Ontology Version:
2.2.0
Toggle navigation
RDF knowledge graph (82 ontologies)
Entities A-Z
Classes
Properties
SKOS
Shapes
Statistics
Classes (1961)
cacontology-abduction:AbductionExploitationPattern
cacontology-abduction:AbductionSceneEvidence
cacontology-abduction:AgeBasedVulnerability
cacontology-abduction:ApartmentIsolation
cacontology-abduction:BluntObjectThreats
cacontology-abduction:ClothingDisguise
cacontology-abduction:ComplianceEnforcement
cacontology-abduction:ComplianceUnderThreat
cacontology-abduction:ControlledEnvironmentExploitation
cacontology-abduction:DelayedDisclosure
cacontology-abduction:DisguiseBasedConcealment
cacontology-abduction:DisguiseEvidence
cacontology-abduction:EscapeAttempt
cacontology-abduction:ExploitationSceneEvidence
cacontology-abduction:FacialConcealment
cacontology-abduction:FireEscapeEntry
cacontology-abduction:FirearmThreats
cacontology-abduction:ForcedLocationEntry
cacontology-abduction:HoodedConcealment
cacontology-abduction:HumiliationBasedExploitation
cacontology-abduction:ImmediateDisclosure
cacontology-abduction:ImmediateExploitation
cacontology-abduction:ImpliedWeaponThreats
cacontology-abduction:InitialResistance
cacontology-abduction:IsolatedChildTargeting
cacontology-abduction:IsolationVulnerability
cacontology-abduction:KnifeThreats
cacontology-abduction:LocationBasedExploitation
cacontology-abduction:LocationIsolation
cacontology-abduction:MaskConcealment
cacontology-abduction:MovementRestriction
cacontology-abduction:OpportunisticPredation
cacontology-abduction:OpportunityBasedTargeting
cacontology-abduction:PhysicalForceWithWeapon
cacontology-abduction:PhysicalIntimidation
cacontology-abduction:PostAbductionReporting
cacontology-abduction:PublicSpaceAbduction
cacontology-abduction:RandomVictimSelection
cacontology-abduction:RitualizedExploitation
cacontology-abduction:RoutineActivityTargeting
cacontology-abduction:SchoolRouteAbduction
cacontology-abduction:SchoolRouteTargeting
cacontology-abduction:SecondaryLocationControl
cacontology-abduction:SilenceEnforcement
cacontology-abduction:SizeBasedVulnerability
cacontology-abduction:SkiMaskConcealment
cacontology-abduction:StrangerAbduction
cacontology-abduction:StrangerAbductionInvestigation
cacontology-abduction:StreetLevelAbduction
cacontology-abduction:SurveillanceEvidence
cacontology-abduction:SurvivalBehavior
cacontology-abduction:ThreatBasedControl
cacontology-abduction:UnconventionalEntry
cacontology-abduction:VehicleConcealment
cacontology-abduction:VerbalThreats
cacontology-abduction:VictimAbductionResponse
cacontology-abduction:VictimControlMechanism
cacontology-abduction:VictimTargetingPattern
cacontology-abduction:VulnerabilityExploitation
cacontology-abduction:WeaponBasedCoercion
cacontology-abduction:WeaponDisplayIntimidation
cacontology-abduction:WeaponEvidence
cacontology-abduction:WindowEntry
cacontology-abduction:WitnessEvidence
cacontology-ai:AIAlteredCSAM
cacontology-ai:AICSAMInvestigation
cacontology-ai:AIContentDetection
cacontology-ai:AIContentGeneration
cacontology-ai:AIContentInvestigationSituation
cacontology-ai:AIDetectionPhase
cacontology-ai:AIDetectionTool
cacontology-ai:AIForensicAnalyst
cacontology-ai:AIGeneratedCSAM
cacontology-ai:AIModelAnalyst
cacontology-ai:AgeProgression
cacontology-ai:ArtifactAnalysis
cacontology-ai:BiometricInconsistencyAnalysis
cacontology-ai:ContentGenerationPhase
cacontology-ai:CrossPlatformDetectionSituation
cacontology-ai:DeepfakeCSAM
cacontology-ai:DeepfakeDetection
cacontology-ai:DeepfakeDetectionSpecialist
cacontology-ai:DeepfakeDetectionTool
cacontology-ai:FaceSwapping
cacontology-ai:ForensicAnalysisPhase
cacontology-ai:GenerationSourceTracking
cacontology-ai:HybridCSAM
cacontology-ai:ImageGeneration
cacontology-ai:MetadataAnalysisTool
cacontology-ai:ModelIdentification
cacontology-ai:ModelTraining
cacontology-ai:SyntheticImageDetector
cacontology-ai:SyntheticMediaAnalysis
cacontology-ai:SyntheticMediaCSAM
cacontology-ai:SyntheticMediaExaminer
cacontology-ai:TechnicalAnalysisSituation
cacontology-ai:TrainingDataAnalysis
cacontology-ai:VideoGeneration
cacontology-asset-forfeiture:AssetAssessmentAction
cacontology-asset-forfeiture:AssetForfeitureAction
cacontology-asset-forfeiture:AssetForfeitureOfficer
cacontology-asset-forfeiture:AssetIdentificationPhase
cacontology-asset-forfeiture:AssetValuationExpert
cacontology-asset-forfeiture:CACTInvestigation
cacontology-asset-forfeiture:CompleteForfeiture
cacontology-asset-forfeiture:ConsentOrder
cacontology-asset-forfeiture:CriminalAssetsConfiscationTaskforce
cacontology-asset-forfeiture:EquipmentSeizureAction
cacontology-asset-forfeiture:FinancialAccount
cacontology-asset-forfeiture:FinancialPenaltyAction
cacontology-asset-forfeiture:ForensicAccountant
cacontology-asset-forfeiture:ForfeitureOutcome
cacontology-asset-forfeiture:HouseholdItems
cacontology-asset-forfeiture:InstrumentOfOffense
cacontology-asset-forfeiture:JurisdictionalCoordination
cacontology-asset-forfeiture:LegalBasisForForfeiture
cacontology-asset-forfeiture:LegalCounsel
cacontology-asset-forfeiture:LegalProceedingsPhase
cacontology-asset-forfeiture:LegalProceedingsSituation
cacontology-asset-forfeiture:MultiStateForfeiture
cacontology-asset-forfeiture:NonProfitOffenderAssets
cacontology-asset-forfeiture:PartialForfeiture
cacontology-asset-forfeiture:ProceedsOfCrime
cacontology-asset-forfeiture:PropertyForfeitureAction
cacontology-asset-forfeiture:PropertyManager
cacontology-asset-forfeiture:PropertyRestraintAction
cacontology-asset-forfeiture:RecoveryPhase
cacontology-asset-forfeiture:ResidentialProperty
cacontology-asset-forfeiture:RestraintPhase
cacontology-asset-forfeiture:StateSupremeCourt
cacontology-asset-forfeiture:TechnicalEquipment
cacontology-asset-forfeiture:Vehicle
cacontology-athletic:AnatomyFocusedExploitation
cacontology-athletic:AssistantCoachRole
cacontology-athletic:AthleticCoachRole
cacontology-athletic:AthleticCoachingExploitation
cacontology-athletic:AthleticContactEscalation
cacontology-athletic:AthleticExploitationDiscovery
cacontology-athletic:AthleticFacility
cacontology-athletic:AthleticFacilityExploitation
cacontology-athletic:AthleticFieldExploitation
cacontology-athletic:AthleticOpportunityThreats
cacontology-athletic:AuthorityEstablishmentPhase
cacontology-athletic:CommunityBasedReporting
cacontology-athletic:ConditioningCoercion
cacontology-athletic:DiscoveryPhase
cacontology-athletic:DualCoachingRoleExploitation
cacontology-athletic:ExerciseComplianceCoercion
cacontology-athletic:ExhaustionBasedCoercion
cacontology-athletic:ExploitationPhase
cacontology-athletic:GroomingPhase
cacontology-athletic:GroupExploitationDynamics
cacontology-athletic:GymExploitation
cacontology-athletic:HeadCoachRole
cacontology-athletic:InappropriateSexualEducation
cacontology-athletic:InstitutionalEmploymentTermination
cacontology-athletic:LegitimateContactExploitation
cacontology-athletic:LockerRoomExploitation
cacontology-athletic:MasturbationDiscussionExploitation
cacontology-athletic:MaterialBenefitCoercion
cacontology-athletic:OverClothingToUnderClothingEscalation
cacontology-athletic:ParentNetworkDiscovery
cacontology-athletic:PhysicalCoercionPhase
cacontology-athletic:PhysicalContactEscalation
cacontology-athletic:PhysicalEnduranceExploitation
cacontology-athletic:PhysicalTrainingCoercion
cacontology-athletic:PracticeSessionExploitation
cacontology-athletic:PubicHairFocusedExploitation
cacontology-athletic:RumorCirculationDiscovery
cacontology-athletic:SchoolAthleticCoachRole
cacontology-athletic:SchoolAthleticExploitation
cacontology-athletic:SchoolBasedInvestigation
cacontology-athletic:SexualEducationExploitation
cacontology-athletic:SexualTopicGrooming
cacontology-athletic:SportsContextPhysicalAbuse
cacontology-athletic:TeamBasedExploitation
cacontology-athletic:TeamDynamicsExploitation
cacontology-athletic:TeamMembershipCoercion
cacontology-athletic:TeamSelectionCoercion
cacontology-athletic:TrainingBasedTouching
cacontology-athletic:TrainingCampExploitation
cacontology-athletic:TrainingDrillCoercion
cacontology-athletic:TravelTeamCoachRole
cacontology-athletic:TravelTeamExploitation
cacontology-case:ActiveInvestigationPhase
cacontology-case:AdministrativeReview
cacontology-case:AnalystAssignment
cacontology-case:ArrestWarrant
cacontology-case:CaseAnalystRole
cacontology-case:CaseAssignment
cacontology-case:CaseClosure
cacontology-case:CaseDocumentation
cacontology-case:CaseDurationMetrics
cacontology-case:CaseInitiationPhase
cacontology-case:CaseManagement
cacontology-case:CaseManagerRole
cacontology-case:CaseMetrics
cacontology-case:CaseProsecutorRole
cacontology-case:CaseReport
cacontology-case:CaseReview
cacontology-case:CaseTracking
cacontology-case:CaseWorkflow
cacontology-case:ColdCaseManagement
cacontology-case:ComplexCaseManagement
cacontology-case:CostPerCaseMetrics
cacontology-case:CourtFiling
cacontology-case:CourtProceedingsPhase
cacontology-case:DispositionPhase
cacontology-case:DispositionWorkflow
cacontology-case:EvidenceLog
cacontology-case:ExpertReport
cacontology-case:ExternalReview
cacontology-case:HighPriorityCaseManagement
cacontology-case:IntakeWorkflow
cacontology-case:InterviewNotes
cacontology-case:InvestigationWorkflow
cacontology-case:InvestigatorAssignment
cacontology-case:LeadInvestigatorRole
cacontology-case:LegalReview
cacontology-case:MultiJurisdictionalCaseManagement
cacontology-case:PeerReview
cacontology-case:PrimaryInvestigatorAssignment
cacontology-case:ProsecutionPreparationPhase
cacontology-case:ProsecutionWorkflow
cacontology-case:ProsecutorAssignment
cacontology-case:QualityAssuranceReview
cacontology-case:QualityScoreMetrics
cacontology-case:ResolutionRateMetrics
cacontology-case:ResourceUtilizationMetrics
cacontology-case:SearchWarrant
cacontology-case:SecondaryInvestigatorAssignment
cacontology-case:SupervisorAssignment
cacontology-case:SupervisoryReview
cacontology-coord:CaseInformationSharing
cacontology-coord:CaseResolutionTimeMetrics
cacontology-coord:CommunicationProtocol
cacontology-coord:CoordinationAgreement
cacontology-coord:CoordinationEffectivenessMetrics
cacontology-coord:CoordinationMetrics
cacontology-coord:CostEfficiencyMetrics
cacontology-coord:EmergencyCommunicationChannel
cacontology-coord:EncryptedCommunicationChannel
cacontology-coord:EquipmentSharing
cacontology-coord:EvidenceSharing
cacontology-coord:ExpertiseSharing
cacontology-coord:FacilitySharing
cacontology-coord:FederalCoordination
cacontology-coord:FormalAgreement
cacontology-coord:FormalCommunicationChannel
cacontology-coord:FundingSharing
cacontology-coord:InformalAgreement
cacontology-coord:InformalCommunicationChannel
cacontology-coord:InformationSharing
cacontology-coord:InformationSharingRateMetrics
cacontology-coord:IntelligenceLiaison
cacontology-coord:IntelligenceSharing
cacontology-coord:InternationalCoordination
cacontology-coord:InvestigationCoordination
cacontology-coord:JointInvestigation
cacontology-coord:JointOperationsPlan
cacontology-coord:LegalLiaison
cacontology-coord:LiaisonCommunicationChannel
cacontology-coord:LiaisonOfficer
cacontology-coord:LocalCoordination
cacontology-coord:MemorandumOfAgreement
cacontology-coord:MemorandumOfUnderstanding
cacontology-coord:MultiAgencyCoordination
cacontology-coord:MultiStateCoordination
cacontology-coord:OperationalLiaison
cacontology-coord:ParallelInvestigation
cacontology-coord:PersonnelSharing
cacontology-coord:PrimaryLiaison
cacontology-coord:RegionalCoordination
cacontology-coord:ResourceSharing
cacontology-coord:ResourceUtilizationMetrics
cacontology-coord:ResponseTimeMetrics
cacontology-coord:SecondaryLiaison
cacontology-coord:SecureCommunicationChannel
cacontology-coord:StateCoordination
cacontology-coord:SuspectInformationSharing
cacontology-coord:TaskForceCharter
cacontology-coord:TaskForceCoordination
cacontology-coord:TechnicalDataSharing
cacontology-coord:TechnicalLiaison
cacontology-coord:TechnologySharing
cacontology-coord:VictimInformationSharing
cacontology-corruption:AccessPrivilegeAbuse
cacontology-corruption:AuthoritySymbolExploitation
cacontology-corruption:BadgeDisplayedProduction
cacontology-corruption:CorruptArmyReservist
cacontology-corruption:CorruptLawEnforcementOfficer
cacontology-corruption:CorruptMetropolitanPoliceDepartmentOfficer
cacontology-corruption:CorruptStateTrooper
cacontology-corruption:DatabaseAccessAbuse
cacontology-corruption:EvidenceManipulation
cacontology-corruption:ExternalOversightInvestigation
cacontology-corruption:FormerLawEnforcementOfficer
cacontology-corruption:InformationLeakage
cacontology-corruption:InsiderThreat
cacontology-corruption:InsiderThreatDetection
cacontology-corruption:InternalAffairsInvestigation
cacontology-corruption:InvestigativeAuthorityAbuse
cacontology-corruption:LawEnforcementCorruption
cacontology-corruption:MilitaryUniformProduction
cacontology-corruption:OfficerChildTrafficking
cacontology-corruption:OfficerProducedCSAM
cacontology-corruption:OfficialVehicleExploitation
cacontology-corruption:PoliceUniformProduction
cacontology-corruption:PositionOfAuthorityAbuse
cacontology-corruption:PublicIntegrityInvestigation
cacontology-corruption:UniformBasedExploitation
cacontology-corruption:UniformEnhancedProduction
cacontology-corruption:WhistleblowerReport
cacontology-custodial:ActiveCustodyPhase
cacontology-custodial:AuthorityAbuse
cacontology-custodial:AuthorityFigure
cacontology-custodial:Babysitter
cacontology-custodial:BackgroundCheck
cacontology-custodial:BreachOfCare
cacontology-custodial:CaregiverRelationship
cacontology-custodial:ChildcareProvider
cacontology-custodial:Coach
cacontology-custodial:CustodialAbuse
cacontology-custodial:CustodialAuthorization
cacontology-custodial:CustodialCrisisSituation
cacontology-custodial:CustodialRelationship
cacontology-custodial:CustodyArrangement
cacontology-custodial:EmergencyCustody
cacontology-custodial:FamilialRelationship
cacontology-custodial:FamilyFriend
cacontology-custodial:FormalCustody
cacontology-custodial:Guardian
cacontology-custodial:InformalCustody
cacontology-custodial:Mentor
cacontology-custodial:ParentalConsent
cacontology-custodial:PositionOfTrust
cacontology-custodial:ProbationaryCustodyPhase
cacontology-custodial:ProfessionalCareRelationship
cacontology-custodial:Relative
cacontology-custodial:SupervisionBreakdownSituation
cacontology-custodial:SupervisionFailure
cacontology-custodial:SuspendedCustodyPhase
cacontology-custodial:Teacher
cacontology-custodial:TemporaryCustody
cacontology-custodial:TerminatedCustodyPhase
cacontology-custodial:TrustBreachSituation
cacontology-custodial:TrustViolation
cacontology-custodial:VisitationArrangement
cacontology-custodial:VulnerabilityExposureSituation
cacontology-detection:AutomatedDetectionAction
cacontology-detection:COPINEClassificationScheme
cacontology-detection:ClassificationResult
cacontology-detection:ContentAnalystRole
cacontology-detection:ContentHashingAction
cacontology-detection:ContentHashingTool
cacontology-detection:CrossPlatformDetectionSituation
cacontology-detection:DatabaseMatchAction
cacontology-detection:DatabaseMatchingTool
cacontology-detection:DetectionResult
cacontology-detection:FalsePositiveAnalysisAction
cacontology-detection:FalsePositiveManagementSituation
cacontology-detection:HashAnalystRole
cacontology-detection:HashComparisonPhase
cacontology-detection:InitialDetectionPhase
cacontology-detection:MachineLearningDetectionTool
cacontology-detection:MachineLearningSpecialistRole
cacontology-detection:ManualClassificationAction
cacontology-detection:ManualReviewPhase
cacontology-detection:ManualReviewTool
cacontology-detection:MassContentAnalysisSituation
cacontology-detection:PerceptualHash
cacontology-detection:PhotoDNAHash
cacontology-detection:QualityAssuranceAnalystRole
cacontology-detection:ReportingPhase
cacontology-detection:SARClassificationScheme
cacontology-detection:ValidationPhase
cacontology-educational1:AcademicActivityExploitation
cacontology-educational1:AcademicIntimidation
cacontology-educational1:AcademicPowerVulnerability
cacontology-educational1:AcademicTermPhase
cacontology-educational1:AdministratorRole
cacontology-educational1:AfterHoursClassroomExploitation
cacontology-educational1:AgeDeception
cacontology-educational1:AgeSpecificTargeting
cacontology-educational1:AssignmentCompletionExploitation
cacontology-educational1:AssignmentHarassment
cacontology-educational1:ClassroomBasedExploitation
cacontology-educational1:ClassroomExploitationContext
cacontology-educational1:ClassroomIsolationVulnerability
cacontology-educational1:CoachRole
cacontology-educational1:CounselorRole
cacontology-educational1:CrossInstitutionalExploitation
cacontology-educational1:CrossInstitutionalInvestigationSituation
cacontology-educational1:DegradingWrittenComments
cacontology-educational1:DigitalCommunicationEvidence
cacontology-educational1:DigitalImpersonation
cacontology-educational1:EducationalExploitationSituation
cacontology-educational1:EducationalInstitution
cacontology-educational1:EducationalInstitutionInvestigation
cacontology-educational1:EducatorPerpetratedExploitation
cacontology-educational1:EducatorRole
cacontology-educational1:EliteEducationalInstitution
cacontology-educational1:EmploymentPhase
cacontology-educational1:ExploitationEscalationPhase
cacontology-educational1:ForcibleTouching
cacontology-educational1:GymTeacherRole
cacontology-educational1:IPAddressEvidence
cacontology-educational1:ImmediatePhysicalContactExploitation
cacontology-educational1:IndependentSchool
cacontology-educational1:InstitutionalResponseSituation
cacontology-educational1:InstitutionalSafeguarding
cacontology-educational1:InstitutionalVulnerability
cacontology-educational1:IntermediateSchool
cacontology-educational1:InvestigationPhase
cacontology-educational1:MathTeacherRole
cacontology-educational1:MiddleSchool
cacontology-educational1:MultiVictimExploitationSituation
cacontology-educational1:MultipleAccountDeception
cacontology-educational1:OneOnOneAcademicExploitation
cacontology-educational1:OpportunisticTouching
cacontology-educational1:PhysicalContactPattern
cacontology-educational1:PoliceNotification
cacontology-educational1:PositionOfTrustExploitation
cacontology-educational1:PostReleaseSuperVision
cacontology-educational1:PrincipalNotification
cacontology-educational1:PrivateSchool
cacontology-educational1:PublicSchool
cacontology-educational1:SchoolStaffReporting
cacontology-educational1:SexOffenderRegistration
cacontology-educational1:SexualPerformanceSolicitation
cacontology-educational1:StudentVictimTargeting
cacontology-educational1:SubstituteTeacherRole
cacontology-educational1:TeacherRole
cacontology-educational1:TeacherStudentExploitation
cacontology-educational1:TestTakingExploitation
cacontology-educational1:UseOfChildInSexualPerformance
cacontology-educational1:VictimAccountEvidence
cacontology-educational1:VictimDisclosureToStaff
cacontology-educational1:VulnerableStudentTargeting
cacontology-educational1:WitnessTestimonyEvidence
cacontology-educational1:WrittenHarassment
cacontology-educational1:WrittenHarassmentEvidence
cacontology-enterprises:AccelerationistGroup
cacontology-enterprises:AccessControlSystem
cacontology-enterprises:AlternateAccountSystem
cacontology-enterprises:AnimalAbuseCoercion
cacontology-enterprises:ChildExploitationEnterprise
cacontology-enterprises:ContentBasedRecruitment
cacontology-enterprises:ContentCompilationSystem
cacontology-enterprises:ContentCurationAction
cacontology-enterprises:ContentCurrencySystem
cacontology-enterprises:ContentEditingProcess
cacontology-enterprises:ContentProducerRole
cacontology-enterprises:ContentValueAssessment
cacontology-enterprises:CoordinatorRole
cacontology-enterprises:CovertEmployeeOperation
cacontology-enterprises:CrossPlatformCoordination
cacontology-enterprises:CrossPlatformEvidenceCorrelation
cacontology-enterprises:CyberExtremistNetwork
cacontology-enterprises:EncryptedChannelInfiltration
cacontology-enterprises:EncryptedChannelNetwork
cacontology-enterprises:EnterpriseHierarchy
cacontology-enterprises:EnterpriseLeaderRole
cacontology-enterprises:EnterpriseRole
cacontology-enterprises:ExtremeDegradationCoercion
cacontology-enterprises:ExtremistNetworkCell
cacontology-enterprises:IdentityCorrelationAnalysis
cacontology-enterprises:InnerCore
cacontology-enterprises:InnerCoreMemberRole
cacontology-enterprises:LeadershipStructure
cacontology-enterprises:Lorebook
cacontology-enterprises:MembershipAdvancementSystem
cacontology-enterprises:MembershipTier
cacontology-enterprises:MentalHealthVulnerabilityTargeting
cacontology-enterprises:NameCuttingCoercion
cacontology-enterprises:NetworkMappingInvestigation
cacontology-enterprises:NihilisticViolentExtremismNetwork
cacontology-enterprises:PlatformMigrationStrategy
cacontology-enterprises:PrivateGroupManagement
cacontology-enterprises:RecruitmentHierarchy
cacontology-enterprises:RecruitmentSpecialistRole
cacontology-enterprises:SelfHarmCoercion
cacontology-enterprises:SelfImmolationCoercion
cacontology-enterprises:SiblingAbuseCoercion
cacontology-enterprises:SocialEngineeringCampaign
cacontology-enterprises:SuicideCoercion
cacontology-enterprises:TrustBuildingProcess
cacontology-enterprises:VictimContentCompilation
cacontology-enterprises:VictimProfileDevelopment
cacontology-enterprises:VulnerablePopulationTargeting
cacontology-forensics:AcquisitionPhase
cacontology-forensics:AdvancedSearchTechnique
cacontology-forensics:AnalysisPhase
cacontology-forensics:AutomatedContentAnalysis
cacontology-forensics:BehavioralFingerprinting
cacontology-forensics:ChainOfCustodyAction
cacontology-forensics:CommunicationPatternAnalysis
cacontology-forensics:ContentCorrelationAnalysis
cacontology-forensics:CrossPlatformCorrelation
cacontology-forensics:CrossReferenceAnalysis
cacontology-forensics:CustodyDocument
cacontology-forensics:DatabaseIntelligenceIntegration
cacontology-forensics:DetectionDogAssist
cacontology-forensics:DistributedForensicProcessing
cacontology-forensics:ElectronicStorageDeviceDetection
cacontology-forensics:EvidenceCustodianRole
cacontology-forensics:EvidenceTriageSystem
cacontology-forensics:EvidenceVerificationAction
cacontology-forensics:ExtendedInvestigationTimeline
cacontology-forensics:ForensicAcquisitionAction
cacontology-forensics:ForensicExaminerRole
cacontology-forensics:ForensicImage
cacontology-forensics:ForensicImagingTool
cacontology-forensics:GeospatialCorrelation
cacontology-forensics:HashingTool
cacontology-forensics:HiddenDeviceRecovery
cacontology-forensics:ImageAnalysisForVictimID
cacontology-forensics:InternationalEvidenceProcessing
cacontology-forensics:K9AssistedForensics
cacontology-forensics:MachineLearningCorrelation
cacontology-forensics:MassDigitalEvidenceProcessing
cacontology-forensics:MemoryDump
cacontology-forensics:MemoryForensicTool
cacontology-forensics:MetadataCorrelation
cacontology-forensics:MetadataExtractionAction
cacontology-forensics:MobileForensicTool
cacontology-forensics:NetworkCapture
cacontology-forensics:NetworkForensicTool
cacontology-forensics:NetworkTrafficAnalysis
cacontology-forensics:RealTimeCorrelation
cacontology-forensics:RecoveredFile
cacontology-forensics:ReportingPhase
cacontology-forensics:ScalableHashAnalysis
cacontology-forensics:TemporalPatternAnalysis
cacontology-forensics:TestimonyPhase
cacontology-forensics:TimelineAnalysisAction
cacontology-forensics:UserBehaviorForensics
cacontology-forensics:VictimIdentificationProcess
cacontology-forensics:VictimIdentificationSpecialist
cacontology-forensics:VictimRemovalAction
cacontology-grooming:AcceleratedTrustExploitation
cacontology-grooming:AlcoholFacilitatedGrooming
cacontology-grooming:AnonymousInitiation
cacontology-grooming:AnonymousPlatformContact
cacontology-grooming:BluntRecruitmentGrooming
cacontology-grooming:ChildVictim
cacontology-grooming:CrossInstitutionalGrooming
cacontology-grooming:DirectTraffickingPropositionGrooming
cacontology-grooming:EconomicIncentiveGrooming
cacontology-grooming:EducatorGrooming
cacontology-grooming:EliteInstitutionTargeting
cacontology-grooming:Enticement
cacontology-grooming:EscalationPattern
cacontology-grooming:ExplicitCommercialOfferGrooming
cacontology-grooming:ExploitationPhase
cacontology-grooming:GraphicConversationGrooming
cacontology-grooming:GroomingBehavior
cacontology-grooming:GroomingMessage
cacontology-grooming:GroomingPattern
cacontology-grooming:GroomingPhase
cacontology-grooming:ImmediateExploitationAttempt
cacontology-grooming:ImmediateMonetizationGrooming
cacontology-grooming:ImpairmentBasedGrooming
cacontology-grooming:InappropriateGift
cacontology-grooming:InitialContactPhase
cacontology-grooming:InitiatorContentSending
cacontology-grooming:InterstateTransportPlan
cacontology-grooming:IsolationBasedGrooming
cacontology-grooming:IsolationBehavior
cacontology-grooming:IsolationPhase
cacontology-grooming:LocationSpecificGrooming
cacontology-grooming:MaintenancePhase
cacontology-grooming:ManipulationPattern
cacontology-grooming:MarijuanaFacilitatedGrooming
cacontology-grooming:MultipleAccountGrooming
cacontology-grooming:NormalizationBehavior
cacontology-grooming:NormalizationGrooming
cacontology-grooming:OfflineControlEstablishment
cacontology-grooming:OnlineGrooming
cacontology-grooming:OnlineGroomingSituation
cacontology-grooming:OnlinePredationSituation
cacontology-grooming:OnlinePredator
cacontology-grooming:OnlineToOfflineProgression
cacontology-grooming:OpportunisticGrooming
cacontology-grooming:PeerPersonaGrooming
cacontology-grooming:PhysicalMeetingArrangement
cacontology-grooming:PhysicalSpaceGrooming
cacontology-grooming:PlatformAnonymityFeature
cacontology-grooming:PositionOfTrustGrooming
cacontology-grooming:PreyBehaviorPattern
cacontology-grooming:PrivilegedVictimTargeting
cacontology-grooming:PublicToPrivateGrooming
cacontology-grooming:RapidEscalationGrooming
cacontology-grooming:ReciprocityGrooming
cacontology-grooming:ReputationBasedSilencing
cacontology-grooming:SameDayProgression
cacontology-grooming:SecrecyRequest
cacontology-grooming:SexualConsequenceGameGrooming
cacontology-grooming:SexualContentExchangeGrooming
cacontology-grooming:SexualExploitation
cacontology-grooming:SexualSolicitation
cacontology-grooming:SexualizationPhase
cacontology-grooming:SkippedGroomingPhases
cacontology-grooming:StreetBasedGrooming
cacontology-grooming:SubstanceFacilitatedGrooming
cacontology-grooming:SubstanceInducedVulnerabilityGrooming
cacontology-grooming:TeenageImpersonationGrooming
cacontology-grooming:TravelArrangement
cacontology-grooming:TrustBuildingBehavior
cacontology-grooming:TrustBuildingPhase
cacontology-grooming:TrustThroughAnonymity
cacontology-grooming:UnverifiedUserProfile
cacontology-grooming:VehicleBasedGrooming
cacontology-grooming:VictimComplianceInPhysicalMeeting
cacontology-grooming:VictimResponse
cacontology-grooming:VictimTargeting
cacontology-grooming:VictimVulnerability
cacontology-grooming:VictimVulnerabilitySituation
cacontology-gufo:EvidencePhase
cacontology-gufo:Investigation
cacontology-gufo:LegalProcessPhase
cacontology-impact:AcuteImpactPhase
cacontology-impact:AcuteTrauma
cacontology-impact:BehavioralIndicator
cacontology-impact:ChildExploitationTaskForce
cacontology-impact:ChronicTrauma
cacontology-impact:CognitiveBehavioralTherapy
cacontology-impact:CognitiveIndicator
cacontology-impact:CommunitySupport
cacontology-impact:ComplexTrauma
cacontology-impact:ComprehensiveImpactAssessment
cacontology-impact:CrisisIntervention
cacontology-impact:DevelopmentalImpact
cacontology-impact:EducationalSupport
cacontology-impact:EmergencyHelpSeeking
cacontology-impact:EmergencyResponse
cacontology-impact:EmotionalIndicator
cacontology-impact:FamilyReunification
cacontology-impact:FamilyTherapy
cacontology-impact:FearlessHudsonValleySupport
cacontology-impact:GroupTherapy
cacontology-impact:HelpSeekingBarrier
cacontology-impact:HelpSeekingFacilitator
cacontology-impact:HometownReturn
cacontology-impact:HospitalDischarge
cacontology-impact:HospitalIntervention
cacontology-impact:HumanTraffickingSquad
cacontology-impact:InitialImpactAssessment
cacontology-impact:InterstateVictimServices
cacontology-impact:LegalSupport
cacontology-impact:LongTermEffect
cacontology-impact:LongTermMonitoringPhase
cacontology-impact:MedicalTraumaAssessment
cacontology-impact:MentalHealthProfessional
cacontology-impact:MultiAgencyVictimResponse
cacontology-impact:NineOneOneCall
cacontology-impact:OngoingDangerAssessment
cacontology-impact:OngoingImpactMonitoring
cacontology-impact:PhysicalIndicator
cacontology-impact:PortAuthorityYouthServices
cacontology-impact:PsychologicalHarm
cacontology-impact:RecoveryBarriers
cacontology-impact:RecoveryMilestone
cacontology-impact:RecoveryPhase
cacontology-impact:RecoveryProcess
cacontology-impact:ReintegrationPhase
cacontology-impact:ResilienceFactors
cacontology-impact:SafetyPlanning
cacontology-impact:SocialIndicator
cacontology-impact:SuicidalIdeationResponse
cacontology-impact:TherapeuticIntervention
cacontology-impact:TherapistRole
cacontology-impact:TherapyParticipant
cacontology-impact:TraffickerControlBarrier
cacontology-impact:TraumaIndicator
cacontology-impact:TraumaTherapy
cacontology-impact:TraumatizedVictim
cacontology-impact:VictimAdvocacy
cacontology-impact:VictimAdvocateRole
cacontology-impact:VictimBehavior
cacontology-impact:VictimExtraction
cacontology-impact:VictimImpactAssessment
cacontology-impact:VictimInRecovery
cacontology-impact:VictimReintegration
cacontology-impact:VictimSafetyPlanning
cacontology-impact:VictimSelfReporting
cacontology-impact:VictimServiceCoordination
cacontology-impact:VictimSupport
cacontology-impact:VictimTransportationAssistance
cacontology-infrastructure:AccountFreezing
cacontology-infrastructure:AnalystRole
cacontology-infrastructure:AnonymityInfrastructure
cacontology-infrastructure:ContentDeliveryNetwork
cacontology-infrastructure:CryptocurrencyInfrastructure
cacontology-infrastructure:DataMirrorCreation
cacontology-infrastructure:DatabaseInfrastructure
cacontology-infrastructure:DomainInfrastructure
cacontology-infrastructure:DomainSinkholing
cacontology-infrastructure:EncryptionInfrastructure
cacontology-infrastructure:FinancialFlowAnalysis
cacontology-infrastructure:FinancialObfuscation
cacontology-infrastructure:GeographicDistribution
cacontology-infrastructure:HostingProvider
cacontology-infrastructure:InfrastructureAnalysis
cacontology-infrastructure:InfrastructureCompromiseSituation
cacontology-infrastructure:InfrastructureDecommissionPhase
cacontology-infrastructure:InfrastructureDeploymentPhase
cacontology-infrastructure:InfrastructureDiscoverySituation
cacontology-infrastructure:InfrastructureFailureSituation
cacontology-infrastructure:InfrastructureMaintenancePhase
cacontology-infrastructure:InfrastructureOperationalPhase
cacontology-infrastructure:InfrastructureTakedown
cacontology-infrastructure:LoadBalancer
cacontology-infrastructure:NetworkInfrastructure
cacontology-infrastructure:NetworkTopologyAnalysis
cacontology-infrastructure:PaymentProcessing
cacontology-infrastructure:PlatformInfrastructure
cacontology-infrastructure:ProxyInfrastructure
cacontology-infrastructure:SecurityInfrastructure
cacontology-infrastructure:SecurityOperatorRole
cacontology-infrastructure:ServerInfrastructure
cacontology-infrastructure:ServerSeizure
cacontology-infrastructure:SubscriptionManagement
cacontology-infrastructure:SystemAdministratorRole
cacontology-infrastructure:TakedownOperatorRole
cacontology-infrastructure:UserAccessPatternAnalysis
cacontology-institutional:AbandonedChild
cacontology-institutional:AdultVictimTestimony
cacontology-institutional:CareProviderExploitation
cacontology-institutional:CareProviderRole
cacontology-institutional:CharitableCoverExploitation
cacontology-institutional:CharitableFundingMisuse
cacontology-institutional:CharitableOrganization
cacontology-institutional:CharitableOrganizationLeader
cacontology-institutional:ChildCareInstitution
cacontology-institutional:CrossBorderPersonalTravel
cacontology-institutional:DependencyExploitation
cacontology-institutional:DonorManipulation
cacontology-institutional:FinancialControlMechanism
cacontology-institutional:ForeignCommerceOffense
cacontology-institutional:ForeignCommerceTravel
cacontology-institutional:ForeignPlaceOffense
cacontology-institutional:ForeignResidenceExploitation
