Tags
computer, computer forensics, hacking, penetration testing, phishing, private investigators, security
Who has the right to probe digital crime? That very question may be the next battleground between the flatfooted private detective of old and the new-age computer sleuth.