Investigators use EDT to build case theories, follow leads across documents and communications, and map relationships between people and events. Their daily work centres on hypothesis-driven exploration — searching for evidence patterns, tracing communication networks, constructing chronologies, and assembling findings into presentable narratives for stakeholders and proceedings.
| EDT Feature | How Do I... |
|---|---|
| Login & Authentication | Log in to EDT to begin my investigation session |
| Terms & Conditions | Accept the platform terms before accessing case evidence |
| Site Home Page | Orient myself to the platform and locate cases assigned to my investigations |
| Case List | Find and open the specific case I am investigating from all available cases |
| My Cases View | Quickly return to the cases I am actively investigating |
| Case Home Page | Navigate to the workspace where my investigative views and searches are configured |
| Tabs | Switch between investigation stages such as Analysis, Review, and Reporting |
| Workspaces | Set up a dedicated investigative workspace with my preferred views and filters |
| Views | Open communications, timeline, and entity views side by side to cross-reference leads |
| Filters Panel | Narrow records to a specific custodian, date range, or keyword relevant to my lead |
| Layout Panel | Review metadata and coding for a document that appears relevant to my theory |
| User Profile Settings | Configure my display preferences for extended investigation sessions |
| Case Profile Settings | Set case-level preferences such as auto-run search for my investigative queries |
| Keyboard Shortcuts | Navigate rapidly between records and views while pursuing a lead |
| Share via Email | Share a key document or search result with a colleague on the investigation team |
| Notifications | Monitor progress of background tasks such as clustering or entity detection |
| About Dialog | Understand the scope, custodians, and key dates of the case I am investigating |
| Help & Links | Access help documentation or external reference links relevant to the case |
| EDT Feature | How Do I... |
|---|---|
| Search Bar | Run a keyword search to test an investigative hypothesis against the evidence |
| Filters Panel | Layer multiple filters to isolate records matching a suspect's name, date range, and file type |
| Advanced Search | Build a complex Boolean query combining multiple fields to identify documents connecting two subjects |
| Saved Searches | Save and share investigative queries that define key evidence subsets for my case theory |
| Search History | Review previous searches to track the progression of my investigation and revisit earlier leads |
| Word Variations | Expand a keyword search to capture all grammatical forms of terms used by suspects |
| Document ID Filter | Locate a specific document referenced in a witness statement or tip-off |
| Document ID Lists | Load a list of document IDs received from another agency for cross-referencing |
| MD5 Lists | Match file hashes against a known-contraband or known-evidence list |
| Location Filter | Explore the folder structure of a custodian's device to understand their file organisation |
| Alias Recipient "Only" | Find private communications exchanged exclusively between two suspected co-conspirators |
| Sample from Saved Search | Draw a statistical sample from a large evidence set to validate my search strategy |
| EDT Feature | How Do I... |
|---|---|
| Concepts View | Discover the dominant themes and topics across a suspect's document collection |
| Clusters Tab | Identify groups of related documents that may reveal coordinated activity or a pattern of behaviour |
| Communications View | Map communication patterns between suspects to identify conspiracy networks |
| Timeline View | Identify spikes in activity around key dates such as reported incidents or policy changes |
| Chronology View | Build a structured case chronology linking key events to supporting evidence |
| Custodians View | Assess which custodians hold the most evidence relevant to my investigation |
| File Types View | Understand what types of files exist in the evidence — emails, images, spreadsheets, chat logs |
| Detected Languages View | Identify foreign language documents that may require translation for the investigation |
| File Size View | Spot unusually large files that may contain embedded data or archive collections |
| Named Entities View | Discover people, places, and identifiers mentioned across the evidence that I have not yet investigated |
| Detect Sentiment | Identify emotionally charged communications that may indicate conflict, threats, or coercion |
| Record Clustering | Group textually similar documents to find patterns of coordinated messaging or template-based fraud |
| Similar Content View | Find near-duplicate documents that may reveal edited versions or attempts to alter evidence |
| Compare Records View | Compare two versions of a contract or statement side by side to identify what changed |
| Email Threading | Trace the full conversation thread to understand how a discussion evolved and who was included at each stage |
| Detect Concepts | Extract key themes from a subset of evidence to direct the next phase of investigation |
| EDT Feature | How Do I... |
|---|---|
| Participants View | Review all people involved in the case — suspects, witnesses, victims, and their roles |
| Participant Types | Create records for individuals and organisations relevant to the investigation |
| Roles | Assign roles such as suspect, witness, or victim to track each person's relationship to the case |
| Add Participants | Register a newly identified person of interest discovered during investigation |
| Representation Tracking | Record which lawyer represents which suspect or witness |
