Copy Link
Add to Bookmark
Report

Sphear_0003

eZine's profile picture
Published in 
Sphear
 · 5 years ago

  


Sphear
------
__ ___ __ ___
/ / / / / / /\ / /
\ /__/ /__/ /__ /__\ /__/
__/ / / / /__ / / / \

DigiZine

Phreaking
Hacking
Anarchy
(And AnyThing Else P/H/A/C/C/V)
Editor: Signal
File Contributions:John Deere
Sphear can be reached at
system@axposf.pa.dec.com
~or~
sphear.digizine@lambada.oit.unc.edu

Issue #3
[05.13.94]

If you have any articles, advertisements,
worthy of our time please send them by
Internet email to system@axposf.pa.dec.com
Also, Sphear entertains any editorials and
interesting articles and pays $3 for any
article that is published.





Contents
--------
Clarifications


Articles
-+-+-+-+

Digital Turmoil? by Signal
----------------------------

Enclosure
~~~~~~~~~
Federal Communications Commission
Docket 91-281
Regarding Caller Number Identification

Files
+-+-+
NewHack2.Zip
by
John Deere


Clarifications
--------------

Due to circumstances beyond our control Sphear Digital Magazine has been out of print(e-text) for several months. We apologize for any inconvenience this may have caused, and sincerely hope that there are no more delays in the future. Thank you for your patience.

--Ed. \
\/////////////////
\/Digital Turmoil/
\/////////////////
by Signal

Digital Turmoil? Does that word mean anything to the average Joe? The
person who doanloads those outlawed, enncoded graphic files on the Net? No.
The normal, or even not so normal internet user, has probably never dealt
with digital turmoil. It is a plague only known by some of those lowly system
administrators; those sysadmins that have nothing better to do but to
reconfigure their systems, hour after hour, day after day. It could be said
that only he knows what it means. Digital Turmoil. Is it something that Hackers
create, or is it created by blindsighted software designers, who do nothing for
a living but churn out huge and almost useless programs? That is the question.
The internet is a very complex and unregulated system and this digital turmoil
that does exist does not exist for the benefit of anyone, 'cept for the
aggeravation of the system administrators. Turmoil on the net can included,
cleverly forged email, so that it is NOT tracable with STMP, and sendmail. Of
course cracking in to a system and fucking up major, not the user partition or
files but just making it so that root has to stay up all nite long--sleep
deprivation.




FOR FCC RECORD ONLY

BEFORE THE
FEDERAL COMMUNICATIONS COMMISSION
FCC 94-59
WASHINGTON, D.C.



IN THE MATTER OF )
)
Rules and Policies Regarding ) CC Docket No. 91-281
Calling Number Identification )
Service - Caller ID )

Due to technical difficulties, footnotes, tables & charts may be
dropped from this document. Entire document is available in Word
Perfect also.

REPORT AND ORDER AND FURTHER NOTICE OF PROPOSED
RULEMAKING

Comments due: May 18, 1994
Replies due: June 21, 1994

Adopted: March 8, 1994 Released: March 29, 1994

By the Commission: Commissioner Barrett issuing a statement.

TABLE OF CONTENTS

Title Paragraph

I. INTRODUCTION 1

II. DISCUSSION

A. Calling Party Number Services Should be Available
to Interstate Subscribers Nationally
1. Risks and Benefits 4
2. Deployment by Carriers 10

B. Transmission of the Calling Party Number
throughout the Network 12

C. Costs of Interstate Transmission of Calling
Party Number 18

D. Privacy Issues 24
1. Constitutional Issues 25
2. Public Policy and Privacy Mechanisms 31
3. Private Networks, Emergency Services and
Law Enforcement 35

E. Privacy Protection Mechanisms, Further Notice of
Proposed Rulemaking 38
1. Per Line Blocking for Specific Groups 39
2. Per Line Blocking Available to All Subscribers 41
3. Operator Assisted Per Call Blocking 44
4. Automatic Per Call Blocking 45
5. Applicability to Additional Services 50

F. ANI and Caller Privacy 51

G. Subscriber Education, Further Notice of Proposed
Rulemaking 59

H. CPNI and Subscriber Privacy 61

I. Wiretap Statutes and Caller ID 62

J. Relationship between Interstate and Intrastate
Caller ID 64

III. CONCLUSION 71

IV. PROCEDURAL MATTERS 73

V. ORDERING CLAUSES 77

APPENDICES

I. INTRODUCTION.

1. On October 23, 1991, the Commission issued a Notice of
Proposed Rulemaking in this docket. More than 100 parties filed
comments, including local exchange carriers (LECs),
interexchange carriers (IXCs), state governments, public interest
organizations, trade associations, and private citizens.

2. In the NPRM, the Commission sought to develop the most
effective policies to govern interstate calling party number
based services such as caller ID. The NPRM sought comment on
carriers' progress in deploying interstate caller ID service, and
the technical and public policy implications of dual federal and
state regulatory policies. We tentatively concluded that a
federal model for the interstate delivery of the calling party's
number is in the public interest, and necessary for the
introduction of many valuable services, including interstate
caller ID.

3. In this Order, we find that a federal model for
interstate delivery of calling party number is in the public
interest, that calling party privacy must be protected, and that
certain state regulation of interstate calling party number
(CPN) based services, including interstate caller ID, must be
preempted. We amend Part 64 of the rules to require that common
carriers using Common Channel Signalling System 7 (SS7) and
subscribing to or offering any service based on SS7 functionality
must transmit the calling party number parameter and its
associated privacy indicator on an interstate call to connecting
carriers. We also require that carriers offering CPN delivery
services provide, at no charge to the caller, an automatic per
call blocking mechanism for interstate callers. The rules
require that terminating carriers providing calling party based
services, including caller ID, honor the privacy indicator. We
find that the costs of interstate transmission of CPN are de
minimis, and that the CPN should be transmitted among carriers
without additional charge. We also require that carriers
participating in the offering of any service that delivers CPN on
interstate calls inform telephone subscribers that the
subscriber's number may be revealed to called parties and
describe what steps subscribers can take to avoid revealing their
numbers. Further, we adopt rules to restrict the reuse or sale
of information generated by automatic number identification (ANI)
or charge number services, absent affirmative subscriber
consent. Finally, we note that additional comments are sought
through a separate public notice in the Computer III Remand
Proceeding on whether residential and small business customers'
privacy concerns warrant revision of the Commission's rules
governing reuse and sale of customer proprietary network
information (CPNI). In the Further Notice of Proposed
Rulemaking, we seek comment on whether more detailed customer
education rules should be adopted. We also seek comment on
extending the policies adopted herein to other services that
might identify the calling party.


II. DISCUSSION.

A. Calling Party Number Services Should be Available to
Interstate Subscribers Nationally.

4. Risks and Benefits. In the NPRM, the Commission stated
its tentative view that the availability of interstate caller ID
would enhance the value of the service to intrastate subscribers
and augment the available choices of existing interstate services
for all subscribers. The Commission noted that the ability to
choose caller ID and other services that rely on access to the
calling party's number should be available to interstate
subscribers nationally. The majority of commenters supported
this view and described in detail the potential benefits to the
public of services based on the calling party's number.

5. In its comments, AT&T identified potential uses of
interstate calling party number for such services as pay-per-view
television, order entry/verification, voice message storage,
secure computer access, customized customer service, business
fraud reduction, call routing, emergency dispatch, health care
services, telephone banking, home shopping, dealer locator, and
selective call message forwarding. McCaw states that caller
information will significantly improve cellular and other service
offerings because cellular subscribers pay for incoming calls.
Moreover, McCaw notes that ubiquitous caller ID will facilitate
cellular enhancements including conventional caller ID, more
responsive customer service, new cellular CPE voice synthesizers,
and service for roaming subscribers. SNET states that its
studies show that caller ID aids persons with hearing impairments
in answering calls; law enforcement in determining crank,
threatening, false alarm calls and emergency dispatches; and
hospital crisis centers in identifying and deterring nuisance
calls.

6. In contrast, Colorado DVC asserts that caller ID is not
in the public interest because of the threat it poses to the
privacy and safety interests of the calling party. Colorado
Consumer contends that call trace is the preferable service to
stop obscene and harassing calls. Bell Atlantic replies that
call trace will not work if another call is received before
tracing is attempted, and that customers who have used both
caller ID and call trace prefer the former. Consumer Action,
Washington UTC, and NYS Law agree with Colorado DVC that caller
ID has little merit and may threaten public health and safety as
well as jeopardize important privacy interests.

7. While we agree that passage of the calling party number
does create risks of lost privacy, we must weigh these risks
against the potential benefits brought by interstate services
that passage of the calling party's number makes possible. Other
services available to protect subscriber privacy, such as Call
Trace, are limited in scope and do not permit either the public
or service providers to take advantage of beneficial services.
The commenters briefly discuss some of these benefits. For
example, computer systems could limit remote access only to
previously approved calling numbers, with calling party number
based services like caller ID making verification for access
nearly instantaneous. Service providers who respond to telephone
orders, such as stock brokers or parts and equipment dealers,
could use the calling party's number to direct the call
immediately to the appropriate department for service. Banks
could program data sources to have customer profile information
available as a call is answered. With interstate delivery of
calling party number, calls to national service centers could be
routed automatically to local service centers closest to the
calling party. Consumers making orders could have their name,
address and billing information verified instantaneously.
Indeed, a significant number and kind of customized national
services can develop as a result of instant recognition of the
calling party.

8. Many of these potential services would permit
transactions to occur more efficiently. In an economy that
averages more than one billion interstate calling minutes a day,
even small efficiencies on individual calls could become
significant in the aggregate. Providing the public with rapid
and efficient interstate telecommunications services is at the
heart of our responsibilities, particularly if they can be
provided at very little additional cost. As illustrated above,
passage of the calling party number can promote technological
innovation and new applications that will foster economic
efficiency and provide new employment, manufacturing and
investment opportunities.

9. None of these services and benefits are possible,
however, unless the calling party number is passed freely among
carrier networks. It is significant that the categories of those
benefiting from these new opportunities are very broad. For
example, consumers and individuals benefit by having additional
options for meeting their customer service needs and by having
transactions completed more quickly and more accurately. As
workers and entrepreneurs, they benefit by having new employment
opportunities. Businesses benefit because they can complete
transactions more quickly, which can lower incremental costs of
transactions, potentially leading to savings for consumers.
Telephone companies benefit by revenues from new services, and by
greater use of their networks. Greater use of CPN based services
by consumers and service providers will create incentives for
carriers who do not have SS7 networks to install them. This will
enhance the nation's telecommunications infrastructure, to the
benefit of all who use it. Most of the comments directed against
our proposal in the NPRM are based on legitimate concerns that
individuals have access to a means of protecting their privacy
where doing so is important. We believe technology can address
these concerns regarding protections for individual privacy.
Accordingly, we find that the potential benefits of services
based on calling party number serve the public interest and
affirm the NPRM's tentative conclusion that CPN-based interstate
services such as caller ID should be available to interstate
subscribers nationwide.

10. Deployment by Carriers. In the NPRM, the Commission
sought detailed comments on carriers' progress toward
establishing joint offerings of CPN-based services, and any
impediments that have been identified. The record does not
reflect extensive response to that inquiry. It appears that
although the deployment of the necessary technology for
interstate calling party number based services is well underway,
other factors have impeded progress. In particular, varying
state regulatory responses to privacy issues appear to be
impeding the development of interstate services. Moreover,
commenters express concern that this lack of national uniformity
in regulating interstate SS7 calling party number based services
may eliminate a source of the revenues expected from such
services. In their comments, Rochester, Ameritech, BellSouth,
GTE, McCaw, and US West support a national policy for caller ID
because federal standards are essential to achieve the goals of
nationwide availability of calling party number based services.
McCaw states that it supports a federal policy for caller ID and
ANI that accommodates both state concerns and industry
diversification and experimentation. In contrast, Allnet
contends that there is no compelling federal interest to promote
nationwide availability of caller ID and that if there is a
demand for interstate caller ID, market forces will assure its
availability.

11. The record reflects that national policies on
interstate CPN-based services such as caller ID are needed to
reduce risks of stranded investment and to remove impediments to
development of services consumers are likely to find beneficial.
In addition to providing additional choices for consumers, such
services offer significant efficiency dividends for all users of
interstate telephone services. These efficiency gains promise to
lower incremental costs of interstate calling party number based
services, including caller ID, and increase national
productivity. Carriers may be wary to invest in technology or
delivery systems that may later become incompatible with the
varying state requirements or incapable of satisfying federal
policy. Resolution of privacy, blocking, and preemption issues
is necessary to enable the benefits of these services to occur.
By removing impediments created by administrative uncertainty, we
seek only to resolve those issues necessary for the efficient
introduction of the services. The effective date of the rules
adopted here will be April 12, 1995, which should allow
sufficient time for completion of any coordination or other
arrangements, discussed infra, necessary for full compliance with
the rules.

B. Transmission of the Calling Party Number throughout
the
Network.

12. In the NPRM, we tentatively concluded that the
transmission of the CPN by the LEC to the IXC is an essential
element of interstate CPN-based services such as caller ID. The
Commission proposed that LECs should be required to provide CPN
to IXCs as soon as technologically feasible and, similarly, that
IXCs should be required to transmit CPN to terminating LECs.

13. AT&T states that requiring IXCs to transmit interstate
CPN to LECs is unnecessary because the competitive market already
gives IXCs incentive to offer innovative interstate caller ID
services to end users. Moreover, AT&T contends that such a
requirement would deprive IXCs of the ability to earn revenues
from their substantial investments in SS7 technology. Allnet
argues that the requirement would compel all IXCs to participate
in SS7 interconnection, thus compromising network integrity.

14. Ameritech, Nynex, Pacific, Centel, and NTIA concur
that the Commission should facilitate the provision of interstate
caller ID by requiring passage of the calling party's number
between carrier networks without modification. MCI agrees that
the Commission should require LECs to provide the CPN to IXCs,
but it opposes any requirement that IXCs be required to transmit
the CPN to the terminating LEC because it states the LEC would
then be the lone provider of caller ID. In opposition, BellSouth
contends that the transmission of the CPN is essential, and as
part of SS7 does not require additional network processing by the
IXC nor impose significant cost. Further, BellSouth argues that
free delivery of the CPN to terminating LECs would not establish
LECs as monopoly providers; rather, IXCs could develop competing
CPN-based interstate services that bypass LECs as terminating
carriers. NTIA and USTA assert that an IXC's offering of the
calling party number should be available through all means of
interconnection to end users, including LECs, alternative local
service providers, or the IXC itself.

15. Nynex proposes that mandatory delivery of the calling
party number parameter among all networks is in the public
interest. Further, Nynex supports McCaw's proposal that
technical standards for transmission of caller ID and ANI between
cellular and landline carriers be developed. However, it notes
that cellular carriers do not receive ANI from Nynex because
transmission of ANI to cellular carriers is not technologically
feasible.

16. We affirm our tentative finding that interstate CPN-
based services such as caller ID will not be possible unless the
calling party number is transmitted from the originating carrier
to the terminating carrier. In our 800 number portability
proceeding, major LECs filed access tariffs providing for 800
number portability using SS7 technology. Many Bell Operating
Companies (BOCs) have filed access tariffs with CPN as a
nonchargeable option. Calling party number is an element of
access service in virtually all SS7 access tariffs filed at the
Commission and these tariffs follow industry standards for SS7
interconnection. The American National Standard for
Telecommunications - Signalling System Number 7 (SS7) -
Integrated Services Digital Network, ANSI T1.113, 1988, includes
calling party number as an optional parameter of an SS7 network.
Similarly, the subsequent BellCore guidelines for SS7
interconnection with a BOC include CPN as an optional
parameter.

17. We conclude that carriers should pass calling party
number information where capable of doing so. In view of the
foregoing, we amend Part 64 of the rules to require that not
later than April 12, 1995, common carriers using Signalling
System 7 and subscribing to or offering any service based on SS7
functionality must transmit the calling party number parameter
and its associated privacy indicator to connecting carriers on an
interstate call. Further, we amend the rules to prohibit
common carriers from modifying or overriding the privacy
indicator on an interstate call. We emphasize that carriers are
not required to invest in SS7 technology in order to facilitate
delivery of the calling party number. Carriers are only required
to transmit the CPN and privacy indicator where technically
feasible. Because transmission of the calling party number
requires SS7 technology, technical feasibility exists wherever
SS7 technology is used. We now turn to the issue of the costs
associated with the transmission of the CPN.


C. Costs of Interstate Transmission of Calling Party
Number.

18. Most IXC commenters contend that, if required to
transmit the calling party number, IXCs should be compensated for
such transmission. AT&T avers that IXCs incur costs in acquiring
and delivering interstate CPN and that its decision to invest in
SS7 rested in part on the anticipation of revenue from new
services such as caller ID. MCI concurs with AT&T and further
contends that IXCs already pay for calling party numbers as part
of feature group D switched access and are developing services
which will provide the called party with the calling party's
telephone number. Allnet proposes that IXCs who do not
voluntarily engage in forwarding caller ID should not bear any of
the costs of deployment. Metromedia argues that carriers
terminating calls should be responsible for billing those called
parties subscribing to interstate caller ID where appropriate;
terminating carriers should compensate IXCs passing the
information.

19. Nynex believes that if the CPN is passed freely from
carrier to carrier, then each carrier may use it to provide
services to end users, consistent with cost-based rather than
market-based pricing for Open Network Architecture service
offerings. Bell Atlantic agrees that if IXCs are allowed to
charge for calling party number the cost to consumers will be
unnecessarily increased. United states that a single price
established in the local jurisdiction for all caller ID
regardless of jurisdiction is appropriate. United cites to the
precedent for local service pricing of custom calling features
like call forwarding of interstate toll calls.

20. SWB concurs with other commenters that CPN should be
passed from carrier to carrier at no charge because it is an
intrinsic part of SS7 call setup and no cost is
associated with filling the calling party number parameter in the
SS7 message. SWB disagrees with IXCs such as AT&T, MCI, and
Allnet which assert that charging for passage of the CPN would
permit them to share in revenues from the LEC's services that
depend on passage of the calling party number. In essence,
states SWB, the IXCs want to charge for the passage but receive
it free. SWB proposes that the Commission require passage at no
charge, thus eliminating extra charges which would be passed on
to consumers.

21. McCaw agrees with SWB that CPN should be passed free of
charge. McCaw asserts that to encourage maximum possible
participation of all carriers as co-equal carriers, the
Commission should prohibit compensation among carriers that pass
ANI or caller ID information because the costs of ANI and caller
ID are recovered in the overall SS7 costs. Centel argues that
IXCs should be prohibited from charging either the originating or
terminating LEC for transport. Centel asserts that revenue
sharing issues should be resolved between carriers, and notes
that it would cost IXCs more to remove the CPN from their systems
than to allow passage to terminating LECs.

22. CFA, Colorado DVC, Maryland PC, Michigan PSC and others
argue that costs associated with caller ID should be borne by
subscribers to the service. The Illinois CC notes that it has
ordered that the costs of providing per call blocking be borne by
those who subscribe to caller ID. IIA proposes that the per call
blocking costs should be imposed upon the calling party on the
theory that suppression of the calling number is a special
service the cost for which should be borne by the party who
chooses to invoke it. Consumer Action contends that LECs are
improperly allocating the costs of the SS7 switches and supports
this contention with data which it believes show that the body of
ratepayers is subsidizing SS7-based service, which only benefits
5-6% of telephone customers.

23. We find that the unimpeded flow of the calling party
number throughout the network ensures the greatest diversity of
offerings to subscribers and eliminates costs that can delay or
impede development of CPN based services. To the extent these
services improve productivity, lower incremental costs and create
new employment, investment and other opportunities, they benefit
a wide range of consumers and producers. As noted above,
industry standards already include calling party number as an
optional parameter of an SS7 network, and the calling party
number is an element of access service in virtually all SS7
access tariffs filed at the Commission. In most cases, SS7
signalling replaces older signalling methods used in an IXC
network and provides benefits to the carrier such as more
efficient call routing and reduced exposure to fraud. We thus
conclude from the record before us that the costs of transmitting
CPN are de minimis, and that accordingly, the calling party
number parameter and associated privacy indicator should be
transmitted among carriers at no additional charge.


D. Interstate Caller ID Privacy Issues.

24. In the NPRM, we balanced the privacy interest of the
called party against the privacy interest of the caller and
proposed that interstate caller ID should include some measures
to protect calling parties' privacy. We sought comment on
whether these privacy interests are matters of public policy or
are constitutional in nature. We noted that any regulatory
response to protect the privacy interest of the calling party
should take into account the public benefits of caller ID and
should not undermine the value of the service overall. Most
commenters agree that societal expectations of privacy require
that interstate caller ID include some type of privacy protection
mechanism.

25. Constitutional Issues. AT&T contends that the
provision of interstate caller ID by private telephone companies
does not implicate the U.S. Constitution, which, AT&T argues,
does not regulate private activity relevant to this proceeding.
GTE concurs with AT&T and adds that in recent cases the courts
found no state action was involved when a LEC refused to provide
communications service or billing and collection service to dial-
a-porn providers. Further, GTE argues that in Smith v.
Maryland, 442 U.S. 735 (1979), (Smith), the U. S. Supreme Court
held that there is no federal constitutional protection from
disclosure of digits dialed on the network.

26. In opposition, Georgia CUC cites to testimony before
the Georgia PUC that concludes that information is
constitutionally protected when a legitimate expectation exists
that the information will remain confidential. California PUC
contends that there exists a non-frivolous claim that the First
Amendment right to free speech includes a right of the calling
party not to be compelled to disclose his or her telephone
number. Ohio OCC concurs that there is an identifiable federal
constitutional privacy interest that includes telephone digits
and supports this argument citing Griswold v. Connecticut, 381
U.S. 479 (1965) (the right to make decisions about procreation)
(Griswold), and Whalen v. Roe, 429 U.S. 589 (1977) (individual
interest in avoiding disclosure of personal matters) (Whalen).
Pennsylvania PUC states that the Commonwealth Court of
Pennsylvania held that caller ID is per se unconstitutional under
the Pennsylvania state constitution because of the theoretical
risk that a caller wanting to remain anonymous would accidentally
forget to use the available blocking feature.

27. The record and case law demonstrate that there is no
federal constitutional bar to the offering by carriers of CPN-
based services such as caller ID. In Smith, the Supreme Court
held that there is no privacy right under the Fourth Amendment
protecting telephone numbers from disclosure because the
application of the Fourth Amendment depends on whether first, the
person invoking protection can claim that a "legitimate
expectation of privacy" has been invaded by the government. In
Smith, pen register records kept upon police request by a
telephone carrier on calls made by a robbery suspect became
evidence used to convict him on robbery charges. At issue was
whether seizure by police of the record of phone numbers that the
suspect called constituted a "search" for Fourth Amendment
purposes and thus required a warrant. The court's decision
rested upon analysis of whether the individual exhibits an
expectation that something will remain private, and second,
whether the individual's subjective expectation of privacy is one
which society is prepared to recognize as objectively reasonable.
Smith at 740. The court held that the expectation of privacy for
phone numbers is not one that society is prepared to recognize as
reasonable, because when one voluntarily exposes his phone number
to the telephone company's equipment, one assumes the risk that
the company may reveal the number to others. Id. at 743-45. The
Court also drew a distinction between the content of a phone
conversation and the number dialed and found that protecting the
content is more important than the number dialed because phone
numbers are not communication in and of themselves, but merely
establish that communication has been attempted. Id. at 741.

28. The Pennsylvania state court ruling cited by the
Pennsylvania PUC does not suggest otherwise. The Commonwealth
Court struck down Pennsylvania PUC's order which had approved
caller ID in part because the court found that, even with a
blocking mechanism, caller ID violates Pennsylvania
constitutional privacy rights. The constitutional privacy
right asserted in Barasch rests on the court's interpretation of
the Pennsylvania Constitution. Id. at 87, 89. However, the U.S.
Constitution is not cited in Barasch as imposing any privacy
right in a phone number; indeed, such an interpretation would be
inconsistent with Smith. Moreover, on appeal, the Supreme Court
of Pennsylvania held that caller ID violates the "trap and trace"
provisions of the state wiretap law and did not address the
constitutional privacy issue.

