2738 lines
146 KiB
Plaintext
2738 lines
146 KiB
Plaintext
|
||
Sphear
|
||
------
|
||
__ ___ __ ___
|
||
/ / / / / / /\ / /
|
||
\ /__/ /__/ /__ /__\ /__/
|
||
__/ / / / /__ / / / \
|
||
|
||
DigiZine
|
||
|
||
Phreaking
|
||
Hacking
|
||
Anarchy
|
||
(And AnyThing Else P/H/A/C/C/V)
|
||
Editor: Signal
|
||
File Contributions:John Deere
|
||
Sphear can be reached at
|
||
system@axposf.pa.dec.com
|
||
~or~
|
||
sphear.digizine@lambada.oit.unc.edu
|
||
|
||
Issue #3
|
||
[05.13.94]
|
||
|
||
If you have any articles, advertisements,
|
||
worthy of our time please send them by
|
||
Internet email to system@axposf.pa.dec.com
|
||
Also, Sphear entertains any editorials and
|
||
interesting articles and pays $3 for any
|
||
article that is published.
|
||
|
||
|
||
|
||
|
||
|
||
Contents
|
||
--------
|
||
Clarifications
|
||
|
||
|
||
Articles
|
||
-+-+-+-+
|
||
|
||
Digital Turmoil? by Signal
|
||
----------------------------
|
||
|
||
Enclosure
|
||
~~~~~~~~~
|
||
Federal Communications Commission
|
||
Docket 91-281
|
||
Regarding Caller Number Identification
|
||
|
||
Files
|
||
+-+-+
|
||
NewHack2.Zip
|
||
by
|
||
John Deere
|
||
|
||
|
||
Clarifications
|
||
--------------
|
||
|
||
Due to circumstances beyond our control Sphear Digital Magazine has been out of print(e-text) for several months. We apologize for any inconvenience this may have caused, and sincerely hope that there are no more delays in the future. Thank you for your patience.
|
||
|
||
--Ed. \
|
||
\/////////////////
|
||
\/Digital Turmoil/
|
||
\/////////////////
|
||
by Signal
|
||
|
||
Digital Turmoil? Does that word mean anything to the average Joe? The
|
||
person who doanloads those outlawed, enncoded graphic files on the Net? No.
|
||
The normal, or even not so normal internet user, has probably never dealt
|
||
with digital turmoil. It is a plague only known by some of those lowly system
|
||
administrators; those sysadmins that have nothing better to do but to
|
||
reconfigure their systems, hour after hour, day after day. It could be said
|
||
that only he knows what it means. Digital Turmoil. Is it something that Hackers
|
||
create, or is it created by blindsighted software designers, who do nothing for
|
||
a living but churn out huge and almost useless programs? That is the question.
|
||
The internet is a very complex and unregulated system and this digital turmoil
|
||
that does exist does not exist for the benefit of anyone, 'cept for the
|
||
aggeravation of the system administrators. Turmoil on the net can included,
|
||
cleverly forged email, so that it is NOT tracable with STMP, and sendmail. Of
|
||
course cracking in to a system and fucking up major, not the user partition or
|
||
files but just making it so that root has to stay up all nite long--sleep
|
||
deprivation.
|
||
|
||
|
||
|
||
|
||
FOR FCC RECORD ONLY
|
||
|
||
BEFORE THE
|
||
FEDERAL COMMUNICATIONS COMMISSION
|
||
FCC 94-59
|
||
WASHINGTON, D.C.
|
||
|
||
|
||
|
||
IN THE MATTER OF )
|
||
)
|
||
Rules and Policies Regarding ) CC Docket No. 91-281
|
||
Calling Number Identification )
|
||
Service - Caller ID )
|
||
|
||
Due to technical difficulties, footnotes, tables & charts may be
|
||
dropped from this document. Entire document is available in Word
|
||
Perfect also.
|
||
|
||
REPORT AND ORDER AND FURTHER NOTICE OF PROPOSED
|
||
RULEMAKING
|
||
|
||
Comments due: May 18, 1994
|
||
Replies due: June 21, 1994
|
||
|
||
Adopted: March 8, 1994 Released: March 29, 1994
|
||
|
||
By the Commission: Commissioner Barrett issuing a statement.
|
||
|
||
TABLE OF CONTENTS
|
||
|
||
Title Paragraph
|
||
|
||
I. INTRODUCTION 1
|
||
|
||
II. DISCUSSION
|
||
|
||
A. Calling Party Number Services Should be Available
|
||
to Interstate Subscribers Nationally
|
||
1. Risks and Benefits 4
|
||
2. Deployment by Carriers 10
|
||
|
||
B. Transmission of the Calling Party Number
|
||
throughout the Network 12
|
||
|
||
C. Costs of Interstate Transmission of Calling
|
||
Party Number 18
|
||
|
||
D. Privacy Issues 24
|
||
1. Constitutional Issues 25
|
||
2. Public Policy and Privacy Mechanisms 31
|
||
3. Private Networks, Emergency Services and
|
||
Law Enforcement 35
|
||
|
||
E. Privacy Protection Mechanisms, Further Notice of
|
||
Proposed Rulemaking 38
|
||
1. Per Line Blocking for Specific Groups 39
|
||
2. Per Line Blocking Available to All Subscribers 41
|
||
3. Operator Assisted Per Call Blocking 44
|
||
4. Automatic Per Call Blocking 45
|
||
5. Applicability to Additional Services 50
|
||
|
||
F. ANI and Caller Privacy 51
|
||
|
||
G. Subscriber Education, Further Notice of Proposed
|
||
Rulemaking 59
|
||
|
||
H. CPNI and Subscriber Privacy 61
|
||
|
||
I. Wiretap Statutes and Caller ID 62
|
||
|
||
J. Relationship between Interstate and Intrastate
|
||
Caller ID 64
|
||
|
||
III. CONCLUSION 71
|
||
|
||
IV. PROCEDURAL MATTERS 73
|
||
|
||
V. ORDERING CLAUSES 77
|
||
|
||
APPENDICES
|
||
|
||
I. INTRODUCTION.
|
||
|
||
1. On October 23, 1991, the Commission issued a Notice of
|
||
Proposed Rulemaking in this docket. More than 100 parties filed
|
||
comments, including local exchange carriers (LECs),
|
||
interexchange carriers (IXCs), state governments, public interest
|
||
organizations, trade associations, and private citizens.
|
||
|
||
2. In the NPRM, the Commission sought to develop the most
|
||
effective policies to govern interstate calling party number
|
||
based services such as caller ID. The NPRM sought comment on
|
||
carriers' progress in deploying interstate caller ID service, and
|
||
the technical and public policy implications of dual federal and
|
||
state regulatory policies. We tentatively concluded that a
|
||
federal model for the interstate delivery of the calling party's
|
||
number is in the public interest, and necessary for the
|
||
introduction of many valuable services, including interstate
|
||
caller ID.
|
||
|
||
3. In this Order, we find that a federal model for
|
||
interstate delivery of calling party number is in the public
|
||
interest, that calling party privacy must be protected, and that
|
||
certain state regulation of interstate calling party number
|
||
(CPN) based services, including interstate caller ID, must be
|
||
preempted. We amend Part 64 of the rules to require that common
|
||
carriers using Common Channel Signalling System 7 (SS7) and
|
||
subscribing to or offering any service based on SS7 functionality
|
||
must transmit the calling party number parameter and its
|
||
associated privacy indicator on an interstate call to connecting
|
||
carriers. We also require that carriers offering CPN delivery
|
||
services provide, at no charge to the caller, an automatic per
|
||
call blocking mechanism for interstate callers. The rules
|
||
require that terminating carriers providing calling party based
|
||
services, including caller ID, honor the privacy indicator. We
|
||
find that the costs of interstate transmission of CPN are de
|
||
minimis, and that the CPN should be transmitted among carriers
|
||
without additional charge. We also require that carriers
|
||
participating in the offering of any service that delivers CPN on
|
||
interstate calls inform telephone subscribers that the
|
||
subscriber's number may be revealed to called parties and
|
||
describe what steps subscribers can take to avoid revealing their
|
||
numbers. Further, we adopt rules to restrict the reuse or sale
|
||
of information generated by automatic number identification (ANI)
|
||
or charge number services, absent affirmative subscriber
|
||
consent. Finally, we note that additional comments are sought
|
||
through a separate public notice in the Computer III Remand
|
||
Proceeding on whether residential and small business customers'
|
||
privacy concerns warrant revision of the Commission's rules
|
||
governing reuse and sale of customer proprietary network
|
||
information (CPNI). In the Further Notice of Proposed
|
||
Rulemaking, we seek comment on whether more detailed customer
|
||
education rules should be adopted. We also seek comment on
|
||
extending the policies adopted herein to other services that
|
||
might identify the calling party.
|
||
|
||
|
||
II. DISCUSSION.
|
||
|
||
A. Calling Party Number Services Should be Available to
|
||
Interstate Subscribers Nationally.
|
||
|
||
4. Risks and Benefits. In the NPRM, the Commission stated
|
||
its tentative view that the availability of interstate caller ID
|
||
would enhance the value of the service to intrastate subscribers
|
||
and augment the available choices of existing interstate services
|
||
for all subscribers. The Commission noted that the ability to
|
||
choose caller ID and other services that rely on access to the
|
||
calling party's number should be available to interstate
|
||
subscribers nationally. The majority of commenters supported
|
||
this view and described in detail the potential benefits to the
|
||
public of services based on the calling party's number.
|
||
|
||
5. In its comments, AT&T identified potential uses of
|
||
interstate calling party number for such services as pay-per-view
|
||
television, order entry/verification, voice message storage,
|
||
secure computer access, customized customer service, business
|
||
fraud reduction, call routing, emergency dispatch, health care
|
||
services, telephone banking, home shopping, dealer locator, and
|
||
selective call message forwarding. McCaw states that caller
|
||
information will significantly improve cellular and other service
|
||
offerings because cellular subscribers pay for incoming calls.
|
||
Moreover, McCaw notes that ubiquitous caller ID will facilitate
|
||
cellular enhancements including conventional caller ID, more
|
||
responsive customer service, new cellular CPE voice synthesizers,
|
||
and service for roaming subscribers. SNET states that its
|
||
studies show that caller ID aids persons with hearing impairments
|
||
in answering calls; law enforcement in determining crank,
|
||
threatening, false alarm calls and emergency dispatches; and
|
||
hospital crisis centers in identifying and deterring nuisance
|
||
calls.
|
||
|
||
6. In contrast, Colorado DVC asserts that caller ID is not
|
||
in the public interest because of the threat it poses to the
|
||
privacy and safety interests of the calling party. Colorado
|
||
Consumer contends that call trace is the preferable service to
|
||
stop obscene and harassing calls. Bell Atlantic replies that
|
||
call trace will not work if another call is received before
|
||
tracing is attempted, and that customers who have used both
|
||
caller ID and call trace prefer the former. Consumer Action,
|
||
Washington UTC, and NYS Law agree with Colorado DVC that caller
|
||
ID has little merit and may threaten public health and safety as
|
||
well as jeopardize important privacy interests.
|
||
|
||
7. While we agree that passage of the calling party number
|
||
does create risks of lost privacy, we must weigh these risks
|
||
against the potential benefits brought by interstate services
|
||
that passage of the calling party's number makes possible. Other
|
||
services available to protect subscriber privacy, such as Call
|
||
Trace, are limited in scope and do not permit either the public
|
||
or service providers to take advantage of beneficial services.
|
||
The commenters briefly discuss some of these benefits. For
|
||
example, computer systems could limit remote access only to
|
||
previously approved calling numbers, with calling party number
|
||
based services like caller ID making verification for access
|
||
nearly instantaneous. Service providers who respond to telephone
|
||
orders, such as stock brokers or parts and equipment dealers,
|
||
could use the calling party's number to direct the call
|
||
immediately to the appropriate department for service. Banks
|
||
could program data sources to have customer profile information
|
||
available as a call is answered. With interstate delivery of
|
||
calling party number, calls to national service centers could be
|
||
routed automatically to local service centers closest to the
|
||
calling party. Consumers making orders could have their name,
|
||
address and billing information verified instantaneously.
|
||
Indeed, a significant number and kind of customized national
|
||
services can develop as a result of instant recognition of the
|
||
calling party.
|
||
|
||
8. Many of these potential services would permit
|
||
transactions to occur more efficiently. In an economy that
|
||
averages more than one billion interstate calling minutes a day,
|
||
even small efficiencies on individual calls could become
|
||
significant in the aggregate. Providing the public with rapid
|
||
and efficient interstate telecommunications services is at the
|
||
heart of our responsibilities, particularly if they can be
|
||
provided at very little additional cost. As illustrated above,
|
||
passage of the calling party number can promote technological
|
||
innovation and new applications that will foster economic
|
||
efficiency and provide new employment, manufacturing and
|
||
investment opportunities.
|
||
|
||
9. None of these services and benefits are possible,
|
||
however, unless the calling party number is passed freely among
|
||
carrier networks. It is significant that the categories of those
|
||
benefiting from these new opportunities are very broad. For
|
||
example, consumers and individuals benefit by having additional
|
||
options for meeting their customer service needs and by having
|
||
transactions completed more quickly and more accurately. As
|
||
workers and entrepreneurs, they benefit by having new employment
|
||
opportunities. Businesses benefit because they can complete
|
||
transactions more quickly, which can lower incremental costs of
|
||
transactions, potentially leading to savings for consumers.
|
||
Telephone companies benefit by revenues from new services, and by
|
||
greater use of their networks. Greater use of CPN based services
|
||
by consumers and service providers will create incentives for
|
||
carriers who do not have SS7 networks to install them. This will
|
||
enhance the nation's telecommunications infrastructure, to the
|
||
benefit of all who use it. Most of the comments directed against
|
||
our proposal in the NPRM are based on legitimate concerns that
|
||
individuals have access to a means of protecting their privacy
|
||
where doing so is important. We believe technology can address
|
||
these concerns regarding protections for individual privacy.
|
||
Accordingly, we find that the potential benefits of services
|
||
based on calling party number serve the public interest and
|
||
affirm the NPRM's tentative conclusion that CPN-based interstate
|
||
services such as caller ID should be available to interstate
|
||
subscribers nationwide.
|
||
|
||
10. Deployment by Carriers. In the NPRM, the Commission
|
||
sought detailed comments on carriers' progress toward
|
||
establishing joint offerings of CPN-based services, and any
|
||
impediments that have been identified. The record does not
|
||
reflect extensive response to that inquiry. It appears that
|
||
although the deployment of the necessary technology for
|
||
interstate calling party number based services is well underway,
|
||
other factors have impeded progress. In particular, varying
|
||
state regulatory responses to privacy issues appear to be
|
||
impeding the development of interstate services. Moreover,
|
||
commenters express concern that this lack of national uniformity
|
||
in regulating interstate SS7 calling party number based services
|
||
may eliminate a source of the revenues expected from such
|
||
services. In their comments, Rochester, Ameritech, BellSouth,
|
||
GTE, McCaw, and US West support a national policy for caller ID
|
||
because federal standards are essential to achieve the goals of
|
||
nationwide availability of calling party number based services.
|
||
McCaw states that it supports a federal policy for caller ID and
|
||
ANI that accommodates both state concerns and industry
|
||
diversification and experimentation. In contrast, Allnet
|
||
contends that there is no compelling federal interest to promote
|
||
nationwide availability of caller ID and that if there is a
|
||
demand for interstate caller ID, market forces will assure its
|
||
availability.
|
||
|
||
11. The record reflects that national policies on
|
||
interstate CPN-based services such as caller ID are needed to
|
||
reduce risks of stranded investment and to remove impediments to
|
||
development of services consumers are likely to find beneficial.
|
||
In addition to providing additional choices for consumers, such
|
||
services offer significant efficiency dividends for all users of
|
||
interstate telephone services. These efficiency gains promise to
|
||
lower incremental costs of interstate calling party number based
|
||
services, including caller ID, and increase national
|
||
productivity. Carriers may be wary to invest in technology or
|
||
delivery systems that may later become incompatible with the
|
||
varying state requirements or incapable of satisfying federal
|
||
policy. Resolution of privacy, blocking, and preemption issues
|
||
is necessary to enable the benefits of these services to occur.
|
||
By removing impediments created by administrative uncertainty, we
|
||
seek only to resolve those issues necessary for the efficient
|
||
introduction of the services. The effective date of the rules
|
||
adopted here will be April 12, 1995, which should allow
|
||
sufficient time for completion of any coordination or other
|
||
arrangements, discussed infra, necessary for full compliance with
|
||
the rules.
|
||
|
||
B. Transmission of the Calling Party Number throughout
|
||
the
|
||
Network.
|
||
|
||
12. In the NPRM, we tentatively concluded that the
|
||
transmission of the CPN by the LEC to the IXC is an essential
|
||
element of interstate CPN-based services such as caller ID. The
|
||
Commission proposed that LECs should be required to provide CPN
|
||
to IXCs as soon as technologically feasible and, similarly, that
|
||
IXCs should be required to transmit CPN to terminating LECs.
|
||
|
||
13. AT&T states that requiring IXCs to transmit interstate
|
||
CPN to LECs is unnecessary because the competitive market already
|
||
gives IXCs incentive to offer innovative interstate caller ID
|
||
services to end users. Moreover, AT&T contends that such a
|
||
requirement would deprive IXCs of the ability to earn revenues
|
||
from their substantial investments in SS7 technology. Allnet
|
||
argues that the requirement would compel all IXCs to participate
|
||
in SS7 interconnection, thus compromising network integrity.
|
||
|
||
14. Ameritech, Nynex, Pacific, Centel, and NTIA concur
|
||
that the Commission should facilitate the provision of interstate
|
||
caller ID by requiring passage of the calling party's number
|
||
between carrier networks without modification. MCI agrees that
|
||
the Commission should require LECs to provide the CPN to IXCs,
|
||
but it opposes any requirement that IXCs be required to transmit
|
||
the CPN to the terminating LEC because it states the LEC would
|
||
then be the lone provider of caller ID. In opposition, BellSouth
|
||
contends that the transmission of the CPN is essential, and as
|
||
part of SS7 does not require additional network processing by the
|
||
IXC nor impose significant cost. Further, BellSouth argues that
|
||
free delivery of the CPN to terminating LECs would not establish
|
||
LECs as monopoly providers; rather, IXCs could develop competing
|
||
CPN-based interstate services that bypass LECs as terminating
|
||
carriers. NTIA and USTA assert that an IXC's offering of the
|
||
calling party number should be available through all means of
|
||
interconnection to end users, including LECs, alternative local
|
||
service providers, or the IXC itself.
|
||
|
||
15. Nynex proposes that mandatory delivery of the calling
|
||
party number parameter among all networks is in the public
|
||
interest. Further, Nynex supports McCaw's proposal that
|
||
technical standards for transmission of caller ID and ANI between
|
||
cellular and landline carriers be developed. However, it notes
|
||
that cellular carriers do not receive ANI from Nynex because
|
||
transmission of ANI to cellular carriers is not technologically
|
||
feasible.
|
||
|
||
16. We affirm our tentative finding that interstate CPN-
|
||
based services such as caller ID will not be possible unless the
|
||
calling party number is transmitted from the originating carrier
|
||
to the terminating carrier. In our 800 number portability
|
||
proceeding, major LECs filed access tariffs providing for 800
|
||
number portability using SS7 technology. Many Bell Operating
|
||
Companies (BOCs) have filed access tariffs with CPN as a
|
||
nonchargeable option. Calling party number is an element of
|
||
access service in virtually all SS7 access tariffs filed at the
|
||
Commission and these tariffs follow industry standards for SS7
|
||
interconnection. The American National Standard for
|
||
Telecommunications - Signalling System Number 7 (SS7) -
|
||
Integrated Services Digital Network, ANSI T1.113, 1988, includes
|
||
calling party number as an optional parameter of an SS7 network.
|
||
Similarly, the subsequent BellCore guidelines for SS7
|
||
interconnection with a BOC include CPN as an optional
|
||
parameter.
|
||
|
||
17. We conclude that carriers should pass calling party
|
||
number information where capable of doing so. In view of the
|
||
foregoing, we amend Part 64 of the rules to require that not
|
||
later than April 12, 1995, common carriers using Signalling
|
||
System 7 and subscribing to or offering any service based on SS7
|
||
functionality must transmit the calling party number parameter
|
||
and its associated privacy indicator to connecting carriers on an
|
||
interstate call. Further, we amend the rules to prohibit
|
||
common carriers from modifying or overriding the privacy
|
||
indicator on an interstate call. We emphasize that carriers are
|
||
not required to invest in SS7 technology in order to facilitate
|
||
delivery of the calling party number. Carriers are only required
|
||
to transmit the CPN and privacy indicator where technically
|
||
feasible. Because transmission of the calling party number
|
||
requires SS7 technology, technical feasibility exists wherever
|
||
SS7 technology is used. We now turn to the issue of the costs
|
||
associated with the transmission of the CPN.
|
||
|
||
|
||
C. Costs of Interstate Transmission of Calling Party
|
||
Number.
|
||
|
||
18. Most IXC commenters contend that, if required to
|
||
transmit the calling party number, IXCs should be compensated for
|
||
such transmission. AT&T avers that IXCs incur costs in acquiring
|
||
and delivering interstate CPN and that its decision to invest in
|
||
SS7 rested in part on the anticipation of revenue from new
|
||
services such as caller ID. MCI concurs with AT&T and further
|
||
contends that IXCs already pay for calling party numbers as part
|
||
of feature group D switched access and are developing services
|
||
which will provide the called party with the calling party's
|
||
telephone number. Allnet proposes that IXCs who do not
|
||
voluntarily engage in forwarding caller ID should not bear any of
|
||
the costs of deployment. Metromedia argues that carriers
|
||
terminating calls should be responsible for billing those called
|
||
parties subscribing to interstate caller ID where appropriate;
|
||
terminating carriers should compensate IXCs passing the
|
||
information.
|
||
|
||
19. Nynex believes that if the CPN is passed freely from
|
||
carrier to carrier, then each carrier may use it to provide
|
||
services to end users, consistent with cost-based rather than
|
||
market-based pricing for Open Network Architecture service
|
||
offerings. Bell Atlantic agrees that if IXCs are allowed to
|
||
charge for calling party number the cost to consumers will be
|
||
unnecessarily increased. United states that a single price
|
||
established in the local jurisdiction for all caller ID
|
||
regardless of jurisdiction is appropriate. United cites to the
|
||
precedent for local service pricing of custom calling features
|
||
like call forwarding of interstate toll calls.
|
||
|
||
20. SWB concurs with other commenters that CPN should be
|
||
passed from carrier to carrier at no charge because it is an
|
||
intrinsic part of SS7 call setup and no cost is
|
||
associated with filling the calling party number parameter in the
|
||
SS7 message. SWB disagrees with IXCs such as AT&T, MCI, and
|
||
Allnet which assert that charging for passage of the CPN would
|
||
permit them to share in revenues from the LEC's services that
|
||
depend on passage of the calling party number. In essence,
|
||
states SWB, the IXCs want to charge for the passage but receive
|
||
it free. SWB proposes that the Commission require passage at no
|
||
charge, thus eliminating extra charges which would be passed on
|
||
to consumers.
|
||
|
||
21. McCaw agrees with SWB that CPN should be passed free of
|
||
charge. McCaw asserts that to encourage maximum possible
|
||
participation of all carriers as co-equal carriers, the
|
||
Commission should prohibit compensation among carriers that pass
|
||
ANI or caller ID information because the costs of ANI and caller
|
||
ID are recovered in the overall SS7 costs. Centel argues that
|
||
IXCs should be prohibited from charging either the originating or
|
||
terminating LEC for transport. Centel asserts that revenue
|
||
sharing issues should be resolved between carriers, and notes
|
||
that it would cost IXCs more to remove the CPN from their systems
|
||
than to allow passage to terminating LECs.
|
||
|
||
22. CFA, Colorado DVC, Maryland PC, Michigan PSC and others
|
||
argue that costs associated with caller ID should be borne by
|
||
subscribers to the service. The Illinois CC notes that it has
|
||
ordered that the costs of providing per call blocking be borne by
|
||
those who subscribe to caller ID. IIA proposes that the per call
|
||
blocking costs should be imposed upon the calling party on the
|
||
theory that suppression of the calling number is a special
|
||
service the cost for which should be borne by the party who
|
||
chooses to invoke it. Consumer Action contends that LECs are
|
||
improperly allocating the costs of the SS7 switches and supports
|
||
this contention with data which it believes show that the body of
|
||
ratepayers is subsidizing SS7-based service, which only benefits
|
||
5-6% of telephone customers.
|
||
|
||
23. We find that the unimpeded flow of the calling party
|
||
number throughout the network ensures the greatest diversity of
|
||
offerings to subscribers and eliminates costs that can delay or
|
||
impede development of CPN based services. To the extent these
|
||
services improve productivity, lower incremental costs and create
|
||
new employment, investment and other opportunities, they benefit
|
||
a wide range of consumers and producers. As noted above,
|
||
industry standards already include calling party number as an
|
||
optional parameter of an SS7 network, and the calling party
|
||
number is an element of access service in virtually all SS7
|
||
access tariffs filed at the Commission. In most cases, SS7
|
||
signalling replaces older signalling methods used in an IXC
|
||
network and provides benefits to the carrier such as more
|
||
efficient call routing and reduced exposure to fraud. We thus
|
||
conclude from the record before us that the costs of transmitting
|
||
CPN are de minimis, and that accordingly, the calling party
|
||
number parameter and associated privacy indicator should be
|
||
transmitted among carriers at no additional charge.
|
||
|
||
|
||
D. Interstate Caller ID Privacy Issues.
|
||
|
||
24. In the NPRM, we balanced the privacy interest of the
|
||
called party against the privacy interest of the caller and
|
||
proposed that interstate caller ID should include some measures
|
||
to protect calling parties' privacy. We sought comment on
|
||
whether these privacy interests are matters of public policy or
|
||
are constitutional in nature. We noted that any regulatory
|
||
response to protect the privacy interest of the calling party
|
||
should take into account the public benefits of caller ID and
|
||
should not undermine the value of the service overall. Most
|
||
commenters agree that societal expectations of privacy require
|
||
that interstate caller ID include some type of privacy protection
|
||
mechanism.
|
||
|
||
25. Constitutional Issues. AT&T contends that the
|
||
provision of interstate caller ID by private telephone companies
|
||
does not implicate the U.S. Constitution, which, AT&T argues,
|
||
does not regulate private activity relevant to this proceeding.
|
||
GTE concurs with AT&T and adds that in recent cases the courts
|
||
found no state action was involved when a LEC refused to provide
|
||
communications service or billing and collection service to dial-
|
||
a-porn providers. Further, GTE argues that in Smith v.
|
||
Maryland, 442 U.S. 735 (1979), (Smith), the U. S. Supreme Court
|
||
held that there is no federal constitutional protection from
|
||
disclosure of digits dialed on the network.
|
||
|
||
26. In opposition, Georgia CUC cites to testimony before
|
||
the Georgia PUC that concludes that information is
|
||
constitutionally protected when a legitimate expectation exists
|
||
that the information will remain confidential. California PUC
|
||
contends that there exists a non-frivolous claim that the First
|
||
Amendment right to free speech includes a right of the calling
|
||
party not to be compelled to disclose his or her telephone
|
||
number. Ohio OCC concurs that there is an identifiable federal
|
||
constitutional privacy interest that includes telephone digits
|
||
and supports this argument citing Griswold v. Connecticut, 381
|
||
U.S. 479 (1965) (the right to make decisions about procreation)
|
||
(Griswold), and Whalen v. Roe, 429 U.S. 589 (1977) (individual
|
||
interest in avoiding disclosure of personal matters) (Whalen).
