This involves analyzing digital evidence to identify patterns and identify potential cyber criminals.