Searching and Seizing Computers and Obtaining Electronic Evidence in Criminal Investigations
This is the long document, so you don't need to read the whole document, but I would like you to look on Forensics Analysis session (page 86) and Chapter 5 (Evidence)
There are 14 years of data, try to do some basic analysis - what kind of computer crimes are mostly reported? Any changes over the years? etc....add more analysis questions of your choice!