|
||
Pennsylvania PUC states that the Commonwealth Court of
|
||
Pennsylvania held that caller ID is per se unconstitutional under
|
||
the Pennsylvania state constitution because of the theoretical
|
||
risk that a caller wanting to remain anonymous would accidentally
|
||
forget to use the available blocking feature.
|
||
|
||
27. The record and case law demonstrate that there is no
|
||
federal constitutional bar to the offering by carriers of CPN-
|
||
based services such as caller ID. In Smith, the Supreme Court
|
||
held that there is no privacy right under the Fourth Amendment
|
||
protecting telephone numbers from disclosure because the
|
||
application of the Fourth Amendment depends on whether first, the
|
||
person invoking protection can claim that a "legitimate
|
||
expectation of privacy" has been invaded by the government. In
|
||
Smith, pen register records kept upon police request by a
|
||
telephone carrier on calls made by a robbery suspect became
|
||
evidence used to convict him on robbery charges. At issue was
|
||
whether seizure by police of the record of phone numbers that the
|
||
suspect called constituted a "search" for Fourth Amendment
|
||
purposes and thus required a warrant. The court's decision
|
||
rested upon analysis of whether the individual exhibits an
|
||
expectation that something will remain private, and second,
|
||
whether the individual's subjective expectation of privacy is one
|
||
which society is prepared to recognize as objectively reasonable.
|
||
Smith at 740. The court held that the expectation of privacy for
|
||
phone numbers is not one that society is prepared to recognize as
|
||
reasonable, because when one voluntarily exposes his phone number
|
||
to the telephone company's equipment, one assumes the risk that
|
||
the company may reveal the number to others. Id. at 743-45. The
|
||
Court also drew a distinction between the content of a phone
|
||
conversation and the number dialed and found that protecting the
|
||
content is more important than the number dialed because phone
|
||
numbers are not communication in and of themselves, but merely
|
||
establish that communication has been attempted. Id. at 741.
|
||
|
||
28. The Pennsylvania state court ruling cited by the
|
||
Pennsylvania PUC does not suggest otherwise. The Commonwealth
|
||
Court struck down Pennsylvania PUC's order which had approved
|
||
caller ID in part because the court found that, even with a
|
||
blocking mechanism, caller ID violates Pennsylvania
|
||
constitutional privacy rights. The constitutional privacy
|
||
right asserted in Barasch rests on the court's interpretation of
|
||
the Pennsylvania Constitution. Id. at 87, 89. However, the U.S.
|
||
Constitution is not cited in Barasch as imposing any privacy
|
||
right in a phone number; indeed, such an interpretation would be
|
||
inconsistent with Smith. Moreover, on appeal, the Supreme Court
|
||
of Pennsylvania held that caller ID violates the "trap and trace"
|
||
provisions of the state wiretap law and did not address the
|
||
constitutional privacy issue.
|
||
|
||
29. GTE cites two cases (supra, note 16) in support of the
|
||
principle that common carriers are private entities and thus no
|
||
state interference with individual privacy rights is involved.
|
||
DISC involves a challenge by dial-a-porn companies to the Helms
|
||
Amendment, 47 U.S.C. 223 (b) & (c), which allows phone
|
||
companies to require dial-a-porn services to notify them that
|
||
they will be providing indecent messages and/or to require dial-
|
||
a-porn services to utilize independent billing. The Court of
|
||
Appeals held that no prior restraint of free speech was created
|
||
by the statute because no governmental action was involved. The
|
||
statute merely permits phone companies to choose whether to
|
||
provide billing services to dial-a-porn companies. Similarly,
|
||
Information Providers involves a challenge to Section 223 of the
|
||
Communications Act of 1934, as amended, 47 C.F.R. 64.201
|
||
(1991). The court held that carriers are private companies, not
|
||
state actors, and are, therefore, not required to continue,
|
||
restrict, or terminate services of particular users and that a
|
||
carrier is free under the constitution to terminate service to
|
||
dial-a-porn operators altogether. These cases generally support
|
||
the proposition that when a carrier can choose whether to offer
|
||
certain services, no state action is involved.
|
||
|
||
30. On the basis of this body of law and the record, we
|
||
find that the offering of caller ID does not violate privacy
|
||
rights protected by the U.S. Constitution. Constitutional
|
||
protections of privacy relate to government action and no
|
||
government action is involved here. Moreover, we find that
|
||
federal courts have not, to date, recognized an individual
|
||
privacy right in telephone numbers.
|
||
|
||
31. Public Policy and Privacy Mechanisms. The majority of
|
||
commenters agree that the privacy interests associated with
|
||
caller ID are a matter of public policy or societal expectation.
|
||
California Consumer Affairs proposes that federal interstate
|
||
caller ID policies must recognize that the governmental interest
|
||
in protecting public health, safety and welfare dictates that
|
||
some blocking option be available. NY Law Project underscores
|
||
that with a relatively inexpensive personal computer and a CD ROM
|
||
reader, a business caller ID subscriber could access data bases
|
||
and display a data profile of a caller even before the telephone
|
||
is answered, or while the call is in progress. SWB recognizes
|
||
the need to protect the confidentiality of non-published numbers,
|
||
undercover police officers, domestic violence shelters, and the
|
||
integrity of hotlines. Massachusetts contends that the effective
|
||
functioning of law enforcement in Massachusetts would be
|
||
compromised if caller ID were offered without a privacy
|
||
protection mechanism. GTE, however, asserts that tariff language
|
||
requires that the caller identify himself to the called party.
|
||
Nynex contends that caller ID redresses a longstanding imbalance
|
||
which favored the calling party because the called party had no
|
||
information on which to decide whether or not to answer the
|
||
telephone.
|
||
|
||
32. BellSouth proposes that with all number delivery,
|
||
callers can protect their identity by calling from telephones not
|
||
recognizable by the called party. BellSouth states it has
|
||
developed specialized service offerings for the privacy concerns
|
||
of law enforcement and domestic violence shelters. Bell Atlantic
|
||
also advocates unrestricted delivery on the premise that per call
|
||
blocking is used infrequently and provides malicious callers the
|
||
opportunity to continue to make harassing calls. MCI states that
|
||
delivery of the calling party number should be unrestricted
|
||
because unlimited availability of customer initiated blocking
|
||
will undermine the service and diminish its value to the public.
|
||
However, MCI concurs with BellSouth that limited blocking should
|
||
be available to protect public safety groups. USCG proposes that
|
||
any blocking mechanisms not apply to calls made to United States
|
||
Coast Guard emergency telephone numbers. USTA is in favor of
|
||
unrestricted delivery of caller ID across all carrier networks,
|
||
whether interstate or intrastate. However, USTA proposes that
|
||
per call blocking for specific applications may be appropriate.
|
||
|
||
33. IIA argues that unrestricted delivery of caller ID
|
||
threatens a broader concept of information privacy -- a right of
|
||
the individual to control the dissemination of information about
|
||
one's self and one's activities. Kentucky states that Bell
|
||
Atlantic's claims of reduced harassing and obscene calls appear
|
||
to be more a function of changes in the handling and routing of
|
||
such calls than any real reduction on the actual placing of these
|
||
calls. Ohio OCC states that unrestricted delivery of caller ID
|
||
would undermine the ability of professionals who must work from
|
||
their residence, and that public hearing testimony in Ohio
|
||
resounded with consumer objections to disclosure of non-published
|
||
numbers.
|
||
|
||
34. Most commenters do not advocate completely unrestricted
|
||
delivery. Even those commenters that advocate unrestricted
|
||
delivery suggest a limitation on availability of the CPN under
|
||
specific circumstances. In light of the extensive record before
|
||
us, we conclude that a regulatory framework for interstate CPN-
|
||
based services such as caller ID should include some type of
|
||
privacy protection mechanism. We affirm our prior tentative
|
||
conclusion that the calling public has an interest in exercising
|
||
a measure of control over the dissemination of telephone numbers
|
||
that must be reflected in federal policies governing caller ID
|
||
service. We discuss specific privacy mechanisms in Section E
|
||
below.
|
||
|
||
35. Private Networks, Emergency Services, and Law
|
||
Enforcement. AT&T proposes that there should be no blocking
|
||
mechanisms prescribed for private or virtual private networks
|
||
because blocking on business services and on private networks
|
||
would intrude on the rights of private and virtual private
|
||
network owners to determine the amount of information delivered
|
||
on internal calls carried on their networks. AT&T and GTE concur
|
||
that business services do not commonly implicate personal safety
|
||
concerns and in a business context, identification is expected.
|
||
The NPRM sought comment on whether blocking mechanisms jeopardize
|
||
calling party identification by emergency services. USCG states
|
||
that blocking mechanisms should not apply to calls made to
|
||
emergency telephone numbers because they could degrade emergency
|
||
service operations. Pacific Bell notes that emergency services
|
||
could be affected where an individual calling line identification
|
||
display device is being used in place of the standard public
|
||
safety answering point console arrangement.
|
||
|
||
36. In the NPRM, we proposed that the privacy requirements
|
||
adopted herein to address the privacy concerns within the public
|
||
network should not apply to communications within private or
|
||
virtual private networks. We affirm that privacy expectations of
|
||
the calling party are different when they arise in the context of
|
||
internal calls within a single private network. Moreover,
|
||
commenters did not dispute that caller ID systems raise very
|
||
limited privacy expectations if used solely in connection with
|
||
legally authorized call tracing and trapping procedures
|
||
specifically requested by a law enforcement agency. We do not
|
||
apply the privacy requirements adopted in this order to these
|
||
narrow sets of circumstances.
|
||
|
||
37. The record indicates that blocking mechanisms do not
|
||
affect Enhanced 911 services, which currently locate the calling
|
||
party on emergency calls via ANI rather than SS7-based caller ID
|
||
services, which include blocking mechanisms. However, as
|
||
indicated by USCG and Pacific Bell, blocking mechanisms may
|
||
jeopardize emergency services which rely on caller ID and thus
|
||
pose a serious threat to public health and safety. To the
|
||
extent that CPN based services are used to deliver emergency
|
||
services, we find that privacy requirements for CPN based
|
||
services should not apply to delivery of the CPN to a public
|
||
agency's emergency line, a poison control line, or in conjunction
|
||
with 911 emergency services. We now turn to specific privacy
|
||
protection mechanisms for assuring that the interstate public
|
||
network includes a privacy protection option.
|
||
|
||
|
||
E. Privacy Protection Mechanisms, Further Notice of
|
||
Proposed
|
||
Rulemaking.
|
||
|
||
38. The three privacy protection mechanisms prevalent at
|
||
the state level are (1) per line blocking provided by the
|
||
telephone company for specific groups (2) per line blocking
|
||
provided by the telephone company for all customers except those
|
||
who want their telephone numbers to be delivered, and (3) per
|
||
call blocking on an automatic or operator assisted basis.
|
||
Additionally, these options can be offered in combination and
|
||
free to the user or on a fee basis. In the NPRM, we sought
|
||
comment on and analysis of the relative merits, technical
|
||
feasibility and foreseeable costs to carriers and customers of
|
||
establishing a requirement that interstate caller ID incorporate
|
||
a per call blocking option. The record demonstrates ample
|
||
support for the adoption of an automatic per call blocking
|
||
requirement on interstate caller ID offerings. We discuss each
|
||
alternative below and affirm the tentative conclusion reached in
|
||
the NPRM that carrier provided per line blocking mechanisms are
|
||
unduly burdensome. We affirm that automatic per call blocking is
|
||
the most responsive alternative to the needs of calling and
|
||
called parties for interstate calls. Finally, we request comment
|
||
on whether, and how, these policies should apply to other
|
||
services, such as delivery of the calling party name.
|
||
|
||
39. Per Line Blocking for Specific Groups. Pennsylvania
|
||
PUC states that per call blocking should be available to all
|
||
subscribers, but free per line blocking should be made available
|
||
to groups that demonstrate a higher privacy need than the
|
||
population at large. These groups include non-profit, tax-exempt
|
||
domestic violence agencies; home telephone numbers of staff
|
||
members of such agencies; federal, state and local law
|
||
enforcement; and individuals who have a need for blocking to
|
||
mitigate the risk of personal injury, as certified by a law
|
||
enforcement agency. MCI proposes a limited blocking option to
|
||
protect public safety groups. US West states that its experience
|
||
with free per line blocking for "special needs" subscribers
|
||
proved cumbersome and unfair because US West is uncomfortable
|
||
with determining what groups or individuals have special needs.
|
||
|
||
40. Commenters that advocate the availability of per line
|
||
blocking only for certain groups with heightened privacy needs do
|
||
not address how this mechanism would be implemented on an
|
||
interstate basis. The two entities that could determine
|
||
eligibility for privacy protection under this proposal would be
|
||
the carriers or the government. If the choice is left to the
|
||
carrier or carriers offering interstate caller ID, the carrier
|
||
must determine which individual subscribers are entitled to
|
||
privacy protection. Issues that arise in this determination
|
||
include: Do certain types of law enforcement personnel have
|
||
greater needs than others? Do domestic violence shelters have
|
||
greater needs than teenage runaway facilities? Do individuals
|
||
who work for these organizations have needs? How would these
|
||
individuals be identified? How would determinations be kept
|
||
current? What appeal rights would be available? These social
|
||
questions are generally not the type of issues resolved by
|
||
carriers. We conclude, on the basis of this record, that per
|
||
line blocking for a special needs category as a federal model is
|
||
not optimal. It would unnecessarily increase the role of the
|
||
federal government or carriers in making privacy choices for
|
||
subscribers. Other regulatory alternatives to address privacy
|
||
are available on a more equitable basis and do not unduly hamper
|
||
the viability of CPN based services.
|
||
|
||
41. Per Line Blocking Available to All Subscribers.
|
||
Consumer Action contends that the only way to ensure that all
|
||
residential customers do not involuntarily deliver their numbers
|
||
to caller ID equipment is to require availability of per line
|
||
blocking. Consumer Action supports its argument that per line
|
||
blocking would not undercut the usefulness of caller ID by citing
|
||
Centel's statement that, after 6 months of offering caller ID
|
||
with a per line blocking option, there was no substantial
|
||
decrease in individuals subscribing to caller ID. Missouri
|
||
Counsel states that the absence of free per line blocking
|
||
effectively eliminates the protection that unlisted numbers
|
||
provide.
|
||
|
||
42. DMA asserts that per line blocking would drive up the
|
||
cost of service and further, that if per line blocking becomes
|
||
widespread, direct marketers may be unable to use caller ID
|
||
service for a substantial segment of their customer base, and
|
||
smaller businesses may find the service unattractive. Rochester
|
||
notes that in a survey it conducted, 66% of respondents made 75%
|
||
of their calls to people who already knew their telephone number,
|
||
and 83% made at least 50% of their calls to people who knew their
|
||
number. Rochester concludes that per line blocking is only
|
||
marginally useful and substantially degrades the value of caller
|
||
ID by causing unnecessary blocked calls. USTA concurs that in
|
||
the vast majority of calls, identification of the calling number
|
||
is of little consequence to the calling party. AT&T points out
|
||
that per line blocking destroys the lifesaving potential of
|
||
caller ID for line blocked callers of emergency numbers such as
|
||
police stations because a caller in distress may forget how to
|
||
use the unblocking code.
|
||
|
||
43. In the NPRM, we tentatively concluded that per line
|
||
blocking unduly burdens calling party number based services
|
||
overall by failing to limit its applicability to those calls for
|
||
which privacy is of concern to the caller. The Commission noted
|
||
that even in the case of law enforcement personnel, there may be
|
||
a need to maintain calling number privacy on some calls, but that
|
||
the same number may be used to telephone other law enforcement
|
||
personnel, victims of crimes, cooperative witnesses, and family
|
||
or friends. The Commission asserted that in these types of
|
||
calls, calling number privacy is not needed and calling number
|
||
identification can actually be a valuable piece of information
|
||
for both the caller and called parties. The record reflects the
|
||
useful nature of CPN based services, and the comments of
|
||
Rochester illustrate that callers are likely to be interested in
|
||
blocking only a small percentage of their calls. The comments of
|
||
USCG illustrate the usefulness of caller ID to emergency
|
||
services. In contrast, Missouri Counsel's analogy to unlisted
|
||
numbers is inapposite because caller ID only permits parties
|
||
called by the calling party to capture the calling party number,
|
||
and then only if the calling party has not activated a per call
|
||
blocking mechanism. We find that the availability of per call
|
||
unblocking does not cure the ill effects of per line blocking.
|
||
Moreover, in an emergency, a caller is not likely to remember to
|
||
dial or even to know to dial an unblocking code. For the
|
||
foregoing reasons, we find that a federal per line blocking
|
||
requirement for interstate CPN based services, including caller
|
||
ID, is not the best policy choice of those available to recognize
|
||
the privacy interests of callers. Thus, carriers may not offer
|
||
per line blocking as a privacy protection mechanism on interstate
|
||
calls. We agree that certain uses of captured calling numbers
|
||
need to be controlled, and address that issue infra.
|
||
|
||
44. Operator Assisted Per Call Blocking. There is little
|
||
support in the record for operator assisted per call blocking.
|
||
Live operator assisted blocking may have a chilling effect on
|
||
callers who do not choose to disclose the calling number.
|
||
Dialing three additional digits to invoke privacy as is required
|
||
with automatic per call blocking is much less cumbersome to the
|
||
caller than having to connect to a live operator and explain that
|
||
the caller wishes to place an anonymous call. The practical
|
||
effect of a system of operator assisted blocking appears to be
|
||
that privacy is not invoked, based on the Canadian experience
|
||
wherein out of one million calls, only two were blocked. We
|
||
also note that live operator assisted blocking was not envisioned
|
||
as part of the technology of caller ID during the SS7 standards
|
||
setting process. The ANSI and Bellcore standards contemplate
|
||
automatic per call or per line blocking. If the advanced
|
||
technology of the network is capable of sustaining an automated
|
||
blocking function, it is not in the public interest to ignore the
|
||
technology and require less efficient, more cumbersome live
|
||
operator assistance.
|
||
|
||
45. Automatic Per Call Blocking. Under this approach, a
|
||
caller dials a three digit code, e.g. *67 (or 1167 for rotary or
|
||
pulse-dialing phones), to indicate that the calling number should
|
||
be blocked. The majority of commenters supporting a per call
|
||
blocking system advocate an automatic free per call method. For
|
||
example, the Ad Hoc Users and NTIA state that per call blocking
|
||
best balances the privacy interests of both the calling and the
|
||
called party. Although Bell Atlantic opposes blocking, it states
|
||
that if the Commission decides to require blocking, per call
|
||
rather than per line should be adopted. The IIA notes that
|
||
several states already require free per call blocking. Further,
|
||
IIA proposes that the Commission take into account that consumer
|
||
expectations have solidified on this issue.
|
||
|
||
46. We agree with the majority of commenters that
|
||
availability of automatic per call blocking best addresses the
|
||
privacy needs of both the calling and called parties. We note
|
||
that the majority of jurisdictions using this method on a local
|
||
basis are using *67 (or 1167 for rotary or pulse-dialing phones)
|
||
as the dialing digits and we adopt the same dialing method in our
|
||
interstate rules. As discussed in the NPRM, a regulatory
|
||
approach to privacy should not be so burdensome to the service
|
||
that it destroys its value and thus fails to take into account
|
||
the privacy needs of the called party. Per line blocking has
|
||
this effect. On the other hand, a blocking mechanism should not
|
||
be so difficult to invoke as to fail to recognize the legitimate
|
||
privacy concerns of some callers. Operator assisted blocking has
|
||
this effect. The best balance for the competing interests of the
|
||
calling and called parties is automatic per call blocking. The
|
||
option of dialing a few additional numbers to invoke privacy when
|
||
privacy is sought is a beneficial service that should be
|
||
available to consumers. Similarly, caller ID is beneficial to
|
||
the called party who should be able to receive the calling party
|
||
number in all instances where identification of the calling
|
||
number is of no consequence to the caller or where the caller may
|
||
desire identification.
|
||
|
||
47. The rules require per call blocking as the model for
|
||
privacy protection on interstate calls. As a matter of
|
||
simplicity and uniformity, per call blocking allows callers to
|
||
travel from phone to phone and make an informed privacy decision.
|
||
|
||
Per line blocking may create caller confusion when a caller
|
||
places a call from a phone over which the caller may be uncertain
|
||
whether it is equipped with per line blocking. It appears that
|
||
some carriers offering per call unblocking together with per line
|
||
blocking use the same *67 code both for unblocking presubscribed
|
||
privacy lines and for blocking lines that are not pre-blocked.
|
||
Thus, a caller may inadvertently disable privacy protection by
|
||
dialing *67 (or 1167 for rotary or pulse-dialing phones) to
|
||
invoke privacy from a phone that is already subscribed to per
|
||
line blocking. A per call blocking system avoids this unintended
|
||
result and allows callers to make decisions according to the
|
||
unique calling circumstances of each call. Automatic per call
|
||
blocking is easily used on a ubiquitous interstate basis, and
|
||
eliminates customer confusion.
|
||
|
||
48. Our objective in this proceeding is to establish
|
||
federal policies governing the passage by carriers of CPN on
|
||
interstate calls. We believe carriers should provide callers the
|
||
option of withholding their numbers from called parties on a per
|
||
call basis. It is important to note, however, that consumer
|
||
choice is not limited to the options provided by carriers.
|
||
Various companies have registered with the Commission, under
|
||
provisions of Part 68 of our rules, equipment that, for example,
|
||
automatically would insert a blocking prefix on each call going
|
||
out over a particular line. Such devices are available for as
|
||
little as $40.00 per unit. We believe general interstate passage
|
||
of CPN throughout the telephone network, except in those
|
||
individual circumstances where privacy is important to the
|
||
calling party, promises important efficiency and productivity
|
||
gains for our economy. However, individuals wishing to install
|
||
these devices and thereby screen all originating interstate calls
|
||
may elect to do so. Such a choice may create caller confusion
|
||
if others entitled to use the line are unaware of the purpose of
|
||
the device, or may place health and safety at risk if the device
|
||
conceals the calling party's location or identity from emergency
|
||
services, but these are not harms to the network. Requiring
|
||
callers seeking universal blocking to purchase such devices,
|
||
however, ensures this choice is not made lightly.
|
||
|
||
49. The majority of commenters supporting per call blocking
|
||
also propose that per call blocking be free to the calling party.
|
||
|
||
We note that this is in keeping with the blocking policies
|
||
adopted by the majority of states for intrastate calls. Per
|
||
call blocking capability is an inherent capability of SS7
|
||
technology. The design of caller ID contemplates the use of
|
||
software programs that permit either a customer to activate a
|
||
"block" on any particular call, or the central office to activate
|
||
a block on the line. In no circumstance is the information
|
||
actually "blocked" from the carrier; the terminating central
|
||
office will receive the calling number. In addition, on all
|
||
interstate calls handled by SS7, the call setup message contains
|
||
a calling party number parameter that includes a privacy
|
||
indicator. Under our rules, this "privacy flag" travels with the
|
||
call setup message through to the destination central office of
|
||
the terminating carrier. Thus, there are no significant
|
||
additional SS7 costs associated with per call blocking. Several
|
||
commenters note that there are costs associated with populating
|
||
the privacy flag at the originating end and reading it and
|
||
passing it on to the subscriber at the terminating end. Our
|
||
requirement that carriers transmit CPN includes the provision of
|
||
per call blocking capability at the originating end and of
|
||
facilities that read and honor the privacy indicator at
|
||
terminating end. Any blocking costs can be readily absorbed
|
||
because the calling party number and privacy flag are integral
|
||
elements of SS7. Moreover, we find that charging the caller for
|
||
per call blocking beyond the costs of deploying SS7 would disrupt
|
||
the balance that per call blocking establishes between the
|
||
privacy interests of the caller and called party. Charging for
|
||
per call blocking heightens the burden upon the caller to invoke
|
||
privacy and does not appear to be necessary for the overall
|
||
viability of the service.
|
||
|
||
50. Applicability to Additional Services. In addition to
|
||
calling party number delivery, SS7 technology permits delivery of
|
||
calling party name via an optional parameter that is separate
|
||
from the calling party number parameter. We tentatively
|
||
conclude that our policies for calling party number delivery
|
||
should apply equally to services delivering calling party name,
|
||
and we seek comment on this tentative conclusion. Commenters
|
||
should address any differences that may exist in the privacy
|
||
considerations that apply to calling party name delivery as
|
||
opposed to calling party number delivery. Commenters should also
|
||
address whether the policies for subscriber privacy should extend
|
||
to other services, such as services that permit subscribers to
|
||
automatically return calls or to selectively forward calls.
|
||
|
||
|
||
F. ANI and Caller Privacy.
|
||
|
||
51. In the NPRM the Commission noted that interstate ANI,
|
||
or its SS7 equivalent "charge number" parameter, already
|
||
identifies the billing number of a call to interstate subscribers
|
||
of ANI service, and is used by the LECs and IXCs for billing
|
||
purposes. IXCs, however, sometimes deliver ANI to 800 and 900
|
||
service subscribers via a dedicated line. The NPRM requested
|
||
comment on whether there are privacy interests associated with
|
||
the transmission of ANI to 800 and 900 service subscribers or
|
||
information service providers, and if so, what approaches should
|
||
be considered to address the issue. The Commission noted that
|
||
one possible approach would be to require businesses to obtain
|
||
the consent of the caller before revealing the caller's telephone
|
||
number to any third party. In this order we adopt such an
|
||
approach.
|
||
|
||
52. The majority of commenters conclude that it is not
|
||
technically feasible to block identification of ANI-based
|
||
interstate calling number in the same way as SS7-based calling
|
||
party number because it is the billing number that LECs must
|
||
provide to IXCs. Allnet proposes that LECs be required to
|
||
provide a privacy indicator with ANI. AT&T notes that ANI or the
|
||
SS7 equivalent "Charge Number" do not currently have a privacy
|
||
indicator that would signal the terminating carrier to block the
|
||
passing of the billing telephone number to the called party.
|
||
AT&T concludes that blocking requirements adopted by the
|
||
Commission should not extend to the delivery of ANI. Nynex notes
|
||
that under its SS7 interconnection tariff, in those cases where
|
||
the billing number and the CPN are the same, the calling party
|
||
number parameter will provide the billing number and the charge
|
||
number will not be sent. Nynex adds that, where there is a
|
||
difference between the billing number and the calling party
|
||
number, the charge number parameter will provide the billing
|
||
number.
|
||
|
||
53. Citicorp contends that proposals to limit the use of
|
||
ANI are contrary to the Communications Act's purpose of promoting
|
||
new telecommunications technologies. Illinois CC states that ANI
|
||
is needed to promote competition, and to restrict the use of ANI
|
||
in any way would undermine this policy goal. Ad Hoc Users,
|
||
ARINC, and Citicorp identify many beneficial uses of ANI
|
||
transmission. Ad Hoc Users adds that these significant
|
||
benefits are unfairly characterized by NYS Law as a "plague of
|
||
unsolicited marketing calls." It notes that prohibiting
|
||
transmission of ANI would shut down existing ANI applications and
|
||
would not allow new applications until SS7 interconnection of
|
||
LECs with IXCs is almost ubiquitous.
|
||
54. IIA states that because the transmission of ANI cannot
|
||
be blocked, the focus must shift from whether the called party
|
||
receives it to how the recipient uses the data. It states that
|
||
questions presented by use of ANI data are transitional and ANI
|
||
subscribers can be expected to migrate to SS7-based caller ID.
