[Note: For this archive, the news.zip material has been de-archived and
appended to the newsletter, as has a uuencoded version of the pics.zip
file, and the bibliography. This was done because our compressor, gzip,
does not do multiple files in one archive. -
[email protected]]
������������������������������Ŀ
� Computer Underground �
� Historical Society '95 �
������������������������������ij
� Journal Release: 12/1995 �
� Volume 1 Number 1 �
��������������������������������
�������������������������Ͱ���C.U.H.S Journal۲����������������������������ͻ
������������������������������ Vol. 1 No. 1 ��������������������������������
������������������������������ 11/95 ��������������������������������
���������������������������������������������������������������������������ͼ
This is the first issue of CUHS (Computer Underground Historical Society).
This journal is dedicated to giving you informational and current stats to
date of underground groups and technological breakthroughs relating to the
underground. As well as court cases and the like that are part of the
underground. CUHS will not try to state any opinion or bias but present
the facts so that you can decide. Enclosed will be pictures, group stats,
a dateline, and news logs.
����������������������������������Ŀ ����������������������������������Ŀ
�-=To Contact CUHS=- � �-= Courtesy Associates =- �
�Internet:
[email protected] � �Electronic Frontier Foundation �
�
http://exo.com/~unreal � � Site: eff.org �
�-=To Find Current Issues of CUHS=-� �SuperUnknown Archives �
�Digital Decay (310) xxx-xxxx � � Site:
http://www.csusm.edu - �
�SFPD (714) xxx-xxxx � � Path: /public/guests/fm/su.html �
������������������������������������ ������������������������������������
* If you would like to register your group, please contact the SuperUnknown *
* page for information and a form. Also, if you feel the need to report an *
* incident of interest relating to hpcv.warez.ansi please contact CUHS at *
* our mail site. *
Contents:
Group Pictures : pics.zip
Court Cases & News : news.zip
Member Interviews : (Interviews to come in next journal.)
CUHS Contents & Updates : cuhs1n1.txt
CUHS Register List : (Group Updates in next journal.)
Bibliography : cuhs1n1.res
File-ID : file_id.diz
descript.ion
Updates: (11/95)
N/A "First Issued Journal Entries"
Acknowledgements:
Registery Information - SuperUnknown WWW Page (SU)
News & Court Information - Electronic Frontier Foundation (EFF)
Flash Bug Information - Computer Emergency Response Team (CERT)
begin 664 pics.zip
M4$L#!!0 @ ( )V#-QV2>4/<C5$ Y2 + ,C8P,%9!3BY*4$><>F50
M7%&W91-(D$ (CC=.\
[email protected]&<X#B.!0M.(\&!#H[C>' \.,%Q'.M&&W]\
MKV;>G_DS,_O\NK7K5JUSSJV[U]IKORR\; ^RDK*2 (07I?UZP*\/ ,(U%GD
MOQN;4:AZN;A^MW-AII"Q-V4%O"P#0@!O$1&1$!'?(B$AO7W[]ATR.@KR:V"^
M?X^*COT1!P?[(Q86+@$9(2X>"3X6%A$5$0DYD(*2 H>0AHZ:@HZ,@@*(\/H:
M\CMD3!043" >%A[P_SE>^A!R 0"$MPC_'8#_%0AO$)%>X:"@HKU' " B_._X
M/Y(? 6\0$!'?("&^?=W":\;O-0= PGJ+3<DN]@Y'V1B9R@F7(S ^!X7Z2TTW
MGLH4E(;3Q#D(%0V?@)"(F):._A,#(Q<W#R\?OX#X5PE)*6D9654U=0U-+6T=
M4[/OYA:65M8NKF[N'IY>WL$AH3_#PB,B$Q)_)26GI*:EY^;E%Q06%9>4UM;5
M-S0V-;>T]O3V]0\,#@V/3,_,_IN;7UA<VMS:WMG=VS\X/()=7%Y=W]S"[^ZQ
M7B&_04)"1$+^#V2$-Q[_V0\6TEM*]G?88LK(QDXX5!R!*+A?XG-JNE&I.56@
M>";.4VCX-%R;M+#_H/YOT/]WF(/^OT#_#^;_@?S2!<!" :PAB"(B4 +>8"$@
M8B&\+ '0$1%>'Q"Q "# W:=H\U*Y;M*;TO =J<G+?D2PM:VTP:\L!G2EDS^H
M>,+M9[1Z38!I2ZMT9/HA>J'@B1> 3OF -&%Y6BF/+U'PUA@O=?[&<\B<1R0=
MMF>*JF.?^6;XX%R.;P#E+[R%SVA=3U8]DHA[HJ)7W*)\<D2;O\#%Q872:3__
M.J(^?=)!9!;[>^*?I?#M@"=S_XCALRZ1'9)%<LC^PXB3[%%L9/&6\!\.E!<
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MO3%/_-L> WQ[HZUJ7P '3G/77 54IC#JT79U=@<RO=%C=\PCQOGP86*3CUX
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M0D2A1A#;7&'LEM:VMLQWE07!7Z0^Y"^ LJ4G%96A$\M+P SR+$&4BF<</D:
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MZ.J)!=Y;IA6D&F%""E?<R4J9%H3R'0%=Y$E@U:]_7>?4,-,)@.+IZ2P<\;
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M%-^ '^ZW;^U/._>[-OE"=,FM/I"25OHNUAGU\%&X5*_"'97.C_9==O*])*1
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MO*\
[email protected]!:KY>*:A>N\A5>SCNZ(:BL.S,+<G-7KKFC( W,U @[<;,C
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M.WC_YZ;(5]U_S#YY2C)6=I ZLX-S.0)YB\E-IJ2$DU]NM69OP(1EFGTAF0M
MBO#C&W_E6'1,&>B#]MAF5);"3I)%1&/N.T*AV(7[N8G@=D6G30RTK:,14[)_
M?=EZ;(,CN$;7+P!/8$^MBHN"R*XV==,3I!W'#<8TP'&D>2$[Q^/,TC]#7MOH
M' $_';XQ+/#+RF/LMZ,$?/@,('OK5ES<,[23626(!D=QFOGC._%@:N5179@2
MT&!>'?_7IMEW[M*C^_FX>,=[ +-22WQ+Q 21K)^/5<OU6&]?F21:+CJV@:4@
MHC59;X@ZXMTA*;@55'*%RVN<.S:VDIAOU?)7J7 HF,>=569P3^8^45XYZ7AY
M+L\D*EEI20H=+*BP;_<.3]YN7-(#6.@4./OL?II)%L/&S[> V<%(UI72KR23
M:SUA66=A:_D7X:%<#5_UC(0:6K[L$[$.8>\^O53_,LX0<3 ^OSEV.AM5/LC=
M5QYEYD@T##C#.P36T:54P9-V:Z>OVRH84?#R$]1$U65L/PUU#PO731(/**DD
M2I0TEV5OEL%[MZ1ZBK=;9KG)0'HSOOW@OW;+=WRC##O^']9EKRO8!O!;(2&;
M\SO]Y1@(R:)C\>0K9_O-2.0^LVV]DL*TI4);BDM 6;H];= 41?AG1?XZKIC
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MB>\3;TS0((B/0H,E!,?ERK*$'Z"FU.'(([ZT$A)R*XGBZ*D6>H#4PVGTX+
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MCO>GQJZ:.7(GE8 2 "VBYEF.MN,MG,Z82M2#5<#AJD(-M6"HR'&K:7IOF#1
MI"I3T_[;SX9P#[EH1=+$7L2:7@N:%?F 1$1#[>=A X%IKHE >\UPWZ$NI9L
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M-LU^M*-4S>F*6ZG>L%:'Z^KB^2VQ?L&9[X/G^DIL@$ !6[!MOFW/A?@!9W,
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M.-%!! 7/";"_/)LX3>)- T-_HWJXA"0:Y'A0B_^+*QC'TT=3=%EN;DVX7_F
M2$T0=),$0IGM#[69;')Z;[GFG$'[^2'/:>5)5@,\L3]',3R*.RWKPIZ^I5BF
MGBD1.\WM@4,N<LDCFTOL55;32S]'(+7^/;VMU(4H/C?(%!VQ?@=VOKH9737W
MZ63T1C>_MJYX[-W4?)QPK+%R X-XD^DORMOT?1X8)2U]2RX'##@D0<3AQE=U
MJ"8^5!5S+;1#C&^*33,9MX&RDU"[Y8[*E3B--8T5F:$[!?O#3_VILN7Y1BE>
M=F3>/T(2OP7MY)80V2+\4+ S%1E<-,3HM%Q'A;OT>OM'E%5<ES=.,<KP!?O:
M[R<XYE?O9/\[%) : "(=1^=.]*4[F?#)?+_(:()V8#B7<+<R#*J6!2O_M SN
MIVK%BE,+PO *&& +88&)W#.!18:\E%'B+5C1+F0H L\^9=BOY(8FSEZ4@195
M+D8-ZG@_-HP5I\E7($W5(B$YB_$/;AK<ND'E-@=RURP>J1KQIU\ $W(<<W]!
MA"-S-65T#:0)L7VJCW3X8A I6%64ZQ;!KJH_*Y;G59+6<T/L\WMX7NY 6=ZC
M7"3T4P]=09'[[7=3R$BFE^I"\IEZ2E\ L%[(0AI:V8[\"&WYG @7F;J?Y]QV
M6'+9,@R\ZJ6K@Y94I#Z6.=U,3I:Y/P36O0#\T!9I;E+6Q".%%X$.WQ@M=_8;
MO,)KS1QUBPJD0SY<=<5;]3MZ'1Y*A+H(*LGQFS]P:/<[.4I11".1ER]L'\X^
MF[GH/%5&Y8A>*KHC':'RVTIV!@IA#H)TH'6D8-2(;S+.HZWG^T]Z)SE1)7)R
MJ^3<6P[@)@'NOAI+S:*_*E)ID$2H:O>CU*:!_M9Z1,0VD7P'W8P=MTPK:GXT
M/N+R#+2K(&&ZW\CX9)_^<,J;C"]5N;(EUV7N.&\PYU@Q?Y%$'\:6RDONO5W"
M=Z['D_$NM9%]F#4[<60TV<+^3K@CM:HPQNNBQ5!U3(T 1'V@'7N$@GG&]< '
M6Y'D5,FR/M3<33(EC_RMH?*KH$T@[PL6A9^)O<=JYXQ7:94?$4T*L]7 +XA8
M:_UF#5&'ZJU2NF+#<!=*V3.L H_$_N\:?2U5\I9"%_ZW/$&O<W'Y07@&\$<%
M'E\>@8Z\L8F?YS5=QH0H\@;C=$V&W1FA2!)+^62/[G@#)^PBYL'I=9C9DB5\
M=Y4I^2M6R0%GIHHM8Z WSFSZNT_@]S_\;:]?%2:2)/;]]=!ZXX!I\!4>I_\Q
M(B3!#9]<3W:1Z3)!N+AF11V5%$$C*2YC7KRN,5F1 2&1&=<LW66E%C/5#--[
M9,B#N(-EEDLZK?Z/P;%\*GIYW+@J,I2;)^I!_5%A,I/MY@6P;*H:T\1>GO8"
M",2"S-7'DN/H)#+&TCO]?E[QOFXO>:K9/";)5P[>D9[B/6[V3SHDQCSMWBA;
M8<WY7F)UMNJO'B^U'?]82H[O"'<C+B-H63T,J(?T5C@+Z<*SI[3 ;9\M8=?,
M[/KF:=L*)#J P_N*F$DRH8S0@!T;IN8V;I,G#"P?D@^DF#E5F9TV$-S\>6+S
M,/2T3^@7 &]WX"N: ZPY3X_M;T6T-=G+6M/7NF: FK:GX>B !B>"-%0'A^0V
M?;9MO#JJQK+<(W?1IT63:/VOO0_+.:RX/HU+_Q6A&%[GY'3E';7\_P"OQ ZC
M0?&V@>(07TO5[*Z"G#>5,IVGT..AK<24, 5(/TJ4[@]"9)<4R\NVW1V\3[99
M<_,,911U;!^H'U(JMD2MSC/B+\1;#P+9M:6Y4SD9/S<Y]SU)KY?^(/Q1U'7Y
M9-]PVS)PH/ ]ZPMSSMT0[GEMYJ-Q=2M@O@?K5%[F[4?=? ]5KN]G!JS"%24-
MC7T2YG?0-9W( /+3V_O5R-I<2"UC0, O'YFJITXI->8W5ES<R%,CGK(WX4G
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MGVB623^145I##RW;L3<H7/Q*U7&+:VTJT'I%8QG_ -##&L+4O&&OW;!#J=T
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M"_O_ Y*LC;/M$?VN /\N<21A7 Z?P.>O-<6VVJ[&IKKH'BJ_P /9R:?XQ@"
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MGRR W?BM'!Q$I)Z$B8/L1P>:7BH*0<"C SD9H 0E0Z\$\'K2F4CI@?A3L!$
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M.7BF(DWG;M[=ZZG0?W?P\UJ3'WKJ%?T)K*I\/S7YEQW.;#X]J=(P60_6M 2
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M,U$?C8G\*(^E)TK4@OVLQ%N@S]TXJ5YP.Y-8M:FR>A"
[email protected]$ER(
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MX=.4GU7G -@P_P#'EKGI$4J:Q6DV:="EC --K<S$HZ4"#I1TH 6C% !DDT4
M+BGQPN_W5)H'8Z'P[X+_ +8<>==B)<_=2-G/YXP/S-=EI_A3P]I#(GV8W,X_
MBD&\_EC _*O/Q&(G?DAH=M&A%+FD:#1LS;K>V15SC@8(_#BJFJHZW.D6\O[Q
M3+))\_)X4CFL(*S\S2;+XDDC) V[!P0"?Y51TN9HX94R1BXD.>/[WT]Z:2L(
MLW-T^W:I4>H-5ENMG'E,1W/I340;+46P0B15(SU.> /Z5,MLC])P"#GKS_*C
M5#)EM+D9*.CH.Z]OSIZVD[3<1!C@'!I70K,MQZ7O5@Z[2!T/'Z5+:Z-!;E97
MPP]!_6A2?0=D69+2V<@+)Y>!G#XKGM7U:TLR(8I%GF)VJD7S$GWQ6M).3L3)
MI(\NO= )8M;8!'.PG^59$L3PN4D4HPZ@BN^G/F.&<.5D9XI0<5;)-31_%FN:
M 2VF:O>6?.2(IF4'ZCH?QKH=0^-GB[5]&DTK4KV*\@<8+20J'_,8KFGA:<Y<
MUK,M3:5CD7U"5\_=7Z57R3SFME%(ENXG2GQ\4P1U/@$F*YU!'4J39,<$8[J1
M7/7$FPD>YQ64?C9ILBLW"_6F=*V,V%'2@08Q1TH ,4H% $UK97%Y((K>&29_
M[J*2:ZG3/A;JMT@EO)(;.,]B=\F/]T<?F16%:O&DM=S:E2E4>ALV_P /]'L"
M/.>>XDZ8D&%/X#FMJPT$18@L=.B5,\[ES7!4KRGOHCLA2C#8T8--NK>X5Y%:
M5(F^Z%!4X]5.<_2I4ELK/(BA2$$ ,&!SG\\?I6.^QI<D_=.?W3+LSD8/2LV^
M1?\ A*-/5\%4AD;&>G;^M5 B1:BC(D='0LC'@E>E4M+LA*EQAU)^TR+@@YZU
M2=EH%KBS:<OFA22,]LC)_"I$T:' 1&=V89 5<_R%/VC0N5#KC3KS1+CRYHI(
MI%VMLDC*G!&1P?:DBD,X+A&5R?X.!^55=-7$:,-RULJI*Y"..IZ#V-2C5]*M
MW;9<)*P(9EA1F/I_#]?Y5"BV]!W26I,FHW,N[[+H\IV]3.1'^G)J*ZDO4A:2
M]O+:S0#I#%D_@3_A5J*3L]17['/3Q_V[.(U=VBS_ *R>0_HO^ J[#<Z?H<9M
M=.M9+J]S]XIP*Z=6N5$;:G%2YC4NP++G'^%1S:;!J<+(PP<<$#)!I*7+JB&K
MZ,YS4?#MW8 N%\V(?Q*.GU%9F,5UQFI*Z.:47%V8=*.E42)THZ4 '2E7ZXH&
M=)X&5C>WBC@FS?GZ%3_2L&Y&)B3Q64?C9;^$@)R:,8K4S#&*,4 *%-/BMY)G
M"1HSNQP%49)HV&D;FG>!-7OC\T(MU'7S3@_EU_.NJT?X>:79H)+]9+IQV+84
M?@/ZFN"OB[>[3W.NEAKZR.AM8P;=HM+M&1(_X85"J#_*K-MIM_<NJ7-TEN#C
M";LLW\OZUP[:RW.OT-RRT*WL)/.;$@4<@KN)_G_*KYM8;J0"U>*.0\_ZGG'I
MV_,5DYW=QV-(Z0K[<JH4\$'/-5+SP=92#.UHP3@J@.!4*;B]!N-S/F^'1=,V
[email protected]]?\ ZU<UK6AW<7B6TL8,O-;V;;F7 _B S^M=-*JI;F4XVL59M/U>
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M!^ZOTIRFXJ_5A&-S>6()-A20H&=O44Z>%P5*L,$G.?RK&)H _]E02P,$% "
M @ FKY2'TOPN" UJ@( .JH" D !!4%!,12Y'248 R3@VQT=)1C@Y88 "
MX 'W_P#___\ ____ /\ /___^_W]^?O[^?6WMYSI=[OY]:USM;&O=;.ULZM
MQL[6O<ZEM<ZE6LZ]O<:4K<;OUKW.UKW&QKVMO;VEM;V4K;V$I;W>O;6]O;6E
MC+7.QJW&O:VMK:V,I:W6UJ7WQJ7GM:6MM:6<K:7&I:6EC*7_WIREK9R<I9R,
MI9QSE)REC)Q[C)QCA)S_QI36QI3OM936K924G)2,E)1[E)1[C)1*4I3>G(S>
ME(S&E(REC(RM0HRME(2EC(2$A(1K>X3GG'O.E'NE6GM22GO6C'/&A'.EA'.$
M<W-C<W-:6G,Y6G/G4G-24G-*2G-:0G/_SFO.K6O_I6OOG&O.G&OGE&O&E&O.
MC&NEC&O&A&N<A&N,>VMK>VN$<VMK<VNE6FLY6FN]4FLQ2FOOO6.<E&/>C&/6
MA&.4>V.,<V-K8V.<6F-C6F-:4F.42F-:2F,Q2F-20F-*.6/WQEKGM5KWI5K.
MI5KGE%K>C%K.C%I[C%K>A%K.A%K6>UK&>UJU<UJ<<UJ,<UJ$<UJ,:UI[8UJU
M6EJ,6EIK6EIC4EI:2EHQ2EJ]E%+>C%+.C%+>A%+6A%)S>U*<<U*$<U*M6E*<
M6E*,6E)[6E*<4E)[4E*<*5+GK4K.A$K6>TK&<TJ<<TJ$<TIS<TJU:TJ<8TJ$
M8TIS8TK.6DJ]6DJU6DJM6DJ<6DJ,6DIK6DI[4DIC2DHI.4K&*4K.G$+&E$+.
MA$+&<T)2<T*$8T)[8T)S8T*$6D)K4D(8*4+WI3F]C#F$<SG&:SFU8SE:8SFU
M6CFE6CFE4CF<4CF$2CE:0CDA*3D8(3G.<S&<<S&<8S%[8S&M6C&M4C&<4C$Y
M,3$I*3$8(3&UA"FM2BF<2BF,2BEK0BE2.2FU,2DY*2D8(2F<<R&<0B&$.2&M
M*2$Y*2$A(2'
[email protected]$,1AK,1@Y,1@Q,1A**1@Y*1B<(1@Q(1B]&!@A
M&!@Q*1 Q(1 I(1 A&! 8&!"M$! A$! 8$! 8& @I$ @8$ @8" @0" C__P
M_P#_ L ( "X $'"/\ 0@<2+"@P8,($RI<R+"APX<0(TJ<2+&B
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M]CPBY7I4)W.F^%18V$JA)C$2Z'@"^(:
[email protected]')&M5.S]D\L
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MH:"XO'0;HI>:MRHLLB<;N">[O=M+HF*:#]XKL^7@#<5@!#D R(P 3X\!5,
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M6T $6^ #.\ #<9T"Y!#+^E2.63R?MBQO,)F=1JB/ILB20P2=8MO2CX59/UK
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MC+X[_,E3< :$?@1:D 5'P -)\ =:8-U_@
[email protected]; 8^ 8(?^IMC<0[
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MNA-3O)#L)!0C\MX[_W-.D.1DE+U!Y[P--_THS:G.Y.KTDR=,6ZM.J$M7 M7
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MT1X:48@C_*$3-?J#'XSP1TBVZ%X3]?$0+)HL:6E!!TC_4$4Z_H&/"/V#%4?
MARJNH",_J.(:WBA&,3A@@A]P( @_L$:M#IB.,^M#&]K81A$4$ U=R.&4R("N
M*Q01U.JZ8@Q,& ,<PO!G120",$/B A)F X$Z3"]>)4A7_%$57-J<W44(^9\
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MR B[O\<<IX>;@=; (T&7!4Y_D#ZF:2&*BU'S?*_BIK4]+'O\Y$W,"2R)S?W
M_<W'I&\=JTZ])VAUJ_9]>*BD/^J:JK.F,[,O=1TN[^K02V&B84*@+:Z3L%QD
MRE4@I)#&^HIUZ(9?6+?Q>;L[X*PSZ -'V(,&?(0^V".NH:BMV0MH<2C%^(-)
MT (^:K<_N!<,'((_ 0>&!(:^;8SP(,A\)]KR0P N#P"*(#+>T$"B($=\($_
M2+=M,8P<6+S,.(($( 1X+)BJ*1G( :8@H8)BC."H(&*2X1CD)6?JK@2" +F
MLKA6V &O 8T14(=X.J_M8[3F>RHQG"]C^CF<PSZQPBHQ9+K_XHF8I*L=ATDF
M !,Z,/DT$!JP]1H3U8F44S,//Q0=6%.^7V(UJ9LBP((>
[email protected]+#J0_.._
MJJL'H2@:L/ *>"@&3U"MJC$6ND"1%=FVNVL$/N@$7>$[9-&"5-""0EB#').?
M;Z,1QBBDORL,##2"-?B*3#"!'7 WW#H#K9$6(PB,*UB##4B A@$4;@"&>@5
M$]B"$2 DU,*1;ODC),"$A%,]U:,;):RS"'A!)W""H-H&:<@'YMJS(H"#(@@"
M&[#"D5L"QHN$TMB!$ LL*'(@.[2J[\L.3.,E?5P^^1,>3;,P_=K'5SN_1XNA
M?)RT[$BP[=-#.FP9I"LZB409(EHK_VA2-2?*NDO#.><+FI?P-2N*1 Z3Q,6B
M1,!IK*Y@!W PAU)PB[>@@CW S,P@SSHA%+P@U PA4X(A5#H!#_ NS/XMQQ;
M@S^ I#]*RK^+$25S-Z>,G\2(*-TR@7+ !S=H <PX M1"LHAZC!W @FLXC93Z
M&B1 @S0@!,R01J[!K?\)C1U8 USHLE10O;F$!FYT!63XN.MRA1<(@\$9 SW#
M@71T@C! !B:X 1O8*5? <5!#"V8 5?!-=;8M;+Z.>C;%/[B'++J2.7)*OFB
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MT('C0R>;<PG.W$< [5CXM&"4:&)W-%"C+4E^D.&8;HQ1$T.@J&&A(G6;#4D
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MRX+ ,\ ['B//0@C4H-331MBQ2-C)4/ #_S% I_TA#\ 5/GD,:7DL;W0 KW0
M@C5(5B$#!$#PSR.(A$F=%AVX!F80 7/ !UX$&[WHQ<1(2L-8!$OX 68P!S'H
MJ!5<0;)0+1W0@3R0%LDP#".XLAV84 KELKDQ)6. KA.5AB)0 EW8LQ>0LV.0
MKKR$ S@ JC'H2VB @J,B@F89@7KXFRB*OYNCI5T#S4D3&+L*R#3<JKJZ*EP"
MG95+'HN4(OMCTAZ]S?.Z*O*32'5]-((T4GB]2&^ZR(R4-?-JB0.9,";ZG:78
MW'
[email protected]!NCD!"H0VAX[@R$ @^<,AE,PA0C\@UF8!2W@A#WZ
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M7(AL44 %' \%%A<(%46#92:T1&F=9S X\/J"H,P!*X/T#,?@VO?"#23!C
M(C@;/\""6OB*"SE3>W"'3,B!SQ(R+:AC!R%SKW #_QV(#+ !3U:P!!I%@T1Z
MSVDYP=':[#_( GWX!W40C'=+@ G@ADPP6;69 1F@ B.; .8^9GW@2ZH 37
MA@I5!4C7!6B@.&@(!UU@ FTX!CTSI5*.KE-:95-:)<!,UB<I#!.X B@K5S)4
MOFPM)V(J7&"&VV_ZB?HS*WVLG" %/WKUZPVGTE:GM6\^1)E(W HG]E2K86QV
M+R.=4ETN]@IS)\+^PNF!BM%%SGI8EWV@%2-.!558!E&@<TK !3# A/ 6!3"H
M4%R(A$@@ DH@AF#P78?*<0VD!# A$@8<M_-[$E(!4_(;!8?]_QI6(?:HQYS
MD4<X;3^(A$+ TU!H4Q\PAO_H'7.HJ$2&T(8AR(-I\1]X\(K^LYZN* 0'V '_
M,6Y4505M2-8U2"1.3>D;V1I._0.K[!5DA$%/X( )V):T.5HA,($"2( #L( /
M^ 2*(,D2 (Y:(5<<"GG!8=HF"Y7("4X (AHNERYBA8-VD!%KA1M0Z90EZXQ
M<!3MV#%DR!H?&J[\VV;OX\=](4>*M"?R)$J3*D^:9+G/Y<J1+4'"K%F3Y$J6
M,U^BY/DRYL^@-H&JS$F39\N;1$L*W;FT*-.D,T/VW"G4)U*G08$R=?D/ %@
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MCWJS$%%_60QL@RP4="P&(8E""$I6H%.0PM0Q5M$X4RQ#=,UA%C%_0JA.1
M^(7D*G$)0P!B%*.H!" >ISKA!0LXO__! G5VX"Y*: $,6B""%C:A(.?XH1&R
M8-UI\%$/Y.UL.3S@P>JTL 96$N$(O4B2N<!#&,#X,CQHT((.)C"D(_@A#^/X
MASO$XPYYR",?^T@' "8 @P0D0%]8P,(9F"&)(:1#%3(HD ^44TTL,.<(V8$K
MBHPQ@A%8Q$A'2,]]=#"#',0@! Y29P)4P 4@M( ! C9/ 6[#2AT01'2V 83
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ML$ %LL\$?!"6"0& D#@P0F X(4/$& <Z;B&M.(A#0B ( P-@<,+&H( )VPC
MO0,Y1A@40A"%P$$7B> !ZXC$@T@@[8<&OBA0H29A)Z+T:&:T6E<V_XPUC3*I
MOQL&\8(]W.&;FM1/-<TBGH@6-2->+<-KT[:(PZ@5"A\XBNK&4T?WVVXJBJ0>
M/TA#,7(!!C2(X@])")7B5#&*0; "#&FE!"Y8Q4C@:(>/4@;E)"CAATNFPAJ6
M^0,J .%;8CF'R[Z*3G16!QPM;-JKOCH"L**CA>2 6#+69 6\I"%'8 C/":!
MAA#^ &WZTG= 1UA#*C@-+GR0ZR_CP@<89H! $?RA$+QB1KCT$8]XN$,=X-"&
MHE&@:/MI 0FW&<(U(
[email protected]!\,!$Z5L_+3N3 &$7( P(LX3/ 7&<((
MD+!JZ_[@!_8D! ^"$()Q&",=BG'',<;P O]:%%012@ "!2 46$PQ40L<=#
M%B*-A>B"#3KP@;UVUH(93MB'1^22MAEL8:ZLV\'^M:&[J3A$=K_4W4($=_!3
M.G 2CW%+YX9)$Y]B;Q*/6-\@[J*(JZ]%YG\)^MX?B3Z@D=I($",+1$ "$2H!
MQT&X3A1;J/@:*I$JTJ$"%4U]W.,N]0<P_($X?RB<*FQ&L/S"'XR*,(3"KIQ"
M*)R"KPP/%O2!SD5'<WA5)&@!EEU99^6!&+2 <NS 'V2!!68!#6@#/!R&/@#0
MOZ ?#\P7\ R/.>A#GL'28-C#/V1" <0 13 !&@!?AA!%0@##<5#/>##/Z0#
M$0" =:U= 8@ @AS_2"^D0R[D@BH0%[\LQZ7=RQ$ S <>@2J8B G(P!#8!Z =
M7K+HW0\0 %C( #$0 W$P#T\&P]$0 B< S;DPN4=@RLP@2+<@S2\@ N\@!(P
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M6E<4^ &!_$8SC -VR<#.^,'#^(YN99)R# $N2- (:(!Q)4B8Y9(6^ 1H&$"
ME $!(,$#7!<Z\8 !I, YF,,UW*$B% 'I24/&P,P8X +F=X&'</JZ0(T"$2S
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M#-<0@ $7+$ !S 22 P' )9( #5( "? $^F(/EL8,[; ,.W$Q#N,(%! %$
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M!I0 $&"#.7A#BBC&,> #N0306QHS'0H'#C!>16$CK1!RNB"&F0!(#C=??0"
M:!$&70K_G_)I(I+R8O3%#5C:E-"T5(]FVUI^D9EPGQ/U5+6YHB7^4(ZF)5X^
MR%BHV_4-K"WV92YRHI$J44@IGPZ%Q'NH0UB@P#1,@JJ(0C6D@H]%$NH\8VD>
M!SKZ 1^LCO 4PBSX O!T&:<93Q]@P7E,SX(PIFR"TO3$K*5T76U@4I6%0B%4
M$ROQP? DP2JX@QLD@!; @[3L&=?)V2K]*?!@@3+\0SC4@SP QCXPAB%4Y 18
MYP3\01^8P1EPRP_L@!*^*AH"P*7RX%T%4'KP $OF H!<!!+$IY>9DI8MAR;Y
M%B"@SSA=VN$92'H(@0XD*RD("1( P@\D 1( 01R\0 1X@3$ _Z4W7$-?%!0.
M*($KN(-[)80T2,.,P &.F-XANL(QL!=\M0(6.*+/[4 M.,:U$288$5R_D86]
M9@G#;N+QC5&_WJ5*C=LN\N(L.MA-,2^^S>CR511,06Q?>DW&?MCS\FON_2BX
M)9@J#B9AX(,VA"P!"@,=U8)R> X"_D97(<=O ,=F@HZO6."!P%7_D<HD).TI
M\,$96&#G&!(E[$K7V6JPQ*PG%,)%=(LJ_"RPZ-:?[MP14,(1)($V:,,):, 0
MO,,_- 8^B( 1J-S*%0/PI(<6,,-+Q!(;C0 +$PZ61=\PE8 BV,K&((&H(#]
M6-<27H1RW,9RO!:_C( )C((H" $?P/^5$: ";[UD;OT<&@R!*K3"#LA 8UD(
M#R:+$0B>$?@ (JQ"&@R"):R"%R1!#7S %Z3#K5U#,6"#-K#(,3!!&""#.SS$
M$SS!>0U$S92HZ>G(C.@"(MBJ._(+V,%@O>ZHPUIO&2G%N.'02!7LG*!BU$!?
M6):B6(X8GSALF4A4P#Y8W30I]F*RQ?*KN%7IQ0ZLQ-8%@BWI6X:$8Z 66(BL
M%LR")ZP!)=B8JG0"EZU.K<@L8XIF=+R6\ !"<G 2( S'(N#.L$3'CX'.$? .
M;,%<\9@2T%6SK1[!FK7=IFJS%X1:NGP:8^2#.C2!?\;9IK;9$5C#6" &-AR!
M.[&6@UB7- W_C\\>2"NTPGP(00[(@ PT@I=]61/V'0"9@"1<@16$PADD=!X\
M"RE-TW48P2!4 B;L@! (@</\A@C @*CH .0.P0EP@260PM\9@QJT@C%H XJ$
MKC>T@C9XC"NH01ODT[KV$T28'AR,$"+J2,K@C"XD 194Q(!<A I[1[U2:5:,
M;_">42B.);U1LBK_Y9(2Z?(.$10]42_Z6[ME=>YU,K=ER?7&293.Y<0*IAAU
MKYW$6U1+;%JZA#Z ;"PK0])2 A'\P2702F46,\JYAKLPBSE26?_^ 2\4R\?9
MWURO#J9L!O 40L[:ZAH<P:Y(69M9(- U5B$DQS0I5IPA CR80_M8_^#5@H,;
MY,"^W.<E[9P"<@,^C, $N%,.LI9U)JAO'8%K:*2AK@$VL,(0P-;@&D$ )TL+
M'(&[O!86# E(!Q"GS9D/T*> M%VR7($:8\,X[8 &&($8&!,26B@1+-<^"X@+
M..H+ ,&)%(.F/(-X%X,Q^ >RR:X[N,(V0(,<:- V2$--F]YYC4$1Y A/)X$9
MM*!%#$$N/ I^+76"A2^6%A^YI9M-V>4I]AN".]]/G10BPT4J?Y$G$U_O7G7
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M*CH* QC$SH*LSG*( :>=01XLM*9BEMX)B" 8 SR =?1G#G0$SN< 5?YP2_X
M0C26 LV-@P:W@ .(SP$E(0S$IQ' %<VGQQ'@0B[<F@[ 5J=9X!D \-LV!VP)
M@3+@ S08P]T-3QCJP)&;\R/2G',3PP0LS C<0AO]@!3,P @<T 1,@7P^3 #I
MLQ!HP3.4?3$\PS ,0RH$UWGK0A>XPCZL0GKK B#N@S1$P^KVL<H@0[/I A#$
MI!$TPH#,@#',X$O9ZU'WT-:D8K@Q34LYOD8!NUZ6.+WY4(;WNK\Z.]8T_^R%
M+Y_O">^U@_6'3SCWEOXI!V:2AK7DW\F)(XT^G+L=^*PN3\(IQ(:L;"8 ^T%L
M.L<?^,J:LFTG+ @:".Z75;-QY"PG?%+7Z?(?7 ',_0'3SUEZ.(=DWXMR*(<J
M@,$.> $P;/P4=(L0# ,;X8-%\-8OF\(I_((I=((WP$,KJ,$1PK,(R("S, L-
MAV$T%T,ZX,,U $0.(W[^:!EBY(B1(6MT'#F#Q8@1&;WPZ8.V@XK#B$.&4,HQ
MJ!48CD.._,E! "6!%($$%?MQ0H,&"A0TS! B1,>0G#IXYM!BKMJI8<.($2MF
MS!@T8\=HA=GFSE481=)T'7"Q;8P]K8JBZ7*E"__9F!>ZX!#Y\X<(DB,[=&#+
MI\_>/JUQX\JU:[?N/KQTY6K5RU?OW;Y_\P8>#/BNW[ITY_)=3-BPX,>&'?L]
MG#@RY;U_.3..7!AOYM"606N>?'IT:L>J.U]6_0] ; #_6F,.7%JS8-&[.?<N
M#?KQ[]N0>YO>NUIKO7\%8A/(@TI8JK.=4!'[$^KLGX%\0IWZ<\9/)_%GR'<R
M\L=/*#]^M/@18^1,Q(1:KA<"@^0/%T- <%TS*@H\+(Z@+SOVM-!BP#]\..((
M'Y 0@SX=C$##$FRP(0*&4"(RHQQ]ZM$G$PVP0"44\3H)Q910^/ DG:3><.".
MM30< @LL'K+Q#)+(,X+_&6R,\6:&@3KQHQ MC*C1"!W,($\+GG#YYT,?<B!H
MB"URP>:("7; 9@V?M,#"CQEBDX&97 A)0H,))AAAP05S$,*/@X;(08:#IC3G
MF6>**N:93)""IA57HMK&'JG(8D*!);9Q)9Q_[%EE&ZIT(6L,KTZ888L_=M!T
M!FCT@4LQST0=;K3%%-/ML%"#"VTWQ@!#+E37BLO+U,1.=9546BL;U3/)BK-M
M-591FRO5RY!C[=A;.\,U+MAD<Y0W4GW[%=7</LN,5E]U0\VT4X=+-CC%E&,.
M !2J.(N2[/[HA \BCQ"CD$D:63<4\/A8MY-?0BD108+.6N_(^K X:X@L?N#A
M_X2$)3"AEFN*4>64 [$HY#LPT4,0B2$@/&*(M :L44!!+)3(CX3X*,=1>\SA
M:0@_3F&7._'R2.<::#!)H(\CP.#C(#\&(@]'\LC[Q1A,BA'"""TZ:23)A/PX
M8TDCS(AH!&,^U2<=0'#Q)AU\KG$@MC5U&*$]^D1H3@8BTN1A!Y(4,@+I@P24
M3X<<<OC#FCR'X=,:8EI)2BFII-DG#$D5.<85:10)QYXGE(AFFTDG%52.$WCH
MP4$BUDHG'ULQ"U?96C]OC#5C2VVL5UX'^]S:;+_M:U72I(U]VF"UO;TUT5&5
M'5AD?0_V5=/I<C8VVJC]%3AKH[U66M%<MZU:82=[O?^R4C]E#J5SLVO/#UDZ
M.9"/3=;UH]TST".?(#]FX:6]/T3QPPPM'O+#E$F^.X,/$\K=(0@EE$@D"<SQ
MAL.*@0DQ" $B-2((@A9T!ED<"(('
[email protected]$ (:!##;F?HUR_PP8Y&B8 38-#"
M+_C0B?C\"Q_@"(<Q1B"T/H L(O"Q48W:DZ-BY,(:$C+!06+80ZGU,!W_T <^
M\.$-(XA ! DH $ D( FBL GV3E"2@B@)0DIA&,(@6&2)-1%'6C!&L784QB]
M@0FE0(,63' %H0JGBVV$0W'(8,(+YE@XQ'W%%95*!-N& (:"[& 'X*A'/6"W
M&=6I1E70HUXAP54[V"4K5<'_F]7L5N<M7"GO6\QBU22I53W$7"M6H83D*!$Y
M.M80;S;+0Q[S:L.;PN"F5<V#Y6UZU:IC':<O_W B A A^U1K!"-(!)Z^("%
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MR< ,,@7VN"\5V(3(@4(QB4CP ^((0)*K *:"BA!$G8@0^.4HQK>*- [3O0
M)AB4L0-ID" ,V@$7$@$-(DQ 28\X \>PH8]]Z,,0+?R##M;S+OB8@8CPP(8(
MX/,T]DP,/6=X#YC$T(@SH&$&U[B&#!"H'9V63&H\%-IFJ?]8 #6)H -+;"(
M-""T S&(03],2(!LM%..Z "0'..8%L3XL&)\.!7&"%0K:#$6-[9!&D[(P L0
M =H' ,97DF<5B7U!%> M21( $06RGI68FERE&_E%F1O)2I1&A)91JYLZ]!:
MUU)1TJW"JRSI.DD82?;NQT8F[)9I=ZS#/G9YV9JE\H;,2N9-;UF!5:LG[9%9
M_?$R!_<ZRQ&>=A;Z/+,@!.D.>OX !AKLP 0=V$$-@K $I)C#/V9HU[X*H0$"
M)&$!!DA!$KX0C40@A0-),,;#</'A#A<#%[A(A2&0<(ET_0L+2)B%'W*RA4,8
M8P<RG3 8=%",J[7" 4*03B'6,PG_(]7A4_C Q@0J*J"$Q/#8-=KN$+QAB5:
M0\-'^@4J)+:D $4$"Q-(20?2D(031( F(M! "$:@I!D:1(;;%8(9IL;3B'R)
M023)XIQ(D@IB%,(HQ;"&-5+1"FC\&QHX>((]MJ&(;<#A!<AXL2Z. ;E)[4,.
M7'&%(@3UAA;L0*Q_R .#W.'C8A'VEI?-<NXVX[O?%1:O=&5=*7&7FRZGW.6+
M5#DM89Y8F9<RK<V232ISM<J[,K:QF'1E\VA.+,H6Z\>(],Q;_@$VE,3@7GKV
ME[HZ81T"Q;<0)R! !3K0 1.DP <T< $7X &.=*2C&'P0QK[^D%L?,+@ ":"!
M;W/1"A\,_\(<K U+O[0Z6)0XA*I 0@+G$-7(@"Q)XNR!^* :@=Y* 4,Q3#
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M[$30Q7X&9!*& *("8VX =Z, 4>( 72P1W,SARLH0\>X0]F0 .T(0908+,<
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MA@!IZDD5"?%M_QA$@FY"@XY %+S!TQ#S&;S!&.0 <((1&4"@ \X!&7 91@
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M@ \P"F24S0\F86JP(!0*@9=, RHH!%ZIEW(YSNF1F@^"R&T8!)\C2,^YB%,
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ME& ;D"$,7*$(9"P:7"$LIF(;MB'^B*!M?. /U"('D N?(S*YF$?J%8 324@
M ?(W:!,>!4NR0*D$D6P;U9$X($/)3L>NEA-Y!E4"M=%5C&Y7X+$X'Z,>U39Z
M(+4Y;R<?[['G(O4X_[HLY[3"565#!!Y!0+0S/;!#0%C+SFSK#QS GA 3("O
M D@ "&@A&J!!#:"!6<_.'))5'>"A'N1A'RJT?]K@']@! ,#@&HQ!\$@B#SBA
M$T8K%,2P*.Q-&/*M&*2#"M: %9!"!!KA)FX"/I[A&NRA'I[UB :B$':@![3
M%/( 'UIA!'[@'8A !(:$#<_+$MMK+9C(B28 05#A.]9%.\Y !W;/#T*1UR+/
MG?R%/M8W(>PO:=87(L"#I)@4:3AFO$@"$'Q&"&0!&RZE&,[N&BZA$*I#3.7
M,9%14'J6!0Q@&(%!%RAN&)'!9^'4 &A@'UPA"7Z@)")Q0)@!+OQ442\5E__N
M"@!_SLI4=3;E2LKF\>@@2X7-L;$LM1^E<Y5H&'AD&#A;B>1^[I4ZU><4"1\#
M-5/YECE+IQQ7.,CZX@3+,S82H!3H0WX( A7.8!*((46Z<A+4HQ 80)< A:
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M+'C@#UY:&% AI?>%(;$C%'8 " A!9' @ AQ Y(@"8#A'TZ@'.#895LWJ#_L
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M\E (2*)&:O (U, 8XH$'#&$)MD"4YQJ)C& /9 $.W2$=-, ,T,,4'H(/B(
M' #X8 \VJWTE(T\HH8\Z"S'O^1$J6!)_* 1\!"C6F:9>B^&?.8(A%28B1=N
M[I((MGV:]<L+&N(@=* 55D8AX.T(NJ$83& 1'B87,*$'BB*F$6&;C6'BH@HT
M >6.%2<1P@ LYIRJI $9;%8+<J"YU ()F&$?3%BM&"F1!IJ)JW.P'GVA%XLW
M#SJY>5-ZJKN'3[VY-3IL#36Q%@,#UW$V_:H"RU;)Q#[EG/B[6ST \^$$S4$%
M)R /MN?45&$21"$ZA$$BK:':__\@I0&!$&B !U1 #>K847(:CE,!J_7:]*X#
M.ISYP[ZXTT3-MM1;FFCH")#&1M@5B^X70;[ :DS 7W&;*W7\$<R@#N"P*<5
MX(-F"#0 ^ B .Z9F]\JGPM:#PB:&U:0)::R-#SC!8>/&OC;"AX39AZY(:/+
M&QCB"*X!%:X@%^1@!,S #W B%ZY!)^(%%4E^!"*A&"K!&-8@"X@A%1:T%6@V
M4*9"%VQQC=Z(<<(!CBI8<HA6&L*A&(;@"A9;+:Y@'.;9! '"WKYY P<*/'AP
MG[V#\Q F7*@0HD2%!1]2M(CQ8D2-#QUN1!C184:0)#E^'&F29,>4'3->7#@R
M)D:/$O]=MGRY;^,_ #P!_!.84V-.H!^#$CTJ%*C%C4--!GW:-&71J#*+WH2Y
MSQP EPW_?FSYNL?(FLB_1$E:A(J5,+4S@IERL\@0DGH>M&F*T.*<N:(_2ET
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MY4X]_9-E5&I"M2684CHU)I90O1EGD5P:^611^&Q% JR>(+&'UGX0<E7J?Q&
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M(X3FG,$4LFG$+#K!B4:D0S?XR,$>5B4;(< .6: E!DZP5?$I"HRWXF-;$;E
M!SX0B&7H(I<HTL$O<%DA%= P@04)A U5_ L+A4C''ZBPSL\4HQ)4H%8HKI&)
M'?QE5<5(4(&<UPEO7..@,X@$:"O('QV8AC-9(,0A,,$%,-3H",0,3']L9!HS
M#"&;5] M("@Q3O]CL(((/HC'4!:RLZ*M<(44':*5F+93EF@4I">]*)UBJ#8<
MOO='.RS;U_3[WRSRU"9!PDA+IUC#)[:IIBZ)*4SOE%,XK3!,)7&O$1,0M[E!
MCC!G <,:]-:)2* B+FM$!>#.:,\\6O4/@$A%* JI5#_,P@^ )(8>-U/(/6H!
MQC+"0B@X8YC(*+=;E,FL%;*P"FS Q,P^ ,8!LF80F!A%LUXA"F,4(S<Z$,4
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MC6+L1USX\]9Y/A-V'91Z55 X@7F\;J-/ITPLSM%! -8:C10@A44*@9^K@%X
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M3;0TJH=M%P5N1H%2"*840H,5_V "<?,(;P8<H0((U#<)@ (FS ,P%%PIO +
MP> +VD=W@8,X9S0,I (8GV%BTK-B@7$\;Y4'C$$:LN$+!I)+O_!(?P-)<>3_
M!X'0"B$'!D+P?WY ?V$U"9%B/-8A?A50"_C@!E$7=#+B+.GQ+]W1!X_ &(Q1
M&6=$":K "G^P'T8@ _C0"AJ0!,;P \:0"QI '/CP"^I3'M;@"E"'&6< :<IT
M&.: "D+@3-;B#420'F)P!E50#&\@@^FA!99B"%Q !"?@ $@P!,I5'IMU!F,7
M%N0B&3(P3<I%3)(H"N.D"DQ8#*K@D:UP38^V,-@P>(.'#>EPA?"0#S?3-CDS
M4QG5-#\S;$0#AM>FA><EAC%9ADF2AG:87^[EDW (4GHX-NIEB'+(1.]%-@<6
M;40I>_]%>JKWDYY7;6N8-.LE$B'Q#SX0-W0P!)>0_PJBD JXX 9V8U5B62CV
MA JS4 A@T#<#MP9^@ IH\6)6]6.MLAF>H06Z=7VD@EF8!5EP\0N^\!=KY ML
M>3? D7V>,0K&P [@X #P!TMU9 I"P ?+9P1E=7 :0 S _&@&;+*!C54AE"
M8!^\8P:E,$C6(09H@ NL4 10P ,C(!E&D ZJ( 0[P 54J '$>'63,1K_Z !:
M, FX4 P:D .9)&O4Y!U88 Q'4%N:P3X V0>R\0= D A!P $F4&J)H1W\T1]^
M, D;60S>8#?*]0=Z%T818IQ2R H1@@WM\VCE28ZM8 SI8 YSI@XHJ0THF9*"
MZ(58TQ*/-V !2GGP-6!@@O^5%D645,2&Y(:@#J5MH1<T3 1A.(-#R_8T.7%Z
M=BA3>YA2:Z)LY?:J3$]:3*#030/$/DL 5NQ<64!4*J ")8! )SR ,8L$H
M5=4)P#$+U@(I9Q XOR *J#!]"C<,IG $U"<&4A4*PL 'FU,(FU,JEW!&CR*>
MJ[(9H4 KHRD[J3((T" /T$ ><6EFV$&P0 Z]]<'1K #I3 "G:D.T# %0\ '
MRL.,=YH<Q/&(^T%]ZJ$PJJ #^P0-AD <0T".9D CV& ,.N <1V .DP!URJ4%
M_,,*:Y %%*D#RK,<QL!TB&$&IU ,(X OM*1_C>J=.0 &,V)I=N8M0E 9GU$H
MJG#_#6$7(1!B#6,Y6^P9(:S@JQ&2"^3X:%)(A>1(A7YVDOZI#O"PG^FPK/7
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M"<. "MK7"3DK8X9@">& #^H #(0?]*S"<](/+FB Y<S!!J0 #F@ <GS"+62
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M1\_@#=[P#-5@N(9K#02^[.4I7/AYX+06X3B],+-F[?DYX=D^QOMYDN! A=K
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M29+O ]8V'[L@ \AWG)%?0_O#OPMI^XKV;Q1E/S++^.%^))7(HCKJN).5'D?
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MAQU[W DG''>FO-+*"0\44)XKZYF2OBL//%!,^K3I+YZ"HJ2O2H' 8 %,A@
MB)ABGE%IF%0F$2452OH<1IBC)DFEDE08\H,T5/ \)9252@D%%4%E<LV:9TRI
M!B=G3$G&ES],T6J88'X1!@L^C!A"+L$Z24HHIWZR! D?'" @&:@B$>P,_Y&&
M*.2/3OHP8X^MA-#A#RPZ,4(',^2ZZPASA*'"B!W.< R+(4+!QXTFT.+L"&PR
M,R(7<Z;0+*UEW?(F!RR,;0PM*DKY ZT[.GOK)512(2908401AJ9G<,'7FM8$
M)L9.;P[&K9C;BK'F&G,0-BYBWI@
[email protected]>,\<-(%;QT8("N G'6-,
M,,&'']+@ HWPQK.$%)E)P605FU<QIA6;6^$Y$9[3,\^8]]S+66AHM+DOZ:.U
M05J;*@>"!IRGI[:ROZ<!G%)!_S:T$<8<=]2Q0Q5O_#IL#D?,T>P:7X3Q1!E?
M3#%&N4N,D6Z[V>[QQW^.I/'!OOM>TFLB)<S'0/\RW9''RP$1]P]* 1>W1QXL
MO53<R7KFJ6?Q_A07B,HHHXPG'#CE1(&A8H9QK>!GB'F(T$B""88FF23%L^!4
M4 ]%F%\*.>679_P@IAF:O*EF&&>:":83V)?B(R53P KEB% Z,
[email protected]
MSIK$#"S0F$&#!&18Q"DMGAJ+6F"#[<0P*LRP BW&"L'BB%2I]<.<8HPX0@OY
MT<+"&>#!BM PQ@B=2(00YM6*>,C@+/"CU@Z&\!DA!% 'AZ&@$(8@@PKV[A3X
M"D4H1%$P8:B$-<^HQK]8]YJ&O 9B"//&-1!VF]X\[&',P8W$L"&QBVU,8QO#
M1SKP@0\B^*@#%?! #4C_D(!:X ,</##!#I" ABUD(1!;2(,@!$&>5;1"#3H#
M1B* T0KS[(R,QDA$(H;F"J$9K8WVP08XX@,-;&@#'.!HFAVU@0ZF26UJG>,2
M@"#GMWNT;4=^J]&0^/8W%-UH;(P$D2,%)[:SR2AN+,*D +LX1,<A<50DLIDH
M;S[:FR$#-THL-0A*1@)3UICD( $YZ4!9NY+65,D@4T9N'I)+'./\XZ4&R>.6
MF:N'E]C!)C'5@SYQ*@ *1LBPV11,8?F233&$$0S=&:6$AQI&2O+UC&;L[A?+
M>,8RO$&3;G@C&--#GBEDPI))F*)7(?R#&#K1B5,(Y2G0XT,^S?"\,X!J"#L
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M 1$'*(%"=#_ +>\)YF*=T:BPPCA,Q1U+Z&>LQ2QB]V/7S.;@UFC&TJFZFO6
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[email protected]*Q,KC#D.KMNRKWI"*@RKY3"[=%B.YR@[(;H&'Y"B[T ")-"BNAL/
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M S.8@LS0H"% D,8!6,@ B08 A\P@ 1HC WS.$Z(GS/0 1D8*/IKC6XP!5,0
ME(<0ADG@@TA9E&'XA6&HAJ7J/FLXPJ/K!B/L/H9A21A:.J9"F)><R2#$#:FJ
M(>.PLN;@2>'H*BC_%"N?'*(@VD)X6 ZCI$*S*SNS,TIX2 ,?\ %/0 ,N&(0\
M\P(]8\-5**.;605"L!EH.*/ :S2P]*O$(J-<4 3!8K2C00=P*#MP( =*N[0[
MJI(]$I/*JRUBTSU9DSU0Q"U)G,32(BU+M!%(XAI-Y+Q)<L00^411(C9=PS7)
M$2Y?J[TCR<MBN[WE&ZYC,Y)\T,7@B\7BFI)DH[;FPTLJT09:*8 ) "<7NH:
MZ2YG6C*%.3^0Z*Z'\*[8I)1\H49OF(G3P0EM_,@5-)9"" 6DX(B+.I\#@XJH
MP+B'0S!N08H^F, _: H^T &YZ -D.0PKV .TV ,) Q>T&((CV((UX 'N_]"@
M$I2+#9.PMT %5* &:B 55,">?B*)>#+.7PB%:I@F$S*Z):.-;EC)HWLZ),1)
MFLQ!II(JVF J(KS):T!)E'RZ+$,.,:-"* 2S#4V[B4D'I@0B'S)*L<('0MB
M*\B"+ $E_$"-2 $2! $K\P%8 "&58 $1$@$1&"#0T@$/_M*H#$&G"DT]J %
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M\)?7 +]Y"P5<**%AR$A4Z*80*K\_Z!6."*%0>(12V,YOE# J2 ;\*U6M"*
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M
[email protected]#:Q*T"C\H>45,Z_RH8IYCI(!47P84>[]5RU4!W:H!W5 Q-
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M0.RR@P> -<I#\ >X )24-BKM+LO2(,O\((6/03QV"M(. 1$@&:;88,T>N9H
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M44D53CC;2)75N\ &*RVQU(9;U[+(/CNML>(ZJRW]D26++FP9X "MA9C%R"^
M?G&6 "F#+ *.RRSS@DQ7ZG$9=\U#7;E*X&.T4J_4O,L=&GR-.^01#_]]P(,=
M_YI*5 +&#FU,@ 3R )P?.,-X6@'8S=$#G&H,YR'74Q'S/$&C;0SIG(4XQEB
M,@XQ3.$'5)S"%*?XA1/98P0^=&(2\8G0$+1X!BP8"&A",(,1A" $^(3"9,/0
MFC""T8FG!<,4OYC0+]I8BF#\HA"F4!#KUMB-.*(".J88F8WHYHQG=,,;W7B&
M*5@T,NX$ VP_(D8A5.2,$HF,B$3R$2&YX[%$DN@Z&*M&,)14AT8\XP0MV$ (
M)I EX2B.3%FZ#N2$, 4A]&%,:*H2F3Y7)C6M"73"9-SE+%<.Z) (;-WX12E\
M,8M2W.$1N#R#(V;A!XXL:E%<^ @:2)*$))3_Q LED10A5C$\1'QA%80 ADP.
M41-$(((FHO*>,5IA3SED#RC>@X8K3)41IH #'+<*AS:@HC[U905>78D?8*"E
M0&_9SUM\P9_^^(>6;%T4@/G3J+8J&A8#*@:CA.G68"**F8Z"*S"A(4T^KD(6
MV,P#7JLYS6?$HA4/?@4K^ZJ'._XE#V,HQ(6V<:$ZH&$ &:(!&S4,#G!$>0V!
M1.R'"2M9,3!&,N.8[DI$U"&&DHBADP4#91,*12G.,(F@68$7?/@#>VCVLS,8
MP0]#NT\R?F$(N V#=4^#&<S:B(I@"".*7 N&R)Q1"#PN@Y2= !N0B(BA)@WI
MC\F$#HJJT0EA<(>Q_T""CC!,L0=.4(-$2[Q.ZAQF(TV*Z49;U=H=IE '1W A
M!3PH00%2L$MB7DXX627&*<Z@ QCL@AA4\@WC.@>H8 83=."84^7^M*5U?.,9
MV8#;QK*!H1]!C6\!HD+/]F"&/K#U$5,+10M^@*@?H-<CO!M)&GHGSC200A"'
MD"]*#A%/>6(*$?5<1?<ZE0M2Z201]>P>J/1IJE2Y"E9-"5A!=]4^=[2/H?$*
MX/TDRC]P/5"D [RPLB"XX;P($( 5UI]A$J.8LSQKHAF%J(C+(IG,S 7&7LD'
MC6ELC]7HE"M; 4NZ["$/F]YTH?=Z#4_K 8T*>.&IZ@C8^=@!#B=KH H /^$
M.;"!C>!<"8?;N8YPBD%=KXERRSX4I== 5IVGL145\?F#'_Z@A9N% C]:;/,9
MM!#7-O]A/' K1"$F,0S"/B,8R2C%+UIW"CWK+&6F".20FB&BIK7N&:<@&892
M(28QE:P:U!#1UXC4(Q[=Z!G7>4;+3/$(&,!@"G=HQJ6M<=48Q2B16\88*U1!
M#+A.P0? HP$02+ FWRAUEY7[#942UL.6H2(59TJ'E:M,3- I59AJNL[(7!>,
M9C2C&B:S1C9(Z8A0#*-"/0-0SZC0"3*"J13B]84C'A&*'9@ O5R0-QK6RP5"
MO%<0@H $*0AQO"^@Y N0N"\PJ/=?>^($)XK@K_?_[-D*I: J*:9JBD]@=="J
M"&S'$FZH9"A,K1 +,*4AKZB*0<S CDH4Y25G,5M BBV3MSB"T4+IA^4RXV#9
MV![ZV QL/!C3A4+FQU^!EU?NI:Z>ND,?4' "=)QCH0$;,E"[< $9)"%8AB#
MR[N\89>QT^4N7PQCYA#N=$AF,5':#3H[,@46UH@*-K]=&*(@!A8F\8=)7"$/
MX2&&@HA!"51$XA3LF80I)G&*UC5#&)<\T1\#_>=+5L-U?GQT.:@Q"R'4(;0S
MTO9R2!OJ7X1HD1D*$=ATM"#*.G9'Y7C$'J:0ZEE\C&1<\L8:T=XDDEV'%=>@
M3B%&P(-!^ (-#C!18A[_XTK!^<:JH#E#3'G#8M0+)B_87:T,^<Y8CY5887X
M@S">T8Q?^&)(SYR0'ZC 74=TP@I"X.Y_@O8(1Y2"/;^0A17FTPP\#J,02!B"
M#WQ0!MM]1$BD@22,A"5X@2!8@B! BJ1(RJ503RNL@CUU2G]Y3ZAP#U \7/>X
M"JLP!3IXH#: @_JXD/NXU,:A&,RIG&B8% &-5/]P6+:@'(;%X+?(8$I%E,HQ
MBSVX7,JE& Y*Q@/9W%CLG%@,86D0X<VIRXZI1F<(W5<P(9#URH_MBVF(4#[
M@PD 0 ?(@#F< SA(G5"Y P<4 !TH S8< L5HG3%,U?3M$"LDT0]M&968G0XY
MUO]T? ,1K8/)R-&&_$(H3$(H_ &;$4,H1((?,$-5+4-XZ$PGR!$J"$.XA<<O
MN$XGU%$G\$R /$(D.0-CF0QE+9(269X0< *KD<@F_DB(_ )TY-6FK0W8-$-T
MB,S(X%[)D!8I2=,44,$H<LD26<,UR)H;5!6F70D2$8<JK $0Q 9 $7^$#S
MX5!310S$,!6;R%+E)-?Q%1<QN8F6!%HA'-XP3 (8< C3_,(L6,$=M-X8&0%W
M>9<9/((9^(>!%$@?3$@6P4PG]$'/ $T>S!%Y]%]'X$Y'<$$@]((@I(&^68(D
M\-M\I0'U .IW$2HV%/!)1R![42JZ).L/%FMM(\)B1#_T<&+P/0+T&T<2;E@
M#\:<#4J+_WA49&Q8!(48#%K4RE&46KB<AN5/#<ZDB[EDN#"4C(W%$_8<$\*+
MCHG05@B=CNF*"&D0/GBD/+ #)M0 1@ $*3 -:C#DPD5.,##"21 #'C"4D7,
M;U@)-D!,\0W'<4P5E9B#PTP)[EV$#KE:5GG-,$Q1>*!"**1"*E "+IA#=/S"
M,F$;ME&#,X1"'][?+X">HSG#'\Q #N0 "A 0# 9** )G@:D;P()8G(W22#
ME]P!IW$-YUE#()'28$86V=A(9W*)K"F2F'!>,/B!Z]U!,H"2MJD-*/4(<MS0
M#QG#-20!"%! %O #<P (XB:_]8%1[,!6RP)1/6EB9Q8F7&9#CZ<CHBPSBGT
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ME,G&<,N9& +%Z& PQLBZ,,ON@SZ(W(SU<!#K7-%=AKIPA8ZM"PD:Z6ODPST
MJ55T!@04P Y0GS$00A+\P $ @ ;,P"U(\*TP&0XX@!1X*7$L9W",2?+YAAKB
M$,9DG3/BT/_9:HGBD)G)Y.4?%((HS)W9/&(P# -Z\$$>#($,B( (R *R$ G
MR(BL"L$:; $QU$(D ,(01$(>R ,6"8*H$ L=!_8.,,:B9JG/8,C8)ZC#4DH
M)5(W+(,O?$DK P[:&<<N&L<UZ(AP#=%
[email protected]?FJJV1+NXN(4G"-WW8$968$?
M/,,UM,(#M "OW8 /C(.Q$5?Q+0Z9/A5USG&5<(TO6%NV99MB3HUYUNZ7"($C
MO-:#.,+Z<L(\F@+[[D$I-,*X[D$RF.<XR\+]_D&<U:/43(@;U2,CN*.#K.\?
M'$$6!"0:#$(E5 (ID((MA,HU,"P^T9.#:B"$6EF%0FS$2EU 63#_@P6405UH
M3\F&5> *O&0&397DR#94$-+D1HTH#M\L#+IHS:$8CJ+L73!08,QL3-H%SEX8
M#Z/LQJV4:20E"!DER"I4!LE#/A 9";E+/.3#/U!F D1"P^';!S@ 5! #.##
M/]0#!B_=#EP!+B#?-!J?L''=E%S"<-C0;>E2=EA#E=#MXF+(VPR#-:0",> "
M,?S"%%U'*@A! F"!%L! L! 1" 81, "BS"COR!%%Q!)?R!*$2"*@!")'O#
M,N0!"B1 MA!MBD39<T(Z(%-*<1S,J!R.:""-?R"(ED#-23#+M1!;-^!,\A-
M;OJ(PKCM<+""PM"R-X3"&5F!%5!!'N2!_QE4P7A2@1#P@1EY0C%4"29\ 'KQ
M0 W$@%G'DO0RSMBZK=M: ^&16C#XPO<M4R<T0A_<XBU-07=YUSF3+SG[LX.H
MVQZ@JWORP;@*C1$\0C*8ZWS&U2+6XUC-QR/X0A[T 1\\PBB>0IL! B"D02 8
M@B14@C&,@C$PP_4XM!K04_<XJ)4-1<-BPP-C[))A+,:"\962H&R$= G!AH\)
M:;&<(+3(] ZGI&"\: NG:$R_,(<MT$R^Y,I&QHSN#XN.' NK),L!Y4IY15&.
M!;Z$D%2H1I"Y V508:]813S@@SXL0&7&0"XP7"L0P@^8P 1H0 A$ 4,;A#JX
M@QPXP!7\P"I K__9'I\:/]\K.3<1F7'8-E]V,(["9,AQ+"[&1(=C+<<:Z1 Q
M= (/_$ D/$,M_($(3 F,RH!;((U7$(H#,$51$(MU((H ((?]((R=(.M-4("
M<$UDB8@R:=LF4L.V3H$ON-HNTE[FIHXO[$%LJQH?.,.EI=:I%H/N79HW5,(:
MQV7)S!&XMI]P#S?.A((H+,/S$40KM D<,'P[<!M%9]235_EL"6O'D>XF4(:
MH8>>?M\[=FNJI9^M?B\\GW,I.()W^8(O)(,I'$$RR *Z/L*YG9L?Y*,.&,&X
MD16[758<S9$6K#,^=D(D3$@C?&O];H+.]*$H2$(D5,(!VP(K# +!VD+_P5J9
M0S/L37BXQ&GX15=TP&"L4PS5!7^TP*3XAK(&0MV420N+RO[/#\_@_=P%"=,T
M3),L2P\YB]%XSM+PM>!DB^HD#>[\_ 1+3(U&42XED4$8"#V]5=@#KX305#QY
ME8N0-FPI8O@ )K#"35@"%[3 !VA A" #1B#.;Q#0$4##PP!"9 E4YG#;S(5
M/#B76G-9,4COF:@I#R6,*AS'V6UJV>F((OGVI:M"+52")UC#,AR!HR=V8FOR
M,AP3(%Y!#@"")P!")#0W,P1>'V3>*9?-:Q))=V[K'?S"$<F>=,C(B00#'B@)
M[FX"83:#+'!",L [)_@-)VS",EB)-,_2,Q3B_Q_DP2*,52?\N6X-A-U'PPE(
M@O!Q@ E@1)5=F7$EWP\]@UY141U%'K6^>S+4P1V(/_C:DG!; 1:]'Z[F-WN8
M OXZ0UU53=#
[email protected]+?'3KRV!WS\P;C2(T#,*C6+("='CT+-^M7ISYI.9_R<
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MZY &4_;994>Z=7C4:84&('C_ 9#HFK[0.V(Z<631/T(
[email protected][,$&(*
M,W00PI$Z!$WUD4?VL&)6+2;I9*!9^N#CCS\>M<*(')HOY9%D?#GC>>A_:2:8
M3N4T95,^_. CU3XH)3Y?R/\I5J8PX-P*Q8DSA.(7H2"2'_P0C&"@HA+T,=8%
M;6&,-QQB%:28#39NLI*90&-:V,+)":'!CFRY@S3Q\!8\W)&/<&$,8]UZ2CV8
M$I6?;$8>(^MAQBAV,(+YJR^(,>):_@67?@DLB7?YBQ+5,D2^S.M@"1N,61[6
M,,KLBV#YFEAE*&,R&N8#,A>[&,FHDH]Y2.9B&#N-R>(A#W/9T(;Q@(<E"/&#
M%@" "E81;/T88P?>, !"=!-#(RC#G5HPP0^R(5QB(.-=+"D)<V9I'2D8PSL
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M9X-H%8UA3(8:TXQF[ &RU*X+ASBTF,F*0I2D $4IX?@J*0C!@S(L )L,0U
MBM&*5=2&!Q[P#P%\<%6:\& &Q7!)<XPQR958,AVY8$[MKA,U8FPRNU**FC6U
M%K5-JH@]H6P1Y2Z4BD9@H0I_$(76O'.^K5%.<BQZQHED< 5 U(*_H@#$$/SC
M-@&C@!L:ZB6!RI%0'=G)FM<8QC Z9(YM;L<]SQ#&+,S J4T\ J+1DX$5\K")
M/S@(N$L[6G'")+3HS+,Z^$Q'*_^ P PN<"$%S/B%*%+Q!RPD1"';:\0C&G&&
[email protected]$0S,4+P^_6DAI2C%08,Q$([NH13)*(41J% G(73T$00YPQ_\T GF
M\4_,"<FI-.M4O.=YZ@Q&:$8R,&P&D)H"SM+T13(Z(=%.=*,9H; "'Q[2JHAT
M@H%^(,8?:I$$,)PDN)*L"3SPL4A\U$,?\+ C.Q1Y+4W/-5LX40>F/RT4M';+
M6V\M2CSB2&IOE6LI>3U7: 0+,<J"=K&(_2QAI6B7QCCL7EK$2Q>AV!;,+JRS
M0J2L8FB=F" J)M95F<IGS)C7UQ*%*: Y2CR (H]O(:4>[" $*6;\ P8 @ (^
ML 4V<D'_&T(D03< Z( @+$&3$V@ #<RQ)*2I^\[FU+-HV>'.DIIFN^S$+L*S
M2Y&*+&>>%HVR1/4U4#&((0I4&*%Z,A!2)ZC1C3-5XP@BZ$4M/!$)3V3!$YZ@
M93)1 ,-%" 9S4C/,S7$!RO@@= HPA#D. DFJIDG(B3-@Q^$D(<_1.) UEC2
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MU&A&^=V:"E',-2[/<(8T[(@'(KR !-O08# 3.#<VC $3" $))J & "? )
MKJH%1D 4TH$ZT@$:,$'%,&E,:*=VE(-V(BQ*HD0[-)!RF(E#JH$8BD%X'F=
M+J0;6$04=B '1D $$J _\,_9& 3RF$8B& "/(%L/.$7S@<-/*$6EL$/)@ &
M8" '6N47.+!,JD$8&J&I0L$:TB%*LO^)O.;)Z("K19XA"L^D/(H!N*[#.99&
M)5)".?2MGF+G:HI!%<Y$0Y# E $EK !Y9A@&9A$ZQ ""S."L!."*1'"/#@
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M D.P0$&XP?0S1QRP1!,X&_\ P$]P1B(( 1(P1RH8Y&B:^F8SI)DQSG$D&G2
M<)YHAPJ7T&F8J1J"0>&^YK[,(SV\@6U$( MJH1BR8&]T T#<ICR&@1CT*Q)Z
MH>2RH#Z6@1DJH1BT8 B$H0EKZA>Z0>?40Q@Z 0L: 4.D!!^*IFE2"46N0RC+
MJTKF"3MJLCC,4$R(1CI*J96(H1"( 15.X1&:H1M4@03* B0( M^C@KZ8 K\
MT CT4 _O@!.:JA$ B!/,8(!2H1 1;Z,XC!'VP" 6 J3"#(+Z9QA:_XJD'L&H
M'H53H&?F?,$7&.$1[.3P[H3R_$=[-J'ON*</'F%&0L01J(!6?J5(\@[,-J%5
MT,<,P R"-,I A*$6*B%F6($5;N&J4D+U9"87T@$GC"8=9H)::&*2NG.ZM $\
MJ64FV $F?"_3-.V$YFI;T*7];B@TY*$KP@&,D&W\I.^+X#&(["78?@V)JH\O
M '(_OX] C2T@IR^-S \S,(8RS"@SW@]E$O(H((,IC.\I4H..$H$00.(*;,,
M!L,')&$<O,$2N, $V@T "H 7F $32& +L $"GTL,I\LE):G?[,TFKRL[7)(#
MFRF;LFGAX')%JD$]DI1R4&$$3& +>H$9</^!OR)A!_KF/V!P K) "7$A"\XG
M"U2!;(C!&L $$W"!F<R#17X!%5J$O+HA%/) &#A00Y[!#5A!:[CCWVSG&DQ)
M.X#+ R&).)JC.* C:E9B.XI!%$X!%0@M5AJ(J9(A#WC@ UH "<A)4_+0#X7
M"(P "\YN<]:LJ7Y!@M8@&#A'%CA!?1P!?IJG#WY%YDI3?!P!T%X1HP!%HD11
M4_) "T(D579S%A)*@AHH%$KAQT!'IOP@#_: $5+'?<R $10"\)JJ[T[AIF3A
M#/( (D+A#-(IIQ(B%/R+"]8@$"1A%%C!JE"O))P1 &P)4[(:(S!&L/3&D6H
MK'2B&V6B&G$"'9+_@ASHZ"C"H8<44B$/TAWHPBD$)BZ>CR"[SS\?%/R,"""Y
MS]8<=C^_8M@&]!TAUOPN _IHR%TT(]:6HH;888;H,_F,3RA\ BC"00ULX198
M 0A:( E:@ #XZ
[email protected] 0,T#_(P"A] T>$+I6H@=\ !_44@S[32:7
MQMYVE&DU4">'E&M*Z1L>IYF<"4TG80)2@! B@1(B 0W.QSZNX&^B 5B0!"R
MJ<*F-!*L0VO;MD,0#CV$-!0B(3V(H1JX!D6TIDR>(T6,KDJ6(W AZ0N'ABV]
M(TU$P:#ZSE-"81, 15.T E\@ =HX >&P \Y1PBPE7^X]0SP #-1AQ1!_PJ
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M"E5$:MQ#X8S#<K(KX(A#+OT4Z58L4+_#&C(A3(DA%,C75U(AS J%#QH!4XV
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M%!XO@V2:+;6J HU0AH77D1S)L?Z:PAWB B\P!(, 1-TF <JH$2W8!2 :PU,
M8 1LE@ *0 I(( VZTQA:(1%R 1N @ , X!*>MHI7XD>=5B5E9Y-2Q+OPF).N
M26O+84E1R1I280B4P18&011J 0WHVK_N] ^&@$RQXVO0DI/("T7 Q)FRZ0NW
MJSR<3DH(KG:Z6.>\&. ]RU[*1A, 15"81(.9$V+Q#3]8)TPV0B.X C"IF],
M_^ #H &M(!3_6"AP(!3G3D/1!L+.G5;L2"90R55'I=(2J54$I$4:SD4&J%/
MW ?*"B]6+LI3&L$/CM=/NF</S@XRM^P,SND1_D ,"L%36,5.:HH*9D&X':$/
M&L%1O$D6>C<B*)DABO,Y>45-=)8^ $-A*42^.GT4@(EZE>2+($4;. +H,&.
MX $<T@'WU.%*MI$;P9,G\M5>$WSVKO&$]C<G4);XAD\UG(*VL@7Y+!I@*SC#
M/P9@J4*C.;K\'/9 +YA!1=H>$C3[/DL?CR@RM&(?],$>8CRTF.V!,0:F4<;:
MYC/YW.$>M.W:'++"M^$->" )*I(+#($4+$&K^6AHO_]P$'P@) L <&0 #:HZ
M$52B%3C #B 10%\4.]IZ6I2=IS)3Z%&O)X N3A&Q\9IV%)*U!IRK*F9S,.5
MM 05.%E;Z%]=385;.Z[V.,:A)3-+0=R[)8\J@:Q+]#@5JP#9T=)GF9QAP&7
M'VP8.L] KDX8\J:\M:"SL> ,IH</CF '3* "6I0 #B !N&!!_F!3"@6":(4/
MU\FFSB"US\ 70N&ZSX!20J43?,'S"D7Q5(41-$75;\531)'0DEE3MD=5\HQS
M!*5\;D50,JS-O.X.HMD7.(5[! 70@&H3DMG/<JI_.D$40D$+?LXY^:<0)H'S
M"&W8;\5 0DX2(N$6AE$E\(G _S>P?\@#0C!"]1@P)$#RXUF.\LP.^N9):)%
M]LX3&^* A&("';3AK-P!/E5V95EV6UCVXC?\*2Y>@2\Z/S,>@4OCHJVM8ULZ
MI%FZQ-^E@_.QU@"C@+-BQE_^BV!>0A\8,ZCB9$BC_KAE&U:-QW<"AEDV#I;@
M!U8A#9+ !P1!J'F CR8 #6K!%LP!%[8@)(T8!88 #9+ &!*!"UX# R !B(@
M =22.88&1R%IT?$AL?D\1>+&+=.\:LMANU3D:R!'*$L00D2!$B@!N.RX.SRP
MBY]$C&%'*,G+SZ.$3,F^L54RL:UFGE0D'5!DNUII&)X!(SQ%THDAEV;!&@C-
M>R:"DB'H#P#_00N$:01TPZD'X[CXR -4H PF85/-H _\( >B6]#*20C6"=!@
M'WI,@1J2H<LH)7KD9UHY ;PGHE4>@@\ #=#ZP HZX7DB15 Z<>9\LU5K"NR@
MI^UF(1EDH1,N6:)B!=QE))9!RG8W058Z6PO6Q@^HF4CR .M6/11V##JM04JM
MRMXB26D'M5TM 2"\$!*XA 2V:\:,M6J5*]<U;+D2MC*&+:%%8] P)H0&K2(V
M;1DY8H.FK20X<"7#L3M)+IRV<"=5JF3'SIV[FC?#N8-FTYW.G^&V!647+IP]
MHS9U]G1GKUY/>TSG094JU9[5JU?WV=.*M:M7K%R]<M4:=NO5?P#2_P+X9R^?
MU;!EL[X%:U5?W:YNW6*M]]4K7WORY%FM%_BF8'?R?,I\:;,FS96/:>9DI\V>
M'$*'5@U$DD0@$AYI8T0:=<U;)1X:)J2=$$.*BB_&U/ X80" QX3[)A+9PZ;
MN=WFO%T;[NUW<&N_BP<WGMQ;.6_0H0=W#KV<=6_6REFSUFV[]VO%GGDK5LQ;
MM6[=BGF'7FSY].VXK!%[1GZ\]&O(>1N'/MQ<.>#+^>9;<>Q1M]TSP\QGS3._
MB"),,*'X<086?32"Q1EGF-')'W_X,<LB5\R@00()3)" 04P<$ "!Z"H%@$Q
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M>L0,<UXWU303S"^F"&/*+Z%P>08?3^J00R=4G/'')%@8,4,%!SA@ &4&Y
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M P" %S@0BU840DB[$ U+IM $GR0BU8DH04;2/^+"4Q '/@0SA",P=XL%$V
M4<+-.+Q1ASKP ;7?M-*547.EU RT'FO$IY;=,<<SS&$-81"#;-O!S]Q208QB
M[D9JS)F.,HU3MO:T;4';,<4SA-&-9BRC&[_@W2SJ=P8_X %,?@*3'X1 !2$<
M(04C*@")& %!U@124B0 (( &,, #*C !U*P!6S@PQP^.$/@3D&X)\WB
M=*<(1A]^X28AV.X7?#""%?I@!CY$25%-XD0G]&0$*E!T"G=H'J "M=$J[:$3
MCL##+/;@!U.0=$Q&$,(9A-<\3GC)% +MQ"QPMP?W*32BOG.$A_I'*3,(84Y6
M.$/W_'"A2CT"0Q$*QAG_)L&I4%!*%( HPP'1 @T#,(2@A"$!"4Q"D1P( V0
MR$40>'"-AJPB50TA12XR>"MC1.00$ME(*Q0!+(J$A%<B$19)P(&.9;D#AB=A
MQ\1DZ YRU+ HS@I'-((2#:$L)2E"/!=3?+B/((X+B)>M"A2W2-JOM*N)5UR+
M7MQRVBB*48M.Y(ML^37;V0:F'D%,3, ,=EEI+>PFC9D63G+R+)>T8A5IN($+
MDI"&)- "4C8 A'2<H! 1 (7UP"$#S2@ED-V@ 8[,,8AD@ $![23 PLH0''Z
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M8ED7O/LBE;^443"X/4S!W)%O<?/;LST4=V2 .UR!UT0;QB %(9+ X%8PM2A
M_D%:.@"(3SR#&9/PP0A:1H "$, .$>#!'H%P @=X? <C,$%PB&,." " #=!0
M0Q",0=^:_R8=UPC" 5:0BW1<AY?^(1J%I;8=5;1GEE1[SH=!K)X"TP<[&"[&
M@$M#]:F!LCCB 25[)ZS@\HAG&'BC1C-,/*0F;:D1C\B#VO-0HZ%:ZDEZ@K$1
M?$ ">:XH127XP"$+0 $2?.#_ S3HPBI(L8Q%1"(2A:BR%8P0#'SHPQR%<.C@
MS)"'P55Y>+QP'928I%'=!:X3@G9=D.I<)EGDKLN-V,23S-<)-!^J%+YC\>>=
M=(K!;4(6OV 2['&D4^I9@4M=[CR<P:2F9.SIFV8PPAWP< 0__*&;->)?EH+4
MB68(XQ<$1$(6H(L$,'"!,USX02^PH08D2 (;04C"+0;_5K<>=]:YFJNP?461
MD5@D6,4VX;"TX:MEE00=VT8.V " *M0LDG& S?(L T<9C2$3C:6 \1"!/3%9
MWM(3-?$LU6(M_K84Z-:!6.%NI3467K%:?L$O)EA;32$/:P05A%$84-$3T7)9
M#5-#_P/G;S0Q@W)$$:NR<%Z0!C] "&C0"TCP RT0&H%P!<2 "UHP R) .1U'
M #Z0 D"0"$1 R>0%AI PEP!>F0"^;0"D1@7@2P!GK7<[V!#3:'#VIP !@
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M@B5G( P :00<H@4_P'W1Q06LP@7GAP0 D +8H 1) RWT!"UYE:K@"H6T6O&
M< [ @ WGD L#>"L5D1$3T6O0,!$? 1+!\A$ R$(OD6WAT!(KL6V4D6V4 3%X
MI O'L##<$C&-57 Y81..A5G7TA+D,%D::"Y#M%GAXH%.-!;NIA>MQ45;9!=V
M\1=Z,0]EU!3E AA@B1A M$:ZA1CL$!@]5!,!IVPSX6V&P49R"5R'Y2N'L"I>
MX 5< 1H\ EHL -H $DS B>4 S_M7 $)J :3A@#5^ !JQ 'LA$! % $[ #
M!+ ,;65>F,!),T ")* -5] +'4%?KI0+!W !%2 (I_0TTP&(S_&:\I$*N) *
MQ!0VY&&(:C,T5!<<"_9A$6:'A@ =R&$U(+9T\[%@"_(,P6 *5C()HB *3I(H
M-H(%5, 'V^0'1X *97=BH; ,OT")Q& -$6(*0K #-' "E "+? #S-4%YA<)
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M#_F #PV#$S2D+"5!$M<V%?6@$V3$;ZMZ$PW#?PSQ<.3%!5[P Y\@"#_ [4Q
M 8L "'_P#)$P!"/BA"C@ R80 [F "$M0<IJT GP&R9 1- /_*D (4L II
M80=H,S1JT 7H UP R\$4I6,V%WR!ZV61[7D(3RZC10YQS:0314@Q_C46!W
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M;WD3]5<1K.(%NTH(HG! 0 : ) ;@" *J8 $.F BAT0Y)D ")K *;L #'V!(
M!;!))E )@4DY$S ##, !:5$%Q7 0<.,-2_ -: "), ,*&-*QH$<YL *S=1@
ME&!T2<@>I<$V__,JB!@VPVTC',]AG.21PW^H8,_0# @2#)"8(,* "@E[BQ&B
M!?43"OE)N($C?=>'"H#6"(V@5+_0##6;*'Q@!7[ (YRH.(" ! _6(:(P"7G0
M#)OR!X6[Q0O%.R;&)9Z8*,'@"Z&P&_B0#L6PQ$]"!732)\$@:+'3)&=P!Z6@
M)RG:"<+#.VLB/+/0#)SP"'U@/M[X>;W7#";E"%I</@[%"7J,!;_@"X] !0-J
M!FQ&!6C6R%62!VCF"Q<B*$)@!+KS"[(P"W@P/;^0?%8@4QC235K0M1VR"5B
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M4 C8,<M$P.W0'+JM SO>@WT)0<*T % H +<0%\:7#3@@1R&4 QD(V'@P1P;
M]AS%\!Q4)TS"5![%@1S$.3?C*1_%) QADPK_PL -)F9]LS!-B>(H&U*)G8 *
ME) H6 )HPA _B0*RU/D'$,LE.!H*BZ#93V*Q?B +OL +G> E7)(HS4!I@[,'
M>= (S3 DFB(,?^ D>@8]91L,GO1)?V &:>+8(
[email protected]+O ,G@L('8F8^(1JB
MC< )YF@*3>(,U6=B^7@H?V90JA>B?% *G$(G.R6W=D8FC, (LF G#PH]>>#:
M9((%=C8H=G)FT^ +'6(&'A4*6 DSA<_G?#9M0T(D&0!*W %;)<%0Z!]GB()
M@D (<M %X_ #7Y $$L0*&S-!LU9)G0M78-IK7YH07RJZ]U<2PJ*FT Q[# 2
MRQ(-=*H-Z% 3+4%8_^# 0C2)XMM2@, +$BC^SC@97#<!,8W!+"M4;4M1<$_9
M;=O@;^'6T$L4TNHRJ4;A1/\"TIN%6R@H6X)Q#VDI;FADTH5Q6[/:$VS9TCLI
MES31Y>UK$Q$H@6RTIZV@#=<00H?@D+<@"#0P25R0!$ZZ (<T _*)"X"P SJ0
M -, !/P P>P!<:0!#40 ?+4 :B(!.F #3M@";? "A1AAP_A*[R1""MB X][
M#@EQ#:S0KT6SK^M%(/;!'^/Q#,J)AZA.G%"W'<50"=:P#.(A-K8D#+BPL+XD
M'HK2R9K-*:+P?)W02Y3-B8T0R[. "OE9*4V""YGB!Y32(=MT8IW@"[$="O_$
M@ J3\+!B9LC7J'9W< ="X%",X,=6/,1@D"B(5NUA)B'0_@N[K<E,L@EH!VCJ
MXP?=,[;YN"FGL$U<8BG-F27#P!T,$I[?320GAG9X,,NGW>NI$$YI@CM!50=N
M&R6'HGK"PR/% U)6< =;\B1)->XZ( 024GT"B<99@LB4-@%+[0%*@.<J B%
M@ 1)B@9E %V"0 K8\ -;:LU@10JV(.$4KAG4+%?8@)%SM1#?7"L+L9+U=Q$B
ML2L=00XH45@E@1'&DD+%4E@LY*:%E>(TV<X$" U"$1-^&C%KZ5C2XA/@,"S'
MD!(XP;Y!I!177H$]L0W;<!2>U14_1!4@"$50-%O_W'N]]M84?(%O)HAO)'WD
MF77XO&72UV*#D#4M\- 8@8$3^V83--T8O5))"H$)AV -K, #?O09-"^L +"%
M61 )Q; &V[74!" %"< #!V (QN %/% !-F8")T S 1;?7I:GT0:$A?KK">
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M),KD 0DND$@" (Z "2+6HKY8X<12$P !0TB, 33 QIH0( )J A!0VNP<8;
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MDWE+V>N1N#C9@RAX]S#C#L#X,,.*P1[I S"7'1)W%HFN:NB/7V@*6 84)IB
MA!:"4,(! %! 8HA-1/DC"S3+% 08(" 9Q;79;+GMME;NOAL1-GC+915CA@NN
M%>((-\XYY[;\34LM?P,G.VRHRXZ][+0AQYWP,F?GO>R8I+SR<-#9G#ST_%/2
M/%?XRRX\);.+)IS7.3_PQ2/[_[/]P0@A?-#"#:.$T,,K,QR1Q'_RT2<?&%?T
MD<46F[='Q^857!YX'S&4L<8?@[1R2'>,7-[!]3Q73QLFD32?0B$CW%S))(W9
M,A'AD&L%D4/2*).+/Y( DT>+IL@CUDPPQJ1&((,"E" !"1@ C.(P0<PT0H@
MG* @?K!!J2 #T-Q:E'8, 8K6%$,X\1! 0JXP K* (]T,.H:N5"4I!1UC5>!
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M@PXDH $V&L'1@ (3"S!!R9@$P600($9X"-1G&H%)AR%PT/%X0 6 ,$'] .
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M56^]54LCJ$%7B@<[XO%5+;4B$:NX!3;$BHE#$"():N !$+AP B#X F :M,.
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MF "] H $<( $B( "N(8W ((6V #(( (. $>* =&@91(20=X8(<4,@<1\@ +
M6 $]@ ='P09&$4-'4118*954T2%=$2)\N172VA5#,"Y=P2-1\*$JTA63F84_
M6 -AT993@*,_Z+B6(1EI82.#J 8BP@5AN"V(>(:(^ -B<!EK )=F\ 5EB)C.
M>XAE\"*2:89'V 1>\@2A@!F@L0LAP(,\F*X\ QQ<9FB:*6/B*.K. 6Q, I^
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M!&A#*RY(@AGT@2P@K$ 1Q5H0!23XP0DP ;TR 0W0@ 3(A23\ T /@ @\
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M(@ "$S _"!)'@ !T@A@E,V>-C7=$@$$KJ $O""=V 4%2J.&DK#5'F587@X
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MP18X I0 4(H#4D8!#3@@C0@A$%PIWBR4W=BA;N!A%7@,DPHCL(1CN'[4UI0
MR3%SCIFD,W0X*#K+'/$0#RWQL\S!'-9Q$OM(J?^0LR2I#J%\WES3/EX30:K<
M!WU@'N6AD/T+-JJRRJN:!ZZ,DN<YDNVYDO$E$DC;D>!9GF+3D/!95O8)05F-
M/U>KA^^]M1$DP5==$F#[0&'ER_LXU-^( R\P#F9X_Z'9. 0O^ $T:8$60((?
MB AC($_*-E(0((9X,P$( 4$($K8 ?,(8B.($3\ $*>$(&4 &":Q1&40=X
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M5E#_@OVI ?X "4X@$I@E%6I87S X0=8@0NP@1[F%$\I!MKE385[!G/0%2,F
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M@$A": 4UH($6< &. $5B %CB!1'02&X5@$:H&O/N@97\099N82)):T8@DYO
M\,UK(*+D+*+7RD5O>.0J:@@&F_\Y74RY<LC9.62X8/&454?C;KA9?!D&)5I9
MCT.BESO9(L*7K(N$+Q(&QW (EPD+<?F#73PBD3@(@:"ZDU PJFD7;$$YG0/&
MEY$)DN$D5* *82DN/-)9M',93@"OE#&)1X 94!1FQST+H-D7I-B#1N#D2K*)
M.S")[88+5S*)%9T%/ !O_[H#3L #S-N$ZRZ%P"@+3I*)&1."<S0#D0F8:_F%
M0GBN=?&#/" F+- !CE>]*BWFUE.K$>B !5@ !F "I@@<@N!%:B!+( C0 BG
MGQ\$0NC(CI2$=[J-UY -O:%=/NU=;3"SX5 $XEA-ZH#)1BGHZ)L^@.9)Y*6S
MJS>0.%/_CT*KAWO AYK>0'682_9)$A(LP1/)A_?8G)4Z0*G\P+C75/MXD/]X
MD(;*$"7A2N.I!UIM$5JM2\-W*F$M$EFMZ KT5*PR/U_[M26AJEP304^5OP74
MRQ'\9P+&M>I5G*3&!DL@!$*@72Y;!40@A&L%@C+@@1\H Q]( #:) 4^(A%P0
M!4#P@1DH "!#H EXLL(D!"3X /X X( A2 %$<IAA1J!04 ;H@B"((45I
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M6,X8R6'$B! A.H9@KH+ESXX=##9$B& $/!PY,( =0H)?P"!J10IDJ%!
MHT99LL2*E2U6MYA=8V6I5:Y;N:XEOV;L.;!5N9ZO6F4,F[%6B58!>XX-.ZWG
MQJ!!RTX>FS9TVL"Q9Z].'3AM\N.K5_\O'UM\:-J@88/6GMU[[?T7#SOLN0,?
M.PFRX\Z"]=1#(#OYL+,>._78L\^%^X3C3CX.NN/.AO5\F" X"8;37C3:I"B?
M@NR0L^ _K[WVCSORV%-/AP[>Z""/#LHCHHWVY*.//#7ZZ(Z(\7PH8I(?,AA.
M. LFZ(Z2ZBS(((-3.@E//!Y^V.675(K)8)<
[email protected]!7'2*6)-%;
M+KFLXL4///#PPP]<(.&#!@!,<(4GN*@B"B ^.$ HP DL(,//MRB1A(D?,#
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M0Z0?>%#! 0904 '=!RP000,,,)! @6@!L /H2'QZVV#6"((*:/D_T**<'6R
M,EV===ZB7.64&Y,+-IJWB0@BK73W7'SC\=???NCMMU[JVJC.WIIKHJ>>.^CX
M-]]Z_Q6(3GS:+ A?B;ZWN" \62X97X/VN'.C/OF@6<^"^HQH97S5RZ>??-%
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MVW-'56$GP0D:PQ*K. 0AU )7%#*"S4 0AI&Z ,>0.HU'<B")YJ!BRSX B!
M*@ !"I $VP #<: 0A)H0 ('D" (!^#!-8IAC&)X(Q$G6 $(0 "$6.&B_QC%
M6 XKD@"$%I2@!#2HP0=*4 ,:I( $)+# CZ0AE#@8AG*$H8H0E$+.%HC%>;%
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M$%R(U _0X(,_9<$$J87!(@J5JATX ="-0$$O"# Z@A%Q[\P!5!: !,/ =4
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M\H"%A6A!"V;.BPX20 &G$8!!U! P!P HD@ (;^( %(F"!(@)!!5Q R"0
M_Y"#&>1@$:#"1SK64'U1X&*%JN!-<-P"*=B*8U6.=.0",&2.<\ 4J6T.2CW'
MJ?7'>*S'.: '.*A'[[@.[*3'3>E'JJ6:4H%#.&@#\&Q@B;1'?TQ(5A5(40G/
M]735556(@@ /\.Q4>K ).4 @-"@">? @#*(..5P/.$3#MM%(O3E)67D;6[6/
MCO@(^JS/6HU)7DTA._B;E #0 ,W#$XY)^2#AE$Q)61%6_SB)OS6;'*@!>[A4
M=7@!*9""($@"*T@"(1Q"$K1 GXP0I&3!'TP :ER!)."".=C"()B 6C #DQ
M <A #$A !9C<&P !RI$ #[S 6 #<YB#,;@ !H# J?]\P0]\P&K0@ 64P J4
M01F<P'310!#8@ N P*"I0,ZE0,055VZ9PS7PES5,B].54;500D5H!"HL@S=4
M0X-EA+L$BW]%"]3EU],1P[GLT4,PTA]X@KM 1"1DG4^$Q+X4GQ_X <$$C$1,
MDAW9W2\,PS.81".<"RK8BR=0XTRH"TF@PM\U0R<LPMGP@BQ04DYLPB)P(Q_@
M 4O,#%]@0=XU4]9464+TQ4F806(\PMDLV4D\@M"<A5;$7D0X63(,31Z<Q";L
M3"/<F!\$P_)E4D[X@LCH@ [P 18,@1]@ 9;A4PYD!H7-RQ%@03<R)//IP BT
MAIX9@$\R% /<S0=<@ >0Q@__> $D@$(6(,$09 9G& $>^ $E7$,ZP$,Z8-T?
MI$(728(EC%0NL$(:M()R*$=U5 YS4 [GB$=+4<=SA <P],=YG(=]6."MK0X'
M9M7KT)KJL*"M]<X)YD=YQ([O]*4(K@E.(56)\&4)^DY/&8,B..;F\(=CE@?V
MW(<VG,A^Q$<1UMME(J$6SH/Z$!!;V0-IGAL4[D\!X4\55F$ 1<-J8DF1L(,\
MS,.& !#Z^)4]G,^"W&;_R,/PL,,[B(EJ"M4VL* QT(*S34=UJ$$:"$)O;) E
M$,+, 8$72-$6+&42F !J:< PC@]QQ O]M@0]PG 9(@6J)0 S\P FT@AHL
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M#YA FC A! !SR*^[6"(2Q!"WQ #-1 %__\0 R8 R:H2B+$7! P72YP %\
M@'^" ',%UW0YK0JDP)ZHPA+-BANI$B5\;2[>HB@TX[)0Q"5P2TB 5RC!%R/]
MPGSQU].)0M:E M>4K4!L73 \1"0\Q!Y=6,"TBX%MTC/\@3<N1"B!73/(42X:
MQ</8$4<@RR*%DA]14B.<@861!$*863=BQ39RA!]<WE4@!)\BZHZ=Q(WQP2^<
M+DG@TMT]PB90A508#=*<!46.S"UU A[D02'\B]+TGLE<+L>L@1_X@AF<S=D<
MS!G<0=J,&0S@$Y85GQ6D#1]810[$@!:T(]7E00[DP!%H@1"(P @4 *4V EX
M@ >8P X AHLPA#_S, 07$'\ZBD65%]+$J017,$?D"HEA HV/%T61((J$,+C
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M+N&!4KB$.O/%A25#0-Z88Q0?P;1%,O1!OU #Z2($9O1!'EC!&2@T'E3!.>D
MR$R&'QPO'RST[9G9+%A! J" .70#"S%#+8C"#(R X?:!"$S #"P #6P!&F2!
M*&A!4YH!J(ZJ'[#++Y"J%@#"/'6+)Z@"+ES"'_\@P1H0P0X,P0Y$@BU(PBVH
ML260@A-!]>8PAW(PAS$P\*@]AR)T3GEP#LAZAZV)\)J,H%*I</4(2(D$(3:<
M" :NA^I VV"&(#C,0V+RI;!IPS%46WK0&GL$86+V#F6VE& _YG. L.U SK,
MJU=M:Q%:R&?F@SQ =A'GICW,0V!UR,32V_S,SVRF55S9U?W4512C3Q5'8?LT
ML6A+R19[3S@4)Y04"3HX%9N4SBI< S;8PLAR@2 TYR>\<9[H20IP@0G4[ AU
M' #$ /_5@BI4 A*,0. D@*,DP!;$P'2PP65] 4@01!$P#,T725 @Q+<P ?0
M@ I<ELS9P&4E 1J\GV[_\ 8FQ(IQK7(H>P-]4RAOZ=% 5,NSA!$C!=(JPQ<W
M-(-)P 1\M9'2Y:(J=,,XH LGE:A_C40HA&Z+P<0>W?)-"$4P2&-X9=U#-$(9
M]9U$=,(?1()"7.0F/,5"G/@FC&.$)V]"FD$R" .I1@0F&:X1N(4F=40G;$Q"
MOH5'9)[/N,7M\@Q'$)\O_,$1E(3 L 23SPS2D,5(,,8W4=X03,9<+)\94,$4
M6,$=5 &%<<9$:\'5/$)<G&E>Y 6H( R6,-#[/+2_4$"P,#SZ0#\5O0^9<9E
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M"C^(L488+:K(H\LSC< "BSRL,,)$/O@8HHH[.-D$C3\BH?]$E34 2025;#0
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M0B2(\8S7H&H-=UD%-H2 BIDP1.2D$0M1H$K4MA*$H?HF3& (2Q=O2TBB3 +
ML'Z%D58H AL$ <>RG(6NA43+'?4:U[3$E9"$D&M9V((6O9K%#G:EBUGJT$I7
M<A*.CBC+6W>\(SH(DI:-1$,1%FF%*S#2R8!9DE\6 4F\$$:2?]@C'_:HR4_D
M81.=B&R50[E8Q9Z2,I_0Q)9!<1DM8Y*2HOCR*D%IF<I0HC)V2.,86E$F3K3R
MKG>YBQV*5)EH#K&*B!C2&*T@A*Y44Y<O(*TNAR $%[AP1"[XP/\'7.#!.@&0
M@"%(XC"Y( 0/-- U #@@ 02(! F2T(HBG( #'O# #]A0 D%DDV>C8$7=[L:W
MA5X#--?@F^ @6C>^X>(:Q''B?X0C"B>F A?":-(S9O$:X8A'&*D01C.649[R
M+*-!3!I/-RHTPI8^0Q2KPX5P4%>-ENK&I;7 J1"740YK@.> OEO$@RHD"NQ,
MR!>AX(.'* 0AEOZB01Z"7RCR0*%&>*\3>###)JKZH4X\PA>=Z,,>SKJ)&'7"
M"H^0A8I0]#Y?]*A%T^N1B4[1/SZ8HAO-*$4G'F@&,DG/#+)PA!4H:(8S8<D*
M8>T#!*EP!C+IP @RP,(!M? '+8S@#"K_"H41AF -3_BA$IRJ!!@FP(FT_@$5
M6LC1+_AP!AV<@0]], .7VL2[11%V#6! @ALJ80DBH%,+@/C#$ #!MV)$@AF5
M 07<L$.?4 #$[DIQC7*48M(#&)6M"(%(3ZC*[@5*R)M9&,NYJC>@3%K60[Q
M%K,0*2UI@8,<A@R'6+0R7_IF)1S1.,9 YDL4<&W%6MI 2%5R\JUW[9<ATZ(D
M-,BA$&C!$5K&,@8G(_)&:UH$&!D)\:\4D8B><00:I31)/O+ARI/1I)4TJ0DM
M:>G*6J:,P41!65%PF1-<_D0G16$'+%E23!]?9<A5@<: <Y)?93ZYF>]:Y%8T
MF5YU7,0SA/!"_Q*X0 BZG&:\6^@+$,JY-1/PX"XS(, $?)"K8AAC"RW00#X!
M8 H, +%B#%&]2 A!)LX ,U^$((N/ K;+!CN\RP*-_,D9MT0!32SJV$;HKA
M#6,XEW'%8=UXRM,>XQ Q%<E!16VRDY_X^!0^,%T&?"1GG&4H#G:F*X\W B>X
M5!/*H]H1!BH:-,#>Z6<6GA!&*)9:H29A=4)8U1"(&@0A3]3O1)OPQ2,V(8OO
M5;M"C\##B$S4!^CQH1%6B"MNP_<+*]75$7CX7HLF%(Q?W.X4[NY$CQRQ"=W6
MU@IXZ ,G[G ',G6"3(U8%)FHT <AX $/,:RM$#0@@BP0"C2X6 ,,JO\P"S;-
M( >=H,0E6*&#:_Q!"+*8Q9:&@(4<G.&KG3C"E:A@!"'(@$O342X@#"%<(G A
M"TA(@B$,01Q5J (060 #('*!#S2P A_YP <\'&*.=)C#'.7 1:A4,8I:V$*>
MJXB;>;$A+$-G\R*&YMF^TA+?CM#Q6<IZAT$B'(X%7TN9WKI6L[*R9$,.Y%KR
M,!>VHJ6-:S'2'>%RIC.I)<=K,81:T'"%0+21"Q1;)),4Z>3 TAN'3*HE(RK^
MQ\A4<K(6U^,J^6B)3E92%(<])9I:45E6W(&/>, C)DQI9>=CX@Y5B@S&+X%)
MX'5B$U^&I6/L@,?PX:%(0YKK[GZ_^[,RPC/_GJVBFM#W0B]4\85J0L(26M1Y
M"=99!@Z<@ ?H_$$#"M"!-*@B%]C 1!(VX ">(T %B "4)P"TRHH08<J %
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MT$ 56"$=6 $)N$8$"L I"8 +2( 'NBX):J %%B,(: (G@X;GBX7H,X<^*:B
MQ-(VKD$5%E!P^H883*48U# 5G*@\F*$VAFTX=HH^4,&C0L$X)&X9#FAUK(&E
M,/ 9EH$Y:J,;RJ'12B?JBN&H!J4:=J,61!!S1"'8@NT73L%!9D$9<DH[9B$2
MLL,',W--@I!"-&03SJ!"-L%]\D 6IL%
[email protected]+ Y"%@$+JJ01JH2PD@>&
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M*A@)FLQE)>FK8QPI6MPK_XT2815L,C6,IBUN,@V2 W2("_T IT0U0=,H 2
MP <^@12VRQ(20Q(>(VP*H!A(@ 3,H16 P 4B@ )H( @8 D>;1>=$:*,(6XB
M#:)2H=+"\C6*(SE>D1A485 8\QG,(7&$ 1<H 1"(0Q3>LHF>@3DZ4$ Z\*A8
MQQK*H71*9]5T(^I XRQI#7=V SX45*BT8S#10T-*<3R&+10HP4"RR@^$X0\:
M03NL9T641SGOR@\NY%UEH1&$A#T'R ^0QWM^80KG[5UW$X;FRGVP WR 9!:P
MXQE&ITDNQ'C<AWW$C0JFP P^)'E63@B&8!2'P S4BJP:R KX8 \$*++2ISO5
M:O^J^ +[" /_F!9G>B%(.@()NL,3($/.L&M^$ +.$$6;LL*..%C)\%<J4,+
M?^ $=$ +)N$/^(88F-40A(X5G X>\.$?]"%"\0'JL"$M<R$MB:-O6$&A^L89
M4T$+(J$6#($0?NX6;$495?4LU!8:771MY4N^TJ&]DD4;O24:Y@7 U($JF"4K
M*(F2(FD>SR6_^"M==%0LQ#$KG&QP^Q8LQ():[L5OYR4CE,4C',D8O 64,LPB
M,,+Q C)A+(;'4D8?=L_':FDF\*$F# D>IBPG0(_X<J),H<R0_"Y<2@]D3 \E
M<"(>P +)*D8JIN+ XDX@$LE=IH4<>D(.Y*"36N'#(L+_)BV!%,C)"XBF+@C!
M$EK!"Y0F!;@ #7(N*+>F!0P@ =! $F[!&K#!$J2&!QYC P@@"K!A ;R@%9;@
M!M F!&C@!A2 "QZ-0L](5</R&AYMNS -:;>K/ R#-R#J.-:R5BNA$GZ.&%+A
M.I:!I9K!/3A-&)A(NQAS4&A-HA@S!=/2I8I!T42P/YPD/X;M0^CCJ&K'&G[!
M/\RU04;($XQD1)@G&<:D$>0J&92!V_@ #VKK#$RDVBB$>1#DJ\"G>G1SK&CV
MW C+?>Z*1&RX>!XHMQZ!"G/S#*X@><J*"D]3!Z@ %I+!>-:GWPPK@6:VV6 D
M"(TGJR8!"SS!%\S %,Z $QC!_[(2:(@/9$8:P6;KP!=B]A1,046&X B0( N.
M8 >&@ AVH#R(03U&YT"-(1SF81_L(6+@X>ER@Q$=BA6PH3@0\.>*Q35P014R
M111JH1<D811NH4'-JQFE\2)N)A%H(1W2RQJ;#[ZPX1RH["P60AWT:+Z@C" 8
MR6#V:TD9PDY/4ERB82ML],G<X7B;29K)92#"9;_NCB"2E$DA+R/ X9NEQ4FU
M0?-6"63FP1Y&S\96 O8NAB15[Y;809=2!L:4"< .C)Z)XEU40B7*%,<TYLGJ
MX9[GSED,@EO\*RN@99:%)9N60 T@ 2>U[&BJ%R</(?R:A@=VH R:!B_THGU)
M VV#/^BTF '?$ #"* #0H LL 8#F )6D$-:. #/J #N (/D!5I?&#^V8L
MBZ$7"X<Q0=@V!G@X<,H05*$V7K$<EF,XAFU9 ;,9ED,X3FJB5I#6 N<_LCJ"
M_V 25DVH7LI<"9,#M2,\NN,[Q.,9]&,9CD<8ZB>KX&=CCZ"S*H1Y1.2 \E@'
M2G,6FB&K2B1Y_)A,/(1$$&2J]$,4%J%!NA-><2MY&@@[W0=%@G 3K*01]J *
MP>U(?&$3(NNRBT>JAK@3&"%'/F1YZ/,*AY@/J.1*,I:P4ON!+(NP3EL+?(>)
M0@$7L$H+2EJN@Y42D&,+*8>7\4%JI]8<5!4TPI(WTO+2+.W_TL2RZXPA %WC
M, X#"<*V&-&O&&ZAZYKQ;7PE_=YFC=#+&L6NO1+I'.R+1]>EF0P)R7C4'7$4
MD;Y1RN@4'9"9'="!O647GK>B*N:%1YLE6B9,6D!IF^D(&YLT9ZK4G.,A'^[!
M9&[7'?PY8]RND9@I=F%O=6GFP-SNEF;,*E#B=^.T=E-2]=P%F8VOCM*.D)HI
MO+.I05OA#7*!%7 2"-1@HJO7RY+@![8@SKZ7!GQ@*4T: &8@"9) $M(!%[9@
M@P" &;@,3Z! Q+@9I* !D[ VA "93 P(P@'_%N7AC@"MJJ*\AJ?\C%8YJ
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M3/
[email protected][H\QF,W=,,_@",%<X/,!T5KU3*G6' WC"J&A8T#KZ,: BLX
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MDLP9H4CJ1R>$#JJ%'[,8)
[email protected]_)%G)UH88<8>K)X!K1!8/.*(&7X<
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MSL^,F3\V(Z:;RZ#9C%_,*8!Q>L8O_&2-9<#I_U*%>I0G%O$H 3ZC&K_XQ1%
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M* ,)"!"#+:"A$H!8 T<G0 "%& '!( $"QP C&L<@@<T^$ )TO""!V!#'<N+
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M8J%>B$06RH $'J0 =6RNG0\< -()>0(76G!0!QP @!0D8 +,^, "<@&-)+@
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M:$S_[LOXN9S',$$(+K!^%:SXG" D488R_ -63#!#WB0NM_[G@ )N()] 8$+
MCLZ RI%0@)0D @)U, 8B @"$#Y @BX@ @A$4%@C#U:,\2[Z1IAN*C%N9*/Q
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MAT (I$ *7]8%:1 @I) &:< %"/^"45N !*BS SS 2:0!310 !3@ UK B*J0
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MP%9:*0J&X&U@A0M IQ21,&>C(#O\%8DQL3FC((FY RMX 1;MHDH Q2*L&+&
M< [G0!8_H8X_<1Y:TQ>DQV*A\1KA0 Y>(65HH356QQDI]C1J WCCR![*Y'6+
M4T]H,7=05G?TZ9[8< Y\!S>-1QS'Z$W!-#1)EC3-^!9&HZ'Q<(Z#-TOC*#.5
M1WB:ATM+PV2ZE!IJ$1F@ 8IB,1:A811>40_V8*/Z !LGHSF;HV5:Q@JLL JY
MD :W,&9CEF5> 0&>0*JTP(\8%&U@R$), )( '31B00C8 ()_T MD, -5 $
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M/M(2.H$-WH-IC=0^5E)6+Z$*QYDHM?]@)L10#=/0)AO8E<;%A \("#MP!6B
M!I& !H%@G;9 "D_1HTH7I"'S24V7%>R!%2MC#%)7>IUX'E,W%N!@#.@P=2[*
MCJ/A=:ZA8EY3&63Q&="DC8EQ#\O('$;FC,LD'?&0&.0@'/.0-/0YGZ:(#1!J
M-XTG3L!A-W9#&.7T&$6CH=F!HMW!8^5XHN0Q=LZ(2\(DMFCA=A,VBND(#V%!
M92DV%FX+#C9J#_OP#]IP4 I%>U41I/5XC[TP9OTQ"H= D!CU
[email protected]'!#Z0
MD*B#4C/@ _9%4CXP QI2 #&P 06@!D&@ E?!!DFP 1^P C< #"2 AW>8//AZ
M(Y>FKOC@#?#_X$BJT"-H<B/6( KHDU5HHC\_8E62"CYK0@SD Y,L46I#23[+
M@'*I\&H"U*BSX&K,.PN:PKS<4 W/.PF3, OO8ZG>-I9L(@K>UB=B JRWA2PI
MQ F/( 2X*BF>\)8HM"R;14*RTD"=0$.($ERU8 VA@ LHU&W!UC_JHY6>EBM^
MD*N,D@=6D R<H+]G8 1'H /N)BFHX ?-$ I'$'*I()N30&> %7>0SU?J#UB
MJ*[: R3(HI6XD H]@A'%X :X$"5#<GZ<MFD0XZ8P%R7)LSW5L*Q]LH-TPA):
MN0RP*0Q+LFK/L"=:\"D[H 6]@ NYP R><"%; @1JPK6"0BCP H=_U,5P*!E
M(S,R0 $RY'D563&C^.F>YP%Z[MAB$\:*-:,S,JIB^@D:5M=*O&0<;/$9/Z,6
M/Q87E&$,]LD>8Q&CX'$U;,%WO;$;WC1YYG2,BP=BQ*2-JG$>,F,8<S,85:.U
M[X0>X.@6%M86==&>8B$>\AE0-(M@!J8-N6&C\9@(\=$*EF )MW 5N: ?\.'*
M"Y4&]^C*7I $EH0Z/R A@)"06; %68 Z!V #5)RQ9 $&#(!KJ,!S]<&"R %
M5W%H(&!30; $99 .K> 3/@6<RM-4B&03M/L,Z%,+.0>3U)-5$T14:"*I0OPD
M0ME^23(^+O&3P4L,@-(-@.*HCOI6C6HFH?^@0/W<J)?R"THBQ&'R/^O5"-2)
M@[\2"NWB1&? ";,@"S*D!9<5*]DR#;X@EHB"!)A%JN6F0*1:)_JK!<;U@/EU
M?JE06&$$*7SB!X^ !Z0R"91@6[URK:Q5)[\6"LUI"(( <8#PA+A /BO!/O
M72B1#A>7J(.)7W8Z"9%@O"GL1N@')-^C/:7)535!$S<Q/F5X"F/]O#\M"G R
MO8,21I0@#,(J1-.0!VUD#JHP PP 2 9RA@#97 SN0!4"W%,P@V!C+2551
MCUOLG4\''^*)#9B(%:'ACN@!BNFY->*!8:N83Y:1LJ!,%@B&G^AACHV<BAF6
M8CMS%ZZX'8N3GY#_C!8&]AH0BF-%XTUPPZ&$=S1&<XN*IQ?,Z*'Q1&1 :SB5
M81Q+8V%O06&FK!9D$7JGQ+: [!7/[=RJ9 _Y((_@<% !8]BYH :'8(^D\%#]
MV)V6D :F(PE(D 5HX .D@ 0;T" G8 (^D*43 +& +MK -\:4 > @ QL H-
M 38\ 8WP $JP $UH 89$ 0G$:>,UCW/,S!A-20STH:>4 O_HS[/L!-F4H!U
MPA+TAR3 &R0??GY P@R%60Q&.3\S,B?*J2</")7]3,3DQN*)DIQ?HFI<HD#,
MF2<_K2F,=5E5Y E^ "<?Y =9@$33P">((BA$& K*\+S"L 8R_5@H-$-$_X $
M AV;;0U<YO8'C: ,H7(MF6)NMH4%*.@H8& "%G-88*"X:R *6K (>HD$8/ 2
MSZ 1<P3"ZUHD.(T^E("3HG#3YS?B.H+4!"->F;;5+E$.\-&[-O+GHG *N" ,
MU%#.Q; %28 !$> #S] )8K7/D[((P>5_47()!$ ;69 "%1 !M+ *:# $6 (
M67#>D6"=DF#%4"&)DKBQGR3&F^@QTI1@4L85YZ"RGPV*4H=U@1Q+IV3:ZSE/
MSE1U#J:?;2P82Y8UU7X>JW0>Z* >6A,.7&,S/.-D$+K;Z72,E,&A%\I.<3/)
M&BH/[A2U.I9.RM0U[& ,
[email protected]#(H$>?W?\A&N@Q=Z[QMA'FCF'!--.]
M#_90#T:QMZ,0$\QP")K#C[A,"I'(7Z1@#&D@L::#!&50"X' RVP R6_ RF0
MI1UP.FB07T/@ QE2 ":P 6P"D]P %^0#E!@?31 X00!Q:@!OS"KXLV,>C'
M:L\02,\@"@KT:F %),_@"<_@E$,B:MI3#LP@#):V/?'L:F8R)*]FE&U5NU[2
MJ%O")F2R#/GSE%#?J%AI5>:05L]@OP(M]=: *7JYJXNP";%R+9(BT'D@!)U@
M!M_"Z8G2#)%B!(*BY&8REIM0!3F <+8*1&VB!860O^U"#*%@@WD "'-R;L\@
MP&=@B)+5":?P"SG'UT/_H(A:8%)NWB-6M==NH HZD><I\;N1Q+VI<!$8C'$X
M60LV4L_Q\A( ,T?R$\\!*#^W:6LQW2EL C_%\+ [0 (E (@P (\$ E HI7]
M5EA<PB4!: UK,!L:, )=\ 4?\ $V 1@D 5&D 5:<-Z?60NJ( D1Q8]5<8_]
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M2+'$V<0D6<4++GA HHPMRO#$!QI2^P$)'DS@@8($I%@$$%RL(:T%$Q*8 D'
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M.L\QQZ'HXXUFD$Y2YB AYYQ1IU00X0= N,$!#L PBE @8@ 1(B$0HD^,%(
MT>L$*BC!C$19HQA#D%D05+ !=@@!"A(TA^T< 0MH"$049)$)= P"$LL[1:L
M2$PNHC.N:[ 1&[EH!1Q]YC.#+&0A^!K(N@P"C' 9!!IR< 6^,J(0A!#R(= 8
M&#@$AA=MI(,B*;%C2V(&CE8HPA4@0<=5"N*0AMF,8-# 6?]%5/(PH?P#+.[H
MRE94J11PA&,K\."86A2I%'B\ V0>6YG(5*FQD5E%'5MAY4F"62^802,7"2G)
M&TDBLTTR\V<%84L]I#F8?\3A$..2!"ERP8I#&$(-A%C%&]2 "4L<PA*M:!HF
M")&$'W@!"#R01"1\@(1Y(B$+/O USK@@7D"HH#W-,$$4$" VW3 &"5(@39:
MH88DG( &-E""$RA0$'-@@U T#@OQ]%I8#%"Y[C(Z:<6Q'!B,314'OQ8HQJ%
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M)PQ;0"," +BA$GX !1$ @FUF,$6:!>)041I$(8@!!JEE1AIO?$:;RR(,;(%
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MD2JXUZJ&8"@&:( "(+BM)+BM(/@ !@" [ "P !A"*!(7DVX!DB67N59_L/
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MVP@!*6 %$@'0B !;(B#1& G$E !+V"!($BXTTJ4PXF.%W0<)BK,3!,I9H"/
M1".4^""AD*0533,U3%-3Z+,.$_*W;A /C3L/]F&/I$0K VF&7V@&7PC4!FF&
M(=D=K[*463"BLWH&8> /5[D2^,&JK^H$+! &/?$&4<@#(S""23V>#D$% 3$0
MN20",$@",* $5("4%4H<;) 3.)$3^N@&EY2_Q%$OD6H/>6N@!G*.P\3+^(BK
M87A"08F09K"381"49V JV.+-/_"!"[@") RM<N@&\7&&X?F%&A&?9:@'-E "
MACK-_R H 0MP31K@%1=P #/X!?E1M5KCAF7XN%835&050H^\AE9( D-8 ]0H
M V0!!"F1DID3Q$/<)C9BG)WKN?.RJ.R$1$E4!(,!%V (SXQX+SQ:"%)4NG49
M1:"1+U;T+V- !$5HA400B)A!%Y+ 3HD]B#J:Q7C@1JVPF&ZL"EAR,79XT(\1
M"[Q3))9X&:R T+CK"9)8F0>-NXD !T=*VL'KEYZ%&810(+](B/Q43V@RB7IH
MBWK8AW^PAU; !#9X#$S0/#2PA$%(@W<\VZKQO%RHFG3,T<](C31XO=?X#(0\
M@0/P@'I$ P]$ Q\P@0[PQPTP.7 @1O %S4 AH@ 0M( O\:>( $HBB+6A2+
MZE)"22&-.K_XP*B1?,'+U<AQ2#0G.LQKJ$QS>(<2LH]% 3\R51#:\8/SZ(^2
M7!#V" 5N: :!6P85^0/^.ZM<$Y\C<A#C$I\!<15!Z3CXH4 L\81( (-)$ 95
M%1!*^ -*T()AP!Z[&H9FH 11H 0P( (D( (.1 -/4 90BYP2.B]U2(Y6:!/<
MD0XG\E5<=0XU>D'IP!:73,QB<(;R8#==#05 "(:D9%:M+ 53Z(1&*#,:N( /
M*($:P( D(#AB'89@^(59&(9?&#AAN)$S] -MV 8G^((0UD(E" (0 $7<($5
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MI"D&$2H&Q4H=57/"8$@3[L"<2! 4AO:#5O,#&9@ !"!24 ")6"!!N#S4Q&*
M Z"!,EB/TID%#>GIS@&I9V 094@'>TB$1%BG( B"KY[T&WB!&P""%5"!'[42
M^ZL%5?BH6J"$2, 3]C I:VB&I$(6NJJ$;M."+"@#_9DK-&@,#UR:G$N,ZE0C
MD!T8PY9$J6M9GRDD[G38+I;$T\ZC9X)B7S_VT_X6/@K/-P9C8^"C3/2966P*
M;LQVU^:8G:T)_ZG(158*F5\<]V4$9*WPV9J F1"U1D):&4/JNF62=YV IJQ[
M)L"(B*\8T7J8!W:PA57 !*=9A2@+LT 8A$$0[UR8C#*B44)(@T$ A,HEBW(
M@A;X "0 A$7X 9CC @K@)XHGA6N(LR/(@@3PQ][KFQ1(B%9P 1JP (=2 A(8
MAW18XKK\ *%@ !ZH 110AN9CCCH-*7#V4BIGK$1)AU!++>@(7<3I'&% '=K)
M:421%('+-4'Y#P.9! Q>D27Q20QI-P-Y!O:QD15?G_D1>_U@<>3E^@I2$V$X
M!4J JS58 T\ S#@P&A30NM8'&R D^2 546!''_#-;C'H,3Y06O@%O]C"*%K
M./IBJ(1HTQ.X*I!O3JTVA:&A5!-!?89+, $*F "J+@"D (M# ().!6"2@ +
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M\-C0 <D/0*I$W=UA(L&$'QU"G..BYYVQ)$%4,*"0Y,N/7.:P?38$8,.7+T$
MH"B3[MHU<]>\O6:=SASMVCW-S7;MNC7LUJUI>[/F#7:Q8KBLB>KV#+FUYL*]
M%5OFZ=FR7\V>A7K6Z9DH8=X]_0HU*Y(HY*)^B0IE+9*P]'E"$0OE*7LQ:]>*
M$4M%Z8^6/W\B_0$():D0& DED1PQA'_^ ?*'*(!44IR$Q?24#C[XK):.-ZI$
M.&%SQ:1"S'#/U,?:_X2T%7=?(<+D%V(Q A9SC7/#E5..<\_@V$PSY2Q#3#$3
M+$0 004 "1'4!2V@T1'%!!!08D4 ((&)!0S'(AXOA,<-4L1XR7RW0C3#'_
MN-+&(4$HXHHK%RC0 A2TE!"$$ @ 8@P2 C3R1_'I3*)@]Z)XH<P?WC9C37%
M^6B-*H"L 4@>@(BBBBJ?V)(++L4P<TTNFEZ#4"L(&0,--CX5A,TY!D$3:JA*
ME;H4JJVVRA0ZL&(C$#2B,D5KK0?MBA"LT!"42ZFYK!(-0JGR*E"MN1A##JC
M)*L00__4$Q%$\=1#D3L7:0133"1)U%)+[-0CD4HGL0/22BQI<VM,0,TT4_^Z
M1X&3#DNEG@I4J>UBDVJJK8I:4*X\%43J4NH8PQ$\]>"#K3SVV .-):1X1187
MEF"<L5FKK$((QA2/-0HA/B"!Q!9;9+%%R7WMP$,+$23P@0\_1%(++EF8X%@!
M#DR0@!30?*"'-ETE\4$%)P 1!!>S&3,! 1]T 8H2#0 0PBU Q%C;;UK3=LUL
MN6V]VV]>UV9.<,4]PXR6WI@]G#7+/4.,*,L9:LTR=V?YW1^=B%=+>\0X*$HD
MH73BQQ^>= *@X7Z$L@R)^*VQQA](_&%(+=9XB=\PPJ3B!QI:H+$&$FL<H44M
MM-FXW#4FP:,//.D\CA\NJ:AR22J8#Y,EVL_%]EK_,=X\(\SFYPGSBS"HB.(C
M;F6[70TWW3CN^"]_5&%&<P<DD$"0!E"00 %&DD!+$$JL8($%#P# ?0DE?& "
M>:EP=SLQI[Q-8MR :W$$-ON$08LQQQ3!!5]PP0- ((:K,\"!F! %F91B[@-
MR@]'0(-_/"&,953#&N4@3GY\% E"K,$0D0!$)"+AB5[48A2U8 8S-L6:3>6"
M6<9@UJY^TA-\^019!QD*JUR%#69!@RE"C!5. %8JIO#D5*T"U;%*E2Q1'60<
MM:)%(J#%Q%49PW\'818P<M%%*6)#6@OYASL>8BUV1 2-%N&61BY21HMDBUW@
M*%>Z4&)'E(##7?+2"4<V_\*2<\@D'3"9E<"(LI%SM(LH1O&A-M !KUPM45E+
MB0D\\H$M;-7#'O\XQ%B2@ FR6"(-@A#$QS#!BE5,+&.I%(1=3H8R-/P "9Y0
M&0^X8 (-3, O65!%,0+1EQ]XX SN$(![)"+!Y "'F]0 Q X4($/*($'AS '
M*X8T@1W0H@U!" ('AA2)W)2M;+?!D&MZ0DYPT@:=WBB'.<J!B^'0AALV"HXU
M:">W+/7B;<TA!GJ6(9]0) \7@$J%,")AN%"D A6HF 0?_M >4<S-$%YP#2MP
M00Q5#.AW$AH0(#K:(#\@X0BB:$:BM(0;=5P(0QN<D(\HD3D)W>=W;"O1?:PQ
MC/^;;BX4W6C&*5"1BF58J3FZ,=MKE),E?LHS%8'8 2Z%!( 8F$ !%HC D !
M@0(DH$A$VJ82@A"!!C3@ B40ZU@IH(SH=!!S<1/%,MKC.%'LQQ#N<$48%($#
M("C!,A@P@ $* '+(0!/@#$) H*("*,#A<C[09CNZ$*+^&"%:*H3S%4 89*
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M*,,AFL4 )0@2*HP!RY QI6S.9"Z=S-UWZ#SK(5!SBO@:>-[.8)7&0'.PX5
MQ7"(@1W.$<,[WO$2>.SD'U%, A7(P<6?4O&'"<7(&&:;T#4(M(9*1 X08/@#
M)4#W!_O !JB8N 8^S(&AV10'%<!+Q3#@'.=B&$)9K?D=<D)1CBP]X\]RZP9
M)S%9:X 3-L&)6_!0$1]B3.(:_UEE")'\2H -P)H$3F4( (Q$ I 8DXN "L&
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MD5&_#0+GY?QB&;7 /5N-,WRP$=\:7,)1[IJ#BBH(X6U_,$!5 9 (! ) 2S0
M!Y" !U1 H@_Q6) =A %P3!#;" !)3 "DS@#;B "G@"WK3_598)0RC\@I=E
MR8C4 C9LP_@H@1JHP39A0 +0P K8P J P IHFQW@ B 0@UKAB"$ 0BVD027P
MTJ<50RA@%B"(4(2 05]<P0F)@B?40A->RC6LPJ9D"C: D4!886T!!4X TCFP
MUWW%2\^=PSO\%DT0!3K<2JTPUW'YR]'Q%JD$C!'1UA(=4;]@PRJ$RJP \8A
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MI<(]1B1^%,,E#$,S3 (ED) A\ 8[%(WB!JX40@\Y)&<F<-R9 (E3 *'H!DO
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M(*!!$K#BA1&>)0 &7: !@O[ #B!!!S "2!!&0""IBRH"9@ &C_P P(%C:0
M "& 0RO@I054@ J<( UD7ZN@1*E42%2TPCLNS^BE"#MVC:@1G]L\0UR6PS5\
M&ORTGX\\@T59%.L)@T )@S58D!^< 4 AS]\DBG%<E(CTR4UQ7^3XAQ8,@>'P
M$O&-'H:0TWVP H$4!T$1B)=19(H4 VW81TR^1D02PTV!R-YXPB1<"C/48VV\
M33581S T0R?PZ>[]@?8$"0)V EL0 786JL5B9'$3 5X DHX%86R9!8AA*
MP!*XP W8P W< _L0!4$P^[!WNM90SO%QNLU RX4@C;LPQ*P:A"H@1*8!ILT
M@ 7$8 G80 PPPR3HQP[6@A\<R!$<R!J\_\ADJ8(A8)8JC$(NC (K)%A'P=L5
MF) GG)C-C"8SF-8/=4JO.)%2 (4@8:>W\IR^K%?"Z(MM)<4C<2$7TH2K#$6[
MP(1NM4JY^DN_D(-^P19L+=(9U@I!( MQ)02M.41%<)=WR8-%."=X<4M*O$1'
MO(0@J0,TN(),J&MV;@0ZO,,Y@$0Z$%RNI,/![402'1R\L&O3C6(,,5$KQ!#'
M& ,;K *LP 1XQ8,\Y(,^Z(,7<$$2>($7> P2L*(D?((JV *SLL(H (7!"@2
MI %9>,$/9 $:\,#,+.A<# (2Y,P$F(#1 L(6C,(M(,$.M, !$$ *: *",(8
ME$ >)0(0G( %J/\ #2B!%X"".I"*;51(W5ZGC,[C/++CUP1';P3':S1'E;F&
MVTB(ECB'C&".EW@'VJ3"+_R",LS"+*P>CKP-2R%*?G2@*>B)%@ C8H&!*K#-
MZ=5C2L%#VV .HH0(YG).1%[##;Z&,1Q?=%R0EU6#EQ #2?%9(:@;;)0-X%;#
M3EE',Z2?W3Q#-Q3## 3JH7Y/ 9# !UPE MY:HA; !UA HVY 54HOH*9!%P!!
M#-H $-P $-# $?2!(^S!=L"4VW1#CN[CVWA')<B!+K"J$K"!$G1!-\I@6+J
M"]B !\A2[06INE6"(:A""+&"I+ ")F",@K'"(*R!)>1")6S!&F3!9I;_D"1(
MJRK4@BOFPBVPQBW\$"G"ED\\$G;ZT-#E42/=EWZM,'T5S#NH0[JB WM=G+GN
MRR/U:U%XHL?YVU",PQL2A AOZ[].2QF]W$44;,RRP\&^;+AX2Q\9$DS@D1<>
MDMRBQ%%DY]#IUL'Y'!:Z;,!DX7[I<".=,!\6UZX \IZ4?G%Q$2@42;A S9P
M@5=@PB $PBV,!2Y*@B2@P2C !1<80KVA@2!PP<T6LMS%W1:T@+#50LFT@ .0
M0!9DK4MR01F8@ ,D0 A,)3:XJCEH0QM\ 0@L0 4 >$)2U3(+>C):(487S$8
MV3N\SFW,5-[&XYE2&3WE8YI>@XW<A[(]Q_T(_\Z;@4&Y4:1]$,.EQ$@Q#(,I
M%,(DD P@(%;^A%"6_L;K7$AN5&XQ8$*8ABDND(B7J,*AB+-]!&F;.H/Q5,<O
MI )$N=43F@WJO T_$4YBZE,Y (*#&H #_$$'=,#E06H &DD,I !4@"D%C3V
MYI(';,!4]I7W8)4&D,#XX( 3>$$H< (GS$(3.$(I<#0GE,*H\I(^!8>A',?;
M].,R_($ED,E=F@8+D,\*:*H%VD 02 -I(&DU)XA) $EJ!N[F45Q>,S0XL*B
M=-0@,*L//F-2DU!HIM H*%BEO-"FB")P#ETAQ8JKS&86%M%&O.%&N)<2_684
M'U%20!P4!5%K[I<GXO_7QM5P01!$#1VG&U^$-H1#=VF$(K8Q= (2P^($=7XA
M=7)K4N0*O)P#.ZP*4,A#4\!*#@V%OEHUKJR6OW5*>DX<MY315:A#$A"!,9#"
M(.2"+5P#(03"(&QP4P]"%E3"'I]VV@EH&@"CW&F8'B2HRK0 \1 %JA=+JC"
M%G"!#Z3 !!2 #V1!"$ ##90!473C RQ "71!%W !-!R:W)I#Z=9MAGR-,:2#
M2:2#*W--;Q!5;%#9!ME'?="3/M*3B"Q#<[15,:!;?H3"'U3"FSU#)!S*_526
M(8"!%A3"@NC #AC(<-R'BEI(2K&--Z1"ASA:E"5*3%F),NOC/@F#-[#([6;_
MD#B+TVQXPPU^H#"< F,=BB5L00A$Y59J@ D0*J BX) 4P 0T*J.Z6E1^#Y'$
M E4 549?9X0 K0P#!*0F85PAF40C(D@R^802E$;BGXPBP$PT7YQW+HTZ'<
MCI60B$;F0CBT0AC@Y1(HP:5NTS:]P V T 00D,0BK4@D:R625<@V.BA2JD
M 29@@KM)BKJI @3G ACLP [X (!J5B0, K+BXBCDVVG14'!2G%=#W&J]B\CB
M5AZEX='1X=$)15?;:ZUD(AH.ML*]2B;FU[SN%VV! Q&/D78IHG)NA#O0U\L:
M$L/Z$4B 0S@LK$@\L4RLUQ!-DJF(:T$< VZZBU* _^)U^DNPQTH\!,P-Z<L-
MI8,QH-857:' I(O*H>(_0 ,7"(+/BD(@G,4@2((JW$(MJ+8AF)A3VX(DI$$A
M>P(0!*/)Q!(:> $:!,+)(($%=, .G 7B()B:4$Q(L$$-$8"I$ B/ 0# TB
MG( "&, &>$$0>,$UI'+!O.-LC$I/O(Z :Y^6,D]KC.J4C8-N0$>&JY5PU BF
M6(..W,V'% >@Q:1 4@+G^ &CK('*9$&CQ,@&L5/$J\MJ",?CW* ;V(Z/3!IT
M*-:E"(= DMK\@2#F6-1RL%,XH0[P,(Z3>[-UA(((! E60:J_DX %;$"@QD $
M]-7WA$#S,FI6(:"13$ (P/\:!5 ":C #Z3 #ZS #PR!&9B!(^Q"*=R]+P3Y
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M:+:C @4 @02, @> $"'5)4Z/V;0 4 "1(4* " ! GE%*03,%X@@8$**<"K
M2$ A 0$/-0!U,C/%$2=.I4HEH];M639JU)(E$T=-525#_V[0(FLNL+XJ1A1A
ME%D%F2*<H"415Z0Y1HD5*B#@ , .(""#V@01!1<< %$%$I 3 672M:PI)*P
MC&$%$%Q2,6040RPQAA1 $&B)#1,JB024?H;9112<BE2*FR,,0:;);%)1$DF
ML=%&&R6?A$:;*+&!ADEHE-222R7!N9)++;4!YYPER00'G"S165+--=6$1LXU
MM\QRS"2U[/)),;U$TIA<O#0&FG]^^^T?=A -AQUP%$74474659,==+2A%!Q$
MP8%TT4??O!3.,LN,4IM M612FZ'B#!5++,=D$D]!2Q5T53^3I-)56ELQII5<
M:F4R4W;"V88==^K11Q],+''(DO\9!0DD$$'20((45FZ!E@M#"*FDH3222&,+
M'[Q((@D=MT#"7%)H\ &(#SCPH99 ;-%51T)2H" %'DS(!1$21DU$C1,VL*"$
M1&Y( Q]LEFH*'M807M(<A!]^&.*NO)J*L:P8NZ; :\1"JQE10-;,,[3",J<8
MCE/+RAI<UM"B$$#^T.(/0*[)I95B K,9*'QX#BI):U#^3 LM:A&EEK;$*B:U
MU,Z"ZZQ0:-/KL\[ &DMCC5<SAQA/A+'FP%3B*H855F:8@(!""> EA0U,P TX
M B@(3FX?//#@@P,*[8 $Z*9;VP(&N-../ 8JN "$\I@S+KAQ<#GEC"FF>,^7
M=II)IIW_;N*;);Y7DOF%&%4HP>RNLL+BV,!G#$EDFU44:27"%98( H,%@C.@
MA!5JJ*$+5=!XC!)55/&F$HY5N4:N%@W!Q!"[ &%E%%8J00.)'+/( A"3?OQ$
ME4$JF9$5PJ0"YL\D_802S5JO/!--6E]%$ATMZ:PS%S67[!*;5<B\LG[]W615
MSB7YA"<[A<E\64)2JY!$J$+](QR-VI0[R($H=+#C'.R(1SQ^%8XP#8L=ZLB4
M.B"5*1$&11WG4%.H"#BJ,4W)2D(QTU"P(<(U7>E*:_J?G+[DI2^5Z56O*A64
MDM2*5B1"B,#@56&>=*EHA,,=\3!6/+S !4),D0N62,,5N3 N_TE<PQ+A2H,E
M6"$(2Q!B"3Z(1"0V$HDL1*(B/_#"#W9 R28( (FD((@!M$\46R!!C^8P 0T
M$((0&",)7#"&'%H1A!(0+@A!^$(N\"&4IA2&24692L*&TI6EY((H&NN*Z51&
M%JUT9C;/:(8U3*858VQ&::R@VET*<89)S&P+AE@C+K12#.6UXAKI&)::G&*,
ML&1"%<08QC!^(8IG*.UDQ:@&;8H!M;B0I1S5$,99NH$9:-KE9!C36#.5AHNF
M>6,9PM#+#,[VFP,0P #MI( *4E"""# G.'$+3@)"4)VZ8>ALQ3$. RRP 0H0
MC@3@X0$-5J >K[-GF3PQAH*T80]./]"/L(PA2]V$9_\P*<44T#!6\9"-95U
MYFHK*P0N6!&.:"B"'$4 @1J4L(0;7, "*EC!36U@ Q5DH1*BX!XN*S$)2N0Q
M%7-ID1O24"1AP@@7JL!%%@*!A"&@ 1!9&(0J/.&)3P1B$%.T1)&8\:<B\>I)
MMZI5DLCJJO&=U8!EQ4:;?LB_M>*)3%8:$YSBYR<Y@0J'.(P2_7AE)1H&2E#
M4*"A@ 6L2\G#'8X:5CP0Y4%,*?9-[(!'!T'EP4Z]24ITLN%>RZ0F=2PI'2/$
MJPE/Z%DZ_0\<7WH2^5Q[5MG6BE>Y4NI:+Z4-1!%+'_^0 Q &,0HO (%'"[DB
M0W+!BBP2XGG_5N3"*,K HQ\@(1)HX((/N$"1+607"0?= T"P5Q;7 ,-/OC$
M$* #A J4X1P<"(*<U'"#!=B+!L#0@S%&2Q2@7"V35+G*DJZ&C59@8QR,.1E7
MKE:58MBE'&!)FCE0697.S.6;Q6A&-U1!!" 0@0=)^%%1N]D?8P!%*>DX&)),
M)Y9N"!4VE&"+.(NA-52,Y9G+-(TULJD9:S3X&<OL3%E&.16MQ(5IQ>A&-\H!
MB UTHAF=\ #>Y.8;=AJ 7U@ 7*$YP8&( &;S-/W3Y '.U$)SH%$-@'ODN#
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M$N N1$@!1[80'2H7 #C*?-'%".G=F9 "#0@'!9%@X#+H2A$#!C$J8HA2,F
MZHA9S,(7[DG&'O8 'T[LH1!5N\8S<LFQ%!NXSQS^6D/Y$M($-:@A" TK@
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M"-( 'O8KDY8"&[+"8H@"8:Z"*H[$8DSF+HHA*BQ&8VI%_$AG&%)A#?X "=8
M#0QA#8YFF2C#DQ0F';S!%XLA28IA>+S!+E A+R[C%HOA[SJFP:Q!& :O:D3&
M&JHA*U:C'*CB'!E#0$J#-DXA!R8 .-;) (PC!E3/ BHD.. 1 -K) #9 !3S
M.J8# I@!M[&.'P (,>C OY1!6A !0)2'^^&G0H@!FA 2S \X&.P"@ @R@
M]"B@#")A&(+!$?AL#]RCT#C!%^)#HY(A&*I&'8T!8YZB%3DF+FC!'L:@"-H@
M$1*!%MC@"X+@ J C 5;@=ER F*A$D#D&5C!+O^N 9>:ZIM6IAA$+8\B(@T^
MC0&YP-:R8+H (1*T1Q5LH1ANH4AJ9DG$AY*&307!I'XZ4 3ATE9Z92U[A4XX
MT-MF:]D$11& HMN21']&10>!2$YZD!WD01X<J[&0,%/@P8,T)3$]11U I4P6
M!;4Z)1U,R( 6[@G#)$W>Q[-*2U1JR(!*I8;LTDI6Y57*T&;&$*V*I!4.(0W3
ML$B X:N4!(1^11[R01^P@0L(@N0$D11*3A5Z@1FZRA*0L^2^2@V20!(J(1!^
M0"*N: O*0+MH @607I&H /2@!A'(1<D@=9,P 028 ?JY2:"X$H2(0A.( (X
M) F"@ U0L6$HJ2BP 1[_B,*_5C%COFDJA,D8:-$K Q 8_(9PR*/ *$21JVH
MY$(
[email protected]]$["*N$S4($(PY, <**%!F4$JB>PRSL(SE*E#-283(J\L*,8J
M(H;QCJP<RJ$SG($:GH$#$ < (F=:H<$/D!'$Z!0G -ONL, 5$!'/8 "UDEN
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M[F)J)L:*(1W"PA+<81O:( S:H V^X OZE 9 -NR@4RH 1^ &1 !G@$8RI!
M!D>48=%N5GE\P HP M:( N8@1DBP0=L;68 01).M19*U0*)!-C(BI)\=2U?
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M!9@T H"/ B8@!'29]DC@]I*4 D2B'^NE1X%#<0" 8"@!"S GO"1GZ@,"#@@
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M5Z08,L%%^?/K1J>HO&%07$%WVX 6F !")H%7N &;B (<J<+N& 0'@,04N%%
MH,)H#$$-F,+$,H$Y)H#^;J +:$$1V( '>, K <$3L$I\!^-[S#)\Q(J3@(W8
MSFJ(6!59C>%, )16V$>IH(16ZT?9;&:L<!B'ZS6(A$BL_&0GQT>(RI#;SDI9
M+R@(E[I91<NQ)"M;G7K?TD%*LK53V.&&LH2 .E.P-IA^)+VTZ&<+Z62P1#!/
MY%7.,4%7_V1SKG%5I&>S+$=LW]AA-_4!&G9<2*#%)+;'$'AD$"*AUPB"B=5
M#20!(:(("'Y@NV:."] @"7: (LK@7L(%$&K!%D8!84[@.'[ !&( &%;A!&10
M"4Y 1B !HI@"=@ '!Z&DF[6,)ZQ,"0I:*LN88S!#0"H.%?'UL 0S&4-1D$I
M*Z$62X8Q3,S$.D-JQ28L\H_43H8VL"*DXD+'NM&<-J,:#!X5Z.,LM&*4M [(
M&*,K&,\<R<(0)('H"" +RB$)(@!O?L, 4J #<*\C2X#U;OF,,40>"Z #/L "
M2,",<SE)=X^7-Z Z[(D"5L &K(.9A8,$ H<[NF!#"M< >&">\-$#:J\"_WH4
M;KCC Y@(FO1J:RBY=@@#!1!$5SAZI6@%>*![8RA>+Y=*UQ7['H)V,*"&5J!
MB<+ Q<. !4 @"%B@D6R !G+' KK@!Q+4J8"G$OI#%5IA9XPB"2K !_0@ C:
M%C(@H @ Y3"A4ZWGC#[!:&J!&6QA;,K2#'.ER\W< X$M5]92%W5X24CA3V@U
MIJ_M$))$?NN5S6VZRX\-&VI+7D.?5H&!#3 NIMGJ'&P%@8.P@X8%#D>E62T+
M^)TZ@T-K4Q)+L_C*T@G(@,H$A.A-LV(("K'A'$;KT%NK?U((2K;5A>.@%4R;
MMA !$Q !$>ZZ+(ED%<J2U-]!AN !U5=AB2T! ?\'0F$'P1*LRK!%SD>&9(PL
M 2 #2+$I2"2+8*0'$2S90L2+CPJ5/@1J%:N8EE\\.#B((2/#S'"!:&A#5J<
M( \47%BQ1$F;=->\7;N&S=PU<^EPIML)#QX^GS"]%4NUQI"A-&B04"HV5!33
M:^5X[C17S)I5;UA98;I$K!M35<;,>;-6]9G5;M:>C256U:K5:LVJ6?-6;FXY
M<WCSWK5I<Z90;\1RC)A @42:-E0HD1APP=B)"A0@$ %&B4V;"APF("!
M!8@Y$Z#QX4,"SPDH,*#@@82*#0P(%$YPFH *%1\L?#",F#=B A]26( MFT#M
MQPE4D*A &?$!"A5N<T'_,L(P &'XH,$)\D61JU8N7!P ,08MIDVL14S9FRF
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M%H,,$H@DK* A""2K_!H(&FFDH= /V"(Q"""!;.�ALD\(,DGM1"9!J]2#)"
M B9\X 2^$@@QY5OJ'%"! S4D(@:V.1$TX0Z];N3C4(54DDEHU0"!!BB,%-.
M7=<P58PY^.2$ES6J4%5-,3(]Q50JQ41B34Q5E?S,R2?C,I=9;G73337$Q/S,
M33CE93->.]%53B;/=/,,#[PE,%YH"<0 !&84]%99"),98$ 9I"U7W-2/29%"
M!0E4P)@''JSP6F7&A1"##R0LC9D'%AC FP9(^##U"O\?;/!!;%,W9X *'@P8
M0PPIJ$!##1V [5L!5R:BRQ<A4) &J'$ 0TAQA23#?#%..77^;Y.Y-Z(+?B
MBCNK)!(&-.XL$400""BP. 47% "$#8,(DPEQ?RQ1E& J*+BA.E@TPHMBC 1
M! @'E T 66,<D@29412(AHF2J(**<4PPXHMK.0R$RFPGM<D>]Y?0\LY92J9
M9?E(WEB^>5:NSYZ80.+X)(Z0!"FDJS.NTDJ1N8P)))DQ I^:K/./>!BP'NY@
M1SS8 8]ZU"E/>+J3.M31DSDED!WZ^%-/$C6H"3IJ@AZ$5.\4-4%L# H>A.(4
M",&1CD_]J5&$ZI0,"Z6H= C_RH2GNM+_;"2?'+4J1K8(X(R&V"D;@F-2;\I@
M$KA "$D,0A"64(4M!G$L3! B64BH1"X$00A""&)::&"%(*:#!$ HA N 0I
MKH M(#B H"0!!>8@0U<=(L'$] #UJ@@5M HP5M(-42.# @$B""#4E0!S[P
MH1.=Y 0;K*B$&]8 !B08(A+$4%$Q**&R9>!")XO$2S%$$3&F$&,8:9%8R9@"
M(:%\[&1D&08Q6&85LV#E9;\0Q<BN8;&;T80O6!$*+B0Q#JJ8P +C28P!M,:
MTVA@!26@00K49I@R#"@QM$E!"5H#MN(HLP T<$T);D," WR@!"O(6W$,0 (*
MA(!Q_PD@00VVZ8''A* R2>.,"E:P@0HD338&*( !/', S&@F!5RP 0@B4)BI
M&6!H9;B'(K:A",,L\P!!B,8Q7)$(0XAB$EHX@BB$P9:^Y.4:JIB)Q%C1"G?8
M@PG\80-WMA,@!JQ@!3=8@0N L(5(K*$2@#C"P2K1(-WMI&+:,(;G '"""]7
M,%?@@1<P@88KD"B-MH#>('"!/1A=)$;R:4][B%2C69E'/E%RWY+F9PQ@U*A,
M5M(1,*+T)!_EHA4T*=):C02K:W )5C%21_O*9Z.W8F-, S3,/^I1#P.ZB5'L
MP(<#+:C !+KI@@RL(&4S9<- &4I0ZDC'.4 (0M%VL">V"O]MI1"%*6Q [(L
M'*%K/=7!WK701J]5'_B2!-@?Q8@57 6&?&#D5IH@BE/:8 =CZW&('S!Q%&CH
MQ2B<MP4B<"$)U4K6(-+
[email protected]%>()@Y2H6MCB0@LB8PDN#()(K&BO
M!R:P@1WX0 K04$-YM-&*()3& RGX0A!<L"=X[$0^FZS$$2C)A358PA*XN$9:
MQN(-1T;(&&F9)3-*R11;,N4B'),8(C 18I0]8Y24($:%Q^(6NEREPC:#CUAN
M$I.+_6$&(ZC,!#R!A!70@ &\*0#3!DJ9"M0@G!2P3@52T,[) " !*8C;:2I3
MF=20( 4U:*?B&DH 'Y?@ YPY3)#_.6. J)$@-H>AS0&F%D[FV&TU&T@!#9*
MS ,4P =!P, "@$R "=#F PW@32^DH0A=@. "-H#&-ESA"N^T80BU,,1%9@QC
MO-!8)A&+$%,.\0]=A*,-76B#J-O@ @S<M 8XM4$-5"")-5Q"
[email protected]$I-^
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MMV >..(E;E4FUU!7;16$-L)"-G@^1-*#L-(&7)(+*(=R7F(,\-8F]V8GEG5
M\=! \H8G[B /$!0.>0)"@4):@Q(-'61QC ):I(6&-H2&ZF ,'80-%72&+502
MQE H?[(H,I1#5@*$TM:'[-$*K< J;O7_0^RQAHZ"0/N@#=TE",H"/9(P"H;@
M$,J2$#TW$(1@"82 %-0B7E[@!5SP VDP1ES@ V.4!!Y >/""D>"#=RU QW@
M 4BP R:0"_A0 UL #\;P!C=0 1Q0 3>@!!=@1G^0192 "2I5/89W#8NT$TS!
M@&D0(;C 4@VH2M> "Y7@?NAQ$Q9#,K(R%MV %2%V%3&!'CG12W@13,%D#F3A
M#8 P 9T13Z=A E@ "D@9R7P (<ACQ\P'M[G 2KP9270>ODX&>!$&@!& AYP
M3N249)TA&Y014#2@'!UR&)113]Z7',>G&<=A-PD !*^Q 5=V9"L 9-8Q90'5
M 360 IJA?*?'_QJ+DP+D VN@ QPH AAH A.H C0H APB(U]X1<U(2N8$S$S
M@0F'L),VV0;[]P5*4&H8\% &L $T 0,( 6WX :16 R:
[email protected]@KJ80PLY5P%
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M]L #I# H:C \!L '^ "LJ8*JB *LQ0S$S,A%:..5L$40D)BEA,QL=(*NV4C
M%E...',Y,?$7Y4 7*B43YMA+'8J.,U$).S "(Z 6/' "*]!0!4 !*4 ;M$$!
M'DD#*Y!/0I8 ^\@9R8$9'T !Q$>1OA<#>N "5U8!#+!F#$ #X31-@P-[QL$%
M3,8<Q=%,GD%[498W 449M+$:*@ )*^!/#. !0 ""Z V#:4:7)H<7-!/XP$
MJ^$T^4@ Y) +T8 ,KL $-:D(T1 -I-(OYS'_5C&!>&&A)"I%%1)6']L@!XH@
M.E\0!F&P!"L@ 1D0'C:P A@ $KE " WB8)A@"<VV(!$S'YA0"9A@"(1PEG^8
MED# UJ7!6CP!Y'@"2:",*PP"D>RG-H3*X2)([)"J'<5B'CU(XUY"T325U%R
M6(RI5TIU/]*F/^RC0^9C'EQR'KR*(S%BF3_2)(B@@JT0A?<V;\IU65M8FO)V
MKG*20.'@A0EDAP_TKG720?&Z)VEXAQ]$*!0'#@T4*)&E#Y)5;Q.T**22*GIX
M;NFV)#5A5ZX"B(@G(Z1P/>-@/>!3</J@#_90!&F0GJ0P+4Z4+%M "$D7"%R
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MP&@:M5&C8PZ<4G_'N!XRP4/S40PG5@F$ W[ *EMX 1?H!_ $ 3H=%.4NO\"
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M"(G@!!\ C>U B!@HTB =<5 LI;P8<6@11%R.R=8@@]F"6O 1*Q "(; SL0
M(1GQ!W^P",Y3(K4P@H8P_PJL< LOD@M>]4/(Z6Y$<@A04L&MTAZD0 IAM3[F
MIE?[TQZW<&#HHSTS>)B]Q<"M<"2M(B3ZLPK@ND BK&_UD _G&B<BK(7N("B?
MR4#WQE@J;">,,BBT):^9!2>. @[Q "KHD-;Z^A,YK)NXLINL>4.%<@YX:%N6
MS$.#926N8@R8H-3-QBHCAW)*O;_F4"AK",7ZH XRZT62 B5@(EHD 1;H'1)
M%\9=]&"9V$32DIXR:Q#3D11ET (F@ 0O8B[#!+(;X ,^0 ,^@ WU\ $:@ U_
M( JB\ PV,<@_ 0UN(&$QDPJBL RBD K))K?1*+<2$Q^"FK#_XDAIB[]G2S-B
M ?_*
[email protected]%UAD9 #?R 4+> %D4"2@"Y\F@ '4 #-D #)I!D $4""C!0=B:5
MRC%[3>.W#Q4"7L!/2&9G2UH"^&(8 N49 $X ,6#,),"WA5$ #D ^20;I&$!
M!*G@M&$ M5>F%> !2S9/LV<8%% $\ T!Q!0F;L!I->0(6 <8(,;FK$9UK%[
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M/?<KD )E4 O*\IZ-# 62!MFWB@MK, K8T%Y6'E_-YA!; 0; C% A7@ 2R
M6B* \ F1$ B$@#"U8 NV< N<CSV[FIG\PX1^#C[@,.B2&6U%S"1F!8.%F;]$
MK".6,#_W0PI,?3^6T,#(N;"4_B;ABF^6]9D(Q&]O,B=PHL()1-8/I"<P]$(6
MU^F.,O\GT$##Z&!QFJ59,'2;?V)"M/4IMC6$:N4C/RTK@TC ,9+32(P-*$<3
MHK(G\Y8/S)4$,B=X-I<%\FMUQF9L29 $A 0ARQ5$B1HT* TA-*0&A0(S0XO
M/Y @X;(E38H6/DA=RW7-G#%#:)#L\%$2S3]V^O9!@Y8NW<=BQ8Q1BEDLER%6
MN)81(Y:+53%<,8U=&XK-(S:CQ<P9]7CMVDN7+\UYB^G-Z56KN8H]6X;+6C$P
M&@@ 2,# 0 *T%)( N7&!0($"! B@/9O Q @*E1LB%L P%\"!@ 00+*"!H4#
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M1EJ17/)62V:T)1=FG$KGG5$%Q:>>>K !@HM!7.R%0%M&B220+- ) F*$K)D
M%%84(H0+0@A!HT)2MD"B#(K&38.'$S[X <RC,!D%D)*N0(*"3_#Y!X(#!,E4
M5JV42E+62J[!I9:@9/*I&&^,275(I,S1T2CTS"G&HZB@0N\K:YQ2JAA56;FF
M%F_,0<.OP1A@X "4$RB !BYJJ($WV2H(@82S#B"@#"!^*X$!N8J3CBP20/@@
MA11J@"T$&O^,OB U"B0X8848*I@N 1I.2$$%P<8R 3!SBJ ! Q(^* #R9J#
MJX02-B#A:AI2^$ YWLJZ#8 0:K#L,L!P>VLZ I+>@ '/5I,+K;Y)J,#FT7BK
M#AEHYE,$FFW6W"::5J!II96AD+3&&(=5]=4<]=S;$1O,]W%%$45<N" _%V@K
M(8A5SL$&$S08)# F5;*(I))1@!(%C362, 23)#"1I)(KB;"%E1:&*":2$$GT
MI$0?3(Q$E627CY&9CCH:ZOM;C#+F1AZ'E)(C6HVY!<A75U$REUN8E!]+^,%D
M4A)!X ?F&E)(D?\02"!"?JV0%2*0%#_Z66E)QC"3<O[1)G>H*8+_<')'/NRT
M)@JJ:4X;= <^ .4G=N!#'G>*QY_4H0U!N>E/Q K4HR E*'!H QW:^!.CX+$G
M?. #'C%$%#L2E2EXO..$F?)AJ,ZAC5:-CV'8(!)1DN3$]A")B>P;4C$4F(M<
M80-3H](4/O2A#SD@ 478DL0H:J&*6HPB$()(@T22T"UK*40-W@+$*+A0$"X@
MX0=<X (D)/*#$] "81P2JRPX8V'^& 1@)@ "K 1#QP<0 5L2!5YKL&*45C"
M$&D 0BN*88CNC8\53YSBD+QA'O1< V'FB0KH7.(4;UC#&MSH1CF6D@YC(,$L
M!K!&+H 0! X,AC<&,$L"#I "N"E!@H _P!<$E !2.SF !H(05Y*H(+=R 8N
MH?& "KIP@Z&))3 )\(T*KCD6L[!&.@D@@=U(8 &2_>4#4Y/+TSPP 94Y$W"G
M20)TT"(%
[email protected] @C<V*0P(NI( $'EA- J30E^D8@ 8?*$$,AN-,E1'@!X<A
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M1&$5JQ@LS8$+83S#&J1 @@D2\)<"8*8,;$A"$&B N&&BI2P)6($-@&#
[email protected]
MTY@?"(Q<DF:9T*!E PU6@4(]D)K!W<8 'OA!#= 6N,#@<YP)Z,(*TC;09LKE
M+'^QL@<8X,S*U.!J'MC-<'C<Y B\N&O+J4O;U$8!P%" K>1"P!44($-X!DT
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MB SJ:X &, ](Z<:2!K,0#0=&XT/2(*V:;(/2 #_U !/7",P&& /:, YS.
M:M(9GGD+ #@91 . P"!$K@ C\HH8J( &ZB!"EBHHJ$!\UN-;>*;+J"!#2@!
MYJ.,RW,F B":A9(:N.@9A@2 %C <#Z !QT F+N@"%> 9ES0HWJ" :$ &5XB&
M:) &>]@'>V"3, B",' %-<!&JUH# %$%4F"100"$-;"&JE(%0]BD-0"#-?A
M5: I<( 0.T("(#B$-" "3!C'J3($)/""- #0MB"6B@&0$ "3'"J8J@$ UH2
M32I+)+"V/T"#$CF"&>B /]!!$+D"SOR#$M'!'20$@U"%&8FO":,N]$&L+IPP
M4E"@[P$2\U&26VC-*\$ZK/^#A$18A?RQ$DB0K_ZQA'4KMW!C$DN E29D!5LH
MSOEQG\M9A590N#1)0PIZ.'E8$PEBN-2".#C\$^ND$Q#B$QL*%!/JN$.)(990
M1$5)N=U:SR("E1AZ1"12%748'T4Q154A#VQP3?8!I5'8B**@%4GP"2$<MF+@
M'AMI1)>XE'S(AWW !CTRA/(Z"*BJ!83@@A_8 FVCT(.[-ZP+A/E: XL0"8F(
M!$'@ C00%S0@@1G8 E&PA8FY-QXP@0*8@!D@@%BH!PF(@"!@ G9XC[T,JE5(
M!&/@ DLPF"=:"GC0(9<#KG9T"5.LF"$%@AJ8"X;<,7ID +RP@?O0&PK@@<1
MIL'_Z((?H$D=VSQD^H 5X($_H\C!L)EDH@&] SA&"<#T(\6* $:4)RQ$(O6
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M'D0"BT""#C !26"&B5E, S.!L9@ *3B')6 %PB"%+P<0O""H.HL2/B>=41'
M1DE0=$P\5=$&1E$#)5""$@@R8T(F9$*,#_@"92(!ALP,,Y4. O "HSD "A@_
M$E"!%4C4$L"-OSC=#9 : BB!F/_<&3D%M U(' H(R!1(&SW]#+](@#+H#&)B
M@ U0 1M(@1" "\ HCA3("Q(8*)]$"]E( 1L@@=AM*-:0#-/8 (,RF=--FLK-
M&\D8C:+Y ]X,3&C7H8,@7DXAFC8AR XDQ"X!UT( B=@"5R]!K\$!$I0RS6@
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M& 0V^J\-< D@)\0,P0)$0L ,($=2(<':( 7 9LY#!,,(0M4 -C.T5U3 <E
M1:[%C0I5B8H36A4AR05*J0=H^ (E^((-X O28( :J$<*T -(P L@J("7% WJ
M+0,],"<M52C5#<CQ+0#+4*@;& T** ,;> QF&HP%:( DX(T#_Y@ 'X!3$E"
M,^L+Z:@+-6. $J HPQCHZ@B^V6/)#9 ,N0@!BI2-;RH!#XB [F-4N7C4"J@
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MC;DA .(CRHXF 987K\8C0/X@)Q!&Q@
[email protected]@=&@&[OA 0EXR= X/AH @B2
M#+3@W0^P .7_8-3I( '3,)R_D#,+V"4GOX## 5[G,UX@< '%P%[, $B9W(#F
M<^=Q^AH:J "!NJCE354 6 )7@ +!B*<RL(=H4(3K8*ES <N\#5,$+8!<1!K
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M!T@ 'UC&LS,*5D "#9@ )B <3 &D[$!1)@BI$A$E+.45L)F$CO%KG\)^Y2Y
MS,;5+SA[((B V$ +TY6 &2> +] #&_@ >.[4#?" 'I/)8^I)P3B &+@!_5 !
MO>D9[4N<&@#\$M!'NG@+="J#1WT[Z8B #Z !/4B!72K?;K*,?A0<QI\:%0!)
M.E>. UB GHSZ,K" WTN<M^ ]. 6RSM\;Z/^SC'ER2=90F=G;"\_MF=U0'
M 5<( LSH<FP(AW!P!2= JE88E4-85B( DRHJ@!I!E&0:VNC:E5H]4D?I($9
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M@PBJDPXTG1ECSF[&X(+-*FT@TH8$%1AP0 ($ %" 2D:4$ -7=B@P $K@%#"
M"C7:P$,"6Q% 0(H'4# B$CS80,,'!!C$P ( &#EB#$"4 ,('#.Q80 (J_ZYX
M!1 D4. !"2240 ,)7.VG@0$\3E!&"25$N>.)5"ZP(@$,U)#"!Q\<P*:292JI
M1PH4%,# !1>DD (-*]# %?PA<!CBC70P,,'%12@9 &5&H0B"2N4T&4"!NWX
M*0 ?'%.$ E6:*,4]VX2S#QR*0!,-,-I XP8F2/P!R!](!$)),]40,P@EE"PC
M#"6&))%K%F D88H66QAB"6'(-+*(8G QH4HHA3S0Q*!5()$%C[XT"P@0_PQ
M0PY99"$$%ECL,,0,(W0@@@@HR)#"!B8\LL,'' Q1Q14F^'#%#C[\X8.Z7$3"
MBR3*=21)2;45DPLSM]26RS54K=03,"L)<M)*K/^Q1@HKN0##TBTBZ<1*4HBH
M))10I*S4DC'C7 -R*S*S5C'+4@EEB59<>24/6$2[0W1C>.%%--)OI>5.TN[
M0Q?5\-Q%5SR#V7488)2Q XXVX6CSM6272?;77V2#$UQP9A>6&6;80#,:W:]I
MQMMIO]D]'\:K99SQ2-BTHA)LL>7]FSKP6 U/8_;\<PX@@"37W""JU#)*)4EX
M@5Q2I*0WDB62X***)(-(!]$H@XQ""!>C;,'#B5DP<\UOQK R"A(F3%"I)ZLX
M ( -%>(-W(/%&[_9A EFYEEFIA53C$W&M-%%%T$H(,&/!QB00 (D4D"!#5\
M04,0*E1PP 8UV&!H"5O_H;A]]U5: (2C-.1HI HDQ)^C#8ZNR?V=?'2 "NBA
M"R78P*!H0 ,+4&!'*;! !1+ !6!3TUV,A$ (JB_*B5 #RNX0*3:9*1*E4D%
M8"(!D2KPO2XL< /W,X 'MI<B[B7AA%*:$O<J52(UD6 #-YQ2I3(8CFTL@8$4
M( $Z4K4-:1Q#$='8AF?BT I :,$0:RA&%BA1BV6D0A2J*,8?1!$Y6^'B#VM
M0A(J(8I<8*(5Q<#$&DIF"598PA"&0$,6#%&,0 !B!SD8 A*&H 4M7,%@?Q!"
M0X8@@QF(8 0B@-<,>&""#VB !P6(@0\V< ? .P*0T!81-2%1S0X9Q"BZ$@M
M_W#!C&(,I3:W6.5/6G,+VMUB*E3Y"3,HQIJEU$*7N:S%R5CSLU6L!B>L444M
MH6*)C5@B925)"4M.$I*@;<4K7X&:6LZB-.+$HVA\H=K1^+*7<3H&:E.SFM8B
MXQ=UN*,PPA';V*"A-K!=!FV \0O8V@::M6&F,IV!AC&(IQF NN8UNFE>0%MC
MFM9@[&\F(0K+;!.RC!TT'5I;RS[TD0LD<&<+D;B<*BRA"BYPP3J#N(4@2%&)
ME-2R&+5X:270P 7TD'(+JAA$) :1A-_%(!"FF8]N<I')$DD!&TDX@ 7:4!EC
M>$,W#X('@XR'H-$LAD'FT$PZ<O&:7!3#%ES0QBJ^H/^&+V#@ 23B7O<J0 /U
M?2$)FBQ3 ;27 O4YR@ *%/W9*B]%22A!C4@@8D($ (:5( !060 $%3P@4X9
MB0$6^$ 9_*H'&AB 0F@@ (/."D*5."N*JK46J%D :XPP 0)B,'[/& #-1V
M2D;:D0<&U04.D$ #K542 7B@ C5M8#\HDN ,89B$%' *MPG8G9X2H%@7>DJ'
M!O$ V**AB#;0@ASW<$<XAKB/:$ #H(?H33&T\(=44 (0N"B&*'!!"54 CVJ
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MQ:RM_WA051"$L)J."5WUJ@CZC3=PP0I <($<7V!#6TO @!C$0 4KL$'_7*
M#/*(!%( P@%B (D@C,\".S+ CPRP6,M&( @@,)0&/O6I2O%H?!U8T0$$M582
M6&!2>2J3"6Z00JX$EH2"->!C$85#N)I(1A98T?:V1((4J$ %!^!*""P5U_[)
MZ'Z,4E$"-% &+T&I1 MG4P(6Z"=/X9 &^#N-M(B#5VX8Q[VL <XH($;51@#
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M;M"1,2B"$B2""V $'0!G\ ;_=# 5C3 1P Z!0#QT ]8! #:B 71' ]PP)
M!5R6!M# #:Q #<Q IW0*E> <%X A%)R[D<QS$*]X2 #<S(!TR*B7@ #<3A
M]A "GW !93 G1" SZ&(B1R<!3B6"A 7%[R;NG%<7"E)IU# G- );HT0E7 /
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MP2C Y JF!"GL41)P!!^A003:H"'\EU=12>V-1C&D 1<L%F;I ?\4, MRL-\
MO(8YX,-;@@,^X(-4)4Y5)4B#8 @2#N%I3(P'T@(TA $MW 0I "S44"SN0@0
MV)4"P AF6E8<4D BL( + $&G,@1@8(7V$\#30 0]$\$H=6(4, 'H) >N( *
M&8 )U8 FI2+.<0\)*$&:4,!=)4 (> %I$"5D(@!?4 )^(DEYB$!^ C]E,!?
MQ6$"J-9C,9".Q(G/K4@9T #+V1P!> !T$@ -I,D%3- ,Q<^( $%GK2):54H)
MM,$\9)<[1(,VK$8QI$(J?-$7/8^X <(HB$($(D$Y6,-SV)$D.(\A8$,Q5((A
MF-HRB)<?.$<>H $A^8$Z:H$G>(*Z#$'_%AQ!%FC!(OW1#,2 ._K (&@5(J@!
M/D9 !)P OSA QT +?( %6,";Z$@**,E^[$<>5$$.+ )#- 2!94'DY)TD>$(O
M\%=$AF N_1YKU 8SV$)/L (K--](> Y)B"12B$3%U$8K6(4:D (DJ )2, 4'
M#@*O26;%1(47/*0DH$'*[)KMO 3TE=DW04WV>9FFJD73:-,WN84\>)_6#,9A
M@--;A-G3?%]BX!.B@<UFR,K< !I68<9E6(:KBL9 =25F!!3^G<:.!95N!!55
M,!GMU,XL15IK$),Y+ [5R,,].& KH($D6,2IJ0(K! (K1 (&<L1+R,P<C<(M
M8 (00(SIR!T@8 (-I)3_)!@"%_@ 6P!(6@5<+BH)>3. 3A "K3""?B@,>RJ
MWB"(K B89=A3XD@(AGA#:<R'@M0'-C25K[("(1A#$B@ I72/99$ ).A!$-P
M8Z6(99$( S! &70!$)3L!BR)_C"<77G!&N:0 81 "M3(?X[6D@!<7RE68!E)
M+G*0%[2 FN3(5E! 0L ) ?C @8K(BN@0 Z3)EVR IZ@( 5B HVQ (NH(P[U6
M"/")"K@0I:2(I1CH;I5 ?)*A974/ 8 +00!$%66#P!#."@",("#,1@")ECK
M\Q2#*N3M[>1M)( !$L3H)0#!#X"HM;("41""(:R= ;*7-_X!&.R > T!KEQ!
M_P[ 0A4,P1#P C=HP0SXP!#D S 0+QH@ P8 2BDPSL(S@\HD F8@)1.Z0><
[email protected]^ #^:2)*XSU;8P15T4D/D@7AE07)XGB28&B"(H%]R!"Y03 ".A"M]!$<@
M!2M<F2VXDBR9!//1!E((IE2 AY&=),N0@B3041JD 2%\(':0C,5T%?A.DY@,
MS:5^1=(0!_Q6GZ5JGUZD13C0Q3T-!D_&Q=.HV9U%!E1>1G?)C6;0:F54AMG@
MZJUFQMSDW]WT:MST1-Y0\([A!DOLAFW4AE 48*8!AW!H$S[HPUBH 1+4VB
M@B#\%\E<A"2D5/(Q[TI"9.A) GFD,"8PA^D0 @], /\)H %/!%2BJ8$7<$%!
M3, U8 (,?8&F508\M (1F )F,!6M (T$"%I/,AH*,AFED;M](1J*,'O>!;W
M,, !A( &0,(7!$$01,!X)@ )[-P!0&D%*$%S^E4EOF<. 8 *U("Z,4 %T*>C
M3-".<,_);<]:K8 *B)P.$>CV% )W, )3"?148JGI, /E("(<%8%5(#4S@G0
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M GI% AJLP2!D 9V*>'_QA#?8K6T\HSB+UWQAGA_\014(
[email protected]\ 5R "/
M#YX,B$ .Q+/I19TQ' (0P*Y M^X)D /"#0/5'G)!H$2J($:/(!9=8"))$"2
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MCI $ !0B<1 $&! E*"(I;!B^GC!?O>)DOCP@7Y ;VU%B>A0IZ@ "WV !U3
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M@0()6D%8?S!@@ #LV D(4%@-I(2!!!0^J @"@@*# @ ,/C@NDR7%2<B (A-
M_'6" [J!V*#AVGF""KH+P)X0A,.&! D,'!A/084*&BE2)'!>&S8%&C1*?#A
M '\! A-"%
[email protected]/K! ..>&<^XU"FS 0 $*+/A@A1H."X*6,%Q1Q!5H%,%0
MD3#@4 2.,,+8$ XU?N BDBP 06.-+0#_&6000I! @TD (D$ETA$&:4858K!
M9115FF*%E4I44>6//SQ9Y@\MA@#DBBSR\"./*F08(@<D?!B"2R%DD &&*Z*,
MQ*9#N/"!!QZ ^,&'%GSX0<TD6FB!!QJ "*))-0@Y(U$*H(F&FB@<"&"#C8@
MSCD 9L@AAQD<E6)++J\X HDHD<A"14^2\$296I@A11)+6!E%D!AO88805G(A
M):LT"!G%*EMLJ<H2ET@9911;<"7E%I=Z98:97&RQA%=0<Q&5%%MNN<667$;)
MI5=25O%"*U"(M2004OY!%(!_[+$'**#<&=>=>GX:]Z=Z!!JW'G?D<9=<<MEA
MUR=S@TH77WGF_P$JGGD'&D@==N 9B"!VP%''H+?>0B@B;1;3:+'%)EHH(VS.
M<2LDD]PJR9C+.O)(I&M,,L:2DUQ"*::.B\$I98\.KF=@H((:=PLT!L%E*5R*
M8::84;@@))!(1F&%%$0P,08KK;I*@Y0T1H$Q$%5&22.-%A;PX):1X#*&%4)X
MT*" #JXI @ /DD"(N#2*R, &)X)0@A9([C$&,G@<4P?OR3;F&)YZ7 GB"1 >
MU,T#!H)+( (*4 -"B2!P8^"U! T?KXL@;" A!1L"M(XX @K8;04/2#" CUP
MJ^$^_#Q0(3?S#B !B!I*8*!SVF#SCX ::! /<Q)(B#"] SHGP(,$:O\@CX 2
MDE !A CP(P $BB(P7,&%-#=]PJ$)^[SR ^P 00, F2M#5HNY'#$#J'QT$,X
M0A21"1R":&'&&5<$8PL:">&"B!U4M*08Q; &+G"1BZ94(A*J ,0?="8*0!Q!
M"W\00@S^D ,M.&D(8AJ""$00@QW,8 =#F($(.G"%/\@$&X0@0II,L ,>^*!^
M+_R!%]*4)B $00UJ2 (B5K(20#FL(H=HP0<2T(+.40 *)""HQ;UP2'X8$L^
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M-\I41F%[@PD[]N$*.#3. A%@P&X.P("24J $*C %;1!2" P*0"98#A2, %
M&U1H/1M801=J@)L%_P @!1VH 5$,U(#U 2L?.!@6(0 @/HY7"FHT$$%!"Y
M\>@F 06@P0U(H#L>%*\!7:#!!38 O01\X'.[&0\#N% #]?Q4H2@8ZP/&0X 8
MZ($$)5@!;;HC'=ZL0 FX"<(7-E38#;G"%?';4"LZA*$/C:@-3V""B+A0!C1H
MP1!(V,&EMK &2P"!"("H!": 4)-BB (7X=3"*"*1)"* (1(7_$,GL%"%)FD0
M2R@8@@DT$ (FZF (BUA%258Q""28P ([,($)>&""&<%02SZX4YZ2P 4U]*D5
M%8F&-J*QC8%HHQ)N2((&8F.""CAG LZA@Q >-0,N22&$4[P"$OZPB)H!0O\9
MHD!#)"2A"DE4 E=KS 4KB$6JJHQ"*[N2E1QOT4Z7%(-9RXJ)2RPA"4/>JHOO
M#)4DJ"(K4/&1%%XA5BTDT950*9(X_XC7MRH)+W:YJUWN" >[U 7)<L7#DN\:
M%[C I6-Y8')<\VJED%<Y+VT0Y" 'P]LJWX&PA-BR(6Z1",9:L9)CL@1D([L,
M3"X##%)TC"6L, 8TP2RME>!$9"CI2#+AHHYZL,.2VM2',9(PB%KH"D@X&Q4:
MOC((0:#!$L5LB:V\ *0D5*(6O8A$+1"<!!X<X !2)@A+Y.2! J3@&D$ @ 6^
MH(U6)" &&')!&: AC4080QZYP$?>\*:.M\!ERNG_ -D^60&-?6PC$6%@ VXB
MD("1CO2DV],#:R*@F]2HP 9!T(,>4J""XD5.<]6Q #, YK93(X6+JC!"FBG
MGQ180 +1B5X25J ] W1/.@>P B"\(&AZJ< %#" ![:M O> 9@+/&T\"2 )
M#)3@ O?V=0'$HQ\-=*$$)9"W 1CPH!6L A=Z$+ZSN<^16AH1"(RK(@XWB$1
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M84@N->*PCV1LFLB?YL=@\K$U8T:9.KG,3+A,?6/<HB1;9@P\;A\4>^C#'6E
M RMP(36D/,L2AAA$-UG!!:NTI&/7: 4A<&&)0H(Q$*%: Q>2<-XRH,27/H(0
MX,0##H 9Y. !"J &%($=@.$<YN$?3H 2 )@ :Y(%NX$')($,R%&9K1J85
MM/^AHQ2!%MH "!J 7J- (RJ/.Y#!9[ !2Z@ 51@!?3 !H!@=* '-!*@< [
M R#!I6C@,V)
[email protected]!:I#=\@C.NYC/.)-#VK I!)@ T2G-&YP 5;*0/9M
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MHO@H@B*""6-@$AA&1F-L,F1:H61>0B8PHR9JXC)ZTF.:*2; 1[P1EU:3Q]:
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M/L2PQJ#C,BX,@H#COD )0(X/<4 !MH 5T L1.6,B@00D" 2D" /%D$9($BV
MVLX.F"0'SD 6>*$*<J *K$0&;'$"1 "$LJ 8X*)(>( #E.L$3& 6;S%-?H!#
M@8 0@/^ !]2 "[Z #0AA)0(%4/Y$)%AA"?)D4)+@!FZH!M)$ 9R# DR 6PA
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M(ZT49P-2 !& 8 ,,YWDH0'<$)#B[(S;,(P& 8 54( 7T S1"P *JZCX !)L
MH 0*ASQF*@(\('PF! A&Y$+ TPX-R^)(I#PY#N2"@ F^( R<8$3(01I<X02V
M@&IR(0V2KBN+H1*/8 BT8!$B(0^RP!8GY0J, LP* >TEKUD 5@($PP90U8
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M@O(L4:*:ADP?\L%;,"%UKV$?]9$=P2@^BPEE5B552('$O L1B$0T" )W. $
M'" &(@9\+?^#$$Z -@;!'%P .BR6@^B]^#A'%J-A5G84A'F8-+2&"3B+(V!
M'/YA'Q1A7=L@ C[G ':J"]:3L!2!'! +&<+ !O2@<6[ =AC.7V?J /3@"^Z$
M-C]G ^Q#[:+'!E'GW'9#<>;#K9#(0$8JJ[@@=F@ B?*#X2C3 &!G!6C SRG
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MA0>28!2R -# B 1" T60Y?@ A-<PP!^_^ :7.$^?B ?< ]O"'5[\WK) N8H
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M&G\T@U($4[(@%#$%#<@B$I+@!] H*GF57BWD$*E52K!$'X9\2K,=[VB5"1!
M#\*TQ)RF%YBA%KB PRK851#/S]BI=P-!HKF "Q RHY>7,75L7"8I7$+Z7BSI
M]5ZO]#P:S>4E'! B)%%8I6O:( B"?(M, P\S454R(2!BRBJB)=<W8C:5^9:O
M?6$"S-I79'*AF+9L)HH!J6.")'0)(]A!'O3A'XS!"YP&M7"!T<@/5U:%G21A
MRWZ:%::256PF#8I$%7*!"]IX(_!&(DA+ QR +( &TCX K0!'XX2;Y[_^LTT
MJ20+(F^^EP,'\]6T@26@ 5PN) A*X#""F!9L@ DP!+%T 1FD01H:>3W7,PCJ
MF-\@H0 I8*B 8(I=8#JSB@L-)PR4 .*"X&-%9XMG!S\6CC*S"G;F0WBZ8P,(
MA'3&HP.X@'6VHZ\XVT$.XP-88#O[$+%JU@Y#1#PK7A&XVT.P>Q )BV;!?>(G
MOH@GO@W,V@<V=W/_0+\ @4LRL0HRZ @:90>NP$MR@+VN V,^AKX#T2AKH;R
M1TTXE =^@ B F RZDA" T1CD(+N$SR&@X T.X1"6'L.+_H;L9$:_4A)R
MJ+K2X N^-$]:X'-X0,452@8@5PJ\Y)L=]T?+_UD*- B*8&ASS1H-^$P0(B$0
MNLE5:E<22,SQB(94# E&,B_4)1KQ"$$27B00/@%X6<4+/J$6G$806"7SQ%Q&
MJ(9&Q$_,Q9S,R_R2RB7TYD'T0YKT/GHA23^D,:E=(-+UXR5>6@E["6)<$&;(
MCNS(6HE\#8;W:>DB)+6?&C4C*F(B,KW1E9KYD#\EP,S1B=HEX,^9!BT75J9E
M!CO)CBP>]$&;F'(01*$6:D%(<H5(ND;Q*[]3@3+E*F%4[ ]7GH4+(F #@.'6
MX:(5DL '#J ? ;$('A $+/*G?LV(%3QZY>PGKJU,%K" X<-G7IM(%+5S'=
MQ8L5H4%K56]?.%<U@/\$Z=*&UC\X3%PITK7-E8L+2NQ)>Q(FC)(;$@@D2. !
MDHT:%"CX_-*%1@0#!WX:,$"!!A E78*4V,#40((00&[4J/$! $* +02:'K
M ) :*RP4\&F 08D$3=_JH4'#0E,&##ZL6''#1A!:.5TJ.HPX\6$XC.$H5I13
M$9/(D,,L?NEJ9#17G#E#.[;98[ACB9#(R'$%T! DO*Y$^@/HR!4M?V;D&#)C
M!.X1(ZZHRG7-F"4N2'SP.([\>)(M7( 0X9(DNI<D7@@=:H5=&S1VT(QY-]:]
M%10O;M004K.$D!(@0#!A(N(%R)(U@[AP\>+%/)=#T-D[2&!" 0!H8 (XC_
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M4. &FX(H$!-B@A*#CL- 0///;P6A!$\EZ$3:$:5421-MY!LX\]B:R0!%5A
MN+./-"^X4L0!#!R0E@I)D!--3E\L$80#6BE00@$_%<!Q$DDUH#!?&ZP0A TT
M4""@6%JEE8 "-[@ @T%<OR3 FDQ )02>&E 0 %/&4" 5D"7 <0*$410P@I
MV&##5(D<ED@8N;@4#6*M*-*&8X>% <<86B>6=4Y,3 9U9\@@(\TQQ[@"C2O1
MM.T*:&]#<\00.PPQQ!%(_('$"6?\$HD6>.<P814B3'C%#$BD84PNAO# Q1;%
MM=#"<97SD 3DDO !'1)</]!B"&8'())*^!I^MUWV)%^""*)H$=(=-$1X802
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M+$)L "0F A$L-$*0O!@ Q38@3'4 5C&M,W<+.J'"UKG@MRB(YK(A%#@D-
M>_QC%3: 3#3F9(]];",,.#C !;J@$\*$ QE1"\,7PG "H7$,9R%( '*\ 4;
M7$ %35,!#4IF Q400"Q!TPI=FM(%%@2A!B!X2P%"D (&$$]A!U@+#5)@E*"E
M16$42,!45E "IBGA"VTXC$O:Z4YH/$817^O:9,3&A,KDA#**B)O:CH$,M?6S
M,VP#C31:80@?["!#%\H"WM P!"/(1@A9N((,KF $Y5DT_PN@\\XAU( $V7$!
M<S_@'.>20 3922<):KA.*Q+A'8MDY%2L, 04WG"(CZI!#4E8 A#0PX:=?O0\
M\JM.(C^ZBE58PABQ4P,1Y+. Q@/ "%80 )^T+P&+<]!,Y#!#!P4 NA=8:QC
MQ1 2*MHA\45"&;U((!H&@00F3><3S"!2CD;1BR>=Z#Y :%&29"2(+2"01(/X
MT9*X,"/AD4(2@PB$)$ZTBOAPH0M2VL($KU3!>HB02V(24P?K!$)W='"T<7*'
M"><4IC>1"4QK @>?MB1#AM1P4(<*AVM[B(X=<JM0D@(B&1-5*$QYY(?@.,>E
MC%&H>GV1B98R8BXH98E0I:YQK/^Z!C96U0I,O*$5M>KN-;ZKJE$QL2)AVL<_
M6O$#-$@B1 A,9!^Y^"Q2(!**U_5C_UB!ACB^<11 ( 'D/O;[B0B$1[H0 )6
M 8X''& %B;"'04X51HVHBQWM2M<.(0+&AI!1&^'8QSP(]H]]X$E,^52$$OY!
MCFU(XX;26 )A",,!IE!@+PF8<0AHX022=:$&'L!9#;K0M'"5Y6<+4Q@)@A"8
M&FR@9PD@00(B8(&G ( "WJS ,QG& O\13 W(,Q $[//?EH&,6-6A!/ ?$_(
MY',594;&0#FS-K6%QB7#=8<VU,"#&9@@!U7PA!8T]- CY. (59A!5V4P!!F(
M0 0^* ;_,]+1BB1D 0D\. $/&NC )/S .<XIJ8ZBHP9$8 <<S=)&NYH%#^^X
MP1AN<,/H>&"=EO:4$#Y5 QN2\+O?62<)A"@=!+U@GYS:QPN86 )+(U )(0K
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MC8$=1<RC3&'Z!PYL<(]MO.2&X=@&,@9C9B4\0 $+JS$%5 $%WR!%B[0BS@+
MH $? !D($KC2SYPY8P5(<RTU\"4!"$ "$ORL !, ,@WXDN6DV> &00"\90Q3
MYJU9)OIC-@P]X>"2,# !)V&X6C_?[ I=Z.(8NN#,9A31MFV4?QL?08()9K"#
M+'AB!TC0@OV1<(0?^�([B-%H0P O_Q1PJ-XT<T@ 1@$%=$P#D-%!U4\E1*
ML!SEP3K7@2DY=Q'7@!T9.#J8@ @NP%*T=AZDXW6&D 1LP :CTPK2XAZ'\ -*
M0 C,D 8[T M)< )@<!Y<\ .MD NYY ) ,P,:L .$X%"VD2#18X37=FU2 &U*
MN&T^4!S<5@9;D 7DHSZ591^$$%>V("+,, KW<R)I@ 9^]2ND F&$ B6\",&
MQ 7EYB)?>"*+PP590$ G FPM4@95\G"9E4(;Q'$;UUF>!2>D=4'O$D,8%(@$
MH5FF-2>P=2@@IW.!8G*&-RAYPG(1\4GPX',79G.[E2N6F&&7E%R7%$;8\ [W
MHG9)QRJKHHK_UK5VP($-YB!UHG(OBF)&[" E7& (@U CN% )ML *Q? LN0 _
MS?)=EY0+N, ,MM _MV!VE7 $!/ #Q@5$X0 %EL ##V "$P ,<L 4(& ,^2!$
M8U1XB'@H@@(/AO<0061S^N(1QM!9'88V./ "GE=^TA!0TJ +^Z0$%W 'O !
M?K$"71!-&( EXO03. ,$7: '05 !*C-.#% 43?8%)0,$"E 6;_$4:%$ 70 $
M-/ !Z2082N $S\<VB/$U6Z,U809FB\$UD5%]G$$.:[,9R$!0!)5BG*$-NX,$
M ;@#]'<$@?,'=:,\.L!G53 ABK8:M>!2L9,YG58&<74<[ $$F_8<_Y_C'I@0
M:FR0"![!'5X$>;G@'H9@"(1P'[S&E!\(06>7"SGU48=@"8G@*K_C'(2 4#^P
M [6 'FI@;\!S'A; 6X0+BV0 !H AG'8547((%( /=0F CTY SZP" MU-T^X
M!640A5O '' 85[[B(F'G;NY6/@I$'%Z ! GG(I$3.4A0;O:1!"YB(J0)!''U
MF5?X;D]969<%<9Q5#_D@<6+2)6\B#_E@#Q@W6G^()A4G6G 2#RLT<GR2)Q\G
M0P7!0C 4*)(HG>Q #H.B*&2T83O'+1316XQ2$<HU<Y>2=.=Y=92BGE)D*M\!
M'*SBGMU5==8E8:161F*"#7$U1UDP"J/ #/^#H%_R8PEI]T1B!(NU8G9TE NK
M0 HD^!_C4!&$$@V1!@0I$ ,^$ \N< -\ 4'D6$($2B)Z [G""^\4IWJ @_B
M."_L" WA4$&J)!*0$1/VB#;;X'E8XPKK$9!;1A5!\ )A 0 ^LS(',&,>4!5K
M 30$P @D %:$9$"R1XEH ^@18U5@$6D @VL +G\@5B]GV/<9+T!!EDYAB.
M$09C$ 1/L#6* 6=RLQG1H#9Q$S<M"@WL]P:8XP,^@#>J<01' A_@#?V=P:'
M(P1FD ,!^ >5 (R@PP,[\%0\\*B:]CFR0P2& &RX1CJN WG:X [=80QAY!T9
MF%VM< @L!:G3$1W_G>,%B<!K\F,>O&8>I,"!6.1';\!KAI &)+@X[.$^P)8&
MJT $'' "1! @V6@"8)@^2*"81KB82(AM=\,]=J.GTRH^EXF9#?=8EN!N84<*
MD7,B\L8DD=,B7XB:S)$&<64?KGF+Z$JN4-(<D9,^7(";_V GONF;<;)QIK4K
MR=E!]OJ;: (G7<(.J;19!2%#KS6BAR<H(,H.HX6(U>ERC,@.@!(HG#ATO+6)
MR<5$S(4JW;&>YPF?TU6@H:**C4,IVR4KQ8"@WT6?ZB!&A<(.^* /^( )7% _
M71@ZHY BQC(*O@AUK*@14K>@QI($JW -3F55>E O"-$0QE"J&O !%& ,_TOP
M !10 ]! $$"T$)JU65P[HEEK$)NB8>J #[^E#D,D&G^H8ML0#M*08C;*>3$1
M!LWG9:QD T"&9 <0I!EYD!#)?$D0!!$P9 !!B ? !P *# -!: ,T]& 7Y!
M'7>K!"3I3ITA3XIAIM_'&)"1"#B03SG!$M.G"%<3-^.W&7$3#7":NN:W#='
M?L:@:3V9-SF@!5F@-UJ0/;=Q!((345F0!XSP9\UB"6"P!DG@ K'90#]@:21%
M'2&E!F" !FO@4MBQ+]IQ#ND #8D !<5@#(F012Q%.KW&4M'Q!=.1'H9P'5X@
M.H=0!$&P!.AK"=>P"K\C/TUIEH:@!&H @;SV.?^91@@T< C$Z@ FD "+$PB
M4&X^\%5;)0-<Y:S6 \';ICT84@9H$(7I0SZ"H R/!9II$ @")W#G>IK,H0?C
MBC]RU2([HB1MN#B!E4#7JFEQA00.1T$49P_"Z0Z\Z4&#* \<]R5A<L/"Z25=
M L3"*<1C,@_Z$ ^;U2=@(G*#\B<L=$/H4)U:]\0F5T836XF>>! %470+:W=(
MU"F5DCKF";)/=XJ3,HI0M$4+BD5I%QRN*'7GZ;+WH _Z ]K. C'P@S?Q0I>
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MJQS !O0J0IF ^2 QQ(F<:GEM9K5+F!RCCNG80^1$1P+'OJ@MG-R6OM WO]@
MHZD;IYVA"XIP2[Q< T-6 !X !!T0%Q5 5RP$S=P O^_%P)%QA?EY 5(1C(E
M0PM=VD_K[1()7LU?ZJ65,:;[-!EP\)+H9WZX_$_GG+KD@+7ND B(H&EQF 5\
M8W\A3L]88 1#( 1&$"%"4 52< 2X$"N"8 C0@01$@ 1 X ,+A\ UKE+X 3P5
M[;10! ]#A"J0=QT?58(\M00\51T0B*I D"-&Q05JL()<4#IJ0(!>1QW8D09>
M8&PBA5+.01V@%E2K$ 2)8!P:T (AT L%'
[email protected]<"**0+8AH1#P(1*W3T6
MXD#>4VYGC0:@0#[,P1P ]*WD>H=369C$@01J7=:9^22+<X?JPQQ<<(>7YD!2
M,J^#*'$2UZ\\;)R31W'YT"__\S#$A,@.\Q /-Y00@.*UB_C$@-)R(U>Q8&NP
MA%(H+A<.%&MX&9M<ZM)$E^*QS55$GIHJ4.2>5$<I2V?:SV4,P+ JS(B@JL*R
M5N2*35?(AF37^F ,]A$(:P $*6*TN0U>K&"T7Z3&H;)4JQ DQL */% 'V#<
M#6%GK&8"$7 G]J#)+ *FQP1%.MQG3S*UEV.&'$O%'%TX^FIPOF'HD3>-M$U
MG;$VR$ .X: +CL$V2C"YM0,"!J Q!N !&B R%. !+^ "6LH7(4 !?&$!%T "
M-@ )P<3+ X7-7QHWB,$9TL 9A[%]+CE]W[Q/8<89:!.GJXO.<7,V%=^ZVI!0
M#K2&_VA "7GC!R%^!"(@ U6P($( R(PN]S "CI8"5S@ B?@ IM6 U1B' )M
M'S;N.6H@@1D('F&D#I:"O:8#C)60"(?P!EZ.'DD@'TK !BZHT5X 'VX0'<8P
MEK":!*)C=E1^'['#ES/.!0J-4C\0.T^>!+9P'DLP8(> QS0"#S@ !^ LP@
MSVNDLX,@.5\5(7A^U"H>;1=*5MNFA-A3(3Y@(95))9?YP@NT([-IKC] '"YP
M X/.0&7 Y;Y;CAH'PR'F>[6Z)7>)$A@@//*FU[B)0"+U\/Y86W=62!GZAE4
M6G@B<@ O6D,<<D[<R2(J*']2V#6DV#F4+I4X*#KW#KG2$/^0(G@;>YX @0V;
M,6/:!!Y$>-#80(+&K@EL./#:PHD-K^7"^/"A0FSJU,$#!V_?/G>$N(RJ-4H5
M1EO,KC'+F!&A.84329'"V,I$@E;0TJEC%Q0:&R ;%O@8)^? 3WNX@%E!\]=
M/7?VZL6KES4KO*#L/L+[ZLZK1W7IM/U,ATT;-'MMW>[3Y6J,(E>*=$F3MDT:
M,A<5:"'3A2R:HC!?E"CIHH! @HK@'PP<(" 5I*@EPP0&'#AQ4V/-OXDDN1
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MG<D+BEK3#^ $"2X<PDQR4M'PR*0',7%A3'HHDXK,E(8?^ -@SJ4FI!@IA_$
MJ0R1FM0_K,(J>62*4ZRJBCS:8JE\C.K_4Y\R5:A"-958Q<I7FJHAKB;6*ZS4
M,!ZQPH<^XH&L856Q5^R@5CB21:UC2<L@Q4I+LY[%GV()!!WO>*)_!+(Z;WEK
M7-PZ2%G&-9%O880@ (+(1BPBD'1<"QK:T(<]],$P4N#B(JJPA2UR80E6%&QA
M!5N(P+#1"C9@(A>DN(7!/N"79K&C'M"0@XV 4 $&,& 5<5" <*@#7M(*RW4
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MX<M1<1WD)P*IRC[T<0@D#*(E"FLD(7)AC8K8$8X#8:E#<H&)) P6YY2=;
M08@31. :( &!P@ !&RT,BT/(4@NSI*.C6@C9;CM%;!V.:QHI8Z5Q+29+H+@
M,U< 1@$,"$(B%#&WO,S-';I00-6^$(8@.,";3].,!U*P EJ$ 0A=4!HTD-%.
MU-SS-3J+I\X4 8?8,*'+3=;Q:=KF"FB89C=>8]N9I?^1PWA< Z_)&T4Q*N%5
M0U#"#\_Q0T6G(X01^'4+R5LP@Q?DN83*:=! D 0K7!0]2R;87<KZB3:,@5-C
ML((5AD #(5:1!D$(0D*B(\4J$$&B3&KU=UP8D*9[1X@'X945"M+J(6!R"#4
M 0BJ,(0AO &%H$!0X)(@U1)9#L7M AS#R)$B( 0.RYTV*T%\,%=#Y4%- B
M$%SP 0-]L(-KA(!^5!J!_?IWV!$8D$L'],$B%H'N+/R !J%-SV-5U#G-INC/
M(1PA:4O[6#:-B4\-1 (0P/0H/4!J4I2R!Q(U94--Y794/>SA,-NB0^!:RN).
M+.X3C:A;5Q67';&ZRA-7AI7_*5ZQN6*1"G3%0BTKD@4<Z$B66JR+C?!&*UK=
M)2\<W2B0U F$/]UBR+?"M1%V*>2]RU*+)^OQ#X.F 1?86$4B68$)-%S$D7?$
M!GL5 LE<M (3D$D#5*("#F,@@@<? )(VX& !D B'/O@S]4A<JR/J$,KML0[
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MN =CT( =< 30A1 H#9$&01#,9,KL!_!&JP1"+<8B($A,($9D!\IR!)V(R N
M^0$>6* R:*UZ>Q,U:2$T*1Z16B'JL9!%891%::%%>:P=W,'-P2R#BZ%-2;C:
M0B+=2A6KJ)D>(A5[R(= TL*+TXJL,)5:N@JGP)4BDI6K@!62<XI=J964BZ[F
MTH:^ R;L HIH619DL2XN.H=9ZJ-HH3F9H[ESZ"Z:6PMEH?\Y[0JC;X$(/$*(
MC9 9FB Z@3"'M.BC9'&'+]0'8^""0; )2Z@$2\ $'4F7]QJ8A[B6$'ND5> !
M U !E@L*>-"&5A@E#Z -<@P %@!:' *LON69V&'?=B*>A@93T*5Z>H*>*@'
MKG"'/-1#5)$XN$" (F \O B'DND9--.%NY &+R.,%6 $N"!S%,!&K !(*@:
M6O@"8U"\;1R#=*H+G6D-U5N],%"",. R?52$,G.;M=&--*N;GL$M;?$"(C@1
M0R@$5BB&8E@%2]B!68B$,X@.+=B!':".(6 .3)@DJ2J3JD(/S/D![+&0YR$?