cacontology-institutional:FosterCareInstitution
cacontology-institutional:HumanitarianOrganization
cacontology-institutional:HumanitarianTravelCover
cacontology-institutional:ImpoverishedChild
cacontology-institutional:InstitutionalAbuseEvidence
cacontology-institutional:InstitutionalAuthorityExploitation
cacontology-institutional:InstitutionalExploitation
cacontology-institutional:InstitutionalFounder
cacontology-institutional:IsolationBasedControl
cacontology-institutional:LongTermAbusePattern
cacontology-institutional:LongTermInstitutionalControl
cacontology-institutional:MultiModalInstitutionalAbuse
cacontology-institutional:MultiVictimForeignOffense
cacontology-institutional:MultipleVictimTestimony
cacontology-institutional:Orphanage
cacontology-institutional:OrphanageDirector
cacontology-institutional:OrphanageExploitation
cacontology-institutional:OrphanedChild
cacontology-institutional:PositionOfTrustAbuse
cacontology-institutional:ReligiousInstitution
cacontology-institutional:RepeatedCrossBorderTravel
cacontology-institutional:SupportNetworkDeception
cacontology-institutional:SystematicInstitutionalAbuse
cacontology-institutional:TrustedAdultRole
cacontology-institutional:USProsecutionForeignCrimes
cacontology-institutional:VulnerableChildInCare
cacontology-institutional:VulnerablePopulationTargeting
cacontology-institutional:YouthHome
cacontology-international:AutomatedCrossMatching
cacontology-international:CountryPartnership
cacontology-international:CrossBorderDeviceSeizure
cacontology-international:CrossBorderEffectiveness
cacontology-international:CrossBorderForensics
cacontology-international:CrossBorderInvestigation
cacontology-international:CrossBorderOperation
cacontology-international:CrossBorderThreatAlert
cacontology-international:CrossJurisdictionalInvestigation
cacontology-international:CrossReferenceAnalysis
cacontology-international:CrossReferralProtocol
cacontology-international:DataExchangeProtocol
cacontology-international:DistributedIntelligenceProcessing
cacontology-international:EmergencyCoordinationProtocol
cacontology-international:EuropeanCooperationFramework
cacontology-international:EuropolCoordination
cacontology-international:EuropolOperation
cacontology-international:ExtraditionAgreement
cacontology-international:FederatedDatabaseQuery
cacontology-international:GlobalCaseTracking
cacontology-international:GlobalDatabaseNetwork
cacontology-international:GlobalHotlineNetwork
cacontology-international:GlobalInvestigativeTeam
cacontology-international:GlobalMissingChildrenCenter
cacontology-international:GlobalPlatformTakedown
cacontology-international:GlobalReach
cacontology-international:GlobalTakedownCoordination
cacontology-international:InformationSharingAgreement
cacontology-international:InstantAlertSystem
cacontology-international:IntelligenceDataLake
cacontology-international:IntelligenceFusion
cacontology-international:InternationalAlert
cacontology-international:InternationalAnalyst
cacontology-international:InternationalCoordination
cacontology-international:InternationalCoordinator
cacontology-international:InternationalDatabase
cacontology-international:InternationalEvidence
cacontology-international:InternationalEvidenceSharing
cacontology-international:InternationalHotlineCoordination
cacontology-international:InternationalImpact
cacontology-international:InternationalIntelligenceSharing
cacontology-international:InternationalNetworkDisruption
cacontology-international:InternationalPartnership
cacontology-international:InternationalProsecution
cacontology-international:InternationalReferral
cacontology-international:InternationalResourceCoordination
cacontology-international:InternationalTaskForce
cacontology-international:InternationalWarrant
cacontology-international:JurisdictionalCoordination
cacontology-international:LiaisonOfficer
cacontology-international:LiveIntelligenceFeed
cacontology-international:MassUserAnalysis
cacontology-international:MultiCountryTakedown
cacontology-international:MultilingualSupport
cacontology-international:MutualLegalAssistance
cacontology-international:MutualLegalAssistanceTreatyOperation
cacontology-international:OperationalSyncronization
cacontology-international:RealTimeIntelligenceSharing
cacontology-international:RegionalCoordination
cacontology-international:SecureChannel
cacontology-international:SecureCommunicationChannel
cacontology-international:ThreatAssessmentSharing
cacontology-international:USAustraliaCoordination
cacontology-legal:BestPractice
cacontology-legal:CSAMCriminalization
cacontology-legal:CSAMModelLaw
cacontology-legal:CapacityBuilding
cacontology-legal:ChildTraffickingLaw
cacontology-legal:ComplianceBenchmark
cacontology-legal:ComplianceMetrics
cacontology-legal:ExtraditionAgreement
cacontology-legal:GlobalLegalReview
cacontology-legal:HarmonizationProgress
cacontology-legal:InternationalLawEnforcement
cacontology-legal:InternationalStandard
cacontology-legal:JurisdictionalCoordination
cacontology-legal:JurisdictionalVariation
cacontology-legal:LegalCompliance
cacontology-legal:LegalCoverageAssessment
cacontology-legal:LegalEffectiveness
cacontology-legal:LegalFrameworkGap
cacontology-legal:LegalReform
cacontology-legal:LegalSystemCompatibility
cacontology-legal:LegislativeAssessment
cacontology-legal:LegislativeDrafting
cacontology-legal:MandatoryReportingLaw
cacontology-legal:MinimumStandard
cacontology-legal:MutualLegalAssistance
cacontology-legal:NationalLegislation
cacontology-legal:OnlineGroomingLaw
cacontology-legal:PolicyDevelopment
cacontology-legal:PolicyHarmonization
cacontology-legal:RegionalFramework
cacontology-legal:TechnicalAssistance
cacontology-legal:TreatyFramework
cacontology-legal:VictimProtectionLaw
cacontology-multi:AllFBIFieldOfficesOperation
cacontology-multi:AutomatedEvidenceDistribution
cacontology-multi:CEOSCoordinatedOperation
cacontology-multi:ChildRescueCoordination
cacontology-multi:CommunityOutreachTriggeredInvestigation
cacontology-multi:ComplianceMonitoringOperation
cacontology-multi:ComplianceVisitCoordination
cacontology-multi:CoordinatedArrestWave
cacontology-multi:CoordinatedCharging
cacontology-multi:CoordinatingAgent
cacontology-multi:CrossBorderOperation
cacontology-multi:CrossStateEvidence
cacontology-multi:DistributedProsecutionTeam
cacontology-multi:ExtraditionRequest
cacontology-multi:FederalAgency
cacontology-multi:FederalJurisdiction
cacontology-multi:FederalJurisdictionTrigger
cacontology-multi:HandsOnOffenseInvestigation
cacontology-multi:InformationSharing
cacontology-multi:InformationSharingAgreement
cacontology-multi:InformationSynthesisPhase
cacontology-multi:InitialCoordinationPhase
cacontology-multi:InteragencyAgreement
cacontology-multi:InteragencyCooperationSituation
cacontology-multi:InternationalAgency
cacontology-multi:InternationalJurisdiction
cacontology-multi:InternationalLegalHarmonization
cacontology-multi:InternationalProsecutionFramework
cacontology-multi:InterstateCoordination
cacontology-multi:InterstateFlightFromProsecution
cacontology-multi:InterstateTraffickingNetwork
cacontology-multi:InterstateTransportationOffense
cacontology-multi:InterstateVictimTransport
cacontology-multi:JointExecutionPhase
cacontology-multi:JointInvestigation
cacontology-multi:Jurisdiction
cacontology-multi:JurisdictionalConflictSituation
cacontology-multi:JurisdictionalHandoff
cacontology-multi:JurisdictionalNegotiationPhase
cacontology-multi:JurisdictionalWarrant
cacontology-multi:LargeScaleOperation
cacontology-multi:LawEnforcementAgency
cacontology-multi:LeadAgency
cacontology-multi:LiaisonOfficer
cacontology-multi:LocalAgency
cacontology-multi:LocalJurisdiction
cacontology-multi:MassChildRescueOperation
cacontology-multi:MassProsecutionCoordination
cacontology-multi:MassUserJurisdictionMapping
cacontology-multi:MultiJurisdictionalInvestigation
cacontology-multi:MultiJurisdictionalOperation
cacontology-multi:MultiJurisdictionalSituation
cacontology-multi:MultiStateTraffickingInvestigation
cacontology-multi:MutualAidRequest
cacontology-multi:NamedMultiJurisdictionalOperation
cacontology-multi:NationalCoordinatedOperation
cacontology-multi:NationwideChildRescueCoordination
cacontology-multi:NationwideOperation
cacontology-multi:OperationMetricsTracking
cacontology-multi:OperationSafeOnlineSummerType
cacontology-multi:ParticipatingAgency
cacontology-multi:PriorityProsecutionTrack
cacontology-multi:ProactiveInvestigationCampaign
cacontology-multi:ProjectSafeChildhoodOperation
cacontology-multi:ProsecutionCapacityAnalysis
cacontology-multi:RapidResponseCoordination
cacontology-multi:RegistrationComplianceViolation
cacontology-multi:ResourceSharing
cacontology-multi:SchoolPresentationDisclosureWorkflow
cacontology-multi:SexOffenderComplianceCheck
cacontology-multi:SimultaneousChildRescue
cacontology-multi:StateAgency
cacontology-multi:StateJurisdiction
cacontology-multi:StateLineCrossing
cacontology-multi:StatewideSweep
cacontology-multi:TaskForce
cacontology-multi:TaskForceHostedOperation
cacontology-multi:TaskForceLeader
cacontology-multi:TaskForceOperation
cacontology-multi:TraffickingCoordinationCenter
cacontology-multi:TraffickingInvestigationTask
cacontology-multi:TransportationForIllegalPurpose
cacontology-multi:USAttorneyOfficeParticipation
cacontology-multi:UserTriageProsecution
cacontology-multi:VictimIdentificationTask
cacontology-partnerships:AICooperation
cacontology-partnerships:AcademicPartner
cacontology-partnerships:AcademicPartnership
cacontology-partnerships:ActiveCooperationPhase
cacontology-partnerships:CivilSocietyEngagement
cacontology-partnerships:CivilSocietyPartner
cacontology-partnerships:CollaborativeInvestigationSituation
cacontology-partnerships:CommunityAnalysis
cacontology-partnerships:ContentDetectionCooperation
cacontology-partnerships:CoordinationMechanism
cacontology-partnerships:CrowdsourcingInvestigation
cacontology-partnerships:DataSharingAgreement
cacontology-partnerships:EmergencyCoordination
cacontology-partnerships:EvaluationPhase
cacontology-partnerships:GeolocationRequest
cacontology-partnerships:HashSharingProtocol
cacontology-partnerships:InformationSharingFramework
cacontology-partnerships:InformationSharingSituation
cacontology-partnerships:IntelligenceSharing
cacontology-partnerships:JointOperation
cacontology-partnerships:LawEnforcementPartner
cacontology-partnerships:MultiStakeholderInitiative
cacontology-partnerships:NGOCoordination
cacontology-partnerships:NGOPartner
cacontology-partnerships:OSINTInvestigation
cacontology-partnerships:ObjectIdentificationRequest
cacontology-partnerships:PartnerRole
cacontology-partnerships:PartnershipFormationPhase
cacontology-partnerships:PlatformMonitoring
cacontology-partnerships:PublicPrivatePartnership
cacontology-partnerships:PublicTip
cacontology-partnerships:RegularMeeting
cacontology-partnerships:RenewalPhase
cacontology-partnerships:TaskForceCoordination
cacontology-partnerships:TechIndustryCooperation
cacontology-partnerships:TechnicalIntegration
cacontology-partnerships:TechnologyCooperation
cacontology-partnerships:TechnologyPartner
cacontology-partnerships:ToolDevelopment
cacontology-physical:AbuseFacilitationItem
cacontology-physical:ChainOfCustodyBreachSituation
cacontology-physical:ChildTargetedItem
cacontology-physical:CommunicationDevice
cacontology-physical:ComputerEquipment
cacontology-physical:CriminalProcurement
cacontology-physical:DisguiseItem
cacontology-physical:DocumentaryEvidence
cacontology-physical:EvidenceAnalysisPhase
cacontology-physical:EvidenceCollectionPhase
cacontology-physical:EvidenceContaminationSituation
cacontology-physical:EvidenceCustodianRole
cacontology-physical:EvidenceDispositionPhase
cacontology-physical:EvidenceRecoverySituation
cacontology-physical:EvidenceSeizure
cacontology-physical:EvidenceStoragePhase
cacontology-physical:ForensicAnalystRole
cacontology-physical:ItemModification
cacontology-physical:OnlinePurchase
cacontology-physical:PersonalItem
cacontology-physical:PhysicalEvidence
cacontology-physical:PhysicalPurchase
cacontology-physical:PhysicalSearch
cacontology-physical:RecordingEquipment
cacontology-physical:ResidenceSearch
cacontology-physical:RestraintItem
cacontology-physical:SearchOfficerRole
cacontology-physical:StorageMedia
cacontology-physical:VehicleSearch
cacontology-physical:WorkplaceSearch
cacontology-platforms:AccountMetadata
cacontology-platforms:AccountSuspensionAction
cacontology-platforms:AnonymityProtectionLevel
cacontology-platforms:AnonymousChatPlatform
cacontology-platforms:AnonymousContactOpportunity
cacontology-platforms:ContentHashingAction
cacontology-platforms:ContentModerationAction
cacontology-platforms:ContentModerationCapability
cacontology-platforms:CrossPlatformEvidence
cacontology-platforms:CryptocurrencyService
cacontology-platforms:DarkWebService
cacontology-platforms:DataPreservationAction
cacontology-platforms:DataRetentionPolicy
cacontology-platforms:DeviceSocialMediaCorrelation
cacontology-platforms:DigitalEvidenceCorrelation
cacontology-platforms:ElectronicDeviceEvidence
cacontology-platforms:ElectronicServiceProvider
cacontology-platforms:FileHostingService
cacontology-platforms:GamePlatform
cacontology-platforms:GuestChatFeature
cacontology-platforms:IdentityDisclosurePolicy
cacontology-platforms:LargeScalePlatformTakedown
cacontology-platforms:LegalComplianceCapability
cacontology-platforms:LegalDataDisclosureAction
cacontology-platforms:MassUserBehaviorAnalysis
cacontology-platforms:MassUserDatabase
cacontology-platforms:MassivePlatformSituation
cacontology-platforms:MessagingService
cacontology-platforms:MinimalVerificationRequirement
cacontology-platforms:MultiPlatformSituation
cacontology-platforms:OnlineDatingPlatform
cacontology-platforms:OpenChatRooms
cacontology-platforms:PlatformCooperationSituation
cacontology-platforms:PlatformDeploymentPhase
cacontology-platforms:PlatformGrowthPhase
cacontology-platforms:PlatformInvestigationCoordination
cacontology-platforms:PlatformInvestigationPhase
cacontology-platforms:PlatformModerationPhase
cacontology-platforms:PlatformOperation
cacontology-platforms:PlatformTakedownPhase
cacontology-platforms:PrivateMessage
cacontology-platforms:ProfileBrowsingAnonymous
cacontology-platforms:RandomUserMatching
cacontology-platforms:SimultaneousSearchWarrant
cacontology-platforms:SocialMediaAccount
cacontology-platforms:SocialMediaAppData
cacontology-platforms:SocialMediaEvidence
cacontology-platforms:SocialMediaPlatform
cacontology-platforms:SocialMediaPost
cacontology-platforms:StoredSocialMediaContent
cacontology-platforms:TechnicalServiceProvider
cacontology-platforms:TemporaryAccountSystem
cacontology-platforms:UserRiskClassification
cacontology-platforms:UserScaleClassification
cacontology-platforms:UserVerificationSystem
cacontology-platforms:VideoStreamingPlatform
cacontology-prevention:AffiliateCoordination
cacontology-prevention:AffiliateResourceSharing
cacontology-prevention:AgeTargetedEducation
cacontology-prevention:ArchivePublicationSystem
cacontology-prevention:BehavioralPrevention
cacontology-prevention:BullyingPrevention
cacontology-prevention:ChildAbusePreventionMonth
cacontology-prevention:ChildSafetyEducation
cacontology-prevention:CommunityEducation
cacontology-prevention:CommunityEducator
cacontology-prevention:CommunityEmailList
cacontology-prevention:CommunityEngagement
cacontology-prevention:CommunityEngagementMetrics
cacontology-prevention:CommunityNewsletterSystem
cacontology-prevention:CommunityOutreach
cacontology-prevention:CommunityOutreachEffectiveness
cacontology-prevention:CommunityPartnershipInitiative
cacontology-prevention:CourseCompletionTracking
cacontology-prevention:DigitalLiteracy
cacontology-prevention:DigitalSafety
cacontology-prevention:DisclosureBarrierReduction
cacontology-prevention:DisclosureEncouragementStrategy
cacontology-prevention:DiscreetAccessSystem
cacontology-prevention:EducationPlatformIntegration
cacontology-prevention:EducationPortal
cacontology-prevention:EducationalOutreach
cacontology-prevention:EducationalPosterCampaign
cacontology-prevention:EducationalResource
cacontology-prevention:EducatorTraining
cacontology-prevention:EmailListEngagementMetrics
cacontology-prevention:EnvironmentalPrevention
cacontology-prevention:FAQKnowledgeBase
cacontology-prevention:FAQUsageMetrics
cacontology-prevention:HealthcareProviderTraining
cacontology-prevention:ICACAffiliateNetwork
cacontology-prevention:InformationPoster
cacontology-prevention:InteractiveCourseMetrics
cacontology-prevention:InteractiveCourseSystem
cacontology-prevention:MultimediaEducationContent
cacontology-prevention:NationwideAwarenessInitiative
cacontology-prevention:OnlineSafetyEducation
cacontology-prevention:OutreachTriggeredInvestigation
cacontology-prevention:ParentCommunityEmailList
cacontology-prevention:ParentEducation
cacontology-prevention:ParentalControl
cacontology-prevention:ParentalVigilanceProgram
cacontology-prevention:PlatformSafety
cacontology-prevention:PodcastEducationSeries
cacontology-prevention:PodcastEngagementMetrics
cacontology-prevention:PostPresentationDisclosure
cacontology-prevention:PosterDistributionMetrics
cacontology-prevention:PreventionAdvocate
cacontology-prevention:PreventionCampaign
cacontology-prevention:PreventionCurriculum
cacontology-prevention:PreventionEffectiveness
cacontology-prevention:PreventionMaterial
cacontology-prevention:PreventionMetrics
cacontology-prevention:PreventionProgram
cacontology-prevention:PreventionSpecialist
cacontology-prevention:PrimaryPrevention
cacontology-prevention:PublicAwareness
cacontology-prevention:QRCodeEngagementMetrics
cacontology-prevention:QRCodeIntegration
cacontology-prevention:RapidResponseDisclosureWorkflow
cacontology-prevention:RiskAssessmentTool
cacontology-prevention:RiskPrevention
cacontology-prevention:RiskReduction
cacontology-prevention:SafeDisclosureEnvironment
cacontology-prevention:SafetyCoordinator
cacontology-prevention:SafetyEducationEvent
cacontology-prevention:SafetyGuideline
cacontology-prevention:SafetyProtocol
cacontology-prevention:SchoolAllegationProtocol
cacontology-prevention:SchoolCounselorTraining
cacontology-prevention:SchoolDistribution
cacontology-prevention:SchoolPolicy
cacontology-prevention:SchoolPresentationProgram
cacontology-prevention:SchoolSafetyProgram
cacontology-prevention:SecondaryPrevention
cacontology-prevention:SextortionAwareness
cacontology-prevention:SextortionEducation
cacontology-prevention:SextortionResponse
cacontology-prevention:SextortionWarningSign
cacontology-prevention:StatewideCampaignMetrics
cacontology-prevention:StudentEducation
cacontology-prevention:TeacherTraining
cacontology-prevention:TertiaryPrevention
cacontology-prevention:TrustedAdultIdentification
cacontology-prevention:TwelvePlusEducation
cacontology-prevention:VictimDisclosureTriggering
cacontology-production:ActiveProductionPhase
cacontology-production:BathroomSurveillance
cacontology-production:BedroomSurveillance
cacontology-production:ConcealmentContainer
cacontology-production:ContentCreation
cacontology-production:ControlledEnvironment
cacontology-production:DeviceConcealment
cacontology-production:DigitalManipulation
cacontology-production:EditedContent
cacontology-production:EditingEquipment
cacontology-production:ExtendedProductionPeriod
cacontology-production:HiddenRecordingDevice
cacontology-production:LiveProductionEvent
cacontology-production:LiveStreamContent
cacontology-production:MobileRecordingDevice
cacontology-production:PhysicalDeviceModification
cacontology-production:PrivateSpaceSurveillance
cacontology-production:ProducedContent
cacontology-production:ProducedImage
cacontology-production:ProducedVideo
cacontology-production:Producer
cacontology-production:ProductionDistributionPhase
cacontology-production:ProductionEquipment
cacontology-production:ProductionFacilitator
cacontology-production:ProductionLocation
cacontology-production:ProductionOffense
cacontology-production:ProductionPreparationPhase
cacontology-production:ProductionSeries
cacontology-production:ProductionSession
cacontology-production:ProductionVictim
cacontology-production:RecordingAction
cacontology-production:RecordingDevice
cacontology-production:ResidentialProductionSite
cacontology-production:StationaryCamera
cacontology-recruitment:AcademicStruggles
cacontology-recruitment:AfterSchoolRecruitment
cacontology-recruitment:AttendanceProblems
cacontology-recruitment:ClassmateIntroduction
cacontology-recruitment:ClassmateRecruitmentNetwork
cacontology-recruitment:CoercedPeerRecruitment
cacontology-recruitment:EducationalInstitution
cacontology-recruitment:ExtracurricularRecruitment
cacontology-recruitment:FriendshipExploitation
cacontology-recruitment:LunchBreakRecruitment
cacontology-recruitment:MandatoryReportingActivation
cacontology-recruitment:PeerInfluenceRecruitment
cacontology-recruitment:PeerPressureVulnerability
cacontology-recruitment:PeerRecruitmentNetwork
cacontology-recruitment:RecruitmentIncentive
cacontology-recruitment:RecruitmentPunishment
cacontology-recruitment:RecruitmentQuota
cacontology-recruitment:RecruitmentTiming
cacontology-recruitment:SchoolBasedRecruitment
cacontology-recruitment:SchoolBasedReporting
cacontology-recruitment:SchoolCounselor
cacontology-recruitment:SchoolHoursRecruitment
cacontology-recruitment:SchoolPoliceContact
cacontology-recruitment:SchoolSocialWorker
cacontology-recruitment:SchoolStaffMember
cacontology-recruitment:SchoolVulnerabilityFactor
cacontology-recruitment:SocialConnectionLeverage
cacontology-recruitment:SocialIsolationAtSchool
cacontology-recruitment:SocialWorkerReport
cacontology-recruitment:StudentNetworkExploitation
cacontology-recruitment:TeacherReporter
cacontology-recruitment:VictimMediatedRecruitment
cacontology-recruitment:VictimSchoolDisclosure
cacontology-registry:AddressHistory
cacontology-registry:AgeAwareExploitation
cacontology-registry:Alias
cacontology-registry:AnnualRegistrationReview
cacontology-registry:BidirectionalContentExchange
cacontology-registry:CommunityNotification
cacontology-registry:ComplianceBasedArrest
cacontology-registry:ComplianceHistory
cacontology-registry:ComplianceScheduleCoordination
cacontology-registry:ComplianceViolation
cacontology-registry:ContactRestriction
cacontology-registry:ConvictingOffense
cacontology-registry:CourtOrder
cacontology-registry:CrossStateDigitalInvestigation
cacontology-registry:CrossStateRecidivism
cacontology-registry:DigitalRecidivismPattern
cacontology-registry:EducationInformation
cacontology-registry:EmploymentInformation
cacontology-registry:EmploymentRestriction
cacontology-registry:FailureToRegisterOffense
cacontology-registry:FalseInformationRegistrationOffense
cacontology-registry:GeographicRestriction
cacontology-registry:HighVolumeDigitalExploitation
cacontology-registry:IdentifyingMark
cacontology-registry:InternetInformation
cacontology-registry:InternetRestriction
cacontology-registry:InternetServiceProvider
cacontology-registry:MultiModalDigitalEvidence
cacontology-registry:NotificationTier
cacontology-registry:OffenderDeviceSearchWarrant
cacontology-registry:OffenderProfile
cacontology-registry:OffenseClassification
cacontology-registry:OnlineIdentifier
cacontology-registry:PersonalIdentifiers
cacontology-registry:Photograph
cacontology-registry:PhysicalDescription
cacontology-registry:PrimaryResidence
cacontology-registry:ProfessionalLicense
cacontology-registry:PublicWebsite
cacontology-registry:RecidivistSexOffender
cacontology-registry:RegisteredAddress
cacontology-registry:RegisteredSexOffender
cacontology-registry:RegisteredVehicle
cacontology-registry:RegistrationAlert
cacontology-registry:RegistrationRecord
cacontology-registry:RegistrationRequirement
cacontology-registry:RegistrationRestriction
cacontology-registry:RegistrationReviewArrest
cacontology-registry:RegistrationStatus
cacontology-registry:RegistrationUpdate
cacontology-registry:RegistryAgency
cacontology-registry:RegistryOfficer
cacontology-registry:RegistrySystem
cacontology-registry:SchoolLocation
cacontology-registry:SexOffenderRegistry
cacontology-registry:SocialMediaAccount
cacontology-registry:TemporaryAddress
cacontology-registry:VehicleInformation
cacontology-registry:VerificationCheck
cacontology-registry:VictimDeviceForensics
cacontology-registry:VictimInformation
cacontology-registry:WorkLocation
cacontology-sentencing:AppealProcess
cacontology-sentencing:ArraignmentProceeding
cacontology-sentencing:CSAM_AccessingAndViewing
cacontology-sentencing:CSAM_CausingProduction
cacontology-sentencing:CSAM_Distribution
cacontology-sentencing:CSAM_Possession
cacontology-sentencing:CSAM_Production
cacontology-sentencing:CSAM_ReceivingOnCellularDevice
cacontology-sentencing:CarriageServiceCSAMTransmission
cacontology-sentencing:CarriageServiceIndecentCommunication
cacontology-sentencing:CommonwealthChildAbuseOffense
cacontology-sentencing:CommunityService
cacontology-sentencing:CriminalCharge
cacontology-sentencing:CriminalSentence
cacontology-sentencing:DefendantRole
cacontology-sentencing:DefenseAttorneyRole
cacontology-sentencing:FederalCharge
cacontology-sentencing:JudgeRole
cacontology-sentencing:JudicialSystemSituation
cacontology-sentencing:JuryRole
cacontology-sentencing:LegalCaseSituation
cacontology-sentencing:LegalProceeding
cacontology-sentencing:LiveStreamingOffense
cacontology-sentencing:MandatoryMinimumSentencing
cacontology-sentencing:MonetaryPenalty
cacontology-sentencing:OnlineEnticement
cacontology-sentencing:PleaBargaining
cacontology-sentencing:PostConvictionPhase
cacontology-sentencing:PreTrialPhase
cacontology-sentencing:PrisonSentence
cacontology-sentencing:ProbationOfficerRole
cacontology-sentencing:ProbationSentence
cacontology-sentencing:ProsecutorRole
cacontology-sentencing:SentencingHearing
cacontology-sentencing:SentencingPhase
cacontology-sentencing:SexTrafficking
cacontology-sentencing:SextortionCharge
cacontology-sentencing:SolicitingExplicitMaterial
cacontology-sentencing:StateCharge
cacontology-sentencing:SupervisedRelease
cacontology-sentencing:TrialPhase
cacontology-sentencing:TrialProceeding
cacontology-sentencing:VictimRole
cacontology-sextortion:AdditionalContentDemand
cacontology-sextortion:AgeDeceptionSextortion
cacontology-sextortion:AgeDeceptionTactic
cacontology-sextortion:ComplianceResponse
cacontology-sextortion:ContactListThreat
cacontology-sextortion:ConversationReconstruction
cacontology-sextortion:DemandMessage
cacontology-sextortion:DeviceForensicAnalysis
cacontology-sextortion:DisappearingMessageFeature
cacontology-sextortion:EmotionalManipulation
cacontology-sextortion:ExtortionDemand
cacontology-sextortion:ExtortionPhase
cacontology-sextortion:FalseProfileCreation
cacontology-sextortion:GiftCardDemand
cacontology-sextortion:IdentityImpersonation
cacontology-sextortion:ImageAcquisitionPhase
cacontology-sextortion:ImageSharingFeature
cacontology-sextortion:ImageSolicitationMessage
cacontology-sextortion:InitialDeceptionPhase
cacontology-sextortion:InstantMessagingPlatform
cacontology-sextortion:InstantMessagingSextortion
cacontology-sextortion:ManipulationTactic
cacontology-sextortion:MonetaryDemand
cacontology-sextortion:PeerImpersonation
cacontology-sextortion:PersonalMeetingDemand
cacontology-sextortion:PrivateMessagingFeature
cacontology-sextortion:ProgressiveEscalation
cacontology-sextortion:RefusalResponse
cacontology-sextortion:ReportingResponse
cacontology-sextortion:ScreenshotThreat
cacontology-sextortion:SextortionCommunication
cacontology-sextortion:SextortionIncident
cacontology-sextortion:SextortionInvestigation
cacontology-sextortion:SextortionProgression
cacontology-sextortion:SexualSolicitationPhase
cacontology-sextortion:SexuallyExplicitConversation
cacontology-sextortion:SharingThreat
cacontology-sextortion:SilentVictimization
cacontology-sextortion:SocialMediaSextortion
cacontology-sextortion:SocialMediaSharingThreat
cacontology-sextortion:ThreatMechanism
cacontology-sextortion:ThreatMessage
cacontology-sextortion:TrustBuildingPhase
cacontology-sextortion:VictimIdentification
cacontology-sextortion:VictimIsolation
cacontology-sextortion:VictimResponse
cacontology-specialized:AnalystRole
cacontology-specialized:CollegeParkBarrack
cacontology-specialized:CommunityEngagementK9
cacontology-specialized:CoordinatedArrest
cacontology-specialized:CountyPoliceSupport
cacontology-specialized:CriticalIncidentDebriefing
cacontology-specialized:CyberCrimeUnit
cacontology-specialized:DetectionDog
cacontology-specialized:DeviceDetection
cacontology-specialized:DigitalForensicsUnit
cacontology-specialized:ElectronicStorageDeviceK9
cacontology-specialized:InteragencyOperationSituation
cacontology-specialized:K9DetectionProgram
cacontology-specialized:K9Officer
cacontology-specialized:K9SearchOperation
cacontology-specialized:K9TrainingProgram
cacontology-specialized:MarylandStatePoliceComputerCrimesUnit
cacontology-specialized:MentalHealthSupport
cacontology-specialized:MultiJurisdictionalOperation
cacontology-specialized:MultiUnitCoordinationSituation
cacontology-specialized:NamedOperation
cacontology-specialized:OfficerWellnessProgram
cacontology-specialized:OperationEvaluationPhase
cacontology-specialized:OperationExecutionPhase
cacontology-specialized:OperationMetrics
cacontology-specialized:OperationPlanningPhase
cacontology-specialized:OperationSafeOnlineSummer
cacontology-specialized:OperationUnhinged
cacontology-specialized:PeerSupport
cacontology-specialized:PrinceGeorgesCountyPolice
cacontology-specialized:SpecializedCapabilitySituation
cacontology-specialized:SpecializedInvestigativeUnit
cacontology-specialized:SpecializedOperatorRole
cacontology-specialized:StatePoliceBarrack
cacontology-specialized:StatePoliceComputerCrimesUnit
cacontology-specialized:StressManagement
cacontology-specialized:TacticalUnit
cacontology-specialized:TechnicalSpecialistRole
cacontology-specialized:TherapyDog
cacontology-specialized:UndercoverUnit
cacontology-specialized:UnitCommanderRole
cacontology-specialized:UnitDeploymentPhase
cacontology-specialized:UnitMaintenancePhase
cacontology-specialized:UnitTrainingPhase
cacontology-specialized:VictimServicesUnit
cacontology-specialized:WellnessCheck
cacontology-strategy:AIGenerationPattern
cacontology-strategy:CapabilityPattern
cacontology-strategy:CompliancePattern
cacontology-strategy:CoordinationSituationPattern
cacontology-strategy:CriminalOrganizationPattern
cacontology-strategy:CrossBorderPattern
cacontology-strategy:EducationalPattern
cacontology-strategy:EvidenceObjectPattern
cacontology-strategy:ForensicsLifecyclePattern
cacontology-strategy:HighPriorityModule
cacontology-strategy:IdeologyPattern
cacontology-strategy:InstitutionalRolePattern
cacontology-strategy:JudicialPhasePattern
cacontology-strategy:LegalEventPattern
cacontology-strategy:LowPriorityModule
cacontology-strategy:MediumPriorityModule
cacontology-strategy:ModuleIntegrationStrategy
cacontology-strategy:OntologicalConsistency
cacontology-strategy:OrganizationalPattern
cacontology-strategy:Phase3Wave1
cacontology-strategy:Phase3Wave2
cacontology-strategy:Phase3Wave3
cacontology-strategy:PhaseConsistency
cacontology-strategy:PreventiveActionPattern
cacontology-strategy:RegistrationPattern
cacontology-strategy:RoleConsistency
cacontology-strategy:SpecializedRolePattern
cacontology-strategy:SyntheticArtifactPattern
cacontology-strategy:TaskforceRolePattern
cacontology-strategy:TemporalConsistency
cacontology-strategy:TotalPhase3Implementation
cacontology-strategy:TreatyPattern
cacontology-strategy:ValidationStrategy
cacontology-street:AgeVulnerabilityIndicator
cacontology-street:AlcoholFacilitation
cacontology-street:BehavioralVulnerabilityIndicator
cacontology-street:BodySellingProposition
cacontology-street:CasualConversationApproach
cacontology-street:CommercialDistrict
cacontology-street:DelayedReporting
cacontology-street:DemographicTargeting
cacontology-street:DigitalFollowUp
cacontology-street:DigitalToPhysicalBridge
cacontology-street:DirectSolicitationApproach
cacontology-street:DirectTraffickingProposition
cacontology-street:DisclosureToAuthorities
cacontology-street:DrugFacilitatedVulnerability
cacontology-street:EconomicIncentivePresentation
cacontology-street:EscapeAttempt
cacontology-street:ExplicitCommercialOffer
cacontology-street:FoodOfferApproach
cacontology-street:HelpOfferApproach
cacontology-street:HelpSeekingBehavior