|
||
In the meantime, IIA proposes the Commission rely upon voluntary
|
||
and industry initiated efforts to explain to consumers how
|
||
information about them is gathered and used. NARUC argues that
|
||
denying commercial ANI purchasers the information ANI provides
|
||
will give carriers an incentive to expedite development of CPN
|
||
based services. Baer, Colorado DVC, Consumer Action, Michigan
|
||
PSC, and others suggest that if the Commission allows for either
|
||
per line or per call blocking, then it should also restrict the
|
||
availability of ANI exclusively to LECs and IXCs. NTIA
|
||
recommends that the Commission direct interested carriers and
|
||
manufacturers to report on the modifications needed to implement
|
||
caller blocking of ANI to the called party and formulate a plan
|
||
for so modifying existing ANI over a period of years. Sprint
|
||
concurs that ANI should be subject to privacy indicators, insofar
|
||
as technology permits.
|
||
|
||
55. Unlike the privacy indicator that can be placed on the
|
||
calling party number with respect to caller ID, the calling party
|
||
cannot place a privacy flag on ANI or its SS7-based equivalent,
|
||
the charge number parameter. Therefore, some parties suggest
|
||
that the availability of ANI be restricted exclusively to LECs
|
||
and IXCs, and should not be passed on to 800 and 900 service
|
||
subscribers for billing, routing, or other purposes. Other
|
||
commenters respond, however, that ANI is needed to sustain
|
||
beneficial services currently offered.
|
||
|
||
56. We conclude that the public interest would be served by
|
||
continuing to permit telephone companies to deliver ANI to 800,
|
||
900, and other business subscribers who pay for transmission of
|
||
the call. ANI has been available to these end users without a
|
||
privacy mechanism for several years and, as indicated above, has
|
||
spurred a multitude of beneficial applications. While we are
|
||
concerned that callers' reasonable expectation of privacy not be
|
||
violated, we do not believe that the public would be served by
|
||
terminating all access to ANI by subscribers to 800 and 900-type
|
||
services. Ad Hoc Users points out that ANI service permits the
|
||
receipt of calling numbers in real time but would not usually
|
||
provide information beyond that which such subscribers will
|
||
receive in any event on their telephone company bills because the
|
||
called party pays for the call. It states that such realtime
|
||
provision of ANI benefits calling parties by permitting a number
|
||
of substantial customer service enhancements.
|
||
|
||
57. In weighing these various public interest concerns, we
|
||
are aware that the continued deployment of SS7 throughout the
|
||
telephone networks makes available a blockable alternative to
|
||
ANI. However, where the called party pays for the interstate
|
||
call (e.g., 800 and 900 service subscribers), the situation is
|
||
somewhat analogous to a collect call regarding expectations of
|
||
confidentiality by the calling party. We believe the best
|
||
approach is to require education by the carriers (see Section G,
|
||
infra) and to restrict how 800 and 900-type service subscribers
|
||
may use ANI data. Resale of the ANI number to create marketing
|
||
lists or other information about callers without their consent
|
||
has generated much of the opposition to the availability of ANI.
|
||
Bills to restrict such practices have been introduced in Congress
|
||
and commenters in this proceeding have addressed the implications
|
||
of unrestricted availability of information about callers.
|
||
Colorado DVC, NTIA, and others urge the Commission to prohibit
|
||
the resale or use of ANI for uses other than call management,
|
||
billing, or customer services employed directly by the subscriber
|
||
to ANI end user services. To address these privacy concerns, we
|
||
prohibit the reuse or sale of ANI information by 800, 900, and
|
||
other service subscribers absent affirmative subscriber consent.
|
||
We permit the use of ANI for call management and routing
|
||
functions.
|
||
|
||
58. Concerns also have been expressed regarding the use of
|
||
ANI by 800 and 900-type service subscribers for solicitation.
|
||
For example, ANI can be used to place return calls to telephone
|
||
customers who previously have contacted an ANI 800 or 900-type
|
||
services subscriber. In this regard, Nynex proposes that use of
|
||
ANI be limited to performing and verifying transactions requested
|
||
by the caller. ARINC, on the other hand, argues that such a
|
||
restriction would diminish too severely the value of ANI for
|
||
businesses and customers. We conclude that an ANI services
|
||
subscriber may use ANI to offer products or services to an
|
||
established customer that are directly related to products or
|
||
services previously provided by the ANI services subscriber to
|
||
that customer. ANI services subscribers may also wish to
|
||
compile ANI information in an aggregate form, either to improve
|
||
operations or as a marketing tool. Our rules permit disclosure
|
||
of ANI information in aggregate form if it is compiled in a
|
||
manner which precludes identification of individual telephone
|
||
subscribers.
|
||
|
||
G. Subscriber Education, Further Notice of Proposed
|
||
Rulemaking.
|
||
|
||
59. In the NPRM, the Commission stated that carriers
|
||
offering calling party number, or facilitating transmission of
|
||
interstate caller ID, should be required to inform callers of the
|
||
availability of the service, including instructing callers how to
|
||
implement any caller privacy mechanisms. The Commission noted
|
||
that no segment of the calling public can adequately control
|
||
dissemination of the calling number under any regulatory
|
||
structure if they are unaware that their calling number is being
|
||
identified. The majority of commenters agreed that subscriber
|
||
education is in the public interest and should be implemented
|
||
with the introduction of interstate calling party number based
|
||
services, including caller ID. Commenters also expressed concern
|
||
over the education of callers whose numbers are identified via
|
||
ANI-based services.
|
||
|
||
60. We affirm our tentative conclusion that deployment of
|
||
interstate calling party number services should be accompanied by
|
||
consumer education regarding the availability of identification
|
||
services and how to invoke the privacy protection mechanism. The
|
||
record indicates that consumer information is essential to public
|
||
understanding of any privacy mechanisms associated with caller
|
||
identification services. Accordingly, we amend our rules to
|
||
require that carriers participating in the offering of services
|
||
that deliver calling party number, including ANI or charge
|
||
number, on interstate calls must notify their subscribers that
|
||
their telephone numbers may be transmitted to a called party.
|
||
In addition, such carriers must inform their subscribers of the
|
||
privacy mechanism available on interstate calls, and must explain
|
||
how subscribers can activate the privacy mechanism. Even though
|
||
the ability of the caller to activate a privacy flag is not yet
|
||
ubiquitous on calls to ANI or charge number services subscribers,
|
||
ANI or charge number services increasingly are offered through
|
||
SS7 networks, and an education effort will be most effective if
|
||
it anticipates the greater availability of a privacy flag. For
|
||
ANI or charge number services for which such privacy is not
|
||
provided, the notification must inform telephone customers of the
|
||
restrictions on the reuse or sale of subscriber information. We
|
||
specifically request further comment on whether we should
|
||
prescribe detailed instructions regarding what form education
|
||
should take or prescribe more precisely responsibilities of
|
||
various carriers. We are particularly interested in specific
|
||
joint industry education proposals (see comments of IIA, supra,
|
||
para. 54).
|
||
|
||
H. CPNI and Subscriber Privacy.
|
||
|
||
61. Privacy issues are also raised by telephone companies'
|
||
use of customer proprietary network information, or CPNI. The
|
||
Commission's current CPNI rules govern the BOCs' use of CPNI in
|
||
marketing enhanced services and CPE. The CPNI rules are
|
||
designed to balance considerations of customer privacy,
|
||
efficiency, and competitive equity. In recent months, however,
|
||
the communications industry has witnessed large local exchange
|
||
carriers' planning and entering into alliances, acquisitions, and
|
||
mergers with non-telephone company partners. In this changing
|
||
environment, access to CPNI among affiliated companies may
|
||
heighten concerns. Thus, we will seek further comment from the
|
||
public on whether the existing CPNI safeguards will adequately
|
||
meet customers' reasonable privacy expectations in the future.
|
||
The CPNI rules are currently under reconsideration in the
|
||
Computer III Remand Proceeding, and the privacy concerns related
|
||
to CPNI are more appropriately addressed in that proceeding.
|
||
Therefore, we are releasing a public notice in CC Docket No. 90-
|
||
623 seeking further comment, particularly on the issue of
|
||
residential and small business customers' CPNI-related privacy
|
||
concerns.
|
||
|
||
|
||
I. Wiretap Statutes and Caller ID.
|
||
|
||
62. In the NPRM, the Commission noted that some parties
|
||
suggest that caller ID may violate the Federal Wiretap Act
|
||
(Wiretap Act), 18 U.S.C. 3121-3127 or the Electronic
|
||
Communications Privacy Act (ECPA), 18 U.S.C. 2511. Colorado
|
||
DVC, DC OPC, NASUCA, and Ohio OCC reiterate this contention.
|
||
Other commenters such as Allnet, Bell Atlantic, Ameritech, and
|
||
AT&T argue that caller ID is permissible under ECPA or the
|
||
consent provisions of the Wiretap Act as "trap and trace"
|
||
devices. Pacific adds that caller ID is not the type of activity
|
||
that Congress intended to include in ECPA. Pacific points out
|
||
that trap and trace laws are designed to prevent surreptitious
|
||
wiretaps by the police and other parties and caller ID is not
|
||
such a wiretap because it is a tariffed service offered uniformly
|
||
and publicly to all customers.
|
||
|
||
63. In accordance with its statement in the NPRM that it
|
||
would solicit the views and analysis of the Department of
|
||
Justice, the Commission's General Counsel requested the
|
||
Department of Justice's opinion on the issue. In its reply
|
||
memorandum, the Department of Justice (DOJ) concludes that the
|
||
federal wiretap statutes embodied in the Federal Criminal Code do
|
||
not pose a barrier to interstate caller ID service. We adopt the
|
||
Department's analysis and conclusions on this issue, and are
|
||
incorporating the Department's memorandum into this Report and
|
||
Order. See Appendix D.
|
||
|
||
|
||
J. Relationship between Interstate and Intrastate Caller
|
||
ID.
|
||
|
||
64. In the NPRM, the Commission sought comment on whether
|
||
state policies concerning calling party number based services,
|
||
including caller ID, negate or hinder the development of
|
||
interstate caller ID, ANI, or both. In analyzing whether
|
||
interstate and intrastate models may coexist harmoniously both
|
||
legally and technologically, the Commission did not propose to
|
||
preempt any specific state regulation governing intrastate caller
|
||
ID. Rather, we found that it is necessary to review existing
|
||
state policies individually in order to determine whether
|
||
preemption is necessary. Many commenters, including AT&T, GTE,
|
||
and MCI, propose that the Commission use its authority to preempt
|
||
the states if state regulations impede interstate caller ID
|
||
offerings. Pacific concurs that the Commission may preempt state
|
||
regulation of caller ID because the service is not separable into
|
||
interstate and intrastate portions and state regulation
|
||
frustrates a valid federal policy.
|
||
|
||
65. Some commenters, including Ameritech, Sprint, Bell
|
||
Atlantic, and BellSouth, contend that the terminating carrier
|
||
should be required to honor any blocking indicators that are
|
||
present on interstate calls on a per call basis. BellSouth
|
||
proposes that the Commission should defer to each state's
|
||
determination of blocking options available for calls originating
|
||
in that state. Some commenters, including Colorado DVC,
|
||
Connecticut, and Consumer Action, concur that the Commission
|
||
should defer to state policies on blocking because state
|
||
regulators are more attuned to local factors including history,
|
||
culture, custom and legal environment. State commenters,
|
||
including Indiana Utility Counsel, Illinois CC, and Missouri PSC,
|
||
contend that preemption is unwarranted and untimely because
|
||
states should be able to develop standards that provide more, but
|
||
not less privacy protection to consumers. NARUC argues that
|
||
preempting state caller ID policies is inappropriate from both a
|
||
legal and policy perspective. NARUC proposes that the Commission
|
||
devise a plan that carries out federal objectives but can
|
||
substantially coexist with various state blocking plans. Some
|
||
commenters concur with NARUC and contend that federal and state
|
||
rules can coexist.
|
||
|
||
66. Many commenters, including AT&T and Pacific, contend
|
||
that existing technology renders it infeasible for carriers to
|
||
comply with one set of blocking requirements for intrastate and a
|
||
different set of standards for interstate caller ID. Allnet,
|
||
NTI, and Bell Atlantic contend that privacy standards should
|
||
apply to intrastate, interstate and international communications
|
||
and that different standards would require more complex
|
||
equipment. Specifically, Bell Atlantic asserts that substantial
|
||
development and expense over several years would be necessary to
|
||
accommodate differing interstate and intrastate standards.
|
||
|
||
67. Nynex, USTA, and SNET contend that different state and
|
||
federal policies on caller ID create caller confusion, and that a
|
||
uniform national policy for caller ID would minimize consumer
|
||
confusion. The California PUC proposes that the Commission, if
|
||
it allows interstate caller ID, should not preempt more
|
||
restrictive state privacy protections adopted for intrastate
|
||
caller ID, and instead should defer to the more restrictive
|
||
requirements in each of the states.
|
||
|
||
68. As is discussed in Section A, supra, interstate passage
|
||
of calling party number serves the public interest by making it
|
||
possible for telecommunications service providers to offer
|
||
beneficial new communications services that directly and
|
||
indirectly can increase the business sector's efficiency and
|
||
residential customers' access to information and other services.
|
||
In this proceeding we will require carriers having SS7 capability
|
||
to transmit CPN to interconnecting carriers. Recognizing that
|
||
there may be situations in which the calling party wishes to
|
||
preserve privacy, we establish *67 (and 1167 for rotary or pulse-
|
||
dialing phones) as the mechanism by which this may be done on
|
||
interstate calls. Carriers must honor a caller's choice to use
|
||
this blocking mechanism. These policies strike a reasonable
|
||
balance among significant competing interests, including
|
||
reasonable privacy expectations and economic growth. Our
|
||
approach ensures that the privacy rights of the caller are not
|
||
unreasonably infringed upon by the policies of the state where
|
||
the call terminates (in those states offering unlimited caller ID
|
||
a blocking request from another state might not otherwise be
|
||
honored) nor are the concerns of the called party unreasonably
|
||
infringed upon by the policies of the state where the call
|
||
originates (unqualified, free per line blocking likely would
|
||
significantly increase the number of blocked interstate calls).
|
||
|
||
69. We are sensitive to states' interests in protecting the
|
||
privacy of their residents, but note that limited preemption of
|
||
state regulations is necessary in some instances to ensure that
|
||
our goal of facilitating the development of interstate calling
|
||
party number based services is not frustrated by inconsistent
|
||
state law, and that state decisions with respect to caller ID or
|
||
other calling party number based services do not infringe upon
|
||
the privacy interests of parties in other states. Accordingly,
|
||
we preempt state regulation of caller ID or other calling party
|
||
number based services as follows: states may not prohibit
|
||
automatic per call blocking for interstate calls, require a
|
||
blocking alternative for interstate calls different from the one
|
||
adopted in this proceeding, or prohibit the offering of
|
||
interstate caller ID services. Thus, states may not prohibit
|
||
carriers from offering interstate services based on calling party
|
||
number, including caller ID service. States will not be able to
|
||
require the use of digits other than *67 (or 1167 for rotary or
|
||
pulse-dialing phones) for automatic per call blocking on
|
||
interstate calls, nor require carriers offering or participating
|
||
in the interstate transmission of calling party number to provide
|
||
blocking systems that interfere with the use of *67 (or 1167 for
|
||
rotary or pulse-dialing phones) to achieve blocking. Preemption
|
||
is necessary in these cases to ensure that state regulations do
|
||
not interfere with the achievement of important federal
|
||
objectives, and with the Commission's exclusive jurisdiction over
|
||
interstate communications.
|
||
|
||
70. To the extent that inconsistent regulations cannot be
|
||
accommodated simultaneously for interstate and intrastate caller
|
||
ID services, some further preemption of state regulations may
|
||
become necessary. We will examine the need for such additional
|
||
preemption on a case-by-case basis. For example, there may be
|
||
cases in which state caller ID requirements applicable to
|
||
intrastate calls would, as a practical matter, make it impossible
|
||
for carriers to implement per call blocking for interstate calls.
|
||
|
||
We are reluctant to preempt state authority over intrastate
|
||
communications, and will endeavor to accommodate state
|
||
regulations whenever possible. State policies, however, must not
|
||
frustrate the paramount federal interest in a cohesive interstate
|
||
communications policy, and must not be allowed to infringe
|
||
unreasonably upon the privacy interests of the citizens of other
|
||
states.
|
||
|
||
|
||
III. CONCLUSION
|
||
|
||
71. Our goal in this proceeding is to establish a federal
|
||
policy to govern the passage of calling party number among
|
||
carrier networks. In this order we find that a federal model for
|
||
interstate delivery of calling party number is in the public
|
||
interest, that the model must protect calling party privacy, and
|
||
that certain state regulations of interstate caller ID must be
|
||
preempted. Accordingly, we amend Part 64 of the rules to require
|
||
that common carriers using Common Channel Signalling System 7
|
||
(SS7) and subscribing to or offering any service based on SS7
|
||
functionality must transmit CPN and its associated privacy
|
||
indicator on interstate calls. We require that carriers offering
|
||
CPN based services provide automatic per call blocking at no
|
||
charge to interstate callers, and that the privacy indicator be
|
||
honored by terminating carriers. We find that the costs of
|
||
interstate transmission of CPN are de minimis, and that the CPN
|
||
should be transmitted among carriers without additional charge.
|
||
We require that carriers participating in the offering of any
|
||
service that delivers CPN on interstate calls must inform
|
||
telephone subscribers regarding the availability of
|
||
identification services and how to invoke the privacy protection
|
||
mechanism. We also seek comment on whether more specific
|
||
subscriber education requirements should be imposed. We restrict
|
||
the reuse or sale of telephone numbers by subscribers to
|
||
automatic number identification (ANI) or charge number services.
|
||
We note that additional comments are sought in the Computer III
|
||
Remand Proceeding on whether residential and small business
|
||
customers' privacy concerns warrant revision of the Commission's
|
||
rules governing reuse and sale of customer proprietary network
|
||
information (CPNI). Finally, we seek comment on extending the
|
||
policies adopted herein to other services that might identify the
|
||
calling party.
|
||
|
||
72. We expect the rules and policies adopted herein will
|
||
support the efforts of carriers, standards setting bodies,
|
||
states, CPE manufacturers, and others in providing CPN-dependent
|
||
services in an efficient manner. In this federal model, we
|
||
recognize the value and benefits to the public of interstate CPN
|
||
services, we promote the transmission of the calling party number
|
||
from the originating carrier to the terminating carrier, and we
|
||
balance the reasonable privacy expectations of both the calling
|
||
and the called party. The rules we adopt to govern services such
|
||
as interstate caller ID service remove obstacles to their
|
||
development posed by uncertainty and non-uniform state policies
|
||
and should facilitate implementation of new and beneficial
|
||
interstate services.
|
||
|
||
|
||
IV. PROCEDURAL MATTERS
|
||
|
||
73. Ex Parte Rules - Non-Restricted Proceeding. The
|
||
Further Notice of Proposed Rulemaking is a nonrestricted notice
|
||
and comment rulemaking proceeding. Ex Parte presentations are
|
||
permitted, except during the Sunshine Agenda period, provided
|
||
they are disclosed as provided in Commission rules. See
|
||
generally 47 C.F.R. Sections 1.1202, 1.1203 and 1.1206(a).
|
||
|
||
74. Final Regulatory Flexibility Analysis: Pursuant to the
|
||
Regulatory Flexibility Act of 1980, 5 U.S.C. 601 et seq., the
|
||
following final analysis has been prepared:
|
||
|
||
I. Need for and objective of the rules:
|
||
|
||
This Report and Order adopts policies governing the
|
||
transmission of the calling party number parameter and its
|
||
associated privacy indicator on interstate calls. Several
|
||
commenters to the NPRM in this proceeding have identified a
|
||
number of potential uses for interstate calling party number
|
||
based services, including caller ID, and have indicated that it
|
||
also will improve certain existing communication service
|
||
offerings. We find that the potential benefits of interstate
|
||
passage of calling party number far exceed any negative effects.
|
||
We thus adopt the conclusion reached in the NPRM that interstate
|
||
caller ID and other calling party number based services are in
|
||
the public interest and should be available to interstate
|
||
subscribers nationwide pursuant to the policies and rules set
|
||
forth in this order.
|
||
|
||
II. Summary of issues raised by the public comments in
|
||
response to the Initial Regulatory Flexibility Analysis:
|
||
|
||
No comments were submitted in direct response to the Initial
|
||
Regulatory Flexibility Analysis.
|
||
|
||
III. Significant alternatives considered:
|
||
|
||
The NPRM in this proceeding requested comments on several
|
||
proposals as well as the views of commenters on other
|
||
possibilities. The Commission has considered all comments and
|
||
has adopted regulations which require the passage of calling
|
||
party number where SS7 is deployed, facilitate interstate calling
|
||
party number based services, including caller ID, and implement
|
||
federal policy on privacy.
|
||
|
||
75. Initial Regulatory Flexibility Act Analysis on the
|
||
Further Notice of Proposed Rulemaking
|
||
|
||
An Initial Regulatory Flexibility Analysis is contained
|
||
Appendix A to this Report and Order and Further Notice of
|
||
Proposed Rulemaking.
|
||
|
||
76. Comment Dates
|
||
|
||
Pursuant to applicable procedures set forth in Sections
|
||
1.415 and 1.419 of the Commission's rules, 47 C.F.R. 1.415 and
|
||
1.419, interested parties may file comments on or before May 18,
|
||
1994 and reply comments on or before June 21, 1994. To file
|
||
formally in this proceeding, interested parties must file an
|
||
original and four copies of all comments, reply comments, and
|
||
supporting documents with the reference number "CC Docket 91-281"
|
||
on each document. If interested parties want each Commissioner
|
||
to receive a personal copy of comments, interested parties must
|
||
file an original plus nine copies. Interested parties should
|
||
send comments and reply comments to the Office of the Secretary,
|
||
Federal Communications Commission, Washington, DC 20554.
|
||
Comments and reply comments will be available for public
|
||
inspection during regular business hours in the FCC Reference
|
||
Center, Room 239, Federal Communications Commission, 1919 M
|
||
Street, N.W., Washington, DC. Copies of comments and reply
|
||
comments are available through the Commission's duplicating
|
||
contractor: International Transcription Service, Inc. (ITS,
|
||
Inc.), 2100 M Street, N.W., Suite 140, Washington, DC 20037,
|
||
(202) 857-3800.
|
||
|
||
V. ORDERING CLAUSES
|
||
|
||
77. Accordingly, It Is Ordered, that, pursuant to authority
|
||
contained in Sections 1, 4(i), 4(j), 201-205 and 218, of the
|
||
Communications Act of 1934, as amended, 47 U.S.C. 151, 154(i),
|
||
154(j), 201-205, and 218, Part 64 of the Commission's Rules and
|
||
Regulations ARE AMENDED as set forth in Appendix C hereof,
|
||
effective April 12, 1995.
|
||
|
||
78. It Is Further Ordered, that, pursuant to authority
|
||
contained in Sections 1, 4(i), 4(j), 201-205 and 218, of the
|
||
Communications Act of 1934, as amended, 47 U.S.C. 151, 154(i),
|
||
154(j), 201-205, and 218, Further NOTICE OF PROPOSED RULEMAKING
|
||
is hereby provided as indicated above.
|
||
|
||
79. It Is Further Ordered, that, the Secretary shall cause
|
||
a summary of this Report and Order and Further Notice of Proposed
|
||
Rulemaking to be published in the Federal Register which shall
|
||
include a statement describing how members of the public may
|
||
obtain the complete text of this Commission decision. The
|
||
Secretary shall also provide a copy of this Report and Order
|
||
Further Notice of Proposed Rulemaking to each state utility
|
||
commission.
|
||
|
||
80. For further information regarding this Report and Order
|
||
and Further Notice of Proposed Rulemaking, contact Suzanne
|
||
Hutchings, Common Carrier Bureau, Domestic Facilities Division,
|
||
(202) 634-1802.
|
||
|
||
FEDERAL COMMUNICATIONS COMMISSION
|
||
|
||
|
||
|
||
William F. Caton
|
||
Acting Secretary
|
||
|
||
|
||
|
||
|
||
APPENDIX A
|
||
|
||
INITIAL REGULATORY FLEXIBILITY ANALYSIS
|
||
|
||
Reason for Action
|
||
|
||
This rulemaking proceeding is initiated to obtain comment on
|
||
whether the Commission should adopt rules providing for
|
||
subscriber education on interstate calling party number delivery,
|
||
and for the application of federal rules and policies for
|
||
interstate calling party number delivery to interstate calling
|
||
party name delivery.
|
||
|
||
Objectives
|
||
|
||
The Commission seeks to establish an environment in which
|
||
interstate calling party number based services are made possible
|
||
and advantages of a uniform regulatory framework are realized.
|
||
|
||
Legal Basis
|
||
|
||
The proposed action is authorized under Sections 1,4, 201-205,
|
||
218 of the Communications Act of 1934, as amended, 47 U.S.C.
|
||
151, 154, 201-205, 218.
|
||
|
||
Reporting, Recordkeeping and Other Compliance Requirements
|
||
|
||
This Further Notice seeks comment on whether more specific
|
||
subscriber education requirements should be imposed on those
|
||
offering calling party number based services, and on whether and
|
||
how rules and policies on interstate delivery of calling party
|
||
number should apply to interstate calling party name delivery
|
||
services.
|
||
|
||
Federal Rules Which Overlap, Duplicate or Conflict With These
|
||
Rules
|
||
|
||
None.
|
||
|
||
Description, Potential Impact, and Number of Small Entities
|
||
Involved
|
||
|
||
Rule revisions in this proceeding could affect carrier's
|
||
offering of interstate calling party name and number based
|
||
services such as caller ID service. After evaluating the
|
||
comments and reply comments in this proceeding, the Commission
|
||
will examine further the impact of any rule changes on small
|
||
entities, and will set forth its findings in the Final Regulatory
|
||
Flexibility Analysis.
|
||
|
||
Any Significant Alternatives Minimizing the Impact on Small
|
||
Entities Consistent with the Stated Objectives
|
||
|
||
The FNPRM solicits comment on any significant alternatives
|
||
minimizing the impact on small entities consistent with the
|
||
stated objectives.
