http://www.mirrors.wiretapped
Department of Justice Computer Seizure Procedures
http://www.cybercrime.gov/s
While reading "Incident Response" I came across references to the
DOE-CFL manual and after some Google searching found the DOJ offering.
Both good reads for those interested in proper procedure for
performing IH.
Thoughts?