cacontology-street:HighTrafficArea
cacontology-street:HighwayLocation
cacontology-street:ImmediateExploitationAttempt
cacontology-street:ImmediateIsolation
cacontology-street:ImmediateReporting
cacontology-street:ImpairmentExploitation
cacontology-street:InitialStreetContact
cacontology-street:IsolatedLocation
cacontology-street:IsolationVulnerabilityIndicator
cacontology-street:LocationTransition
cacontology-street:MarijuanaFacilitation
cacontology-street:NeighborhoodTargeting
cacontology-street:NextDayFollowUp
cacontology-street:OpportunisticExploitation
cacontology-street:PersistenceAfterRejection
cacontology-street:PhoneChargingOffer
cacontology-street:PhysicalVulnerabilityIndicator
cacontology-street:PostContactReinforcement
cacontology-street:PretextBasedApproach
cacontology-street:ProstitutionProposition
cacontology-street:PublicSpaceTargeting
cacontology-street:RapidEscalationRecruitment
cacontology-street:ResidentialArea
cacontology-street:SameDayProgression
cacontology-street:SecondaryLocationExploitation
cacontology-street:SocioeconomicVulnerabilityIndicator
cacontology-street:StreetBasedRecruitment
cacontology-street:StreetRecruitmentLocation
cacontology-street:StreetVulnerabilityAssessment
cacontology-street:StrippingProposition
cacontology-street:SubstanceBasedControl
cacontology-street:SubstanceFacilitatedRecruitment
cacontology-street:TextMessageFollowUp
cacontology-street:TraffickingPropositionReinforcement
cacontology-street:TraffickingPropositionRejection
cacontology-street:TransitArea
cacontology-street:TransportationOfferApproach
cacontology-street:VehicleBasedIsolation
cacontology-street:VehicleLocation
cacontology-street:VictimReporting
cacontology-street:VictimResistance
cacontology-street:VictimStreetResponse
cacontology-street:VulnerabilityIndicator
cacontology-street:VulnerableNeighborhood
cacontology-tactical:BarricadeSituation
cacontology-tactical:Breacher
cacontology-tactical:BreachingTool
cacontology-tactical:CommunicationEquipment
cacontology-tactical:DynamicEntry
cacontology-tactical:HighRiskArrest
cacontology-tactical:LessLethalWeapon
cacontology-tactical:LocationIntelligence
cacontology-tactical:Marksman
cacontology-tactical:Negotiator
cacontology-tactical:ProtectiveGear
cacontology-tactical:SWATOperation
cacontology-tactical:SurrenderNegotiation
cacontology-tactical:SurveillanceEquipment
cacontology-tactical:SuspectProfile
cacontology-tactical:TacticalCommander
cacontology-tactical:TacticalEquipment
cacontology-tactical:TacticalOperation
cacontology-tactical:TacticalTeamMember
cacontology-tactical:TeamLeader
cacontology-tactical:ThreatAssessment
cacontology-taskforce:AnalyticsUnit
cacontology-taskforce:AnnualPerformance
cacontology-taskforce:ArrestMetrics
cacontology-taskforce:AssessmentPhase
cacontology-taskforce:AttorneyGeneralHost
cacontology-taskforce:CaliforniaRegionalSystem
cacontology-taskforce:CertificationProgram
cacontology-taskforce:CoordinationMechanism
cacontology-taskforce:CoordinationPhase
cacontology-taskforce:CountyBasedTaskForce
cacontology-taskforce:CyberTipMetrics
cacontology-taskforce:DeploymentPhase
cacontology-taskforce:DigitalForensicsUnit
cacontology-taskforce:DistrictAttorneyHost
cacontology-taskforce:EquipmentSharing
cacontology-taskforce:ExecutionPhase
cacontology-taskforce:ExpertiseSharing
cacontology-taskforce:FederalICACtaskForce
cacontology-taskforce:FederalLawEnforcementPartner
cacontology-taskforce:FloridaRegionalSystem
cacontology-taskforce:GovernorsOfficeCrimePreventionFunding
cacontology-taskforce:HistoricalMetrics
cacontology-taskforce:ICACtaskForce
cacontology-taskforce:IllinoisICACtaskForce
cacontology-taskforce:IntelligenceSharing
cacontology-taskforce:InterAgencyCoordination
cacontology-taskforce:JointOperation
cacontology-taskforce:LocalICACtaskForce
cacontology-taskforce:LocalLawEnforcementPartner
cacontology-taskforce:LocalPoliceHost
cacontology-taskforce:MarylandICACtaskForce
cacontology-taskforce:MetropolitanTaskForce
cacontology-taskforce:MilitaryICACtaskForce
cacontology-taskforce:MultiRegionalState
cacontology-taskforce:NationalHotline
cacontology-taskforce:NationalICACtaskForceDirectory
cacontology-taskforce:NetworkPerformance
cacontology-taskforce:NewYorkRegionalSystem
cacontology-taskforce:PersonnelSharing
cacontology-taskforce:PlanningPhase
cacontology-taskforce:ProactiveOperation
cacontology-taskforce:ReactiveOperation
cacontology-taskforce:RegionalCoordination
cacontology-taskforce:RegionalTaskForce
cacontology-taskforce:RegionalTaskForceCoordination
cacontology-taskforce:ResourceSharing
cacontology-taskforce:SheriffOfficeHost
cacontology-taskforce:SpecializedUnit
cacontology-taskforce:StateAgencyHost
cacontology-taskforce:StateBureauHost
cacontology-taskforce:StateICACtaskForce
cacontology-taskforce:StateLocalFundingCombination
cacontology-taskforce:StatePoliceHost
cacontology-taskforce:StatewideTaskForce
cacontology-taskforce:SweepOperation
cacontology-taskforce:TacticalUnit
cacontology-taskforce:TaskForceAlliance
cacontology-taskforce:TaskForceAnalyst
cacontology-taskforce:TaskForceCommander
cacontology-taskforce:TaskForceContactInformation
cacontology-taskforce:TaskForceCoordinator
cacontology-taskforce:TaskForceForensicExaminer
cacontology-taskforce:TaskForceHostOrganization
cacontology-taskforce:TaskForceHotline
cacontology-taskforce:TaskForceInvestigator
cacontology-taskforce:TaskForceMember
cacontology-taskforce:TaskForceMetrics
cacontology-taskforce:TaskForceOperation
cacontology-taskforce:TaskForceTraining
cacontology-taskforce:TaskForceWebsite
cacontology-taskforce:TexasRegionalSystem
cacontology-taskforce:TrainingReachMetrics
cacontology-taskforce:TrainingUnit
cacontology-taskforce:UndercoverUnit
cacontology-taskforce:VictimServiceUnit
cacontology-temporal:Age
cacontology-temporal:AgeAtTimeSituation
cacontology-temporal:AnalysisTransitionEvent
cacontology-temporal:ClosureEvent
cacontology-temporal:ConcurrentInvestigationSituation
cacontology-temporal:EventSequence
cacontology-temporal:EvidenceTransitionEvent
cacontology-temporal:InitiationEvent
cacontology-temporal:InvestigationLifecycle
cacontology-temporal:LegalProcessTransitionEvent
cacontology-temporal:MultiJurisdictionCoordinationSituation
cacontology-temporal:ParallelEventCluster
cacontology-temporal:ParallelEvidenceCollectionSituation
cacontology-temporal:PhaseTransitionEvent
cacontology-temporal:ResolutionTransitionEvent
cacontology-temporal:ResumptionEvent
cacontology-temporal:RoleConflictSituation
cacontology-temporal:RoleEscalation
cacontology-temporal:RoleReassignment
cacontology-temporal:RoleTransition
cacontology-temporal:SimultaneousRoleSituation
cacontology-temporal:SuspendedSituation
cacontology-temporal:SuspensionEvent
cacontology-temporal:UrgentRescueLifecycle
cacontology-trafficking:AdultTraffickingVictimRole
cacontology-trafficking:AgingOutVictimProfile
cacontology-trafficking:AssociateTraffickerRole
cacontology-trafficking:CommercialSexualExploitation
cacontology-trafficking:CrossJurisdictionalControl
cacontology-trafficking:DisruptionPhase
cacontology-trafficking:EarningsCollection
cacontology-trafficking:EstablishmentPhase
cacontology-trafficking:ExpansionPhase
cacontology-trafficking:FinancialFacilitatorRole
cacontology-trafficking:InterstateVictimTransport
cacontology-trafficking:MinorTraffickingVictimRole
cacontology-trafficking:MultiJurisdictionalSituation
cacontology-trafficking:MultiStateTraffickingConspiracy
cacontology-trafficking:OngoingDangerResponse
cacontology-trafficking:OperationalPhase
cacontology-trafficking:PrimaryTraffickerRole
cacontology-trafficking:RecruitmentFacilitatorRole
cacontology-trafficking:RunawayVictimProfile
cacontology-trafficking:TraffickerRole
cacontology-trafficking:TraffickingCell
cacontology-trafficking:TraffickingEnterprise
cacontology-trafficking:TraffickingHierarchy
cacontology-trafficking:TraffickingNetworkSituation
cacontology-trafficking:TraffickingOperation
cacontology-trafficking:TraffickingRing
cacontology-trafficking:TraffickingVictimRescue
cacontology-trafficking:TraffickingVictimRole
cacontology-trafficking:TransportationFacilitatorRole
cacontology-trafficking:VictimControl
cacontology-trafficking:VictimControlSituation
cacontology-trafficking:VictimEmergencyResponse
cacontology-trafficking:VictimRecruitment
cacontology-trafficking:VictimRotation
cacontology-trafficking:VictimSafetyAssessment
cacontology-trafficking:VictimTransportation
cacontology-trafficking:VictimVulnerabilityProfile
cacontology-training:AssessmentPhase
cacontology-training:CapacityBuildingPartner
cacontology-training:CapacityBuildingProgram
cacontology-training:CapacityBuildingSituation
cacontology-training:CertificationBody
cacontology-training:CertificationPhase
cacontology-training:CertifiedProfessional
cacontology-training:ChildProtectionTraining
cacontology-training:CompetencyAssessment
cacontology-training:ContentDevelopmentPhase
cacontology-training:ContinuingEducation
cacontology-training:CriminalJusticeTraining
cacontology-training:DigitalForensicsTraining
cacontology-training:GlobalTrainingReach
cacontology-training:GlobalTrainingSituation
cacontology-training:HotlineTraining
cacontology-training:HybridTraining
cacontology-training:InPersonTraining
cacontology-training:InternationalTrainer
cacontology-training:InternationalTraining
cacontology-training:InvestigationTraining
cacontology-training:K9ProgramMetrics
cacontology-training:LegalTraining
cacontology-training:MentorshipProgram
cacontology-training:MultiStakeholderTrainingSituation
cacontology-training:OnlineTraining
cacontology-training:OperationalTrainingMetrics
cacontology-training:OutreachEventMetrics
cacontology-training:ProfessionalCertification
cacontology-training:ProfessionalDevelopment
cacontology-training:ProfessionalTrainingMetrics
cacontology-training:ProgramPlanningPhase
cacontology-training:SkillsDevelopmentProgram
cacontology-training:SkillsValidation
cacontology-training:SubjectMatterExpert
cacontology-training:TrainingCertificate
cacontology-training:TrainingCoordinator
cacontology-training:TrainingCurriculum
cacontology-training:TrainingDeliveryPhase
cacontology-training:TrainingEffectiveness
cacontology-training:TrainingInstitution
cacontology-training:TrainingMetrics
cacontology-training:TrainingModule
cacontology-training:TrainingParticipant
cacontology-training:VictimServiceTraining
cacontology-undercover:AdvertisementPhotographyEvidence
cacontology-undercover:ApartmentStingOperation
cacontology-undercover:BathroomViolationEvidence
cacontology-undercover:ChatInvestigationAgent
cacontology-undercover:ChatRoomInfiltration
cacontology-undercover:ChildPersona
cacontology-undercover:ClientCommunicationInterception
cacontology-undercover:ClientResponseInterception
cacontology-undercover:ControlledMeeting
cacontology-undercover:CriminalSolicitation
cacontology-undercover:EvidenceGatheringPhase
cacontology-undercover:ExtractionPhase
cacontology-undercover:InPersonMeetingSolicitation
cacontology-undercover:IncriminatingStatement
cacontology-undercover:InfiltrationPhase
cacontology-undercover:LiveAdvertisementMonitoring
cacontology-undercover:MinorPersonaAgent
cacontology-undercover:MinorPersonaOperation
cacontology-undercover:MultiPlatformUndercoverOperation
cacontology-undercover:OnlinePlatformSurveillance
cacontology-undercover:OperationHandler
cacontology-undercover:OperationalEvidence
cacontology-undercover:ParentPersona
cacontology-undercover:PhoneInstructionMonitoring
cacontology-undercover:PhysicalLocationSting
cacontology-undercover:PlatformAccount
cacontology-undercover:PredatorTargetingOperation
cacontology-undercover:PreparationPhase
cacontology-undercover:PrivacyViolationInvestigation
cacontology-undercover:ResidentialStingLocation
cacontology-undercover:SocialMediaAgent
cacontology-undercover:SocialMediaUndercoverOperation
cacontology-undercover:StingOperation
cacontology-undercover:SurveillancePosition
cacontology-undercover:TechnicalSupport
cacontology-undercover:UndercoverAgent
cacontology-undercover:UndercoverChatInvestigation
cacontology-undercover:UndercoverCommunication
cacontology-undercover:UndercoverEvidence
cacontology-undercover:UndercoverIdentity
cacontology-undercover:UndercoverOperation
cacontology-undercover:VictimInstructionEvidence
cacontology-undercover:WebsiteAdvertisementResponse
cacontology-us-ncmec:AccountLinking
cacontology-us-ncmec:CSAMSolicitationAnnotation
cacontology-us-ncmec:ChildSexTourismIncident
cacontology-us-ncmec:ChildSexTraffickingIncident
cacontology-us-ncmec:ContentIdentification
cacontology-us-ncmec:CyberTipAnalysis
cacontology-us-ncmec:FederalReferral
cacontology-us-ncmec:InvestigationTrigger
cacontology-us-ncmec:LocalLawEnforcementReferral
cacontology-us-ncmec:MinorToMinorInteractionAnnotation
cacontology-us-ncmec:NCMECCybertipReport
cacontology-us-ncmec:NCMECIncidentType
cacontology-us-ncmec:NCMECReportAnnotation
cacontology-us-ncmec:OnlineEnticementIncident
cacontology-us-ncmec:PhoneNumberTrace
cacontology-us-ncmec:PlatformCooperation
cacontology-us-ncmec:PossessionIndicator
cacontology-us-ncmec:SextortionAnnotation
cacontology-us-ncmec:SpamAnnotation
cacontology-us-ncmec:TaskForceReferral
cacontology-us-ncmec:TipEnrichment
cacontology-us-ncmec:TipPrioritization
cacontology-us-ncmec:TipProcessing
cacontology-us-ncmec:TipValidation
cacontology-us-ncmec:TransferDetection
cacontology-usa-federal:AbusiveContactWithMinor
cacontology-usa-federal:AggravatedSexualAbuse
cacontology-usa-federal:CEOSAttorneyRole
cacontology-usa-federal:CEOSdivision
cacontology-usa-federal:ChildPornographyDistribution
cacontology-usa-federal:ChildPornographyPossession
cacontology-usa-federal:ChildPornographyProduction
cacontology-usa-federal:ChildPornographyReceipt
cacontology-usa-federal:ChildSupportEnforcementLaw
cacontology-usa-federal:ChildSupportEvasion
cacontology-usa-federal:ChildSupportExploitationLink
cacontology-usa-federal:CommercialSexualExploitation
cacontology-usa-federal:ExtraterritorialProduction
cacontology-usa-federal:ExtraterritorialSexualExploitationLaw
cacontology-usa-federal:FederalChildExploitationLaw
cacontology-usa-federal:FederalChildPornographyLaw
cacontology-usa-federal:FederalChildSexTraffickingLaw
cacontology-usa-federal:FederalChildSexualAbuseLaw
cacontology-usa-federal:FederalDefendantRole
cacontology-usa-federal:FederalInvestigation
cacontology-usa-federal:FederalInvestigatorRole
cacontology-usa-federal:FederalObscenityLaw
cacontology-usa-federal:FederalProsecution
cacontology-usa-federal:FederalProsecutorRole
cacontology-usa-federal:FederalVictimRole
cacontology-usa-federal:FinancialControlPattern
cacontology-usa-federal:ForeignCommerceExploitation
cacontology-usa-federal:ObscenityDistribution
cacontology-usa-federal:ObscenityImportation
cacontology-usa-federal:ObscenityTransportation
cacontology-usa-federal:OnlineObscenityDistribution
cacontology-usa-federal:PostConvictionPhase
cacontology-usa-federal:PreTrialPhase
cacontology-usa-federal:SentencingPhase
cacontology-usa-federal:SexTourism
cacontology-usa-federal:SexTraffickingConspiracy
cacontology-usa-federal:SexTraffickingOfMinors
cacontology-usa-federal:SexualAbuseOfMinor
cacontology-usa-federal:TransportationForSexualExploitation
cacontology-usa-federal:TrialPhase
cacontology1:AnalysisPhase
cacontology1:AnalystRole
cacontology1:CACInvestigation
cacontology1:CSAMCurationAction
cacontology1:CSAMIncident
cacontology1:ChildSexualAbuseEvent
cacontology1:ChildSexualExploitation
cacontology1:ChildSexualExploitationCharge
cacontology1:ConclusionPhase
cacontology1:ConspiracyLeaderRole
cacontology1:ConspiracyMemberRole
cacontology1:ConspiracyRole
cacontology1:ConspiracyToCommitCSA
cacontology1:CoordinatedOffensePattern
cacontology1:CriminalEnterprise
cacontology1:DigitallyGeneratedCSAMIncident
cacontology1:EvidencePhase
cacontology1:EvidenceReviewAction
cacontology1:GroomingSolicitation
cacontology1:InitialPhase
cacontology1:Investigation
cacontology1:InvestigationLifecycleSituation
cacontology1:InvestigatorRole
cacontology1:LegalProcessAction
cacontology1:LegalProcessPhase
cacontology1:LiveStreamingCSA
cacontology1:MultiDefendantIndictment
cacontology1:OffenderRole
cacontology1:ReceiveCybertipAction
cacontology1:RescuerRole
cacontology1:ReviewCybertipAction
cacontology1:Sextortion
cacontology1:UnknownVictimSubmission
cacontology1:VictimPhase
cacontology1:VictimRescueAction
cacontology1:VictimRole
cacontology2:Investigation
case-investigation:Investigation
gufo:AbstractArtifact
gufo:Action
gufo:Artifact
gufo:Event
gufo:FunctionalComplex
gufo:IntrinsicMode
gufo:IntrinsicMoment
gufo:Norm
gufo:Object
gufo:Organization
gufo:ParticipationSituation
gufo:Phase
gufo:Plan
gufo:Process
gufo:Quality
gufo:QualityValueAttributionSituation
gufo:Relator
gufo:Role
gufo:Situation
gufo:TemporaryParthoodSituation
hotline:ActionPhase
hotline:AutomatedReporterAgent
hotline:ClosurePhase
hotline:ESPReport
hotline:EvidenceItem
hotline:ForensicsSpecialistRole
hotline:ForwardToLEAction
hotline:HashFeedbackAction
hotline:HashSubmissionAction
hotline:HotlineAction
hotline:HotlineAnalystRole
hotline:HotlineOrganization
hotline:HotlineReport
hotline:ImageEvidence
hotline:IntakeChannel
hotline:IntakePhase
hotline:InternationalCoordination
hotline:LiaisonRole
hotline:MultiAgencyCoordination
hotline:PublicReport
hotline:ReportReviewAction
hotline:ReporterRole
hotline:ReviewPhase
hotline:TakedownRequestAction
hotline:URLReference
hotline:VideoEvidence
skos:Concept
uco-action:Action
uco-action:Crime
uco-channel:DigitalService
uco-core:Observable
uco-core:Relationship
uco-core:Role
uco-core:UcoObject
uco-identity:Identity
uco-identity:Organization
uco-identity:Person
uco-identity:Role
uco-identity:Software
uco-location:Location
uco-observable:Account
uco-observable:DigitalAccount
uco-observable:DigitalArtifact
uco-observable:DigitalDevice
uco-observable:DigitalService
uco-observable:DigitalServiceFeature
uco-observable:File
uco-observable:Hash
uco-observable:Image
uco-observable:Message
uco-observable:MessageThread
uco-observable:ObservableObject
uco-observable:Observation
uco-observable:PhoneCall
uco-observable:PhoneNumber
uco-observable:URL
uco-observable:WebPage
uco-pattern:Pattern
uco-role:OffenderRole
uco-role:Role
uco-role:SubjectRole
uco-role:VictimRole
uco-tool:AnalyticTool
uco-tool:Tool
uco-types:Hash
Properties (2214)
cacontology-abduction:abductionDuration
cacontology-abduction:abductionLocation
cacontology-abduction:accessDifficulty
cacontology-abduction:approachMethod
cacontology-abduction:complianceReason
cacontology-abduction:concealmentLevel
cacontology-abduction:concealsIdentityWith
cacontology-abduction:disclosesTo
cacontology-abduction:disclosureMethod
cacontology-abduction:disguiseEffectiveness
cacontology-abduction:disguiseType
cacontology-abduction:documentsAbduction
cacontology-abduction:employsCoercion
cacontology-abduction:entryMethod
cacontology-abduction:escalatesTo
cacontology-abduction:escapeRoutes
cacontology-abduction:evidenceRecoveryRate
cacontology-abduction:exercisesControl
cacontology-abduction:exhibitsVulnerability
cacontology-abduction:exploitsVulnerability
cacontology-abduction:facilitatesExploitation
cacontology-abduction:forcesEntryTo
cacontology-abduction:investigatesAbduction
cacontology-abduction:investigationDuration
cacontology-abduction:isolatesAt
cacontology-abduction:locationIsolationLevel
cacontology-abduction:occursAt
cacontology-abduction:opportunityWindow
cacontology-abduction:perpetratesAbduction
cacontology-abduction:recoveredFrom
cacontology-abduction:reportingDelay
cacontology-abduction:reportsAbduction
cacontology-abduction:resistanceLevel
cacontology-abduction:resistsAbduction
cacontology-abduction:respondsTo
cacontology-abduction:supportsCharge
cacontology-abduction:surveillanceDuration
cacontology-abduction:targetingCriteria
cacontology-abduction:targetsVictim
cacontology-abduction:threatEffectiveness
cacontology-abduction:threatSpecificity
cacontology-abduction:threatensWith
cacontology-abduction:timeOfDay
cacontology-abduction:transitionsTo
cacontology-abduction:triggersInvestigation
cacontology-abduction:usesDisguise
cacontology-abduction:usesWeapon
cacontology-abduction:victimActivity
cacontology-abduction:victimsOf
cacontology-abduction:weaponDisplayed
cacontology-abduction:weaponType
cacontology-abduction:witnessCount
cacontology-ai:aiModelUsed
cacontology-ai:analyzesTrainingData
cacontology-ai:artifactsDetected
cacontology-ai:artificialnessLevel
cacontology-ai:basedOnModel
cacontology-ai:challengesLegalFramework
cacontology-ai:complicatesVictimIdentification
cacontology-ai:detectedBy
cacontology-ai:detectionConfidence
cacontology-ai:detectionMethod
cacontology-ai:evidenceAdmissibility
cacontology-ai:falsePositiveRate
cacontology-ai:generatedUsing
cacontology-ai:generationComplexity
cacontology-ai:generationTechnique
cacontology-ai:investigationChallengeLevel
cacontology-ai:legalFrameworkChallenges
cacontology-ai:processingTime
cacontology-ai:prosecutionDifficulty
cacontology-ai:realVictimDepicted
cacontology-ai:renderingQuality
cacontology-ai:requiresSpecializedProsecution
cacontology-ai:revealsArtifacts
cacontology-ai:sourceTraceability
cacontology-ai:subjectOfInvestigation
cacontology-ai:technicalExpertiseRequired
cacontology-ai:tracesToSource
cacontology-ai:usesDetectionTool
cacontology-ai:utilizesTool
cacontology-ai:victimIdentificationDifficulty
cacontology-asset-forfeiture:accountFunds
cacontology-asset-forfeiture:assignedRole
cacontology-asset-forfeiture:courtJurisdiction
cacontology-asset-forfeiture:currentPhase
cacontology-asset-forfeiture:equipmentType
cacontology-asset-forfeiture:estimatedValue
cacontology-asset-forfeiture:financialPenaltyAmount
cacontology-asset-forfeiture:forfeitureDate
cacontology-asset-forfeiture:forfeiturePercentage
cacontology-asset-forfeiture:hasPhaseTransition
cacontology-asset-forfeiture:involvesCoordination
cacontology-asset-forfeiture:involvesTaskforce
cacontology-asset-forfeiture:itemCount
cacontology-asset-forfeiture:marketValue
cacontology-asset-forfeiture:playsRole
cacontology-asset-forfeiture:precedentSetting
cacontology-asset-forfeiture:relatedCriminalCharges
cacontology-asset-forfeiture:restraintDate
cacontology-asset-forfeiture:targetedAsset
cacontology-athletic:coachesTeam
cacontology-athletic:coachingExperience
cacontology-athletic:currentPhase
cacontology-athletic:hasPhaseTransition
cacontology-athletic:holdsCoachingRole
cacontology-athletic:multipleRoles
cacontology-athletic:occursInFacility
cacontology-athletic:participatesInSituation
cacontology-athletic:playsOnTeam
cacontology-athletic:practiceFrequency
cacontology-athletic:sportType
cacontology-athletic:teamType
cacontology-athletic:utilizesAthleticSpace
cacontology-case:accessLevel
cacontology-case:appealStatus
cacontology-case:approvedBy
cacontology-case:archivalDate
cacontology-case:archivedAt
cacontology-case:assignedBy
cacontology-case:assignedInvestigator
cacontology-case:assignedTo
cacontology-case:assignedToRole
cacontology-case:assignmentDate
cacontology-case:assignmentStatus
cacontology-case:assignmentType
cacontology-case:benchmarkValue
cacontology-case:benchmarkedAgainst
cacontology-case:caseCloseDate
cacontology-case:caseOpenDate
cacontology-case:casePriority
cacontology-case:caseStatus
cacontology-case:caseType
cacontology-case:caseloadCount
cacontology-case:certificationLevel
cacontology-case:classificationLevel
cacontology-case:closedBy
cacontology-case:closureDate
cacontology-case:closureReason
cacontology-case:conductsReview
cacontology-case:creationDate
cacontology-case:currentPhase
cacontology-case:documentStatus
cacontology-case:documentType
cacontology-case:documentedBy
cacontology-case:finalDisposition
cacontology-case:followsStage
cacontology-case:followsWorkflow
cacontology-case:generatesMetrics
cacontology-case:hasAssignment
cacontology-case:hasDocumentation
cacontology-case:hasPhaseTransition
cacontology-case:holdsRole
cacontology-case:investigatorExperience
cacontology-case:jurisdictionLevel
cacontology-case:lastModified
cacontology-case:lastUpdate
cacontology-case:managesCase
cacontology-case:measurementUnit
cacontology-case:measuresPerformance
cacontology-case:metricType
cacontology-case:metricValue
cacontology-case:participatesInManagement
cacontology-case:precedesStage
cacontology-case:recommendationsCount
cacontology-case:reportingPeriod
cacontology-case:resultsInClosure
cacontology-case:retentionPeriod
cacontology-case:reviewDate
cacontology-case:reviewOutcome
cacontology-case:reviewType
cacontology-case:reviewedBy
cacontology-case:reviewerRole
cacontology-case:reviewsCase
cacontology-case:specialization
cacontology-case:stageDuration
cacontology-case:stageEndDate
cacontology-case:stageOutcome
cacontology-case:stageStartDate
cacontology-case:supervisedBy
cacontology-case:trackedBy
cacontology-case:trackingNumber
cacontology-case:trackingSystem
cacontology-case:undergoesReview
cacontology-case:updateFrequency
cacontology-case:workflowStage
cacontology-case:workloadPercentage
cacontology-coord:agreementScope
cacontology-coord:agreementType
cacontology-coord:assignedBy
cacontology-coord:assignmentDuration
cacontology-coord:assignsLiaison
cacontology-coord:authorizedBy
cacontology-coord:availabilityLevel
cacontology-coord:benchmarkComparison
cacontology-coord:benchmarkedAgainst
cacontology-coord:classificationLevel
cacontology-coord:clearanceLevel
cacontology-coord:communicationAuthority
cacontology-coord:communicationFrequency
cacontology-coord:concernsCase
cacontology-coord:concernsParticipant
cacontology-coord:concernsTemporaryPart
cacontology-coord:concernsTemporaryWhole
cacontology-coord:connectsAgencies
cacontology-coord:coordinationLevel
cacontology-coord:coordinationStatus
cacontology-coord:coordinationType
cacontology-coord:costSharing
cacontology-coord:effectiveDate
cacontology-coord:escalationProcedure
cacontology-coord:evaluatesCoordination
cacontology-coord:expirationDate
cacontology-coord:facilitatesCommunication
cacontology-coord:governsAgreement
cacontology-coord:hasAccuracy
cacontology-coord:hasActionability
cacontology-coord:hasComplexityLevel
cacontology-coord:hasComponent
cacontology-coord:hasCoordinationEffectiveness
cacontology-coord:hasCoordinationIntensity
cacontology-coord:hasDataCompleteness
cacontology-coord:hasDataConsistency
cacontology-coord:hasDataQuality
cacontology-coord:hasIntelligenceValue
cacontology-coord:hasLiaisonEffectiveness
cacontology-coord:hasReliability
cacontology-coord:hasResponsiveness
cacontology-coord:hasSecurityLevel
cacontology-coord:hasSharingEfficiency
cacontology-coord:hasSubInvestigation
cacontology-coord:hasSuccessRate
cacontology-coord:hasTimeliness
cacontology-coord:hasTrustLevel
cacontology-coord:hasUnificationLevel
cacontology-coord:hasValidationLevel
cacontology-coord:informationAccuracy
cacontology-coord:intelligenceType
cacontology-coord:investigationScope
cacontology-coord:involvesAgency
cacontology-coord:involvesPersonnel
cacontology-coord:isComponentOf
cacontology-coord:isSubInvestigationOf
cacontology-coord:leadAgency
cacontology-coord:liaisonRole
cacontology-coord:liaisonWith
cacontology-coord:measurementPeriod
cacontology-coord:measuresPerformance
cacontology-coord:metricType
cacontology-coord:metricValue
cacontology-coord:participatesIn
cacontology-coord:participatesInSharing
cacontology-coord:participatingAgencies
cacontology-coord:personnelCount
cacontology-coord:protocolType
cacontology-coord:providesResource
cacontology-coord:receivesResource
cacontology-coord:reciprocity
cacontology-coord:reimbursement
cacontology-coord:renewalClause
cacontology-coord:representsAgency
cacontology-coord:resourcePooling
cacontology-coord:resourceType
cacontology-coord:responseTimeRequirement
cacontology-coord:securityClearance
cacontology-coord:sharedCommand
cacontology-coord:sharesFromAgency
cacontology-coord:sharesInformation
cacontology-coord:sharesResources
cacontology-coord:sharesWithAgency
cacontology-coord:sharingAgreement
cacontology-coord:sharingDuration
cacontology-coord:sharingMechanism
cacontology-coord:sharingType
cacontology-coord:signedByAgency
cacontology-coord:sourceReliability
cacontology-coord:specialization
cacontology-coord:standsInQualifiedParthood
cacontology-coord:standsInQualifiedParticipation
cacontology-coord:terminationClause
cacontology-coord:unifiedReporting
cacontology-coord:usesProtocol
cacontology-corruption:abusesAccess
cacontology-corruption:accessLevel
cacontology-corruption:authorityLevel
cacontology-corruption:badgeVisible
cacontology-corruption:concernsCorruptOfficer
cacontology-corruption:corruptionDuration
cacontology-corruption:corruptsEvidence
cacontology-corruption:departmentAffiliation
cacontology-corruption:detectedBy
cacontology-corruption:displaysAuthority
cacontology-corruption:employmentStatus
cacontology-corruption:employsOfficer
cacontology-corruption:exploitsPosition
cacontology-corruption:hasAuthorityAbuseDegree
cacontology-corruption:hasAuthorityEnhancementLevel
cacontology-corruption:hasCorruptionDependency
cacontology-corruption:hasCorruptionImpact
cacontology-corruption:hasCorruptionSeverity
cacontology-corruption:hasDataCompleteness
cacontology-corruption:hasDataQuality
cacontology-corruption:hasDetectionDifficulty
cacontology-corruption:hasEvidenceIntegrity
cacontology-corruption:hasIntimidationFactor
cacontology-corruption:hasInvestigationComplexity
cacontology-corruption:hasPositionExploitationLevel
cacontology-corruption:hasSymbolVisibility
cacontology-corruption:hasTrustBetrayalLevel
cacontology-corruption:hasValidationLevel
cacontology-corruption:hasVictimVulnerability
cacontology-corruption:investigatedBy
cacontology-corruption:isDetectedBy
cacontology-corruption:leaksInformation
cacontology-corruption:participatesIn
cacontology-corruption:reportedBy
cacontology-corruption:standsInQualifiedCorruption
cacontology-corruption:uniformDisplayed
cacontology-corruption:uniformType
cacontology-corruption:victimCount
cacontology-corruption:wearsUniform
cacontology-corruption:yearsOfService
cacontology-custodial:accessLevel
cacontology-custodial:aggravatingFactor
cacontology-custodial:authorityLevel
cacontology-custodial:authorityScope
cacontology-custodial:authorizationLevel
cacontology-custodial:breachDuration
cacontology-custodial:checkScope
cacontology-custodial:checkStatus
cacontology-custodial:consentScope
cacontology-custodial:consentStatus
cacontology-custodial:createsCustodialSituation
cacontology-custodial:custodyDuration
cacontology-custodial:custodySchedule
cacontology-custodial:custodyType
cacontology-custodial:hasAuthority
cacontology-custodial:hasCustodyBeginPoint
cacontology-custodial:hasCustodyEndPoint
cacontology-custodial:hasCustodyPhase
cacontology-custodial:hasRoleBeginPoint
cacontology-custodial:hasRoleEndPoint
cacontology-custodial:hasViolationBeginPoint
cacontology-custodial:hasViolationEndPoint
cacontology-custodial:holdsPositionOf
cacontology-custodial:inCustodyPhase
cacontology-custodial:involvesChild
cacontology-custodial:involvesCustodian
cacontology-custodial:involvesParent
cacontology-custodial:occursInCustodialSituation
cacontology-custodial:perpetratedBy
cacontology-custodial:relationshipDuration
cacontology-custodial:relationshipFrequency
cacontology-custodial:relationshipIntimacy
cacontology-custodial:relationshipType
cacontology-custodial:relevantToInvestigation
cacontology-custodial:subjectTo
cacontology-custodial:supervisionLevel
cacontology-custodial:trustLevel
cacontology-custodial:violatesPosition
cacontology-custodial:violatesRelationship
cacontology-custodial:violationPattern
cacontology-custodial:violationSeverity
cacontology-custodial:violationType
cacontology-custodial:vulnerabilityFactor
cacontology-detection:ageEstimate
cacontology-detection:confidenceScore
cacontology-detection:copineClassification
cacontology-detection:detectedContent
cacontology-detection:detectionDuration
cacontology-detection:detectionThreshold
cacontology-detection:falsePositiveReason
cacontology-detection:generatedHash
cacontology-detection:hasDetectionBeginPoint
cacontology-detection:hasDetectionEndPoint
cacontology-detection:hasPhaseBeginPoint
cacontology-detection:hasPhaseEndPoint
cacontology-detection:hasRoleBeginPoint
cacontology-detection:hasRoleEndPoint
cacontology-detection:hashAlgorithm
cacontology-detection:matchType
cacontology-detection:matchedDatabase
