalysisForVictimIDShape
cacontology-forensics:K9AssistedForensicsShape
cacontology-forensics:MassDigitalEvidenceProcessingShape
cacontology-forensics:MassProcessingValidationShape
cacontology-forensics:MetadataExtractionActionShape
cacontology-forensics:MobileForensicToolExtendedShape
cacontology-forensics:ProducesForensicImageShape
cacontology-forensics:RecoveredFileExtendedShape
cacontology-forensics:RecoveredFileShape
cacontology-forensics:ScalableHashAnalysisShape
cacontology-forensics:TemporalConsistencyBusinessRule
cacontology-forensics:TemporalPatternAnalysisShape
cacontology-forensics:TemporalValidationShape
cacontology-forensics:TimelineAnalysisActionShape
cacontology-forensics:UsesForensicToolShape
cacontology-forensics:VerificationTimingShape
cacontology-forensics:VictimIdentificationProcessShape
cacontology-forensics:WriteBlockingValidationShape
cacontology-grooming:BoundaryTestingProgressionBusinessRule
cacontology-grooming:BoundaryTestingShape
cacontology-grooming:CommunicationTacticsShape
cacontology-grooming:EmotionalVulnerabilityShape
cacontology-grooming:EscalationConsistencyBusinessRule
cacontology-grooming:EscalationPatternShape
cacontology-grooming:ExploitsVulnerabilityShape
cacontology-grooming:FollowsPatternShape
cacontology-grooming:GroomingBehaviorShape
cacontology-grooming:GroomingBehaviorTemporalShape
cacontology-grooming:GroomingDataQualityShape
cacontology-grooming:GroomingEventParticipationShape
cacontology-grooming:GroomingEventTypeValidationShape
cacontology-grooming:GroomingPhaseValidationShape
cacontology-grooming:GroomingProcessCompositionShape
cacontology-grooming:GroomingRoleValidationShape
cacontology-grooming:GroomingTemporalValidationShape
cacontology-grooming:IsolationTacticsShape
cacontology-grooming:LeadsToMeetingShape
cacontology-grooming:OnlineOfflineTransitionBusinessRule
cacontology-grooming:OnlineToOfflineProgressionShape
cacontology-grooming:SexualConsequenceGameBusinessRule
cacontology-grooming:SexualConsequenceGameGroomingShape
cacontology-grooming:SocialVulnerabilityShape
cacontology-grooming:TargetsVictimShape
cacontology-grooming:TrustBuildingEffectivenessBusinessRule
cacontology-grooming:TrustBuildingShape
cacontology-grooming:UsesCommunicationShape
cacontology-grooming:VictimVulnerabilityShape
cacontology-grooming:VulnerabilityAspectValidationShape
cacontology-grooming:VulnerabilityExploitationBusinessRule
cacontology-gufo:AgeAtTimeSituationShape
cacontology-gufo:CSAMIncidentShape
cacontology-gufo:ChildSexualAbuseEventShape
cacontology-gufo:CompletedPhaseShape
cacontology-gufo:EventShape
cacontology-gufo:FoundationalTypeConsistencyShape
cacontology-gufo:GroomingSolicitationShape
cacontology-gufo:InitialPhaseShape
cacontology-gufo:InvestigationActiveSituationShape
cacontology-gufo:InvestigationCompletenessShape
cacontology-gufo:InvestigationShape
cacontology-gufo:InvestigationTemporalConsistencyShape
cacontology-gufo:OffenderRoleShape
cacontology-gufo:PhaseShape
cacontology-gufo:PhaseTransitionShape
cacontology-gufo:ReceiveCybertipEventShape
cacontology-gufo:ReviewCybertipEventShape
cacontology-gufo:RoleExclusivityShape
cacontology-gufo:RoleShape
cacontology-gufo:SextortionShape
cacontology-gufo:SituationShape
cacontology-gufo:VictimRescueEventShape
cacontology-gufo:VictimRoleShape
cacontology-impact:AddressesHarmShape
cacontology-impact:AssessesVictimShape
cacontology-impact:AssessmentDateValidationShape
cacontology-impact:ComplexTraumaShape
cacontology-impact:ComprehensiveImpactAssessmentShape
cacontology-impact:DataQualityShape
cacontology-impact:DevelopmentalImpactShape
cacontology-impact:IdentifiesHarmShape
cacontology-impact:ImpactCrossReferenceShape
cacontology-impact:InterventionHarmAlignmentShape
cacontology-impact:LongTermEffectShape
cacontology-impact:ManifestsAsShape
cacontology-impact:PsychologicalHarmShape
cacontology-impact:RecoveryProcessShape
cacontology-impact:RecoveryProgressValidationShape
cacontology-impact:ResilienceFactorShape
cacontology-impact:ResultsInOutcomeShape
cacontology-impact:SupportServiceShape
cacontology-impact:SupportsRecoveryShape
cacontology-impact:TemporalValidationShape
cacontology-impact:TherapeuticInterventionShape
cacontology-impact:TraumaIndicatorShape
cacontology-impact:TraumaTherapyShape
cacontology-impact:TreatmentOutcomeShape
cacontology-impact:UtilizesResilienceShape
cacontology-impact:VictimImpactAssessmentShape
cacontology-infrastructure-shapes:AnalysisEventTemporalShape
cacontology-infrastructure-shapes:AnalysisEventTypeValidationShape
cacontology-infrastructure-shapes:AnalysisParticipationShape
cacontology-infrastructure-shapes:ComprehensiveAnalysisRule
cacontology-infrastructure-shapes:EffectiveTakedownRule
cacontology-infrastructure-shapes:EnhancedAnalysisShape
cacontology-infrastructure-shapes:EnhancedPaymentProcessingShape
cacontology-infrastructure-shapes:EnhancedPlatformInfrastructureShape
cacontology-infrastructure-shapes:EnhancedSecurityInfrastructureShape
cacontology-infrastructure-shapes:EnhancedTakedownShape
cacontology-infrastructure-shapes:HighPerformanceInfrastructureRule
cacontology-infrastructure-shapes:InfrastructureCompositionShape
cacontology-infrastructure-shapes:InfrastructureDataQualityShape
cacontology-infrastructure-shapes:InfrastructureObjectTypeValidationShape
cacontology-infrastructure-shapes:InfrastructureParticipationShape
cacontology-infrastructure-shapes:InfrastructurePhaseTemporalShape
cacontology-infrastructure-shapes:InfrastructurePhaseTypeValidationShape
cacontology-infrastructure-shapes:InfrastructureSituationTypeValidationShape
cacontology-infrastructure-shapes:InfrastructureTemporalShape
cacontology-infrastructure-shapes:SophisticatedFinancialRule
cacontology-infrastructure-shapes:StrongSecurityRule
cacontology-infrastructure-shapes:TakedownEventTemporalShape
cacontology-infrastructure-shapes:TakedownEventTypeValidationShape
cacontology-infrastructure-shapes:TakedownParticipationShape
cacontology-infrastructure-shapes:TechnicalRoleTemporalShape
cacontology-infrastructure-shapes:TechnicalRoleTypeValidationShape
cacontology-infrastructure-shapes:VulnerabilityAssessmentRule
cacontology-infrastructure:AccountFreezingShape
cacontology-infrastructure:AnalysisSubjectCrossReferenceShape