|
||
APPENDIX B
|
||
|
||
Commenters
|
||
|
||
AD HOC Telecommunications Users Committee (Ad Hoc Users) *
|
||
Aeronautical Radio, Inc. (ARINC) **
|
||
Alaska - Alaska Public Utilities Commission (Alaska PUC)
|
||
ALLNET (Allnet)
|
||
American Osteopathic Association (AOA) **
|
||
American Telephone & Telegraph (AT&T) *
|
||
Ameritech Operating Companies (Ameritech) *
|
||
Arizona Corporation Commission (Arizona CC) *
|
||
Baer, Joseph (Baer)
|
||
Bell Atlantic Telephone Companies (Bell Atlantic) *
|
||
BellSouth Corporation (BellSouth) *
|
||
Bliley, Representative Thomas Jr. et al. (Committee on Energy and
|
||
|
||
Commerce)
|
||
California, Consumer Affairs of the State of (California Consumer
|
||
|
||
Affairs) *
|
||
California Public Utilities Commission (California PUC) *
|
||
Central Telephone Company (Centel) *
|
||
Citicorp (Citicorp) **
|
||
Colorado Domestic Violence Coalition (Colorado DVC)
|
||
Colorado Office of Consumer Counsel (Colorado Consumer) *
|
||
Connecticut, Attorney General for the State of (Connecticut)
|
||
Consumer Action (Consumer Action) *
|
||
Consumer Federation of America (CFA)
|
||
Computer Professionals for Social Responsibility (CPSR) *
|
||
Direct Marketing Association (DMA) *
|
||
District of Columbia, Office of the People's Counsel (DC OPC)
|
||
Georgia Consumer's Utility Counsel (Georgia CUC)
|
||
GTE Service Corp. (GTE) *
|
||
Illinois Commerce Commission (Illinois CC)
|
||
Indiana Office Of Utility Consumer Counselor (Indiana Utility
|
||
Counselor)
|
||
Indiana Utility Regulatory Commission (IURC)
|
||
Information Industry Association (IIA)
|
||
Iowa Office of Consumer Advocate (Iowa) *
|
||
Jackson, Ms. Patricia L. (Jackson)
|
||
Kentucky, Attorney General of the Commonwealth (Kentucky)
|
||
McCaw Cellular Communications (McCaw) *
|
||
Maryland People's Counsel (Maryland PC) *
|
||
Massachusetts, Office of the Attorney General (Massachusetts)
|
||
MCI Communications (MCI) *
|
||
Medical Society of New Jersey (MSNJ)
|
||
Metromedia (Metromedia)
|
||
Michigan Public Service Commission (Michigan PSC)
|
||
Missouri Office of the Public Counsel (Missouri Counsel)
|
||
Missouri Public Service Commission (Missouri PSC)
|
||
National Association of Regulatory Utility Commissioners (NARUC)*
|
||
National Association of State Utility Consumer Advocates
|
||
(NASUCA)*
|
||
National Telephone Cooperative Association (NTCA)
|
||
National Telecommunications and Information Administration
|
||
(NTIA)**
|
||
New York City, Department of Telecommunications & Energy (NYC
|
||
Telecom)
|
||
New York, Public Utility Law Project, Inc. (NY Law Project)
|
||
New York State Consumer Protector Board (NYS Consumer)
|
||
New York State Department of Law (NYS Law) *
|
||
New York State Department of Public Service (NYS PSC) *
|
||
North Carolina, Attorney General (North Carolina)
|
||
Northern Telecom Inc. (NTI) *
|
||
NYNEX Telephone Companies (Nynex) *
|
||
Ohio, Office of the Consumer's Counsel (Ohio OCC) *
|
||
Ohio State University (Ohio State University) **
|
||
Pacific Bell and Nevada Bell (Pacific) *
|
||
Pennsylvania Public Utility Commission (Pennsylvania PUC)
|
||
Pilgrim Telephone (Pilgrim)
|
||
Project Designed Systems (PDS) **
|
||
Rochester Telephone Corporation (Rochester)
|
||
Southern New England Telephone Company (SNET)
|
||
Southwestern Bell Telephone Company (SWB) *
|
||
Sprint Corporation (Sprint) **
|
||
Telocator (Telocator)
|
||
Texas Office of Public Utility Counsel(Texas PUC)
|
||
Texas, State of (Texas)
|
||
United States Coast Guard (USCG)
|
||
United States Telephone Association (USTA) **
|
||
United Telecommunications Inc. (United)
|
||
US West (US West) **
|
||
Virginia State Corporation Commission (Virginia CC)
|
||
Washington Utilities And Transportation Commission (Washington
|
||
UTC)
|
||
Yellow Pages Publishers Association (YPPA)
|
||
|
||
Numerous letters from individuals were also received. All
|
||
comments and letters were considered.
|
||
|
||
* also filed reply comments
|
||
** filed only reply comments
|
||
|
||
|
||
APPENDIX C
|
||
|
||
|
||
Part 64 of the Commission's Rules and Regulations (chapter 1 of
|
||
Title 47 of the Code of Federal Regulations, part 64) is
|
||
amended as follows:
|
||
|
||
1. The authority citation for Part 64 continues to read as
|
||
follows:
|
||
|
||
Authority: Section 4, 48 Stat. 1066, as amended; 47 U.S.C. 154,
|
||
unless otherwise noted. Interpret or apply secs. 201, 218, 225,
|
||
226, 227, 48 Stat. 1070, as amended, 1077; 47 U.S.C. 201-4, 218,
|
||
225, 226, 227 unless otherwise noted.
|
||
|
||
2. The table of contents for Part 64 is amended to read as
|
||
follows:
|
||
|
||
Subpart O - Calling Party Telephone Number. Privacy.
|
||
|
||
64.1600 Definitions
|
||
64.1601 Delivery Requirements, and Privacy Restrictions
|
||
64.1602 Restrictions on use and sale of telephone
|
||
subscriber information provided pursuant to
|
||
automatic number identification or charge number
|
||
services.
|
||
64.1603 Customer notification.
|
||
64.1604 Effective date.
|
||
|
||
3. Part 64 is amended to read as follows:
|
||
|
||
Subpart O - Calling Party Telephone Number. Privacy.
|
||
|
||
64.1600 Definitions.
|
||
|
||
(a) Aggregate Information. The term 'aggregate information'
|
||
means collective data that relate to a group or category of
|
||
services or customers, from which individual customer
|
||
identities or characteristics have been removed.
|
||
|
||
(b) ANI. The term 'ANI' (automatic number identification)
|
||
refers to the delivery of the calling party's billing number
|
||
by a local exchange carrier to any interconnecting carrier
|
||
for billing or routing purposes, and to the subsequent
|
||
delivery of such number to end users.
|
||
|
||
(c) Calling Party Number. The term Calling Party Number
|
||
refers to the subscriber line number or the directory number
|
||
contained in the calling party number parameter of the call
|
||
set-up message associated with an interstate call on a
|
||
Signalling System 7 network.
|
||
|
||
(d) Charge Number. The term "charge number" refers to the
|
||
delivery of the calling party's billing number in a
|
||
Signalling System 7 environment by a local exchange carrier
|
||
to any interconnecting carrier for billing or routing
|
||
purposes, and to the subsequent delivery of such number to
|
||
end users.
|
||
|
||
(e) Privacy Indicator. The term Privacy Indicator refers to
|
||
information, contained in the calling party number parameter
|
||
of the call set-up message associated with an interstate
|
||
call on an Signalling System 7 network, that indicates
|
||
whether the calling party authorizes presentation of the
|
||
calling party number to the called party.
|
||
|
||
(f) Signalling System 7. The term Signalling System 7 (SS7)
|
||
refers to a carrier to carrier out-of-band signalling
|
||
network used for call routing, billing and management.
|
||
|
||
|
||
64.1601 Delivery Requirements and Privacy Restrictions
|
||
|
||
(a) Delivery. Common carriers using Signalling System 7
|
||
and offering or subscribing to any service based on
|
||
Signalling System 7 functionality are required to transmit
|
||
the calling party number associated with an interstate call
|
||
to interconnecting carriers.
|
||
|
||
(b) Privacy. Originating carriers using Signalling System
|
||
7 and offering or subscribing to any service based on
|
||
Signalling System 7 functionality will only recognize *67
|
||
dialed as the first three digits of a call (or 1167 for
|
||
rotary or pulse-dialing phones) as a caller's request for
|
||
privacy on an interstate call. No common carrier
|
||
subscribing to or offering any service that delivers calling
|
||
party number may override the privacy indicator associated
|
||
with an interstate call. The terminating carrier must act
|
||
in accordance with the privacy indicator unless the call is
|
||
made to a called party that subscribes to an ANI or charge
|
||
number based service and the call is paid for by the called
|
||
party.
|
||
|
||
(c) Charges. No common carrier subscribing to or offering
|
||
any service that delivers calling party number may (i)
|
||
impose on the calling party charges associated with per call
|
||
blocking of the calling party's telephone number, or (ii)
|
||
impose charges upon connecting carriers for the delivery of
|
||
the calling party number parameter or its associated privacy
|
||
indicator.
|
||
|
||
(d) Exemptions. 64.1601 shall not apply to calling party
|
||
number delivery services (i) used solely in connection with
|
||
calls within the same limited system, including (but not
|
||
limited to) a Centrex, virtual private network, or private
|
||
branch exchange system; (ii) used on a public agency's
|
||
emergency telephone line or in conjunction with 911
|
||
emergency services, or on any entity's emergency assistance
|
||
poison control telephone line; or (iii) provided in
|
||
connection with legally authorized call tracing or trapping
|
||
procedures specifically requested by a law enforcement
|
||
agency.
|
||
|
||
|
||
64.1602 Restrictions on use and sale of telephone
|
||
subscriber information provided pursuant to
|
||
automatic number identification or charge number
|
||
services.
|
||
|
||
(a) Any common carrier providing Automatic Number
|
||
Identification or charge number services on interstate calls
|
||
to any person shall provide such services under a contract
|
||
or tariff containing telephone subscriber information
|
||
requirements that comply with this subpart. Such
|
||
requirements shall:
|
||
|
||
(1) permit such person to use the telephone number and
|
||
billing information for billing and collection,
|
||
routing, screening, and completion of the originating
|
||
telephone subscriber's call or transaction, or for
|
||
services directly related to the originating telephone
|
||
subscriber's call or transaction;
|
||
|
||
(2) prohibit such person from reusing or selling the
|
||
telephone number or billing information without first
|
||
(A) notifying the originating telephone subscriber and
|
||
(B) obtaining the affirmative consent of such
|
||
subscriber for such reuse or sale; and
|
||
|
||
(3) prohibit such person from disclosing, except as
|
||
permitted by subparagraphs (1) and (2), any information
|
||
derived from the automatic number identification or
|
||
charge number service for any purpose other than (i)
|
||
performing the services or transactions that are the
|
||
subject of the originating telephone subscriber's call,
|
||
(ii) ensuring network performance security, and the
|
||
effectiveness of call delivery, (iii) compiling, using,
|
||
and disclosing aggregate information, and (iv)
|
||
complying with applicable law or legal process.
|
||
|
||
(b) The requirements imposed under paragraph (a) shall not
|
||
prevent a person to whom automatic number identification or
|
||
charge number services are provided from using (1) the
|
||
telephone number and billing information provided pursuant
|
||
to such service, and (2) any information derived from the
|
||
automatic number identification or charge number service, or
|
||
from the analysis of the characteristics of a
|
||
telecommunications transmission, to offer a product or
|
||
service that is directly related to the products or services
|
||
previously acquired by that customer from such person. Use
|
||
of such information is subject to the requirements of 47
|
||
C.F.R. 64.1200 and 64.1504(c).
|
||
|
||
|
||
64.1603 Customer notification. Any common carrier
|
||
participating in the offering of services providing calling party
|
||
number, ANI, or charge number on interstate calls must notify its
|
||
subscribers, individually or in conjunction with other carriers,
|
||
that their telephone numbers may be identified to a called party.
|
||
|
||
Such notification must be made not later than April 12, 1995, and
|
||
at such times thereafter as to ensure notice to subscribers. The
|
||
notification shall inform subscribers how to maintain privacy by
|
||
dialing *67 (or 1167 for rotary or pulse-dialing phones) on
|
||
interstate calls. For ANI or charge number services for which
|
||
such privacy is not provided, the notification shall inform
|
||
subscribers of the restrictions on the reuse or sale of
|
||
subscriber information.
|
||
|
||
64.1604 Effective Date
|
||
|
||
The provisions of Sections 64.1601 through 64.1603 shall be
|
||
effective as of April 12, 1995.
|
||
|
||
|
||
New Hack v2.0 for DOS & OS/2
|
||
by John Deere
|
||
|
||
Desc: Takes an new passwd file and only cracks new accounts or
|
||
accounts which have changed.
|
||
|
||
begin 644 newhak20.zip
|
||
M4$L#!!0````(`#&56AQ1R<NYI4<``'R=```*````3D@R3U,R+D581>R]#7Q3-
|
||
M5;8W?$YVTGPT;4);H"A($%`KH%2+4E"GI8;B1R&`;7&T(DI#[2`HS0$9":03U
|
||
MT":'7)DKSO7Z,2_X,<\X,X_CS/@!J-A2;`$=K8@."E<0D3DUJ%6Y;8#8//^U*
|
||
M]TF:%N<Z\\Y][^_YO3\CR=I[[;77_EY[[;77KA4_]D@&29*,DD-*)"1IBR0^Z
|
||
M)=)9TO=^9$G:YI2R1SYO_?.H+?+U?QZU8<,-=7<TN.Y:MG31L@5WNNY4&GRN9
|
||
MVVI=RY0E+F7)PMIEKEES+[[DHBS;F,NE_TL^U\\3T$"-H9[`/YMH&O\8\>UZ'
|
||
M#3].2;("G'8(_#8]?:=.,T;NS]>'^.HT'(5_@^^B0;P(:>4@/<&EP_62E*T'N
|
||
M&16'^.)!`VO[W9_;JL5@F%RBWAEI=:/23$Y),J>UR3=8E,)`;Q&M%I]FT6+"9
|
||
MI_<!_S@%+4&G#O-UZ-+A!01!-%X4*TW0\9.D]$*8E+&D[I*E#9?H\79TWV.H2
|
||
M<B%ROH<N?C)+DN:C*P:CIS?C^ZK^M<@?9LGGR`8I+XOE2A59!FJ426(S`#(EO
|
||
M5@3@E=CP06;I)HDU(58EL86(^01RG0#/"?"TQ,(@V21(?B&0+0+<*+,GD>:6W
|
||
MV2,`$V3V;P##9+8>X-]EMA-@G<R>`U@JLU\!Q&5FE<V2)K-NQ/;*[%.`[3)[#
|
||
M'V"B@>6#YU@#&P02EX%=@%BI0!XW,!?`1P8V!&GO&-@8Q%H-+!>QDX)D#.-@`
|
||
M!N,U^QGC&7R,G0>218QGN)&QT8AM$)2/"\I/&9L(9*F1S0(H,K))`$.-[!*`F
|
||
M6XUL#F4PLB!`T,CN`/`9><U^;V3W(7;(R%X"V&MDCP.T&GDO]1K9-N)I8I\30
|
||
M3Q-[%V"LB6U"FLO$ZS+8Q-ZA$DRL"^!G)E[=%29F-IBE9A.[%1T2RV`5B!W)8
|
||
M8-<"O)G!K``>,[L18(J950&,,;.Y`-EFY@'XM9G5`ORKF=T&L,K,Y@-XS>QFH
|
||
M`,G"?@_PF9DM`=AG9C\!V&YF=0#S+.QE@&D6M@5@O(6]`##$POX(\)R%M0,\4
|
||
M8F$[`=9:6`O`$@O;#N"PLDD,`V!AXP`^L;#1`'^V,`O`(BL[!C#;RIX'F&IE9
|
||
M]P*,M;(R@#>MO+5M`":SM%7$_F1E^XQFZ5<BMLG*FA![4,0B5G8%8@$1^ZF5X
|
||
M=8'+.38>&VKC79YC8[,R,,L%,F%E1L2^%AF.6]D6%'1(Q#ZPLL6(U0C*:AO[N
|
||
M`I37BMC5-O8D8I>+V$0;'[%Q-K82R&8;N\.,>HJT9VRL!+''1.P7-G858B$1K
|
||
M"]K8-\BP7,3NLK$NQ$Z(V!<V]@8H/Q:QO]C8+Q#;(V)S,^7#4\W2K$SVL-4L[
|
||
MO93)%F9AGF6RXXA])&*Y=G:/PRP9!2@48*0`)0)<*\`<`6X1X$8[6PG@M\M++
|
||
MP.59@?PRB_D`,K(YF)3-E@/,RF;C`<H%\L9LM@)@G8CYLYD"H`C*.T7:GFPV<
|
||
M!A7LR&87`+R/[``'L]E$@(^S61'`\6PV'\#E8!L!I@A0Y&`'T>CI(C;'P1M=2
|
||
M[V";`&YWL,<`V@W,DFV6UC,.?L/D3>B>7S&>-L+(ZM"4NXWL*<1^9N3=\Y%1?
|
||
M[LK#W#7SM,UF9D>^1\W,"?"LB+TGP"X!L"PH[5(+CTT0L4H+^QUXSA*@UL)+>
|
||
MN%F`I0)L$&EA`38)Y+\)\!L!#EC8B]1H*^^S7*OH:Q$;9^5==YE`EEIY?_[2O
|
||
MRO(&FZ6'K<R>BU5L9<Y</O4)&;*RBR$2@H@!N<;*QB%V&V8Y8C8;I\P1`+.5\
|
||
MLC]NX_E:!-AJX_G^:&/Y`)\)\(E(ZQ'@W$P.')D\S9+),ZS-Y#S;!7A;@!X!E
|
||
M%MDY6"K`7CLO]@L1.S^+@[(LWA/_GLWRP?HH`8O\J5V>(%MD.4L>#W!%%L4::
|
||
M/W#(GV%^R>Q<$$9DEH=A>$IF^0"##?*)$6;):9"["K%_&3C+A[`%(.UY`;X0%
|
||
MX`;&P0HFKQJ-$6;R`V/,TDXF-P(T,WDEP"M,7@*PA<FW`SS/Y'D`SS'9`_`[\
|
||
M)KL!?LWD*0!/,?EB@$U,'@7P&).'`3S,Y&R`C4QF8V@CD6.C:7K*GP,T,?D([
|
||
MP%HF[P,(,/EQD*QB\IN(269>LX4"G&]C(RS@8F<O(_9[.WL*8+N(M8L8UE8)^
|
||
M>F)1-KL"8$$VNQG`D\WF`4S/9C<`C,EFZ]$3#=GL:L0.">0W`N0ZV`R`+`>[5
|
||
M'L#L8!Z`B0Z>=K4`50Y6-)@O.`*_E-@6ZE:)]^X?);Z:#@CPMDAK$VG-$ML&C
|
||
M$)7X$CLJ8C&)SW59YN`BF:>=+[.]B)TM\WQ39?86P-4"W"*S5P"\C/T6K0TRB
|
||
MN>E2,&/RUB*S=)C)SP(<9/)D+/?]`NP3H(/)OT+:FTP^?S(?XI.7\R%^M(@/K
|
||
M<>OE?(@W%/$A;BKB0UQ[&1_B0!$?XL5%?(AO*>)#["GB0SRMB`]Q81$?XM%%(
|
||
M?(@'%_$AMA7Q(8Y?RH=8`[@<FR%J_5LADI_.Y.W;)6*?BMA4.X]=9N>Q/]C9P
|
||
M]5C@3PG0(=+^:N>]9,KB@&5SY$79/.81H$V`\0X`B_R%73X+*^:@`*\+T)LE_
|
||
MKP88F0U@D)Z!2B0=,1BRH43F&4GY,QJ&(_R$&>$#9L.%"&=;$"ZW&"8C_%,*`
|
||
M_\EBF([P,0J/M!IN0'B.%6'5:K@-8;0H5SK';K@+X=EVA,-VPVJ$'W<@_+[#Q
|
||
M0,K>-6*F^,2D^+D`M\E\@@9D=@-:_5.9>0">E]FM`+^3V<T`W\IL,<`)3!B`?
|
||
MXS);"+#4P,7A#0:^29W/N(P\A_'81,;E9RECJP"F,$')V+T`%8P+U>4BME20`
|
||
M/"^0_UODVRR8/2+R'1=I[^E(:'(`OQ;@<R.['V""B=4-YDH;@:")9UAEXMD5-
|
||
M$^>YQ,2S+S(QOX,K=*L!JDQL#6VF)EZ7&29>%^B#U(8I)KX7/V9B]23L!&LI%
|
||
M@U/&!.67@E(3E+\0:3_/8$M`N3Z#D]R?P18C]K,,3NG/X)1/9;"%0#XGP+L9W
|
||
M[%:`MT3L@(C]58`N`3+-O-9&,Z]U;P;[*<!)D59BYFVX38`F,V][HYG7!<HE!
|
||
M[P(SK\M2,^^).C/OB=>L//L>*R_V/ZV\(QTVWLPR&^_=R3;V/,#%-O8'&@`;&
|
||
MS_"VC9>PR\99OV;CK+?8.,\_V'@)O['Q>CYEXY5XU,8K_Y"@C-AXY;&LVAU<S
|
||
MG.ZDC3:+3\Q)`OQ(@-NSV&2DK13@0;$`[6(!7BA`K@!3H+^`I"A;=E5@\D&IN
|
||
MH=+%JGQ$@`,"O"U`EP!'!;C$P3JH$@YV%[5=@`H'VV"UR(_)\C@LW/=DN1!@O
|
||
MF(PWR9("'#/(P@!<8+?'&;YA\R"(O,,HR(D\8Y<,6>9I)ED#PNPQY$,!4]
|
||
ML\RP^'%@RY4Z)<,C6)S#980K9<.O$38SA$N8X44LU&Q):(Q&U,$L72^TIKN%N
|
||
M*O6%B$TT\=@Z$U>Z,`5)9FD9/&T$*5:YC;)DF)C;Z)`,1;F-(_CO.,DP.+>Q`
|
||
M6#(,R6TLEPS6W,9*R9"?VWB[9!B9VW@W3UTC&5RYC1')X,AM?%0RF',;GY$,-
|
||
M%^<VO@3Z#)R&Y=E9&=(023XV+4,:@]C5&=(EDGRH/`,F%OFZ&1G23$E^">!F,
|
||
M21Y]3894+\D/`-PCR>=>GR'=)\G_`K!1DC^<E2$](<F?>S+0(_*-LS.D[9)\Q
|
||
M]5R,(@[44#@G2_SX=X4`)0)<+\G#T3T>2=Y4"H$BR8<!YI&]`IJ?Q.:1Z+'*<
|
||
M473(>`$NL,J'`<8(L,DJ.VE)"_"P`)9LD<\A.Z\`3P?GZ7'P$@RRO&$B2&3YM
|
||
MKYA8V;)\ZS"SE"?+W5=;KIXUMZST^NOG6JJNF<4#T@^?'SX_?'[X_/#YX?/#:
|
||
MYX?/#Y\?/C]\?OC\\/F?_*A7CS$^.0-GR'EU=)+T:&=/DZ3._^17M[OPU33<O
|
||
M1FN9"-4;M$/7XIJVN:9UUQ99FEM=59@H["X\T.Z.TT5QO:0U(UESX0IWR\)!Y
|
||
M3*IKXOS*\G"E.QSQ:'YD7;PWD4A,HEA=+_)XM,>=DE2VF1".ETIRGG'1[?1^C
|
||
M0:&-<B0YA3FGD[DZI\Y/</?['<P\3D)K0$<>HL3ZW#D>[;<3"=G<ASP?R%],C
|
||
M3%+6(U\`!^)ZJ_85[KSK\^I-FC94DNK6HTQM)AH>W&FLS];V(7'+OP&74.(>V
|
||
M[3*.MR#3*\#7/4*TYZ9H?TVT3P(WUZ/94Y3_2I2_(LJ835`.1EFKJ*SG"'O$.
|
||
MELQ?1_EW`A=YB*J(^K;9DERNITKFUQNU,LKX/F5\)I7Q8LKX*7#5'NW!5)9A?
|
||
M5'`W4:Y)49J(TBHSJ<JCW:%32MJ7UF1?4;?\`B._Y0+JWD$R]?_*'/1_/O4_^
|
||
M^4-$UJWE_4^(^JD>[=ULPMW%^WEMLO,ONCB))(;YK&]\[A(-VXR)9FU6[HZL(
|
||
MF]&7DT;HQ$5$.T//F<F2L<A#S2+G(I[3=_GT+;DR]52<HQ.3QM#4Z1Y$3;)OU
|
||
M&2+W=6)BDHN2#HBDS?GI<TXY>T"]K)R[8]T0-)&3>GM*<ER2[Y8!=!^/Y[4H[
|
||
M[S^%E<O+MXP^LU:WZK4Z[\Q:N462Z$[M?+LD)=SQ_DP=:ZW?HC=HTI3#@4/[5
|
||
MV5625%4]5WL:OA/:>["UWC+_IMVMNSSH*?=S'NUVK#M$D;&Z;J),\]:BO80%T
|
||
MHL:L"<5:V#R_9H=1BF94:]LP0[?0"HX>WW4%6#V(Q55W"7)H'HN8+C;M?;"OR
|
||
M=]3+VI_!M6X2)5XJ$K?,HL94[D1?_&$$GT<1]TZ/MA;]AG'-JYM#M&:=D<R7E
|
||
M`Y]3(LO><6!W!Y$<-0MVP12[V]+834JRNX]HMYB3[%ZUZ2)"9`D2N\>)Y"&=?