cacontology-detection:modelVersion
cacontology-detection:perceptualHashValue
cacontology-detection:phaseDuration
cacontology-detection:photoDNAValue
cacontology-detection:reviewDecision
cacontology-detection:reviewedBy
cacontology-detection:roleDuration
cacontology-detection:sarClassification
cacontology-detection:similarityScore
cacontology-detection:tannerStage
cacontology-educational1:academicActivity
cacontology-educational1:accessLevel
cacontology-educational1:activatesMandatoryReporting
cacontology-educational1:actualAge
cacontology-educational1:addressesVulnerability
cacontology-educational1:assignmentType
cacontology-educational1:attendsInstitution
cacontology-educational1:bailAmount
cacontology-educational1:bodyPartTouched
cacontology-educational1:bondAmount
cacontology-educational1:chargeCount
cacontology-educational1:chargeDegree
cacontology-educational1:chargesDefendant
cacontology-educational1:classroomNumber
cacontology-educational1:collectsEvidence
cacontology-educational1:communicatesVia
cacontology-educational1:contactDuration
cacontology-educational1:contactFrequency
cacontology-educational1:contactType
cacontology-educational1:coordinatesWith
cacontology-educational1:corroboratesAccount
cacontology-educational1:deceivesVictim
cacontology-educational1:deceptionDuration
cacontology-educational1:degradationLevel
cacontology-educational1:degradesVictim
cacontology-educational1:disclosesTo
cacontology-educational1:disclosureMethod
cacontology-educational1:documentsExploitation
cacontology-educational1:documentsHarassment
cacontology-educational1:duringActivity
cacontology-educational1:educatorAge
cacontology-educational1:employedAt
cacontology-educational1:employmentDuration
cacontology-educational1:enhancedBy
cacontology-educational1:escalatesTo
cacontology-educational1:evidenceLocation
cacontology-educational1:evidenceType
cacontology-educational1:exploitationDuration
cacontology-educational1:exploitationLocation
cacontology-educational1:exploitationMethod
cacontology-educational1:exploitsIsolation
cacontology-educational1:exploitsPosition
cacontology-educational1:exploitsVulnerability
cacontology-educational1:fakeAccountCount
cacontology-educational1:followedBySupervision
cacontology-educational1:forceLevel
cacontology-educational1:forciblyTouches
cacontology-educational1:gradeLevel
cacontology-educational1:gradeRange
cacontology-educational1:harassmentContent
cacontology-educational1:harassmentFrequency
cacontology-educational1:harassmentMedium
cacontology-educational1:hasVulnerability
cacontology-educational1:identifiesVulnerability
cacontology-educational1:impersonatedAge
cacontology-educational1:impersonatesAge
cacontology-educational1:implementsSafeguarding
cacontology-educational1:institutionCount
cacontology-educational1:institutionLocation
cacontology-educational1:institutionReputation
cacontology-educational1:institutionType
cacontology-educational1:interviewsVictim
cacontology-educational1:intimidatesStudent
cacontology-educational1:investigatesExploitation
cacontology-educational1:involvesPhysicalContact
cacontology-educational1:involvesWrittenHarassment
cacontology-educational1:isolationLevel
cacontology-educational1:leveragesAcademicPower
cacontology-educational1:linkedToLocation
cacontology-educational1:maintainsMultipleAccounts
cacontology-educational1:mandatoryReportingTriggered
cacontology-educational1:maximumSentence
cacontology-educational1:notifiesPrincipal
cacontology-educational1:occursInContext
cacontology-educational1:platformUsed
cacontology-educational1:policeResponseTime
cacontology-educational1:providedBy
cacontology-educational1:providesEvidence
cacontology-educational1:receivesReport
cacontology-educational1:reportingDelay
cacontology-educational1:reportingStaffRole
cacontology-educational1:reportsTo
cacontology-educational1:requiresRegistration
cacontology-educational1:resultsinCharge
cacontology-educational1:schoolAddress
cacontology-educational1:selectsVictim
cacontology-educational1:sendsContent
cacontology-educational1:sentenceLength
cacontology-educational1:solicitsFrom
cacontology-educational1:studentPopulation
cacontology-educational1:studentsPresent
cacontology-educational1:subjectTaught
cacontology-educational1:supervisionDuration
cacontology-educational1:takesPlaceIn
cacontology-educational1:targetAgeRange
cacontology-educational1:targetGender
cacontology-educational1:targetingMethod
cacontology-educational1:targetsAgeGroup
cacontology-educational1:targetsStudent
cacontology-educational1:targetsVictim
cacontology-educational1:timeOfDay
cacontology-educational1:touchesVictim
cacontology-educational1:triggersPoliceNotification
cacontology-educational1:usesImpersonation
cacontology-educational1:usesMethod
cacontology-educational1:victimCount
cacontology-educational1:vulnerabilityFactor
cacontology-educational1:witnessesExploitation
cacontology-educational1:writtenContent
cacontology-educational1:writtenOn
cacontology-educational1:yearsOfExperience
cacontology-enterprises:accessLevel
cacontology-enterprises:advancementCriteria
cacontology-enterprises:altAccountCount
cacontology-enterprises:buildsVictimTrust
cacontology-enterprises:channelCount
cacontology-enterprises:coercesIntoSelfHarm
cacontology-enterprises:coercionEffectiveness
cacontology-enterprises:coercionSeverity
cacontology-enterprises:compilationComplexity
cacontology-enterprises:compilesContent
cacontology-enterprises:containsVictimContent
cacontology-enterprises:contentNotoriety
cacontology-enterprises:contentValue
cacontology-enterprises:contentVolumeItems
cacontology-enterprises:coordinatesAcrossPlatforms
cacontology-enterprises:coordinatesActivities
cacontology-enterprises:correlatesEvidence
cacontology-enterprises:createsVictimizationSituation
cacontology-enterprises:degradationLevel
cacontology-enterprises:editingQuality
cacontology-enterprises:encryptionLevel
cacontology-enterprises:evidenceQuality
cacontology-enterprises:exploitsVictim
cacontology-enterprises:hasCoercionEventBeginDate
cacontology-enterprises:hasEncryptionCapability
cacontology-enterprises:hasExploitationRelation
cacontology-enterprises:hasFormationEvent
cacontology-enterprises:hasHierarchy
cacontology-enterprises:hasInnerCore
cacontology-enterprises:hasInvestigationBeginDate
cacontology-enterprises:hasLeadershipRelation
cacontology-enterprises:hasMember
cacontology-enterprises:hasNetworkCell
cacontology-enterprises:hasNetworkComponent
cacontology-enterprises:hasNetworkNotorietyQuality
cacontology-enterprises:hasOperationalBeginDate
cacontology-enterprises:hasOperationalEndDate
cacontology-enterprises:hasOperationalPeriod
cacontology-enterprises:hasRecruitmentMode
cacontology-enterprises:hierarchyComplexity
cacontology-enterprises:historicallyDependsOn
cacontology-enterprises:holdsLeadershipRole
cacontology-enterprises:identifiesNetworkMember
cacontology-enterprises:identityCorrelationAccuracy
cacontology-enterprises:ideologicalFramework
cacontology-enterprises:infiltratesNetwork
cacontology-enterprises:infiltrationDuration
cacontology-enterprises:innerCoreSize
cacontology-enterprises:leadershipCount
cacontology-enterprises:maintainsAltAccounts
cacontology-enterprises:managesPrivateGroups
cacontology-enterprises:mapsNetworkStructure
cacontology-enterprises:membershipLevel
cacontology-enterprises:membershipRequirements
cacontology-enterprises:networkMappingCompleteness
cacontology-enterprises:networkNotoriety
cacontology-enterprises:networkSize
cacontology-enterprises:operatesEnterprise
cacontology-enterprises:operatesInSituation
cacontology-enterprises:operationalScope
cacontology-enterprises:participatesInCoercion
cacontology-enterprises:participatesInInnerCore
cacontology-enterprises:participatesInRecruitment
cacontology-enterprises:platformCount
cacontology-enterprises:producesLorebook
cacontology-enterprises:recruitsMembers
cacontology-enterprises:selfHarmType
cacontology-enterprises:socialEngineeringComplexity
cacontology-enterprises:targetingPrecision
cacontology-enterprises:targetsVulnerability
cacontology-enterprises:trustBuildingDuration
cacontology-enterprises:usesAsCurrency
cacontology-enterprises:utilizesEncryptedChannels
cacontology-enterprises:vulnerabilityType
cacontology-forensics:acquisitionMethod
cacontology-forensics:analysesUserBehavior
cacontology-forensics:analyzesCommunicationPatterns
cacontology-forensics:analyzesNetworkTraffic
cacontology-forensics:analyzesTemporalPatterns
cacontology-forensics:arrestsResulting
cacontology-forensics:automationPercentage
cacontology-forensics:behaviorPatternsIdentified
cacontology-forensics:behavioralFingerprintsCreated
cacontology-forensics:caseExhibitNumber
cacontology-forensics:communicationGraphComplexity
cacontology-forensics:coordinatesInternationalProcessing
cacontology-forensics:correlatesAcrossPlatforms
cacontology-forensics:correlatesContent
cacontology-forensics:correlationLatency
cacontology-forensics:correlationStrength
cacontology-forensics:createsBehavioralFingerprints
cacontology-forensics:crossBorderDataSharing
cacontology-forensics:crossPlatformMatches
cacontology-forensics:custodyReason
cacontology-forensics:custodyTransferredFrom
cacontology-forensics:custodyTransferredTo
cacontology-forensics:dataTransferVolume
cacontology-forensics:databasesIntegrated
cacontology-forensics:detectionAccuracy
cacontology-forensics:detectionMethod
cacontology-forensics:devicesRecovered
cacontology-forensics:discoversNetworks
cacontology-forensics:distributesProcessing
cacontology-forensics:enablesRealTimeCorrelation
cacontology-forensics:evidenceLocation
cacontology-forensics:evidenceSeized
cacontology-forensics:evidenceVolumeTerabytes
cacontology-forensics:falsePositiveRate
cacontology-forensics:featureVectorsUsed
cacontology-forensics:filesProcessedMillions
cacontology-forensics:fingerprintAccuracy
cacontology-forensics:forensicCopy
cacontology-forensics:forensicLabsInvolved
cacontology-forensics:forensicPhaseDuration
cacontology-forensics:forensicReport
cacontology-forensics:generatesRealTimeAlerts
cacontology-forensics:generatesTriageResults
cacontology-forensics:geographicDistribution
cacontology-forensics:geographicRadius
cacontology-forensics:geospatialAccuracy
cacontology-forensics:hasForensicPhaseBeginPoint
cacontology-forensics:hasForensicPhaseEndPoint
cacontology-forensics:hasRoleBeginPoint
cacontology-forensics:hasRoleEndPoint
cacontology-forensics:hashDatabaseSize
cacontology-forensics:hashMatchesFound
cacontology-forensics:identifiesCrossPlatformActivity
cacontology-forensics:identifiesGeographicClusters
cacontology-forensics:identifiesNetworkAnomalies
cacontology-forensics:identifiesPatterns
cacontology-forensics:identifiesTemporalClusters
cacontology-forensics:integratesIntelligenceDatabases
cacontology-forensics:intelligenceHits
cacontology-forensics:investigationDuration
cacontology-forensics:involvesForensicLab
cacontology-forensics:k9AssistanceProvided
cacontology-forensics:locationPointsAnalyzed
cacontology-forensics:mlModelAccuracy
cacontology-forensics:networkConnectionsFound
cacontology-forensics:networkSessionsAnalyzed
cacontology-forensics:parallelProcessingEnabled
cacontology-forensics:performsGeospatialAnalysis
cacontology-forensics:performsHashAnalysis
cacontology-forensics:platformCorrelationScore
cacontology-forensics:platformsAnalyzed
cacontology-forensics:priorityClassification
cacontology-forensics:processesEvidence
cacontology-forensics:processingNodes
cacontology-forensics:processingSpeed
cacontology-forensics:processingTimeframeDays
cacontology-forensics:producesIntelligence
cacontology-forensics:queriesIntelligenceDatabase
cacontology-forensics:queryResponseTime
cacontology-forensics:realTimeAlerts
cacontology-forensics:recoveryMethod
cacontology-forensics:referralsReceived
cacontology-forensics:riskLevelsAssigned
cacontology-forensics:searchWarrantAssisted
cacontology-forensics:sharesProcessingLoad
cacontology-forensics:sourceHash
cacontology-forensics:standardizedProcessing
cacontology-forensics:streamingDataRate
cacontology-forensics:suspiciousConnectionsIdentified
cacontology-forensics:temporalPatternsIdentified
cacontology-forensics:temporalResolution
cacontology-forensics:timeRangeAnalyzed
cacontology-forensics:timelineEvent
cacontology-forensics:trainingDataSize
cacontology-forensics:trainsCorrelationModel
cacontology-forensics:triageAccuracy
cacontology-forensics:triagesEvidence
cacontology-forensics:userAccountsAnalyzed
cacontology-forensics:utilisesSystem
cacontology-forensics:utilizesMachineLearning
cacontology-forensics:verificationHash
cacontology-forensics:victimAgeRange
cacontology-forensics:victimGeographicOrigin
cacontology-forensics:victimsIdentifiedCount
cacontology-forensics:writeBlockingUsed
cacontology-grooming:acceleratesTrust
cacontology-grooming:accountsUsed
cacontology-grooming:administrationMethod
cacontology-grooming:anonymousContactMethod
cacontology-grooming:behaviorDuration
cacontology-grooming:bypassesPhase
cacontology-grooming:commercialOfferType
cacontology-grooming:communicationFrequency
cacontology-grooming:contactFrequency
cacontology-grooming:contentType
cacontology-grooming:crossesStateBoundaries
cacontology-grooming:distressIndicators
cacontology-grooming:economicIncentiveAmount
cacontology-grooming:emotionalTone
cacontology-grooming:escalationRate
cacontology-grooming:escalationTimeframe
cacontology-grooming:evidenceValue
cacontology-grooming:exchangesContent
cacontology-grooming:exhibitsPattern
cacontology-grooming:explicitnessLevel
cacontology-grooming:exploitsOpportunity
cacontology-grooming:exploitsReputation
cacontology-grooming:facilitatesWithSubstance
cacontology-grooming:gameContext
cacontology-grooming:groomingPhaseDuration
cacontology-grooming:groomingStage
cacontology-grooming:hasGroomingPhaseBeginPoint
cacontology-grooming:hasGroomingPhaseEndPoint
cacontology-grooming:hasRoleBeginPoint
cacontology-grooming:hasRoleEndPoint
cacontology-grooming:hasVulnerability
cacontology-grooming:identityVerificationRequired
cacontology-grooming:impairmentLevel
cacontology-grooming:impersonatedRole
cacontology-grooming:impersonatesRole
cacontology-grooming:initialContactPretense
cacontology-grooming:initiationMethod
cacontology-grooming:institutionPrestige
cacontology-grooming:institutionsTargeted
cacontology-grooming:involvesInterstateTransport
cacontology-grooming:isolationMethod
cacontology-grooming:leveragesPosition
cacontology-grooming:manipulationTechnique
cacontology-grooming:meetingLocationSpecified
cacontology-grooming:monetizationTimeframe
cacontology-grooming:occursInSpace
cacontology-grooming:opportunityType
cacontology-grooming:participantCount
cacontology-grooming:patternConfidence
cacontology-grooming:physicalLocation
cacontology-grooming:platformAnonymityLevel
cacontology-grooming:primaryPlatform
cacontology-grooming:progressesToPhysicalMeeting
cacontology-grooming:progressionDuration
cacontology-grooming:propositionExplicitness
cacontology-grooming:prosecutionRelevance
cacontology-grooming:recruitmentDirectness
cacontology-grooming:requestsSecrecy
cacontology-grooming:rolePlayingTactic
cacontology-grooming:ruleStructureDescription
cacontology-grooming:sameDayProgression
cacontology-grooming:seekingHelp
cacontology-grooming:skippedPhases
cacontology-grooming:substanceType
cacontology-grooming:targetsInstitution
cacontology-grooming:targetsVictim
cacontology-grooming:timeOfContact
cacontology-grooming:transitionSpeed
cacontology-grooming:transitionsToLocation
cacontology-grooming:transportationProposed
cacontology-grooming:trustExploitationSpeed
cacontology-grooming:usesGifts
cacontology-grooming:usesThreats
cacontology-grooming:utilizesPlatformFeature
cacontology-grooming:victimCompliance
cacontology-grooming:victimImpact
cacontology-grooming:vulnerabilityType
cacontology-gufo:academicYearBeginTimePoint
cacontology-gufo:aiGenerationTimePoint
cacontology-gufo:analysisCompletionTimePoint
cacontology-gufo:assignmentBeginTime
cacontology-gufo:assignmentEndTime
cacontology-gufo:closureBeginTime
cacontology-gufo:closureTime
cacontology-gufo:coercionBeginTime
cacontology-gufo:coercionEndTime
cacontology-gufo:coordinationBeginTime
cacontology-gufo:detectionTimePoint
cacontology-gufo:discoveryBeginTime
cacontology-gufo:dispositionBeginTime
cacontology-gufo:employmentTerminationTimePoint
cacontology-gufo:escalationBeginTime
cacontology-gufo:escalationPeakTime
cacontology-gufo:evidenceCollectionTime
cacontology-gufo:exploitationBeginTime
cacontology-gufo:exploitationDuration
cacontology-gufo:exploitationEndTime
cacontology-gufo:exploitationFirstIncidentTimePoint
cacontology-gufo:forfeitureBeginTime
cacontology-gufo:forfeitureCompletionTime
cacontology-gufo:forfeitureEndTime
cacontology-gufo:generationDuration
cacontology-gufo:institutionalReportingTimePoint
cacontology-gufo:intakeBeginTime
cacontology-gufo:investigationBeginTime
cacontology-gufo:penaltyImpositionTime
cacontology-gufo:phaseTransitionTime
cacontology-gufo:practiceSessionBeginTime
cacontology-gufo:practiceSessionEndTime
cacontology-gufo:prosecutionBeginTime
cacontology-gufo:reportingTime
cacontology-gufo:restraintBeginTime
cacontology-gufo:reviewBeginTime
cacontology-gufo:reviewEndTime
cacontology-gufo:seizureTime
cacontology-gufo:sentencingTime
cacontology-gufo:triageCompletionTime
cacontology-gufo:trialBeginTime
cacontology-gufo:workflowBeginTime
cacontology-gufo:workflowEndTime
cacontology-impact:addressesHarm
cacontology-impact:admissionReason
cacontology-impact:agencyCount
cacontology-impact:assessesVictim
cacontology-impact:assessmentDate
cacontology-impact:assessmentType
cacontology-impact:coordinatedBy
cacontology-impact:coordinationComplexity
cacontology-impact:dischargeCondition
cacontology-impact:dischargeDate
cacontology-impact:documentedBy
cacontology-impact:duration
cacontology-impact:emergencyCallLocation
cacontology-impact:extractionComplexity
cacontology-impact:facilitatedBy
cacontology-impact:facilitatedByFactor
cacontology-impact:facilitatesReintegration
cacontology-impact:familyContactEstablished
cacontology-impact:followedByDischarge
cacontology-impact:frequency
cacontology-impact:functioningLevel
cacontology-impact:hasImpactPhaseBeginPoint
cacontology-impact:hasImpactPhaseEndPoint
cacontology-impact:hasRoleBeginPoint
cacontology-impact:hasRoleEndPoint
cacontology-impact:hometownLocation
cacontology-impact:hospitalName
cacontology-impact:hospitalStayDuration
cacontology-impact:identifiesHarm
cacontology-impact:impactArea
cacontology-impact:impactPhaseDuration
cacontology-impact:impactSeverity
cacontology-impact:impededBy
cacontology-impact:impededByBarrier
cacontology-impact:includesTransportation
cacontology-impact:indicatorType
cacontology-impact:informsRestitution
cacontology-impact:informsSafetyPlanning
cacontology-impact:intensity
cacontology-impact:interventionType
cacontology-impact:jurisdictionsInvolved
cacontology-impact:lifeAreaAffected
cacontology-impact:manifestsAs
cacontology-impact:milestoneDate
cacontology-impact:milestoneDescription
cacontology-impact:necessitatesAssessment
cacontology-impact:ongoingDangerLevel
cacontology-impact:onsetDate
cacontology-impact:partOfRecovery
cacontology-impact:participatesInResponse
cacontology-impact:prognosis
cacontology-impact:progressionPattern
cacontology-impact:providedBy
cacontology-impact:providesSpecializedSupport
cacontology-impact:receivedTreatment
cacontology-impact:recoveryStage
cacontology-impact:recoveryTimeframe
cacontology-impact:reintegrationDuration
cacontology-impact:relevantToSentencing
cacontology-impact:reportedSituation
cacontology-impact:responseTime
cacontology-impact:resultedFrom
cacontology-impact:resultsinExtraction
cacontology-impact:resultsinHospitalization
cacontology-impact:returnsTo
cacontology-impact:reunitesWith
cacontology-impact:safetyPlanType
cacontology-impact:serviceDuration
cacontology-impact:serviceProvider
cacontology-impact:serviceType
cacontology-impact:sessionCount
cacontology-impact:severity
cacontology-impact:severityLevel
cacontology-impact:transportationCost
cacontology-impact:transportationDestination
cacontology-impact:transportationType
cacontology-impact:traumaType
cacontology-impact:treatedAt
cacontology-impact:treatmentDuration
cacontology-impact:treatmentModality
cacontology-impact:treatmentOutcome
cacontology-impact:triggersResponse
cacontology-infrastructure:accountsFrozen
cacontology-infrastructure:analysesAccess
cacontology-infrastructure:analysesInfrastructure
cacontology-infrastructure:anonymityLevel
cacontology-infrastructure:bandwidthCapacity
cacontology-infrastructure:cloudPlatform
cacontology-infrastructure:containsComponent
cacontology-infrastructure:cryptoCurrencyTypes
cacontology-infrastructure:dataVolumeMirrored
cacontology-infrastructure:distributedAcross
cacontology-infrastructure:domainCount
cacontology-infrastructure:domainsSinkholed
cacontology-infrastructure:encryptionStrength
cacontology-infrastructure:financialComplexity
cacontology-infrastructure:freezesAccounts
cacontology-infrastructure:geographicLocations
cacontology-infrastructure:hasAnalysisAccuracy
cacontology-infrastructure:hasAnalysisBeginPoint
cacontology-infrastructure:hasAnalysisDepth
cacontology-infrastructure:hasAnalysisEndPoint
cacontology-infrastructure:hasAnalysisTimeliness
cacontology-infrastructure:hasAnonymityEffectiveness
cacontology-infrastructure:hasFinancialComplexity
cacontology-infrastructure:hasFinancialTraceability
cacontology-infrastructure:hasInfrastructureBeginPoint
cacontology-infrastructure:hasInfrastructureEndPoint
cacontology-infrastructure:hasInfrastructurePerformance
cacontology-infrastructure:hasInfrastructureReliability
cacontology-infrastructure:hasInfrastructureScalability
cacontology-infrastructure:hasInfrastructureVulnerability
cacontology-infrastructure:hasObfuscationComplexity
cacontology-infrastructure:hasPhaseBeginPoint
cacontology-infrastructure:hasPhaseEndPoint
cacontology-infrastructure:hasRoleBeginPoint
cacontology-infrastructure:hasRoleEndPoint
cacontology-infrastructure:hasSecurityStrength
cacontology-infrastructure:hasTakedownBeginPoint
cacontology-infrastructure:hasTakedownCompleteness
cacontology-infrastructure:hasTakedownEffectiveness
cacontology-infrastructure:hasTakedownEndPoint
cacontology-infrastructure:hasTakedownSpeed
cacontology-infrastructure:hostedBy
cacontology-infrastructure:hostingProvider
cacontology-infrastructure:leadsToCriminalCharges
cacontology-infrastructure:monthlyRevenue
cacontology-infrastructure:networkComplexity
cacontology-infrastructure:obfuscationMethods
cacontology-infrastructure:paymentMethods
cacontology-infrastructure:protectedBy
cacontology-infrastructure:providesEvidence
cacontology-infrastructure:resultsinSeizure
cacontology-infrastructure:revealsTopology
cacontology-infrastructure:seizesServers
cacontology-infrastructure:serverCount
cacontology-infrastructure:serversSeized
cacontology-infrastructure:sinkholeDomains
cacontology-infrastructure:storageCapacity
cacontology-infrastructure:subscriptionTiers
cacontology-infrastructure:takedownDuration
cacontology-infrastructure:targetsInfrastructure
cacontology-infrastructure:tracesPayments
cacontology-infrastructure:userGeographicSpread
cacontology-infrastructure:usesPaymentSystem
cacontology-institutional:abuseEndYear
cacontology-institutional:abuseStartYear
cacontology-institutional:authorityLevel
cacontology-institutional:chargeCount
cacontology-institutional:childrenServed
cacontology-institutional:concealsFrom
cacontology-institutional:concealsTravel
cacontology-institutional:documentsPattern
cacontology-institutional:donorCount
cacontology-institutional:enablesExploitation
cacontology-institutional:exercisesAuthorityOver
cacontology-institutional:existentiallyDependsOn
cacontology-institutional:experiencesExploitation
cacontology-institutional:exploitationTypeCount
cacontology-institutional:exploitsRole
cacontology-institutional:exploitsVulnerability
cacontology-institutional:facilitatedBy
cacontology-institutional:foreignResidenceDuration
cacontology-institutional:foundedBy
cacontology-institutional:foundingYear
cacontology-institutional:fundingAmount
cacontology-institutional:genericallyDependsOn
cacontology-institutional:hasAuthorityLevel
cacontology-institutional:hasExploitationEndDate
cacontology-institutional:hasExploitationSeverityLevel
cacontology-institutional:hasExploitationStartDate
cacontology-institutional:hasInstitutionFoundingDate
cacontology-institutional:hasInstitutionalReputationLevel
cacontology-institutional:hasIsolationDegree
cacontology-institutional:hasOperationEndDate
cacontology-institutional:hasOversightLevel
cacontology-institutional:hasRoleEndDate
cacontology-institutional:hasRoleStartDate
cacontology-institutional:hasSystematicityDegree
cacontology-institutional:hasTravelDate
cacontology-institutional:hasTrustLevel
cacontology-institutional:hasVulnerabilityLevel
cacontology-institutional:historicallyDependsOn
cacontology-institutional:holdsRole
cacontology-institutional:impactsVictim
cacontology-institutional:investigatedBy
cacontology-institutional:isComponentOfExploitation
cacontology-institutional:isPartOfInstitution
cacontology-institutional:isPartOfInvestigation
cacontology-institutional:isolationDegree
cacontology-institutional:maintainedBy
cacontology-institutional:manipulates
cacontology-institutional:manipulationTactics
cacontology-institutional:occursInContext
cacontology-institutional:occursWithin
cacontology-institutional:operatesInCountry
cacontology-institutional:operatesInJurisdictionalContext
cacontology-institutional:operationDurationYears
cacontology-institutional:participatesInInstitution
cacontology-institutional:perpetratesExploitation
cacontology-institutional:prosecutedInContext
cacontology-institutional:prosecutedUnder
cacontology-institutional:prosecutionJurisdiction
cacontology-institutional:providesTestimony
cacontology-institutional:receivesSupport
cacontology-institutional:resultsInSentence
cacontology-institutional:revealsPattern
cacontology-institutional:sentenceLength
cacontology-institutional:servesPopulation
cacontology-institutional:targetsPopulation
cacontology-institutional:travelFrequency
cacontology-institutional:travelPatternYears
cacontology-institutional:travelPurposeClaimed
cacontology-institutional:travelsFrom
cacontology-institutional:travelsTo
cacontology-institutional:trustLevelExploited
cacontology-institutional:undertakesTravelFor
cacontology-institutional:victimCount
cacontology-institutional:victimTestimoniesCount
cacontology-institutional:vulnerabilityType
cacontology-institutional:yearsFromVictimizationToTestimony
cacontology-international:alertResponseTime
cacontology-international:alertingPartner
cacontology-international:analysesUsers
cacontology-international:automatedMatchAccuracy
cacontology-international:channelsMonitored
cacontology-international:communicationLatency
cacontology-international:contributesToFusion
cacontology-international:cooperationResponseTime
cacontology-international:coordinatedByEuropol
cacontology-international:coordinatesGlobalTakedown
cacontology-international:coordinatesHotlines
cacontology-international:coordinatesInternationalEffort
cacontology-international:coordinatesProsecution
cacontology-international:coordinatesResources
cacontology-international:coordinatesWith
cacontology-international:coordinatingAgency
cacontology-international:coordinationComplexity
cacontology-international:coordinationComplexityLevel
cacontology-international:coordinationMethod
cacontology-international:crossBorderCapability
cacontology-international:crossReferencesFound
cacontology-international:dataLakeSize
cacontology-international:databasesIntegrated
cacontology-international:deploysTeam
cacontology-international:disruptionEffectiveness
cacontology-international:disruptsInternationalNetwork
cacontology-international:emergencyResponseTime
cacontology-international:enablesAutomatedMatching
cacontology-international:enablesRealTimeSharing
cacontology-international:encryptionLevel
cacontology-international:europeanMemberStatesInvolved
cacontology-international:evidenceSharingVolume
cacontology-international:evidenceVolumeInternational
cacontology-international:executesQuery
cacontology-international:feedsDataLake
cacontology-international:forensicTeamsDeployed
cacontology-international:fusionAccuracy
cacontology-international:generatesThreatAssessment
cacontology-international:globalCoverage
cacontology-international:informationSharingLevel
cacontology-international:integratesToNetwork
cacontology-international:intelligenceChannels
cacontology-international:intelligenceSources
cacontology-international:internationalPartnersInvolved
cacontology-international:investigativeTeamSize
cacontology-international:involvesCountries
cacontology-international:jurisdictionCount
cacontology-international:languageSupport
cacontology-international:managedBy
cacontology-international:multilateralAgreement
cacontology-international:operatesInCountry
cacontology-international:operationContext
cacontology-international:operationDurationMonths
cacontology-international:participatesIn
cacontology-international:partnerCountryCount
cacontology-international:performsCrossReference
cacontology-international:processesDistributed
cacontology-international:processesEvidence
cacontology-international:processingNodeCount
cacontology-international:prosecutionsCrossCountry
cacontology-international:providesExpertise
cacontology-international:queryPerformanceMs
cacontology-international:receivesIntelligenceFeed
cacontology-international:referredTo
cacontology-international:requiresAssistance
cacontology-international:resourcesCoordinated
cacontology-international:responseTimeInternational
cacontology-international:resultsInSeizure
cacontology-international:sharesDataWith
cacontology-international:sharesEvidenceInternationally
cacontology-international:sharesIntelligence
cacontology-international:simultaneousCountries
cacontology-international:simultaneousOperations
cacontology-international:specializedExpertiseAreas
cacontology-international:supportedBy
cacontology-international:synchronizationAccuracy
cacontology-international:synchronizesOperations
cacontology-international:targetsPlatform
cacontology-international:threatLevelAssessed
cacontology-international:transmitsAlert
cacontology-international:treatyBasis
cacontology-international:treatyMechanism
cacontology-international:triggersAlert
cacontology-international:triggersEmergencyProtocol
cacontology-international:undercoverCoordination
cacontology-international:userCountriesAffected
cacontology-international:usersAnalyzedMillions
cacontology-international:utilizesSecureChannel
cacontology-legal:appliesToCountry
cacontology-legal:assessedBy
cacontology-legal:basedOnModel
cacontology-legal:concernsLegalFramework
cacontology-legal:countriesAnalyzed
cacontology-legal:coveragePercentage
cacontology-legal:effectivenessScore
cacontology-legal:enablesExtradition
cacontology-legal:facilitatesCooperation
cacontology-legal:harmonizationProgress
cacontology-legal:hasAssessmentReliability
cacontology-legal:hasCapacityLevel
cacontology-legal:hasComplianceLevel
cacontology-legal:hasCooperationIntensity
cacontology-legal:hasCoverageCompleteness
cacontology-legal:hasDataQuality
cacontology-legal:hasDevelopmentProgress
cacontology-legal:hasExtraditionEfficiency
cacontology-legal:hasGapSeverity
cacontology-legal:hasHarmonizationDegree
cacontology-legal:hasImplementationQuality
cacontology-legal:hasLegalEffectiveness
cacontology-legal:hasLegalRobustness
cacontology-legal:hasReformUrgency
cacontology-legal:hasStandardCompliance
cacontology-legal:hasTreatyStrength
cacontology-legal:identifiesGap
cacontology-legal:implementationStatus
cacontology-legal:isAssessedBy
cacontology-legal:isComponentOf
cacontology-legal:legalAlignmentLevel
cacontology-legal:legalSystemType
cacontology-legal:legislativeCompliance
cacontology-legal:measuredBy
cacontology-legal:partOfFramework
cacontology-legal:participatesIn
cacontology-legal:policyGapSeverity
cacontology-legal:providesAssistance
cacontology-legal:reformPriority
cacontology-legal:requiresReform
cacontology-legal:standsInQualifiedCompliance
cacontology-multi:agencyCount
cacontology-multi:agencyLevelsMixed
cacontology-multi:agencyParticipantCount
cacontology-multi:agentParticipantCount
cacontology-multi:arrestsNationwide
