Ontology Version: 2.2.0

Tree

cacontology-abduction:abductionDuration
cacontology-abduction:abductionLocation
cacontology-abduction:accessDifficulty
cacontology-abduction:approachMethod
cacontology-abduction:complianceReason
cacontology-abduction:concealmentLevel
cacontology-abduction:concealsIdentityWith
cacontology-abduction:disclosesTo
cacontology-abduction:disclosureMethod
cacontology-abduction:disguiseEffectiveness
cacontology-abduction:disguiseType
cacontology-abduction:documentsAbduction
cacontology-abduction:employsCoercion
cacontology-abduction:entryMethod
cacontology-abduction:escalatesTo
cacontology-abduction:escapeRoutes
cacontology-abduction:evidenceRecoveryRate
cacontology-abduction:exercisesControl
cacontology-abduction:exhibitsVulnerability
cacontology-abduction:exploitsVulnerability
cacontology-abduction:facilitatesExploitation
cacontology-abduction:forcesEntryTo
cacontology-abduction:investigatesAbduction
cacontology-abduction:investigationDuration
cacontology-abduction:isolatesAt
cacontology-abduction:locationIsolationLevel
cacontology-abduction:occursAt
cacontology-abduction:opportunityWindow
cacontology-abduction:perpetratesAbduction
cacontology-abduction:recoveredFrom
cacontology-abduction:reportingDelay
cacontology-abduction:reportsAbduction
cacontology-abduction:resistanceLevel
cacontology-abduction:resistsAbduction
cacontology-abduction:respondsTo
cacontology-abduction:supportsCharge
cacontology-abduction:surveillanceDuration
cacontology-abduction:targetingCriteria
cacontology-abduction:targetsVictim
cacontology-abduction:threatEffectiveness
cacontology-abduction:threatSpecificity
cacontology-abduction:threatensWith
cacontology-abduction:timeOfDay
cacontology-abduction:transitionsTo
cacontology-abduction:triggersInvestigation
cacontology-abduction:usesDisguise
cacontology-abduction:usesWeapon
cacontology-abduction:victimActivity
cacontology-abduction:victimsOf
cacontology-abduction:weaponDisplayed
cacontology-abduction:weaponType
cacontology-abduction:witnessCount
cacontology-ai:aiModelUsed
cacontology-ai:analyzesTrainingData
cacontology-ai:artifactsDetected
cacontology-ai:artificialnessLevel
cacontology-ai:basedOnModel
cacontology-ai:challengesLegalFramework
cacontology-ai:complicatesVictimIdentification
cacontology-ai:detectedBy
cacontology-ai:detectionConfidence
cacontology-ai:detectionMethod
cacontology-ai:evidenceAdmissibility
cacontology-ai:falsePositiveRate
cacontology-ai:generatedUsing
cacontology-ai:generationComplexity
cacontology-ai:generationTechnique
cacontology-ai:investigationChallengeLevel
cacontology-ai:legalFrameworkChallenges
cacontology-ai:processingTime
cacontology-ai:prosecutionDifficulty
cacontology-ai:realVictimDepicted
cacontology-ai:renderingQuality
cacontology-ai:requiresSpecializedProsecution
cacontology-ai:revealsArtifacts
cacontology-ai:sourceTraceability
cacontology-ai:subjectOfInvestigation
cacontology-ai:technicalExpertiseRequired
cacontology-ai:tracesToSource
cacontology-ai:usesDetectionTool
cacontology-ai:utilizesTool
cacontology-ai:victimIdentificationDifficulty
cacontology-asset-forfeiture:accountFunds
cacontology-asset-forfeiture:assignedRole
cacontology-asset-forfeiture:courtJurisdiction
cacontology-asset-forfeiture:currentPhase
cacontology-asset-forfeiture:equipmentType
cacontology-asset-forfeiture:estimatedValue
...acontology-asset-forfeiture:financialPenaltyAmount
cacontology-asset-forfeiture:forfeitureDate
cacontology-asset-forfeiture:forfeiturePercentage
cacontology-asset-forfeiture:hasPhaseTransition
cacontology-asset-forfeiture:involvesCoordination
cacontology-asset-forfeiture:involvesTaskforce
cacontology-asset-forfeiture:itemCount
cacontology-asset-forfeiture:marketValue
cacontology-asset-forfeiture:playsRole
cacontology-asset-forfeiture:precedentSetting
...acontology-asset-forfeiture:relatedCriminalCharges
cacontology-asset-forfeiture:restraintDate
cacontology-asset-forfeiture:targetedAsset
cacontology-athletic:coachesTeam
cacontology-athletic:coachingExperience
cacontology-athletic:currentPhase
cacontology-athletic:hasPhaseTransition
cacontology-athletic:holdsCoachingRole
cacontology-athletic:multipleRoles
cacontology-athletic:occursInFacility
cacontology-athletic:participatesInSituation
cacontology-athletic:playsOnTeam
cacontology-athletic:practiceFrequency
cacontology-athletic:sportType
cacontology-athletic:teamType
cacontology-athletic:utilizesAthleticSpace
cacontology-case:accessLevel
cacontology-case:appealStatus
cacontology-case:approvedBy
cacontology-case:archivalDate
cacontology-case:archivedAt
cacontology-case:assignedBy
cacontology-case:assignedInvestigator
cacontology-case:assignedTo
cacontology-case:assignedToRole
cacontology-case:assignmentDate
cacontology-case:assignmentStatus
cacontology-case:assignmentType
cacontology-case:benchmarkValue
cacontology-case:benchmarkedAgainst
cacontology-case:caseCloseDate
cacontology-case:caseOpenDate
cacontology-case:casePriority
cacontology-case:caseStatus
cacontology-case:caseType
cacontology-case:caseloadCount
cacontology-case:certificationLevel
cacontology-case:classificationLevel
cacontology-case:closedBy
cacontology-case:closureDate
cacontology-case:closureReason
cacontology-case:conductsReview
cacontology-case:creationDate
cacontology-case:currentPhase
cacontology-case:documentStatus
cacontology-case:documentType
cacontology-case:documentedBy
cacontology-case:finalDisposition
cacontology-case:followsStage
cacontology-case:followsWorkflow
cacontology-case:generatesMetrics
cacontology-case:hasAssignment
cacontology-case:hasDocumentation
cacontology-case:hasPhaseTransition
cacontology-case:holdsRole
cacontology-case:investigatorExperience
cacontology-case:jurisdictionLevel
cacontology-case:lastModified
cacontology-case:lastUpdate
cacontology-case:managesCase
cacontology-case:measurementUnit
cacontology-case:measuresPerformance
cacontology-case:metricType
cacontology-case:metricValue
cacontology-case:participatesInManagement
cacontology-case:precedesStage
cacontology-case:recommendationsCount
cacontology-case:reportingPeriod
cacontology-case:resultsInClosure
cacontology-case:retentionPeriod
cacontology-case:reviewDate
cacontology-case:reviewOutcome
cacontology-case:reviewType
cacontology-case:reviewedBy
cacontology-case:reviewerRole
cacontology-case:reviewsCase
cacontology-case:specialization
cacontology-case:stageDuration
cacontology-case:stageEndDate
cacontology-case:stageOutcome
cacontology-case:stageStartDate
cacontology-case:supervisedBy
cacontology-case:trackedBy
cacontology-case:trackingNumber
cacontology-case:trackingSystem
cacontology-case:undergoesReview
cacontology-case:updateFrequency
cacontology-case:workflowStage
cacontology-case:workloadPercentage
cacontology-coord:agreementScope
cacontology-coord:agreementType
cacontology-coord:assignedBy
cacontology-coord:assignmentDuration
cacontology-coord:assignsLiaison
cacontology-coord:authorizedBy
cacontology-coord:availabilityLevel
cacontology-coord:benchmarkComparison
cacontology-coord:benchmarkedAgainst
cacontology-coord:classificationLevel
cacontology-coord:clearanceLevel
cacontology-coord:communicationAuthority
cacontology-coord:communicationFrequency
cacontology-coord:concernsCase
cacontology-coord:concernsParticipant
cacontology-coord:concernsTemporaryPart
cacontology-coord:concernsTemporaryWhole
cacontology-coord:connectsAgencies
cacontology-coord:coordinationLevel
cacontology-coord:coordinationStatus
cacontology-coord:coordinationType
cacontology-coord:costSharing
cacontology-coord:effectiveDate
cacontology-coord:escalationProcedure
cacontology-coord:evaluatesCoordination
cacontology-coord:expirationDate
cacontology-coord:facilitatesCommunication
cacontology-coord:governsAgreement
cacontology-coord:hasAccuracy
cacontology-coord:hasActionability
cacontology-coord:hasComplexityLevel
cacontology-coord:hasComponent
cacontology-coord:hasCoordinationEffectiveness
cacontology-coord:hasCoordinationIntensity
cacontology-coord:hasDataCompleteness
cacontology-coord:hasDataConsistency
cacontology-coord:hasDataQuality
cacontology-coord:hasIntelligenceValue
cacontology-coord:hasLiaisonEffectiveness
cacontology-coord:hasReliability
cacontology-coord:hasResponsiveness
cacontology-coord:hasSecurityLevel
cacontology-coord:hasSharingEfficiency
cacontology-coord:hasSubInvestigation
cacontology-coord:hasSuccessRate
cacontology-coord:hasTimeliness
cacontology-coord:hasTrustLevel
cacontology-coord:hasUnificationLevel
cacontology-coord:hasValidationLevel
cacontology-coord:informationAccuracy
cacontology-coord:intelligenceType
cacontology-coord:investigationScope
cacontology-coord:involvesAgency
cacontology-coord:involvesPersonnel
cacontology-coord:isComponentOf
cacontology-coord:isSubInvestigationOf
cacontology-coord:leadAgency
cacontology-coord:liaisonRole
cacontology-coord:liaisonWith
cacontology-coord:measurementPeriod
cacontology-coord:measuresPerformance
cacontology-coord:metricType
cacontology-coord:metricValue
cacontology-coord:participatesIn
cacontology-coord:participatesInSharing
cacontology-coord:participatingAgencies
cacontology-coord:personnelCount
cacontology-coord:protocolType
cacontology-coord:providesResource
cacontology-coord:receivesResource
cacontology-coord:reciprocity
cacontology-coord:reimbursement
cacontology-coord:renewalClause
cacontology-coord:representsAgency
cacontology-coord:resourcePooling
cacontology-coord:resourceType
cacontology-coord:responseTimeRequirement
cacontology-coord:securityClearance
cacontology-coord:sharedCommand
cacontology-coord:sharesFromAgency
cacontology-coord:sharesInformation
cacontology-coord:sharesResources
cacontology-coord:sharesWithAgency
cacontology-coord:sharingAgreement
cacontology-coord:sharingDuration
cacontology-coord:sharingMechanism
cacontology-coord:sharingType
cacontology-coord:signedByAgency
cacontology-coord:sourceReliability
cacontology-coord:specialization
cacontology-coord:standsInQualifiedParthood
cacontology-coord:standsInQualifiedParticipation
cacontology-coord:terminationClause
cacontology-coord:unifiedReporting
cacontology-coord:usesProtocol
cacontology-corruption:abusesAccess
cacontology-corruption:accessLevel
cacontology-corruption:authorityLevel
cacontology-corruption:badgeVisible
cacontology-corruption:concernsCorruptOfficer
cacontology-corruption:corruptionDuration
cacontology-corruption:corruptsEvidence
cacontology-corruption:departmentAffiliation
cacontology-corruption:detectedBy
cacontology-corruption:displaysAuthority
cacontology-corruption:employmentStatus
cacontology-corruption:employsOfficer
cacontology-corruption:exploitsPosition
cacontology-corruption:hasAuthorityAbuseDegree
...acontology-corruption:hasAuthorityEnhancementLevel
cacontology-corruption:hasCorruptionDependency
cacontology-corruption:hasCorruptionImpact
cacontology-corruption:hasCorruptionSeverity
cacontology-corruption:hasDataCompleteness
cacontology-corruption:hasDataQuality
cacontology-corruption:hasDetectionDifficulty
