ADVERTISEMENT

Exclusive

Would Kandi Make an Xscape Biopic?

By  | 

Xscape…the Movie? Never say never!

Despite a falling out with fellow bandmate Tamika Scott over “some real foul stuff” being said, Kandi isn’t nixing the idea of making a biopic of the ’90s girl group that shot the Real Housewives of Atlanta star to fame.

ADVERTISEMENT

“I think an Xscape movie would be great,” she told Hip Hollywood. “Just like all girl groups it was some crazy moments and I think it would make for a great, great movie.”

And as for who would play the leading lady? Kandi’s already got the casting all figured out! “Tika Sumpter!” she exclaimed. “I think she would be good.”

While tensions may be strained with Tamika, Kandi is on good terms with her other bandmate, Tameka Cottle, otherwise known as “Tiny.” Her pick for playing her former members’ role in the film? “The little short chick” from VH1’s Hit The Floor, Logan Browning.

Throughout the ’90s, Kandi’s group released three studio albums and scored six Top 10 hit songs on the Billboard Hot 100, including “Just Kicking It,” “Understanding,” and “Who Can I Run To.” Since her time in the group, Kandi has gone on to co-write songs for Mariah Carey, Faith Evans, Whitney Houston, and TLC.

Via The Dish

ADVERTISEMENT
  • Marie A. Brooks

    Tika is a great choice. Go Kandi…hope they do make a biopic!

  • Amelia Horn

    I’m praying that all the ladies can put their differences aside to make this biopic happen.

  • Alex Harris

    I still represent my Mr.United States Veteran Alex Harris Jr.(Masschettes) and Mrs.Mattie Lee Gibson Harris (Florida ) and our Family/extended family because the LORD thy God and Jesus Christ is Lord me too!I’m not a antichrist !1 Timothy 5:8King James Version (KJV)
    8 But if any provide not for his own, and specially for those of his own house, he hath denied the faith, and is worse than an infidel.
    18 U.S. Code § 3290 – Fugitives from justice
    Current through Pub. L. 113-296, except 113-287, 113-291, 113-295. (See Public Laws for the current Congress.)
    US CodeNotesprev | next
    No statute of limitations shall extend to any person fleeing from justice.
    18 U.S. Code § 2518 – Procedure for interception of wire, oral, or electronic communications(Macon Georgia ,Atlanta Georgia,and Georgia Law Enforcement’s, Judge’s, Ex – President Commander in Cheif Georgia W. Bush the Republican Party ,Governmental Agency’s,and Prosecuting Attorney’s ya’ll fugitives from justice my sexual abuse a minor a ward of the court under age 12 federal crime scene isn’t the 1996 Macon Georgia The DEpartment of Family and Children SErvices Federal Crime Scene this open up the gate hells against everybody offering children up to the god Molech including its supporters)Me and President Commander in Chief Barack Obama and our Administration we not racist,we’re not denying people employment, we’re committing genocide to United States Veteran ‘s, we’re not against heterosexual-bisexual-heterosexual people everybody has the federally protected activity United States Constitution first amendment even though I am a heterosexual-gay meaning happy in the dictionary-celebiate everybody has the right to be happy with whoever they want its exposed how the Ga.Judges-law enforcements-prosecuting attorney-false witnesses-use homosexual to commit hate crimes and more to their own the same as to heterosexuals,and more!
    Current through Pub. L. 113-296, except 113-287, 113-291, 113-295. (See Public Laws for the current Congress.)
    US CodeNotesprev | next
    (1) Each application for an order authorizing or approving the interception of a wire, oral, or electronic communication under this chapter shall be made in writing upon oath or affirmation to a judge of competent jurisdiction and shall state the applicant’s authority to make such application. Each application shall include the following information:
    (a) the identity of the investigative or law enforcement officer making the application, and the officer authorizing the application;
    Macon Ga.Bibb County Sheriff Department/Macon Ga.Police Department/Macon Ga. and Atlanta Ga.FBI/GBI/and other’s(law enforcement of Georgia ),Judge’s,United States Secret Services , and Prosecuting Attorney’s looking at the fact’s the crimes reported its no way for them to get away by throwing up their publicity stunt from Macon Ga.Pleasant Hill Community AntiChrists!(smiling and Laughing!!!)Right Now Georgia Governor Nathan Deal Republican Party ,Macon Ga.mayor’s including Ex mayor’s,Bibb County Sheriff Department and Sheriff, FBI,GBI,Macon Georgia Police Department and Chief of Police,Judges,False Witnesses,NAACP and Black Oragnzaition’s Presidents and Members,Congress’s, Senator’s, Representative’s, and Prosecuting attorney’s including Atlanta Ga.except maybe Atlanta Ga. Mayor kasim Reed all Fugitives From Justice taking bribes concealing person from arrest failing to inveatigate Blocking report of a federal crime and retalitation against a whistleblower for attempting to report corruption by key government personnel including federal felony kidnaping Me/Alex Delance Antwain Harris and Virginia Harris (my mentally ill.birthmother )for Ransom from 2005-2015 this time on Wiretap Order US Code 18 2518 here the state of Georgia pointing the finger at Me and Prseident Commander in Cheif Barack Obama and our Administration !I don’t mention the Macon ga. Publicity stunt because the victim and his supporters supporting a illegal cause including they’re willing participates,aid and abetting,concealing person from arrest, flight to avoid giving testimony or avoid prosecution,Federally Protected Activites Civil Rights Violation Federal Crimes,and more! Ask them which occurred first the legithustler reporting the crimes or the illegal publicity stunt crime from Macon ga.Pleasant Hill Community?My late grandfather Mr.United States Veteran Alex Harris Jr. was Jew (his father) and black( mother) and his wife Cherokee Indian Mrs.Mattie Lee Gibson Harris hs widow!I’ll be getting my BA for Harvard Law College out State of Georgia .I apprepricate ya’ll destroying Local /Macon and Atlanta Ga/ and other’s and State /State of Georgia -Florida-Tennesse-and other for me and President Commander in Cheif Barack Obama and our Administration !This is tips for investigation for authorities only !TI ,Plies,Hip-Hop brothers and sister’s,my lil’mans and daddy’s lil’girls ,and my family/extended family and Olgethrope Community Neighbor’s look at US Code 18 2518 since they can talk about ya’ll they need to be questioning ya’ll that’s failing to investigate federal charges and then some fighting against UNited States Constitution, The Word of God, Civil Rights Federally Prosecuted Activities, and Fighting Against Georgia Constitution all at the same time they on US Code 18 2518 we got they confession’s!
    Remember 1996 Macon Ga. involving Me and Virginia Harris now stupid muthafuckas look O.C.G.A. 17-3-2 (2010)
    17-3-2. Limitation on prosecutions — Periods excluded
    The period within which a prosecution must be commenced under Code Section 17-3-1 or other applicable statute does not include any period in which:
    (1) The accused is not usually and publicly a resident within this state;
    (2) The person committing the crime is unknown or the crime is unknown;(Macon Georgia The Department of Family and Children Services administration including staff and faculty and social worker’s unknown,The back up unknown,Georgia US Code 18 2518 wiretap order Judges, law enforcements, governmental agency’s, and prosecuting attorneys operator’s unknown,false witnesses/retaliator’s,and other’s unknown)They caught Federal Felony Kidnaping For Ransom Virginia Harris (my mentally ill. birthmother ) and I /Alex Delance Antwain Harris including failing to inveatigate the 1965 federal felony first degree murder of Mr.United States Veteran Alex Harris Jr. at Transco Plant Railroad/Norfolk Southern Railroad/Georgia Southern Railroad/Florida Railroad by the nightwatchmen R.E.Pearson committing Genocide A1 to Transco Plant Railroad Employees/UNited States of American Citizens/Unites States veteran’s licking to Atlanta Ga. Veteran Hospital Genocide to United States Veteran’s of all races plus giving unlawful access to stored communication US Code 18 2518 to elementary-middle-highschool-colleges students the doctors here in Ga. working on the United States Veteran’s stupid as a bat just like their court appointed attorneys the federal prosecuting attorney how you going to tell everybody ya’ll ain’t illegal exclusion evidence in Atlanta Ga. Cheating Scandal looking my internet /electronic commuication comments and caling the FBI !The NAACP and Black Organization’s President’s and Member’s such as Thelma Dillard and her daughter, Macon Ga. Ex Mayor C Jack Ellis,Sen. Robert Brown,Al Tillman, Jesse Jackson,Al Sharpton, and other’s the same ones committing Treason, Violation of Civil Rights including Federal felony kidnaping for ransom Me and Virginia Harris(my mentally ill. birthmother),violation of UNited States Constitutional Rights,Genocide to me and mines,and more crimes violation of UNited States Constitution State-Legislature-Judicial Powers !Thank ya’ll for showing everybody here in Atlanta Ga. how black polices,sheriff’s,judge’s, prosecuting attorney’s,FBI,GBI,law enforcement’s,governmental agency’s,UNited States Department of Justice Civil Rights Division,sentaor’s, congress’s, NAACP and Black Organization Presidents and Members, black false witnesses,and other’s committing Genocide ,Conspiracy Against Rights, Blocking Report of a Federal Crime and Retaliation against the whistleblower for attempting to report corruption by key government personnel including federal felony kidnaping me for ransom,Unlawful access to stored comuncation,Treason,Bribery,taking bribes concealing person from arrest,the Macon Ga. Wire Communication inside my family members home illegally by the terrorist ya’ll responsblity is to investigate its gooing on what from 1996-2015 19 years and the FBI can’t prove the crimes wasn’t committed to Me and Virginia Harris in 1996 waiting on Mrs.Mattie Lee Gibson Harris widow U.S.Veteran Alex HarrisJr. to pass in 2009 still don’t give these stupid muthafuckas no leave way they see failing to investigate along with Genocide attempt and Conspiracy federal charges !
    (3) The accused is a government officer or employee and the crime charged is theft by conversion of public property while such an officer or employee; or
    (4) The accused is a guardian or trustee and the crime charged is theft by conversion of property of the ward or beneficiary.
    42 U.S. Code § 13031 – Child abuse reporting
    Current through Pub. L. 113-296, except 113-287, 113-291, 113-295. (See Public Laws for the current Congress.)
    US CodeNotesAuthorities (CFR)prev | next
    (a) In general
    A person who, while engaged in a professional capacity or activity described in subsection (b) of this section on Federal land or in a federally operated (or contracted) facility, learns of facts that give reason to suspect that a child has suffered an incident of child abuse, shall as soon as possible make a report of the suspected abuse to the agency designated under subsection (d) of this section.
    (b) Covered professionals
    Persons engaged in the following professions and activities are subject to the requirements of subsection (a) of this section:
    (1) Physicians, dentists, medical residents or interns, hospital personnel and administrators, nurses, health care practitioners, chiropractors, osteopaths, pharmacists, optometrists, podiatrists, emergency medical technicians, ambulance drivers, undertakers, coroners, medical examiners, alcohol or drug treatment personnel, and persons performing a healing role or practicing the healing arts.
    (2) Psychologists, psychiatrists, and mental health professionals.(Just like U.S.Veteran in Atlanta Ga. that murdered herseilf and children they knew the same way they about Virginia Harris my mentally ill.birthmother)
    (3) Social workers, licensed or unlicensed marriage, family, and individual counselors. (Macon Georgia The Department of family and Children Services is the Crime scene nobody reported they tried to run a minor insane Child abuse mixed with Genocide pointing the finger at my family/extendedfamily not ever at the sperm donor nor a Ms.Blue the Department of Family and Childen Services Head Director they can’t help heard that shit for so long.I had to leave knowing I ain’t ever going back to to live or start a family of my own along knowing my family /extended family and OLgethrope Community Neighbor’s will alright I put them in the LORD hand’s and they leaving too!)
    (4) Teachers, teacher’s aides or assistants, school counselors and guidance personnel, school officials, and school administrators. (Central Highschool the 1999-2000 Federal Crime Scene ain’t that right Sgt.Dixion and local NAACP President Thelma Dillard and City Council Member)
    (5) Child care workers and administrators.
    (6) Law enforcement personnel(FBI,GBI,Bibb County Sheriff Department,Macon Police Department, GA.Law Enforcement’s, and other’s), probation officers, criminal prosecutors(Federal Prosecuting Attorney’s,and more), and juvenile rehabilitation or detention facility employees.
    (7) Foster parents.
    (8) Commercial film and photo processors.
    Macon Ga.Entire Bibb County Government Directory(Except Me, Barack Obama ,Bill Clinton,.J.F.K.Jr.,Abraham Lincoln,Me and Barack Obama and our Administration) and its Inetrn’s,Partner and Stakeholder’s,Business Community,Media,Volunteer Groups,General Public(Ecept me, my family/extended family and Olgethrope Community Neighbor’s doesn’t include sperm donor’s,inlaws,baby daddy’s,baby mommas,people failig to investigate,people with unlawful access to stored communication,people committing genocide ,and their entire family and friend’s),Pastor’s and Congregation’s,Bibb County Sheriff Department and Sheriff,Macon Ga.Police Department and Chief of Police,FBI Agent’s,FBI,GBI,Macon Ga.City Oridance states the judges-chief of police-sheriff-mayor municipal corporation-prosecuting attorney’s-judges-Ga.Governor-and mayor can issue a warrant these are the same people committing Genocide to Mr.U.S.Veteran Alex Harris Jr.and Mrs.Mattie Lee Gibson Harris and our Family /extended family since U.S.Vet.Alex Harris Jr. 1965 Federal Felony First Degree Murder at Transco Plant Railroad/Norfolk Southern railroad/Georgia Southern Railroad by the nightwatchmen R.E.Pearson,Macon Ga.Indigent Defense Attorney’s, Gangs and Organization’s,Black Communities,Communities,others,and their entire family and friend’s -Atlanta Ga.Entire Fulton County Directory(Except Me, Barack Obama ,Bill Clinton,.J.F.K.Jr.,Abraham Lincoln,Me and Barack Obama and our Administration,and maybe Mayor Kasim Reed )and its Inetrn’s,Partner and Stakeholder’s,Business Community,CNN,Volunteer Groups,General Public(Ecept me, my family/extended family and Olgethrope Community Neighbor’s doesn’t include sperm donor’s,inlaws,baby daddy’s,baby mommas,people failig to investigate,people with unlawful access to stored communication,people committing genocide ,and their entire family and friend’s),Pastor’s and Congregation’s,Fulton County Sheriff Department and Sheriff,Atlanta Ga.Police Department and Chief of Police,FBI Agent’s,FBI,GBI,Macon Ga.City Oridance states the judges-chief of police-sheriff-mayor municipal corporation-prosecuting attorney’s-judges-Ga.Governor-and mayor can issue a warrant these are the same people committing Genocide to Mr.U.S.Veteran Alex Harris Jr.and Mrs.Mattie Lee Gibson Harris and our Family /extended family since U.S.Vet.Alex Harris Jr. 1965 Federal Felony First Degree Murder at Transco Plant Railroad/Norfolk Southern railroad/Georgia Southern Railroad by the nightwatchmen R.E.Pearson,Macon Ga.Indigent Defense Attorney’s, Gangs and Organization’s,Black Communities,Communities,others,and their entire family and friend’s !

