2738 lines
146 KiB
Plaintext
2738 lines
146 KiB
Plaintext
|
|
|||
|
Sphear
|
|||
|
------
|
|||
|
__ ___ __ ___
|
|||
|
/ / / / / / /\ / /
|
|||
|
\ /__/ /__/ /__ /__\ /__/
|
|||
|
__/ / / / /__ / / / \
|
|||
|
|
|||
|
DigiZine
|
|||
|
|
|||
|
Phreaking
|
|||
|
Hacking
|
|||
|
Anarchy
|
|||
|
(And AnyThing Else P/H/A/C/C/V)
|
|||
|
Editor: Signal
|
|||
|
File Contributions:John Deere
|
|||
|
Sphear can be reached at
|
|||
|
system@axposf.pa.dec.com
|
|||
|
~or~
|
|||
|
sphear.digizine@lambada.oit.unc.edu
|
|||
|
|
|||
|
Issue #3
|
|||
|
[05.13.94]
|
|||
|
|
|||
|
If you have any articles, advertisements,
|
|||
|
worthy of our time please send them by
|
|||
|
Internet email to system@axposf.pa.dec.com
|
|||
|
Also, Sphear entertains any editorials and
|
|||
|
interesting articles and pays $3 for any
|
|||
|
article that is published.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
Contents
|
|||
|
--------
|
|||
|
Clarifications
|
|||
|
|
|||
|
|
|||
|
Articles
|
|||
|
-+-+-+-+
|
|||
|
|
|||
|
Digital Turmoil? by Signal
|
|||
|
----------------------------
|
|||
|
|
|||
|
Enclosure
|
|||
|
~~~~~~~~~
|
|||
|
Federal Communications Commission
|
|||
|
Docket 91-281
|
|||
|
Regarding Caller Number Identification
|
|||
|
|
|||
|
Files
|
|||
|
+-+-+
|
|||
|
NewHack2.Zip
|
|||
|
by
|
|||
|
John Deere
|
|||
|
|
|||
|
|
|||
|
Clarifications
|
|||
|
--------------
|
|||
|
|
|||
|
Due to circumstances beyond our control Sphear Digital Magazine has been out of print(e-text) for several months. We apologize for any inconvenience this may have caused, and sincerely hope that there are no more delays in the future. Thank you for your patience.
|
|||
|
|
|||
|
--Ed. \
|
|||
|
\/////////////////
|
|||
|
\/Digital Turmoil/
|
|||
|
\/////////////////
|
|||
|
by Signal
|
|||
|
|
|||
|
Digital Turmoil? Does that word mean anything to the average Joe? The
|
|||
|
person who doanloads those outlawed, enncoded graphic files on the Net? No.
|
|||
|
The normal, or even not so normal internet user, has probably never dealt
|
|||
|
with digital turmoil. It is a plague only known by some of those lowly system
|
|||
|
administrators; those sysadmins that have nothing better to do but to
|
|||
|
reconfigure their systems, hour after hour, day after day. It could be said
|
|||
|
that only he knows what it means. Digital Turmoil. Is it something that Hackers
|
|||
|
create, or is it created by blindsighted software designers, who do nothing for
|
|||
|
a living but churn out huge and almost useless programs? That is the question.
|
|||
|
The internet is a very complex and unregulated system and this digital turmoil
|
|||
|
that does exist does not exist for the benefit of anyone, 'cept for the
|
|||
|
aggeravation of the system administrators. Turmoil on the net can included,
|
|||
|
cleverly forged email, so that it is NOT tracable with STMP, and sendmail. Of
|
|||
|
course cracking in to a system and fucking up major, not the user partition or
|
|||
|
files but just making it so that root has to stay up all nite long--sleep
|
|||
|
deprivation.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
FOR FCC RECORD ONLY
|
|||
|
|
|||
|
BEFORE THE
|
|||
|
FEDERAL COMMUNICATIONS COMMISSION
|
|||
|
FCC 94-59
|
|||
|
WASHINGTON, D.C.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
IN THE MATTER OF )
|
|||
|
)
|
|||
|
Rules and Policies Regarding ) CC Docket No. 91-281
|
|||
|
Calling Number Identification )
|
|||
|
Service - Caller ID )
|
|||
|
|
|||
|
Due to technical difficulties, footnotes, tables & charts may be
|
|||
|
dropped from this document. Entire document is available in Word
|
|||
|
Perfect also.
|
|||
|
|
|||
|
REPORT AND ORDER AND FURTHER NOTICE OF PROPOSED
|
|||
|
RULEMAKING
|
|||
|
|
|||
|
Comments due: May 18, 1994
|
|||
|
Replies due: June 21, 1994
|
|||
|
|
|||
|
Adopted: March 8, 1994 Released: March 29, 1994
|
|||
|
|
|||
|
By the Commission: Commissioner Barrett issuing a statement.
|
|||
|
|
|||
|
TABLE OF CONTENTS
|
|||
|
|
|||
|
Title Paragraph
|
|||
|
|
|||
|
I. INTRODUCTION 1
|
|||
|
|
|||
|
II. DISCUSSION
|
|||
|
|
|||
|
A. Calling Party Number Services Should be Available
|
|||
|
to Interstate Subscribers Nationally
|
|||
|
1. Risks and Benefits 4
|
|||
|
2. Deployment by Carriers 10
|
|||
|
|
|||
|
B. Transmission of the Calling Party Number
|
|||
|
throughout the Network 12
|
|||
|
|
|||
|
C. Costs of Interstate Transmission of Calling
|
|||
|
Party Number 18
|
|||
|
|
|||
|
D. Privacy Issues 24
|
|||
|
1. Constitutional Issues 25
|
|||
|
2. Public Policy and Privacy Mechanisms 31
|
|||
|
3. Private Networks, Emergency Services and
|
|||
|
Law Enforcement 35
|
|||
|
|
|||
|
E. Privacy Protection Mechanisms, Further Notice of
|
|||
|
Proposed Rulemaking 38
|
|||
|
1. Per Line Blocking for Specific Groups 39
|
|||
|
2. Per Line Blocking Available to All Subscribers 41
|
|||
|
3. Operator Assisted Per Call Blocking 44
|
|||
|
4. Automatic Per Call Blocking 45
|
|||
|
5. Applicability to Additional Services 50
|
|||
|
|
|||
|
F. ANI and Caller Privacy 51
|
|||
|
|
|||
|
G. Subscriber Education, Further Notice of Proposed
|
|||
|
Rulemaking 59
|
|||
|
|
|||
|
H. CPNI and Subscriber Privacy 61
|
|||
|
|
|||
|
I. Wiretap Statutes and Caller ID 62
|
|||
|
|
|||
|
J. Relationship between Interstate and Intrastate
|
|||
|
Caller ID 64
|
|||
|
|
|||
|
III. CONCLUSION 71
|
|||
|
|
|||
|
IV. PROCEDURAL MATTERS 73
|
|||
|
|
|||
|
V. ORDERING CLAUSES 77
|
|||
|
|
|||
|
APPENDICES
|
|||
|
|
|||
|
I. INTRODUCTION.
|
|||
|
|
|||
|
1. On October 23, 1991, the Commission issued a Notice of
|
|||
|
Proposed Rulemaking in this docket. More than 100 parties filed
|
|||
|
comments, including local exchange carriers (LECs),
|
|||
|
interexchange carriers (IXCs), state governments, public interest
|
|||
|
organizations, trade associations, and private citizens.
|
|||
|
|
|||
|
2. In the NPRM, the Commission sought to develop the most
|
|||
|
effective policies to govern interstate calling party number
|
|||
|
based services such as caller ID. The NPRM sought comment on
|
|||
|
carriers' progress in deploying interstate caller ID service, and
|
|||
|
the technical and public policy implications of dual federal and
|
|||
|
state regulatory policies. We tentatively concluded that a
|
|||
|
federal model for the interstate delivery of the calling party's
|
|||
|
number is in the public interest, and necessary for the
|
|||
|
introduction of many valuable services, including interstate
|
|||
|
caller ID.
|
|||
|
|
|||
|
3. In this Order, we find that a federal model for
|
|||
|
interstate delivery of calling party number is in the public
|
|||
|
interest, that calling party privacy must be protected, and that
|
|||
|
certain state regulation of interstate calling party number
|
|||
|
(CPN) based services, including interstate caller ID, must be
|
|||
|
preempted. We amend Part 64 of the rules to require that common
|
|||
|
carriers using Common Channel Signalling System 7 (SS7) and
|
|||
|
subscribing to or offering any service based on SS7 functionality
|
|||
|
must transmit the calling party number parameter and its
|
|||
|
associated privacy indicator on an interstate call to connecting
|
|||
|
carriers. We also require that carriers offering CPN delivery
|
|||
|
services provide, at no charge to the caller, an automatic per
|
|||
|
call blocking mechanism for interstate callers. The rules
|
|||
|
require that terminating carriers providing calling party based
|
|||
|
services, including caller ID, honor the privacy indicator. We
|
|||
|
find that the costs of interstate transmission of CPN are de
|
|||
|
minimis, and that the CPN should be transmitted among carriers
|
|||
|
without additional charge. We also require that carriers
|
|||
|
participating in the offering of any service that delivers CPN on
|
|||
|
interstate calls inform telephone subscribers that the
|
|||
|
subscriber's number may be revealed to called parties and
|
|||
|
describe what steps subscribers can take to avoid revealing their
|
|||
|
numbers. Further, we adopt rules to restrict the reuse or sale
|
|||
|
of information generated by automatic number identification (ANI)
|
|||
|
or charge number services, absent affirmative subscriber
|
|||
|
consent. Finally, we note that additional comments are sought
|
|||
|
through a separate public notice in the Computer III Remand
|
|||
|
Proceeding on whether residential and small business customers'
|
|||
|
privacy concerns warrant revision of the Commission's rules
|
|||
|
governing reuse and sale of customer proprietary network
|
|||
|
information (CPNI). In the Further Notice of Proposed
|
|||
|
Rulemaking, we seek comment on whether more detailed customer
|
|||
|
education rules should be adopted. We also seek comment on
|
|||
|
extending the policies adopted herein to other services that
|
|||
|
might identify the calling party.
|
|||
|
|
|||
|
|
|||
|
II. DISCUSSION.
|
|||
|
|
|||
|
A. Calling Party Number Services Should be Available to
|
|||
|
Interstate Subscribers Nationally.
|
|||
|
|
|||
|
4. Risks and Benefits. In the NPRM, the Commission stated
|
|||
|
its tentative view that the availability of interstate caller ID
|
|||
|
would enhance the value of the service to intrastate subscribers
|
|||
|
and augment the available choices of existing interstate services
|
|||
|
for all subscribers. The Commission noted that the ability to
|
|||
|
choose caller ID and other services that rely on access to the
|
|||
|
calling party's number should be available to interstate
|
|||
|
subscribers nationally. The majority of commenters supported
|
|||
|
this view and described in detail the potential benefits to the
|
|||
|
public of services based on the calling party's number.
|
|||
|
|
|||
|
5. In its comments, AT&T identified potential uses of
|
|||
|
interstate calling party number for such services as pay-per-view
|
|||
|
television, order entry/verification, voice message storage,
|
|||
|
secure computer access, customized customer service, business
|
|||
|
fraud reduction, call routing, emergency dispatch, health care
|
|||
|
services, telephone banking, home shopping, dealer locator, and
|
|||
|
selective call message forwarding. McCaw states that caller
|
|||
|
information will significantly improve cellular and other service
|
|||
|
offerings because cellular subscribers pay for incoming calls.
|
|||
|
Moreover, McCaw notes that ubiquitous caller ID will facilitate
|
|||
|
cellular enhancements including conventional caller ID, more
|
|||
|
responsive customer service, new cellular CPE voice synthesizers,
|
|||
|
and service for roaming subscribers. SNET states that its
|
|||
|
studies show that caller ID aids persons with hearing impairments
|
|||
|
in answering calls; law enforcement in determining crank,
|
|||
|
threatening, false alarm calls and emergency dispatches; and
|
|||
|
hospital crisis centers in identifying and deterring nuisance
|
|||
|
calls.
|
|||
|
|
|||
|
6. In contrast, Colorado DVC asserts that caller ID is not
|
|||
|
in the public interest because of the threat it poses to the
|
|||
|
privacy and safety interests of the calling party. Colorado
|
|||
|
Consumer contends that call trace is the preferable service to
|
|||
|
stop obscene and harassing calls. Bell Atlantic replies that
|
|||
|
call trace will not work if another call is received before
|
|||
|
tracing is attempted, and that customers who have used both
|
|||
|
caller ID and call trace prefer the former. Consumer Action,
|
|||
|
Washington UTC, and NYS Law agree with Colorado DVC that caller
|
|||
|
ID has little merit and may threaten public health and safety as
|
|||
|
well as jeopardize important privacy interests.
|
|||
|
|
|||
|
7. While we agree that passage of the calling party number
|
|||
|
does create risks of lost privacy, we must weigh these risks
|
|||
|
against the potential benefits brought by interstate services
|
|||
|
that passage of the calling party's number makes possible. Other
|
|||
|
services available to protect subscriber privacy, such as Call
|
|||
|
Trace, are limited in scope and do not permit either the public
|
|||
|
or service providers to take advantage of beneficial services.
|
|||
|
The commenters briefly discuss some of these benefits. For
|
|||
|
example, computer systems could limit remote access only to
|
|||
|
previously approved calling numbers, with calling party number
|
|||
|
based services like caller ID making verification for access
|
|||
|
nearly instantaneous. Service providers who respond to telephone
|
|||
|
orders, such as stock brokers or parts and equipment dealers,
|
|||
|
could use the calling party's number to direct the call
|
|||
|
immediately to the appropriate department for service. Banks
|
|||
|
could program data sources to have customer profile information
|
|||
|
available as a call is answered. With interstate delivery of
|
|||
|
calling party number, calls to national service centers could be
|
|||
|
routed automatically to local service centers closest to the
|
|||
|
calling party. Consumers making orders could have their name,
|
|||
|
address and billing information verified instantaneously.
|
|||
|
Indeed, a significant number and kind of customized national
|
|||
|
services can develop as a result of instant recognition of the
|
|||
|
calling party.
|
|||
|
|
|||
|
8. Many of these potential services would permit
|
|||
|
transactions to occur more efficiently. In an economy that
|
|||
|
averages more than one billion interstate calling minutes a day,
|
|||
|
even small efficiencies on individual calls could become
|
|||
|
significant in the aggregate. Providing the public with rapid
|
|||
|
and efficient interstate telecommunications services is at the
|
|||
|
heart of our responsibilities, particularly if they can be
|
|||
|
provided at very little additional cost. As illustrated above,
|
|||
|
passage of the calling party number can promote technological
|
|||
|
innovation and new applications that will foster economic
|
|||
|
efficiency and provide new employment, manufacturing and
|
|||
|
investment opportunities.
|
|||
|
|
|||
|
9. None of these services and benefits are possible,
|
|||
|
however, unless the calling party number is passed freely among
|
|||
|
carrier networks. It is significant that the categories of those
|
|||
|
benefiting from these new opportunities are very broad. For
|
|||
|
example, consumers and individuals benefit by having additional
|
|||
|
options for meeting their customer service needs and by having
|
|||
|
transactions completed more quickly and more accurately. As
|
|||
|
workers and entrepreneurs, they benefit by having new employment
|
|||
|
opportunities. Businesses benefit because they can complete
|
|||
|
transactions more quickly, which can lower incremental costs of
|
|||
|
transactions, potentially leading to savings for consumers.
|
|||
|
Telephone companies benefit by revenues from new services, and by
|
|||
|
greater use of their networks. Greater use of CPN based services
|
|||
|
by consumers and service providers will create incentives for
|
|||
|
carriers who do not have SS7 networks to install them. This will
|
|||
|
enhance the nation's telecommunications infrastructure, to the
|
|||
|
benefit of all who use it. Most of the comments directed against
|
|||
|
our proposal in the NPRM are based on legitimate concerns that
|
|||
|
individuals have access to a means of protecting their privacy
|
|||
|
where doing so is important. We believe technology can address
|
|||
|
these concerns regarding protections for individual privacy.
|
|||
|
Accordingly, we find that the potential benefits of services
|
|||
|
based on calling party number serve the public interest and
|
|||
|
affirm the NPRM's tentative conclusion that CPN-based interstate
|
|||
|
services such as caller ID should be available to interstate
|
|||
|
subscribers nationwide.
|
|||
|
|
|||
|
10. Deployment by Carriers. In the NPRM, the Commission
|
|||
|
sought detailed comments on carriers' progress toward
|
|||
|
establishing joint offerings of CPN-based services, and any
|
|||
|
impediments that have been identified. The record does not
|
|||
|
reflect extensive response to that inquiry. It appears that
|
|||
|
although the deployment of the necessary technology for
|
|||
|
interstate calling party number based services is well underway,
|
|||
|
other factors have impeded progress. In particular, varying
|
|||
|
state regulatory responses to privacy issues appear to be
|
|||
|
impeding the development of interstate services. Moreover,
|
|||
|
commenters express concern that this lack of national uniformity
|
|||
|
in regulating interstate SS7 calling party number based services
|
|||
|
may eliminate a source of the revenues expected from such
|
|||
|
services. In their comments, Rochester, Ameritech, BellSouth,
|
|||
|
GTE, McCaw, and US West support a national policy for caller ID
|
|||
|
because federal standards are essential to achieve the goals of
|
|||
|
nationwide availability of calling party number based services.
|
|||
|
McCaw states that it supports a federal policy for caller ID and
|
|||
|
ANI that accommodates both state concerns and industry
|
|||
|
diversification and experimentation. In contrast, Allnet
|
|||
|
contends that there is no compelling federal interest to promote
|
|||
|
nationwide availability of caller ID and that if there is a
|
|||
|
demand for interstate caller ID, market forces will assure its
|
|||
|
availability.
|
|||
|
|
|||
|
11. The record reflects that national policies on
|
|||
|
interstate CPN-based services such as caller ID are needed to
|
|||
|
reduce risks of stranded investment and to remove impediments to
|
|||
|
development of services consumers are likely to find beneficial.
|
|||
|
In addition to providing additional choices for consumers, such
|
|||
|
services offer significant efficiency dividends for all users of
|
|||
|
interstate telephone services. These efficiency gains promise to
|
|||
|
lower incremental costs of interstate calling party number based
|
|||
|
services, including caller ID, and increase national
|
|||
|
productivity. Carriers may be wary to invest in technology or
|
|||
|
delivery systems that may later become incompatible with the
|
|||
|
varying state requirements or incapable of satisfying federal
|
|||
|
policy. Resolution of privacy, blocking, and preemption issues
|
|||
|
is necessary to enable the benefits of these services to occur.
|
|||
|
By removing impediments created by administrative uncertainty, we
|
|||
|
seek only to resolve those issues necessary for the efficient
|
|||
|
introduction of the services. The effective date of the rules
|
|||
|
adopted here will be April 12, 1995, which should allow
|
|||
|
sufficient time for completion of any coordination or other
|
|||
|
arrangements, discussed infra, necessary for full compliance with
|
|||
|
the rules.
|
|||
|
|
|||
|
B. Transmission of the Calling Party Number throughout
|
|||
|
the
|
|||
|
Network.
|
|||
|
|
|||
|
12. In the NPRM, we tentatively concluded that the
|
|||
|
transmission of the CPN by the LEC to the IXC is an essential
|
|||
|
element of interstate CPN-based services such as caller ID. The
|
|||
|
Commission proposed that LECs should be required to provide CPN
|
|||
|
to IXCs as soon as technologically feasible and, similarly, that
|
|||
|
IXCs should be required to transmit CPN to terminating LECs.
|
|||
|
|
|||
|
13. AT&T states that requiring IXCs to transmit interstate
|
|||
|
CPN to LECs is unnecessary because the competitive market already
|
|||
|
gives IXCs incentive to offer innovative interstate caller ID
|
|||
|
services to end users. Moreover, AT&T contends that such a
|
|||
|
requirement would deprive IXCs of the ability to earn revenues
|
|||
|
from their substantial investments in SS7 technology. Allnet
|
|||
|
argues that the requirement would compel all IXCs to participate
|
|||
|
in SS7 interconnection, thus compromising network integrity.
|
|||
|
|
|||
|
14. Ameritech, Nynex, Pacific, Centel, and NTIA concur
|
|||
|
that the Commission should facilitate the provision of interstate
|
|||
|
caller ID by requiring passage of the calling party's number
|
|||
|
between carrier networks without modification. MCI agrees that
|
|||
|
the Commission should require LECs to provide the CPN to IXCs,
|
|||
|
but it opposes any requirement that IXCs be required to transmit
|
|||
|
the CPN to the terminating LEC because it states the LEC would
|
|||
|
then be the lone provider of caller ID. In opposition, BellSouth
|
|||
|
contends that the transmission of the CPN is essential, and as
|
|||
|
part of SS7 does not require additional network processing by the
|
|||
|
IXC nor impose significant cost. Further, BellSouth argues that
|
|||
|
free delivery of the CPN to terminating LECs would not establish
|
|||
|
LECs as monopoly providers; rather, IXCs could develop competing
|
|||
|
CPN-based interstate services that bypass LECs as terminating
|
|||
|
carriers. NTIA and USTA assert that an IXC's offering of the
|
|||
|
calling party number should be available through all means of
|
|||
|
interconnection to end users, including LECs, alternative local
|
|||
|
service providers, or the IXC itself.
|
|||
|
|
|||
|
15. Nynex proposes that mandatory delivery of the calling
|
|||
|
party number parameter among all networks is in the public
|
|||
|
interest. Further, Nynex supports McCaw's proposal that
|
|||
|
technical standards for transmission of caller ID and ANI between
|
|||
|
cellular and landline carriers be developed. However, it notes
|
|||
|
that cellular carriers do not receive ANI from Nynex because
|
|||
|
transmission of ANI to cellular carriers is not technologically
|
|||
|
feasible.
|
|||
|
|
|||
|
16. We affirm our tentative finding that interstate CPN-
|
|||
|
based services such as caller ID will not be possible unless the
|
|||
|
calling party number is transmitted from the originating carrier
|
|||
|
to the terminating carrier. In our 800 number portability
|
|||
|
proceeding, major LECs filed access tariffs providing for 800
|
|||
|
number portability using SS7 technology. Many Bell Operating
|
|||
|
Companies (BOCs) have filed access tariffs with CPN as a
|
|||
|
nonchargeable option. Calling party number is an element of
|
|||
|
access service in virtually all SS7 access tariffs filed at the
|
|||
|
Commission and these tariffs follow industry standards for SS7
|
|||
|
interconnection. The American National Standard for
|
|||
|
Telecommunications - Signalling System Number 7 (SS7) -
|
|||
|
Integrated Services Digital Network, ANSI T1.113, 1988, includes
|
|||
|
calling party number as an optional parameter of an SS7 network.
|
|||
|
Similarly, the subsequent BellCore guidelines for SS7
|
|||
|
interconnection with a BOC include CPN as an optional
|
|||
|
parameter.
|
|||
|
|
|||
|
17. We conclude that carriers should pass calling party
|
|||
|
number information where capable of doing so. In view of the
|
|||
|
foregoing, we amend Part 64 of the rules to require that not
|
|||
|
later than April 12, 1995, common carriers using Signalling
|
|||
|
System 7 and subscribing to or offering any service based on SS7
|
|||
|
functionality must transmit the calling party number parameter
|
|||
|
and its associated privacy indicator to connecting carriers on an
|
|||
|
interstate call. Further, we amend the rules to prohibit
|
|||
|
common carriers from modifying or overriding the privacy
|
|||
|
indicator on an interstate call. We emphasize that carriers are
|
|||
|
not required to invest in SS7 technology in order to facilitate
|
|||
|
delivery of the calling party number. Carriers are only required
|
|||
|
to transmit the CPN and privacy indicator where technically
|
|||
|
feasible. Because transmission of the calling party number
|
|||
|
requires SS7 technology, technical feasibility exists wherever
|
|||
|
SS7 technology is used. We now turn to the issue of the costs
|
|||
|
associated with the transmission of the CPN.
|
|||
|
|
|||
|
|
|||
|
C. Costs of Interstate Transmission of Calling Party
|
|||
|
Number.
|
|||
|
|
|||
|
18. Most IXC commenters contend that, if required to
|
|||
|
transmit the calling party number, IXCs should be compensated for
|
|||
|
such transmission. AT&T avers that IXCs incur costs in acquiring
|
|||
|
and delivering interstate CPN and that its decision to invest in
|
|||
|
SS7 rested in part on the anticipation of revenue from new
|
|||
|
services such as caller ID. MCI concurs with AT&T and further
|
|||
|
contends that IXCs already pay for calling party numbers as part
|
|||
|
of feature group D switched access and are developing services
|
|||
|
which will provide the called party with the calling party's
|
|||
|
telephone number. Allnet proposes that IXCs who do not
|
|||
|
voluntarily engage in forwarding caller ID should not bear any of
|
|||
|
the costs of deployment. Metromedia argues that carriers
|
|||
|
terminating calls should be responsible for billing those called
|
|||
|
parties subscribing to interstate caller ID where appropriate;
|
|||
|
terminating carriers should compensate IXCs passing the
|
|||
|
information.
|
|||
|
|
|||
|
19. Nynex believes that if the CPN is passed freely from
|
|||
|
carrier to carrier, then each carrier may use it to provide
|
|||
|
services to end users, consistent with cost-based rather than
|
|||
|
market-based pricing for Open Network Architecture service
|
|||
|
offerings. Bell Atlantic agrees that if IXCs are allowed to
|
|||
|
charge for calling party number the cost to consumers will be
|
|||
|
unnecessarily increased. United states that a single price
|
|||
|
established in the local jurisdiction for all caller ID
|
|||
|
regardless of jurisdiction is appropriate. United cites to the
|
|||
|
precedent for local service pricing of custom calling features
|
|||
|
like call forwarding of interstate toll calls.
|
|||
|
|
|||
|
20. SWB concurs with other commenters that CPN should be
|
|||
|
passed from carrier to carrier at no charge because it is an
|
|||
|
intrinsic part of SS7 call setup and no cost is
|
|||
|
associated with filling the calling party number parameter in the
|
|||
|
SS7 message. SWB disagrees with IXCs such as AT&T, MCI, and
|
|||
|
Allnet which assert that charging for passage of the CPN would
|
|||
|
permit them to share in revenues from the LEC's services that
|
|||
|
depend on passage of the calling party number. In essence,
|
|||
|
states SWB, the IXCs want to charge for the passage but receive
|
|||
|
it free. SWB proposes that the Commission require passage at no
|
|||
|
charge, thus eliminating extra charges which would be passed on
|
|||
|
to consumers.
|
|||
|
|
|||
|
21. McCaw agrees with SWB that CPN should be passed free of
|
|||
|
charge. McCaw asserts that to encourage maximum possible
|
|||
|
participation of all carriers as co-equal carriers, the
|
|||
|
Commission should prohibit compensation among carriers that pass
|
|||
|
ANI or caller ID information because the costs of ANI and caller
|
|||
|
ID are recovered in the overall SS7 costs. Centel argues that
|
|||
|
IXCs should be prohibited from charging either the originating or
|
|||
|
terminating LEC for transport. Centel asserts that revenue
|
|||
|
sharing issues should be resolved between carriers, and notes
|
|||
|
that it would cost IXCs more to remove the CPN from their systems
|
|||
|
than to allow passage to terminating LECs.
|
|||
|
|
|||
|
22. CFA, Colorado DVC, Maryland PC, Michigan PSC and others
|
|||
|
argue that costs associated with caller ID should be borne by
|
|||
|
subscribers to the service. The Illinois CC notes that it has
|
|||
|
ordered that the costs of providing per call blocking be borne by
|
|||
|
those who subscribe to caller ID. IIA proposes that the per call
|
|||
|
blocking costs should be imposed upon the calling party on the
|
|||
|
theory that suppression of the calling number is a special
|
|||
|
service the cost for which should be borne by the party who
|
|||
|
chooses to invoke it. Consumer Action contends that LECs are
|
|||
|
improperly allocating the costs of the SS7 switches and supports
|
|||
|
this contention with data which it believes show that the body of
|
|||
|
ratepayers is subsidizing SS7-based service, which only benefits
|
|||
|
5-6% of telephone customers.
|
|||
|
|
|||
|
23. We find that the unimpeded flow of the calling party
|
|||
|
number throughout the network ensures the greatest diversity of
|
|||
|
offerings to subscribers and eliminates costs that can delay or
|
|||
|
impede development of CPN based services. To the extent these
|
|||
|
services improve productivity, lower incremental costs and create
|
|||
|
new employment, investment and other opportunities, they benefit
|
|||
|
a wide range of consumers and producers. As noted above,
|
|||
|
industry standards already include calling party number as an
|
|||
|
optional parameter of an SS7 network, and the calling party
|
|||
|
number is an element of access service in virtually all SS7
|
|||
|
access tariffs filed at the Commission. In most cases, SS7
|
|||
|
signalling replaces older signalling methods used in an IXC
|
|||
|
network and provides benefits to the carrier such as more
|
|||
|
efficient call routing and reduced exposure to fraud. We thus
|
|||
|
conclude from the record before us that the costs of transmitting
|
|||
|
CPN are de minimis, and that accordingly, the calling party
|
|||
|
number parameter and associated privacy indicator should be
|
|||
|
transmitted among carriers at no additional charge.
|
|||
|
|
|||
|
|
|||
|
D. Interstate Caller ID Privacy Issues.
|
|||
|
|
|||
|
24. In the NPRM, we balanced the privacy interest of the
|
|||
|
called party against the privacy interest of the caller and
|
|||
|
proposed that interstate caller ID should include some measures
|
|||
|
to protect calling parties' privacy. We sought comment on
|
|||
|
whether these privacy interests are matters of public policy or
|
|||
|
are constitutional in nature. We noted that any regulatory
|
|||
|
response to protect the privacy interest of the calling party
|
|||
|
should take into account the public benefits of caller ID and
|
|||
|
should not undermine the value of the service overall. Most
|
|||
|
commenters agree that societal expectations of privacy require
|
|||
|
that interstate caller ID include some type of privacy protection
|
|||
|
mechanism.
