Taking Data Hostage: Exploring the Feasibility of Using Ransomware for Interstate Coercion