M^["/8 R'U&FC@H&&1.B0K)JP'$G_-BXPD.2 *@'LNK)#!)9*!)S*/TP0'T'S
M JVRQ32@#U:KJBQ #NQI$5/
[email protected]#$PO9@B18@Z<"A7,PA XH P((
MA"-)$O8)A$% Q^XMD,Y A&0 2D9MQ@8K,.: </:D@$BH"VY C2X@O0 +4')
MK#-1% :Z(--*D14:%--*@\$<S#7)MA0A(/50$1[@ 032@T6!+4H)+H6[PBQT
M"R[\S+: .-'TPC DS=+,E!JJ(:U0PU[Q%;Q[HETQF2="0[&PPW" .3M<1NR2
M14&4ED7L+CW4PVLA3D5<(X3(N=5I%TE*"$JD(VYY"*W[%G8()'U@A4A0F'T9
MAV)XI$<R_P?3L:_F; A",($-H(5BF0I\8 <!^8 /8 /T(8G &H(7;.A99
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M;6@ "@!:"B9680'<]6*&7H5_D3&YM+_"F9$F;'@#W#0(7G9AVTH/=O3#;J@
MT)X1VKGQF=%0@A(H@PY=@1I8 1JH 460!GMH5G?(1E0)!Z]IC=3(,M?0,M*0
M1S/#BPEU&Z^)T&V(!GLXAE60$Z%\0$.8*0\AF"U8@S]X/AU( *8@,\"'&:
M.A Y0B[8'"X @QTH-*_R@C18 T:R/U9P1&Q F;- "(["*2Y(A%5(U)TZ*_)A
M!5*,D)_,A1^-I%%( J_#",@!/_+!!"+ !"#@OQ\X7$Y+G@K4M=I)5-<1'0EA
MI+!B$1\@A!-"W"P8A"R(!!!9@PI$D4# A2PP! #H@"SPA%HH$C^)!+KR/30
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ML$M$%Q_&NLB%(YR5AP<VADI0)&; !7- %XQ8& QKX,@+WN%"%;@ 0;0@Y!P
MS8GQ'@N( I@!EUX %X<*"U2BUO)E%U!8.824'P(4'1]1H^H6;*H)9TEID^A
MVJ'M,3_&4:G% 1"P 3U(A/,L%DE3"T F+JI=/&D8@S'P,BQC CBHBV,(C-SP
MFFB(B[<QVTUNT)X9_PK;,8DDV )+P@96X"A2! 1F\+4CR(%8CN4_J 1<*(9K
MJ"E8V[[SL-+*:9$D )'-]9"6V@^YIM@YQ8A,N#0. 0)+0 ,&PX0WL(^;FJD)
M\SH SP7\4R1+J" X!4J$N0:< .<.:4A#$!1#@"KQ.01$8*23K$!"<(,T0 [Q
M*+0_19&Y8E+F$ 5/\)/D&016J(1( (0C\($9(( <KZO/ H0M (+IK3;$W $5
M 81%V%ZW=!(5C &[K (CN (ID)_P)2 K]X$R0*!L$R$T6:')(A-:S4')=!1%
M48'!_%\V29&57A,T&,P22@\?8%8D,FUMI5:E?F!!DKAK=6!!*LULG:$,YO_6
M)*H5W%+#)J*5VD1TY.H5W;S/ZS)K<- 'D!A.9O%#XKS79:&60(QKG[L6Z93B
M:R [$A,(C3 7]7)L=<"'!V8',+@7-[6_A;$%#SF7HF.ONWX(3" !#R@(NVLN
M CD!#F 'XC/5 HHL: YNZNA-6X+W"I&3S)#_XR*E'$6+'HQP0,5/^[C;%1J
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MY<9-B/X8"&AH!1_H@#3@__AFG(I6B(,D( $*H #]0 :(IFO:Y8D>KT'WWF
M O:5<8>1L:45=CEJ<8=I)*AL'-H&#CQ3V0: , 8N'39LVL"!TP8-&S1HKES9
MBV@OW#YING HRAAMHS1IT5P="WDL6D>/&[>YVVB,$!(B20P1"73-6*N"V*[E
M8E4I$AH?.XXLFN4G33%LQF@>2I)D2Q(N28"X!)+$91(OAJX:*I:+H=&"\+ZJ
M2Z?-*,U<AZ"X.>2&$"%,7-H:PW2H%=Q6K3 E,I;([MQ61U=A6M5JU2I;ENP*
MSI7H2Q*S4(! 33)HE)<THT812D.(U"I6<I6"KIJ$;1I#;;EP,90&">L?6]
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M%MPS)9+ZZ,/.GSL>.:665VH)
[email protected]]H (HCU$NK-G06)FJ8TQ
M9)GCT#VM$KM-1]&0,Q)(&T43$DG2;!--LLA"@P@7::3!A0_182+((9@<:DPQ
MF*Q!! \M''&&$8!4HE4N=ZDV2!I>*$4$$F" 1@@77JA1FB%^'=60QERN"4\Z
M1QVEE5QNK,6&&H2\T8HEA/B5B!Q'%308(GKE%1<F-;62B%R'^;4$(KF0<@A@
MA[!<#"[% #**6T008HDEF,3[_S0KB)P,ZDM)+%%,O&QQT<*[LP&RQA9KH+:%
M(4@ D@AN"R3]AJAB/(')94HS44@D@2R'!I;1+?%<PBBUII]2&R110PBB- !
MXAV,,$,,CV]GQPSLG>?#$"U\X,,, ?+G P\(_E &$ J0L$(-2W!A7>@%TI#%
M#R4,&'H92,@7'W2K_^ #?N690*&%_\PH3SW"IQ@1B!XRJV*($G'(88O/YY-B
M/'^B&+T]PL\S_(;YY*BD]QM.[TX]WC/)*_GL/ DEE/6H4R4Y348+SI1?>GF.
MEV(:I*>T8Z4S4/_GA"4=!/D8G>24IYO,Y"9'.> !"]*_8*5('__ AB58P8I#
ML$(K(?^[QBC,49!<"- F W&@0J!AC!0DH"#3&Y\V7(&))*A@ 2' ABM ( N
MW,-(1L*'/DQ0(0(D(0SD"(>14"0E3=7#24B:$I6@A"5U0(-;$R%B.$3D#G3I
MB(CNP-) U+&F20TD4@M1B"NB\0^)5!%$Z"K7,5Q!#I(<0Q?'0%>ZW#$/:'S!
M"S%1!1HP08B+X>LHK<A%)2A!B2/XX&$\2$4Q/&A!HB4!7FL8!!JX0!4O\, +
M8&C+7&C2$&,T!!SP8,A7R,(*H]@%$X!,RR'4H 9#)&&0-,$$-FZV%UFNPAAS
MV0O(VL6S?.5R$$0X!"(&R0J:(*H5UR@&*TQ#"#4033/(9$O_(
[email protected]@0=$
M($5;L.(U3"3G#UE8 ]H 8<A"PDT4H5C#$ ABM@ @@N5Y$)LT) WODFG=EP
M FL(1#LO0&<',Q"!#$00@A$,8017T,[DI# #$^Q@!R1P*$2OD+L? AT0.C"
M%UP @A^D@ 9=N$$-:"<?"'WN/C[P 7_\0QW:^<1V[9G/#WQ7(0S)8T;/(]'R
M1,2BB'A(>QRJ1SYHE"$>U4AX2JU']K(WO*>.;T@HVM!4>_2L(JU*2?48$OK8
MH0WU50E*.FI?^[Z2I3X)ZTL<&\N7C#*6-XUI6OZSR59L,A.084Q1""S( 3V8
M*2V)#U?Z* 9FEE!!@UWC%@ETX)R\_SBM2!F" 6D8!ZO&:@Q$M& !#"B#-IYP
M@ [\(QSC<Q4T" " B !'='0A2*(B ].@:6)XD,B]9+(17#L([=3--ZSPJ$+
M:(!#1V 2U@ ]F*>$K"F,&H,(LXJ5+&-MA(ATC 8RT"4-$^;Q)8380BUPD09+
M"$:9^JJ$(<!0&[FE8ADS210F*F$)A3FE*6!8 QJ:,C%,M& 'AB"+,2*%*?EQ
MZ6-YPH16,I&7OM#E9*UP Q3\4@Q9[JL2GJ%+6^Q289JTS!C N%<B5M%A3+"B
M%5JQ2P6S8HZX^.4013#$NQ!!"!Y$<F'/9!@FW#"*8C ,7BSF@DXJ\1S6((&^
M@Z#$'XB1BO](B&(:HHB;PK+@-]8 (7"$6PYJH@/0Z?"'<"_ES\* 0 ,::$ &
M!QU!#,A<9H:>)P8[B('FUHR>_'PY"UE 0@UJ8 ,;/. !)- /#QYP@!3<)T #
M"FD9>+#2ULAGI2PMPZ);ZA^;7@A(\T >4%5$Z1&=*$,MRAZ0<-0]'255TT45
MGXF(-]50-_5&*.H1^HATU"D]Z:M&8E*3R.$E)_X52E2RM?U$R0[ZW4], !P+
M0T I+3D-L" +) O&KF4.@EQ#@-+6$CS4H21F_2,?K6"%)1*5J/5^6T]S$B#_
M%&*M%G3@$]#01A7=L0]
[email protected]#%:@ -J21 0! PTCYV(<KBK P3_(0R*D$8X
MM+&-)0@DN>G@XI6^\I4_&6E'7'1W;G4[CRP"*QSR:%*?N-B__B4DC)AR+"B9
MR]MDD219RFK5/G0AAR6 JBW+$83$,($)1!U%)W^ S20H,0ICF ,GF-@",ZZ2
M!M@TI25*@4YI;&X7UM1UC/X+X ]X\E6J*&";ZB*(9Q>C*\O*A?6,$<N;G87
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MDHA/;OT#-"0!*6A%,=B)G>!) 2&;?VG#(1 #?07D11<*X3*!R0 $FS#&!B
M#41#B^S# : -]B $BB"*S !,FR#+IA +7C,0F #P[R$0O1704"#7;0"
M-!2@CHC5%D61C_^P3\>98%ATB:0LG)EPB38D C*(R'-%7!KM0RL <R!2L[8
MW"KD B[0Q%6LP1\<P1\,0C$, B , 0SFA&=PP1K 4B15!6HD 1*,1F9@@RSY
MA39L11A5VQ?%S$Q8T,$@C!J,@B40@<T5Q4TD"C8<S*%<@QO<A1>T B*8'89A
M@L\($LBPS$H8 RF4G5^471Q<%F"T0E+812T=@B7\G#'HD78!W@LE 1JP0B2Q
MPA904N<EP0X@P3:N 2L@ 3'@@C6D0A;@@BVP@BTLQQ;\ "2D0=A AP_XC9-%
M!W*40>@!&1( 3[5#I#QDSSQ $0=S@A( 9F)P @P)$-I1W8(E 94 W_D, )
M? -6( %* #;( %+, &E (F X-\ -J$ *5$ -H)YK<$$-O L@/,?LV$X_
MPH?VM51\C%^&V-$\C BE>8B'2!%0Y93V=,CP\$@\*!4^Z.3^,:6F:4CPP!^0
MA-I0%E52/8N0$%7W=!58?158R0_'@54#<MS]R,^2-,DY@!Q"9&&P^)>6M$FR
MV<0'-E">7(,'%80'2=M7<,J?Y%8TO$$NV(*WY0FBL,)=R0D6*MP<6DL-<, 7
M:,/%Z4@]0 ,;%%_RY4(T(( !T *(& , $ WT$(0*($KA $<Z((# , BZ ,4
MG563K%M8%!LHW=48FA#(8 J2M$_YU(/\K&''_TF*F<A50BR< "6$0T1#JQ@+
M2OS#/H1#N\0<)BB8+%U+R$P"(("!%O3&$1B",1C"5JQ,ZL0&V63B4L#2%V0=
M(1Q"7QR&L@'76%";8WG@H:R=9_#+5;0"&/C%,=%$,:P7-DS8VJ68&B03@.:"
M&LS,S;T=)N@1%^P %R3*V6%=L_&B-ZS$&KP7:JA2TQ#"92B%&Z2&PZS&),D9
M$1 !>1F">QT-,8C3($!'ZO!-&9P X62?DVF!DR&!G+F&WZ#!ZW$!E_5HZ/"
M]K$4=43'O^S "$Q ""2I[9F90ZG9#,P "9B ";1 #=R !$A !43 EFI !'P
M"'P !ES "US !PB("O]\V0-\P \DP3[^P-&501;PQW2XGNS@#H"4P9?5E(5<
MR#Y,9?9<&K'P%HL$U5(Z3T0$H%$%I4YJE5(M)?H,R9#(0XE,6E5.SZ7F"(]$
MG!EZE5>!0S@@A &&990PH)0$RYX@1*^E*IJ@B0F"'%<4$%SR%P@NRK74I4&D
MP[.90Z;LY5;EPS_\@S'@@BHPPS4P@[)= RF0PF*!H AQ!7)I0Q H@ J SJ(
MSZHEPA)PP 8P !?<PQ@ :$PS^ PP00 5LPQ,$P1,J0A%42!2P0R*,G!P>
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MGM1KR,7!"6P +4"#GZ2(0KR!@VQ "F"#/6 ##/.B#,5 #[B#(BB !]"$
M!E3((N"#EW@1O1H#0=2$M8"#/@A03H 2",KG84I*OM"$M8 @+]K<O; L@B[C
M*A#"*BC"42!"4WC!NPP&AOG%FF "P?B&;P""-T2")>0JHI1&O*1.4S3,N[Q%
MTVP!=!HC61@%0GQ<""D;=__N%S:X ;XDBA=X 3(2PK4\4RZD@7Y^X*%H X"V
M72Z$(0R&85D<A=/=!<NPQ=3@R\W((B+TA5S<S"K@9RIY@1^Q&!NW KSH&%-$
MQ]GPA"'X <A2@BKP)S8,@B%8QXT^1SYJ69"^WFM8
[email protected]_.J=_\&)#>
M9*&Y5("4QPX@#I.660B80 =$P.DB'P,X0.46\P8L A(P $<@ $P@.<JP %(
M0 VD B49$G6 60P%.\QC[V:)TF6O@1"*/Y8PJ,'SMP2*"BGSV\R(K8P\6)
MEDY=3Z(^S_ 8KZ85Y?N%&O!NE:LAY:KIWXWHY)#TR/S-FAG*&OSHBO<Z((XX
M()3_X$BU!4O[9""8?!RD/*L7?=*ZQ>6:>#1?A2#_BN!(V\2SI0-8E*7P_&I.
MN""XA9UAV@09&^P3@2(#U( QJ(/UN .\J4$+E( 'Z$$]!$'HSD-NL9L[_$,;
M^ (%T !3 VO$.U90DX"(2P^&L&EDF^RF)L9@S,=" 8(M,"A9@8SI+.W,S!
MR(749IU3: ;?*6@NA:$RI4(H3$(B_L$R6(.B$$0N;$%FI(%X-H5+],L)P)AF
M8 (BZ.<8D<EJ5AL9>QM-)((JW$P:IT$M,(-G[ 44U(PKO,%<' Q2W%);W$QM
MXK$GBN%ITX1@ &,N'85\Y@(4+($SZB);K-TA ('-J5*5_V%3TBU%(O' 'X1-
M+31#)&00V_X8?.1.(A4(?-".2\ER@""!#P#N2KE.Z- .O&R!Z&GB2C9W[22:
M#_QRXHX90XY !_! #8 Y\Y;!%" T1 !:2 !S2 0 Q@ ,W]N-'_N!;A
M!I1 GGI.#5Q ]! 4WA>=Z^.)GK!#WLU.XQ?Q>U;B?QD\B /\OR4JTF$B;B?
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M@ E\P ?_1#-],_-]&T TGXH"L("?*< *L( $D"2!V -*( +-(<]W8VR"@(P
M@%)#S"$X0 -.Y,+XE<@^[!MO97BSL+.*. _R]F2>B+%&K[,:7V$,FF:)KX
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MM32;L]-$,:52A&;KH21"S;#!SV"_77C;P5@0+%D8BP'25 !#XBZ9A@"&C3H
M%C@,>64!0/S!-0J0%C1;DB!!DD4A$A-;?OSPX2/BCS)E+/Y0N(4C(22D."+1
MN$5DR1\D%5:,2!&C29$_@$3$N,/#C \J:&Q@<&""!@<A.G2XJ>* 0, C"8E
MH.! @P,*H#XX<$'!A1LJ2@0) L2%"P85OMPR9@Q;67#:M&M;8*D*""-U"
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M%ER8F4642?[X XD_*C$&OU:X ,0,+CP HPDD@#5"T*P]]3+1:.S?4)XV,Z/
M1^RN,<>;:XHIIA)56"E&Q^?N+I3&]H04L/^5-Z! I-"(P^P3.D!?! 4UU((5
M@ H4(@ZAN^- Q&Y.T3>6J&&]V&B&,9XPP,3@4!,'$(-:4A#)2RQAC2 03UK
M4(6L9H6&0!C"5UE 0Q:H1!)B(0$-+TS)LWC XJ0) L4J0@:E%4&CLBP(1Q)
M0R "P1%H;2$+R<)(LBR"!$GXH Q N $(+M !T0@ 130P!<K\ $.W&M?\FH
M5/IU1J8PY2EH3&.]0/ "$*P "%]@0QN"P!1:Z.,LLLO%*@0!%T%80A*!&,0@
M,%:7?_@E9")C)&,V5K+#'(8Q];!D/2*#R7FL3&:9X8MC8!8:T_1,E*OQF=%^
M)K2E\2PS#>/9YX#_I@W4L$,W4MO-.?KF&Q%1B$QJ8<Y:Y),=[-"N37Y2VS7&
MT1UFE*T8W*D.-B#6-FRP S'_@(<EUB.V]N@/.L!148GFPQMHM( &T$!'/?*A
MCWQ$0PZ( ,()/F #<D@C" #0QCW"$0YM&(-IQAD+6OI&R[-@;I^[N8^$[%.A
M[#2G%6J)'7-,!R%?,J=VIL*&J8;)*22H(A)_T *5 ($&[J1C+&E( AA I2M7
M$4$C:[@>)K2'(V,0PG_#N<]WE(.<Z.#)&(C(Q1H,88A<8+0^7,M4]\:2"U9
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M@@8&E ,=M2C</4UQA*"\(,(7. =TGB! MB0&%KB)QH58HW4\B/0T'GH=?"@
M_Q$P==.**<.N=A(R"S0"-99*Q#45E"B('_R0["$ HH*(*(LUH$0#(KAP#41H
M 1+\VJ4@J&&M.6J#I.->HJ=+2#>>MTZ+BF&./=TH"4M@@_V,2C'_J0D*.ZI.
M*Z 'T.]00Y:/5%^ IVI/K5B%5ZZM$/!*BA$F H(0,@3(=10U;'8+T_;>P,;
MB(")))1*%8"H1"56Z/_^#R&H)Q B@2$F8B(<:P@60B$H@@<(JR$N0K&:I5G*
M(!(&@8DXHH8B(1!<!?<L8@,APEA<*(DX @A* O>NA =< 0P8 ,B( 879UQ*
MP 5*@(V.PMYHZ[8:X %ZRU\8 %_F98W:" ,([HTN8/\%6 $:$$1PN ):,$%
M (R"%(C*%BW(*02,$6. XO2F8O.@9DN,LT,(G&3(Z[5JXO6@Y [@&3, F4
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MWN)MCDX !$# *) B*0! 9!B U;@ 800*AK@ BP@"./2".%2 K(HBW8KC79"
M 1Y@!5; !IJP#8K@!1B 6CACW(!$F9J.BJF"_6"9-20DOA"-#SC+WKF+[B+
MY0S'_Y+62S(@P^7BZ^9 *>=*0V?R(N?H*P]/4Y1N3C4T8^?*(^C.@FDJA$.8
M1J!XP\I6Y#=(I"Q$K<&,JL+FQT?(;CO@(U&8H1ANH9F<">NPX6T\A'+LX1_2
M01.[0SM.<3[89C<^I$Q8) :\P)Q6IK[<(5!HH 52( ;((1QP(.+VH;YV8\"D
MINF<CL$VI)<VQ#YB1#GDP') #U RA%)"A]<!QLXQ1#6X'C6 ! :PA!8 3A&
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MOP $8$NV[@4#;* K@@ .'$ZX) (@($6,&$5TH 45H$42K(+OQ#E%J/D<,;E
M:&PRA+7E**<,9<;F:.P-'R-F8@9ID(8,W8%:IQ5F7"9:+^F2XD$>OM5F3NDT
M?49<3RES7"-SFLP^F<;)1"1&EC'_F(SA$( @N!)!.+^&T]2F+-B#.P[5.39L
M.3G1F4)GP< !G6*Q)-TN.]'&/:R#<]J&;?K,H%S@
[email protected]^K'L*A#6Z@!4;+
M"_9!$4# G8.0H01+6RL3"B/;=P&?,:C.S$G=-AA&XCO01!J1>I#.]S $%1!
M%42A>%SH#U1!>8 I%TJ2$$PJ"0B!>I2VSFA-'%N-%"S21HA/'>IA<]!"$M$F
M'=A$P]; 2PXAFV041I;C=G)$3/I5?A(E3-JI&6$'0L(D$5:A3^[5&'HG$5ZD
M4<+V.2H(; WA$#92@BK&)%N!%7*U4T:!4VJA)->CF?0/".#,LAAB(7*R67Y@
M335P69A%_[(TEP,C011JJ%H6XH5<:!22J(:2Q8-JR! &80MOH5"S9W KYA9R
M@1!N('(D -Y.RP(LX L 1NX (6P%*3PE*10@% H $(X# I "HN( -8P :8
M@ F"P 98 ,N8'$L0(T40%Y H%]BZS#UI;3NI016 1J0%#:X M<@ ^(*R
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M'"LA1((CHLVQ2@(E-*+:',O:<B4#AVA9KM(3/&$0)&$0?'80D 0 O605$A+
M!FD4:#@7 H$4]FH0/ @N"($4<(\0$@#_ !+ AX@WC;@W="7!B[ N@B@*.R"
M!^>E*)["*#!@!90@#)1 CB(GH0] 7BY M^3% (J" CZ >ZLBBQH@ ^Z%!6C
M!@Q:"4"@+B@@".:W4%M!$.RW9%!.6#%I,-#)'NX!-#?I/Q@8O>8P9DZC/$R3
M,LA59Y#NC,S3C9LQ5J/%KE&3CJ/_P\5A#'C:8EIPZ-S/G'"I$'V@)H=;B
M'N[!"PTC%KV ''A*7P<2&!ZM3;0)8 $6.=,F1(*C1#!)'TB*.H[S?TJD;:3N
MBT''&+Q@ X( &L*A,K<A&EIAWMYE%;9A##* !GQ1\IZ.$,&8&%G14>#!0HK#
MOZCQ<LHB1)6J_V='01360".& RX SRF+"3!P NL)/ZB1]8P(?X\!1=J0=-V
MBG8BUH@]L3G2QQ@J*!=PP1"\(/[<EJ(*!0K>P!@XA<U0$CYV!$<T)4SL9_ST
M+%/F-JK\1Q$BI/[.]KHI% THJ%0P(411LKN;]$W68! H 7K28!1L@5-\I!@L
MX5*"DHF:30&;92>AQ8><4BIUK85":@O2 )NOTDOMZA98H19J@1#VZBU8@11&
M ;W3VU?;6R:_% V\F<X$8138"@CJ@@!N\;0NH 1L8 48Q[KH)0?12+=NRP (
M :X 6J=P48X+44P )* 'L; .P-P/LLBKL4ES.B*$_%5_.R 5D'/\$)&".
M&@ "( $5L$MN !0@?4O\%>\-H:\:*Q_5WIE)H-RL!P-U8N46G.!+6D/-^.!
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M#2J\O9LT#=3 2P=IR4LL%Q8 R1>@ DB !$# %HWW4E'\M@X YB"Z76K+AH@
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M6[8LWF(56"FA0;E&I1E(>!2A-(,6L[J5BQ0S5I8*KU)*BN<" 0^,*!0H@*
MTP ,H#ZMX,*%"*H-J%8@.[6-(+(-'##0&D,##!= !+%1PO>%!A8H-%# H $(
M!01D'YC.6X'UYPPL*(BP7$&#"!>**SA-@PVI5?]6_[/'?E\^>_OLO8__7C[[
M?/79LY>G7W^]]_7((T\^_,D3X($&"BA@@ :Z(X\[];!7SSP/4NB@//>X$XZ#
M]LSC3CSNL...@R.""&*((X[(#CCLB+ABB.R$P^**+*JC#O\X.&K3(HW@Z$/
M..OUU]X^1+*G(7SPN;.-.N-@X^235#F9"S!477,--L9 U,HHN40%T34J69E.
M.N^ 8V,\^.2S#SBKS)2+.4Y^]&0Z-J9C)HXVYIG+!B DLB%_&K+!1@L?D(#$
M,;K@@ $M^[#S)#C0:+.--O7@:*:.[$0#
[email protected]?!(69$AQ0 BRAI_;&&(
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MP&[1T:;;> "0$$8&8NN6M7=>>YU!"4%< )QK%UAG708 C%?= 0IDW=UTVC'
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M('50/?R<HO_D Q_RB,<V7 /3A!:[HYS6[_#A =V=1=-H.C %6H(B^@5@"
MT"$<""1 MP9( 0[E@#A$:\ "=@ !!M8@6N^9DVU^1W$O&& X!00SPO$$P1/
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MS)$;J5%W>0,=?$, -J (&* "[!.N2$X7K,"X 0<.X8!RQ@>*^!-&" !P/_!
M'$JF3M7(-^M$ =XQ>9-7 N$@#<MA>JGG'EHF))93'YS3.6[&'O<P5@%R9J'#
M'_I@)+>W4!["'^_H96+G>J[((!4%9F,':/L8.[RC(B,B0%PU:!5D(R259]WG
M/OI0)/080)Z"4K*W#]% #O^P#:N /MSC/3X51-Q#/J%F<,%B5:C&#O$PC_L0
M5?@V)W=R(WD"#M#75-!0 PR0!.0 D/40#M# !D#0 A&0 N/ #JZ0 4I0)"JB
M#M 0#="@$L6@$UGP=(*05?!0#QG662.A!NO"+DJ ")'5"B7H!>)6+BQA0]A
M@SH8BOS#*>F@@YKV)+F0$6E@"# 73-9E#.:@)2K_$288B(%;E%DH$27NPBT]
M49BY\"GS T9R($8+UY=,E!$'8UVL< D!XQ/3Y5R74)F $=R! B8$#"J0#Y9
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M]I-5R((G-<E46=4*?(,--\IF[ -2] "') "GX /T/ $(!"!^[!LZ.(&2: *
ME&!'7 0.DQ8?-F$,2]!";.!"D$5&K<"5"H$(Q[40(A$I_+=U]<"05R62"\<*
M:$ (X_:"-J02X/)P371^*?&D53*7+3%4GHHN$,=%3I*7\!9$NE5*+2$54N$3
M'U0)=OI!:5@)'10)D>!!JM 7;42'5+@&\?-&H[ &M$0(6.$5[.5(9R%>ET1+
MM?] &;:@I.DG:E8%1,LB0;56/%[W?*18#P7)G=M0#S;5?0+$4LRC#>2@"W*P
M#[H0#?HT:?*ZG?2*.GC69OK@#DYP (H@#38PGNJ$=[I83B4 G 0!L+X8;31
M-:W1>:ZQ E!V 21P' _ L/! A+0-@Z;3FQ#C0,:H(*S>8)# 2Q #M' H.J!
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M[$!I[^-I<Y(_]$M7T-=_\( /V $"R" @!(Z/JD&00 $*B )AQ4&0> 0N#"'
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M'<NA-KM!&QC0!4% '<V! =[4GQF+ 1F =T4C3RV370#3BR0 1!+GRP 3G2#
MQ!8P-FOSGY?'&\!A 8+S4LG4H/TQH90#:?"1C@GBCUR,4!+_,CH7:HX2/&FU
M,U80!6<>(D J0B#^*%9$N\86,H$@%4 FM3O%DT.J,]>K9@\GU;1.FR/&20[5
MAX[[X Y.H@[&8!,B27Z4C*H_!2;!DE0\I8-U-6FKI@_I,%0_-+_[$XJX[:WX
M< @U0 )^4J*H(P= 0UD ;OL UEI X^E'6D2*;<&7Z*D$2"HLMDQ(5Q8"X+
MYR3#C,QA!R.)!4$G1%P946YJD$*K@!)-:@[&X"S3O(2[NU-S"2S <K:"+(/O
MUJ</E@LC\0:-^6YQH CW9EIS>0FJP J < GE Q6X, F4D J44 RI@ N5,%V]
MF@:LL,^JX+A36#Y6TES<:T6X0!> _W %6E!T8 (AB )?]$EE\$,7^*7Z>>7
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M"[A "7=*"8 "!-N"'6$%8-0"=? "M6"&;12,N:5B)'0"QE>"1)#"M/*#,RP
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M$0ZZT 9) 2KH WP\ ^ A#V[(6+MLT@-&BN6B%JU5"1,6C&(+I2U J:(H09
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M$1HH4'" / /S!\PW*-&@P84+&#!<: "A L7%R(PH'_!POL2;+@AB"!>4,*&
M%3)X@(8:5*"@A/_YX&N 04, $ !"20@;\,-)4"@@17^>4&!?P P$8!_K-,M
M'WM8;!$W& 5RL9[;:!2H'A;GL8=&>7BLQT;L:I-G1W<\R]$S@3[*\2-W/*JG
M1W?B85)*C^*ALDEVLF32(RY!RO++(6W;)Y]\ZHGG2W+>.3.D+-4!1R1VH"''
M'3)M(S,?;,!Q\TTWSSD'FW2(*DI0B=)1)YUB>#)&LYR, 50=2*N4)Y]]\.$)
M4',"S3,=0]5A!QYX/FTS'6T.\8(6=W:S+1$UE%!"'='BJ2VU:+391AM=LG(H
MHH=<,<:5C(+51DLOU7$'G)+B7$H--M1XZ:556+$D%V,R<]0GGZC%%E#_>#C5
M-!VMC&I%W(AXR@6;<8^2RJB(C"')49-,,@83K3"Q=ZQB6*G$$%:*4445?XLQ
M))6W5(F$&(-340602MYR2Y5K)L-%%4LDL2670 :))(LALL@"C4@B&6047')A
M)K-KTF%T6XE6P2:?>(8LC;1P]+F3G7VDV>:8</9QY1Y[@%/$-U?^"2?&Z\2L
MC3;2D/G-'G=<V4<>WH"S+K?:_M&:-F,4F4TWG5.%.DA[YIEGGS$,4$(:%@Q0
MP#T%&-@/O0U+L. _^/(&P88+*(Q 0L 5P ^$%9@(0@;@E BB,-=8$\%"T@@
M@8422KC ,.> !N\MS>$ 0)'E @ OFP>&!_Q)/3/$V%EV4T;HC873]119Q
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M-VF%39[2$)*8#R)*Z>%8)I,+PO1K+( F+[(6 F$32*0A1A$%_WU%K4(TF!H
M$ 02F2$*'_"@8U<8PA5\< 3&J*(6M;"C3P(5%"->QB>%<M=)PN%CZZ@RE]M0
MA"M<P)OM1F,>X5 #=Z.Q2NML#6O:H=4JOO"%+GQA%;1 1,B]P Q;#.4<[[A!
M"M)!0?%I(U712$TM<2E7W&S#!BD(1QA6(('Y6"YS#!Z/!?YFX;C%C4)W<S&(
MIDG_XFL2:,064 ]YY%."##5 G1B0P $PMR$9*P $%U!".)YPX]6YR'7U?!%I
M\F$SA%?',]!C,I!"F:0B><8S/6(H0Z'\]U05B7I,BBB1-KK1'X$T2\VQ*9?"
M,2RZ9BD>^!S3/NZ9)621;WQPTM/XH-$S>IH))7(&1SK\5'J3H$103D2)(?#Q
MPOV)Y$?Y2P>U<N&%0Q@U]E]:FGL='4.2'+I-<'H@)A0QJTGB)B*(P <XVI J
MA1O$-@&^#6UP!"J:BM0J5Z5U$G2804MH=ES0B 8TD!61*3:$A/!KUU*<LJAK
M766*T)##4"QC%7=)>]KA0F*^RH*)2S"$2[@$ 2WT@J,_W_!B\=(A52(!$!@
M@A%2X!D%B!B_8+=WJA1T8@B$X GS+ A_P@5="@BUH#$]0A5&X!69@!ATZ
MF5S !5LX&<W AK&0$ALQK^FJ/M[8ATK:A\X &MK8AG] +_/:!J?1!61H R4
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M2 K-BHA<,"!?*9=J(2%JJ1=[805,""U,B!BW,(M*\)=_X8M*&,"\4!A* .%
M61B"Z9=*<,#)N(9*V()!\($-Q+=Z\QBE1(- Z(5BF*-(L(5*:!A*V"UO8(9B
ML(7%6IG_([(=5<%!W "]GA'"HR$-]4H1'F0:U8"&1'"51* %6K !%:"!)% "
MA80(DQ")/'D'/_$3='@'OD0I<$ 'DGB'>XB'_$('+9L57,H.*1L;)OD'GZ.%
M<& !!+"/^+B \"P.)S#.<2PS52Z\7"/NRF!PG&!262!"S"1!UB!%2"/L4M$
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MJ#KTJ+JD\[JD"P_ ^240P #5Q$.NLX_Y8,-IHH^W.<0,J"8F> $,> 0" -%
M^ UDT!G?0#M\8A%-)$X5,4X[N1/D>1)7[+N(TA'I?$XHJ\XAF5?!<Z@HJXV]
M8[579$\OT\4MP1*0<!YVJ#+J:Q%]$$\WD;/K(5@T&XD.A;N7RH?8JT)P>*K2
M4U&3$**?RA1(>90 @I2@ BJ=Z(F<R F@BCUU8%=]T)]#H;/-^RFJZ@A^8@>(
M4*5]$I-]B(-<N(=W$"!#A1&F8:^D<@>2N"JM4 )F40-$2 0#31<@<B^>*!]-
MB9=X*5*+- G_4B$*DN )*%"@/)$S14D)(.()I\@B0["72M VM<"7-5B%:^ +
M?R&&)PVM "0C."J&F+0&3+ $0TB#-$"#2AB%C:$W#MR!'? !+4"#/U ,-!BN
M!T0#-!@$21B$J:P%6Q@%S2T+?3&&_EF4GS DV* D;5@%(.B L"&H4VEWW %
M8$D$-@ "$DB!%O@!-*@%8,@I63FE>
[email protected]\F[)NNR+"$'-B%>1_4(XDU>R%L\
MDNB2>?"(,!DEI8*9D6!&24J-N/H@W7"'8\B ('"%,5" /'Q-NE$/\U4Z#,L<
M\XB #< ;^,A#^I ^I"/\0"ZPDD<&3LG:F5#-00&@YB'>WBRU/@-_[3;L1>A
M'>KPQ!Q35]>QG;L#DB2SD;Y[SA:9E%34D7G]#.U\LGS(8-XYQ>?9J.L-6#.Y
M,H$US[QC'8'8LO8$'\YSASFQ/)LA$KK:D_$!%*@ZB9C],V_IEG38'T#[,S^S
MED2:'Z3"4%'LH B%!DXIO4,AQT^A*BV1B(O[,4;-F0GR,YDQ47M #H+8!G<@
M6T3X B]( D0XA-P]A$1(BO*SR&@["8B0GVB#%(O%/\P:4LX8MJG@"90PTC@H
MBG.AEVKIH8;P/U8@+58 !"E-P"P-F(=!&,]Z+5%PBU%HA5&0A-"RA$KHK2M
MW,05P>#: L8X4T (A$! [G8%\N%C%I8F/^(Z1=6H"-2L*/.6IG%4@>JT08:
M4(,\R0><V8='785#4 )!\ (>B#<EX*'40X>+A8?D*EB'PN!H9A)\#=@OR3*W
M,EX6[I+X[,5<9"&RBA%YD+-%80;-S05U>"LFT=Z!F!6'FHU#O(CYL "Z<1OU
MY<QB/8^_F3#W-2=SBB9(7($0TR:WD8!$E"8;>($,.">O0080<@5U?JLNU@6T
M:TY%*U=%XS&A!1ZQ@3L=R8<AV3MV[42U(T9W=2D+?LY]$F!8G"OQ5$7OQ$4;
M!$^-P@>0$,^.6CPH.R_KPQ)B 9^<_D4N@P:WJYUYT!/PD5!KC"J2R+X \N&9
M<K0C#BH_(UEL<13_H?CA!X*'R>L@2$ '=9A0I_;/"Z6KDMB&N-N'I'!9YZ"N
M&#D&.="&$=(&0CB$+V@% V6B:G$*JD@U]Z(*1I/(OZ8IIIY0O+RJ1"!;10F6
M/(&'")4#DW@#N*7!P1K2L5C2?H&8*OTBR;@&@/F#5!"C5!B+-D*M04(8DAFD
M02 %2UB8+-B!&9B!>:NW(7!"CYG<D!$9R!B94;!<9H 87. WMR"+'EK2(SH7
M&HR4WIV:?,!7J(D&8U"!!- #ETF'3P&:)!$)>= 3?& >##XE>"V;A_H[;F82
M<@CJ.9D>+>&2:&B-(F$3&*&3&,D'+M@"-% &3P $)/B#=$@-_\[%=IZ^_U3)
MF1=P 6G0A=<,S?3X3*4[#_)HL J1D/XPIS5D@1'# +"+IC6<Q,1! "9PA531
M!44XAC'HI.0SB (^8',-LNL85X.RI086B!Z)*!I13ANI)U*$UWJX!Y"&FN'1
M3N&1J((-*!#^" SEJ(MBDE#1LIQV*^MI._1*1<4#ZO($DWO*:'F8JC^+A\SK
M3_CIE/WA%'S8B:<.8J"B:I)-%$?9B?BA-#>G-'W "*:NLT,[-*[&!WV (;N*
MAK'Z+U1J"(H-%0(JI7W"!D,XA%58!390 B=0"JO5"(T=;(2 ;*GUO5;HZY0(
M%DV7VJE B&@<BE9( _L3M",JBSK2-H#I++(P!/\@D%)KJ(RQ>'5OJ 5F$*-B
M,.>R0$&U0 ,?B.W?N@)@I[<?4,J/&02-&81:((61(87!U;=:D(M:> NL/)EJ
M&8M:KN6A>&I\X'&0EL4H$8@VH(7S=O+"NQTV^8AZM:Y:(N\M^1+K"8=Q1Q."
M;9(L?ZMH\.8BR0TP/AN!^(=K.-.0>8Q:L 9C =AU#G!9S3@< (%H^([RB$,0
M4">Y.;JWL<,%,!$/@)#\?28,2)P'4(\&R! ,.42$)I P& ,$N ?L5>>/N"Z%
MBX:*9COB)#/D5$X9KPU-/,4RV;N[VT1-M,X9/T4*AD5T?^ J:S*B5Q[GD:2&
MO9)U7CPMX0BA13(NPQ+_TD.I;=8O<M &%]<'GTYJF.43,'>3G5+0/ROS 4T'
M_>&4- ^XK#84/WNA0$4(TM-&J:8T*PF5)7]R>ERE-X '?>BSDBK14LD]IV@%
M12@)60N6D<B(2X\3C< '=?AKSMCTK(VVC!U;>9$7(C4D?#$&5<"$LP 8@=&,
M5\>75+>C8GB&9R@&8IB,9S\B9@ $M:@$+@"$-1@"7T_*X!H"'_B!,O 8_0:$
MD=ED5:#3WA[<6#
[email protected]^L_K&C:W$?=2#&T*!I)E%K8S@6*'M.Y60OP'L>
M?67%[/A=@>6H^,3ZK]?N;W[W<+#"EA>(5JB%<UB:?TB'47A DMDW:P (?/7<
M_[D+5["@/7OA$A)L:.^?(ANNI+TX0("!A0L-(C!0$*'!Q@H&# @<""#! L-
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M:2%3ZF&,?]Q#'>B2V-7*N![XM$<;KF@%9 4&6T8*#]O&Y <XL..M)T2/?71
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M5*_U V8_T!34J0]1Z]UV<IF//8/:#Q-'0N)'U.*JYX!H0<^KKR/,4@IG_RH
M1T#ZV0]\C)&VZ_('3.O!F6X8A(EKX-%ON8&0WXKAADKTDAC7, 2#1N$W:UQ#
M1;S\D#Q9@8M1V*(8:,A"#J@IA1MA$PE#^($4?,"C+&QA"VA0!3AO,0@T_$&8
MD1B$*FYGBU&,0K^Z*P:,")<+8_CN&KG(C6YB.SRBZ6Q,CND,%"MF,80=M"T-
M&<A _H6M.QT4L4/AJ_+<1Y!_/#*(;WF+62%J4( ^1C"&*9DZ+#$$)%3A"KF
MBZ@T^F-4*:2N6@X',FCAA#" H",];4 &7(+ "[I@!1AX@ 2:U?\%&QA 24(
M0@J1,8:H H6$BG#%59VVU8CM0QI>G<I8N3+#K7@L(>X25T+891>L4"J(8CE7
M6O55/2.^"8ES>9J^2'KCZ0'V3'[ZRSRPF,G!AL]0DNG,Q?X)F).Q QJ(CIH^
MS'?9,VIL2Z%MHSY?,T?/SB9F*TL')FBP W, !\VF^<M<>:;DW6TMC[+ASZD
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M9!M\'Y4[\A&&#$#"%1GH" 4;4%2ABG %*WB!$L+ A P@ 9Z$D8M+H-7?PD
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MC$(@#$(D"$(:",++#2&(M0)B3"!.'Z0Y_%<.&81PK8$/OF$.(P8@4DE<Q
M](:7:,.6@ -Q1!^?@$-TM%V@G%I@-49>1,<*[9@ @DM9;$:JC=O/H-OW@(ID
MN(/&C(R]V1O3#89ZV%LHJ0?8O$<ZZ,\57($0+ (\:!0[9!FJD JJC/^*HRC"
M X0!.:P WS !QC !=@ 3P1!F]W "\!!&+ "$A !H0!*:S!)91"*AB#UFQ>
MYX4!'-1B+;J"=XS>=XB=4T2%5"S:HHG5T_A,6YU5[:W+M<G5UJG+5RSCFZQ%
MI.7>G"01G31$9?C3U+W)7CQ1G=2)6C!$N2D?84B/'Y8/^0 &.4##V"7$9JA=
MR+ #/E#&9J4&%VK#]]'&;,B,RF##(6!"!/ /F0;:A0(@YP8,Q'(S2B'SJB#
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M+CQ %[C"LRC""[CF"W0>X*%*@G@#KZ8#-(S!"^ GP%%M$B+(C !''S+=_P#
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M.K0'.FC#[K('96"#@F%#/C F-I0<-OF %"R".81#-) #W,U407SF4&S#"8%
M(BC"\[S*K;[ "$4+"OF=8:B'WZG_S6]*U9^=D"X(ZPM<0 +X #C\ Z$5A3>\
M@@,D@ /H0"ED@NF=U<<\C')6QUC$%==!9Z818UW-BQ#-RS?6%78FQEY-(UZD
ME5T=F3W<@T=58]DY73S\"R8QQ=CUBXUQU%U4!MI1G9I _)%S6#J)=*4QI;4
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MUI@\\ PX> $/E$ +J$ 0L,$/ $7<($2)((\O$.G&F N5*HL4:IO;,DY/"KE
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M54XY@0YM@WF[ DF0 \2 Q% 10)8 S[0 SWX0SOLK[DDI[7^M$C56.K5!?8L
M=74\T@\=E$>5A57$!? M$5W %;SH2V,\^=4YAE%?S;6 L/EH8]J=264 5F/8
M@R+ ];C494F=C-Z,G\P@ZGK,H\(&ASZ 0RN 0^HP5H'<=2FK,<&)#QPB?J-
MUHHE$G1T5%9D_YMH>!O/,"1?? 5XT-6VP$\+"$(XD)&<($P^R\,9L])[D(VA
M3*]W4V"7=/-=?TEL 8^TA1=<LH(A("0^!>+)$,C@Y (KY\(ML((E-&XN:&TL
MAYC[3>UJ[$T?Y<(PM8@H=)B9.A-96L[ET'8EJ%/OL');PB6);6V!C!@VC(-O
MA->6!(_8= GESF@Y>_?KGKJ_189I.R9DY&[SB%$X) ()18,KA(':2$-$@( B
MQ$$0Z $ZW#(IW4RE%GQ^)ZTX^]M]'" ZO,,U9,$BQ((/Y((ZR <Q9,$?N,X?
M'.(BC ,^8 S<P=VH:(.JSA0DUE5!2,,^Z((K]*8KN(*)'U>V,&\*B?_*-B3+
M\\"OM$S$-MR #?P#/O 5&@ -F0"CZ]#.]"#Z7G'#"$P H?+2Z_+2"'YQR!1
M72C%0*0>ZCUYP,1T$D%4$AW?7B,1US7UP' GI6<2UER+]Z"\"3]'7U!,(Z(P
MT^\08IU,<-219Z'&C(VU;: &:$##(? $$!#MKU,SNR]7K',ELBES;3D7>=6
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MV_\FHA_\Z,<=Z\%'D/#AHVL A?%\!$V@C2[V67.1]/#A?+HB8LN:<\6F[H&
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MAA%",$)6*/51R>N PH.<!C7J&2E]ABC.NJ(FG:<M$KK9LUJ57J2.CCW$!N!
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M&IY ZBIB@0M(*$FEE9A%JY K6J%L%I9R'2U0*T%EF0!#8# *E8]$0I/G!\G
M5V &/GS&$QG&$(=K596&%*$BS&SC&$H<PXW[%SEW:"5_F")G;F@;S@$?F@
M $$?Q@ '7B .VN9@%*L4K*V+'JL>[B$?[H$Q)N8OYN$O#B,?P$@S@,.-S*V-
M3G S1&DP8B9CS.B.3HLX6*9<5&;^9JMOV($RRN@T5NNV( 0>=E"FW*%H[J$P
M)*9<C$-JLB,RL"9^I @?P$'!\ %%3(D]M,NZRF:]QL9!Y&-S*(*[W*/I!JC-
M?K ^(,1K,"0?IB.[UHN6'D8S*"1G__1!P+"A,
[email protected]@$0#9'><P)=-PC2$R.
MG3SG1-SIZ3:G1\RA& P!"0)A$-# !Y @R)@!G<0.#=* "RJA%B)A%"QA%+"'
M%"KA36RA$=\.#1 OTP)A^1[MT4!M"WS !R!!'J(A$58@ X) "92 "?Z.*J"!
M.61E#-+ \ 3A>;2,%&Y!37I'4OPD48Q!3R2OQ/!D4$"O&)%,4LA.5Z[I/X)E
M5$:$14;%(GZEY!P('$!"'OY!"0Q@&^Z!*/8G*,PE,(C(%8(/ #)@78*M7U;A
M"RQ1%$@(#:X JVIB^Z@EJFJB#*AE^[2/J[8J^Y;O#P!A^1P2#5"H#,H@#ZRJ
M)L[O#SSA&O\.!_Z*XES6"C-811%^+8R008D4X2R8(!??RD4$T"61"#P 0 /P
MX1^<@ EP8 G8B1YVLAVF@ +[PCD^0QXT4 .!<E6*4"B-,C!LAHV>XP2;,K*0
MHH9BQC+@+0U7!K0,Z8Z&!@95)3-R)A]0:V6V<@?CIC@&CAU"\!Y:(1SZ1F*,
MPVNBA#[$J4;$1KKJP2W, 9<H[DFH)$I6R6KN)DJH(QV>SARL)#J:+AVT83_
M2VT>!+>8<KZB8PT91!]P(T, 1[ZXRQP2HU9:;8"TQ.PL1S_R@T;<R< H0DC<
MAS#WPR',[AJL01+28!!48<I0,1*T#DXB(1(J@=%L4Q*0 E^ .[_D, 1ITHX
MD?,'H \0F@H)Y@X0[ [\;@$?HL$%)$ !5N %E.#O DT1\.<8HB%_=$$.!,$2
M",$0^B076N$:+ 41""6>M(=.;@'%P(04,$$]B210HHQ-P 08KC'U*D*E'.>E
MV$&!X 8D@"4=MH,<4 ,[@, &R.'5Z,=>
[email protected]$%""P('MN$?(@ ] <MH 7
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M%@#%37;'4-9I2_\RMO26;F-;AV-?!U6D8X'.X5C8@1S 1H*:)%6ZS'"LAM-
MY1WN06;E(0AP X(8H=DC=8T)"M:Q2ND@1;(H7X(( 6B83&D,!<&(5JH#X50
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M!N$6;D=3?BT##. &B (;. 6%8%PF8,75\0=H&$52,%%A3'+%$H21)A(+*50
MI(Z[_,-CWZ::N"0_M,S,J+4_3&4Z5G9<@I!*;P9N785]WB$?L.-=> I_\F>-
M["H<VB4M_ H<[,$5'J $))166(H66N$>0 J!_V%4)GC31T&M(2W-PEKT_"S-
M1M]8%*PV$D0A$\.O1_V1;&MA$*PJ$M1A']PO".>O7IR@9AZKV'##*8*M'E$2
M 0B@+??AAO9!'<PAL,;A']Y%)9G@&@X7BW3 #7Y23H%+*CW7C#0KOB(#*=R(
MW^XM2?VB8CI7W"0&35^#M>BC9;_ W@AAD-\!7M93&9(1B+.TM*93C+-.4
MW'9W=Y<P,N0C/IB0/* &0SQ)E997/H1&+NMA=D[DZ<Y9;]+92F:G$-7F;M3A
M;T*P;I@7;^;O0(YF5WE6DQ5D(KS!'(0X6?^P/]:)G>KW1_X7&V)GXQH"4[ZI
M%8JA%61"%&P!%U2!$?]'81 "(1"2@ L"01)&X1,2;Q0C 16U2M2&\PH>;3GA
M[A,PC*!U9.GB81^*P"T4 24P :8X O@X,82IQ5<@1"2@ 8>$?RV( T((4^,
M\7;B\TOB:>G"1/3Z-V-;!WW(SD:X*WT6R*A6ECMX(E7T^5$C)G"B 4#&X1K0
MP!CNX1V/ 1F(S1[X3"OX3*[_01IV[P56 !IB2!&"0#MSN@OZ"1M:@13@!/TL
M+8*C"H[YF%MQ@C?W^/Q$H6L;NQ:68;(;+VP7H4<A6Q(" 1 , 1Q\9H;<L4CA
M8"AUXK'"^EW,0BIP &0X1Y"!#.D81[2@1X@ "B9AO@ ?^S@ 3-XNNX2?_
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M'RQA$* /JE1!$EKHK9GBF!I"#2H !) !9+@"PY.&^)@%:"!0__AU^@Z Q
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MH@$P 1LP!;;X L4H16Z@ 9^8 >BY0>F'.X0.! ,K\46Q8C5K/0P9?5(KN0X
MIS%19=!,!9'LAN!H+9" "9@"YRK2P:B-80=&8 @\@1GT !BDR"M.Q!Z@H16X
MH (J( $20-FVR/0!P !( J8H AZSP" @ D> "W&(@ANH 14H ;8 !ONP2,T
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MF:3@UJXQ&V6(4*5!60"A01,(NG0T:9 ,C3JEK%KA;M[+VS,V'=M^X !"A
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M\"4"O"MRP!&$*T%<$ 0%M-""#1Q%=-&&ES6 ((>7P#38!RYX!(),[U$PLTR
MN(C2VB"JQ,DF+N('.DHM<N(2G)RB%+H/1=LH LTQ%4'*/Z2;_VT3#I+LKR/F
M6(<#8("/_S%A'Y;:QNBV@8P7A,$=KX*5K'1%K)?LBECS4%9"#I*KCH7P(SO9
MWZ[JD9)'%0N%P;*(1*B5K6YU$"?E*F%6&A(/G^CD(R2<5E#JE4.&T$0>06Q,
M4U8W#QQUY!]<2 M_K&*5KBH8VA)2%7P]95[V<L@:+%86^ A%[/L2QT+.QPX
M+*27AIU1+QA*!^,*0\;!\&5?DLDA2 :"EBM>QB#Z",G'-J4Y=Y!1-K(Q1RU:
MXYIB>.,:Z>!.+O8&A$,<Z)%($ 0A6E&@X!3H.+@8!2&0@ 0N!*)NHQ#$*+8P
MBCY%PGRCB,06 .&; \F&%+*)$&%LZ?^RKA$F%RU:PGD,P( 5!,$&4?H!$GR
MA"P@ 3_/:68:FKF?3PA"$I8@!#7]=J!62$@[5^O..;XI%\<Y3C$>&HD.;9C"
MSH!L75,!Y(CV0<&0[0,?6>@%/OJ8#V.T IX4<4<XPD&1:WTH*!N"9S[DP8Y]
M$!$:L6M%*Q21"%JXPA5M@,\]] .);S@ [1(!#1<<8PB**$&*KC "
[email protected]<
M QN'&$4EN"")WQ@M$K@ SI^8T9KMV:*F@+J&*@)U,GDY(1':X,@ %]4__TUE
M44S=%#W, 8 F)' ?BK#!&(K NH!H08W>,$+7%'!6!&$("A\H;%40BU@B9!9
MQ(K(0!:BUH7_G#4D$$%)627"$&-EA"0GZ98 -V*2RMDDL"3)R0NC%;D L4G
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MAJ-R1/1687L2.2 W1B4S,9>T='BQT4$C!A1@@RZZ P_.\6T'ZM*52QC&6<K
MA*RC=LI)AHSM,VI;,1DRL84L1$82<WMAB/\;#!K32)C , 8>.^%A0SAF#S#6
MBM"=<2T92>:-9X@"%[<@C($69(Q56*(2@L@%*7[3-YK!+Q<]988E,&%P2_2,
M$#K+6RJ9MLI/&(T9!>+.;+*FRY#;MBY?8\)Y#J ,'6!"VI#P@^V$ @>("$0
M^-'/<[H@I/T\<Y1H"!"!!O??=/L%&]]<Z3C+H@VCP$-:B*T<3!@%]76Z<^J#
MUAP@;4QC,* !$+60&!@#Z$]TA"-#VC[CXH8<3L89Y8SPR% \7.Q/;;C"&(@
MQBTB"CU@:(,<85!"$<#4ABR\XY\ O$HBE* $)\!A"
[email protected]% ,7Z+V&
MG!@NIS:SYD"WN?+_-O87:$'WKYWVR%1'G@J =!A#%[J0@R+"\(0B!"$)>KA!
M$(*0@2)@NL8/>>NT32W"5">K5Q'1U08Q\U9;=7 BG49KKU(HPVH!F8@H[)9@
MKV]]( =E^OX,RDG"TE?C*D4;&@"%.Z+A@F@P.;1.B79I2^OI#Y86^=2^-N0B
MMVUQEN7;YPCWB+'!, Z3;BZ#..@V6Y+!;B91,6&1?!;!#OC0?@5A#^0A2/<F
M&NG@#>>0"ZP@2[F0#JV0")-$"I(0-^)E";9P"[8P"@92#$##9M64"\9 ""IX
M"[V0"QMV/I)0"8$ "'[#';I4@'9!&&^4,'FQ.(-Q%2SR#P< G #9@_P.0
MD (MAP1)DB3+Q 7-I!]<D 9T$PA?Z#1&DW!]LPHQV" 3\G^X-1=G%##@@%@:
M Q. ]70#Y#\R%F,V1GJ8XR)_ AI\@GFP!4I=D9#-DYEEV2$> YKUVV+078;
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M:MA(*WIE6,&B5P91$1=A$#R4%39!0MHG#XXE0$=Q%.;D#MK@%6IP #R0*+1
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M%:$-'7 T/ /0> $G?%BJ'6A'
[email protected]\@ .T'!MZE /0%%'^/)<C46(
M>_%:X:1M$;-_X\07A8$/&AD78:%DO8H8"Y(+A'%GW.$4=4$;,C,XV, RU[ *
M3LJ225--'(@)NQ$@MT ()Q@('%<@@X ).Q6<>F,(R9&6R&%*=Z9?=H&$$P(:
M:/I_3VF$??M&T$ >^W ,)W<!-? %+K=,$9:%S30(==.X61 (@[ %?SH(M=!*
M@G --8D-.OFTW9$7>G$_"M#_A.,PF6=1,7!8?/$0#KHP:.TT(NY4(G[V#RP
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M%L?8 S== [O4 0+<!Y2X'5+-QD+R!-!A"_AXEQ79W7RM VZ( &UB[U_26.;
M 8GXH&^1( K'N00TRRC0D NND@^-%!S%X#YRDCX]E9SXI2>U( P]172M57Q]
MZ;#.-0_;<!4.0@[R0*QR$ WD$ [1@%3_L"7W R;A*UDTO^[!T(*^ .#L4*
M_T:NA6:NN(PHX? *U3 "^"!W3^ $;0 \;) (:O #)]!58>! L))I_0JP_0.P
M3]>>5,1%PN<H(_I\%M%"(UTL+B81?817&-%J"@5#LU96P3(0V&(/D(,MOR9
MYQ(/T! "% -NN $EP8Z-5'2[\>I/3Q:!A$2)\%N];(1:P<4;L=:'"*=FW*/
M8.0X[\ 0K<6	-&&)FFZ!8;Z49;$?*#LD0;K"'&LA$:+9,+*KFDZ,4W96L)
M H+&94L*F. &I#"E?4,*17,+E2<;QC$SR,$W8D@@/[C%=?&Y=G$XAT-T;J1M
MB>-:;(AB<D%9G:4! & "F #25#_ Z"4!O?13(&P!I&K-]?$"I'K,Y'K-$YC
M"[; DV_-36\=@YTK'O?@"@@@-K3P#F!D7'"8,5P4$U5WA_+D7*>B"YZZW"4B
M*@^TW#=+&>?@9L9A#HPV.O;@ IPM-@E 1?VK>\ FK?$4YPL)Y,'/\G9297
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MT<L&< ET 6A! 0V9PM^VH6 $ AZ0ZBD- A2DP6#8 AIR69$BDV3E NG#.?
MFP^*D &P4@+O\ Y$ID.0L2S %IA8)W7O!+O.M0^C"KN>^BH@("OF0AG>( I<
M%QS, #1>HPUJ V'L I?4 8^0 ()X $%X $40 +?F02, ZXTN_]206-PHX R
MSXNK.?6#\' /7W MMBP/J$,:V&4<M02 .6H490%P24GGN7 _X?PZ JV+
MKDLB]+ . !&VQ -V[ $MF=[B8 ,NRD-F,*O[=F !%N0U0AJG$96@O9[&?0H
M$0L1;,4Z[@ 1(?'-%ALL+$%K+I%7.?&P?24M#?$/T,"$]Q .I?@/3(9K,3SS
MFX,C5!Z'CI&9.11$3:WE)A$4X-!KG0$ML+L-3V"[[D &RF ,N[D*QC"]<21'
M;-H=$F\.<J(*1O,FJC'@LZ$:CR['B/2^Q+D=PYD+*L@*:*SW-L/7*<B2BD\*
M'-?G@7\RBKZ!:IUNBQA.?G$X):88"U/_%IW)Z6&4EXFI"P! V 4%0!EP
M!%GX3*H^-T1I-_!%"*8D-;M1"4G3-QY&I&V)Q@(G'@R9*$QX'B70!O8P%V#7
M$ /10:#);BE4=<8]=7F(R^RD%/", V %$]<F%M8@#)/W)]2L)[@ X!./#>(-
MFJ\#!#> 9'< !D0!,! K%>QD/$@6Z8AI"SH/KG@!0 !#APT=N[<Y<-G3J&U
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MLZ1+7C/YBUU6Y@Z"R>LM9N%+1N@EK[/8!5]_,5D^&,,# #C'JX QC_V(8^)
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MIS9F.&I_\B"',;H A!_0 GPP-8\S#$.;&!.'Z?SL6DZ0[^. # B$I%&$6BA
M5 46M3W&Z"+M(JBQ?:3C%02@ &/J<8QHF-5:QX TQ$PHUW"5A87CLO1-9LB5
MBV"%*C+9UPJE,B\JNJ4V8'I+/NK20[W !3",'>+ ZK$I'P! $?] !QPR.P^"
M*51?QC(-_[GH]2^[U*4V?T%+[&!2)C$9Y'0;RJ\X+0*FS"DQ@KB;S3VZ:D=C
MQ,,8AX!$+BQQO3V-@L"1,(1U&.FX):,2;2*IQ"654Z1(MF<EDSS5T@B4GJ6Q
M,A>LP 0K(K%(6Z!'I#[;SGI:V;;EY,_A:,SEW3SD#E["(YX4F[;)\**[?V0
M !F(DA<,)PA!(&$02$ "*1#1J',(1$*B48?\)(R8U-K&V<Z&AC2"DX$%,.4
M&5!"&/(VLK6D8Q HL0<XW)$I>YQI=\K&B31TT?0;XT9E;[QQ,)F.P]48AB,@
M_5G!;S$H]ABU(ZTC3CK>,1Y2E'N0=7J>-5)YMEP(*A>$RL78S_][C6NR+1?@
M^(?\^HB/@4!#.<S0#EZG%8UM4.ET\_@'.W:CC]80IQ[X.(:>=Z6<5Q5'(@ Z
M#I?0=). XB0=[2@ ,;Q#W<PFM'0.(8KD.'Z:*C5*9Z=JU0\.Y:X3C#32JR*
MO3"B%^+[52^"W4SP"6:R7[]:8(J%R[$)8\3I&W%3N0" X 2!GE($8X*3746
MA[^['$Z__*C6<
[email protected]!Z9*T988F%27)<
[email protected]<C>$#+QAC&]!0 D%H
M)#XQ-^,*A$!J)/%B'KPS!N9X%.9HA4-HCPG\"%-IC^MBFZ79#BT[KY Z&UP8
M!%
[email protected]('NU0D(6[KN-PD/>RO(I3+=3_\9#:X"6*F4&*@PJP< E< 8 #0 E
M@(1F"@1!( 5)D 1+N*1S@*\/H9>A Y&101W!8!)%> $). 2D8 @: -%N >Z
M<,+7B(<&LS^7T 5I< <:<[HNVI0B@!B!LCKVFR ZT@4$8#V#Z*$XNKSR<@[U
M*"^1@H\N$PD*84'B> >U2XZ4L,!G6(_K8 9;\,"Y4Y ^8ILTP ;B0 ES> =U
MF =]V)4C*Z!ZL)1*N11%J)1C:+S&HY+=T)3=T(4@8"N.@)6)4"]CR)@7BHE_
M4 =Z: $ 0(%X" =72 1%B(9*T85C6+&DL+T3ZK1.RS1,:R':N31.$S6WVJNZ
[email protected];Y\ 0O _W"U?X$G@K&G(_(AZMN4!(@!2/B',%"$4?/&'Y*'Y,.-JXB*
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MK7RI"E.;EW@A/E!C+,&Z1F[TESK$B24 !7@"T20!I?H"VUL"Y< /MTS"^_<
MH?,+$<*(QR@\H2])C"IQ!V, !XOCII&!#3"!K*G(G-K0G:J(B<YB#'Q@!@((
M!5V"J12I!$M @C0@G/X8P.0I!NLPFZ<I!N;_N$KSH!KN,)4[08E\"XF23 ?G
M.*](P+*4$!NSV:[)S+L_0D&WJ;"?1%*H>).*,XC5$A_$8+Z+F K0P@EMN0 ;
MZ )!D 1"D(3\L 1CP 9MH"\/T<J@O+ S1M\DDY=8((B6 $,N ,8 $;"(.'
MN8>.>8UGRQM[@ 9[PB><<#$QP8UP\+[/8+QC**-]N,V!,A,X6(#94;556\(0
MB8=4J(65O(:5U#+G8(6QFR@439IBJ([P BZ0,$FFVLR=D0C."Y;CR,/T\!Z1
M.([5-#)
[email protected]:(L^H=Y^(EYV 9M4(1$2(15D ,Y@)APD( VT(9*J11H
M:(5K*<0^:D!,9,.,_T&6A0(# "" D8"&1DL*Z@RA8X3'LL#.:-3.9;RT<]6T
MO# +9".B=?3&?%C"O_ 7\^2AQ)*7M?@';=@ &"=5D"'>YB-O)G7D D+>(H+
MZ2,>Q# BM_#&V0"A.RU#QT/0?CS,!D4CFYN8>G"YCY4)\5,9^Y.S<D !%+@"
MOM &J30W+R <0Z"FR%2%:P@$%:T/JA%-,#6)\:BN#*0:T@S)YLC LV$;]"BX
M:U@%G70P]SJUR\,')552O##*$($*BPM0HX18=B 'P3C%!P" #["!(! $2"!"
MDB.$53 &,14(<'I0V("3TT$_9R.M#U($',B # !$ "QYRPK@LTLM]S3QO^3
MG=@A+:HCDY@X!H3"G7]P!7#8PKS4A4"M"2;)%K,@S]70"'@@6F9X)4W%CO0(
M$(53#Y,Z..<X*6+@+E$UKYTYAT%,.X$@*J9RE7< B5@9(),RAXTX*J.R75@)
M%GGIHJZX1WMX@1<@AS8(@R]X B6 T58!7=0"%FM-V. A]$C/=F"!V_0 0 (
M 6"UEG"=EM\Y1DVSJV5,5W2%J]Z3B1E2"U"+BG64(8.X$KCH$GZY1L.@&*T@
M@@(@@0YB@F@H6![B(31A*WF C?LEME^"T'C1H=Q)C&EAM! BW"J!,S1MK: T
M#' X$G!P#=R8/*Q@2B4*O%Y( *8!LXQ!DN0)D/_ ))*J-E*Z(_S^C?X^#?O
M>*Y8X:./J*2]DUY348<LJ8AX\!PJX@@AKC=L.)M*D(160 12B;FG78RGE3.H
MO;Q2D]J.93YX:N#$:#1M:#RI4P H 08((L%81<$(1?6856@ 9M0 =P0E!W
MT :X=2>+W:![DCI+88+B#8*@@P,F4 0VCIV-Z<) V#"FHEI,1. RLUKVY27
MV90\#E0I2D6E$"AV[+J-, 9&7,R0RC>BS<#UT([27433-:GNFLR</$&KY#S=
M-:I\N >$F ASX AS"$E:CA7/&T3_@;#\H1">68X28PPF6 %.$1ZC".0O" =3
M*4DP[2.EFXN_O%:7.#T1_P" :=A-#HI.;#&*\5U7WCO?]$U?=8&KK& 7L[@*
M:@R>>%'&;KS3\]R77ILJG' '!B" -H$&B$$_)+**N9@*\P.+54-3>Z54 34B
MJVNZ$")%;0ZA:>G'JFTMO&"-U]"'!K$X.=N4-#(-SI"MS@H\92 +B%S#$&
M3,#(Z$@W&":%7O&9F^V.2&JI1&DITOQ95Z8?BX.'?" .S"$J=: ??3 \T52.
M!=T(O)B*G*97J;U!*I9:?( GMZ!7QPLAQC,H$&"* E@!)J %2/B1LT6)-IYC
MK[RYVX =;/D=@XH62UG>YT1'X0#&,?R'TZ$+7C-8V2&]: BT99L@78!DV4H$
M:/]0O]G(E"?Z)RDR*!CK(DS6BU/#!V,P!-,=#TS-0*BA&KU#O/,:A:51I<6<
M[+WS+5:8*$1QW5J>95J>Q&KM7=5D'=.PN(.!6EI2HS0JH']0!,I2-7>0HEYM
MIY\=26=V$!S<JMD !T.; !@A7K8YH:NSFTQU_-U[K%@H=S;JF0,F%;3B^]T
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M8 H?$!Z[;.CQ=:ORC<;=X[WH9D9*F^ZXB@K0,KY=MYCO)LANM#]=( ?< 4<
MD E4-RZ *?E2POY]@M7DV]]_\F;PT V8CF3Q@M&=X@&1@-75U@\<%*ZBI-H
M&]2F/S,/9X;I2H*&W X'S].&R*V4>L &)" 3[#$\*B$2E %5A@:ZV"/(&L%
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M!PDN0UW@8(U[+(K3&9!<!0W.L$A"":&"B&;8A3J0 D\ !V3 ;3CPHG1 0+(
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M-/?EMQ^GDR&XEH!/LQBUU507.#5?_J74'W]=3V8AAG"UU!8'![
[email protected].
MO:AR""!.:3W)G:DYV3TCC3.YE%-E<Z>84UZ$>3M?K4QIXTI8LF:E"PY*4,=.
MJ/'$<T\^X$!CS*#,>9/,EY\SP@TWY0P,SY\=[J.-'(J$-<^^AQ#_0 XAK5R
MB"6B8&) !>+NHQWA^NPC#0Y.7%-..9=>5*B_FR&$:2ZX&&K09I94(I$MAEZ$
M:7&DLJ2-Y)O:Q*!+HUXU3S2N)#)45N'.I(LN0A8U5#C2N*\ '+[:&DXTN@BE
MC5E7^:Q'/@H@@5Z2IG"D8QS6X 4WZ+ )35Q+'/OA6EZT,B["H8Y9O4,&'+1C
M#U?H(QIP< 5;_J$+9,SC'_=XVXSZ1B_+X4-GRDM-:PZ&,-G(AC8Y-%C"6),H
MU4P$(K59#J$,0IS:Z&9@&,N8#!.B'.J XSO&D8YTH),SZ+PCBS=;FA, D!!U
MC*<VV@A9%-]QLYW-1F?8 <%];(-_^TC_QS:6(<0 ! [4K2"&:Q@&G[V(Z V
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M5C6J%9*0DN'+U*;FMJ[YYY&+I$E28R8Y>R2 GJ0 NB89F9'%4>B!30VR9I
M*NY,;FXS"9P\,!.^&MFC)M%%:G-E\DG4+6M(T2B2*UHQ&,(815:ZH,7_OIJT
M5F_\H1.R^%PRJ$&ZD@4GFN;%QS335,UH$.882FBG-@@C#1>4X1Y*B 8T7&??
M<;7E!H19\#YT$01"X)$5\#2(I!"5D5LXQ"*Y$(TE6 &ITLQFKI1;Y6A;DBIZ
MI224ZI3L,83U*L&(:BT3Q1\R%F!')80A#//HZ+=J>D&;[B6G4DL5H.!Q#6],
M0QF\",4B>.%D)Z,T%EW:XTQ[_"-7D .#@]N&*^YQCP[=@QS\<\>[N.P*_FGC
M'*"2'#
[email protected]'DP\X[E&P6*SFXDQ3& +N:$YS+A#@;%B8,N!#CW,X8W1&'HN
MYB@&)MZ*I8M%4QXD&P]Q= ;&O(;L.%*T612K__@<;?QU#&4XAUP/:]>9E9H\
M-TN.0*^;T^"YSWVU5,4DLF&&S!+ LTY#Y+9(Z^NH^;JT3UL6(A6Y6@4]S5Z8
MF8PC13NC>.B,C&+1!1.Z@(-$/ 8>[/#>CIIM(:ODY$&FLM=5PM<WO3WI21B*
M[D&ERR-FS<,P8<$REDWT#Q&>&0[1T$<ZRM&.9'AI%\GP13646#+SVJ8V0WSB
M/PZ\CWO0HN%(2P00* *=:H3&@7PPD[UXE-D(."B]V!,'(U!"$M(BA00N5XZ
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M%P! "DA"NC08*-A= )F%NH2!#2@ !A _2W+0;""/#'#I"Q*+M0.*728H5Q/
M+M3":A#'E5"1DZ1;AJ0?SSF23MR$' 3%? 0)2@Q=57"%JV2%.KE/$+3!/^
M$RS! EP .? 8@DV3FN2#7&7/*JA!+D##/K!#/O#(@@ *=9A#+7B",HB=DW$#
M+RC#2HG.VG$#+$S#+J# +*S$@P3/V\#A +6%K)C(PRU&2!'&$X0!X5D$X7T,
M^[69.^##/YS1#AU1&'45#O&9G-7&Q(R>>"B1P6V>_VAD@J+E1L6<GJ#-QF:$
MWNCE!CZ S"2!#'*$1PY92GG %7+X7L=D6CTH3KM(SJ9M&CAH0_ IUFRT7J:Q
M0PF%@RO( 2*0@A>D01)$0B5P 1* 03%
[email protected]$F]:T13UBC3V&%M4@
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M.2R#)Y J RG9:"JBV(D=2JDF'<S!JZ( 8R#/H1+!D%6_UNX@RZ0$":BI-LX
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M- =9!N%9*MZC4,G.=-I:LD-;^FVZ[6F*.1*?NM;1Q<30<8NOK(\TS(HKO +
MW, +!$$8Z$(1+$$F"<(J7(J5O.FE2 HP9(]Z:H,^.!:JJ$1P>"8WR,+8C:;H
MM*ZJ@N;:K:8FD,$<1 $*1('M<H-/69VMJI,[0 -5K)BSR$1W4@E%O%XPGE'
M2&L./9YB.=Z=<95H((PM"E'2#LPZ:.O%"(H;7$-XLI5R9 YNB-X-1 P*,<V
MGBNW.J-MI4@]!"\[:(<[&,,YQ"SLA4SAM9YYH 0M=$%:/<=W/(=>)>-WO(/]
MNI4Y,(/_* "$J#!)7A#,11#*31!*61#-<"C.5BKH2UH7VP?/C[+N\4$(_TL
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[email protected] 1^Q%1PB&H,;(7D?&V[( G3W 0[U>@QK5*W'8+QII@ST@ PX PSL0
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M=-3#,#V)G?;M^A'Y^, H0JG%BD3#5!I#(HS)MTA#&(R<8+X !K# _^.R :
M &O? "LG03Q!@B58 BQCBC:R1&6L]2'%4-\><&R49C S$#<<MS6P'92UU#%'
M 1W0 6O: =JAG118J3TDT#B,0SE\Y3O$!6.T,;ET2#T8$>99"JCE[T-8"D0L
M1WB@S'-6KQ)1FJ&MP[Y_H,&9PYMF@C%H0W" Y\!LYW# 0ZHG00+\$CQ 7[,
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MM.7ZL9FG!+&*N)):[(A/)4(HYO$ X7'O2 ,"2 (/*X+V$#OG[(2L,&E#PHX
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M9"C-*K3& /^!X P@'_QV+$#IPY<8\:*M45FQ[AQ976)W276K!F>/G;PZBGF
M?*]>/GWY4*=&;0^U/'GN&FL#IYCQUW3J&*<#=VYWUK!/&R>NAWAIN,RNW;F+
M-]R=ZWK(W=5S-\]U/GOR3,L;7B\TOGC+ZU7M.!XG/GTZT>L\G5H?4=;A_W'C
MP]G9M#Y]]=+K]!B2?SE\_ODCR""/AG*OJ']::>4L5EA!RY9*V,DGJ0F/,LK"
M"MU+*D.D[.$.GLTNXVZY>.!)KL021:Q''^6:<\V>H9*S9YY[_DE$C6CNV><?
M"CD,9Q]7%'A A= $$/6KX((Q%CQ@%'F\_"B\<[?+"+;2';*HL*FVN86489
M:[CA9AQFF%&&FW*XZ6:<,*?A99II8EF$%UBD"(&,16*9AILOQQE3()O>V:>8
M,_M,<TTRP[3&&G/^^8=#]]R!9K9W/B/QN^&T@T>=\<):J*"KL@IUH%$% A6;
M<PSZ1J*)"/I(0$RP\68@D&ZJB"*$*L*F&%;<H/_&%%8P40,(@C
[email protected]!A'
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M=&0=O]E#&M((P@4.\($OV,,)"FB BQ@ 1N@XQZ,F4K-@GG,?+C/=KE#53HT
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M4GX-DJ#TMW,/> VX;<DL L^%+=[&;B5N5]!\6QMX^39>7))71T$ P#U. !E
ME:AB[E!'9I23C^5,R4,EDMP8@I (:!SZ9^TARC:D$8<D;/_ "MHPRJ@$8ZB
MA.,%-X!$-,B!#FI+.&<Q6M'-NIB;3;V#('WRQ.^^][V"@H\;;>+%%>S O$5X
M@A=F(A1!H(*TK(D]:^48!YAV3$][6B,9008 0BPBW\4:&C?;I%[ZK$4+V+%
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MI:"^Q^SZA"#*H0_S"1:R#J#L0$X&RNRHIR 0ZB/NP6D^@BKPH<? 1QGTA'C
MA!G*(1;H_Z P"" *Q.$?PF%JD,.0#*E#-F>=]@A^K*+/M@0LS&*(K@(K#&(=
M].STH&N G@M7#&(B*(+**L(<O"%_,H',6"$3>"A!@H40#F&G_*(F# @GP.(V
MQ".I\@SLMJ1;ML<I<H$0C"$>SNL'P2L>;N&J)$'2!$$0N 3Y.86QB$=ZNW!
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M'L*!A.2!'+3!A[2!#3$C'HC".C+C2<;/$6\C'::'>L9!#WL",]&DZGC!#NB
M#/[)#F A%F2A%W!L,^$)'Q91)Z1$2O"!'4#B2_;$3.Q)3#*3&V+![5 @"E"
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M![QVQ!VNIOUJYL(D)AR.00F60$6*)CDB9QMTX1 V L8!4"<+' (3IHQW L
M<&1X,#A8A %A_^.-0'0*S>$9^N3%IL[L%*7J8D$*HB &HD (Z$ 3[" 6!NHR
M3Z64=$+DU'1PW %\QL$3Z&D<4G-ZUJ0*WJXWHV .E.4RYLMC=":>[BHKRJ(?
[email protected],KP?'$8G"$;FF '=""5"H@_O '0K(&I=J(B;(H>)B\3,L$-6H$I
M#Z$5UHQ==8H0R"(.5.X0>N&DGK$C')& PE56S*$8GN(@_O4B+ $_!0$;HLHH
M)(0HUJ,]P@$;H"$=+G(D0D597L0>$,$+""'0P)4>FN 2BF$4#&$-D@ )2'8+
MLF +5*U>&J1>8HD4_C%A<$V++&/\($:+*.N7+&8I%@8T=JV]?JFR)O]+C2R#
M17UM,6(4L\#! N=HCIQ"VC!C'OKKN_;!1Z34W+S&D^ZC</)A$7_4(]Y!)+J+
M!+TQ81/V6DS#W&:K*)W&2GW4MLHMN<Y#:7[T/,(F2P7'8C[$L$I+."S5'<(A
M&MHT0S3D38%P"!%,+*4A&AK%%3*@!&C &*)#L0PK'9)#&ZYE"B]#'[9A:H/
M !)@!DZ%':!!61=C"J<0&@)#,IL#</+T%%LT:ZB"%:3'$GG569D!3-"D3>@
M!5 !J*@5,F #F!!>A B>W3"<8:#1!C00_#!$_(PZLXN>A^"&_P [H U"F(!
M=B%FL."H962)UHIAK4BA9?.*&9YHNP;B@!3_[Q<CXA4F #$8"<*KQ=32>#B
MDR+6(1/ D\S,E2D+AA R[Q T[X$.P2O2(1>@H( W0EK!(BO%@U9XPJ9(!6!#
MA09'81!8(0U(01NT)9>\"QH(X5Q8@0OX96!O 5RDHRA0]VVN 1[H00R,8(6X
M@&218&31(&!$>):8E4$JX66MJ"$=0S.:;3;^+R&-V'8V(XCQELGL[T5%U$G>
M2!N\0HIE QI:R2O<P6RGBN)TA!S^@0$WJ0.5:SC 87TX1T. QX. T@Q26&U
MI8,+=Q]*@TMG+ 631CZ2"TM=SC[L [FX%&XG$#1$;IAV33'RJ'03:R89L&<R
M"E)*B"N]<@BO97/W_T$:$H !6. %/H &>&!DI"TR1F\QY($Z( P:HN&478$#
M * #@,$KSD&)U@T;+JQV+ 8< (-' Q"11,XR'B:,.D(+>L'LQ$28P<0;B(<7
M^BD!>#<*R" *_$D*IN$RO_9:%M$U1F0!$V?D\&$6B"?$HJXSPV<:Z* "&!\
M@E437%59749CM2\MS.46U,)<=B@'+\*I4N\5F^4[\0P51* )FD#QX&)^C:$;
MZ*8CO&$25"5_S[42F#+S$L$8$0$1+.$01O<JY*P:K0(K# @KF^PRFD4[)4)6
M=$542B4K;($09M"*#6?>X)0HN*,5DH#W?,^'6.8"K08<6.$3K($>>H #D/_@
M!Y @"TAV9+? $-!@AA .,.IY6M2@*;$*(!LEJJ5ZJJFZJJWZJK$ZJ[5ZJ[FZ
MJ[WZJ\$ZK,5ZK,FZK,WZK-$ZK=5ZK=FZK=V:JG7$JA'TK>FZK!/FKO$ZK_5Z
MK_FZK_WZKP$[L 5[L F[L W[L!$[L15[L1F[L1W[L2$[LB5[LBF[LBW[LC$[
MLS5[LSF[LSW[LT$[M$5[M$G[K^OZM%$[M55[M5F[M5W[M6$[MF5[MFF[MFW[
MMG$[MW5[MWF[MWW[MX$[N(5[N(F[N(W[N)$[N95[N9F[N9W[N:$[NJ5[NJF[
MNJW[NK$[N[5[N[F[N[W[N\$[O,5[O,F[O,W[O-'_.[W5>[UE^]:D&F:C&KX;
M1;ZI^JZ]VKW=>[X-PZWSFZS[NZO[&[_W&ZL#?,#9^\ 1/,&WVKZOVHKB>[\%
M7+\E'+"J.K__FZL+_+<O?,$-_+T[O,(_7,%%?,1'W,)#'*HG/,(I?*HWO,5A
MUL%3W,$97+__&\9I/,-OW,-MG,4'?,91'+X%7,6#',(-?,=]G,21/,FG^]:L
M:,,G/,:AG,>MVLB9O,H?_,EM;<55G,(+W#!,/,JSW,E-W,N)',RUO,C+?,6?
MW,H?G,R5_,WAO+GEV\G5_,S-O,Y!O,?3_,OK7,@_G,_M',NS_,ZO/,HO',<1
M/<W!G,_I/,X=_=%W>\Y/\1S/9]S'&]W##5W/L7S+);W0 UW-*UW1I7S183S1
M,?W3/YW1)QW26;W5VYO,W7S*3_S0-1W#]US1MQS52;W057W-1?W4=1W5<]W/
M3QW0<]W5D3W97QO00;S8;UW0Z[O6B=W,I_W+31W*2_W7/;W:17W887W3-?W:
ME7W<R3VUCSS:>;S+]9R^=;S707W=2;W&Y=W7VSS0Q5S:UQW-<7W,QQS<._S8
MRSW@!7[@";[@#?[@$3[A%7[A&;[A'?[A(3[B)7[B*;[B+?[B,3[C-7[C.;[C
M/?[C03[D17[D2;[D3?[D43[E57[E6;[E7?[E8?[@ P( (?[_#0H-"D%N($%P
M<&QE($D@0V]M<'5T97(N("!3=&5V92!*;V)S(&%N9"!3=&5V92!7;WIN:6%K
M+"!T:&4@;6]S=" -"F9A;6]U<R!M96UB97)S(&]F('1H92!(;VUE8G)E=R!#
M;VUP=71E<B!#;'5B(&1E<VEG;F5D('1H92!!<'!L92!)( T*:6X@,3DW-BX@
M(%1H92!(;VUE8G)E=R!#;VUP=71E<B!#;'5B('=A<R!A;B!A;6%Z:6YG;'D@
M<')O9'5C=&EV92 -"F=R;W5P+"!F;W5N9&5D(&EN($UA<F-H(#$Y-S4@:6X@
M=&AE(%-A;G1A($-L87)A(%9A;&QE_WD@<V]U=&@@;V8@#0I386X@1G)A;F-I
M*T[.UU%(5"A*3<_,SU/(RR]7R 820+N+%8(S<S*3@8)@_95ZH !T*\K/!9OO
MF9>67Y2;6 +2Y)B>JN!:D9&9E%D"MSXWLR2C.!\8@GGJQ0I^8'6).4"+?4N+
M4TMS08YPS$TMRDP&NL,CL[@DOPAB/B^7K2V27H6 C/R2?(6D2@57H%H%G_R\
M=&# .><75!9EIF>4 'UL:81L%] "S[SBDLR24I"%0*4N^0I^^24*0:D%6N 0
M!,8K4#$P'!3"BS)+2E*!-J06Y686%X.40QS R\5@#0!02P,$% " @ ;+Y2
M'PKT5,^TD 2I( P !&551215!(3BY'24;LFO=7$]@3Z-,3>@B!! B0
MA)90A" @59/00Y$NG5 %0:4*(NNF@:$G=!"D Z(@2+&!&ZJHB*&(B,@"HH)E
M%[NZ?O'Y_H?WXYL?[@_WSIG[.7/NS+EG9IQ<'"T.1*@"EP!? 8#V>[O__OOO
MUZ]?1P8'V^KJ_EU;2XB*JBLL'&EKXZ6FD@F$?T=&ZE)3+<ED2P*!@$32$0@D
M $ ,@ 0'<ACXP 1#'H! 1@I*YPI+N-84FG(\G_SJ[-=H]T%];QHE*C+!E+
MW2,8#*:.E]K-BR(@ 70R$HD T'];)" *>5&_?GV-B@IB,.B\WPK=Y70ZF?Q;
M 0D@6R(90?3NP>[RNO*U?]?(EF1Z%)W,(']=>V5)()]A!!$0R+6VP2!+.J^N
M'$DF+/TF_PUL:3DRNT2VI"?PRE/;9H-XW:_^_3JR]JMM]BN P"!'=2,)EB-3
M2Y:,!#HC"/E[A]'=/3CK'=567C>"H+P*BBI$8L\L+:V-C$P5%I9W=X\4%M81
M".3?_B"3&11*%!))().#D+_O(R0@D98 !T)2$V(*J1;1I$)]+:Z$3+!DI?:
M]AL_BL&K*^Q& @CE]%<)4:D\\AK#,H@7E< @4\@(Y%)Y75M=-]V204;0@QA1
MLR-+O-3"*$8"+ZKPWU?_C@R.%/(*UV;7Z):_3X/(A-_6HAH;6UDLUJ]?OP#_
M7_[?B<'_7?YO+ 0>P""!,ZYMW&4BU#0"YGN;1H_A]1DU#GW-4\68/?W+"/B
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M#U@CY1^HKFY"GCI0IYIS8O:?3[8V+,^"Y^KK8"=&)CC&
[email protected]:AC#
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M@&_[E'5^?^H/<Z2K"*IF[.BH8\(:".[2P?E\/BT+,FN:R__[4^G?6Z']-/;
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M"QFR>U[[C-]I8-90=6W#XV-M\F;Q_M ,72.C,QNS^YN-QJ73#I&M/0*5 SH
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M$<T<!.'=7.-L4]1$_,('TX#)JZN0>
[email protected]#]B_NJ;*_;]LJ1G045%HE?
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MK<VV:<G;W\(I%]_=ML@:O_#)F ^_:J'UYMC8MH(=.CU4]51&!:'$-:)807.
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M=1:HZ%X2X\$V2WJ;-7.]8Q %FW<MUY'_:EPWW;%B/;MWJ'7K$5 F</5_JR?
MMN^P?=OB(M6"N4QVI^I34ZFK$SN[!!Z?8!_'76@>10M-32,K,YK[99[M529M
MN<(D2.9(_O.N??NP%>UX5#U^T'/CM_/,VC8YF$T'KKA1ID8SL S4^62 &R?V
M2ZX(W-&967 14!^8; DS/PAWXWEB [6:PE6!1B[=&YF<\]X%RWQ95C-5ZQ>
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MMUZ8/O@X(.SI5=NP0T$ :Q)O*:"3\IZ5,3H"N=EX !VN%LTXK5K$)LZT!KO
MZ[7[^N?(MA;^=O)2;B?'<AID\P1L&L?5JY:2HXC](BOC$[<GQR]-2A592EYH
MUXDVW+YP6?.E5MSV=9+$.BNXB%Y7\6 R-'IIY>YUKQM\,K8)'OA>UC_!S_+#
MT-J)M^I<>!)+&P-$731IXA6D93T8WKP$72PU3^M\71^4+_L"4W1G;.@DS(ZW
MBFY5D&R</BM3L\T:1X'YER*A?U'2"M1^G*U*@EON\T1G1(Q=0*A02WH._4J5
MN_NWGQYC&'7EX=YYQRPKJOI)\%'_&?Q7-,WXKQR=.D@^E_B%5*+"CX(T;]VT
M>/Y&H-ORILXPS[SF(>&:?T7O9W@F ,]/=XSEP05 N6/@85D&I.[=>E._31*J
MWTO[:9P=Y&15@/G] L?]FN8'#A$]H'=/TDHQ-7$%)=RJ%YT[02W_/ELG+8KB
MF6MS1@%/%Z\S>#F"!L%UMB=H,DD=)JS)^#7L_LL&>:YV/5E#20Q2NZ[(""X5
M+9,/>PDBGB.T=P&??!JAIW"UK.O/2^FQD3/"N/<#JDV&$WB)]DSB80G+)%;!
M24!1R6?X+ALE^GQ(0N/J5]RDF6I[=IJY,8"^K 0.+H@Q<N5\N+>GM@N .7=6
M[B/]=\IHHQ<HZLW;KE:]SY<%@K@W_CZOMR3SRD)6?UJF?_7\<^B-[8F&VI<&
MFQ3OIR:A?X\^ZW-.8X!'Q,RVYH.<$"$')^A0UU*W<\[7C' 7(3@0PB!XL_.G
MVVY%O%E=^Y/>.&EY-MG_5VGTC_\N+P,K+("3AU4*CT8[,+?>GF(I9 +DEUGP
M.%:A(>0Z@$_-./B)Z;,[6V^9$8?6FWX908"IP]0:RPB\)B0!$C_Q+;=84>ZD
MY%MCWQ0G#3GU37S6Q ?A.:.3F[WDK0\RF'UV$Q:2PGX[1"/4?/[[/$U V(>#
M_N&E%^?,Z@BYG2;Q_N6#*E(H(&UN3R4G 6,0OCE!3IN<K1B(CX_;27Y17$D-
MBIL1$G,*RRU3![80IAWM57:<YL(1^G/)4@MG$21/4R=/PX!Y\*RI"A35J@VJ
ME%9&Y>RZ49)[!@@^*VDA=\)O2P=ROIN]7;YZ=*%'[0SB+3Q;W4*P8#V9:ROS
M!?DGGIY;"*=OF22FZ2+/VR D9-ZR=_'GK7_WX4$+\V!V <ULG\S&AN"<4[@'
MS/A[5 SND$&X"2D8,?=5U@L2"(QZD>K!002P6%!)BPLL.YPB%7@I.<+9/YS_
M/OQ(<+IBSM$+?PAY469M.4Y!03._>P/'5]/M\::]30[J; &;J!K&]UU")VOK
MY&+WUB;E(6H!V5LT%"597I0 2G-<QMCJT7SPQ\MC,<&)$VS%W)XGI[0K R.G
M@(G9?$\01*Y\ER4GM_N%E50X[<D!1XD:0T\EVLS;X=.O1K"H3R0&^.E01:)N
M(!])=8)3TWW5U0C&HEP-%>5(YS-2/ZGP;*W,QRBB[817N"LS4R3$(A#5TV=_
MS["->Q+>-@H5)90L(-[0MW?P3@0^K>)(:&:LPU&[50"@M-FV?"D\\9L9/-AJ
M^9$C/F="VT&:*)AC*8O[W@-#@U9I2Y$%[[!PI33/2D5A=;(YA*?.O]4:F%&4
M?$0U?K+)WC\$T:A]^_M4+")1-S&)@]#=[3N_AY!%SO"KP25-W+JD@Z6>^-/9
M@'K@'U=I:NE/DK\BB*^SQ#1846Z2L(G:C1XC''J+!,"M?_8"LK\)/Z/NX'3Q
M_3(ND2]\V;G2L?/>=FEH.E%"TE/$#4G#O_&[%"BL.&+U>>6)3$/W4I-:XDS$
MLN)IYV2(E/B%F1,XF(^GJT0XWSJ'+C VA1.+7B!.K 9 GTQ_ON2_T&ZZ% 6
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MMRA"TGN:JX2L@OC(T '6/8W#$B,972CZY0E3<*#JF-9A^=ED]@GLU-S*8!\
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M\*Q1,/O[HSP A+XGBB!\XLF[&"ONL4,F52WH 80BUL ]RP@"!K>"VQK-=2]
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M?4Y!:6RGB;0-0TB)%1@!>M&A?GT2$SP-56A&9D28(73!M"608<S!$2 >:.D
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M8G\:I&"B(TBEHWB"DGYIWH"^AL.J6.1*+HHIUH9B, AIY@;^.P AN V#1-+
M]$#-/0(
[email protected]#A7R*-^JQBK(+.W.,8!$L(1(K!#NXFY&/-_-.L:OW@2/>$&T
M2=!3 :$@1)O.O<'3=,# *H6P#A$8>$$AM,!AU4\:C($00&V;?F]I_(&!7:T8
M[MC<<NGB?.W>I&.$?<;2,M2*G,;4U@BE;1+4K%T ^^^<ZFW?$K !/V B!B@?
MM^\#+N(9EM)K5'$:F(WEZ@;!M-+';0!L?9P'G8 /6.H#F $#9!6N&41+V(2F
M!D6G/@0F6Q-+O YW^$&1>8P0OH'RG'!!7 069404#2/2-0;Q^*Z"@8$85,1@
M2%U48H70%N?.!( 5ZL<5?H%-Q8'^FY'!V0P2#YS!8BT6&>! F]X=PXGO'V"I
MVR .%AS"VLE;6SY>/49! 'U/0Q2>8:7!AJ6(WC'8:G1!5V0( +_S ]PO];Q
M8>)7&1]F?N5Q@-HI Z?C'C/L!"<S'U@N!>O&Y5HB")4!)WK);IS@($ QSSW"
M:[($ 61$!ZR0=N00[M7,?:RL\CS"1_B>\L@JZ$(G[JX*TG$5KP9G%"F4+$>?
M&*&+T%G%(>"AT!(G,UXA4R 8ZP0FTF!@"&,",#! UCQV5 !_CRIE#*6&0!U
MX6"MG-A-.]&9&<<=NZ[&6(S&BA@68^' XK'AO&#!TWP&'.F$U,SQ//_O '.&
MH.[I81K^<'_2D2+:*5UKH!_C,\,*@;XYK@<M\]F$Y,!X'"#HAH4&C&_P 2.8
MLYRHW S:W@[% 4?,A/+@8!S()#>Y1*P2 ,@0BDA0"J6H:E(=Q1=8&;/MR"#4
M,I45$RJ3Q5@YXUGQYLU907&N!C!?(0($@1-%QR*@&]IXB1!(22$(F-/.:]1B
MZQ&8R/A:$G04 A&,-9V5[9%H!72F:3[.*WVFR/N ;VL<[X&)(;P"H9(#=^.
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MXM3D=;JGO<SCMQ! P;ZEP1475-M[R5\/^.2JWLJN:@*4)@-$M@=DP @P $
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M2LA!I^AXR2<SJL)-!#/F:F ,#\F80JP#%]&"C4=L \1)+08D(PQ/ARC#2D&
M; LM,?CJ*["_NN@ @ X$Z^(PQ3Q[++'(# $@,B,LBZS)QKC@S+'/.B/---0:
M2$,(V,9(H\LN1<!J2]S&$ $U*73P4(8' /%-A$6@,X^X1T(01"$/#AK.HD<2
MH BO.PH9!",2XF# T,+?8J$0>Z8(R.,XOA@D#W3RP@]C<RS" P__"A)C$T1
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MJ-Z6.X1>*F38U[:.,887/61:AT7,:KE%*8Y T8<E,7KD3OB^ *+OCJP@NXO
M!%N7Q\ .RPQ*Q0[DN_%AI!RWG@IFU<RT"+K E_5A!""#(+^!19BBS+)$**!
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M0;'RA]B[B(Z&- Q$4>
[email protected]%PX*&>D$,"01PB9X?:)D6JTT0ML(P-WJ1B
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M?KXOW$HINTK"A *:AJ*LRA'<KZ"1MS&48( "^)C)12H+T*O+^JD [P%MAHH
M2'ADYV -YW)N \G%Y<3%Y6"OQFX.,(0NN< B?'(/1J: T SF8#Z'AEPEG^HB
M!JFL=+@,VP)ABS("Y=[.!D9@.$#&^CZ@B9KH#JAIOJII9([PBD[D>=IN(]*C
M9.SL$+[ "^"I)ZKC;5R%+'KO",R [QI@5B8KPO0(PLYGX1PN#0NOCVZE5]X
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M2JHM;ZXP]F8N+W 1S66E&BC)]/) X(@L JX%?N^TAJ_WHJW^+ZL,35RE 41
MNQ[ 1Z@#4BF$!PA!-Y 4(SCS);HW,R-K<RMH[9/K7ZG+0JA3]#B&.TMB](#
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M FZJ(X"DH#U6-#;3D(\0X8]"16ZLP"4PBP&Q@ FI ;F%E5?+$<O&FCN)J0X
M>I8]6N6@LX&\!5\4IF%4Z$/09IEKD+#<;T;<+T3T3A'<KW"CCCY%H RFR@&.
M@&+>H /^'D%0)--WVC2/#2AUO=7L&+0Z1":+1!,YE(<M*M-LU#4A/Z0!:&!Z
M_M6>6_2&"P\DE+?PF+>=)HP(KL!H/HT% OJ7R. )19E2[WF@]*@K?^9Z&GHI
M '%N!&SE3.ZC=5E'!2D"4R[E6M662\JBP_**=4GCH -L*0HW%=IB&)&(CM!
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MH $]:C(""?[<K<M:"\#DD5@ 6UC^)
[email protected]&MZ HJ<\7.IV6(8%N6@E<\ *+5
M(I!6KJ)!VJ-SA#]"1< J1)<K2\F97&ZNN+/<P,.&Y0X5IBJZ0D00;$2(XM"&
M(D'>[W&QG#X9(2,?X'0&F@Y\NF5,T@!8)JK9RIO]6"59^\W00@7:0U6Z:2+R
M[OT.ZT..P.#L3Y^;UZ#TN= '=I3U=9X]PBTF!]>E0 -$EP;,0#__' F:Y24;
M17CA9JSP/8%68B%JH%1)A2#8)[LYS]0AECD#?M7_FN%Y%'QUU,7X8B$N&LHU
MKK-<8VNL@N,;!J:G(+*E5&D<]T""
[email protected]$%-NLV25\8IG038'7BTY[IUN;
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MF&2F(28</CRP'4$^\#&F;],]1T:=SQW1W$[/8<?; W(XL&8#B" 0QP>/%))
M(85$-%'^#R/-"!8;&/7 'QL?S*=1#RBMA,@@=Q!RQT,T2"'%%&0X%T,#9,2
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M8 $!]OH,9([D)'U-B5V/ 1-S&B#^@@>D 0J]"<,63F><#6Q'#B+80'+2 @^
MM) /#Y A(-@D B'P!'1FX)RJ8D &(9R!#WRHW!080( X*.H#E&*# ;3P1(A
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M*L,W, U3<RT486_2 ??;$$",#08$3>P)A_X((0^D($,#=:;AST'!SPXT(&*
MD!SDR ":>3C)>K1X!_4\2IN9,IMYXG.>D!3B WD@A'^T(#SK4*R=X1/?T5K2
MQGNB*(X-PE5+'I(5&DBG"#ZI)A+,-H8V+*5"@[P#?/!WAQK^W2P.J/%#4,+2
M$P/(#B-GH=;9'M4#)(#!"XEYJ28KDX0@(&E<B$GM%VKPF !RIC#D^D*0.)H8
M B;!$4=:5P%/2=/-) 9,)WC 4GDSAMWX1H4A]%=W$O: #9R@A2*8+@W/\ (
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M%X=PVH0W9I#"(L:F!3@L@FI9V7!\PCD?1'I/"'52V15472>X+&IELI/DA^^
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MB8$(# F6G8;W/5E:\('8A9-?B(#355=)7 "%]"-XSA,7R<#Q?4 )^!U97!F
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MX@5!\)7N-DP7T%PG C3M50^8!S#5$/<L9>_!*9-*V]A%CG5E08GL%1/IG;>
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M<P!@;'O&F3HA\Z,1AS2Z,>D<N#=);>&BK3DS(Z%1_1,87E"
[email protected]/PE06&"S
M,5R)
[email protected]%6A\5JB41RH8P4M<6'QF2*N&;/=E\?8F+.0G*L1";!B'3]QV
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M8<./ QN*KUA1X4:*XQ>.+%GBY$D'?%+FC E(!GV;,O7S$7%RP\F?7#.*#Z,
MD<JIUD1 2D$1A!#!JC&PTHJ,/Z30H0TI,,Q#BNHF:\"J+<A@88X["&)#L2D0
MF4NQN@B;JP<DYB!#A#%T>P0)*=A HH="D"A$BT)RO,TM& >:8P[)I%@DD"L"
M060L&AK^(S*T(673(L?9M#C"+)_&D(*&0I:;XH/&1KOC#B2OZ($Q*V$@HZDM
MSDHM-2D4DRVY*SB\8HKJJ*/.MT="0B2P@A#1[J&-*GH(O#B4:,A1A9(02"%*
M%Q(CB"!*@N0$FA[(Z:24^-L)IYUVZD^GDTZH"=0'1 D*CG<2 -6$:@00=8T
M9$VPJ:K&$&(,L[+*2@HRE/SJN#RZ8G*1,6(8P\O1&*#RKL3BNHN@0I2 <2XD
MS3 CC4#H8N,#Q:X@I) >-$/WBME.'$V+1\($;J\>Q&"#R3NNT.TNS?1*3HO9
MV/6-#1G+FD**%MA(CL_1!CM7RG#O8.&.Y_0=0RHR[M0BN'O^M<@AX( UGL[*
M0N,PU&2-L%,(C(8(ZJZ@ASIJE*,@'FUT/8$T_=0FF]Q#=:><2GVOA!-DZ&\#
MG_AX28Y6@6KIUJF:0M G!YN:\=FLQMCRB"FVNA##-A:1(D/D@)OQK[O><@M%
MT,[4@A""]D+2L3L(:0!:- 43;*X=09N6RCF00"32+PK76V$JW1J+LR/:J(Z0
M.^Z*4HH\@@LDKSG4'*PTW1;SC>+,(1>+LS'2X HLZ?2-+F F[]273^5\&R2P
M036R?>:&-G*Y4I@G&DA2E<'[Z%)-;Q+A!/=$R ]4&5R"Z501+F@UI>,?,+".
MG1P0RM7M#91ZP2V$\(NJ,<[B[/S^88O%L-BN%R'#JT!.#^39B:G4K;0X(G?X
M"@.>$Q?-P2#)#2+@D(]ZHQ?(G>DN_%+;=0I2N"\,!"]S&<WBLE*6LRQ"-^4B
MA'5 X8@S 5Q;&"!%#KXKSXMIH.$2-8BHJ2;U&B!3PNKCL:F@*34_>L.B !#
MH (3D9<%00S<\1UVPM,RB*R,(3-3B,Z$]@ YG. _GI*!#XSVJ58!"(M(:]H4
MG^BJ!.DJ0302 @[N%JP)#>L/6L&0%+92+#=V!4,N; .PM* #W3AG-.J2PAX-
M@*2W3$$Q'RB-Y\A@AG EP%SC,A?_]/(6'E$I7&I"0B5/U(/>T$L+)<R#"^]%
MK/*U0 O^!DB;R9 P3@\0DU["<1BB)46K7S)+HIKDHV^@!'DA 6%,<SA"T=F
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MZE0Q8=I,C-:JL[:*$6=PD/A^-1E@E4\*6CO?EO:*U\ .JW$8>N,B,*2#*<1
M#F. ' TX1*70WJ6#)"JM9T>#&,7DJV$G\OY-A!>94H4IYD<!0U+KLE1:Q<!+
M(#2XX!@J[-K."?* <PI7#U*YF3;X)8&N_=R=,L>GY?PE*_/DT S#$I;X92DO
M-YK9X%YVLD45Y*B",QDB%A*1&QUDF"
[email protected]$F#Y!>3/JS/"[^9XK>
MO0]-Y/ ?!?VJ699)BQG6V I&(<SQ,IKXXBE@WNV0; 3FC,9<'"&)5VLM-/2
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MMB8;E!X2"-JK+E1D"$0HMN*IMOR0'J5!GK ZFA. _Y@0EWDC_R B:<S%9IX
MB?1J#2KPD@^AIRR<@C3JOL':$K=[HV%1OP98A$5(@RTHQ#QQ''=I"_UY+!!S
ME\.#"Q+Z.-<1I'?D,([:BW\QL/)AD#'X@SLIB\_)G!R0#=@11=E*D 1T(=4
[email protected](G,E8O^-(CK(8+M68C<R)CK_4H67C2%F, S 8)A]*&?[K"I2A
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M)0DI\O:<^ ^D;I7@55=3(17EV3*D]:H-Q39W;A69G- 2P,5*/M1A](G6? X
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M( TO\4$9-A:@3J7!!UO 1!;XY15W>PJQ"N-6A1D(6"RR@P@NM6#%A1,5DEE
M"\IK@_NB.3:L62TTRVH,-1'3HKPE:YM3(TV):H0ATYRH;I_!%A*PY:7;H-5^
M[YP*&3IC+*G@2RJUR4M"[D# 0CSN<89;I$.NH\# (6P.!I#D UQX@<^%1P07
M(%1/+D<9_5AR)>J96"4!48*2SJY1+#R9Q]*#6924U)*BJL@G<>DDI8RA*D9-
M4(-N9DS72@5G#])9:8 XVZ6, 4) *P*0W&>D[$D/FT\-S+9>]!=A7:%Z6%/2
M;;BG&66U1BU1\]9?,%.;N<33;NW"XY8"T?Y6,7DW*G]LC18^T$V!U?4#;%"O
M0.34G.3L:6#046_DTA.QE?0D(Q;1'"A_$J"+6000K<,H*G=2TE"I!W2AE>QZ
MV!.@]'#J4@1256S3@B S/ AH0[Q9:BQT,QP&4\.I&0.&>;:@G3DI#3<+C&!N
M%-5N18U&)P(G%AV#-<6DJ%BWJ<(3%7+&!:'F,W195SS/^J4MH<M^4Z'CD& C
MUZ@LX@B!Z.8C/N#%P';3.NMU4UX%AL"_WH&]#CQ)PPJ+*94P=B8J6TE+_AMA
M/OS7DI)"94_:4SI&_<<^G!()Z H;T8J UB9 BL&$8KN@'YJAM474\!@(36BE
M%+6UIZV5[G+IH/Y(NV$,@DFNV[19K!I!CR^!,=MQKW %:_;&G#."EF>PVUSC
MO.8(2=E1<\_8OS/!,SBQB2<9^H>_X'1):?NZPQ6PL][')0=/6=XR0A2Y2&PA
MA+ 1^X\,P .?PU9PL8>5I<<Z%=E+^F0_/P$E!T=B,9519E$V$6&;1Z;1,APE
M*1L&FH6*:K2B_12UN26B53KL)"?A &@\=)"M;K:6)DH1N"E"$;(<$\W..%RK
M>2%?8MQV)KIL00A,,A\91) VS,@(,U[:DMWXM[Y\_26Y4<F7TJ1R[/@>,#G1
M08A#'L&0.'@9,CW8C, <R@?0"NJC95@LHS!X@MEYYX*B&FV$Y9 &C/[)\%*W
MRTB@DXXRFV32P*S\V,])RY:BL;;":KGW&,CEVID)L=Y \S>'=0=V$GNE 5LX
M VJFIDU/3^^>B]DF8**FK?&1;3;'519Q.C[KO?P[,/=J=7;;-3]=+SDJ\-*-
M#7=#E\NTL\K.#MC!\"HP='YO3?N*^>,B.9%!C2SU$[.DY=0=VO3,TB067:E_
M)1M[T<;DZIB]V">Y#NX#5]0-$6I0;C5L:5U9* :)/IK;*RWIL1?MM/]&+1D>
M+0*F3EQ8GKX+<5LDZF>YN--:75*-2HVVX9P&#:ZA$HGS4AOB[+H*OE$RR__8
M+E^1_"R^HD'@LOPX/#D2$CR"X?!?706.7O[I1>!($D455J ,"L7 AT6!FX,-
M&"M%V"K5C@R($J8TRJ54CJ*4 <0\5IZ=#H/%1$@Y7=$X16JMG8>UUM'H"O0U
MP!+-X-A1P>ZH1?05C1 87]$HWQFX12,(2;=4D8NU4Q$"5]]=C5[(6#N)&MI8
M5\<MSXSEP1C@P%]H *CI1IF$2;OHQLB-W+WTSY+!U?LHQ'2PU\'TP",XVQPH
M3N 8E$)( 6>8GD20&62-! 16SL;TQ"QA"GO460,JF$> CJ7 V47!V0F(D@9N
MB@8M"D6UF46)0!W\!R"DP4P)GU7T5*)9") $G%*PQ2>JQ=HUVM'$P!@4@=F1
M@1 D!2F>%F^AQO[22-,45)R+V)UCC%5@C,V,4=>)R$AR*0EQI$&\D<ACR%K]
M[(UD[ UPM(N7+-[[75R0> G[; 9"Y5Q\L9=TA!DBU=6>--L=[(LD#>(#OM+$
MH!NCH(>?/2 A/LKD;$0(QH<E010KI0$? (5/' 6G;,":I5E\:-!GE:"@H6(.
M$IP0.,DIJECS>
[email protected](ORK4V*\92N,"2)_10I B&3D,VW^(7X'4;:4-RWQ$^Q
MP,LO]@5=&(NO^,B/D(6OM,&(2,'C69?EP887JM4:L8:4\4;AX=]TW D<K5<;
M@AE>)8Y"2(>7-4ZQ31EAK40*K2,$5M+#^!G'& J?_9P_;LI)O ?$5/Z$(J*$
M'$" (EX,'XQ63J C'DXE@VG@J%CA*3X:OO&4*%H(:HS!H"F5$*1!6[2=4HG
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MG $ *G(^(#(U,=%:8S&&E@'DI!]J!M4RL'+(D6#G&(,#MH8)(6C)4419)S<
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M\1FC<1JK\1JS<1N[\1O#<1S+\1S3<1W;\1WC<1[K\1Z?<4 #M02P,$% "
M @ ( )>1\(-I4PV@ A]H H !$3D%.150N1TE&E+IW,-W?%S;ZT?4<
M7=<Y1]<1$5W7B:[K$031(KIS=%W7=:+KNJXK.0C1=4($24ZX^?[>?][[SYVY
M>\V>6;-GS3//>M;:LV?V+$5E!5$1JV#D':0OP/]9E?\,J*RL_)]7J?>?J_??
M0OPS/00"\3\/\;]]<7&QM;4U.SO;V]M;5U>7GY\?'Q\?%!3DYN9F86&AJ:GY
M^O5K'AX>>GIZ$ CT#QH! .< L $ 4P#0^1\^D $ D0#@ P!V * ' +( P \
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M'\)<);!759JBH7-Z5O-L8 _A2#?-+H)$"R5+:W/AU>T9!&/\4B'(K.\A3./
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MFZGU*1VE13%DSXNY[%CT+:,H&SA<9)%D,Y(U]99;ZI;[TYYQ2ZN?(ZN>$J&
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M)8PT>XS_&O,U4=9ZT@([01-1$MW7C5Y0C2M>V6)<YG)E#9MW(X%V; ?QN)7
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M:?BI2^2*DWE(^L&NZ8T4)/%ZQ8&QQ6JE_ &;ZX<EE096CJ7274X!9$4.$OH
M[?9(5C/K-":!)V(F1 W<9".?@,?B?#>QQ#29RRI+Z5W:5#&9;F96WDBQ5"7>
MNS;CJ'=AV&27H"#/07II7,^T'LU%V(YI4FJ=)5PG+GV-RO0Q3DT/F3]:!JJ,
MRQ8"3XJ6&;"P6O*B[K0W:W;^8DQJG':EU:B?XAV'9>2IYEA65*7[0%1U7/VD
MBT07_''G:@NW50 LG+*I1K9M1A\?A"MQG"6 3$#[ H6 <?<0C>B#K<2-.^'@
M4JTJ!^R6&=#A,.O2,Y)&^&;NSQ8H%N3W@(&S59>%PJ6\[H2\ D:T[!*'^>[L
M*/_\:*&*\B7G:AQZ]VL) "[[0O)QJ)I3!FM:AAT=QP;NRE6;'J):CWN:7(,Y
M+X-:V\Y]9:U!/QJ/$HM#UME!/X9"H-80>NL\LB@!\ (#@^20?]\#V (C%\,S
MR1!UE!NW&;Y>A_S <D&D"MSO5:#/*?9=IYR_D8O).A=F<7?'J.L[^.)UN=4/
M:75T^:!JN1J\=4W+\8K7?380B;L-ER9-5@^O)Q 2\?V:/T3.^.N4M>RH56#
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M+8OB%-[2H\S J6,TR7/4X5[YXJ-GEZ-P JM=LGJ$#@?G\1]']NK\;&[SX9[
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MQ9N7F.*UF- %-)4R;;&Z./2::%XD7 (=S';I59@6ICY6RGGLJ@SJDDO#J@N
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M2]=EG/01>QW2QW<@8>*2 YB<AB! .@R%C!8U<9=A!/J"@+'2L9%1)@00=+^
M-I2,QRXK:(2A<QGQI[!F-)JF']@1.O&7)54I*V!IL-CXQ#>>IJAE%DK[$5XZ
MI8"'2E4R^.7#CMBTBN3]?N>J_*S4+];_O":XOXJK5VG1&\DBT':QEB=IQ<I
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[email protected]^BY9W"QW57P?QY'^'0R4.9?M_#9RKP0AU_5*)>+[C:P<A<A7#_NS.
M/SV\E/]+H])3I?M67<M6U>AIJ4N2>:5=>BGW%>Y([K*#UDR0]DHG6J&_Y4 0
M('7CE(A>9RY42(MN+MO_EV9'._^!RWPOQ'*_%_\;'Q*&/_TN;.><DW8OSI)2
M+O\0B?IP=.<\O W^1OBV8IVX.,V2?CVB9/F*1HM>O7V66O^/5:>\DC^!9?%
MN]7M"4A6.TOB5*=QA=ZW^4/#[S_7O@L5&'DPD/%;C&>M_M"F^RF4%6_UC< 8
MY8$F_R&D '^-'M]>\8_W1"M#^.A%YM^Z;]13#']'+1 >YK3Y2$]6!&U&NL__
M)O3XEOK)%P!N+:30O%'JXB-.^H^HT=)
[email protected]&ENC%V^A/-,<?=W8C=L!=
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M9@16XLHP2J%L)D:X!Z$ "GMZBE(5#6WV7&JNY3WI9JI198WEIG_^YU)8Y8/
MYH'B9X ":)JUVH*ZYJ\Y(6+67J<HY80J:!)E@!*]6F]VZ!/J&'"6$VXDQ=]X
M2K>]Y2/*943=1M9,)W5:IV26IW8&2GC6Z'#_C<(Y25/;B$)U00B,UJ2A?*91
MDBB\'*):DMO7T9DC<AOOJ:61PLLAY:=^\EY4]N<4&F="_F=HZB:69BD4,BF$
M3BD"@:CCG%J9[IY4HB:30LZ/@2E4'M1O3L2 2BF=WM[5^4M:IB5R)B2*+B>=
MW5F>/NEGN"AU!N5Y_JAD,@6.1@R/XFB/VBBD2N1NP(MS=@JB2F:0/F!#\)>1
M(D2/75)$):D!+JF;/2==?NI SFF=0B53O)G*&52G/,26OBF<.2B9)J2MZMY^
MANFN7BGO+=TBY2H9PBJ$_.:O]EZOAFFJ082JKJJS6MU <8:>KLVG'I1"+FE<
M@JH"3JNGFA&A%FJ0_U[J=3X(;U JJD8JNBY%B5HJHKXG9VIJ>IB;4OP-8CVB
MDDY.ESJ.NBY%E#YKFQXKK-+JRER AIJ?J@6KI]PJP#*H?A9K@S[(P[;..")L
MPI9<L:[,J4&$6?HKQ^I?M&[;O#:CM?9IMB+6BI+H4;HH4,K'H?ZHUJQKNMHH
MCIH3UYP" -@LN[ILIDYGYQ2G6C*JMMKKJ.+KFC;29S@IB_9KQ[(J[CECC>%J
MA1:LC5$L4SPDCE'MN/6>KD8CEW(MJXT=@4;C4R;K0R56FW)M[M78R:;MU3+K
MTBYMB(+5EOALD3Z.OI*L86DKYQ0IO' -)WWKRG*FN";J4LSL.=7LS<:LS/_>
MI98 "H\KJ=<JKL>"L\2*5UVU9V)*MB1JK4^J:FNC=*^+=DZ+0A(H<'4ZD-E
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M?1!JX,Y'-X]S.*.K)(.G.;\KH#
[email protected];6*'.NP0!RM\USZ,)MZC9C/VMQ
M*Y-M1IOO4O=O8A8T G=T "L15:^70&_HFG8MP:+Q1&-P6*_N$C'TU6I=R67U
M)&[UQM:8QB8H[IW<=A;P2$MI"7=+FQ1M(*MT-2_QMD8D]58O-S?R3=<TI&)R
M>/_F-.56I'_U=/N.6ZBZ,RDK'6#)E[X:M5<U:S,C<V(9#"P?EE)W6T2'9@&'
MIL60VT-?M1*C=L'^IR)N]%<WM);RLURK+E:/<5(\=(.^]IMVBL7H-HA&1%,+
MJ-.&+5W7]6R6L"7-<ZGRJ2 [,2@S,6##L$[*<",CMF%G-T*\PBNX G<+\5(H
M=GRBLV,_B)T!M60+->]>-LBFDV:3-&=[&UW_\EK&+D.;WV?7,4M/L,%B]7[K
M,IA6=&QK[5A#]("+;&[S\UE;JP)S,'\K.*N]=8$B>%@&\'$CMU:6M%\I8D+-
MUT(^[VF/W6(I1>;DI75+;M=PMW>_ GAKMV'"Y/D2\3G_YV5Y+P4DHG>2OC-E
MNQF<8?8JLS(;+_,O=S:;TA@MXS=3^_=2^#,RZ_>2T_(8\_:""C"3(S,(?[&5
M5_F5]^^"PVGK0H@_@\!O$FR8ERX>5_F9BSF&C^V=;GBWK;>.(TR*ZFU$3;=$
M"6EZG'B[O@V,N_AAK@(K<$!A*H5X(X"0,D5/*[$#GK?0;B[1OIG6S2TI .T4
MZ;&#AS0!!RA LVV9EVYI3[52='H(QS>FEWE79W 71W4!!W.:)WFKUW*8*["7
MD_&KT_)&FWJMY_.6KSF;?RQS(]"BMRXU0W?5)A9@![N)#S:*OPV@"[J?*\4J
MJ#AW:PU'K((IA+>,Z_1!"%<Z_P/VBNI# C:ZCGM;AUOK/$N3&5DQD&_I?#NX
M^>6>JHLZ\8K7BLI[""MYKF,Y6D]YK;-ZO-<RDF-YI\NZX\1NJ8LZJ^'ZOS-U
M$ETXKS.C-;&9F^,JN*?FL#-G8&6M2Y,XU]"GGL-H/DC[*U"[!EC[LR-$GW<-
M5%\O7Q9Q>SQVHMMS*P?UHY]NODZQE<AMI5MZ1BN1D%]U B]\IT_$0]J[5+>T
MT/OSOA-HP*]ZDVMYO@^\7H.YT:MY@"J\PJ?YPP_KU>%\-"NBL#\WQC>0^V(S
M4WB\LO^H!CSFVZR\=@<Z*[2XUES *5@RH6?[8FM$YO!TS&]KCN)XMI)J8!%U
M0I[[I_ZJ^Q7WO*KC\D0/]*L_^1>/L\%">:A_\>1C>>6O.IRF,>2;>:H??),?
M/,/;>K[B:@>K.E-\,:JG^8/D]WHY_-;[6HA*T[;,;5?#BX=C:]X._GD;^V*U
MAV^@?;A>ZBH(NMQG#=W;O9^;PBHHRMN8@BFX#T(4>@6- K?7N (>J;A/-HD*
ME[EO&Y.UT7LWL^+#\FK*IV!^=D9G?O]JP 9H0-.7=0<7</IKL>*#/MAK.L&2
M<WX_->N7-4!D 1$&# 0.)&@0Q(,' "1$E"AA8 4 %RXH' CB0H8,&CPJ
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MRR+Y[+,D_?;[*<@>AQJ-M*30@H_ @&H<2!1 %-PP<H<1#1"MARC$ $+3_0+
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ME^9&E71-.U5[X3*-\Z]$ID2/+JPFE7JG3$4<OXLN-P1$.?@Z!$.8.\&C#]
M14-!#>J&XAE(+;-'2;QUYF"8E.4FX=G)(VZ*5:7PYZA0J4I2=@A$S"3,*EC!
M 5:8B(J/J50186FYRP GEJAT:ZZ&!I+ 0@^8?R?+W^)SIADJ33$9%X;E7G-
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M52\OO-9F(*QC[5J#!<O6LVW)KF_;:]V>CW :0.ZQB9UPPK0B,,F6W+)GU6P
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M4"'_H4*%!2DX? B10L$)%"M2+"@AH\:-$@X"B/ 1) ()$L">( RI<J5+%NZ
M? DSILR9-&O2+&@3I<>=/'OZ/.FAQ9*A1(L:/8IT*(^<,7DD?0HU*1X':.Y8
M91$U:](>(TMZA5 P@MBQ(@UVY+AQHL6U%P%$?%APH=R?&.K:O5NW((*]?/<"
MX XL&# /C=PV/ SL>+%C ^N6J5!U2K&@P<#Z.L7 %Z[!0<"T*?O<VB$<AFZ
M?0M1+5N,:#6*!D"*5$B17\$RO8T[M^[=,D_F; R<9U"MQ)7R5NFTN'*B4ZM>
M74Z\2-?:8&>/A2T;-(#6K@&P77WZ;=S2"5]K)ZAY,UZ]_YC]5J[<\W'DR<'K
[email protected](O?![Z,64'J8="99P9I1UYYX:$FD7??L<9=1P;%%E)!M?EV7(8:
M;K@AAC?=5]]PT#VUE(;)C4A<<U;=@16*3VTA'74DA4666 =I%Z%JW[7%X'CD
M>:2=@ -R!F![?_GWGT_Y[0=BD_89ML$%4O:'9)%\";E9@>CME& %#3'HD(X6
M0=@:3]=-9Q*':J[)0YMNO@EGG'+.^:8'=M[Y0 L>T/FFGDX&)Z*+1968X8F"
M0J7B<X<:M<485:#Y%8UD\12AA#N.N6!JI/WHTY!$MN<>DH3Q!*64%_R)JF*K
MJ*+!8Z:80J5_5F8V8('FZ2.**/\^SI6I> Z"EZ-VL8422H60VK9FLH4N2AP/
M=K;0)[19+95J8WLRNP2AQQF*K5&)LMCM$HW.\:B,U=6(G6C$;L>=F _V&N:F
M<VD'6JX&>9K7K%>*.JI'J[:ZRJO5#NS1?JEX,&$IBHFJ+Y;K 4 0:*,5M&Z"
M7X+I;EOM2GS0NK1%JFS(NW$;+IPMG&R4LT)%12W!B>7IYJ':\D9RN$M\VR*S
MXY)[K$G682>;0>NV^^NE%T>T*T,<"UUL>IZR9R2_'.QD,,(%D:*PRP.;RHI'
MHR3&L)%./[SE9Q"C5RRG8,:[(YD<'6ALT\=Z*'+=-=7,+ ]ZIA0H4<Y>"U7+
M6OO$M[3^*,X\LLU'X8SMSCR;*ZF-5[-+,;MO%]TVO UR6E!H E6.+X'ZALJP
M1UQ[/7BJ M-'L:X_A1W@V'<=9*_G!%5<VM&H93R!VZZM&YJ-ZUH(LMW&TX1W
MWBT\@%/->B9O7.J+/1 4]"1N:/VBC"_J^.,R1@[ NK)E%'ZQ96+^;H_R*@C\
MV>7+KA[4 4J]T^H=NRX]B*4$O=,#H+Q>);'5BF+%(HB!_+<^+VD.+NC3&%K>
M)Z'K('
[email protected]!' IZQM2!)>_GU!O9<I!G&ZR=ZCM":I[WJ..I-XG
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M-)7DR)$ >AWKPH<AN96)V)7,8IT'QG%G&9;50CV6, S2D ;
[email protected]\ \L8*57
MBJ56V@%0&F )@T. *9A*@T8BBV)<@E<D),[J:8\F6[ER6X(&)E!F9X(J4!M
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MSZ*01*90TS86RW(,7[<CU\;9TOR9RYG5+D3=-,5MT.&&T(]-S/S[A@\PJDJ
MP)B-'X4,LTI0JF -VF+]3_]I5];:C-IKIW(_6MQRG8F2JRD_PMP%P=O0!%HA
M;%Z(Q)N\71"^'<^A" K_$SYY38KF:XJ_1Q#_34 EK9R&397M@N#EH^ "FL.O
M^\?2W2S4?7]!$0[8G;/_H-TBY %I \<'LW=$MJ?_2*D'5"X, YM0 @O#@#G
MC=8F>!T/'M_H"1[06!XV+M?O67^W?1 V+N""29^%^M<6V9>5,UN-2<.'S5)+
M^=PC%]V6&G93/8P=\*[BIP3A4-&*,=FM*M[,T@
[email protected],*87JN9KC@B0
M@ JX .=Q#N="X BD -W'@ARC@NHW<T@!IV>G-)S.KF<LXT^SJ*@Z)LIN\_Z
M;)S_?SJ<1[YK!A+?F#3#PV2 -#3IZ-3'C0W5%NZ 5HYU+* $5JH$&; /_% (
M\, #B\$#TI $DZ H, -L\X-S5 %_) $69"EN\[KO:X!1@#L1G #SB *_K #
M88KLR0ZF+F $=N (G@#MT0[MA" )7J +U\X!TBX$>Q[2?=Y4F7Y?K\V"O +N
M<6;;,\T3BSZC^OV&P_/?L?%5CEZC^7),3?/?\6UB#,ZCY6COH(#OP'R_PNSI
M61&N];DG\/ /.QT.L3 (A .EK"I#U *#; ^J .4X#Q&$\$O: P4 *C SR
M[AH)!Y$/<N ,LE )KZKR*X\&B( *\ *"#S,S_S:N %_^)0!3G? C,/ )[
M[=OL[:!4$/=>W(&>XWKI1_V.[^JLFRWJ[J [S,:BG^TTT/
[email protected]]Z8Z 0D
M- ?;L<I=E4K.]4./)A,>S!5.Y4QHY<TC#98@<<*P J0P#+O[$VF0!4A@!*Y
M!!FO\1SO\2$/^"O"#7R_\1W_\2&?KQ_@P(OOP)CP#[% I%?#@Z, CY_UGV^
M$W^D0V\E[IN8^1TC-\::O79M&3U!]<#9TUVUS\;=FS8M5C8X[P2R+A$>?\89
M"KIBIW?\F) )X75)0/_S/TX]J:&VYL6/!U&Z$A1J_,:?S%J@!=7GHGER"%K
M>8>0NW3O$SSP#\$@"51P 7S?]_^&'_B!/_@97_A_#_*)S_CKCPD @ P[ /_\
M0/F6W^TC_3ZTGT4*SLN@O-+WKT.!!!"D1I$"0!##0808 ! T-!A0P <)$ZD
M*'$A@%&B (@2->KBQU.F3@$8^='D290I5:H<-9#4RY6H9)ZL6)'A0P0+$QY<
M&,KGSX46A"ZLL)"CQ@I% 5!@VM0IA843I$Z5NE#"U9X_?5Z,T+7K0E!A 4 @
M"^#!6;1IU:YE>Y;'$KAQY<ZE6]<N'FD.].[ERU<:#\"!\_8EO/=?N&&6#FGA
M\6#E8\B1)4-^P,/#1;21'UAJL$"?NBFA14\ATDM!,%)W5*]FW=IU:VZC2Y].
M_5KUI5O^_S[\X-W;-V], )#M(,ZO-PI/N.8L9][<^?/F5<:2I4[]HM:M5J]B
M!0"4.U7P4Q<^;4I4*?90084.7?C2X$Z%-W'FK%ES84OW!%7*1#79O_]2+BHE
MP,@TR,"D^B:2SR&=$MKHNO0 6(^]I)2Z2"GRGHHJO FTZPY"JQ;RRJN3RFKK
M1!31>LLN%EN\RX$LT)!Q1AIG[("N#FK44<8L=G! FD/2X*$%Q_XS\L@CBS22
M!Q8V,,(5(D83;3;4;+/2RMBF-*U*VW#3[3<
[email protected]!V,XPTYY:!3<TWIJG/S
MPZQ$U&X[[BZ28$,.Q5LJ0Z+@["Y""2>T0">3X%MH/H@2I(C^0 &E,Q )",%
MB221_EMEE8\4Y6!!B !PD""!/ I44/,J!$ ??2[*T"D\P0LQ/: V$[$$2-8
M"(*--,(U15[96M%%8%W$PP$TKER-!;I8,/8.)3H(QQ(MB%124FJKK?:!4AK
MX80+I-22MF7#O2/+T*BLS34O=PL3S."&*^ZXY-:4][DVW2P+E#\C)%%6.ND\
M-=56\QR/3Z,V"D4C )02=%!/>4*U880.130B34VAM*3)+K7V2/Z0;"5313G-
M"6*%W%-O888K-'4?55=E*F ][XRU7UI'O!57CW;M=6>W@O69Q6&+71;9N92]
M<H=_H"5R8Z:;]N\L/+) PHA>HO3^EK0MSQ472]FR?BW==<-LETPS?T!S7K27
MJ]=> $#)KM8Y^\6*99C#&YB\BXXJ]>3U&N2)Y9TDGH]B14V9Z<B/G8XL PV8
MUE1DOU%"F4)33W+Y90 $/DGN.P&HU=;I<#61YYU__?ETN((.EVBYC+8-:3P:
M4WQVVDUJ(0UILG!'$BJZO1IK<+>^DES@N60-[+#9'?/=,^-->]ZUJS/I<] Y
M][?S/*FZ6T.35%:8U(8+=5#D1!6]H/;:-3[RE5=<8?^BQP</_V&>1EUX;Y0N
MARIS#A=ZV/K.?>YFTB-=Z5!WP"6H;FC)LI(2_A$[]$50<
[email protected] =)G T
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M0W%UX9CGK:2:S]*3\9^=7<#$^G''N-YII.^ A&X (!#; 10ELN;X<[W/#D
M=*<]@ C]/AG*^I1R:JDLEK(,&-58WLJJ696=6,H2UH';RJS-6)-26$Q!_M3J
M=039S+10.";.G1HSR8;-1A0[1L7:\PY6!=AG4#Q;XZ2+-@*G36UTMF 8T=C
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MO/FK+,-"PB(^+CR^-, #5$Q%55Q%5FQ%+;B,,(S%DVB!-NR +' --% "%G
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M)HUXJ8T#RAHCI"7#)*14RI7(#^;'#U U,&=!"B=@4<+=!'*M"_+3$K,G,HA <]S8@N4
MN#L6$!HT@)UINX!0:$VPK$AVB\\]I$WIJ<WJY [L44O,:37>_#*W'$E;DC S
M4Q!;TSHC64[TZ;#&D12,6BO<8[&9!!^^ZJO$[! 68\P(?).WD\SPZD[2^D[,
M3(G*N$!8],<'.(1_B)$=<!8(^@CWS +7?$UDI$]/JI<JRR/\?,8X&CU68;&V
ME+IDBB+!(<*)0#/"09('[:)A.BXX"QD2@\OGW,3HM-#IU)X%R\]V+ OKZ-#M
M;!$012H1'=&3\( 5$<UP__0 W/D'>!B&Q= ID[@ +N@' +#1>ZI1]S.UQY0]
M9V1'(^)/!8.N:CS$*(K+7)H(3+DP7I)%!?48!(%2,[HKL2M,DH*E.\.S+>L<
M#<U"C, C+_U2NPC3>!I3,KT(,E0^\@2YRM""-(@6-$R)"RB"4'A-V)S///TG
M'>W3.F*9_034_9&C<[3&OT&](EU$B@BNC5(S(_DB15K2(U$?^('4CTJ)98+.
MKUJB2TVH_LG/6>&S*GO'9_-0Q1)52R+54IU*N3 OI4P+R)!36ETWJ*+(^K27
MJM)5@DJ57JV_3_0J !52AP%.W9NPFD K#S,2:/5'2'G4B9*?6HHN:[40\\A6
MS/_1G#NQN"&ZB"Z-3% -5<@S5S(UT[EH@1,M595P5UK%TXMTQZK:4<&:IA[5
MDZX*5C K5(@2V,>YR^0$)F:-Q,-1V&-BV&&=TIG-%:20I6@2O8O@5>VRJIXH
M2W#]R8VM"W+]H'E*U3 \5;I 4Y)%"9.ET=C</)4U)9;ECHK+5\WY/5C*+3 S
M&?@(SD.MB5WZCXZIK(-]C) 8"8P!F86-5(<"SL(4A8-YD,HY6LV!KJ6](Z"
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M$():H"$O_F(O5@*4^ <OD 0'_Q@'#MY>[EUBV,NRQ0S?W$3A M<)3Y>%Z[9
M E64&\Y;C, F'N8Q1K'=-H8,'W80V<N.0:Y&(VZZ60$41#X):^)0C7UB*$8J
M[KMD3,8"#IB%<1*2-)4[D<UB"0X%3T"!Y#GE,$D$9%AE5D:&6! '+Q !*Y#7
MM %A@'+D"!GDI17?2XU87/[=.;OCUH7A30ED AGDNL,/D]E-0I96.6M;_AUB
M0/G!11Z] <:.X]U0 IID2GXL2]8 (PAG<1;G#( %#<B!),BD6,1:%Q%9*OX/
M,QW/=Z:,DGT&60 &="@''=KG'$)E,.$',@EH$J@"7<B!-J#E#PY;GLP7H'AC
ME>+E!/]+J,HAX*V@I3LN5FV\68QP"9A@9N;K-8[XXV;>VVE-WSB)E0M1Y N-
MF4!DXU,:Q6W6SF[VYGC" JI1"6:0@V8X G=@
[email protected]]EQ8& 9DE?=F =8
M @ZT!$V"TZ=1"\[$0/=,AADPA&\(Z( N&W_F#8#&ZAT8Z((^: _V(86.O^-%
MZ3V#Z-\C*6D&%(MV88P6SHFZ") .8C)%9I4HY+<T"=BCYI5&(AWDZY<NX.P,
MUYFF:4NR:0!X)R+8AA,H W?( FG0+"%)"\!P:G2:WI\Q:J1.@W_8 18XC.BE
M#*K\3,^T!!]!)$?C@EH #G0!!+PZC+9:M_H:JP&:X-&:.C_*6M:00E P2JU
M)I@%%&Q)%>9AAN&5P&MJH\L R0ZQ&.F?Y5MHUHKCC;'_'-R_EJ.6EF:PP!>8
MSEB9GFD%=@W%1C+'EH0ZH(0S6(%HZ(#$L(1A@ <'. 3,;CZJ1"!W+A(4>8P'
M"!H98>"@UDP $B$?,J],(1@<(<&D-S&4)(+6 %Z0(<JB&VOUNJMMFV!)NC<
M'FLVX6W/8>CJ%@MV[,C2_<2OHF[GQI>IBS6;#9G;I<L05_&N.P4:3\*,:+C'
MT.N("16-8!AL5NDK9>1&]HYH_G"5-:SP[N;Q;HWR1C)U& -!0 %V^(4%0 +U
M]CY96($=**?,1F"XN&PT9%73_LPE_T##?JP,2TC/U0!PLRCM-"CSRJA%7Z01
M#L !=D@!!O"'#J %QG","S"'5V $'V@ $BAT0R>!<J#MWBB'0S?T!O"!L-9M
MLJ97GJ1NT,'F78YC/#.5HX ];&;=\6GQN:;QY:+KCK!?YI-$)-'Q6O(((>57
M_\WN5/K=;DV))N9F);=D(UAL))N""X"Y7H $&XARPV,'*]B .[A,,;QOQ0*,
M>N0+?60,=\8,JCP$>'A#&F$!>/#D:I<&>( '6L #+;#VA=21=>*&2( %49"%
M:$ #:< ##_CS*1" -_"!*KAW?*^"%BA&?N]W?^_W%LAW?/>!3CB"#5=CMC'R
M]-B7S='!X/\V<8A%"DFE66@N2>2^"%4/1P/)60&!\;QVYDZ)M8O81.K.K6IF
M:?VD(SFA[B-WXEROZ5WO=7#SME^/.5<X@6[XA@Y(I'/2[/!2 J />J#?@6T'
M<S0TTW&GA7 H#&DHA0M<@D-0>C:=;$M0>GLD!5'X!6>@@W90 5EH %+8]A[
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M#YG'-XG(Y^/*:@6 :-4* ,&"
[email protected] \.&#@$@B"B1((:*%0'LRPC L>.
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M(82 B_OC/__ZWS\N)E'[NMX>A%E?I@T>2?G>F$"?<X49=(F;0H#<GR#?6VP
M!YB-6S ?F^&.9!U$X4U?#%6?[N%$"/Z-C=W;]G'?S'@?&OS#CT7@6I3?^+ >
MLA5<Y<C,%.3='#!##NK@#C*#$KC%/WB!)#C ./]X0A$:X1$B(1)> C;\W[4X
M7(#$Q'#MWDB1W0$:!-4)G\9=7?&YQ0168 L&TIYH@"H<'[KIE+JM&N6Q6K=T
M2]1U8"-]($@1!&.HC@IYWHV9X E.%6D!6PNZ8!ZB8'\=F@RZWE+ '@Y>5"(@
MPR(R8B/&@CAX@0BT 0I08B5:XB5>H@)DE;4XH=^HD-XD2K<X';;U'@<F2G.P
M8:(D'@-BW4&$X2J,81EN'00:A >DPBVVQ06NE"$U%Z(HTMB-2QS:$,S5X>K<
M87H!HAXVE-N=GA\6Q L23@S^5[*155/ GH'QPPYHXS9R(PE4@2[D@&D\&K2$
MP":6T;1!(;J(HF8]72G_&I[ I%2Z+"#Q-9,@*80MXB+<>>%:L(+NY&*ZK=DN
M>MK)51ZGO2&,V9!O] T"C6!3E: R:LSH50CXB9\SQDHR[B&N&%F$(!D-.@7>
ML<)%92,WDJ0W@J,XCF.3E&,33AG,:8MN5-XH3IP[CLE 0@_B%=86UB, [*-"
M].-\;-TJJ((&[(E"\(DIF,(_GF% 6E J7ERB7)G5'&39,9!33MGJ7-DQ?A9&
MGJ!$DMX*CE_C06-$GA\AIM]3; $GS%*3C"1);J-)AF-**LM*<F((TB$=Y@;T
M7%EQD:(!*H=3HE2B)-8\ZJ0)$810$F49'F52\MPMIH*<N 4IA)A!Z")/^>)
M_P)5BP'CU%"EEEQF%+(.@X5"C3FDVD%DKWE?5?E86,*=SYF?(![;-,Z@Y4 %
M%_Q#_RA+6[KE#L E2LIED=#E.1:CE0!(7NG5%!Y7*8)B0<Y1*&183F(0QSDF
M9+:%9/*<[K ">"0@90+DR#T7NC#7<GW75,9A2MD9&I&FS,W<6)ZFZ*5F:5DD
M003<SY6E;!:B4S"!DN4F/_!G?_IG.;0 !P0" /!@@1IH#KJ".2(-,7+>2Y:3
MC!$@[_EE358>!6'<JM&C86*G=GH<4@* +!Z$<UH3BFF7FHQ"2)QB-_W5>"(7
M]64>Q/'$]O"2@8!">E:,:;;GIWAE5EC5V\4G>Z(F;/\2W'TV!0W$TEK^)M\U
MB[3958/BE5U%6%]687Y<684VI[<]5X9*EX>"J$&(:+F5PB>"QP,LE1EF%QK"
MARCX5*O93E LU>7!VXM"Z=.8DYLRU8U^7H[J:&I^7_BQIL<!*9'5YY%1HT?.
MS+(A:4HJJ92PI%T9B*5I"9G:63OZ98N12W@*BIUB:&%>4Y@"7)D*VG;22V6N
MRX?]5)M2#WEFWFX\6)WBV6RL9Z#J*>:\)UC^*%<R11:0@I#6W2G)UFW])J1%
MFI15%QI%4EY&*!72#JN>E'VT&60I7DN]BZC&IYJ.R"B(*4&0ZD5$Y:D:C&:J
MZ@S!:*NB)VGB*1[.:H3L*(__]J%%>H 6X$&\RNN\TFN]SFL28$$T:.0@VN=9
M!B*PRN6B4@M+7IFQ.LQ>[E4;$9YF"I;T;,V5;6ITOHNUB@BVEAHH_*E"9&MT
ML0>:;@W&8N:G<=GTO%AG @#(1M+?F6NLXFKHK>O]\%LS1N 2!<
[email protected]=Q((W
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MA1F*-WUKBWK@J@9>G:*3^SXD_'9?KH"?%G@ @\3G^[ ___"C/_V;L_^+H38
MU\TB,5_\15]( UZ8@!'8@2,DX13;7Z2-45U.FX-RSR\AIY9MH/1-+3)]\.(9
M9IUT*6-MKHAD)_@RA/ANS?6J</#]90N3+<L)8#FAT0R?*S+:\ W[RE7E+PGS
[email protected]?<),0"S:Q$;L;TR,B/#EU&D@;TB B2@ O_QGQ5?,=)4\-(N$!=#KQ>#
M1,5Y6::JXAA+ZYLPYHBLL:"-\(A0)^>>J=>F<*O)L7*X6'BM*M/.:$/2\-KV
M<4;^V3_@P=QZ$#&[Q2"W#)]6Q2'[;GORP%'DV"%B,J-BL04O$#L^+6>BG+DX
M;'Q@H-6^"4ZY<KF=L8ALZ]98:7?_^5ZX.A!,TMDNQ]P>;^4O#^^H4*0Q%P\^
MKP4RNXPRWP$S$[$S0_-A2/,T&PU+-FCS:EX70QWT@#'67 1A2JR?E#/RK7*]
MG/--TC)0E80;NC <KFKNS5OG95\-T[,4Z1<\=0 \X$$@SY0^*P17);,___/_
M-O-I/K-1[-KZ&?31(C0Z+BXV9W 5.G2S!E\61BO'8L=%;^TK0YY2QK+G7H0X
ME^\VDVZ<BJMN@"#[:J53M2S;/K.@P72LX&X_TS1 _ZU Z_2#V&!/'W0U<S(D
MR:3"5JI'6^BW@?.;./5;T.+6GO$Y;PWYAFU1W_+*9?4 "I<=EK0OGW2$A#6:
MC?4SIL$__P"Q)J%U "MRS>7TGCU(0;NUI,&UP;KS7#ONA-KUF92R1%>NY;Y%
M19.P4K<Q"CO?8(L=.S_20H>FML3SZC;VISRVB$6V9 <O55UV(JLU9W?V#7YV
M)B^H-1/7.W\RU-DR-X-=QHG:1)?Q:RN?6Z1QGW2NUWWGJ8ZN1]?Q8=\$'AO(
M&;4OK*[G5Z>KSD'VV,C*<"M4<=^/ (?>9G?*CGAV3RO=G;D<"%+JE(X)=3<'
M]%EW4I-97R<?ZKFV!78G>%LF+6O;9KJH><]$[CT,@:QW+^=I;S](7[3 7C-6
M< MW93^1?5_%1N;W0/.W<OMWXB*0@YVW@&>S7[$P]1YU@N>U=/^5L'9C=(1+
MWJIE8"USX$<C)/<P+CQWM3JYMS**^ Z;.,I,>5"D 7V?DHI3$7ZSG7[3W*?T
M-R;_]Z,^'&X/..V8[W)<7!9>]VIS(9 #0'>;LY WW_,X!WUHH.5=-?J^:+6=
M)]HN]H>#>%/PP(@+A5@?^N/,-XK+CP(X@RQ4PMOB2&;GFY<+A0GRM%O['94U
M70R?.6>ZX3:!+2+QN):BF$'(.0F?&X1_]Y _5W.<''=5^/D&8Y_+]?5AG]H*
M^J#C[PX+VU"TSQ))0P>D=+$;>RR(@C_LP,U* Z7SFJ7+*E2TM:8G;J7=L:??
M.(5)'Y6N>:ESZJFOQ:JWH+A#-8EZ[&S_-\>*S?J>USJ&<T^Q KJNHRNO+P$/
MD+A\ 7LQ/WE3O ,I-'LCRVN.0GL>AGF"A39N5)?F21Q=$[@;KE@'KZ*IIUJX
MPWG(T?DW'_7AZ;EM&U4,!Q=)RSL?T_MO S=1])%KBE8'<#E8NWBP%#SB'KQN
MFQU?#C6:>[1-LKF"LS:0)Q:YL_&?R/;SI'MUK>G&(WEG.B_1HUV@SSNOPS>^
M&T42E4AJZ9C*.[N>#CSAO/P$'[Q=77LD?3J.<YG22RY>2_Q#'$3/;VV(^3PL
MF[LL.]]NQ+I5%W;IMK/S;@FN=[@\>_7(WSLT+4@^>T +[+M36'UO9[W6PSCM
M=;UZ?SW-,[S-_H\LJ\EZSO<XN!<$VU<\> #VU[K9%Q]Y>=_]-=?9AN]V>]/[
MTY<X#]>+4 Q^X2/PRJ=KXBN^F%>[M9LMMM<\J(-QGJNYY9]]^&Y^?(0009Q9
MN9_PN=OYG7_$E5GAT0MC@'N81^T];X.XO4\7IP09X<,^5!Q^8].^UK/?L-Y^
M>A,CPH)]MF\9W6Q3K'^8MV.WCQ.$'AG$\3?>!AW$9'IW5$MX[X!GMP$$@ H#
M"1($ (!"0H4+*1R<\!#BPX,2*%:D"$ ? D'(P (!2!"1P 02)8$\ !E2I4K
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M%*E!270HBM6C,#@VA<TO/N&Z7T%^ L&<S:Y_CKD8GX9R0 DL(#-.L4230$
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MM\0EJ_*(GE[^AC"+FLO"<H@H+3XP*$!$VR)OAQ0C0O-CIG!D(:'H( ;J35
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MRCS8YJ>!0%WF9B:KV,Z,@J= 2X6C?H3QZ8LJF?S:RGUU\=2 BZKW@QF3=_B
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M""KXC>IJ,1 AVXUH@^"-8/#QLQGIG4%^39P71L\9R-!LH*136=A@^^HQ7[1
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MWV=B3_::C?:2;/1F!?<*+J,"B?=^CSXP9%LBJIK,SR>*#/E,P11P9T#_M.]
MWH9!I",#+JE95H$5"@IO?L*:QD\")0C1="@^X@=U9HKTU(+ W(]=_@\'<Q#S
M/D8'_P^AO*'^[D\(AY (\6_.6*('DU )D]!&!' "08HK.8 MPI$$ U7&D;J
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M-_/_$.ELK,@MF)=?^?%@ V][!P0VD6):+N 4@"XH&,H]X685 @#K;:43"?X
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M>D[X>BCPNEG\
[email protected]=56'&NM;\#*DG>I)7!K%AD2V?=4!60?K6\#U%HZ.O
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MLAR(OY+K;"P0Z0$ ]V-**C^Z0^,WNM]SSIC\E:#W3&HP@!TZK0\C&N=['-M
M3CTFV9/LV8]J]I.]]A'J]K7=]NF<]W7?][^]]R?N]Z$IV17?2R>KSQ[?85R_
M4D<?MXX'\TE#AL?YMNBX\RTOVHA_PY"B]-.$YWGUR$")]:%'R,"IPTI)M>$F
M_-,_]INE_1'KJ.(?HJ&)_KM?DNZ_J9)(_]^?60P>("( 4* (!0H0!(6,AP
MH<$)$"-*A&B0@L6+_A8-&D3(,:%!@AL]8AA)LN1(@PA2JDP)@(/+ES!=CAI%
MJB8IC2 />M3(LZ?/GT"#"ATE"H H4:, S"2:5*C&F#$!K&0)P"0&G3H3=O18
MH:M7KQ4QBJ7P<")%A0X19LVJ%D"$MW#CRIU+MZY M1S9>K3+MR]=K'FW&O1+
MV"]@O!T'%U[\%['6Q&X92X9[^''>R),E5]:K.#/CS8+1-F18UJS$L&,-=@4-
MV:!5JRBGLH0*56G1HTF7(G7*N[=OWCM_MZ3M4NI4U[![!M?XM3GJL1D!F)Y@
ML*'/Y9X]7^^9/?-VGMTG?]<87K-R[H0Q=Q_?N7SZ\^#=%V8O>C1IZ=,C_C['
MJ'HU?(T66(#<:R3%)MMPQ!5'GW ,-AA46SGYEB 'QJTTH$D:05B0@ T]]5^
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MT8JRS ^N<9(+S-M&12J4DH+401N(XD^\:3<%>M!Q%'VI1&/J4'A.E:K\TB=
M\6K0MNV5KX?4ZUVI.M6&:FRI A4L8/GIU\$^M;!_Y1=$L^JQ:QG1HA0%JT8M
MV9NTGO4G+0-**E0&%+:"<UCCY) R4^D]=";MJ*2)[&+Y!5N'R':Q42W1;0&;
MVW\ZMJB]M<YN?3I<H_XVM;B$K6U"9WM(Y1HV@ *$U"(9F9"N.JZ4FO761@$0
MVI^,]K,^X1)04.')H'
[email protected]+Q,-LH'VNK>]R & !N9+7]<8A+[U#:OUSL5?
M_H;I4M>K"D832. "G42E5RFP@C$%8 0/>,&3/#!L$@SA"DLXP!1.( !XP8L'
M-TG"&,JPA1?<X E[>,0A%K&! \S1_KKX7)2T'GZGA[T9<Y2][\UQ>?>6WAZC
MER?B#9<SP>LR'ZNW-@#0,7Q[8F.>S'B">-OOBU6F4HT@&,45YLF5L4QB*T^8
MRUVVVXG!C#T,%WC#'4:QEK],9@*O.<5MUK"7X1RO*;LXQE1Y,I/QRQ,EO__7
M(#PVLGJ)?"5:K<PIY_6 CR'8XY/Y^;X";O)5G@SE*'_3SFT5L(G)O($SJ_@J
MGG1OG+FEZ1!CM-,F43*)/UWJ49.:U9]F,(?'O.F1H+K5!/9S@>'KR5J3),>N
M3K#.<"TF._<7S]^DM(#ERV=0^]F]@&ZBH ?-$T-SE] _H560@=*!YRT: (W&
ML8[O2V-FSQ? RM8O53#M%+=Z>9?NQO&54L6;> .827(4<8E'76^?E!F6]O[W
M)LN[9GC[V]X\,;9_PTIN/4^ZOB=Y-K296)QI_WA!V\;VE1[X[7 G6<D-1]D$
M&]YD2U^:W1H'N)A<MG([ECG8*8^YS!VD\(4OT=S^>B9W3R2^Y$!;?.:ALG9/
M'LB!\Q:]V\-QK\H0 '*<FSO2E*YTE U2<X6W&%U7J7K587*!<W6]ZE=/<DOH
M.Y+Y?MWJP[YZS<.>=2J7)-I?_SH'R#Z2"]C][&A'%;')3'6P^[?M6H=QP@./
MZ9<(&.]:G_M\2W)WQ&<@)F1_.N AOW@,T)?P@6>[VC%O<V_AO,D0UPC/=RQM
MBYL4.$#/MF^\7?0+'-VD&T! X^W.]'%__MP*C+K4;\[Y*0NX]U-^B0:Z;G?,
MB]WLLV\\VI/#^=\+/EYS)_[9:9]\Q_M>[PAW$/,)[_SFSQKX_36\,XO/^>HK
MW\7"'W[R >#,\+L$^;/_5S_XK0[X^2.;Y* O]P1''^W:F/[T0B%T,V<SO:%H
M'< !%Y -#_!C&Z" #_" $-AT.:<RNH=L4F9_W3=_CZ=X=J> W'=\ZN> $$A^
MUU=E#1)OR8%\'NAU"0B!+JAU\;5LXU)GF9>!W/=]&J@@'?@ O;>#+@B!Z/=^
MC2>"#Y@W<B>$=T>$#R![UH>!]0=^]W=[^35!Z+)_/-=_4?%_O$& J5<EZ-6"
M"WA>2::$#RB!.8=_?*9N)Z>!@Y>#] 6&QH<R9#B")=A!5A(OY@:'+#B',*AW
M&J&!;E=L']AWQH>#\Z=X[.> /0B&/\B#[J>"C0B![+>!D!B)#T""@"AXA B%
M_PPGA>?&;#[!?Q1'(5K8A56B5MS6 0@@@C_& 7.87A-77S;685#QB29'B+3!
M7S$!8W?684&XB\&7?JL(A&L7?ALVC)9X=C#!7@2B:K8&;1B29F\':/.%C([(
M7W,($\9V(0;Q"M_2>^*V9+JHC?[5BU>7BR\& *_@C5 QCNA8'(IGC> WA]=X
M+N\W?/0HB92(CY9(AS67(/X5%=X8C,"8CL:!9!7X+>K(7K"88Z>'7B[Q8Z7(
M&ZB8<ES($R=C7AU A*WXBCU67N=6A?F%D<NHAKC8CAL8%4_8$U#R8C Q7T2X
M=I,W/?GX@"EI>!^':B6A:CE&;&EWCS'97]E8D,=&8?\$1Y(<$(<]V6+$@76;
MQY)->6SKR([D>)/ 2"&>!),N^(>81X^/R(_]*(GWQ8AAV83NB))B%Q6#UY)W
M-HK1YG!ZTQ/H]5X7)VC@9GH_<9%/88H^<7%]N9$NV&TF570N083>-F@CAU\9
MB90G<XLQ1X15 ID ()D_\5ZI=H6]EAP*9&^4V1.=R9?D,I7D\ID.0IK-I(0&
M@9H:098/D)H_*'-[@R!IB(51<DD=X%Z#9I<3V5D<<)3@59$:L0JNP '<!)5$
M2)@M<8"N&)@'.%]1TF&*>3*OT&&\L LM5EXF]TT,8IU ,6OK>"6FJ1$=!A22
M&9[-I!([J1*-!R8=UG@%,FO_L^83X6F>XAD4L[8+W"E'X_D3W_F==K2?K@F!
MUHF?D;F5/T&:D,EA"&J@#I*?/D&@NP"@7?(22J<R&>!>Y[:?%0H $8IF+7$!
M*?%
[email protected]>+K$!6/D2=@DS4*0!J@"<P;280.$-FJ013$B$=Y><A>F"+C%[3D9?
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MJZ<4XHTLVX^)&I8>.FLK$;5JZDPI873EJK \,8=DR*[WQK$0&+$>JZ;T2*
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M=]>S#4):Q JTP;NW&H"JU\NI1$J\C0BB",S PMN]C5B?LK&V#YATP%O N%O
M.8- @1N6Z5O PLL3"7R))GBZ(CR" "NE$)R]_=B;^
[email protected]$"B^)X.^
M-OR #OL2YJN^)L>^^>BZ&IP2$(R]S,; D0K!+]M>ULH@JS)+GPL G1L4979>
MA@D]W6:_6YD!9&AYW_JU8DB&_QIE.^RL$NS [D6&KT?&(<S#CN9)'88W-8G!
MR/H22ABWZ8K&,&&\\77&,7&;BSNV'ZRH/CO#X/:UIS6B@_R '>;&86RYZ$6&
MUOG(/[B,_ZR)HN%K>)VFAC]\PQ"+$CH<OJ.\N! [=54QL1OPNV2IG(5\PY/<
MP$:LHQH!F(;,;&<,@5<1R\R)Q8UXF&)HNA\E'*&0+;94"C=A)65JFUG,:![
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M=<!)=L^X3+AB"%_ K:BOYP%Y?5XC\<__4)S,FP0*;ETE@0W3#^AM.'K/Y'V
MS6W9B'J<R&W-S9VEJLW?Y@>IA)MDSO3?FDVI8A>^LCERD FN#[UGJ/UQRIW<
M#,YKBQL;
[email protected] _(4H7VXE;VXB$J6G3P< _R2@-S9^H?<+<Y^H7;A"W[#
MT.VCTJUL93I?@\S"UPW#BMK?@4FJL^?88HGAF3O>'Y?&%V"BA#W2YV5WVFPE
M[LW7M4S-#V#?!%S5JTPAV.S1!>SB4=>; 3YW@$S<*0S*!RYR,+[)HK?AD+;5
M#BT4Z6;AE(KCJMUG<%[:(MS9<Z;GAEOC/(SF:?X *5ZB[)M^+3Z;_QWCHG?A
[email protected]&_^:VN!E EIK:R/6;JBD;UX(>A@#(RWGK>HEVF+8)FJ3@T@XR
MWUBNY=A]P;RFWU_.Z:][CY[M21B+Y(,.YO5+Z++^<&V>Y\Y&GQ&^U$[-9"%7
M['?.ZP\+8 >NBJ_<YXCXYX^>J<Y>=+[^NCWGXXTXKKB^Z*'7Z&X><9#^W)-^
MP.+N<,*^N!D,Q\">PM9=P.1VQC_6LW-)MW=M@!F 5->)7HI1U5^)1E)WUF.
MV%O>FJ'6Y?MMZS\KYD]&YKL>ZI&>YMJ^X5FIX(YNYS<L7]T*SB:ERCK9<CWZ
MYC0>XU=QQA([[6'NY]S(7A/?XMN^K:N,8R';7KA.\2[.YKE.[!P/Q_^4;LHW
MKNZ5;F/"K@&$:[@S'Y;0O*WU+MZW>>7:3*QW?5X9H-,T9^7#+-@N".M<_.:T
M7N*?^<1A_=4/39]!@?9I;Z &M=O+GN4"<ZW%H,HP1-MG^QF;>C,;9IDWV[_
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MQ2X[[;$%?JGMI" +&*^
[email protected]>.^#; O\[I[ +_X_4L_%6W.6O
M7=5+\+GK9GRQ">U>;-BR-?BY1(AHY5RL6C,'?&ZF$2C]@=/0(A<WVZJFG7:2
MN ZV\9SS7CQSR;RT7.O@#7>I]-_]U9IR1-76BW/]!J>M>>$15_MYQBN:+?%D
MM:^7T-W'WL#KKR$'.R*N/W_3[H?R:KNI0]L_WEZ;5*+L=YB-'ZOUG+AO-'S6
M47<=U$I2.P+>9FJX.9)6;J<U%T&O>M:#WN'F)K2Y78EPA2-/\F;SP*&TS2L3
M=(T%,VBX!W*0@AC$30G^06A!N\4G=Y$ZVP>))T$4RE"#,K+A#+^5H:&(\((@
MA&# N/:]:Y$O8!TXS8]:0Z13%!!<LZL:6EC2P/$1,5(YK,J05!C!(%ZQ/E7I
MSFM,*!0J9K&+9N1)GV@3E"U.KH-NU"((QWC"&5HHAE;\V!N]N$;&[22,/\33
M!O_SK> ,HXW) J)SI,\M6GJ,"1"8A)A=S4G5M*2Y2I)$GDC&"'!#I.P"XV%
M0#G*&VG*E*)<XEE*R9K6H&5,I 2E*4&YDU-:2#2P')-+#A@?VDF,EK4<9;5(
MZ:C<+-$Y12E2+8FI$:<I.K024I6\*AK@23F*J$IJ.LJ4Q9PO)&OQPE-KO^
MZ4UN1JTE'/B?C0;"359Z,YOM'& Q83>:8>82FP/4Y"PON4^>-)%JL$NB<-@B
M3X%4Y$CAG*8PW<E.344M. 55Z"=7J5!RGG*61ZJE1.=Y38EXJY"X86<LX;G1
MBCS4F-Y#$CO/B;.!!">:W8+H2STY3?P0-)LMO:<M;3I1AHY4I # J$\Q"4Q<
MEM-^1\I0MT+J3IZ&TZ0SO6=)-+73@>1SI@GD9U:'$HK; /0T NVD*^GI21R]
MLJ(]I6AH;KK.G#;
[email protected]?2A5[>1&*3J_YR[TZ[%)Y7:I8B\H:@MP'
MF3S99D9Y CKWM?*EHE$E7,WY5XW&5*UB!0!=18K_UKJ*M:P4A6Q,+9I898YJ
M7DEE:T\7*EG'>G(J@R5F.%^'T-=P5:M.M"UM1FD:SB#G*B1M92CE:E:2<K:S
MH23L6-])7,^6<[F?S6Q\<'FHT<DF5 !062[WZLOA*M.NQW5F[+:"UV9^5YE"
MV0M!M2E<\S(WE5@#;M0*&EWF&C>MF]5N<@F"UN:R4WQ?2RUG2<M:4:H2LN"=
MJBI]6U4EZM,UN;UMA,L;3NDD]+S3Y(E]-7QAR/)UPQ^^YEV[>TKJKD^K(#;N
M:QKCK15WEY89MB_(HCMBQ7;8PBC>\(L]C.-:_O>(,.:QAG5\8X:NM,+NE+!6
MN3J*40P)EC)2"I%)/)56_@49Q-&MLI5S3&6Z]K3$":4:EQTC92WK=+RM6JS>
MB*3F'=M2S#G.+)4!BU8L=[G,*7[SG6L90T?I&<]QIO&%I=,4)&\5 $Q.,NU"
M40HB/;G"@<YEEOW,64!/&L]V+K)WR+Q7VJ!9;Y8.&:!K!Y,Y9U32,>YAFU5Z
M:DNO&M.M?N''^@SK(K/:RU ^LC>ULNA$]]K(@Y[6J(0M%?P4V]@\,7:RE;UL
M9C>[IGMS=K2EW6QD3[LE%L"V!8@];68+)=O:CC.WN:T5?%@2VQ&+=K7%C>:6
M3 $X#WMJT-[777F]KTMK>]3:GN?/>[V/R>M[ %[I9!1]G7E[P HG%3\*8,
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M/ZV )!;MI8PPFFQP'+#0!;T0"6\ /)#$@\,PB4\PJ/C"0K0BB($0R0T/BUD
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M%_8$@/A<2MD<A?J41<2\3E !:(;BE;44:4@A1XE!:6PT97;T2$M.!_]48T(
MTI<CTB75"",%TAM54J4C(PT00-HP4J%(4HG;/B:E2".ETIW(4I;331TE(SIT
M4B2%4HF3CGQ@TS;-!ZT@TC.=B##_Y5(FE=.&H-,ZC5,??5(AU=,AO5,.R-,_
MS3^>H%$L3=,,/4I%K4%"Y0D;S"U"!4Q(=0I)Q<]&W;A*!;9"K--'-3B1J\)?
MLU17Q!*B4-06 <=APTU-9290%54WY8ESR[9&+511=9]('=5:Q517I=5<]52#
MP]5<?31;G9I@%58B851?BU'+?(T8Q3H9)=8Z%850$(5J-;QIY2IJ%=:&F-9J
M%85KO3AMW=9NM5:EPU:1^]8HX]0E)==T_50 .%=J1=5<;=?%(\MX%87HE$+&
M&M9HY8!V!==L_58VO3RO]$<=!5AS#5=WI5=J+=?\P]=M_5>'9=@*B]AQI=B
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M8@QV8,?<VV\QX -6L2I]C>%TV]JY@#BM6]6582I&7"ONU"D&U"H^5BZN0ZT
MW20>DL5C)C#6T3'>HS'5T<7URCQBX[G_]6)'[9,ZKF$;SH<FG>-1Q2XLYELM
M%ETT;L4Q_F(_[M%"[N(L)M5O<>/92,K;:"(!=B(.8-,=#5[@E5A*SF,=O>02
M'M5*YN3K]61+!>56[&1+/$GIP[]2IL-3!H!(B5PF)=CH%%^-Z&1+Q2Y=R(<^
M>=I =%-=GHA;EEA6]EU1SF1B;EYC'N9--F5EWE9DIE]G+J!'OHU6N(TEYB=K
MI@ULWB=MG@UNOB1OE@UPMB1Q+F #QA[G[,R\N@IS=@UN/H"<. #%;$5KSJ-Y
MU@IRIIJ*V 55V EO5H5=Z&>!5@5_;@E]=B)WSF<#SN9K9NAN=F@F+B"%)@J$
MGF@GTDW'R^C _]OHN^MHKMOH@9AGE3R DC9IDP:I/MQ7GHCG2%%IN94,%VX)
M?.XAE*J=@29H'<,1#%MICK;IK/MHH/YIIPOJWJ3FNSMJKDOJK%MJITOJJ]#,
M(CGI>2:\G5CJE@XDPF-2"XJ4.FQJ<!'HL!;K79@U#'.4K_8UM.XUM4XTMDXR
MMY9%BO8UN>XUNDXTNTXRA3X >:1JD * DG9AC*#IH3!G[*D*TTUA\6T)O":2
ML6:%L&:%QWYL@9YL@08 QHXPS+XMS=8JSLXJSY8P'U1JV1-MIB9M(JF(J0;L
M:7KI<A&QDIX=PJOJPGKEJ#B +8ECV?@FGG@ VSB . YCVMF%R99LXO]FA54P
M;LJ6D[8^;<<K;:=N[O>4[NG6P=UF:92>;=>P;NR9:AL3"JS65RP17*U([=7&
M$T$.[JJ);,D>[LAN[_5^;\FF[OFF[_JV[_O&[V]ICX.H[5]-*>D<[ S[:WR>
M3MQ89\CJ5]I9[P5G\ 9G\/R&\ B7O:9$2E^C<*%X;JVZ<)[(\*S:<*NV<-BS
M50N9B#[!DWGFUY3@-*TP!:@NNPS_ICXA<"M4[1J?\4MLT<V8B%5(;R19\();
M;U-P\ [GIP]O"2+?)R,' "2_)"5G<DMR\A"O< FG\BJ7#A)O"!/_F"ENCJ=X
MBB'9Z[(+\!PEE)%6YW4FK%\=[V]A\(E # [_</ 'K_(YI_,ZM_,[!ZF4, B5
M2&U\^!@4IP@^'Q.*P!H-'#*B2(F=N/'LFVG GNTN[W$C87!.0@XXC_/UQO-,
MU_0BH=Z[Z_264/+;^O2L&W6G*_6A4"8-2+GP3G-$-R5"P3HS9^W7B&ET&7 ;
M/VEV;@F[TY0O!Y?D*(G*2(MA[P!1"/;WDK!3]S5E[S5F3S1G3S)HWXGPSCIJ
M=SIK/SAL]S5M![)3P@>LGFGO+C6=RB,Q=\HZ<8CL1O4^S*->7W$G8RJT> '
M2S1NKW?9L_<DRW<)VW?RV33* ES"!CS"!EPD12^W [G?LVI)Y#@4T;^UI
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M" "!Q(L*-#5JU<($RY$Z,H#Q(@070G, ""APE<&-W+LZ+&@Q8\B1Y(,2?(D
M2H(F4[(<N;(E3(XO.6K0L&J505,Q8=:\2= 4T)TM>^(LJ%-H2J(YD2:U6?2G
M2 Y2IW;< . UJQ:L2J=*O6HP0Y6 > K:U9@UI%FRRHURA(CW+@))4I\130N
M +!,1[:%NI=DWX%Z_WH,+' P89I.ER;^:#@OP57_K#BPVGBAL4?)E NB.G49
M,T?-E0U^!FU0M&73&U&3CNKU=4&Q'T5K>,VA-,$.!,NB/< R+>H-N@?B'DG7
M&]WDR45+].8-0''5 %@7C*Z:.D'KIK$31SIHY'?N K4/'/1=Y/G9DT=7']CA
M_7OI(N''!RD_-_W['ND/U[^1/TRV>942?P*&995OO1$D'$FR704@@RTAYP%R
MSC5'887-(<<?1!-ZX)] ((85GXCQE9B8^EY-(B(+*G8T8O_H;@10PDI=E^-
M&A5T4TTX9J2C03W*E^.-0_Y8)$D"*FE;CDH**=!89"W8'T%+#GC1D0!$*-"3
M'CDW885?9B@FA1CF^&6'_UQJX.-"2*I&Y$9=F@9GD&L69)YYY0&09WEXQGAG
MEGL2-(B=,-XYJ$!_$E2CBNG)V1%E3YDXT'J23BI0I)<6E*FF W$Z7Y09U&8E
MJ5-I8%6D_1U@5H*>EFH@66<! -NLK%A:$">YZKHKK[WJ*J:ON6)J:Z>>$EML
MK;=.^JE!Y_'YHJ)W^JEG><=R!"VB>TZ;J)_I.5LE>Q_-.&F+FHY++GS(GON?
M50@@8)"HKTJ5FU4SRBJ<O +:N1:FMJT+0">Z!MSKP,'F"BPG 7<RL'OI%OLO
MB!#[-V.WB1J*7K:-.KP1MM0VBMZ+]8E$YZ4D3VJRB2B/J')L42I84;[T8KE0
M@J^R:IFO;2'Q.RN3@1(T\,*Y!BVTT$ /S8E S@V]<$$L^^>T?E"S::.@W%I\
M[=584ZLMGCYG.^BV'Z^8-9;(FGTVVL6NRNI>:Z_%]I(CN8T/S+!NI'#0>>NM
M=\)\+XQWPFD+/OA'>%8=K;:%;]OLBHL?RC6?%Y--..656P[3W*T*-??./%.%
MTMPA]FO;Y:6;?KKBD:?D..JMN_ZZW&MIOA/G-M-Z4N95V@T[[[W[KEI #M0
M2P,$% " @ ( )><P%CERNS@ %=$ D !$148M,2Y*4$>LNW=84TO4
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M[;'_6W+UWS0>=NKG-BOD^C>'[3]S"C*S_CM'Y=_0AA7^5X[:OZ'B_\[Y
MM\Z-?]->K-[[OQ+']#_L__]Y_[0-_P\<K)[?7X#QZSEY7G>&.87_@VS_.RP*
MAN3GYQ?D/R0H>$@")822D!4]=$A45N;(/R0C=/!?^L_H_TYLPBC489'#QXX<
M.2;,JDKXGX!?^#]>$?K_4L'^6Y@0#[LYQS4.-AD8NQ ;AQ#;_CLV'18^3K9_
MZ3\'AX,U!>&<7-P\"-X#;/\GDPW&SO%?3$$8&
[email protected]</)<? TBRG$
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M&NWNO0U)CQ1Q,T_%>SW$:^9'H;),#9A9G;[_QEO!^V+H:,.$MC_Q?I+1F\7
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M>)T8(5[_N1TSTG7@_F\)%/_4C(3.EUL$Y@TIC>N4B!)3+U@UGP V07!=2-#
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MVF0\.(
[email protected]=WH<*LZ#IQ2::>)S0O9A:@;DAHUVH]!8H1$-=(FS
MU%J\'[[.6Q*Q4( .P.=1/M*S\ =C(EH$LS<MC*_AY,5E5)?PQERA=OE,FU_L
M:@2\"F7)DH4MS&F99\K*J@ZB4'^CAA]6QR9ZIL?%3"AY96ILHDMNHF/0&4LX
M]!C, *_->UHL8 G_"[T,92XDP_3FFXN+.F0CVV\TT\].)OF&2.5E@ =^!_P5
M+HV;/1#BU+EW7C]D6!*>J$,@@/CK(9V_885B>I(1./G<=RNCR0DZ_&T*F3G?
M U"O7L1B]4K]<]%,;")_4U0B2@B'
[email protected]!QLES!<JC#R%B2F<L:VRX
M7H_5QYUO,1 L*/19:4X>AM*1OP5:DP,\UQ]W;D,L4R.6&R\I,3-,]/\]FAV0
M5B!EZ/:3959TYG5:U7A$CF8D[]72U4"3MM]%5,-<[M%"\VW2 I3I)@'2#7>7
ML]NT<WI(L? ,H6&D#GQ0<C@374*X,K[5?DT:<VJ3[#8$ ""-]N8A'XH81"=N
MA@@[UO(Z:S!*]0T6\3LD4EOK JDW:F@3)"0C:>VND\C>IBA:;>*$F0Q2OI@L
M&S7TIQM(RL2<TJ#[F;:[!R( 7P3>5$'#'P% ]O5Q<2 _94(3PFB,V*73;42
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M3D*OG]Y[5\U:U_6C0;25B<>]#
[email protected]]@,$DI0"(48MF(.M%=OI :TZ;$5C
M<2XHWZ][%T06QSZI;J"9=D7)0FU+%NAU$*."M<0FC)R+*)\/#GS,KDDW[QS[
MAE%!!FD$TGK +U9MYJR>R<2VU-J^6K?,F ! DXY88A[Z>YWV^, Z2(0ROT0-
ML*0^K6V10(GJ78FBY\&@5)40<N0W0\EU!@!XA>[#A,<[\[(2QPG&%%IUK^%V
M],/'D<SBJ1>$J^9'M8&F1[OMB(;33)9BD5S 0QF;:"P-H@_O:=^17Q]17T9"
M1U+:\)D3QGEQ7F/YF9MTQE$=])@>L[CHBA-S(Z2'-/7.A[8[>WJ4/*L&'N_\
MI(PY.YBN(TRKM5]=H$UGD0S0;46UY'5ZFLU&NRN1<!YS,CW+\WXL@6"9&*?+
M-%\!"7A:3SKVRB":L;G)V$&!FT%H*)WH$-(#Q&[":?7##W.$G;R2 <"WW:"%
MUI+(GF6\SEJ1G6),TR'IACD2:5D]BF[<H#1?ROR,4<G#B%.2TA%%M82K$^T@
M0[8% '09/]0)(5:4N;A,>7H(28] >R]#1FF#@./'>R*;6&R#;DOH4#<9D #D
M/1#HHOU>=0/Y<DYZY#=$BZ%5RWO$\H/!@FH?'"_>V/;EX5=O?RW:&%CP#)>V
M:KY1V-.LLL95Z(&58R_ NAX(RN0Q+?1H8VF'X\/D613F&VNADC(WY#;0)-+V
MJ[LSOLM$9]FG2Z!)!G@6$4J"TI=-@4!&*9JQPTU);#C;I$_^U?(C+H4DAI?R
MT$;QMB;A=JKW>E,);Y5D)\M>'OM#R8&-RQP^])"C!FGNT<#>C,#J#;"_"-WL
M*M JUQ94352A1MPZ)^@WCEDD!ZM%E(CD;DG5) 5G'3 J"^@1;;@G0HM*0"'!
M*7([Z$S?8,BI$;-(9"G2BF4R,($YI91MV#N:[D3[L"S7K4K0#QN 1-"%$.B\
M2+ B@0?HC_XIH]7;JD4+ZT>")A!2>:^OC1YPWF0'J?,+D;)C01IN=QKJZ5TX
M;\+X008%:1MTQG@.&SY'BGE:VSXE*!0!T*9INS-Q=G3&NL2./SZYW1W9%T(B
M#:\10BT>+:<,X3;0J>\"3/3&T]ZXQN920).\58#@"C I""!L;#@M2O^Z\4-F
MWE\T6F?$CI7Q)U7:[BI+ED8[,8RK8LPUT(RIMI,S189T.H.EAA1P.:AVPE5R
MHW'G>*&Z.0 $=<N$I+BU7^5#DN@=#]':?WI7S#58K5<2C+T+K]/HC'V8 +H"
M<U8,@\&HC-T[2C"G= 7%LR87P8;/BC0V"F7*$5FE.J\G1_6PXC^F@%>6,^9D
M,A KB>[1=@72MV@]2-8V4Q3M!ZH02& =!$&TK)!S^(QY()%ETW5,7> .P78V
M$ QGEBVPSR<.*1:"E4L@6F>_KS[]TF$/T6BWE9T)BWN,Y"NS9EU:M:VX$PLS
MG#):$X8?9YD+A(CS/#\+:+=OOD\*#.#Q1$G(NWO#)48P&KX_:;LTT<5)JF:1
MT'H^HW<YB\22#[7HK, =%)VQFM>>O2RWR6 -Q8AV'(XQ#J5K@WWZ$,&*#H$
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MLQWZ(.!='IL2:K@,I6)T_%" "XDL.TP."33=>Y'^ELYP":LYE05*UF *9(<
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M,'Q"F8[C_U03,9Z> 3(IX$"(_GF7 QDZ#;I[B*DE4Z[K%@J7:G2D#6>&\-X
M?_MQ%['[TRKFD@W"D2LCO&]#M%['$7AXG294CM.R=7-4"-<)X#"V&&(;'
MN?( >NKB/?! +,WJ79!7V5AS9]83WF9UT:H%,^JWVV_,NR4/7;"O5GTAYOBV
M),'5E2HD?TSY_*/-!AZ+TEZ[X$1LE/X#37C_R/C?)]N*),K6:KDG$\"]PJ[6
M0&<C2NZOV%F1F[+2'? M1R..[0*5F_9'=,_X;KTJWQ4W<+\[E7ZB2*NCC]8N
M1Q81%B,O* ]9*GISS;-'U5K\7D1 V&=M^@Y,DC$,:WS(OY?^VN+/'6F?Z+V
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MAX[1/HR#Y?_JMYL58_W/Y(> O_'DF$1-]B\4I*X*U+K1)B_F7W\P*@PCPJW
M3WG<!U\%3Z6U=^NH>9M=7T3^1:_$[O>^FQU[M2EQ3]Y'AN?*;I?QY\5??G8D
M_IVWCN')PB0.HS<_/F05)SBLBEU[+O]I5N3$GN?TNZ:8/K/.ZS$/SGP2A+'G
MEOTEJ]<>P,Y5>^*VQQ/7 $92$WEC\\G%J3ON)P,I_L"E ^$F;C>'7RR/7=98
MN_!"@VEZ__B-9J*G/S6,5O)@/M"S^,.[RL'%:($+WK>GQG?5EZR5GBV;S+XY
MTW^P*F#J[+369^9=_E71ECUOH17;S6- 6>7"X-KA^[DC]:]8_XZ)*\FX^T96
MY@Y7KYA_(C5([)[HH-A;/#77AN$&M%B%0WD&A1X3&/EE83"<D*035YR3)-_B
M&[$N?FQ)3^_C;%#/E%73G*CDQ*&4ZA1@Z*1_+5-&\$K9]2!+#N^HJ0L:?,&O
M&UDW-*)@?D3*7&*RP9/HCR\_V5SP"K'DE=;#<BI]&S%<XGY!(!,^-[B4O2GN
M"9.ZK*AD[#U<]3SCI(NLT3)*[D/,K9!C?@=?C?4JEKU^4*/SS=BAO;AK2J7A
MYW,K%>TO+^7S/+W;S/&M?YX$EWD_'X]6_IG%O>*Q#XLDEBG2AGIK.WTY"@6\
MAR.AK5M.K[OE52?/7:SL5M;AS/2P?^GQ+-:1A_OW0%_5=,Z=9VVM)7=?Y:]+
M-;954Y='AF[M5E^^TG+6S3X_0VIOQ5KS(RZA)T>(>)DOXDFO@_&WXRYSW?)5
MFNY.)7>5WWT6ISY/W_E&^N-V3L!EV_KAN?99C6#I")\%+_=Y[S[VRME?H4EL
ME=P"?\DS$=+/$W0Y//']B_&5'XX<*/N2[."8^6RMWWK5NF(QFUAGX_+*M=?J
M^*7N(>M/;S:^6\;B-G@N^7>[=<[<YELZ&<:Q,UZAB_D6Y*!DQS:/L:S<OOHQ
M_ZPDZD:_G<3(UW-AXS2NXUF;CK%BR>VN<;\66HX?KHMX6ME$/7SHLT;188D/
M#*\(\7X)1[!ZH\A1Z^@RGV+^A3D9W8TG7X<.U^O:)Y\,KCQ4,3\@L&5<8!OC
M?9)/5&W4=HB 5HR[-"[[[B$$6R#<U#/GTE8X*;2.55;D1-/1]X#]S[5=N2A5
M 'TO13^9"*4!<MJN?T 3=)YA#W1(VY4*HE-9GI6K[]$G<M!-2^#QZ623I(QI
M2"SW;]][F$A0QEJ1FS32R9<:4/KM#%?"0%Y>]P7E#%-_'$(1KAIV?%-!A8))
MDW52Y)Q8F&N&0E?M0"G?X4-,2;-LXX *@?<'CK[_I,UEN5#>:=GSK$--,V=G
MK&9YCZ"V/M C0@[X&B@>O9P;FV"2P5]G]K^(>.]HN-[O_7N$*%&CZ[KH(;HR
M1%??NAI$UY711M>BCJZ$(+JNC"Z(KFNC*R&Z$ET9?O/YKF>MY_]9YYQUYC[7
M?>V]7]==!FVTV/A7F%.AL%;5_.>#[70C&O.%Q$+*04LB#/*\K=&"7'H6DF25
M0*.LBPA+_*PUG<L%#8Z7BM]0DR^BEG50$,43:6GK8CU!X \U&T7X1 7;$NC;
MC$="/S<.T_PH#,<V'" _7T9 &<3__?OE3?I^+W\1CLI3)!?2/VH@=3LK^:@2
M)2"\AK.[(7'<U8+?;#:-LGC4MM4*-MY&/G2Z[;C[KR$+8LUP5EY08TYI5Z!W
M7%(*<#!#06<JP0KBQ!1]V_1'?R]8\!*-')QR#Z7X9T3Y\\/T]>*]FJBQK P.
M(]UHK,F8OU8EMLY?7L6>!2+FDMQ]G<!V<I2W6+I@G;W@A2\>@JIK_P&0YPN$
MMA*$=7(C]T+)D1&4_A4\HUJ1)U_:<XB&B#3IBZ0X);OM1T^ZB>>8<CS_]/43
M-QB3E9$QP1NTT&S\YF9C4)EDJ4E$I%0H@7 ^$IHF/[7[SV)S$#G"YMJ^06/Y
MTU1_^.?SQ&'\.I"HS2B@<&A *O&[HP7@\]"A 'L5+FV,F?<VCHS=:CC+ZALK
M?E;'!B&V!(-.3><EV:#.K-N,)5B\58]\0J5RQ<;V'(>=<TC"TQHDYNCH'Z1N
MV?&A>O2+''N4+Y+9?^NP)I^TZ9U&CR^;V5ZJP0;AS_W-=>%'T$I 1%*,LB)-
MZ$+502&RKN4IAA > <_L5Y!T!WV%P@TEA01PK[0<U;OB U/VOW;AU><TI8P=
MZ"KE8E,[73]8_<:X26(Y3OZJ:K&W5V/256BRODA&6D$L%=T2-0)O'V2CIX]3
M/:L2+/J[-BS.N+>D1J<VUL4";:_)^8K= @^U*6^=DL61-9PB*>/L\6O"WJ(6
MIE'A?2JJYA!PWO4.J<GA=[ILARFML_@<ZA>YTVQ_+;GQ,).912/R;0WJ96:U
M>F#[CS7KE@8/"V.O3B>_A@<^C%W;:%GL\OZV@73^M1-:^)@+ST:W&FC<:X^O
M*?IJ]2AHD9A9CXGMDV-%U S20N=[M*;2A9#UVGX&5N3+D0,W,IVFR%:5;VE6
MK6E-V+V_YDY9TJLFTQ(QI17G.7\?26*+M-YJ+.!/ E*EJ(S]6XG!H$\=;F<:
M'B<>__1%,]<*,D\7I8T >/,/T*51?>.E7"3IAG_O5?YEF53-(_&T%2DKOC0P
MU-NY='R6B\>>_G ]C/14)(5$PSUGZ]%S1[,5O6S[[5<-M<%F@*IS>*N@>DQ+
MZE[#[;R8I4/9*V ^EIV%KH]6?T/?4\*N_J1A+7Y*- =<3D>35IM"2RD)NN[2
MDOC&.D+]CC]OIMQ>>Z",F$*33B!W/O@I44E0'%JW=(5-F=Q64Y![^UW29=IE
MYLJ0RJRSVR%.%^:,?+<N"KS@#T5*?;=%EL R0/B1=%9QBZY.!;F7[85*HCH<
M3MRB>):M^O9??&HF_*.^H/X]-8#)6]GAR]NW@^J,B*R++HQSQ?68OP<\E.E5
ML2&H5I[ Q33%TG&C@4SO;;,5[_AW87;9^I.!YX_3?_@-5X_ _+U?#28&'_T-
M.Y0K'/311>X,EOFC8'L_%.;^)#&+K/A8T#4.K4M52#T0$C0U4>^D59IM+$+[
M= \:8LW2;]D4OIN/X.%\YS9996TO,*(Z.KUK:[0"4QV]5-O<T^@] Q]E"^:H
M3PU$O'Z,?0A@*I@;E]!('QZZ$MWJ%%PIL, BR7*[G&;//'7(9($04L(ZY[#P
MUC>V@$(?H([QQA.S:O/D*ETG8&^^7"D]N^85IHW,U3Z%Q9=JS/<)[?MOEA+5
M>\(S:$:HH%K-I.L%[<'U)X U^>R-D5HS)FN1;Q8YV^>,Q,^4>?A]Z0)\!UBY
M_JBH_]&_YS4TT8C 8NZ" OY=Z!HSU978W?@.:>^OD0NSR#J*W!&8@#X":+M.
MDX =UUIMW]VC(+9&_!JG*+;Y.66G3E4\=?YK<2*-U*>P"<<5E1-'9YH)V'IE
M_J% U[AWF:!3(NZ(7E<'NW> Q%\QDK946RRJSS9$N>7?PP;G.J,,<'=&- .I
MC!S+ZFL$0L7ED=L:GW[LLUM&):I%D,Y2HAQ?2!+X<>5[<K&+,+,K, \)SPS?
M#L&;:F<4AMY@N%*+5:J6?8HL:2"(SU42 BP7)AMN6:2E[_'#T&2R]"X5[&:0
MWW=<R@BZP2@N/[.K37;Y[,]PNMT)J<2SJ+L\Q'*7]UH+/Q\ (V'5WNV#K2'X
M,X7R"-7C]+A;XNCD+_5PH)#Z!_Q1G+!M.4PZ%<MSK:W6S<20OX!U<$ZFV01;
MP5?2E%)_A;4+:48 $*3U.T29Q2K+ZYZLI%^2AW*FP<3$_4^UXK^D[;=<62+2
MJ:EERA/*X4E:A/UYV4F2PX$K.>< )07?N/TS</2>3K;#]1$6Q#]HEJU$6K*3
M[V*N=D1XQ+MJ1V*6X<OFJ :>@J-D2*4'#:615>*41GSD*0_<.\AE]6M!RG\_
M+P#!*H>_UQY_W6:!N_))UT!WHAY!U]:?H0MU;N>#3'EJ47('#![J^^ YKOCK
M!P,59Y$@/XZ+'U3*QEC#NM\KBZW-^ 2">]3RTNP$:'W9+A\@WVF7!+[*R(QB
M\E1L2#I7+*C967?[A7AXX_-A[VF'.R;Z\3LZY)I;<3R*D- 06= 08J $2R:K
M1?\8TO^SEXF6]%#STH"VO"XED1*]_E \,$&S<"-(SR WK)'^'6JJS#["\4;Z
MAEKFQ>5VIH'5J?7,?/9SQ=NJML&YMCG&BYKOV8_&9Z?4YT]'F,ZG6S\P.3C%
MFA(#E10M10-@8J[[!'=I>.:%?ZJQLVW<)Y3JE'O>(>D/5G7]P<*+GF:C'\8I
M5L5R":=O>'8WGP3@*)$LYYJ%JLV,<NK[U'PTQ/)*KO3S2[EV5AB[MNM6O>>.
MA&ZUWFH%Z A^&9-HKZ]H)EV2H*TD(Q$\N<3)[_=E'HN\QJ T,?3UU5]X C%9
MK'LX\J*\K7ZL-%PT:38MXSHC$LN8-L%>1:O3_!QUD'?.,TX06*!FU*8A/UQ6
M%_[VHP#YKD:I:?'!IG!:TZ+=7ML:IE<[<4]=.Z$6>3//\?NM%8';-,-53PD,
M^%![V%(@:VR/182 #6RNYRY@3+DV3[UDB5FY&=*9?YTMOV)\]5 =<B7[V//[
M6;<ERP?MS%T<$O>?\[<+;O;P]<66,9WIKY#9Q(8ZGK4Q#JX3+\AC<:ET(<M8
MN#L%4/9KO/330-TM<6Z?]+))^272;E(5W;J!!Z.[D.3/Z4V[Z3+HER/8=D5!
MUC=.^NWJ.%Z^5#_'^1?T210,=;1:RW@Q8XIUHJ2#X*N^5820.K5I5ZX[9._C
M]6"D(*\ *Z"\Y+\M#_P_]T_5:6,[/NIZ[+2\ C199%;<1WE(RBZDE5O6]N]S
M)3 MJ*;G:MGQHS[/EK]L\AVB4MK(5&.OLVC+D]&>[D08U+[I[8@ G_*E.S'L
M?5?)^8)MA&ELB<[F)<&*W%X)*IR/O"^V"G.DDZ64?M:-7^G$L;SX+E"BY]UX
MD!YVQ:9SYB7MU=^4$?3]3-=VR%J_LS-1'^4]O/@#.82Y<WB;I;-)-A2>8'>Z
M[HQYLN9U(<S^-FQ.5!W5[ %2U&3GTQ"*E;R.L/![_,W&FM,H/Y*@N\EHKC8Z
MHO8C3:A=LS!LV@IH* <G5\BJ&^11:2R;?.H_*J30.0MU.#%/K=2/3EC)D!:M
MNY:5E?!"!A6#*I']'8FS1QP.7B,G3F#OM3S+ %M#@WO^=$O]&4C/SPH'%+)&
MJSFX[HJF&T^B+"<.TD5&\2GO^VRC/8X'."$LE2S\>U>*\IR2SB%U7F'HI696
M_'XO.<>Y#2Q-IN=M[Q^L7QA]*7LD;&HWS/6&?--!:N\-,B6#-DPR+1Y.?;ZV
M>'Y;_25AUE#]'#_HO)+&=QZYE&6W=MMF55M/%3P%C&H3D$P<>8.T<,SJ',P>
M[P6;&O' .FXC[!D>\D#::A5.05 V/'9:,+=J"P@VGK^2&>$X>OID5\*&0$@^
MLJS<'C6>A\@&$U))]ZP+0>F+HH4E_&M]CT ) )Q24Y9D7T]U;9[=IV9 566'
M6'_)5V?H;<(&+CZ";V@,YM^_[1[QJS%I5?<\&,PLI=5/E)ZI.UU%=-C4PLO$
MGJ03D<)85^O#Y#8VR67!D/7=BO7,58Z8.P.J;#[XU&,3=7PVC6G1PX:0!!T!
M.[K(IF:YQ;<45)0(C%AKU,D3T^3;!AK5>!25T].G4=(6P<"C\2DZ_@R;&#BW
MQJ29K2,>G\M9P;8&R?<:QCP<X>==6^ZTD$?@5NHR!.^/)TMB?<W(RBTT^^3?
M/[WVXE,'3$/_T/XU:_!]J23(83=K]=2+9O[2#EP!UJ<QX'3%!]FM((J(OP0+
MI\#LJ4=EQM34.#XJI2LJ+RVF:ORO*#6EA,ZV:;WU S5HK;P=.!F)CF;W'_8$
M../07->.L*E#D-LHNBO92)?O_\0GX&W1*P#OYA^\TCOY$AD=1%@7,V*-S*?L
M@&2()*Y&_)A J9,NW20^F]L/%O7'(L.EHPKR,X;#SXFC90T!DU3?[.C>C+=7
MSD>%4/R*CN_NC,9H6.-^FQ^AN7^K'F_A9%F'-]=#C^_!]&\K28 0W;W!TE;K
M>G%^+/;$Q_K'(A5*^7XPUMN4Q#\\)P_\'R)2^"@"3"O01.<*+D$XKA?P!6GB
MWOQ_VD0YSMHSA LYK=UA50KTZNCR/P+???6*)\0J)?[87,[J/_LYR>5UL8FP
M=^Z^(.)C,IF2(F-RNHI6Z@HB!I8Z,GL6FNJC/$*;X:G=KLBLB 7!2&%19"<R
M^A#X[:'GV;!JM#)+(G8G<^Z/^#!53-C$WBM 2-V-K7!-X-L>_]/,96[;F7B:
M.N,T&>?J09=:I_N'IDC=?<6@%U7/11 '5HSQE$Z)U#D+G/QJH7R&HD/01&[N
M@QI]M"EEE*1L!ZE:2I/#EFXE2C"Q*E&V,P=#6&FOPV)_19<19TPX:2[^,E:&
MUZY/ZH+^^DJF[DAU3X)6\$E3!@6#R*A)D[;DR0["SN:7&<S7<B6C7^ 1/QWA
MX&T7:/.ZHF[:(N\F_'*<3A6@&VCD_[L]J/CC#U%ES;6?EVQ1WXF#X<REN]Y7
M#)0CL']@S.C1 P$1#MHN>HCENROS,;IRB#PSXT&Q\PRV"\#>?]X;Z;>.[C&E
MX899YCT[MM32!V';+<G%"5R64@-93F@_J:@Q4N:GAQC]2 !&0R+/3 :EBC7G
M(E?Z";EO1<WOIF0CAVRQM&R0[JITFQC;K=Q$"IZGW2>2:>=+Y3A))GEYW2V=
MG,+'#^=%?#YE,Q CT'!0B5H^$JN!2%H/@'6\IMF(?XFQ16H'/0HGT1);/NZG
M<%K#Y6V6[?0K8!<67=#!=]ZKQBL^.D-Z@[3?Z$#7C4,$()X$&RX"0/B,'+\G
M5%C=<LG;(A3#,"R*.!T=^@H'K-+IM<PM4HHX&"@/[L6QG5&)GL7\JKD$['%G
MJ#'QOT<N7QB9</U^#$%0]=HH]LM.6O$FOI9Z^6#P*P"!".\I-KBA&C5GI/,G
M9$**))>B%=W&W!CD$+_.8JD:@"&O36T$PXO5<)=S8Y[8?3>\"=KII;O&I:MG
MDH#N'6DZBR Z+3Z'3,I]FE/:OUO+WV[%)W$<XFPSL@^2\D'Z@I]T=!\9QSR9
M#(HW?Z+U?Y PR9<LBOPVTI"!9*&XNCEB6LI522[PRW.>2&>I9 @\$A1^D?2[
M",-#BF<8$8G_#F5'<DGFN-.&45":%VKZZW$&E*Q2F?\=@C YE*T;G7%4'GQ2
M3/:F.>7$K0R@RY5GVGN\VX&)#RH';&:O+YQJ[4#^P"824XP&N53-?C<:C>GN
MZS_^.E'&OJ]B(=K,9II$K#3VJTW-00<@"N1KII/Y)TJ<4@,Y+H ,"G.]0OUT
MYCA.O$TBAOO;='R(@\)?'1_6[1B9HT6/A$-,FY]X[",><:A-^.I1;5_[VU%+
M>[@2)L.<@0JU(M_AUL9(7?'4,-SQNZ#P:R<XU<C=YR7["6].)/5JQ9,_RMG^
MT_]J^5>AC]24Q!%$D77(RYC<A&)3.%2_PQ4,T+XN?Q1Y?R7;- 2[[<O&$!_U
M6C12:0N^]R<&J8X[.MF4H45]:#9-PSOZ(C:L'%6/&3Y@CZX8$$?^#>!%S<YZ
M#DKP=%O[J<_MB[0Q#6:I#VUO1GQ>R(-+NRKMKH,<[:[?Y0<\3_Z0B,[F2CLM
M>T2X4#K/U+RL' 2?\:.%BA'V5GAK/"L%7F0F'(:?*6+-IH[D2-JQA&O_:XOR
M,AF*!G>S =@6_[-]TDD@CT(,@RF98<>QCOB8QN3 5/GZ3X6T)-+MS-$,4[*E
MTH.L%K<D&"B)9>\<*];3^: ]O6\]A>;]TC"V>3TJK(8@,8^?C@(L*+@B%^18
M:U#PU?[HDFTFR)[<$B?1C.9-&&V:8_\![.\VGENXNR]#]-K;%02$7$V>HD.]
MO%ZN6%JDP<!"^"[9LC 9,6\'&^'9'0 E*+LX[' &3+GW9OD.'\E#_KS1KW[A
MR$/56]!46>OB^:\#=0@8.>MM#?[[/_E\*O5K"1UZ]V6/'?4G[1_'\A2CN<C'
M V\70@("OW\CYTJZ/K&3H K=O\):T0BOFC9()N1$_V20^D&31>'D>T-:2$>$
M7?G65-Y:>[NQ*<">WLI=*//VRR7,"U^WD6*>I]7.-7P$VX".;1T&+7KS56ET
M=)CH8\([![]T::.FQ;J[M!SC8R><NJD,R\(W2N[6[Z/%#9N[;MM!;-2Y>>TZ
M?SSG4L,PM%SY)BVZ^#"-A?&R;+-[*94J06]_[<&I#T@3VX6E^#PE6_R(]1W@
M@GEW'(Q*52 77!>ZC[%8,VD4X)IRB,E][]R9+0\Y&Y4@\QHX9UO5BV?F]%'4
MS,EKLZ0X:IXL4-10W9;.I"1F>!Z7ON#(3^#G5UD%-UG1QD:GTKF:=&VD1,4U
MM%OQF!()@J+OQOOJM'DNHHB/\:5]IB81D+">TBGW"V.D-42#DATP+4:'-(C!