cacontology-infrastructure:AnonymityInfrastructureShape
cacontology-infrastructure:CapacityValidationShape
cacontology-infrastructure:ContentDeliveryNetworkShape
cacontology-infrastructure:CryptocurrencyInfrastructureShape
cacontology-infrastructure:DataMirrorCreationShape
cacontology-infrastructure:DataQualityShape
cacontology-infrastructure:DatabaseInfrastructureShape
cacontology-infrastructure:DomainInfrastructureShape
cacontology-infrastructure:DomainSinkholeingShape
cacontology-infrastructure:EncryptionInfrastructureShape
cacontology-infrastructure:FinancialConsistencyValidationShape
cacontology-infrastructure:FinancialFlowAnalysisShape
cacontology-infrastructure:FinancialObfuscationShape
cacontology-infrastructure:GeographicDistributionShape
cacontology-infrastructure:HostingProviderShape
cacontology-infrastructure:InfrastructureAnalysisShape
cacontology-infrastructure:InfrastructureHostingCrossReferenceShape
cacontology-infrastructure:InfrastructureTakedownShape
cacontology-infrastructure:LoadBalancerShape
cacontology-infrastructure:NetworkInfrastructureShape
cacontology-infrastructure:NetworkTopologyAnalysisShape
cacontology-infrastructure:PaymentProcessingShape
cacontology-infrastructure:PaymentSystemCrossReferenceShape
cacontology-infrastructure:PlatformInfrastructureShape
cacontology-infrastructure:ProxyInfrastructureShape
cacontology-infrastructure:SecurityConsistencyValidationShape
cacontology-infrastructure:SecurityInfrastructureShape
cacontology-infrastructure:ServerInfrastructureShape
cacontology-infrastructure:ServerSeizureShape
cacontology-infrastructure:SubscriptionManagementShape
cacontology-infrastructure:TakedownEffectivenessValidationShape
cacontology-infrastructure:TakedownSequenceValidationShape
cacontology-infrastructure:TakedownTargetCrossReferenceShape
cacontology-infrastructure:TemporalValidationShape
cacontology-infrastructure:UserAccessPatternAnalysisShape
cacontology-institutional:AdultVictimTestimonyShape
cacontology-institutional:CharitableFundingMisuseShape
cacontology-institutional:CharitableOrganizationKindValidationShape
cacontology-institutional:CharitableOrganizationShape
cacontology-institutional:CrossBorderPersonalTravelShape
cacontology-institutional:CrossBorderTravelPatternBusinessRule
cacontology-institutional:DonorManipulationBusinessRule
cacontology-institutional:DonorManipulationShape
cacontology-institutional:ExploitationEventParticipationShape
cacontology-institutional:ExploitationEventTypeValidationShape
cacontology-institutional:ExploitationTemporalShape
cacontology-institutional:ExploitsVulnerabilityShape
cacontology-institutional:FacilitatedByShape
cacontology-institutional:ForeignCommerceOffenseShape
cacontology-institutional:FoundedByShape
cacontology-institutional:HumanitarianTravelCoverShape
cacontology-institutional:InstitutionalCompositionShape
cacontology-institutional:InstitutionalExploitationDataQualityShape
cacontology-institutional:InstitutionalExploitationShape
cacontology-institutional:InstitutionalFounderShape
cacontology-institutional:InstitutionalRoleValidationShape
cacontology-institutional:InstitutionalTemporalBoundariesShape
cacontology-institutional:InvestigationCompositionShape
cacontology-institutional:IsolationBasedControlShape
cacontology-institutional:LegalSituationTypeValidationShape
cacontology-institutional:LongTermControlBusinessRule
cacontology-institutional:LongTermInstitutionalControlShape
cacontology-institutional:MultipleVictimTestimonyShape
cacontology-institutional:OccursWithinShape
cacontology-institutional:OrphanageShape
cacontology-institutional:OrphanedChildShape
cacontology-institutional:PositionOfTrustAbuseShape
cacontology-institutional:RepeatedCrossBorderTravelShape
cacontology-institutional:RoleTemporalBoundariesShape
cacontology-institutional:SystematicAbuseCompositionShape
cacontology-institutional:SystematicAbusePatternBusinessRule
cacontology-institutional:SystematicInstitutionalAbuseShape
cacontology-institutional:TravelEventParticipationShape
cacontology-institutional:TrustAbuseBusinessRule
cacontology-institutional:TrustedAdultRoleShape
cacontology-institutional:USProsecutionForeignCrimesShape
cacontology-institutional:VulnerableChildInCareShape
cacontology-institutional:VulnerableChildPhaseValidationShape
cacontology-international:ACCCEIntegrationShape
cacontology-international:CoordinationComplexityValidationShape
cacontology-international:CountryPartnershipShape
cacontology-international:CrossBorderEventTypeValidationShape
cacontology-international:CrossBorderInvestigationCompositionShape
cacontology-international:CrossBorderInvestigationShape
cacontology-international:CrossBorderOperationCrossReferenceShape
cacontology-international:CrossBorderOperationParticipationShape
cacontology-international:CrossBorderOperationShape
cacontology-international:CrossBorderOperationTemporalShape
cacontology-international:CrossReferralProtocolShape
cacontology-international:DataExchangeProtocolShape
cacontology-international:DataQualityShape
cacontology-international:DistanceChildAbuseShape
cacontology-international:EuropolOperationShape
cacontology-international:ExtraditionAgreementShape
cacontology-international:GlobalCaseTrackingShape
cacontology-international:GlobalHotlineNetworkShape
cacontology-international:GlobalMissingChildrenCenterShape
cacontology-international:GlobalNetworkCompositionShape
cacontology-international:GlobalPlatformTakedownShape
cacontology-international:InformationSharingAgreementShape
cacontology-international:InformationSharingCrossReferenceShape
cacontology-international:InformationSharingLevelBusinessRule
cacontology-international:InformationSharingLevelValidationShape
cacontology-international:InformationSharingParticipationShape
cacontology-international:InstructedAbuseOperationShape
cacontology-international:InternationalAlertShape
cacontology-international:InternationalAlertTemporalShape
cacontology-international:InternationalDatabaseShape
cacontology-international:InternationalHotlineCoordinationShape
cacontology-international:InternationalIntelligenceSharingShape
cacontology-international:InternationalPartnershipKindValidationShape
cacontology-international:InternationalPartnershipParticipationShape