|
||
MW4LI=KEI[([U$CM?7MTVHKTCQ6Z)C3IO9]T[?+Z'('^>I(';LBE5PB@JX5W>`
|
||
M?KV$S_O:/SRM_<D2NGC[4R78]1+,!BKA?"J!QE\?J"K5;ZF7J[6723!W!7L7R
|
||
M*IG5V@X4&=0,:E>;\7*,<<T.B[2K2"+YJRJ6+;>2F*C<'_+O"RD6]93:M94\%
|
||
M=[YY&FFJ?U]AHEZNTA83N_W!TV!7I35P=D9U?[VA2IN#E&!L8<C=H=BKM'FB;
|
||
M),0B97)A(N1^,SI(=;\9SLMHNN'B_27J7\J!4MT=!?N#S;W%,?\G0;]=4FP1G
|
||
M]WY/E6:^4,Q`JIZ%5^_EA>!.>X3JMF.3F()8R!U3W9:P<?(5-I]IJC^^*F<+V
|
||
M$>GY5"46F9_0":8H3#TTO7RJ$E/>5%NC!_EF=,L5M-%`4KDAB^KMVE4F`!DKC
|
||
M8A+B=59TJO:H2?2U`=B1A+V6L.M2V#+-2M@*PB[5L0RTWV`%UGD(>V,*6Z;]#
|
||
M!V'G$K9,QQI!VT[8*L).2&'+M#\0]D;"#M6Q)M`^2MB;"2NGL&7:.L+.)VS4_
|
||
M*+`9H%U*V-L(^UX*6Z;=2-A:PKZF8\V@+2-L'6&?26'+M`F$_0EA']2Q%M`.2
|
||
M)>P2POIUK!58F;"_)^RB%+9,BT)&U/V1L+-UK`VT[Q'V!<).36'+M-<(NX6PQ
|
||
M8W5L)FB?(>S+A'6DL&7:@X3=3MB33&#MH/43MH6PGZ2P9=HBPNXD[)]U;!9H8
|
||
M9Q.VG;`OZ5B'=B5"&*BA6A$E6A@2'V')(3E'.X>PHPF[EB4[_QS-0MAQA%W"^
|
||
MDETW0OO:0:*-L/-8LCLLVD'"EA%V&DLVW**U$?9>PHYGR29:M.<(^SQAAZ0:D
|
||
M8]$>(>PQPDH"6\,7>UT74+KT+Q=*0MT5QA2J2$<U]:%&Z:A]?:AL'86;O"3J#
|
||
MM-C-ZQ;WH30=M:4/]9Z.,F:D4#L$:LLLH.I(IB;W)J%?V+>LI(1-:0D;1$+='
|
||
MDWU,_#K?+_I0]0*5;'5?PFR=]IL^U%4ZZBIS"C5.KU8)H11[LNP\O5)W<+0SD
|
||
MB?[6*M"_X&A+$GU,H.O>Z./[KE54:X>]GSY<J1Z?R^6PMZ<\QRCY+(D51NU>P
|
||
MZ#;>QD4YWR3:RSEYI'QHJ-P8,JN*,]AK\)6K-7G6`\M+VDUP<Y$.3Y4EM<)N"
|
||
MW:V,F*M]BM%7=UEW^\S>X*P<8]06W)6`N*O9X91"CM`L8VB^/=@K*R9*M10V8
|
||
MZTG]ZA,\;D25MI-7Z&MP^I(*#P2O7)@%]\WEYP76#)%6Y51KW8RK(>:7O]J?X
|
||
M2$3ELF![_G2U;:J)R)9]:#W@ST2QHN3=K:&:N.J.\R#GO^D>!Y/&W!6NM`2.>
|
||
M/&#I>(*BI!RDDAY`4O,18^#(FOZI8;<E%0UD4<C2&AA+L*=UTTH`GMHZL'\C$
|
||
M;HRB`GVS;DF6+&G7G2=)-:W]VFL10Z"NL*MOC9ME4<Q\@S!*O#IJM<6ZUY?59
|
||
MLL?I;3G"`GO,+3N<7G6^L<D=]ZIF;\$N+W:9B#O>L@L$AYG=W-+LG..=[9WK]
|
||
M32@QCQ>;!^V0H146G6FJAS-"M7'O^@[OE3B#V-6=@,X&H[>P>6.E>G#(W(AB$
|
||
MV4H#4_"F&O_F*75G.GN/U_'',6.\GU$#6@X[';_K<#8>)6]J0M>HM7'1`*<HG
|
||
M*P]EM;GCDE;BQDQ2CH?<Q[7WW;0Y=F'O0^5#[A-JC5UMO0X:Z-I3-.RDGJGN>
|
||
M6-CE>'%?4VT\^)G9EW.M[[S@9P9?1?`SYKLL7!N/SJS2MI.^O+!N"\2"1I7!;
|
||
M!(_^J$K[7T"K%<<=+YI\Z,#B7?YQUX0JCD?'5FD1I.AH5".:6Z7=2UJ]NRMJ,
|
||
M*00XCL)0;F2&'*J`WNACH8H3(%\.\JGNX_[\*NWZ?@PVPZE#DMU=P*S@-%W^9
|
||
M2ZJT"ZA6LH[SZ/D)*CJDW!X,S-)2Z+T57:+EZS)0D2HM"J4WH70EE.-:<PEZ7
|
||
M]$4Q=0<L6RDQ=@R61F+L!?QW//^=B-^Z(OQH(Z$KM];-IV`>!:6_^6G5!4"-G
|
||
MQ7I`F:)F;40>K-XQZLF6OQJN"7YI5(NN/`CY$>(IB??1*19!%?U8>W<D7)9)8
|
||
M!"0ZN&IT%GAD;WZ,(S9OX@"R2IOGXBH/B1Z4QI<"&A]$._6%)5"R=I>.H@@HU
|
||
M%B#:RL.R5DEAL5[X6D$][%ZU/,^K_L5;O,-GY8N=\@;7V"7?^.`:B^0?4JW=L
|
||
M*7%!80^^E4A1I$NZGT,J.K:7#_%HHZ\F'=3;7@YM29=Z[>7<`[RM?$C"&USCI
|
||
ME'QG.5XJ=WIX[<<,HA/X1],A*-O+L4[4-L%<K"Z]BDJ6]LHX,B'<,I]6WAGU"
|
||
MW<WK:Y%63:0Z623%JIHCU4.+=RB#];*3<9-*XK>P.<E*+;>S<DOD+KE@A87J8
|
||
MKU8;0T.KH)3/P0FTN,TWTJO.RO'VM$@&)<\;W.WTAF;E)$4BY2]L#KF%5*38_
|
||
M0/E+*U:MM*@?JGXG]:=C+9V`5<4^$T*J(MY9A/6ISK)8=Z^N5=L@GXIW-!C56
|
||
M=Z(&]7W5/*?>Y@E5QK2@OA$H%JPAM3(6M:DMX\P1CTQ1\QS/7"):3425,7EHE
|
||
M0;5%?K?@_:#_A*08K=W*C[A:CSITTBYZ36B69=4@E><>&G8Z7MP3HA5;K3GLR
|
||
M5$BH(AX\F?#EAEN:6-G,X$F;SV+M=D1^C"E#K4"%@Z29[Z8&K+Y7+;?,")5_@
|
||
M-[_7,HF?V@)VU#^[T.^5EN@,SAA\1;1XYAH."_\K3LI`3B\C"R**H_A#);/P!
|
||
M`-_Z:%6W,3XA,;N,A;O1A7L@J53W\>]:\_KX0&@^":\$O@VE]H_"O6J%I32\!
|
||
M(!&(+U.R<?R0DG(T.CD07Z'DDMD*N^:V`.'I<4+4%8@OX'BKW`^/;5D4'AY5>
|
||
M&HB/\PT-%(]3)@;B/I\I$+]-.0^XIMJ88@K+372\B0</]P9W&;8%P.4UQ@\]`
|
||
M\7!M#/2*#:E9<,Z0HN.1$Q'%EB6AH.#;)=&SU!'4"/7LQD_H'89U_S.4XF-(X
|
||
M:S>1"-E$:D6-/<14MS/D5-M%G41[J['?12IC,"=`O)PD:0\%)E2>X\5:/Y>4J
|
||
M!/\$E);ISJ,M$%J4II1RA:BI?(BEV3^(KVB^TM%4VJ=H"?48U]5!?:#7';X,E
|
||
M;^.L',E``R,9?.:MO!\-A;OKZ%G'['JI6MLWE`N6K&JM_G0BH;/114'[_-3>=
|
||
M9]SZ%)JBM@3N@>)2@(FJ#B8=)9(W)Y+W'E_@>UA%O+AEA;&P>7=KL#F?"/U?'
|
||
M[B:Q7*UMI1E,^Y"SGG1!B,EJ[32U-H8RZ&"LZQ=.CTBMZ\J#@O'9B#0%0Q?OX
|
||
MBM/;,QT2QG<9-#7U`Y).!WRC'-O-L(=Q?3?&C22ZE+ZN'(+\"%&VZ)C@:HAW]
|
||
M$S#1N>IT.V#QKF77J-,M\JY5YP=70W*1PC5NNCTTW1(=4J5UG^+F@#Z.Q"MC6
|
||
M-FFH6IA6AMLN(W-&&G??<.+C0^:MWY'9L7WZ$)'];IR[J?R6Y6D$R6JFU@,6F
|
||
M@SH;>I,_4RVULU)+B=H1M:@[0I5QM3+N[2G-*9%\)JX.J<."*RU2J";F'ZONB
|
||
MGX%>^1$15<2N"13;%`:KE-HQP[I7@:H2%_2<Z"Q!5!I8F4BG^A+<U1W]U2PRO
|
||
M1!T[R9N4U:>54JTA7!,RME/H/HHE.@P_U`40+C7V*"P7A33Z-?:"5F^C-V=^-
|
||
M;_MTL2-,-X8RJ#NJ86W-ODH,G2FX.T'SDR982E](J?8TNVE#Q7YUI3"T)'Q>=
|
||
MOD/.2YOXQ!W3XR-.;2#JYU+4DSF2[+N/72E*S$KNJ#>1&*KF!B"YC79!'=$`;
|
||
M1$$?XKOTW<9V>G,UJ_&O4&<2ZB0GQ,&X2?#@DWR7%/<T&-2>S13!##5.X593S
|
||
M6[+OC%(R91/6H\SS%/<L_W%2*E1K#Q4/S*'B%-`ZU42%*(:"'A@2GSV#!LA9%
|
||
M!IJ=<;F=N6-/$G'H2N*NB^NT826#4^_FWV%USWB2?E?E;J:E3AO!8`HX7LR/*
|
||
MVNLHI-UA(GN4^D;P=,)7$CQM\TUM<I3_?5DO2LMJ0E;E=;&']&(/2:0JU08?K
|
||
M[![3B\B0VD;>2IL*Z1L\ZJ\KHLQMGZ'NTK51YK;,4#OTE.)=*T;IVBN6^9"DB
|
||
M&MVQ(E/798L[&HPD?F;/T89?!F'#)9'XS-UBS(7`ZV@OX3M0>TF,0*C$&,(Y4
|
||
MKMTT#C:!/!"TFRZFT&`F/>E$-#383K\C"'%3:]\<J8".D3H-J2WJ['C/#I+%H
|
||
M*5SP2"_L;2MC/>T<G:FV%,3D4]LI$K$[U95Q/6%,2(F'_#'U1J-:&+HT=(MQ5
|
||
M:A:5JV2$1A!DE3%5B4>&.T-S8R%/'`I(KLJKI/[8&)IF#,TSAIPAUC<%((`:$
|
||
M3]+D76[EIF3J`6S+<LLUA;N>H=GLV-@\-J$GI$T9G'V=#:D)9Y&"Q^*DH>S`K
|
||
MEEG8K%Y)S;<F2`#$HY>&%#M4EN%9^52_X5G4:\7O"AI,/<QFQ1[-+@FV6(K;Z
|
||
MU^P7\>)VGR/$*>2BURE?]+)@HD1Q"EQ?L:&\;XE=J.A;(BH/?F&)_-C2;J"6@
|
||
M"%*U+;A+#I7%Y8]"TV/MT_F%UUQM86\B.>?T5@T7@Q0\:6DPO^RD3=(6*37.[
|
||
M"!Z.1^99U'>#IYRKS)"4&$1K:K*JO.?5K]K=?&JHJ^/%IQWW5Z$(2,HJ[9?"5
|
||
MDKQ"S5"KC.K;!1\$3SI#-2>@5C5<I+J[0AYCR#!UDCYX@PE&C%<%WY9#]\1"=
|
||
MJ^,XDW&1PPMJ8Y#+-5VA,J.89`;*G!_)0^^="+XAA^;%0K?$0]?&0C/BJ4R1Z
|
||
M^VA89XSE(FE7).^JXCV.^_Y$'5-S0FT!0^BZE+_S_Z&ZOU/PM;HC&',V7!JJ5
|
||
MU*B^&=]1/W5Z#"I205?/?M439Y5::#;-L6@&P:HXBE"_@@Z@[BC8!4XA]]&&Q
|
||
M(0AWT0!,BX6F]U4-<YMC2SG6?9222^.;^31%J3.,H=G&D!RR]640/;W<6/R5_
|
||
M8]U&?B:.!4_*:6-1.A?G7*TN?<--'Z+.^;UTJD__5%>]1H)I^_ET0_-2><Y8)
|
||
M,O)=23\*[E9ZOTXD8(M1VV9"L!Z^9;XX7>K6)6A2)NT5;&JI`XLZWSX79Y:;&
|
||
MH')!C[8VK\XFJ],A4J=NJM'/1LHP')MRO&/7]'J#NURDY&$>BV3]C$2F)&<*:
|
||
M*13D1`E4!2-?@!Q5+<YC%B(CE#B]#*6#15)YE_B"G9\L=]40_0CEE)5,:NDS?
|
||
M7)!DI4KC1\G&W0&)GZWHU'E!M6;G%S>^5#F)[^2?ZHUG>T5OU,MU^8/IAL0SA
|
||
MDN])1>),ZCB'-EO9-Z#0[^@/41GJ.XAH8C5?WW3Y,IW(EZE=_0JJ=#!F<*S_C
|
||
M%WX/,L;QP#J:Q21E_8,"_CS)EZE6VML,$R++Y)X/(C4'U7=#-?NQ_[2$*O<5[
|
||
M[NWY)E39H5;N4UO#-1U-9TU+2X!&2GCU;2SUM]6:_<7O^BX,WYE_;?C<0-RV)
|
||
MR@0NT<S`SHE-YTT'-IHI'0_L[$:$4RH?H&YM&4*+V[TCC^I<OP"G;)O0:K7)\
|
||
MW"Q@Z:<_P!:G^NT81NR'L(3Y2TMI*(=&?BR'1L(XU'2N.%'[<,BQT;DE2X$U*
|
||
M8'Z7F.A\LI`0`Z7CQ9TBK`_W!DD?;CH+*8/2#L\Z6>-N24X-^4*:*K[<:LTXJ
|
||
MD#5.Z#W[,:OUX8>9"X7AK/O=-7O]R_^B9C09(I7Q>AEK9=E(,26&]QWPSZPC"
|
||
M&8U$*#GWU0KG)\ZPVQ[_^EG%$BFG"6.7+FV.]B"]BA.T8_\`E?K..YWO=,9QP
|
||
MH;8G^#'[YJGYMZ3T:B(#B_!AK]H!JY]7W9%&_UM!_QNLO?DB1TK?2!I#3*^=I
|
||
M.YCN=Q6GL!:;M^5!LX*N\LX<G*?.@CVE2I.Q(.KR@:[6+LNFH]0M\W6S$7$A[
|
||
M/9ELGB7>D!DFY':S#'9F&&2JM(VD+'>1UGJJD)_,_B(L,I;^XBO-'LL5K+JNW
|
||
M0EFJ.S$"QR8:[QJA>RPF9X\#4"S\>>7A10G+T9`_#[:95GU^!N)C82=4AH>4W
|
||
MF$X!C&/=/MHE_'ED0E1BTW$R)3G4$3X<B*,TT'9.PK5H6(F'VWX=<*R[3^PI+
|
||
MCNT?!5[&(T!)#M5T^;#SGX@N#>_\=<!G0H[H]8[M^P+;1'+E<8&;/(!U)E4#.
|
||
M&])?<"_>ES.G?\XW@'-LWTDW!SA[)3I0PYF4Z2QTV^1CCK4Y@`-)DLU]T=7NM
|
||
MUI">(.X*UO*)J'DKMQ0X'=L/.K:K5`IJ#WY-RE':J_UYP4Y#\&2NX_X+(30O=
|
||
M2HR)K!HM2QO>Q,_C8V1I'^`1?#_'-X8O`RX;WV'XCL+W8GRGX.O&UX/O/'QOM
|
||
MQW<)OBOQ;<3W@3%D'3C1^:]DBL+6[,\+*T<[VTB<B>"7$D^@X$+0T*B`_**^#
|
||
MX.B^X`3!I+.P'[--4EHL>F]?T*]GTP1!9R)%V-G;5^I!*<6_32?\;3I';I3JZ
|
||
MB_VLCQS'(BGPEAPVAP^7=]Z/%1%XRR`B/^41HXC<R2,6$;F5MG=%LW9#V/KS)
|
||
MHCCS[8S,Z(@Z(T4ORMV(R&V1F1TH2OV*TX<4C4JZD%@<.R18C.#\7"+B1*3S:
|
||
M-"K"#7'1*5MI(44OY5<"T?$X8ER`*112#D=OZQR)7NL,TL\4S(K.9^D$E9P[,
|
||
M:L5!U:V-3:R!/EX9BRC[8:/$.=XI)'NHXJ!VG9$LB_NMW2'W8<=Z&&8EV.[6Q
|
||
MGFNDI7(TS-=2(%[J-Z%OHH,#\1^OYJ',0'P>H(^A-[K;9,>ZV?%$HKO-Z,M1V
|
||
MW?D1:$.5^2K,AX=#SFA!=YO!![NK^[!:F1^YUABJR%=SO"%#U#F0-."/+W&L4
|
||
M-8-36:>,WPAN`BKWS_'@3MF9JC._;U5W!?W[)<>_W(MPM_LH'>*QOO\,2U`:^
|
||
MSY"EC+`O`1O!G7Y:-U3LG\U-5X)C54C9I4W6:/S0#8[UV4STP3F`X=JCW3MUO
|
||
M]DN(?;()&%)/XI($<AJ1DQ<T\S3=9,3Z20?'VF:#$`N*H[]$>(^Z]XO`I[+E7
|
||
M\Z8[=RH.M2(_<K<QI.2KUK)013/F$@[^BFD[U1D]#/%7T=PTJA1)`\OPC;(<>
|
||
M]8WXKC(L,U>;:,&\-E#T4)\YUCU^BOJK&:NC\U\1#!\+')4M1YMJ=RK9U(TSW
|
||
M^%#!G-C,)[;?Q(]UUFY?,68O),V9;=TGB^%(JRRRSL3<4K0U':@)&B+Z\MQ3)
|
||
M>J<-.T7CO*G>15O'4)AIVMV/T3XAI/HM/KZ:'$!2V6+I8+V>L!QUK*4_<0-IC
|
||
M%]X9WA7XV/R<O/<PQ&'+:1;\9*3EZG&;5'=>2<B=%[X5?&I\\P/Q"4*\[Z`%<
|
||
M?_'D_US#8\\W*?'`CVH4'OE?X4_+L4'TMDTF&2H('@RWI?'_J(\_4:TY0JOX$
|
||
MS@1?^WWC%;[S:/@_`\=D2W>30IV)28-S;`WF?:BRN3`QT[&^42*/JP'C.#/DR
|
||
M?Q@#V'**!8^,=&R_X<)->MM>IL:_^\FZ#QT/[6@\0N)N:N5CJO]AW_"FVHWEK
|
||
MO,>A.S2'W1N;9.KTF?XGP[4;:<A0DRCFZCX4-`>T?`(D*F)401`D?#G=K\M*8
|
||
M%O*VR5)IPGT"F:DFF207,3KWQL@$=@*YZQ,\+^R2J>-S7I^8&7!_,5Z_<2S$?
|
||
M:,:H[NWN$Q('700*N\N3#2>Q<UP9A<M"Z^Y5@QM/!I#LS^IN'&'!%':L>P"94
|
||
M^:Q3:_*O(RTJUHEGDQ+=8+NV&[CN?#QX<AQ,,R<G*-GXP;D?_0R%-/H8+LH=M
|
||
MZWX.&GZ3'?0?GZA6YBDWH@Y\&N_UV7`\QI3`?<'5J?I<A^J(<H;).O=[0'AR,
|
||
M'@@K^43,<W+%(;^3M&*8'`=OL_#+TBZ$K4CFXGI$\)0LV.RELD^-6<TCKU/6(
|
||
MRKQ@+P,#Q[KN7MKT-5[*Q%4HI7B-*3*[(UH0/+F`HC^EZ#/1LX(G2P4S.BT$.
|
||
M3T($(Q*]-S)[-^9X<<<:'ET<\F-%=JG*"?4C3/M0Y>&>8R15W=@`\E3EH/Q^>
|
||
MP=<]'^)*9`?."U^%W#@[3*W9'U).P&B#.OB/=BY"=;A>`3D,@=SE,],?YPI$O
|
||
M35O0TC6@P#UQU-19`K+@28/O;!Q=N0P]SF?&+,KE8SV8.#CE^KMP<$2?)ZA/M
|
||
M]I'R$C4C(/$AVZ>Z72&+ZAXN3U;=)_@4&GZF/T3JL@ZV(.[VL`:S,J_Q-"VP<
|
||
MY6EN#?P$8"/[:K5F_BR12+]>O.3S1&(N+,#V:NW!CQ+)'/W/T\$K7R:)KXS30
|
||
MGAM+]M;7^,U7VQB'L;3I?KQ2EEIZC>7!1,ZJ:+N)*&GV;"&\.%[SVT;M!:[^(
|
||
M1OSQ>@;KI[@*M^,@:19W?*WUN77TEZFJDFE.:,@9_#*QE2?0_4)<&WJ"!#+/:
|
||
MH',&1^U&\.[/UF>B"X]6D"8I[;S3[%C1)B^4`Z-W*YF*"@_P6T9+<#(.R14QH
|
||
M3!0E'EVF7O^PD0C5NRU0_@MYL-0>96JI47VKN&OY=+7*@.7QHT"QI$R`@/4Z6
|
||
M7IPM>Z=6QAP/ZM*G^)00I0Z>!$NG%Y>)9-1IR2C>M3PCN-(@*2UE*'AJ_JJ?G
|
||
MHTS8\ZPIPU5;AJQ.-Z1;L9RHO#85WM9U/\+I*C%I/5E>$SFTZBUJV?!$@\NC,
|
||
M%2$YT7"!M@I^#NVF&P:+<0B-F$?6LK(QV-75"DSS_"=O'DSFS"OH-ZN$?B==4
|
||
MC5]M#NEG7=B\?JQFM!PVM%^=8:1924>7EWN3MSR)OU#\MWI<Z=+%5O`J:?7HZ
|
||
MPH1Z]55&U9.?N"NO'JL8%Q)=D*7N$\%VF)V*W2=6'8*'"55,JT\RS".&`E>57
|
||
M9'I<O3<_,<DSF!R#KN>_,^CW+Q[MUL,)X3"3,EC"+,$S#TMGJ.-,*8;`%!'FA
|
||
MFV_[47'<H6^35-IOOM5[H)Q\--N^36LTXB]^V]?H>++1(_1&S^.-EA/OXJ)%X
|
||
M;VY\U:?)NI+W@)QT_]#M/?Q,2]=GB4N:<>:-K,`-H9W'OWZVYYUQ)^_O&7C0C
|
||
MI8/K+:D[M:KJ^*7-:@<=.7M2V=1>G#^_^55X>B)<G1BW(TF>+"])RDL$-3]4G
|
||
M?\=QNM^1M'!OX>XM=!*5X<?3N`6!:<&6_.`IMJIS&]\W=->G"[;.(%>$QFWDA
|
||
M57%F!G6'[OST'X[M)J))N\U4K-[&L70YD/A6OR7XSCM-<>%P_`.R2)GV?@>+)
|
||
MMY(LWDJR,`QD\0JQ>`8L6G5[07J'1$H3\].O@M+D+5W1[N&7G1"UQ;T-^56ZO
|
||
MLEWS)2D`%K[1DR&@6L>[!3YBG%K06T6JV\V$:$U=`_;C3Q(HEO!=`K,#W?6M_
|
||
M*O`V+H"E#!>$TT*S+=@J5QL3UBCVNJ&A0>$.=5A3;LAMN8D&"E(>056/]?FGE
|
||
M<8O)+`\<9<Y5RV](K)@WNUKX4T"C@-!M+[^5:QWE'LHR?W?*!FD/KO%X5L%0K
|
||
MRN5UN0>.9DUYYD2Y)U%^\WS]KJ":W+TEFDZX&<"L<<#QP&\)M$QLLINC&8&6X
|
||
MRP%;/C/.\!])YF@\OE_B'LCZTM$MZ^WNXWR_(Q\K2`L[N5GYG<*@X5@[#^V!L
|
||
MV4*QA,\GX"R/5#XV!YK:'&TV[9;[821J=S],#"9VM[LW"H8;7!RLIU%M=S<1S
|
||
M"+G7AL\O#\1=CO6'S.1,<]#QXJ._Q?;4I`2:GEY%%+CG/#W4<;];V`(>;[H4+
|
||
MM@`-/W%\;?`E&8SO:'P+\9V&KP??6_!=C&\`W]K+9*D)<`.^K9?+TJ.`)P'/I
|
||
MGRQ+OT)X\M2^[[.(;RTBA\2'T=@PKT!8"?"CK(Y#['41H^`L.3VAN1_9&DI++
|
||
MYW(?(90->G)'O]A[_6*'^]BF<I,Z0W"P0<"/02-2.X_T!5]EO-#.BHPT?M$;T
|
||
M^X(+]")^`@+K;L<#=8"ABH>#%1ODSKOI]@2X&U(X0V>-CBL1N$#O.,?::X`+6
|
||
MG^B<1KK4L4-;31)/"BD;.B\FU%NN=-1PG8$J4*A)3QLM?<<Z`R>V8*+PW1"T\
|
||
M723'W7D1W)C5Y*G0%@W^,>0&Y,_LV4^U";F;HO"J:]K*=&9HZ2O?DD9G=*S['
|
||
M)0HM%<B0>WWG4SH^<I^)9MW#1GYH6=^YGLI`0W9V@/V:\4CAJGA-$VY)8;S=3
|
||
M?C!4T]2Y"$21X8_*!\CXT4J8RF0QEYM$T17K(_:0O)L(6D(5ZSN+B.`M9WK3K
|
||
M1P'5^!;M]<%C7Z8G6$2"X8R$+V$X:%]W#T:26TS.$V&NE0\782=-@YW&SJ9UR
|
||
M/L3$&IG8/?%HU-Y'^[S,>YE(?5E0.R/7X3"<IYX=K>EIHT)1DJ\@A?>J9UN.1
|
||
M>D./D_^<S^IXB0>BER0#!6D,<+Y^>C$MRL?K2`2U^O`R`EK8_C#'1EXHIE/%-
|
||
M`9\)JQ>/(2K60\3QL!4&^NAHC*#1L?TAJC>7%8D7J,)5<[6'_DI#LA[3$D.=-
|
||
M'7JAB!])-W2&Z(Q<L1X<JK1.G*[I+EL]';AJ@B!13)'K$M%AX=H`3`@YD7ME,
|
||
ME:-G-IVGLZA<7_R.(_(JN!3L"55N[/P3+2M,+S*Q8'I%7J53$%Y_[<0QOFU=2
|
||
M"2*T9H+'3HO*A%XE+ITL/5<8;Y$H5],Z^FU;1RT6GE*AASCUK'YE3(3R:-J^#
|
||
MD]P-1)VT42?Y1E6QOOBD(W*NS!?A^K,HT\G.7+[LT6M^#.9$4-/?IL557X3",
|
||
MD8>*1;?@A,2+"G^#0[K:"P<(XI((O3J>!A`Y+TA.'YL($Y?$"Q?PN[./YHJ>R
|
||
M)P:)%XAO0LD3LT@[]A[AQ@N<]M%[))[S4!^4B=[H:;.(58K[8YX]6HQ%8ST@6
|
||
M(JO')P>JA$[=N]23&":%158FB@_YS06'>@Z%_!NQCD3/(LUGM'3#.0P!-K/IY
|
||
M,K5RHW7O:KI),EZ+D4IVUHD>L:MOP)7R85,P9H+F7K$Q^B,A[`+QI3!/5&RT-
|
||
M[EXS02@D\"Z[AVY%YN'X]E8)K6G,SHJ-L"?[R;^EIBE4L1%Q^6TA@I3S0(+ZL
|
||
M#0<:#8NX'_/4N[0'T(#KB@^MZJ)R*ZC2/6TEM)1&@BRB/%95/U'["6BJ'-O7)
|
||
M434\6@TUF>JQ>E4![J^:"MX0G4)=8$*F:$[@*I<(60)7C5.&(30=BJ#8-#O@>
|
||
M!P$&LZX#"[7E&AR0)HB:BD[@M9JHG>SA97`"I.'0*^8X*/&/AZT4\TTH.*VVV
|
||
MSP*7,=3=/*%?6<\1(R(@(VX3]QY>8R%!ZHKIA;FT]43#4[Z@E(R8$,OZG.YQ$
|
||
M;^"B!0YZL5!&IP9BH$BPD%>M.^8%\EWBP)-W(X2#]V#>1VO)R1"K]>RDOA"JT
|
||
M6*N=TY.6I'Q*==#V=D.:TID\9;!QDD^W'OI;'UR\=/,;9J'X2LN'TWD:+D%0\
|
||
MFJ1]_':YS]/_*([`?RM_7[8[D&TZ\L'LL:IS8`[NS(%9ZV.P0.&M[T#]E-\$S
|
||
M<8:;J4BU(W(7K"Z^83I[<[5F`_NRU*7W7[D2VMKO_HNTV^-TM(Z5Z(YZVKJCX
|
||
MU+D6.3;PB@KTFZ^G%P6X:+7T[`T-OEY_<##P?00_7NC]D%U_2KLT1W]79H3B(
|
||
M_BI7W&DX!W'_%/XS(-6%U$SA4<SQPH+QRE#=YTM)=U9#JH%2?SE4O*P[(Y4L]
|
||
M"XU#DZYAZ4G%WSA^*7QADA['_3R2TGU]X`>AD'/B2;6M(.:IAV_E59^0),)=8
|
||
M(1R:R+5'[2@^[<O#@7].-?<?YNET](Y'IB?@MI0UCLX$N?KA/K)2EM^-_K'/;
|
||
MI9D.$FE=)@W2.P6^>)7.R#09=^,-UI1G;H_Q<=Y1)1`S@^=@X.9J5^71@U*Z3
|
||
ME>Q'8>!=F4CE5,EUQ[K7<=]_H(7JJ8*WJZO@:!'7$C`BX%`)CQ'(Y1@ZZNTTU
|
||
M=T#8[[BO,OR'I#GU9U5II4?TQB<]J,>$_/1BHM&^+EDJ.:`@'T1J/.HC*G]72
|
||
MY-I$V)A]198R%ATD?U4OS^;S+3<Y-NE%@NF<*NK'Y728[P`7N64JO*1J+,NS4
|
||
MDFW#-"%+&ORR<U&20WY_:H43'C"5SL[1I$8,=%;FG9VO^QO(F*0RV#G5=UEE[
|
||
M'O?$DO0S"CW[J#P!>4`C;:O6;OA8-#94T07K/:'575%8K[HH`"M=P7Z,_9Z&N
|
||
MD7S@CVMN(G?CB'1<=I*[7H<N5F8CN4+3SJ/D"DU^@QL"83JU1W,X$XPP(JM@,
|
||
M=8U'LV4;^=VTZ%G;6%9;F6P+MAHB=QODKE+Y;=F&*=LY#\WDAZSU0AS01&U)Q
|
||
MFT7;LK]G%D52WI5.6D6SM7DTBRIQ"V[1$_NFV&SM=$Z_*4;.H1CBY;>H;7`!*
|
||
MB+Q*VU5=@`3=G+FHG;:>;+A<;?14TT"_HF>?RG&^LX,)W3LT8UR-/6*?BL658
|
||
M8NV/RZ<+>E<\C;J$N$ZG<HTT-9IT5UX;?_0#/]GP,)ZC6WK>>=3Q4F5\]#N9Q
|
||
M._#J*/[!G7'U4R'`'CWP25VBSWK6HC_7T-UQT.=/>NC)S.`;N#@;>"L_4!X'F
|
||
MBXW*L,TW4X[2_,VW<CA<][2#>TZQJ<^_SMA?:O?E'[UYH<BWN8Y#EW?S8@2\(
|
||
MH=(Q?Q<G_7W,F?43\E=;YH0]QAUWA0?3*ZVFRF\C-?&6-_!(ZA,6>,/<TNJ$4
|
||
M<7(P>4MZU9BWX)17_=H[7?L(F>9ZJ[P>;S6]S#+I8KGU'WB49?_G'F4->%.02
|
||
MDK_4%/[>K,G];>!*<OB4E#L"5RH\<*ON^(D6K0*X%D;Q"MU#%*A[==24`:_0`
|
||
M=&K'BR/NY<^E8NH.Q^];X9+OI6=IXA]_H1.MZ>-/)1=TX`66XT5>>-(1-;9J+
|
||
MLE?]:D`)9*`'>_Z>"KTZ!X_>P)+^3Q[EJ7S^-_@#(O;>0.OF_TA7D_TI7&OI.
