The digital avoidance are use to stablish a credible link between (a) Attacker and victim and crime scene
(b) Attacker and the crime scene
(c) Victim and crime scene
(d) Attacker and information.
(b) Attacker and the crime scene
(c) Victim and crime scene
(d) Attacker and information.