cacontology-corruption:hasEvidenceIntegrity
cacontology-corruption:hasIntimidationFactor
cacontology-corruption:hasInvestigationComplexity
...acontology-corruption:hasPositionExploitationLevel
cacontology-corruption:hasSymbolVisibility
cacontology-corruption:hasTrustBetrayalLevel
cacontology-corruption:hasValidationLevel
cacontology-corruption:hasVictimVulnerability
cacontology-corruption:investigatedBy
cacontology-corruption:isDetectedBy
cacontology-corruption:leaksInformation
cacontology-corruption:participatesIn
cacontology-corruption:reportedBy
...cacontology-corruption:standsInQualifiedCorruption
cacontology-corruption:uniformDisplayed
cacontology-corruption:uniformType
cacontology-corruption:victimCount
cacontology-corruption:wearsUniform
cacontology-corruption:yearsOfService
cacontology-custodial:accessLevel
cacontology-custodial:aggravatingFactor
cacontology-custodial:authorityLevel
cacontology-custodial:authorityScope
cacontology-custodial:authorizationLevel
cacontology-custodial:breachDuration
cacontology-custodial:checkScope
cacontology-custodial:checkStatus
cacontology-custodial:consentScope
cacontology-custodial:consentStatus
cacontology-custodial:createsCustodialSituation
cacontology-custodial:custodyDuration
cacontology-custodial:custodySchedule
cacontology-custodial:custodyType
cacontology-custodial:hasAuthority
cacontology-custodial:hasCustodyBeginPoint
cacontology-custodial:hasCustodyEndPoint
cacontology-custodial:hasCustodyPhase
cacontology-custodial:hasRoleBeginPoint
cacontology-custodial:hasRoleEndPoint
cacontology-custodial:hasViolationBeginPoint
cacontology-custodial:hasViolationEndPoint
cacontology-custodial:holdsPositionOf
cacontology-custodial:inCustodyPhase
cacontology-custodial:involvesChild
cacontology-custodial:involvesCustodian
cacontology-custodial:involvesParent
cacontology-custodial:occursInCustodialSituation
cacontology-custodial:perpetratedBy
cacontology-custodial:relationshipDuration
cacontology-custodial:relationshipFrequency
cacontology-custodial:relationshipIntimacy
cacontology-custodial:relationshipType
cacontology-custodial:relevantToInvestigation
cacontology-custodial:subjectTo
cacontology-custodial:supervisionLevel
cacontology-custodial:trustLevel
cacontology-custodial:violatesPosition
cacontology-custodial:violatesRelationship
cacontology-custodial:violationPattern
cacontology-custodial:violationSeverity
cacontology-custodial:violationType
cacontology-custodial:vulnerabilityFactor
cacontology-detection:ageEstimate
cacontology-detection:confidenceScore
cacontology-detection:copineClassification
cacontology-detection:detectedContent
cacontology-detection:detectionDuration
cacontology-detection:detectionThreshold
cacontology-detection:falsePositiveReason
cacontology-detection:generatedHash
cacontology-detection:hasDetectionBeginPoint
cacontology-detection:hasDetectionEndPoint
cacontology-detection:hasPhaseBeginPoint
cacontology-detection:hasPhaseEndPoint
cacontology-detection:hasRoleBeginPoint
cacontology-detection:hasRoleEndPoint
cacontology-detection:hashAlgorithm
cacontology-detection:matchType
cacontology-detection:matchedDatabase
cacontology-detection:modelVersion
cacontology-detection:perceptualHashValue
cacontology-detection:phaseDuration
cacontology-detection:photoDNAValue
cacontology-detection:reviewDecision
cacontology-detection:reviewedBy
cacontology-detection:roleDuration
cacontology-detection:sarClassification
cacontology-detection:similarityScore
cacontology-detection:tannerStage
cacontology-educational1:academicActivity
cacontology-educational1:accessLevel
...contology-educational1:activatesMandatoryReporting
cacontology-educational1:actualAge
cacontology-educational1:addressesVulnerability
cacontology-educational1:assignmentType
cacontology-educational1:attendsInstitution
cacontology-educational1:bailAmount
cacontology-educational1:bodyPartTouched
cacontology-educational1:bondAmount
cacontology-educational1:chargeCount
cacontology-educational1:chargeDegree
cacontology-educational1:chargesDefendant
cacontology-educational1:classroomNumber
cacontology-educational1:collectsEvidence
cacontology-educational1:communicatesVia
cacontology-educational1:contactDuration
cacontology-educational1:contactFrequency
cacontology-educational1:contactType
cacontology-educational1:coordinatesWith
cacontology-educational1:corroboratesAccount
cacontology-educational1:deceivesVictim
cacontology-educational1:deceptionDuration
cacontology-educational1:degradationLevel
cacontology-educational1:degradesVictim
cacontology-educational1:disclosesTo
cacontology-educational1:disclosureMethod
cacontology-educational1:documentsExploitation
cacontology-educational1:documentsHarassment
cacontology-educational1:duringActivity
cacontology-educational1:educatorAge
cacontology-educational1:employedAt
cacontology-educational1:employmentDuration
cacontology-educational1:enhancedBy
cacontology-educational1:escalatesTo
cacontology-educational1:evidenceLocation
cacontology-educational1:evidenceType
cacontology-educational1:exploitationDuration
cacontology-educational1:exploitationLocation
cacontology-educational1:exploitationMethod
cacontology-educational1:exploitsIsolation
cacontology-educational1:exploitsPosition
cacontology-educational1:exploitsVulnerability
cacontology-educational1:fakeAccountCount
cacontology-educational1:followedBySupervision
cacontology-educational1:forceLevel
cacontology-educational1:forciblyTouches
cacontology-educational1:gradeLevel
cacontology-educational1:gradeRange
cacontology-educational1:harassmentContent
cacontology-educational1:harassmentFrequency
cacontology-educational1:harassmentMedium
cacontology-educational1:hasVulnerability
cacontology-educational1:identifiesVulnerability
cacontology-educational1:impersonatedAge
cacontology-educational1:impersonatesAge
cacontology-educational1:implementsSafeguarding
cacontology-educational1:institutionCount
cacontology-educational1:institutionLocation
cacontology-educational1:institutionReputation
cacontology-educational1:institutionType
cacontology-educational1:interviewsVictim
cacontology-educational1:intimidatesStudent
cacontology-educational1:investigatesExploitation
cacontology-educational1:involvesPhysicalContact
...cacontology-educational1:involvesWrittenHarassment
cacontology-educational1:isolationLevel
cacontology-educational1:leveragesAcademicPower
cacontology-educational1:linkedToLocation
...cacontology-educational1:maintainsMultipleAccounts
...contology-educational1:mandatoryReportingTriggered
cacontology-educational1:maximumSentence
cacontology-educational1:notifiesPrincipal
cacontology-educational1:occursInContext
cacontology-educational1:platformUsed
cacontology-educational1:policeResponseTime
cacontology-educational1:providedBy
cacontology-educational1:providesEvidence
cacontology-educational1:receivesReport
cacontology-educational1:reportingDelay
cacontology-educational1:reportingStaffRole
cacontology-educational1:reportsTo
cacontology-educational1:requiresRegistration
cacontology-educational1:resultsinCharge
cacontology-educational1:schoolAddress
cacontology-educational1:selectsVictim
cacontology-educational1:sendsContent
cacontology-educational1:sentenceLength
cacontology-educational1:solicitsFrom
cacontology-educational1:studentPopulation
cacontology-educational1:studentsPresent
cacontology-educational1:subjectTaught
cacontology-educational1:supervisionDuration
cacontology-educational1:takesPlaceIn
cacontology-educational1:targetAgeRange
cacontology-educational1:targetGender
cacontology-educational1:targetingMethod
cacontology-educational1:targetsAgeGroup
cacontology-educational1:targetsStudent
cacontology-educational1:targetsVictim
cacontology-educational1:timeOfDay
cacontology-educational1:touchesVictim
...acontology-educational1:triggersPoliceNotification
cacontology-educational1:usesImpersonation
cacontology-educational1:usesMethod
cacontology-educational1:victimCount
cacontology-educational1:vulnerabilityFactor
cacontology-educational1:witnessesExploitation
cacontology-educational1:writtenContent
cacontology-educational1:writtenOn
cacontology-educational1:yearsOfExperience
cacontology-enterprises:accessLevel
cacontology-enterprises:advancementCriteria
cacontology-enterprises:altAccountCount
cacontology-enterprises:buildsVictimTrust
cacontology-enterprises:channelCount
cacontology-enterprises:coercesIntoSelfHarm
cacontology-enterprises:coercionEffectiveness
cacontology-enterprises:coercionSeverity
cacontology-enterprises:compilationComplexity
cacontology-enterprises:compilesContent
cacontology-enterprises:containsVictimContent
cacontology-enterprises:contentNotoriety
cacontology-enterprises:contentValue
cacontology-enterprises:contentVolumeItems
...cacontology-enterprises:coordinatesAcrossPlatforms
cacontology-enterprises:coordinatesActivities
cacontology-enterprises:correlatesEvidence
...ontology-enterprises:createsVictimizationSituation
cacontology-enterprises:degradationLevel
cacontology-enterprises:editingQuality
cacontology-enterprises:encryptionLevel
cacontology-enterprises:evidenceQuality
cacontology-enterprises:exploitsVictim
cacontology-enterprises:hasCoercionEventBeginDate
cacontology-enterprises:hasEncryptionCapability
cacontology-enterprises:hasExploitationRelation
cacontology-enterprises:hasFormationEvent
cacontology-enterprises:hasHierarchy
cacontology-enterprises:hasInnerCore
cacontology-enterprises:hasInvestigationBeginDate
cacontology-enterprises:hasLeadershipRelation
cacontology-enterprises:hasMember
cacontology-enterprises:hasNetworkCell
cacontology-enterprises:hasNetworkComponent
...cacontology-enterprises:hasNetworkNotorietyQuality
cacontology-enterprises:hasOperationalBeginDate
cacontology-enterprises:hasOperationalEndDate
cacontology-enterprises:hasOperationalPeriod
cacontology-enterprises:hasRecruitmentMode
cacontology-enterprises:hierarchyComplexity
cacontology-enterprises:historicallyDependsOn
cacontology-enterprises:holdsLeadershipRole
cacontology-enterprises:identifiesNetworkMember
...acontology-enterprises:identityCorrelationAccuracy
cacontology-enterprises:ideologicalFramework
cacontology-enterprises:infiltratesNetwork
cacontology-enterprises:infiltrationDuration
cacontology-enterprises:innerCoreSize
cacontology-enterprises:leadershipCount
cacontology-enterprises:maintainsAltAccounts
cacontology-enterprises:managesPrivateGroups
cacontology-enterprises:mapsNetworkStructure
cacontology-enterprises:membershipLevel
cacontology-enterprises:membershipRequirements
...cacontology-enterprises:networkMappingCompleteness
cacontology-enterprises:networkNotoriety
cacontology-enterprises:networkSize
cacontology-enterprises:operatesEnterprise
cacontology-enterprises:operatesInSituation
cacontology-enterprises:operationalScope
cacontology-enterprises:participatesInCoercion
cacontology-enterprises:participatesInInnerCore
cacontology-enterprises:participatesInRecruitment
cacontology-enterprises:platformCount
cacontology-enterprises:producesLorebook
