Yeah, this sucks. The forensic analysis will depend on your set up, as others have mentioned, but probably also the extent of the charges against you, your jurisdiction, the "level" of LE you're dealing with (local cops vs DEA), etc. Good: an encrypted thumb drive with the browser bundle and a portable PGP program like GPG4USB. Great: Tails on a thumb drive with the persistent volume enabled. Your setup: potentially very bad. I'm assuming that you're not using any type of encryption. Do you have bookmarks to SR and the forum in TorBrowser, or a text file? Do you have passwords saved anywhere? Your PGP private key is encrypted, but do you have encrypted messages stored on the hard drive? Do you have *unencrypted* messages stored on the hard drive? Even if the messages are encrypted, there's a saying that "metadata in aggregate is content". LE can find the key IDs in the encrypted PGP messages and match them up to key IDs of vendors on SR, thus proving evidence that you were communicating with them. There are ways to anonymize the recipients, but you'd have to convince the vendors to do. It's better to keep all that data on an encrypted volume than to rely on someone else doing the right thing for your security.