cacontology-international:InternationalPartnershipShape
cacontology-international:InternationalPartnershipTemporalShape
cacontology-international:InternationalReferralCrossReferenceShape
cacontology-international:InternationalReferralShape
cacontology-international:InternationalRoleValidationShape
cacontology-international:InternationalSituationTypeValidationShape
cacontology-international:InternationalTaskForceCompositionShape
cacontology-international:InternationalTaskForceShape
cacontology-international:InternationalWarrantShape
cacontology-international:JurisdictionalCoordinationShape
cacontology-international:LiveStreamingInvestigationCapabilityBusinessRule
cacontology-international:LiveStreamingInvestigationShape
cacontology-international:MultiCountryTakedownShape
cacontology-international:MultiJurisdictionCoordinationBusinessRule
cacontology-international:MultilingualSupportShape
cacontology-international:MutualLegalAssistanceShape
cacontology-international:NCMECReportingShape
cacontology-international:OverseasVictimCoordinationShape
cacontology-international:PartnershipCoordinationCrossReferenceShape
cacontology-international:PartnershipEffectivenessBusinessRule
cacontology-international:PartnershipSizeValidationShape
cacontology-international:RegionalCoordinationShape
cacontology-international:ResponseTimeValidationShape
cacontology-international:SecureChannelShape
cacontology-international:SpecializedOperationValidationShape
cacontology-international:TemporalValidationShape
cacontology-international:USAustraliaCoordinationShape
cacontology-international:UrgentOperationResponseBusinessRule
cacontology-legal-shapes:AssessmentTemporalShape
cacontology-legal-shapes:CSAMModelLawShape
cacontology-legal-shapes:ComprehensiveHarmonizationRule
cacontology-legal-shapes:CriticalGapReformRule
cacontology-legal-shapes:FullComplianceAlignmentRule
cacontology-legal-shapes:GlobalLegalReviewShape
cacontology-legal-shapes:HighEffectivenessLegislationRule
cacontology-legal-shapes:InternationalCooperationFrameworkRule
cacontology-legal-shapes:InternationalCooperationParticipationShape
cacontology-legal-shapes:InternationalLawEnforcementShape
cacontology-legal-shapes:LegalComplianceShape
cacontology-legal-shapes:LegalFrameworkCompositionShape
cacontology-legal-shapes:LegalFrameworkGapShape
cacontology-legal-shapes:LegalFrameworkTemporalShape
cacontology-legal-shapes:LegalHarmonizationDataQualityShape
cacontology-legal-shapes:LegalHarmonizationParticipationShape
cacontology-legal-shapes:LegalObjectTypeValidationShape
cacontology-legal-shapes:LegalProcessTemporalShape
cacontology-legal-shapes:LegalProcessTypeValidationShape
cacontology-legal-shapes:LegalReformShape
cacontology-legal-shapes:LegalSituationTypeValidationShape
cacontology-legal-shapes:LegislativeAssessmentShape
cacontology-legal-shapes:NationalLegislationShape
cacontology-legal-shapes:PolicyHarmonizationShape
cacontology-legal-shapes:QualifiedComplianceParticipationShape
cacontology-legal-shapes:TechnicalAssistanceParticipationShape
cacontology-legal-shapes:TreatyFrameworkCompositionShape
cacontology-legal-shapes:TreatyFrameworkShape
cacontology-multi:CommunicationProtocolShape
cacontology-multi:CoordinatesWithShape
cacontology-multi:CoordinationConsistencyShape
cacontology-multi:CoordinationEffectivenessRule
cacontology-multi:CoordinationPhaseTemporalShape
cacontology-multi:CoordinationPhaseTypeValidationShape
cacontology-multi:CoordinationRoleShape
cacontology-multi:CoordinationRoleValidationShape
cacontology-multi:CoordinationStructureCompositionShape
cacontology-multi:CriticalInformationSharingRule
cacontology-multi:CrossBorderOperationShape
cacontology-multi:DataQualityShape
cacontology-multi:FederalStateCooperationShape
cacontology-multi:HighComplexityCoordinationRule
cacontology-multi:InformationSharingParticipationShape
cacontology-multi:InformationSharingShape
cacontology-multi:IntelligenceSharingShape
cacontology-multi:InteragencyCooperationRule
cacontology-multi:InvolvesJurisdictionShape
cacontology-multi:JurisdictionCoordinationShape
cacontology-multi:LargeScaleResourceSharingRule
cacontology-multi:LawEnforcementAgencyShape
cacontology-multi:LegalCoordinationShape
cacontology-multi:MultiAgencyOperationCompositionShape
cacontology-multi:MultiJurisdictionalCrossReferenceShape
cacontology-multi:MultiJurisdictionalDataQualityShape
cacontology-multi:MultiJurisdictionalEventTemporalShape
cacontology-multi:MultiJurisdictionalEventTypeValidationShape
cacontology-multi:MultiJurisdictionalOperationShape
cacontology-multi:MultiJurisdictionalParticipationShape
cacontology-multi:OrganizationObjectTypeValidationShape
cacontology-multi:PersonnelSharingShape
cacontology-multi:QualifiedCoordinationParticipationShape
cacontology-multi:RequiresLegalCoordinationShape
cacontology-multi:ResourceSharingShape
cacontology-multi:ResourceSharingValidationShape
cacontology-multi:RoleTemporalShape
cacontology-multi:SharesInformationShape
cacontology-multi:SharesResourcesShape
cacontology-multi:SharingDateValidationShape
cacontology-multi:SituationTypeValidationShape
cacontology-multi:TaskForceCompositionShape
cacontology-multi:TaskForceParticipationShape
cacontology-multi:TaskForceReadinessRule
cacontology-multi:TaskForceShape
cacontology-multi:TemporalValidationShape
cacontology-multi:UsesCommunicationProtocolShape
cacontology-partnerships-shapes:CommunityAnalysisShape
cacontology-partnerships-shapes:ContentDetectionCooperationShape
cacontology-partnerships-shapes:CooperationEventTemporalShape
cacontology-partnerships-shapes:CooperationEventTypeValidationShape
cacontology-partnerships-shapes:CoordinatedByShape
cacontology-partnerships-shapes:CoordinatedThroughShape
cacontology-partnerships-shapes:CoordinationMechanismShape
cacontology-partnerships-shapes:CrowdsourcingEffectivenessRule
cacontology-partnerships-shapes:CrowdsourcingEffectivenessShape
cacontology-partnerships-shapes:CrowdsourcingInvestigationShape
cacontology-partnerships-shapes:DataQualityShape
cacontology-partnerships-shapes:DataSharingAgreementShape
cacontology-partnerships-shapes:EmergencyCoordinationShape
cacontology-partnerships-shapes:GeolocationRequestShape
cacontology-partnerships-shapes:GovernedByShape