|
|||
|
|
|||
|
25. Constitutional Issues. AT&T contends that the
|
|||
|
provision of interstate caller ID by private telephone companies
|
|||
|
does not implicate the U.S. Constitution, which, AT&T argues,
|
|||
|
does not regulate private activity relevant to this proceeding.
|
|||
|
GTE concurs with AT&T and adds that in recent cases the courts
|
|||
|
found no state action was involved when a LEC refused to provide
|
|||
|
communications service or billing and collection service to dial-
|
|||
|
a-porn providers. Further, GTE argues that in Smith v.
|
|||
|
Maryland, 442 U.S. 735 (1979), (Smith), the U. S. Supreme Court
|
|||
|
held that there is no federal constitutional protection from
|
|||
|
disclosure of digits dialed on the network.
|
|||
|
|
|||
|
26. In opposition, Georgia CUC cites to testimony before
|
|||
|
the Georgia PUC that concludes that information is
|
|||
|
constitutionally protected when a legitimate expectation exists
|
|||
|
that the information will remain confidential. California PUC
|
|||
|
contends that there exists a non-frivolous claim that the First
|
|||
|
Amendment right to free speech includes a right of the calling
|
|||
|
party not to be compelled to disclose his or her telephone
|
|||
|
number. Ohio OCC concurs that there is an identifiable federal
|
|||
|
constitutional privacy interest that includes telephone digits
|
|||
|
and supports this argument citing Griswold v. Connecticut, 381
|
|||
|
U.S. 479 (1965) (the right to make decisions about procreation)
|
|||
|
(Griswold), and Whalen v. Roe, 429 U.S. 589 (1977) (individual
|
|||
|
interest in avoiding disclosure of personal matters) (Whalen).
|
|||
|
Pennsylvania PUC states that the Commonwealth Court of
|
|||
|
Pennsylvania held that caller ID is per se unconstitutional under
|
|||
|
the Pennsylvania state constitution because of the theoretical
|
|||
|
risk that a caller wanting to remain anonymous would accidentally
|
|||
|
forget to use the available blocking feature.
|
|||
|
|
|||
|
27. The record and case law demonstrate that there is no
|
|||
|
federal constitutional bar to the offering by carriers of CPN-
|
|||
|
based services such as caller ID. In Smith, the Supreme Court
|
|||
|
held that there is no privacy right under the Fourth Amendment
|
|||
|
protecting telephone numbers from disclosure because the
|
|||
|
application of the Fourth Amendment depends on whether first, the
|
|||
|
person invoking protection can claim that a "legitimate
|
|||
|
expectation of privacy" has been invaded by the government. In
|
|||
|
Smith, pen register records kept upon police request by a
|
|||
|
telephone carrier on calls made by a robbery suspect became
|
|||
|
evidence used to convict him on robbery charges. At issue was
|
|||
|
whether seizure by police of the record of phone numbers that the
|
|||
|
suspect called constituted a "search" for Fourth Amendment
|
|||
|
purposes and thus required a warrant. The court's decision
|
|||
|
rested upon analysis of whether the individual exhibits an
|
|||
|
expectation that something will remain private, and second,
|
|||
|
whether the individual's subjective expectation of privacy is one
|
|||
|
which society is prepared to recognize as objectively reasonable.
|
|||
|
Smith at 740. The court held that the expectation of privacy for
|
|||
|
phone numbers is not one that society is prepared to recognize as
|
|||
|
reasonable, because when one voluntarily exposes his phone number
|
|||
|
to the telephone company's equipment, one assumes the risk that
|
|||
|
the company may reveal the number to others. Id. at 743-45. The
|
|||
|
Court also drew a distinction between the content of a phone
|
|||
|
conversation and the number dialed and found that protecting the
|
|||
|
content is more important than the number dialed because phone
|
|||
|
numbers are not communication in and of themselves, but merely
|
|||
|
establish that communication has been attempted. Id. at 741.
|
|||
|
|
|||
|
28. The Pennsylvania state court ruling cited by the
|
|||
|
Pennsylvania PUC does not suggest otherwise. The Commonwealth
|
|||
|
Court struck down Pennsylvania PUC's order which had approved
|
|||
|
caller ID in part because the court found that, even with a
|
|||
|
blocking mechanism, caller ID violates Pennsylvania
|
|||
|
constitutional privacy rights. The constitutional privacy
|
|||
|
right asserted in Barasch rests on the court's interpretation of
|
|||
|
the Pennsylvania Constitution. Id. at 87, 89. However, the U.S.
|
|||
|
Constitution is not cited in Barasch as imposing any privacy
|
|||
|
right in a phone number; indeed, such an interpretation would be
|
|||
|
inconsistent with Smith. Moreover, on appeal, the Supreme Court
|
|||
|
of Pennsylvania held that caller ID violates the "trap and trace"
|
|||
|
provisions of the state wiretap law and did not address the
|
|||
|
constitutional privacy issue.
|
|||
|
|
|||
|
29. GTE cites two cases (supra, note 16) in support of the
|
|||
|
principle that common carriers are private entities and thus no
|
|||
|
state interference with individual privacy rights is involved.
|
|||
|
DISC involves a challenge by dial-a-porn companies to the Helms
|
|||
|
Amendment, 47 U.S.C. 223 (b) & (c), which allows phone
|
|||
|
companies to require dial-a-porn services to notify them that
|
|||
|
they will be providing indecent messages and/or to require dial-
|
|||
|
a-porn services to utilize independent billing. The Court of
|
|||
|
Appeals held that no prior restraint of free speech was created
|
|||
|
by the statute because no governmental action was involved. The
|
|||
|
statute merely permits phone companies to choose whether to
|
|||
|
provide billing services to dial-a-porn companies. Similarly,
|
|||
|
Information Providers involves a challenge to Section 223 of the
|
|||
|
Communications Act of 1934, as amended, 47 C.F.R. 64.201
|
|||
|
(1991). The court held that carriers are private companies, not
|
|||
|
state actors, and are, therefore, not required to continue,
|
|||
|
restrict, or terminate services of particular users and that a
|
|||
|
carrier is free under the constitution to terminate service to
|
|||
|
dial-a-porn operators altogether. These cases generally support
|
|||
|
the proposition that when a carrier can choose whether to offer
|
|||
|
certain services, no state action is involved.
|
|||
|
|
|||
|
30. On the basis of this body of law and the record, we
|
|||
|
find that the offering of caller ID does not violate privacy
|
|||
|
rights protected by the U.S. Constitution. Constitutional
|
|||
|
protections of privacy relate to government action and no
|
|||
|
government action is involved here. Moreover, we find that
|
|||
|
federal courts have not, to date, recognized an individual
|
|||
|
privacy right in telephone numbers.
|
|||
|
|
|||
|
31. Public Policy and Privacy Mechanisms. The majority of
|
|||
|
commenters agree that the privacy interests associated with
|
|||
|
caller ID are a matter of public policy or societal expectation.
|
|||
|
California Consumer Affairs proposes that federal interstate
|
|||
|
caller ID policies must recognize that the governmental interest
|
|||
|
in protecting public health, safety and welfare dictates that
|
|||
|
some blocking option be available. NY Law Project underscores
|
|||
|
that with a relatively inexpensive personal computer and a CD ROM
|
|||
|
reader, a business caller ID subscriber could access data bases
|
|||
|
and display a data profile of a caller even before the telephone
|
|||
|
is answered, or while the call is in progress. SWB recognizes
|
|||
|
the need to protect the confidentiality of non-published numbers,
|
|||
|
undercover police officers, domestic violence shelters, and the
|
|||
|
integrity of hotlines. Massachusetts contends that the effective
|
|||
|
functioning of law enforcement in Massachusetts would be
|
|||
|
compromised if caller ID were offered without a privacy
|
|||
|
protection mechanism. GTE, however, asserts that tariff language
|
|||
|
requires that the caller identify himself to the called party.
|
|||
|
Nynex contends that caller ID redresses a longstanding imbalance
|
|||
|
which favored the calling party because the called party had no
|
|||
|
information on which to decide whether or not to answer the
|
|||
|
telephone.
|
|||
|
|
|||
|
32. BellSouth proposes that with all number delivery,
|
|||
|
callers can protect their identity by calling from telephones not
|
|||
|
recognizable by the called party. BellSouth states it has
|
|||
|
developed specialized service offerings for the privacy concerns
|
|||
|
of law enforcement and domestic violence shelters. Bell Atlantic
|
|||
|
also advocates unrestricted delivery on the premise that per call
|
|||
|
blocking is used infrequently and provides malicious callers the
|
|||
|
opportunity to continue to make harassing calls. MCI states that
|
|||
|
delivery of the calling party number should be unrestricted
|
|||
|
because unlimited availability of customer initiated blocking
|
|||
|
will undermine the service and diminish its value to the public.
|
|||
|
However, MCI concurs with BellSouth that limited blocking should
|
|||
|
be available to protect public safety groups. USCG proposes that
|
|||
|
any blocking mechanisms not apply to calls made to United States
|
|||
|
Coast Guard emergency telephone numbers. USTA is in favor of
|
|||
|
unrestricted delivery of caller ID across all carrier networks,
|
|||
|
whether interstate or intrastate. However, USTA proposes that
|
|||
|
per call blocking for specific applications may be appropriate.
|
|||
|
|
|||
|
33. IIA argues that unrestricted delivery of caller ID
|
|||
|
threatens a broader concept of information privacy -- a right of
|
|||
|
the individual to control the dissemination of information about
|
|||
|
one's self and one's activities. Kentucky states that Bell
|
|||
|
Atlantic's claims of reduced harassing and obscene calls appear
|
|||
|
to be more a function of changes in the handling and routing of
|
|||
|
such calls than any real reduction on the actual placing of these
|
|||
|
calls. Ohio OCC states that unrestricted delivery of caller ID
|
|||
|
would undermine the ability of professionals who must work from
|
|||
|
their residence, and that public hearing testimony in Ohio
|
|||
|
resounded with consumer objections to disclosure of non-published
|
|||
|
numbers.
|
|||
|
|
|||
|
34. Most commenters do not advocate completely unrestricted
|
|||
|
delivery. Even those commenters that advocate unrestricted
|
|||
|
delivery suggest a limitation on availability of the CPN under
|
|||
|
specific circumstances. In light of the extensive record before
|
|||
|
us, we conclude that a regulatory framework for interstate CPN-
|
|||
|
based services such as caller ID should include some type of
|
|||
|
privacy protection mechanism. We affirm our prior tentative
|
|||
|
conclusion that the calling public has an interest in exercising
|
|||
|
a measure of control over the dissemination of telephone numbers
|
|||
|
that must be reflected in federal policies governing caller ID
|
|||
|
service. We discuss specific privacy mechanisms in Section E
|
|||
|
below.
|
|||
|
|
|||
|
35. Private Networks, Emergency Services, and Law
|
|||
|
Enforcement. AT&T proposes that there should be no blocking
|
|||
|
mechanisms prescribed for private or virtual private networks
|
|||
|
because blocking on business services and on private networks
|
|||
|
would intrude on the rights of private and virtual private
|
|||
|
network owners to determine the amount of information delivered
|
|||
|
on internal calls carried on their networks. AT&T and GTE concur
|
|||
|
that business services do not commonly implicate personal safety
|
|||
|
concerns and in a business context, identification is expected.
|
|||
|
The NPRM sought comment on whether blocking mechanisms jeopardize
|
|||
|
calling party identification by emergency services. USCG states
|
|||
|
that blocking mechanisms should not apply to calls made to
|
|||
|
emergency telephone numbers because they could degrade emergency
|
|||
|
service operations. Pacific Bell notes that emergency services
|
|||
|
could be affected where an individual calling line identification
|
|||
|
display device is being used in place of the standard public
|
|||
|
safety answering point console arrangement.
|
|||
|
|
|||
|
36. In the NPRM, we proposed that the privacy requirements
|
|||
|
adopted herein to address the privacy concerns within the public
|
|||
|
network should not apply to communications within private or
|
|||
|
virtual private networks. We affirm that privacy expectations of
|
|||
|
the calling party are different when they arise in the context of
|
|||
|
internal calls within a single private network. Moreover,
|
|||
|
commenters did not dispute that caller ID systems raise very
|
|||
|
limited privacy expectations if used solely in connection with
|
|||
|
legally authorized call tracing and trapping procedures
|
|||
|
specifically requested by a law enforcement agency. We do not
|
|||
|
apply the privacy requirements adopted in this order to these
|
|||
|
narrow sets of circumstances.
|
|||
|
|
|||
|
37. The record indicates that blocking mechanisms do not
|
|||
|
affect Enhanced 911 services, which currently locate the calling
|
|||
|
party on emergency calls via ANI rather than SS7-based caller ID
|
|||
|
services, which include blocking mechanisms. However, as
|
|||
|
indicated by USCG and Pacific Bell, blocking mechanisms may
|
|||
|
jeopardize emergency services which rely on caller ID and thus
|
|||
|
pose a serious threat to public health and safety. To the
|
|||
|
extent that CPN based services are used to deliver emergency
|
|||
|
services, we find that privacy requirements for CPN based
|
|||
|
services should not apply to delivery of the CPN to a public
|
|||
|
agency's emergency line, a poison control line, or in conjunction
|
|||
|
with 911 emergency services. We now turn to specific privacy
|
|||
|
protection mechanisms for assuring that the interstate public
|
|||
|
network includes a privacy protection option.
|
|||
|
|
|||
|
|
|||
|
E. Privacy Protection Mechanisms, Further Notice of
|
|||
|
Proposed
|
|||
|
Rulemaking.
|
|||
|
|
|||
|
38. The three privacy protection mechanisms prevalent at
|
|||
|
the state level are (1) per line blocking provided by the
|
|||
|
telephone company for specific groups (2) per line blocking
|
|||
|
provided by the telephone company for all customers except those
|
|||
|
who want their telephone numbers to be delivered, and (3) per
|
|||
|
call blocking on an automatic or operator assisted basis.
|
|||
|
Additionally, these options can be offered in combination and
|
|||
|
free to the user or on a fee basis. In the NPRM, we sought
|
|||
|
comment on and analysis of the relative merits, technical
|
|||
|
feasibility and foreseeable costs to carriers and customers of
|
|||
|
establishing a requirement that interstate caller ID incorporate
|
|||
|
a per call blocking option. The record demonstrates ample
|
|||
|
support for the adoption of an automatic per call blocking
|
|||
|
requirement on interstate caller ID offerings. We discuss each
|
|||
|
alternative below and affirm the tentative conclusion reached in
|
|||
|
the NPRM that carrier provided per line blocking mechanisms are
|
|||
|
unduly burdensome. We affirm that automatic per call blocking is
|
|||
|
the most responsive alternative to the needs of calling and
|
|||
|
called parties for interstate calls. Finally, we request comment
|
|||
|
on whether, and how, these policies should apply to other
|
|||
|
services, such as delivery of the calling party name.
|
|||
|
|
|||
|
39. Per Line Blocking for Specific Groups. Pennsylvania
|
|||
|
PUC states that per call blocking should be available to all
|
|||
|
subscribers, but free per line blocking should be made available
|
|||
|
to groups that demonstrate a higher privacy need than the
|
|||
|
population at large. These groups include non-profit, tax-exempt
|
|||
|
domestic violence agencies; home telephone numbers of staff
|
|||
|
members of such agencies; federal, state and local law
|
|||
|
enforcement; and individuals who have a need for blocking to
|
|||
|
mitigate the risk of personal injury, as certified by a law
|
|||
|
enforcement agency. MCI proposes a limited blocking option to
|
|||
|
protect public safety groups. US West states that its experience
|
|||
|
with free per line blocking for "special needs" subscribers
|
|||
|
proved cumbersome and unfair because US West is uncomfortable
|
|||
|
with determining what groups or individuals have special needs.
|
|||
|
|
|||
|
40. Commenters that advocate the availability of per line
|
|||
|
blocking only for certain groups with heightened privacy needs do
|
|||
|
not address how this mechanism would be implemented on an
|
|||
|
interstate basis. The two entities that could determine
|
|||
|
eligibility for privacy protection under this proposal would be
|
|||
|
the carriers or the government. If the choice is left to the
|
|||
|
carrier or carriers offering interstate caller ID, the carrier
|
|||
|
must determine which individual subscribers are entitled to
|
|||
|
privacy protection. Issues that arise in this determination
|
|||
|
include: Do certain types of law enforcement personnel have
|
|||
|
greater needs than others? Do domestic violence shelters have
|
|||
|
greater needs than teenage runaway facilities? Do individuals
|
|||
|
who work for these organizations have needs? How would these
|
|||
|
individuals be identified? How would determinations be kept
|
|||
|
current? What appeal rights would be available? These social
|
|||
|
questions are generally not the type of issues resolved by
|
|||
|
carriers. We conclude, on the basis of this record, that per
|
|||
|
line blocking for a special needs category as a federal model is
|
|||
|
not optimal. It would unnecessarily increase the role of the
|
|||
|
federal government or carriers in making privacy choices for
|
|||
|
subscribers. Other regulatory alternatives to address privacy
|
|||
|
are available on a more equitable basis and do not unduly hamper
|
|||
|
the viability of CPN based services.
|
|||
|
|
|||
|
41. Per Line Blocking Available to All Subscribers.
|
|||
|
Consumer Action contends that the only way to ensure that all
|
|||
|
residential customers do not involuntarily deliver their numbers
|
|||
|
to caller ID equipment is to require availability of per line
|
|||
|
blocking. Consumer Action supports its argument that per line
|
|||
|
blocking would not undercut the usefulness of caller ID by citing
|
|||
|
Centel's statement that, after 6 months of offering caller ID
|
|||
|
with a per line blocking option, there was no substantial
|
|||
|
decrease in individuals subscribing to caller ID. Missouri
|
|||
|
Counsel states that the absence of free per line blocking
|
|||
|
effectively eliminates the protection that unlisted numbers
|
|||
|
provide.
|
|||
|
|
|||
|
42. DMA asserts that per line blocking would drive up the
|
|||
|
cost of service and further, that if per line blocking becomes
|
|||
|
widespread, direct marketers may be unable to use caller ID
|
|||
|
service for a substantial segment of their customer base, and
|
|||
|
smaller businesses may find the service unattractive. Rochester
|
|||
|
notes that in a survey it conducted, 66% of respondents made 75%
|
|||
|
of their calls to people who already knew their telephone number,
|
|||
|
and 83% made at least 50% of their calls to people who knew their
|
|||
|
number. Rochester concludes that per line blocking is only
|
|||
|
marginally useful and substantially degrades the value of caller
|
|||
|
ID by causing unnecessary blocked calls. USTA concurs that in
|
|||
|
the vast majority of calls, identification of the calling number
|
|||
|
is of little consequence to the calling party. AT&T points out
|
|||
|
that per line blocking destroys the lifesaving potential of
|
|||
|
caller ID for line blocked callers of emergency numbers such as
|
|||
|
police stations because a caller in distress may forget how to
|
|||
|
use the unblocking code.
|
|||
|
|
|||
|
43. In the NPRM, we tentatively concluded that per line
|
|||
|
blocking unduly burdens calling party number based services
|
|||
|
overall by failing to limit its applicability to those calls for
|
|||
|
which privacy is of concern to the caller. The Commission noted
|
|||
|
that even in the case of law enforcement personnel, there may be
|
|||
|
a need to maintain calling number privacy on some calls, but that
|
|||
|
the same number may be used to telephone other law enforcement
|
|||
|
personnel, victims of crimes, cooperative witnesses, and family
|
|||
|
or friends. The Commission asserted that in these types of
|
|||
|
calls, calling number privacy is not needed and calling number
|
|||
|
identification can actually be a valuable piece of information
|
|||
|
for both the caller and called parties. The record reflects the
|
|||
|
useful nature of CPN based services, and the comments of
|
|||
|
Rochester illustrate that callers are likely to be interested in
|
|||
|
blocking only a small percentage of their calls. The comments of
|
|||
|
USCG illustrate the usefulness of caller ID to emergency
|
|||
|
services. In contrast, Missouri Counsel's analogy to unlisted
|
|||
|
numbers is inapposite because caller ID only permits parties
|
|||
|
called by the calling party to capture the calling party number,
|
|||
|
and then only if the calling party has not activated a per call
|
|||
|
blocking mechanism. We find that the availability of per call
|
|||
|
unblocking does not cure the ill effects of per line blocking.
|
|||
|
Moreover, in an emergency, a caller is not likely to remember to
|
|||
|
dial or even to know to dial an unblocking code. For the
|
|||
|
foregoing reasons, we find that a federal per line blocking
|
|||
|
requirement for interstate CPN based services, including caller
|
|||
|
ID, is not the best policy choice of those available to recognize
|
|||
|
the privacy interests of callers. Thus, carriers may not offer
|
|||
|
per line blocking as a privacy protection mechanism on interstate
|
|||
|
calls. We agree that certain uses of captured calling numbers
|
|||
|
need to be controlled, and address that issue infra.
|
|||
|
|
|||
|
44. Operator Assisted Per Call Blocking. There is little
|
|||
|
support in the record for operator assisted per call blocking.
|
|||
|
Live operator assisted blocking may have a chilling effect on
|
|||
|
callers who do not choose to disclose the calling number.
|
|||
|
Dialing three additional digits to invoke privacy as is required
|
|||
|
with automatic per call blocking is much less cumbersome to the
|
|||
|
caller than having to connect to a live operator and explain that
|
|||
|
the caller wishes to place an anonymous call. The practical
|
|||
|
effect of a system of operator assisted blocking appears to be
|
|||
|
that privacy is not invoked, based on the Canadian experience
|
|||
|
wherein out of one million calls, only two were blocked. We
|
|||
|
also note that live operator assisted blocking was not envisioned
|
|||
|
as part of the technology of caller ID during the SS7 standards
|
|||
|
setting process. The ANSI and Bellcore standards contemplate
|
|||
|
automatic per call or per line blocking. If the advanced
|
|||
|
technology of the network is capable of sustaining an automated
|
|||
|
blocking function, it is not in the public interest to ignore the
|
|||
|
technology and require less efficient, more cumbersome live
|
|||
|
operator assistance.
|
|||
|
|
|||
|
45. Automatic Per Call Blocking. Under this approach, a
|
|||
|
caller dials a three digit code, e.g. *67 (or 1167 for rotary or
|
|||
|
pulse-dialing phones), to indicate that the calling number should
|
|||
|
be blocked. The majority of commenters supporting a per call
|
|||
|
blocking system advocate an automatic free per call method. For
|
|||
|
example, the Ad Hoc Users and NTIA state that per call blocking
|
|||
|
best balances the privacy interests of both the calling and the
|
|||
|
called party. Although Bell Atlantic opposes blocking, it states
|
|||
|
that if the Commission decides to require blocking, per call
|
|||
|
rather than per line should be adopted. The IIA notes that
|
|||
|
several states already require free per call blocking. Further,
|
|||
|
IIA proposes that the Commission take into account that consumer
|
|||
|
expectations have solidified on this issue.
|
|||
|
|
|||
|
46. We agree with the majority of commenters that
|
|||
|
availability of automatic per call blocking best addresses the
|
|||
|
privacy needs of both the calling and called parties. We note
|
|||
|
that the majority of jurisdictions using this method on a local
|
|||
|
basis are using *67 (or 1167 for rotary or pulse-dialing phones)
|
|||
|
as the dialing digits and we adopt the same dialing method in our
|
|||
|
interstate rules. As discussed in the NPRM, a regulatory
|
|||
|
approach to privacy should not be so burdensome to the service
|
|||
|
that it destroys its value and thus fails to take into account
|
|||
|
the privacy needs of the called party. Per line blocking has
|
|||
|
this effect. On the other hand, a blocking mechanism should not
|
|||
|
be so difficult to invoke as to fail to recognize the legitimate
|
|||
|
privacy concerns of some callers. Operator assisted blocking has
|
|||
|
this effect. The best balance for the competing interests of the
|
|||
|
calling and called parties is automatic per call blocking. The
|
|||
|
option of dialing a few additional numbers to invoke privacy when
|
|||
|
privacy is sought is a beneficial service that should be
|
|||
|
available to consumers. Similarly, caller ID is beneficial to
|
|||
|
the called party who should be able to receive the calling party
|
|||
|
number in all instances where identification of the calling
|
|||
|
number is of no consequence to the caller or where the caller may
|
|||
|
desire identification.
|
|||
|
|
|||
|
47. The rules require per call blocking as the model for
|
|||
|
privacy protection on interstate calls. As a matter of
|
|||
|
simplicity and uniformity, per call blocking allows callers to
|
|||
|
travel from phone to phone and make an informed privacy decision.
|
|||
|
|
|||
|
Per line blocking may create caller confusion when a caller
|
|||
|
places a call from a phone over which the caller may be uncertain
|
|||
|
whether it is equipped with per line blocking. It appears that
|
|||
|
some carriers offering per call unblocking together with per line
|
|||
|
blocking use the same *67 code both for unblocking presubscribed
|
|||
|
privacy lines and for blocking lines that are not pre-blocked.
|
|||
|
Thus, a caller may inadvertently disable privacy protection by
|
|||
|
dialing *67 (or 1167 for rotary or pulse-dialing phones) to
|
|||
|
invoke privacy from a phone that is already subscribed to per
|
|||
|
line blocking. A per call blocking system avoids this unintended
|
|||
|
result and allows callers to make decisions according to the
|
|||
|
unique calling circumstances of each call. Automatic per call
|
|||
|
blocking is easily used on a ubiquitous interstate basis, and
|
|||
|
eliminates customer confusion.
|
|||
|
|
|||
|
48. Our objective in this proceeding is to establish
|
|||
|
federal policies governing the passage by carriers of CPN on
|
|||
|
interstate calls. We believe carriers should provide callers the
|
|||
|
option of withholding their numbers from called parties on a per
|
|||
|
call basis. It is important to note, however, that consumer
|
|||
|
choice is not limited to the options provided by carriers.
|
|||
|
Various companies have registered with the Commission, under
|
|||
|
provisions of Part 68 of our rules, equipment that, for example,
|
|||
|
automatically would insert a blocking prefix on each call going
|
|||
|
out over a particular line. Such devices are available for as
|
|||
|
little as $40.00 per unit. We believe general interstate passage
|
|||
|
of CPN throughout the telephone network, except in those
|
|||
|
individual circumstances where privacy is important to the
|
|||
|
calling party, promises important efficiency and productivity
|
|||
|
gains for our economy. However, individuals wishing to install
|
|||
|
these devices and thereby screen all originating interstate calls
|
|||
|
may elect to do so. Such a choice may create caller confusion
|
|||
|
if others entitled to use the line are unaware of the purpose of
|
|||
|
the device, or may place health and safety at risk if the device
|
|||
|
conceals the calling party's location or identity from emergency
|
|||
|
services, but these are not harms to the network. Requiring
|
|||
|
callers seeking universal blocking to purchase such devices,
|
|||
|
however, ensures this choice is not made lightly.
|
|||
|
|
|||
|
49. The majority of commenters supporting per call blocking
|
|||
|
also propose that per call blocking be free to the calling party.
|
|||
|
|
|||
|
We note that this is in keeping with the blocking policies
|
|||
|
adopted by the majority of states for intrastate calls. Per
|
|||
|
call blocking capability is an inherent capability of SS7
|
|||
|
technology. The design of caller ID contemplates the use of
|
|||
|
software programs that permit either a customer to activate a
|
|||
|
"block" on any particular call, or the central office to activate
|
|||
|
a block on the line. In no circumstance is the information
|
|||
|
actually "blocked" from the carrier; the terminating central
|
|||
|
office will receive the calling number. In addition, on all
|
|||
|
interstate calls handled by SS7, the call setup message contains
|
|||
|
a calling party number parameter that includes a privacy
|
|||
|
indicator. Under our rules, this "privacy flag" travels with the
|
|||
|
call setup message through to the destination central office of
|
|||
|
the terminating carrier. Thus, there are no significant
|
|||
|
additional SS7 costs associated with per call blocking. Several
|
|||
|
commenters note that there are costs associated with populating
|
|||
|
the privacy flag at the originating end and reading it and
|
|||
|
passing it on to the subscriber at the terminating end. Our
|
|||
|
requirement that carriers transmit CPN includes the provision of
|
|||
|
per call blocking capability at the originating end and of
|
|||
|
facilities that read and honor the privacy indicator at
|
|||
|
terminating end. Any blocking costs can be readily absorbed
|
|||
|
because the calling party number and privacy flag are integral
|
|||
|
elements of SS7. Moreover, we find that charging the caller for
|
|||
|
per call blocking beyond the costs of deploying SS7 would disrupt
|
|||
|
the balance that per call blocking establishes between the
|
|||
|
privacy interests of the caller and called party. Charging for
|
|||
|
per call blocking heightens the burden upon the caller to invoke
|
|||
|
privacy and does not appear to be necessary for the overall
|
|||
|
viability of the service.
|
|||
|
|
|||
|
50. Applicability to Additional Services. In addition to
|
|||
|
calling party number delivery, SS7 technology permits delivery of
|
|||
|
calling party name via an optional parameter that is separate
|
|||
|
from the calling party number parameter. We tentatively
|
|||
|
conclude that our policies for calling party number delivery
|
|||
|
should apply equally to services delivering calling party name,
|
|||
|
and we seek comment on this tentative conclusion. Commenters
|
|||
|
should address any differences that may exist in the privacy
|
|||
|
considerations that apply to calling party name delivery as
|
|||
|
opposed to calling party number delivery. Commenters should also
|
|||
|
address whether the policies for subscriber privacy should extend
|
|||
|
to other services, such as services that permit subscribers to
|
|||
|
automatically return calls or to selectively forward calls.
