Under what circumstance the computer criminals may escape without detected according to the author in the second paragraph
A.If they hooked to computer anonymously. B.If they are clever enough. C.If they know how to operated computer. D.If no one checks up on what the computer is doing.