  • Alex Harris

    TI tell heatherb Atlanta Ga.Judges, Law Enforcements City of Atlanta Ga. Police and Chief of Police/FBI/GBI/Fulton County Sheriff Department and Sheriff/and other’s, Prosecuting attorney’s , and governmental agency’s just like Macon ga. confessing to aid and abetting , taking bribes concealing person from arrest,treason,bribery,failing to investigate ,genocide, unlawful access to stored communication US Code 18 2518 to general public-business community-first responders-volunteer groups-media opposing Genocide to Hip-Hop including Federal Felony First Degree Murder of Tupac and Biggie !They can’t prove they didn’t know about the crime !They also can’t prove they investigated nobody has been questioned including since the crimes are federal the FBI automatically been getting the report of right now crimes and past meaning the police and sheriff department local and state law enforcement of Georgia ya’ll muthafuckas can’t investigate federal cases crimes!Georgia Fugitives From Justice taking bribes concealing person from arrest aid and abetting blocking report of a federal crime and retaliation against whistleblower for attempting to report corruption by key government personnel including federal felony kidnaping me for ransom all on US Code 18 2518 from 2005-2015 the other from 1996-2015 is on the telephone with the FBI and others !I don’t talk abotu being sexual abused as a minor a ward of the court with nobody period in Atlanta Ga. its how the corrupt informants and undercovers blow they covers!Ward of Court between Attorney (court appointed attorney and Prosecuting Attorney) and Court ask them how they did they find out if it wasn’t for the corrupt Polices,sheriffs,judges,prosecuting attorney’s, FBI agents,GBI agents, and other’s I’m glad I didn’t talk about a false crime on the internet or with the FBI agents !

  • Alex Harris

    Everybody look Hip-Hop brothers and sister’s along with the rest of my brothers and sisters along with Me and President Commander in Cheif Barack Obama and our Administration investigate how federal felony first degree murders records made by macon police department, bibb county superior court records confessions they have destroyed Sabotage federal crime they already destroyed Mr.United States Veteran Alex Harris Jr. records as I already reported of the victims at Transco Plant Railroad .The main thing the children being illegally prosecuted as adults meaning its mandatory for children over 15 years old to be transferred to adult court for committing adult crimes remember I didn’t ever get one so its plenty more victims out their black,white,blue,green their court appointed attorneys helped commit the crimes to them just like mines did!TI and Rick Ross they only mention TI meaning the authorities got immeditate knowledge of the crimes the same one they’re failing to investigate !TI and Micheal Vick watch how they destroyed themselves !

  • Alex Harris

    Kandi and Todd Psalm 127-128 in due time!Keep God first and put ya minds to it!

  • Alex Harris

    Part 13!Psalm 126Psalm 129

    Psalm 127-128King James Version (KJV)

    127 Except the LORD build the house, they labour in vain that build it:
    except the LORD keep the city, the watchman waketh but in vain.

    2 It is vain for you to rise up early, to sit up late, to eat the bread
    of sorrows: for so he giveth his beloved sleep.

    3 Lo, children are an heritage of the LORD: and the fruit of the womb
    is his reward.

    4 As arrows are in the hand of a mighty man; so are children of the
    youth.

    5 Happy is the man that hath his quiver full of them: they shall not be
    ashamed, but they shall speak with the enemies in the gate.

    128 Blessed is every one that feareth the LORD; that walketh in his
    ways.

    2 For thou shalt eat the labour of thine hands: happy shalt thou be,
    and it shall be well with thee.

    3 Thy wife shall be as a fruitful vine by the sides of thine house: thy
    children like olive plants round about thy table.

    4 Behold, that thus shall the man be blessed that feareth the LORD.

    5 The LORD shall bless thee out of Zion: and thou shalt see the good of
    Jerusalem all the days of thy life.

    6 Yea, thou shalt see thy children’s children, and peace upon Israel.

    King James Version (KJV)

    18 U.S. Code § 247 – Damage to religious property; obstruction of
    persons in the free exercise of religious beliefs(Its automatic its judges, law
    enforcements, and prosecuting attorney’s
    along with their false witnesses ,and their entire family and friends of
    Antichrist )

    Current through Pub. L. 113-296, except 113-287, 113-291, 113-295. (See
    Public Laws for the current Congress.)

    • US Code

    • Notes

    prev | next

    (a)Whoever, in any of the circumstances referred to in subsection (b)
    of this section—

    (1)intentionally defaces, damages, or destroys any religious real
    property, because of the religious character of that property, or attempts to
    do so; or

    (2)intentionally obstructs, by force or threat of force, any person in
    the enjoyment of that person’s free exercise of religious beliefs, or attempts
    to do so;

    shall be punished as provided in subsection (d).

    (b)The circumstances referred to in subsection (a) are that the offense
    is in or affects interstate or foreign commerce.

    (c)Whoever intentionally defaces, damages, or destroys any religious
    real property because of the race, color, or ethnic characteristics of any
    individual associated with that religious property, or attempts to do so, shall
    be punished as provided in subsection (d).

    (d)The punishment for a violation of subsection (a) of this section
    shall be—

    (1)if death results from acts committed in violation of this section or
    if such acts include kidnapping or an attempt to kidnap, aggravated sexual
    abuse or an attempt to commit aggravated sexual abuse, or an attempt to kill, a
    fine in accordance with this title and imprisonment for any term of years or for
    life, or both, or may be sentenced to death;

    (2)if bodily injury results to any person, including any public safety
    officer performing duties as a direct or proximate result of conduct prohibited
    by this section, and the violation is by means of fire or an explosive, a fine
    under this title or imprisonment for not more that 40 years, or both;

    (3)if bodily injury to any person, including any public safety officer
    performing duties as a direct or proximate result of conduct prohibited by this
    section, results from the acts committed in violation of this section or if
    such acts include the use, attempted use, or threatened use of a dangerous
    weapon, explosives, or fire, a fine in accordance with this title and
    imprisonment for not more than 20 years, or both; and

    (4)in any other case, a fine in accordance with this title and
    imprisonment for not more than one year, or both.

    (e)No prosecution of any offense described in this section shall be
    undertaken by the United States except upon the certification in writing of the
    Attorney General or his designee that in his judgment a prosecution by the
    United States is in the public interest and necessary to secure substantial
    justice.

    (f)As used in this section, the term “religious real property” means
    any church, synagogue, mosque, religious cemetery, or other religious real
    property, including fixtures or religious objects contained within a place of
    religious worship.

    (g)No person shall be prosecuted, tried, or punished for any noncapital
    offense under this section unless the indictment is found or the information is
    instituted not later than 7 years after the date on which the offense was
    committed.

  • Alex Harris

    Part 12!Proverbs 1

    Psalm 150Proverbs 2

    Proverbs 1 King James Version (KJV)

    1 The proverbs of Solomon the son of David, king of Israel;

    2 To know wisdom and instruction; to perceive the words of
    understanding;

    3 To receive the instruction of wisdom, justice, and judgment, and
    equity;

    4 To give subtilty to the simple, to the young man knowledge and discretion.

    5 A wise man will hear, and will increase learning; and a man of
    understanding shall attain unto wise counsels:

    6 To understand a proverb, and the interpretation; the words of the
    wise, and their dark sayings.

    7 The fear of the LORD is the beginning of knowledge: but fools despise
    wisdom and instruction.

    8 My son, hear the instruction of thy father, and forsake not the law
    of thy mother:

    9 For they shall be an ornament of grace unto thy head, and chains
    about thy neck.

    10 My son, if sinners entice thee, consent thou not.

    11 If they say, Come with us, let us lay wait for blood, let us lurk
    privily for the innocent without cause:

    12 Let us swallow them up alive as the grave; and whole, as those that
    go down into the pit:

    13 We shall find all precious substance, we shall fill our houses with
    spoil:

    14 Cast in thy lot among us; let us all have one purse:

    15 My son, walk not thou in the way with them; refrain thy foot from
    their path:

    16 For their feet run to evil, and make haste to shed blood.

    17 Surely in vain the net is spread in the sight of any bird.

    18 And they lay wait for their own blood; they lurk privily for their
    own lives.

    19 So are the ways of every one that is greedy of gain; which taketh
    away the life of the owners thereof.

    20 Wisdom crieth without; she uttereth her voice in the streets:

    21 She crieth in the chief place of concourse, in the openings of the
    gates: in the city she uttereth her words, saying,

    22 How long, ye simple ones, will ye love simplicity? and the scorners
    delight in their scorning, and fools hate knowledge?