MYAP84Z+:6R62W[SVJ\"S<\B)V,L(DP?E<H>W9D&K@2OE^C-$WWK%*^&-M-M>
MLTE0NS%/Q?1 Y>JG2\1 BM;"HJV?U+"JZB- OJ>\3SLMQPQ%T.=.UDW:#84Q
M>!!!77"JOTXW$?[^]E8%)?'_P.TD-2W&$E86)C[&8I2BHM2C9!(5!&.MZ9FL
MJ,QFL-%6_;MD*II&^:5YP _OY)'I#8$+6;+Q(C'Q:<*09F6U6J&1] AEU6G9
MVW%S6T^;2!M><"@1WH)+*5] 0P.8#ICZP!4U+K;1L"(-WSE$L:?&!.VW^T&G
M[S#R%,FA6E1]C@T!'F=V"VP;MY?FDF+-5N]6R;<+=AK$'6E/CGA'_GZ>:V4C
MLG0%XAP,,17UBN <_4<<S>?QA=V.Y<H2WNNVN.18UWJW[7RS!A.]!B4J[I&(
MY27P6\4R5LT.IQH<KBS>>UQ(+-(5%5N@QG=A4CI63S"BZO,E=2*Z@0^8$G6&
M?T2;\BUL+"W(RF=VY;:B36H:?M]E><0E_]RF?P6 ZL_D=&;5NG!@2@LW 4E;
M#0?4TSI;&.:0[% 5V.*(!P9R*TP^AA*F+^4XDCN#]OSWRW& *&VHS=6W:0;=
M$YN/DUK9H#GSL-K&N[EP3XW$U4MTCO0#M"9[B)R&!Z9-A"G'SB<EQ^8AF7-:
MU%> UAJ,U1QFX=$FDOKGK7T".[_\4'1E]D-]8X](OO;O.UMAK5':%7^6"]UZ
MTX29,L\'OC0./FR5V1MBZ-*D[?SGGZ>XF49W1CK5V!;4^UY("0N:X@QE:YC'
M@X&]8SD" .!Q!P'T*UJ[BK%*RX[?1M;UMT1+>R#8?O,0=%+22'[Z3##;\S%[
M<S<RY)_,4'88*1@,/)] 6#>=7=!C2W U11-Z4![+7MX<7-C[Z^9P^&_9FJM0
MX)%&KFVNO BCB ]3H;5H),@["BS)Z>$?!.+HE+=N2]7=6K0_]";'+3S5,VT:
MBB%PMB)9!$62SGK[8QKGDM?ACMFF760_M/.O0P)Q/CQI.-C(]86U! VT/ QH
M=B;R>U!=AN<Y9:6W/TDD;07N 'E+Z)M#94*N-)\TUG_@B4DT'EVH)^Q9*I08
M;X_1GM' ODX=WZY&2SO0-HSU0O!ZKS>^;>K&RL[G-G\*$WL%T+T"AO5SO84?
MUJ7NQ!P!_'$N9TVX3_ $R9TWV<]#A (/3(^F1?M_=HPR4K[PTSM">ZLO7CJZ
MR[J42ZZ/1+S8W<J39RIS?!$[O,00!W?%^OO[M)R3]/1=0_IF*FQ0WJ3W,__F
MPZGG][Q^^Y(W89]O#.=.&<[U]3S%'/KB@PI:1]"NJ.!>G!.E[62UO=2D2;*?
M92C0(G8Y#Y?UIY8=Q$NO(JOI,,8YJ=?UG*XC%Z.I]B-R<V?<&K*:3;7OJE>U
M>7_[T2#FST/GN/^^T+#!/O:/=7MZO31,!=2XAK9S3%4(IXW55SE-P!?!-"_>
M5RZO@)X,\0 2BR7[
[email protected]$Y7R%50P'OR=326]Z=;4('L*MPW%O5G'>J5XG(9
M;??<HO67EM#2*PZ&ZZ:@ VG@A>G]0#_KHE.:F(%1+/4L0C%1J":4H-VE]Q_0
M/HL$K8LG>*L+^3+7.(C _ V#+M\50\_(K\@Y.QUAH,F4XQ RG^[).GMK\9>\
M9VIEH*+I,\L!@HSX>7M6?.IS@:K^4('1,VCH7QWGR^%PA2;2(M$H\4YW[1BM
MR=8WS78!.M37^VX0@N./9UDW[639KHX<8<2M2ES3,Z@X8V&U]GL'5<D?Q,XL
M&>WPY12F<(%$@5OV]^NA%CR%*6$AZ@GXJ*J=I4+8)U>_<%C_>":>N!:9#3G'
M!2,H<N"%;+'1<1T:;.OVQRDO\*"&7ONX>72]O858R-L.06K)4ABI.PJG3BU$
M]7HLK7O3):[V0'\!95\!^X)+-XWJ&KW#CKP]0S3C0?6;U]WR+U_I['#%LP&M
MA^O:%-*[I!?LRA6:!N8\F!]*N-'D9=MH'*$_!X,-)Q(8K@JO8% ^J]GEBD'Q
M8!4QO&UX0.R/OL#57O%K$VF*3E05@5Z"O8*Q8H%Z955UW>);2V. P+M,3]&
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M#[U-(S4<(BNH$]:N*>C3GV'*AZ;%**)^1L�"J_G6B*<B=L+P\TR7!2.C -
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M96C1J/LW1Q5U5M*\RZ:%\;A=\IT=PQW[*T"A@YD?6E]E%MF$VN0#2#R;W6O
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MB\!.$C_</QB0GFW*)E1OCO %UVF_6IR&$M_#CQ.>4@ZZWR=>3JY!3Y/[>6]
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M[5R?UX.N56.[<9D*IHUX3KUG"1YJ5UI=JMK"V'GBK_.T#G','7;6!,&
[email protected]
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MSJ-K$< #WI2?P44=1^7VV@DS?%R##6]-^#M6VKV!A,3&.\E[N76V*4G#3,<
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M %$81P5*"P\KM'BUPDK%
[email protected]"L!:NWTZ06SX'!(%,XU^D>"3H971;&3J
MNW;QOL/Z*N<GH# (A]M,5'*=ZIIF\;_?):.5S'WGX-B=;VF6)W/D&33% :8=
MI6O'FV;0*3L+?=091.\%PR&W^X#.5&' XU]\3>A>T_L"[S)Q!])58,\KX)!_
M5O@I, EAED^U3WZV6 K?QB]<CFP!#]9? ?]EHW;4+O$U&Y(.-778,LS9KDD7
MON!:08)>4 JD>H>FWE:+\B+G2#KZ.5/\0. I+O<"G*8:D[:<MV?/VX@+0K5H
M=TA64\\UNM70.M:!A=>(_QK#])[Q" 9S(]0#&8N5?)JQ@Q8]*2+ ICS[\>%1
M#K"!)^ P9?6!0]8JO>D]R*E@DID-30ZZ6?1(DWDC.'L:Y2&=[1/6J@YG(E:<
MSA]#C8\G;A))MK1'#"\>V2K++/HJH74[@^U!-BM__7EAW;:UFCXK58NAJT;M
MTP!*1<3MU=<J,45Y3<0F<NEG!;7A,TNA<R]!;3$%%4<FS8-)RR!=ST[=P.2.
M'T,)F&JW4_^/JO.,9O/QPWY::K1&=6AM-:K4KJV$HC:M;=M&;*LH0966VK6-
MVK8M-J4U:Q/$MA,;H4+BN?O[/R^>YXV3XYQP<H_ON*[/=0>=*+[CE1_>.@UN
M!PR2M*D#)F$TB^S#N>U/7I]SHO8)/J3HI$\,?0M2.%XURLL7[[W]UJ?V;W<:
M&=/\K?K?EL9M=RJT1*,\G<PQI&OR:*C;'2S5GX_U?S[DS$5E#-N8"TV9D?V>
M)*MZBSV*T?> \1791=WZJB\0:7R]WGA)2GXY6'%)"<>2Q%"QL$NC9(CIZ$B*
MQ"?/9E<-5^(O,LO-["X,(=.FI7E,*$>O&.Z2JG/>7X1Q+5?04\04<J]H',;L
M@J S>S!QBX77Q4FP]M#V-/LO$_F;7AAI="ZJ_<$N[7G-KR<$KW'A4V?MJC$:
M1T3CX,(,3?Z,L*4%0P:]5P2$2C4-2&_YG>##0QP D=PR\;Z+[&@R,4Y0I24@
M?!TC3!=U RHVZMH4B5*^SQ(I'M_/XJOZ4V-[+21)$?S[Q3@K;^A8$77!(DO-
M,U[-T/%2)8MX]U16[ADG5P[L!J%0S1G$SCF[\ZP*V/)T_& FY7<HYNXP(K92
MOR)\9]X%M&J'6;>TJ$FP1#@Z&A!= +(QJ25TYK*>08G#.AC1Z0.+HJH#KD]5
MJ7 AVAGI#>EIZH,PM24,3$HPW D2O;@YWFD+.VO\<95FL#/U(0_S\UP L3Q>
M'T 9]5P"[@@IP[)FKX+_/;YQRA$A<QY NC0^D@WW4S+W6,".NB6+7)MQ?.0B
M']M'P!D^!%O&D&-,X+I[@'@?IH\=8[_'IO0@]$&30GZ\DD;L*J\!G7C>-II'
M<^\;V>.W)]L$(.,SR63T>VDN_$1<SC@F7 WA7HKH2W&*>K;'=B%<MR/Q7EJ9
MA>+8C?\5C[.D.&E29QA@%4@<7/=RO8Z.Q44E?L/E(@Y+N]4+^T01KYP/]2N=
M& !;SEB165-5A2PN,_.@(!TBYE=U7IV=U]@YVKJ,B\2UP%Y@RJ*I22_:#W@#
M@AL:P;M95;@GM8=;;L"MKP#3AW!9JN)-50S3*&#$R1N N:41T!^]#"7 !FF5
M6(YG1<].; 1FI*SB:D:] 4\P_P9D,.7#7&<C8B%IB7LU@*Y,#/X<T3=FC&H_
MPLN4'/6 8?RAN]#CSA6L8%!K1]%$X+RA(63I'C$7$[-'9X;_/"Y^N.S[$%+T
MPT7CCTF78F^X@60<..V;JIV/?C+592XA:/GSJ*(C6BT8JOZKC*7-L.7.S[QY
MP\R#*D#4Z-:^ =W#/;RF[E6_$QHBK,^"9/G\'-BM@!?_5IMX)>@-_/]KV4I:
M)S5RS4]A,071%PQ[$DE:-R!,8'Q3R@\YG#V))G!?*LK6Y ]<3<9>;L-;86A=
M[=%<$-OO4:PPSO^LU.AXTVBT6C\U("B94.]DPHN/>^X&)*W)GF>L+65'R9Y0
M**?,DLFOJ*'XJ)6I@$TED^5_'1<_(<A(ZK;B"DNA9V;5NN>74*4>U<_S>*F7
M/Q= 9UIN6.] Y[-W4)AQV" V0.::F6N@*('H^*4(H**?GL?T@D^?:EXAQ4M
MU.8C@6@^I]Y=D<^KFZX#I!7%SDDM_PH.EW8 U1$D\UY5]CCW$8K*L\#<K*1
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MLJBL$KS6LA0S;>0Z>WU%9;CTUS&SH*(:O&=2=,V:E8 5!Q^ \Z[78&9=Y!-
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M,RMAQCH:JIS<L"_VMUJ-=HV!QBE7U/NDPG2PU]8 SZ 4S-1UOV;BH=P7Q1O
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M?7=^\LIE@D#^%TM>C9HCHA>L>O75[9 , K2F*8FW0Q=X(VM6/K>AIPT/JV<
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MHC1U=']MY6?RRBF'[H\5$E^/O]F6+1"=_E&<7]#]KQP, ._IM&6B&A^PS#_
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M)[%3IOKGN)EJF*+EO<X*ALL[MJ@HLVU#@ C-"*/"G?!'MMXM<JUZS[K><=0
M#S43ZKQ"+6%*=/X8'C(CVP08-N#"@$4D6;S&;0IA&99!WD=Y;OMEZA9OT,D8
M&Y/\U9%0AAXIWQ<S[LP;&76;F"_WO $QQ2%U/DWR//;,^-:#H[@PO@%I ;EZ
MU'U3D6SMKNOMJ5NXAFV@1V5K!E5 2_IP8L/#4!/>&Q#%AJ-_N7^YSX0O-_@)
M'8IXT"S7%A#4@08^MM_M^1.0U__!E?^LTN> \FI[7A"0"D=SU24RC#M7EOJ
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M#87<0@XG#E9W8.*;X1T#:>B/ +F+GL.@Q#(G'YX:WN)'[TD95ZDC*K>KY
M-ET]7N('1MH(?OX6KGU D)BP!.\T09?!9_%A9@]ST-Z.W>X4M#+C5X<RHH*B
MK2E$/F2T#[XZ"Y=VS_=[T NZW*9P<RGC;UR:("6E']CVV89.,<[.>YCLOO2M
M;$QQGA6/&;\^7% IO0&U6Q&^?7RVE*GI7=L(3;N[@=EZR.>A7KC8H"<L0';K
M!D346]D1YO=NR$??,T62^2)M2K)@DF;J:2]"@K>G2;2F-6:3[:T!8J#KZ8[@
MA\=B^6VW_NPTMHS*E!$$!_"X@8+.6\@G,#R6:34.?!9I+)3UN6\_C\/HIO=Y
M0N8E/Z5)+V*3 )SM+**-[LIRXV'#=D)E[#(K%?S#9&Q639A,9+M0<ZLRM?RY
MCRC [95I;ZIN*8)YFDD%737&D(+.K3YAD1*.9S9(2=97SXJ35-YLT5V)F=!;
MNWE('!=$3?S\+U4U$9D]BFE/C>0I0J=]U+]> 7*_>8!I4%F;'$OQ^< ^4_ D
M&U- :R5EG7'KZ.,<:S,Z,9&D-*,WK'F/=8.(>P8B7"['*\15]>QMDB)+W)N$
M0L7_!1@4@30 =R8OP,0"<6EVQ0C/?P](]OS/:'MT [J9W"-0#317WG_\ 7='
M*R@"87#,Z?.+7ML\^=D8T4!*-[._X[TR<,;#\.HC:>V./X?WT_?.?=G\F\5Z
M]@Q_DB\Y]2MJG3G1DC<5189'2![O$LO1XN5_LA<H72KHP>;P&"]V,[\66_@X
MO3]4\(C.EKUID>?Y#%U^=4WXI3>Y4L%FY9%Q]@P)C-:!KRNL??/@=!8L?P/2
M:8(]6I%MH/Z<3Y%CD5*D><;-%" L?5C?'1"4;\_B.782_R]YR50089')!VP:
M_SX4T(@T_GUW["^%K,<++U]RP<BV":9C"6:R7C:G9T;Z YS2TN<;T)%.*?OM
M>*+Z8:?O5@V-]0UHB8(]B<:DUH7(+*,KK#O(60I-0TN,\^[$+"[EUCC-5[LY
M^,OL<;& I; A0U3&))TXV/7,*7383T%0>/]12_!SA&* T\$6 Q*(Y?7JP@!*
M !9W9!B@KDKML'@^.I<EQ2=C2"]N'* @G6Z"^J:8- #.D.A$V[7+3SJK%^@G
MO>O5H@6#+:&*/ECO[=EPV0.9]]TD[@#>:S20HP+2L.,M*'=@9%22LB%T7N*0
M_M09B.+DRG8;IYRG:7S*W.VK(M0/>J-")TC/X=4A0*U$-;E1V+4#D!F>Q'2Q
MPE:HKR$*#]?>+<P(_!3[4(9>79() .?CF)%0T\O'.<::75P>"JY ]^Q\_I6'
M=[*B02I3O#C\OM8G8Y873=+J^FI5RBCOM?@QM3[L"Q81'JE?':V[3@VM'UPW
M?:VM1B(+,*U3F7(="9D8&E'[/6@\ '9]??L;]]UD.?RC5HQ%F(('7GJY P4+
M9?]!UJ_^YY+L9 ]_%'(H/1/YW^FR2#G*UU(G9M\*K#[;155[D8B2,8R$G=Z
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MD18\+,3D @NY%$^ZZV9S[CUK"W[SKB1T=6<+*&A63HX=L:_76*YWZ(F(495
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MLO$^,GNHW#;/]P84UH?]]^ 0[FM3.0W(O5*//D$*\#04YH-U7KZ^CAV[Y%J
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M>V&SBLUVF-P)3=[P=60XTQ&M;E_%+ALBH.5"%1WA%?KDQXV$YV_X+C]16NZ
MY?7%S+Z74#L FEM"G(X@6<>$G./T+\C ;(DNW-5Y'FDP[+NTTD-,!8HC5C9W
MCE5?U!%M^F-SY539>,ZZ_PH'210/K/&,N&P3 _LL)'Y^JN#I68&S!Z)DX#AS
M*0_"I<9Y2WZ^WXD#UG^21L(A?0WFF@6JM+',!^>EUUUP297K3F3 4P'0D?9@
M6(ZVF,C+^M2[M 'Z6Y[ $ECNG*>#,EF^#V5:K-O)VJX=&G2$F0BJ2\R&C=[6
M9#993);H('NAM"(FJ&X-BE=D^LR2"1PA8"17_F_] <)QFA[4?6!RYH>QWLMZ
M!YQE<]ZCNVOZMMCZG*^PZ;,E[]K_4]-YA[/=?_\_1JFV-MI2HA55L[16":%F
MS-NV435CV]36VD:H543-VK8(JJ6V;=:F5LQ2,\3]???^_'[7E3_R1W(EN9*<
MUSG/Y^-YWBL(7XFF(.'SH"XSK'XJ<<S Q3U+@-DR:+>QV7IYS=X_-#OL7G9*
MFHLO+"!I-\GI-K'RNMK%!:+PCO3A.PI>'T/VO8N.**MF5U<,T\DU:LM%H/J*
M[C&&,Z*VQIN4ZI-N3$:/!6OE>+U8Z,I/,I<@GR=)^5:>2<QG91C6FI!LTL]Z
M8IQ)_.T>.VD$T#R,7''HY6<AB$Y?]FP4";K0T2I:G0I0/7T\].*N.KBU0H2P
M'#H71XS3/7":J)SI/@02:JL/)ONT(-)C<]BS7VNM@E33%[0'@+L3#MS\QG8>
MWD. <%(7P.,RRC%' XN/\WR1 &?]2M_K9?[2&ZWP-B&XP",IY(;5>D#4?N\7
M6N5! S/&&T?@XP-5[AH7XCPM,47J!Q'LS0!(=']JOQ:B$D=5R2N6Z0;*+YKJ
MZD(B'T2D\>IY^>U#J>V;$=Z?,5FQ7G.;898?5B@WF_X$?,G60UC.WDN@O/5Q
M?,^ENV!R6YR1X-)1<[AR8-U8Y2*
[email protected];6<%B7!VAH03?GE*59"WSA'TFD1
M]H@^SM&-\1(GDR"P;_ASD!?!38RA; 0F_SEK5OC+7U4W;SX1OWVS8FB)26Q8
M<,O=<O8ZI.<G ,5K7<]6U2WB#7.;B)&+>4-!%2>IIV]_L QP[
[email protected];
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MWM1$R33Y1=!ZKO.[>.:[[ .=^](S7R@03D0+0Y2?E+8^9EFO007MUN,4\66
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ML>&N'UN[MNU%T8ASZ;5_&R]8%DQG1%R?^TLT];W%F@+2?+9*O%5OVA ?ZWV
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[email protected]\OU?Z;\$KFUU^\/5JRU=X>?U@28;4N690'"5,@)4'Q)L5,WJ0W/F#-_
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MG=AHAU/W!-C6%M0<D9IPLE.L7;>@$!5^3SYBH?OVW!8![5KV[6WH+ >O6I0
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M?6ZU?M/F<
[email protected]&Y;_)MY#<IU6RF/J%:[#ZW%GMD=!L68DJT].JV7//(@J7
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MC9I3(S8GU7K1[;-#VQNM #+S3W].%F\/Z-^&$12C$VHR9C$5!M[2X-HO- .
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MT-<*(^$IG0F9,87PL479CCL*S7V<MG_EJI__!U!+ P04 ( " @ EY0\!X
M'>38 VV@ "0 $1%1BTT+DI01ZR[=SQ<3_0WOEAAU=61Z+M8G2 Z5MW5
M=W42/5IT+5H0A$VTM4B(KBN)+D24Z FBZT&(Z 31@L?G\RW/]_6\GM_K]_OC
M=^YKSSWWG)FY[[UWYLS,F;DW,S?+ #!2':$.P,/' _3?'H";7;QF?2</7P\?
M)P]/]OM"(@ I.$*'8!/P#P4""&ZYYNUQ2_AS^+PW*S<K^.?X:@0:A+P$?P'X
M_\,Z@\\+P+L5[&]_> "@G]RXO%0WLIX@/]!U@ $UX2X/^%_L6P^Z\(_@?E
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M\P\ (FZ)KK%;$ 4,]FI&DKX.J_\-X?\9 <__AG"S" "'MS, <@(_KTS%4 1
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MAZ#=K47YY\=I(B-@![+Y$]=2Y6>%&VQ+5W?;]V,]+BK&JN_6[(3:G[I&Q]\
M"N.U/CJLWP#R*N8)PGC/>^@6'0NEG$A';$CYEJHA;X.&'&L6-*Z030&3]XH'
M"CC>L3SO=+X!M(LZSG\+:K-"1AZN=MU[K;R0P'9>F1RC<'J"'&Z?R.@:MU8
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M_S.O>(*,N&A'WWO4IU"2,URYR_;G^S>E[A,0$_',
[email protected]+Q\+H;M]F%MGG
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MZ@XZ0.\GAO':VX]E:1\J$J&O#]7RME\!5GBG_5@N(-''&I)XHO3 D>FX\?)
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M\3O+8E@3'?5J/'O:E96JT$OR3-$YX@WTD6F@42:+18B-K[52Q*S18)!8C^_
MF+ZP&613^0"A!4GOA."P%2P61>V8FC^GW6XNI5A.5?9NEL^R L)B2FR$0*PR
M'P*"1:448I&H6^%UV@BL T\& 6M5>=]QVO3HJ#SK70>7^L!O<-V8[NI8.7^@
MVN*7OPXRD#Z6%)Y),9=U2#:UFA8$>T=7)W!GX:AL.0!&RNOH5ED6/2*"WS'T
MY4&[,MD]H$!EWYJBEXP_2ZKW^F/&;?01>](@"JJ.XE.U@"'A3(LS>:W>[ )B
M![Z'0=F/>8XDT^K#GGPQ7E*<FB87<Z$\]!'G3WS!@S?P6;=2E>!"V.<&(.VY
M$UC]SD9^9[1"N:34=/&KGUI):^B780#?E*3_(]$,(1^N]S+L'A],O?R#\\;W
MWP]-)Z]]8RYPG/PK6S#AD\/RUL'GY,IUQ,TAT?71WD@L7^IWTY;,Q,:A''+P
M.P)A&B%:3_ )Y<4'+=51NTW/Y?K-&X#;%2$1:U[4][&,WZ[WLICLGSE[>UQT
M3F8O)K1U\QD_MI\)W??*]E.)-"DIV>[-IIJ>/ Y^&]8T7L6F.;&_Z)WRZ;W-
M?9V>)1M/O!&<TFF)9W8TP;V01W,CE8$0IRZ][)>R/.\:.TSYG)T/)WTR,6[]
MGDL_IR\]=S;OE]N/.H?)#EE?.XVV_]Q3;]]F,*AY;\5&3J^P]C*9B@5K>]=]
MZT/AMHU2W0/.D<+?^H_U0%PJM4MT+Q>>3FH8B4 B5F.4=8V$RST-V4L 45BF
M0>1M$ZS%=1?C7OW]: #O$2^#ZV/I$3+VN!O S>@&B:5RDKUN5GO5!]6D9';&
M.R$3AE^9B#7KZ9CVB@9)DZ7?Y]IUFG+J/QJCB3"'$U"_+8E'P;X8])8[PWW'
MRE&^*>':2>+,.<)#IY!4#=B8;J1AEHAN9#IHG >A5<9;0F"(;='/IE86+]4A
M1-*P%^&PMRT7;@5\$>F+K76Z[6!OJRT6F2?FBT7UHJ(V.8MA :/240,P1")H
M_ ]"$YM#U>6;1XLFNI-E2^?%<4"')8EP>J-+:$/JSB&X"2X .:59C+LCQ)!!
MNO&6E_T77'H9LX8M#A:B9EPF(!/C,!5OP=B=0BQ"U-O<78):1:6DFY^G%)]]
MBHXVF9I=4)3(<[CO1:NGDT<GN8S^&@,,@D5H"[@NS;@VLK&BJA*=3EN?'J[H
M0' %O2\IA84E7RX,79"K4O2X\Z:)]EI^"UEA'(Q/[FX&/W Z_E(K[)KC6I3;
M046J=M]\-!<LEU*HDUFN+&F(1;!'\VBGQ4'];#'.SX[2W(S&5$-+.2_&W7="
M'H,<ZM9'KI#%69 XEC( U72<+59+4;&T,=S,JF7X!C"@JIJB!!5Z[!;X]?#9
MXQO 6OJ#Y&2W?>'@8K29W8Z73QSDK-2[RJZ7ZP<W#'E,YF?P(K#LO+#03#MT
M"::%R^-5TW+)-.(=%=1'LZ F$;QJ9'Y:1H)H2%'#.I07 17AX.7SQ/+:*" M
M(GWSH**X[G]JQNLB!3[]UX4Q8MEHB &J2+P(A#&L,.!U6)-=+80_?]', ZA/
M\\:5PE\CD"1AB,C 6V]R6Y5J$)Q8Y+.;L?4!G0]J/4K4!<5*Z,A"8J/3DB54
MT=0,H72TQ03?HS)D2O?(V.2#_,S)J.OR.Q-21K_.2XXI,?")U5W]$YZQ=TIG
M)9>RK;2K:]?-*A,9F,],2[#KKS< <*$P^.TC*$%WQG/*VO8!Q=E*58:HZU;]
M#]RYB3M33Z%_7*G:_$M.YE>C!^1$]EY\J^L4AH\ GYE]#"QA>- C!../D9^[
MCL\&7=V5HTLT^P2[,C[+ZQ$:7$GT;R\\6Q%6NR89*?T.N2X]5,$\3/E,7U+D
M&/DHY3*RZB+^4&O" V.I4=M,H#?^+#(T\6JL:M\#$[HBQ#5K2="J9_>1Q()E
MN?H%L"FJ.='^@&*7I:23<SJ0?[[O%-H,[0[F#P]P<E, N2F07*\LI_T\ S:/
MW*;:"QO+EC8'UG5P_PF$\"Q74S+(NN@;1]WOX$TS64YDBY22,P?CG-[1FRQ3
M'Y<G@'\<F!"]?(OF'^ZKW!)7D?H$I%T1>8X_*0>/(/E<&C@!Y!']G(2.8)EB
MS,ZC,N"-X@5GT\.@O-IPI%_-Q7I#0V4P08;X ;]Z=EV\O3OABWW+&F.^%14Y
M$9G)IV+JCS>W*P;R1W(/0I+M!020FN\"O.MA/5\#KT@M-; 5O.&^ LO,C5O(
MBOD)7K9"F\1U(,T$J7A-CI=.Q;R19]:BS(Z & ?CSSEEL,(Z;KC@U1["HYM?
MN;.#JG-%6'^//DDF*L'+*V4$ZVR *Y(02.%-CQC0%G!>+BR,X]W3XRWSW1+#
MA6,S&?=R:;;%F_VCG:>.?\^0W3^(K+5*UGFFL^O1G2M;MO(@$^\,&;A:Q=5S
M33).%>#-BO(5D$C7L8XY+Q7H\ZLT.%;).F.7K6XZXK\<5+EWR=T7X"RSD37U
MFZ7 ?"I/MOPQVTAB3-QGLH]TW;)MXM%$IKV)/N%GKRVKWCREN#"F.8(O'0W
M/N-M&72S?+TN9B3W?>.U_KGIA)X)VHMX@^!%PSFYU KG\D1!*[QZYO60MU%Y
MA*)(FA(UTEMO =/'\4Q"<*4ZH+&HI/K;GC$*5VN_R1F=QZN+15HLOY'1S+,?
M&$-HH\*QFGD8V\(,:A5&%2_93\3E%$^2T)$D@TIZH (C$;"FOFX.>B 'XSFF
M7S].FXLS,%?'I\_0:%#X5HAT5A_5NQE?9^MB"*7_%$;@4O/59I%4ZL<,K<@
M$T#YB1;9JG\];%2>!Y0#7,J,#(U^RU-'NZ+0!ZT_@[H4P[I"B]C'HHMQ2:BY
M$.JY?2")L1Z)-F$UQ;SH3!S1Q< =')VV861HL2_H3[,_?%R+D)V:/" RTZ6F
MEWGLQPP>+W4SP2Q&'[,3/ .=_%#0'4G+/@AX7J,'NAOY'@3!T\70IH/@7E!(
MA>&RTULH<VZQ2!9",@Z:4-8)6Y=-6$5LM( LO#1I5G'<"*V] (Q%UNH;17OL
MA^"/J*5]VE$8G,0J^"_Z(E$'!$=,/BK GMPK*$?P?1$V&&@SX2U,P]1^F?1^
M5#%!8E_*.>*;79<G;'BJ L/FS5JJI;P=_P*G<M7#I\78+[_?>A75S9F4"_?D
MUX0;??5W]]' 5*Z07'-9N_-J_WIK-[%5V]N0&TA8$3<]+.]6]I7"3CT+L_$2
MIS5I32P)>I7)7<BGA!362#]);C3<FM6_&^7B8+<K36OV%,QH+; A[QMH.J1H
MXEXKW].=F%X#Z]68#$%?;8:MT=$PDL2NO"KDNJ9=>(*4=\V]HM]:;Q3_YEFQ
MJ@\K)3C.JDB-,] U#DDKXT7 OQ#<7=4-?UH,I5=I(+N7C4P5LJ%:<,J?BV/>
MMFO@>Y0RIV&O8R2XE4%3K-S.T?#@7",\?.>#XISHEA!]Y*K%+D&-F8F]1+P0
MSS)8H 6Z+Z;'+S/_T*[P;V1-(H,A$L[5X[H;6IWRFP2_*7L0;AC!U_,M][/Q
MD\HY 042NWNG'")0I#[D]!$P^+Z[K-)$9"'ONP_P!?0>K.74DK_62T>E]K5#
M&)[Q0@AJ89^6]U0G82AW[B^^!=_5M_+] (SG:6#1Y]4*\G>ZKR\X1,MS"*TF
M;E_E]]5TT%X%Z(HYA":(]HS](N%0:S( 8QA<WF?_*?H1*#2[D,UL(*A:O6B1
M@74@;,0JPZ.NKCOO8EAO6YHOW2\H^/ZE; @Z-.L3'VO=1YJ+/61AHI9P72+M
MIY&?!=LYP.MVK$)AD-$?G]7,G8T>Q>KT=VOI949TGX;W:;\[!L2B3OHBGYER
M>:NI1?0^PWK4F:V]W)90K 1_X(_A#1L^8:N;7:X,ZGQ0/>&NN?+2:K2N4V.L
MKM/L)"-ST@/SX%_'WU1X P#V-IWQ<T_A>GO/"AQKEXA/79\$1!@(!D0V;3WH
MD?Q3T!W,WA'@<NN_&W,(78/1[BYR&K52&OZYSCCC*:1 @^1!:BIQPA89G@)&
MMLMVC<8FF0]8+$Q".'8[8E<M[3> 2I96/;N9H'C$$IY.K?V[5M N\EAN@=N\
M2^F%D&*I;4:VGL-;LCPAIF>16Y\AWGWU;WG<2:B-,IG#E4@F=!HVF 7L?V=Z
MZ<(Q/B27F-"?ANC"8N5UA5->&##UR94&+*B( JH)7&3 #RYTJ^;F=*!J8@-R
M1P7-T4 ?OK%S+#>6[SN";P;1.] :_YS7G4Z1[4@AI:&O&@9#JG.(BJF_;5QJ
MO,"\P%@J*7GI8$/P6>LV!=]6%R4X>]J1)W IJ6.;=^(H(!-WH?[[FQ-IF^R5
M"@61%YT+D,#BM5,N#H%DMM9-LZ@?!8Q+[1^/U'L3APPD1<)<Y!LZC;[@IT'H
MQH#\$XZ1\-Y 7C>=IMI O%=8G'PVR.-=)PEUE!-7;)'PNTY8Q>U%/+CP$+IH
M$HDVB20+ RW#:3,/M"Y@>A>TC'I-4?P]#Y9?2T9+UK%:8\$J5&\,<6,A6NRL
M>/=%:R@E5:MT,T<O_+7>"M3'QCJQ4U?8V1 E%U;MN&-W:\V9#M=5H5Q\L=E6
M6S> 7W$#G8Q;H1]8DM:NS#;SHH=J)JDZ?2+8CM-E'],)0$BY&<P"=#CJJ&MJ
M/2ON[T9&_=;4,OU">>*1>)VQ8,3N_FC_3(Z"JV:;:#-TD/6EXE/35C;G46,?
MDC2Q3Q5%S+]JBC[!VCA6\Y5)9$JV%Q-UOUYQK&:.'NEC<3FTI:?J66\N>'H>
MY(? 7^&*EGBW%\W]K;X%8!Z]_)CB_J\W3"L]_F/US3LQ_T1P[U#KUBU.&M$3
ML:R;6\]\DZ-[9K#$Q]U'&PM5ZG:Y"]T])*$(\#3B$:V#$5'EKK#B+;*N;-UE
M'WB81IY:EUM;J[Z10GX]M7^Y]6/3)OBS!M17 N^AF_4.K;2#4L2%U_(CPHAG
M'WFN.37<!66U96O6)6Q[$X.;<F(FFH!-?%_>2'=6"?$H/;><V3=:(&=6W._W
M"*B\>O[KP2:=-1C(5?O@,9FL=X!LP "%80;I*PD)\;KO#74CV,%^8>PE?=64
M? $R)I*B0N%KRF*$(M/!8_#80O!#AX3E/GLI!5*=:8+S"+*9[XO&44,AE=0]
M58?BN47E']JR04UUG:Q<LZS?7QKRI-KYA8&(3);3&2*;0_0AB1(C()U'(*M_
M+@KC+X2!RZCH,]J#LUS=RCO?GJH[2!5N/57Z2A'-":S'/B32VPR5V;8]36N$
MN#;JG4RU7A#!YRL:$]D,9'AB3:L4@PPP U0T&B__,GY4A*45Z[+>%0QV;?)1
MYBCIYJO.3_+US>6F]/M)6(I][_RN1W5L9$DC5G"%%\%*=:!YE/\@7PX=Q-5S
MEWB%%Z5V'#)VK(>1I.HR@+S\E4/;QK6:&F6@_H9AS-L#L6EJQ-H_7G:AAZ(U
M6TY-V%J13X;.WMV9RL9OC?_6DJ9%NOUN?E7S25&W;$74R?CE4KH86M#DRFIK
MR,8KM^,G,<_?R0RG>N\QJO<8Q:7K+?&Q0M? ';1;0(1N0R'K5S0/QWB7$V\5
MR@YV8H! X@:X>?-4BU-N)RQT4%5L-@T80TM3B!\:S:])B$$&AZ"B! UO)W>3
MBTW;=P#.4R82$T&]$O//S?WV3,0OK5;U/[_=DSXP&F;E\I:S.K(0_<+X-WGE
M^K@Y\UV_,S>XB8B%I.J#E%@A&,]Y4'?S5#-A0+V&%[H8@:A65*0MNX?X'#*.
M&:3X_=94G[VXRPN-BQ:"TZ>.'PN]T UE;6OJ@"3JM&MJ[!=KQ08NO>RCV!C7
MDX,%I>?9;EZTJW5V]?E]K8^4LF''FH@+)VSFJ\Z\2U>;9 :RO7E=--K',EIA
MDYQ/W(]FR U,[XZH&_<M/S15#IYO[?%MF#5@G:[_2_S(<[Y?AE'#W:W@14Z;
M)+#K%\A<3$D/I1E*XWE(4JV?=Y)T^N G?%5A\>G?WYF[QK+I.$=</]B.)<18
M W#GK.B:W['4KB$1&D4EGV9S.WJ7KM4MD@HT4%_E]_?A_S7APR)'1ST=2/<L
M4/<>[5O'VJY[J].!M-]"Z'%1OV6+]@*YHK\^7\;1E0D>$-?;621I.;][>B^<
M^E2.KNL'W&G2U]CWU=0#G[+D)?:N_)_BU*1*B1 *75RNK.O:3T Q_B>U,((]
M';(#8J\S(7+CZ(KGSQT*&</+XY^_-W89:BF=.8L:,'L$5=%9>D=)TL(L?AI8
M48%UM!SRV'A^""B@:$]?'O^-_O$E@2J/Z4YEC:[ZU_QGO3> MB#OVJ"$!V?J
[email protected];\(V5[Y.BGFB?F['MV+JX>D,OU)G#H>I[_RXC:*48(>0PX$F
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M*KBL2K 0B%U)4EQZ>MI( B)9?!7 SBZ=< [%*BM@,/CU 1N!Q$" 9%)]&+Q
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M]
[email protected] PTFZ,2 O%E(3SO9Z+&H9FT'R#N"U6Q\MZ>ZD,,N$OLDFD$+
[email protected];V9L)<WN;@U)C;%O'=L68$,_?([CU.ZH7O:^99\+1JK+IXLY,O!UG3
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MO?GET^%FSHR^WXEKICON+UVW 3%&A_R<'P0.4X-!5_I'KMI!UZ^LJW3?E
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MH$]W,ZK7465![ X2?+LLIU= 9ZGI!H;J0-3"UNK1%0^/_?5G-
[email protected]&0L_F2
M1ED :JMO[K<P_(#YN7O8=6C3LB2>YT[0EM8'$QP5 M+BI-&<%F6 <:2IL9+2
M$.'1J[0<!&:YM=#K'?1;X>:6JV>HIKN#Q&I/X*!L(,/^<(H=O$C[E&Q@/82B
M-]4WT4#H#W47.!)\4Q+QH!\U#TSXR40.MK6+B!SSV3<\!$#--0HN@"&\I]HM
MCMDHE3/T@UT0VL<.$?';^E$F4B="B1T*U[3OT.D<(/N \@K63 L \0@ELB"A
M$Z!$309U,, ^*YO(K<+G_$KJVLA@[:+F[Q^E/Q4N&7J+%(7C_P -I;'2B!I
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MC]VH/ _E+.QBZMYT]O,GF%;W5V5M<3]%T1^=[DR42) @GA"_W.*.OS=FPQH
M'*=IC2%*!.GT/-$ ]I\4RV4'35"X'LEJW4\(@Y3D"/RI6FV#0XF3H$BPG7MW
M4MX)4I U)@%)%E$6&9!4PUH *D=OYIY3.9NB'(6FW-ZENW,V2W36%>Q6GT&D
MF26ZJIGM(+=9,*YC;O283Q'*?(^@>;&+XY:]F;2WB)\ D=S# []T8M;$D:^(
M42-845KR6#7&03QXJ8<7'3Z(Y*<M#A$\]DX@:#5&U,7 ]N#RF(L[:QPBMG4'
MCNG+=-"C: C%9 DE5LEP8YK0-VX$ZSI"M/:\CV_-4<W>VRK6"01HC#4I);6+
M-E+7$ C0?NE'!:)!/'9"PY%3&^$H_IB=T0>R;(^HICMJB<7M,\C\4^YPU=P
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M)7N@XX]0TOLG,GNB.QV&-ND(S^#\0D "G\<M#:
[email protected]$T,@^*$:6@:C56RT1
MPAD CA$3/
[email protected]:9I'@G95J"$5X UC7R3LC0*3B-+! 6$.4-0H,X1,L:M09.
M@">/E#'D-3+88C (3!V1V*,KXK[2$H5R\UFJL-C<!K"J$)H-J+3L'N*%"-9]
M(H:EZ-;K]7__T>D3A,G6:SKI0E"=)2@#*=+5))"Z224)*4G3)TE*3I ))(4D
MG224\#]9'?Y6LUT#6C\%D/87.)&NJU/K%M/5;R>1M@?)93M\0?;"L8_ECY(F
M=2V*Q>X-8[W5C0-\%:./74T2[])RS73^JYOTU1I?:]PKK^D\@3YH^17;1<&6
M$;QJ"-?I)L@>*K$?TN&*@15U>KHM8[:)*GN<UI)*>LS\5)S=PU"A)UU;E]V#
M"'?/LB$.&I! \2H-EAD"8,KJ&Y&#F8(%[FUEPAP,#:X?G-1$2;HC19.?#5CT
MEYEVFL*,L(T"F^@M?$[@>".X2VME-T76*6$_U1V3^GX$J#@7'12 L&DZ)*:N
M30; &#Z7 ^:N.J=5-0^BS0?)$PFL=GTM<-VL_,?GN4KS.18.^[A DZ!'6_!#
MO<!)^]2:9XX*1 (@B/!0'MY03:6.!QXE1<&C7QY4'%SR-HT3P\Z'YI?53,["
M(),#S4FQX?,J(J;IK \$[MQ]H_!%5LPUP',]H*H93'.NKW/:V 3+C'[OM5Z7
MQ$:^*/BUXCGN=E,<YH!^B/$?0_J) T;1(Z-6@N]*( 'BB>I )(/\$J8V&. 3
MI\TS@'M@:0AU7 ]&0,F01!3$@:* &T=R/!1<'/ @0/Q0(7 I# ;Q\=$,NK.G
M([!,YK@W4P!R4(78KG!H> [P!2 [6?)-UNEW'R#>QA0+".#KPD\.>X-;K/$)
M659%<!X@=I[HCP5;0S9!;)G1$J+S2W72.RH]6>X/8T'0@F5T6-BX+>B,M>_]
M9(&T%T:_\3^XIB*Q@L R5D(\G-<XQKPA/MK8)<Z!^*67;Z-<N8[7Z)@[?\Y8
M=MSGNDGE.QX^+7HK)F$=!K)U*LQS[_3I@2UPU_.T^BM-O5,4X[+'EVZMNUS&
M^W6-JY5KG!P<V=P.D>*O,R:QC7574CU+?<VX@[VD?FL3LG+Q-?\ <_/_ %V*
M.>0LG5(W*JM=!D$\2B_*%CM)!!"T!>7TEP,%HU3YXZJMET,MW>Z5SA7KO@A=
M <_;723#]S01:' &/=ZK%QKG.<[74E3]*T#
[email protected]((T3,G+QE7$=D1SD'06
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MLOK<T DD&/\Y#!;X0$6WK_4[+3C[VFMQV[=H.G]=0VB8X3.$C?]+5EC,&_!
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M%BUS1_<KK!OQ]P'O!T:1IM5)S03/
[email protected]+9@&O/7^ZP<\%P'<>
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MU3&DCT0=K6_R=GYZU^F]<MQ:*\5[ ]
[email protected]'0E+##>4\L_ZON<?"D9CTX1_@
M(JOJ1D5VLL.4SV.#H#3^:5JY7U>.1MFTB)$1IJHCZRT'J3,1U9;18 !:[0^H
M[Z/_ %I:V7E'#Q[+W O96"X@<P$Z<0>$R.3^I+T?]XB$S$W'A>7=]2-S]WVC
M2> WLC.^J9K(.,^-(=O,S_T5:I^M_3[' 75V4AW#R-S?^@MZNQMK!96X.8X2
MUPX(2E&6ESR?\U(R$&P(>;G=/Q.H85 I:YC@"3KQJK3,<N_26R'DRX,/M+OW
MD9SMO]RJ77.8UP)@NG:/E^<H9 #<SR"/JX9GT1DGCE(_HQ)_2B@N9<7/>QOM
MX$QNVK,MN <&'Z7@KS<\ $OCR 0'>D_]+8T%[N">RJF-F]6S"=:4/HQQVO=]
M$$HS\>JUS:[ZAKW_ /,DPR0P;&P/)"^W-<\TDP[P*:(G<6N,[[.5UKI5>)=7
MD8C7/#C[F07P1_55=KGO,V,+''6(('_279=,R&G<Q_TV\'R6B?3=S!^*OXX\
M>,$RCQ?UOF:QGP2(JWRK+V^L[X+.($KV)U&([Z55;OBUI_[ZJUG2>CV?3Q*3
M/\@#_J58C<15P_QV*4A(W3Y=BY=V+:VVHP1R#PX?NO76568?7,4UVC](/\^M
MW[S'+<L^KO07C^BL']7<W_J'*NWH/2L:T6X[7L>.(>8_J^Y5N9C&0XQZ,\/D
MR8RNQRHUO _-%X;J72\C MV6C<P_0L'T7?\ D+%2;HX%>INPZ,BLLR6"RAPU
M!7(]8Z<WI=HLPZF642#ZCIL>P_NV;W?^"(X.9E*(&0".:1X-^'C1* OT[+U9
M.0X06-&T<DE6&NR'-W17&AY[%#RFMM!K!#-\ N\"Y3NP<_&K:_++#61MI<PS
M+6_O*$@D<0]+*(PL C=8W/#B#L@"9U**QP<V?58#V$&95/U&UD.(D:(M]0KR
MJG-!+2]I<!VD^UW]1"CH+X5QA =.C89FT4-<RY[66C7:LCJO469./Z8 W!PU
M!0NM-#NHW"L$O<X;0))X:LRZC(K;NLK<P'NX$"5-AP0N.0G]9*IZL4LIX>
M<.S9PG5FV+I]+\\#N E4=K[+*H#"Z!6>=JK8X<;!M!?)C:-25N=+Z5:]]OJ5
M$>X;-VBFRF,+).X'I8XQ,M CQ?3R 01Z3Z_HD?36OBY5E%)9DM]A^C<WZ/\
MUYO^"4,WI9;M<1L>.+&]OZR?#ZC6P/P\O:+(T=IZ;P?^H5<D3!,?4/W?W?[K
M,1P@#_G,6Z<P0=04[HF.%4=1;0=V-[V<FH_^B45MP=6'/:6#N#R"@1U&J^PE
M+&F#I*;TP?DD&$ZSIV*6L[?Q05]66@"B8G4Z>"G B/RJ)8WCND$A4@>")4\;
MP?!##6MU**VT.G;!#>2.P21(KY)/J CPX4-#J->%.T@P>ZCCM]*E^]X>Y[I:
MW@M'[B%T%#4.A9_1F_!8;B/4"WKP!C#X+"+3Z@GS0ZE=C/I^J<!O8R4)[1O
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MN6Y]BR>"PSX0HNPLPD 5N))\%J8>=C9WZ"#3:1HX%4.H?;^FS<ZQUM8X/$A
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M;MM+0 PR;''_1HUEW3-0R@AO[_J$._S/>HY1LDV-2V(W5 2--WHEC!78S3=
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M2L,,BXC4&#V*S#EW#*:][RXC0%6<G<]V@^2S<AKFNGN%)BB-CU3(D!ZNG*L
M%U!]SFQ';<%*GZSY%
[email protected].+3(W#Z7TERF-U&ZNY@+R*PX$M'A^>MCJ61
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M"/)H$CDG2.43-M+,K"M:=+0&GP.NW_OZK$.&Z=-.$:TNLPL.R)=7<&'R$J4
M6#T^7_'BMG'K:3*LIQNH776B=Q&P_NB$]O5,6ZAS"P7!P@MX5?ZP!OK;GDAO
MEXK!J#G6AM9U)T3\>&,X"9)N(_P?0LG+AT &H='I%[<7.W!FDQ!Y:NANZFQM
MIW=_!<
[email protected]>#J3(1^H/V.,2-82S8HSR 'K!=@-0E*MB].W-KM;!=+7=D
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MAQ7H?EOU+)Y2-17]1CB]*QL>"9M>/SG\3_)K5/ZR9#:NFVTM$OM; [#\YZV
MUQ_UG9GU7&]@WT. [EFG[JFRQ$8B,!$<<O5;#&7%*Y$Z/#6-]VJE8X$ #3:
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MX\,CO]+15A*'IT!E^E+^XR\5"0O_ :>8K:'.DHS+C4[V&!W\TV52_&M=2]I
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MW+T#K^!CY_3B+'^GZ7Z2LZ1,>UK]R\UJL<'M+3M,B#X+I/K%UEN1C445!S8
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MVS)(/MA<;=5=78:+6EK_ *JX^6D#<Y2T+/]ZQGTXQ$_5J>JZ3JB^J_8">#H
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M\3,+0ZW'>T$2"0#_ -0FC34G_G)$?!LX>+17&PP//5'R<:Q@#F#>WR66R&:
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MIXLEKK">&\"4PT)'7CD5P)K;A#=PLFKI[@7$&P^.O]I6<[);DUFU[M[CH !
M:LO$Z9D9>4-T[7:D^2O=4P;<$#;[L=NHCNF3&E#U:ZKHF/%9>9L>&Y4O;[09
MCR1NH>A?8U]>@A$KQ'YU^ZQS:61H3_Y%3/3#4^#8',[&(3C*(X23PSB%1HRD
M .*,G&-8WQV5BS"?6*WCW"P2(\OS7+6JQ*6.G;)\2CNMHI:21KX)'.37""4'
M&!J2YCWFZD%PCTV[0?@LTLU6A:;+W:"&^ 1*<-G+S\@GB0B#?7]%$CQ #Y1
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M=?DV"L1#0=)6MU"_'K8#B-+WN.I ('
[email protected]:@QKM^DM-$[?]ZWV.#BB$LXD
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M- $!+:$\I)U#LAB&-' 3&IG($%33(&,>P2Y.?1=4]N36 X5:[?@N4Z[U%N6
M66P&V-EI:/!=SFN+<:P@3[3^1>6WAYO=/B57$ ,A )X8UD_PF89"(?UOD3LM
M:&21JIU,R+'>UA+3W[*_TWI?K[76#3L"NFIZ?76T !13S")(B..7_-5&R/4:
M>9;@73NB$%^!<WM]R[(8K/!1=AM/90^]D[,XE'N@Z;:/L;:S#-FFJAF=0Q.F
MEK:(OM>-1,[?[348XD-+1H"LIW22[+80=-TN^2,,@)HBEHB+)O3]UZ7'N>^E
MCW_3<)/9%#H!)X"K;@'#P&BS^O=4&%@/#"/5M&UGS_.4XG+36S\L?[S#PZ]K
MU>6Z_P!;NR<I]5;RVBL[0 ?I0L'<YSH&I/"BYQ)D\E6<$^C:W((W;#(!\58$
M1"/C_P!.:PDR/A^B/W70QOJWU.]@>6"MIU&XZPK'_,[JKC[-A'B70NAZ%D9'
M4W.NN?%;-!6W0?VETP @)F,SE9)X(Q/"F41&A\W5\^I^I74W#])977Y3N1S
M]2<UK99D,<[P((7=RDI>#^M+_F?]ZLOP#RW3OJSDX[3ZUX<3PT P%HT8N1A!
MY>S[0#P6Z. _J/6RDF'!$F[/'^\NXS5?H]GEV=<;7>]EK"P3]$\A3ZD<//QM
MS3%H$L<-'*UUKHC,QOJTPR]O?L\?REBOIKH8&76AKVZ$#E5I0E$UU_EZHLHH
MBP\=EN>ZT[S)!@_):_0F8ULTNJ]6XF1IN]JZ3(Z-]
[email protected];$BT.VV;OY;
M/\(LS%R,3H]1&,!=>?I6%3Y#<.$7Q']Q9$'BV_QF^_ICFUP<8?<$"S$JIJCT
MP''N .ZHY'7,[*(:;36T]FB%:MN)KK:)+M#)\E3RQE&A?S%GB!?3_!8W,%;
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[email protected]\ @_\ H*TY*V6?E$-@?-5'7%QU,JL^Q[CRG8"X@#DJ40 #&226RZ\M
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M2W!+A'9DXRF^
[email protected]$>HWYI1N,#E;/3^G>YMF0)KYVGNE8CJM(X@0=4_0
M\?)R^GV5.K>*G FMY$-)_D.<LUN)9381<TM<TP6D0O0,:_U:P6,V,&C9\OY*
MP^L/L9E-<^L/ U$>"9,B/JCK[J,?[IKTO/?:7-<($ <!76=9(: ]H);PK.=B
MG)#;G5BH'318N1CNI=J9'BFQ,9:'23,='29E69UP9 :SN5LMZ=@EK6V>\-['
M4+EL7,&-,B0[NMZB\OK#P>W!5B&.(&S4RY#=#2FZ]E;1LQ6#>- !RD>E9%[1
MZA#">?SBKO3\,4M-K];;-3_)'[K5H)X^Q9P]VAB]*QZ!QO/B[_R*O <)TD4
M@ ;+))TR"5)BQIY"=,2@:ZBTM#-Z93<TOK 9:-01H#_77*Y-SF6.81M<PP2>
MR[=SC"YZSIN)E]0MMRG[:FQ[)V;G?G;WJI.$/<'".'B_Q&6!T/%ZN%YRS)]=
M\VO<XC0$DG_JE6.#CETEY^"Z?.Q/J\RDBF!;VVESC_:0BSH]N(RIC8N'+N#_
M "O<B9<.W_-+*!Q#6)^KB8[V8CIH<YKN"95K%S;FW%KW[J[.)[%66_5R[(:Z
MS'L '8.\?ZRI5=.RFYGV6X>F1R>1_91D(RCZOTAO/_N46+H:$=F'5+#N:/%9
M9Y6YU/I5YL:UM@< /]?HJED]+R:6;X#@!K"&*41$"UI!O5S;##2EB=-R<J2R
M& :R[1;?U=PL7*S#]J$MJ$M:>"Y:?4NDTY=X<QYK#3 XA/EDX37?]+]W_ 6
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MJ8^-D9-FRINYR I?8WM/DEV06L9KNY"V\+"Q\:F2T$GDE5\3I69CNW7,$1I
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M=5 3.M^$,L!HWV64'4CY(ALHCVMD_!9#;#PM+$ K8;'_).,:7]'H:>J,HQ6
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M0BBLR)"!-) MZ#H>, -_<]UTS# "Q>CMBD$K8&GS57<F^[/03!Y4<AHLI<T
M\C4*(.JD70(2(13R_4&-@$:$&"@8U[F^T=UH]2Q3L=:.%EXC-UHG@(XR# _U
M42'"1XNIC8W^$L'FK)@Z#0*+K6AH:.RJV7P>4S= ;7H-)D%#MQG.[JH,P@^2
MLUYK3H2EPE<C^P.YE&KI=7J'$*?VIOBANR&E+56KH49(^C;J#W5#JV*!^DKU
M;S\E 6R58KN#V&IVO@E^84X;+',.AX5X7BVK:[4PJ>92:K"8]IX0J[2$^N(6
MBU/;M)
[email protected];)TD2H/>7.U5[ P7VO#C]$\)Q-#5 +JR]]8KJ&GDK6#TN+&V
M7Z@:P5>Q,=E30 ->ZM.:8TX58S \5W@V6V4M:&@@ <!5,RJG(&G/BA%NJ*VO
M1 \S*>G#%' !K;E/Z1N!,Z]ED9&'=2XZ$PNO#2%"RNMXAS92$_Y%=;QU5VTQ
MW4,C<X25;ZIB&FPN8/:J6XNKU4L==0DM64I"1($S,]DJMOJLW<;A*E1;O].I
M=1C^J\1N$B4&VU]SR&ZE:.=DUV8]=5/@%'%HKQZ_4?\ 2.NJBW* 2=]T>'T]
MY<++?H@R0N@/4<:ML:F.P7/7=2.Z 8"E7ETOY.J=&1&R>$'=O975,:V YIV^
M:6-DXFH:WE5]^*>P2==C,X@)ILZE( &G[77P32P/VPW>91+K6!\B/BN;?U
M^PHPRC< 9U"<9>D1K2*. <5]T'6J'7N!8/<3 6/DX3\.J+-;2>W9=&X;V^?8
MJAD;1)M.\\:J/C,37Z*IC8AR?6FH CYH_3J/7ND_1:J+WC>0--5J=+M;6QT\
ME2D5&^
[email protected];Z;- %COM+BB95P<XG54B], O5<$VXRIBPCNJN]/N*=PI;
M)>H[D#<4^Y'A4WL>\M,3HJ.>1ZNX=^5-KX4+\>^UNZMI<!S" $K.B);:(*[
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M#Z@+GZN=RES% GOJMQ$ZD_*-&HZ^HRW<)\)7-Y;7LO='!,A6^M5%CO4K,'
MO"H71]D9<';K"8</!3\J ) _/Z/\);S.NG^$H.<>43?8&Z%4VW'@Z%%%ZN$
M-/5U,:USV0XRX*5C0>>%1Q;@'Q.A5^P^TG[E!,46SC-Q8Y8F@&..%F[O!7W/
M<^@R> L7UH)".,:'P7F5-K<ENT57UD>BFW(>&M!*DJMUO$Z>'TK+R=CPTBIY
M W?]^6[;]3L*TAQM>#&H'!38^=?BU4U6L J9$N',!:#/K%TUY+6/)(YTA1PD
M+)D91_=X?_0$2C(_*+:57U3Q<8^I18[>!^=PLC)^K6:YCLBJ'$DG9WA=#D]=
MH%9%1EYXE*KKN&VIH>[W 0?DEQ0XK$I#T_-\Z1#)7RWK\KP%C7U.++&EKAR"
ME60YX!X73]3?TO,>;"0UQ[A8[<?##C#R3V$)#("-BN.([H[:ZVO&WB)0R9*G
M8=2 AHA.R6AH<Y:#@QK([K,8XM*NL:][-TJ+(/%/1%98*P8Y55MS]TDI7N]Q
M!0)T4D("O-KREJW7W#9H8(54Y;P8E5W6GB4(NU3XXQU49]FT_()[\H9>2$&4
M[':IW" MMT>FY+ZKVF8"]%P;Q;0UWDO,Z(WA=STO*#:6LX4,I<.0'NOHF/D[
MI="'ZS?%9'4NJ-I 96Z;.Y[!8G[3R/WRG>\;V]*/;/#;_]/BB$Y@F0('8(CJ
MRG;64VPFEJF25<JI+@&3+FS1>!":FJ%LX6-J'$<*&<V:$:%ET\&K94T*ZA5@
M!J(F#9+(J+G&$G/ 0'6;M D2JU6EK\1[(U)*H=+Z8^RPB/GX*XU[&$AQF>0B
M59OV<[F"$R HG7291,\0 [-\]"I+([^*QL_HUM():"1XK5;]8&C1S#\4K.K4
MWM+2T@'F5)(1JXFI+8\0.NSQSV6#D%0W$%=2,7&NF")/"R,SIQ8XEFH\$A/I
M(4NKJT/5=XI"PJ!:02#I";A.H*ML-L*,;C$CD*D'(K7:($)":^[UZ-?I-6;N
M(T5EQT*J.U*,15K&QB5&ZYK>W==;CUMK8T!872<9P&\CGA;U(EP5?-DUH+HQ
M=.@:(QXUY0ZH 4GNT5>]%=6!$E%:-$&816%"*2NY#>E:^ @>H"E*0"HAKY=;
M;1M?W[KFLVC[/80WZ)737D%9&9CNN,-$GLG8<FM%?*.CSSWZE1&[<#! \5T_
M3OJT2\6Y1T!D,6IU;"QVX1V, +>("NF="P+BQT+J_47)P6S6+']@AYN6YQ+6
ME2K+O1#&\PB580'N>F6%11]/Z6_-L_2$L8.2N@9T#IS6ZL+CXEQ_[ZLYN8[&
MTJU*&_JW4'B =OPT_P"I3Q*%:CB01(GYN%EG=);2_P#0N(:>Q[(-?1[;6;G/
MA".1F..XF?,H]6?EUZ=BF'P*\:#>_-R\C%NH>6N$QW4*;W,<MS<V_6SD\JOG
M=/K%>]G/:$A+35)D-/%G1<'CE#NZ>;GSNB>-51QK2QP!5GJEEU>*+:G06]T"
M-0B0)B0XF9B68U^PG=NU"L8X<QA)T/@4NGY3LW-I;?!()EW9:75*6U6D-^B0
M$^1(J)8\9LTX]EFYRA)3'E.V20 GTR6H I]>%M=,Z&<N'6N+6=XY6^?J[TS9
MMV&1PZ=4@"=AQ+3.(ZO#IRMO+Z&*KMM9]I*N6?5VDX\M);8!,\RF&8[%>""+
MNK>:;RM7%HSG5SC0)YGA4'8EM=NQP[Q*Z;$L956U@Y0D01NN -Z.%E=(ZB6N
MML:R1J856CHF;=3Z]<1V'BNEZGF!F*YK3[G:#XE6>G!M6(QD\#5",SL"J0L<
M1'J>#L%E+S7:TM<.Q4=_W+OLK PLH?I6 GQ[K*=]6L&='D#PE/&3N/\ %64#
ML:_O/+;U,4Y%FK6&/&-%UE'0NG4NW'WD>*TBS$#-D-#?)(Y.P_QE</F?)\ZN
M8^INO)6S]7NBU9K_ %<H$UCAG&[^LKN1TFFW(D:LF86E468S-K-$WW;&W]Y8
M<1O=UA5@X=08QC*F@:-: %FWOVN-H=HJ[K!:=3JD6;F[3J$R4N+8</\ =9(P
MX>MH,GK(=66M9).B3+;:V"W;L!Y1AC4@<)6&6;!H$!CZ@>KNJ4M*^4)'7475
M;F$%P^1"HN#WNDE3#:ZQ [J.X2IH1GUV:TA #1@_V-AAAQ[J6)4*YL>=SO$I
MM"94B=(3I0-:*QR -EADWEQ("Q,IUF_1:[P%4M8"=0ACPZV4Y>8%:.<<FT-B
M=5:PL&W)&]YT[*+ZV^"W,!S&U@#LH^9_5PN.DCU5@F9RH[.>WIHJN:X<+9%+
M?10K';GRC!VD?>LV<Y2HR.S>$ -GG,O!>+R]HD%6<9I9$A:[ZV$:IF55E2C/
MQ1$3TT1PD;=6A9E>GR-/)7Z[L#,P_2)!($;3R@9%+6B0%4Q0SU8CDRK.( Q]
M.[#DW]3:Z;4<>JZB2:YE@/97Z7PU&9BL+)!U/@JL;"1RHLT)$WNOQF.HMR^L
MP6+"Q;2'NI<?8_LMWJ##80.PY5=^/@,<TM;^DD &>ZFPCAQT0=49#<APZTUW
M8 M@L;\83GIU;S-9XY:K>3CY>#967'VWB0JS[GTO,B)U4@E/H?)C'"1L$E5&
M.R!M.[S1G$$&.VBW.G8E.5@#)<V70=OR6';7;ZKW1##P$+/Z6G5<"+H-.H%S
MW,_!9]^+MM,+2KKL%V^"&3J5KXW0Z<DFU[SKV"<)\)\PF0!^CRM5$GA:N+<[
M'(VA=51T/"K;$;OBK+>EX0'\V"B29=$"48N#9>;\?0:D+.9T'J!8_(; 9R&]
MX7;-Q,=@AK $:!$=DT1D+HU?^$@Y!8-/!T8698';:SN TE(_5_JA8+.[NW@N
M[#6#@0FEH3M1U"#,D^#PW_-OJ9$E*OH&=2=[FR!JNW?>QHDG1 =F4N:8=]Z!
ME_6_YJ19_1>!M=LL<P\@P5"47J+/URQS>)[*NTZ)XV"Z]68Y"V<<#T9/@L8'
M4+4QW_HE%F'I2'$RW_IG?%5]Z+EM/K./F@ %68@<(\FM/YCYL7:II4B% E/"
MU<'1)O,J(4@4"E/79M<%OXN6[T]#V7,@ZK5PWG;"@RP% LN,ZTV+[G.<9*!O
M*:QVI0MR'#HRWK3_ /_4QWX/DA_98^ 70NH"&<5I[+-&8MGT]G)IIEX"W,>L
M-:$%F)M=("N-; 3H2XCY)GTI*/!(F!Y*$PJ]]^T>*EM9:]EH)56S) T!5:[(
MUT5-UI)0 )6NHUS+#/!5AA'?58U=Y'='9E&.4N$A-.O%4<"4![6'3LJ)RRAN
MRB>Z7"4TW_4%?T3PC,R6O$/U6-ZYE39=!2X2I+U"AOTVK,6SO%C(<J&3CEAD
M"482K0HV:J6[1-M).FJMXW3,C)< T1*D) W1;5!F47"Q3=D-#A[9U6_1]5+
MV76&3V5NOI#\8R=0/!1SG0- ^:T&RWA1BTX\-CCGS5.LC?Y(EDABI^H&E9\Y
M<1T#-$4-77:[1.2J5-X/)177 !-LII*7:I]X Y5'UI=*A=D0$-;339NR!! 5
M 9,% LOT,Z*F+27%/$20J^SJNO#N2IL?M<'CD+)]4@B5?IL#FP@01JN!9Y'7
[email protected]:@R)0.HXKK!(4.G88I)>XRX_@KL#&4+)]3'*5&@(_8Z>.
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M-ZHXR#V<]_4LPCZ94L._+OO =8[;WU5S*Z3Z@#JO: -1XJ.'1Z+R#RCQ0,:
M'$D3F=;-.UO%5?GW*SKLASBI7W=E4)E, 77:06N!E'KR+)U59K0=5(O#5)''
MQ%CR91 -LY+AI*AZKCK*IFS5$]3168P$132EEE(IMQ3;X5<VPANM*=2WB+<%
MB1L5'UC"8VI4KB+;=8@6/!0#82AN>@JK6ML1\7,+!'@J%CI46NA198"4:++B
M/"7;&:"Y7*L@$<KGJ)L?"UO3<QDK.RXXC1OQD3JV,G+#1 Y5:K-=*K;2]Q"F
M:"W4)"$ *.Z\R+9MR26Z\*NVP$]E!YAL%4O4(<KF&(IK92[55SAPXCYHPL)U
M)U617>59;;JIS%A$VZ0#RJUN$VS62".X2%I1V/0H)$B-BU'U9=CV>K8ZT5B&
M;NP0WO+G;+6RT\%:@>"(0+/2:)<S=!E13A6K+&=Z._T)VW!%(X82&_ K(R:K
M \[A&IT"TN@6ML98 TM (T*!U?;7=^*:;X8D_P!:"*(E($4?F:^-B'*H=4#M
M<%!N2<2:V.W.88([(%]NVKV&'GP5?&K?N_2=^2F+X7N[]/5)8"0B_M2> J%E
M%;6,])VXNTCNE;0['9OLT1M(X3T%MYW4;#P% Y]QX6.[J-0= Y5VH7/K%I;[
M/%$GNJX[4$YR\DA"=?EG@E:5+J( @*VT5GB$JM1E71YFTYKNQ(3>EEBLN<PP
M NIVL\ L[JN0*ZO29]-^@0,:%J$[T>6JQ+LESW!I(\E7R.FY5,N+3M7;]/QF
MT8S6QJ=2K%E5=C=K@""GBQK^"#,75/FDN'(@JS3>8A=9?T/%L<7 ;906]!QV
M&4C*QLN!'=Y7(IW>Y4G !==F=/8QI#1HN5RZS6XM3L4K/#V8LD=;:CSJA$J3
MBH*R&)E.B<<J"FWE I#,-U6EC AAA5&-"MUG:U0S-LD-V%IU0MQ4["A:I=%U
M^I__U=5U33PG90WXJ+0X]T9K8[K&;#,45^"9V,(T4VDHK048FCHEINQ'0J#^
MGVO=PNB:IAK5."3U8R7DW=&L<>"D[H+]L@&5UX:U2VM4@AD_>1Q>#YSD8-U!
M,B0%5#B/@O1<K"JN:01KXKBNK=-?B6[@/84Z,R#PS_P9)T(T:!<FW(<II*EI
M5I-Q4FO(094V-<\P E2K;=5QGR5ZFM]HVNU'8^2;%PAM!<M*MK*]%$0"5$D[
M*Q^E5C4@+7QF44> *SVVO!B4YQ39J'ZE+9CX)'4EW&Y5)T#@E9966G4%8 Z=
M:#.Y2?3?4SZ1(\$9Y"8D$#9<(^+++L D!8N1DAB+?>08)67E2_C[U2QXP9:_
M*OE.@WZ,X'OJB69NG*PF.>URL>YPE2RP@&^B(Y-'4KR=PT367$E!Q*C"/=02
M%"1$27AJW7::)8K-VJJ7->UT*WAV@"%*8U#15ZTV+V "4.G)#702H960-I@K
M*%KMZ&/&9#5=8#U;7-NKC0E5[(8#$!4\47NK]378%8L:]^C4^,:-6B1MK!K[
MK0QO)[KH,3ZN4[ Z]Y<XZP-%D8]-M%@LB5M_MQ];!^A+G?& IHF-Z[+)<71G
M?T+$#)KEKAXF5R^1^AL+%J977L^UI8UC:@>8DN6/LL>[<Z23JD0.*QI%4>(;
MZNAB]/?D,W!T(&1B6X[B':CQ5W!S+:6["R6C@J=[W9!U$?%0F4@?ZK-IX.-/
MR3SW6E^SMX)CYA4;Z74N+3\BI1(%;8NDM%I:5K8UFX:\K!8^"%J8EH0V*1N]
M+3:"P2J?4,
[email protected]:FG73LLJ[*-CG.)T1))%=EG" 2QR<CL"J4O=QJD
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M=)3@>*4 "2A67 ZJ:&,ECR9@- SLM#!"JNNGN@66R4+U%8B*#4D3(V6WZBE
MZT\*L'2-5)MC045M-EH)U/W)R .55?E@"!RJ_P!H<XI*$2W'/'90+U6W$IY*
M2ZDQ>H%TJ$J)*"X!3BH$PCTL#S)1GT-(A13R1!HMO%RDYPXPRZ6TNL.GS6[:
MS]'\EF],K;7,K1R+VAA Y69G/%DT9L<3$5)SJS^F(6BYDL675O%VX\+9;!8F
MY="%X<J]NAA95FCEKY37-<? K-LI<XJ[R\P!9+%DQ2E\HXF#'Z*PRQ -+VB1
MJF:Y6P0=FK.$H&I#A;S;4=EOX+-#T5MB5++=)MP1ZWL)U62+%8KOVD%-D+7
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MSM%>P\6; XJWQ !8 7H,3'99A-:'02!+(\$8TU5#S0J[6U5P-%4ORBYW*:
MN;GJ5N,#1%954\:K&]8RBLRG#NBFW7^P4.3CI] UA9[,]P[ISU!T<I:(KQ=
MX]#!PJ[_ $FDJ@_-<
[email protected]'./*278KN !#8(65U&ESO< E5>0>5=;8RUJ:1U
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MOJ7/N=QP$')#V ,+R25%GJUMAI@>2J&5-F.,$:4+=1Q!E9^;EC&;KWXA#W7
M3N*K7@7C:XSYILI>!7",,9!F1+^JS'6&-9+G3';N@79;<IGM 5:SH]SQ[3[
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M7+%I;CLR +=T3XKB)DRIH$D:[Q/"Q$?BN.$W?Q4O@H\%/6K=DQ3R$M$E+!(
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M&, $-:T0!P HS&)EM\OS)BN0(7/YW4F5.?Z0W'L>THO4^K-VNJI/MX>_P ?
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M(>0%%1.B"O,I;M5&4VB2F9*4_@H2G22SW<*_CW[ LT22M3%Z=D9#0Q.B9
M-!.S>P,L"[<>"GZO>RQL-[=T/[!=B#])QXCA5KY<"4+T6V+MS'C5#E2>8)"A
MJI0E>0I5L+S "BQI<86IBT 02A*5*2XF(-"5KM<RIFFBJ"T5B J[\F3"C)10
MZMNSJEC3#2J[\Z^SEQ00T.1FU1V0LGJD>5-8F]QD%-MO[N*OM8/!3],)4N^K
M0!L'>5(6V!6S7Y(;FL'*!CW19Z%>JYVO@J^4P/!CNI&P-T"0<'#5):0"XCVN
MILW"9"Z?I?7J'4!E[]KV")*RLG'#VE8F1AW-DQHI82\>&3%(</\ =;WUIZO7
MFVLII,UU22?%RYM3>"':I@)T5F(H+";7!3%*(3)R%BDDF22J4H),=T@"3HMC
MI_3#80]XT392$0JD&'@/N,D0/%;]-%=#0 $4,92V!I"J7Y'8*O*1D=?L98Q2
M7WN ]NJQLAV4\G4QX*YZVNJ(+&'D( 5T9*/0N(YEYYE0V6GQ70#TCV"8BGP"
M?Q^"VI=WG_3L1ZK+ZS+25H6MK[!5W 24[BOHH1D-;2-S\@$;C("OTOJR&0X!
M9,2ITV.J>".%'* K30KP>A5U'IFP>HP:+&((,%=I6YN15!U7-]1Q/1M)'!X3
ML637A+'DA6H<^$_*2<"2(4["RKK<]P8T23&B[#H_U=! LNU\NRH=$Z/D.>+W
ML@#Z,KN,;V,#8U"I9LURX :C^F0SPB8CBKU?HIL?%KI8&M$ *QM"BUP*D"IL
M8@(U%C))-EB6!,:PB)DXPCV590>D)X4Q4$1)-&*/FJRP])JJY&!7=J=(5TD!
M5,K/HH82YVO[HY3<D,5:Z?W4Q,KT>5ZUTRND%^Z%RKR XQJ!P5O=:ZA9DO(.
MC>S?)<^]'""
[email protected]^%)C9:0("!J3)3N3!3@,=4O,)%R1A110O*/2W>0
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M%!_3*Q[F>TIE9 >M+2!5@N)3B&A@5O'
[email protected](U[JSCV<?,/66XQ
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M3]#Q7T8[=VFBS+FU>NPN(Y[E=-CVM% :>.P*!U@ >BT ZD:]$V\!3#@5FY%
MMH,L:X_(H+<O)'^!L/\ 8<JYX@=K7<'B[,A0>\ 2L9V=F;OYBS_,=_Y%6&7W
M/;[ZW-^+2$8DDU2R<>$7:?U F#I0A*?=Y?@IZ:HDO;9"S<^\-9 /Q4LVZQH)
M:QSO( K MNRK''U6.8R=)!'_ %2(CHDGJE=<57M?(E)\QYH#B[N$1%8;*,O$
MF5%Q84U@02#"D 4 L_:H$A1=*C"?2^ES"@4\) :HIIO=-HWV GA:^8\-8U@5
M?I8:&'4$I99<;'2(4!UG_=9H#1J$DE.# A,I$)X7L4H3I=T4+1X*)!4TDD(S
MRFA$(30$D,(3:J1224__V5!+ P04 ( " @ EY=7N:S;KJ "A[0 "0
M $1%1BTU+DI01ZRZ=51;W],WFD#PXD!;+$@@>"F.!H>@18J6EA8H5APM#A0M
M%API%APHCA<M7AS'H5CQXMC-]_O\WN=]UEWO7??^<><L=C8SY^PS*YF]9^8S
M\SC[N H@4I*'RP. :$! (NH"/!X &UY9V#G;.5G8V=/Q<G$#A*3AJNB[@'_(
M'8".&A51%XK0YM%8'M<>U]"NT>30%3!8T.\ :/]#.HO& @"B)J:H/R '?V?
M)X%00M0<"/@?9 P / ?& /Y?Z%\=#OZ=$OVCY;^K_.?S7]G??V78__-^*-&_
M4]S_?A_:OW>>_SM7!+SX^!$E^80:,?_E /_#R4Y)_6\.S[^C 6K\7QS^?T?.
M_\WY=\VK?^?VJ&_O_TCH._^(__^7_?-NT'_I@?KF'P\!!%*F=A_, *9^_VCV
MN ( I 0$! 0$9 3$9'3DA*3TC)2DI-3,C(\_8<8B)_\2__Y^#\3D(R4E.(Y
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MX&RV_M\J_#]K /W?*CPN 4 H<=YP!/T?]],#( !-KNBP_<JT7\,M7O!PG]C
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MT_,EWESPY(("% 6^;Z@W@X((P^]&'[ULH=6&*^(VZL B/HB(BF[HPY'MYU1
M+T;G4V+,1R9+(;#*P:8[M->L2DN18$)3 4Q.U3\W9$N$FZ9"("1V3:^W!@FD
M(Z;'CY_F_#@;.I%@-+I4SA@I8740HS:-[YF@VAY7V1L_GA$G%('^AD_,*T$P
MVN-4X<D]40#<UE^W(F5ICB@@ ?E9#;U!.S0XTAV68/C^GMAR,X-<T(GZSS7)
MJ[FI7J;SBDPG/QCD0M$D\[:)I'C=%+<>Z_ZI]5_=^Z!GC);H:TQL@@6O]2QK
M=J$M16B2 !8_ Y634D(F.H*H ^YP*MJ)6#U?[E6QLQNV:>P%%6*".+IK'\="
M$\\WQZY^\KLW/!*I51_J(IXISLY&D^VD3H$,;1:].F,TF/4(J9]IH2?P4H:C
M=EE"L<^N52Q<23D>9>_<.\2B?UE45[V46!19BDDCM=Q.U1!/@^)0-K_'=?..
M 8D;=B.SZLN@]#'SM!"I> )_TNSU2L_9[E1M2OP732=UX)Y"U.HK1?R@>''Y
M[C[E2?-PQ9S6S%_-J[GZF0W,+F6ATVJ!<ICZ-5:B3):YJD$QK>\?\E[HKJ'.
M]$W-BF)63>ES:G?T$_7&1\ >KDZX(H(8M6T+U<35_EY!BLVO>U?)8B09/L(9
M/%TU\7U]!Q!%#&9H70]()#OX#^P:DI#+AW1CHTWS],N<L+OQ0]28->8VJ&Q7
M"6-U"/1<(_4 $-)+9-ESVS ,SG^VGL T CYMTN1==@PW8+<_9JWW '>($8*.
MQ4ATOKIE+MU)>V]>@#][DP;%=S?X+YP\ OH*CT81D@%B&F1/;'E[PEAXDE#*
ML4FV-5Y9/@)2H&HDK[\?GMRA6;B%W9'=,L,Y%,7#E"T/U9>1"$5C Q\),>0S
MO'1CI^),TZZVGTP<[+3O[#6#=B$)"JF&"B(#S@C-45(_,=1I1%_I-VL>"DZ@
M!4A7 ;DDP#]5\[KW0*[TD&H533@YMV-X6D GE(_<8[S3R9&NPD8(#]+(NG"
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M*QH4Y7YT74B3,#=[$3JSGO, WY* Y@]XU-EX-\\\U_(M-1!G+).%+F/K&_O
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M[/BZWV[&
[email protected]@E3-SDM2!0Y*@M6=;VG"LM/Y%P%G6A,A3PXQ(;30MYB
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M-8S2P\:*]@?+J?@9K"LT9$N>C?AGH%FE2P]2-17LP$-AYZH%"23Q/^']Q
MS;1X$CE^:W\S(^A<@]^^UTLXSFO5&&T2R>GL:4!5<*I>_1 @>V!)!37&-P:.
MC](YD/@]>P2H=AH'XHL-*IRW><,3= 9:G]]M[&8.)R]N5@9FAH_O+CK'W<4=
M*/N>O*Z?'W9M+1?)! 1:,IMZ?I10,G<J#?-C\/H-M5THY4//4A4)B,U5F:I?
MV9A32Y(*\%%4<_TC"3J84>=)MEK%"5S/F+-SKA/#JLWXBI#6Y(?*+)-<#&5B
M:Q!@ C;TI+"1 8;9Q]?90OBC\H6'QERDLWW253(AQJ%OB/N8)3;/0MUIV7BO
M!R1_^ET/,#HK6I2TK^!/]58<W6L;6-303,M(4@*'"W\E$LE7L\0WUO'M@J"5
MM4?!N@70(!%E7_A>$^:XGM@8#UZ$1^)?]%\ZJZ$\HOGSTI\)3CN7\$)C3]0V
M3#B</ ,[H_B2 BA5GG_R8!?V':Z3=>]DY8H2CVK*NN^FQ14FF3T6*S82'WWW
M:BKWU>NUE8T[LB[KPQZ=>=_)^+H[L@DE/K+E74J)DZV)*V$K83/GN!O/D%,#
MWZ><NLQDA8Z%.BO>N9V]#Z_='8NJK_^$W-'?R6A2W9-S(C"_L"A"PG]&1:2-
M_'&C4A4*M, 45[=._XNJ*K<Z"Z)9N]N-T_F??/GI?#FEYF+7^&-:A&;_!KIS
M^- 9 8D,#>SZ>:/ZPX"809/Q:_MGX\,/YK^UY$:&,X:B5>L^O7=PVSJT*A_Z
MEIN\+9$D:NUAXUI99G==*ZZW5U=UYSLJZHM<W=['=XVZ> 0$7S#OZM>\EDEQ
M^F(+2O$H:PZY?R^HZ:X2C;1M 79^I*?E\5%?? 0 N0BUEH^D9VH:^JP#+UN:
M+\%UQ<G%O&P='X]T'2R37[1NJ&\*E(5IF)SRPN2WI1Q<QYRPK7W7K:RTT5UZ
M6F\R1C%E^F/OPF<GA<+*M+J(U-(ETN(^7-ZD4*7BI1Z4TRX\ L[>#KSV^3Z!
MM^?49XDQ<6"-B@66+VV;/ZC@)S,%#>=.]GED[M=:GC-C;0 ,J"$6!G]$?7-S
MEZ-6$Q"CW7C?DR9IN>YH;A=[CA7BT8HU9ZJ=C+*QOC3*I,&K2J2(G!,3=\'9
M]^3?SK4$:1+$R]\GBF<%D )%>?KP2+ KN]$N+4B$*:BHC SGW\@*)5-F-,=:
MD;1/NDZNSN+HM>H^0[!0FKV>T<V+6FYW37+,2S?:-[-=V/-Q)$](Y./+$)8>
MJ!$)=J_$G^B<(C,8-"*\^$,P&G>;EIJGA7=(=9:!HV,@6"/ZDQ?PM,:5;F0Q
MG<G,T@_=\88">F;55KC2]S5$1H;51 '? AS D($<V].DD@FQ-JBN3KLAJ!HA
MFB'\JY.D]? ^I+.G6/B#T51() ?L[&T*9_35NQM59S?PX-G\,V9[:U@_[H(+
M=+W(^>"SM^\4[L[FG?9*1[!A)I\_0TI5!GEIYL)J5OXAU;$&7$G[<VT:]Z>H
M-]BXI]E3!'O>XGD+0Y9;:2_BR_T:@>LGW&86)FC/L9IH=5C*5D/4$96AO<+M
M!%B.)7'O&[&/^Q9\4M=RX09D4ON%3W\$X)<ETJY9?F@JT6^J1X-!S^,_B%2=
M". !/Q4+<O/?^@?4/.GFN/.3R@1]+$Q,&!XM#F0]J+:D2I4EBO;PJ^*LPA'O
MEP8^9__"5"]^&#;1X9*I>U+ZK*?=0! \#"HW1*[I9R;/&ZYH>E%*(,Y*O90*
MBVIY7&ND*P&3D#,9(WQR"GT"T! 0B($JH<]O!5]1H/D.&TBD:=W8'*N-26M1
MV+FVNM35V8"]@"A?DY(0_)P N@Y %<JLJBM_X%S4=Y W_2D_8)11CJAO,S(6
M06.*M(F<WXUF,/#=*1%5"'#'87][R\]N8DTTZC*C^4\\&+RO8OZ<'TVM:: -
M1]K 5:=U4*YADF^0U4+,0DSS64T4B\5#GRY">:?,L[]T/L(G MT'@,$9?:P
M9Y>CFS,]N4):^R)$OM3IOK:MZZ3L0=L6N@"RZV([53?]$(3WVLVK_5$Y*$MO
MOCO*?G?'L"Y2,&V;_8WF[9%\X -.*JJLAV<W4:F]-W?A0GW+0SCF$-Y[.+VR
ME5I<%T*2"VVFPS(.:BA$E#_16LVY<\3"=OBR/%F?CXQ?.\24FH0ZT142I??(
MM$V@2ATZ\U7PNC+,OR7SL+,/^VR5B95U.FXO.PT4['63T?$*;FHGNZ@=N%RC
MIJO4L>XI$3P[>ILBK09P)=/SKYU);/A!D@'2HRGM]OG)QPC+<K[*96-65('N
MBX0-SKB4/H^'2C@%BYHL$WX_A)&55D*.<<"IMR]'5Z0!E2JC7#KJSC[$)]]K
M5E0R[;OIJ"11T@1[G-E81+G%NX7N^Y6Y-]?L63<_I*Q[?>]^\^V7#P^B8 N%
M#YX#!@"E) ;"K114G0V52C:JL,\/8<(GPT;S:Y%\?)8LRZ3KV29U#0$F@UL!
M&OH3=0_?8AN:[>VA-2S.MS!M)UH95Q'(G6^:8Q.-227U&QG#ZW+JTZK%/>OW
M^76/ *&UEH9=P(,5IL$]"6-NUDUTZ4R2Q4@6II_ON\LQ+EX]0+>]D(;)O7PH
M",B@CM"GHQP9P(7^9I=?*YV)D:D5;6D3%DV?G7P.;;N_5\M_=FF)"=!HS$?'
M@K;A9%$^G*[+9?=_G(F@!!4F!AZ:PU!UP$;#U&&(O:?O:RSJT)FZ3- IOYZ
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M \.HOH>2Z/OKCRXO2KV5>7(C;*=?/@+@9;;COHB#/O?KQ)G"*G0/4&G2O,V
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MDHO0&/KN2+HV'W)L1OJQW;"GR>L1X,([5%,?PX?S1=6@FV^
[email protected]%H+06SH=
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M[PM;OZX8]#]-.67SRZY7RBGT9N5^6=HFIZOJBRSW.-\
[email protected]";?<N:R4P
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MS$G691F]W#>+\89PKXZ3.0X6+1= PWB@6VN!@5E[./] A24X6!GC&+^<*R)
MN=?*;OS>3T!O!JMRQ63*VZ%;QGUD(*UWM\X&=_(USP"5O_\K%1RELO'.E[<$
M<C_1P\6CJFRC<9XO_(["X!?I\!(Q.ZK,2DV0^I-Y3XQ]14.O[XX"ARK\T[[[
M=JG#D,O?9X_&74N! +IJZGU\AWFY*EP$S<M)P.1#$F<R\/-'4' 8O_(]G=&0
M5UW$)_,?%O=GBPYOL_.!)^9>M[T,"7Z- 3'VH/+2"0P7C*/VUWHHY;=0MI<\
M$:T6J+[DBY IGF ?&"D-N?FTQ^^B[!_V,>[O4YC2X&OC[ @K[^6E9VZ40O?X
M+OOGI?:^:CI.>*\X06% M*%IBCKL"/D6K3(/@0DGD(QKM#_>AY83,<>1AH]#
MYC[Y]49"OJ2S;M$0=>K]QPQO3_!1HT$XTR1S9H5Q>5/:L:MR*+\P\2I^_HE1
MHD"[;XY27+&>(/?3O$V#[BBVS063LE[1"P(7YW<C5BLO\L/P"PC1J:7$LW^1
MK-A1DLR@355AA"6-';Z^VJ<XHJYB71ALL)V\LX*AVNR?9)AR BEAMECPMI[]
M6YS7#,6\'=E?K@X['J5<VC7ON.Y$43@QYC\ 5EX2Y]C4Y(R&:H9<(SQO[_4!
MZ4E79L*:@N7T8UON=NWOK!NR]MZ>$'SLD_$!O 'AMP8+IC&LU8>B@+NXIJK#
M\8G#\18Y%] S-=]W"*H*\,U\5O9L]@W,4MR'7")^;:.CZL\<^6@Y8I2:87BC
M\!]@.G)">/7]YP+8<%R=B689%[&'1$/+3PIJW^X)XS7T$L$.U(1W8.&",67M
MB*;H'^"NT7Z.2'F93H[F9:2+8<SRX,,J)8.Z+#I)0.U=79;Y!P$>)!NL72]V
M1\],!<&E#GZB<[P?UR\9*?M[R@T_D5)F?^HOUO!\$@,SQ&1E7X(/:Q6*_C:7
M[^$3S=XVEJE%W(F,H#"V44.&>]0\_5/Z%>0:LJ,)O8"<=Q_R[-Q#;E'C2AGZ
M*)BN@M5HUIO>M4%2O/SYOS4R& _)U&PT#T*WKRDRY^KX[*XYW:#3U@\<-$.V
MS)\:%&\]+Y'U 0*;0J/SGLB?E:Z"&Y8+KQ>W]L6TMTME$X;;,F$!:LM;,.4=
M#C6-O#4*\\2X5$&MY\G4<OC'2K=F4*(GS_/SV3]N1O0X0%G\<2?VH=H,*O&7
M-1.YP!]*/3%Y*&_0W&+@^RC-;1C%].<(515WG_*++[/(%9=<I]KU:="J>,_+
MF*.FZ/VSQ/R9[A%\+Y]PW!.BS1C-G%,>+DXAP843NL; _2!&!$/>>L_#ZHV1
M<;:RJYI*A9T3PV7G:Q]"NVZ<XH8&?RHB_EL1RS4(9*ZIR]_XRX,\BZ)[RW3H
MQ\[P[K7O<K VWS^MK;B5L>6FIR[0HU2WG;;L^KB_%3&O()>QM:*2U&R^JN8M
M($[=NH<N4H6QPD HWC8J)F9$Q(H"2J!AVEZ&\\83"\(GYJ>]F$A"ZWKJP8"Z
M[=LJ.1;>XY-5C2DPOU,CLMH45.&CV2&(%0^]UE'#(LMV(I;I3C3M+9QL7)_2
M=!@"ZYF]^+;,R=/MV?*71H&ST2==RYK[\^GC% [EF/E@'+J1L'CQ)F3,[Y?A
M[@6D?/;ZU]XK5W6'Y7VD,[G-?=3*F8&@.XZ<W&<S*+IH$%/^X_LL8E^UF!7J
M+9%GW@P'"*890UTRX*_(-$;[JA[O[/S3]<*ET-/AXM(PD4H"2N7 2P#Z5>SW
M+%_< 8_1E'V:<1L4'W-4P7YCK'NK8XXVWT:)X6/BNY%6CP<7*[2M@B=QG%Q]
M!E8"S? 6:H+$**DZ3Q9KI[$C;+'%@U_*1B3.N"E[,/M@I4(QG^;'.2%'IQ4K
M:?VCM9DT2]BIDK*C/^^'4*S^N(L%?)<W8$X[:-_NSK8@"PUSG*!)MI>JW\^?
M"\J!N2H 85)[N>1$-FQWA!D82BV3M\@2)4EG7/O+?:7=A1#%Q']J5"K1/X3.
M' %WKQXHFB*%EIX79$]@WF9=H4,<U--/<*VS\WH;%9/J9- ^KY_6-@'4>#]+
M@P^4ER?5JZ*%I>O&*R2M%[K>8L:/3 S5*V/G&.K__'#FDZB:)AV2-W(55[K.
M6)KG7O06J@J_ZM9C92!9>D:IT7EE^G+PH='>H>>J]U9/8_.O_D.TUD!_W8W_
M/K<U/I%OV?RA'RX1[JQSF6H,%;@LZ>S58[G8%_<WGHABHO*)T,% I;1GTB?!
MP_$%D3'Q9/S>V4/AH6=%2W^16!&,5X:\+BEY(9$4D:ER+JI!S]PU\C))VEK
M%_9!(Y./%RI?(!?NW=<#";[Z5V"4D9C1*,J6P24&C#YF&M7)$[O.\L9RD_FN
MY=.3,ANTQ-.:1(57VQ<4W#[:]KP*K6<PIT>]KBO]NVRZWN?E.EMG3HIRY]"@
M(61>HX:](,'2\O9]<8+#U!IIPS%*#A'_6.%&L( 0<F9=<UU&-X(*9SWQTS75
M&G?*JGCO#HS] ^C?$A0:B1V"%#?SP^?NRS;;C8!1+%M1L0X( 8 3@<PLRO%*
MD691V#J4O@-14\U];K9AZ"HD"#=W5?H5&'+Z!$>RDM2X"0=1*T_\V):9JI?]
MF$9YBDDLQ9AQ4-& ZRES1Y"LP%]$>[M+P=QWPQ\1!GF0P=[L\9<G[E7X[6J&
MR[FYZDWX6-I3&7,4W<X44G5"S+,SY9.)@6ILTZVBLSN!BH2U2\]\%(#:%FA[
MVG323>_*ESHK&85O8) )%Y")#>\YCF8"> 6DDAA9 M)8:*/W>N?]K%X+F-[6
M0RL_D!")Z4FV\"J4R,TAI.MS6MU)Z74;UAT-:<%CD,/RFA$"BRJ#\,6L88Q$
M0:86CL8I=1;5C;^2@^ZQD>]73==W;UBN0J:)+#\/50S5.*4R''T+]I7ZU.A4
M-3N2;TA(1]TN,B]OF!XS8W%>9C)])#(!RMS$K/L)]W'G\)@D"+&RE[=G&KND
M(^#_V+EDV?UVGJ="$KEIN1+EH)O^WD8,+':I=,;"N&1#$KBUG;><3[@>9,3Q
M4WGN&<H-09JF3);+IJ-!BM+.S;L& XTV!_!GV@_]MDX-9*R=Y@BPV():D[[C
MY=,"9)(,IBP.FZU0WHEIL69;>LV1+[,!.<4>CN)XM':?/-S#/(/-/FFPWU(P
M.5 ULQW.,J<X;O6DFOXXWP*>-LPVX*C+(+1WX*A-PJUZ(7#+=E==!\\V/ED8
M94NFX24\4 H4-^',YWIH_G7VH@8Q6E PKB;)X;AC<OJ ,*B@,E?JM_F^Z'I*
MQ>;+<I7G;_#CIFC-F>8H@JL\G ;&8^MN-QOERPZ2ZY05TJ3]4 Z[/.TE?;#'
M(\/U!.^Q93^J)QNJGGK[#!/MO_5DTS^V3K,!/YRGTK[+/G[QY1<ZP/T^ Y4;
M6;ME$ILWI>Z9C-$7NJ5@_MLMK9=7EL>"^E^F'OQ&R$UHLUV1+ >U8I3"A=^.
M,F;>;!^2LGXW-O 5R7DF.V_%8>Y4K*JX1IC^IX)XBE\()%HW_M5X2XR5'[WD
ML:]&G,!D+3HV7U-2@4V7]WE_8 'E)^*1E]]X<^UU5XS+O9):9+!W&4GM?WPS
MZK-N@?L(H'2:&?W[)O @WQ-OC>E6D*^#CQ"?ZMMR_&PXV%[ $^<-)2,U%@*&
M7S!PU/DQ"9--6)B/A2D*;G!VF=Z,:CJ4AT!;4<.7F[;IQ_D:Q.\3^>>DPM[O
M0K,Q7)X9L1AQ$%3$C]$0YH6JIQ+^_*1JVUJ-=];@XU&N3IEG,+DW&11HE\<H
MH&8AX\IWLG0=\4<)Y<<=2)2CER+,_?9UPN7DCZU13?&!/(1=TYZ[Q(.0KTP@
M7F%W=JM+P?#'G\\Z+%$(0\*TT";- WLV,&MKGTAE+K[T/3:SPH?_[HXY9/X_
MV_N#*?Z\Z^N5<YPLHT[Z;2V/63QO7.SZ)3^I%#%?$-:>H;J[XOG6YZV%1(^R
MDI["QMKZ+]0+T9H7&?XKH^Q7)19K1"ASFN6VV]=XS?25^T+FC6)Q]_6;>=S%
M;YNO[<7.J7P=_.2&UQ;?6!L*72G:KZE>4T%>OC6\1\CL-O#TQN>0@S-VYC,Z
MZ"47J)IZ<6%.&H"HZ.ZVAI2A(ZE^Q&N.GH:GUUK7WYOT?UKN'TI,20(X;<9J
M)U?(VT/FOWRT[:_*^6-N^V,DSJH!P<PN9TS#ECC/:W"RO'Q)VC *>9=T;:*O
M;!?CQDOX0G)L+[E&LETNY8^T.'+O;%)G^. V+*SYR[*$?P,^JDYJK+3UX$I6
M2.VR!_>ZEHSGM8<D/?LS 9C1W"OO/R:P7BA:1$O2.\O!?]#W>UR0:%FHW8TF
M.'PF^6[C:V-4F+##"X_HC647CPJ/-[O?VIFA:U9-2^5#!*0>1N2('C7Z%MX<
MX,?-YP*:544=I]>>6(!S_#.F:\WI:LOV"/$/>%GO(.Q!IV%>N;TR3GH_C7-7
MWP^UN-CE#?Z52JLC74]2'B4LJ-U&!LVR7&0SW2&]4*(M$Q.OIW4CLFI3*SEM
M[[-!8^47NN#3>=GG:>Y,=&_BP J#&F3%1H?%F+1R'OH628*>\NPW,[=\/^1^
M:.>%#RD_$VW<T*H)W"@@]7]D;9YN+9"H!80S%1^(T."3KQBZ1T4U<K<NWYA.
M#>2-9:7&W02!V)SPD/TF<W<_28R6CGB)(.-<V4^O8Z CQ58=^1E_]D*CGTT]
M3$YG?2OYVIA;05-<F8>/?(LB>/_\?/;+TT# (X17"]V]-OFUHL=&Z[+MAY_O
M?";VG:J$WB;F ] MGK]-ME+\><1#^3P]!N#VO!&H]OXST+?IA=[,;;LT)M,;
M*ET>9YNMG;4(\Z9D>Z?]'LC:]\.ZNK945.7F>+6BEQ-!$;J$] 3.=V5>^Q"_
MR$_,>I[$[[#L;FD.9GEB*B<NOW[5L4\FG%8#G2K!(O?%URH;3XE"9>J\_9T,
MM,-_ #!B,.+8UW0\NZ$#^T2:9J_1W91HI>KPI Z&V3D0YP?.:.DAGVXB7:6X
MJ%V'?6V)$%U0:]P87DRG3'!?\M^A<H,I-:MH0\=>?UI!;]WMD.N6B%:DSOT#
MGM%[K0V7*K ^P3^7EQ%]1KG$*U98NXZ^]T&EH% ^=NW5PO9C=Z2CVAVDE7$*
M/M;:&3Z-.^'H0B2032V>0#D$CR[-:=H4+^;$#"H+J"#F];M"IENY9T<:E2X.
MH-#^BG^ *L8D.A3:OU0-DJ)7R=1W _^;VUH5,**B&W=0YOS#?NM2[=:L*#UC
MB1?.I<C)C"AP$7L[+> OLHSO+Y[W<9'Q-.@65;\N]O-.OZ#_9%?)9F3Z2X;;
M "Y.L$IN)&2M$?P7NI_7-9Y$9B!1/8.),/K2.+XHP$$+VD 2/PW$+.;3]42>
M2#0X[S_:_GX,)UQI*S' 2HV0BE\-'QVUA,1MC'LR$P?4-,4:;&UI.B_18@+A
M/#3/<1Q*EDX9#\<(425?T6S%8,8':RI8G6LXP"OE,28+XT7 <,2N9)57@!3I
MZZ%443S$_F4,JTZ.MQ+AGT1'#DZ>VQ^?+,A23GON6&?V'CB=3^1I^(FGRS9;
MPH@90DQ#QGY$"682-F (;"@%74J["?SN=M; ^0 *PN_,S\9 2.+IX./994<R
M"W461GG \/A/=#M^$&H>KMYS6RA%@B,G7V2A6(/6/,V#,6%JEMNX<K8Y8*I)
MX*0W@Q8NXCK1XTQOBG]91>HY^0;02%69^(E8_[.5XM(HF33U8?"/L$#*WJLL
M2SVGU7TT\F,ZZK)L^GV?%'XW/VO$500: R7*#XI_4"DIJ1,C:ECN.1IBV/'?
M\R5>C'I9KQV<;A<@IR0QJ[I]Z4.OZRID+YY%.FI3U8NW"]P+W1:W]VPYGP,>
M3=M%X7AD-C8Z<.):[V21<21]KY),8<IP."D/^YSJ5-(2(^:!8WE:C4^)7[!O
M/7B7 *>FDK3A^#6,:?:FH=0;^J*%HG)VCD99Z):\48ZB04/D&3_M49E6,(Z$
M*DJ7SA+\!]!ZF57MRBO!1DUE_$M@P(E ]*2\NMQ[!^VT\92J/X!--6?-?-)2
M71(6:-I\T%I[U5USA7O=VF;[U=+HH51::'?GQH:4;P2L^E7X.CEN*2W"S:^V
M,^KP_.8,SXO@%<VZ?IL]<\7[8S[*!N*64+'UP=91OF,9AN*HMEB@FOPAGE&+
MGF,_%'S&TQVK)L1.12GVRM>XQN\4XH@0:K39%KCW?=G$W7^:PT\M]AW$1PN.
MX7LCU;OQ#?EC[1_ 3[^KVH!JIG;@" WC!^7.%"?42R'^RL[OU[K0.T0V]_;)
MLJW'NN??I\)I7\ME>*K,;/.. 95S-:+4-Z#8QB^4WRA3XZ^G4K$9(&&T)3O?
M>HF;2R1(IILW+4W(P2MV5W+WH#"J*&?PXL-N5\EVXY*^V:9DNK3-.:>I:05G
M#75_739!">3X>UK&6)7[8_:MVM$4 SZ):&^4%IJ&6$W(K+BR1NPF1H)<\'E&
M@;#*U^'X(@554NW-0\.CJ#=W9/@//Q.;G7+VPKC#L/$(M)XKCQ1L(E&N#NK+
MWI@^8HJ^HK: Y("]NQ^B7D$N(B1)(+\/UV1322@HC>09EDZ\SCUWY6KK7K)]
MK\_MW33QFYHRS;'!R X<SMTK'SA'<5I&KEWCL[Z"*?6TI]3JU,<FZ7Q&5>CZ
MOXX-H6(EQEX/&*<58+JN!?:^@FTF!?FA.A59%5:5.!7&TO^* 586M;B$AN]F
M26%^AXD9#=^M^6@Z=+Y=)-XAS>&?5(5,)6\3@30D1A)*1&K'3+B_F,8=S<E^
MDK\URWAN(EA9'A\?$;SH$7S^;+2;(S6!0B.@Z(WX@K[N4-U),WRS#4L]"%0Q
M\CL7BM*KT6A>"ZB^L0/WF2>I*U=EL)?7O.JC*MET-VBHO>*/>(31Q,%TTZT1
M*Y12AR+NF>1_GLSQ@=BSU]0H%H1+>?-DDI],#]:, CTV+XRW9\9_V_^NV9KZ
M<_84-S1BM4?@4SC[ &>FYEJJ.UFRM A]5.W,5NE68-?.4YI_FV]..*M0]1LX
MUE7TND7.5*R!IJV^RM[X9A'':)T2HPE<]]/3['"\WMUE[P)=<0WLN5I??9S0
M!24_Y@ 6QP^4WH5YU$:<A'%-KQLW4 -H[;-WWZ/!O[B;6_LP("J,_L#>P ZS
M>HVOOFOF[0MQ($M$ ]=01AG)W(SB(>!4@^_(+4XQ$O>%^Z:U15T,5CFM@1AN
M]-<\,W,L<KJ\4P-Q@)L>-Y:#J95T*OG?<I-RX6&EW'^ XHI,@&B.!]OFI=)C
M;Y,?9!SD:]*9L@1OZG]E[\@I*;=:AX;9%N-L(Z:FD>9%"N"WGTOPR@,^CJ]7
MSYT<O56$^1BLO?\&1]6BS&G%0B?5>#R4^$0ELG4P!48ZGP)Y !!MJ'BZLL^
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MLF' VREJJ/ST#^#:7;:!@KW5G7<D1X6$;Z<X-BIND[_I*JBYGK)33XE]&/7
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MW7-H34('[2OW&S"M"-5P(G7PN*-J,B4S-X$(V^X6 CAE_+E4U9]Z[TB2#JU
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M>#GIGY@]Q$/%K'O++69#')N3*Z4(
[email protected]=FWQM7'\:RI/Q/X,):/,)W@)@<%9
M'">>,1\/V_"W?8C3.0JSB3BU667T^=!*-,-IK +\2;420J]5]]?TQ2"5,4IB
M:!8R\RDFX7WGL*O6%Q2C0Q+/HL+9Q?64^NWZ\SV1ZFND:OU#]5,$\W\LQ,+6
MVDC];/^$G!R+\[FNZ4CW#%4S1QC"2RZ/NJ$AE)^XPE8VR'^E>)V0':/!Z_9C
MG=PK;''I_4?6G].1QXL^4, EPZWNUX7N@T?E^?YP)H!%1S9@MI<\07N*VFR6
MG99('.R-8ZJF_G7PY.F2M<PYJHIZ[T)<]AT&W-6W<SGXAL#7XZTDX#PY4AR'
MQ:!O,=OY;+&$YP;S&6!U72KQ_9=QYVMR6N+)7H5Q6O@3C%KIC+ZQ53?DST2P
MM2RU@L+Y'VSTGKXRF$B30PR,&AH&9AKJ=@2<^N '+(,OE.$"NK,HU<_#/X5\
M(O:E>R";M\VM_1/^C!I,8&(5IFK%T/\PHF:W;,"_2OLA6CKTHQVJ_U</QO!]
M>"^4F19 W(,CQTC,2$ [N!&VSW[2:3)@_X/N-RWY!+EMWNQSM0+R='LXKH)-
M7WZ):L)Y',YAA+7:[ O\8;4C$A-&3:?(F7>+%@GO&D82<CH(9*=^!O>=1$%#
M#P@@+_\!U$IB*+UV"6M!^P=2?>ZV#NUK_5X*Y(]=.YMYPAJR(*.I);-[C*>^
MW"]0:.S:*H )^C3WXZ16_1LT@&J!H&Y29\$YV4]>V@0CNN]8/Z<'W]VA=GP9
M1@/2Y):2& 466CR\5<P#*_P /3;AYR*_#QTNT0\>KQDV=I_0"9/3U@Z9;NAM
M++CB 37Q*R"MHYF'OP0L:G<.J!=IB*JNUXL<K/@/W>U=/^]?>1@_9A<8IC1#
M[+*=O:18=>2C%H7=?90BZBOX?D=Y;A@GDPQ[<&Y@QN_WG>:Y/OQ4$@1RHR;A
MC3_#"C?RG9#:T>#1)P\H1[M1[YB'*<W\A]OU_4P%^R>3&H>5(0!G_U&35&'
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M_^)QUFZ/#HJZ<4CC\.:SV6BNR<XI&.#47ZH<5WYE[LYKO]IKJE[6C5H/UO\
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MWOX'2"VB@KW@<
[email protected]]-^9J1CY;FJ6YAVK5Q:'_--X)*S<^7<"<^+8<^?8[
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M&.*LZ:B<OV)1Q85#;"!D([/06/
[email protected]]B*R$<;YR?"ZO*$Q7I#]0=]N@H
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MC@J9B9Q)-(]^=_,
[email protected],EG]8A5WPK((\&N]A^D\XJG\9ICRL1/;>#V
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M]1VW=BI\-8[OJ;]EG,OY2^/3V)\KT%6I^:;E(D8=N?@I)+>$*/1&V,G7\
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MRH#97)--!^J1X#S ,!2A&I <4J2V#B!#]HOK;7S(/O[_P!^2C0%"XN.M_2)
MX%)_$]+M<JR#?@*U7?KU)VL0? U9 %N-)ZBP/BY,(_/4/MV^QUY[KQB]N_0<
MUZ=YJVZY0>Y+K9)9+?.B/;_]^M]^"? <R[N$/I\[B@HRVWOU[C4>BJ'A/;<W
M)V7EZ#M5+N5HUQ?\66%V1\XFC9.>AW[:>6>R3_TC^W/Q;H<W_C=B_P"_"A@
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MP,QC+M%^F@F:.,!,/4 &$HU-0F%YS<+ "P1Z\4K#I?=7?(["!V6R[E5_NBO
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M;@C,2K W_F>
[email protected];UY]H$LT2;&$]L0:$99^!G-I#HG588IB2,+-L_ZT
MPN;UP&?Q^$>JMB\T:*'/]EAPKHI2V@>;D(BI4:S[2J-'*&UKIM30=6] US_
M6P*>^_)/4?>1#KPE[02EH%4=I-M?>\9>^5>CG]+X:FJ3Q[UD?99NOTS95;)^
MCRYD@Z<QT@/#H:$7,FL]UZ?_O>J).L9?]L$@14D<GNG]88VAM'=:H$%\A<):
MR,Q G'NX9O4'VEWM?'L6_>@UQ/8^ GH(1%9G)'$*Y$9*OO\,Q.2&#R3%T9EM
M>#=_@S$TERWI&,T_)RA'CS>1$\*[C_)H*R+AZTCQVJ+K)S4?3ZL\YG'=*I/O
M8W9KX/QGZ;%'>X<N#Y[JR#;_M+'3OADQX]"V+N\!0M3>U#P7/&$BH03,@X<T
MR5D3/(4[GM&CUX>E]%=59[2]SH*'S UPRR^%OA%_1ZQW"%6DD]BXD5LF#A;K
MI 2E,#:%G';\80XPJP8T.0<9BY$@&M* IJF47H"!O)FZI%L?)($I+)6N.'S"
MRM]?<FR[0QA_L2G(LKV'J 6N1-ZWM)/]*:J<M(E;ZM[DE0Z^"FCQ6!#T\P>I
MO.9TIS4/BY_L(?J!,AI-8<(9-.\]O3[3;A4 4[3=T%J=16CMW;P6OLYB JL=
M!TZO@DAK]&YI(=4>/ZZ6CVJ['[@=A?.]N?(0S3/L/0V#UFB')KV])L!J49,I
M8?3'MP$6Z"@ %C]=38_U:FG&_.;J#OMI%9H >[<G"$=&SMN3Z.7Z[P)4/MLN
M;08/JH-H>A32XRR#T,1961U'=6X0AI-.?Y*U#YFW/J9FUL'A1<1UP"89*][*
MQCHQZF>.;%6%.&6<?(<Q 3'PKWB'.5C)-RKAFO ?W1A6!/2^/UI]J>\-+-@,
MNUN%*&"?44V>\&,,;P8U!VMJ\-?V7>?P?D._)Y7&47;,SMH#['M]Z+@HF"O7
M!L2O9XNL\D [U1T2\5KU^YX=INC--81:&UR?N[_<T7&X6$X9XO=X#GJF0C>\
M\0/&M!INGRK^,(XOYKNYS3_.=#9Z.MQB&!'XM.43JP"\C=O\;*DRG )* R[\
MX^^/\VQ@D/?PNSLF0U_:*\MXH)+,+A9/K)!F@,$1A:H)AI,,3:5B:H=A(MN@
MON5*;Z&YZ4^YC?NR0,P_UDEM;^Q]'.E&4O4I :A]K2(:>2J:4TM-LHT>* RW
MF]AML,9#@%RP5#0[E<.NCC--V^10<"V<UQ$'Z^=93LJ#&F#/'])QD7X@#E8X
MFF_T?8G#Y,DM(ZDO]>VD;$6T-0_S)N^HF8)E@I*'=[$#LO/L_D.\0S\NV>'!
M[_T)NH1LCF5>85$Z&^QC%$":%2^UBS)\ ,8GI,PQ$*)(2EJOQ:FD]P+\09>-
M ZI:A<35V,S/ I[>@M\CC9[YK_3_ #I0VT/>)XI_$]N215JL<_%")",BXD]<
M_AP><GXB=1A6K793Q/5]E@P#,*PQSBOJ0G1 F:6C@Z5?/S^OZC'J/, CCB38
M9$**]:WCW*^JH,?IOF1\;><S$^EN\O0]PKHVW_$#.+Q?[_WJ>U:1!#4Z&R//
MARK[96+I0>084&6$]IU0UIZ(60Z#9!)/M.EG.Y*9E:7=ODUP7:#,5+U:FI?4
MC-BKJJ'F$6"S1172=_S\G:<E'<^-*>#TP#$E*TW=TV@@TB\S8K#=P!WFFS6<
M 34(_$[O@_Y@33R]KCFNY<[4,'=!(S*/YOQK=:W2CM&/]%4<?H/Y$/'BZ7WE
MP%-^'DD^C&. HUIB4):!$.3]P$ZNL=%#N*:9^5EDP*"^P=)]U6&[PY^$QN\W
M-H,/]U)H&EVW@U+>HL)@ZY0J\Z)M7.YI45OYE9:J]R2!MTNA#-:MOBCQ(1O<
MT-FJ)4VJ!TMV_>%F5VG^'Z!98!YH_X0SGP[P@5;96(IWU-9T\_FVY#UL">+7
ML+T+YC5^TM\X9);?T@V<)%<(,\UEB#K7[&;N?],(PTXHD) D8M+&<&'*<O@<
M&B3GB5\EJT&LJI \0H+T^5+8DGM>!X-UK']Q )O!FP)9VCI\J[477(6'Y%]"
M0&UBL?1[IQ^ZO9FW6OR_(^OVT/OIV8)>*14=V2/ESZEYPO2*01=JX+['B:)5
M4J&3[>"")FBZ4@F4A(9_QK'?[LJ@;1&*ZZN2%UW0=&OB!R"9D5?VRALI_BW]
M/EYJ&S82Z>0I(<U;8DGU$LU"QLKEZ5R0S>5WS>MJ8<S5>-M3OKH\/N]*LF[G
MSJ2/TLIC,40_W3XJ$$FXT;,LSL"NZ_LN,PDV6F\33 @\IZZR_,Q8/S>8^(/O
M$.'<?1_6D07^V\M2),7'P:>!M#61ZC<Y0\(ZN7\D!8:0/5.H^LW0&;12AMH@
M5Q'T,2STB R_"<UB<)"DLOZS)_F7;Q,_\OBRJH*<Z<O%"-^(8_R^9Z.L0&[M
MC7<%5]LK:"3/N KS$:N\#<*K1@^]^Z]=ZN(S9P_$28*<!.'YZ?3#WFWRH7!J
MFADOZ5R!A;73*"US^8J*;NC :#,KE@=1C-(V0J1[.LQJ27H)])D*$4"1G4-L
MSM[?+_%%/2^8V?4\XH[\J>>UW:WR6@0\+96CR=QV$>FI3@H^3J05J&S&TC.D
M-6_%=Q(@T;#LBT3IY&7]6@2WVQUJ>_[<#> K:FIGD_+2^2.A3^-#UV6N)9)W
M>0=>ND-"$Y6*M(*23S1?5<P) 9#A<PY2O_);+DU!F0E7+/"(%(Q>2.D* KXU
MFCQ#KRE7T[[97J1[EI_[&9+R0)MS OQ]0'ITV-IGB+H%V*DA6BE/I,)C(7IU
M@RW^T3LY72 S'7, \Q&57>)-M+S>'D@DSIG'BW90&?^9,Z)$>7"O^3M"E7BZ
M99! &%-+B.</9K\@=[$KJ1G7&;;B;_8T]HQ##NXSG%L1)G3.G3+TXDI-G@MU
M'GG@($[)Y$YTA2 =%HK:DO['BZA5H88^ZU_%A1-]5H_!E2BL6"Q.FU;A39HL
M A]#N!7S@+%]I7//B8VT W$X!V1:V_IO,#=Y9;:?/S6IV(4E0<Q6H'O$)FIY
M0!^KHYH3?G=^3-'\V97V7CQ7,(&;U#'LQ8\EQP8Y #["(6MN9<!DD@5*D/PD
MC%T/?W:EBB=D5OPLOE_I]&"D@OI5([H(MOZXL;#9'_+N<A+/<8:".!CR'B&(
M/86"$N/@F_-X;'[&_P^@%[?$:R^IPKP5OD0-4D8.IT.%N%ZNUI'G4L5.P'C2
MWBJ0>$\7ADAJ4\X-GB3#4VXKW;",@%H% C>^,)B;#;)(C.-V!O@'6&_A[)1K
MH<ID1XGW89F2Y0U['VL921AFOZWQPIZBI/AM.T95^-P4+6QA56I:+*1[NE_Q
MKYU[.JYP+9^D'/6T\&29"^E&2 <6#->CPRZQ.Z^8[(.?:,N G1PZT4YM(K G
M>).X<EEWB:'GSA5ZEU9=..G$7>=Z]B+1V \?-M,>,HK[8V.WLI!KX5D1-?(-
M=3#84O< :JUS]/_4?J/_CQ$SN4W WOH/,/YC*U0;^>;FV/8S!",\;3I,T+OA
M>B>,XV@ME74 \
[email protected]@E^(C[ ^UQ=-2=[[YMYA"&6K]P)BTUKFA^3QP0/
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M6CS2B:Z25,S)3Y6;OIU-E]XD(+WTJ5IYS%Y!#H_C#OWY\6B!3CLM5P5Y[[5
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MA1R&]GL7P31L^:VDQC?O?6*<*0M[-XBS@
[email protected]"?86I*/D:;Z0)
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MQ/,KEQN3#!#'3#&<QG=9 /!1-."GPE)N]?F8A<;.L$ CTKD+/FY%Q-[:FOC
MQHL_=;:(N.RK&4HVWQV:')$5%NF>Z*XT&2<X5Y8/K\W-)PQ=2AT<:F*]?>C/
MO,Z<:O[BS%PI%EHK5Q2U\C5S\\.DO-@3;C1&O"PC*8%B#^"1KQSCCMNUY[@_
MOT_FU,FTC '7$IJ&NHA:&MRD!G9%\W<)\T[KG\ +K6.P[V%0SX^ZI;A.Z1&
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MHV-74^6?]!UD6T;R8YP#)\ZRWR"^90VSJ,V6TSVY8,^
[email protected]>*Q:_18>#[>
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MD=JXM1LF)HX7O,WPTEEU(^'X03H5QE#L!.%@WL2Q
[email protected]$)*MCK2<QQ)$&CY
M'(^$.N8X$'JMM) +=9<49V&?QAU<WJA_H [_]*/I6L4KDN5!J_7SM4XNB7/)
MZ/&&(FHI8=ZFY3VXF#E*0Q.R0C^*@!UP7G'_[U[OOWNF^+^@:PX1=,UL0EG<
MCTRQT0ACV9QZ$2.>Z7V,%19"OGU+A[D1(LGQ;_$X'AC[_>'!YE\92I W7TT/
M+A\5>0(= V*SGX.3G0^7%R+C%4G,.<J=)J:_)1P73QD8;&)0LC2L.[FLXV/I
MLGE.; E_TR:3_W;?5[.=&@Q2M=0A]SU])JC)$GE/"1#:_(%TS2LWOG*7-+\%
M,>UQ]5?X0><9Y^O#.19 S[(L5>H\9V-#-\K'[(')'FLMUZUU$QM3\>I,376E
M:?ZKL=PS,UIA2?"6+"'Z=[ '@_>Y6@7VP$8GWA <@BDZL.@1*F]H;ZA.X@A"
MIE\\#("56LJ.O#1Y7NJ\J%$:2 LYAO1J^J7PY'%+7Q37!E1DB#>LUU_^]*A^
[email protected]#'M"^#JVR.,1^*49!\529.KE#V. E+8>;;%N+"%O3Y:UEN1OM]ORCMQKS
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M#[
[email protected]; ^*E36H6M_1?P!I&%52TU2IOT:>"^=&5;>?PZ!3-W L5S
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MSG-2%DK:;D@>V#NTACJ$G!2 NCC#;C3HXJO43[==9%4_NS!KH/# 9 6C5 !
ML1,C:1+RQI-H8:O.\[>.J"'Y]Z7A%%[BLXPC(JT]D:<TDHL%9(*"JEWR-1"L
M&P//8%(LP2.6Y#%(3!#XB"X!,V7@SM^S!A&":A]SZ7.X"
[email protected]''%)R
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MJ# 	'W66(Y4R//(0Z?C)N?<"1=_4]O"LE]3K):+! ^CU*JIY&%KEUC=600
MO;[%ZL2Q[](VN;9B%N8K2S=N:_$2/TJ=$!<7*7?+&K_8W<RG5^?=K64RBW0(
M5LBA?YS8T4R!)3]2U:#;;\V$735"OE9&THA$50=5K?Z_/PVD3 )XI<)?'&?]
MN#FR#XQ=_-;]\A*K^0<67O'&G<Y^.A$1@18-C,:\SKA/O!ZJW0!T$L_$
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M0:X^EL$S.A^;LGV[JVP+VI_:$U[_')?UEF4YR10NHM)%*O1+5@ MC"%F6T6
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MZBT"L0O!_*H3@D-?A%,[Z8OV"2C4*K<T3"
[email protected] [UG*+^MP-=P*I6YI
M<<X/N5,-(QS(H ?,GQ8L%9PA;EL(20#P8&X?1CD*G R7OE'T?/]ZIA<>)/F
M(I:A]H*.SMM=:E$47"!?-@L9) MW"!#@H <L=\BF37)KQ]3'HD^*7R8[7EP7
M:FOU!<;QS-5:QOT-%JX<
[email protected];Q*?5I$ KTZ18WZ.97&+5JX
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MV!*C+D "W4&;7YXX @+*.4,-Z=-_@,XAG^W%-IA92FG_3-5HKN(*B&(1T)F
M36,?[,OAR_-T]N8\N0VRM[1>S15JQ7U?2)5N_3EYLJMF&&C1O$Y2\9>:)4D#
MR$Z7)N<$@M>$.;I9PD*LKOG?MI(+D]/+CO,FSKO6GE$#NSNP0JM(/EDN&>(=
MUAGGGCNR(^HNK7#]0X=Q*P.Z!RM0F'+?-WH/_I7_BA=DG/RYR#?'%>A@/V(X
M^!SLTS%3H.2O5=.?"VLKQ99<J]IH[\17(-#>G:\H7[\H.TWT53V/JR]H>_P#
M\/95!X !T*;-WE.J'<:D@\^Z']E]'88IDTT'S!Y5C$-(9[EY6KEMB!H$- "
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M*#
[email protected]'"BKBY<G 9*MDR5.Z0K04*# X*1[!O_,SE!SSW67O:"'4P*
M&+PUX[S 9<<O)U>_1@Q9]ESZ'TKQM3 EV9%@H+USD0(/M6)X^Y35ZL3/Q3Y$
M)?#>O''7P08BS6T#F)*AR"@HHLPT]':><T(9$2@[XGB4R+LB-"( Y%RM W
MNWFX\04HF0C1#P&-OQE.4-(G-!O@^VV+$A$B,V/J<8X;>9%Q&YI^WY>R?Q:I
MAM+0=W)&@N6:>AYHYB<.XL'-I(P1,L [3"X&X:2/ .>%OC4\PC2-%>_QA^\*
MM4<-Y/M5T_K6(HXHQM5G$?H/CLT&0(?;G+U!X5B=VH;M5K(*?Z0O>G^6PNJJ
MFC98%9N:7&R>9].=?.S* PY4=AM1T+=$/RMP%PFDUBUONJ?:KJNETRW[.&$?
MW?[.ZYR6UUZ6 LMN 4??!MYJ)VD3\K=BHV__+Q%N>[IMW4Z8XH549@XC?_6
MH'U^%E.L)QMZ0NU3L*JW=/KM;OR;YI'5#]9CB.== LA3S2V]7F'Z4KC#A\7E
MK-H)H#/G;%Q>^,!3[J%NK!SLQ?_"*$D<?1RJ<U1@H&\8P!<N]/B73[!Q+NF3
M:'2GL\'L(D (R13T?L=ZKZ&W85X.'>L>WA>$HU)I@];F&WH3-QB$FOC0WR6D
MZF'*"2_X,U7_G!).IZRCJ<1/V6L[T_S!NX!7G[IOI <37[+B5D^E4.7PW/T?
M #EQP$WI"HN)D%SN4EU$ />!. M0';*B) B2".G+Y\8]_OZ^Z'*J()&U^CT:
MG0TR^@_^_]P4TC ?O]*9E'9W$OJ6-FPR:"MG9@[BDH>FW3K?/O]!/2S[RA%D
MFEDN]DD.+WS"\'..\*(NYT1TF-:D56^QQ/$[J=9.B6KO0&E73<727?_Z *6J
MQ]Q>MR.OH_]*7"'_D=>I_C8K^9K+JW=<A%BY-3I+"&CC[:#-+#G5J089-:F^
M)NN?LQ;9+O/&>0A>IG,,SS<^%KRQ^0:-JC7"A':] >Q)3'1+W^KL'@U9\9JK
MBYQCBKG^&:CSUSM'?YMCO 0*0(OH?V>"E^$NV]B;8XA1U^NTOW0IX^?R(20T
M0'HMK&RK 8F_$M<O]E@4(OJXW2U=:;C(VWRG98PAG[XCZV6$D]&/;MG\?I/;
MV)_DYHWBCPF$5#$*66KZ;_.=_N0=N2Q2O0/Y'4N?6#(\=9>]RJ"])S>0F0Q5
M'@+]^P\ AC>LK-RA+N%Y476)1,N4M?29-_ECJ]3TO"#_T!3I>4>J\K@DG/N;
[email protected]>)@2S_2O6@:>R,A:$8)IV#X0JKMVKY!VBCXFX20_#NN9-E_&F?
M)LOO)!4G<&6@#JKN]>*,R6/FA 8X#6XQB5NL7\JQR[OJPP+E@[;*!OL!//FZ
M(XB%C)'-I[P1,.[!*EBIN$(^N (=F5&RL-P^+'$)\&=XR!VYL:+B_82E]0=I
MG\-PK3M;4[6C.OUY+GW0SZZV$"FI-7CJJWF-((IJV653;16QQ8++<U_BE<Y6
MD=/AWNC]@,]/N,_@\'5(Y,^?$B__ ,]=^@4E*+6%89-W9!3E.5;]PT\IO>*2
M/Y4S'26Y 6\6.PD],Y@C0EGQG%KH7T"W8@F"92GM2,]EW;>C97$R\7CF&6%Q
MVNN\2#-J%$/)L\#'PSJ.;]+$[76+?>N!1D;C$
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MI '9 ^[JGPLT#HZ#BZOW)0"S6$2*#4%$1X72H%9,\F2%$BSNQ-M.?D1_TDW
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M.,M\\5M;?>^M^\P3319J8
[email protected][B7MQ=WWK;.@J5!0P;]8;D.IIOCA2->8
MI1A69KDG%]:LU1VE3:)_>D\PO7KH+(.RY7+O8140"\BERI^+G%X;H4C'N(H/
MSJ39$^E:"WV:Y;,N?\< \[>J_1\-I)__"U!+ P0* 4I%H?QA+*/K8,
M "V# # #-$7T5&1E],+D=)1D=)1C@W898 >@#W #____^_O[]_?W\
M_/S[^_OZ^OKY^?GX^/CW]_?V]O;U]?7T]/3S\_/R\O+Q\?'P\/#O[^_N[N[M
M[>WL[.SKZ^OJZNKIZ>GHZ.CGY^?FYN;EY>7DY.3CX^/BXN+AX>'@X.#?W]_>
MWM[=W=W<W-S;V]O:VMK9V=G8V-C7U]?6UM;5U=74U-33T]/2TM+1T='0T-#/
MS\_.SL[-S<W,S,S+R\O*RLK)R<G(R,C'Q\?&QL;%Q<7$Q,3#P\/"PL+!P<'
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M# P+"PL*"@H)"0D(" @'!P<&!@8%!04$! 0# P," @(! 0$ L )8
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M<#-X@S18=R2'@SP(=SO8@T H<P\3A$1($&96A$B8A$H8$ [4$L#!!0 @ (
M !VD6A]6Y9YDV[P )^^ * 0D%23$]7+D=)1@#..#''1TE&.#=AR )
M ?< ",6,]?:QWMR8(MX>F5V@IJCPRDE,D)+920-'+B_P%)K:E]2<P,&
M QX'#[S+NR\G-AX !Y^WNS ?,$-#2J.FHT8O.1P, !8' %E30+2ZOCXW-ZNQ
MJPX !X=]B1X/%T=]G&%(638O+T(O1E),639,(8Q]89>;MV]\@B87'[2_SY.,
MHR8?%RX?%SP=)1X/#S8G)T8Y-R8/#W^AP9X?#TL4"BX?'RX+"287%RXG)QX/
M!X)M?H9K=2X?)R5*@ X'!Q8/!XB$;S(G'R@L04LA#AX7'GE2:38G-B<?0BD^
M8%@Q-3XG+UQO."X7%X.5G+"COI-_EH>"A[ZQGQXF [VUDKG1WS 51D=*#:.&
ME[K/S[RL?*R@HK6649.;E5A&,4HW(RH?!90Z)7@=#S<4#$HK+ZY$$3@N(7Y5
M,UI6*ZQM+T X"X]T.BX?#RXY(K9,(4A2/WA,$4Y'3F!R5WHP$4LT/S@N"4=3
M-*0;#5 K#4I3)@8 $(S/GMR0HV:A+.>L(^/A6AYFH)YF,.\T"<?3E(\5<S&
MTW9V:0X <#%A8'!PX.!QT85P !I&:HA\31 <.#BHW44A$*VQ39R87#V!<
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MB*&QH1H "X+'E141XR+>,_/US(F"TH^*:&7L1\?3AXJ#RH=)%8_2Z>/HY>G
MK[6SOS87)PX. "8'%R87!ZFYK0
M "P R ) 0 (_@ 3"<&@YY(.#([B88!T*9XG) $N-'R!X0*&
M0Y <O$!RJ&(#(#\P)/JAZ)+)'S].7DJY\E(#DXE,FL2 @26SF 1E%F09$V>*
M23HN)1I9,Q'(E2E1(@4R-%&#'XDZ6)JZR%& FT!>3,(!RX:.K[:$#K5%9$Z8
M,G/FP(&35BT<,41NZ+!E2T>-,C3NE+G#=R\-&C5JJ-*AZD:"%XB_ZD@LXX7B
MQ:YPL! E*@4.3B\ EGB6+)EIY^!,AZ*,"'%Y9:RKQ4&HB>$7IZJF2I<K50
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M E4\G,B$ 0"'-&")'E8@4-!+(3%S" !U, #5UV&&(MJ'T(HHT5IB)(\]9
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M*F=YA\NJO) #F?6!6:9.7_ L\Z9Y2() E._(,>RF1RR3=#Z-&$BL0EZB)V
MCL:;=5*@XC;42;_1.U-(JP%0852;?O*+G#(-O H0JW SQ7$\Z2 *-R@U4 ,1
MR=UPPP6V#(P@5$# !!599Z01!A$=\RI>&+SBL8HM%W"OWGMY02Z&EU\EJ^RR
M1.9')'VG<4411&&?!@#@ $+)6/6(,PI"-. "+0( *W)QC18!X4Z'RN"A;D.U
MW*3D-XD"E:C(]:)W??!W2-&#'GXQA0Y<(AI3\
[email protected]@"!&]'H$*!T ""6
MW(]Q_HFX7PTH9I1,- Y@>2/"KA0GAL0YZ7!X,!E=:O XE>V%?O@#D_]>X(#'
MF&ES]*%,9>R# 5L H'NIJ= 2/ &)0UW@08= @!&\H >1)$(/6'C"$Z"P@F"<
M80 HFHD)3UA"?IDD0F,K(;LXM9)#F.,*W.#&*BZ2".(HR23A4 00)I%#$OV@
M50BSD'?&,(:RE*$&&!C87 HF$Q3I@%8<,\L290$RQ0WF!5.L(K%6MAXOJ5)9
MBWE,7;2B15=$QA65P1QBG ( )<P! .M2Q T:H H@:4(%5T#%+H(@C!D@PB@
MH((40L&'74#C%%5( ;9,5+60%+(X6MN4MEYTNG#$Y"B?_EB-*RXQ!23ULPYU
M DGZ/D#;PS!&[_0P0W$<+@RE$$,L0C?B; CG7D-I09G*0/ZGL2&21"!"%\B
MTERHR#(MM2>+.FC,5Z053#>] >665.TI*6'6*3!#65( ^F X(E+ & !FP@
M*RPA"@"$@PJ_"$ X]! ,A C:0 @Q!LD(1)XHN1?M-&-V*RFJ-^TZ'27" =K
M3E>'#JB0GX?@ACJ (0+F*$-( %"20 UA%X,(:%V^>A'X1*+H+ 52;^Y0/AJ
MJ ,XE $.@JE!6@@XCS'(13&YW*6PVA.&D&J.2-+"I0Y6 :8U3>9,F('#3=-0
MAC.X82BJD,4-[*F'!&0@%)JX_@ SV@H%)BBA!+4 !Q4T@ 5<9 /GYA$IW '
M*=T@B7:)E.AJTAH.;KA"'=S00QOTT%.3Q.,2)9'32S[A%(.TM6HO80I]7A"-
MP8H$$9DX[C+'9)2>F.@&L<"#WCYZ,G-P%D=@&8-Z).O0+(G!5RU-C"N"*3/^
[email protected];2I#1N=0!DI<\$Y#.802WJ@',%S#CL&@ @""00QZ4($*Z!! SPQACJZ
M*'>[P0#;!"D^42G$)"P" !/2FJ)#',^]J[EN S01OC'\8!Y_S6I*,L8XYH5O
M*IY@CB-TP FV_L &+# */4\"N"\X!@A@,(=C/,H&QF& $_'3[^/<L[+'B6$P
M)MO<_F.^<K/]G*E-;@" >'X! ",<PA9#T$PB)M& 29)DM4RILQYD(0!ZO(,#
MNS@4+')ACGFA!"H 4,6!C*(#%U+L-QW @#E8(]:+F.L05]##%=21P(Y<\A/<
M:T"7YT&$'^C@N6!0J]N0\@-/*.(I<K5$.JKBHT4L<R3+C)KI\%.'6'P RVU@
M 7[8(!<7A>4\5&1/>X(UN37KYP*,NT]CA@G ;B/F V/003B,VHEU7" 1%PA'
M WAE%@ HXX)*:$ B5@$ $VBA%1FTA!'Z(!(L5V@5*P&X"D4BD@MTP)'F.,>,
MF1".$AQ"!V (28L:0ASBK$05#L)X(M(%@ X H 1MB,05_B)ACA*HH01UN,(5
MP##8DT3*$3\"DH^28 D94-HHKO[*3'IWPW.D0)4'88J*^SV7"Y#TBEDBEA@>
M^Y4!,RZ8BE&IF7AF'U'TP#4ZT ,@S# H6SC%#31PJ$.G*1^F_" 6 &!$./8P
M"1?$(A( 2 =-7)0(L:(;1Y5<VB'TX/ IJ.$04P#\/ )/DP\B[ ?A-<@EB!".
M<,@)"'50@QWJ('(U #0/D4!Y"4J@<G,$13<KN<D/* 4D1Z0C ):H!F)@@8/%
M# 4Q27GTO+E1,9$D!3$.$$E=X'?TL-/O+V%@NILX\;^O#&9@B!'%!Z"%&&Y8
M ,+R 0 P"!<[$6#P6)WJ!O$_H*=P,9[':EL "OT,(A%]+MT& !X.,9A+CW,
MHPZK\$0,Y:0)'6@"4I^H\$K&@(%OZ>$3CZ (T0!0:H &!5@':( &W$" )J<&
M>9 ')T=[-K(2BN!<0) ) 8!ZS) F< ,]F$&-I 5=>(PCV8<UW%5X2,=*6 V
MQT47^K4R87=%>;%T)O,!,@!,^O%TS/)MR:<P/2 -MJ!N1"!V1 B@ LV>=0
M\M8]&%!^B_ #JJ J(.$ A^ #S'!A1G%!IA9X:A .%L$)FG )904&A[ *;* '
M8_ )>Z<)X6 .++!Y(F<'5Y" *3=R)V<';W!R%Z &5W!Y5V!RG'<%>5 "$6<<
M C5@_IH0#XA@%0&0!)"0!(_0 2]@ [3W :*0(%"#$B]0!#;P,$@B VQE Z#0
M P=!)M!64GJ!=()Q2_K!68]Q7)OC"K_0;=S0";? % V0A$1P"7>1A&70 'CV
M&S-W"!.0 B[R P/C S[ -:E454*A!VS ! "0!S\ !NER#GIP!F 0#E?0<;:P
M#N:@!L3 !$P@<IFG<N3H"JMP!6K0CMPP<G6099S'AV@P<IO7!FV@!F!@(YI4
M/9<P*9#@'#^2!$8D'3A :="C%(GP ;$P! &") _S PG0 DTP%%F!2^E14C+(
M%_%!))6S9I0&1J#%#0C@8".1?0QV*+Y8!HQ@"Z.# 4C@_B.J8 N*<'CA$ H^
M, A)4!2@QB]ZP V'H D/)PNBU@'6V 8)X(#D. 9V@ 9OE0=L4 <WP(X*&'DE
MP U\: YH((=U4([Y.(CFP V18 >8IP8 IQ+EU7+I,) QEP2GP5:]<S7K\C<_
M, E#0 8AN!B@N#1&H0@BD1_G-@9X43\LPY%R<4M0!UG()U+(E#,O4(LD<!!F
M@!89%78 $ N*M1<Y!0"W$ X#Y8@^< CA QLIH00QIQWS0!1#<0&?@ AM4 )Y
MP 0)" 9,T =Y\ :Q&0IH$ E!0 ER< Z18 ;GP U,P(Z#J :1@ 9UD >>$(%Y
M0'F1P(=Y$):#: ?6V08D<1+7_O +BL )0P%SRI@$0S $ >")R>%RCQ82/3$=
MM%,Z*.&74#$)"5 7-] >]KD>>$$EJI ? ^884-<]4)<S!#0MHF #(B"9V%<&
M /"+&* *454#'P, (2 4%P0),.>=>G +0:,'). ##! /^S(%1W$!],8'?( &
M<J &3(";YT ,XR '!KB<)7"=8" 'Y,@$71F=?;B<S\F.YA )D3"("WB'YU "
MNVF==H"=;/,4UQ :"L,,EC $/C($EI )GI <M)$@[4(2K)0I\>)LHC"?OQ(L
M2(>?@:$*,C )^<$_3[<LT6(F'W -W/ )+Q .E6! HC($'Z '3#!^KM%>KI((
MC@ D_G>F!S6P$HE0#8\X!)545JNP"F,! "AZ!6R !GKP!7\8"6\@!W8@CB;7
M!BY*>:\Y!1? !)9GJI97!Z^I!J/P!IP7"9<'<K=9 LD9"1E0"6OS:-? -N\)
M!$40GI: ".F9GLS #$TV%/I2@A.#+>N4")+!#9,@ ]AF"RE#9E=TIHWA"JI0
M'Y %)@EPD=WVIM/"5@V@!(.0#CK9(XX( &/0"\-S;@61"#&) (Y@$0F )*M@
M-!)Q")90C695$7HP .28 4M%!'F !B%G#KC)!R(W#W8@!V_ !!G !'DP#[CY
M!I/7C@B;!QEP#GF AW7 >1F0>76 F[!9 I4 L7U#$IXP_EC) 03>,',!$!KI
M*1V6\ %Q.C"=R!(@U$J%!Q4LP V=**T1H ,I8U(GY254LC_SL6:N( .K8"8Z
M$PT]B'P ,',](J4^8$8Q(&\\A0%* )3AX E)$!&7@$#[0@?"@P@,4'>25&)Z
ML 97@*/SL J8P+$FL)M!R@2CH 8VNIPF8 [D* =7D $_*H<+F %;"9MU8 >:
M!Y:#& FO>9MO$ F@0A+KX&03DPC,\ N]H(R.8!3>B0$*HTPY8P,?,#%4(WLG
M@A)1BR9S0:V\=$7W4[M>,@9ALA5GTBR@,RT*TX.SE7X^X@,!D #WD@,;]PV(
M,FY#$55W% ,$<0L (&](P@L!_B"IZFDAFL -0' ()< $YD!Y-X &Q$ $N\D$
MJR"Q=6 (FYJ -WH.=A )<M"5DU=R(<NIFQ>Q>= &3."XCGMRMWD.;\ ")J(#
MT;"KL?<#ZS($/H *"$ 'U#"+;*!7Y)%2OJ$2&:,IEZ )5:60#C,4_3=F^'F?
M8><E-UA@N[NM4GLF!*0&W7L+ 8 $+S(&:C &&Z<$%$ <>X)X(X C - $7Y N
M2@ RP, ?G HC".:;<4]2@ &F9< CWJP08 & X"<M4F;>TL,4Q"==N#$)I><
MTQEY;0"!*!<).O" 0$J6KQF_;X &&8 \)7$-ZP!71M$@+\ )#?,*23 *L7 .
MH& !_F;A4.>3%=6 I="C'0Y :\-#=T8'+/>9?7SA)602H"\5K?^SPM,240#P
M#2_ !I#J%'N'""%09T8X $E@#H2@!SF" @":_@2"'P$I+P*1:@&=P !L[F
M"H=0CE<0#A@077(@!\20!S"*!L0\N;$Y '7P!1E0 G)P 6V@QF^0<#\*<K[0
M!MS@"XX;I 8(AR8+% 8A"BP@!#E0!-^F@O;Q"@@@M!3P##BU8-)QK_&"J(^F
M, EP5:4S%HDP!F*0BGTA=KWD):R(;8O1 LXU7@+ZNSUX"7^E!(1P!*]@ V,0
M/Q&"I8B2(&;4#)9P*!CP"PSP$F]@!'I #'7D"]@Q!47L_@D*9Z/$0 S&/ W.
M3 YM,(=,, DXR@TL +XA*[]\< 7GD $OR@0H9YW >0[C4 *N"IL/.*,9,+*>
MP TX8 ,' " ZT 0L(!DXT ,'T ,V8 -J2@UF@ -*H&#L<Q9?<9 @8@,N LF
M80,Y@ ,@LKEE5!=W 3E=<C\!'5*).0E"( 0LD!]K:DP*,Z#+QU8\!@#;0QP_
MH R)$*RTAB!$,0:B8 :7T X 0 8N< FVL'<;YR+74#$7, ;F< BEV@8V2@YR
M0)L#X 5U< F1@ HP+^QZ0618 @M&J1Y@$.."XAM<-2OR0UOL)P9@'ED"9R]
M\ S/, LVX O4\ ++P TI< U<_JW6G-@#2S !80K5L- "2^ &;L ^W[T8'W!X
M*8$#W" Q$MD"*6 [7XIN=(UT,XC7\6TR3\MF7:VF8- $WP8@HJ!,!/17B6 %
ML\ *7Q&.MS9](%$T#-T '_ +ZG)'N5=W)7 B38$!GK!/G(4GY:BB<RO4WTNQ
M<X@&%#NX><BIC;O4,_JQ31UR=F#4;Q *23JCRR $%K $,# )D;0.(B "RV #
ML' O.#60IL";BT$-E"@?DWDEI #L= =82 +'V )ZW">/%4$"6 )G("S15"L
MQYH8[04$_!P&,-@E_M4E3'=9B[&M:IHF_8U,!,0S &X";C2]EW #,<$-((P
M"& 2_IEP ]2P$EY7%$#P"YQ"%#_@"A1S"'5@!L#]#$Q@HD00">,0ON-PF[Z
M!F# !S8JO[V U&K0V[<-G)O:"^?0"Y4@ I7 "N< OVU@B3E@ SU@"TT "TM0
M"96P!SG0 ]S0 ]1 #5W=%6_=WTW0!#9 #;!0"3#0 T2^W [0 S) -2,Q%4AF
M'\S@":J" 3)0#3?8.(FP4"M#IDW$'F(0;M>!)(V#?-_FYM-ASO;Q5T @O4I@
M"1F "&<D0Q;@EXG@"KX@$>+ ?];E-T.Q"M<5*Y#*-PTZS$Q@")L7FWP0!'[K
MS*]9 KX@N5_PL9IJ!DS0!J;^!N/0XL\@!-9 B=SP"M;@_@(]8 ;+ LPL(D]
M\ (YD (P4 ED4/+6< 3<\.HX8 U-\ $IT .<2.0] /6L 0NX (MP (O91J<
M$'N*,!5%8 D)P GQX'7&"A4?< W*!]S(<)(-V; 5QY?0=#= W3[@QA%P (L
MA2"Q, \ P 5KP 5:$ 1K #6@(L H)ZV0&ILD(6*C!0X(1+[J#<:-@X9( ?)
MB;Z9)P=14 (98 @P&@F9X KC$ !F< LMT-1F$ -OX TBT O*'K0I -4P4 21
M%+0VD'HV4 VP4 V4^ HY$$DN$-4I$ LL8 -% ,L4/L^?C<I8 U"&_)W8P$_
M#@/N5>WU,0:'X0KZW5XJ\C #_B,=G% #?Q$LM4L#82!$)H,C;%6T;+6#.>,+
MC-[N=)< <<L%YF_^-\ "N3 41@,3#;!IED8VF')"%8(!B'YN=U('AB\'?"#4
MD3 )'G"I-K0SR%*R*D";,>*/2(6&<G4BAN16Q4X\;-1I%KW#[@2#$)APU7
M8W"(R"C*1@H;L%A92X'CP$HA+F#=7,<M10]N+US L-&LQX<>.X7DL&:#F8Y$
MERYA8/;*AHT7,JBU89H(2"9+B1+9TO%"'(X:=VC<02M&K1@:8FJ,>:%#!Q!;
M6H%XE2LW[HL7'X2(H,H7R%T@/<*M\01@! MG[@ N,OIRYA#%Q)U /+CTH\?
M�[_MB\.9$B#/$2K>K@Z70'#%<$JB&&!DTD-+[RI !C3M.S$B7>+-E3J1*D
M-N>$2&-1U 88&SJYX7!%=5(+'-2X6>,F:I(-&+"H66A2! :.5S!$L"(S=24W
M;T)TNJ@V$D=W%B(FP-C#]\4/KYY$^7*%$QEB^4(1_A(H0I1$, CK!B6LJ>&L
ML^Y0B\*V:M!!!KF\&NRN1/(*ZP57/GA!"!A8T(^-P4@K80YB /"$$"W"84(3
M## XL8+,'"*1PPN<.J2ICAS:D@>>VQ*CQO>B&2 *]BXHH11%GACG$K:"""&
M3(3HX0T2$'@FE!(B^6 J47IHSI4B6$@AA4QX$H4%45S9_J Y'(IXK@6BFOL@
MA41LV*"ZY$0YH A7N(&!.C0G@,"&''I8P@9>>*& %0OF_,'#&YK0P18B\%#E
MPPV.&<421\!J Y-(;D!K0@K7PE"'23;$4:NZ0-S+E1=8:$Z_"X"8ZQ(SPN%B
M#2Z.!0 ./>K2*I$+B 1B1\XT2X2S(:O5#(@ZFIKB*P#XN"*22/@@9YPVF(@D
M#PP0,$.52,XQEPDY[*A$B ^LP2&C%Y[#4Q0<JNGAA>D\$4('F' H>;;!#B
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M0XDQ6###C &X<L!6SBQ16BA;[A!E1MT4$45'3X*ZZO!F.8DQ!"?ML$,:Q((
M4$A;@&A "0".!8/8%.IH@[ <P_;JQA\,W(S(T#S3+)H??OG0#RX #;881Q,
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M;75F%5[1PR'R8 <Y9 -7I!-).R !CG$H!?74 D0)B<*'1S1%:+@A(A:,(DF
M5*,)L. 5-WI@#6I4HQHR $(+CL(";O#"!J&@!@Q\D:8F'.$535@"[VQ !Q>4
MYQJ@HX8+7,"+'L# 1+!;@@7VP LZP&(9!R &,;R@A%R< 0^P$,6^<O "9X6(
M64VIUAZ]XA6^@$0COH!=OA! _H%*R&"+'_!E"@*0@ ](H07SP!$&+' L8[7A
M,7PP! !. P PL. 0G*B!.G# (VQE"I!"NH0G5L&,:T0#"(=(Q"?RH(8%5JD-
MA".<'5@AA*A=PY0B?4' !":#(R;" ;_(S@=<8 ,R_"0''0,=#&%!!V]T @(Y
M&"Y:$\"*%J3@4;>T!AVLX8*H3N45U[!!)?9@@Z#"3@2^R,$>0#$+&-BP&F8@
M!A_X((ME5,,6KCBDLW[@1?X LBEDTXHBM)@X%_HB(RQ@Q1Y$H*N^O. :@DV'
M)3X ,MPHBF+?0P UD='=N@!" (0P>( 0V#$$/0MC,D<(6I"*%30UJ< 6P
M=/"M_CR,0EX9D,,Y\B '2X8B!4#A)%]TE8*4<B*,H5M)"B90'QA4(@:AL( U
MKC@5:\ BNR.0!@66F8-#<0,4SX'!?6RP"B\?X0C=H2TU#C"!(2!%C<+):B]
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MEXO%'K2<"@KP=:8[H5@/*O',F41M$B]X-B\U,@1=MK>X>X )" P @O 0 ?<
M<0$G8!:S6,2%%]+@21$:KJ#0 -*S<9W+T3B!P2)8XA4!@+PE(MTF)"S"$44
M@!X2<4@@W(!8=%R?%@X!@%%H_IY#30F;X0'I&?XYA0WWT^(EQB"'()CA@$RH
M0P+M4*5)*&X5*O1F$28QI]PNXW/<. GRC25FDZ"5RSHA9SW\(PET,$"I>!%
M#*01"E# @ X >\%X'"7>F<2R)8P;$3> Z0)6+*$2TK! +X0 "B%00X94D9.#
ME" +"QR-%Z#X %%@HP_ EE73BOOIC$1(J0\H@B)( ,ASA"$8 DB@P *;Y(
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MOL +#V$&1' $1X"$2*3$B)3$)*#( $@0 <23 ^C$ %C$ &"*2VB 53A%*@"
M2S@#!#@&R1*;!5&U:V$Y0<J4.I@Q-KP&%H@$.1@'FS$!.6""-Y"#7H 7S*E
M(YJ$%'B%!-F# PB%):@&:I@ 6+#'3M*5/5DJ.BB%'O "4 %", !,E@"H%B'
M5Q""#6 )7AF#H*H$9AH""@B%(Z@$7FB"5R /-.D8\A([:Z"J:N@%$4"*]KJ!
M(O""<>"$(0@ 3[ P"6,&4W&$3O**1_ $1X1(B91,"1P"I.L+!D2^3K2$AEL%
MRQ@,.YB%+S #+Z@+(+@&NQ ;_IB\'U@K//^ZM&B(!FXPAS:Z !QX+34H@0S(
M "99 EB @:"SK5WABQ28AZJJ#U80@1<HNTIH 5CP!3)8)VO8 !B 2]X@V7(
MJCT@RQSP!HAI"1R(@_%PM"&RAE*P/E[P B]X!C#13@L(A1B@#YWH@5?0B&84
M@AB8@!Y8AP.P1U=X@VH8@H:\M DH@E>8Q$KSA"&(3,GT@4Z$A - ,>+.#;J
MBP:<M,$" B' @(Y3A'#P0 PXA)1+A&MH # #B'\U8*,-S.?[X"FZ(!@!@
M*TUX@4LZAU'(@W$01^0;OAXXNY1Z@2+8B:E0&$*@@_#J@2'XLHKH@>N[OA$0
M@2&0_H8)R(%4,(\]\ Z= "QKJ 0Z:#*)$0%0Z 4*0 !ID 9>*!T84"?UR@'S
MX-(>0I.*X 1\V:XED$Y0\ 1Q[(4#J+1$D+ )J,1@X\0&;5"*I$A(< 1'M 1+
M<$ &C L@Y8L$8%2+.\JX"!7"T '. (;,XP')4A$3C2L5=8HIZ"_02BA"&L@7
M@)\." R^X-S"06?(E*+Z"24DASHF!Q?"@4A"(4>X(4<H(8;& D9P"^=J+MD
M\@+?S @$.!1K,(.A\I<>T('K\(8-B 0OB(-9*(5($(&CR($6L,,6 I7&)T4
M. +X 7>XH9)H :>&"9>:<H>< ^^P5+8 8@*)0/H$1+_B L$B$13F &9C R
M3AC81R#8!"!8_5!8!@Q 3N($3="*#04D82A)._ P3]BTS'A)_S*\:CFX:BF!
M#^ $5U"?63 $-3 $E' /49@<B;D(_4 $$K'&JEH"5I@I3 P0OF"&JK !(NH!
M!'"V9:"&99@ 7JB$*RI0'#B3&_@)&(B!3NB%$0 %P' %O[J>3LJ(Q^&9&!@=
M312%'+#'%(@4_@Q+I& !%YB$!+A7""@"?3U0@@4"@N6$1V &!1384EH:@4T
MPQ0,_1C9.6E8+SHY';@$15"$2S "R0H%/> ,( "#M>F10>(1SOA(%F.Q0R@!
M Q/82N@% - U-K !%D"1G1"%_KB<AU":A!QHP!4"PN" @6H0BYCXIK" 71DR
M UX(E#9"CNS:K5\H@M_Z,:!H5YD*0AR0 ;]Z@110V"800/5H I80G0P""EE"
ME*2P!%!@":^P@,*$A -]&P1DAOM9-0^Y"[T567$*"T'3#PSJ)!W(A0, &Y8
MFT0X!-.@EM/Z@3\R-+7QV-3K+Q7U+%FY!L4XK2C@!*'#@92:$YW060$$"57J
M@2R<G ,(0*J8"_WP")FZ@'E@+U=8@EA*A"%8/%O"@1YB@9/1"2*BAAAH*;_5
M&4C=F0S*#HU8B:AI@>/BB= 1G<NAAB.P!$Y(@%=P!038!$F$!&O!"_XPLL&P
MB[CM_A 9"R,@S:".P"!.8(%9B(4&8 ( ,! @N00]N 1$Z # 6!%T /34)L&
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M58J:XN4FI4T ?0BOS4RG;4!^&"%/54),;J&)ABF+PRB9K !O'R%' @ PG2$
M:X $"B"!QBO W)H+KXCJ)\X+_F!QA6BHK&CHB'5H@S80@G5(*U\ M/#@ GX
M!%4HF ]I !F8@EV0 SE0@QD$ "1@W!8]M/QI8Z9.A'/H!4Z(@3:XAH 9(4##
M >I0A,#8F;B @1'2""]= E 0R^=@0[^RVA@;#$;# 3J(A198!EA2F.>0C]1-
MDYT5C#$JITB=#ET"#%'PAN:(&AQP@<?Y6A-2KR5H@5EH D20P A=!Q$@2R;F
M#VZ )_H1YL2+9Q$"@]CTI=CTA71F[7W1@URPC$N8 %EH #S(%$_0 QPPAP?H
M F&X @P8 ?D*@!2U1</+C*9@ADN@!OS6 6\ @N$2$?9-9D&;T+12VKKJ6?S.
M@;.$_@$,T(B4P@'O 9:_35Z9$HGKWH[E2X#LZ&^-T _!FVB!"4 TR0%?F"(7
M* IL\J17JH85LH8A2,H@TH06 (*Z_05?0 #&M)87: %L:;@ 40=UN(97B 9=
M^04P -UT"#3OH8,5VTAL"TST -9: ,P )QB(!S4(6LH>8 :($5>( $^@4E
M: ,40 18T]BU.5P^SPP@0#H]B(%ZT0->\J*J;8)E\*:$88$/.+NJ."*)J61K
MZ 5?R* 6V)FS.[M<%T("JV[N2 D;: %.$1$PR %/"&N!<2>W7CQ5X"V,P8%D
MZPAK\ 6 $4)A8T/^?NP>"(6DZ(E>2(4&N(1E8(*XK19?_@8" ]&*CE#G$KB"
MU%8'V(Q-%B!MV&2!9!8.].H)B)'16 . -@" )$ !F""6C"#%# !!8 &.W"%
MA1\@3?LL!'31)_8$15CT0SB$)A"!LZOH7WB%G "T1<[$%U@V4^*R#V !.J"#
MRVGK-H'O2I:!7AHI=TH .TPW\A&C28!=7A?"E K8+1(R%O@%_S@IE\UR*SK(
MG?&K99X ]8N%4HB!@*$$"D M1>B (/I)@:"7TCMM.^(TA)X?R=MT7V%M#<P
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MU\!$F\0BK:_$ZZZ]N.8JT24,0 8*0+I!0 @B5;]Z2*''#=.AQ(I2O3C4CRY
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M)&J)T;8OX*"1?$3FX ,3,%0B1 @.V#11;!0A$,+SX0""@MCSI(+)888<0P#
MF& 2PC-OS.(,(2.$0L$>H1 X<0:ET$%'*)V$\H87A)Q)@A=GWD)"'+=$$LLR
MR]C U7!G&_<+2M108\$S[.QQP!"^C&.''$"0*&K-C>&<,\^H]L400S]S(S31
MZ8J2_L8/;M20!AR9)6(. $E2E@P B7C!A!Z/D78:LL[JH,,OZ'-"(FR)K+[?
M1?"K:\,LDUP)RQ(V]-+#0<-I-,GJ< "&2GC!=A;(!2V,P !A\& :F/C&-XQ
MBW%0P@N=H%@J4A&'7.3B&2&@Q#->1@(/2D(21C""X3"Q@ 684($," $"W+0,
MNE5I*T<8BKTLE0INN*0/<EB%+W[0HAR1IE1Y:0,WV@ 8=:Q"!ZMX 1N0!P8.
MK2-NCG%>&!HPAW"$(QL @ T 3@ 3N@!!3O(# !>U@$]9 4#.C"?0(#P"XR
M:2#[$0(+MB**'KP@$R_ [>%JEJP. \-D!)170@ U?<_NTJWH$!.XBQATB$
M( 3'H(0PDN' 4Q!@ /X( E(YP70$8,2DO D)F@!0@_20A*&>.4H%D +0RP
M$P7@ 0]*F MI2 ,4?*SA18K@BART@!J5X 4[^A6*2?#"$&:PA!!>,81+A$I4
M0'" 7E3EBU6X92/1: $87 $&%ER#!>L(D=%V\H%'O"()2E! !GA@%TMH 8U^
MJ"<07%"'"[RA%Y")BVF&)9!?^.X'[)./*U* GX:\0 AGZP$L*O$"7G!C2-[I
M0=LD%4S&@(0B,L";"RI6BE0@@!(A,$$4H,&#*$QC&H13DQ<HD0%55I(!AA"&
M,(ZQ@V.,(@2CB.4"IB$,#^ R_@B&*$ !4% PM$B%Z68Q3(F0$/CO& "W)C
M'KD1DU#$@1*^X043X.:*:U2BFEGY@(1*-85K[&>L+X#*.L(9#1;056A8VHH1
MVG"B!JP" T @$ D(MKZ&$(=1A'$GS@ U<< @!>6,43& " 8?T -A AZ"KD
MZ#N*3,(BD^@!-]!ZD1:0078V\ DL1" "&\C@!E%ZP4?U<Q%7)" IA/B;%P80
MRV-X(!"!( <Y3F'4%-X"$T:0@R%, (5 G&(%'G""(080W%-\(Q##6$$43I'=
M'9!CI\)8 "T90 ),Q($.>!71,:)A908Q(Q$($U.H$ :3 @ S"0@S<2<3.
M$C$1_N?S70Z\,=9>5*)XZW#%$QF2KHMDZ5$ ( 0;=> )!%R"$V!(124.<8ES
MC&$5BDT"$22;"P#L@!)Z$*@<>X27-W(#"& "B45@<*6*N.L -LA!#ZCR EC
MHA1"F6.6KA*_XD3E<7$@ 2UX, #E!B(9PYB&![0;71Z80!@%6, QA-$.*+0C
M"K6HQ3>$ 04H3 ,:7&['EK7K@9:VE,J&D 0M&$#2U3YQ6RBYTBN&L@YJ+$$:
MS]@#"4)Q@$JH(1$7N "-JCD7V%RC%Z'XA2@([(L/1".<\+O($VE\$4[0(@$7
M2$0*$$&$>"1""0UXT2'8 *]"*Q*=)#8U\4*H*4ZA<H_F!" "Z @0NTM4*/
M2.A41HL#6XC K#" 5TK00U?B.(J!W&QV5Y@$UA 9Q9QH,4QCK$ + 1!&$$@
MQRM/(8QA-&('02! $&JQA17H(AC#D$(%3E$++&P!"HU \[T;T05H8&$8'C@&
M#V[ZW3>'@ 20RX&5;% -'%3"!C 00@R& H,84$,2SQ !.PP-C" @1FM"96[
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MA*,->EA& _1P#CM$0S.?: &%#N%0S@@!Q>XA(;C8I>Q!@( @E@ (@ 0%84F
M4DBOW98.FA #5@A%%(6$ 2]@T0(8M. #\%ND*_#&'1%<BA!)-NI*?8.V&0(#
M' ,68(&908$';,$[)$,%M!LZ!$,[8($N8 &\M0,ZZ +B;0$60$$4#$,R)$-O
M30,Y_KC= C" "(W !'!"V8S ;!')7P=-[3 $8Q *)W% 3@"-F0#9 S!.OR"
MJ.B )5@"C6R$A%06;)R/;,W6I@6)9@Q+ YR(7 R?$)G&(?2<.21#)'S""_B"
M)5S M53$*QQ"!@# TMD 2'S$ILV,1HB"4, -50#-U2""\@8#KS"*PB!3*1
M"D2)*'A'$=06++A ERB!%Y30#J T!9+D47 4 #.OA;($!#XNV" CR !@2#
M NA"!6B !FP!!_C!%OB!+HP9%#3>EHU9%/# J" ,* )HP",9# .'0"+^1
M"AA%)<S"$KP"-5@#-^2 &;!"H.4"*#B"#_Q" .C!-=##_C2$P\>U#Q#80HUH
M!K/\UQ)JVJ:!2;)X @!8 @#\ "=<0FE<@K! QH=AP#>PPSF\2"X,RR]P E[\
MR%Z(0@ZL#XT!@0Q('7!P@Q"800RL!4;%7PQT! [8 7LX!8_)CEH(00X<TPA0
MP@ 8 @\(0RH< R:@0BT-0"U(@2Y PS=$P0I4P"Z\@R?ZP38$@TER@ I4@!0\
MP1.,(N-U03*L0",L%W.1 [JY% ,4 . T#C, B\,10^( 7 PAM0PWFXP!$<
M0"\@ #$, 21 0@!(0P$ @"$, ;/4"%?2R#32VLIM1%MM!42TQB7H02"8@P"U
M.$K'J<% \R:)UBA#Z!"$JQ!'[A )/3^PBUX HK] H/<S#48Q@NTP O4F97
M@FV,"PN(@C7D@,,)@07PV#(L 0LH! LT@1!00RQ8@"_P@C6 PA+ 0"140BZ\
MD@GP@!%\3L%Y #1L&0^00T>^@RF8I 8(@ +L0DER@ 3XP=]M@11( 18\H"ZL
MP K\UBF< A:0@P>\X@*0 "7,(B7$01R(@@VX@@B$P@8T 2O8A 5TW090 )8
M A(XPC=<0B0T0_=DA5E9T[-08VSH@"*$)=W0C4[4A6G$PPV\@@.T "%< F:<
MYVF,0V:DSS< @![H 4&$"@8T@"?H0290 D@7$5 &T9\"@Y4E'Y<A:3H@"A,
M0A$XP"1\70O^?.8>7$XI$,,;O,$&$$(<5%L,A(!T:5L)I9(DC$-P01 */($?
M:( "",(N:, [H,,3!(,?2,$N!(-'HH,?K 6K$ 7Z (JFB(/$ !K!D*2$(J
M-><S0&=X'( U5 (L**4U3 H' H\%\D",0%',(Z1-C'59.$O,8-U 1D-W*
M*:$2QN>FT8@0408 +, $G&45: ,B!!0LW,(J7,"+<$(BQ 6L(8+0$0(JI((0
M2(."W4?\:)U\@(E\. . $$3V$!'-%P/@,<L$((2L ,'*4$<L$,<$,(&A (K
M$$@($, J%D LC4,N2,(L3)X'[%0%O(-L9J(N]&:0!IX?X&AO@F+^!7 D#;"
M%ACG*4 !.?@;"O!4",!9+AP9 J %#)B!4Z2,#>C)GMC 'I0"1BPJ,TP J+2I
M7=C'?M3 ',3K'*A">]KI5DR57:S&L%P"0?P &B# -R":21"@:J"&2 " L3!
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M N04$JBF0 \(P7N\(9]I1B(P@QY 0!%H0MKJ OHP#P0 =S" 1'(@(O9ZT;@
M:[-LC2*$0_+UK5V$0R9<WR4DWQPI"X\ "+X B-H0"/$09$\1-E A!M"5&6Z
M#050P"M8 R'^QD)T=! E)!5244 I>$$& (XS<-4SD$ (&$(@M,,6H$,4C$)Q
M06?<[8 %>B('O$/1FL)L*J\ !+'Q&NT*2 'B2<'=)4,C]"H4=& M!,(KCH)X
MQ9DD_&3CY$ 1Y)A04,-[C N > .-7 (HF '9#JR+3<+YW("\PL$<$,'<:FB5
M: 40^$BTK((=>X$YZ$$=,()D_( >R$)L&$$XJ,$-3!.M%80**' 52 (&V$"6
MZ$!*?-3M@=8+6$,H5,(XQ,"A6 -\;0 ,C%("&<&2A8 7C(.#CM S\$%TF<
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M^>H!&%"366F&D)P/&X0!'+"Q+-0SRVW^!$3H ,%F1;XV ,<"@!-TCR)< BP
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M@BB BATW03^S 0%<,,2K$4H&!DA].0W3#,K$X P[ "4#:>\6>"Q/H$&K '
M/&LMX!(6 *_Q/L #^'0Y;,,VX((I:(,**, 3Q/(N!&?0HD,CX.@N(!X"1AE+
M3<,H>)(D!$$"D4 GB$ *B, 8?,0-X$#^34K;V$)I(&@B4..LF6_\+,,9* $1
M4$02GH\MU"E<ZP0G6 QX $7<,$:I $: Q7 $<F(!>8Y\>Z, P]X(V4$!
MNQBJ"()A148*4.Y@OK<,9,D'B (O6$ AW64HA"LHT,$N/D.N$L/@",.(?P-P
M!<$J3B(R0$$RC.(NN'@FCF(@--YQ![/PXK@@_/@V[/8V"$(A:,#^+JQ X F"
M2MIF,&R!T2)W,M0"ET4!]=K2 @Q M$"+4B#-?2 &>1 _B7 MI@=4<+ 5HJ*
M:FA&%<:&5>3S,K"!#MC"-;;W;-$0)Z W')P!+)S!+BB!++BQ$H0#-V" (B0
MM$R&%NR"" # "\P-(E0$%K3"-^J!MU>$ XA"(E %#LC )'QIVY"!@$@##'2,
M+Q!*!JRL(>@4 _' -.=N%$!!+71!2KUZX E>CG) ,F?BX&G _1TL/]T.?QN
MKPL")OK!KB/O.X@BX&7@%E3 \R;IF#WU"I5\ 9P0+2A!:.( %YL-#B0 ;+E
M#WB#-=C"N8]YBP@1$<%6A8(3G+,W; #^$R>L@0D0 Q< 0!.9@"RH@1Y4#RV<
MV"7LO?E"XYB_-^)JPP.<PC,L TAX@MF\QW)(&[FR0"6 @A=0P ;8
[email protected]
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ME"**Z L';JH)I90/,KL \S*PD"4$L92*ZY)Q"(K+AQ>X'"2K%Z()K 7KN!"
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M$J0" ;>(0R@R0 A)*.X;WYA& 0C @UI 0O0:"$T&N&'D&C@30\HA.E"5XC8
MT<EAV<%%=@3U@)DT0@':4$$68%(.7)0C"Q)XA\ATH:B*',,0QSC^QC2FP25A
MC,(+7MC# :3A@O9MY04;H,,>I-&+./3@ T# P#4@E(@+&&T0EI#+"P+@/4<D
M@"]78<8#63"DTG#C*A](P0M,L(8U< $-:) %%_+ A0:<" #.B,<E%($!7V!F
M,AU(V]I< 81H 8(?O'+*EZ@ U'HX ,VB$THO*";7,0! 0Q P#C>,(X0C*(C
MWP@$#SQPBB@@9SA%V<(NML !#O2$)84PQ3:L@Y,?UFETV,'%-E!B"@$(P@^"
M,!WM"J'#<J@@&"'K@BZ2X83@?$-QY.#!,73' &$0(@X9X(4T7D&D:XRO"7&P
M@ 4H@ $("T<F8'+(KPG*[@D(AV.@,3^*U(YI+A]0!0I* )60"0*5S1 $7RP
MA!(B 0 3F( + #A#22T@F1^L2EJ8V8RUK@&$;>WJ@:OI"P-K58E<6",4O1#H
M+5(1AV<0@PY>$&$!"H"":7B !Z<@!PM;N((H)",9ST'=QE2@ IP( !==+0<U
MJUFZKPI"8BHHAC;3TQ(!R*Y/(FD'%M !C6% 8L>(,<.OG$,I^Q >!3H! 5L
M8 T;=$@4+/B 0-E!B0T(Z0*]T! GYCB(03AB$$5;Q/>2, 1/?*! ?[%$ )0
M!(KZI5=U. 7O-"&,4AA#5(XUA76H =73 8##<@%9C" @4OX#PB_X,84.('
M7A6!;J[0 2K^Q9)<-%9I%GO@C4!308)GA&(<M'BGI+ X#6%$X4PK(,H6 ,:!
M=[Q)$,ZDDP 44 @5X().VX'=><Z#B^H48F,:(R)]:6(*7.A) ^A802-6L 5T
M0$%1T/@2%H4AB6]$P02CB(,T*&"-''!#!B^ 1:WB0 F?AL43FEC'J4KY/1%[
M[[*+ &T +&&)(GW@LT@80FA-"9@ZP,$(:N!"--; !SBLH0&1,,$G#A$M10"
M!RU5Q*E^(5.W>8(;@.G+*B3(";H)"0C48(4%0F$!:J2" KT@Q#@HH:!G&($'
M)L"/,);J@4 ,@W*5PT(7_% 2E/CD)AN#R3:ZZDU<"$(;IBB$ &C^)XB<E,,G
M@7B'-K(@'IAT\QT<B$\QAK&%%9PB(U&XXC3RRH-1#& 4M+@4!5XAA/8ID*+6
M0 )0O$&'(2C$N$@"P:8P8UT7+:R=,Q> ASA""2@& F]'H2O4]"KOF1E#358
M!8H8@88UI&@-YL #)0 $R.I:"\U8S_IB#3:T!T$MR !3=T0#=%&!(&U%C&
M,H0@ AAT @&I(,0M)#&+&$0B%[1(\ FW6PMR9$1@ &8.!Q[0$PUD3@KT>(<*
MU(-P94I! 15XARX:@8Y"<* +4D 429"!C':LYQV"#H83GB"!8C1BF%$8QH*#
MF3MA.,$BWSC%#FBQ XB@!57P4&%/_#^@1Y08 0?[,$UUO(##!P@!:P,0/9V
M7806(T&RDY4L$BC+]$$$(.?+R[DF9F'2-2A[#4PPPQIP4 ,MS$A:EP" M!1Q
MB=URXAI)?AO<-)H5NCUB+(!I@2]LL 184 .-[%I7#$+AC'H;HM-*"8X':K&%
MRF4DXA+P"7BQ<))@* ;NN# >W:A"XU QTH$$87%(\%&?KD"2OH0A=6H@#U
M:" 0Y)# 'Z:JKTGAQS<+T 4)>"",4YS"$ -@0"J>U(+V<:A(J<P!!<81"AS(
MY2UDT<%G/Y" #!=UT43<=-_C81T]'K75=>**R[ A2MHX16A@ $ N "'L5]@
M["S8+1"B_0/^M1\9DWQQVQ3>YK-FR67*/6@?:F !!KBA!R!,&MB!!#( !HAA
M%BA!2W;'Y8* '(QC.%:@ K?@ D>B//PDABH "H*!*$ZA"[:( 4@0$Z:!%D9!
M J/ OYQ@!= A$$ZA=DCB":!A&C#A2_+#$(R 3 ! 9XA%9X!$W@ J0J@]J*
M 8"* <0(!WI%V%+@9C8@$F0 WBF"(# %H8@"2IK"VE-LKSG^G1-ZI! V/Y"
M">"G%HA!D5#+'%H$ *@ 'PA,H! #P[A ESJ#G_!;;;-R5(IN3J$*[ ">9#G
M "JA%RJA<&( !KR@%$*@ >7I&+QD(Q;G%)R@"QJA M!!)2XP9'3^CQ1VSP.P
M( H&P 1(D!)NX19(8 D80 ,(0A.P>6@X13DHQ;>)!A"@@ ,@0<9@ ^,H!&%
M*@:$B@0P811R@1(&@!CD@ &LZ-1HP1>41!0HRA.6QP:6X1EBQA-2)07( A)H
MS;(LJ^FT3[(HZ]>\9PB@T90\8=FT8 TN0 _ @ VE0 AB@0\\ =I^@!/TH %4
MRD(N 8':+J9,J0]?( 5:@%MJA9!LP 4(8@^\80.\@:<( 1.,8 !2B =XH(2\
M)!"Z("-JH1U<L!@XKQ&PH'+F XM0H LA00H@1 :\10W*!46(!"$P>6V !K,
M)!A4 !ETX05-0!),4:"$AQ)B*0-* 0'^9.X6?- +0H 80B 7.>@ BD"".D0&
MJF$=)J$7O,$+JL$2>(8M$J%[K.\;K0_[?BWJRM+[A(089.$* -P@$ B"$N
MN^@%\. <3.#L%"$M[/ '\C(O.0$T0J0O:&5YEF>5."%J6HE<;$4(SB$&-D $
MK&$9I($!EG(4":"$=H"N"$ 8R($C/& CMJ!Q' 42"\ $=D 2:$$.-H@$*$ :
M0H$.(N$-<B$#5!()?<,$I* 6H($DA@$%%J!EL,092F$/]B 40"$&*J$42B$#
M0B .&)$U-<@':6$E R2"Q$<(6L &>F!4K %5+B$1>($LDF <':'$MO +OV?[
MO$<,1<N4X-+^:H@A1<R!#TS@5V3A!HCA"_0@+7Z <Z.+R<#"*2LIF+L!7[!
MIFK%%60 !ZK!!E+ !6P !ER@$J;"!6" %U(!$RA%#JSH&X9!.*"@%D;*40I@
M&H:A'? #3"P"$U!!99[!"RP@$NA@1HFS$Q2"#K"$!XT@,X<#"TA"%[[!",*L
M%_:@%WB!#LB %9!3!$0@%"A 2O8@$@0G S8 +$Z-$*RA&@)C*UYA'6R #BJA
M"4[E+"JA+(:@Z<*R"\$1$J0N^Y @ 82M5QC!$@!@ +Q "^ #[B "7Y%#>9A
M#6)!#Q3AR.P1D[Y3+! HN.BF+13(+W @@@ C$'$ 0JT!!G*@$M3^30A&0!BI
M2!A,( *7:AB&81IVP 0,814- 8M080>LZ!1XH!<9( YLE!5Z80..U +.J#A#
M 4J>@18P(1!$KP*2J?2$X1;"C R0$Q0.H =Z("&% !:L@2$/@!< *A*F@AH,
ML(.L(9#\0@920$)[X(L"0$-\Q@82 @" *',,QW04QR=[NDD*P#.<6Y>0!:(
MP0Y$*L>*A0],A ]6@0LPP QVZP>PX.RH9RP4(;BVY5K81S '<WD"Z4.JH0<F
MC!N09PG(P!J$( 92@2F8@DN^ 0I"-@IRCP1(T-X&8 ?X@ 2(@1(P@0%VM13H
M( 9F=A:DH4A!H1*J) 9HU@N +P2Z:3K^^D0#VF$!X@ 4)&P"EL %F%4[<^ :
MD(<5EB 6>($7R !Y<J '1( :<F,#S)6B.(%(>F )FHL7;$!'3D4'?N$#:FTL
M+^L+S=(LLR^T>H5NVF >ZH *\-0$M$!^F"#'YB"V2D%0%8$=+$,S4&5;?L$@
M*TP''K8/6R 3LM-B6XD;S &8, :7( 7C)',MD@8+A*O.I,').$9# '-4H$2
M0D 5^6 FA,HI6L<XH $V&$$8J X]^!VV\6ZL$ \QHG0@@$=CN$9*H$:7$ (
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MP5NS@J+^KP5ZP!<H: 1V:0&$82E\B9W8:5):,A4BY12"0 Y"( 2.X @H&HW
MI=Q@@ 6P6#DS0#?880<:@4UX:*Q(8AH08!F:M0=X@16H @=@ !2H]4D-D!KP
M+A)&X(LL0'G)P/QRKE=>H0#WP )>P1<PH!/2H@,Z PX(1&&8!R-1DVQ+QP=
M83V1H BV@FX8@PMV(0VH@ _^6 L2"0[4P;@: 96X0H! IF)!'T( "&X!H"
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MC" Y! ;@H*FK@N$=GN /&$ :X*$:)D )"($.-F 9(" 7L$6*KH'/ $66J 2
MZ, :< 68@'^>83@ *#R PYD5,2[%,P1"#SA$BRA VX$"+11",HS++GP"R'A
MO^-YZEZ!C+1&"R*!#V3!!&HA10P##?0@@@^!!,9"#UCA$3H +0A$H@A&_1@
MRC#$<?V0+ZKA!G2 &SY@03$9%OYO4F&@!R*!$A@ )5/;5#]U (P5%8W@196
M#)QW WK@ ,JW%&P!!R;@"&C8_$"!%;Q@%$X!JOY$O'KBF9:()/S QB !$"!
M#"R #T* %7C!28=@!*[E!:RA!RH!5,RH66%@- )PPKJE!^B %_: '2JA"!(A
M'EA@'8"D+$(I ;30&]^W:/X;CK</'*GN!:*M11"A")9@%[B &$S^@!+B$ED
MP!STH ?<:+?:X!)B048 !< $2\%[-'9" Q.0%V&P@8J*(X@1<P=A9XD18&
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M @$#12^M3"'.WD%S1@)VEN@=_ :CH$2#*&'@Z!,UJP=H, 02&"6I&$$ *3)
MFB !J/G_<B 'D,?"G)<X]X!#4,6-<NT2F($9,$#JQO+Z!B$)_GL(?.WILJ=
MHJUO&8$8E,'BN*!OJ6 PVO)8QF"A], (!!0 MJ$+]&"FV%N!''=M:.609 #G
M%,@!&*@)O'<,8J$4G &FD>H6FF( Z#,*@'4%DJ$ O" 28F#H!V!'A2$0!(9C
M@D$7XLP/VN%+7+ =G"D]:"C.'*].$$8*5J!8D<KKBT(D,B<8;$D:8H 0E@!J
M)N'[82$%,GC^"3@X!8B$&W+ C: EQAG:U'Z"S!!WP&[RDK3<GR[\_T"[D/
MQ@I_[!!!#P#"!#$M)@BN60, #1< L0Y=2 3 2"(@'P >,5)E"L9KE[H\ AD
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M) B/0(&@)1L&;0 ?0P0(Z$+VY(0?*%NP8&F'#A3#>+# "8$Y8<IA9AE2CF%
M:*#!$QH$(T@YV@3SQ!-0W#4*>K6L@,X*T$ #'U8F&"$) [<P($TITHR1 XI
MX,#-*]?0^((-+EA0"@7<7./)-3H <8$#/CB" 1"<7 ":9TV.EHXC ?3 2R76
M3- :$HX@\0ILLO41!!;:/!$(%5J@,04 YG0@W"06<0,$$ @,D1C#'"1!@!
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M0).%BS96*]#^8*VXOK,+!Q)HH( @@2S110\2'*,><F@\T07M6!1"P_?2(("
M"@P8@70&)%AP[34I<.."#3*TP T,U? "B@U[I/!#-+[HH4,B/F#&#"?K=M9D
M.E!N$$HHD402@\R0M#9( $4$#(!(8+@"!C,_5 :$*ZNL4H<Y&P/Q0V0_3!3G
M"WH<$\POZW#"P@6!?N1G=H%> !L,":1\PQC6;+"!-+2D4H D?-A,CE)^1*6!
M'UB00\ .47Q3P#$\1-$.%BM\@\6Q[VA@RC966[W--N4X6,Y78W<EB :IX GM
M.)\A+"6,'30B1.U(AJ9XL(-H+4 GSR !(7B!@P1\ 8VX,81L)/^@AXTHTHV
M 4W$I$<5@#@ K?P028XD2Y(R(MTFEM$*&+0N7.$8@066$V6+(&Z%W!B(B\P
M!QCF\8)+<,(5BO!% UZGB#@=!P",. 0&N*$';3P -[H11* >!V2O<!X+T'>
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M\&;VMK=T"+9(G.ZKB$1T<YMG3<048K Q ,QA#'@(0QK* =$8" 5 &@$ &YA
M! ,\ 0=IC&6A"@4R&3#*.CB0P3T38!A6$")I1BB J8W"%#^$Q6<<\!F*-;#0
MT<+XHOLKA JZL@6@^<%G8Q&$ .QGBEUL8043)$$(),$#_U!%%UU(!GM.,2(L
M$"($W\#$!$/PC%L>@)6)A4$H*+!,&[AB2$ (ASK",9%K)" 1U_",#-E\3"D%
M( &64$UKP(H$Y0'@$(>X711_$(_[X@[^$8S P!AD$08BS,$-86@X'M*@!S!<
MXAT;& *>-"&0>%@$DT@E,1>P U7"&X2U8CGE7-0B5 PX!EK,8$AA!&%*!AY
M"[L>"]CV^(YW+-2BL[Z?_;;1E;/X00,C-:0"%."@T%8 +E$(,@GH\X=D ,@/
MND ')J-P"K<@(Q#"J 4<D*"7EA#6S:P06$VD(IF6$ 4MHA3N2N!@4/(@1L3
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ML 2_4 DV\A+48 TM0$L. 0<(0-C\ (W\#$J(PHS\@J5, N$4'Y&P -IDSX\
M(%/Q\SU/$!4<@&,0TDBR1EJ*M T*X%!284A2<'SSHP%6PU#^ 10HD JC0 Y0
M "#M4"I4MP)_ 4;LB&G\ =_, W34 "I8 UCEUAE!V4C\!+RIP/^ ( "GB $
M0( (RL )\0" >'=,FI,E@Y!WQX0$EB ;Z?(#DR *;7 -EZ (D=$!9 < !Y
M8>!X#/> 80 ':< '\Z *Z[ *Z_ *@K('HG #J0<>W*%Z-] $.. "I@@+$Q '
M7C LE" )!V0"$(1UR= %T$ 5WP,5AL05"^*#I&4_D20%.?8$NQ(,?E !O0<V
M%J("6* +4 41<$ 4; "1]8(<^$'[7 *#C0,*# -W^ !F70*PD "(B "/6 -
M'+0$U% *K"!$*+0*:S@ >F +.B <&EC :B\!FG^$(>0=O/C0(CO"'0Z(#
M>D !W90<=X8!<, %#]AX#[AP#&=HAC?^ >L0#Q&F$19 #3 ]Q0'=5Q Z/(
M+;14!#IR!)&P#$KPBD8P"N7! ,< 7%@'%WZ #E1W8T/W%87 &S F"/H32<&
M#M" #&RS"\$8-&SS!$=G(0H0-(VPC05 7(2T!4]0C-N'#%)H?<,0")Q27 MP
M#)AP"]:P!#D@!&-W "6$ T."0G$2#G;@)ZH0@370).75=Z6Q?YH#@+)Q :L
M!(J@!U= )-MT 0^1"(>P!@\9!I!7!O7HB&FP VP0#JYP"X< 9)!BW@"[Y@
M>B^ ZZ $IT&"TT0FM3 3Y5@ 1:P![EP0(;@<FRQ \+PC2/R/=^S!:W& 8(@
M2-K@?!A542;^!2$< R_DGU65P&U( 52H L0@@L"D&/=]XPJTC2Z,)O?8W5.
M\ =8<3[?< PV0PLJL@Z)M01D4 G[= 0V@(#I,H]ZP 1Z 3,$)=S"6\!J8=]
M-QJ.L!H"@P@A P F "ODRY[\HX ()%NP(B)"7EN0($F, #BH U)< *!0 RN
M9P.DR)DDP9G58 /54 UG20U+ LY ,;0 >$<'&A8@@#X)4H0 KL +M S2Y
MY@<2H@ J0#^@=5&@I0 /H "[UPY/, Q=(%/.MB%,49OOH *DX XL&@AG0PGC
MX 70@ Z[X@?'&31']A[30#YFHSZ8D JWX TYD (B0 VFN0<DL [^+W -YK(G
M+X !('@#<P"!1)"/QN0OFM./^_<O@R P?! [%^ )K. )VQ0/MO!7E] !4O"
MCT>@D7>@84 0:* '4; QB9 8&_<"RZ 1+_ \37 #U. "8V 8+)!^= +9$ -
MQ% 316%JF' ,)D I] .4,!]R$EB1D@A/?D -HH+IN!9@J!J?P!M*X ".F,(
MHS![E( 3;@$%2T8.!\0#M, .A+ $H) ,
[email protected]> TRQ)B0"$,<E E$ "
MMU )2V #6R8-;[ SV &]*6&$Z,*8E &<#I&=LB'I).G]^8:>BH;2< ,HB #
MB7 !W+ [/Z (?I((;$ %D1@&8D"@<Q#^D6&P!GK @>@#+YP#>M@#C!P Z(P
M"2*7 I, !CKP>DOP4S @<AS)"TNP!#&0"PJJH+G%JD#A'[5@+/]!E5&ABT W
M6J: "PK06E* !3KC 5&P ,^*;9%@&'I# @M0K*TB"3UQ0\LP/<-PC6BQ:WZ
M#,7@!%!P"@20'J%2 +>0"H3P#$L@!(VU!!O #<] 69P""\P$2@TCPU !!!8
M!@UP ?(2G_/)&@ 8)
[email protected]*3! T0#=[5 +1PGGT2@N\0B340>8YHH&Y@>).P
M"D/ 5QAP#390!"Z@,M7@ M4 &PZ0 C9@#:S LEOF"^,) ](0 N6!"3P0!":
M'L+P#8'@E%3^:"S 0)-2\0Z>!5JBI0!CXP?)$!3?T#33<#04L <Q4G8Q, [/
M(+T(P ZID H44 FL4 U+L >!X 2-0 H5D&/'"0TK, S3X '3H**8, ,0 *I
M0 *LT ,Y,(8P\$\, I* @2V<#% $'$ T'!PP >V8 NB09_WNJ]ZV!H"PP27
M,"2> !8L"<X\ M#L+]I<@60&(FR<*!IL 8"< O' #:$ (!$ .::F&M9'J3
MT*DC$ D6, (;8 /0Y:%[H 2R%[4M.0J8$!259;,R=0HLBH-1(04+9:2FP%%@
MT3[A* R8H L8<@K$D O.0 <]X(%EYU/6I64\Q0TI( HXP HV( G^L,I]'+ "
M$E ,(I))08 3"P"6%>0%LS +3;"RUM +>X =E "L; [*.0GS" '&0 W(!N
M!)P$H)$.?9O HS$$@S $ @, 4_!7,*0'1N *1,(-9/ GJW ! MIPBIH&'(R@
M%*@%", *!+ 7B $V%$H,:(#G6D+9B $U6 !TFH!IZA8,4 'UL, 0<$#-=,6
M-"4B[? V\0,@3R !0&L*#[!0$Q(,7$L -3,*WR 5"O ."X )$ !/!0#Y@H+
M@%-V9?>9K,0-W( @5 ,%1",P" %S48BZ4L.Q64$1F"]"- )S L#UN "+L *
M;CL.KS,19B4G>D#(?S(11? 9I*.'B5S^GZ11&F %R>-@/.FB"),0#4,B"H=@
M318@H(K9>(V7F&F0!E*@!>L@"P4@!"V0"), &ZWL$657871 #5NU!QT:"]00
M \L@>TTK#(80*D%0'Z?@ <,P#%EQ"K40G"I6DPH5#)'T4E#P+,\@#%V -5+1
M#DKP#.+* *G "AV71JX@"A^ 8"E((S3B!3S0"(W@!"VJ"U@P(N<S#<>P ',=
M I20"J7P;<L Z"0 SU0"1TF!^S9O__)#2P !@F 9&1" %03'[+=_ZR&NE0
M&O\"R4E !O3U \31 'D6#Q>0+FM(!34PN1)I:&G !6@ =P#=R0,JS4 B\1
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M$ A';;-O Q=1V@Y4V@Z!\ W*&P+'P $*T'R[0H5=P WA0G/8#W^A'!IO_ 2
MYST),9("+@ *J: 4+5H+77!'6?>%AN"T.Y'?A+ 'H; !R\ -UD ";T +=D )
M@JW8?APGE\ "/R Q0] 9_)B/,B3A;D;AD&P)9J );E<Q?1E%<[N&=1!Y#GN@
MD)<&#V<*F1#&+T%I(;@H,# )+M $A@(#>\ *>V -L-"AU$ -%* $91L'-T$L
MG (_@5 +RVH^@3"%-@L,(P(%S7(,<B 'U:T!0QD,C1#$H;(#E, [HL [DL"
ME; .U3 &*8 1*3 !G.FA[& (@= %UA<%RG*[Y/#+"V $"[ BJ;"*LY!*(V -
MUG8+ IX!7Z#20& NW\4-*NT*R,$).G#^#:513)8@9Z:Q7KT@X0<0 )!, 0X1
M#9<<#_&0+NXZ#WN" 0):>8KZT2*]!KO #I7 !C(P"?14!!? K90"2FC>K P
M"QLP ASI HRU(S=4"B\;@Z-P#$"!=;6P9%ZK,[;8#G^ !5)0"Q[P#7;S#)*
M!6=Q2:>P21YP4PM "(0@KJF0(L\0"G' "Z^P(V.0"WQ#LJP0!T:P \&.!5Z;
MOM.P2=NYP^Y+[QLV"Z6P!^RP<N-@!Y%0!_YK5A>C+MJ4+N;P Q=0&@__Z+W@
M^!#?"Y7@#0=0V:8<)!CP X^P"@+'.R\0 W+@B(SXZ2(MTKOP#+; #87B )-0
M823!#3A0";+^+0.P$ JS$ H6P L(@ !DL 2Y'0/.\(I1GCZO&@1%_VQ"?=1K
M4RJ:,@K8=@P H@&Z VG$ )RKB(%@ "T0 BYP/TA0 B8,"V18 1T< ]D0',
M, &@ -Q\(H[ !?)?1,XD4#S3 EQ0 ((L <]$@=X3@L[_@PQ !!"S%F[E A(
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M"*HS # N6#FER)%)PT"@*/%9LV;.--P.=?#IRB@3%_(^/!B#ZM).-J_B(.
M$&M:D6)%LE;) J54&"# !$,&&#"*0 *99@>P3B&G'2RP&&:':4P+80<H_-CA
M&![DP.09!%+!1))<:!F'DL'L8R $3"B1ZAD&;D'!FU"\B(&.60A9C;0%C@'-
MA&.$*6"T$$AX)@ZHZ' JCAR>D6.!-\;^L2,/)EHH" @@?M!MH0MLP1(#2S(J
MSCB-*/+F@%?6:0Z )'I9X! L%:&E@42TU V(53H @*;P;M)I#3!T<(6I%EK0
M00:?7K FAQQP&&.>%R+QHCY";B$DE#?(B"4&/IXQP@@AA1$F"+:@@")! J*(
MXM15 _F&DA!,2&:!81@XYAM:+*/E%DP0N"45!)Z)DHX2;[D% 1*(&<4(3 9(
MI5($*( J#G88H(590XQ=H !N/S71"PJ&L."^9V9YAA@YA%V CO.R03+1!HZ
MJ*&%/DCDFN-Z@<3,C$*IY)PS7WGEFFO6A,2'<THX:14E]/A!$2 4^0'+2USX
M[N(R<DI#EB7^<$A!ODE<.13129IH 0=N7%%J* M*R>7E&'HY8 D;E(B#$CY^
MY$&80*) 80=2@R" G&^^&<:#:9K-19(@>* E, 9(0 "34D(@A!!)A%7R5Q)*
MD81$+Z2Q]18C*?EZ%E!2 7:/4D(A<3%,;HD:UM)R82?L/2A *IJ0AEGG SL
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M;K! *:)H#@*2((<U> EUE4A$/*9S$D]@ U<1V?<*($](@"#*+0 5,$M9X7
MN.)V+VC")( 'E%@XA1"]H$8EJ$&&63BC1)@@A&BD)XQ30($'! A"TX1! ,[L
MP CXX\$S2O0,M94B ^.8109HH9C]Y2($H[A4'&B1%)QI7%)Y^__/.7!8!!$1
M$1$-$!5W-"VR#1 -EPS-#,L,E\K*&C+KIL;I/H=%<2LU*[(-S<K*"MO&F;%N
M0#.LIK&RHJ9IT)RR6:VIQF;Z.7_^SWC WB]ON=<G^NZWN^O!ZU)!;8PW5*6
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MC/N/A4T<3*15PTH@DP#&FN CARO 8-U:#K5V/94AW'G964U0Z#EZ=!/+:8,
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ME"XA"2X3MY5.89+-]UYS%]-KVU8R81IG55:'?K88R$#0;04Q?SW#?#:)"Y@
M_9S7O"R(GWGO#,>7\;<+-S^DL059AF',6@%$5NM/;5C"F #?"V(#3;RBMP96
M\<F")OB: ;[1;*+T^BQPF[U=#ZS[CKP],Z\TY"2#JBUSX0)=\+9*,-XYB^M$
MO#4P271'Y]D?VYV1AZ!RH>X_7_/9/=7R%EQ6<8VA [.V!/[[(*ZR#"M0+ N:
M!+P$TP!=C*Y74V\^19G-[.!1_@KFTY+PD+ =;5@>-E8.>TS KRX">[7HATQT
M=6]UI@/%F/0UKY_.,*==\&W?U0_0S4@2@;K76'WK>%]HW26 XF'\AX!U ',F
MP3F$B#,-:++S2^-!4X#KQSUG'_SWA\C5_-8TQ)"Z2GM]9@YC*C)@$DYR#?;,
M/77S'%:))*UY[Y5DZ3\[W,Q4:#V-: $!7GP.2RB&SYGA9891,5*]XA_,A:9D
MKZF'V8AO, =+3$&H2J3ZOD!:YB8Q!%@.)U954Z (\E:!G[FQ,'EH\-Q>NL4P
M7X..A/=E]&+9FK6_1QL??(/-LN@+AW64:1%6],9SYN!]48;]DT_JG*EY^^18
M]XEMZ?6)/U2SMG+POXMU!9:SQ(T=R%:#%_.TMRA3Z,)E6W!LI3;'J6L)OX[+
M&)G2P6QG?_J$/MV$R%\:,N["20X9-P7Y:W@!2<3W,NT+%*-B9G6'O^$4]]M<
M4W6NV5#"A'TT_L3$_:UW@;_J,<&,ZD+'Q7MUH#=5VS\ N>>[1O%$:@>H]BZ
MM;\7QL\DQH377OSZ^\]V;?A\K0=;$^LV%OA&="L.6"$_$H\!YO=6<YU[]SPP
M)3;!6Y7P?*K'6YH_I^M1B!(.< )6.W)[([3!J)?$G4J;&Z9$X%T+3C$0@R<"
M3BLGHC4FPS35RLH7^#65?1G<4&+&AEGU @(*FMV[N$/7Q*#O5F_.B_TBY8%U
M1A";;EC[BX&IBDX2C&8\Z?_O73<M?-VL7I*MXF4,TTZ/_YPTNF&SP7BHZN7@
MQY;GPEK=YUE1C1V"EN_71@ K':AL$CN?H[-C@& 'O$Q8L][!%"DP0A46T
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M'DT3!DBE7>G"X)J8@0!0//%10 "E37W@VL\","%Z[!H%&OY8FSUE)DW'!AH
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M_%;&S//>/F]@T2XT>2Y!4LAOTK&IB!_;50-C-360LH EG*9C[KTA.YF[?=7
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M*]@!B0.0!N+DG0%I]
[email protected]"9WVRA[3N%U0A KJ-9+377$0$5H/ZG15;
M18G[U3ZK;$:,R_[7&C!&'AC3F>;U+) <!7:?&5GR;DGZ&Z^>66" &ONM>@ &
M4B]G:HL.?\N?A':TRS5K_@#EBZZ\^]GSM_Q5(W?P#F#V.[O[(8_(?"U28\<\
M;(O8D$^7I.)KA*;?>]0I#:CI#R^U"F32P%* 93P5E1 "S W)33VQ]);V-X^*
M! 1DLLN)N4OX2B5O *$_4\@":D X@FD@0KFW!T#B51O"M6;^(T4_^!8,7LX
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MY_C>B/CW2=;=F!RZ&$Q^(0VKA,A 6\J9I7U9B766'YZ\8/\8P*"P=]$."\!
M_NUSAPCDB5/,<UB#V&A])U+HUW7LG"RC4 O+=;$CBW!EDAER:TWTZJ"HU<16
MA-WJ$?@5?J8J.TL%!/4F^G6_WSZXON]J)-L%"EO^6G4!^I %,4TH=>3HFE5:
MJOQ7Q[2>3!W?]M^&='SKHWA3/R1/IA@A[W/ZMWU>GTH_2)
[email protected]>^GO6(
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M%:\)%V:O.L6CP ;=I!(8B?L::OMLI !QS];@<9]&0?-/*RCQ)ENT,ZTLS+\
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MX(B(L<#JM[\=O]DE&41\(E!6JYG(;V!155Z[
[email protected]+1/F42T7[^ Q:"><MO
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M_P@W*1H<-FM@_4CLF5T<G3??=/CA; W!FOO[LIE%DWZF"<0K7%[]Z 8?6TX
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M65_17@]VT)A>'5#)<Z.S>ZI9APZ+4\5V#4HYR^Z8"T4_*3+BZ65OG0QO'CP
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M_W_V1F&\0K2K"LR %7&TR:K#/7>,)KQ*3;/'MSS5&#(
[email protected]@D#;86?3
M>P#K4VUIW\NN<^K]!$,]$0G,9R#Q#3J0"P/H!#$Q>NQXV/N#@9'RG,OIA%*!