cacontology-partnerships-shapes:HasRoleShape
cacontology-partnerships-shapes:HashSharingProtocolShape
cacontology-partnerships-shapes:HighEffectivenessPartnershipRule
cacontology-partnerships-shapes:IncludesPartnerShape
cacontology-partnerships-shapes:InformationSharingCompositionShape
cacontology-partnerships-shapes:InformationSharingFrameworkShape
cacontology-partnerships-shapes:InformationSharingSecurityRule
cacontology-partnerships-shapes:JointOperationShape
cacontology-partnerships-shapes:LawEnforcementPartnerShape
cacontology-partnerships-shapes:MultiStakeholderComplexityRule
cacontology-partnerships-shapes:MultiStakeholderInitiativeShape
cacontology-partnerships-shapes:MultiStakeholderParticipationShape
cacontology-partnerships-shapes:NGOPartnerShape
cacontology-partnerships-shapes:NationalInitiativeDataQualityShape
cacontology-partnerships-shapes:NationalInitiativeProgramShape
cacontology-partnerships-shapes:ObjectIdentificationRequestShape
cacontology-partnerships-shapes:ParticipatesInDevelopmentShape
cacontology-partnerships-shapes:PartnerRoleCapabilityCommitmentRule
cacontology-partnerships-shapes:PartnerRoleShape
cacontology-partnerships-shapes:PartnerRoleTemporalShape
cacontology-partnerships-shapes:PartnerRoleTypeValidationShape
cacontology-partnerships-shapes:PartnershipCompositionShape
cacontology-partnerships-shapes:PartnershipConsistencyShape
cacontology-partnerships-shapes:PartnershipDataQualityShape
cacontology-partnerships-shapes:PartnershipObjectTypeValidationShape
cacontology-partnerships-shapes:PartnershipOrganizationTypeValidationShape
cacontology-partnerships-shapes:PartnershipParticipationShape
cacontology-partnerships-shapes:PartnershipPhaseTemporalShape
cacontology-partnerships-shapes:PartnershipPhaseTypeValidationShape
cacontology-partnerships-shapes:PartnershipSituationTypeValidationShape
cacontology-partnerships-shapes:PartnershipTemporalShape
cacontology-partnerships-shapes:PlatformMonitoringShape
cacontology-partnerships-shapes:ProjectSafeChildhoodCaseShape
cacontology-partnerships-shapes:PublicPrivatePartnershipShape
cacontology-partnerships-shapes:QualifiedPartnershipParticipationShape
cacontology-partnerships-shapes:RegularMeetingShape
cacontology-partnerships-shapes:SolicitsHelpShape
cacontology-partnerships-shapes:TechCooperationParticipationShape
cacontology-partnerships-shapes:TechCooperationValidityShape
cacontology-partnerships-shapes:TechIndustryCooperationShape
cacontology-partnerships-shapes:TechnicalIntegrationShape
cacontology-partnerships-shapes:TechnologyCooperationCompositionShape
cacontology-partnerships-shapes:TechnologyCooperationShape
cacontology-partnerships-shapes:TechnologyMaturityImplementationRule
cacontology-partnerships-shapes:TechnologyPartnerShape
cacontology-partnerships-shapes:ToolDevelopmentShape
cacontology-physical-shapes:ComputerEquipmentCompositionShape
cacontology-physical-shapes:ComputerEquipmentShape
cacontology-physical-shapes:ContaminationPreventionRule
cacontology-physical-shapes:CriminalProcurementShape
cacontology-physical-shapes:CustodyIntegrityShape
cacontology-physical-shapes:EvidenceCompositionShape
cacontology-physical-shapes:EvidenceCrossReferenceShape
cacontology-physical-shapes:EvidenceCustodianRoleShape
cacontology-physical-shapes:EvidenceDataQualityShape
cacontology-physical-shapes:EvidenceLifecycleTimingShape
cacontology-physical-shapes:EvidenceParticipationShape
cacontology-physical-shapes:EvidencePhaseTemporalShape
cacontology-physical-shapes:EvidencePhaseTypeValidationShape
cacontology-physical-shapes:EvidenceSituationTypeValidationShape
cacontology-physical-shapes:EvidenceTemporalShape
cacontology-physical-shapes:ForensicAnalystRoleShape
cacontology-physical-shapes:ForensicRoleParticipationShape
cacontology-physical-shapes:ForensicRoleTemporalShape
cacontology-physical-shapes:ForensicRoleTypeValidationShape
cacontology-physical-shapes:HighValueEvidenceRule
cacontology-physical-shapes:PhysicalEvidenceObjectTypeValidationShape
cacontology-physical-shapes:PhysicalEvidenceShape
cacontology-physical-shapes:PhysicalSearchShape
cacontology-physical-shapes:ProcurementEventTemporalShape
cacontology-physical-shapes:ProcurementEventTypeValidationShape
cacontology-physical-shapes:ReliableAnalysisRule
cacontology-physical-shapes:SearchEventTemporalShape
cacontology-physical-shapes:SearchEventTimingShape
cacontology-physical-shapes:SearchEventTypeValidationShape
cacontology-physical-shapes:SearchParticipationShape
cacontology-physical-shapes:SecureCustodyRule
cacontology-physical-shapes:SuspiciousProcurementRule
cacontology-physical-shapes:ThoroughSearchRule
cacontology-platforms:AccountSuspensionActionShape
cacontology-platforms:ContentModerationActionShape
cacontology-platforms:ContentModerationCapabilityShape
cacontology-platforms:ContentModerationCrossReferenceShape
cacontology-platforms:DataPreservationActionShape
cacontology-platforms:DataQualityShape
cacontology-platforms:DataRetentionCrossReferenceShape
cacontology-platforms:DataRetentionPolicyShape
cacontology-platforms:ElectronicServiceProviderShape
cacontology-platforms:GamePlatformShape
cacontology-platforms:LargeScalePlatformTakedownShape
cacontology-platforms:LegalComplianceValidationShape
cacontology-platforms:LegalDataDisclosureActionShape
cacontology-platforms:MassUserBehaviorAnalysisShape
cacontology-platforms:MassUserDatabaseShape
cacontology-platforms:MessagingServiceShape
cacontology-platforms:PlatformOperatorCrossReferenceShape
cacontology-platforms:RetentionPeriodValidationShape
cacontology-platforms:SocialMediaPlatformShape
cacontology-platforms:TemporalValidationShape
cacontology-platforms:UserRiskClassificationShape
cacontology-platforms:UserScaleClassificationShape
cacontology-platforms:UserVerificationSystemShape
cacontology-platforms:VideoStreamingPlatformShape
cacontology-prevention:BehavioralPreventionShape
cacontology-prevention:ChildSafetyEducationShape
cacontology-prevention:CommunityEducationShape
cacontology-prevention:CommunityEngagementShape
cacontology-prevention:CommunityOutreachCoordinationValidationShape
cacontology-prevention:CommunityOutreachShape
cacontology-prevention:DataQualityShape
cacontology-prevention:DigitalSafetyShape