    23 Turn you at my reproof: behold, I will pour out my spirit unto you,
    I will make known my words unto you.

    24 Because I have called, and ye refused; I have stretched out my hand,
    and no man regarded;

    25 But ye have set at nought all my counsel, and would none of my
    reproof:

    26 I also will laugh at your calamity; I will mock when your fear
    cometh;

    27 When your fear cometh as desolation, and your destruction cometh as
    a whirlwind; when distress and anguish cometh upon you.

    28 Then shall they call upon me, but I will not answer; they shall seek
    me early, but they shall not find me:

    29 For that they hated knowledge, and did not choose the fear of the
    LORD:

    30 They would none of my counsel: they despised all my reproof.

    31 Therefore shall they eat of the fruit of their own way, and be
    filled with their own devices.

    32 For the turning away of the simple shall slay them, and the
    prosperity of fools shall destroy them.

    33 But whoso hearkeneth unto me shall dwell safely, and shall be quiet
    from fear of evil.

    King James Version (KJV)

    by Public Domain

    Proverbs 31

    Proverbs 30Ecclesiastes 1

    Proverbs 31 King James Version (KJV)

    31 The words of king Lemuel, the prophecy that his mother taught him.

    2 What, my son? and what, the son of my womb? and what, the son of my
    vows?

    3 Give not thy strength unto women, nor thy ways to that which
    destroyeth kings.

    4 It is not for kings, O Lemuel, it is not for kings to drink wine; nor
    for princes strong drink:

    5 Lest they drink, and forget the law, and pervert the judgment of any
    of the afflicted.

    6 Give strong drink unto him that is ready to perish, and wine unto
    those that be of heavy hearts.

    7 Let him drink, and forget his poverty, and remember his misery no
    more.

    8 Open thy mouth for the dumb in the cause of all such as are appointed
    to destruction.

    9 Open thy mouth, judge righteously, and plead the cause of the poor
    and needy.

    10 Who can find a virtuous woman? for her price is far above rubies.

    11 The heart of her husband doth safely trust in her, so that he shall
    have no need of spoil.

    12 She will do him good and not evil all the days of her life.

    13 She seeketh wool, and flax, and worketh willingly with her hands.

    14 She is like the merchants’ ships; she bringeth her food from afar.

    15 She riseth also while it is yet night, and giveth meat to her
    household, and a portion to her maidens.

    16 She considereth a field, and buyeth it: with the fruit of her hands
    she planteth a vineyard.

    17 She girdeth her loins with strength, and strengtheneth her arms.

    18 She perceiveth that her merchandise is good: her candle goeth not
    out by night.

    19 She layeth her hands to the spindle, and her hands hold the distaff.

    20 She stretcheth out her hand to the poor; yea, she reacheth forth her
    hands to the needy.

    21 She is not afraid of the snow for her household: for all her
    household are clothed with scarlet.

    22 She maketh herself coverings of tapestry; her clothing is silk and
    purple.

    23 Her husband is known in the gates, when he sitteth among the elders
    of the land.

    24 She maketh fine linen, and selleth it; and delivereth girdles unto
    the merchant.

    25 Strength and honour are her clothing; and she shall rejoice in time
    to come.

    26 She openeth her mouth with wisdom; and in her tongue is the law of
    kindness.

    27 She looketh well to the ways of her household, and eateth not the
    bread of idleness.

    28 Her children arise up, and call her blessed; her husband also, and
    he praiseth her.

    29 Many daughters have done virtuously, but thou excellest them all.

    30 Favour is deceitful, and beauty is vain: but a woman that feareth
    the LORD, she shall be praised.

    31 Give her of the fruit of her hands; and let her own works praise her
    in the gates.

    King James Version (KJV)

    by Public Domain

  • Alex Harris

    Part 11!Deuteronomy 27 King James Version (KJV)

    27 And Moses with the elders of Israel commanded the people, saying,
    Keep all the commandments which I command you this day.

    2 And it shall be on the day when ye shall pass over Jordan unto the
    land which the LORD thy God giveth thee, that thou shalt set thee up great
    stones, and plaister them with plaister:

    3 And thou shalt write upon them all the words of this law, when thou
    art passed over, that thou mayest go in unto the land which the LORD thy God
    giveth thee, a land that floweth with milk and honey; as the LORD God of thy fathers
    hath promised thee.

    4 Therefore it shall be when ye be gone over Jordan, that ye shall set
    up these stones, which I command you this day, in mount Ebal, and thou shalt
    plaister them with plaister.

    5 And there shalt thou build an altar unto the LORD thy God, an altar
    of stones: thou shalt not lift up any iron tool upon them.

    6 Thou shalt build the altar of the LORD thy God of whole stones: and
    thou shalt offer burnt offerings thereon unto the LORD thy God:

    7 And thou shalt offer peace offerings, and shalt eat there, and
    rejoice before the LORD thy God.

    8 And thou shalt write upon the stones all the words of this law very
    plainly.

    9 And Moses and the priests the Levites spake unto all Israel, saying,
    Take heed, and hearken, O Israel; this day thou art become the people of the
    LORD thy God.

    10 Thou shalt therefore obey the voice of the LORD thy God, and do his
    commandments and his statutes, which I command thee this day.

    11 And Moses charged the people the same day, saying,

    12 These shall stand upon mount Gerizim to bless the people, when ye
    are come over Jordan; Simeon, and Levi, and Judah, and Issachar, and Joseph,
    and Benjamin:

    13 And these shall stand upon mount Ebal to curse; Reuben, Gad, and
    Asher, and Zebulun, Dan, and Naphtali.

    14 And the Levites shall speak, and say unto all the men of Israel with
    a loud voice,

    15 Cursed be the man that maketh any graven or molten image, an abomination
    unto the LORD, the work of the hands of the craftsman, and putteth it in a
    secret place. And all the people shall answer and say, Amen.

    16 Cursed be he that setteth light by his father or his mother. And all
    the people shall say, Amen.

    17 Cursed be he that removeth his neighbour’s landmark. And all the
    people shall say, Amen.

    18 Cursed be he that maketh the blind to wander out of the way. And all
    the people shall say, Amen.

    19 Cursed be he that perverteth the judgment of the stranger,
    fatherless, and widow. And all the people shall say, Amen.

    20 Cursed be he that lieth with his father’s wife; because he
    uncovereth his father’s skirt. And all the people shall say, Amen.

    21 Cursed be he that lieth with any manner of beast. And all the people
    shall say, Amen.

    22 Cursed be he that lieth with his sister, the daughter of his father,
    or the daughter of his mother. And all the people shall say, Amen.

    23 Cursed be he that lieth with his mother in law. And all the people
    shall say, Amen.

    24 Cursed be he that smiteth his neighbour secretly. And all the people
    shall say, Amen.

    25 Cursed be he that taketh reward to slay an innocent person. And all
    the people shall say, Amen.

    26 Cursed be he that confirmeth not all the words of this law to do
    them. And all the people shall say, Amen.

    King James Version (KJV)

    by Public Domain

    Matthew 23

    Matthew 22Matthew 24

    Matthew 23 King James Version (KJV)

    23 Then spake Jesus to the multitude, and to his disciples,

    2 Saying The scribes and the Pharisees sit in Moses’ seat:

    3 All therefore whatsoever they bid you observe, that observe and do;
    but do not ye after their works: for they say, and do not.

    4 For they bind heavy burdens and grievous to be borne, and lay them on
    men’s shoulders; but they themselves will not move them with one of their
    fingers.

    5 But all their works they do for to be seen of men: they make broad
    their phylacteries, and enlarge the borders of their garments,

    6 And love the uppermost rooms at feasts, and the chief seats in the
    synagogues,

    7 And greetings in the markets, and to be called of men, Rabbi, Rabbi.

    8 But be not ye called Rabbi: for one is your Master, even Christ; and
    all ye are brethren.

    9 And call no man your father upon the earth: for one is your Father,
    which is in heaven.

    10 Neither be ye called masters: for one is your Master, even Christ.

    11 But he that is greatest among you shall be your servant.

    12 And whosoever shall exalt himself shall be abased; and he that shall
    humble himself shall be exalted.

    13 But woe unto you, scribes and Pharisees, hypocrites! for ye shut up
    the kingdom of heaven against men: for ye neither go in yourselves, neither
    suffer ye them that are entering to go in.

    14 Woe unto you, scribes and Pharisees, hypocrites! for ye devour
    widows’ houses, and for a pretence make long prayer: therefore ye shall receive
    the greater damnation.

    15 Woe unto you, scribes and Pharisees, hypocrites! for ye compass sea
    and land to make one proselyte, and when he is made, ye make him twofold more
    the child of hell than yourselves.

    16 Woe unto you, ye blind guides, which say, Whosoever shall swear by
    the temple, it is nothing; but whosoever shall swear by the gold of the temple,
    he is a debtor!

    17 Ye fools and blind: for whether is greater, the gold, or the temple
    that sanctifieth the gold?

    18 And, Whosoever shall swear by the altar, it is nothing; but
    whosoever sweareth by the gift that is upon it, he is guilty.

    19 Ye fools and blind: for whether is greater, the gift, or the altar
    that sanctifieth the gift?

    20 Whoso therefore shall swear by the altar, sweareth by it, and by all
    things thereon.

    21 And whoso shall swear by the temple, sweareth by it, and by him that
    dwelleth therein.

    22 And he that shall swear by heaven, sweareth by the throne of God,
    and by him that sitteth thereon.

    23 Woe unto you, scribes and Pharisees, hypocrites! for ye pay tithe of
    mint and anise and cummin, and have omitted the weightier matters of the law,
    judgment, mercy, and faith: these ought ye to have done, and not to leave the
    other undone.

    24 Ye blind guides, which strain at a gnat, and swallow a camel.

    25 Woe unto you, scribes and Pharisees, hypocrites! for ye make clean
    the outside of the cup and of the platter, but within they are full of
    extortion and excess.

    26 Thou blind Pharisee, cleanse first that which is within the cup and
    platter, that the outside of them may be clean also.

    27 Woe unto you, scribes and Pharisees, hypocrites! for ye are like
    unto whited sepulchres, which indeed appear beautiful outward, but are within
    full of dead men’s bones, and of all uncleanness.

    28 Even so ye also outwardly appear righteous unto men, but within ye
    are full of hypocrisy and iniquity.

    29 Woe unto you, scribes and Pharisees, hypocrites! because ye build
    the tombs of the prophets, and garnish the sepulchres of the righteous,

    30 And say, If we had been in the days of our fathers, we would not
    have been partakers with them in the blood of the prophets.

    31 Wherefore ye be witnesses unto yourselves, that ye are the children
    of them which killed the prophets.

    32 Fill ye up then the measure of your fathers.

    33 Ye serpents, ye generation of vipers, how can ye escape the
    damnation of hell?

    34 Wherefore, behold, I send unto you prophets, and wise men, and
    scribes: and some of them ye shall kill and crucify; and some of them shall ye
    scourge in your synagogues, and persecute them from city to city:

    35 That upon you may come all the righteous blood shed upon the earth,
    from the blood of righteous Abel unto the blood of Zacharias son of Barachias,
    whom ye slew between the temple and the altar.