cacontology-multi:authorizedBy
cacontology-multi:casesSubmittedForProsecution
cacontology-multi:chargeTypesDiversity
cacontology-multi:childrenRescued
cacontology-multi:childrenRescuedCount
cacontology-multi:communicationBarriers
cacontology-multi:communicationProtocol
cacontology-multi:communityOutreachEffectiveness
cacontology-multi:complianceViolationsFound
cacontology-multi:complianceVisitsCount
cacontology-multi:coordinatedBy
cacontology-multi:coordinatesAgencies
cacontology-multi:coordinatesComplianceChecks
cacontology-multi:coordinatesNationwide
cacontology-multi:coordinationCenterLocation
cacontology-multi:coordinationChallenges
cacontology-multi:coordinationComplexity
cacontology-multi:coordinationMechanism
cacontology-multi:coordinationPhaseDuration
cacontology-multi:costSharingArrangement
cacontology-multi:countiesInvolved
cacontology-multi:coversState
cacontology-multi:crossStateCommunication
cacontology-multi:crossesBorders
cacontology-multi:crossingDocumentation
cacontology-multi:deploysAgents
cacontology-multi:destinationState
cacontology-multi:diplomaticChannels
cacontology-multi:disclosureToArrestHours
cacontology-multi:enablesRapidResponse
cacontology-multi:facilitatedByCoordination
cacontology-multi:facilitatesChildRescue
cacontology-multi:fbiFieldOfficesInvolved
cacontology-multi:governedByAgreement
cacontology-multi:grandJuryAcceptances
cacontology-multi:handoffType
cacontology-multi:handsOnArrestsCount
cacontology-multi:hasCoordinationPhaseBeginPoint
cacontology-multi:hasCoordinationPhaseEndPoint
cacontology-multi:hasRoleBeginPoint
cacontology-multi:hasRoleEndPoint
cacontology-multi:hostedBy
cacontology-multi:identifiesVictims
cacontology-multi:informationSharingLevel
cacontology-multi:investigationScope
cacontology-multi:investigationsInitiated
cacontology-multi:involvesAgency
cacontology-multi:involvesFBIFieldOffice
cacontology-multi:involvesStateLineCrossing
cacontology-multi:involvesTraffickingInvestigation
cacontology-multi:jurisdictionCount
cacontology-multi:jurisdictionTriggerType
cacontology-multi:jurisdictionalConflicts
cacontology-multi:languageBarriers
cacontology-multi:leadBy
cacontology-multi:legalComplexity
cacontology-multi:meetingFrequency
cacontology-multi:memberAgencyCount
cacontology-multi:newVictimsIdentified
cacontology-multi:operatesInJurisdiction
cacontology-multi:operationDuration
cacontology-multi:operationDurationDays
cacontology-multi:operationName
cacontology-multi:operationPhase
cacontology-multi:operationSuccessRating
cacontology-multi:originatingState
cacontology-multi:personnelAssigned
cacontology-multi:primaryJurisdiction
cacontology-multi:prosecutionAvoidanceBehavior
cacontology-multi:providesAssistanceTo
cacontology-multi:requestsAssistanceFrom
cacontology-multi:requiresHandoff
cacontology-multi:rescuesChildren
cacontology-multi:resourceType
cacontology-multi:resourceValue
cacontology-multi:searchWarrantsExecuted
cacontology-multi:sharesInformationWith
cacontology-multi:sharesResourcesWith
cacontology-multi:sharingDuration
cacontology-multi:spansCounties
cacontology-multi:specializedUnitsDeployed
cacontology-multi:statesCrossed
cacontology-multi:statesInvolved
cacontology-multi:statewideCoverage
cacontology-multi:successMetrics
cacontology-multi:targetStrategy
cacontology-multi:targetTypeCount
cacontology-multi:targetsOffenderType
cacontology-multi:taskForceDuration
cacontology-multi:taskForceType
cacontology-multi:taskForcesInvolved
cacontology-multi:timeZoneChallenges
cacontology-multi:totalArrests
cacontology-multi:traffickingCasesIdentified
cacontology-multi:transportationIntent
cacontology-multi:transportationMethod
cacontology-multi:treatyBasis
cacontology-multi:triggeredByOutreach
cacontology-multi:triggersJurisdiction
cacontology-multi:uncoversCrossStateEvidence
cacontology-multi:usAttorneyOfficesInvolved
cacontology-multi:usersForProsecutionMillions
cacontology-multi:utilizesCoordination
cacontology-partnerships:contributesToAnalysis
cacontology-partnerships:cooperatesOn
cacontology-partnerships:cooperationDuration
cacontology-partnerships:coordinatedBy
cacontology-partnerships:coordinatedThrough
cacontology-partnerships:enablesSharing
cacontology-partnerships:generatesRequests
cacontology-partnerships:governedBy
cacontology-partnerships:hasCooperationBeginPoint
cacontology-partnerships:hasCooperationEndPoint
cacontology-partnerships:hasPartnershipBeginPoint
cacontology-partnerships:hasPartnershipEndPoint
cacontology-partnerships:hasPhaseBeginPoint
cacontology-partnerships:hasPhaseEndPoint
cacontology-partnerships:hasRole
cacontology-partnerships:hasRoleBeginPoint
cacontology-partnerships:hasRoleEndPoint
cacontology-partnerships:includesPartner
cacontology-partnerships:participatesInDevelopment
cacontology-partnerships:participatesInOperation
cacontology-partnerships:partnershipDuration
cacontology-partnerships:phaseDuration
cacontology-partnerships:providesMonitoring
cacontology-partnerships:respondsToEmergency
cacontology-partnerships:roleDuration
cacontology-partnerships:sharesIntelligence
cacontology-partnerships:solicitsHelp
cacontology-physical:associatedWithSubject
cacontology-physical:chainOfCustody
cacontology-physical:containsItem
cacontology-physical:criminalPurpose
cacontology-physical:deviceBrand
cacontology-physical:deviceModel
cacontology-physical:digitalContentFound
cacontology-physical:encryptionStatus
cacontology-physical:evidenceTag
cacontology-physical:evidenceType
cacontology-physical:evidentiarySignificance
cacontology-physical:forensicAnalysisRequired
cacontology-physical:functionalStatus
cacontology-physical:hasAcquisitionRisk
cacontology-physical:hasAnalysisAccuracy
cacontology-physical:hasAnalysisReliability
cacontology-physical:hasContaminationLevel
cacontology-physical:hasCustodyIntegrity
cacontology-physical:hasDocumentationCompleteness
cacontology-physical:hasEvidenceBeginPoint
cacontology-physical:hasEvidenceEndPoint
cacontology-physical:hasEvidenceIntegrity
cacontology-physical:hasEvidenceReliability
cacontology-physical:hasForensicValue
cacontology-physical:hasMethodValidation
cacontology-physical:hasPhaseBeginPoint
cacontology-physical:hasPhaseEndPoint
cacontology-physical:hasPreservationQuality
cacontology-physical:hasProcurementBeginPoint
cacontology-physical:hasProcurementEndPoint
cacontology-physical:hasProcurementSuspicion
cacontology-physical:hasRoleBeginPoint
cacontology-physical:hasRoleEndPoint
cacontology-physical:hasSearchBeginPoint
cacontology-physical:hasSearchCompleteness
cacontology-physical:hasSearchEfficiency
cacontology-physical:hasSearchEndPoint
cacontology-physical:hasSearchThoroughness
cacontology-physical:hasTraceability
cacontology-physical:hiddenCompartment
cacontology-physical:modificationPurpose
cacontology-physical:paymentMethod
cacontology-physical:physicalCondition
cacontology-physical:procuredBy
cacontology-physical:procurementCost
cacontology-physical:procurementDate
cacontology-physical:procurementMethod
cacontology-physical:procurementSource
cacontology-physical:searchDuration
cacontology-physical:searchScope
cacontology-physical:searchWarrant
cacontology-physical:searchingOfficer
cacontology-physical:seizedDuring
cacontology-physical:seizureDate
cacontology-physical:seizureLocation
cacontology-physical:serialNumber
cacontology-physical:storageCapacity
cacontology-physical:tamperEvidence
cacontology-physical:targetAgeGroup
cacontology-physical:witnessPresent
cacontology-platforms:acceptsLegalProcess
cacontology-platforms:accountStatus
cacontology-platforms:accountUsername
cacontology-platforms:actionDuration
cacontology-platforms:ageVerificationMethod
cacontology-platforms:ageVerificationRequired
cacontology-platforms:allowsAnonymousChat
cacontology-platforms:anonymityLevel
cacontology-platforms:anonymousUserDataRetention
cacontology-platforms:contactInitiationMethod
cacontology-platforms:contentRetentionPeriod
cacontology-platforms:contentType
cacontology-platforms:conversationLogging
cacontology-platforms:coordinatedBy
cacontology-platforms:correlatesWithAccount
cacontology-platforms:correlatesWithDevice
cacontology-platforms:crossPlatformAnonymity
cacontology-platforms:crossPlatformMatch
cacontology-platforms:csaiDetectionEnabled
cacontology-platforms:dataDisclosed
cacontology-platforms:deviceType
cacontology-platforms:devicesSearched
cacontology-platforms:discoveredDuring
cacontology-platforms:discoveryTimestamp
cacontology-platforms:emergencyDisclosureCapable
cacontology-platforms:enablesTemporaryAccounts
cacontology-platforms:encryptionLevel
cacontology-platforms:evidenceCategory
cacontology-platforms:evidenceTimestamp
cacontology-platforms:facilitatesRandomMatching
cacontology-platforms:foundOnDevice
cacontology-platforms:foundOnSocialMedia
cacontology-platforms:governedByDisclosurePolicy
cacontology-platforms:guestAccountsAllowed
cacontology-platforms:hasActionBeginPoint
cacontology-platforms:hasActionEndPoint
cacontology-platforms:hasContentModerationCapability
cacontology-platforms:hasDataRetentionPolicy
cacontology-platforms:hasLegalComplianceCapability
cacontology-platforms:hasPhaseBeginPoint
cacontology-platforms:hasPhaseEndPoint
cacontology-platforms:hasPlatformBeginPoint
cacontology-platforms:hasPlatformEndPoint
cacontology-platforms:hasUserVerificationSystem
cacontology-platforms:hashMatchingEnabled
cacontology-platforms:headquarteredIn
cacontology-platforms:identityDisclosureCircumstances
cacontology-platforms:identityVerificationRequired
cacontology-platforms:legalAuthority
cacontology-platforms:legalProcessContactInfo
cacontology-platforms:legalProcessUsed
cacontology-platforms:logRetentionPeriod
cacontology-platforms:maintainsAnonymityLevel
cacontology-platforms:moderationDecision
cacontology-platforms:moderationMethod
cacontology-platforms:moderationPresence
cacontology-platforms:offersContactOpportunity
cacontology-platforms:operatedBy
cacontology-platforms:operatesInJurisdiction
cacontology-platforms:phaseDuration
cacontology-platforms:platformDuration
cacontology-platforms:platformType
cacontology-platforms:platformsInvestigated
cacontology-platforms:preservationPeriod
cacontology-platforms:primaryUserBase
cacontology-platforms:providesAnonymousFeature
cacontology-platforms:providesOpenChatAccess
cacontology-platforms:requiresRegistration
cacontology-platforms:responseTimeFrame
cacontology-platforms:searchWarrantRequired
cacontology-platforms:socialMediaPlatform
cacontology-platforms:subsidiaryOf
cacontology-platforms:suspensionDuration
cacontology-platforms:suspensionReason
cacontology-platforms:userDataRetentionPeriod
cacontology-platforms:verificationStrength
cacontology-prevention:accessesArchive
cacontology-prevention:activeParticipantCount
cacontology-prevention:addressesSextortion
cacontology-prevention:affiliateOrganizationCount
cacontology-prevention:affiliatedWith
cacontology-prevention:ageGroup
cacontology-prevention:arrestsFromDisclosures
cacontology-prevention:assessesRisk
cacontology-prevention:averageDisclosureTime
cacontology-prevention:averageHelpSeekingTime
cacontology-prevention:averageListeningDuration
cacontology-prevention:communityParticipation
cacontology-prevention:communityReportingIncrease
cacontology-prevention:coordinatedBy
cacontology-prevention:coordinatedWith
cacontology-prevention:coordinatesWith
cacontology-prevention:coordinationMeetingFrequency
cacontology-prevention:courseCompletionRate
cacontology-prevention:courseModuleCount
cacontology-prevention:deliveredBy
cacontology-prevention:disclosureBarriersAddressed
cacontology-prevention:disclosuresGenerated
cacontology-prevention:discreteAccessCount
cacontology-prevention:distributedViaEmailList
cacontology-prevention:distributedsTo
cacontology-prevention:educatesOn
cacontology-prevention:educationPortalReach
cacontology-prevention:emailListSubscriberCount
cacontology-prevention:emailOpenRate
cacontology-prevention:enablesDiscreetAccess
cacontology-prevention:enablesRapidResponse
cacontology-prevention:engagesCommunity
cacontology-prevention:engagesParents
cacontology-prevention:enhancedBy
cacontology-prevention:faqAccessCount
cacontology-prevention:faqItemCount
cacontology-prevention:hostsContentOn
cacontology-prevention:identifiesTrustedAdult
cacontology-prevention:implementationStatus
cacontology-prevention:implementsProtocol
cacontology-prevention:integratesQRCode
cacontology-prevention:integratesToPlatform
cacontology-prevention:languageAvailability
cacontology-prevention:maintainsEmailList
cacontology-prevention:measuresEngagementOf
cacontology-prevention:monitorsUsageOf
cacontology-prevention:parentalEngagementRate
cacontology-prevention:participantCount
cacontology-prevention:podcastDownloadCount
cacontology-prevention:podcastEpisodeCount
cacontology-prevention:postersDistributed
cacontology-prevention:presentationAttendance
cacontology-prevention:preventionEffectiveness
cacontology-prevention:preventsBullying
cacontology-prevention:preventsMechanism
cacontology-prevention:programDuration
cacontology-prevention:providesResource
cacontology-prevention:publicationArchiveSize
cacontology-prevention:publishesToArchive
cacontology-prevention:qrCodeEnabled
cacontology-prevention:qrCodeScans
cacontology-prevention:queriesFAQ
cacontology-prevention:rapidResponseCapability
cacontology-prevention:reducesBarrier
cacontology-prevention:reducesShaming
cacontology-prevention:resourceSharingFrequency
cacontology-prevention:resultsInArrest
cacontology-prevention:riskReductionLevel
cacontology-prevention:schoolsTargeted
cacontology-prevention:sextortionWarningSignsCount
cacontology-prevention:sharesResourcesWith
cacontology-prevention:statewideCoverage
cacontology-prevention:supportedBy
cacontology-prevention:targetAgeGroup
cacontology-prevention:targetAudience
cacontology-prevention:targetsAudience
cacontology-prevention:tracksPodcastMetrics
cacontology-prevention:tracksProgressOf
cacontology-prevention:triggersDisclosure
cacontology-prevention:trustedAdultsIdentified
cacontology-production:concealmentLocation
cacontology-production:concealmentMethod
cacontology-production:developmentalDocumentation
cacontology-production:deviceBrand
cacontology-production:deviceModel
cacontology-production:distributionIntent
cacontology-production:editedWith
cacontology-production:evidenceOf
cacontology-production:evidenceRecovered
cacontology-production:facilitatedBy
cacontology-production:forensicValue
cacontology-production:hasProductionPhaseBeginPoint
cacontology-production:hasProductionPhaseEndPoint
cacontology-production:hasRoleBeginPoint
cacontology-production:hasRoleEndPoint
cacontology-production:imageCount
cacontology-production:immediateDistribution
cacontology-production:involvestVictim
cacontology-production:locationAccess
cacontology-production:locationSecurity
cacontology-production:metadataPreserved
cacontology-production:modificationDescription
cacontology-production:partOfSeries
cacontology-production:privacyExpectation
cacontology-production:producedAt
cacontology-production:producedBy
cacontology-production:produces
cacontology-production:productionComplexity
cacontology-production:productionEndDate
cacontology-production:productionMethod
cacontology-production:productionPeriod
cacontology-production:productionStartDate
cacontology-production:recordedWith
cacontology-production:recordingCapability
cacontology-production:recordingQuality
cacontology-production:resultingContent
cacontology-production:sessionCount
cacontology-production:sessionDuration
cacontology-production:sessionLocation
cacontology-production:storageCapacity
cacontology-production:surveillanceAngle
cacontology-production:systematicNature
cacontology-production:totalContentVolume
cacontology-production:triggeredInvestigation
cacontology-production:usesEquipment
cacontology-production:victimAge
cacontology-production:victimAgeProgression
cacontology-production:victimAwareness
cacontology-production:victimCount
cacontology-production:videoCount
cacontology-recruitment:academicPerformanceLevel
cacontology-recruitment:attendanceRate
cacontology-recruitment:attendsSchool
cacontology-recruitment:averageRecruitmentTime
cacontology-recruitment:contactsLawEnforcement
cacontology-recruitment:employedAt
cacontology-recruitment:exhibitsVulnerability
cacontology-recruitment:exploitsVulnerability
cacontology-recruitment:facilitatedBy
cacontology-recruitment:gradeLevel
cacontology-recruitment:includesRecruitingVictim
cacontology-recruitment:introducesTo
cacontology-recruitment:mandatoryReportingTrigger
cacontology-recruitment:mitigatesVulnerability
cacontology-recruitment:networkSize
cacontology-recruitment:operatesInNetwork
cacontology-recruitment:receivesReport
cacontology-recruitment:recruitmentAttempts
cacontology-recruitment:recruitsVictim
cacontology-recruitment:reportingDelay
cacontology-recruitment:reportingStaffRole
cacontology-recruitment:reportsToSchool
cacontology-recruitment:schoolType
cacontology-recruitment:schoolsInvolved
cacontology-recruitment:socioeconomicLevel
cacontology-recruitment:studentPopulation
cacontology-recruitment:successfulRecruitments
cacontology-recruitment:targetsSchool
cacontology-recruitment:triggersInvestigation
cacontology-recruitment:victimRecruitersCount
cacontology-recruitment:vulnerabilityScore
cacontology-registry:ageAcknowledgmentMethod
cacontology-registry:arrestTiming
cacontology-registry:attendsSchool
cacontology-registry:basedOnOffense
cacontology-registry:complianceType
cacontology-registry:contentTypesReceived
cacontology-registry:contentTypesSent
cacontology-registry:convictionDate
cacontology-registry:coordinatedWithCompliance
cacontology-registry:coordinatesBetweenAgencies
cacontology-registry:coordinationTimeframe
cacontology-registry:crossesStates
cacontology-registry:dateOfBirth
cacontology-registry:demonstratesAgeAwareness
cacontology-registry:employedAt
cacontology-registry:executedAt
cacontology-registry:executedDuring
cacontology-registry:exhibitsRecidivism
cacontology-registry:expirationDate
cacontology-registry:exploitationDurationMonths
cacontology-registry:eyeColor
cacontology-registry:fullName
cacontology-registry:hairColor
cacontology-registry:hasAlias
cacontology-registry:hasCompliance
cacontology-registry:hasOnlineIdentifier
cacontology-registry:hasProfile
cacontology-registry:hasRegistrationRecord
cacontology-registry:height
cacontology-registry:involvesBidirectionalExchange
cacontology-registry:involvesHighVolumeExploitation
cacontology-registry:involvesPattern
cacontology-registry:lastUpdate
cacontology-registry:lifetimeRegistration
cacontology-registry:lifetimeSupervision
cacontology-registry:managedBy
cacontology-registry:mandatoryMinimumYears
cacontology-registry:maximumSentenceYears
cacontology-registry:messageCount
cacontology-registry:offenseDescription
cacontology-registry:ownsVehicle
cacontology-registry:postRegistrationEvent
cacontology-registry:priorConvictionCount
cacontology-registry:race
cacontology-registry:recidivismPattern
cacontology-registry:recoversEvidence
cacontology-registry:registeredIn
cacontology-registry:registrationDate
cacontology-registry:registrationFrequency
cacontology-registry:registrationNumber
cacontology-registry:residesAt
cacontology-registry:sentenceLength
cacontology-registry:sentenceServed
cacontology-registry:sex
cacontology-registry:socialSecurityNumber
cacontology-registry:subjectToRestriction
cacontology-registry:targetsCrossState
cacontology-registry:tier
cacontology-registry:triggersInvestigation
cacontology-registry:verifiedBy
cacontology-registry:victimAge
cacontology-registry:victimAgeAcknowledged
cacontology-registry:victimCount
cacontology-registry:victimRelationship
cacontology-registry:violationCategory
cacontology-registry:weight
cacontology-registry:yearsBetweenOffenses
cacontology-sentencing:appliesTo
cacontology-sentencing:bailStatus
cacontology-sentencing:concurrentWith
cacontology-sentencing:currentPhase
cacontology-sentencing:hasCharge
cacontology-sentencing:hasLegalPhase
cacontology-sentencing:hasPhaseBeginPoint
cacontology-sentencing:hasPhaseEndPoint
cacontology-sentencing:hasProceedingBeginPoint
cacontology-sentencing:hasProceedingEndPoint
cacontology-sentencing:hasRole
cacontology-sentencing:hasRoleBeginPoint
cacontology-sentencing:hasRoleEndPoint
cacontology-sentencing:hasSentenceBeginPoint
cacontology-sentencing:hasSentenceEndPoint
cacontology-sentencing:involvesChargeCount
cacontology-sentencing:involvesParticipantCount
cacontology-sentencing:participatesInProceeding
cacontology-sentencing:phaseDuration
cacontology-sentencing:proceedingDuration
cacontology-sentencing:resultsSentence
cacontology-sentencing:roleDuration
cacontology-sentencing:sentenceConcurrency
cacontology-sentencing:sentenceDuration
cacontology-sentencing:situationComplexity
cacontology-sentencing:transitionsToPhase
cacontology-sextortion:actualAge
cacontology-sextortion:analyzesDevice
cacontology-sextortion:claimedAge
cacontology-sextortion:conductsOnPlatform
cacontology-sextortion:containsCommunication
cacontology-sextortion:conversationCount
cacontology-sextortion:conversationLength
cacontology-sextortion:demandType
cacontology-sextortion:deviceCount
cacontology-sextortion:employsThreat
cacontology-sextortion:escalationSpeed
cacontology-sextortion:evidenceRecovered
cacontology-sextortion:explicitnessLevel
cacontology-sextortion:falsePersonaType
cacontology-sextortion:followsProgression
cacontology-sextortion:giftCardType
cacontology-sextortion:identifiesVictim
cacontology-sextortion:imageType
cacontology-sextortion:incidentDuration
cacontology-sextortion:investigatedBy
cacontology-sextortion:involvesDeception
cacontology-sextortion:makesDemand
cacontology-sextortion:monetaryAmount
cacontology-sextortion:nextPhase
cacontology-sextortion:previousPhase
cacontology-sextortion:progressionStage
cacontology-sextortion:providesEvidence
cacontology-sextortion:reconstructsConversation
cacontology-sextortion:resultsinCharge
cacontology-sextortion:threatFollowThrough
cacontology-sextortion:threatSpecificity
cacontology-sextortion:threatType
cacontology-sextortion:triggersPhase
cacontology-sextortion:usesManipulation
cacontology-sextortion:utilizesFeature
cacontology-sextortion:victimAgeGroup
cacontology-sextortion:victimCount
cacontology-specialized:hasOperationBeginPoint
cacontology-specialized:hasOperationEndPoint
cacontology-specialized:hasPhaseBeginPoint
cacontology-specialized:hasPhaseEndPoint
cacontology-specialized:hasRoleBeginPoint
cacontology-specialized:hasRoleEndPoint
cacontology-specialized:hasUnitBeginPoint
cacontology-specialized:hasUnitEndPoint
cacontology-specialized:operationDuration
cacontology-specialized:phaseDuration
cacontology-specialized:roleDuration
cacontology-specialized:unitDuration
cacontology-strategy:dependsOnPattern
cacontology-strategy:extendsPattern
cacontology-strategy:hasIntegrationPattern
cacontology-strategy:hasIntegrationPriority
cacontology-strategy:hasIntegrationTimeline
cacontology-strategy:hasValidationQuery
cacontology-strategy:hasValidationRule
cacontology-strategy:requiresValidation
cacontology-street:administrationMethod
cacontology-street:apparentAge
cacontology-street:approachMethod
cacontology-street:assessesVulnerability
cacontology-street:contactDuration
cacontology-street:conversationTopic
cacontology-street:distanceFromContact
cacontology-street:distressIndicators
cacontology-street:documentsRecruitment
cacontology-street:economicIncentive
cacontology-street:escalatesTo
cacontology-street:escalationTimeframe
cacontology-street:exhibitsIndicator
cacontology-street:explicitnessLevel
cacontology-street:exploitationLocation
cacontology-street:exploitsVulnerability
cacontology-street:facilitatesTransition
cacontology-street:facilitatesWithSubstance
cacontology-street:followUpDelay
cacontology-street:followUpMethod
cacontology-street:followsUpWith
cacontology-street:helpOfferType
cacontology-street:impairmentLevel
cacontology-street:initialContactLocation
cacontology-street:initiatesContact
cacontology-street:isolatesAt
cacontology-street:isolationLevel
cacontology-street:makesProposition
cacontology-street:moneyAmountMentioned
cacontology-street:occursAt
cacontology-street:persistenceLevel
cacontology-street:persistsAfter
cacontology-street:pretextUsed
cacontology-street:propositionType
cacontology-street:reinforcementAttempts
cacontology-street:reinforces
cacontology-street:rejects
cacontology-street:reportingDelay
cacontology-street:reportingMethod
cacontology-street:reportsTo
cacontology-street:resistanceLevel
cacontology-street:respondsTo
cacontology-street:responseType
cacontology-street:sameDayProgression
cacontology-street:substanceType
cacontology-street:supportsCharge
cacontology-street:targetsVictim
cacontology-street:transitionsTo
cacontology-street:transportationMethod
cacontology-street:usesPretext
cacontology-street:vulnerabilityIndicators
cacontology-tactical:afterActionReport
cacontology-tactical:backupTeamAvailable
cacontology-tactical:briefingConducted
cacontology-tactical:commandedBy
cacontology-tactical:deployedDuring
cacontology-tactical:entryMethod
cacontology-tactical:equipmentType
cacontology-tactical:evacuationRequired
cacontology-tactical:flightRisk
cacontology-tactical:forceUsed
cacontology-tactical:injuriesOccurred
cacontology-tactical:mediaPresent
cacontology-tactical:negotiationAttempted
cacontology-tactical:negotiationDuration
cacontology-tactical:negotiationOutcome
cacontology-tactical:operatedBy
cacontology-tactical:operationAuthorization
cacontology-tactical:operationDuration
cacontology-tactical:operationLocation
cacontology-tactical:operationOutcome
cacontology-tactical:operationType
cacontology-tactical:participatingMember
cacontology-tactical:perimeterEstablished
cacontology-tactical:planningDuration
cacontology-tactical:propertyDamage
cacontology-tactical:publicSafetyThreat
cacontology-tactical:resistanceEncountered
cacontology-tactical:riskLevel
cacontology-tactical:specialApprovalRequired
cacontology-tactical:standoffDuration
cacontology-tactical:suicidalRisk
cacontology-tactical:suspectsArrested
cacontology-tactical:teamSize
cacontology-tactical:threatLevel
cacontology-tactical:useOfForceJustified
cacontology-tactical:weaponsDeployed
cacontology-tactical:weaponsPossible
cacontology-taskforce:accessibleVia
cacontology-taskforce:agencyCount
cacontology-taskforce:agencyType
cacontology-taskforce:arrestsSince2006
cacontology-taskforce:arrestsSince2019
cacontology-taskforce:assignedToUnit
cacontology-taskforce:capabilityLevel
cacontology-taskforce:certificationStatus
cacontology-taskforce:certificationValid
cacontology-taskforce:certifiedIn
cacontology-taskforce:collaboratesWith
cacontology-taskforce:commandedBy
cacontology-taskforce:completionRate
cacontology-taskforce:conductedBy
cacontology-taskforce:coordinatedBy
cacontology-taskforce:coordinatedThrough
cacontology-taskforce:coordinatesWith
cacontology-taskforce:coordinatesWithCivilian
cacontology-taskforce:coordinationDuration
cacontology-taskforce:coordinationLevel
cacontology-taskforce:coordinationModel
cacontology-taskforce:countyName
cacontology-taskforce:coverageArea
cacontology-taskforce:coverageType
cacontology-taskforce:cyberTipsProcessed
cacontology-taskforce:cyberTipsReceived
cacontology-taskforce:cyberTipsSince2019
cacontology-taskforce:dojGrantFunded
cacontology-taskforce:emailAddress
cacontology-taskforce:establishmentDate
cacontology-taskforce:experienceLevel
cacontology-taskforce:federalPartner
cacontology-taskforce:handledInvestigation
cacontology-taskforce:hasContactInformation
cacontology-taskforce:hasMember
cacontology-taskforce:hasMetrics
cacontology-taskforce:hasOperationPhaseBeginPoint
cacontology-taskforce:hasOperationPhaseEndPoint
cacontology-taskforce:hasRegionalTaskForce
cacontology-taskforce:hasRoleBeginPoint
cacontology-taskforce:hasRoleEndPoint
cacontology-taskforce:hasUnit
cacontology-taskforce:hostJurisdictionLevel
cacontology-taskforce:hostOrganizationType
cacontology-taskforce:hostedBy
cacontology-taskforce:hostsTaskForce
cacontology-taskforce:hotlineType
cacontology-taskforce:includesTaskForce
cacontology-taskforce:involvedUnit
cacontology-taskforce:jurisdictionPopulation
cacontology-taskforce:leadsUnit
cacontology-taskforce:localPartner
cacontology-taskforce:maintainsWebsite
cacontology-taskforce:managedByCoordination
cacontology-taskforce:measuresPerformance
cacontology-taskforce:memberCount
cacontology-taskforce:memberRole
cacontology-taskforce:metropolitanArea
cacontology-taskforce:militaryBranches
cacontology-taskforce:militaryJurisdiction
cacontology-taskforce:nationalCoveragePercentage
cacontology-taskforce:nationalHotlineNumber
cacontology-taskforce:nationalTaskForceNetwork
cacontology-taskforce:operatesHotline
cacontology-taskforce:operationDuration
cacontology-taskforce:operationOutcome
cacontology-taskforce:operationPhaseDuration
cacontology-taskforce:operationScale
cacontology-taskforce:operationType
cacontology-taskforce:organizationName
cacontology-taskforce:parentsEducated
cacontology-taskforce:participatedIn
cacontology-taskforce:participatingUnits
cacontology-taskforce:partnerAgencyCount
cacontology-taskforce:partnersWith
cacontology-taskforce:performancePeriod
cacontology-taskforce:phoneNumber
cacontology-taskforce:professionalsTrained
cacontology-taskforce:providesRegionalCoverage
cacontology-taskforce:providesTraining
cacontology-taskforce:receivedTraining
cacontology-taskforce:regionCovered
cacontology-taskforce:regionalTaskForceCount
cacontology-taskforce:reportingYear
cacontology-taskforce:resourceCapacity
cacontology-taskforce:servesCounty
cacontology-taskforce:servesMetropolitanArea
cacontology-taskforce:servesMilitaryBranch
cacontology-taskforce:sexualPredatorArrests
cacontology-taskforce:sharesResourcesWith
cacontology-taskforce:sharingAgreement
cacontology-taskforce:sharingDuration
cacontology-taskforce:sharingType
cacontology-taskforce:specializationArea
cacontology-taskforce:statesWithMultipleTaskForces
cacontology-taskforce:studentsEducated
cacontology-taskforce:supportedInvestigation
cacontology-taskforce:taskForceId
cacontology-taskforce:taskForceNumber
cacontology-taskforce:teachersEducated
cacontology-taskforce:totalTaskForces
cacontology-taskforce:trainingDuration
cacontology-taskforce:trainingType
cacontology-taskforce:websiteURL
cacontology-taskforce:yearOverYearIncrease
cacontology-taskforce:yearsOfService
cacontology-temporal:EvidencePreservationDeadline
cacontology-temporal:StatuteOfLimitationsDeadline
cacontology-temporal:WarrantExpirationDate
cacontology-temporal:ageSubject
cacontology-temporal:concernsAgeQuality
cacontology-temporal:createsSuspension
cacontology-temporal:hasActiveDuration
cacontology-temporal:hasAgeInYears
cacontology-temporal:hasConsequentEvent
cacontology-temporal:hasLegalDeadline
cacontology-temporal:hasMaximumDuration
cacontology-temporal:hasMinimumDuration
cacontology-temporal:hasParallelEvent
cacontology-temporal:hasPrerequisiteEvent
cacontology-temporal:hasSuspendedDuration
cacontology-temporal:hasTimeToFirstAction
cacontology-temporal:hasTimeToResolution
cacontology-temporal:hasTypicalDuration
cacontology-temporal:phaseCompletionRate
cacontology-temporal:phaseEfficiency
cacontology-temporal:resumes
cacontology-temporal:suspends
cacontology-temporal:temporallyContains
cacontology-temporal:temporallyOverlapsWith
cacontology-temporal:temporallyPrecedes
cacontology-temporal:terminatesSuspension
cacontology-temporal:transitionsFrom
cacontology-temporal:transitionsTo
cacontology-temporal:triggersTransition
cacontology-temporal:urgencyLevel
cacontology-trafficking:controlsVictim
cacontology-trafficking:crossesJurisdiction
cacontology-trafficking:destinationLocation
cacontology-trafficking:earningsAmount
cacontology-trafficking:earningsPeriod
cacontology-trafficking:enterpriseDuration
cacontology-trafficking:hasControlMethod
cacontology-trafficking:hasEnterpriseBeginPoint
cacontology-trafficking:hasEnterpriseEndPoint
cacontology-trafficking:hasEnterprisePhase
cacontology-trafficking:hasHierarchyLevel
cacontology-trafficking:hasPhaseBeginPoint
cacontology-trafficking:hasPhaseEndPoint
cacontology-trafficking:hasRoleBeginPoint
cacontology-trafficking:hasRoleEndPoint
cacontology-trafficking:involvesJurisdictionCount
cacontology-trafficking:involvesTraffickerCount
cacontology-trafficking:involvesVictimCount
cacontology-trafficking:operatesInJurisdiction