M=.H!'*^@AA;-9MH!Y<>TKX5;IC6F>C5R2]JR!CC H*E4N:CPU YGOSK*,F??
M%P.7DT_<0U4JT2C6L+Y^YT,:"Q[LTM#,)H]-%F]^$R!SL<9QXGW1$68X=NWC
MBJ9LOZ2*W4'^&62\J5RQ4@RC;G'JH(3/@& 9OB89CB+-'"%#SZT":HP6).@T
MAD8J_Z+.CFOG6.3M$K4A?XN**DQN\9K>.K5E/4]TS_R]B173GA#/.[&,5A J
M%WTYYQG( I%TA5O'G26;(0T>CQE!O;AW;^RS$(TG62$+M/G(N,8<D4ZZTL5N
MZXT%P4:S;/'1+?V]1!EGQ:[6Q! Q^,3YPK?JMP@Y)ZXV+ZNY,<(\4L]6 #_,
MS:,XO1UGK*0'\:BVY?C-&(5IM;PW=['=(%B!K"F>#2+??\U^%5?@5: XD\3]
M-/;.JS'IQY2?8A><!SGRD=*Y018)5A!+&.Y<5L"C J X^(^K?BXS"K<6?J&G
[email protected]@$(OQ4+N,O7HV& Q4;4*DE P?B"[I[R;^8D6NL?[\0YK7Y1 :B
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[email protected]_<NQ@D?A(/W8>B][APRJYDS?)OK/I81GWS\C,#-'3&$>%T1IC
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MW?\#4$L#!!0 @ ( $6D6A^UI?\+ 1H" ,H; @ ) 2T5(3T4N1TE&Y)O7
M7]/+]_4_Z4EH20A()X30*0%""8@&"! Z7:J&)B"@ 5%04=. 4)2$3A$#(E(U
MV.VA"@@:$!7K"8B*'93C%ST>SN/O[WCF8E_-W+W7S'ZMM<?'U]O9*7$%5 KZ
M'P!45%04%!1P.)PC1XZ<.G5JQXX=S<W-)T^>W+=OW[ESY^;GY[E<+IE,+BHJ
MRLG)N7___JU;M^[<N=/7UY>6EI:>GAX:&IJ1D6%A86%I:9F9F?GJU2L"@9"8
MF,ABL2Y=NA09&9F7EW?ERA5S<_/@X&!34]/HZ.BW;]]^_/CQY<N7?_WUU^CH
MZ-V[=Q\\>)":FGKOWKW5U54FD[FTM&1D9$0BD6)B8GQ]?6-C8[=MVR:12-S=
MW0\<.&!B8G+UZE4VFUU86/CWWW]?O'CQ\.'#X^/C#Q\^'!H:4E141*%0[]^_
MA\/AGSY]DDJE#0T-_?W]E9650J$P*BJJMK:VJZO+V=E9)I/U]O:*Q6*!0'#M
MVK72TM*FIB8\'E]24F)K:VMG9_?Z]>N:FIKGSY\_??HT/S\_*2EI965E>'C8
MU=4U*RMK\^;--!KM].G3=#H],#"PI:7%Q\?'R<EI:FIJ9&0D)24E/C[^]NW;
M<7%Q<W-S!@8&1")Q>GJ:S^>'A(1$1$1D9V<'! 1X>7G=O'GSRY<O%RY<4%96
M3DA(Z.GI45)2PF*Q;FYN:VMK+UZ\T-+2TM#0H% H5E96ZNKJ<KE<3T^/P6 X
M.#@\>?*$2J5:6UMOW[Y]>7G9QL9&34VMOK[^W;MW9F9FNKJZVMK:4"@4! +A
M<#AC8^.O7[]V='2@T6A'1T<P&.SO[X_!8#0U-9%()/#_Z[+\O_)_6@"0&\##
MWS'?WSW0I@LV(B3 XE0+)VN)'4U,$1!AX6 9\_6[2AV$6XOS^YRW >54BGG>
M6C@OL,CM*.G1_(6[E2HZ:()1J#C%EZT7VJ"S,N!=K(BUTW$X/U=TK\,7N9?0
M,S(J,J00"M=9A#.&VAKX0@H).CP9M:5ZL]>WB\NBKBM[]'7?S*;.#MDK(R/7
M><AI$OPXW?D\OZ;?V*I=?5#M[W19G)67HJ9Y;I? -%QDV*O%?SI@&ECVE[+6
M=$R$R-V+;')_-:VJPLO>\C"+N'2W?)/O[N#NV?8QW<!,O=\:&X9P=<^3FP[,
MAA:55:MD?8U("C=$:#E:U9ER^-W_B+Z6K6^P;#\PQA0O5RKS?BQ%X7&D$YMR
MW"D3,[H^A__=S?JHZ9 6/OYRP!N?,P+BJ[832NZ&OUEH4S^Z)R.IR:!'\*U4
M4<#@CL-;F=& ^F93(=388YT P?6)TQM-6SA@O[*&[.)&,\IM9)EY+$/0D/;Q
M):<D--.*V&$L=IO5V]5)R"@SW47E<DQP6N"_RIJ<'1FUDR\'ZQ3K-H_"XGJS
MY(+,7I* 7]YU-1UMVMGB^SK#<NRG?N$><#KCZ*D9AF%9VG4!W*-*,CBFEX4?
M@>MG$=80VLD$S"Q.^(,<$G 40Q0!8+;TD8Y^(;M+G)4W6:)/#<C%$(^,@P!5
M:]I0N-H& ,CY@!$AS$/!L9"-W,2-<3".0$;:E88[3!F4P'(E!J7Z65.<)YKZ
M*-LB3"2&R$L43$Q$D[P-AN &ZC5T3ZW@1]M:0Y4OUWY.KK"M,RP_N+^XT<#W
M<7D,-O6(L4':F>GEOVX>Q]= (.D$@ ].@=H1269Y"%\]E>A$=V ;T^.%BB^]
MBGGP*%L.5<?WG58/.WYSL$3%C^'
[email protected])RBC-%Z^G1-W!#-W8V\PKL
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M8*A@"'204&S[@@T. 0 $QL ]^7QY:[H#Q4-? -E4V[?5L:(VD$VTM2*Y=WC
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M%'MYT W"=C5M\9+ QPA@Q^7[JXP!!\%@$W?(9NEB)U2!$Q:Y2^#>PC)1EQX
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M TM!F<6)0!9H()>&U)6! S"\\ XXRFYC RC26#*!J:Z! !@POQ9L -BX'!G
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MD44.."%#.42&OTE4RV2"W)NA+62HLPRT&D/-AV[Z#OY:'0*QDFY^6 9J$GL
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MVKN$Q13* ]R^TI$WZP46%-FJLH: 8?3L.\>DAEGA\E/Z:"?SU(/&TGW%C L
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MP9W<RB9_(O"I!.A6"9E?P"L1\
[email protected]@I+JJ58UK&J+Y /'*:*\=?*ZMM)
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[email protected]$[]W-0!&7P&!]V>>^?ONAUQ/)^-/[,^&@/CKV);&373,V#]
MR,#?,]QA(QV'XK[[MHJ?;B;_%=$_*%S]2!$2,8KZT]-:;4;H+Y5?O]R"I#TE
MWDT^HB/$*;\\.ZC[0F',YL:65V#ABB+-H+(E/^ Y^.5@/LIJSI21[-JJ;$4
MA W,^WCR5A-$A['=7[372 JN[M7T+G<NV*=7A D5*Z"Y^#5K>2WRTIG]B[T"
MGJ:''-#?G5>T3^&Z4.T2NVS-]'3)+7WK^5,/OF]6+.H[E[;0 U-/M"=@FW>
MFL6W!\ ,#-><P$15VH[/]NM#Q_9U[PN[X32Z;#3(,+@1<N+,SEDH9H%B?<\K
M6J&S#<3]W.NV_%5XF[XA>_CPK;5(M5'B\769OHIZGU&Y/M<W*=%6FQ$UW*[]
M0_B.[3*'9:[76W3V:M6@4?JC%KZ*%VLZ<0]& H9&0\@;V\3V^+N4T-<6!BM5
M'.OA9)75G#[A%>+='//*);*9Z[7&A$?]TP2.<!#0\20XU 6>+81?=0(YW0&U
MOL1*OACF1G-5@=#JD)4[3ISU0DC+$[F/ P@9Q0AH T=B(DTC^O%$RW0,GD[R
M@JO;1BY5ZCL6OHV8@*!4&^DI25<%Q#1EOYK"^3YW2O>]C@;RC>C<)<$]$B7=
M/++JY_D_[ZX \V^WM&2LY5BA>?I2N*&/D351)_#2>T9QH+5 MI2^02WU-^QU
MS)P4Y)E4*6JV.LJO/32SBO=)R.J\A=X&U[O4JNXVV_%>5+$57$ 7$M@/B,'Y
M7Q:?_I/^R#!4A-#%&7WX2@PLIRMII:SN39LH=(BD4!CXDWJ1/<B&)=]J$ZQ:
M!:Z)EY>AM-7A\0I^H7NU7=-./;]ISM[F04/U1J%X=0&B[7@=NT_T0> >C,V8
MF93==[)MUSFZ2](=8A@8@!4YJL22/.^E^KBZE3;5\,I/N99_+<A= _%57"I6
M:_</W#(J.W3"V0Y%K,T+?;RS+N-MHQDDTEE&.'R@O6Y'$VOLJ0%/(XGAI185
M'>K%2^\L-;-J:I\L:<>O+F2T]RVV"3:L_"Y.'CQDV]Z8VJX19F"AC(K@I[6B
M\"(SS*6NQ>2C"=X&IE91/S'F,5M2VLWPN52,>1\] H,#IW:G_FD;J]YZ]C4P
MVLV*?QOX'M!?EO%4G25"#T5.BQA0#EJ7@6"YK!6._M&;(["@! HN/$I1VM%R
MRG8AI;3C.(4K(#%R" BE@(%5G^"4Q,C(J#_>0/%IV[\IOM&.MNPGQ:*;L'HD
M\87+HU,13XUXK-0%SEW%CZO[#/6.1S#=,5$L3&I2:P&N]&)C3*=?F@'\@&9:
M3IVSC%;7/9]=7IQ7Y0GS#?P&-W!ABY\7'"']*O$O.'%IW/R%7UT]DAS9_M ?
MFG2)L*$ED+BWYNV97X/SCOX>\%:&OI//1LZ>=<IB)40L"E+R\T3#),<,';O(
M>]FUGLIV+-%CTA:VI&2/AWJBP+3V!?94.K&PMNZ2^Q'X6<_.Z,M/B(\WWB0*
MMT=E+$R9.^X?3_/4XO:7)_@A]6<[4;<^/VKB.Y/<VV@U1KAMW# 2/6C+@9@=
M35W(IN.* YK&YNK/$OZ^LLF%#_T+8=41XG'TZ^>WU0E-N*^A^!80&' VM84Q
M4N;=80#H3^[49>D^V97;5URA^HX9 WX8F%0J&]<O+&3/(@[-K> [6(GDQ]LD
M9Y\_/&6K!.N.?)X]?V+_MGWM"0FW'M9&Q=WY=^RDB=#WXP9J4_JZ^["6WH]:
MC1^%1FX"\\ GRT_G(D_>NLSWN#Y^RM"M+=%3A2"3J&GMW1CT'K'3T>U0KXB'
M-RN.)12=5,3/J5J3Q=C:=/JFQ_*2VCDQ6-]Y\D.ZN-F)U893]N0C5^0&.$Z_
ME[O=\2A&JD[DZ%MS13\\T<6@\:^;;9#<]6'%[89ED_A O#7ZV,7])I#,1UV[
M>+2XJU7P1L*!+H$C:78VED^:6"JW.UE:[669XF 8"]^5\ =525=IH6X['3XS
M.S_YF,03=!.6;F"ON*1["BQ)@2Z[JLKAQ$ZGVB[?U(#FQL=SF %;4D"J%A)1
M3C;T_9VHTM,\K/HGB=('-M@(- .L21B$F!"D(8(U'FE[NYF_AL2]/PGHT[DD
M]F8?MR9*I;GK$E&'LU?H7M][9E[LD[ %.C6.*LZI\!QLTE&Q.3\L->,4;>[[
M\S%CQ.+>]Q6V^BXWE1VM#1SD_JK&VYO?VKJI/IF*6" :9.QER(DXKUU+;4[H
M;+769:B^I92C15@,7="LQ&M5VQB4]MI51H_HYCU6530-AY8/^,'VAO *'HEK
M-;K9>]-#6G$R<=OU1G[L^J+1G@QC7+7I6Z[.G,:NF#,*:STCRBIMC:Z_!T,R
MK_IYD1ZBLJOV8(^)."'79:73Z>7$^HQ0]^@<K95C%G9U[Q4*Z:&.MZ_Y;A!S
M>J;*LN8;>Y3,3C->JI<V. YG&2#I..S#)CT/[Y 5*V*\&VY:SSX8S:DDH&T%
M*8X%7KJ^H?16S0_N5YL>%H\X!.9<$@J$>4U4JQ5JH?#),#(1IA<"QGET>0#(
MP1*WBLE:VXR14P?M:DX$<.N/RU.^;-^G%JB;JUSV][#6[:1-BS%>D==OG/8G
M6-2\#.S!7KON9_NUJF[AA%%TA6;0]R\_FQ>6BK9*GY;?_Y%T2RV[V&:KW[,'
M/3N)ME$31(=?F-"BQ_IYH@_FC$1/+4ML:60>W$M_]JV;E[1Z=?,G+G6<$+LB
MU30]$93L.1&8GIW4HD-Q1.RAZ>6/^.._"=$>&_IE4+U"5<FUD0[5Y],5)N8Y
MQ53:7.S3"U.5A0>;=NWS2=6Z6('SFM'03A(,NSSRF!DIM=$IS2!LPPEPJR%R
M+^'#8ON/L2DN!4UW**O7]&Y7>:YU&5O53OO:SSX1GITC6;4-X;]<ZU-<?MJ_
M=6RB4.T7T127>]E.E^2?'Q!79#KLYJFSB*D:%QAL:NZ2M1LX_+G4H'4 F/H)
M)&F+5&[9:V<;;2LUWQ'SZ,L'RY.10P2S(X FW<>5[/I?K\FYR80"K9$>.#5I
M_S7P8]T:5/T5T[V-PV%O+_:E!@&OBV+3%H*3^(:>'8?3U'I-GVWG[M*Z$3CB
MUVFZ^K08:JAXYR"A?$.B8FP!FFS_#5(Z)@1I9?R(KQ_S<DIX/ZD?XECSF^[O
MT3M>?G@7B]:0-V136@H-*CYO>^-JQ,E:V7W=LCJ;IC=E6T42^J>DV8:Q=+#*
M48G4E]-]4O=5URZ?3[BL=E@]H^*[KW4"WP#*76!Y?<3:;Y0'VY"$1H<?J@I8
MS+];L]#9M^9MZMN>JMGP/O3]-!I/=HV+?Q"1ZG!8M9Q%_#8_OZ9]/>6SH/ "
MLD7(-B;&"7I=6^W*SAAGWAOW=^K9K'&+/8O<VC((^&, Y'W"N1>T-W67][Z+
MHG^TZ)629G8D D3'(=#SE06N@6MG-&5?K/\"XH^-.!%2%Z@&^WG<]6[UAKK=
M:;4O&7YCEJ).]9[F$AM@T[$YR4S 11R/@O;-N:;V+7FO3T<9)F$<HS<M\#<>
M+#8A-2<>*^ '.]A;C3(16YNYZ?E9:E/'LL]<*;B;EB 8/7]-FN*91[UW3&]&
M__5XR&MM/W6ZTYX6O^@D+'7]4M*<!<2QD$G]EDO'7EH14!<?C3Y^H?#7MC:8
MZK1@JT]>KQ=E4)>=F>.W'[KI/N(;DC(^F*JS5R1Y<L^AZ0#RT2>]S<4J0SY7
MMZ089)[/K)V*..M\O)^1KS9Z<:5B2M&C%Q3F53.Q:53MN*[>Y-]*5Z>F*BH$
MIE/E^@*_\]=&+&UIOS^!E"P?)T6R2>*77^:/YVQL]CN7%9;Q].ZPHI=6"MW3
M5M82J6$9.AK!@CT#R13M!(=7H:?^+=N/5XA?F8UC*.C1QHZ)L<^AXI@4^#'?
MOXYEM?Y@!E\*\+\*FHBSVM;KIKFM%%N?/DU;HB%VC41A1K6S1H<I+W__KLV+
M8!MH%GW@URDRV3V*JD?3[Y[Z614+E!R#-B18JL;F#5I\+F)E-+XU\D]0+-HQ
MSA[+&C.< H@O."6;'^8O3R&< >0<VV1J/JGB83G*-RU/8/QBT"T'F<%62&,)
MU1<XL)\@8LO)1Q'8VL;H?BS?K ^$=';'TSG*?:##[,"T%GAI>OEG&"8*^23"
M[)B[%#ONKIG@J[D1.G-L6C312(_Q9*E=SL)JO4%2#4+KY">KYX[%O]=H9*&@
M1XZ9;Y[26JDEM?@L#:(WY0UJ(VOTY\<@T_X%!<K+!$P+ZJ7EQ *)%J EGFIQ
M#FF>4>C%J% F )LB&;HX()X>O.VFWR=%!5OE\([UH"2-Q)_T=ERLSNR4ZH!:
MV^Y4E1F*RO%EAJX7-JAV8J-_6J !ULY*@+'KOK"]@C2T1@1W52D1GH>E60Q$
M-P%S2BX_%_+LQ2W\-],Q1731N;\-K:T$AM!H$U/!?<;S@@@PO.4A=UXEJW"*
M*)C;PU*-8@'(/.!/B"Z8&]\Y__PR'2X'Z5VYB9WOP'/'I9N/;-"4 KC5:J!9
MTY;0P]5F$8 ZX*X)G=29#[[2,5Z>(?KTDA,--(^^U*YMTU@W .G#CO\+"P3W
M^#9=Q,H;1+*+)35=0TZWXBM/3+PH?!0U4_M,X[Z-L9+!Z02EOM>:WB^UI?3?
M#*X? Q%RL&@NLNR77#EFV>\7/H#6N0!Q6#JW[^[.R"+EM][[%OR&^T"]&,PF
MO*J]$N*LH(C#B7680:9)O;>'%)FLSWE?+[%KBTUBQ\Z0BOF#V#*WT&K%VD<-
M8P2:-_8G2-%4W?61<HKM_P.W.$C'R $-Q<0XS&P.J'A<X$X,YUQH1ULLQ@Z]
M1M^U9X1."P944"7D0!JD'7.P1-J%1P72#\C^G,*O+0*Z9= ]N50%1<8B7,63
MJ!@AR$$+^$&2"55*N0WUB<MI:($6 %Y?< :V>!B7G 9@L,$<X.4;/(*)9 B.
M9*$7P5$." ." $/',9,]>)GV%",;%%B5(4EB,"Q]%O-@8(1O)H=&824(41G
MFM%7$1EJ-L3?V%^' 4D7"9DLIHV;VI7,Y5$WDI&WF(9I9.D8CA>=J(YT$!*]
MY 11K 0(&J0GF4[N/ J& MHQY> D[,$<&(I"\49ZS* E%(\*Y@;%;)8%20<B
M2$5%"F)>G$K8Y2'VB$N08!$7L($%@( %(,(.49&-!%#R:-Z]Y):IB8L6DJER
M?9,((,(:K(%NGL3^I<I!U_T9@PP%O;@$??U>Z3#(0,5*V/4+1$W%7<P \PP+
MT43+I:47*($,59# /[)$.J[!;K0$1M# $R1G_>Q0<.0*O^Q%>]@$'GA08'S
M&5A &BR&8K@8%N'-#SU)$5B+-OV8AY@F7FE?+O$>DI((7_:=!VT>U(B1)CA"
M#5" #]2!(\B=#,U,$:FH.9G3/PVAN)F/D(Z10%"9F9Y5*Z2IEJ!-0IR5S,:L
M&87+:3#>&,WGPI5-071F*&3FD#571&#(4HV+$>E23]#7#7! :R$;DA"&O1$
M&7Z9PX!,:\D* 3U*+:T6J_R*670'*B%42G0=5#@D<X)=(Y0A1N3 V$[^Q0GY
M 1IT06RU!7"DJD)B2N\ !]UAZ<%-@@4X 148 !],P@SXQ7-IPEV4ISE%BQ$^
MPH[:D"$L37.E)(J) OD% X014P 0[@ !, @!R UE:01P6:!T:4AR2 C&_H
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M9J1UQWB;<<]$QF/( T0P!0H !!@ 8-QY4_I%NYR02=X0E!91E#M%)%438]9
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M"]2W$ ;Q0,3VQ;)[R4;Y70*1B';R1(\&1$!?R!3.V%96R7OFS3$KK4;V#;
M)%R/]DA)EW@&@LR=3X%Y*YMX^M8(C,1)7^#!\&P(>8'>7J24@9M8G@JM_5F)
MN Q)8MC(/3F"'RA.D?Z!6D3N/0'5902?=DR"&]# &>B '#A ,A!#:P"QFU+
MT9C;8GAK25:+&7,8E&')FFL5WY1)D4A9DF<5FN)L9C87X5E9W=#-T2H$.,NV
M-FN518B4;IU%,W6(+8D'Q#P,T%T@H\-75Z3=Q(0'Q$"W#A/+M 38<B3^6Z-U
MAU:01P5X!5>@#.@II,$X1:G:! )%5D3*BJ5<A3*IWL!,V@R\14;E "#BUF;
M!C,MP@:(P!K0P"TN@0_ P)^U1%CT5MJK#$P4H82TG,LI$4Z%[_ I 9] B2X
MP H<%@S8CDMT*G"815Z@)U;4+GGR2"0$$R)W1210"[*49!H3469+BR/\]XB=
MZ"< :XA@#ZWD12; OH>(%,Z42/>(1ARF!>J@XU74D(>X21VE3438%6@B@8Q\
MAGL0H2< ,P <W8+9*O N0H"+PAU8 AJ$%G:L 1]
[email protected] <!E&$"(TN2)
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ME?2<Z#F*!GGD8ZCG$* * W280]../7'JD"X70>2#,QSH 0! .CAC .P*$*
M.;CLDF6"Q"3MS+K84TR&#>YX)"(9-8HSSC;^9>PHZYD@MQ,FE6H<:BBB*JK<
MI.H$E5,H),)^A*:16 $)ND&:$V60Z0+>UY!!V)O$6;',^O2^-$3U8]11LWH#
M543>0EYB5R-Y4+_2-NN$Z<8^@.&,,RRHX5CX[N)966T[D:J1^]!@@P8Y^$#$
M$=$V<P167!$1U2O.TN-O,?L)6EF31^YHA(TYHE6)-;"! A:@@-I&50$:P$!]
M>&B9:R"4H/U!1#E(<4Z7& $1D!S"$6=8PA6NH(0(A, 5H"!M":!)/7,($*/
M<(HF(A&6XK!'+@^2%6OT4HEC94AE=V'9>0PRNY8)Y [$6L2W7"4LL*PE0S-P
MD!&/$Y%#"&P0,T'^&HY,L:1!+*(3>>F" -G0B*F(8!$DXH(,1'$(HL"$%5G;
MVJ% E,69;/%8FZD$&OS @0 (P HZ@,&F&+ BI #L=IY @V#F "0J $)(/E@"
M#W"@ TWH:$DB6LI=7"6<@U!K6GA8Q6L,<1.1Q&ET-\$:3*!C19'XA$:'J@E,
M0I<HEH0NE9#SDT4,L12K 84HK9O)=*8(.]?]<HZYR]4:D(DJ*>DN5&T1WAZ$
M]X=4H>4KPCKCF>X JY9MLEO+LD1:^#"'%IR! C5 5:L>2#(&-((+7>#"MS"$
MAK#,P0$!F,,?9JB9A'0"#3>@ CXT"F_I$=QKE+9@)PB@S6<P0D.^(#^\,+9
M*T(\82LY\$- &V$042@%
[email protected] *I J=@DV&C2$#"K@ R#$@053$$(30%"#
MS72!7@A)4,V0@K%%3*(&:T"G)[Z%!TV0!I,RZ,14,B$"3RIH0!SE:(0"M(CH
M'&)<,3.<#I%7";I(4& XM*C9*<*'!7A.:U3A2H&,ALTA,H/<]$0R>J3B570
M!"4Y^<FB$/4AZ(CB#KE"RULN*@<0=* #]_R*(U9V.U,<916.6.L:_- &[;
M" )P @%P (!%_ M@^]KF@A 4LY]A('PKNI@H5-&F-5K$3ZB@2"LGLB]1U(DD
M*6F)Z&B$D=!ISG7_6B5) &8@3="D%2#2T6+^'06[HE0GE4S;C!COB(:U)N^Q
M;>D-'S3%J61R!0THJZ%ZEL69F]X,,&M(@WGY4@-2%89CQFD;SV;JK9DBH@;T
M[ 'ZI$6;1K#% 000@@(4D%D+\ $X8L+#!A82J[:MPD *=2060#"&P?C!O%IQ
MA&+NT(G)A.R'%Q-11*034ME=D*326:PF9/"'*@"!"'
[email protected],[V&4<4CLJB
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MW7&*V\>3IS13Z, ?DU=;[6G???@ P=PP _JV\Q4G 6 !YS@!S^ A!*B ( .
MS' A2F'-RU@VD$K,00<] $'*N"&'-11O"XSXLXNM@HMP*Z*JDCC[ ;)V=>A
M]BB&M$(5E* 103 #]!6JF(TNB10CG2JBW G0EC#8*BV3-R=0) (+('^TT-L
MTZ9X*8W-\>75YHRT=45818)VYC+AK*((4S2R=,2*E*@OQ.8F0D0%<G#A2IP1
M Z,81.M8:Y$/\<10/UDU22IBBJ-6-*)SV$,EF'4:MZP&*9'0<+HN*BH!1"$$
M/.!!HPO( 322-(O-P1A=#$+!1]A498[K]44RLMP7@0[7'=GB4?_@B.'"2$<R
MLJN<0._IC93$M8"JB:]U-!'6(4'C&AFF3#:2=D-PQA$,T%87&"#/3&D756GY
MPQQ@@+YV'P\M=31.;!#AP8;Z836S:LRHV%"!=@MK$@PXEVQ:LY1N8<81ZPF?
ME 8XA[*@C#+R](,5ID"&>K\ $W:( Q4 &!?^%OYP(2O[Y,VNSBX YN R-@_M
M!"$B />'4I[C7PP!QUBNBD0AUDBJX[B $*P !^+@"FA@#:[)01K"HY)CD&JL
M""QNQVY*YT!J<'RN(! +0*(C0!#"("9EGQ*"@F2G-:3#$&1"0K8D!8?)2RXN
M4I""LY8$010B!]+ #SX@ZZ3"6V9&E8C)BBSG<U;-369B$4YC$MX@4\Z@ ^0@
MD+Y/SQ!!!AP'__9 #AP !-2F!PP@"J+ /3&-_Y !C1H=A0P.F;#M-(H0&+&
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M/%-ZNB78Y$+KTJ"GMB( > 2R" :(0$3CN %V&\*G&!%A$LI6$84+&4R:,48
M8\XINBK+! (B .0HD*L(?+#SB@!IS')JTN,HXR4-&H$_-"3F]N51FLYQ8(>S
M)(2%+O)MT!$Z6$8]YL)!?$X3-$XF5,'I? S^(ECP0(:,)2$"#OEJ0"11%8QN
MHRA($_I%IQ3D(03"$<QB4] WGHC,LXH$IY#=D;*A7($:\2.(UHA.@SA$1Y"
M$^B# 1 A#&E@,6:Q-_X@/S#4$QSK#'K "0" 2.; MC%$P[A7V C*RM)8 3
M7T*,95SCA;(2)HWF]/S0=9"&-S6*!HF"]$!"4':+UDK"+B&1+BET3SAB$B]N
ML4 BC5C&B-I&!J[I6\3($9BE"]A", **FGJ/FAJ!M&0@/0R*13!&!N2@!P3
MX!"!66B1 Y2-#>!",D2S/?2#("P!NAA3-+Y%,3" ?9A&GJZB3I_ !3@"# !
M$B15&IN1#*X@/_3^!X+V1P:<A0UJ0(S*+1M?:*,"%%\^BH(H;G;2<1W;LN,.
M8@,\IA%J@ :BQ!&<: 9T!B*&2+A@(\0VCJDTX6WZ4CE@Z%7"9WVJ9A\?;R+\
MQ>*LY68\!N6RT<GNPCE*E&C02@?]K8Q81" V)BU^0S37X ,( 56D #=M5$8U
M2")"#T^B@T-B8Q$.P43!5('X()#N %W@0@2$3 8:(0Q!P <<H*<DX0GX8!4,
M84CSL8(@13<=)U@%HF:0XV7^94@QARX#!6GB:!" RA$V0!0FKRA>K==8!]1J
MRR1>XB5.MG6FXW:450%U%%IC1B^DY@[85#(LP;DXD5S!#52'38S25"'^B(58
M\$5$=HQ,OZ(10*4$YH 0 FKKBA%9<A9)X"O8-@,5I6=:2+,+WD!43L41U@#]
M B$&($$!P$#DCD#]R, !'('!+$E$/&$/+, 'YO2>#E0UD$0I=#,OBJA;J1(Y
MY6@@U7&ODHP@P+8W<L @*,5V]',F/I(1 A)'?"E@]N=V.@]'!F) _).C#@*H
M1L,3UI$!C<XN#F*;CE5;-D8*<(\H6X9#&"QV*"B+#@%C\"4VUB(UN4*'^*("
MX@<-.@-);/ UTA'M4"*+2"83W3 V1,!9"&,-&@$8L>UGF(90FP8KSF@%(P)$
M<JH^]])F[.72E$2VM/$.DC"VE(1)E^N*)M?^$TQM$F; E$S6R(0W<IJT)H[T
MECP")78"46YM+YO..8Y"(#+-/-4#-&)E+JYV/J8GG 2J?1HA,ZB/613#B6+&
MB"#B9N:LCI@I,S^@ OIBIM[ FO@C?TJC--M'GSH! Y#H^T"E!A83 ]( _<B
M;$5. 20U">H- -! 8A]6!BS@2K 2XQD*K+%YMR6&R=F4@1FBJ+#%-JSZ82)
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M/H7ZCN5 :T@XGF@K98<D_RT2L&4KO"(M*BJ$]Z! ZHTJRQ<-"%@Q,HB6*NX
MMNB(C!)UOZ02[FP/+ -)TD.H4\AG-H %->AJ+#I"]H=>Y4+:<-2)"P]V&):7
ML:@F.FU-=LT4IJAS.6N-6"T46D=@8KE/6.)(&[MS=@)/XJBC_^519J-;1(!-
M+65J#"(ONJ^+K!E,R<<>#<KVA(59:@@ORD5BLDDO@/98A!"1NWE]V*,]?(S0
M/@9,^=16X*DQ-?&TEP4-YJ *[ :)541 CH)U&\)<J!M!&9_[D 'SG )? !]
ML.L)#+93I(92 E0X]\<I6*Y!;;0'0W>8C.[^ZO#I!L<*BY:+%9Y#.??E#]L$
MBR2B=3XMUP;A(!_$\192MO ZUL **2Y&ISQ!,J:E]K#S(IM8Q-Z4FOAO*D)%
M$K3K#V @ V! V<[ IX*&!85#=BB7Z.(,(FXH-B9CD\ V4_:@!O@#3#FQ]\JM
MBU:F7SHJE4J*-6@7G,-+O' TC905IGV\9.\;1F
[email protected]"?,*)&Z"L3%6
M1G[")XYTF#!N26+461=!L]='!$C H.S"FCW&/.G%$YP(?M#@G=9C9D'#G4@;
M(<0,#0K*7([MCCZE!O"6DVB;,U"./;J@"\2(S^69GA<N,CKTHG0 !V(@4B%!
M$33@T%_@!Z $;K^1R"T8 80 0#0T E@<8'DP%=\8^%\"$-' T!>R'%RK,0J
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M)@'WHF<S$&$.5%0'T"<TZ!E9RHW[HH(]G& IT:<)ED QH -(E#D8E,V([4/
MPBT;-<$1 F *WJ\)!* #QD"PB)X/4B$-T""SMRHXLG*;-LMU4&=)N@R*JRBE
M9=D3/@!:\L-' 9LBC$;7 $9'WD1D&>4Y;@0G=FLD_*2SF$.L7%KCLBC@,)JC
M:'<1MHRD:D<Y5L8U"&)!-D-:N@\#UD 2*F .,@ $+" #["8 Z+:Z"<&%-=P]
M@B;H] 5@)L)!%N%8A&H1OA0#SJA9_FP24LH' L * $ Y"#S;%OG8' $]</#
M C&/#0HW]Y&KF_1-;/(N<ZL/;:FS3$P=#Y#^":^(EE^+:T(A:^H7$N<H1S\,
M^A>DDU\^FS; P*J?D]>T+L8\V+*9:"V%?@ "SYT[GA;=D2%#A A':/[4R(%H
MTB1'CKI(G&2)HB.$#%L P1%E28\Y?[C(\-3)T20N7!PM5-D% \<H2G L. $
M9 \^?GSP4 I!B8RF(34<-1)1J1%FD0Y<C!%2 @"(EN<Z0$ !)\U:'*@:;11
M1$L1=Y@N\D105!%3II 4&31(E"%3HN@606*JR%R\=&7,(<E@T2&V=]?>907*
M%"NW;=DJ!@69%2I0J"0C9F5JD.*V>"<C 14*52A0K##37:0VLRI1< ^)0BTJ
M=FPMFAX]6K4H=VS^N++9LG[].G?NA!HU8ICDAPT?.2!T=#@3P$< $#U\6"C
MQL^?B(X:3:J4%$]!IG5-)8[4R9/$3JM$B9B$9N+&1I6Z.)($ @L ($G.$C
MDPQX+(6:(;*)TI0HKIU54%.:>")#2@+B@1 >3,UE"BH:?C;99(DA(9F&E'D(
M(A(:=JA:7IP1YAAD;,5E7HDF3M;*B95]%B-EH/"%8(^/](C@60DA- -:,T0B
MPT!*09A0@.+A02&2"(D@ T55)NF))T@N1*5 668I94J3_+%&)1(59U$7#&2T
M$4*3S($##S@ D8 39ZSAR$%5NJ10<1M1M$0<<5#A@Q,1*$%%#VX\X83^"Y <
M00I1.#2"D("Y:2*#'#PH000@0#A1G14&] #5XA4\$=\D[RQDB,%>0)E0>6]
M.$@1APS&EB%K&:**;P]R 0-)7-PA%XML+88$CJ3MF%B+-)Y(&8BY*O89LY0M
MAHJ)S=(5FVL*JJ(96W@A,5=P9=46+EY%)'@K:YD=8F!M;5;)P"2-H('&'GP4
M $(0/F2@@Q565!= #P&TP >JC4"T1G9A$?0):HZ9$HE]W7'AB29W.()(#JQN
M9)\,B,!0J .R$$!'P)&\F5[<QGX6VR:X%;0*K7!.B1!"&4L2J^0:=C*SY+M
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M!TS) -<6(,?".&'B0C($Y_0PED6\0A-'$(33&1-7$2!&X*L8A5,VAL3R7,(
M[(D+:!H:6A?Q AD.Z8B B=D1B:*5+*)
[email protected]!@TT1 0"0W4#%[ I@G:
MT*8I98,BSMJT 98UB4]VVX#>U(:X(CVI0IZ#%:R09#@!&=)N:&$0A<+CB21R
MKDD1X@(?]F!"1_"A.3VP0A2J( ^="&!7SK+'01R![<AA 'CLX #*. $'N2!
M!410PA7B <%*" J54B/<&BS"AGL@0HL@(07(.&"$% !""$( 0CK@ ;^/_R%
M!GZ07B4L(0/"P2:+<7G9_R8VL;+%\ ,T6(,(?O2]%H&QC-@*48;*.#'$+,L\
MB\D+KD2DM<Z$(EF8>8N"7@9 &7G/5[G!4(\2V"VX@ U!<>M.)2J!"!_R80YC
M\($5HD,Z T0A"@"P@@ X ,8<( &>ZB$#+B B!KPH55"W-LC8":#'$PD0$Q2
M27:Z\""-3 (1T,- EA*8Q%?A1H)(3)#,T"*>OE6*/(-P3<TT80@OMJ)&H6D%
M8@3(+*M5QC%?]<RUTLB*L,7F+G0Q4%M&A JL88TR4DN@)AP3P2:BQD&YD=)&
M!L(D#*S0)88<TD;F-A"^$60@&W#DEZ:D-P'^S>NH1]02SS2II81T0BQ^J,$:
MN, #OB@!R"0@P^PH(.9KN(VELT-F)3DMX[50 XYN0(<\B"$%2A!"7'@P1)T
M$$Y9Q>81C2#$%13 "4QXP05*2$ "<%#-*(QD#3*M0 T0P9U.)/!23LR,/]')
MHL_0T1-<^$/")C$#"<:&K-3"#!DA0QH0:0V^F\DG:<!+K33BR$/WM5\#NV7
MK;%%%4L\D"@*<IL#T85F5?(.1C$J"6UR 0 < ( FD"%D28@"ILP:77D, 88
MT 1,J#/'_[P'8FXM!/V(1:"(O&&'#2B)1O)6Y7XP$W;=6=5B(A/GI@BP58B
M^"RY@QD" U?%"C7^Q119U$0-M+.&2=R51C7B*M+8,J*PNH@SXH4O8K+UU;@L
MF3!4^\Q6XRJ:T%0&%'&QC;N>2!M1_,A!KV&20M8F2(HTPA*-8,"?^A395X*)
M05E:;$$DZQ))XF$#&D&(S8B\5""_!H$V%@$)*-(%[P )#Y@0T5$T D\M$?.
M5"0RA"+96+,$]0\<<$(5$@"$* @@" &H@ B.R)2O.84#MAV" B@AA$\9; DX
M6 $/JN 'D\QM92Y\(ESP.[$=E4:,IEB%(RI $AFL=M2Z:LRX\+(8%_53VMK:
M'_SXPN9:B4LS[EM1U1*S&/BI2+YPO>]:N"6S"9[D01E[!(3>TX@31R_^II+@
M PP<L 0#B/0 (0 "$*X B"@<8& @H,$<^)"J++WG#][)B&!5/(F,X6P[]'D#
M&MATG JT@ TM\0YV$;$<"_BA*0BL&8.8BIJJUOFQ.[3471$D S\ !1,QR(,3
M^'"'&0WMS,TJM_ZBY;4-99E#R2J@N@-,HZY>3:Y>^PVWF)C$'DGPBA%:G.>0
MQ 6,^CAMAJ,2(A=MH=N!R;)9NEN;(A$)"AW.-F5I$!(O%60IZ8TBE1 =HP
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M3/!<56 %&4 #3^ HU5*%( (Q (VQE=5>#4QU<(7">4_-.@UJS )?/ $:!!5
M[3%@R3=N1:-/CU&#.D(:7Q567V4::W$_JG!O\(9NXP90\35M7=884)2!!F%W
M&M$278 (#G%#?X!M%.!12Y!PA1 %"1 "S@4$$2 G!( %U=$!SE,#GH,'8Q(1
M$=$5.>"-DQ!)&"41TH,&/0:.(E,#-0 6WC$FA( )B,"6>0:77AS9A$D5(0[
M3"$EYP)#%6 %@4""/T &4Q "J21E?&1]+](U.C(T1K,C-2AU&:(TZH+^(25"
M(Y1191G)7W>4@;=!CV?Q(%7"!1.1-S6$7?:R-WO2@4*VA;C#A?Y&:)EE)5&5
M$E0R Y?BD4WQ:$WQ=X$3)96" 9;P'1US$N,4-F=1$1+1"!FE'8@0$P3AA:J6
M69&@27FTA3_B&(.P"" !57@! + 3RQ'-$Q ="#8L2"9473-"KR-27B;EU3
M0 =67LE!8@FD;O34/F"D&)C!%S08;C0X3TIS3]!B&6$4=3&23R;2&%Q6=5'S
M1&,S,_Z&!^&A$MAU0Q !$=KD YL@4E3@F5% !<R8 --T*$1@/ 104@% 7)
M*6UH$=^!47_ !J@B/1RW8]T12DNY4Q3Q.&[^R"IC4@$A%S-@=T0\>3O<-3.W
MLPH&DE-]P -Q, 5V$#Q*\ LP /-XP>.H EB1C.Y=D_69S55(R-DI'Q?XUW=
M]GQ7 S1!4V4ZTA:N<3-9<D6$QH%7DC=HXP@6U&..T%AVU@F#,WNJ1F3T6#-4
MY#<=>#:=(!, >E6B@$P(Q&\GD22QM"?+9B'D$3/^QC%>,91KD ./XPCB@50-
M0GRR<H$>B8%<XPD6,#E6 )^D%%CV0'FHV3L]GP%I!=RT3,(E1<?8@J+$!E?
MXPDBL 85D&PY5!YE=#1?)5^56%_2 E_BU5Z= 2)F13_5XB).NCZAV#_H%"_M
M,79F(:+C9R;_5PG^C8!!?. />!JR\B,TN2,." (/, #1! '2A!K3C PU?@X
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M,U553CHZ16(#22<!3P@R14&8*YZ0 P'@ !:PFC5 T$0!3Q@)Q5 *3 % K
M!U^Q,VV1+4A0(V9D(\GWN+GBMFKX3Y%[9AE)5U+S( 9Q.WK#-P8Z?O6R*I7
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MADQ)&8-,V'L;3A4;IS94GI,WE> '9^ $41 -2 "2M1 31'%"V0SC+ ;]_9E
MU#8(>. (3Y8#,U >E2C-51IN^\,A8$P8,_L@DR<VZSJSL#@8VQ-1@T!@L6%)
M>:.@8@$?'LH&3^99'6,O*H%1WDL! 6,%6( % A/0I$, T,6T5Z $$9#^PA$0
M 5= IQFVM"L P\)3!4OP46F 71CC6E1$(=8<4WS 7. *N6(!EE[Q,];)62!
M'FGG!^0S4U25&KSB&H^Y29<EA++!->XQ/2Y4-!13 UB &.@'#@ "61 !I30
MJ@%R5];G=#JB+/[[D&3F; !$97*T(4C09B!910HA$X+52+:L)WI2*1O@;TUD
MMT!6=[2$8BYQNY62K'EGN[<C.(7&,F41=I$@ $# U2 !9* 77ZP!VD0'RTA
MGVNE%MVFD$CI?_&*""[%-YE4&YNT,TQ!&ZHV9PEB(/Z6$)<TQ##7 U%0!DM
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M>SMU,[R@IC;22H6O)'C@>MA,98'+2P,%\ &2('R%51PK.==H,1[2>LZ> !7
MP )YP ,@0 %G #^3. $+XJ HZ:C_W-O+R)!=Z.4%"&BE<04M&M38(JB/V+9
MY2%F5NL'/5 %! "8^ 33!25L !)+:%8-HM,;,;[I*65+<8AR R-$ #.1 )
MFM K728:OM&O\30Q$K0QE:!1'( RJ0<#"6-^B#!C&- )J6XIBY"L!]$)]-&]
MJ;!1,$ (8R '9[":(99Z%A#JJUD ?\$!&= !S3%:X1U"I=0$I$,\SKC"5[ "
M<; "+J!;#^W0(> !.$ $*Z!;QL,Z E!Q4;82]VO(XV<2CC"2:/!D]ZP=M:L>
MV!6B0Q(A2K%8Z'QO!H)43=1*ZPI%$ K/;&0(?/ !)B0#X1+&"\%_3S#^!9"
M"<EU!4L0 'N ?BKF/2S@W2,!*-Q(UM&XP]40#KX+.I"48[E)<+K.6?A;ZV4
M5)EU-C:V> B"0.=R%IU "!9P<><C."*9$7L#H)4%9*YU.S, $HP!2QP@B#@
M #E!!0( P#(1V^A%_+3& 9E2>9N)>DZY:Z$,P.2.UHP15S/5#,3LV(F Q7@
M!+]4B!QP!D'@! UP!C7 T63.RP&L1'IQ%XK9=&RA"2* !I#>B*N0+F.4&:MP
M$%4,E4V$*1SC!WPP\V?@ $ R@2;>G+P!%N1 Y%'8VGC8.6HQ'-0 '+@ $8?
M'=51'3H @@0'04C'=,1 73 *3>1;6!.'^76$)-U+0!7'KK5M$8*>]I-#4
M+B=,NP)$('\&L D^(+6UC9(LDZSTS!)%+!$GUEF:LR2PHA+OWF@L\RK%%XEN
M<3,>Z4J#XR"[#&3O8<5Y8054T0-^0!":,;^S] =" FDD 20@*=1L 4WX CI
MA65R!!IQ=37P!1"@D* 2R J5*22F1 T:5,10$5.@0!F4B*H5J(.&!FG2Y&D#
MGCMX\'B205)&24^>%GE:E3(2RT4=/=TY>1*/S46#1&E:J;*CC#,^0'!8@U)&
MITF3')U<N7+5HY9.9<YPY(@!AC=4AD""I*!*CP J$1QTD&2(TU%!IEJR-:4
M6E-Q#7%<=.<.AJ7^)U4V[7G'T\B1=Q8MVJD%ZJ.=FA OU'A(U"(9; !<$=)&
MQQ,_%2R<@?%GTIV7BY^*(JV)],)##N,*)!B7K2@9E?BPF21C4=R!% \>@CRI
M$AHTD[AP<81WDA\^-.0XT!% 1P\!#;8($. C0 0'2S,X>.GQI\U:Q#]\8.<
M!@PY9\Z "."CQ_LM3@1L:0( !8 3IP L.+$RO_\G%C"@ .J,," )=HPH(T#
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MTTYSB%LD$G+M-0S^^*"&2E992Z*)6AO$DR[^UJB SDHD&/DS<YP((#W^+/B
M6/ONXZ\'*^JSHKT@WFNOAYK_ZP^ )O33;PF?!3Q@P0.*KH( "22(8JPHEHX"
M!RH2P 'J!( (@8<KE(@@@A"O($*(%5A@80@77+AP!;")"#$"'GCX$&LEKDA
M11#F\$.2'!K9L1)$NJC*$H'Q,E4&&G.0Y ]$1!B),$VT./(EDAQ)ER[3M$#8
M,5Z;^JNFE)HZ[#$YL%B" P8(J>(!2(1 Q!/2%JGD#S[D0$^')>B8 H?ZHF@[
M"A_6\(1/UD(!M)6+*&)%(M<>:@NAXQUM)91'XW*WIY$N#0GRSE72_LA04<5#
MA*I.FMX3TS:J"]/^E!SI@0>PJ_@L)<)/BH2PG628)'9"Y"B 6!^<(.!#(!P
M &)*PA'BI [*( K>:B"'+JPD+>XIEN(4H4H2,4J=$5B,:39W%)6P:3!A-!=
M[]+"*NA5&H.9*S::D4\%.F$:^O$DA(H)H0D3IHK4K"4NASJ4]$3!!39P@&*B
M8!2?0L&*(BR" 3G@0PM T)SK], '-8/9RH*FG_OX3 !A"5I]CO6S)4!A0&V
M AB78" !G;%I!* " :JPM*A-#0A5DQH.0A ".8;@"A&X H?B\+43"4&00G!!
M'J8@!!; 4.#[!#6XG"%*[B-"#R(@@$ 0('N(*(V,A"!);I@*H&EZB;^,Q !
M%_A6B4HXXB^LDY=*;J)*3S"B2CHYC2:>PI?!_*LF(!$,^1*6 P=@ 01LR$$+
MH$ '(53 $X[Q!"+60 ,0]. )?+ *8&@ 8X(0I ((3YB"#B@A/>*"XR)\D
M<CQ3])"($92(H"IR$3X=RETMP<,&/G(N3!&L*5!RB5W^L@&[<#(OB"(-1(KP
MF/FI1 8<<((2A! !'? A!TE)5ZT6H@D9\$$ +.B*'59 !2#D08%=F0(/E@ $
M.W %$HH R3@VQ]" H]00#+YX1$YC$NW4F,*C=3K@GK92PA[Y3?R&>PQ1PIA
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M[6H&B!!# C!!!C+$B053&"DD[ "'*RQ-" I4@")ZK($4P!@24> ZPQ1P7DM
M"ENJH.60(',IDG3N?%41S#Q50K#.,6DM"UD)3SCXETZD81*C,,V126.(U)S&
M4Z11A6NVFZV).,P4AWA+6#\ S94PA#-(YY 3*&E)YP!9GZEJQD31*"]GE&P
M;W30HH]6M *YT;!+8RS3"N'8R#(VLI/U ! $P0- 7.U#2E@;A=96(5)7:&PS
M5FW8A/#9*<P8D68#&]H"^3;98BV^EF31'/YPDI"4Q%3I(E3#'F&IX59"*=N+
M"?YB'/*8Q9%D!C%A\DZ@XDJETB4E%NX4:5PS*-=5 W9_:E@(E,!!A#N#RA;
M A78%X$$ ( &B*@ #8IB$.$=RE$60?! LB6]U9"3OP3Y4Z ,4:64/'AP>'#P
MIB+!$<7 #]@1WA0G9R _3SAL4/_^<Z4@C(@Y( =-5!EQKAD_JM(0-14!89
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MIX18L'ZRBPK4"^KR%)>XN*I 0,C1I57RA+78Q_][#)/P#>-"!%0"#N20 Q
M !> ! -2*794 2"P<^BA-7+@P=H/9+DBA0P( 6( VKI0=*(!!%0G)'8E9Y
M/D1 T= Q@0 !Q@ 1YH AIHA&L;%R81KTO9E*8P0[5(&$W0B2PAE]/ %EIB
M$C0;NX/S-HCH*@[KJAZZJB+0A!R8 PL@A$HH(FZTH$:0@P#8@B](O*AIFL$Z
M+$DS/,+"Q0>A D0D >)Q/A* _8-$&01&[*M/B2 /X[8AM,Y $Z@*37^A"T
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M(#"X5PS% 2S@@!R8SB)MLI6H'BY(BC^8 PZ8.S2H@ X +U: BSH -NP/J7C
MB\WIK<81OL7H2BVT-C&4(.(\N")(C9-5"%%(V71R4H1(B&:5'D3@@#.H@$D@
MHH$8%&A# SUL@C9H+":(+ D S$93 S]T$ B!D#6:M$(H$#"5+"#P $"0K3G!
MQ#N2$#KQQ*W1FDW$+,OZD*\9M<H4 E+\&E:#@SQ0I$)=/=43&],2K=(C) O1
MD+7A@<CR.P (@ X 0J@@8D2@>>*2%8HN&;-1U,8C?[>J(T8:A)#<!P($[XK
M?(O4P)8GK2GIFHF<7"=9[0E;BHK-@3[C<H1(X%&:&*XNX()%P!;'B)>-V-C[
M S!9==)#>9168,\L45%K;<C R)1+V:4-T)&JR(OZ;+#X3 I5:H@VK,;I"38+
MRZ@J@ 0RH%>1I- $&DD,W=>2[ I\S0,AX $!$-AAFY\30E&%.U8:X(ZD\!@.
M@!FP( 2HXPDN=,_L"8ENLR64*XUI/ VJ:A+7T(DCTXAJ1-ZW:(BT*Q19/0A'
MD0A#J 0.:($]Z )&,0@"E %$T$,H(*Q(=!JB35-")("B:30T32P' 8(1D\1+
MM!I/I%H@F-H[RMK,PBP*^?[3/P)%U[J"J:V0$P$]L DM1%H!TWO;6%L].V!%
ML9%;6L-,(= :)8BO ]B$)O !(JVQ2AC!@N:@76*6?Y$&#/T@#+I@!NE#7DW!&&\$1EN")BZM/PG -
M<3P)#% *P3"-.MRX0VF8#7L4@1@4 C0)T$ 5T/"GEWA/3NI=&<$+'(&P[+$4
MAI.!#?"#B1F_A4"J:WQ(3\ -G "2/B!)*#7E@*#ZM4YD@0#F?-7KJ#0)!Z1
MT?&#+L@>-XY*,TX)>CO?)Q SWU@##K "CBQBV672!:,$$H5<@&5X&P<A$FZ
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MWH4\B9N4GT[1I=YE@SF@@3](I9'@7YW@)VQ$@Q; ?[H#01Z];&N:$$;JUZ1
M3.Q</B0ED \?T $'X(,:6+:J.K,VHR6=JH$S: _;2@,,2(E&R($U"(ZE2#B;
M")7F^A1^:HJG@ K+29C\E1<)<@R%<(NT\ZK"+92,D4?:9(4<X( *Z(([^+8R
M!C\^Z($F2"P2-N%") Q?1"]XN"D@3P)H,1&)&&JQ5.MC1M0 P0EF-JII5H*
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M,/]U$G+V,^GAE<5Y"H[ S1E@ P%@ @D #](-Z-P!"9"\=-&=#]P !^8@ST0
M#WCTA#3 @@S=S \A #GH!$.H30!U5@,>E).UDAZMB7N"GX$)"8 J%1JI"@P(
MEVQLL S3K2!L\F"9A&%CG:PJC0WRA$[( 0O( I D@R,P@3AAP2-( 0W(@[C)
M@WE-^B.(^B.( 05P 1Y0 PKP@YY4-F5;MB(EHH98!)B&'P:8 Q"P@O]1@BH
M =&^ U^9!#2@1[W)B_G9/M&@E SJI=@FC4>8[47Q9OZ0W0EEY+"'*8B&B:>#
M&)0Z!!0D^)ADO6*"(A)'6-@F>*.JF9/$?! '2;PUTJL"L?6E;2Q*M%K,/\VV
MN3W;.WT> (+)HX(1NQJV28 WLAH'-4U)%$51?*1,!"22=BA$(F+9:\56"UNM
M<9NML=LH 0B$,:0(,@@3!;TEP= H6B4PA0G4H+XJ1DS);;4%G W[!TGQ<.
MU_"6&*X8N1<=V"+:H/EOG01$R(SNZ )WKH0/V#W+#H]&<"8*P %22 (OH 2
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M\ 4X@J.!/7MAT@0Y4"5-@;(XP!$ E4LH8<5!QX(@()>;1<%(!'0%P5[$;C
MPOX*5_! 1!Q$J+#""BY4&"(++ CAX0I*0"C?<R%X0( 3(/!1 R)<>)03:YB!
M<@AFI@RR"G&:X.':0J0M(@->"U5T2&>D&8*:(;(M9,HAFJP2R4AW;/#9*B+)
M1)R/G532" -^M'#&$VB(($,-'%A PQL9.>+8&FO,*$(C%<CAPQ(/A %)"E,X
MT<,9.2R"2BN&@K*;0K@A 0HKIACWR$PHP432#)%HM %'-G74B0@88'"3##;-
M$%*7&'SZ:8UX542:)J2)=,<J3PY2JU)&+=344WYP$ 652BAA!!*X-"##C[\
MZIT!WJG1E1-.X$!%%4Y880$??Z#!A6-U51(47H<L5/[$4SG4,(>>2DP!20R8
M!.+%%%& @,8DC7#A2 UR@$#!'W=@1N4CJ_S[2*3&+:+9:Z^^VFI33ZHV9<$
M,QEEE+7-Q@HK#R74*"H7([2;*33 @(BLAZC2&6B@->*' 3P$ %\ E)Q'7GF
MD4= %=WAG)W-VWEW0':%2*B?A& !P4,(8(4P7<SLN4<% 4LX\<42!E21@ 1+
M]!! " $@, 9%O3A@ ,]""! $U]1084:;51!!0_!MJP$$1%$0(2'(.+]X0I$
MS'TBAL_1'8$$!O0P1PY2<-%)1OW^!*E&L#W"464<"
[email protected])K^JE,01
M;;[(I9?&Y(EGIH.64U)*COXZB1Q+ .'$&&_,@ @;?/AA2948L.182S%QD0,;
M-S@A ;I"@#"9"(<<>FA$N\TF46Z09B83I2EE5!)'J'(T ^^.B'3-DGE%,
M,H#OJ2.28_8D4ZY6'Y,H1]%?_VP5K=*)(Y740(@53D!A"0V@@1_V8 $=E$T'
M%N# &1S @0I\ 0.. ,%SG &.50@#8Z9!"(<8R3,B$(5D'I$)_[ !P<L(0'I
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M.L$/J< D'[Y3!2R<00:/@!3UB&B1)T7IHTY,BE&
[email protected]$4JCEKJZSH5HG-
MYGD=0P@K%(4*42!"1C12BA&+- D_."$*$5!"?F*VG_T02(]0\V0BL7"@Q@J@
M!PEJ@B>5=8"9'9( ETTC5S:QA240R E;L$( *$ !$ "Y'%@G#24 E/2&I4
MHUI?^.)4B3_(00X-]($3#$"U*O! EBARP1!84"&]V4T(1) E()0@2PCQ@ H&
ML,(9T("35[EJ$7A0:^0\L?X:&73!F!LQTJLZZL1//,(0S[R+)HPB/8HT94L)
M+5U/_+6EKRXD<O;2PQ1P +3*(UX//$D!Z!!]Y-PA$S !=8D5 44=0SC'%-
M2$(NYC'Z&6>\DJM4,64@*HYL0'N@:@SX7@*3Q84&HXX!'TY^\B2$1*FOZ,L)
M$TE:UV4>I2E-61UV6Z6)\)%7$SWQA RTA88_^&$.,
[email protected](6IHBDN7<,?
MGM"#* Q&79@@PQ$44"PD_Z4'0"#6$D" @55LCC1D32N4(&7$*)NB"'%.BEI+
M@Q350,J]$\'QHR0BUXOI)B*#X!\B'#&4ICA.(XY80Q.H@"(>M#%F!)CTS9:U
MK/YGE<T*#6A :H.@ ZUI;9%6H&QE^6.=9=TQ.@=(I"@!8(4>@" #<NA ,@F
M@ !TH"Y<"&-+C4B:R[GT#$$ 0P(<08$Z* !3J@"6 ($!^,J=Y7*C4.)UC)F
M",D-0U$ @ [<T B10O$1LFH*: YA"$]80IXEP4-[Y\<0TO1H*+015V4BAIN'
M5$0G*,'#!H+RF4]H1LCE!5=GDH-"!U0 $3*@ITOP\"0DJ.(1<9I$)^X &SD[
MA%&@& 3&+3;7C(&N-)%3%4PNY>%BIBI-'AZ)"!@P"30P 'PS.(E,+'-,]+W!
M,3;YB5%^0YOW"?E+[';WQ'+SD-JXN<Z9^4G"3%8YX_Z@9.(X9<,DY567]44B
M+[#!2$V-2DD." '8K$#),A !D7@ 28I F% 6)52A!US01*XJ4A0I(3%A
M2,\Q66LEL8I T30\FMBB'H4DVN#&4;GYC:(,\9AN::+OFK 2D=%@!1S(;2"9
MK<)OO9-(*V!!@A,4FTXCPP$Y6 $/FA #R0+@,I.S3N; ,#9" 0 /?A :SH
M 05U"VLK"&"',PJCQ$9(9")OSQ%LD PB8NH(1)0@ )U$]17RH%PE>"@.>W.!
M<J\PGRLLU[D\P$$5 , &N^1$K)' RXV,$XE)[!I3IAM2C$DC,+>*@KT8KZ9!
M(\QOF@_9$:E5$0!>AOT!!_ZD@3P=![UT@A4]T_X46@\1'H4EB@/2AH4A!%T]
MTZL0F0@X0KJ9Q/84T_? Q$9XX!MT$ /8A/G('VB,2B.@P=5%0GGI1BL,'@'"
M#PA]E9*XE_0X1)3LV''4E",H#EYX#H0Y @HZWV-\P ?X00U04@?1B"?HF'%P
M@1_@"PB, 1NL01K\ 0UP 4X@ "TC1-8@!_XP1@ @!* 00PH@!!$@0\$&(-Q
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M\!+", B_ &VK,_SL<$34-U2YL ;= %)")GY^($8+/Z!S8# $_#!5_Y!#BQE
M#=@ (5R+'^@ %"!"RR5 L!= 08'EX<$,[/615?N.!*K30,79J&G#&$0F0,
M7%'8;=15QRB$*6@+!@C%:T@)(PR))W0! - !"TS!"@!!%"P+% 1! %@ !;0
M!W# )51 )<A )\P6%X"@"%1"#OC!$]# );!)!^00V4B69+'>:&4-KCD KO7>
M
!SQ0%\S/#%0"&]1 %PA%4 &,1M06!^7 !\S!&70 <!: !72 F>Q!!3S!
M!YQ!)SU+U'P%#C27^#D'ALB-AJR%$V0 &C13G F1MXA;P2Q"G.!$YKA;CSQ"
M#LS K_W:0E3/_45)OIV,1?X1V?KP6TO5BG$$5?7<Q;>PQATTAF,PP"*XERD\
M0B1XX'[ZXVZ$0O-4V ]*CULIA$ZDCO:LA$M$5(>A2DUPQ$@X@LLAPANL#TX<
M4TQHCSI-@F)Z@B'452LD2BOT1IP]6%+(!FX<!79UU&[4E13%F"8@@AST@ _(
MP1KD:$DH)1N$)8UP!!?@U!,4 ?X 94V@@CX00=$%@ 0N 210PHOH5@>P
M00Y0'$G( !K,P1)P@KJDP)_ 0^TP1ET0E"=593!6_'Y7?$YF%\"8?')&5I%
M"?0HQ'MIC%UA8,8\"A%FSI'@6$44B16D!P" #%60N*DS@P\%$>8YAI8 !9@
M0?X/D*9); 1=Y,!-L<$EF%8I@L!T7B<(M)[6>(T#= OCL&L!>M0X$$.\ $B
MB$ /^9"2]$MVO1,7[($/O%H/4$'=7
[email protected]$CI (-B*$._,^S;&4"/(AS
MP,=SC&,9A$ 5^$ J:$Z<]43!R,!EW,%MT>21,$53:(&F)EUQE,;?K4;UV)<+
MHL]#O09?:0:1T<L[H9^K8("1R<LNW=Q+#!U8V56')L2]><PB5((QD<:6V!.F
MW"B0?<J+MH1+'&S%J<0[S6A*E.9)6(F&"0R'&@HJA$+BS5M2,%%O/-,B8,H%
M&IVB3,^0B$!.6< <T-",'MD?N &5JJP,5,)?^( R/X! <V) !WJPI"T%"
M%00 #?#!'#R!'Z")Z:B)#P"!V6$")"@ B?# $K3 T!4'6HD"QBU$R>"A@RU3
MI!K>7<99;!2IQDR$T7%,HF1,HF01*Z2)2#A<1ST$]=Q!#=Q #IP"'LA7)V
M750"(C0?_'%!(^1 !5A .C &G0!/-$4%R#"):5"DL' ,YH6!63 UUBGUM@B
M!8T!#' #'S *8B"(_C!!]2 /+6C97@&^Y5&))C1'+1>#Q@ NBC GL:!NTI0
M!:!!7LT!ZLUBZ^E!8,U'<,5-!.S-B82 $Q0 !I"&7_X09FR848D DL:9412!
M3\@94^S$3Q@'6*79<A8,1OZ(;&FN! @I"<#(E[:L1(+- ':Y$P=A$B7EG!FL
MF PH2?W8+"@<2EU!CRDLPB0YP@9L2?;PFX9URHOZSHS2%OJ4V*C<1*J0H,SR
MXY%@L*&T0@TO;M+AX3(90I&8YOQD7*-,A#XNQ"*(4PV$:7AQQ&/X =5-K$QQ
M 1_X0 !)D!S,P1A<0=D% @MAPA$D 21$00"8+2)\P+4HH RP@14H 1DD0A*X
M(0O0P0'H0 V83FE$V1&95),([D(\BB#6QIX=YAX6)M$^RD/8E0UCI)\I!!YX
M2FGR:,9!BB'P!/*N0NW4 !^(K=A6 !H.(QJL1+W015C&E @85:@06258$I)=
MPOX<T, 'P, <$,(<P, 89$ %<0TO5A %T !4=L$C3$(%5 QRI-(E* [/JN0
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M1N1 'Q@ 4[T0)+ #C@ &F0=:0056G>344B9FA6?HQPB1_[QQEK8#VL<1%!8
M3(="QE'80RR"!WJ$%0G446C!'5RA%40!#BP!:9T!#.S!-?MRZ3H !40GJ)W!
M'*1"#4U"#=1 !9Q?,17C'U0 'XSV$YR6%6SE@Z@ W_3 !.26M2""92!"C(AJ
M,;Y<#K2N;6O+7*"!'S@ $B%W,2!$K0!#M !W.F:MGSA-'/!;:U!7:3L&G!
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MF^D@P<!$@INY/M(X1*S\H^ITQP3QQC3*;^"L7<U5(L<)%XB 6S4%RO&+#%"
M( @!05! !:1")5@"^E0 !03 ;5K!;]E,S!"(%83QY]9+(U2"']# 4JN!8:E!
M=T1-% @!)K# 61-):R"(X A%*X!,6Y+\\5@,7;N)?W!\H' %D2!$D3S+Z>L
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M/N: 88YY)"# SD*<%..,3A 1 1-#$%)LSY!@PPX&2IR""*,&MH C[0:\F2#
M.P3B0J$W%F+($XDJC:32A^[(Z"%--'E$DT-&0V6DDOY,$N4C5IXT94]3B@CS
MIIEZ^DDER$X299%51-FSI==$$4&A"OV@P8( F!+@*D0<Z430-3C@ Y$:$(@#
MDB/((..%'S"YP@%,/9E!4!D:[?+(,1U8H@HK:,# CPX<J& 1OD1YR=49#5'%
M$$WP^".'//<4+;1Z;X()5EU/0F+4TY!8F"4?>PPE-))Z1,64M[*[@R9/)C'K
MD2]%Z<0"-;YP !%F$UV%BR<X\*.'*I"+(XX(E D@BN 4.. ID"0XXD])KD#
MC]4JJ6"/$.V4HP,00.AA"R<., +$.I 8Q5G&X10DAP0JD0_ 05<(PW__//C
MOS]JJ( &&OB@08XV/YSC0_X0&W1C#3Y@V&-91"B@8$XYHO#@"AY"N.(*(0RW
M8X@A6(@@ S0>02G(H+N0" ^,_3SM+UP9:H@C>T5YY Y,Y]US$"D!HU))?6?
M5%>^MO1$5YGP%5($/]BXFH\G2JB#ACGB?+-MX/UHY [*5O(1E%Y-^1P/$3 8
M*%&)9-C4TD+!_58&@:C2KQ&&5I^A\N\]682MAT =&*6(03N-I+] HWAYEUC%
M]R:::/L)),U<$M(1$3S9U3*>TE'_NA"M"LC!!T[P 0=J4(G-B0 - ; 'P($
MA2O8 1*0"$0,XH"%'-Q!!)U@0( <F+TN!6D1<[ "%!H PS\@0(=X /&9#*(
M(OX$QA#T6IXG<O"&3FA"%0M3%?QF,IC2'8)+3,K,^B 6&E6I9#2::85II-BC
MU#@B(7@PQ"(:D8H<X,%SG>" $W10AU,X1%>+F 0':("&-B1'"8%30AR$H 0U
M " ( 7! !]K6LWY5JA-<,!L;GB G"F2@#TMK@@$.$ 4"5 $*-,##'M@$ Q#Y
MH081T@\:L**U2N2 :V_HWW4J\08_V"U.%C@#"!S@@ $X P4D /<:) F"CP!
M#9'@ M("T , 4(%F@E."$.# @BE0@A)VF (<!+"'._Q$%*O 0R?&MZ1%%,%A
M/AJ$D#IAB4XP9#(=@<U##/:DOG2D5<LK3.46P1$LH?Z%G*5['0;0D#L0[>%V
M#5*3[V0) SCM;0YFT81'$*:J6]6/2^":RE0<0CE/1")TX&) (R9J$>=-12$*
MV9RA'.*M\>EJ,DOD3,1($HKD,8Q@^'H-96;TEY.HY#,&Q14- B##+JP"+> B
M%/ER)*BAT: "RLI1Z+B +@"T V.0$0%6M '"MR@$C-8!2(&- <GX, )%$#*
M'$K6**7.P0$]\$-_0(F')N5$?FA]S2(D\HAYP81>@NE(2P?1/"Y0\R03@U@K
MH$BQ'XT*%"3I4Y],@18L<L$19C/3_U:!I4[00 4R$&NY.4)!E1B#DN@0@!@
M8* *<, "#N !R[QA-[-X?X)F,1*R71U!TOD@) ?"$\OG18%09@("$!H0P4J
M(9Z\=(=HU0E;?R@T"1'DB"H;JP$FV7 &!X"@ V>PP)LZ&]H 0+<#V44 BQ
M 0/Y80E1X,$*5N $XZ@!F"N PS$5 8D4I$ 1..C!&CQA"IQRI'[M] CR?I0Y
MC@A)+?#<% :XP 6,$6PP?O&8F"32SEP]1 87@9TH',$R' B!!3QP@@S78"8^
MI.D)=,J *L]P!CFP00JS6=CRED21YV'G#3GX@X#0P*Q,-80+:> #"'3@ Q^#
M@ (?2D,CLK.?23&K(> ;WPE]LI-LKJ\T*VF,JZA<&9=2655 01ACMCG&=,UA
M!OZ;"M>2Q>R)RG5H#97($T0< 04JM,$!-0A?)T0@@GB)2<9648,= &&%
M &?@0RK6T(A*M L+%O##0D1P!RW,2(>E\\E!<]47OA@,)DDJ;">8%8F.P+2D
M[W,,04.#A":2I%9]0LLD_I )_Y2I!G?8$D<< 8, T( +0M+5(+ X"1I\&<1[
MJ $^;X=/!W5'QC).11<6L4TNH*$&?*@#TGI@A48F $6 X,$2M':&5X( !KQS
M4";KPYMER>#9>4[(*;@@@AR<[;-+TT$&"%$FE<$@:0[PP75!8 $0+($./%#"
M X20@1E7 9.J (.Z ',,0@@RD ! ">T(E#W#F<T?[D2!1A8L[&(*$(E3.S
MH%C]ATG01(?SFE*8EHP6X#PD: QI-A=HL(0A!$);=J ""-;@!C\<J$%KDL-T
MS] '$_/A#6!DE9B0RP6N-0(-,C83&XI6:(9 5%"(J ,(G& 1N;,"0 (@!SL
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MIN>C9,!YKN,/B$4'$& -%"('VD4'!, *>F#?,J #>J #+, "G( UF4&PNP4
M:N 2$."78.8!'@ 'OD .&@$X!N95!D$+BH1/X,<OBF 1#$'X!F%(= 0#-@9"
M=O#N)N,0(*TG[@MV[J"=N.3<=$4$GF )IH ,?L *P2 !*.A,&B1MYF!OSD #
M32RHL@\V"D-0B(RL_B!-](D/V&"LNB=[9* 1_, "K( )$@ '@(#^J" *#
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M /<[N.,0!08@00RP<YDL*"6)Q+P8&'ZI P_A3** #(D,9JF*2/*T4E 4IH
MHE62$/=&;B(XI!(($3C0H 7:( YPS@K)H GDI XRQ'?&H 4L(+KXB&PV9 ,$
MQ1$8H NRXR",HDQ.*\2N)LTP8%.JX@RP @"![>@ P<2P "L8&?X(),0@1 ?
M*LP2!8CP9V+\).XV([!L!7]Z93)4P290CE:.QR-0PE9L!+*<P '6@)H6CTO0
M @_:4@;ZD2&*!*1$00:T@PTF*TAN<S,7X=!HX R<0 @H00'@0 VP0 +@H+T4
M80IXH KT@ .>H(%$@":64?YY,L,R48BM6"?!K(PQ",I/? 0D^FK%A"\1WZ=/
M-*'7+L$*_ -! 2Q.L%(%D$$9""-/$%HUJ "X*:S* &*F W*B(^R;$3HN<C
M-\4](Z$2"HP++*!I#( Z"\//0 Z@ T$ .K #0A/&5\J)GS&0/'B0"IT<$
MNJB-IB=[) )\<J6(/H<4/8$+]@ !%(X $@H .>\!&?<!&;W0,**C&KD04
MT.JD@J@E* 8)1.$.GBE]0&$F*FTG6B4E].YS'F'[0(H'(<-^Z,4FA.1U'.(B
M V0-&$ B&H$/ @ *% 3$L$*"0^ZY&!M?B>[0. ,QB#-!@6+[F.BWH"J$($H
M_OZ #SY G_ST!BH@J2@"$1 2.4( #Z- 41UI"<S+!\; #<<*3!_J(8S$28R/
M%?;D$J7H-(C4,G^"Q>K'2RPQ$EMBU)8'#TBRE?S $:K)4X1$-;^I>^*S2#YE
M5PKC%+O =2I-5+L X>0@ *(@#J9@!0@ !!H@"H9)$13 !:+ "OC@,#:D(W3H
M8%[J4__BXLBLG>JG?@Y&B((R?2"F,[(L*%8LBN!N$4&!PK@@!\Y@"6C@DW*
M-^0S*?\G4)P.#0B)33Z$/QVHP +T$1:!$1Y!"QHK8/%@%'*$619!"[ZI$QJA
M YRF"@A IA#$ :/_JR "SH /=K "<(NCZ(+3DP+6OX7LQ,.C1 H0%#1( TB
MD"IRC7X&:D^"Q%$<@4"J( IT1HS:H/3P$$(]( (B@ <$IRDR(+46LZ5N<"<&
MP<QF!30(PQ,>!R8.(2@$XUY:A28&PU8&(TIFPE/N$6@01080P79RH!$P !'V
M@! < ?B0 %((0D(;PL$( ."C@,H0&G@5 Z497,<X2#,EB@F4EF>+0VF3I\^
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M_Z"0 B #VP"0",:!^4T$2U@ -*,HA!,*$&X$-+,!&Y< 0XH()AC8$]# *
M\# $5F *
[email protected] .E( *K& .TL G\J<9>T)*;^41<F3V#A&: F-KA41J>Z(F
M;DAV0<4C.>0@3M@-V6 .QH 0YL#?!."J?* .]@!NW/! ;H<09FD.5A@C,* +
M#O["@<#Q#]* 63;@FZ0.CF_@,!AB*MZ #8R#D12((3,@ TRLQ,"P!=KF#\S
M?R#"2TH-87S0S 9*^?(E51 &-?*%LJJ781(1,B@&DUE,Y+95$QA!7MX):#@E
M4S!.2#"/\Y &$>A510M"3[O@#R[! 2P@ CF) D*KE7) +Q?!K5P*5J($AU@E
M<X#C.C8G5\Z'+SC"2<(S?WPD&PGF)U(",L93R@[A#NR&#QKYB"-L8R:!FFZ5
MP"P!$=R #^YVNI[@#Q !UAPH8-^)$78EG)HG>G&E(4S!$Z#/"JJ "B0 VTP$
M JX@ :*@#3H X) #9S@@EO 6-3#SW9F>,Q@(@7DE/Z&3I;J($XX8 SFH [P
M-FE ( /D@ +6& W,H!$:H6[FX QZX P,P1(" %WH;P]QE@!"0 ED9HZN( 0(
M %EJ@'.!@F)@ U_P:T^ P\FK4AUSU6",DP^)8=8928 XR9HN3"TH^HDX91@
M0)7D *A"C ,2S8&*C*KN>6/*9*PLB@1$J$)XHT/XI=$B 5P.HDR0@@;<8!+2
M[BT1 04_5D:I:TWB^$U4J9'9U _>X'FFPA$V((E1P_=D+9U$(1(^$QM70C*V
M3_> PI1!63-*V7IUS76$1!3:[L$@:@/&!Z(PCNFR#P\JP H(X S0H$N\=D@:
MS<P22U#K=]QRP+@1HYI"ZOY>Z@=* ..&K)>M"F(AT&@5M.#V^N+C# H3K<B<
MM'J(KE$E"FL2:F .KDL.@GFW*:(2 FQ/\$ N<P=I^&@^[ ,K1$D?R2=>9K9^
M5,-_.L8<.R$UHH4/FH J #;@C9HXP ')& 3^@!D&B"6&J0'OJX);#0 Q.--
MQN!H5CHM.S!#*< 'L.!CT<6\MJ#_ZJ1!1,0"5-(0.D$.! G(!G'<D VN#:
MG$-HF2,* ( ":B!>\@I^!*-TMF_%EN<17N(E*.95<J)A=B)4=:\GBFB;-,&Z
M8W$V/XNZR%@.P!"M)W("@>HL(D$!"Z)5IXDH1,DB7BP[)H$!#()?$%#,_1:?
M_?X ;FI@,2FB$>2@ @7 !S( M8(.;@@A3L2CQ.3@ ]2S?EO6N&0BG7IB(I3,
M4S; $58B54Y[Z9J,=0'FKTK9B9Q\>3X'2Z1TUH"F4C^E4N*%?N!)7RI@"82
M")R #WY(OXWH2-"-#JW ?B@$C"@Y6@;,%I97C*S:VW"L";%$">#$E4*E4<M
MRTJMO]3IQS/C([;,%#J!O / "EI:!V!I$M B0,>G)LXQ^KQ0E7K\K<U"4/PC
M4=IIH*)Y(A#+Z:H" +8X2<=$4F,"I9!!#5P)5B#?5X '), )7*@&</H)*$ P
M%?5CG0 *F *QK4 MD 8]: ' B (]LV7_,P)T.,D,QYG)S8*_JC@ /8-QG5
M%"JA!Q [QC<! 'QI$Y;@ !Q4$*A@,*7##[JD"!(Q4[]:3++OB6[%(SXCTUXJ
M-)IY5UBJ)B[-K6PBPKK /O6MX7T@;JHN(HTKOZ>U)UA[Z<(%(ZY#(6::*")2
M!C!E4RKB+<>[#=' P"S%,-BFWS9T(L\DT(&GL>7$3T5L:BPB>^Y1#O_ #?C%
M/M( ?!'F23O.(Z;]$H,"E5FWU'PEFO;YFM,B=H&#+?1DREV.\W2 #A0 !P*@
M$CQAJ[E5=L?D#T "GK DA"!UQ?/4V[SNNNG=*PW%K^I?SA'7G*(-M"*2 EJ
M893/=&_RSO**3_3G#OX !H11EA3._BZXI!..]']*1P9JH)9\"]SL0VLVI!/6
MLP)2$=1SZF0O9%A W GZ(#7^N@G098>#E@A60 @B( 26@ )8HP, L>9<1@]S
MI@F<H D H DJ5P!LM %R% -Q%""L.&DBP(H5+ "L '"RI!"!!%$2A. 1Q< 7
M)SHTK7$B 2*! TN:;%D(,B(.' E.+NE!0X8H4Z9 H0(%LX@H0XM(>$(""@E,
M4T5,H>(YU)0AF$A0H3(E2I.HFZH,'1UTZ*FF58NLXG'4J-*
[email protected]\^:
M&G[\F&WD\E#0HZ:B/ATD:E4D1S(\+?+4R1I.X3JKT1D8D3YYD=,+@J),(
MKW]R3+J#_OAP(TDTY&28,X>/64EL^,SAP$&.Z=,<.&L^P]H/HC>3)C' ( )#
M)3]\]NQA\\</JZ2L>O;\:8JGSYE(
[email protected]%C'B5IKUX9BQR.OW.
MHZ=5'V%MVND#EA5 L%20<<BH*+J:-#VZZJD2!RL]*,BAD4H$'D^K?/==4]R)
M<L@@@_QDR%-8X:&8#/]E=1-Q2)GR6W(Q$=5**S,!U=132,F$2G-,9?+'#33D
M4$$/.M0P"6(RR.#?38:,4L$98W0 0@ =R)$*(HB@P84CE:R!&QHB>'*'#).@
MD0-:N/%!PQPPM. BV8(D,-4C(440)*$*&$$"Q,X4("/:SA_HA^-^ 70!0A
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M5N# P\1 !$% 094L80!3@RT21, $"[XG@?A:44#!C$$$D,2\5"Z"T)<404(
MC@ PQ1!31("#!, ?$,7X)H4 !$0&+$$ %I-D9>%R3#E(9!>@<%SK4O73) K(
M1_G$E"@Z_@-1>^;R%*L\8B\UBQ&$$B,"KKQ!66P 4) X =-&"(H"-*6*>"S
ME\/(#%:/B$1?.J' "%UG22SSA'@.B ?'C L-Y6J$'\[@A"ST 1S@$T._B E
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MGW+R%Y.BY HH-7'*!>=B%%-418]TV6,:E907Q#AH,(C #>VP( Y1 )IAJA*
M ?\'P&(1L%N12*$GKD(LFU)&0J)XA">XD@8EIJ$1DY!$"YQ@@.(5 $B*\\,'
MGJB:U/QP-*B9@\4DD0,@]69B4_H _L<N6<4.T40I*=M5&#N$5U#R3PL0HHR#
MRKC4 M+LJ=,AEA8\=!T'6>*Q5 /0 >,S($/(109=6,/D0@JA1S#"L&[)5MI8
MH<>O:2TX5N2:)4&
[email protected],Y<4;$AVFYH;=%Q2B5T4('_:$%<G<BC*.Y0
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M!GURP!P<IBP_V LL<LC7YFX@FBD]@0,%X ,"+&P-^"E-I-X$A]* )P153$I
M0@%C3X)#%*&0K'[!><Y28+**-B;0$?Y9A!\/$:Z;4998.WN*"!4XKDEP88&&
M11!XHGH'$;B+:E$NX""BTE*@T,1_\+&.*#Y;R=E"!SDELQ_)E+(VGUB6**#8
M9+*5PB'8_J\+#K L; B RXDZ26&* \(\$L!"G0&!'K #Y\2_D;=;H^! S3
M[A_^P"4^Z)(#2-:! W)@"DV@@0).B((@.AP'(IQ.""LP*"44((0U:"(3.JA"
M *P0!24HP9RADBCN(A G47V)OQ$]W_@2P 2(2&!W$9%F>B,0!R4HW!$6Z&>%
MSXD['D!@HA,!A#G1.6%)K4$&B[@@:IFR"/E9(D'+MFMQ?GW)\3JE/66K%5"
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M /Q6Z,,I3'&'&@1@"528"$+I0 0R];.@W-,! $(#56 % D #F<^YG0[CC)1
M0" (YW,2 .9A$M4HTL-R5W!.Y^0H2A 'Y=0&%K * ( Z1, #&6=.%.AA%(@#
M$7@[47!S2#,(KE4$V-$8+R$<7$0K'8,_2U$7K@0RCC05<^$42:5 !(NGH !
M@P$83?(D_A60&=3%!]^"&!.R+65#=E>V"-]Q95%5,Y[6+7LQ9*3'!4 2&F[&
M!W(01&HQ"9: +!*3&6%1.!E ""@" W/P!#? &:4QAWN0!DGR"5J85'_ !G!S
M:UW$$W>%28@&'%I$%*Q ,B7E'HM0+IAV,T;%>:OP905"-/^#!R)@:N7"2J1W
M2%23%T@S,S6!(*KP>A7R$[D'$T; $V5C6!J$6LV!B,"F,<LF$\JV21TR1]_1
M')O4;,O'(<;'%#G0 !"R"#%3>$NE"5U 081 !G0 A0 E:@!\83!'SG2[N1
M T:"%GP S!P!GW0 <W%$ ! ];1!1RP!!LW*J533:>S G# _@*48 = , $
M<@D%Z 0X,%&"P( -F#LL*!$>P . X"@(]2@+" 2DTI (Q5[LY7!1X -<L I
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MS4:,M>6+/]$%.N (3[4*,2)[B] (,- 3F %4),G"=$G]$0!UN5FVS4E\*8C
M@B, B-).5O 'P[4& 6 Y#,J/' Z+.!>9/)>*[ $!L<%5> $4!!-YA21,B=B
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M'8]P!XY \!Y*H<"!>_$)SX0 A 3!P";Y$ \W4 8(C.$&P!4X $DO0!CHP
M?X[P!#T@/@E0" EP._4H!"[@ O=X32P0 B P YK0!N49!0L)<QI(GQ(14>>T
MD \7 8#@D"SW84HPCZ=34#S0 &D@"GP <'1P3H* _\5*B6V_H$(E3L2@5"
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M *>?4T )2K %C9 #2T J$ =1].F>YB.2"U@Z8A(!1 I#N=O*F ZK&N/V#0%
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M<^=D@227O<*;NJ933?ZFK*I#"4)@ YJ 5A0)G!03M[C 2S(@@DYG]M:*J;C
M/0&P!WCA"(8 "G4A'D#W11DD2?TS1HMP94UG( ER%%94-PG['MU2+LB".&C
M0QP@71E@5G'U!"PJ&3@G9-^Q%XOP"6D4(V4[>T918V&D:C Q_G40/&B<H1;8
MQ61#&Q@;P$=3A0C2T@)B0#@ZT $EK$3K5M!^L =^( GKE@9,M <9( =#EQ1S
MTZ4X6$7, 3)3!#]&T7..@ BGA+5XD+Y(\6+I\C7><1-! 8F@4!6*1"MS.GN9
M21RTEW0^8:.,A-$H501;A%N!Z;0RL39Y.R)8=L/PHT$V 7HW&+BJ.13^\Q18
M<+C6\1_,7#.5 )04%%1T 9.0#@[$@# 6<>)<BK!8Q!;( !;T 18X 1?L 0-
MP 8O(0,^L 0.%G(H*,IB4DUPD+VJHP!30 ">,P#\5'&T/!'HQ0.V>P5T()]A
MXG"E\RA$T'__=DW<PP(\X B:0 ,1_J 0R $D (IT@N!IQL"LGP[YD-R/" !
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MQ- =>C>L5V@S"#* >Y2"0R]!]."(G,P!@70&9 SM)@FI!L\0S@[!W\@H5,F
M"G>AWRR<L3_+&F>P>%XZ;"*R1:*$/R<%H7.4&"W40'8G KCN_II9 4E@Z!1@
MC%H\8:.S!A2VV%%$!2*(BHN0]A-R417N/'D]H=3?3IJNU44F7@2JT%1!P6S2
M,:%;86U(L[>7.AR9602C8 %00 ,8(/%4$2!X4 $^L-9?8! 0QBEA_2ERC6"^
MDRA2CN1.P$Z98 JK4 ,=T :%7 A1( $-A5X@-KR/4@9ASJPL$ 5I$#,<4'+H
M]'&BDA+R>#O\Y' (A3OTN,C(R@*KPP(XX V@@/;<TU3KX$L^*XBEBGGP^8$
M-A%4T -S@**.L H) HQCLY.?21?M@6/U(;H"6QPI$]'2<4()+@GC[2R-,"3E
[email protected] 5N&!E_T'6V+17HC0$65#<E_ML4!?Q3?J-T SL<A@#<1,G/&1L:HM$"
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M#Y,"(P$%>+ 63V@D\2GQ(4<:-D_D6)"#,E0$!(455) 0D++)*CL0%5,JBZ_
M!P,S1)/8-D",-5%4 8PR4T19Y(Y([O!$DU46\80WQ01;<$#,_N"#;S(!64%"
MD]4T,0P)&@ULD4; D"@",!OOP-&P 04T1<!06D&2.<%H1! XS8($I<?,1'DD
M1=M,887) >/[$,153!FECRIRJ$0&'/E:9!(Y" ( ">B(*"--A8Z@$X"""AD
MSS:<( C0@:K (H=5_)#C# $&RA.BH\RZ0@DE9.(A*9E:6D$(%E:(8H(9\$"
M!R&"BH@ "8 *P2@<! %BJ9@ B333L"BQ0P$%I@ @!TTPZ&&*(:9P@25*W5**
MBHC@(N I:*@(BB'Z 2@A1QD4-&4PE891!4V5>,PAS\<D0$/4S1QA ('-#-$
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M^,,D\+"<'W%I0H!9CHP$!B+%% $)HKB#"$30"1$\!PTYJ ?;C '#ISA#!;@
MPR02AL/8<*%@VID#(C"#I11E;0/.F40E,. 91_Q!#@&"$)/<QK>S?2E)ZSH0
MBRQ3H,L<(ERJ =C"D&0CB3W"@ARTX;Y:=+0OQ4A!\)&;9I)&_J,"5:F#+))/
M $_6(:,%;EU=6A##/L2AF57&A1%ZT 3C,PB4#6(P04);(TTQB*X=XH8U<((?
MJ*4)!:Y"!# 8B$664 6('"!9$+D?G41W ,LI'5+0( (3,$'"IS!!TYP@@$<
M8CJA4$$0D9*42YQB*9BL9 5$B$,"?# #372B#RM8 2#>$I)C&:M9@G 5(%:B
MJ2GX2@%"B ("!M&('A!A""M0@5)X8)2(1 $H$*'",GOI3U(9JR11L (%=B.F
M=A5&/J+ 6"0,<8@_S*$"C1#!3IX J@J$B>#$Q\D*! %%F0:RTTQ7"RU:$U
M)DE&1TH0A![WG!3.0!0(LM:+'B08_H4=R9#RT1$JBK *S\@ RR;1!KVP >F
M?L &%D6$#$(ZF)TXIQ$H_ ?$+&<QWEF!G<0SPQ$@ %JW<P1%9B#T0BT5C*6
MS6SQ<1 @1WBVRVC!1)I!D(\0.2X+:J8OG$$8EQ!41E P:6\SF@Q\RMBNOHC"
M0#$*F(Z >C7Y<#)@AUV2OW3T4C8")D@@%:QDX!I)",F--81Y#X0,1)GAW.AD
MAH"E%?;0"*E9")7(G&5$2*?+4@6E$ @)7>H0,(-(K"('-*" #AAERSRI11#M
MBU0<@$>6" B*=:-B717$(%-P& -9.5 %>*P @A0+RX0P1X08-42%L!A"BR8
M@AJ"D(-'_MSA $I@@1"V>X40'"LA3=C"$G87E"U8X0N;<,(!;K=+ 5=/ "U
MA"?"]$&_VN@YM?'$??BPAS3((!4 @,(?;!8OOQI&;7= L9;6QA=1<$0^(7PK
M*EIQMP'QS3*FR!(>>(BO,3%LC7IM;))H/&,9SS@^( *K>:;#U KDH!$RB,0B
M'C$(HEE+$W@0@26X4(E*<.$0@#F$)V8 Y3&+!ZR?L=ESOD1&P\5T0% "')=V
M=$:F6<NO@_"@X)S6UPI+#( /6MID0F$TOAGVS65;4)@>MJ-VZ4B2S$EIU2K#
M)+7V,:^%1=HHXS8A?OETM3HJ3'UY\V66*C9I)93:7D Q"A@D_H0#1%K%'2H1
M)R@@1+>[%0J=A@*1-D D=4L@[B,J08./6*$A"!%=(>"BEDJQ) )$H(.KRJ)/
M'D@*#B$XP!GX0*)3]$$-<1#"2YY'!;0D)011R10+7! ''+ !#YHP0Q!8L"FG
M7(%Z$4G 9RPA1[T "UW$( >I#,)0!@(:R[G;%Z,(=*K&(XF1R7S>Z ,4=X
MPA%0G ,?4B&&* !@$O&2&(X28Z,4X0$/)-*2:C@C-<BT.:\U_E((TS@NP&K-
M2#X^4+O2!L?"WFW&1&;2*$_T&9:A@:E^4"$ >ZK6?X7(.5VXF"%H5E\9E/EF
M)Y<!6#>0&L_<+;$M4BP@/6091PLF_N>;75=EDY0WRQRNL5RUD=3BIEBUUIWI
MA/W@D163:)$^^H5QTQNE"1NAM4H(\!V*;"1_S-.NL3RD"DJCWC$7&%&(H'-4
M8(!J/#$) 5@!4+C^[9[D!]!CQ04*#E"%*-! ^WT8"$2,9TM"Z'L!"@E5F.)
M@%( $6U7J3<"5('#%99PAE0TPD1=@ (0X& \.D! "7'0GJ:N"80J@* &YAM#
M%*[B B4L)0&.,@D5#-"$)O0@ 0G15\,/ #%#QW7T#FG*K0@2<TXA&9<RDH
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M>X(-FP$IBX09Z(,&P (0 X !H V. 5&$+,UR(#?^Y4AZ+Y._LPW)]B$)=B$
MW4D6 .@W"NB +1" 'DB4'BB_)OB^'O"!($ F/O@6V] $55 00Z /'62 1D"#
M C T0$ &MB"$%"#"O +J@M"\?B,E).8UM"\=Z,82#L\?QP7&\F1O9&1*MF1
MP0*T#_$$?.FY%)2Q+RDA1V" Z,BB29"!A_&ZAVR%1@*DQ\$91&@$3_ D$*DB
M3R 1$CDY$2$N:D$%IH.KH%HCL]F1"%FCKVO#)MPI0HI#P/NC,!F$$)2@*A&\
M#=S !"$03.H1R=(TN5)*%BG*4)C)+>Q"MW*AJ2*\HIR1G N.$RD14BN;JC0%
M58"@S""U16@! ,""#!B#'K!%9*(E_D></48L":!H #:(A%WA@$NH #^8@R_
MDUY;)F:9R^R1E&?#O1!H%1[HG9@(17!:@3C@@0P8#3YX AJX"RZP*5'0@D6(
M!+V@&G@; R>@@A#0%!4 IPA(@%X"'0/X @#X EZ*B$T @8"; !#H 2O( &CL
M-_GK 1 X RN0K87RJ])",CPX*A@\ P-HEB68@R; 2>H!!/QA W F$:X%QG@
MH3?RA-8X$1.9QT? $6T)#KX Q(GB"S#[I&M1C>.(N;;R()?B$< 8!(OKA"0I
M,DKS$KXQA470&.C *!EX!"'3R$*+*0G13!FH!)!$&)*ZHY*T&4\8D5DD$,1C
MD+XI(\@K_I WC#FZ*LBS@:L)61@;?#--"[2KH0S#(J,E0<&I[)+"0Q##ZJP(
M,22W@H^Z@[$ZA)$^!"JE1!LV,TJ>&L([V+NUJZP,2BG04@43RH$1: YD9/=
M 0*@(!6BP($V"((1( %-:(1+$!D^V,LG"(#V:P+@= ("$(D\<28@X &6P)1)
MV:?V*0D/((LX4 +]DA0< $^N([*?((]""(.Z( ^$!DKD),[B0*T4(,$, KL
M^;XE"#"$:#]>,K\R[8$S@)E$@8'MH)V!@P@G"( SZ +^(!*D+#4RZ0C2S/[
MD ,?J +UBH( 4%0=:(0[F &R8ADNLTZR\HSB:$#P]"L6TPR1_F.$G5@-KI27
M(C$1*6,D)&BKPI%)IF&%B"35+\,LGZ,,4<@$-$ $B_0D U%1QO$Z(^-#^8R-
MBV0A^4R7$M,$7T01M?(1.MQ0J50L,#RTF+O)LYG)4V6S(Y,,-A20C*PQOBDL
M^-C($_4I!1&CLZE**)FK4+I/PVF10BM(,+DDLD&"QID@#AV<13 Y(HFSOP,J
M3>N@_92-3/@#&ZA%*#A4HQ $HJ@3)X"!2NC,5>"##@B +" "KB..>B!]G/&
MVX2".VF"A0 H'%#3W(LVQ;0>.CE4-6U,.@4"*@B O:R )WB".7@"TGB"#WB"
MV0F (.@\@Z.E,BV5I96 X@3B5!&_M#9 F-: O,; Z8:P$R= QT0.(0HN%"M
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M !WH [W,_H%,6 T92 ,80("1L0 8V# ^@ '7 [ >Z ?V((X 0#R4R:BB A3
M3)6(. UT!.B4"\(B(!HPP$""( ]6 .F@H$"R%0^R X?7@^!&SB%R!.FW9V
M H"#<(C6?-O<[+<.^(#K\,TQ8+V;K9V" X R :"(TND##'^I*(D8$GTPT_
M&(, B((0Z#X"B(,H(.$Q0 ,TL$Z-J02-:00,.*JCZD__$X$9V$Y6\HMX01F3
M#,+M3#5T>2TN:4DN9%;L19N#'*6) TEJ,8PA\SI6V)Q)<(0 )4@N#-<BTU\V
MY NY@RDDV2N4\0NF@YOKK;2I3-%']A*CA!"D=*G@55&^.1P._CE1+[%1W_77
M!+E!\<U* P$T#VG)+N2;2AL<H&(7TF(C4_O7VHUEPQK9=8DD[8629S:<ITD%
M&F"][>B ,Z@#/TB#-%B#-5@J&#"F?O,!!^ &)AG#AB#3.6.+5B_ "CGF_4W
M0ET" TC&)H _TFD_OPP4+, "0H4")S X@K "&$@#/Z!G![!4&*@#UKO:+S*7
MVYRE/1$HHE7;BK#&GP6!.D@%/M"#,_#@&N" KLT ]>@ F]7&?@L #IA<?-&"
MD.V$B5Z#+D,$1 D ]PN):@"G96#F[4+D%R#/_"#&DB%-4 $]%B#(9Z#.K!$
M(5Z#)Z,6SNB$-VCJ1K@805X3S%B0_ADCM#6,U[QRM,&5 9U)$R)QK#UBNA)*
M#9>BL5TVLI]CP\$0SYM!L\=SD$&@HW!<#KX090^YY2,9M#4+91L5-!B1D?=
M&LC30";A*=_(I/+]PI:\.\.Z6(-=FB,9RNQ=*]M]9*+<M#4:$%,SN\IV6*/)
MWUINYJ/9(S3,F]9UY/A 4#;8 ZMM@=N$9W\# "L84\\SOPZ@ #F @2]J;GP.
MF0 @9FV62,VB )+X3C!K3M!)@'0@1:P 3:H 1IH@3ZH;@0 39(!?40P Z0
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MA(%C(E/^7H);M((@" *F.<6D /Z?F\:N 1ZINX&/P,M[K<"_NN!+= #@P 4
M)V@"UP0 "_@#/&"$U%L$$:@$ZZ@ &^" &M@#"UB_Y%9N2Z0!>I8#![#9+:B"
M%39HB_!+9.*EM]5&*^!GIO(/K-V#/3@#RZR!!LX 0G@"0@A5#N@#"\@!+B@N
M1F"Q6.,#VP2!.>CAI+:"*."!:Q*")_A;+G '? .'QZ#E_GA('[%[8CN'K!;
M.:"!TT!0/RBF,Y#!+G.$R\$1ETI!U6JS5@CM0GH;44#0'(C<K-.:%9,@.WL8
M@[URO1[1YYB$-YB$/P!Z25@#1Q !3U @@JEJ'O9D#+ -J3MK&[/>O ETQGDY
M%,W0TC+#'QEMQ2(C(Q,,X? KP6;F_CAGK-\XZT=6:Z;#YN,]M#44-,VB6,,
MJ4;+P-4RYD;BPO3-R#V4[4(R]!A++,E @D&(A"YX09T9=6<$3H(0 #TPOYNE
M[@X8 U@G0!JH@PJ@ 9W%BQ2I!$#]6IO6QFGO-\>7<" ?H5$"$<.G#@L0.#FQ
M@GZSZ??^>)'Q@8?&DVY'80!H $86BOH@"+"V1:H SZ@@9^AS#J0;LO,#@20
M T1P!.7_ M A*)_'$V P*"N@DHQ !TX TXU>. 1@BG@ J=OCAS@ < @18
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MB. '(CFPT0(:CJBTB"..5.+'&3@ 80!!SI!A8M7**$$"U,X<LA,-'F2 R$6
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M((SA2 UH(+(^X<H=*.:R1 Q]6\$!%%4[HL 05"=@8AXUV""'#2N7A40D-
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M]O3 /U;H 7&0"DAG<$"(("/>PP@ #TH ,9V(/.4 : (&2@_@)L4)H?!NB(
MCZ"AA&[C0\MH( <'_*02,A"!(["RB$BL@G23J( $D"%*! @ 1%8@0M6H 0<
MA$ (4UA"G?I%'DV(@ ("H\#.EH((-+RI)%QH&^G6 (,AG8$/>RC@$'W&!J:D
M"(QP@E.=#N(MZ"UN=XO;GJY&HJ(UD+*4@YQ$(S @@PW4:1&R6HO]:@47^IEB
M$2EI":$"V(4*Z(QN=:C##8RRH*DX4A((>0CYR(,*)-CJ>5MQWTZ6*:CR9(9]
MVF/-:T3 A2Z(X'+B&0^GGMF^V^&%(JL)%%@:$IG5C.]6J?%*_9!YGD&\A)[D
M&=]@%').6_E.G>Q;WV2V)9%M940C_KQKRUO,Y+^CR0!N%> A\ZUG^M89X8X
M)!B]GD"#2]S@"17( 1JD() 9B.0.7##A'BJP-$G4H 8T@('L^$"O?%E0:8CH
M0P^"H ,$-8$]'? ! )JPA3/0;8)S()@/H6 %)T!A"5N0#\$H)#$0] $'>!#
M#9I2 S?48"1PJD0-DE<!$%#@031(10Z\B <9;- 3!=F7".JPA1# 404K@$ $
M ,$#'!#@"E.X @<P5Q#FY>D.$ 6DE=(Z"32<HB2F(^2*,N 'Y U=7+PP18"
ML+-4&&T@*6) \@@I@U7(Y"9=V9U")A**Q2'A$(_P1"1(,HDU4"B*2UG:ETZ"
MDI1HXA"&_C#-X=RRVKWH:2U^@8DG$#&IJ#"H#DF*"@?JX,@:W&H\,-&$91"C
M.-5>CS!DD8AA"(<9R0PTFJ!XR1V^N-M5H,IWUBO3\QR3VED*]RS;@@A-6%$J
M;MGO5B\Y")[Z)!-J;L0TG]J=LY;I/8*29\!O:8BW$+K=XMU7$X[(A">X<,BA
MP* /' H 56=(0QV<@0)G& .]DJ2A)RQE$EU0Y5KQL$$9<&%H-;!@B'(0I1KL
MP:-+0@284M2V"LBA Y#LP9!Z!@#W9 "F5)'22SL@@)(M60 ]S0 A[+8ALEJ
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M*RV"#*"!'"R!!!R &1K )H! !O0 42 $%!!"S2"\C&")X2:_WD"X=46[102
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M?("35$)(5-LBL$(1Z,G&\4$ _$<42$ "), !+!D.K EA$ K $FQ1P>J!+F
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M'Q#,A?2!5%# )3@'CJ45VS06V*V"@Z:;*#R"+?')_XD 0DZ1";(5YG3"X\S
M*DR127P)(M! ET3($U# G'0<&OP!4X#)'+#HTNPE&Q"2(W2<W*1"&H 4)HI
M&E0 YJ3G"()1%RB,%LC %RY"$4P&3*R! %"!$KP1' F!"[ "R@ ):P ![@-
M +TX0L>+(A(##(0J-0(:C,&"4$7ID%HCM,T K4%*UER8 (ZNO8HE5$(7E(1)
MQ"8:D-(D?0F6R %5;0(!J,$:5<W<&< 2], >S( A;,1XX($CV(S9S '^9KJ!
MVL@&5O36?WG.J)S68?@='LS Y3S";QV3*70!&T"4')S!LAD'5;@)E.3 P>W>
MF6@$9M"$.\EJ]A47]9!;C\BB.U7B*MC%>6 &]9S),R588K3/-'[2M0B7MW3;
M0%E/PFVC2SA.K>> )=V93#5P"!?!@!X[@",I8M3FH%FB"A+Z:1J[$G6 K
M>1S"W]W!%"T6(G1")&"B06P<T7@4%L' ?5A EWU0E?R!HS6"'U:"T0@$6_7?
M?/K6J]W)QJ77Y)P$'E#;J'5"EYK$6Z7DX] 8W#3)<O!!&LS&I#D:%XC 'W 6
MZ41(DQSB;.G8&=" &RS-2$Y"5X6K2NB*KB3^H'F:JR81G"C0 &X@!U0J9W=
MV1!0 B4(0130SB.R 2*PZ)68(,WV$%74 .64!)@Z6FP^D1,ZZ(_"*X>BQ$JD
M'BK!":D)S= L1=O4 @(P!(80!LE !!T90@ @0<D Y0 0'T@!_<@6V:PJL@
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MZ& -S D#Q. ?H $,+$>4&,T&?9X&.8(FG$]5=HYEI)N?C,<<A E#,'0LH +
MU# EL( 02$ _*%*_>4:H,0,3 *+N.92 $Z-@I364A(>-(R>/,):C83R@6$7
M$%*0(9*-,@7GN2T!1 $.=+$@=*4'N @.),">'0 (K $XC<>KJ BMF1(6^TTW
MQ=CE:$+ZF,=YW/$A@*'W4H7GR0"/Q \KB,+7L,&ILLR)S0%;B< A[B/^2_CC
M3(SN+!*G7_R=6\W (@
[email protected]*6QVD(S0"%V# $H=J?JV*-BK8J!QC/U&?
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MRM+\ 1$NE59& 1GOV9Y102&P4:%>@.#@"4F=1/*$R6QTW$^P#1J\P=/6VDC
MZR=/PAM4PE@_+53LHNL)3K-(!"L, JE"U"ZRE6R=Q%K,XF0\1&Z:A[ORB<&Y
M58S9"7P"+B;RXWGD[YB]"9R,UEJT1CF>Q>(H1FYZ"^^ $[V1E^N6)G %6YW\
M:B//Q2(,%I]P)Z+-!43717'9Q;K2I@#B"1AZH/_E;!_F@"3 $,2KM7"2@B>
M"&PYPBDX6HA,YG*PP8V%[UH]-!A5VT! M"8PPG^MPK6II-&<:5FGE0S@B0@@
MGIS>2;UVJI$FL S^]*313%I")]]:A='B?7=:Q0V""AD2RHGR:.B>?/8K32)>
MF *J[-YI#J I.( 23 $EP$$(A @U&T#M, %+5ZI"6PE<6$=ME0' XX$HQ(&
M#$0>K401"* AI%<H+S&/$,H)Y0LA(9[02$FCG1 -6$ ?$$5[!D!M#@;14%3
M$\ !-($?8,5:DH0JF6"\-L72- 6/2XI1S $J2L[;L%"4()%$6=48B, ?CU,K
ML **]"</O4$<XW8CSV)I^AT7N(V$?[7E/+$)J@1V*IX!%Y<MJ00=XL&HL95X
M!&>VV(X_*41 *9-9@,)=-'E_8<8R,5R?Q*IT3%$YNQ\CL&"UKH(6S-/^7##"
M730<3-!%U[QN3!"*0[_2=6585S\!#'RP4K@<1TXH?7I"48+R;(&(!665,L.<
M*\4*7<18)KUG2M#S#(3:2/@!BRE-5= . ]R!6D:""[(56'_1(4X:*:'=&F!
MY"P>UEKH0"1AVUA"CGWR0>9 &C" 262>'7;.POD)30A+_?@),E4 $0!("3
M$C2! '1 !:#2&XCXG(S:OG"AQKT:\H3RXV1BF(P$?F[.)/((,;K$*@#T2: :
M>>0 #8P!8\ZD%(QZ5F% 'FT0+J8XB[-1BYMA%1Q #Q1 -)-$D,V */4SD6LU
MCVO:'%B**4:1VDA.(R!"*A#R&;!'$P 'S^KNG:KN]50-D8#4JTE1Y=!L.9
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MA"H4-J%]D>#,HB/^\$Q9T4[DS QN<8%* *LHB$ %L.$:%0+%&\ !&$ ; $
MW :8 ! (V6LV_L460*1"PWG)<G'%BY ^$G3R)&,28C\</ !P(D3 TM2>3*%
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MCS8]FT0$Y+CXP[DE'CI@B3IFF(@5LD"A3*/^2.:PX*_;E&HJ*:0T(0E%*?@
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M1"5<OA8,U!0*(Y-L2:<U8:11A!'AHXXS,J" SX6'@D/GZZNQ'E'<+N*J@2+
M8,5O8ULMJ>!L-;'6*ND%34Q M&3@HA&]5BGBV48C$]80":U:1*>_.L%#J*U+
M3,K;H@5]T/;*&N6Q^BT"+$5Q"A)HA:U(O&82Y_(,(M#@!QJ,X0:H>DG^:MXS
ML#M$@GXBB<1_DG*@H92.$9
[email protected] N3,(W]M-$:BJT&<W(X1(? %V(&%$2
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M-5#;6 <U)ND7=A[^<9S(
[email protected]%B)0@9VF@,?UI #1NHG$I!4D%=$
M@88S.&$) $A<#X( @N7T@"%0< (?')&;:$4K;9&0#=#$B@;.\(&W?^C,&BHQ
MM$4<PF^F>(0(YM ! >02 'O0Q%9DMY*);*45%$%;"&%%%4W,@ ,ZZ $(++ <
M'V22#Y68 5+P@$HNR$=AJNI= $^"$J,5UQ39F>UB-4$LW@F&,K;[G0A89!WN
MU*][BWILO[3%O[^=C6F!DI#3@(6:.RC8B_U+"KD:D89*X"LE,#W@6+QB7()Y
MJ )UX %*-"".=3 .#>*C%57P0C]F20QOAL,JOA"E/J>914%Z0Y/@,K^PI\T
MPGG.D^H*B\3"E3$J,B81"F0.IBRC(JHH<%D%0%'U'IV@"#DDHT %W'"A-7@)
M UW(@<YN(Q+##.(11CG,6Y12K>#$]79 2S+F4"95&&UP--)JU06_Q!X1G>TQ
M*/%CHQHU'-L(C"0H<:L[73*1C'C"#VK"+!KT(X-52,\KA^B"')I@!<5QDI.*
MLP)#L."#&H0(5'!!6T0/@H;<KL%S-ZC4&O B$;*(:BLKV4@7*M !&LQ *Z!H
MFH1:4=WJPN4M#J)514Z% 3DXP $S\:X5L+ %.?@A1(.0'SU[ ABAL"]&@@&C
M550A&0,O%'ZX,J"MOK<(%*DH$HJ]GT;^%=_^TO@9L,J,'47^5QEZZ<U!5%')
M(0)EN]*E<6J(P,"G$C1&4;4UT=M,104*!0,:\*$"K#:,QU;A;=T0)C?Z:\I+
MV(R45= /E>+9E A6Y!.9?2UL+&+11">378O8*K!GZ=<JK'7CX/!&1=TY#1?\
M (/.E(>(0+L+#=#E""[7J# E2BBS69&4LDA6!FD@Z]6(K*X7#4VE(R'I8QJ!
MKJCBQD9[) ERHD*P,8E;O@0:3*O\[;=#D(<&-Q!2;/ *KI:3Q2.H 'B>N #
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M :@:0Y(#01@H #JX//0H!'.2R66 G]P[/+^G PRD ,/&$"LPC 'Y@25:D!T
M4"8OW M14$(H!B$C< 7+5(&D0HL/GH /,*02WL!,=*H@< -'Y [_2F8U,&!@
M/$;>GH@+N #.F'L,$.GJ/$Z4,5C5"6^Y&<E,8 T/,$1UD!-<L E%>PP1 $#
M^" F.,,5&LY&D^USD .ZF 2,$ &&R$I]0TN, ^"-.NLUN @5@,P@@.!K&*8
MJFOT7$TLX.> M"(48*\KA@F!LL(K,D(&@.A'G* *#-,)*( -)D%'OH<EKDLW
MYNTV3D):$"326"*A4 7+? VQK QMCH/+9(0R\(Z/X*E49,<0 T41K<=V: 05
M!^.E6N414&2+' W^)HJ$R'(@JF[P))KL[?!KH-: #S:.#] %78@3>H+%G5SS
MU;I%LA30::CB-!^D^A8APVRF4$# U/1 <11' )@"ZQ U S M$2M!R)/M4YR
M#<)R!@B""TIBH=[B)>XG6NX :AH(#2H #5;&$[H@D=1#I\INH%HFY*)%]HK
M;'"#7U B)CY@#.8@%0I2)5$&2;J 603D@W!*!-"@BAR! <1D!GB%9PBB.^I'
M!&()^P8N)]J#7AS!<W( ,&3S._;@,X*B:/!N:SR!"R(E'U6+U + IIC#)O*
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M*B$-4F%J.,4]30-X%"E3\P(UN@ T[.>=#@B!AG&
[email protected]/**)+M_003>\'
M9<:K.J,&5\-^2"1"C,TO XX=4\X"NZC?<N,1ZLB;Q&<X1H)@ZN><_B.-:H!C
M-:<&.4YD"08/)XPEB#96ZBOGCF;7YC2F<@4UNH0+:, CE"XV1 (/[FDG5R1>
MCLDLDF7L8*03-G8)", )M 1)<B 5V* "GI*B!&Z@_L\0&,M@7LA3</ M9/,_
M[B #!P8/," -UF#^(,>@6*DI*T%@DWQ #\(3/*.C"=J@$( W 1( $$+@"B#
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M")U^: YZ <2H T"X 8RJX#;EL4$ RU4BL,2XSBLZCW.+S$<5S:^Q(BN9H@X
M0"N7 P$6CY,1H-3"LPD^J0FJ@/?:( H\ A"( 2(( Y60 A8@ A6@ 56@ A"
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M36L..4F3%&<+& ):>V\)#N )* 0/("5(V %RF %.+NSXT"6(P ')( 1&T.
M8O9%2*(3,.1+\L/^B].:#.<G+?[% <>M.?^%G&];,+!*OORB"0OXMS^$UF:2
MK)!,HDA1-GGB9I,,90IX2+K@#7*@"RH'P!;VGCH*0XR$UE!R2%HH@+N@0F4@
M./@RNHI !FI@H%/+\7R@ SJ J9O:UC@N="1!,ZR($ V#C*6.;9#X;^8G4:9K
M&%F8]6AG-8FI*[JBAEM/$4<:6Q[A/;3G2_+B#EC"(O22O%/W").SO^ZV:#7B
M/]5%W&J)&JM*"P2E"!9!!"J N9@#RJ #59CA<RU L(K-WTC3 R0!!V!#YR@
M#01@#B:ACU(QK<OD+M@ !!R 4HPZ!RX2$0IF5T6(9>QG.F$B5I%"!F#^P !X
M @L%^H:Z&WIV@G#9IN"8C?XE+'RZU\ Q,><!Q#]X"2?8!,]B?>D-=2VTW!
M274D( %T*97+@ =<N997( )<V04ZNY5KN0P\( &J) NJ\@,(G,JH$-<VO\(
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M,&;%HKLG1& 40D@/O6B@-+YH#@$!<T,&;@D'U$ .* &-"0-I @EC;H&?(,]
M7.@1&I#-"B,W!#1A-.5,YIH&IL@"?, */HE*VN OD"4VV!:FV ))" *= D'
M> 0(N *E& %E*"5(^#M 3T.TEX)WIX'%'T)>F "_$"P91 1N@!D,0,O0(->
M,K!&T68E++I\YB0LABY_!LI?_D4PUR056$FX&VZL_L#4L5T2['"'G6X2I."
M%9H-]B -##?D %C^JWR..^Z)-5I.;]AJ8I=G/(QC09+-]>92$R;!'Z%=\3*
M Z1]#IK:TBI?P[!WE QHMIW^FYK&(?DG(YHF-;6B%1 H.HGI45&ZN$SS-(>I
M::[KE(+Z@/[$2P/E! &LA(NR*(K +VE%_+!B)<B84[
[email protected]+;BHC8B
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M:Y@G16M<I#>)"/=Y$@E+PR7'!P@]8-& X18A)$G=U2R'4KV39(#:X)Z<AM#
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M)WY44%71*771B @83)N3F[.N(8<//?A 0V69L1;%UQ7[-.T(D2B47[^A(O:
M"0-<R(!'4)G#M-4B(J#Q*Q\GTBGF(CG0P,%)*6& 1@ZIL*%M!:5UT@F-&$I9
M];F/LAZ1D88UXG<<VDX&+-"! /1@"W<!P+J:4)<O8+ '/2B8%; 0@"W0I0E?
MD)>\"A$%"20 ,E<0A$0(<("] , '(02!5&H@B1R(0#9WF-::T *QLG2A"XYX
MG2?0])+?.*ESB!O;<(Q#*E4P"0]J\<-J7(9%ZZRE.GKR XA E+]6/<$D'WE#
M:QI1";H1D7P:84C6CK,*G?3P#J_!@",F81:M[ UW ^J))V2 J8IYPG!@^XTG
M*G$#$(@!!!2@P!@(X:$U9(<-?Y $=.2&GD;^C.\V-*'/J$2%H[[UY&Z!BYPA
MCH0X&HF)0%?#TBK#9*10\:0(3.+<W8KPDN- :8EC$B7GPB230TB1/L<QCL=
M=9O,"467R O00HPY.8_Q*'=*O,,DYL"!)^SA([IJC0PP8!;8&:<2B>(@!?C
MFDY$(B=FF9;K>L.D+2UBCK=A72<XD"'_<8I4A,O-(B;A!QK0H *=\%0K3/'/
M&GS@(US8826< RP.\*%BK[O(/&V#4?NLDU.X.0YJ0E*#)WP !MW1UADPQ,&^
M-&&"5J"+"(.@@Q!RL*49"( /SA ?#%+WDQ0!48$P(<1($ ,.2+""78@>6L
M(5,R(.(=9R #$33^ A&-N$-9BCBH._1D;[]A4B\'Q"-E'8(1LOR*#/Z0@^BX
M+ =Z&D\E8):&[#RG.2/BVAK84(,TE @M=TP)'B(1%*\DT459DA0[=WC'H&%
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MJ( #' ,70=8 A1Z@*$S4* J:R"((PA5";FA001WF!M"N# ^C,!)%&0]4TP>
M^QM<^D1*,SF.(]#P)VM)8JEI>!DB: 91/OR!#2#R Y^9*B5-M#<KR T2(97X
M1PQHD@&-0,]2$;$@QO(DO#TJ@OJZ0#=+K()..T+H'\: TVZ=P;,:DL,<I&"\
M5A4Z;FF4C2>"*S)-T!8XX3V3LDXI,N-4KG'^JNRCBP8$UAPE"S<PZ5CGCITE
MH%B-CZQ-%N!FXK@:H<\FB\! #G(H X-D5S^/B!)REO@2^ICJ4W32T8T6P04V
M.* #' C>0(H8SM<Y21.16,,9?* #$'!@08L8A"JB=9_M'FL_99F!;<A2B3D$
MP E54 (/$MR#/\A@2H2M422L5PD1P"F>"9P$IEW3,#348 XM.,,<QN,(-R&0
MWS@A'TL@-D_M*A 1?'B"GBK0@@!$, !!X*!-!1 "FC+ 6-HY!D< (,QM'H/
M'*@Z#?Z]A!C:Q3-[.0# "-"&+V3="3WHEM#G(,DTK&D&\Q2-PBSV1ZHB3:R<
MDQ/6LE;G9:[6*US^2 -Y_IP=+$I'$K]CP]M^9]JX98H+CU"%Y\J"AX(?#DA7
[email protected]$>\@2M$3-#ZQMDD!_.'4Z4#ODA%SA%H(-ZH@8MN)"%5FV!,[1 0Y_'
M0X+XP 9)B*@Z\>E-<(O9*;"R4DQ(4,4@-"&R6JIHN<U][>'"E".A[/IVP__-
M(31!QT6$DDZL9;ZVIZE$HO3P+(W "F.-,[NZQZ1&0;I1DKCO1T":]KZ Y%I*
M"F*HGN!A#2WP@<#?@P>K$%P@8QQ.$S5K0 AG, 9_0%8VD0,=T!=+ !8( ^
MD%2(0 )3\CFZ81_W,7XDX# RT A/(! J(0-<L 8T$'LP<%\7<Q&%$BW^GC *
M,8<:]X$'ZJ1?GL %OS(S3\!R9X V%@ "01 W&(AC=19%L !,$ _$/4$ U4!
M3U -/ $OU,'"- !'> # F %529V5> $X-( 3= 3!Q7W!>;*!%IS )7=!B
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MBNC# !7@ Y@ 1\6<RO22<>A/9. !AS@ R!4 <FH-W]@ 5PH !@R9'.07J=W
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MR/((C@!X.< :S)5<U"%;+4&+9,I_X$THV-PJHF)!,*,AN-880,*AS0'&L('
M.60=>B(W7#!RF\:.8B(F1;!#-%F76%-J>/ 'E[ M)^6@J]8"+8 &L*@)/">A
MABEWQ2$R01$JED4F).D5"/0T)&: 9G%'4H &N5I^&R *N,-^T2<E/!$XA$0D
M8L(DV/5':($'/"&HBW,U@LI]->&>QA$XIX+^.H[#2KJ#.,/5(,IF')@C73BQ
M :@9*CUR$S=X!YKP$@4B OS3 FS0-6>11EQP!V!A'XZ@)]HQ!X2P!XM'DHT
M P#0 Q3 DE6!:7/3&JC1)6 16#/B$X"T7AH&HP39IBLG!T0V!TN!!A?#6(<0
M+?L1"5KP"&>Q/;:!"!*:5GXP1MSA'GQ 4E2(3=F4+30@:..!"!_A%KA'>-ZQ
M!SM#"!0@!]XB -LB05O8 PYJAEIV!@@ WQ0=7S04&BA!3)@"6E$F_K6DR(P
M YSR$KK3,34A,DF"!)QC!)K ',ZQ!I5V1VO0'7M"-VW8");0BL/"G3S2AS12
M?4,B?)79""[K:FK^V6<U8%JE08^MVB._T2/(QH]L)ZP0HIJL<'ETDT:](CQ=
ML!/9%@F54 .4)"(N,PGFB21"\BEC2TO7YA/&%24=2&#-(0E\4 (4T"T?T AC
MDB/9^!7+I4K-*A,\ 9]<$A*U.2:<6+N::#BFE"P9X21%HD2&.WFZ0UB8,U@<
M(VQ>(2GM!(OWV! 949=C8@B=T"HX4PEQRBI[!C23@*OBX479,8B(X))2T@ES
M $@ 4@0%(C(@6]DK!Y=%U:D41C,[)]M2OAAC&,8!O6!!55QX3II2 !B"P$
MC!-NTDX9L7JX,@EK0*3;X0=8&87LT7-/,$9,Z =6FU;8\3O0L3\P\ 3^'<$A
M%. WF*E0-@M&\(!<0$#0C@'[1%0LI$>]]H4>&0645(LR,N=8QLY,A&.5L-$
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M7BZCLAF++3><7G^V5&$$(H,(%1Y<!X0@!RU 1;@ #I 4JNF90I)PS0@"1\@
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M-6"4 F!!1;@V%9!&35%52,P%9R !+* 0B !5B '?D!$B'6: N0FJI"-CO,(
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M QT 'C!"!0 =O;;*>R"I.P/VK9F5SS 3BE SY0/VA5BES0PV7>(W]@!2'P
M $.@!%1 Z35@VT7^U+Y0XBP9NHYD$E]A9AT-]4U-@6:.\ ;:00B7\ <-A0&(
M<,P[7BP-DU6&@A&1,HHMX[U<,Q!2\ <>C%>":TDMXS*"&SR+JB#9<1).*P?'
MW0$?^0%N<Z?8'85'5I3, 3PC C-%E!#][I("1"B<PH\*81^KL.=CVWU.8CMZ
MHT3"87MNT67J1$?6<RTD:)BD3TG7<=,3,Y=L<N%<BA:M@0%09:NGWK)14?!K
MT 7+5QS/R%W),F#@= >PO,EB+4IOEFU#0LH;;PHS\ 9MN'&Q A"M0*$*U<H@
M*H,'6Q%$N# 4*E2@3(GR),.1(RZ3T*SYX^<#C0)R6IR9P\?/GQI__HC^$C7H
M4)$BHA8]$L4*E,"(IEB90C*(I291.B,># 5*8I&=HF1P0;D&4:5*DQS)Z#3I
MJ0Q/BPR9XHJD"%=3$G5^!2O1T*))?Y[($2G'@@402ZI L2*G$IZ@7%DAF3@I
MA\I*%T7(P-,%30X_-/BLF=1)1"=+4;E$TD16SA(@2N+@<*+CR5/'5.\LTK1H
MD2JN2'>:BKG(4:6G7+@XZH)Q4J79B/Y4X,.&BPR+B-G40,0E1XY&>$Q[6@5T
M$1X\=V14JN ':HT:E= @POXW:J4UQ[%7'Y[CZ20_;,PCXMZ; XTG-.98D,/!
M9$D_?M;,H4#! @P^_D"#"T0X6&\V+M:X"R/^1Y0;!8^L[CCDD>@6\4F4KUC"
M,+4+91ID(KY8,20H)%3!HY-*1%CD)2WNL.0//CXPB0V/^*"AA K8XTC VVZS
MI)&,8#N.O>\:N6T[/_C@8X\*YN#@#/L0:02KK#RITI/15OE)A$8:<40$3X)J
M""&$C&*MI98^! 6)FVYR"!69(F$)HH<2&C.AA?#,LTY43"F--B-A6\,/WN9@
MBP(YV%AC44G^6*.EE[A:Q)/!\E+(J-4T#&H@HPY"Q::)/'GMCSW\, ^WB]!H
M2@3E\M(I-;UX HLG5@Y91(;="OC/24*<#*(! 1" (0='POP*"1%%$:''QO"(
M9%(\,$)D#SF>L,[^R]NZP&I%OCB @<>>' B"#EJ>..W3H ;S9/HOMIIS4$>
M(4T4/#+!2(89TA6A"]B^RX$--OX #@\N*D'I#RY$>*J+.QX!2L/23BS,NMJP
M^^.X'#3*H1)^V4LCAS00P5AD-"KY8(\<T)BD"]TJ -"D"N!3S^#TJON#/PKF
ML"ZJ'#C8HY)&
[email protected]@DO,1=DUCZ1$M5AGD0Y868>F0#R=2Q5:I60*+-$-V
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MVV&/*5Q2!$-H@EW[FL1DQ*2ZB.Q$>)I #2@>\A X+:(JT@I/#KJ 2Y-*V ;
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MI:&E/D>&7a[#3Q?WF@#" ZD27"L8Q&1R&7RLC7PYF6P'M;&<-'W@"#&I@
ME93\(;/9ZH1>)P$A^D4K,)RCR?9N13G\M42])YJC0_X?:MF]Q(12CY%.=-BU
M.3FNB2^K$-)NGB!%T_XAJ'J+RFUR*+*+C3:)J149H>;PA,#0KQ)/LL 9+( ?
MPUUD*NO29@X^4)(U3.6F=UJ(*;0 G"LC ;O27=- /@4*4-T)<S:1+G/OY+I(
M3,(J@U+2K^5P!@H Z"1I4%DW&R%.'-/O2R)XEGTY5:9PXE@+.AEF*TPA@R].
MI2HK:Y ,S-HK1*XL*W;LD*+W$D=?4HA?1>QFJFHP!QH85"H4S(JKH,T:3=RA
M7PVJ"!I@(( H $(50A <; 2B55H0=&/$ %4NJ#&K8WR#GA(K2,H S66$P($
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M.\" 3L "9N=VT"$!ND$L%L#Q=B#->"#)X X/C@,\,(-D0F8C7@*8M$UK*"*
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M2OWK '=\@CWX2N:(08P(&LJ1(S9 @ @A%2<@Q:P@ ZP IX#S98!$"\%%;P
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MB/Z$GCF#%LB!3N##6[1+B,&#XR@9+A@E+O@ '1 5B"*" NPB30^B<Q<E=
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MRWP2'ARJ/>5PCJ:"H4TYTYQ"5<'" $20@P ">P@C%0%+HQ.@&P A_@@+:Y
MT!@9Q2*4O4J@"9?0)BZPG\^%4WB:@4B8 8P@6,NQMWOK&6.> QM0$">[ ]38
M"200 01V ZP6,C]%,'BY#-SQ?P)H05>H#:0 T2@'+V2(%&:.@U))H9ZK KN
M'+%R.:^3#GXIH4K(W6?Q!(6*"A4=3 (ACC(.F9:T,DWH''SC.-)@!!248-/P
MVKTC1'X"E6:-KG!"U8EHN;U3JL6Q$L,X-8PX#*?H J<;QDB(EK2H P-53@YX
M C10$4,8A.G0,PG+H30 FOX0_@-662-1T39'R MGRQ-0T((9T#:^_0T,J,*+
M>0,O<1RR #K+>3]2M:[,F0A"PY*^;"$,B!TTH$5XVA8KN2F@"YT,PJ3]@R;E
M5$YH$L$9L62C$(N0CB".UJ:JR"$16(6?'-5E6XB=N"_GN3B9$!3D4(XITX2F
M @J@:Y->!#HDL)4.!0$ 6((#L +[4)(G.#HG< (!H(%!2@^U+= .4& 0V,I4
MRD(1P.S.$86C*#Q14+D[#!/'/00!AH$.**_AJ 1+&*.@L(F=R $*T $'H &"
MI56=JHA.QE;?R[+IT($JP $J6()A:2'?R[N<_DN66(4(*@TL,=:/))^G4$2:
MB_Z*\DSLW-4W0%DH!N RO\ -T2*.2F .9^$@=0KPI>H[]<:E*LE=J=D+PJL:
MRMT)$S53YI.(.T!#&7"8(HX._!N2R!&911%;TG@8;7H-,CP#'P"WDC@I/KQ?
MORCC1:'9HJ(?"_FE(F"$R,.##AO58A.%3E@X4**?07E;P8 0?HHN['H3^:O-
ME5)KL?*]Q\"JL,34NU.C>4GD,@$%4?B#U+6 #*#/O<YK.< 18%4)GF 35OBP
MY[B?I7)*W0"35P(F:(VEB> *X?L4)* (D9FPK-A#FL@:Z<-S-PT5IO"!)5 #
M VB +_?7 -C))7 " $"9I[B9;Y-( +""#O #$1@?_O[Q PLABXMK+.7Q!#D9
MXDY8 PX 1"PL^*8.IK8;%10A0K0 1WX03'!6+%(R_J+,)JU$DU8B@Y8 BHP
M "S($2^)9J@0@<&P-,46GYG#):EI&A0JC"W.K=B1"O8H%F@))0V[O3D%P[.=
MA-I"N>>8"8^:!,."]D5 P:^1&M)8//9DB02C%=@41V=;$S^I! $X@TY8FB,F
M):Y\I,A1E9-(D=&8EU3:'TF8CYWC (>5DR) D9H.6IZS$W7%*1P/Z#4YC7)
MP=G,H,BQ+7WCGR,*C"J_TS5!)S[A$YS =[;43."0"DN0O($/6UUC !H*DWE9
M,+@T!41X@A;( (!]QJ!/SO[D? ])2 GV0(2RJ'?6:!H4O)7Z$=OX"8LSC5S9
MA+]?NIR!$ 7,>HK[*8W2&$ 4I#8S[<-BG11\:P$K@'0%MH(EB'L 4& !"( _
MP-3R,100J/4*^#,9M ?L KE2.K5SX(C8C;%H&U ($>L((@*Q::\![8-%%1
ML =,)!.@"[)%I\GC(Y2,J*=FY**$($:((2WX 9KHV[08/RAA#G>"RI\:-5
MB(3<F@TGDP&O<HRIP*I0:K%;R8J!Z83&60I:O TI1X0[X"VM6![QX<ZL>0E-
M4#DM0/@=]I,:_<8B\&$#!#J>. 1-Z 0YH(( F($181=(O5FK>&M!@3M_Y':@
M,/X$C6.##%#U<FF0(Y_BWL&-R3-[$TU39WML@$#""@DJ5*!:H6H%"E413X[0
M5&KD2 0B/Q7\('(D0X0,3YJ*F"J8\&"K5J$2CD3%RI0H39H6>9(A X,(1XVZ
M3.S4:-(D1&ER()KDR-&D2D)G>!0UR!13)*:0X/D#X\P9"W(X%""D=0Z;/T(U
MRL CHXA3@08-FBHB:FW+F#5%X!%EB.E"D@A/HCK9E-7"@@I-X9'2182G12W9
M,M+$=B$K5*8.M5SUR),GL2)J6'" P$$/*TNJ+ '00P<("XBX#&V4XT^%.18L
M\#DMH]$?0AQHY)@D0ZDI4+WYYLWK6Y2C/R "^/ 1H/Y&%T^K1#&E*W XC19L
M)GDBB&0X(\IW[D2Z$S82%QH"K/QQ)+;3ZAHU<G3J-+3G:D25&&A<M&H1?YB>
M'ADRB"B+A'4'%R)@P$5\0XF7"1X8=()').$M(MXCB\07UBIXB'"@6)6 54E&
M_-WAB2B0K?6(*/NY)$H1AAC&UEJ+:&+*2@(.: A;T3D676^F:((' SZ$D$$D
MAAQ2H5@;3424496D4<,?:ZR!"!J38"##'8HMT@@;9P30P1PYX%&C*4LQI0E%
M.6AD8F]G@>*;0< MA-! 3H&"A$DC =D)(D%A@ $:?K#A!YLR=-*1)H8TAM!=
M!9UTT)Q(J*78A4QB,-10-/[UA 8BJZUQY22>OB%48=#Y*- B;WQ@P1D<S,%'
M!6RP4<,:0O'W""-:O(3J4P,5Y)LI<[&T2"0R#.4<2-+5Z6BPOCFE$DJ^K2)"
M)YYH,9<J@ZC"%K>&S!6@*#')-$.YGLPP"1L5T##'&0( L,025NAP!@4T@"A?
M%R*N48&LN0UE226KY6!K<]#%F2>=*B%!G'D^.$#!'&G(\,@@:-)E$!(-%UR)
M#%H,=.. =RRYY!V+B/"$9WM,THFY7'2!FGHR=3'):G_DD$8E7&A9&)?][;?*
MAC/I!I=,7.!QA[G(:F29(XF*(EY8'MWA"-(.>8QR3UUT%(EA14"FR2,OG:P)
M(_[%KF6**B 9%A)3T#G%TIE%#+2LCRCGL 0+#I@XR"HRX9%H)P@2Q1,B5$XY
MY1I/R["!4IVP80$"'52 ':J^BH*'S>IILE2<&MO8E$$(];720B>59*<H&%")
MAB6.5/)'#6RDX4B66B+LEUTC*90G$@(^IUCFR(I0DZ:._)G\&G]8Z>F?IJY%
M+,::=,&''!9\P/PDC8A@"1YX:,'40$QIL8@JVVUL%R@KO0V33/G--9U*C T[
MR"$Z0@?2('.-/PA_N?,E%*Q8"?ONH)-)I$$.&9A##2HQL#>HIS)#D4\EV$ !
M'?0@ !2 1L:P06A)*IX1-E7#D"4-$^<K$/>6P6<YO['EQ^98A&3N$T-A'*'
M':DE;8Z94_D6$;[H" B%BQ!+) JS"BT401,YZ$$;Y%")"!5&13.*!!ZLA@@I
MX<PH3W.$?A[A1?T<BVEP21H>4!@3/*S"$UX[%7\J8Y@A5L9$FA!/&<E#F"!9
M#2EH- R*6F*8ERA&0(RP'TCB)#Z5V$@EJGA.@)[B%%4PY1!,>= 9E "),W@"
M,IXP'H0X@JBA?# '54+$'PCUAWS%11..J( <:L"%2%RN1:HPQ"-D, D&R& 1
MQ&)8CWS#F. \BA4G05U)'(,'/O#A#VB '1I$";!$>2*1*$'=Y_ BLN?\RC$#
MNA 515 44%7I#XK+P97R<_X(^[$$1Y'TQ"2DI)Y5>*XW)"')2-8BIVF2+FYD
M^]X[H>.8S_W%C_S9CXSD\C8423(XJ(.3*9#WAU34X#PZF,/RV) #KL&$9"?C
M$")@<!P'R*$"4#I48<0SBD[8#$1AX8_8*F28NB A%.OST7#P )1)C,)$:X%,
M&HWX)K2HC5@KZ1:)Q','*4:G$@*H0@=RH*5<GBA-!$+6S8!B'P\Z0HV&"5IE
M- J355"(/WAXQ'[THXGG9/2/< Q/&CDT YA8*YJBD F)%M%'Q71K10.5$23I
MDB>F.*8L++%8=$26ED.H @-_V((2% "#1S1L$5;["J*8-KBB_&E@%O'#&B!X
MP_ZHM;,YBAF67A>AMG'59!1MDQ-?%#:_X$ JMH\J)BL6T2X_B.I3GJ*L:4^G
MNU:P KC!$98H(-DH0X*D".7;Y"1D5\IQBK(27;A6Y\YY&+880BV1J F-("F2
MNZ0N=;W,BT+".Z?!HO"$:6M,8PRY(JEEB$;">XY2O)7(4#B*=* H0@YD58,*
M.*$-5J '_Y;PVOYAT:BJ&4.P*2##M!@LQZ;47^\60E+ Z;+AI$$=:GD(*D
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M'^9@!2P( 2Q&1BNMLH6M7B"#R 00+JO4@%$B$"2T8&W#&I6O!O^:-/26E\1
MB IERE#FA F? 4764 -#U?[81C-UL6]6DJ+OK<*OH%A%!0" !1IPX0Y"BVI-
M]^7<<%*I!HB B=<F+98RQC5&,2JKB2]$HR%JHELVE_F"8<*(*KL(S J&4:X>
M4P0!76CD8HMJW-ZV(_'%S2D@J6]+[F"%*! "$J @2;R) J;V:<2-)%))S#0
MA4;PRRA_Z$K!IN0(I(BU,!Q^S'(5W!:6YJ[;*(GMP@187DDIA!6(:!<?UI S
MHW!!(F52Q>C(6Q<X]>4L*''6GL0[G&-U@90/ET17>$8C[WSGR8KI\'=%TA??
M_MV\> &\;+6)PS=]^,,LB01*B]*(:Y$5S=#V)?HDA99%5.(J<WC"'# 8@#-4
M(/YFKQ,!C1ZA!8/J:!&8$4 /@F"!"%="!,:-V\@L@1H\M.U'"9N?TY?;U3*6
MD>R9<D3!_'O[10S"+$T/F=0AXU)4J600E>#,$R*(UZ?XQB)80@[XP</]23-]
M2G.(A<^0T?=\%5D1U(J<U5J<U2"0%6%1&&^@5:],X$X501J5S8K0E2@(Q-MH
M0OG(2,'YB%K$2-J4H,2]D%+0DB-4 0\ 0X P@2P$"M\W<"4T/'(QV15!,ZL
M@1](@BA9!!IP099\1R1@T\4<PB.$GF)$(7T-0IX<V^1YF[1H3+255T(4$T)<
M1JP8RDTUC6D]Q:,4A##-B4KLR:J1EWF%%VUIES<9&?ZAW(J/R82U^-A.A41^
M_5TH;$=>$)/> 9,6,MN9^.&;-,8A-EM,?!!J5,RO80P6KF&P?)A*J!(?6 %
M4, 8P$ &.( %C G@E(B,^,BX5 (A@$ /^ '[ &2R0 D"813C(L,',A1G8BP
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M $6>Y'4A8RR$*3Q"(WR P2 [Q*A*D<TBA%7X5.:]G(@%!$!7! "_S!8( ?
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M3 $E* "W$%KB@A$?$6?44D:-%.[U$&A $4:I,('4(4<S$$%<-$C:!O9E$N)
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M8!8!V+B8C[#L4AQ=G/ %2%B<@$A2T^E(O.F ?" "]@!)?3 ##C%(&"643
M%[R!B'S*L#YI@?W!3Z3!'_ !!5C%LYYC?;51&<61<[1J7\PA?DU+CHIG;VR'
MWM%DLW$(&B',^LQ/,/'>Z2I$I) 7[WQAN*9$U$5'D SCZT 5X)E$N,:K3@*'
M9?YN###MEX>VF-],56%\;4@0DTZFZ^W>KK+EQ0M%@D/EQAA-0A54@0#40*_"
MV&K^QO@FEX^H0E[92&OYA@H"[Y"NCRAL5\V,HY'IK',I3IT>H*FA&H"$3G7.
MB-,X0LP0QB,,2[=H@5BXZ20<R%O='&6( /VB 6L4X*W@!(*<**(D37^\Q-0\
M1UXM'3:EQ;Y1(#RIA?.IK? 4URQ=S"-TBV/VE;",<'%)DJQ9&MT*K3I%AXZL
MP@8T@AQ<W14(P1!0@A-@P%, QKX8A6\&124LCQ^$HY$9WI0\W*U=&.NZ9ECX
M:7^@$*)X;'#-H7AI#%HL"UP"8'[Y!>D<'5FL!&;NV?[HU*+;+"5C*$1,45X<
MLMY,'<:BV ];C%PA 2*LG07M1IOKWHGKTFBC(%O@F<)^D$RDGF#NA.'>-8IX
MA6BX.HHU.0:&O,58M80E0$$5. $,= '97NL(P^T 628.BP] .:CKBNXE7V^Q
MX$$7U(PM,VY[/)RM2'&1F1K2:.6OC+!K5@@N3L(I; _7_"QBL445Q>>5<$1)
M(8J;>HI% *57\&%-2(V3K53<&8:X^%P@2:,BQJ0\[I2*T!<SHT@+B[!3& '[
M4(HY'QT2TP4 GLF5,AHDG94G=,(?4( \( 0LX "+ $71 ?6E-"?;"07H('#
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MOC4R3*B(\)@)K]G5;ZBJC^!CMV ,2%CIOD4?KYW(C'A"(^R!K?( #R@!"[#
M$OY(@2&H!($4!7U4"<V6DLHU4S,]L:SHAD&Q1) TPFE D]I&I!_0P!K< 2).
MWC0A$CT'[%I2$]T2%U@!7'M!8YT4[^@\9>M])2@8PG%.D*+P!@"FQ!QFH<">
MKL;DJ)7F=QK3EF\,@@H7U#EIW, -HEC**_SVJ'!0G*HN0@78 +EU]##:4LML
MR6\(W'8\)>C6B;+-%B#6Q7"XXX L0J;8,@DM3_9U@I*%SDSA"$R(Q7PX$&IT
M@A/^&F=K3FN0&Y2&Q4:HQO+4 !_42@DQ7\GR!*%^AUNVH%]'@MA,6MB0H&Q2
M(O[,(Y;/$EL443^NA6..L')>5ZS25'CKZ,4HQGYX OX:S$$/&$ "1$ $_#8+
M), :)"Q$BH"@)3<7\(OV(% I/7<-,)^O^ W[L<$:9,D&3]HJ3((?6,4?'%=^
MO_>>6.GZF 7KL1K]26,7W7?301UI\0BW@NN_%ENSR4 EA..5>/05/O5PH;%/
M,YO"E&#LIC$A=EK%G4FWJ 6.;"K<5ERT66FQ=9I^*VRP;!I!#(0J],3#610#
M(XL6E8DC)<S"G!Y?9&*,PBN#M^MAQ':Q%'/*DE()Y1)2M9?KB163H!U/H(83
M&KC7=D$-?, <T$ %U :7 NBD- ?/.E[8(F):,%^T'OM:,DCHU ?EY7/>.Z.
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MF_V=B-+X<P X 0ZL@!*HO!*X NXP!E$ D',G@@T]* U O=$JH&DP;KL@7L@
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M%_D]*&WKV"W=FC3??F=[N*;,KU(OW;WDDZT/B;)Y2!-/.IDC ><P"$.(@")
M@(@R5H"CASM,0845519Q)(<UGNMB$ADB>02R1V2HI 8V:O CATD<6:4WX#QQ
M1,-*)ID$C522ZD2&[F3@PI%!.AKJH9_\"B6OBH#**"RK?G+L-$]4\X0E35A\
M21--'IF)II5:@DRRHE"!C?XR(T_"PQ&E'A&EJ:@^ BDOO+[RJA7IX/+RI[O6
MK BS/,6BT+2R#(%I+9STBTLCCXJL*J2,++((%$\0D4, 3CX@PM/6M*"//KH
M*\*M(@XQ3S9-5)E0NCHGLHC"BI! DD)01,FA@AHFD5 Z/F%2;)%'SGQHJ+%,
M$D4Q&1RIY+:$GLLAC4J@%"4MF,Z$:1$1<L .$2XB44D&A&JSI+$@2\+# A]@
MX&./-5:AR9.E1#DIII8823=+*D7YU#$D#M&BM4X=<\BQHOAU"*XB&%GWH8+C
M<@NGM7Y=A,IS,2#0AR4@6$$)"'A8(0(E6&@" YWHN["2A";A0@2&B\#O$2YR
MX/[#CS\0Z9!AX&2",<5&B'T. ]4B66SGAT*24[JA+OH(HHM&0C64GA[BB5U-
M9'B:IBO1U74QQ52J$J9##CF-R[=VDLBOSIS,%2>(B$JRE5 XX^K0LZ<SJ:BB
M\PQKKS>IJLPQ5?IKZ=EY<P+5)68U0AI/ON96&U53,/S 1 JX&*143T^36]1
M3@/./QDX5-&3@<EJ"R=6:C4[U=%=[6+:2F2(*S:6SFQ/Z+F^8V01,B?) :';
M9.RBBTYB;@G7E=I#J=AJ\8!2P"XLZ<23T4PZQ)#H-4E%!PEPB**'.C#(51.&
MGV7WMZW]HVFI7"UGJ\O1,VHJ:+/'&M6\Q\K6*>CY^OXT19,9,%@#ACHR$, *
M">"!$B)00!Y$0 @K4 0:M":7^'A=C!;5ZTR<I(NK,$X*I)!S%9")1D@8@])
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M<\+V= TK5XD(1039D+>8)%"C@IY;1*<IN/WJ;X-812<JP8<,!" 7R! %8
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M;(%,]U@R*(;*%2B:*1V?W,.6RIE$(I+9R><<4X09@% . #C 0B @P0DH( +
M(B 1XK ",, A Y[024EJ=T]13>BA11$%-U/$HPTJYER/",X?*"6#5;"$2_:#
M34B&PB^,?@DH3(/;0[/B&-DX":124FDD2,J=U!"6)N,3EB-R1F"]OD2N3^$)
M7>22)L(A;4U.>:)'_ (P7@VR*D'=(C,=LM3>4!98_OX1+T,/\0C%M&0D3T&C
M7=*6J*290I)H\$,-T-")+?$**@Y)2_>&A0@,:FAD(E .P_H(DX;.E%3P#<DJ
M-"<"3PQBO6.1$ZHZ<X=*^ $&->B")QZ!0H=T<C%7(L]:NF<0I2SB$!'IB2H<
MP;N!< >(+RT*%<B@"#4$X0P-P $+5A""$$@ "CWX V#O %Y,O81+98%Q2RIG
MDT1Z;%\+#@H2+$)I-M*67621,WZ$B15#7 [&]%F%'$!PAAXX(0%14#45$A""
M*Z0S JY6@A XD8(#5&)^HM!"M]2<0E8,X@Z38 .*)H&CF6PT1\#! XZ@9(BO
M'8TD5C&:KW:;$_GZK-)P:?Z-1F="$'@A[VE0.UXD5OHT7EH- XV8T;K-.V*_
M+#.^_()A5#"<J,T,[DUS86%4^D+O0H5%PWC[E96HI"L3BS<FX&4*I4'RU)RB
MC2=_(M.):B#'K1&J*;\Z%QI.M >75:)W.:K:=]*BUB#-I2=!$0692C;?H!T-
M+SUA@!_D$ ?/"XZ0G%5U:2D*X*EY:,CZT09*^,0/'"!"YU8#1\9@15[3>$'
M4P !3*P!"7 (0X22/47?% #Y 3X.Y]"YI;8(E[(5-M7?VF5FB$J[].('2L7
M/0E](&-'R1G"$S3H@ _$V6H/A,"X(3C@%61-!!9 (@8)6 .:^%7RD^N;/G=
M1/X%V)"4Y+ H)3L\WDM2LK-X3I<A4"%2CNGBKV=ZS,)J3>%T!K&6_CSBI#SL
M#DV>5J8<C90F_(W:*B(A INA0=WV#.(<U53%.3FE,IQ9YM!43+351_6,LJ7B
M3;_R*Y<8O$J,8.WLSO62H6W1WLH'A2@Q@ ;B%*<2(C#RTHA"G\S]H0)\..C(
M2,@8_U@),JKP5'O8WQ0DK5SI/.%D+HR%J.H0^" K +K( -1& 5',EHB(EA
MNN=U'J-VN, 2\. 1B@#EBL!)1.!)=@:UKJ(2CB 15D 'Y@ $)& %,"8*JJ -
MG& +!((@[J W;A!?XD?3UL6.L&(RIJLHX&(G( )OX/YB+;@&/68*B<[G+0!'
M4,Q#!C@ !'0 *( "' !T( "%C-SUQ-G8C !5( $I1@#C0AD,;B9!9L"#ML
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M0DXL4*%Z0VI.JO8P .831,"95T,P8$F9"I>#$RFPU,Z#6ZPT9DNIWLTX;^\
MK2#,K?8&0I7<PR7.14 8X)]4Q/:X#'J2**;61XR&\*$R,2AP+)#VC0\_\6Z8
MZ2^2:&B2IDW:;RH);C&&K)'^!G@(1JB(IL68221.@N/X0/[^8 UJ8Q(8<@VZ
M0/Y"#.9/7@01_"!67$8I?,G@%$,30.QOE+!7&,(M"&8^2N(G=TL4',$&., &
MM&R":,L_[N#\.N19F ALQD]3VJXD3(I%IN2\5F$&ZD )?N (E" #<B *6I"
MHN , * ( #&!)W'$$YTH7(2/,>-:TUT&I>^"]@R$*I_(,\^B- 'M#:YNXQ
MZ$IF3(C),$0.L& E@:" KH .> 08)* 9I((A$ !4D !EH +7-,'=S)NJFV,
M&FEKSB6RGF:L'&'=&L')O@CA$ RG^(5]=K \@X3>!DX43,Q)P#(2^$L&<F8#
MQ,H1&F&#- '*V&C'TL5"*=%"A=%D8$B1EDG;BH G^/X"+QG,PO)1WVQJ+TKQ
M4&1*1/.B;O1B+,["<H"%,22G(C3RA$SA*]0&IY!$X#3A#G* #>2/#4B)6#Z
M%W-@=;"B/O! !#Z#O/QI(*"1;W0%4UAD720G*X@Q5<#&(?##!WD4AJAC1$!N
M@[RL/\+*$?Q _@3"<J ,D-JK8(*&C6!L QJA#D# !WH )S@ ++ *X $G[@
M!.+ M( !Y2 8GA I8 2@!RC #]: (;L@1V:/)9J%B!Y52E?3R!2MH;J&
M6;Y#-A8!7US35[&T-V9B/!P&$3*U#5IM@ CH):_@U2)@\!)$""A! 10@ ?Z@
MVOBO7N +3")#E#PA$L)-!/ZX0$:FI5J<; (ALGL>XB-^!3*$PB1<,:VLDB$6
M33W1%0-$ 1U1%AR1E@FH0N6@OVT2Z1N%*# \@X)YH6^)!/E;0CY4"\]-!\]
MM!.[(H4()Q-SJRHW _SDS6OH0W*6#TGZ)2] 5G20" GFB:P8=0YHX*#*!%;X
M@!#FH (0009"9XQ6(EV[0$8LP1) 4*% 3,3.ZZCV2BYF2&@J8RY,%LF4AJ]4
M0?]>3N,N, =LM@)R@ OF*,4L(TXH9 @-)A6<8 HPX05^X <2P6W)@!1.@!3D
M%A.\( 06X .* ( (0$(8 D0L@=Z %9!P.-J8 T@1TJ4+3&NB_^*@*&2$"?6
M[_XQQE,M5BZM-.TE$O5,)(D@9 "@:&16&94/Q'$)HD#PJA40K#6=E$ )B,!U
M$P@.> ( "$ )G<J?^/3*HI7:,@D3"HUA$4=;T-#7L81<&1G8*\[910BN,@_
M1.&)M"NM%FQE;2@EOA($5?1%1ZA,U"^),.,D%F&LD )'PPW!'!2F@"29TH@S
M6F6Z),/_0H]54F7TZ,)HU IM$,4GB@9LV$\OA,*]5L5PU,Z:+(0+UN #8( #
MYN #*LY-$4$98R4';%5RS,,FNH=,N!=Y81$X5D)76&(YE(-U7"AL?J+T( T^
MA(10X@NO B2L;J<"&E@@7(,ND 0;@[ G#.$.4N$*O/X ;MTV$<@@">J6%##!
MB#'A!#!A"@Q@"00($#P@ :K@"YK *S "@Z@"IS N;@$OR@$DX+6$[)4N:%
M8#(*TD["+$R"+?K#%-("S2Y'_TJT15[B#BS49CPN%?A #JCN#,X !)Q@"0@
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MP " 8CE-@8@@1-B *0A0:2-. E2( *VX "TC@I4S9&AP%-A< E\H ,XH *4
M)7#*3#4*S=&X1$_--7/YJBPP!SV A\@B-EBN#$5*0 [X0 4W=7!I"8M7TM6P
M59%?[5IAEV*48 F6 !"JH$6F-'"LJ:+CKBB*@&H6(5V%I0O8%0T0 0T RQ(
MZE:/9S4:HWFGP]*HRL+BYB^:1);+Q+M40UC,TJV[P)1$ =KPHBA$A$-L^6FN
M)?Z,.N7B"J8I7H@([2*[&,QL&NS>N&@NEB;%WA,N1<??HNK?H&CT&.6NWP8V
M%J5?K4_,T)6LIB5%[LDFK,9-!382W/,C+V4L@Q<$=6;WP,J#=2U=4D-=$HE.
M]E=IEJB-XR*B#',Q+N=$'8$+:@ R?7$W1!3RQN+3#*%*TL %" 1YI83[""!
MID !P*! UUL,(<$+8@ ,G* 'FB"05:T-['L)L%@-G $*( ".,"+&Z$1N@ #
M2,I)4FH#!M/1^,53_N0E&,HE[F &9L,&^6G9 *I"*[,1F,>J=I:I,]4* +D)
MMF )#( J. $L #>,#/KN _]S- 7Y=!5#4"7$ !6/Z 3QA!GK\=\J"C8%\
M>G.+;U(B>#L! RH!#1@2+>T8+#T*:A [^C!C4;XB;+Y$E,*->\-MENM)R<],
M)^X$@(M <Q !.XI-!IYE+;Z#2P0E3 2),;]":.H$3XCBA%E[MT#A-'8WP53V
MJ1 GP]8HPO!5+LZFTG;0A\C$$CAD(,RGC3/Y:8K)-XB:C%(CN%.J=B"2RUK$
M#G?(T7VF5+@1J%_*!TW6)3YP)12#3+B@,SF _A (#PA*#+Q=S6! =* 5OE@
M BA@$Y3@!!+A!#IZ"%Q@"+H5#,) 2 !#)1=I#D!$G"@">K; J! !QYOZN
M.OV; Y[@ YX 1=* #YZ@$_YF0$!"YJ^*+;+LHU-NY4R84GQE!+]F@A*E8%K>
MX,HX0 X^ !$88%@J 9(#0$:@+-<E;,(8"4+(0JRT%KY%I$)R.&92PB$@ 74
MFQ+J((_G8 [*E ',ZR;28JE($['CQH8L7,N77#)5Q[IGI!$T2;"-;4+:9,)@
M'DDZ(B,.@<EPY)5'" 3+1 "Z.$7'W0R;-U0A*.8&%"S")(X"@_X H'9;1CL8
M3]>%!UW#A)GO;$)6T$N13]0K)R@D(F4T=/CW22=,*ES[WNR-+D#IJ:9CQT1Y
M*R.],#5R,!7*)K1O)51B.<(-I)8"748./#KI6M +"-\BK,^G/Y I)PKQHUZ9
MCU+"0E<&
[email protected]&M0X@[08 \H8%.I( 16-PY8@ 4H@1/(@ R</052@%O7
MNUL-5!&27:1%F@6 P HX%8L/H VVN@VPN V"H /D ;.0/>?@ (L8$:4O#F6
M/"$(+2;.9!4B:UF<I MFP!%2 ?BX $5 *,O^ 8L@ -X<0_<8 WF@ (<@#"<
MH H, "$E( H( .%7\N]2%R;W$Y&QNKDD?@HHP0Y8C0BXE0@2P+^?8 :B9"RQ
M!" TB3(%RI2H1XL\R9 A H,C#&C^I/I3282(1I,J59K$1<1"1R+N'$+5BB0J
MDJ!:@3)9\F0H5*Q6&F3HT!$71R!%X,R)1]0@)*Q:J51Y,B8H_D,R*OWQ\V?2
MPE6:-#U"N&K1(H&'#@TTA03)RI5>3X)*>5(HJI<ET[)DA<24*4-N316)BP35
MI+N-&H&4L>@0V5:AA*HU"QCE291"R89Z"8H5JK",#:[R= ?/0AF19.#9?%64
MJKBB1%7-;/D.Y4BFK2;$,P./I\V4/254+<J0JD*M>5765J$,$W8JJQ*;&
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M Q\TU,"%)QCDD*)OHGC2"4=[VJJ0IY,T@@$&9OC@1!1 1 &))@DD<1[[JT7
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M'<[0@P=%P 644(07;$8&,@0"$Z0@11("<8(DS <3F/""@6) QOJ8<67[ 8.
M%$")GMD'/XJ(XWT@(<;ZA* )5A. _A,.4(4#^-%I5:C"$@3@@PX$H <^.)(<
M:+"__<& A008@X0D398\6$.<Z@ (OZP!CX0X@E\ .4<+-"!#LA!#A:@ <N
M,08Y!$ 5K""$Z!D@$#VD0!42!QX0A""+&V)2SS@)>3.1"8BQ$$)0A"""X2P
M B7P =7XH$2(#&G%S@!#1O P!MR("TT."(26U'6:QA"SHAT#1&.P,A=R(8&
M-,1J.;(!SB ^<YCIM:(NP1H625AA"@QDY V3L,1-\+ (4]4E+--#J'"F\IH[
M.-1C,GB4(R!U&4_4IGJ\>LQ8"()0L<1E5659E4$6\8CM7659;ED*&RK02);6
M8!$_\8I!_KA"/$I!L('28Z!*P$(L7YVE(*)8A QV:)R)QFL1D4BJ^'8U"$/D
M1C0'2X@G9B #'<E- :H95:78(4SC($"7BV!']#0B$[,P'2>.-C!: 45G\!%
M%'@@VW%.AP8_0"P5B%A#*NJ0@5<:@ !7@ ,E()&$*OY@3H>M(AC#& ,PEI$^
M9B2:?Z1HM#>J<6C_B:,"X!C'%+S1C#$H$"4B@,< 6.$+49N0+2=DA:I9;6X6
MJ%N'8$"#.5 @MA3@0QK<R<F'U78-E<C!'CK42!I< I6YA8$%,D"! &1H20"
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M;$"B2L/G(7-P"31@;1\2-M(72GSP_C;05R)\ /:1@$]<D@-L 6JV 1P%TB%
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MI+:7<^E9]S%J_E$?YP$)0A %/3 !&> SM4 ISB9 1!L'7 &?7 &'# &RM<A
MUD8(EU 'A%!;F%0''U!;^T,#;^,'3U !R 8#11);P':*3/(%L[2,?21^NF2-
M@H #O'0X@I '@!-6_(E5Q !EB-O]+8"< '0L #2[)X4^ >+Q "&9 7;W M
M? $7] @3IH PD> JP?5.-A$1U<(%D: )IJ *AJ L)/4(/Z=Q<5$$0SAT($46
MH*!D&S>%*2%E@^$5C?$5!L$%DS!MFU1?U3()##!1-G<5JZ %_K$!GP:A"9&P
M,8CP!APY"2V("!:V"'!A%N^S/C%V8X*Q4PPA I:P/&F "!LA&P154.E#*8,1
MH,>R/BV!/BCA%27!"NV)<2XF"EJ@"5I0%2,T WR "6H81@7"B:F6:OTQEYL5
MI5&::GA9>I^V,P4"1B?@AIWF6(NH>9\GB:XV65.:EV]$>I%5'H<Y1Y0(B;!V
M:G+46:56F$#3'P/B68V5 G80!UN@-<+8!\'G "!P!A8 )+C% <2'J&%# XQ*
M Z#T!(M* T7V 4^P![45FC#0 K@5 +>&-=P7.%$2-;6D2^:& ^E&?M4XG(=3
M.,9)!Y,3 6'R?G&0)O0'!SA 3J _@5+( 28YAZ!$ 4 )SL :: !Q=8642
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M8](Y8C)>LRH$;$)G' ">H %2E"5A\4)"@ $/8 !ZLE1QUH0N;&L[M1.(7,3
MHM*#SH$'&[,1HO(\/J$5NH$G414:'>53&N8[&#A -+9175$^IB "B+!2O<@4
M[803>^(15+4!?*(0#I40_E1@H1)@ZG07G? (IC 4-RH3DU(\S%L6"Q&OEI!H
M:#>OHI!RF>(MWB*%, &3-%9/$VD0/8913X4!J> #0* 5P19)JL?_.&70N,S
M87JRY3&R>>EJFOBDFP6T9J0!=EFEI4>7K<8?GN>SGC6T-UM9_G*Y,V6T,T=K
M-.6Q,I%XOYJU1OM1('%Y-!$ M9 *J5.+J)&DJ$] 6\9&")B4PHY:!Z#49_G#
MFL1V?*GD(UAS:VV[(%! (7Z4?X=3C>=&M\$)'M68 %,"C5T2JWXK;\S$ H++
MQ*0$F3A@B'^7")0 G[0"<#Q&&P!8T$E<LL3*[BC%WR1<1DC P1:8!;VD]CJ
MGB YK__*NEX1Q[Y3KC(QD3!AKAB5%$3&!]02*]BS$WL"(P\149<A7[ "@PV1
M$>HT4075O> "% "*0.[3&);A$5R( 1X1"4((A2PQ&-P;=ID201$K@C%
[email protected])
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M!>J576$2J[.*3.;U.2Q "4.@ $Z0211 %5$"@[<6%H$>"^@!!8P T]7!.VI
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M#@X<@-#10X )P:67(P2I0J!*%1P))"040*5C"6C$."8( 0/.E<B7%&R(LX*
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M(D4*%-CQ#PP%4E ## @44"1 _EC4$#^%$"0008UD'"I%!2!)(48-%P*PZ6:
M:DK#%):"!).F+$0Q0Q)7]&+%#$-TL4005TQJQJ-(/#%&# ^$1,$!!400$C 4
M20%(_P@4,, ?^U,2C"*'4& (%X@X ( QN###RTKJ*$&V?RHX(DY:*!ACPKF
MD".##LZ J <0.N@@@!ZL6.( PXXJ0H]<<"AHY!*0BFCE%2"*8((E"!B)IF$
M8%2(G(888@HAHA#@##XRP"&&)(ZX\:@43$3*J2.DFLJ)30 H(,UK&J$@;\\
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M._IB -'9/L##1G:ZE:418#M511-[@(,+W0;F>3B92.9 =U9(Z:V??JR7X6R
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M'6Q&( SY!T)" YK0=I:V$9V11%+\$-2"B;4CI !J7[-BJ*QVA R9()
[email protected]+4
MJ'H$3ERU1C%*RE.A!LQB%I,31VG1C;K*-2FVE447RI!3C9K'(M%-9PFB1!CL
M,(2]\I4%?[1;W8CDU#JR ! '"$"6Q,2'&_#A"6.@ C>9 $*T. )8J) 3P
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M\"VIA$ '_ !#9/P T&>T C^B6(0@U#%6T01++AHX7MCR4MU"[J&M$AO$N5#
M1">VM9R3,?=[&(65*6@H'^WA85B!X8)M)J$O#/SZ#_,ZZ$%O@PB";GL2MN$V
M&ARQ7&4?+(,#LV!BN@<>[30L+\YVM2$>(8-H.\+9@<&#JT?6L5"L5#D=!CC)
M/B9/]\BT"I#(#R9\.@47^P= 5J[0SWK$1!(][2A>M)"3G0J\$QT-XROJG8HT
MQ''@,473_KWKU%>9?*(<@0T2&DAK4\Y:1DAPPF<]DJ*3VJK'P;XM0PH(0]M2
MT&7 _1&P?HW4%(8PN]BR &\X2X$7,,$)+Z1@""OP0!-Z$ 004$!+:T@%!5"E
MY\Y&0= CD4 51/NYCB0 ""LYW17B0 0B"&$G+'"!"QK%= 4$\PBDT"V04>YI
M8I:(\+P#FVY!K<Q K, ($C#/]&$" Q$8A6#* +FOP-K6GM/>W?)2[394(.T
M8,>_.5 +^UC14E7D4[JP6@6&;0B*8(F%+(X08)UO@QUN9YN@?Y"V !'QZU_W
M'A&-B-C]Z$.P^$0PA\TU!5GN\C]\<DL4CR#-#*8K@CL\HMSF_A$/<5 JGM5K
MN#PO)0['#M&((01"/PA2 ,-MUO $_>RG1$O;RG,$QA6EP 1@DYI/";FL^902
MH:J,
[email protected]: :9.&Z,8.)NC@K*A,INEL#FN:9$,+"HB68H#L2.T 9HB*2(?
M$1">.A*?LAN=\B.] :R]63H7_".\<I).XX0DF+H40 %*@(,K ( @R( Q\(',
MX1RS*XG060(GJ(A1XIS36@G4010A4 *]RXD\D!U;R@G_J+E . $;W*VKDI&R
MRC3#&R-A8HIAZBUEP@0E.(,"X(,Y& .+^8Q5^ Y#R+RV:+WN\96PR M4JX'A
MPPYY\9))Z 1/B)CW: [OL0M881A"
[email protected]'B$VT.#+]$V!B"?WR,H-P"^
M:>NO23"-+J@$@LJ!24@G^V&,4VR?7G$NY_BFZ% N4\##Z\,^1[B81RB"?R./
M$$NIY"B/\H@/#SL.^C %39B#*]"=F:&9%J,_//JIGW*1GNF_4"G K0&CKR(R
ML#G I:"JK5&*D5.*V_(JO_.J7P*R;62YK)F:"'RRKCD1+["YJHLBHU(;(N'
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M6:K_)"L3N2TR2 1E(@-.B #"( GF(1#@,4B.(3..X3N::=$Q(,N^#;=$* _
MR %[^K5QF@Y-D(Y9F8$9B([T<;9X"ID0HL7[:L/C0J[32$M$,(C.X#5^(:>,
MB15'8(!PPQBX, 46BA;[X9:_I"^1(E)0> SK6ZYN(8U\:Z&5 AF10;_?:*GW
M0 5-\ ,FP(0?. H4I#\FF;\K\I E SDT.K*6*Q'5S*H2.2NOTC2J^KC59,":
M!#+!0[EPI%,(O$ (I+FI<Y$+=*JD_A+-#7$J.HHQ%%E.G]HQ/9*;?;P;FZ&$
M_I#.2_6C&.R/,^NCP;H9KVDC[YPZ[XR!L_).\=0/4DB") \4J T+N3"LP(\
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MR<&NQ=2ZVC&X<4?_3=N:"]H3#EK=HC1.F%M4Q028C-_XU5O])"9@_=M@]<_
M)=;"14,76((,&,19HT,6RL/!,"?+Y8)&L"Y@0R""6H-*L(T0G:9IVHO8[5<1
MP(/Z>411B#;9:$/62 /_0@,&0(LUZ)(U,(W4Z"^[Q(TW6,M_XH#?+;VLH,NL
M9)\BT(3YBH1M*@++9"F/,3^ V1B _@N9QG"^QS@
[email protected].#"C9HH _E542
MLO5,:(2JI;"JT*21IYD1JN%?W336PQO0!]PTWH%?G 2F.2TK(_M;+P2RKLG
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MP]H/$A$#%O# &-@PQK0\ 8T"&8-DE@#(B U&$D8IA*=0$[@!K&>]#3'$6PH
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M! ".K ASG((0-G.$-K4>,'MZUBGY718::*X E$^.$#8Y #:M;0A1G@UA2'
M2*@H'C$)-MB*$+WYP WREK?4+,817<2,=LZ8'6B5$3P@%:GJUKA2T7&'=,=E
M54PQA<9#2,*R!%' $.P@WW7Y='T;&:2X(B:0" E/8"TQ$$4@F3"<20^K8GK2
M6GXIV*XLI7E2]2HQ'Y*PAK%L9?XS$% 8<C$F(4DAO;2K0GY$LEKNB)=R3<$0
M9O<?$"]H3 WN$@"YE&""A3,MVDP@_BG(4C1IFE,J3_MF!-]TS:>$2;+6/%/0
MJ*; 0!A8F6 A8#:W8K47I#-K"E!"%0#@A ,0 @A2$ 4G "/C2B4J9(;Q'2
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M$X_ Q<Z ZH?\L$P-1#-),R<\E;PO%DK36FU#(J9[Y2W6IC1UG)$5ZS*&"*A
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M/=UM4:(G:((<N487( *A6 (F(I'0F=1T1.)W/8<G>((,B &< $FKH(J/)IE
M6(L<'1=R5<;2K0<:@<(,@$ >^,0JYH$0+"4<"($+L, #L K#D%\L6("BHLB
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M1QBU)!EY#BK(@ PX0A=,
[email protected]![5DBBDHY^"TYZ6(HM*)E"CP0)C4SL>0
MVNS05^V$A!T R3@VQ[@B"QRH?<P.)8C;L;F:P# 2--HE6^",4A3?!Y%!(I!!
M:+FAKS93OCD0G"CDN]7JS6P$@S",9@Y$$C#9@>Q)Q$7<GK3A/;Z,^02C1+A+
M1V2F72T)$FJ(,JXH,/F7RQB%SFQ/Z('>!:Y= D&5F9:F5:P)9)'3&>8:5(2A
MYI6FG@1"GH16-TG^4S/=WD &'%@4%E?D6[^>GKVZ6XYQ!6Q:Q6Z&R)S83-6
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M?B*@'^W'1>Q'70%)-UZ$+"D")4@E(',5N'Y>C>9(CK9OZ[))&WI!!SB P
M%6A "N#4MRA!%"R!$T3!%0B!(I0MCTFIO$TR*;SO&4*3P+X)SGQ2U>BJ7)R
M @@!#E3!$@B &"! [2 #=B '"# %13M:%D-6&SN!B/P#T!K"'^P-%/<"X@M
MM1)D4] :$J+@4 #IF)QP8VU)6E+0P&D%%S(%Z@(<Z[(),X$:F/HCS[@)FRPI
MEG+%$<,OF-:>OR'^F6+5&[!F%M/XF+!)K!13 @'4 3ZYALLE4=/M*<JI\:I$
M-)XMT=/)<2B05[10Q^8\RVT-PL\!7:.UU-!YUW1D=!AQ#J9AP!*\CH%.01Y8
M)5SUA[A@FZJA5;H0*$8TF]WY)?&@&L"$'EKHE>EAJ1S$606<P1+,+Q4PP16T
M@0"< 0=P +\\A+(1Y^$<!L*+(-UJ=4T\S-;3305GY16;)]@PA+TP!GT@0,(
M@ -8@ 5\0*-,0B4@0@L@ !90@1",5@@G0L1-\VA)').9P!$$P@,7-B3XIE^'
M[:[NJKQI22.#WH-H20S(W5<XMF.+A>8>%NN:9L,>%C1)$VCKB>4*9,#^V;,-
M:^%I7A99,%EH@>[M'1"1]2KHJATY!U.QZATF5%D,4($<X%.<;F2<JLH@@+'@
M(!?NBK'IF)2SE#2TJ)1T.#=)7]I0>L=S9PXD$IUW<1<K:,(30/ 0,+!3*C(1
MY@XMIJ/M &81?@P?Q5I3Z8_Z^N B+:1/!+7!\0D5/(&D )0<6 (]( #T$ %
M5("MM$"L^$ @( &( 2B!8(31E6.S/_)K9<*$ <4($5M$ EL,$9X H(6$"I
M_,%<YP ,54(.H%\.6($3.,$25($23$$,_&8," $0X .7 $.J$$5. $PM\ '
M $L.U&07- (-G($#= AB$!XMEE;FTH-[-G^'&"R "2U$FP$7"3?#U3SGNB)
M0#88NVU>AFP)Z<T=U[[8:OL8;=KP/ MD+%O6:H;U[?';[67H!L]S#WN0:(]P
MG /D%H:)-=DP$X/UK?)YO+8> #N-LL4W6?_ $0 !!GS"]ZUG$G7?1@+@<[:G
M0O=L<MOQYY#4=RQ'=S&+YXA1I6$WT75.=)OZLZR"'+" (DR!"ZP K#LE3'L$
[email protected]+!3ME.Q6R>,04I+S&RY%K(YB4!V H!"*!?!<A!!P3!*)_!$[@9
M#- @//!6GNX!3A!'"C! TP!),SM\47X,S\28B=S#"@ #["U'%0 <7" !<09
M(5P"@+,!B?^!B!?^QA[ D+N[=0NT@ 7H@!-0 1W0 14X@0!40(FSP26X-0WP
M00YP@2-P 61T@4UV A<$^!],@DW69!K0 ?P 2)@P*- !AKD0 WX0058 58
M0!\(@!-,^15^$)]@==4T5C*.B?Y04_-L(?:@K50PQ3+IFQ%G;IM($Q#+<_'!
M<K\1F;R&+A;&>1)#EM'GN>ZY18[)LYY %J_.MNI9+N4V$-IQWD]319_$0 9P
M04A^'\NUBB$.-T3OZ9X*)?&25+&$3GJ,NAEAQ^74/?L]RQEE=W>4\?5:P!3H
MNA 0P5*N@%.&RZW?%[F0HR&;X\9X@4909:SI2_W<C, L[< 0T(<>\-7^0,(7
M\$')2[455 $5( 1T<"Z5X!L6($/4+L.5 $OJ[A53[,"7 $5M($3T/X5% 0?
M;<04X 5Y/A_2\YB_($<]$$%I$$-!$<%L(&DF,WS?P" Y\ >1!&[UP!B5, E
M=$ P%8%.(*BRH EU 5L4$.W$%U%HIQ-((C5$(%( )?.(((O$$-C($#5( D
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M1X;UDY:%YRQDL$L,JN #J#I# UP @YP4 6<G:$#5EC" 1P @BOB0 T]0!&*
M&(00.M& V=HPQ*LX(.=%0AL%/"!%?#3 0YP8 R$F,,9Y' &!\BA FNH@($L
MP(<_< D1?\B2'&C^<$@;-)).'U DED)GI*OU8 E5P$('"C()1TQB$ESX$N;J
MYLA)3(YO2ZI;#M)PRE7F8 ^!A '8,D"(FCE@1YK+4P^B4 7]] $8.-1#3*
M!1SP0 @*X 09WI.[%T S*8UJR4O:P@GTL,0LS..56][W*/5-Q2-G>=ZH=E4\
M6RG%4[OJE*R,8JI9Z4I\Y$N44I*8E?6=X A$V50@SO,^GC#/)4(,HOKJ<I<I
MK&$&_O/$(@0S&'4]QC"+6(5@0 .*<,7&,IMY8!$(8PK8B 8UHG&-:>!%FLR
M$(.AT"@J)F,N&3CA.[IQ@0NFD-,IL !A+G18$9U#1.?<4(;1D8XB7FC^0Y,9
M]"TC\4)61K(Q!3SUFBMK"31_$ @F0,D"<VA!!P0@@&7B( I+P ( JA %'D2!
M (!PP1 2@ 4$G($"/;!"#RQ @1M1 :$ ,"$> "(./" "@8@P!6N$ *U.L$'
M#2"0$R#+6 IP8 YGX\ '*B )@T@"!O]QP!DN\:*LU4!'9^A#"VZIR(7DX&EJ
M@ (":) #1W"!<CE"PRK1X$@A_:$22T)$%[S$-S0@8A*-8 ,,0""'R3ZA!&VD
M "%N68$Y$,*2 E""(H2 @S9 U@J&JP$,! 1. *@NX.C@A#@\H)HYHZ<Y8R)
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MJWK&:%AU&3;,.27S<E13H)(CQ ,=E! RN('4+/,!2EVH0(-T/"$G1W^Z&90
MP&)9<099 D0!"!'H35GUX( 1#8_@@]T -)Z]RC@ A8E( 6 = +#1 %OX
MF0XLX+,>^$"*E>7 U2I0 S; [0,!(H0?RDT#0O3A;)CE "'81*0Y( @*D-4!
M!6I 2L?MJ)&H2T,-S$8#-MR6E,,-$QN\'0 =8*$)#;""#O9( 0J< 004 !O<
MY@ .N" %J<=!PKL <^.&!P!-BN?%"WAAI\P&P6\$$4KB $%[8]*;X3)Z9:
M\C[Y(9$GYD$BL.YK)Y2B(I)G*!2NX*1'PAQ,*,;G*GAB>X!B4XX@ <4G+'PB
M+NH) /N-G_CI*230/)@'+E3"!, ,=^P"# +^P!$:X^8*(^4>8UL8@5I$03,T
MZC/*Q8'.A<;2)38HHS54HS0DPU_2A3,RHPAKL*/0( '.(@:&8#=R:@C,CF%V
MZF"<3NM2P#B.0V-20#JX+*AR0P%BZ A$D,Q,A@3A@F(XYNRVPJJT Q/>PP%R
MA TZ8-($ N< "6H/OR4)CP@P<B( Z40 FN BB( $<39BP0 #PL/N< NJ
MI@=T 2L:-)\ $^ZT%\(*P01$$L@/Q X P$B6N6I@+.Q)$^ 0(@0W\A!#.
MQK,Z8 [VP _FP)):P $JK0=ZP YU@ ]Z:TFZI!)\A$LP!TUH9@\* @W8@++
M9OTX@ +D8 [FP _^SJ3]?*#5Y #U"*&*>D 1]0 FT7^8 -QL ' *MLL*
MPM$8/^!L4LU/YH #+( &!( '%(&:JBDN^HG,^J_,,&7LAD5Z>D*?^*DKI(<K
M%(Y7JHEZJ ?>[JF>Q$)ZW*<]MN=]JH<GO *J!J[ DN)5LJ(@+7 D^BG#[FLD
MW$=],/##?D (^& 1(.CF4LX(4 P)$&,%@[#%-"/E"J,(;K*!U 7'),/%ZL7F
M<K((SL44?DQ=@!"$^$ (*@(2<BH/\LRG& ;J7. !6."GB"@&CHHY/HYBNC!B
MD"H+%4$,4V#LVB(&QNXMQ% ,-\8.4@;B-@6AT#(C7H 4<X -SL"3OM'^#JN
M"C1$BY: "B"@-P"!!W#@SG#@"N( " C K-"*"JA #03@#/** QXDK(+ 3PK
MT,(JT/ #:!S &Y/MLQ8$=')$]%@DDMC !D"-1@BA SZ+ ]@HDF8/LNS*"0Q
M $#'3'* <O: %$DK;]R&1QII#CI #H;SD<@MDM9@#7S&M%C11,AM#D"@T@9
M!XBIL6QD_7Q@";)-V^0@=/A 1JROLN3 C\!&#@" !Q0@":8I*;QBX/)/):QI
MJ= '+(Y"*@!,>9I"XA"RFO@+/A<R*0*A>B1. (W"PRC2>PI4(A^,+&8">K8'
M(0\R/Q64G_"1H)9B)-6'S-CMB0# $;(E)]?^12A-81 & 5Q2["<UZH%2CN8B
M0Z1,HQ5P[#/")2<-014, :2(,@=ID 9I[@SJ\0B\8 J6+@^F( J1"NIXRH7.
M#CE,)CDTH&)
[email protected]<BZ.P 2V=#H4@3X1:D-!(B-2@$/ZQ@*H
M8 D:P!+Q, J8H/O\L@H2(!#C8! ["8L$A=&RZ&88KPH&H-7F 8"H $61 >$
M!D&&*:SNZ$T!I),*!P3VQ %HIF[2( <JH 74Q$AJ@+HP*[FD#P92JP)&1-L$
MH H(0$$H4PZ>L3FE+4?\P'%H0!I59VL<Y'7V(!5R@ _V1'5\Y \<I-4NZPG^
MR-ETX*YZ((S.(*S^,-4/', -*01JX^0^ ! 6N , J!!*-,_4I4]G>@][:=5
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M"A" NJ #R3!<D9ID0Q"4T>OLBPQU_Q@LD"'!B(B;JN@ 4JM.3,/-JT D.:@
M#MC$1 17%MNH9^BV62/""<[$/\Z@C=POD2C+0% D 1@6\_S/&D@=&01"R(B
M"@Q@64&@!=IHD.8@-&]/#C) 3YQ@\91@.) BF@04/O&/GQH%+ ZV7SW"(C$L
M*YSB57 %>W2B_N#S=@A,>DZE5\KB5)Q' /W+GWXE*A(TXJ*G5@:.>85'[-XG
MOK(B=Z; $]*E1XO 1+<EQC16QK3%9!T(IEXJQW",HD869 ]C9!^6-F**!@\A
M#I)"8&K621FF@A7 #E@ 2;DN9+*2.PPJ9$S^!CHV6(A2H-Y&@LR:"BV'P@O4
M\","0: ZM(F$P)'\A$VO8 DLE09\0 V80 )XH(48+0J"R0ET ;(+[SP(PIZ
M X625 BJX*[$:/,>P@"L2%J#"6<$0/"Z*@."X(V<P/(^\0QB-T1F]2X=2=KX
MX -8<4:NL09HH-5HX /&@ H4JPVJ0 !@( U41Q7_B$"0YCBY2$T:P0\H2TC(
M,Y!\ #<!X/H<Y Q@X SDR%5AX*LRH ,6U0<RH%!!YY9Z%X\,0 V*IL^>\6R>
M$026P <H<T\&)PJH@'BM\CN.]RZXIYO&@GEPXCQJ>5@097UFQ9S^+5'J*7D%
M<'T9;GS(Z2@*[E?^"M1\ "I6'% H$&Z6W4F_]I$^Z8GCHBD0<D 3AK!''];F
M_"7&BA)=- /%8HPV+ ,H)>-$$>,0;&P0<G0('R@F"V,5RO(M=".GHK*"D0K+
MI' **"%+E:,MJC19MJ-D*,9AP% ]B/8L/VY+@6(NGBHE!HHIW&(%8I>-+$ -
MK@ *0$"/SH#.6#D$4 C2IM4^?."L]C0$EDD)_ X(#@!G<.;Y0, !$."N(.1I
M(J*5"0 *MBTP/:D#(HD&V&@,9@1'<F"R6HVW_H"-9!,AZ"--RHT#(+,-$J0'
M.* @N$1NLF:/J&] K,#/_"#:0(^HZ>1(1(\/^FI6-Y6->B (6B#5,L#^ GX&
M +SQ; )@V[35 8YX:+3-KN^P!YZ1CRQ
[email protected]#\-K"=2 "B:BB;0W
M(=GGXLZC/_F+5B!N7:UB*KA'5[R77^&S5-1)(^$S 0MT*HJ'*!#.(A-%0>_I
MM?GM*<2"6,HL/_6-7>_B"E(!GDEV1XER$$YTGD\TYU T)G?R15O47UYP70!H
M,(C2FS&6QG#.*$U!!))E8VJ6!:"0G[,LGW,*#,\.9:Y0#(>68K:#.10 R\).
M6=)R#+>C+3H.O3\B?B%P).! C-]1#I8 "*C ":S@: 2@"9S CI6X[") B)<
M >0H,/E4#0Q@:P^3"@[@+]O@^5IM#EMW;H?^EP<&T2^_<]+"\PE&.44BR2#4
M6C9[JQ(^P 8* DN2$?:@<0Z\+T&,1DUR:SX4HFR:-0#NJ&HRH 5F9@Y*H(PY
M)"$T*58UB0- P ?ZXPEHH%E;)PA @ ,RP H6SP%0ZS5_&C]JSP#:P "" !2_
M.D"0AO;^T@"(F%*%9L /:PK&%#XU8B.4%U\1LE240EYY!5:V)U^1HD 'U,$,
M[IXF%'L"=+0;\.*JR0(93$!3.Q#<9R:\5WX1TBSB]V5^( 9\ \.P1 .0Q4.
[email protected]*[.0Z V(M(YWO]W]!"M5178(^R@6C&]0EZA#>("N8H\F:
M,+RS#&*0*I\[9KW^*X;*HFHN/NZ]'R9GN</+XF*IOFPD9B)E5*)5)'LFID"O
M;J0%) 32".#2?J:3"& %>E8("/$ F@0B%D]#\B.MA)C"]\XP#Z )@@8$WBA!
M@F9PU&"LF."*X8@""D .<-<"ZH8@.&3TCJ1#7/4)^$9KVHBR*& .K0 (%$
M**"0<N!2Q:37JI-J0&"N+6#S]A:2,I6X "=(&IX-YH"-4(1NG_'/= ;Z F )
M%@\'.B#5C!,/#0 *< 8P;1< @B8 9D3P=$#R(FM: Z /Z,H![JC#E2"RFR(C
MG$A !;"^,-O#6-:8L5TH/ R8V;6) %V8ZZ_@IJ+1M[?.;0+2R:E!"YW^P3RL
MX*2WM7DE(I/'>='5EG>[!C0A6P[C[T4=9#U=%!Z!6KQEG#5*N3.CG&/]Q #(
MH@HH@8L@8W$R)PF(6NI@*9(#Z@ Z28&=/+",.!BFR;*TH#W82I]]+A*:ZZ"]
M:*.]0P_6J4@R)R!](S!! >2 3CIK1 (1B]I4IG$&!U@@"11 ";((KSI1!VJO
MD[( ,@-Q!1(@ 8 @$/V[=ANM,.\X'M\8LDB$K%:U02#+:"C+C\*1#<Q?;H0D
MRN/QD)2+02A5 +(- '2@ Y)-D;1&(;Q$_?R _2HKC)!&: "P $0'/BD0;/F
M3QT.<^;P^9,C1Z4:%@* L&(E0 <Y9WP$H*#^HTH('%40T&##QP$6*TZ<+'%B
MP$D; GH0^'!@P8$/ 2!TK'19A4"5)4NL^- CH ?/ $&< .&AA >.*XHPD2'S
MXT6B%U>/G#A"*A"9(TF2B"53MBPF3*36CB55EA29$U?)B$U2-Z_<NGA)G0B4
M%J]=P73%!J)[%2]@P'7AECUR6"PFO"<P0?Y*ZLCD))4G=UY[(M&/T7$^:!(U
M2)1J48=6KUKDR1,>&;$7:3HTR)0I)$A8F0*%"DEPW:94#QI4Q)2JU(N:KS9$
M'!1QW:(6K?(D L18+XKL#)FBX/L4.Y04F$^A"(RB%.:_FU< *7Z,^"D@I< T
M'Q.D&/SC*V ?'W[^:PD8PQ&<0')$# ,NJ*!E=*U%BE9D0.( 'WQP( <%6"BA
M!!515('%$FU X0063N"@@!TN !*% !3P48$%+E&!@QHA*"'$%$+P0$4(@$1%
M4A0X\$ D$$L(T $A-,CA@$I+#.6$#@U!T88>%M!0 1\TS$%##G[$R =*&%K@
M1PTTG$&!!12<X4 :@SEHAP<0)3&!WS4P,8<%?SAAQ\YT-!"!Q: 0 $(/3A!
M@!,]='#&'%X2<D8-'U20 Y\U2,)1 $((( 5&;1)J ]+X$#2&5]6($=+4#S9
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M# ,%]+ @9M*1!$%K%A480 6#AR*@Q)Q7(&#L"AI."H.5# 1P@I"Q"$5#X!
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M5YJZR18,(!0!. &9V!)%="FAC88 &U#BIL2!G<%NGGH);?*E0#&0 @*=&"6
M<D" & )0!2<@B08T((0%.,!+/E5@2W,870 2*8 >"\#'>@#".9P!BP 0 !<
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MAC/S_$R. M./'^D3@_](38_XL2,G^MJL!0H26^NZR@].< 4 &,H - +"%>@
M !_TH7\6\4$0@ 43O<%*!RXY -I>UQ(3O81[0J(1240$)9@\J449 @$D,;+1
MUUKA#!D:%I="1X@,R.$)<X <)W7Y-@# J@?^P[* #@*PI.QI;U$98!T(."(V
M.5C !U 0RA)\90$8J"
[email protected]("( .$I!+ ?C !QVXB'N=4*$"
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M+@)Z(-TS.)<03U@2"!P@ .T87P&$)X%@JN#(*"7 QR(I$4^^S@,M0!+?N#
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M:0[:K>\9>#F'#Q3 @^YD!SJMV!%%=CV(# #@(P*$TU2@XM $5JG" +^@R
M?6SZ[*XHK&!S'@E89VC*DTX=N8/_"I.OBTG^_5^BE!/A($K1XT, *&Q.Z\4]
M., "83!W8$ )"3@$:Q<&_W%8E;%Q5]%A( <O'F>!-,4N -,N)_07-_48)U 9
M?+$N9W$59R$7)#<S_0(6(O52/$5HGH$N+U P/U %:3!513<QDS )"/$'"8$(
M:# )/R0;+S-$FI <JE Q6#9U&\,*4H0*&R,Q4I8;7?=U5'8'"P )9, )[?$=
M;+9V;/<?=W='/\,>; <T^\%G,7 ?#=(@D. %<Q<@# (: 0,:029X^=$L>;$"
M$:!;0 $$D#8\3M!=5/ 2N58%;0 KOU01DY8 I_4ZC:@&CJA+RJ5+05!Z'= "
MGQ( UD<JI*(&TQ3^.3TP*P+ <O'.0*P!(=3!1W@$&TR!X1P$?M$/N43$UB@
M:=%# S!@ 77 )!W $$_@!WM W:2BZA27YK6 X:2% $ ,I&*'*@ SIP!D_P
M :$C(KJD:2" *-C/O7C *(3+ )%7[]R*$Y@:L"&*Y,4+(RW*_4W%+ " !XB
M B 7GS0 >H%$RZ1 $2P I2P-0>B"&PV!6\T!"S G#0=FXG'R*5",_R+&(1
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M! XD&$\(%\=\#:]0UIX.0#PY'F*(@=C0%H P!$.,#VVY0#H53I/P =^( <<
M(8T!@ "ZB6P$0(C9\RL?X4^24 .!*27CQENZY"L4X =/8"@.P!(!, :M,TD-
M\#K,)0!M8"@4!4\%UVPST0:3:'D(L#_%= ;^Q]8#3+ L8+!&7L )"H* W\$"
M0K "'$($+A"@*Y '&68>6W,"7-%A+*53T"(N@D&"=A$N7I%C-"<8@D%28Y%B
MB4%3=)&2:2&!E#$SEZ$9*T>',O0#,> #C3 #&R "1W>3?T [=I)./^@((B "
M)!!54K9%%X-$O5%U6\9EIB ;-BD"%]-T3X1%R3$#3C 9W($S.4,T7DDT<7=W
M67I7*?(>=Y<"3U-8 [(?<!>6:(DM/_45V$*'_C(@-)<7*7 %$O!]>_,Z5, C
M5J '^:0#+< !A% !,+!M.\D! F X'Y4"4W VN60B+=%KRL01:+*H??DD." $
M0I 3P$$FFDL"7#^3'Q ?""P$ISB$KMV),^E$P@0$@;@$P FJNN5C"QA (U3
M ,.Y7BX! +SE$9!#%)2T4 *@!I85 D:1/8(
[email protected](LDH!Y 3 #ZP$DJQ
M8$2!!2" BDCR?[YBJ_\' /"S8+BEF01 <-/DK*X' LZ:C#@129'C NR1 @H(
M5V"@,P/I JED61%P!420F%<0!QPBH!CF!1$Y+EPA+C]P%1)2%P2;&-@""?"Q
M&1?)+AR4@7B!+C'7&-RBH2D&%VD:,#3'<X@V&DK !Q@@ CKX@\NS!WN $A8B
M"3Z)!D#8"(XP,3WD":>AA,G1A*P 5CDK'8L@ R+0!8Z E TS,D^T,C+^8 #H
M$@-@T&9<2D8] X9%8S1BN5=/FV=?RH9/LV'<43-30X>? 1J=H;%C\1D4&P-"
M0"K&DFNW1GF]UB1\.@<% "@44(T5< 9+H"P/$'<I, 2)8Q&KJB@7E1'EM 1,
M\%Y5P 14 1^0VE %_FR 11(*Z*A"ONB06[]IB0I$WE-#P"0% )DU[ZJQ.
MX!$!,"NAFTLZL*P]<0"/6P56L!%L(DFK>P Z(#9/H%",DCV+!*VL.#K)5"L
M!@!04#\^0*TZ, :_L@#E<P#FLQ._HESP P!!H:BMMQ,+T"04AB05(0;E= 5P
MQ0(%&0=#X (N(*_?,01Q$* 1$ $X0@17$ '^ $H$0G %(< #1, "%X>A$6JQ
MF3%!!$-CI. %;9<'+@ &&UH7;GIC),8M9!$M8(%R#P2Q'^<7YZ*Q5I,$HZ$
M(, &% )B% I?Y [;)!.U5@#?X &:>"3D^ (0@E$2>EU'V-UJ- *8;4*>""C
M6K<*JJ$<TV$*,I %@,$)1D.0WM&5>,4S-;-&>:;$]L$=Z6$'\%HT<Z0T;.A7
MF!#$^-EG59.FEH$M((@M'W18C'5R+X )4T WA[M/FKI_R8@FV4-M9\ !=C('
M/B D0* $*5 9D$"(:+)=\@84NH01!' X>Q,"(^&^(9 'F( Y?-)J%4^\[:Y
MNDE0YB,HN">9\C7^BM/4$JW7!+NB$6K".IY4!<EX72 %0G@!,=4.HOD:02@
M QG 3= 4EA6Y($;,07 (103/3)*ZP2)3T0!!9 ?'.0 <'K$HS;NNNE$RUQ
MCT\R%-O:$N?**)QK!2"P78<"!-\K!"[ O.ZS=W\S6^4802ZS5/PGRN080=)
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M@$&2-,>F5HP?+CD:D" :< %.(G"0-@%)(L(/X@(-+H&0;AD$^-D6T:DP!$*
MJ"##.%MUU3$;(N!D#J,;-XW3/N!'-7,S7 G/0 W%47R&2FRU;U<S=X>658.&
M6*P@?S<S%DQ"=#@S^ZEC=4'&<?!]+?$_YL0#3+!/\$44%E5PYW, I ((0["P
M+G VNE1,\2< \M/(Z8<V!-">.@ YL+,2YU,_RL03"/6HT8A0VD-?%M$!X/-9
MYP,3:H L2H$%66 (* IV+:LSV6XJQ4"!L!<=>"I%, 1R;C*#B$'%/;*'P!-
M] 4#ZB0'\^7EMM7^$N4SK6JR$80PG*3E4(;#(["6%)FU!<TH%-XUNSLQ320"
M3];' WY#<5/ S0.I@-2=>-P,H-\]H!1GD.5!"0O8S<F] E?P(RLPWOYYKW%@
MD/QHOV9DS@3J-__YZW!5'AB'@>724ACIP(<!0H[Q8R*5H2>(H2!85(?&0#/$
M Y(P XZ@@T#9"5"I=.N^X#\I [!Q!U#I"9& X1;^A"CJ+"J+P"+.A=36M
M1#<K'9I0=J30U'G%I?"<'DZ+GWF;9_/!1C'PANIQXFZXG_@!MGT$AQM&6%8#
M@EX1@O9R6%XA@2<P!211(I87.2$ !$+>;)+E 'H 8!#5!E% !#I"OD+^8"2,
M?@8-0%\;9=>AOG@& 5)X01,D "K12.VZ@/MHSH9$IE7LB7] V')R"B@&")K
M$Q148"MA?N2/69DZP9D)0+A4X 0@4 =L(#W+V#MU4 $](.AUL%^[529^H!-S
ML <@T 2=]3BT(@"^@Q,<P4Z>"HVB]B14T+AZP(Q-,$ES[2&,^5R;<BB:7 4\
M$,X(2 GXV>MJA]Y74*G?O;[<;)"RSA[>T>S=C+[VNP(&6=T\_QW$#@<#29#)
M_;T%R=RY7Q_A$D$/&I$LF!=ND7( .Q?VLH) UE?H,D.0( >P 661<&6>8'1<
MX @=O :-,._W#N&>,*2H$ JL,,--R-+2(0K^6M <.>QU*PT*&,XQJ^ #!<+3
M0-WP14/_3GN&;(2&^[\>9)A&\@$0,3!QPE004PPOD, H@ 3IH$"#$0N>,$@J
M"1DR$)-L_$$&$HXE#1Q8&&/! B$04:+T\(%%0(\.%N9PD&/#@0 L#9Q4X8$#
MQY0A"E@ .3/GC K3J@LI>+D0!4":J@0J!+%B<XJ2ZBVJ4(ERI4K2G@8T)$4
M2P\0+6C"T!' 1P\G5ZKT$'#& @@G49:<*>L$0(\>#F#( 5"EBA,] ((8+R3
M1P(<3@1P^+,&AET!.N;P^?-$@(42<V LT2N #YL,+WUTL-+:BI\*"%H_N3%'
MQYD6"'1P^,"'#PW^N'\!8+$2A>J2)7Y[!%A")<25"$#0GND!P(E6($!6"!D"
M)H67% I20)JR@HB2\RZ$L)CB B@+%D/B4QHRA#XE!0KL[V?APDY]^J:8@CX%
M*+%# 3"\R^^^H+P;0D 76#!P/($P.H&,BXX@!4.,+"+CB$"2V! CC#9*(D0,
M-^*P1$Q.H.B$(UR4*) 88GSA!QR%,,044T0199!!3"E"%5$6\>2.2&1PI(M.
M9'C$$T^2E$$&5) (!94K04$%%"2XY-*40T19914M5.&1%5"T!,44+4UY9 %(
MCFA( 444.# _/!,,;Z&%&%*DH11B@(3"/\=3!(PZ4_@3$B\$@LB@A,3^@T30
M@1XU2,86,1'
[email protected]'3")S (0 '+ B@#- (. *O99X20 'YJ"A C8X< !