    36 Verily I say unto you, All these things shall come upon this
    generation.

    37 O Jerusalem, Jerusalem, thou that killest the prophets, and stonest
    them which are sent unto thee, how often would I have gathered thy children
    together, even as a hen gathereth her chickens under her wings, and ye would
    not!

    38 Behold, your house is left unto you desolate.

    39 For I say unto you, Ye shall not see me henceforth, till ye shall
    say, Blessed is he that cometh in the name of the Lord.

    King James Version (KJV)

    by Public Domain

  • Alex Harris

    Part 10!Romans 1

    Acts 28Romans 2

    Romans 1 King James Version (KJV)

    1 Paul, a servant of Jesus Christ, called to be an apostle, separated
    unto the gospel of God,

    2 (Which he had promised afore by his prophets in the holy scriptures,)

    3 Concerning his Son Jesus Christ our Lord, which was made of the seed
    of David according to the flesh;

    4 And declared to be the Son of God with power, according to the spirit
    of holiness, by the resurrection from the dead:

    5 By whom we have received grace and apostleship, for obedience to the
    faith among all nations, for his name:

    6 Among whom are ye also the called of Jesus Christ:

    7 To all that be in Rome, beloved of God, called to be saints: Grace to
    you and peace from God our Father, and the Lord Jesus Christ.

    8 First, I thank my God through Jesus Christ for you all, that your
    faith is spoken of throughout the whole world.

    9 For God is my witness, whom I serve with my spirit in the gospel of
    his Son, that without ceasing I make mention of you always in my prayers;

    10 Making request, if by any means now at length I might have a
    prosperous journey by the will of God to come unto you.

    11 For I long to see you, that I may impart unto you some spiritual
    gift, to the end ye may be established;

    12 That is, that I may be comforted together with you by the mutual
    faith both of you and me.

    13 Now I would not have you ignorant, brethren, that oftentimes I
    purposed to come unto you, (but was let hitherto,) that I might have some fruit
    among you also, even as among other Gentiles.

    14 I am debtor both to the Greeks, and to the Barbarians; both to the
    wise, and to the unwise.

    15 So, as much as in me is, I am ready to preach the gospel to you that
    are at Rome also.

    16 For I am not ashamed of the gospel of Christ: for it is the power of
    God unto salvation to every one that believeth; to the Jew first, and also to
    the Greek.

    17 For therein is the righteousness of God revealed from faith to
    faith: as it is written, The just shall live by faith.

    18 For the wrath of God is revealed from heaven against all ungodliness
    and unrighteousness of men, who hold the truth in unrighteousness;

    19 Because that which may be known of God is manifest in them; for God
    hath shewed it unto them.

    20 For the invisible things of him from the creation of the world are
    clearly seen, being understood by the things that are made, even his eternal
    power and Godhead; so that they are without excuse:

    21 Because that, when they knew God, they glorified him not as God,
    neither were thankful; but became vain in their imaginations, and their foolish
    heart was darkened.

    22 Professing themselves to be wise, they became fools,

    23 And changed the glory of the uncorruptible God into an image made
    like to corruptible man, and to birds, and fourfooted beasts, and creeping
    things.

    24 Wherefore God also gave them up to uncleanness through the lusts of
    their own hearts, to dishonour their own bodies between themselves:

    25 Who changed the truth of God into a lie, and worshipped and served
    the creature more than the Creator, who is blessed for ever. Amen.

    26 For this cause God gave them up unto vile affections: for even their
    women did change the natural use into that which is against nature:

    27 And likewise also the men, leaving the natural use of the woman,
    burned in their lust one toward another; men with men working that which is
    unseemly, and receiving in themselves that recompence of their error which was
    meet.

    28 And even as they did not like to retain God in their knowledge, God
    gave them over to a reprobate mind, to do those things which are not
    convenient;

    29 Being filled with all unrighteousness, fornication, wickedness, covetousness,
    maliciousness; full of envy, murder, debate, deceit, malignity; whisperers,

    30 Backbiters, haters of God, despiteful, proud, boasters, inventors of
    evil things, disobedient to parents,

    31 Without understanding, covenantbreakers, without natural affection,
    implacable, unmerciful:

    32 Who knowing the judgment of God, that they which commit such things
    are worthy of death, not only do the same, but have pleasure in them that do
    them.

  • Alex Harris

    Part 9!(iii)the judge finds that such showing has been adequately made;
    and

    (iv)the order authorizing or approving the interception is limited to
    interception only for such time as it is reasonable to presume that the person
    identified in the application is or was reasonably proximate to the instrument
    through which such communication will be or was transmitted.

    (12)An interception of a communication under an order with respect to which
    the requirements of subsections (1)(b)(ii) and (3)(d) of this section do not
    apply by reason of subsection (11)(a) shall not begin until the place where the
    communication is to be intercepted is ascertained by the person implementing
    the interception order. A provider of wire or electronic communications service
    that has received an order as provided for in subsection (11)(b) may move the
    court to modify or quash the order on the ground that its assistance with
    respect to the interception cannot be performed in a timely or reasonable
    fashion. The court, upon notice to the government, shall decide such a motion
    expeditiously.

    Deuteronomy 4 King James Version (KJV)

    4 Now therefore hearken, O Israel, unto the statutes and unto the
    judgments, which I teach you, for to do them, that ye may live, and go in and
    possess the land which the LORD God of your fathers giveth you.

    2 Ye shall not add unto the word which I command you, neither shall ye
    diminish ought from it, that ye may keep the commandments of the LORD your God
    which I command you.

    3 Your eyes have seen what the LORD did because of Baalpeor: for all
    the men that followed Baalpeor, the LORD thy God hath destroyed them from among
    you.

    4 But ye that did cleave unto the LORD your God are alive every one of
    you this day.

    5 Behold, I have taught you statutes and judgments, even as the LORD my
    God commanded me, that ye should do so in the land whither ye go to possess it.

    6 Keep therefore and do them; for this is your wisdom and your
    understanding in the sight of the nations, which shall hear all these statutes,
    and say, Surely this great nation is a wise and understanding people.

    7 For what nation is there so great, who hath God so nigh unto them, as
    the LORD our God is in all things that we call upon him for?

    8 And what nation is there so great, that hath statutes and judgments
    so righteous as all this law, which I set before you this day?

    9 Only take heed to thyself, and keep thy soul diligently, lest thou
    forget the things which thine eyes have seen, and lest they depart from thy
    heart all the days of thy life: but teach them thy sons, and thy sons’ sons;

    10 Specially the day that thou stoodest before the LORD thy God in
    Horeb, when the LORD said unto me, Gather me the people together, and I will
    make them hear my words, that they may learn to fear me all the days that they
    shall live upon the earth, and that they may teach their children.

    11 And ye came near and stood under the mountain; and the mountain
    burned with fire unto the midst of heaven, with darkness, clouds, and thick
    darkness.

    12 And the LORD spake unto you out of the midst of the fire: ye heard
    the voice of the words, but saw no similitude; only ye heard a voice.

    13 And he declared unto you his covenant, which he commanded you to
    perform, even ten commandments; and he wrote them upon two tables of stone.

    14 And the LORD commanded me at that time to teach you statutes and
    judgments, that ye might do them in the land whither ye go over to possess it.

    15 Take ye therefore good heed unto yourselves; for ye saw no manner of
    similitude on the day that the LORD spake unto you in Horeb out of the midst of
    the fire:

    16 Lest ye corrupt yourselves, and make you a graven image, the
    similitude of any figure, the likeness of male or female,

    17 The likeness of any beast that is on the earth, the likeness of any
    winged fowl that flieth in the air,

    18 The likeness of any thing that creepeth on the ground, the likeness
    of any fish that is in the waters beneath the earth:

    19 And lest thou lift up thine eyes unto heaven, and when thou seest
    the sun, and the moon, and the stars, even all the host of heaven, shouldest be
    driven to worship them, and serve them, which the LORD thy God hath divided
    unto all nations under the whole heaven.

    20 But the LORD hath taken you, and brought you forth out of the iron
    furnace, even out of Egypt, to be unto him a people of inheritance, as ye are
    this day.

    21 Furthermore the LORD was angry with me for your sakes, and sware
    that I should not go over Jordan, and that I should not go in unto that good
    land, which the LORD thy God giveth thee for an inheritance:

    22 But I must die in this land, I must not go over Jordan: but ye shall
    go over, and possess that good land.

    23 Take heed unto yourselves, lest ye forget the covenant of the LORD
    your God, which he made with you, and make you a graven image, or the likeness
    of any thing, which the LORD thy God hath forbidden thee.

    24 For the LORD thy God is a consuming fire, even a jealous God.

    25 When thou shalt beget children, and children’s children, and ye
    shall have remained long in the land, and shall corrupt yourselves, and make a
    graven image, or the likeness of any thing, and shall do evil in the sight of
    the LORD thy God, to provoke him to anger:

    26 I call heaven and earth to witness against you this day, that ye
    shall soon utterly perish from off the land whereunto ye go over Jordan to
    possess it; ye shall not prolong your days upon it, but shall utterly be destroyed.

    27 And the LORD shall scatter you among the nations, and ye shall be
    left few in number among the heathen, whither the LORD shall lead you.

    28 And there ye shall serve gods, the work of men’s hands, wood and
    stone, which neither see, nor hear, nor eat, nor smell.

    29 But if from thence thou shalt seek the LORD thy God, thou shalt find
    him, if thou seek him with all thy heart and with all thy soul.

    30 When thou art in tribulation, and all these things are come upon
    thee, even in the latter days, if thou turn to the LORD thy God, and shalt be
    obedient unto his voice;

    31 (For the LORD thy God is a merciful God;) he will not forsake thee,
    neither destroy thee, nor forget the covenant of thy fathers which he sware
    unto them.

    32 For ask now of the days that are past, which were before thee, since
    the day that God created man upon the earth, and ask from the one side of
    heaven unto the other, whether there hath been any such thing as this great
    thing is, or hath been heard like it?

    33 Did ever people hear the voice of God speaking out of the midst of
    the fire, as thou hast heard, and live?

    34 Or hath God assayed to go and take him a nation from the midst of
    another nation, by temptations, by signs, and by wonders, and by war, and by a
    mighty hand, and by a stretched out arm, and by great terrors, according to all
    that the LORD your God did for you in Egypt before your eyes?

    35 Unto thee it was shewed, that thou mightest know that the LORD he is
    God; there is none else beside him.

    36 Out of heaven he made thee to hear his voice, that he might instruct
    thee: and upon earth he shewed thee his great fire; and thou heardest his words
    out of the midst of the fire.

    37 And because he loved thy fathers, therefore he chose their seed
    after them, and brought thee out in his sight with his mighty power out of
    Egypt;

    38 To drive out nations from before thee greater and mightier than thou
    art, to bring thee in, to give thee their land for an inheritance, as it is
    this day.

    39 Know therefore this day, and consider it in thine heart, that the
    LORD he is God in heaven above, and upon the earth beneath: there is none else.

    40 Thou shalt keep therefore his statutes, and his commandments, which
    I command thee this day, that it may go well with thee, and with thy children
    after thee, and that thou mayest prolong thy days upon the earth, which the
    LORD thy God giveth thee, for ever.

    41 Then Moses severed three cities on this side Jordan toward the
    sunrising;

    42 That the slayer might flee thither, which should kill his neighbour
    unawares, and hated him not in times past; and that fleeing unto one of these
    cities he might live:

    43 Namely, Bezer in the wilderness, in the plain country, of the
    Reubenites; and Ramoth in Gilead, of the Gadites; and Golan in Bashan, of the
    Manassites.