29. GTE cites two cases (supra, note 16) in support of the
principle that common carriers are private entities and thus no
state interference with individual privacy rights is involved.
DISC involves a challenge by dial-a-porn companies to the Helms
Amendment, 47 U.S.C.  223 (b) & (c), which allows phone
companies to require dial-a-porn services to notify them that
they will be providing indecent messages and/or to require dial-
a-porn services to utilize independent billing. The Court of
Appeals held that no prior restraint of free speech was created
by the statute because no governmental action was involved. The
statute merely permits phone companies to choose whether to
provide billing services to dial-a-porn companies. Similarly,
Information Providers involves a challenge to Section 223 of the
Communications Act of 1934, as amended, 47 C.F.R.  64.201
(1991). The court held that carriers are private companies, not
state actors, and are, therefore, not required to continue,
restrict, or terminate services of particular users and that a
carrier is free under the constitution to terminate service to
dial-a-porn operators altogether. These cases generally support
the proposition that when a carrier can choose whether to offer
certain services, no state action is involved.

30. On the basis of this body of law and the record, we
find that the offering of caller ID does not violate privacy
rights protected by the U.S. Constitution. Constitutional
protections of privacy relate to government action and no
government action is involved here. Moreover, we find that
federal courts have not, to date, recognized an individual
privacy right in telephone numbers.

31. Public Policy and Privacy Mechanisms. The majority of
commenters agree that the privacy interests associated with
caller ID are a matter of public policy or societal expectation.
California Consumer Affairs proposes that federal interstate
caller ID policies must recognize that the governmental interest
in protecting public health, safety and welfare dictates that
some blocking option be available. NY Law Project underscores
that with a relatively inexpensive personal computer and a CD ROM
reader, a business caller ID subscriber could access data bases
and display a data profile of a caller even before the telephone
is answered, or while the call is in progress. SWB recognizes
the need to protect the confidentiality of non-published numbers,
undercover police officers, domestic violence shelters, and the
integrity of hotlines. Massachusetts contends that the effective
functioning of law enforcement in Massachusetts would be
compromised if caller ID were offered without a privacy
protection mechanism. GTE, however, asserts that tariff language
requires that the caller identify himself to the called party.
Nynex contends that caller ID redresses a longstanding imbalance
which favored the calling party because the called party had no
information on which to decide whether or not to answer the
telephone.

32. BellSouth proposes that with all number delivery,
callers can protect their identity by calling from telephones not
recognizable by the called party. BellSouth states it has
developed specialized service offerings for the privacy concerns
of law enforcement and domestic violence shelters. Bell Atlantic
also advocates unrestricted delivery on the premise that per call
blocking is used infrequently and provides malicious callers the
opportunity to continue to make harassing calls. MCI states that
delivery of the calling party number should be unrestricted
because unlimited availability of customer initiated blocking
will undermine the service and diminish its value to the public.
However, MCI concurs with BellSouth that limited blocking should
be available to protect public safety groups. USCG proposes that
any blocking mechanisms not apply to calls made to United States
Coast Guard emergency telephone numbers. USTA is in favor of
unrestricted delivery of caller ID across all carrier networks,
whether interstate or intrastate. However, USTA proposes that
per call blocking for specific applications may be appropriate.

33. IIA argues that unrestricted delivery of caller ID
threatens a broader concept of information privacy -- a right of
the individual to control the dissemination of information about
one's self and one's activities. Kentucky states that Bell
Atlantic's claims of reduced harassing and obscene calls appear
to be more a function of changes in the handling and routing of
such calls than any real reduction on the actual placing of these
calls. Ohio OCC states that unrestricted delivery of caller ID
would undermine the ability of professionals who must work from
their residence, and that public hearing testimony in Ohio
resounded with consumer objections to disclosure of non-published
numbers.

34. Most commenters do not advocate completely unrestricted
delivery. Even those commenters that advocate unrestricted
delivery suggest a limitation on availability of the CPN under
specific circumstances. In light of the extensive record before
us, we conclude that a regulatory framework for interstate CPN-
based services such as caller ID should include some type of
privacy protection mechanism. We affirm our prior tentative
conclusion that the calling public has an interest in exercising
a measure of control over the dissemination of telephone numbers
that must be reflected in federal policies governing caller ID
service. We discuss specific privacy mechanisms in Section E
below.

35. Private Networks, Emergency Services, and Law
Enforcement. AT&T proposes that there should be no blocking
mechanisms prescribed for private or virtual private networks
because blocking on business services and on private networks
would intrude on the rights of private and virtual private
network owners to determine the amount of information delivered
on internal calls carried on their networks. AT&T and GTE concur
that business services do not commonly implicate personal safety
concerns and in a business context, identification is expected.
The NPRM sought comment on whether blocking mechanisms jeopardize
calling party identification by emergency services. USCG states
that blocking mechanisms should not apply to calls made to
emergency telephone numbers because they could degrade emergency
service operations. Pacific Bell notes that emergency services
could be affected where an individual calling line identification
display device is being used in place of the standard public
safety answering point console arrangement.

36. In the NPRM, we proposed that the privacy requirements
adopted herein to address the privacy concerns within the public
network should not apply to communications within private or
virtual private networks. We affirm that privacy expectations of
the calling party are different when they arise in the context of
internal calls within a single private network. Moreover,
commenters did not dispute that caller ID systems raise very
limited privacy expectations if used solely in connection with
legally authorized call tracing and trapping procedures
specifically requested by a law enforcement agency. We do not
apply the privacy requirements adopted in this order to these
narrow sets of circumstances.

37. The record indicates that blocking mechanisms do not
affect Enhanced 911 services, which currently locate the calling
party on emergency calls via ANI rather than SS7-based caller ID
services, which include blocking mechanisms. However, as
indicated by USCG and Pacific Bell, blocking mechanisms may
jeopardize emergency services which rely on caller ID and thus
pose a serious threat to public health and safety. To the
extent that CPN based services are used to deliver emergency
services, we find that privacy requirements for CPN based
services should not apply to delivery of the CPN to a public
agency's emergency line, a poison control line, or in conjunction
with 911 emergency services. We now turn to specific privacy
protection mechanisms for assuring that the interstate public
network includes a privacy protection option.


E. Privacy Protection Mechanisms, Further Notice of
Proposed
Rulemaking.

38. The three privacy protection mechanisms prevalent at
the state level are (1) per line blocking provided by the
telephone company for specific groups (2) per line blocking
provided by the telephone company for all customers except those
who want their telephone numbers to be delivered, and (3) per
call blocking on an automatic or operator assisted basis.
Additionally, these options can be offered in combination and
free to the user or on a fee basis. In the NPRM, we sought
comment on and analysis of the relative merits, technical
feasibility and foreseeable costs to carriers and customers of
establishing a requirement that interstate caller ID incorporate
a per call blocking option. The record demonstrates ample
support for the adoption of an automatic per call blocking
requirement on interstate caller ID offerings. We discuss each
alternative below and affirm the tentative conclusion reached in
the NPRM that carrier provided per line blocking mechanisms are
unduly burdensome. We affirm that automatic per call blocking is
the most responsive alternative to the needs of calling and
called parties for interstate calls. Finally, we request comment
on whether, and how, these policies should apply to other
services, such as delivery of the calling party name.

39. Per Line Blocking for Specific Groups. Pennsylvania
PUC states that per call blocking should be available to all
subscribers, but free per line blocking should be made available
to groups that demonstrate a higher privacy need than the
population at large. These groups include non-profit, tax-exempt
domestic violence agencies; home telephone numbers of staff
members of such agencies; federal, state and local law
enforcement; and individuals who have a need for blocking to
mitigate the risk of personal injury, as certified by a law
enforcement agency. MCI proposes a limited blocking option to
protect public safety groups. US West states that its experience
with free per line blocking for "special needs" subscribers
proved cumbersome and unfair because US West is uncomfortable
with determining what groups or individuals have special needs.

40. Commenters that advocate the availability of per line
blocking only for certain groups with heightened privacy needs do
not address how this mechanism would be implemented on an
interstate basis. The two entities that could determine
eligibility for privacy protection under this proposal would be
the carriers or the government. If the choice is left to the
carrier or carriers offering interstate caller ID, the carrier
must determine which individual subscribers are entitled to
privacy protection. Issues that arise in this determination
include: Do certain types of law enforcement personnel have
greater needs than others? Do domestic violence shelters have
greater needs than teenage runaway facilities? Do individuals
who work for these organizations have needs? How would these
individuals be identified? How would determinations be kept
current? What appeal rights would be available? These social
questions are generally not the type of issues resolved by
carriers. We conclude, on the basis of this record, that per
line blocking for a special needs category as a federal model is
not optimal. It would unnecessarily increase the role of the
federal government or carriers in making privacy choices for
subscribers. Other regulatory alternatives to address privacy
are available on a more equitable basis and do not unduly hamper
the viability of CPN based services.

41. Per Line Blocking Available to All Subscribers.
Consumer Action contends that the only way to ensure that all
residential customers do not involuntarily deliver their numbers
to caller ID equipment is to require availability of per line
blocking. Consumer Action supports its argument that per line
blocking would not undercut the usefulness of caller ID by citing
Centel's statement that, after 6 months of offering caller ID
with a per line blocking option, there was no substantial
decrease in individuals subscribing to caller ID. Missouri
Counsel states that the absence of free per line blocking
effectively eliminates the protection that unlisted numbers
provide.

42. DMA asserts that per line blocking would drive up the
cost of service and further, that if per line blocking becomes
widespread, direct marketers may be unable to use caller ID
service for a substantial segment of their customer base, and
smaller businesses may find the service unattractive. Rochester
notes that in a survey it conducted, 66% of respondents made 75%
of their calls to people who already knew their telephone number,
and 83% made at least 50% of their calls to people who knew their
number. Rochester concludes that per line blocking is only
marginally useful and substantially degrades the value of caller
ID by causing unnecessary blocked calls. USTA concurs that in
the vast majority of calls, identification of the calling number
is of little consequence to the calling party. AT&T points out
that per line blocking destroys the lifesaving potential of
caller ID for line blocked callers of emergency numbers such as
police stations because a caller in distress may forget how to
use the unblocking code.

43. In the NPRM, we tentatively concluded that per line
blocking unduly burdens calling party number based services
overall by failing to limit its applicability to those calls for
which privacy is of concern to the caller. The Commission noted
that even in the case of law enforcement personnel, there may be
a need to maintain calling number privacy on some calls, but that
the same number may be used to telephone other law enforcement
personnel, victims of crimes, cooperative witnesses, and family
or friends. The Commission asserted that in these types of
calls, calling number privacy is not needed and calling number
identification can actually be a valuable piece of information
for both the caller and called parties. The record reflects the
useful nature of CPN based services, and the comments of
Rochester illustrate that callers are likely to be interested in
blocking only a small percentage of their calls. The comments of
USCG illustrate the usefulness of caller ID to emergency
services. In contrast, Missouri Counsel's analogy to unlisted
numbers is inapposite because caller ID only permits parties
called by the calling party to capture the calling party number,
and then only if the calling party has not activated a per call
blocking mechanism. We find that the availability of per call
unblocking does not cure the ill effects of per line blocking.
Moreover, in an emergency, a caller is not likely to remember to
dial or even to know to dial an unblocking code. For the
foregoing reasons, we find that a federal per line blocking
requirement for interstate CPN based services, including caller
ID, is not the best policy choice of those available to recognize
the privacy interests of callers. Thus, carriers may not offer
per line blocking as a privacy protection mechanism on interstate
calls. We agree that certain uses of captured calling numbers
need to be controlled, and address that issue infra.

44. Operator Assisted Per Call Blocking. There is little
support in the record for operator assisted per call blocking.
Live operator assisted blocking may have a chilling effect on
callers who do not choose to disclose the calling number.
Dialing three additional digits to invoke privacy as is required
with automatic per call blocking is much less cumbersome to the
caller than having to connect to a live operator and explain that
the caller wishes to place an anonymous call. The practical
effect of a system of operator assisted blocking appears to be
that privacy is not invoked, based on the Canadian experience
wherein out of one million calls, only two were blocked. We
also note that live operator assisted blocking was not envisioned
as part of the technology of caller ID during the SS7 standards
setting process. The ANSI and Bellcore standards contemplate
automatic per call or per line blocking. If the advanced
technology of the network is capable of sustaining an automated
blocking function, it is not in the public interest to ignore the
technology and require less efficient, more cumbersome live
operator assistance.

45. Automatic Per Call Blocking. Under this approach, a
caller dials a three digit code, e.g. *67 (or 1167 for rotary or
pulse-dialing phones), to indicate that the calling number should
be blocked. The majority of commenters supporting a per call
blocking system advocate an automatic free per call method. For
example, the Ad Hoc Users and NTIA state that per call blocking
best balances the privacy interests of both the calling and the
called party. Although Bell Atlantic opposes blocking, it states
that if the Commission decides to require blocking, per call
rather than per line should be adopted. The IIA notes that
several states already require free per call blocking. Further,
IIA proposes that the Commission take into account that consumer
expectations have solidified on this issue.

46. We agree with the majority of commenters that
availability of automatic per call blocking best addresses the
privacy needs of both the calling and called parties. We note
that the majority of jurisdictions using this method on a local
basis are using *67 (or 1167 for rotary or pulse-dialing phones)
as the dialing digits and we adopt the same dialing method in our
interstate rules. As discussed in the NPRM, a regulatory
approach to privacy should not be so burdensome to the service
that it destroys its value and thus fails to take into account
the privacy needs of the called party. Per line blocking has
this effect. On the other hand, a blocking mechanism should not
be so difficult to invoke as to fail to recognize the legitimate
privacy concerns of some callers. Operator assisted blocking has
this effect. The best balance for the competing interests of the
calling and called parties is automatic per call blocking. The
option of dialing a few additional numbers to invoke privacy when
privacy is sought is a beneficial service that should be
available to consumers. Similarly, caller ID is beneficial to
the called party who should be able to receive the calling party
number in all instances where identification of the calling
number is of no consequence to the caller or where the caller may
desire identification.

47. The rules require per call blocking as the model for
privacy protection on interstate calls. As a matter of
simplicity and uniformity, per call blocking allows callers to
travel from phone to phone and make an informed privacy decision.

Per line blocking may create caller confusion when a caller
places a call from a phone over which the caller may be uncertain
whether it is equipped with per line blocking. It appears that
some carriers offering per call unblocking together with per line
blocking use the same *67 code both for unblocking presubscribed
privacy lines and for blocking lines that are not pre-blocked.
Thus, a caller may inadvertently disable privacy protection by
dialing *67 (or 1167 for rotary or pulse-dialing phones) to
invoke privacy from a phone that is already subscribed to per
line blocking. A per call blocking system avoids this unintended
result and allows callers to make decisions according to the
unique calling circumstances of each call. Automatic per call
blocking is easily used on a ubiquitous interstate basis, and
eliminates customer confusion.

48. Our objective in this proceeding is to establish
federal policies governing the passage by carriers of CPN on
interstate calls. We believe carriers should provide callers the
option of withholding their numbers from called parties on a per
call basis. It is important to note, however, that consumer
choice is not limited to the options provided by carriers.
Various companies have registered with the Commission, under
provisions of Part 68 of our rules, equipment that, for example,
automatically would insert a blocking prefix on each call going
out over a particular line. Such devices are available for as
little as $40.00 per unit. We believe general interstate passage
of CPN throughout the telephone network, except in those
individual circumstances where privacy is important to the
calling party, promises important efficiency and productivity
gains for our economy. However, individuals wishing to install
these devices and thereby screen all originating interstate calls
may elect to do so. Such a choice may create caller confusion
if others entitled to use the line are unaware of the purpose of
the device, or may place health and safety at risk if the device
conceals the calling party's location or identity from emergency
services, but these are not harms to the network. Requiring
callers seeking universal blocking to purchase such devices,
however, ensures this choice is not made lightly.

49. The majority of commenters supporting per call blocking
also propose that per call blocking be free to the calling party.

We note that this is in keeping with the blocking policies
adopted by the majority of states for intrastate calls. Per
call blocking capability is an inherent capability of SS7
technology. The design of caller ID contemplates the use of
software programs that permit either a customer to activate a
"block" on any particular call, or the central office to activate
a block on the line. In no circumstance is the information
actually "blocked" from the carrier; the terminating central
office will receive the calling number. In addition, on all
interstate calls handled by SS7, the call setup message contains
a calling party number parameter that includes a privacy
indicator. Under our rules, this "privacy flag" travels with the
call setup message through to the destination central office of
the terminating carrier. Thus, there are no significant
additional SS7 costs associated with per call blocking. Several
commenters note that there are costs associated with populating
the privacy flag at the originating end and reading it and
passing it on to the subscriber at the terminating end. Our
requirement that carriers transmit CPN includes the provision of
per call blocking capability at the originating end and of
facilities that read and honor the privacy indicator at
terminating end. Any blocking costs can be readily absorbed
because the calling party number and privacy flag are integral
elements of SS7. Moreover, we find that charging the caller for
per call blocking beyond the costs of deploying SS7 would disrupt
the balance that per call blocking establishes between the
privacy interests of the caller and called party. Charging for
per call blocking heightens the burden upon the caller to invoke
privacy and does not appear to be necessary for the overall
viability of the service.

50. Applicability to Additional Services. In addition to
calling party number delivery, SS7 technology permits delivery of
calling party name via an optional parameter that is separate
from the calling party number parameter. We tentatively
conclude that our policies for calling party number delivery
should apply equally to services delivering calling party name,
and we seek comment on this tentative conclusion. Commenters
should address any differences that may exist in the privacy
considerations that apply to calling party name delivery as
opposed to calling party number delivery. Commenters should also
address whether the policies for subscriber privacy should extend
to other services, such as services that permit subscribers to
automatically return calls or to selectively forward calls.


F. ANI and Caller Privacy.

51. In the NPRM the Commission noted that interstate ANI,
or its SS7 equivalent "charge number" parameter, already
identifies the billing number of a call to interstate subscribers
of ANI service, and is used by the LECs and IXCs for billing
purposes. IXCs, however, sometimes deliver ANI to 800 and 900
service subscribers via a dedicated line. The NPRM requested
comment on whether there are privacy interests associated with
the transmission of ANI to 800 and 900 service subscribers or
information service providers, and if so, what approaches should
be considered to address the issue. The Commission noted that
one possible approach would be to require businesses to obtain
the consent of the caller before revealing the caller's telephone
number to any third party. In this order we adopt such an
approach.

52. The majority of commenters conclude that it is not
technically feasible to block identification of ANI-based
interstate calling number in the same way as SS7-based calling
party number because it is the billing number that LECs must
provide to IXCs. Allnet proposes that LECs be required to
provide a privacy indicator with ANI. AT&T notes that ANI or the
SS7 equivalent "Charge Number" do not currently have a privacy
indicator that would signal the terminating carrier to block the
passing of the billing telephone number to the called party.
AT&T concludes that blocking requirements adopted by the
Commission should not extend to the delivery of ANI. Nynex notes
that under its SS7 interconnection tariff, in those cases where
the billing number and the CPN are the same, the calling party
number parameter will provide the billing number and the charge
number will not be sent. Nynex adds that, where there is a
difference between the billing number and the calling party
number, the charge number parameter will provide the billing
number.

53. Citicorp contends that proposals to limit the use of
ANI are contrary to the Communications Act's purpose of promoting
new telecommunications technologies. Illinois CC states that ANI
is needed to promote competition, and to restrict the use of ANI
in any way would undermine this policy goal. Ad Hoc Users,
ARINC, and Citicorp identify many beneficial uses of ANI
transmission. Ad Hoc Users adds that these significant
benefits are unfairly characterized by NYS Law as a "plague of
unsolicited marketing calls." It notes that prohibiting
transmission of ANI would shut down existing ANI applications and
would not allow new applications until SS7 interconnection of
LECs with IXCs is almost ubiquitous.
54. IIA states that because the transmission of ANI cannot
be blocked, the focus must shift from whether the called party
receives it to how the recipient uses the data. It states that
questions presented by use of ANI data are transitional and ANI
subscribers can be expected to migrate to SS7-based caller ID.
In the meantime, IIA proposes the Commission rely upon voluntary
and industry initiated efforts to explain to consumers how
information about them is gathered and used. NARUC argues that
denying commercial ANI purchasers the information ANI provides
will give carriers an incentive to expedite development of CPN
based services. Baer, Colorado DVC, Consumer Action, Michigan
PSC, and others suggest that if the Commission allows for either
per line or per call blocking, then it should also restrict the
availability of ANI exclusively to LECs and IXCs. NTIA
recommends that the Commission direct interested carriers and
manufacturers to report on the modifications needed to implement
caller blocking of ANI to the called party and formulate a plan
for so modifying existing ANI over a period of years. Sprint
concurs that ANI should be subject to privacy indicators, insofar
as technology permits.

55. Unlike the privacy indicator that can be placed on the
calling party number with respect to caller ID, the calling party
cannot place a privacy flag on ANI or its SS7-based equivalent,
the charge number parameter. Therefore, some parties suggest
that the availability of ANI be restricted exclusively to LECs
and IXCs, and should not be passed on to 800 and 900 service
subscribers for billing, routing, or other purposes. Other
commenters respond, however, that ANI is needed to sustain
beneficial services currently offered.

56. We conclude that the public interest would be served by
continuing to permit telephone companies to deliver ANI to 800,
900, and other business subscribers who pay for transmission of
the call. ANI has been available to these end users without a
privacy mechanism for several years and, as indicated above, has
spurred a multitude of beneficial applications. While we are
concerned that callers' reasonable expectation of privacy not be
violated, we do not believe that the public would be served by
terminating all access to ANI by subscribers to 800 and 900-type
services. Ad Hoc Users points out that ANI service permits the
receipt of calling numbers in real time but would not usually
provide information beyond that which such subscribers will
receive in any event on their telephone company bills because the
called party pays for the call. It states that such realtime
provision of ANI benefits calling parties by permitting a number
of substantial customer service enhancements.

57. In weighing these various public interest concerns, we
are aware that the continued deployment of SS7 throughout the
telephone networks makes available a blockable alternative to
ANI. However, where the called party pays for the interstate
call (e.g., 800 and 900 service subscribers), the situation is
somewhat analogous to a collect call regarding expectations of
confidentiality by the calling party. We believe the best
approach is to require education by the carriers (see Section G,
infra) and to restrict how 800 and 900-type service subscribers
may use ANI data. Resale of the ANI number to create marketing
lists or other information about callers without their consent
has generated much of the opposition to the availability of ANI.
Bills to restrict such practices have been introduced in Congress
and commenters in this proceeding have addressed the implications
of unrestricted availability of information about callers.
Colorado DVC, NTIA, and others urge the Commission to prohibit
the resale or use of ANI for uses

  
other than call management,
billing, or customer services employed directly by the subscriber
to ANI end user services. To address these privacy concerns, we
prohibit the reuse or sale of ANI information by 800, 900, and
other service subscribers absent affirmative subscriber consent.
We permit the use of ANI for call management and routing
functions.

58. Concerns also have been expressed regarding the use of
ANI by 800 and 900-type service subscribers for solicitation.
For example, ANI can be used to place return calls to telephone
customers who previously have contacted an ANI 800 or 900-type
services subscriber. In this regard, Nynex proposes that use of
ANI be limited to performing and verifying transactions requested
by the caller. ARINC, on the other hand, argues that such a
restriction would diminish too severely the value of ANI for
businesses and customers. We conclude that an ANI services
subscriber may use ANI to offer products or services to an
established customer that are directly related to products or
services previously provided by the ANI services subscriber to
that customer. ANI services subscribers may also wish to
compile ANI information in an aggregate form, either to improve
operations or as a marketing tool. Our rules permit disclosure
of ANI information in aggregate form if it is compiled in a
manner which precludes identification of individual telephone
subscribers.

G. Subscriber Education, Further Notice of Proposed
Rulemaking.

59. In the NPRM, the Commission stated that carriers
offering calling party number, or facilitating transmission of
interstate caller ID, should be required to inform callers of the
availability of the service, including instructing callers how to
implement any caller privacy mechanisms. The Commission noted
that no segment of the calling public can adequately control
dissemination of the calling number under any regulatory
structure if they are unaware that their calling number is being
identified. The majority of commenters agreed that subscriber
education is in the public interest and should be implemented
with the introduction of interstate calling party number based
services, including caller ID. Commenters also expressed concern
over the education of callers whose numbers are identified via
ANI-based services.

