How can operating system data be used to track criminal activity?

Tracking Criminal Activity How can operating system data be used to track criminal activity? Use specific examples of operating system information (i.e., an Internet history cache) in your response.