. "Agencies, service providers, and other groups have in recent years been involved in efforts to find and confiscate the servers used in the crimes." . . . .