|
|||
|
|
|||
|
|
|||
|
F. ANI and Caller Privacy.
|
|||
|
|
|||
|
51. In the NPRM the Commission noted that interstate ANI,
|
|||
|
or its SS7 equivalent "charge number" parameter, already
|
|||
|
identifies the billing number of a call to interstate subscribers
|
|||
|
of ANI service, and is used by the LECs and IXCs for billing
|
|||
|
purposes. IXCs, however, sometimes deliver ANI to 800 and 900
|
|||
|
service subscribers via a dedicated line. The NPRM requested
|
|||
|
comment on whether there are privacy interests associated with
|
|||
|
the transmission of ANI to 800 and 900 service subscribers or
|
|||
|
information service providers, and if so, what approaches should
|
|||
|
be considered to address the issue. The Commission noted that
|
|||
|
one possible approach would be to require businesses to obtain
|
|||
|
the consent of the caller before revealing the caller's telephone
|
|||
|
number to any third party. In this order we adopt such an
|
|||
|
approach.
|
|||
|
|
|||
|
52. The majority of commenters conclude that it is not
|
|||
|
technically feasible to block identification of ANI-based
|
|||
|
interstate calling number in the same way as SS7-based calling
|
|||
|
party number because it is the billing number that LECs must
|
|||
|
provide to IXCs. Allnet proposes that LECs be required to
|
|||
|
provide a privacy indicator with ANI. AT&T notes that ANI or the
|
|||
|
SS7 equivalent "Charge Number" do not currently have a privacy
|
|||
|
indicator that would signal the terminating carrier to block the
|
|||
|
passing of the billing telephone number to the called party.
|
|||
|
AT&T concludes that blocking requirements adopted by the
|
|||
|
Commission should not extend to the delivery of ANI. Nynex notes
|
|||
|
that under its SS7 interconnection tariff, in those cases where
|
|||
|
the billing number and the CPN are the same, the calling party
|
|||
|
number parameter will provide the billing number and the charge
|
|||
|
number will not be sent. Nynex adds that, where there is a
|
|||
|
difference between the billing number and the calling party
|
|||
|
number, the charge number parameter will provide the billing
|
|||
|
number.
|
|||
|
|
|||
|
53. Citicorp contends that proposals to limit the use of
|
|||
|
ANI are contrary to the Communications Act's purpose of promoting
|
|||
|
new telecommunications technologies. Illinois CC states that ANI
|
|||
|
is needed to promote competition, and to restrict the use of ANI
|
|||
|
in any way would undermine this policy goal. Ad Hoc Users,
|
|||
|
ARINC, and Citicorp identify many beneficial uses of ANI
|
|||
|
transmission. Ad Hoc Users adds that these significant
|
|||
|
benefits are unfairly characterized by NYS Law as a "plague of
|
|||
|
unsolicited marketing calls." It notes that prohibiting
|
|||
|
transmission of ANI would shut down existing ANI applications and
|
|||
|
would not allow new applications until SS7 interconnection of
|
|||
|
LECs with IXCs is almost ubiquitous.
|
|||
|
54. IIA states that because the transmission of ANI cannot
|
|||
|
be blocked, the focus must shift from whether the called party
|
|||
|
receives it to how the recipient uses the data. It states that
|
|||
|
questions presented by use of ANI data are transitional and ANI
|
|||
|
subscribers can be expected to migrate to SS7-based caller ID.
|
|||
|
In the meantime, IIA proposes the Commission rely upon voluntary
|
|||
|
and industry initiated efforts to explain to consumers how
|
|||
|
information about them is gathered and used. NARUC argues that
|
|||
|
denying commercial ANI purchasers the information ANI provides
|
|||
|
will give carriers an incentive to expedite development of CPN
|
|||
|
based services. Baer, Colorado DVC, Consumer Action, Michigan
|
|||
|
PSC, and others suggest that if the Commission allows for either
|
|||
|
per line or per call blocking, then it should also restrict the
|
|||
|
availability of ANI exclusively to LECs and IXCs. NTIA
|
|||
|
recommends that the Commission direct interested carriers and
|
|||
|
manufacturers to report on the modifications needed to implement
|
|||
|
caller blocking of ANI to the called party and formulate a plan
|
|||
|
for so modifying existing ANI over a period of years. Sprint
|
|||
|
concurs that ANI should be subject to privacy indicators, insofar
|
|||
|
as technology permits.
|
|||
|
|
|||
|
55. Unlike the privacy indicator that can be placed on the
|
|||
|
calling party number with respect to caller ID, the calling party
|
|||
|
cannot place a privacy flag on ANI or its SS7-based equivalent,
|
|||
|
the charge number parameter. Therefore, some parties suggest
|
|||
|
that the availability of ANI be restricted exclusively to LECs
|
|||
|
and IXCs, and should not be passed on to 800 and 900 service
|
|||
|
subscribers for billing, routing, or other purposes. Other
|
|||
|
commenters respond, however, that ANI is needed to sustain
|
|||
|
beneficial services currently offered.
|
|||
|
|
|||
|
56. We conclude that the public interest would be served by
|
|||
|
continuing to permit telephone companies to deliver ANI to 800,
|
|||
|
900, and other business subscribers who pay for transmission of
|
|||
|
the call. ANI has been available to these end users without a
|
|||
|
privacy mechanism for several years and, as indicated above, has
|
|||
|
spurred a multitude of beneficial applications. While we are
|
|||
|
concerned that callers' reasonable expectation of privacy not be
|
|||
|
violated, we do not believe that the public would be served by
|
|||
|
terminating all access to ANI by subscribers to 800 and 900-type
|
|||
|
services. Ad Hoc Users points out that ANI service permits the
|
|||
|
receipt of calling numbers in real time but would not usually
|
|||
|
provide information beyond that which such subscribers will
|
|||
|
receive in any event on their telephone company bills because the
|
|||
|
called party pays for the call. It states that such realtime
|
|||
|
provision of ANI benefits calling parties by permitting a number
|
|||
|
of substantial customer service enhancements.
|
|||
|
|
|||
|
57. In weighing these various public interest concerns, we
|
|||
|
are aware that the continued deployment of SS7 throughout the
|
|||
|
telephone networks makes available a blockable alternative to
|
|||
|
ANI. However, where the called party pays for the interstate
|
|||
|
call (e.g., 800 and 900 service subscribers), the situation is
|
|||
|
somewhat analogous to a collect call regarding expectations of
|
|||
|
confidentiality by the calling party. We believe the best
|
|||
|
approach is to require education by the carriers (see Section G,
|
|||
|
infra) and to restrict how 800 and 900-type service subscribers
|
|||
|
may use ANI data. Resale of the ANI number to create marketing
|
|||
|
lists or other information about callers without their consent
|
|||
|
has generated much of the opposition to the availability of ANI.
|
|||
|
Bills to restrict such practices have been introduced in Congress
|
|||
|
and commenters in this proceeding have addressed the implications
|
|||
|
of unrestricted availability of information about callers.
|
|||
|
Colorado DVC, NTIA, and others urge the Commission to prohibit
|
|||
|
the resale or use of ANI for uses other than call management,
|
|||
|
billing, or customer services employed directly by the subscriber
|
|||
|
to ANI end user services. To address these privacy concerns, we
|
|||
|
prohibit the reuse or sale of ANI information by 800, 900, and
|
|||
|
other service subscribers absent affirmative subscriber consent.
|
|||
|
We permit the use of ANI for call management and routing
|
|||
|
functions.
|
|||
|
|
|||
|
58. Concerns also have been expressed regarding the use of
|
|||
|
ANI by 800 and 900-type service subscribers for solicitation.
|
|||
|
For example, ANI can be used to place return calls to telephone
|
|||
|
customers who previously have contacted an ANI 800 or 900-type
|
|||
|
services subscriber. In this regard, Nynex proposes that use of
|
|||
|
ANI be limited to performing and verifying transactions requested
|
|||
|
by the caller. ARINC, on the other hand, argues that such a
|
|||
|
restriction would diminish too severely the value of ANI for
|
|||
|
businesses and customers. We conclude that an ANI services
|
|||
|
subscriber may use ANI to offer products or services to an
|
|||
|
established customer that are directly related to products or
|
|||
|
services previously provided by the ANI services subscriber to
|
|||
|
that customer. ANI services subscribers may also wish to
|
|||
|
compile ANI information in an aggregate form, either to improve
|
|||
|
operations or as a marketing tool. Our rules permit disclosure
|
|||
|
of ANI information in aggregate form if it is compiled in a
|
|||
|
manner which precludes identification of individual telephone
|
|||
|
subscribers.
|
|||
|
|
|||
|
G. Subscriber Education, Further Notice of Proposed
|
|||
|
Rulemaking.
|
|||
|
|
|||
|
59. In the NPRM, the Commission stated that carriers
|
|||
|
offering calling party number, or facilitating transmission of
|
|||
|
interstate caller ID, should be required to inform callers of the
|
|||
|
availability of the service, including instructing callers how to
|
|||
|
implement any caller privacy mechanisms. The Commission noted
|
|||
|
that no segment of the calling public can adequately control
|
|||
|
dissemination of the calling number under any regulatory
|
|||
|
structure if they are unaware that their calling number is being
|
|||
|
identified. The majority of commenters agreed that subscriber
|
|||
|
education is in the public interest and should be implemented
|
|||
|
with the introduction of interstate calling party number based
|
|||
|
services, including caller ID. Commenters also expressed concern
|
|||
|
over the education of callers whose numbers are identified via
|
|||
|
ANI-based services.
|
|||
|
|
|||
|
60. We affirm our tentative conclusion that deployment of
|
|||
|
interstate calling party number services should be accompanied by
|
|||
|
consumer education regarding the availability of identification
|
|||
|
services and how to invoke the privacy protection mechanism. The
|
|||
|
record indicates that consumer information is essential to public
|
|||
|
understanding of any privacy mechanisms associated with caller
|
|||
|
identification services. Accordingly, we amend our rules to
|
|||
|
require that carriers participating in the offering of services
|
|||
|
that deliver calling party number, including ANI or charge
|
|||
|
number, on interstate calls must notify their subscribers that
|
|||
|
their telephone numbers may be transmitted to a called party.
|
|||
|
In addition, such carriers must inform their subscribers of the
|
|||
|
privacy mechanism available on interstate calls, and must explain
|
|||
|
how subscribers can activate the privacy mechanism. Even though
|
|||
|
the ability of the caller to activate a privacy flag is not yet
|
|||
|
ubiquitous on calls to ANI or charge number services subscribers,
|
|||
|
ANI or charge number services increasingly are offered through
|
|||
|
SS7 networks, and an education effort will be most effective if
|
|||
|
it anticipates the greater availability of a privacy flag. For
|
|||
|
ANI or charge number services for which such privacy is not
|
|||
|
provided, the notification must inform telephone customers of the
|
|||
|
restrictions on the reuse or sale of subscriber information. We
|
|||
|
specifically request further comment on whether we should
|
|||
|
prescribe detailed instructions regarding what form education
|
|||
|
should take or prescribe more precisely responsibilities of
|
|||
|
various carriers. We are particularly interested in specific
|
|||
|
joint industry education proposals (see comments of IIA, supra,
|
|||
|
para. 54).
|
|||
|
|
|||
|
H. CPNI and Subscriber Privacy.
|
|||
|
|
|||
|
61. Privacy issues are also raised by telephone companies'
|
|||
|
use of customer proprietary network information, or CPNI. The
|
|||
|
Commission's current CPNI rules govern the BOCs' use of CPNI in
|
|||
|
marketing enhanced services and CPE. The CPNI rules are
|
|||
|
designed to balance considerations of customer privacy,
|
|||
|
efficiency, and competitive equity. In recent months, however,
|
|||
|
the communications industry has witnessed large local exchange
|
|||
|
carriers' planning and entering into alliances, acquisitions, and
|
|||
|
mergers with non-telephone company partners. In this changing
|
|||
|
environment, access to CPNI among affiliated companies may
|
|||
|
heighten concerns. Thus, we will seek further comment from the
|
|||
|
public on whether the existing CPNI safeguards will adequately
|
|||
|
meet customers' reasonable privacy expectations in the future.
|
|||
|
The CPNI rules are currently under reconsideration in the
|
|||
|
Computer III Remand Proceeding, and the privacy concerns related
|
|||
|
to CPNI are more appropriately addressed in that proceeding.
|
|||
|
Therefore, we are releasing a public notice in CC Docket No. 90-
|
|||
|
623 seeking further comment, particularly on the issue of
|
|||
|
residential and small business customers' CPNI-related privacy
|
|||
|
concerns.
|
|||
|
|
|||
|
|
|||
|
I. Wiretap Statutes and Caller ID.
|
|||
|
|
|||
|
62. In the NPRM, the Commission noted that some parties
|
|||
|
suggest that caller ID may violate the Federal Wiretap Act
|
|||
|
(Wiretap Act), 18 U.S.C. 3121-3127 or the Electronic
|
|||
|
Communications Privacy Act (ECPA), 18 U.S.C. 2511. Colorado
|
|||
|
DVC, DC OPC, NASUCA, and Ohio OCC reiterate this contention.
|
|||
|
Other commenters such as Allnet, Bell Atlantic, Ameritech, and
|
|||
|
AT&T argue that caller ID is permissible under ECPA or the
|
|||
|
consent provisions of the Wiretap Act as "trap and trace"
|
|||
|
devices. Pacific adds that caller ID is not the type of activity
|
|||
|
that Congress intended to include in ECPA. Pacific points out
|
|||
|
that trap and trace laws are designed to prevent surreptitious
|
|||
|
wiretaps by the police and other parties and caller ID is not
|
|||
|
such a wiretap because it is a tariffed service offered uniformly
|
|||
|
and publicly to all customers.
|
|||
|
|
|||
|
63. In accordance with its statement in the NPRM that it
|
|||
|
would solicit the views and analysis of the Department of
|
|||
|
Justice, the Commission's General Counsel requested the
|
|||
|
Department of Justice's opinion on the issue. In its reply
|
|||
|
memorandum, the Department of Justice (DOJ) concludes that the
|
|||
|
federal wiretap statutes embodied in the Federal Criminal Code do
|
|||
|
not pose a barrier to interstate caller ID service. We adopt the
|
|||
|
Department's analysis and conclusions on this issue, and are
|
|||
|
incorporating the Department's memorandum into this Report and
|
|||
|
Order. See Appendix D.
|
|||
|
|
|||
|
|
|||
|
J. Relationship between Interstate and Intrastate Caller
|
|||
|
ID.
|
|||
|
|
|||
|
64. In the NPRM, the Commission sought comment on whether
|
|||
|
state policies concerning calling party number based services,
|
|||
|
including caller ID, negate or hinder the development of
|
|||
|
interstate caller ID, ANI, or both. In analyzing whether
|
|||
|
interstate and intrastate models may coexist harmoniously both
|
|||
|
legally and technologically, the Commission did not propose to
|
|||
|
preempt any specific state regulation governing intrastate caller
|
|||
|
ID. Rather, we found that it is necessary to review existing
|
|||
|
state policies individually in order to determine whether
|
|||
|
preemption is necessary. Many commenters, including AT&T, GTE,
|
|||
|
and MCI, propose that the Commission use its authority to preempt
|
|||
|
the states if state regulations impede interstate caller ID
|
|||
|
offerings. Pacific concurs that the Commission may preempt state
|
|||
|
regulation of caller ID because the service is not separable into
|
|||
|
interstate and intrastate portions and state regulation
|
|||
|
frustrates a valid federal policy.
|
|||
|
|
|||
|
65. Some commenters, including Ameritech, Sprint, Bell
|
|||
|
Atlantic, and BellSouth, contend that the terminating carrier
|
|||
|
should be required to honor any blocking indicators that are
|
|||
|
present on interstate calls on a per call basis. BellSouth
|
|||
|
proposes that the Commission should defer to each state's
|
|||
|
determination of blocking options available for calls originating
|
|||
|
in that state. Some commenters, including Colorado DVC,
|
|||
|
Connecticut, and Consumer Action, concur that the Commission
|
|||
|
should defer to state policies on blocking because state
|
|||
|
regulators are more attuned to local factors including history,
|
|||
|
culture, custom and legal environment. State commenters,
|
|||
|
including Indiana Utility Counsel, Illinois CC, and Missouri PSC,
|
|||
|
contend that preemption is unwarranted and untimely because
|
|||
|
states should be able to develop standards that provide more, but
|
|||
|
not less privacy protection to consumers. NARUC argues that
|
|||
|
preempting state caller ID policies is inappropriate from both a
|
|||
|
legal and policy perspective. NARUC proposes that the Commission
|
|||
|
devise a plan that carries out federal objectives but can
|
|||
|
substantially coexist with various state blocking plans. Some
|
|||
|
commenters concur with NARUC and contend that federal and state
|
|||
|
rules can coexist.
|
|||
|
|
|||
|
66. Many commenters, including AT&T and Pacific, contend
|
|||
|
that existing technology renders it infeasible for carriers to
|
|||
|
comply with one set of blocking requirements for intrastate and a
|
|||
|
different set of standards for interstate caller ID. Allnet,
|
|||
|
NTI, and Bell Atlantic contend that privacy standards should
|
|||
|
apply to intrastate, interstate and international communications
|
|||
|
and that different standards would require more complex
|
|||
|
equipment. Specifically, Bell Atlantic asserts that substantial
|
|||
|
development and expense over several years would be necessary to
|
|||
|
accommodate differing interstate and intrastate standards.
|
|||
|
|
|||
|
67. Nynex, USTA, and SNET contend that different state and
|
|||
|
federal policies on caller ID create caller confusion, and that a
|
|||
|
uniform national policy for caller ID would minimize consumer
|
|||
|
confusion. The California PUC proposes that the Commission, if
|
|||
|
it allows interstate caller ID, should not preempt more
|
|||
|
restrictive state privacy protections adopted for intrastate
|
|||
|
caller ID, and instead should defer to the more restrictive
|
|||
|
requirements in each of the states.
|
|||
|
|
|||
|
68. As is discussed in Section A, supra, interstate passage
|
|||
|
of calling party number serves the public interest by making it
|
|||
|
possible for telecommunications service providers to offer
|
|||
|
beneficial new communications services that directly and
|
|||
|
indirectly can increase the business sector's efficiency and
|
|||
|
residential customers' access to information and other services.
|
|||
|
In this proceeding we will require carriers having SS7 capability
|
|||
|
to transmit CPN to interconnecting carriers. Recognizing that
|
|||
|
there may be situations in which the calling party wishes to
|
|||
|
preserve privacy, we establish *67 (and 1167 for rotary or pulse-
|
|||
|
dialing phones) as the mechanism by which this may be done on
|
|||
|
interstate calls. Carriers must honor a caller's choice to use
|
|||
|
this blocking mechanism. These policies strike a reasonable
|
|||
|
balance among significant competing interests, including
|
|||
|
reasonable privacy expectations and economic growth. Our
|
|||
|
approach ensures that the privacy rights of the caller are not
|
|||
|
unreasonably infringed upon by the policies of the state where
|
|||
|
the call terminates (in those states offering unlimited caller ID
|
|||
|
a blocking request from another state might not otherwise be
|
|||
|
honored) nor are the concerns of the called party unreasonably
|
|||
|
infringed upon by the policies of the state where the call
|
|||
|
originates (unqualified, free per line blocking likely would
|
|||
|
significantly increase the number of blocked interstate calls).
|
|||
|
|
|||
|
69. We are sensitive to states' interests in protecting the
|
|||
|
privacy of their residents, but note that limited preemption of
|
|||
|
state regulations is necessary in some instances to ensure that
|
|||
|
our goal of facilitating the development of interstate calling
|
|||
|
party number based services is not frustrated by inconsistent
|
|||
|
state law, and that state decisions with respect to caller ID or
|
|||
|
other calling party number based services do not infringe upon
|
|||
|
the privacy interests of parties in other states. Accordingly,
|
|||
|
we preempt state regulation of caller ID or other calling party
|
|||
|
number based services as follows: states may not prohibit
|
|||
|
automatic per call blocking for interstate calls, require a
|
|||
|
blocking alternative for interstate calls different from the one
|
|||
|
adopted in this proceeding, or prohibit the offering of
|
|||
|
interstate caller ID services. Thus, states may not prohibit
|
|||
|
carriers from offering interstate services based on calling party
|
|||
|
number, including caller ID service. States will not be able to
|
|||
|
require the use of digits other than *67 (or 1167 for rotary or
|
|||
|
pulse-dialing phones) for automatic per call blocking on
|
|||
|
interstate calls, nor require carriers offering or participating
|
|||
|
in the interstate transmission of calling party number to provide
|
|||
|
blocking systems that interfere with the use of *67 (or 1167 for
|
|||
|
rotary or pulse-dialing phones) to achieve blocking. Preemption
|
|||
|
is necessary in these cases to ensure that state regulations do
|
|||
|
not interfere with the achievement of important federal
|
|||
|
objectives, and with the Commission's exclusive jurisdiction over
|
|||
|
interstate communications.
|
|||
|
|
|||
|
70. To the extent that inconsistent regulations cannot be
|
|||
|
accommodated simultaneously for interstate and intrastate caller
|
|||
|
ID services, some further preemption of state regulations may
|
|||
|
become necessary. We will examine the need for such additional
|
|||
|
preemption on a case-by-case basis. For example, there may be
|
|||
|
cases in which state caller ID requirements applicable to
|
|||
|
intrastate calls would, as a practical matter, make it impossible
|
|||
|
for carriers to implement per call blocking for interstate calls.
|
|||
|
|
|||
|
We are reluctant to preempt state authority over intrastate
|
|||
|
communications, and will endeavor to accommodate state
|
|||
|
regulations whenever possible. State policies, however, must not
|
|||
|
frustrate the paramount federal interest in a cohesive interstate
|
|||
|
communications policy, and must not be allowed to infringe
|
|||
|
unreasonably upon the privacy interests of the citizens of other
|
|||
|
states.
|
|||
|
|
|||
|
|
|||
|
III. CONCLUSION
|
|||
|
|
|||
|
71. Our goal in this proceeding is to establish a federal
|
|||
|
policy to govern the passage of calling party number among
|
|||
|
carrier networks. In this order we find that a federal model for
|
|||
|
interstate delivery of calling party number is in the public
|
|||
|
interest, that the model must protect calling party privacy, and
|
|||
|
that certain state regulations of interstate caller ID must be
|
|||
|
preempted. Accordingly, we amend Part 64 of the rules to require
|
|||
|
that common carriers using Common Channel Signalling System 7
|
|||
|
(SS7) and subscribing to or offering any service based on SS7
|
|||
|
functionality must transmit CPN and its associated privacy
|
|||
|
indicator on interstate calls. We require that carriers offering
|
|||
|
CPN based services provide automatic per call blocking at no
|
|||
|
charge to interstate callers, and that the privacy indicator be
|
|||
|
honored by terminating carriers. We find that the costs of
|
|||
|
interstate transmission of CPN are de minimis, and that the CPN
|
|||
|
should be transmitted among carriers without additional charge.
|
|||
|
We require that carriers participating in the offering of any
|
|||
|
service that delivers CPN on interstate calls must inform
|
|||
|
telephone subscribers regarding the availability of
|
|||
|
identification services and how to invoke the privacy protection
|
|||
|
mechanism. We also seek comment on whether more specific
|
|||
|
subscriber education requirements should be imposed. We restrict
|
|||
|
the reuse or sale of telephone numbers by subscribers to
|
|||
|
automatic number identification (ANI) or charge number services.
|
|||
|
We note that additional comments are sought in the Computer III
|
|||
|
Remand Proceeding on whether residential and small business
|
|||
|
customers' privacy concerns warrant revision of the Commission's
|
|||
|
rules governing reuse and sale of customer proprietary network
|
|||
|
information (CPNI). Finally, we seek comment on extending the
|
|||
|
policies adopted herein to other services that might identify the
|
|||
|
calling party.
|
|||
|
|
|||
|
72. We expect the rules and policies adopted herein will
|
|||
|
support the efforts of carriers, standards setting bodies,
|
|||
|
states, CPE manufacturers, and others in providing CPN-dependent
|
|||
|
services in an efficient manner. In this federal model, we
|
|||
|
recognize the value and benefits to the public of interstate CPN
|
|||
|
services, we promote the transmission of the calling party number
|
|||
|
from the originating carrier to the terminating carrier, and we
|
|||
|
balance the reasonable privacy expectations of both the calling
|
|||
|
and the called party. The rules we adopt to govern services such
|
|||
|
as interstate caller ID service remove obstacles to their
|
|||
|
development posed by uncertainty and non-uniform state policies
|
|||
|
and should facilitate implementation of new and beneficial
|
|||
|
interstate services.
|
|||
|
|
|||
|
|
|||
|
IV. PROCEDURAL MATTERS
|
|||
|
|
|||
|
73. Ex Parte Rules - Non-Restricted Proceeding. The
|
|||
|
Further Notice of Proposed Rulemaking is a nonrestricted notice
|
|||
|
and comment rulemaking proceeding. Ex Parte presentations are
|
|||
|
permitted, except during the Sunshine Agenda period, provided
|
|||
|
they are disclosed as provided in Commission rules. See
|
|||
|
generally 47 C.F.R. Sections 1.1202, 1.1203 and 1.1206(a).
|
|||
|
|
|||
|
74. Final Regulatory Flexibility Analysis: Pursuant to the
|
|||
|
Regulatory Flexibility Act of 1980, 5 U.S.C. 601 et seq., the
|
|||
|
following final analysis has been prepared:
|
|||
|
|
|||
|
I. Need for and objective of the rules:
|
|||
|
|
|||
|
This Report and Order adopts policies governing the
|
|||
|
transmission of the calling party number parameter and its
|
|||
|
associated privacy indicator on interstate calls. Several
|
|||
|
commenters to the NPRM in this proceeding have identified a
|
|||
|
number of potential uses for interstate calling party number
|
|||
|
based services, including caller ID, and have indicated that it
|
|||
|
also will improve certain existing communication service
|
|||
|
offerings. We find that the potential benefits of interstate
|
|||
|
passage of calling party number far exceed any negative effects.
|
|||
|
We thus adopt the conclusion reached in the NPRM that interstate
|
|||
|
caller ID and other calling party number based services are in
|
|||
|
the public interest and should be available to interstate
|
|||
|
subscribers nationwide pursuant to the policies and rules set
|
|||
|
forth in this order.
|
|||
|
|
|||
|
II. Summary of issues raised by the public comments in
|
|||
|
response to the Initial Regulatory Flexibility Analysis:
|
|||
|
|
|||
|
No comments were submitted in direct response to the Initial
|
|||
|
Regulatory Flexibility Analysis.
|
|||
|
|
|||
|
III. Significant alternatives considered:
|
|||
|
|
|||
|
The NPRM in this proceeding requested comments on several
|
|||
|
proposals as well as the views of commenters on other
|
|||
|
possibilities. The Commission has considered all comments and
|
|||
|
has adopted regulations which require the passage of calling
|
|||
|
party number where SS7 is deployed, facilitate interstate calling
|
|||
|
party number based services, including caller ID, and implement
|
|||
|
federal policy on privacy.
|
|||
|
|
|||
|
75. Initial Regulatory Flexibility Act Analysis on the
|
|||
|
Further Notice of Proposed Rulemaking
|
|||
|
|
|||
|
An Initial Regulatory Flexibility Analysis is contained
|
|||
|
Appendix A to this Report and Order and Further Notice of
|
|||
|
Proposed Rulemaking.
|
|||
|
|
|||
|
76. Comment Dates
|
|||
|
|
|||
|
Pursuant to applicable procedures set forth in Sections
|
|||
|
1.415 and 1.419 of the Commission's rules, 47 C.F.R. 1.415 and
|
|||
|
1.419, interested parties may file comments on or before May 18,
|
|||
|
1994 and reply comments on or before June 21, 1994. To file
|
|||
|
formally in this proceeding, interested parties must file an
|
|||
|
original and four copies of all comments, reply comments, and
|
|||
|
supporting documents with the reference number "CC Docket 91-281"
|
|||
|
on each document. If interested parties want each Commissioner
|
|||
|
to receive a personal copy of comments, interested parties must
|
|||
|
file an original plus nine copies. Interested parties should
|
|||
|
send comments and reply comments to the Office of the Secretary,
|
|||
|
Federal Communications Commission, Washington, DC 20554.
|
|||
|
Comments and reply comments will be available for public
|
|||
|
inspection during regular business hours in the FCC Reference
|
|||
|
Center, Room 239, Federal Communications Commission, 1919 M
|
|||
|
Street, N.W., Washington, DC. Copies of comments and reply
|
|||
|
comments are available through the Commission's duplicating
|
|||
|
contractor: International Transcription Service, Inc. (ITS,
|
|||
|
Inc.), 2100 M Street, N.W., Suite 140, Washington, DC 20037,
|
|||
|
(202) 857-3800.
|
|||
|
|
|||
|
V. ORDERING CLAUSES
|
|||
|
|
|||
|
77. Accordingly, It Is Ordered, that, pursuant to authority
|
|||
|
contained in Sections 1, 4(i), 4(j), 201-205 and 218, of the
|
|||
|
Communications Act of 1934, as amended, 47 U.S.C. 151, 154(i),
|
|||
|
154(j), 201-205, and 218, Part 64 of the Commission's Rules and
|
|||
|
Regulations ARE AMENDED as set forth in Appendix C hereof,
|
|||
|
effective April 12, 1995.
|
|||
|
|
|||
|
78. It Is Further Ordered, that, pursuant to authority
|
|||
|
contained in Sections 1, 4(i), 4(j), 201-205 and 218, of the
|
|||
|
Communications Act of 1934, as amended, 47 U.S.C. 151, 154(i),
|
|||
|
154(j), 201-205, and 218, Further NOTICE OF PROPOSED RULEMAKING
|
|||
|
is hereby provided as indicated above.