M!PS ;VPA!!""2H<X. H YP@ (<0HC!@*1R\4H, 5WU8PC #DG/B.B#H4$(N
M*[!PPHJTA@U"CK):(X '-:SP(0 =X KI5LD:8(RD,Y)#SCJ_!%A !P!(LPH
M!^J8 S"DYJB #QO<@H$/#N8 P5L$*AAV6B<Z\*%='7)@ R\ .ICC"3G.H("O
M#NKP8S !D/-!@"H,,(P P@XX%X HN#A"A[& L"*Z@A8BH<(IF !T485:H^(
M.)38#CX!P0"*/@DIH<^.IZ=04($P].M/ZC#^[*#$/:GWRR]!! O$&C]*VBMO
M"@09+8B,"R_"\ @2,<+D0PXO>@&C0"[D,!"[/Z1;PR.2P$1#3$B)*$:#;L3Q
M"$UVY'%R'GU<Q$@\II3!DU6@5-(1#*YL!916K,0R35#0[-%''XM@!0DVD4!"
M=1X]T2.&)"!1I,[\[+CSSK(/%1X,W6/X4U!!)]5=]SX1;6A2@QS%A/=%)ZVQ
MH",.ES'[@CC%Q(O#DS@!QR3B<"* :[$ 0-X>"!!+KV^M<$ .0FJ@H868\+J"
M[2G"ZJD*!_!A8%FI @Z 8!R?&,<P5<""#EBFE\/T:SA<H8*KY-6$SXB&.@Z@
M2U*H@(.YG"$ ;M'^P4DX,+(."$ R/@!!$%QEA>1P!0 "N%BJKG,8 <RA \/A
M&0UJX <:M.L,%=A#'5(XOX'YP E,:$( K, 8$/C!?F41 CD0 $0B+ 'X!H#
M"'Q0F"4$ "Y?D$ 5GA*%F54! @X%\ZN0(5J024".2."$!#$B89X00'EP1EZ
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MY2S>NHH.<!4 0IR! WS( 1"OZ, 9]F 3AU%7%2W@ !9:00Y\L 6HE#&:R4'
M!+Z9PTSF<!806$ .?^ (2I0@)0E18W?ZE< +%" NS@!"R 0@!X"X,5O@8 "
M0'6" ?[B!" H(0$'N$X3H/"M'C 6"U6(:,S^@$"$%=0'/BCP D$XT1\AK& %
M3 .D"]PCGP@!$B@ L@_:QK:0?-YG0*T-2FL3I)#PJ--L9.L.\;X#'B_$*&XI
M4E&),-3*N\G-;B<048DV="'FDH)Q?6N1^ **B4 <;B)D<!P5,'"((/'HF:D#
MIH\>H8E'K,)(,N@"&A Q +(X3<>)+&U)2VA"PC-G)Z1#F"F\E/OEY SA""<X
M1"'HM!,Z^Y0GXL%V>2EX9_*J!PD$[:YZ_:2(0$XP*$0ZI)^/$A]%"J*XQ"$N
M!@2Y$(XP 82P+B$!>C& S7A0%>-8P0*_<8!+E#H')RA!"&#X+"!N1@ 0T( /
M @+2'O" [$P00( Z ,;TO[@A]((P#K@X@ -9E)E/HCP#'*0@P5\ (5C7:=;
MW=(!!2@@$PHXX P?J -QH EK2F7]6RPAGX H(M5L=C'>B!3W"PXN3H@ \5
MD$,'['R&#GS #RTX&"+04 'K ."QQKH6% S=UC/@8"7=6A<5_QH '#E.@2(
M "568 KU,QG!VB- )I @!! !@A7X(Y^Z#//H"A@!3RHHVKETQ_VP(<%@GR0
M?>;#VME24I&&I*2=6HL?, B*>"A0I'@HD;4"X4>1#!X/^%I)AKL!#I4;V@A%
M\,8W3"A@1"-:I705]R%->3A3+N*>N6_Y T4\01.B.,299K>ER;%.F.N=A*/A
MN_ZE+OV;36DR17]580C]JD(5@P#O((@$)%&\@0G$@W"!%W(G?::3(>P,#R>?
M9\_G.?A/ATKYAB6B$(X*F'N94AQU)Q(1AY2X(U,P0 *H0I7KJ"$*0N !57#P
MF9#YP"ZTHH!6KJ" )$P!/70PP!QBRC(D P$'44&RLI: A0X0P@(JZ<JT"$
M*+Q$#FRH50^0XX ]5* S%$ % R#G!YPX,T=")D%!M,!';S%.EB8UF'FEZIJ
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M!.@!0N@R6#F#)\BR)3 )0"#$Q"".$B;!#@# 9(6II@*EVD6GV"@#N@ )M"Z
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MA/X-Z 7\),2I!,[.;!O%)Y#:9MZ<J>'$!0&T[Y%6I1^NJ?H20CH*8A!\;"-
MP+],N2Z!2()/^8$86!;: P(#J!:]X@$A ((/*@K\P0*EVH,LRPLAJ!,<X $$
MN0(!D(,YD!:7^:"[:[%A+!:D6"D=4P(<*#+SR2(0Z(!KT:L<JH$]D!45NI;#
MZ(&V^"N<LLHSX*F6"+RD< (+L($"0!^E<8$(B !-\X%48P*5^!8!VK*C +R=
M\!@:@(%&$* /H !V (6FH.DN!@': #DH"&:D .W> X<,( JZH$SR !^*8P0
MZ(GL:"F9@0H5H[7MT _=:P\A" %D.:DK6(&D,8\Z OZV" &M]>@/%ZB/V@H#
MZ<ND]X"/[IB^(3@M\:@V1/D.ZX0(;&2P3F(PA1!'3L"=NK&0\.00Z!JHN-D0
M<CNNX\H4#7FWQ!&1='21FH2W"W$<(#"##;@#3[!(-E'(-3&$ A0%83+(24"#
M*FD3'EF3U($=5@#0R<% ;T<&<@<// $35@#'&"GLND3"..3/+&:1$DPY_$"
M14">A'"4.#E13B(>$W6(1HD(3C@>EYL(Z(JE2\D4$L.(CL@*9L$!)L@*ENE-
M5NF!#+"S6,DR)3(6G(D"%7JH-.2+NM"!YM@)Y- 5!0"$^,D+ VJ5K @C ;@"
MKP&"N-0#GD&*5',"'7 '?ZH B@ !!HJ\V 4)0,YJ@ 41+TS,@!#L= Q^H
M B8(@0BX@BR0S26PQ0/H ='L/!^M&!@(@"@ [P S]H0[1H%P&XQ#7@LS<M
M =JB1ZH#1I@#B!XCIY "_29%I/"@4/=A)7IH-:("U\A@K"8(["(-6!<@6&,
M@/-0@@CI5>-T :B)$ 15OM@,.E+ :GQ#NG+ V,UUC#8-D713D;QCG#D!$X(
M1X3X#C C_&P5IC$A+TA1Q)9MW@\1U,:SW*5KGC<%'>#SW+-OQUT$<<A@QYX
M@RGQ!!^I+S4AKP)<!/7R!$=P+S5YG6Z"G341$H3E$0CUA,R1 1&XUSUXNCS9
M$_Y$09#FR0\BL(-%N:UN*U&WV3 4/8@/3(CC><%'T4;MBTF"4!SF$I_GTL&)
M6%GN^H%$ "%-^Z #JH*D2(!A!(F1N(N8@(L$&+69V9GK2(X^& R?HH"DP)=B
MH0+RD( E<+V)(KP9,K06 $<> "I"P$#8 D)NH[;*"LYR KY^9@_2-L*H,.9
M: '<H("VXD0Y> FWBX XP-*PNA:K6!? B(+!Q(+5Z('#F+$Y"($06)^H\H$Z
MJ($S: #!X@,\H[0 H "' 0"?$ LJ*%, L(X#4 E2S ( V((.&+WF&,9=!2F(
MBH,0 (/B(!?08]MN<7M&,[U.$ZI>1K6&@*O(1X$4?XDCL,M%L6MZ62PA'@G
M;"2(@KC6[CNY:H7)[R"#1(!>=$4_4%*N="S7Z<T_P-$03L&0ZVU9B6@17,(!
M/\ &8B$57"=U$F34#A843@O(^D$1WNF*F$%7@)(\CK8!(4='V'8*1$!1YB2
M#,@#10"0MA$/!#8P!8B#*=@^XGDPZQ&($T6([Q&P?EHYZ.DHG"L(;'2(B# E
M=U,<$/.P$^"$_?L!)8@"$-+2Q,P+I0F!B@
[email protected]@9OTA+&GJB&Q,6.3 +
MNO"6*%"$*1!3PTJ.'K W?"8-NOAK\ 9$/HZ:T%38>$#&,""8@D WO"#/\@!
M]ZJ!&IB#BN( .64#R-4!OO[K 36X ASPEL^L#CFKCK'D@28 E\X3@"?8@TQC
M%>1(-2OH@+;<HB$"XRH@NC "@6Z9EIY(@)VI*NM8@IEIL7M)BA9+ ,,%&N$;
M3"*( C(U?/PG\L:+4%R 3@PK>Y0I.?4CZ!(&THZ5H;XCD%I"(( #Q1@%%>F
MY:)Q"&O%T>0)QP^\UFE-@;OI".X*SPM!D8N0FU#RF^E=U_6CF^O=%'I[&_)S
M"%Q2 #F8! SPA$48A-1!./GZI2+I'#P0V(.%4 %$D_55T(![A$7 SPPWV0R
M @; B'PFG12)]VYY^"IV#DQ60&SGH;@P0@^.1LTB.RQP3EAB(H J(V /W ;
MB/X6R5$<^8@(\IEGB4IM80$AL (*V"$U**"E*" A9(R6D;*KI4,:X( ,:(F4
M^18MU;2IO0X!H("0(0TG,,S"NI9F22PAN&DY(#1VH8L@D+1!=5,SII\<R($T
MR($*. ,:J,RZD ,:D(0<^ .KY ,U9>,JL G"K,J/8S;6(S+JP!"B (Q9>/D
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MZVBQEN*!ULP#. .W."(/09^,&"FW "*/ 6EY@Q6IE3 9"75'N)%C,,O:)2
M)X +LP:))<@"'U7AJ!S&\X$!/T")0"0\)GABG#++WF@8&J"!M"6$'A@ JT.$
M-7@"M^(#0F@!%:H6+$"5N&@#:SD,$%!-1*V ->"#N98R F""-O"!#. #?FF
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MR(I&CN(# (5,,X!V9W_V&Y]BDXXZ(\_&I I0)K>3)JPP%7=T[UMB8.E465H
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MD(@'98I5D4%%#JDRY9Z\JD'>/549/26/$B%3%"@2("0":J () :6%B !NZ5
M0H-'0)("91->-EERD&""(8;(77:$<93UA>%DM+FF'&RD*"?<9)RP]@,F0A"P
M1 ,".%'%$CA4T485.S;00P @U#A0%"X)X(,3/@0@DQQ&50' &0)@(0"- O30
M@_X.,#F@PP =L"1 $&=@ 4"14F)A!11.0+&$&E%0(18/8AV Q X4$%G%'=2
M$0*.4NH @@,6</ '&S,10L,::R!" Q\P6, &'W*<T<),",S1@1,\Z&F0#@'T
M ), (% @1P-M.+$ 2U6"NH8?<G20Y!P!&" !#DH0(80+E$AE!U1@2#6%$"O\
MZ@*M< ";5EN_CC666L >*P0+M;*0AQ!G1:"$"W: >!B$4("!H/=]I6"(BEX
M!@EDIB6V8H9>7(9BA9$IALEA>\F+&+V/[079:!BR1@H9KYUP6VT"$XQ;;F1X
M&+!E29#B6\,,>W@9)$<$\@)S,6@BBL:BL (**AU[G/Z==1V+\H@,X95G2GSK
M>8R$RT5L+(HA@PPR<Q$J&U(R$!GZ2FL>4.T%H +;)MCM7@46W6"$$T)(67(5
M9LB8U))!'<AF07-V0L/*^9;;$1Y:YAC#RY$A!!-#TK@$%%00L.,20"PA0 <T
M.$$ #CQ<X5*92P P@)4T6*#'$DY0Z<022U!A10]2SN@ "#V<P?< (.D! "&
M ]" #WHTX( #/F#1!A57\,"V $M4(1 5;*I! !!S4K'2&2!PP <;E?Q1@0T5
ML/%'#FO4\,<'%KBQI 5SP#"''')T2L<52B@%P*8## H'Q\<+CT(4@;0P1E^
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M\"(A+$$'%@@ %I;0-BJT*0Y5L((5E) 6)43!<U!R A4,H+9/"2 '+! (U5"
M./XLN.1RA+."#Z2T$ KT($RH3.5$/G"]Q_F@"G=J PT(88$I58$)-DJ=$G"0
MR$ AX@^(P!TB)E$)-CAJ(WR8 Q\J, <'G$$.BF(##3@ BKP@ <Q$H J=2 '
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MV$,%P.0$RUD!"U!0)94^-1,.M. , #C3X+"@ARCY@!#*(^UH$3 Y0L#@20
M09C(:8#44:$*/FA!#KB0 ]_1H :5R$$%*L '#BS$G'*8PP<J4+L*2,*:D;O"
M ZX0!=15(2:!RL$<SL"'&OCA#T:*@NNFL+]CA5$K0]@*"^P'/Z@,05SV9.@^
MA3#@ +?%*EJ)WX"C,@2J#/YAP 4NL!+B\I1L[9%>'TW,8NZH& "99C(R+9=A
MXE6OQ\"X0H>98(;F>)D-2L8+[*)-;E(80Q3")H6S ;)1AT-4X@@L"2P<C@7E
M*)DC6(PYBY"/?)Z(G?(,@CS>D0$#&I&RKG;LRMT9Q"+N@(<[+&**,>N.*3RA
MB+1*2RUI^8]=Q[48PM150'&MLX;@N+3)T/&F<@3TA!C#H4$G)P9] =H-+4.&
MWA2Y:U\;-!EL<P0%# $(5N" \D[7MC9<P5<)L!L.""#9,;2 M"YQ A86ATJ*
MD-<" \ "*M5&:RR 0"(6H,$<:+"\RQTN;D(YPT(LL+S*GH$#A O.6M$@84X
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MP(8,&.Y&1-!5&,W"@P10@3P]S_.LA;(00:VLP$7Y!6 L6L;Y2OR<SQ3 055
MH+,0RW_]4X5YA3U9G OTG8 @!@49VHPI1EQ%D"+X$T21QLZAR+T\VH<TF7*L
M2+I C;E 1@SP7,$T7<$$V?YM*!E/P1#/Y13FK13%7,92R8#,Q$?'=(Q\>(?7
M1<(,<!GN_,'90=%Z8)T3,H(G))$()!$>1,+;:4'&:,(</)H=P$&S6-(4',U=
MF0"W]!T<1LC?W=G23,R@^96% !IRQ$#B/8UCG)& X&%BY13/"9)C"!TF4((2
M&( .. Z8[!;B1,#03 &.Q$WO;<]NM4&4E GHZ -L($?T, -S $'0 DJ00$J
M-4 +E(#R<,#R4( .-$#I%9\%@ [B&(#L]<F?R(&Y"4 5\$"U<< '. JU4DG
M80$%?$"D<, >Y$"W<1,;5%:1^ 'L,'O\($J2EL50!+JD$H U :^,$8@$ (
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M3A:PFD)@DTP0VRLB@ [HP!.0UY+4B#MB00O@A \0&Q8@ "I!CQH@B0_T BT
M!-NT7P<0 J1 4R4@PAJDUY6\E@#,006L00YXQ.\M9@]X4A6H@0'<1&WZ /8E
M@ "Y0%I@7 2ZP%E #_0 @]8A7^I17]LQ5,0Q@*)2X % =25%7XVQ#<'0O
MP11H9+90@E;@RA[Y&V-\Y!WA$2>@2[<H!F0<"!@LT(B]%"#"7(6@"!E84-C
MV$H!Z-4X7L' I-!53$^ET ^\D- =S$_AAFVD$$@&0G+@T%)-@BB\Q\UT3!$4
M@2>$(1A.)7B@01HH)=9!D?YZO(<HI%TD=*$C6((7BD!5>@*/BL(;7$%7?N6Q
MD*<=V%E=Q:%>/(B4GM1>7 B$J!1<(MI*X9$,XN&!<(9B"1T0,A:DV= 4\$ ;
M9,Y$)(03M,5_<(("Q($:N$0K64"TJ80%V,!K0L$9](XWL=KI+$%SH@GA^( 5
MN)/C8)-M7@X6. C(< 93*<37 D 1"HJ90$5,,$!1 $/O&,4& #AC$\5 $@
M.,%%%(!WH8&@# \AM$ %>%\-(,(;L,%X48"1,$$(X(T2?!Q$09BS %3Z9$6S
M6"!3K)5F+<9$61R#C%1?@$$8>,N !1#8IS%2<5 ML5;1<5 )B!:;@6V8(AI
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M%4"UQ=T] %@JH-) LXBWN,Y"):6Y=+X9TF1:](^78E6;0[!ZPDPUFM(JQW@
MH$TJ'0M-FDDF(J:Y(WRI0?ZN:DB[Z8H0X( GT:T!"(2,L)IK@M?L<(D>K!JP
MP9?<1HG<R %#<!(3& ZNP0 Q_M:@)FIJV4C;/!<0^ H0O->JL9IE5I,?^('M
MB&*D( (73((?B$\4$ '5Q,"CA> _ 50*9)A_&=2%$4;=$8NQ7,&$>46;_$<_
M!A1]%NCL[@H*7H6N4$4^(MB#:85F^0]#74$$1( _AN?"!8B#A1@-!DS13@8*
M:B1)E11;NI3,W=AC" =C!4=PG.1IF,8>98N)$(SW3BW!DL&%DF^+X%1/*1E(
M&FQB/4VE\1 ': *589T4U6^,SH CL!T70%5ZG(<42:P LYT,S$"::4+&&,*+
M6OX!AM3=FS:%M! 4/@Y!@[RAAM11@T2-&TG-*"<>'B5'DW6-YJF8<>00P_#&
M@%""(I0K#(6H@UI-;_@+W6W6ZG C$(0 NV6( C1%ZT: ,;%2C5CB43A)"_R(
MHD;Q;T5QC5#!X,2-&-"F$Q@ 1! "+"-=,F!O1G%<$9* QR.$[3.03B!9@E!
M"!# :[5$(M% MWU *(+?-7$ &CC")!#"^ C!T-18U-@+&"@KZU)4?D:(0T_%
ML<P%>198M6#<AME*/T'%?CI@Z_;*Q>5G5%Q%5_S*0K+ W0'<6; 0&V84^#*
M%>3!PHW41T5O;\B4*#-(1TWD1T[("6@&BG I*32,0/X7;=%>R-"81E\LG(3P
MH$W6AFI$MFP4[$S&QBK'4)DJQU)9P"IDV7H4@2JD'1YL ![,0!2R'73@ 7:@
M!RID5==)[&QC<U6:K"8P0L.:P@P8P&0H0%O,I]T)E "QX6D\2%E&C:$E'M#V
M(1RELN(I]L'FD#V3I-.]QF)SKX=(;6(I-C#+$ !%%S?:#1!<@8%00AX R[8:
MD^$DP!6$@"FER4YPVDRT )"PVDZ#M % \9V("?:1#@Z\(UW@ #HYD*XA"/V
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M=:4+X, !<)(G$0!X*H%* .$('_Q 'I7($00$(QM4UB1LD'^,%,7$\/U(AX
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M>F\ E8.FU9L!E66K;[NP$"0, 2;9#21%P JP !VLA 8 \8G&?% 0!Y<=N$
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M*!#"@PD.(!%X/G<"P D4*G0JQZ%SY?OS*$N<.%FR1$ \@[..-"QI$J5)5C*
M+\E" (>'*%4,5'$BP E"!&S! 0= $$"',WS0P0$?L&C /"J$ ((":H@P DK
MS/[;KS[R ,!"!QC^J. /-O@@T(DK'E!@(3LXPP@GSH3(XR!(%$DHI\Y2<)&R
M@11@82>#\HA#,CM6 *'*X10@DDBE(C#!3A<4(*()8E@P07)B'!AH"%88$$(
MGJ;(<@K)))M2B1FS9 $.("L3<R<;;T0H!80T"JDBSE)0)(7D9O*H-=TXB6'0
MD#HR*;:7=GMI)I!R'((2%X;P BNGCF)JJ"202L123"]]*JN9R+@-*]]HJBF0
M%[SZ(8I)-"EKE44BB40&1]ARA $N'''$$D?P\$2ONH(5BRPM_O)DL,'F6H2L
M00;!H(HC7H"D3,G>['&*R,+D;*/15$M-I.!8HZ@UU_[*K6@DBDABZ;9T2=6*
MM]QHBJJFUV;#*M.I1KJIMI=2&.*!%:[ (<T\<)"OBBAX<#)-(<",( 0>>#CX
M0H27@"(+/1K$ CX<")#/ /BHH"(*-9QHH04Y8/B !C[X(*2%,SBP@(,/SK#
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MX& B(9\C VH> @<Z,($'3WI;%#X6-\D\X $L>( +5B Q)%&A"E H3WR@ K
MZ($^\(D/>3X6'_DX@0-S(,0<;B8'&E @9S'C@ ]15L06Y,P',G0"%EI0 3[(
MP0?F65IY0'0&1%3B#T\H0!2((+\IV($G<*B,BQ;"F9P(QT8WV8C9!F(0,;$
M(?Z4 %B9XD"$*ZR "#P !.+R)@0G,:QP<TN<"^+0)+P5LI!"J..2YF:XP\U-
M<8JKF[5<X ([[(E.&QD;YC1RHQ=AI'(2\5-LO,"G.7'$=#"I"59XH[
[email protected]
M>F+19C!!"E!=*A#IR]11:G)+IA0P*NF#"D5(D3[@305X-"D@&5:5!>0MKU:[
MZA6N=K4K$7A">9[(GBF*( I5[*4OL1K?7QZA"4:4[Q"I4,)4J&6F]XWQ36;B
M#&@@D8+2E N?]BS-:503$HJ8#G^NB4UN<BD5J^@K*UL95;U"4IRKA(HS(Y&)
M0A0QA"M(0(]*D-A^E@"$-%EM34*(@,3T" 3Y6 $+5/[XV'FP@)WR."$+4/ 9
M <[STC.DK ,]<$ 0- # ;0 9D/\ =:T%-"5( --""$#NB#!3V<80YRL,!.
M&]!2*\Q'!SV5@\OFT ,<P($S85C(F*KDL,HHX$TI6(A$;C0ZLQDD3'S;#!C,
M5IE AB!-;E-2!%9 2"8I(0)7 (/Z $"$2 "$Y"))'25$>\,9))$4"<X0;G
MQ\$E5@B5G$(9)1*VTGGA-3BY""7H:J<]A8TDG$")1>CI)R\<JH!)6)U+9%*2
MB8A.="SR20R88JE$S"Y3\^+=4GY[E>&*ZJ$P8=3M$K&J):0! VO9U?/@ CU;
MV6H&@1%,$0Y1!.QY;Q&QBO[$^!ZA!;XPBRP;$,!/DJ"(*8PP3)#B&F>^&*8P
MV4$C]F2-YT+2W\^D"S4DP2< 4U*OVZQ$*[H\IE9>HKJLH*265ED**80#!F5"
M8@4#P<$2%*:9.(R':FGZDDZ$ (BW34<SAE/I? 0@TQ7"!SX$($#(D#2>#&D(
M #X 00 < " !.$ .9PBR#GR\0QH40 <-$ 6!.!2[ "@!SJ(,H!TX(, !$
M')Y;0C('AB_"=0618=(5(#F$JWEY(6S$DA#>:BTO9=9)5P $#^86@20Y26^*
M0YQ&!4%G0,AYSXA;0=T(A^<T$:Z01$"TD_A:MS'Y,;- HH1/8 E+T8$A)V:3
M8_Z:820ZS'GAM:^IDR) "]J2G+J662FF 1]L$3!(Q-.26R91; G<78YJ=T3Y
M+:9B,I3:TJ36"?5U,K&R*ARP85<,> M<GK<K&8C@NB)@GG>[JY>RR&HP?UF$
M)LI'/BUHXA 8,$!LJ640%H!1 78P&V? :)EM;3*TJQ');5G2FD'1#X#G$C!)
M5EDOV6;EP04LX'("(3R),GAW$%3 ;+S0)?E$(01$H 0/EH =C)J512Q0 A"B
MD( ()&0*A.,!%?[C4AM&IPHDD\_/0L AEEHA &<X X!\T ,0. ") A 5'5X
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MTL0%,"+D!H8*ND@!\N#/1OY./FHJ/IA IA@"?JC"K( !R(&"!+@I0S "6SN
M0)P :*L \X !+(JYBB@/00 0WI YCI #'1.Z5[*I03 !ZP *C@[R@A#,*@
MLRXBY.Z.87@@"J)@_P3I3'AB" R",N**A"1C( :"<"( 20"AD,@L2ZHD#S2.
M"$8J[C)PL$+@Q'
[email protected]_Q(L@9G2)Y$T;ADS8 D\2H'<RY"$02OGNII#NL)
MT^BI=3"'\D -<^HI.4R"\OBM]$BEP4X #R]"<R8M!5B-*6S)EI;#UI9"=WY@
M*7;C)((-7UA)MD1E592 $)Y'V9@M+IRMFFPENAS!N[#'%+[M6 SC,,CB$<0)
M#_Y^9=OX0 B&X@3DB 5H!*T^R8Q^D3+F2B/(A5#P35U2(AE%8B1*1Z#()39B
MXB3HY<!. N"6 RHB4:*H E]> R1<XC44H820Q*1JJJ-"@(\J@Q+6+,SL:&*8
M Q_AN/.XP#* P"J@ DH1$G<9O_\ P QQ D,(&3@\6T(@ H.P(5\H,E\I@H.
M)#V"
[email protected] " 8 A@+05*!P]9) ]6X&"R0 U0J"+Q0Y"HY KX*@^(
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MM51+)4HO_C0SZB8-4IZ0S3!!+G=-U7P-4T;OEY14]3KQ-VH-2@VH&H%B58"
M#TCQ+?Y25QK!,!VA][@@,%1A%<OBG"*!6<SKVN8B+6PE>19! !3AM[R@KGQD
M:UY$<G($C 9B(> P-08L-)*1-U*"=5KSU 9E4&NI)3H1X*PQ23.EMF"/=S#!
MPA@E!:; Q%HN0Z/ /CO2[Z$)UA@T/HJ2T+ )X$ $!* 8HC0.U5522:-!_Q1
MBO[J8P@K<O_N<P*K8.=P1LARACZBH#R:X(5>" >$ ><((FH@#HXXI4Z@E#^
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M2,'T>(=LL2(F="-X7N(X!M&VID (/P9 K-4 T'5N_JXZ^FHA7 (ZE$@*00I
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M%LV4+ C]RH!+KI !'[%$Y0 ')OC?; O)R1G<W)B:ZC/#N#PGNHI7025)?XD
M-@2U$RT/PB!L)L 1;3,/X-)'>&3B)7PX-V"CA"FI(YY"&"B)T8H0@XT!U
M,\PF!#BP/!J)S<A,BZ'C .)#IWQ (37U/[+,(']F,XC@;2STAF(L0[**R!;@
M0WP@IV;H/PB !3P#$>G'<CC#; K".^0C"Y3&=3<$XJY.<?@Q0B');@B'X_8#
M$+9E'8> ;7KR8WY&C)U !Q @JZ),9DJ !L9 5SL@ %JJ E6H VUPA:)@L$0L
MS?Y*5',&]M4PK7M1M)3"AG1!K20J]M10Z;02-8BU A*!IW4RCG#HQC@I01?9
M$BOJLE'S=W:$IS=6+WT^=E0J-FN%YP14Q7C\@+H.&(%+1!(JH1%D +T&P;M8
M816["5FTZS >4P84^ ]RH!*ZH!/$)PY&Y37H"TB^1A$_\R(R0B-T@C(N!W].
MHX:S5IEJ.!ICF"0&56Q/HC>(N)AN4S.E%#?PQ2IN0ET4@0@:L#PH4)4Q, +B
M"W57 ")<P&/.@P".< H$"3S(8^@XD#P$8 AI*B [+DEN FZ34PGR,5_EHQX%
M0'G/0 <RQ $Z 1>2NE"8.':A7\L9P@$1EOEC >0IOYXZY4 SG5DF(3C2&;_
MF( *Z$P*+S *4&@3.*P(#6+C.,X?GPR,>\"'GN!E6*8$_, /Y,! CHX[RQI)
MF* >I0@?$\"PTN0@JC(8Z6HAPF .%QO60JD.^X03]N1K!3%]/8ML3P7^.%$X
MLG=)_@Q*(DD!;$F77._6;&>9;2UD,V5EVP\2AX(L9>LV;L.65L4 V. OF:T2
M%CB>XP(/Q$)80 $4#,$40*$NS *$5^';'L$3)N$/:D 2<J +DN<19$ !&$4X
MT&
[email protected]. GIR.LF3T.IKP :&%7I==%BB/N>\MT+V2J7U(*RV6HDN)SJ9?P<E
MX 5)7T)\$5$).+ -@#(^@OZRK-$UDHSS1[P:" 3I($&:"I8 /:G&OH2P/5-.
ME>W.<*3$;?9#E34( )A7#E 0!EQF!H$. +!#$8!'*EKBE3@I#_8#!^B !ZRS
MILI#Y\[#"JQ@YI3.!RR@!3B@/7JL7O7 "3PF/@Q Z)B,J!W$"G3. 8Z(Q^5@
M#H9J#BK #TSD#$8P WK 9Z:#1ASF:B:-!>* -0 IY6$2S9K(BRB\+HE(C!-
M1</&1@AO-#N+#_F-84'KW^CR)=KE)$J#^KX$#H)P03-,$3SEM_#<4VS)2!/]
MOE&GEBB:UG8'FU?GP5;E!PR@!M[ $KA@+:"M5W[E,(8;"5"!%5J!N%D!"4P!
M"?Y$03+12Q2,Q1%R&X'!=+P8P M*3XV8]HNX3Y/D$(T"FH^Y12+,9887.J&C
ML;Y9 B6B IMAN_4.CL%^@RC21Y=H0RK8NR9,YP120 F@0 T9 +) Q^C0 **
ML' B8)%*"*PO$ BJM=O16@B=@ "N8 IN@A(T*C[P0RG]2(](*@KJL:4(X,"I
M M (&<" 4MX#WD P":C,F:[">B(C;4)30405.#$J:M=0FT<XD H %TO -V
MW \^H 0^@ T^@#WZ@$":BCUT2*JD:JJ&
[email protected]@_F8 Y<A@;.@ ^<Z .0N@>P
M@#\N,$WN=H7?2"DY*$DRC$L@)0XWQY,DHGOYQ'1%:_X^80TT0J\C0&,C!['7
M$-%_2B-CU^:0 0M<V60(?@)3?B!_E?0%. 5D/V4I),C0G_F86HEW5L4)<@ Q
M!<-G92 28K$(0($5@!L40@$5O.LNB+N;O"=[,A@/JL=,S^(&!*XT$&(GSLT-
MFX=?D^?7AY\G3S;#) 0(R$@""5M"V(B0!;+$L .B#4- 7"P1E6H2$@A*,6Q4
MI&&(B*" "T?;, 5$C"B(5FM H6A_MCBJV->F;_Z&^W/N<\[W7%<0G^CA\29R
MQSOWVV/"VR?O;.7LO#(7F[T8E3GP:<Y[[Y;_]I0-7/MKFWM#VW?9DFO!BV"C
M2G"HBT7\T/%E_PL#8?IO=:AJ]UXI PH? QCR/O0) KPRZ?F8W<X]U#J1H9?S
MA)TIO.C'X2S<QBY@?ZG01JI*-V>AVK%((0#8KM!>O_LQF(J[)&K+^@;4CK%W
M=,&49_1P*0;S6I%!T\JZ&8 \/T[A94V78?-\BC7#F88MZW /B.UNF95-5N2L
MM19V2"5DF#>]@B,#HAI:9"^I$P;7P:$\JP%<OV1481Q&31X<_!AF02D41+2T
MDX.P08H[1%DMC&#+"#Y+/_!6=J&AHXD\&K) "Z[HCHO1\:<%#CH2-,2AD3DW
M330)JUU=<Y B[AOGZ)+76FG%2U[ZCC7:T@W74ZQV_?_;KE_T/G6HO*8)76NK
M2&,J)CX%7?15EX\&<OX#& [5;T).F&Q*LNV27WC2S1)SC!V)74^4$4M'>\(>
MD^-^"3IG=2FTEFY&_I::UR5T?NI02 R121\[S'0<)YX#M(_N;"1=:$P5FELW
M?WMJDU53$2@^^B%QHF9V-UW6?.7WGS<3C,9XRQ]3IZLH&8E)=LX-,'J3/8Y-
MC/\DPL,$3;&R<):MJ!H,C\7#UN%UNRD^# #1>(Z]F O#\%:-R&'VJI=YZP!\
MD+%'!@EA&-5>$(P"US1P8_BGUW"=Q</>O)VST,M;IY,:42BR68XT;\&2LD-_
M<^U!"2Y*6#03FNBS(+7R6]&P:-1Q30A-_BUJ&)6IUH&D+DUBE1GQJEJ"R%^-
M BF,V%J%!6*>#U L!!J1A?5451:0V01RUB$+3E6OBU>O$ S]@9D6/2>U+5Q.
M.SU>0CC@H-0FY$?L-*Z+>W1.%:H?X3M:;II(04]TW_[\C)CH/,\.C7%K-VV&
ML65OWR1[+-4](7)SJWEI(K#^5$9CXK(@+3WVGLOU,PZ%IS+JJA83CSVU"B[-
M@@GZY787-@V-VXS>C)?NZ58RU^_M&!G#$I3?MO'P)8VPY/VG_3_(35K7QD1@
ML\N3L]O400UG8\.CO,\68'.>6)!FV4RK^N4?&LX=MK-]:$47"ZOSCK;?*;,V
M^WJ_3)#4C*B^,KDK1>]2BOSL3J7I/0R>T\ 74%125K,]:+C7AYU&M!@[MX@M
MX)%'DNB_"?[&'KE@4:)GA>./$NSC6DK!R$\XP" /SI?AN*M:U? <7(@709$:
MY8AQ@514"/GQ5W589(&0E6)3<WX63TU+1>'B^"V?"7@_L0ARR>%S:36O^5S#
M7=\&D10R(ZP$4=4<E<DY.C"!?VY2,.V'[G8Z7&IQ*/)P*:+;U<WF&0"("HVC
MI#E!<)%NJ/V8ZX!'1?KF-CX1</G]3V(C?SH^$1?_\-8?W0L'@OXHBL#O)O9S
M#/ZH52?2UM]].5.6]&1;(?H,I^_%SRR7C(:JBN^N>E[:!_8&POV4,$P^:2)V
MC%'^_I[>_))<VI.*/ZU2FAP7HI^O.'GU A"A%@Z#X_PNNP6M!O;<?PW.4?6
ML2HE=;!*EUBMOKQ#D0>U1%S_FQ%LVOV;C3$A\<V.578NG)B3A_W=3\'.500N
M9U-OH=M(^0;\X^TA9O=) NM)I6N>0CF"[<3)['&B;)_H84*G J"S1'3G\?!R
MSBJ!TN[(S@P_\S(9Z.GF<S";VV#K,60Z-9$"Q#. =8P6N<^\ 4J EH0V,A ^
M GDP7+C>I#LG!!=+P;2P-77M'*>@7A&*H@+-#)1(.Y$(J@:VKPRH$;QN2D%'
MVK"U5H7R)2LA/Y\2:&T$Y?6_%$/:&BL$"4C<>>.4K0KNVV45,A MA4S>L,T^
MDEKT^T8.X7-^^RC'.?I49"/\OJKG5 IN4/*2_:^#E;&MVADB@T5SV'(J+*$Y
MM?:=SUUZ+1\^WM^&?G<_'5&H-[M5L^H<-B_>2$T3"@=F3<N3EK>);^K?6,N'
M.1GRDRM!W$Y#]U,V\F64GV+0IJ+-?':/0KI&2+$7I)PY2@&%M*DWJJ1'#&,3
M\?EU)3QQ9YO<,L/5SY_8NB[H>M\[8IR2ZYPZ,>W>;+[\N[QZ(OK[=*39)+GT
MA/XW??#:M5-#L<MPQ*VZ\>11FOO,^+Y]2VIL_WD1)<0.0;L%Z^*,2I:;[F.V
M*,P-XX&>]9&#"#)G*3*:2G>N;3=(0.O(/U6)(VE_MG<71XHFAY!;M@ FNMP\
M5?/+O^C[I=Y7(<O84"V"SA>' &JQM<ZG?T:EHGSGE\SG^>* =WF&1-TG5J"!
MW ^(<$?76& 2N<SOC1+1>2(FA*6!>'5*F(>JIFV:?R&N.1V#)*M*_7EPDZF1
M)DZ?7B3GG-1X5;=87I@]\.'"V3_%4\U1Y:Z"N;MGB_Q^_RDM\=ZV9(W$!P?B
M.(S,3N62NM)3%OAV<B4%G68VJ6A-DN"GKEOE;[BWMEF$<(Y(N1-RY4#Y&%B4
M-9]M,MAK:MXB[0=E>[7&V'G-16D'J='AJ#N:"]SU+"7QS$4Y)LO^YSKOGQK"
MM7X\JWAX//YK[?%"OV#U6QS>R(X;'G>R\5SC0Y11N_*D[$'8*6WSU[O)QI9J
MX/NYAJJ9J<!7$W4C]BVV;O^&U'DGB?5N<8F1%AGHPJLV<KD2H&@TE\T^K+_Z
M6VNF3X18)]RSB:IM,L:I=FRN2@J+L 4L^6*43Y?$V$(!H@ 1 .=#1@0< M#Y
M__%\WG_965854508RX=EA0 D0;, 7C4-[@UJ^!7K7XZL5O *-P(P4#"("= M
M-T5W08F*99NI$3&6A-#;U!2RQP#8E/0[X(3>/V/OV_S"[QS<5"6^O#]%?.AW
M[T JGZK_+-]ZK9G@=/[#Q[1O>\+BKE/K+;&/6[X:8JUEDM]N,VXUA1AD18_(
M'CK_<U=$&NTLGB:XW]4*JD0EF%V04TEY33.%\#.^<@A).7[LIH7Q5VSC7F2N
MZXL*QMW O8VY!;_UO@)8^+<W6P3^7B99B+XCO_^*?1U!#G@_VZ!L?SY9=%4_
MHWZ36^#7J =X;/K?9^H\MP--A/G_TN8*4BQ==IV+BY^30&XM[X(Q&F+).[1+
MD,@7P97?T&L\GV"5S [NK!PZ?QF0&WUMWUW98V$XR4J,=$C!^OL 5QT8,AM_
M,AB7L^TR&]?.C/1K?(R T<C.9EK!&P?#LQ(<4'5(KU;9.#<U:)OU*UVX;F2=
M#@<K2A@RL@A:P!X)-#9<YH-I1D/@':M]9Z6AH.^G<IN9QR :I@910FT*9WO8
M#8U#[+6!QBL;W/%#WY)[TZ\7W?6[EM?%^G+70O%"H?S7XI]MRJ5]IKWDV);C
M.N"T23-\^M$+#S<C3M6F$#"#^B4JRS35_#HI?=;LS$(&=3EWW6/6^ZA4^F?(
M1(,I%5I4*#%)0 P(,5H +(4GN9&"=1W#=JM= ^H9P^\W=+5@3O>B>/7PE 4A
MV=UML_=6U*)QU++Q^ACB3)1E(C,N\?J!S0KWC6W,+;;67_'H=VSWTBJK@&'1
MWC&K'\4'SM.8J#RN<TX67 6?@+)_K#\8TPLK\4*\7#"IS##E";UG\H]5CR5F
MCL"/?CF8%X6(5$)I9'\?71HC1!4T:&%."N\ (<@189P5H>$ L$D#P7J#*^R!
M/ ;2$@</[X5Q1EFE>"O3*[">S\F>O>$WKR+E(F2E!GU3ABY61Y#5WBQ6X$<H
MNY,##\Q%@&H[@RH0S<#-CR7?;P ]5*C[3V!IJW[YPN^1(HK] CPSEE(@#3O/
MB01(CNW11OO9F,_IEB_%6_^.C;U751*Q(.0ON3FHA,JA';DM"0NO*0]BCK5]
M,'KP*FM_7_I?4!Z^WBHFU8S@N2%PE?2:$P28I4($MD$L]_O<:)=>=. H0S_?
ME=XNL1O!]K#6.V3E^RZO/X'#%(E03!R&*4*M,B$R ^$X;/'TO5OH6'JWMM4X
M"ND;8A<PYR:-I%LMYS*W'301R'?^[_W.]0G<UQ^DK(]FQ Z239!U9EQJYN\^
M HI\\Z,CUK!L9T[DQ8..W!9TS*K1&YKIT;3-7\J@)AD%*2R[V@A$LLKS>^'P
M' 27[+'(1H;UPOU4]@G\K#@ X;,(CQ?Z.[&!<#)0%@)F:J H=7T#WFIQ@1BN
M@5SXL%D>=(0/(E2H8PS,=@:FFE^\1Q/1<+V^( >A#*6*C+(.X5#A5%0> !%7
MLY_-04_G8!<@@K37QMKMS+0I(4#B%=E;,3X<[#UDE(]'Y2@JR<Q-A414L:UE
M9,K6OXU-OM%WOH"VOA#D\/O2M1XI)_+ T\X?_)]C1']UU'$HSL]L+)N %,)U
M$F^"]2\I%;9+\81:^'OYAI*H^-!Q:^Q7-+PM/TC(H?E(*!XQS,+U-T$L5,,F
M.\#J5<"UG:<N"&"\TH"8^)R-Z3GQ8\1[H&\H"G/>+F 28W5>9I(XP]M28.U:
M0_KVGN7(W; M78SWD869I>!+XY-O&/_4"FP LH]^\2[ F3(ED-+LQ)%!C#\+
MH;)S4BA0SM4 "[?K5*RO1S3"J>4,2$X.X"/8'.^<3L!.";_T&E=7XL4"D(K,
MQ,@<@!2-F(K#7?EJ([U>2'1')) ;;A5L.\;'63/L1GG;:GJ1<BHJ@*'=<J :
M//L(IK"G.U>%^:C@851 07"8FHTX,>1WM@T2 "LU[[GYL9?'H&G7A4:]?N?
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M/9$U0T9,&%"A\Z\!@*^!\Y4H!)[P?"YY*F@8)@0<!W_+LD%5B^QW*: C(B!
M;7?%MW'H-3Q*31CK:0!8GOSC"PG%"X>?VAS+!&@@0%;C,W/.CWDGT]V&JL8@
MC"*TZ0"U.]+;IQV]F>;\G$W\(G6RN?+J>V?^O+8M?>>F#X72TH=<ZK\;U2U,
MHYVYY/5>)$)=;\W_6BTR[E,^BXQ)9DJ*>9X&TR.6^"ZY]KM)@&?8S$L])\E0
MG7K;T>@MQQ1(53P*+B(?>/[#HQ;+MP<O*X0P03S/W-$*M7BIM++Q4=3*JX?,
MJV/2B$^\ZEQK(';I_6Z2]OT*7I#JJH ?O-R:^WW\2R.K_Q60%9E>MS# SI=
M\\[;2=2$H,,_VUV,&QS(\%$7Q@K#E&BAN$XY[K5 *Y7 X0^&83-=@/5T,/).
M&?6A]VZ#1E -R^<CS'^E/?@;[LU'F;&2S6"P VI=MQ^&L1XB-#<V\8%\(9"-
MQO#(BV3A4RVL!57WMK!I]J"RW.94^@5:WU^6VO-;G]\XPW@;V0N0A1?R^%L\
M>U$30</K?MMM=*FL[E:#PV"HV1!<E9E ?2GDLXEO:H@#_5O7VBW- H6'Q\X"
M;%M#/$V7^"W@013'RK\6AV?*1G$(8711*$$^%5R9SJC"U$HC6BO3=^R9FG\?
M,E%)3?SY]4IT>G!5X!ZM1K-+<8':(1#_@PE;4?.5G!;8[*0]W[;+?\L_W%?0
M^L!C>;$<Z<J4<81"9<\'0IW;2:G&APSTD-6M5])'4X^#WOOT;S56"X?6>^_7
M=\TT7A@
[email protected]'3",!6BT&W<F1&3M.V1 4W:A&Y+Q@Z!)H?*$M4X
M1G4"+=6G)^ODSAWHJ,54=.9E!^*4%=4VDB-VDA:Q+PK#X%! <;K#]B4 '[9[
M>V><J@TKMD<" YH-;360W6NYO0-8>7N'FLD.4'F!UCG3>/^464:PNS0V-6%
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MA<B/6\ Q(
[email protected]&%NTZ?)4/C!A$;R)*Y>C5H[D/QW.$.@ 26S/X3 "<V
M<I'C/B-T459HI$!B7#""-!>1/;Q/0_K1RRAK!+ 7!-*/H5EC]K9D>(+J]!WD
M+IEMT@_ HY8ACJW2ZE.1 ;"ELQJ%%LH, 0"5VZHX2!!:.B7?13EA62A[Q0VD
M6!@4[P0WY@A'W<_N0IL,-OTWO9GKJM0J&^S7A*2 D'+&JCK"MWN&USL@,6X*
M+38=_$[OWX,P1-XBO-R>#/H*!M$!BA+-C'([,+IE7W:.Q*B] V;PZOYSVA =
MZ!3;9(A0_KS6YBKY"/5#^8,@1NN/VG2N 3P)\GHN0IJP1%FVMB*K%3'@+)*N
M#3'H85D3Q4>Z[B?-G3^7%#6=D K6#&RHEI#^5^YZY)G1,GFPO'9Q_[DO)UYJ
MX_T"<\'-KMIA:_#=4+GMJFLB\/P[_7_@%M]:]I^;J%YH7MR,F<9D8FO'$WI*
M@=E3_;%EH;,S/_?:^HX_G=SAKQ)SJ2R:&C.X7<<-_M0=,O6\6[7]?CL<6ZH*
MM&+&35"<BAQC9"I?IBP3D3=C2A*0I<_GR_.Y?$Z9"">A[,FJ( "< P'EGMX(
M9]A!":07JTKH9%X[1?&Y#ZZ,1DR_</(7C)S66[L+R_#C-0J5A+HQ6[R[\6NL
M#\/ ,&<C4_P>:7BWEK"R;U?4U,U5ZDW_-SW]83<SZVOSDEJE5.F%R[D+#UHW
M;/KQYS]G8OY)&1(M4J<PD;W.=YJ B-"LE&_CU.I;6<OHP^^CO7[2:_QS9JM;
M.9]CW"N2(1NS /J'RYP>G/0_+R$ @L#&_P=02P,$% " @ XGUS'YRS!J4%
M 0 /@( @ !024-3+DE$6*V1P4_",!2'SR[9__!.1DFV@ 'N9>L P=*,
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M,@(OY7OY+17^ %!+ 0(4 !0 @ ( )V#-QV2>4/<C5$ Y2 +
M ( R-C P5D%.+DI01U!+ 0(4 !0 @ ( )J^4A]+\+@@-:H"
M #JJ @ ) ( +91 !!4%!,12Y'24902P$"% 4 ( " !L
MOE(?"O14S[20 !*D@ # " 2_ ( 1E544D502$XN1TE&
M4$L! A0 % " @ ( )>1\(-I4PV@ A]H H @ \(P#
M $1.04Y%5"Y'24902P$"% 4 ( " @ EYS 6.7*[. 5T0 "0
M " !(9P0 1$5&+3$N2E!'4$L! A0 % " @ ( )>4/ >!WDV
M-MH D @ '38% $1%1BTT+DI01U!+ 0(4 !0 @ ( "
M"7EU>YK-NNH *'M ) ( "@/!@!$148M-2Y*4$=02P$"
M% * 4I%H?QA+*/K8, "V# # " )^@8 ,T1?
M149&7TPN1TE&4$L! A0 % " @ ':1:'U;EGF3;O G[X H
M @ Z08' $)!4DQ/5RY'24902P$"% 4 ( " !%I%H?M:7_"P$: @#*
M&P( "0 " #LPP< 2T5(3T4N1TE&4$L! A0 % " @ XGUS
M'YRS!J4% 0 /@( @ 0 @ %-X) %!)0U,N24184$L%!@
0 + L 9@( #_?"0
end
Revised Index File (CUHS)
------------------------------------------------------------------------------
Files in this Archive
EFF1.TXT
* THE DOCUMENT CASE
A collection of briefs, judgments
white papers, rulings, and references of
moment to the issues of law and order on
The Electronic Frontier
EFF2.TXT
bill_of_rights_online.paper
Harvey Silverglate, "LEGAL OVERVIEW: THE ELECTRONIC FRONTIER
AND THE BILL OF RIGHTS". Striking balances properly among
freedom of speech, the right to privacy and protection from
unwarranted governmental intrusion will not be easy, but if
they are struck too far in one direction or the other,
important social and legal values surely will be sacrificed.
EFF3.TXT
bbs_defamation_liability.paper
John R. Kahn, "DEFAMATION LIABILITY OF COMPUTERIZED BULLETIN
BOARD OPERATORS AND PROBLEMS OF PROOF". The scope of this
Comment is to examine issues that arise in tracing computerized
defamation to its true source. Must read for all SYSOPS and
potential SYSOPS concerning your liability for information
posted on your BBS.
EFF4.TXT
comp_crime_laws.list
List of computer crime related statutes by state
EFF5.TXT
comp_law.biblio
1991 bibliography of computer-law related materials, especially
on the subject of copyrights and digital media (computer
software, CD-ROM, etc.) for librarianship.Reviewed by Martin
Halbert, from The Public-Access Computer Systems Review.
EFF6.TXT
comp_privacy_vs_rights.paper
Michael S. Borella, "COMPUTER PRIVACY VS. FIRST AND FOURTH
AMENDMENT RIGHTS". This paper discusses cyberspace and its
increasing role in the life of every human being, not just
those who actually use a computer, and explores the legal
battles and rights issues regarding cyberspace.
EFF7.TXT
copyrt_myths.faq
A discussion on the facts and myths surrounding copyright law
including computers and the internet. Written by Terry Carroll
and contains all six volumes of the FAQ.
EFF8.TXT
cyber_constitution.paper
Laurence H. Tribe, "The Constitution in Cyberspace" the keynote
address at the First Conference on Computers, Freedom and
Privacy1991
EFF9.TXT
cyberliberties_kapor.article
Mitch Kapor, "Civil Liberties in Cyberspace: When does hacking
turn from an exercise of civil liberties into crime?"
EFF10.TXT
cyberspace_legal_matrix.article
Lance Rose, "Cyberspace and the Legal Matrix: Laws or
Confusion?" Article on legal aspects of electronic networks, or
"cyberspace". First part is an overview of the many types of
laws that may apply to different network situations. Second
part examines some of the problems and results arising from
clashes between differrent laws and regulations of cyberspace.
EFF11.TXT
doj_search_seize_epic.analysis
EPIC Analysis of New Justice Department Draft Guidelines on
Searching and Seizing Computers
EFF12.TXT
* CuD 2/2 Electronic Publication and the 1st Amendment
EFF13.TXT
ecpa.law
the Electronic Communications Privacy Act, with relevant
sections of other laws as modified by the ECPA (these
annotations by Mike Godwin and Shari Steele).
EFF14.TXT
edgar_grant.announce
November 1993 announcement that Congressman Edward Markey
(D-MA) announced that the National Science Foundation would
fund a pilot project to place the Securities and Exchange
Commission's (SEC) Electronic Data Gathering, Analysis and
Retrieval (EDGAR) system online for users of the Internet.
EFF15.TXT
elec_rights_ala.papers
ASCII version of a printed booklet distributed at the American
Library Association conference in July 1991 dealing with
citizen rights and access to electronic information
EFF16.TXT
nbc_comp_crime.transcript
Script from the NBC "Almost 2001" computer crime news report
aired May 1994
EFF17.TXT
search_and_seizure.speech
Harvey A. Sliverglate & Thomas C. Viles, "CONSTITUTIONAL,
LEGAL, AND ETHICAL CONSIDERATIONS FOR DEALING WITH ELECTRONIC
FILES IN THE AGE OF CYBERSPACE", from Federal Enforcement
Conference 1991, Washington DC. How far can governments,
companies and individuals go when gaining access to
information?
EFF18.TXT
sentencing_guidelines.eff
EFF statement of opposition to 1993 proposed sentencing
guideline applicable to violations of the Computer Fraud and
Abuse Act of 1988, 18 U.S.C. 1030 (CFAA). See previous file for
the result.
EFF19.TXT
* United States Sentencing Commission: Proposed 59th Amendment
EFF20.TXT
tempest_legal.draft
Christopher Seline, "Eavesdropping On the Electromagnetic
Emanations of Digital Equipment: The Laws of Canada, England
and the United States", draft article. This document explores
the legal status of a surveillance technology known as TEMPEST.
Using TEMPEST the information in any digital device may be
intercepted and reconstructed into useful intelligence without
the operative ever having to come near his target. The
technology is especially useful in the interception of
information stored in computers.
EFF21.TXT
* "ACM COMPUTERS SEIZED BY ILLINOIS INSTITUTE OF TECHNOLOGY"
EFF22.TXT
* CompuServe v. Patterson
EFF23.TXT
* MTV Sues Curry
EFF24.TXT
* MCI Worker Charged with Huge Phone-Credit Theft
EFF25.TXT
* Litigation Anaylysis: The cases of: Steve Jackson and Craig Neirdorf
EFF26.TXT
* 2600 Mall Bust
EFF27.TXT
* Scotland and Italy cracks down on "Anarchy Files"
EFF28.TXT
* Commentary: Phiber Optik goes to jail.
EFF29.TXT
* Legions of Doom Indictments (Chicago Members)
EFF30.TXT
* When Copying Isn't Theft:
How the Government Stumbled in a "Hacker" Case
_________________________________________________________________
* = All text was Archived under the EFF Web-Site and appended by CUHS.
########## |
########## |
### | THE DOCUMENT CASE
####### |
####### | A collection of briefs, judgments
### | white papers, rulings, and references of
########## | moment to the issues of law and order on
########## | The Electronic Frontier
|
########## |
########## |
### | Document #: 1
####### | Title: EFF Amicus Brief in U.S. v. Riggs
####### | challenging computer-use prohibition
### | in "hacker" defendant's sentencing
### | Archived/Published to the Net: May 23, 1991
### | Filename: riggs.brief
|
########## |
########## | Anonymous ftp archive maintained by
### | Mike Godwin and Chris Davis at
####### | The Electronic Frontier Foundation (eff.org)
####### |
### | These files are in the "docs" subdirectory
### | of the ftp directory. Related files may be
### | found in the EFF and SJG subdirectories.
IN THE UNITED STATES COURT OF APPEALS
FOR THE ELEVENTH CIRCUIT
NO. 90-9108
NO. 90-9129
UNITED STATES OF AMERICA
Plaintiff-Appellee,
v.
ROBERT J. RIGGS
Defendant-Appellant.
A DIRECT APPEAL OF A CRIMINAL CASE
FROM THE UNITED STATES DISTRICT COURT FOR
THE NORTHERN DISTRICT OF GEORGIA, ATLANTA DIVISION
BRIEF OF AMICUS CURIAE
ELECTRONIC FRONTIER FOUNDATION
ERIC M. LIEBERMAN
NICHOLAS E. POSER
RABINOWITZ, BOUDIN, STANDARD,
KRINSKY & LIEBERMAN, P.C.
740 Broadway - Fifth Floor
New York, New York 10003
(212) 254-1111
HARVEY A. SILVERGLATE
SHARON L. BECKMAN
SILVERGLATE & GOOD
The Batterymarch Building
80 Broad Street - 14th Floor
Boston, Massachusetts 02110
(617) 542-6663
Counsel for Amicus Curiae Electronic Frontier Foundation
----------------------
United States v. Riggs, Nos. 90-9108 and 90-9129
CERTIFICATE OF INTERESTED PERSONS AND
CORPORATE DISCLOSURE STATEMENT
Pursuant to Local Rule 26.1 of this Court, it is hereby certified
that the following persons and entities have an interest in the outcome of
this case or have participated as attorneys or as judges in the
adjudication of this case:
Kent B. Alexander, Assistant United States Attorney
Sharon L. Beckman, Attorney for Amicus Curiae
Electronic Frontier Foundation
Electronic Frontier Foundation, Amicus Curiae
Honorable J. Owen Forrester, United States
District Judge, Northern District of Georgia
Paul S. Kish, Attorney for defendant-appellant
Eric M. Lieberman, Attorney for Amicus Curiae
Electronic Frontier Foundation
Nicholas E. Poser, Attorney for Amicus Curiae
Electronic Frontier Foundation
Rabinowitz, Boudin, Standard, Krinsky
& Lieberman, P.C., Attorneys for Amicus
Curiae Electronic Frontier Foundation
Robert J. Riggs, defendant-appellant
Harvey A. Silverglate, Attorney for Amicus
Curiae Electronic Frontier Foundation
Silverglate & Good, Attorneys for Amicus
Curiae Electronic Frontier Foundation
___________________________
NICHOLAS E. POSER
STATEMENT OF INTEREST OF AMICUS
CURIAE ELECTRONIC FRONTIER FOUNDATION
Amicus curiae Electronic Frontier Foundation submits this brief to
assist the Court's review of the special condition of the defendant's
supervised release imposed by the district court prohibiting him from
owning or personally using a computer. Pursuant to Fed. R. App. P. 29,
the Foundation submits this brief with the written consent of both the
defendant and the government. The letters of the parties consenting to
the filing of this brief have been contemporaneously submitted to the
clerk of the Court.
The Electronic Frontier Foundation believes the condition barring
computer ownership and personal use substantially infringes First
Amendment rights of expression and association. The legality of the
condition presents a novel and important question, whose resolution by
this Court will have a profound impact on the development of the law. As
explained below, the question presented here is precise of the kind which
the Foundation was established to address and about which it has
considerable expertise.
The Electronic Frontier Foundation is a nonprofit organization
established in 1990 to promote the public interest in the development of
computer-based communication technology.
The founders and directors of the Electronic Frontier Foundation
include Mitchell Kapor and Steven Wozniak, two of our nation's leading
experts in the area of computer technology. Mr. Kapor founded the Lotus
Development Corporation and designed and developed the Lotus 1-2-3
spreadsheet software. Mr. Wozniak was one of the co-founders of Apple
Computer, Incorporated. These individuals have comprehensive knowledge of
the developing computer-based technologies and the promises and threats
they present.
The Foundation's goals, as set forth in its mission statement, are
as follows:
Engage in and support educational activities which increase popular
understanding of the opportunities and challenges posed by developments in
computing and telecommunications.
Develop among policy-makers a better understanding of the issues
underlying free and open telecommunications, and support the creation of
legal and structural approaches which will ease the assimilation of these
new technologies by society.
Raise public awareness about civil liberties issues arising from the rapid
advancement in the area of new computer-based communications media.
Support litigation in the public interest to preserve, protect, and extend
First Amendment rights within the realm of computing and
telecommunications technology.
Encourage and support the development of new tools which will endow
non-technical users with full and easy access to computer-based
telecommunication.
While the Foundation regards unauthorized entry into computer
systems as wrong and deserving of punishment, it also believes that
legitimate law enforcement goals must be served by means that do not
violate the rights and interest of the users of electronic technology and
that do not chill use and development of this technology.
The novel question presented in this appeal falls squarely within
the expertise and interest of the Electronic Frontier Foundation. The
Foundation believes it can be of assistance to the Court in determining
whether the condition imposing a computer ban infringes rights of speech
and association in a broader manner than is reasonably necessary to
achieve the goals of the supervised release statute.
Accordingly, the Foundation submits this brief.
STATEMENT REGARDING ORAL ARGUMENT
Amicus curiae Electronic Frontier Foundation requests oral
argument in this appeal, which presents the novel question of the legality
of generally prohibiting computer ownership and personal use as a
condition of supervised release. Because computers are means of
communication and association with others, the prohibition raises
important issues under the First Amendment. Amicus has comprehensive
knowledge of computer-based technologies and a deep interest both in
developing public understanding of those technologies and of the civil
liberties implications of governmental restrictions on their use. (See
Statement of Interest of Amicus at pp. i-iii.) Amicus believes oral
argument will assist the court in resolving the legal issue presented by
the computer ban.
TABLE OF CONTENTS
Pages
CERTIFICATE OF INTERESTED PARTIES ..................... C-1
STATEMENT OF INTEREST OF AMICUS
CURIAE ELECTRONIC FRONTIER FOUNDATION ................. i
STATEMENT REGARDING ORAL ARGUMENT ..................... iv
TABLE OF CONTENTS ..................................... v
TABLE OF AUTHORITIES .................................. vii
STATEMENT OF JURISDICTION ............................. xi
STATEMENT OF THE ISSUE ................................ 1
STATEMENT OF THE CASE ................................. 1
(i) Course of Proceedings and
Disposition Below ............................ 1
(ii) Statement of Facts ........................... 2
(iii) Scope of Review .............................. 2
SUMMARY OF ARGUMENT ................................... 3
I. THE PROHIBITION ON OWNERSHIP AND
PERSONAL USE OF COMPUTERS TRENCHES
HEAVILY ON RIGHTS OF EXPRESSION
AND ASSOCIATION PROTECTED BY THE
FIRST AMENDMENT ................................... 5
II. THE DISTRICT COURT'S PROHIBITION
ON MR. RIGGS' OWNERSHIP AND PERSONAL
USE OF COMPUTERS AS A CONDITION OF
HIS SUPERVISED RELEASE IS IMPROPER
BECAUSE IT CREATES A GREATER DEPRI-
VATION OF LIBERTY THAN IS REASONABLY
NECESSARY TO EFFECTUATE STATUTORY GOALS ........... 13
A. The Sentencing Reform Act Requires
That Conditions Of Supervised
Release Not Impinge Unnecessarily
On Liberty Interests ......................... 13
B. The Prohibition On Ownership And
Personal Use Of Computers Is A
Deprivation of Liberty Not Reason-
ably Necessary to Carry Out The
Purposes Of The Sentencing ................... 17
1. The Computer Ban Is Far Too Broad To
Be Reasonably Necessary To The
Statutory Purposes Of Deterrence,
Public Protection And Rehabilitation ..... 17
2. Discretionary Conditions Specifically
Authorized By Statute Or Imposed In
Other Contexts Provide No Support For
The Imposition Of The Computer Ban
Here ..................................... 22
3. This Court Has Authority To
Strike Down The Computer Ban ............. 25
CONCLUSION ............................................ 25
TABLE OF AUTHORITIES
Page
Bell v. Wolfish, 441 U.S. 520 (1979) .................. 17
Buckley v. Valeo, 424 U.S. 1 (1976) ................... 9
Kleindienst v. Mandel, 408 U.S. 753 (1972) ............ 7
Owens v. Kelley, 681 F.2d 1362
(11th Cir. 1982) ................................. 16
Pell v. Procunier, 417 U.S. 817 (1974) ................ 17
Porth v. Templar, 453 F.2d 330
(10th Cir. 1971) ................................. 21
Roberts v. United States Jaycees,
468 U.S. 609 (1984) .............................. 11
United States v. Consuelo-Gonzalez, 521 F.2d 259
(9th Cir. 1975) .................................. 3,17
United States v. Cothran, 855 F.2d 749
(11th Cir. 1988) ................................. 3,16
United States v. Holloway, 740 F.2d 1373 (6th Cir.),
cert. denied, 460 U.S. 1021 (1989) ............... 19,20,
21
United States v. Holmes, 614 F.2d 985
(5th Cir. 1980) .................................. 16
United States v. Jalilian, 896 F.2d, 447
(10th Cir. 1990) ................................. 2
United States v. Jimenez, 600 F.2d 1172
(5th Cir. 1979) .................................. 25
United States v. Lawson, 670 F.2d 923
(10th Cir. 1982) ................................. 3,17,
21,23
United States v. Patterson, 627 F.2d 760
(5th Cir. 1980) .................................. 23
United States v. Pierce, 561 F.d 735 (9th Cir. 1982),
cert. denied, 435 U.S. 923 (1978) ................ 16
United States v. Smith, 618 F.2d 280 (5th Cir.),
cert. denied, 449 U.S. 868 (1980) ................ 21,22-
23
United States v. Stine, 646 F.2d 839
(3rd Cir. 1981) .................................. 15
United States v. Tonry, 605 F.2d 144
(5th Cir. 1979) .................................. 3,16,
17,24
COURT RULES
Eleventh Circuit Rule 26.1 ........................... C-1
Fed. R. App. P. 29 ................................... i
Fed. R. Crim. Pro. 20 ................................. 1
STATUTES
18 U.S.C. 371 ...................................... 1
18 U.S.C. 1343 ...................................... 1
18 U.S.C. 2314 ...................................... 1
18 U.S.C. 2701 et seq. .............................. 7
18 U.S.C. 3551 et seq. .............................. 13
18 U.S.C. 3553(a) ................................... 13,14
18 U.S.C. 3553(a)(2)(A) ............................. 18
18 U.S.C. 3563(b) ................................... 14
18 U.S.C. 3563(b)(1)-(10), (12)-(20) ................ 14,22
18 U.S.C. 3563(b)(6) ................................ 24
18 U.S.C. 3563(b)(7) ................................ 22
18 U.S.C. 3563(b)(9) ................................ 23
18 U.S.C. 3563(b)(21) ............................... 14
18 U.S.C. 3583(a) ................................... 13
18 U.S.C. 3583(d) ................................... 3,13,14
19,22
18 U.S.C. 3583(d)(2) ................................ 13,18
18 U.S.C. 3651 ...................................... 15,16
28 U.S.C. 991-998 ................................... 13
28 U.S.C. 1291 ...................................... x
UNITED STATES SENTENCING GUIDELINES
5B1.4 ............................................... 14
5F1.5, Commentary ................................... 24
LEGISLATIVE MATERIALS
S. Rep. No. 225, 98th Cong. 2d Sess.
reprinted in 1984 U.S. Code Cong.
& Ad News 3182 ................................... 14,15,
16,22,24
PERIODICALS
An Electronic Soapbox: Computer Bulletin Boards and
the First Amendment, 39 Fed. Com L. J. (1987) .... passim
Becker, The Liability of Computer Bulletin
Board Operators for Defamation Posted
by Others, 22 Conn. L. Rev. (1989) ............... 6,7,9
Computer Bulletin Board Operator Liability
for User Misuse, 54 Ford. L. Rev. (1985) ......... 6,9,10
Soma, Smith and Sprague, Legal Analysis of
Electronic Bulletin Board Activities,
7 W. New Eng. L. Rev. (1985) ..................... 6
MISCELLANEOUS
Boardwatch Magazine (May 1991) ........................ 8
Brand, The Media Lab (1987) ........................... 8
Levy, Macworld (Jan. 1991) ............................ 8
Pool, Technologies of Freedom (Harvard University
Press, 1983) ..................................... 5,9,11
Talking On the Computer Redefines Human Contact,
The New York Times, May 13, 1990 ................. 10
Tribe, American Constitutional Law (1988) ............. 11
STATEMENT OF JURISDICTION
The Court has jurisdiction over this appeal pursuant to 28 U.S.C.
1291.
STATEMENT OF THE ISSUE
Amicus curiae Electronic Frontier Foundation, with the written
consent of the parties, addresses the following issue on appeal: Whether
the district court erred in imposing a condition of supervised release
prohibiting Appellant from owning or personally using a computer.
STATEMENT OF THE CASE
(i) Course of Proceedings and Deposition Below
Appellant Robert J. Riggs pleaded guilty to one count of
conspiracy to defraud (18 U.S.C. 371) of an eight count indictment
returned in the Northern District of Georgia. He also pleaded guilty to
one count of wire fraud (18 U.S.C. 1343) of an eleven count indictment
returned in the Northern District of Illinois. (FN1)
Pursuant to Fed. R. Crim. Pro. 20, the Illinois case was
transferred to the Northern District of Georgia for entry of the plea and
sentencing. United States District Judge J. Owen Forrester, Northern
District of Georgia, sentenced Mr. Riggs to 21 months imprisonment,
ordered him to pay restitution in theamount of $233,880.00, and placed him
on supervised release for a term of two years. The court ordered that Mr.
Riggs may not "own personally or directly have control over a computer of
any type for [his] own personal use during the period of supervised
release." R3-75.
(ii) Statement of Facts
The conduct with which Mr. Riggs was charged involved unauthorized
accessing and dissemination of data and information maintained on private
computer networks. At the conclusion of the sentencing hearing for Mr.
Riggs and his two codefendants, the district court imposed the following
special condition of supervised release:
None of the three of you may own personally or directly have control over
a computer of any type for your own personal use during the period of
supervised release. You may operate computers under your community
service situation and in employment situations where you are employed by a
third person and are being supervised by a third person. I'm simply
saying that during the period of your supervised release, you may not
personally use or own a PC or any other kind of computer; is that clear?
(R3-75-76). The condition was neither requested nor commented on by
counsel for the government.
(iii) Scope of Review
The district court, in imposing the ban on computer ownership and
personal use, exceeded its authority under the supervised release statute.
De novo review of the legality of the condition is therefore appropriate.
Cf. United States v.Jalilian, 896 F.2d 447, 448 (10th Cir. 1990) (review
of probation condition).
Even if imposition of the condition were not beyond
statutory authority, where, as here, a condition of supervised release (or
probation) restricts constitutional rights, the condition must be
subjected to "special scrutiny." See, e.g., United States v. Lawson, 670
F.2d 923, 930 (10th Cir. 1982), quoting United States v.
Consuelo-Gonzalez, 521 F.2d 259, 265 (9th Cir. 1975) (en banc); see also
United States v. Tonry, 605 F.2d 144, 150 (5th Cir. 1979) (applying Ninth
Circuit's standard to condition infringing First Amendment rights).(FN2)
SUMMARY OF ARGUMENT
The district court placed appellant Robert J. Riggs on supervised
release for a period of two years and made a condition of the supervised
release that Mr. Riggs neither "personally use nor own a PC [personal
computer] or any other kind of computer." R3-76. The statute governing
conditions of supervised release requires that conditions create no
greater deprivation of fundamental rights than is "reasonably necessary"
to achieve specified purposes of the 1984 Sentencing Reform Act. See 18
U.S.C. 3583(d). The computer ban cannot meet this standard andthe
district court's sentence should be modified to eliminate this condition.
The ban on personal ownership and use of computers heavily burdens
rights of expression and association protected by the First Amendment.
Because of technological advances in computers and telecommunicatons in
recent years, computers have become a major, and in some circumstances the
primary, way that individuals express their views, receive information and
ideas, and associate with those sharing their interests. Individuals
proficient in the new technology now exercise these fundamental rights
through electronic bulletin boards, computer networks and electronic mail.
(These facilities are defined infra.) The ban on computer ownership and
personal use will make it impossible for Mr. Riggs to exercise his rights
of expression and association through these facilities for two years after
his release from prison.
A complete ban on computer ownership and personal use is a grossly
overbroad restriction that is not "reasonably necessary" to accomplishing
the statutory purposes of deterrence, public protection and rehabilitation
of the defendant. Just as a complete ban on personal telephone use would
be an overbroad condition of supervised release for a defendant convicted
of wire fraud by use of the interstate telephone lines or a complete ban
on personal use of the mails would be an overbroad restriction for a
defendant convicted of mail fraud, so the computer ban is overly broad.
The computer prohibition is far more sweeping than necessary to
effect such purposes as deterring the defendant from committing and
protecting the public from further crimes. The ban indiscriminately
prevents not just illegal conduct, but all activities on computers,
including wholly legitimate ones involving expression and association.
Similarly, it prevents all associations with others that can be
accomplished through
computers, not merely associations with specific individuals who have
committed computer crimes.
Comparison with narrow discretionary conditions authorized by the
statute demonstrates the inappropriateness and overbreadth of the computer
ban.
I. THE PROHIBITION ON OWNERSHIP AND PERSONAL
USE OF COMPUTERS TRENCHES HEAVILY ON RIGHTS
RIGHTS OF EXPRESSION AND ASSOCIATION PRO-
TECTED BY THE FIRST AMENDMENT
The rise of computer technology, particularly over the past ten
years, has created new and increasingly important means for citizens to
communicate and associate with one another. For individuals, like Robert
Riggs, who have become literate in the forms of communication made
possible by computer technology, a prohibition on ownership and personal
use of computers represents a major restraint on rights of expression and
association protected by the First Amendment.
Advances in electronic communications technology have
revolutionized citizens' abilities to and methods of communicating. As
one distinguished scholar has put it:
The technologies used for self-expression, human intercourse, and
recording of knowledge are in unprecedented flux. A panoply of electronic
devices puts at everyone's hand capacities far beyond anything that the
printing press could offer. Machines that think, that bring great
libraries into anybody's study, that allow discourse among persons a
half-world apart, are expanders of human culture. They allow people to do
anything that could be done with the communications tools of the past, and
many more things too.
Pool, Technologies of Freedom 226 (1983).
For the individual citizen, the personal computer has
been the foremost means by which the ability to communicate has been
expanded. The owner of a personal computer may, from his or her own home,
use electronic bulletin board systems, electronic mail and computer
networks systems. Each of these services offers unprecedented means of
expression and association.
Electronic bulletin board systems are computer systems which
permit users to communicate with others in a variety of ways.(FN3) Users
can send or "post" messages, read messages left by others, and hold direct
conversations. Electronic Soapbox, 39 Fed. Com. L. J. at 217. Electronic
bulletin boards allow electronic conversations, which can occur between
two or among hundreds of people. Id. at 218. The boards offer
a unique way for a group of people to discuss an idea or an event. One
person starts the discussion by posting a message. Others read the
message and add their comments. One need not respond immediately -- a
person can carefully prepare a reply and post it later. The people
involved need not be in the same place at the same time and do not have to
know each other. The participants in the discussion do not even have to
know each other. Those not actually adding to the discussion can benefit
simply by reading the posted comments.
Note, Computer Bulletin Board Operator Liability for User Misuse, 54 Ford.
L. Rev. 439, 440-41 (1985). Boards can be used to hold conferences, which
can be unstructured discussions or structured events such as professional
meetings or press conferences. Computer Bulletin Board Defamation, 22
Conn. L. Rev. at 212. Computer networks, like the bulletin boards, offer
the opportunity for numerous individuals to participate in a
conference.(FN4) Bulletin boards and networks thus offer not only a forum
for individuals to exercise their rights of free expression, but also a
forum for exercise of the right to receive ideas. See, e.g., Kleindienst
v. Mandel, 408 U.S. 753, 762-63 (1972), and cases cited therein.
Many electronic bulletin boards and computer networks offer a
service known as electronic mail ("E-mail") by which a subscriber to a
computer system may send correspondence to another user of the system via
a central computer. E-mail is addressed to one or more accounts on a
computer system assigned to specific users, and is typically stored on the
system until read and deleted or stored again. The privacy of E-mail is
typically secured by means of a password so that only individuals with
knowledge of an account's password can obtain access to mail sent to that
account. Thus computer systems provide a method for individuals to engage
in private(FN5) conversations with one another. Like the use of
electronic bulletin boards, use of E-mail is widespread. See Electronic
Soapbox, at 219 n.10; see also Brand, The Media Lab 23, 24 (1987),
estimating that by 1987, two and a half million homes were linked to
services providing E-mail and related services and estimating 250 million
to one billion messages a year are transmitted by E-mail.
Because of the popularity and widespread use of personal
computers, electronic bulletin boards provide a very significant new
channel of communication. Bulletin Board systems range in size from small
systems operated by individual using personal computers in their homes to
larger systems operated by commercial organizations. Two of the largest
systems -- Prodigy, operated by IBM and Sears, and CompuServe, operated by
H&R Block -- have over 330,00 users and half a million users respectively.
See Levy, Macworld 69 (Jan. 1991), Computer Bulletin BoardDefamation, 22
Conn. L. Rev. at 204 n.4. Industry estimates indicate there are
approximately 32,000 bulletin board systems in operation in the United
States today. Boardwatch Magazine 8 (May, 1991).
The possibilities for speech and association presented by computer
bulletin boards are easily and cheaply available to the public. "If one
has a personal computer, gaining access to a computer bulletin board is as
easy as dialing a phone number." Electronic Soapbox, 39 Fed. Com. L. J.
at 218. In fact, in one sense bulletin board systems are simply
extensions of telephone service, since it is usually through a modem
connected to telephone lines that the personal computer user is linked to
the computer operating the board and to other people who themselves are in
telecommunication with the board. Id.
The ease and economy with which communications can be made through
boards makes them an increasingly important method for the individual
citizen to be heard. "In an age when most forms of mass communication,
and thus public debate, are controlled by a small number of people,
bulletin boards have the potential to play an important role in the
exploration and exchange of ideas." Bulletin Board Operator, 54 Ford. L.
Rev. at 441. Thus, the boards fairly have been analogized to Hyde
ParkCorner, town meetings, the Democracy Wall, or leafletting, and called
the printing presses of the twenty-first century.(FN6)
Electronic bulletin boards permit communication on an unlimited
variety of topics. Boards have been recognized as an effective forum for
individual expression of opinion on matters of public interest and for
public debate of controversial issues. Bulletin Board Operator, 54 Ford.
L. Rev. at 440 and 444. Boards are thus a forum for speech acnowledged to
lie at the heart of the First Amendment. See, e.g., Buckley v. Valeo, 424
U.S. 1, 14 (1976), and cases cited therein.
But electronic bulletin boards also address a wide variety of
other subjects and interests, ranging from business to religion.
Electronic Soapbox, at 222. One common subject is computers themselves.
Id. Individuals accessing a board devoted to computer use can, for
example, ask technical questions about particular computer programs or
seek advice about computer products and their capabilities. See Computer
Bulletin Board Operator, at 440.(FN7)
Denial of access to computers may close off the sole or at least
the primary means of associating with those who share one's interests.
Electronic bulletin boards may be the only place in which issues one is
interested in are being addressed, audiences one wishes to reach can be
found, or information one needs is being offered. Because of the
possibilities for conversation among many people and the enormous
distances that separate individuals interested in a particular topic, use
of an electronic bulletin board may be the only feasible means of
communication on that topic. See, e.g., 'Talking' on the Computer
Redefines Human Contact, The New York Times, May 13, 1990 at 1
("[C]omputer networks often become electronic communities that give people
thousands of miles apart the feeling of being connected in a small
village, with all the intimacy and ease of communication that implies.")
Electronic bulletin boards have also become a means for
individuals to meet and socialize with others who share their interests.
The growth of computer networks is changing how people "find friends [and]
seek entertainment." 'Talking' on the Computer Redefines Human Contact,
The New York Times, May 13, 1990 at 1.(FN8) Therefore, a prohibition on
personal ownership and use of computers can grossly interfere with an
individual's right to associate for personal as well as professional and
political purposes. See Roberts v. United States Jaycees, 468 U.S. 609,
622 (1984) ("[W]e have long understood as implicit in the right to engage
in activities protected by the First Amendment a corresponding right to
associate with others in pursuit of a wide variety of political, social,
economic, educational, religious, and cultural ends") (citations omitted).
The rapid advance of computer technology to this point has
outstripped our legal system's ability to understand the proper place the
new technology should hold in our scheme of constitutional
protections.(FN8) This disjuncture has surfaced in this case, where the
district court's restriction on computer use has swept too broadly,
infringing the freedom of speech and association that the First Amendment
guarantees.
The ban on computer ownership and personal use significantly
impinges on Mr. Riggs' exercise of fundamental rights. Like a growing
segment of our society, Mr. Riggs communicates primarily through the
written rather than the spoken word.(FN10) In his preference for the
written word Mr. Riggs is similar to many who communicate via computer.
It has been recognized that for some people:
[electronic bulletin] boards offer an opportunity to know and be known by
a nationwide circle, a process called "networking." Written conversation
favors the witty turn of phrase, not the loudest voice. The instant
interaction allows board communication to avoid the fate of the well
written, but slow moving letter. Finally, anonymity allows the timid to
flower: identity, appearance, possibly even personality, become
unimportant.
Electronic Soapbox, at 224 (footnotes omitted). To deny Mr. Riggs the
right to own and to personally use a computer is to deny him his primary
means of expressing himself, receiving advice and information, and
associating with others.
The district court's prohibition is extremely broad. It does not
merely prohibit particular, illegal uses of computers. Rather, it
prevents any use of a computer by Mr. Riggs for his own personal speech or
association. While the district court contemplated Mr. Riggs may use
computers in his community service work and employment, R3-74-76, those
efforts will be on behalf of others and will offer him no opportunity to
express himself, receive information of his choosing or associate with
whom he wishes to communicate.(FN11) The district court's condition will
result in a two-year prohibition on Mr. Riggs' exercise of his
constitutionally protected rights to communicate and associate with others
through electronic means.
II. THE DISTRICT COURT'S PROHIBITION ON MR. RIGGS'
OWNERSHIP AND PERSONAL USE OF COMPUTERS AS A
CONDITION OF HIS SUPERVISED RELEASE IS IMPROPER
BECAUSE IT CREATES A GREATER DEPRIVATION OF
LIBERTY THAN IS REASONABLY NECESSARY TO
EFFECTUATE STATUTORY GOALS
A. The Sentencing Reform Act Requires That Con-
ditions Of Supervised Release Not Impinge
Unnecessarily On Liberty Interests
The Sentencing Reform Act of 1984, as amended, 18 U.S.C. 3551 et
seq. and 28 U.S.C. 991-998, provides, in pertinent part, that the
district court which is imposing a term of imprisonment may, and in some
circumstances must "include as a part of the sentence a requirement that
the defendant be placed on a term of supervised release after
imprisonment. . . ." 18 U.S.C. 3583(a). Where a term of supervised
release is imposed, the statute provides that certain conditions must be
imposed and others may be imposed. In pertinent part, the statute
provides that discretionary conditions on supervised release may be
imposed only to the extent that any such condition:
(2) involves no greater deprivation of liberty than is reasonably
necessary for the purposes set forth in section 3553(a)(2)(B), (a)(2)(C),
and (a)(2)(D). . . .
18 U.S.C. 3583(d).(FN12)
The statute specifies the types of discretionary conditions which
may be imposed on a supervised release by reference to the statutory
provisions listing discretionary conditions of probation. See 18 U.S.C.
3583(d), incorporating 18 U.S.C. 3563(b)(1) through (b)(10) and (b)(12)
through (b)(20).(FN13) The supervised release statutory provisions also
permit the court to impose other "appropriate" conditions, but only to the
extent permitted by the restriction quoted above. 18 U.S.C. 3853(d).
The probation statute contains a similar "wildcard" provision. 18 U.S.C.
3563(b)(21).
As specified in 3583(d)(2), conditions on supervised release must
involve "no greater deprivation of liberty than is reasonably necessary"
to serve the purposes of deterrence ( 3553(a)(2)(B)), public protection (
3553(a)(2)(C)), and training, care or treatment of the defendant (
3553(a)(2)(D)). The concern that civil liberties not be unnecessarily
impinged is reflected in the legislative history of 3583. See S. Rep. No.
225, 98th Cong., 2d Sess. 125, reprinted in 1984 U.S. Code Cong. & Ad.
News 3182, 3307 (hereinafter "S. Rep. at ___, 1984 U.S.C.C.A.N. at ___")
("Whatever conditions are imposed may not involve a greater deprivation of
liberty than is necessary. . . .").
The Sentencing Reform Act of 1984 was intended to codify an
approach to the imposition of conditions in sentencing more protective of
civil liberties than under prior law, which authorized the imposition of
probation "upon such terms and conditions as the court deems best." See
former 18 U.S.C. 3651, repealed by Pub. L. 98-473, Title II, c. II,
212(a)(1),(2), Oct. 12, 1984.(FN14)
The change in approach is unequivocally spelled out in the
legislative history of 3563(b), the provision which sets out the
discretionary conditions which may be applied in probation and supervised
release:
Unlike current law, subsection (b) specifically states . . . that any
condition that involves a restriction of liberty must be reasonably
necessary to the purposes of sentencing set forth in section 3553(a)(2).
This language is designed to allay the fears of such disparate groups as
the ACLU and the Business Roundtable that probation conditions might be
too restrictive in a particular case or might involve more supervision
than is justified by the case. The judge is limited in imposing
conditions of probation to imposing only those that carry out the purposes
of sentencing in a particular case. He cannot restrain the liberty of a
defendant who does not need that level of punishment or incapacitation. .
.
S. Rep. at 99, 1984 U.S.C.C.A.N. at 3282. The Senate report repeatedly
emphasizes that conditions involving deprivations of liberty or property
must be "reasonably necessary" to the purposes of the statutory sentencing
provisions to be upheld. See, e.g., S. Rep. at 94, 95, 96, 1984
U.S.C.C.A.N. at 3277, 3278, 3279.
Because of the significant change in the law, the case law under
former 18 U.S.C. 3651 upholding probation conditions provides the Court
little guidance in reviewing conditions imposed under the Sentencing
Reform Act. See United States v. Cothran, 855 F.2d 749, 751 n.2 (11th
Cir. 1988) (noting change in the law). Whereas previously, conditions
affecting the exercise of constitutionally protected rights could be
upheld if they were "reasonably related" to the purposes of the former 18
U.S.C. 3651, see, e.g., Owens v. Kelley, 681 F.2d 1362, 1366 (11th Cir.
1982)(FN15), under the current law such conditions may only be upheld if
they effect no greater deprivation of rights than "reasonably necessary" to
achieve statutory purposes.(FN16)
B. The Prohibition On Ownership And Personal Use
Of Computers Is A Deprivation Of Liberty Not
Reasonably Necessary To Carry Out The Purposes
Of The Sentencing Statute
1. The Computer Ban Is Far Too Broad To Be
Reasonably Necessary Or Reasonably Related
To The Statutory Purposes Of Deterrence,
Public Protection And Rehabilitation
A fundamental premise of our law is that those subject to the
corrections system retain their constitutional rights except to the extent
that well-articulated requirements of that system necessitate incursions
into those rights. Since this proposition is true for those who are
incarcerated, see, e.g., Pell v. Procunier, 417 U.S. 817, 822 (1974)
("[An] inmate retains those First Amendment rights that are not
inconsistent with his status as a prisoner or with the legitimate . . .
objectives of the corrections system"), it is a fortiori true for
probationers and those on supervised release. See, e.g., United States v.
Tonry, 605 F.2d 144, 150 (5th Cir. 1979).(FN17)
For this reason, "probation conditions that restrict
constitutional rights merit 'special scrutiny.'" United States v. Lawson,
670 F.2d 923, 930 (10th Cir. 1982), quoting United States v.
Consuelo-Gonzales, 521 F.2d 259, 265 (9th Cir. 1975) (en banc). Under
current law, to survive this special scrutiny, a condition impinging
fundamental rights must be "reasonably necessary" to the needs of the
probation or supervised release system. Amicus submits that under the
current standard -- or even under the former "reasonably related" standard
-- the computer ban cannot survive.
The district court acted outside its statutory and discretionary
authority when it imposed the condition that Mr. Riggs may not own or use
for personal reasons any computer during the two years of his supervised
release. As demonstrated in Point I, ante, the court's condition impinges
on Mr. Riggs' First Amendment interests, and therefore the condition must
meet the requirement of 3583(d)(2). The ban on computer ownership and
personal use is grossly overbroad and is not reasonably necessary to
achieve the statutory goals of deterrence, protection of the public, and
rehabilitation.(FN18) Furthermore, it is counterproductive to the purpose
of rehabilitation.
The overbreadth of the ban is most graphically illustrated by
analogy. The condition imposed here is equivalent to a condition
prohibiting an individual convicted of committing wire fraud by means of
interstate telephone calls from owning (or leasing) a telephone and from
making any personal, unsupervised calls. Analogy to telephone calls is
particularly appropriate here, since it is generally by use of telephone
lines that the user of a personal computer communicates with bulletin
boards, networks and other individual computer users. See Electronic
Soapbox, 39 Fed. Com. L. J. at 218. Presumably, it is precisely Mr.
Riggs' ability to "call out" from his computer that the sentencing judge
intended to halt, so that he cannot gain unauthorized access to network
services or data.(FN19) But the ban does not merely prevent Mr. Riggs
from calling systems he is not authorized to enter. It prohibits him from
calling any system or person. It also prevents him from receiving
communications. A sentencing judge in a wire fraud case would
unquestionably conclude that a complete ban on telephone possession and
personal use would be an impermissibly overbroad means of preventing a
recurrence of the wire fraud. So, too, a ban on personal computer use and
ownership to prevent a repeat of unauthorized accessing of computers is
impermissibly overbroad.(FN20)
The ban on personal computer use is also analogous to a general
prohibition on personal use of the mails as a condition imposed on one
convicted of crimes involving fraudulent use of the mails. One such
condition prohibiting use of the mails was recognized to be an overbroad
restriction on First Amendment rights and was struck down. United States
v. Holloway, 740 F.2d 1373 (6th Cir.), cert. denied, 469 U.S. 1021 (1984).
Holloway involved a prison inmate who was convicted of a
conspiracy with other inmates to file false tax returns. She received a
sentence that included periods of incarceration and probation. The
district court imposed two restrictions on Holloway regarding her
correspondence. One prevented her during the period of her probation from
corresponding with prison inmates. Id. at 1381. The court of appeals
upheld this limited prohibition, finding it served purposes of
rehabilitation and public protection. Id. at 1383. The court found it
significant that "Holloway became involved in the scheme only by virtue of
her extended correspondence with inmates," and that Holloway made use of
the mails in committing her crime. Id.
The district court's second restriction provided that "Holloway
could 'communicate by mail only with her relatives, legal counsel and
other recognized counselors' during the period of her incarceration." Id.
Observing that this prohibition would "forbid Holloway from writing
letters to a wide range of persons who had nothing to do with her criminal
conduct," the court stated:
The limitation on Holloway's ability to communicate with friends, informal
advisors and holders of public office is sufficiently broad to affect
values and principles which are undoubtedly at the core of the first
amendment.
Id. Finding the condition overbroad, the court struck it down:
The present restriction on mailing simply is not carefully drawn to
"serve the dual objectives of rehabilitation and public safety." Rather,
it imposes a restriction on Holloway which, because of its breadth, does
not bear a logical relationship to the criminal conduct in which Holloway
has engaged. The restriction is not, therefore, reasonably related to
achieving rehabilitation and to protecting the public. Cf. [United States
v.] Lawson, 670 F.2d [923,] 929-30 [10th Cir. 1982]; [United States v.]
Smith, 618 F.2d [280,] 282 [5th Cir. 1980]; Porth v. Templar, 453 F.2d
330, 334 (10th Cir. 1971).
Id. (footnote omitted).
Like the mail restriction struck down in Holloway, the ban on
computer use is "not carefully drawn" to effectuate statutory purposes and
"because of its breadth, does not bear a logical relationship to the
criminal conduct" in which Mr. Riggs engaged.(FN21) Like the Holloway
ban, the computer ban prohibits Mr. Riggs from communicating with a wide
range of persons having nothing to do with his criminal conduct. While
the fact that Holloway corresponded with inmates as part of her criminal
conspiracy could justify a ban on her correspondence with inmates, it
could not justify a broader ban on her use of the mails. Similarly, Mr.
Riggs' use of a computer to commit his crime does not justify a wholesale
ban on his communicating with anyone by computer.
Amicus submits that no rehabilitation is effected by the wholesale
prohibition on personal computer use. Community service work, which is
contemplated in Mr. Riggs' sentence, is a proper means of rehabilitating
him. Prohibiting development of his skills and isolating him from
legitimate uses and users of computers is surely not "reasonably
necessary" to his rehabilitation.
2. Discretionary Conditions Specifically Authorized
By Statute Or Imposed In Other Contexts Provide No
Support For The Imposition Of The Computer Ban Here
The computer ban condition is not authorized by the "wildcard"
provision of 3583(d), which permits "appropriate" conditions other than
those specified in the statute. Nor do the conditions in 3563(b)(1)-(10)
and (12)-(20) authorize the computer ban. Furthermore, comparison with
some of the discretionary conditions specified in the statute demonstrates
the inappropriateness and overbreadth of the computer ban.
The statute contemplates that in appropriate cases an individual
may be required to refrain "from associating unnecessarily with specified
persons." 18 U.S.C. 3563(b)(7). As the legislative history of this
provision makes clear, a condition limiting associations must be specific,
and tailored to the particular circumstances of the defendant. S. Rep. at
97, 1984 U.S.C.C.A.N. at 3280. Here the condition in effect prohibits Mr.
Riggs' association not just with individuals known to have committed
computer crimes, but with everyone who uses computers.
Even under prior law, reviewing courts have struck down or
modified probation conditions requiring disassociation which swept too
broadly. The former Court of Appeals for the Fifth Circuit, in a case
involving a tax protester's conviction for violating the tax laws,
disapproved a condition that the protester "divorce [himself] from any
organization advocating the willful disobedience of any local, state or
federal law...." United States v. Smith, 618 F.2d 280, 282 (5th Cir.), cert.
denied, 449 U.S. 868 (1980). The Court modified the condition to prohibit
only association with organizations advocating disobedience to the tax
laws. Id. See also United States v. Patterson, 627 F.2d 760, 761 (5th
Cir. 1980) (following Smith); United States v. Lawson, 670 F.2d 923,
929-30 (10th Cir. 1982) (in order to save condition, court interprets it
to prohibit only tax protester's associating with groups urging
disobedience of, as opposed to disagreement with tax laws.) In this case,
the computer prohibition requires wholesale disassociation with everyone
who communicates by computer, and could not withstand scrutiny even under
the analysis of cases decided under prior law.
The prohibition on possession of a computer suggests that the
sentencing court had in mind another of the statutory discretionary
conditions -- that the defendant "refrain from possessing a firearm,
destructive device, or other dangerous weapon." 3563(b)(9). Any analogy
between firearms and computers is extremely inapt. A computer is not a
dangerous weapon; rather, it is primarily a means of communication and
association.
Analogies to revocations of drivers' licenses are also entirely
inappropriate. Unlike a computer, an automobile is not essentially a
means of communication and association. Driving is an activity licensed
by the State, while computer use is First Amendment speech which is not and
cannot be regulated or licensed by the government.
Finally, the provision of the statute allowing restraints on
individuals from engaging in specified occupations, businesses or
professions, 18 U.S.C. 3563(b)(6), provides no support for the imposition
of the computer ban. There is no constitutional right to engage in a
particular job. For example, it violates no fundamental right to prohibit
a stockbroker who has committed crimes in the course of his or her work
from selling stock for a period of time. In contrast, again, the computer
ban is a limitless incursion into fundamental First Amendment rights.
In rare circumstances, First Amendment rights do attach to a job
-- for example, the holding of political office. See, e.g., United States
v. Tonry, 605 F.2d at 150. But in such cases, an individual's commission
of a crime while in public office makes it particularly appropriate to
protect the public by "determining that the very limited activity" of
running for or holding public office "should not be accorded him during
probation. . . ." 605 F.2d at 151.
The condition of restricting employment "should only be used as
reasonably necessary to protect the public." United States Sentencing
Guidelines, 5F1.5, Commentary, quoting S. Rep. at 96, 1984 U.S.C.C.A.N.
at 3279. While protection of the public may have necessitated banning the
defendant in Tonry from the "very limited activity" of public office, it
is not necessary to bar Mr. Riggs from all personal computer use to protect
the public.
3. This Court Has Authority To
Strike Down The Computer Ban
It is within this Court's authority to modify the district court's
sentence by eliminating the prohibition on computer ownership and personal
use. See, e.g., United States v. Jimenez, 600 F.2d 1172, 1175 (5th Cir.
1979). Amicus submits that because the ban clearly trenches on First
Amendment rights and is not reasonably necessary to statutory objectives
of deterrence, public protection or rehabilitation, the Court should
strike it down, rather than remand to the district court.
CONCLUSION
For the foregoing reasons, the sentence of the district court
should be modified to eliminate the condition of Mr. Riggs' supervised
release prohibiting his ownership and personal use of a computer.
Dated: May 17, 1991
Respectfully submitted,
_____________________________
ERIC M. LIEBERMAN
NICHOLAS E. POSER
RABINOWITZ, BOUDIN, STANDARD,
KRINSKY & LIEBERMAN, P.C.
740 Broadway - Fifth Floor
New York, New York 10003
(212) 254-1111
HARVEY A. SILVERGLATE
SHARON L. BECKMAN
SILVERGLATE & GOOD
The Batterymarch Building
80 Broad Street - 14th Floor
Boston, Massachusetts 02110
(617) 542-6663
Counsel for Amicus Curiae Electronic Frontier Foundation
FOOTNOTES:
FN1. Riggs pleaded guilty to a second count of the Illinois indictment,
charging interstate transportation of stolen property, 18 U.S.C. 2314,
but the government moved to dismiss the plea as to this count after it was
revealed that the property was valued at under $5,000, the statutory
minimum. The government did not make a similar motion as to the wire
fraud count because 18 U.S.C. 1343 has no minimum dollar threshold. See
Sentencing Information Filed on Behalf of the Northern District of
Illinois United States Attorney's Office, submitted with the Government's
Sentencing Memorandum and S.G. 5K1.1 Motion. R1-50-1-2 and 7-8.
FN2. Because the condition applied in this case burdens First Amendment
rights, the abuse of discretion standard, see, e.g., United States v.
Cothran, 855 F.2d 749, 751 (11th Cir. 1988), is supplanted by a stricter
level of review.
FN3. See generally Note, An Electronic Soapbox: Computer Bulletin Boards
and the First Amendment, 39 Fed. Com. L. J. 217 (1987) ("Electronic
Soapbox"), Soma, Smith and Sprague, Legal Analysis of Electronic Bulletin
Board Activities, 7 W. New Eng. L. Rev. 571 (1985) (hereinafter
"Electronic Bulletin Board Activities"), and Becker, The Liability of
Computer Bulletin Board Operators for Defamation Posted by Others, 22
Conn. L. Rev. 203 (1989) ("Computer Bulletin Board Defamation").
FN4. Some boards and networks provide for instantaneous conversations.
FN5. Operators of electronic bulletin board systems, like operators of
telephone systems, generally have the technological capability to access
private communications. The privacy of electronic communications is
protected by law. See Electronic Communications Privacy Act, 18 U.S.C.
2701 et seq. Some systems operators as a matter of policy or by contract
with users ensure that no one but the intended recipient can read E-mail.
FN6. See, e.g., Computer Bulletin Board Defamation, 22 Conn. L. Rev. at
204; Pool, Technologies of Freedom 189.
FN7. As the government noted, one of Robert Riggs' three main objectives
was to "learn C Programmming". Government's Sentencing Memorandum and
S.G. 5K1. 1 Motion at 11. R1-50-11. The computer ban will cut him off
from useful sources of information on this subject.
FN8. Stories have been reported of on-line courtships, id., and on-line
wedding receptions and parties. Electronic Soapbox at 219 n.9.
FN9. See Tribe, American Constitutional law 1007 (1988) (quoting Pool,
Technologies of Freedom 7 (1983)).
FN10. As his attorney emphasized at the sentencing hearing, Mr. Riggs
does not speak well, but "writes very well." R3-38. In fact, in
preparing his case, he communicated with his attorney primarily through
written notes and observations. Id.
FN11. It is unclear whether the district court intended to permit
"supervised" personal use of a computer. Even if so, it is simply
unrealistic to suppose that Mr. Riggs will obtain "supervision" from
probation personnel or anyone approved by them which would permit him to
engage in personal use of a computer.
FN12. Section 3553(a) sets out the factors to be considered in imposing
a sentence. The provisions of 3553(a) relevant to a determination under
3583(d)(2) are:
(2) the need for the sentence imposed . . .
(B) to afford adequate deterrence to criminal conduct;
(C) to protect the public from further crimes of the defendant;
and
(D) to provide the defendant with needed educational or vocational
training, medical care, or other correctional treatment in the most
effective manner. . . .
FN13. See "Recommended Conditions of Probation and Supervised Release
(Policy Statement)," which set out "standard" and "special" conditions
that apply to both probation and supervised release. Sentencing
Guidelines 5B1.4.
FN14. See, e.g., U.S. v. Stine, 646 F.2d 839, 842 (3rd Cir. 1981),
quoting former 18 U.S.C. 3651.
FN15. See also United States v. Tonry, 605 F.2d 144, 150 (5th Cir. 1979).
This standard was held to facilitate "'an accommodation between the
practical needs of the probation system and the constitutional guarantees
of the Bill of Rights.'" Owens v. Kelley, 681 F.2d at 1366, quoting
United States v. Pierce, 561 F.2d 735, 739 (9th Cir. 1977), cert. denied,
435 U.S. 923 (1978).
FN16. The change in statutory language from "as the court deems best" to
"reasonably necessary" unquestionably reflects a change to a more
restrictive standard allowing less intrusion on fundamental rights. Cf.
United States v. Holmes, 614 F.2d 985, 988 (5th Cir. 1980).
FN17. The justifications for restricting the freedoms of probationers and
those on supervised release will always be lesser than those for
restricting prisoners. Safeguarding institutional security is a central
objective of prison administration used to justify intrusions on
prisoners' rights, see, e.g., Bell v. Wolfish, 441 U.S. 520, 546-47
(1979), which has no relevance to individuals living outside the prisons.
FN18. Section 3583(d)(2) notably excludes from consideration the factors
set out in 3553(a)(2)(A), including the "seriousness of the offense" and
"just punishment."
FN19. There is no conceivable justification for a prohibition on Mr.
Riggs' engaging in activities on a personal computer disconnected from any
other computer, such as word processing. Yet, the judge's overbroad
condition also prohibits these solitary activities.
FN20. It is a mandatory condition of supervised release that Mr. Riggs
not commit another crime. 18 U.S.C 3583(d). Imposing a discretionary
condition completely barring him from computer ownership and personal use
is an extremely blunt and unnecessary tool for securing his compliance
with the condition that he commit no crimes to which he is already bound.
FN21. The district court's computer ban is broader than the mail
restriction struck down in Holloway.
[Note: First published in _Boardwatch_, June 1991.]
Cyberspace and the Legal Matrix: Laws or Confusion?
by Lance Rose <
[email protected]>
Cyberspace, the "digital world", is emerging as a global arena of social,
commercial and political relations. By "Cyberspace", I mean the sum total
of all electronic messaging and information systems, including BBS's,
commercial data services, research data networks, electronic publishing,
networks and network nodes, e-mail systems, electronic data interchange
systems, and electronic funds transfer systems.
Many like to view life in the electronic networks as a "new frontier", and
in certain ways that remains true. Nonetheless, people remain people, even
behind the high tech shimmer. Not surprisingly, a vast matrix of laws and
regulations has trailed people right into cyberspace.
Most of these laws are still under construction for the new electronic
environment. Nobody is quite sure of exactly how they actually apply to
electronic network situations. Nonetheless, the major subjects of legal
concern can now be mapped out fairly well, which we will do in this section
of the article. In the second section, we will look at some of the ways in
which the old laws have trouble fitting together in cyberspace, and suggest
general directions for improvement.
LAWS ON PARADE
- Privacy laws. These include the federal Electronic Communications Privacy
Act ("ECPA"), originally enacted in response to Watergate, and which now
prohibits many electronic variations on wiretapping by both government and
private parties. There are also many other federal and state privacy laws
and, of course, Constitutional protections against unreasonable search and
seizure.
- 1st Amendment. The Constitutional rights to freedom of speech and freedom
of the press apply fully to electronic messaging operations of all kinds.
- Criminal laws. There are two major kinds of criminal laws. First, the
"substantive" laws that define and outlaw certain activities. These include
computer-specific laws, like the Computer Fraud and Abuse Act and
Counterfeit Access Device Act on the federal level, and many computer crime
laws on the state level. Many criminal laws not specific to "computer
crime" can also apply in a network context, including laws against stealing
credit card codes, laws against obscenity, wire fraud laws, RICO, drug
laws, gambling laws, etc.
The other major set of legal rules, "procedural" rules, puts limits on law
enforcement activities. These are found both in statutes, and in rulings of
the Supreme Court and other high courts on the permissible conduct of
government agents. Such rules include the ECPA, which prohibits wiretapping
without a proper warrant; and federal and state rules and laws spelling out
warrant requirements, arrest requirements, and evidence seizure and
retention requirements.
- Copyrights. Much of the material found in on-line systems and in networks
is copyrightable, including text files, image files, audio files, and
software.
- Moral Rights. Closely related to copyrights, they include the rights of
paternity (choosing to have your name associated or not associated with
your "work") and integrity (the right not to have your "work" altered or
mutilated). These rights are brand new in U.S. law (they originated in
Europe), and their shape in electronic networks will not be settled for
quite a while.
- Trademarks. Anything used as a "brand name" in a network context can be a
trademark. This includes all BBS names, and names for on-line services of
all kinds. Materials other than names might also be protected under
trademark law as "trade dress": distinctive sign-on screen displays for
BBS's, the recurring visual motifs used throughout videotext services, etc.
- Right of Publicity. Similar to trademarks, it gives people the right to
stop others from using their name to make money. Someone with a famous
on-line name or handle has a property right in that name.
- Confidential Information. Information that is held in secrecy by the
owner, transferred only under non-disclosure agreements, and preferably
handled only in encrypted form, can be owned as a trade secret or other
confidential property. This type of legal protection is used as a means of
asserting ownership in confidential databases, from mailing lists to
industrial research.
- Contracts. Contracts account for as much of the regulation of network
operations as all of the other laws put together.
The contract between an on-line service user and the service provider is
the basic source of rights between them. You can use contracts to create
new rights, and to alter or surrender your existing rights under state and
federal laws.
For example, if a bulletin board system operator "censors" a user by
removing a public posting, that user will have a hard time showing his
freedom of speech was violated. Private system operators are not subject to
the First Amendment (which is focused on government, not private, action).
However, the user may have rights to prevent censorship under his direct
contract with the BBS or system operators.
You can use contracts to create entire on-line legal regimes. For example,
banks use contracts to create private electronic funds transfer networks,
with sets of rules that apply only within those networks. These rules
specify on a global level which activities are permitted and which are not,
the terms of access to nearby systems and (sometimes) to remote systems,
and how to resolve problems between network members.
Beyond the basic contract between system and user, there are many other
contracts made on-line. These include the services you find in a
CompuServe, GEnie or Prodigy, such as stock quote services, airline
reservation services, trademark search services, and on-line stores. They
also include user-to-user contracts formed through e-mail. In fact, there
is a billion-dollar "industry" referred to as "EDI" (for Electronic Data
Interchange), in which companies exchange purchase orders for goods and
services directly via computers and computer networks.
- Peoples' Rights Not to be Injured. People have the right not to be
injured when they venture into cyberspace. These rights include the right
not to be libelled or defamed by others on-line, rights against having your
on-line materials stolen or damaged, rights against having your computer
damaged by intentionally harmful files that you have downloaded (such as
files containing computer "viruses"), and so on.
There is no question these rights exist and can be enforced against other
users who cause such injuries. Currently, it is uncertain whether system
operators who oversee the systems can also be held responsible for such
user injuries.
- Financial Laws. These include laws like Regulations E & Z of the Federal
Reserve Board, which are consumer protection laws that apply to credit
cards, cash cards, and all other forms of electronic banking.
- Securities Laws. The federal and state securities laws apply to various
kinds of on-line investment related activities, such as trading in
securities and other investment vehicles, investment advisory services,
market information services and investment management services.
- Education Laws. Some organizations are starting to offer on-line degree
programs. State education laws and regulations come into play on all
aspects of such services.
The list goes on, but we have to end it somewhere. As it stands, this list
should give the reader a good idea of just how regulated cyberspace already
is.
LAWS OR CONFUSION?
The legal picture in cyberspace is very confused, for several reasons.
First, the sheer number of laws in cyberspace, in itself, can create a
great deal of confusion. Second, there can be several different kinds of
laws relating to a single activity, with each law pointing to a different
result.
Third, conflicts can arise in networks between different laws on the same
subject. These include conflicts between federal and state laws, as in the
areas of criminal laws and the right to privacy; conflicts between the laws
of two or more states, which will inevitably arise for networks whose user
base crosses state lines; and even conflicts between laws from the same
governmental authority where two or more different laws overlap. The last
is very common, especially in laws relating to networks and computer law.
Some examples of the interactions between conflicting laws are considered
below, from the viewpoint of an on-line system operator.
1. System operators Liability for "Criminal" Activities.
Many different activities can create criminal liabilities for service
providers, including:
- distributing viruses and other dangerous program code;
- publishing "obscene" materials;
- trafficking in stolen credit card numbers and other unauthorized access
data;
- trafficking in pirated software;
- and acting as an accomplice, accessory or conspirator in these and other
activities.
The acts comprising these different violations are separately defined in
statutes and court cases on both the state and federal levels.
For prosecutors and law enforcers, this is a vast array of options for
pursuing wrongdoers. For service providers, it's a roulette wheel of risk.
Faced with such a huge diversity of criminal possibilities, few service
providers will carefully analyze the exact laws that may apply, nor the
latest case law developments for each type of criminal activity. Who has
the time? For system operators who just want to "play it safe", there is a
strong incentive to do something much simpler: Figure out ways to restrict
user conduct on their systems that will minimize their risk under *any*
criminal law.
The system operator that chooses this highly restrictive route may not
allow any e-mail, for fear that he might be liable for the activities of
some secret drug ring, kiddie porn ring or stolen credit card code ring.
The system operator may ban all sexually suggestive materials, for fear
that the extreme anti- obscenity laws of some user's home town might apply
to his system. The system operator may not permit transfer of program files
through his system, except for files he personally checks out, for fear
that he could be accused of assisting in distributing viruses, trojans or
pirated software; and so on.
In this way, the most restrictive criminal laws that might apply to a given
on-line service (which could emanate, for instance, from one very
conservative state within the system's service area) could end up
restricting the activities of system operators all over the nation, if they
happen to have a significant user base in that state. This results in less
freedom for everyone in the network environment.
2. Federal vs. State Rights of Privacy.
Few words have been spoken in the press about network privacy laws in each
of the fifty states (as opposed to federal laws). However, what the privacy
protection of the federal Electronic Communications Privacy Act ("ECPA")
does not give you, state laws may.
This was the theory of the recent Epson e-mail case. An ex- employee
claimed that Epson acted illegally in requiring her to monitor e-mail
conversations of other employees. She did not sue under the ECPA, but under
the California Penal Code section prohibiting employee surveillance of
employee conversations.
The trial judge denied her claim. In his view, the California law only
applied to interceptions of oral telephone discussions, and not to visual
communication on video display monitors. Essentially, he held that the
California law had not caught up to modern technology - making this law
apply to e-mail communications was a job for the state legislature, not
local judges.
Beyond acknowledging that the California law was archaic and not applicable
to e-mail, we should understand that the Epson case takes place in a
special legal context - the workplace. E- mail user rights against
workplace surveillance are undeniably important, but in our legal and
political system they always must be "balanced" (ie., weakened) against the
right of the employer to run his shop his own way. Employers' rights may
end up weighing more heavily against workers' rights for company e-mail
systems than for voice telephone conversations, at least for employers who
use intra-company e-mail systems as an essential backbone of their
business. Fortunately, this particular skewing factor does not apply to
*public* communications systems.
I believe that many more attempts to establish e-mail privacy under state
laws are possible, and will be made in the future. This is good news for
privacy advocates, a growing and increasingly vocal group these days.
It is mixed news, however, for operators of BBS's and other on-line
services. Most on-line service providers operate on an interstate basis -
all it takes to gain this status is a few calls from other states every now
and then. If state privacy laws apply to on-line systems, then every BBS
operator will be subject to the privacy laws of every state in which one or
more of his users are located! This can lead to confusion, and inability to
set reasonable or predictable system privacy standards.
It can also lead to the effect described above in the discussion of
criminal liability. On-line systems might be set up "defensively", to cope
with the most restrictive privacy laws that might apply to them. This could
result in declarations of *absolutely no privacy* on some systems, and
highly secure setups on others, depending on the individual system
operator's inclinations.
3. Pressure on Privacy Rights Created by Risks to Service Providers.
There are two main kinds of legal risks faced by a system operator. First,
the risk that the system operator himself will be found criminally guilty
or civilly liable for being involved in illegal activities on his system,
leading to fines, jail, money damages, confiscation of system, criminal
record, etc.
Second, the risk of having his system confiscated, not because he did
anything wrong, but because someone else did something suspicious on his
system. As discussed above, a lot of criminal activity can take place on a
system when the system operator isn't looking. In addition, certain
non-criminal activities on the system could lead to system confiscation,
such copyright or trade secret infringement.
This second kind of risk is very real. It is exactly what happened to Steve
Jackson Games last year. Law enforcement agents seized Steve's computer
(which ran a BBS), not because they thought he did anything wrong, but
because they were tracking an allegedly evil computer hacker group called
the "Legion of Doom". Apparently, they thought the group "met" and
conspired on his BBS. A year later, much of the dust has cleared, and the
Electronic Frontier Foundation is funding a lawsuit against the federal
agents who seized the system. Unfortunately, even if he wins the case Steve
can't get back the business he lost. To this day, he still has not regained
all of his possessions that were seized by the authorities.
For now, system operators do not have a great deal of control over
government or legal interference with their systems. You can be a solid
citizen and report every crime you suspect may be happening using your
system. Yet the chance remains that tonight, the feds will be knocking on
*your* door looking for an "evil hacker group" hiding in your BBS.
This Keystone Kops style of "law enforcement" can turn system operators
into surrogate law enforcement agents. System operators who fear random
system confiscation will be tempted to monitor private activities on their
systems, intruding on the privacy of their users. Such intrusion can take
different forms. Some system operators may declare that there will be no
private discussions, so they can review and inspect everything. More
hauntingly, system operators may indulge in surreptitious sampling of
private e-mail, just to make sure no one's doing anything that will make
the cops come in and haul away their BBS computer systems (By the way, I
personally don't advocate either of these things).
This situation can be viewed as a way for law enforcement agents to do an
end run around the ECPA's bar on government interception of electronic
messages. What the agents can't intercept directly, they might get through
fearful system operators. Even if you don't go for such conspiracy
theories, the random risk of system confiscation puts great pressure on the
privacy rights of on-line system users.
4. Contracts Versus Other Rights.
Most, perhaps all, of the rights between system operators and system users
can be modified by the basic service contract between them. For instance,
the federal ECPA gives on-line service users certain privacy rights. It
conspicuously falls short, however, by not protecting users from privacy
intrusions by the system operator himself.
Through contract, the system operator and the user can in effect override
the ECPA exception, and agree that the system operator will not read
private e-mail. Some system operators may go the opposite direction, and
impose a contractual rule that users should not expect any privacy in their
e-mail.
Another example of the power of contracts in the on-line environment
occurred recently on the Well, a national system based in San Francisco
(and highly recommended to all those interested in discussing on-line legal
issues). A Well user complained that a message he had posted in one Well
conference area had been cross-posted by other users to a different
conference area without his permission.
A lengthy, lively discussion among Well users followed, debating the
problem. One of the major benchmarks for this discussion was the basic
service agreement between the Well and its users. And a proposed resolution
of the issue was to clarify the wording of that fundamental agreement.
Although "copyrights" were discussed, the agreement between the Well and
its users was viewed as a more important source of the legitimate rights
and expectations of Well users.
Your state and federal "rights" against other on-line players may not be
worth fighting over if you can get a contract giving you the rights you
want. In the long run, the contractual solution may be the best way to set
up a decent networked on- line system environment, except for the old
bogeyman of government intrusion (against whom we will all still need our
"rights", Constitutional and otherwise).
CONCLUSION
There are many different laws that system operators must heed in running
their on-line services. This can lead to restricting system activities
under the most oppressive legal standards, and to unpredictable,
system-wide interactions between the effects of the different laws.
The "net" result of this problem can be undue restrictions on the
activities of system operators and users alike.
The answers to this problem are simple in concept, but not easy to execute.
First, enact (or re-enact) all laws regarding electronic services on a
national level only, overriding individual state control of system
operators activities in cyberspace. It's time to realize that provincial
state laws only hinder proper development of interstate electronic systems.
As yet, there is little movement in enacting nationally effective laws.
Isolated instances include the Electronic Communications Privacy Act and
the Computer Fraud and Abuse Act, which place federal "floors" beneath
privacy protection and certain types of computer crime, respectively. On
the commercial side, the new Article 4A of the Uniform Commercial Code,
which normalizes on-line commercial transactions, is ready for adoption by
the fifty states.
Second, all laws regulating on-line systems must be carefully designed to
interact well with other such laws. The goal is to create a well-defined,
reasonable legal environment for system operators and users.
The EFF is fighting hard on this front, especially in the areas of freedom
of the press, rights of privacy, and rights against search and seizure for
on-line systems. Reducing government intrusion in these areas will help
free up cyberspace for bigger and better things.
However, the fight is just beginning today.
_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _
Lance Rose is an attorney who works primarily in the fields of computer and
high technology law and intellectual property. His clients include on-line
publishers, electronic funds transfer networks, data transmission services,
individual system operators, and shareware authors and vendors. He is
currently revising SYSLAW, The Sysop's Legal Manual. Lance is a partner in
the New York City firm of Greenspoon, Srager, Gaynin, Daichman & Marino,
and can be reached by voice at (212)888-6880, on the Well as "elrose", and
on CompuServe at 72230,2044.
Copyright 1991 Lance Rose
From:
[email protected] (Dave Banisar)
Newsgroups: comp.org.eff.talk,alt.privacy,alt.2600,comp.org.cpsr.talk
Subject: DOJ Guidelines on Searching and Siezing Computers
Date: Fri, 20 Jan 1995 20:20:25 -0400
Organization: Electronic Privacy Information Center
EPIC Analysis of New Justice Department Draft Guidelines on Searching and
Seizing Computers
Dave Banisar
Electronic Privacy Information Center
The Electronic Privacy Information Center (EPIC) has obtained the
Department of Justice's recently issued draft "Federal Guidelines for
Searching and Seizing Computers." EPIC obtained the document under the
Freedom of Information Act. The guidelines provide an overview of the
law surrounding searches, seizures and uses of computer systems and
electronic information in criminal and civil cases. They discuss current
law and suggest how it may apply to situations involving computers. The
draft guidelines were developed by the Justice Department's Computer
Crime Division and an informal group of federal agencies known as the
Computer Search and Seizure Working Group.
Seizing Computers
A major portion of the document deals with the seizure of computers. The
draft recommends the use of the "independent component doctrine" to
determine if a reason can be articulated to seize each separate piece of
hardware. Prosecutors are urged to "seize only those pieces of equipment
necessary for basic input/output so that the government can successfully
execute the warrant." The guidelines reject the theory that because a
device is connected to a target computer, it should be seized, stating
that "[i]n an era of increased networking, this kind of approach can lead
to absurd results."
However, the guidelines also note that computers and accessories are
frequently incompatible or booby trapped, thus recommending that
equipment generally should be seized to ensure that it will work. They
recommend that irrelevant material should be returned quickly. "[O]nce
the analyst has examined the computer system and data and decided that
some items or information need not be kept, the government should return
this property as soon as possible." The guidelines suggest that it may
be possible to make exact copies of the information on the storage
devices and return the computers and data to the suspects if they sign
waivers stating that the copy is an exact replica of the original data.
On the issue of warrantless seizure and "no-knock warrants," the
guidelines note the ease of destroying data. If a suspect is observed
destroying data, a warrantless seizure may occur, provided that a warrant
is obtained before an actual search can proceed. For "no-knock"
warrants, the guidelines caution that more than the mere fact that the
evidence can be easily destroyed is required before such a warrant can be
issued. "These problems . . . are not, standing alone, sufficient to
justify dispensing with the knock-and-announce rule."
Searching Computers
Generally, warrants are required for searches of computers unless there
is a recognized exception to the warrant requirement. The guidelines
recommend that law enforcement agents use utility programs to conduct
limited searches for specific information, both because the law prefers
warrants that are narrowly tailored and for reasons of economy. "The
power of the computer allows analysts to design a limited search in other
ways as well . . . by specific name, words, places. . . ."
For computer systems used by more than one person, the guidelines state
that the consent of one user is enough to authorize a search of the
entire system, even if each user has a different directory. However, if
users have taken "special steps" to protect their privacy, such as using
passwords or encryption, a search warrant is necessary. The guidelines
suggest that users do not have an expectation of privacy on commercial
services and large mainframe systems because users should know that
system operators have the technical ability to read all files on such
systems. They recommend that the most prudent course is to obtain a
warrant, but suggest that in the absence of a warrant prosecutors should
argue that "reasonable users will also expect system administrators to be
able to access all data on the system." Employees may also have an
expectation of privacy in their computers that would prohibit employers
from consenting to police searches. Public employees are protected by
the Fourth Amendment and searches of their computers are prohibited
except for ""non-investigatory, work related intrusions" and
"investigatory searches for evidence of suspected work-related employee
misfeasance."
The guidelines discuss the Privacy Protection Act of 1980, which was
successfully used in the Steve Jackson Games case against federal agents.
They recommend that "before searching any BBS, agents must carefully
consider the restrictions of the PPA." Citing the Jackson case, they
leave open the question of whether BBS's by themselves are subject to the
PPA and state that "the scope of the PPA has been greatly expanded as a
practical consequence of the revolution in information technology -- a
result which was probably not envisioned by the Act's drafters." Under
several DOJ memos issued in 1993, all applications for warrants under the
Privacy Protection Act must be approved by a Deputy Assistant Attorney
General of the Criminal Division or the supervising DOJ attorney.
For computers that contain private electronic mail protected by the
Electronic Communications Privacy Act of 1986, prosecutors are advised to
inform the judge that private email may be present and avoid reading
communications not covered in the warrant. Under the ECPA, a warrant is
required for email on a public system that is stored for less than 180
days. If the mail is stored for more than 180 days, law enforcement
agents can obtain it either by using a subpoena (if they inform the
target beforehand) or by using a warrant without notice.
For computers that contain confidential information, the guidelines
recommend that forensic experts minimize their examination of irrelevant
files. It may also be possible to appoint a special master to search
systems containing privileged information.
One important section deals with issues relating to encryption and the
Fifth Amendment's protection against self-incrimination. The guidelines
caution that a grant of limited immunity may be necessary before
investigators can compel disclosure of an encryption key from a suspect.
This suggestion is significant given recent debates over the Clipper Chip
and the possibility of mandatory key escrow.
Computer Evidence
The draft guidelines also address issues relating to the use of
computerized information as evidence. The guidelines note that "this
area may become a new battleground for technical experts." They
recognize the unique problems of electronic evidence: "it can be created,
altered, stored, copied, and moved with unprecedented ease, which creates
both problems and opportunities for advocates." The guidelines discuss
scenarios where digital photographs can be easily altered without a trace
and the potential use of digital signatures to create electronic seals.
They also raise questions about the use of computer generated evidence,
such as the results of a search failing to locate an electronic tax
return in a computer system. An evaluation of the technical processes
used will be necessary: "proponents must be prepared to show that the
process is reliable."
Experts
The DOJ guidelines recommend that experts be used in all computer
seizures and searches -- "when in doubt, rely on experts." They provide
a list of experts from within government agencies, such as the Electronic
Crimes Special Agent program in the Secret Service (with 12 agents at the
time of the writing of the guidelines), the Computer Analysis and
Response Team of the FBI, and the seized recovery specialists (SERC) in
the IRS. The guidelines reveal that "[m]any companies such as IBM and
Data General employ some experts solely to assist various law enforcement
agencies on search warrants." Other potential experts include local
universities and the victims of crimes themselves, although the
guidelines caution that there may be potential problems of bias when
victims act as experts.
Obtaining a Copy of the Guidelines
EPIC, with the cooperation of the Bureau of National Affairs, is making
the guidelines available electronically. The document is available via
FTP/Gopher/WAIS/listserv from the EPIC online archive at cpsr.org
/cpsr/privacy/epic/fed_computer_siezure_guidelines.txt. A printed version
appears in the Bureau of National Affairs publication, Criminal Law
Reporter, Vol. 56, No. 12 (December 21 1994).
About EPIC
The Electronic Privacy Information Center is a public interest research
center in Washington, DC. It was established in 1994 to focus public
attention on emerging privacy issues relating to the National Information
Infrastructure, such as the Clipper Chip, the Digital Telephony proposal,
medical record privacy, and the sale of consumer data. EPIC is sponsored
by the Fund for Constitutional Government and Computer Professionals for
Social Responsibility. EPIC publishes the EPIC Alert and EPIC Reports,
pursues Freedom of Information Act litigation, and conducts policy
research on emerging privacy issues. For more information email
[email protected], or write EPIC, 666 Pennsylvania Ave., S.E., Suite 301,
Washington, DC 20003. +1 202 544 9240 (tel), +1 202 547 5482 (fax).
The Fund for Constitutional Government is a non-profit organization
established in 1974 to protect civil liberties and constitutional rights.
Computer Professionals for Social Responsibility is a national membership
organization of people concerned about the impact of technology on
society. For information contact:
[email protected].
Tax-deductible contributions to support the work of EPIC should be made
payable to the Fund for Constitutional Government.
Date: Thu, 28 Feb 91 09:53:50 EST
From: "Brian J. Peretti" <
[email protected]>
Subject: Computer Publication and the First Amendment
********************************************************************
*** CuD #3.09: File 2 of 2: Computers & First Amendment ***
********************************************************************
Computer Publication and The First Amendment
Copyright Brian J. Peretti
Computers and the Law
Since their introduction, personal computers have had a tremendous impact
on society. Computer, printers and their software have replaced
accountants, secretaries and even typewriters in many offices across the
United States. With the advent of this new way to gather, process and
distribute information, new problems, many that could never have been
perceived by the Framers of the Constitution, have developed. The
Constitution is the basis of law in the United States. Although created in
1787, it still governs the manner in which legal decisions are made with
very few changes. It, along with the Bill of Rights and other amendments,
has established what may or may not be done to a person, group,
organization or business without infringing on its rights. The broad
language was created so that the Constitution would be able to change and
expand with the times. Although the founding fathers did have an idea of
what the press was in their day, it has been expanded to cover television
and radio. This coverage should be expanded to encompass the new media of
computer publications. By deciding that computer publications will have
the same rights under the first amendment as newspapers, information will
be dispersed throughout the nation in a more efficient manner so that the
goal of the first amendment will become reality.
I. What is a computer publication
Computer publications can take many forms. It has been
argued that bulletin boards should be considered computer
publications. The reason is that since the people who are in
contact with the bulletin boards must communicate with the boards
through the written word, that these communications should thus
be considered publications.
This paper is concerned with publications that are created
exclusively on a computer or computer system. There have been
only a few such computer publications.1
There has not been a definition defining what is a computer
publication. However, there are many similarities between the
various newsletters that will give us a definition of what one
is. First, all of the material which makes up the publication
must have been created on a computer. This is to say, that
although the information may have been written on paper as rough
drafts or may have been gleaned from printed books or newspaper,
the articles that compose the publication must have been written
IN FINAL FORM ON THE COMPUTER.
The production of the newsletter must also occur exclusively
on the computer. This includes the editing, the check for
spelling and formatting errors and the actual production of what
the newsletter will look like, including the letterhead of the
publication, if there is to be one.
The transportation of the material that is to be contained
in the newsletter must occur via a computer network2 or by an
exchange of magnetic disk3, magnetic tape4, electrical impulses
or other non-print media. This includes not only the gathering
of the stories, but also the distribution of the newsletter to
its subscribers.
The computer magazines or newsletters that have existed in
the past also had a common denominator in that they almost
exclusively were published by computer users, for computer users
and concerned computer topics. Although this could be a
criteria, it would be to restrictive. It is very likely, with
the continued proliferation of computers in our society, that
publications with a much different orientations will emerge. If
computer publications are to be protected, the topic of their
publication should not be determinative of whether they fall
under the definition of a computer publication.
There are other publications that address the same issues
that have been published in "Phrack". An example is 2600 on Long
Island, New York which publishes material in printed form
concerning generally the same information.5 However, it is the
form in which "Phrack" was published and not the content of the
magazine that is the issue of this paper.
II. Phrack6
Craig Neidorf is a student at the University of Missouri.
At sixteen, he and a friend started to publish Phrack7. The
way in which he went about creating his newsletter was to accept
articles written by persons throughout the country. These
articles would be left in his mailbox at the university or to
retrieve articles written on computer bulletin boards. After he
logged on to the system, he would then mail the articles from the
mainframe computer to his person computer at his residence. If
these articles would need to be edited, he would then do any
necessary editing. Once he complied a large enough group of
articles, he would then send the articles to the mainframe
computer along with a heading and send it to his 250 subscribers.
There was no charge for the newsletter.8
III. The Historic Rights of the Press
In order to discover whether or not the protections afforded
to the press in the first amendment should be extended to this
new form of information distribution, a look to the past is
essential. Originally, control of the press by government was
total. However, as time passed, both the monarch of Great
Britain and their rulers in the American Colonies allowed greater
freedom to publish.
A. The English Experience.
At first, England was an absolute monarchy, in which the
king could do as he pleased. In 1215, the Magna Carta was
signed, whereby the lords of England put restrictions on the
King, which he pledged not to violate.9 The document, although
not seen as an admission of the King that there were civil right,
he did acknowledge that there were some basic human rights.10
In 1275, the De Scandalis Magnatum was enacted which
punished anyone who disseminated untrue information or "tales"
that could disrupt the atmosphere between the king and his
people.11 Over time this statute was gradually expanded. In
1378, it was broadened to cover "peers, prelates, justices and
various other officials and in the 1388 reenactment, offenders
could be punished "by the advice of said council."12
The first printing presses were established in Great Britain
toward the end of the 15th century. When the De Scandalis
Magnatum was reenacted in 1554 and 1559, "seditious words" were
included as words that could bring punishment.13 This law,
enforced by the Court of the Star Chamber, was a criminal statute
to punish political scandal.14
Regulations placed upon printers soon followed. In 1585,
the Star Chamber required that in order to print a book, the
publisher would have to get a license.15 A monopoly was created
in the Stationers' Company, which had 97 London stationers, that
could seize the publications of all outsiders.16 A 1637 ordnance
limited the number of printers, presses and apprentices.17
Punishment, at the time, was not limited to just printing, but
also to "epigram[s] or rhyme[s] in writing sung and repeated in
the presence of others . . . [or] an ignominious or shameful
painting or sign."18
Although the Star Chamber had been abolished in 1641, the
licensing system remained through the orders of 1642 and 1643.19
The Licensing Act of 1662 was a temporary statute which kept the
licensing provisions until 1679, when it expired.20 During the
reign of James II, licensing was renewed only to expire and not
be reenacted in 1695.21
Having realized that licensing was not the answer, Queen
Anne in 1711 enacted a Stamp Act, by which a duty was imposed on
all newspapers and advertisements.22 The purpose was to both
restrain the press and destroy all but the larger newspapers.23
Blackstone summed up the state of the law Great Britain
concerning the press in his Commentaries by writing:
The liberty of the press is indeed essential to the
nature of a free state; but this consists in laying no
previous restraints upon publications, and not in freedom
from censure for criminal matter when published. Every
freeman has an undoubted right to lay what sentiments he
pleases before the public; to forbid this, is to destroy
the freedom of the press; but if he publishes what is
improper, mischievous, or illegal, he must take the
consequences of his own temerity.24
B. The Colonial Experience
The first presses arrived at Harvard University in 1638 and
were used to disseminate church information.25 Aside from this
purpose the colonial governments, when still under the power of
Great Britain did not look favorably upon the press. However,
with power in the colony moving toward the people, the press
gained more freedom from the strict control imposed by the
government.
Each colony treated the press differently, although each did
restrict the press. In 1671, Governor Berkeley of Virginia wrote
"But I thank God, there are no free schools nor printing, and I
hope we shall not have these hundred years; for learning has
brought disobedience, and heresy, and sects into the world, and
printing has divulged them, and libels against the best
government. God keep us from both!"26 In New York, until 1719,
all governors "had been instructed to permit no press, book,
pamphlets or other printed matter `without your especial leave &
license first obtained.'"27
Gradually, state controls of the press gradually
diminished.28 The Trial of John Peter Zenger, 17 Howell's St. Tr.
675 (1735) illustrates how much the colonists were opposed to
restrictions on the press. Zenger had printed material in his
New York Weekly Journal a satiric article critical of New York
Governor William Cosby. The governor had Zenger charged with
seditious liable by the Attorney General after neither a Grand
Jury would indict nor the General Assembly take action.29
Although all the jury had to do was find him guilty was to
declare that he published the paper, Zenger's attorney, Andrew
Hamilton of Philadelphia argued a much larger issue. He put
before the jury the argument that truth is a defense to liable,
although the court rejected it.30 He was able to win an
acquittal of Zenger by requesting that the jury give a general
verdict of not guilty instead of a special verdict, which the
court requested, and which the jury did.31
C. The Adoption of the First Amendment
"The struggle for the freedom of the press was primarily
directed against the power of the licensor. . . . And the liberty
of the press became initially a right to publish `without a
license what formerly could be published only with one.' While
this freedom from previous restraint upon publication cannot be
regarded as exhausting the guaranty of liberty, the prevention of
that restraint was a leading purpose in the adoption of the
constitutional provision."32 The purpose of the first amendment
is "to prevent all such previous restraints upon publication as
had been practiced by other government."33
The first amendment states "Congress shall make no law
respecting an establishment of religion, or prohibiting the free
exercise thereof; or abridging the freedom of speech, or of the
press; or the right of the people peaceably to assemble, and to
petition the Government for a redress of grievances."34 It was
originally proposed as part of twelve amendments to the United
States Constitution during the first session of Congress in 1789.
On December 15, 1791, the Bill of Rights, minus the first two
amendments, became part of the Constitution.
What the first amendment means as applied to the press has
never been completely set forth. The only statement in Congress
as to what the press and speech clause was to stand for was
express by James Madison: "The right of freedom of speech is
secured; the liberty of the press is expressly declared to be
beyond the reach of this government."35 This, however, will be
of little help for us when considering whether computer
publications should receive first amendment protections.
IV. Does Computer Publications fall within the meaning of
Press as stated in the first Amendment.
Since the legislative history of the First Amendment will
not lead to a discovery concerning what is covered under it, we
must look to how it has been interpreted by the courts. An
examination must be undertook to determine what the courts have
decided concerning both the purpose of the amendment and whether
any physical manifestation guidelines on what fall within the
definition of the "press".
By examining what the drafters of the first amendment
thought that press was during their time, the only media which
would receive first amendment protections the printed press,
which would include newspapers, handbills and leaflets.
However, the court has not held the clause so narrowly.
The United States Supreme Court has taken a broad view in
considering what is the "press".36 "The liberty of the press is
not confined to newspapers and periodicals. It necessarily
embraces pamphlets and leaflets. . . . The press in its
historical connotation comprehends every sort of publication
which affords a vehicle of information and opinion."37 Thus, the
Court has ruled that motion pictures38 also deserve such
protection. Lower courts have held that the protection applies
to doctor directories,39 college newspapers40 and computer
bulletin boards.41
Computer publications satisfy the definition that the Court
has given to what is to be covered by the first amendment. By
their very nature, computer publications are a vehicle by which
information can be disseminated. In Phrack's first issue, the
purpose was to gather "philes [which] may include articles on
telcom (phreaking/hacking), anarchy (guns and death &
destruction) or kracking. Other (sic) topics will be allowed
also to a certain extent."42 These articles were to be
distributed to members of the community who wished to obtain
information on the topics in the "newsletter-type project".43
Since this publication passes the Lovell test,44 because of it
allows information to be distributed, these publication deserve
the protection given to the media by the first amendment.45
VI. Freedom of Newspapers and Broadcasting Media46
Currently there can be called two separate first amendment
doctrines. The first applies to newspapers. Newspapers can have
only a few restrictions placed on them. The second applies to
radio and television, which can have many types of controls
placed upon them. Computer publications, because of their
similarity to the former, should have the least amount of
restriction necessary placed upon them.
As stated, supra, the first amendment had no legislative
history that came along with it. Courts have had to interpret
how it should be applied to the "press" since they had no
guidance from the Congress. Although not to be applied in an
absolute sense, Breard v. City of Alexandria, La.,47 the Supreme
Court has only set forth three exceptions where prior restraint
of the newspapers are allowed. These restrictions, as stated in
dictum in Near v. Minnesota48 are 1) when it is necessary in
order that "a government might prevent actual obstruction to its
recruiting service or the publication of the sailing dates of
transports or the number and location of troops", 2) the
requirements of decency to prevent publication of obscene
materials, and 3) "[t]he security of the community life may be
protected against incitement to acts of violence and the
overthrow of force of orderly government." These exceptions,
although not having the force of law when stated, have been the
only exceptions allowed.
In the electronic realm, the Supreme Court has allowed
greater restraints to be placed on radio and television.
Licenses, although never allowed on newspapers,49 possibly as a
result of the English experience,50 have been allowed on
broadcast communication.51 Broadcaster must be fair to all sides
of an issue,52 whereas newspapers may be bias.53 Broadcaster are
required to meet the need of their community.54 However no court
has held that this may be applied to a newspaper.55
The main difference between these two groups is that
"[u]nlike other modes of expression, radio inherently is not
available to all. That is its unique characteristic, and that is
why, unlike other modes of expression, it is subject to
government regulation."56 This reasoning has been followed by
the court on many occasions.57
In the case concerning computer publishers, the less
restrictive newspaper limitations should be used. A computer
publisher does not send his information over a limited band or
airwaves. Any individual or group can become a computer publish
by obtaining a computer or access to a computer and a modem an
information to publish. The amount of these newsletters are not
limited by technology.
Because of the large number of publications that can appear,
there is no need to require that these publications be responsive
to the public. The dissemination of the information can be
terminated if the reader wants to by asking for his name to be
removed from the subscription list, similar to that of a magazine
or newspaper.58
V. Conclusion
Computer based publications are a new development in the
traditional way in which information is disseminated. The
history of the United States and the first amendment has been
against placing restrictions on the press. These new types of
publications, because of their similarity to other types of
media, should be granted first amendment protection.
The rational for placing restrictions on radio and
television should not apply to computer publications. Anyone who
has access to this technology, which is becoming more prevalent
in society, can publish in this manner. The least amount of
restrictions on their publication, similar to those placed on
newspapers, should be applied to this new media.
BIBLIOGRAPHY
Freedom of Speech and Press in America, Edward G. Hudon (Public
Affairs Press, Washington, D.C. 1963)
MacMillan Dictionary of Personal Computing & Communications
Dennis Longley and Michael Shain, eds. (MacMillan Press Ltd,
London 1986)
Shaping the First Amendment: The Development of Free Expression,
John D. Stevens (Sage Publications, Beverly Hills, 1982)
Freedom of Speech and Press in Early American History: Legacy of
Suppression, Leonard W. Levy (Harvard Press, Cambridge 1960)
American Broadcasting and the First Amendment, Lucas A. Powe, Jr.
(University of California Press, Berkeley 1987)
Printers and Press Freedom: The Ideology of Early American
Journalism, Jeffery A. Smith (Oxford University Press, New York
1988).
Seven Dirty Words and Six Other Stories: Controlling the Content
of Print and Broadcast, Matthew L. Spitzer (Yale University
Press, New Haven 1986).
Emergence of a Free Press, Leonard W. Levy (Oxford University
Press, New York 1985).
Computer Underground Digest, volume 2, Issue #2.12, file 1
(November 17, 1990).
Endnotes
1. Phrack, see infra, CCCAN, a Canadian publication, The
LEGION OF DOOM TECHNICAL JOURNAL, COMPUTER UNDERGROUND DIGEST AND VIRUS-L
DIGEST ARE A FEW OF THE MANY PUBLICATIONS.
2. MacMillan Dictionary of Personal Computing &
Communication (1986 ed) defines it as: "A network of computer
systems that allow the fast and easy flow of data between the
systems and users of the system." Id. at 68.
3. "[A] flat disk with a magnetizable surface layer on
which data can be stored by magnetic recording." Id. at 215
4. "A plastic tape having a magnetic surface for storing
data in a code of magnetized spots." Webster's NewWorld
Dictionary of Computer Terms (1988 3 ed.) at 223.
5. Frenzy over Phrack; First Amendment concerns raised in
computer hacker case, Communications Daily, June 29, 1990, at 6.
6. Information from this section was gathered in part from
Dorothy Denning's paper The United States vs. Craig Neidorf: A
Viewpoint on Electronic Publishing, Constitutional Rights, and
Hacking." [hereinafter Denning] and Interview with Craig Neidorf,
editor of Phrack (Oct. 16, 1990).
7. The name of the publication was derived from two words,
phrack (telecommunication systems) and hack (from computer
hacking). Denning. Hacking has been defined as "one who gains
unauthorized, use non-fraudulent access to another's computer
system." Webster's II New Riverside University Dictionary (1984)
at 557. For other definitions, see United States v. Riggs, 739
F. Supp. 414, 423-24 (N.D. Ill. 1990).
8. Mr. Neidorf was indicted after he published a Bell South
E911 document which was downloaded from the Bell South computer
system in Atlanta, Georgia. Determining if Mr. Neidorf should be
punished for publishing such information is beyond the scope of
this paper.
9. John Stevens, Shaping the First Amendment: The
Development of Free Expression at 27 (1982). [hereinafter
Stevens]
10. Id.
11. Edward Hudon, Freedom of Speech and Press in America,
8-9 (1963).
12. Id. at 9.
13. Id.
14. Id.
15. Id. at 10.
16. Id.
17. Id.
18. Id.
19. Id. at 11.
20. Id.
21. Id.
22. Id.
23. Id.
24. Leonard Levy, Freedom of Speech and Press in Early
American History: Legacy of Suppression, 14 (1963) [hereinafter
Levy] citing Sir William Blackstone, Commentaries on the Laws of
England 2:112-113 (1936).
25. Stevens, at 29.
26. Levy, at 21-22, quoting William Waller Hening, The
Statutes at Large Being a Collection of All the Laws of Virginia
(1619-1792) (Richmond, 1809-1823), 2:517. [emphasis in original]
27. Levy, at 24, quoting "Instructions to Governor Dongan,"
1686, in E.B. O'Callaghan and B. Fernow, eds., Documents Relative
to the Colonial History of the State of New York 3:375 (Albany,
1856-1887).
28. By 1721, Massachusetts effectively ended censorship by
licensing. Levy, at 36.
29. Edward Hudson, Freedom of Speech and Press in America
(1963) 19.
30. John D. Stevens, Shaping the First Amendment: The
Development of Free Expression (1982), 31.
31. Hudson, at 19.
32. Lovell v. City of Griffen, Ga., 303 U.S. 444, 451-52
(1938) [footnotes omitted].
33. Patterson v. Colorado, 205 U.S. 454, 462 (1907),
quoting Commonwealth v. Blanding, 3 Pick. [Mass.] 304, 313-14.
[emphasis in original]
34. U.S. Const. amend. I.
35. Leonard W. Levy, Freedom of Speech and Press in Early
American History: Legacy of Suppression (1960), quoting The
Debates and Proceedings in the Congress of the United States
(Washington, 1834 ff.) I:766, 1st Cong., 1st Sess.
36. "The Protection of the First Amendment, mirrored in the
Fourteenth, is not limited to the Blackstonian idea that freedom
of the press means only freedom from restraint prior to
publication." Chaplinsky v. New Hampshire, 315 U.S. 572, n.3,
(1941) citing Near v. Minnesota, 283 U.S. 697 (1931).
37. Lovell v. City of Griffin, Ga. 303 U.S. 444, 452
(1938).
38. "We have no doubt that moving pictures, like newspapers
and radio, are included in the press whose freedom is guaranteed
by the First Amendment." 334 U.S. 131, 166 (1948). "Expression
by means of motion pictures in included within the free speech
and speech and free press guaranty of the First and Fourteenth
Amendments." Joseph Burstyn, Inc. v. Wilson, 343 U.S. 495, 502
(1952).
39. "The propose directory [of physicians] contains
information of interest to people who need physicians. The
directory, therefore, is embraced by the term "press" as used in
the first amendment." Health Systems Agency of Northern Virginia
v. Virginia State Board of Medicine, 424 F. Supp. 267, 272 (E.D.
Va. 1976).
40. "A campus newspaper is part of the "press" for the
purpose of the First Amendment to the Constitution of the United
States." Arrington v. Taylor, 380 F.Supp. 1348, 1365 (M.D.N.C.
1974).
41. Legi-Tech v. Keiper, 766 F.2d 728, 734-35 (2d Cir.
1985).
42. Phrack, volume 1, issue 1, phile 1, reprinted in
Computer Underground Digest, volume 2, Issue #2.12, file 1
(November 17, 1990).
43. Id.
44. See, infra, note 35 and text.
45. This is not to say that publication of information in
furtherance of a crime or criminal activity should receive the
protection of the first amendment.
46. This section has been completed with the help of
Spitzer, Seven Dirty Words and Six Other Stories (1986).
47. 341 U.S. 622, 642 (1951), "The First and Fourteenth
Amendments have never been treated as absolutes."
48. 283 U.S. 697, 716.
49. Near v. Minnesota, 283 U.S. 697 (1931), New York Times
Co. v. Sullivan, 403 U.S. 713 (1971), Minneapolis Star and
Tribune Co. v. Minnesota Comm'r of Revenue, 460 U.S. 575 (1983).
50. See, supra, notes 9 through 24 and text.
51. Communications Act of 1934. 47 U.S.C. 301 et. seq.
(1988) (Requiring that radio stations and television stations
obtain licenses).
52. Red Lion Broadcasting Co. v. F.C.C., 395 U.S. 367
(1969).
53. See, e.g., Evans v. American Federation of Television
and Radio Artists, 354 F.Supp 823, 838 (S.D.N.Y. 1973), rev'd on
other grounds, 496 F.2d 305 (2nd Cir. 1974), cert. denied, 419
U.S. 1093. ("In editorial comment, the New York Times and the
Washington Post may be unreservedly liberal, while the
Indianapolis News or the Manchester Union Leader may be
unremittingly conservative.")
54. 47 U.S.C. 309(a). Trinity Methodist Church v. Federal
Radio Commission, 62 F.2d 850, (D.C. Cir. 1932), cert. denied,
288 U.S. 599 (1933). (holding that if radio broadcasts were not
in the public interest, a license could be revoked and not
violate the first amendment.)
55. Of course, if a newspaper is not responsive to its
readers, it may lose subscribers and either be forced to change
or go out of business. However, since in that hypothetical there
would be no state action, there would be no first amendment
issue.
56. National Broadcasting Co. v. United States, 319 U.S.
190, 226 (1943). The dissenting opinion also followed similar
reasoning. "Owing to its physical characteristics radio, unlike
the other methods of conveying information, must be regulated and
rationed by the government." Id. at 319.
57. Red Lion Broadcasting v. Federal Communication
Commission, 395 U.S. 367 (1969), and Federal Communication
Commission v. League of Women Voters, 468 U.S. 364 (1984).
58. For the same reason, the fairness doctrine should not
be applied to these types of publications.
********************************************************************
------------------------------
**END OF CuD #3.09**
********************************************************************
[Electronic Communications Privacy Act, full text. Revised 02/21/94]
In response to a number of requests from different sources, Shari Steele
has compiled and I've edited and formatted an ASCII version of the Electronic
Communications Privacy Act, including all amendments to the original Wiretap
Act (18 USC 2510 et seq.), the complete chapter on stored communications
(18 USC 2701 et seq.), and the amendments to pen-register and trap-and-trace
procedures (18 USC 3121 et seq.)
Please let me know if you catch any errors or typos.
--Mike Godwin
Online Counsel
Electronic Frontier Foundation
[email protected]
-----------
TITLE 18. CRIMES AND CRIMINAL PROCEDURE
PART I. CRIMES
CHAPTER 119. WIRE AND ELECTRONIC COMMUNICATIONS INTERCEPTION AND
INTERCEPTION OF ORAL COMMUNICATIONS
Sec. 2510. Definitions
As used in this chapter --
(1) "wire communication" means any aural transfer made in whole or in
part through the use of facilities for the transmission of communications
by the aid of wire, cable, or other like connection between the point of
origin and the point of reception (including the use of such connection in
a switching station) furnished or operated by any person engaged in
providing or operating such facilities for the transmission of interstate
or foreign communications or communications affecting interstate or
foreign commerce and such term includes any electronic storage of such
communication, but such term does not include the radio portion of a
cordless telephone communication that is transmitted between the cordless
telephone handset and the base unit;
(2) "oral communication" means any oral communication uttered by a
person exhibiting an expectation that such communication is not subject to
interception under circumstances justifying such expectation, but such
term does not include any electronic communication;
(3) "State" means any State of the United States, the District of
Columbia, the Commonwealth of Puerto Rico, and any territory or possession
of the United States;
(4) "intercept" means the aural or other acquisition of the contents of
any wire, electronic, or oral communication through the use of any
electronic, mechanical, or other device.
(5) "electronic, mechanical, or other device" means any device or
apparatus which can be used to intercept a wire, oral, or electronic
communication other than--
(a) any telephone or telegraph instrument, equipment or facility, or
any component thereof, (i) furnished to the subscriber or user by a
provider of wire or electronic communication service in the ordinary
course of its business and being used by the subscriber or user in the
ordinary course of its business or furnished by such subscriber or user
for connection to the facilities of such service and used in the ordinary
course of its business; or (ii) being used by a provider of wire or
electronic communication service in the ordinary course of its business,
or by an investigative or law enforcement officer in the ordinary course
of his duties;
(b) a hearing aid or similar device being used to correct subnormal
hearing to not better than normal;
(6) "person" means any employee, or agent of the United States or any
State or political subdivision thereof, and any individual, partnership,
association, joint stock company, trust, or corporation;
(7) "Investigative or law enforcement officer" means any officer of the
United States or of a State or political subdivision thereof, who is
empowered by law to conduct investigations of or to make arrests for
offenses enumerated in this chapter, and any attorney authorized by law to
prosecute or participate in the prosecution of such offenses;
(8) "contents," when used with respect to any wire, oral, or electronic
communication, includes any information concerning the substance, purport,
or meaning of that communication;
(9) "Judge of competent jurisdiction" means--
(a) a judge of a United States district court or a United States court
of appeals; and
(b) a judge of any court of general criminal jurisdiction of a State
who is authorized by a statute of that State to enter orders authorizing
interceptions of wire, oral, or electronic communications;
(10) "communication common carrier" shall have the same meaning which
is given the term "common carrier" by section 153(h) of title 47 of the
United States Code;
(11) "aggrieved person" means a person who was a party to any
intercepted wire, oral, or electronic communication or a person against
whom the interception was directed;
(12) "electronic communication" means any transfer of signs, signals,
writing, images, sounds, data, or intelligence of any nature transmitted
in whole or in part by a wire, radio, electromagnetic, photoelectronic or
photooptical system that affects interstate or foreign commerce, but does
not include--
(A) the radio portion of a cordless telephone communication that is
transmitted between the cordless telephone handset and the base unit;
(B) any wire or oral communication;
(C) any communication made through a tone-only paging device; or
(D) any communication from a tracking device (as defined in section
3117 of this title);
(13) "user" means any person or entity who--
(A) uses an electronic communication service; and
(B) is duly authorized by the provider of such service to engage in
such use;
(14) "electronic communications system" means any wire, radio,
electromagnetic, photooptical or photoelectronic facilities for the
transmission of electronic communications, and any computer facilities or
related electronic equipment for the electronic storage of such
communications;
(15) "electronic communication service" means any service which
provides to users thereof the ability to send or receive wire or
electronic communications;
(16) "readily accessible to the general public" means, with respect to
a radio communication, that such communication is not--
(A) scrambled or encrypted;
(B) transmitted using modulation techniques whose essential parameters
have been withheld from the public with the intention of preserving the
privacy of such communication;
(C) carried on a subcarrier or other signal subsidiary to a radio
transmission;
(D) transmitted over a communication system provided by a common
carrier, unless the communication is a tone only paging system
communication; or
(E) transmitted on frequencies allocated under part 25, subpart D, E,
or F of part 74, or part 94 of the Rules of the Federal Communications
Commission, unless, in the case of a communication transmitted on a
frequency allocated under part 74 that is not exclusively allocated to
broadcast auxiliary services, the communication is a two-way voice
communication by radio;
(17) "electronic storage" means--
(A) any temporary, intermediate storage of a wire or electronic
communication incidental to the electronic transmission thereof; and
(B) any storage of such communication by an electronic communication
service for purposes of backup protection of such communication; and
(18) "aural transfer" means a transfer containing the human voice at
any point between and including the point of origin and the point of
reception.
Sec. 2511. Interception and disclosure of wire, oral, or electronic
communications prohibited
(1) Except as otherwise specifically provided in this chapter any
person who--
(a) intentionally intercepts, endeavors to intercept, or procures any
other person to intercept or endeavor to intercept, any wire, oral, or
electronic communication;
(b) intentionally uses, endeavors to use, or procures any other person
to use or endeavor to use any electronic, mechanical, or other device to
intercept any oral communication when--
(i) such device is affixed to, or otherwise transmits a signal through,
a wire, cable, or other like connection used in wire communication; or
(ii) such device transmits communications by radio, or interferes with
the transmission of such communication; or
(iii) such person knows, or has reason to know, that such device or any
component thereof has been sent through the mail or transported in
interstate or foreign commerce; or
(iv) such use or endeavor to use (A) takes place on the premises of any
business or other commercial establishment the operations of which affect
interstate or foreign commerce; or (B) obtains or is for the purpose of
obtaining information relating to the operations of any business or other
commercial establishment the operations of which affect interstate or
foreign commerce; or
(v) such person acts in the District of Columbia, the Commonwealth of
Puerto Rico, or any territory or possession of the United States;
(c) intentionally discloses, or endeavors to disclose, to any other
person the contents of any wire, oral, or electronic communication,
knowing or having reason to know that the information was obtained through
the interception of a wire, oral, or electronic communication in violation
of this subsection; or
(d) intentionally uses, or endeavors to use, the contents of any wire,
oral, or electronic communication, knowing or having reason to know that
the information was obtained through the interception of a wire, oral, or
electronic communication in violation of this subsection;
shall be punished as provided in subsection (4) or shall be subject to
suit as provided in subsection (5).
(2)(a)(i) It shall not be unlawful under this chapter for an operator
of a switchboard, or an officer, employee, or agent of a provider of wire
or electronic communication service, whose facilities are used in the
transmission of a wire communication, to intercept, disclose, or use that
communication in the normal course of his employment while engaged in any
activity which is a necessary incident to the rendition of his service or
to the protection of the rights or property of the provider of that
service, except that a provider of wire communication service to the
public shall not utilize service observing or random monitoring except for
mechanical or service quality control checks.
(ii) Notwithstanding any other law, providers of wire or electronic
communication service, their officers, employees, and agents, landlords,
custodians, or other persons, are authorized to provide information,
facilities, or technical assistance to persons authorized by law to
intercept wire, oral, or electronic communications or to conduct
electronic surveillance, as defined in section 101 of the Foreign
Intelligence Surveillance Act of 1978 if such provider, its officers,
employees, or agents, landlord, custodian, or other specified person, has
been provided with--
(A) a court order directing such assistance signed by the authorizing
judge, or
(B) a certification in writing by a person specified in section 2518(7)
of this title or the Attorney General of the United States that no warrant
or court order is required by law, that all statutory requirements have
been met, and that the specified assistance is required, setting forth the
period of time during which the provision of the information, facilities,
or technical assistance is authorized and specifying the information,
facilities, or technical assistance required. No provider of wire or
electronic communication service, officer, employee, or agent thereof, or
landlord, custodian, or other specified person shall disclose the
existence of any interception or surveillance or the device used to
accomplish the interception or surveillance with respect to which the
person has been furnished an order or certification under this
subparagraph, except as may otherwise be required by legal process and
then only after prior notification to the Attorney General or to the
principal prosecuting attorney of a State or any political subdivision of
a State, as may be appropriate. Any such disclosure, shall render such
person liable for the civil damages provided for in section 2520. No cause
of action shall lie in any court against any provider of wire or
electronic communication service, its officers, employees, or agents,
landlord, custodian, or other specified person for providing information,
facilities, or assistance in accordance with the terms of a court order or
certification under this chapter.
(b) It shall not be unlawful under this chapter for an officer,
employee, or agent of the Federal Communications Commission, in the normal
course of his employment and in discharge of the monitoring
responsibilities exercised by the Commission in the enforcement of chapter
5 of title 47 of the United States Code, to intercept a wire or electronic
communication, or oral communication transmitted by radio, or to disclose
or use the information thereby obtained.
(c) It shall not be unlawful under this chapter for a person acting
under color of law to intercept a wire, oral, or electronic communication,
where such person is a party to the communication or one of the parties to
the communication has given prior consent to such interception.
(d) It shall not be unlawful under this chapter for a person not acting
under color of law to intercept a wire or oral communication where such
person is a party to the communication or where one of the parties to the
communication has given prior consent to such interception unless such
communication is intercepted for the purpose of committing any criminal or
tortious act in violation of the Constitution or laws of the United States
or of any State.
(e) Notwithstanding any other provision of this title or section 705 or
706 of the Communications Act of 1934 , it shall not be unlawful for an
officer, employee, or agent of the United States in the normal course of
his official duty to conduct electronic surveillance, as defined in
section 101 of the Foreign Intelligence Surveillance Act of 1978, as
authorized by that Act.
(f) Nothing contained in this chapter or chapter 121, or section 705 of
the Communications Act of 1934, shall be deemed to affect the acquisition
by the United States Government of foreign intelligence information from
international or foreign communications, or foreign intelligence
activities conducted in accordance with otherwise applicable Federal law
involving a foreign electronic communications system, utilizing a means
other than electronic surveillance as defined in section 101 of the
Foreign Intelligence Surveillance Act of 1978, and procedures in this
chapter and the Foreign Intelligence Surveillance Act of 1978 shall be the
exclusive means by which electronic surveillance, as defined in section
101 of such Act, and the interception of domestic wire, oral, or
electronic communications may be conducted.
(g) It shall not be unlawful under this chapter or chapter 121 of this
title for any person--
(i) to intercept or access an electronic communication made through an
electronic communication system that is configured so that such electronic
communication is readily accessible to the general public;
(ii) to intercept any radio communication which is transmitted--
(I) by any station for the use of the general public, or that relates
to ships, aircraft, vehicles, or persons in distress;
(II) by any governmental, law enforcement, civil defense, private land
mobile, or public safety communications system, including police and fire,
readily accessible to the general public;
(III) by a station operating on an authorized frequency within the
bands allocated to the amateur, citizens band, or general mobile radio
services; or
(IV) by any marine or aeronautical communications system;
(iii) to engage in any conduct which--
(I) is prohibited by section 633 of the Communications Act of 1934; or
(II) is excepted from the application of section 705(a) of the
Communications Act of 1934 by section 705(b) of that Act;
(iv) to intercept any wire or electronic communication the transmission
of which is causing harmful interference to any lawfully operating station
or consumer electronic equipment, to the extent necessary to identify the
source of such interference; or
(v) for other users of the same frequency to intercept any radio
communication made through a system that utilizes frequencies monitored by
individuals engaged in the provision or the use of such system, if such
communication is not scrambled or encrypted.
(h) It shall not be unlawful under this chapter--
(i) to use a pen register or a trap and trace device (as those terms
are defined for the purposes of chapter 206 (relating to pen registers and
trap and trace devices) of this title); or
(ii) for a provider of electronic communication service to record the
fact that a wire or electronic communication was initiated or completed in
order to protect such provider, another provider furnishing service toward
the completion of the wire or electronic communication, or a user of that
service, from fraudulent, unlawful or abusive use of such service.
(3)(a) Except as provided in paragraph (b) of this subsection, a person
or entity providing an electronic communication service to the public
shall not intentionally divulge the contents of any communication (other
than one to such person or entity, or an agent thereof) while in
transmission on that service to any person or entity other than an
addressee or intended recipient of such communication or an agent of such
addressee or intended recipient.
(b) A person or entity providing electronic communication service to
the public may divulge the contents of any such communication--
(i) as otherwise authorized in section 2511(2)(a) or 2517 of this
title;
(ii) with the lawful consent of the originator or any addressee or
intended recipient of such communication;
(iii) to a person employed or authorized, or whose facilities are used,
to forward such communication to its destination; or
(iv) which were inadvertently obtained by the service provider and
which appear to pertain to the commission of a crime, if such divulgence
is made to a law enforcement agency.
(4)(a) Except as provided in paragraph (b) of this subsection or in
subsection (5), whoever violates subsection (1) of this section shall be
fined under this title or imprisoned not more than five years, or both.
(b) If the offense is a first offense under paragraph (a) of this
subsection and is not for a tortious or illegal purpose or for purposes of
direct or indirect commercial advantage or private commercial gain, and
the wire or electronic communication with respect to which the offense
under paragraph (a) is a radio communication that is not scrambled or
encrypted, then--
(i) if the communication is not the radio portion of a cellular
telephone communication, a public land mobile radio service communication
or a paging service communication, and the conduct is not that described
in subsection (5), the offender shall be fined under this title or
imprisoned not more than one year, or both; and
(ii) if the communication is the radio portion of a cellular telephone
communication, a public land mobile radio service communication or a
paging service communication, the offender shall be fined not more than $
500.
(c) Conduct otherwise an offense under this subsection that consists of
or relates to the interception of a satellite transmission that is not
encrypted or scrambled and that is transmitted--
(i) to a broadcasting station for purposes of retransmission to the
general public; or
(ii) as an audio subcarrier intended for redistribution to facilities
open to the public, but not including data transmissions or telephone
calls,
is not an offense under this subsection unless the conduct is for the
purposes of direct or indirect commercial advantage or private financial
gain.
(5)(a)(i) If the communication is--
(A) a private satellite video communication that is not scrambled or
encrypted and the conduct in violation of this chapter is the private
viewing of that communication and is not for a tortious or illegal purpose
or for purposes of direct or indirect commercial advantage or private
commercial gain; or
(B) a radio communication that is transmitted on frequencies allocated
under subpart D of part 74 of the rules of the Federal Communications
Commission that is not scrambled or encrypted and the conduct in violation
of this chapter is not for a tortious or illegal purpose or for purposes
of direct or indirect commercial advantage or private commercial gain,
then the person who engages in such conduct shall be subject to suit by
the Federal Government in a court of competent jurisdiction.
(ii) In an action under this subsection--
(A) if the violation of this chapter is a first offense for the person
under paragraph (a) of subsection (4) and such person has not been found
liable in a civil action under section 2520 of this title, the Federal
Government shall be entitled to appropriate injunctive relief; and
(B) if the violation of this chapter is a second or subsequent offense
under paragraph (a) of subsection (4) or such person has been found liable
in any prior civil action under section 2520, the person shall be subject
to a mandatory $ 500 civil fine.
(b) The court may use any means within its authority to enforce an
injunction issued under paragraph (ii)(A), and shall impose a civil fine
of not less than $ 500 for each violation of such an injunction.
Sec. 2512. Manufacture, distribution, possession, and advertising of
wire, oral, or electronic communication intercepting devices prohibited
(1) Except as otherwise specifically provided in this chapter, any
person who intentionally--
(a) sends through the mail, or sends or carries in interstate or
foreign commerce, any electronic, mechanical, or other device, knowing or
having reason to know that the design of such device renders it primarily
useful for the purpose of the surreptitious interception of wire, oral, or
electronic communications;
(b) manufactures, assembles, possesses, or sells any electronic,
mechanical, or other device, knowing or having reason to know that the
design of such device renders it primarily useful for the purpose of the
surreptitious interception of wire, oral, or electronic communications,
and that such device or any component thereof has been or will be sent
through the mail or transported in interstate or foreign commerce; or
(c) places in any newspaper, magazine, handbill, or other publication
any advertisement of--
(i) any electronic, mechanical, or other device knowing or having
reason to know that the design of such device renders it primarily useful
for the purpose of the surreptitious interception of wire, oral, or
electronic communications; or
(ii) any other electronic, mechanical, or other device, where such
advertisement promotes the use of such device for the purpose of the
surreptitious interception of wire, oral, or electronic communications,
knowing or having reason to know that such advertisement will be sent
through the mail or transported in interstate or foreign commerce,
shall be fined not more than $ 10,000 or imprisoned not more than five
years, or both.
(2) It shall not be unlawful under this section for--
(a) a provider of wire or electronic communication service or an
officer, agent, or employee of, or a person under contract with, such a
provider, in the normal course of the business of providing that wire or
electronic communication service, or
(b) an officer, agent, or employee of, or a person under contract with,
the United States, a State, or a political subdivision thereof, in the
normal course of the activities of the United States, a State, or a
political subdivision thereof, to send through the mail, send or carry in
interstate or foreign commerce, or manufacture, assemble, possess, or sell
any electronic, mechanical, or other device knowing or having reason to
know that the design of such device renders it primarily useful for the
purpose of the surreptitious interception of wire, oral, or electronic
communications.
Sec. 2513. Confiscation of wire, oral, or electronic communication
intercepting devices
Any electronic, mechanical, or other device used, sent, carried,
manufactured, assembled, possessed, sold, or advertised in violation of
section 2511 or section 2512 of this chapter may be seized and
forfeited to the United States. All provisions of law relating to (1) the
seizure, summary and judicial forfeiture, and condemnation of vessels,
vehicles, merchandise, and baggage for violations of the customs laws
contained in title 19 of the United States Code, (2) the disposition of
such vessels, vehicles, merchandise, and baggage or the proceeds from the
sale thereof, (3) the remission or mitigation of such forfeiture, (4) the
compromise of claims, and (5) the award of compensation to informers in
respect of such forfeitures, shall apply to seizures and forfeitures
incurred, or alleged to have been incurred, under the provisions of this
section, insofar as applicable and not inconsistent with the provisions of
this section; except that such duties as are imposed upon the collector of
customs or any other person with respect to the seizure and forfeiture of
vessels, vehicles, merchandise, and baggage under the provisions of the
customs laws contained in title 19 of the United States Code shall be
performed with respect to seizure and forfeiture of electronic,
mechanical, or other intercepting devices under this section by such
officers, agents, or other persons as may be authorized or designated for
that purpose by the Attorney General.
[Sec. 2514. Repealed. Pub.L. 91-452, Title II, Sec. 227(a), Oct. 15, 1970,
84 Stat. 930]
Sec. 2515. Prohibition of use as evidence of intercepted wire or oral
communications
Whenever any wire or oral communication has been intercepted, no part
of the contents of such communication and no evidence derived therefrom
may be received in evidence in any trial, hearing, or other proceeding in
or before any court, grand jury, department, officer, agency, regulatory
body, legislative committee, or other authority of the United States, a
State, or a political subdivision thereof if the disclosure of that
information would be in violation of this chapter.
Sec. 2516. Authorization for interception of wire, oral, or electronic
communications
(1) The Attorney General, Deputy Attorney General, Associate Attorney
General, or any Assistant Attorney General, any acting Assistant Attorney
General, or any Deputy Assistant Attorney General in the Criminal Division
specially designated by the Attorney General, may authorize an application
to a Federal judge of competent jurisdiction for, and such judge may grant
in conformity with section 2518 of this chapter an order authorizing or
approving the interception of wire or oral communications by the Federal
Bureau of Investigation, or a Federal agency having responsibility for the
investigation of the offense as to which the application is made, when
such interception may provide or has provided evidence of--
(a) any offense punishable by death or by imprisonment for more than
one year under sections 2274 through 2277 of title 42 of the United States
Code (relating to the enforcement of the Atomic Energy Act of 1954),
section 2284 of title 42 of the United States Code (relating to sabotage
of nuclear facilities or fuel), or under the following chapters of this
title: chapter 37 (relating to espionage), chapter 105 (relating to
sabotage), chapter 115 (relating to treason), chapter 102 (relating to
riots), chapter 65 (relating to malicious mischief), chapter 111 (relating
to destruction of vessels), or chapter 81 (relating to piracy);
(b) a violation of section 186 or section 501(c) of title 29, United
States Code (dealing with restrictions on payments and loans to labor
organizations), or any offense which involves murder, kidnapping, robbery,
or extortion, and which is punishable under this title;
(c) any offense which is punishable under the following sections of
this title: section 201 (bribery of public officials and witnesses),
section 215 (relating to bribery of bank officials), section 224 (bribery
in sporting contests), subsection (d), (e), (f), (g), (h), or (i) of
section 844 (unlawful use of explosives), section 1032 (relating to
concealment of assets), section 1084 (transmission of wagering
information), section 751 (relating to escape), section 1014 (relating to
loans and credit applications generally; renewals and discounts), sections
1503, 1512, and 1513 (influencing or injuring an officer, juror, or
witness generally), section 1510 (obstruction of criminal investigations),
section 1511 (obstruction of State or local law enforcement), section 1751
(Presidential and Presidential staff assassination, kidnaping, and
assault), section 1951 (interference with commerce by threats or
violence), section 1952 (interstate and foreign travel or transportation
in aid of racketeering enterprises), section 1958 (relating to use of
interstate commerce facilities in the commission of murder for hire),
section 1959 (relating to violent crimes in aid of racketeering activity),
section 1954 (offer, acceptance, or solicitation to influence operations
of employee benefit plan), section 1955 (prohibition of business
enterprises of gambling), section 1956 (laundering of monetary
instruments), section 1957 (relating to engaging in monetary transactions
in property derived from specified unlawful activity), section 659 (theft
from interstate shipment), section 664 (embezzlement from pension and
welfare funds), section 1343 (fraud by wire, radio, or television),
section 1344 (relating to bank fraud), sections 2251 and 2252 (sexual
exploitation of children), sections 2312, 2313, 2314, and 2315 (interstate
transportation of stolen property), section 2321 (relating to trafficking
in certain motor vehicles or motor vehicle parts), section 1203 (relating
to hostage taking), section 1029 (relating to fraud and related activity
in connection with access devices), section 3146 (relating to penalty for
failure to appear), section 3521(b)(3) (relating to witness relocation and
assistance), section 32 (relating to destruction of aircraft or aircraft
facilities), section 1963 (violations with respect to racketeer influenced
and corrupt organizations), section 115 (relating to threatening or
retaliating against a Federal official), and section 1341 (relating to
mail fraud), or section 351 (violations with respect to congressional,
Cabinet, or Supreme Court assassinations, kidnaping, and assault), section
831 (relating to prohibited transactions involving nuclear materials),
section 33 (relating to destruction of motor vehicles or motor vehicle
facilities), section 175 (relating to biological weapons), or section 1992
(relating to wrecking trains);
(d) any offense involving counterfeiting punishable under section 471,
472, or 473 of this title;
(e) any offense involving fraud connected with a case under title 11
or the manufacture, importation, receiving, concealment, buying, selling,
or otherwise dealing in narcotic drugs, marihuana, or other dangerous
drugs, punishable under any law of the United States;
(f) any offense including extortionate credit transactions under
sections 892, 893, or 894 of this title;
(g) a violation of section 5322 of title 31, United States Code
(dealing with the reporting of currency transactions);
(h) any felony violation of sections 2511 and 2512 (relating to
interception and disclosure of certain communications and to certain
intercepting devices) of this title;
(i) any felony violation of chapter 71 (relating to obscenity) of this
title;
(j) any violation of section 11(c)(2) of the Natural Gas Pipeline
Safety Act of 1968 (relating to destruction of a natural gas pipeline) or
subsection (i) or (n) of section 902 of the Federal Aviation Act of 1958
(relating to aircraft piracy);
(k) any criminal violation of section 2778 of title 22 (relating to the
Arms Export Control Act);
(l) the location of any fugitive from justice from an offense described
in this section;
(m) any felony violation of sections 922 and 924 of title 18, United
States Code (relating to firearms);
(n) any violation of section 5861 of the Internal Revenue Code of 1986
(relating to firearms); and
(o) any conspiracy to commit any offense described in any subparagraph
of this paragraph.
(2) The principal prosecuting attorney of any State, or the principal
prosecuting attorney of any political subdivision thereof, if such
attorney is authorized by a statute of that State to make application to a
State court judge of competent jurisdiction for an order authorizing or
approving the interception of wire or oral communications, may apply to
such judge for, and such judge may grant in conformity with section 2518
of this chapter and with the applicable State statute an order
authorizing, or approving the interception of wire or oral communications
by investigative or law enforcement officers having responsibility for the
investigation of the offense as to which the application is made, when
such interception may provide or has provided evidence of the commission
of the offense of murder, kidnapping, gambling, robbery, bribery,
extortion, or dealing in narcotic drugs, marihuana or other dangerous
drugs, or other crime dangerous to life, limb, or property, and punishable
by imprisonment for more than one year, designated in any applicable State
statute authorizing such interception, or any conspiracy to commit any of
the foregoing offenses.
(3) Any attorney for the Government (as such term is defined for the
purposes of the Federal Rules of Criminal Procedure) may authorize an
application to a Federal judge of competent jurisdiction for, and such
judge may grant, in conformity with section 2518 of this title, an order
authorizing or approving the interception of electronic communications by
an investigative or law enforcement officer having responsibility for the
investigation of the offense as to which the application is made, when
such interception may provide or has provided evidence of any Federal
felony.
Sec. 2517. Authorization for disclosure and use of intercepted wire,
oral, or electronic communications
(1) Any investigative or law enforcement officer who, by any means
authorized by this chapter, has obtained knowledge of the contents of any
wire, oral, or electronic communication, or evidence derived therefrom,
may disclose such contents to another investigative or law enforcement
officer to the extent that such disclosure is appropriate to the proper
performance of the official duties of the officer making or receiving the
disclosure.
(2) Any investigative or law enforcement officer who, by any means
authorized by this chapter, has obtained knowledge of the contents of any
wire, oral, or electronic communication or evidence derived therefrom may
use such contents to the extent such use is appropriate to the proper
performance of his official duties.
(3) Any person who has received, by any means authorized by this
chapter, any information concerning a wire, oral, or electronic
communication, or evidence derived therefrom intercepted in accordance
with the provisions of this chapter may disclose the contents of that
communication or such derivative evidence while giving testimony under
oath or affirmation in any proceeding held under the authority of the
United States or of any State or political subdivision thereof.
(4) No otherwise privileged wire, oral, or electronic communication
intercepted in accordance with, or in violation of, the provisions of this
chapter shall lose its privileged character.
(5) When an investigative or law enforcement officer, while engaged in
intercepting wire, oral, or electronic communications in the manner
authorized herein, intercepts wire, oral, or electronic communications
relating to offenses other than those specified in the order of
authorization or approval, the contents thereof, and evidence derived
therefrom, may be disclosed or used as provided in subsections (1) and (2)
of this section. Such contents and any evidence derived therefrom may be
used under subsection (3) of this section when authorized or approved by a
judge of competent jurisdiction where such judge finds on subsequent
application that the contents were otherwise intercepted in accordance
with the provisions of this chapter. Such application shall be made as
soon as practicable.
Sec. 2518. Procedure for interception of wire, oral, or electronic
communications
(1) Each application for an order authorizing or approving the
interception of a wire, oral, or electronic communication under this
chapter shall be made in writing upon oath or affirmation to a judge of
competent jurisdiction and shall state the applicant's authority to make
such application. Each application shall include the following
information:
(a) the identity of the investigative or law enforcement officer making
the application, and the officer authorizing the application;
(b) a full and complete statement of the facts and circumstances relied
upon by the applicant, to justify his belief that an order should be
issued, including (i) details as to the particular offense that has been,
is being, or is about to be committed, (ii) except as provided in
subsection (11), a particular description of the nature and location of
the facilities from which or the place where the communication is to be
intercepted, (iii) a particular description of the type of communications
sought to be intercepted, (iv) the identity of the person, if known,
committing the offense and whose communications are to be intercepted;
(c) a full and complete statement as to whether or not other
investigative procedures have been tried and failed or why they reasonably
appear to be unlikely to succeed if tried or to be too dangerous;
(d) a statement of the period of time for which the interception is
required to be maintained. If the nature of the investigation is such that
the authorization for interception should not automatically terminate when
the described type of communication has been first obtained, a particular
description of facts establishing probable cause to believe that
additional communications of the same type will occur thereafter;
(e) a full and complete statement of the facts concerning all previous
applications known to the individual authorizing and making the
application, made to any judge for authorization to intercept, or for
approval of interceptions of, wire, oral, or electronic communications
involving any of the same persons, facilities or places specified in the
application, and the action taken by the judge on each such application;
and
(f) where the application is for the extension of an order, a statement
setting forth the results thus far obtained from the interception, or a
reasonable explanation of the failure to obtain such results.
(2) The judge may require the applicant to furnish additional testimony
or documentary evidence in support of the application.
(3) Upon such application the judge may enter an ex parte order, as
requested or as modified, authorizing or approving interception of wire,
oral, or electronic communications within the territorial jurisdiction of
the court in which the judge is sitting (and outside that jurisdiction but
within the United States in the case of a mobile interception device
authorized by a Federal court within such jurisdiction), if the judge
determines on the basis of the facts submitted by the applicant that--
(a) there is probable cause for belief that an individual is
committing, has committed, or is about to commit a particular offense
enumerated in section 2516 of this chapter;
(b) there is probable cause for belief that particular communications
concerning that offense will be obtained through such interception;
(c) normal investigative procedures have been tried and have failed or
reasonably appear to be unlikely to succeed if tried or to be too
dangerous;
(d) except as provided in subsection (11), there is probable cause for
belief that the facilities from which, or the place where, the wire, oral,
or electronic communications are to be intercepted are being used, or are
about to be used, in connection with the commission of such offense, or
are leased to, listed in the name of, or commonly used by such person.
(4) Each order authorizing or approving the interception of any wire,
oral, or electronic communication under this chapter shall specify--
(a) the identity of the person, if known, whose communications are to
be intercepted;
(b) the nature and location of the communications facilities as to
which, or the place where, authority to intercept is granted;
(c) a particular description of the type of communication sought to be
intercepted, and a statement of the particular offense to which it
relates;
(d) the identity of the agency authorized to intercept the
communications, and of the person authorizing the application; and
(e) the period of time during which such interception is authorized,
including a statement as to whether or not the interception shall
automatically terminate when the described communication has been first
obtained.
An order authorizing the interception of a wire, oral, or electronic
communication under this chapter shall, upon request of the applicant,
direct that a provider of wire or electronic communication service,
landlord, custodian or other person shall furnish the applicant forthwith
all information, facilities, and technical assistance necessary to
accomplish the interception unobtrusively and with a minimum of
interference with the services that such service provider, landlord,
custodian, or person is according the person whose communications are to
be intercepted. Any provider of wire or electronic communication service,
landlord, custodian or other person furnishing such facilities or
technical assistance shall be compensated therefor by the applicant for
reasonable expenses incurred in providing such facilities or assistance.
(5) No order entered under this section may authorize or approve the
interception of any wire, oral, or electronic communication for any period
longer than is necessary to achieve the objective of the authorization,
nor in any event longer than thirty days. Such thirty-day period begins on
the earlier of the day on which the investigative or law enforcement
officer first begins to conduct an interception under the order or ten
days after the order is entered. Extensions of an order may be granted,
but only upon application for an extension made in accordance with
subsection (1) of this section and the court making the findings required
by subsection (3) of this section. The period of extension shall be no
longer than the authorizing judge deems necessary to achieve the purposes
for which it was granted and in no event for longer than thirty days.
Every order and extension thereof shall contain a provision that the
authorization to intercept shall be executed as soon as practicable, shall
be conducted in such a way as to minimize the interception of
communications not otherwise subject to interception under this chapter,
and must terminate upon attainment of the authorized objective, or in any
event in thirty days. In the event the intercepted communication is in a
code or foreign language, and an expert in that foreign language or code
is not reasonably available during the interception period, minimization
may be accomplished as soon as practicable after such interception. An
interception under this chapter may be conducted in whole or in part by
Government personnel, or by an individual operating under a contract with
the Government, acting under the supervision of an investigative or law
enforcement officer authorized to conduct the interception.
(6) Whenever an order authorizing interception is entered pursuant to
this chapter, the order may require reports to be made to the judge who
issued the order showing what progress has been made toward achievement of
the authorized objective and the need for continued interception. Such
reports shall be made at such intervals as the judge may require.
(7) Notwithstanding any other provision of this chapter, any
investigative or law enforcement officer, specially designated by the
Attorney General, the Deputy Attorney General, the Associate Attorney
General, or by the principal prosecuting attorney of any State or
subdivision thereof acting pursuant to a statute of that State, who
reasonably determines that--
(a) an emergency situation exists that involves--
(i) immediate danger of death or serious physical injury to any person,
(ii) conspiratorial activities threatening the national security
interest, or
(iii) conspiratorial activities characteristic of organized crime,
that requires a wire, oral, or electronic communication to be
intercepted before an order authorizing such interception can, with due
diligence, be obtained, and
(b) there are grounds upon which an order could be entered under this
chapter to authorize such interception,
may intercept such wire, oral, or electronic communication if an
application for an order approving the interception is made in accordance
with this section within forty-eight hours after the interception has
occurred, or begins to occur. In the absence of an order, such
interception shall immediately terminate when the communication sought is
obtained or when the application for the order is denied, whichever is
earlier. In the event such application for approval is denied, or in any
other case where the interception is terminated without an order having
been issued, the contents of any wire, oral, or electronic communication
intercepted shall be treated as having been obtained in violation of this
chapter, and an inventory shall be served as provided for in subsection
(d) of this section on the person named in the application.
(8)(a) The contents of any wire, oral, or electronic communication
intercepted by any means authorized by this chapter shall, if possible, be
recorded on tape or wire or other comparable device. The recording of the
contents of any wire, oral, or electronic communication under this
subsection shall be done in such way as will protect the recording from
editing or other alterations. Immediately upon the expiration of the
period of the order, or extensions thereof, such recordings shall be made
available to the judge issuing such order and sealed under his directions.
Custody of the recordings shall be wherever the judge orders. They shall
not be destroyed except upon an order of the issuing or denying judge and
in any event shall be kept for ten years. Duplicate recordings may be made
for use or disclosure pursuant to the provisions of subsections (1) and
(2) of section 2517 of this chapter for investigations. The presence of
the seal provided for by this subsection, or a satisfactory explanation
for the absence thereof, shall be a prerequisite for the use or disclosure
of the contents of any wire, oral, or electronic communication or evidence
derived therefrom under subsection (3) of section 2517.
(b) Applications made and orders granted under this chapter shall be
sealed by the judge. Custody of the applications and orders shall be
wherever the judge directs. Such applications and orders shall be
disclosed only upon a showing of good cause before a judge of competent
jurisdiction and shall not be destroyed except on order of the issuing or
denying judge, and in any event shall be kept for ten years.
(c) Any violation of the provisions of this subsection may be punished
as contempt of the issuing or denying judge.
(d) Within a reasonable time but not later than ninety days after the
filing of an application for an order of approval under section 2518(7)(b)
which is denied or the termination of the period of an order or extensions
thereof, the issuing or denying judge shall cause to be served, on the
persons named in the order or the application, and such other parties to
intercepted communications as the judge may determine in his discretion
that is in the interest of justice, an inventory which shall include
notice of--
(1) the fact of the entry of the order or the application;
(2) the date of the entry and the period of authorized, approved or
disapproved interception, or the denial of the application; and
(3) the fact that during the period wire, oral, or electronic
communications were or were not intercepted.
The judge, upon the filing of a motion, may in his discretion make
available to such person or his counsel for inspection such portions of
the intercepted communications, applications and orders as the judge
determines to be in the interest of justice. On an ex parte showing of
good cause to a judge of competent jurisdiction the serving of the
inventory required by this subsection may be postponed.
(9) The contents of any wire, oral, or electronic communication
intercepted pursuant to this chapter or evidence derived therefrom shall
not be received in evidence or otherwise disclosed in any trial, hearing,
or other proceeding in a Federal or State court unless each party, not
less than ten days before the trial, hearing, or proceeding, has been
furnished with a copy of the court order, and accompanying application,
under which the interception was authorized or approved. This ten-day
period may be waived by the judge if he finds that it was not possible to
furnish the party with the above information ten days before the trial,
hearing, or proceeding and that the party will not be prejudiced by the
delay in receiving such information.
(10)(a) Any aggrieved person in any trial, hearing, or proceeding in or
before any court, department, officer, agency, regulatory body, or other
authority of the United States, a State, or a political subdivision
thereof, may move to suppress the contents of any wire or oral
communication intercepted pursuant to this chapter, or evidence derived
therefrom, on the grounds that--
(i) the communication was unlawfully intercepted;
(ii) the order of authorization or approval under which it was
intercepted is insufficient on its face; or
(iii) the interception was not made in conformity with the order of
authorization or approval.
Such motion shall be made before the trial, hearing, or proceeding
unless there was no opportunity to make such motion or the person was not
aware of the grounds of the motion. If the motion is granted, the contents
of the intercepted wire or oral communication, or evidence derived
therefrom, shall be treated as having been obtained in violation of this
chapter. The judge, upon the filing of such motion by the aggrieved
person, may in his discretion make available to the aggrieved person or
his counsel for inspection such portions of the intercepted communication
or evidence derived therefrom as the judge determines to be in the
interests of justice.
(b) In addition to any other right to appeal, the United States shall
have the right to appeal from an order granting a motion to suppress made
under paragraph (a) of this subsection, or the denial of an application
for an order of approval, if the United States attorney shall certify to
the judge or other official granting such motion or denying such
application that the appeal is not taken for purposes of delay. Such
appeal shall be taken within thirty days after the date the order was
entered and shall be diligently prosecuted.
(c) The remedies and sanctions described in this chapter with respect
to the interception of electronic communications are the only judicial
remedies and sanctions for nonconstitutional violations of this chapter
involving such communications.
(11) The requirements of subsections (1)(b)(ii) and (3)(d) of this
section relating to the specification of the facilities from which, or the
place where, the communication is to be intercepted do not apply if--
(a) in the case of an application with respect to the interception of
an oral communication--
(i) the application is by a Federal investigative or law enforcement
officer and is approved by the Attorney General, the Deputy Attorney
General, the Associate Attorney General, an Assistant Attorney General, or
an acting Assistant Attorney General;
(ii) the application contains a full and complete statement as to why
such specification is not practical and identifies the person committing
the offense and whose communications are to be intercepted; and
(iii) the judge finds that such specification is not practical; and
(b) in the case of an application with respect to a wire or electronic
communication--
(i) the application is by a Federal investigative or law enforcement
officer and is approved by the Attorney General, the Deputy Attorney
General, the Associate Attorney General, an Assistant Attorney General, or
an acting Assistant Attorney General;
(ii) the application identifies the person believed to be committing
the offense and whose communications are to be intercepted and the
applicant makes a showing of a purpose, on the part of that person, to
thwart interception by changing facilities; and
(iii) the judge finds that such purpose has been adequately shown.
(12) An interception of a communication under an order with respect to
which the requirements of subsections (1)(b)(ii) and (3)(d) of this
section do not apply by reason of subsection (11) shall not begin until
the facilities from which, or the place where, the communication is to be
intercepted is ascertained by the person implementing the interception
order. A provider of wire or electronic communications service that has
received an order as provided for in subsection (11)(b) may move the court
to modify or quash the order on the ground that its assistance with
respect to the interception cannot be performed in a timely or reasonable
fashion. The court, upon notice to the government, shall decide such a
motion expeditiously.
Sec. 2519. Reports concerning intercepted wire, oral, or electronic
communications
(1) Within thirty days after the expiration of an order (or each
extension thereof) entered under section 2518, or the denial of an order
approving an interception, the issuing or denying judge shall report to
the Administrative Office of the United States Courts--
(a) the fact that an order or extension was applied for;
(b) the kind of order or extension applied for (including whether or
not the order was an order with respect to which the requirements of
sections 2518(1)(b)(ii) and 2518(3)(d) of this title did not apply by
reason of section 2518(11) of this title);
(c) the fact that the order or extension was granted as applied for,
was modified, or was denied;
(d) the period of interceptions authorized by the order, and the number
and duration of any extensions of the order;
(e) the offense specified in the order or application, or extension of
an order;
(f) the identity of the applying investigative or law enforcement
officer and agency making the application and the person authorizing the
application; and
(g) the nature of the facilities from which or the place where
communications were to be intercepted.
(2) In January of each year the Attorney General, an Assistant Attorney
General specially designated by the Attorney General, or the principal
prosecuting attorney of a State, or the principal prosecuting attorney for
any political subdivision of a State, shall report to the Administrative
Office of the United States Courts--
(a) the information required by paragraphs (a) through (g) of
subsection (1) of this section with respect to each application for an
order or extension made during the preceding calendar year;
(b) a general description of the interceptions made under such order or
extension, including (i) the approximate nature and frequency of
incriminating communications intercepted, (ii) the approximate nature and
frequency of other communications intercepted, (iii) the approximate
number of persons whose communications were intercepted, and (iv) the
approximate nature, amount, and cost of the manpower and other resources
used in the interceptions;
(c) the number of arrests resulting from interceptions made under such
order or extension, and the offenses for which arrests were made;
(d) the number of trials resulting from such interceptions;
(e) the number of motions to suppress made with respect to such
interceptions, and the number granted or denied;
(f) the number of convictions resulting from such interceptions and the
offenses for which the convictions were obtained and a general assessment
of the importance of the interceptions; and
(g) the information required by paragraphs (b) through (f) of this
subsection with respect to orders or extensions obtained in a preceding
calendar year.
(3) In April of each year the Director of the Administrative Office of
the United States Courts shall transmit to the Congress a full and
complete report concerning the number of applications for orders
authorizing or approving the interception of wire, oral, or electronic
communications pursuant to this chapter and the number of orders and
extensions granted or denied pursuant to this chapter during the preceding
calendar year. Such report shall include a summary and analysis of the
data required to be filed with the Administrative Office by subsections
(1) and (2) of this section. The Director of the Administrative Office of
the United States Courts is authorized to issue binding regulations
dealing with the content and form of the reports required to be filed by
subsections (1) and (2) of this section.
Sec. 2520. Recovery of civil damages authorized
(a) In general. Except as provided in section 2511(2)(a)(ii), any
person whose wire, oral, or electronic communication is intercepted,
disclosed, or intentionally used in violation of this chapter may in a
civil action recover from the person or entity which engaged in that
violation such relief as may be appropriate.
(b) Relief. In an action under this section, appropriate relief
includes--
(1) such preliminary and other equitable or declaratory relief as may
be appropriate;
(2) damages under subsection (c) and punitive damages in appropriate
cases; and
(3) a reasonable attorney's fee and other litigation costs reasonably
incurred.
(c) Computation of damages.
(1) In an action under this section, if the conduct in violation of
this chapter, is the private viewing of a private satellite video
communication that is not scrambled or encrypted or if the communication
is a radio communication that is transmitted on frequencies allocated
under subpart D of part 74 of the rules of the Federal Communications
Commission that is not scrambled or encrypted and the conduct is not for a
tortious or illegal purpose or for purposes of direct or indirect
commercial advantage or private commercial gain, then the court shall
assess damages as follows:
(A) If the person who engaged in that conduct has not previously been
enjoined under section 2511(5) and has not been found liable in a prior
civil action under this section, the court shall assess the greater of the
sum of actual damages suffered by the plaintiff, or statutory damages of
not less than $ 50 and not more than $ 500.
(B) If, on one prior occasion, the person who engaged in that conduct
has been enjoined under section 2511(5) or has been found liable in a
civil action under this section, the court shall assess the greater of the
sum of actual damages suffered by the plaintiff, or statutory damages of
not less than $ 100 and not more than $ 1000.
(2) In any other action under this section, the court may assess as
damages whichever is the greater of--
(A) the sum of the actual damages suffered by the plaintiff and any
profits made by the violator as a result of the violation; or
(B) statutory damages of whichever is the greater of $ 100 a day for
each day of violation or $ 10,000.
(d) Defense. A good faith reliance on--
(1) a court warrant or order, a grand jury subpoena, a legislative
authorization, or a statutory authorization;
(2) a request of an investigative or law enforcement officer under
section 2518(7) of this title; or
(3) a good faith determination that section 2511(3) of this title
permitted the conduct complained of; is a complete defense against any
civil or criminal action brought under this chapter or any other law.
(e) Limitation. A civil action under this section may not be commenced
later than two years after the date upon which the claimant first has a
reasonable opportunity to discover the violation.
Sec. 2521. Injunction against illegal interception
Whenever it shall appear that any person is engaged or is about to
engage in any act which constitutes or will constitute a felony violation
of this chapter, the Attorney General may initiate a civil action in a
district court of the United States to enjoin such violation. The court
shall proceed as soon as practicable to the hearing and determination of
such an action, and may, at any time before final determination, enter
such a restraining order or prohibition, or take such other action, as is
warranted to prevent a continuing and substantial injury to the United
States or to any person or class of persons for whose protection the
action is brought. A proceeding under this section is governed by the
Federal Rules of Civil Procedure, except that, if an indictment has been
returned against the respondent, discovery is governed by the Federal
Rules of Criminal Procedure.
CHAPTER 121. STORED WIRE AND ELECTRONIC COMMUNICATIONS AND TRANSACTIONAL
RECORDS ACCESS
Sec. 2701. Unlawful access to stored communications
(a) Offense. Except as provided in subsection (c) of this section
whoever--
(1) intentionally accesses without authorization a facility through
which an electronic communication service is provided; or
(2) intentionally exceeds an authorization to access that facility; and
thereby obtains, alters, or prevents authorized access to a wire or
electronic communication while it is in electronic storage in such system
shall be punished as provided in subsection (b) of this section.
(b) Punishment. The punishment for an offense under subsection (a) of
this section is--
(1) if the offense is committed for purposes of commercial advantage,
malicious destruction or damage, or private commercial gain--
(A) a fine of not more than $ 250,000 or imprisonment for not more than
one year, or both, in the case of a first offense under this subparagraph;
and
(B) a fine under this title or imprisonment for not more than two
years, or both, for any subsequent offense under this subparagraph; and
(2) a fine of not more than $ 5,000 or imprisonment for not more than
six months, or both, in any other case.
(c) Exceptions. Subsection (a) of this section does not apply with
respect to conduct authorized--
(1) by the person or entity providing a wire or electronic
communications service;
(2) by a user of that service with respect to a communication of or
intended for that user; or
(3) in section 2703, 2704 or 2518 of this title.
Sec. 2702. Disclosure of contents
(a) Prohibitions. Except as provided in subsection (b)--
(1) a person or entity providing an electronic communication service to
the public shall not knowingly divulge to any person or entity the
contents of a communication while in electronic storage by that service;
and
(2) a person or entity providing remote computing service to the public
shall not knowingly divulge to any person or entity the contents of any
communication which is carried or maintained on that service--
(A) on behalf of, and received by means of electronic transmission from
(or created by means of computer processing of communications received by
means of electronic transmission from), a subscriber or customer of such
service; and
(B) solely for the purpose of providing storage or computer processing
services to such subscriber or customer, if the provider is not authorized
to access the contents of any such communications for purposes of
providing any services other than storage or computer processing.
(b) Exceptions. A person or entity may divulge the contents of a
communication--
(1) to an addressee or intended recipient of such communication or an
agent of such addressee or intended recipient;
(2) as otherwise authorized in section 2517, 2511(2)(a), or 2703 of
this title;
(3) with the lawful consent of the originator or an addressee or
intended recipient of such communication, or the subscriber in the case of
remote computing service;
(4) to a person employed or authorized or whose facilities are used to
forward such communication to its destination;
(5) as may be necessarily incident to the rendition of the service or
to the protection of the rights or property of the provider of that
service; or
(6) to a law enforcement agency, if such contents--
(A) were inadvertently obtained by the service provider; and
(B) appear to pertain to the commission of a crime.
Sec. 2703. Requirements for governmental access
(a) Contents of electronic communications in electronic storage.--A
governmental entity may require the disclosure by a provider of
electronic communication service of the contents of an electronic
communication, that is in electronic storage in an electronic
communications system for one hundred and eighty days or less, only
pursuant to a warrant issued under the Federal Rules of Criminal
Procedure or equivalent State warrant. A governmental entity may require
the disclosure by a provider of electronic communications services of
the contents of an electronic communication that has been in electronic
storage in an electronic communications system for more than one hundred
and eighty days by the means available under subsection (b) of this
section.
(b) Contents of electronic communications in a remote computing
service.--(1) A governmental entity may require a provider of remote
computing service to disclose the contents of any electronic
communication to which this paragraph is made applicable by paragraph
(2) of this subsection--
(A) without required notice to the subscriber or customer, if the
governmental entity obtains a warrant issued under the Federal Rules of
Criminal Procedure or equivalent State warrant; or
(B) with prior notice from the governmental entity to the subscriber
or customer if the governmental entity--
(i) uses an administrative subpoena authorized by a Federal or State
statute or a Federal or State grand jury subpoena; or
(ii) obtains a court order for such disclosure under subsection (d)
of this section; except that delayed notice may be given pursuant to
section 2705 of this title.
(2) Paragraph (1) is applicable with respect to any electronic
communications that is held or maintained on that service--
(A) on behalf of, and received by means of electronic transmission
from (or created by means of computer processing of communications
received by means of electronic transmission from), a subscriber or
customer of such remote computing service; and
(B) solely for the purpose of providing storage or computer
processing services to such subscriber or customer, if the provider is not
authorized to access the contents of any such communications for purposes
of providing any services other than storage or computer processing.
(c) Records concerning electronic communications service or remote
computing service.--(1)(A) Except as provided in subparagraph (B), a
provider of electronic communication service or remote computing service
may disclose a record or other information pertaining to a subscriber to
or customer of such service (not including the contents of communications
covered by subsection (a) or (b) of this section) to any person other than
a governmental entity.
(B) a provider of electronic communication service or remote
computing service shall disclose a record or other information pertaining
to a subscriber to or customer of such service (not including the contents
of communications covered by subsection (a) or (b) of this section) to a
governmental entity only when the governmental entity--
(i) uses an administrative subpoena authorized by a Federal or State
statute, or a Federal or State grand jury subpoena;
(ii)obtains a warrant issued under the Federal Rules of Criminal
Procedure or equivalent State warrant;
(iii)obtains a court order for such disclosure under subsection (d)
of this section; or
(iv) has the consent of the subscriber or customer to such
disclosure. (2)A governmental entity receiving records or information
under this subsection is not required to provide notice to a subscriber or
customer.