60. We affirm our tentative conclusion that deployment of
interstate calling party number services should be accompanied by
consumer education regarding the availability of identification
services and how to invoke the privacy protection mechanism. The
record indicates that consumer information is essential to public
understanding of any privacy mechanisms associated with caller
identification services. Accordingly, we amend our rules to
require that carriers participating in the offering of services
that deliver calling party number, including ANI or charge
number, on interstate calls must notify their subscribers that
their telephone numbers may be transmitted to a called party.
In addition, such carriers must inform their subscribers of the
privacy mechanism available on interstate calls, and must explain
how subscribers can activate the privacy mechanism. Even though
the ability of the caller to activate a privacy flag is not yet
ubiquitous on calls to ANI or charge number services subscribers,
ANI or charge number services increasingly are offered through
SS7 networks, and an education effort will be most effective if
it anticipates the greater availability of a privacy flag. For
ANI or charge number services for which such privacy is not
provided, the notification must inform telephone customers of the
restrictions on the reuse or sale of subscriber information. We
specifically request further comment on whether we should
prescribe detailed instructions regarding what form education
should take or prescribe more precisely responsibilities of
various carriers. We are particularly interested in specific
joint industry education proposals (see comments of IIA, supra,
para. 54).

H. CPNI and Subscriber Privacy.

61. Privacy issues are also raised by telephone companies'
use of customer proprietary network information, or CPNI. The
Commission's current CPNI rules govern the BOCs' use of CPNI in
marketing enhanced services and CPE. The CPNI rules are
designed to balance considerations of customer privacy,
efficiency, and competitive equity. In recent months, however,
the communications industry has witnessed large local exchange
carriers' planning and entering into alliances, acquisitions, and
mergers with non-telephone company partners. In this changing
environment, access to CPNI among affiliated companies may
heighten concerns. Thus, we will seek further comment from the
public on whether the existing CPNI safeguards will adequately
meet customers' reasonable privacy expectations in the future.
The CPNI rules are currently under reconsideration in the
Computer III Remand Proceeding, and the privacy concerns related
to CPNI are more appropriately addressed in that proceeding.
Therefore, we are releasing a public notice in CC Docket No. 90-
623 seeking further comment, particularly on the issue of
residential and small business customers' CPNI-related privacy
concerns.


I. Wiretap Statutes and Caller ID.

62. In the NPRM, the Commission noted that some parties
suggest that caller ID may violate the Federal Wiretap Act
(Wiretap Act), 18 U.S.C.  3121-3127 or the Electronic
Communications Privacy Act (ECPA), 18 U.S.C.  2511. Colorado
DVC, DC OPC, NASUCA, and Ohio OCC reiterate this contention.
Other commenters such as Allnet, Bell Atlantic, Ameritech, and
AT&T argue that caller ID is permissible under ECPA or the
consent provisions of the Wiretap Act as "trap and trace"
devices. Pacific adds that caller ID is not the type of activity
that Congress intended to include in ECPA. Pacific points out
that trap and trace laws are designed to prevent surreptitious
wiretaps by the police and other parties and caller ID is not
such a wiretap because it is a tariffed service offered uniformly
and publicly to all customers.

63. In accordance with its statement in the NPRM that it
would solicit the views and analysis of the Department of
Justice, the Commission's General Counsel requested the
Department of Justice's opinion on the issue. In its reply
memorandum, the Department of Justice (DOJ) concludes that the
federal wiretap statutes embodied in the Federal Criminal Code do
not pose a barrier to interstate caller ID service. We adopt the
Department's analysis and conclusions on this issue, and are
incorporating the Department's memorandum into this Report and
Order. See Appendix D.


J. Relationship between Interstate and Intrastate Caller
ID.

64. In the NPRM, the Commission sought comment on whether
state policies concerning calling party number based services,
including caller ID, negate or hinder the development of
interstate caller ID, ANI, or both. In analyzing whether
interstate and intrastate models may coexist harmoniously both
legally and technologically, the Commission did not propose to
preempt any specific state regulation governing intrastate caller
ID. Rather, we found that it is necessary to review existing
state policies individually in order to determine whether
preemption is necessary. Many commenters, including AT&T, GTE,
and MCI, propose that the Commission use its authority to preempt
the states if state regulations impede interstate caller ID
offerings. Pacific concurs that the Commission may preempt state
regulation of caller ID because the service is not separable into
interstate and intrastate portions and state regulation
frustrates a valid federal policy.

65. Some commenters, including Ameritech, Sprint, Bell
Atlantic, and BellSouth, contend that the terminating carrier
should be required to honor any blocking indicators that are
present on interstate calls on a per call basis. BellSouth
proposes that the Commission should defer to each state's
determination of blocking options available for calls originating
in that state. Some commenters, including Colorado DVC,
Connecticut, and Consumer Action, concur that the Commission
should defer to state policies on blocking because state
regulators are more attuned to local factors including history,
culture, custom and legal environment. State commenters,
including Indiana Utility Counsel, Illinois CC, and Missouri PSC,
contend that preemption is unwarranted and untimely because
states should be able to develop standards that provide more, but
not less privacy protection to consumers. NARUC argues that
preempting state caller ID policies is inappropriate from both a
legal and policy perspective. NARUC proposes that the Commission
devise a plan that carries out federal objectives but can
substantially coexist with various state blocking plans. Some
commenters concur with NARUC and contend that federal and state
rules can coexist.

66. Many commenters, including AT&T and Pacific, contend
that existing technology renders it infeasible for carriers to
comply with one set of blocking requirements for intrastate and a
different set of standards for interstate caller ID. Allnet,
NTI, and Bell Atlantic contend that privacy standards should
apply to intrastate, interstate and international communications
and that different standards would require more complex
equipment. Specifically, Bell Atlantic asserts that substantial
development and expense over several years would be necessary to
accommodate differing interstate and intrastate standards.

67. Nynex, USTA, and SNET contend that different state and
federal policies on caller ID create caller confusion, and that a
uniform national policy for caller ID would minimize consumer
confusion. The California PUC proposes that the Commission, if
it allows interstate caller ID, should not preempt more
restrictive state privacy protections adopted for intrastate
caller ID, and instead should defer to the more restrictive
requirements in each of the states.

68. As is discussed in Section A, supra, interstate passage
of calling party number serves the public interest by making it
possible for telecommunications service providers to offer
beneficial new communications services that directly and
indirectly can increase the business sector's efficiency and
residential customers' access to information and other services.
In this proceeding we will require carriers having SS7 capability
to transmit CPN to interconnecting carriers. Recognizing that
there may be situations in which the calling party wishes to
preserve privacy, we establish *67 (and 1167 for rotary or pulse-
dialing phones) as the mechanism by which this may be done on
interstate calls. Carriers must honor a caller's choice to use
this blocking mechanism. These policies strike a reasonable
balance among significant competing interests, including
reasonable privacy expectations and economic growth. Our
approach ensures that the privacy rights of the caller are not
unreasonably infringed upon by the policies of the state where
the call terminates (in those states offering unlimited caller ID
a blocking request from another state might not otherwise be
honored) nor are the concerns of the called party unreasonably
infringed upon by the policies of the state where the call
originates (unqualified, free per line blocking likely would
significantly increase the number of blocked interstate calls).

69. We are sensitive to states' interests in protecting the
privacy of their residents, but note that limited preemption of
state regulations is necessary in some instances to ensure that
our goal of facilitating the development of interstate calling
party number based services is not frustrated by inconsistent
state law, and that state decisions with respect to caller ID or
other calling party number based services do not infringe upon
the privacy interests of parties in other states. Accordingly,
we preempt state regulation of caller ID or other calling party
number based services as follows: states may not prohibit
automatic per call blocking for interstate calls, require a
blocking alternative for interstate calls different from the one
adopted in this proceeding, or prohibit the offering of
interstate caller ID services. Thus, states may not prohibit
carriers from offering interstate services based on calling party
number, including caller ID service. States will not be able to
require the use of digits other than *67 (or 1167 for rotary or
pulse-dialing phones) for automatic per call blocking on
interstate calls, nor require carriers offering or participating
in the interstate transmission of calling party number to provide
blocking systems that interfere with the use of *67 (or 1167 for
rotary or pulse-dialing phones) to achieve blocking. Preemption
is necessary in these cases to ensure that state regulations do
not interfere with the achievement of important federal
objectives, and with the Commission's exclusive jurisdiction over
interstate communications.

70. To the extent that inconsistent regulations cannot be
accommodated simultaneously for interstate and intrastate caller
ID services, some further preemption of state regulations may
become necessary. We will examine the need for such additional
preemption on a case-by-case basis. For example, there may be
cases in which state caller ID requirements applicable to
intrastate calls would, as a practical matter, make it impossible
for carriers to implement per call blocking for interstate calls.

We are reluctant to preempt state authority over intrastate
communications, and will endeavor to accommodate state
regulations whenever possible. State policies, however, must not
frustrate the paramount federal interest in a cohesive interstate
communications policy, and must not be allowed to infringe
unreasonably upon the privacy interests of the citizens of other
states.


III. CONCLUSION

71. Our goal in this proceeding is to establish a federal
policy to govern the passage of calling party number among
carrier networks. In this order we find that a federal model for
interstate delivery of calling party number is in the public
interest, that the model must protect calling party privacy, and
that certain state regulations of interstate caller ID must be
preempted. Accordingly, we amend Part 64 of the rules to require
that common carriers using Common Channel Signalling System 7
(SS7) and subscribing to or offering any service based on SS7
functionality must transmit CPN and its associated privacy
indicator on interstate calls. We require that carriers offering
CPN based services provide automatic per call blocking at no
charge to interstate callers, and that the privacy indicator be
honored by terminating carriers. We find that the costs of
interstate transmission of CPN are de minimis, and that the CPN
should be transmitted among carriers without additional charge.
We require that carriers participating in the offering of any
service that delivers CPN on interstate calls must inform
telephone subscribers regarding the availability of
identification services and how to invoke the privacy protection
mechanism. We also seek comment on whether more specific
subscriber education requirements should be imposed. We restrict
the reuse or sale of telephone numbers by subscribers to
automatic number identification (ANI) or charge number services.
We note that additional comments are sought in the Computer III
Remand Proceeding on whether residential and small business
customers' privacy concerns warrant revision of the Commission's
rules governing reuse and sale of customer proprietary network
information (CPNI). Finally, we seek comment on extending the
policies adopted herein to other services that might identify the
calling party.

72. We expect the rules and policies adopted herein will
support the efforts of carriers, standards setting bodies,
states, CPE manufacturers, and others in providing CPN-dependent
services in an efficient manner. In this federal model, we
recognize the value and benefits to the public of interstate CPN
services, we promote the transmission of the calling party number
from the originating carrier to the terminating carrier, and we
balance the reasonable privacy expectations of both the calling
and the called party. The rules we adopt to govern services such
as interstate caller ID service remove obstacles to their
development posed by uncertainty and non-uniform state policies
and should facilitate implementation of new and beneficial
interstate services.


IV. PROCEDURAL MATTERS

73. Ex Parte Rules - Non-Restricted Proceeding. The
Further Notice of Proposed Rulemaking is a nonrestricted notice
and comment rulemaking proceeding. Ex Parte presentations are
permitted, except during the Sunshine Agenda period, provided
they are disclosed as provided in Commission rules. See
generally 47 C.F.R. Sections 1.1202, 1.1203 and 1.1206(a).

74. Final Regulatory Flexibility Analysis: Pursuant to the
Regulatory Flexibility Act of 1980, 5 U.S.C.  601 et seq., the
following final analysis has been prepared:

I. Need for and objective of the rules:

This Report and Order adopts policies governing the
transmission of the calling party number parameter and its
associated privacy indicator on interstate calls. Several
commenters to the NPRM in this proceeding have identified a
number of potential uses for interstate calling party number
based services, including caller ID, and have indicated that it
also will improve certain existing communication service
offerings. We find that the potential benefits of interstate
passage of calling party number far exceed any negative effects.
We thus adopt the conclusion reached in the NPRM that interstate
caller ID and other calling party number based services are in
the public interest and should be available to interstate
subscribers nationwide pursuant to the policies and rules set
forth in this order.

II. Summary of issues raised by the public comments in
response to the Initial Regulatory Flexibility Analysis:

No comments were submitted in direct response to the Initial
Regulatory Flexibility Analysis.

III. Significant alternatives considered:

The NPRM in this proceeding requested comments on several
proposals as well as the views of commenters on other
possibilities. The Commission has considered all comments and
has adopted regulations which require the passage of calling
party number where SS7 is deployed, facilitate interstate calling
party number based services, including caller ID, and implement
federal policy on privacy.

75. Initial Regulatory Flexibility Act Analysis on the
Further Notice of Proposed Rulemaking

An Initial Regulatory Flexibility Analysis is contained
Appendix A to this Report and Order and Further Notice of
Proposed Rulemaking.

76. Comment Dates

Pursuant to applicable procedures set forth in Sections
1.415 and 1.419 of the Commission's rules, 47 C.F.R.  1.415 and
1.419, interested parties may file comments on or before May 18,
1994 and reply comments on or before June 21, 1994. To file
formally in this proceeding, interested parties must file an
original and four copies of all comments, reply comments, and
supporting documents with the reference number "CC Docket 91-281"
on each document. If interested parties want each Commissioner
to receive a personal copy of comments, interested parties must
file an original plus nine copies. Interested parties should
send comments and reply comments to the Office of the Secretary,
Federal Communications Commission, Washington, DC 20554.
Comments and reply comments will be available for public
inspection during regular business hours in the FCC Reference
Center, Room 239, Federal Communications Commission, 1919 M
Street, N.W., Washington, DC. Copies of comments and reply
comments are available through the Commission's duplicating
contractor: International Transcription Service, Inc. (ITS,
Inc.), 2100 M Street, N.W., Suite 140, Washington, DC 20037,
(202) 857-3800.

V. ORDERING CLAUSES

77. Accordingly, It Is Ordered, that, pursuant to authority
contained in Sections 1, 4(i), 4(j), 201-205 and 218, of the
Communications Act of 1934, as amended, 47 U.S.C.  151, 154(i),
154(j), 201-205, and 218, Part 64 of the Commission's Rules and
Regulations ARE AMENDED as set forth in Appendix C hereof,
effective April 12, 1995.

78. It Is Further Ordered, that, pursuant to authority
contained in Sections 1, 4(i), 4(j), 201-205 and 218, of the
Communications Act of 1934, as amended, 47 U.S.C.  151, 154(i),
154(j), 201-205, and 218, Further NOTICE OF PROPOSED RULEMAKING
is hereby provided as indicated above.

79. It Is Further Ordered, that, the Secretary shall cause
a summary of this Report and Order and Further Notice of Proposed
Rulemaking to be published in the Federal Register which shall
include a statement describing how members of the public may
obtain the complete text of this Commission decision. The
Secretary shall also provide a copy of this Report and Order
Further Notice of Proposed Rulemaking to each state utility
commission.

80. For further information regarding this Report and Order
and Further Notice of Proposed Rulemaking, contact Suzanne
Hutchings, Common Carrier Bureau, Domestic Facilities Division,
(202) 634-1802.

FEDERAL COMMUNICATIONS COMMISSION



William F. Caton
Acting Secretary




APPENDIX A

INITIAL REGULATORY FLEXIBILITY ANALYSIS

Reason for Action

This rulemaking proceeding is initiated to obtain comment on
whether the Commission should adopt rules providing for
subscriber education on interstate calling party number delivery,
and for the application of federal rules and policies for
interstate calling party number delivery to interstate calling
party name delivery.

Objectives

The Commission seeks to establish an environment in which
interstate calling party number based services are made possible
and advantages of a uniform regulatory framework are realized.

Legal Basis

The proposed action is authorized under Sections 1,4, 201-205,
218 of the Communications Act of 1934, as amended, 47 U.S.C.
151, 154, 201-205, 218.

Reporting, Recordkeeping and Other Compliance Requirements

This Further Notice seeks comment on whether more specific
subscriber education requirements should be imposed on those
offering calling party number based services, and on whether and
how rules and policies on interstate delivery of calling party
number should apply to interstate calling party name delivery
services.

Federal Rules Which Overlap, Duplicate or Conflict With These
Rules

None.

Description, Potential Impact, and Number of Small Entities
Involved

Rule revisions in this proceeding could affect carrier's
offering of interstate calling party name and number based
services such as caller ID service. After evaluating the
comments and reply comments in this proceeding, the Commission
will examine further the impact of any rule changes on small
entities, and will set forth its findings in the Final Regulatory
Flexibility Analysis.

Any Significant Alternatives Minimizing the Impact on Small
Entities Consistent with the Stated Objectives

The FNPRM solicits comment on any significant alternatives
minimizing the impact on small entities consistent with the
stated objectives.
APPENDIX B

Commenters

AD HOC Telecommunications Users Committee (Ad Hoc Users) *
Aeronautical Radio, Inc. (ARINC) **
Alaska - Alaska Public Utilities Commission (Alaska PUC)
ALLNET (Allnet)
American Osteopathic Association (AOA) **
American Telephone & Telegraph (AT&T) *
Ameritech Operating Companies (Ameritech) *
Arizona Corporation Commission (Arizona CC) *
Baer, Joseph (Baer)
Bell Atlantic Telephone Companies (Bell Atlantic) *
BellSouth Corporation (BellSouth) *
Bliley, Representative Thomas Jr. et al. (Committee on Energy and

Commerce)
California, Consumer Affairs of the State of (California Consumer

Affairs) *
California Public Utilities Commission (California PUC) *
Central Telephone Company (Centel) *
Citicorp (Citicorp) **
Colorado Domestic Violence Coalition (Colorado DVC)
Colorado Office of Consumer Counsel (Colorado Consumer) *
Connecticut, Attorney General for the State of (Connecticut)
Consumer Action (Consumer Action) *
Consumer Federation of America (CFA)
Computer Professionals for Social Responsibility (CPSR) *
Direct Marketing Association (DMA) *
District of Columbia, Office of the People's Counsel (DC OPC)
Georgia Consumer's Utility Counsel (Georgia CUC)
GTE Service Corp. (GTE) *
Illinois Commerce Commission (Illinois CC)
Indiana Office Of Utility Consumer Counselor (Indiana Utility
Counselor)
Indiana Utility Regulatory Commission (IURC)
Information Industry Association (IIA)
Iowa Office of Consumer Advocate (Iowa) *
Jackson, Ms. Patricia L. (Jackson)
Kentucky, Attorney General of the Commonwealth (Kentucky)
McCaw Cellular Communications (McCaw) *
Maryland People's Counsel (Maryland PC) *
Massachusetts, Office of the Attorney General (Massachusetts)
MCI Communications (MCI) *
Medical Society of New Jersey (MSNJ)
Metromedia (Metromedia)
Michigan Public Service Commission (Michigan PSC)
Missouri Office of the Public Counsel (Missouri Counsel)
Missouri Public Service Commission (Missouri PSC)
National Association of Regulatory Utility Commissioners (NARUC)*
National Association of State Utility Consumer Advocates
(NASUCA)*
National Telephone Cooperative Association (NTCA)
National Telecommunications and Information Administration
(NTIA)**
New York City, Department of Telecommunications & Energy (NYC
Telecom)
New York, Public Utility Law Project, Inc. (NY Law Project)
New York State Consumer Protector Board (NYS Consumer)
New York State Department of Law (NYS Law) *
New York State Department of Public Service (NYS PSC) *
North Carolina, Attorney General (North Carolina)
Northern Telecom Inc. (NTI) *
NYNEX Telephone Companies (Nynex) *
Ohio, Office of the Consumer's Counsel (Ohio OCC) *
Ohio State University (Ohio State University) **
Pacific Bell and Nevada Bell (Pacific) *
Pennsylvania Public Utility Commission (Pennsylvania PUC)
Pilgrim Telephone (Pilgrim)
Project Designed Systems (PDS) **
Rochester Telephone Corporation (Rochester)
Southern New England Telephone Company (SNET)
Southwestern Bell Telephone Company (SWB) *
Sprint Corporation (Sprint) **
Telocator (Telocator)
Texas Office of Public Utility Counsel(Texas PUC)
Texas, State of (Texas)
United States Coast Guard (USCG)
United States Telephone Association (USTA) **
United Telecommunications Inc. (United)
US West (US West) **
Virginia State Corporation Commission (Virginia CC)
Washington Utilities And Transportation Commission (Washington
UTC)
Yellow Pages Publishers Association (YPPA)

Numerous letters from individuals were also received. All
comments and letters were considered.

* also filed reply comments
** filed only reply comments


APPENDIX C


Part 64 of the Commission's Rules and Regulations (chapter 1 of
Title 47 of the Code of Federal Regulations, part 64) is
amended as follows:

1. The authority citation for Part 64 continues to read as
follows:

Authority: Section 4, 48 Stat. 1066, as amended; 47 U.S.C. 154,
unless otherwise noted. Interpret or apply secs. 201, 218, 225,
226, 227, 48 Stat. 1070, as amended, 1077; 47 U.S.C. 201-4, 218,
225, 226, 227 unless otherwise noted.

2. The table of contents for Part 64 is amended to read as
follows:

Subpart O - Calling Party Telephone Number. Privacy.

 64.1600 Definitions
 64.1601 Delivery Requirements, and Privacy Restrictions
 64.1602 Restrictions on use and sale of telephone
subscriber information provided pursuant to
automatic number identification or charge number
services.
 64.1603 Customer notification.
 64.1604 Effective date.

3. Part 64 is amended to read as follows:

Subpart O - Calling Party Telephone Number. Privacy.

 64.1600 Definitions.

(a) Aggregate Information. The term 'aggregate information'
means collective data that relate to a group or category of
services or customers, from which individual customer
identities or characteristics have been removed.

(b) ANI. The term 'ANI' (automatic number identification)
refers to the delivery of the calling party's billing number
by a local exchange carrier to any interconnecting carrier
for billing or routing purposes, and to the subsequent
delivery of such number to end users.

(c) Calling Party Number. The term Calling Party Number
refers to the subscriber line number or the directory number
contained in the calling party number parameter of the call
set-up message associated with an interstate call on a
Signalling System 7 network.

(d) Charge Number. The term "charge number" refers to the
delivery of the calling party's billing number in a
Signalling System 7 environment by a local exchange carrier
to any interconnecting carrier for billing or routing
purposes, and to the subsequent delivery of such number to
end users.

(e) Privacy Indicator. The term Privacy Indicator refers to
information, contained in the calling party number parameter
of the call set-up message associated with an interstate
call on an Signalling System 7 network, that indicates
whether the calling party authorizes presentation of the
calling party number to the called party.

(f) Signalling System 7. The term Signalling System 7 (SS7)
refers to a carrier to carrier out-of-band signalling
network used for call routing, billing and management.


 64.1601 Delivery Requirements and Privacy Restrictions

(a) Delivery. Common carriers using Signalling System 7
and offering or subscribing to any service based on
Signalling System 7 functionality are required to transmit
the calling party number associated with an interstate call
to interconnecting carriers.

(b) Privacy. Originating carriers using Signalling System
7 and offering or subscribing to any service based on
Signalling System 7 functionality will only recognize *67
dialed as the first three digits of a call (or 1167 for
rotary or pulse-dialing phones) as a caller's request for
privacy on an interstate call. No common carrier
subscribing to or offering any service that delivers calling
party number may override the privacy indicator associated
with an interstate call. The terminating carrier must act
in accordance with the privacy indicator unless the call is
made to a called party that subscribes to an ANI or charge
number based service and the call is paid for by the called
party.

(c) Charges. No common carrier subscribing to or offering
any service that delivers calling party number may (i)
impose on the calling party charges associated with per call
blocking of the calling party's telephone number, or (ii)
impose charges upon connecting carriers for the delivery of
the calling party number parameter or its associated privacy
indicator.

