Searching and Seizing Computers and Obtaining Electronic Evidence in Criminal Investigations
This is the long document, so you don't need to read the whole document, but I would like you to look on Forensics Analysis session (page 86) and Chapter 5 (Evidence)
There are several years of data, try to do some basic analysis - what kind of
computer crimes are mostly reported? Any changes over the years? etc.
Add
additional analysis questions of your choice!