Collect documentary or physical evidence of cyber intrusion incidents, investigations, and operations