Kentucky 8.80 Fraud in Connection With Identification Documents-Possession (18 U.S.C. Sec. 1028(a)(6)).
Kentucky 8.85 Unauthorized Access Devices-Using or Trafficking (18 U.S.C. Sec. 1029(a)(2))
Kentucky 8.86 Access Devices-Unlawfully Possessing Fifteen or More (18 U.S.C. Sec. 1029(a)(3)). .
Kentucky 8.88 Access Devices-Illegal Transactions (18 U.S.C. Sec. 1029(a)(5))
Kentucky 8.89 Access Devices-Unauthorized Solicitation (18 U.S.C. Sec. 1029(a)(6)).
21 U.S.C. Sec. 841(C)(1) POSSESSION OF LISTED CHEMICAL WITH INTENT TO MANUFACTURE
18 U.S.C. 1028(A)(2) FRAUDULENT TRANSFER OF AN IDENTIFICATION DOCUMENT, AUTHENTICATION FEATURE, OR FALSE IDENTIFICATION DOCUMENT
Clerical Staff Agreement - Self-Employed Independent Contractor
Telephone Systems Service Contract - Self-Employed
Self-Employed X-Ray Technician Self-Employed Independent Contractor
Headhunter Agreement - Self-Employed Independent Contractor
USLegal Guide to Giving Up and Signing Over Parental Rights
Racketeer Influenced and Corrupt Organization Act (RICO) - 18 U.S.C. Sec. 1962(d)- Conspiracy to Conduct the Affairs of the Enterprise
Self-Employed Roofing Services Agreement
EQUALLY CULPABLE DEFENDANTS
Tennessee 8.100 Intentional Damage to a Protected Computer (18 U.S.C. Sec. 1030(a)(5)(A))
Texas 8.100 Intentional Damage to a Protected Computer (18 U.S.C. Sec. 1030(a)(5)(A))
Utah 8.100 Intentional Damage to a Protected Computer (18 U.S.C. Sec. 1030(a)(5)(A))
Vermont 8.100 Intentional Damage to a Protected Computer (18 U.S.C. Sec. 1030(a)(5)(A))
Virginia 8.100 Intentional Damage to a Protected Computer (18 U.S.C. Sec. 1030(a)(5)(A))