    44 And this is the law which Moses set before the children of Israel:

    45 These are the testimonies, and the statutes, and the judgments,
    which Moses spake unto the children of Israel, after they came forth out of
    Egypt.

    46 On this side Jordan, in the valley over against Bethpeor, in the
    land of Sihon king of the Amorites, who dwelt at Heshbon, whom Moses and the
    children of Israel smote, after they were come forth out of Egypt:

    47 And they possessed his land, and the land of Og king of Bashan, two
    kings of the Amorites, which were on this side Jordan toward the sunrising;

    48 From Aroer, which is by the bank of the river Arnon, even unto mount
    Sion, which is Hermon,

    49 And all the plain on this side Jordan eastward, even unto the sea of
    the plain, under the springs of Pisgah.

    King James Version (KJV)

    by Public Domain

  • Alex Harris

    Part 8!(8)

    (a)The contents of any wire, oral, or electronic communication
    intercepted by any means authorized by this chapter shall, if possible, be
    recorded on tape or wire or other comparable device. The recording of the
    contents of any wire, oral, or electronic communication under this subsection
    shall be done in such a way as will protect the recording from editing or other
    alterations. Immediately upon the expiration of the period of the order, or
    extensions thereof, such recordings shall be made available to the judge
    issuing such order and sealed under his directions. Custody of the recordings
    shall be wherever the judge orders. They shall not be destroyed except upon an
    order of the issuing or denying judge and in any event shall be kept for ten
    years. Duplicate recordings may be made for use or disclosure pursuant to the
    provisions of subsections (1) and (2) ofsection 2517 of this chapter for
    investigations. The presence of the seal provided for by this subsection, or a
    satisfactory explanation for the absence thereof, shall be a prerequisite for
    the use or disclosure of the contents of any wire, oral, or electronic
    communication or evidence derived therefrom under subsection (3) ofsection
    2517.

    (b)Applications made and orders granted under this chapter shall be
    sealed by the judge. Custody of the applications and orders shall be wherever
    the judge directs. Such applications and orders shall be disclosed only upon a
    showing of good cause before a judge of competent jurisdiction and shall not be
    destroyed except on order of the issuing or denying judge, and in any event
    shall be kept for ten years.

    (c)Any violation of the provisions of this subsection may be punished
    as contempt of the issuing or denying judge.

    (d)Within a reasonable time but not later than ninety days after the
    filing of an application for an order of approval under section 2518(7)(b)
    which is denied or the termination of the period of an order or extensions
    thereof, the issuing or denying judge shall cause to be served, on the persons
    named in the order or the application, and such other parties to intercepted
    communications as the judge may determine in his discretion that is in the
    interest of justice, an inventory which shall include notice of—

    (1)the fact of the entry of the order or the application;

    (2)the date of the entry and the period of authorized, approved or
    disapproved interception, or the denial of the application; and

    (3)the fact that during the period wire, oral, or electronic
    communications were or were not intercepted.

    The judge, upon the filing of a motion, may in his discretion make
    available to such person or his counsel for inspection such portions of the
    intercepted communications, applications and orders as the judge determines to
    be in the interest of justice. On an ex parte showing of good cause to a judge
    of competent jurisdiction the serving of the inventory required by this
    subsection may be postponed.

    (9)The contents of any wire, oral, or electronic communication
    intercepted pursuant to this chapter or evidence derived therefrom shall not be
    received in evidence or otherwise disclosed in any trial, hearing, or other
    proceeding in a Federal or State court unless each party, not less than ten
    days before the trial, hearing, or proceeding, has been furnished with a copy
    of the court order, and accompanying application, under which the interception
    was authorized or approved. This ten-day period may be waived by the judge if
    he finds that it was not possible to furnish the party with the above
    information ten days before the trial, hearing, or proceeding and that the
    party will not be prejudiced by the delay in receiving such information.

    (10)

    (a)Any aggrieved person in any trial, hearing, or proceeding in or
    before any court, department, officer, agency, regulatory body, or other
    authority of the United States, a State, or a political subdivision thereof,
    may move to suppress the contents of any wire or oral communication intercepted
    pursuant to this chapter, or evidence derived therefrom, on the grounds that—

    (i)the communication was unlawfully intercepted;

    (ii)the order of authorization or approval under which it was
    intercepted is insufficient on its face; or

    (iii)the interception was not made in conformity with the order of
    authorization or approval.

    Such motion shall be made before the trial, hearing, or proceeding
    unless there was no opportunity to make such motion or the person was not aware
    of the grounds of the motion. If the motion is granted, the contents of the
    intercepted wire or oral communication, or evidence derived therefrom, shall be
    treated as having been obtained in violation of this chapter. The judge, upon
    the filing of such motion by the aggrieved person, may in his discretion make
    available to the aggrieved person or his counsel for inspection such portions
    of the intercepted communication or evidence derived therefrom as the judge
    determines to be in the interests of justice.

    (b)In addition to any other right to appeal, the United States shall
    have the right to appeal from an order granting a motion to suppress made under
    paragraph (a) of this subsection, or the denial of an application for an order
    of approval, if the United States attorney shall certify to the judge or other
    official granting such motion or denying such application that the appeal is
    not taken for purposes of delay. Such appeal shall be taken within thirty days
    after the date the order was entered and shall be diligently prosecuted.

    (c)The remedies and sanctions described in this chapter with respect to
    the interception of electronic communications are the only judicial remedies
    and sanctions for nonconstitutional violations of this chapter involving such
    communications.

    (11)The requirements of subsections (1)(b)(ii) and (3)(d) of this
    section relating to the specification of the facilities from which, or the
    place where, the communication is to be intercepted do not apply if—

    (a)in the case of an application with respect to the interception of an
    oral communication—

    (i)the application is by a Federal investigative or law enforcement
    officer and is approved by the Attorney General, the Deputy Attorney General,
    the Associate Attorney General, an Assistant Attorney General, or an acting
    Assistant Attorney General;

    (ii)the application contains a full and complete statement as to why
    such specification is not practical and identifies the person committing the
    offense and whose communications are to be intercepted; and

    (iii)the judge finds that such specification is not practical; and

    (b)in the case of an application with respect to a wire or electronic
    communication—

    (i)the application is by a Federal investigative or law enforcement
    officer and is approved by the Attorney General, the Deputy Attorney General,
    the Associate Attorney General, an Assistant Attorney General, or an acting
    Assistant Attorney General;

    (ii)the application identifies the person believed to be committing the
    offense and whose communications are to be intercepted and the applicant makes
    a showing that there is probable cause to believe that the person’s actions
    could have the effect of thwarting interception from a specified facility;

  • Alex Harris

    Part 7!(4)Each order authorizing or approving the interception of any
    wire, oral, or electronic communication under this chapter shall specify—

    (a)the identity of the person, if known, whose communications are to be
    intercepted;

    (b)the nature and location of the communications facilities as to
    which, or the place where, authority to intercept is granted;

    (c)a particular description of the type of communication sought to be
    intercepted, and a statement of the particular offense to which it relates;

    (d)the identity of the agency authorized to intercept the
    communications, and of the person authorizing the application; and

    (e)the period of time during which such interception is authorized,
    including a statement as to whether or not the interception shall automatically
    terminate when the described communication has been first obtained.

    An order authorizing the interception of a wire, oral, or electronic
    communication under this chapter shall, upon request of the applicant, direct
    that a provider of wire or electronic communication service, landlord,
    custodian or other person shall furnish the applicant forthwith all
    information, facilities, and technical assistance necessary to accomplish the
    interception unobtrusively and with a minimum of interference with the services
    that such service provider, landlord, custodian, or person is according the
    person whose communications are to be intercepted. Any provider of wire or
    electronic communication service, landlord, custodian or other person
    furnishing such facilities or technical assistance shall be compensated
    therefor by the applicant for reasonable expenses incurred in providing such
    facilities or assistance. Pursuant to section 2522 of this chapter, an order
    may also be issued to enforce the assistance capability and capacity
    requirements under the Communications Assistance for Law Enforcement Act.

    (5)No order entered under this section may authorize or approve the
    interception of any wire, oral, or electronic communication for any period
    longer than is necessary to achieve the objective of the authorization, nor in
    any event longer than thirty days. Such thirty-day period begins on the earlier
    of the day on which the investigative or law enforcement officer first begins
    to conduct an interception under the order or ten days after the order is
    entered. Extensions of an order may be granted, but only upon application for
    an extension made in accordance with subsection (1) of this section and the
    court making the findings required by subsection (3) of this section. The
    period of extension shall be no longer than the authorizing judge deems
    necessary to achieve the purposes for which it was granted and in no event for
    longer than thirty days. Every order and extension thereof shall contain a
    provision that the authorization to intercept shall be executed as soon as
    practicable, shall be conducted in such a way as to minimize the interception
    of communications not otherwise subject to interception under this chapter, and
    must terminate upon attainment of the authorized objective, or in any event in
    thirty days. In the event the intercepted communication is in a code or foreign
    language, and an expert in that foreign language or code is not reasonably
    available during the interception period, minimization may be accomplished as
    soon as practicable after such interception. An interception under this chapter
    may be conducted in whole or in part by Government personnel, or by an
    individual operating under a contract with the Government, acting under the
    supervision of an investigative or law enforcement officer authorized to
    conduct the interception.

    (6)Whenever an order authorizing interception is entered pursuant to this
    chapter, the order may require reports to be made to the judge who issued the
    order showing what progress has been made toward achievement of the authorized
    objective and the need for continued interception. Such reports shall be made
    at such intervals as the judge may require.

    (7)Notwithstanding any other provision of this chapter, any
    investigative or law enforcement officer, specially designated by the Attorney
    General, the Deputy Attorney General, the Associate Attorney General, or by the
    principal prosecuting attorney of any State or subdivision thereof acting
    pursuant to a statute of that State, who reasonably determines that—

    (a)an emergency situation exists that involves—

    (i)immediate danger of death or serious physical injury to any person,

    (ii)conspiratorial activities threatening the national security
    interest, or

    (iii)conspiratorial activities characteristic of organized crime,

    that requires a wire, oral, or electronic communication to be
    intercepted before an order authorizing such interception can, with due
    diligence, be obtained, and

    (b)there are grounds upon which an order could be entered under this
    chapter to authorize such interception,

    may intercept such wire, oral, or electronic communication if an
    application for an order approving the interception is made in accordance with
    this section within forty-eight hours after the interception has occurred, or
    begins to occur. In the absence of an order, such interception shall
    immediately terminate when the communication sought is obtained or when the
    application for the order is denied, whichever is earlier. In the event such
    application for approval is denied, or in any other case where the interception
    is terminated without an order having been issued, the contents of any wire,
    oral, or electronic communication intercepted shall be treated as having been
    obtained in violation of this chapter, and an inventory shall be served as
    provided for in subsection (d) of this section on the person named in the
    application.

  • Alex Harris

    Part 6!(1)The court, in imposing sentence on any person convicted of a
    violation of this section, or convicted of conspiracy to violate this section,
    shall order, in addition to any other sentence imposed and irrespective of any
    provision of State law, that such person forfeit to the United States—

    (A)such person’s interest in any personal property that was used or
    intended to be used to commit or to facilitate the commission of such
    violation; and

    (B)any property, real or personal, constituting or derived from, any
    proceeds that such person obtained, directly or indirectly, as a result of such
    violation.