cacontology-enterprises:recruitsMembers
cacontology-enterprises:selfHarmType
...acontology-enterprises:socialEngineeringComplexity
cacontology-enterprises:targetingPrecision
cacontology-enterprises:targetsVulnerability
cacontology-enterprises:trustBuildingDuration
cacontology-enterprises:usesAsCurrency
cacontology-enterprises:utilizesEncryptedChannels
cacontology-enterprises:vulnerabilityType
cacontology-forensics:acquisitionMethod
cacontology-forensics:analysesUserBehavior
...acontology-forensics:analyzesCommunicationPatterns
cacontology-forensics:analyzesNetworkTraffic
cacontology-forensics:analyzesTemporalPatterns
cacontology-forensics:arrestsResulting
cacontology-forensics:automationPercentage
cacontology-forensics:behaviorPatternsIdentified
...acontology-forensics:behavioralFingerprintsCreated
cacontology-forensics:caseExhibitNumber
...cacontology-forensics:communicationGraphComplexity
...ology-forensics:coordinatesInternationalProcessing
cacontology-forensics:correlatesAcrossPlatforms
cacontology-forensics:correlatesContent
cacontology-forensics:correlationLatency
cacontology-forensics:correlationStrength
...acontology-forensics:createsBehavioralFingerprints
cacontology-forensics:crossBorderDataSharing
cacontology-forensics:crossPlatformMatches
cacontology-forensics:custodyReason
cacontology-forensics:custodyTransferredFrom
cacontology-forensics:custodyTransferredTo
cacontology-forensics:dataTransferVolume
cacontology-forensics:databasesIntegrated
cacontology-forensics:detectionAccuracy
cacontology-forensics:detectionMethod
cacontology-forensics:devicesRecovered
cacontology-forensics:discoversNetworks
cacontology-forensics:distributesProcessing
cacontology-forensics:enablesRealTimeCorrelation
cacontology-forensics:evidenceLocation
cacontology-forensics:evidenceSeized
cacontology-forensics:evidenceVolumeTerabytes
cacontology-forensics:falsePositiveRate
cacontology-forensics:featureVectorsUsed
cacontology-forensics:filesProcessedMillions
cacontology-forensics:fingerprintAccuracy
cacontology-forensics:forensicCopy
cacontology-forensics:forensicLabsInvolved
cacontology-forensics:forensicPhaseDuration
cacontology-forensics:forensicReport
cacontology-forensics:generatesRealTimeAlerts
cacontology-forensics:generatesTriageResults
cacontology-forensics:geographicDistribution
cacontology-forensics:geographicRadius
cacontology-forensics:geospatialAccuracy
cacontology-forensics:hasForensicPhaseBeginPoint
cacontology-forensics:hasForensicPhaseEndPoint
cacontology-forensics:hasRoleBeginPoint
cacontology-forensics:hasRoleEndPoint
cacontology-forensics:hashDatabaseSize
cacontology-forensics:hashMatchesFound
...ontology-forensics:identifiesCrossPlatformActivity
...cacontology-forensics:identifiesGeographicClusters
cacontology-forensics:identifiesNetworkAnomalies
cacontology-forensics:identifiesPatterns
cacontology-forensics:identifiesTemporalClusters
...ontology-forensics:integratesIntelligenceDatabases
cacontology-forensics:intelligenceHits
cacontology-forensics:investigationDuration
cacontology-forensics:involvesForensicLab
cacontology-forensics:k9AssistanceProvided
cacontology-forensics:locationPointsAnalyzed
cacontology-forensics:mlModelAccuracy
cacontology-forensics:networkConnectionsFound
cacontology-forensics:networkSessionsAnalyzed
cacontology-forensics:parallelProcessingEnabled
cacontology-forensics:performsGeospatialAnalysis
cacontology-forensics:performsHashAnalysis
cacontology-forensics:platformCorrelationScore
cacontology-forensics:platformsAnalyzed
cacontology-forensics:priorityClassification
cacontology-forensics:processesEvidence
cacontology-forensics:processingNodes
cacontology-forensics:processingSpeed
cacontology-forensics:processingTimeframeDays
cacontology-forensics:producesIntelligence
cacontology-forensics:queriesIntelligenceDatabase
cacontology-forensics:queryResponseTime
cacontology-forensics:realTimeAlerts
cacontology-forensics:recoveryMethod
cacontology-forensics:referralsReceived
cacontology-forensics:riskLevelsAssigned
cacontology-forensics:searchWarrantAssisted
cacontology-forensics:sharesProcessingLoad
cacontology-forensics:sourceHash
cacontology-forensics:standardizedProcessing
cacontology-forensics:streamingDataRate
...ontology-forensics:suspiciousConnectionsIdentified
cacontology-forensics:temporalPatternsIdentified
cacontology-forensics:temporalResolution
cacontology-forensics:timeRangeAnalyzed
cacontology-forensics:timelineEvent
cacontology-forensics:trainingDataSize
cacontology-forensics:trainsCorrelationModel
cacontology-forensics:triageAccuracy
cacontology-forensics:triagesEvidence
cacontology-forensics:userAccountsAnalyzed
cacontology-forensics:utilisesSystem
cacontology-forensics:utilizesMachineLearning
cacontology-forensics:verificationHash
cacontology-forensics:victimAgeRange
cacontology-forensics:victimGeographicOrigin
cacontology-forensics:victimsIdentifiedCount
cacontology-forensics:writeBlockingUsed
cacontology-grooming:acceleratesTrust
cacontology-grooming:accountsUsed
cacontology-grooming:administrationMethod
cacontology-grooming:anonymousContactMethod
cacontology-grooming:behaviorDuration
cacontology-grooming:bypassesPhase
cacontology-grooming:commercialOfferType
cacontology-grooming:communicationFrequency
cacontology-grooming:contactFrequency
cacontology-grooming:contentType
cacontology-grooming:crossesStateBoundaries
cacontology-grooming:distressIndicators
cacontology-grooming:economicIncentiveAmount
cacontology-grooming:emotionalTone
cacontology-grooming:escalationRate
cacontology-grooming:escalationTimeframe
cacontology-grooming:evidenceValue
cacontology-grooming:exchangesContent
cacontology-grooming:exhibitsPattern
cacontology-grooming:explicitnessLevel
cacontology-grooming:exploitsOpportunity
cacontology-grooming:exploitsReputation
cacontology-grooming:facilitatesWithSubstance
cacontology-grooming:gameContext
cacontology-grooming:groomingPhaseDuration
cacontology-grooming:groomingStage
cacontology-grooming:hasGroomingPhaseBeginPoint
cacontology-grooming:hasGroomingPhaseEndPoint
cacontology-grooming:hasRoleBeginPoint
cacontology-grooming:hasRoleEndPoint
cacontology-grooming:hasVulnerability
cacontology-grooming:identityVerificationRequired
cacontology-grooming:impairmentLevel
cacontology-grooming:impersonatedRole
cacontology-grooming:impersonatesRole
cacontology-grooming:initialContactPretense
cacontology-grooming:initiationMethod
cacontology-grooming:institutionPrestige
cacontology-grooming:institutionsTargeted
cacontology-grooming:involvesInterstateTransport
cacontology-grooming:isolationMethod
cacontology-grooming:leveragesPosition
cacontology-grooming:manipulationTechnique
cacontology-grooming:meetingLocationSpecified
cacontology-grooming:monetizationTimeframe
cacontology-grooming:occursInSpace
cacontology-grooming:opportunityType
cacontology-grooming:participantCount
cacontology-grooming:patternConfidence
cacontology-grooming:physicalLocation
cacontology-grooming:platformAnonymityLevel
cacontology-grooming:primaryPlatform
cacontology-grooming:progressesToPhysicalMeeting
cacontology-grooming:progressionDuration
cacontology-grooming:propositionExplicitness
cacontology-grooming:prosecutionRelevance
cacontology-grooming:recruitmentDirectness
cacontology-grooming:requestsSecrecy
cacontology-grooming:rolePlayingTactic
cacontology-grooming:ruleStructureDescription
cacontology-grooming:sameDayProgression
cacontology-grooming:seekingHelp
cacontology-grooming:skippedPhases
cacontology-grooming:substanceType
cacontology-grooming:targetsInstitution
cacontology-grooming:targetsVictim
cacontology-grooming:timeOfContact
cacontology-grooming:transitionSpeed
cacontology-grooming:transitionsToLocation
cacontology-grooming:transportationProposed
cacontology-grooming:trustExploitationSpeed
cacontology-grooming:usesGifts
cacontology-grooming:usesThreats
cacontology-grooming:utilizesPlatformFeature
cacontology-grooming:victimCompliance
cacontology-grooming:victimImpact
cacontology-grooming:vulnerabilityType
cacontology-gufo:academicYearBeginTimePoint
cacontology-gufo:aiGenerationTimePoint
cacontology-gufo:analysisCompletionTimePoint
cacontology-gufo:assignmentBeginTime
cacontology-gufo:assignmentEndTime
cacontology-gufo:closureBeginTime
cacontology-gufo:closureTime
cacontology-gufo:coercionBeginTime
cacontology-gufo:coercionEndTime
cacontology-gufo:coordinationBeginTime
cacontology-gufo:detectionTimePoint
cacontology-gufo:discoveryBeginTime
cacontology-gufo:dispositionBeginTime
cacontology-gufo:employmentTerminationTimePoint
cacontology-gufo:escalationBeginTime
cacontology-gufo:escalationPeakTime
cacontology-gufo:evidenceCollectionTime
cacontology-gufo:exploitationBeginTime
cacontology-gufo:exploitationDuration
cacontology-gufo:exploitationEndTime
...acontology-gufo:exploitationFirstIncidentTimePoint
cacontology-gufo:forfeitureBeginTime
cacontology-gufo:forfeitureCompletionTime
cacontology-gufo:forfeitureEndTime
cacontology-gufo:generationDuration
cacontology-gufo:institutionalReportingTimePoint
cacontology-gufo:intakeBeginTime
cacontology-gufo:investigationBeginTime
cacontology-gufo:penaltyImpositionTime
cacontology-gufo:phaseTransitionTime
cacontology-gufo:practiceSessionBeginTime
cacontology-gufo:practiceSessionEndTime
cacontology-gufo:prosecutionBeginTime
cacontology-gufo:reportingTime
cacontology-gufo:restraintBeginTime
cacontology-gufo:reviewBeginTime
cacontology-gufo:reviewEndTime
cacontology-gufo:seizureTime
cacontology-gufo:sentencingTime
cacontology-gufo:triageCompletionTime
cacontology-gufo:trialBeginTime
cacontology-gufo:workflowBeginTime
cacontology-gufo:workflowEndTime
cacontology-impact:addressesHarm
cacontology-impact:admissionReason
cacontology-impact:agencyCount
cacontology-impact:assessesVictim
cacontology-impact:assessmentDate
cacontology-impact:assessmentType
cacontology-impact:coordinatedBy
cacontology-impact:coordinationComplexity
cacontology-impact:dischargeCondition
cacontology-impact:dischargeDate
cacontology-impact:documentedBy
cacontology-impact:duration
cacontology-impact:emergencyCallLocation
cacontology-impact:extractionComplexity
cacontology-impact:facilitatedBy
cacontology-impact:facilitatedByFactor
cacontology-impact:facilitatesReintegration
cacontology-impact:familyContactEstablished
cacontology-impact:followedByDischarge
cacontology-impact:frequency
cacontology-impact:functioningLevel
cacontology-impact:hasImpactPhaseBeginPoint
cacontology-impact:hasImpactPhaseEndPoint
cacontology-impact:hasRoleBeginPoint
cacontology-impact:hasRoleEndPoint
cacontology-impact:hometownLocation
cacontology-impact:hospitalName
cacontology-impact:hospitalStayDuration
cacontology-impact:identifiesHarm
cacontology-impact:impactArea
cacontology-impact:impactPhaseDuration
cacontology-impact:impactSeverity
cacontology-impact:impededBy
cacontology-impact:impededByBarrier
cacontology-impact:includesTransportation
cacontology-impact:indicatorType
cacontology-impact:informsRestitution
cacontology-impact:informsSafetyPlanning