|
|||
|
|
|||
|
79. It Is Further Ordered, that, the Secretary shall cause
|
|||
|
a summary of this Report and Order and Further Notice of Proposed
|
|||
|
Rulemaking to be published in the Federal Register which shall
|
|||
|
include a statement describing how members of the public may
|
|||
|
obtain the complete text of this Commission decision. The
|
|||
|
Secretary shall also provide a copy of this Report and Order
|
|||
|
Further Notice of Proposed Rulemaking to each state utility
|
|||
|
commission.
|
|||
|
|
|||
|
80. For further information regarding this Report and Order
|
|||
|
and Further Notice of Proposed Rulemaking, contact Suzanne
|
|||
|
Hutchings, Common Carrier Bureau, Domestic Facilities Division,
|
|||
|
(202) 634-1802.
|
|||
|
|
|||
|
FEDERAL COMMUNICATIONS COMMISSION
|
|||
|
|
|||
|
|
|||
|
|
|||
|
William F. Caton
|
|||
|
Acting Secretary
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
APPENDIX A
|
|||
|
|
|||
|
INITIAL REGULATORY FLEXIBILITY ANALYSIS
|
|||
|
|
|||
|
Reason for Action
|
|||
|
|
|||
|
This rulemaking proceeding is initiated to obtain comment on
|
|||
|
whether the Commission should adopt rules providing for
|
|||
|
subscriber education on interstate calling party number delivery,
|
|||
|
and for the application of federal rules and policies for
|
|||
|
interstate calling party number delivery to interstate calling
|
|||
|
party name delivery.
|
|||
|
|
|||
|
Objectives
|
|||
|
|
|||
|
The Commission seeks to establish an environment in which
|
|||
|
interstate calling party number based services are made possible
|
|||
|
and advantages of a uniform regulatory framework are realized.
|
|||
|
|
|||
|
Legal Basis
|
|||
|
|
|||
|
The proposed action is authorized under Sections 1,4, 201-205,
|
|||
|
218 of the Communications Act of 1934, as amended, 47 U.S.C.
|
|||
|
151, 154, 201-205, 218.
|
|||
|
|
|||
|
Reporting, Recordkeeping and Other Compliance Requirements
|
|||
|
|
|||
|
This Further Notice seeks comment on whether more specific
|
|||
|
subscriber education requirements should be imposed on those
|
|||
|
offering calling party number based services, and on whether and
|
|||
|
how rules and policies on interstate delivery of calling party
|
|||
|
number should apply to interstate calling party name delivery
|
|||
|
services.
|
|||
|
|
|||
|
Federal Rules Which Overlap, Duplicate or Conflict With These
|
|||
|
Rules
|
|||
|
|
|||
|
None.
|
|||
|
|
|||
|
Description, Potential Impact, and Number of Small Entities
|
|||
|
Involved
|
|||
|
|
|||
|
Rule revisions in this proceeding could affect carrier's
|
|||
|
offering of interstate calling party name and number based
|
|||
|
services such as caller ID service. After evaluating the
|
|||
|
comments and reply comments in this proceeding, the Commission
|
|||
|
will examine further the impact of any rule changes on small
|
|||
|
entities, and will set forth its findings in the Final Regulatory
|
|||
|
Flexibility Analysis.
|
|||
|
|
|||
|
Any Significant Alternatives Minimizing the Impact on Small
|
|||
|
Entities Consistent with the Stated Objectives
|
|||
|
|
|||
|
The FNPRM solicits comment on any significant alternatives
|
|||
|
minimizing the impact on small entities consistent with the
|
|||
|
stated objectives.
|
|||
|
APPENDIX B
|
|||
|
|
|||
|
Commenters
|
|||
|
|
|||
|
AD HOC Telecommunications Users Committee (Ad Hoc Users) *
|
|||
|
Aeronautical Radio, Inc. (ARINC) **
|
|||
|
Alaska - Alaska Public Utilities Commission (Alaska PUC)
|
|||
|
ALLNET (Allnet)
|
|||
|
American Osteopathic Association (AOA) **
|
|||
|
American Telephone & Telegraph (AT&T) *
|
|||
|
Ameritech Operating Companies (Ameritech) *
|
|||
|
Arizona Corporation Commission (Arizona CC) *
|
|||
|
Baer, Joseph (Baer)
|
|||
|
Bell Atlantic Telephone Companies (Bell Atlantic) *
|
|||
|
BellSouth Corporation (BellSouth) *
|
|||
|
Bliley, Representative Thomas Jr. et al. (Committee on Energy and
|
|||
|
|
|||
|
Commerce)
|
|||
|
California, Consumer Affairs of the State of (California Consumer
|
|||
|
|
|||
|
Affairs) *
|
|||
|
California Public Utilities Commission (California PUC) *
|
|||
|
Central Telephone Company (Centel) *
|
|||
|
Citicorp (Citicorp) **
|
|||
|
Colorado Domestic Violence Coalition (Colorado DVC)
|
|||
|
Colorado Office of Consumer Counsel (Colorado Consumer) *
|
|||
|
Connecticut, Attorney General for the State of (Connecticut)
|
|||
|
Consumer Action (Consumer Action) *
|
|||
|
Consumer Federation of America (CFA)
|
|||
|
Computer Professionals for Social Responsibility (CPSR) *
|
|||
|
Direct Marketing Association (DMA) *
|
|||
|
District of Columbia, Office of the People's Counsel (DC OPC)
|
|||
|
Georgia Consumer's Utility Counsel (Georgia CUC)
|
|||
|
GTE Service Corp. (GTE) *
|
|||
|
Illinois Commerce Commission (Illinois CC)
|
|||
|
Indiana Office Of Utility Consumer Counselor (Indiana Utility
|
|||
|
Counselor)
|
|||
|
Indiana Utility Regulatory Commission (IURC)
|
|||
|
Information Industry Association (IIA)
|
|||
|
Iowa Office of Consumer Advocate (Iowa) *
|
|||
|
Jackson, Ms. Patricia L. (Jackson)
|
|||
|
Kentucky, Attorney General of the Commonwealth (Kentucky)
|
|||
|
McCaw Cellular Communications (McCaw) *
|
|||
|
Maryland People's Counsel (Maryland PC) *
|
|||
|
Massachusetts, Office of the Attorney General (Massachusetts)
|
|||
|
MCI Communications (MCI) *
|
|||
|
Medical Society of New Jersey (MSNJ)
|
|||
|
Metromedia (Metromedia)
|
|||
|
Michigan Public Service Commission (Michigan PSC)
|
|||
|
Missouri Office of the Public Counsel (Missouri Counsel)
|
|||
|
Missouri Public Service Commission (Missouri PSC)
|
|||
|
National Association of Regulatory Utility Commissioners (NARUC)*
|
|||
|
National Association of State Utility Consumer Advocates
|
|||
|
(NASUCA)*
|
|||
|
National Telephone Cooperative Association (NTCA)
|
|||
|
National Telecommunications and Information Administration
|
|||
|
(NTIA)**
|
|||
|
New York City, Department of Telecommunications & Energy (NYC
|
|||
|
Telecom)
|
|||
|
New York, Public Utility Law Project, Inc. (NY Law Project)
|
|||
|
New York State Consumer Protector Board (NYS Consumer)
|
|||
|
New York State Department of Law (NYS Law) *
|
|||
|
New York State Department of Public Service (NYS PSC) *
|
|||
|
North Carolina, Attorney General (North Carolina)
|
|||
|
Northern Telecom Inc. (NTI) *
|
|||
|
NYNEX Telephone Companies (Nynex) *
|
|||
|
Ohio, Office of the Consumer's Counsel (Ohio OCC) *
|
|||
|
Ohio State University (Ohio State University) **
|
|||
|
Pacific Bell and Nevada Bell (Pacific) *
|
|||
|
Pennsylvania Public Utility Commission (Pennsylvania PUC)
|
|||
|
Pilgrim Telephone (Pilgrim)
|
|||
|
Project Designed Systems (PDS) **
|
|||
|
Rochester Telephone Corporation (Rochester)
|
|||
|
Southern New England Telephone Company (SNET)
|
|||
|
Southwestern Bell Telephone Company (SWB) *
|
|||
|
Sprint Corporation (Sprint) **
|
|||
|
Telocator (Telocator)
|
|||
|
Texas Office of Public Utility Counsel(Texas PUC)
|
|||
|
Texas, State of (Texas)
|
|||
|
United States Coast Guard (USCG)
|
|||
|
United States Telephone Association (USTA) **
|
|||
|
United Telecommunications Inc. (United)
|
|||
|
US West (US West) **
|
|||
|
Virginia State Corporation Commission (Virginia CC)
|
|||
|
Washington Utilities And Transportation Commission (Washington
|
|||
|
UTC)
|
|||
|
Yellow Pages Publishers Association (YPPA)
|
|||
|
|
|||
|
Numerous letters from individuals were also received. All
|
|||
|
comments and letters were considered.
|
|||
|
|
|||
|
* also filed reply comments
|
|||
|
** filed only reply comments
|
|||
|
|
|||
|
|
|||
|
APPENDIX C
|
|||
|
|
|||
|
|
|||
|
Part 64 of the Commission's Rules and Regulations (chapter 1 of
|
|||
|
Title 47 of the Code of Federal Regulations, part 64) is
|
|||
|
amended as follows:
|
|||
|
|
|||
|
1. The authority citation for Part 64 continues to read as
|
|||
|
follows:
|
|||
|
|
|||
|
Authority: Section 4, 48 Stat. 1066, as amended; 47 U.S.C. 154,
|
|||
|
unless otherwise noted. Interpret or apply secs. 201, 218, 225,
|
|||
|
226, 227, 48 Stat. 1070, as amended, 1077; 47 U.S.C. 201-4, 218,
|
|||
|
225, 226, 227 unless otherwise noted.
|
|||
|
|
|||
|
2. The table of contents for Part 64 is amended to read as
|
|||
|
follows:
|
|||
|
|
|||
|
Subpart O - Calling Party Telephone Number. Privacy.
|
|||
|
|
|||
|
64.1600 Definitions
|
|||
|
64.1601 Delivery Requirements, and Privacy Restrictions
|
|||
|
64.1602 Restrictions on use and sale of telephone
|
|||
|
subscriber information provided pursuant to
|
|||
|
automatic number identification or charge number
|
|||
|
services.
|
|||
|
64.1603 Customer notification.
|
|||
|
64.1604 Effective date.
|
|||
|
|
|||
|
3. Part 64 is amended to read as follows:
|
|||
|
|
|||
|
Subpart O - Calling Party Telephone Number. Privacy.
|
|||
|
|
|||
|
64.1600 Definitions.
|
|||
|
|
|||
|
(a) Aggregate Information. The term 'aggregate information'
|
|||
|
means collective data that relate to a group or category of
|
|||
|
services or customers, from which individual customer
|
|||
|
identities or characteristics have been removed.
|
|||
|
|
|||
|
(b) ANI. The term 'ANI' (automatic number identification)
|
|||
|
refers to the delivery of the calling party's billing number
|
|||
|
by a local exchange carrier to any interconnecting carrier
|
|||
|
for billing or routing purposes, and to the subsequent
|
|||
|
delivery of such number to end users.
|
|||
|
|
|||
|
(c) Calling Party Number. The term Calling Party Number
|
|||
|
refers to the subscriber line number or the directory number
|
|||
|
contained in the calling party number parameter of the call
|
|||
|
set-up message associated with an interstate call on a
|
|||
|
Signalling System 7 network.
|
|||
|
|
|||
|
(d) Charge Number. The term "charge number" refers to the
|
|||
|
delivery of the calling party's billing number in a
|
|||
|
Signalling System 7 environment by a local exchange carrier
|
|||
|
to any interconnecting carrier for billing or routing
|
|||
|
purposes, and to the subsequent delivery of such number to
|
|||
|
end users.
|
|||
|
|
|||
|
(e) Privacy Indicator. The term Privacy Indicator refers to
|
|||
|
information, contained in the calling party number parameter
|
|||
|
of the call set-up message associated with an interstate
|
|||
|
call on an Signalling System 7 network, that indicates
|
|||
|
whether the calling party authorizes presentation of the
|
|||
|
calling party number to the called party.
|
|||
|
|
|||
|
(f) Signalling System 7. The term Signalling System 7 (SS7)
|
|||
|
refers to a carrier to carrier out-of-band signalling
|
|||
|
network used for call routing, billing and management.
|
|||
|
|
|||
|
|
|||
|
64.1601 Delivery Requirements and Privacy Restrictions
|
|||
|
|
|||
|
(a) Delivery. Common carriers using Signalling System 7
|
|||
|
and offering or subscribing to any service based on
|
|||
|
Signalling System 7 functionality are required to transmit
|
|||
|
the calling party number associated with an interstate call
|
|||
|
to interconnecting carriers.
|
|||
|
|
|||
|
(b) Privacy. Originating carriers using Signalling System
|
|||
|
7 and offering or subscribing to any service based on
|
|||
|
Signalling System 7 functionality will only recognize *67
|
|||
|
dialed as the first three digits of a call (or 1167 for
|
|||
|
rotary or pulse-dialing phones) as a caller's request for
|
|||
|
privacy on an interstate call. No common carrier
|
|||
|
subscribing to or offering any service that delivers calling
|
|||
|
party number may override the privacy indicator associated
|
|||
|
with an interstate call. The terminating carrier must act
|
|||
|
in accordance with the privacy indicator unless the call is
|
|||
|
made to a called party that subscribes to an ANI or charge
|
|||
|
number based service and the call is paid for by the called
|
|||
|
party.
|
|||
|
|
|||
|
(c) Charges. No common carrier subscribing to or offering
|
|||
|
any service that delivers calling party number may (i)
|
|||
|
impose on the calling party charges associated with per call
|
|||
|
blocking of the calling party's telephone number, or (ii)
|
|||
|
impose charges upon connecting carriers for the delivery of
|
|||
|
the calling party number parameter or its associated privacy
|
|||
|
indicator.
|
|||
|
|
|||
|
(d) Exemptions. 64.1601 shall not apply to calling party
|
|||
|
number delivery services (i) used solely in connection with
|
|||
|
calls within the same limited system, including (but not
|
|||
|
limited to) a Centrex, virtual private network, or private
|
|||
|
branch exchange system; (ii) used on a public agency's
|
|||
|
emergency telephone line or in conjunction with 911
|
|||
|
emergency services, or on any entity's emergency assistance
|
|||
|
poison control telephone line; or (iii) provided in
|
|||
|
connection with legally authorized call tracing or trapping
|
|||
|
procedures specifically requested by a law enforcement
|
|||
|
agency.
|
|||
|
|
|||
|
|
|||
|
64.1602 Restrictions on use and sale of telephone
|
|||
|
subscriber information provided pursuant to
|
|||
|
automatic number identification or charge number
|
|||
|
services.
|
|||
|
|
|||
|
(a) Any common carrier providing Automatic Number
|
|||
|
Identification or charge number services on interstate calls
|
|||
|
to any person shall provide such services under a contract
|
|||
|
or tariff containing telephone subscriber information
|
|||
|
requirements that comply with this subpart. Such
|
|||
|
requirements shall:
|
|||
|
|
|||
|
(1) permit such person to use the telephone number and
|
|||
|
billing information for billing and collection,
|
|||
|
routing, screening, and completion of the originating
|
|||
|
telephone subscriber's call or transaction, or for
|
|||
|
services directly related to the originating telephone
|
|||
|
subscriber's call or transaction;
|
|||
|
|
|||
|
(2) prohibit such person from reusing or selling the
|
|||
|
telephone number or billing information without first
|
|||
|
(A) notifying the originating telephone subscriber and
|
|||
|
(B) obtaining the affirmative consent of such
|
|||
|
subscriber for such reuse or sale; and
|
|||
|
|
|||
|
(3) prohibit such person from disclosing, except as
|
|||
|
permitted by subparagraphs (1) and (2), any information
|
|||
|
derived from the automatic number identification or
|
|||
|
charge number service for any purpose other than (i)
|
|||
|
performing the services or transactions that are the
|
|||
|
subject of the originating telephone subscriber's call,
|
|||
|
(ii) ensuring network performance security, and the
|
|||
|
effectiveness of call delivery, (iii) compiling, using,
|
|||
|
and disclosing aggregate information, and (iv)
|
|||
|
complying with applicable law or legal process.
|
|||
|
|
|||
|
(b) The requirements imposed under paragraph (a) shall not
|
|||
|
prevent a person to whom automatic number identification or
|
|||
|
charge number services are provided from using (1) the
|
|||
|
telephone number and billing information provided pursuant
|
|||
|
to such service, and (2) any information derived from the
|
|||
|
automatic number identification or charge number service, or
|
|||
|
from the analysis of the characteristics of a
|
|||
|
telecommunications transmission, to offer a product or
|
|||
|
service that is directly related to the products or services
|
|||
|
previously acquired by that customer from such person. Use
|
|||
|
of such information is subject to the requirements of 47
|
|||
|
C.F.R. 64.1200 and 64.1504(c).
|
|||
|
|
|||
|
|
|||
|
64.1603 Customer notification. Any common carrier
|
|||
|
participating in the offering of services providing calling party
|
|||
|
number, ANI, or charge number on interstate calls must notify its
|
|||
|
subscribers, individually or in conjunction with other carriers,
|
|||
|
that their telephone numbers may be identified to a called party.
|
|||
|
|
|||
|
Such notification must be made not later than April 12, 1995, and
|
|||
|
at such times thereafter as to ensure notice to subscribers. The
|
|||
|
notification shall inform subscribers how to maintain privacy by
|
|||
|
dialing *67 (or 1167 for rotary or pulse-dialing phones) on
|
|||
|
interstate calls. For ANI or charge number services for which
|
|||
|
such privacy is not provided, the notification shall inform
|
|||
|
subscribers of the restrictions on the reuse or sale of
|
|||
|
subscriber information.
|
|||
|
|
|||
|
64.1604 Effective Date
|
|||
|
|
|||
|
The provisions of Sections 64.1601 through 64.1603 shall be
|
|||
|
effective as of April 12, 1995.
|
|||
|
|
|||
|
|
|||
|
New Hack v2.0 for DOS & OS/2
|
|||
|
by John Deere
|
|||
|
|
|||
|
Desc: Takes an new passwd file and only cracks new accounts or
|
|||
|
accounts which have changed.
|
|||
|
|
|||
|
begin 644 newhak20.zip
|
|||
|
M4$L#!!0````(`#&56AQ1R<NYI4<``'R=```*````3D@R3U,R+D581>R]#7Q3-
|
|||
|
M5;8W?$YVTGPT;4);H"A($%`KH%2+4E"GI8;B1R&`;7&T(DI#[2`HS0$9":03U
|
|||
|
MT":'7)DKSO7Z,2_X,<\X,X_CS/@!J-A2;`$=K8@."E<0D3DUJ%6Y;8#8//^U*
|
|||
|
M]TF:%N<Z\\Y][^_YO3\CR=I[[;77_EY[[;77KA4_]D@&29*,DD-*)"1IBR0^Z
|
|||
|
M)=)9TO=^9$G:YI2R1SYO_?.H+?+U?QZU8<,-=7<TN.Y:MG31L@5WNNY4&GRN9
|
|||
|
MVVI=RY0E+F7)PMIEKEES+[[DHBS;F,NE_TL^U\\3T$"-H9[`/YMH&O\8\>UZ'
|
|||
|
M#3].2;("G'8(_#8]?:=.,T;NS]>'^.HT'(5_@^^B0;P(:>4@/<&EP_62E*T'N
|
|||
|
M&16'^.)!`VO[W9_;JL5@F%RBWAEI=:/23$Y),J>UR3=8E,)`;Q&M%I]FT6+"9
|
|||
|
MI_<!_S@%+4&G#O-UZ-+A!01!-%X4*TW0\9.D]$*8E+&D[I*E#9?H\79TWV.H2
|
|||
|
M<B%ROH<N?C)+DN:C*P:CIS?C^ZK^M<@?9LGGR`8I+XOE2A59!FJ426(S`#(EO
|
|||
|
M5@3@E=CP06;I)HDU(58EL86(^01RG0#/"?"TQ,(@V21(?B&0+0+<*+,GD>:6W
|
|||
|
MV2,`$V3V;P##9+8>X-]EMA-@G<R>`U@JLU\!Q&5FE<V2)K-NQ/;*[%.`[3)[#
|
|||
|
M'V"B@>6#YU@#&P02EX%=@%BI0!XW,!?`1P8V!&GO&-@8Q%H-+!>QDX)D#.-@`
|
|||
|
M!N,U^QGC&7R,G0>218QGN)&QT8AM$)2/"\I/&9L(9*F1S0(H,K))`$.-[!*`F
|
|||
|
M6XUL#F4PLB!`T,CN`/`9><U^;V3W(7;(R%X"V&MDCP.T&GDO]1K9-N)I8I\30
|
|||
|
M3Q-[%V"LB6U"FLO$ZS+8Q-ZA$DRL"^!G)E[=%29F-IBE9A.[%1T2RV`5B!W)8
|
|||
|
M8-<"O)G!K``>,[L18(J950&,,;.Y`-EFY@'XM9G5`ORKF=T&L,K,Y@-XS>QFH
|
|||
|
M`,G"?@_PF9DM`=AG9C\!V&YF=0#S+.QE@&D6M@5@O(6]`##$POX(\)R%M0,\4
|
|||
|
M8F$[`=9:6`O`$@O;#N"PLDD,`V!AXP`^L;#1`'^V,`O`(BL[!C#;RIX'F&IE9
|
|||
|
M]P*,M;(R@#>MO+5M`":SM%7$_F1E^XQFZ5<BMLG*FA![4,0B5G8%8@$1^ZF5X
|
|||
|
M=8'+.38>&VKC79YC8[,R,,L%,F%E1L2^%AF.6]D6%'1(Q#ZPLL6(U0C*:AO[N
|
|||
|
M`I37BMC5-O8D8I>+V$0;'[%Q-K82R&8;N\.,>HJT9VRL!+''1.P7-G858B$1K
|
|||
|
M"]K8-\BP7,3NLK$NQ$Z(V!<V]@8H/Q:QO]C8+Q#;(V)S,^7#4\W2K$SVL-4L[
|
|||
|
MO93)%F9AGF6RXXA])&*Y=G:/PRP9!2@48*0`)0)<*\`<`6X1X$8[6PG@M\M++
|
|||
|
MP.59@?PRB_D`,K(YF)3-E@/,RF;C`<H%\L9LM@)@G8CYLYD"H`C*.T7:GFPV<
|
|||
|
M!A7LR&87`+R/[``'L]E$@(^S61'`\6PV'\#E8!L!I@A0Y&`'T>CI(C;'P1M=2
|
|||
|
M[V";`&YWL,<`V@W,DFV6UC,.?L/D3>B>7S&>-L+(ZM"4NXWL*<1^9N3=\Y%1?
|
|||
|
M[LK#W#7SM,UF9D>^1\W,"?"LB+TGP"X!L"PH[5(+CTT0L4H+^QUXSA*@UL)+>
|
|||
|
MN%F`I0)L$&EA`38)Y+\)\!L!#EC8B]1H*^^S7*OH:Q$;9^5==YE`EEIY?_[2O
|
|||
|
MRO(&FZ6'K<R>BU5L9<Y</O4)&;*RBR$2@H@!N<;*QB%V&V8Y8C8;I\P1`+.5\
|
|||
|
MLC]NX_E:!-AJX_G^:&/Y`)\)\(E(ZQ'@W$P.')D\S9+),ZS-Y#S;!7A;@!X!E
|
|||
|
M%MDY6"K`7CLO]@L1.S^+@[(LWA/_GLWRP?HH`8O\J5V>(%MD.4L>#W!%%L4::
|
|||
|
M/W#(GV%^R>Q<$$9DEH=A>$IF^0"##?*)$6;):9"["K%_&3C+A[`%(.UY`;X0%
|
|||
|
MX`;&P0HFKQJ-$6;R`V/,TDXF-P(T,WDEP"M,7@*PA<FW`SS/Y'D`SS'9`_`[\
|
|||
|
M)KL!?LWD*0!/,?EB@$U,'@7P&).'`3S,Y&R`C4QF8V@CD6.C:7K*GP,T,?D([
|
|||
|
MP%HF[P,(,/EQD*QB\IN(269>LX4"G&]C(RS@8F<O(_9[.WL*8+N(M8L8UE8)^
|
|||
|
M>F)1-KL"8$$VNQG`D\WF`4S/9C<`C,EFZ]$3#=GL:L0.">0W`N0ZV`R`+`>[5
|
|||
|
M'L#L8!Z`B0Z>=K4`50Y6-)@O.`*_E-@6ZE:)]^X?);Z:#@CPMDAK$VG-$ML&C
|
|||
|
M$)7X$CLJ8C&)SW59YN`BF:>=+[.]B)TM\WQ39?86P-4"W"*S5P"\C/T6K0TRB
|
|||
|
MN>E2,&/RUB*S=)C)SP(<9/)D+/?]`NP3H(/)OT+:FTP^?S(?XI.7\R%^M(@/K
|
|||
|
M<>OE?(@W%/$A;BKB0UQ[&1_B0!$?XL5%?(AO*>)#["GB0SRMB`]Q81$?XM%%(
|
|||
|
M?(@'%_$AMA7Q(8Y?RH=8`[@<FR%J_5LADI_.Y.W;)6*?BMA4.X]=9N>Q/]C9P
|
|||
|
M]5C@3PG0(=+^:N>]9,KB@&5SY$79/.81H$V`\0X`B_R%73X+*^:@`*\+T)LE_
|
|||
|
MKP88F0U@D)Z!2B0=,1BRH43F&4GY,QJ&(_R$&>$#9L.%"&=;$"ZW&"8C_%,*`
|
|||
|
M_\EBF([P,0J/M!IN0'B.%6'5:K@-8;0H5SK';K@+X=EVA,-VPVJ$'W<@_+[#Q
|
|||
|
M0,K>-6*F^,2D^+D`M\E\@@9D=@-:_5.9>0">E]FM`+^3V<T`W\IL,<`)3!B`?
|
|||
|
MXS);"+#4P,7A#0:^29W/N(P\A_'81,;E9RECJP"F,$')V+T`%8P+U>4BME20`
|
|||
|
M/"^0_UODVRR8/2+R'1=I[^E(:'(`OQ;@<R.['V""B=4-YDH;@:")9UAEXMD5-
|
|||
|
M$^>YQ,2S+S(QOX,K=*L!JDQL#6VF)EZ7&29>%^B#U(8I)KX7/V9B]23L!&LI%
|
|||
|
M@U/&!.67@E(3E+\0:3_/8$M`N3Z#D]R?P18C]K,,3NG/X)1/9;"%0#XGP+L9W
|
|||
|
M[%:`MT3L@(C]58`N`3+-O-9&,Z]U;P;[*<!)D59BYFVX38`F,V][HYG7!<HE!
|
|||
|
M[P(SK\M2,^^).C/OB=>L//L>*R_V/ZV\(QTVWLPR&^_=R3;V/,#%-O8'&@`;&
|
|||
|
MS_"VC9>PR\99OV;CK+?8.,\_V'@)O['Q>CYEXY5XU,8K_Y"@C-AXY;&LVAU<S
|
|||
|
MG.ZDC3:+3\Q)`OQ(@-NSV&2DK13@0;$`[6(!7BA`K@!3H+^`I"A;=E5@\D&IN
|
|||
|
MH=+%JGQ$@`,"O"U`EP!'!;C$P3JH$@YV%[5=@`H'VV"UR(_)\C@LW/=DN1!@O
|
|||
|
MF(PWR9("'#/(P@!<8+?'&;YA\R"(O,,HR(D\8Y<,6>9I)ED#PNPQY$,!4]
|
|||
|
ML\RP^'%@RY4Z)<,C6)S#980K9<.O$38SA$N8X44LU&Q):(Q&U,$L72^TIKN%N
|
|||
|
M*O6%B$TT\=@Z$U>Z,`5)9FD9/&T$*5:YC;)DF)C;Z)`,1;F-(_CO.,DP.+>Q`
|
|||
|
M6#(,R6TLEPS6W,9*R9"?VWB[9!B9VW@W3UTC&5RYC1')X,AM?%0RF',;GY$,-
|
|||
|
M%^<VO@3Z#)R&Y=E9&=(023XV+4,:@]C5&=(EDGRH/`,F%OFZ&1G23$E^">!F,
|
|||
|
M21Y]3894+\D/`-PCR>=>GR'=)\G_`K!1DC^<E2$](<F?>S+0(_*-LS.D[9)\Q
|
|||
|
M]5R,(@[44#@G2_SX=X4`)0)<+\G#T3T>2=Y4"H$BR8<!YI&]`IJ?Q.:1Z+'*<
|
|||
|
M473(>`$NL,J'`<8(L,DJ.VE)"_"P`)9LD<\A.Z\`3P?GZ7'P$@RRO&$B2&3YM
|
|||
|
MKYA8V;)\ZS"SE"?+W5=;KIXUMZST^NOG6JJNF<4#T@^?'SX_?'[X_/#YX?/#:
|
|||
|
MYX?/#Y\?/C]\?OC\\/F?_*A7CS$^.0-GR'EU=)+T:&=/DZ3._^17M[OPU33<O
|
|||
|
M1FN9"-4;M$/7XIJVN:9UUQ99FEM=59@H["X\T.Z.TT5QO:0U(UESX0IWR\)!Y
|
|||
|
M3*IKXOS*\G"E.QSQ:'YD7;PWD4A,HEA=+_)XM,>=DE2VF1".ETIRGG'1[?1^C
|
|||
|
M0:&-<B0YA3FGD[DZI\Y/</?['<P\3D)K0$<>HL3ZW#D>[;<3"=G<ASP?R%],C
|
|||
|
M3%+6(U\`!^)ZJ_85[KSK\^I-FC94DNK6HTQM)AH>W&FLS];V(7'+OP&74.(>V
|
|||
|
M[3*.MR#3*\#7/4*TYZ9H?TVT3P(WUZ/94Y3_2I2_(LJ835`.1EFKJ*SG"'O$.
|
|||
|
MELQ?1_EW`A=YB*J(^K;9DERNITKFUQNU,LKX/F5\)I7Q8LKX*7#5'NW!5)9A?