(d) Exemptions. 64.1601 shall not apply to calling party
number delivery services (i) used solely in connection with
calls within the same limited system, including (but not
limited to) a Centrex, virtual private network, or private
branch exchange system; (ii) used on a public agency's
emergency telephone line or in conjunction with 911
emergency services, or on any entity's emergency assistance
poison control telephone line; or (iii) provided in
connection with legally authorized call tracing or trapping
procedures specifically requested by a law enforcement
agency.


 64.1602 Restrictions on use and sale of telephone
subscriber information provided pursuant to
automatic number identification or charge number
services.

(a) Any common carrier providing Automatic Number
Identification or charge number services on interstate calls
to any person shall provide such services under a contract
or tariff containing telephone subscriber information
requirements that comply with this subpart. Such
requirements shall:

(1) permit such person to use the telephone number and
billing information for billing and collection,
routing, screening, and completion of the originating
telephone subscriber's call or transaction, or for
services directly related to the originating telephone
subscriber's call or transaction;

(2) prohibit such person from reusing or selling the
telephone number or billing information without first
(A) notifying the originating telephone subscriber and
(B) obtaining the affirmative consent of such
subscriber for such reuse or sale; and

(3) prohibit such person from disclosing, except as
permitted by subparagraphs (1) and (2), any information
derived from the automatic number identification or
charge number service for any purpose other than (i)
performing the services or transactions that are the
subject of the originating telephone subscriber's call,
(ii) ensuring network performance security, and the
effectiveness of call delivery, (iii) compiling, using,
and disclosing aggregate information, and (iv)
complying with applicable law or legal process.

(b) The requirements imposed under paragraph (a) shall not
prevent a person to whom automatic number identification or
charge number services are provided from using (1) the
telephone number and billing information provided pursuant
to such service, and (2) any information derived from the
automatic number identification or charge number service, or
from the analysis of the characteristics of a
telecommunications transmission, to offer a product or
service that is directly related to the products or services
previously acquired by that customer from such person. Use
of such information is subject to the requirements of 47
C.F.R.  64.1200 and 64.1504(c).


 64.1603 Customer notification. Any common carrier
participating in the offering of services providing calling party
number, ANI, or charge number on interstate calls must notify its
subscribers, individually or in conjunction with other carriers,
that their telephone numbers may be identified to a called party.

Such notification must be made not later than April 12, 1995, and
at such times thereafter as to ensure notice to subscribers. The
notification shall inform subscribers how to maintain privacy by
dialing *67 (or 1167 for rotary or pulse-dialing phones) on
interstate calls. For ANI or charge number services for which
such privacy is not provided, the notification shall inform
subscribers of the restrictions on the reuse or sale of
subscriber information.

 64.1604 Effective Date

The provisions of Sections 64.1601 through 64.1603 shall be
effective as of April 12, 1995.


New Hack v2.0 for DOS & OS/2
by John Deere

Desc: Takes an new passwd file and only cracks new accounts or
accounts which have changed.

begin 644 newhak20.zip
M4$L#!!0````(`#&56AQ1R<NYI4<``'R=```*````3D@R3U,R+D581>R]#7Q3-
M5;8W?$YVTGPT;4);H"A($%`KH%2+4E"GI8;B1R&`;7&T(DI#[2`HS0$9":03U
MT":'7)DKSO7Z,2_X,<\X,X_CS/@!J-A2;`$=K8@."E<0D3DUJ%6Y;8#8//^U*
M]TF:%N<Z\\Y][^_YO3\CR=I[[;77_EY[[;77KA4_]D@&29*,DD-*)"1IBR0^Z
M)=)9TO=^9$G:YI2R1SYO_?.H+?+U?QZU8<,-=7<TN.Y:MG31L@5WNNY4&GRN9
MVVI=RY0E+F7)PMIEKEES+[[DHBS;F,NE_TL^U\\3T$"-H9[`/YMH&O\8\>UZ'
M#3].2;("G'8(_#8]?:=.,T;NS]>'^.HT'(5_@^^B0;P(:>4@/<&EP_62E*T'N
M&16'^.)!`VO[W9_;JL5@F%RBWAEI=:/23$Y),J>UR3=8E,)`;Q&M%I]FT6+"9
MI_<!_S@%+4&G#O-UZ-+A!01!-%X4*TW0\9.D]$*8E+&D[I*E#9?H\79TWV.H2
M<B%ROH<N?C)+DN:C*P:CIS?C^ZK^M<@?9LGGR`8I+XOE2A59!FJ426(S`#(EO
M5@3@E=CP06;I)HDU(58EL86(^01RG0#/"?"TQ,(@V21(?B&0+0+<*+,GD>:6W
MV2,`$V3V;P##9+8>X-]EMA-@G<R>`U@JLU\!Q&5FE<V2)K-NQ/;*[%.`[3)[#
M'V"B@>6#YU@#&P02EX%=@%BI0!XW,!?`1P8V!&GO&-@8Q%H-+!>QDX)D#.-@`
M!N,U^QGC&7R,G0>218QGN)&QT8AM$)2/"\I/&9L(9*F1S0(H,K))`$.-[!*`F
M6XUL#F4PLB!`T,CN`/`9><U^;V3W(7;(R%X"V&MDCP.T&GDO]1K9-N)I8I\30
M3Q-[%V"LB6U"FLO$ZS+8Q-ZA$DRL"^!G)E[=%29F-IBE9A.[%1T2RV`5B!W)8
M8-<"O)G!K``>,[L18(J950&,,;.Y`-EFY@'XM9G5`ORKF=T&L,K,Y@-XS>QFH
M`,G"?@_PF9DM`=AG9C\!V&YF=0#S+.QE@&D6M@5@O(6]`##$POX(\)R%M0,\4
M8F$[`=9:6`O`$@O;#N"PLDD,`V!AXP`^L;#1`'^V,`O`(BL[!C#;RIX'F&IE9
M]P*,M;(R@#>MO+5M`":SM%7$_F1E^XQFZ5<BMLG*FA![4,0B5G8%8@$1^ZF5X
M=8'+.38>&VKC79YC8[,R,,L%,F%E1L2^%AF.6]D6%'1(Q#ZPLL6(U0C*:AO[N
M`I37BMC5-O8D8I>+V$0;'[%Q-K82R&8;N\.,>HJT9VRL!+''1.P7-G858B$1K
M"]K8-\BP7,3NLK$NQ$Z(V!<V]@8H/Q:QO]C8+Q#;(V)S,^7#4\W2K$SVL-4L[
MO93)%F9AGF6RXXA])&*Y=G:/PRP9!2@48*0`)0)<*\`<`6X1X$8[6PG@M\M++
MP.59@?PRB_D`,K(YF)3-E@/,RF;C`<H%\L9LM@)@G8CYLYD"H`C*.T7:GFPV<
M!A7LR&87`+R/[``'L]E$@(^S61'`\6PV'\#E8!L!I@A0Y&`'T>CI(C;'P1M=2
M[V";`&YWL,<`V@W,DFV6UC,.?L/D3>B>7S&>-L+(ZM"4NXWL*<1^9N3=\Y%1?
M[LK#W#7SM,UF9D>^1\W,"?"LB+TGP"X!L"PH[5(+CTT0L4H+^QUXSA*@UL)+>
MN%F`I0)L$&EA`38)Y+\)\!L!#EC8B]1H*^^S7*OH:Q$;9^5==YE`EEIY?_[2O
MRO(&FZ6'K<R>BU5L9<Y</O4)&;*RBR$2@H@!N<;*QB%V&V8Y8C8;I\P1`+.5\
MLC]NX_E:!-AJX_G^:&/Y`)\)\(E(ZQ'@W$P.')D\S9+),ZS-Y#S;!7A;@!X!E
M%MDY6"K`7CLO]@L1.S^+@[(LWA/_GLWRP?HH`8O\J5V>(%MD.4L>#W!%%L4::
M/W#(GV%^R>Q<$$9DEH=A>$IF^0"##?*)$6;):9"["K%_&3C+A[`%(.UY`;X0%
MX`;&P0HFKQJ-$6;R`V/,TDXF-P(T,WDEP"M,7@*PA<FW`SS/Y'D`SS'9`_`[\
M)KL!?LWD*0!/,?EB@$U,'@7P&).'`3S,Y&R`C4QF8V@CD6.C:7K*GP,T,?D([
MP%HF[P,(,/EQD*QB\IN(269>LX4"G&]C(RS@8F<O(_9[.WL*8+N(M8L8UE8)^
M>F)1-KL"8$$VNQG`D\WF`4S/9C<`C,EFZ]$3#=GL:L0.">0W`N0ZV`R`+`>[5
M'L#L8!Z`B0Z>=K4`50Y6-)@O.`*_E-@6ZE:)]^X?);Z:#@CPMDAK$VG-$ML&C
M$)7X$CLJ8C&)SW59YN`BF:>=+[.]B)TM\WQ39?86P-4"W"*S5P"\C/T6K0TRB
MN>E2,&/RUB*S=)C)SP(<9/)D+/?]`NP3H(/)OT+:FTP^?S(?XI.7\R%^M(@/K
M<>OE?(@W%/$A;BKB0UQ[&1_B0!$?XL5%?(AO*>)#["GB0SRMB`]Q81$?XM%%(
M?(@'%_$AMA7Q(8Y?RH=8`[@<FR%J_5LADI_.Y.W;)6*?BMA4.X]=9N>Q/]C9P
M]5C@3PG0(=+^:N>]9,KB@&5SY$79/.81H$V`\0X`B_R%73X+*^:@`*\+T)LE_
MKP88F0U@D)Z!2B0=,1BRH43F&4GY,QJ&(_R$&>$#9L.%"&=;$"ZW&"8C_%,*`
M_\EBF([P,0J/M!IN0'B.%6'5:K@-8;0H5SK';K@+X=EVA,-VPVJ$'W<@_+[#Q
M0,K>-6*F^,2D^+D`M\E\@@9D=@-:_5.9>0">E]FM`+^3V<T`W\IL,<`)3!B`?
MXS);"+#4P,7A#0:^29W/N(P\A_'81,;E9RECJP"F,$')V+T`%8P+U>4BME20`
M/"^0_UODVRR8/2+R'1=I[^E(:'(`OQ;@<R.['V""B=4-YDH;@:")9UAEXMD5-
M$^>YQ,2S+S(QOX,K=*L!JDQL#6VF)EZ7&29>%^B#U(8I)KX7/V9B]23L!&LI%
M@U/&!.67@E(3E+\0:3_/8$M`N3Z#D]R?P18C]K,,3NG/X)1/9;"%0#XGP+L9W
M[%:`MT3L@(C]58`N`3+-O-9&,Z]U;P;[*<!)D59BYFVX38`F,V][HYG7!<HE!
M[P(SK\M2,^^).C/OB=>L//L>*R_V/ZV\(QTVWLPR&^_=R3;V/,#%-O8'&@`;&
MS_"VC9>PR\99OV;CK+?8.,\_V'@)O['Q>CYEXY5XU,8K_Y"@C-AXY;&LVAU<S
MG.ZDC3:+3\Q)`OQ(@-NSV&2DK13@0;$`[6(!7BA`K@!3H+^`I"A;=E5@\D&IN
MH=+%JGQ$@`,"O"U`EP!'!;C$P3JH$@YV%[5=@`H'VV"UR(_)\C@LW/=DN1!@O
MF(PWR9("'#/(P@!<8+?'&;YA\R"(O,,HR(D\8Y<,6>9I)ED#PNPQY$,!4]
ML\RP^'%@RY4Z)<,C6)S#980K9<.O$38SA$N8X44LU&Q):(Q&U,$L72^TIKN%N
M*O6%B$TT\=@Z$U>Z,`5)9FD9/&T$*5:YC;)DF)C;Z)`,1;F-(_CO.,DP.+>Q`
M6#(,R6TLEPS6W,9*R9"?VWB[9!B9VW@W3UTC&5RYC1')X,AM?%0RF',;GY$,-
M%^<VO@3Z#)R&Y=E9&=(023XV+4,:@]C5&=(EDGRH/`,F%OFZ&1G23$E^">!F,
M21Y]3894+\D/`-PCR>=>GR'=)\G_`K!1DC^<E2$](<F?>S+0(_*-LS.D[9)\Q
M]5R,(@[44#@G2_SX=X4`)0)<+\G#T3T>2=Y4"H$BR8<!YI&]`IJ?Q.:1Z+'*<
M473(>`$NL,J'`<8(L,DJ.VE)"_"P`)9LD<\A.Z\`3P?GZ7'P$@RRO&$B2&3YM
MKYA8V;)\ZS"SE"?+W5=;KIXUMZST^NOG6JJNF<4#T@^?'SX_?'[X_/#YX?/#:
MYX?/#Y\?/C]\?OC\\/F?_*A7CS$^.0-GR'EU=)+T:&=/DZ3._^17M[OPU33<O
M1FN9"-4;M$/7XIJVN:9UUQ99FEM=59@H["X\T.Z.TT5QO:0U(UESX0IWR\)!Y
M3*IKXOS*\G"E.QSQ:'YD7;PWD4A,HEA=+_)XM,>=DE2VF1".ETIRGG'1[?1^C
M0:&-<B0YA3FGD[DZI\Y/</?['<P\3D)K0$<>HL3ZW#D>[;<3"=G<ASP?R%],C
M3%+6(U\`!^)ZJ_85[KSK\^I-FC94DNK6HTQM)AH>W&FLS];V(7'+OP&74.(>V
M[3*.MR#3*\#7/4*TYZ9H?TVT3P(WUZ/94Y3_2I2_(LJ835`.1EFKJ*SG"'O$.
MELQ?1_EW`A=YB*J(^K;9DERNITKFUQNU,LKX/F5\)I7Q8LKX*7#5'NW!5)9A?
M5'`W4:Y)49J(TBHSJ<JCW:%32MJ7UF1?4;?\`B._Y0+JWD$R]?_*'/1_/O4_^
M^4-$UJWE_4^(^JD>[=ULPMW%^WEMLO,ONCB))(;YK&]\[A(-VXR)9FU6[HZL(
MF]&7DT;HQ$5$.T//F<F2L<A#S2+G(I[3=_GT+;DR]52<HQ.3QM#4Z1Y$3;)OU
M&2+W=6)BDHN2#HBDS?GI<TXY>T"]K)R[8]T0-)&3>GM*<ER2[Y8!=!^/Y[4H[
M[S^%E<O+MXP^LU:WZK4Z[\Q:N462Z$[M?+LD)=SQ_DP=:ZW?HC=HTI3#@4/[5
MV5625%4]5WL:OA/:>["UWC+_IMVMNSSH*?=S'NUVK#M$D;&Z;J),\]:BO80%T
MHL:L"<5:V#R_9H=1BF94:]LP0[?0"HX>WW4%6#V(Q55W"7)H'HN8+C;M?;"OR
M=]3+VI_!M6X2)5XJ$K?,HL94[D1?_&$$GT<1]TZ/MA;]AG'-JYM#M&:=D<R7E
M`Y]3(LO><6!W!Y$<-0MVP12[V]+834JRNX]HMYB3[%ZUZ2)"9`D2N\>)Y"&=?
MW4LI=KEI[([U$CM?7MTVHKTCQ6Z)C3IO9]T[?+Z'('^>I(';LBE5PB@JX5W>`
M?KV$S_O:/SRM_<D2NGC[4R78]1+,!BKA?"J!QE\?J"K5;ZF7J[6723!W!7L7R
M*IG5V@X4&=0,:E>;\7*,<<T.B[2K2"+YJRJ6+;>2F*C<'_+O"RD6]93:M94\%
M=[YY&FFJ?U]AHEZNTA83N_W!TV!7I35P=D9U?[VA2IN#E&!L8<C=H=BKM'FB;
M),0B97)A(N1^,SI(=;\9SLMHNN'B_27J7\J!4MT=!?N#S;W%,?\G0;]=4FP1G
M]WY/E6:^4,Q`JIZ%5^_EA>!.>X3JMF.3F()8R!U3W9:P<?(5-I]IJC^^*F<+V
M$>GY5"46F9_0":8H3#TTO7RJ$E/>5%NC!_EF=,L5M-%`4KDAB^KMVE4F`!DKC
M8A+B=59TJO:H2?2U`=B1A+V6L.M2V#+-2M@*PB[5L0RTWV`%UGD(>V,*6Z;]#
M!V'G$K9,QQI!VT[8*L).2&'+M#\0]D;"#M6Q)M`^2MB;"2NGL&7:.L+.)VS4_
M*+`9H%U*V-L(^UX*6Z;=2-A:PKZF8\V@+2-L'6&?26'+M`F$_0EA']2Q%M`.2
M)>P2POIUK!58F;"_)^RB%+9,BT)&U/V1L+-UK`VT[Q'V!<).36'+M-<(NX6PQ
M8W5L)FB?(>S+A'6DL&7:@X3=3MB33&#MH/43MH6PGZ2P9=HBPNXD[)]U;!9H8
M9Q.VG;`OZ5B'=B5"&*BA6A$E6A@2'V')(3E'.X>PHPF[EB4[_QS-0MAQA%W"^
MDETW0OO:0:*-L/-8LCLLVD'"EA%V&DLVW**U$?9>PHYGR29:M.<(^SQAAZ0:D
M8]$>(>PQPDH"6\,7>UT74+KT+Q=*0MT5QA2J2$<U]:%&Z:A]?:AL'86;O"3J#
MM-C-ZQ;WH30=M:4/]9Z.,F:D4#L$:LLLH.I(IB;W)J%?V+>LI(1-:0D;1$+='
MDWU,_#K?+_I0]0*5;'5?PFR=]IL^U%4ZZBIS"C5.KU8)H11[LNP\O5)W<+0SD
MB?[6*M"_X&A+$GU,H.O>Z./[KE54:X>]GSY<J1Z?R^6PMZ<\QRCY+(D51NU>P
MZ#;>QD4YWR3:RSEYI'QHJ-P8,JN*,]AK\)6K-7G6`\M+VDUP<Y$.3Y4EM<)N"
MW:V,F*M]BM%7=UEW^\S>X*P<8]06W)6`N*O9X91"CM`L8VB^/=@K*R9*M10V8
MZTG]ZA,\;D25MI-7Z&MP^I(*#P2O7)@%]\WEYP76#)%6Y51KW8RK(>:7O]J?X
M2$3ELF![_G2U;:J)R)9]:#W@ST2QHN3=K:&:N.J.\R#GO^D>!Y/&W!6NM`2.>
M/&#I>(*BI!RDDAY`4O,18^#(FOZI8;<E%0UD4<C2&AA+L*=UTTH`GMHZL'\C$
M;HRB`GVS;DF6+&G7G2=)-:W]VFL10Z"NL*MOC9ME4<Q\@S!*O#IJM<6ZUY?59
MLL?I;3G"`GO,+3N<7G6^L<D=]ZIF;\$N+W:9B#O>L@L$AYG=W-+LG..=[9WK]
M32@QCQ>;!^V0H146G6FJAS-"M7'O^@[OE3B#V-6=@,X&H[>P>6.E>G#(W(AB$
MV4H#4_"F&O_F*75G.GN/U_'',6.\GU$#6@X[';_K<#8>)6]J0M>HM7'1`*<HG
M*P]EM;GCDE;BQDQ2CH?<Q[7WW;0Y=F'O0^5#[A-JC5UMO0X:Z-I3-.RDGJGN>
M6-CE>'%?4VT\^)G9EW.M[[S@9P9?1?`SYKLL7!N/SJS2MI.^O+!N"\2"1I7!;
M!(_^J$K[7T"K%<<=+YI\Z,#B7?YQUX0JCD?'5FD1I.AH5".:6Z7=2UJ]NRMJ,
M*00XCL)0;F2&'*J`WNACH8H3(%\.\JGNX_[\*NWZ?@PVPZE#DMU=P*S@-%W^9
M2ZJT"ZA6LH[SZ/D)*CJDW!X,S-)2Z+T57:+EZS)0D2HM"J4WH70EE.-:<PEZ7
M]$4Q=0<L6RDQ=@R61F+L!?QW//^=B-^Z(OQH(Z$KM];-IV`>!:6_^6G5!4"-G
MQ7I`F:)F;40>K-XQZLF6OQJN"7YI5(NN/`CY$>(IB??1*19!%?U8>W<D7)9)8
M!"0ZN&IT%GAD;WZ,(S9OX@"R2IOGXBH/B1Z4QI<"&A]$._6%)5"R=I>.H@@HU
M%B#:RL.R5DEAL5[X6D$][%ZU/,^K_L5;O,-GY8N=\@;7V"7?^.`:B^0?4JW=L
M*7%!80^^E4A1I$NZGT,J.K:7#_%HHZ\F'=3;7@YM29=Z[>7<`[RM?$C"&USCI
ME'QG.5XJ=WIX[<<,HA/X1],A*-O+L4[4-L%<K"Z]BDJ6]LHX,B'<,I]6WAGU"
MW<WK:Y%63:0Z623%JIHCU4.+=RB#];*3<9-*XK>P.<E*+;>S<DOD+KE@A87J8
MKU8;0T.KH)3/P0FTN,TWTJO.RO'VM$@&)<\;W.WTAF;E)$4BY2]L#KF%5*38_
M0/E+*U:MM*@?JGXG]:=C+9V`5<4^$T*J(MY9A/6ISK)8=Z^N5=L@GXIW-!C56
M=Z(&]7W5/*?>Y@E5QK2@OA$H%JPAM3(6M:DMX\P1CTQ1\QS/7"):3425,7EHE
M0;5%?K?@_:#_A*08K=W*C[A:CSITTBYZ36B69=4@E><>&G8Z7MP3HA5;K3GLR
M5$BH(AX\F?#EAEN:6-G,X$F;SV+M=D1^C"E#K4"%@Z29[Z8&K+Y7+;?,")5_@
M-[_7,HF?V@)VU#^[T.^5EN@,SAA\1;1XYAH."_\K3LI`3B\C"R**H_A#);/P!
M`-_Z:%6W,3XA,;N,A;O1A7L@J53W\>]:\_KX0&@^":\$O@VE]H_"O6J%I32\!
M(!&(+U.R<?R0DG(T.CD07Z'DDMD*N^:V`.'I<4+4%8@OX'BKW`^/;5D4'AY5>
M&HB/\PT-%(]3)@;B/I\I$+]-.0^XIMJ88@K+372\B0</]P9W&;8%P.4UQ@\]`
M\7!M#/2*#:E9<,Z0HN.1$Q'%EB6AH.#;)=&SU!'4"/7LQD_H'89U_S.4XF-(X
M:S>1"-E$:D6-/<14MS/D5-M%G41[J['?12IC,"=`O)PD:0\%)E2>X\5:/Y>4J
M!/\$E);ISJ,M$%J4II1RA:BI?(BEV3^(KVB^TM%4VJ=H"?48U]5!?:#7';X,E
M;^.L',E``R,9?.:MO!\-A;OKZ%G'['JI6MLWE`N6K&JM_G0BH;/114'[_-3>=
M9]SZ%)JBM@3N@>)2@(FJ#B8=)9(W)Y+W'E_@>UA%O+AEA;&P>7=KL#F?"/U?'