cacontology-impact:intensity
cacontology-impact:interventionType
cacontology-impact:jurisdictionsInvolved
cacontology-impact:lifeAreaAffected
cacontology-impact:manifestsAs
cacontology-impact:milestoneDate
cacontology-impact:milestoneDescription
cacontology-impact:necessitatesAssessment
cacontology-impact:ongoingDangerLevel
cacontology-impact:onsetDate
cacontology-impact:partOfRecovery
cacontology-impact:participatesInResponse
cacontology-impact:prognosis
cacontology-impact:progressionPattern
cacontology-impact:providedBy
cacontology-impact:providesSpecializedSupport
cacontology-impact:receivedTreatment
cacontology-impact:recoveryStage
cacontology-impact:recoveryTimeframe
cacontology-impact:reintegrationDuration
cacontology-impact:relevantToSentencing
cacontology-impact:reportedSituation
cacontology-impact:responseTime
cacontology-impact:resultedFrom
cacontology-impact:resultsinExtraction
cacontology-impact:resultsinHospitalization
cacontology-impact:returnsTo
cacontology-impact:reunitesWith
cacontology-impact:safetyPlanType
cacontology-impact:serviceDuration
cacontology-impact:serviceProvider
cacontology-impact:serviceType
cacontology-impact:sessionCount
cacontology-impact:severity
cacontology-impact:severityLevel
cacontology-impact:transportationCost
cacontology-impact:transportationDestination
cacontology-impact:transportationType
cacontology-impact:traumaType
cacontology-impact:treatedAt
cacontology-impact:treatmentDuration
cacontology-impact:treatmentModality
cacontology-impact:treatmentOutcome
cacontology-impact:triggersResponse
cacontology-infrastructure:accountsFrozen
cacontology-infrastructure:analysesAccess
cacontology-infrastructure:analysesInfrastructure
cacontology-infrastructure:anonymityLevel
cacontology-infrastructure:bandwidthCapacity
cacontology-infrastructure:cloudPlatform
cacontology-infrastructure:containsComponent
cacontology-infrastructure:cryptoCurrencyTypes
cacontology-infrastructure:dataVolumeMirrored
cacontology-infrastructure:distributedAcross
cacontology-infrastructure:domainCount
cacontology-infrastructure:domainsSinkholed
cacontology-infrastructure:encryptionStrength
cacontology-infrastructure:financialComplexity
cacontology-infrastructure:freezesAccounts
cacontology-infrastructure:geographicLocations
cacontology-infrastructure:hasAnalysisAccuracy
cacontology-infrastructure:hasAnalysisBeginPoint
cacontology-infrastructure:hasAnalysisDepth
cacontology-infrastructure:hasAnalysisEndPoint
cacontology-infrastructure:hasAnalysisTimeliness
...contology-infrastructure:hasAnonymityEffectiveness
cacontology-infrastructure:hasFinancialComplexity
...acontology-infrastructure:hasFinancialTraceability
...ntology-infrastructure:hasInfrastructureBeginPoint
...contology-infrastructure:hasInfrastructureEndPoint
...tology-infrastructure:hasInfrastructurePerformance
...tology-infrastructure:hasInfrastructureReliability
...tology-infrastructure:hasInfrastructureScalability
...logy-infrastructure:hasInfrastructureVulnerability
...acontology-infrastructure:hasObfuscationComplexity
cacontology-infrastructure:hasPhaseBeginPoint
cacontology-infrastructure:hasPhaseEndPoint
cacontology-infrastructure:hasRoleBeginPoint
cacontology-infrastructure:hasRoleEndPoint
cacontology-infrastructure:hasSecurityStrength
cacontology-infrastructure:hasTakedownBeginPoint
...cacontology-infrastructure:hasTakedownCompleteness
...acontology-infrastructure:hasTakedownEffectiveness
cacontology-infrastructure:hasTakedownEndPoint
cacontology-infrastructure:hasTakedownSpeed
cacontology-infrastructure:hostedBy
cacontology-infrastructure:hostingProvider
cacontology-infrastructure:leadsToCriminalCharges
cacontology-infrastructure:monthlyRevenue
cacontology-infrastructure:networkComplexity
cacontology-infrastructure:obfuscationMethods
cacontology-infrastructure:paymentMethods
cacontology-infrastructure:protectedBy
cacontology-infrastructure:providesEvidence
cacontology-infrastructure:resultsinSeizure
cacontology-infrastructure:revealsTopology
cacontology-infrastructure:seizesServers
cacontology-infrastructure:serverCount
cacontology-infrastructure:serversSeized
cacontology-infrastructure:sinkholeDomains
cacontology-infrastructure:storageCapacity
cacontology-infrastructure:subscriptionTiers
cacontology-infrastructure:takedownDuration
cacontology-infrastructure:targetsInfrastructure
cacontology-infrastructure:tracesPayments
cacontology-infrastructure:userGeographicSpread
cacontology-infrastructure:usesPaymentSystem
cacontology-institutional:abuseEndYear
cacontology-institutional:abuseStartYear
cacontology-institutional:authorityLevel
cacontology-institutional:chargeCount
cacontology-institutional:childrenServed
cacontology-institutional:concealsFrom
cacontology-institutional:concealsTravel
cacontology-institutional:documentsPattern
cacontology-institutional:donorCount
cacontology-institutional:enablesExploitation
cacontology-institutional:exercisesAuthorityOver
cacontology-institutional:existentiallyDependsOn
cacontology-institutional:experiencesExploitation
cacontology-institutional:exploitationTypeCount
cacontology-institutional:exploitsRole
cacontology-institutional:exploitsVulnerability
cacontology-institutional:facilitatedBy
...cacontology-institutional:foreignResidenceDuration
cacontology-institutional:foundedBy
cacontology-institutional:foundingYear
cacontology-institutional:fundingAmount
cacontology-institutional:genericallyDependsOn
cacontology-institutional:hasAuthorityLevel
cacontology-institutional:hasExploitationEndDate
...ntology-institutional:hasExploitationSeverityLevel
...cacontology-institutional:hasExploitationStartDate
...contology-institutional:hasInstitutionFoundingDate
...logy-institutional:hasInstitutionalReputationLevel
cacontology-institutional:hasIsolationDegree
cacontology-institutional:hasOperationEndDate
cacontology-institutional:hasOversightLevel
cacontology-institutional:hasRoleEndDate
cacontology-institutional:hasRoleStartDate
cacontology-institutional:hasSystematicityDegree
cacontology-institutional:hasTravelDate
cacontology-institutional:hasTrustLevel
cacontology-institutional:hasVulnerabilityLevel
cacontology-institutional:historicallyDependsOn
cacontology-institutional:holdsRole
cacontology-institutional:impactsVictim
cacontology-institutional:investigatedBy
...acontology-institutional:isComponentOfExploitation
cacontology-institutional:isPartOfInstitution
cacontology-institutional:isPartOfInvestigation
cacontology-institutional:isolationDegree
cacontology-institutional:maintainedBy
cacontology-institutional:manipulates
cacontology-institutional:manipulationTactics
cacontology-institutional:occursInContext
cacontology-institutional:occursWithin
cacontology-institutional:operatesInCountry
...logy-institutional:operatesInJurisdictionalContext
cacontology-institutional:operationDurationYears
...acontology-institutional:participatesInInstitution
cacontology-institutional:perpetratesExploitation
cacontology-institutional:prosecutedInContext
cacontology-institutional:prosecutedUnder
cacontology-institutional:prosecutionJurisdiction
cacontology-institutional:providesTestimony
cacontology-institutional:receivesSupport
cacontology-institutional:resultsInSentence
cacontology-institutional:revealsPattern
cacontology-institutional:sentenceLength
cacontology-institutional:servesPopulation
cacontology-institutional:targetsPopulation
cacontology-institutional:travelFrequency
cacontology-institutional:travelPatternYears
cacontology-institutional:travelPurposeClaimed
cacontology-institutional:travelsFrom
cacontology-institutional:travelsTo
cacontology-institutional:trustLevelExploited
cacontology-institutional:undertakesTravelFor
cacontology-institutional:victimCount
cacontology-institutional:victimTestimoniesCount
cacontology-institutional:vulnerabilityType
...gy-institutional:yearsFromVictimizationToTestimony
cacontology-international:alertResponseTime
cacontology-international:alertingPartner
cacontology-international:analysesUsers
cacontology-international:automatedMatchAccuracy
cacontology-international:channelsMonitored
cacontology-international:communicationLatency
cacontology-international:contributesToFusion
cacontology-international:cooperationResponseTime
cacontology-international:coordinatedByEuropol
...acontology-international:coordinatesGlobalTakedown
cacontology-international:coordinatesHotlines
...ology-international:coordinatesInternationalEffort
cacontology-international:coordinatesProsecution
cacontology-international:coordinatesResources
cacontology-international:coordinatesWith
cacontology-international:coordinatingAgency
cacontology-international:coordinationComplexity
...ontology-international:coordinationComplexityLevel
cacontology-international:coordinationMethod
cacontology-international:crossBorderCapability
cacontology-international:crossReferencesFound
cacontology-international:dataLakeSize
cacontology-international:databasesIntegrated
cacontology-international:deploysTeam
cacontology-international:disruptionEffectiveness
...ntology-international:disruptsInternationalNetwork
cacontology-international:emergencyResponseTime
...cacontology-international:enablesAutomatedMatching
cacontology-international:enablesRealTimeSharing
cacontology-international:encryptionLevel
...ntology-international:europeanMemberStatesInvolved
cacontology-international:evidenceSharingVolume
...ontology-international:evidenceVolumeInternational
cacontology-international:executesQuery
cacontology-international:feedsDataLake
cacontology-international:forensicTeamsDeployed
cacontology-international:fusionAccuracy
...acontology-international:generatesThreatAssessment
cacontology-international:globalCoverage
cacontology-international:informationSharingLevel
cacontology-international:integratesToNetwork
cacontology-international:intelligenceChannels
cacontology-international:intelligenceSources
...tology-international:internationalPartnersInvolved
cacontology-international:investigativeTeamSize
cacontology-international:involvesCountries
cacontology-international:jurisdictionCount
cacontology-international:languageSupport
cacontology-international:managedBy
cacontology-international:multilateralAgreement
cacontology-international:operatesInCountry
cacontology-international:operationContext
cacontology-international:operationDurationMonths
cacontology-international:participatesIn
cacontology-international:partnerCountryCount
cacontology-international:performsCrossReference
cacontology-international:processesDistributed
cacontology-international:processesEvidence
cacontology-international:processingNodeCount
...cacontology-international:prosecutionsCrossCountry
cacontology-international:providesExpertise
cacontology-international:queryPerformanceMs
...cacontology-international:receivesIntelligenceFeed
cacontology-international:referredTo
cacontology-international:requiresAssistance
cacontology-international:resourcesCoordinated
...acontology-international:responseTimeInternational
