How to Identify, Disrupt, and Dismantle Unauthorized ...