(d) Requirements for court order.--A court order for disclosure under
subsection (b) or (c) of this section shall issue only if the governmental
entity shows that there is reason to believe the contents of a wire or
electronic communication, or the records or other information sought, are
relevant to a legitimate law enforcement inquiry. In the case of a State
governmental authority, such a court order shall not issue if prohibited
by the law of such State. A court issuing an order pursuant to this
section, on a motion made promptly by the service provider, may quash or
modify such order, if the information or records requested are unusually
voluminous in nature or compliance with such order otherwise would cause
an undue burden on such provider.
(e) No cause of action against a provider disclosing information
under this chapter.--No cause of action shall lie in any court against any
provider of wire or electronic communication service, its officers,
employees, agents, or other specified persons for providing information,
facilities, or assistance in accordance with the terms of a court order,
warrant, subpoena, or certification under this chapter.
Sec. 2704. Backup preservation
(a) Backup preservation.
(1) A governmental entity acting under section 2703(b)(2) may include
in its subpoena or court order a requirement that the service provider to
whom the request is directed create a backup copy of the contents of the
electronic communications sought in order to preserve those
communications. Without notifying the subscriber or customer of such
subpoena or court order, such service provider shall create such backup
copy as soon as practicable consistent with its regular business practices
and shall confirm to the governmental entity that such backup copy has
been made. Such backup copy shall be created within two business days
after receipt by the service provider of the subpoena or court order.
(2) Notice to the subscriber or customer shall be made by the
governmental entity within three days after receipt of such confirmation,
unless such notice is delayed pursuant to section 2705(a).
(3) The service provider shall not destroy such backup copy until the
later of--
(A) the delivery of the information; or
(B) the resolution of any proceedings (including appeals of any
proceeding) concerning the government's subpoena or court order.
(4) The service provider shall release such backup copy to the
requesting governmental entity no sooner than fourteen days after the
governmental entity's notice to the subscriber or customer if such service
provider--
(A) has not received notice from the subscriber or customer that the
subscriber or customer has challenged the governmental entity's request;
and
(B) has not initiated proceedings to challenge the request of the
governmental entity.
(5) A governmental entity may seek to require the creation of a backup
copy under subsection (a)(1) of this section if in its sole discretion
such entity determines that there is reason to believe that notification
under section 2703 of this title of the existence of the subpoena or court
order may result in destruction of or tampering with evidence. This
determination is not subject to challenge by the subscriber or customer or
service provider.
(b) Customer challenges.
(1) Within fourteen days after notice by the governmental entity to the
subscriber or customer under subsection (a)(2) of this section, such
subscriber or customer may file a motion to quash such subpoena or vacate
such court order, with copies served upon the governmental entity and with
written notice of such challenge to the service provider. A motion to
vacate a court order shall be filed in the court which issued such order.
A motion to quash a subpoena shall be filed in the appropriate United
States district court or State court. Such motion or application shall
contain an affidavit or sworn statement--
(A) stating that the applicant is a customer or subscriber to the
service from which the contents of electronic communications maintained
for him have been sought; and
(B) stating the applicant's reasons for believing that the records
sought are not relevant to a legitimate law enforcement inquiry or that
there has not been substantial compliance with the provisions of this
chapter in some other respect.
(2) Service shall be made under this section upon a governmental entity
by delivering or mailing by registered or certified mail a copy of the
papers to the person, office, or department specified in the notice which
the customer has received pursuant to this chapter. For the purposes of
this section, the term "delivery" has the meaning given that term in the
Federal Rules of Civil Procedure.
(3) If the court finds that the customer has complied with paragraphs
(1) and (2) of this subsection, the court shall order the governmental
entity to file a sworn response, which may be filed in camera if the
governmental entity includes in its response the reasons which make in
camera review appropriate. If the court is unable to determine the motion
or application on the basis of the parties' initial allegations and
response, the court may conduct such additional proceedings as it deems
appropriate. All such proceedings shall be completed and the motion or
application decided as soon as practicable after the filing of the
governmental entity's response.
(4) If the court finds that the applicant is not the subscriber or
customer for whom the communications sought by the governmental entity are
maintained, or that there is a reason to believe that the law enforcement
inquiry is legitimate and that the communications sought are relevant to
that inquiry, it shall deny the motion or application and order such
process enforced. If the court finds that the applicant is the subscriber
or customer for whom the communications sought by the governmental entity
are maintained, and that there is not a reason to believe that the
communications sought are relevant to a legitimate law enforcement
inquiry, or that there has not been substantial compliance with the
provisions of this chapter, it shall order the process quashed.
(5) A court order denying a motion or application under this section
shall not be deemed a final order and no interlocutory appeal may be taken
therefrom by the customer.
Sec. 2705. Delayed notice
(a) Delay of notification.
(1) A governmental entity acting under section 2703(b) of this title
may--
(A) where a court order is sought, include in the application a
request, which the court shall grant, for an order delaying the
notification required under section 2703(b) of this title for a period not
to exceed ninety days, if the court determines that there is reason to
believe that notification of the existence of the court order may have an
adverse result described in paragraph (2) of this subsection; or
(B) where an administrative subpoena authorized by a Federal or State
statute or a Federal or State grand jury subpoena is obtained, delay the
notification required under section 2703(b) of this title for a period not
to exceed ninety days upon the execution of a written certification of a
supervisory official that there is reason to believe that notification of
the existence of the subpoena may have an adverse result described in
paragraph (2) of this subsection.
(2) An adverse result for the purposes of paragraph (1) of this
subsection is--
(A) endangering the life or physical safety of an individual;
(B) flight from prosecution;
(C) destruction of or tampering with evidence;
(D) intimidation of potential witnesses; or
(E) otherwise seriously jeopardizing an investigation or unduly
delaying a trial.
(3) The governmental entity shall maintain a true copy of certification
under paragraph (1)(B).
(4) Extensions of the delay of notification provided in section 2703 of
up to ninety days each may be granted by the court upon application, or by
certification by a governmental entity, but only in accordance with
subsection (b) of this section.
(5) Upon expiration of the period of delay of notification under
paragraph (1) or (4) of this subsection, the governmental entity shall
serve upon, or deliver by registered or first-class mail to, the customer
or subscriber a copy of the process or request together with notice that--
(A) states with reasonable specificity the nature of the law
enforcement inquiry; and
(B) informs such customer or subscriber--
(i) that information maintained for such customer or subscriber by the
service provider named in such process or request was supplied to or
requested by that governmental authority and the date on which the
supplying or request took place;
(ii) that notification of such customer or subscriber was delayed;
(iii) what governmental entity or court made the certification or
determination pursuant to which that delay was made; and
(iv) which provision of this chapter allowed such delay.
(6) As used in this subsection, the term "supervisory official" means
the investigative agent in charge or assistant investigative agent in
charge or an equivalent of an investigating agency's headquarters or
regional office, or the chief prosecuting attorney or the first assistant
prosecuting attorney or an equivalent of a prosecuting attorney's
headquarters or regional office.
(b) Preclusion of notice to subject of governmental access. A
governmental entity acting under section 2703, when it is not required to
notify the subscriber or customer under section 2703(b)(1), or to the
extent that it may delay such notice pursuant to subsection (a) of this
section, may apply to a court for an order commanding a provider of
electronic communications service or remote computing service to whom a
warrant, subpoena, or court order is directed, for such period as the
court deems appropriate, not to notify any other person of the existence
of the warrant, subpoena, or court order. The court shall enter such an
order if it determines that there is reason to believe that notification
of the existence of the warrant, subpoena, or court order will result in--
(1) endangering the life or physical safety of an individual;
(2) flight from prosecution;
(3) destruction of or tampering with evidence;
(4) intimidation of potential witnesses; or
(5) otherwise seriously jeopardizing an investigation or unduly
delaying a trial.
Sec. 2706. Cost reimbursement
(a) Payment. Except as otherwise provided in subsection (c), a
governmental entity obtaining the contents of communications, records, or
other information under section 2702, 2703, or 2704 of this title shall
pay to the person or entity assembling or providing such information a fee
for reimbursement for such costs as are reasonably necessary and which
have been directly incurred in searching for, assembling, reproducing, or
otherwise providing such information. Such reimbursable costs shall
include any costs due to necessary disruption of normal operations of any
electronic communication service or remote computing service in which such
information may be stored.
(b) Amount. The amount of the fee provided by subsection (a) shall be
as mutually agreed by the governmental entity and the person or entity
providing the information, or, in the absence of agreement, shall be as
determined by the court which issued the order for production of such
information (or the court before which a criminal prosecution relating to
such information would be brought, if no court order was issued for
production of the information).
(c) Exception. The requirement of subsection (a) of this section does
not apply with respect to records or other information maintained by a
communications common carrier that relate to telephone toll records and
telephone listings obtained under section 2703 of this title. The court
may, however, order a payment as described in subsection (a) if the court
determines the information required is unusually voluminous in nature or
otherwise caused an undue burden on the provider.
Sec. 2707. Civil action
(a) Cause of action. Except as provided in section 2703(e), any
provider of electronic communication service, subscriber, or customer
aggrieved by any violation of this chapter in which the conduct
constituting the violation is engaged in with a knowing or intentional
state of mind may, in a civil action, recover from the person or entity
which engaged in that violation such relief as may be appropriate.
(b) Relief. In a civil action under this section, appropriate relief
includes--
(1) such preliminary and other equitable or declaratory relief as may
be appropriate;
(2) damages under subsection (c); and
(3) a reasonable attorney's fee and other litigation costs reasonably
incurred.
(c) Damages. The court may assess as damages in a civil action under
this section the sum of the actual damages suffered by the plaintiff and
any profits made by the violator as a result of the violation, but in no
case shall a person entitled to recover receive less than the sum of $
1,000.
(d) Defense. A good faith reliance on--
(1) a court warrant or order, a grand jury subpoena, a legislative
authorization, or a statutory authorization;
(2) a request of an investigative or law enforcement officer under
section 2518(7) of this title; or
(3) a good faith determination that section 2511(3) of this title
permitted the conduct complained of; is a complete defense to any civil or
criminal action brought under this chapter or any other law.
(e) Limitation. A civil action under this section may not be commenced
later than two years after the date upon which the claimant first
discovered or had a reasonable opportunity to discover the violation.
Sec. 2708. Exclusivity of remedies
The remedies and sanctions described in this chapter are the only
judicial remedies and sanctions for nonconstitutional violations of this
chapter.
Sec. 2709. Counterintelligence access to telephone toll and
transactional records
(a) Duty to provide. A wire or electronic communication service
provider shall comply with a request for subscriber information and toll
billing records information, or electronic communication transactional
records in its custody or possession made by the Director of the Federal
Bureau of Investigation under subsection (b) of this section.
(b) Required certification. The Director of the Federal Bureau of
Investigation (or an individual within the Federal Bureau of Investigation
designated for this purpose by the Director) may request any such
information and records if the Director (or the Director's designee)
certifies in writing to the wire or electronic communication service
provider to which the request is made that--
(1) the information sought is relevant to an authorized foreign
counterintelligence investigation; and
(2) there are specific and articulable facts giving reason to believe
that the person or entity to whom the information sought pertains is a
foreign power or an agent of a foreign power as defined in section 101 of
the Foreign Intelligence Surveillance Act of 1978 (50 U.S.C. 1801).
(c) Prohibition of certain disclosure. No wire or electronic
communication service provider, or officer, employee, or agent thereof,
shall disclose to any person that the Federal Bureau of Investigation has
sought or obtained access to information or records under this section.
(d) Dissemination by bureau. The Federal Bureau of Investigation may
disseminate information and records obtained under this section only as
provided in guidelines approved by the Attorney General for foreign
intelligence collection and foreign counterintelligence investigations
conducted by the Federal Bureau of Investigation, and, with respect to
dissemination to an agency of the United States, only if such information
is clearly relevant to the authorized responsibilities of such agency.
(e) Requirement that certain Congressional bodies be informed. On a
semiannual basis the Director of the Federal Bureau of Investigation shall
fully inform the Permanent Select Committee on Intelligence of the House
of Representatives and the Select Committee on Intelligence of the Senate
concerning all requests made under subsection (b) of this section.
Sec. 2710. Wrongful disclosure of video tape rental or sale records
(a) Definitions. For purposes of this section--
(1) the term "consumer" means any renter, purchaser, or subscriber of
goods or services from a video tape service provider;
(2) the term "ordinary course of business" means only debt collection
activities, order fulfillment, request processing, and the transfer of
ownership;
(3) the term "personally identifiable information" includes information
which identifies a person as having requested or obtained specific video
materials or services from a video tape service provider; and
(4) the term "video tape service provider" means any person, engaged in
the business, in or affecting interstate or foreign commerce, of rental,
sale, or delivery of prerecorded video cassette tapes or similar audio
visual materials, or any person or other entity to whom a disclosure is
made under subparagraph (D) or (E) of subsection (b)(2), but only with
respect to the information contained in the disclosure.
(b) Video tape rental and sale records.
(1) A video tape service provider who knowingly discloses, to any
person, personally identifiable information concerning any consumer of
such provider shall be liable to the aggrieved person for the relief
provided in subsection (d).
(2) A video tape service provider may disclose personally identifiable
information concerning any consumer--
(A) to the consumer;
(B) to any person with the informed, written consent of the consumer
given at the time the disclosure is sought;
(C) to a law enforcement agency pursuant to a warrant issued under the
Federal Rules of Criminal Procedure, an equivalent State warrant, a grand
jury subpoena, or a court order;
(D) to any person if the disclosure is solely of the names and
addresses of consumers and if--
(i) the video tape service provider has provided the consumer with the
opportunity, in a clear and conspicuous manner, to prohibit such
disclosure; and
(ii) the disclosure does not identify the title, description, or
subject matter of any video tapes or other audio visual material; however,
the subject matter of such materials may be disclosed if the disclosure is
for the exclusive use of marketing goods and services directly to the
consumer;
(E) to any person if the disclosure is incident to the ordinary course
of business of the video tape service provider; or
(F) pursuant to a court order, in a civil proceeding upon a showing of
compelling need for the information that cannot be accommodated by any
other means, if--
(i) the consumer is given reasonable notice, by the person seeking the
disclosure, of the court proceeding relevant to the issuance of the court
order; and
(ii) the consumer is afforded the opportunity to appear and contest the
claim of the person seeking the disclosure.
If an order is granted pursuant to subparagraph (C) or (F), the court
shall impose appropriate safeguards against unauthorized disclosure.
(3) Court orders authorizing disclosure under subparagraph (C) shall
issue only with prior notice to the consumer and only if the law
enforcement agency shows that there is probable cause to believe that the
records or other information sought are relevant to a legitimate law
enforcement inquiry. In the case of a State government authority, such a
court order shall not issue if prohibited by the law of such State. A
court issuing an order pursuant to this section, on a motion made promptly
by the video tape service provider, may quash or modify such order if the
information or records requested are unreasonably voluminous in nature or
if compliance with such order otherwise would cause an unreasonable burden
on such provider.
(c) Civil action.
(1) Any person aggrieved by any act of a person in violation of this
section may bring a civil action in a United States district court.
(2) The court may award--
(A) actual damages but not less than liquidated damages in an amount of
$ 2,500;
(B) punitive damages;
(C) reasonable attorneys' fees and other litigation costs reasonably
incurred; and
(D) such other preliminary and equitable relief as the court determines
to be appropriate.
(3) No action may be brought under this subsection unless such action
is begun within 2 years from the date of the act complained of or the date
of discovery.
(4) No liability shall result from lawful disclosure permitted by this
section.
(d) Personally identifiable information. Personally identifiable
information obtained in any manner other than as provided in this section
shall not be received in evidence in any trial, hearing, arbitration, or
other proceeding in or before any court, grand jury, department, officer,
agency, regulatory body, legislative committee, or other authority of the
United States, a State, or a political subdivision of a State.
(e) Destruction of old records. A person subject to this section shall
destroy personally identifiable information as soon as practicable, but no
later than one year from the date the information is no longer necessary
for the purpose for which it was collected and there are no pending
requests or orders for access to such information under subsection (b)(2)
or (c)(2) or pursuant to a court order.
(f) Preemption. The provisions of this section preempt only the
provisions of State or local law that require disclosure prohibited by
this section.
Sec. 2711. Definitions for chapter
As used in this chapter--
(1) the terms defined in section 2510 of this title have, respectively,
the definitions given such terms in that section; and
(2) the term "remote computing service" means the provision to the
public of computer storage or processing services by means of an
electronic communications system.
TITLE 18. CRIMES AND CRIMINAL PROCEDURE
PART II. CRIMINAL PROCEDURE
CHAPTER 206. PEN REGISTERS AND TRAP AND TRACE DEVICES
Sec. 3121. General prohibition on pen register and trap and trace device
use; exception
(a) In general. Except as provided in this section, no person may
install or use a pen register or a trap and trace device without first
obtaining a court order under section 3123 of this title or under the
Foreign Intelligence Surveillance Act of 1978 (50 U.S.C. 1801 et seq.).
(b) Exception. The prohibition of subsection (a) does not apply with
respect to the use of a pen register or a trap and trace device by a
provider of electronic or wire communication service--
(1) relating to the operation, maintenance, and testing of a wire or
electronic communication service or to the protection of the rights or
property of such provider, or to the protection of users of that service
from abuse of service or unlawful use of service; or
(2) to record the fact that a wire or electronic communication was
initiated or completed in order to protect such provider, another provider
furnishing service toward the completion of the wire communication, or a
user of that service, from fraudulent, unlawful or abusive use of service;
or
(3) where the consent of the user of that service has been obtained.
(c) Penalty. Whoever knowingly violates subsection (a) shall be fined
under this title or imprisoned not more than one year, or both.
Sec. 3122. Application for an order for a pen register or a trap and
trace device
(a) Application.
(1) An attorney for the Government may make application for an order or
an extension of an order under section 3123 of this title authorizing or
approving the installation and use of a pen register or a trap and trace
device under this chapter, in writing under oath or equivalent
affirmation, to a court of competent jurisdiction.
(2) Unless prohibited by State law, a State investigative or law
enforcement officer may make application for an order or an extension of
an order under section 3123 of this title authorizing or approving the
installation and use of a pen register or a trap and trace device under
this chapter, in writing under oath or equivalent affirmation, to a court
of competent jurisdiction of such State.
(b) Contents of application. An application under subsection (a) of
this section shall include--
(1) the identity of the attorney for the Government or the State law
enforcement or investigative officer making the application and the
identity of the law enforcement agency conducting the investigation; and
(2) a certification by the applicant that the information likely to be
obtained is relevant to an ongoing criminal investigation being conducted
by that agency.
Sec. 3123. Issuance of an order for a pen register or a trap and trace
device
(a) In general. Upon an application made under section 3122 of this
title, the court shall enter an ex parte order authorizing the
installation and use of a pen register or a trap and trace device within
the jurisdiction of the court if the court finds that the attorney for the
Government or the State law enforcement or investigative officer has
certified to the court that the information likely to be obtained by such
installation and use is relevant to an ongoing criminal investigation.
(b) Contents of order. An order issued under this section--
(1) shall specify--
(A) the identity, if known, of the person to whom is leased or in whose
name is listed the telephone line to which the pen register or trap and
trace device is to be attached;
(B) the identity, if known, of the person who is the subject of the
criminal investigation;
(C) the number and, if known, physical location of the telephone line
to which the pen register or trap and trace device is to be attached and,
in the case of a trap and trace device, the geographic limits of the trap
and trace order; and
(D) a statement of the offense to which the information likely to be
obtained by the pen register or trap and trace device relates; and
(2) shall direct, upon the request of the applicant, the furnishing of
information, facilities, and technical assistance necessary to accomplish
the installation of the pen register or trap and trace device under
section 3124 of this title.
(c) Time period and extensions.
(1) An order issued under this section shall authorize the installation
and use of a pen register or a trap and trace device for a period not to
exceed sixty days.
(2) Extensions of such an order may be granted, but only upon an
application for an order under section 3122 of this title and upon the
judicial finding required by subsection (a) of this section. The period of
extension shall be for a period not to exceed sixty days.
(d) Nondisclosure of existence of pen register or a trap and trace
device. An order authorizing or approving the installation and use of a
pen register or a trap and trace device shall direct that--
(1) the order be sealed until otherwise ordered by the court; and
(2) the person owning or leasing the line to which the pen register or
a trap and trace device is attached, or who has been ordered by the court
to provide assistance to the applicant, not disclose the existence of the
pen register or trap and trace device or the existence of the
investigation to the listed subscriber, or to any other person, unless or
until otherwise ordered by the court.
Sec. 3124. Assistance in installation and use of a pen register or a
trap and trace device
(a) Pen registers. Upon the request of an attorney for the government
or an officer of a law enforcement agency authorized to install and use a
pen register under this chapter, a provider of wire or electronic
communication service, landlord, custodian, or other person shall furnish
such investigative or law enforcement officer forthwith all information,
facilities, and technical assistance necessary to accomplish the
installation of the pen register unobtrusively and with a minimum of
interference with the services that the person so ordered by the court
accords the party with respect to whom the installation and use is to take
place, if such assistance is directed by a court order as provided in
section 3123(b)(2) of this title.
(b) Trap and trace device. Upon the request of an attorney for the
Government or an officer of a law enforcement agency authorized to receive
the results of a trap and trace device under this chapter, a provider of a
wire or electronic communication service, landlord, custodian, or other
person shall install such device forthwith on the appropriate line and
shall furnish such investigative or law enforcement officer all additional
information, facilities and technical assistance including installation
and operation of the device unobtrusively and with a minimum of
interference with the services that the person so ordered by the court
accords the party with respect to whom the installation and use is to take
place, if such installation and assistance is directed by a court order as
provided in section 3123(b)(2) of this title. Unless otherwise ordered by
the court, the results of the trap and trace device shall be furnished,
pursuant to section 3123(b) or section 3125 of this title, to the officer
of a law enforcement agency, designated in the court order, at reasonable
intervals during regular business hours for the duration of the order.
(c) Compensation. A provider of a wire or electronic communication
service, landlord, custodian, or other person who furnishes facilities or
technical assistance pursuant to this section shall be reasonably
compensated for such reasonable expenses incurred in providing such
facilities and assistance.
(d) No cause of action against a provider disclosing information under
this chapter. No cause of action shall lie in any court against any
provider of a wire or electronic communication service, its officers,
employees, agents, or other specified persons for providing information,
facilities, or assistance in accordance with the terms of a court order
under this chapter or request pursuant to section 3125 of this title.
(e) Defense. A good faith reliance on a court order under this chapter,
a request pursuant to section 3125 of this title, a legislative
authorization, or a statutory authorization is a complete defense against
any civil or criminal action brought under this chapter or any other law.
Sec. 3125. Emergency pen register and trap and trace device installation
(a) Notwithstanding any other provision of this chapter, any
investigative or law enforcement officer, specially designated by the
Attorney General, the Deputy Attorney General, the Associate Attorney
General, any Assistant Attorney General, any acting Assistant Attorney
General, or any Deputy Assistant Attorney General, or by the principal
prosecuting attorney of any State or subdivision thereof acting pursuant
to a statute of that State, who reasonably determines that--
(1) an emergency situation exists that involves--
(A) immediate danger of death or serious bodily injury to any person;
or
(B) conspiratorial activities characteristic of organized crime,
that requires the installation and use of a pen register or a trap and
trace device before an order authorizing such installation and use can,
with due diligence, be obtained, and
(2) there are grounds upon which an order could be entered under this
chapter to authorize such installation and use "may have installed and use
a pen register or trap and trace device if, within forty-eight hours after
the installation has occurred, or begins to occur, an order approving the
installation or use is issued in accordance with section 3123 of this
title."
(b) In the absence of an authorizing order, such use shall immediately
terminate when the information sought is obtained, when the application
for the order is denied or when forty-eight hours have lapsed since the
installation of the pen register or trap and trace device, whichever is
earlier.
(c) The knowing installation or use by any investigative or law
enforcement officer of a pen register or trap and trace device pursuant to
subsection (a) without application for the authorizing order within
forty-eight hours of the installation shall constitute a violation of this
chapter.
(d) A provider for a wire or electronic service, landlord, custodian,
or other person who furnished facilities or technical assistance pursuant
to this section shall be reasonably compensated for such reasonable
expenses incurred in providing such facilities and assistance.
Sec. 3126. Reports concerning pen registers and trap and trace devices
The Attorney General shall annually report to Congress on the number of
pen register orders and orders for trap and trace devices applied for by
law enforcement agencies of the Department of Justice.
Sec. 3127. Definitions for chapter
As used in this chapter--
(1) the terms "wire communication", "electronic communication", and
"electronic communication service" have the meanings set forth for such
terms in section 2510 of this title;
(2) the term "court of competent jurisdiction" means--
(A) a district court of the United States (including a magistrate of
such a court) or a United States Court of Appeals; or
(B) a court of general criminal jurisdiction of a State authorized by
the law of that State to enter orders authorizing the use of a pen
register or a trap and trace device;
(3) the term "pen register" means a device which records or decodes
electronic or other impulses which identify the numbers dialed or
otherwise transmitted on the telephone line to which such device is
attached, but such term does not include any device used by a provider or
customer of a wire or electronic communication service for billing, or
recording as an incident to billing, for communications services provided
by such provider or any device used by a provider or customer of a wire
communication service for cost accounting or other like purposes in the
ordinary course of its business;
(4) the term "trap and trace device" means a device which captures the
incoming electronic or other impulses which identify the originating
number of an instrument or device from which a wire or electronic
communication was transmitted;
(5) the term "attorney for the Government" has the meaning given such
term for the purposes of the Federal Rules of Criminal Procedure; and
(6) the term "State" means a State, the District of Columbia, Puerto
Rico, and any other possession or territory of the United States.
Subject: TAP-CJ SEC'S EDGAR ON NET, WHAT HAPPENED AND WHY
Date: 30 Nov 1993 10:36:34 -0500
from TAP-INFO Internet Distribution List
Taxpayer Assets Project
Crown Jewels Campaign
October 22, 1993
- NSF Announces Grant to Put EDGAR Online
- Decision is important victory for two year grass roots
campaign to broaden public access to EDGAR
- Department of Justice meets with data users on monday to
discuss future of JURIS program
FMI James Love (215/658-0880;
[email protected])
Mike Ward (202/387-8030;
[email protected])
Today the New York Times and Congressman Edward Markey (D-
MA) announced that the National Science Foundation would fund a
pilot project to place the Securities and Exchange Commission's
(SEC) Electronic Data Gathering, Analysis and Retrieval (EDGAR)
system online for users of the Internet. The service will be
provided by New York University's Stern School of Business and
the Internet Multicasting Service (IMS), which is run by Carl
Malamud.
The SEC's EDGAR database is the world's most important and
valuable source of information on corporate activities, and
includes the full text of a large number of company disclosure
reports on company fiances and operations. Access to the full
text of these filings will now be free for data users with access
to the Internet, including limited email access through such
services as MCIMAIL and American Online.
THE 1989 SEC CONTRACT WITH MEAD DATA CENTRAL
In 1989 the SEC entered into a contract with Mead Data
Central to manage the EDGAR database and to disseminate the
information to the public. Mead, however, has a major conflict
of interest, since it sells the EDGAR SEC filings on its high
priced LEXIS/NEXIS services, for an estimated cost of $240 to
$360 per hour (at normal searching patterns). Originally, Mead
was going to be allowed to provide a only very limited wholesale
access to the records, at costs ranging from $30,000 to $175,000
per year, for bulk dissemination of the current day's fillings.
Under the terms of the original agreement, the Government only
received a microfiche copy of the filings, while Mead kept the
electronic records in Ohio on computers owned by Mead (but paid
for under the SEC's $14 million contract with Mead). The
Information Industry Association (IIA) heralded the EDGAR
contract as a model for all federal agencies.
LIBRARY GROUPS SOUGHT ONLINE ACCESS TO EDGAR FILING IN 1989
In 1989, several library organizations expressed interest in
receiving online access to the EDGAR system through the 1,400
member federal Depository Library Program (DLP). This effort was
defeated when the SEC contractor claimed it would costs as much
as $18 million per year to provide online searching of EDGAR from
the 1,400 libraries.
TAP BEGINS CAMPAIGN FOR PUBLIC ACCESS TO EDGAR IN 1991
In April 1991 TAP provided testimony to the Joint Committee
on Printing (JCP), criticizing the Mead/SEC contract, and asked
for broader public access to the EDGAR filings. Discussions with
the SEC and Congressional staff regarding access issues were
expanded. In late 1991 and early 1992 TAP began posting messages
on the Internet about the EDGAR contract. A letter asking for
broader access to EDGAR was circulated on the Net. The
presidents of the American Economic Association, the American
Library Association and more than 200 others (economists,
journalists, businesses, librarians, public interest groups and
other data users) joined in asking for broader access to EDGAR,
in a June 17, 1992 letter to the SEC, Representative Edward
Markey and Senator Herbert Kohl. A large number of individuals,
businesses and other organizations also wrote their own letters
to Members of Congress.
Congressman Markey and Dingell responded to the June 17,
1992 letter and other inquires by asking GAO to conduct several
reviews of the EDGAR contract. GAO generally defended the Mead
contract, often with misleading or incorrect assumptions about
the limited nature of public access under the contract.
TAP wrote several articles in computer magazines,
newspapers, and academic journals about the EDGAR contract, and
continued to meet with SEC and Congressional staff. In the fall
of 1992 the American Library Association and the Taxpayer Assets
Project began a new dialog with John Lane, the SEC's new Chief
Information Officer, about public access to EDGAR.
On January 29, 1993 a meeting was held with Markey's staff
which was attended by 27 persons representing a wide range of
news media, academic, citizen group, and library researchers who
want access to the EDGAR data, including representatives form
such organizations as the Washington Post, the LA Times, USA
Today, Barons, Associated Press, the Taxpayer Assets Project, the
National Library of Money and Politics, the Information Trust,
and the American Library Association, among others.
In early 1993 TAP decided to emphasize the importance of the
EDGAR database to private information providers, who would
benefit if low cost access to EDGAR led to expanded use of their
services. A letter drafted by TAP was signed by 10 private
information companies, including America Online, and sent to
Markey on May 15, 1993. This letter asked that EDGAR data be
made available through the Internet, including low-end internet
email connections. The May 15 letter appeared to mobile Markey
into pressing the SEC for online access to the EDGAR database.
SEC CONTINUED TO OPPOSE PUBLIC ACCESS, BUT MADE SEVERAL
CONCESSIONS
SEC staff continued to oppose virtually every effort to
expand public access to EDGAR, but the public pressure from
mobilized data users was extremely effective. The following is a
list of expanded public access proposals made by TAP that were
first opposed by the SEC, but finally adopted:
- Require Mead to sell all historical filings received under
the EDGAR system
- Require Mead to sell cumulative sets of data, rather that
only "current day" filings
- Require Mead to install floppy diskettes in reading room
terminals
- Require the SEC to disseminate EDGAR filings on CD-ROM, now
expected by early next year
- Require the SEC to provide public online access to the EDGAR
database to individuals
NSF SUPPORT AND THE PRO-ACTIVE UNSOLICITED PROPOSAL BY CARL
MALAMUD'S INTERNET MULTICASTING SERVICE (IMS) WAS KEY
While the SEC refused to proceed on an online service
earlier this year, the public access movement was kept alive by
the efforts of Carl Malamud and the NSF. Mead threatened the SEC
with lawsuits and other actions if it provided retail type online
access to EDGAR. The NSF was willing to buy the data from Mead
at the commercial rates, and fund NYU and IMS to disseminate the
records on the Internet. While a number of persons were aware of
the NSF/NYU/IMS proposal, things were kept very quiet, out of a
fear that Mead would find a way to kill the project before it was
born. Mead was completely surprised by the NSF action, since
they believed they had killed off efforts for online access to
EDGAR. By early this week Mead was still in a state of denial.
WHO MADE THIS HAPPEN?
The individuals and groups that made this happen include
Congressman Markey, who fulfilled his promise to expand access to
EDGAR, Steve Wolfe and the NSF, who funded the project despite
immense opposition from Mead Data Central, Carl Malamud, who was
tenacious in his efforts to get the database online, several
White House staff members who supported the project behind the
scenes, the 10 information providers who signed the May 15 letter
to Markey, and hundreds of individuals, business and
organizations who joined the grass roots lobbying effort to
broaden public access to EDGAR. Of course, we would like to pat
ourselves on the back as well.
ACTION IS HUGE VICTORY FOR PUBLIC ACCESS
The NSF/NYU/IMS project is a huge victory for public access
proponents, not only because of the importance of EDGAR, but also
because of the precedent that it sets. If EDGAR can be put on
the Internet, any federal database can.
DECISION SETS THE STAGE FOR IMPORTANT MONDAY MEETING WITH
DOJ REGARDING JURIS
On Monday TAP and more than one dozen other groups will meet
with DOJ regarding the future of the DOJ's vast JURIS database of
federal legal information. DOJ officials have recently stated
they will kill the JURIS project by January 1, 1994, because West
Publishing is asking DOJ to erase more than a decade of federal
caselaw provided by DOJ under competitive procurement contracts.
TAP and others are asking DOJ to replace West with another
contractor, such as Tax Analysts, who are prepared to supply the
data to the Government on a non-proprietary basis, with full
public access through CD-ROMs and Online services.
jamie love
---------------------------------------------------------------------
TAP-INFO is an Internet Distribution List provided by the Taxpayer
Assets Project (TAP). TAP was founded by Ralph Nader to monitor the
management of government property, including information systems and
data, government funded R&D, spectrum allocation and other government
assets. TAP-INFO reports on TAP activities relating to federal
information policy. tap-info is archived at ftp.cpsr.org;
gopher.cpsr.org and wais.cpsr.org
Subscription requests to tap-info to
[email protected] with
the message: subscribe tap-info your name
---------------------------------------------------------------------
Taxpayer Assets Project; P.O. Box 19367, Washington, DC 20036
v. 202/387-8030; f. 202/234-5176; internet:
[email protected]
---------------------------------------------------------------------
--
Juan Antonio Osuna, Computing Research Association E-mail:
[email protected]
1875 Connecticut Ave. NW, Suite 718 Ph: (202) 234-2111
Washington, D.C. 20009 Fax: (202) 667-1066
<This is the ASCII version of a printed booklet distributed at the
American Library Association conference in July 1991. The program was
sponsored by the Library and Information Technology Association. Details
follow on ordering the full print monograph. This document has been
reformatted to fit on a standard display screen. It is available in a
single 210 kb text file (elec.rights1-4 and in four 50-60 kb chunks
(elec.rights 1,2,3, & 4)Page numbers in the table of contents have been
deleted. Steve Cisler,
[email protected]>
[In this archive, only the 1-4 version is present, as elec_rights_ala.papers.
[email protected]]
CITIZEN RIGHTS
and ACCESS to
ELECTRONIC INFORMATION
A Collection of Background Essays
Prepared for the 1991 LITA President's Program
Dennis J. Reynolds, Editor
Production costs for this information packet
were underwritten by Innovative Interfaces, Inc.
Library and Information Technology Association
Chicago, Illinois 1991
This "information packet" is being distributed only
at the 1991 ALA Annual Conference in Atlanta.
--------------------------------------------------------------
LITA plans to publish these papers plus those from the President's
Program itself in Fall 1991. This monograph will also be titled
"Citizen Rights and Access to Electronic Information" edited by Dennis
J. Reynolds.
If you wish to receive an announcement and ordering information for the
monograph, please send your name and address to:
Citizen Rights Monograph
LITA Office
50 E. Huron Street
Chicago, IL 60611
fax: 312/280-3257
--------------------------------------------------------------
Copyright by the Library and Information Technology Association,
a division of the American Library Association, 1991.
Table of Contents
Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . ii
OVERVIEW PAPER
The Bill of Rights and Beyond: Citizen Entitlement and
Information Access in an Electronic Age, by Dennis J. Reynolds
THE ISSUES
Techno-Fallacies of the Information Age, by Gary T. Marx
Freedom and Privacy in Electronic Libraries, by Steve Cisler
Electronic Intellectual Freedom, by Gordon M. Conable .
The Public's Right to Know and Electronic Government
Information, by Nancy Kranich
THE IMPACT
"Powershift" and Scholarly Communication, by Sharon J. Rogers
A Bill of Rights for an Electronic Society: A Public Library
Perspective, by Susan Harrison
Information for All People: The Role of Local and State Libraries in
Overcoming Geographical Barriers to Information, by Howard F. McGinn
Information Access and an Electronic Bill of Rights: A School
Perspective, by Stephen L. Matthews
Electronic Records and Intellectual Freedom in Schools of Library and
Information Science: A Historical Essay, by Frederick J. Stielow
LEGISLATIVE UPDATE
Electronic Privacy and Data Protection Legislation in the 102nd
Congress, by Frederick D. King
POSITION PAPERS
Principles of Public Information, National Commission on Libraries
and Information Science
Information Technology & Libraries: Federal Roles, Library and
Information Technology Association
A Short List of Really Good Readings
ACKNOWLEDGMENTS
This Packet has been made possible through the dedicated
efforts of many people. Mary Alice Ball has done a superb job in
planning the 1991 LITA President's Program by recruiting a group of
speakers with considerable stature in the world of information
technology policy and implementation. Production of this Packet was
graciously funded by Innovative Interfaces, Inc., and our thanks to
Jerry Kline and the folks at III for their support and assistance.
In preparing the Packet, there were a number of people
who I relied on for advice, feedback, and help of all different kinds.
I must first and foremost thank Jo-Ann Michalak, this year's LITA
President, for offering me the opportunity to take on this exciting
project and for supplying me with a steady stream of ideas and articles
and other documents relevant to the topic of this year's Program. LITA
Executive Director Linda Knutson was indispensible not only in working
with me through all the logistics but also in sharing ideas for the
Packet. And on more than one occasion, Carolyn Gray, Chair of the LITA
Technology and Access Committee, served as a sounding board and
invariably came up with suggestions that made the project go much more
smoothly. Also, there were several other people whose advice I sought
on one aspect or another, particularly Lois Kershner, Janet Bruman, and
Carol Henderson. Thanks also to the CAPCON staff for their patience
during the home stretch, and to Terrie and Lori for their help. A very
special thanks to Tahi and Dennell.
Most of all, I would like to express my deep gratitude
to the authors who have contributed to this Packet. Each responded
promptly and enthusiastically, and gave generously of their time. It
was an "all volunteer effort"; a labor of love, or perhaps a love of
labor, for all who contributed. There are some people in our field and
certainly many outside it who say that we should not be so generous with
our time, that we should measure the success of each of our tasks by the
amount of the check we receive as compensation. They are probably
right. But for many of us, we simply cannot resist the reward of an
interesting challenge and the opportunity to contribute something we
hope will make a difference in the way things are done and how they are
thought about. My thanks to these authors who have made a contribution
and a difference.
D.J.R.
Introduction
Last year, Carol Parkhurst put together a packet of background readings
and other material into what became known as the LITA President's
Program Packet. LITA distributed approximately 2,000 copies of the
Packet at the ALA Annual Conference. The venture was extremely
successful, and after the Conference, the contents of the Packet along
with the papers presented at the LITA President's Program were published
more formally as Library Perspectives on the NREN.
The current collection of essays, Citizen Rights and
Access to Electronic Information is the 1991 LITA President's Program
Packet. The title of this year's President's Program is A Bill of
Rights for an Electronic Society. This is a multi-faceted topic. The
speakers who are on the Program will focus on the citizen rights and
technology primarily in terms of existing and emerging
telecommunications networks. As the speakers will no doubt illustrate,
it is crucial that we no longer think of telecommunications networks as
purely technical phenomena, but also recognize their important
political, economic, and social implications.
The essays in this Packet are presented in part as
background papers in support of the focus of the presentations that will
be made at the President's Program, but they also explore additional
dimensions of the theme of interaction between citizen rights and
information technology, and the role of libraries in that relationship.
The Packet opens with a paper in which I present an overview of some of
the general issues in the interaction between citizen rights and
electronic information. Many of the issues brought out there are
treated in the specific context of libraries in subsequent essays in the
Packet. The next several papers are divided into two sections: The
Issues and The Impact. This division of focus is not, of course,
absolute, and you will find impact being discussed in some of the papers
in The Issues section and vice-versa.
The Issues section opens with a brief essay by
sociologist Gary T. Marx, who enumerates some of the common -- and, he
asserts, fallacious -- assumptions we make about technology. Steve
Cisler then addresses several privacy, data protection, and electronic
monitoring issues as they pertain both to society in general and to
libraries. Gordon M. Conable, Chair of the ALA Intellectual Freedom
Committee, then examines several of the challenges that modern
information technology presents to the library in its role as protector
and purveyor of intellectual freedom. Nancy Kranich`s paper focuses on
a dimension of access to electronic information that is vital to our
democracy: the right to be informed about our government and by our
government.
In The Impact section of the Packet, Sharon J. Rogers
examines the current tranformation of scholarly communication in terms
of trends identified by Alvin Toffler in his recent book, Powershift.
Susan Harrison then looks at several aspects of the role of the public
library in the electronic age in ensuring citizen rights of access to
information and in ensuring the right to privacy in pursuing information
needs. Howard F. McGinn examines the role of local and state libraries
in providing information particularly in light of the evolving reliance
on telecommunications networks and the types of information that can be
carried over those networks. Stephen L. Matthews looks at some of the
issues regarding opportunities for access to electronic information in
the context of preparing today's students for the challenges that will
lie ahead of them. If librarianship as a profession is going to view
technology in terms of the ethical implications of its use, it is
important that this become a part of our professional education
curriculum, and Frederick J. Stielow examines this relationship in the
last paper in The Impact section of the Packet.
The remaining four items in the Packet include a
legislative update, two position statements, and a list of suggested
further readings. In the first of these, Frederick D. King traces the
bills that have been introduced during the current session of Congress
having a bearing on privacy and related issues in a technological
environment. The two position papers are the statement on Principles of
Public Information issued last year by the National Commission on
Library and Information Science, and LITA's recent position paper on
Information Technology & Libraries: Federal Roles. The last item in the
Packet is a selected list of readings on some of the themes explored in
the papers in the Packet. As editor, I hope that the materials included
here will help introduce readers to some of the current issues related
to a very important dimension of the interaction between technology,
society, and libraries.
Dennis J. Reynolds
Washington, D.C.
"A quiet but crucial debate now under way in Congress, in corporate
boardrooms, and in universities has the potential to shape American life
in the 21st Century and beyond. The outcome may determine where you
live, how well your children are educated, who will blossom and who will
wither in a society in which national competitiveness and personal
prosperity will likely depend on access to information."
Roger Karraker, "Highways of the Mind"
Whole Earth Review, Spring, 1991.
"[in Britain]...a family living on what we euphemistically call 'the
national average' would see half their weekly income flicker away in
less than 30 minutes of current connect-time charges to a remote
database, assuming that there was ever to be one that gave them
something relevant to their needs."
Trevor Haywood, "Electronic Information: The Withering of Public Access"
New Horizons for the Information Profession
"Emerging technologies promise to provide individuals with opportunities
to increase their personal autonomy, enhance their sense of connection
to others and, in general, enable greater accomplishments and
self-fulfillment. These same technologies, however, could produce the
opposite outcomes, contributing to personal isolation, increased
dependency, and loss of privacy. How new technologies will affect
individuals will depend in part on the rules that Congress adopts to
govern access to information and the new communication technologies."
U.S. Office of Technology Assessment. Critical Connections:
Communications for the Future.
THE BILL OF RIGHTS AND BEYOND: CITIZEN ENTITLEMENT AND INFORMATION
ACCESS IN AN ELECTRONIC AGE
Dennis J. Reynolds
CAPCON Library Network
Washington, D.C.
This year marks the 200th anniversary of the ratification of the Bill o
f
Rights. Though having roots in British law, these provisions as a
collective were unique and really quite extraordinary. They delineated
not the obligations of the citizenry to the state, or the rights of the
state in the exercise of control over the individual, but the other way
around: these first ten amendments to the Constitution stipulated the
obligation of the state to the citizenry and delineated the rights of
its citizens in protection against interference from the state.
Implied and sometimes stated in our legislative
documents and judicial decisions are rights regarding the way we as
individuals and as a society create, use, and disseminate information.
For the first few decades of the new nation, the technology of moving
things from one place to another -- whether material goods or ideas and
information -- remained fairly stable. But since about the 1830s, our
history has been a stage upon which new transportation and communication
technologies have been tested, refined, and eventually incorporated into
everyday life. The railroads, the telegraph, the telephone, the
airplane, radio, television, satellites, computers -- depending on the
definitions of revolution and evolution one might care to adopt, this
list could probably go on for quite some length just detailing the truly
significant innovations over the past 150 years that have changed the
way we gather and use information and the way we communicate it with one
another.
This latest stage of this long progression has been our
entry into "the information age." Information is being created today in
a quantity that is not only unprecedented, but remarkably so. Trevor
Haywood in Britain was right, though, when he observed that the term we
like to use, "information explosion", is actually a misnomer in
describing the phenomenon we are experiencing with regard to the amount
of information entering our lives today. An explosion is a sudden,
violent eruption that then rather quickly subsides. What we call the
information explosion was not really all that sudden -- we have been
talking about it in the present tense for many years now -- and it
certainly does not look like it is going to subside quickly or
otherwise. Information proliferation has become a permanent part of our
landscape. Our challenge is not to figure out how we can keep apace
until things become stable again, but rather how we can incorporate
flexibility and adaptability as constants into our approach to handling
an ever-increasing amount of information and the speed with which it can
be disseminated.
In an essay on the electronic frontier and the
bill of rights, attorney Harvey Silvergate has pointed out that the
First Amendment in particular has been challenged by every major
technological development that has occurred in our history as a nation.
Computers and telecommunications are no exception. Some activities like
the storage of increasingly vast quantities of personal data in
government and corporate computers have been occurring now over a period
of decades, but have only recently begun to receive the amount of
attention they have probably deserved all along. Our belated
consciousness about these problems that have been longer in the making
is, at least, helping us ask to some of the right questions about
important developments of more recent vintage and even some that are
still unfolding, like the evolution of a formal National Research and
Education Network (NREN).
Many of the questions we are asking now about our
information technologies are probably not so different than those our
forebearers were asking about other things 200 years ago as they were
grappling with what would become the Bill of Rights. They are questions
having to do with defining the obligations the state has to its
citizenry with regard to protection of individual freedoms. Many of
the questions that are being asked have to do with "traditional" rights
such as freedom of expression, protection against unreasonable search
and seizure, and implied rights to privacy as they apply in an
electronic age. But in looking at these, there are further dimensions
of the questions that may be fundamentally different than the framers of
the Bill of Rights were concerned with. While these issues are of
enough concern with respect to the government's use of technology, some
of the greatest threats to our individual freedoms today reside in
companies using information technology in ways that, if used by the
government, would probably be considered gross violations of our
constitutional rights. The first ten amendments to the Constitution say
much about the protection of the citizenry against the state, but very
little about protection from incursions by social and economic
institutions outside of government -- what we now call the "private
sector". In examining not just an existing specific set of ten
amendments, but more generally a bill of rights regarding the use of
information technology, we must address protection against potential
excesses not only from our public institutions, but from our private
ones as well.
The examination of individual rights in a context of
technology is very much tied to the uses and abuses of information.
Discussions centering around our conventional freedoms of expression,
protection from search and seizure, and privacy as they apply in a
technological context are concerned not with the technology in itself,
but rather with how it is employed in the gathering, processing,
storage, distribution, and use of information. Given the heightened
degree of interest in the issues involved, we perhaps now have a unique
window of opportunity to broaden the discussion of the connection
between citizen rights and information beyond the conventional Bill of
Rights to include the right for individuals to have adequate opportunity
of access to information regardless of socioeconomic status and other
traditionally limiting factors. In writing about the need for an
"Information Bill of Rights," Richard Rowe was right in asserting that
we must examine not only issues like privacy, but also rights of access.
We live in a place and at a time where the limits within which each of
our citizens can exercise options regarding "life, liberty, and the
pursuit of happiness" will be determined in part by the limits of his or
her ability and opportunity to maneuver through the electronic mazes of
information that lie before them. And in a global economy where our
competitiveness as a nation will depend on how well large numbers of our
citizens can access and use information and the technology with which it
is now interwoven, opportunity of access must no longer be just
philosophical wishfulness, but a concrete right for our citizens.
The remainder of this paper will examine several issues
having to do with the interaction between technology, individual
freedoms, and access to electronic information. Some of these are
discussed in the context of communications networking, some relate more
to electronically stored databases of information, and still others
touch upon the convergence of the two. The common thread is that each
topic is relevant to a Bill of Rights for a society in which information
technology is becoming a large part of people's work, study, and
recreation. The topics discussed are grouped into three broad
categories: First and Fourth Amendment rights; data collection,
dissemination, and protection; and the right of access.
FIRST AND FOURTH AMENDMENT RIGHTS
The First Amendment to the Constitution is quite
explicit about protection of an individual's right to freedom of
expression, including speech, assembly, religion, and the press. The
Fourth Amendment is likewise clear about protection from unreasonable
search and seizure. The Constitution does not mention a "right of
privacy" per se, but legislation especially at state levels, and in the
courts at all levels, have established strong precedence that the First,
Second, Third, Fourth, Fifth, Ninth, and Fourteenth Amendments all have
a bearing on the issue and collectively imply a right of privacy.
There are four points about these rights that are
particularly salient to our discussion here. First, there are some
ambiguities and very interesting twists to protection of these rights
when viewed in the context specifically of electronic information.
Secondly, the guarantees are not absolute. Thirdly, various rights may
at some times be in conflict with one another. Finally, and extremely
importantly, these constitutional guarantees apply principally to
protection from government activities; they are less applicable to
private sector activities.
Electronic Communication and the First Amendment
One of the most prominent examples of ambiguity about
protection of rights with respect to information technology is the
ongoing debate about whether textual and other information transmitted
over data communications networks should be treated more like print
media or broadcast media. The answer to this question is crucial for
purposes of defining the extent to which First Amendment rights will be
protected over such networks. There traditionally have been
qualitatively different principles applied to the two, with broadcast
media like radio and television always having been held to stricter
controls than print media. And the picture may very well get cloudier
before it becomes clearer; as David Lyon has described,
As voice, text, numerical data, images, and other forms of communication
are increasingly merged, using electronic means, so previous
distinctions between print, common carrier (such as the telephone), and
broadcast models become blurred.
Given this obscuring of distinctions, it is possible
that the standard against which freedom of expression is measured in
evolving communications networks like the NREN will be something unto
its own, neither exactly those applied to print nor precisely those
applied to broadcast media or conventional communications media. In
general, however, citizen rights advocates are urging adherence to the
print model with minimal restraint on full freedom of expression.
Even with latitude, the rights and protections
guaranteed under the first ten amendments have never been absolute.
There have always been limits. With regard to First Amendment rights,
for example, the restrictions revolve primarily around national security
interests, compliance with statutory law, and preventions of unwarranted
invasion of privacy. With respect to unreasonable search and seizure,
there have been many rulings extending protection to the electronic
environment, but law enforcement has not always acted entirely prudently
in adhering to the spirit of these. Just in the past couple of years,
there have been several major incidents in which law enforcement
agencies have appeared to be overzealous. In 1989, for example, the
U.S. Secret Service confiscated microcomputer equipment of the publisher
of the online journal PHRACK for reportedly publishing a BellSouth
document outlining some of the technical details of how their 911
service worked. The next year, the Secret Service confiscated the
equipment of a developer of role-playing games in Austin, Texas,
claiming that the person had compiled and was publishing what amounted
to a "how-to" book of computer crime. Later in 1990, several online
bulletin boards were shut down by the Secret Service and more than 40
computers and 23,000 floppy disks were seized in Operation Sundevil, a
nationwide effort supposedly aimed at cracking down on credit card and
telephone access fraud. In the first of these cases, the PHRACK
editor's computers were returned; in the case in Austin, the "computer
crime handbook" turned out to be a rule book for one of the developer's
role-playing game, and after four months, his equipment was returned.
As of the Spring of 1991, indictments were reportedly in the works in
relation to Operation Sundevil, though the investigation seemed shrouded
in secrecy. In all three of these cases, an issue of great concern for
electronic rights advocates was whether due process was observed in the
confiscations, and most advocates feel it was not.
First Amendment Restrictions: The Example of Aggregate Sensitivity
Another growing concern, one with major implications, is
the perceived expansion of the umbrella of "national security" as a
justification by government authorities to restrict freedom of speech.
A particularly ominous development has been the emergence of the concept
of aggregate sensitivity, sometimes also referred to as the mosaic
theory of information. This concept is built on the premise that, when
taken in aggregate, a collection of individually unclassified and
non-sensitive documents can result in a product that is sensitive and
does constitute classified information. If the origin of the concept of
aggregate sensitivity can be traced to a single incident, it is the
famous article that appeared in the magazine The Progressive in 1979
providing instructions on how to create an atomic bomb. While an
explanation of how to build an atomic bomb is classified information and
is obviously a vital national security concern, the instructions
appearing in The Progressive had been compiled using information
appearing entirely in unclassified documents. Thus, while the
individual documents themselves did not contain classified information,
it was felt that as an aggregate they did.
In the early and mid-1980s, restriction of First
Amendment rights on grounds of aggregate sensitivity received further
attention when the Pentagon used it to justify barring several U.S.
scientists from presenting papers at international conferences in 1982
and again in 1985. Aggregate sensitivity with respect to electronic
information has received the close attention of some government security
agencies. NTIS and other scientific and technical databases have been
the primary targets of this concern. It is held that while citations
and abstracts included in a CD-ROM or online bibliographic database
might not individually be security-sensitive, the totality could reveal
trends and areas of emphases in sensitive American scientific and
technical research, especially when computers are used to assist in
carrying out techniques like trend analysis, cross-correlation of
authors and subjects, and statistical plottings of publication data.
While most would allow that matters of vital national
security are legitimate as grounds for restricting freedoms under
certain circumstances, on a specific case-by-case basis, what many First
Amendment advocates are finding alarming in the current environment is
the breadth of the government's interpretation of what might constitute
a "threat" to national security and the inclination to apply that
interpretation to such a wide variety of events, activities, and
products.
Privacy and the Freedom of Information Act
National security is one example of the intersection
where constitutional freedoms and interests of confidentiality can come
into conflict. Another interesting area where those two concepts are
sometimes at cross purposes is in the application of the federal Freedom
of Information Act (FOIA). Citizen rights advocates generally are
extremely supportive of a strong FOIA. This Act, originally passed in
1966 and strengthened in 1974, helps ensure that citizens have a right
to inspect the information that government is gathering both about its
own activities and about the activities of its citizens and the groups
they belong to. The difficulty sometimes is in drawing the line between
the right to be informed and the privacy rights of those about whom
information is subject to inspection. An excellent example of this
dilemma was a case decided by the U.S. Supreme Court in 1989 regarding
the release of FBI records. A decade before, a CBS news reporter and an
advocacy group called the Reporters Committee filed requests with the
FBI for release of criminal history records of four members of the
Medico family, suspected of having ties to organized crime but who owned
and operated a legitimate business enterprise that had been awarded
defense contracts. The FBI dawdled, eventually releasing records on
three of the Medicos -- after each had died. The disposition of the
FOIA request on the fourth Medico made its way through the courts all
the way up to the Supreme Court, which ruled that the public has no
right to see FBI criminal records.
This example and the issues it entails is a thorny one.
The Reporters Committee has voiced an unequivocal opinion that such
records should be available to the public under FOIA, especially when
those records consist as mostly a compilation of publicly available
state and local records. Privacy groups of a moderate bent might
question this; advocates of more extreme persuasion would maintain that
the wrong question was being asked in the first place: the debate should
not be focusing on whether such records maintained by the FBI should be
available, but rather whether they should exist as a compilation in a
central file in the first place.
Computer technology has presented some interesting
questions in the applicability of the FOIA to government records held in
electronic form. A strict reading of the Act would imply that
requesters are not guaranteed access to records maintained in any format
other than paper. However, case law and the published fee guidelines
applying to FOIA have established that information in other media are
accessible under FOIA. A grayer area, however, has to do with the
definition of what is considered an "existing" record versus a "new"
record in the storage of electronic data. Under FOIA guidelines, a
government agency is not required to create a new record in order to
respond to a FOIA request. Performance of any special programming to
extract computer-stored information, some agencies have argued, would by
definition constitute "creation" of a new record and therefore would not
be required under FOIA. The courts have sometimes ruled in favor of
this interpretation, but at the same time urging Congress to examine
FOIA and amend the Act to address specifically issues related to
electronic information.
Constitutional Rights and the Private Sector
The FOIA and nearly all other federal legislation
relating in any way to information access, privacy, and search and
seizure issues are concerned with the practices of governmental
agencies. By and large, they do not apply to the private sector, apart
from government contractors in some cases. There are, of course,
federal regulations prohibiting discrimination in certain areas on the
basis of race, religion, gender, or nationality. But in regard to
freedom of expression and invasion of privacy in particular, federal
legislation protecting citizens in contexts other than their
relationship to government has been slow in coming. The result is that
a very uncertain terrain exists in the relationship between individuals
and non-government organizations. Some of the consequences of this lack
of regulation will be discussed in greater detail in the following
section of this paper, as many have to do with the collection and
dissemination of personal data. There are two examples that are
appropriate here, however, since they are concerned with very basic
freedom of expression and search and seizure/privacy issues.
The first deals with freedom of speech in communications
networks, and an illustration is taken from a recent incident involving
a privately owned and operated electronic service. For several years,
Sears and IBM have been collaboratively offering Prodigy, an online
network offering home shopping, news and weather, recreational games,
conferencing capabilities, electronic mail, and a variety of other
services aimed at the home personal computer market. When initially
introduced, Prodigy was priced at a fixed monthly fee for which a
subscriber had unlimited access for any purpose. A change in this
policy was then announced, targeted specifically at the electronic mail
component of the service, which had by that time become quite heavily
used by subscribers. Under the new pricing structure, a certain number
of e-mail messages would be included in the basic monthly rate, but any
beyond that number would incur an additional per-message charge. Some
Prodigy subscribers, upset over the new policy, used the electronic
bulletin board capability of the system itself to launch a protest.
Prodigy responded by removing the messages, and even canceled the
subscriptions of some of the more vehement protestors.
The Prodigy incident is an example of how one privately
owned electronic service reacted to objections to its policies, but the
incident illustrates some of the broad implications of privately
controlled networks. In discussions of the NREN, for example, one of
the structural solutions that has been proposed is to put development
and management of the network into the hands of the private sector. As
the Prodigy case exemplifies, though, an important concern is the extent
to which the technical manager or owner of the network also acts as
policy-maker about the content of what is being sent over the network.
Electronic rights proponents generally are unfavorably disposed toward
the idea of a for-profit private company owning and operating NREN, and
in a more general sense, are adamant that even in privately owned
communications networks to which the general public is allowed to
subscribe, the content of what flows through the network must be
protected by broader principles like the First Amendment rather than
left up to the discretion of the owner.
Another concern related to lack of constitutional
applicability in the private sector focuses on personal privacy issues
and protection against unreasonable "search and seizure" in the
workplace. Methods of surveillance are being carried out in workplaces
in the private sector that our government would never legally be allowed
to get away with. Modern information technologies have made undetected
monitoring of people's actions in the workplace far easier and more
sophisticated than ever before. Positions involving use of technology
-- like data entry clerks and airline ticket reservation agents -- are
particularly vulnerable to electronic monitoring of performance. We
have all seen the warm and fuzzy TV commercial where a single airline
reservations agent books flights home in a single call for what one
assumes must be practically the entire enlisted personnel of a military
base. The agent's supervisor strolls by later in the day and asks if
the agent had answered any calls today, to which the agent
good-naturedly points out that she had only one. In reality, the
scenario in such an office could probably have just as easily shown the
supervisor going into a back room, entering a special authorization code
on a terminal, and finding out exactly how many calls the agent had
handled, the number of reservations made and the total volume of sales,
and the number of minutes and seconds that elapsed between each booking.
Much more efficient and precise, but it probably would not have made
quite as nice a TV commercial.
Electronic surveillance techniques are a seductive
possibility to employers and managers feeling pressures to increase
productivity, quality, and profits. What the relatively little evidence
that exists shows in many cases, though, is that electronic surveillance
often achieves exactly the opposite of the desired results. As Marx and
Sherizen have pointed out, employees can be ingenious in finding ways to
beat the system, and electronic monitoring can further lead to
sacrificing quantity for quality. Reservations agents, for example,
might be tempted to disconnect calls if a request is appearing to become
too time-consuming, or to withhold information in an effort to shorten
the length of a call. Electronic surveillance can also lead to a
general atmosphere of mistrust and poor morale, resulting in lower
productivity, higher turnover, and other problems that may be precisely
what the employer had hoped to avoid.
While these are crucial issues in terms of human
resources management, the aspect that concerns us most here are that
intrusive measures like these pose serious questions about certain
fundamental freedoms that individuals should have a right to expect of
their employers just as they do of their government. Some forms of
electronic monitoring in the workplace verge on what can be called
nothing short of employer espionage, unreasonable "search", and
presumption of guilt before a "crime" is even committed. Government has
historically been reluctant to interfere in employer/employee relations
until forced to do so by conflict of near-crisis proportion. To date,
the workforce most subject to surveillance tends to also be the least
politically empowered, and there simply is not much evidence that
government is ready to address this aspect of citizen rights in truly
meaningfully proportion.
DATA COLLECTION, DISSEMINATION, AND PROTECTION
Aided by computer and telecommunication technologies, an
enormous amount of data is gathered, stored, and disseminated about
Americans each year. Even by the early 1980s, it was estimated that the
federal government had 4 billion separate records about U.S. citizens --
an average of about 17 for every man, woman, and child in the country.
This was several years ago, and the number is no doubt much higher by
now. While the government is a fervent collector of data about us, its
efforts are rivaled by the private sector. Several years ago David
Burnham gave the example of a single database in California to which
more than 10,000 merchants across the U.S. had access to information
about 86 million American households. This figure corresponds closely
with the number of American households for which demographic and some
personal data was included in a more recently announced (and then
canceled) product called Lotus Marketplace: Households. Who is
collecting all this data about us and where are they getting it? What
is it being used for, and what rights do citizens have regarding its
collection, dissemination, and use?
The Who and What of Personal Data Collection
Nearly every agency of the U.S. government collects data
about individuals. It is not a grand covert operation; to the contrary,
we willingly, or at least knowingly, supply most of this data ourselves.
The Internal Revenue Service and the Bureau of the Census are two of the
larger collectors of data that Americans supply about themselves. The
Social Security Administration has very complete earnings records about
every legally employed individual in America, and even about some who
have never worked a day in their life. (We supposedly do not have a
"national identification card" in this country, yet my 22-month old
daughter already has her social security card; she received it a few
weeks after her birth for some reason that no one has explained to me.)
Those who have ever been in the military, registered with the Selective
Service, received welfare payments, or applied for an FHA loan also have
records on file with the appropriate federal agencies. Law enforcement
agencies have voluminous files containing information about those who
have committed crimes, and probably about some who haven't. No doubt
the list of government agencies -federal, state, and local -- could go
on for some length.
We as citizens also give out a great deal of information
about ourselves to a wide range of organizations and companies outside
government. From the time a child begins pre-school, our educational
system collects records not only about the student but usually about his
or her family as well; and then when the student eventually graduates
into "the real world", employers take over where the educational system
left off. When we start to earn a living, we find ourselves filling
out applications for credit cards from department stores and for
mortgage loans from banks, and as we begin to acquire appliances and
other material gadgets, we protect our investments by filling out
product warranty cards and sending them to the manufacturer. We tell
insurance companies about our medical history or our driving records or
the contents of our homes. We join organizations, we subscribe to
magazines, we contribute money to worthy causes. This is all pretty
routine stuff, activities that few people stop to ponder as to the
consequences beyond the immediate purpose for which they are supplying
the information. But in this age of the computer and advanced
communications technology, nearly every piece of data we supply to an
organization or bank or company is probably being added to a database
and transmitted from one place to another at some point in time.
One aspect of personal information gathering activities
in our society today is the transactional nature of much of the data --
the recording of a specific event at a specific place at a specific
time. With instant credit card verification services, for example, an
electronic record is established that shows exactly where a person was
at an exact moment in time. On some highways in Britain, cameras
mounted on bridges scan license plates of cars passing under and record
them along with the exact time of day. Probably the most prolific
collectors of transactional data are telephone companies. Their records
can show who we talk to, when, from where, and for how long. This has
been brought home in court proceedings and other investigations, one of
the more widely known involving President Carter's brother Billy in his
dealings with the Libyan government during the late 1970s. Among other
details, a Senate committee's report documented the time and place of
sixteen telephone calls made by Billy Carter to the Libyan embassy from
at least ten different telephones in three different states during a two
week period in 1979. The Billy Carter incident illustrates another
aspect of much of the transactional data being gathered: while the
event documented is very temporally discrete, the record itself often
becomes permanent -- it is not erased once the transaction has been
completed, but rather, becomes part of someone's growing record of
specific examples of our behavior.
Most of the types of data gathering activities described
above have what many would agree are legitimate purposes. We have
inherited from our forebearers what seems an almost instinctual mistrust
of government, so we are leery when it gathers personal data about us,
even if begrudgingly admitting that the rationale sometimes might
actually be reasonable. Much more insidious, perhaps, are data
gathering activities in the private sector. Of course it makes sense
that a bank would want a pretty detailed picture of our financial record
before lending us tens or hundreds of thousands of dollars to purchase a
home or start a business; a manufacturer asking that we establish the
date upon which we bought a particular appliance seems pretty reasonable
unless the gadget is guaranteed to work forever or not guaranteed at
all; and instant credit card verification probably has cut down on the
incidence of fraud and forfeiture resulting in losses which the credit
card companies have to recover by increasing annual fees or interest
rates to the rest of us who are conscientious, paying consumers.
Watchwords for Data Protection
While much of the data being collected, whether by
government agencies or corporations, seems to fill a reasonable need,
there are four characteristics about data gathering activities of which
we must be particularly watchful. The first is permanence. Granted, my
long distance carrier may want to keep records of my telephone calls for
a while after I have paid for them in the event of a belated complaint
on my part, and as a business it needs to keep the records for a certain
time as required by standard accounting principles and maybe even to
satisfy the requirements of certain federal agencies. But how long is
long enough?
The second watchword is relevance. It may be reasonable
for a credit card company to ask how much money I earn and how long I
have been employed in my present and maybe even in my immediate prior
position, but why do they need to know the highest educational degree I
have? For purposes of qualifying for a credit card, if I make a quarter
million dollars a year, does it really matter whether I have a PhD or
never even completed the sixth grade?
A third concern and a logical extension of the relevance
issue is the purpose for which the data collected is used. The reason
that my educational level might be useful to the credit card company is
that they might be able to sell that information to someone who is
interested in my educational level, like a magazine subscription house
or anyone else whose clientele tends to fit a certain profile. There are
almost no legal restrictions in the United States on the sale of
personal information within the private sector. In fact, the sale of
personal data for purposes other than that for which it was collected in
the first place has grown into a major industry in itself. Credit
reporting agencies are leading the way in this lucrative market. To
illustrate the magnitude with which it occurs, an author writing on this
phenomenon several years ago requested a copy of his file maintained by
one of the leading credit reporting bureaus and a list of those to whom
it had been released. The results were revealing: in the previous seven
months, information in his file had been released to him once, in
response to his current request; once to his credit union in connection
with a small loan he had applied for; and nineteen times to other
organizations and companies with which he had no relationship nor
necessarily wanted to establish one. A more recent event that brought
the sale of personal data into the limelight was the Lotus Development
Corporation's announcement of Lotus Marketplace: Households, a database
that contained a variety of information on virtually tens of millions of
American households, and which was targeted for sale on CD-ROM to mail
order and other direct marketing organizations. The Lotus product
caused quite a stir and was canceled, but it was a poignant
demonstration of how information about our income, shopping habits, and
other personal behaviors has become a very salable -- and very available
-- market commodity.
In light of the critical decisions about peoples' lives
that are made on the basis of personal information on record either with
the government or elsewhere, a fourth major area of concern is
accountability and quality control. This is particularly important with
regard to private sector uses given the current paucity of regulations
governing commercial use and distribution of personal records.
On rare occasion, the lack of quality control in a
computer environment -- or perhaps more accurately the lack of applying
common sense -- can have humorous results. In the mid-1980s, for
example, a Louisiana bank sent pre-approved credit cards to several of
the banks customers who happened at the time to be inmates at a state
prison. According to programmed selection criteria, they were
considered employed and did not show bad credit ratings, and hence were
considered good risks. Unfortunately, most reported run-arounds with
computer-stored personal information are not so harmless. One
celebrated case -- it went all the way to the U.S. Supreme Court --
involved a construction contractor who, through a clerical error by a
Dun & Bradstreet employee, had erroneously been identified as having
filed for bankruptcy. The report was distributed to several banks with
whom the contractor was negotiating for loans, and his business suffered
severe setbacks as a result. The contractor sued Dun & Bradstreet and
was awarded $350,000 in compensatory and punitive damages, but Dun &
Bradstreet appealed all the way to the Supreme Court on the basis that
credit reports are a form of free speech protected under the First
Amendment. The Information Industry Association filed testimony on
behalf of the company that credit reporting agencies should be immune
from liability for false reports unless actual malice could be proved.
The Supreme Court upheld the lower court decision in favor of the
contractor.
In the example above, the contractor at least had
discovered that an error had been made, and had the perseverance and
resources to pursue restitution. One can only wonder how many citizens
have been refused credit or worse on the basis of erroneous information
but have not had the knowledge, resources, or patience to uncover the
error and get it corrected. And the private sector is certainly not the
only place where accountability and accuracy are concerns; as the
example below will show, the government has certainly been known to be
on the initiating side of some inaccuracies as well.
As the numbers cited at the beginning of this section
demonstrate -- billions of federal records containing personal data, and
electronic records with personal information about tens of millions of
American households being maintained by the private sector -- there are
probably not very many Americans who can claim electronic anonymity.
Practices in the private sector have gone basically unchecked, resulting
in personal records being commercially exchanged so many times among so
many parties, and probably over such a patchwork of communication
networks, that once we do find out where some pieces of information
about us resides, there is little likelihood that we would be able to
determine its original source or who else has that same information.
Imagine the absolute horror, then, upon finding out that someone,
somewhere, sometime made a data entry error or read a report the wrong
way or received only partial information about a business transaction.
By the time the error is discovered, the fallacious information likely
will have already been redistributed many times over. The prospect of
such a nightmare is not the sole province of the private sector by any
means. There are virtually thousands of federal databases that contain
information about individual citizens. And in 1982, the Privacy Act of
1974 was amended to allow federal agencies to exchange personal data
with one another -- perhaps simply a legislative acknowledgment of what
was already going on anyway -- thereby opening the floodgate for the
possible widespread dissemination of erroneous information about an
individual. There is little quantitative data about the error rate of
information held by private credit bureaus, other commercial sector data
gatherers, or public sector institutions and agencies. A decade ago,
though, Kenneth Laudon, working on a study for the U.S. Office of
Technology Assessment(OTA), was asked by OTA to check a small sample of
FBI arrest warrants for accuracy. What Laudon found was that for about
11% of the sample, the warrants had already been cleared or vacated at
the local level, and in another 4% of the cases, there was no record at
all of an arrest warrant at the local agency. If the 400 records were
representative of the entire FBI warrant file, this meant that on the
day the records were pulled for the study, there were about 17,000 U.S
citizens open to false arrest by the FBI on the basis of inaccurate or
outdated information in the Bureau's database.
Regulating the Use of Personal Data
Most European countries have formal Data Protection
Commissions who are charged with the responsibility of seeing to it that
individual rights relating to the collection, dissemination, and use of
personal data are not trampled at the whim of the state or in the
interests of the marketplace. Indeed, the purview of the Commissions as
well as data protection laws throughout Europe generally apply both to
government and to private sector activities. While what seems to be a
fairly effective model for European nations would not automatically be
assured of success here, there is no question that data protection laws
in the U.S. leave much to be desired where they exist at all. Michael
Rogers Rubin provided an excellent overview of existing federal and
state legislation in an article two years ago in Library Hi Tech, and
Rein Turn provided a comprehensive and still timely overview in ARIST a
few years before.
In 1974, the U.S. Congress passed what is known as The
Privacy Act of 1974. The Act addresses certain practices and
limitations regarding use of federal databases, including those related
to income tax, social security, census, federal employment, and a
variety of other types of records. The Act has always been seen as
pretty weak. It has no provisions regarding what types of data may be
collected, or any restrictions on how it can be collected. There are
only nominal restrictions limiting use of records for purposes other
than that for which they were originally collected. There is enough
ambiguity in the provisions to make them fairly open to interpretation
by agencies, there are relatively broad exemptions, and there is not a
strong direct enforcement mechanism. What it comes down to is that the
Act does fairly unambiguously grant individuals the right to see records
that the government is keeping on them, and to correct the records if
warranted. Of course, it is up to the individual to initiate an inquiry
to find out whether or not any records are being kept, and a separate
inquiry must be filed for each database maintained by the government,
which number by now somewhere over 7,000. If a requestor does find what
he or she detects to be an error, it is up to that individual to provide
proof of the error, including shouldering any legal fees should the
person feel it necessary to get the assistance of counsel. As Rubin and
Turn both point out, there are other federal laws and internal agency
directives -- such as one adopted in 1973 by what was then Health,
Education and Welfare -- that grant more protection and privacy than
does the Privacy Act itself.
The Privacy Act of 1974 and many other federal statutes
apply only to federal databases. Its provisions regarding employee
protections are a bit broader, in that they must be adhered to by
private government contractors as well. But applicable to the private
sector as a whole, there is really a dearth of legislation addressing
data collection, use, and privacy protection. Even the Equal Credit
Opportunity Act, which prohibits creditors from inquiring as to race,
religion, gender, or national origin, does not apply to credit reporting
bureaus themselves, and these are probably the most comprehensive data
collectors and disseminators in the private sector.
Both as it applies to government and commercial
enterprise, federal legislation in the United States is just plain
inadequate when it comes to providing citizens with protection against
misuse of electronically stored or communicated information. The states
do somewhat better, but still fall short of what most citizen rights
advocates feel is needed to ensure even minimal protections. To
overcome some of the problems that have been described above, there are
three fundamental approaches that could be taken on a national level.
The first would be to take the tact that virtually any and all
gathering, distribution, and storage of personal data in electronic form
(or in any form for that matter) is a violation of basic rights of
privacy to which we are entitled. This solution may be equivalent to
simply trying to wish the problem away. Too many purposes of data
collection and use are probably too legitimate, and the practices too
entrenched, to make this a realistic option. Barring a reaction of
unforeseen magnitude, the collection and use of personal data is going
to continue to grow and to become even more tied to computerization and
communication over data networks than it is now.
Some of the greatest concerns about use of personal data
have to do with accountability, identification of the exact sources of
various pieces of information that are circulating about us, the
diffusiveness of its whereabouts both in the private sector and among
government agencies, and the lack of regulation over its dissemination.
An approach that would serve to bring under control all of these
problems would be treat personal data as a national resource and
establish one single authoritative database into which, and out of
which, all personal information gathered by anyone would be mandated to
flow. Tabs could better be kept on where data originated and then to
whom it was redistributed; correction of erroneous data could be easier
and a centralized mechanism for distributing corrected data could be put
into place; and a central authority could be empowered to benevolently
administer the database, ensure reasonable confidentiality of the
information contained therein, and protect the citizenry against misuse
of data. This solution could bring under tow much of the mayhem that
exists today, is probably technologically quite feasible and
administratively possible -- and it stands absolutely no chance of
happening, at least not in any overt manifestation. The thought of a
single, centralized, state owned and operated database of personal
information offends just about everything Americans hold sacred. It
simply runs counter to our national psyche. However much the current
environment seems to foster conditions that make personal data
vulnerable to misuse, at least it is largely disorganized and
uncoordinated misuse, the result of clerical errors and financial greed,
not political espionage.
This does not mean that the problems should be ignored,
nor left for self-regulation. The third approach we can take is to
strengthen our data protection laws. We as a nation must decide where
to draw the line between what constitutes reasonable data collection and
use by the public sector and the private sector, and where that crosses
the line into unnecessary and potentially threatening intrusion into our
lives. Congress has not yet made data protection a high priority. It
is unlikely to do so until the citizenry expresses a concern with
sufficient voice to make these issues grist for the campaign mill rather
than simply pet projects of a few concerned legislators. It is when we
see the awareness among our citizens rise that we will see the awareness
among our lawmakers rise, and when that happens, we will begin to
protect personal information as an individual freedom and a right rather
than as a state resource and a marketplace commodity.
<Continuation of The Bill of Rights and Beyond, by Dennis Reynolds>
THE RIGHT OF ACCESS
Citizen rights like freedom of expression and protection
against search and seizure are constitutionally guaranteed. The right
to know how to read those rights for oneself, however, is not. Nor does
the Constitution guarantee that the government or anyone else has to
exert effort, quantitative or qualitative, in teaching citizens about
what those rights mean or how to apply them. While public law has
something to say about access to governmentally produced information, it
is less clear about the obligation of the government to produce that
information in the first place, and while freedoms of speech and the
press by implication guarantee the right of individuals to have access
to certain information created outside government, there is nothing said
about the conditions under which that access is assured. In a year in
which the themes of literacy, democracy, and productivity will highlight
the Second White House Conference on Libraries and Information Services,
it is important that we begin to look at access to information more as a
right than a privilege. If we are to tackle the full complexities of
literacy, and to hold forth the tenet that democracy requires an
informed citizenry, and to compete more effectively in a global economy
by capitalizing on productivity, then we must be prepared to view not
just information, but access to information, as a national resource upon
which no price tag can be placed. In terms of the implications for a
society heavily dependent on technology as the conduit through which
information flows, it is important that we examine three aspects of
access to electronic information: electronic literacy, government
information, and universality of opportunity of access.
Electronic Literacy
When A Nation at Risk was published in 1983, the report
of the U.S. Commission on Excellence in Education confirmed what had
long been suspected: the educational system was in serious trouble, and
among the problems was deficiency in the basic ability to read. The
exact proportion of the American population that is illiterate depends
on definitions and on whose figures one chooses to cite, but the
dimensions are serious by anyone's count. The issue of literacy in
America is further complicated when examined in light of our increasing
reliance on electronic media from which we retrieve information and
through which we communicate it. In the process of acquiring print
literacy, the learner is relatively free to focus on the substance, i.e.
the printed page or card or whatever; the means of getting to the object
of learning is fairly straightforward with the chief requirement being
manual dexterity. With information in electronic form, however, two
different kinds of skill are required, and we thus encounter two
different types of illiteracy. The first is exemplified by the person
who can neither read nor operate the means, i.e. the technology, that is
required to retrieve or communicate the content. A second form of
electronic illiteracy -- and the emphasis here is indeed on "electronic"
-- exists among persons who know how to read the printed word, but are
untrained in the technical skills required to access and use information
in electronic form. These people may have only remedial reading skills
and minimal education, or they may be an accomplished scholar with
advanced degrees. A person with the latter qualifications is more
likely to be able to readily master the technological aspect of
electronic literacy than is an individual with the former, but at least
at the outset, they are at the same level with regard to information in
electronic form -- they are illiterate.
A third level could, arguably, be added to this typology
of electronic literacy/illiteracy, a level that might best be described
as technologically "marginally literate." To persons in this category
might apply the axiom that sometimes a little knowledge is almost worse
than none. These are the people who can read and who can use the
technology well enough to retrieve or use or communicate information,
though not necessarily very effectively. The most potentially
counter-productive aspect of this level of literacy is that sometimes
the individuals think they have a mastery of the technology, when in
fact they have only very rudimentary skills in employing it. And the
difficulty with this category, of course, is the subjectivity with which
it is defined. Complete reading illiteracy can be pretty unambiguously
identified, as can the second type of electronic literacy where an
individual knows how to read but does not know how to use the
technology. But the definition of this "minimal effectiveness" category
is far more subjective. Each of us could probably be more skillful in
the information technologies we employ; but where is the line between
effectiveness and ineffectiveness, and whose value judgment is it? We
have certain standards by which we measure print literacy and reading
levels, but to my knowledge we have no real equivalent by which to
measure levels of electronic information literacy. The irony is that,
while this minimal effectiveness category is the most difficult to
define, it may be the one most in need of recognition and attention if
we are going to truly increase the citizenry's collective productivity
and enhance individual opportunity. We can identify those among the
adult population who cannot read and those who cannot use even the most
basic information retrieval system, and we can teach them how to gain
some basic skills in each of these areas. Our schools, our libraries,
our communities increasingly have programs for accomplishing this. But
what happens once an individual attains the basic level of skill for
which the program was designed, and what happens to those whose skills
are already slightly higher than the focus of the programs? A premise
of most of our programs, whether teaching print literacy or computer
literacy, seems to be that at some point the individual is turned out to
fend for herself or himself in further enhancing their skills. It is
exactly at this juncture, though, that an individual may most need
continuing support mechanisms through formal programs and "advanced"
instruction. This is not at all to say we should abandon our emphasis
on basic literacy, both of a print and electronic variety. It is,
rather, to say that we must not stop with the provision of rudimentary
skills, but that we must continue on in organized fashion, for it is in
this transitional phase that the individual may for the first time be
able to see the light of real opportunity, and we must develop
mechanisms by which to facilitate progress toward that opportunity.
Government Information
The ongoing saga of the fate of publication and
dissemination of information by and about the federal government is
covered well by professional associations and in journals, and it will
not receive lengthy treatment here. Concerns over government
information publishing practices fall primarily into philosophical and
economic issues. On the philosophical side, information produced by the
government is seen as a precursor to an informed citizenry and therefore
a vital ingredient of democracy. From the economic perspective,
proponents of strong federal publishing requirements feel that not only
should government publish information pertaining to its activities, but
that such documents should be available at or near the actual cost of
production, based on the premise that the citizenry has already paid for
this information through taxes. Another side of the economic aspect of
government publishing is that strict marketplace principles of
salability should not drive the decision as to whether or not the
government publishes an item. There is considered to be a societal good
served in publishing information that might appeal only to limited
audiences engaged in work that is intrinsically important to society or
even small segments thereof.
The 1980s were not kind to government publishing, and
the 1990s are not starting off much better. The last decade has seen
severe cutbacks in publication budgets at a time when the amount of
information as a whole being gathered is increasing, and when changes in
technology are presenting new challenges and new opportunities for the
government information infrastructure.
Funds for federal agency publishing activities have been
dwindling in the past ten-plus years. Already by 1982, the Department
of Education was announcing that it was considering rejecting 40% of the
requests to publish findings of education laboratories that were
federally sponsored, simply because it did not have the money in its
publications budget to do so. Two years later, as part of the Deficit
Reduction Act of 1984, the publication budgets of most federal agencies
was cut by 30% for FY1986. Combined
with these cutbacks were constant pressures from the Office of
Management and Budget (OMB) throughout the 1980s to turn more and more
of the publishing of government information over to the private sector.
The debate got so heated with respect to the National Technical
Information Service (NTIS) that in 1988 Congress felt incumbent to pass
legislation stipulating that no NTIS activity could be contracted out
unless approved by statute. Nevertheless, many federal agency documents
are no longer published by the government, but rather are now published
by the private sector at substantially high prices. The Federal
Election Commission, for example, has curtailed publication of
information pertaining to campaign finances, and this information must
now be purchased from the private sector at a cost of several thousand
dollars.
Budget cuts and debate over privatization have been
further complicated by changes in the technology of government printing
and distribution. The amount of government information now being
published in print form reportedly has actually been on the decline in
recent years, while electronic publication has been on the increase. The
need for economizing, the sheer amount of data in some of the documents
prepared by agencies, and other factors have led to decisions to publish
some documents only in electronic form, with no print equivalent.
The publication of government information in electronic
form has presented some sticky territorial disputes over who should be
in charge of distributing what. The Government Printing Office (GPO)
and NTIS have been historically bound to paper and microform publishing.
The OMB has been quick to interpret any statutes bearing on the question
of publication and distribution of alternate formats in a restrictive
sense, thereby taking the responsibility out of the hands of GPO in
particular and placing it elsewhere -- including in the hands of the
private sector.
The upheaval in government publication policy and
practice, especially with respect to electronic databases, has carried
over into other programs such as The Depository Library Program. This
program was established to ensure widespread dissemination of, and
access by the citizenry to, federal publications. The program has
worked well. But as more and more government information is being
published in electronic formats, and sometimes only in an electronic
format, new challenges appear. The OMB has asserted that electronic
publications are not covered under the Federal Depository Library
program, and agencies are therefore under no obligation to see that
these are distributed to appropriate depository collections.
Fortunately, the Joint Committee on Publishing and other Congressional
committees have just as strongly felt otherwise. Even when publications
in electronic formats are made available to Depository Libraries,
however, the government is not clearly under obligation to furnish the
hardware software, and other expenses that might be necessary to access
the information electronically. The Depository Library Program has
become such a crucial vehicle for making government information to the
public that the Office of Technology Assessment's Informing the Nation
report noted the possible need for additional government funding to
address this issue.
The production and dissemination of information by the
government about its own activities is in a state of uncertainty. There
continues to be a widely-held opinion that information created,
published, and distributed by the government is a cornerstone of
democracy, and that open and free access to it is a right of the
citizenry. There are some who don't see it this way, instead viewing
government information primarily as an easily repackagable economic
commodity whose distribution should be the responsibility of the private
sector. While the objections to this line of reasoning by public
information advocates are quite often based in philosophical principles
about the relationship between the state and its citizens, there are
also some very practical concerns, as Carol Moody noted when she
suggested that "...relying on the private sector where companies are
bought, sold, and dismantled overnight, is not the way to provide the
public with critical information."
Universal Opportunity of Access
There are several aspects pertaining to the question of
equal opportunity of access to information, not just by and about the
government, but also to information that is publicly accessible through
commercial electronic services. The aspect that will be discussed here
is the socioeconomics of access to that information by the citizenry.
The issue of the socioeconomics of access to information
has most often been stated in terms of a fairly simply dichotomy of the
information rich versus the information poor. This is convenient, but
as with literacy, it is important to recognize more gradations when
viewing the problem in the context of electronic information. At one
end of the spectrum there are those for whom the cost of access to
electronic information is a factor of no particular consequence; these
are the information rich, or perhaps more appropriately labelled, the
access rich. At the other end of the spectrum are the information poor,
or access poor, who cannot afford to pay even nominal fees for access to
electronic information. We tend to associate this latter group with an
overall socioeconomic class lacking not only in financial resources but
also fitting other criteria having to do with level of formal education,
employment characteristics, etc. And this is where, in the electronic
environment, the simplicity of the dichotomy breaks down. In terms of
ability to pay, the access poor includes not just the less educated and
the ranks of unskilled labor; it can also include graduate students and
professors in academia not lucky enough to be working under a research
grant, and it can include highly educated owners of small and even
medium-sized businesses. The life options available to people fitting
these latter descriptions are a magnitude of order more open than those
available to the truly economically disadvantaged, but this middle group
should not be overlooked. Trevor Haywood pointed out that, in Britain,
access to about thirty minutes of a commercial database would cost the
equivalent of about half a week's salary of a family earning the
national average income. The proportion might be a bit less dramatic in
this country, but the general implications are not: we have a large
number of citizens who simply cannot on their own afford to tap into the
electronic information structure in America as it exists today.
The past two decades have seen ongoing debate in the
library profession about the appropriateness of charging fees to users
in order to recover part or all of the costs associated with
user-specific online searches of commercial database services. The
arguments presented by both sides in this "fee versus free" controversy
have been delivered with equal eloquence and passion. After all the
permutations on all the arguments pro and con are examined, the debate
is generally reduced to what is desired philosophically versus what is
practical economically. The debates with respect to user fees are not
quite as prominent at our conferences and in our literature as they once
were. A professional accord seems to have been reached, whereby most
librarians support the principle of not levying fees for service, but
the degree to which that principle can be implemented is recognized to
vary widely from one library to the next.
While the controversy over fees for online access in
libraries has not been at the forefront of "hot issues" within the
profession during the past few years, it is merely dormant, not
resolved. With developments like the emergence of the National
Education and Research Network, interest in the question of who gets
access, and how to fund it, is on the rise again. In the specific case
of NREN, the consensus in the library profession seems to be that the
Network and access to it should be a national resource in much the same
way that our interstate highway system is. The NREN will be as crucial
a means of "transportation" of information and ideas as the national
highway infrastructure was for the transportation of material goods.
The library profession is furthermore becoming fairly committed to the
concept of the NREN as a resource not just for scholars and research and
development firms, but for all citizens. There is also strong sentiment
in favor of federal subsidy for access and use of the NREN, in much the
same way our interstate highway systems are constructed and maintained
through public monies.
But even if the model that has the NREN serving as a
national resource with open and even subsidized access becomes the
reality, this in no way solves the question of "fee versus free" access
to electronic information -- it may, in fact, merely exacerbate it.
Communication across the telecommunications superhighway might turn out
to be free, but there remain the questions of who pays for the local
roads leading to it and for what lies at the end of the highway. The
NREN is likely to, and in fact is being designed primarily to,
facilitate communication of research and high-end computing services,
but it will no doubt also be used as a vehicle to access many of the
commercially available electronic database services that now exist,
along with a host of new services whose founding will be spawned by the
growth of the Network. Access, in the sense merely of
telecommunications, to some of the conventional online services and to
the new ones that grow up may become easier and less expensive than it
is now, but this does not mean that the information itself that resides
at the end of the road somewhere will in any sense be "free." And once
we envision this scenario, we are back to where we started in terms of
the question of who pays. Whether an individual travels across the NREN
from a home, an office, or a computer terminal in the library, this is a
vital question. And it is not one simply for libraries to grapple with
in their provision of access to information; it is one that society as a
whole must confront.
In the "fee versus free" debates of yesteryear, emotions
reached such a pitch sometimes where an author or a committee would
issue a statement to the effect that all people should have a right to
access all information, and on occasion the statements were left this
open-ended. Obviously, it is impractical and not really a good idea to
imply that people should be able to access internal memos of every
corporation in America, each others bank accounts, etc. But what was
important then, and what is still important now, is the issue of
opportunity of access to commercial databases and other electronic
information to which availability is public as long as the user follows
the rules set forth by the provider -- the most standard of which is the
ability to pay the established price. And this is where not just
library policy, but broad social policy, must come into play.
Libraries have too long tried to shoulder by themselves
the burden of subsidizing costs for access to electronic information by
those unable to afford to pay. If our literacy, our democracy, our
productivity, and our general health as a nation depends in such large
part on our ability to access and use information in the most effective
and efficient ways possible, then is it not a responsibility of society
as a whole to ensure that the citizenry has the opportunity of access to
the full range of information that is available for public consumption?
And this concept in no way denies the right of the private sector to
sell access or to make a profit. Public schools cost money to operate
and public roads cost money to build, and in the process, manufacturers
of school desks and construction contractors charge for their services
and make a profit. The antagonism between libraries and commercial
vendors that sometimes was an undercurrent in discussions about the cost
of information services has perhaps always been misplaced. Our real
focus should perhaps be on public policy surrounding the support of
access to information, rather than on whether or not someone has a right
to benefit financially from providing that information. While libraries
will have to deal with the hard decisions of providing access to often
expensive electronic information in the foreseeable future, we might
also be wise to urge our elected officials to begin making some hard
decisions about how to ensure the citizenry's right to be informed, not
just by and about the government, but with access to all publicly
available information that would help them to perform their jobs better,
be more knowledgeable and more productive, and in the process ensure a
stronger democracy and a more vital economy.
In a recent report on options for national
communications policy, the Office of Technology Assessment described
three primary models for development: communication as a market
commodity, communication as a springboard to economic growth, and
communication as social infrastructure. The latter of these, it was
noted, carries with it an emphasis on equity of access. The report also
noted that, as of 1990, the "communication as social infrastructure"
viewpoint was not very powerful within the current communication policy
community. But the report then went on to observe that proponents of
communications as a vehicle through which to accomplish societal goals
have historically grown in strength as technologies have developed, this
being the case with telegraphy, telephony, radio, and television. As we
blend the goals of the social model with efforts to enhance the position
of U.S. competitiveness in a global economy, and infuse our strong
traditional values regarding individual freedoms and rights, we have
reason to be optimistic that more sound policies regarding the use of
information technology will evolve, and that those policies will assert
our freedoms and our protections, and will perhaps even view access to
information as a right of the citzenry rather than as a privilege.
* * * * * * * *
Dennis Reynolds may be reached at 202/745-7722 (voice) or 202/797-7719
(fax) or on Bitnet at dreynol@auvm.--
TECHNO-FALLACIES OF THE INFORMATION AGE
Gary T. Marx
Department of Sociology
Massachusetts Institute of Technology
Cambridge, Massachusetts
New information technologies are breaking the boundaries
of time and space, and are bringing with them far-reaching changes in
the way information is gathered, accessed, and disseminated. While
holding much promise, it is also important to be aware of the background
assumptions that often accompany the advocacy and introduction of new
technologies. In particular, it is critical to examine the broader
cultural climate, the rationales for action, and the empirical and value
assumptions surrounding the introduction and widespread adoption of a
technology.
Academic analysts try to offer theories, concepts,
methods, and data, and also, hopefully, wisdom. A part of the wisdom
arises in being able to identify and question the web of tacit
assumptions that undergirds action. As an ethnographer, I watch and
listen. When it comes to technology, I sometimes hear things that seem
empirically, logically, or normatively wrong, much as a musician knows
that certain notes are off key: "Turn the technology loose and let the
benefits flow"..."Do away with the human interface"..."When you choose
to make a phone call, you are consenting to have your telephone number
released"..."Only the computer sees it"..."Those of us who are involved
in consumer marketing are the best agents for protecting the consumer's
privacy"..."That's never happened"..."The public interest is whatever
the public is interested in watching"..."There is no law against
this"..."The technology is neutral."
There are a number of assumptions underlying assertions
like these. If we are to use emergent technology to best serve human
needs in a democratic society, it is important we be on guard against
what can be called "tarnished silver-bullet techno-fallacies".
Following are a number of these information-age leaps in logic of which
we must be aware, and against which we must guard.
1. The fallacy of assuming that only the guilty have to
fear the development of intrusive technology (or, if you've done nothing
wrong, you have nothing to hide).
2. The fallacy of the free lunch or "painless dentistry"
in which it is assumed that information technology offers cost-free
solutions.
3. The legalistic fallacy of assuming that the only
criterion that ought to guide the use of technology is whether or not
the law permits it.
4. The fallacy of assuming that pragmatism and/or
efficiency should automatically overrule other values such as fairness,
equity, external costs imposed on third parties, and symbolic meaning.
5. The fallacy of lowest common denominator morality, in
assuming that if the competition or others push moral limits, you are
justified in doing the same.
6. The fallacy of assuming that personal information on
customers, clients, and cases possessed by an organization is a kind of
property, to be bought and sold just like office furniture or raw
materials.
7. The fallacy of assuming that because our privacy
expectations are historically determined and relative, they must
necessarily become weaker as technology becomes more powerful.
8. The fallacy of technical neutrality. (George
Orwell's response to the assertion that technology was neutral--"so is
the jungle"--is applicable here).
9. The fallacy of implied consent and free choice (For
example, some phone company officials claim that if you choose to make a
call you have consented to have your phone number released. You thus
are encouraged to protect your privacy by not using the phone. But
that's like saying if you breathe polluted air or drink contaminated
water, you consent to these).
10. The fallacy of believing that because it is possible
to successfully skate on thin ice it is acceptable to do so. We should
not have to wait for a disaster to occur before concluding that some
uses of information technology are simply too risky to be adopted.
11. The fallacy of assuming that the means will never
determine the end. There is a danger of starting with the technology
and asking what can it be used for, rather than starting with goals and
asking how can they best be achieved.
12. The fallacy of perfect containment (or, technology
will always remain the solution rather than become the problem).
13. The fallacy of assuming that if a critic questions
the means, he or she must also be against the ends.
With respect to information gathering technology, we are
now in the twilight that Justice William O. Douglas wrote about when he
argued that the protection of our basic values is not self-executing,
and that "As nightfall does not come at once, neither does oppression.
In both instances, there is a twilight when everything remains seemingly
unchanged. And it is in such twilight that we all must be most aware of
change in the air--however slight--lest we become unwitting victims of
the darkness." One could as well argue that we are in a sunrise zone
and that we must be aware of change in the air in order to insure that
we all profit from the sunshine. But for this to happen, the technology
must be bounded by increased public awareness, responsible corporate and
government behavior, and new laws and policies framed to ensure
individual freedoms and protect individual rights.
* * * * * * * *
This essay is based in part on the author's article
"Technology and Privacy" that appeared in The World and I, September,
1990 issue, pp. 523-541. Other recent publications by the author
touching these and related themes include "The Case of the Omniscient
Organization", Harvard Business Review, 90(March/April, 1990): 12-30;
Undercover: Police Surveillance in America, Berkeley: University of
California Press, 1988; and "Monitoring on the Job" (with S. Sherizen),
Technology Review, 89(November/December, 1986): 62-72.
FREEDOM AND PRIVACY IN ELECTRONIC LIBRARIES
Steve Cisler
Apple Computer Library
Cuppertino, California
When you ask people what they like about the libraries
they use, the range of answers will include praise for the staff, the
various resources, and the attractiveness of the physical facilities.
Almost everyone has a sense of place about a particular library or
libraries in general. For some, the library is a place to retreat and
relax; for others it is an important institution that binds their
community together; and for some it is an efficient center for the
dissemination of information and knowledge that meets the deadlines of
busy users.
Whether you ask a librarian or library user, most of
these concepts are tied to a physical place. However, many people are
spending an increasing amount of time working, studying, and relaxing in
the realm of electronic communications. When you begin exploring this
area (and many librarians are doing just that), it is hard to see the
edges of this virtual terrain. It includes our telephones, televisions,
radios, the networks that connect our computers, pagers, and facsimile
machines, and ATM and credit card machines. This realm has been called
Cyberspace, The Electronic Frontier, and The Homeland of the Information
Age.
The library is a part of this emerging landscape. What
are the qualities of our present libraries that will be valued in the
time when many more people will connect electronically to our services
rather than walk in to talk with a reference librarian and browse
through the books and magazines and CD's? What will set the library
apart from other institutions that successfully take root in the
electronic arena? One of the most important distinguishing
characteristics may prove to be a perception by electronic library users
that the staff is really trying to help guide them through the
intricacies of the information age. If we can project the sense of
service we now have, support for the electronic librarian will grow.
While delivery of the requested information might continue to be our
primary indication that we have succeeded, we might do well to remember
that many people do not associate human beings with satisfactory
electronic transactions. How many of us think warmly of the staff that
fills the ATM machines with money every day, or of the systems person
that tweaks the program that keeps your account straight? Librarians
will remain intermediaries, but how prominent will we be to the average
user? Another quality of what I'll call the library experience is the
trust that people place in the staff and the institution. The
importance of privacy issues and society's increasing awareness of them
will make this a very important factor to consider in operating the
electronic library.
In March 1991, I attended the First Conference on
Computers, Freedom, and Privacy in Burlingame, California. Drawn
together was a strange assembly of computer hackers, libertarians,
librarians, law enforcement officials, network administrators, computer
consultants, writers, lawyers, public policy analysts, and employees of
the National Security Agency, the Central Intelligence Agency, the FBI,
and the Secret Service. It was a time to meet, to discuss crucial
issues, and to begin face-to-face discussion in confronting a variety of
problems. Some of the discussion at the CFP Conference and in other
fora have explored social implications of technology that are likely to
reach new levels of relevance for libraries, too, as they become tied
into increasingly complex multi-purpose communications networks. Some
of the more important of these include:
1. First amendment rights;
2. The practice of gathering, using, and selling personal
information;
3. Monitoring of employees in the electronic workplace;
4. Monitoring of citizens in Cyberspace;
5. Security of personal information on networks.
FIRST AMENDMENT RIGHTS
In Freedom, Technology, and the First Amendment,
Jonathan Emord traces the history of the government's stricter
curtailment of First Amendment protection for radio, television, and
cable broadcasters when compared with the more sacrosanct print media.
>From early in the 20th Century, when the U.S. Navy sought to put the
entire wireless telegraphy industry under complete government
supervision, to Supreme Court decisions in 1940 that justified federal
controls over the broadcast media on the basis of spectrum scarcity,
these industries have not been afforded the same degree of freedom as
have print publishers.
The early regulations of the Federal Radio Commission
and the more powerful Federal Communications Commission came about
partly from broadcasters asking the government to limit the number of
licenses, and partly from legislators and government officials trying to
legislate what constituted "public interest". As Emord describes it:
The restrictions tempered the willingness of licensees to engage in
controversy, coerced them into offering certain kinds of
bureaucratically 'preferred' programming, and caused them to become
tools for the use of incumbent politicians and special interest groups
who desired to influence the nature of public debate.
Even though libraries continually face one kind of
censorship battle or another, the restrictions placed on traditional
print media--and hence on traditional library services--have not been as
tight as they have been with respect to the radio, television, and cable
industries. For libraries, what are the implications of these
disparities in the treatment of different media? Libraries will be
hooked into a national network of electronic information sources which
eventually may even include entertainment on demand provided by radio
and television broadcasting companies.
As various kinds of media are publicly accessible
through a single end-user source, it may become more difficult for
libraries to continue to enjoy as much freedom as they historically have
as handlers of print media. The libraries without walls will open up
their collections, and what we provide access to generally, to scrutiny
by even more interest groups than we have known in the past. We must be
prepared to confront the challenges of being part of a media-rich
information delivery network on which there may be more content
restrictions than we have been accustomed to. What librarians do, and
what advocacy roles we assume, may help to define the extent to which
our users continue to view us as upholders of first amendment rights.
GATHERING, USING AND SELLING PERSONAL INFORMATION
Recently, I served on a panel at a conference at
Stanford University hosted by the First Amendment Congress. Most of the
people in attendance were from Stanford or from the radio, television,
and newspaper industries. I was discussing the privacy of library
circulation records, and many in the audience had not even considered
the potential threats involved in not protecting that information.
However, in light of the case involving the disclosure of Judge Bork's
videotape rental records, most everyone there realized that personal
reading and viewing habits are tenuously protected in the age of the
computer. It was gratifying to be able to claim that librarians were
already on top of this issue and had been for some time.
At the CFP conference John Baker of Equifax, the company
that supplied Lotus with data for its direct mail product, Lotus
Marketplace, discussed attitudes toward privacy by the American people
of whom 25% can be called Privacy Fundamentalists, 58% Privacy
Pragmatists, and 17% of whom don't care about the issues. The Privacy
Fundamentalists are the ones with unlisted numbers; they use personal
name variations to track the re-use of magazine subscription
information; they don't give out their Social Security number to anyone
but the IRS and their banks. It is this group that will probably help
shape the way businesses, government agencies, and even non-profits
treat personal information gathered on individuals.
The Bureau of the Census encounters a great deal of
resistance from libertarians, minority groups, and other segments of
America who distrust parts (or all) of the federal government. Various
three-letter government agencies (IRS, FBI, CIA, NSA, DOD) have mission
statements that allow them to spend huge sums on automated systems to
store, link, and search for patterns in vast files of personal
information about Americans and people living in America. But
government agencies are not the only ones collecting large amounts of
personal information. In fact, we should probably be even more
concerned about the private sector, and especially credit firms such as
TRW and Equifax. It is commerce that will always want more information
about its customers or potential customers. And it is also in the free
market where the existence of such information becomes a prized economic
commodity in itself. A lot of the unexpected, often unwanted, mail and
telemarketing calls you receive originate in a computerized mailing list
bought from someone you sometime did business with.
Most niche market direct mail promoters will tell you
that the recipients want to get that catalog of biodegradable hiking
boots, or the announcements about the latest concerts, or that credit
card where part of the fee goes to some worthy cause. Using the
profiles of estimated income and lifestyles, merged with the
subscription lists of hi-tone periodicals, a direct mailer can target a
group with the assurance that the return rate on responses will be much
better than the average mailing list. Book and grocery chains are
offering membership cards to regular customers. In return for a few
benefits, the stores learn about buying patterns of the customers and
for the geographical area in which the store is located.
Some people, I'm sure, advocate the use of marketing
techniques for libraries like those described above, and I'm sure there
have been a number of mailing list experts who have worked with friends,
groups or movements to support the passage of some library bond measure.
In the quest for more funds and more support, there may be a strong
temptation to use some of these tools and perhaps even to change the
rules on how circulation records are used, in order to seek supporters
in the library community. Before taking advantage of such marketing
techniques, however, librarians will no doubt need to reflect on the
practical implications and on some very basic philosophical issues about
using these types of personal data for purposes other than that for
which they were originally recorded.
Librarians should also be aware of information gathered
in the library that could even potentially be collocated with other
databases through standard personal identification numbers. Many
universities, for example, use the Social Security number (SSN) as a
common number for all student activities. Unless it is a conscious
decision by the library management, the SSN should not be used for
access to the online library system or for checking out books. As a
nation we have resisted the call for a national ID card, unlike many
countries in Europe. But the use and abuse of the SSN makes it a piece
of information that can be used to link disparate databases in commerce
and in government. In a CFP conference panel, Evan Hendricks of Privacy
Times recounted some abuses by government and industry involving
secretive matching of personal information across multiple databases
through matching on SSNs by TRW and the Social Security Administration.
Investigators found that in two databases of names (150,000 names in one
list and one million in the other) about 20% of the SSNs were
inaccurate! Depending on one's perspective, this is either extremely
frightening or in some perverse way a ray of hope that, despite the
apparent simplicity of national scale surveillance, it has not yet
reached very efficient proportions. Certainly we can do better than
having to settle for either of these.
In many automated library systems, there are ways to
generate unique ID numbers. Even though it may seem that none of the
data collected by libraries about their users will ever become a source
for cross-database matching, the use of non-SSN identifiers does provide
an extra safeguard.
There is a growing controversy over the secondary use of
gathered information. Some progressive organizations have a box on
registration and membership forms allowing the individual to opt in and
allow the personal information to be re-used by the organization or to
be re-sold to worthy causes, or to anyone at all. Alan Westin, a
privacy expert and consultant for Equifax, predicts that by the year
2000 marketing databases will be consensual and that the participants
will be compensated for the use of their information. One positive step
that the library world could make is to ask the American Library
Association to add an "opt in" box on conference registration forms;
this would make it easy to prevent them from re-selling your name to
dozens of vendors and exhibitors, whose communications you may not want
in your mailbox. At the time of this writing I had to scribble a
proviso on my application not to re-sell the information they collected
from me. Whether it works, I will know by the time you have this essay.
<note from author: The American Library Association did not
take my name from the conference mailing list as I requested.
Consequently, I received over 50 pieces of unsolicited mail.
-Steve Cisler>
MONITORING OF EMPLOYEES IN THE ELECTRONIC WORKPLACE
If you have called 411, booked an airline ticket,
ordered a computer program via mail order, had a catalog keyed in by an
off-shore data conversion firm, or read a newspaper, you have come into
contact with someone who has been or is being electronically monitored
by their supervisors. The devices available to eavesdrop, to monitor,
and to blatantly mold electronic workers' performance is well developed.
Operators are timed to see how fast they get you a requested phone
number or book a flight. Data entry people have their keystrokes
counted, and some reporters have told horror stories of seeing a warning
screen pop up with the words "Your colleague in the next cube is working
faster than you."
Librarians can envision how, in their places of work,
electronic surveillance could be used to monitor the productivity and
accuracy of staff performance. At present, there seems to be fairly
little discussion of potential abuses of electronic monitoring of
employees in the library world, unless perhaps it is at a clerical
workers union gathering.
MONITORING OF CITIZENS IN CYBERSPACE
There exists a large, anarchic computer
conferencing/bulletin board system that is known as Usenet. On an
average day more than 110,000 articles, totaling over 200 Mbytes, are
submitted from 11000 different Usenet sites. Within 24 hours all the
computers on the network have received these messages. Usenet is
accessed mostly by Unix-based computers and workstations that reside in
an enormous variety of environments, including hobbyists' basements,
computer science departments, corporate MIS rooms, and government
agencies.
Many of the administrators who keep this network running
voluntarily have a deep distrust of the intentions of the government,
especially of the agencies charged with surveillance of Americans and
foreign nationals here and abroad. Some of the more paranoid believe
that powerful text processing engines are combing these messages 24
hours a day, flagging those where certain terms are used. Consequently,
a number of users like to throw electronic monkey wrenches in this
alleged monitoring by including at the bottom of each message sensitive
terms like nuclear, terrorist, Bush, Communist, Tri-Lateral Commission,
CIA, etc., in an effort to slow down the surveillance mechanism they
suspect exists. My own hunch is that it could exist but does not.
At present there is an ongoing debate about the extent
to which the FBI monitors electronic bulletin board systems. There is
evidence that the boards run by or for "phone phreaks" and "computer
crackers" receive very close attention from the law enforcement crowd.
But incidence of surveillance of more middle of the road boards is more
difficult to document. The Computer Professionals for Social
Responsibility (CPSR) have filed Freedom of Information Act requests
that the FBI has ignored. The CPSR may have to go to court to get
relevant records released, much as the library community did with the
Library Awareness Program.
The integrated online systems in libraries have the
potential to monitor the circulation records of users. Through
transaction analysis, if combined with user-specific authorization
numbers to log on, libraries could even gather personal data about
searches in online catalogs. Libraries have a good record in terms of
rejecting monitoring of library users. Just as with some of the other
concepts discussed here, the future may require more vigilance than ever
before as libraries begin to plug into multi-purpose information
networks.
SECURITY OF PERSONAL INFORMATION ON THE NETWORKS
One of the more interesting but arcane debates that is
spreading around Cyberspace is the need for encrypted information. The
general consensus among those who talk about it (and the government
generally does not) is that while encryption schemes are necessary, the
government has set limits on how powerful an encryption scheme networks
can employ. Some in government want to maintain their edge by
controlling the use of encryption programs by the public.
Librarians should be aware of these developments because
with the greater connectivity among future networks will come a greater
need for security. Libraries are generally relatively open places, in
an intellectual sense. It will take some creative tactics in the
virtual library of the future to both maintain that atmosphere, and at
the same time to protect personal information from other users, from law
enforcement investigators, and from virus outbreaks or the introduction
of hostile worm programs. Even the use of computer agents -- software
surrogates that travel around the network performing various functions
such as searching for material on a subject or sorting electronic mail
-- will demand a whole new code of ethics by librarians and network
administrators. How much will one agent be able to communicate to
another agent, if both are looking for information about a patent or a
sensitive research issue? How will the confidentiality of the
questioner be preserved? And will this processing overhead slow the
network down to unacceptable speeds?
Conclusion
This has been a rapid survey of several issues that I
have been following at conferences and through online sources. Some of
this discussion will be found in technical journals, the popular press,
and even television. The library community will have to figure where it
fits into these complex puzzles. Probably libraries will fit many
places, sometimes in opposition to some government agencies, to some
businesses, and even to some scholars. I am sure this LITA President's
Program will provide a good forum for discussing some of the issues.
An organization that is at the forefront of advocacy of
privacy rights in the electronic networking environment is the
Electronic Frontier Foundation, 155 Second Street, Cambridge, MA 02141,
(617)864-0665. The EFF has given support to another active group, the
Computer Professionals for Social Responsibility, Box 717, Palo Alto,
California 94302. Members of these groups participate in Usenet
newsgroups such as comp.risks (risks of computers, automation, and
reliance on the technology); alt.privacy (an open forum to discuss
privacy issues); eff.org.talk (discussion group for the Electronic
Frontier Foundation); comp.admin.policy (new group to discuss e-mail
privacy, user access to networks, security).
You may also contact the author electronically on The
WELL: <
[email protected]> or on the Internet <
[email protected]>. The WELL
offers access to a number of electronic discussion groups on censorship,
information policy, the Electronic Frontier Foundation, and library
issues. Phone 415-332-4335 for more information.
* * * * * * * *
ELECTRONIC INTELLECTUAL FREEDOM
Gordon M. Conable
Monroe County Library
System
Monroe, Michigan
The principles of intellectual freedom have been
codified over the last fifty years for libraries and librarians in "The
Library Bill of Rights" and its various interpretations by the American
Library Association. These principles are based upon precepts of
American constitutional law, particularly the First Amendment. The same
principles can be found in the Universal Declaration of Human Rights,
the United Nations equivalent of the U.S. Bill of Rights.
These documents spell out the right of free expression,
including freedom of religion, assembly, association, speech, the press,
and the right to petition the government. Both documents speak to the
rights of individuals and serve to limit the actions of government which
could curtail individual rights.
New technologies have profound impact on many aspects of
human endeavor, and the electronic age is altering the way humans think,
write, gather, store, and disseminate information. In the process,
opportunities and problems that were previously unanticipated rear their
heads and a temptation exists to assert that because of the
technological changes, the underlying legal principles and rights of
individuals have somehow been dramatically altered by the technologies.
Libraries have often approached new technology with the
assumption that old paradigms may no longer apply. To cite two common
examples: libraries that would never think of charging users to search
print indexes often charge users to access the same information if it
resides in an electronic database; and about a third of all public
libraries that have videotape in their circulating collections charge a
rental fee for those tapes, adopting a model common in the retail
sector. Neither of these choices is inevitable. While both appear to
be an outgrowth of the new technology, it might be more accurate to
describe them as a result of the marketing of the new technology. The
database vendors operate on the basis of different economic assumptions
than the print publishers. In the case of the print index, marketing
has always meant the sale of a physical object -- the set of printed
volumes -- which reflected a publication/production cost rather than a
per-use charge. In the electronic version, no physical object is sold.
What is marketed is access and use rather than a physical object, and
access and use can be monitored, metered, and charged accordingly.
Hence, an economic model favors user charges. Libraries, quite
naturally, have often found it both logical and easy to pass those
charges onto users. In the case of video, it first entered the
marketplace primarily as a rental item, and many libraries found it
convenient to look to the retail model when attempting to determine how
to handle tapes.
In many ways, libraries are institutions that have been
defined by the characteristics of the book. It is clear, however, that
the justification for libraries, particularly publicly supported
libraries, is based on constitutional principles rather than on the
characteristics of any medium. First Amendment principles, together
with the right to privacy, are the centerpieces from which librarians
must think about and deal with the issues surrounding electronic
information. And those principles are broad enough and flexible enough
that they should not be determined by the technology involved.
The issues that are being confronted anew in the context
of electronic media include, among others: copyright and the ownership
of intellectual property; the licensing of information or access to it;
the relationship between the original creator, the compiler, the
distributor, and the user; the question of what is public and what is
private. But these issues are fundamentally political rather than
constitutional in their nature. They are factors of private market
mechanisms as much as they are factors of constitutionally dictated
public policy. As such, they are likely to be decided legislatively and
economically before they will be treated judicially.
Herein lies much of the risk for libraries, librarians,
and advocates of the public right to know. The lobbying and economic
resources available to the "information industry" in general and its
more visible advocates are substantially greater than those which
librarians and public interest organizations are able to bring to the
table.
There is a right to free expression; there is statutory
access to at least some, and theoretically most, governmentally
generated information. There is a long-established tradition for
publicly supported libraries to serve as a means of access to that
information. There is a less clear mandate that information should be
available without charge or without cost recovery. The issue is not
whether libraries should continue to make the information available
without charge -- ALA's policy positions, at least, make clear the
profession's commitment to do so. Some library funding agencies are
less committed to fee-free service than librarians, however. In an era
in which "privatization" of governmental services has growing support
both from politicians looking for easy means of cutting governmental
expenditures and from entrepreneurs who are looking for governmental
license to profit from publicly produced information goods, the
advocates of free access -- or fee-free library access -- may well be
facing an uphill battle.
Against this background, it remains to be seen whether
information formerly made available to libraries from governmental
sources without charge will now be prohibitively priced; whether the
economic assumptions under which libraries operate will allow them to
acquire government and other information in electronic media at all or
at a cost that does not force them to abandon a non-metered approach to
service; and whether the "public good" of free library service will
survive the economics of electronics.
The issue of privacy -- protection of information about
oneself from uncontrolled dissemination -- is another concern of major
proportion. Much attention has been focussed -- and not with entirely
satisfactory resolution -- on the use of governmentally generated data
about individuals for purposes other than that for which it was
gathered. Libraries have grappled with this issue directly in dealing
with patron confidentiality and library records. Despite a general
commitment on the part of librarians to confidentiality, it is worth
noting that circulation systems are being sold by vendors at least
partly on the basis of their capabilities for record keeping which would
facilitate practices by librarians that would grossly violate patron
privacy.
Private sector efforts to combine and market electronic
data about individual consumers are receiving increased attention.
Current technology accommodates extensive, sophisticated, and
potentially intrusive collection and dissemination of such personal
data. During the first half of 1991, public attention has focussed on
such efforts as: the Lotus Development Corporation's attempt to market a
massive database of consumer information; a proposed scheme by
Blockbuster Video to market information about video rental preferences
of its customers by genre; and a company selling supermarket scanners
which compile item purchase data on all shoppers to aid advertising and
promotion schemes. Publicity about these efforts has generated
significant public backlash, forced the cancellation or at least
slowdown of the development of some of these products and services, and
may even lead to legislative attempts to limit them. The latter raises
interesting and conflicting questions about the constitutional rights of
the compilers of such data versus those about whom it is compiled.
Governmental restraint on publication of such data may, in fact,
implicate First Amendment rights to publish.
One issue for librarians implied by this has to do with
questions of making databases of this nature available to their users.
Many public libraries, for example, have agonized about the ethical
issues of making criss-cross directory information available. If the
information is available, a choice by the library to withhold it may be
a form of censorship and may compromise intellectual freedom principles.
How many libraries, however, have attempted to add credit rating
databases to their business libraries? Retailers may have on-line
access to such data; why not libraries? And supposing this and much
greater amounts of similar data were available on compact disc -- should
it be purchased and made available? If there is a right to privacy in
the Constitution, could the dissemination of certain information by a
publicly supported library involve a constitutionally implicated
invasion of privacy when private sector dissemination of the same
information might not? The questions ahead of us will be knotty and
essential.
Finally, it is worth noting that among the significant
forces confronting these issues are users who are pushing the
capabilities of electronic technology to explore just what is really
possible in this new information environment. Economic, legal, and
technological controls are only enforceable to the level that they are
practical. This is a period of rapid technological development and no
little ferment. It will take awhile to understand the issues, let alone
solve them.
Laurence H. Tribe recently addressed these issues in
detail in a paper entitled "The Constitution in Cyberspace: Law and
Liberty Beyond the Electronic Frontier," delivered as the keynote
address to the First Conference on Computers, Freedom & Privacy on March
26, 1991. Tribe concluded his remarks by proposing a Twenty-seventh
Amendment to the U.S. Constitution to read as follows:
"This Constitution's protections for the freedoms of speech,
press, petition, and assembly, and its protections against unreasonable
searches and seizures and the deprivation of life, liberty, or property
without due process of law, shall be construed as fully applicable
without regard to the technological method or medium through which
information content is generated, stored, altered, transmitted, or
controlled."
Professor Tribe's underlying construct should equally be
applied to the manner in which libraries and librarians approach the
myriad of intellectual freedom issues facing them as they develop means
of integrating these new technologies into their mission and operations.
THE PUBLIC'S RIGHT TO KNOW
AND
ELECTRONIC GOVERNMENT INFORMATION
Nancy Kranich
New York University Libraries
New York, New York
James Madison once wrote that "Knowledge will forever
govern ignorance and that people who mean to be their own governors must
arm themselves with the power that knowledge gives. A popular
government without popular information or means of acquiring it is but a
prologue to a farce or tragedy or perhaps both."
As information professionals, librarians hail the words
of James Madison and recognize the importance of his message every day.
Whether or not the nation's forefathers explicitly recognized the
importance of information to a democratic society and the public's right
to know through the Constitution and the Bill of Rights, librarians
believe in that right and make every attempt to reinforce it. But they
have also come to realize that, more and more, those rights,
particularly First Amendment rights, must be carefully protected,
defended and strengthened.
Over the past decade the public's right to information
by and about the United States government has eroded. The government
has whittled away at information access under the guise of the Paperwork
Reduction Act, national security, export controls, budget cuts,
automation and even privacy. Eliminated were one quarter of the
documents previously published, including many of the items formerly
distributed through the depository library system.
A longstanding partnership between libraries and the
federal government has assured the nation's citizens ready and equal
access to government information. Through the Depository Library
Program which was launched in the 19th century, nearly 1400 libraries
located in every Congressional district have served as host institutions
for distributing government information. In return for receiving nearly
20 million free copies of some 40,000 government publications annually,
depository libraries house, organize and assist with no-fee use of the
government's information resources. At least 167,000 citizens make use
of these depositories each week.
More than 7,500 electronic databases are disseminated
each year by civilian agencies of the federal government. As agencies
make increasing use of electronic formats, the public can benefit if
government databases are disseminated through libraries, particularly
depository libraries. A project to test the feasibility of depository
library distribution of five electronic databases on such topics as the
environment, energy, census, trade, and economics was launched in late
1988. While depositories are the likely loci for this essential
information, a forthcoming evaluation of the project should shed more
light on the actual benefits of this mode of dissemination.
Access to electronic government information should
promise all that came with print products and more, and will present
new opportunities along with new challenges. No one recognizes these
challenges better than librarians. Public access is fragile, diminished
by any one of many factors that prevent the utilization of important
information. At the very least in this age of electronic databases and
networks, government information must be:
� developed in consultation with the general public to
determine the most appropriate informationand format for dissemination;
� published regularly, on a continuous basis;
� standardized so that coordination efforts can be
facilitated government-wide, encouragingcompatibility, lowering overall
costs, and reducing user confusion;
� protected from censorship, with integrity,
reliability, accuracy, and validity ensured;
� cumulated, archived and preserved by agencies charged
with the long-term retention of records.
Beyond these basic production and maintenance requirements are
additional principles that should underlie the distribution of
government information. Chief among these are that government
information must be:
� disseminated in whatever format is most appropriate, most cost
effective, most timely, and mostuseful for government agencies,
libraries, and the general public;
� distributed widely through broad-based government
sales programs and no-fee access throughdepository libraries located in
every Congressional district;
� priced for sale at no more than the marginal cost of
dissemination;
� redistributed without limitation, as long as equal,
ready and equitable access is guaranteed;
� accessible even if market potential is very limited.
While users may be few, importance is oftenconsiderable.
And finally, if the public is to utilize this
valuable data effectively, government information must be:
� enhanced by the availability of menus, indexes, and
documentation so that users can retrieve,process and comprehend
essential government information products and services;
� controlled bibliographically through centralized
national databases and networks. If citizens areto use information in
electronic format, they must be able to identify it through
widelydisseminated, standardized, comprehensive, up-to-date
bibliographic tools;
� safeguarded so that privacy rights of individuals
requesting, using, or listed ingovernment records are guaranteed;
� interpreted and/or explained for users on request by
expert agency personnel and/or otherwell-informed specialists;
� protected by no copyright restrictions so that
materials can remain in the public domainand available for repackaging
by a diversity of sources.
Government information is of inestimable value to the American
public. Assuring the public's right to this information requires a
democratic caretaker no smaller than the government itself. No other
entity can assume the primary responsibility for collecting, organizing,
and disseminating the public's information assets, nor guarantee the
public's equal rights to use and repackage it. The marketplace is
simply too erratic and whimsical to fulfill this obligation. Without
the government playing a primary role, the gap between information haves
and have nots will only widen. To preserve a just and democratic
society in an information age, the government must affirm its obligation
to ensure the flow of information, regardless of format, to the public.
Neither national security, budget constraints, automation, political
expediency, or reduction of paperwork burden are an excuse for the
government to abrogate its responsibility to inform the citizens of its
activities. An open government is essential and vital to a democracy.
Librarians and libraries have a unique role to play in
assuring equal and ready public access to government information. They
are in almost every community. Most are non-profit. They have a wide
array of supporting materials in all kinds of formats. As
professionals, librarians are trained to utilize this information and
are equipped to provide access to a variety of formats. All of these
factors position libraries and librarians favorably. But unless
librarians make the right to know happen by actively advocating the
rights of users, it simply will never be a reality.
No other group has such a broad understanding of and
commitment to public access as librarians. Without the vigilance and
leadership of librarians working together with other organizations
interested in promoting the public's right to know, access to government
information will deteriorate even further. At risk is far more than a
record of the government's activities and an enlightened electorate. At
risk is the very survival of the democratic system that safeguards our
cherished freedoms and rights, so carefully protected by James Madison
and others who drafted the Constitution and the Bill of Rights.
* * * * * * * *
"POWERSHIFT" AND SCHOLARLY COMMUNICATION
Sharon J. Rogers
George Washington University
Washington, D.C.
Since computers and electronic databases were first
introduced into libraries more than a quarter century ago, questions
about who should have access and how that access should be financed have
been debated extensively. As we enter an era in which more and more
individuals will work and communicate electronically, we must continue
to revisit these questions and to focus on additional issues pertaining
to intellectual property, privacy, and freedom of expression in the
electronic environment. In order to examine issues like these as they
apply specifically to the conduct of scholarly research in the 1990s, it
will be important to appreciate the rapidly changing context in which
that work is being carried out and disseminated. This paper examines
some of the characteristics of that changing context.
In Powershift, Alvin Toffler gallops through the barrage
of daily information to emerge with a model of power that, he argues, is
transforming the very nature of power. For librarians and academics,
scholarly communication is the arena for our experience of "powershift."
Scholarly communication patterns are beginning to
display a rich array of print and electronic experimentation. We are
beginning to decipher the forces and patterns that are shaping a
transformational breakup of the world of scholarly communication as we
have known it. Best of all, we can imagine the shape of new sets of
relationships that will characterize the scholarly communication world
of the 21st century. One version of "How Scholarly Communication Should
Work in the 21st Century," posits a centralized, non-profit network on
which scholars would "publish" articles:
Scholars in all disciplines could "publish"
their articles on the Scholarly Communication System, an electronic
network on which they could also read other publications. As a scholar
completed an article or paper, it would be sent electronically to the
system, where it would be assigned a category and cross-referenced to
other relevant categories. Given the increasingly interdisciplinary
nature of much scholarly work, the capacity to alert readers in one
subject area to articles published in other areas could help build
important links among disciplines.
The National Research and Education Network (NREN) can
be expected to create a technological infrastructure that will allow the
realization of this vision by harnessing high-performance computers and
high speed, high capacity networks. The technology of advanced
networking is visible and available. Even in areas such as graphics
storage and transmission, where only candidate solutions are available,
few observers predict that these difficulties will remain as barriers to
eventual implementation and success. NREN is the event around which the
forces and patterns of scholarly communication are coalescing as
powershifts become apparent. The remainder of this essay will explore
some of these powershifts.
A marketplace powershift for the primary consumers of
scholarly communication is shaped by the scholars themselves. Scholars'
behaviors, seeking articles--not the journals they are packaged
in--demonstrate that the journal as the vehicle for scholarly
communication is becoming obsolete. Scholars' behaviors again--from the
cold fusion debacle to recent efforts to convey breakthrough medical
information to the active exchange, even archiving of preprints--confirm
that the speed of scholarly communication requirements surpasses the
current capabilities of the print system. The marketplace powershift is
also evident as the "just in time" document delivery becomes an expected
service in academia, encouraged by research libraries defeated by
repeated annual dramatic serial price increases.
A second powershift relating to scholarly communication
is philosophical: In Harlan Cleveland's terms, "How Can `Intellectual
Property` be `Protected`?. . . it's the wrong verb about the wrong
noun." The struggle to apply current copyright law to new electronic
technologies--and the failures that result--illustrate the validity of
Cleveland's concerns. How can the concept of "fair use" be applied to
new technologies? How does one incorporate information in electronic
formats into the system of interlibrary loan that has sustained
generations of scholars?
The U.S. Congress' Office of Technology Assessment has
boldly answered these questions by recommending that Congress start from
scratch in redefining intellectual property issues. Many visions of the
future electronic publishing world suggest that "pay for use" is the
only viable alternative in the new environment of digital technologies
where there are active incentives for copying. Even the concept of
"authorship", a mainstay of copyright law, disappears in a "dynamic
digital medium."
An institutional powershift for publishers is a third
consideration. The publishers' traditional gate-keeping function is
bypassed as electronic bulletin boards and other unedited forms of
electronic communication burgeon. Rising prices which put books and
journals beyond the capacity of research institutions to own are
creating challenges to the conventional practice of asking authors of
scholarly articles to give up ownership of copyright. The copyright
assignment process effectively conveys work created, often at public
expense, into private hands. Many publishers use electronic techniques
to create printed products but have proved extremely cautious in making
the electronic version an end-product.
The Coalition for Networked Information (CNI) has
working groups actively engaged in creating opportunities for scholarly
publishing on NREN. Anne Okerson, Association of Research Libraries,
suggests five strategies for moving toward a different publishing
environment:
* Formulate a statement of principles, including a
commitment to availability, affordability, directories, and friendly
access.
* Take an active role in deliberations about
privatization and commercialization of the network.
* Formulate guidelines on intellectual property
and economic issues.
* Develop ownership and copyright policies.
* Review academic incentives to give needed
recognition to electronic publication.
An organizational powershift is taking place for
librarians as the applications of technology to scholarly communication
change the roles that they play. For example, Richard E. Lucier adds a
role to the librarian repertoire, calling it "knowledge management."
"Knowledge management is a mutual responsibility for scientific and
scholarly communication, a responsibility shared by scholars,
scientists, and research librarians." Librarians as knowledge managers
begin their work with scientists and scholars in the initial point of
creation and follow this through with them to the application stage,
thereby entering the scholarly communication process much earlier than
the more conventional "dissemination and use" stage. From work at Johns
Hopkins also comes the concept of a "collaboratory . . . a combination
of technology, tools and infrastructure that allows scientists to work
with remote facilities and with each other as if they were co-located
and effectively interfaced." The prototype work at Johns Hopkins in
human genetics and internal medicine has produced new information
products, dynamic in the literal sense of growing daily through the
collaborative work of all participants in the scholarly communication
process.
In summary, there is right now a great deal of shifting
and reorganizing occurring in the world of scholarly communication.
There will be challenges ahead in the form of intellectual property
issues, in identifying how we enhance interaction between librarians and
scholars, in grappling with questions about equity of access to the
processes and systems that define scholarly research and exchange, and
in ensuring protection of basic individual freedoms and rights in a
networked environment. The transformation has begun, and it is likely
that in dealing with such issues over the next several years, we will
have to accept the challenge of aiming at a moving target.
* * * * * * * *
A BILL OF RIGHTS FOR AN ELECTRONIC SOCIETY:
A PUBLIC LIBRARY PERSPECTIVE
Susan Harrison
The New York Public Library
New York, New York
When John Jacob Astor bequeathed $400,000 to the City of
New York in 1839, his intention was to create a "Public Library for
general use, free of expense to persons resorting thereto."1 Only
$75,000 of the bequest was to be used for a building and the remaining
$325,000 was to be spent on books. This was a remarkable development in
the history of libraries and strengthened the concept of the public
library as a place where individuals could obtain free access to books
and, by extension, to information. University libraries were well
established in New York, as were private subscription libraries operated
by professional and mercantile groups. Ordinary people who were not
associated with a learned or professional organization, however, had
limited access to information that would help them with their trades,
with basic education, and with opportunities for self improvement.
Public libraries such as the Astor Library and other similarly endowed
and publicly funded libraries became a major source of information for
new immigrants who learned English, for mercantile and industrial
workers who used library resources to learn trades, for writers and
independent scholars, and for millions of Americans who gained basic
literacy skills and who acquired new knowledge after hours by studying
in public reading rooms. Public libraries were and continue to be an
important source of information on political and social issues and a
means to assure an informed voting public.
The Astor Library, with its 80,000 volumes, provided
information that no individual could afford to collect. Today, the role
of public libraries has been extended to include assistance with
computer literacy and to provide information regardless of the medium in
which it is presented. Libraries provide information in a variety of
optical, micrographic, and video formats, in addition to data acquired
from online data bases and electronic networks. Many public libraries
have also developed their own data bases of community services,
government officials, local history, and local indexes, to supplement
information from commercial sources. The explosion of information and
the profusion of expensive formats, expensive reading devices, and
costly telecommunications services are as difficult today for
individuals to provide for themselves as books were to library users of
the 19th century. The cost and number of modern information services
also tax the ability of libraries to fulfill their mandate to provide a
broad spectrum of information to their public. Information to be
collected includes not only published works, but unpublished papers,
data files, research in progress, and online indexes, all in vast
quantities and from myriad sources. An increasing quantity of
information will be derived exclusively from online data bases and
networked sources, and public libraries must be aggressive in their
efforts to offer these resources to their users.
In an environment where there will be increasing
dependence on electronic data and increasing diversification of the
sources of data, public libraries are wrestling with issues that will
determine their role in a society where information assumes still
greater importance and where a growing number of private sector
organizations threaten to usurp the public library's place as an
information provider. Some key issues facing public libraries in the
1990s and into the 21st century are discussed below.
FREEDOM OF ACCESS TO INFORMATION BY ALL POPULATIONS
In Powershift,2 Alvin Toffler predicts an age where
there is universal access by the population to computers, information
technology, and advanced media. The new environment will have a
sophisticated telecommunications infrastructure which will become as
familiar to people as our present highway and railroad systems. Toffler
foresees a new generation where access to information will play an
increasing part in people's acquisition of power, income, and success.
Elements of the network he describes are in place today and they are now
used by limited numbers of people who have access to appropriate
equipment and networks through academic institutions, government
agencies, and other employers.
In a study conducted in 1990 by Louis Harris and
Associates, Using the Public Library in the Computer Age,3 the
surveyors found that public use of library reference materials had
increased 26% over a previous study in 1978 and that people of diverse
ages, income levels, education, and ethnic backgrounds have an awareness
of current technology and its critical role in meeting their information
needs. Two thirds of the people surveyed indicated they would be
interested in using home computers to access their public libraries in
order to locate information. The study concludes that the public
library is in a critical position to empower users in the information
age and that libraries are best able to assure access to information
expressing all viewpoints by the broadest spectrum of users.
Access to information has also traditionally been
defined for users of public libraries in terms of the distribution of
facilities geographically along with hours of operation. Until now,
readers were required to visit the library site or, at best, telephone
the facility when information was needed. As systems and networks are
introduced, many have been offered as dial-in services for users who
have PCs and modems, thus extending hours of service and overall access
beyond the traditional patterns. Some forecasters see the evolution of
automated library outlets, like automatic teller machines, which will be
capable of dispensing on-demand books, media, printouts, and data on
terminal screens.
Public libraries must play an important role in this
environment by providing free access to data for all populations and by
working aggressively to assure that this access is protected. Libraries
will be under increasing financial pressure to provide a daunting array
of information service from a diminished economic base. Since only a
few traditional services and print sources will be replaced immediately
by the new technology, it will be the challenge of public libraries to
develop cost-effective means to access and deliver information and to
develop new sources of funding to carry on this critical work.
VALUE-ADDED SERVICES AND INTERFACES
In providing access to electronic data and networked
systems, public libraries must work to make these resources reasonably
easy to use. Dewey Decimal and Library of Congress classifications and
the descriptive arrangement of catalog cards and printed indexes
represent the best efforts of generations of librarians to make
quantities of information accessible in a logical and consistent manner.
It is the role of libraries and librarians, in cooperation with systems
vendors, to see that their electronic systems and services offer
consistent, natural, and straightforward search strategies and, through
the development of telecommunications standards and adoption of standard
user interfaces, to assure that instructions and terminal displays are
clear and easy to use. This is particularly important in the current
network environment where users of the INTERNET can search hundreds of
data bases in far flung research installations and academic institutions
through hundreds of telecommunications services. Searching conventions,
workstation commands, and data arrangement characteristics of these
databases vary widely from one to another, making general access
difficult for all but the most experienced searcher. This wealth of
information will be lost to the general users served by public libraries
without professional mediation or improved standard user interfaces.
COMPUTER LITERACY TRAINING
Among the diverse populations served, public libraries
are currently assisting the poorest of the "information poor" who lack
basic literacy skills, with tutoring, classes, and specially designed
reading materials. It is estimated that there are 23 million people in
the U.S. who read below the 5th grade level and 24 million families are
classified as living below the poverty level who can also be helped by
public libraries.
Although some electronic systems and networks are
designed so as not to require extensive technical training for general
use, people will need to acquire some computer literacy and a
familiarity with computer workstations. Education and support for use
of online information systems and networks is appropriately offered in
public libraries for those who have not acquired these skills elsewhere.
In the short term, librarians will need to assist users with equipment,
formulation of searches, and overall strategy to a variety of disparate
sources. Libraries must also develop programs to assist users who
receive too much information, who are overwhelmed with a wealth of data.
Part of library training involves tailoring searches and distilling
large amounts of data into usable relevant portions.
PRIVACY OF PATRON RECORDS
In the course of developing automated systems to improve
internal operations and online catalog workstation features, libraries
have amassed data bases which include detailed personal information
about the borrowing habits of large segments of their populations.
Circulation files include patron addresses, statistical information,
some of which may be personal; usage statistics; and data on current
reading. Some public access catalogs also permit users to build and
store, for a time, personal bibliographies or reading histories. Most
states now have legislation protecting the privacy of library users
while retaining the right of libraries to maintain necessary circulation
files for the recovery of borrowed materials.
It is essential that libraries appreciate their mandate
to protect the privacy of their patrons. This can be achieved by
collecting minimal patron data and more importantly, by purging all
borrowing history when materials have been returned. Staff must be
warned that they are not to give out borrower information without a
subpoena and libraries should exercise discretion in their production of
overdue reminders and other patron notifications so that personal and
delinquency information is not visible on data mailers or postcards.
Recent experience with the FBI "Library Awareness" program should remind
libraries that government and police agencies continue to be interested
in people's reading habits and that is the role of public libraries to
protect users from unwarranted snooping.
These are some of the issues relating to the challenges
that lie ahead for public libraries in an electronic age, where
information is a valuable resource for personal and public advancement.
In a highly automated information-dependent society where universal
access to computers and telecommunications networks is envisioned,
public libraries, in the tradition of their 19th-century roots, must
continue to play an important role in supplying information needs of
citizens. Public libraries are the appropriate agency to preserve
access to information by all users regardless of their financial
resources. Public libraries will need to incorporate increasingly
sophisticated electronic means to deliver the broadest array of
information, they must participate in efforts to improve user
interfaces, and they must also protect the privacy of users whose
reading and borrower patterns are so easily monitored and analyzed
electronically. Public libraries need to be part of planning for
systems and telecommunications initiatives like National Research and
Education Network (NREN), and to position themselves as a critical
element in a more highly automated information age.
* * * * * * * *
1. Dain, Phyllis. The New York Public Library: A History of Its Founding
and Early Years. New York: The NewYork Public Library, Astor, Lenox and
Tilden Foundations, 1972, (ISBN 0-87104-136-6), p. 4.
2. Toffler, Alvin. Powershift: Knowledge, Wealth, and Violence at the
Edge of the 21st Century. NewYork: Bantam, 1990, (ISBN: 0-553-05776-6).
3. Westin, Alan F. and Anne L. Finger. Using the Public Library in the
Computer Age: Present Patterns,Future Possibilities, A National Public
Opinion Survey Report by the Reference Point Foundation,in Cooperation
with the American Library Association. Chicago: American Library
Association, 1991.
INFORMATION FOR ALL PEOPLE: THE ROLE OF LOCAL AND STATELIBRARIES IN
OVERCOMING GEOGRAPHICAL BARRIERS TO INFORMATION
Howard F. McGinn
North Carolina State Library
Raleigh, North Carolina
Remote, unknown, unexplored lands protected by natural
barriers have intrigued humankind since the initial emergence of homo
sapiens from the primeval ooze. From the wanderings of prehistoric
tribes in search of food, arable land, safety, and rich pastures, to the
wanderings of the Spanish conquistadors in search of gold, the fountain
of youth and converts for their earthly kingdom of God, to Lewis and
Clark, human beings have endured extreme hardship, suffering, and death
in their quests for survival, material riches, fame, and spiritual
enlightenment. They have traversed high mountain ranges, enormous
rivers, and thousands of miles of ocean to reach "promised lands."
The wandering continues unabated in the modern age.
While some people have climbed the mountains, bridged the major rivers,
and completed the tunnel beneath the English Channel, others continue to
explore the near space of outer space around the earth. Hollywood has
contrived to cast a romantic glow on remoteness. Gene Kelly danced his
way through the Scottish mists to happiness in Brigadoon. Ronald
Coleman found eternal youth in Shangri-La. Richard Dreyfuss is
somewhere in the universe after his Close Encounter of the Third Kind.
But while escapism and adventure have been lures to an
existence in remote areas, the most dominating reason for the conquest
of geographic barriers has been economic. The ultimate prize sought by
the early explorers of the Americas was gold and furs, not souls. The
primary goals sought by Lewis and Clarke were the expansion of the
United States and an audit of the lands of the newly acquired Louisiana
Purchase. The hoped for result of the tunnel beneath the English
Channel is increased trade between Great Britain and the other nations
of the European Economic Community. But perhaps the most radical yet
far reaching manifestation of this search for the unknown combined the
concepts of economic wealth with the creation of a new world order.
This philosophy rested in the writings of the 18th Century French
philosopher Claude Henri de Rouvroy, the Compte de Saint Simon. "It was
he who wrote 'From each according to his ability, to each according to
his work.'" And as David McCullough writes in The Path Between The Seas:
The Creation of the Panama Canal, 1870 - 1914: "Mainly the good society
was to be attained through ennobling, regenerative, work. The world was
to be saved -- from poverty, from war -- through the immense public
improvements, networks of highways, railroads, and two great ship canals
through the Isthmus of Suez and the Isthmus of Panama." The highways
were built, the railroads crossed the continents, the canals mated the
seas. In their wake came immense power and wealth for a few and extreme
poverty for many. In their construction came mass exploitation of
native-born and immigrant peoples and the creation of fortunes that
would become the cornerstone of American philanthropy. In their
completion came the last years of the dominance of the British Empire
and its eventual replacement by America. And in the end of this era
came the small towns in the prairies that built the railroads and helped
create middle class America, and the coal mining towns of Appalachia
that fueled the machines of these colossal projects and helped create a
permanent "third world" America.
Here is where the irony begins, in these prairie towns
that are now nearing extinction, in these coal towns that are locked in
permanent poverty. The railroads, canals, and highways their citizens
built in order to overcome geographic barriers so that products might be
delivered from remote areas to urban market
places have declined, victims of obsolescence, neglect, and the advance
of technology. Yet the towns and their people have the potential for a
future not overwhelmed by poverty because of the emergence of a global
economy based on the rapid transfer of electronic information over data
telecommunications systems that transcend all physical barriers so
effortlessly that geographical barriers have become meaningless. And
the key outlet in both remote and urban areas for the distribution of
these electronic raw materials and products is another ancient
institution that is flirting with irrelevancy, the library. What role
can the public library, or for that matter, any library play in this new
economy? What is the role of state government, especially the state
library agency, in assuring that equal access to information is made
available to all private and corporate citizens in all geographic areas
of a state, especially states with significant geographical barriers?
Let me suggest answers to these questions. I'll begin with the role of
the local library.
LOCAL LIBRARIES: THE INFORMATION PUBLIC UTILITY
Many libraries and their directors feel that they are
immune to change, that they can defy the Darwinian evolutionary process
by closing their eyes tightly, increasing the warm fuzzy feeling that
they believe their communities expect of the library, and hoping the
world will just go away and leave them alone. Funding, of course,
should stay, increase and multiply. This resistance to change by these
librarians is usually based on a personal reluctance or inability to
compete aggressively in the global, information-based economy and in the
belief in the mystique of the book, a mystique that postulates that all
knowledge that is important is recorded on paper. They are missing a
future that offers unlimited power and influence to the librarian and
the institution of the library because they refuse or are unable to
grasp the fact that the library, by controlling access to information,
can become the community's "information public utility", the source of
the raw electronic information that the community will need in order for
its businesses and citizens to operate and prosper in the new economy.
The role of the local library as the community's
information public utility is possible because any size library, in any
geographical area of a state can become the information power source for
a town. The experience of the State Library of North Carolina's North
Carolina Information Network is that rural libraries, in particular, can
significantly enhance their image and the investment their communities
make in the information assets of the library by becoming the purveyors
of the vital electronic information the town requires to function and
compete. These libraries continue to circulate books, develop programs
for children and young adults, and do all of the things that have come
to be regarded as traditional. What they have also done is evolve into
an essential component of the community's economic development program
by helping people and companies make money and create jobs through the
delivery of electronic information. They have become relevant once
again.
STATE LIBRARY AGENCIES: THE CATALYST FOR CHANGE
In order for this metamorphosis to take place in the
local library, the aggressive cooperation of the state library is
essential. In most states only the state library has the positional or
political placement in government to develop services that will serve
all areas of the state. A borrowed phrase from John Le Carre defines
the role of the state library very poetically: the state library must
become "the cool-headed broker between the necessity and the far
vision." In order to develop the information networks needed by
communities in all parts of the state, three roles are most important
for the state library to play: coordinator, product developer, enforcer.
Coordinator
The role of coordinator is crucial because contractual
arrangements with commercial information vendors and federal, state and
local government agencies are needed to serve vast geographic areas.
The key element in creating universal service is access to an
up-to-date, high speed data telecommunications network that reaches all
areas of the state. As the National Research and Education Network
(NREN) develops, this access will become even more crucial since the
state level network will probably function as the local network
component of the NREN. The data telecommunications networks in the
states are most often operated by a state telecommunications agency or
by the state's public university system. Some states may even have more
than one system. The state library, in its role as coordinator, must
make contractual agreements with the operators of these networks if the
entire state is to be served. In North Carolina, for example, the State
Library signed an interagency agreement with the University of North
Carolina Educational Computing Service to provide access to the
University's X.25 packet network to public and private academic
libraries across a state that includes barrier islands in the Gulf
Stream and the highest mountains east of the Mississippi River. The
University had already constructed a packet network that had established
nodes in each of its sixteen campuses, each of the state's fifty-eight
community colleges, the State Library, regional health science
libraries, and several private academic institutions such as Duke
University and Davidson College. The State Library has provided the
funding to install the equipment at thirty of these nodes that permits a
local library to dial a local telephone number to access the
University's packet network. Because of the geographic distribution of
the institutions and their packet nodes, even the most remote mountain
community has inexpensive local access to the statewide network and
eventually to NREN.
Product Developer
The role of product developer combines the role of
coordinator with the functions of a publisher. Electronically stored
information proliferates in state capitals. State libraries must gain
access to these public data files and make them available over the
state's network in a form that is usable by local librarians and
citizens. The North Carolina Information Network distributes, for
example, in database format, listings of all contracts for goods and
services and all highway and non-highway construction projects being put
out for bid by state government. For the first time businesses in towns
across the state can bid on 99% of the state contracts. Business and
tax revenue now flow into remote, poor counties. This program was
developed by the State Library and the state's Office of Purchase and
Contract. A similar cooperative program with the Department of
Administration and the state's Personnel Office lists, electronically,
all job openings in state government once a week. The effects of
geography disappear.
Enforcer
The role of enforcer is more difficult to define and
more laden with political problems, yet it is essential if the
electronic information infrastructure is to succeed. State library
policies must be designed to force local libraries to participate in
these networks and offer electronic information programs to their
communities. Using North Carolina once again as an example, all
libraries in the state will be required to use OCLC for interlibrary
loan by December 31, 1991. The State Library had offered a toll free
telephone ILL and reference service for over twenty years, but the
success of the Information Network's OCLC group access program made the
ILL function of the traditional service obsolete. The toll free service
has been converted into a comprehensive statewide reference service.
Geographical barriers are no longer an excuse for the
existence of material poverty or poverty of the mind. Libraries, if
they are willing, can help lift their communities out of the third
world. If they are not willing, they run the risk of extinction because
they will become irrelevant and die from lack of funding. Cost cannot
be used as a reason for non-participation by a library. The notion that
access to and use of electronic information systems is expensive is a
myth. The technical and equipment investment in the development of
these networks, though, is expensive. But if the state library can
develop cooperative programs with state agencies that have already
invested in electronic delivery systems, then the public's investment in
these systems can be leveraged to serve all the people of the state.
Shangri-La and Brigadoon are possible to reach if the librarian, like
the explorer and dreamer, is willing to take risks, explore, and dream.
* * * * * * * *
INFORMATION ACCESS AND AN ELECTRONIC BILL OF RIGHTS:
A SCHOOL PERSPECTIVE
Stephen L. Matthews
Audrey Bruce Currier Library
Foxcroft School
Middleburg, Virginia
Electronic media is not new to the school environment,
with visual and audio formats having played an important role in basic
education since the late 1950's. School librarians became school
library media specialists, not to irritate the rest of the profession,
but to better describe the expanded role of non-print in the
library/information program of schools. Electronic formats have not
only been incorporated into the collections of school libraries, but
have facilitated the production and design of instructional programming
and the storing of this in-house information for the school and local
community as a whole. With the publication of Information Power in
1988, the library media profession produced a proactive blueprint for a
three-prong professional role encompassing traditional storage and
retrieval tasks, teaching, and instructional design/production
responsibilities.
Our schools are public tools. They socialize and
prepare students for life in American society, while they grapple with
values and teach skills. Few students are finished and ready for the
workplace when they graduate from high school. As Americans, we
continue to delude ourselves that graduation from high school provides
closure to basic learning and readiness for an increasingly technical
and global society. One could argue that even the recipients of
graduate professional degrees are merely prepared to apply their theory
and lab work in the "school of actual endeavor." The primary
responsibility of schools is to dispose students toward an openness to
inquiry and provide them with the wherewithal to take responsibility for
their own learning. Within this context, the ability to know what
information is needed and how and where to find it should be one of the
most basic goals of elementary and secondary education.
Yet, what determines the character of information that
students receive in the process of their formal education? Do students
as minors need to be protected from the world and from themselves? If
so, when should they be protected and by whom? What unifies and helps
to link schools with a lifelong learning process? Information and the
ability to access it is what will provide the connection needed by high
school graduates to move successfully into higher education or society
at large.
One of the major changes for schools brought forth by
electronic information has been the ability to generate and share
information quickly and widely. Schools can create entire curricula
available through online networks. It is in this area where choice and
oversight is crucial. What should students have access to? What is
necessary in its own right as information, and what is used as an
instructional tool to provide a learning prototype of information
systems to foster the critical thinking/searching skills necessary to
use electronic media effectively?
Why would schools need an "Electronic Bill of Rights?"
Would the purpose be to address the specific nature of electronic
information or, if protection of access and encouragement of use of
information are the goals, to recommit ourselves to the constitutional
guarantees and statements of professional values and ethics that we
already strive to live by? Change is an ever-present force in the way
we structure and present information. Our dedication to protecting
access and free flow must transcend the container it comes in and the
paths through which it is disseminated.
The "Library Bill of Rights" and the "Freedom to Read
Statement" both reflect constitutional concerns for individual freedoms
and provide language and a focus to defend and advance access to
information. However, in the school environment where censorship is
quite common, these values are constantly under siege. With the
staggering possibilities of computer-generated multi-media, it is
inevitable that challenges will take place. It is important to
emphasize the continuum of commitment to access and the negative impact
of denying a new generation the right to know. It would be
counterproductive to set electronic media apart. Instead, we need to
accelerate our mastery of the technology which drives it while we
increase public awareness of the importance of protecting this evolving,
sometimes dizzying, set of formats.
The daunting task for schools, and more specifically for
media centers, is to develop a set of common professional rationales for
protection of information integrity and user access in the electronic
environment. Whether this is done through a new initiative such as an
"Electronic Bill of Rights" or as a logical outgrowth of already
existing documents, several points must be considered.
1. We need to reiterate the values and applications of
the 1st Amendment concerning information dissemination. It is
imperative that we repeatedly remind our communities and our schools
that free access and free inquiry are traditional values as well as the
foundation of innovation and progress. The irony of electronic advances
in information transfer is that they vastly increase the potential for
broadened access, yet offer new more efficient ways to violate 1st
Amendment rights.
2. Basic access means convenient and free access to
certain types of information. Fees are routinely charged for many
electronic services and these for-fee services are often severely
limited in hours of access. Basic service will increasingly entail
electronic access and manipulation of information. We need to define
what "access to basic information sources" entails and offer it without
charge and conveniently. Once an institution or government becomes
accustomed to a "revenue source," it is a painful if not impossible task
to discontinue it.
3. The nature of electronic information requires an
intermediary support structure. Those who are able to afford computers,
modems, etc. have a decided advantage in today's information
environment. If librarians serving the needs of a free society don't
provide a portal to the electronic world, there will be virtually no
opportunity for some citizens to overcome an already decided
disadvantage.
4. As we participate in the shaping of the technology
and its application, we need to educate our students and our
communities. Schools have a primary responsibility to incorporate
technology into the curriculum and to provide basic knowledge about the
production, distribution, and availability of information.
5. Availability of access and commercial profit are
often in conflict. What is good for vendors is not necessarily good for
the information needs of students who need to learn how to cope in an
electronic world. While vendors are important, even crucial players and
often allies, our actions are motivated by different and sometimes
conflicting purposes.
6. Librarians and library media specialists will be even
more necessary to provide the human connection and the philosophical
framework necessary to shepherd a free society and basic education
through the labyrinth of electronic twists and turns.
ELECTRONIC RECORDS AND INTELLECTUAL FREEDOM IN
SCHOOLS OF LIBRARY AND INFORMATION SCIENCE:
A HISTORICAL ESSAY
Frederick J. Stielow
School of Library and Information Science
Catholic University of America
Washington, D.C.
An Electronic Bill of Rights is an apt topic for
inclusion in instruction in schools of library and information science.
In addition to the normal focus on applied theory and tool skills,
students ideally engage philosophical principles with demonstrable
consequences for their profession and the world at large, and learn
about proactive practitioners and associations lobbying on the national
and international scene. Students are exposed to the true power and
complexity of information policies, including such electronically
heightened factors as government surveillance/controls and the
conflicting rights between intellectual freedom and privacy.
Yet, the historian in me also urges caution. Myths
often outweigh the truths on intellectual freedom and librarianship.
One way to add to the reader's understanding of these current issues and
perhaps learn from the lessons of the past is through a historical
analysis of the teaching on intellectual freedom and automation in our
professional schools.
Professional education began at the bachelor's level in
the mid-1880s without anything approaching our present consciousness on
intellectual freedom. In keeping with the best of their times, the
founding fathers and their Progressive disciples were filled with an
almost missionary zeal to elevate society through the scientific
provision of properly edifying materials. American librarianship in
essence began from a model of social control and implied censorship. It
is doubtful, however, that this was formally taught for philosophical
debate in the library schools. Indeed, as the famed Williamson report
supports, library education quickly eschewed moral dilemmas altogether,
preferring to preoccupy itself with narrower technical matters.
The oxymoron of censorship within an agency espousing
democratic values was not systematically confronted by the profession
until the 1920s and 1930s. ALA's first decisive statement favoring open
access to materials on all sides of an issue did not appear until 1939
with "The Library Bill of Rights." This is particularly significant
since librarianship, perhaps more than any other field, takes its
educational lead from its national professional association. But while
exceptions existed, overall there seems to have been little room in
highly technical curricula for student edification in matters of
intellectual rights and the like even in the years immediately following
ALA's adoption of "The Library Bill of Rights".
The change awaited the rise of graduate education and
the MLS following World War II--a war that strengthened belief in the
library as an "arsenal for democracy." A new trend could be seen in the
emergence of basic "foundations courses," which appeared following ALA's
first graduate school guidelines in 1951 -- developments which
transpired during one of librarianship's finest hours in the fight
against McCarthyism.
Mary Lee Bundy, however, has argued that even at that
time educators continued to concentrate on technique and did little to
explore the power of information in its societal context. Professional
principles and ethics were imparted more as formulas than as calls to
action. The real breakthrough in incorporating
an issues orientation to intellectual freedom in library education
awaited the tumultuous 1960s, when library school students took to the
fore and such new players as the Office of Intellectual Freedom and
Freedom to Read Foundation appeared. Students and liberal allies
brought intellectual freedom doctrines to bear on the new issue of
patron privacy rights, as well as such seemingly non-library problems as
civil rights, poverty, and war. The updating of ALA's accreditation
guidelines in 1971 helped affirm a new accommodation. Even with a later
retreat in terms of social activism and privacy rights, intellectual
freedom had achieved semi-sacred status for both conservatives and
liberals--an assumed instructional element for mention in every library
school in the United States.
Library schools were quick to embrace automation. The
efforts of pioneering educators date at least to the 1950s and contagion
from a strange European import called information science. By the
1960s, library education as a whole was infected and, by the 1970s, one
school after another was adding information science to its title. By
the 1990s, the need to deal with the infusion of MARC records, online
searching, and newly published works on floppy disks and CD-ROM left
automation as an endemic element in library education of far more
practical import than ethics.
A linkage between ethics and automation was not
immediately forthcoming. Following from the communication schema of
Claude Shannon, and with the factors of government and military support
behind most of its advances, information science generally began by
treating data as only a raw commodity without addressing the social
import of the message. Given those ingredients, the personalities
involved, and the complexities of the technology, it is easy to
understand how one could follow a narrow instrumentalist path and fail
to find time for information issues. There have been similar practical
restraints in extending the examination of issues surrounding technology
into ethics, foundations, and collections development courses. Some
instructors may feel automation is beyond their competency or find it
hard to fit automation within the rubric of book-based instruction.
On the other hand, these once usually parallel paths are
now intersecting more frequently in schools of library and information
science. Catholic University of America, for example, makes certain to
integrate the two concepts throughout its core sequence of four classes,
as well as advanced topics seminars on "Information Resources
Management" and "Online Searching". Its basic "Information and Society"
course visits the new threats to information along the historical
continuum of librarianship (moreover, students can actually witness and
lend support to the policies being made by taking trips to Capitol
Hill). The required "Introduction to Automated Systems in Libraries and
Information Centers" course reaffirms those experiences within an
electronic context for such library dicta as open access and the
government's responsibility to provide information to the citizenry.
The examination of automated systems also brings up concepts of privacy
and security. Fortunately, the FBI's botched Library Awareness Program
in the late 1980s has provided much grist for the mill, helping to
create a new myth to round out librarians' views for a true Electronic
Bill of Rights.
Discussions reveal that CUA is not alone. Other schools
show a similar understanding and path toward blending ethical principles
with automation in the curriculum. Anyone who attempts to keep up with
the news cannot ignore the extension of now traditional library issues
to automation in the Paperwork Reduction Act, the privatization or
questionable security classification of governmental data bases, and a
host of legal maneuverings on intellectual freedom and privacy. Dealing
with such issues is also demonstrably necessary in order to help
distinguish graduate level library computer studies courses from
undergraduate course work in automation or computer literacy from other
departments--e.g., Introduction to Microcomputers 101.
In sum, library education can perhaps be best
characterized as in the process of synthesis between automation and
ethics. Some continue to be blinded by technological Valhallas and
treat the computer as a neutral medium. Others remind librarianship and
its education arm to learn from the past and balance between techniques
and true mission. In these last regards, classroom discussions on the
elements of an Electronic Bill of Rights emerge as definitionally
germane to library and information science education. They
are part and parcel of current awareness, the development of
professionalism, and, perhaps, even an extension of the Jeffersonian
vigilance required to maintain a democratic system and recreate our myth
structures.
* * * * * * * *
ELECTRONIC PRIVACY AND DATA PR
OTECTION LEGISLATION IN THE 102nd CONGRESS
Frederick D. King
American Library Association Washington, D.C., Office
Congress is pondering a variety of topics connected with
electronic privacy and data protection. The following is a survey of
legislation currently before Congress. It begins with comments
regarding NREN legislation, is followed by sections on a variety of
privacy and telecommunications issues, and then by sections on telephone
and audiotext legislation. The information in this paper was current
through May, 1991.
NATIONAL RESEARCH AND EDUCATION NETWORK
The pending legislation to establish a National Research and Education
Network (NREN) currently in Congress is not very specific about data
security or privacy. The current version of HR 656, which was ordered
reported on May 8, requires the National High-Performance Computing
Program to address the security requirements, policies, and standards
necessary to protect computer networks and information resources
accessible through them. The National Institute of Standards and
Technology will conduct the research needed to adopt security standards.
Senator Gore's NREN bill, S. 272, has a similar
requirement, but the responsibility for defining and implementing a
security plan is spread among a wide range of federal agencies. The
National Institute of Standards and Technology, the National Science
Foundation, and the Defense Advanced Research Project Agency are
required to adopt a common set of standards and guidelines to provide
enhanced security for the network.
The Senate version also requires the Director of the
Office of Science and Technology Policy to report to Congress on
appropriate policies and standards to protect the privacy of users of
networks, a requirement that was dropped in the House version.
Another NREN bill, S. 343, which was reported on May 23,
states that the NREN shall "be designed and operated so as to ensure
continued application of laws that provide network and information
resources security measures, including those that protect copyright and
intellectual property rights, and those that control access to data
bases and protect national security."
DATA PRIVACY
HR 280 "Individual Privacy Protection Act of 1991." Introduced by Rep.
Collins (D-IL).
Establishes an Individual Privacy Protection Board. The
Board shall recommend to the President and the Congress what
legislation, administrative action, or voluntary adoption of
requirements are necessary to protect the privacy of individuals while
meeting the legitimate needs of government and society for information.
The Board shall also review federal law, Executive orders, etc., and
report on the extent to which they are consistent with the rights of
privacy, due process of law, and other guarantees of the Constitution.
The Board shall comment on the implications for data protection of
proposed federal, state, or local statutes, regulations, or procedures.
The Board may examine interstate transfer of information about
individuals; data banks and information programs and systems which
significantly affect the privacy and other personal and property rights
of individuals; the use of social security numbers, license plate
numbers, and other symbols to identify individuals in data banks; and
the analysis of statistical data with other personal data in a way which
results in a violation of the implied or explicitly recognized
confidentiality of such information. The Board may determine what
specific categories of information should be prohibited by statute from
collection by federal agencies.
Referred to the Government Operations Subcommittee on
Government Information, Justice, and Agriculture on February 19.
HR 685 "Data Protection Act of 1991." Introduced by Rep. Wise (D-WV).
Establishes a Data Protection Board as an independent
agency of the executive branch. The Board shall develop guidelines for
use by federal agencies in implementing the Privacy Act of 1974. The
Board may investigate compliance with and comment on proposals to amend
the Privacy Act; review federal, state, and local laws, Executive
orders, regulations, etc., and report whether they are consistent with
data protection rights; and propose legislation on data protection.
According to Rep. Wise, "In the not too distant future, consumers face
the prospect that a computer somewhere will compile a record about
everything they purchase, every place they go, and everything they
do.... We need to help consumers, businesses, and government develop
policies and practices to distinguish between appropriate and
inappropriate uses of personal data. That would be one of the principal
functions of the Data Protection Board."
Referred to the Government Operations Subcommittee on
Government Information, Justice, and Agriculture and to its Subcommittee
on Legislation and National Security on February 20.
On April 10, the Subcommittee on Government Information,
Justice, and Agriculture held a hearing on data protection issues and
public and corporate reactions to privacy. The main focus of the hearing
was Equifax's decision to cancel the release of its Lotus MarketPlace:
Households CD-ROM database. John Baker, Senior Vice President of
Equifax, explained a survey that Equifax had commissioned with Louis
Harris & Associates on the subject of privacy. The survey showed that
Americans are concerned about the lack of control they have over
information about them, but that they also value the benefits they
receive from information and technology. Although Lotus MarketPlace had
safeguards against abuse, Equifax decided that it would be socially
responsible to cancel the product. Another concern raised at the hearing
dealt with data protection laws in the European Community. According to
Rep. Wise, "if the United States is perceived to have inadequate data
protection laws... U.S. companies could lose access to information from
Europe and could thereby lose international influence, business
opportunities, and jobs."
HR 2443 "Privacy Act Amendments of 1991." Introduced by Rep. Wise (D-WV)
Makes several changes in the Privacy Act of 1974. One
change amends the definition of "record" so that personal information is
subject to the act independent of the medium on which the information is
maintained. This makes it clear that computerized information is
subject to the Privacy Act.
Referred to the House Committee on Government Operations
on May 22.
S. 618 "Violent Crime Control of 1991." Introduced by Sen. Biden (D-DE);
1 cosponsor.
A 194-page bill to control and reduce violent crime.
Sec. 545 of the bill states "It is the sense of Congress that providers
of electronic communications services and manufacturers of electronic
communications service equipment shall ensure that communications
systems permit the government to obtain the plain text contents of
voice, data, and other communications when appropriately authorized by
law."
Referred to the House Judiciary Committee on March 12.
Hearings were held on April 18, April 23, May 7 and May 15.
WORKPLACE PRIVACY
S. 516 "Privacy for Consumers and Workers Act." Introduced by Sen. Simon
(D-IL); 1 cosponsor.
Requires employers who engage in electronic monitoring
to provide affected employees and potential employees with prior written
notice describing the type of monitoring to be done. Requires employers
to permit employees to have access to all personal data collected by
such electronic monitoring. Prohibits employers from electronically
collecting data that is not relevant to the employee's work performance.
Data collected may not be used as the sole basis for evaluation or
production quotas. Employers are prohibited from collecting data
obtained by electronic monitoring which describes how an employee
exercises rights guaranteed by the First Amendment unless such use is
expressly authorized.
Referred to the Labor and Human Resources Subcommittee
on Employment and Productivity on March 7.
HR 1218 "Privacy for Consumers and Workers Act." Introduced by Rep.
Williams (D-MT); 85 cosponsors.
An identical companion bill to S. 516.
Referred to the Education and Labor Subcommittee on
Labor-Management Relations and to its Subcommittee on Employment
Opportunities on March 21.
FREEDOM OF INFORMATION ACT
HR 1423 "Freedom of Information Public Access Improvement Act of 1991."
Introduced by Rep. Kleczka (D-WI); 10 Cosponsors.
Amends the Freedom of Information Act in various ways,
including defining "record" to include electronic information in any
storage medium, and "search" to include a "reasonable amount of computer
programming necessary to identify records."
Referred to the Government Operations Subcommittee on
Government Operations, Justice, and Agriculture on March 14.
GOVERNMENT COPYRIGHT
HR 191 "Technology Transfer Improvements Act of 1991." Introduced by
Rep. Morella (R-MD).
Allows federal agencies to secure copyright on behalf of the United
States as author or proprietor in any computer software prepared by
employees of the United States Government in the course of work under a
cooperative research and development agreement.
Referred to the Science, Space, and Technology
Subcommittee on Technology and Competitiveness on February 12, and to
the Judiciary Subcommittee on Intellectual Property and Judicial
Administration on April 16.
TELECOMMUNICATIONS POLICY
HR 277 "Telecommunications Policy Coordination Act of 1991." Introduced
by Rep. Collins (D-IL).
Establishes an Office of Telecommunications Policy in
the Executive Office of the President. The office would prepare national
telecommunications policy options, serve as the principal advisor to the
President in matters relating to telecommunications issues and policies,
and monitor the development of new telecommunications technologies.
Referred to the Energy and Commerce Subcommittee on
Telecommunications and Finance on February 11.
TELEPHONE CALLER ID
S. 652 "Telephone Privacy Act of 1991." Introduced by Sen. Kohl (D-WI).
Enables telephone users to block Caller ID. Telephone
companies are not required to enable callers to block receipt of
identifying information on the emergency assistance line of a police or
fire department, or on a 911 emergency line. According to Sen. Kohl,
"forced Caller ID violates our fundamental right to privacy because
there are a variety of situations where callers need and deserve to keep
their phone numbers to themselves.... if a stranger came up to you on
the street and asked you for your home phone number, would you give it
to him? Of course not.... The answer is to allow consumers to retain
their freedom of choice." Sen. Kohl also expressed his concern that
Caller ID might be illegal. In 1990, a Pennsylvania court of appeals
ruled that Caller ID violated the state's constitution and its wiretap
statute, which is almost identical to the Federal version. The case is
currently before the Pennsylvania Supreme Court. Sen. Kohl also said
experts have argued that Caller ID may be an illegal "trap and trace
device" under the Electronic Communications Privacy Act.
Discharged without action by the Senate Committee on
Commerce, Science, and Transportation on March 21, and referred to the
Judiciary Committee's Subcommittee on Technology and the Law on March
25.
HR 1449 "Telephone Privacy Act of 1991." Introduced by Rep. Synar
(D-OK); 1 cosponsor.
Allows telephone callers to block caller ID. Allows
customers to sue providers that allow caller ID but do not allow
blocking. This bill is a companion to S. 652.
Referred to the Committee on the Judiciary on March 14.
HR 1305 "Telephone Consumer Privacy Rights Act." Introduced by Rep.
Markey (D-MA); 11 cosponsors.
Allows telephone callers to block caller ID. Does not
apply to private branch exchanges or emergency numbers. Customers would
not be charged for blocking calls. When he was introducing this bill,
Rep. Markey stated that "the awesome power and pervasiveness of advanced
telecommunications may mean that in the future, personal privacy will be
threatened in fundamental ways."
The Energy and Commerce Subcommittee on
Telecommunications and Finance held a hearing on this bill on April 24.
See HR 1304 below for details.
TELEPHONE SOLICITATION
HR 1304 "Telephone Advertising Consumer Rights Act." Introduced by Rep.
Markey (D-MA); 42 cosponsors.
Requires the FCC to create a database of people who
object to receiving telephone solicitations. Companies that solicit by
telephone would be required to purchase copies of the list, and
companies would be prohibited from making calls to people on the list.
Automatic dialers would not be permitted to call emergency lines, paging
or cellular telephone services. All fax advertising transmittals would
be required to be identified. When Rep. Markey was introducing this
bill, he referred to the telephone as "an insistent master�when it
rings, we answer it�and many consumers complain bitterly that, when it
rings to deliver unsolicited advertising, it is invading their
privacy... This bill...is a bipartisan effort to return a measure of
control to consumers over what they hear and read."
The Energy and Commerce Subcommittee on
Telecommunications and Finance held a hearing on HR 1304 and 1305 on
April 24. The witnesses at the hearing held a broad range of opinions
both on Caller ID and on a nationwide database. Mark Rotenberg of
Computer Professionals for Social Responsibility said that Caller ID was
"directly at odds with established legal and ethical standards of
privacy protection," and recommended that free per-line blocking be
offered to subscribers. He also said that a flat prohibition on
unsolicited advertising may have a chilling effect on free speech.
Janlori Goldman, Director of the Privacy and Technology Project for the
American Civil Liberties Union, said that ACLU supported the bills, but
that they were concerned with the First Amendment issues raised by HR
1305. Richard Brown, Executive Director of the Direct Marketing
Association, recommended that self-regulation would be preferable to a
federally-mandated nationwide database.
HR 1304 was marked up by the Subcommittee and approved
for full Committee action on May 9. The bill now limits the database to
residential telephone subscribers. The bill also states "The Congress
finds that...[i]ndividuals' privacy rights, public safety interests, and
commercial freedoms of speech and trade must be balanced in a way that
protects the privacy of individuals and permits legitimate telemarketing
practices."
HR 1431 Introduced by Rep. Boehlert (R-NY).
Allows people to file a statement with the FCC that they
do not wish to receive unsolicited telephone calls. The FCC is required
to maintain the list and make it available to any person on reasonable
terms and conditions. Non-profit organizations are exempt. When the FCC
believes that a person is violating this law, the FCC may ask the
Attorney General to take civil action; civil penalties for violating
this law may not exceed $10,000.
Referred to the Subcommittee on Telecommunications and
Finance on March 25.
HR 1589 "Telephone Privacy Act." Introduced by Rep. Unsoeld (D-WA); 2
cosponsors.
Outlaws commercial solicitation by computers. Rep.
Unsoeld called this bill "a piece of legislation of interest to every
American with a telephone and a desire for peace and quiet once they
reach the sanctity of their own home."
Referred to the Committee on Energy and Commerce on March 21.
AUDIOTEXT
HR 328 "Telephone Consumer Assistance Act." Introduced by Rep. Gordon
(D-TN); 67 cosponsors.
Requires the FCC to establish a system for oversight and
regulation of audiotext services. Requires the services to provide an
introductory message that describes the service, specifies the cost of
the call, and informs the caller of the option to hang up without being
charged. The bill also requires that any bypass of the cost disclosure
message be disabled when the cost of the service has changed, and
prohibits local exchange carriers from disconnecting telephone service
because of nonpayment of audiotext charges. Common carriers are required
to provide each caller with the option to avoid audiotext charges caused
by unauthorized use or misunderstanding of the charges and to offer
callers the option of blocking access to all audiotext services.
Advertisers are required to state the charges for audiotext services,
required to state that minors receive parental consent before placing
calls, and are prohibited from carrying advertisements that emit tones
that can automatically dial an audiotext number. Common carriers are
prohibited from providing service in which children under 18 would be
asked to provide their name, address, and other information. The bill
requires the Secretary of Commerce to conduct a study of audiotext
service providers' use of technology to identify callers' telephone
numbers and sell lists of numbers.
The Energy and Commerce Subcommittee on
Telecommunications and Finance held a hearing on February 28 to explore
the problems of audiotext abuses and to gather information on the need
for regulation. All of the witnesses agreed that abuses of the industry
should be curbed, but their solutions to the problem differed. One
witness, whose children ran up an audiotext bill of over $1000, argued
that access to audiotext services should be restricted to persons who
have requested the service in writing and have received access codes.
Joselle Albracht, Assistant Attorney General of the Consumer Protection
Division in Dallas, Texas, supported HR 328, saying that the audiotext
industry "has a potential to become the greatest medium for consumer
fraud to date." James R. Herold of Pacific Bell explained the safeguards
that California has adopted, including price caps for individual calls
and notification when charges for a single billing period exceed $75.
Thomas Pace of the Information Industry Association said that IIA
supports the clear disclosure of audiotext costs, but that the "kill
message" (a message stating that the caller could hang up without being
charged) requirement would discourage callers who didn't want to wait
for the information to be presented. The requirement would also set a
troubling First Amendment precedent, sending the signal that the use of
new technology would justify more intrusive government control of
information content. Bruce J. Fogel, Chairman of Phone Programs Inc.,
said that he did not deny that abuses existed, but that his company did
not see the necessity for federal laws. Further hearings on this bill
are planned.
On May 8, the Federal Trade Commission announced that it
was charging Phone Programs Inc. with deceptive and unfair advertising
practices in connection with its "T.J. Funnybunny" promotion. Children
were urged to call a 900 number to take part in fun adventures and
receive a gift, but when they did, they were given an address to which
the children had to send a copy of the bill for the call.
A new version of this bill, now called the "Audiotext
Industry Obligations and Consumer Rights Act" and incorporating portions
of HR 328, will be introduced to Congress shortly.
S. 471 "900 Services Consumer Protection Act of 1991." Introduced by
Sen. McCain (R-AZ); 4 cosponsors.
Requires providers of 900 services to announce, at the
beginning of each transaction, the price of the call and a description
of the service. Callers would be given the option of hanging up during
the beginning announcement without being charged. Consumers would be
allowed to block access to 900 numbers at no cost. Advertisements for
900 services directed at children would be required to include a notice
that parental permission was required before they called, and radio and
television advertisements directed at children would be prohibited from
including tones which automatically dial a 900 telephone number.
Referred to the Committee on Commerce, Science, and
Transportation on February 21.
* * * * * * * *
Principles of Public Information
Preamble
>From the birth of our nation, open and uninhibited access to public
information has ensured good government and a free society. Public
information helps to educate our people, stimulate our progress and
solve our most complex economic, scientific and social problems. With
the coming of the Information Age and its many new technologies,
however, public information has expanded so quickly that basic
principles regarding its creation, use and dissemination are in danger
of being neglected and even forgotten.
The National Commission on Libraries and Information Science, therefore,
reaffirms that the information policies of the U.S. government are based
on the freedoms guaranteed by the Constitution, and on the recognition
of public information as a national resource to be developed and
preserved in the public interest. We define public information as
information created, compiled and/or maintained by the Federal
Government. We assert that public information is information owned by
the people, held in trust by their government, and should be available
to the people except where restricted by law. It is in this spirit of
public ownership and public trust that we offer the following Principles
of Public Information.
1. The public has the right of access to public information.
Government agencies should guarantee open, timely and
uninhibited access to public information except where restricted by law.
People should be able to access public information, regardless of its
format, without any special training or expertise.
2. The Federal Government should guarantee the integrity and
preservation of public information, regardless of its format.
By maintaining public information in the face of
changing times and technologies, government agencies assure the
government's accountability and the accessibility of the government's
business to the public.
3. The Federal Government should guarantee the dissemination,
reproduction, and redistribution of public information.
Any restriction of dissemination or any other function
dealing with public information must be strictly defined by law.
4. The Federal Government should safeguard the privacy of persons
who use or request information, as well as persons about whom
information exists in government records.
5. The Federal Government should ensure a wide diversity of sources
of access, private as well as governmental, to public information.
Although sources of access may change over time and
because of advances in technology, government agencies have an
obligation to the public to encourage diversity.
6. The Federal Government should not allow cost to obstruct the
people's access to public information.
Costs incurred by creating, collecting and processing
information for the government's own purposes should not be passed on to
people who wish to utilize public information.
7. The Federal Government should ensure that information about
government information is easily available and in a single index
accessible in a variety of formats.
The government index of public information should be in
addition to inventories of information kept within individual government
agencies.
8. The Federal Government should guarantee the public's access to
public information, regardless of where they live and work, through
national networks and programs like the Depository Library Program.
Government agencies should periodically review such
programs as well as the emerging technology to ensure that access to
public information remains inexpensive and convenient to the public.
Conclusion
The National Commission on Libraries and information Science offers
these Principles of Public Information as a foundation for the decisions
made throughout the Federal Government and the nation regarding issues
of public information. We urge all branches of the Federal Government,
state and local government and the private sector to utilize these
principles in the development of information policies and in the
creation, use, dissemination and preservation of public information. We
believe that in so acting, they will serve the best interests of the
nation and the people in the Information Age.
Adopted by the U.S. National Commission on Libraries
and Information Science June 29, 1990
A SHORT LIST OF REALLY GOOD READINGS
Compiling a bibliography is a purely thankless task. It
is analagous in many ways to being a translator of great books from one
language into another: it involves a lot of work, and receives very
little attention unless you do it really badly. And even if you are
exhaustive to a fault, you will undoubtedly overlook some important work
or works and offend someone. Probably for these reasons, I was not
successful in recruiting anyone to compile an exhaustive bibliography on
relatively short notice for this publication. Therefore, what appears
here is not a bibliography. Whether according to Webster or not, the
word "bibliography" seems to connote a high degree of thoroughness, even
to the point of perfection. I make no such claims here. And I
apologize in advance to anyone who's seminal articles or books on one of
these topics I have omitted, and I'm sure there are a few.
Despite these disclaimers, the list that appears below
wasn't put together exactly haphazardly, either. It is the result of
some online bibliographic searching, some manual bibliographic
searching, and the "invisible college" of colleagues who have shared
with me. Apart from the latter method of collection -- plus the
inclusion of Ithiel de Sola Pool's book -- anything else listed here was
published at least in its most recent form in 1988 or later, and most of
it is from the library science literature. You will not find this list
exhaustive; it's not intended to be. I am confident, though that -- as
I have suggested by the title I have chosen for this listing -- readers
will find the articles, books, and reports listed here to be
well-written, informative, and thought-provoking, a very good starting
place for pursuing issues related to the topic of a Bill of Rights for
an Electronic Society.
... The Editor
* * * * * * * *
Bollinger, William A. "Information Access Policies in the 1990s:
National and International Concerns" in Proceedings of the National
Online Meeting (New York, May 1-3, 1990). Medford, NJ:
LearnedInformation, Inc., 1990, pp. 51-55.
Burnham, David. "Data Protection" in Computers, Ethics, and Society. M.
David Ermann, Mary B. Williams,and Claudio Gutierrez, eds. New York and
Oxford: Oxford University Press, 1990, pp. 94-106.
Connolly, Frank, Steven W. Gilbert, and Peter Lyman. A Bill of Rights
for Electronic Citizens. Washington,D.C.: Office of Technology
Assessment, 1990.
Critical Connections: Communications for the Future. Washington, D.C.:
Office of Technology Assessment,1990.
Flaherty, David H. "The Emergence of Surveillance Societies in the
Western World: Toward the Year 2000 "Government Information Quarterly, 5,
no.4(1988): 377-387.
Haywood, Trevor. "Electronic Information: The Withering of Public
Access" in New Horizons for the Information Profession. Los Angeles and
London: Taylor Graham, 1988, pp. 195-206.
Informing the Nation: Federal Information Dissemination in an Electronic
Age. Washington, D.C.: Office of Technology Assessment, 1988.
Karraker, Roger. "Highways of the Mind" Whole Earth Review, no.
70(Spring, 1991): 4-11.
Kirtley, Jane E. "Discussion Forum: From File Drawer to Floppy Disk:
FOIA Implications of Electronic Data Collection Raised in Two Recent
Supreme Court Cases" Government Information Quarterly, 6,no.4(1989):
335-338.
Lesser, Barry. "Information Protection Issues in the Information
Economy" Bulletin of the American Society for Information Science,
14(February/March, 1988): 21-22.
Lyon, David. "Information, Democracy, and the State" Chapter 5 in The
Information Society: Issues and Illusions. New York and Oxford: Basil
Blackwell, 1988, pp. 86-104.
Marx, Gary T., and Sanford Sherizen. "Monitoring on the Job" Technology
Review, 89 (November/December,1986): 62-72.
Nielson, Brian. "Intellectual Freedom in an Electronic Age" Online,
15(May, 1991): 88-90.
Pool, Ithiel de Sola. Technologies of Freedom. Cambridge, Mass: Harvard
University Press, 1983.
Rowe, Richard R. "Democracy and the Marketplace of the Mind" Bulletin
of the American Society for Information Science, 16(April/May, 1990): pp.
26-28.
Rubin, Michael Rogers. "The Computer and Personal Privacy, Part I: The
Individual Under Assault" Library Hi Tech, 5 (Spring, 1987): 23-31.
Rubin, Michael Rogers. "The Computer and Personal Privacy, Part III: The
Regulation of Computer Records in the United States" Library Hi Tech, 7,
no.3(1989): 11-21.
Schmidt, C. James. "Intellectual Freedom and Technology: Deja Vu?" North
Carolina Libraries, 45(Fall,1987): 129-130.
Shattuck, John. "The Right to Know: Public Access to Federal Information
in the 1980s" Government Information Quarterly, 5, no.4(1988): 369-375.
Shill, Harold B. "A Basis for Increasing Public Access to Federal
Electronic Information" Government Information Quarterly, 6, no.2(1989):
135-141.
Turn, Rein. "Privacy Protection" Annual Review of Information Science
and Technology, v.20(1985): 27-50.
Williams, Rt. Hon. Shirley. "The Impact of Information Technology on the
Wider Society" in New Horizons for the Information Profession. Hilary
Dyer and Gwyneth Tseng, eds. Los Angeles and London:Taylor Graham, 1988,
pp. 212-225.
Wood, Fred B. "Directions in Federal Information Dissemination Policy in
1989" in Library and Book Trade Almanac, 34th ed., 1989-90. New York:
[Script from the NBC "Almost 2001" computer crime news report.]
SLUG SHOW WRITER MODIFIED kaul
TIMING LC
2001: SCRIPT FOUR =NN=THU glewis Thu Mar 24 16:34 1994 READY
2:57 84
GEORGE LEWIS NARRATES:
A FINGERPRINT POPS UP ON A COMPUTER SCREEN AT THE LOS ANGELES POLICE
DEPARTMENT. WITHIN MINUTES, THE PRINT, TAKEN FROM A CRIME SCENE, IS MATCHED
AGAINST A HUGE FILE OF 8 MILLION FINGERPRINTS KEPT BY THE STATE OF CALIFORNIA.
TECHNICIAN:
"We have a hit here."
LEWIS:
THE SCIENCE OF FINGERPRINTING IS ABOUT 100 YEARS OLD. COMPUTERS CAME INTO THE
PICTURE IN THE '80'S. ONE OF THE FIRST BIG CASES THEY HELPED CRACK WAS THE
"NIGHT STALKER" SERIAL KILLINGS...RESULTING IN THE 1989 ARREST OF RICHARD
RAMIREZ.
JOSEPH BONINO--LOS ANGELES POLICE DEPARTMENT:
"If, before we had automated fingerprint systems, it would have taken us 60
years to find a night stalker's print in our file."
LEWIS:
NOW, THE FBI IS BUILDING A NATIONWIDE COMPUTER LIBRARY OF FINGERPRINTS FOR
USE BY LAW ENFORCEMENT AGENCIES THROUGHOUT THE COUNTRY. THE FEDS ARE PROMISING
THAT COMPUTER SEARCHES WILL TAKE TWO HOURS OR LESS.
BY 2001, IT WILL BE STANDARD PROCEDURE FOR POLICE TO USE ELECTRONIC SCANNERS
TO TAKE PRINTS FROM SUSPECTS. THE LOS ANGELES SHERIFF'S DEPARTMENT IS ALREADY
DOING THAT. BUT GUESS WHAT? CRIMINALS ARE ALSO USING HIGH TECH.
CAPT. STEPHEN D'ARCY--SAN JOSE POLICE DEPARTMENT:
"The information superhighway is going to be filled with highway robbers, and
that is clearly one of the trends of the future that law enforcement at this
time is not even prepared to deal with."
GEORGE LEWIS ON CAMERA:
"While computer technology is making law enforcement more efficient at solving
cases, it is creating whole new types of crime. That's why the San Jose Police
Department, in the heart of California's Silicon Valley, has a high tech crime
unit."
SGT JIM MCMAHON--SAN JOSE POLICE DEPARTMENT:
"The Intel 486-66 D.X..."
LEWIS:
SERGEANT JIM MCMAHON SAYS THESE STOLEN COMPUTER CHIPS...WHICH COST ABOUT 450
DOLLARS APIECE...ARE WORTH MORE THAN THEIR WEIGHT IN GOLD.
MCMAHON:
"So that makes what I'm holding in my hand here worth about four to five
thousand dollars."
LEWIS:
SAN JOSE HAS MADE A MAJOR COMMITMENT NOT ONLY TO SOLVING HIGH- TECH CRIMES BUT
TO THE USE OF TECHNOLOGY IN OTHER AREAS. THE POLICE HERE SAY THAT'S A FACTOR
IN SAN JOSE'S LOW CRIME RATE. ONE CRIME FOR EVERY 20 PEOPLE. ABOUT HALF THE
BIG CITY AVERAGE.
UNIDENTIFIED POLICEMAN:
"We depend heavily on technology."
LEWIS:
DEPEND HEAVILY BECAUSE SAN JOSE HAS A RELATIVELY SMALL NUMBER OF OFFICERS, ONE
AND A HALF...FOR EVERY THOUSAND RESIDENTS. OTHER CITIES PUT MORE COPS ON THE
STREET, BUT HAVE HIGHER CRIME RATES.
JOSEPH BONINO--L.A.P.D.:
"We want to try in law enforcement to keep from third world solutions and
problems. Throwing large amounts of people at a problem that technology can
solve much more effectively and at a much lower taxpayer cost."
LEWIS:
LAW ENFORCEMENT'S PLUNGE INTO HIGH TECH DOES HAVE SOME CIVIL LIBERTIES GROUPS
WORRIED. WILL BIG BROTHER BE WATCHING US?
MIKE GODWIN--COUNSEL, ELECTRONIC FRONTIER FOUNDATION:
"One of the things that we are spearheading right now is resistance to
this--uh--information SNOOPER highway."
LEWIS:
AS 2001 NEARS, TECHNOLOGY IS TURNING OUT TO BE A DOUBLE-EDGED SWORD FOR LAW
ENFORCEMENT. IT IS HELPING BOTH COPS AND CRIMINALS...AND IT HAS STARTED A HOT
DEBATE ABOUT THE PUBLIC'S RIGHT TO PRIVACY. GEORGE LEWIS, NBC NEWS, SAN JOSE,
CALIFORNIA.
###
FEDERAL ENFORCEMENT 1991
Georgetown University Law Center
Washington, D.C.
May 16-17, 1991
CONSTITUTIONAL, LEGAL, AND ETHICAL
CONSIDERATIONS FOR DEALING
WITH ELECTRONIC FILES IN THE AGE OF CYBERSPACE
Harvey A. Silverglate and Thomas C. Viles (FN1)
Introduction -- The Reach of
Cybernetic Technology.
Without pause over the past decade, computers have transformed the
physical organization of work in virtually every office in the nation.
Businesses and law firms are spurning the use of paper to deliver and
store information; instead, they have become dependent upon the use of
computers and electronic systems for these functions. Now it is common to
draft, revise, and edit all documents -- from briefs, to business
proposals, to contracts -- without ever generating a paper "hard" copy
until the document is ready for signature and submission.
Furthermore, now it is possible for the personnel of a company or
law firm to conduct all of their in-house discussions on a computer
network which transmits and receives electronic mail ("e-mail"). E-mail
can be used for written messages of great import as well as trivial asides
and gossip. All such messages can be stored for later retrieval. Using
networks and e-mail in tandem, teams of people in different offices can
create, edit and complete lengthy written projects, literally without ever
speaking to each other, or ever looking at paper copy.
Communications between the office workplace and the outside world
also can be conducted through the use of "networks" of computer systems.
For example, the home office of a company can communicate with all of its
affiliates and subsidiaries by the transmission of written messages
between their respective computers ("nodes", in computer argot). In this
way, all operations which can be performed simultaneously within one
office, can be performed with equal facility among many offices, linked by
the computer networks. Such systems also enable the attorney to stay in
close contact with a client when it is necessary to work together on a
project which requires close attention to detail.
Computers and computer networks also promise to substantially and
rapidly transform civil society. There exists a variety of computer
networks, which enable academic institutions and scholars, to conduct
global conferences on matters of common interest. Through e-mail and
electronic bulletin boards, scholars and researchers can share
experimental data and resources. See "Common Electronic Policy," The
Economist, Feb. 16, 1991, at 24. Recently, the volume of academic message
traffic in the United States has been increasing by 30-40% per month. Id.
This session of Congress is considering a bill, introduced by Sen. Albert
Gore, to spend over $1 billion in computer research, of which $400 million
would be dedicated to the construction of a new National Research and
Education Network (NREN), capable of handling computer traffic many times
faster than the networks currently in existence -- analogous to a new
electronic interstate highway system. See id.; Leccese, "Hackers under
Attack: Crackdown Raises Questions about New Forms of Speech," Boston
Phoenix, Sept. 7, 1990, at 8, 18. It is estimated that the entire project
will cost $200 billion to complete. Leccese, supra, at 22.
There also are smaller networks, too numerous to mention, which
are not affiliated with any company, university, government agency, or
other established entity. These independent networks function as forums
for people all over the world to communicate with one another about
matters of interest, from the sublime to the ridiculous. The largest
computer networks in the United States, InterNet and UseNet, are each
actually made up of 2,000 smaller networks. See, e.g., "Common Electronic
Policy," supra, at 24; Costikyan, "Closing the Net," Reason, Jan. 1991, at
22. InterNet reportedly carries the electromagnetic impulses created by
over 500 billion keystrokes per month. Leccese, supra, at 9.
Approximately 5,000 bulletin boards operate over the networks. Costikyan,
supra, at 22.
One notable example of the use of computer networks for purely
expressive purposes is the Whole Earth 'Lectronic Link ("WELL"), which
provides political activists, small businessmen, rock and roll fans, and
hundreds of other groupings of people (including lawyers) a forum in which
to discuss matters of common interest. The WELL is a "node" capable of
running hundreds of different multi-party conversations (or "conferences")
simultaneously. Like an electronic town meeting, groups of people can
communicate together on a multiplicity of bulletin boards, or users can
send each other private messages by e-mail. (FN2)
Other networks, utilizing more modest equipment, can maintain only
one or two bulletin boards at a time. Everyone with a personal computer
and access to a phoneline can participate in any of these open networks --
and, with only a little extra equipment, can start a new bulletin board.
Searches and Seizures
Involving Cybernetic Machines.
Over the past 15 months, the following incidents have come to our
attention:
*On January 24, 1990, a handful of Secret Service agents,
accompanied by two employees of the local telephone company, seized the
equipment of a twenty year old man living with his mother in New York.
>From his bedroom, they seized a Commodore 128 computer, 200 floppy disks,
a telephone answering machine, cassette-playing radio, and all of his
musical cassette tapes. Apparently, the Secret Service was searching for
evidence of alleged "computer crimes." See Dibbell, "On Line and Out of
Bounds", Village Voice, July 24, 1990, at 27; Jahnke, "The Cops Come to
Cyberspace," Boston Magazine, November 1990, at 140; J. Barlow, Crime and
Puzzlement 8P9 (1990) According to some reports, this raid (and a few
other raids which were carried out simultaneously) marked the beginning of
the so-called "Operation Sun Devil," described as a "two-year Secret
Service investigation which involved 150 federal agents, numerous local
and state law enforcement agencies, and the combined security resources"
of numerous private telecommunications companies.(FN3) Barlow, supra, at
9; see also "Crime of the Century," Personal Computer World, Mar. 1991, at
187; Zachary, "Group to Defend Civil Rights of Hackers Founded by Computer
Industry Pioneer," Wall Street Journal, July 11, 1990, at B4; Schatz,
"Foundation to Defend PC Users," Washington Post, July 11, 1990, at B8;
Edelman, "Kapor for the Defense in Computer Field," Boston Globe, July 11,
1990, at 33; "Kapor Forms Group to Aid Hackers," USA Today, July 11, 1990,
at 2B.
*On March 1, 1990 the Secret Service raided the offices of Steve
Jackson Games, a small Austin start-up company which designed and
manufactured fantasy role-playing books and games. The Secret Service
seized the company's three computer systems, two laser printers,
miscellaneous hardware, papers, back-up disks, and a single pocket
calculator. The company's plans and galleys for a new role-playing game,
GURPS Cyberpunk(FN4), also were seized, after an agent opined that the
game was a handbook for computer crime. (The format of Steve Jackson's
games is similar to that of "Dungeons and Dragons"; GURPS Cyberpunk
consists of a lengthy instruction book plus general information about the
game. In fact, all of the company's games consist solely of printed
matter. The company was not in the business of manufacturing any
software.) The Secret Service apparently suspected that an employee of
Steve Jackson Games had participated in unlawful activity on the
employee's own home computer system. At no time was the owner or any
other employee of Steve Jackson Games considered a suspect. Because the
seizure of the computers thoroughly disrupted Steve Jackson's business,
half of the company's employees had to be laid off. It was months before
the company was even able to gain access to its equipment, which held the
manuscript for the about-to-be-published GURPS Cyberpunk game. Some of
the seized equipment ran a bulletin board which was maintained for the
purpose of swapping new role-playing game ideas with similarly interested
people elsewhere in the United States. The board, which users gave the
tongue-in-cheek title of "The Illuminati," ceased to operate. See Levy,
"Search and Destroy: What Happened when the Secret Service Visited Steve
Jackson Games," MacWorld, March 1991, at 51, 52; Costikyan, "Closing the
Net," Reason, Jan. 1991, at 22P24; Lewis, "Can Invaders Be Stopped but
Civil Liberties Upheld?," New York Times, Sept. 9, 1990, at 12; Zachary,
supra, at B4; O'Connor, "$275,000 Donated for Hackers," San Jose Mercury
News, July 11, 1990, at 1F; "Computer Foundation Planned," San Francisco
Chronicle, July 11, 1990, at C4; Edelman, supra, at 39; "Kapor Forms Group
to Aid Hackers," supra, at 2B.
*On the day of the Steve Jackson Games raid, the employee's home
was searched. His computer equipment, software, a quantity of TV cable
wire, and telephone parts were seized and carted away. Also seized was an
arcade version of Pac Man. To date, the employee has not been charged
with any crime. See Lewis, supra, at 12; Dibbell, supra, at 30.
*Two years ago, a computer hobbyist running a small bulletin board
service out of Lockport, Illinois, discovered that his bulletin board had
been used to transmit a telephone company document. He promptly notified
the telephone company, and cooperated fully and voluntarily with law
enforcement authorities in the investigation of what he had reported. He
probably regrets that now, for the Secret Service agents, armed with a
warrant, later seized all of the man's computer equipment, in order to
secure evidence in their investigation of the transfer of telephone codes.
Because of the seizure, his bulletin board was shut down. See, e.g.,
Costikyan, supra, at 24; Leccese, supra, at 21; Goldstein, Special Issue,
"2600 magazine's commentary on Operation Sun Devil," 1 Computer
Underground Digest #1.10 (May 17, 1990) (available on the WELL, April 12,
1991); J. Barlow, supra, at 11-12.
*A college student in Missouri published a computer magazine
entitled Phrack, which he distributed over the networks to about 1,300
people. He found a phone company document on a publicly accessible
computer bulletin board, and he reprinted it in his magazine. Although
the government never alleged that he was involved in taking the document,
his computer system was seized, and he was charged with interstate
transportation of stolen property. The computer seizure, ostensibly
occasioned by his republication of a stolen document, effectively
restrained him from publishing any more issues of Phrack.(FN5) Charges
against the young man later were quietly dropped, when it was discovered
that the "stolen property" -- the phone company document -- was available
from the phone company itself, and that it cost somewhat less that $20.
But the entire episode must have dampened his zeal to publish, for the
magazine no longer appears. See "Crime of the Century," supra, at 188;
Costikyan, supra, at 23-25; Levy, supra, at 52, 54; "United States v.
Zod," The Economist, Sept. 7, 1990, at 23; Leccese, supra, at 20; J.
Barlow, supra, at 10-11; Zachary, supra, at B4; Edelman, supra, at 39;
"Kapor Forms Group to Aid Hackers," supra, at 2B; "Computer Foundation
Planned," supra, at C4; O'Connor, supra, at 8F; Markoff, "U.S. Drops
Computer Case against Student," New York Times, July 28, 1990, at 9.
