Tutorials
One short walkthrough per major feature. Replace names, systems, and policies with your agency's standards. As the product changes, exact click paths may differ slightly—use the linked user guides for detail.
Flash PD
Cases and teamwork
- Open the case list or dashboard and locate the matter by number, title, or tag.
- If you are starting fresh, create a case with the identifiers and classification your unit requires.
- Share the case only with cleared colleagues, using the view or edit role your SOP defines.
- Add or update case instructions so the assistant and teammates know jurisdiction, sensitivities, and what “done” means.
- Link related cases when suspects or incidents overlap; skim case activity after time away to see uploads and edits. Guide
Evidence workspace
- From the case, open the evidence area and confirm folder layout matches your team's convention.
- Upload or ingest permitted material; wait for processing before relying on search or AI on those files.
- Use filters and search to find a file by name, type, or source; open items from the list to preview or play.
- For phone extractions, follow your lab's naming so later exports and reports stay traceable.
- Spot-check a few items against originals before you cite them in reports. Guide
Investigator assistant
- Open the assistant inside the case so it inherits case instructions and allowed evidence.
- Ask one focused question at a time; paste short excerpts instead of dumping entire files when possible.
- Choose faster vs deeper reasoning to match urgency; still verify answers against source material.
- Use feedback controls if your deployment offers them so the model improves for your unit.
- Treat outputs as drafts: confirm facts before court, discipline, or charging decisions. Guide
Link analysis (board)
- After processing, open link analysis from the case and review the entity list for people, places, and objects tied to the evidence.
- Select entities of interest and open the graph to see how they connect.
- Use search and path-finding to test hypotheses (“how might A tie to B?”) and note hops that need corroboration.
- Explore communities or clusters to see groups that move together; read summaries as leads, not conclusions.
- Export or screenshot only what policy allows; document your reasoning in the case narrative. Board overview, Graph and paths, Communities
Reports and templates
- From the case, open reports and pick a template that matches the product your prosecutor or partner expects.
- Fill prompts or fields with verified facts; avoid copying unreviewed AI text straight into charging language.
- Save reusable templates when your unit repeats the same structure (affidavit sections, timelines, summaries).
- Preview the full document; fix headings, redactions, and exhibit references before sharing outside the team.
- Version or rename outputs so supervisors can tell which report matches which evidence drop. Guide
Exports and handoff
- Confirm what may leave your environment (CJI rules, protective orders, partner agreements).
- Build a case export package with the folders and reports the receiving agency asked for.
- Spot-check the bundle: open a sample of media and documents to ensure nothing is missing or corrupt.
- Transfer through approved channels; record chain-of-custody per your records policy.
- Keep a note in the case file of what was sent, when, and to whom. Guide
Bookmarks, notes, and spreadsheets
- Use bookmarks for evidence moments you will revisit in interviews, reports, or court prep.
- Keep notepad entries short and factual; avoid speculation that could be misread later.
- Use spreadsheets when you need sortable lists (vehicles, phones, transactions) tied to the case.
- Align column names with your unit's standards so exports match RMS or evidence indexes.
- Review shared notes when handoffs occur so nothing critical lives only in one person's head. Guide
Activity and insights
- Open activity for the case to see uploads, edits, and sharing in chronological order.
- Supervisors: filter or scan for idle cases, large uploads, or unusual access patterns per your oversight policy.
- Cross-check activity against your own notes before accusing someone of missing a step.
- Use insights sparingly for staffing decisions; they supplement, not replace, supervisory judgment.
- Export or print activity logs only when your policy allows and redact as needed. Guide
Trash and recovery
- Before deleting, confirm whether your org uses soft delete (recoverable) and who may permanently purge.
- Move items to trash only after duplicating anything still needed for court or audits.
- To restore, open trash, locate the item, and restore within the retention window your admin configured.
- Involve records or legal before permanent deletion of case material.
- Document restores in your case narrative if the action could matter in discovery. Guide
Flash GPT
Sign-in and security
- Sign in through the method your agency assigned (SSO, username/password, or federated identity).
- Complete MFA when prompted; do not share codes or devices.
- Sign out on shared machines; clear sensitive drafts before walking away.
- If you see unfamiliar sessions or prompts, stop and contact your security or IT contact.
- Read local rules on where Flash GPT may be used (office vs VPN vs isolated machine). Guide
Conversations
- Start each thread with a one-line goal: summarize, draft, extract, or compare.
- Paste only the minimum text needed; attach files only when policy permits.
- State audience, tone, length, and constraints (“no legal conclusions,” “cite only attached doc”).
- Use faster vs deeper modes appropriately; reread outputs for hallucinations or missing caveats.
- If web search is enabled, verify facts from independent sources before operational use. Guide
Organizing chats
- Rename threads so future-you can find them (project, date, topic).
- Bookmark high-value conversations per your product's chat library controls.
- Share links only with people cleared for the content; remove shared access when the project ends.
- Periodically archive or delete drafts that contain outdated or over-collected information.
- Align folder or label conventions with your team so handoffs are obvious. Guide
Files and documents
- Confirm file types and size limits with your admin before uploading sensitive material.
- Prefer attachments for one-off review; save to “documents” when the file should persist across sessions.
- Redact or strip metadata if your policy requires before upload.
- After analysis, delete attachments you no longer need if retention rules allow.
- Never upload classified or exempt material outside approved handling paths. Guide
Personas and projects
- Create or select a persona that matches the tone you need (patrol brief vs executive summary).
- Scope a project when you have a standing body of work (policy refresh, training series) to keep context together.
- Adjust persona settings when the audience changes; do not rely on stale instructions across unrelated topics.
- Review outputs for bias or overconfidence when the persona is “expert-like.”
- Share project settings only with collaborators who need the same framing. Guide
Templates and timelines
- Save prompts you reuse (after-action questions, FOIA response outlines, training module shells).
- Parameterize templates with brackets for names, dates, and jurisdictions so others can reuse safely.
- Build timelines from documents by asking for a chronological table, then verify every date against sources.
- Export timelines to your case system or memo only after spot-checking critical events.
- Version templates when law or policy changes so old drafts are not recycled blindly. Guide
Settings, memories, and privacy
- Open settings and confirm retention, logging, and default model match your unit's agreement.
- Review stored memories; delete anything that should not persist (personal data, open complaints).
- Turn off or limit features (web, plugins) if your security office has not approved them.
- Use audit or history views, if available, before sensitive meetings to ensure no stray content appears.
- When in doubt, ask your privacy officer before storing CJI in memories or long-running threads. Guide
Security and deployment
- Know whether your tenant is CJIS-aligned or general commercial; follow the stricter path when unsure.
- Use only approved networks and endpoints; avoid personal devices for agency work.
- Coordinate with IT on updates, VPN requirements, and incident reporting if data may have been exposed.
- Bundle related questions for security reviews instead of one-off ad hoc uploads.
- Read your org's acceptable-use policy alongside these guides. Guide
Product reference: Flash PD, Flash GPT.