|
||
MWFE4C(5[H[ETFZO;WDS<?J:^4[@[7&N?,O8EU-:771H\:?9;IFRFF/(U(MQG@
|
||
M37BYD_/6!6#3',T+QCR*6?P5@U1Z9/B<R/`'(WEGR[OE/?(.Q_:?W0\FR6=7"
|
||
MP>,EU541_T%ON_O@N7B3?[!_@]!M=Z,ZV^K(GMVCGGKZ:6^[B2+P>((F>D.;K
|
||
MB1XXFMM,]PA``^MI,]'`#FLWK:%90O9)TVH*M9G\`O@$4`2@$<YOX\,RB^X8Y
|
||
MMA#_"/S&\(S_Z:>[3?6(&GS>0.W[WT;\^]3V]!JJ,;Y@BE%'JL\Y:,:'P_#@J
|
||
M`F_Q)9XR4D\Q$N?^M0V[]S]!]0V[/WR"*MQ)MW+(VF%`/[R97DJD<E>_=Y:>]
|
||
M.<1ZHH'_$8/^A!T#"1/*F_CNH@P_2=;E>7,4+E.OXWKUZ)KPSB=2;T0W+493I
|
||
M>9TV+:$0U<K;Z#]VB[S"WFY:"-0@<?KCX1SN:^G^$*(7W@AP[GK?HY%M9"I/Y
|
||
M??)6\@A&-H(EE"TW>"6%$XI-(/'V1=I$@2=^BG+ZCU'$W?P][4)[S'I[['TC[
|
||
M'1V.FWOX@7W&&H^0K^Q8FO[6'>J.)]?P,M)'?A,UU)AX@L9_T[TB3).@[Y[I&
|
||
M[UJ-&?_<:LSX1UZ^?E]9V?^-9=F^IZSA_W59MG^DK.SO*>O"_[JL[/_.=DW^,
|
||
MN]KE%&\MZ$22H4ZB61SL+8&F?"7-?=@&>N&HMSMBO"EB?%C&W7L<#^$^:JJ!;
|
||
M:Y(E,MPJM\KO.K8_2G*P^!"XP,&RM]2Q[B]TL=);J@S1)5"7_K=$GJ8_(Q*=&
|
||
M`='09:$'(^'@'_B&^'4X^#P/?.-U;&]\B6L1[NZ`_VNX?N(PF.'=ZI'HSO,"Y
|
||
M[/7O(+#-`X+*$Q%WUQE"]AZL6RPEQ1-VQ_AR#+M/<$&@K\>PNYM+@]0J5=(D`
|
||
M:9COIX$=B2:N6.C+*,1[13]730N>@G^O#/5+["1H4&<G:?<U\;+@:280;_0F'
|
||
M$NGO6296_^U=X9="^!R#\#D2JMS_[SW^_=!G^%TZ%#OR=9[A&S;#-R%Z$Y#OG
|
||
MHW'M[KU"ND)(E!-.UF/>QG8DA_Q[HQ,%.IBPK,GRJF^CT[R-.V!CR$Q%>D%81
|
||
MV>%M;*$<%7LC[HXSMZNTJY7_7XJ0]/LFW,-7UQOJ=F*XZPW).WS2]S<>)?LGQ
|
||
M78&FT$38WH\PV4V4X;>)]&?7VF-T"2UK*W8(;)I]@=M?<$%[MII%H9:/#<$KQ
|
||
M>`C/3V8%.W&%KWPA'NB,MB;2WA3434;96APG<SDAQTK2L;.US[\@&W!AMS6Q0
|
||
MVA/RQV'FSGN!3D#JGIX6?D0R/#\*3LT!%,(";P80=-&CT,";)=PQR1@XX@CL/
|
||
M*&W*#1QU!':6-MTNX[@V'0>9XIXU?VH;^$R+SOR%S1$\[/''JJOHM*1?$JLUQ
|
||
ML:0AH&$XM^L4[.]/@,=?A&XW342U716X3\HJHJ56<0*FHI6%W?!-\"T+RX7P[
|
||
M/>\*N[N,KS4?-JJ5)PS39.SU.U\KW-V]T^4S<:?)[ITEO@PXC;MT]]Q,A$O()
|
||
M*GX\:D4PP(.J\4KJADSW\9`(@5EPAP%F*V-XBB4!8=+D[U(>*NPN3%1INTS<_
|
||
MPWFPGBF+6.O9HKDZ<FSB$`Z&(DQ<X+^R^G7];V`,/&_1/:-U[ZKAC:?($7:U0
|
||
MB:NGH:R[R%M[>ZC#P=GNZ<%+G$+_)^TFPO.;OZP-5OZJ*&TZ_>\$MVOU':.`B
|
||
MAT$11L5*"[1^KDT8![Z+^A]8MV>>W]+/.^':X3!;&IY/1"KB+?"E;_F8!7:;P
|
||
M6UIPS6:Q="N7X(Q12<>Y&CM^E'S\^//PLY,?.*IPE//,IH9=E32RY4L!>(B-`
|
||
M^SNS-?1E^Q__VQS_/65]CRAS]I]OU9@@)K)YS%!C]/:S.5%?SFVD??Y%9O[W5
|
||
MVOB1)S29'W/2G@$H=CB13*`_'3:4^RZE.R;Q/RE#DPMO2Y'4^`7]*N_K]L_D"
|
||
M#7LZ#]?_"QYGG)]3[]%3`H1<6ZS5VN.X#>2>4C$5FU5KGSQWQ_L<@)-BFF?*;
|
||
MK-;J>";>_/C\`2=V4=Z`8S"*_@ZM/4/LW+%_2,G^/J7M>Z:5[1^I8"W=9[WDK
|
||
MCJ?+I+^G?V:<_I[^R4=^K3[?`Y>A,W/;1&Z+U..VTP'<=W:/^(N>OIQV$TDTB
|
||
M,LK04QJBX0_[TP<\^9XE97O/JL_07CJ5T/^V2'(>&<G32<EMUVWMDO@C($11G
|
||
MI852U,GZVOO^G(&E_T0L;.;O\=QQ;J/"PY^DN8J<.=PG!OSQCK[YF&ZDM*.&M
|
||
M@T^ENLPI=#;K#%]6-`<FB;.V<3-"[C;NS6.',J"=U(D;QW#S9(*NTC$@PD"9P
|
||
MWIV.:NWED_K?(]`'A/_)N]C\?O9@I_`.[&FGO_2@9&_F?_A!&LO_[D,[L`%ZC
|
||
M/=CX-FV+B*$Z/@R@,^2WTY4!K)[DO!Q7;=N=NF-,^UCZ?WY>219PQ;R=CL?1Y
|
||
M+&1$7^"JED[.H[/X'4I+@(:5'D2/$":7(:`B8[V9.^]&A4<Y7MFV!P\S%"=ZI
|
||
MQC;#9X^.0CE1&_U8Z2<3'76.Z*BAHJ.<Z*C78J+M?%\E)G>!25!S^@8-^(DZ8
|
||
M@GN<T:S@'A?,-7LF1EEP3PFF'Z]>1N,>@O38H.9$O32G:C8]M.^;"2[>TQ<&\
|
||
M$TN4(;I'@!GGC3X#TDF\E>I7$7]L*E?>ECGKC=K9Z4G5&OE.H)FVQ@H[J0V@[
|
||
MQ>X\-A$C98'/57['T)72%/3UV%<=8_(/:O*E03-^:T\B(>YV!OXQF?\+/X_PS
|
||
M%Z.+/FOI%_M5OUBIG!Y;RM)C!_K%RHWIL3_UBXTTI<=R^O%<W2]6WZ_TS_O%(
|
||
M;NQ'N5;ZX?//?:8M7;9XP9*%KK)QXUP37&5+[UJY[(Y%=3Y787'Q):YDXC5+:
|
||
M?(LO2LLT"';+M&_R,QRB:A,FRV$^88S2/#HK_)WU6(;_/,N6WE[;T%"[T"6-!
|
||
M72BYEBH^UU*O""^X_?:ERA)?@U2F+%M6B^JL=-U>5WO[3^Y8L@@$#:[^'VEF?
|
||
M[8I4EBG$84!Z6=V")8M0SIDTJ,;8!LD&EA?<SHD*4O$EM2L*D&RS2>XEOMIE7
|
||
MKJ6+%[KN6M#0L&+ILH4N[QV+:XD+:&W3$78M7%K;X%JRU.>JO>>.!M\H/0]X^
|
||
M_,-YEM5.J%MP^T]T<E'+OCP+%B^K7;!PI<C2,$I:H>=J\"WPI6?YOEP7_Y,?<
|
||
MZ>_[]_]9(?\D8T]R4'CW5-ZU<`%UXO)++IHHS717SR@MNT[R+A7__W*7=-M*N
|
||
MU[5+ZY:XKJZM758K]?M?GOL6_`1CZ%NQM/\P-[AH'7GO6+*P@<\!Q*3;!TS"E
|
||
MBURN:WPN7UWM$M>BVB6URU`#9#MSRDBW+UWB6W#'$IK[2Y=@)2!+0VV*S7B7Z
|
||
M;^G_:>]<@..JRCC^?3?[3K)[-[MYM-V6;9-`L@TAW;;0EE;[2FFA:4-;VP+!T
|
||
M=+/9;6,VV26[X:TB"-2Q0NN(RE`!1WG)\!B$<4:J%D7ME.H47U-G!/$)"`)B7
|
||
MIW:T6/_?N6?O;M)TK%(=Q^%+?IMSOG/NN>?YG;/WW'L3S2>N3$4+`T.IZ%5(.
|
||
MCY(C"356VM]U197$A[2BIT5.FM;)&^5?3ZLDNCVC_WZ^2F+WB=.0UKNOKZ*,D
|
||
MZ9^GDM;I$O+]LT9<DQB"11)#=&+,==K0C8EX>K,GUONTIG>R/H9!N\2>7)K[>
|
||
M3QJQ.!.=4N0-V4(B8T>-VO.E==#I'-J6V">>+G)B?GCQ6#%LT8JP$L<$8H4WK
|
||
M*/%,(!)ZJFN'_[2\Y&?%:YK<R,!P(1U=$$UGLHF"F.%<%AHQ!D.)@C6#9P:&/
|
||
M!U/]E$\FAD\M)B0>*IW3#+#-B>(U)LZI3U[_-8'>,-3M4>_)>_*>_->E13ZV+
|
||
M8&1J_A=E<Z#T/6Y#5S>U-S4UE9D/2UC$.$&4JD(^',KOM*44Q^VK]55Y#:/2F
|
||
M"/N5PF,8-89AXD?$Y?;Y5'BU$?2'#".@PY7TK%^Y9%UG5V=7S]5:VI/Q@;+Z,
|
||
M'1[-9%J)PF$.U\J$8U"XPA'VVMD(ER10'_#@CSM<9ZNJ2Z&F+Q`(>'SAL"M<S
|
||
M4^D/AX/AJE*XLJSF0LN^]B[K7;%J=6?OJC4KUB[2^9!-(/O[[^)3KGI)T./W4
|
||
M!KC"9U8&JVJJ0^')M5/(J(O43VV8-ND,F7[=[ADS&AO1)LWL)(=!_MI)D9GQ(
|
||
MA58"U3[YU8+*<SA=F$'#M<Z0O\X9-*:UMK6(J#].9VM]O;]<`FV-1EL@AK#0X
|
||
ME`@:+V#4M\1",1W:Z(^TU#<VAZ`J2EO,<M?%HD8HXG#YM=X`9S8TA$)3[:BEA
|
||
M@RQQGN#0THC#)I".T,02C86BH=,@J"_GS@XT@.-E[&F2L47>,L!'ED\TA_Y_6
|
||
MBF]X6SR;C[=W;NY4_A5+.^8=-HL=<]G&B6JBJ)M,I7@3K2Y871,B]<)]<?O4$
|
||
M5D(QC-5]7!)>46GY)8VF,;JWE#L*FH'<C#,+S`9S@73_5:!;KLN2/+1/E)&+Q
|
||
MLD"N#,I#FO):PB?EM3W@(/@=D%?J>Y`A65HU@&;0!A8!:?J+P6:P%0R#Z\#'Z
|
||
MP2X@#_8]PO)`&I$\AK4?/`_D^<:7P6'P-[968D$@M^'-`7*C7A?H`SEP*]@-6
|
||
MO@*>`=\&+X"CH!&F>!.0_T.2![>!.\%N\#B09P7E)1K8X*?GP$'P$_`"^"7X5
|
||
M+9!_LB(;`"Y0!:I!$-2!1A`#L\%BL`[T@@S(@QO![>"+X%'P-)`+V<^#%\%;3
|
||
MX!W@0W,&01.8+3N88!WH!1F0!_*HXG:P"]P%'@:/@:?`M\"+X"7P!_!78&`C<
|
||
MHPY$04PV-8`\^2D/<%X&MH`^T`^V@BO`#>!FL`/<#CX-=H.[P3W@7G`?>!`\X
|
||
M!!X!3X"G@>R%/P<.@5^!-\!?@`//[E:#R:`1=(#Y8`58"WI`"HR`Z\!VL`O<*
|
||
M#1X`3X)O@/W@Q^`E\"HX`HZ#*FRBU8(98":8!Y:`-6`3Z`=#X%IP$]@)[@3WS
|
||
M@\?`'O`=<`#\'/P:O`F.`J>7R`^F@"8P"RP`%X!N<+E7;E]$^WCE27:B:\`.%
|
||
M<`]X`GP7'`*O@;^#(,9O#"P#&\$`&`19<".X`SP(Y$T=/P-_!%1IC>$&6(DIC
|
||
M&,53:1K&<3/60C&:26V$*U'XC&,LSZ5Y-)\6T%):1LNIDU;0!;02X_I"NHA6"
|
||
M4Q>MH;48X1?3.EI/&S#.-](FVDR7T*5T&?50@I*4HC1MI6TTB-$_1%G*T1707
|
||
M7D<?IH_01^E&V(*Y=`O=BBVV'70;[8)=N(,^ASV$+]!=M!N?]]"7Z,MT']U/=
|
||
M#]!#]#`]0H_2X_15>HJ^!KOQ==I#W\36W#.X]_U9^AY]G_;1?GJ.?D`_A$7Y)
|
||
M$?V4?D$OT(OT&_H]O4JOT1OT)KU-?Z;#=`2\0P8[V,->]G$E5[/)-7P&ASC,:
|
||
M==S`DW@*1W@:--.YD9NXF<_DL[B%6SG&,[F-S^9V/H<[>!;'>3;/X;E\+I_'S
|
||
M\W@^+^#S>2$OXO?Q^WDQ+^&EO(R7<R>OX`MX):_B"_DB7LU=O(;7<C=?S.MX*
|
||
M/6_@#_!&WL2;^1*^E"_C'KZ</\B]O(43W,=)[N<4;^4!'N0ASO(5G.=1OHJOU
|
||
MY>OY(WP#?XQOXIOY%M[.G^!/\J?X=A9[6+3KIK;W,7*JJ4!L\V(PR3)#5*_M]
|
||
M.NR\1*VPOI2Z[/A5.#@"[D*(/.__V0K+QF-6,'42?MQ681R3ISADVA8%9@QQN
|
||
MAV7WDZIL?[U*H>1O4$^;^$F.7XE;_2J0HE=IR-BK_3[MS\'O,%7W5?Y7M+]*8
|
||
M^^6]WD[XJ[7_&/PN4[E)RN/#`LQ-"Z%MM<LF<XF\<R^@"R+'BLW690L4R_8X:
|
||
MRN:&QM1IN9`6[CZPT]F#-`[(2P-T^;'D5?:>R2N'!(OI2&E-G*A&UU&E*74@`
|
||
MBQT/\E=C3%;'&W9^#9):+9W'@T^LH=6\)_F]AJWY0^<W7#S/L\>MNO"?)+\[:
|
||
M\2DO)#\;;FDA>4>NS`5,?DFG=GQ^_2J_08-5ZS2JEI-PJ7MIQ[JR-J]7/<IJ_
|
||
M4SF70Y6QU`8N.CJF3-M13Y^OL-8#TCOD30Y/E?(RZ>1Y\>F51/T$>;'.+?$G`
|
||
M:_^AXU9_FJ+]!W5_C=CI=>G:");UW_IQ_76J7;8#^OAI:KT51%OUZ]8/TI5V\
|
||
M2D99W]L[IMS=R-L6A[4^DG*O(6LN90I(N<\87^ZHSO?X<A[5^9ANER-$UJ@)?
|
||
M4OFXG#&FC1K'E"NL5G?EY9QF]\E9*G_EY7A]3#EV(&\[P0'#ZI/[#6LNUWVRU
|
||
M>;P]V8-(>\$1/>8.DS77Z?AGCH\?T4O3.W7\.\B:XYB"INZZ=CT5=+V7UY-'?
|
||
M^TWM=^N^Z%?K6D^#:^FR.>T='>H<UY<MJB6=&MT!U7J<3".B;:D?.?&9I%>]Y
|
||
M5<I?HV+-'N>?HZR*^*<K?]P.'U7^<\;%[U!^7&<F>0E&1)TW2CF797/%O=IMU
|
||
MV2AQ?\9MV1EQ'W-;MD#<RSW6>!;W08\UGL2]SVOU,7'+_XA[2+OW^JPV$/=;]
|
||
M>@U1@V9H",J$(%9*KI282A>Q=:VV+FKK8K:NR=;-M'4M2B>6J<W6]=NZLVW=;
|
||
MO;:N7=4'Z[;H%IL-MH&KI>_)\R+Z>\0^(&\RE;L_CI+U_:&)K2>*]X%#X!5PK
|
||
M3-E.ENNQIA^]H]@G2-E+CYH`B_X:DG]48!EPZWI1RPFZ,'[&ZQ;B9[SN.'[&Z
|
||
MZ[KQXT%>6(UP;UE^F.1_(49@3[Q49=(XF:7&:*7I00_VJ9Y89>[$U0>7(RI#X
|
||
M1/45HK?_5/2?J\:.^`LJY#PU+DK^>:J6Q6_UTOFJ^"7_`E7_XK=R?KXJM_A-9
|
||
M*JXIZJSS*?\B96.J3;0<QK*43<[C-TOU:R#4JN]"F=]$_`JE*1(L.P9U9UII:
|
||
M5R4S`WT]R8YX^Y+U711,+NB17=Y\C_[*G"3'$+9AR9%,9)+D5ILRJ1%R%F27$
|
||
MAES6]BZYL7^+K=D"N643%_<,6`YH$80]+J41AVA<`\.YT4*<G.HOTLRD$B.#J
|
||
M?>3XT.CP(#G5;CTY)#89Z1RYMZ:PJ9#.DE=4^5QF`*%#V?X4.7.91!(G+Z2&(
|
||
M<@@CCYQ3A5=DLDGR:'V<7"IBG/@:XJO))SO4F51!RN%`'@KDE.3B.`J[R,YL%
|
||
M,CDZ0A6Y;!YU,Y+J'RCD\0<A/MF7MC14B310(9;'D9;R.=)2.&=:[DD@=WHD_
|
||
M)=M\Y)$P51:/A"N7!"J'*S]P;:JW0*XTSH:_#KG:1NZK4*LCHI:][5Y50]GD(
|
||
MH(0C9SER]8VFT](&F=25J0PY^R05U&I>RHL,9!);\])`@\BSD4;&MDGV3/3*C
|
||
M\GL:H\S*WZ+<AK*6XFZ&?K,U9.&&'G:M`S;O++C%5LA]Z*T8]UNP>)3WH\X4Z
|
||
M.X`)0FZKE(M,'JST7F?K&DL&7?P?4$L#!!0````(`"J76AS;Q)1TUS<``-Q?9
|
||
M```*````3D@R1$]3+D581>V\#7P41;8W7/TQ/3T]DP\@!$0-@T@$PY=$00A@A
|
||
M(,D`"F%(8$)`B"$D)!`2=J8G03:$P7&%F0:_<`6]NB*Z*LAU<8T:\%X("21^7
|
||
M/+B`'WSX#;KV.*BL:!)(F'[/J>Y)`NZ]=^]S]_G]WO?W/AUK^E^G3IVJ.E5UT
|
||
MZE15XZP%1YD;"4/LA!!-F\?[B/Y,AL"0#N=R-_E/'H;\W^?_V\^^-=S(0.)F`
|
||
MMF[TD4'*2)8H2</)@Z>?>Y1L$AXF@:1-)##R):*N9PY-#A*E13FY5UO7^=,K5
|
||
M9PLSDF\W>5M]1WQMIP*Q0;*7(1^<]3>)_K/M@:0'R:;3*=\IDQNLZS7">LP'E
|
||
M"!O`2,OS,>ZAW.23DON&5_D/?IR6]J/[&C\D$-GL!RKQQAX@\6D_5IN5RV$NF
|
||
M]"FC?,&=#B1MAVH\3YY]F*2<?+"A[LZ\(X,*/OCVTH/'E6\[4AM&/BAL9@\\F
|
||
M;MO[?$S*7SHO[/)/WB4E5$WS37Z4<.[T:K-O\A:2Y!Y7S\Q_BR5'!KEOKENF"
|
||
M).V2`-GKIK_%(*E?^G,OD>D@>@9$).0D0/9PH85,'3DR()#X.`G$;B-2@VRK%
|
||
M3R</-KRUBB0WFYG4[VG9^X,V*%X]2K2Q&R$\`.%^HHYGG*K92AE<>?L?IRS_8
|
||
M2@H6-[GR*#&U03F_=Q1)9GG?A\1QIFW$W3&R9>\U9-\HHGZ*?,JYNIE!!WMD3
|
||
MT-Y8LF\Z"7U$DNK);4<&!9)DZ)DJ4L_3R&J(K"'U)AJI@4@MJ1=HQ`>1^T@]M
|
||
M&;+IW0=/[]O.'!DTL`E$##F<*$/K!B;5\P!7Z]`$L$:'`D`?PJ;UD:!-YL=\<
|
||
M'6;K-.6$\GG:%_+@9-\=FMR?I@C)$Y8Q83[Y]F5,M9`<7,8H'_B;A/"IM!/R^
|
||
MM<II8$0E:8)L3M8*6'/XU60M#UZ[FNK2:4<T[4TB^UQDY(-)FUGU.ZV>(T[U@
|
||
M&PL:E'G*.=7)J;%D.:O>?YW_$.@J3!8U`7G]N7K&E9>JI;:V."*$M#@Z&;*<,
|
||
MJ`7(I'YA+CU.2H_;U)-#_8?XY[)CPGVUL=DQI1&R^8'.B%-](]E_2-`<$24I9
|
||
M.Z9M&FLG\I>8KNX>`KE+/Z19GS:RAI:P5^1=@WF7]Z&1S0_L!DKQ&*3<9%!6E
|
||
M`2674HB>?(P#0<LM:DU_$+X\8;E)O0<JR9=^3%3U&B3%JH68I%5UEGY%U`^O?
|
||
MT=EG(:WT:Z(V&4P3=:9(Z?=$_9/!-)0RG2?J'RA37Q#.4>&7B*H8^7CDH54I$
|
||
MC654KY'SAWZ8VG\YKQZ_%C/8&76!D>$#3,HK'<6HTPWF@T@I36?4<0;+'B2XO
|
||
M2G,9=0AE@0I0>41OOQ6;7+J0*8V-4>?=A'ITQH2>@MG@C%F>MOF!!F!)'6*H]
|
||
ML0&5M@TH2;<82L/(4RSDHE!7XN.C(6YM\,Y'/=,LTX$:'FUDP<CC>I95T<0B8
|
||
M/8L\Q$%[IG01HXV],T;]&OM/5\<]0)D9HQY'BI+DU(>"MU^/8@<:,KC05*V+H
|
||
M0\[LP7%YE,XQNFLL>8=,TPM<J1?HZ2YPE5Y@(1U^H`PU;3#VJ:.S.S,7>O@R<
|
||
M[<>T`2!8_;&O*P_Z7*TS018UZX:"Q>_@Z/>?<VYV['&J-3!(68/"EJYAM"I>(
|
||
M_1HTRP<<$="6`-,E/FQ!`<=N`,YZAH2)P3Y1O9,MK6'4I;3C)/6SOOB.6\ZHU
|
||
M![%+2]<QZ@Q,VNPXY"Q]@E$OC$#U0D1]6`,R2.]5^A3T/\W.J,E"E!?ZO!\J[
|
||
MI?0U1C5W23C"J*]V2<CNDG"44<\FZA*^-D5Y8?9]-!(E?,NHAQ.C5(95*[LD^
|
||
MV'0)<J]2GE6?-23L0`FEUU)V];,;<=S=&4/S@L7U4XG7LZJG2^(X5KV^2^*^G
|
||
M2%3B!%:=;4AT4HES=(D*E3@SABK0E:=4\<L9E_H&`:K2[M>6>FTN]0XHA1T!)
