Then, explore the response from authorities, ISPs, and tech companies. For example, blocking domains, shutting down server locations, cooperation between law enforcement and cybersecurity experts. Also mention the challenges: rapid domain recreation, encryption, jurisdictional issues.