cacontology-prevention:EducationPortalResourceValidationShape
cacontology-prevention:EducationPortalShape
cacontology-prevention:EducationalResourceShape
cacontology-prevention:EducatorTrainingShape
cacontology-prevention:EnvironmentalPreventionShape
cacontology-prevention:HealthcareProviderTrainingShape
cacontology-prevention:LanguageAvailabilityValidationShape
cacontology-prevention:OnlineSafetyEducationShape
cacontology-prevention:ParentEducationShape
cacontology-prevention:ParentalControlShape
cacontology-prevention:PlatformSafetyShape
cacontology-prevention:PreventionCurriculumShape
cacontology-prevention:PreventionEffectivenessShape
cacontology-prevention:PreventionEffectivenessValidationShape
cacontology-prevention:PreventionMaterialShape
cacontology-prevention:PreventionMetricsShape
cacontology-prevention:PreventionProgramDeliveryValidationShape
cacontology-prevention:PreventionProgramShape
cacontology-prevention:PrimaryPreventionShape
cacontology-prevention:ProgramDurationValidationShape
cacontology-prevention:PublicAwarenessShape
cacontology-prevention:RiskAssessmentToolShape
cacontology-prevention:RiskPreventionShape
cacontology-prevention:RiskReductionShape
cacontology-prevention:SafetyGuidelineShape
cacontology-prevention:SafetyProtocolImplementationValidationShape
cacontology-prevention:SafetyProtocolShape
cacontology-prevention:SchoolAllegationProtocolShape
cacontology-prevention:SchoolCounselorTrainingShape
cacontology-prevention:SchoolPolicyShape
cacontology-prevention:SchoolSafetyProgramShape
cacontology-prevention:SecondaryPreventionShape
cacontology-prevention:SextortionAwarenessShape
cacontology-prevention:SextortionEducationShape
cacontology-prevention:SextortionResponseShape
cacontology-prevention:SextortionWarningSignShape
cacontology-prevention:StudentEducationShape
cacontology-prevention:TargetAudienceValidationShape
cacontology-prevention:TeacherTrainingShape
cacontology-prevention:TemporalValidationShape
cacontology-prevention:TertiaryPreventionShape
cacontology-production:ActiveProductionPhaseShape
cacontology-production:DataQualityShape
cacontology-production:EquipmentUsageValidationShape
cacontology-production:ExtendedOperationValidationShape
cacontology-production:ExtendedProductionOperationShape
cacontology-production:FacilitatesProductionShape
cacontology-production:FacilitatorShape
cacontology-production:ImagePostProcessingShape
cacontology-production:LiveProductionEventShape
cacontology-production:ModifiesImagesShape
cacontology-production:OverlaysTextShape
cacontology-production:PrimaryProducerShape
cacontology-production:ProducedAtShape
cacontology-production:ProducerRoleConflictShape
cacontology-production:ProducerShape
cacontology-production:ProducesContentShape
cacontology-production:ProductionCrossReferenceShape
cacontology-production:ProductionEquipmentShape
cacontology-production:ProductionEventShape
cacontology-production:ProductionLocationShape
cacontology-production:ProductionOffenseShape
cacontology-production:ProductionPhaseShape
cacontology-production:ProductionRoleShape
cacontology-production:ProductionSituationShape
cacontology-production:RecordingDeviceShape
cacontology-production:TemporalValidationShape
cacontology-production:TextOverlayShape
cacontology-production:UsesEquipmentShape
cacontology-recruitment-shapes:AcademicStrugglesShape
cacontology-recruitment-shapes:AttendanceProblemsShape
cacontology-recruitment-shapes:ClassmateIntroductionShape
cacontology-recruitment-shapes:ClassmateRecruitmentNetworkShape
cacontology-recruitment-shapes:CoercedPeerRecruitmentShape
cacontology-recruitment-shapes:DataQualityShape
cacontology-recruitment-shapes:EducationalInstitutionShape
cacontology-recruitment-shapes:EducationalReportingDataQualityShape
cacontology-recruitment-shapes:NetworkSizeConsistencyShape
cacontology-recruitment-shapes:PeerRecruitmentNetworkShape
cacontology-recruitment-shapes:RecruitmentConsistencyShape
cacontology-recruitment-shapes:RecruitmentQuotaShape
cacontology-recruitment-shapes:RecruitmentTimingShape
cacontology-recruitment-shapes:SchoolBasedRecruitmentShape
cacontology-recruitment-shapes:SchoolBasedReportingShape
cacontology-recruitment-shapes:SchoolReportingTimelinessShape
cacontology-recruitment-shapes:SchoolSocialWorkerShape
cacontology-recruitment-shapes:SchoolStaffMemberShape
cacontology-recruitment-shapes:SchoolVulnerabilityFactorShape
cacontology-recruitment-shapes:SocialWorkerReportShape
cacontology-recruitment-shapes:VictimMediatedRecruitmentShape
cacontology-recruitment-shapes:VictimSchoolDisclosureShape
cacontology-registry:AddressVerificationCrossReferenceShape
cacontology-registry:AgeValidationShape
cacontology-registry:ComplianceViolationShape
cacontology-registry:ConvictingOffenseShape
cacontology-registry:DataQualityShape
cacontology-registry:EducationInformationShape
cacontology-registry:EmploymentInformationShape
cacontology-registry:OffenderProfileShape
cacontology-registry:OffenderRegistrationCrossReferenceShape
cacontology-registry:PhysicalDescriptionShape
cacontology-registry:PrimaryResidenceShape
cacontology-registry:RecidivismPostRegistrationBusinessRule
cacontology-registry:RecidivistSexOffenderShape
cacontology-registry:RegisteredAddressShape
cacontology-registry:RegisteredSexOffenderShape
cacontology-registry:RegistrationDateValidationShape
cacontology-registry:RegistrationFrequencyValidationShape
cacontology-registry:RegistrationOffenseCrossReferenceShape
cacontology-registry:RegistrationRecordShape
cacontology-registry:RegistrationStatusShape
cacontology-registry:SexOffenderRegistryShape
cacontology-registry:TemporalValidationShape
cacontology-registry:VehicleInformationShape
cacontology-registry:VerificationCheckShape
cacontology-registry:VictimInformationShape
cacontology-registry:WorkLocationShape
cacontology-sentencing:AppliesEnhancementShape
cacontology-sentencing:ConvictionRecordShape
cacontology-sentencing:CriminalFineShape
cacontology-sentencing:CriminalSentenceConcurrencyBusinessRule
cacontology-sentencing:CriminalSentenceShape
cacontology-sentencing:DataQualityShape
cacontology-sentencing:EnhancementFactorShape
cacontology-sentencing:FelonyChargeShape
cacontology-sentencing:FollowsGuidelinesShape
cacontology-sentencing:ImprisonmentSentenceShape