*On May 8, 1990(FN6), as part of "Operation Sun Devil," another
bulletin board, called "RIPCO," was raided. All of the equipment
necessary to run the bulletin board was seized. The RIPCO board had
operated since 1983, and it had accumulated extensive text files which
were accessible to its 600 users. No arrests were made, nor have any
charges been filed against the operators. But the board was shut down.
See, e.g., Thomas & Meyer, "Update on Ripco BBS and Dr. Ripco," 1 Computer
Underground Digest, #1.26, (Aug. 2, 1990) (available on the WELL, Apr. 12,
1991).
*Also frequent are instances where computers are seized incident
to an unrelated arrest. For example, on February 28, 1991, following an
arrest on charges of rape and battery, the Massachusetts state and local
police seized the suspect's computer equipment. The suspect reportedly
operated a 650-subscriber bulletin board called "BEN," which is described
as "geared largely to a gay/leather/S&M crowd." It is not clear what the
board's seizure is supposed to have accomplished, but the board is now
shut down, and the identities and messages of its users are in the hands
of the police. See Boyce, "Police Confiscate SM Files," Gay Community
News, Mar. 11-17, 1991, at 3.(FN7)
The Gulf between Law Enforcement
Procedure and the Constitution.
This small sampling of cases demonstrates the unequivocal
determination of the government to conduct investigative seizures of
entire computer systems, even when only a few files may be relevant to an
investigation or prosecution. Such seizures can have immediate and
catastrophic effects on computer users who have no connection to the
conduct being investigated. Offices cease to function; businesses can no
longer operate or service customers; bulletin boards and other forums are
shut down. As discussed below, it is no exaggeration to compare such
searches and seizures to the writs of assistance and general warrants
which the Constitution's framers found so odious, and which the Fourth
Amendment was designed to prevent.
Law enforcement agencies explain this practice by referring to
problems inherent in searching not only computers but any other storage
system: The searching officers cannot know precisely which part of the
system contains the data they seek. Furthermore, with the right sort of
elegant technology, computer files can be deleted at the push of a button.
According to this view, prudence suggests that the computer search will
be futile, unless the entire system is seized and removed, so that the
contents can be examined at leisure.
That means, of course, the government's leisure, not the user's.
It is cold comfort that the Fourth Amendment tolerates searches of the
property of people not suspected of criminal conduct, and that it even
permits searches in entirely noncriminal contexts.(FN8) People who are
the victims of such a seizure are naturally outraged. Where the object of
the seizure is a bulletin board, potentially thousands of users are
deprived of a forum in which to communicate, and their words (recorded in
the computer system housing the bulletin board) now are open to government
scrutiny. The seizure of a small business's computer system, especially
one involved in sales or research and development, effectively destroys
the business. In larger companies, when the investigation into the
operations of one department or subsidiary leads to a computer seizure,
the operations of the entire company can be crippled or frozen. And, of
course, the seizure of one or two pieces of computer equipment in a law
office effectively can constitute the seizure of all of the office's
client and billing files.
The practice of conducting these searches and seizures represents
the immense gulf that exists between law enforcement personnel and
magistrates, on the one hand, and sophisticated computer users, on the
other. As Mitchell Kapor and Michael Godwin point out in "Civil Liberties
Implications of Computer Searches and Seizures: Some Proposed Guidelines
for Magistrates who Issue Search Warrants," law enforcement personnel who
conduct computer seizures seem to focus exclusively on what *could* go
wrong in a computer-related situation.(FN9) The appropriate question
under the Fourth Amendment, which every magistrate should ask before
issuing a warrant, is not what could go wrong, but instead for what
adverse events probable cause has been shown.
It may be useful for prosecutors to know that "the data in the storage
device or media can be erased, replaced with other data, hidden,
encrypted, modified, misnamed, misrepresented, physically destroyed, or
otherwise made unusable." But this does not mean that the magistrate
should always find probable cause to believe that a particular computer
owner or operator has done so, and then authorize a highly intrusive and
disruptive seizure of a BBS [computer bulletin board system] so that
investigators can do a low-level search for hidden or encrypted data.
Reprinted in Proceedings: Fourth Annual Virus & Security Conference 426,
428 (1991), quoting D. Parker, Computer Crime: Criminal Justice Resource
Manual, at 68 (1989). What seems to have happened is that prosecutors and
law enforcement agents, in their zeal to avoid even the possibility that
evidence might be lost, have gone overboard and undertaken general
searches. As noted, the seizure of an entire computer system is
equivalent to seizing all of a person's hard copy files, or (in the case
of a bulletin board system or desktop publisher) seizing an entire
printing press.
Writs of Assistance, General Searches,
and the Fourth Amendment.
Even people of the so-called "framer's intent" school of
constitutional interpretation must concede that such seizures go too far.
"The use by government of the power of search and seizure as an adjunct to
a system for the suppression of objectionable publications is not new."
Marcus v. Search Warrant, 367 U.S. 717, 724 (1961). The Writs of
Assistance, which the British Crown issued to authorize searches for, and
seizures of, unlicensed publications, were an abomination to the American
colonists. See generally Stanford v. Texas, 379 U.S. 476, 481-82 (1965).
James Otis described the general search warrants used to enforce as "the
worst instrument of arbitrary power, the most destructive of English
liberty, and the fundamental principles of law, that ever was found in an
English law book." Id. at 481, citing Boyd v. United States, 116 U.S.
616, 625 (1886). The Writs authorized the search of anyone connected with
an unlawful or unlicensed publication, and the seizure of all of the
papers and documents of such people.
The Fourth Amendment has roots in the cases of Wilkes v. Wood, 19
How. St. Tr. 1153 (1763), and Entick v. Carrington, 19 How. St. Tr. 1029
(1765), in which free-thinking pamphleteers were arrested, and all of
their books and papers seized, because of their alleged publication of
seditious libels. The Wilkes case ended in liberty's favor, when the
Court of Common Pleas ordered the Secretary of State to pay Wilkes
damages. The Entick case resulted in Lord Camden's declaration that the
power to issue Writs of Assistance, and to conduct general searches, was
an unlawful offense to civilized notions of justice. In Lord Camden's
words,
this power so assumed by the Secretary of State is an execution upon all
of the party's papers, in the first instance. His house is rifled; his
most valuable secrets are taken out of his possession, before the paper
for which he is charged is found to be criminal by any competent
jurisdiction, and before he is convicted either of writing, publishing, or
being concerned in the paper.
19 How. St. Tr. at 1064, quoted in Stanford, supra, 379 U.S. 484.
Parliament later acted legislatively to declare general warrants to be
unlawful. Stanford, supra, 379 U.S. at 484, citing 16 Hansard's
Parliamentary History of England, at 207.
The Fourth Amendment was adopted a generation after Wilkes and
Entick, while the memory of the Crown's unrestrained searches of colonial
businesses for statutory violations was fresh. The amendment provides
that all warrants shall "particularly describ[e] the place to be searched,
and the ... things to be seized." In view of the Fourth Amendment's
history, and its explicit language, it is beyond serious dispute that the
Constitution prohibits wide-ranging exploratory searches. Neither can the
police rummage through a person's belongings sua sponte, nor can a
magistrate issue a warrant permitting a general and unlimited search.
E.g., Steagald v. United States, 451 U.S. 204, 220 (1980); Lo-Ji Sales,
Inc. v. New York, 442 U.S. 319, 325-26 (1979); see also Marshall v.
Barlow's, Inc., 436 U.S. 307, 312-13 (1978); Roaden v. Kentucky, 413 U.S.
496 (1973); Coolidge v. New Hampshire, 403 U.S. 443, 467 (1971)("[T]he
specific evil is the 'general warrant' abhorred by the colonists, and the
problem is not that of an intrusion per se, but of a general, explanatory
rummaging in a person's belongings."); Stanford, supra, 379 U.S. at
485-86; Marcus, supra, 367 U.S. at 728-29. Instead, the Fourth Amendment
plainly directs that a search shall be lawful only when it is directed to
particular items for which probable cause is demonstrable.
The courts recognize that the First and Fourth Amendments grew
from the same historical source, for the struggle for press freedom was
energized by the struggle against the license to print, and against the
prior restraints imposed by the Crown to enforce the license. In the
Supreme Court's words,
The struggle for the freedom of the press was primarily directed against
the power of the licensor ... And the liberty of the press became
initially a right to publish "without a license what formerly could be
published only with one." While this freedom from previous restraint upon
publication cannot be regarded as exhausting the guaranty of liberty, the
prevention of that restraint was a leading purpose in the adoption of that
constitutional provision.
Lovell v. City of Griffin, 303 U.S. 444, 452 (1938). The Supreme Court
commands that special care be taken when authorizing or reviewing a search
involving any entity engaged in the publication or dissemination of ideas.
"Freedom of the press" long has been interpreted broadly to
protect not only newspapers publishers and pamphleteers, e.g., Lovell,
supra, 303 U.S. at 452, but also motion pictures, Roaden, supra, 413 U.S.
496; Joseph Burstyn, Inc. v. Wilson, 343 U.S. 495, 502 (1952); United
States v. Paramount Pictures, Inc., 334 U.S. 131, 166 (1948), and even
computer bulletin boards, Legi-Tech v. Keiper, 766 F.2d 728, 734-35 (2d
Cir. 1985), from prior restraints and general searches. In order to avoid
prior restraints on speech, the particularity requirement of the Fourth
Amendment "is to be accorded the most scrupulous exactitude when the
`things [to be seized]' are books, and the basis for their seizure is the
ideas which they contain." Stanford, supra, 379 U.S.at 485, citing
Marcus, supra, 367 U.S. 717; A Quantity of Copies of Books v. Kansas, 378
U.S. 205 (1964).
The Need for Heightened Awareness
and New Limiting Rules.
The seizure of a computer's hard drive is the functional
equivalent of the seizure of all of the files in a small to medium size
law office, or all of the records of a small to medium size business.
After the seizure is accomplished, law enforcement personnel are able to
read virtually every word that had been printed in an attorney's files, or
to control the continued life of a business. It is critical that rules
and protocols be developed so that the scope of computer searches and
seizures are minimized.
Law enforcement professionals and attorneys must begin to realize
that just because it is convenient to seize a computer system (because the
system can consist of no more than a half dozen pieces of equipment), it
is not necessarily constitutional. Such seizures are tantamount to the
general searches and seizures which were generally regarded as the patent
abuses of tyranny when the Constitution was drafted.
Judges and magistrates who issue computer search warrants must
become more sensitive to the constitutional problems posed by authorizing
the seizure of entire computer systems. Because such warrants are
tantamount to the Writs of Assistance (which even the English courts under
George III condemned a generation before the United States Constitution
was adopted) the courts should be especially aware not only of Fourth
Amendment interests, but also of the First Amendment interests, when a
bulletin board or network equipment is seized. The Constitution imposes
"special restraints upon searches for and seizures of material arguably
protected by the First Amendment." Lo-Ji Sales, supra, 442 U.S. at 326
n.5.(FN10)
We all need to think more critically when dealing with the notion
that, unless entire computer systems are seized, electronic data will be
altered or destroyed. Magistrates should also require that parties
seeking a warrant similarly should demonstrate the probability that the
owner of the system is capable and willing to obliterate data within the
system during the short interval between presentation of the warrant and
commencement of the search.
To seize an entire computer system for the sake of a couple of
documents contained therein is inefficient, overly intrusive, and
potentially disastrous for the owner of the system. A better course would
be to have agents sophisticated in the use of computer equipment search
the system on-site, and to copy onto a disk the documents which motivated
the application for a warrant in the first place. Before authorizing the
seizure of entire computer systems, magistrates should require that the
applicant demonstrate probable cause for the belief that the entire system
is either completely dedicated to illegal activity, or permeated with
evidence of unlawful conduct. Wherever possible, the warrant should
authorize the seizure only of the relevant documents; if the documents
cannot be identified, then just the disks or tapes containing the relevant
documents should be taken. Too often there have been cases where a
computer operator's entire collection of disks has been seized. There is
no difference between this and ransacking a library.
Law enforcement professionals and magistrates also should be aware
of the fact that, where there are no disks, and the document to be seized
is likely to be found in the computer's central data storage (or "hard
disk"), the document easily can be copied onto a portable (or "floppy")
disk. The need to show authenticity should not justify the seizure of a
computer when disk or tape copies can be made. A document thus retrieved
still would be admissible evidence under Rule 1001(1), which defines
"writings" and "recordings" broadly to include "letters, words, or
numbers, or theirequivalent, set down by . . . magnetic impulse,
mechanical or electronic recording, or other form of data
compilation."(FN11)
It is technologically possible that a computer system is rigged
with a "booby trap or degausser," which is designed to obliterate data in
a computer when there has been unauthorized tampering. This possibility
can be invoked to justify all sorts of Fourth Amendment mischief,
including wholesale seizure and "no-knock" warrants. In fact, it is
highly unlikely that a computer system would be fitted with a such booby
trap, and this factor should not be regarded as common, but as highly
exceptional as the "Mission: Impossible" tape which self-destructs in five
seconds. When an officer posits a potential booby trap to justify a
highly intrusive and disruptive search and seizure, the courts should be
prepared to impose a heavy burden of proof on law enforcement officials
who claim that such devices are in place; law enforcement officials should
be prepared to meet such a burden.
It is worth noting, however, that in certain situations the
computer system itself is the means or instrumentality of a crime. Using
a network, software can be stolen, funds can be embezzled, and various
wire frauds can occur. See, e.g., J. McEwen, Dedicated Computer Crime
Units 1-5 (National Institute of Justice, 1989). But it is critical that
magistrates and law enforcement officials distinguish investigations where
the computer itself has been used to commit a crime, and where the
computer system merely is a channel of communication, like a telephone.
To seize a computer, because information related to a crime was merely
communicated through it, is tantamount to seizing telephones because two
co-conspirators spoke to each other over it. Proof of the crime can be
gotten by less intrusive means, and innocent third parties still may need
to use those telephones.
Law Enforcement and the
Particularity Requirement.
It is well established that search warrants should leave nothing
to the discretion of the executing officer; indiscriminate searches are
constitutionally intolerable. Indeed, any search warrant which authorizes
the search and seizure of items beyond those for which probable cause has
been demonstrated, is constitutionally defective. See, e.g., Lo-Ji Sales,
supra, 442 U.S. 319; Voss v. Bergsgaard, 774 F.2d 402, 404-05 (10th Cir.
1985)(warrant invalid where most of it authorized rummaging through files
and records for evidence pertaining to any federal crime, under the guise
of a criminal conspiracy investigation). It therefore is troubling that
law enforcement officers have so frequently resorted to the general
seizures of computer systems, which contain a myriad of different files,
when only particular files or categories of files are relevant. Even more
disturbing is the apparent insouciance with which some law enforcement
officers regard the seizure of entire systems of computer equipment; to
some officers, the particularity clause of the Fourth Amendment is not
even relevant. Illustrative is this statement by a Special Agent at the
FBI Academy:
[The Fourth Amendment "particularity"] provision requires that a warrant
authorize only a search of a specific place for specific named items.
Coupled with the probable cause requirement, this provision prevents
general searches by insuring that the warrant describes a discreet,
defined place to be searched, describes only items connected with criminal
activity for which probable cause has been established, and describes the
items so definitely that it removes from an officer executing the warrant
the discretion of determining which items are covered by the warrant and
which are not. It also provides a signal of when a search is at an end,
that is, when all items named in the warrant have been located and seized
or when all possible hiding places for items not located have been
explored. Since the "place to be searched" portion of the particularity
requirement has no special impact on computer searches, it will not be
discussed.
Sauls, "Raiding the Computer Room: Fourth Amendment Considerations (Part
I), 55 FBI Law Enforcement Bulletin 25, 29 (May 1986) (emphasis added).
Similarly, another Department of Justice publication sets forth, with
apparent approval, the following wide-ranging language in a "sample"
search warrant:
In the county of Baltimore, there is now property subject to seizure, as
such computers, keyboards, central processing units, external and/or
internal drives, internal and/or external storage devices such as magnetic
tapes and/or disks, terminals and/or video display unit and/or receiving
devices and peripheral equipment such as, but not limited to, printers,
automatic dialers, modems, acoustic couplers, and or [sic] direct line
couplers, peripheral interface boards and connecting cables or ribbons,
diaries, logs, and other records, correspondence, journals, ledgers
memoranda [sic], computer software, programs and source documentation,
computer logs, magnetic audio tapes and recorders used in the obtaining,
maintenance, and or [sic] dissemination of information obtained from the
official files and computers of the [sic] MCI Telecommunications, Inc. and
other evidence of the offense.
See, C. Connolly, Organizing for Computer Crime Investigation and
Prosecution at 81 (National Institute of Justice, 1989).
When computers are the object of the search, we see again the zeal
of the special investigating judges in the Court of High Commission under
King James I -- whose mission was "to inquire and search for . . . all
heretical, schismatical and seditious books, libels, and writings, and all
other books, pamphlets and portraitures offensive to the state or set
forth without sufficient and lawful authority in that behalf . . . and
their printing-presses themselves likewise to seize and so to order and
dispose of them . . . as they may not have to serve or be employed for any
such lawful use," Marcus, supra, 367 U.S. at 725-26, citing Pat. Roll, 9,
Jac. I, Pt. 18 & Jac. II, Pt. 15. The electronic bulletin board
appropriately should be viewed not as a weapon or burglary tool, but
instead as a First Amendment-protected institution, like the newspaper or
any public forum.(FN12) See generally, Jensen, An Electronic Soap
Box:Computer Bulletin Boards and the First Amendment, 39
Fed.Communications L.J. 217, 235P43, and authorities cited therein.
In all cases, consideration should be given to training
technologically sophisticated law enforcement officers, and having them
available to execute the computer searches. Furthermore, magistrates
should consider appointing similarly knowledgeable special masters to
supervise such searches. Such roles can be assumed by people who, though
technically literate, are not officers of the court or law enforcement
agency. See, e.g., Forro Precision, Inc. v. International Business
Machines Corp., 673 F.2d 1045, 1054 (9th Cir. 1982)(police search assisted
by IBM employee because warrants required that specific technical
documents be identified); see also, DeMassa v. Nunez, 747 F.2d 1283, 1285
(9th Cir. 1984)(court-appointed special master supervised search of law
office files, permitted seizure only of documents within scope of
warrant). Of course, the court should clearly explain to any appointed
special master the proper limits of the master's role in the search. See,
e.g., Lo-Ji Sales, supra, 442 U.S. at 321-24.
Privacy Rights of Third Parties
and Statutory Provisions.
In addition to the Constitution's basic guarantees, Congress and
various state legislatures have enacted additional privacy protections for
people who use computers, and for people whose information is stored in
them.
Magistrates and law enforcement officials should be cognizant of
the Electronic Communications Privacy Act ("ECPA"), 18 U.S.C. 2701-2711,
which protects the privacy of various electronic communications, including
e-mail. See, Kapor & Godwin, supra, at 431-32. Under the ECPA, a piece
of electronic mail cannot be reviewed or seized unless the law governing
warrants has been strictly complied with. See 18 U.S.C. 2703(a). The
language of this section seems to require that an order for the disclosure
of electronic mail must particularly describe the communications to be
sought; general rummaging and reviewing is not permitted. Id.(FN13)
Also important is the First Amendment Privacy Protection Act
("PPA"), 42 U.S.C. 2000aa et seq., which was enacted in response to the
Supreme Court's holding in Zurcher v. Stanford Daily, 436 U.S. 547 (1978).
Protected under the PPA are documents and materials "possessed in
connection with a purpose to disseminate to the public a newspaper, book,
broadcast or similar form of public communication," 42 U.S.C. 2000aa(a),
which would seem to embrace electronic bulletin boards and
publicly-accessible computer networks. The PPA operates to prohibit
blanket searches and seizures of such entities, unless there exists
"probable cause to believe that the person possessing the materials has
committed a criminal offense to which the materials relate," and such
criminal offense does not consist of "the receipt, possession,
communication or withholding of such materials." 42 U.S.C. 2000aa(a)(1).
The practical effect of the PPA would seem to be to strictly limit
wholesale computer seizures where the systems are used for bulletin boards
or other general communications. In such situations, a seizure is
appropriate only where the system's operators are directly implicated in
unlawful activity. However, where the system has been used as a conduit
by others who are criminally motivated, but the operator is not involved,
the PPA would seem to require that no search take place, but that instead
a subpoena be issued for the relevant information.
It also is worth noting that the Attorney General has issued
guidelines under the PPA, governing the execution of search warrants where
highly confidential or personal information relating to innocent third
parties might fall into the hands of law enforcement authorities. See 28
C.F.R., Part 59. Under the guidelines, federal officials should "not use
search and seizure to obtain documentary materials in the possession of
disinterested third parties unless reliance on alternative means would
substantially jeopardize their availability. . . or usefulness," where
less obtrusive means of obtaining such materials are available. 28 C.F.R.
59.1, 59.4(a)(1). Under the PPA guidelines, "documentary materials"
include "materials upon which information is electronically or
magnetically recorded." 28 C.F.R. 59.2(c). Sensitive to the potential
for violating the privacy rights of innocent third parties, the Attorney
General's guidelines impose strict controls over search warrants executed
upon records in the custody of physicians, lawyers, or the clergy. 28
C.F.R. 29.4(b)(4). This heightened sensitivity to the privacy rights of
innocent third parties is reasonable, and should be extended to situations
where third parties other than patients, clients, and penitents are
affected by the documentary search and seizure. Considering the high
volume of communications which occur over many computer systems, and the
potential chilling effect that the government seizure of such
communications will have, magistrates and prosecutors appropriately should
impose similar limiting rules for computer seizures.
Ethical and Practical
Considerations for Attorneys.
Private defense attorneys and in-house corporate counsel also can
play a useful role in controlling the unbridled search and seizure of
computers.
They should become aware of how vulnerable their clients' computer
systems are to such searches, and of the potentially disastrous
consequences which would follow the seizure of a computer system. They
should be prepared to move for the return of seized computer equipment
under Rule 41(e), Fed.R.Crim.P., on the ground, inter alia, that the
particularity clause of the Fourth Amendment has been violated by such an
overbroad search and seizure. For the same reason, if the client is
indicted, computer searches and seizures provide fertile grounds for
suppression motions.(FN14)
Short of such disasters, however, counsel should be aware of some
of the ethical problems which computer filekeeping and communications
pose. Both the Constitution and the ethical precepts of the legal
profession protect client secrets. Although some details of the
attorney-client relationship may not be privileged -- for example, the
mere fact that the relationship exists, the identity of the client, and
the legal fees paid -- communications between counsel and client are
absolutely privileged, and attorney work-product enjoys presumptive
protection from disclosure.
The Code of Professional Responsibility prohibits the attorney
from revealing either "confidences" which a client has revealed for the
purpose of obtaining legal services, or "secrets" of the client's affairs
which, although not useful for the purpose of representation, might
embarrass the client or hurt business interests. See DR 4-101(A), (B).
The attorney-client privilege, limited by law to communications for the
purpose of seeking or rendering legal advice, is "more limited than the
ethical obligation of a lawyer to guard the confidences and the secrets of
his client." EC 4-4. The code similarly imposes on the attorney the duty
to exercise reasonable care to prevent employees, associates and all
others from disclosing client secrets and confidences. See DR 4-101(D).
The Model Rules of Professional Conduct also are protective of
client confidences. Rule 1.1 enjoins the lawyer not to reveal
"information relating to the representation of a client." Although this
language seems to eliminate from the attorney's duties the protection of
information which, though not essential to representation, may prejudice
the client's non-legal interests, the Comment to Rule 1.1 seems to
rehabilitate the protection of non-legal client secrets. The Comment
explains that attorney-client confidentiality is necessary for the client
"to communicate fully and frankly with the lawyer even as to embarrassing
or legally damaging subject matter." (Emphasis added.) The Comment
distinguishes Rule 1.6 from DR 4-101, and it holds that the Rule's
application to information "relating to the representation" reaches
morebroadly than the Code's protection of information "gained in" the
relationship which the client has requested to be kept confidential.
In-house counsel should be certain that confidential legal files
are segregated from general corporate files. Other attorneys should make
sure that their clients similarly segregate such files on separate disks.
If possible, and especially when a particularly sensitive investigation is
underway, in-house counsel should detach its computer system from the
network upon which the rest of the company's computers operate. Clients
should be instructed to store privileged information to "floppy" disks,
and that such information should be erased completely from the computer's
memory or "hard" disks.
Counsel need to be prepared to convince a court that certain
communications were made in complete confidence. See, e.g., S.E.C. v.
Gulf & Western Industries, Inc., 518 F. Supp. 675 (D.D.C. 1981); In re
Ampicillin Antitrust Litigation, 81 F.R.D. 377 (D.D.C. 1978). It will be
harder to make this showing if it should turn out that privileged files
were accessible to anyone in the corporation. Instead, the expectation of
confidentiality should be clearly apparent from the demonstrable conduct
of the party asserting a privilege. Gulf & Western, supra, 518 F.Supp. at
682; see also, Upjohn Co. v. United States, 449 U.S. 383, 387 (1981)
(counsel should be able to show that employee was aware that
communications were for the purpose of legal advice when made).
Similarly, counsel should make sure that employees understand that
confidential communications should not be placed over a generally
accessible office computer network, and that legal communications should
be removed and segregated from parts of the system which are generally
accessible. Under certain circumstances, when privileged documents are
left in computer files where others can view them, confidentiality may
have been constructively waived. "[O]nce the privilege exists
the corporate client must be diligent in its intra-corporate
confidentiality." J. Gergacz, Attorney-Corporate Client Privilege
3.02[2][d][ii](1987) (FN15)
There is only so much counsel can do, however, to minimize the
possibility that privileged information is seized. Obviously, it would be
wasteful to restructure an entire filing system in seemingly paranoid
anticipation of a general search. But counsel should insure that the
client takes deliberate and painstaking precautions to keep its
electronically recorded confidential communications from prying eyes
within the office, as well as from without.
It is important to note that the law is far from settled on the
issue of whether privileged materials which have been abandoned or stolen
lose their protective character. Older authorities hold that all
involuntary disclosures of information remove the privilege. 8 Wigmore,
Evidence, sec. 2326 (McNaughton Rev. Ed. 1961). The modern view is to the
contrary. See, e.g., J. Gergacz, supra, 5.03[2][e]; Suburban Sew 'N
Sweep, Inc. v. Swiss-Bernina, Inc., 91 F.R.D. 254, 260 (N.D.Ill. 1981);
see also Bower v. Weisman, 669 F. Supp. 602, 606 (S.D.N.Y. 1987). But it
is safe to say that it does not help a client's case to have filed
confidential communications promiscuously in the company's computer
network. And disclosure of communications beyond employees who "need to
know" may constitute a waiver of confidentiality. See, J. Gergacz, supra,
at 5.03[3], citing James Julian, Inc. v. Raytheon Co., 93 F.R.D. 138, 142
(D.Del. 1982). As John Gergacz observes,
Courts which have strongly emphasized the confidentiality characterization
of the waiver doctrine may be less amenable to corporate policies that do
not strongly limit access by non-essential employees to the privileged
communications. Even so, corporate counsel should take care in preserving
the confidentiality of the privileged communications within the
organization. Privileged documents should be circulated only to those
corporate members who need to know. The broader the circulation list, the
less distinguishable corporate treatment of confidential communications
will be from general firm memos. In addition, . . . separate files should
be kept for privileged communications and those that are circulated should
be kept in separately marked . . . folders so as to minimize commingling
of privileged documents with nonPprivileged, even within the same filing
system. Finally, the corporation should have and follow a policy of
authorized and unauthorized access to various files.
J. Gergacz Attorney-Corporate Client Privilege, supra, 5.03[3].
Conclusion.
This suggestive (but far from exhaustive) review is a plea to
judges and magistrates, prosecutors and defense attorneys, in-house and
independent counsel, who are or may be involved in the criminal process --
to study the constitutional, ethical, strategic, and business implications
of the new computer technology more closely. Computers have essentially
miniaturized the office place; but they pose the concomitant danger of the
revival of the Writ of Assistance. True, computers enable us to easily
store, and more easily to retrieve, a wide variety of information using a
very small "file cabinet"; but one should resist the temptation to pack
everything into one system. The courts and prosecutors should be
sensitive to how close indiscriminate computer seizures come to the police
practices which precipitated a revolution. And counsel should be
sensitive to the possibility that the poorly considered use of computer
technology can erode the client's constitutional rights and privileges.
We should be alert to the computer's dangers as well as to its undeniable
convenience and other benefits.
FN1. Mr. Silverglate is a partner, and Mr. Viles an associate, at the
Boston (Mass.) law firm of Silverglate & Good. The authors are counsel to
the Electronic Frontier Foundation (EFF), which is described in this
paper, and which is involved in a few of the matters discussed here. The
authors gratefully acknowledge the help of Mitchell Kapor and Michael
Godwin of EFF, as well as of associate Sharon Beckman and legal assistants
Chauncey Wood and Gia Barresi of Silverglate & Good.
FN2. John Perry Barlow, one of the founders of the Electronic Frontier
Foundation, explains the meaning of "cyberspace" best -- it is the
totality of interconnected computer networks, and the activities taking
place on them:
The WELL ... is an example of the latest thing in frontier
villages, the computer bulletin board. In this kind of small town, Main
Street is a minicomputer to which ... as many as 64 microcomputers may be
connected at one time by phone lines and ... modems.
In this silent world, all conversation is typed. To enter it, one
forsakes both body and place and becomes a thing of words alone. You can
see what your neighbors are saying (or recently said) ... . Town meetings
are continuous and discussions rage on everything from sexual kinks to
depreciation schedules.
There are thousands of these nodes in the United States, ranging
from PC clone hamlets of a few users to mainframe metros like CompuServe,
with its 550,000 subscribers. They are used by corporations to transmit
memoranda and spreadsheets, universities to disseminate research, and a
multitude of factions, from apiarists to Zoroastrians, for purposes unique
to each.
Whether by one telephonic tendril or millions, they are all
connected to one another. Collectively, they form what their inhabitants
call the Net. It extends across the immense region of electron states,
microwaves, magnetic fields, light pulses and thought which sci-fi writer
William Gibson named Cyberspace.
J. Barlow, Crime and Puzzlement, 2P3 (1990)(emphasis in original). For
other descriptions of the range of topics open for discussion on the
networks, see Walker, "American Diary: In Thrall to the Data Bank,"
Manchester Guardian Weekly, Mar. 24, 1991, at 24, and Leccese, supra, at
18.
FN3. As of this writing, the scope of "Operation Sun Devil" is unclear.
Although many wholesale seizures of computer equipment have occurred over
the past year and a half, executed by teams of federal and state agents,
some law enforcement officers specifically have disavowed that their
particular police action was a part of "Sun Devil." For example,
"[f]ederal officials said that the raid on Steve Jackson Games [see infra]
was not part of Operation Sun Devil." Lewis, "Can Invaders Be Stopped but
Civil Liberties Upheld?," New York Times, Sept. 9, 1990, at 12F.
FN4. "GURPS" is an acronym for "Generic Universal Role-Playing System."
FN5 It is instructive to compare the experience of Phrack's young
publisher with the treatment accorded other well-known publishers of
pilfered documents. See New York Times v. United States, 403 U.S. 713
(1971).
FN6 This apparently was the climactic day for the "Sun Devil"
investigations. Barlow writes:
One May 8, 1990, Operation Sun Devil, heretofore an apparently random and
nameless trickle of Secret Service actions, swept down on the Legion of
Doom and its ilk like a bureaucratic tsunami. On that day, the Secret
Service served 27 search warrants in 14 cities from Plano, Texas to New
York, New York. ...
In a press release following the sweep, the Secret Service boasted
having shut down numerous computer bulletin boards, confiscated 40
computers, and seized 23,000 disks. They noted in their statement that
"the conceivable criminal violations of this operation have serious
implications for the health and welfare of all individuals, corporations,
and United States Government agencies relying on computers and telephones
to communicate." ...
[T]he deliciously ironic truth is that, aside from [a] 3-page
Bell South document, the hackers had neither removed nor damaged anyone's
data. Operation Sun Devil, on the other hand, had "serious implications"
for a number of folks who relied on "computers and telephones to
communicate." They lost the equivalent of about 5.4 million pages of
information. Not to mention a few computers and telephones.
J. Barlow, supra, at 14. Similar numbers were reported in Leccese,
"Hackers under Attack," supra, at 9.
FN7. It would be impossible to exaggerate the frequency with which
computer information banks containing private information of third parties
are seized, ostensibly in search of criminal evidence. A greenhouse owner
in Indiana, charged with aiding and abetting in the cultivation of
marijuana, had his computer equipment seized. More bizarre is the story
of the nonprofit California cryogenics organization, whose computer
equipment and cryogenics-related bulletin board were seized and shut down,
in the course of a coroner's office investigation into the whereabouts of
a missing human head. The organization reportedly initiated litigation
under the Electronic Communications Privacy Act, 18 U.S.C. 2701 et seq.
(discussed infra), and at this writing it appears that the case was
settled after some proceedings. See Meeks, "The Case of the Missing Head
and the Missing BBS" (available on the WELL, Apr. 12, 1991)(story reported
as originating from BIX's Microbytes newswire, no date given).
FN8. See e.g., Donovan v. Dewey, 452 U.S. 595 (1981); Zurcher v. Stanford
Daily, 436 U.S. 547, 554-55 (1978); United States v. Kahn, 415 U.S. 143,
157 (1974); See v. City of Seattle, 387 U.S. 541 (1967); Camara v.
Municipal Court, 387 U.S. 523 (1967).
FN9 See Proceedings: Fourth Annual Computer Virus & Security Conference
426P42 (1991). Kapor and Godwin are, respectively, the President and
Staff Counsel of the Electronic Frontier Foundation, a civil liberties
group headquartered in Cambridge, Massachusetts, dedicated to "civilizing
the electronic frontier." It "aims to lobby for laws to facilitate public
computer networks, and to help in the legal defense of those it considers
unjustly charged with computer crimes." See Dyson, "Commentary: Hackers'
Rights," Forbes, Jan. 7, 1991, at 288. As part of EFF's work, it has
undertaken litigation efforts on behalf of some of the parties described
above who have been subjected to computer searches and seizures (including
Steve Jackson Games and the publisher of Phrack). EFF also has intervened
as amicus curiae in other cases implicating the constitutional liberties
of bulletin board operators.
FN10. Similarly, as discussed below, courts and attorneys should be
sensitive to the interests protected by the Fifth and Sixth Amendments,
when the equipment to be seized potentially contains attorney-client
communications and legal work-product.
FN11 Furthermore, Rule 1001(3) holds that an "original" can be "any
print-out or other output readable by sight [and] shown to reflect the
data accurately," which has been taken from a "computer or similar
device." In view of this, it would seem that the Rules of Evidence have
eliminated the need for many evidentiary disputes over the admissibility
of a transcribed disk (as a supposed "duplicate") in lieu of the entire
"original" computer system's data storage.
FN12. Plainly, the decisional law has given newspapers and books stronger
and surer protection against government intrusion than it has given to the
broadcast media. Compare, e.g., Minneapolis Star and Tribune v. C.I.R.,
460 U.S. 575 (1983); Near v. Minnesota, 283 U.S. 697 (1931), with F.C.C.
v. League of Women Voters, 468 U.S. 364 (1984); Red Lion Broadcasting v.
F.C.C., 395 U.S. 367 (1969). The courts' tolerance for government
interference in broadcasting finds its principal justification in the
notion that "[u]nlike other modes of expression, radio inherently is not
available to all. That is its unique characteristic, and that is why,
unlike other modes of expression, it is subject to government regulation."
National Broadcasting Co. v. United States, 319 U.S. 190, 226 (1943). The
N.B.C. Court's observation may have been accurate in the 1940's but it is
not so today. In the past fifty years we have witnessed a dizzying
proliferation of electronic channels of communication. It would be a
mistake to assume that there is a scarcity of modes of expression on the
computer networks, and to consequently limit speech in those forums. See
generally Peretti, "Computer Publication and the First Amendment," 3
Computer Underground Digest #3.09 (Feb. 28, 1991)(available on the WELL
Apr. 12, 1991).
FN13. It should be pointed out, however, that the ECPA also sets up as
defenses to civil actions under the Act, "good faith reliance" on warrants
or court orders. See 18 U.S.C. 2707(d)(1).
FN14. Although the seizure of law office computer systems has not yet
caught on in this country, it seems that it is a only a matter of time
before it does. In the past decade, we have witnessed wide-ranging
searches through attorneys' client files. E.g., DeMassa v. Nunez, 747
F.2d 1283 (1984). Other nations already have extended this procedure to
electronic files. One example is the case of South African anti-apartheid
attorney Yunus Mahomed. According to reports, his professional activities
were "directly disrupted by police searches of his office and home in
January and again in February 1989. On the first occasion computer disks
were removed and later returned. During the second raid, the computer was
removed. Mr. Mahomed obtained an injunction restraining police from
tampering or retrieving information from the computer unless he is
present." "Lawyer to Lawyer Network," March 1989 (appeal issued by
Lawyers Committee for Human Rights).
FN15. See also Baltica-Skandinavia Insurance Co. v. Booth, Potter, Seal &
Co., No. 86-1967, 1987 U.S. Dist. LEXIS 9371 slip op. (E.D.Pa. Oct. 15,
1987), cited in J. Gergacz, supra, at 36 (Mar. 1989 Supp.)(court decided
that document intended to remain confidential when it had been filed
separately with other privileged documents, file was specially marked, and
staff was instructed concerning its confidentiality); Allen v. Burns Fry,
Ltd., No. 83 C 2915, 1987 U.S.Dist. LEXIS 4777, slip op. (N.D.Ill. June 8,
1987), cited in J. Gergacz, supra, at 36 (same). Generally, in cases
where the client is a corporation, the courts seem to be most willing to
honor the confidential nature of documents which both the attorney and
client took explicit and energetic measures to guard. Compare Lois
Sportswear U.S.A., Inc. v. Levi Strauss & Co., 104 F.R.D. 103 (S.D.N.Y.
1985)("Because the client's intent determines whether the communication
was confidential to begin with, such intent must be negated before the
confidentiality can be deemed to have been destroyed and the privilege
surrendered.").
FEDERAL REGISTER
VOL. 58, No. 243
Notices
UNITED STATES SENTENCING COMMISSION
Sentencing Guidelines for United States Courts
Part V
58 Fed. Reg. 67522
DATE: Tuesday, December 21, 1993
ACTION: Notice of proposed amendments to sentencing guidelines, policy
statements, and commentary; request for public comment. Notice of hearing.
SUMMARY: The Commission is considering promulgating certain amendments to
the sentencing guidelines, policy statements, and commentary. The proposed
amendments and a synopsis of issues to be addressed are set forth below.
The Commission may report amendments to the Congress on or before May 1,
1994. Comment is sought on all proposals, alternative proposals, and any
other aspect of the sentencing guidelines, policy statements, and
commentary.
DATES: The Commission has scheduled a public hearing on these proposed
amendments for March 24, 1994, at 9:30 a.m. at the Education Center
(concourse level), South Lobby, Thurgood Marshall Federal Judiciary
Building, One Columbus Circle, NE., Washington, DC 20002-8002.
Anyone wishing to testify at this public hearing should notify Michael
Courlander, Public Information Specialist, at (202) 273-4590 by March 10,
1994.
Public comment, including written testimony for the hearing, should be
received by the Commission no later than March 18, 1994, to be considered
by the Commission in the promulgation of amendments due to the Congress by
May 1, 1994.
ADDRESSES: Public comment should be sent to: United States Sentencing
Commission, One Columbus Circle, NE, Suite 2-500, South Lobby, Washington,
DC 20002-8002, Attention: Public Information.
FOR FURTHER INFORMATION CONTACT: Michael Courlander, Public Information
Specialist, Telephone: (202) 273-4590.
SUPPLEMENTARY INFORMATION: The United States Sentencing Commission is an
independent agency in the judicial branch of the United States Government.
The Commission is empowered under 28 U.S.C. 994(a) to promulgate sentencing
guidelines and policy statements for federal sentencing courts. The statute
further directs the Commission to review and revise periodically guidelines
previously promulgated and authorizes it to submit guideline amendments to
the Congress no later than the first day of May each year. See 28 U.S.C.
994(o), (p).
Ordinarily, the Administrative Procedure Act rule-making requirements
are inapplicable to judicial agencies; however, 28 U.S.C. 994(x) makes the
Administrative Procedure Act rulemaking provisions of 5 U.S.C. 553
applicable to the promulgation of sentencing guidelines by the Commission.
The proposed amendments are presented in one of three formats. First,
the majority of the amendments are proposed as specific revisions of a
guideline, policy statement, or commentary. Second, for some amendments,
the Commission has published alternative methods of addressing an issue,
shown in brackets. Commentators are encouraged to state their preference
among listed alternatives or to suggest a new alternative. Third, the
Commission has highlighted certain issues for comment and invites
suggestions for specific amendment language.
Section 1B1.10 of the United States Sentencing Commission Guidelines
Manual sets forth the Commission's policy statement regarding retroactivity
of amended guideline ranges. Comment is requested as to whether any of the
proposed amendments should be made retroactive under this policy statement.
Although the amendments below are specifically proposed for public
comment and possible submission to the Congress by May 1, 1994, the
Commission emphasizes that it welcomes comment on any aspect of the
sentencing guidelines, policy statements, and commentary, whether or not
the subject of a proposed amendment.
The amendments below are derived from a variety of sources, including:
monitoring and hotline data, case law review, and the recommendations of
the Judicial Conference of the United States, Department of Justice,
Federal and Community Defenders, Practitioners' Advisory Group, Probation
Officers' Advisory Group, American Bar Association Sentencing Guidelines
Committee, Families Against Mandatory Minimums, individual judges,
probation officers, attorneys, and others. Publication of a proposed
amendment or issue for comment reflects only the Commission's determination
that the amendment or issue is worthy of public comment.
As a resource when considering the proposed amendments, working group
reports prepared by Commission staff are available for inspection at
Commission offices or off-site duplication. The reports contain empirical
and legal sentencing research focusing on (1) money laundering offenses;
(2) computer-related offenses; (3) public corruption offenses; and (4)
controlled substance offenses/role in the offense. Contact the Commission's
public information specialist at (202) 273-4590 for details.
Authority: 28 U.S.C. Section 994(a), (o), (p), (x).
William W. Wilkins, Jr.,
Chairman.
Computer-Related Offenses
Chapter Two, Parts B (Offenses Involving Property) and F (Offenses
Involving Fraud or Deceit)
1. Synopsis of Proposed Amendment: This amendment adds Commentary to
SectionSection 2B1.1 (Larceny, Embezzlement, and Other Forms of Theft;
Receiving, Transporting, Transferring, Transmitting, or Possessing Stolen
Property), 2B1.3 (Property Damage or Destruction), and 2F1.1 (Fraud and
Deceit; Forgery; Offenses Involving Altered or Counterfeit Instruments
Other than Counterfeit Bearer Obligations of the United States) to address
harms that may be significant in computer-related cases but not adequately
accounted for by the loss table. In addition, this amendment revises
Appendix A (Statutory Index) for violations of 18 U.S.C. 1030 to reference
the offense guidelines that most appropriately address the underlying
harms.
Proposed Amendment: The Commentary to Section 2B1.1 captioned
"Application Notes" is amended by inserting the following additional note:]
"15. In cases in which the loss determined under subsection (b)(1) does
not fully capture the harmfulness and seriousness of the conduct, an upward
departure may be warranted. For example, an upward departure may be
warranted if the offense involved a substantial invasion of a privacy
interest. Although every violation of 18 U.S.C. Section 1030(a)(2)
(intentional, unauthorized access of financial or credit card information)
constitutes an invasion of a privacy interest, the Commission does not
consider each such invasion to be a substantial invasion of a privacy
interest. When the primary purpose of the offense was pecuniary, a sentence
within the applicable guideline range ordinarily will be sufficient. By
contrast, an upward departure may be warranted if the financial records of
a particular individual were accessed for a non-pecuniary motive.".
The Commentary to Section 2B1.3 captioned "Application Notes" is amended
in Note 4 by inserting "or interference with a telecommunications network"
immediately before "may cause".
The Commentary to Section 2B1.3 captioned "Application Notes" is amended
by inserting the following additional note: [*67523]
"5. In a case in which a computer data file was altered or destroyed,
loss can be measured by the cost to restore the file. If a defendant
intentionally or recklessly altered or destroyed a computer data file and,
due to a fortuitous circumstance, the cost to restore the file was
substantially lower than the defendant could reasonably have expected, an
upward departure may be warranted. For example, if the defendant
intentionally or recklessly damaged a valuable data base, the restoration
of which would have been very costly but for the fortuitous circumstance
that, unknown to the defendant, an annual back-up of the data base had
recently been completed thus making restoration relatively inexpensive, an
upward departure may be warranted.".
The Commentary to Section 2F1.1 captioned "Application Notes" is amended
in Note 10 by deleting the period at the end of subdivision (f) and
inserting in lieu thereof a semicolon; and by inserting the following
additional subdivisions:
"(g) the offense involved a substantial invasion of a privacy interest;
(h) the offense involved a conscious or reckless risk of harm to a
person's health or safety.".
Appendix A (Statutory Index) is amended in the line beginning "18 U.S.C.
1030(a)(2)" by deleting "2F1.1" and inserting in lieu thereof "2B1.1"; in
the line beginning "18 U.S.C. 1030(a)(3)" by deleting "2F1.1" and inserting
in lieu thereof "2B2.3"; and in the line beginning "18 U.S.C. Section
1030(a)(5)" by deleting "2F1.1" and inserting in lieu thereof "2B1.3".
Public Corruption Offenses
Chapter Two, Part C (Offenses Involving Public Officials)
2(A). Synopsis of Proposed Amendment: This amendment consolidates
SectionSection 2C1.3 (Conflict of Interest) and 2C1.4 (Payment or Receipt
of Unauthorized Compensation). Although the elements of the offenses of
conflict of interest and unauthorized payment differ in some ways, the
gravamen of the offenses is similar-unauthorized receipt of a payment in
respect to an official act. The base offense levels for both guidelines are
identical. The few cases in which these guidelines were applied usually
involved a conflict of interest offense that was associated with a bribe or
gratuity; i.e., the conflict of interest
statute was used as a plea bargaining statute. None of the cases involved
application of the adjustment in Section 2C1.3(b)(1) for planned or actual
harm to the government. In this consolidation, the adjustment for actual or
planned harm to the government is replaced by an upward departure
consideration and a cross-reference to the guidelines for offenses
involving a bribe or gratuity.
Proposed Amendment: Section 2C1.4 is deleted in its entirety.
Section 2C1.3 is amended in the title by inserting at the end "; Payment
or Receipt of Unauthorized Compensation".
Section 2C1.3 is amended by deleting subsection (b) and inserting in
lieu thereof:
"(b) Cross Reference
If the offense involved a bribe or gratuity, apply Section 2C1.1
(Offering, Giving, Soliciting, or Receiving a Bribe; Extortion Under Color
of Official Right) or Section 2C1.2 (Offering, Giving, Soliciting, or
Receiving a Gratuity), as appropriate.".
The Commentary to Section 2C1.3 captioned "Statutory Provisions" is
amended by inserting ", 209, 1909" immediately following "208".
The Commentary to Section 2C1.3 captioned "Application Note" is amended
by deleting "Note" and inserting in lieu thereof "Notes"; and by inserting
the following additional note:
"2. If the offense involved actual or planned harm to the government, an
upward departure may be warranted.".
The Commentary to Section 2C1.3 captioned "Background" is amended by
deleting:
"The maximum term of imprisonment authorized by statute is two years.",
and inserting in lieu thereof:
"It also applies to offenses involving the unlawful supplementation of
salary of various federal employees.".
(B). Synopsis of Proposed Amendment: This amendment consolidates
SectionSection 2C1.2 (Offering, Giving, Soliciting, or Receiving a
Gratuity) and 2C1.6 (Loan or Gratuity to Bank Examiner, or Gratuity for
Adjustment of Farm Indebtedness, or Procuring Bank Loan, or Discount of
Commercial Paper). Both guidelines cover offenses involving gratuities and
have identical base offense levels. The only differences between the
guidelines is the absence of adjustments in Section 2C1.6 for multiple
gratuities and high-level officials. This amendment removes this
inconsistency. In addition, an application note is inserted to clarify the
treatment of a gratuity in the form of a loan.
Proposed Amendment: Section 2C1.6 is deleted in its entirety.
The Commentary to Section 2C1.2 captioned "Statutory Provision" is
amended by deleting "Provision: 18 U.S.C. Section 201(c)(1)." and inserting
in lieu thereof "Provisions: 18 U.S.C. SectionSection 201(c)(1), 212-214,
217.".
The Commentary to Section 2C1.2 captioned "Application Notes" is amended
by inserting the following additional note:
"5. For the purposes of this guideline, a gratuity includes any unlawful
payment (including a loan). When an unlawful payment is in the form of a
loan, the value of the loan may be determined by the savings in interest
over the life of the loan under the terms given compared with the loan
terms for which the applicant would have legitimately qualified. Note,
however, that in the case of a gratuity disguised as a loan, the "value of
the gratuity" is the face value of the loan.".
The Commentary to Section 2C1.2 captioned "Background" is amended by
deleting the second, third, and fourth sentences and inserting in lieu
thereof:
"It also applies to the offer to, or acceptance by, a bank examiner of
any unlawful payment; the offer or receipt of anything of value for
procuring a loan or discount of commercial paper from a Federal Reserve
Bank; and the acceptance of a fee or other consideration by a federal
employee for adjusting or cancelling a farm debt.".
(C). Issue for Comment: The Commission invites comment on whether
SectionSection 2C1.1 (Offering, Giving, Soliciting, or Receiving a Bribe;
Extortion Under Color of Official Right) and 2C1.2 (Offering, Giving,
Soliciting, or Receiving a Gratuity) should be consolidated. Bribery and
gratuity statutes vary in their respective definitions of these offenses.
Some case law identifies the existence of a quid pro quo and related timing
issues as key distinctions between a bribe and a gratuity. In contrast,
some case law identifies Section 2C1.1 as applying to offenses in which a
"corrupt purpose" is an element of the offense of conviction, even where
there has been no quid pro quo. Moreover, review of case files indicates
that Section 2C1.2 is sometimes used as a plea bargain statute for bribery
offenses. To simplify determination of the appropriate guideline and to
ensure consistent application of the guidelines to similar conduct,
SectionSection 2C1.1 and 2C1.2 might be consolidated by providing
alternative base offense levels for bribery and gratuity offenses and by
adding clearer, more objective definitions of the conduct covered. Section
2E5.1 (Offering, Accepting, or Soliciting a Bribe or Gratuity Affecting the
Operation of an Employee Welfare or Pension Benefit Plan; Prohibited
Payments or Lending of Money by Employer or Agent to Employees,
Representatives, or Labor Organizations) uses this type of structure.
Comment is also invited on whether such a consolidation also should
include Section 2C1.7 (Fraud Involving Deprivation of the Intangible Right
to the Honest Services of Public Officials; Conspiracy to Defraud by
Interference with Governmental Functions), a guideline that shares many of
the same [*67524] specific offense characteristics and cross references.
3. Issue for Comment: The Commission invites comment on whether the
offense levels for the public corruption guidelines and other guidelines
concerning bribes and gratuities appropriately account for the seriousness
of these offenses. The Commission specifically invites comment on whether,
and if so to what extent, the offense levels of SectionSection 2C1.1,
2C1.2, 2C1.6, 2C1.7, 2B3.3, 2B4.1, and 2E5.1 should be modified or
harmonized. It is noted that Section 2C1.1 (Offering, Giving, Soliciting,
or Receiving a Bribe; Extortion Under Color of Official Right) provides a
base offense level of 10 for extortion under color of official right, but
Section 2B3.3 (Blackmail and Similar Forms of Extortion) provides a base
offense level of 9 with a possible additional 2-level enhancement under
Section 3B1.3 (Abuse of Position of Trust). Section 2C1.1 provides a base
offense level of 10 for offenses involving bribery, but guidelines
involving bribery in other contexts provide a base offense level of 8
(Section 2B4.1 (Bribery in Procurement of Bank Loan and Other Commercial
Bribery)) or 10 (Section 2E5.1 (Offering, Accepting, or Soliciting a Bribe
or Gratuity Affecting the Operation of an Employee Welfare or Pension
Benefit Plan; Prohibited Payments or Lending of Money by
Employer or Agent to Employees, Representatives, or Labor Organizations))
with a possible additional 2-level enhancement under Section 3B1.3.
Sections 2C1.2 (Offering, Giving, Soliciting, or Receiving a Gratuity) and
2C1.6 (Loan or Gratuity to Bank Examiner, or Gratuity for Adjustment of
Farm Indebtedness, or Procuring Bank Loan, or Discount of Commercial Paper)
provide a base offense level of 7, while Section 2E5.1 provides a base
offense level of 6 for a gratuity with a possible additional 2-level
enhancement under Section 3B1.3.
The Department of Justice has recommended an increase in the offense
levels for SectionSection 2C1.1, 2C1.2, and 2C1.7, with a specific
recommendation for an increase in the base offense level of Section 2C1.1
from 10 to 14 in order to reflect more adequately the seriousness of this
conduct and to prevent any defendant to whom this guideline applies from
being eligible for a non-imprisonment sentence.
4(A). Synopsis of Proposed Amendment: The adjustments in SectionSection
2C1.1 (Offering, Giving, Soliciting, or Receiving a Bribe; Extortion Under
Color of Official Right) and 2C1.2 (Offering, Giving, Soliciting, or
Receiving a Gratuity) for more than one bribe, extortion, or gratuity were
designed to reflect the increased culpability associated with offenses that
involve more than a single incident. Commission data indicate that a
majority of cases involve more than one such incident. Option 1 would
retain these adjustments but make the commentary and guideline language for
SectionSection 2C1.1 and 2C1.2 more consistent. Option 2 would eliminate
these adjustments as substantially duplicative with the adjustment based on
value or benefit of the payment because multiple instances typically are
associated with larger values or benefits.
Proposed Amendment: [Option 1: Section 2C1.1(b)(1) is amended by
deleting "bribe" and inserting in lieu thereof "incident of bribery".
Section 2C1.2(b)(1) is amended by inserting "incident of offering,
giving, soliciting, or receiving a" immediately following "one".
The Commentary to Section 2C1.2 captioned "Application Notes" is amended
in Note 4 by inserting the following additional sentence as the first
sentence:
"Subsection (b)(1) provides an adjustment for offenses involving more
than one incident of offering, giving, soliciting, or receiving a
gratuity.".]
[Option 2: Section 2C1.1(b) is amended by deleting subdivision (1); by
renumbering subdivision (2) as subdivision (1); and in the caption by
deleting "Characteristics" and inserting in lieu thereof "Characteristic".
The Commentary to Section 2C1.1 captioned "Application Notes" is amended
by deleting Note 6.
Section 2C1.2(b) is amended by deleting subdivision (1); by renumbering
subdivision (2) as subdivision (1); and in the caption by deleting
"Characteristics" and inserting in lieu thereof "Characteristic".
The Commentary to Section 2C1.2 captioned "Application Notes" is amended
by deleting Note 4.]
(B). Issue for Comment: The Commission invites comment on whether the
discussion of the adjustments for multiple payments in the Commentary to
SectionSection 2C1.1 (Offering, Giving, Soliciting, or Receiving a Bribe;
Extortion Under Color of Official Right) and 2C1.2 (Offering, Giving,
Soliciting, or Receiving a Gratuity) should be amended to facilitate more
consistent application of these adjustments.
5(A). Synopsis of Proposed Amendment: This amendment makes the
adjustments for value of the payment and high-level official in
SectionSection 2C1.1 (Offering, Giving, Soliciting, or Receiving a Bribe;
Extortion Under Color of Official Right), 2C1.2 (Offering, Giving,
Soliciting, or Receiving a Gratuity), and 2C1.7 (Fraud Involving
Deprivation of the Intangible Right to the Honest Services of Public
Officials; Conspiracy to Defraud by Interference with Governmental
Functions) cumulative, rather than alternative, so as to reflect the harm
involved in offenses involving both high values of payment or benefit and
high-level officials. The Commission invites comment on the proper level of
adjustment for high-level officials if these adjustments are made
cumulative.
Proposed Amendment: Section 2C1.1(b) is amended by deleting: "(2) (If
more than one applies, use the greater):"; by deleting "(A)" and inserting
in lieu thereof "(2)"; by deleting "(B)" and inserting in lieu thereof
"(3)"; and by deleting "8 levels" and inserting in lieu thereof "[2-8]
levels".
Section 2C1.2(b) is amended by deleting "(2) (If more than one applies,
use the greater):"; by deleting "(A)" and inserting in lieu thereof "(2)";
by deleting "(B)" and inserting in lieu thereof "(3)"; and by deleting "8
levels" and inserting in lieu thereof "[2-8] levels".
Section 2C1.7(b) is amended by deleting "(1) (If more than one applies,
use the greater):"; by deleting "(A)" and inserting in lieu thereof "(1)";
by deleting "; or" and inserting in lieu thereof a period; by deleting
"(B)" and inserting in lieu thereof "(2)"; and by deleting "8 levels" and
inserting in lieu thereof "[2-8] levels".
(B). Issue for Comment: The Commission invites comment on whether the
definition of high-level official in SectionSection 2C1.1 (Offering,
Giving, Soliciting, or Receiving a Bribe; Extortion Under Color of Official
Right), 2C1.2 (Offering, Giving, Soliciting, or Receiving a Gratuity), and
2C1.7 (Fraud Involving Deprivation of the Intangible Right to the Honest
Services of Public Officials; Conspiracy to Defraud by Interference with
Governmental Functions) should be modified to facilitate more consistent
application of this adjustment. [*67525] Case review indicates some
confusion as to whether this adjustment is to be applied, for example, to
(1) line immigration or IRS agents who do not have supervisory authority
and (2) federal procurement officials with authority to obligate
substantial agency funds for contracts. The Commission invites comment on
objective standards (e.g., specific job descriptions or titles, salary or
grade, number of employees supervised, amount of funds authorized to be
dispensed) that might be added to facilitate application of this
adjustment.
The Commission also invites comment on whether the 8-level adjustment
for high-level officials in SectionSection 2C1.1(b)(2), 2C1.2(b)(2), and
2C1.7(b)(1) should be modified as discussed below:
(1) Should the adjustment for a high-level official in Section 2C1.2
(Offering, Giving, Soliciting, or Receiving a Gratuity) be reduced by [2-6]
levels to limit the frequency with which the adjustment results in
sentences at the statutory maximum? This adjustment is applied in
approximately 15 percent of the cases under Section 2C1.2 and typically
results in an adjusted offense level 17 (base offense level 7 plus 2 levels
for multiple gratuities and 8 levels for high-level official). The
resulting guideline range (assuming criminal history category I) is 15-21
months (if a 3-level acceptance of responsibility reduction applies) and
18-24 months (if a 2-level acceptance of responsibility reduction applies);
the statutory maximum for this offense is 24 months.
(2) Should the adjustment for a high-level official in SectionSection
2C1.1 (Offering, Giving, Soliciting, or Receiving a Bribe; Extortion Under
Color of Official Right), 2C1.2 (Offering, Giving, Soliciting, or Receiving
a Gratuity), and 2C1.7 (Fraud Involving Deprivation of the Intangible Right
to the Honest Services of Public Officials; Conspiracy to Defraud by
Interference with Governmental Functions) be modified to provide different
adjustments ([2-12] levels) depending on the level of authority,
responsibility, salary, or other characteristics of the public officials
involved; should it be reduced to moderate the impact of this adjustment
which is relatively large in comparison with most guideline adjustments; or
should the current adjustment remain and, as recommended by the Department
of Justice, an additional subdivision be created increasing the adjustment
to 12 levels for elected or very high-level officials (a legislator,
department or agency head, a judge, a presidential appointee, or another
person at a similarly high level of state or federal government)?
(3) Instead of, or in addition to, modifying the current 8-level
adjustment for a high-level official in SectionSection 2C1.1 (Offering,
Giving, Soliciting, or Receiving a Bribe; Extortion Under Color of Official
Right), 2C1.2 (Offering, Giving, Soliciting, or Receiving a Gratuity), and
2C1.7 (Fraud Involving Deprivation of the Intangible Right to the Honest
Services of Public Officials; Conspiracy to Defraud by Interference with
Governmental Functions), should the Commission amend the commentary to
authorize or recommend a departure in certain cases? Examples might include
a suggested downward departure in cases of particularly low-level elected
public officials (e.g., an elected treasurer to a local school board) or a
suggested upward departure in cases of very high-level officials.
6(A). Synopsis of Proposed Amendment: This amendment clarifies that the
term "payment" in SectionSection 2C1.1 (Offering, Giving, Soliciting, or
Receiving a Bribe; Extortion Under Color of Official Right) and 2C1.7
(Fraud Involving Deprivation of the Intangible Right to the Honest Services
of Public Officials; Conspiracy to Defraud by Interference with
Governmental Functions) refers to anything of value and need not be
monetary. In addition, this amendment clarifies the definition of the value
of "the benefit received or to be received" in respect to cases involving
extortion under color of official right. Finally, this amendment clarifies
that the term "high-level official" for purposes of Section 2C1.7(b)(1) is
limited to high-level public officials.
Proposed Amendment: The Commentary to Section 2C1.1 captioned
"Application Notes" is amended in Note 2 by inserting the following
additional sentence as the second sentence:
""Payment" means anything of value.";
and by inserting the following additional sentence at the end:
"In offenses involving extortion under color of official right, the
value of "the benefit received or to be received" includes the value of the
benefit that would have been denied, or the loss that would have been
caused, to the victim had the victim not made the extorted payment.".
Section 2C1.7(b)(1)(B) is amended by inserting "public" immediately
before "official" each time the latter term appears.
The Commentary to Section 2C1.7 captioned "Application Notes" is amended
in Note 2 by deleting "Official" and inserting in lieu thereof "Public
official".
(B). Issue for Comment: The Commission invites comment on whether
Application Note 2 of the Commentary to Section 2C1.1 (Offering, Giving,
Soliciting, or Receiving a Bribe; Extortion Under Color of Official Right)
defining "benefit received" should be clarified to address varying
approaches among the circuits as to the extent to which the defendant is to
be held accountable for relevant conduct of others. Compare United States
v. Muldoon, 931 F.2d 282 (4th Cir. 1991) with United States v. Ellis, 951
F.2d 580 (4th Cir. 1991), cert. denied, 112 S. Ct. 3030 (1992), United
States v. Kant, 946 F.2d 267 (4th Cir. 1991), and United States v. Narvaez,
995 F.2d 759 (7th Cir. 1993).
(C). Synopsis of Proposed Amendment: This amendment adds an application
note to SectionSection 2C1.1 (Offering, Giving, Soliciting, or Receiving a
Bribe; Extortion Under Color of Official Right) and 2C1.7 (Fraud Involving
Deprivation of the Intangible Right to the Honest Services of Public
Officials; Conspiracy to Defraud by Interference with Governmental
Functions) authorizing an upward departure where the offense involved
ongoing harm or a risk of ongoing harm to a government entity or program to
address cases in which a public official engages in behavior for a
significant period of time even though the additional benefit received by
the person is small or difficult to quantify.
Proposed Amendment: The Commentary to Section 2C1.1 captioned
"Application Notes" is amended by inserting the following additional note:
"7. If the offense involved ongoing harm, or a risk of ongoing harm, to
a government entity or program, an upward departure may be warranted.".
The Commentary to Section 2C1.7 captioned "Application Notes" is amended
by inserting the following additional note:
"6. If the offense involved ongoing harm, or a risk of ongoing harm, to
a government entity or program, an upward departure may be warranted.".
7. Issue for Comment: Section 994(d) of title 28, United States Code,
requires the Commission to "assure that the guidelines and policy
statements are entirely neutral as to the race, sex, national origin,
creed, and socioeconomic status of offenders." Some courts have determined
that departures may be based on certain factors such as cultural
characteristics of the defendant or the collateral consequences that a
public official might encounter as a result of a conviction. See United
States v. Aguilar, 994 F.2d 609 (9th Cir. 1993) (collateral consequences);
United States v. Yu, 954 F.2d 951 (3d Cir. 1992) (leaving to Commission the
question of permissibility of departure for cultural characteristics in IRS
bribery case); United States v. Swapp, 719 F. Supp. 1015 (D. Utah 1989)
(downward departure justified for defendant convicted of damaging church
with explosives because defendant operated in context of unique cultural
history and culturally isolated family). The Commission invites comment on
how it might resolve these competing policy concerns. The Commission also
invites comment on whether additional departures should be suggested to
[*67526] address unusual types of public corruption cases.
Drug Offenses and Role in the Offense
Chapter Two, Part D (Offenses Involving Drugs) and Chapter Three, Part B
(Role in the Offense)
8(A). Synopsis of Proposed Amendment: This amendment keys the mandatory
minimum levels in the Drug Quantity Table to levels 30 and 24, rather than
32 and 26, and sets the upper limit of this table at Level 38. When the
Commission initially developed the Drug Quantity Table, it keyed the
offense level for 1 KG of heroin (10 year mandatory minimum) at level 32
(121-151 months for a first offender) and 100 grams of heroin (5 year
mandatory minimum) at level 26 (63-78 months for a first offender) because
these guideline ranges included the 5 and 10 year mandatory minimum
sentences. However, offense levels 30 (97-121 months) and 24 (51-63 months)
also include the 5 year and 10 year mandatory minimum sentences, as do
offense levels 31 (108-135 months) and 25 (57-71 months). This amendment
revises the Drug Quantity Table to reflect mandatory minimums at levels 30
and 24, rather than 32 and 26. In addition, the upper limit of the Drug
Quantity Table is set at level 38. As an organizer or leader of a very
large operation generally will receive a 4-level increase for an
aggravating role, and may receive an additional 2-level weapon enhancement,
extension of the Drug Quantity Table above level 38 for quantity itself
does not seem required.
Proposed Amendment: Section 2D1.1(c) is amended by deleting subdivisions
1-12; by renumbering subdivisions 13-19 as 11-17; and by inserting the
following as subdivisions 1-10:
Level 38
"(1) 100 KG or more of Heroin (or the equivalent amount of other
Schedule I or II Opiates);
500 KG or more of Cocaine (or the equivalent amount of other Schedule I
or II Stimulants);
5 KG or more of Cocaine Base;
100 KG or more of PCP, or 10 KG or more of PCP (actual);
100 KG or more of Methamphetamine, or 10 KG or more of Methamphetamine
(actual), or 10 KG or more of "Ice";
1 KG or more of LSD (or the equivalent amount of other Schedule I or II
Hallucinogens);
40 KG or more of Fentanyl;
10 KG or more of a Fentanyl Analogue;
100,000 KG or more of Marihuana;
20,000 KG or more of Hashish;
2,000 KG or more of Hashish Oil.
Level 36
(2) At least 30 KG but less than 100 KG of Heroin (or the equivalent
amount of other Schedule I or II Opiates);
At least 150 KG but less than 500 KG of Cocaine (or the equivalent
amount of other Schedule I or II Stimulants);
At least 1.5 KG but less than 5 KG of Cocaine Base;
At least 30 KG but less than 100 KG of PCP, or at least 3 KG but less
than 10 KG of PCP (actual);
At least 30 KG but less than 100 KG of Methamphetamine, or at least 3 KG
but less than 10 KG of Methamphetamine (actual), or at least 3 KG but less
than 10 KG of "Ice";
At least 300 G but less than 1 KG of LSD (or the equivalent amount of
other Schedule I or II Hallucinogens);
At least 12 KG but less than 40 KG of Fentanyl;
At least 3 KG but less than 10 KG of a Fentanyl Analogue;
At least 30,000 KG but less than 100,000 KG of Marihuana;
At least 6,000 KG but less than 20,000 KG of Hashish;
At least 600 KG but less than 2,000 KG of Hashish Oil.
Level 34
(3) At least 10 KG but less than 30 KG of Heroin (or the equivalent
amount of other Schedule I or II Opiates);
At least 50 KG but less than 150 KG of Cocaine (or the equivalent amount
of other Schedule I or II Stimulants);
At least 500 G but less than 1.5 KG of Cocaine Base;
At least 10 KG but less than 30 KG of PCP, or at least 1 KG but less
than 3 KG of PCP (actual);
At least 10 KG but less than 30 KG of Methamphetamine, or at least 1 KG
but less than 3 KG of Methamphetamine (actual), or at least 1 KG but less
than 3 KG of "Ice";
At least 100 G but less than 300 G of LSD (or the equivalent amount of
other Schedule I or II Hallucinogens);
At least 4 KG but less than 12 KG of Fentanyl;
At least 1 KG but less than 3 KG of a Fentanyl Analogue;
At least 10,000 KG but less than 30,000 KG of Marihuana;
At least 2,000 KG but less than 6,000 KG of Hashish;
At least 200 KG but less than 600 KG of Hashish Oil.
Level 32
(4) At least 3 KG but less than 10 KG of Heroin (or the equivalent
amount of other Schedule I or II Opiates);
At least 15 KG but less than 50 KG of Cocaine (or the equivalent amount
of other Schedule I or II Stimulants);
At least 150 G but less than 500 G of Cocaine Base;
At least 3 KG but less than 10 KG of PCP, or at least 300 G but less
than 1 KG of PCP (actual);
At least 3 KG but less than 10 KG of Methamphetamine, or at least 300 G
but less than 1 KG of Methamphetamine (actual), or at least 300 G but less
than 1 KG of "Ice";
At least 30 G but less than 100 G of LSD (or the equivalent amount of
other Schedule I or II Hallucinogens);
At least 1.2 KG but less than 4 KG of Fentanyl;
At least 300 G but less than 1 KG of Fentanyl Analogue;
At least 3,000 KG but less than 10,000 KG of Marihuana;
At least 600 KG but less than 2,000 KG of Hashish;
At least 60 KG but less than 200 KG of Hashish Oil.
Level 30
(5) At least 1 KG but less than 3 KG of Heroin (or the equivalent amount
of other Schedule I or II Opiates);
At least 5 KG but less than 15 KG of Cocaine (or the equivalent amount
of other Schedule I or II Stimulants);
At least 50 G but less than 150 G of Cocaine Base;
At least 1 KG but less than 3 KG of PCP, or at least 100 G but less than
300 G of PCP (actual);
At least 1 KG but less than 3 KG of Methamphetamine, or at least 100 G
but less than 300 G of Methamphetamine (actual), or at least 100 G but less
than 300 G of "Ice";
At least 10 G but less than 30 G of LSD (or the equivalent amount of
other Schedule I or II Hallucinogens);
At least 400 G but less than 1.2 KG of Fentanyl;
At least 100 G but less than 300 G of a Fentanyl Analogue;
At least 1,000 KG but less than 3,000 KG of Marihuana;
At least 200 KG but less than 600 KG of Hashish;
At least 20 KG but less than 60 KG of Hashish Oil.
Level 28
(6) At least 700 G but less than 1 KG of Heroin (or the equivalent
amount of other Schedule I or II Opiates);
At least 3.5 KG but less than 5 KG of Cocaine (or the equivalent amount
of other Schedule I or II Stimulants);
At least 35 G but less than 50 G of Cocaine Base;
At least 700 G but less than 1 KG of PCP, or at least 70 G but less than
100 G of PCP (actual);
At least 700 G but less than 1 KG of Methamphetamine, or at least 70 G
but less than 100 G of Methamphetamine (actual), or at least 70 G but less
than
100 G of "Ice";
At least 7 G but less than 10 G of LSD (or the equivalent amount of
other Schedule I or II Hallucinogens);
At least 280 G but less than 400 G of Fentanyl;
At least 70 G but less than 100 G of Fentanyl Analogue;
At least 700 KG but less than 1,000 KG of Marihuana;
At least 140 KG but less than 200 KG of Hashish;
At least 14 KG but less than 20 KG of Hashish Oil.
Level 26
(7) At least 400 G but less than 700 G of Heroin (or the equivalent
amount of other Schedule I or II Opiates); [*67527]
At least 2 KG but less than 3.5 KG of Cocaine (or the equivalent amount
of other Schedule I or II Stimulants);
At least 20 G but less than 35 G of Cocaine Base;
At least 400 G but less than 700 G of PCP, or at least 40 G but less
than 70 G of PCP (actual);
At least 400 G but less than 700 G of Methamphetamine, or at least 40 G
but less than 70 G of Methamphetamine (actual), or at least 40 G but less
than 70 G of "Ice";
At least 4 G but less than 7 G of LSD (or the equivalent amount of other
Schedule I or II Hallucinogens);
At least 160 G but less than 280 G of Fentanyl;
At least 40 G but less than 70 G of a Fentanyl Analogue;
At least 400 KG but less than 700 KG of Marihuana;
At least 80 KG but less than 140 KG of Hashish;
At least 8 KG but less than 14 KG of Hashish Oil.
Level 24
(8) At least 100 G but less than 400 G of Heroin (or the equivalent
amount of other Schedule I or II Opiates);
At least 500 G but less than 2 KG of Cocaine (or the equivalent amount
of other Schedule I or II Stimulants);
At least 5 G but less than 20 G of Cocaine Base;
At least 100 G but less than 400 G of PCP, or at least 10 G but less
than 40 G of PCP (actual);
At least 100 G but less than 400 G of Methamphetamine, or at least 10 G
but less than 40 G of Methamphetamine (actual), or at least 10 G but less
than 40 G of "Ice";
At least 1 G but less than 4 G of LSD (or the equivalent amount of other
Schedule I or II Hallucinogens);
At least 40 G but less than 160 G of Fentanyl;
At least 10 G but less than 40 G of a Fentanyl Analogue;
At least 100 KG but less than 400 KG of Marihuana;
At least 20 KG but less than 80 KG of Hashish;
At least 2 KG but less than 8 KG of Hashish Oil.
Level 22
(9) At least 70 G but less than 100 G of Heroin (or the equivalent
amount of other Schedule I or II Opiates);
At least 350 G but less than 500 G of Cocaine (or the equivalent amount
of other Schedule I or II Stimulants);
At least 3.5 G but less than 5 G of Cocaine Base;
At least 70 G but less than 100 G of PCP, or at least 7 G but less than
10 G of PCP (actual);
At least 70 G but less than 100 G of Methamphetamine, or at least 7 G
but less than 10 G of Methamphetamine (actual), or at least 7 G but less
than 10 G of "Ice";
At least 700 MG but less than 1 G of LSD (or the equivalent amount of
other Schedule I or II Hallucinogens);
At least 28 G but less than 40 G of Fentanyl;
At least 7 G but less than 10 G of a Fentanyl Analogue;
At least 70 KG but less than 100 KG of Marihuana;
At least 14 KG but less than 20 KG of Hashish;
At least 1.4 KG but less than 2 KG of Hashish Oil.
Level 20
(10) At least 40 G but less than 70 G of Heroin (or the equivalent
amount of other Schedule I or II Opiates);
At least 200 G but less than 350 G of Cocaine (or the equivalent amount
of other Schedule I or II Stimulants);
At least 2 G but less than 3.5 G of Cocaine Base;
At least 40 G but less than 70 G of PCP, or at least 4 G but less than 7
G of PCP (actual);
At least 40 G but less than 70 G of Methamphetamine, or at least 4 G but
less than 7 G of Methamphetamine (actual), or at least 4 G but less than 7
G of "Ice";
At least 400 MG but less than 700 MG of LSD (or the equivalent amount of
other Schedule I or II Hallucinogens);
At least 16 G but less than 28 G of Fentanyl;
At least 4 G but less than 7 G of a Fentanyl Analogue;
At least 40 KG but less than 70 KG of Marihuana;
At least 8 KG but less than 14 KG of Hashish;
At least 800 G but less than 1.4 KG of Hashish Oil;
20 KG or more of Secobarbital (or the equivalent amount of other
Schedule I or II Depressants) or Schedule III substances (except anabolic
steroids);
40,000 or more units of anabolic steroids.".
(B). Synopsis of Proposed Amendment: This amendment adds an additional
enhancement in Section 2D1.1 (Unlawful Manufacturing, Importing, Exporting,
or Trafficking; Attempt or Conspiracy) for weapon use/assault. Two options
are set forth. The Commission, in addition, invites comment on whether the
weapon enhancement should be amended to differentiate the dangerousness of
certain weapons (e.g., assault weapons, machine guns, and sawed-off
shotguns) and the number of weapons involved.
Proposed Amendment: [Option 1: Section 2D1.1(b) is amended by deleting
subdivision (1) and inserting in lieu thereof:
"(1) (A) If a firearm was discharged or a dangerous weapon (including a
firearm) was otherwise used, increase by 4 levels; or
(B) If a dangerous weapon (including a firearm) was possessed, increase
by 2 levels.";
by renumbering subdivision (2) as subdivision (3); and by inserting the
following additional subdivision:
"(2) If the offense resulted in serious bodily injury, other than that
to which subsection (a) (1) or (2) applies, increase by 2 levels.".
The Commentary to Section 2D1.1 captioned "Application Notes" is amended
in Note 3 by inserting ", "otherwise used,"" immediately before "and".]
[Option 2: Section 2D1.1 is amended by inserting the following
additional subsection:
"(e) Special Instruction
(1) If the offense involved an attempted murder or aggravated assault,
apply Section 2A2.1 (Assault With Intent to Commit Murder; Attempted
Murder) or Section 2A2.2 (Aggravated Assault) as if the defendant had been
convicted of a separate count charging such conduct.
Notes
(A) This instruction is in addition to, and not in lieu of, the
application of subsection (b)(1).
(B) The "count" established under this instruction is not to be grouped
with the count for the underlying controlled substance offense under
Section 3D1.2 (Groups of Closely Related Counts).
(C) For the purposes of this instruction, the discharge of a firearm
under circumstances that create a substantial risk of serious bodily
injury, even without the specific intent to cause such injury, is to be
treated as an aggravated assault.".]
(C). Synopsis of Proposed Amendment: This amendment revises subsection
(a)(3) of Section 2D1.1 (Unlawful Manufacturing, Importing, Exporting, or
Trafficking; Attempt or Conspiracy) to provide a ceiling in the Chapter Two
offense level for defendants who receive a mitigating role adjustment under
Section 3B1.2 (Mitigating Role). Some commentators have argued that the
current guidelines may over-punish certain low-level defendants when the
sentence is driven in large part by the quantity of drugs involved in the
offense. For such low-level defendants, the quantity of drugs involved is
often opportunistic and may be a less appropriate measure of the
seriousness of the offense than when the defendant has a mid-level or
high-level role. This amendment limits the impact quantity will play in
determining the sentence of a defendant who qualifies for a mitigating role
adjustment.
Proposed Amendment: Section 2D1.1(a)(3) is amended by inserting the
following additional sentence at the end:
"Provided, that if the defendant qualifies for a mitigating role
adjustment under Section 3B1.2 (Mitigating Role), the base offense level
shall not be greater than level [32] [30].".
(D). Issue for Comment: The Commission invites comment on whether it
should deemphasize the impact of drug quantity on offense level by using a
broader range of quantity at each level in the offense table, and
[*67528] instead provide greater enhancements for weapons or violence.
9. Synopsis of Proposed Amendment: This amendment revises Section 3B1.1
(Aggravating Role) by (1) defining "participant" more comprehensively; (2)
providing that subsection (b) applies where the defendant managed or
supervised at least four other participants, a result more consistent with
the structure of 21 U.S.C. 848 (Continuing Criminal Enterprise) (which
requires supervision of at least five other participants) and one that will
correct what appears to be an anomaly in the guideline in that a lower
level defendant who supervises only one participant in an offense with a
total of five participants currently receives a higher offense level than a
defendant who is the leader or organizer of an offense having a total of
four participants and manages or supervises all of those participants; and
(3) clarifying the interaction of Section 3B1.1 with Section 3B1.2 in the
case of a defendant who would otherwise qualify as a minor or minimal
participant but exercises limited supervision over other participants with
minor or minimal roles. This interaction has been the subject of
inconsistent interpretation, and at least one circuit court decision,
United States v. Tsai, 954 F.2d 155 (3rd Cir. 1992), has required that
sections 3B1.1 and 3B1.2 be independently and sequentially applied to the
same defendant.
Proposed Amendment: Section 3B1.1 is amended by deleting "follows:" and
inserting in lieu thereof "follows (Apply the Greatest):".
Section 3B1.1(a) is amended by deleting "a criminal activity that
involved five or more participants" and inserting in lieu thereof "the
offense, and the offense involved at least four other participants".
Section 3B1.1(b) is amended by deleting "(but not an organizer or
leader) and the criminal activity involved five or more participants or was
otherwise extensive" and inserting in lieu thereof "of at least four other
participants in the offense".
Section 3B1.1(c) is amended by deleting "in any criminal activity other
than described in (a) or (b)" and inserting in lieu thereof "of at least
one other participant in the offense".
The Commentary to Section 3B1.1 captioned "Application Notes" is amended
in Note 1 by deleting:
"A person who is not criminally responsible for the commission of the
offense (e.g., an undercover law enforcement officer) is not a
participant."
and inserting in lieu thereof:
"A person who is not criminally responsible for the offense is not
considered a participant, except as provided below:
(A) Undercover Agents. An undercover agent (a law enforcement officer or
a person operating under the direction of a law enforcement officer)
playing the role of a participant is counted as a participant (even though
he is not criminally responsible for the offense), provided that he was
recruited by, or at the direction of, a criminally responsible participant.
For example, if the defendant recruited two undercover agents to offload a
shipment of marihuana, both undercover agents would be counted as
participants for the purposes of this guideline. However, if the defendant
recruited one undercover agent to offload a shipment of marihuana and that
agent then counseled or encouraged the recruitment of other agents, only
the first undercover agent would be counted as a participant.
(B) Certain Other Persons. In unusual cases, a person may be recruited
by a criminally responsible participant for a significant role in the
offense that is typically held by a criminally responsible participant, yet
the person recruited may not be criminally responsible (1) because he is
unaware that an offense is being committed, (2) because he has not yet
reached the age of criminal responsibility, or (3) because of mental
deficiency or condition. For example, a person hired by a defendant to
solicit money for a charitable organization who was unaware that the
charitable organization was fraudulent, a person duped by a defendant into
driving the getaway car from a bank robbery who was unaware that a robbery
was being committed, or a child recruited by a defendant to deliver a
quantity of cocaine would meet these criteria. For the purposes of this
guideline, such persons are counted as participants. Note, however, that
persons such as postal employees, messengers, and taxi drivers, who are
merely performing their normal duties, and are not otherwise criminally
responsible for the offense, are not included in this provision.".
The Commentary to Section 3B1.1 captioned "Application Notes" is amended
in Note 2 by inserting the following additional paragraph at the end:
"As used in this guideline, a "manager" or "supervisor" means a person
who managed or supervised another participant, whether directly or
indirectly.".
The Commentary to Section 3B1.1 captioned "Application Notes" is amended
by renumbering Note 4 as Note 5; and by inserting the following additional
note:
"4. When a defendant, who otherwise would merit a mitigating role
reduction under Section 3B1.2 (Mitigating Role), exercised limited
supervision over participants with equal or lesser roles, do not apply an
adjustment from this section. For example, an increase in offense level
under this section would not be appropriate for a defendant whose only
function was to offload a single large shipment of marihuana, and who
supervised other offloaders of that shipment. Instead, consider such
circumstances in determining the appropriate reduction, if any, under
Section 3B1.2 (Mitigating Role).".
10. Synopsis of Proposed Amendment: This amendment revises the
Introductory Commentary of Chapter Three, Part B (Role in the Offense);
Section 3B1.2 (Mitigating Role); and the Commentary to Section 3B1.2 to
provide clearer definitions of the defendants who merit a mitigating role
reduction.
Proposed Amendment: The Introductory Commentary to Chapter Three, Part
B, is amended by deleting:
"When an offense is committed by more than one participant, Section
3B1.1 or Section 3B1.2 (or neither) may apply.",
and inserting in lieu thereof:
"In the case of criminal activity involving more than one participant,
Section 3B1.1 or Section 3B1.2, or neither section, may apply. When the
criminal activity involves only one participant, or only participants of
roughly equal culpability, neither Section 3B1.1 nor Section 3B1.2 will
apply. In some cases, some participants in a criminal activity may receive
an upward adjustment in offense level under Section 3B1.1, other
participants may receive a downward adjustment in offense level under
Section 3B1.2, and still other participants may receive no adjustment.
Section 3B1.3 may apply to offenses committed by any number of
participants.
Sections 3B1.1 (Aggravating Role) and 3B1.2 (Mitigating Role) authorize
an increase or decrease in offense level for a defendant who qualifies as
having an aggravating or mitigating role, respectively, in the criminal
activity for which he is accountable under Section 1B1.3 (Relevant
Conduct). These sections are designed to work in conjunction with Section
1B1.3. Section 1B1.3 focuses upon the acts and omissions in which the
defendant participated (i.e., that he committed, aided, abetted, counseled,
commanded, induced, procured or willfully caused) and, in the case of a
jointly-undertaken criminal activity, the acts and omissions of others in
furtherance of the jointly-undertaken criminal activity that were
reasonably foreseeable. Within the context of that criminal activity,
SectionSection 3B1.1 (Aggravating Role) and 3B1.2 (Mitigating Role) focus
upon the role and relative culpability of the defendant.
To determine whether a defendant qualifies for an increase under Section
3B1.1 or a decrease under Section 3B1.2 requires a comparative judgment.
The role and relative culpability of the defendant must be assessed in
relation to the criminal activity for which he is being held accountable
under Section 1B1.3 (Relevant Conduct).
For example, in a controlled substance trafficking offense, the Chapter
Two offense level for Defendant A who, acting alone, purchases and resells
1000 kilograms of marihuana is level 32. The same Chapter Two offense level
applies to Defendant B, a hired hand whose only role was to assist in
offloading the ship upon which the marihuana was imported; Defendant C, a
hired hand whose only role was as a deckhand on that ship; and Defendant D,
a [*67529] hired hand whose only role was to act as a lookout for that
unloading. Defendant E, who organized the importing of the marihuana, also
receives the same Chapter Two offense level, provided that he was involved
only in importing that one shipment. Although the quantity of marihuana
involved for each of these defendants (and thus the Chapter Two offense
level) is identical, criminal justice decisionmakers traditionally have
distinguished among such defendants in imposing sentence to take into
account their relative culpability (based on their respective roles). For
example, Defendant E logically would be seen as having a more culpable role
because he recruited and managed others. Defendant A, who acted alone,
would receive no role adjustment. Defendants B, C, and D logically would be
seen as having less culpable roles. Sections 3B1.1 (Aggravating Role) and
3B1.2 (Mitigating Role) are designed to provide the court with the ability
to make appropriate adjustments in offense levels on the basis of the
defendant's role and relative culpability in the criminal activity for
which he is accountable under Section 1B1.3 (Relevant Conduct).".
Section 3B1.2(a) is amended by deleting "in any criminal activity".
Section 3B1.2(b) is amended by deleting "in any criminal activity".
Section 3B1.2 is amended by deleting "In cases falling between (a) and
(b), decrease by 3 levels.".
The Commentary to Section 3B1.2 captioned "Application Notes" is amended
by renumbering Note 4 as Note 9; and by deleting Notes 1-3 and inserting in
lieu thereof:
"1. This section provides a downward adjustment in offense level for a
defendant who has a mitigating (minimal or minor) role in the criminal
activity for which the defendant is accountable under Section 1B1.3
(Relevant Conduct). One factor that determines whether a defendant warrants
a mitigating role adjustment is the defendant's role and relative
culpability in comparison with other participants, including any unindicted
participants, in the criminal activity. "Participant" is defined in the
Commentary to Section 3B1.1 (Aggravating Role).
The fact that the conduct of one participant warrants an upward
adjustment for an aggravating role (Section 3B1.1) or warrants no
adjustment, does not necessarily mean that another participant must be
assigned a downward adjustment for a mitigating role. Example: Defendant A
plans a bank robbery and hires Defendant B to commit the robbery. Defendant
B commits the actual robbery. Both defendants plead guilty to bank robbery,
and each has a Chapter Two offense level of 24. Although Defendant B may be
less culpable than Defendant A who will receive an upward adjustment under
Section 3B1.1 (Aggravating Role), Defendant B does not have a minimal or
minor role in respect to the robbery.
2. The following is a non-exhaustive list of characteristics that
ordinarily are associated with a mitigating role:
(A) The defendant performed only unskilled and unsophisticated tasks;
(B) The defendant had no decision-making authority or responsibility;
(C) Total compensation to the defendant was small in amount [, i.e.,
value of $ 1,000 or less, generally in the form of a flat fee]; and
(D) The defendant did not exercise any supervision over other
participant(s).
In addition, although not determinative, a defendant's lack of knowledge
or understanding of the scope and structure of the criminal activity and of
the activities of others may be indicative of a mitigating role.
3. With regard to offenses involving contraband (including controlled
substances), a defendant who
(A) sold, or played a substantial part in negotiating the terms of the
sale of, the contraband;
(B) had an ownership interest in any portion of the contraband; or
(C) financed any aspect of the criminal activity
shall not receive a mitigating role adjustment below the Chapter Two
offense level that the defendant would have received for the quantity of
contraband that the defendant sold, negotiated, or owned, or for that
aspect of the criminal activity that the defendant financed because, with
regard to those acts, the defendant has acted as neither a minimal nor a
minor participant.
For example, a defendant who sells 100 grams of cocaine and who is held
accountable under Section 1B1.3 (Relevant Conduct) for only that quantity
shall not be considered for a mitigating role adjustment. In contrast, a
defendant who sells 100 grams of cocaine, but who is held accountable,
pursuant to Section 1B1.3, for a jointly undertaken criminal activity
involving 5 kilograms of cocaine may, if otherwise qualified, be considered
for a mitigating role adjustment in respect to that jointly undertaken
criminal activity, but the resulting offense level may not be less than the
Chapter Two offense level for the 100 grams of cocaine that the defendant
sold.
4. A defendant who is entrusted with a quantity of contraband for
purposes of transporting such contraband (e.g., a courier or mule), shall
not receive a minimal role adjustment for that quantity of contraband that
the defendant transported. If such a defendant otherwise qualifies for a
mitigating role adjustment, consideration may be given to a minor role
adjustment.
5. [Option 1: This section does not apply if the defendant possessed a
firearm or directed or induced another participant to possess a firearm in
connection with the criminal activity.]
[Option 2: A defendant who possessed a firearm or directed or induced
another participant to possess a firearm in connection with the criminal
activity shall not receive a minimal role adjustment. If such a defendant
otherwise qualifies for a mitigating role adjustment, consideration may be
given to a minor role adjustment.]
6. To qualify for a minimal role adjustment under subsection (a), the
defendant must be one of the least culpable of the participants in the
criminal activity within the scope of Section 1B1.3 (Relevant Conduct).
Such defendants ordinarily must have all of the characteristics consistent
with a mitigating role listed in Application Note 2(a)-(d) above.
7. To qualify for a minor role adjustment under subsection (b), the
defendant must be one of the less culpable participants in the criminal
activity within the scope of Section 1B1.3 (Relevant Conduct), but have a
role that cannot be described as minimal. Such defendants ordinarily must
have most of the characteristics listed in Application Note 2(a)-(d) above.
8. Consistent with the structure of the guidelines, the defendant bears
the burden of persuasion in establishing entitlement to a mitigating role
adjustment. In determining whether a mitigating role adjustment is
warranted, the court should consider all of the available facts, including
any information arising from the circumstances of the defendant's arrest
that may be relevant to a determination of the defendant's role in the
offense. In weighing the totality of the circumstances, a court may
consider a defendant's assertion of facts that supports a mitigating role
adjustment. However, a court is not required to find, based solely on the
defendant's bare assertion, that such a role adjustment is warranted.".
The Commentary to Section 3B1.2 captioned "Background" is amended by
deleting "a defendant who plays a part in committing the offense that makes
him substantially less culpable than the average participant" and inserting
in lieu thereof "participants in the criminal activity within the scope of
Section 1B1.3 (Relevant Conduct)".
Money Laundering Offenses
Chapter Two, Part S (Money Laundering and Monetary Transaction Reporting)
11. Synopsis of Proposed Amendment: This amendment revises and
consolidates SectionSection 2S1.1 (Laundering of Monetary Instruments) and
2S1.2 (Engaging in Monetary Transactions in Property Derived from Specified
Unlawful Activity), relating the offense levels more closely to the offense
level for the underlying offense from which the funds were derived. In
cases that involved nothing more than depositing proceeds from criminal
conduct into the defendant's bank account, the offense level for the
financial transaction offense generally would be the same as the offense
level for the underlying criminal conduct. An enhancement is provided if
the offense was designed to conceal or disguise the proceeds of criminal
activity. An additional enhancement is provided if the offense involved
sophisticated money laundering.
Proposed Amendment: Sections 2S1.1 and 2S1.2 are deleted in their
entirety and the following is inserted in lieu thereof: [*67530]
"Section 2S1.1. Laundering of Monetary Instruments; Engaging in Monetary
Transactions in Property Derived From Unlawful Activity
(a) Base Offense Level (Apply the greatest):
(1) The offense level for the underlying offense from which the funds
were derived, if the defendant committed the underlying offense (or
otherwise would be accountable for the commission of the underlying offense
under Section 1B1.3 (Relevant Conduct)) and the offense level for that
offense can be determined; or
(2) 12 plus the number of offense levels from the table in Section 2F1.1
(Fraud and Deceit) corresponding to the value of the funds, if the
defendant knew or believed that the funds were the proceeds of an unlawful
activity involving the manufacture, importation, or distribution of
narcotics or other controlled substances; or
(3) 8 plus the number of offense levels from the table in Section 2F1.1
(Fraud and Deceit) corresponding to the value of the funds.
(b) Specific Offense Characteristics (Apply the Greater):
(1) If the defendant knew or believed that (A) the transactions were
designed in whole or in part to conceal or disguise the proceeds of
criminal conduct, or (B) the funds were to be used to promote further
criminal activity, increase by 2 levels.
(2) If subsection (b)(1)(A) is applicable and the offense (A) involved
placement of funds into, or movement of funds through or from a company or
financial institution outside the United States, or (B) otherwise involved
a sophisticated form of money laundering, increase by 2 levels.
Commentary
Statutory Provisions: 18 U.S.C. SectionSection 1956, 1957.
Application Notes
1. For purposes of this guideline, "value of the funds" means the amount
of the funds involved in the financial or monetary transaction that were
derived from or believed to have been derived from specified unlawful
activity.
When the total proceeds from criminal conduct are involved in the
financial or monetary transaction, the value of the funds is ordinarily
equal to the total proceeds from the criminal conduct. For example, in the
case of funds that are the proceeds from sales of contraband substances,
the value of the funds is equal to the total proceeds.
When a financial or monetary transaction involves legitimately derived
funds that have been commingled with criminally derived funds, the value of
the funds is the amount of the criminally derived funds, not the total
amount of the commingled funds. For example, if the defendant deposited $
50,000 derived from a bribe together with $ 25,000 of legitimately derived
funds, the value of the funds is $ 50,000, not $ 75,000.
In certain cases involving fraud, the total proceeds from the offense
may exceed the amount of loss caused by the offense (e.g., the defendant
fraudulently sold stock for $ 200,000 that was worth only $ 100,000 and
deposited the $ 200,000 in a bank). The value of the funds shall be
presumed to be equal to the total proceeds from the offense. However, if
the defendant is able to establish that the loss caused by the offense, as
defined in Section 2F1.1 (Fraud and Deceit), was less than the total
proceeds from the offense, the loss from the offense shall be used as the
value of the funds.
2. If the defendant is to be sentenced both on a count for an offense
from which the funds were derived and on a count under this guideline, the
counts will be grouped together under subsection (c) of Section 3D1.2
(Groups of Closely-Related Counts).
3. Subsection (b)(1)(A) is intended to provide an increase for those
cases that involve actual money laundering, i.e., efforts to make
criminally derived funds appear to have a legitimate source. This
subsection will apply, for example, when the defendant conducted a
transaction through a straw party or a front company, concealed a
money-laundering transaction in a legitimate business, or used an alias or
otherwise provided false information to disguise the true source or
ownership of the funds.
4. In order for subsection (b)(1)(B) to apply, the defendant must have
known or believed that the funds would be used to promote further criminal
activity, i.e., criminal activity beyond the underlying acts from which the
funds were derived.
5. Subsection (b)(2) is designed to provide an additional increase for
those money laundering cases that are more difficult to detect because
sophisticated steps were taken to conceal the origin of the money.
Subsection (b)(2)(B) will apply, for example, if the offense involved the
layering of transactions, i.e., the creation of two or more levels of
transaction that were intended to appear legitimate.
Background: The statutes covered by this guideline were enacted as part
of the Anti-Drug Abuse Act of 1986 and prohibit financial and monetary
transactions involving funds that are the proceeds of "specified unlawful
activity." These statutes cover a wide range of conduct. For example, they
apply to large-scale operations that engage in international laundering of
illegal drug proceeds. They also apply to a defendant who deposits $ 11,000
of fraudulently obtained funds in a bank. In order to achieve
proportionality in sentencing, this guideline generally starts from a base
offense level equivalent to that which would apply to the specified
unlawful activity from which the funds were derived. The specific offense
characteristics provide enhancements if the offense was designed to conceal
or disguise the proceeds of criminal conduct and if the offense involved
sophisticated money laundering.".
More Than Minimal Planning
Chapter One, Part B (General Application Principles) and Chapter Two, Parts
A (Offenses Against the Person), B (Offenses Involving Property), and F
(Offenses Involving Fraud or Deceit)
12(A). Synopsis of Proposed Amendment: This amendment revises the
specific offense characteristic "more than minimal planning" to distinguish
better those defendants whose culpability warrants an enhancement for this
factor. The current specific offense characteristic has been criticized as
overly broad, not well defined, and subject to inconsistent application.
Proposed Amendment: The Commentary to Section 1B1.1 captioned
"Application Notes" is amended in Note 1(f) by deleting the first two
paragraphs and inserting in lieu thereof:
""Sophisticated planning" means planning that is complex, extensive, or
meticulous.";
in the second (formerly third) paragraph by deleting the second sentence
and inserting in lieu thereof:
"By contrast, luring the victim to an isolated location by pretending to
be a prospective customer would constitute sophisticated planning.";
in the third (formerly fourth) paragraph by deleting "more than minimal"
wherever it appears and inserting in lieu thereof in each instance
"sophisticated";
and by deleting the fourth (formerly fifth) and fifth (formerly sixth)
paragraphs and inserting in lieu thereof:
"In a theft, going to a secluded area of a store to conceal the stolen
item in one's pocket would not, by itself, constitute sophisticated
planning. By contrast, fashioning a special device to conceal the stolen
property would constitute sophisticated planning.
In an embezzlement, making a false book entry to conceal the offense
entry would not, by itself, constitute sophisticated planning. By contrast,
maintaining dual accounting books; engaging in transactions through
corporate shells; using offshore bank accounts; or creating purchase orders
to, and invoices from, a dummy corporation for merchandise that was never
delivered to conceal an embezzlement would constitute sophisticated
planning.".
Section 2A2.2(b)(1) is amended by deleting "more than minimal" and
inserting in lieu thereof "sophisticated".
The Commentary to Section 2A2.2 captioned "Application Notes" is amended
in Note 2 by deleting "more than minimal" and inserting in lieu thereof
"sophisticated".
Section 2B1.1(b)(5)(A) is amended by deleting "more than minimal" and
inserting in lieu thereof "sophisticated".
The Commentary to Section 2B1.1 captioned "Application Notes" is amended
in Note 1 by deleting "More than minimal" and inserting in lieu thereof
"Sophisticated".
The Commentary to Section 2B1.1 captioned "Application Notes" is amended
by deleting Note 13; and by renumbering Note 14 as Note 13.
The Commentary to Section 2B1.1 captioned "Background" is amended by
deleting [*67531] the second paragraph and inserting in lieu thereof:
"The guidelines also provide an enhancement for sophisticated planning,
a factor related to the culpability of the offender and often to an
increased difficulty of detection and proof.".
Section 2B1.3(b)(3) is amended by deleting "more than minimal" and
inserting in lieu thereof "sophisticated".
The Commentary to Section 2B1.3 captioned "Application Notes" is amended
in Note 1 by deleting "More than minimal" and inserting in lieu thereof
"Sophisticated".
Section 2B2.1(b)(1) is amended by deleting "more than minimal" and
inserting in lieu thereof "sophisticated".
The Commentary to Section 2B2.1 captioned "Application Notes" is amended
in Note 1 by deleting "More than minimal" and inserting in lieu thereof
"Sophisticated".
Section 2F1.1(b)(2) is amended by deleting "(A) more than minimal
planning, or (B) a scheme to defraud more than one victim" and by inserting
in lieu thereof "sophisticated planning".
The Commentary to Section 2F1.1 captioned "Application Notes" is amended
in Note 2 by deleting ""More than minimal planning" (subsection (b)(2)(A))"
and inserting in lieu thereof ""Sophisticated planning"".
The Commentary to Section 2F1.1 captioned "Application Notes" is amended
by deleting Notes 3 and 18; and by renumbering the remaining notes
accordingly.
The Commentary to Section 2F1.1 captioned "Background" is amended in the
first paragraph by deleting the second sentence.
The Commentary to Section 2F1.1 captioned "Background" is amended by
deleting the second paragraph and inserting in lieu thereof:
"The extent to which an offense involved sophisticated planning is
related to the culpability of the offender and often to an increased
difficulty of detection and proof. Accordingly, the guideline provides an
enhancement for sophisticated planning.".
(B). Synopsis of Proposed Amendment: This amendment raises the base
offense level in Section 2B1.1 (Larceny, Embezzlement, and Other Forms of
Theft; Receiving, Transporting, Transferring, Transmitting, or Possessing
Stolen Property) from
level 4 to level 6 (the same as in Section 2F1.1 (Fraud and Deceit)), and
conforms the loss table in Section 2B1.1 to that in Section 2F1.1. The
effect is that the offense levels from these guidelines will be the same
regardless of the amount of loss. Currently, where the loss is $ 1,000 or
more, SectionSection 2B1.1 and 2F1.1 provide the same offense levels. Where
the loss is $ 1,000 or less, Section 2B1.1 generally provides an offense
level that is 1 or 2 levels lower than Section 2F1.1. For example, the
theft of a $ 500 check has an offense level of 5 under Section 2B1.1, but
the forgery of that check has an offense level of 6 under Section 2F1.1.
Under this amendment, these offenses would be treated more consistently.
Section 2B1.3 (which has the same structure as Section 2B1.1) is amended to
conform.
Proposed Amendment: Section 2B1.1(a) is amended by deleting "4" and
inserting in lieu thereof "6".
Section 2B1.1(b) is amended by deleting subdivision (1) and inserting in
lieu thereof the following:
"(1) If the loss exceeded $ 2,000, increase the offense level as
follows:
Loss (apply the greatest) Increase in level
(A) $ 2,000 or less No increase.
(B) More than $ 2,000 Add 1.
(C) More than $ 5,000 Add 2.
(D) More than $10,000 Add 3.
(E) More than $ 20,000 Add 4.
(F) More than $ 40,000 Add 5.
(G) More than $ 70,000 Add 6.
(H) More than $ 120,000 Add 7.
(I) More than $ 200,000 Add 8.
(J) More than $ 350,000 Add 9.
(K) More than $ 500,000 Add 10.
(L) More than $ 800,000 Add 11.
(M) More than $ 1,500,000 Add 12.
(N) More than $ 2,500,000 Add 13.
(O) More than $ 5,000,000 Add 14.
(P) More than $ 10,000,000 Add 15.
(Q) More than $ 20,000,000 Add 16.
(R) More than $ 40,000,000 Add 17.
(S) More than $ 80,000,000 Add 18.".
Section 2B1.1(b)(2) is amended by deleting "; but if the resulting
offense level is less than 7, increase to level 7".
Section 2B1.1(b) is amended by deleting subdivision (4); and by
renumbering subdivision (5) as subdivision (4).
The Commentary to Section 2B1.1 captioned "Application Notes" is amended
by deleting Note 6; and by renumbering the remaining notes accordingly.
Section 2B1.3(a) is amended by deleting "4" and inserting in lieu
thereof "6".
Section 2B1.3(b) is amended by deleting subdivision (2); and by
renumbering subdivision (3) as subdivision (2).
The Commentary to Section 2B1.3 captioned "Application Notes" is amended
by deleting Note 3; and by renumbering Note 4 as Note 3.
(C). Issue for Comment: The Commission invites comment as to whether the
loss tables in SectionSection 2B1.1 (Larceny, Embezzlement, and Other Forms
of Theft; Receiving, Transporting, Transferring, Transmitting, or
Possessing Stolen Property), 2F1.1 (Fraud and Deceit; Forgery; Offenses
Involving Altered or Counterfeit Instruments Other than Counterfeit Bearer
Obligations of the United States), and 2T4.1 (Tax Table) should be revised
to provide one-level increases with a more uniform slope from small to
large offenses [Option 1]. Some commentators have noted that the slope of
the current loss tables is not uniform throughout the range of loss in the
tables. Or, should the loss tables in SectionSection 2B1.1, 2F1.1, and
2T4.1 be revised to provide two-level increases with a more uniform slope
from small to large offenses [Option 2]? A loss table with 2-level
increments, as in the drug quantity tables in Section 2D1.1 and the
precursor and essential chemical table in Section 2D1.11, might simplify
guideline application. Examples illustrating loss tables with more uniform
slopes for Options 1 and 2 are shown below. These examples assume that the
base offense level for Section 2B1.1 is raised from 4 to 6 as proposed in
Part B of this amendment. If not, two additional divisions in the table for
Section 2B1.1 would be necessary at the lower end.
[Option 1: Sections 2B1.1(b)(1) and 2F1.1(b)(1) are deleted and the
following is inserted in lieu thereof:
"(1) If the loss exceeded $ 1,500, increase the offense level as
follows:
Loss (apply the greatest) Increase in level
(A) $ 1,500 or less No increase.
(B) More than $ 1,500 Add 1.
(C) More than $ 2,500 Add 2.
(D) More than $ 4,500 Add 3.
(E) More than $ 8,000 Add 4.
(F) More than $ 15,000 Add 5.
(G) More than $ 25,000 Add 6.
(H) More than $ 45,000 Add 7.
(I) More than $ 80,000 Add 8.
(J) More than $ 150,000 Add 9.
(K) More than $ 250,000 Add 10.
(L) More than $ 450,000 Add 11.
(M) More than $ 800,000 Add 12.
(N) More than $ 1,500,000 Add 13.
(O) More than $ 2,500,000 Add 14.
(P) More than $ 4,500,000 Add 15.
(Q) More than $ 8,000,000 Add 16.
(R) More than $ 15,000,000 Add 17.
(S) More than $ 25,000,000 Add 18.
(T) More than $ 45,000,000 Add 19.
(U) More than $ 80,000,000 Add 20.".
The table in Section 2T4.1 is deleted and the following is inserted in
lieu thereof:
"Tax loss (apply the greatest) Increase in level
(A) $ 1,500 or less Add 6.
(B) More than $ 1,500 Add 7.
(C) More than $ 2,500 Add 8.
(D) More than $ 4,500 Add 9.
(E) More than $ 8,000 Add 10.
(F) More than $ 15,000 Add 11.
(G) More than $ 25,000 Add 12.
(H) More than $ 45,000 Add 13.
(I) More than $ 80,000 Add 14.
(J) More than $ 150,000 Add 15.
(K) More than $ 250,000 Add 16.
(L) More than $ 450,000 Add 17.
(M) More than $ 800,000 Add 18.
(N) More than $ 1,500,000 Add 19.
(O) More than $ 2,500,000 Add 20.
(P) More than $ 4,500,000 Add 21.
(Q) More than $ 8,000,000 Add 22.
(R) More than $ 15,000,000 Add 23.
(S) More than $ 25,000,000 Add 24.
(T) More than $ 45,000,000 Add 25.
(U) More than $ 80,000,000 Add 26.]".
[Option 2: Section 2B1.1(b)(1) and 2F1.1(b)(1) are deleted and the
following is inserted in lieu thereof:
"(1) If the loss exceeded $ 2,500, increase the offense level as
follows:
Loss (apply the greatest) Increase in level
(A) $ 2,500 or less No increase.
(B) More than $ 2,500 Add 2.
(C) More than $ 8,000 Add 4.
(D) More than $ 25,000 Add 6.
(E) More than $ 80,000 Add 8.
(F) More than $ 250,000 Add 10.
(G) More than $ 800,000 Add 12.
(H) More than $ 2,500,000 Add 14.
(I) More than $ 8,000,000 Add 16.
(J) More than $ 25,000,000 Add 18.
(K) More than $ 80,000,000 Add 20.".
The table in Section 2T4.1 is deleted and the following is inserted in
lieu thereof:
"Tax loss (apply the greatest) Offense level
(A) $ 2,500 or less 6
(B) More than $ 2,500 8
(C) More than $ 8,000 10
(D) More than $ 25,000 12
(E) More than $ 80,000 14
(F) More than $ 250,000 16
(G) More than $ 800,000 18
(H) More than $ 2,500,000 20
(I) More than $ 8,000,000 22
(J) More than $ 25,000,000 24
(K) More than $ 80,000,000 26.".]
Career Offenders
Chapter Four, Part B (Career Offenders and Criminal Livelihood)
13(A). Synopsis of Proposed Amendment: This amendment adds additional
background commentary explaining the Commission's rationale and authority
for Section 4B1.1 (Career Offender). The amendment responds to a recent
decision by the United States Court of Appeals for the District of Columbia
Circuit in United States v. Price, 990 F.2d 1367 (D.C. Cir. 1993). In
Price, the court invalidated application of the career offender guideline
to a defendant convicted of a drug conspiracy because 28 U.S.C. 994(h),
which the Commission cites as the mandating authority for the career
offender guideline, does not expressly refer to inchoate offenses. The
court indicated that it did not foreclose Commission authority to include
conspiracy offenses under the career offender guideline by drawing upon its
broader guideline promulgation authority in 28 U.S.C. 994(a).
Proposed Amendment: The Commentary to Section 4B1.1 captioned
"Application Notes" is amended by repromulgating Note 1.
The Commentary to Section 4B1.1 captioned "Background" is amended in the
first sentence by deleting ", as defined in the statute," immediately
following "offenders"; in the second sentence by deleting "mandate" and
inserting in lieu thereof:
"directive, with the definition of a career offender tracking in large part
the criteria set forth in 28 U.S.C. 994(h). However, in accord with its
general guideline promulgation authority under 28 U.S.C. 994(a)-(f), and
its amendment authority under 28 U.S.C. 994 (o) and (p), the Commission has
modified this definition in several respects to focus more precisely on the
class of recidivist offenders for whom a lengthy term of imprisonment is
appropriate and avoid "unwarranted sentencing disparities among defendants
with similar records who have been found guilty of similar criminal conduct
* * *" 28 U.S.C. 991(b)(1)(B). The Commission's refinement of this
definition over time is consistent with Congress' choice of a directive to
the Commission rather than a mandatory minimum sentencing statute ("The
[Senate Judiciary] Committee believes that such a directive to the
Commission will be more effective; the guidelines development process can
assure consistent and rational implementation of the Committee"s view that
substantial prison terms should be imposed on repeat violent offenders and
repeat drug traffickers.' S. Rep. No. 225, 98th Cong., 1st Sess. 175
(1983))";
by deleting "98-225" and inserting in lieu thereof "No. 225"; by deleting
", 128" and inserting in lieu thereof "; 128"; by deleting ", 26, 515" and
inserting in lieu thereof "; id. at 26, 515"; by deleting "26, 517-18" and
inserting in lieu thereof "; id. at 26, 517-18"; and by beginning a new
paragraph with the fifth (formerly third) sentence.
(B). Synopsis of Proposed Amendment: This amendment revises Section
4B1.1 (Career Offender) by defining the term "offense statutory maximum" as
the statutory maximum prior to any enhancement based on prior criminal
record. That is, an enhancement of the statutory maximum sentence that
itself was based upon the defendant's prior criminal record would not be
used in determining the offense level under this guideline. This avoids
what appears to be unwarranted double counting. It is noted that when the
instruction to the Commission that underlies 4B1.1 (28 U.S.C. 994(h)) was
enacted by the Congress in 1984, the enhanced maximum sentences provided
for recidivist drug offenders (e.g., under 21 U.S.C. 841) did not exist.
Proposed Amendment: The Commentary to Section 4B1.1 captioned
"Application Notes" is amended in Note 2 by deleting the first sentence and
inserting in lieu thereof:
""Offense Statutory Maximum," for the purposes of this guideline, refers
to the maximum term of imprisonment authorized for the offense of
conviction that is a crime of violence or controlled substance offense, not
including any increase in that maximum term under a sentencing enhancement
provision that applies because of the defendant's prior criminal record
(such sentencing enhancement provisions are contained, for example, in 21
U.S.C. 841(a)(1)(B), 841(a)(1)(C), 841(a)(1)(D), and 844(a)). For example,
where the statutory maximum term of imprisonment under 21 U.S.C.
841(a)(1)(C) is increased from twenty years to thirty years because the
defendant has one or more qualifying prior drug convictions, the "Offense
Statutory Maximum" for the purposes of this guideline is twenty years and
not thirty years.".
(C). Synopsis of Proposed Amendment: This amendment makes Section 4B1.1
(Career Offender) more of a true "recidivist" provision by providing that
the offenses that resulted in the two qualifying prior convictions must be
separated by an intervening arrest for one of the offenses. Option 2
includes the provisions of Option 1 but, in addition, broadens the portion
of the career offender provision for prior convictions of a crime of
violence or possession of a weapon during and in relation to a drug
offense.
Proposed Amendment: [Option 1: Section 4B1.2(3) is amended by inserting
immediately before the period at the end of the first sentence:
"and the offenses resulting in those two convictions were separated by an
intervening arrest for one of the offenses (i.e., the defendant was
arrested for the first offense prior to committing the second offense)".]
[Option 2: Section 4B1.2(3) is amended by inserting immediately before
the period at the end of the first sentence:
"and the offenses resulting in those two convictions were separated by an
intervening arrest for one of the offenses (i.e., the defendant was
arrested for the first offense prior to committing the second offense).
Provided, that in the case of a prior felony conviction of a crime of
violence, any such [*67533] conviction countable under Section 4A1.1(f)
is also countable under this provision. In addition, any prior conviction
for carrying or possessing a weapon during and in relation to a drug
trafficking offense is to be counted separately from the underlying drug
trafficking offense".]
(D). Synopsis of Proposed Amendment: This amendment clarifies the
operation of Section 4B1.2 (Definitions of Terms Used in Section 4B1.1) and
addresses an inter-circuit conflict. In United States v. Fiore, 983 F.2d 1
(1st Cir. 1992), the First Circuit read Section 4B1.2 to include all types
of burglary despite the express listing of burglary of a dwelling in
Section 4B1.2(1)(ii). In contrast, the Fourth Circuit has held that
burglary of a commercial structure is not a "crime of violence" under
Section 4B1.2. United States v. Talbott, 902 F.2d 1129 (4th Cir. 1990).
Similarly, the Tenth Circuit has held that non-residential burglary is not
a crime of violence under Section 4B1.2. United States v. Smith, F.2d, No.
91-4169 (10th Cir. November 30, 1993).
In addition, the phrase "punishable by imprisonment for a term exceeding
one year" in Section 4B1.2(1) is redundant because it is covered by the
requirement in Section 4B1.1 that the offense be a felony. Moreover, as the
guideline is currently written, the phrase "punishable by imprisonment for
a term exceeding one year" is used in subsection (1) but not in subsection
(2), although both subsections actually contain the same requirements. This
drafting inconsistency could lead to confusion. Elimination of this phrase
resolves this issue.
Proposed Amendment: Section 4B1.2(1) is amended by deleting "punishable
by imprisonment for a term exceeding one year".
The Commentary to Section 4B1.2 captioned "Application Notes" is amended
in Note 2 by inserting the following additional paragraph at the end:
"The term "crime of violence" includes burglary of a dwelling (including
any adjacent outbuilding considered part of the dwelling). It does not
include other kinds of burglary.".
(E). Synopsis of Proposed Amendment: This amendment revises Section
4B1.2 (Definitions of Terms Used in Section 4B1.1) to narrow the portion of
the definition of crimes of violence that "otherwise involve conduct that
presents a serious risk of physical injury" to offenses that are in some
respect similar to the offenses expressly listed. Currently, Section
4B1.2(1) uses the same wording to define crime of violence as 18 U.S.C.
924(e), except that in Section 4B1.2(1) the Commission restricted the term
burglary to residential burglary. However, the Third Circuit in United
States v. Parson, 955 F.2d 858 (3rd Cir. 1992) has pointed out that
Application Note 2 calls for a considerably broader reading of the
definition of crime of violence than is set forth in 18 U.S.C. 924(e), when
this statute is read in conjunction with its legislative history. The court
found that the phrase "or otherwise involved conduct that presents a
serious potential risk of physical injury to another" in 18 U.S.C. 924(e)
was intended to cover only offenses similar to those expressly listed and
that the wording of the statute produces this result under the principle of
statutory construction "ejusdem genesis." Thus, under 18 U.S.C. 924(e),
crimes not traditionally considered crimes of violence, e.g., crimes
involving reckless or negligent child endangerment, are not included.
Although the guideline itself uses the same phraseology as the statute,
current Application Note 2 in the Commentary to Section 4B1.2 sets forth a
broader definition of the term "otherwise involved." Thus, for example,
driving while intoxicated or recklessly endangering a child by leaving it
alone might qualify as a crime of violence under the definition in Section
4B1.2, but would not qualify as a crime of violence under 18 U.S.C. 924(e).
Proposed Amendment: The Commentary to Section 4B1.2 captioned
"Application Notes" is amended in Note 2 by deleting the first paragraph
and inserting in lieu thereof:
"An offense may be a "crime of violence" under either subsection (1)(i)
or subsection (1)(ii).
Under subsection (1)(i), a "crime of violence" includes an offense that
has as an element the use, attempted use, or threatened use of physical
force against the person of another. For example, murder, voluntary
manslaughter, kidnapping, aggravated assault, forcible sex offenses, and
robbery are included under this subsection.
Under subsection (1)(ii), a "crime of violence" includes certain listed
offenses: burglary of a dwelling, arson, extortion, and offenses involving
the use of explosives (including any explosive material or destructive
device). It also includes certain unlisted offenses. For an unlisted
offense to qualify, it must both-
(a) be similar in some respect to one of the listed offenses, and
(b) involve conduct (expressly charged in the count of which the
defendant was convicted) that presents a serious potential risk of physical
injury to another.
The requirement that an unlisted offense be similar in some respect to
one of the listed offenses limits application of this definition to
offenses traditionally considered crimes of violence.";
by renumbering Notes 3 and 4 as Notes 4 and 5, respectively; and by
inserting the following as Note 3:
"3. "Crime of violence" and "controlled substance offense," as used in
this section, are based upon the offenses (instant and prior) of which the
defendant was convicted. Therefore, the conduct considered in determining
whether an offense is a crime of violence or a controlled substance offense
is the conduct set forth (i.e., expressly charged) in the count of which
the defendant was convicted; i.e., the conduct of which the defendant was
convicted is the focus of inquiry.".
The Commentary to Section 4B1.2 is amended by adding the following at
the end thereof:
"Background: The use of the phrase "or otherwise involves" following the
series of listed offenses in subsection (1)(ii) limits the unlisted
offenses to those that are similar in some respect to one of the listed
offenses under the canon of statutory interpretation "ejusdem generis."".
Chapter Five, Part H (Specific Offense Characteristics)
Chapter Five, Part K (Departures)
14. Synopsis of Proposed Amendment: This amendment addresses the issue
of a departure for an offender characteristic or other circumstance, or
combination of characteristics or circumstances, that are not ordinarily
relevant to a determination of whether a sentence should be outside the
applicable guideline range. The amendment is derived from proposals and
comments submitted by the Judicial Conference Committee on Criminal Law,
the Department of Justice, and the Federal and Community Defenders.
The Commission specifically invites comment on whether or not the
bracketed language pertaining to combination of circumstances should be
included.
Proposed Amendment: The Introductory Commentary to Chapter Five, Part H,
is amended in the second paragraph by inserting the following additional
sentence at the end:
"Furthermore, although these factors are not ordinarily relevant to the
determination of whether a sentence should be outside the applicable
guideline range, they may be relevant to this determination in exceptional
cases. See Section 5K2.0 (Grounds for Departure).".
Section 5K2.0 is amended by inserting the following additional paragraph
at the end:
"An offender characteristic or other circumstance that is not ordinarily
relevant in determining whether a sentence should be outside the applicable
guideline range may be relevant to this determination if such
characteristic or circumstance [, or [*67534] combination of
characteristics or circumstances,] is present to an unusual degree and
distinguishes the case from the "heartland" cases covered by the guidelines
in a way that is important to the statutory purposes of sentencing.".
Section 5K2.0 is amended by inserting the following at the end:
"Commentary
A useful analytic framework for the consideration of circumstances that
may warrant a departure from the applicable guideline range is set forth in
United States v. Rivera, 994 F.2d 942 (1st Cir. 1993):
(1) What features of the case, potentially, take it outside the
Guidelines' "heartland" and make of it a special, or unusual case?
(2) Has the Commission forbidden departures based on those features?
(3) If not, has the Commission encouraged departures based on those
features?
(4) If not, has the Commission discouraged departures based on those
features?
If no special features are present, or if special features are also
"forbidden" features [factors that the Commission has expressly listed as
not relevant to departure (e.g., race, sex, national origin)], then the
sentencing court, in all likelihood, simply would apply the relevant
guidelines. If the special features are "encouraged" features [factors that
the Commission has expressly listed as warranting departure in the
circumstances described (e.g., the factors listed in SectionSection
2K2.1-2K2.16)], the court would likely depart, sentencing in accordance
with the Guidelines' suggestions. If the special features are "discouraged"
features [factors that the Commission has expressly listed as not
ordinarily relevant to sentencing (e.g., family ties and
responsibilities)], the court would go on to decide whether the case is
nonetheless not "ordinary," i.e., whether the case differs from the
ordinary case in which those features are present. If the case is ordinary,
the court would not depart. If it is not ordinary, the court would go on to
consider departure.'
In the absence of a characteristic or circumstance [or combination of
characteristics or circumstances] that distinguishes a case as sufficiently
atypical to warrant a sentence different from that called for under the
guidelines, a sentence outside the guideline range is not authorized. See
18 U.S.C. 3553(b). For example, dissatisfaction with the available
sentencing range or a preference for a different sentence than that
authorized by the guidelines is not an appropriate basis for a sentence
outside the applicable guideline range.".
Guideline Simplification-Consolidation of Offense Guidelines
15. Synopsis of Proposed Amendment: In 1993, the Commission simplified
the operation of the guidelines by reducing the number of Chapter Two
offense guidelines from 179 to 150 by the consolidation of closely related
offense guidelines. The following additional consolidations of closely
related guidelines are designed to simplify further the operation of the
guidelines:
(A) Section 2A2.4 (Obstructing or Impeding Officers) is consolidated
with Section 2A2.3 (Minor Assault). The resulting offense levels are
identical, except that the cross reference to aggravated assault will apply
to both SectionSection 2A2.3 and 2A2.4, rather than only to Section 2A2.4.
This amendment also addresses a split among the circuits as to whether
subsection (c) refers to the conviction offense or is based upon
consideration of the underlying conduct (compare United States v. Jennings,
991 F.2d 725 (11 Cir. 1993) with United States v. Padilla, 961 F.2d 322 (2d
Cir. 1992)) by conforming the language in this cross reference to that used
in other cross references;
(B) Section 2B1.3 (Property Damage or Destruction) is consolidated with
Section 2B1.1 (Larceny, Embezzlement, and Other Forms of Theft; Receiving,
Transporting, Transferring, Transmitting, or Possessing Stolen Property)
with no substantive change;
(C) Section 2D2.2 (Acquiring a Controlled Substance by Forgery, Fraud,
Deception, or Subterfuge; Attempt or Conspiracy) is consolidated with
Section 2D2.1 (Unlawful Possession; Attempt or Conspiracy). The only
substantive change is that any adjustment for acquiring a controlled
substance by forgery, fraud, deceit, or subterfuge will be determined as a
sentencing factor rather than on the basis of the offense of conviction;
(D) Section 2E1.4 (Use of Interstate Commerce Facilities in the
Commission of Murder-For-Hire) is consolidated with Section 2A1.5
(Conspiracy or Solicitation to Commit Murder) with no substantive change;
(E) Section 2G1.2 (Transportation of a Minor for the Purpose of
Prostitution or Prohibited Sexual Conduct) is consolidated with Section
2G1.1 (Transportation for the Purpose of Prostitution or Prohibited Sexual
Conduct). The specific offense characteristics and cross references that
now apply only to Section 2G1.2 are added to Section 2G1.1, making these
characteristics and cross references sentencing factors (rather than
offense of conviction factors);
(F) Section 2N3.1 (Odometer Laws and Regulations) is consolidated with
Section 2F1.1 (Fraud and Deceit; Forgery; Offenses Involving Altered or
Counterfeit Instruments Other than Counterfeit Bearer Obligations of the
United States). Currently, Section 2N3.1 has the same base offense level as
Section 2F1.1 and is cross-referenced to Section 2F1.1 if more than one
vehicle was involved (one vehicle cases are infrequent; there were only 5
one-vehicle cases reported in monitoring data in 1991). Under this
consolidation, fraud by odometer tampering involving one vehicle will be
treated the same as other fraud (i.e., the specific offense characteristics
for loss and more than minimal planning will apply, if warranted);
(G) Section 2T2.2 (Regulatory Offenses) is consolidated with Section
2T1.1 (Tax Evasion; Willful Failure to File Return, Supply Information, or
Pay Tax; Fraudulent or False Returns, Statements, or Other Documents). This
amendment consolidates two infrequently applied guidelines (1 case under
Section 2T2.1 and 2 cases under Section 2T2.2 were reported in monitoring
data in 1991). Under this consolidation, the base offense level for Section
2T2.2 is raised from 4 to 6, which is the base offense most typical for
regulatory offenses; and
(H) Section 3B1.4 (Untitled) is deleted as unnecessary and inconsistent
with the remainder of the Guidelines Manual. Absent an upward or downward
adjustment under SectionSection 3B1.1-3B1.3, there is no authority for any
adjustment and thus no need for this section. The Commentary to Section
3B1.4 is moved to the Introductory Commentary of Chapter Three, Part B,
where it fits better, and a technical inaccuracy in this commentary is
corrected (the statement that a single individual cannot receive an
adjustment under this Part is accurate with respect to SectionSection 3B1.1
and 3B1.2 but inaccurate with respect to Section 3B1.3).
Proposed Amendment: (A). Section 2A2.4 is deleted in its entirety.
Section 2A2.3 is amended in the title by inserting at the end ";
Obstructing or Impeding Officers".
Section 2A2.3 is amended by inserting the following additional
subsections:
"(b) Specific Offense Characteristic
(1) If the offense involved obstructing or impeding a governmental
officer in the performance of his duty, increase by 3 levels.
(c) Cross Reference
(1) If the offense involved aggravated assault, apply Section 2A2.2
(Aggravated Assault).".
The Commentary to Section 2A2.3 captioned "Statutory Provisions" is
amended by inserting "111," immediately before "112"; by inserting "1501,
1502," immediately following "351(e),"; and by inserting ", 3056(d)"
immediately following "1751(e)".
The Commentary to Section 2A2.3 captioned "Application Notes" is amended
by inserting the following additional notes:
"3. Subsection (b)(1) reflects the fact that the victim was a
governmental officer performing official duties. Therefore, do not apply
Section 3A1.2 (Official Victim) unless the [*67535] offense level is
determined by use of the cross reference in subsection (c).
4. The offense level under this guideline does not assume any
significant disruption of governmental functions. In situations involving
such disruption, an upward departure may be warranted. See Section 5K2.7
(Disruption of Governmental Function).".
The Commentary to Section 2A2.3 captioned "Background" is deleted.
(B). Section 2B1.3 is deleted in its entirety.
Section 2B1.1 is amended in the title by inserting at the end ";
Property Damage or Destruction".
Section 2B1.1(b)(4) is amended by inserting "or destroyed" immediately
following "taken"; and by inserting "or destruction" immediately following
"taking".
Section 2B1.1 is amended by inserting the following additional
subsection:
"(c) Cross Reference
(1) If the offense involved arson, or property damage by use of
explosives, apply Section 2K1.4 (Arson; Property Damage by Use of
Explosives).".
The Commentary to Section 2B1.1 captioned "Statutory Provisions" is
amended by deleting "1702," and inserting in lieu thereof "1361, 1702,
1703,".
The Commentary to Section 2B1.1 captioned "Application Notes" is amended
by inserting the following additional note:
"15. In some cases, the monetary value of the property damaged or
destroyed may not adequately reflect the extent of the harm caused. For
example, the destruction of a $ 500 telephone line may cause an
interruption in service to thousands of people for several hours. In such
instances, an upward departure may be warranted.".
Section 2K1.4(a)(4) is amended by deleting "Section 2B1.3 (Property
Damage or Destruction)" and inserting in lieu thereof: "Section 2B1.1
(Larceny, Embezzlement, and Other Forms of Theft; Receiving, Transporting,
Transferring, Transmitting, or Possessing Stolen Property; Property Damage
or Destruction)".
Section 2H3.3(a)(2) is amended by inserting "or destruction" immediately
following "theft"; and by inserting "; Receiving, Transporting,
Transferring, Transmitting, or Possessing Stolen Property; Property Damage
or Destruction" immediately following "Theft".
Section 2H3.3(a)(3) is deleted.
The Commentary to Section 2H3.3 captioned "Background" is amended by
inserting "; Receiving, Transporting, Transferring, or Possessing Stolen
Property; Property Damage or Destruction" immediately following "Theft";
and by deleting "or Section 2B1.3 (Property Damage or Destruction)".
(C). Section 2D2.2 is deleted in its entirety.
Section 2D2.1 is amended in the title by inserting "of a Controlled
Substance; Acquiring a Controlled Substance by Forgery, Fraud, Deception,
or Subterfuge" immediately following "Possession". Section 2D2.1 is amended
by redesignating subsection (b) as subsection (c); and by inserting the
following additional subsection:
"(b) Specific Offense Characteristic
(1) If the offense involved acquiring a controlled substance by forgery,
fraud, deception, or subterfuge, and the offense level as determined above
is less than level 8, increase to level 8.".
The Commentary to Section 2D2.1 captioned "Statutory Provisions" is
amended by deleting "Section 844(a)" and inserting in lieu thereof
"SectionSection 843(a)(3), 844(a)".
The Commentary to Section 2D2.1 captioned "Background" is amended in the
second paragraph by deleting "2D2.1(b)(1)" and inserting in lieu thereof
"2D2.1(c)(1)".
(D). Section 2E1.4 is deleted in its entirety.
Section 2A1.5 is amended in the title by inserting at the end "; Use of
Interstate Commerce Facilities in the Commission of Murder For Hire".
The Commentary to Section 2A1.5 captioned "Statutory Provisions" is
amended by inserting ", 1958 (formerly Section 1952A)" immediately
following "1751(d)".
The Commentary to Section 2A1.5 is amended by inserting the following
additional subdivision:
"Application Note:
1. In the case of a defendant convicted under 18 U.S.C. 1958 (formerly
18 U.S.C. 1952A), subsection (b)(1) always will apply.".
(E). Section 2G1.2 is deleted in its entirety.
Section 2G1.1(b) is amended by deleting "Characteristic" and inserting
in lieu thereof "Characteristics"; and by inserting the following
additional subdivisions:
"(2) If the offense involved the transportation of a person who (A) has
not attained the age of twelve years, increase by 6 levels; (B) has
attained the age of twelve years but has not attained the age of sixteen
years, increase by 4 levels; or (C) has attained the age of sixteen years
but has not attained the age of eighteen years, increase by 2 levels.
(3) If subsection (b)(2) applies, and the defendant was a parent,
relative, or legal guardian of the minor, or if the minor was otherwise in
the custody, care, or supervisory control of the defendant, increase by 2
levels.".
Section 2G1.1 is amended by redesignating subsection (c) as subsection
(d); and by inserting the following additional subsection:
"(c) Cross References
(1) If the offense involved causing, transporting, permitting, or
offering or seeking by notice or advertisement, a minor to engage in
sexually explicit conduct for the purpose of producing a visual depiction
of such conduct, apply Section 2G2.1 (Sexually Exploiting a Minor by
Production of Sexually Explicit Visual or Printed Material; Custodian
Permitting Minor to Engage in Sexually Explicit Conduct; Advertisement for
Minors to Engage in Production).
(2) If the offense involved criminal sexual abuse, attempted criminal
sexual abuse, or assault with intent to commit criminal sexual abuse, apply
Section 2A3.1 (Criminal Sexual Abuse; Attempt or Assault with the Intent to
Commit Criminal Sexual Abuse).
(3) If the offense did not involve transportation for the purpose of
prostitution, and neither subsection (c)(1) nor (c)(2) is applicable, use
the offense guideline applicable to the underlying prohibited sexual
conduct. If no offense guideline is applicable to the prohibited sexual
conduct, apply Section 2X5.1 (Other Offenses).".
Section 2G1.1(d) (formerly subsection (c)) is amended by deleting
"Instruction" and inserting in lieu thereof "Instructions"; and by
inserting the following additional subdivision:
"(2) For the purposes of this guideline, "transportation" includes (A)
transporting a person for the purpose of prostitution or prohibited sexual
conduct, and (B) persuading, inducing, enticing, or coercing a person to
travel for the purpose of prostitution or prohibited sexual conduct.".
The Commentary to Section 2G1.1 captioned "Statutory Provisions" is
amended by inserting ", 2423" immediately following "2422".
The Commentary to Section 2G1.1 captioned "Application Notes" is amended
by deleting Note 1 and inserting in lieu thereof:
"1. "Sexually explicit conduct," as used in this guideline, has the
meaning set forth in 18 U.S.C. 2256.".
The Commentary to Section 2G1.1 captioned "Application Notes" is amended
by inserting the following additional notes:
"6. Subsection (b)(4) is intended to have broad application and includes
offenses involving a minor entrusted to the defendant, whether temporarily
or permanently. For example, teachers, day care providers, baby-sitters, or
other temporary caretakers are among those who would be subject to this
enhancement. In determining whether to apply this adjustment, the court
should look to the actual relationship that existed between the defendant
and the child and not simply to the legal status of the defendant-child
relationship.
7. If the adjustment in subsection (b)(4) applies, do not apply Section
3B1.3 (Abuse of Position of Trust or Use of Special Skill).
8. The cross reference in subsection (c)(1) is to be construed broadly
to include all instances where the offense involved [*67536] employing,
using, persuading, inducing, enticing, coercing, transporting, permitting,
or offering or seeking by notice or advertisement, a minor to engage in
sexually explicit conduct for the purpose of producing any visual depiction
of such conduct.
9. The cross reference at subsection (c)(3) addresses the unusual case
in which the offense did not involve transportation for the purpose of
prostitution and neither subsection (c)(1) nor (c)(2) is applicable. In
such case, the guideline for the underlying prohibited sexual conduct is to
be used, e.g., Section 2A3.2 (Criminal Sexual Abuse of a Minor (Statutory
Rape) or Attempt to Commit Such Acts) or Section 2A3.4 (Abusive Sexual
Contact or Attempt to Commit Abusive Sexual Contact). If there is no
offense guideline for the underlying prohibited sexual conduct, Section
2X5.1 (Other Offenses) is to be used.".
(F). Section 2N3.1 is deleted in its entirety.
The Commentary to Section 2F1.1 captioned "Statutory Provisions" is
amended by inserting ", 1983-1988, 1990c" immediately following "1644".
The Commentary to Section 2F1.1 captioned "Background" is amended by
inserting the following additional paragraph at the end:
"This guideline also covers offenses relating to odometer laws and
regulations.".
(G). Section 2T2.2 is deleted in its entirety.
The Introductory Commentary to Subpart Two of Chapter Two, Part T, is
amended by deleting the last two sentences.
Section 2T2.1(a) is amended by deleting "Level from Section 2T4.1 (Tax
Table) corresponding to the tax loss." and inserting in lieu thereof:
"(1) Level from Section 2T4.1 (Tax Table) corresponding to the tax loss;
(2) 6, if there is no tax loss.".
(H). Section 3B1.4 is deleted in its entirety.
The Introductory Commentary to Chapter Three, Part B is amended by
deleting "When an offense is committed by more than one participant,
Section 3B1.1 or Section 3B1.2 (or neither) may apply."
and inserting in lieu thereof:
"In the case of criminal activity involving more than one participant,
Section 3B1.1 or Section 3B1.2, or neither section, may apply. When the
criminal activity involves only one participant, or only participants of
roughly equal culpability, neither Section 3B1.1 nor Section 3B1.2 will
apply. In some cases, some participants in a criminal activity may receive
an upward adjustment in offense level under Section 3B1.1, other
participants may receive a downward adjustment in offense level under
Section 3B1.2, and still other participants may receive no adjustment.".
Aging Prisoners
16. Issue for Comment: The Commission invites comment on whether and how
the guidelines, policy statements and pertinent statutory provisions should
be amended to provide greater sentencing flexibility, or authority for
modification of a previously imposed sentence of imprisonment, in the case
of older, infirm defendants who do not pose a risk to public safety. In
particular, the Commission invites comment on whether the authority under
18 U.S.C. 3582(c)(1)(A) (relating to court authority to modify a term of
imprisonment upon motion of the Director of the Bureau of Prisons for
"extraordinary and compelling reasons" if consistent with Commission policy
statements) and 28 U.S.C. 994(t) (relating to Commission authority to issue
policy statements describing what should be considered extraordinary and
compelling reasons under 18 U.S.C. 3582(c)(1)(A)) is adequate to address
concerns about an aging inmate population within the Federal prison system,
or whether additional statutory authority is needed.
Miscellaneous Substantive, Clarifying, and Conforming Amendments
17(A). Synopsis of Proposed Amendment: This amendment clarifies the
operation of Section 1B1.3 (Relevant Conduct) in respect to the liability
of a defendant for actions of conspirators prior to the defendant's joining
the conspiracy. There is a split among the circuits as to whether a
defendant ever may have substantive criminal liability for actions of
conspirators prior to the defendant's joining the conspiracy, but this
split need not be resolved to provide useful guidance in respect to the
application of relevant conduct.
In addition, this amendment adds a well phrased formulation for
analyzing the same course of conduct developed by the Ninth Circuit in
United States v. Hahn, 960 F.2d 903 (9th Cir. 1992), to supplement the
commentary currently addressing this concept.
Proposed Amendment: The Commentary to Section 1B1.3 captioned
"Application Notes" is amended in Note 2 by inserting the following
additional paragraph as the eighth paragraph:
"A defendant's relevant conduct under subsection (a)(1)(B) does not
include the conduct of members of a conspiracy prior to the defendant's
joining the conspiracy, even if the defendant knows of that conduct (e.g.,
in the case of a defendant who joins an ongoing drug distribution
conspiracy knowing that it had been selling two kilograms of cocaine per
week, the cocaine sold prior to the defendant's joining the conspiracy is
not included as relevant conduct in determining the defendant's offense
level). The Commission does not foreclose the possibility that there may be
some unusual set of circumstances in which an exception to this principle
may be necessary to appropriately reflect the defendant's culpability; such
a case, however, may be addressed through a departure.".
The Commentary to Section 1B1.3 captioned "Application Notes" is amended
in Note 9(B) by inserting the following additional paragraph at the end:
"The essential components of the same course of conduct are similarity,
regularity, and temporal proximity. When one component is absent, the
courts must look for a stronger presence of at least one of the other
components. Where the conduct alleged to be relevant is relatively remote
to the offense of conviction, a stronger showing of similarity or
regularity is necessary to compensate for the absence of the third
component. United States v. Hahn, 960 F.2d 903 (9th Cir. 1992).".
(B). Synopsis of Proposed Amendment: This amendment makes conforming
changes pertaining to the interaction of Chapter Two (Offense Conduct) and
Chapter Eight (Sentencing of Organizations). The amendment conforms the
language of the special instructions in SectionSection 2B4.1 (Bribery in
Procurement of Bank Loan and Other Commercial Bribery), 2C1.1 (Offering,
Giving, Soliciting, or Receiving a Bribe; Extortion Under Color of Official
Right), and 2E5.1 (Offering, Accepting, or Soliciting a Bribe or Gratuity
Affecting the Operation of an Employee Welfare or Pension Benefit Plan;
Prohibited Payments or Lending of Money by Employer or Agent to Employees,
Representatives, or Labor Organizations) to the language of subsection
(c)(3) of Section 8C2.4 (Base Fine). The amendment also adds a conforming
special instruction concerning fines for organizations in SectionSection
2C1.6 (Loan or Gratuity to Bank Examiner, or Gratuity for Adjustment of
Farm Indebtedness, or Procuring Bank Loan, or Discount of Commercial Paper)
and 2C1.7 (Fraud Involving Deprivation of the Intangible Right to the
Honest Services of Public Officials; Conspiracy to Defraud by Interference
with Governmental Functions).
In addition, this amendment modifies Section 2R1.1 (Bid-Rigging Price
Fixing, or Market-Allocation Agreements Among Competitors) by moving the
test for determining an organization's volume of commerce in a bid-rigging
case in which the organization submitted one or more complementary bids to
subsection (b) where it logically fits; extending to individual defendants
the same standard for determining the volume of commerce in a bid-rigging
case involving complementary bids as is now used for organizational
defendants; [*67537] deleting language from the original Guidelines
Manual that has been made obsolete by the provisions of Section 1B1.3(a)(2)
and could now be misread to inappropriately narrow the scope of relevant
conduct; revising the last paragraph of subsection (b)(2) to address a
bid-rigging conspiracy in which the defendant agrees not to bid rather than
affirmatively submitting a complementary bid; and deleting Application Note
6 as no longer necessary because a complementary bid now would be included
directly in determining the offense level.
Finally, this amendment revises the language in Section 8C2.5
(Culpability Score) (adopted in 1991) to conform to changes in the language
of Section 3E1.1 (Acceptance of Responsibility) made in 1992 (amendment
459).
Proposed Amendment: Section 2B4.1(c)(1)(C) is amended by inserting
"reasonably foreseeable" immediately before "consequential".
Section 2C1.6 is amended by inserting the following additional
subsection:
"(c) Special Instruction for Fines-Organizations
(1) In lieu of the pecuniary loss under subsection (a)(3) of Section
8C2.4 (Base Fine), use the value of the unlawful payment.".
Section 2C1.7 is amended by inserting the following additional
subsection:
"(d) Special Instruction for Fines-Organizations
(1) In lieu of the pecuniary loss under subsection (a)(3) of Section
8C2.4 (Base Fine), use the greatest of: (A) the value of the unlawful
payment; (B) the value of the benefit received or to be received in return
for the unlawful payment; or (C) the reasonably foreseeable consequential
damages resulting from the unlawful payment.".
Section 2E5.1(c)(1)(C) is amended by inserting "reasonably foreseeable"
immediately before "consequential".
Section 2R1.1(b)(2) is amended by deleting "in a conspiracy"; by
deleting "violation" and inserting in lieu thereof "offense"; and by
deleting the last sentence.
Section 2R1.1(b)(2) is amended by inserting the following additional
paragraph at the end:
"In a bid-rigging offense in which an individual participant or his
principal, or an organization, submitted one or more complementary bids or
agreed not to submit one or more bids, use as the individual's or the
organization's volume of commerce the greater of (A) the volume of commerce
done by the individual participant or his principal, or the organization,
in the goods or services that were affected by the offense, or (B) the
largest contract on which the individual participant or his principal, or
the organization, submitted a complementary bid or agreed not to bid in
connection with the offense.".
Section 2R1.1(d) is amended by deleting subdivision (3).
The Commentary to Section 2R1.1 captioned "Application Notes" is amended
by deleting Note 6.
Section 8C2.5(g)(3) is amended by deleting "recognition and
affirmative"; and by deleting "criminal conduct" and inserting in lieu
thereof "offense".
The Commentary to Section 8C2.5 captioned "Application Notes" is amended
in Note 13 by deleting "truthful admission of involvement in the offense
and related conduct" and inserting in lieu thereof "truthfully admitting
the conduct comprising the offense of conviction, and truthfully admitting
or not falsely denying any additional relevant conduct for which it is
accountable under Section 1B1.3 (Relevant Conduct),".
(C). Synopsis of Proposed Amendment: This amendment clarifies the
operation of Section 2B5.1 (Offenses Involving Counterfeit Bearer
Obligations of the United States) in two respects to address issues raised
in litigation. First, this amendment deletes a phrase concerning
photocopying a note which could lead to the inappropriate conclusion that
an enhancement from subsection (b)(2) does not apply even to sophisticated
copying of notes. Second, this amendment expressly provides that items
clearly not intended for circulation (e.g., discarded, defective items) are
not counted under subsection (b)(1).
Proposed Amendment: The Commentary to Section 2B5.1 captioned
"Application Notes" is amended in Note 3 by deleting "merely photocopy
notes or otherwise".
The Commentary to Section 2B5.1 captioned "Application Notes" is amended
by inserting the following additional Note:
"4. For the purposes of subsection (b)(1), do not count items that
clearly were not intended for circulation (e.g., discarded, defective
items).".
(D). Synopsis of Proposed Amendment: This amendment adds definitions of
hashish and hashish oil to subsection (c) of Section 2D1.1 (Unlawful
Manufacturing, Importing, Exporting, or Trafficking; Attempt or Conspiracy)
in the notes following the Drug Quantity Table. Currently, these terms are
not defined by statute or in the guidelines, leading to litigation as to
which substances are to be classified as hashish or hashish oil (as opposed
to marihuana). This issue has arisen in sentencing hearings, see United
States v. Schultz, 810 F. Supp. 230 (S.D. Ohio 1992) and United States v.
Gravelle, 819 F. Supp. 1076 (S.D. Florida 1993), training presentations,
and hotline questions.
In addition, this amendment clarifies the treatment of marihuana that
has a moisture content sufficient to render it unusable without drying
(e.g., a bale of marihuana left in the rain or recently harvested marihuana
that had not had time to dry). In such cases, including the moisture in the
weight of the marihuana can increase the offense level for a factor that
bears no relationship to the scale of the offense or the marketable form of
the marihuana. Prior to the effective date of the 1993 amendments, two
circuits have approved weighing wet marihuana despite the fact that the
marihuana was not in a usable form. United States v. Garcia, 925 F.2d 170
(7th Cir., 1991); United States v. Pinedo-Montoya, 966 F.2d 591 (10th Cir.
1992). Although Application Note 1 of Section 2D1.1, effective November 1,
1993 (pertaining to unusable parts of a mixture or substance) should
produce the appropriate result because marihuana must be dried before being
used, this type of case is sufficiently distinct to warrant a specific
reference to ensure correct application of the guideline.
Proposed Amendment: Section 2D1.1(c) is amended in the Notes following
the Drug Quantity Table by inserting the following additional paragraphs as
the fourth and fifth paragraphs:
"Hashish, for the purposes of this guideline, means a concentrate of
cannabis containing cannabinoids and fragments of plant material (such as
cystolith fibers).
Hashish oil, for the purposes of this guideline, means a preparation of
the soluble cannabinoids derived from cannabis that includes one or more of
the tetrahydrocannabinols (as defined in 21 CFR 1308.11(d)(25)) and at
least two of the following: Cannabinol, cannabidiol, or cannabishromene,
and is essentially free of plant material (e.g., plant fragments).
Typically, hashish oil is a viscous, dark colored oil, but it can vary from
a dry resin to a colorless liquid.".
The Commentary to Section 2D1.1 captioned "Application Notes" is amended
in Note 1 by inserting the following additional paragraph at the end:
"Similarly, in the case of marihuana having a moisture content that
renders the marihuana unsuitable for consumption without drying (this might
occur, for example with a bale of rain-soaked marihuana or freshly
harvested marihuana that had not been dried), an approximation of the
weight of the marihuana without such excess moisture content is to be
used.".
(E). Synopsis of Proposed Amendment: This amendment revises the
Commentary to Section 2D1.2 (Drug Offenses Occurring Near Protected
Locations or Involving Underage or Pregnant Individuals; Attempt or
[*67538] Conspiracy) to make explicit that Section 3B1.1 (Aggravating
Role) operates independently of Section 2D1.2. Absent such an express
statement, the Seventh Circuit has held that it is inappropriate double
counting to apply Section 2D1.2 for the supervision of a person under age
eighteen in a drug trafficking offense and also apply Section 3B1.1 for the
supervision of that person. United States v. Stevenson, No. 91-3431 (7th
Cir. Oct. 6, 1993). Under this logic, however, there is no differentiation
in final offense level between the organizer, leader, manager, or
supervisor of an adult in a drug sale and the organizer, leader, manager,
or supervisor of a juvenile in a drug sale.
Proposed Amendment: The Commentary to Section 2D1.2 captioned
"Application Note" is amended by deleting "Note" and inserting in lieu
thereof "Notes"; and by inserting the following additional note:
"2. Section 3B1.1 (Aggravating Role) is to be applied independently of
the operation of this section. Thus, for example, in the case of a
defendant who hires an underage person to deliver a controlled substance,
an adjustment from Section 3B1.1 will apply in addition to the offense
level determined under this section.".
(F). Synopsis of Proposed Amendment: This amendment clarifies the
operation of SectionSection 2D1.6 (Use of Communication Facility in
Committing Drug Offense; Attempt or Conspiracy), 2E1.1 (Unlawful Conduct
Relating to Racketeer Influenced and Corrupt Organizations), 2E1.2
(Interstate or Foreign Travel or Transportation in Aid of a Racketeering
Enterprise), 2E1.3 (Violent Crimes in Aid of Racketeering Activity), and
2E1.4 (Use of Interstate Commerce Facilities in the Commission of
Murder-For-Hire) in a manner consistent with the operation of Section 1B1.2
(Applicable Guidelines) governing the selection of the offense guideline
section. In addition, this amendment deletes an application note from
SectionSection 2E1.1, 2E1.2, and 2E1.3 that is unnecessary and is not
included in other sections of the Guidelines Manual.
Proposed Amendment: The Commentary to Section 2D1.6 captioned
"Application Note" is amended by deleting "Note" and inserting in lieu
thereof "Notes"; by renumbering Note 1 as Note 2; and by inserting the
following as Note 1:
"1. "Offense level applicable to the underlying offense" means the
offense level determined by using the offense guideline applicable to the
controlled substance offense that the defendant was convicted of using a
communication facility to commit, cause, or facilitate.".
The Commentary to Section 2E1.1 captioned "Application Notes" is amended
in Note 1 by deleting "Where there is more than one underlying offense" and
inserting in lieu thereof:
"The offense guideline applicable to the underlying offense under
subsection (a)(2) is determined under the provisions of Section 1B1.2
(Applicable Guidelines). Where more than one underlying offense is
established (for this determination, apply the provisions of Application
Note 5 of the Commentary to Section 1B1.2 as in a conspiracy case).".
The Commentary to Section 2E1.1 captioned "Application Notes" is amended
by deleting Note 3; and by renumbering Note 4 as Note 3.
The Commentary to Section 2E1.2 captioned "Application Notes" is amended
in Note 1 by deleting "Where there is more than one underlying offense" and
inserting in lieu thereof:
"The offense guideline applicable to the underlying offense under
subsection (a)(2) is determined under the provisions of Section 1B1.2
(Applicable Guidelines). Where more than one underlying offense is
established (for this determination, apply the provisions of Application
Note 5 of the Commentary to Section 1B1.2 as in a conspiracy case).".
The Commentary to Section 2E1.2 captioned "Application Notes" is amended
by deleting Note 3.
The Commentary to Section 2E1.3 captioned "Application Notes" is amended
in Note 1 by inserting the following additional sentence as the first
sentence:
"The offense guideline applicable to the underlying offense under
subsection (a)(2) is determined under the provisions of Section 1B1.2
(Applicable Guidelines).";
by deleting Note 2; and, in the caption, by deleting "Notes" and inserting
in lieu thereof "Note".
The Commentary to Section 2E1.4 captioned "Application Notes" is amended
in Note 1 by inserting the following additional sentence as the first
sentence:
"The offense guideline applicable to the underlying offense under
subsection (a)(2) is determined under the provisions of Section 1B1.2
(Applicable Guidelines).".
(G). Synopsis of Proposed Amendment: This amendment revises Application
Note 13 in the Commentary to Section 2F1.1 (Fraud and Deceit; Forgery;
Offenses Involving Altered or Counterfeit Instruments Other than
Counterfeit Bearer Obligations of the United States). On two occasions, the
Ninth Circuit has read this application note as requiring application of
Section 2T3.1 to false statements to a customs officer in connection with
currency reporting violations even though Section 2S1.3 (Structuring
Transactions to Evade Reporting Requirements; Failure to Report Cash or
Monetary Transactions; Failure to File Currency and Monetary Instrument
Report; Knowingly Filing False Reports) clearly better fit the facts of the
cases. United States v. Carillo-Hernandez, 963 F.2d 1316 (9th Cir. 1992),
United States v. Mendoza-Fernandez, 4 F.3d 815 (9th Cir. 1993) No.
92-50761. This amendment clarifies the intended operation of this
application note.
Proposed Amendment: The Commentary to Section 2F1.1 captioned
"Application Notes" is amended in Note 13 by inserting "Section 2S1.3 or"
immediately before "Section 2T3.1".
(H). Synopsis of Proposed Amendment: This amendment clarifies the
interaction of subsection (c)(1) of Section 2J1.2 (Obstruction of Justice)
and subsection (c)(1) of Section 2J1.3 (Perjury or Subornation of Perjury;
Bribery of Witness) with Section 2X3.1 (Accessory After the Fact). In
addition, this amendment clarifies the application of SectionSection 2X1.1
(Attempt, Solicitation, or Conspiracy) and 2X3.1 (Accessory After the Fact)
when these guidelines are used as the result of a cross reference.
Proposed Amendment: The Commentary to Section 2J1.2 captioned
"Background" is amended in the second paragraph by inserting the following
at the end:
"Note that application of this cross reference does not require that the
defendant's conduct constitute the offense of accessory after the fact.
Rather, it provides for the use, in the circumstances specified, of the
guideline that applies to accessory after the fact offenses. Thus, the fact
that a defendant cannot be an accessory after the fact, under federal law,
to an offense in which he is a principal does not bar application of this
cross reference.".
The Commentary to Section 2J1.3 captioned "Background" is amended in the
last sentence by deleting:
", and an alternative reference to the guideline for accessory after the
fact is made";
and by inserting the following additional sentences at the end:
"Because the conduct covered by this guideline is frequently part of an
effort to avoid punishment for an offense that the defendant has committed
or to assist another person to escape punishment for an offense, a cross
reference to Section 2X3.1 (Accessory After the Fact) is provided. Use of
this cross reference will provide an enhanced offense level when the
obstruction is in respect to a particularly serious offense, whether such
offense was committed by the defendant or another person. Note that
application of this cross reference does not require that the defendant's
conduct constitute the offense of accessory after the fact. Rather, it
provides for the use, in the circumstances specified, of the guideline that
applies to accessory after the fact offenses. Thus, the fact that a
defendant [*67539] cannot be an accessory after the fact, under federal
law, to an offense in which he is a principal does not bar application of
this cross reference.".
The Commentary to Section 2X1.1 captioned "Application Notes" is amended
in Note 2 by beginning a new paragraph with the second sentence; and by
inserting the following additional sentence at the end of the first
paragraph:
"However, if the application of Section 2X1.1 results from a cross
reference or other instruction in another Chapter Two offense guideline
(e.g., SectionSection 2K1.3(c)(1)(A), 2K2.1(c)(1)(A), 2K3.2(a)(1)), the
substantive offense is the offense determined by that cross reference or
instruction.".
The Commentary to Section 2X3.1 captioned "Application Notes" is amended
in Note 1 by beginning a new paragraph with the second sentence; and by
inserting the following additional sentence immediately after the first
sentence:
"However, if the application of Section 2X3.1 results from a cross
reference or other instruction in another Chapter Two offense guideline
(e.g., SectionSection 2J1.2(c)(1), 2J1.3(c)(1)), the underlying offense is
the offense determined by that cross reference or instruction.".
(I). Synopsis of Proposed Amendment: This amendment clarifies the
application of subsection (c) of Section 2K2.1 (Unlawful Receipt,
Possession, or Transportation of Firearms or Ammunition; Prohibited
Transactions Involving Firearms or Ammunition) and addresses an
intercircuit conflict. In United States v. Concepcion, 983 F.2d 369 (2d
Cir. 1992), involving a defendant found to have possessed a firearm in
connection with a RICO drug operation, the court held that application of
the firearms guideline cross-reference to Section 2D1.1 (Unlawful
Manufacturing, Importing, Exporting, or Trafficking; Attempt or Conspiracy)
could not include the weapon enhancement in Section 2D1.1(b)(1). In
applying cross-references in somewhat similar circumstances, other courts
have held that a specific offense characteristic for weapon use contained
in the cross-referenced guideline should be applied. See, e.g., United
States v. Gonzalez, 996 F.2d 88 (5th Cir. 1993) (upholding application of
two-level increase in kidnapping guideline for dangerous weapon where
defendant, convicted of being a felon in possession, was held accountable
for firearm used in kidnapping scheme). This amendment adds an additional
Application Note to Section 2K2.1 to address this issue.
In addition, the definitions of firearms listed under 26 U.S.C. Section
5845(a) that are currently contained in the Application Notes to
SectionSection 2K2.1 (Unlawful Receipt, Possession, or Transportation of
Firearms or Ammunition; Prohibited Transactions Involving Firearms or
Ammunition) and 7B1.1 (Classification of Violations) are inconsistent with
each other and are insufficiently defined to serve their intended purpose
(i.e., to allow probation officers and courts to apply the pertinent
guideline adjustment without having to consult 26 U.S.C. Section 5845).
This amendment addresses this issue by substituting a single, revised
definition.
Proposed Amendment: The Commentary to Section 2K2.1 captioned
"Application Notes" is amended in Note 3 by deleting:
"any short-barreled rifle or shotgun or any weapon made therefrom",
and inserting in lieu thereof:
"a shotgun, or a weapon made from a shotgun, having a barrel or barrels of
less than 18 inches in length; a rifle, or a weapon made from a rifle,
having a barrel or barrels of less than 16 inches in length; or a weapon
made from a shotgun or rifle, having an overall length of less than 26
inches";
and by deleting:
"or (v) any "other weapon," as that term is defined by 26 U.S.C. 5845(e). A
firearm listed in 26 U.S.C. 5845(a) does not include unaltered handguns or
regulation-length rifles or shotguns",
and inserting in lieu thereof:
"and (v) certain other weapons (that are not conventional, unaltered
handguns, rifles, or shotguns) as defined in 26 U.S.C. 5845(e)".
The Commentary to Section 2K2.1 captioned "Application Notes" is amended
by inserting the following additional note:
"20. Where subsection (c)(1) requires the application of another offense
guideline, the entire offense guideline that is referenced (including any
enhancement for possession of a firearm) is to be applied. See Section
1B1.5 (Interpretation of References to Other Offense Guidelines).".
The Commentary to Section 7B1.1 captioned "Application Notes" is amended
by deleting Note 4 and inserting in lieu thereof:
"4. "Firearm or destructive device of a type described in 26 U.S.C.
Section 5845(a)" is defined in the Commentary to Section 2K2.1 (Unlawful
Receipt, Possession, or Transportation of Firearms or Ammunition;
Prohibited Transactions Involving Firearms or Ammunition).".
(J). Synopsis of Proposed Amendment: This amendment revises the
Commentary to Section 2K2.4 (Use of Firearm, Armor-Piercing Ammunition, or
Explosive During or in Relation to Certain Crimes) by expanding the list of
examples to which Application Note 2 applies to facilitate application of
this provision. In addition, this amendment clarifies that, if an
enhancement from Section 2K2.4 applies, any specific offense characteristic
for use or possession of any weapon in the offense is not to be applied.
This addresses an issue raised in United States v. Kimmons, 965 F.2d 1001
(11th Cir. 1992), cert. denied, 113 S. Ct. 1065, and cert. granted, vacated
and remanded sub nom. Small v. United States, 113 S. Ct. 2326 (1993). In
Kimmons, a case involving a defendant who used a firearm in a robbery and
was convicted of both robbery and 18 U.S.C. 924(c), the court held that
even though the defendant was convicted of a 924(c) count, he was also
subject to the weapon enhancement in the robbery guideline because of his
co-defendant's use of a firearm during the robbery.
Proposed Amendment: The Commentary to Section 2K2.4 captioned
"Application Notes" is amended in Note 2 in the first sentence of the first
paragraph by deleting "an explosive or firearm (e.g., Section
2B3.1(b)(2)(A)-(F) (Robbery))" and inserting in lieu thereof "any explosive
or firearm for which the defendant would be accountable under Section 1B1.3
(Relevant Conduct)"; and by inserting the following additional sentence as
the second sentence of the first paragraph:
"For example, an adjustment from SectionSection 2A2.2(b)(2),
2A3.1(b)(1), 2B3.1(b)(2)(A-F), 2B3.2(b)(3), 2D1.1(b)(1), 2D1.11(b)(1),
2K1.3(b)(3), or 2K2.1(b)(5) would not apply. In addition, in Section 4B1.4
(Armed Career Criminal), the adjustment from subsection (b)(3)(A) is not to
be applied.".
(K). Synopsis of Proposed Amendment: This amendment corrects a technical
error in Section 2L2.1 (Trafficking in a Document Relating to
Naturalization, Citizenship, or Legal Resident Status, or a United States
Passport; False Statement in Respect to the Citizenship or Immigration
Status of Another; Fraudulent Marriage to Assist Alien to Evade Immigration
Law). Currently this guideline uses the term "set" to include either a
single document or multiple related documents. However, in common usage,
the term "set" refers to a group containing at least two items, thereby
making it arguable that subsection (b)(2) applies only to sets of two or
more related documents. See United States v. Martinez-Cano, F.2d , No. 93-
50257 (9th Cir. Oct. 7, 1993). This amendment corrects this error and
ensures comparability in offense level with Section 2L1.1 (Smuggling,
Transporting, or Harboring an Unlawful Alien).
Proposed Amendment: Section 2L2.1(b)(2) is amended by deleting "sets
of"; and by deleting "Sets of". [*67540]
The Commentary to Section 2L2.1 captioned "Application Notes" is amended
in Note 2 by deleting "a single" and inserting in lieu thereof "one"; and
by deleting "as one set" and inserting in lieu thereof "in the set as one
document for the purposes of subsection (b)(2)".
(L). Synopsis of Proposed Amendment: This amendment clarifies the
operation of Chapter Three, Part D (Multiple Counts) and Section 5G1.2
(Sentencing on Multiple Counts of Conviction) in respect to statutes that
require consecutive sentences of imprisonment.
Proposed Amendment: Section 3D1.1(b) is amended by deleting "imposition
of a consecutive sentence" and inserting in lieu thereof "both that a term
of imprisonment be imposed and that such term of imprisonment run
consecutively to any other term of imprisonment".
The Commentary to Section 3D1.1 captioned "Application Note" is amended
by deleting Note 1 and inserting in lieu thereof:
"1. Subsection (b) provides that any count for which the statute
mandates both that a term of imprisonment be imposed and that such term of
imprisonment run consecutively to any other term of imprisonment is
excepted from application of the multiple count rules. Convictions on such
counts are not used in the determination of a combined offense level under
this part, but may affect the offense level for other counts. See Section
2K2.4 (Use of Firearm, Armor-Piercing Ammunition, or Explosive During or in
Relation to Certain Crimes).
Certain statutes (1) require a consecutive sentence only if a term of
imprisonment is imposed (e.g., 18 U.S.C. 3146), or (2) set forth a
sentencing enhancement rather than a separate count of conviction (e.g., 18
U.S.C. 3147). Subsection (b) does not apply in such cases. See, e.g.,
Application Note 3 of the Commentary to Section 2J1.6 (Failure to Appear),
Application Note 2 of the Commentary to Section 2J1.7 (Offense Committed
While on Release), and Application Note 3 of the Commentary to Section
2K2.5 (Possession of Firearm or Dangerous Weapon in Federal Facility;
Possession or Discharge of Firearm in School Zone).".
The Commentary to Section 3D1.2 captioned "Application Notes" is amended
in Note 1 by deleting "imposition of a consecutive sentence" and inserting
in lieu thereof "both that a term of imprisonment be imposed and that such
term of imprisonment run consecutively to any other term of imprisonment".
Section 5G1.2(a) is amended by deleting "a consecutive sentence" and
inserting in lieu thereof "both that a term of imprisonment be imposed and
that such term of imprisonment run consecutively to any other term of
imprisonment".
The Commentary to Section 5G1.2 is amended by deleting the fourth
paragraph and inserting in lieu thereof:
"Subsection (a) applies to any count for which a statute mandates both
that a term of imprisonment be imposed and that such term of imprisonment
run consecutively to any other term of imprisonment (e.g., a count charging
a violation of 18 U.S.C. 844(h), 924(c), or 929(a)). The sentence for such
a count is determined independently of, and runs consecutively to, the
sentences for any other counts. See Commentary to SectionSection 2K2.4 and
3D1.1 regarding determination of the offense levels for related counts when
a conviction under 18 U.S.C. 844(h), 924(c), or 929(a) is involved.
Subsection (a) does not apply to a statute that requires a consecutive
sentence only if a term of imprisonment is imposed (e.g., 18 U.S.C. 3146)
or sets forth a sentencing enhancement rather than a separate count of
conviction (e.g., 18 U.S.C. 3147). See, e.g., Application Note 3 of the
Commentary to Section 2J1.6 (Failure to Appear), Application Note 2 of the
Commentary to Section 2J1.7 (Offense Committed While on Release), and
Application Note 3 of the Commentary to Section 2K2.5 (Possession of
Firearm or Dangerous Weapon in Federal Facility; Possession or Discharge of
Firearm in School Zone).".
(M). Synopsis of Proposed Amendment: This amendment makes the listing of
the offense guidelines in subsection (d) of Section 3D1.2 (Groups of
Closely-Related Counts) more comprehensive. Expressly listing these
additional sections will simplify the application of this guideline.
Proposed Amendment: Section 3D1.2(d) is amended in the second paragraph
by inserting "2C1.6," immediately before "2C1.7"; by inserting
"SectionSection 2G2.2, 2G2.4, 2G3.1, 2G3.2;" as an additional line
immediately below "2F1.1, 2F1.2;"; and by inserting "Section 2K1.3,"
immediately before "2K2.1".
(N). Synopsis of Proposed Amendment: This amendment clarifies that
Application Note 7 in the Commentary to Section 4A1.2 (Definitions and
Instructions for Computing Criminal History) explains Section 4A1.2(d) and
does not impose an additional limitation on the counting of sentences
committed prior to age eighteen. The variation in language between Section
4A1.2(d) and Application Note 7 has resulted in litigation. See United
States v. Carillo, 991 F.2d 590 (9th Cir. 1993). Although the prisoner was
unsuccessful in this case, this amendment will remove the opportunity for
other challenges on this point.
Proposed Amendment: The Commentary to Section 4A1.2 captioned
"Application Notes" is amended by deleting Note 7 and inserting in lieu
thereof:
"7. Offenses Committed Prior to Age Eighteen. Section 4A1.2(d) covers
sentences resulting from all offenses committed prior to age eighteen and
is designed to minimize the impact of differences among jurisdictions in
the age at which a defendant is considered a "juvenile" and in the
availability of juvenile records. Section 4A1.2(d)(1) applies to adult
convictions resulting in sentences of imprisonment of more than one year.
Section 4A1.2(d)(2) applies to lesser sentences resulting from adult
convictions and all sentences resulting from juvenile delinquency
adjudications.".
(O). Synopsis of Proposed Amendment: This amendment adds an additional
paragraph to the Commentary to Section 5G1.1 (Sentencing on a Single Count
of Conviction) to clarify that where the guideline sentence is determined
by the statutorily authorized maximum sentence under Section 5G1.1(a) or
the statutorily required minimum sentence under Section 5G1.1(b), the
guideline range from Chapter Five, Part A, remains the applicable guideline
range for other purposes (e.g., determining eligibility for retroactive
application of an amended guideline range under Section 1B1.10, determining
whether alternatives to imprisonment are authorized under Section 5B1.1 or
Section 5C1.1, or determining the appropriateness of a departure from the
guideline range under Section 4A1.3).
In addition, this amendment revises the Commentary to Section 5G1.2
(Sentencing on Multiple Counts of Conviction) cited by two courts of
appeals as supporting the view that, notwithstanding the language in 18
U.S.C. 3624(e) stating that terms of supervised release run concurrently, a
court nevertheless may order that supervised release terms be served
consecutively under certain circumstances. See United States v. Maxwell,
966 F.2d 545, 551 (10th Cir. 1992) and United States v. Shorthouse, No.
92-30334 (9th Cir. Oct. 5, 1993). This amendment is in accord with the
position taken by the Eighth Circuit that 18 U.S.C. 3624(e) provides, in
all cases, that multiple terms of supervised release run concurrently
(United States v. Gullickson, 982 F.2d 1231, 1236 (8th Cir. 1993)).
Proposed Amendment: The Commentary to Section 5G1.1 is amended by
inserting the following additional paragraph at the end:
"In a case in which the guideline sentence is determined by the
statutorily authorized maximum sentence (under subsection (a)) or the
statutorily required minimum sentence (under subsection (b)), the guideline
range from Chapter Five, Part A (Sentencing Table) remains applicable for
other purposes (e.g., determining whether alternatives to imprisonment are
authorized under Section 5B1.1 (Imposition of a Term of Probation) or
[*67541] Section 5C1.1 (Imposition of a Term of Imprisonment);
determining the appropriateness of a departure from the guideline range
under Section 4A1.3 (Adequacy of Criminal History Category); and
determining eligibility for the retroactive application of an amended
guideline range under Section 1B1.10 (Retroactive Application of Amended
Guideline Range)).".
The Commentary to Section 5G1.2 is amended in the fourth paragraph by
inserting the following additional sentence at the end:
"Note, however, that even in the case of a consecutive term of
imprisonment imposed under subsection (a), any term of supervised release
imposed is to run concurrently with any other term of supervised release
imposed. See 18 U.S.C. 3624(e).".
(P). Synopsis of Proposed Amendment: This amendment adds a policy
statement to Chapter Five, Part K (Departures) providing expressly that a
downward departure may be warranted where the defendant made complete, or
substantially complete, restitution prior to the discovery of the offense
or the defendant's participation of the offense, except in the case of a
crime of violence. This amendment distinguishes this circumstance from the
more typical situation in which the defendant makes restitution prior to
sentencing but after the defendant's participation in the offense is
discovered, a situation addressed by Section 3E1.1 (Acceptance of
Responsibility).
Proposed Amendment: Chapter Five, part K, subpart 2 is amended by
inserting the following additional section:
"Section 5K2.17. Restitution Prior to Discovery (Policy Statement)
If the defendant made complete, or substantially complete, restitution
prior to the discovery of the offense or the defendant's participation in
the offense, a downward departure may be warranted. This provision does not
apply, however, where (1) the offense was a crime of violence as defined in
Section 4B1.2 (Definition of Terms Used in Section 4B1.1), or (2) such
restitution was made after the discovery of the defendant's participation
in the offense became likely or imminent.".
(Q). Synopsis of Proposed Amendment: This amendment provides expressly
how Section 7B1.1 (Classification of Violations) is to be applied in the
case of false statements made to probation officers by probationers and
supervised releasees. A variety of false statements made to probation
officers by probationers or supervised releasees during the period of
supervision could be, but rarely if ever are, prosecuted under 18 U.S.C.
1001 (a felony). The question has arisen as to whether such violations are
to be treated as Grade B (felony) or Grade C (misdemeanor/technical)
violations. Option 1 of this amendment provides that a false statement made
to a probation officer during supervision is treated as a Grade C violation
(absent a felony conviction for such false statement). Option 2 treats any
such violation as a Grade B (felony) violation. In addition, this amendment
simplifies the commentary of Section 7B1.1 and conforms it to the drafting
principle adopted by the Commission of consolidating definitions in one
section.
Proposed Amendment: [Option 1: Section 7B1.1 is amended by inserting the
following additional subsection:
"(c) Special Instruction
(1) Absent a new conviction for a violation of 18 U.S.C. 1001 (or
another felony statute), a false statement to a probation officer by a
probationer or supervised releasee (e.g., a false statement on a monthly
report) is to be treated as a Grade C violation.".]
[Option 2: The Commentary to Section 7B1.2 captioned "Application Notes"
is amended by inserting the following additional note:
"6. Any false statement made by a probationer or supervised releasee to
a probation officer that could be charged as a violation of 18 U.S.C.
Section 1001 shall be treated as a Grade B violation.".]
[Both Options: The Commentary to Section 7B1.1 captioned "Application
Notes" is amended in Note 2 by inserting the following additional paragraph
as the first paragraph:
""Controlled substance offense" is defined in Section 4B1.2 (Definitions
of Terms Used in Section 4B1.1). See Section 4B1.2(2) and Application Note
1 of the Commentary to Section 4B1.2.";
and by inserting the following additional paragraph at the end:
""Firearm or destructive device of a type described in 26 U.S.C.
5845(a)" is defined in the Commentary to Section 2K2.1 (Unlawful Receipt,
Possession, or Transportation of Firearms or Ammunition; Prohibited
Transactions Involving Firearms or Ammunition).".
The Commentary to Section 7B1.1 captioned "Application Notes" is amended
by deleting Notes 3 and 4; and by redesignating Note 5 as Note 3.]
Proposed Amendments and Issues for Comment Recommended by the
Practitioners' Advisory Committee
18. Synopsis of Proposed Amendment: This amendment provides that conduct
of which the defendant has been acquitted after trial may not be used in
determining the guideline range but may, if found by a preponderance of the
evidence, provide the basis for an upward departure.
Proposed Amendment: Section 1B1.3 is amended by inserting the following
additional subsection:
"(c) Conduct of which the defendant has been acquitted after a court or
jury trial shall not be considered under this section. However, such
conduct, if proven by a preponderance of the evidence, may provide the
basis for an upward departure."
19. Synopsis of Proposed Amendment: This amendment makes a number of
minor revisions to clarify the operation of Section 1B1.10 (Retroactivity
of Amended Guideline Range). In addition, this amendment deletes current
Section 1B1.10(c), a rather complex subsection, as an unnecessary
restriction on the court's consideration of a revised sentence in response
to an amended guideline range. The simpler restriction in subsection (b)
would remain a limitation on the court's discretion.
Proposed Amendment: Section 1B1.10(a) is amended by deleting
"guidelines" and inserting in lieu thereof "Guidelines Manual"; by deleting
"may be considered" and inserting in lieu thereof "is authorized"; and by
inserting "and thus is not authorized" immediately following "policy
statement".
Section 1B1.10(b) is amended by inserting ", and to what extent,"
immediately before "a reduction"; and by deleting "consider the sentence
that it would have originally imposed had the guidelines, as amended, been
in effect at that time" and inserting in lieu thereof "apply the Guidelines
Manual currently in effect to determine the amended guideline range and the
appropriateness of any departure".
Section 1B1.10 is amended by deleting subsection (c); and by
redesignating subsection (d) as subsection (c).
The Commentary to Section 1B1.10 captioned "Application Notes" is
amended by deleting the text of Note 1 and inserting in lieu thereof:
"Eligibility for consideration under 18 U.S.C. 3582(c)(2) is triggered
only by an amendment listed in subsection (c) of this section that lowers
the applicable guideline range. The amended guideline range is determined
by applying all amendments to the Guidelines Manual (i.e., by applying the
Guidelines Manual currently in effect).
This policy statement specifies the circumstances under which a
defendant may be considered for a reduced sentence under 18 U.S.C. Section
3582(c)(2). The decision whether or not to grant a reduction in a
particular case is discretionary with the court.".
The Commentary to Section 1B1.10 captioned "Background" is amended in
the last paragraph by deleting "(d)" and inserting in lieu thereof "(c)".
[*67542]
20(A). Synopsis of Proposed Amendment: This amendment revises the
Commentary to Section 2F1.1 to provide greater consistency between the
definitions of loss in SectionSection 2B1.1 (Larceny, Embezzlement, and
Other Forms of Theft; Receiving, Transporting, Transferring, Transmitting,
or Possessing Stolen Property) and 2F1.1 (Fraud and Deceit; Forgery;
Offenses Involving Altered or Counterfeit Instruments Other than
Counterfeit Bearer Obligations of the United States).
Proposed Amendment: The Commentary to Section 2F1.1 captioned
"Application Notes" is amended in Note 7 by deleting the last three
sentences of the first paragraph and inserting in lieu thereof:
"Frequently, loss in a fraud case will be the same as in a theft case.
Examples: (1) In the case of a forged check that was represented to be
genuine, the loss is the loss that would have occurred if the check had
been cashed. (2) In a case where worthless stock was represented to be
worth $ 40,000, the loss would be $ 40,000. Where the loss that the
defendant attempted to inflict is greater than the actual loss, the
provisions of Section 2X1.1 (Attempt, Solicitation, or Conspiracy) will
apply.";
and by deleting the first two lines of the second paragraph and inserting
in lieu thereof:
"In some fraud cases, additional factors are to be considered in
determining loss:".
(B). Issue for Comment: The Commission invites comment on whether the
Commentary to Section 2B1.1 (Larceny, Embezzlement, and Other Forms of
Theft; Receiving, Transporting, Transferring, Transmitting, or Possessing
Stolen Property) should be conformed to the Commentary to Section 2F1.1
(Fraud and Deceit; Forgery; Offenses Involving Altered or Counterfeit
Instruments Other than Counterfeit Bearer Obligations of the United States)
by stating that:
(1) The loss should be reduced to reflect the amount the victim has
recovered prior to discovery of the offense or which the victim expects to
recover from any assets originally pledged by the defendant; and
(2) The actual loss may in some cases significantly overstate or
understate the seriousness of the defendant's conduct; in such cases, a
departure from the guidelines may be warranted.
(C). Issue for Comment: The Commission invites comment on whether or not
the provisions concerning loss in Chapter Two, Parts B (Offenses Involving
Property) and F (Offenses Involving Fraud or Deceit), should be revised to
make clear that interest is not to be counted under any circumstances.
There appears to be a conflict between the Commission's intent with respect
to the inclusion of interest in the calculation of loss and two recent
appellate decisions. Although Application Note 7 in the Commentary to
Section 2F1.1 (Fraud and Deceit; Forgery; Offenses Involving Altered or
Counterfeit Instruments Other than Counterfeit Bearer Obligations
of the United States) states that loss does not, for example, include
interest the victim could have earned on such funds had the offense not
occurred, two appellate court decisions have permitted the inclusion of
lost interest in the calculation of loss. See United States v. Lowder, No.
92-6378, 1993 WL 356898 (10th Cir. 1993) and United States v. Jones, 933
F.2d 353 (6th Cir. 1991). In contrast, the Fourth Circuit has held that
interest should not be counted in the determination of loss where it
amounts to lost profit. United States v. Bailey, 975 F.2d 1028 (4th Cir.
1992).
21. Synopsis of Proposed Amendment: This amendment clarifies the
intended coverage of Section 2X1.1 (Attempt, Solicitation, or Conspiracy).
Several appellate courts have read this guideline as not applying in the
case of an attempt if the statute covering the substantive offense also
covers an attempt to commit the offense. See, e.g., United States v. Van
Bloom, 961 F.2d 145 (9th Cir. 1992); United States v. Koenig, 952 F.2d 267
(9th Cir. 1991); United States v. Williams, 891 F.2d 962 (1st Cir. 1989);
United States v. Toles, 867 F.2d 222 (5th Cir. 1989) and United States v.
Vasquez, 791 F.Supp. 348 (E.D.N.Y. 1992)). This amendment clarifies the
Commission's intent that the determining factor in whether Section 2X1.1
applies is whether the title of the offense guideline for the substantive
offense expressly covers the inchoate form of the offense.
In addition, this amendment simplifies the currently complex structure
of this guideline by merging subsections (b) (1), (2), and (3). The titles
of the offense guidelines covered by subsection (b)(3)(B) are amended to
conform.
Proposed Amendment: The title of Section 2X1.1 is amended by deleting
"(Not Covered by a Specific Offense Guideline)".
Section 2X1.1(b) is amended by deleting:
"(1) If an attempt, decrease by 3 levels, unless the defendant completed
all the acts the defendant believed necessary for successful completion of
the substantive offense or the circumstances demonstrate that the defendant
was about to complete all such acts but for apprehension or interruption by
some similar event beyond the defendant's control.
(2) If a conspiracy, decrease by 3 levels, unless the defendant or a
co-conspirator completed all the acts the conspirators believed necessary
on their part for the successful completion of the substantive offense or
the circumstances demonstrate that the conspirators were about to complete
all such acts but for apprehension or interruption by some similar event
beyond their control.
(3) (A) If a solicitation, decrease by 3 levels unless the person
solicited to commit or aid the substantive offense completed all the acts
he believed necessary for successful completion of the substantive offense
or the circumstances demonstrate that the person was about to complete all
such acts but for apprehension or interruption by some similar event beyond
such person's control.
(B) If the statute treats solicitation of the substantive offense
identically with the substantive offense, do not apply subdivision (A)
above; i.e., the offense level for solicitation is the same as that for the
substantive offense.",
and inserting in lieu thereof:
"(1) Decrease by 3 levels unless (A) the defendant, a co-conspirator,
or, in the case of a solicitation, the person solicited to commit the
offense committed all of the acts he believed necessary for the successful
completion of the substantive offense; or (B) the circumstances demonstrate
that such person was about to complete all such acts but for apprehension
or interruption by some similar event beyond his control.".
The Commentary to Section 2X1.1 captioned "Application Notes" is amended
by deleting the first sentence of Note 1 and inserting in lieu thereof:
""Expressly covered by another offense guideline section," as used in
subsection (c), means that the title of the offense guideline section
applicable to the substantive offense expressly covers an attempt,
conspiracy, or solicitation. For example, Section 2A2.1 (Assault With
Intent to Commit Murder; Attempted Murder) expressly covers attempted
murder; Section 2A1.5 (Conspiracy or Solicitation to Commit Murder)
expressly covers conspiracy and solicitation to commit murder. In contrast,
Section 2B3.1 (Robbery) does not expressly cover attempt, conspiracy, or
solicitation to commit robbery.".
The Commentary to Section 2X1.1 captioned "Application Notes" is amended
in the last paragraph of Note 1 by inserting "Section 2B4.1;" on an
additional line immediately below "Section 2A1.5"; and by inserting ",
2C1.6" immediately following "2C1.2".
The Commentary to Section 2X1.1 captioned "Application Notes" is amended
in Note 4 by deleting "Section 2X1.1(b)(1), (b)(2), or (b)(3)(A)" wherever
it appears and inserting in lieu thereof in each instance "Section
2X1.1(b)(1)".
The Commentary to Section 2X1.1 captioned "Background" is amended by
deleting [*67543] "Section 2X1.1(b) (1) or (2)" and inserting in lieu
thereof "2X1.1(b)(1)".
Section 2B4.1 is amended in the title by inserting at the end ";
Offering, Giving, Soliciting, or Receiving".
Section 2C1.6 is amended in the title by inserting at the end ";
Offering, Giving, Soliciting, or Receiving".
22. Synopsis of Proposed Amendment: This amendment addresses the meaning
of the term "non-violent offense" in Section 5K2.13 (i.e., whether a
"violent offense" is synonymous with a "crime of violence" as used in
Section 4B1.2 (Definitions of Terms Used in section 4B1.1); and, if so,
whether a departure under this policy statement is prohibited in all such
cases). There is a split among the appellate courts with regard to this
issue. Of the seven circuits that have addressed the question, all except
the DC Circuit follow the holding of United States v. Poff, 926 F.2d 588
(7th Cir. 1991) (en banc) that the terms are synonymous. Hence, departure
for diminished capacity would be precluded for any offense that is a crime
of violence under the guidelines. The DC Circuit, in United States v.
Chatman, 986 F.2d 1446 (DC Cir. 1993), came to a different conclusion,
permitting a downward departure in an unarmed, "idle threat" bank robbery
case.
As generally illustrated by instances in the relevant appellate cases,
the issue arises in cases that fall within the definition of crime of
violence as used in Section 4B1.2 but may not pose any significant risk of
physical injury (e.g., a person with psychological problems who writes a
threatening letter but evidences no intent or capacity to carry out the
threat). As the underlying purpose of this provision seems best expressed
in the clause "provided that the defendant's criminal history does not
indicate a need for incarceration to protect the public," this amendment
revises the language of this policy statement to express its intent more
directly. The option of an additional sentence setting forth, for emphasis,
a strong presumption against the applicability of this provision in the
case of a crime of violence is included.
Proposed Amendment: [Options 1 and 2: Section 5K2.13 is amended by
deleting "a non-violent" and inserting in lieu thereof "an"; and by
deleting "the defendant's criminal history" and inserting in lieu thereof
"consideration of the nature and circumstances of the offense and the
history and characteristics of the defendant".]
[Option 2 only: Section 5K2.13 is amended by inserting the following
additional sentence at the end:
"Absent extraordinary circumstances, a downward departure under this
provision is not authorized for an offense that is a crime of violence as
defined in Section 4B1.2 (Definitions of Terms Used in Section 4B1.1).".]
Proposed Amendment Recommended by the Probation Officers' Advisory Group
23. Synopsis of Proposed Amendment: This amendment revises Section 5G1.3
(Imposition of a Sentence on a Defendant Subject to an Undischarged Term of
Imprisonment) by deleting subsection (c), which currently requires the
court to employ a methodology that parallels the multiple count rules of
Chapter Three, and substituting a provision that allows the court to impose
the sentence either concurrently or consecutively, with an application note
suggesting use of the multiple count methodology only if accurate, factual,
and reliable information concerning the prior sentence is readily
available. This amendment is designed to respond to the difficulty in
obtaining state and local offense information regarding prior unexpired
sentences and accurately applying such information to federal guidelines.
Proposed Amendment: Section 5G1.3 is amended by deleting subsection (c)
and by inserting in lieu thereof:
"(c) In any other case, the sentence for the instant offense may run
concurrently or consecutively to the prior undischarged term of
imprisonment, except to the extent otherwise required by law.".
The Commentary to Section 5G1.3 captioned "Application Notes" is amended
by deleting Note 3 and inserting in lieu thereof:
"3. Where the defendant is subject to an undischarged term of
imprisonment in circumstances other than those set forth in subsection (a)
or (b), subsection (c) applies. The sentence for the instant offense may
run concurrently or consecutively to the prior undischarged term of
imprisonment. If accurate, factual, and reliable information concerning the
prior conviction and sentence for which the defendant is serving the
undischarged term of imprisonment is readily available, the court may
combine the instant offense and the prior offense by applying the grouping
rules at Section 3D1.2 to arrive at an approximate total punishment that
would have been imposed had all the offenses been federal offenses for
which sentences were being imposed at the same time. To the extent
practicable, the court should consider imposing a sentence of imprisonment
that results in incremental punishment as envisioned in Chapter 3, Part D,
and Section 5G1.2.
It is not intended that the above suggested methodology be applied when
it either prolongs or complicates the sentencing process or produces
inaccurate or unreliable results.".
Proposed Amendments Recommended by the Federal and Community Defenders
24. Synopsis of Proposed Amendment: This amendment revises the
Commentary to Section 2D1.1 (Unlawful Manufacturing, Importing, Exporting,
or Trafficking; Attempt or Conspiracy) to provide that in a case involving
negotiation for a quantity of a controlled substance, the negotiated
quantity is used to determine the offense level unless the completed
transaction establishes a larger quantity, or the defendant establishes
that he was not reasonably capable of producing the negotiated amount or
otherwise did not intend to produce that amount. Under the wording of the
current provision, if the defendant establishes that he was not reasonably
capable of producing the quantity of controlled substances but is unable to
establish that he did not intend to produce the quantity of controlled
substances, or if the defendant establishes that he did not intend to
produce the quantity of controlled substance but is unable to establish
that he was not reasonably capable of producing that quantity, he is denied
the benefit of this provision.
Proposed Amendment: The Commentary to Section 2D1.1 captioned
"Application Notes" is amended in Note 12 by deleting the third paragraph
and inserting in lieu thereof:
"In an offense involving negotiation for a quantity of a controlled
substance, the negotiated quantity shall be used in determining the offense
level unless the completed transaction establishes a larger quantity.
However, where the court finds that the defendant was not reasonably
capable of producing, or otherwise did not intend to produce, the
negotiated quantity of controlled substance, the court shall exclude the
amount that it finds the defendant was not reasonably capable of producing
or otherwise did not intend to produce.".
25. Synopsis of Proposed Amendment: This amendment revises Section 2P1.1
(Escape, Instigating or Assisting Escape) to conform the definition of
non-secure custody in subsection (b)(3) to that used in subsection (b)(2),
thus providing more consistent treatment of escapes from non-secure
custody. The definition of non-secure custody in subsection (b)(2) is
consistent with the definition of non-secure custody used by the Bureau of
Prisons. Two options are provided. The difference between Options 1 and 2
is that Option 2 would exclude a prisoner who fails to return from a
furlough from a secure institution from the operation of subsection (b)(3).
Proposed Amendment: [Option 1: Section 2P1.1(b)(3) is amended by
[*67544] deleting "the non-secure custody of a community corrections
center, community treatment center, "halfway house," or similar facility"
and inserting in lieu thereof "non-secure custody".]
[Option 2: Section 2P1.1(b)(3) is amended by deleting "the non-secure
custody of a community corrections center, community treatment center,
"halfway house," or similar facility" and inserting in lieu thereof
"non-secure custody".
Section 2P1.1(b)(3) is amended by inserting "(A) the offense involved a
failure to return from a furlough from secure custody; or (B)" immediately
following "shall not apply if".]
[Both Options: The Commentary to Section 2P1.1 captioned "Application
Notes" is amended in Note 2 by deleting "(not in connection with an arrest
or other charges)" and by inserting in lieu thereof:
"; it does not include notifying authorities of one's status as an escapee
upon being arrested on another charge".]
Proposed Amendments and Issues for Comment Recommended by the Department of
Justice
26. Synopsis of Proposed Amendment: This amendment provides that the
base offense level of 12 in Section 2H2.1 (Obstructing an Election or
Registration) applies in all cases where the defendant corrupts the
registration or votes of others, while the alternative base offense level
of 6 applies where the defendant corrupts only his or her own registration
or ballot. Sections 2H2.1(a) (2) and (3) currently do not clearly
distinguish such cases.
Proposed Amendment: Section 2H2.1(a) is amended by deleting subdivisions
(2) and (3) and inserting in lieu thereof:
"(2) 12, if the obstruction involved corruption of the registration or
votes of others by forgery, fraud, theft, bribery, deceit, or other means;
or
(3) 6, if the defendant corrupted only his own registration or vote.".
The Commentary to Section 2H2.1 captioned "Background" is amended by
deleting the first sentence and inserting in lieu thereof:
"Alternative base offense levels cover three different ways of
obstructing an election:
(1) By the use of force or the threat of force;
(2) By schemes involving deceptive or dishonest conduct with regard to
the registration or votes of others; or
(3) By an individual's selling or otherwise acting fraudulently with
regard only to his own registration or vote.".
27. Synopsis of Proposed Amendment: This amendment revises
SectionSection 2K2.1 (Unlawful Receipt, Possession, or Transportation of
Firearms or Ammunition; Prohibited Transactions Involving Firearms or
Ammunition) and 2K2.5 (Possession of Firearm or Dangerous Weapon in Federal
Facility; Possession or Discharge of Firearm in School Zone) to provide a
4-level increase if the defendant committed the offense as a member of, on
behalf of, or in association with a criminal gang, and defines a "criminal
gang" as a group, club, organization, or association of five or more
persons whose members engage, or have engaged within the past five years,
in a continuing series of crimes of violence and/or controlled substance
offenses as defined in Section 4B1.2.
Proposed Amendment: Section 2K2.1(b) is amended by inserting the
following additional subdivision:
"7. If the defendant committed an offense as a member of, on behalf of,
or in association with a criminal gang, increase by 4 levels. A "criminal
gang" is defined as a group, club, organization, or association of five or
more persons whose members engage, or have engaged within the past five
years, in a continuing series of crimes of violence and/or controlled
substance offenses as defined in Section 4B1.2.".
Section 2K2.5(b) is amended by inserting the following additional
subdivision:
"2. If the defendant committed an offense as a member of, on behalf of,
or in association with a criminal gang, increase by 4 levels. A "criminal
gang" is defined as a group, club, organization, or association of five or
more persons whose members engage, or have engaged within the past five
years, in a continuing series of crimes of violence and/or controlled
substance offenses as defined in Section 4B1.2.";
and in the caption by deleting "Characteristic" and inserting in lieu
thereof "Characteristics".
28. Issue for Comment: The Commission invites comment on whether Section
2K2.5 (Possession of Firearm or Dangerous Weapon in Federal Facility;
Possession or Discharge of Firearm in School Zone) should be amended to
include enhancements if the firearm was discharged or loaded or if the
defendant possessed both a firearm and ammunition in a school zone, and
whether enhancements currently found in Section 2K2.1 (Unlawful Receipt,
Possession, or Transportation of Firearms or Ammunition; Prohibited
Transactions Involving Firearms or Ammunition) should be included in
Section 2K2.5 (e.g., an enhancement for possessing multiple weapons in a
school zone).
The Commission also invites comment on whether Section 2K2.1 (Unlawful
Receipt, Possession, or Transportation of Firearms or Ammunition;
Prohibited Transactions Involving Firearms or Ammunition) should be amended
to increase the base offense level from 12 to 14 for persons who sell
firearms with knowledge or reason to believe that the recipient is a felon
or other prohibited person or an underage person.
29. Issue for Comment: The Commission invites comment on whether to add
an enhancement in Chapter Three (Adjustments) applicable to members of
criminal organizations who expressly agree, or require others to agree, to
commit a crime of violence as a formal condition of membership in that
organization (such act of violence may be required to be committed prior to
approval of membership in the organization or the promise of such act in
the future may be required). The Commission also invites comment on the
number of levels to be given to such an enhancement. Comment is further
invited on whether this circumstance is likely to arise often enough to
warrant a new Chapter Three adjustment or whether it instead should be
addressed as an upward departure consideration in Chapter Five, Part K
(Departures).
30. Issue for Comment: The Commission invites comment on whether Section
4A1.1 (Criminal History Category) and Chapter Five, Part A (Sentencing
Table) should be amended to add additional distinctions. For example,
should all prior sentences of imprisonment of more than one year and one
month continue to receive three criminal history points or should
distinctions be made for longer periods of imprisonment or specific types
of offenses; should distinctions be made where the prior offense and
instant offense are similar; should a separate criminal history category be
created for defendants with a clean record (no arrests or convictions); and
should an additional criminal history category be created for defendants
with substantially more than thirteen criminal history points?
Issue for Comment Recommended by the Judicial Conference Committee on
Criminal Law
31. Issue for Comment: Under Section 1B1.10 (Retroactivity of Amended
Guideline Range), if a defendant is serving a sentence of imprisonment, and
the guideline range applicable to the defendant has subsequently been
lowered as a result of an amendment to the guidelines expressly listed in
Section 1B1.10(d), the court may consider a reduction in the defendant's
term of imprisonment. In determining whether a reduction is warranted and
the extent of any reduction, the court is directed to consider the amended
guideline range. Under Section 1B1.10(b), the amended [*67545] guideline
range is determined by applying the revised Guidelines Manual in its
entirety, thereby making all other amendments retroactive as well. The
Commission invites comment on whether Section 1B1.1(b) should be retained
as written or whether it should be modified so that the amended guideline
range is determined by using only those amendments that have been expressly
designated for retroactive application; such amendments would be applied in
conjunction with the Guidelines Manual used at the defendant's original
sentencing.
Proposed Amendment Recommended by a District Court Judge
32. Synopsis of Proposed Amendment: This amendment creates an additional
guideline in Chapter Three, Part E (Acceptance of Responsibility), to
provide an additional one-level decrease for a defendant who goes to trial
but avoids actions that unreasonably delay or burden the proceedings or
place an undue burden on the government.
Proposed Amendment: Chapter Three, Part E, is amended by inserting the
following additional section:
"Section 3E1.2. Assisting in the Fair and Expeditious Administration of
Justice
If a defendant who goes to trial demonstrates a willingness to assist in
the fair and expeditious administration of justice by avoiding actions
which would unreasonably delay or burden the proceedings or place an undue
burden on the Government, decrease the offense level by one level.
Commentary
Application Note:
1. In determining whether a defendant qualifies under this section,
appropriate considerations include, but are not limited to, the following:
(a) whether the defendant refrained from making frivolous motions;
(b) whether the defendant agreed to reasonable stipulations concerning
issues as to which there was no genuine dispute, for example, stipulated to
business records to avoid prolonging the trial by calling records
custodians.
Background: The reduction of offense level provided by this section
recognizes the legitimate interest in rewarding those defendants who go to
trial but who nonetheless assist in the fair and expeditious administration
of justice by avoiding conduct which unreasonably delays or burdens the
process. Like the extra one-level reduction provided with respect to
certain defendants for timely notification of an intent to plead guilty
(Section 3E1.1(b)(2)), this section seeks to reward conduct that assists
the court and the Government in allocating their resources efficiently.".
Issues for Comment Recommended by Families Against Mandatory Minimums
33(A). Issue for Comment: The Commission invites comment on whether it
should modify the provisions in Section 2D1.1 (Unlawful Manufacturing,
Importing, Exporting, or Trafficking; Attempt or Conspiracy) that
distinguish between cocaine and crack cocaine at the ratio of 100 to 1
(i.e., 100 grams of cocaine is equivalent to 1 gram of crack cocaine). This
ratio is based upon the ratio of crack cocaine to other cocaine contained
in the mandatory minimum sentencing provisions of 21 U.S.C. 841(b)(1)(A)
and (B). The Commission invites comment on whether the 100 to 1 ratio
should continue to be used for guideline purposes, or whether another
ratio, such as 1 to 1, 2 to 1, 5 to 1, or 10 to 1, would better reflect the
relative seriousness of these offenses for guideline purposes.