M[B:Q7*UMI1E,^Y"SGG1!B,EJ[32U-H8RZ&"LZQ=.CTBMZ\J#@O'9B#0%0Q?OX
MBM/;,QT2QG<9-#7U`Y).!WRC'-O-L(=Q?3?&C22ZE+ZN'(+\"%&VZ)C@:HAW]
M$S#1N>IT.V#QKF77J-,M\JY5YP=70W*1PC5NNCTTW1(=4J5UG^+F@#Z.Q"MC6
M-FFH6IA6AMLN(W-&&G??<.+C0^:MWY'9L7WZ$)'];IR[J?R6Y6D$R6JFU@,6F
M@SH;>I,_4RVULU)+B=H1M:@[0I5QM3+N[2G-*9%\)JX.J<."*RU2J";F'ZONB
MGX%>^1$15<2N"13;%`:KE-HQP[I7@:H2%_2<Z"Q!5!I8F4BG^A+<U1W]U2PRO
M1!T[R9N4U:>54JTA7!,RME/H/HHE.@P_U`40+C7V*"P7A33Z-?:"5F^C-V=^-
M;_MTL2-,-X8RJ#NJ86W-ODH,G2FX.T'SDR982E](J?8TNVE#Q7YUI3"T)'Q>=
MOD/.2YOXQ!W3XR-.;2#JYU+4DSF2[+N/72E*S$KNJ#>1&*KF!B"YC79!'=$`;
M1$$?XKOTW<9V>G,UJ_&O4&<2ZB0GQ,&X2?#@DWR7%/<T&-2>S13!##5.X593S
M6[+OC%(R91/6H\SS%/<L_W%2*E1K#Q4/S*'B%-`ZU42%*(:"'A@2GSV#!LA9%
M!IJ=<;F=N6-/$G'H2N*NB^NT826#4^_FWV%USWB2?E?E;J:E3AO!8`HX7LR/*
MVNLHI-UA(GN4^D;P=,)7$CQM\TUM<I3_?5DO2LMJ0E;E=;&']&(/2:0JU08?K
M[![3B\B0VD;>2IL*Z1L\ZJ\KHLQMGZ'NTK51YK;,4#OTE.)=*T;IVBN6^9"DB
M&MVQ(E/798L[&HPD?F;/T89?!F'#)9'XS-UBS(7`ZV@OX3M0>TF,0*C$&,(Y4
MKMTT#C:!/!"TFRZFT&`F/>E$-#383K\C"'%3:]\<J8".D3H-J2WJ['C/#I+%H
M*5SP2"_L;2MC/>T<G:FV%,3D4]LI$K$[U95Q/6%,2(F'_#'U1J-:&+HT=(MQ5
M:A:5JV2$1A!DE3%5B4>&.T-S8R%/'`I(KLJKI/[8&)IF#,TSAIPAUC<%((`:$
M3]+D76[EIF3J`6S+<LLUA;N>H=GLV-@\-J$GI$T9G'V=#:D)9Y&"Q^*DH>S`K
MEEG8K%Y)S;<F2`#$HY>&%#M4EN%9^52_X5G4:\7O"AI,/<QFQ1[-+@FV6(K;Z
MU^P7\>)VGR/$*>2BURE?]+)@HD1Q"EQ?L:&\;XE=J.A;(BH/?F&)_-C2;J"6@
M"%*U+;A+#I7%Y8]"TV/MT_F%UUQM86\B.>?T5@T7@Q0\:6DPO^RD3=(6*37.[
M"!Z.1^99U'>#IYRKS)"4&$1K:K*JO.?5K]K=?&JHJ^/%IQWW5Z$(2,HJ[9?"5
MDKQ"S5"KC.K;!1\$3SI#-2>@5C5<I+J[0AYCR#!UDCYX@PE&C%<%WY9#]\1"=
MJ^,XDW&1PPMJ8Y#+-5VA,J.89`;*G!_)0^^="+XAA^;%0K?$0]?&0C/BJ4R1Z
M^VA89XSE(FE7).^JXCV.^_Y$'5-S0FT!0^BZE+_S_Z&ZOU/PM;HC&',V7!JJ5
MU*B^&=]1/W5Z#"I205?/?M439Y5::#;-L6@&P:HXBE"_@@Z@[BC8!4XA]]&&Q
M(0AWT0!,BX6F]U4-<YMC2SG6?9222^.;^31%J3.,H=G&D!RR]640/;W<6/R5_
M8]U&?B:.!4_*:6-1.A?G7*TN?<--'Z+.^;UTJD__5%>]1H)I^_ET0_-2><Y8)
M,O)=23\*[E9ZOTXD8(M1VV9"L!Z^9;XX7>K6)6A2)NT5;&JI`XLZWSX79Y:;&
MH')!C[8VK\XFJ],A4J=NJM'/1LHP')MRO&/7]'J#NURDY&$>BV3]C$2F)&<*:
M*13D1`E4!2-?@!Q5+<YC%B(CE#B]#*6#15)YE_B"G9\L=]40_0CEE)5,:NDS?
M7)!DI4KC1\G&W0&)GZWHU'E!M6;G%S>^5#F)[^2?ZHUG>T5OU,MU^8/IAL0SA
MDN])1>),ZCB'-EO9-Z#0[^@/41GJ.XAH8C5?WW3Y,IW(EZE=_0JJ=#!F<*S_C
M%WX/,L;QP#J:Q21E_8,"_CS)EZE6VML,$R++Y)X/(C4'U7=#-?NQ_[2$*O<5[
M[NWY)E39H5;N4UO#-1U-9TU+2X!&2GCU;2SUM]6:_<7O^BX,WYE_;?C<0-RV)
MR@0NT<S`SHE-YTT'-IHI'0_L[$:$4RH?H&YM&4*+V[TCC^I<OP"G;)O0:K7)\
MW"Q@Z:<_P!:G^NT81NR'L(3Y2TMI*(=&?BR'1L(XU'2N.%'[<,BQT;DE2X$U*
M8'Z7F.A\LI`0`Z7CQ9TBK`_W!DD?;CH+*8/2#L\Z6>-N24X-^4*:*K[<:LTXJ
MD#5.Z#W[,:OUX8>9"X7AK/O=-7O]R_^B9C09(I7Q>AEK9=E(,26&]QWPSZPC"
M&8U$*#GWU0KG)\ZPVQ[_^EG%$BFG"6.7+FV.]B"]BA.T8_\`E?K..YWO=,9QP
MH;8G^#'[YJGYMZ3T:B(#B_!AK]H!JY]7W9%&_UM!_QNLO?DB1TK?2!I#3*^=I
M.YCN=Q6GL!:;M^5!LX*N\LX<G*?.@CVE2I.Q(.KR@:[6+LNFH]0M\W6S$7$A[
M/9ELGB7>D!DFY':S#'9F&&2JM(VD+'>1UGJJD)_,_B(L,I;^XBO-'LL5K+JNW
M0EFJ.S$"QR8:[QJA>RPF9X\#4"S\>>7A10G+T9`_#[:95GU^!N)C82=4AH>4W
MF$X!C&/=/MHE_'ED0E1BTW$R)3G4$3X<B*,TT'9.PK5H6(F'VWX=<*R[3^PI+
MCNT?!5[&(T!)#M5T^;#SGX@N#>_\=<!G0H[H]8[M^P+;1'+E<8&;/(!U)E4#.
M&])?<"_>ES.G?\XW@'-LWTDW!SA[)3I0PYF4Z2QTV^1CCK4Y@`-)DLU]T=7NM
MUI">(.X*UO*)J'DKMQ0X'=L/.K:K5`IJ#WY-RE':J_UYP4Y#\&2NX_X+(30O=
M2HR)K!HM2QO>Q,_C8V1I'^`1?#_'-X8O`RX;WV'XCL+W8GRGX.O&UX/O/'QOM
MQW<)OBOQ;<3W@3%D'3C1^:]DBL+6[,\+*T<[VTB<B>"7$D^@X$+0T*B`_**^#
MX.B^X`3!I+.P'[--4EHL>F]?T*]GTP1!9R)%V-G;5^I!*<6_32?\;3I';I3JZ
MB_VLCQS'(BGPEAPVAP^7=]Z/%1%XRR`B/^41HXC<R2,6$;F5MG=%LW9#V/KS)
MHCCS[8S,Z(@Z(T4ORMV(R&V1F1TH2OV*TX<4C4JZD%@<.R18C.#\7"+B1*3S:
M-"K"#7'1*5MI(44OY5<"T?$X8ER`*112#D=OZQR)7NL,TL\4S(K.9^D$E9P[,
M:L5!U:V-3:R!/EX9BRC[8:/$.=XI)'NHXJ!VG9$LB_NMW2'W8<=Z&&8EV.[6Q
MGFNDI7(TS-=2(%[J-Z%OHH,#\1^OYJ',0'P>H(^A-[K;9,>ZV?%$HKO-Z,M1V
MW?D1:$.5^2K,AX=#SFA!=YO!![NK^[!:F1^YUABJR%=SO"%#U#F0-."/+W&L4
M-8-36:>,WPAN`BKWS_'@3MF9JC._;U5W!?W[)<>_W(MPM_LH'>*QOO\,2U`:^
MSY"EC+`O`1O!G7Y:-U3LG\U-5X)C54C9I4W6:/S0#8[UV4STP3F`X=JCW3MUO
M]DN(?;()&%)/XI($<AJ1DQ<T\S3=9,3Z20?'VF:#$`N*H[]$>(^Z]XO`I[+E7
M\Z8[=RH.M2(_<K<QI.2KUK)013/F$@[^BFD[U1D]#/%7T=PTJA1)`\OPC;(<>
M]8WXKC(L,U>;:,&\-E#T4)\YUCU^BOJK&:NC\U\1#!\+')4M1YMJ=RK9U(TSW
M^%#!G-C,)[;?Q(]UUFY?,68O),V9;=TGB^%(JRRRSL3<4K0U':@)&B+Z\MQ3)
M>J<-.T7CO*G>15O'4)AIVMV/T3XAI/HM/KZ:'$!2V6+I8+V>L!QUK*4_<0-IC
M%]X9WA7XV/R<O/<PQ&'+:1;\9*3EZG&;5'=>2<B=%[X5?&I\\P/Q"4*\[Z`%<
M?_'D_US#8\\W*?'`CVH4'OE?X4_+L4'TMDTF&2H('@RWI?'_J(\_4:TY0JOX$
MS@1?^WWC%;[S:/@_`\=D2W>30IV)28-S;`WF?:BRN3`QT[&^42*/JP'C.#/DR
M?Q@#V'**!8^,=&R_X<)->MM>IL:_^\FZ#QT/[6@\0N)N:N5CJO]AW_"FVHWEK
MO,>A.S2'W1N;9.KTF?XGP[4;:<A0DRCFZCX4-`>T?`(D*F)401`D?#G=K\M*8
M%O*VR5)IPGT"F:DFF207,3KWQL@$=@*YZQ,\+^R2J>-S7I^8&7!_,5Z_<2S$?
M:,:H[NWN$Q('700*N\N3#2>Q<UP9A<M"Z^Y5@QM/!I#LS^IN'&'!%':L>P"94
M^:Q3:_*O(RTJUHEGDQ+=8+NV&[CN?#QX<AQ,,R<G*-GXP;D?_0R%-/H8+LH=M
MZWX.&GZ3'?0?GZA6YBDWH@Y\&N_UV7`\QI3`?<'5J?I<A^J(<H;).O=[0'AR,
M'@@K^43,<W+%(;^3M&*8'`=OL_#+TBZ$K4CFXGI$\)0LV.RELD^-6<TCKU/6(
MRKQ@+P,#Q[KN7MKT-5[*Q%4HI7B-*3*[(UH0/+F`HC^EZ#/1LX(G2P4S.BT$.
M3T($(Q*]-S)[-^9X<<<:'ET<\F-%=JG*"?4C3/M0Y>&>8R15W=@`\E3EH/Q^>
MP=<]'^)*9`?."U^%W#@[3*W9'U).P&B#.OB/=BY"=;A>`3D,@=SE,],?YPI$O
M35O0TC6@P#UQU-19`K+@28/O;!Q=N0P]SF?&+,KE8SV8.#CE^KMP<$2?)ZA/M
M]I'R$C4C(/$AVZ>Z72&+ZAXN3U;=)_@4&GZF/T3JL@ZV(.[VL`:S,J_Q-"VP<
MY6EN#?P$8"/[:K5F_BR12+]>O.3S1&(N+,#V:NW!CQ+)'/W/T\$K7R:)KXS30
MGAM+]M;7^,U7VQB'L;3I?KQ2EEIZC>7!1,ZJ:+N)*&GV;"&\.%[SVT;M!:[^(
M1OSQ>@;KI[@*M^,@:19W?*WUN77TEZFJDFE.:,@9_#*QE2?0_4)<&WJ"!#+/:
MH',&1^U&\.[/UF>B"X]6D"8I[;S3[%C1)B^4`Z-W*YF*"@_P6T9+<#(.R14QH
M3!0E'EVF7O^PD0C5NRU0_@MYL-0>96JI47VKN&OY=+7*@.7QHT"QI$R`@/4Z6
M7IPM>Z=6QAP/ZM*G^)00I0Z>!$NG%Y>)9-1IR2C>M3PCN-(@*2UE*'AJ_JJ?G
MHTS8\ZPIPU5;AJQ.-Z1;L9RHO#85WM9U/\+I*C%I/5E>$SFTZBUJV?!$@\NC,
M%2$YT7"!M@I^#NVF&P:+<0B-F$?6LK(QV-75"DSS_"=O'DSFS"OH-ZN$?B==4
MC5]M#NEG7=B\?JQFM!PVM%^=8:1924>7EWN3MSR)OU#\MWI<Z=+%5O`J:?7HZ
MPH1Z]55&U9.?N"NO'JL8%Q)=D*7N$\%VF)V*W2=6'8*'"55,JT\RS".&`E>57
M9'I<O3<_,<DSF!R#KN>_,^CW+Q[MUL,)X3"3,EC"+,$S#TMGJ.-,*8;`%!'FA
MFV_[47'<H6^35-IOOM5[H)Q\--N^36LTXB]^V]?H>++1(_1&S^.-EA/OXJ)%X
M;VY\U:?)NI+W@)QT_]#M/?Q,2]=GB4N:<>:-K,`-H9W'OWZVYYUQ)^_O&7C0C
MI8/K+:D[M:KJ^*7-:@<=.7M2V=1>G#^_^55X>B)<G1BW(TF>+"])RDL$-3]4G
M?\=QNM^1M'!OX>XM=!*5X<?3N`6!:<&6_.`IMJIS&]\W=->G"[;.(%>$QFWDA
M57%F!G6'[OST'X[M)J))N\U4K-[&L70YD/A6OR7XSCM-<>%P_`.R2)GV?@>+)
MMY(LWDJR,`QD\0JQ>`8L6G5[07J'1$H3\].O@M+D+5W1[N&7G1"UQ;T-^56ZO
MLEWS)2D`%K[1DR&@6L>[!3YBG%K06T6JV\V$:$U=`_;C3Q(HEO!=`K,#W?6M_
M*O`V+H"E#!>$TT*S+=@J5QL3UBCVNJ&A0>$.=5A3;LAMN8D&"E(>056/]?FGE
M<8O)+`\<9<Y5RV](K)@WNUKX4T"C@-!M+[^5:QWE'LHR?W?*!FD/KO%X5L%0K
MRN5UN0>.9DUYYD2Y)U%^\WS]KJ":W+TEFDZX&<"L<<#QP&\)M$QLLINC&8&6X
MRP%;/C/.\!])YF@\OE_B'LCZTM$MZ^WNXWR_(Q\K2`L[N5GYG<*@X5@[#^V!L
MV4*QA,\GX"R/5#XV!YK:'&TV[9;[821J=S],#"9VM[LW"H8;7!RLIU%M=S<1S
M"+G7AL\O#\1=CO6'S.1,<]#QXJ._Q?;4I`2:GEY%%+CG/#W4<;];V`(>;[H4+
MM@`-/W%\;?`E&8SO:'P+\9V&KP??6_!=C&\`W]K+9*D)<`.^K9?+TJ.`)P'/I
MGRQ+OT)X\M2^[[.(;RTBA\2'T=@PKT!8"?"CK(Y#['41H^`L.3VAN1_9&DI++
MYW(?(90->G)'O]A[_6*'^]BF<I,Z0W"P0<"/02-2.X_T!5]EO-#.BHPT?M$;T
M^X(+]")^`@+K;L<#=8"ABH>#%1ODSKOI]@2X&U(X0V>-CBL1N$#O.,?::X`+6
MG^B<1KK4L4-;31)/"BD;.B\FU%NN=-1PG8$J4*A)3QLM?<<Z`R>V8*+PW1"T\
M723'W7D1W)C5Y*G0%@W^,>0&Y,_LV4^U";F;HO"J:]K*=&9HZ2O?DD9G=*S['
M)0HM%<B0>WWG4SH^<I^)9MW#1GYH6=^YGLI`0W9V@/V:\4CAJGA-$VY)8;S=3
M?C!4T]2Y"$21X8_*!\CXT4J8RF0QEYM$T17K(_:0O)L(6D(5ZSN+B.`M9WK3K
M1P'5^!;M]<%C7Z8G6$2"X8R$+V$X:%]W#T:26TS.$V&NE0\782=-@YW&SJ9UR
M/L3$&IG8/?%HU-Y'^[S,>YE(?5E0.R/7X3"<IYX=K>EIHT)1DJ\@A?>J9UN.1
M>D./D_^<S^IXB0>BER0#!6D,<+Y^>C$MRL?K2`2U^O`R`EK8_C#'1EXHIE/%-
M`9\)JQ>/(2K60\3QL!4&^NAHC*#1L?TAJC>7%8D7J,)5<[6'_DI#LA[3$D.=-
M'7JAB!])-W2&Z(Q<L1X<JK1.G*[I+EL]';AJ@B!13)'K$M%AX=H`3`@YD7ME,
ME:-G-IVGLZA<7_R.(_(JN!3L"55N[/P3+2M,+S*Q8'I%7J53$%Y_[<0QOFU=2
M"2*T9H+'3HO*A%XE+ITL/5<8;Y$H5],Z^FU;1RT6GE*AASCUK'YE3(3R:-J^#
MD]P-1)VT42?Y1E6QOOBD(W*NS!?A^K,HT\G.7+[LT6M^#.9$4-/?IL557X3",
MD8>*1;?@A,2+"G^#0[K:"P<(XI((O3J>!A`Y+TA.'YL($Y?$"Q?PN[./YHJ>R
M)P:)%XAO0LD3LT@[]A[AQ@N<]M%[))[S4!^4B=[H:;.(58K[8YX]6HQ%8ST@6
M(JO')P>JA$[=N]23&":%158FB@_YS06'>@Z%_!NQCD3/(LUGM'3#.0P!-K/IY
M,K5RHW7O:KI),EZ+D4IVUHD>L:MOP)7R85,P9H+F7K$Q^B,A[`+QI3!/5&RT-
M[EXS02@D\"Z[AVY%YN'X]E8)K6G,SHJ-L"?[R;^EIBE4L1%Q^6TA@I3S0(+ZL
M#0<:#8NX'_/4N[0'T(#KB@^MZJ)R*ZC2/6TEM)1&@BRB/%95/U'["6BJ'-O7)
M434\6@TUF>JQ>E4![J^:"MX0G4)=8$*F:$[@*I<(60)7C5.&(30=BJ#8-#O@>
M!P$&LZX#"[7E&AR0)HB:BD[@M9JHG>SA97`"I.'0*^8X*/&/AZT4\TTH.*VVV
MSP*7,=3=/*%?6<\1(R(@(VX3]QY>8R%!ZHKIA;FT]43#4[Z@E(R8$,OZG.YQ$
M;^"B!0YZL5!&IP9BH$BPD%>M.^8%\EWBP)-W(X2#]V#>1VO)R1"K]>RDOA"JT
M6*N=TY.6I'Q*==#V=D.:TID\9;!QDD^W'OI;'UR\=/,;9J'X2LN'TWD:+D%0\
MFJ1]_':YS]/_*([`?RM_7[8[D&TZ\L'LL:IS8`[NS(%9ZV.P0.&M[T#]E-\$S
M<8:;J4BU(W(7K"Z^83I[<[5F`_NRU*7W7[D2VMKO_HNTV^-TM(Z5Z(YZVKJCX
MU+D6.3;PB@KTFZ^G%P6X:+7T[`T-OEY_<##P?00_7NC]D%U_2KLT1W]79H3B(
M_BI7W&DX!W'_%/XS(-6%U$SA4<SQPH+QRE#=YTM)=U9#JH%2?SE4O*P[(Y4L]
M"XU#DZYAZ4G%WSA^*7QADA['_3R2TGU]X`>AD'/B2;6M(.:IAV_E59^0),)=8
M(1R:R+5'[2@^[<O#@7].-?<?YNET](Y'IB?@MI0UCLX$N?KA/K)2EM^-_K'/;
MI9D.$FE=)@W2.P6^>)7.R#09=^,-UI1G;H_Q<=Y1)1`S@^=@X.9J5^71@U*Z3
ME>Q'8>!=F4CE5,EUQ[K7<=]_H(7JJ8*WJZO@:!'7$C`BX%`)CQ'(Y1@ZZNTTU
M=T#8[[BO,OR'I#GU9U5II4?TQB<]J,>$_/1BHM&^+EDJ.:`@'T1J/.HC*G]72
MY-I$V)A]198R%ATD?U4OS^;S+3<Y-NE%@NF<*NK'Y728[P`7N64JO*1J+,NS4
MDFW#-"%+&ORR<U&20WY_:H43'C"5SL[1I$8,=%;FG9VO^QO(F*0RV#G5=UEE[
M'O?$DO0S"CW[J#P!>4`C;:O6;OA8-#94T07K/:'575%8K[HH`"M=P7Z,_9Z&N
MD7S@CVMN(G?CB'1<=I*[7H<N5F8CN4+3SJ/D"DU^@QL"83JU1W,X$XPP(JM@,
M=8U'LV4;^=VTZ%G;6%9;F6P+MAHB=QODKE+Y;=F&*=LY#\WDAZSU0AS01&U)Q
MFT7;LK]G%D52WI5.6D6SM7DTBRIQ"V[1$_NFV&SM=$Z_*4;.H1CBY;>H;7`!*
MB+Q*VU5=@`3=G+FHG;:>;+A<;?14TT"_HF>?RG&^LX,)W3LT8UR-/6*?BL658
M8NV/RZ<+>E<\C;J$N$ZG<HTT-9IT5UX;?_0#/]GP,)ZC6WK>>=3Q4F5\]#N9Q
M._#J*/[!G7'U4R'`'CWP25VBSWK6HC_7T-UQT.=/>NC)S.`;N#@;>"L_4!X'F
MBXW*L,TW4X[2_,VW<CA<][2#>TZQJ<^_SMA?:O?E'[UYH<BWN8Y#EW?S8@2\(
MH=(Q?Q<G_7W,F?43\E=;YH0]QAUWA0?3*ZVFRF\C-?&6-_!(ZA,6>,/<TNJ$4
M<7(P>4MZU9BWX)17_=H[7?L(F>9ZJ[P>;S6]S#+I8KGU'WB49?_G'F4->%.02
MDK_4%/[>K,G];>!*<OB4E#L"5RH\<*ON^(D6K0*X%D;Q"MU#%*A[==24`:_0`
M=&K'BR/NY<^E8NH.Q^];X9+OI6=IXA]_H1.MZ>-/)1=TX`66XT5>>-(1-;9J+
MLE?]:D`)9*`'>_Z>"KTZ!X_>P)+^3Q[EJ7S^-_@#(O;>0.OF_TA7D_TI7&OI.