    (2)The criminal forfeiture of property under this subsection, any
    seizure and disposition thereof, and any judicial proceeding in relation
    thereto, shall be governed by the provisions of section 413 of the
    Comprehensive Drug Abuse Prevention and Control Act of 1970 (21 U.S.C. 853),
    except subsection (d) of that section.

    (j)For purposes of subsection (i), the following shall be subject to
    forfeiture to the United States and no property right shall exist in them:

    (1)Any personal property used or intended to be used to commit or to
    facilitate the commission of any violation of this section, or a conspiracy to
    violate this section.

    (2)Any property, real or personal, which constitutes or is derived from
    proceeds traceable to any violation of this section, or a conspiracy to violate
    this section [6]

    ________________________________________

    Macon Ga.Bibb County Sheriff Department( State of Georgia law
    enforcement),Macon Ga. And Atlanta Ga. FBI Agents(federal law enforcement)
    ,Macon Ga. And Atlanta Ga. Federal Court Judges and Prosecuting
    Attorney’s,macon ga. Police Department( City of macon ga. Local and State of Georgia law
    enforcements),GBI Agents(State of Georgia State Law Enforcement),Georgia Republican Governor Nathan Deal,Macon ga.
    Ex-mayor C.Jack Ellis, Macon ga. Mayor for
    starter’s ya’ll the ones committing ,aiding and abetting,taking bribes
    concealing person from arrest,Accessory after the fact, party to
    crime,conspirator’s, flight to avoid giving testimony or avoid prosecution all
    on the victim unknown wiretap order from 2005-2015 for city,state,national,and
    global to it !The State of Georgia and Macon ga. Law enforcement’s, judge’s,
    prosecuting attorney’s, false witnesses pointing the finger at me and President
    Commander in Chief Barack Obama United States of America.The false statement’s,
    Blocking report of a federal crime and retaliation against whistleblower for
    attempting to report corruption by key government personnel including federal
    felony kidnaping me for ransom,failing to investigate, genocide, and more
    crimes since I moves from macon ga. In June 2014 georgia Republican Governor
    nathan Deal brought these stupid muthafuckas to Atlanta Ga. With they black kkk
    asses not to forget cursed by the LORD thy God and woed by Jesus Christ is Lord
    !They can’t deny it especially federal felony kidnaping for Me President
    Commander in Chief we all Know President
    Commander in Chief Barack Obama is President
    the evidence to support President J.F.K.Jr. family wasn’t cursed and
    look the inside criminals since Macon georgia
    and Atlanta Ga. Judges federal
    felony kidnaping for ransom Me and Virginia Harris (my mentally ill.
    Birthmother ) on 2005-2015 wiretap order
    set up by the victim the
    authorities in Georgia ,Macon and Atlanta Ga. Fighting against United States
    Constitution, Georgia Constitution, and the word of God making damn Terrorist antichrist fugitives from
    justice treason bribery stupid muthafuckas
    the dressed in street clothes doing retaliation .I amd glad the crimes
    are all reported including the victims and witnesses haven’t been questioned
    such as my uncles!18 U.S. Code § 2518 – Procedure for interception of wire,
    oral, or electronic communications(Georgia Opertaor’s from judges on down all
    Antichrists)

    Current through Pub. L. 113-296, except 113-287, 113-291, 113-295. (See
    Public Laws for the current Congress.)

    • US Code

    • Notes

    prev | next

    (1)Each application for an order authorizing or approving the
    interception of a wire, oral, or electronic communication under this chapter
    shall be made in writing upon oath or affirmation to a judge of competent
    jurisdiction and shall state the applicant’s authority to make such
    application. Each application shall include the following information:

    (a)the identity of the investigative or law enforcement officer making
    the application, and the officer authorizing the application;

    (b)a full and complete statement of the facts and circumstances relied
    upon by the applicant, to justify his belief that an order should be issued,
    including

    (i) details as to the particular offense that has been, is being, or is
    about to be committed,

    (ii) except as provided in subsection (11), a particular description of
    the nature and location of the facilities from which or the place where the
    communication is to be intercepted,

    (iii) a particular description of the type of communications sought to
    be intercepted,

    (iv) the identity of the person, if known, committing the offense and
    whose communications are to be intercepted;

    (c)a full and complete statement as to whether or not other
    investigative procedures have been tried and failed or why they reasonably
    appear to be unlikely to succeed if tried or to be too dangerous;

    (d)a statement of the period of time for which the interception is
    required to be maintained. If the nature of the investigation is such that the
    authorization for interception should not automatically terminate when the
    described type of communication has been first obtained, a particular
    description of facts establishing probable cause to believe that additional communications
    of the same type will occur thereafter;

    (e)a full and complete statement of the facts concerning all previous
    applications known to the individual authorizing and making the application,
    made to any judge for authorization to intercept, or for approval of
    interceptions of, wire, oral, or electronic communications involving any of the
    same persons, facilities or places specified in the application, and the action
    taken by the judge on each such application; and

    (f)where the application is for the extension of an order, a statement
    setting forth the results thus far obtained from the interception, or a
    reasonable explanation of the failure to obtain such results.

    (2)The judge may require the applicant to furnish additional testimony
    or documentary evidence in support of the application.

    (3)Upon such application the judge may enter an ex parte order, as
    requested or as modified, authorizing or approving interception of wire, oral,
    or electronic communications within the territorial jurisdiction of the court
    in which the judge is sitting (and outside that jurisdiction but within the
    United States in the case of a mobile interception device authorized by a
    Federal court within such jurisdiction), if the judge determines on the basis
    of the facts submitted by the applicant that—

    (a)there is probable cause for belief that an individual is committing,
    has committed, or is about to commit a particular offense enumerated in section
    2516 of this chapter;

    (b)there is probable cause for belief that particular communications
    concerning that offense will be obtained through such interception;

    (c)normal investigative procedures have been tried and have failed or
    reasonably appear to be unlikely to succeed if tried or to be too dangerous;

    (d)except as provided in subsection (11), there is probable cause for
    belief that the facilities from which, or the place where, the wire, oral, or
    electronic communications are to be intercepted are being used, or are about to
    be used, in connection with the commission of such offense, or are leased to,
    listed in the name of, or commonly used by such person.

  • Alex Harris

    Part 4!18 U.S. Code § 1030 – Fraud and related activity in connection
    with computers(Georgia federal law enforcement got it automatically just state of Ga. Law
    enforcement from my use computer to report crimes including reporting the
    crimes the Macon and Atlanta Ga. FBI Agents in Person so they can notify Federal Courthouse judges
    and prosecuting attorney’s on the crimes !)

    Current through Pub. L. 113-296, except 113-287, 113-291, 113-295. (See
    Public Laws for the current Congress.)

    • US Code

    • Notes

    prev | next

    (a)Whoever—

    (1)having knowingly accessed a computer without authorization or
    exceeding authorized access, and by means of such conduct having obtained
    information that has been determined by the United States Government pursuant
    to an Executive order or statute to require protection against unauthorized
    disclosure for reasons of national defense or foreign relations, or any
    restricted data, as defined in paragraph y. of section 11 of the Atomic Energy
    Act of 1954, with reason to believe that such information so obtained could be
    used to the injury of the United States, or to the advantage of any foreign
    nation willfully communicates, delivers, transmits, or causes to be communicated,
    delivered, or transmitted, or attempts to communicate, deliver, transmit or
    cause to be communicated, delivered, or transmitted the same to any person not
    entitled to receive it, or willfully retains the same and fails to deliver it
    to the officer or employee of the United States entitled to receive it;

    (2)intentionally accesses a computer without authorization or exceeds
    authorized access, and thereby obtains—

    (A)information contained in a financial record of a financial
    institution, or of a card issuer as defined in section 1602(n) [1] of title 15,
    or contained in a file of a consumer reporting agency on a consumer, as such
    terms are defined in the Fair Credit Reporting Act (15 U.S.C. 1681 et seq.);

    (B)information from any department or agency of the United States; or

    (C)information from any protected computer;

    (3)intentionally, without authorization to access any nonpublic
    computer of a department or agency of the United States, accesses such a
    computer of that department or agency that is exclusively for the use of the
    Government of the United States or, in the case of a computer not exclusively
    for such use, is used by or for the Government of the United States and such
    conduct affects that use by or for the Government of the United States;

    (4)knowingly and with intent to defraud, accesses a protected computer
    without authorization, or exceeds authorized access, and by means of such

    conduct furthers the intended fraud and obtains anything of value, unless the
    object of the fraud and the thing obtained consists only of the use of the
    computer and the value of such use is not more than $5,000 in any 1-year
    period;

    (5)

    (A)knowingly causes the transmission of a program, information, code,
    or command, and as a result of such conduct, intentionally causes damage
    without authorization, to a protected computer;

    (B)intentionally accesses a protected computer without authorization,
    and as a result of such conduct, recklessly causes damage; or

    (C)intentionally accesses a protected computer without authorization,
    and as a result of such conduct, causes damage and loss.[2]

    (6)knowingly and with intent to defraud traffics (as defined in section
    1029) in any password or similar information through which a computer may be
    accessed without authorization, if—

    (A)such trafficking affects interstate or foreign commerce; or

    (B)such computer is used by or for the Government of the United States;
    [3]

    (7)with intent to extort from any person any money or other thing of
    value, transmits in interstate or foreign commerce any communication containing
    any—

    (A)threat to cause damage to a protected computer;

    (B)threat to obtain information from a protected computer without
    authorization or in excess of authorization or to impair the confidentiality of
    information obtained from a protected computer without authorization or by
    exceeding authorized access; or

    (C)demand or request for money or other thing of value in relation to
    damage to a protected computer, where such damage was caused to facilitate the
    extortion;

    shall be punished as provided in subsection (c) of this section.

    (b)Whoever conspires to commit or attempts to commit an offense under
    subsection (a) of this section shall be punished as provided in subsection (c)
    of this section.

    (c)The punishment for an offense under subsection (a) or (b) of this
    section is—

    (1)

    (A)a fine under this title or imprisonment for not more than ten years,
    or both, in the case of an offense under subsection (a)(1) of this section
    which does not occur after a conviction for another offense under this section,
    or an attempt to commit an offense punishable under this subparagraph; and

    (B)a fine under this title or imprisonment for not more than twenty
    years, or both, in the case of an offense under subsection (a)(1) of this
    section which occurs after a conviction for another offense under this section,
    or an attempt to commit an offense punishable under this subparagraph;

    (2)

    (A)except as provided in subparagraph (B), a fine under this title or
    imprisonment for not more than one year, or both, in the case of an offense
    under subsection (a)(2), (a)(3), or (a)(6) of this section which does not occur
    after a conviction for another offense under this section, or an attempt to
    commit an offense punishable under this subparagraph;

    (B)a fine under this title or imprisonment for not more than 5 years,
    or both, in the case of an offense under subsection (a)(2), or an attempt to
    commit an offense punishable under this subparagraph, if—

    (i)the offense was committed for purposes of commercial advantage or
    private financial gain;

    (ii)the offense was committed in furtherance of any criminal or
    tortious act in violation of the Constitution or laws of the United States or
    of any State; or

    (iii)the value of the information obtained exceeds $5,000; and

    Part 5!(C)a fine under this title or imprisonment for not more than ten
    years, or both, in the case of an offense under subsection (a)(2), (a)(3) or
    (a)(6) of this section which occurs after a conviction for another offense
    under this section, or an attempt to commit an offense punishable under this
    subparagraph;

    (3)

    (A)a fine under this title or imprisonment for not more than five
    years, or both, in the case of an offense under subsection (a)(4) or (a)(7) of
    this section which does not occur after a conviction for another offense under
    this section, or an attempt to commit an offense punishable under this
    subparagraph; and