|
|||
|
M5'`W4:Y)49J(TBHSJ<JCW:%32MJ7UF1?4;?\`B._Y0+JWD$R]?_*'/1_/O4_^
|
|||
|
M^4-$UJWE_4^(^JD>[=ULPMW%^WEMLO,ONCB))(;YK&]\[A(-VXR)9FU6[HZL(
|
|||
|
MF]&7DT;HQ$5$.T//F<F2L<A#S2+G(I[3=_GT+;DR]52<HQ.3QM#4Z1Y$3;)OU
|
|||
|
M&2+W=6)BDHN2#HBDS?GI<TXY>T"]K)R[8]T0-)&3>GM*<ER2[Y8!=!^/Y[4H[
|
|||
|
M[S^%E<O+MXP^LU:WZK4Z[\Q:N462Z$[M?+LD)=SQ_DP=:ZW?HC=HTI3#@4/[5
|
|||
|
MV5625%4]5WL:OA/:>["UWC+_IMVMNSSH*?=S'NUVK#M$D;&Z;J),\]:BO80%T
|
|||
|
MHL:L"<5:V#R_9H=1BF94:]LP0[?0"HX>WW4%6#V(Q55W"7)H'HN8+C;M?;"OR
|
|||
|
M=]3+VI_!M6X2)5XJ$K?,HL94[D1?_&$$GT<1]TZ/MA;]AG'-JYM#M&:=D<R7E
|
|||
|
M`Y]3(LO><6!W!Y$<-0MVP12[V]+834JRNX]HMYB3[%ZUZ2)"9`D2N\>)Y"&=?
|
|||
|
MW4LI=KEI[([U$CM?7MTVHKTCQ6Z)C3IO9]T[?+Z'('^>I(';LBE5PB@JX5W>`
|
|||
|
M?KV$S_O:/SRM_<D2NGC[4R78]1+,!BKA?"J!QE\?J"K5;ZF7J[6723!W!7L7R
|
|||
|
M*IG5V@X4&=0,:E>;\7*,<<T.B[2K2"+YJRJ6+;>2F*C<'_+O"RD6]93:M94\%
|
|||
|
M=[YY&FFJ?U]AHEZNTA83N_W!TV!7I35P=D9U?[VA2IN#E&!L8<C=H=BKM'FB;
|
|||
|
M),0B97)A(N1^,SI(=;\9SLMHNN'B_27J7\J!4MT=!?N#S;W%,?\G0;]=4FP1G
|
|||
|
M]WY/E6:^4,Q`JIZ%5^_EA>!.>X3JMF.3F()8R!U3W9:P<?(5-I]IJC^^*F<+V
|
|||
|
M$>GY5"46F9_0":8H3#TTO7RJ$E/>5%NC!_EF=,L5M-%`4KDAB^KMVE4F`!DKC
|
|||
|
M8A+B=59TJO:H2?2U`=B1A+V6L.M2V#+-2M@*PB[5L0RTWV`%UGD(>V,*6Z;]#
|
|||
|
M!V'G$K9,QQI!VT[8*L).2&'+M#\0]D;"#M6Q)M`^2MB;"2NGL&7:.L+.)VS4_
|
|||
|
M*+`9H%U*V-L(^UX*6Z;=2-A:PKZF8\V@+2-L'6&?26'+M`F$_0EA']2Q%M`.2
|
|||
|
M)>P2POIUK!58F;"_)^RB%+9,BT)&U/V1L+-UK`VT[Q'V!<).36'+M-<(NX6PQ
|
|||
|
M8W5L)FB?(>S+A'6DL&7:@X3=3MB33&#MH/43MH6PGZ2P9=HBPNXD[)]U;!9H8
|
|||
|
M9Q.VG;`OZ5B'=B5"&*BA6A$E6A@2'V')(3E'.X>PHPF[EB4[_QS-0MAQA%W"^
|
|||
|
MDETW0OO:0:*-L/-8LCLLVD'"EA%V&DLVW**U$?9>PHYGR29:M.<(^SQAAZ0:D
|
|||
|
M8]$>(>PQPDH"6\,7>UT74+KT+Q=*0MT5QA2J2$<U]:%&Z:A]?:AL'86;O"3J#
|
|||
|
MM-C-ZQ;WH30=M:4/]9Z.,F:D4#L$:LLLH.I(IB;W)J%?V+>LI(1-:0D;1$+='
|
|||
|
MDWU,_#K?+_I0]0*5;'5?PFR=]IL^U%4ZZBIS"C5.KU8)H11[LNP\O5)W<+0SD
|
|||
|
MB?[6*M"_X&A+$GU,H.O>Z./[KE54:X>]GSY<J1Z?R^6PMZ<\QRCY+(D51NU>P
|
|||
|
MZ#;>QD4YWR3:RSEYI'QHJ-P8,JN*,]AK\)6K-7G6`\M+VDUP<Y$.3Y4EM<)N"
|
|||
|
MW:V,F*M]BM%7=UEW^\S>X*P<8]06W)6`N*O9X91"CM`L8VB^/=@K*R9*M10V8
|
|||
|
MZTG]ZA,\;D25MI-7Z&MP^I(*#P2O7)@%]\WEYP76#)%6Y51KW8RK(>:7O]J?X
|
|||
|
M2$3ELF![_G2U;:J)R)9]:#W@ST2QHN3=K:&:N.J.\R#GO^D>!Y/&W!6NM`2.>
|
|||
|
M/&#I>(*BI!RDDAY`4O,18^#(FOZI8;<E%0UD4<C2&AA+L*=UTTH`GMHZL'\C$
|
|||
|
M;HRB`GVS;DF6+&G7G2=)-:W]VFL10Z"NL*MOC9ME4<Q\@S!*O#IJM<6ZUY?59
|
|||
|
MLL?I;3G"`GO,+3N<7G6^L<D=]ZIF;\$N+W:9B#O>L@L$AYG=W-+LG..=[9WK]
|
|||
|
M32@QCQ>;!^V0H146G6FJAS-"M7'O^@[OE3B#V-6=@,X&H[>P>6.E>G#(W(AB$
|
|||
|
MV4H#4_"F&O_F*75G.GN/U_'',6.\GU$#6@X[';_K<#8>)6]J0M>HM7'1`*<HG
|
|||
|
M*P]EM;GCDE;BQDQ2CH?<Q[7WW;0Y=F'O0^5#[A-JC5UMO0X:Z-I3-.RDGJGN>
|
|||
|
M6-CE>'%?4VT\^)G9EW.M[[S@9P9?1?`SYKLL7!N/SJS2MI.^O+!N"\2"1I7!;
|
|||
|
M!(_^J$K[7T"K%<<=+YI\Z,#B7?YQUX0JCD?'5FD1I.AH5".:6Z7=2UJ]NRMJ,
|
|||
|
M*00XCL)0;F2&'*J`WNACH8H3(%\.\JGNX_[\*NWZ?@PVPZE#DMU=P*S@-%W^9
|
|||
|
M2ZJT"ZA6LH[SZ/D)*CJDW!X,S-)2Z+T57:+EZS)0D2HM"J4WH70EE.-:<PEZ7
|
|||
|
M]$4Q=0<L6RDQ=@R61F+L!?QW//^=B-^Z(OQH(Z$KM];-IV`>!:6_^6G5!4"-G
|
|||
|
MQ7I`F:)F;40>K-XQZLF6OQJN"7YI5(NN/`CY$>(IB??1*19!%?U8>W<D7)9)8
|
|||
|
M!"0ZN&IT%GAD;WZ,(S9OX@"R2IOGXBH/B1Z4QI<"&A]$._6%)5"R=I>.H@@HU
|
|||
|
M%B#:RL.R5DEAL5[X6D$][%ZU/,^K_L5;O,-GY8N=\@;7V"7?^.`:B^0?4JW=L
|
|||
|
M*7%!80^^E4A1I$NZGT,J.K:7#_%HHZ\F'=3;7@YM29=Z[>7<`[RM?$C"&USCI
|
|||
|
ME'QG.5XJ=WIX[<<,HA/X1],A*-O+L4[4-L%<K"Z]BDJ6]LHX,B'<,I]6WAGU"
|
|||
|
MW<WK:Y%63:0Z623%JIHCU4.+=RB#];*3<9-*XK>P.<E*+;>S<DOD+KE@A87J8
|
|||
|
MKU8;0T.KH)3/P0FTN,TWTJO.RO'VM$@&)<\;W.WTAF;E)$4BY2]L#KF%5*38_
|
|||
|
M0/E+*U:MM*@?JGXG]:=C+9V`5<4^$T*J(MY9A/6ISK)8=Z^N5=L@GXIW-!C56
|
|||
|
M=Z(&]7W5/*?>Y@E5QK2@OA$H%JPAM3(6M:DMX\P1CTQ1\QS/7"):3425,7EHE
|
|||
|
M0;5%?K?@_:#_A*08K=W*C[A:CSITTBYZ36B69=4@E><>&G8Z7MP3HA5;K3GLR
|
|||
|
M5$BH(AX\F?#EAEN:6-G,X$F;SV+M=D1^C"E#K4"%@Z29[Z8&K+Y7+;?,")5_@
|
|||
|
M-[_7,HF?V@)VU#^[T.^5EN@,SAA\1;1XYAH."_\K3LI`3B\C"R**H_A#);/P!
|
|||
|
M`-_Z:%6W,3XA,;N,A;O1A7L@J53W\>]:\_KX0&@^":\$O@VE]H_"O6J%I32\!
|
|||
|
M(!&(+U.R<?R0DG(T.CD07Z'DDMD*N^:V`.'I<4+4%8@OX'BKW`^/;5D4'AY5>
|
|||
|
M&HB/\PT-%(]3)@;B/I\I$+]-.0^XIMJ88@K+372\B0</]P9W&;8%P.4UQ@\]`
|
|||
|
M\7!M#/2*#:E9<,Z0HN.1$Q'%EB6AH.#;)=&SU!'4"/7LQD_H'89U_S.4XF-(X
|
|||
|
M:S>1"-E$:D6-/<14MS/D5-M%G41[J['?12IC,"=`O)PD:0\%)E2>X\5:/Y>4J
|
|||
|
M!/\$E);ISJ,M$%J4II1RA:BI?(BEV3^(KVB^TM%4VJ=H"?48U]5!?:#7';X,E
|
|||
|
M;^.L',E``R,9?.:MO!\-A;OKZ%G'['JI6MLWE`N6K&JM_G0BH;/114'[_-3>=
|
|||
|
M9]SZ%)JBM@3N@>)2@(FJ#B8=)9(W)Y+W'E_@>UA%O+AEA;&P>7=KL#F?"/U?'
|
|||
|
M[B:Q7*UMI1E,^Y"SGG1!B,EJ[32U-H8RZ&"LZQ=.CTBMZ\J#@O'9B#0%0Q?OX
|
|||
|
MBM/;,QT2QG<9-#7U`Y).!WRC'-O-L(=Q?3?&C22ZE+ZN'(+\"%&VZ)C@:HAW]
|
|||
|
M$S#1N>IT.V#QKF77J-,M\JY5YP=70W*1PC5NNCTTW1(=4J5UG^+F@#Z.Q"MC6
|
|||
|
M-FFH6IA6AMLN(W-&&G??<.+C0^:MWY'9L7WZ$)'];IR[J?R6Y6D$R6JFU@,6F
|
|||
|
M@SH;>I,_4RVULU)+B=H1M:@[0I5QM3+N[2G-*9%\)JX.J<."*RU2J";F'ZONB
|
|||
|
MGX%>^1$15<2N"13;%`:KE-HQP[I7@:H2%_2<Z"Q!5!I8F4BG^A+<U1W]U2PRO
|
|||
|
M1!T[R9N4U:>54JTA7!,RME/H/HHE.@P_U`40+C7V*"P7A33Z-?:"5F^C-V=^-
|
|||
|
M;_MTL2-,-X8RJ#NJ86W-ODH,G2FX.T'SDR982E](J?8TNVE#Q7YUI3"T)'Q>=
|
|||
|
MOD/.2YOXQ!W3XR-.;2#JYU+4DSF2[+N/72E*S$KNJ#>1&*KF!B"YC79!'=$`;
|
|||
|
M1$$?XKOTW<9V>G,UJ_&O4&<2ZB0GQ,&X2?#@DWR7%/<T&-2>S13!##5.X593S
|
|||
|
M6[+OC%(R91/6H\SS%/<L_W%2*E1K#Q4/S*'B%-`ZU42%*(:"'A@2GSV#!LA9%
|
|||
|
M!IJ=<;F=N6-/$G'H2N*NB^NT826#4^_FWV%USWB2?E?E;J:E3AO!8`HX7LR/*
|
|||
|
MVNLHI-UA(GN4^D;P=,)7$CQM\TUM<I3_?5DO2LMJ0E;E=;&']&(/2:0JU08?K
|
|||
|
M[![3B\B0VD;>2IL*Z1L\ZJ\KHLQMGZ'NTK51YK;,4#OTE.)=*T;IVBN6^9"DB
|
|||
|
M&MVQ(E/798L[&HPD?F;/T89?!F'#)9'XS-UBS(7`ZV@OX3M0>TF,0*C$&,(Y4
|
|||
|
MKMTT#C:!/!"TFRZFT&`F/>E$-#383K\C"'%3:]\<J8".D3H-J2WJ['C/#I+%H
|
|||
|
M*5SP2"_L;2MC/>T<G:FV%,3D4]LI$K$[U95Q/6%,2(F'_#'U1J-:&+HT=(MQ5
|
|||
|
M:A:5JV2$1A!DE3%5B4>&.T-S8R%/'`I(KLJKI/[8&)IF#,TSAIPAUC<%((`:$
|
|||
|
M3]+D76[EIF3J`6S+<LLUA;N>H=GLV-@\-J$GI$T9G'V=#:D)9Y&"Q^*DH>S`K
|
|||
|
MEEG8K%Y)S;<F2`#$HY>&%#M4EN%9^52_X5G4:\7O"AI,/<QFQ1[-+@FV6(K;Z
|
|||
|
MU^P7\>)VGR/$*>2BURE?]+)@HD1Q"EQ?L:&\;XE=J.A;(BH/?F&)_-C2;J"6@
|
|||
|
M"%*U+;A+#I7%Y8]"TV/MT_F%UUQM86\B.>?T5@T7@Q0\:6DPO^RD3=(6*37.[
|
|||
|
M"!Z.1^99U'>#IYRKS)"4&$1K:K*JO.?5K]K=?&JHJ^/%IQWW5Z$(2,HJ[9?"5
|
|||
|
MDKQ"S5"KC.K;!1\$3SI#-2>@5C5<I+J[0AYCR#!UDCYX@PE&C%<%WY9#]\1"=
|
|||
|
MJ^,XDW&1PPMJ8Y#+-5VA,J.89`;*G!_)0^^="+XAA^;%0K?$0]?&0C/BJ4R1Z
|
|||
|
M^VA89XSE(FE7).^JXCV.^_Y$'5-S0FT!0^BZE+_S_Z&ZOU/PM;HC&',V7!JJ5
|
|||
|
MU*B^&=]1/W5Z#"I205?/?M439Y5::#;-L6@&P:HXBE"_@@Z@[BC8!4XA]]&&Q
|
|||
|
M(0AWT0!,BX6F]U4-<YMC2SG6?9222^.;^31%J3.,H=G&D!RR]640/;W<6/R5_
|
|||
|
M8]U&?B:.!4_*:6-1.A?G7*TN?<--'Z+.^;UTJD__5%>]1H)I^_ET0_-2><Y8)
|
|||
|
M,O)=23\*[E9ZOTXD8(M1VV9"L!Z^9;XX7>K6)6A2)NT5;&JI`XLZWSX79Y:;&
|
|||
|
MH')!C[8VK\XFJ],A4J=NJM'/1LHP')MRO&/7]'J#NURDY&$>BV3]C$2F)&<*:
|
|||
|
M*13D1`E4!2-?@!Q5+<YC%B(CE#B]#*6#15)YE_B"G9\L=]40_0CEE)5,:NDS?
|
|||
|
M7)!DI4KC1\G&W0&)GZWHU'E!M6;G%S>^5#F)[^2?ZHUG>T5OU,MU^8/IAL0SA
|
|||
|
MDN])1>),ZCB'-EO9-Z#0[^@/41GJ.XAH8C5?WW3Y,IW(EZE=_0JJ=#!F<*S_C
|
|||
|
M%WX/,L;QP#J:Q21E_8,"_CS)EZE6VML,$R++Y)X/(C4'U7=#-?NQ_[2$*O<5[
|
|||
|
M[NWY)E39H5;N4UO#-1U-9TU+2X!&2GCU;2SUM]6:_<7O^BX,WYE_;?C<0-RV)
|
|||
|
MR@0NT<S`SHE-YTT'-IHI'0_L[$:$4RH?H&YM&4*+V[TCC^I<OP"G;)O0:K7)\
|
|||
|
MW"Q@Z:<_P!:G^NT81NR'L(3Y2TMI*(=&?BR'1L(XU'2N.%'[<,BQT;DE2X$U*
|
|||
|
M8'Z7F.A\LI`0`Z7CQ9TBK`_W!DD?;CH+*8/2#L\Z6>-N24X-^4*:*K[<:LTXJ
|
|||
|
MD#5.Z#W[,:OUX8>9"X7AK/O=-7O]R_^B9C09(I7Q>AEK9=E(,26&]QWPSZPC"
|
|||
|
M&8U$*#GWU0KG)\ZPVQ[_^EG%$BFG"6.7+FV.]B"]BA.T8_\`E?K..YWO=,9QP
|
|||
|
MH;8G^#'[YJGYMZ3T:B(#B_!AK]H!JY]7W9%&_UM!_QNLO?DB1TK?2!I#3*^=I
|
|||
|
M.YCN=Q6GL!:;M^5!LX*N\LX<G*?.@CVE2I.Q(.KR@:[6+LNFH]0M\W6S$7$A[
|
|||
|
M/9ELGB7>D!DFY':S#'9F&&2JM(VD+'>1UGJJD)_,_B(L,I;^XBO-'LL5K+JNW
|
|||
|
M0EFJ.S$"QR8:[QJA>RPF9X\#4"S\>>7A10G+T9`_#[:95GU^!N)C82=4AH>4W
|
|||
|
MF$X!C&/=/MHE_'ED0E1BTW$R)3G4$3X<B*,TT'9.PK5H6(F'VWX=<*R[3^PI+
|
|||
|
MCNT?!5[&(T!)#M5T^;#SGX@N#>_\=<!G0H[H]8[M^P+;1'+E<8&;/(!U)E4#.
|
|||
|
M&])?<"_>ES.G?\XW@'-LWTDW!SA[)3I0PYF4Z2QTV^1CCK4Y@`-)DLU]T=7NM
|
|||
|
MUI">(.X*UO*)J'DKMQ0X'=L/.K:K5`IJ#WY-RE':J_UYP4Y#\&2NX_X+(30O=
|
|||
|
M2HR)K!HM2QO>Q,_C8V1I'^`1?#_'-X8O`RX;WV'XCL+W8GRGX.O&UX/O/'QOM
|
|||
|
MQW<)OBOQ;<3W@3%D'3C1^:]DBL+6[,\+*T<[VTB<B>"7$D^@X$+0T*B`_**^#
|
|||
|
MX.B^X`3!I+.P'[--4EHL>F]?T*]GTP1!9R)%V-G;5^I!*<6_32?\;3I';I3JZ
|
|||
|
MB_VLCQS'(BGPEAPVAP^7=]Z/%1%XRR`B/^41HXC<R2,6$;F5MG=%LW9#V/KS)
|
|||
|
MHCCS[8S,Z(@Z(T4ORMV(R&V1F1TH2OV*TX<4C4JZD%@<.R18C.#\7"+B1*3S:
|
|||
|
M-"K"#7'1*5MI(44OY5<"T?$X8ER`*112#D=OZQR)7NL,TL\4S(K.9^D$E9P[,
|
|||
|
M:L5!U:V-3:R!/EX9BRC[8:/$.=XI)'NHXJ!VG9$LB_NMW2'W8<=Z&&8EV.[6Q
|
|||
|
MGFNDI7(TS-=2(%[J-Z%OHH,#\1^OYJ',0'P>H(^A-[K;9,>ZV?%$HKO-Z,M1V
|
|||
|
MW?D1:$.5^2K,AX=#SFA!=YO!![NK^[!:F1^YUABJR%=SO"%#U#F0-."/+W&L4
|
|||
|
M-8-36:>,WPAN`BKWS_'@3MF9JC._;U5W!?W[)<>_W(MPM_LH'>*QOO\,2U`:^
|
|||
|
MSY"EC+`O`1O!G7Y:-U3LG\U-5X)C54C9I4W6:/S0#8[UV4STP3F`X=JCW3MUO
|
|||
|
M]DN(?;()&%)/XI($<AJ1DQ<T\S3=9,3Z20?'VF:#$`N*H[]$>(^Z]XO`I[+E7
|
|||
|
M\Z8[=RH.M2(_<K<QI.2KUK)013/F$@[^BFD[U1D]#/%7T=PTJA1)`\OPC;(<>
|
|||
|
M]8WXKC(L,U>;:,&\-E#T4)\YUCU^BOJK&:NC\U\1#!\+')4M1YMJ=RK9U(TSW
|
|||
|
M^%#!G-C,)[;?Q(]UUFY?,68O),V9;=TGB^%(JRRRSL3<4K0U':@)&B+Z\MQ3)
|
|||
|
M>J<-.T7CO*G>15O'4)AIVMV/T3XAI/HM/KZ:'$!2V6+I8+V>L!QUK*4_<0-IC
|
|||
|
M%]X9WA7XV/R<O/<PQ&'+:1;\9*3EZG&;5'=>2<B=%[X5?&I\\P/Q"4*\[Z`%<
|
|||
|
M?_'D_US#8\\W*?'`CVH4'OE?X4_+L4'TMDTF&2H('@RWI?'_J(\_4:TY0JOX$
|
|||
|
MS@1?^WWC%;[S:/@_`\=D2W>30IV)28-S;`WF?:BRN3`QT[&^42*/JP'C.#/DR
|
|||
|
M?Q@#V'**!8^,=&R_X<)->MM>IL:_^\FZ#QT/[6@\0N)N:N5CJO]AW_"FVHWEK
|
|||
|
MO,>A.S2'W1N;9.KTF?XGP[4;:<A0DRCFZCX4-`>T?`(D*F)401`D?#G=K\M*8
|
|||
|
M%O*VR5)IPGT"F:DFF207,3KWQL@$=@*YZQ,\+^R2J>-S7I^8&7!_,5Z_<2S$?
|
|||
|
M:,:H[NWN$Q('700*N\N3#2>Q<UP9A<M"Z^Y5@QM/!I#LS^IN'&'!%':L>P"94
|
|||
|
M^:Q3:_*O(RTJUHEGDQ+=8+NV&[CN?#QX<AQ,,R<G*-GXP;D?_0R%-/H8+LH=M
|
|||
|
MZWX.&GZ3'?0?GZA6YBDWH@Y\&N_UV7`\QI3`?<'5J?I<A^J(<H;).O=[0'AR,
|
|||
|
M'@@K^43,<W+%(;^3M&*8'`=OL_#+TBZ$K4CFXGI$\)0LV.RELD^-6<TCKU/6(
|
|||
|
MRKQ@+P,#Q[KN7MKT-5[*Q%4HI7B-*3*[(UH0/+F`HC^EZ#/1LX(G2P4S.BT$.
