Seized computer equipment is under analysis for victim identification and assessment of the alleged abuse’s scope.