cacontology-sentencing:IncludesFineShape
cacontology-sentencing:IncludesRestitutionShape
cacontology-sentencing:LegalChargeShape
cacontology-sentencing:LegalProceedingShape
cacontology-sentencing:PaymentDeadlineValidationShape
cacontology-sentencing:ProbationSentenceShape
cacontology-sentencing:RequiresTreatmentShape
cacontology-sentencing:RestitutionOrderShape
cacontology-sentencing:RestitutionValidationShape
cacontology-sentencing:ResultsFromChargeShape
cacontology-sentencing:SentenceDurationValidationShape
cacontology-sentencing:SentencingCrossReferenceShape
cacontology-sentencing:SentencingGuidelinesShape
cacontology-sentencing:SentencingOutcomeShape
cacontology-sentencing:TemporalValidationShape
cacontology-sentencing:TreatmentOrderShape
cacontology-sextortion:AgeDeceptionShape
cacontology-sextortion:AgeDeceptionValidationShape
cacontology-sextortion:ComplianceDurationValidationShape
cacontology-sextortion:ComplianceResponseShape
cacontology-sextortion:DataQualityShape
cacontology-sextortion:EscalationPatternShape
cacontology-sextortion:ExtortionTacticsShape
cacontology-sextortion:FinancialDemandValidationShape
cacontology-sextortion:FinancialSextortionShape
cacontology-sextortion:FollowsEscalationPatternShape
cacontology-sextortion:InternationalCoordinationShape
cacontology-sextortion:InvolvesAgeDeceptionShape
cacontology-sextortion:PeerImpersonationShape
cacontology-sextortion:ProgressiveEscalationShape
cacontology-sextortion:RequiresInternationalCoordinationShape
cacontology-sextortion:ResistanceResponseShape
cacontology-sextortion:ScreenshotThreatShape
cacontology-sextortion:SextortionCrossReferenceShape
cacontology-sextortion:SextortionIncidentShape
cacontology-sextortion:SocialMediaSharingThreatShape
cacontology-sextortion:TargetsVictimShape
cacontology-sextortion:TemporalValidationShape
cacontology-sextortion:TriggersVictimResponseShape
cacontology-sextortion:UsesExtortionTacticsShape
cacontology-sextortion:VictimResponseShape
cacontology-specialized:AffiliateEngagementMetricsShape
cacontology-specialized:AffiliateJointOperationShape
cacontology-specialized:AffiliateNetworkCoordinationShape
cacontology-specialized:AffiliateOrganizationValidationShape
cacontology-specialized:AffiliatePerformanceAssessmentShape
cacontology-specialized:AffiliateResourceAllocationShape
cacontology-specialized:AffiliateResourceLibraryShape
cacontology-specialized:ChildRescueUnitShape
cacontology-specialized:CommunityOutreachProgramShape
cacontology-specialized:DataQualityShape
cacontology-specialized:DetectionDogShape
cacontology-specialized:EmergencyResponseCoordinationShape
cacontology-specialized:HighVolumeOperationsUnitShape
cacontology-specialized:ICACAffiliateOrganizationShape
cacontology-specialized:InterAffiliateResourceSharingShape
cacontology-specialized:K9DetectionProgramShape
cacontology-specialized:K9OperationCrossReferenceShape
cacontology-specialized:K9SearchOperationShape
cacontology-specialized:NamedOperationShape
cacontology-specialized:OfficerWellnessProgramShape
cacontology-specialized:OngoingAbuseInvestigationShape
cacontology-specialized:ProfessionalTrainingEventShape
cacontology-specialized:RapidResponseTeamShape
cacontology-specialized:SafetyEducationEventShape
cacontology-specialized:SeasonalCyberTipPatternShape
cacontology-specialized:SeasonalOperationsUnitShape
cacontology-specialized:SeasonalTimingValidationShape
cacontology-specialized:SpecializedInvestigativeUnitShape
cacontology-specialized:SpecializedUnitOperationShape
cacontology-specialized:TemporalValidationShape
cacontology-specialized:TherapyDogShape
cacontology-specialized:WellnessCheckShape
cacontology-specialized:WellnessProgramCrossReferenceShape
cacontology-stranger:AbductionCrossReferenceShape
cacontology-stranger:AbductionMethodShape
cacontology-stranger:AbductorProfileShape
cacontology-stranger:ActivatesAlertShape
cacontology-stranger:AlertCriteriaShape
cacontology-stranger:AmberAlertShape
cacontology-stranger:AmberAlertTimingShape
cacontology-stranger:AmberAlertValidationShape
cacontology-stranger:BehavioralProfileShape
cacontology-stranger:DataQualityShape
cacontology-stranger:GroundSearchShape
cacontology-stranger:InvolvesAbductorShape
cacontology-stranger:MeetsAlertCriteriaShape
cacontology-stranger:OpportunisticAbductionShape
cacontology-stranger:PredatoryAbductionShape
cacontology-stranger:RecoveryTimingShape
cacontology-stranger:RequiresRescueShape
cacontology-stranger:RescueOperationShape
cacontology-stranger:ResultsInRecoveryShape
cacontology-stranger:SearchEffectivenessShape
cacontology-stranger:SearchOperationShape
cacontology-stranger:SearchTimingShape
cacontology-stranger:StrangerAbductionShape
cacontology-stranger:TemporalValidationShape
cacontology-stranger:TriggersSearchShape
cacontology-stranger:UsesMethodShape
cacontology-stranger:VehicleAbductionShape
cacontology-stranger:VictimRecoveryShape
cacontology-street:AgeVulnerabilityIndicatorShape
cacontology-street:AlcoholFacilitationShape
cacontology-street:AssessesVulnerabilityShape
cacontology-street:BehavioralVulnerabilityIndicatorShape
cacontology-street:BodySellingPropositionShape
cacontology-street:CasualConversationApproachShape
cacontology-street:CommercialDistrictShape
cacontology-street:DataQualityShape
cacontology-street:DelayedReportingShape
cacontology-street:DemographicTargetingShape
cacontology-street:DigitalFollowUpShape
cacontology-street:DigitalToPhysicalBridgeShape
cacontology-street:DirectSolicitationApproachShape
cacontology-street:DirectTraffickingPropositionShape
cacontology-street:DisclosureToAuthoritiesShape
cacontology-street:DocumentsRecruitmentShape
cacontology-street:DrugFacilitatedVulnerabilityShape
cacontology-street:EconomicIncentivePresentationShape
cacontology-street:EscalatesToShape
cacontology-street:EscalationTimelineValidationShape
cacontology-street:EscapeAttemptShape
cacontology-street:ExhibitsIndicatorShape
cacontology-street:ExplicitCommercialOfferShape
cacontology-street:ExploitsVulnerabilityShape
cacontology-street:FacilitatesTransitionShape
cacontology-street:FacilitatesWithSubstanceShape
cacontology-street:FollowUpTimingValidationShape
cacontology-street:FollowsUpWithShape
cacontology-street:FoodOfferApproachShape