|
|||
|
M3T($(Q*]-S)[-^9X<<<:'ET<\F-%=JG*"?4C3/M0Y>&>8R15W=@`\E3EH/Q^>
|
|||
|
MP=<]'^)*9`?."U^%W#@[3*W9'U).P&B#.OB/=BY"=;A>`3D,@=SE,],?YPI$O
|
|||
|
M35O0TC6@P#UQU-19`K+@28/O;!Q=N0P]SF?&+,KE8SV8.#CE^KMP<$2?)ZA/M
|
|||
|
M]I'R$C4C(/$AVZ>Z72&+ZAXN3U;=)_@4&GZF/T3JL@ZV(.[VL`:S,J_Q-"VP<
|
|||
|
MY6EN#?P$8"/[:K5F_BR12+]>O.3S1&(N+,#V:NW!CQ+)'/W/T\$K7R:)KXS30
|
|||
|
MGAM+]M;7^,U7VQB'L;3I?KQ2EEIZC>7!1,ZJ:+N)*&GV;"&\.%[SVT;M!:[^(
|
|||
|
M1OSQ>@;KI[@*M^,@:19W?*WUN77TEZFJDFE.:,@9_#*QE2?0_4)<&WJ"!#+/:
|
|||
|
MH',&1^U&\.[/UF>B"X]6D"8I[;S3[%C1)B^4`Z-W*YF*"@_P6T9+<#(.R14QH
|
|||
|
M3!0E'EVF7O^PD0C5NRU0_@MYL-0>96JI47VKN&OY=+7*@.7QHT"QI$R`@/4Z6
|
|||
|
M7IPM>Z=6QAP/ZM*G^)00I0Z>!$NG%Y>)9-1IR2C>M3PCN-(@*2UE*'AJ_JJ?G
|
|||
|
MHTS8\ZPIPU5;AJQ.-Z1;L9RHO#85WM9U/\+I*C%I/5E>$SFTZBUJV?!$@\NC,
|
|||
|
M%2$YT7"!M@I^#NVF&P:+<0B-F$?6LK(QV-75"DSS_"=O'DSFS"OH-ZN$?B==4
|
|||
|
MC5]M#NEG7=B\?JQFM!PVM%^=8:1924>7EWN3MSR)OU#\MWI<Z=+%5O`J:?7HZ
|
|||
|
MPH1Z]55&U9.?N"NO'JL8%Q)=D*7N$\%VF)V*W2=6'8*'"55,JT\RS".&`E>57
|
|||
|
M9'I<O3<_,<DSF!R#KN>_,^CW+Q[MUL,)X3"3,EC"+,$S#TMGJ.-,*8;`%!'FA
|
|||
|
MFV_[47'<H6^35-IOOM5[H)Q\--N^36LTXB]^V]?H>++1(_1&S^.-EA/OXJ)%X
|
|||
|
M;VY\U:?)NI+W@)QT_]#M/?Q,2]=GB4N:<>:-K,`-H9W'OWZVYYUQ)^_O&7C0C
|
|||
|
MI8/K+:D[M:KJ^*7-:@<=.7M2V=1>G#^_^55X>B)<G1BW(TF>+"])RDL$-3]4G
|
|||
|
M?\=QNM^1M'!OX>XM=!*5X<?3N`6!:<&6_.`IMJIS&]\W=->G"[;.(%>$QFWDA
|
|||
|
M57%F!G6'[OST'X[M)J))N\U4K-[&L70YD/A6OR7XSCM-<>%P_`.R2)GV?@>+)
|
|||
|
MMY(LWDJR,`QD\0JQ>`8L6G5[07J'1$H3\].O@M+D+5W1[N&7G1"UQ;T-^56ZO
|
|||
|
MLEWS)2D`%K[1DR&@6L>[!3YBG%K06T6JV\V$:$U=`_;C3Q(HEO!=`K,#W?6M_
|
|||
|
M*O`V+H"E#!>$TT*S+=@J5QL3UBCVNJ&A0>$.=5A3;LAMN8D&"E(>056/]?FGE
|
|||
|
M<8O)+`\<9<Y5RV](K)@WNUKX4T"C@-!M+[^5:QWE'LHR?W?*!FD/KO%X5L%0K
|
|||
|
MRN5UN0>.9DUYYD2Y)U%^\WS]KJ":W+TEFDZX&<"L<<#QP&\)M$QLLINC&8&6X
|
|||
|
MRP%;/C/.\!])YF@\OE_B'LCZTM$MZ^WNXWR_(Q\K2`L[N5GYG<*@X5@[#^V!L
|
|||
|
MV4*QA,\GX"R/5#XV!YK:'&TV[9;[821J=S],#"9VM[LW"H8;7!RLIU%M=S<1S
|
|||
|
M"+G7AL\O#\1=CO6'S.1,<]#QXJ._Q?;4I`2:GEY%%+CG/#W4<;];V`(>;[H4+
|
|||
|
MM@`-/W%\;?`E&8SO:'P+\9V&KP??6_!=C&\`W]K+9*D)<`.^K9?+TJ.`)P'/I
|
|||
|
MGRQ+OT)X\M2^[[.(;RTBA\2'T=@PKT!8"?"CK(Y#['41H^`L.3VAN1_9&DI++
|
|||
|
MYW(?(90->G)'O]A[_6*'^]BF<I,Z0W"P0<"/02-2.X_T!5]EO-#.BHPT?M$;T
|
|||
|
M^X(+]")^`@+K;L<#=8"ABH>#%1ODSKOI]@2X&U(X0V>-CBL1N$#O.,?::X`+6
|
|||
|
MG^B<1KK4L4-;31)/"BD;.B\FU%NN=-1PG8$J4*A)3QLM?<<Z`R>V8*+PW1"T\
|
|||
|
M723'W7D1W)C5Y*G0%@W^,>0&Y,_LV4^U";F;HO"J:]K*=&9HZ2O?DD9G=*S['
|
|||
|
M)0HM%<B0>WWG4SH^<I^)9MW#1GYH6=^YGLI`0W9V@/V:\4CAJGA-$VY)8;S=3
|
|||
|
M?C!4T]2Y"$21X8_*!\CXT4J8RF0QEYM$T17K(_:0O)L(6D(5ZSN+B.`M9WK3K
|
|||
|
M1P'5^!;M]<%C7Z8G6$2"X8R$+V$X:%]W#T:26TS.$V&NE0\782=-@YW&SJ9UR
|
|||
|
M/L3$&IG8/?%HU-Y'^[S,>YE(?5E0.R/7X3"<IYX=K>EIHT)1DJ\@A?>J9UN.1
|
|||
|
M>D./D_^<S^IXB0>BER0#!6D,<+Y^>C$MRL?K2`2U^O`R`EK8_C#'1EXHIE/%-
|
|||
|
M`9\)JQ>/(2K60\3QL!4&^NAHC*#1L?TAJC>7%8D7J,)5<[6'_DI#LA[3$D.=-
|
|||
|
M'7JAB!])-W2&Z(Q<L1X<JK1.G*[I+EL]';AJ@B!13)'K$M%AX=H`3`@YD7ME,
|
|||
|
ME:-G-IVGLZA<7_R.(_(JN!3L"55N[/P3+2M,+S*Q8'I%7J53$%Y_[<0QOFU=2
|
|||
|
M"2*T9H+'3HO*A%XE+ITL/5<8;Y$H5],Z^FU;1RT6GE*AASCUK'YE3(3R:-J^#
|
|||
|
MD]P-1)VT42?Y1E6QOOBD(W*NS!?A^K,HT\G.7+[LT6M^#.9$4-/?IL557X3",
|
|||
|
MD8>*1;?@A,2+"G^#0[K:"P<(XI((O3J>!A`Y+TA.'YL($Y?$"Q?PN[./YHJ>R
|
|||
|
M)P:)%XAO0LD3LT@[]A[AQ@N<]M%[))[S4!^4B=[H:;.(58K[8YX]6HQ%8ST@6
|
|||
|
M(JO')P>JA$[=N]23&":%158FB@_YS06'>@Z%_!NQCD3/(LUGM'3#.0P!-K/IY
|
|||
|
M,K5RHW7O:KI),EZ+D4IVUHD>L:MOP)7R85,P9H+F7K$Q^B,A[`+QI3!/5&RT-
|
|||
|
M[EXS02@D\"Z[AVY%YN'X]E8)K6G,SHJ-L"?[R;^EIBE4L1%Q^6TA@I3S0(+ZL
|
|||
|
M#0<:#8NX'_/4N[0'T(#KB@^MZJ)R*ZC2/6TEM)1&@BRB/%95/U'["6BJ'-O7)
|
|||
|
M434\6@TUF>JQ>E4![J^:"MX0G4)=8$*F:$[@*I<(60)7C5.&(30=BJ#8-#O@>
|
|||
|
M!P$&LZX#"[7E&AR0)HB:BD[@M9JHG>SA97`"I.'0*^8X*/&/AZT4\TTH.*VVV
|
|||
|
MSP*7,=3=/*%?6<\1(R(@(VX3]QY>8R%!ZHKIA;FT]43#4[Z@E(R8$,OZG.YQ$
|
|||
|
M;^"B!0YZL5!&IP9BH$BPD%>M.^8%\EWBP)-W(X2#]V#>1VO)R1"K]>RDOA"JT
|
|||
|
M6*N=TY.6I'Q*==#V=D.:TID\9;!QDD^W'OI;'UR\=/,;9J'X2LN'TWD:+D%0\
|
|||
|
MFJ1]_':YS]/_*([`?RM_7[8[D&TZ\L'LL:IS8`[NS(%9ZV.P0.&M[T#]E-\$S
|
|||
|
M<8:;J4BU(W(7K"Z^83I[<[5F`_NRU*7W7[D2VMKO_HNTV^-TM(Z5Z(YZVKJCX
|
|||
|
MU+D6.3;PB@KTFZ^G%P6X:+7T[`T-OEY_<##P?00_7NC]D%U_2KLT1W]79H3B(
|
|||
|
M_BI7W&DX!W'_%/XS(-6%U$SA4<SQPH+QRE#=YTM)=U9#JH%2?SE4O*P[(Y4L]
|
|||
|
M"XU#DZYAZ4G%WSA^*7QADA['_3R2TGU]X`>AD'/B2;6M(.:IAV_E59^0),)=8
|
|||
|
M(1R:R+5'[2@^[<O#@7].-?<?YNET](Y'IB?@MI0UCLX$N?KA/K)2EM^-_K'/;
|
|||
|
MI9D.$FE=)@W2.P6^>)7.R#09=^,-UI1G;H_Q<=Y1)1`S@^=@X.9J5^71@U*Z3
|
|||
|
ME>Q'8>!=F4CE5,EUQ[K7<=]_H(7JJ8*WJZO@:!'7$C`BX%`)CQ'(Y1@ZZNTTU
|
|||
|
M=T#8[[BO,OR'I#GU9U5II4?TQB<]J,>$_/1BHM&^+EDJ.:`@'T1J/.HC*G]72
|
|||
|
MY-I$V)A]198R%ATD?U4OS^;S+3<Y-NE%@NF<*NK'Y728[P`7N64JO*1J+,NS4
|
|||
|
MDFW#-"%+&ORR<U&20WY_:H43'C"5SL[1I$8,=%;FG9VO^QO(F*0RV#G5=UEE[
|
|||
|
M'O?$DO0S"CW[J#P!>4`C;:O6;OA8-#94T07K/:'575%8K[HH`"M=P7Z,_9Z&N
|
|||
|
MD7S@CVMN(G?CB'1<=I*[7H<N5F8CN4+3SJ/D"DU^@QL"83JU1W,X$XPP(JM@,
|
|||
|
M=8U'LV4;^=VTZ%G;6%9;F6P+MAHB=QODKE+Y;=F&*=LY#\WDAZSU0AS01&U)Q
|
|||
|
MFT7;LK]G%D52WI5.6D6SM7DTBRIQ"V[1$_NFV&SM=$Z_*4;.H1CBY;>H;7`!*
|
|||
|
MB+Q*VU5=@`3=G+FHG;:>;+A<;?14TT"_HF>?RG&^LX,)W3LT8UR-/6*?BL658
|
|||
|
M8NV/RZ<+>E<\C;J$N$ZG<HTT-9IT5UX;?_0#/]GP,)ZC6WK>>=3Q4F5\]#N9Q
|
|||
|
M._#J*/[!G7'U4R'`'CWP25VBSWK6HC_7T-UQT.=/>NC)S.`;N#@;>"L_4!X'F
|
|||
|
MBXW*L,TW4X[2_,VW<CA<][2#>TZQJ<^_SMA?:O?E'[UYH<BWN8Y#EW?S8@2\(
|
|||
|
MH=(Q?Q<G_7W,F?43\E=;YH0]QAUWA0?3*ZVFRF\C-?&6-_!(ZA,6>,/<TNJ$4
|
|||
|
M<7(P>4MZU9BWX)17_=H[7?L(F>9ZJ[P>;S6]S#+I8KGU'WB49?_G'F4->%.02
|
|||
|
MDK_4%/[>K,G];>!*<OB4E#L"5RH\<*ON^(D6K0*X%D;Q"MU#%*A[==24`:_0`
|
|||
|
M=&K'BR/NY<^E8NH.Q^];X9+OI6=IXA]_H1.MZ>-/)1=TX`66XT5>>-(1-;9J+
|
|||
|
MLE?]:D`)9*`'>_Z>"KTZ!X_>P)+^3Q[EJ7S^-_@#(O;>0.OF_TA7D_TI7&OI.
|
|||
|
MWFE4C(5[H[ETFZO;WDS<?J:^4[@[7&N?,O8EU-:771H\:?9;IFRFF/(U(MQG@
|
|||
|
M37BYD_/6!6#3',T+QCR*6?P5@U1Z9/B<R/`'(WEGR[OE/?(.Q_:?W0\FR6=7"
|
|||
|
MP>,EU541_T%ON_O@N7B3?[!_@]!M=Z,ZV^K(GMVCGGKZ:6^[B2+P>((F>D.;K
|
|||
|
MB1XXFMM,]PA``^MI,]'`#FLWK:%90O9)TVH*M9G\`O@$4`2@$<YOX\,RB^X8Y
|
|||
|
MMA#_"/S&\(S_Z:>[3?6(&GS>0.W[WT;\^]3V]!JJ,;Y@BE%'JL\Y:,:'P_#@J
|
|||
|
M`F_Q)9XR4D\Q$N?^M0V[]S]!]0V[/WR"*MQ)MW+(VF%`/[R97DJD<E>_=Y:>]
|
|||
|
M.<1ZHH'_$8/^A!T#"1/*F_CNH@P_2=;E>7,4+E.OXWKUZ)KPSB=2;T0W+493I
|
|||
|
M>9TV+:$0U<K;Z#]VB[S"WFY:"-0@<?KCX1SN:^G^$*(7W@AP[GK?HY%M9"I/Y
|
|||
|
M??)6\@A&-H(EE"TW>"6%$XI-(/'V1=I$@2=^BG+ZCU'$W?P][4)[S'I[['TC[
|
|||
|
M'1V.FWOX@7W&&H^0K^Q8FO[6'>J.)]?P,M)'?A,UU)AX@L9_T[TB3).@[Y[I&
|
|||
|
M[UJ-&?_<:LSX1UZ^?E]9V?^-9=F^IZSA_W59MG^DK.SO*>O"_[JL[/_.=DW^,
|
|||
|
MN]KE%&\MZ$22H4ZB61SL+8&F?"7-?=@&>N&HMSMBO"EB?%C&W7L<#^$^:JJ!;
|
|||
|
M:Y(E,MPJM\KO.K8_2G*P^!"XP,&RM]2Q[B]TL=);J@S1)5"7_K=$GJ8_(Q*=&
|
|||
|
M`='09:$'(^'@'_B&^'4X^#P/?.-U;&]\B6L1[NZ`_VNX?N(PF.'=ZI'HSO,"Y
|
|||
|
M[/7O(+#-`X+*$Q%WUQE"]AZL6RPEQ1-VQ_AR#+M/<$&@K\>PNYM+@]0J5=(D`
|
|||
|
M:9COIX$=B2:N6.C+*,1[13]730N>@G^O#/5+["1H4&<G:?<U\;+@:280;_0F'
|
|||
|
M$NGO6296_^U=X9="^!R#\#D2JMS_[SW^_=!G^%TZ%#OR=9[A&S;#-R%Z$Y#OG
|
|||
|
MHW'M[KU"ND)(E!-.UF/>QG8DA_Q[HQ,%.IBPK,GRJF^CT[R-.V!CR$Q%>D%81
|
|||
|
MV>%M;*$<%7LC[HXSMZNTJY7_7XJ0]/LFW,-7UQOJ=F*XZPW).WS2]S<>)?LGQ
|
|||
|
M78&FT$38WH\PV4V4X;>)]&?7VF-T"2UK*W8(;)I]@=M?<$%[MII%H9:/#<$KQ
|
|||
|
M>`C/3V8%.W&%KWPA'NB,MB;2WA3434;96APG<SDAQTK2L;.US[\@&W!AMS6Q0
|
|||
|
MVA/RQV'FSGN!3D#JGIX6?D0R/#\*3LT!%,(";P80=-&CT,";)=PQR1@XX@CL/
|
|||
|
M*&W*#1QU!':6-MTNX[@V'0>9XIXU?VH;^$R+SOR%S1$\[/''JJOHM*1?$JLUQ
|
|||
|
ML:0AH&$XM^L4[.]/@,=?A&XW342U716X3\HJHJ56<0*FHI6%W?!-\"T+RX7P[
|
|||
|
M/>\*N[N,KS4?-JJ5)PS39.SU.U\KW-V]T^4S<:?)[ITEO@PXC;MT]]Q,A$O()
|
|||
|
M*GX\:D4PP(.J\4KJADSW\9`(@5EPAP%F*V-XBB4!8=+D[U(>*NPN3%1INTS<_
|
|||
|
MPWFPGBF+6.O9HKDZ<FSB$`Z&(DQ<X+^R^G7];V`,/&_1/:-U[ZKAC:?($7:U0
|
|||
|
MB:NGH:R[R%M[>ZC#P=GNZ<%+G$+_)^TFPO.;OZP-5OZJ*&TZ_>\$MVOU':.`B
|
|||
|
MAT$11L5*"[1^KDT8![Z+^A]8MV>>W]+/.^':X3!;&IY/1"KB+?"E;_F8!7:;P
|
|||
|
M6UIPS6:Q="N7X(Q12<>Y&CM^E'S\^//PLY,?.*IPE//,IH9=E32RY4L!>(B-`
|
|||
|
M^SNS-?1E^Q__VQS_/65]CRAS]I]OU9@@)K)YS%!C]/:S.5%?SFVD??Y%9O[W5
|
|||
|
MVOB1)S29'W/2G@$H=CB13*`_'3:4^RZE.R;Q/RE#DPMO2Y'4^`7]*N_K]L_D"
|
|||
|
M#7LZ#]?_"QYGG)]3[]%3`H1<6ZS5VN.X#>2>4C$5FU5KGSQWQ_L<@)-BFF?*;
|
|||
|
MK-;J>";>_/C\`2=V4=Z`8S"*_@ZM/4/LW+%_2,G^/J7M>Z:5[1^I8"W=9[WDK
|
|||
|
MCJ?+I+^G?V:<_I[^R4=^K3[?`Y>A,W/;1&Z+U..VTP'<=W:/^(N>OIQV$TDTB
|
|||
|
M,LK04QJBX0_[TP<\^9XE97O/JL_07CJ5T/^V2'(>&<G32<EMUVWMDO@C($11G
|
|||
|
MI852U,GZVOO^G(&E_T0L;.;O\=QQ;J/"PY^DN8J<.=PG!OSQCK[YF&ZDM*.&M
|
|||
|
M@T^ENLPI=#;K#%]6-`<FB;.V<3-"[C;NS6.',J"=U(D;QW#S9(*NTC$@PD"9P
|
|||
|
MWIV.:NWED_K?(]`'A/_)N]C\?O9@I_`.[&FGO_2@9&_F?_A!&LO_[D,[L`%ZC
|
|||
|
M/=CX-FV+B*$Z/@R@,^2WTY4!K)[DO!Q7;=N=NF-,^UCZ?WY>219PQ;R=CL?1Y
|
|||
|
M+&1$7^"JED[.H[/X'4I+@(:5'D2/$":7(:`B8[V9.^]&A4<Y7MFV!P\S%"=ZI
|
|||
|
MQC;#9X^.0CE1&_U8Z2<3'76.Z*BAHJ.<Z*C78J+M?%\E)G>!25!S^@8-^(DZ8
|
|||
|
M@GN<T:S@'A?,-7LF1EEP3PFF'Z]>1N,>@O38H.9$O32G:C8]M.^;"2[>TQ<&\
|
|||
|
M$TN4(;I'@!GGC3X#TDF\E>I7$7]L*E?>ECGKC=K9Z4G5&OE.H)FVQ@H[J0V@[
|
|||
|
MQ>X\-A$C98'/57['T)72%/3UV%<=8_(/:O*E03-^:T\B(>YV!OXQF?\+/X_PS
|
|||
|
M%Z.+/FOI%_M5OUBIG!Y;RM)C!_K%RHWIL3_UBXTTI<=R^O%<W2]6WZ_TS_O%(
|
|||
|
M;NQ'N5;ZX?//?:8M7;9XP9*%KK)QXUP37&5+[UJY[(Y%=3Y787'Q):YDXC5+:
|
|||
|
M?(LO2LLT"';+M&_R,QRB:A,FRV$^88S2/#HK_)WU6(;_/,N6WE[;T%"[T"6-!
|
|||
|
M72BYEBH^UU*O""^X_?:ERA)?@U2F+%M6B^JL=-U>5WO[3^Y8L@@$#:[^'VEF?
|
|||
|
M[8I4EBG$84!Z6=V")8M0SIDTJ,;8!LD&EA?<SHD*4O$EM2L*D&RS2>XEOMIE7
|
|||
|
MKJ6+%[KN6M#0L&+ILH4N[QV+:XD+:&W3$78M7%K;X%JRU.>JO>>.!M\H/0]X^
|
|||
|
M_,-YEM5.J%MP^T]T<E'+OCP+%B^K7;!PI<C2,$I:H>=J\"WPI6?YOEP7_Y,?<
|
|||
|
MZ>_[]_]9(?\D8T]R4'CW5-ZU<`%UXO)++IHHS717SR@MNT[R+A7__W*7=-M*N
|
|||
|
MU[5+ZY:XKJZM758K]?M?GOL6_`1CZ%NQM/\P-[AH'7GO6+*P@<\!Q*3;!TS"E
|
|||
|
MBURN:WPN7UWM$M>BVB6URU`#9#MSRDBW+UWB6W#'$IK[2Y=@)2!+0VV*S7B7Z
|
|||
|
M;^G_:>]<@..JRCC^?3?[3K)[-[MYM-V6;9-`L@TAW;;0EE;[2FFA:4-;VP+!T
|
|||
|
M=+/9;6,VV26[X:TB"-2Q0NN(RE`!1WG)\!B$<4:J%D7ME.H47U-G!/$)"`)B7
|
|||
|
MIW:T6/_?N6?O;M)TK%(=Q^%+?IMSOG/NN>?YG;/WW'L3S2>N3$4+`T.IZ%5(.
|
|||
|
MCY(C"356VM]U197$A[2BIT5.FM;)&^5?3ZLDNCVC_WZ^2F+WB=.0UKNOKZ*,D
|
|||
|
MZ9^GDM;I$O+]LT9<DQB"11)#=&+,==K0C8EX>K,GUONTIG>R/H9!N\2>7)K[>
|
|||
|
M3QJQ.!.=4N0-V4(B8T>-VO.E==#I'-J6V">>+G)B?GCQ6#%LT8JP$L<$8H4WK
|
|||
|
M*/%,(!)ZJFN'_[2\Y&?%:YK<R,!P(1U=$$UGLHF"F.%<%AHQ!D.)@C6#9P:&/
|
|||
|
M!U/]E$\FAD\M)B0>*IW3#+#-B>(U)LZI3U[_-8'>,-3M4>_)>_*>_->E13ZV+
|
|||
|
M8&1J_A=E<Z#T/6Y#5S>U-S4UE9D/2UC$.$&4JD(^',KOM*44Q^VK]55Y#:/2F
|
|||
|
M"/N5PF,8-89AXD?$Y?;Y5'BU$?2'#".@PY7TK%^Y9%UG5V=7S]5:VI/Q@;+Z,
|
|||
|
M'1[-9%J)PF$.U\J$8U"XPA'VVMD(ER10'_#@CSM<9ZNJ2Z&F+Q`(>'SAL"M<S
|
|||
|
M4^D/AX/AJE*XLJSF0LN^]B[K7;%J=6?OJC4KUB[2^9!-(/O[[^)3KGI)T./W4
|
|||
|
M!KC"9U8&JVJJ0^')M5/(J(O43VV8-ND,F7[=[ADS&AO1)LWL)(=!_MI)D9GQ(
|
|||
|
MA58"U3[YU8+*<SA=F$'#M<Z0O\X9-*:UMK6(J#].9VM]O;]<`FV-1EL@AK#0X
|
|||
|
ME`@:+V#4M\1",1W:Z(^TU#<VAZ`J2EO,<M?%HD8HXG#YM=X`9S8TA$)3[:BEA
|
|||
|
M@RQQGN#0THC#)I".T,02C86BH=,@J"_GS@XT@.-E[&F2L47>,L!'ED\TA_Y_6
|
|||
|
MBF]X6SR;C[=W;NY4_A5+.^8=-HL=<]G&B6JBJ)M,I7@3K2Y871,B]<)]<?O4$
|
|||
|
M5D(QC-5]7!)>46GY)8VF,;JWE#L*FH'<C#,+S`9S@73_5:!;KLN2/+1/E)&+Q
|
|||
|
MLD"N#,I#FO):PB?EM3W@(/@=D%?J>Y`A65HU@&;0!A8!:?J+P6:P%0R#Z\#'Z
|
|||
|
MP2X@#_8]PO)`&I$\AK4?/`_D^<:7P6'P-[968D$@M^'-`7*C7A?H`SEP*]@-6
|
|||
|
MO@*>`=\&+X"CH!&F>!.0_T.2![>!.\%N\#B09P7E)1K8X*?GP$'P$_`"^"7X5
|
|||
|
M+9!_LB(;`"Y0!:I!$-2!1A`#L\%BL`[T@@S(@QO![>"+X%'P-)`+V<^#%\%;3
|
|||
|
MX!W@0W,&01.8+3N88!WH!1F0!_*HXG:P"]P%'@:/@:?`M\"+X"7P!_!78&`C<
|
|||
|
MHPY$04PV-8`\^2D/<%X&MH`^T`^V@BO`#>!FL`/<#CX-=H.[P3W@7G`?>!`\X
|
|||
|
M!!X!3X"G@>R%/P<.@5^!-\!?@`//[E:#R:`1=(#Y8`58"WI`"HR`Z\!VL`O<*
|
|||
|
M#1X`3X)O@/W@Q^`E\"HX`HZ#*FRBU8(98":8!Y:`-6`3Z`=#X%IP$]@)[@3WS
|
|||
|
M@\?`'O`=<`#\'/P:O`F.`J>7R`^F@"8P"RP`%X!N<+E7;E]$^WCE27:B:\`.%
|
|||
|
M<`]X`GP7'`*O@;^#(,9O#"P#&\$`&`19<".X`SP(Y$T=/P-_!%1IC>$&6(DIC
|
|||
|
M&,53:1K&<3/60C&:26V$*U'XC&,LSZ5Y-)\6T%):1LNIDU;0!;02X_I"NHA6"
|
|||
|
M4Q>MH;48X1?3.EI/&S#.-](FVDR7T*5T&?50@I*4HC1MI6TTB-$_1%G*T1707
|
|||
|
M7D<?IH_01^E&V(*Y=`O=BBVV'70;[8)=N(,^ASV$+]!=M!N?]]"7Z,MT']U/=
|
|||
|
M#]!#]#`]0H_2X_15>HJ^!KOQ==I#W\36W#.X]_U9^AY]G_;1?GJ.?D`_A$7Y)
|
|||
|
M$?V4?D$OT(OT&_H]O4JOT1OT)KU-?Z;#=`2\0P8[V,->]G$E5[/)-7P&ASC,:
|
|||
|
M==S`DW@*1W@:--.YD9NXF<_DL[B%6SG&,[F-S^9V/H<[>!;'>3;/X;E\+I_'S
|
|||
|
M\W@^+^#S>2$OXO?Q^WDQ+^&EO(R7<R>OX`MX):_B"_DB7LU=O(;7<C=?S.MX*
|
|||
|
M/6_@#_!&WL2;^1*^E"_C'KZ</\B]O(43W,=)[N<4;^4!'N0ASO(5G.=1OHJOU
|
|||
|
MY>OY(WP#?XQOXIOY%M[.G^!/\J?X=A9[6+3KIK;W,7*JJ4!L\V(PR3)#5*_M]
|
|||
|
M.NR\1*VPOI2Z[/A5.#@"[D*(/.__V0K+QF-6,'42?MQ681R3ISADVA8%9@QQN
|
|||
|
MAV7WDZIL?[U*H>1O4$^;^$F.7XE;_2J0HE=IR-BK_3[MS\'O,%7W5?Y7M+]*8
|
|||
|
M^^6]WD[XJ[7_&/PN4[E)RN/#`LQ-"Z%MM<LF<XF\<R^@"R+'BLW690L4R_8X:
|
|||
|
MRN:&QM1IN9`6[CZPT]F#-`[(2P-T^;'D5?:>R2N'!(OI2&E-G*A&UU&E*74@`
|
|||
|
MBQT/\E=C3%;'&W9^#9):+9W'@T^LH=6\)_F]AJWY0^<W7#S/L\>MNO"?)+\[:
|
|||
|
M\2DO)#\;;FDA>4>NS`5,?DFG=GQ^_2J_08-5ZS2JEI-PJ7MIQ[JR-J]7/<IJ_
|
|||
|
M4SF70Y6QU`8N.CJF3-M13Y^OL-8#TCOD30Y/E?(RZ>1Y\>F51/T$>;'.+?$G`
|
|||
|
M:_^AXU9_FJ+]!W5_C=CI=>G:");UW_IQ_76J7;8#^OAI:KT51%OUZ]8/TI5V\
|
|||
|
M2D99W]L[IMS=R-L6A[4^DG*O(6LN90I(N<\87^ZHSO?X<A[5^9ANER-$UJ@)?
|
|||
|
M4OFXG#&FC1K'E"NL5G?EY9QF]\E9*G_EY7A]3#EV(&\[P0'#ZI/[#6LNUWVRU
|
|||
|
M>;P]V8-(>\$1/>8.DS77Z?AGCH\?T4O3.W7\.\B:XYB"INZZ=CT5=+V7UY-'?
|
|||
|
M^TWM=^N^Z%?K6D^#:^FR.>T='>H<UY<MJB6=&MT!U7J<3".B;:D?.?&9I%>]Y
|
|||
|
M5<I?HV+-'N>?HZR*^*<K?]P.'U7^<\;%[U!^7&<F>0E&1)TW2CF797/%O=IMU
|
|||
|
MV2AQ?\9MV1EQ'W-;MD#<RSW6>!;W08\UGL2]SVOU,7'+_XA[2+OW^JPV$/=;]
|
|||
|
M>@U1@V9H",J$(%9*KI282A>Q=:VV+FKK8K:NR=;-M'4M2B>6J<W6]=NZLVW=;
|
|||
|
MO;:N7=4'Z[;H%IL-MH&KI>_)\R+Z>\0^(&\RE;L_CI+U_:&)K2>*]X%#X!5PK
|
|||
|
M3-E.ENNQIA^]H]@G2-E+CYH`B_X:DG]48!EPZWI1RPFZ,'[&ZQ;B9[SN.'[&Z
|
|||
|
MZ[KQXT%>6(UP;UE^F.1_(49@3[Q49=(XF:7&:*7I00_VJ9Y89>[$U0>7(RI#X
|
|||
|
M1/45HK?_5/2?J\:.^`LJY#PU+DK^>:J6Q6_UTOFJ^"7_`E7_XK=R?KXJM_A-9
|
|||
|
M*JXIZJSS*?\B96.J3;0<QK*43<[C-TOU:R#4JN]"F=]$_`JE*1(L.P9U9UII:
|
|||
|
M5R4S`WT]R8YX^Y+U711,+NB17=Y\C_[*G"3'$+9AR9%,9)+D5ILRJ1%R%F27$
|
|||
|
MAES6]BZYL7^+K=D"N643%_<,6`YH$80]+J41AVA<`\.YT4*<G.HOTLRD$B.#J
|
|||
|
M?>3XT.CP(#G5;CTY)#89Z1RYMZ:PJ9#.DE=4^5QF`*%#V?X4.7.91!(G+Z2&(
|
|||
|
M<@@CCYQ3A5=DLDGR:'V<7"IBG/@:XJO))SO4F51!RN%`'@KDE.3B.`J[R,YL%
|
|||
|
M,CDZ0A6Y;!YU,Y+J'RCD\0<A/MF7MC14B310(9;'D9;R.=)2.&=:[DD@=WHD_
|
|||
|
M)=M\Y)$P51:/A"N7!"J'*S]P;:JW0*XTSH:_#KG:1NZK4*LCHI:][5Y50]GD(
|
|||
|
MH(0C9SER]8VFT](&F=25J0PY^R05U&I>RHL,9!);\])`@\BSD4;&MDGV3/3*C
|
|||
|
M\GL:H\S*WZ+<AK*6XFZ&?K,U9.&&'G:M`S;O++C%5LA]Z*T8]UNP>)3WH\X4Z
|
|||
|
M.X`)0FZKE(M,'JST7F?K&DL&7?P?4$L#!!0````(`"J76AS;Q)1TUS<``-Q?9
|
|||
|
M```*````3D@R1$]3+D581>V\#7P41;8W7/TQ/3T]DP\@!$0-@T@$PY=$00A@A
|
|||
|
M(,D`"F%(8$)`B"$D)!`2=J8G03:$P7&%F0:_<`6]NB*Z*LAU<8T:\%X("21^7
|
|||
|
M/+B`'WSX#;KV.*BL:!)(F'[/J>Y)`NZ]=^]S]_G]WO?W/AUK^E^G3IVJ.E5UT
|
|||
|
MZE15XZP%1YD;"4/LA!!-F\?[B/Y,AL"0#N=R-_E/'H;\W^?_V\^^-=S(0.)F`
|
|||
|
MMF[TD4'*2)8H2</)@Z>?>Y1L$AXF@:1-)##R):*N9PY-#A*E13FY5UO7^=,K5
|
|||
|
M9PLSDF\W>5M]1WQMIP*Q0;*7(1^<]3>)_K/M@:0'R:;3*=\IDQNLZS7">LP'E
|
|||
|
M"!O`2,OS,>ZAW.23DON&5_D/?IR6]J/[&C\D$-GL!RKQQAX@\6D_5IN5RV$NF
|
|||
|
M]"FC?,&=#B1MAVH\3YY]F*2<?+"A[LZ\(X,*/OCVTH/'E6\[4AM&/BAL9@\\F
|
|||
|
M;MO[?$S*7SHO[/)/WB4E5$WS37Z4<.[T:K-O\A:2Y!Y7S\Q_BR5'!KEOKENF"
|
|||
|
M).V2`-GKIK_%(*E?^G,OD>D@>@9$).0D0/9PH85,'3DR()#X.`G$;B-2@VRK%
|
|||
|
M3R</-KRUBB0WFYG4[VG9^X,V*%X]2K2Q&R$\`.%^HHYGG*K92AE<>?L?IRS_8
|
|||
|
M2@H6-[GR*#&U03F_=Q1)9GG?A\1QIFW$W3&R9>\U9-\HHGZ*?,JYNIE!!WMD3
|
|||
|
MT-Y8LF\Z"7U$DNK);4<&!9)DZ)DJ4L_3R&J(K"'U)AJI@4@MJ1=HQ`>1^T@]M
|
|||
|
M&;+IW0=/[]O.'!DTL`E$##F<*$/K!B;5\P!7Z]`$L$:'`D`?PJ;UD:!-YL=\<
|
|||
|
M'6;K-.6$\GG:%_+@9-\=FMR?I@C)$Y8Q83[Y]F5,M9`<7,8H'_B;A/"IM!/R^
|
|||
|
MM<II8$0E:8)L3M8*6'/XU60M#UZ[FNK2:4<T[4TB^UQDY(-)FUGU.ZV>(T[U@
|
|||
|
M&PL:E'G*.=7)J;%D.:O>?YW_$.@J3!8U`7G]N7K&E9>JI;:V."*$M#@Z&;*<,
|
|||
|
MJ`7(I'YA+CU.2H_;U)-#_8?XY[)CPGVUL=DQI1&R^8'.B%-](]E_2-`<$24I9
|
|||
|
M.Z9M&FLG\I>8KNX>`KE+/Z19GS:RAI:P5^1=@WF7]Z&1S0_L!DKQ&*3<9%!6E
|
|||
|
M`2674HB>?(P#0<LM:DU_$+X\8;E)O0<JR9=^3%3U&B3%JH68I%5UEGY%U`^O?
|
|||
|
MT=EG(:WT:Z(V&4P3=:9(Z?=$_9/!-)0RG2?J'RA37Q#.4>&7B*H8^7CDH54I$
|
|||
|
MC654KY'SAWZ8VG\YKQZ_%C/8&76!D>$#3,HK'<6HTPWF@T@I36?4<0;+'B2XO
|
|||
|
M2G,9=0AE@0I0>41OOQ6;7+J0*8V-4>?=A'ITQH2>@MG@C%F>MOF!!F!)'6*H]
|
|||
|
ML0&5M@TH2;<82L/(4RSDHE!7XN.C(6YM\,Y'/=,LTX$:'FUDP<CC>I95T<0B8
|
|||
|
M/8L\Q$%[IG01HXV],T;]&OM/5\<]0)D9HQY'BI+DU(>"MU^/8@<:,KC05*V+H
|
|||
|
M0\[LP7%YE,XQNFLL>8=,TPM<J1?HZ2YPE5Y@(1U^H`PU;3#VJ:.S.S,7>O@R<
|
|||
|
M[<>T`2!8_;&O*P_Z7*TS018UZX:"Q>_@Z/>?<VYV['&J-3!(68/"EJYAM"I>(
|
|||
|
M_1HTRP<<$="6`-,E/FQ!`<=N`,YZAH2)P3Y1O9,MK6'4I;3C)/6SOOB.6\ZHU
|
|||
|
M![%+2]<QZ@Q,VNPXY"Q]@E$OC$#U0D1]6`,R2.]5^A3T/\W.J,E"E!?ZO!\J[
|
|||
|
MI?0U1C5W23C"J*]V2<CNDG"44<\FZA*^-D5Y8?9]-!(E?,NHAQ.C5(95*[LD^
|
|||
|
MV'0)<J]2GE6?-23L0`FEUU)V];,;<=S=&4/S@L7U4XG7LZJG2^(X5KV^2^*^G
|
|||
|
M2%3B!%:=;4AT4HES=(D*E3@SABK0E:=4\<L9E_H&`:K2[M>6>FTN]0XHA1T!)
|
|||
|
M*V>[\D4S`>.]2-?V<%?>9L>'B<ZDTEUD[U"B'A%26Y?3[JHB>G?Y:R-+O7%(*
|
|||
|
MZ1B!,G@"Q.4L$G)UEDY_;:?!<G*$7@P0%4<D76E/;0U+RF(^R&R<^N$TA^+H(
|
|||
|
M3'%$3!$MK7EMR%\K$"^HX4,GYJS!!G>-(AZ:D<WO6TI26U,UQ2&`/#"G$XARV
|
|||
|
MRG>[))O2JB(U,?5+2?@ZI;93:9ZN',6$"5Y.^7B:(ZVVTWM":0P30YKJ[K,<L
|
|||
|
M3?!]_=`BV-1-?:@.82BO0DII+JNV)R")!=(B2GJ,5;\Q2!GJG92TE56/4Q(''
|
|||
|
M7.,HZ4E6/6"0,M0;*>EI5MU-23QP]:*D[:SZA$'*4".)2'J.51^@)!-PA2GI&
|
|||
|
M!>A_@Y2AGJ2DG:QZ#R4)P'68DG:SZBR#E*'^F9+^Q*H3*,D,7,]0TI]9]2:#E
|
|||
|
ME*%NHJ37636!DD3@NI>2ZEF5H20+D$HHZ2*K_M!')V6HN934R:J?4)($7.F4$
|
|||
|
MI+'JVP8I0QU!22RGODY)5N`:0$DF3MUAD#)4,R6)G/H0)=F`Z^>^2+)R:HU!E
|
|||
|
MRE"_HJ183BVCI!C@>I^2>G&JBY+BU+_TTA7>3WV-)N5P:EH?7;M)ZG9*6LFIK
|
|||
|
M0_OHJDQ2-U.2EU/[]M$U<KVZAI)J.94UVBJJRRAI$Z?^V%MOF*C.I:1#G/II0
|
|||
|
M;[T5HCJ%DBYSZCN]]2J+ZDA*&L6K;R")SJG2\3PUI@F#,.EW>L1,(\?TR"4[>
|
|||
|
MG?$F&OF>1LKTR)<T\KH>^8!&&(%&FFEDEA[92R/';:7;]/A.B`M@2TH;]?@3E
|
|||
|
M-'Y.CVRBS./,-+(.(T8U=<I*FCQ1C]Q#(QOT2"Y&M"JA-*#',U"J5B66_EF/9
|
|||
|
MI^IQOO0+/3Z8EIH@TDAB5T'^R?>(=J\)37P?)>D>\=A9Q<$'-N3$:,(]8FH#C
|
|||
|
MY:G+&-.@N'AP;2W*8B$0!\L#[U2_($;B'@82E6P!TGD]Z1`D46NG5(G65F]2)
|
|||
|
M.%:+O4?4Q6M;<V*P4.(-JX-^T1*76M1=OZ@W_T+M31_@%K7$$HN66&I!NS/A$
|
|||
|
ME_S%BQH%].A2&YS4%+V@T7*AQDX@(>4QH``T*.KOM":$%-^K&?7@K:TU??V1Y
|
|||
|
M^;7<_CP2&'M:"M[_J;1-.1^.:?O<'QF\+M0BG)8T+3#V,5*O:5`F2XR,+O7?]
|
|||
|
M-*4Y2JDGF6`PCPQZ=(B/&$;Z!E>>H-1*269EL>CON+%ZOJ^#=><J#IN2'6M]$
|
|||
|
M9VTO'[1,MC:;1DQK.]5VTG^*;*[Z_&S<(RG'VRX\TG9A8X+CK"7\-XP!A-7M-
|
|||
|
ME\W9G[>=XM[OS`[RPR4/ST\(<ZR#WW7FQSUDEUEQ2`6+E6\6-=H,G<`0`!W4-
|
|||
|
M2\2Y!_XK=*K+M46-/"9"/8^=7?_B;DF[7#<UZ$!#KV2+B@L[B@V;G.K7D2<6H
|
|||
|
M1;L)R*![;O^C,2#->AQ&Q%AKF%4:G2XU-B8_'Y?O^@E6B$DWY>=3==!.`?\!#
|
|||
|
MES1H/^^"RO@G:9"3)6$.>H`Q*5#('S3E_&9'!'+67<[/AY7RA-*LMX!6TI67J
|
|||
|
M=+B*/U0K=AX+7?ACGW<N/#\05K]&L:L!;1MV2RR1A7H3<89[U]UQ92M@L"5%S
|
|||
|
MC'ZXV94'_CPZ]9<("5^CU-I:'9I=-A^:Y'?8^"9E4I(9`-LD="I5TF[8BRV>7
|
|||
|
M.$1>M&VKYK@$\T9S\5"[FN1M5FWU&-^_IUL9;\H6Z9/5_7T'$/?JR;7NKZ%LT
|
|||
|
M#F*YFDO(S]>R+X7WI+7(NX'BC%)"4[C09*[%T:IIS0Z-[-X6J)*V6K6::X)/&
|
|||
|
MIUO':/Z.OE5<R,(=.SM2>S'<>VNH6@O%<;YLC0E_Z/]Q](;:5N!]%WJU[5O&Z
|
|||
|
MT1IN@!0QO`]^^7`=_++A5WPEVA?AEP#;PSL4QZ64X]!81G:&?[]?)&';?HF$Q
|
|||
|
MS?OC29A-;6UK`0?1XM?FRSP*V.QH!R_PDE-QM`[1UCE=V"HZAM35X'_'^FO;S
|
|||
|
M26U_%`8^@Z-3?3/R,D1XF7WTY5!SI(8+E;*A.:Q*2*B$[=G@]26MVCHD>]F<>
|
|||
|
MB1/DOM:&6EO/]`6;/@E?B^GSV(60%I^3VS-UX0):8KPZ/0*%/OHR[3EVR\NA(
|
|||
|
MW$CH+!.M<KVV;K"CU=E=X^6P1MAHC6\/.K1M.QGB':::4`2MLZF>)^$8@")`E
|
|||
|
M$971X,Q3QT,F/G3ILGIKG]#/E]61?6J>"FUAL&J/,;06@MIX&430%LG#*(G9'
|
|||
|
M!?TO&`/`#/7O+36LMFRA8V-+K4G+;EUW0NAJD!E:1+-Q,&7!,]>Q6GY9J6JUP
|
|||
|
MMJ[E]C-$'G"EP)I$HYSL=7_5V:$&H7F70]^0E(;.1//FVH_WQI,++^^&?O]Q5
|
|||
|
MXF*O";HR?G<="1Y5VE_E/OAQKYFYX=WCWX@K/MX]D<C)$Q?)0R:.\'XU(:'Z@
|
|||
|
M,Q]$3NZ^N5'^ACUZ]+#_!`&FR-O>G\,?P>8*AB5M)]3,J&5S9W:-\ZK*S7Y<6
|
|||
|
M^1Q*^0%+>>_X-_<O__CQ+;((&>)E,1Q'WQ::_="N\,$K]>!(JVI=JR?"WKD3@
|
|||
|
M%;*NDQ)M.A$H0(<\8'?U;."P,O[%G02,76<(3D-ZS+S:/CWT+G^3[S_(:5_)R
|
|||
|
M[?GA`RG']_($^J$F*V=.=X[\!9#GML@[-;<$5=_WH]TW^RY+[GZ^[WNY[;[+.
|
|||
|
M@EOR?6]W)P+R]/(=EHZ=T?_8C\)OI#3X+O*RH!>0'RK0J,UJFM\;_Z;&S8B;T
|
|||
|
M'3>HUY:X+7%/QQ7&%\55QI7%/1AW.+Z@U_JX;7$7XKQQOXW+]85'NV_P=5BJT
|
|||
|
M>OLZ;JXV^<+F,.<+WX04ZX13'G-F9ON;,"@77M3ME^#*0U,1M6$,T=5B&*;2`
|
|||
|
M;5M:FWQ>\4"1V,HPWK-;M&Q;S8*)*;(9^CDQXM`P?N<566Y+:54B2K9T=I;_5
|
|||
|
MXHW5(WT76?>PB:.]*WP7X[U+D7U,-_O$U?*<B?/E66$/%*UI81.UHCVF:&=*K
|
|||
|
MPQ.A%V&.D(FC6QP2G+0-1A$_=HL`JDA`#C]QOG<$1,#Z](/2MZB_1+:X]SP>_
|
|||
|
MEAYO*Y&X\WTN>8=CSIG=.2G77R);/)^%;WZ\[:NM&]YM.\.U]3FXM??'WFG(:
|
|||
|
M:[^*]SG@_;AGY903C_MJ-3@$;#L-2^QIHM3&*HL[F>N5VGAE\:7`]>%$&%W[H
|
|||
|
MM'6L0X/3,O]Q5#`L4R?U7MUG(FF)NR1/BG+ZV-D66'`(44[#\>+9Y@T5%DUIA
|
|||
|
M_.!+TW*+<OJ#LX$-JRU3D=7]T?8*RS:G>JXM'S?,ZY/++=KE>L(ZVX1R"V%E0
|
|||
|
MZE"AN4&_9+G%J5H&^@^)VVLQ3WTT3TU7GAH]#]N=9PWD^2@)\O3P=:BS,Z0=[
|
|||
|
MB+KG-45WR@RG*[%M45.P665)L/'#^`>^!/#`E_S#-R6DW[1+/_EZG.`"^0,.>
|
|||
|
MKG-.^/D.5DE'WEY-&]/PTRMMQV84-(W=:)H6R3[G'94[)P?.'I9K*>WXZ\RCD
|
|||
|
MNI>@UC`LOF-T`4SM#YOW+]?,"_(7PI**,`"[/?BO2L#%M3<LKKT,@>M^4'=K]
|
|||
|
MX5#H(RY0=7XW)'P+K*GO!+)_"F1'-F;_TN)HUS2Z5H:9W6.^AOWB25_8[NNX;
|
|||
|
MQ],G^,P[5G]'/U@L-^J+I7U`J);S72;5[?[L"!,^BO![@&SX,,(SOMI?4F1N1
|
|||
|
MH^N7\.O^DL@781[2[*^;PB]BZJPV1X2%-0)HXNM,>$LHE0//9:QB\CMXUG>9K
|
|||
|
M]?2V-MPKP`@">0%'^^M<J%+S7>:])P*.ULCAT!*,>-Y]G=<<K:%YVJ/#1V^#>
|
|||
|
M3-77O,YN<+3#A#MV[$OEZ+$OCWW)-3*.]E`JS?LO&QRMX/:\WC.M-=1/@S+B<
|
|||
|
M0\7:^NP(8:"F/X;RM3?%L/2F!"'^M1![NMGQ"]GHZD@]OM%U2:]E./Y-J1DLV
|
|||
|
M`U!UPA/3I@6J!&A4/)%-8Y6^$*WE-]>^!3T5`TZ<Q5_;2KSF4&D$"N-SG'G!G
|
|||
|
MEFW.("RDN6KF+XEFQ=5J/;Z6"_U$0I>Q)!"UN78?.%ACM7$9&8'%/`B&<ZOXO
|
|||
|
ML4H_&DTTJT]?WC-A5Z)Y@?K8Y;'-)@*5(5#WCLW9^U(N;O@+"$P[MHY5CH6>E
|
|||
|
M@85%Z*HF:A>7L+?&?#TV8()S_E!C=SHMQ!LS5IF$;$EFJQ:VCD6?C><W-5A;!
|
|||
|
MO*8D\X%&JSKO<EIV:Q6G9+>&?M>=&:+@8G-[!9(W9_/BMW)S8*H,!F\3CC=V;
|
|||
|
M$D:VP*H/@J0P>'Z\6"_`"7&JE=8$2A6)W%]QM5N/U_92VSJ3?9-&>)D9*<=JH
|
|||
|
MN8#K)XS)UJ#C%QC)";.3-YK\M3^16LDH3LO^23W<J;3A:%_<#IXI%#G)!-N7/
|
|||
|
M8$F'K[/2&X/<ZV"N_`16X%I?YVK9Y.N<[^T%O9!^UUW^BI_8M9A(")?]DSXB)
|
|||
|
M;6%ACUVM[;PK[=2Z5B"EPXYASVAU96?0T:$NZU1</T$U;TIY-^5T<I"?.$(67
|
|||
|
M)]K!SJ9XS<F[U>F=,^[:\.Y9,_!/ZCQS$6#OE%/)NZ-SCU-'=YXY;_VDUJ*\_
|
|||
|
M!V4,`);0@LX`]=EUW5N[=!\V&YJO=Y*;'><XQP_)`9,^O,S3IB6WF,!)NA9F#
|
|||
|
M^'EH^9XAZOL=,-.][;[:<\ZUL._N,/MKOX.!"*8VS"F.'W0W7R0;$]V)_YZX`
|
|||
|
M-C&<V)XXMM^D?E/[O9"XHM^,?K/ZS>EWN)^[?]_^M_6ON^8\_=N6^(=$L%;;4
|
|||
|
M;[75$3!O=[9]YWQVG&T!UP@>_YU<(TRBQ/$V8^]`-Q_;QP(GG'DEP8G4V06'^
|
|||
|
M:J7#54)G6IM'4@Y.A\EVGFN_#&=DQ,M?^&,X;=]I;E/#ID_2FN1>E\X=?=O=!
|
|||
|
M`3^>CC]VG/E;>&`/PK]V*">[8TK3RQUGONH<J#='TG<MH#SP0=4'!N0KY]-Q7
|
|||
|
M$Y:GKNN#!\(M7+-Q?`<;:>7#]=\1-JW18W[N*0)FVM(B/$9$W&%V<;@$3G@*=
|
|||
|
M5R3E;9BQ\>L/$M8MI?TOC[`!R%=GP`7@>2T_FOF)'*?ZII:?;VR`6/6H]57Q9
|
|||
|
M`Y7J8X_@5`]:8;9'G-M'VN@;-HAJ+PD7/$C</MSFW#["1A.WC[+1Q)\MP<3A7
|
|||
|
MMN#8$;8Z]DVBOL^@W.VC;3>N"KIXWYF'I,8=HVV+HL2'@/@J?_R,[\RZ[H2@?
|
|||
|
M@Z?0%SO:)C;YDD?;VIJVWV(#FEY'$;>+HE(K-#LZB&JWTKJJ_;OJW1DZ293/N
|
|||
|
M'4'S1D=''1EA)LI)?X=0/9+:_IG7U\7N,:MCF7`55+^.I#DB:\NU[$AX&8V"M
|
|||
|
MI/`B\!3"\[??!E$P@B/]D]-L1+XI"/6`F00F'<\]P3ITICO5K9=SG(FXM<#E1
|
|||
|
M57WE<C@IZ(H$JSIIVX^38!+-4V=Y$V\FU8/@CD5`67JIL=$"G[W9QC@Z08%(5
|
|||
|
M[UQ[W=_3+%SD/2FBD](RFUX*)&D]"BHC6`C1!Y=`5EPG7_?H=9LA/'J=_SI</
|
|||
|
M^V^ZSCCGV.R`+KVU/;IEY\,)AQ:#2PTW9V;0V`2SC(Z`Z)M(O-]"B^@.O:[W7
|
|||
|
M:_&JF02;^/-UI&E>TIR]</MX*M_7262+KS-.=AV)#R^?R'D'U),!1^(G#@`[N
|
|||
|
ME;R!1.J8O6;A2#S<J(4_GYCN/?U:?%WO(_&^CGAY4GWO7F,^@232^S4[OO1L_
|
|||
|
MR;[8#82!;`2RA?L#C?/V=JKK-*EA/I0T^7[27V;WI`]<U%07IU9K3C6!Y->)9
|
|||
|
MT/H5FN_K=1N3;[%M3-9'"(Z?,3;@FJ-M3+[5-D$88Y-';`<*4>_0@#Q!@V1,F
|
|||
|
M\4T>8X-"Z'5J,BVAUM0,W.DTH:H/OM(]E,W<Y8[MN(T2TF5^SS5AJYYW^_TDE
|
|||
|
MTK`CU>`<6$_.[_M.<^;43[(YU<?P.L0&>V!T?:(RQNJL0"![X*"#U#\WWM8BD
|
|||
|
MC+,1LH?L&&';,=P&UHO7=HRT;4_%]RB;,3_C-SO.P^V3.1^F+@P$VR38!O:9Q
|
|||
|
M!(<;8\+@F($EIJY_^"Y?;5N*UQ:]H(1]ZWB*?;6M9N_0>AL))X<'T0CR6)$'G
|
|||
|
M:'T!"X1FQ7'P2;T99U.P(A+,[JQC5#9"'=U,6YC;-\.VUT2,2]2]-Y%]V;:Z)
|
|||
|
M]".#0G\ZHUN18+;@.ZBQL2-@^/.\MM&AP8@F#FT"4-R#)L2.LE5?"[OM"<)PB
|
|||
|
MF[OW!&&DK=H6=&G!O]'A_.1E+*?K9`A6:#"-^AF#I(XR@1ZQ=B,4AYC2DHX3_
|
|||
|
M=D"25F7+<ZF62SE.O''Z"P]3]-B7C,,&FT2I]BO0NNZD=\NT86X'C]E!>O@:;
|
|||
|
M#0_IWKF8XTRBEUZ;=0E<.Q5PIJ<`Q276908=`CU$PAM\&SUVY.$^0D`?^GAX-
|
|||
|
M4?<-!ZZ0$LJ&VN>I'NRRP5!7K2I6+U]QV;BC.4I+2K/BB@6D.GFC>;G*QX':4
|
|||
|
M"+U<3JN*72LI)P)5&-4TY5)X&,CHD:G716PWGZ>*`(R&.=5W.*X6[V@X1V=:F
|
|||
|
MB_=(5QN@6C\K=PO^,.^.34M:;9--ZE0X;5,YO/`?GU1EDP<KU6PKS\A"8.QJU
|
|||
|
M6]B>-A9H,<KGZERB3&.?`Q)$4AN>J[(!?FZ-+5>=>W%ADQ:7AGG[0UZ%?PE.Z
|
|||
|
M?CAS@%?NX#H"7E;Y'.2/(1A33"\Q,M/$F)4V[GS@;E;Y0EDGP*5^;&#R&IM2A
|
|||
|
MS0>\?*!&:&H1UL!D:%+&KK%96^5XI48(W"T$%O&!=4*@FF\*)*VQ!0KX0(&@3
|
|||
|
M-R=3`,WFF$S$/79(1)LD$@^';MOD*K#<`Q5@MGX"+?A@O-DS0"D0TDY[?U%+J
|
|||
|
M2'B0&H0+)O4ZV&2"QOLHY_W-XOAQGA"8%,VL-)EXU`C=-:F/M2]<.`3FFB7U?
|
|||
|
M."R8#T!LOC/UDURG^EN`DS1-3E!.!J#]\"V$;7YZP.QOXI6FIH6I#4TZVUR#+
|
|||
|
M+5$Y^>QJ6V`:>R7C?&`<9E8N<..4"->>'N!!,Z`W?S.O-,-'&+G..4ZUK[90V
|
|||
|
M.0G-')AD[H1+OJJ(8H-TES]DPF-/7`)OC"Q4%L-EHM"D-/H;Q;1CU;<IQ["+A
|
|||
|
MO7%PPF_FFJ`B.]L6+@PG*1U<>V`1FW)T6#_HAY\"->S40%_E/>4+=5Q$.05U`
|
|||
|
M`K72TU,1#HNAS'&@OQ$P8I2X&<I1?Z/)?R;BOR1ZN'TB27O7;:LV09:PJ&X`&
|
|||
|
MITV=K2E-X1CX."$2%G+5AR^G-BQ<!'K4DN^S:<GW0W@`PD:;/A?!C!U3E;>IZ
|
|||
|
MK^94#J8>7]AV(7@2SJ02;[6]0=J^"QZ[^>A&L`QGP5KT./#5CXN5A+2^,JRMI
|
|||
|
M=:Q:<C'0-](X`7*Y^4CSGTD@`8^`#1?/1JV(VHK[L8#C$ARKIPGC;5W6.$`WM
|
|||
|
M5S8Z+R6U1$.;X!"O8OD96`KT4T,U`U@ZPW/\M3\3&5;_3GJPJ!9K4!-1_;0=.
|
|||
|
M;@0D6%:3E7%^A\#B_DF^%H^O*=<=<!$0_!2\`6"VJ']J1U8I.0"L$DL7=^]+_
|
|||
|
ML*&@;7JTO8>["(YLU".Y1O=(>NL5UNN4H][R2SC^2@JK=;N:BR7=9=*=XK=A5
|
|||
|
M58'7T;13U=>F7:SNE_;%NCYI/U7'C7?QU5):%;\NVNZN<W3C?#\X<K3M57M8C
|
|||
|
M",#08Z>FN?C:7Z+'^.O/;2=&#<$_N9FAE82/"NR,KQ9L"1?JQT0<MHA#BCC$M
|
|||
|
MB$/PU<8*0-P(KHL$71]TV.BO0']%^@OT="-!W7T)3FDW/W"/UL73DY^R'+GH4
|
|||
|
M/R09++8N,>H4[8ILXM79OL-LH2WDBO(HQ_2>-8FR#^Y1D9X5[\&2^?<K4A^YD
|
|||
|
M(ILA.21KP<G@)9;$PDH9K)""V;9@E1!TB>J6UJX[&G35DESUPVU)SKU6HDK?K
|
|||
|
M!OE(PT8^F,G`*Y,)9K+X9H.9'+XY-9%LS+2H`^%7@GU$'0>+:E:KTMBD7M!P#
|
|||
|
M:@V'J972F-ZD?JWI/G,P<81!PI&6+=9EX`)'3X:X1W!1N_RUL?;Q].3*0K?!=
|
|||
|
MZM?AN.[3KAQ80/1=1-UD>KWEMD63],.EO5]W+\#@:)C(_GT6O/J/I`EP;G:CY
|
|||
|
MKX8G-7$N=0?!&Q[3@;^=##/3_,WQ^+&4SN/^U*JMI3M#F"D]%G18JWF:+F"UU
|
|||
|
MP@N[[GRBAV@SHS=N[LFMC3[O;?7,U-1WE&,0'YGCK&>-",SI@"NR(-]]33V9=
|
|||
|
M"FF]TUP1MZ7:!#XYW!*]J3?BY[-&L=2D[->T\6MCO07^M7`]=YU_$EEKR5-=*
|
|||
|
MV`#O76U9+`];7LTKJIO:\WUKH7768!8/AW>O1V##UY+%@FN6)<`/[(B;LWC-$
|
|||
|
MOQ8F=0(]HP-_<=?73G71N?R6+%@&E>AVD!9JA?LQ]7T2+H&B]8WR8BBY9A@4E
|
|||
|
M"#>BDM("R^#X+,GK0,%=L=N5+#&0)85'AT<J60)G2E?.#[O-J1.=>KU@/3DD<
|
|||
|
MI#7+,2")L%[!/XN-#S]#C8!>>.IQ*#[,;>P[S7])DI.U;*%V$"P16EP-K-R2O
|
|||
|
M-DT*\G5P9P3V1]W&Y2M'8<'S'O=?TKR6M%J>>C4)<.`#.>"#(S@.0`+L\?FN/
|
|||
|
M3U7T@0&5AJ\G]R^WA'NW9;(<D447F+)\&`<P&G03^2V,B*L\NBI1SPK[OKC@F
|
|||
|
MP8ENK[B/(0>@\^V^B]5>TSZ6@WW-Q4)OS#[6`IP^<@!.2K$&94&;PW<Q18[S@
|
|||
|
MP5G(0-]%&38P%Y=X^P+-RP9M_C.=_G=YS,$<X`@DPZGKNR0]?#TR(?2%XY[]Q
|
|||
|
M4!I"&JQ'E<:=Q"=S_K^DMP@EEMGC\*:['_J)CDC`;`S9Z)TG#W,:++6@+PR=F
|
|||
|
ML"O3`IGX%9`=)\+:F^";/,AF=?!X5:6^"M=JPL9,7FI8&].<R6LMF2R=5E.",
|
|||
|
MF=AS.[^B<V;]3.@W>AH,R5<>(+O4]T0X]`4N,WPJ=#D_W-B224>6<;[B`GW3;
|
|||
|
M&=CGV5T2'%O3T^J/0>%IC=7?T@34%0O\](.;OVC*4<-1C<D!UQ,:@E?E-QKWK
|
|||
|
MZO6W.'7B9H<(5_FA15W?+?DG$O!EYPI<PE3P8ZT*_T1J8THCG-:V0YW3B7>X/
|
|||
|
M,E-"GNO#EAGPQ<\=DI>9IC3>"66=#\<KIZ9<04&51F_943CXVB[U1"?5!<Z+U
|
|||
|
M:7Z\#P1QM5:76J,],<PA7.,2UR]E"R(M/#0^4PQD2GGZ<JDKTOH5*`E'K(1CK
|
|||
|
M5[<U71-`[S1>YWQ9S0=K@9]&`;<)7;OKL=XQ+K6/]@1LYWNY(F$H5<!2.Z]Q2
|
|||
|
M113XS]%I..`'$@B.[SY*)CN$<),(YS6YU*3._*X!_M>"Q=$MNMZ7G/HV%"'HH
|
|||
|
M57;J5>@#'[X)`=@PU(K^I>P7T!=)4`5O+$I=%XFQ$QA081%;ZI_)QE_U28(&C
|
|||
|
M^QV>Y"]>U/UQ@U<`GM!6@@J+T6S*W9*6*07-(3]2:N9"1>(9[RQX@1_L@+'FP
|
|||
|
M(_X:L'OP[5FN!BH_$FX(OQ.M[0`-3T3JM\<8=5V&7Q%"PP;K4<>E?-RY"EBQ^
|
|||
|
M<*!GA4-K--_D[3$Q7C,=$/(KV+3MVV/JX#2BB5Z#9&OY7;90:0-SE.#08I=;X
|
|||
|
M:F*5)-D"G_I:@F:P0B+E[:7I9D@V@<7R?H1])::UT7';JYDG>--B&"*ZI!CC;
|
|||
|
M%#[#H)M.6`F/A3HO_-'#/-]MIN",L&YBCV\'SGS6_:U$RCLIQW$?;.BY>P\H2
|
|||
|
MMC63!J]H&(KSQD<GC[3GYX.S"6F,O'KPY(_!=N_T,5XS/4P*?@9GCIIWL'_RI
|
|||
|
M:8F5)0V^-U&K/@M]3]I:?(;M!#[<_MI``"^/@_-69_C3MN;S1,;M+,Y'<,7A<
|
|||
|
M3@&.YU\G>>I2N.+L3:=E1!VK)Y3#[:T+:_(T@2\R\/IA`;W>[O<WK%CG3B@H^
|
|||
|
M:?W[Q`X%^.2D(1J!/J)'77GJS^>A0\,2I+`R[#PC$3CBQ2MIVI@$6HM8^@D-"
|
|||
|
MBG^I#7M?JQD%J1S,31*/TTKY>/T9K=UZ-$?/JC>),`O`D'YQ[&Q@ZV[IBF6>S
|
|||
|
MA8^$LH6V@W#4+>UAVP[RQ,ONP0/>5\_?D"U(!^LF09<,H,Z[,$2KCR$^V`R!,
|
|||
|
M''`$P))B5XW[-+IX0Z=H-A=X7#`63=#V[N55P-.C'3'P%<K:"9I)621I6=)&"
|
|||
|
ML[ZV<J%?B&_RCAA)EO`5`_[KUZ#8XG9<\#DX=<3Y<X*$_D*`_V&X-8$7U%9?(
|
|||
|
M2,^NG\7"+0UZ"EFP7LO@*0RG&=^%];CM9,`H:_N.F.[B'C"*,]/BO*OSU(MX`
|
|||
|
M\2=7AG\?7H&+-IQEGZ2>CBCW@:L_NE?5%_,IGX(EH[F]`T$<F-;^=$;6V`R&(
|
|||
|
M9W%&PB0TZ#MB#'K`H,N2[@9PH3LTJ%1=](M2O%;$/GT_TGUHK,]%_(@S0JLNA
|
|||
|
M#PL/R$//P"$&S2!S!_!2@YK:$)K'`".X#M#R3T-9C%XW+O0%0=4`V$9`'VD.J
|
|||
|
MP3/;T))`[SH/_^?-S?D$FDN_Z!!U0B./SHQ#<'.A+TEX0^@3HI@XAU!S+4CU:
|
|||
|
M2M!1*5E"P!2VY:DOM.;3+<L23<\/QE]MZ\!S>,P`_>(0F"PI]"3YSVMP]/15[
|
|||
|
M-4@W:N`I#)FU\-VTYR>%1VFFM0EZ5X//@@KB-Z*]BNO2EU.]^[*N+B[T?J1+N
|
|||
|
M62UX2-4M_7/6D,Z%=D:B[E"W<Y$7]8DEZJI/.@7W[K"I38>C0G?,%0XR=,DFL
|
|||
|
MTOTYS+NG<5&!$^ZK.-.])IQ%2Y1L/#`#"QE1/N_<#>>V(R;&R*9=9WX.7W?F9
|
|||
|
MO)"+8VFSXS(=(>M0U$(SW#]=WI76X67#3X3ME*'MU+4-SCG(\B^G0&GZ1V8/8
|
|||
|
M8746IG1L[9KR>%B-WZ6!(:]_YS9G_6]'.-7Y(%/J=B=@Q1\OQWKA"$YDUPGK\
|
|||
|
M-6U=%5W$GH>S'Q]L/V/71]98O&*+X+/AUXG^R;5`M*V/++=XA1:A%HBPM,EQ(
|
|||
|
MT<MQE_H:6"H15A[JNLNB>NQ</BQ`%UHR!726P)<.T!48RY,G6[6J"2W"4HMW9
|
|||
|
M'#T"[)^G_N9[L)L"M0;5&BQNX"V'*NCGS9D2YJP1("?CY2%)[.%8PYTW#RH]9
|
|||
|
M,:8!KM)_>F6S5P-#1&';,;@4;6MKAOG(/C\##WI@,7JT*^,F^+=(G6!)3P*_-
|
|||
|
MTF9D;SL&G5/%7W@AF*D%%VDI33T6MLZK&&OY"SW6-BH/:*D-G93AD;:CTPMZQ
|
|||
|
M%F7DQG.A]WYZ)>44\&YX#R2\=V%7MQ07?LM9)<!B*]^*/A%UHX;C.J[Q"@^FG
|
|||
|
M!;[JFBF!>Q%LW&B<1=K1C+-,%,@"\&%QO_T&8CB9[_IDWN&LN_^1B,A3&6'
|
|||
|
M/3A\CQ%<+XQ9&1>=E7GJY!,XN+[H&L"Q,,I=>>I+\$V[``L?INB?-@:JX$Q(G
|
|||
|
MQ*5T%MP$P<<>\/$/WAY=GBAY^68^Q@$C>",/_YACM:9\G')T_24?J;DIY;P+D
|
|||
|
MREB(PN`@I5GN31U!;.HD>@0;"=^R^8W5&KTXW(E94\XKS=:&JD$NC$!6>U?6^
|
|||
|
M6%358<C%-:8TXY9([#YMCDY`)OK]XL"Z])[?+\8YNZ=/_'Q<Y>9\A"YFJ@8>5
|
|||
|
M)FK-DZCOHL##G/8W]#"G45U^1_\5V`&>.J+Q72Q/_"U_-O#`'O,<,%SY;_2FT
|
|||
|
M5KK+"RN6VC-24NPC[!F5J^YUERTKE>VWC!]_BSV:.*-"+A])LKWEY?95E645I
|
|||
|
M<K';7NCQE"VK6%E<(<=(F65594N+[<5N=Z4[1IJRI*+2O;(06-V5R]R%*^W`6
|
|||
|
MOK*LHE`NJZR(D?ZQ?SGX?,SS,3WC=O*//6[X<[HKBXH]GN*E=C)D*;%7>F5[^
|
|||
|
M98F."XN**KT5LH=D>-UNJ'KYO?:BTN*B%645RX#!8[_R(=G%U5U9)J"$J](S?
