Skip to main content

Examples & Gallery

CAC Ontology includes a growing set of real-world example suites based on public information. Each suite typically includes:

To stay current, this website links to the canonical examples in GitHub (the CAC Ontology repository is the source of truth).

Missing child / platform data access (v2.10.0)

Missing child rescue operations (v2.9.0)

Undercover operations (communication patterns + evidence) (v2.3.0)

Recidivism + registry compliance + NCMEC tip linkage (v2.2.0)

Browse all examples (canonical)

Contributing Examples

To contribute new examples:

  1. Review existing examples for format and structure
  2. Ensure examples are based on publicly available information
  3. Anonymize sensitive information
  4. Follow the repository’s Contributing Guidelines
  5. Submit a pull request

Example Format

Examples are provided in Turtle (TTL) format and follow the CAC Ontology namespace structure:

@prefix cacontology: <https://cacontology.projectvic.org#> .
@prefix cacontology-core: <https://cacontology.projectvic.org/core#> .

# Example investigation
:investigation-001 a cacontology-core:CACInvestigation ;
    cacontology-core:hasReport :report-001 ;
    cacontology-core:status "active" .

Validation

All examples can be validated using the SHACL validation modules included in the repository:

docker compose -f testing/docker-compose.yaml up -d

Support

For questions about examples or help using them: