Research post topic and submit 260 word post on the given topic, indicate at least two source or reference in your original post. This assignment is to be scholarly; it is not enough for you to simply post your article and add cursory reviews. CITED REFERENCES ARE REQUIRED. Also post a reply to given 2 posts,  include at least 110 words in each post and provide at least one reference. In reply posts, do not  say, good job, way to go, etc. Your reply should reflect an understanding of the situation and the reading materials. Post Topic: Please describe an instance of which you are aware in which an act of internet crime took place. Reply to following posts with at least 110 words and at least 1 cited reference, do not  say, good job, way to go, etc. Your reply should reflect an understanding of the situation and the reading materials. Post 1: The act of Internet Crime In 1996, The National Information Infrastructure Act (NIIA) was passed and it added onto the CFFA, which include the unlawful access to a threatened computer in excess of the parties’ consent, which means that it became illegal to view info on a computer without the authorization of any kind. Another Act formed was the Electronic Communication Act which was passed in 1986. It was an alteration to the federal monitor law. The Act made it impossible to take hold of stored or transferred electronic communication without permission. The Electronic Communication Act made it unlawful to access specific forms of communication content even from government bodies which can be provided by the ISP without going through the proper channels to obtain legal procedures to provide such information.  In 1998, The Digital Millennium Copyright Act was passed. This Act altered Title 17 of the United States code to WIPO (World Intellectual Property Organization) which was to combat with new technology. This Act excludes the modification of information of inventor, the terms and environments for use of such set work or the purpose of its intent. The act provides a way in which civil preparations can be applied as well as criminal punishments for violation. In 2002, the Cyber Security Enhancement Act was passed. The Act helped law agencies to increase punishments which were set out in the CFFA which in turn means harsher punishments for individuals who willingly committed computer crimes in the end result of even bodily injuries etc. Those punishments can range from 5 to 20 years, or even life imprisonment. In the midst of the mid-year of 2008, a substitute digital wrongdoing was recognized corporate record takeover. It is over the top and positions among the speediest and stealthy kind of attack. Digital criminals taking an interest in this development surreptitiously get a substance’s money related dealing with a record accreditation, use programming to catch one of its PCs remotely and take stores from the substance’s monetary adjust, every now and again costing the component countless (Singleton and Ursillo Jr., 2010). According to David Nelson, FDIC Cyber-Fraud and Financial Crimes Section professional, little and normal size associations (SMBs) and their budgetary establishments persisted about $120 million in setbacks as a result of electronic resources move coercion in the second from last quarter of 2009, up from about $85 million from two years earlier. According to the FBI, November 2009 hardships alone were about $100 million (Savage, 2010). References Savage, M. (2010). “FDIC: ACH Fraud Losses Climb Despite Drop in Overall Cybercrud Losses. Financial Security, Retrieved from: http://searchfinancialsecurity.techtarget.com/resources. Singleton & Ursillo Jr. (2010). “Guard Against Cybertheft”. Journal of Accountancy addressing this cybercrime, Journal of Accountancy, Vol. 210, No. 4, pp. 42-44, 46, 48-49. Center, Finjan Malicious Code Research. “Web Security Trends Report.” Securing your web (1996-2008): 1-20. eSecurity Planet. 2011. Retrieved from http://www.esecurityplanet.com/trends/article.php/3871456/Cyber-Crooks-Doubled-Their-Take-in-09-FBI.htm. eSecurity Planet. n.d.  Retrieved from http://www.esecurityplanet.com/features/article.php/3872326/FBI-Underboss-Says-Cyber-Criminals-the-New-Mafia.htm. Post 2: Equifax has given a record data that interpreted as almost 143 million customers were target of theft.  One of the other consumers organization has reported that these kind of online frauds and cyber crimes are not just affecting people’s money, but it is also a big threat to the organizations and their private information. Donald Trump enacted an executive order 13800 (82 Federal Regulation 22391), with the tile and statement of “Strengthening the Cybersecurity of Federal Networks and Infrastructure”. It was enacted with interest of safety and awareness about cybercrimes. He appointed a positional secretary of various state to imply these implications on a practical basis. Furthermore, he added that the United Sates is in collaboration with worldwide secure and reliable network (Internet). And this agenda must maintain their integrity. In order to do that there should be a protocols and policies (Shows legitimate boundaries) which should be feasible, affordable and easy to implicate. The purpose of developing regulations is not just limited to the developing security, but it also enhances the quality by maintaining its prosperity, limiting frauds and provide enough restrictions against disruption and theft (Broadhurst, R. 2006). Having all the components, it is still bit difficult to make those implications. But it is not impossible.  Computer forensic has been revolving over the years which has brought enormous changes and has kept this process at ease.  Judicial issues are still one of the thoughtful questions which make these all commands bit more difficult but with the cooperation of people, country and government it is possible (Kao, D.-Y., & Wang, S.-J. 2009).   References: Broadhurst, R. (2006). Developments in the Global Law Enforcement of Cyber-Crime. Policing: An International Journal of Police Strategies and Management, (Issue 3), 408. Retrieved from http://search.ebscohost.com/login.aspx?direct=true&AuthType=sso&db=edshol&AN=edshol.hein.journals.polic29.37 Kao, D.-Y., & Wang, S.-J. (2009). The IP Address and Time in Cyber-Crime Investigation. Policing: An International Journal of Police Strategies & Management, (Issue 2), 194. Retrieved from http://search.ebscohost.com/login.aspx?direct=true&AuthType=sso&db=edshol&AN=edshol.hein.journals.polic32.21