| Participant Details | Maintain detailed records including dates of involvement and status for each person |
| Alias Detection | Identify when the same person appears under different name variants across email, chat, and documents |
| Alias Operations | Merge confirmed aliases so that all communications for a person appear under a single identity |
| Communications View | Visualise who is communicating with whom to identify central figures and peripheral contacts |
| Persons (Site Level) | Check if a person of interest appears in other cases across the site |
| Orgs (Site Level) | Track organisations connected to the investigation across multiple cases |
| Chronology Integration | Link participants to specific events in the case chronology to build the narrative |
| Download Participants | Export the participant list for inclusion in investigation reports |
| EDT Feature | How Do I... |
|---|---|
| Report Builder View | Create a custom report showing document counts by custodian and date to support my case theory |
| Grid Download | Export a filtered set of key evidence documents to Excel for inclusion in a briefing |
| Chronology View | Present the case timeline to stakeholders showing how events unfolded |
| PDF Presenter | Present key documents in a hearing or briefing using the side-by-side presentation mode |
| Exhibit Lists | Prepare a numbered list of exhibits for court or tribunal proceedings |
| Case List Report | Generate a cross-case summary when my investigation spans multiple related cases |
| Case Stats | Review case-level metrics to report on investigation progress |
| QA Reports | Report on data quality issues that may affect the completeness of the evidence |
| Import Details | Review import summaries to understand the provenance and completeness of ingested data |
| Export Summary | Verify the contents of an evidence package before delivering it to another party |
| Participant Download | Export participant details for inclusion in the investigation report |
| Audit Reports | Demonstrate the chain of activity — who accessed what and when — for evidentiary integrity |
| Review Pool Reports | Report on progress if documents have been distributed for team review |
| Record Audit | Confirm the access and modification history of a specific key document |
| Download Charts as PNG | Export communication and timeline visualisations for inclusion in presentations and reports |
| Print Records | Print a package of key evidence documents for a physical briefing or court bundle |
| EDT Feature | How Do I... |
|---|---|
| Review Pools | Distribute a set of flagged documents to team members for detailed examination |
| Batches View | Track which team members have completed their assigned review batches |
| Continuous Active Learning (CAL) | Leverage machine learning to surface the most relevant documents for my investigation faster |
| CAL Scheduling | Keep the predictive model current as I code more documents during the investigation |
| Viewer (Text/Native/PDF/Markup/TIFF) | Read and examine the content of a document of interest in its original or rendered format |
| Standalone Viewer | Open a key document in a separate window while keeping my search results visible |
| Grid View | Browse a list of search results and sort by date, custodian, or relevance to prioritise review |
| Record Coding (Layout Panel) | Tag a document as relevant to a particular lead, person, or allegation |
| Coding Propagation | Apply my coding decision to the entire email family so related attachments are captured together |
| Tags | Apply investigative tags such as "Key Evidence", "Follow Up", or "Supports Theory A" |
| Document Sets | Create a document set grouping all evidence related to a specific allegation or lead |
| Bulk Update | Apply a tag to all documents returned by a search that confirms a particular pattern |
| Email Thread View | Review an entire email conversation in threaded context to understand the full exchange |
| Interactions View | Review chat and social media conversations in their native bubble format to understand informal communications |
| Duplicates View | Identify duplicate copies of a document to confirm which custodians had access |
| Transcription View | Review transcribed audio or video recordings with synchronised playback |
| Thumbnail View | Visually scan image evidence to quickly identify photographs or screenshots of interest |
| Batches Coding | Code documents during batch review and propagate decisions to related records |
| Lists (Keyword Lists) | Run a curated list of investigative keywords against the evidence and auto-tag matches |
| Sampling | Draw a sample from a large result set to validate that my search terms are capturing relevant material |
| Reverse Coding | Request rollback of coding if a tagging error is discovered during investigation |
| Related Records Panel | Navigate from a key document to its family members, email thread, and similar content |
| EDT Feature | How Do I... |
|---|---|
| Generate Summaries | Get an AI-generated summary of a lengthy document to quickly assess its relevance to my lead |
| Continuous Active Learning (CAL) | Train the system to prioritise documents most likely relevant to my investigative hypothesis |
| Detect Concepts | Extract key themes from the evidence to identify topics I may not have considered |
| Detect Sentiment | Surface hostile, threatening, or emotionally charged communications that warrant closer examination |
| Detect Languages | Identify documents in foreign languages that may require translation before I can assess their significance |
| Named Entity Recognition | Automatically detect names, places, and personal identifiers mentioned across the evidence |
| Detect Logos | Identify branded communications or documents bearing organisational logos |