cacontology-trafficking:originLocation
cacontology-trafficking:phaseDuration
cacontology-trafficking:requiresCoordination
cacontology-trafficking:roleDuration
cacontology-trafficking:situationComplexity
cacontology-trafficking:transitionsToPhase
cacontology-trafficking:transportationMethod
cacontology-trafficking:vulnerabilityExploited
cacontology-training:assessedBy
cacontology-training:buildsCapacityFor
cacontology-training:capacityLevel
cacontology-training:certificationStatus
cacontology-training:certificationValidityPeriod
cacontology-training:certifiedBy
cacontology-training:competencyLevel
cacontology-training:completionRate
cacontology-training:deliveredBy
cacontology-training:hasPhaseBeginPoint
cacontology-training:hasPhaseEndPoint
cacontology-training:hasRoleBeginPoint
cacontology-training:hasRoleEndPoint
cacontology-training:hasTrainingBeginPoint
cacontology-training:hasTrainingEndPoint
cacontology-training:improvesProficiency
cacontology-training:includedInCurriculum
cacontology-training:k9PublicPresentations
cacontology-training:k9SearchWarrantsAssisted
cacontology-training:mentors
cacontology-training:operationalDeploymentCount
cacontology-training:outreachEventsCount
cacontology-training:participatedIn
cacontology-training:participationRate
cacontology-training:phaseDuration
cacontology-training:professionalsTrained
cacontology-training:professionalsTrainedCount
cacontology-training:roleDuration
cacontology-training:skillsAcquired
cacontology-training:supportedBy
cacontology-training:totalAttendeesReached
cacontology-training:trainingDuration
cacontology-training:trainingEffectiveness
cacontology-training:trainingLanguage
cacontology-training:trainingReachCount
cacontology-training:trainingToOperationEffectiveness
cacontology-training:validatesSkills
cacontology-undercover:advertisementLiveTime
cacontology-undercover:advertisementURL
cacontology-undercover:agentOperatesAs
cacontology-undercover:apartmentType
cacontology-undercover:backstoryDetails
cacontology-undercover:backupTeamAssigned
cacontology-undercover:chatDurationHours
cacontology-undercover:chatPlatformType
cacontology-undercover:chatRoomTopic
cacontology-undercover:clientContactMethod
cacontology-undercover:communicationMethod
cacontology-undercover:communicationPlatform
cacontology-undercover:conductedOnPlatform
cacontology-undercover:containsCriminalContent
cacontology-undercover:conversationCount
cacontology-undercover:coversTimeframe
cacontology-undercover:documentsViolationAt
cacontology-undercover:emergencySignal
cacontology-undercover:evidenceCollected
cacontology-undercover:evidentiaryValue
cacontology-undercover:floorLevel
cacontology-undercover:generatesEvidence
cacontology-undercover:handledBy
cacontology-undercover:hasOperationPhaseBeginPoint
cacontology-undercover:hasOperationPhaseEndPoint
cacontology-undercover:hasRoleBeginPoint
cacontology-undercover:hasRoleEndPoint
cacontology-undercover:hasSecureExit
cacontology-undercover:identificationSuccessRate
cacontology-undercover:identifiesPredator
cacontology-undercover:identifiesVictimPhotos
cacontology-undercover:infiltrationDuration
cacontology-undercover:instructionType
cacontology-undercover:interceptsInstruction
cacontology-undercover:investigatesViolation
cacontology-undercover:involvesChatInvestigation
cacontology-undercover:judicialAuthorization
cacontology-undercover:leadsToDevelopment
cacontology-undercover:leadsToSolicitation
cacontology-undercover:maintainsSurveillance
cacontology-undercover:meetingSolicitationAttempts
cacontology-undercover:monitorsPhoneCommunication
cacontology-undercover:operatesAtLocation
cacontology-undercover:operatesUnderIdentity
cacontology-undercover:operationClassification
cacontology-undercover:operationOutcome
cacontology-undercover:operationPhaseDuration
cacontology-undercover:participantCount
cacontology-undercover:personaAge
cacontology-undercover:personaGender
cacontology-undercover:personaLocation
cacontology-undercover:personaProfile
cacontology-undercover:phoneNumberMonitored
cacontology-undercover:platformUsername
cacontology-undercover:portraysAge
cacontology-undercover:predatorContactAttempts
cacontology-undercover:respondsToAdvertisement
cacontology-undercover:safetyProtocol
cacontology-undercover:socialMediaPlatformsUsed
cacontology-undercover:supervisoryApproval
cacontology-undercover:surveillanceTeamCount
cacontology-undercover:targetBehaviorType
cacontology-undercover:targetsIndividual
cacontology-undercover:targetsSubject
cacontology-undercover:utilizesPersona
cacontology-undercover:victimPhotoCount
cacontology-undercover:violationLocation
cacontology-undercover:violationType
cacontology-undercover:websitePlatform
cacontology-us-ncmec:accountConfidence
cacontology-us-ncmec:analysisConfidence
cacontology-us-ncmec:analysisOf
cacontology-us-ncmec:cooperationLevel
cacontology-us-ncmec:dataProvided
cacontology-us-ncmec:enrichmentType
cacontology-us-ncmec:hasNCMECIncidentType
cacontology-us-ncmec:hasNCMECReportAnnotation
cacontology-us-ncmec:identifiedContent
cacontology-us-ncmec:incidentCode
cacontology-us-ncmec:indicatorStrength
cacontology-us-ncmec:involvesPlatform
cacontology-us-ncmec:linkedToAccount
cacontology-us-ncmec:phoneVerificationStatus
cacontology-us-ncmec:platformResponseTime
cacontology-us-ncmec:priorityLevel
cacontology-us-ncmec:processedTip
cacontology-us-ncmec:processingTime
cacontology-us-ncmec:referralJurisdiction
cacontology-us-ncmec:resultedInInvestigation
cacontology-us-ncmec:supportedBy
cacontology-us-ncmec:tracedToPhone
cacontology-us-ncmec:transferFrequency
cacontology-us-ncmec:transferVolume
cacontology-us-ncmec:triggerCriteria
cacontology-us-ncmec:triggeredBy
cacontology-us-ncmec:urgencyLevel
cacontology-us-ncmec:validationStatus
cacontology-usa-federal:collaboratesWith
cacontology-usa-federal:collectsEvidence
cacontology-usa-federal:crimeJurisdiction
cacontology-usa-federal:crimeSeverityLevel
cacontology-usa-federal:defendedBy
cacontology-usa-federal:followsPhase
cacontology-usa-federal:foreignCountriesInvolved
cacontology-usa-federal:hasDivision
cacontology-usa-federal:hasInterstateNexus
cacontology-usa-federal:hasLegalPhase
cacontology-usa-federal:hasPhaseBeginPoint
cacontology-usa-federal:hasPhaseEndPoint
cacontology-usa-federal:hasProsecutionBeginPoint
cacontology-usa-federal:hasProsecutionEndPoint
cacontology-usa-federal:hasRoleBeginPoint
cacontology-usa-federal:hasRoleEndPoint
cacontology-usa-federal:investigatedBy
cacontology-usa-federal:involvesDigitalEvidence
cacontology-usa-federal:involvesInternationalElements
cacontology-usa-federal:involvesMultipleStates
cacontology-usa-federal:isPhaseOf
cacontology-usa-federal:mandatoryMinimumSentence
cacontology-usa-federal:phaseDuration
cacontology-usa-federal:precedesPhase
cacontology-usa-federal:prosecutedBy
cacontology-usa-federal:prosecutionComplexity
cacontology-usa-federal:prosecutionDuration
cacontology-usa-federal:prosecutionSeverity
cacontology-usa-federal:prosecutionStatus
cacontology-usa-federal:requiresForensicAnalysis
cacontology-usa-federal:requiresRole
cacontology-usa-federal:roleDuration
cacontology-usa-federal:roleExperience
cacontology-usa-federal:roleSpecialization
cacontology-usa-federal:usesEvidence
cacontology-usa-federal:victimizedBy
cacontology1:conspiracyDuration
cacontology1:conspiracyMemberCount
cacontology1:currentPhase
cacontology1:depictsChild
cacontology1:hasAgeSituation
cacontology1:hasOffenderAgeSituation
cacontology1:hasPhase
cacontology1:hasPhaseBeginPoint
cacontology1:hasPhaseEndPoint
cacontology1:hasRoleBeginPoint
cacontology1:hasRoleEndPoint
cacontology1:hasStep
cacontology1:hasVictimAgeSituation
cacontology1:indictmentCounts
cacontology1:investigationStatus
cacontology1:involvesOffender
cacontology1:involvesVictim
cacontology1:leadsConspiracy
cacontology1:legalInstrument
cacontology1:nextStep
cacontology1:occursDuringPhase
cacontology1:participatesInConspiracy
cacontology1:phaseDuration
cacontology1:phaseProgress
cacontology1:previousStep
cacontology1:producesArtifact
cacontology1:rescuedVictim
cacontology1:resultsinIndictment
cacontology1:severityLevel
cacontology1:submittedTo
cacontology1:targetsService
cacontology1:transitionsTo
cacontology1:usesChannel
cacontology1:usesClassification
hotline:assignedRole
hotline:classification
hotline:coordinationBeginTime
hotline:currentPhase
hotline:feedbackType
hotline:firstSeen
hotline:forwardsTo
hotline:foundAtURL
hotline:hasEvidence
hotline:hasPhaseTransition
hotline:intakeChannel
hotline:involvesCoordination
hotline:isAnonymous
hotline:linkedInvestigation
hotline:phaseBeginTime
hotline:phaseDuration
hotline:phaseEndTime
hotline:playsRole
hotline:producesHash
hotline:receivedBy
hotline:referencesHash
hotline:reportedBy
hotline:roleAssignmentTime
hotline:status
hotline:triggersAction
Concepts (21)
cacontology-detection:copine-1
cacontology-detection:copine-10
cacontology-detection:copine-4
cacontology-detection:copine-7
cacontology-detection:copine-8
cacontology-detection:sar-1
cacontology-detection:sar-2
cacontology-detection:sar-3
cacontology-detection:sar-4
cacontology-detection:sar-5
hotline:classification-confirmed
hotline:classification-false-positive
hotline:classification-legal-concern
hotline:classification-other
hotline:classification-uncertain
hotline:status-closed
hotline:status-forwarded
hotline:status-in-progress
hotline:status-in-review
hotline:status-new
hotline:status-reopened
Home
Entities
Properties
Properties Tree
Tree
cacontology-abduction:abductionDuration
cacontology-abduction:abductionLocation
cacontology-abduction:accessDifficulty
cacontology-abduction:approachMethod
cacontology-abduction:complianceReason
cacontology-abduction:concealmentLevel
cacontology-abduction:concealsIdentityWith
cacontology-abduction:disclosesTo
cacontology-abduction:disclosureMethod
cacontology-abduction:disguiseEffectiveness
cacontology-abduction:disguiseType
cacontology-abduction:documentsAbduction
cacontology-abduction:employsCoercion
cacontology-abduction:entryMethod
cacontology-abduction:escalatesTo
cacontology-abduction:escapeRoutes
cacontology-abduction:evidenceRecoveryRate
cacontology-abduction:exercisesControl
cacontology-abduction:exhibitsVulnerability
cacontology-abduction:exploitsVulnerability
cacontology-abduction:facilitatesExploitation
cacontology-abduction:forcesEntryTo
cacontology-abduction:investigatesAbduction
cacontology-abduction:investigationDuration
cacontology-abduction:isolatesAt
cacontology-abduction:locationIsolationLevel
cacontology-abduction:occursAt
cacontology-abduction:opportunityWindow
cacontology-abduction:perpetratesAbduction
cacontology-abduction:recoveredFrom
cacontology-abduction:reportingDelay
cacontology-abduction:reportsAbduction
cacontology-abduction:resistanceLevel
cacontology-abduction:resistsAbduction
cacontology-abduction:respondsTo
cacontology-abduction:supportsCharge
cacontology-abduction:surveillanceDuration
cacontology-abduction:targetingCriteria
cacontology-abduction:targetsVictim
cacontology-abduction:threatEffectiveness
cacontology-abduction:threatSpecificity
cacontology-abduction:threatensWith
cacontology-abduction:timeOfDay
cacontology-abduction:transitionsTo
cacontology-abduction:triggersInvestigation
cacontology-abduction:usesDisguise
cacontology-abduction:usesWeapon
cacontology-abduction:victimActivity
cacontology-abduction:victimsOf
cacontology-abduction:weaponDisplayed
cacontology-abduction:weaponType
cacontology-abduction:witnessCount
cacontology-ai:aiModelUsed
cacontology-ai:analyzesTrainingData
cacontology-ai:artifactsDetected
cacontology-ai:artificialnessLevel
cacontology-ai:basedOnModel
cacontology-ai:challengesLegalFramework
cacontology-ai:complicatesVictimIdentification
cacontology-ai:detectedBy
cacontology-ai:detectionConfidence
cacontology-ai:detectionMethod
cacontology-ai:evidenceAdmissibility
cacontology-ai:falsePositiveRate
cacontology-ai:generatedUsing
cacontology-ai:generationComplexity
cacontology-ai:generationTechnique
cacontology-ai:investigationChallengeLevel
cacontology-ai:legalFrameworkChallenges
cacontology-ai:processingTime
cacontology-ai:prosecutionDifficulty
cacontology-ai:realVictimDepicted
cacontology-ai:renderingQuality
cacontology-ai:requiresSpecializedProsecution
cacontology-ai:revealsArtifacts
cacontology-ai:sourceTraceability
cacontology-ai:subjectOfInvestigation
cacontology-ai:technicalExpertiseRequired
cacontology-ai:tracesToSource
cacontology-ai:usesDetectionTool
cacontology-ai:utilizesTool
cacontology-ai:victimIdentificationDifficulty
cacontology-asset-forfeiture:accountFunds
cacontology-asset-forfeiture:assignedRole
cacontology-asset-forfeiture:courtJurisdiction
cacontology-asset-forfeiture:currentPhase
cacontology-asset-forfeiture:equipmentType
cacontology-asset-forfeiture:estimatedValue
...acontology-asset-forfeiture:financialPenaltyAmount
cacontology-asset-forfeiture:forfeitureDate
cacontology-asset-forfeiture:forfeiturePercentage
cacontology-asset-forfeiture:hasPhaseTransition
cacontology-asset-forfeiture:involvesCoordination
cacontology-asset-forfeiture:involvesTaskforce
cacontology-asset-forfeiture:itemCount
cacontology-asset-forfeiture:marketValue
cacontology-asset-forfeiture:playsRole
cacontology-asset-forfeiture:precedentSetting
...acontology-asset-forfeiture:relatedCriminalCharges
cacontology-asset-forfeiture:restraintDate
cacontology-asset-forfeiture:targetedAsset
cacontology-athletic:coachesTeam
cacontology-athletic:coachingExperience
cacontology-athletic:currentPhase
cacontology-athletic:hasPhaseTransition
cacontology-athletic:holdsCoachingRole
cacontology-athletic:multipleRoles
cacontology-athletic:occursInFacility
cacontology-athletic:participatesInSituation
cacontology-athletic:playsOnTeam
cacontology-athletic:practiceFrequency
cacontology-athletic:sportType
cacontology-athletic:teamType
cacontology-athletic:utilizesAthleticSpace
cacontology-case:accessLevel
cacontology-case:appealStatus
cacontology-case:approvedBy
cacontology-case:archivalDate
cacontology-case:archivedAt
cacontology-case:assignedBy
cacontology-case:assignedInvestigator
cacontology-case:assignedTo
cacontology-case:assignedToRole
cacontology-case:assignmentDate
cacontology-case:assignmentStatus
cacontology-case:assignmentType
cacontology-case:benchmarkValue
cacontology-case:benchmarkedAgainst
cacontology-case:caseCloseDate
cacontology-case:caseOpenDate
cacontology-case:casePriority
cacontology-case:caseStatus
cacontology-case:caseType
cacontology-case:caseloadCount
cacontology-case:certificationLevel
cacontology-case:classificationLevel
cacontology-case:closedBy
cacontology-case:closureDate
cacontology-case:closureReason
cacontology-case:conductsReview
cacontology-case:creationDate
cacontology-case:currentPhase
cacontology-case:documentStatus
cacontology-case:documentType
cacontology-case:documentedBy
cacontology-case:finalDisposition
cacontology-case:followsStage
cacontology-case:followsWorkflow
cacontology-case:generatesMetrics
cacontology-case:hasAssignment
cacontology-case:hasDocumentation
cacontology-case:hasPhaseTransition
cacontology-case:holdsRole
cacontology-case:investigatorExperience
cacontology-case:jurisdictionLevel
cacontology-case:lastModified
cacontology-case:lastUpdate
cacontology-case:managesCase
cacontology-case:measurementUnit
cacontology-case:measuresPerformance
cacontology-case:metricType
cacontology-case:metricValue
cacontology-case:participatesInManagement
cacontology-case:precedesStage
cacontology-case:recommendationsCount
cacontology-case:reportingPeriod
cacontology-case:resultsInClosure
cacontology-case:retentionPeriod
cacontology-case:reviewDate
cacontology-case:reviewOutcome
cacontology-case:reviewType
cacontology-case:reviewedBy
cacontology-case:reviewerRole
cacontology-case:reviewsCase
cacontology-case:specialization
cacontology-case:stageDuration
cacontology-case:stageEndDate
cacontology-case:stageOutcome
cacontology-case:stageStartDate
cacontology-case:supervisedBy
cacontology-case:trackedBy
cacontology-case:trackingNumber
cacontology-case:trackingSystem
cacontology-case:undergoesReview
cacontology-case:updateFrequency
cacontology-case:workflowStage
cacontology-case:workloadPercentage
cacontology-coord:agreementScope
cacontology-coord:agreementType
cacontology-coord:assignedBy
cacontology-coord:assignmentDuration
cacontology-coord:assignsLiaison
cacontology-coord:authorizedBy
cacontology-coord:availabilityLevel
cacontology-coord:benchmarkComparison
cacontology-coord:benchmarkedAgainst
cacontology-coord:classificationLevel
cacontology-coord:clearanceLevel
cacontology-coord:communicationAuthority
cacontology-coord:communicationFrequency
cacontology-coord:concernsCase
cacontology-coord:concernsParticipant
cacontology-coord:concernsTemporaryPart
cacontology-coord:concernsTemporaryWhole
cacontology-coord:connectsAgencies
cacontology-coord:coordinationLevel
cacontology-coord:coordinationStatus
cacontology-coord:coordinationType
cacontology-coord:costSharing
cacontology-coord:effectiveDate
cacontology-coord:escalationProcedure
cacontology-coord:evaluatesCoordination
cacontology-coord:expirationDate
cacontology-coord:facilitatesCommunication
cacontology-coord:governsAgreement
cacontology-coord:hasAccuracy
cacontology-coord:hasActionability
cacontology-coord:hasComplexityLevel
cacontology-coord:hasComponent
cacontology-coord:hasCoordinationEffectiveness
cacontology-coord:hasCoordinationIntensity
cacontology-coord:hasDataCompleteness
cacontology-coord:hasDataConsistency
cacontology-coord:hasDataQuality
cacontology-coord:hasIntelligenceValue
cacontology-coord:hasLiaisonEffectiveness
cacontology-coord:hasReliability
cacontology-coord:hasResponsiveness
cacontology-coord:hasSecurityLevel
cacontology-coord:hasSharingEfficiency
cacontology-coord:hasSubInvestigation
cacontology-coord:hasSuccessRate
cacontology-coord:hasTimeliness
cacontology-coord:hasTrustLevel
cacontology-coord:hasUnificationLevel
cacontology-coord:hasValidationLevel
cacontology-coord:informationAccuracy
cacontology-coord:intelligenceType
cacontology-coord:investigationScope
cacontology-coord:involvesAgency
cacontology-coord:involvesPersonnel
cacontology-coord:isComponentOf
cacontology-coord:isSubInvestigationOf
cacontology-coord:leadAgency
cacontology-coord:liaisonRole
cacontology-coord:liaisonWith
cacontology-coord:measurementPeriod
cacontology-coord:measuresPerformance
cacontology-coord:metricType
cacontology-coord:metricValue
cacontology-coord:participatesIn
cacontology-coord:participatesInSharing
cacontology-coord:participatingAgencies
cacontology-coord:personnelCount
cacontology-coord:protocolType
cacontology-coord:providesResource
cacontology-coord:receivesResource
cacontology-coord:reciprocity
cacontology-coord:reimbursement
cacontology-coord:renewalClause
cacontology-coord:representsAgency
cacontology-coord:resourcePooling
cacontology-coord:resourceType
cacontology-coord:responseTimeRequirement
cacontology-coord:securityClearance
cacontology-coord:sharedCommand
cacontology-coord:sharesFromAgency
cacontology-coord:sharesInformation
cacontology-coord:sharesResources
cacontology-coord:sharesWithAgency
cacontology-coord:sharingAgreement
cacontology-coord:sharingDuration
cacontology-coord:sharingMechanism
cacontology-coord:sharingType
cacontology-coord:signedByAgency
cacontology-coord:sourceReliability
cacontology-coord:specialization
cacontology-coord:standsInQualifiedParthood
cacontology-coord:standsInQualifiedParticipation
cacontology-coord:terminationClause
cacontology-coord:unifiedReporting
cacontology-coord:usesProtocol
cacontology-corruption:abusesAccess
cacontology-corruption:accessLevel
cacontology-corruption:authorityLevel
cacontology-corruption:badgeVisible
cacontology-corruption:concernsCorruptOfficer
cacontology-corruption:corruptionDuration
cacontology-corruption:corruptsEvidence
cacontology-corruption:departmentAffiliation
cacontology-corruption:detectedBy
cacontology-corruption:displaysAuthority
cacontology-corruption:employmentStatus
cacontology-corruption:employsOfficer
cacontology-corruption:exploitsPosition
cacontology-corruption:hasAuthorityAbuseDegree
...acontology-corruption:hasAuthorityEnhancementLevel
cacontology-corruption:hasCorruptionDependency
cacontology-corruption:hasCorruptionImpact
cacontology-corruption:hasCorruptionSeverity
cacontology-corruption:hasDataCompleteness
cacontology-corruption:hasDataQuality
cacontology-corruption:hasDetectionDifficulty
cacontology-corruption:hasEvidenceIntegrity
cacontology-corruption:hasIntimidationFactor
cacontology-corruption:hasInvestigationComplexity
...acontology-corruption:hasPositionExploitationLevel
cacontology-corruption:hasSymbolVisibility
cacontology-corruption:hasTrustBetrayalLevel
cacontology-corruption:hasValidationLevel
cacontology-corruption:hasVictimVulnerability
cacontology-corruption:investigatedBy
cacontology-corruption:isDetectedBy
cacontology-corruption:leaksInformation
cacontology-corruption:participatesIn
cacontology-corruption:reportedBy
...cacontology-corruption:standsInQualifiedCorruption
cacontology-corruption:uniformDisplayed
cacontology-corruption:uniformType
cacontology-corruption:victimCount
cacontology-corruption:wearsUniform
cacontology-corruption:yearsOfService
cacontology-custodial:accessLevel
cacontology-custodial:aggravatingFactor
cacontology-custodial:authorityLevel
cacontology-custodial:authorityScope
cacontology-custodial:authorizationLevel
cacontology-custodial:breachDuration
cacontology-custodial:checkScope
cacontology-custodial:checkStatus
cacontology-custodial:consentScope
cacontology-custodial:consentStatus
cacontology-custodial:createsCustodialSituation
cacontology-custodial:custodyDuration
cacontology-custodial:custodySchedule
cacontology-custodial:custodyType
cacontology-custodial:hasAuthority
cacontology-custodial:hasCustodyBeginPoint
cacontology-custodial:hasCustodyEndPoint
cacontology-custodial:hasCustodyPhase
cacontology-custodial:hasRoleBeginPoint
cacontology-custodial:hasRoleEndPoint
cacontology-custodial:hasViolationBeginPoint
cacontology-custodial:hasViolationEndPoint
cacontology-custodial:holdsPositionOf
cacontology-custodial:inCustodyPhase
cacontology-custodial:involvesChild
cacontology-custodial:involvesCustodian
cacontology-custodial:involvesParent
cacontology-custodial:occursInCustodialSituation
cacontology-custodial:perpetratedBy
cacontology-custodial:relationshipDuration
cacontology-custodial:relationshipFrequency
cacontology-custodial:relationshipIntimacy
cacontology-custodial:relationshipType
cacontology-custodial:relevantToInvestigation
cacontology-custodial:subjectTo
cacontology-custodial:supervisionLevel
cacontology-custodial:trustLevel
cacontology-custodial:violatesPosition
cacontology-custodial:violatesRelationship
cacontology-custodial:violationPattern
cacontology-custodial:violationSeverity
cacontology-custodial:violationType
cacontology-custodial:vulnerabilityFactor
cacontology-detection:ageEstimate
cacontology-detection:confidenceScore
cacontology-detection:copineClassification
cacontology-detection:detectedContent
cacontology-detection:detectionDuration
cacontology-detection:detectionThreshold
cacontology-detection:falsePositiveReason
cacontology-detection:generatedHash
cacontology-detection:hasDetectionBeginPoint
cacontology-detection:hasDetectionEndPoint
cacontology-detection:hasPhaseBeginPoint
cacontology-detection:hasPhaseEndPoint
cacontology-detection:hasRoleBeginPoint
cacontology-detection:hasRoleEndPoint
cacontology-detection:hashAlgorithm
cacontology-detection:matchType
cacontology-detection:matchedDatabase
cacontology-detection:modelVersion
cacontology-detection:perceptualHashValue
cacontology-detection:phaseDuration
cacontology-detection:photoDNAValue
cacontology-detection:reviewDecision
cacontology-detection:reviewedBy
cacontology-detection:roleDuration
cacontology-detection:sarClassification
cacontology-detection:similarityScore
cacontology-detection:tannerStage
cacontology-educational1:academicActivity
cacontology-educational1:accessLevel
...contology-educational1:activatesMandatoryReporting
cacontology-educational1:actualAge
cacontology-educational1:addressesVulnerability
cacontology-educational1:assignmentType
cacontology-educational1:attendsInstitution
cacontology-educational1:bailAmount
cacontology-educational1:bodyPartTouched
cacontology-educational1:bondAmount
cacontology-educational1:chargeCount
cacontology-educational1:chargeDegree
cacontology-educational1:chargesDefendant
cacontology-educational1:classroomNumber
cacontology-educational1:collectsEvidence
cacontology-educational1:communicatesVia
cacontology-educational1:contactDuration
cacontology-educational1:contactFrequency
cacontology-educational1:contactType
cacontology-educational1:coordinatesWith
cacontology-educational1:corroboratesAccount
cacontology-educational1:deceivesVictim
cacontology-educational1:deceptionDuration
cacontology-educational1:degradationLevel
cacontology-educational1:degradesVictim
cacontology-educational1:disclosesTo
cacontology-educational1:disclosureMethod
cacontology-educational1:documentsExploitation
cacontology-educational1:documentsHarassment
cacontology-educational1:duringActivity
cacontology-educational1:educatorAge
cacontology-educational1:employedAt
cacontology-educational1:employmentDuration
cacontology-educational1:enhancedBy
cacontology-educational1:escalatesTo
cacontology-educational1:evidenceLocation
cacontology-educational1:evidenceType
cacontology-educational1:exploitationDuration
cacontology-educational1:exploitationLocation
cacontology-educational1:exploitationMethod
cacontology-educational1:exploitsIsolation
cacontology-educational1:exploitsPosition
cacontology-educational1:exploitsVulnerability
cacontology-educational1:fakeAccountCount
cacontology-educational1:followedBySupervision
cacontology-educational1:forceLevel
cacontology-educational1:forciblyTouches
cacontology-educational1:gradeLevel
cacontology-educational1:gradeRange
cacontology-educational1:harassmentContent
cacontology-educational1:harassmentFrequency
cacontology-educational1:harassmentMedium
cacontology-educational1:hasVulnerability
cacontology-educational1:identifiesVulnerability
cacontology-educational1:impersonatedAge
cacontology-educational1:impersonatesAge
cacontology-educational1:implementsSafeguarding
cacontology-educational1:institutionCount
cacontology-educational1:institutionLocation
cacontology-educational1:institutionReputation
cacontology-educational1:institutionType
cacontology-educational1:interviewsVictim
cacontology-educational1:intimidatesStudent
cacontology-educational1:investigatesExploitation
cacontology-educational1:involvesPhysicalContact
...cacontology-educational1:involvesWrittenHarassment
cacontology-educational1:isolationLevel
cacontology-educational1:leveragesAcademicPower
cacontology-educational1:linkedToLocation
...cacontology-educational1:maintainsMultipleAccounts
...contology-educational1:mandatoryReportingTriggered
cacontology-educational1:maximumSentence
cacontology-educational1:notifiesPrincipal
cacontology-educational1:occursInContext
cacontology-educational1:platformUsed
cacontology-educational1:policeResponseTime
cacontology-educational1:providedBy
cacontology-educational1:providesEvidence
cacontology-educational1:receivesReport
cacontology-educational1:reportingDelay
cacontology-educational1:reportingStaffRole
cacontology-educational1:reportsTo
cacontology-educational1:requiresRegistration
cacontology-educational1:resultsinCharge
cacontology-educational1:schoolAddress
cacontology-educational1:selectsVictim
cacontology-educational1:sendsContent
cacontology-educational1:sentenceLength
cacontology-educational1:solicitsFrom
cacontology-educational1:studentPopulation
cacontology-educational1:studentsPresent
cacontology-educational1:subjectTaught
cacontology-educational1:supervisionDuration
cacontology-educational1:takesPlaceIn
cacontology-educational1:targetAgeRange
cacontology-educational1:targetGender
cacontology-educational1:targetingMethod
cacontology-educational1:targetsAgeGroup
cacontology-educational1:targetsStudent
cacontology-educational1:targetsVictim
cacontology-educational1:timeOfDay
cacontology-educational1:touchesVictim
...acontology-educational1:triggersPoliceNotification
cacontology-educational1:usesImpersonation
cacontology-educational1:usesMethod
cacontology-educational1:victimCount
cacontology-educational1:vulnerabilityFactor
cacontology-educational1:witnessesExploitation
cacontology-educational1:writtenContent
cacontology-educational1:writtenOn
cacontology-educational1:yearsOfExperience
cacontology-enterprises:accessLevel
cacontology-enterprises:advancementCriteria
cacontology-enterprises:altAccountCount
cacontology-enterprises:buildsVictimTrust
cacontology-enterprises:channelCount
cacontology-enterprises:coercesIntoSelfHarm
cacontology-enterprises:coercionEffectiveness
cacontology-enterprises:coercionSeverity
cacontology-enterprises:compilationComplexity
cacontology-enterprises:compilesContent
cacontology-enterprises:containsVictimContent
cacontology-enterprises:contentNotoriety
cacontology-enterprises:contentValue
cacontology-enterprises:contentVolumeItems
...cacontology-enterprises:coordinatesAcrossPlatforms
cacontology-enterprises:coordinatesActivities
cacontology-enterprises:correlatesEvidence
...ontology-enterprises:createsVictimizationSituation
cacontology-enterprises:degradationLevel
cacontology-enterprises:editingQuality
cacontology-enterprises:encryptionLevel
cacontology-enterprises:evidenceQuality
cacontology-enterprises:exploitsVictim
cacontology-enterprises:hasCoercionEventBeginDate
cacontology-enterprises:hasEncryptionCapability
cacontology-enterprises:hasExploitationRelation
cacontology-enterprises:hasFormationEvent
cacontology-enterprises:hasHierarchy
cacontology-enterprises:hasInnerCore
cacontology-enterprises:hasInvestigationBeginDate
cacontology-enterprises:hasLeadershipRelation
cacontology-enterprises:hasMember
cacontology-enterprises:hasNetworkCell
cacontology-enterprises:hasNetworkComponent
...cacontology-enterprises:hasNetworkNotorietyQuality
cacontology-enterprises:hasOperationalBeginDate
cacontology-enterprises:hasOperationalEndDate
cacontology-enterprises:hasOperationalPeriod
cacontology-enterprises:hasRecruitmentMode
cacontology-enterprises:hierarchyComplexity
cacontology-enterprises:historicallyDependsOn
cacontology-enterprises:holdsLeadershipRole
cacontology-enterprises:identifiesNetworkMember
...acontology-enterprises:identityCorrelationAccuracy
cacontology-enterprises:ideologicalFramework
cacontology-enterprises:infiltratesNetwork
cacontology-enterprises:infiltrationDuration
cacontology-enterprises:innerCoreSize
cacontology-enterprises:leadershipCount
cacontology-enterprises:maintainsAltAccounts
cacontology-enterprises:managesPrivateGroups
cacontology-enterprises:mapsNetworkStructure
cacontology-enterprises:membershipLevel
cacontology-enterprises:membershipRequirements
...cacontology-enterprises:networkMappingCompleteness
cacontology-enterprises:networkNotoriety
cacontology-enterprises:networkSize
cacontology-enterprises:operatesEnterprise
cacontology-enterprises:operatesInSituation
cacontology-enterprises:operationalScope
cacontology-enterprises:participatesInCoercion
cacontology-enterprises:participatesInInnerCore
cacontology-enterprises:participatesInRecruitment
cacontology-enterprises:platformCount
cacontology-enterprises:producesLorebook
cacontology-enterprises:recruitsMembers
cacontology-enterprises:selfHarmType
...acontology-enterprises:socialEngineeringComplexity
cacontology-enterprises:targetingPrecision
cacontology-enterprises:targetsVulnerability
cacontology-enterprises:trustBuildingDuration
cacontology-enterprises:usesAsCurrency
cacontology-enterprises:utilizesEncryptedChannels
cacontology-enterprises:vulnerabilityType
cacontology-forensics:acquisitionMethod
cacontology-forensics:analysesUserBehavior
...acontology-forensics:analyzesCommunicationPatterns
cacontology-forensics:analyzesNetworkTraffic
cacontology-forensics:analyzesTemporalPatterns
cacontology-forensics:arrestsResulting
cacontology-forensics:automationPercentage
cacontology-forensics:behaviorPatternsIdentified
...acontology-forensics:behavioralFingerprintsCreated
cacontology-forensics:caseExhibitNumber
...cacontology-forensics:communicationGraphComplexity
...ology-forensics:coordinatesInternationalProcessing
cacontology-forensics:correlatesAcrossPlatforms
cacontology-forensics:correlatesContent
cacontology-forensics:correlationLatency
cacontology-forensics:correlationStrength
...acontology-forensics:createsBehavioralFingerprints
cacontology-forensics:crossBorderDataSharing
cacontology-forensics:crossPlatformMatches
cacontology-forensics:custodyReason
cacontology-forensics:custodyTransferredFrom
cacontology-forensics:custodyTransferredTo
cacontology-forensics:dataTransferVolume
cacontology-forensics:databasesIntegrated
cacontology-forensics:detectionAccuracy
cacontology-forensics:detectionMethod
cacontology-forensics:devicesRecovered
cacontology-forensics:discoversNetworks
cacontology-forensics:distributesProcessing
cacontology-forensics:enablesRealTimeCorrelation
cacontology-forensics:evidenceLocation
cacontology-forensics:evidenceSeized
cacontology-forensics:evidenceVolumeTerabytes
cacontology-forensics:falsePositiveRate
cacontology-forensics:featureVectorsUsed
cacontology-forensics:filesProcessedMillions
cacontology-forensics:fingerprintAccuracy
cacontology-forensics:forensicCopy
cacontology-forensics:forensicLabsInvolved
cacontology-forensics:forensicPhaseDuration
cacontology-forensics:forensicReport
cacontology-forensics:generatesRealTimeAlerts
cacontology-forensics:generatesTriageResults
cacontology-forensics:geographicDistribution
cacontology-forensics:geographicRadius
cacontology-forensics:geospatialAccuracy
cacontology-forensics:hasForensicPhaseBeginPoint
cacontology-forensics:hasForensicPhaseEndPoint
cacontology-forensics:hasRoleBeginPoint
cacontology-forensics:hasRoleEndPoint
cacontology-forensics:hashDatabaseSize
cacontology-forensics:hashMatchesFound
...ontology-forensics:identifiesCrossPlatformActivity
...cacontology-forensics:identifiesGeographicClusters
cacontology-forensics:identifiesNetworkAnomalies
cacontology-forensics:identifiesPatterns
cacontology-forensics:identifiesTemporalClusters
...ontology-forensics:integratesIntelligenceDatabases
cacontology-forensics:intelligenceHits
cacontology-forensics:investigationDuration
cacontology-forensics:involvesForensicLab
cacontology-forensics:k9AssistanceProvided
cacontology-forensics:locationPointsAnalyzed
cacontology-forensics:mlModelAccuracy
cacontology-forensics:networkConnectionsFound
cacontology-forensics:networkSessionsAnalyzed
cacontology-forensics:parallelProcessingEnabled
cacontology-forensics:performsGeospatialAnalysis
cacontology-forensics:performsHashAnalysis
cacontology-forensics:platformCorrelationScore
cacontology-forensics:platformsAnalyzed
cacontology-forensics:priorityClassification
cacontology-forensics:processesEvidence
cacontology-forensics:processingNodes
cacontology-forensics:processingSpeed
cacontology-forensics:processingTimeframeDays
cacontology-forensics:producesIntelligence
cacontology-forensics:queriesIntelligenceDatabase
cacontology-forensics:queryResponseTime
cacontology-forensics:realTimeAlerts
cacontology-forensics:recoveryMethod
cacontology-forensics:referralsReceived
cacontology-forensics:riskLevelsAssigned
cacontology-forensics:searchWarrantAssisted
cacontology-forensics:sharesProcessingLoad
cacontology-forensics:sourceHash
cacontology-forensics:standardizedProcessing
cacontology-forensics:streamingDataRate
...ontology-forensics:suspiciousConnectionsIdentified
cacontology-forensics:temporalPatternsIdentified
cacontology-forensics:temporalResolution
cacontology-forensics:timeRangeAnalyzed
cacontology-forensics:timelineEvent
cacontology-forensics:trainingDataSize
cacontology-forensics:trainsCorrelationModel
cacontology-forensics:triageAccuracy
cacontology-forensics:triagesEvidence
cacontology-forensics:userAccountsAnalyzed
cacontology-forensics:utilisesSystem
cacontology-forensics:utilizesMachineLearning
cacontology-forensics:verificationHash
cacontology-forensics:victimAgeRange
cacontology-forensics:victimGeographicOrigin
cacontology-forensics:victimsIdentifiedCount
cacontology-forensics:writeBlockingUsed
cacontology-grooming:acceleratesTrust
cacontology-grooming:accountsUsed
cacontology-grooming:administrationMethod
cacontology-grooming:anonymousContactMethod
cacontology-grooming:behaviorDuration
cacontology-grooming:bypassesPhase
cacontology-grooming:commercialOfferType
cacontology-grooming:communicationFrequency
cacontology-grooming:contactFrequency
cacontology-grooming:contentType
cacontology-grooming:crossesStateBoundaries
cacontology-grooming:distressIndicators
cacontology-grooming:economicIncentiveAmount
cacontology-grooming:emotionalTone
cacontology-grooming:escalationRate
cacontology-grooming:escalationTimeframe
cacontology-grooming:evidenceValue
cacontology-grooming:exchangesContent
cacontology-grooming:exhibitsPattern
cacontology-grooming:explicitnessLevel
cacontology-grooming:exploitsOpportunity
cacontology-grooming:exploitsReputation
cacontology-grooming:facilitatesWithSubstance
cacontology-grooming:gameContext
cacontology-grooming:groomingPhaseDuration
cacontology-grooming:groomingStage
cacontology-grooming:hasGroomingPhaseBeginPoint
cacontology-grooming:hasGroomingPhaseEndPoint
cacontology-grooming:hasRoleBeginPoint
cacontology-grooming:hasRoleEndPoint
cacontology-grooming:hasVulnerability
cacontology-grooming:identityVerificationRequired
cacontology-grooming:impairmentLevel
cacontology-grooming:impersonatedRole
cacontology-grooming:impersonatesRole
cacontology-grooming:initialContactPretense
cacontology-grooming:initiationMethod
cacontology-grooming:institutionPrestige
cacontology-grooming:institutionsTargeted
cacontology-grooming:involvesInterstateTransport
cacontology-grooming:isolationMethod
cacontology-grooming:leveragesPosition
cacontology-grooming:manipulationTechnique
cacontology-grooming:meetingLocationSpecified
cacontology-grooming:monetizationTimeframe
cacontology-grooming:occursInSpace
cacontology-grooming:opportunityType
cacontology-grooming:participantCount
cacontology-grooming:patternConfidence
cacontology-grooming:physicalLocation
cacontology-grooming:platformAnonymityLevel
cacontology-grooming:primaryPlatform
cacontology-grooming:progressesToPhysicalMeeting
cacontology-grooming:progressionDuration
cacontology-grooming:propositionExplicitness
cacontology-grooming:prosecutionRelevance
cacontology-grooming:recruitmentDirectness
cacontology-grooming:requestsSecrecy
cacontology-grooming:rolePlayingTactic
cacontology-grooming:ruleStructureDescription
cacontology-grooming:sameDayProgression
cacontology-grooming:seekingHelp
cacontology-grooming:skippedPhases
cacontology-grooming:substanceType
cacontology-grooming:targetsInstitution
cacontology-grooming:targetsVictim
cacontology-grooming:timeOfContact
cacontology-grooming:transitionSpeed
cacontology-grooming:transitionsToLocation
cacontology-grooming:transportationProposed
cacontology-grooming:trustExploitationSpeed
cacontology-grooming:usesGifts
cacontology-grooming:usesThreats
cacontology-grooming:utilizesPlatformFeature
cacontology-grooming:victimCompliance
cacontology-grooming:victimImpact
cacontology-grooming:vulnerabilityType
cacontology-gufo:academicYearBeginTimePoint
cacontology-gufo:aiGenerationTimePoint
cacontology-gufo:analysisCompletionTimePoint
cacontology-gufo:assignmentBeginTime
cacontology-gufo:assignmentEndTime
cacontology-gufo:closureBeginTime
cacontology-gufo:closureTime
cacontology-gufo:coercionBeginTime
cacontology-gufo:coercionEndTime
cacontology-gufo:coordinationBeginTime
cacontology-gufo:detectionTimePoint
cacontology-gufo:discoveryBeginTime
cacontology-gufo:dispositionBeginTime
cacontology-gufo:employmentTerminationTimePoint
cacontology-gufo:escalationBeginTime
cacontology-gufo:escalationPeakTime
cacontology-gufo:evidenceCollectionTime
cacontology-gufo:exploitationBeginTime
cacontology-gufo:exploitationDuration
cacontology-gufo:exploitationEndTime
...acontology-gufo:exploitationFirstIncidentTimePoint
cacontology-gufo:forfeitureBeginTime
cacontology-gufo:forfeitureCompletionTime
cacontology-gufo:forfeitureEndTime
cacontology-gufo:generationDuration
cacontology-gufo:institutionalReportingTimePoint
cacontology-gufo:intakeBeginTime
cacontology-gufo:investigationBeginTime
cacontology-gufo:penaltyImpositionTime
cacontology-gufo:phaseTransitionTime
cacontology-gufo:practiceSessionBeginTime
cacontology-gufo:practiceSessionEndTime
cacontology-gufo:prosecutionBeginTime
cacontology-gufo:reportingTime
cacontology-gufo:restraintBeginTime
cacontology-gufo:reviewBeginTime
cacontology-gufo:reviewEndTime
cacontology-gufo:seizureTime
cacontology-gufo:sentencingTime
cacontology-gufo:triageCompletionTime
cacontology-gufo:trialBeginTime
cacontology-gufo:workflowBeginTime
cacontology-gufo:workflowEndTime
cacontology-impact:addressesHarm
cacontology-impact:admissionReason
cacontology-impact:agencyCount
cacontology-impact:assessesVictim
cacontology-impact:assessmentDate
cacontology-impact:assessmentType
cacontology-impact:coordinatedBy
cacontology-impact:coordinationComplexity
cacontology-impact:dischargeCondition
cacontology-impact:dischargeDate
cacontology-impact:documentedBy
cacontology-impact:duration
cacontology-impact:emergencyCallLocation
cacontology-impact:extractionComplexity
cacontology-impact:facilitatedBy
cacontology-impact:facilitatedByFactor
cacontology-impact:facilitatesReintegration
cacontology-impact:familyContactEstablished
cacontology-impact:followedByDischarge
cacontology-impact:frequency
cacontology-impact:functioningLevel
cacontology-impact:hasImpactPhaseBeginPoint
cacontology-impact:hasImpactPhaseEndPoint
cacontology-impact:hasRoleBeginPoint
cacontology-impact:hasRoleEndPoint
cacontology-impact:hometownLocation
cacontology-impact:hospitalName
cacontology-impact:hospitalStayDuration
cacontology-impact:identifiesHarm
cacontology-impact:impactArea
cacontology-impact:impactPhaseDuration
cacontology-impact:impactSeverity
cacontology-impact:impededBy
cacontology-impact:impededByBarrier
cacontology-impact:includesTransportation
cacontology-impact:indicatorType
cacontology-impact:informsRestitution
cacontology-impact:informsSafetyPlanning
cacontology-impact:intensity
cacontology-impact:interventionType
cacontology-impact:jurisdictionsInvolved
cacontology-impact:lifeAreaAffected
cacontology-impact:manifestsAs
cacontology-impact:milestoneDate
cacontology-impact:milestoneDescription
cacontology-impact:necessitatesAssessment
cacontology-impact:ongoingDangerLevel
cacontology-impact:onsetDate
cacontology-impact:partOfRecovery
cacontology-impact:participatesInResponse
cacontology-impact:prognosis
cacontology-impact:progressionPattern
cacontology-impact:providedBy
cacontology-impact:providesSpecializedSupport
cacontology-impact:receivedTreatment
cacontology-impact:recoveryStage
cacontology-impact:recoveryTimeframe
cacontology-impact:reintegrationDuration
cacontology-impact:relevantToSentencing
cacontology-impact:reportedSituation
cacontology-impact:responseTime
cacontology-impact:resultedFrom
cacontology-impact:resultsinExtraction
cacontology-impact:resultsinHospitalization
cacontology-impact:returnsTo
cacontology-impact:reunitesWith
cacontology-impact:safetyPlanType
cacontology-impact:serviceDuration
cacontology-impact:serviceProvider
cacontology-impact:serviceType
cacontology-impact:sessionCount
cacontology-impact:severity
cacontology-impact:severityLevel
cacontology-impact:transportationCost
cacontology-impact:transportationDestination
cacontology-impact:transportationType
cacontology-impact:traumaType
cacontology-impact:treatedAt
cacontology-impact:treatmentDuration
cacontology-impact:treatmentModality
cacontology-impact:treatmentOutcome
cacontology-impact:triggersResponse
cacontology-infrastructure:accountsFrozen
cacontology-infrastructure:analysesAccess
cacontology-infrastructure:analysesInfrastructure
cacontology-infrastructure:anonymityLevel
cacontology-infrastructure:bandwidthCapacity
cacontology-infrastructure:cloudPlatform
cacontology-infrastructure:containsComponent
cacontology-infrastructure:cryptoCurrencyTypes
cacontology-infrastructure:dataVolumeMirrored
cacontology-infrastructure:distributedAcross
cacontology-infrastructure:domainCount
cacontology-infrastructure:domainsSinkholed
cacontology-infrastructure:encryptionStrength
cacontology-infrastructure:financialComplexity
cacontology-infrastructure:freezesAccounts
cacontology-infrastructure:geographicLocations
cacontology-infrastructure:hasAnalysisAccuracy
cacontology-infrastructure:hasAnalysisBeginPoint
cacontology-infrastructure:hasAnalysisDepth
cacontology-infrastructure:hasAnalysisEndPoint
cacontology-infrastructure:hasAnalysisTimeliness
...contology-infrastructure:hasAnonymityEffectiveness
cacontology-infrastructure:hasFinancialComplexity
...acontology-infrastructure:hasFinancialTraceability
...ntology-infrastructure:hasInfrastructureBeginPoint
...contology-infrastructure:hasInfrastructureEndPoint
...tology-infrastructure:hasInfrastructurePerformance
...tology-infrastructure:hasInfrastructureReliability
...tology-infrastructure:hasInfrastructureScalability
...logy-infrastructure:hasInfrastructureVulnerability
...acontology-infrastructure:hasObfuscationComplexity
cacontology-infrastructure:hasPhaseBeginPoint
cacontology-infrastructure:hasPhaseEndPoint
cacontology-infrastructure:hasRoleBeginPoint
cacontology-infrastructure:hasRoleEndPoint
cacontology-infrastructure:hasSecurityStrength
cacontology-infrastructure:hasTakedownBeginPoint
...cacontology-infrastructure:hasTakedownCompleteness
...acontology-infrastructure:hasTakedownEffectiveness
cacontology-infrastructure:hasTakedownEndPoint
cacontology-infrastructure:hasTakedownSpeed
cacontology-infrastructure:hostedBy
cacontology-infrastructure:hostingProvider
cacontology-infrastructure:leadsToCriminalCharges
cacontology-infrastructure:monthlyRevenue
cacontology-infrastructure:networkComplexity
cacontology-infrastructure:obfuscationMethods
cacontology-infrastructure:paymentMethods
cacontology-infrastructure:protectedBy
cacontology-infrastructure:providesEvidence
cacontology-infrastructure:resultsinSeizure
cacontology-infrastructure:revealsTopology
cacontology-infrastructure:seizesServers
cacontology-infrastructure:serverCount
cacontology-infrastructure:serversSeized
cacontology-infrastructure:sinkholeDomains
cacontology-infrastructure:storageCapacity
cacontology-infrastructure:subscriptionTiers
cacontology-infrastructure:takedownDuration
cacontology-infrastructure:targetsInfrastructure
cacontology-infrastructure:tracesPayments
cacontology-infrastructure:userGeographicSpread
cacontology-infrastructure:usesPaymentSystem
cacontology-institutional:abuseEndYear
cacontology-institutional:abuseStartYear
cacontology-institutional:authorityLevel
cacontology-institutional:chargeCount
cacontology-institutional:childrenServed
cacontology-institutional:concealsFrom
cacontology-institutional:concealsTravel
cacontology-institutional:documentsPattern
cacontology-institutional:donorCount
cacontology-institutional:enablesExploitation
cacontology-institutional:exercisesAuthorityOver
cacontology-institutional:existentiallyDependsOn
cacontology-institutional:experiencesExploitation
cacontology-institutional:exploitationTypeCount
cacontology-institutional:exploitsRole
cacontology-institutional:exploitsVulnerability
cacontology-institutional:facilitatedBy
...cacontology-institutional:foreignResidenceDuration
cacontology-institutional:foundedBy
cacontology-institutional:foundingYear
cacontology-institutional:fundingAmount
cacontology-institutional:genericallyDependsOn
cacontology-institutional:hasAuthorityLevel
cacontology-institutional:hasExploitationEndDate
...ntology-institutional:hasExploitationSeverityLevel
...cacontology-institutional:hasExploitationStartDate
...contology-institutional:hasInstitutionFoundingDate
...logy-institutional:hasInstitutionalReputationLevel
cacontology-institutional:hasIsolationDegree
cacontology-institutional:hasOperationEndDate
cacontology-institutional:hasOversightLevel
cacontology-institutional:hasRoleEndDate
cacontology-institutional:hasRoleStartDate
cacontology-institutional:hasSystematicityDegree
cacontology-institutional:hasTravelDate
cacontology-institutional:hasTrustLevel
cacontology-institutional:hasVulnerabilityLevel
cacontology-institutional:historicallyDependsOn
cacontology-institutional:holdsRole
cacontology-institutional:impactsVictim
cacontology-institutional:investigatedBy
...acontology-institutional:isComponentOfExploitation
cacontology-institutional:isPartOfInstitution
cacontology-institutional:isPartOfInvestigation
cacontology-institutional:isolationDegree
cacontology-institutional:maintainedBy
cacontology-institutional:manipulates
cacontology-institutional:manipulationTactics
cacontology-institutional:occursInContext
cacontology-institutional:occursWithin
cacontology-institutional:operatesInCountry
...logy-institutional:operatesInJurisdictionalContext
cacontology-institutional:operationDurationYears
...acontology-institutional:participatesInInstitution
cacontology-institutional:perpetratesExploitation
cacontology-institutional:prosecutedInContext
cacontology-institutional:prosecutedUnder
cacontology-institutional:prosecutionJurisdiction
cacontology-institutional:providesTestimony
cacontology-institutional:receivesSupport
cacontology-institutional:resultsInSentence
cacontology-institutional:revealsPattern
cacontology-institutional:sentenceLength
cacontology-institutional:servesPopulation
cacontology-institutional:targetsPopulation
cacontology-institutional:travelFrequency
cacontology-institutional:travelPatternYears
cacontology-institutional:travelPurposeClaimed
cacontology-institutional:travelsFrom
cacontology-institutional:travelsTo
cacontology-institutional:trustLevelExploited
cacontology-institutional:undertakesTravelFor
cacontology-institutional:victimCount
cacontology-institutional:victimTestimoniesCount
cacontology-institutional:vulnerabilityType
...gy-institutional:yearsFromVictimizationToTestimony
cacontology-international:alertResponseTime
cacontology-international:alertingPartner
cacontology-international:analysesUsers
cacontology-international:automatedMatchAccuracy
cacontology-international:channelsMonitored
cacontology-international:communicationLatency
cacontology-international:contributesToFusion
cacontology-international:cooperationResponseTime
cacontology-international:coordinatedByEuropol
...acontology-international:coordinatesGlobalTakedown
cacontology-international:coordinatesHotlines
...ology-international:coordinatesInternationalEffort
cacontology-international:coordinatesProsecution
cacontology-international:coordinatesResources
cacontology-international:coordinatesWith
cacontology-international:coordinatingAgency
cacontology-international:coordinationComplexity
...ontology-international:coordinationComplexityLevel
cacontology-international:coordinationMethod
cacontology-international:crossBorderCapability
cacontology-international:crossReferencesFound
cacontology-international:dataLakeSize
cacontology-international:databasesIntegrated
cacontology-international:deploysTeam
cacontology-international:disruptionEffectiveness
...ntology-international:disruptsInternationalNetwork
cacontology-international:emergencyResponseTime
...cacontology-international:enablesAutomatedMatching
cacontology-international:enablesRealTimeSharing
cacontology-international:encryptionLevel
...ntology-international:europeanMemberStatesInvolved
cacontology-international:evidenceSharingVolume
...ontology-international:evidenceVolumeInternational
cacontology-international:executesQuery
cacontology-international:feedsDataLake
cacontology-international:forensicTeamsDeployed
cacontology-international:fusionAccuracy
...acontology-international:generatesThreatAssessment
cacontology-international:globalCoverage
cacontology-international:informationSharingLevel
cacontology-international:integratesToNetwork
cacontology-international:intelligenceChannels
cacontology-international:intelligenceSources
...tology-international:internationalPartnersInvolved
cacontology-international:investigativeTeamSize
cacontology-international:involvesCountries
cacontology-international:jurisdictionCount
cacontology-international:languageSupport
cacontology-international:managedBy
cacontology-international:multilateralAgreement
cacontology-international:operatesInCountry
cacontology-international:operationContext
cacontology-international:operationDurationMonths
cacontology-international:participatesIn
cacontology-international:partnerCountryCount
cacontology-international:performsCrossReference
cacontology-international:processesDistributed
cacontology-international:processesEvidence
cacontology-international:processingNodeCount
...cacontology-international:prosecutionsCrossCountry
cacontology-international:providesExpertise
cacontology-international:queryPerformanceMs
...cacontology-international:receivesIntelligenceFeed
cacontology-international:referredTo
cacontology-international:requiresAssistance
cacontology-international:resourcesCoordinated
...acontology-international:responseTimeInternational
cacontology-international:resultsInSeizure
cacontology-international:sharesDataWith
...tology-international:sharesEvidenceInternationally
cacontology-international:sharesIntelligence
cacontology-international:simultaneousCountries
cacontology-international:simultaneousOperations
...acontology-international:specializedExpertiseAreas
cacontology-international:supportedBy
cacontology-international:synchronizationAccuracy
cacontology-international:synchronizesOperations
cacontology-international:targetsPlatform
cacontology-international:threatLevelAssessed
cacontology-international:transmitsAlert
cacontology-international:treatyBasis
cacontology-international:treatyMechanism
cacontology-international:triggersAlert
...acontology-international:triggersEmergencyProtocol
cacontology-international:undercoverCoordination
cacontology-international:userCountriesAffected
cacontology-international:usersAnalyzedMillions
cacontology-international:utilizesSecureChannel
cacontology-legal:appliesToCountry
cacontology-legal:assessedBy
cacontology-legal:basedOnModel
cacontology-legal:concernsLegalFramework
cacontology-legal:countriesAnalyzed
cacontology-legal:coveragePercentage
cacontology-legal:effectivenessScore
cacontology-legal:enablesExtradition
cacontology-legal:facilitatesCooperation
cacontology-legal:harmonizationProgress
cacontology-legal:hasAssessmentReliability
cacontology-legal:hasCapacityLevel
cacontology-legal:hasComplianceLevel
cacontology-legal:hasCooperationIntensity
cacontology-legal:hasCoverageCompleteness
cacontology-legal:hasDataQuality
cacontology-legal:hasDevelopmentProgress
cacontology-legal:hasExtraditionEfficiency
cacontology-legal:hasGapSeverity
cacontology-legal:hasHarmonizationDegree
cacontology-legal:hasImplementationQuality
cacontology-legal:hasLegalEffectiveness
cacontology-legal:hasLegalRobustness
cacontology-legal:hasReformUrgency
cacontology-legal:hasStandardCompliance
cacontology-legal:hasTreatyStrength
cacontology-legal:identifiesGap
cacontology-legal:implementationStatus
cacontology-legal:isAssessedBy
cacontology-legal:isComponentOf
cacontology-legal:legalAlignmentLevel
cacontology-legal:legalSystemType
cacontology-legal:legislativeCompliance
cacontology-legal:measuredBy
cacontology-legal:partOfFramework
cacontology-legal:participatesIn
cacontology-legal:policyGapSeverity
cacontology-legal:providesAssistance
cacontology-legal:reformPriority
cacontology-legal:requiresReform
cacontology-legal:standsInQualifiedCompliance
cacontology-multi:agencyCount
cacontology-multi:agencyLevelsMixed
cacontology-multi:agencyParticipantCount
cacontology-multi:agentParticipantCount
cacontology-multi:arrestsNationwide
cacontology-multi:authorizedBy
cacontology-multi:casesSubmittedForProsecution
cacontology-multi:chargeTypesDiversity
cacontology-multi:childrenRescued
cacontology-multi:childrenRescuedCount
cacontology-multi:communicationBarriers
cacontology-multi:communicationProtocol
cacontology-multi:communityOutreachEffectiveness
cacontology-multi:complianceViolationsFound
cacontology-multi:complianceVisitsCount
cacontology-multi:coordinatedBy
cacontology-multi:coordinatesAgencies
cacontology-multi:coordinatesComplianceChecks
cacontology-multi:coordinatesNationwide
cacontology-multi:coordinationCenterLocation
cacontology-multi:coordinationChallenges
cacontology-multi:coordinationComplexity
cacontology-multi:coordinationMechanism
cacontology-multi:coordinationPhaseDuration
cacontology-multi:costSharingArrangement
cacontology-multi:countiesInvolved
cacontology-multi:coversState
cacontology-multi:crossStateCommunication
cacontology-multi:crossesBorders
cacontology-multi:crossingDocumentation
cacontology-multi:deploysAgents
cacontology-multi:destinationState
cacontology-multi:diplomaticChannels
cacontology-multi:disclosureToArrestHours
cacontology-multi:enablesRapidResponse
cacontology-multi:facilitatedByCoordination
cacontology-multi:facilitatesChildRescue
cacontology-multi:fbiFieldOfficesInvolved
cacontology-multi:governedByAgreement
cacontology-multi:grandJuryAcceptances
cacontology-multi:handoffType
cacontology-multi:handsOnArrestsCount
cacontology-multi:hasCoordinationPhaseBeginPoint
cacontology-multi:hasCoordinationPhaseEndPoint
cacontology-multi:hasRoleBeginPoint
cacontology-multi:hasRoleEndPoint
cacontology-multi:hostedBy
cacontology-multi:identifiesVictims
cacontology-multi:informationSharingLevel
cacontology-multi:investigationScope
cacontology-multi:investigationsInitiated
cacontology-multi:involvesAgency
cacontology-multi:involvesFBIFieldOffice
cacontology-multi:involvesStateLineCrossing
...cacontology-multi:involvesTraffickingInvestigation
cacontology-multi:jurisdictionCount
cacontology-multi:jurisdictionTriggerType
cacontology-multi:jurisdictionalConflicts
cacontology-multi:languageBarriers
cacontology-multi:leadBy
cacontology-multi:legalComplexity
cacontology-multi:meetingFrequency
cacontology-multi:memberAgencyCount
cacontology-multi:newVictimsIdentified
cacontology-multi:operatesInJurisdiction
cacontology-multi:operationDuration
cacontology-multi:operationDurationDays
cacontology-multi:operationName
cacontology-multi:operationPhase
cacontology-multi:operationSuccessRating
cacontology-multi:originatingState
cacontology-multi:personnelAssigned
cacontology-multi:primaryJurisdiction
cacontology-multi:prosecutionAvoidanceBehavior
cacontology-multi:providesAssistanceTo
cacontology-multi:requestsAssistanceFrom
cacontology-multi:requiresHandoff
cacontology-multi:rescuesChildren
cacontology-multi:resourceType
cacontology-multi:resourceValue
cacontology-multi:searchWarrantsExecuted
cacontology-multi:sharesInformationWith
cacontology-multi:sharesResourcesWith
cacontology-multi:sharingDuration
cacontology-multi:spansCounties
cacontology-multi:specializedUnitsDeployed
cacontology-multi:statesCrossed
cacontology-multi:statesInvolved
cacontology-multi:statewideCoverage
cacontology-multi:successMetrics
cacontology-multi:targetStrategy
cacontology-multi:targetTypeCount
cacontology-multi:targetsOffenderType
cacontology-multi:taskForceDuration
cacontology-multi:taskForceType
cacontology-multi:taskForcesInvolved
cacontology-multi:timeZoneChallenges
cacontology-multi:totalArrests
cacontology-multi:traffickingCasesIdentified
cacontology-multi:transportationIntent
cacontology-multi:transportationMethod
cacontology-multi:treatyBasis
cacontology-multi:triggeredByOutreach
cacontology-multi:triggersJurisdiction
cacontology-multi:uncoversCrossStateEvidence
cacontology-multi:usAttorneyOfficesInvolved
cacontology-multi:usersForProsecutionMillions
cacontology-multi:utilizesCoordination
cacontology-partnerships:contributesToAnalysis
cacontology-partnerships:cooperatesOn
cacontology-partnerships:cooperationDuration
cacontology-partnerships:coordinatedBy
cacontology-partnerships:coordinatedThrough
cacontology-partnerships:enablesSharing
cacontology-partnerships:generatesRequests
cacontology-partnerships:governedBy
cacontology-partnerships:hasCooperationBeginPoint
cacontology-partnerships:hasCooperationEndPoint
cacontology-partnerships:hasPartnershipBeginPoint
cacontology-partnerships:hasPartnershipEndPoint
cacontology-partnerships:hasPhaseBeginPoint
cacontology-partnerships:hasPhaseEndPoint
cacontology-partnerships:hasRole
cacontology-partnerships:hasRoleBeginPoint
cacontology-partnerships:hasRoleEndPoint
cacontology-partnerships:includesPartner
...cacontology-partnerships:participatesInDevelopment
cacontology-partnerships:participatesInOperation
cacontology-partnerships:partnershipDuration
cacontology-partnerships:phaseDuration
cacontology-partnerships:providesMonitoring
cacontology-partnerships:respondsToEmergency
cacontology-partnerships:roleDuration
cacontology-partnerships:sharesIntelligence
cacontology-partnerships:solicitsHelp
cacontology-physical:associatedWithSubject
cacontology-physical:chainOfCustody
cacontology-physical:containsItem
cacontology-physical:criminalPurpose
cacontology-physical:deviceBrand
cacontology-physical:deviceModel
cacontology-physical:digitalContentFound
cacontology-physical:encryptionStatus
cacontology-physical:evidenceTag
cacontology-physical:evidenceType
cacontology-physical:evidentiarySignificance
cacontology-physical:forensicAnalysisRequired
cacontology-physical:functionalStatus
cacontology-physical:hasAcquisitionRisk
cacontology-physical:hasAnalysisAccuracy
cacontology-physical:hasAnalysisReliability
cacontology-physical:hasContaminationLevel
cacontology-physical:hasCustodyIntegrity
cacontology-physical:hasDocumentationCompleteness
cacontology-physical:hasEvidenceBeginPoint
cacontology-physical:hasEvidenceEndPoint
cacontology-physical:hasEvidenceIntegrity
cacontology-physical:hasEvidenceReliability
cacontology-physical:hasForensicValue
cacontology-physical:hasMethodValidation
cacontology-physical:hasPhaseBeginPoint
cacontology-physical:hasPhaseEndPoint
cacontology-physical:hasPreservationQuality
cacontology-physical:hasProcurementBeginPoint
cacontology-physical:hasProcurementEndPoint
cacontology-physical:hasProcurementSuspicion
cacontology-physical:hasRoleBeginPoint
cacontology-physical:hasRoleEndPoint
cacontology-physical:hasSearchBeginPoint
cacontology-physical:hasSearchCompleteness
cacontology-physical:hasSearchEfficiency
cacontology-physical:hasSearchEndPoint
cacontology-physical:hasSearchThoroughness
cacontology-physical:hasTraceability
cacontology-physical:hiddenCompartment
cacontology-physical:modificationPurpose
cacontology-physical:paymentMethod
cacontology-physical:physicalCondition
cacontology-physical:procuredBy
cacontology-physical:procurementCost
cacontology-physical:procurementDate
cacontology-physical:procurementMethod
cacontology-physical:procurementSource
cacontology-physical:searchDuration
cacontology-physical:searchScope
cacontology-physical:searchWarrant
cacontology-physical:searchingOfficer
cacontology-physical:seizedDuring
cacontology-physical:seizureDate
cacontology-physical:seizureLocation
cacontology-physical:serialNumber
cacontology-physical:storageCapacity
cacontology-physical:tamperEvidence
cacontology-physical:targetAgeGroup
cacontology-physical:witnessPresent
cacontology-platforms:acceptsLegalProcess
cacontology-platforms:accountStatus
cacontology-platforms:accountUsername
cacontology-platforms:actionDuration
cacontology-platforms:ageVerificationMethod
cacontology-platforms:ageVerificationRequired
cacontology-platforms:allowsAnonymousChat
cacontology-platforms:anonymityLevel
cacontology-platforms:anonymousUserDataRetention
cacontology-platforms:contactInitiationMethod
cacontology-platforms:contentRetentionPeriod
cacontology-platforms:contentType
cacontology-platforms:conversationLogging
cacontology-platforms:coordinatedBy
cacontology-platforms:correlatesWithAccount
cacontology-platforms:correlatesWithDevice
cacontology-platforms:crossPlatformAnonymity
cacontology-platforms:crossPlatformMatch
cacontology-platforms:csaiDetectionEnabled
cacontology-platforms:dataDisclosed
cacontology-platforms:deviceType
cacontology-platforms:devicesSearched
cacontology-platforms:discoveredDuring
cacontology-platforms:discoveryTimestamp
cacontology-platforms:emergencyDisclosureCapable
cacontology-platforms:enablesTemporaryAccounts
cacontology-platforms:encryptionLevel
cacontology-platforms:evidenceCategory
cacontology-platforms:evidenceTimestamp
cacontology-platforms:facilitatesRandomMatching
cacontology-platforms:foundOnDevice
cacontology-platforms:foundOnSocialMedia
cacontology-platforms:governedByDisclosurePolicy
cacontology-platforms:guestAccountsAllowed