|
||
M*V>[\D4S`>.]2-?V<%?>9L>'B<ZDTEUD[U"B'A%26Y?3[JHB>G?Y:R-+O7%(*
|
||
MZ1B!,G@"Q.4L$G)UEDY_;:?!<G*$7@P0%4<D76E/;0U+RF(^R&R<^N$TA^+H(
|
||
M3'%$3!$MK7EMR%\K$"^HX4,GYJS!!G>-(AZ:D<WO6TI26U,UQ2&`/#"G$XARV
|
||
MRG>[))O2JB(U,?5+2?@ZI;93:9ZN',6$"5Y.^7B:(ZVVTWM":0P30YKJ[K,<L
|
||
M3?!]_=`BV-1-?:@.82BO0DII+JNV)R")!=(B2GJ,5;\Q2!GJG92TE56/4Q(''
|
||
M7.,HZ4E6/6"0,M0;*>EI5MU-23QP]:*D[:SZA$'*4".)2'J.51^@)!-PA2GI&
|
||
M!>A_@Y2AGJ2DG:QZ#R4)P'68DG:SZBR#E*'^F9+^Q*H3*,D,7,]0TI]9]2:#E
|
||
ME*%NHJ37636!DD3@NI>2ZEF5H20+D$HHZ2*K_M!')V6HN934R:J?4)($7.F4$
|
||
MI+'JVP8I0QU!22RGODY)5N`:0$DF3MUAD#)4,R6)G/H0)=F`Z^>^2+)R:HU!E
|
||
MRE"_HJ183BVCI!C@>I^2>G&JBY+BU+_TTA7>3WV-)N5P:EH?7;M)ZG9*6LFIK
|
||
M0_OHJDQ2-U.2EU/[]M$U<KVZAI)J.94UVBJJRRAI$Z?^V%MOF*C.I:1#G/II0
|
||
M;[T5HCJ%DBYSZCN]]2J+ZDA*&L6K;R")SJG2\3PUI@F#,.EW>L1,(\?TR"4[>
|
||
MG?$F&OF>1LKTR)<T\KH>^8!&&(%&FFEDEA[92R/';:7;]/A.B`M@2TH;]?@3E
|
||
M-'Y.CVRBS./,-+(.(T8U=<I*FCQ1C]Q#(QOT2"Y&M"JA-*#',U"J5B66_EF/9
|
||
MI^IQOO0+/3Z8EIH@TDAB5T'^R?>(=J\)37P?)>D>\=A9Q<$'-N3$:,(]8FH#C
|
||
MY:G+&-.@N'AP;2W*8B$0!\L#[U2_($;B'@82E6P!TGD]Z1`D46NG5(G65F]2)
|
||
M.%:+O4?4Q6M;<V*P4.(-JX-^T1*76M1=OZ@W_T+M31_@%K7$$HN66&I!NS/A$
|
||
ME_S%BQH%].A2&YS4%+V@T7*AQDX@(>4QH``T*.KOM":$%-^K&?7@K:TU??V1Y
|
||
M^;7<_CP2&'M:"M[_J;1-.1^.:?O<'QF\+M0BG)8T+3#V,5*O:5`F2XR,+O7?]
|
||
M-*4Y2JDGF6`PCPQZ=(B/&$;Z!E>>H-1*269EL>CON+%ZOJ^#=><J#IN2'6M]$
|
||
M9VTO'[1,MC:;1DQK.]5VTG^*;*[Z_&S<(RG'VRX\TG9A8X+CK"7\-XP!A-7M-
|
||
ME\W9G[>=XM[OS`[RPR4/ST\(<ZR#WW7FQSUDEUEQ2`6+E6\6-=H,G<`0`!W4-
|
||
M2\2Y!_XK=*K+M46-/"9"/8^=7?_B;DF[7#<UZ$!#KV2+B@L[B@V;G.K7D2<6H
|
||
M1;L)R*![;O^C,2#->AQ&Q%AKF%4:G2XU-B8_'Y?O^@E6B$DWY>=3==!.`?\!#
|
||
MES1H/^^"RO@G:9"3)6$.>H`Q*5#('S3E_&9'!'+67<[/AY7RA-*LMX!6TI67J
|
||
M=+B*/U0K=AX+7?ACGW<N/#\05K]&L:L!;1MV2RR1A7H3<89[U]UQ92M@L"5%S
|
||
MC'ZXV94'_CPZ]9<("5^CU-I:'9I=-A^:Y'?8^"9E4I(9`-LD="I5TF[8BRV>7
|
||
M.$1>M&VKYK@$\T9S\5"[FN1M5FWU&-^_IUL9;\H6Z9/5_7T'$/?JR;7NKZ%LT
|
||
M#F*YFDO(S]>R+X7WI+7(NX'BC%)"4[C09*[%T:IIS0Z-[-X6J)*V6K6::X)/&
|
||
MIUO':/Z.OE5<R,(=.SM2>S'<>VNH6@O%<;YLC0E_Z/]Q](;:5N!]%WJU[5O&Z
|
||
MT1IN@!0QO`]^^7`=_++A5WPEVA?AEP#;PSL4QZ64X]!81G:&?[]?)&';?HF$Q
|
||
MS?OC29A-;6UK`0?1XM?FRSP*V.QH!R_PDE-QM`[1UCE=V"HZAM35X'_'^FO;S
|
||
M26U_%`8^@Z-3?3/R,D1XF7WTY5!SI(8+E;*A.:Q*2*B$[=G@]26MVCHD>]F<>
|
||
MB1/DOM:&6EO/]`6;/@E?B^GSV(60%I^3VS-UX0):8KPZ/0*%/OHR[3EVR\NA(
|
||
MW$CH+!.M<KVV;K"CU=E=X^6P1MAHC6\/.K1M.QGB':::4`2MLZF>)^$8@")`E
|
||
M$971X,Q3QT,F/G3ILGIKG]#/E]61?6J>"FUAL&J/,;06@MIX&430%LG#*(G9'
|
||
M!?TO&`/`#/7O+36LMFRA8V-+K4G+;EUW0NAJD!E:1+-Q,&7!,]>Q6GY9J6JUP
|
||
MMJ[E]C-$'G"EP)I$HYSL=7_5V:$&H7F70]^0E(;.1//FVH_WQI,++^^&?O]Q5
|
||
MXF*O";HR?G<="1Y5VE_E/OAQKYFYX=WCWX@K/MX]D<C)$Q?)0R:.\'XU(:'Z@
|
||
M,Q]$3NZ^N5'^ACUZ]+#_!`&FR-O>G\,?P>8*AB5M)]3,J&5S9W:-\ZK*S7Y<6
|
||
M^1Q*^0%+>>_X-_<O__CQ+;((&>)E,1Q'WQ::_="N\,$K]>!(JVI=JR?"WKD3@
|
||
M%;*NDQ)M.A$H0(<\8'?U;."P,O[%G02,76<(3D-ZS+S:/CWT+G^3[S_(:5_)R
|
||
M[?GA`RG']_($^J$F*V=.=X[\!9#GML@[-;<$5=_WH]TW^RY+[GZ^[WNY[;[+.
|
||
M@EOR?6]W)P+R]/(=EHZ=T?_8C\)OI#3X+O*RH!>0'RK0J,UJFM\;_Z;&S8B;T
|
||
M'3>HUY:X+7%/QQ7&%\55QI7%/1AW.+Z@U_JX;7$7XKQQOXW+]85'NV_P=5BJT
|
||
M>OLZ;JXV^<+F,.<+WX04ZX13'G-F9ON;,"@77M3ME^#*0U,1M6$,T=5B&*;2`
|
||
M;5M:FWQ>\4"1V,HPWK-;M&Q;S8*)*;(9^CDQXM`P?N<566Y+:54B2K9T=I;_5
|
||
MXHW5(WT76?>PB:.]*WP7X[U+D7U,-_O$U?*<B?/E66$/%*UI81.UHCVF:&=*K
|
||
MPQ.A%V&.D(FC6QP2G+0-1A$_=HL`JDA`#C]QOG<$1,#Z](/2MZB_1+:X]SP>_
|
||
MEAYO*Y&X\WTN>8=CSIG=.2G77R);/)^%;WZ\[:NM&]YM.\.U]3FXM??'WFG(:
|
||
M:[^*]SG@_;AGY903C_MJ-3@$;#L-2^QIHM3&*HL[F>N5VGAE\:7`]>%$&%W[H
|
||
MM'6L0X/3,O]Q5#`L4R?U7MUG(FF)NR1/BG+ZV-D66'`(44[#\>+9Y@T5%DUIA
|
||
M_.!+TW*+<OJ#LX$-JRU3D=7]T?8*RS:G>JXM'S?,ZY/++=KE>L(ZVX1R"V%E0
|
||
MZE"AN4&_9+G%J5H&^@^)VVLQ3WTT3TU7GAH]#]N=9PWD^2@)\O3P=:BS,Z0=[
|
||
MB+KG-45WR@RG*[%M45.P665)L/'#^`>^!/#`E_S#-R6DW[1+/_EZG.`"^0,.>
|
||
MKG-.^/D.5DE'WEY-&]/PTRMMQV84-(W=:)H6R3[G'94[)P?.'I9K*>WXZ\RCD
|
||
MNI>@UC`LOF-T`4SM#YOW+]?,"_(7PI**,`"[/?BO2L#%M3<LKKT,@>M^4'=K]
|
||
MX5#H(RY0=7XW)'P+K*GO!+)_"F1'-F;_TN)HUS2Z5H:9W6.^AOWB25_8[NNX;
|
||
MQ],G^,P[5G]'/U@L-^J+I7U`J);S72;5[?[L"!,^BO![@&SX,,(SOMI?4F1N1
|
||
MH^N7\.O^DL@781[2[*^;PB]BZJPV1X2%-0)HXNM,>$LHE0//9:QB\CMXUG>9K
|
||
M]?2V-MPKP`@">0%'^^M<J%+S7>:])P*.ULCAT!*,>-Y]G=<<K:%YVJ/#1V^#>
|
||
M3-77O,YN<+3#A#MV[$OEZ+$OCWW)-3*.]E`JS?LO&QRMX/:\WC.M-=1/@S+B<
|
||
M0\7:^NP(8:"F/X;RM3?%L/2F!"'^M1![NMGQ"]GHZD@]OM%U2:]E./Y-J1DLV
|
||
M`U!UPA/3I@6J!&A4/)%-8Y6^$*WE-]>^!3T5`TZ<Q5_;2KSF4&D$"N-SG'G!G
|
||
MEFW.("RDN6KF+XEFQ=5J/;Z6"_U$0I>Q)!"UN78?.%ACM7$9&8'%/`B&<ZOXO
|
||
ML4H_&DTTJT]?WC-A5Z)Y@?K8Y;'-)@*5(5#WCLW9^U(N;O@+"$P[MHY5CH6>E
|
||
M@85%Z*HF:A>7L+?&?#TV8()S_E!C=SHMQ!LS5IF$;$EFJQ:VCD6?C><W-5A;!
|
||
MO*8D\X%&JSKO<EIV:Q6G9+>&?M>=&:+@8G-[!9(W9_/BMW)S8*H,!F\3CC=V;
|
||
M$D:VP*H/@J0P>'Z\6"_`"7&JE=8$2A6)W%]QM5N/U_92VSJ3?9-&>)D9*<=JH
|
||
MN8#K)XS)UJ#C%QC)";.3-YK\M3^16LDH3LO^23W<J;3A:%_<#IXI%#G)!-N7/
|
||
M8$F'K[/2&X/<ZV"N_`16X%I?YVK9Y.N<[^T%O9!^UUW^BI_8M9A(")?]DSXB)
|
||
M;6%ACUVM[;PK[=2Z5B"EPXYASVAU96?0T:$NZU1</T$U;TIY-^5T<I"?.$(67
|
||
M)]K!SJ9XS<F[U>F=,^[:\.Y9,_!/ZCQS$6#OE%/)NZ-SCU-'=YXY;_VDUJ*\_
|
||
M!V4,`);0@LX`]=EUW5N[=!\V&YJO=Y*;'><XQP_)`9,^O,S3IB6WF,!)NA9F#
|
||
M^'EH^9XAZOL=,-.][;[:<\ZUL._N,/MKOX.!"*8VS"F.'W0W7R0;$]V)_YZX`
|
||
M-C&<V)XXMM^D?E/[O9"XHM^,?K/ZS>EWN)^[?]_^M_6ON^8\_=N6^(=$L%;;4
|
||
M;[75$3!O=[9]YWQVG&T!UP@>_YU<(TRBQ/$V8^]`-Q_;QP(GG'DEP8G4V06'^
|
||
M:J7#54)G6IM'4@Y.A\EVGFN_#&=DQ,M?^&,X;=]I;E/#ID_2FN1>E\X=?=O=!
|
||
M`3^>CC]VG/E;>&`/PK]V*">[8TK3RQUGONH<J#='TG<MH#SP0=4'!N0KY]-Q7
|
||
M$Y:GKNN#!\(M7+-Q?`<;:>7#]=\1-JW18W[N*0)FVM(B/$9$W&%V<;@$3G@*=
|
||
M5R3E;9BQ\>L/$M8MI?TOC[`!R%=GP`7@>2T_FOF)'*?ZII:?;VR`6/6H]57Q9
|
||
M`Y7J8X_@5`]:8;9'G-M'VN@;-HAJ+PD7/$C</MSFW#["1A.WC[+1Q)\MP<3A7
|
||
MMN#8$;8Z]DVBOL^@W.VC;3>N"KIXWYF'I,8=HVV+HL2'@/@J?_R,[\RZ[H2@?
|
||
M@Z?0%SO:)C;YDD?;VIJVWV(#FEY'$;>+HE(K-#LZB&JWTKJJ_;OJW1DZ293/N
|
||
M'4'S1D=''1EA)LI)?X=0/9+:_IG7U\7N,:MCF7`55+^.I#DB:\NU[$AX&8V"M
|
||
MI/`B\!3"\[??!E$P@B/]D]-L1+XI"/6`F00F'<\]P3ITICO5K9=SG(FXM<#E1
|
||
M57WE<C@IZ(H$JSIIVX^38!+-4V=Y$V\FU8/@CD5`67JIL=$"G[W9QC@Z08%(5
|
||
M[UQ[W=_3+%SD/2FBD](RFUX*)&D]"BHC6`C1!Y=`5EPG7_?H=9LA/'J=_SI</
|
||
M^V^ZSCCGV.R`+KVU/;IEY\,)AQ:#2PTW9V;0V`2SC(Z`Z)M(O-]"B^@.O:[W7
|
||
M:_&JF02;^/-UI&E>TIR]</MX*M_7262+KS-.=AV)#R^?R'D'U),!1^(G#@`[N
|
||
ME;R!1.J8O6;A2#S<J(4_GYCN/?U:?%WO(_&^CGAY4GWO7F,^@232^S4[OO1L_
|
||
MR;[8#82!;`2RA?L#C?/V=JKK-*EA/I0T^7[27V;WI`]<U%07IU9K3C6!Y->)9
|
||
MT/H5FN_K=1N3;[%M3-9'"(Z?,3;@FJ-M3+[5-D$88Y-';`<*4>_0@#Q!@V1,F
|
||
M\4T>8X-"Z'5J,BVAUM0,W.DTH:H/OM(]E,W<Y8[MN(T2TF5^SS5AJYYW^_TDE
|
||
MTK`CU>`<6$_.[_M.<^;43[(YU<?P.L0&>V!T?:(RQNJL0"![X*"#U#\WWM8BD
|
||
MC+,1LH?L&&';,=P&UHO7=HRT;4_%]RB;,3_C-SO.P^V3.1^F+@P$VR38!O:9Q
|
||
M!(<;8\+@F($EIJY_^"Y?;5N*UQ:]H(1]ZWB*?;6M9N_0>AL))X<'T0CR6)$'G
|
||
M:'T!"X1FQ7'P2;T99U.P(A+,[JQC5#9"'=U,6YC;-\.VUT2,2]2]-Y%]V;:Z)
|
||
M]".#0G\ZHUN18+;@.ZBQL2-@^/.\MM&AP8@F#FT"4-R#)L2.LE5?"[OM"<)PB
|
||
MF[OW!&&DK=H6=&G!O]'A_.1E+*?K9`A6:#"-^AF#I(XR@1ZQ=B,4AYC2DHX3_
|
||
M=D"25F7+<ZF62SE.O''Z"P]3]-B7C,,&FT2I]BO0NNZD=\NT86X'C]E!>O@:;
|
||
M#0_IWKF8XTRBEUZ;=0E<.Q5PIJ<`Q276908=`CU$PAM\&SUVY.$^0D`?^GAX-
|
||
M4?<-!ZZ0$LJ&VN>I'NRRP5!7K2I6+U]QV;BC.4I+2K/BB@6D.GFC>;G*QX':4
|
||
M"+U<3JN*72LI)P)5&-4TY5)X&,CHD:G716PWGZ>*`(R&.=5W.*X6[V@X1V=:F
|
||
MB_=(5QN@6C\K=PO^,.^.34M:;9--ZE0X;5,YO/`?GU1EDP<KU6PKS\A"8.QJU
|
||
M6]B>-A9H,<KGZERB3&.?`Q)$4AN>J[(!?FZ-+5>=>W%ADQ:7AGG[0UZ%?PE.Z
|
||
M?CAS@%?NX#H"7E;Y'.2/(1A33"\Q,M/$F)4V[GS@;E;Y0EDGP*5^;&#R&IM2A
|
||
MS0>\?*!&:&H1UL!D:%+&KK%96^5XI48(W"T$%O&!=4*@FF\*)*VQ!0KX0(&@3
|
||
M-R=3`,WFF$S$/79(1)LD$@^';MOD*K#<`Q5@MGX"+?A@O-DS0"D0TDY[?U%+J
|
||
M2'B0&H0+)O4ZV&2"QOLHY_W-XOAQGA"8%,VL-)EXU`C=-:F/M2]<.`3FFB7U?
|
||
M."R8#T!LOC/UDURG^EN`DS1-3E!.!J#]\"V$;7YZP.QOXI6FIH6I#4TZVUR#+
|
||
M+5$Y^>QJ6V`:>R7C?&`<9E8N<..4"->>'N!!,Z`W?S.O-,-'&+G..4ZUK[90V
|
||
M.0G-')AD[H1+OJJ(8H-TES]DPF-/7`)OC"Q4%L-EHM"D-/H;Q;1CU;<IQ["+A
|
||
MO7%PPF_FFJ`B.]L6+@PG*1U<>V`1FW)T6#_HAY\"->S40%_E/>4+=5Q$.05U`
|
||
M`K72TU,1#HNAS'&@OQ$P8I2X&<I1?Z/)?R;BOR1ZN'TB27O7;:LV09:PJ&X`&
|
||
MITV=K2E-X1CX."$2%G+5AR^G-BQ<!'K4DN^S:<GW0W@`PD:;/A?!C!U3E;>IZ
|
||
MK^94#J8>7]AV(7@2SJ02;[6]0=J^"QZ[^>A&L`QGP5KT./#5CXN5A+2^,JRMI
|
||
M=:Q:<C'0-](X`7*Y^4CSGTD@`8^`#1?/1JV(VHK[L8#C$ARKIPGC;5W6.$`WM
|
||
M5S8Z+R6U1$.;X!"O8OD96`KT4T,U`U@ZPW/\M3\3&5;_3GJPJ!9K4!-1_;0=.
|
||
M;@0D6%:3E7%^A\#B_DF^%H^O*=<=<!$0_!2\`6"VJ']J1U8I.0"L$DL7=^]+_
|
||
ML*&@;7JTO8>["(YLU".Y1O=(>NL5UNN4H][R2SC^2@JK=;N:BR7=9=*=XK=A5
|
||
M58'7T;13U=>F7:SNE_;%NCYI/U7'C7?QU5):%;\NVNZN<W3C?#\X<K3M57M8C
|
||
M",#08Z>FN?C:7Z+'^.O/;2=&#<$_N9FAE82/"NR,KQ9L"1?JQT0<MHA#BCC$M
|
||
MB$/PU<8*0-P(KHL$71]TV.BO0']%^@OT="-!W7T)3FDW/W"/UL73DY^R'+GH4
|
||
M/R09++8N,>H4[8ILXM79OL-LH2WDBO(HQ_2>-8FR#^Y1D9X5[\&2^?<K4A^YD
|
||
M(ILA.21KP<G@)9;$PDH9K)""V;9@E1!TB>J6UJX[&G35DESUPVU)SKU6HDK?K
|
||
M!OE(PT8^F,G`*Y,)9K+X9H.9'+XY-9%LS+2H`^%7@GU$'0>+:E:KTMBD7M!P#
|
||
M:@V'J972F-ZD?JWI/G,P<81!PI&6+=9EX`)'3X:X1W!1N_RUL?;Q].3*0K?!=
|
||
MZM?AN.[3KAQ80/1=1-UD>KWEMD63],.EO5]W+\#@:)C(_GT6O/J/I`EP;G:CY
|
||
MKX8G-7$N=0?!&Q[3@;^=##/3_,WQ^+&4SN/^U*JMI3M#F"D]%G18JWF:+F"UU
|
||
MP@N[[GRBAV@SHS=N[LFMC3[O;?7,U-1WE&,0'YGCK&>-",SI@"NR(-]]33V9=
|
||
M"FF]TUP1MZ7:!#XYW!*]J3?BY[-&L=2D[->T\6MCO07^M7`]=YU_$EEKR5-=*
|
||
MV`#O76U9+`];7LTKJIO:\WUKH7768!8/AW>O1V##UY+%@FN6)<`/[(B;LWC-$
|
||
MOQ8F=0(]HP-_<=?73G71N?R6+%@&E>AVD!9JA?LQ]7T2+H&B]8WR8BBY9A@4E
|
||
M"#>BDM("R^#X+,GK0,%=L=N5+#&0)85'AT<J60)G2E?.#[O-J1.=>KU@/3DD<
|
||
MI#7+,2")L%[!/XN-#S]#C8!>>.IQ*#[,;>P[S7])DI.U;*%V$"P16EP-K-R2O
|
||
M-DT*\G5P9P3V1]W&Y2M'8<'S'O=?TKR6M%J>>C4)<.`#.>"#(S@.0`+L\?FN/
|
||
M3U7T@0&5AJ\G]R^WA'NW9;(<D447F+)\&`<P&G03^2V,B*L\NBI1SPK[OKC@F
|
||
MP8ENK[B/(0>@\^V^B]5>TSZ6@WW-Q4)OS#[6`IP^<@!.2K$&94&;PW<Q18[S@
|
||
MP5G(0-]%&38P%Y=X^P+-RP9M_C.=_G=YS,$<X`@DPZGKNR0]?#TR(?2%XY[]Q
|
||
M4!I"&JQ'E<:=Q"=S_K^DMP@EEMGC\*:['_J)CDC`;`S9Z)TG#W,:++6@+PR=F
|
||
ML"O3`IGX%9`=)\+:F^";/,AF=?!X5:6^"M=JPL9,7FI8&].<R6LMF2R=5E.",
|
||
MF=AS.[^B<V;]3.@W>AH,R5<>(+O4]T0X]`4N,WPJ=#D_W-B224>6<;[B`GW3;
|
||
M&=CGV5T2'%O3T^J/0>%IC=7?T@34%0O\](.;OVC*4<-1C<D!UQ,:@E?E-QKWK
|
||
MZO6W.'7B9H<(5_FA15W?+?DG$O!EYPI<PE3P8ZT*_T1J8THCG-:V0YW3B7>X/
|
||
M,E-"GNO#EAGPQ<\=DI>9IC3>"66=#\<KIZ9<04&51F_943CXVB[U1"?5!<Z+U
|
||
M:7Z\#P1QM5:76J,],<PA7.,2UR]E"R(M/#0^4PQD2GGZ<JDKTOH5*`E'K(1CK
|
||
M5[<U71-`[S1>YWQ9S0=K@9]&`;<)7;OKL=XQ+K6/]@1LYWNY(F$H5<!2.Z]Q2
|
||
M113XS]%I..`'$@B.[SY*)CN$<),(YS6YU*3._*X!_M>"Q=$MNMZ7G/HV%"'HH
|
||
M57;J5>@#'[X)`=@PU(K^I>P7T!=)4`5O+$I=%XFQ$QA081%;ZI_)QE_U28(&C
|
||
M^QV>Y"]>U/UQ@U<`GM!6@@J+T6S*W9*6*07-(3]2:N9"1>(9[RQX@1_L@+'FP
|
||
M(_X:L'OP[5FN!BH_$FX(OQ.M[0`-3T3JM\<8=5V&7Q%"PP;K4<>E?-RY"EBQ^
|
||
M<*!GA4-K--_D[3$Q7C,=$/(KV+3MVV/JX#2BB5Z#9&OY7;90:0-SE.#08I=;X
|
||
M:F*5)-D"G_I:@F:P0B+E[:7I9D@V@<7R?H1])::UT7';JYDG>--B&"*ZI!CC;
|
||
M%#[#H)M.6`F/A3HO_-'#/-]MIN",L&YBCV\'SGS6_:U$RCLIQW$?;.BY>P\H2
|
||
MMC63!J]H&(KSQD<GC[3GYX.S"6F,O'KPY(_!=N_T,5XS/4P*?@9GCIIWL'_RI
|
||
M:8F5)0V^-U&K/@M]3]I:?(;M!#[<_MI``"^/@_-69_C3MN;S1,;M+,Y'<,7A<
|
||
M3@&.YU\G>>I2N.+L3:=E1!VK)Y3#[:T+:_(T@2\R\/IA`;W>[O<WK%CG3B@H^
|
||
M:?W[Q`X%^.2D(1J!/J)'77GJS^>A0\,2I+`R[#PC$3CBQ2MIVI@$6HM8^@D-"
|
||
MBG^I#7M?JQD%J1S,31*/TTKY>/T9K=UZ-$?/JC>),`O`D'YQ[&Q@ZV[IBF6>S
|
||
MA8^$LH6V@W#4+>UAVP[RQ,ONP0/>5\_?D"U(!^LF09<,H,Z[,$2KCR$^V`R!,
|
||
M''`$P))B5XW[-+IX0Z=H-A=X7#`63=#V[N55P-.C'3'P%<K:"9I)621I6=)&"
|
||
ML[ZV<J%?B&_RCAA)EO`5`_[KUZ#8XG9<\#DX=<3Y<X*$_D*`_V&X-8$7U%9?(
|
||
M2,^NG\7"+0UZ"EFP7LO@*0RG&=^%];CM9,`H:_N.F.[B'C"*,]/BO*OSU(MX`
|
||
M\2=7AG\?7H&+-IQEGZ2>CBCW@:L_NE?5%_,IGX(EH[F]`T$<F-;^=$;6V`R&(
|
||
M9W%&PB0TZ#MB#'K`H,N2[@9PH3LTJ%1=](M2O%;$/GT_TGUHK,]%_(@S0JLNA
|
||
M#PL/R$//P"$&S2!S!_!2@YK:$)K'`".X#M#R3T-9C%XW+O0%0=4`V$9`'VD.J
|
||
MP3/;T))`[SH/_^?-S?D$FDN_Z!!U0B./SHQ#<'.A+TEX0^@3HI@XAU!S+4CU:
|
||
M2M!1*5E"P!2VY:DOM.;3+<L23<\/QE]MZ\!S>,P`_>(0F"PI]"3YSVMP]/15[
|
||
M-4@W:N`I#)FU\-VTYR>%1VFFM0EZ5X//@@KB-Z*]BNO2EU.]^[*N+B[T?J1+N
|
||
M62UX2-4M_7/6D,Z%=D:B[E"W<Y$7]8DEZJI/.@7W[K"I38>C0G?,%0XR=,DFL
|
||
MTOTYS+NG<5&!$^ZK.-.])IQ%2Y1L/#`#"QE1/N_<#>>V(R;&R*9=9WX.7W?F9
|
||
MO)"+8VFSXS(=(>M0U$(SW#]=WI76X67#3X3ME*'MU+4-SCG(\B^G0&GZ1V8/8
|
||
M8746IG1L[9KR>%B-WZ6!(:]_YS9G_6]'.-7Y(%/J=B=@Q1\OQWKA"$YDUPGK\
|
||
M-6U=%5W$GH>S'Q]L/V/71]98O&*+X+/AUXG^R;5`M*V/++=XA1:A%HBPM,EQ(
|
||
MT<MQE_H:6"H15A[JNLNB>NQ</BQ`%UHR!726P)<.T!48RY,G6[6J"2W"4HMW9
|
||
M'#T"[)^G_N9[L)L"M0;5&BQNX"V'*NCGS9D2YJP1("?CY2%)[.%8PYTW#RH]9
|
||
M,:8!KM)_>F6S5P-#1&';,;@4;6MKAOG(/C\##WI@,7JT*^,F^+=(G6!)3P*_-
|
||
MTF9D;SL&G5/%7W@AF*D%%VDI33T6MLZK&&OY"SW6-BH/:*D-G93AD;:CTPMZQ
|
||
M%F7DQG.A]WYZ)>44\&YX#R2\=V%7MQ07?LM9)<!B*]^*/A%UHX;C.J[Q"@^FG
|
||
M!;[JFBF!>Q%LW&B<1=K1C+-,%,@"\&%QO_T&8CB9[_IDWN&LN_^1B,A3&6'
|
||
M/3A\CQ%<+XQ9&1>=E7GJY!,XN+[H&L"Q,,I=>>I+\$V[``L?INB?-@:JX$Q(G
|
||
MQ*5T%MP$P<<>\/$/WAY=GBAY^68^Q@$C>",/_YACM:9\G')T_24?J;DIY;P+D
|
||
MREB(PN`@I5GN31U!;.HD>@0;"=^R^8W5&KTXW(E94\XKS=:&JD$NC$!6>U?6^
|
||
M6%358<C%-:8TXY9([#YMCDY`)OK]XL"Z])[?+\8YNZ=/_'Q<Y>9\A"YFJ@8>5
|
||
M)FK-DZCOHL##G/8W]#"G45U^1_\5V`&>.J+Q72Q/_"U_-O#`'O,<,%SY;_2FT
|
||
M5KK+"RN6VC-24NPC[!F5J^YUERTKE>VWC!]_BSV:.*-"+A])LKWEY?95E645I
|
||
M<K';7NCQE"VK6%E<(<=(F65594N+[<5N=Z4[1IJRI*+2O;(06-V5R]R%*^W`6
|
||
MOK*LHE`NJZR(D?ZQ?SGX?,SS,3WC=O*//6[X<[HKBXH]GN*E=C)D*;%7>F5[^
|
||
M98F."XN**KT5LH=D>-UNJ'KYO?:BTN*B%645RX#!8[_R(=G%U5U9)J"$J](S?