cacontology-international:resultsInSeizure
cacontology-international:sharesDataWith
...tology-international:sharesEvidenceInternationally
cacontology-international:sharesIntelligence
cacontology-international:simultaneousCountries
cacontology-international:simultaneousOperations
...acontology-international:specializedExpertiseAreas
cacontology-international:supportedBy
cacontology-international:synchronizationAccuracy
cacontology-international:synchronizesOperations
cacontology-international:targetsPlatform
cacontology-international:threatLevelAssessed
cacontology-international:transmitsAlert
cacontology-international:treatyBasis
cacontology-international:treatyMechanism
cacontology-international:triggersAlert
...acontology-international:triggersEmergencyProtocol
cacontology-international:undercoverCoordination
cacontology-international:userCountriesAffected
cacontology-international:usersAnalyzedMillions
cacontology-international:utilizesSecureChannel
cacontology-legal:appliesToCountry
cacontology-legal:assessedBy
cacontology-legal:basedOnModel
cacontology-legal:concernsLegalFramework
cacontology-legal:countriesAnalyzed
cacontology-legal:coveragePercentage
cacontology-legal:effectivenessScore
cacontology-legal:enablesExtradition
cacontology-legal:facilitatesCooperation
cacontology-legal:harmonizationProgress
cacontology-legal:hasAssessmentReliability
cacontology-legal:hasCapacityLevel
cacontology-legal:hasComplianceLevel
cacontology-legal:hasCooperationIntensity
cacontology-legal:hasCoverageCompleteness
cacontology-legal:hasDataQuality
cacontology-legal:hasDevelopmentProgress
cacontology-legal:hasExtraditionEfficiency
cacontology-legal:hasGapSeverity
cacontology-legal:hasHarmonizationDegree
cacontology-legal:hasImplementationQuality
cacontology-legal:hasLegalEffectiveness
cacontology-legal:hasLegalRobustness
cacontology-legal:hasReformUrgency
cacontology-legal:hasStandardCompliance
cacontology-legal:hasTreatyStrength
cacontology-legal:identifiesGap
cacontology-legal:implementationStatus
cacontology-legal:isAssessedBy
cacontology-legal:isComponentOf
cacontology-legal:legalAlignmentLevel
cacontology-legal:legalSystemType
cacontology-legal:legislativeCompliance
cacontology-legal:measuredBy
cacontology-legal:partOfFramework
cacontology-legal:participatesIn
cacontology-legal:policyGapSeverity
cacontology-legal:providesAssistance
cacontology-legal:reformPriority
cacontology-legal:requiresReform
cacontology-legal:standsInQualifiedCompliance
cacontology-multi:agencyCount
cacontology-multi:agencyLevelsMixed
cacontology-multi:agencyParticipantCount
cacontology-multi:agentParticipantCount
cacontology-multi:arrestsNationwide
cacontology-multi:authorizedBy
cacontology-multi:casesSubmittedForProsecution
cacontology-multi:chargeTypesDiversity
cacontology-multi:childrenRescued
cacontology-multi:childrenRescuedCount
cacontology-multi:communicationBarriers
cacontology-multi:communicationProtocol
cacontology-multi:communityOutreachEffectiveness
cacontology-multi:complianceViolationsFound
cacontology-multi:complianceVisitsCount
cacontology-multi:coordinatedBy
cacontology-multi:coordinatesAgencies
cacontology-multi:coordinatesComplianceChecks
cacontology-multi:coordinatesNationwide
cacontology-multi:coordinationCenterLocation
cacontology-multi:coordinationChallenges
cacontology-multi:coordinationComplexity
cacontology-multi:coordinationMechanism
cacontology-multi:coordinationPhaseDuration
cacontology-multi:costSharingArrangement
cacontology-multi:countiesInvolved
cacontology-multi:coversState
cacontology-multi:crossStateCommunication
cacontology-multi:crossesBorders
cacontology-multi:crossingDocumentation
cacontology-multi:deploysAgents
cacontology-multi:destinationState
cacontology-multi:diplomaticChannels
cacontology-multi:disclosureToArrestHours
cacontology-multi:enablesRapidResponse
cacontology-multi:facilitatedByCoordination
cacontology-multi:facilitatesChildRescue
cacontology-multi:fbiFieldOfficesInvolved
cacontology-multi:governedByAgreement
cacontology-multi:grandJuryAcceptances
cacontology-multi:handoffType
cacontology-multi:handsOnArrestsCount
cacontology-multi:hasCoordinationPhaseBeginPoint
cacontology-multi:hasCoordinationPhaseEndPoint
cacontology-multi:hasRoleBeginPoint
cacontology-multi:hasRoleEndPoint
cacontology-multi:hostedBy
cacontology-multi:identifiesVictims
cacontology-multi:informationSharingLevel
cacontology-multi:investigationScope
cacontology-multi:investigationsInitiated
cacontology-multi:involvesAgency
cacontology-multi:involvesFBIFieldOffice
cacontology-multi:involvesStateLineCrossing
...cacontology-multi:involvesTraffickingInvestigation
cacontology-multi:jurisdictionCount
cacontology-multi:jurisdictionTriggerType
cacontology-multi:jurisdictionalConflicts
cacontology-multi:languageBarriers
cacontology-multi:leadBy
cacontology-multi:legalComplexity
cacontology-multi:meetingFrequency
cacontology-multi:memberAgencyCount
cacontology-multi:newVictimsIdentified
cacontology-multi:operatesInJurisdiction
cacontology-multi:operationDuration
cacontology-multi:operationDurationDays
cacontology-multi:operationName
cacontology-multi:operationPhase
cacontology-multi:operationSuccessRating
cacontology-multi:originatingState
cacontology-multi:personnelAssigned
cacontology-multi:primaryJurisdiction
cacontology-multi:prosecutionAvoidanceBehavior
cacontology-multi:providesAssistanceTo
cacontology-multi:requestsAssistanceFrom
cacontology-multi:requiresHandoff
cacontology-multi:rescuesChildren
cacontology-multi:resourceType
cacontology-multi:resourceValue
cacontology-multi:searchWarrantsExecuted
cacontology-multi:sharesInformationWith
cacontology-multi:sharesResourcesWith
cacontology-multi:sharingDuration
cacontology-multi:spansCounties
cacontology-multi:specializedUnitsDeployed
cacontology-multi:statesCrossed
cacontology-multi:statesInvolved
cacontology-multi:statewideCoverage
cacontology-multi:successMetrics
cacontology-multi:targetStrategy
cacontology-multi:targetTypeCount
cacontology-multi:targetsOffenderType
cacontology-multi:taskForceDuration
cacontology-multi:taskForceType
cacontology-multi:taskForcesInvolved
cacontology-multi:timeZoneChallenges
cacontology-multi:totalArrests
cacontology-multi:traffickingCasesIdentified
cacontology-multi:transportationIntent
cacontology-multi:transportationMethod
cacontology-multi:treatyBasis
cacontology-multi:triggeredByOutreach
cacontology-multi:triggersJurisdiction
cacontology-multi:uncoversCrossStateEvidence
cacontology-multi:usAttorneyOfficesInvolved
cacontology-multi:usersForProsecutionMillions
cacontology-multi:utilizesCoordination
cacontology-partnerships:contributesToAnalysis
cacontology-partnerships:cooperatesOn
cacontology-partnerships:cooperationDuration
cacontology-partnerships:coordinatedBy
cacontology-partnerships:coordinatedThrough
cacontology-partnerships:enablesSharing
cacontology-partnerships:generatesRequests
cacontology-partnerships:governedBy
cacontology-partnerships:hasCooperationBeginPoint
cacontology-partnerships:hasCooperationEndPoint
cacontology-partnerships:hasPartnershipBeginPoint
cacontology-partnerships:hasPartnershipEndPoint
cacontology-partnerships:hasPhaseBeginPoint
cacontology-partnerships:hasPhaseEndPoint
cacontology-partnerships:hasRole
cacontology-partnerships:hasRoleBeginPoint
cacontology-partnerships:hasRoleEndPoint
cacontology-partnerships:includesPartner
...cacontology-partnerships:participatesInDevelopment
cacontology-partnerships:participatesInOperation
cacontology-partnerships:partnershipDuration
cacontology-partnerships:phaseDuration
cacontology-partnerships:providesMonitoring
cacontology-partnerships:respondsToEmergency
cacontology-partnerships:roleDuration
cacontology-partnerships:sharesIntelligence
cacontology-partnerships:solicitsHelp
cacontology-physical:associatedWithSubject
cacontology-physical:chainOfCustody
cacontology-physical:containsItem
cacontology-physical:criminalPurpose
cacontology-physical:deviceBrand
cacontology-physical:deviceModel
cacontology-physical:digitalContentFound
cacontology-physical:encryptionStatus
cacontology-physical:evidenceTag
cacontology-physical:evidenceType
cacontology-physical:evidentiarySignificance
cacontology-physical:forensicAnalysisRequired
cacontology-physical:functionalStatus
cacontology-physical:hasAcquisitionRisk
cacontology-physical:hasAnalysisAccuracy
cacontology-physical:hasAnalysisReliability
cacontology-physical:hasContaminationLevel
cacontology-physical:hasCustodyIntegrity
cacontology-physical:hasDocumentationCompleteness
cacontology-physical:hasEvidenceBeginPoint
cacontology-physical:hasEvidenceEndPoint
cacontology-physical:hasEvidenceIntegrity
cacontology-physical:hasEvidenceReliability
cacontology-physical:hasForensicValue
cacontology-physical:hasMethodValidation
cacontology-physical:hasPhaseBeginPoint
cacontology-physical:hasPhaseEndPoint
cacontology-physical:hasPreservationQuality
cacontology-physical:hasProcurementBeginPoint
cacontology-physical:hasProcurementEndPoint
cacontology-physical:hasProcurementSuspicion
cacontology-physical:hasRoleBeginPoint
cacontology-physical:hasRoleEndPoint
cacontology-physical:hasSearchBeginPoint
cacontology-physical:hasSearchCompleteness
cacontology-physical:hasSearchEfficiency
cacontology-physical:hasSearchEndPoint
cacontology-physical:hasSearchThoroughness
cacontology-physical:hasTraceability
cacontology-physical:hiddenCompartment
cacontology-physical:modificationPurpose
cacontology-physical:paymentMethod
cacontology-physical:physicalCondition
cacontology-physical:procuredBy
cacontology-physical:procurementCost
cacontology-physical:procurementDate
cacontology-physical:procurementMethod
cacontology-physical:procurementSource
cacontology-physical:searchDuration
cacontology-physical:searchScope
cacontology-physical:searchWarrant
cacontology-physical:searchingOfficer
cacontology-physical:seizedDuring
cacontology-physical:seizureDate
cacontology-physical:seizureLocation
cacontology-physical:serialNumber
cacontology-physical:storageCapacity
cacontology-physical:tamperEvidence
cacontology-physical:targetAgeGroup
cacontology-physical:witnessPresent
cacontology-platforms:acceptsLegalProcess
cacontology-platforms:accountStatus
cacontology-platforms:accountUsername
cacontology-platforms:actionDuration
cacontology-platforms:ageVerificationMethod
cacontology-platforms:ageVerificationRequired
cacontology-platforms:allowsAnonymousChat
cacontology-platforms:anonymityLevel
cacontology-platforms:anonymousUserDataRetention
cacontology-platforms:contactInitiationMethod
cacontology-platforms:contentRetentionPeriod
cacontology-platforms:contentType
cacontology-platforms:conversationLogging
cacontology-platforms:coordinatedBy
cacontology-platforms:correlatesWithAccount
cacontology-platforms:correlatesWithDevice
cacontology-platforms:crossPlatformAnonymity
cacontology-platforms:crossPlatformMatch
cacontology-platforms:csaiDetectionEnabled
cacontology-platforms:dataDisclosed
cacontology-platforms:deviceType