cacontology-street:HelpOfferApproachShape
cacontology-street:HelpSeekingBehaviorShape
cacontology-street:HighTrafficAreaShape
cacontology-street:HighwayLocationShape
cacontology-street:ImmediateExploitationAttemptShape
cacontology-street:ImmediateIsolationShape
cacontology-street:ImmediateReportingShape
cacontology-street:ImpairmentExploitationShape
cacontology-street:InitialStreetContactShape
cacontology-street:InitiatesContactShape
cacontology-street:IsolatedLocationShape
cacontology-street:IsolatesAtShape
cacontology-street:IsolationVulnerabilityIndicatorShape
cacontology-street:LocationTransitionShape
cacontology-street:LocationTransitionValidationShape
cacontology-street:MakesPropositionShape
cacontology-street:MarijuanaFacilitationShape
cacontology-street:NeighborhoodTargetingShape
cacontology-street:NextDayFollowUpShape
cacontology-street:OccursAtShape
cacontology-street:OpportunisticExploitationShape
cacontology-street:PersistenceAfterRejectionShape
cacontology-street:PersistsAfterShape
cacontology-street:PhoneChargingOfferShape
cacontology-street:PhysicalVulnerabilityIndicatorShape
cacontology-street:PostContactReinforcementShape
cacontology-street:PretextBasedApproachShape
cacontology-street:PropertyValueValidationShape
cacontology-street:ProstitutionPropositionShape
cacontology-street:PublicSpaceTargetingShape
cacontology-street:RapidEscalationRecruitmentShape
cacontology-street:RecruitmentCrossReferenceShape
cacontology-street:ReinforcesShape
cacontology-street:RejectsShape
cacontology-street:ReportsToShape
cacontology-street:ResidentialAreaShape
cacontology-street:RespondsToShape
cacontology-street:SameDayProgressionShape
cacontology-street:SameDayProgressionValidationShape
cacontology-street:SecondaryLocationExploitationShape
cacontology-street:SocioeconomicVulnerabilityIndicatorShape
cacontology-street:StreetBasedRecruitmentShape
cacontology-street:StreetRecruitmentLocationShape
cacontology-street:StreetVulnerabilityAssessmentShape
cacontology-street:StrippingPropositionShape
cacontology-street:SubstanceBasedControlShape
cacontology-street:SubstanceFacilitatedRecruitmentShape
cacontology-street:SupportsChargeShape
cacontology-street:TargetsVictimShape
cacontology-street:TemporalValidationShape
cacontology-street:TextMessageFollowUpShape
cacontology-street:TraffickingPropositionReinforcementShape
cacontology-street:TraffickingPropositionRejectionShape
cacontology-street:TransitAreaShape
cacontology-street:TransitionsToShape
cacontology-street:TransportationOfferApproachShape
cacontology-street:UsesPretextShape
cacontology-street:VehicleBasedIsolationShape
cacontology-street:VehicleLocationShape
cacontology-street:VictimReportingShape
cacontology-street:VictimResistanceShape
cacontology-street:VictimStreetResponseShape
cacontology-street:VulnerabilityAssessmentValidationShape
cacontology-street:VulnerabilityIndicatorShape
cacontology-street:VulnerableNeighborhoodShape
cacontology-tactical:ArrestOperationShape
cacontology-tactical:BriefingTimingShape
cacontology-tactical:DataQualityShape
cacontology-tactical:ElectronicSurveillanceShape
cacontology-tactical:ExecutedByTeamShape
cacontology-tactical:FollowsPlanShape
cacontology-tactical:GeneratesReportShape
cacontology-tactical:IncludesBriefingShape
cacontology-tactical:IncludesSurveillanceShape
cacontology-tactical:MaintenanceTimingShape
cacontology-tactical:OperationBriefingShape
cacontology-tactical:PostOperationReportShape
cacontology-tactical:ProtectiveGearShape
cacontology-tactical:ResultsInExecutionShape
cacontology-tactical:RiskAssessmentValidationShape
cacontology-tactical:SearchWarrantOperationShape
cacontology-tactical:SurveillanceOperationShape
cacontology-tactical:SwatTeamShape
cacontology-tactical:TacticalEquipmentShape
cacontology-tactical:TacticalExecutionShape
cacontology-tactical:TacticalOperationCrossReferenceShape
cacontology-tactical:TacticalOperationShape
cacontology-tactical:TacticalPlanShape
cacontology-tactical:TacticalTeamShape
cacontology-tactical:TeamCertificationShape
cacontology-tactical:TemporalValidationShape
cacontology-tactical:UsesEquipmentShape
cacontology-taskforce:AllocatesResourcesShape
cacontology-taskforce:CertificationShape
cacontology-taskforce:CertificationValidityShape
cacontology-taskforce:CommanderValidationShape
cacontology-taskforce:ConductsOperationShape
cacontology-taskforce:DataQualityShape
cacontology-taskforce:EstablishmentDateValidationShape
cacontology-taskforce:HasMemberShape
cacontology-taskforce:HoldsCertificationShape
cacontology-taskforce:IcacTaskForceShape
cacontology-taskforce:JointOperationShape
cacontology-taskforce:MembershipValidationShape
cacontology-taskforce:PerformanceMetricsShape
cacontology-taskforce:PersonnelAllocationShape
cacontology-taskforce:ProvidesTrainingShape
cacontology-taskforce:ReportsMetricsShape
cacontology-taskforce:ResourceAllocationShape
cacontology-taskforce:TaskForceCommanderShape
cacontology-taskforce:TaskForceCrossReferenceShape
cacontology-taskforce:TaskForceMemberShape
cacontology-taskforce:TaskForceOperationShape
cacontology-taskforce:TaskForceShape
cacontology-taskforce:TemporalValidationShape
cacontology-taskforce:TrainingProgramShape
cacontology-temporal-shapes:PhasePerformanceMetricsShape
cacontology-temporal-shapes:PhaseTemporalPropertiesShape
cacontology-temporal-shapes:PhaseTransitionEventShape
cacontology-temporal-shapes:ResumptionEventShape
cacontology-temporal-shapes:SuspensionEventShape
cacontology-trafficking-shapes:EarningsCollectionShape
cacontology-trafficking-shapes:MultiJurisdictionalSituationShape
cacontology-trafficking-shapes:TraffickerRoleShape
cacontology-trafficking-shapes:TraffickingEnterpriseShape
cacontology-trafficking-shapes:TraffickingOperationShape
cacontology-trafficking-shapes:TraffickingVictimRoleShape
cacontology-trafficking-shapes:VictimTransportationShape
cacontology-training:CapacityBuildingProgramShape
cacontology-training:CapacityBuildingTargetValidationShape
cacontology-training:CapacityImpactShape
cacontology-training:CapacityLevelValidationShape
cacontology-training:CertificationStatusValidationShape
cacontology-training:CertificationValidationShape
cacontology-training:CertificationValidityValidationShape