cacontology-platforms:hasActionBeginPoint
cacontology-platforms:hasActionEndPoint
...contology-platforms:hasContentModerationCapability
cacontology-platforms:hasDataRetentionPolicy
...cacontology-platforms:hasLegalComplianceCapability
cacontology-platforms:hasPhaseBeginPoint
cacontology-platforms:hasPhaseEndPoint
cacontology-platforms:hasPlatformBeginPoint
cacontology-platforms:hasPlatformEndPoint
cacontology-platforms:hasUserVerificationSystem
cacontology-platforms:hashMatchingEnabled
cacontology-platforms:headquarteredIn
...ontology-platforms:identityDisclosureCircumstances
...cacontology-platforms:identityVerificationRequired
cacontology-platforms:legalAuthority
cacontology-platforms:legalProcessContactInfo
cacontology-platforms:legalProcessUsed
cacontology-platforms:logRetentionPeriod
cacontology-platforms:maintainsAnonymityLevel
cacontology-platforms:moderationDecision
cacontology-platforms:moderationMethod
cacontology-platforms:moderationPresence
cacontology-platforms:offersContactOpportunity
cacontology-platforms:operatedBy
cacontology-platforms:operatesInJurisdiction
cacontology-platforms:phaseDuration
cacontology-platforms:platformDuration
cacontology-platforms:platformType
cacontology-platforms:platformsInvestigated
cacontology-platforms:preservationPeriod
cacontology-platforms:primaryUserBase
cacontology-platforms:providesAnonymousFeature
cacontology-platforms:providesOpenChatAccess
cacontology-platforms:requiresRegistration
cacontology-platforms:responseTimeFrame
cacontology-platforms:searchWarrantRequired
cacontology-platforms:socialMediaPlatform
cacontology-platforms:subsidiaryOf
cacontology-platforms:suspensionDuration
cacontology-platforms:suspensionReason
cacontology-platforms:userDataRetentionPeriod
cacontology-platforms:verificationStrength
cacontology-prevention:accessesArchive
cacontology-prevention:activeParticipantCount
cacontology-prevention:addressesSextortion
cacontology-prevention:affiliateOrganizationCount
cacontology-prevention:affiliatedWith
cacontology-prevention:ageGroup
cacontology-prevention:arrestsFromDisclosures
cacontology-prevention:assessesRisk
cacontology-prevention:averageDisclosureTime
cacontology-prevention:averageHelpSeekingTime
cacontology-prevention:averageListeningDuration
cacontology-prevention:communityParticipation
cacontology-prevention:communityReportingIncrease
cacontology-prevention:coordinatedBy
cacontology-prevention:coordinatedWith
cacontology-prevention:coordinatesWith
...acontology-prevention:coordinationMeetingFrequency
cacontology-prevention:courseCompletionRate
cacontology-prevention:courseModuleCount
cacontology-prevention:deliveredBy
...cacontology-prevention:disclosureBarriersAddressed
cacontology-prevention:disclosuresGenerated
cacontology-prevention:discreteAccessCount
cacontology-prevention:distributedViaEmailList
cacontology-prevention:distributedsTo
cacontology-prevention:educatesOn
cacontology-prevention:educationPortalReach
cacontology-prevention:emailListSubscriberCount
cacontology-prevention:emailOpenRate
cacontology-prevention:enablesDiscreetAccess
cacontology-prevention:enablesRapidResponse
cacontology-prevention:engagesCommunity
cacontology-prevention:engagesParents
cacontology-prevention:enhancedBy
cacontology-prevention:faqAccessCount
cacontology-prevention:faqItemCount
cacontology-prevention:hostsContentOn
cacontology-prevention:identifiesTrustedAdult
cacontology-prevention:implementationStatus
cacontology-prevention:implementsProtocol
cacontology-prevention:integratesQRCode
cacontology-prevention:integratesToPlatform
cacontology-prevention:languageAvailability
cacontology-prevention:maintainsEmailList
cacontology-prevention:measuresEngagementOf
cacontology-prevention:monitorsUsageOf
cacontology-prevention:parentalEngagementRate
cacontology-prevention:participantCount
cacontology-prevention:podcastDownloadCount
cacontology-prevention:podcastEpisodeCount
cacontology-prevention:postersDistributed
cacontology-prevention:presentationAttendance
cacontology-prevention:preventionEffectiveness
cacontology-prevention:preventsBullying
cacontology-prevention:preventsMechanism
cacontology-prevention:programDuration
cacontology-prevention:providesResource
cacontology-prevention:publicationArchiveSize
cacontology-prevention:publishesToArchive
cacontology-prevention:qrCodeEnabled
cacontology-prevention:qrCodeScans
cacontology-prevention:queriesFAQ
cacontology-prevention:rapidResponseCapability
cacontology-prevention:reducesBarrier
cacontology-prevention:reducesShaming
cacontology-prevention:resourceSharingFrequency
cacontology-prevention:resultsInArrest
cacontology-prevention:riskReductionLevel
cacontology-prevention:schoolsTargeted
...cacontology-prevention:sextortionWarningSignsCount
cacontology-prevention:sharesResourcesWith
cacontology-prevention:statewideCoverage
cacontology-prevention:supportedBy
cacontology-prevention:targetAgeGroup
cacontology-prevention:targetAudience
cacontology-prevention:targetsAudience
cacontology-prevention:tracksPodcastMetrics
cacontology-prevention:tracksProgressOf
cacontology-prevention:triggersDisclosure
cacontology-prevention:trustedAdultsIdentified
cacontology-production:concealmentLocation
cacontology-production:concealmentMethod
cacontology-production:developmentalDocumentation
cacontology-production:deviceBrand
cacontology-production:deviceModel
cacontology-production:distributionIntent
cacontology-production:editedWith
cacontology-production:evidenceOf
cacontology-production:evidenceRecovered
cacontology-production:facilitatedBy
cacontology-production:forensicValue
...acontology-production:hasProductionPhaseBeginPoint
cacontology-production:hasProductionPhaseEndPoint
cacontology-production:hasRoleBeginPoint
cacontology-production:hasRoleEndPoint
cacontology-production:imageCount
cacontology-production:immediateDistribution
cacontology-production:involvestVictim
cacontology-production:locationAccess
cacontology-production:locationSecurity
cacontology-production:metadataPreserved
cacontology-production:modificationDescription
cacontology-production:partOfSeries
cacontology-production:privacyExpectation
cacontology-production:producedAt
cacontology-production:producedBy
cacontology-production:produces
cacontology-production:productionComplexity
cacontology-production:productionEndDate
cacontology-production:productionMethod
cacontology-production:productionPeriod
cacontology-production:productionStartDate
cacontology-production:recordedWith
cacontology-production:recordingCapability
cacontology-production:recordingQuality
cacontology-production:resultingContent
cacontology-production:sessionCount
cacontology-production:sessionDuration
cacontology-production:sessionLocation
cacontology-production:storageCapacity
cacontology-production:surveillanceAngle
cacontology-production:systematicNature
cacontology-production:totalContentVolume
cacontology-production:triggeredInvestigation
cacontology-production:usesEquipment
cacontology-production:victimAge
cacontology-production:victimAgeProgression
cacontology-production:victimAwareness
cacontology-production:victimCount
cacontology-production:videoCount
cacontology-recruitment:academicPerformanceLevel
cacontology-recruitment:attendanceRate
cacontology-recruitment:attendsSchool
cacontology-recruitment:averageRecruitmentTime
cacontology-recruitment:contactsLawEnforcement
cacontology-recruitment:employedAt
cacontology-recruitment:exhibitsVulnerability
cacontology-recruitment:exploitsVulnerability
cacontology-recruitment:facilitatedBy
cacontology-recruitment:gradeLevel
cacontology-recruitment:includesRecruitingVictim
cacontology-recruitment:introducesTo
cacontology-recruitment:mandatoryReportingTrigger
cacontology-recruitment:mitigatesVulnerability
cacontology-recruitment:networkSize
cacontology-recruitment:operatesInNetwork
cacontology-recruitment:receivesReport
cacontology-recruitment:recruitmentAttempts
cacontology-recruitment:recruitsVictim
cacontology-recruitment:reportingDelay
cacontology-recruitment:reportingStaffRole
cacontology-recruitment:reportsToSchool
cacontology-recruitment:schoolType
cacontology-recruitment:schoolsInvolved
cacontology-recruitment:socioeconomicLevel
cacontology-recruitment:studentPopulation
cacontology-recruitment:successfulRecruitments
cacontology-recruitment:targetsSchool
cacontology-recruitment:triggersInvestigation
cacontology-recruitment:victimRecruitersCount
cacontology-recruitment:vulnerabilityScore
cacontology-registry:ageAcknowledgmentMethod
cacontology-registry:arrestTiming
cacontology-registry:attendsSchool
cacontology-registry:basedOnOffense
cacontology-registry:complianceType
cacontology-registry:contentTypesReceived
cacontology-registry:contentTypesSent
cacontology-registry:convictionDate
cacontology-registry:coordinatedWithCompliance
cacontology-registry:coordinatesBetweenAgencies
cacontology-registry:coordinationTimeframe
cacontology-registry:crossesStates
cacontology-registry:dateOfBirth
cacontology-registry:demonstratesAgeAwareness
cacontology-registry:employedAt
cacontology-registry:executedAt
cacontology-registry:executedDuring
cacontology-registry:exhibitsRecidivism
cacontology-registry:expirationDate
cacontology-registry:exploitationDurationMonths
cacontology-registry:eyeColor
cacontology-registry:fullName
cacontology-registry:hairColor
cacontology-registry:hasAlias
cacontology-registry:hasCompliance
cacontology-registry:hasOnlineIdentifier
cacontology-registry:hasProfile
cacontology-registry:hasRegistrationRecord
cacontology-registry:height
...cacontology-registry:involvesBidirectionalExchange
...acontology-registry:involvesHighVolumeExploitation
cacontology-registry:involvesPattern
cacontology-registry:lastUpdate
cacontology-registry:lifetimeRegistration
cacontology-registry:lifetimeSupervision
cacontology-registry:managedBy
cacontology-registry:mandatoryMinimumYears
cacontology-registry:maximumSentenceYears
cacontology-registry:messageCount
cacontology-registry:offenseDescription
cacontology-registry:ownsVehicle
cacontology-registry:postRegistrationEvent
cacontology-registry:priorConvictionCount
cacontology-registry:race
cacontology-registry:recidivismPattern
cacontology-registry:recoversEvidence
cacontology-registry:registeredIn
cacontology-registry:registrationDate
cacontology-registry:registrationFrequency
cacontology-registry:registrationNumber
cacontology-registry:residesAt
cacontology-registry:sentenceLength
cacontology-registry:sentenceServed
cacontology-registry:sex
cacontology-registry:socialSecurityNumber
cacontology-registry:subjectToRestriction
cacontology-registry:targetsCrossState
cacontology-registry:tier
cacontology-registry:triggersInvestigation
cacontology-registry:verifiedBy
cacontology-registry:victimAge
cacontology-registry:victimAgeAcknowledged
cacontology-registry:victimCount
cacontology-registry:victimRelationship
cacontology-registry:violationCategory
cacontology-registry:weight
cacontology-registry:yearsBetweenOffenses
cacontology-sentencing:appliesTo
cacontology-sentencing:bailStatus
cacontology-sentencing:concurrentWith
cacontology-sentencing:currentPhase
cacontology-sentencing:hasCharge
cacontology-sentencing:hasLegalPhase
cacontology-sentencing:hasPhaseBeginPoint
cacontology-sentencing:hasPhaseEndPoint
cacontology-sentencing:hasProceedingBeginPoint
cacontology-sentencing:hasProceedingEndPoint
cacontology-sentencing:hasRole
cacontology-sentencing:hasRoleBeginPoint
cacontology-sentencing:hasRoleEndPoint
cacontology-sentencing:hasSentenceBeginPoint
cacontology-sentencing:hasSentenceEndPoint
cacontology-sentencing:involvesChargeCount
cacontology-sentencing:involvesParticipantCount
cacontology-sentencing:participatesInProceeding
cacontology-sentencing:phaseDuration
cacontology-sentencing:proceedingDuration
cacontology-sentencing:resultsSentence
cacontology-sentencing:roleDuration
cacontology-sentencing:sentenceConcurrency
cacontology-sentencing:sentenceDuration
cacontology-sentencing:situationComplexity
cacontology-sentencing:transitionsToPhase
cacontology-sextortion:actualAge
cacontology-sextortion:analyzesDevice
cacontology-sextortion:claimedAge
cacontology-sextortion:conductsOnPlatform
cacontology-sextortion:containsCommunication
cacontology-sextortion:conversationCount
cacontology-sextortion:conversationLength
cacontology-sextortion:demandType
cacontology-sextortion:deviceCount
cacontology-sextortion:employsThreat
cacontology-sextortion:escalationSpeed
cacontology-sextortion:evidenceRecovered
cacontology-sextortion:explicitnessLevel
cacontology-sextortion:falsePersonaType
cacontology-sextortion:followsProgression
cacontology-sextortion:giftCardType
cacontology-sextortion:identifiesVictim
cacontology-sextortion:imageType
cacontology-sextortion:incidentDuration
cacontology-sextortion:investigatedBy
cacontology-sextortion:involvesDeception
cacontology-sextortion:makesDemand
cacontology-sextortion:monetaryAmount
cacontology-sextortion:nextPhase
cacontology-sextortion:previousPhase
cacontology-sextortion:progressionStage
cacontology-sextortion:providesEvidence
cacontology-sextortion:reconstructsConversation
cacontology-sextortion:resultsinCharge
cacontology-sextortion:threatFollowThrough
cacontology-sextortion:threatSpecificity
cacontology-sextortion:threatType
cacontology-sextortion:triggersPhase
cacontology-sextortion:usesManipulation
cacontology-sextortion:utilizesFeature
cacontology-sextortion:victimAgeGroup
cacontology-sextortion:victimCount
cacontology-specialized:hasOperationBeginPoint
cacontology-specialized:hasOperationEndPoint
cacontology-specialized:hasPhaseBeginPoint
cacontology-specialized:hasPhaseEndPoint
cacontology-specialized:hasRoleBeginPoint
cacontology-specialized:hasRoleEndPoint
cacontology-specialized:hasUnitBeginPoint
cacontology-specialized:hasUnitEndPoint
cacontology-specialized:operationDuration
cacontology-specialized:phaseDuration
cacontology-specialized:roleDuration
cacontology-specialized:unitDuration
cacontology-strategy:dependsOnPattern
cacontology-strategy:extendsPattern
cacontology-strategy:hasIntegrationPattern
cacontology-strategy:hasIntegrationPriority
cacontology-strategy:hasIntegrationTimeline
cacontology-strategy:hasValidationQuery
cacontology-strategy:hasValidationRule
cacontology-strategy:requiresValidation
cacontology-street:administrationMethod
cacontology-street:apparentAge
cacontology-street:approachMethod
cacontology-street:assessesVulnerability
cacontology-street:contactDuration
cacontology-street:conversationTopic
cacontology-street:distanceFromContact
cacontology-street:distressIndicators
cacontology-street:documentsRecruitment
cacontology-street:economicIncentive
cacontology-street:escalatesTo
cacontology-street:escalationTimeframe
cacontology-street:exhibitsIndicator
cacontology-street:explicitnessLevel
cacontology-street:exploitationLocation
cacontology-street:exploitsVulnerability
cacontology-street:facilitatesTransition
cacontology-street:facilitatesWithSubstance
cacontology-street:followUpDelay
cacontology-street:followUpMethod
cacontology-street:followsUpWith
cacontology-street:helpOfferType
cacontology-street:impairmentLevel
cacontology-street:initialContactLocation
cacontology-street:initiatesContact
cacontology-street:isolatesAt
cacontology-street:isolationLevel
cacontology-street:makesProposition
cacontology-street:moneyAmountMentioned
cacontology-street:occursAt
cacontology-street:persistenceLevel
cacontology-street:persistsAfter
cacontology-street:pretextUsed
cacontology-street:propositionType
cacontology-street:reinforcementAttempts
cacontology-street:reinforces
cacontology-street:rejects
cacontology-street:reportingDelay
cacontology-street:reportingMethod
cacontology-street:reportsTo
cacontology-street:resistanceLevel
cacontology-street:respondsTo
cacontology-street:responseType
cacontology-street:sameDayProgression
cacontology-street:substanceType
cacontology-street:supportsCharge
cacontology-street:targetsVictim
cacontology-street:transitionsTo
cacontology-street:transportationMethod
cacontology-street:usesPretext
cacontology-street:vulnerabilityIndicators
cacontology-tactical:afterActionReport
cacontology-tactical:backupTeamAvailable
cacontology-tactical:briefingConducted
cacontology-tactical:commandedBy
cacontology-tactical:deployedDuring
cacontology-tactical:entryMethod
cacontology-tactical:equipmentType
cacontology-tactical:evacuationRequired
cacontology-tactical:flightRisk
cacontology-tactical:forceUsed
cacontology-tactical:injuriesOccurred
cacontology-tactical:mediaPresent
cacontology-tactical:negotiationAttempted
cacontology-tactical:negotiationDuration
cacontology-tactical:negotiationOutcome
cacontology-tactical:operatedBy
cacontology-tactical:operationAuthorization
cacontology-tactical:operationDuration
cacontology-tactical:operationLocation
cacontology-tactical:operationOutcome
cacontology-tactical:operationType
cacontology-tactical:participatingMember
cacontology-tactical:perimeterEstablished
cacontology-tactical:planningDuration
cacontology-tactical:propertyDamage
cacontology-tactical:publicSafetyThreat
cacontology-tactical:resistanceEncountered
cacontology-tactical:riskLevel
cacontology-tactical:specialApprovalRequired
cacontology-tactical:standoffDuration
cacontology-tactical:suicidalRisk
cacontology-tactical:suspectsArrested
cacontology-tactical:teamSize
cacontology-tactical:threatLevel
cacontology-tactical:useOfForceJustified
cacontology-tactical:weaponsDeployed
cacontology-tactical:weaponsPossible
cacontology-taskforce:accessibleVia
cacontology-taskforce:agencyCount
cacontology-taskforce:agencyType
cacontology-taskforce:arrestsSince2006
cacontology-taskforce:arrestsSince2019
cacontology-taskforce:assignedToUnit
cacontology-taskforce:capabilityLevel
cacontology-taskforce:certificationStatus
cacontology-taskforce:certificationValid
cacontology-taskforce:certifiedIn
cacontology-taskforce:collaboratesWith
cacontology-taskforce:commandedBy
cacontology-taskforce:completionRate
cacontology-taskforce:conductedBy
cacontology-taskforce:coordinatedBy
cacontology-taskforce:coordinatedThrough
cacontology-taskforce:coordinatesWith
cacontology-taskforce:coordinatesWithCivilian
cacontology-taskforce:coordinationDuration
cacontology-taskforce:coordinationLevel
cacontology-taskforce:coordinationModel
cacontology-taskforce:countyName
cacontology-taskforce:coverageArea
cacontology-taskforce:coverageType
cacontology-taskforce:cyberTipsProcessed
cacontology-taskforce:cyberTipsReceived
cacontology-taskforce:cyberTipsSince2019
cacontology-taskforce:dojGrantFunded
cacontology-taskforce:emailAddress
cacontology-taskforce:establishmentDate
cacontology-taskforce:experienceLevel
cacontology-taskforce:federalPartner
cacontology-taskforce:handledInvestigation
cacontology-taskforce:hasContactInformation
cacontology-taskforce:hasMember
cacontology-taskforce:hasMetrics
cacontology-taskforce:hasOperationPhaseBeginPoint
cacontology-taskforce:hasOperationPhaseEndPoint
cacontology-taskforce:hasRegionalTaskForce
cacontology-taskforce:hasRoleBeginPoint
cacontology-taskforce:hasRoleEndPoint
cacontology-taskforce:hasUnit
cacontology-taskforce:hostJurisdictionLevel
cacontology-taskforce:hostOrganizationType
cacontology-taskforce:hostedBy
cacontology-taskforce:hostsTaskForce
cacontology-taskforce:hotlineType
cacontology-taskforce:includesTaskForce
cacontology-taskforce:involvedUnit
cacontology-taskforce:jurisdictionPopulation
cacontology-taskforce:leadsUnit
cacontology-taskforce:localPartner
cacontology-taskforce:maintainsWebsite
cacontology-taskforce:managedByCoordination
cacontology-taskforce:measuresPerformance
cacontology-taskforce:memberCount
cacontology-taskforce:memberRole
cacontology-taskforce:metropolitanArea
cacontology-taskforce:militaryBranches
cacontology-taskforce:militaryJurisdiction
cacontology-taskforce:nationalCoveragePercentage
cacontology-taskforce:nationalHotlineNumber
cacontology-taskforce:nationalTaskForceNetwork
cacontology-taskforce:operatesHotline
cacontology-taskforce:operationDuration
cacontology-taskforce:operationOutcome
cacontology-taskforce:operationPhaseDuration
cacontology-taskforce:operationScale
cacontology-taskforce:operationType
cacontology-taskforce:organizationName
cacontology-taskforce:parentsEducated
cacontology-taskforce:participatedIn
cacontology-taskforce:participatingUnits
cacontology-taskforce:partnerAgencyCount
cacontology-taskforce:partnersWith
cacontology-taskforce:performancePeriod
cacontology-taskforce:phoneNumber
cacontology-taskforce:professionalsTrained
cacontology-taskforce:providesRegionalCoverage
cacontology-taskforce:providesTraining
cacontology-taskforce:receivedTraining
cacontology-taskforce:regionCovered
cacontology-taskforce:regionalTaskForceCount
cacontology-taskforce:reportingYear
cacontology-taskforce:resourceCapacity
cacontology-taskforce:servesCounty
cacontology-taskforce:servesMetropolitanArea
cacontology-taskforce:servesMilitaryBranch
cacontology-taskforce:sexualPredatorArrests
cacontology-taskforce:sharesResourcesWith
cacontology-taskforce:sharingAgreement
cacontology-taskforce:sharingDuration
cacontology-taskforce:sharingType
cacontology-taskforce:specializationArea
...cacontology-taskforce:statesWithMultipleTaskForces
cacontology-taskforce:studentsEducated
cacontology-taskforce:supportedInvestigation
cacontology-taskforce:taskForceId
cacontology-taskforce:taskForceNumber
cacontology-taskforce:teachersEducated
cacontology-taskforce:totalTaskForces
cacontology-taskforce:trainingDuration
cacontology-taskforce:trainingType
cacontology-taskforce:websiteURL
cacontology-taskforce:yearOverYearIncrease
cacontology-taskforce:yearsOfService
cacontology-temporal:EvidencePreservationDeadline
cacontology-temporal:StatuteOfLimitationsDeadline
cacontology-temporal:WarrantExpirationDate
cacontology-temporal:ageSubject
cacontology-temporal:concernsAgeQuality
cacontology-temporal:createsSuspension
cacontology-temporal:hasActiveDuration
cacontology-temporal:hasAgeInYears
cacontology-temporal:hasConsequentEvent
cacontology-temporal:hasLegalDeadline
cacontology-temporal:hasMaximumDuration
cacontology-temporal:hasMinimumDuration
cacontology-temporal:hasParallelEvent
cacontology-temporal:hasPrerequisiteEvent
cacontology-temporal:hasSuspendedDuration
cacontology-temporal:hasTimeToFirstAction
cacontology-temporal:hasTimeToResolution
cacontology-temporal:hasTypicalDuration
cacontology-temporal:phaseCompletionRate
cacontology-temporal:phaseEfficiency
cacontology-temporal:resumes
cacontology-temporal:suspends
cacontology-temporal:temporallyContains
cacontology-temporal:temporallyOverlapsWith
cacontology-temporal:temporallyPrecedes
cacontology-temporal:terminatesSuspension
cacontology-temporal:transitionsFrom
cacontology-temporal:transitionsTo
cacontology-temporal:triggersTransition
cacontology-temporal:urgencyLevel
cacontology-trafficking:controlsVictim
cacontology-trafficking:crossesJurisdiction
cacontology-trafficking:destinationLocation
cacontology-trafficking:earningsAmount
cacontology-trafficking:earningsPeriod
cacontology-trafficking:enterpriseDuration
cacontology-trafficking:hasControlMethod
cacontology-trafficking:hasEnterpriseBeginPoint
cacontology-trafficking:hasEnterpriseEndPoint
cacontology-trafficking:hasEnterprisePhase
cacontology-trafficking:hasHierarchyLevel
cacontology-trafficking:hasPhaseBeginPoint
cacontology-trafficking:hasPhaseEndPoint
cacontology-trafficking:hasRoleBeginPoint
cacontology-trafficking:hasRoleEndPoint
cacontology-trafficking:involvesJurisdictionCount
cacontology-trafficking:involvesTraffickerCount
cacontology-trafficking:involvesVictimCount
cacontology-trafficking:operatesInJurisdiction
cacontology-trafficking:originLocation
cacontology-trafficking:phaseDuration
cacontology-trafficking:requiresCoordination
cacontology-trafficking:roleDuration
cacontology-trafficking:situationComplexity
cacontology-trafficking:transitionsToPhase
cacontology-trafficking:transportationMethod
cacontology-trafficking:vulnerabilityExploited
cacontology-training:assessedBy
cacontology-training:buildsCapacityFor
cacontology-training:capacityLevel
cacontology-training:certificationStatus
cacontology-training:certificationValidityPeriod
cacontology-training:certifiedBy
cacontology-training:competencyLevel
cacontology-training:completionRate
cacontology-training:deliveredBy
cacontology-training:hasPhaseBeginPoint
cacontology-training:hasPhaseEndPoint
cacontology-training:hasRoleBeginPoint
cacontology-training:hasRoleEndPoint
cacontology-training:hasTrainingBeginPoint
cacontology-training:hasTrainingEndPoint
cacontology-training:improvesProficiency
cacontology-training:includedInCurriculum
cacontology-training:k9PublicPresentations
cacontology-training:k9SearchWarrantsAssisted
cacontology-training:mentors
cacontology-training:operationalDeploymentCount
cacontology-training:outreachEventsCount
cacontology-training:participatedIn
cacontology-training:participationRate
cacontology-training:phaseDuration
cacontology-training:professionalsTrained
cacontology-training:professionalsTrainedCount
cacontology-training:roleDuration
cacontology-training:skillsAcquired
cacontology-training:supportedBy
cacontology-training:totalAttendeesReached
cacontology-training:trainingDuration
cacontology-training:trainingEffectiveness
cacontology-training:trainingLanguage
cacontology-training:trainingReachCount
...ontology-training:trainingToOperationEffectiveness
cacontology-training:validatesSkills
cacontology-undercover:advertisementLiveTime
cacontology-undercover:advertisementURL
cacontology-undercover:agentOperatesAs
cacontology-undercover:apartmentType
cacontology-undercover:backstoryDetails
cacontology-undercover:backupTeamAssigned
cacontology-undercover:chatDurationHours
cacontology-undercover:chatPlatformType
cacontology-undercover:chatRoomTopic
cacontology-undercover:clientContactMethod
cacontology-undercover:communicationMethod
cacontology-undercover:communicationPlatform
cacontology-undercover:conductedOnPlatform
cacontology-undercover:containsCriminalContent
cacontology-undercover:conversationCount
cacontology-undercover:coversTimeframe
cacontology-undercover:documentsViolationAt
cacontology-undercover:emergencySignal
cacontology-undercover:evidenceCollected
cacontology-undercover:evidentiaryValue
cacontology-undercover:floorLevel
cacontology-undercover:generatesEvidence
cacontology-undercover:handledBy
...cacontology-undercover:hasOperationPhaseBeginPoint
cacontology-undercover:hasOperationPhaseEndPoint
cacontology-undercover:hasRoleBeginPoint
cacontology-undercover:hasRoleEndPoint
cacontology-undercover:hasSecureExit
cacontology-undercover:identificationSuccessRate
cacontology-undercover:identifiesPredator
cacontology-undercover:identifiesVictimPhotos
cacontology-undercover:infiltrationDuration
cacontology-undercover:instructionType
cacontology-undercover:interceptsInstruction
cacontology-undercover:investigatesViolation
cacontology-undercover:involvesChatInvestigation
cacontology-undercover:judicialAuthorization
cacontology-undercover:leadsToDevelopment
cacontology-undercover:leadsToSolicitation
cacontology-undercover:maintainsSurveillance
...cacontology-undercover:meetingSolicitationAttempts
cacontology-undercover:monitorsPhoneCommunication
cacontology-undercover:operatesAtLocation
cacontology-undercover:operatesUnderIdentity
cacontology-undercover:operationClassification
cacontology-undercover:operationOutcome
cacontology-undercover:operationPhaseDuration
cacontology-undercover:participantCount
cacontology-undercover:personaAge
cacontology-undercover:personaGender
cacontology-undercover:personaLocation
cacontology-undercover:personaProfile
cacontology-undercover:phoneNumberMonitored
cacontology-undercover:platformUsername
cacontology-undercover:portraysAge
cacontology-undercover:predatorContactAttempts
cacontology-undercover:respondsToAdvertisement
cacontology-undercover:safetyProtocol
cacontology-undercover:socialMediaPlatformsUsed
cacontology-undercover:supervisoryApproval
cacontology-undercover:surveillanceTeamCount
cacontology-undercover:targetBehaviorType
cacontology-undercover:targetsIndividual
cacontology-undercover:targetsSubject
cacontology-undercover:utilizesPersona
cacontology-undercover:victimPhotoCount
cacontology-undercover:violationLocation
cacontology-undercover:violationType
cacontology-undercover:websitePlatform
cacontology-us-ncmec:accountConfidence
cacontology-us-ncmec:analysisConfidence
cacontology-us-ncmec:analysisOf
cacontology-us-ncmec:cooperationLevel
cacontology-us-ncmec:dataProvided
cacontology-us-ncmec:enrichmentType
cacontology-us-ncmec:hasNCMECIncidentType
cacontology-us-ncmec:hasNCMECReportAnnotation
cacontology-us-ncmec:identifiedContent
cacontology-us-ncmec:incidentCode
cacontology-us-ncmec:indicatorStrength
cacontology-us-ncmec:involvesPlatform
cacontology-us-ncmec:linkedToAccount
cacontology-us-ncmec:phoneVerificationStatus
cacontology-us-ncmec:platformResponseTime
cacontology-us-ncmec:priorityLevel
cacontology-us-ncmec:processedTip
cacontology-us-ncmec:processingTime
cacontology-us-ncmec:referralJurisdiction
cacontology-us-ncmec:resultedInInvestigation
cacontology-us-ncmec:supportedBy
cacontology-us-ncmec:tracedToPhone
cacontology-us-ncmec:transferFrequency
cacontology-us-ncmec:transferVolume
cacontology-us-ncmec:triggerCriteria
cacontology-us-ncmec:triggeredBy
cacontology-us-ncmec:urgencyLevel
cacontology-us-ncmec:validationStatus
cacontology-usa-federal:collaboratesWith
cacontology-usa-federal:collectsEvidence
cacontology-usa-federal:crimeJurisdiction
cacontology-usa-federal:crimeSeverityLevel
cacontology-usa-federal:defendedBy
cacontology-usa-federal:followsPhase
cacontology-usa-federal:foreignCountriesInvolved
cacontology-usa-federal:hasDivision
cacontology-usa-federal:hasInterstateNexus
cacontology-usa-federal:hasLegalPhase
cacontology-usa-federal:hasPhaseBeginPoint
cacontology-usa-federal:hasPhaseEndPoint
cacontology-usa-federal:hasProsecutionBeginPoint
cacontology-usa-federal:hasProsecutionEndPoint
cacontology-usa-federal:hasRoleBeginPoint
cacontology-usa-federal:hasRoleEndPoint
cacontology-usa-federal:investigatedBy
cacontology-usa-federal:involvesDigitalEvidence
...ontology-usa-federal:involvesInternationalElements
cacontology-usa-federal:involvesMultipleStates
cacontology-usa-federal:isPhaseOf
cacontology-usa-federal:mandatoryMinimumSentence
cacontology-usa-federal:phaseDuration
cacontology-usa-federal:precedesPhase
cacontology-usa-federal:prosecutedBy
cacontology-usa-federal:prosecutionComplexity
cacontology-usa-federal:prosecutionDuration
cacontology-usa-federal:prosecutionSeverity
cacontology-usa-federal:prosecutionStatus
cacontology-usa-federal:requiresForensicAnalysis
cacontology-usa-federal:requiresRole
cacontology-usa-federal:roleDuration
cacontology-usa-federal:roleExperience
cacontology-usa-federal:roleSpecialization
cacontology-usa-federal:usesEvidence
cacontology-usa-federal:victimizedBy
cacontology1:conspiracyDuration
cacontology1:conspiracyMemberCount
cacontology1:currentPhase
cacontology1:depictsChild
cacontology1:hasAgeSituation
cacontology1:hasOffenderAgeSituation
cacontology1:hasPhase
cacontology1:hasPhaseBeginPoint
cacontology1:hasPhaseEndPoint
cacontology1:hasRoleBeginPoint
cacontology1:hasRoleEndPoint
cacontology1:hasStep
cacontology1:hasVictimAgeSituation
cacontology1:indictmentCounts
cacontology1:investigationStatus
cacontology1:involvesOffender
cacontology1:involvesVictim
cacontology1:leadsConspiracy
cacontology1:legalInstrument
cacontology1:nextStep
cacontology1:occursDuringPhase
cacontology1:participatesInConspiracy
cacontology1:phaseDuration
cacontology1:phaseProgress
cacontology1:previousStep
cacontology1:producesArtifact
cacontology1:rescuedVictim
cacontology1:resultsinIndictment
cacontology1:severityLevel
cacontology1:submittedTo
cacontology1:targetsService
cacontology1:transitionsTo
cacontology1:usesChannel
cacontology1:usesClassification
hotline:assignedRole
hotline:classification
hotline:coordinationBeginTime
hotline:currentPhase
hotline:feedbackType
hotline:firstSeen
hotline:forwardsTo
hotline:foundAtURL
hotline:hasEvidence
hotline:hasPhaseTransition
hotline:intakeChannel
hotline:involvesCoordination
hotline:isAnonymous
hotline:linkedInvestigation
hotline:phaseBeginTime
hotline:phaseDuration
hotline:phaseEndTime
hotline:playsRole
hotline:producesHash
hotline:receivedBy
hotline:referencesHash
hotline:reportedBy
hotline:roleAssignmentTime
hotline:status
hotline:triggersAction