cacontology-platforms:devicesSearched
cacontology-platforms:discoveredDuring
cacontology-platforms:discoveryTimestamp
cacontology-platforms:emergencyDisclosureCapable
cacontology-platforms:enablesTemporaryAccounts
cacontology-platforms:encryptionLevel
cacontology-platforms:evidenceCategory
cacontology-platforms:evidenceTimestamp
cacontology-platforms:facilitatesRandomMatching
cacontology-platforms:foundOnDevice
cacontology-platforms:foundOnSocialMedia
cacontology-platforms:governedByDisclosurePolicy
cacontology-platforms:guestAccountsAllowed
cacontology-platforms:hasActionBeginPoint
cacontology-platforms:hasActionEndPoint
...contology-platforms:hasContentModerationCapability
cacontology-platforms:hasDataRetentionPolicy
...cacontology-platforms:hasLegalComplianceCapability
cacontology-platforms:hasPhaseBeginPoint
cacontology-platforms:hasPhaseEndPoint
cacontology-platforms:hasPlatformBeginPoint
cacontology-platforms:hasPlatformEndPoint
cacontology-platforms:hasUserVerificationSystem
cacontology-platforms:hashMatchingEnabled
cacontology-platforms:headquarteredIn
...ontology-platforms:identityDisclosureCircumstances
...cacontology-platforms:identityVerificationRequired
cacontology-platforms:legalAuthority
cacontology-platforms:legalProcessContactInfo
cacontology-platforms:legalProcessUsed
cacontology-platforms:logRetentionPeriod
cacontology-platforms:maintainsAnonymityLevel
cacontology-platforms:moderationDecision
cacontology-platforms:moderationMethod
cacontology-platforms:moderationPresence
cacontology-platforms:offersContactOpportunity
cacontology-platforms:operatedBy
cacontology-platforms:operatesInJurisdiction
cacontology-platforms:phaseDuration
cacontology-platforms:platformDuration
cacontology-platforms:platformType
cacontology-platforms:platformsInvestigated
cacontology-platforms:preservationPeriod
cacontology-platforms:primaryUserBase
cacontology-platforms:providesAnonymousFeature
cacontology-platforms:providesOpenChatAccess
cacontology-platforms:requiresRegistration
cacontology-platforms:responseTimeFrame
cacontology-platforms:searchWarrantRequired
cacontology-platforms:socialMediaPlatform
cacontology-platforms:subsidiaryOf
cacontology-platforms:suspensionDuration
cacontology-platforms:suspensionReason
cacontology-platforms:userDataRetentionPeriod
cacontology-platforms:verificationStrength
cacontology-prevention:accessesArchive
cacontology-prevention:activeParticipantCount
cacontology-prevention:addressesSextortion
cacontology-prevention:affiliateOrganizationCount
cacontology-prevention:affiliatedWith
cacontology-prevention:ageGroup
cacontology-prevention:arrestsFromDisclosures
cacontology-prevention:assessesRisk
cacontology-prevention:averageDisclosureTime
cacontology-prevention:averageHelpSeekingTime
cacontology-prevention:averageListeningDuration
cacontology-prevention:communityParticipation
cacontology-prevention:communityReportingIncrease
cacontology-prevention:coordinatedBy
cacontology-prevention:coordinatedWith
cacontology-prevention:coordinatesWith
...acontology-prevention:coordinationMeetingFrequency
cacontology-prevention:courseCompletionRate
cacontology-prevention:courseModuleCount
cacontology-prevention:deliveredBy
...cacontology-prevention:disclosureBarriersAddressed
cacontology-prevention:disclosuresGenerated
cacontology-prevention:discreteAccessCount
cacontology-prevention:distributedViaEmailList
cacontology-prevention:distributedsTo
cacontology-prevention:educatesOn
cacontology-prevention:educationPortalReach
cacontology-prevention:emailListSubscriberCount
cacontology-prevention:emailOpenRate
cacontology-prevention:enablesDiscreetAccess
cacontology-prevention:enablesRapidResponse
cacontology-prevention:engagesCommunity
cacontology-prevention:engagesParents
cacontology-prevention:enhancedBy
cacontology-prevention:faqAccessCount
cacontology-prevention:faqItemCount
cacontology-prevention:hostsContentOn
cacontology-prevention:identifiesTrustedAdult
cacontology-prevention:implementationStatus
cacontology-prevention:implementsProtocol
cacontology-prevention:integratesQRCode
cacontology-prevention:integratesToPlatform
cacontology-prevention:languageAvailability
cacontology-prevention:maintainsEmailList
cacontology-prevention:measuresEngagementOf
cacontology-prevention:monitorsUsageOf
cacontology-prevention:parentalEngagementRate
cacontology-prevention:participantCount
cacontology-prevention:podcastDownloadCount
cacontology-prevention:podcastEpisodeCount
cacontology-prevention:postersDistributed
cacontology-prevention:presentationAttendance
cacontology-prevention:preventionEffectiveness
cacontology-prevention:preventsBullying
cacontology-prevention:preventsMechanism
cacontology-prevention:programDuration
cacontology-prevention:providesResource
cacontology-prevention:publicationArchiveSize
cacontology-prevention:publishesToArchive
cacontology-prevention:qrCodeEnabled
cacontology-prevention:qrCodeScans
cacontology-prevention:queriesFAQ
cacontology-prevention:rapidResponseCapability
cacontology-prevention:reducesBarrier
cacontology-prevention:reducesShaming
cacontology-prevention:resourceSharingFrequency
cacontology-prevention:resultsInArrest
cacontology-prevention:riskReductionLevel
cacontology-prevention:schoolsTargeted
...cacontology-prevention:sextortionWarningSignsCount
cacontology-prevention:sharesResourcesWith
cacontology-prevention:statewideCoverage
cacontology-prevention:supportedBy
cacontology-prevention:targetAgeGroup
cacontology-prevention:targetAudience
cacontology-prevention:targetsAudience
cacontology-prevention:tracksPodcastMetrics
cacontology-prevention:tracksProgressOf
cacontology-prevention:triggersDisclosure
cacontology-prevention:trustedAdultsIdentified
cacontology-production:concealmentLocation
cacontology-production:concealmentMethod
cacontology-production:developmentalDocumentation
cacontology-production:deviceBrand
cacontology-production:deviceModel
cacontology-production:distributionIntent
cacontology-production:editedWith
cacontology-production:evidenceOf
cacontology-production:evidenceRecovered
cacontology-production:facilitatedBy
cacontology-production:forensicValue
...acontology-production:hasProductionPhaseBeginPoint
cacontology-production:hasProductionPhaseEndPoint
cacontology-production:hasRoleBeginPoint
cacontology-production:hasRoleEndPoint
cacontology-production:imageCount
cacontology-production:immediateDistribution
cacontology-production:involvestVictim
cacontology-production:locationAccess
cacontology-production:locationSecurity
cacontology-production:metadataPreserved
cacontology-production:modificationDescription
cacontology-production:partOfSeries
cacontology-production:privacyExpectation
cacontology-production:producedAt
cacontology-production:producedBy
cacontology-production:produces
cacontology-production:productionComplexity
cacontology-production:productionEndDate
cacontology-production:productionMethod
cacontology-production:productionPeriod
cacontology-production:productionStartDate
cacontology-production:recordedWith
cacontology-production:recordingCapability
cacontology-production:recordingQuality
cacontology-production:resultingContent
cacontology-production:sessionCount
cacontology-production:sessionDuration
cacontology-production:sessionLocation
cacontology-production:storageCapacity
cacontology-production:surveillanceAngle
cacontology-production:systematicNature
cacontology-production:totalContentVolume
cacontology-production:triggeredInvestigation
cacontology-production:usesEquipment
cacontology-production:victimAge
cacontology-production:victimAgeProgression
cacontology-production:victimAwareness
cacontology-production:victimCount
cacontology-production:videoCount
cacontology-recruitment:academicPerformanceLevel
cacontology-recruitment:attendanceRate
cacontology-recruitment:attendsSchool
cacontology-recruitment:averageRecruitmentTime
cacontology-recruitment:contactsLawEnforcement
cacontology-recruitment:employedAt
cacontology-recruitment:exhibitsVulnerability
cacontology-recruitment:exploitsVulnerability
cacontology-recruitment:facilitatedBy
cacontology-recruitment:gradeLevel
cacontology-recruitment:includesRecruitingVictim
cacontology-recruitment:introducesTo
cacontology-recruitment:mandatoryReportingTrigger
cacontology-recruitment:mitigatesVulnerability
cacontology-recruitment:networkSize
cacontology-recruitment:operatesInNetwork
cacontology-recruitment:receivesReport
cacontology-recruitment:recruitmentAttempts
cacontology-recruitment:recruitsVictim
cacontology-recruitment:reportingDelay
cacontology-recruitment:reportingStaffRole
cacontology-recruitment:reportsToSchool
cacontology-recruitment:schoolType
cacontology-recruitment:schoolsInvolved
cacontology-recruitment:socioeconomicLevel
cacontology-recruitment:studentPopulation
cacontology-recruitment:successfulRecruitments
cacontology-recruitment:targetsSchool
cacontology-recruitment:triggersInvestigation
cacontology-recruitment:victimRecruitersCount
cacontology-recruitment:vulnerabilityScore
cacontology-registry:ageAcknowledgmentMethod
cacontology-registry:arrestTiming
cacontology-registry:attendsSchool
cacontology-registry:basedOnOffense
cacontology-registry:complianceType
cacontology-registry:contentTypesReceived
cacontology-registry:contentTypesSent
cacontology-registry:convictionDate
cacontology-registry:coordinatedWithCompliance
cacontology-registry:coordinatesBetweenAgencies
cacontology-registry:coordinationTimeframe
cacontology-registry:crossesStates
cacontology-registry:dateOfBirth
cacontology-registry:demonstratesAgeAwareness
cacontology-registry:employedAt
cacontology-registry:executedAt
cacontology-registry:executedDuring
cacontology-registry:exhibitsRecidivism
cacontology-registry:expirationDate
cacontology-registry:exploitationDurationMonths
cacontology-registry:eyeColor
cacontology-registry:fullName
cacontology-registry:hairColor
cacontology-registry:hasAlias
cacontology-registry:hasCompliance
cacontology-registry:hasOnlineIdentifier
cacontology-registry:hasProfile
cacontology-registry:hasRegistrationRecord
cacontology-registry:height
...cacontology-registry:involvesBidirectionalExchange
...acontology-registry:involvesHighVolumeExploitation
cacontology-registry:involvesPattern
cacontology-registry:lastUpdate
cacontology-registry:lifetimeRegistration
cacontology-registry:lifetimeSupervision
cacontology-registry:managedBy
cacontology-registry:mandatoryMinimumYears
cacontology-registry:maximumSentenceYears
cacontology-registry:messageCount
cacontology-registry:offenseDescription
cacontology-registry:ownsVehicle
cacontology-registry:postRegistrationEvent
cacontology-registry:priorConvictionCount
cacontology-registry:race
cacontology-registry:recidivismPattern
cacontology-registry:recoversEvidence
cacontology-registry:registeredIn
cacontology-registry:registrationDate
cacontology-registry:registrationFrequency
cacontology-registry:registrationNumber
cacontology-registry:residesAt
cacontology-registry:sentenceLength
cacontology-registry:sentenceServed
