Conduct a Criminal Investigation
You are a computer forensics investigator in local law enforcement who has been assigned to an identity theft case. The suspect has set up a website that purports to be a technology blog, but trusted users can log in to a secure area of the website and buy stolen credit card numbers.
Detail how you would conduct your investigation in terms of profiling the suspect, working undercover, and capturing incriminating evidence online. Illustrate and map out this process using a MS PowerPoint slideshow. At least 7-10 slides.