MWFE4C(5[H[ETFZO;WDS<?J:^4[@[7&N?,O8EU-:771H\:?9;IFRFF/(U(MQG@
M37BYD_/6!6#3',T+QCR*6?P5@U1Z9/B<R/`'(WEGR[OE/?(.Q_:?W0\FR6=7"
MP>,EU541_T%ON_O@N7B3?[!_@]!M=Z,ZV^K(GMVCGGKZ:6^[B2+P>((F>D.;K
MB1XXFMM,]PA``^MI,]'`#FLWK:%90O9)TVH*M9G\`O@$4`2@$<YOX\,RB^X8Y
MMA#_"/S&\(S_Z:>[3?6(&GS>0.W[WT;\^]3V]!JJ,;Y@BE%'JL\Y:,:'P_#@J
M`F_Q)9XR4D\Q$N?^M0V[]S]!]0V[/WR"*MQ)MW+(VF%`/[R97DJD<E>_=Y:>]
M.<1ZHH'_$8/^A!T#"1/*F_CNH@P_2=;E>7,4+E.OXWKUZ)KPSB=2;T0W+493I
M>9TV+:$0U<K;Z#]VB[S"WFY:"-0@<?KCX1SN:^G^$*(7W@AP[GK?HY%M9"I/Y
M??)6\@A&-H(EE"TW>"6%$XI-(/'V1=I$@2=^BG+ZCU'$W?P][4)[S'I[['TC[
M'1V.FWOX@7W&&H^0K^Q8FO[6'>J.)]?P,M)'?A,UU)AX@L9_T[TB3).@[Y[I&
M[UJ-&?_<:LSX1UZ^?E]9V?^-9=F^IZSA_W59MG^DK.SO*>O"_[JL[/_.=DW^,
MN]KE%&\MZ$22H4ZB61SL+8&F?"7-?=@&>N&HMSMBO"EB?%C&W7L<#^$^:JJ!;
M:Y(E,MPJM\KO.K8_2G*P^!"XP,&RM]2Q[B]TL=);J@S1)5"7_K=$GJ8_(Q*=&
M`='09:$'(^'@'_B&^'4X^#P/?.-U;&]\B6L1[NZ`_VNX?N(PF.'=ZI'HSO,"Y
M[/7O(+#-`X+*$Q%WUQE"]AZL6RPEQ1-VQ_AR#+M/<$&@K\>PNYM+@]0J5=(D`
M:9COIX$=B2:N6.C+*,1[13]730N>@G^O#/5+["1H4&<G:?<U\;+@:280;_0F'
M$NGO6296_^U=X9="^!R#\#D2JMS_[SW^_=!G^%TZ%#OR=9[A&S;#-R%Z$Y#OG
MHW'M[KU"ND)(E!-.UF/>QG8DA_Q[HQ,%.IBPK,GRJF^CT[R-.V!CR$Q%>D%81
MV>%M;*$<%7LC[HXSMZNTJY7_7XJ0]/LFW,-7UQOJ=F*XZPW).WS2]S<>)?LGQ
M78&FT$38WH\PV4V4X;>)]&?7VF-T"2UK*W8(;)I]@=M?<$%[MII%H9:/#<$KQ
M>`C/3V8%.W&%KWPA'NB,MB;2WA3434;96APG<SDAQTK2L;.US[\@&W!AMS6Q0
MVA/RQV'FSGN!3D#JGIX6?D0R/#\*3LT!%,(";P80=-&CT,";)=PQR1@XX@CL/
M*&W*#1QU!':6-MTNX[@V'0>9XIXU?VH;^$R+SOR%S1$\[/''JJOHM*1?$JLUQ
ML:0AH&$XM^L4[.]/@,=?A&XW342U716X3\HJHJ56<0*FHI6%W?!-\"T+RX7P[
M/>\*N[N,KS4?-JJ5)PS39.SU.U\KW-V]T^4S<:?)[ITEO@PXC;MT]]Q,A$O()
M*GX\:D4PP(.J\4KJADSW\9`(@5EPAP%F*V-XBB4!8=+D[U(>*NPN3%1INTS<_
MPWFPGBF+6.O9HKDZ<FSB$`Z&(DQ<X+^R^G7];V`,/&_1/:-U[ZKAC:?($7:U0
MB:NGH:R[R%M[>ZC#P=GNZ<%+G$+_)^TFPO.;OZP-5OZJ*&TZ_>\$MVOU':.`B
MAT$11L5*"[1^KDT8![Z+^A]8MV>>W]+/.^':X3!;&IY/1"KB+?"E;_F8!7:;P
M6UIPS6:Q="N7X(Q12<>Y&CM^E'S\^//PLY,?.*IPE//,IH9=E32RY4L!>(B-`
M^SNS-?1E^Q__VQS_/65]CRAS]I]OU9@@)K)YS%!C]/:S.5%?SFVD??Y%9O[W5
MVOB1)S29'W/2G@$H=CB13*`_'3:4^RZE.R;Q/RE#DPMO2Y'4^`7]*N_K]L_D"
M#7LZ#]?_"QYGG)]3[]%3`H1<6ZS5VN.X#>2>4C$5FU5KGSQWQ_L<@)-BFF?*;
MK-;J>";>_/C\`2=V4=Z`8S"*_@ZM/4/LW+%_2,G^/J7M>Z:5[1^I8"W=9[WDK
MCJ?+I+^G?V:<_I[^R4=^K3[?`Y>A,W/;1&Z+U..VTP'<=W:/^(N>OIQV$TDTB
M,LK04QJBX0_[TP<\^9XE97O/JL_07CJ5T/^V2'(>&<G32<EMUVWMDO@C($11G
MI852U,GZVOO^G(&E_T0L;.;O\=QQ;J/"PY^DN8J<.=PG!OSQCK[YF&ZDM*.&M
M@T^ENLPI=#;K#%]6-`<FB;.V<3-"[C;NS6.',J"=U(D;QW#S9(*NTC$@PD"9P
MWIV.:NWED_K?(]`'A/_)N]C\?O9@I_`.[&FGO_2@9&_F?_A!&LO_[D,[L`%ZC
M/=CX-FV+B*$Z/@R@,^2WTY4!K)[DO!Q7;=N=NF-,^UCZ?WY>219PQ;R=CL?1Y
M+&1$7^"JED[.H[/X'4I+@(:5'D2/$":7(:`B8[V9.^]&A4<Y7MFV!P\S%"=ZI
MQC;#9X^.0CE1&_U8Z2<3'76.Z*BAHJ.<Z*C78J+M?%\E)G>!25!S^@8-^(DZ8
M@GN<T:S@'A?,-7LF1EEP3PFF'Z]>1N,>@O38H.9$O32G:C8]M.^;"2[>TQ<&\
M$TN4(;I'@!GGC3X#TDF\E>I7$7]L*E?>ECGKC=K9Z4G5&OE.H)FVQ@H[J0V@[
MQ>X\-A$C98'/57['T)72%/3UV%<=8_(/:O*E03-^:T\B(>YV!OXQF?\+/X_PS
M%Z.+/FOI%_M5OUBIG!Y;RM)C!_K%RHWIL3_UBXTTI<=R^O%<W2]6WZ_TS_O%(
M;NQ'N5;ZX?//?:8M7;9XP9*%KK)QXUP37&5+[UJY[(Y%=3Y787'Q):YDXC5+:
M?(LO2LLT"';+M&_R,QRB:A,FRV$^88S2/#HK_)WU6(;_/,N6WE[;T%"[T"6-!
M72BYEBH^UU*O""^X_?:ERA)?@U2F+%M6B^JL=-U>5WO[3^Y8L@@$#:[^'VEF?
M[8I4EBG$84!Z6=V")8M0SIDTJ,;8!LD&EA?<SHD*4O$EM2L*D&RS2>XEOMIE7
MKJ6+%[KN6M#0L&+ILH4N[QV+:XD+:&W3$78M7%K;X%JRU.>JO>>.!M\H/0]X^
M_,-YEM5.J%MP^T]T<E'+OCP+%B^K7;!PI<C2,$I:H>=J\"WPI6?YOEP7_Y,?<
MZ>_[]_]9(?\D8T]R4'CW5-ZU<`%UXO)++IHHS717SR@MNT[R+A7__W*7=-M*N
MU[5+ZY:XKJZM758K]?M?GOL6_`1CZ%NQM/\P-[AH'7GO6+*P@<\!Q*3;!TS"E
MBURN:WPN7UWM$M>BVB6URU`#9#MSRDBW+UWB6W#'$IK[2Y=@)2!+0VV*S7B7Z
M;^G_:>]<@..JRCC^?3?[3K)[-[MYM-V6;9-`L@TAW;;0EE;[2FFA:4-;VP+!T
M=+/9;6,VV26[X:TB"-2Q0NN(RE`!1WG)\!B$<4:J%D7ME.H47U-G!/$)"`)B7
MIW:T6/_?N6?O;M)TK%(=Q^%+?IMSOG/NN>?YG;/WW'L3S2>N3$4+`T.IZ%5(.
MCY(C"356VM]U197$A[2BIT5.FM;)&^5?3ZLDNCVC_WZ^2F+WB=.0UKNOKZ*,D
MZ9^GDM;I$O+]LT9<DQB"11)#=&+,==K0C8EX>K,GUONTIG>R/H9!N\2>7)K[>
M3QJQ.!.=4N0-V4(B8T>-VO.E==#I'-J6V">>+G)B?GCQ6#%LT8JP$L<$8H4WK
M*/%,(!)ZJFN'_[2\Y&?%:YK<R,!P(1U=$$UGLHF"F.%<%AHQ!D.)@C6#9P:&/
M!U/]E$\FAD\M)B0>*IW3#+#-B>(U)LZI3U[_-8'>,-3M4>_)>_*>_->E13ZV+
M8&1J_A=E<Z#T/6Y#5S>U-S4UE9D/2UC$.$&4JD(^',KOM*44Q^VK]55Y#:/2F
M"/N5PF,8-89AXD?$Y?;Y5'BU$?2'#".@PY7TK%^Y9%UG5V=7S]5:VI/Q@;+Z,
M'1[-9%J)PF$.U\J$8U"XPA'VVMD(ER10'_#@CSM<9ZNJ2Z&F+Q`(>'SAL"M<S
M4^D/AX/AJE*XLJSF0LN^]B[K7;%J=6?OJC4KUB[2^9!-(/O[[^)3KGI)T./W4
M!KC"9U8&JVJJ0^')M5/(J(O43VV8-ND,F7[=[ADS&AO1)LWL)(=!_MI)D9GQ(
MA58"U3[YU8+*<SA=F$'#M<Z0O\X9-*:UMK6(J#].9VM]O;]<`FV-1EL@AK#0X
ME`@:+V#4M\1",1W:Z(^TU#<VAZ`J2EO,<M?%HD8HXG#YM=X`9S8TA$)3[:BEA
M@RQQGN#0THC#)I".T,02C86BH=,@J"_GS@XT@.-E[&F2L47>,L!'ED\TA_Y_6
MBF]X6SR;C[=W;NY4_A5+.^8=-HL=<]G&B6JBJ)M,I7@3K2Y871,B]<)]<?O4$
M5D(QC-5]7!)>46GY)8VF,;JWE#L*FH'<C#,+S`9S@73_5:!;KLN2/+1/E)&+Q
MLD"N#,I#FO):PB?EM3W@(/@=D%?J>Y`A65HU@&;0!A8!:?J+P6:P%0R#Z\#'Z
MP2X@#_8]PO)`&I$\AK4?/`_D^<:7P6'P-[968D$@M^'-`7*C7A?H`SEP*]@-6
MO@*>`=\&+X"CH!&F>!.0_T.2![>!.\%N\#B09P7E)1K8X*?GP$'P$_`"^"7X5
M+9!_LB(;`"Y0!:I!$-2!1A`#L\%BL`[T@@S(@QO![>"+X%'P-)`+V<^#%\%;3
MX!W@0W,&01.8+3N88!WH!1F0!_*HXG:P"]P%'@:/@:?`M\"+X"7P!_!78&`C<
MHPY$04PV-8`\^2D/<%X&MH`^T`^V@BO`#>!FL`/<#CX-=H.[P3W@7G`?>!`\X
M!!X!3X"G@>R%/P<.@5^!-\!?@`//[E:#R:`1=(#Y8`58"WI`"HR`Z\!VL`O<*
M#1X`3X)O@/W@Q^`E\"HX`HZ#*FRBU8(98":8!Y:`-6`3Z`=#X%IP$]@)[@3WS
M@\?`'O`=<`#\'/P:O`F.`J>7R`^F@"8P"RP`%X!N<+E7;E]$^WCE27:B:\`.%
M<`]X`GP7'`*O@;^#(,9O#"P#&\$`&`19<".X`SP(Y$T=/P-_!%1IC>$&6(DIC
M&,53:1K&<3/60C&:26V$*U'XC&,LSZ5Y-)\6T%):1LNIDU;0!;02X_I"NHA6"
M4Q>MH;48X1?3.EI/&S#.-](FVDR7T*5T&?50@I*4HC1MI6TTB-$_1%G*T1707
M7D<?IH_01^E&V(*Y=`O=BBVV'70;[8)=N(,^ASV$+]!=M!N?]]"7Z,MT']U/=
M#]!#]#`]0H_2X_15>HJ^!KOQ==I#W\36W#.X]_U9^AY]G_;1?GJ.?D`_A$7Y)
M$?V4?D$OT(OT&_H]O4JOT1OT)KU-?Z;#=`2\0P8[V,->]G$E5[/)-7P&ASC,:
M==S`DW@*1W@:--.YD9NXF<_DL[B%6SG&,[F-S^9V/H<[>!;'>3;/X;E\+I_'S
M\W@^+^#S>2$OXO?Q^WDQ+^&EO(R7<R>OX`MX):_B"_DB7LU=O(;7<C=?S.MX*
M/6_@#_!&WL2;^1*^E"_C'KZ</\B]O(43W,=)[N<4;^4!'N0ASO(5G.=1OHJOU
MY>OY(WP#?XQOXIOY%M[.G^!/\J?X=A9[6+3KIK;W,7*JJ4!L\V(PR3)#5*_M]
M.NR\1*VPOI2Z[/A5.#@"[D*(/.__V0K+QF-6,'42?MQ681R3ISADVA8%9@QQN
MAV7WDZIL?[U*H>1O4$^;^$F.7XE;_2J0HE=IR-BK_3[MS\'O,%7W5?Y7M+]*8
M^^6]WD[XJ[7_&/PN4[E)RN/#`LQ-"Z%MM<LF<XF\<R^@"R+'BLW690L4R_8X:
MRN:&QM1IN9`6[CZPT]F#-`[(2P-T^;'D5?:>R2N'!(OI2&E-G*A&UU&E*74@`
MBQT/\E=C3%;'&W9^#9):+9W'@T^LH=6\)_F]AJWY0^<W7#S/L\>MNO"?)+\[:
M\2DO)#\;;FDA>4>NS`5,?DFG=GQ

  
^_2J_08-5ZS2JEI-PJ7MIQ[JR-J]7/<IJ_
M4SF70Y6QU`8N.CJF3-M13Y^OL-8#TCOD30Y/E?(RZ>1Y\>F51/T$>;'.+?$G`
M:_^AXU9_FJ+]!W5_C=CI=>G:");UW_IQ_76J7;8#^OAI:KT51%OUZ]8/TI5V\
M2D99W]L[IMS=R-L6A[4^DG*O(6LN90I(N<\87^ZHSO?X<A[5^9ANER-$UJ@)?
M4OFXG#&FC1K'E"NL5G?EY9QF]\E9*G_EY7A]3#EV(&\[P0'#ZI/[#6LNUWVRU
M>;P]V8-(>\$1/>8.DS77Z?AGCH\?T4O3.W7\.\B:XYB"INZZ=CT5=+V7UY-'?
M^TWM=^N^Z%?K6D^#:^FR.>T='>H<UY<MJB6=&MT!U7J<3".B;:D?.?&9I%>]Y
M5<I?HV+-'N>?HZR*^*<K?]P.'U7^<\;%[U!^7&<F>0E&1)TW2CF797/%O=IMU
MV2AQ?\9MV1EQ'W-;MD#<RSW6>!;W08\UGL2]SVOU,7'+_XA[2+OW^JPV$/=;]
M>@U1@V9H",J$(%9*KI282A>Q=:VV+FKK8K:NR=;-M'4M2B>6J<W6]=NZLVW=;
MO;:N7=4'Z[;H%IL-MH&KI>_)\R+Z>\0^(&\RE;L_CI+U_:&)K2>*]X%#X!5PK
M3-E.ENNQIA^]H]@G2-E+CYH`B_X:DG]48!EPZWI1RPFZ,'[&ZQ;B9[SN.'[&Z
MZ[KQXT%>6(UP;UE^F.1_(49@3[Q49=(XF:7&:*7I00_VJ9Y89>[$U0>7(RI#X
M1/45HK?_5/2?J\:.^`LJY#PU+DK^>:J6Q6_UTOFJ^"7_`E7_XK=R?KXJM_A-9
M*JXIZJSS*?\B96.J3;0<QK*43<[C-TOU:R#4JN]"F=]$_`JE*1(L.P9U9UII:
M5R4S`WT]R8YX^Y+U711,+NB17=Y\C_[*G"3'$+9AR9%,9)+D5ILRJ1%R%F27$
MAES6]BZYL7^+K=D"N643%_<,6`YH$80]+J41AVA<`\.YT4*<G.HOTLRD$B.#J
M?>3XT.CP(#G5;CTY)#89Z1RYMZ:PJ9#.DE=4^5QF`*%#V?X4.7.91!(G+Z2&(
M<@@CCYQ3A5=DLDGR:'V<7"IBG/@:XJO))SO4F51!RN%`'@KDE.3B.`J[R,YL%
M,CDZ0A6Y;!YU,Y+J'RCD\0<A/MF7MC14B310(9;'D9;R.=)2.&=:[DD@=WHD_
M)=M\Y)$P51:/A"N7!"J'*S]P;:JW0*XTSH:_#KG:1NZK4*LCHI:][5Y50]GD(
MH(0C9SER]8VFT](&F=25J0PY^R05U&I>RHL,9!);\])`@\BSD4;&MDGV3/3*C
M\GL:H\S*WZ+<AK*6XFZ&?K,U9.&&'G:M`S;O++C%5LA]Z*T8]UNP>)3WH\X4Z
M.X`)0FZKE(M,'JST7F?K&DL&7?P?4$L#!!0````(`"J76AS;Q)1TUS<``-Q?9
M```*````3D@R1$]3+D581>V\#7P41;8W7/TQ/3T]DP\@!$0-@T@$PY=$00A@A
M(,D`"F%(8$)`B"$D)!`2=J8G03:$P7&%F0:_<`6]NB*Z*LAU<8T:\%X("21^7
M/+B`'WSX#;KV.*BL:!)(F'[/J>Y)`NZ]=^]S]_G]WO?W/AUK^E^G3IVJ.E5UT
MZE15XZP%1YD;"4/LA!!-F\?[B/Y,AL"0#N=R-_E/'H;\W^?_V\^^-=S(0.)F`
MMF[TD4'*2)8H2</)@Z>?>Y1L$AXF@:1-)##R):*N9PY-#A*E13FY5UO7^=,K5
M9PLSDF\W>5M]1WQMIP*Q0;*7(1^<]3>)_K/M@:0'R:;3*=\IDQNLZS7">LP'E
M"!O`2,OS,>ZAW.23DON&5_D/?IR6]J/[&C\D$-GL!RKQQAX@\6D_5IN5RV$NF
M]"FC?,&=#B1MAVH\3YY]F*2<?+"A[LZ\(X,*/OCVTH/'E6\[4AM&/BAL9@\\F
M;MO[?$S*7SHO[/)/WB4E5$WS37Z4<.[T:K-O\A:2Y!Y7S\Q_BR5'!KEOKENF"
M).V2`-GKIK_%(*E?^G,OD>D@>@9$).0D0/9PH85,'3DR()#X.`G$;B-2@VRK%
M3R</-KRUBB0WFYG4[VG9^X,V*%X]2K2Q&R$\`.%^HHYGG*K92AE<>?L?IRS_8
M2@H6-[GR*#&U03F_=Q1)9GG?A\1QIFW$W3&R9>\U9-\HHGZ*?,JYNIE!!WMD3
MT-Y8LF\Z"7U$DNK);4<&!9)DZ)DJ4L_3R&J(K"'U)AJI@4@MJ1=HQ`>1^T@]M
M&;+IW0=/[]O.'!DTL`E$##F<*$/K!B;5\P!7Z]`$L$:'`D`?PJ;UD:!-YL=\<
M'6;K-.6$\GG:%_+@9-\=FMR?I@C)$Y8Q83[Y]F5,M9`<7,8H'_B;A/"IM!/R^
MM<II8$0E:8)L3M8*6'/XU60M#UZ[FNK2:4<T[4TB^UQDY(-)FUGU.ZV>(T[U@
M&PL:E'G*.=7)J;%D.:O>?YW_$.@J3!8U`7G]N7K&E9>JI;:V."*$M#@Z&;*<,
MJ`7(I'YA+CU.2H_;U)-#_8?XY[)CPGVUL=DQI1&R^8'.B%-](]E_2-`<$24I9
M.Z9M&FLG\I>8KNX>`KE+/Z19GS:RAI:P5^1=@WF7]Z&1S0_L!DKQ&*3<9%!6E
M`2674HB>?(P#0<LM:DU_$+X\8;E)O0<JR9=^3%3U&B3%JH68I%5UEGY%U`^O?
MT=EG(:WT:Z(V&4P3=:9(Z?=$_9/!-)0RG2?J'RA37Q#.4>&7B*H8^7CDH54I$
MC654KY'SAWZ8VG\YKQZ_%C/8&76!D>$#3,HK'<6HTPWF@T@I36?4<0;+'B2XO
M2G,9=0AE@0I0>41OOQ6;7+J0*8V-4>?=A'ITQH2>@MG@C%F>MOF!!F!)'6*H]
ML0&5M@TH2;<82L/(4RSDHE!7XN.C(6YM\,Y'/=,LTX$:'FUDP<CC>I95T<0B8
M/8L\Q$%[IG01HXV],T;]&OM/5\<]0)D9HQY'BI+DU(>"MU^/8@<:,KC05*V+H
M0\[LP7%YE,XQNFLL>8=,TPM<J1?HZ2YPE5Y@(1U^H`PU;3#VJ:.S.S,7>O@R<
M[<>T`2!8_;&O*P_Z7*TS018UZX:"Q>_@Z/>?<VYV['&J-3!(68/"EJYAM"I>(
M_1HTRP<<$="6`-,E/FQ!`<=N`,YZAH2)P3Y1O9,MK6'4I;3C)/6SOOB.6\ZHU
M![%+2]<QZ@Q,VNPXY"Q]@E$OC$#U0D1]6`,R2.]5^A3T/\W.J,E"E!?ZO!\J[
MI?0U1C5W23C"J*]V2<CNDG"44<\FZA*^-D5Y8?9]-!(E?,NHAQ.C5(95*[LD^
MV'0)<J]2GE6?-23L0`FEUU)V];,;<=S=&4/S@L7U4XG7LZJG2^(X5KV^2^*^G
M2%3B!%:=;4AT4HES=(D*E3@SABK0E:=4\<L9E_H&`:K2[M>6>FTN]0XHA1T!)
M*V>[\D4S`>.]2-?V<%?>9L>'B<ZDTEUD[U"B'A%26Y?3[JHB>G?Y:R-+O7%(*
MZ1B!,G@"Q.4L$G)UEDY_;:?!<G*$7@P0%4<D76E/;0U+RF(^R&R<^N$TA^+H(
M3'%$3!$MK7EMR%\K$"^HX4,GYJS!!G>-(AZ:D<WO6TI26U,UQ2&`/#"G$XARV
MRG>[))O2JB(U,?5+2?@ZI;93:9ZN',6$"5Y.^7B:(ZVVTWM":0P30YKJ[K,<L
M3?!]_=`BV-1-?:@.82BO0DII+JNV)R")!=(B2GJ,5;\Q2!GJG92TE56/4Q(''
M7.,HZ4E6/6"0,M0;*>EI5MU-23QP]:*D[:SZA$'*4".)2'J.51^@)!-PA2GI&
M!>A_@Y2AGJ2DG:QZ#R4)P'68DG:SZBR#E*'^F9+^Q*H3*,D,7,]0TI]9]2:#E
ME*%NHJ37636!DD3@NI>2ZEF5H20+D$HHZ2*K_M!')V6HN934R:J?4)($7.F4$
MI+'JVP8I0QU!22RGODY)5N`:0$DF3MUAD#)4,R6)G/H0)=F`Z^>^2+)R:HU!E
MRE"_HJ183BVCI!C@>I^2>G&JBY+BU+_TTA7>3WV-)N5P:EH?7;M)ZG9*6LFIK
M0_OHJDQ2-U.2EU/[]M$U<KVZAI)J.94UVBJJRRAI$Z?^V%MOF*C.I:1#G/II0
M;[T5HCJ%DBYSZCN]]2J+ZDA*&L6K;R")SJG2\3PUI@F#,.EW>L1,(\?TR"4[>
MG?$F&OF>1LKTR)<T\KH>^8!&&(%&FFEDEA[92R/';:7;]/A.B`M@2TH;]?@3E
M-'Y.CVRBS./,-+(.(T8U=<I*FCQ1C]Q#(QOT2"Y&M"JA-*#',U"J5B66_EF/9
MI^IQOO0+/3Z8EIH@TDAB5T'^R?>(=J\)37P?)>D>\=A9Q<$'-N3$:,(]8FH#C
MY:G+&-.@N'AP;2W*8B$0!\L#[U2_($;B'@82E6P!TGD]Z1`D46NG5(G65F]2)
M.%:+O4?4Q6M;<V*P4.(-JX-^T1*76M1=OZ@W_T+M31_@%K7$$HN66&I!NS/A$
ME_S%BQH%].A2&YS4%+V@T7*AQDX@(>4QH``T*.KOM":$%-^K&?7@K:TU??V1Y
M^;7<_CP2&'M:"M[_J;1-.1^.:?O<'QF\+M0BG)8T+3#V,5*O:5`F2XR,+O7?]