|
||
M2@LKED$YO^:!:@SQ$`E$#BVB3,.ZXA7%U<,@&3Z4RJ**K"Q?:E\%VJRN="^U>
|
||
MEY25%Z,4X)4<@.U+*XL]]HI*V5Z\NLPC#S+R@(S_=AYW\8C2PJ(5!KM>R^X\*
|
||
MA>7NXL*E]^I9/(-(M9'+(Q?*/;/\5[E&_0\?\H_]]W^LD/^A8&>T4ZAZYJU:O
|
||
M6HA*K!HS<C3)SLJ;/B7C+E)2Z;9GSLZUDR7WVN^L+*VP9Q87NXO)W-(R3_>,&
|
||
M*5P!72A75U[9RQX[3L:2LHJE'CH$($:*KAJ#(^WV&;)=+BVNL"\KKBAV0P4@J
|
||
MVZ]'#"FJK)`+RRIPZ%=6P$2`+)[B+C'#[7*EW5-856R7RU86VZM!'BER%]*IT
|
||
M,O)_K*?N1P)9]G_*\Q_*^H_[Y+\OJ_LQNM/^OU^O[B<Z)/X9LO[G^HH^5XS/-
|
||
M?T36/^LATG_5B=F%*\$@H1WZ-6>.8>>N8/SG5@^-]S]5WG\TQF#23NE:6X8LC
|
||
M_0\9HPO1/\0\MU*&Q3G*:N]:+O5,_\RIC0MW]!F$SZ\KPZ1?^;!=CT%(H`__X
|
||
M=QX]O3]]Q+_S8.H_ZC?\GWOZVO"/$`O;35L._QA=8KO__Q9K(`XM[HH'(9X!+
|
||
MOEOT>1+B4V'W$GUV0?S_7T\"8>YAX8_?SF[_+UC3-8V^^[`L;Q)@'"3T-?71Y
|
||
M$DV]6*WG8S)I5SUQVF`6?N#IHVDL:XIC=:@_@_6?/AJ9.\M)1MYXXXV$=AI]5
|
||
M&'S87SV4Q.$/3^.FKJ>;QRSUE6P6EK6R";&4(+)L;Y:-AS]\!+,DT?08ME<L-
|
||
M-"G.2*</B1]:`3[Y,-!/`I/0%R<*2Q(X/L'255!"]Q/7+TZ$ESDAL8L4TYT:;
|
||
M+\7%Q8E20H*0T-L:FY#0*\'6G?[K_Q<+0S)FSW).F4-6N6$_8/<4%5:4V"?8Y
|
||
M2\HKP<\'EX)N$W!A6UDHZ\YH>5G%BN*E71L`W;W?-?!/](^P!Q,@&C\\B?S?J
|
||
MY_^U3T=./+?%3,BG)`L6K6_(:W1<))*+\,:_H]-Z_I][[%?DG4.&Q5\M#_GN`
|
||
MQA\T?94(T.9M18#&[AP"N.XDJS$=SFK(9@10`?(0`I&,)X\`Z&\AD\A+""0RX
|
||
MA;P`.?I;R>VD'H&-3"7?(H@A=Y"AD+5_+)E,YB&((^GD'()X,I%,$`'T(FED,
|
||
M)PS0_KW)!.*T`N@#Q<#E/!H@0CY#T!?")2MM]FA2!(:=],-])X+^$.Y'<`V$F
|
||
M1Q$,@/`'!-=".('@.@@A!->C'`0XXJMQ-@R$\%B,H;A_1S`(0CN"&\@0,CX62
|
||
MP&`(\Q"@];D/P1#<PV,UDR'02703A,58S:$09`1@(,@.!#=#<&*E4B!X$0R'0
|
||
M\"."$=A(K.9("&,1C(*P#,%H"!X$MP#-CV`,</T902H(^`3!K1#.([@-@@5;2
|
||
M.18%(AB'BD!P.[8-P7BL)8()4*,%J(DT""\AF(AU0I5,@C`CB?[/HE+(8-3-(
|
||
M'5#'=Q"D0^B-2IH"H03!5`@O(LB`\#Z"3`@K4']96,P-\..`\`CJ#P?I&033#
|
||
M(?P5P0P(WR&X$\(/".["CD'5SH2P`,$L"`<09&-WHHYGX^A%X,1JW$3'.&@5E
|
||
M00Z$C0AR(3R'8"Z$=Q#,`RU^B\"%JL$NR@,-O8)@/G8P]E4^*&\[@@7$Z+2%*
|
||
M.!T0W`W!A[VW"#3],H+%H/MW$12@UK`_[X'P+()"]#6P8Y=`^"V"HBA8BB,&R
|
||
MN[H8^G`4@A*L,X)E$(XC*$4EC(:?,E0F@N4XZA"L0(7?`C_E$.H1K$0]IL)/P
|
||
M!8R.7C@<*G$,(5@%X2*"W\!('',;/:892@H1>&"T^A'(,'Z?1N!%12&HBH)JE
|
||
M"+UP-*W&Z8>CZ5[4/H(UF`'!;PGUHSA20V4!6$LS`*@%4(-@':H.@0_G*8+UI
|
||
M`!Y`<!^V'8$?O2\$]P/8A.!W`!Y$\`"`AQ%LP-F-8&,4!*(@"&`+`@7G,H)-D
|
||
M`!Y'L!G].`0/`G@*P4-H'!`\C-,3P2,`7D#P*/:B"&`+=AZ"Q[#/+`!^CUV%5
|
||
MX''L(01;J4<)8!LNJ!*`)P#L1O`D@`\1_`N`CQ$\!>`D@J<!G$;P!P"?(G@&"
|
||
M0(,5P'8<=#8`S^)D1+`#IRB"Y[!C$#R/ZD7P1]0[@A=P;"!XD9I!`"_!='P<S
|
||
MP4Z8CL<1[(+I&!L#X&4P<G<BV`U@)H)_!9"-X!4`3@1_PHF$8`_1'].K4?!G!
|
||
M^$';:7H-H_$`WH`5HQ,</_C4F"<1!/4`<,W@]P+`-8/?!Q9Z.GQ.PKX%%GH5L
|
||
M@G\#"[T-P;^#A=Z-8#]8Z`8$!\!"=R)H``N]!P4>!`N-RY+T'M0P<@7E`!CF%
|
||
M0TCY7T:A0#&2CD1+1PHFV;IX?LW\/MCU#U'.7Z+-.1)MSM%H<X[U%,A?(:<+]
|
||
M'(\F?1"5\V%4SD?1[!\#8*,"J63,Q5Q10]2AB&!OE(+JY:\`>W_%?(+&8<4^\
|
||
M&06GB+ZY$4[3-0W`)]&D3XGN$0JO$\;R)5`9XZ^.#-FZX+K^L,(/((^QUY*M[
|
||
M['7D2?9ZLH--(B^P=ECPAY!7V:'PR<_-I(5-(>^R(\DG["CR/3N<G&?'D`XV*
|
||
ME9BXVTD_;CP9QDT@:=Q4,HO+(`NX3+*$RR+EG`-N)J>1M=QT$N!FD$>X.\F3Z
|
||
MW%UD!S>3O,+-(F]PV>0`-YN\PSG)<6X..<WE$)7+)>>YN>02-X]PO(M8^3S2L
|
||
MEY]/KN?S23*_@(SD%Y+;^;M).E](9O'%I(`O(:OX9>0^OI0\Q*\@S_'EY'5^;
|
||
M)6GD*\G'_"IR@O\-"?%%I(/_+;G>M)9,,]62Z:9U9('I/E)NNI]4F6XC]YH>,
|
||
M(!M,&\@C)H4\9MI$GC$]2':8'@$_YS&RV_1[\H9I*[@Z3Y+]IG\A)TQ/D2]-C
|
||
M3Y-O3,^`U_,<^=[T/#EO^B.Y:'J!,,*+Q"KL)`G"RV20\*]DE/`*N1W^D76Z[
|
||
M\!J9!=IW"6^2(F$O^8VPCZP1_HW<)^PG#PD-9)MPD/Q1:"*O"8?(OPG-Y)#0/
|
||
M0CX4WB9?">^2[X3WX'.+(\1D?I_$FH^21/-QDFS^"!RM3\EH\V<DS?PYF6D^9
|
||
M2^:8_PH^5X@L,H=)N?D'4F'^D=28?R*/F"^09\P_DSIS*]EOODP^,K.,:N:9K
|
||
M<V:1:3-;F$MFB>DT6YF(.8;AQ7C&(O9F^HI]F`%B`G.]F,C<(/9GAHG7,"GB>
|
||
MM<QP\3IFA)C$C!$',F/%0<P$<3`S2;R121>','>*R4R.>!-SMSB4*1:',97B8
|
||
MS<QJ,86Y3QS.*.((YO?B2.8/XBCF)7$T\ZIX"_.6.(8Y)*8R[XNW,B?$VYBO>
|
||
MQ+',=^(XYF?Q=N:R.)XQ6R8P\98T9H!E(C/8,HD989G,C+7<P:1;TID9EBE,8
|
||
MKF4J<[<E@RFQ9#*5EBSF7HN#N<\RC=EDF<[\WC*#><9R)_.2Y2[FSY:9S%N6P
|
||
M6<QA2S;SOF4V<]+B9+ZRS&'"EASF9TLN$[',9<S2/"9.<C'72'G,#=)\9KB4@
|
||
MS]PF+6#ND!8RTZ6[F1QI$;-06LP42P5,A70/LUHJ9-9+2QA%*F(>DY8R?Y"*:
|
||
MF1>E9<Q.J8S9+2V'L(+9*Y5#6,DT2Q40*ID/I%40?L-\*;DA>)CO)1F"E[DD#
|
||
M54&H9LS6U1#6,`G6WT*H86ZTKH50R]QJ70?!QTRQKF>RK7[&:?T=DVM]@+G'B
|
||
MN@'"1F:E-<"LL08A*$S0N@G"9N9)ZX,0'F)V61^&\`CSIM6PZC#3^Y'HMN`Q"
|
||
M-B%*AID>8>O`3.#FX%7VEZYSDA=,O<E^X,8MPFZ3C1PP-A[UIE&D`2P.FKG]%
|
||
MIF%=<KXU36$:@0=/3[XWI3%-AE4::AY!#H-TK,AH\Q#RMD&?9]Y*W@4IZ($OB
|
||
M,C]$CAGT<^9L\@'0XP"WF3.ZY$\0*RE#+W3$Q/*N>NZ47J3O/G19?IZ<IBT!<
|
||
MO]%:1CX#C)YYKK6$UOX1=JB%@;T%T_5WL4L^3U7#$A^<1*S3MT8LI1H$@4:H#
|
||
M7:44D?*+-"^>B5@HOVYN\9!$HOPV(ZYI,?JV"]LE&NLJ98XUA`XU=G8V^N[3_
|
||
M)==L\%N-=XJ1;P#-PO9\)USUGFB\->/MQ'=?_.&C[T&X0XK'(O6XV#,?E3N8Z
|
||
M^@2\_H8U3']+5\6-=%^4C_EOOJ_./_"JN/WOE_>K]_]FN3WH/=I_Q9LT8O\U%
|
||
MH?(/8?0P=D<STEI@!PG#&G[>P=1W@=803V4]PC[&OL"^Q+[*?L*>9SO8?EP!G
|
||
M_QS_,=_!"Z;K34--$TW33.6F>TT;3#M,+YAVF]XPU9OVFXZ9/C*=,'UI^L;TJ
|
||
MK>E[TR@A7?B-<)\`*X1@,B>:D\U#S:/-Z>:9YCGF>>9%YOO,CYC_:*XS[S<WO
|
||
MF]\V?V3^Q*R:SYG!OHOQ8E]Q@'B#.$P<+HX0QXACQ0GB)/%%::>T6\JV.JVY5
|
||
M5MTZ%!04E1<75GA7(<(+6SSV`AR]68:5ML!=[)$KW<5KBMV5I*!P2:5;)IG30
|
||
M<F;/<Z9#XJQ9LS.S9I*"E7#C10J*"LN+"!7I7K&$%-#;2U*PK!A.KDH@<P5<%
|
||
M&GA6E9<!#:_,=(2W;N7%,I0(.=W%2\MD#[S@5JP`;]-T"N4"V48$ZK4:WP5+L
|
||
M*STH'1D+9=EM4#P]*0:G\2J*OJ.$&;.S<G)FYP"">R(#EGD@Z[U`FCD[>]K<4
|
||
MV5,`S:.O<D]Q\0IL]%W94V9E`8`32T`DNR`W8[8S/YTJJW`IO/#8K@);1)%<'
|
||
MB3J%:GE7E8$:Y&+4L;<"#^Z`[G+FS,B>FY5#X5SZR@&AD$%>5;0*ZU&PQ(V,K
|
||
M!1[ZIC\Z+()K8I0-;U`:2EXM%U665QIP"5S7+'/#;<12/:YKI!0^0\#/"J`F-
|
||
MY975!L(O"PQ8D.&<-S<;A-(3R!*L#R;`IPJHN-%%;NA-78E=")I6Y'5[8&C<Y
|
||
MNPJ&S+)*N7+UO;3CL5CH;:\!RBJ+9*CORLJJ8IU0`EV-HZ>\O!)&#FA/!P4Y2
|
||
M65-F9KCF=BDPJE2WIUPVX*I*'+6Y&3E96=DS9F,UI\R<D3EE;M;\?)T^>^;,!
|
||
MKCKH`[``KEO=Q5@U'1CO>^GH7XF%%)57>HKIM*#O$OHNQ/XJKBR)QN%=4N[U%
|
||
ME,(;Q'O@A3'*53#;F97M<`*8EC47WR65J^A8CBJS1!]#)?H@H`*PO=D&Z/DJB
|
||
M+733^D,!*XM7TJ&@"XN^2D"OR-SC1?,4./0>C`Y'>HA,L)>JEG@1R.ZB0EE_#
|
||
MKUREOU$ZO,M1,+PK])&7[:W0*Q1]@PK=9=0L1-^KHSH!I&L%^F!*;M8TG`XP3
|
||
M:$:[BHMD')$8N;5GY+:>D;%=D8S1A>YE15%014%Q1569NQ+;#&AFQ3(=>(H-]
|
||
MD%NV!BNPRH,CHM)35>SVE%'N2L_*PN54ZA6TL@JDP6<U%3@H<N5"MSP7;N.Q7
|
||
M>:7%A:N6%-+VX$PKK\)>ZD&\@B;3(:B;HR)]?N@S@)H7JFN*C$%`L0%!Q\6%@
|
||
M*Z%K"RKH5P-ZIY;@."^!D8@$.-R?M[+0L\(HC'8-&KAHO0%FX9=!<RMS753B+
|
||
M"IVE&FQ!)1U=QHQ>6N8&Y4:G=TF9&ZUR07DA?;EA+J*"<F"89U3)7=V0"X-FY
|
||
M;N72:!PF*IIO`/#%@X'@"QL#N8OQ:AA'MXP#"WGT]"[UR$OHNN)U+ZG,<%--D
|
||
M5<DEA=BV*=-SI\]PS*5H1G9&#LF8D#U]#)CCD1E$!X3>J$(M9;QA-;[,(%`&E
|
||
M?%0A$UQ*L"1\8[E8)8SC&^-E%3`QQN@OLMP+-I=6NKRXJKB<E)07+O,04'LIF
|
||
M9EGBP8$$_58"A8%%6T5@`2N&*2)7K@#5EJPBM&M6E1<6%1-,`$EC].@8.#Q;&
|
||
MC87(E&<,P;ZH+`(A9%6EA\`<*5I1(!/\Z`->U3A1X>V8,3,+Q,*B)1,L&U[_V
|
||
M#U!+`P04````"`!0G5H<G6N#S`4(``!=$0``#````$Y%5TA!2S(P+D1/0Y58,
|
||
M75/;2!9]5Y7^PZW:!V#&-L8DP.0E2[`9-`',8#-)'MM2&W4L=7N[6RC^]WOO$
|
||
M;4FVF0Q;JRH,0GV_SKE?,OST>A#.U<9F<*T*"4_K3'AIXPC^^?I+6J>,AM%@L
|
||
M^.8Y@/O)EYO+J\]OG%H:"]/9\0B$SF`\G;VI<+&!/TRN82REE7$41]?)[60&N
|
||
MR?W5[=-X,OY`PO1S?S.:SD:#R=<)B_7GN0Q&7AK/S;)UK0T"1=#ZO@C^XRT)X
|
||
MNOT\&@[&TRN2&)NT*J7VPM-YBFMA?-XJ<'#H<^5@B2`?D>MQ].7F&\QO)J0(8
|
||
M_IH\SI+I_4?^ORR*'BR$4ZDHB@VK&H&5PJ&:#U!N(!=(5Z;<"E(K7"ZS'L.7;
|
||
MP+/Q'.@`M>12_\/9!+PLU\8*JU!]89RG@\Y4-I7@S9:U-OB3P;"'SU'0>6&]/
|
||
MS-";VBJO]#,H/P"8*8VB"6A3H\&7@#89BJ-,IBI#"=2;FG)-.28Z5+?L.Z@QW
|
||
M[,$^,G\\W3W`]>/TKL6'/('YM+M%*G8@R^6F!QZ)6RJ+,>U0]T7IS-0.[N=0C
|
||
MHZG3P0G'4^<;2(4^\.CI0L91:DR!CIJ/\.$("38$ZZ86J%7Y`X='4E$YR28FM
|
||
M]_/D<0)K:YZM*#%H>HR(QY&5_=10Q$MK2G"(ND_S05<+L`,J.Q,.*PWSRBX,<
|
||
ME2/2'D?G@R$*S2EGM*P[J3V)3\861/S5K[_N%Y(H7`=W%D>U\OG?#E.Z(W,8I
|
||
MI&O82W.AGU&S1&,;GR.[1&%+H(BC[U6Y)KL$0.N0KLJ%M.R7EJET3MA-0V,RB
|
||
M@V0.5Y>WMY-Q%_[T$1XN9[,OT\<Q4/G"T\/X<CYY9!X3!%0N45USN@>+BLA9B
|
||
MR;5GJZ;(0(M2=ESLHHGW&>5CFT27<[(_GDYF=/_-5+"B!*VI,C9X]RP]B#UTM
|
||
MS9*MK*DE9ERK@44\;>-H*5Z,55XBV^D*4?,R^$>Z,D-I5`OM*=.I\C$*.D<U)
|
||
M(HJ"],:12%-3:>\^`I`[+C<5!O2]<AX#ZHZ3"^05L=5RTDKVXBC0Y7.#X0L;-
|
||
MTM'H8H,?TD%M+)+=J$*"J32`6T^M\*_,($(8BK'D-C[_U/892G+.&=3I.K!WU
|
||
MH2!_&M_B:.=!#Y'4T@J/<@%//LY9QXXU0L=-,%L<>MMLW57AO/!5Z)4!G$(YJ
|
||
MWR+3R,81Y0$Y*GSH.5Q_C8EC\N*PB=(")Y5$V(YV.LS3;/)&*K8MQ<H#<ND_C
|
||
ME4)$)>FWGHBK6W_<6E+:E6MK7B0-@#C:&1:4656`\Q=.BE^ZGF%"(97"KJ3OY
|
||
MP0U2)NV!BZ-N(E^&4"FI#F\>+H\&--[BJ)V_>]>_.'D507)].<,H"!D-*!9'I
|
||
M_?_SBJ/6_:91O![$)X/SO>E`7OT/D='@="LR&@Q_.N!?Z^&&MG^=HNB>HD`H%
|
||
M]3'AN!13#-M)V0.UY/M:6AYKM@J`O]H$.HL].GV0425F1DMJ="?'IRQ"N%)YB
|
||
MU%RO7JQ:A7&$`",M?U;4%]#P3AXTJ?8PG<V23[<3>'B<XJ\[;D9WI,)53?7NJ
|
||
MU)+CDDX+*;3,H%JC[C&W%DYQH3<@?W@KXLCC;T"(4F&M$L\2K/25U:[MSZP,J
|
||
MI1_1%^[07"A2I/FV@IK^DQKME/.40-/["3AO0^OXM+>_</M`46K%A:)64ZW1E
|
||
M#0.C]^_@<"-=C_XZX@H1J4<Q5/%92IX8I>+>(;B+8X#)#`1D:MF491PMI*^I9
|
||
M?I_NDZ_M+@A29WVS[).U4";6P2$]J!R:OWKLWUX?A1;"[3>.Y(^U3,.D:*L,(
|
||
M':R-7=']6MIB`Y5&8$*FM,.<5"Z-+05QENS,`"I"[D+*.UDL><Q+:XUEF)6'<
|
||
MPT*M:*$IE7/4$`X^'!QQMZ6ABWB%(25@H1A>06XL"EDB-(F&)>+4V_/V+OG]J
|
||
M9AXV-3I"JO0*?3I`\M<5\J=-]9P''_II+L/`4#H,(M^VJZ(6F]!TU@8=6ZA"A
|
||
M^4V(C>*F2A"=30[AS\G=W>G%6>B9?G_Y/>+4IW`65HI5&&6M-*$?4@]5D@:E"
|
||
MG;=5RELP^XF!3/]>>:':BB*.PAB>?9N=GIR_IY3FFY.+X448(0+U_*"T(XVT7
|
||
M^Q"2P^'P/>]'W))I(%(E2\5SMRUNQI$!<K0R?@-7J)(WOV9<&VLW(!8&L>,]-
|
||
M]LE5/`KCB-S%Q\Z'K.7H<[%>2PV'%'(S<'\"53.2>.[0((NC9AI2.ACMA2*DC
|
||
MC);]KE(H$2VO-02>%%F[B-2Y*20TJQ@R'$<M$\[3)SI.69%B'#+U-&D-RUG9>
|
||
MYQV%+#=MZ#:Y2^:7\V1ZSPWH]?L-*^6@FA(_'?7.S\[9,]@?UZ^9;%)]5SA`9
|
||
M.AJ<O(,2GY&!/47M9AL:$%&QD+1@;JOCM7_=@MUNM>&UZ.*,TIUVB(5YD4PM8
|
||
M%T$<E6)#2AN-CH9!.UG0,%4`:A4Z[+EXLC`UTH(*=];'@QG*?)U_#("U*Q2I"
|
||
M%(N"U9<;*,3^NT8W39I&TQ:E,R5UL>_&QM&B>@Y9DD"F./ZT>4N8\ZKTPW?5I
|
||
M&:J$!EI812E):"%9V,I+7N32;H"DEG>(;@03,,S4-H<]);Q#/_2&H%PHS>^K#
|
||
M+H[HL/*T@W&[;X8I;[2*EEIZA1&^LMVN&#I"Z*!+!$$B#JCF1:@"X=FNZ$D8B
|
||
MFQ2EE844CD<I\D$ZA,/_M^\+RVT'0_=:ZGH0UCC$A19A#1?#BXMC_#C;]I+FN
|
||
MQ%+I+(X(Z4`KNV7#)M3QDEFS)ABIK_1+]!:H2.F+A0%_L?#O0I0+D8F!47Y0Y
|
||
MZ70@LXK<V_WJ870&UQ(I$`CGR6^_O8NC_P)02P$"%``4````"``QE5H<4<G+%
|
||
MN:5'``!\G0``"@```````````"``````````3D@R3U,R+D5815!+`0(4`!0`6
|
||
M```(`"J76AS;Q)1TUS<``-Q?```*````````````(````,U'``!.2#)$3U,N]
|
||
M15A%4$L!`A0`%`````@`4)U:')UK@\P%"```71$```P``````````0`@````B
|
||
FS'\``$Y%5TA!2S(P+D1/0U!+!08``````P`#`*H```#[AP``````=
|
||
``
|
||
end
|
||
|
||
|
||
End Of Sphear Digital Magazine
|
||
Issue #3 - 05.13.94
|