    (B)a fine under this title or imprisonment for not more than ten years,
    or both, in the case of an offense under subsection (a)(4),[4] or (a)(7) of
    this section which occurs after a conviction for another offense under this
    section, or an attempt to commit an offense punishable under this subparagraph;

    (4)

    (A)except as provided in subparagraphs (E) and (F), a fine under this
    title, imprisonment for not more than 5 years, or both, in the case of—

    (i)an offense under subsection (a)(5)(B), which does not occur after a
    conviction for another offense under this section, if the offense caused (or,
    in the case of an attempted offense, would, if completed, have caused)—

    (I)loss to 1 or more persons during any 1-year period (and, for
    purposes of an investigation, prosecution, or other proceeding brought by the
    United States only, loss resulting from a related course of conduct affecting 1
    or more other protected computers) aggregating at least $5,000 in value;

    (II)the modification or impairment, or potential modification or

    impairment, of the medical examination, diagnosis, treatment, or care of 1 or
    more individuals;

    (III)physical injury to any person;

    (IV)a threat to public health or safety;

    (V)damage affecting a computer used by or for an entity of the United
    States Government in furtherance of the administration of justice, national
    defense, or national security; or

    (VI)damage affecting 10 or more protected computers during any 1-year
    period; or

    (ii)an attempt to commit an offense punishable under this subparagraph;

    (B)except as provided in subparagraphs (E) and (F), a fine under this
    title, imprisonment for not more than 10 years, or both, in the case of—

    (i)an offense under subsection (a)(5)(A), which does not occur after a
    conviction for another offense under this section, if the offense caused (or,
    in the case of an attempted offense, would, if completed, have caused) a harm
    provided in subclauses (I) through (VI) of subparagraph (A)(i); or

    (ii)an attempt to commit an offense punishable under this subparagraph;

    (C)except as provided in subparagraphs (E) and (F), a fine under this
    title, imprisonment for not more than 20 years, or both, in the case of—

    (i)an offense or an attempt to commit an offense under subparagraphs
    (A) or (B) of subsection (a)(5) that occurs after a conviction for another
    offense under this section; or

    (ii)an attempt to commit an offense punishable under this subparagraph;

    (D)a fine under this title, imprisonment for not more than 10 years, or
    both, in the case of—

    (i)an offense or an attempt to commit an offense under subsection
    (a)(5)(C) that occurs after a conviction for another offense under this
    section; or

    (ii)an attempt to commit an offense punishable under this subparagraph;

    (E)if the offender attempts to cause or knowingly or recklessly causes
    serious bodily injury from conduct in violation of subsection (a)(5)(A), a fine
    under this title, imprisonment for not more than 20 years, or both;

    (F)if the offender attempts to cause or knowingly or recklessly causes
    death from conduct in violation of subsection (a)(5)(A), a fine under this
    title, imprisonment for any term of years or for life, or both; or

    (G)a fine under this title, imprisonment for not more than 1 year, or
    both, for—

    (i)any other offense under subsection (a)(5); or

    (ii)an attempt to commit an offense punishable under this subparagraph.

    (d)

    (1)The United States Secret Service shall, in addition to any other
    agency having such authority, have the authority to investigate offenses under
    this section.

    (2)The Federal Bureau of Investigation shall have primary authority to
    investigate offenses under subsection (a)(1) for any cases involving espionage,
    foreign counterintelligence, information protected against unauthorized
    disclosure for reasons of national defense or foreign relations, or Restricted
    Data (as that term is defined in section 11y of the Atomic Energy Act of 1954
    (42 U.S.C. 2014(y)), except for offenses affecting the duties of the United
    States Secret Service pursuant to section 3056(a) of this title.

    (3)Such authority shall be exercised in accordance with an agreement
    which shall be entered into by the Secretary of the Treasury and the Attorney
    General.

    (e)As used in this section—

    (1)the term “computer” means an electronic, magnetic, optical,
    electrochemical, or other high speed data processing device performing logical,
    arithmetic, or storage functions, and includes any data storage facility or
    communications facility directly related to or operating in conjunction with
    such device, but such term does not include an automated typewriter or
    typesetter, a portable hand held calculator, or other similar device;

    (2)the term “protected computer” means a computer—

    (A)exclusively for the use of a financial institution or the United
    States Government, or, in the case of a computer not exclusively for such use,
    used by or for a financial institution or the United States Government and the
    conduct constituting the offense affects that use by or for the financial
    institution or the Government; or

    (B)which is used in or affecting interstate or foreign commerce or
    communication, including a computer located outside the United States that is
    used in a manner that affects interstate or foreign commerce or communication
    of the United States;

    (3)the term “State” includes the District of Columbia, the Commonwealth
    of Puerto Rico, and any other commonwealth, possession or territory of the
    United States;

    (4)the term “financial institution” means—

    (A)an institution, with deposits insured by the Federal Deposit
    Insurance Corporation;

    (B)the Federal Reserve or a member of the Federal Reserve including any
    Federal Reserve Bank;

    (C)a credit union with accounts insured by the National Credit Union
    Administration;

    (D)a member of the Federal home loan bank system and any home loan
    bank;

    (E)any institution of the Farm Credit System under the Farm Credit Act
    of 1971;

    (F)a broker-dealer registered with the Securities and Exchange
    Commission pursuant to section 15 of the Securities Exchange Act of 1934;

    (G)the Securities Investor Protection Corporation;

    (H)a branch or agency of a foreign bank (as such terms are defined in
    paragraphs (1) and (3) of section 1(b) of the International Banking Act of 1978);
    and

    (I)an organization operating under section 25 orsection 25(a) [1] of
    the Federal Reserve Act;

    (5)the term “financial record” means information derived from any
    record held by a financial institution pertaining to a customer’s relationship
    with the financial institution;

    (6)the term “exceeds authorized access” means to access a computer with
    authorization and to use such access to obtain or alter information in the
    computer that the accesser is not entitled so to obtain or alter;

    (7)the term “department of the United States” means the legislative or
    judicial branch of the Government or one of the executive departments
    enumerated in section 101 of title 5;

    (8)the term “damage” means any impairment to the integrity or
    availability of data, a program, a system, or information;

    (9)the term “government entity” includes the Government of the United
    States, any State or political subdivision of the United States, any foreign
    country, and any state, province, municipality, or other political subdivision
    of a foreign country;

    (10)the term “conviction” shall include a conviction under the law of
    any State for a crime punishable by imprisonment for more than 1 year, an
    element of which is unauthorized access, or exceeding authorized access, to a
    computer;

    (11)the term “loss” means any reasonable cost to any victim, including
    the cost of responding to an offense, conducting a damage assessment, and
    restoring the data, program, system, or information to its condition prior to
    the offense, and any revenue lost, cost incurred, or other consequential
    damages incurred because of interruption of service; and

    (12)the term “person” means any individual, firm, corporation,
    educational institution, financial institution, governmental entity, or legal
    or other entity.

    (f)This section does not prohibit any lawfully authorized
    investigative, protective, or intelligence activity of a law enforcement agency
    of the United States, a State, or a political subdivision of a State, or of an
    intelligence agency of the United States.

    (g)Any person who suffers damage or loss by reason of a violation of
    this section may maintain a civil action against the violator to obtain
    compensatory damages and injunctive relief or other equitable relief. A civil
    action for a violation of this section may be brought only if the conduct
    involves 1 of the factors set forth in subclauses [5] (I), (II), (III), (IV),
    or (V) of subsection (c)(4)(A)(i). Damages for a violation involving only
    conduct described in subsection (c)(4)(A)(i)(I) are limited to economic
    damages. No action may be brought under this subsection unless such action is
    begun within 2 years of the date of the act complained of or the date of the
    discovery of the damage. No action may be brought under this subsection for the
    negligent design or manufacture of computer hardware, computer software, or
    firmware.

    (h)The Attorney General and the Secretary of the Treasury shall report
    to the Congress annually, during the first 3 years following the date of the
    enactment of this subsection, concerning investigations and prosecutions under
    subsection (a)(5).

    (i)

  • Alex Harris

    PART 2 – COMPUTER CRIMES(State of Georgia Law Enforcement such Macon
    ga. Bibb County Sheriff Department,Macon Ga. Police Department, Atlanta Ga.
    Police Department, Atlanta ga. Fulton County Sheriff Department, Grandhustle
    2005-2010 Atlanta Ga. Authorities, CNN Atlanta Ga. Authorities immeditate
    knowledge the crimes they’re aid and abetting,taking bribes concealing person
    from arrest, on crap on right now here in Georgia)

    § 16-9-90 – Short title

    O.C.G.A. 16-9-90 (2010)

    16-9-90. Short title

    This article shall be known and may be cited as the “Georgia
    Computer Systems Protection Act.”

    § 16-9-91 – Legislative findings

    O.C.G.A. 16-9-91 (2010)

    16-9-91. Legislative findings

    The General Assembly finds that:

    (1) Computer related crime is a growing problem in the government and
    in the private sector;

    (2) Such crime occurs at great cost to the public, since losses for
    each incident of computer crime tend to be far greater than the losses
    associated with each incident of other white collar crime;

    (3) The opportunities for computer related crimes in state programs,
    and in other entities which operate within the state, through the introduction
    of fraudulent records into a computer system, unauthorized use of computer
    facilities, alteration or destruction of computerized information files, and
    stealing of financial instruments, data, or other assets are great;

    (4) Computer related crime operations have a direct effect on state
    commerce;

    (5) Liability for computer crimes should be imposed on all persons, as
    that term is defined in this title; and

    (6) The prosecution of persons engaged in computer related crime is
    difficult under previously existing Georgia criminal statutes.

    § 16-9-92 – Definitions

    O.C.G.A. 16-9-92 (2010)

    16-9-92. Definitions

    As used in this article, the term:

    (1) “Computer” means an electronic, magnetic, optical,
    hydraulic, electrochemical, or organic device or group of devices which,
    pursuant to a computer program, to human instruction, or to permanent
    instructions contained in the device or group of devices, can automatically
    perform computer operations with or on computer data and can communicate the
    results to another computer or to a person. The term includes any connected or
    directly related device, equipment, or facility which enables the computer to
    store, retrieve, or communicate computer programs, computer data, or the
    results of computer operations to or from a person, another computer, or
    another device. This term specifically includes, but is not limited to, mail
    servers and e-mail networks. This term does not include a device that is not
    used to communicate with or to manipulate any other computer.

    (2) “Computer network” means a set of related, remotely
    connected computers and any communications facilities with the function and
    purpose of transmitting data among them through the communications facilities.

    (3) “Computer operation” means computing, classifying,
    transmitting, receiving, retrieving, originating, switching, storing,
    displaying, manifesting, measuring, detecting, recording, reproducing,
    handling, or utilizing any form of data for business, scientific, control, or
    other purposes.

    (4) “Computer program” means one or more statements or
    instructions composed and structured in a form acceptable to a computer that,
    when executed by a computer in actual or modified form, cause the computer to
    perform one or more computer operations. The term “computer program”
    shall include all associated procedures and documentation, whether or not such
    procedures and documentation are in human readable form.

    (5) “Data” includes any representation of information, intelligence,
    or data in any fixed medium, including documentation, computer printouts,
    magnetic storage media, punched cards, storage in a computer, or transmission
    by a computer network.