|
|||
|
M2@LKED$YO^:!:@SQ$`E$#BVB3,.ZXA7%U<,@&3Z4RJ**K"Q?:E\%VJRN="^U>
|
|||
|
MEY25%Z,4X)4<@.U+*XL]]HI*V5Z\NLPC#S+R@(S_=AYW\8C2PJ(5!KM>R^X\*
|
|||
|
MA>7NXL*E]^I9/(-(M9'+(Q?*/;/\5[E&_0\?\H_]]W^LD/^A8&>T4ZAZYJU:O
|
|||
|
M6HA*K!HS<C3)SLJ;/B7C+E)2Z;9GSLZUDR7WVN^L+*VP9Q87NXO)W-(R3_>,&
|
|||
|
M*5P!72A75U[9RQX[3L:2LHJE'CH$($:*KAJ#(^WV&;)=+BVNL"\KKBAV0P4@J
|
|||
|
MVZ]'#"FJK)`+RRIPZ%=6P$2`+)[B+C'#[7*EW5-856R7RU86VZM!'BER%]*IT
|
|||
|
M,O)_K*?N1P)9]G_*\Q_*^H_[Y+\OJ_LQNM/^OU^O[B<Z)/X9LO[G^HH^5XS/-
|
|||
|
M?T36/^LATG_5B=F%*\$@H1WZ-6>.8>>N8/SG5@^-]S]5WG\TQF#23NE:6X8LC
|
|||
|
M_0\9HPO1/\0\MU*&Q3G*:N]:+O5,_\RIC0MW]!F$SZ\KPZ1?^;!=CT%(H`__X
|
|||
|
M=QX]O3]]Q+_S8.H_ZC?\GWOZVO"/$`O;35L._QA=8KO__Q9K(`XM[HH'(9X!+
|
|||
|
MOEOT>1+B4V'W$GUV0?S_7T\"8>YAX8_?SF[_+UC3-8V^^[`L;Q)@'"3T-?71Y
|
|||
|
M$DV]6*WG8S)I5SUQVF`6?N#IHVDL:XIC=:@_@_6?/AJ9.\M)1MYXXXV$=AI]5
|
|||
|
M&'S87SV4Q.$/3^.FKJ>;QRSUE6P6EK6R";&4(+)L;Y:-AS]\!+,DT?08ME<L-
|
|||
|
M-"G.2*</B1]:`3[Y,-!/`I/0%R<*2Q(X/L'255!"]Q/7+TZ$ESDAL8L4TYT:;
|
|||
|
M+\7%Q8E20H*0T-L:FY#0*\'6G?[K_Q<+0S)FSW).F4-6N6$_8/<4%5:4V"?8Y
|
|||
|
M2\HKP<\'EX)N$W!A6UDHZ\YH>5G%BN*E71L`W;W?-?!/](^P!Q,@&C\\B?S?J
|
|||
|
MY_^U3T=./+?%3,BG)`L6K6_(:W1<))*+\,:_H]-Z_I][[%?DG4.&Q5\M#_GN`
|
|||
|
MQA\T?94(T.9M18#&[AP"N.XDJS$=SFK(9@10`?(0`I&,)X\`Z&\AD\A+""0RX
|
|||
|
MA;P`.?I;R>VD'H&-3"7?(H@A=Y"AD+5_+)E,YB&((^GD'()X,I%,$`'T(FED,
|
|||
|
M)PS0_KW)!.*T`N@#Q<#E/!H@0CY#T!?")2MM]FA2!(:=],-])X+^$.Y'<`V$F
|
|||
|
M1Q$,@/`'!-=".('@.@@A!->C'`0XXJMQ-@R$\%B,H;A_1S`(0CN"&\@0,CX62
|
|||
|
MP&`(\Q"@];D/P1#<PV,UDR'02703A,58S:$09`1@(,@.!#=#<&*E4B!X$0R'0
|
|||
|
M\"."$=A(K.9("&,1C(*P#,%H"!X$MP#-CV`,</T902H(^`3!K1#.([@-@@5;2
|
|||
|
M.18%(AB'BD!P.[8-P7BL)8()4*,%J(DT""\AF(AU0I5,@C`CB?[/HE+(8-3-(
|
|||
|
M'5#'=Q"D0^B-2IH"H03!5`@O(LB`\#Z"3`@K4']96,P-\..`\`CJ#P?I&033#
|
|||
|
M(?P5P0P(WR&X$\(/".["CD'5SH2P`,$L"`<09&-WHHYGX^A%X,1JW$3'.&@5E
|
|||
|
M00Z$C0AR(3R'8"Z$=Q#,`RU^B\"%JL$NR@,-O8)@/G8P]E4^*&\[@@7$Z+2%*
|
|||
|
M.!T0W`W!A[VW"#3],H+%H/MW$12@UK`_[X'P+()"]#6P8Y=`^"V"HBA8BB,&R
|
|||
|
MN[H8^G`4@A*L,X)E$(XC*$4EC(:?,E0F@N4XZA"L0(7?`C_E$.H1K$0]IL)/P
|
|||
|
M!8R.7C@<*G$,(5@%X2*"W\!('',;/:892@H1>&"T^A'(,'Z?1N!%12&HBH)JE
|
|||
|
M"+UP-*W&Z8>CZ5[4/H(UF`'!;PGUHSA20V4!6$LS`*@%4(-@':H.@0_G*8+UI
|
|||
|
M`!Y`<!^V'8$?O2\$]P/8A.!W`!Y$\`"`AQ%LP-F-8&,4!*(@"&`+`@7G,H)-D
|
|||
|
M`!Y'L!G].`0/`G@*P4-H'!`\C-,3P2,`7D#P*/:B"&`+=AZ"Q[#/+`!^CUV%5
|
|||
|
MX''L(01;J4<)8!LNJ!*`)P#L1O`D@`\1_`N`CQ$\!>`D@J<!G$;P!P"?(G@&"
|
|||
|
M0(,5P'8<=#8`S^)D1+`#IRB"Y[!C$#R/ZD7P1]0[@A=P;"!XD9I!`"_!='P<S
|
|||
|
MP4Z8CL<1[(+I&!L#X&4P<G<BV`U@)H)_!9"-X!4`3@1_PHF$8`_1'].K4?!G!
|
|||
|
M^$';:7H-H_$`WH`5HQ,</_C4F"<1!/4`<,W@]P+`-8/?!Q9Z.GQ.PKX%%GH5L
|
|||
|
M@G\#"[T-P;^#A=Z-8#]8Z`8$!\!"=R)H``N]!P4>!`N-RY+T'M0P<@7E`!CF%
|
|||
|
M0TCY7T:A0#&2CD1+1PHFV;IX?LW\/MCU#U'.7Z+-.1)MSM%H<X[U%,A?(:<+]
|
|||
|
M'(\F?1"5\V%4SD?1[!\#8*,"J63,Q5Q10]2AB&!OE(+JY:\`>W_%?(+&8<4^\
|
|||
|
M&06GB+ZY$4[3-0W`)]&D3XGN$0JO$\;R)5`9XZ^.#-FZX+K^L,(/((^QUY*M[
|
|||
|
M['7D2?9ZLH--(B^P=ECPAY!7V:'PR<_-I(5-(>^R(\DG["CR/3N<G&?'D`XV*
|
|||
|
ME9BXVTD_;CP9QDT@:=Q4,HO+(`NX3+*$RR+EG`-N)J>1M=QT$N!FD$>X.\F3Z
|
|||
|
MW%UD!S>3O,+-(F]PV>0`-YN\PSG)<6X..<WE$)7+)>>YN>02-X]PO(M8^3S2L
|
|||
|
MEY]/KN?S23*_@(SD%Y+;^;M).E](9O'%I(`O(:OX9>0^OI0\Q*\@S_'EY'5^;
|
|||
|
M)6GD*\G'_"IR@O\-"?%%I(/_+;G>M)9,,]62Z:9U9('I/E)NNI]4F6XC]YH>,
|
|||
|
M(!M,&\@C)H4\9MI$GC$]2':8'@$_YS&RV_1[\H9I*[@Z3Y+]IG\A)TQ/D2]-C
|
|||
|
M3Y-O3,^`U_,<^=[T/#EO^B.Y:'J!,,*+Q"KL)`G"RV20\*]DE/`*N1W^D76Z[
|
|||
|
M\!J9!=IW"6^2(F$O^8VPCZP1_HW<)^PG#PD-9)MPD/Q1:"*O"8?(OPG-Y)#0/
|
|||
|
M0CX4WB9?">^2[X3WX'.+(\1D?I_$FH^21/-QDFS^"!RM3\EH\V<DS?PYF6D^9
|
|||
|
M2^:8_PH^5X@L,H=)N?D'4F'^D=28?R*/F"^09\P_DSIS*]EOODP^,K.,:N:9K
|
|||
|
M<V:1:3-;F$MFB>DT6YF(.8;AQ7C&(O9F^HI]F`%B`G.]F,C<(/9GAHG7,"GB>
|
|||
|
MM<QP\3IFA)C$C!$',F/%0<P$<3`S2;R121>','>*R4R.>!-SMSB4*1:',97B8
|
|||
|
MS<QJ,86Y3QS.*.((YO?B2.8/XBCF)7$T\ZIX"_.6.(8Y)*8R[XNW,B?$VYBO>
|
|||
|
MQ+',=^(XYF?Q=N:R.)XQ6R8P\98T9H!E(C/8,HD989G,C+7<P:1;TID9EBE,8
|
|||
|
MKF4J<[<E@RFQ9#*5EBSF7HN#N<\RC=EDF<[\WC*#><9R)_.2Y2[FSY:9S%N6P
|
|||
|
M6<QA2S;SOF4V<]+B9+ZRS&'"EASF9TLN$[',9<S2/"9.<C'72'G,#=)\9KB4@
|
|||
|
MS]PF+6#ND!8RTZ6[F1QI$;-06LP42P5,A70/LUHJ9-9+2QA%*F(>DY8R?Y"*:
|
|||
|
MF1>E9<Q.J8S9+2V'L(+9*Y5#6,DT2Q40*ID/I%40?L-\*;DA>)CO)1F"E[DD#
|
|||
|
M54&H9LS6U1#6,`G6WT*H86ZTKH50R]QJ70?!QTRQKF>RK7[&:?T=DVM]@+G'B
|
|||
|
MN@'"1F:E-<"LL08A*$S0N@G"9N9)ZX,0'F)V61^&\`CSIM6PZC#3^Y'HMN`Q"
|
|||
|
M-B%*AID>8>O`3.#FX%7VEZYSDA=,O<E^X,8MPFZ3C1PP-A[UIE&D`2P.FKG]%
|
|||
|
MIF%=<KXU36$:@0=/3[XWI3%-AE4::AY!#H-TK,AH\Q#RMD&?9]Y*W@4IZ($OB
|
|||
|
M,C]$CAGT<^9L\@'0XP"WF3.ZY$\0*RE#+W3$Q/*N>NZ47J3O/G19?IZ<IBT!<
|
|||
|
MO]%:1CX#C)YYKK6$UOX1=JB%@;T%T_5WL4L^3U7#$A^<1*S3MT8LI1H$@4:H#
|
|||
|
M7:44D?*+-"^>B5@HOVYN\9!$HOPV(ZYI,?JV"]LE&NLJ98XUA`XU=G8V^N[3_
|
|||
|
M)==L\%N-=XJ1;P#-PO9\)USUGFB\->/MQ'=?_.&C[T&X0XK'(O6XV#,?E3N8Z
|
|||
|
M^@2\_H8U3']+5\6-=%^4C_EOOJ_./_"JN/WOE_>K]_]FN3WH/=I_Q9LT8O\U%
|
|||
|
MH?(/8?0P=D<STEI@!PG#&G[>P=1W@=803V4]PC[&OL"^Q+[*?L*>9SO8?EP!G
|
|||
|
M_QS_,=_!"Z;K34--$TW33.6F>TT;3#M,+YAVF]XPU9OVFXZ9/C*=,'UI^L;TJ
|
|||
|
MK>E[TR@A7?B-<)\`*X1@,B>:D\U#S:/-Z>:9YCGF>>9%YOO,CYC_:*XS[S<WO
|
|||
|
MF]\V?V3^Q*R:SYG!OHOQ8E]Q@'B#.$P<+HX0QXACQ0GB)/%%::>T6\JV.JVY5
|
|||
|
M5MTZ%!04E1<75GA7(<(+6SSV`AR]68:5ML!=[)$KW<5KBMV5I*!P2:5;)IG30
|
|||
|
M<F;/<Z9#XJQ9LS.S9I*"E7#C10J*"LN+"!7I7K&$%-#;2U*PK!A.KDH@<P5<%
|
|||
|
M&GA6E9<!#:_,=(2W;N7%,I0(.=W%2\MD#[S@5JP`;]-T"N4"V48$ZK4:WP5+L
|
|||
|
M*STH'1D+9=EM4#P]*0:G\2J*OJ.$&;.S<G)FYP"">R(#EGD@Z[U`FCD[>]K<4
|
|||
|
MV5,`S:.O<D]Q\0IL]%W94V9E`8`32T`DNR`W8[8S/YTJJW`IO/#8K@);1)%<'
|
|||
|
MB3J%:GE7E8$:Y&+4L;<"#^Z`[G+FS,B>FY5#X5SZR@&AD$%>5;0*ZU&PQ(V,K
|
|||
|
M!1[ZIC\Z+()K8I0-;U`:2EXM%U665QIP"5S7+'/#;<12/:YKI!0^0\#/"J`F-
|
|||
|
MY975!L(O"PQ8D.&<-S<;A-(3R!*L#R;`IPJHN-%%;NA-78E=")I6Y'5[8&C<Y
|
|||
|
MNPJ&S+)*N7+UO;3CL5CH;:\!RBJ+9*CORLJJ8IU0`EV-HZ>\O!)&#FA/!P4Y2
|
|||
|
M65-F9KCF=BDPJE2WIUPVX*I*'+6Y&3E96=DS9F,UI\R<D3EE;M;\?)T^>^;,!
|
|||
|
MKCKH`[``KEO=Q5@U'1CO>^GH7XF%%)57>HKIM*#O$OHNQ/XJKBR)QN%=4N[U%
|
|||
|
ME,(;Q'O@A3'*53#;F97M<`*8EC47WR65J^A8CBJS1!]#)?H@H`*PO=D&Z/DJB
|
|||
|
M+733^D,!*XM7TJ&@"XN^2D"OR-SC1?,4./0>C`Y'>HA,L)>JEG@1R.ZB0EE_#
|
|||
|
MKUREOU$ZO,M1,+PK])&7[:W0*Q1]@PK=9=0L1-^KHSH!I&L%^F!*;M8TG`XP3
|
|||
|
M:$:[BHMD')$8N;5GY+:>D;%=D8S1A>YE15%014%Q1569NQ+;#&AFQ3(=>(H-]
|
|||
|
MD%NV!BNPRH,CHM)35>SVE%'N2L_*PN54ZA6TL@JDP6<U%3@H<N5"MSP7;N.Q7
|
|||
|
M>:7%A:N6%-+VX$PKK\)>ZD&\@B;3(:B;HR)]?N@S@)H7JFN*C$%`L0%!Q\6%@
|
|||
|
M*Z%K"RKH5P-ZIY;@."^!D8@$.-R?M[+0L\(HC'8-&KAHO0%FX9=!<RMS753B+
|
|||
|
M"IVE&FQ!)1U=QHQ>6N8&Y4:G=TF9&ZUR07DA?;EA+J*"<F"89U3)7=V0"X-FY
|
|||
|
M;N72:!PF*IIO`/#%@X'@"QL#N8OQ:AA'MXP#"WGT]"[UR$OHNN)U+ZG,<%--D
|
|||
|
M5<DEA=BV*=-SI\]PS*5H1G9&#LF8D#U]#)CCD1E$!X3>J$(M9;QA-;[,(%`&E
|
|||
|
M?%0A$UQ*L"1\8[E8)8SC&^-E%3`QQN@OLMP+-I=6NKRXJKB<E)07+O,04'LIF
|
|||
|
M9EGBP8$$_58"A8%%6T5@`2N&*2)7K@#5EJPBM&M6E1<6%1-,`$EC].@8.#Q;&
|
|||
|
MC87(E&<,P;ZH+`(A9%6EA\`<*5I1(!/\Z`->U3A1X>V8,3,+Q,*B)1,L&U[_V
|
|||
|
M#U!+`P04````"`!0G5H<G6N#S`4(``!=$0``#````$Y%5TA!2S(P+D1/0Y58,
|
|||
|
M75/;2!9]5Y7^PZW:!V#&-L8DP.0E2[`9-`',8#-)'MM2&W4L=7N[6RC^]WOO$
|
|||
|
M;4FVF0Q;JRH,0GV_SKE?,OST>A#.U<9F<*T*"4_K3'AIXPC^^?I+6J>,AM%@L
|
|||
|
M^.8Y@/O)EYO+J\]OG%H:"]/9\0B$SF`\G;VI<+&!/TRN82REE7$41]?)[60&N
|
|||
|
MR?W5[=-X,OY`PO1S?S.:SD:#R=<)B_7GN0Q&7AK/S;)UK0T"1=#ZO@C^XRT)X
|
|||
|
MNOT\&@[&TRN2&)NT*J7VPM-YBFMA?-XJ<'#H<^5@B2`?D>MQ].7F&\QO)J0(8
|
|||
|
M_IH\SI+I_4?^ORR*'BR$4ZDHB@VK&H&5PJ&:#U!N(!=(5Z;<"E(K7"ZS'L.7;
|
|||
|
MP+/Q'.@`M>12_\/9!+PLU\8*JU!]89RG@\Y4-I7@S9:U-OB3P;"'SU'0>6&]/
|
|||
|
MS-";VBJO]#,H/P"8*8VB"6A3H\&7@#89BJ-,IBI#"=2;FG)-.28Z5+?L.Z@QW
|
|||
|
M[,$^,G\\W3W`]>/TKL6'/('YM+M%*G8@R^6F!QZ)6RJ+,>U0]T7IS-0.[N=0C
|
|||
|
MHZG3P0G'4^<;2(4^\.CI0L91:DR!CIJ/\.$("38$ZZ86J%7Y`X='4E$YR28FM
|
|||
|
M]_/D<0)K:YZM*#%H>HR(QY&5_=10Q$MK2G"(ND_S05<+L`,J.Q,.*PWSRBX,<
|
|||
|
ME2/2'D?G@R$*S2EGM*P[J3V)3\861/S5K[_N%Y(H7`=W%D>U\OG?#E.Z(W,8I
|
|||
|
MI&O82W.AGU&S1&,;GR.[1&%+H(BC[U6Y)KL$0.N0KLJ%M.R7EJET3MA-0V,RB
|
|||
|
M@V0.5Y>WMY-Q%_[T$1XN9[,OT\<Q4/G"T\/X<CYY9!X3!%0N45USN@>+BLA9B
|
|||
|
MR;5GJZ;(0(M2=ESLHHGW&>5CFT27<[(_GDYF=/_-5+"B!*VI,C9X]RP]B#UTM
|
|||
|
MS9*MK*DE9ERK@44\;>-H*5Z,55XBV^D*4?,R^$>Z,D-I5`OM*=.I\C$*.D<U)
|
|||
|
M(HJ"],:12%-3:>\^`I`[+C<5!O2]<AX#ZHZ3"^05L=5RTDKVXBC0Y7.#X0L;-
|
|||
|
MTM'H8H,?TD%M+)+=J$*"J32`6T^M\*_,($(8BK'D-C[_U/892G+.&=3I.K!WU
|
|||
|
MH2!_&M_B:.=!#Y'4T@J/<@%//LY9QXXU0L=-,%L<>MMLW57AO/!5Z)4!G$(YJ
|
|||
|
MWR+3R,81Y0$Y*GSH.5Q_C8EC\N*PB=(")Y5$V(YV.LS3;/)&*K8MQ<H#<ND_C
|
|||
|
ME4)$)>FWGHBK6W_<6E+:E6MK7B0-@#C:&1:4656`\Q=.BE^ZGF%"(97"KJ3OY
|
|||
|
MP0U2)NV!BZ-N(E^&4"FI#F\>+H\&--[BJ)V_>]>_.'D507)].<,H"!D-*!9'I
|
|||
|
M_?_SBJ/6_:91O![$)X/SO>E`7OT/D='@="LR&@Q_.N!?Z^&&MG^=HNB>HD`H%
|
|||
|
M]3'AN!13#-M)V0.UY/M:6AYKM@J`O]H$.HL].GV0425F1DMJ="?'IRQ"N%)YB
|
|||
|
MU%RO7JQ:A7&$`",M?U;4%]#P3AXTJ?8PG<V23[<3>'B<XJ\[;D9WI,)53?7NJ
|
|||
|
MU)+CDDX+*;3,H%JC[C&W%DYQH3<@?W@KXLCC;T"(4F&M$L\2K/25U:[MSZP,J
|
|||
|
MI1_1%^[07"A2I/FV@IK^DQKME/.40-/["3AO0^OXM+>_</M`46K%A:)64ZW1E
|
|||
|
M#0.C]^_@<"-=C_XZX@H1J4<Q5/%92IX8I>+>(;B+8X#)#`1D:MF491PMI*^I9
|
|||
|
M?I_NDZ_M+@A29WVS[).U4";6P2$]J!R:OWKLWUX?A1;"[3>.Y(^U3,.D:*L,(
|
|||
|
M':R-7=']6MIB`Y5&8$*FM,.<5"Z-+05QENS,`"I"[D+*.UDL><Q+:XUEF)6'<
|
|||
|
MPT*M:*$IE7/4$`X^'!QQMZ6ABWB%(25@H1A>06XL"EDB-(F&)>+4V_/V+OG]J
|
|||
|
M9AXV-3I"JO0*?3I`\M<5\J=-]9P''_II+L/`4#H,(M^VJZ(6F]!TU@8=6ZA"A
|
|||
|
M^4V(C>*F2A"=30[AS\G=W>G%6>B9?G_Y/>+4IW`65HI5&&6M-*$?4@]5D@:E"
|
|||
|
MG;=5RELP^XF!3/]>>:':BB*.PAB>?9N=GIR_IY3FFY.+X448(0+U_*"T(XVT7
|
|||
|
M^Q"2P^'P/>]'W))I(%(E2\5SMRUNQI$!<K0R?@-7J)(WOV9<&VLW(!8&L>,]-
|
|||
|
M]LE5/`KCB-S%Q\Z'K.7H<[%>2PV'%'(S<'\"53.2>.[0((NC9AI2.ACMA2*DC
|
|||
|
MC);]KE(H$2VO-02>%%F[B-2Y*20TJQ@R'$<M$\[3)SI.69%B'#+U-&D-RUG9>
|
|||
|
MYQV%+#=MZ#:Y2^:7\V1ZSPWH]?L-*^6@FA(_'?7.S\[9,]@?UZ^9;%)]5SA`9
|
|||
|
M.AJ<O(,2GY&!/47M9AL:$%&QD+1@;JOCM7_=@MUNM>&UZ.*,TIUVB(5YD4PM8
|
|||
|
M%T$<E6)#2AN-CH9!.UG0,%4`:A4Z[+EXLC`UTH(*=];'@QG*?)U_#("U*Q2I"
|
|||
|
M%(N"U9<;*,3^NT8W39I&TQ:E,R5UL>_&QM&B>@Y9DD"F./ZT>4N8\ZKTPW?5I
|
|||
|
M&:J$!EI812E):"%9V,I+7N32;H"DEG>(;@03,,S4-H<]);Q#/_2&H%PHS>^K#
|
|||
|
M+H[HL/*T@W&[;X8I;[2*EEIZA1&^LMVN&#I"Z*!+!$$B#JCF1:@"X=FNZ$D8B
|
|||
|
MFQ2EE844CD<I\D$ZA,/_M^\+RVT'0_=:ZGH0UCC$A19A#1?#BXMC_#C;]I+FN
|
|||
|
MQ%+I+(X(Z4`KNV7#)M3QDEFS)ABIK_1+]!:H2.F+A0%_L?#O0I0+D8F!47Y0Y
|
|||
|
MZ70@LXK<V_WJ870&UQ(I$`CGR6^_O8NC_P)02P$"%``4````"``QE5H<4<G+%
|
|||
|
MN:5'``!\G0``"@```````````"``````````3D@R3U,R+D5815!+`0(4`!0`6
|
|||
|
M```(`"J76AS;Q)1TUS<``-Q?```*````````````(````,U'``!.2#)$3U,N]
|
|||
|
M15A%4$L!`A0`%`````@`4)U:')UK@\P%"```71$```P``````````0`@````B
|
|||
|
FS'\``$Y%5TA!2S(P+D1/0U!+!08``````P`#`*H```#[AP``````=
|
|||
|
``
|
|||
|
end
|
|||
|
|
|||
|
|
|||
|
End Of Sphear Digital Magazine
|
|||
|
Issue #3 - 05.13.94
|