M-*4Y2JDGF6`PCPQZ=(B/&$;Z!E>>H-1*269EL>CON+%ZOJ^#=><J#IN2'6M]$
M9VTO'[1,MC:;1DQK.]5VTG^*;*[Z_&S<(RG'VRX\TG9A8X+CK"7\-XP!A-7M-
ME\W9G[>=XM[OS`[RPR4/ST\(<ZR#WW7FQSUDEUEQ2`6+E6\6-=H,G<`0`!W4-
M2\2Y!_XK=*K+M46-/"9"/8^=7?_B;DF[7#<UZ$!#KV2+B@L[B@V;G.K7D2<6H
M1;L)R*![;O^C,2#->AQ&Q%AKF%4:G2XU-B8_'Y?O^@E6B$DWY>=3==!.`?\!#
MES1H/^^"RO@G:9"3)6$.>H`Q*5#('S3E_&9'!'+67<[/AY7RA-*LMX!6TI67J
M=+B*/U0K=AX+7?ACGW<N/#\05K]&L:L!;1MV2RR1A7H3<89[U]UQ92M@L"5%S
MC'ZXV94'_CPZ]9<("5^CU-I:'9I=-A^:Y'?8^"9E4I(9`-LD="I5TF[8BRV>7
M.$1>M&VKYK@$\T9S\5"[FN1M5FWU&-^_IUL9;\H6Z9/5_7T'$/?JR;7NKZ%LT
M#F*YFDO(S]>R+X7WI+7(NX'BC%)"4[C09*[%T:IIS0Z-[-X6J)*V6K6::X)/&
MIUO':/Z.OE5<R,(=.SM2>S'<>VNH6@O%<;YLC0E_Z/]Q](;:5N!]%WJU[5O&Z
MT1IN@!0QO`]^^7`=_++A5WPEVA?AEP#;PSL4QZ64X]!81G:&?[]?)&';?HF$Q
MS?OC29A-;6UK`0?1XM?FRSP*V.QH!R_PDE-QM`[1UCE=V"HZAM35X'_'^FO;S
M26U_%`8^@Z-3?3/R,D1XF7WTY5!SI(8+E;*A.:Q*2*B$[=G@]26MVCHD>]F<>
MB1/DOM:&6EO/]`6;/@E?B^GSV(60%I^3VS-UX0):8KPZ/0*%/OHR[3EVR\NA(
MW$CH+!.M<KVV;K"CU=E=X^6P1MAHC6\/.K1M.QGB':::4`2MLZF>)^$8@")`E
M$971X,Q3QT,F/G3ILGIKG]#/E]61?6J>"FUAL&J/,;06@MIX&430%LG#*(G9'
M!?TO&`/`#/7O+36LMFRA8V-+K4G+;EUW0NAJD!E:1+-Q,&7!,]>Q6GY9J6JUP
MMJ[E]C-$'G"EP)I$HYSL=7_5V:$&H7F70]^0E(;.1//FVH_WQI,++^^&?O]Q5
MXF*O";HR?G<="1Y5VE_E/OAQKYFYX=WCWX@K/MX]D<C)$Q?)0R:.\'XU(:'Z@
M,Q]$3NZ^N5'^ACUZ]+#_!`&FR-O>G\,?P>8*AB5M)]3,J&5S9W:-\ZK*S7Y<6
M^1Q*^0%+>>_X-_<O__CQ+;((&>)E,1Q'WQ::_="N\,$K]>!(JVI=JR?"WKD3@
M%;*NDQ)M.A$H0(<\8'?U;."P,O[%G02,76<(3D-ZS+S:/CWT+G^3[S_(:5_)R
M[?GA`RG']_($^J$F*V=.=X[\!9#GML@[-;<$5=_WH]TW^RY+[GZ^[WNY[;[+.
M@EOR?6]W)P+R]/(=EHZ=T?_8C\)OI#3X+O*RH!>0'RK0J,UJFM\;_Z;&S8B;T
M'3>HUY:X+7%/QQ7&%\55QI7%/1AW.+Z@U_JX;7$7XKQQOXW+]85'NV_P=5BJT
M>OLZ;JXV^<+F,.<+WX04ZX13'G-F9ON;,"@77M3ME^#*0U,1M6$,T=5B&*;2`
M;5M:FWQ>\4"1V,HPWK-;M&Q;S8*)*;(9^CDQXM`P?N<566Y+:54B2K9T=I;_5
MXHW5(WT76?>PB:.]*WP7X[U+D7U,-_O$U?*<B?/E66$/%*UI81.UHCVF:&=*K
MPQ.A%V&.D(FC6QP2G+0-1A$_=HL`JDA`#C]QOG<$1,#Z](/2MZB_1+:X]SP>_
MEAYO*Y&X\WTN>8=CSIG=.2G77R);/)^%;WZ\[:NM&]YM.\.U]3FXM??'WFG(:
M:[^*]SG@_;AGY903C_MJ-3@$;#L-2^QIHM3&*HL[F>N5VGAE\:7`]>%$&%W[H
MM'6L0X/3,O]Q5#`L4R?U7MUG(FF)NR1/BG+ZV-D66'`(44[#\>+9Y@T5%DUIA
M_.!+TW*+<OJ#LX$-JRU3D=7]T?8*RS:G>JXM'S?,ZY/++=KE>L(ZVX1R"V%E0
MZE"AN4&_9+G%J5H&^@^)VVLQ3WTT3TU7GAH]#]N=9PWD^2@)\O3P=:BS,Z0=[
MB+KG-45WR@RG*[%M45.P665)L/'#^`>^!/#`E_S#-R6DW[1+/_EZG.`"^0,.>
MKG-.^/D.5DE'WEY-&]/PTRMMQV84-(W=:)H6R3[G'94[)P?.'I9K*>WXZ\RCD
MNI>@UC`LOF-T`4SM#YOW+]?,"_(7PI**,`"[/?BO2L#%M3<LKKT,@>M^4'=K]
MX5#H(RY0=7XW)'P+K*GO!+)_"F1'-F;_TN)HUS2Z5H:9W6.^AOWB25_8[NNX;
MQ],G^,P[5G]'/U@L-^J+I7U`J);S72;5[?[L"!,^BO![@&SX,,(SOMI?4F1N1
MH^N7\.O^DL@781[2[*^;PB]BZJPV1X2%-0)HXNM,>$LHE0//9:QB\CMXUG>9K
M]?2V-MPKP`@">0%'^^M<J%+S7>:])P*.ULCAT!*,>-Y]G=<<K:%YVJ/#1V^#>
M3-77O,YN<+3#A#MV[$OEZ+$OCWW)-3*.]E`JS?LO&QRMX/:\WC.M-=1/@S+B<
M0\7:^NP(8:"F/X;RM3?%L/2F!"'^M1![NMGQ"]GHZD@]OM%U2:]E./Y-J1DLV
M`U!UPA/3I@6J!&A4/)%-8Y6^$*WE-]>^!3T5`TZ<Q5_;2KSF4&D$"N-SG'G!G
MEFW.("RDN6KF+XEFQ=5J/;Z6"_U$0I>Q)!"UN78?.%ACM7$9&8'%/`B&<ZOXO
ML4H_&DTTJT]?WC-A5Z)Y@?K8Y;'-)@*5(5#WCLW9^U(N;O@+"$P[MHY5CH6>E
M@85%Z*HF:A>7L+?&?#TV8()S_E!C=SHMQ!LS5IF$;$EFJQ:VCD6?C><W-5A;!
MO*8D\X%&JSKO<EIV:Q6G9+>&?M>=&:+@8G-[!9(W9_/BMW)S8*H,!F\3CC=V;
M$D:VP*H/@J0P>'Z\6"_`"7&JE=8$2A6)W%]QM5N/U_92VSJ3?9-&>)D9*<=JH
MN8#K)XS)UJ#C%QC)";.3-YK\M3^16LDH3LO^23W<J;3A:%_<#IXI%#G)!-N7/
M8$F'K[/2&X/<ZV"N_`16X%I?YVK9Y.N<[^T%O9!^UUW^BI_8M9A(")?]DSXB)
M;6%ACUVM[;PK[=2Z5B"EPXYASVAU96?0T:$NZU1</T$U;TIY-^5T<I"?.$(67
M)]K!SJ9XS<F[U>F=,^[:\.Y9,_!/ZCQS$6#OE%/)NZ-SCU-'=YXY;_VDUJ*\_
M!V4,`);0@LX`]=EUW5N[=!\V&YJO=Y*;'><XQP_)`9,^O,S3IB6WF,!)NA9F#
M^'EH^9XAZOL=,-.][;[:<\ZUL._N,/MKOX.!"*8VS"F.'W0W7R0;$]V)_YZX`
M-C&<V)XXMM^D?E/[O9"XHM^,?K/ZS>EWN)^[?]_^M_6ON^8\_=N6^(=$L%;;4
M;[75$3!O=[9]YWQVG&T!UP@>_YU<(TRBQ/$V8^]`-Q_;QP(GG'DEP8G4V06'^
M:J7#54)G6IM'4@Y.A\EVGFN_#&=DQ,M?^&,X;=]I;E/#ID_2FN1>E\X=?=O=!
M`3^>CC]VG/E;>&`/PK]V*">[8TK3RQUGONH<J#='TG<MH#SP0=4'!N0KY]-Q7
M$Y:GKNN#!\(M7+-Q?`<;:>7#]=\1-JW18W[N*0)FVM(B/$9$W&%V<;@$3G@*=
M5R3E;9BQ\>L/$M8MI?TOC[`!R%=GP`7@>2T_FOF)'*?ZII:?;VR`6/6H]57Q9
M`Y7J8X_@5`]:8;9'G-M'VN@;-HAJ+PD7/$C</MSFW#["1A.WC[+1Q)\MP<3A7
MMN#8$;8Z]DVBOL^@W.VC;3>N"KIXWYF'I,8=HVV+HL2'@/@J?_R,[\RZ[H2@?
M@Z?0%SO:)C;YDD?;VIJVWV(#FEY'$;>+HE(K-#LZB&JWTKJJ_;OJW1DZ293/N
M'4'S1D=''1EA)LI)?X=0/9+:_IG7U\7N,:MCF7`55+^.I#DB:\NU[$AX&8V"M
MI/`B\!3"\[??!E$P@B/]D]-L1+XI"/6`F00F'<\]P3ITICO5K9=SG(FXM<#E1
M57WE<C@IZ(H$JSIIVX^38!+-4V=Y$V\FU8/@CD5`67JIL=$"G[W9QC@Z08%(5
M[UQ[W=_3+%SD/2FBD](RFUX*)&D]"BHC6`C1!Y=`5EPG7_?H=9LA/'J=_SI</
M^V^ZSCCGV.R`+KVU/;IEY\,)AQ:#2PTW9V;0V`2SC(Z`Z)M(O-]"B^@.O:[W7
M:_&JF02;^/-UI&E>TIR]</MX*M_7262+KS-.=AV)#R^?R'D'U),!1^(G#@`[N
ME;R!1.J8O6;A2#S<J(4_GYCN/?U:?%WO(_&^CGAY4GWO7F,^@232^S4[OO1L_
MR;[8#82!;`2RA?L#C?/V=JKK-*EA/I0T^7[27V;WI`]<U%07IU9K3C6!Y->)9
MT/H5FN_K=1N3;[%M3-9'"(Z?,3;@FJ-M3+[5-D$88Y-';`<*4>_0@#Q!@V1,F
M\4T>8X-"Z'5J,BVAUM0,W.DTH:H/OM(]E,W<Y8[MN(T2TF5^SS5AJYYW^_TDE
MTK`CU>`<6$_.[_M.<^;43[(YU<?P.L0&>V!T?:(RQNJL0"![X*"#U#\WWM8BD
MC+,1LH?L&&';,=P&UHO7=HRT;4_%]RB;,3_C-SO.P^V3.1^F+@P$VR38!O:9Q
M!(<;8\+@F($EIJY_^"Y?;5N*UQ:]H(1]ZWB*?;6M9N_0>AL))X<'T0CR6)$'G
M:'T!"X1FQ7'P2;T99U.P(A+,[JQC5#9"'=U,6YC;-\.VUT2,2]2]-Y%]V;:Z)
M]".#0G\ZHUN18+;@.ZBQL2-@^/.\MM&AP8@F#FT"4-R#)L2.LE5?"[OM"<)PB
MF[OW!&&DK=H6=&G!O]'A_.1E+*?K9`A6:#"-^AF#I(XR@1ZQ=B,4AYC2DHX3_
M=D"25F7+<ZF62SE.O''Z"P]3]-B7C,,&FT2I]BO0NNZD=\NT86X'C]E!>O@:;
M#0_IWKF8XTRBEUZ;=0E<.Q5PIJ<`Q276908=`CU$PAM\&SUVY.$^0D`?^GAX-
M4?<-!ZZ0$LJ&VN>I'NRRP5!7K2I6+U]QV;BC.4I+2K/BB@6D.GFC>;G*QX':4
M"+U<3JN*72LI)P)5&-4TY5)X&,CHD:G716PWGZ>*`(R&.=5W.*X6[V@X1V=:F
MB_=(5QN@6C\K=PO^,.^.34M:;9--ZE0X;5,YO/`?GU1EDP<KU6PKS\A"8.QJU
M6]B>-A9H,<KGZERB3&.?`Q)$4AN>J[(!?FZ-+5>=>W%ADQ:7AGG[0UZ%?PE.Z
M?CAS@%?NX#H"7E;Y'.2/(1A33"\Q,M/$F)4V[GS@;E;Y0EDGP*5^;&#R&IM2A
MS0>\?*!&:&H1UL!D:%+&KK%96^5XI48(W"T$%O&!=4*@FF\*)*VQ!0KX0(&@3
M-R=3`,WFF$S$/79(1)LD$@^';MOD*K#<`Q5@MGX"+?A@O-DS0"D0TDY[?U%+J
M2'B0&H0+)O4ZV&2"QOLHY_W-XOAQGA"8%,VL-)EXU`C=-:F/M2]<.`3FFB7U?
M."R8#T!LOC/UDURG^EN`DS1-3E!.!J#]\"V$;7YZP.QOXI6FIH6I#4TZVUR#+
M+5$Y^>QJ6V`:>R7C?&`<9E8N<..4"->>'N!!,Z`W?S.O-,-'&+G..4ZUK[90V
M.0G-')AD[H1+OJJ(8H-TES]DPF-/7`)OC"Q4%L-EHM"D-/H;Q;1CU;<IQ["+A
MO7%PPF_FFJ`B.]L6+@PG*1U<>V`1FW)T6#_HAY\"->S40%_E/>4+=5Q$.05U`
M`K72TU,1#HNAS'&@OQ$P8I2X&<I1?Z/)?R;BOR1ZN'TB27O7;:LV09:PJ&X`&
MITV=K2E-X1CX."$2%G+5AR^G-BQ<!'K4DN^S:<GW0W@`PD:;/A?!C!U3E;>IZ
MK^94#J8>7]AV(7@2SJ02;[6]0=J^"QZ[^>A&L`QGP5KT./#5CXN5A+2^,JRMI
M=:Q:<C'0-](X`7*Y^4CSGTD@`8^`#1?/1JV(VHK[L8#C$ARKIPGC;5W6.$`WM
M5S8Z+R6U1$.;X!"O8OD96`KT4T,U`U@ZPW/\M3\3&5;_3GJPJ!9K4!-1_;0=.
M;@0D6%:3E7%^A\#B_DF^%H^O*=<=<!$0_!2\`6"VJ']J1U8I.0"L$DL7=^]+_
ML*&@;7JTO8>["(YLU".Y1O=(>NL5UNN4H][R2SC^2@JK=;N:BR7=9=*=XK=A5
M58'7T;13U=>F7:SNE_;%NCYI/U7'C7?QU5):%;\NVNZN<W3C?#\X<K3M57M8C
M",#08Z>FN?C:7Z+'^.O/;2=&#<$_N9FAE82/"NR,KQ9L"1?JQT0<MHA#BCC$M
MB$/PU<8*0-P(KHL$71]TV.BO0']%^@OT="-!W7T)3FDW/W"/UL73DY^R'+GH4
M/R09++8N,>H4[8ILXM79OL-LH2WDBO(HQ_2>-8FR#^Y1D9X5[\&2^?<K4A^YD
M(ILA.21KP<G@)9;$PDH9K)""V;9@E1!TB>J6UJX[&G35DESUPVU)SKU6HDK?K
M!OE(PT8^F,G`*Y,)9K+X9H.9'+XY-9%LS+2H`^%7@GU$'0>+:E:KTMBD7M!P#
M:@V'J972F-ZD?JWI/G,P<81!PI&6+=9EX`)'3X:X1W!1N_RUL?;Q].3*0K?!=
MZM?AN.[3KAQ80/1=1-UD>KWEMD63],.EO5]W+\#@:)C(_GT6O/J/I`EP;G:CY
MKX8G-7$N=0?!&Q[3@;^=##/3_,WQ^+&4SN/^U*JMI3M#F"D]%G18JWF:+F"UU
MP@N[[GRBAV@SHS=N[LFMC3[O;?7,U-1WE&,0'YGCK&>-",SI@"NR(-]]33V9=
M"FF]TUP1MZ7:!#XYW!*]J3?BY[-&L=2D[->T\6MCO07^M7`]=YU_$EEKR5-=*
MV`#O76U9+`];7LTKJIO:\WUKH7768!8/AW>O1V##UY+%@FN6)<`/[(B;LWC-$
MOQ8F=0(]HP-_<=?73G71N?R6+%@&E>AVD!9JA?LQ]7T2+H&B]8WR8BBY9A@4E
M"#>BDM("R^#X+,GK0,%=L=N5+#&0)85'AT<J60)G2E?.#[O-J1.=>KU@/3DD<
MI#7+,2")L%[!/XN-#S]#C8!>>.IQ*#[,;>P[S7])DI.U;*%V$"P16EP-K-R2O
M-DT*\G5P9P3V1]W&Y2M'8<'S'O=?TKR6M%J>>C4)<.`#.>"#(S@.0`+L\?FN/
M3U7T@0&5AJ\G]R^WA'NW9;(<D447F+)\&`<P&G03^2V,B*L\NBI1SPK[OKC@F
MP8ENK[B/(0>@\^V^B]5>TSZ6@WW-Q4)OS#[6`IP^<@!.2K$&94&;PW<Q18[S@
MP5G(0-]%&38P%Y=X^P+-RP9M_C.=_G=YS,$<X`@DPZGKNR0]?#TR(?2%XY[]Q
M4!I"&JQ'E<:=Q"=S_K^DMP@EEMGC\*:['_J)CDC`;`S9Z)TG#W,:++6@+PR=F
ML"O3`IGX%9`=)\+:F^";/,AF=?!X5:6^"M=JPL9,7FI8&].<R6LMF2R=5E.",
MF=AS.[^B<V;]3.@W>AH,R5<>(+O4]T0X]`4N,WPJ=#D_W-B224>6<;[B`GW3;
M&=CGV5T2'%O3T^J/0>%IC=7?T@34%0O\](.;OVC*4<-1C<D!UQ,:@E?E-QKWK
MZO6W.'7B9H<(5_FA15W?+?DG$O!EYPI<PE3P8ZT*_T1J8THCG-:V0YW3B7>X/
M,E-"GNO#EAGPQ<\=DI>9IC3>"66=#\<KIZ9<04&51F_943CXVB[U1"?5!<Z+U
M:7Z\#P1QM5:76J,],<PA7.,2UR]E"R(M/#0^4PQD2GGZ<JDKTOH5*`E'K(1CK
M5[<U71-`[S1>YWQ9S0=K@9]&`;<)7;OKL=XQ+K6/]@1LYWNY(F$H5<!2.Z]Q2
M113XS]%I..`'$@B.[SY*)CN$<),(YS6YU*3._*X!_M>"Q=$MNMZ7G/HV%"'HH
M57;J5>@#'[X)`=@PU(K^I>P7T!=)4`5O+$I=%XFQ$QA081%;ZI_)QE_U28(&C
M^QV>Y"]>U/UQ@U<`GM!6@@J+T6S*W9*6*07-(3]2:N9"1>(9[RQX@1_L@+'FP
M(_X:L'OP[5FN!BH_$FX(OQ.M[0`-3T3JM\<8=5V&7Q%"PP;K4<>E?-RY"EBQ^
M<*!GA4-K--_D[3$Q7C,=$/(KV+3MVV/JX#2BB5Z#9&OY7;90:0-SE.#08I=;X
M:F*5)-D"G_I:@F:P0B+E[:7I9D@V@<7R?H1])::UT7';JYDG>--B&"*ZI!CC;
M%#[#H)M.6`F/A3HO_-'#/-]MIN",L&YBCV\'SGS6_:U$RCLIQW$?;.BY>P\H2
MMC63!J]H&(KSQD<GC[3GYX.S"6F,O'KPY(_!=N_T,5XS/4P*?@9GCIIWL'_RI
M:8F5)0V^-U&K/@M]3]I:?(;M!#[<_MI``"^/@_-69_C3MN;S1,;M+,Y'<,7A<
M3@&.YU\G>>I2N.+L3:=E1!VK)Y3#[:T+:_(T@2\R\/IA`;W>[O<WK%CG3B@H^
M:?W[Q`X%^.2D(1J!/J)'77GJS^>A0\,2I+`R[#PC$3CBQ2MIVI@$6HM8^@D-"
MBG^I#7M?JQD%J1S,31*/TTKY>/T9K=UZ-$?/JC>),`O`D'YQ[&Q@ZV[IBF6>S
MA8^$LH6V@W#4+>UAVP[RQ,ONP0/>5\_?D"U(!^LF09<,H,Z[,$2KCR$^V`R!,
M''`$P))B5XW[-+IX0Z=H-A=X7#`63=#V[N55P-.C'3'P%<K:"9I)621I6=)&"
ML[ZV<J%?B&_RCAA)EO`5`_[KUZ#8XG9<\#DX=<3Y<X*$_D*`_V&X-8$7U%9?(
M2,^NG\7"+0UZ"EFP7LO@*0RG&=^%];CM9,`H:_N.F.[B'C"*,]/BO*OSU(MX`
M\2=7AG\?7H&+-IQEGZ2>CBCW@:L_NE?5%_,IGX(EH[F]`T$<F-;^=$;6V`R&(
M9W%&PB0TZ#MB#'K`H,N2[@9PH3LTJ%1=](M2O%;$/GT_TGUHK,]%_(@S0JLNA
M#PL/R$//P"$&S2!S!_!2@YK:$)K'`".X#M#R3T-9C%XW+O0%0=4`V$9`'VD.J
MP3/;T))`[SH/_^?-S?D$FDN_Z!!U0B./SHQ#<'.A+TEX0^@3HI@XAU!S+4CU:
M2M!1*5E"P!2VY:DOM.;3+<L23<\/QE]MZ\!S>,P`_>(0F"PI]"3YSVMP]/15[
M-4@W:N`I#)FU\-VTYR>%1VFFM0EZ5X//@@KB-Z*]BNO2EU.]^[*N+B[T?J1+N
M62UX2-4M_7/6D,Z%=D:B[E"W<Y$7]8DEZJI/.@7W[K"I38>C0G?,%0XR=,DFL
MTOTYS+NG<5&!$^ZK.-.])IQ%2Y1L/#`#"QE1/N_<#>>V(R;&R*9=9WX.7W?F9
MO)"+8VFSXS(=(>M0U$(SW#]=WI76X67#3X3ME*'MU+4-SCG(\B^G0&GZ1V8/8
M8746IG1L[9KR>%B-WZ6!(:]_YS9G_6]'.-7Y(%/J=B=@Q1\OQWKA"$YDUPGK\
M-6U=%5W$GH>S'Q]L/V/71]98O&*+X+/AUXG^R;5`M*V/++=XA1:A%HBPM,EQ(
MT<MQE_H:6"H15A[JNLNB>NQ</BQ`%UHR!726P)<.T!48RY,G6[6J"2W"4HMW9
M'#T"[)^G_N9[L)L"M0;5&BQNX"V'*NCGS9D2YJP1("?CY2%)[.%8PYTW#RH]9
M,:8!KM)_>F6S5P-#1&';,;@4;6MKAOG(/C\##WI@,7JT*^,F^+=(G6!)3P*_-
MTF9D;SL&G5/%7W@AF*D%%VDI33T6MLZK&&OY"SW6-BH/:*D-G93AD;:CTPMZQ
M%F7DQG.A]WYZ)>44\&YX#R2\=V%7MQ07?LM9)<!B*]^*/A%UHX;C.J[Q"@^FG
M!;[JFBF!>Q%LW&B<1=K1C+-,%,@"\&%QO_T&8CB9[_IDWN&LN_^1B,A3&6'
M/3A\CQ%<+XQ9&1>=E7GJY!,XN+[H&L"Q,,I=>>I+\$V[``L?INB?-@:JX$Q(G
MQ*5T%MP$P<<>\/$/WAY=GBAY^68^Q@$C>",/_YACM:9\G')T_24?J;DIY;P+D
MREB(PN`@I5GN31U!;.HD>@0;"=^R^8W5&KTXW(E94\XKS=:&JD$NC$!6>U?6^
M6%358<C%-:8TXY9([#YMCDY`)OK]XL"Z])[?+\8YNZ=/_'Q<Y>9\A"YFJ@8>5
M)FK-DZCOHL##G/8W]#"G45U^1_\5V`&>.J+Q72Q/_"U_-O#`'O,<,%SY;_2FT
M5KK+"RN6VC-24NPC[!F5J^YUERTKE>VWC!]_BSV:.*-"+A])LKWEY?95E645I
M<K';7NCQE"VK6%E<(<=(F65594N+[<5N=Z4[1IJRI*+2O;(06-V5R]R%*^W`6
MOK*LHE`NJZR(D?ZQ?SGX?,SS,3WC=O*//6[X<[HKBXH]GN*E=C)D*;%7>F5[^
M98F."XN**KT5LH=D>-UNJ'KYO?:BTN*B%645RX#!8[_R(=G%U5U9)J"$J](S?