    (6) “Electronic communication” means any transfer of signs,
    signals, writing, images, sounds, data, or intelligence of any nature
    transmitted in whole or in part by a wire, radio, electromagnetic,
    photoelectronic, or photo-optical system that affects interstate or foreign
    commerce, but does not include:

    (A) Any wire or oral communication;

    (B) Any communication made through a tone-only paging device;

    (C) Any communication from a tracking device; or

    (D) Electronic funds transfer information stored by a financial
    institution in a communications system used for the electronic storage and
    transfer of funds.

    (7) “Electronic communication service” means any service
    which provides to its users the ability to send or receive wire or electronic
    communications.

    (8) “Electronic communications system” means any wire, radio,
    electromagnetic, photoelectronic, photo-optical, or facilities for the
    transmission of wire or electronic communications, and any computer facilities
    or related electronic equipment for the electronic storage of such
    communications.

    (9) “Electronic means” is any device or apparatus which can
    be used to intercept a wire, oral, or electronic communication other than:

    (A) Any telephone or telegraph instrument, equipment, or facility, or
    any component thereof,

    (i) Furnished to the subscriber or user by a provider of electronic
    communication service in the ordinary course of its business and used by the
    subscriber or user in the ordinary course of its business or furnished by such
    subscriber or user for connection to the facilities of such service and used in
    the ordinary course of its business; or

    (ii) Used by a provider of electronic communication service in the
    ordinary course of its business or by an investigative or law enforcement
    officer in the ordinary course of his or her duties; or

    (B) A hearing aid or similar device being used to correct subnormal
    hearing to better than normal.

    (10) “Electronic storage” means:

    (A) Any temporary, intermediate storage of wire or electronic
    communication incidental to its electronic transmission; and

    (B) Any storage of such communication by an electronic communication
    service for purposes of backup protection of such communication.

    (11) “Financial instruments” includes any check, draft, money
    order, note, certificate of deposit, letter of credit, bill of exchange, credit
    or debit card, transaction-authorizing mechanism, or marketable security, or
    any computer representation thereof.

    (12) “Law enforcement unit” means any law enforcement officer
    charged with the duty of enforcing the criminal laws and ordinances of the
    state or of the counties or municipalities of the state who is employed by and
    compensated by the state or any county or municipality of the state or who is
    elected and compensated on a fee basis. The term shall include, but not be
    limited to, members of the Department of Public Safety, municipal police,
    county police, sheriffs, deputy sheriffs, and agents and investigators of the
    Georgia Bureau of Investigation.

    (13) “Property” includes computers, computer networks,
    computer programs, data, financial instruments, and services.

    (14) “Remote computing service” means the provision to the
    public of computer storage or processing services by means of an electronic
    communications system.

    (15) “Services” includes computer time or services or data
    processing services.

    (16) “Use” includes causing or attempting to cause:

    (A) A computer or computer network to perform or to stop performing
    computer operations;

    (B) The obstruction, interruption, malfunction, or denial of the use of
    a computer, computer network, computer program, or data; or

    (C) A person to put false information into a computer.

    (17) “Victim expenditure” means any expenditure reasonably
    and necessarily incurred by the owner to verify that a computer, computer
    network, computer program, or data was or was not altered, deleted, damaged, or
    destroyed by unauthorized use.

    (18) “Without authority” includes the use of a computer or
    computer network in a manner that exceeds any right or permission granted by
    the owner of the computer or computer network.

    Part 3!§ 16-9-93 – Computer crimes defined; exclusivity of article;
    civil remedies; criminal penalties

    O.C.G.A. 16-9-93 (2010)

    16-9-93. Computer crimes defined; exclusivity of article; civil
    remedies; criminal penalties

    (a) Computer theft. Any person who uses a computer or computer network
    with knowledge that such use is without authority and with the intention of:

    (1) Taking or appropriating any property of another, whether or not
    with the intention of depriving the owner of possession;

    (2) Obtaining property by any deceitful means or artful practice; or

    (3) Converting property to such person’s use in violation of an
    agreement or other known legal obligation to make a specified application or
    disposition of such property

    shall be guilty of the crime of computer theft.

    (b) Computer Trespass. Any person who uses a computer or computer
    network with knowledge that such use is without authority and with the
    intention of:

    (1) Deleting or in any way removing, either temporarily or permanently,
    any computer program or data from a computer or computer network;

    (2) Obstructing, interrupting, or in any way interfering with the use
    of a computer program or data; or

    (3) Altering, damaging, or in any way causing the malfunction of a
    computer, computer network, or computer program, regardless of how long the
    alteration, damage, or malfunction persists

    shall be guilty of the crime of computer trespass.

    (c) Computer Invasion of Privacy. Any person who uses a computer or
    computer network with the intention of examining any employment, medical,
    salary, credit, or any other financial or personal data relating to any other
    person with knowledge that such examination is without authority shall be
    guilty of the crime of computer invasion of privacy.

    (d) Computer Forgery. Any person who creates, alters, or deletes any
    data contained in any computer or computer network, who, if such person had
    created, altered, or deleted a tangible document or instrument would have
    committed forgery under Article 1 of this chapter, shall be guilty of the crime
    of computer forgery. The absence of a tangible writing directly created or
    altered by the offender shall not be a defense to the crime of computer forgery
    if a creation, alteration, or deletion of data was involved in lieu of a
    tangible document or instrument.

    (e) Computer Password Disclosure. Any person who discloses a number,
    code, password, or other means of access to a computer or computer network
    knowing that such disclosure is without authority and which results in damages
    (including the fair market value of any services used and victim expenditure)
    to the owner of the computer or computer network in excess of $500.00 shall be
    guilty of the crime of computer password disclosure.

    (f) Article not Exclusive. The provisions of this article shall not be
    construed to preclude the applicability of any other law which presently
    applies or may in the future apply to any transaction or course of conduct
    which violates this article.

    (g) Civil Relief; Damages.

    (1) Any person whose property or person is injured by reason of a
    violation of any provision of this article may sue therefor and recover for any
    damages sustained and the costs of suit. Without limiting the generality of the
    term, “damages” shall include loss of profits and victim expenditure.

    (2) At the request of any party to an action brought pursuant to this
    Code section, the court shall by reasonable means conduct all legal proceedings
    in such a way as to protect the secrecy and security of any computer, computer
    network, data, or computer program involved in order to prevent possible
    recurrence of the same or a similar act by another person and to protect any
    trade secrets of any party.

    (3) The provisions of this article shall not be construed to limit any
    person’s right to pursue any additional civil remedy otherwise allowed by law.

    (4) A civil action under this Code section must be brought within four
    years after the violation is discovered or by exercise of reasonable diligence
    should have been discovered. For purposes of this article, a continuing
    violation of any one subsection of this Code section by any person constitutes
    a single violation by such person.

    (h) Criminal Penalties.

    (1) Any person convicted of the crime of computer theft, computer
    trespass, computer invasion of privacy, or computer forgery shall be fined not
    more than $50,000.00 or imprisoned not more than 15 years, or both.

    (2) Any person convicted of computer password disclosure shall be fined
    not more than $5,000.00 or incarcerated for a period not to exceed one year, or
    both.

    § 16-9-93.1 – Misleading transmittal and use of individual name, trade
    name, registered trademark, logo, legal or official seal, or copyrighted symbol
    over computer or telephone network; criminal pe

    O.C.G.A. 16-9-93.1 (2010)

    16-9-93.1. Misleading transmittal and use of individual name, trade
    name, registered trademark, logo, legal or official seal, or copyrighted symbol
    over computer or telephone network; criminal penalty; civil remedies

    (a) It shall be unlawful for any person, any organization, or any
    representative of any organization knowingly to transmit any data through a
    computer network or over the transmission facilities or through the network
    facilities of a local telephone network for the purpose of setting up,
    maintaining, operating, or exchanging data with an electronic mailbox, home
    page, or any other electronic information storage bank or point of access to
    electronic information if such data uses any individual name, trade name,
    registered trademark, logo, legal or official seal, or copyrighted symbol to
    falsely identify the person, organization, or representative transmitting such
    data or which would falsely state or imply that such person, organization, or
    representative has permission or is legally authorized to use such trade name,
    registered trademark, logo, legal or official seal, or copyrighted symbol for
    such purpose when such permission or authorization has not been obtained;
    provided, however, that no telecommunications company or Internet access
    provider shall violate this Code section solely as a result of carrying or
    transmitting such data for its customers.

    (b) Any person violating subsection (a) of this Code section shall be
    guilty of a misdemeanor.

    (c) Nothing in this Code section shall be construed to limit an
    aggrieved party’s right to pursue a civil action for equitable or monetary
    relief, or both, for actions which violate this Code section.

    § 16-9-94 – Venue

    O.C.G.A. 16-9-94 (2010)

    16-9-94. Venue

    For the purpose of venue under this article, any violation of this
    article shall be considered to have been committed:

    (1) In the county of the principal place of business in this state of
    the owner of a computer, computer network, or any part thereof;

    (2) In any county in which any person alleged to have violated any
    provision of this article had control or possession of any proceeds of the
    violation or of any books, records, documents, or property which were used in
    furtherance of the violation;

    (3) In any county in which any act was performed in furtherance of any
    transaction which violated this article; and

    (4) In any county from which, to which, or through which any use of a
    computer or computer network was made, whether by wires, electromagnetic waves,
    microwaves, or any other means of communication.

  • Alex Harris

    Part 1!

    They talk about who I am related to !They talk about my childhood that
    they thick they know!They call me a human parabolic !They say nobody can see
    it!They say nobody cares!They say TI my cousin !They I only hang around people
    with money!Which lets me the Georgia /State and Local /Macon and Atlanta Ga.
    know about the crimes they are talking me they can’t help me with as usual now
    wiretap order computer not just telephone!

    My Condolences to everybody that
    lost somebody and get well wishes to everybody injuried!The Domestic Violence,
    Child Abuse ,and other’s crimes its no respect of person in judgement !Georgia
    Judges,Georgia Governor nathan ,and they crew committing these crimes aid and
    abetting right in front of us!

    Article IV United States Constitution

    Section 1.

    Full faith and credit shall be given in each state to the public acts,
    records, and judicial proceedings of every other state. And the Congress may by
    general laws prescribe the manner in which such acts, records, and proceedings
    shall be proved, and the effect thereof.

    Section 2.

    The citizens of each state shall be entitled to all privileges and
    immunities of citizens in the several states.

    A person charged in any state with treason, felony, or other crime, who
    shall flee from justice, and be found in another state, shall on demand of the
    executive authority of the state from which he fled, be delivered up, to be
    removed to the state having jurisdiction of the crime.

    No person held to service or labor in one state, under the laws
    thereof, escaping into another, shall, in consequence of any law or regulation
    therein, be discharged from such service or labor, but shall be delivered up on
    claim of the party to whom such service or labor may be due.

  • Alex Harris

    macon ga. Bibb County Sheriff Department LEC Jail tell everybody I wasn’t suppose to even been in Macon ga. jail since ya’ll know I can’t stand ya’ll stupid muthafuckas!Blocking report of a federal crime and retaliation against whistleblower for attempting to report corruption by key government personnel including federal felony kidnaping me for ransom so from 2005-2015 looking Internet Computer Crimes this ya’ll no matter what federal charge!(smiling and laughing!!!)TI didn’t Grandhustle Entertainment Forumroom heatherb the comments between her and I while using macon ga. Mercer Law College Library ya’ll stuppid muthafuckas fucked up!Get the FBI Agents ,Macon and Atlanta Ga.Federal Court judges and prosecuting attorney to lock me up for computer crimes but either until ya’ll federal prosecuted for 1996 physial abuse to me and Virginia Harris ya’ll stupid muthafuckas can kiss my ass !meaning the entire Department of Family and Children Services from Administration down to security gets federal prosecuted !(smiling and laughing!!!)