cacontology-training:ChildProtectionTrainingShape
cacontology-training:CommunityEngagementMetricsShape
cacontology-training:CompetencyAssessmentShape
cacontology-training:ContinuingEducationShape
cacontology-training:CriminalJusticeTrainingShape
cacontology-training:CurriculumModuleValidationShape
cacontology-training:DataQualityShape
cacontology-training:DigitalForensicsTrainingShape
cacontology-training:GlobalTrainingReachShape
cacontology-training:HotlineTrainingShape
cacontology-training:HybridTrainingShape
cacontology-training:InPersonTrainingShape
cacontology-training:InternationalTrainingShape
cacontology-training:InvestigationTrainingShape
cacontology-training:K9ProgramMetricsShape
cacontology-training:LegalTrainingShape
cacontology-training:MentorshipProgramShape
cacontology-training:MetricsConsistencyValidationShape
cacontology-training:OnlineTrainingShape
cacontology-training:OperationalTrainingMetricsShape
cacontology-training:OutreachEventMetricsShape
cacontology-training:ProfessionalCertificationShape
cacontology-training:ProfessionalDevelopmentShape
cacontology-training:ProfessionalTrainingMetricsShape
cacontology-training:SkillsDevelopmentProgramShape
cacontology-training:SkillsValidationShape
cacontology-training:TemporalValidationShape
cacontology-training:TrainingCertificateShape
cacontology-training:TrainingCurriculumShape
cacontology-training:TrainingDeliveryValidationShape
cacontology-training:TrainingEffectivenessShape
cacontology-training:TrainingEffectivenessValidationShape
cacontology-training:TrainingMetricsShape
cacontology-training:TrainingModuleShape
cacontology-training:TrainingReachValidationShape
cacontology-training:VictimServiceTrainingShape
cacontology-undercover:CollectionDateValidationShape
cacontology-undercover:CollectsEvidenceShape
cacontology-undercover:CovertRecordingShape
cacontology-undercover:DataQualityShape
cacontology-undercover:DigitalIdentityShape
cacontology-undercover:EvidenceChainValidationShape
cacontology-undercover:FollowsPlanShape
cacontology-undercover:ImplementsMonitoringShape
cacontology-undercover:ImplementsSafetyShape
cacontology-undercover:OnlineUndercoverOperationShape
cacontology-undercover:OperationCrossReferenceShape
cacontology-undercover:OperationMonitoringShape
cacontology-undercover:OperationPlanShape
cacontology-undercover:OperationTerminationShape
cacontology-undercover:PlanApprovalValidationShape
cacontology-undercover:ResultsInTerminationShape
cacontology-undercover:RiskAssessmentShape
cacontology-undercover:SafetyProtocolShape
cacontology-undercover:TemporalValidationShape
cacontology-undercover:UndercoverEvidenceShape
cacontology-undercover:UndercoverIdentityShape
cacontology-undercover:UndercoverOperationShape
cacontology-undercover:UsesIdentityShape
cacontology-us-ncmec1:AccountLinkingShape
cacontology-us-ncmec1:AnalysisReportCrossReferenceShape
cacontology-us-ncmec1:CSAMSolicitationAnnotationShape
cacontology-us-ncmec1:ChildSexTourismIncidentShape
cacontology-us-ncmec1:ChildSexTraffickingIncidentShape
cacontology-us-ncmec1:ConfidenceValidationShape
cacontology-us-ncmec1:ContentIdentificationShape
cacontology-us-ncmec1:CooperationLevelValidationShape
cacontology-us-ncmec1:CyberTipAnalysisShape
cacontology-us-ncmec1:DataQualityShape
cacontology-us-ncmec1:FederalReferralShape
cacontology-us-ncmec1:InvestigationTriggerShape
cacontology-us-ncmec1:LocalLawEnforcementReferralShape
cacontology-us-ncmec1:MinorToMinorInteractionAnnotationShape
cacontology-us-ncmec1:NCMECCybertipReportShape
cacontology-us-ncmec1:NCMECIncidentTypeShape
cacontology-us-ncmec1:NCMECReportAnnotationShape
cacontology-us-ncmec1:OnlineEnticementIncidentShape
cacontology-us-ncmec1:PhoneNumberTraceShape
cacontology-us-ncmec1:PlatformCooperationCrossReferenceShape
cacontology-us-ncmec1:PlatformCooperationShape
cacontology-us-ncmec1:PossessionIndicatorShape
cacontology-us-ncmec1:ProcessingSequenceValidationShape
cacontology-us-ncmec1:ProcessingTimeValidationShape
cacontology-us-ncmec1:ReportIncidentTypeCrossReferenceShape
cacontology-us-ncmec1:SextortionAnnotationShape
cacontology-us-ncmec1:SpamAnnotationShape
cacontology-us-ncmec1:TaskForceReferralShape
cacontology-us-ncmec1:TemporalValidationShape
cacontology-us-ncmec1:TipEnrichmentShape
cacontology-us-ncmec1:TipPrioritizationShape
cacontology-us-ncmec1:TipProcessingShape
cacontology-us-ncmec1:TipValidationShape
cacontology-us-ncmec1:TransferDetectionShape
cacontology-us-ncmec1:TriggerInvestigationCrossReferenceShape
cacontology-us-ncmec1:UrgencyConsistencyValidationShape
cacontology-usa-federal:CEOSAttorneyRoleShape
cacontology-usa-federal:ChildPornographyProductionShape
cacontology-usa-federal:ComplexCaseBusinessRule
cacontology-usa-federal:DigitalEvidenceBusinessRule
cacontology-usa-federal:EventParticipationValidationShape
cacontology-usa-federal:EventTypeValidationShape
cacontology-usa-federal:ExtraterritorialCrimeShape
cacontology-usa-federal:FederalDefendantRoleShape
cacontology-usa-federal:FederalInvestigationShape
cacontology-usa-federal:FederalProsecutionShape
cacontology-usa-federal:FederalProsecutorRoleShape
cacontology-usa-federal:FederalVictimRoleShape
cacontology-usa-federal:InterstateCOmmerceBusinessRule
cacontology-usa-federal:KindValidationShape
cacontology-usa-federal:MandatoryMinimumBusinessRule
cacontology-usa-federal:PhaseOrderingValidationShape
cacontology-usa-federal:PhaseValidationShape
cacontology-usa-federal:PreTrialPhaseShape
cacontology-usa-federal:ProsecutionTemporalValidationShape
cacontology-usa-federal:ProsecutorCollaborationBusinessRule
cacontology-usa-federal:RoleValidationShape
cacontology-usa-federal:SentencingPhaseShape
cacontology-usa-federal:SexTraffickingOfMinorsShape
cacontology-usa-federal:SubKindValidationShape
cacontology-usa-federal:TrialPhaseShape
hotline:EvidenceItemShape
hotline:ForwardToLEActionShape
hotline:HashFeedbackActionShape
hotline:HashSubmissionActionShape
hotline:HotlineActionShape
hotline:HotlineOrganizationShape
hotline:HotlinePhaseShape
hotline:HotlineReportShape
hotline:LifecycleValidationShape
hotline:MediaEvidenceShape
hotline:MultiAgencyCoordinationShape
hotline:ReportReviewActionShape
hotline:ReporterRoleShape
hotline:SpecialistRoleShape
hotline:TakedownRequestActionShape