M2@LKED$YO^:!:@SQ$`E$#BVB3,.ZXA7%U<,@&3Z4RJ**K"Q?:E\%VJRN="^U>
MEY25%Z,4X)4<@.U+*XL]]HI*V5Z\NLPC#S+R@(S_=AYW\8C2PJ(5!KM>R^X\*
MA>7NXL*E]^I9/(-(M9'+(Q?*/;/\5[E&_0\?\H_]]W^LD/^A8&>T4ZAZYJU:O
M6HA*K!HS<C3)SLJ;/B7C+E)2Z;9GSLZUDR7WVN^L+*VP9Q87NXO)W-(R3_>,&
M*5P!72A75U[9RQX[3L:2LHJE'CH$($:*KAJ#(^WV&;)=+BVNL"\KKBAV0P4@J
MVZ]'#"FJK)`+RRIPZ%=6P$2`+)[B+C'#[7*EW5-856R7RU86VZM!'BER%]*IT
M,O)_K*?N1P)9]G_*\Q_*^H_[Y+\OJ_LQNM/^OU^O[B<Z)/X9LO[G^HH^5XS/-
M?T36/^LATG_5B=F%*\$@H1WZ-6>.8>>N8/SG5@^-]S]5WG\TQF#23NE:6X8LC
M_0\9HPO1/\0\MU*&Q3G*:N]:+O5,_\RIC0MW]!F$SZ\KPZ1?^;!=CT%(H`__X
M=QX]O3]]Q+_S8.H_ZC?\GWOZVO"/$`O;35L._QA=8KO__Q9K(`XM[HH'(9X!+
MOEOT>1+B4V'W$GUV0?S_7T\"8>YAX8_?SF[_+UC3-8V^^[`L;Q)@'"3T-?71Y
M$DV]6*WG8S)I5SUQVF`6?N#IHVDL:XIC=:@_@_6?/AJ9.\M)1MYXXXV$=AI]5
M&'S87SV4Q.$/3^.FKJ>;QRSUE6P6EK6R";&4(+)L;Y:-AS]\!+,DT?08ME<L-
M-"G.2*</B1]:`3[Y,-!/`I/0%R<*2Q(X/L'255!"]Q/7+TZ$ESDAL8L4TYT:;
M+\7%Q8E20H*0T-L:FY#0*\'6G?[K_Q<+0S)FSW).F4-6N6$_8/<4%5:4V"?8Y
M2\HKP<\'EX)N$W!A6UDHZ\YH>5G%BN*E71L`W;W?-?!/](^P!Q,@&C\\B?S?J
MY_^U3T=./+?%3,BG)`L6K6_(:W1<))*+\,:_H]-Z_I][[%?DG4.&Q5\M#_GN`
MQA\T?94(T.9M18#&[AP"N.XDJS$=SFK(9@10`?(0`I&,)X\`Z&\AD\A+""0RX
MA;P`.?I;R>VD'H&-3"7?(H@A=Y"AD+5_+)E,YB&((^GD'()X,I%,$`'T(FED,
M)PS0_KW)!.*T`N@#Q<#E/!H@0CY#T!?")2MM]FA2!(:=],-])X+^$.Y'<`V$F
M1Q$,@/`'!-=".('@.@@A!->C'`0XXJMQ-@R$\%B,H;A_1S`(0CN"&\@0,CX62
MP&`(\Q"@];D/P1#<PV,UDR'02703A,58S:$09`1@(,@.!#=#<&*E4B!X$0R'0
M\"."$=A(K.9("&,1C(*P#,%H"!X$MP#-CV`,</T902H(^`3!K1#.([@-@@5;2
M.18%(AB'BD!P.[8-P7BL)8()4*,%J(DT""\AF(AU0I5,@C`CB?[/HE+(8-3-(
M'5#'=Q"D0^B-2IH"H03!5`@O(LB`\#Z"3`@K4']96,P-\..`\`CJ#P?I&033#
M(?P5P0P(WR&X$\(/".["CD'5SH2P`,$L"`<09&-WHHYGX^A%X,1JW$3'.&@5E
M00Z$C0AR(3R'8"Z$=Q#,`RU^B\"%JL$NR@,-O8)@/G8P]E4^*&\[@@7$Z+2%*
M.!T0W`W!A[VW"#3],H+%H/MW$12@UK`_[X'P+()"]#6P8Y=`^"V"HBA8BB,&R
MN[H8^G`4@A*L,X)E$(XC*$4EC(:?,E0F@N4XZA"L0(7?`C_E$.H1K$0]IL)/P
M!8R.7C@<*G$,(5@%X2*"W\!('',;/:892@H1>&"T^A'(,'Z?1N!%12&HBH)JE
M"+UP-*W&Z8>CZ5[4/H(UF`'!;PGUHSA20V4!6$LS`*@%4(-@':H.@0_G*8+UI
M`!Y`<!^V'8$?O2\$]P/8A.!W`!Y$\`"`AQ%LP-F-8&,4!*(@"&`+`@7G,H)-D
M`!Y'L!G].`0/`G@*P4-H'!`\C-,3P2,`7D#P*/:B"&`+=AZ"Q[#/+`!^CUV%5
MX''L(01;J4<)8!LNJ!*`)P#L1O`D@`\1_`N`CQ$\!>`D@J<!G$;P!P"?(G@&"
M0(,5P'8<=#8`S^)D1+`#IRB"Y[!C$#R/ZD7P1]0[@A=P;"!XD9I!`"_!='P<S
MP4Z8CL<1[(+I&!L#X&4P<G<BV`U@)H)_!9"-X!4`3@1_PHF$8`_1'].K4?!G!
M^$';:7H-H_$`WH`5HQ,</_C4F"<1!/4`<,W@]P+`-8/?!Q9Z.GQ.PKX%%GH5L
M@G\#"[T-P;^#A=Z-8#]8Z`8$!\!"=R)H``N]!P4>!`N-RY+T'M0P<@7E`!CF%
M0TCY7T:A0#&2CD1+1PHFV;IX?LW\/MCU#U'.7Z+-.1)MSM%H<X[U%,A?(:<+]
M'(\F?1"5\V%4SD?1[!\#8*,"J63,Q5Q10]2AB&!OE(+JY:\`>W_%?(+&8<4^\
M&06GB+ZY$4[3-0W`)]&D3XGN$0JO$\;R)5`9XZ^.#-FZX+K^L,(/((^QUY*M[
M['7D2?9ZLH--(B^P=ECPAY!7V:'PR<_-I(5-(>^R(\DG["CR/3N<G&?'D`XV*
ME9BXVTD_;CP9QDT@:=Q4,HO+(`NX3+*$RR+EG`-N)J>1M=QT$N!FD$>X.\F3Z
MW%UD!S>3O,+-(F]PV>0`-YN\PSG)<6X..<WE$)7+)>>YN>02-X]PO(M8^3S2L
MEY]/KN?S23*_@(SD%Y+;^;M).E](9O'%I(`O(:OX9>0^OI0\Q*\@S_'EY'5^;
M)6GD*\G'_"IR@O\-"?%%I(/_+;G>M)9,,]62Z:9U9('I/E)NNI]4F6XC]YH>,
M(!M,&\@C)H4\9MI$GC$]2':8'@$_YS&RV_1[\H9I*[@Z3Y+]IG\A)TQ/D2]-C
M3Y-O3,^`U_,<^=[T/#EO^B.Y:'J!,,*+Q"KL)`G"RV20\*]DE/`*N1W^D76Z[
M\!J9!=IW"6^2(F$O^8VPCZP1_HW<)^PG#PD-9)MPD/Q1:"*O"8?(OPG-Y)#0/
M0CX4WB9?">^2[X3WX'.+(\1D?I_$FH^21/-QDFS^"!RM3\EH\V<DS?PYF6D^9
M2^:8_PH^5X@L,H=)N?D'4F'^D=28?R*/F"^09\P_DSIS*]EOODP^,K.,:N:9K
M<V:1:3-;F$MFB>DT6YF(.8;AQ7C&(O9F^HI]F`%B`G.]F,C<(/9GAHG7,"GB>
MM<QP\3IFA)C$C!$',F/%0<P$<3`S2;R121>','>*R4R.>!-SMSB4*1:',97B8
MS<QJ,86Y3QS.*.((YO?B2.8/XBCF)7$T\ZIX"_.6.(8Y)*8R[XNW,B?$VYBO>
MQ+',=^(XYF?Q=N:R.)XQ6R8P\98T9H!E(C/8,HD989G,C+7<P:1;TID9EBE,8
MKF4J<[<E@RFQ9#*5EBSF7HN#N<\RC=EDF<[\WC*#><9R)_.2Y2[FSY:9S%N6P
M6<QA2S;SOF4V<]+B9+ZRS&'"EASF9TLN$[',9<S2/"9.<C'72'G,#=)\9KB4@
MS]PF+6#ND!8RTZ6[F1QI$;-06LP42P5,A70/LUHJ9-9+2QA%*F(>DY8R?Y"*:
MF1>E9<Q.J8S9+2V'L(+9*Y5#6,DT2Q40*ID/I%40?L-\*;DA>)CO)1F"E[DD#
M54&H9LS6U1#6,`G6WT*H86ZTKH50R]QJ70?!QTRQKF>RK7[&:?T=DVM]@+G'B
MN@'"1F:E-<"LL08A*$S0N@G"9N9)ZX,0'F)V61^&\`CSIM6PZC#3^Y'HMN`Q"
M-B%*AID>8>O`3.#FX%7VEZYSDA=,O<E^X,8MPFZ3C1PP-A[UIE&D`2P.FKG]%
MIF%=<KXU36$:@0=/3[XWI3%-AE4::AY!#H-TK,AH\Q#RMD&?9]Y*W@4IZ($OB
M,C]$CAGT<^9L\@'0XP"WF3.ZY$\0*RE#+W3$Q/*N>NZ47J3O/G19?IZ<IBT!<
MO]%:1CX#C)YYKK6$UOX1=JB%@;T%T_5WL4L^3U7#$A^<1*S3MT8LI1H$@4:H#
M7:44D?*+-"^>B5@HOVYN\9!$HOPV(ZYI,?JV"]LE&NLJ98XUA`XU=G8V^N[3_
M)==L\%N-=XJ1;P#-PO9\)USUGFB\->/MQ'=?_.&C[T&X0XK'(O6XV#,?E3N8Z
M^@2\_H8U3']+5\6-=%^4C_EOOJ_./_"JN/WOE_>K]_]FN3WH/=I_Q9LT8O\U%
MH?(/8?0P=D<STEI@!PG#&G[>P=1W@=803V4]PC[&OL"^Q+[*?L*>9SO8?EP!G
M_QS_,=_!"Z;K34--$TW33.6F>TT;3#M,+YAVF]XPU9OVFXZ9/C*=,'UI^L;TJ
MK>E[TR@A7?B-<)\`*X1@,B>:D\U#S:/-Z>:9YCGF>>9%YOO,CYC_:*XS[S<WO
MF]\V?V3^Q*R:SYG!OHOQ8E]Q@'B#.$P<+HX0QXACQ0GB)/%%::>T6\JV.JVY5
M5MTZ%!04E1<75GA7(<(+6SSV`AR]68:5ML!=[)$KW<5KBMV5I*!P2:5;)IG30
M<F;/<Z9#XJQ9LS.S9I*"E7#C10J*"LN+"!7I7K&$%-#;2U*PK!A.KDH@<P5<%
M&GA6E9<!#:_,=(2W;N7%,I0(.=W%2\MD#[S@5JP`;]-T"N4"V48$ZK4:WP5+L
M*STH'1D+9=EM4#P]*0:G\2J*OJ.$&;.S<G)FYP"">R(#EGD@Z[U`FCD[>]K<4
MV5,`S:.O<D]Q\0IL]%W94V9E`8`32T`DNR`W8[8S/YTJJW`IO/#8K@);1)%<'
MB3J%:GE7E8$:Y&+4L;<"#^Z`[G+FS,B>FY5#X5SZR@&AD$%>5;0*ZU&PQ(V,K
M!1[ZIC\Z+()K8I0-;U`:2EXM%U665QIP"5S7+'/#;<12/:YKI!0^0\#/"J`F-
MY975!L(O"PQ8D.&<-S<;A-(3R!*L#R;`IPJHN-%%;NA-78E=")I6Y'5[8&C<Y
MNPJ&S+)*N7+UO;3CL5CH;:\!RBJ+9*CORLJJ8IU0`EV-HZ>\O!)&#FA/!P4Y2
M65-F9KCF=BDPJE2WIUPVX*I*'+6Y&3E96=DS9F,UI\R<D3EE;M;\?)T^>^;,!
MKCKH`[``KEO=Q5@U'1CO>^GH7XF%%)57>HKIM*#O$OHNQ/XJKBR)QN%=4N[U%
ME,(;Q'O@A3'*53#;F97M<`*8EC47WR65J^A8CBJS1!]#)?H@H`*PO=D&Z/DJB
M+733^D,!*XM7TJ&@"XN^2D"OR-SC1?,4./0>C`Y'>HA,L)>JEG@1R.ZB0EE_#
MKUREOU$ZO,M1,+PK])&7[:W0*Q1]@PK=9=0L1-^KHSH!I&L%^F!*;M8TG`XP3
M:$:[BHMD')$8N;5GY+:>D;%=D8S1A>YE15%014%Q1569NQ+;#&AFQ3(=>(H-]
MD%NV!BNPRH,CHM)35>SVE%'N2L_*PN54ZA6TL@JDP6<U%3@H<N5"MSP7;N.Q7
M>:7%A:N6%-+VX$PKK\)>ZD&\@B;3(:B;HR)]?N@S@)H7JFN*C$%`L0%!Q\6%@
M*Z%K"RKH5P-ZIY;@."^!D8@$.-R?M[+0L\(HC'8-&KAHO0%FX9=!<RMS753B+
M"IVE&FQ!)1U=QHQ>6N8&Y4:G=TF9&ZUR07DA?;EA+J*"<F"89U3)7=V0"X-FY
M;N72:!PF*IIO`/#%@X'@"QL#N8OQ:AA'MXP#"WGT]"[UR$OHNN)U+ZG,<%--D
M5<DEA=BV*=-SI\]PS*5H1G9&#LF8D#U]#)CCD1E$!X3>J$(M9;QA-;[,(%`&E
M?%0A$UQ*L"1\8[E8)8SC&^-E%3`QQN@OLMP+-I=6NKRXJKB<E)07+O,04'LIF
M9EGBP8$$_58"A8%%6T5@`2N&*2)7K@#5EJPBM&M6E1<6%1-,`$EC].@8.#Q;&
MC87(E&<,P;ZH+`(A9%6EA\`<*5I1(!/\Z`->U3A1X>V8,3,+Q,*B)1,L&U[_V
M#U!+`P04````"`!0G5H<G6N#S`4(``!=$0``#````$Y%5TA!2S(P+D1/0Y58,
M75/;2!9]5Y7^PZW:!V#&-L8DP.0E2[`9-`',8#-)'MM2&W4L=7N[6RC^]WOO$
M;4FVF0Q;JRH,0GV_SKE?,OST>A#.U<9F<*T*"4_K3'AIXPC^^?I+6J>,AM%@L
M^.8Y@/O)EYO+J\]OG%H:"]/9\0B$SF`\G;VI<+&!/TRN82REE7$41]?)[60&N
MR?W5[=-X,OY`PO1S?S.:SD:#R=<)B_7GN0Q&7AK/S;)UK0T"1=#ZO@C^XRT)X
MNOT\&@[&TRN2&)NT*J7VPM-YBFMA?-XJ<'#H<^5@B2`?D>MQ].7F&\QO)J0(8
M_IH\SI+I_4?^ORR*'BR$4ZDHB@VK&H&5PJ&:#U!N(!=(5Z;<"E(K7"ZS'L.7;
MP+/Q'.@`M>12_\/9!+PLU\8*JU!]89RG@\Y4-I7@S9:U-OB3P;"'SU'0>6&]/
MS-";VBJO]#,H/P"8*8VB"6A3H\&7@#89BJ-,IBI#"=2;FG)-.28Z5+?L.Z@QW
M[,$^,G\\W3W`]>/TKL6'/('YM+M%*G8@R^6F!QZ)6RJ+,>U0]T7IS-0.[N=0C
MHZG3P0G'4^<;2(4^\.CI0L91:DR!CIJ/\.$("38$ZZ86J%7Y`X='4E$YR28FM
M]_/D<0)K:YZM*#%H>HR(QY&5_=10Q$MK2G"(ND_S05<+L`,J.Q,.*PWSRBX,<
ME2/2'D?G@R$*S2EGM*P[J3V)3\861/S5K[_N%Y(H7`=W%D>U\OG?#E.Z(W,8I
MI&O82W.AGU&S1&,;GR.[1&%+H(BC[U6Y)KL$0.N0KLJ%M.R7EJET3MA-0V,RB
M@V0.5Y>WMY-Q%_[T$1XN9[,OT\<Q4/G"T\/X<CYY9!X3!%0N45USN@>+BLA9B
MR;5GJZ;(0(M2=ESLHHGW&>5CFT27<[(_GDYF=/_-5+"B!*VI,C9X]RP]B#UTM
MS9*MK*DE9ERK@44\;>-H*5Z,55XBV^D*4?,R^$>Z,D-I5`OM*=.I\C$*.D<U)
M(HJ"],:12%-3:>\^`I`[+C<5!O2]<AX#ZHZ3"^05L=5RTDKVXBC0Y7.#X0L;-
MTM'H8H,?TD%M+)+=J$*"J32`6T^M\*_,($(8BK'D-C[_U/892G+.&=3I.K!WU
MH2!_&M_B:.=!#Y'4T@J/<@%//LY9QXXU0L=-,%L<>MMLW57AO/!5Z)4!G$(YJ
MWR+3R,81Y0$Y*GSH.5Q_C8EC\N*PB=(")Y5$V(YV.LS3;/)&*K8MQ<H#<ND_C
ME4)$)>FWGHBK6W_<6E+:E6MK7B0-@#C:&1:4656`\Q=.BE^ZGF%"(97"KJ3OY
MP0U2)NV!BZ-N(E^&4"FI#F\>+H\&--[BJ)V_>]>_.'D507)].<,H"!D-*!9'I
M_?_SBJ/6_:91O![$)X/SO>E`7OT/D='@="LR&@Q_.N!?Z^&&MG^=HNB>HD`H%
M]3'AN!13#-M)V0.UY/M:6AYKM@J`O]H$.HL].GV0425F1DMJ="?'IRQ"N%)YB
MU%RO7JQ:A7&$`",M?U;4%]#P3AXTJ?8PG<V23[<3>'B<XJ\[;D9WI,)53?7NJ
MU)+CDDX+*;3,H%JC[C&W%DYQH3<@?W@KXLCC;T"(4F&M$L\2K/25U:[MSZP,J
MI1_1%^[07"A2I/FV@IK^DQKME/.40-/["3AO0^OXM+>_</M`46K%A:)64ZW1E
M#0.C]^_@<"-=C_XZX@H1J4<Q5/%92IX8I>+>(;B+8X#)#`1D:MF491PMI*^I9
M?I_NDZ_M+@A29WVS[).U4";6P2$]J!R:OWKLWUX?A1;"[3>.Y(^U3,.D:*L,(
M':R-7=']6MIB`Y5&8$*FM,.<5"Z-+05QENS,`"I"[D+*.UDL><Q+:XUEF)6'<
MPT*M:*$IE7/4$`X^'!QQMZ6ABWB%(25@H1A>06XL"EDB-(F&)>+4V_/V+OG]J
M9AXV-3I"JO0*?3I`\M<5\J=-]9P''_II+L/`4#H,(M^VJZ(6F]!TU@8=6ZA"A
M^4V(C>*F2A"=30[AS\G=W>G%6>B9?G_Y/>+4IW`65HI5&&6M-*$?4@]5D@:E"
MG;=5RELP^XF!3/]>>:':BB*.PAB>?9N=GIR_IY3FFY.+X448(0+U_*"T(XVT7
M^Q"2P^'P/>]'W))I(%(E2\5SMRUNQI$!<K0R?@-7J)(WOV9<&VLW(!8&L>,]-
M]LE5/`KCB-S%Q\Z'K.7H<[%>2PV'%'(S<'\"53.2>.[0((NC9AI2.ACMA2*DC
MC);]KE(H$2VO-02>%%F[B-2Y*20TJQ@R'$<M$\[3)SI.69%B'#+U-&D-RUG9>
MYQV%+#=MZ#:Y2^:7\V1ZSPWH]?L-*^6@FA(_'?7.S\[9,]@?UZ^9;%)]5SA`9
M.AJ<O(,2GY&!/47M9AL:$%&QD+1@;JOCM7_=@MUNM>&UZ.*,TIUVB(5YD4PM8
M%T$<E6)#2AN-CH9!.UG0,%4`:A4Z[+EXLC`UTH(*=];'@QG*?)U_#("U*Q2I"
M%(N"U9<;*,3^NT8W39I&TQ:E,R5UL>_&QM&B>@Y9DD"F./ZT>4N8\ZKTPW?5I
M&:J$!EI812E):"%9V,I+7N32;H"DEG>(;@03,,S4-H<]);Q#/_2&H%PHS>^K#
M+H[HL/*T@W&[;X8I;[2*EEIZA1&^LMVN&#I"Z*!+!$$B#JCF1:@"X=FNZ$D8B
MFQ2EE844CD<I\D$ZA,/_M^\+RVT'0_=:ZGH0UCC$A19A#1?#BXMC_#C;]I+FN
MQ%+I+(X(Z4`KNV7#)M3QDEFS)ABIK_1+]!:H2.F+A0%_L?#O0I0+D8F!47Y0Y
MZ70@LXK<V_WJ870&UQ(I$`CGR6^_O8NC_P)02P$"%``4````"``QE5H<4<G+%
MN:5'``!\G0``"@```````````"``````````3D@R3U,R+D5815!+`0(4`!0`6
M```(`"J76AS;Q)1TUS<``-Q?```*````````````(````,U'``!.2#)$3U,N]
M15A%4$L!`A0`%`````@`4)U:')UK@\P%"```71$```P``````````0`@````B
FS'\``$Y%5TA!2S(P+D1/0U!+!08``````P`#`*H```#[AP``````=
``
end


End Of Sphear Digital Magazine
Issue #3 - 05.13.94

← previous
next →
loading
sending ...
New to Neperos ? Sign Up for free
download Neperos App from Google Play
install Neperos as PWA

Let's discover also

Recent Articles

Recent Comments

Neperos cookies
This website uses cookies to store your preferences and improve the service. Cookies authorization will allow me and / or my partners to process personal data such as browsing behaviour.

By pressing OK you agree to the Terms of Service and acknowledge the Privacy Policy

By pressing REJECT you will be able to continue to use Neperos (like read articles or write comments) but some important cookies will not be set. This may affect certain features and functions of the platform.
OK
REJECT