The allure of cybercrime is the anonymity it affords behind layers of technological protection: an alias, a TOR (The Onion Router) network, a virtual private network (VPN), a pseudonymous Bitcoin wallet. For an organization under siege, the inability to unveil a hacker’s identity is all the more excruciating.

DISCLAIMER: This case study depicts a fictional cyber incident based on real-life scenarios described by expert interviewees, media reports, and other publicly available resources. While the details surrounding the characters, company, and ransomware attack are imagined, the business concerns and legal issues raised are plausible and based on actual cases.

Aly McDevitt is Data & Research Journalist at Compliance Week. She has a background in education and college consulting. Prior to teaching, she was an editor/author at Thomson Reuters, where she reported...