| Detect Flagrant Images | Identify violent or prohibited image content so it can be isolated and handled appropriately |
| Detect Objects in Images | Classify image content to find photographs containing specific objects relevant to the case |
| Record Clustering | Automatically group similar documents to reveal patterns of coordinated activity |
| Transcription | Convert audio and video recordings to searchable text for keyword investigation |
| Translation | Translate foreign language documents to assess their relevance to the investigation |
| Pattern Recognition | Detect phone numbers, credit card numbers, and other structured data patterns across the evidence |
| Alias Detection | Automatically group name variants so I can track a person across all their communications |
| Spam Detection | Filter out junk emails to focus investigative time on substantive communications |
| Intelligent Processing | Enable multiple AI detection capabilities during import to accelerate initial evidence triage |
| OCR | Convert scanned documents and images to searchable text so they appear in my keyword searches |
| EDT Feature | How Do I... |
|---|---|
| Markup Tab | Access the markup tools to annotate or redact a document before sharing with external parties |
| Markup Sets | Maintain separate markup layers for internal investigation notes and formal disclosure redactions |
| Redaction Tools | Redact sensitive personal information before producing evidence to a third party |
| Redaction Reasons | Record the legal basis for each redaction applied to evidence documents |
| Redaction View Mode | Toggle redactions transparent to verify the correct content has been covered |
| 12 Annotation Types | Highlight key passages and add arrows or text annotations to evidence for briefing purposes |
| Convert Markup Types | Promote an investigative highlight to a formal redaction when preparing for disclosure |
| Search and Redact | Find and redact all instances of a sensitive term such as a witness name across the document |
| Auto Markup (Pattern Recognition) | Automatically redact detected PII patterns such as phone numbers or identity numbers |
| Auto Markup (Lists) | Apply redactions from a keyword list of sensitive terms that must be protected |
| Comments on Markups | Add notes explaining an annotation to share context with colleagues reviewing the same document |
| Markup Keyboard Navigation | Navigate quickly between markups when reviewing a heavily annotated document |
| Copy Markup | Reuse redaction markup from one document on a similar document in the same set |
| Burn Markup | Permanently apply redactions to produce a final version safe for external disclosure |
| Image Adjustment | Improve the readability of a poor-quality scanned document that is key to the investigation |
| Rotate Document/Page | Correct the orientation of a scanned document so it can be read and presented properly |
| Download with Markup | Download a redacted version of a document for offline review or sharing |
| Auto-Save Markup | Ensure my annotation work is automatically saved during extended markup sessions |
| EDT Feature | How Do I... |
|---|---|
| Export Wizard | Configure an evidence package for delivery to the prosecution, defence, or another agency |
| Export Types | Output evidence in a format compatible with the recipient's platform |
| Export Templates | Reuse a standard export configuration for recurring evidence deliveries |
| Native Export | Export original native files as part of an evidence package |
| Text Export | Export extracted text for external analysis or keyword processing |
| PDF Export | Generate PDF renditions of evidence for inclusion in court bundles |
| TIFF/JPEG Export | Produce image-based renditions of documents for formal production |
| Production IDs | Assign production numbers to evidence documents for formal identification |
| ID Stamping | Stamp production identifiers on documents for traceability |
| Page Number Stamping | Add page numbers to multi-page evidence documents |
| Endorsement Stamping | Apply classification or confidentiality stamps to exported documents |
| Markup in Export | Include redactions in the export to ensure sensitive content is protected in the delivered package |
| MS Office Settings | Control how tracked changes and hidden content are rendered in exported Office documents |
| Field Selection | Select which metadata fields to include in the export load file |
| Placeholders | Generate placeholder pages for documents that cannot be produced |
| Cover Letters | Attach a cover letter to a formal evidence disclosure package |
| Manual Order | Arrange evidence documents in a specific sequence for a court bundle |
| Export Verification | Verify the exported package is complete and accurate before delivery |
| Export Package Viewer | Preview the export package as it will appear to the recipient |
| Error Logs | Review and resolve any errors that occurred during the export process |
| Run as New | Re-run a modified export after correcting errors or adding additional documents |
| Exports Page | Manage all evidence exports and track delivery history |
| Export to Case (Simplified) | Quickly copy key evidence to a related case for cross-case investigation |
| Export to Case (Full) | Perform a controlled transfer of evidence with full field mapping to another case |
| Image Generation | Generate PDF or TIFF images of evidence with stamping for formal production |
| Grid Download | Download a filtered set of evidence documents to Excel with optional file attachments |
| Print Records | Print a set of key evidence documents into a single PDF for a physical briefing pack |
| Australian Court-Compliant Export | Produce evidence in the format required by the Australian Federal Court |
| Exhibit List Generation | Generate a numbered exhibit list for hearing preparation |