cacontology-registry:sex
cacontology-registry:socialSecurityNumber
cacontology-registry:subjectToRestriction
cacontology-registry:targetsCrossState
cacontology-registry:tier
cacontology-registry:triggersInvestigation
cacontology-registry:verifiedBy
cacontology-registry:victimAge
cacontology-registry:victimAgeAcknowledged
cacontology-registry:victimCount
cacontology-registry:victimRelationship
cacontology-registry:violationCategory
cacontology-registry:weight
cacontology-registry:yearsBetweenOffenses
cacontology-sentencing:appliesTo
cacontology-sentencing:bailStatus
cacontology-sentencing:concurrentWith
cacontology-sentencing:currentPhase
cacontology-sentencing:hasCharge
cacontology-sentencing:hasLegalPhase
cacontology-sentencing:hasPhaseBeginPoint
cacontology-sentencing:hasPhaseEndPoint
cacontology-sentencing:hasProceedingBeginPoint
cacontology-sentencing:hasProceedingEndPoint
cacontology-sentencing:hasRole
cacontology-sentencing:hasRoleBeginPoint
cacontology-sentencing:hasRoleEndPoint
cacontology-sentencing:hasSentenceBeginPoint
cacontology-sentencing:hasSentenceEndPoint
cacontology-sentencing:involvesChargeCount
cacontology-sentencing:involvesParticipantCount
cacontology-sentencing:participatesInProceeding
cacontology-sentencing:phaseDuration
cacontology-sentencing:proceedingDuration
cacontology-sentencing:resultsSentence
cacontology-sentencing:roleDuration
cacontology-sentencing:sentenceConcurrency
cacontology-sentencing:sentenceDuration
cacontology-sentencing:situationComplexity
cacontology-sentencing:transitionsToPhase
cacontology-sextortion:actualAge
cacontology-sextortion:analyzesDevice
cacontology-sextortion:claimedAge
cacontology-sextortion:conductsOnPlatform
cacontology-sextortion:containsCommunication
cacontology-sextortion:conversationCount
cacontology-sextortion:conversationLength
cacontology-sextortion:demandType
cacontology-sextortion:deviceCount
cacontology-sextortion:employsThreat
cacontology-sextortion:escalationSpeed
cacontology-sextortion:evidenceRecovered
cacontology-sextortion:explicitnessLevel
cacontology-sextortion:falsePersonaType
cacontology-sextortion:followsProgression
cacontology-sextortion:giftCardType
cacontology-sextortion:identifiesVictim
cacontology-sextortion:imageType
cacontology-sextortion:incidentDuration
cacontology-sextortion:investigatedBy
cacontology-sextortion:involvesDeception
cacontology-sextortion:makesDemand
cacontology-sextortion:monetaryAmount
cacontology-sextortion:nextPhase
cacontology-sextortion:previousPhase
cacontology-sextortion:progressionStage
cacontology-sextortion:providesEvidence
cacontology-sextortion:reconstructsConversation
cacontology-sextortion:resultsinCharge
cacontology-sextortion:threatFollowThrough
cacontology-sextortion:threatSpecificity
cacontology-sextortion:threatType
cacontology-sextortion:triggersPhase
cacontology-sextortion:usesManipulation
cacontology-sextortion:utilizesFeature
cacontology-sextortion:victimAgeGroup
cacontology-sextortion:victimCount
cacontology-specialized:hasOperationBeginPoint
cacontology-specialized:hasOperationEndPoint
cacontology-specialized:hasPhaseBeginPoint
cacontology-specialized:hasPhaseEndPoint
cacontology-specialized:hasRoleBeginPoint
cacontology-specialized:hasRoleEndPoint
cacontology-specialized:hasUnitBeginPoint
cacontology-specialized:hasUnitEndPoint
cacontology-specialized:operationDuration
cacontology-specialized:phaseDuration
cacontology-specialized:roleDuration
cacontology-specialized:unitDuration
cacontology-strategy:dependsOnPattern
cacontology-strategy:extendsPattern
cacontology-strategy:hasIntegrationPattern
cacontology-strategy:hasIntegrationPriority
cacontology-strategy:hasIntegrationTimeline
cacontology-strategy:hasValidationQuery
cacontology-strategy:hasValidationRule
cacontology-strategy:requiresValidation
cacontology-street:administrationMethod
cacontology-street:apparentAge
cacontology-street:approachMethod
cacontology-street:assessesVulnerability
cacontology-street:contactDuration
cacontology-street:conversationTopic
cacontology-street:distanceFromContact
cacontology-street:distressIndicators
cacontology-street:documentsRecruitment
cacontology-street:economicIncentive
cacontology-street:escalatesTo
cacontology-street:escalationTimeframe
cacontology-street:exhibitsIndicator
cacontology-street:explicitnessLevel
cacontology-street:exploitationLocation
cacontology-street:exploitsVulnerability
cacontology-street:facilitatesTransition
cacontology-street:facilitatesWithSubstance
cacontology-street:followUpDelay
cacontology-street:followUpMethod
cacontology-street:followsUpWith
cacontology-street:helpOfferType
cacontology-street:impairmentLevel
cacontology-street:initialContactLocation
cacontology-street:initiatesContact
cacontology-street:isolatesAt
cacontology-street:isolationLevel
cacontology-street:makesProposition
cacontology-street:moneyAmountMentioned
cacontology-street:occursAt
cacontology-street:persistenceLevel
cacontology-street:persistsAfter
cacontology-street:pretextUsed
cacontology-street:propositionType
cacontology-street:reinforcementAttempts
cacontology-street:reinforces
cacontology-street:rejects
cacontology-street:reportingDelay
cacontology-street:reportingMethod
cacontology-street:reportsTo
cacontology-street:resistanceLevel
cacontology-street:respondsTo
cacontology-street:responseType
cacontology-street:sameDayProgression
cacontology-street:substanceType
cacontology-street:supportsCharge
cacontology-street:targetsVictim
cacontology-street:transitionsTo
cacontology-street:transportationMethod
cacontology-street:usesPretext
cacontology-street:vulnerabilityIndicators
cacontology-tactical:afterActionReport
cacontology-tactical:backupTeamAvailable
cacontology-tactical:briefingConducted
cacontology-tactical:commandedBy
cacontology-tactical:deployedDuring
cacontology-tactical:entryMethod
cacontology-tactical:equipmentType
cacontology-tactical:evacuationRequired
cacontology-tactical:flightRisk
cacontology-tactical:forceUsed
cacontology-tactical:injuriesOccurred
cacontology-tactical:mediaPresent
cacontology-tactical:negotiationAttempted
cacontology-tactical:negotiationDuration
cacontology-tactical:negotiationOutcome
cacontology-tactical:operatedBy
cacontology-tactical:operationAuthorization
cacontology-tactical:operationDuration
cacontology-tactical:operationLocation
cacontology-tactical:operationOutcome
cacontology-tactical:operationType
cacontology-tactical:participatingMember
cacontology-tactical:perimeterEstablished
cacontology-tactical:planningDuration
cacontology-tactical:propertyDamage
cacontology-tactical:publicSafetyThreat
cacontology-tactical:resistanceEncountered
cacontology-tactical:riskLevel
cacontology-tactical:specialApprovalRequired
cacontology-tactical:standoffDuration
cacontology-tactical:suicidalRisk
cacontology-tactical:suspectsArrested
cacontology-tactical:teamSize
cacontology-tactical:threatLevel
cacontology-tactical:useOfForceJustified
cacontology-tactical:weaponsDeployed
cacontology-tactical:weaponsPossible
cacontology-taskforce:accessibleVia
cacontology-taskforce:agencyCount
cacontology-taskforce:agencyType
cacontology-taskforce:arrestsSince2006
cacontology-taskforce:arrestsSince2019
cacontology-taskforce:assignedToUnit
cacontology-taskforce:capabilityLevel
cacontology-taskforce:certificationStatus
cacontology-taskforce:certificationValid
cacontology-taskforce:certifiedIn
cacontology-taskforce:collaboratesWith
cacontology-taskforce:commandedBy
cacontology-taskforce:completionRate
cacontology-taskforce:conductedBy
cacontology-taskforce:coordinatedBy
cacontology-taskforce:coordinatedThrough
cacontology-taskforce:coordinatesWith
cacontology-taskforce:coordinatesWithCivilian
cacontology-taskforce:coordinationDuration
cacontology-taskforce:coordinationLevel
cacontology-taskforce:coordinationModel
cacontology-taskforce:countyName
cacontology-taskforce:coverageArea
cacontology-taskforce:coverageType
cacontology-taskforce:cyberTipsProcessed
cacontology-taskforce:cyberTipsReceived
cacontology-taskforce:cyberTipsSince2019
cacontology-taskforce:dojGrantFunded
cacontology-taskforce:emailAddress
cacontology-taskforce:establishmentDate
cacontology-taskforce:experienceLevel
cacontology-taskforce:federalPartner
cacontology-taskforce:handledInvestigation
cacontology-taskforce:hasContactInformation
cacontology-taskforce:hasMember
cacontology-taskforce:hasMetrics
cacontology-taskforce:hasOperationPhaseBeginPoint
cacontology-taskforce:hasOperationPhaseEndPoint
cacontology-taskforce:hasRegionalTaskForce
cacontology-taskforce:hasRoleBeginPoint
cacontology-taskforce:hasRoleEndPoint
cacontology-taskforce:hasUnit
cacontology-taskforce:hostJurisdictionLevel
cacontology-taskforce:hostOrganizationType
cacontology-taskforce:hostedBy
cacontology-taskforce:hostsTaskForce
cacontology-taskforce:hotlineType
cacontology-taskforce:includesTaskForce
cacontology-taskforce:involvedUnit
cacontology-taskforce:jurisdictionPopulation
cacontology-taskforce:leadsUnit
cacontology-taskforce:localPartner
cacontology-taskforce:maintainsWebsite
cacontology-taskforce:managedByCoordination
cacontology-taskforce:measuresPerformance
cacontology-taskforce:memberCount
cacontology-taskforce:memberRole
cacontology-taskforce:metropolitanArea
cacontology-taskforce:militaryBranches
cacontology-taskforce:militaryJurisdiction
cacontology-taskforce:nationalCoveragePercentage
cacontology-taskforce:nationalHotlineNumber
cacontology-taskforce:nationalTaskForceNetwork
cacontology-taskforce:operatesHotline
cacontology-taskforce:operationDuration
cacontology-taskforce:operationOutcome
cacontology-taskforce:operationPhaseDuration
cacontology-taskforce:operationScale
cacontology-taskforce:operationType
cacontology-taskforce:organizationName
cacontology-taskforce:parentsEducated
cacontology-taskforce:participatedIn
cacontology-taskforce:participatingUnits
cacontology-taskforce:partnerAgencyCount
cacontology-taskforce:partnersWith
cacontology-taskforce:performancePeriod
cacontology-taskforce:phoneNumber
cacontology-taskforce:professionalsTrained
cacontology-taskforce:providesRegionalCoverage
cacontology-taskforce:providesTraining
cacontology-taskforce:receivedTraining
cacontology-taskforce:regionCovered
cacontology-taskforce:regionalTaskForceCount
cacontology-taskforce:reportingYear
cacontology-taskforce:resourceCapacity
cacontology-taskforce:servesCounty
cacontology-taskforce:servesMetropolitanArea
cacontology-taskforce:servesMilitaryBranch
cacontology-taskforce:sexualPredatorArrests
cacontology-taskforce:sharesResourcesWith
cacontology-taskforce:sharingAgreement
cacontology-taskforce:sharingDuration
cacontology-taskforce:sharingType
cacontology-taskforce:specializationArea
...cacontology-taskforce:statesWithMultipleTaskForces
cacontology-taskforce:studentsEducated
cacontology-taskforce:supportedInvestigation
cacontology-taskforce:taskForceId
cacontology-taskforce:taskForceNumber
cacontology-taskforce:teachersEducated
cacontology-taskforce:totalTaskForces
cacontology-taskforce:trainingDuration
cacontology-taskforce:trainingType
cacontology-taskforce:websiteURL
cacontology-taskforce:yearOverYearIncrease
cacontology-taskforce:yearsOfService
cacontology-temporal:EvidencePreservationDeadline
cacontology-temporal:StatuteOfLimitationsDeadline
cacontology-temporal:WarrantExpirationDate
cacontology-temporal:ageSubject
cacontology-temporal:concernsAgeQuality
cacontology-temporal:createsSuspension
cacontology-temporal:hasActiveDuration
cacontology-temporal:hasAgeInYears
cacontology-temporal:hasConsequentEvent
cacontology-temporal:hasLegalDeadline
cacontology-temporal:hasMaximumDuration
cacontology-temporal:hasMinimumDuration
cacontology-temporal:hasParallelEvent
cacontology-temporal:hasPrerequisiteEvent
cacontology-temporal:hasSuspendedDuration
cacontology-temporal:hasTimeToFirstAction
cacontology-temporal:hasTimeToResolution
cacontology-temporal:hasTypicalDuration
cacontology-temporal:phaseCompletionRate
cacontology-temporal:phaseEfficiency
cacontology-temporal:resumes
cacontology-temporal:suspends
cacontology-temporal:temporallyContains
cacontology-temporal:temporallyOverlapsWith
cacontology-temporal:temporallyPrecedes
cacontology-temporal:terminatesSuspension
cacontology-temporal:transitionsFrom
cacontology-temporal:transitionsTo
cacontology-temporal:triggersTransition
cacontology-temporal:urgencyLevel
cacontology-trafficking:controlsVictim
cacontology-trafficking:crossesJurisdiction
cacontology-trafficking:destinationLocation
cacontology-trafficking:earningsAmount
cacontology-trafficking:earningsPeriod
cacontology-trafficking:enterpriseDuration
cacontology-trafficking:hasControlMethod
cacontology-trafficking:hasEnterpriseBeginPoint
cacontology-trafficking:hasEnterpriseEndPoint
cacontology-trafficking:hasEnterprisePhase
cacontology-trafficking:hasHierarchyLevel
cacontology-trafficking:hasPhaseBeginPoint
cacontology-trafficking:hasPhaseEndPoint
cacontology-trafficking:hasRoleBeginPoint
cacontology-trafficking:hasRoleEndPoint
cacontology-trafficking:involvesJurisdictionCount
cacontology-trafficking:involvesTraffickerCount
cacontology-trafficking:involvesVictimCount
cacontology-trafficking:operatesInJurisdiction
cacontology-trafficking:originLocation
cacontology-trafficking:phaseDuration
cacontology-trafficking:requiresCoordination
cacontology-trafficking:roleDuration
cacontology-trafficking:situationComplexity
cacontology-trafficking:transitionsToPhase
cacontology-trafficking:transportationMethod
cacontology-trafficking:vulnerabilityExploited
cacontology-training:assessedBy
cacontology-training:buildsCapacityFor
cacontology-training:capacityLevel
cacontology-training:certificationStatus
cacontology-training:certificationValidityPeriod
cacontology-training:certifiedBy
cacontology-training:competencyLevel
cacontology-training:completionRate
cacontology-training:deliveredBy
cacontology-training:hasPhaseBeginPoint
cacontology-training:hasPhaseEndPoint
cacontology-training:hasRoleBeginPoint
cacontology-training:hasRoleEndPoint
cacontology-training:hasTrainingBeginPoint
cacontology-training:hasTrainingEndPoint
cacontology-training:improvesProficiency
cacontology-training:includedInCurriculum
cacontology-training:k9PublicPresentations
cacontology-training:k9SearchWarrantsAssisted
cacontology-training:mentors
cacontology-training:operationalDeploymentCount
cacontology-training:outreachEventsCount
cacontology-training:participatedIn
cacontology-training:participationRate
cacontology-training:phaseDuration
cacontology-training:professionalsTrained
cacontology-training:professionalsTrainedCount
cacontology-training:roleDuration
cacontology-training:skillsAcquired
cacontology-training:supportedBy
cacontology-training:totalAttendeesReached
cacontology-training:trainingDuration
cacontology-training:trainingEffectiveness
cacontology-training:trainingLanguage
cacontology-training:trainingReachCount
...ontology-training:trainingToOperationEffectiveness
cacontology-training:validatesSkills
cacontology-undercover:advertisementLiveTime
cacontology-undercover:advertisementURL
cacontology-undercover:agentOperatesAs
cacontology-undercover:apartmentType
cacontology-undercover:backstoryDetails
cacontology-undercover:backupTeamAssigned
cacontology-undercover:chatDurationHours
cacontology-undercover:chatPlatformType
cacontology-undercover:chatRoomTopic
cacontology-undercover:clientContactMethod
cacontology-undercover:communicationMethod
cacontology-undercover:communicationPlatform
cacontology-undercover:conductedOnPlatform
cacontology-undercover:containsCriminalContent
cacontology-undercover:conversationCount
cacontology-undercover:coversTimeframe
cacontology-undercover:documentsViolationAt
cacontology-undercover:emergencySignal
cacontology-undercover:evidenceCollected
cacontology-undercover:evidentiaryValue
cacontology-undercover:floorLevel
cacontology-undercover:generatesEvidence
cacontology-undercover:handledBy
...cacontology-undercover:hasOperationPhaseBeginPoint
cacontology-undercover:hasOperationPhaseEndPoint
cacontology-undercover:hasRoleBeginPoint
cacontology-undercover:hasRoleEndPoint
cacontology-undercover:hasSecureExit
cacontology-undercover:identificationSuccessRate
cacontology-undercover:identifiesPredator
cacontology-undercover:identifiesVictimPhotos
cacontology-undercover:infiltrationDuration
cacontology-undercover:instructionType
cacontology-undercover:interceptsInstruction
cacontology-undercover:investigatesViolation
cacontology-undercover:involvesChatInvestigation
cacontology-undercover:judicialAuthorization
cacontology-undercover:leadsToDevelopment
cacontology-undercover:leadsToSolicitation
cacontology-undercover:maintainsSurveillance
...cacontology-undercover:meetingSolicitationAttempts
cacontology-undercover:monitorsPhoneCommunication
cacontology-undercover:operatesAtLocation
cacontology-undercover:operatesUnderIdentity
cacontology-undercover:operationClassification
cacontology-undercover:operationOutcome
cacontology-undercover:operationPhaseDuration
cacontology-undercover:participantCount
cacontology-undercover:personaAge
cacontology-undercover:personaGender
cacontology-undercover:personaLocation
cacontology-undercover:personaProfile
cacontology-undercover:phoneNumberMonitored
cacontology-undercover:platformUsername
cacontology-undercover:portraysAge
cacontology-undercover:predatorContactAttempts
cacontology-undercover:respondsToAdvertisement
cacontology-undercover:safetyProtocol
cacontology-undercover:socialMediaPlatformsUsed
cacontology-undercover:supervisoryApproval
cacontology-undercover:surveillanceTeamCount
cacontology-undercover:targetBehaviorType
cacontology-undercover:targetsIndividual
cacontology-undercover:targetsSubject
cacontology-undercover:utilizesPersona
cacontology-undercover:victimPhotoCount
cacontology-undercover:violationLocation
cacontology-undercover:violationType
cacontology-undercover:websitePlatform
cacontology-us-ncmec:accountConfidence
cacontology-us-ncmec:analysisConfidence
cacontology-us-ncmec:analysisOf
cacontology-us-ncmec:cooperationLevel
cacontology-us-ncmec:dataProvided
cacontology-us-ncmec:enrichmentType
cacontology-us-ncmec:hasNCMECIncidentType
cacontology-us-ncmec:hasNCMECReportAnnotation
cacontology-us-ncmec:identifiedContent
cacontology-us-ncmec:incidentCode
cacontology-us-ncmec:indicatorStrength
cacontology-us-ncmec:involvesPlatform
cacontology-us-ncmec:linkedToAccount
cacontology-us-ncmec:phoneVerificationStatus
cacontology-us-ncmec:platformResponseTime
cacontology-us-ncmec:priorityLevel
cacontology-us-ncmec:processedTip
cacontology-us-ncmec:processingTime
cacontology-us-ncmec:referralJurisdiction
cacontology-us-ncmec:resultedInInvestigation
cacontology-us-ncmec:supportedBy
cacontology-us-ncmec:tracedToPhone
cacontology-us-ncmec:transferFrequency
cacontology-us-ncmec:transferVolume
cacontology-us-ncmec:triggerCriteria
cacontology-us-ncmec:triggeredBy
cacontology-us-ncmec:urgencyLevel
cacontology-us-ncmec:validationStatus
cacontology-usa-federal:collaboratesWith
cacontology-usa-federal:collectsEvidence
cacontology-usa-federal:crimeJurisdiction
cacontology-usa-federal:crimeSeverityLevel
cacontology-usa-federal:defendedBy
cacontology-usa-federal:followsPhase
cacontology-usa-federal:foreignCountriesInvolved
cacontology-usa-federal:hasDivision
cacontology-usa-federal:hasInterstateNexus
cacontology-usa-federal:hasLegalPhase
cacontology-usa-federal:hasPhaseBeginPoint
cacontology-usa-federal:hasPhaseEndPoint
cacontology-usa-federal:hasProsecutionBeginPoint
cacontology-usa-federal:hasProsecutionEndPoint
cacontology-usa-federal:hasRoleBeginPoint
cacontology-usa-federal:hasRoleEndPoint
cacontology-usa-federal:investigatedBy
cacontology-usa-federal:involvesDigitalEvidence
...ontology-usa-federal:involvesInternationalElements
cacontology-usa-federal:involvesMultipleStates
cacontology-usa-federal:isPhaseOf
cacontology-usa-federal:mandatoryMinimumSentence
cacontology-usa-federal:phaseDuration
cacontology-usa-federal:precedesPhase
cacontology-usa-federal:prosecutedBy
cacontology-usa-federal:prosecutionComplexity
cacontology-usa-federal:prosecutionDuration
cacontology-usa-federal:prosecutionSeverity
cacontology-usa-federal:prosecutionStatus
cacontology-usa-federal:requiresForensicAnalysis
cacontology-usa-federal:requiresRole
cacontology-usa-federal:roleDuration
cacontology-usa-federal:roleExperience
cacontology-usa-federal:roleSpecialization
cacontology-usa-federal:usesEvidence
cacontology-usa-federal:victimizedBy
cacontology1:conspiracyDuration
cacontology1:conspiracyMemberCount
cacontology1:currentPhase
cacontology1:depictsChild
cacontology1:hasAgeSituation
cacontology1:hasOffenderAgeSituation
cacontology1:hasPhase
cacontology1:hasPhaseBeginPoint
cacontology1:hasPhaseEndPoint
cacontology1:hasRoleBeginPoint
cacontology1:hasRoleEndPoint
cacontology1:hasStep
cacontology1:hasVictimAgeSituation
cacontology1:indictmentCounts
cacontology1:investigationStatus
cacontology1:involvesOffender
cacontology1:involvesVictim
cacontology1:leadsConspiracy
cacontology1:legalInstrument
cacontology1:nextStep
cacontology1:occursDuringPhase
cacontology1:participatesInConspiracy
cacontology1:phaseDuration
cacontology1:phaseProgress
cacontology1:previousStep
cacontology1:producesArtifact
cacontology1:rescuedVictim
cacontology1:resultsinIndictment
cacontology1:severityLevel
cacontology1:submittedTo
cacontology1:targetsService
cacontology1:transitionsTo
cacontology1:usesChannel
cacontology1:usesClassification
hotline:assignedRole
hotline:classification
hotline:coordinationBeginTime
hotline:currentPhase
hotline:feedbackType
hotline:firstSeen
hotline:forwardsTo
hotline:foundAtURL
hotline:hasEvidence
hotline:hasPhaseTransition
hotline:intakeChannel
hotline:involvesCoordination
hotline:isAnonymous
hotline:linkedInvestigation
hotline:phaseBeginTime
hotline:phaseDuration
hotline:phaseEndTime
hotline:playsRole
hotline:producesHash
hotline:receivedBy
hotline:referencesHash
hotline:reportedBy
hotline:roleAssignmentTime
hotline:status
hotline:triggersAction