. . "It may sound more like a novel setup, but destroying access to money, to systems, to networks and other resources repeatedly - as often as they are obtained - is as valid a challenge to their activity as a defense against their attacks on our end is." . .