(B). Issue for Comment: The Commission invites comment on the
appropriate equivalency between a marihuana plant and marihuana for
guideline purposes. Currently, Section 2D1.1 (Unlawful Manufacturing,
Importing, Exporting, or Trafficking; Attempt or Conspiracy) equates each
marihuana plant with one kilogram of marihuana for offenses involving fifty
or more plants, and each plant with 100 grams of marihuana for offenses
involving fewer than fifty plants. The one kilogram per plant ratio is
based on the ratio found in the mandatory minimum sentencing provisions of
21 U.S.C. 841(b)(1)(A) and (B). The relevant legislative history, see 134
Cong. Rec. S17368 (daily ed. Nov. 10, 1988)(statement of Sen. Biden),
indicates that the purpose of using 1,000 kilograms as the equivalent of
1,000 plants was to curtail the debate between defendants charged with
possessing large quantities of marihuana plants and the government over
whether the statutory definition of marihuana included weighing the stems
and seeds as part of the marihuana mixture. Commentators have argued that
the 1 kilogram per plant equivalency is unrealistically high in relation to
the amount of marihuana that a marihuana plant will yield. The equivalency
of 100 grams of marihuana per plant used in offenses involving fewer than
fifty plants was developed after a review by the Commission of information
relating to the actual yield of marihuana plants under a variety of
conditions. The Commission invites comment on whether the current marihuana
plant to marihuana ratio should be maintained, whether an equivalency of
100 grams of marihuana per plant should be adopted for guideline purposes
for all cases, or whether some other equivalency should be adopted.
The Commission also invites comment on any other issue relating to
marihuana plants; e.g., whether male plants should be treated differently
or excluded (because male plants have a comparatively low THC content and
are frequently culled out by growers) or whether a definition of a
marihuana plant should be adopted that would distinguish among plants at
different levels of maturity or would exclude plants below a certain level
of maturity.
Proposed Amendments and Issue for Comment Recommended by the United States
Postal Service
34(A). Synopsis of Proposed Amendment: This amendment creates a new
adjustment in Chapter Three, Part A, to address the harm caused w there is
more than one victim.
Proposed Amendment: Chapter Three, Part A, is amended by inserting the
following additional section:
"Section 3A1.4. Multiple Victims
If the offense affected more than one victim, increase the offense level
as follows:
Number of victims Increase in level
2-99 2
100-349 4
350-649 6
650 or more 8.".
(B). Issue for Comment: The Commission invites comment on methods other
than the use of a victim table to reflect the harm when there is more than
one victim of the offense.
35. Synopsis of Proposed Amendment: This amendment provides a minimum
offense level of 14 for an organized scheme to steal mail.
Proposed Amendment: Section 2B1.1(b) is amended by inserting the
following additional subdivision:
"8. If the offense involved an organized scheme to steal undelivered
United States mail, and the offense level as determined above is less than
level 14, increase to level 14.".
March 15, 1993
United States Sentencing Commission
One Columbus Circle, NE
Suite 2-500, South Lobby
Washington, DC 20002-9002
Attention: Public Information
Re: Proposed Amendent #59 to the Sentencing Guidelines for
United States Courts, which creates a new guideline applicable
to violations of the Computer Fraud and Abuse Act of 1988 (18
U.S.C. 1030)
Dear Commissioners:
The Electronic Frontier Foundation (EFF) writes to state our opposition
to the new proposed sentencing guideline applicable to violations of the
Computer Fraud and Abuse Act of 1988, 18 U.S.C. 1030 (CFAA). We
believe that, while the proposed guideline promotes the Justice
Department's interest in punishing those who engage in computer fraud
and abuse, the guideline is much too harsh for first time offenders and
those who perpetrate offenses under the statute without malice
aforethought. In addition, promulgation of a sentencing guideline at
the present time is premature, as there have been very few published
opinions where judges have issued sentences for violations of the CFAA.
Finally, in this developing area of the law, judges should be permitted
to craft sentences that are just in relation to the facts of the
specific cases before them.
The Proposed Guideline Is Too Harsh.
The proposed CFAA sentencing guideline, with a base offense level of six
and innumerable enhancements, would impose strict felony liability for
harms that computer users cause through sheer inadvertence. This
guideline would require imprisonment for first time offenders who caused
no real harm and meant none. EFF is opposed to computer trespass and
theft, and we do not condone any unauthorized tampering with computers -
- indeed, EFF's unequivocal belief is that the security of private
computer systems and networks is both desirable and necessary to the
maintenance of a free society. However, it is entirely contrary to our
notions of justice to brand a computer user who did not intend to do
harm as a felon. Under the proposed guideline, even a user who
painstakingly attempts to avoid causing harm, but who causes harm
nonetheless, will almost assuredly be required to serve some time in
prison.
The proposed guideline, where the sentencing judge is given no
discretion for crafting a just sentence based on the facts of the case,
is too harsh on less culpable defendants, particularly first time
offenders. As the Supreme Court has stated, the notion that a culpable
mind is a necessary component of criminal guilt is "as universal and
persistent in mature systems of law as belief in freedom of the human
will and a consequent ability and duty of the normal individual to
choose between good and evil." Morissette v. United States, 342 U.S.
246, 250 (1952). In the words of another court, "[u]sually the stigma
of criminal conviction is not visited upon citizens who are not morally
to blame because they did not know they were doing wrong." United
States v. Marvin, 687 F.2d 1221, 1226 (8th Cir. 1982), cert. denied, 460
U.S. 1081 (1983).
There Is Not Yet Enough Caselaw to Warrant a Guideline.
The Sentencing Commission itself has recognized the importance of
drafting guidelines based on a large number of reported decisions. In
the introduction to the Sentencing Commission's Guidelines Manual, the
Commission states:
The Commission emphasizes that it drafted the initial guidelines with
considerable caution. It examined the many hundreds of criminal
statutes in the United States Code. It began with those that were the
basis for a significant number of prosecutions and sought to place them
in a rational order. It developed additional distinctions relevant to
the application of these provisions, and it applied sentencing ranges to
each resulting category. In doing so, it relied upon pre-guidelines
sentencing practice as revealed by its own statistical analyses based on
summary reports of some 40,000 convictions, a sample of 10,000 augmented
pre-sentence reports, the parole guidelines, and policy judgments.
United States Sentencing Commission, Guidelines Manual, Chap. 1, Part A
(1991).
At the present time, there are only five reported decisions that mention
the court's sentencing for violations of the Computer Fraud and Abuse
Act. See, United States v. Lewis, 872 F.2d 1030 (6th Cir. 1989); United
States v. Morris, 928 F.2d 504 (2d Cir. 1991), cert. denied, 112 S. Ct.
72 (1991); United States v. Carron, 1991 U.S. App. LEXIS 4838 (9th Cir.
1991); United States v. Rice, 1992 U.S. App. LEXIS 9562 (1992); and
United States v. DeMonte, 1992 U.S. App. LEXIS 11392 (6th Cir. 1992).
New communications technologies, in their earliest infancy, are becoming
the subject of precedent-setting litigation. Overly strict sentences
imposed for computer-related fraud and abuse may have the effect of
chilling these technologies even as they develop. Five decisions are
not enough on which to base a guideline to be used in such an important
and growing area of the law.
The Commission itself has recognized that certain areas of federal
criminal law and procedure are so new that policy statements, rather
than inflexible guidelines, are preferable. See, e.g., United States
Sentencing Commission, Guidelines Manual, Chap. 7, Part A (1990)
(stating the Commission's choice to promulgate policy statements, rather
than guidelines, for revocation of probation and supervised release
"until federal judges, probation officers, practitioners, and others
have the opportunity to evaluate and comment. . . ."). A flexible
policy statement, rather than a specific sentencing guideline, is a more
appropriate way to handle sentencing under the Computer Fraud and Abuse
Act until there has been enough litigation on which to base a guideline.
Judges Must Be Permitted to Craft Their Own Sentences for Cases
Involving Special Circumstances.
Individual sentencing decisions are best left to the discretion of the
sentencing judge, who presumably is most familiar with the facts unique
to each case. To promulgate an inflexible sentencing guideline, which
would cover all crimes that could conceivably be prosecuted under the
Computer Fraud and Abuse Act, is premature at this time.
As discussed above, there have only been five reported decisions where
the Computer Fraud and Abuse Act has been applied. In three of these
reported CFAA cases, the judges involved used their discretion and
fashioned unique sentences for the defendants based on the special facts
of the case. See, Morris, 928 F.2d at 506 (where the judge placed
Defendant Morris on probation for three years to perform 400 hours of
community service, ordered him to pay fines of $10,050, and ordered him
to pay for the cost of his supervision at a rate of $91 a month); Carron
at 3 (where the judge found that Defendant Carron's criminal history
justified a sentence of 12 months incarceration followed by 12 months of
supervised release and restitution to the two injured credit card
companies); and DeMonte at 4 (where the trial court judge held that
Defendant DeMonte's "extraordinary and unusual level of cooperation"
warranted a sentence of three years probation with no incarceration).
Judges must be permitted to continue fashioning sentences that are just,
based on the facts of a specific case.
Computer communications are still in their infancy. Legal precedents,
particularly the application of a sentencing guideline to violations of
the Computer Fraud and Abuse Act, can radically affect the course of the
computer technology's future, and with it the fate of an important tool
for the exchange of ideas in a democratic society. When the law limits
or inhibits the use of new technologies, a grave injustice is being
perpetrated. The Electronic Frontier Foundation respectfully asks the
Commission to hold off promulgating a sentencing guideline for the
Computer Fraud and Abuse Act until there are enough prosecutions on
which to base a guideline.
Thank you in advance for your thoughtful consideration of our concerns.
We would be pleased to provide the Commission with any further
information that may be needed.
Sincerely yours,
Shari Steele
Staff Attorney
The Electronic Frontier Foundation is a privately funded, tax-exempt,
nonprofit organization concerned with the civil liberties, technical and
social problems posed by the applications of new computing and
telecommunications technology. Its founders include Mitchell Kapor, a
leading pioneer in computer software development who founded the Lotus
Development Corporation and developed the Lotus 1-2-3 Spreadsheet
software.
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
LEGAL OVERVIEW
THE ELECTRONIC FRONTIER AND THE BILL OF RIGHTS
Advances in computer technology have brought us to a new frontier in
communications, where the law is largely unsettled and woefully
inadequate to deal with the problems and challenges posed by electronic
technology. How the law develops in this area will have a direct impact
on the electronic communications experiments and innovations being
devised day in and day out by millions of citizens on both a large and
small scale from coast to coast. Reasonable balances have to be struck
among:
* traditional civil liberties
* protection of intellectual property
* freedom to experiment and innovate
* protection of the security and integrity of computer
systems from improper governmental and private
interference.
Striking these balances properly will not be easy, but if they are
struck too far in one direction or the other, important social and legal
values surely will be sacrificed.
Helping to see to it that this important and difficult task is done
properly is a major goal of the Electronic Frontier Foundation. It is
critical to assure that these lines are drawn in accordance with the
fundamental constitutional rights that have protected individuals from
government excesses since our nation was founded -- freedom of speech,
press, and association, the right to privacy and protection from
unwarranted governmental intrusion, as well as the right to procedural
fairness and due process of law.
The First Amendment
The First Amendment to the United States Constitution prohibits the
government from "abridging the freedom of speech, or of the press," and
guarantees freedom of association as well. It is widely considered to
be the single most important of the guarantees contained in the Bill of
Rights, since free speech and association are fundamental in securing
all other rights.
The First Amendment throughout history has been challenged by every
important technological development. It has enjoyed only a mixed record
of success. Traditional forms of speech -- the print media and public
speaking -- have enjoyed a long and rich history of freedom from
governmental interference. The United States Supreme Court has not
afforded the same degree of freedom to electronic broadcasting,
however.
Radio and television communications, for example, have been subjected to
regulation and censorship by the Federal Communications Commission
(FCC), and by the Congress. The Supreme Court initially justified
regulation of the broadcast media on technological grounds -- since
there were assumed to be a finite number of radio and television
frequencies, the Court believed that regulation was necessary to prevent
interference among frequencies and to make sure that scarce resources
were allocated fairly. The multiplicity of cable TV networks has
demonstrated the falsity of this "scarce resource" rationale, but the
Court has expressed a reluctance to abandon its outmoded approach
without some signal from Congress or the FCC.
Congress has not seemed overly eager to relinquish even
counterproductive control over the airwaves. Witness, for example,
legislation and rule-making in recent years that have kept even
important literature, such as the poetry of Allen Ginsberg, from being
broadcast on radio because of language deemed "offensive" to regulators.
Diversity and experimentation have been sorely hampered by these rules.
The development of computer technology provides the perfect opportunity
for lawmakers and courts to abandon much of the distinction between the
print and electronic media and to extend First Amendment protections to
all communications regardless of the medium. Just as the multiplicity
of cable lines has rendered obsolete the argument that television has to
be regulated because of a scarcity of airwave frequencies, so has the
ready availability of virtually unlimited computer communication
modalities made obsolete a similar argument for harsh controls in this
area. With the computer taking over the role previously played by the
typewriter and the printing press, it would be a constitutional disaster
of major proportions if the treatment of computers were to follow the
history of regulation of radio and television, rather than the history
of freedom of the press.
To the extent that regulation is seen as necessary and proper, it should
foster the goal of allowing maximum freedom, innovation and
experimentation in an atmosphere where no one's efforts are sabotaged by
either government or private parties. Regulation should be limited by
the adage that quite aptly describes the line that separates reasonable
from unreasonable regulation in the First Amendment area: "Your liberty
ends at the tip of my nose."
As usual, the law lags well behind the development of technology. It is
important to educate lawmakers and judges about new technologies, lest
fear and ignorance of the new and unfamiliar, create barriers to free
communication, expression, experimentation, innovation, and other such
values that help keep a nation both free and vigorous.
The Fourth Amendment
The Fourth Amendment guarantees that "the right of the people to
be secure in their persons, houses, papers, and effects, against
unreasonable searches and seizures, shall not be violated, and no
Warrants shall issue, but upon probable cause, supported by Oath
or affirmation, and particularly describing the place to be
searched, and the persons or things to be seized."
In short, the scope of the search has to be as narrow as
possible, and there has to be good reason to believe that the
search will turn up evidence of illegal activity.
The meaning of the Fourth Amendment's guarantee has evolved over time in
response to changing technologies. For example, while the Fourth
Amendment was first applied to prevent the government from trespassing
onto private property and seizing tangible objects, the physical
trespass rationale was made obsolete by the development of electronic
eavesdropping devices which permitted the government to "seize" an
individual's words without ever treading onto that person's private
property. To put the matter more concretely, while the drafters of the
First Amendment surely knew nothing about electronic databases, surely
they would have considered one's database to be as sacrosanct as, for
example, the contents of one's private desk or filing cabinet.
The Supreme Court responded decades ago to these types of technological
challenges by interpreting the Fourth Amendment more broadly to prevent
governmental violation of an individual's reasonable expectation of
privacy, a concept that transcended the narrow definition of one's
private physical space. It is now well established that an individual
has a reasonable expectation of privacy, not only in his or her home
and business, but also in private communications. Thus, for example:
* Government wiretapping and electronic eavesdropping are now limited
by state and federal statutes enacted to effectuate and even to expand
upon Fourth Amendment protections.
* More recently, the Fourth Amendment has been used, albeit with
limited success, to protect individuals from undergoing certain random
mandatory drug testing imposed by governmental authorities.
Advancements in technology have also worked in the opposite direction,
to diminish expectations of privacy that society once considered
reasonable, and thus have helped limit the scope of Fourth Amendment
protections. Thus, while one might once have reasonably expected
privacy in a fenced-in field, the Supreme Court has recently told us
that such an expectation is not reasonable in an age of surveillance
facilitated by airplanes and zoom lenses.
Applicability of Fourth Amendment to computer media
Just as the Fourth Amendment has evolved in response to changing
technologies, so it must now be interpreted to protect the reasonable
expectation of privacy of computer users in, for example, their
electronic mail or electronically stored secrets. The extent to which
government intrusion into these private areas should be allowed, ought
to be debated openly, fully, and intelligently, as the Congress seeks to
legislate in the area, as courts decide cases, and as administrative,
regulatory, and prosecutorial agencies seek to establish their turf.
One point that must be made, but which is commonly misunderstood, is
that the Bill of Rights seeks to protect citizens from privacy invasions
committed by the government, but, with very few narrow exceptions, these
protections do not serve to deter private citizens from doing what the
government is prohibited from doing. In short, while the Fourth
Amendment limits the government's ability to invade and spy upon private
databanks, it does not protect against similar invasions by private
parties. Protection of citizens from the depredations of other citizens
requires the passage of privacy legislation.
The Fifth Amendment
The Fifth Amendment assures citizens that they will not "be deprived of
life, liberty, or property, without due process of law" and that private
property shall not "be taken for public use without just compensation."
This Amendment thus protects both the sanctity of private property and
the right of citizens to be proceeded against by fair means before they
may be punished for alleged infractions of the law.
One aspect of due process of law is that citizens not be prosecuted for
alleged violations of laws that are so vague that persons of reasonable
intelligence cannot be expected to assume that some prosecutor will
charge that his or her conduct is criminal. A hypothetical law, for
example, that makes it a crime to do "that which should not be done",
would obviously not pass constitutional muster under the Fifth
Amendment. Yet the application of some existing laws to new situations
that arise in the electronic age is only slightly less problematic than
the hypothetical, and the Electronic Frontier Foundation plans to
monitor the process by which old laws are modified, and new laws are
crafted, to meet modern situations.
One area in which old laws and new technologies have already clashed and
are bound to continue to clash, is the application of federal criminal
laws against the interstate transportation of stolen property. The
placement on an electronic bulletin board of arguably propriety computer
files, and the "re-publication" of such material by those with access to
the bulletin board, might well expose the sponsor of the bulletin board
as well as all participants to federal felony charges, if the U.S.
Department of Justice can convince the courts to give these federal laws
a broad enough reading. Similarly, federal laws protecting against
wiretapping and electronic eavesdropping clearly have to be updated to
take into account electronic bulletin board technology, lest those who
utilize such means of communication should be assured of reasonable
privacy from unwanted government surveillance.
Summary
The problem of melding old but still valid concepts of constitutional
rights, with new and rapidly evolving technologies, is perhaps best
summed up by the following observation. Twenty-five years ago there was
not much question but that the First Amendment prohibited the government
from seizing a newspaper's printing press, or a writer's typewriter, in
order to prevent the publication of protected speech. Similarly, the
government would not have been allowed to search through, and seize,
one's private papers stored in a filing cabinet, without first
convincing a judge that probable cause existed to believe that evidence
of crime would be found.
Today, a single computer is in reality a printing press, typewriter, and
filing cabinet (and more) all wrapped up in one. How the use and output
of this device is treated in a nation governed by a Constitution that
protects liberty as well as private property, is a major challenge we
face. How well we allow this marvelous invention to continue to be
developed by creative minds, while we seek to prohibit or discourage
truly abusive practices, will depend upon the degree of wisdom that
guides our courts, our legislatures, and governmental agencies entrusted
with authority in this area of our national life.
For further information regarding The Bill of Rights please contact:
Harvey Silverglate
Silverglate & Good
89 Broad Street, 14th Floor
Boston, MA 02110
617/542-6663
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Date: Fri, 19 Jan 90 19:13:44 -0500
From: cjs%
[email protected] (Christopher J. Seline (
[email protected]))
The following is a prepublication draft of an article on TEMPEST. I am posting
it to this news group in the hope that it will:
(1) stimulate discussion of this issue;
(2) expose any technical errors in the document;
(3) solicit new sources of information;
(4) uncover anything I have forgotten to cover.
I will be unable to monitor the discussions of the article. Therefore, PLEASE
post your comments to the news group BUT SEND ME A COPY AT THE ADDRESS LISTED
BELOW.
I have gotten a number of mail messages about the format of this
article. Some explanation is in order: The numbered paragraphs
following "____________________" on each page are footnotes. I suggest
printing out the document rather than reading it on your CRT.
Thanks you in advance.
Christopher Seline
[email protected]
[email protected]
(c) 1990 Christopher J. Seline
=============================================================================
<Start Print Job>
<New Page>
Eavesdropping On
the Electromagnetic Emanations
of Digital Equipment:
The Laws of Canada,
England and the United States
This document is a rough
draft. The Legal
Sections are overviews.
T h e y w i l l b e
significantly expanded in
the next version.
We in this country, in this generation, are -- by
destiny rather than choice -- the watchmen on the
walls of world freedom.[1]
-President John F.
Kennedy
_____________________
1. Undelivered speech of President John F. Kennedy, Dallas
Citizens Council (Nov. 22, 1963) 35-36.
<New Page>
In the novel 1984, George Orwell foretold a future
where individuals had no expectation of privacy because the
state monopolized the technology of spying. The government
watched the actions of its subjects from birth to death. No
one could protect himself because surveillance and counter-
surveillance technology was controlled by the government.
This note explores the legal status of a surveillance
technology ruefully known as TEMPEST[2]. Using TEMPEST
technology the information in any digital device may be
intercepted and reconstructed into useful intelligence
without the operative ever having to come near his target.
The technology is especially useful in the interception of
information stored in digital computers or displayed on
computer terminals.
The use of TEMPEST is not illegal under the laws of the
United States[3], or England. Canada has specific laws
criminalizing TEMPEST eavesdropping but the laws do more to
hinder surveillance countermeasures than to prevent TEMPEST
surveillance. In the United States it is illegal for an
individual to take effective counter-measures against
TEMPEST surveillance. This leads to the conundrum that it
is legal for individuals and the government to invade the
privacy of others but illegal for individuals to take steps
to protect their privacy.
The author would like to suggest that the solution to
this conundrum is straightforward. Information on
_____________________
2. TEMPEST is an acronym for Transient Electromagnetic Pulse
Emanation Standard. This standard sets forth the official views
of the United States on the amount of electromagnetic radiation
that a device may emit without compromising the information it is
processing. TEMPEST is a defensive standard; a device which
conforms to this standard is referred to as TEMPEST Certified.
The United States government has refused to declassify the
acronym for devices used to intercept the electromagnetic
information of non-TEMPEST Certified devices. For this note,
these devices and the technology behind them will also be
referred to as TEMPEST; in which case, TEMPEST stands for
Transient Electromagnetic Pulse Surveillance Technology.
The United States government refuses to release details
regarding TEMPEST and continues an organized effort to censor the
dissemination of information about it. For example the NSA
succeeded in shutting down a Wang Laboratories presentation on
TEMPEST Certified equipment by classifying the contents of the
speech and threatening to prosecute the speaker with revealing
classified information. [cite coming].
3. This Note will not discuses how TEMPEST relates to the
Warrant Requirement under the United States Constitution. Nor
will it discuss the Constitutional exclusion of foreign nationals
from the Warrant Requirement.
<New Page>
protecting privacy under TEMPEST should be made freely
available; TEMPEST Certified equipment should be legally
available; and organizations possessing private information
should be required by law to protect that information
through good computer security practices and the use of
TEMPEST Certified equipment.
I. INTELLIGENCE GATHERING
Spying is divided by professionals into two main types:
human intelligence gathering (HUMINT) and electronic
intelligence gathering (ELINT). As the names imply, HUMINT
relies on human operatives, and ELINT relies on
technological operatives. In the past HUMINT was the sole
method for collecting intelligence.[4] The HUMINT operative
would steal important papers, observe troop and weapon
movements[5], lure people into his confidences to extract
secrets, and stand under the eavesdrip[6] of houses,
eavesdropping on the occupants.
As technology has progressed, tasks that once could
only be performed by humans have been taken over by
machines. So it has been with spying. Modern satellite
technology allows troop and weapons movements to be observed
with greater precision and from greater distances than a
human spy could ever hope to accomplish. The theft of
documents and eavesdropping on conversations may now be
performed electronically. This means greater safety for the
human operative, whose only involvement may be the placing
of the initial ELINT devices. This has led to the
ascendancy of ELINT over HUMINT because the placement and
_____________________
4. HUMINT has been used by the United States since the
Revolution. "The necessity of procuring good intelligence is
apparent & need not be further urged -- All that remains for me
to add is, that you keep the whole matter as secret as possible.
For upon Secrecy, Success depends in Most Enterprises of the
kind, and for want of it, they are generally defeated, however
well planned & promising a favorable issue." Letter of George
Washington (Jul. 26, 1777).
5. "... I wish you to take every possible pains in your powers,
by sending trusty persons to Staten Island in whom you can
confide, to obtain Intelligence of the Enemy's situation &
numbers -- what kind of Troops they are, and what Guards they
have -- their strength & where posted." Id.
6. Eavesdrip is an Anglo-Saxon word, and refers to the wide
overhanging eaves used to prevent rain from falling close to a
house's foundation. The eavesdrip provided "a sheltered place
where one could hide to listen clandestinely to conversation
within the house." W. MORRIS & M. MORRIS, MORRIS DICTIONARY OF
WORD AND PHRASE ORIGINS, 198 (1977).
<New Page>
monitoring of ELINT devices may be performed by a technician
who has no training in the art of spying. The gathered
intelligence may be processed by an intelligence expert,
perhaps thousands of miles away, with no need of field
experience.
ELINT has a number of other advantages over HUMINT. If
a spy is caught his existence could embarrass his employing
state and he could be forced into giving up the identities
of his compatriots or other important information. By its
very nature, a discovered ELINT device (bug) cannot give up
any information; and the ubiquitous nature of bugs provides
the principle state with the ability to plausibly deny
ownership or involvement.
ELINT devices fall into two broad categories:
trespassatory and non-trespassatory. Trespassatory bugs
require some type of trespass in order for them to function.
A transmitter might require the physical invasion of the
target premises for placement, or a microphone might be
surreptitiously attached to the outside of a window. A
telephone transmitter can be placed anywhere on the phone
line, including at the central switch. The trespass comes
either when it is physically attached to the phone line, or
if it is inductive, when placed in close proximity to the
phone line. Even microwave bugs require the placement of
the resonator cone within the target premises.[7]
Non-trespassatory ELINT devices work by receiving
electromagnetic radiation (EMR) as it radiates through the
aether, and do not require the placement of bugs. Methods
include intercepting[8] information transmitted by satellite,
microwave, and radio, including mobile and cellular phone
transmissions. This information was purposely transmitted
with the intent that some intended person or persons would
receive it.
Non-trespassatory ELINT also includes the interception
of information that was never intended to be transmitted.
All electronic devices emit electromagnetic radiation. Some
of the radiation, as with radio waves, is intended to
transmit information. Much of this radiation is not
intended to transmit information and is merely incidental to
_____________________
7. Pursglove, How Russian Spy Radios Work, RADIO ELECTRONICS,
89-91 (Jan 1962).
8. Interception is an espionage term of art and should be
differentiated from its more common usage. When information is
intercepted, the interceptor as well as the intended recipient
receive the information. Interception when not used as a term of
art refers to one person receiving something intended for someone
else; the intended recipient never receives what he was intended
to receive.
<New Page>
whatever work the target device is performing.[9] This
information can be intercepted and reconstructed into a
coherent form. With current TEMPEST technology it is
possible to reconstruct the contents of computer video
display terminal (VDU) screens from up to a kilometer
distant[10]; reconstructing the contents of a computer's
_____________________
9. There are two types of emissions, conducted and radiated.
Radiated emissions are formed when components or cables act as
antennas for transmit the EMR; when radiation is conducted along
cables or other connections but not radiated it is referred to as
"conducted". Sources include cables, the ground loop, printed
circuit boards, internal wires, the power supply to power line
coupling, the cable to cable coupling, switching transistors, and
high-power amplifiers. WHITE & M. MARDIGUIAN, EMI CONTROL
METHODOLOGY AND PROCEDURES, 10.1 (1985).
"[C]ables may act as an antenna to transmit the signals
directly or even both receive the signals and re-emit them
further away from the source equipment. It is possible that
cables acting as an antenna in such a manner could transmit the
signals much more efficiently than the equipment itself...A
similar effect may occur with metal pipes such as those for
domestic water supplies. ... If an earthing [(grounding)] system
is not installed correctly such that there is a path in the
circuit with a very high resistance (for example where paint
prevents conduction and is acting as an insulator), then the
whole earthing system could well act in a similar fashion to an
antenna. ... [For a VDU] the strongest signals, or harmonics
thereof, are usually between 60-250 MHz approximately. There
have however been noticeable exception of extremely strong
emissions in the television bands and at higher frequencies
between 450-800 MHz. Potts, Emission Security, 3 COMPUTER LAW
AND SECURITY REPORT 27 (1988).
10. The TEMPEST ELINT operator can distinguish between different
VDUs in the same room because of the different EMR
characteristics of both homo and heterogeneous units. "[T]here
is little comparison between EMR characteristics from otherwise
comparable equipment. Only if the [VDU] was made with exactly
the same components is there any similarity. If some of the
components have come from a different batch, have been updated in
some way, and especially if they are from a different
manufacturer, then completely different results are obtained. In
this way a different mark or version of the same [VDU] will emit
different signals. Additionally because of the variation of
manufacturing standards between counties, two [VDUs] made by the
same company but sourced from different counties will have
entirely different EMR signal characteristics...From this it way
be thought that there is such a jumble of emissions around, that
it would not be possible to isolate those from any one particular
source. Again, this is not the case. Most received signals have
<New Page>
memory or the contents of its mass storage devices is more
complicated and must be performed from a closer distance.[11]
The reconstruction of information via EMR, a process for
which the United States government refuses to declassify
either the exact technique or even its name[12], is not
limited to computers and digital devices but is applicable
to all devices that generate electromagnetic radiation.[13]
TEMPEST is especially effective against VDUs because they
produce a very high level of EMR.[14]
_____________________
a different line synchronization, due to design, reflection,
interference or variation of component tolerances. So that if
for instance there are three different signals on the same
frequency ... by fine tuning of the RF receiver, antenna
manipulation and modification of line synchronization, it is
possible to lock onto each of the three signals separately and so
read the screen information. By similar techniques, it is
entirely possible to discriminate between individual items of
equipment in the same room." Potts, supra note 9.
For a discussion of the TEMPEST ELINT threat See e.g.,
Memory Bank, AMERICAN BANKER 20 (Apr 1 1985); Emissions from Bank
Computer Systems Make Eavesdropping Easy, Expert Says, AMERICAN
BANKER 1 (Mar 26 1985); CRT spying: a threat to corporate
security, PC WEEK (Mar 10 1987).
11. TEMPEST is concerned with the transient electromagnetic
pulses formed by digital equipment. All electronic equipment
radiates EMR which may be reconstructed. Digital equipment
processes information as 1's and 0's--on's or off's. Because of
this, digital equipment gives off pulses of EMR. These pulses
are easier to reconstruct at a distance than the non-pulse EMR
given off by analog equipment. For a thorough discussion the
radiation problems of broadband digital information see e.g.
military standard MIL-STD-461 REO2; White supra note 9, 10.2.
12. See supra note 2.
13. Of special interest to ELINT collectors are EMR from
computers, communications centers and avionics. Schultz,
Defeating Ivan with TEMPEST, DEFENSE ELECTRONICS 64 (June 1983).
14. The picture on a CRT screen is built up of picture
elements (pixels) organized in lines across the screen. The
pixels are made of material that fluoresces when struck with
energy. The energy is produced by a beam of electrons fired from
an electron gun in the back of the picture tube. The electron
beam scans the screen of the CRT in a regular repetitive manner.
When the voltage of the beam is high then the pixel it is focused
upon emits photons and appears as a dot on the screen. By
selectively firing the gun as it scans across the face of the
CRT, the pixels form characters on the CRT screen.
<New Page>
ELINT is not limited to governments. It is routinely
used by individuals for their own purposes. Almost all
forms of ELINT are available to the individual with either
the technological expertise or the money to hire someone
with the expertise. Governments have attempted to
criminalize all use of ELINT by their subjects--to protect
the privacy of both the government and the population.
II. UNITED STATES LAW
In the United States, Title III of the Omnibus Streets
and Crimes Act of 1968[15] criminalizes trespassatory ELINT as
the intentional interception of wire communications.[16] As
originally passed, Title III did not prohibit non-
_____________________
The pixels glow for only a very short time and must be
routinely struck by the electron beam to stay lit. To maintain
the light output of all the pixels that are supposed to be lit,
the electron beam traverses the entire CRT screen sixty times a
second. Every time the beam fires it causes a high voltage EMR
emission. This EMR can be used to reconstruct the contents of
the target CRT screen. TEMPEST ELINT equipment designed to
reconstruct the information synchronizes its CRT with the target
CRT. First, it uses the EMR to synchronize its electron gun with
the electron gun in the target CRT. Then, when the TEMPEST ELINT
unit detects EMR indicating that the target CRT fired on a pixel,
the TEMPEST ELINT unit fires the electron gun of its CRT. The
ELINT CRT is in perfect synchronism with the target CRT; when the
target lights a pixel, a corresponding pixel on the TEMPEST ELINT
CRT is lit. The exact picture on the target CRT will appear on
the TEMPEST ELINT CRT. Any changes on the target screen will be
instantly reflected in the TEMPEST ELINT screen.
TEMPEST Certified equipment gives off emissions levels that
are too faint to be readily detected. Certification levels are
set out in National Communications Security Information
Memorandum 5100A (NACSIM 5100A). "[E]mission levels are
expressed in the time and frequency domain, broadband or narrow
band in terms of the frequency domain, and in terms of conducted
or radiated emissions." White, supra, note 9, 10.1.
For a thorough though purposely misleading discussion of
TEMPEST ELINT see Van Eck, Electromagnetic Radiation from Video
Display units: An Eavesdropping Risk?, 4 Computers & Security 269
(1985).
15. Pub. L. No. 90-351, 82 Stat. 197. The Act criminalizes
trespassatory ELINT by individuals as well as governmental
agents. cf. Katz v. United States, 389 U.S. 347 (1967) (Fourth
Amendment prohibits surveillance by government not individuals.)
16. 18 U.S.C. 2511(1)(a).
<New Page>
trespassatory ELINT,[17] because courts found that non-wire
communication lacked any expectation of p2IIIrivacy.[18] The
Electronic Communications Privacy Act of 1986[19] amended
Title III to include non-wire communication. ECPA was
specifically designed to include electronic mail, inter-
computer communications, and cellular telephones. To
accomplish this, the expectation of privacy test was
eliminated.[20]
As amended, Title III still outlaws the electronic
interception of communications. The word "communications"
indicates that someone is attempting to communicate
something to someone; it does not refer to the inadvertent
transmission of information. The reception and
reconstruction of emanated transient electromagnetic pulses
(ETEP), however, is based on obtaining information that the
target does not mean to transmit. If the ETEP is not
intended as communication, and is therefore not transmitted
in a form approaching current communications protocols, then
it can not be considered communications as contemplated by
Congress when it amended Title III. Reception, or
interception, of emanated transient electromagnetic pulses
is not criminalized by Title III as amended.
III. ENGLISH LAW
In England the Interception of Communications Act
1985[21] criminalizes the tapping of communications sent over
_____________________
17. United States v. Hall, 488 F.2d 193 (9th Cir. 1973) (found
no legislative history indicating Congress intended the act to
include radio-telephone conversations). Further, Title III only
criminalized the interception of "aural" communications which
excluded all forms of computer communications.
18. Willamette Subscription Television v. Cawood, 580 F.Supp
1164 (D. Or. 1984) (non-wire communications lacks any expectation
of privacy).
19. Pub. L. No. 99-508, 100 Stat. 1848 (codified at 18 U.S.C.
2510-710) [hereinafter ECPA].
20. 18 U.S.C. 2511(1)(a) criminalizes the interception of "any
wire, oral or electronic communication" without regard to an
expectation of privacy.
21. Interception of Communications Act 1985, Long Title, An Act
to make new provision for and in connection with the interception
of communications sent by post or by means of public
telecommunications systems and to amend section 45 of the
Telecommunications Act 1984.
<New Page>
public telecommunications lines.[22] The interception of
communications on a telecommunication line can take place
with a physical tap on the line, or the passive interception
of microwave or satellite links.[23] These forms of passive
interception differ from TEMPEST ELINT because they are
intercepting intended communication; TEMPEST ELINT
intercepts unintended communication. Eavesdropping on the
emanations of computers does not in any way comport to
tapping a telecommunication line and therefore falls outside
the scope of the statute.[24]
IV. CANADIAN LAW
Canada has taken direct steps to limit eavesdropping on
computers. The Canadian Criminal Amendment Act of 1985
_____________________
22. Interception of Communications Act 1985 1, Prohibition on
Interception:
(1) Subject to the following provisions of this section, a
person who intentionally intercepts a communication in the
course of its transmission by post or by means of a public
telecommunications system shall be guilty of an offence and
liable--
(a) on summary conviction, to a fine not exceeding the
statutory maximum;
(b) on conviction on indictment, to imprisonment for a
term not exceeding two years or to a fine or to both.
***
23. Tapping (aka trespassatory eavesdropping) is patently in
violation of the statute. "The offense created by section 1 of
the Interception of Communications Act 1985 covers those forms of
eavesdropping on computer communications which involve "tapping"
the wires along which messages are being passed. One problem
which may arise, however, is the question of whether the
communication in question was intercepted in the course of its
transmission by means of a public telecommunications system. It
is technically possible to intercept a communication at several
stages in its transmission, and it may be a question of fact to
decide the stage at which it enters the "public" realm. THE LAW
COMMISSION,WORKING PAPER NO. 110: COMPUTER MISUSE, 3.30 (1988).
24. "There are also forms of eavesdropping which the Act does
not cover. For example. eavesdropping on a V.D.U. [referred to
in this text as a CRT] screen by monitoring the radiation field
which surrounds it in order to display whatever appears on the
legitimate user's screen on the eavesdropper's screen. This
activity would not seem to constitute any criminal offence..."
THE LAW COMMISSION, WORKING PAPER NO. 110: COMPUTER MISUSE, 3.31
(1988).
<New Page>
criminalized indirect access to a computer service.[25] The
specific reference to an "electromagnetic device" clearly
shows the intent of the legislature to include the use of
TEMPEST ELINT equipment within the ambit of the legislation.
The limitation of obtaining "any computer service" does
lead to some confusion. The Canadian legislature has not
made it clear whether "computer service" refers to a
computer service bureau or merely the services of a
computer. If the Canadians had meant access to any
computer, why did they refer to any "computer service".
This is especially confusing considering the al-
encompassing language of (b) 'any function of a computer
system'.
Even if the Canadian legislation criminalizes
eavesdropping on all computers, it does not solve the
problem of protecting the privacy of information. The
purpose of criminal law is to control crime.[26] Merely
making TEMPEST ELINT illegal will not control its use.
First, because it is an inherently passive crime it is
impossible to detect and hence punish. Second, making this
form of eavesdropping illegal without taking a proactive
stance in controlling compromising emanations gives the
public a false sense of security. Third, criminalizing the
possession of a TEMPEST ELINT device prevents public sector
research into countermeasures. Finally, the law will not
prevent eavesdropping on private information held in company
computers unless disincentives are given for companies that
do not take sufficient precautions against eavesdropping and
simple, more common, information crimes.[27]
_____________________
25. 301.2(1) of the Canadian criminal code states that anyone
who:
... without color of right,
(a) obtains, directly or indirectly, any computer service,
(b) by means of an electromagnetic ... or other device,
intercepts or causes to be intercepted, either directly or
indirectly, any function of a computer system ... [is guilty of
an indictable offence].
26. UNITED STATES SENTENCING COMM'N, FEDERAL SENTENCING
GUIDELINES MANUAL (1988) (Principles Governing the Redrafting of
the Preliminary Guidelines "g." (at an unknown page))
27. There has been great debate over what exactly is a computer
crime. There are several schools of thought. The more
articulate school, and the one to which the author adheres holds
that the category computer crime should be limited to crimes
directed against computers; for example, a terrorist destroying a
computer with explosives would fall into this category. Crimes
such as putting ghost employees on a payroll computer and
<New Page>
V. SOLUTIONS
TEMPEST ELINT is passive. The computer or terminal
emanates compromising radiation which is intercepted by the
TEMPEST device and reconstructed into useful information.
Unlike conventional ELINT there is no need to physically
trespass or even come near the target. Eavesdropping can be
performed from a nearby office or even a van parked within a
reasonable distance. This means that there is no classic
scene of the crime; and little or no chance of the criminal
being discovered in the act.[28]
If the crime is discovered it will be ancillary to some
other investigation. For example, if an individual is
investigated for insider trading a search of his residence
may yield a TEMPEST ELINT device. The device would explain
how the defendant was obtaining insider information; but it
was the insider trading, not the device, that gave away the
crime.
This is especially true for illegal TEMPEST ELINT
performed by the state. Unless the perpetrators are caught
in the act there is little evidence of their spying. A
trespassatory bug can be detected and located; further, once
found it provides tangible evidence that a crime took place.
A TEMPEST ELINT device by its inherent passive nature leaves
nothing to detect. Since the government is less likely to
commit an ancillary crime which might be detected there is a
very small chance that the spying will ever be discovered.
The only way to prevent eavesdropping is to encourage the
use of countermeasures: TEMPEST Certified[29] computers and
_____________________
collecting their pay are merely age-old accounting frauds; today
the fraud involves a computer because the records are kept on a
computer. The computer is merely ancillary to the crime. This
has been mislabeled computer crime and should merely be referred
to as a fraud perpetrated with the aid of a computer. Finally,
there are information crimes. These are crimes related to the
purloining or alteration of information. These crimes are more
common and more profitable due to the computer's ability to hold
and access great amounts of information. TEMPEST ELINT can best
be categorized as a information crime.
28. Compare, for example, the Watergate breakin in which the
burglars were discovered when they returned to move a poorly
placed spread spectrum bug.
29. TEMPEST Certified refers to the equipment having passed a
testing and emanations regime specified in NACSIM 5100A. This
classified document sets forth the emanations levels that the NSA
believes digital equipment can give off without compromising the
information it is processing. TEMPEST Certified equipment is
theoretically secure against TEMPEST eavesdropping.
<New Page>
terminals.
In merely making TEMPEST ELINT illegal the public is
given the false impression of security; they lulled into
believing the problem has been solved. Making certain
actions illegal does not prevent them from occurring. This
is especially true for a TEMPEST ELINT because it is
undetectable. Punishment is an empty threat if there is no
chance of being detected; without detection there can be no
apprehension and conviction. The only way to prevent some
entity from eavesdropping on one's computer or computer
terminal is for the equipment not to give off compromising
emanation; it must be TEMPEST Certified.
The United States can solve this problem by taking a
proactive stance on compromising emanations. The National
Institute of Standards and Technology (NIST[30]) is in charge
of setting forth standards of computer security for the
private sector. NIST is also charged with doing basic
research to advance the art of computer security. Currently
NIST does not discuss TEMPEST with the private sector. For
privacy's sake, this policy must be changed to a proactive
one. The NIST should publicize the TEMPEST ELINT threat to
computer security and should set up a rating system for
level of emanations produced by computer equipment.[31]
Further, legislation should be enacted to require the
labeling of all computer equipment with its level of
emanations and whether it is TEMPEST Certified. Only if the
public knows of the problem can it begin to take steps to
solve it.
Title III makes possession of a surveillance device a
crime, unless it is produced under contract to the
government. This means that research into surveillance and
counter-surveillance equipment is monopolized by the
government and a few companies working under contract with
_____________________
NACSIM 5100A is classified, as are all details of TEMPEST.
To obtain access to it, contractor must prove that there is
demand within the government for the specific type of equipment
that intend to certify. Since the standard is classified, the
contractors can not sell the equipment to non-secure governmental
agencies or the public. This prevents reverse engineering of the
standard for its physical embodiment, the Certified equipment.
By preventing the private sector from owning this anti-
eavesdropping equipment, the NSA has effectively prevented the
them from protecting the information in their computers.
30. Previously the Bureau of Standards. The NIST is a division
of the Commerce Department.
31. In this case computer equipment would include all peripheral
computer equipment. There is no use is using a TEMPEST Certified
computer if the printer or the modem are not Certified.
<New Page>
the government. If TEMPEST eavesdropping is criminalized,
then possession of TEMPEST ELINT equipment will be criminal.
Unfortunately,this does not solve the problem. Simple
TEMPEST ELINT equipment is easy to make. For just a few
dollars many older television sets can be modified to
receive and reconstruct EMR. For less than a hundred
dollars a more sophisticated TEMPEST ELINT receiver can be
produced[32].
The problem with criminalizing the possession of
TEMPEST ELINT equipment is not just that the law will have
little effect on the use of such equipment, but that it will
have a negative effect on counter-measures research. To
successfully design counter-measures to a particular
surveillance technique it is vital to have a complete
empirical understanding of how that technique works.
Without the right to legally manufacture a surveillance
device there is no possible way for a researcher to have the
knowledge to produce an effective counter-measures device.
It is axiomatic: without a surveillance device, it is
impossible to test a counter-measures device.
A number of companies produce devices to measure the
emanations from electrical equipment. Some of these devices
are specifically designed for bench marking TEMPEST
Certified equipment. This does not solve the problem. The
question arises: how much radiation at a particular
frequency is compromising? The current answer is to refer
_____________________
32. The NSA has tried to limit the availability of TEMPEST
information to prevent the spread of the devices.
For a discussion of the First Amendment and prior restraint
See, e.g. The United States of America v. Progressive, Inc. 467
F.Supp 990 (1979, WD Wis.)(magazine intended to publish plans for
nuclear weapon; prior restraint injunction issued), reh. den.
United States v. Progressive Inc. 486 F.Supp 5 (1979, WD Wis.),
motion den Morland v. Sprecher 443 US 709 (1979)(mandamus),
motion denied United States v. Progressive, Inc. 5 Media L R
(1979, 7th Cir.), dismd. without op. U.S. v. Progressive, Inc 610
F.2d 819 (1979, 7th Cir.); New York Times, Co. v. United States,
403 U.S. 713 (1971)(per curium)(Pentagon Papers case: setting
forth prior restraint standard which government was unable to
meet); T. EMERSON, THE SYSTEM OF FREEDOM OF EXPRESSION (1970);
Balance Between Scientific Freedom and NAtional Security, 23
JURIMETRICS J. 1 (1982)(current laws and regulations limiting
scientific and technical expression exceed the legitimate needs
of national security); Hon. M. Feldman, Why the First Amendment
is not Incompatible with National Security, HERITAGE FOUNDATION
REPORTS (Jan. 14, 1987). Compare Bork, Neutral Principles and
Some First Amendment Problems, 47 IND. L. J. 1 (First Amendment
applies only to political speech); G. Lewy, Can Democracy Keep
Secrets, 26 POLICY REVIEW 17 (1983)(endorsing draconian secrecy
laws mirroring the English system).
<New Page>
to NACSIM 5100A. This document specifies the emanations
levels suitable for Certification. The document is only
available to United States contractors having sufficient
security clearance and an ongoing contract to produce
TEMPEST Certified computers for the government. Further,
the correct levels are specified by the NSA and there is no
assurance that, while these levels are sufficient to prevent
eavesdropping by unfriendly operatives, equipment certified
under NACSIM 5100A will have levels low enough to prevent
eavesdropping by the NSA itself.
The accessibility of supposedly correct emanations
levels does not solve the problem of preventing TEMPEST
eavesdropping. Access to NACSIM 5100A limits the
manufacturer to selling the equipment only to United States
governmental agencies with the need to process secret
information.[33] Without the right to possess TEMPEST ELINT
equipment manufacturers who wish to sell to the public
sector cannot determine what a safe level of emanations is.
Further those manufacturers with access to NACSIM 5100A
should want to verify that the levels set out in the
document are, in fact, low enough to prevent interception.
Without an actual eavesdropping device with which to test,
no manufacturer will be able to produce genuinely
uncompromising equipment.
Even if the laws allow ownership of TEMPEST Certified
equipment by the public, and even if the public is informed
of TEMPEST's threat to privacy, individuals' private
information will not necessarily by protected. Individuals
may choose to protect their own information on their own
computers. Companies may choose whether to protect their
own private information. But companies that hold the
private information of individuals must be forced to take
steps to protect that information.
In England the Data Protection Act 1984[34] imposes
sanctions against anyone who stores the personal
information[35] on a computer and fails to take reasonable
_____________________
33. For example, the NSA has just recently allowed the Drug
Enforcement Agency (DEA) to purchase TEMPEST Certified computer
equipment. The DEA wanted secure computer equipment because
wealthy drug lords had were using TEMPEST eavesdropping
equipment.
34. An Act to regulate the use of automatically processed
information relating to individuals and the provision of services
in respect of such information.
-Data Protection Act 1984, Long Title.
35. "Personal data" means data consisting of information which
relates to a living individual who can be identified from that
<New Page>
measures to prevent disclosure of that information. The act
mandates that personal data may not be stored in any
computer unless the computer bureau or data user[36] has
registered under the act.[37] This provides for a central
registry and the tracking of which companies or persons
maintain databases of personal information. Data users and
bureaux must demonstrate a need and purpose behind their
possession of personal data.
The act provides tort remedies to any person who is
damaged by disclosure of the personal data.[38] Reasonable
care to prevent the disclosure is a defense.[39] English
_____________________
information (or from that and other information in the possession
of the data user), including any expression of opinion about the
individual but not any indication of the intentions of the data
user in respect of that individual.
-Data Protection Act 1984 1(3)
36. "Data user" means a person who holds data, and a persons
"Holds" data if --
(a) the data form part of a collection of data processed or
intended to be processed by or on behalf of that person as
mentioned in subsection (2) above; [subsection (2) defines
"data"] and
(b) that person (either alone or jointly or in common with
other persons) controls the contents and use of the data
comprised in the collection; and
(c) the data are in the form in which they have been or are
intended to be processed as mentioned in paragraph (a) above
or (though not for the time being in that form) in a form
into which they have been converted after being so processed
and with a view to being further so processed on a
subsequent occasion.
- Data Protection Act 1(5).
37. Data Protection Act 1984, 4,5.
38. An individual who is the subject of personal data held by a
data user... and who suffers damage by reason of (1)(c) ... the
disclosure of the data, or access having been obtained to the
data without such authority as aforesaid shall be entitled to
compensation from the data user... for any distress which the
individual has suffered by reason of the ... disclosure or
access.
- Data Protection Act 1984 23.
39. ... it shall be a defense to prove that ... the data user
... had taken such care as in all the circumstances was
reasonably required to prevent the... disclosure or access in
question.
Data Protection Act 1984 23(3)
<New Page>
courts have not yet ruled what level of computer security
measures constitute reasonable care. Considering the
magnitude of invasion possible with TEMPEST ELINT it should
be clear by now that failure to use TEMPEST Certified
equipment is prima facie unreasonable care.
The Remedies section of the act provides incentive for
these entities to provide successful protection of person
data from disclosure or illicit access. Failure to protect
the data will result in monetary loss. This may be looked
at from the economic efficiency viewpoint as allocating the
cost of disclosure the persons most able to bear those
costs, and also most able to prevent disclosure. Data users
that store personal data would use TEMPEST Certified
equipment as part of their computer security plan, thwarting
would-be eavesdroppers.
The Data Protection Act 1984 allocates risk to those
who can bear it best and provides an incentive for them to
keep other individuals' data private. This act should be
adopted by the United States as part of a full-spectrum plan
to combat TEMPEST eavesdropping. Data users are in the best
position to prevent disclosure through proper computer
security. Only by making them liable for failures in
security can we begin to rein in TEMPEST ELINT.
VII
Recommendations
Do not criminalize TEMPEST ELINT. Most crimes that
TEMPEST ELINT would aid, such a insider trading, are already
illegal; the current laws are adequate.
The National Institute of Standards and Technology
should immediately begin a program to educate the private
sector about TEMPEST. Only if individuals are aware of the
threat can they take appropriate precautions or decide
whether any precautions are necessary.
Legislation should be enacted to require all
electronic equipment to prominently display its level of
emanations and whether it is TEMPEST Certified. If
individuals are to choose to protect themselves they must be
able to make a informed decision regarding how much
protection is enough.
TEMPEST Certified equipment should be available to
the private sector. The current ban on selling to non-
governmental agencies prevents individuals who need to
protect information from having the technology to do so.
Possession of TEMPEST ELINT equipment should not be
made illegal. The inherently passive nature and simple
design of TEMPEST ELINT equipment means that making its
possession illegal will not deter crime; the units can be
easily manufactured and are impossible to detect. Limiting
their availability serves only to monopolize the
countermeasures research, information, and equipment for the
government; this prevents the testing, design and
<New Page>
manufacture of counter-measures by the private sector.
Legislation mirroring England's Data Protection Act
1984 should be enacted. Preventing disclosure of personal
data can only be accomplished by giving those companies
holding the data a reason to protect it. If data users are
held liable for their failure to take reasonable security
precautions they will begin to take reasonable security
precautions, including the use of TEMPEST Certified
equipment.
From:
[email protected] (Adam Beberg)
Subject: ACM Computers Seized By IIT
Date: Wed, 18 Jan 1995 04:43:26 GMT
ACM COMPUTERS SEIZED BY ILLINOIS INSTITUTE OF TECHNOLOGY
Dateline January 17, 1995
Today sometime before noon today, the Illinois Institute of Technology seized
the computer systems of the Association for Computing Machinery student chapter
at IIT.
700 Student and Faculty users are not happy.
And are now without their Email and other private files. The locations of the
ACM systems is currently unknown, and the security of the system and the
accounts on it is highly questionable, as it was quite literally riped out of
the wall. ( a piece of the modem was found lying on the table ).
The reasons given by IIT where that members of ACM are suspected of hacking
into the computer of another IIT student group, and pulling several pranks.
The memo sent to the Dean of Students details the hacking attempt, but no
evidence points to ACM's systems or to any of their users, but the memo does
make several unbacked accusations. And at this time, we can see no reason ACM
would even be tied to the events. However because ACM members are suspect, the
systems where unlawfully seized by IIT.
IIT has no legal right to seize ACM's systems, nor anyone else, as they contain
private accounts, files, and Email.
Such rights are protected under the Electronic Communications Privacy Act
(ECPA), which extended most of the protections of the federal Wiretap Act
("Title III") to electronic mail.
Precidence was established in the case Secret Service vs. Steve Jackson Games
decided March 12, 1993
Needless to say, ACM members are not too happy about all of this.
And the other 700 people don't seem happy either.
----
The ongoing saga will appear at
http://rci.ripco.com:8080/~bebeada/ACM.html
From: Richard S. Patterson (
[email protected])
Subject: CIS Litigation Update
Update to CompuServe v. Patterson, Case No. C-2-94-0091,
United States District Court, Southern District of Ohio:
CompuServe now claims that each of its two-million plus
worldwide subscribers to its service has, by the use of
its services, consented to being sued in its hometown
of Columbus, Ohio.
-----------------
On August 22, 1994, CompuServe's attorneys, Steven D. Jones and Kevin J.
Osterkamp, of the law firm of Roetzel & Andress, in Columbus, Ohio, filed
a "Motion for Rehearing," in CompuServe Incorporated v. Richard S.
Patterson, et al., Case No. C2-94-91, United States District Court, for
the Southern District of Ohio.
In its "Memorandum in Support" of said motion CompuServe's counsel
state the apparent "official" position of their client, CompuServe
Incorporated:
. . . Plaintiff [CompuServe] respectfully reiterates that
Defendants' status, not only as a CompuServe subscriber,
but as a Shareware provider, gives rise to a direct and
substantial connection with this jurisdiction [the State
of Ohio]. This connection is significant and more than
amply supports a valid basis for the exercise of
in personam jurisdiction.
This is substantially the argument previously urged by CompuServe's
counsel, but rejected by the Court in its judgment of August 11,
1994, dismissing the aforementioned action for want of personal
jurisdiction. In the seventeen (17) page "Opinion and Order"
of the court, Judge Joseph Kinneary stated:
This declaratory judgment action presents an interesting
question of personal jurisdiction arising out of the
collision of the interests of two parties on the
"information superhighway." Plaintiff, CompuServe, Inc.,
an Ohio-based provider of computer information services,
has sued one of its customers, Richard S. Patterson, and his
business entity, FlashPoint Development, in Ohio, seeking
a declaratory judgment that it has not infringed upon the
defendant's trade names or otherwise engaged in unfair
competiton. The defendants, residents of Texas, have
moved to dismiss the complaint, raising as one ground
the lack of personal jurisdiction over them in the State
of Ohio. For the following reasons, the Court concludes
that defendants' electronic links to the State of Ohio
are too tenuous to support the exercise of personal
jurisdiction over them, and therefore will grant the
motion to dismiss.
This appears to be one of the first Federal cases, if not the first,
to make direct reference to the term "information superhighway," and
provides a detailed analysis of existing law, e.g., International
Shoe and the due process clause of the United States Constitution,
and its application to the information age.
--
<A HREF="
http://www.eff.org/~mech/mech.html"> Stanton McCandlish
</A><HR><A HREF="mailto:
[email protected]">
[email protected]
</A><P><A HREF="
http://www.eff.org/"> Electronic Frontier Fndtn.
</A><P><A HREF="
http://www.eff.org/~mech/a.html"> Online Activist </A>
From:
[email protected] (Adam Curry)
Subject: MTV SUES CURRY
Date: 10 May 1994 03:44:36 -0400
[IMAGE] MTV SUES CURRY
==========================================================================
Last update: May 10 1994
_New Jersey, May 10 1994_
I had planned to keep the following quiet until more information was available,
but since several journalists have already caught wind of it, I decided to get
it out into the open so my side of the story is heard as well.
The domain I maintain and operate on the Internet, mtv.com was founded
approximately one year ago. At that time I registered mtv.com with the
InterNIC, purely because it was a cool address to have, and it was available.
What a great "vanity plate"!
The site quickly became a frequently accessed "hangout" on the net, with an
average of 35000 accesses daily from Mosaic clients alone. During the start up
months I had many conversations with executives at MTV Networks about my
endeavours, which btw, were all financed out of my own pocket, and vps from MTV
Programming as well as Viacom New Media were aware of what I was doing on the
internet, and although they stated "MTV has no interest in the internet" they
gave me their blessing and supported my efforts.
This was enforced when I set up several email accounts on mtv.com for use in
MTV's on-air programming. Ever sionce the summer of '93,
[email protected] was
used for trivia quiz questions, that were then aired on MTV's "Most Wanted" a
program I hosted at the time. Solicitations were made on the air, and the
address was shown on the screen. For MTV's annual Valentines video dedications,
viewers were offered the choice of calling in their dedications, or sending
them via email to
[email protected].
I never charged MTV Networks for this service, I purely saw it as a cool
feature to introduce to MTV's programming, spreading the "gospel", so to speak.
Then I started to get a lot of press about mtv.com, and some people started to
wake up at 1515 Broadway (MTV's HQ in New York City). And I was served with a
"Cease and desist" on the use of mtv.com. MTV's attourneys claimed that there
could be "confusion" for users of the internet, when connecting to *anything*
that had the letters mtv in the adress, and then receiving music and
entertainment information. I was obviously hurt by this move, but did see what
point they were driving at, an asked if we could settle this matter amicably.
The situation cooled down for a couple of months, but when I resigned on-air
from my job as a VJ, which MTV chose not to air btw, things started to get
ugly.
Long story short, MTV Networks has filed a lawsuit against me, for copyright
infringement of their "trademark", that being their "MTV" call letters, as well
as having information onlie that was MTVN "property". In this case they are
refferring to several press releases I put up on mtv.com, such a an
announcement about Beavis and Butthead's "experience" cd release. Understand
that MTVN sent me these releases over their own internal computer network for
this very purpose! Again, I was only doing this to promote the channel, not for
my own personal gain..after all...mtv.com is free access for all, no charge.
Throughout all of this I have offered to maintain the site specifically for
mtv, but again they said "we're not interested". Ofcourse I have no problem
whatsoever removing all refrences to MTV Networks and it's projects from
mtv.com, no that I don't work there anymore gives me even more reason to want
to do this, but the kicker is they are moving for an injunction to make me stop
using the internet address mtv.com!
This is ofcourse totally unacceptable, I registered the domain name, and I
don't plan on giving it up. Sure MTV and their parent company Viacom have a
vast legal team, but david also nailed goliath, so I have faith. In the long
run, everyone knows that the only *true* winners will be the lawyers.
There are many different viewpoints on this situation, but I feel that the use
of mtv in an addressing scheme can't be seen as an infringement of
intellectulal propert laws, and a search of the InterNIC database shows at
least 15 domain names registered with mtv in the address. Irony is that I
incorporated a company called ON RAMP, Inc (tm) and onramp.com was already
registered to someone else, but I'm not suing them :)
It appears to me that MTV has their mind set on the address mtv.com, maybe not
for now, but posibly for future use, and I feel extremely used, in that I built
up quite an audience for that address, and they are basically saying "thank you
very much, you may go".
A pre-motion hearing is scheduled for this thursday morning at 11am, wit the
honourable Judge McKenna presiding, in an attemp to get an injunction to make
me stop using the address mtv.com. I will update the situation as it unfolds.
Adam Curry,
[email protected]
==========================================================================
_______________________________________________________________________________
MTV Sues Curry, Adam Curry
[From Computer underground Digest #6.87]
Date: Wed, 5 Oct 1994 17:33:21 CDT
From: Anonymous <
[email protected]>
Subject: File 2--MCI Worker in Phone-card Ripoff (w/obligatory hacker link)
Source: Chicago Tribune, Oct 4, 1994, p. 4 (AP Wire story):
MCI WORKER IS CHARGED IN HUGE PHONE-CARD THEFT
An MCI employee has been charged with stealing more than 100,000
telephone calling-card numbers that were used to make $50 million in
long-distance calls, federal investigators said.
Ivey James Lay was a main supplier of the numbers for an
international ring operating in Los Angeles, Chicago and other U.S.
cities, as well as in Spain and Germany, said the U.S. Secret Service,
which investigates interstate telephone fraud.
Tens of thousands of customers at MCI, AT&T, Sprint and some local
telephone companies were victims, the Secret Service said. Those
consumers won't be billed for fraudulent calls on their phone-card
numbers, spokesmen for MCI, AT&T and Sprint said.
Lay, a switch engineer based in Charlotte, N.C., was known as
"Knightshadow" to computer hackers. He devised computer software to
divert and hold calling-card numbers from a variety of carriers that
ran through MCI's telephone switching equipment, said Secret Service
special agent Steven A. Sepulveda.
According to MCI officials, the case is the largest of its kind in
terms of known losses. The theft was far more sophisticated than past
credit-card and calling-card scams, MCI said. In the others, thieves
had access to a small number of cards.
In this ring, the numbers were purchased by computer hackers in the
United States and Europe, who in turn sold them to Europeans who would
use them later to call the United States for free, Sepulveda said.
[end]
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
ELECTRONIC FRONTIER FOUNDATION
LEGAL CASE SUMMARY
July 10, 1990
The Electronic Frontier Foundation is currently providing litigation
support in two cases in which it perceived there to be substantial civil
liberties concerns which are likely to prove important in the overall
legal scheme by which electronic communications will, now and in the
future, be governed, regulated, encouraged, and protected.
Steve Jackson Games
Steve Jackson Games is a small, privately owned adventure game
manufacturer located in Austin, Texas. Like most businesses today,
Steve Jackson Games uses computers for word processing and bookkeeping.
In addition, like many other manufacturers, the company operates an
electronic bulletin board to advertise and to obtain feedback on its
product ideas and lines.
One of the company's most recent products is GURPS CYBERPUNK, a science
fiction role-playing game set in a high-tech futuristic world. The
rules of the game are set out in a game book. Playing of the game is
not performed on computers and does not make use of computers in any
way. This game was to be the company's most important first quarter
release, the keystone of its line.
On March 1, 1990, just weeks before GURPS CYBERPUNK was due to be
released, agents of the United States Secret Service raided the premises
of Steve Jackson Games. The Secret Service:
% seized three of the company's computers which were used in the
drafting and designing of GURPS CYBERPUNK, including the computer used
to run the electronic bulletin board,
% took all of the company software in the neighborhood of the computers
taken,
% took with them company business records which were located on the
computers seized, and
% destructively ransacked the company's warehouse, leaving many items
in disarray.
In addition, all working drafts of the soon-to-be-published GURPS
CYBERPUNK game book -- on disk and in hard-copy manuscript form -- were
confiscated by the authorities. One of the Secret Service agents told
Steve Jackson that the GURPS CYBERPUNK science fiction fantasy game book
was a, "handbook for computer crime."
Steve Jackson Games was temporarily shut down. The company was forced
to lay-off half of its employees and, ever since the raid, has operated
on relatively precarious ground.
Steve Jackson Games, which has not been involved in any illegal activity
insofar as the Foundation's inquiries have been able to determine, tried
in vain for over three months to find out why its property had been
seized, why the property was being retained by the Secret Service long
after it should have become apparent to the agents that GURPS CYBERPUNK
and everything else in the company's repertoire were entirely lawful and
innocuous, and when the company's vital materials would be returned. In
late June of this year, after attorneys for the Electronic Frontier
Foundation became involved in the case, the Secret Service finally
returned most of the property, but retained a number of documents,
including the seized drafts of GURPS CYBERPUNKS.
The Foundation is presently seeking to find out the basis for the search
warrant that led to the raid on Steve Jackson Games. Unfortunately, the
application for that warrant remains sealed by order of the court. The
Foundation is making efforts to unseal those papers in order to find out
what it was that the Secret Service told a judicial officer that
prompted that officer to issue the search warrant.
Under the Fourth Amendment to the United States Constitution, a search
warrant may be lawfully issued only if the information presented to the
court by the government agents demonstrates "probable cause" to believe
that evidence of criminal conduct would be found on the premises to be
searched. Unsealing the search warrant application should enable the
Foundation's lawyers, representing Steve Jackson Games, to determine the
theory by which Secret Service Agents concluded or hypothesized that
either the GURPS CYBERPUNK game or any of the company's computerized
business records constituted criminal activity or contained evidence of
criminal activity.
Whatever the professed basis of the search, its scope clearly seems to
have been unreasonably broad. The wholesale seizure of computer
software, and subsequent rummaging through its contents, is precisely
the sort of general search that the Fourth Amendment was designed to
prohibit.
If it is unlawful for government agents to indiscriminately seize all of
the hard-copy filing cabinets on a business premises -- which it surely
is -- that the same degree of protection should apply to businesses
that store information electronically.
The Steve Jackson Games situation appears to involve First Amendment
violations as well. The First Amendment to the United States
Constitution prohibits the government from "abridging the freedom of
speech, or of the press". The government's apparent attempt to prevent
the publication of the GURPS CYBERPUNK game book by seizing all copies
of all drafts in all media prior to publication, violated the First
Amendment. The particular type of First Amendment violation here is the
single most serious type, since the government, by seizing the very
material sought to be published, effectuated what is known in the law as
a "prior restraint" on speech. This means that rather than allow the
material to be published and then seek to punish it, the government
sought instead to prevent publication in the first place. (This is not
to say, of course, that anything published by Steve Jackson Games could
successfully have been punished. Indeed, the opposite appears to be the
case, since SJG's business seems to be entirely lawful.) In any effort
to restrain publication, the government bears an extremely heavy burden
of proof before a court is permitted to authorize a prior restraint.
Indeed, in its 200-year history, the Supreme Court has never upheld a
prior restraint on the publication of material protected by the First
Amendment, warning that such efforts to restrain publication are
presumptively unconstitutional. For example, the Department of Justice
was unsuccessful in 1971 in obtaining the permission of the Supreme
Court to enjoin The New York Times, The Washington Post, and The Boston
Globe from publishing the so-called Pentagon Papers, which the
government strenuously argued should be enjoined because of a perceived
threat to national security. (In 1979, however, the government sought
to prevent The Progressive magazine from publishing an article
purporting to instruct the reader as to how to manufacture an atomic
bomb. A lower federal court actually imposed an order for a temporary
prior restraint that lasted six months. The Supreme Court never had an
opportunity to issue a full ruling on the constitutionality of that
restraint, however, because the case was mooted when another newspaper
published the article.)
Governmental efforts to restrain publication thus have been met by
vigorous opposition in the courts. A major problem posed by the
government's resort to the expedient of obtaining a search warrant,
therefore, is that it allows the government to effectively prevent or
delay publication without giving the citizen a ready opportunity to
oppose that effort in court.
The Secret Service managed to delay, and almost to prevent, the
publication of an innocuous game book by a legitimate company -- not by
asking a court for a prior restraint order that it surely could not have
obtained, but by asking instead for a search warrant, which it obtained
all too readily.
The seizure of the company's computer hardware is also problematic, for
it prevented the company not only from publishing GURPS CYBERPUNK, but
also from operating its electronic bulletin board. The government's
action in shutting down such an electronic bulletin board is the
functional equivalent of shutting down printing presses of The New York
Times or The Washington Post in order to prevent publication of The
Pentagon Papers. Had the government sought a court order closing down
the electronic bulletin board, such an order effecting a prior restraint
almost certainly would have been refused. Yet by obtaining the search
warrant, the government effected the same result.
This is a stark example of how electronic media suffer under a less
stringent standard of constitutional protection than applies to the
print media -- for no apparent reason, it would appear, other than the
fact that government agents and courts do not seem to readily equate
computers with printing presses and typewriters. It is difficult to
understand a difference between these media that should matter for
constitutional protection purposes. This is one of the challenges
facing the Electronic Frontier Foundation.
The Electronic Frontier Foundation will continue to press for return of
the remaining property of Steve Jackson Games and will take formal
steps, if necessary, to determine the factual basis for the search.
The purpose of these efforts is to establish law applying the First and
Fourth Amendments to electronic media, so as to protect in the future
Steve Jackson Games as well as other individuals and businesses from
the devastating effects of unlawful and unconstitutional government
intrusion upon and interference with protected property and speech
rights.
United States v. Craig Neidorf
Craig Neidorf is a 20-year-old student at the University of Missouri who
has been indicted by the United States on several counts of interstate
wire fraud and interstate transportation of stolen property in
connection with his activities as editor and publisher of the
electronic magazine, Phrack.
The indictment charges Neidorf with: (1) wire fraud and interstate
transportation of stolen property for the republication in Phrack of
information which was allegedly illegally obtained through the accessing
of a computer system without authorization, though it was obtained not
by Neidorf but by a third party; and (2) wire fraud for the publication
of an announcement of a computer conference and for the publication of
articles which allegedly provide some suggestions on how to bypass
security in some computer systems.
The information obtained without authorization is a file relating to the
provision of 911 emergency telephone services that was allegedly removed
from the BellSouth computer system without authorization. It is
important to note that neither the indictment, nor any briefs filed in
this case by the government, contain any factual allegation or
contention that Neidorf was involved in or participated in the removal
of the 911 file.
These indictments raise substantial constitutional issues which have
significant impact on the uses of new computer communications
technologies. The prosecution of an editor or publisher, under
generalized statutes like wire fraud and interstate transportation of
stolen property, for the publication of information received lawfully,
which later turns out to be have been "stolen," presents an
unprecedented threat to the freedom of the press. The person who should
be prosecuted is the thief, and not a publisher who subsequently
receives and publishes information of public interest. To draw an
analogy to the print media, this would be the equivalent of prosecuting
The New York Times and The Washington Post for publishing the Pentagon
Papers when those papers were dropped off at the doorsteps of those
newspapers.
Similarly, the prosecution of a publisher for wire fraud arising out of
the publication of articles that allegedly suggested methods of
unlawful activity is also unprecedented. Even assuming that the
articles here did advocate unlawful activity, advocacy of unlawful
activity cannot constitutionally be the basis for a criminal
prosecution, except where such advocacy is directed at producing
imminent lawless action, and is likely to incite such action. The
articles here simply do not fit within this limited category. The
Supreme Court has often reiterated that in order for advocacy to be
criminalized, the speech must be such that the words trigger an
immediate action. Criminal prosecutions such as this pose an extreme
hazard for First Amendment rights in all media of communication, as it
has a chilling effect on writers and publishers who wish to discuss the
ramifications of illegal activity, such as information describing
illegal activity or describing how a crime might be committed.
In addition, since the statutes under which Neidorf is charged clearly
do not envision computer communications, applying them to situations
such as that found in the Neidorf case raises fundamental questions of
fair notice -- that is to say, the publisher or computer user has no
way of knowing that his actions may in fact be a violation of criminal
law. The judge in the case has already conceded that "no court has
ever held that the electronic transfer of confidential, proprietary
business information from one computer to another across state lines
constitutes a violation of [the wire fraud statute]." The Due Process
Clause prohibits the criminal prosecution of one who has not had fair
notice of the illegality of his action. Strict adherence to the
requirements of the Due Process Clause also minimizes the risk of
selective or arbitrary enforcement, where prosecutors decide what
conduct they do not like and then seek some statute that can be
stretched by some theory to cover that conduct.
Government seizure and liability of bulletin board systems
During the recent government crackdown on computer crime, the government
has on many occasions seized the computers which operate bulletin board
systems ("BBSs"), even though the operator of the bulletin board is not
suspected of any complicity in any alleged criminal activity. The
government seizures go far beyond a "prior restraint" on the publication
of any specific article, as the seizure of the computer equipment of a
BBS prevents the BBS from publishing at all on any subject. This akin
to seizing the word processing and computerized typesetting equipment
of The New York Times for publishing the Pentagon Papers, simply because
the government contends that there may be information relating to the
commission of a crime on the system. Thus, the government does not
simply restrain the publication of the "offending" document, but it
seizes the means of production of the First Amendment activity so that
no more stories of any type can be published.
The government is allowed to seize "instrumentalities of crime," and a
bulletin board and its associated computer system could arguably be
called an instrumentality of crime if individuals used its private
e-mail system to send messages in furtherance of criminal activity.
However, even if the government has a compelling interest in interfering
with First Amendment protected speech, it can only do so by the least
restrictive means. Clearly, the wholesale seizure and retention of a
publication's means of production, i.e., its computer system, is not the
least restrictive alternative. The government obviously could seize
the equipment long enough to make a copy of the information stored on
the hard disk and to copy any other disks and documents, and then
promptly return the computer system to the operator.
Another unconstitutional aspect of the government seizures of the
computers of bulletin board systems is the government infringement on
the privacy of the electronic mail in the systems. It appears that the
government, in seeking warrants for the seizures, has not forthrightly
informed the court that private mail of third parties is on the
computers, and has also read some of this private mail after the systems
have been seized.
The Neidorf case also raises issues of great significance to bulletin
board systems. As Neidorf was a publisher of information he received,
BBSs could be considered publishers of information that its users post
on the boards. BBS operators have a great deal of concern as to the
liability they might face for the dissemination of information on their
boards which may turn out to have been obtained originally without
authorization, or which discuss activity which may be considered
illegal. This uncertainty as to the law has already caused a decrease
in the free flow of information, as some BBS operators have removed
information solely because of the fear of liability.
The Electronic Frontier Foundation stands firmly against the
unauthorized access of computer systems, computer trespass and computer
theft, and strongly supports the security and sanctity of private
computer systems and networks. One of the goals of the Foundation,
however, is to ensure that, as the legal framework is established to
protect the security of these computer systems, the unfettered
communication and exchange of ideas is not hindered. The Foundation is
concerned that the Government has cast its net too broadly, ensnaring
the innocent and chilling or indeed supressing the free flow of
information. The Foundation fears not only that protected speech will
be curtailed, but also that the citizen's reasonable expectation in the
privacy and sanctity of electronic communications systems will be
thwarted, and people will be hesitant to communicate via these networks.
Such a lack of confidence in electronic communication modes will
substantially set back the kind of experimentation by and communication
among fertile minds that are essential to our nation's development. The
Foundation has therefore applied for amicus curiae (friend of the
court) status in the Neidorf case and has filed legal briefs in support
of the First Amendment issues there, and is prepared to assist in
protecting the free flow of information over bulletin board systems and
other computer technologies.
For further information regarding Steve Jackson Games please contact:
Harvey Silverglate or Sharon Beckman
Silverglate & Good
89 Broad Street, 14th Floor
Boston, MA 02110
617/542-6663
For further information regarding Craig Neidorf please contact:
Terry Gross or Eric Lieberman
Rabinowitz, Boudin, Standard, Krinsky and Lieberman
740 Broadway, 5th Floor
New York, NY 10003
212/254-1111
Subject: EFF, ACLU, CPSR take on 2600 Mall Case
Organization: Electronic Frontier Foundation, Inc.
Date: Fri, 22 Jan 1993 16:19:35 GMT
On the evening of November 6, 1992, approximately 30 computer
enthusiasts, who had gathered for a meeting of 2600 magazine readers at
the food court at Pentagon City Mall in Arlington, VA, were detained and
searched and had some of their possessions seized by about half a dozen
mall security guards acting under the direction of the Secret Service.
Somewhere between two and five officers from the Arlington County Police
were there, as well, having responded to a call about fraud.
Several of the attendees are interested in suing the mall, police and
Secret Service, and EFF and CPSR have done some preliminary research
into the case to determine what, if any, civil liberties violations were
involved. After interviewing about a dozen people who were there, we
have determined that the Secret Service does seem to have been involved
(a county police officer on the scene confirmed that), and we are ready
to proceed with the case.
We contacted the Virginia ACLU, which has found a litigator in Northern
Virginia who wants to litigate the case. EFF, the ACLU and CPSR are
currently doing research on the legal theories we will need to pursue.
EFF is very committed to standing up for the civil liberties of those
who attended this open, publicized and nondisruptive meeting.
Shari Steele, Staff Attorney, Electronic Frontier Foundation
[email protected]
[From: EFFector Online Volume 08, No. 03 March 20, 1995]
Subject: Scotland and Italy Crack Down on "Anarchy Files"
---------------------------------------------------------
Stanton McCandlish
Anarchists online were the target of two recent police actions, one in
Scotland and one in Italy. Scotland Yard is investigating net-based
anarchist dissidents allegedly using online media to advocate
anti-government violence, at least one of whom was arrested several
weeks ago by detectives from the UK's Special Branch police agency, on
charges of sedition - the first such case in the UK to involve
computer-mediated communications. The suspect appears to have been a
Scottish system operator, running a BBS called Terminal Boredom, which may
have archived some of the publications of anarchist publisher Spunk
Press, a voluteer-based collective (though Spunk itself does not know
the sysop, and says he is not directly associated with them).
A Computer programmer, activist, and editor for Spunk Press in Scotland
and who conducts seminars on progressive activism and Internet basics,
was recently targetted in the British press, and associated with the
online anarchists under investigation. A highly questionable article in
the UK _Sunday_Times_ by Adrian Levy and Ian Burrell (Mar. 5) accused
the Spunk editor (who prefers not to be named again due to negative
publicity) of encouraging the use of computer technology for organizing
violent and illegal acts, as part of an online terrorist coalition, at
an "anarchist campaign" last October (described by attendees rather as a
conference on anarchist politics and online activism).
However, the Levy/Burrell article is both replete with errors (it refers
in one place to FTP archive directories "booby trapped with viruses that
attack the computers of unauthorised intruders" - an impossibility, as
any experienced Internet user would know) and remarkably biased (the article
alleges that supposed 'anarchy files' encourage students to "take
part in dirty protests and riots.") Additionally it makes many wild and
highly unrealistic accusations of global anarchist conspiracy (led by
"an intelligent and well-informed girl", a British student, according to
another similar report.) No relevant evidence or sources are cited.
Spunk "maintains an archive of anarchist material at umich [the U. of
Michican anonymous FTP site] and other sites. It includes historical
documents, articles by the likes of Chomsky & Bookchin, the text of
various anarchist magazines and, contrary to what the Sunday Times said,
nothing about bomb-making or other [seditious material]", Mitzi Waltz, a
technology writer and US member of Spunk, told EFF, adding that another
member of the Spunk collective, in Italy, suffered a police raid on
his political discussion BBS, BITS Against the Empire, Waltz disagreed
vehemently with the _Sunday_Times_ article: "I have met [the Spunk editor]
and he's about the furthest thing from a terrorist you can imagine. I
was at the conference referred to [in the _Sunday_Times_ article] also
last fall in London. [We] led workshops on using the Internet for
communications and networking. Basic stuff, like 'what's a BBS?'..."
Others involved with Spunk Press indicate that a previous article in the
UK trade magazine _Computing_ also attacked Spunk, possibly slanderously.
Recently, _Computing_ was inundated with criticism of its report.
These articles appear to have been the inspiration for a series of
similar, and even further removed from reality, mainstream press reports
in Italy, which compare the events to the raid on BITS Against the Empire.
BITS Against the Empire, a computer bulletin board system run by Clinamen,
(a Rovereto, Italy social center) and providing communications services to
users via Internet, Cybernet and FidoNet, was seized along with printed
material and disks during a Feb. 28 police search of Clinamen. The homes
of a number of people associated with Clinamen were also raided that
morning by the Carabinieri Anti-Crime Special Operations Group, who
seized books, computers, diskettes, even diaries. Some of those raided
are allegedly associated with the Italian anarchist movement. Only one,
the sysop, Luciano Paccagnella, is directly associated with the BITS BBS.
To date, only some of the seized materials have been returned, and the
BBS itself, other computers, and diskettes are still being held for further
investigation. No one has been arrested, but the individuals raided
have been formally charged with terroristic subversion crimes, which
carry severe penalities: 7-15 years in prison. Paccagnella expresses
skepticism regarding the likelihood that authorities really want him in
prison for 15 years, reasoning he and the others charged are probably
expected to be intimidated into plea-bargaining. "What they really want
is clearly to scare us," he said.
A Clinamen press release noted wryly: "According to the authorities, the
bulletin board's activities in pursuit of free communication and counter-
information represent a danger to the democratic order...Clearly nobody
has explained to them that hard disks and diskettes can be copied in a
matter of minutes. Meanwhile, those facing prosecution, as well as the
hundreds of users of BITS Against the Empire BBS, must continue to wait as
police computer experts work to uncover not only the DOS 'copy' command,
but also that very dangerous information - from publicly available
electronic journals, articles and academic essays on the social use of
new technology, to publicly accessible electronic discussion groups -
which has inspired the charge of subversive association with terrorist
intent."
The BITS BBS carried a file index of materials available from the Spunk
archive (though not the files themselves), as well as back issues of
_Computer_underground_Digest_ (for which EFF itself is the main archive
site), and other political and non-political text material (no software).
It is currently unconfirmed whether there is a direct link between the
BITS raid, the Scottish BBS raid, the apparent mainstream media campaign
against the Spunk Press Collective, or the earlier Italian "BBS
crackdown" (which was targetted, ostensibly at least, at software
pirates, though a few victims of the raids suggest that the crackdown
was entirely politically motivated.) Paccagnella doubts there is any
official connection between these events.
Those concerned about the Italian raids can send messages of support or
requests for updates to Luciano Paccagnella at:
Internet:
[email protected]
Bitnet: lpaccag@itncisti
European Counter Network: Luc Pac, 45:1917/2.1
Cybernet: Luc Pac, 65:1400/6 (currently down)
Fidonet: Luc Pac, 2:333/412 (currently down)
This news is very disconcerting, particularly given the recent law passed
in the UK greatly restricting Britons' rights of assembly, not to mention
other Parliament actions to negate the right of silence at arrest and
broaden police search and seizure authority, as well as statements by UK
Minister of Parliament Chris Smith that the "findings" of the Scotland
Yard investigation into alleged online anarchist "terrorists" shows "the
need for international agreements to ban groups preaching violence from
the information superhighway", as the _Sunday_Times_ article triumphantly
paraphrased. MP Smith is also on record as supporting a ban on public
use of encryption, unless it is "escrowed" so that government agents can
decode encrypted messages and files, likely due to international
lobbying efforts on the part of the US Administration to convince European
and other governments to attempt to retard private-sector encryption
market growth and to embrace Clipper-like surveillance schemes.
When governments cannot distinguish between a socio-political philosophy
denying governmental authoritarianism and actual conspiracy to commit
terrorist crimes, no one's intellectual freedom is safe.
------------------------------
*********************************************************************
Julian Dibbell
[email protected]
*********************************************************************
----------------------------------------
(c)1993 by Julian Dibbell. Electronic-redistribution only, limited to
the net and not-for-profit BBSs. Plus, it would be nice to be advised of
any reposts:
[email protected].
(This article originally appeared in The Village Voice, January 11, 1994)
The Prisoner: Phiber Optik Goes Directly to Jail
By Julian Dibbell
____________________________________________________________________
Phiber Optik is going to prison this week and if you ask me and
a whole lot of other people, that's just a goddamn shame.
To some folks, of course, it's just deserts. Talk to
phone-company executives, most computer-security experts, any
number of U.S. attorneys and law-enforcement agents, or Justice
Louis Stanton of the Southern District of New York (who handed
Phiber his year-and-a-day in the federal joint at Minorsville,
Pennsylvania), and they'll tell you the sentence is nothing more
than what the young hacker had coming to him. They'll tell you
Phiber Optik is a remorseless, malicious invader of other
people's computers, a drain on the economic lifeblood of our
national telecommunications infrastructure, and/or a dangerous
role model for the technoliterate youth of today.
The rest of us will tell you he's some kind of hero. Just ask.
Ask the journalists like me who have come to know this
21-year-old high-school dropout from Queens over the course of
his legal travails. We'll describe a principled and gruffly
plain-talking spokesdude whose bravado, street-smart style, and
remarkably unmanipulative accessibility have made him the object
of more media attention than any hacker since Robert Morris
nearly brought down the Internet. Or ask the on-line civil
libertarians who felt that Phiber's commitment to nondestructive
hacking and to dialogue with the straight world made him an
ideal poster boy for their campaign against the repressive
excesses of the government's war on hackers. You might even ask
the small subset of government warriors who have arrived at a
grudging respect for Phiber's expertise and the purity of his
obsession with the workings of the modern computerized phone
system (a respect that has at times bordered on parental concern
as it grew clear that a 1991 conviction on state charges of
computer trespass had failed to curb Phiber's reckless
explorations of the system).
But for a truly convincing glimpse of the high regard in which
Phiber Optik is held in some quarters, you'd have to pay an
on-line visit to ECHO, the liberal-minded but hardly cyberpunk
New York bulletin-board system where Phiber has worked as
resident technical maven since last spring. Forsaking the
glories of phonephreaking for the workaday pleasures of hooking
the system up to the Internet and helping users navigate its
intricacies, he moved swiftly into the heart of ECHO's virtual
community (which took to referring to him by the name his mother
gave him -- Mark -- as often as by his nom de hack). So that when he
was indicted again, this time on federal charges of unauthorized
access to phone-company computers and conspiracy to commit
further computer crimes, ECHO too was drawn into the
nerve-racking drama of his case.
As the ``coconspirators'' named in the indictment (a group of
Phiber's friends and government-friendly ex-friends) pleaded
guilty one by one, there remained brave smiles and high hopes
for Phiber's jury trial in July. By the time the trial date
arrived, however, Phiber had made an agonizing calculus of risks
and decided to plead guilty to one count each of computer
intrusion and conspiracy. ECHO was left on tenterhooks waiting
for the day of the sentencing. Given Mark's newfound enthusiasm
for more legitimate means of working with computers and his
undisputed insistence at the time of his plea that he had never
damaged or intended to damage any of the systems he broke into,
it seemed reasonable to wish for something lenient. A long
probation, maybe, or at worst a couple months' jail time. After
all, the infamous Morris had done considerably greater harm, and
he got off with no jail time at all.
When the news arrived, therefore, of Phiber's 12-month prison
sentence (plus three years' probation and 600 hours of service),
it hit like a slap in the face, and ECHO responded with a
massive outburst of dismay and sympathy. ECHO's director, Stacy
Horn, posted the information at 3 p.m. on November 3 in the
system's main conference area, and within 24 hours the place was
flooded with over 100 messages offering condolences, advice on
penitentiary life, and curses on Judge Stanton. Not all the
messages were what you'd want to call articulate (``shit,'' read
the first one in its entirety; quoth another: ``fuckfuckfuck-
fuckfuckfuckfuckfuckfuckfuckfuckfuckfuckfuckfuckfuckfuckfuck''),
nor was all the advice exactly comforting (``Try not to get
killed,'' a sincere and apparently quite prison-savvy Echoid
suggested; ``Skip the country,'' proposed one user who connects
from abroad, inviting Phiber to join him in sunny South Africa).
But the sentiment throughout was unmistakably heartfelt, and
when Phiber Optik finally checked in, his brief response was
even more so:
``I just finished reading all this and...I'm speechless. I
couldn't say enough to thank all of you.''
He didn't have to thank anybody, of course. Motivated by genuine
fellow feeling as this electronic lovefest was, it was also the
last step in the long-running canonization of Phiber Optik as
the digital age's first full-fledged outlaw hero, and making
somebody else a hero is not necessarily the most generous of
acts. For one thing, we tend to get more from our heroes than
they get from us, and for another, we tend to be heedless of
(when not morbidly fascinated by) the very high psychic overhead
often involved in becoming a hero -- especially the outlaw kind. To
their credit, though, the Echoids proved themselves sensitive to
the weight of the burden Phiber had been asked to take on. As
one of them put it: ``Sorry Mark. You've obviously been made a
martyr for our generation.''
There was some melodrama in that statement, to be sure, but not
too much exaggeration. For ironically enough, Judge Stanton
himself seemed to have endorsed its basic premise in his remarks
upon passing sentence. Not unmoved by the stacks of letters sent
him in support of Phiber Optik's character and motivations, the
judge allowed as how a less celebrated Phiber Optik convicted of
the same crimes might not deserve the severity of the discipline
he was about to prescribe (and in Phiber's case it could be
argued that 12 months locked up without a computer is severe
enough to rate as cruel and unusual). But since Phiber had made
of himself a very public advertisement for the ethic of the
digital underground, the judge insisted he would have to make of
the sentence an equally public countermessage. ``The
defendant...stands as a symbol here today,'' said Stanton,
making it clear that the defendant would therefore be punished
as one too.
The judge did not make it clear when exactly it was that the
judicial system had abandoned the principle that the punishment
fits the crime and not the status of the criminal, though I
suppose that happened too long ago to be of much interest. More
frustratingly, he also didn't go into much detail as to what it
was that Phiber Optik was to stand as a symbol _of_. In at least
one of his remarks, however, he did provide an ample enough
clue:
``Hacking crimes,'' said Judge Stanton, ``constitute a real
threat to the expanding information highway.''
That ``real threat'' bit was a nice dramatic touch, but anyone
well-versed in the issues of the case could see that at this point the
judge was speaking symbolically. For one thing, even as practiced by the
least scrupulous joyriders among Phiber Optik's subcultural peers, hacking
represents about as much of a threat to the newly rampant
telecommunications juggernaut as shoplifting does to the future of world
capitalism. But more to the point, everybody recognizes by now that all
references to information highways, super or otherwise, are increasingly
just code for the corporate wet dream of a pay-as-you-go telecom turnpike,
owned by the same megabusinesses that own our phone and cable systems
today and off-limits to anyone with a slender wallet or a bad credit
rating. And _that_, symbolically speaking, is what Phiber Optik's
transgressions threaten.
For what did his crimes consist of after all? He picked the
locks on computers owned by large corporations, and he shared
the knowledge of how to do it with his friends (they had given
themselves the meaningless name MOD, more for the thrill of
sounding like a conspiracy than for the purpose of actually
acting like one). In themselves the offenses are trivial, but
raised to the level of a social principle, they do spell doom
for the locks some people want to put on our cyberspatial
future. And I'm tempted, therefore, to close with a rousing
celebration of Phiber Optik as the symbol of a spirit of
anarchic resistance to the corporate Haussmannization of our
increasingly information-based lives, and to cheer Phiber's hero
status in places like ECHO as a sign that that spirit is
thriving.
But I think I'll pass for now. Phiber Optik has suffered enough
for having become a symbol, and in any case his symbolic power
will always be available to us, no matter where he is. Right
now, though, the man himself is going away for far too long, and
like I said, that's nothing but a goddamn shame.
[From: TELECOM Digest, Sat, 31 Mar 90]
Legion of Doom Indictments (Chicago Members) [Mike Godwin]
----------------------------------------------------------------------
From: Mike Godwin <
[email protected]>
Subject: Legion of Doom Indictments (Chicago Members, Jolnet Shutdown)
Date: 31 Mar 90 22:37:33 GMT
Reply-To: Mike Godwin <
[email protected]>
Organization: The University of Texas at Austin, Austin, Texas
The following is the text of the federal indictments of the Chicago
Jolnet members. Secret Service jurisdiction to investigation these
alleged computer-related offenses comes from 18 USC 1030, the general
computer-fraud statute -- it's provided in section (d) under this
statute.
UNITED STATES DISTRICT COURT NORTHERN
DISTRICT OF ILLINOIS
EASTERN DIVISION
)
UNITED STATES OF AMERICA )
)
v. ) No. ______________________
) Violations: Title 18, United
ROBERT J. RIGGS, also known ) States Code, Sections
as Robert Johnson, also ) 1030(a)(6)(A) and 2314
known as Prophet, and )
CRAIG NEIDORF, also known )
as Knight Lightning )
COUNT ONE
The SPECIAL APRIL 1987 GRAND JURY charges:
PROPERTY INVOLVED
1. At all times relevant herein, enhanced 911 (E911) was the
national computerized telephone service program for handling
emergency calls to the police, fire, ambulance and emergency
services in most municipalities in the United States. Dialing 911
provided the public immediate access to a municipality's Public
Safety Answering Point (PSAP) through the use of computerized all
routing. The E911 system also automatically provided the recipient
of an emergency call with the telephone number and location
identification of the emergency caller.
2. At all times relevant herein, the Bell South Telephone
Company and its subsidiaries ("Bell South") provided telephone
services in the nine state area including Alabama, Mississippi,
Georgia, Tennessee, Kentucky, Lousiana {sic}, North Carolina, South
Carolina and Florida.
3. At all times relevant herein, the E911 system of Bell South
was described in the text of a computerized file program known as
the Bell South Standard Practice 660-225-104SV Control Office
- 1 -
Administration of Enhanced 911 Services for Special and Major
Account Centers date March, 1988 ("E911 Practice"). The E911
Practice was a highly proprietary and closely held computerized
text file belonging to the Bell South Telephone Company and stored
on the company's AIMSX computer in Atlanta, Georgia. The E911
Practice described the computerized control and maintainence {sic}
of the E911 system and carried warning notices that it was not to be
disclosed outside Bell South or any of its subsidiaries except
under written agreement.
COMPUTER HACKERS
4. At all times relevant herein, computer hackers were
individual involved with the unauthorized access of computer
systems by various means.
5. At all times relevant herein, the Legion of Doom (LOD)
was a closely knit group of computer hackers involved in:
a. Disrupting telecommunications by entering
computerized telephone switches and changing the
routing on the circuits of the computerized
switches.
b. Stealing proprietary computer source code and
information from companies and individuals that
owned the code and information.
c. Stealing and modifying credit information on
individuals maintained in credit bureau computers.
- 2 -
d. Fraudulently obtaining money and property from
companies by altering the computerized information
used by the companies.
e. Disseminating information with respect to their
methods of attacking computers to other computer
hackers in an effort to avoid the focus of law
enforcement agencies and telecommunication security
experts.
6. At all times relevant herein ROBERT J. RIGGS, defendant
herein, was a member of the LOD.
7. At all times relevant herein CRAIG NEIDORF, defendant
herein, was a publisher and editor of a computer hacker newletter
{sic} known as "PHRACK."
8. At all times relevant herein, a public access computer
bulletin board system (BBS) was located in Lockport, Illinois which
provided computer storage space and electronic mail services to its
users. The Lockport BBS was also used by computer hackers as a
location for exchanging and developing software tools for computer
intrusion, and for receiving and distributing hacker tutorials and
other information.
E-MAIL
9. At all times relevant herein electronic mail (e-mail) was
a computerized method for sending communications and files between
individual computers on various computer networks. Persons who
sent or received e-mail were identified by an e-mail address,
similar to a postal address. Although a person may have more than
- 3 -
one e-mail address, each e-mail address identified a person
uniquely. The message header of an e-mail message identified both
the sender and recipient of the e-mail message and the date the
was {sic} message sent.
10. Beginning in or about September, 1988, the exact date
begin unknown to the Grand Jury, and continuing until the return
date of this indictment, at Lockport, in the Northern District of
Illinois, Eastern Division, and elsewhere,
ROBERT J. RIGGS, also known
as Robert Johnson, also
known as Prophet, and
CRAIG NEIDORF, also known
as Knight Lightning,
defendants herein, together with others known and unknown to the
Grand Jury, devised and intended to devise and participated in a
scheme and artifice to defraud and to obtain money and other things
of value by means of false and fraudulent pretenses and
representations, well knowing at the time that such pretenses,
representations and promises were false when made.
OBJECT OF FRAUD SCHEME
11. The object of the fraud scheme was to steal the E911
Practice text file from the computers of Bell South Telephone
Company though {sic} the use of false and fraudulent pretenses and
representations and to conceal all indications that the text file
had been stolen; and to thereafter publish the information about
the E911 Practice text file in a hacker publication for
dissemination.
- 4 -
OPERATION OF FRAUD SCHEME
12. It was part of the fraud scheme that the defendant NEIDORF
would and did advise the defendant RIGGS that he had assembled a
group of computer hackers for the purpose of distributing computer
information.
13. It was further part of the scheme that the defendant
RIGGS would and did steal sensitive proprietary Bell South
information files including the E911 Practice text file by gaining
remote unauthorized access to computers of the Bell South Telephone
Company.
14. It was further part of the scheme that the defendant
RIGGS would and did disguise and conceal the theft of the E911
Practice text file from Bell South Telephone Company by removing
all indications of his unauthorized access into Bell South
computers and by using account codes of legitimate Bell South users
to disguise his authorized use of the Bell South computer.
15. It was further part of the scheme that RIGGS would and
did transfer in interstate commerce a stolen E911 Practice text
file from Atlanta, Georgia to Lockport, Illinois through the use
of an interstate computer data network.
16. It was further part of the scheme that defendant RIGGS
would and did store the stolen E911 Practice text file on a
computer bulletin board system in Lockport, Illinois.
17. It was further part of the scheme that defendant NEIDORF,
utilizing a computer at the University of Missouri in Columbia,
Missouri would and did receive a copy of the stolen E911 text file
- 5 -
>from defendant RIGGS through the Lockport computer bulletin board
system through the use of an interstate computer data network.
18. It was further part of the scheme that defendant NEIDORF
would and did edit and retype the E911 Practice text file at the
request of the defendant RIGGS in order to conceal the source of
the E911 Practice text file and to prepare it for publication in
a computer hacker newsletter.
19. It was further part of the scheme that defendant NEIDORF
would and did transfer the stolen E911 Practice text file through
the use of an interstate computer bulletin board system
used by defendant RIGGS in Lockport, Illinois.
20. It was further part of the scheme that the defendants
RIGGS and NEIDORF would publish information to other computer
hackers which could be used to gain unauthorized access to
emergency 911 computer systems in the United States and thereby
disrupt or halt 911 service in portions of the United States.
22. It was further a part of the scheme that the defendants
would and did misrepresent, conceal, and hide, and cause to be
misrepresented, concealed and hidden the purposes of ane {sic} the
acts done in furtherance of the fraud scheme, and would and did use
coded language and other means to avoid detection and apprehension
- 6 -
by law enforcement authorities and to otherwise provide security
to the members of the fraud scheme.
23. In or about December, 1988, at Lockport, in the
Northern District of Illinois, Eastern Division, and elsewhere,
ROBERT J. RIGGS, also known
as Robert Johnson, also
known as Prophet,
defendant herein, for the purpose of executing the aforesaid
scheme, did knowingly transmit and cause to be transmitted by means
of a wire communication in interstate commerce certain signs,
signals and sounds, namely: a data transfer of a E911 Practice
text file from Decatur, Georgia to Lockport, Illinois.
In violation of Title 18, United States Code, Section 1343.
- 7 -
COUNT TWO
The SPECIAL APRIL 1987 GRAND JURY further charges:
1. The Grand Jury realleges and incorporates by reference
the allegations of paragraphs 1 through 22 of Count One of this
Indictment as though fully set forth herein.
2. On or about January 23, 1989, at Lockport, in the
Northern District of Illinois, Eastern Division and elsewhere,
ROBERT J. RIGGS, also known
as Robert Johnson, also
known as Prophet, and
CRAIG NEIDORF, also known
as Knight Lightning,
the defendants herein, for the purposes of executing the aforesaid
scheme did knowingly transmit and cause to be transmitted by means
of a wire communication in interstate commerce certain signs,
signals and sounds, namely: a data transfer of a E911 Practice
text file from Decatur, Georgia to Lockport, Illinois, an edited
and retyped E911 Practice text file from Columbia, Missouri, to
Lockport, Illinois.
In violation of Title 18, United States Code, Section 1343.
- 8 -
COUNT THREE
The SPECIAL APRIL 1987 GRAND JURY further charges:
1. The Grand Jury realleges and incorporates by reference the
allegations of paragraphs 1 through 22 of Count One of this
indictment as though fully set forth herein.
2. In or about December, 1988, at Lockport, in the Northern
District of Illinois, Eastern Division, and elsewhere,
ROBERT J. RIGGS, also known
as Robert Johnson, also
known as Prophet, and
CRAIG NEIDORF, also known
as Knight Lightning,
defendants herein, did transport and cause to be transported in
interstate commerce from Decatur, Georgia, to Lockport, Illinois,
a computerized text file with a value of $5,000 or more, namely:
A Bell South Standard Practice (BSP) 660-225-104SV- Control
Office Administration of Enhanced 911 Services for Special
Services and Major Account Centers dated March, 1988; valued
at approximately $79,449.00
the defendants then and there knowing the same to have been stolen,
converted, and taken by fraud;
In violation of Title 18, United States Code, Section 2314.
- 9 -
COUNT FOUR
The SPECIAL APRIL 1987 GRAND JURY further charges:
1. The Grand Jury realleges and incorporates by reference the
allegations of paragraphs 1 through 22 of Count one of this
Indictment as though fully set forth herein.
2. On or about January 23, 1989, at Lockport, in the Northern
District of Illinois, Eastern Division, and elsewhere,
ROBERT J. RIGGS, also known
as Robert Johnson, also
known as Prophet, and
CRAIG NEIDORF, also known
as Knight Lightning,
defendants herein, did transport and cause to be transported in
interstate commerce from Columbia, Missouri, to Lockport, Illinois,
a computerized textfile with a value of $5,000 or more, namely:
An edited Bell South Standard Practice (BSP) 660-225-
104SV- Control Office Administration of Enhanced 911
Services for Special Services and Major Account Centers
dated March, 1988; valued at approximately $79,449.00.
the defendants, then and there knowing the same to have been
stolen, converted, and taken by fraud;
In violation of Title 18, United States Code, Section 2314.
- 10 -
COUNT FIVE
The SPECIAL APRIL 1987 GRAND JURY further charges:
1. The Grand Jury realleges and incorporates by reference
the allegations of paragraphs 1 through 22 of Count One of this
Indictment as though fully set forth herein.
2. On or about December, 1988, at Lockport, in the
Northern District of Illinois, Eastern Division and elsewhere,
ROBERT J. RIGGS, also known
as Robert Johnson, also
known as Prophet, and
CRAIG NEIDORF, also known
as Knight Lightning,
the defendants herein, knowingly and with intent to defraud, trafficked
in information through which a computer may be accessed without
authorization and by such conduct affected interstate commerce;
In violation of Title 18, United States Code, Section
1030(a)(6)(A).
- 11 -
COUNT SIX
The SPECIAL APRIL 1987 GRAND JURY further charges:
1. The Grand Jury realleges and incorporates by reference
the allegations of paragraphs 1 through 22 of Count One of this
Indictment as though fully set forth herein.
2. In or about January, 1989, at Lockport, in the Northern
District of Illinois, Eastern Division and elsewhere,
ROBERT J. RIGGS, also known
as Robert Johnson, also
known as Prophet, and
CRAIG NEIDORF, also known
as Knight Lightning,
the defendants herein, knowingly and with intend to defraud, trafficked
in information through which a computer may be accessed without
authorization and by such conduct affected interstate commerce;
In violation of Title 18, United States Code, Section
1030(a)(6)(A).
- 12 -
COUNT SEVEN
The SPECIAL APRIL 1987 GRAND JURY further charges:
1. The Grand Jury realleges and incorporates by reference the
allegations of paragraphs 1 through 22 of Count One of this
Indictment as though fully set forth herein.
2. In or about February, 1989, at Lockport, in the Northern
District of Illinois, Eastern Division and elsewhere,
ROBERT J. RIGGS, also known
as Robert Johnson, also
known as Prophet, and
CRAIG NEIDORF, also known
as Knight Lightning,
the defendants herein, knowingly and with intent to defraud, trafficked
in information through which a computer may be accessed without
authorization and by such conduct affected interstate commerce;
In violation of Title 18, United States Code, Section
1030(a)(6)(A).
A TRUE BILL:
________________________________
F O R E P E R S O N
________________________________
UNITED STATES ATTORNEY
- 13 -
==============END=============
(transcribed for TELECOM Digest by)
Mike Godwin, UT Law School
[email protected]
[email protected]
(512) 346-4190
------------------------------
D E F A M A T I O N L I A B I L I T Y
O F
C O M P U T E R I Z E D
B U L L E T I N B O A R D O P E R A T O R S
A N D P R O B L E M S O F P R O O F
John R. Kahn
CHTLJ Comment
Computer Law Seminar
Upper Division Writing
February, 1989
_________________________________________________________________
I. INTRODUCTION
A computer user sits down at her personal computer,
turns it on, and has it dial the number of a local computerized
bulletin board service (BBS) where she has been exchanging
opinions, information, electronic mail, and amicable
conversation with other users. Upon connecting with the BBS, she
enters a secret "password", presumably known only to herself and
to the bulletin board operator, so as to gain access to the
system.
To her surprise, she finds herself deluged with lewd
electronic mail from complete strangers and hostile messages
from persons with whom she believed she was on friendly terms.
The messages read: "Why did you call me a worthless son-of-a ----
- yesterday? I really thought we could be friends, but I guess I
was wrong"; "Hey, baby, I liked your fetish you were telling me
about yesterday: call me at home, or I'll call YOU"; and, "Why
didn't you get around to telling me about your venereal disease
sooner?". Yet our user has not called this BBS in weeks and has
never made any of these statements. Dismayed and angered, the
---
Defamation Liability of Computerized BBS Operators
& Problems of Proof (C) 1989 John R. Kahn 2
----------------------
user comes to realize that she is the victim of computerized
bulletin board abuse.
A personal computer hobbyist (hereafter "SYSOP") who
operates a computerized bulletin board system notices a rash of
heated arguments, profanity and complaints being reported to him
by users on what had been a forum for the peaceful exchange of
ideas. Investigating the complaints, he discovers that
previously responsible users have suddenly and
uncharacteristically been leaving insulting, rude and false
messages about other users on the bulletin board. One user is so
enraged about a public message accusing her of sexual
misadventures that she is threatening to sue the computer
hobbyist in libel for having permitted the message to appear.
The SYSOP realizes that both he and his subscribers have
suffered computerized bulletin board abuse.
The aggravating force behind both the above situations
is most likely a third user (known hereafter as "the
masquerader") who maliciously exploits both his computer
knowledge and his access to BBSes. Since the masquerader has
discovered the password and name of the regular user, and uses
them to access bulletin boards, he appears for all intents and
purposes to be that regular user. The computer thus believes it
has admitted a legitimate subscriber to its database when it has
in fact given almost free reign to a reckless hacker. The
masquerader, posing as another legitimate user, is then free to
portray that user in whatever light he pleases and also to
harass other users of the bulletin board.
---
Defamation Liability of Computerized BBS Operators
& Problems of Proof (C) 1989 John R. Kahn 3
----------------------
When validated users later discover that someone else
has been impersonating them, they invariably cancel their
subscriptions to that BBS and often bring a defamation action
against its SYSOP for the smearing of their good names.
Conversely, the SYSOP, in an effort to avoid liability,
reluctantly engages in monitoring each and every piece of
information posted daily by hundreds of users. If the SYSOP
chooses instead to stop running his BBS altogether, another
efficient and valuable forum for ideas is lost.
What sort of defamation action may be maintained by the
wrongfully disparaged user? Is the computerized bulletin board
offered by the SYSOP subject to the stricter self-scrutiny of
newspapers, or does it operate under some lesser standard? How
may the initial party at fault - the masquerader - be held
accountable for his computerized torts?
The scope of this Comment will be to examine the
defamation liability of computerized BBS operators and
evidentiary proof issues that arise in tracing computerized
defamation to its true source. Other possible Tort causes of
action - intentional infliction of emotional distress, invasion
of privacy, trespass to chattels - are not addressed. It is
assumed throughout that the plaintiff is a private person and
that the issues involved are not matters of "public interest" as
defined in Gertz v. Robert Welch, Inc.1
A. Background
Computerized BBSes exist as a quick, easy and efficient
way to acquire and exchange information about the entire
---
Defamation Liability of Computerized BBS Operators
& Problems of Proof (C) 1989 John R. Kahn 4
----------------------
spectrum of interests.2 The growing popularity of these
electronic forums was demonstrated in a recent study which
numbered BBSes at more than 3,500 nationwide.3 The size and
complexity of computerized BBSes range from relatively simple
programs, run on privately-owned microcomputers with a few
hundred subscribers, to vast, multi-topic database systems with
nationwide lists of subscribers and operated for profit.4
The process of reaching, or "accessing" one of these
bulletin boards is quite simple: all that is required is a
computer, a computer program that allows the computer to
communicate over the phone lines, and a "modem" (a device which
converts the computer's electrical signals into acoustic
impulses, defined infra).5 Once she has accessed the BBS, the
caller is free to trade useful non-copyrighted computer
programs, exchange ideas on a host of topics, post electronic
mail for later reading by others, and much more.6 The ease with
which most BBSes may be accessed and the wealth of interests to
be found there ensure that they will continue to be important
sources of information and discourse.
However, the speed and efficiency of computerized BBSes
also subject them to serious, wide-ranging civil and criminal
abuse. Recently a young computer user paralyzed several major
computer systems across the nation by sending a harmful computer
program (or "worm") to them over telephone lines. The worm
quickly replicated itself in the computers' memories and thus
decreased their output capacities.7 Further, certain computer
abusers (known as "hackers") use the power of the computerized
---
Defamation Liability of Computerized BBS Operators
& Problems of Proof (C) 1989 John R. Kahn 5
----------------------
forum to ply illegal copies of copyrighted programs, bilk
hundreds of millions of dollars annually from credit card and
phone companies, and to wrongfully access others' data files.8 A
minority of other BBSes exist mainly to circulate racist
ideologies.9
What is more, it now appears that the ancient tort of
defamation is actively being practiced through the use of
computerized BBSes.10 Due to the almost ethereal way
computerized BBSes operate - one person may conveniently leave
an electronic message for others to respond to at their leisure
and there is no need for the parties to converse directly or
even to know each other11 - the risk of detection when the BBS
is abused is lower than that for defamation practiced in the
print media.12 Difficulties arise with identifying the true
party at fault and with authenticating the computer records as
evidence of the defamation.13 Adding to this problem is an
uncertainty in the laws concerning the appropriate liability of
SYSOPs for defamatory messages on their BBSes of which they were
unaware.14
B. Definitions
The following are brief definitions of some important
technical terms connected with electronic BBSes:
SYSOP: An abbreviation for "System Operator", this is
the individual generally responsible for organizing information
and for trouble-shooting on a computerized bulletin board. On
larger bulletin boards covering hundreds of topics, several
SYSOPS may be in charge of maintaining information contained in
---
Defamation Liability of Computerized BBS Operators
& Problems of Proof (C) 1989 John R. Kahn 6
----------------------
separate discrete fields.15 But when the BBS is privately owned
and operated, a single SYSOP may very well oversee all aspects
of the board's operations, in addition to being able to access
all his users' passwords and personal information.16
Modem: An abbreviation for "Modulator/Demodulator".
This is a device which links a computer to an ordinary phone
line and converts computer signals to auditory phone signals. A
computer modem on the other end of the transmission then
reverses the process. Computers using modems transfer data
rapidly across phone lines and thus share information.17
Validation: Basically this is a set of procedures used
by responsible SYSOPs to do everything reasonably possible to
verify that the personal information supplied by a user is true
and correct. Common sense and emerging legal standards dictate
that the SYSOP should not merely rely on the name provided by a
potential user when the SYSOP does not personally know that
individual. The SYSOP may be required to independently
corroborate the prospective subscriber's information by first
asking the potential user's name, address and phone number and
then by checking that information with directory assistance.18
These procedures will hopefully aid the operator in identifying
wrongdoers if misuse occurs;19 however, as will be seen, these
procedures are by no means foolproof.
Database: Any collection of data in a computer for
purposes of later retrieval and use, i.e., names, addresses,
phone numbers, membership codes, etc.
User: Anyone who accesses a computerized bulletin board
---
Defamation Liability of Computerized BBS Operators
& Problems of Proof (C) 1989 John R. Kahn 7
----------------------
system and is exposed to the information stored there. Users may
be identified by their true names, by an assigned numerical
code, or by colorful "handles", or "usernames."20
Operating System: This is a program which controls the
computer's basic operations and which recognizes different
computer users so that their actions do not interfere with one
another.21 For example, most multi-user operating systems will
not allow one user to delete another's data unless the second
user gives explicit permission.22 BBS system software programs
perform this function through their use of "accounts" and
"passwords":23 private electronic mail sent to a particular user
may not be read or deleted by others. The BBS' operating system
is also designed to deny access to those attempting to log on
under an unvalidated or unrecognized name.24
Account/Username: As another part of BBS system
security, each user chooses an "account", or "username",
consisting of one to eight letters or numbers.25 The BBS'
operating system then will not allow commands issued by one user
of one account to modify data created by another account;26 nor
will it grant access to an account that has been terminated or
invalidated.
Password: Yet another aspect of BBS system security is
the use of "passwords" as a prerequisite to accessing the
computer system. Most operating systems require the user to
enter both her account name and password to use the account.27
Because electronic mail cannot be sent without the username to
which it is being addressed, and because the account cannot be
---
Defamation Liability of Computerized BBS Operators
& Problems of Proof (C) 1989 John R. Kahn 8
----------------------
used without knowledge of the password, usernames are generally
public knowledge while passwords are a closely-guarded secret,
known only to the user and the operating system.28
Teleprocessing: This is defined as accessing a computer
from a remote location, usually over a telephone line or similar
communications channel.29
Uploading/Downloading: For purposes of exchanging
computer programs or electronic mail over the phone lines, the
process of transferring information from one's personal computer
to the bulletin board is called uploading. The reverse process -
transferring information from a bulletin board to a personal
computer - is known as downloading.30
II. DEFAMATION LIABILITY OF COMPUTERIZED BBS OPERATORS
A. Computerized Defamation: Libel or Slander?
Libel is the "publication of defamatory matter by
written or printed words, by its embodiment in physical form, or
by any other form of communication that has the potentially
harmful qualities characteristic of written or printed words."31
Publication of a defamatory matter is "its communication
intentionally or by a negligent act to one other than the person
defamed."32 A communication is defamatory if it "tends to so
harm the reputation of another as to lower him in the estimation
of the community or to deter third persons from associating or
dealing with him."33 The difference between libel and slander
has traditionally depended upon the form of the communication:
oral defamation generally is considered slander, while written
---
Defamation Liability of Computerized BBS Operators
& Problems of Proof (C) 1989 John R. Kahn 9
----------------------
defamation is generally considered libel.34 The distinction is
important, because libel requires no proof of special damages
and is actionable by itself, while slander generally requires
proof of special damages in order to be actionable.35
However, with the advent of electronic media, the
traditional libel/slander distinctions as they apply to sight
and hearing are no longer valid. For example, passing defamatory
gestures and signals, though visible to sight, were considered
slander;36 an ad-libbed statement on a telecast impugning a
person's financial status was found to be libel.37
It has been suggested that the real distinction between
libel and slander is the threat and magnitude of harm to
reputation inherent in the form of publication.38 Libel has been
historically associated with writings because (1) a writing is
made more deliberately than an oral statement; (2) a writing
makes a greater impression to the eye than does an oral
statement to the ear; (3) a writing is more permanent than
speech; and (4) a writing has a wider area of dissemination than
speech.39 These four qualities inherent in a writing made the
possible harm to reputation greater than mere spoken words. In
applying libel to the new form of computerized communication
used on BBSes, the potentiality for harm to reputation is
significant, and should again be considered the controlling
factor.
In our hypothetical situation, the user discovered that
another user (the masquerader) had usurped her account name and
password, causing her great embarrassment and humiliation. The
---
Defamation Liability of Computerized BBS Operators
& Problems of Proof (C) 1989 John R. Kahn 10
----------------------
act of prying into and taking another's computer information to
misuse it elsewhere would indicate a certain deliberation on the
actor's part to spread defamatory messages. Secondly, the
defamatory message is displayed to other users on their computer
monitors in the form of electronic characters, making a visual
impression. Third, this electronic defamation is more permanent
than mere words because it is stored in the BBS' memory until
erased by the user or SYSOP. Finally, the message arguably has a
wider area of dissemination than a one-to-one spoken defamation
because, as a message on an electronic BBS, it has the potential
of being viewed by hundreds, perhaps thousands, of users each
day. Based on these four criteria, the capacity for harm to our
user's reputation due to the masquerader's activities is indeed
great enough to be considered libellous.
B. Defamation Liability of the SYSOP
Having established the electronic message as being
libellous, the next issue is to determine the extent of
liability for the SYSOP who unknowingly permits the message to
be communicated over his BBS. Case law indicates that the
SYSOP's liability depends upon the type of person defamed and on
the subject matter of the defamation.
1. Degree of fault required
The United States Supreme Court has addressed modern
defamation liability in two major decisions. Both conditioned
the publisher's liability on the type of person defamed and on
the content of the defamation. In New York Times v. Sullivan,40
the Court determined that in order for a public official to
---
Defamation Liability of Computerized BBS Operators
& Problems of Proof (C) 1989 John R. Kahn 11
----------------------
recover damages in a defamation action, the statement must be
shown to have been made with "actual malice", i.e., with
knowledge of its falsity or with reckless disregard for its
truth.41 Due to society's interest in "uninhibited, robust and
wide-open" debate on public issues, neither factual error nor
defamatory content sufficed to remove the First Amendment's
shield from criticism of an official's conduct.42
The Supreme Court further elaborated on defamation
liability standards in the private and quasi-private sphere when
it decided Gertz v. Robert Welch, Inc.43 In Gertz, the publisher
of a John Birch Society newsletter made certain false and
inaccurate accusations concerning an attorney who represented a
deceased boy's family. The family had civilly sued the policeman
who murdered the boy. In rebutting what he perceived to be a
secret campaign against law and order, the publisher labelled
the family's attorney a "Leninist" and "Communist-fronter".44 In
addition, the publisher asserted that the attorney had been a
member of the National Lawyers Guild, which "'probably did more
than any other outfit to plan the Communist attack on the
Chicago police during the 1968 Democratic Convention.'"45 In
publishing these statements throughout Chicago, the managing
editor of the Birch Society newsletter made no effort to verify
or substantiate the charges against the attorney.46
The Supreme Court held in Gertz that while First
Amendment considerations protect publications about public
officials47 and about "public figures"48, requiring a showing of
"actual malice" before defamation damages could be recovered,
---
Defamation Liability of Computerized BBS Operators
& Problems of Proof (C) 1989 John R. Kahn 12
----------------------
the same was not true for defamation suits brought by private
citizens49, a group to which the attorney was held to belong.50
Private citizens were seen as deserving more protections from
defamation than public officials or public figures, so they were
not required to show "actual malice" as a precondition to
recovery.51 The Court then left it to the states to decide the
precise standard of liability for defamation of private
individuals, so long as liability without fault was not the
standard.52
By Gertz, then, the appropriate standard of liability
for publicizing defamation of private parties falls somewhere
below actual malice and above strict liability. The problem with
defining the defamation standard for computerized BBS operators,
however, is a lack of uniform standards. In such circumstances,
the objective "reasonable person" standard will likely be
applied to the SYSOP's actions.53 Several cases may be usefully
applied by analogy.
The court in Hellar v. Bianco54 held that a bar
proprietor could be responsible for not removing a libellous
message concerning the plaintiff's wife that appeared on the
wall of the bar's washroom after having been alerted to the
message's existence.55 The court noted that "persons who invite
the public to their premises owe a duty to others not to
knowingly permit their walls to be occupied with defamatory
matter.... The theory is that by knowingly permitting such
matter to remain after reasonable opportunity to remove [it],
the owner of the wall or his lessee is guilty of republication
---
Defamation Liability of Computerized BBS Operators
& Problems of Proof (C) 1989 John R. Kahn 13
----------------------
of the libel."56 The Hellar court then left the ultimate
determination of the bar owner's negligence to the jury.57 This
holding seems to be in accord with the Restatement of Torts,
which provides:
PUBLICATION:
(2) One who intentionally and unreasonably
fails to remove defamatory matter that
he knows to be exhibited on land or
chattels in his possession or under his
control is subject to liability for its
continued publication.58
Contrarily, however, the Ohio court of appeals in Scott
v. Hull59 found that the building owner and agent who had
control over a building's maintenance were not responsible for
libel damages for graffiti inscribed by an unknown person on an
exterior wall.60 The court distinguished Hellar by noting that
in Hellar the bartender constructively adopted the defamatory
writing by delaying in removing it after having been expressly
asked to do so:
"It may thus be observed from these cases
that where liability is found to exist it is
predicated upon actual publication by the
defendant or on the defendant's ratification
of a publication by another, the ratification
in Hellar v. Bianco...consisting of at least
the positive acts of the defendants in
continuing to invite the public into their
premises where the defamatory matter was on
view after the defendants had knowledge of
existence of same."61
The Scott court held that defendants could only be
responsible for publishing a libellous remark through a positive
act, not nonfeasance; thus, their mere failure to remove the
graffiti from the building's exterior after having it called to
---
Defamation Liability of Computerized BBS Operators
& Problems of Proof (C) 1989 John R. Kahn 14
----------------------
their attention was held not to be a sufficient basis of
liability.62
A situation similar to Scott arose recently in Tackett
v. General Motors Corporation.63 There, an employee brought a
libel suit against his employer for, inter alia, failing to
remove allegedly defamatory signs from the interior wall of its
manufacturing plant after having notice of their existence. One
large sign remained on the wall for two to three days while a
smaller one remained visible for seven to eight months.64
Instead of focussing on the Scott malfeasance/nonfeasance
test,65 the Tackett court considered defendant's implied
adoption of the libellous statement to be the correct basis of
liability.66 While saying that failure to remove a libellous
message from a publicly-viewed place may be the equivalent of
adopting that statement, and noting that Indiana would follow
the Restatement view "when the time comes,"67 the Tackett court
held that the Restatement view could be taken too far. Citing
Hellar, the court wrote:
The Restatement suggests that a tavern owner
would be liable if defamatory graffiti
remained on a bathroom stall a single hour
after the discovery [Citation to Hellar]. The
common law of washrooms is otherwise, given
the steep discount that readers apply to such
statements and the high cost of hourly
repaintings of bathroom stalls [Citation to
Scott]. The burden of constant vigilance
exceeds the benefits to be had. A person is
responsible for statements he makes or
adopts, so the question is whether a reader
may infer adoption from the presence of a
statement. That inference may be unreasonable
for a bathroom wall or the interior of a
subway car in New York City but appropriate
for the interior walls of a manufacturing
---
Defamation Liability of Computerized BBS Operators
& Problems of Proof (C) 1989 John R. Kahn 15
----------------------
plant, over which supervisory personnel
exercise greater supervision and control. The
costs of vigilance are small (most will be
incurred anyway), and the benefits
potentially large (because employees may
attribute the statements to their employer
more readily than patrons attribute graffiti
to barkeeps).68
According to this reasoning, then, the location and
length of time the libel is allowed to appear plays an integral
part in determining whether a given defendant has adopted the
libel, and thus has published it.
An application of the foregoing analysis to the issue
at hand highlights the need for greater care in allowing the
posting of electronic mail messages on a BBS. The Tackett court
noted that while the content of graffitti scrawled on bathroom
walls might be subject to healthy skepticism by its readers, the
same might not be true for other locations such as interiors of
subway cars or manufacturing plant walls.69 If this is true,
then it is reasonable to assume that a defamatory message
displayed in a forum for the exchange of ideas is more apt to be
taken seriously by its readers - especially when the libellous
---
Defamation Liability of Computerized BBS Operators
& Problems of Proof (C) 1989 John R. Kahn 16
----------------------
message purports to be written by the subject of the libel.70
Further, the Tackett court indicated that the high cost
of repainting bathroom stalls by the hour outweighed its
perceptible benefits. The same is not true for electronic BBSes,
where the costs of prevention are minimal in light of the threat
of widespread harm to users' reputations.71
2. Damages
Once the plaintiff establishes that the SYSOP failed to
act reasonably in removing statements known to be libellous from
his BBS or in negligently failing to prevent their appearance
there,72 no proof of special damages is necessary as libel is
actionable per se.73 The state's interest in protecting private
reputations has been held to outweigh the reduced constitutional
value of speech involving matters of no public concern such that
presumed and punitive damages may be recovered absent a showing
of actual malice.74
The proper gauge of liability has again raised some
questions.75 One writer has noted that if the burden of proof is
---
Defamation Liability of Computerized BBS Operators
& Problems of Proof (C) 1989 John R. Kahn 17
----------------------
to rest on the plaintiff, she may be at a disadvantage in
producing sufficient evidence to demonstrate negligent conduct
on the part of the SYSOP.76 Solutions to this problem have
ranged from a rebuttable presumption of negligence in favor of
the plaintiff77 to adoption of a set of standards similar to
those set out in the Federal Fair Credit Reporting Act.78 In
either event, damage awards for computer abuse have been
addressed both by federal and state law.79
3. Suggestions
Because computerized BBSes are still a relatively new
technological phenomena, consistent standards for SYSOPs' duties
have yet to be developed.80 However, at least one users' group
has adopted a voluntary code of standards for electronic BBSes,
applicable to both users and SYSOPs of boards open to the
general public:
SCOPE:
This Minimum Code of Standards applies to
both users and SYStem Operators (SYSOPs) of
electronic bulletin boards available to the
general public.
FREEDOM OF SPEECH AND IDEAS
Each user and SYSOP of such systems shall
actively encourage and promote the free
exchange and discussion of information,
---
Defamation Liability of Computerized BBS Operators
& Problems of Proof (C) 1989 John R. Kahn 18
----------------------
ideas, and opinions, except when the content
would:
- Compromise the national security of the
United States.
- violate proprietary rights.
- violate personal privacy,
- constitute a crime,
- constitute libel, or
- violate applicable state, federal or
local laws and regulations affecting
telecommunications.
DISCLOSURE
Each user and SYSOP of such system will:
- disclose their real name, and
- fully disclose any personal, financial,
or commercial interest when evaluation
any specific product or service.
PROCEDURES
SYSOPS shall:
- review in a timely manner all publicly
accessible information, and
- delete any information which they know
or should know conflicts with this code
of standards.
A 'timely manner' is defined as what is
reasonable based on the potential harm that
could be expected. Users are responsible for:
- ensuring that any information they
transmit to such systems adheres to this
Minimum Code of Standards, and
- upon discovering violations of the
Minimum Code of Standards, notifying the
SYSOP immediately.
IMPLEMENTATION
Electronic bulletin board systems that choose
to follow this Minimum Code of Standards
shall notify their users by publishing this
Minimum Code, as adopted by the [Capitol PC
Users Group], and prominently display the
following:
'This system subscribes to the Capitol PC
Users Group Minimum Code of Standards for
electronic bulletin board systems.'81
While non-binding on publicly-accessible BBSes, the
above guidelines furnish sound basic policies that all SYSOPs
might use in shielding themselves from defamation liability. Our
hypothetical at the beginning of this Comment described a
situation where a malicious intruder was able to access and
---
Defamation Liability of Computerized BBS Operators
& Problems of Proof (C) 1989 John R. Kahn 19
----------------------
masquerade as a validated user on a BBS; the following are some
additional computer security measures that the reasonable SYSOP
could conduct to avoid that situation:
a. Special "screening" software: One writer has
suggested discouraging potential BBS misuse through programming
the BBS to reject those messages containing common defamatory
and obscene language;82 such a program would discard a message
containing any of those terms and would presumably notify the
SYSOP of their presence. Drawbacks to this procedure are that
computer programs cannot understand all the nuances of libellous
messages83 and would thus lead to the rigid deletion of many
otherwise legitimate messages.84
b. Unique passwords: A more fundamental and
economical approach would be for the SYSOP to both notify all
new users about the potential for computerized BBS abuse and to
encourage their use of a unique password on each BBS they call.
This would have the practical effect of keeping a masquerader
from using the names and passwords found on one BBS to
wrongfully access and masquerade on other BBSes. A drawback to
this procedure is that the truly malicious masquerader may still
discover a BBS' most sensitive user records by way of a renegade
computer program called a "trojan horse".85 However, one could
speculate that the SYSOP acts reasonably in informing potential
users of the existing threat and in helping them avoid it.
c. Encryption: This is essentially a way for the
SYSOP to make the users' passwords unique for them. The power of
the computer allows complex algorithms to be applied to data to
---
Defamation Liability of Computerized BBS Operators
& Problems of Proof (C) 1989 John R. Kahn 20
----------------------
encode it in such a way that, without the key to the code, it is
virtually impossible to decode the information.86 This technique
would have the added benefit of forcing the masquerader, upon
accessing the BBS with a trojan horse program, to search for the
secret decoding algorithm in addition to the BBS' secret user
files. Indeed, it is conceivable that a special encryption or
password could be devised to allow only the SYSOP access to the
BBS' decoding algorithm. However, encryption involves a
significant overhead - impractical for most small, privately-
operated BBSes - and is more frequently used to protect messages
from one system to another where the data is vulnerable to
interception as it passes over transmission lines.87
d. Prompt damage control: In accord with Hellar,88
the Restatement (Second) of Torts,89 and possibly Tackett,90 a
SYSOP acts reasonably in promptly assisting the libelled user to
partially reverse the effects of the masquerader's actions.
Recall that in those instances a defendant was held to have
impliedly adopted a defamatory statement by acting unreasonably
slowly in removing it from his property once having been made
aware of it.91 While it may be unreasonable to expect the SYSOP
to monitor each message posted every day - especially where the
defamatory message appears to have been left by the true user -
it is not too much to require the SYSOP to quickly remedy
security flaws in his BBS as they are pointed out to him.92 To
this end, the SYSOP has several options. In situations where the
defaming user libels another without masquerading as the
libelled party, the SYSOP could simply delete the defamer's
---
Defamation Liability of Computerized BBS Operators
& Problems of Proof (C) 1989 John R. Kahn 21
----------------------
account. In situations where a user masquerading as another
posts a libellous message, the SYSOP could publish a retraction
to all his subscribers, urging them to use a different password
on each BBS they call. Further, where a masquerader published
the libel, the SYSOP should offer his full cooperation to the
maligned user in tracking down the time and date the libellous
message was posted93 in order to better limit the SYSOP's
liability.
Certain BBS SYSOPs claim that holding them liable for
information appearing on their BBSes violates their First
Amendment rights by restricting their right to free speech94 and
by holding them responsible for the libel perpetrated by the
>From kadie Sat Oct 12 09:53:46 1991
To: cafb-mail
~Subject: Computers and Academic Freedom mailing list (batch edition)
Status: R
Computers and Academic Freedom mailing list (batch edition)
Sat Oct 12 09:53:27 EDT 1991
[For information on how to get a much smaller edited version of the
list, send email to
[email protected]. Include the line:
send acad-freedom caf
- Carl ]
In this issue:
:
The addresses for the list are now:
[email protected] - for contributions to the list
or
[email protected]
[email protected] - for automated additions/deletions
(send email with the line "help" for details.)
[email protected] - for administrivia
-------------------
masquerader. It has been suggested that the SYSOP should be held
to the same standard of liability as a neighborhood supermarket
which furnishes a public bulletin board:95 just as the
supermarket would not be liable for posting an advertisement for
illicit services, so should the BBS SYSOP escape liability for
libellous messages left on his board, especially when its poster
appears to be a validated user.96
However, this comparison lacks merit for the reasons
given by the Seventh Circuit in Tackett v. General Motors
Corporation.97 The defendant's liability in that case rested on
its publication of libel by implicitly adopting the statement.98
Defendant's failure to remove a defamatory sign painted on one
of the interior walls of its factory for seven or eight months
after discovering its presence was such that "[a] reasonable
person could conclude that Delco 'intentionally and unreasonably
---
Defamation Liability of Computerized BBS Operators
& Problems of Proof (C) 1989 John R. Kahn 22
----------------------
fail[ed] to remove' this sign and thereby published its
contents."99
There would certainly be accomplice liability if the
supermarket unreasonably delayed removing an advertisement for
illegal services from its bulletin board once it was made aware
of it. The market could be seen as having adopted the ad's
statements by not acting responsibly to its viewing public.
Similarly, a SYSOP would be liable for defamatory messages
posted on his BBS - even by what appears to be the true user -
if he fails to act reasonably by using his computer skill to
eviscerate the libel.100 While the computerized BBS may be
nothing more than a hobby of the SYSOP, the speed with which it
can disseminate potentially damaging information among its users
demands the standards of responsibility described above.
C. Defamation Liability of the Masquerader
1. Degree of fault required
It should be noted that the liability and proof issues
concerning the SYSOP and masquerader are inverse. As to the
SYSOP who allows libellous messages to be posted on his BBS, his
liability may be inferred simply by those messages having
appeared there;101 however, his degree of fault - actual malice
or simple negligence - is subject to debate.102 Conversely,
while the masquerader's degree of fault is clearly evident,103
tracing that fault back to him is a more elusive matter.104 The
requisite degree of fault for masqueraders is set out in federal
and state law.105
2. Damages
---
Defamation Liability of Computerized BBS Operators
& Problems of Proof (C) 1989 John R. Kahn 23
----------------------
Assuming arguendo that the masquerader's defamatory
publications have been successfully traced back to him by the
plaintiff, actual and punitive damages may then be recovered
from him based on his knowledge of the publication's falsity or
reckless disregard for its truth.106 Federal and state law have
also specified certain remedies.107
III PROBLEMS OF PROOF
A. Proof of SYSOP's Actions
We have seen that while the appropriate degree of fault
for a SYSOP to be liable for defamatory messages appearing on
his BBS is subject to dispute,108 a showing that the defamation
appeared there due to the SYSOP's negligence is much more
capable of resolution.109 The jury should be made aware of the
actual validation/security procedures practiced by the SYSOP and
should weigh them in light of the prevailing practice.110
Several facets of an emerging standard of care for SYSOPs have
already been suggested in this Comment,111 and the SYSOP's
adherence to them could be shown through users' testimony.
B. Proof of Masquerader's Actions
In contrast with the degree of fault required to
establish the SYSOP's publication of the libellous message, the
degree of fault for the masquerader is much less subject to
debate. The masquerader's actions are not likely to be
considered merely inadvertent or negligent.112 However, because
the masquerader has intentionally discovered and usurped the
user's name and password, he appears to be that user on all
---
Defamation Liability of Computerized BBS Operators
& Problems of Proof (C) 1989 John R. Kahn 24
----------------------
computer records. Tracing the masquerader's defamatory
publication back to him thus encounters some important
evidentiary barriers: the maligned user is forced to rely on
computerized records produced by the BBS and phone company in
trying to link the masquerader's libellous publication back to
him.113 We turn now to consider the evidentiary hurdles to be
overcome in tracing the libellous communication to its true
source.
1. The Hearsay Rule & Business Records Exception
The first evidentiary obstacle to connecting the
masquerader with his libellous publication is the hearsay rule.
As defined by the Federal Rules of Evidence, hearsay is "a
statement, other than one made by the declarant while testifying
at the trial or hearing, offered in evidence to prove the truth
of the matter asserted";114 as such, it is inadmissible as
evidence at trial.115 Computer-generated evidence is subject to
the hearsay rule, not because it is the "statement of a
computer", but because it is the statement of a human being who
entered the data.116 To the extent the plaintiff user relies on
computer-generated records to show that a call was placed from
the masquerader to the BBS at the time and date in question,
then, her evidence may be excluded.
However, numerous exceptions to the hearsay rule have
developed over the years such that evidence which might
otherwise be excluded is deemed admissible. The most pertinent
hearsay exception as applied to computerized evidence is the
"business records exception", which admits into evidence any
---
Defamation Liability of Computerized BBS Operators
& Problems of Proof (C) 1989 John R. Kahn 25
----------------------
records or data compilations, so long as (1) they were made
reasonably contemporaneously with the events they record; (2)
they were prepared/kept in the course of a regularly conducted
business activity; and (3) the business entity creating these
records relied on them in conducting its operations.117 The
veracity of the computer records and of the actual business
practices are shown by the record custodian's or other qualified
witness' testimony, unless the circumstances indicate lack of
trustworthiness.118 The term "business" as used in this rule
includes callings of every kind, whether or not conducted for
profit.119
Statutes and judicial decisions in several states have
gradually recognized that the business records exception extends
to include computer-generated records.120 This is largely due to
(1) modern business' widespread reliance on computerized record-
keeping, (2) the impracticability of calling as witnesses every
person having direct personal knowledge of the records'
creation, and (3) the presumption that if a business was willing
to rely on such records, there is little reason to doubt their
accuracy.121
Using this exception to the hearsay rule, plaintiff
user would most likely seek to admit the BBS' computer-generated
username/password log-in records plus the phone company's call
records to establish the connection between the masquerader's
telephone and the BBS at the precise instant the libellous
message was posted.122 As an initial matter, however, plaintiff
---
Defamation Liability of Computerized BBS Operators
& Problems of Proof (C) 1989 John R. Kahn 26
----------------------
must first lay a foundation for both the BBS' and phone
company's computer-generated business records.
A sufficient foundation for computer-generated records
was found recently to exist in People v. Lugashi.123 There, the
California Court of Appeal affirmed a conviction of grand theft
based on evidence adduced from computer-generated bank records.
Defendant, an oriental rug store owner, had been convicted of
fraudulently registering thirty-seven sales on counterfeit
credit cards. The issuing banks became suspicious of criminal
activity when charge card sales data from defendant's store
showed 44 fraudulent uses of charge cards at defendant's store
within only five weeks.124 As each fraudulent credit card
transaction was completed, defendant registered the sale
simultaneously with the banks' computers.125 Each night, as
standard bank practice, the banks then reduced the computer
records of credit card transactions to microfiche. Information
gleaned from these microfiche records was entered against
defendant at trial.126
The California Court of Appeal recognized the trial
court judge's wide discretion in determining whether a
sufficient foundation to qualify evidence as a business record
has been laid.127 It held that defendant's allocations of error
were without merit since defendant himself had acknowledged that
the bank's computer entries memorialized in the microfiche
record were entered simultaneously as they occurred in the
regular course of business.128 Further, the Court of Appeals
dismissed defendant's claim that only a computer expert could
---
Defamation Liability of Computerized BBS Operators
& Problems of Proof (C) 1989 John R. Kahn 27
----------------------
supply testimony concerning the reliability of the computer
record:
Appellant's proposed test incorrectly presumes computer
data to be unreliable, and, unlike any other business
record, requires its proponent to disprove the
possibility of error, not to convince the trier of fact
to accept it, but merely to meet the minimal showing
required for admission....
The time required to produce this additional [expert]
testimony would unduly burden our already crowded trial
courts to no real benefit.129
The Lugashi court then followed the bulk of other
jurisdictions adopting similar analyses and upholding admission
of computer records with similar or less foundational showings
over similar objections.130
As to admission into evidence of telephone companies'
computer-generated call records under the business records
exception, courts have evinced a similar attitude to that in
Lugashi. In State v. Armstead,131 a prosecution for obscene
phone calls, the trial court was held to have properly admitted
computer printouts showing that calls had been made from
defendant's mother's telephone, despite defendant's contention
that the witness who was called to lay the foundation had not
been personally responsible for making the record.132 Because
the printout represented a simultaneous self-generated record of
computer operation, the court held it was therefore not
hearsay.133
In an Ohio prosecution for interstate telephone
harassment, it was held no error was committed in admitting
defendant's computerized phone statement under the Business
Records exception which showed that telephone calls had been
---
Defamation Liability of Computerized BBS Operators
& Problems of Proof (C) 1989 John R. Kahn 28
----------------------
made from defendant's phone in Ohio to various numbers in
Texas.134 A sufficient foundation for the admission of business
records under Federal Rules of Evidence 803(6) was established
when a telephone company witness identified the records as
authentic and testified they were made in the regular course of
business.135
Applying the foregoing analyses to BBSes, the plaintiff
user would establish a foundation for the correlated BBS136 and
telephone company phone logs by showing that (1) they were made
contemporaneously with the posting of the libellous message;137
(2) they were prepared/kept in the course of a regularly
conducted business activity, since both the BBS and telephone
company consistently maintain accounts of all persons who use
their services; and (3) the BBS and telephone company relied on
those records for billing purposes.138 Once such a foundation is
laid, the trial court has wide discretion in admitting business
records into evidence.139
2. Authentication & the Voluminous Records Exception
The second evidentiary barrier encountered in tracing
the masquerader's libellous messages back to him is proving his
authorship of the libel, or "authenticating" the computerized
records.140 The computer-generated phone and BBS records showing
that a call from a certain phone number at a particular date and
time resulted in a libellous message being published must
somehow be linked to the masquerader.
The Federal Rules of Evidence provide in pertinent
---
Defamation Liability of Computerized BBS Operators
& Problems of Proof (C) 1989 John R. Kahn 29
----------------------
part:
(a) General provision. The requirement of
authentication or identification as a condition
precedent to admissibility is satisfied by
evidence sufficient to support a finding that the
matter in question is what its proponent claims.
(b) Illustrations. By way of illustration only, and
not by way of limitation, the following are
examples of authentication or identification
conforming with the requirements of this rule:...
(6) Telephone conversations. Telephone
conversations, by evidence that a call was
made to the number assigned at the time by
the telephone company to a particular person
or business, if
(A) in the case of a person, circumstances,
including self-identification, show the
person answering to be the one called,
or
(B) in the case of a business, the call was
made to a place of business and the
conversation related to business
reasonably transacted over the
telephone....141
The question of whether a writing is properly
authenticated is primarily one of law for the court; if the
court decides the question affirmatively, it is ultimately for
the jury.142 The court will make no assumptions as to the
authenticity of documents in deciding their initial
admissibility.143 The difficulty presented here is that the
Federal Rules of Evidence seem to require authentication of
telephone calls by reference to their specific content.144 The
specific content of a given phone call is not demonstrated by
phone logs showing merely the date and time the call occurred.
The authentication of extrinsic documents may be
subject to a "best evidence rule" objection. As stated in
Federal Rule of Evidence 1002:
REQUIREMENT OF ORIGINAL: To prove the contents of a
---
Defamation Liability of Computerized BBS Operators
& Problems of Proof (C) 1989 John R. Kahn 30
----------------------
writing, recording, or photograph, the original of that
writing, recording, or photograph is required, unless
provided otherwise in these rules or by an act of
Congress.145
Since its introduction in the 18th century, various
rationales have been posited for this rule.146 While earlier
writers asserted that the rule is intended to prevent fraud,
most modern commentators agree that the rule's main purpose is
to convey to the court the exact operative effect of the
writing's contents.147
However, at least one jurisdiction has implicitly
equated compliance with the business records exception with the
Best Evidence Rule. In Louisiana v. Hodgeson,148 the defendant
in a manslaughter trial contended that a printout of her
telephone bill, offered to show communications between her and a
third party, was not authenticated.149 The court, while making
no specific reference to the authentication point, rejected
defendant's contention, noting that the information from the
computer's storage was the company's business record and that it
was accessible only by printout.150
Similarly, in an Indiana bank robbery prosecution,151
the state offered microfiche copies of the telephone company's
computerized records showing certain telephone calls from
defendant. On appeal, defendant argued that these documents were
not authenticated because they were not the "original or first
permanent entry," and that they therefore should not have been
admitted into evidence. The court disagreed, saying that a
duplicate was admissible to the same extent as an original
---
Defamation Liability of Computerized BBS Operators
& Problems of Proof (C) 1989 John R. Kahn 31
----------------------
unless a "genuine issue" were raised as to the authenticity of
the original.152
By these precedents, then, provided plaintiff user
establishes that both the telephone and BBS user records were
prepared in accordance with the business records exception,153
the fact that a call from the masquerader's phone is shown to
have occurred at the same instant the libellous message was
posted may be sufficient to authenticate that the call was made
by the masquerader. Other circumstantial evidence adduced by
plaintiff user would strengthen this inference.154
Another authentication hurdle in plaintiff's case is
the requirement that the entire original record sought to be
authenticated be produced.155 This requirement can prove highly
impractical in situations where there are vast numbers of
individual records extending over long periods of time.156
Requiring plaintiff to produce the entire body of these records
would be unduly expensive and time-consuming. What is more, if
plaintiff were to attempt to summarize vast computerized
business data compilations so as to introduce those summaries
into evidence without producing the complete body of computer
records, such summaries might not be admissible on the grounds
that they were not made "in the regular course of business."157
However, an exception to strict authentication
requirements of the Federal Rules of Evidence has been
developed. Rule 1006 provides:
The contents of voluminous writings, recordings, or
photographs which cannot conveniently be examined in
court may be presented in the form of a chart, summary,
---
Defamation Liability of Computerized BBS Operators
& Problems of Proof (C) 1989 John R. Kahn 32
----------------------
or calculation. The originals, or duplicates, shall be
made available for examination or copying, or both, by
other parties at reasonable time and place. The court
may order that they be produced in court.158
In Cotton v. John W. Eshelman & Sons, Inc.,159
summaries of certain computerized records were held properly
admitted into evidence on the theory that "[w]hen pertinent and
essential facts can be ascertained only by an examination of a
large number of entries in books of account, an auditor or
expert examiner who has made an examination and analysis of the
books and figures may testify as a witness and give summarized
statements of what the books show as a result of his
investigation, provided the books themselves are accessible to
the court and to the parties."160 Under this precedent,
plaintiff user would only need to produce the pertinent parts of
the computerized records, as determined by an impartial auditor.
IV. CONCLUSION
It is difficult to overestimate the ease with which
computers now enable us to compile and exchange information.
Computerized "bulletin boards" run on personal microcomputers by
private persons and businesses are examples of this enhanced
form of communication. Users can trade computer programs and
exchange a wealth of ideas, opinions, and personal information
through such forums.
The advantages of this process break down, however,
when malicious users abuse the system and BBS SYSOPS
intentionally or negligently allow this to occur. The nature of
computerized data is such that tortious misinformation may
---
Defamation Liability of Computerized BBS Operators
& Problems of Proof (C) 1989 John R. Kahn 33
----------------------
easily be spread to thousands of users before it is discovered.
Because the potential for harm to reputation is so tremendous,
appropriate standards of liability and methods of proof must be
addressed.
The requisite degree of fault in libelling private
persons is less than that for libelling public officials/public
figures, and may be established as against a SYSOP by a simple
showing of his negligent failure to observe reasonably minimal
computer security measures. The basis of liability for a
masquerader who intentionally misappropriates another's private
information is even less subject to debate.
Two main evidentiary hurdles face the plaintiff seeking
to link the masquerader with his libellous message through
reliance on computer-generated records. First, the hearsay rule
automatically excludes all evidence produced out-of-court that
is being offered to prove the truth of the matter at hand.
Second, the authentication requirement demands that the
masquerader's connection to the entire body of proffered
computer records be established.
However, certain exception to both of these limitations
ease the plaintiff's burden. First, the business records
exception to the hearsay rule admits computer records into
evidence if they (1) were made reasonably contemporaneously with
the events they record; (2) were prepared/kept in the course of
a regularly conducted business activity; and (3) the business
entity creating these records relied on them in conducting its
operations. Both BBS and telephone company records may come
---
Defamation Liability of Computerized BBS Operators
& Problems of Proof (C) 1989 John R. Kahn 34
----------------------
under this exception. Second, the voluminous writings exception
allows the contents of voluminous computerized records which
cannot conveniently be examined in court to be presented in the
form of a summary. So long as the original records or duplicates
thereof are available for examination by other parties at
reasonable times and places, the entire data compilation need
not be produced. Plaintiff should employ both of these
exceptions in an effort to convince a jury by a preponderance of
the evidence that the masquerader has abused his computer skills
and has damaged plaintiff's reputation.
==============================================
Resent-Message-Id: <
[email protected]>
id AA20305; Fri, 20 Apr 90 12:46:45 PDT
~Date: Fri, 20 Apr 90 12:42:02 PDT
~From: Lang Zerner <
[email protected]>
Message-Id: <
[email protected]>
~Subject: Sysops and libel liability -- endnotes
Resent-Date: Sat, 21 Apr 90 0:05:23 CDT
Resent-From:
[email protected]
Resent-To:
[email protected]
Status: RO
Here are the endnotes to the paper I submitted in a separate message.
Be seeing you...
==Lang
=======
---
Defamation Liability of Computerized BBS Operators
& Problems of Proof (C) 1989 John R. Kahn 35
----------------------
ENDNOTES
1. 418 U.S. 323, 94 S.Ct. 2997, 41 L.Ed.2d 789 (1974).
2. These interests can cover anything from science fiction
to gourmet cooking. Uyehara, Computer Bulletin Boards:
Let the Operator Beware, 14 Student Lawyer 28 (1986).
3. Id., at 30.
4. The data service Compuserve is one such national BBS
run for profit by business organizations. Uyehara, at
28. Other examples of large databases of interest to
the legal profession are computerized research services
such as LEXIS and WESTLAW.
5. Uyehara, at 28; Manning, Bulletin Boards: Everybody's
Online Services, Online, Nov. 1984, at 8,9. "Modem" is
defined infra, note 17 and accompanying text.
6. "...computer bulletin boards offer their users
important benefits. An individual can use a bulletin
board to express his opinion on a matter of public
interest. He may find a review of a product he is
considering buying. He may find a useful piece of
software. An individual might also use the bulletin
board to ask a technical question about a specific
computer program." Note, Computer Bulletin Board
Operator Liability For User Misuse, 54 Fordham L.Rev.
439, 440 (1985) (Authored by Jonathan Gilbert); see
also Lasden, Of Bytes And Bulletin Boards, N.Y.Times,
August 4, 1985, sec. 6, at 34, col. 1, where the author
notes computer users may now use BBSes to voice their
opinions directly to State Senators' offices.
7. "Virus" Hits Nation's Research Computers, San Jose
Mercury News, Nov. 4, 1988, at 1, col. 1.
8. "It is estimated that the theft of long-distance
services and software piracy each approximate $100
million a year; credit card fraud via computers costs
about $200 million annually." Pittman, Computer
Security In Insurance Companies, 85 Best's Rev. - Life-
Health Ins. Edition, Apr. 1985 at 92.
9. Schiffres, The Shadowy World of Computer "Hackers,"
U.S. News & World Report, June 3, 1985, at 58.
10. Pollack, Free Speech Issues Surround Computer Bulletin
Board Use, N.Y. Times, Nov. 12, 1984, note 1, at D4,
col. 6.
---
Defamation Liability of Computerized BBS Operators
& Problems of Proof (C) 1989 John R. Kahn 36
----------------------
11. Note, 54 Fordham L.Rev. 440-441 (1985).
12. Poore and Brockman, 8 Nat'l L.J. 14, (1985).
13. See infra, Topic III, Problems of Proof.
14. The uncertainty revolves around how to define BBSes.
When viewed as analogous to newspapers and other media,
SYSOPS would be responsible for any message posted on
their systems, much as newspaper editors are
responsible for articles appearing in their medium.
Uyehara, 14 Student Lawyer 30 (1986). But when BBSes
are compared to a bulletin board found in a public hall
or supermarket, the liability issue is focused more on
those actually posting the messages rather than on the
board's owner. Id., at 30. This Comment suggests that
BBS SYSOPs be held to a reasonable standard of care
emerging specifically for their endeavors. See infra,
Topic II.
15. Poore and Brockman, 8 Nat'l L.J. 14, (1985). Another
writer has noted that Compuserve now has over 200,000
users making use of nearly 100 diverse databases.
Lasden, Of Bytes And Bulletin Boards, N.Y. Times,
August 4, 1985, sec. 6, at 34, col. 1.
16. Poore and Brockman, 8 Nat'l L.J. 14 (1985).
17. 14 Am Jur. POF 2d Computer-Generated Evidence Sec. 11
(1977).
18. Note, 54 Fordham L.Rev. 439, 446 (1985).
19. Id.
20. See "Account," infra, note 25 and accompanying text.
21. Garfinkel, An Introduction to Computer Security, 33
Prac. Law.41-42 (1987).
22. Id.
23. See infra, notes 25 and 27 and accompanying text.
24. Some more sophisticated operating systems provide
greater access control by (1) recording unauthorized
attempts at entry; (2) recording those attempts and
sending a warning to the perpetrator; and (3) keeping
the perpetrartor off the system permanently until
he/she is reinstated by the computer's security
administrator or SYSOP. Balding, Computer Breaking and
Entering: The Anatomy of Liability, 5 Computer Lawyer,
Jan. 1988, at 6.
---
Defamation Liability of Computerized BBS Operators
& Problems of Proof (C) 1989 John R. Kahn 37
----------------------
25. Garfinkel, An Introduction to Computer Security, 33
Prac. Law. 42 (1987).
26. Id.
27. Id. "A password is a secret word or phrase that should
be known only to the user and the computer. When the
user first attempts to use the computer, he must first
enter the password. The computer then compares the
typed password to the stored password and, if they
match, allows the user access."
28. Id., at 42 and 46.
29. 14 Am. Jur. POF 2d Computer-Generated Evidence Sec. 11
(1977).
30. 54 Fordham L.Rev. 439, note 2 (1985).
31. Restatement (Second) of Torts Sec. 568(1) (1976).
32. Restatement (Second) of Torts Sec. 577(1) (1976).
33. Restatement (Second) of Torts Sec.559 (1976).
34. Veeder, The History and Theory of the Law of
Defamation, 3 Colum. L.Rev. 546, 569-571 (1903).
35. Restatement (Second) of Torts Sec. 622 (1976).
36. Restatement, Torts Sec. 568, comment d (1938).
37. Shor v. Billingley, 4 Misc.2d 857, 158 N.Y.S.2d 476
(Sup. Ct. 1956), aff'd mem., 4 App.Div. 2d 1017, 169
N.Y.S.2d 416 (1st Dep't. 1957).
38. Torts: Defamation: Libel-Slander Distinction:
Extemporaneous Remarks Made on Television Broadcast:
Shor v. Billingley, 4 Misc. 2d 857, 158 N.Y.S.2d 476
(Sup.Ct. N.Y. County 1957), 43 Cornell L.Q. 320, 322
(1957) (Authored by Stephen A. Hochman).
39. Id.
40. 376 U.S. 254, 84 S.Ct. 710, 11 L.Ed.2d 686 (1964),
motion denied 376 U.S. 967, 84 S.Ct. 1130, 12 L.Ed.2d
83.
41. 376 U.S. 254, 273.
42. 376 U.S. 254, 280.
43. 418 U.S. 323, 94 S.Ct. 2997, 41 L.Ed.2d 789 (1974).
---
Defamation Liability of Computerized BBS Operators
& Problems of Proof (C) 1989 John R. Kahn 38
----------------------
44. Gertz v. Robert Welch, Inc., 418 U.S. 323, 326.
45. Id.
46. Id., at 327.
47. "...those who hold governmental office may recover for
injury to reputation only on clear and convincing proof
that the defamatory falsehood was made with knowledge
of its falsity or with reckless disregard for the
truth." Gertz v. Robert Welch, Inc., 418 U.S. 323, 342.
"An individual who decides to seek governmental office
must accept certain necessary consequences of that
involvement in pubic affairs. He runs the risk of
closer public scrutiny than might otherwise be the
case." Id., at 344.
48. "...[A]n individual may attain such pervasive fame and
notoriety that he becomes a public figure for all
purposes and in all contexts. More commonly, an
individual voluntarily injects himself or is drawn into
a particular public controversy and thereby becomes a
public figure for a limited range of issues. In either
case such persons assume special prominence in the
resolution of public questions." 418 U.S. 323, 351.
49. "Even if the foregoing generalities do not obtain in
every circumstance, the communications media are
entitled to act on the assumption that public officials
and public figures have voluntarily exposed themselves
to the increased risk of injury from defamatory
falsehood concerning them. No such assumption is
justified with respect to a private individual. He has
not accepted public office or assumed an 'influential
role in ordering society.' Curtis Publishing Co. v.
Butts, 388 U.S., at 164 ...He has relinquished no part
of his interest in the protection of his own good name,
and consequently he has a more compelling call on the
courts for redress of injury inflicted by the
defamatory falsehood. Thus, private individuals are not
only more vulnerable to injury than public officials
and public figures; they are also more deserving of
recovery." Id., at 345.
50. "...[P]etitioner was not a public figure. He ...
plainly did not thrust himself into the vortex of this
public issue, nor did he engage the public's attention
in an attempt to influence its outcome." Id., at 352.
51. Justice Powell noted for the Court that
"[T]he communications media are entitled to act on
the assumption that public officials and public
figures have voluntarily exposed themselves to
increased risk of injury from defamatory falsehood
---
Defamation Liability of Computerized BBS Operators
& Problems of Proof (C) 1989 John R. Kahn 39
----------------------
concerning them. No such assumption is justified
with respect to a private individual. He has not
accepted public office or assumed an 'influential
role in ordering society....' He has relinquished
no part of his interest in the protection of his
own good name, and consequently he has a more
compelling call on the courts for redress of injury
inflicted be defamatory falsehood. Thus, private
individuals are not only more vulnerable to injury
than public officials and public figures; they are
also more deserving of recovery." Id., at 345.
52. Id., at 347.
53. Keeton, Dobbs, Keeton and Owen, Prosser and Keeton on
Torts, sec. 32, p.174. See also Vaughn v. Menlove, 3
Bing. (N.C.) 467, 132 Eng.Rep. 490 (1837).
54. 111 Cal. App. 2d 424, 244 P.2d 757, 28 ALR2d 451
(1952).
55. 111 Cal. App. 2d 424, 427.
56. Id., at 426.
57. Id, at 427.
58. Restatement (Second) of Torts Sec. 577(2) (1976).
59. 22 Ohio App.2d 141, 259 N.E.2d 160 (1970).
60. Scott v. Hull, 259 N.E.2d 160, 162 (1970).
61. Id., at 161.
62. Id., at 162.
63. 836 F.2d 1042 (7th Cir. 1987).
>From kadie Sat Oct 12 09:54:35 1991
To: cafb-mail
~Subject: Computers and Academic Freedom mailing list (batch edition)
Status: R
Computers and Academic Freedom mailing list (batch edition)
Sat Oct 12 09:54:16 EDT 1991
[For information on how to get a much smaller edited version of the
list, send email to
[email protected]. Include the line:
send acad-freedom caf
- Carl ]
In this issue:
:
The addresses for the list are now:
[email protected] - for contributions to the list
or
[email protected]
[email protected] - for automated additions/deletions
(send email with the line "help" for details.)
[email protected] - for administrivia
-------------------
64. Id., at 1047.
65. The Court of Appeals noted the Restatement view and
observed that Indiana law had neither embraced nor
rejected that approach. Id., at 1046.
66. Id.
67. Id.
68. Id., at 1046-47.
69. Id.
70. Recall that in our hypothetical a third user
---
Defamation Liability of Computerized BBS Operators
& Problems of Proof (C) 1989 John R. Kahn 40
----------------------
masquerading as another is transmitting messages to
others, revealing embarassing and false information.
71. BBS systems security and other preventative measures
are discussed more fully infra, Topic 3.d.
72. Issues in proving the SYSOP's role in publishing the
libellous statement are discussed more fully in Topic
III. A., infra.
73. Sydney v. MacFadden Newspaper Publishing Corp., 242
N.Y. 208, 151 N.E. 209, 44 A.L.R. 1419 (1926). See also
Restatement (Second) of Torts Sec. 621 (1976) ("One who
is liable for a defamatory communication is liable for
the proved, actual harm caused to the reputation of the
person defamed.")
74. Dun & Bradstreet, Inc. v. Greenmoss Builders, Inc., 472
U.S. 749, 86 L.Ed.2d 593, 105 S.Ct. 2939 (1985).
75. See supra, note 53 and accompanying text.
76. Note, Protecting the Subjects of Credit Reports, 80
Yale L.J. 1035, 1051-52, n.88 (1971).
77. Gertz did not rule out an assumption of defendant's
negligence. See Eaton, The American Law of Defamation
Through Gertz V. Robert Welch, Inc., and Beyond: An
Analytical Primer, 61 Va. L.Rev. 1349 (1975).
78. 15 U.S.C.A. Sec. 1681 et seq. (1974). Two standards are
proposed there: the first, willful noncompliance, is
defined as equivalent to the New York Times "actual
malice" standard, and violators are liable for actual
and punitive damages. Sec. 1681(n), supra. Presumably
this would apply to the situation where the SYSOP is
dilatory in removing the libellous message. The second
proposed standard, negligent noncompliance, occurs in
the absence of willfulness and results in liability
only for actual damages. Sec. 1681(o), supra.
Situations where the SYSOP failed to adopt reasonable
computer security measures might come under this
category.
79. 18 U.S.C.S. Sec. 2707(b),(c) (Law. Co-op 1979 & Supp.
1988) provides in pertinent part:
(b) Relief. In a civil action under this section,
appropriate relief includes -
(1) Such preliminary and other equitable or
declaratory relief as may be appropriate;
(2) damages under subsection (c); and
(3) a reasonable attorney's fee and other
litigation costs reasonably incurred.
(c) Damages. The court may assess as damages in a
---
Defamation Liability of Computerized BBS Operators
& Problems of Proof (C) 1989 John R. Kahn 41
----------------------
civil action under this section the sum of the
actual damages suffered by the plaintiff and
any profits made by the violator as a result
of the violation, but in no case shall a
person entitled to recover receive less than
the sum of $1,000.
18 U.S.C.S. Sec. 2707(e) (Law. Co-op 1979 & Supp. 1988)
limits the civil action under this section to two years
after the date upon which the claimant first discovered
or had a reasonable opportunity to discover the
violation.
As to damage provisions supplied by state law, see
California Penal Code 502(e)(1),(2) (West Pub. 1988):
(e)(1) In addition to any civil remedy available,
the owner or lessee of the computer, computer
system, computer network, computer program, or data
may bring a civil action against any person
convicted under this section for compensatory
damages, including any expenditure reasonably and
necessarily incurred by the owner or lessee to
verify that a computer system, computer network,
computer program, or data was not altered, damaged,
or deleted by the access. For purposes of actions
authorized by this subdivision, the conduct of an
unemancipated minor shall be imputed to the parent
or legal guardian having control or custody of the
minor, pursuant to the provisions of Section 1714.1
of the Civil Code.
(2) In any action brought pursuant to this
subdivision the court may award reasonable
attorney's fees to a prevailing party.
80. A lawsuit recently filed in the United States District
Court for the Southern District of Indiana may break
new ground in enunciating precisely what BBS SYSOPs'
reasonable duties of care are. Thompson v. Predaina,
Civil Action #IP-88 93C (S.D. Ind. filed 1988). The
complaint alleges, inter alia, invasion of plaintiff
user's privacy, libel, and wrongful denial of access to
the BBS in violation of U.S.C. Title 18, ss 2701
(a)(2). As to statutory damages available, see infra,
note 105.
81. Gemignani, Computer Law 33:7 (Lawyers Co-op 1985, Supp.
1988) (quoting Capitol PC Users Group Minimum Code of
Standards for electronic Bulletin Board Systems,
reprinted in 4 Computer Law Reptr. 89).
82. Note, 54 Fordham L.Rev. 439, 449 (1985) (Authored by
Jonathan Gilbert).
83. Id., at 449.
84. Id., at 449-50.
---
Defamation Liability of Computerized BBS Operators
& Problems of Proof (C) 1989 John R. Kahn 42
----------------------
85. A "trojan horse" program takes control of the BBS and
allows its sender to access and steal its most
sensitive information. Fites, Johnston and Kratz, The
Computer Virus Crisis, Van Nortrand/Reinhold (1989), at
39 and 45.
86. Balding, Computer Breaking and Entering: The Anatomy of
Liability, 5 Computer Law. (January 1988), at 6.
87. Id.
88. Hellar v. Bianco, 244 P.2d 757. See supra, note 54 and
accompanying text.
89. Restatement (Second) of Torts Sec. 577(2) (1976). See
supra, note 58 and accompanying text.
90. Tackett v. General Motors Corporation, 836 F.2d 1042
(7th Cir. 1987). See supra, note 63 and accompanying
text.
91. See note 53, supra, and accompanying text.
92. It has been suggested that this would be the rough
equivalent of a newspaper publishing a retraction after
discovering what it had printed was defamatory. Note,
54 Fordham L.Rev. 439, note 55 (1985). BBS operators
should not be held liable in this situation insofar as
they did not know of the nature of the statement at the
time it was made. Restatement (Second) of Torts Sec.
581 (1977).
93. Proving the masquerader's actions is discussed more
fully infra, Topic III. B.
94. Stipp, Computer Bulletin Board Operators Fret Over
Liability for Stolen Data, Wall St. J. Nov. 9, 1984, at
33, col. 1.
95. Id.
96. See Topic I., supra, where the masquerader has
discovered and uses the password and name of the
regular user; he appears for all intents and purposes
to be that regular user.
97. 836 F.2d 1042 (7th Cir. 1987).
98. Id., at 1047.
99. Id.
100. Indeed, U.S.C. Title 18, Sec. 2702 (Law. Co-op 1979 &
---
Defamation Liability of Computerized BBS Operators
& Problems of Proof (C) 1989 John R. Kahn 43
----------------------
Supp. 1988) proscribes the knowing dissemination of an
electronically stored communication by the SYSOP:
Sec. 2702. Disclosure of contents
(a) Prohibitions. Except as provided in subsection
(b)-
(1) a person or entity providing an
electronic communication service to the
public shall not knowingly divulge to any
person or entity the contents of a
communication while in electronic storage
on that service; and
(2) a person or entity providing remote
computing service to the public shall not
knowingly divulge to any person or entity
the contents of any communication which
is carried or maintained on that service-
(A) on behalf of, and received by means
of electronic transmission from (or
created by means of computer
processing of communications
received by means of electronic
transmissions from), a subscriber or
customer of such service; and
(B) solely for the purpose of providing
storage or computer processing
services to such subscriber or
customer, if the provider is not
authorized to access the contents of
any such communications for purposes
of providing any services other than
storage or computer processing.
A similar provision is embodied in Cal. Pen. Code sec.
502(c)(6) (West Pub. 1988), which provides:
(c) Except as provided in subdivision (i),
any person who commits any of the
following acts is guilty of a public
offense:
(6) Knowingly and without permission
provides or assists in providing a
means of accessing a computer,
computer system, or computer network
in violation of this section.
101. The doctrine of res ipsa loquitor, or "the thing speaks
for itself" warrants the inference of the SYSOP's
negligence, which the jury may draw or not as its
judgement dictates. See Sullivan v. Crabtree, 36
Tenn.App. 469, 258 S.W.2d 782 (1953).
102. See discussion under Topic II. B., supra.
103. As someone who intentionally accesses confidential
password information to masquerade as other users on
other BBSes, the masquerader falls well within the pale
---
Defamation Liability of Computerized BBS Operators
& Problems of Proof (C) 1989 John R. Kahn 44
----------------------
of "actual malice" defined in Gertz v. Robert Welch,
Inc., 418 U.S. 323, 342, supra, note 43 and
accompanying text (a defamatory falsehood was made with
knowledge of its falsity or with reckless disregard for
the truth).
104. Evidentiary problems involved with proving the
masquerader's actions are discussed more in Topic III.
B., infra.
105. 18 U.S.C.S. Sec. 2707(a) (Law. Co-op 1979 & Supp. 1988)
describes the masquerader's fault thus:
(a) Cause of action. Except as provided in section
2703(e), any provider of electronic
communication service, subscriber, or customer
aggrieved by any violation of this chapter in
which the conduct constituting the violation
is engaged in with a knowing or intentional
state of mind may, in a civil action, recover
from the person or entity which engaged in
that violation such relief as may be
appropriate.
California Penal Code sec. 502(c) et seq. (West Pub.
1988) is even more specific:
(c) Except as provided in subdivision (i), any
person who commits any of the following acts
is guilty of a public offense:
(1) Knowingly accesses and without permission
alters, damages, deletes, destroys, or
otherwise uses any data, computer,
computer system, or computer network in
order to either
(A) devise or execute any scheme or
artiface to defraud, deceive, or
extort, or
(B) wrongfully control or obtain money,
property or data.
* * *
(3) Knowingly and without permission uses or
causes to be used computer services.
(4) Knowingly accesses and without permission
adds, alters, damages, deletes, or
destroys any data, computer software, or
computer programs which reside or exist
internal or external to a computer,
computer system, or computer network.
* * *
(7) Knowingly and without permission accesses
or causes to be accessed any computer,
computer system, or computer network.
106. Gertz v. Robert Welch, Inc., 418 U.S. 323, 342.
107. In addition to the remedies set forth in note 105,
---
Defamation Liability of Computerized BBS Operators
& Problems of Proof (C) 1989 John R. Kahn 45
----------------------
supra, the following federal and state penalties may
apply:
18 U.S.C.S. Sec. 2701(b),(c) (Law. Co-op 1979 & Supp.
1988):
(b) Punishment. The punishment for an offense
under subsection (a) of this seciton is -
(1) if the offense is committed for purposes
of commercial advantage, malicious
destruction or damage, or private
commercial gain -
(A) a fine not more than &250,000 or
imprisonment for not more than one
year, or both, in the case of a
first offense under this
subparagraph; and
(B) a fine under this title or
imprisonment for not more than two
years, or both, for any subsequent
offense under this subparagraph; and
(2) a fine of not more than $5,000 or
imprisonment for not more than six
months, or both, in any other case.
(c) Exceptions. Subsection (a) of this section
does not apply with respect to conduct
authorized-
(1) by the person or entity providing a wire
or electronic communications service;
(2) by a user of that service with respect to
a communication of or intended for that
user; or
(3) in section 2703, 2704, or 2518 of this
title.
For an example of state-mandated damages provisions on
this subject, see California Penal Code sec. 502(d) et
seq. (West Pub. 1988).
108. See discussion under Topic II. B., supra.
109. See note 101, supra.
110. "Custom...bears upon what other will expect the actor
to do, and what, therefore, reasonable care may require
the actor to do, upon the feasibility of taking
precautions, the difficulty of change, and the actor's
opportunity to learn the risks and what is called for
to meet them. If the actor does only what everyone else
has done, there is at least an inference that the actor
is conforming to the community's idea of reasonable
behavior." Keeton, Dobbs, Keeton and Owen, Prosser and
Keeton on Torts, sec. 33, p.194. See also James,
Particularizing Standards of Conduct in Negligence
Trials, 5 Vand. L. Rev. 697, 709-714 (1952); Ploetz v.
Big Discount Panel Center, Inc., 402 So.2d 64 (Fla.
App. 1981).
---
Defamation Liability of Computerized BBS Operators
& Problems of Proof (C) 1989 John R. Kahn 46
----------------------
111. See notes 80-93, supra, and accompanying text.
112. See note 103, supra.
113. See Pfau and Keane, Computer Logs Can Pinpoint Illegal
Transactions, Legal Times of Washington, vol. 6, p.16
(May 14, 1984): "Computers can monitor their own use.
Unlike other such forms of physical evidence such as
guns, computers can keep track of individual users and
other identifying data. Imagine a gun that logs every
instance it is fired or even handled, and shows the
date, time, and activity. Recovery of such a weapon
would be essential to the prosecution.
"Most computers have long had built-in logging
capabilities....The log function was designed to
facilitate billing for the use of computer resources
rather than to assist crime detection. To the extent
that the owner of a smaller computer does not charge
for its use, he or she has no incentive to purchase a
self-executing log. Still, such logs keep surprisingly
accurate records of who is using the computer."
114. Fed. R. Evid. 801(c).
115. Fed. R. Evid. 802: "Hearsay is not admissible except as
provided by these rules or by other rules precribed by
the Supreme Court pursuant to statutory authority or by
Act of Congress." Exclusion of hearsay evidence is
grounded on: (1) nonavailability of the declarant for
cross-examination and observance of demeanor; (2)
absence of an oath by the person making the statement;
amd (3) significant risk that the person that the
witness may report proffered statements inaccurately. 2
Bender, Computer Law, sec. 6.01[2].
116. Gemignani, The Data Detectives: Building A Case From
Computer Files, 3 Nat'l L.J. 29 (1981).
117. Fed. R. Evid. 803(6). See also 2 Bender, Computer Law,
sec. 6.01[4] (1988).
118. Fed. R. Evid. 803(6).
119. Id. In current practice records kept by nonprofit
organizations, such as churches, have long been held to
be admissible. Ford v. State, 82 Tex.Cr.R. 638, 200
S.W. 841 (1918). It is at least arguable that a
computerized BBS, although run as a hobby, falls under
the same classification.
120. See Iowa Code Ann. Sec. 622.28; People v. Lugashi, 252
Cal.Rptr 434 (Cal.App. 2 Dist. 1988).
---
Defamation Liability of Computerized BBS Operators
& Problems of Proof (C) 1989 John R. Kahn 47
----------------------
121. See 14 Am.Jur. POF2d Sec. 15 (1977, Supp. 1988). Cf.
United States v. De Georgia, 420 F.2d 889, 2 CLSR 479,
484 (1969, CA9 Ariz), where it was held that it is
immaterial whether a business record is maintained in a
computer rather than in company books regarding
admissibility of those records, so long as (1) the
trial court requires the proponent of the computerized
records to lay a foundation as to their
trustworthiness, and (2) the opposing party is given
the same opportunity to inquire into the computer's
accuracy as he would have to inquire into the accuracy
of written business records.
122. The BBS program run on the SYSOP's computer ordinarily
"stamps" the date and time of day each user logs onto
the BBS. A corresponding record is automatically
affixed to each piece of electronic mail posted so that
the reader knows when it was added to the database.
Similarly, the telephone company maintains copious
records of the date and time each phone call is
connected in its dialing area. The caller has no
control over either of these processes.
123. 252 Cal.Rptr. 434 (Cal.App. 2 Dist. 1988).
124. Id., at 437.
125. Id.
126. Id.
127. Id., at 439.
128. Id., at 437.
129. Id., at 440.
130. Id., at 442. See also United States v. Russo, 480 F.2d
1228 (CA6 Mich, 1973), cert den 414 U.S. 1157, 94 S.Ct.
915, 39 L.Ed.2d 109; Capital Marine Supply, Inc. v. M/V
Roland Thomas II, 719 F.2d 104 (1983 CA5 La), 104 Fed
Rules Evid Serv 731; Peoples Cas & Coke Co. v. Barrett,
118 Ill.App.3d 52, 73 Ill. Dec. 400, 455 N.E.2d 829
(1983).
131. 432 So.2d 837 (La., 1983).
132. Id., at 839-40.
133. Id., at 839.
134. United States v. Verlin, 466 F.Supp. 155 (ND Tex,
1979).
---
Defamation Liability of Computerized BBS Operators
& Problems of Proof (C) 1989 John R. Kahn 48
----------------------
135. Id., at 158.
136. The reasonable SYSOP should offer his full cooperation
in aiding the maligned user to regain her good name by
providing her with his BBS' phone-in records made at
the time the libellous message appeared. See note 93,
supra.
137. See note 123, supra.
138. Cf. note 118, supra. As to an electronic BBS being
classified as a "business" for hearsay purposes, see
note 120, supra.
139. See note 128, supra.
140. Authentication has been broadly described thus: "[W]hen
a claim or offer involves impliedly or expressly any
element of personal connection with a corporeal object,
that connection must be made to appear...." Wigmore,
Evidence, Sec. 2129 at 564 (2d ed. 1972). This
requirement is also known as the "Best Evidence Rule."
141. Fed. R. Evid. 901(a),(b)(6).
142. 2 Bender, Computer Law, sec. 5.03[1][a] (1988).
143. Id.
144. See Fed. R. Evid. 901(b)(6): "(6) Telephone
conversations. Telephone conversations, by evidence
that a call was made to the number assigned at the time
by the telephone company to a particular person or
business, if *** (B) in the case of a business, the
call was made to a place of business and the
conversation related to business reasonably transacted
over the telephone...." (emphasis added).
145. Fed. R. Evid. 1002.
146. E.W. Cleary, McCormick on Evidence, sec. 231 (2nd. Ed.
1972).
147. Id. Further rationales for the rule are risks of
inaccuracy contained in commonly used copying
techniques and heightened chances of witness'
forgetfulness through oral testimony. Id., sec. 231.
148. 305 So.2d 421, 7 C.L.S.R. 1238 (La. 1974).
149. 305 So.2d 421, 427.
150. Id., at 428.
---
Defamation Liability of Computerized BBS Operators
& Problems of Proof (C) 1989 John R. Kahn 49
----------------------
151. Brandon v. Indiana, 396 N.E.2d 365 (Ind. 1979).
152. Id., at 370.
153. See note 121, supra, and accompanying text.
154. Other circumstantial evidence might include, among
other things: possible motive for the masquerader to
defame plaintiff; plaintiff's own inability to call
from the phone number from which the defamatory message
is shown to have originated; or even an electronic
"fingerprint" left by the particular computer from
which the defamatory message originated. Pfau and
Keane, Computer Logs Can Pinpoint Illegal Trasactions,
Legal Times of Washington, vol. 6, p.16 (May 14, 1984).
155. Fed. R. Evid. 1002 provides:
REQUIREMENT OF ORIGINAL. To prove the content of
a writing, recording, or photograph, the original
of that writing, recording or photograph is
required, unless provided otherwise in these
rules or by an Act of Congress.
156. Examples of this situation are the telephone company's
keeping of hundreds of thousands of individual
computerized records of each telephone call made within
a certain dialing area, or a BBS' extensive history of
subscriber use compiled for billing purposes.
157. See Harned v. Credit Bureau of Gilette, 513 P2d 650, 5
CLSR 394 (1973).
158. Fed. R. Evid. 1006.
159. 137 Ga.App. 360, 223 S.E.2d 757 (1976).
160. 223 S.E.2d 757, 760.
[Originally published in _Internet_World_, Jan./Feb. 1994.]
When Copying Isn't Theft:
How the Government Stumbled in a "Hacker" Case
By Mike Godwin
As more and more private individuals and private companies connect to the
Internet, more and more of them will generate or use their intellectual
property there. And since not everyone is familiar with the legal
distinctions between so-called "intellectual property" and everyday
tangible property, there will be more and more discussion of how
infringement of intellectual property amounts to "online theft."
But the law of intellectual property is not so simple as Usenet
discussions may lead you to believe. Assuming that your information is
"property" (when in fact it may not be property at all) may lead you to a
false sense of security about how much the law protects your interest in
that information. This article discusses one computer-crime case, United
States v. Riggs, that illustrates how even well-trained federal
prosecutors can grow confused about how to apply intellectual-property
law--especially the law of trade secrets. In particular, it shows what can
happen when prosecutors uncritically apply *intellectual* property notions
in prosecuting a defendant under laws passed to protect *tangible*
property.
Big Phrack Attack
In the recent case of U.S. v. Riggs, the Chicago U.S. Attorney's office
prosecuted two young men, Robert Riggs and Craig Neidorf, on counts of
wire fraud (18 U.S.C. 1343), interstate transportation of stolen property
(18 U.S.C. 2314) and computer fraud (18 U.S.C. 1030). Of these statutes,
only the last was passed specifically to address the problems of
unauthorized computer intrusion; the other two are "general purpose"
federal criminal statutes that are used by the government in a wide range
of criminal prosecutions. One element of the wire-fraud statute is the
taking (by fraudulent means) of "money or property," while the
interstate-transportation-of-stolen-property (ITSP) statute requires,
naturally enough, the element of "goods, wares, merchandise, securities or
money, of the value of $5,000 or more."
(I don't discuss here the extent to which the notions of "property" differ
between these two federal statutes. It is certain that they do differ to
some extent, and the interests protected by the wire-fraud statute were
expanded in the 1980s by Congress to include Rthe intangible right to
honest services.S 18 U.S.C. 1346.. Even so, the prosectuion in the Riggs
case relies not on 1346, but on intellectual-property notions, which are
the focus of this article.)
The computer-intrusion counts against Neidorf were dropped in the
governmentUs June 1990 superseding indictment, the indictment actually
used at NeidorfUs trial in July 1990. Probably this was due to the
government's realization that it would be hard to prove beyond a
reasonable doubt that Neidorf had any direct involvement with any actual
computer breakin.
The Riggs case is based on the following facts: Robert Riggs, a computer
"hacker" in his early '20s, discovered that he could easily gain access to
an account on a computer belonging to Bell South, one of the Regional Bell
Operating Companies (RBOCs). The account was highly insecure--access to
it did not require a password (a standard, if not always effective,
security precaution). While exploring this account, Riggs discovered a
word-processing document detailing procedures and definitions of terms
relating the Emergency 911 system ("E911 system"). Like many hackers,
Riggs had a deep curiosity about the workings of this country's telephone
system. (This curiosity among young hackers is a social phenomenon that
has been documented for more than 20 years. See, e.g., Rosenbaum, "Secrets
of the Little Blue Box," Esquire, October 1971; and Barlow, "Crime and
Puzzlement: In Advance of the Law on the Electronic Frontier," Whole Earth
Review, September 1990.)
Riggs knew that his discovery would be of interest to Craig Neidorf, a
Missouri college student who, while not a hacker himself, was an amateur
journalist whose electronically distributed publication, Phrack, was
devoted to articles of interest to computer hackers. Riggs sent a copy of
the E911 document to Neidorf over the telephone, using computer and modem,
and Neidorf edited the copy to conceal its origin. Among other things,
Neidorf removed the statements that the information contained in the
document was proprietary and not for distribution. Neidorf then sent the
edited copy back to Riggs for the latter's review; following RiggsUs
approval of the edited copy, Neidorf published the E911 document in the
February 24, 1989, issue of Phrack. Some months following publication of
the document in Phrack, both Riggs and Neidorf were contacted and
questioned by the Secret Service, and all systems that might contain the
E911 document were seized pursuant to evidentiary search warrants.
Riggs and Neidorf were indicted under the statutes discussed above; Riggs,
whose unauthorized access to the BellSouth computer was difficult to
dispute, later pled guilty to wire fraud for that conduct. In contrast,
Neidorf pled innocent on all counts, arguing, among other things, that his
conduct was protected by the First Amendment, and that he had not deprived
Bell South of property as that notion is defined for the purposes of the
wire fraud and ITSP statutes.
The two defenses are closely related. Under the First Amendment, the
presumption is that information is free, and that it can readily be
published and republished. For this reason, information "becomes
property" only if it passes certain legal tests. This means that law
enforcement cannot simply assume that whenever information has been copied
from a private computer system a theft has taken place.
But in Neidorf's case, as it turns out, this is essentially what the
Secret Service and the U.S. Attorney's office did assume. And this
assumption came back to haunt the government when it was revealed during
trial that the information contained within the E911 document did not meet
any of the relevant legal tests to be established as a property interest.
How information becomes stealable property.
In order for information to be stolen property, it must first be property.
There are only a few ways that information can qualify as a property
interest, and two of these--patent law and copyright law--are entirely
creations of federal statute, pursuant to an express Constitutional grant
of legislative authority. (U.S. Constitution, Article I, Sec. 8, clause
8.) Patent protections were clearly inapplicable in the Neidorf case; the
E911 document, a list of definitions and procedures, did not constitute an
invention or otherwise patentable process or method. Copyright law might
have looked more promising to Neidorf's prosecutors, since it is well
established that copyrights qualify as property interests in some contexts
(for example, your uncle's copyright interest in his novel can be
bequeathed to you as "personal property" through a will).
Unfortunately for the government, the Supreme Court has explicitly stated
that copyrighted material is not property for the purposes of the ITSP
statute. In Dowling v. United States, 473 U.S. 207 (1985), the Court held
that interests in copyright are outside the scope of the ITSP statute.
(Dowling involved a prosecution for interstate shipments of pirated Elvis
Presley recordings.) In reaching its decision, the Court held, among
other things, that 18 U.S.C. ' 2314 contemplates "a physical identity
between the items unlawfully obtained and those eventually transported,
and hence some prior physical taking of the subject goods." Unauthorized
copies of copyrighted material do not meet this "physical identity"
requirement.
The Court also reasoned that intellectual property is different in
character from property protected by generic theft statutes: "The
copyright owner, however, holds no ordinary chattel. A copyright, like
other intellectual property, comprises a series of carefully defined and
carefully delimited interests to which the law affords correspondingly
exact protections." The Court went on to note that a special term of art,
"infringement," is used in reference to violations of copyright
interests--thus undercutting any easy equation between unauthorized
copying and "stealing" or "theft."
It is clear, then, that in order for the government to prosecute the
unauthorized copying of computerized information as a theft, it must rely
on other theories of information-as-property. Trade-secret law is one
well-established legal theory of this sort. Another is the
breach-of-confidence theory articulated recently by the Supreme Court in
Carpenter v. United States, 108 S.Ct. 316 (1987). I will discuss each
theory in turn below.
Trade Secrets
Unlike copyrights and patents, trade secrets are generally created by
state law, and most jurisdictions have laws that criminalize the
violations of a trade-secret holder's rights in the secret. There is no
general federal definition of what a trade secret is, but there have been
federal cases in which trade-secret information has been used to establish
the property element of a federal property crime. In the 1966 case of
United States v. Bottone (365 F.2d 389, cert denied, 385 U.S. 974 (1966)),
for example, the Second Circuit Court of Appeals affirmed ITSP convictions
in a case involving a conspiracy to steal drug-manufacturing bacterial
cultures and related documents from a pharmaceutical company and sell them
in foreign markets.
But the problem in using a trade secret to establish the property element
of a theft crime is that, unlike traditional property, information has to
leap several hurdles in order to be established as a trade secret.
Trade secret definitions vary somewhat from state to state, but the
varying definitions typically have most elements in common. One good
definition of "trade secret" is outlined by the Supreme Court in Kewanee
Oil Co. v. Bicron Corp., 416 U.S. 470 (1974): "a trade secret may consist
of any forumula, pattern, device or compilation of information which is
used in one's business, and which gives one an opportunity to obtain an
advantage over competitors who do not know or use it. It may be a formula
for a chemical compound, a process of manufacturing, treating or
preserving materials, a pattern for a machine or other device, or a list
of customers." The Court went further and listed the particular
attributes of a trade secret:
* The information must, in fact, be secret--"not of public knowledge or of
general knowledge in the trade or business."
* A trade secret remains a secret if it is revealed in confidence to
someone who is under a contractual or fiduciary obligation, express or
implied, not to reveal it.
* A trade secret is protected against those who acquire via unauthorized
disclosure, violation of contractual duty of confidentiality, or through
"improper means." ("Improper means" includes such things as theft,
bribery, burglary, or trespass. The Restatement of Torts at 757 defines
such means as follows: "In general they are means which fall below the
generally accepted standards of commercial morality and reasonable
conduct.")
* A court will allow a trade secret to be used by someone who discovered
or developed the trade secret independently (that is, without taking it in
some way from the holder), or if the holder does not take adequate
precautions to protect the secret.
* An employee or contractor who, while working for a company, develops or
discovers a trade secret, generally creates trade secret rights in the
company.
The holder of a trade secret may take a number of steps to meet its
obligation to keep the trade secret a secret. These may include:
a) Labelling documents containing the trade secret "proprietary" or
"confidential" or "trade secret" or "not for distribution to the public;"
b) Requiring employees and contractors to sign agreements not to disclose
whatever trade secrets they come in contact with;
c) destroying or rendering illegible discarded documents containing parts
or all of the secret, and;
d) restricting access to areas in the company where a nonemployee, or an
employee without a clear obligation to keep the information secret, might
encounter the secret. (See Dan Greenwood's Information Protection Advisor,
April 1992, page 5.)
Breach-of-confidence
Even if information is not protected under the federal patent and
copyright schemes, or under state-law trade-secret provisions, it is
possible, according to the Supreme Court in Carpenter v. United States,
for such information to give rise to a property interest when its
unauthorized disclosure occurs via the breach of confidential or fiduciary
relationship. In this case, R. Foster Winans, a Wall Street Journal
reporter who contributed to the Journal's "Heard on the Street" column,
conspired with Carpenter and others to reveal the contents of the column
before it was printed in the Journal, thus allowing the conspirators to
buy and sell stock with the foreknowledge that stock prices would be
affected by publication of the column. Winans and others were convicted
of wire fraud; they appealed the wire-fraud convictions on the grounds
that had not deprived the Journal of any money or property.
It should be noted that this is not an "insider trading" case, since
Winans was no corporate insider, nor was it alleged that he had received
illegal insider tips. The "Heard on the Street" column published
information about companies and stocks that would be available to anyone
who did the requisite research into publicly available materials. Since
the information reported in the columns did not itself belong to the
Journal, and since the Journal planned to publish the information for a
general readership, traditional trade secret notions did not apply. Where
was the property interest necessary for a wire-fraud conviction?
The Supreme Court reasoned that although the facts being reported in the
column were not exclusive to the Journal, the Journal's right--presumably
based in contract--to Winan's keeping the information confidential gave
rise to a property interest adequate to support a wire-fraud conviction.
Once the Court reached this conclusion, upholding the convictions of the
other defendants followed: even if one does not have a direct fiduciary
duty to protect a trade secret or confidential information, one can become
civilly or criminally liable if one conspires with, solicits, or aids and
abets a fiduciary to disclose such information in violation of that
person's duty. The Court's decision in Carpenter has received significant
criticism in the academic community for its expansion of the contours of
"intangible property," but it remains good law today.
How the theories didn't fit
With these two legal approaches--trade secrets and breach of
confidence--in mind, we can turn back to the facts of the Riggs case and
see how well, or how poorly, the theories applied in the case of Craig
Neidorf.
With regard to any trade-secret theory, it is worth noting first of all
that the alleged victim, BellSouth, is a Regional Bell Operating
Company--a monopoly telephone-service provider for a geographic region in
the United States. Remember the comment in the Kewanee Oil case that a
trade secret "gives one an opportunity to obtain an advantage over
competitors who do not know or use it"? There are strong arguments
that--at least so far as the provision of Emergency 911 service
goes--BellSouth has no "competitors" within any normal meaning of the
term. And even if BellSouth did have competitors, it is likely that they
would both know and use the E911 information, since the specifications of
this particular phone service are standardized among the regional Bells.
Moreover, as became clear in the course of the Neidorf trial, the
information contained in the E911 document was available to the general
public as well, for a nominal fee. (One of the dramatic developments at
trial occurred during the cross-examination of a BellSouth witness who had
testified that the E911 document was worth nearly $80,000. Neidorf's
counsel showed her a publication containing substantially the same
information that was available from a regional Bell or from Bellcore, the
Bells' research arm, for $13.to any member of the public that ordered it
over an 800 number.) Under the circumstances, if the Bells wanted to
maintain the E911 information as a trade secret, they hadn't taken the
kind of steps one might normally think a keeper of a secret would take.
BellSouth had, however, taken the step of labelling the E911 document as
"NOT TO BE DISCLOSED OUTSIDE OF BELLSOUTH OR ITS SUBSIDIARIES" (it was
this kind of labelling that Neidorf attempted to remove as he edited the
document for publication in Phrack). This fact may have been responsible
for the federal prosecutors' oversight in not determining prior to trial
whethe E911 document actually met the tests of trade-secret law. It is
possible that prosecutors, unfamiliar with the nuances of trade-secret
law, read the "proprietary" warnings and, reasonining backwards, concluded
that the information thus labelled must be trade-secret information. If
so, this was a fatal error on the government's part. In the face of
strong evidence that the E911 document was neither secret nor
competitively or financially very valuable, any hope the government had of
proving the document to be a trade secret evaporated.
(It's also possible that the government reasoned that the E911 information
could be used by malicious hackers to damage the telephone system in some
way. The trial transcript shows instances in which the government
attempted to elicit information of this sort. It should be noted, however,
that even if the information did lend itself to abuse and vandalism, this
fact alone does not bring it within the scope of trade-secret law.)
Nor did the facts lend themselves to a Carpenter-like theory based on
breach of confidence; Neidorf had no duties to BellSouth not to disclose
its information. Neither did Riggs, from whom Neidorf acquired a copy of
the document. The Riggs case lacks the linchpin necessary for a
conviction based on Carpenter--in order for nonfiduciaries to be
convicted, there must be a breaching fiduciary involved in the scheme in
some way. There can be no breach of a duty of confidence when there is no
duty to be breached.
Thus, when its trade-secret theory of the E911 document was demolished in
mid-trial, the government had no fall-back theory to rely on with regard
to its property-crime counts, and the prosecution quickly sought a
settlement on terms favorable to Neidorf, dropping prosecution of the case
in return for Neidorf's agreement to a pre-trial diversion on one minor
count.
The lesson to be learned from Riggs is that it is no easy task to
establish the elements of a theft crime when the "property" in question is
information. There are good reasons, in a free society, that this should
be so--the proper functioning of free speech and a free press require that
information be presumptively free, and that the publication of information
be presumptively protected from regulation by the government or by private
entities invoking the civil- or criminal-law property protections. The
government in Riggs failed in its duty to recognize this presumption by
failing to make the necessary effort to understand the intellectual
property issues of the case. Had it done so, Neidorf might have been
spared an expensive and painful trial, and the government might have been
spared a black eye.*
*See, e.g., "Score One for the Hackers of America," NEWSWEEK, Aug. 6 1990,
page 48, and "Dial 1-800 ... for BellSouth 'Secrets'," COMPUTERWORLD, Aug.
6, 1990, page 8.
_______________________________________________
Mike Godwin, a 1990 guaduate of the University fo Texas School of Law, is
legal services counsel for the Electronic Frontier Foundation. EFF filed
an amicus curiae brief in the Neidorf case, arguing that Neidorf's
attempted publication of the E911 document was protected speech under the
First Amendment. Godwin received a B.A. in liberal arts from the
University of Texas at Austin in 1980. Prior to law school, Godwin worked
as a journalist and as a computer consultant.
AL Computer Crime Act, Code of Alabama, Sections 13A-8-100 to 13A-8-103
AK Statutes, Sections 11.46.200(a)(3), 11.46.484(a)(5),
11.46.740, 11.46.985, 11.46.990
AZ Revised Statues Annotated, Sections 13-2301(E), 13-2316
CA Penal Code, Section 502
CO Revised Statutes, Sections 18-5.5-101, 18-5.5-102
CT General Statutes, Sections 53a-250 to 53a-261, 52-570b
DE Code Annotated, Title 11, Sections 931-938
FL Computer Crimes Act, Florida Statutes Annotated, Sections
815.01 to 815.07
GA Computer Systems Protection Act, Georgia Codes Annotated, Sections
16-9-90 to 16-9-95
HI Revised Statutes, Sections 708-890 to 780-896
ID Code, Title 18, Chapter 22, Sections 18-2201, 18-2202
IL Annotated Statutes (Criminal Code), Sections 15-1, 16-9
IN Code, Sections 35-43-1-4, 35-43-2-3
IO Statutes, Sections 716A.1 to 716A.16
KS Statutes Annotated, Section 21-3755
KY Revised Statutes, Sections 434.840 to 434.860
LA Revised Statutes, Title 14, Subpart D. Computer Related Crimes,
Sections 73.1 to 73.5
ME Revised Statutes Annotated, Chapter 15, Title 17-A, Section 357
MD Annotated Code, Article 27, Sections 45A and 146
MA General Laws, Chapter 266, Section 30
MI Statutes Annottated, Section 28.529(1)-(7)
MN Statutes (Criminal Code), Sections 609.87 to 609.89
MI Code Annotated, Sections 97-45-1 to 97-45-13
MS Revised Statutes, Sections 569.093 to 569.099
MT Code Annotated, Sections 45-2-101, 45-6-310, 45-6-311
NE Revised Statutes, Article 13(p) Computers, Sections 28-1343 to 28-1348
NV Revised Statutes, Sections 205.473 to 205.477
NH Revised Statutes Annotated, Sections 638:16 to 638:19
NJ Statutes, Title 2C, Chapter 20, Sections 2C:20-1, 2C:20-23 to 2C:20-34,
and Title 2A, Sections 2A:38A-1 to 2A:38A-3
NM Statutes Annotated, Criminal Offenses, Computer Crimes Act, Sections
30-16A-1 to 30-16A-4
NY Penal Law, Sections 155.00, 156.00 to 156.50, 165.15 subdiv. 10,
170.00, 175.00
NC General Statutes, Sections 14-453 to 14-457
ND Century Code, Sections 12.1-06.1-01 subsection 3, 12.1-06.1-08
OH Revised Code Annotated, Sections 2901.01, 2913.01, 2913.04, 2913.81
OK Computer Crimes Act, Oklahoma Session Laws, Title 21, Sections
1951-1956
OR Revised Statutes, Sections 164.125, 164.377
PA Consolidated Statutes Annotated, Section 3933
RI General Laws (Criminal Offenses), Sections 11-52-1 to 11-52-5
SC Code of Laws, Sections 16-16-10 to 16-16-40
SD Codified Laws, Sections 43-43B-1 to 43-43B-8
TN Code Annotated, Computer Crimes Act, Sections 39-3-1401 to 39-3-1406
TX Codes Annotated, Title 7, Chapter 33, Sections 33.01 to 33.05
UT Computer Fraud Act, Utah Code Annotated, Sections 76-6-701 to 76-6-704
VA Computer Crime Act, Code of Virginia, Sections 18.2-152.1 to
18.2-152.14
WA Revised Code Annotated, Sections 9A.48.100, 9A.52.010, 9A.52.110 to
9A.52.130
WI Statutes Annotated, Section 943.70
WY Statutes, Sections 6-3-501 to 6-3-505
-- cut --
--
Brendan Kehoe - Widener Sun Network Manager -
[email protected]
Widener University in Chester PA A Bloody Sun-vs-Dec War Zone
"Well you can't expect to wield supreme executive power cause some
some watery tart threw a sword at you!" - Barbara Bush to Dan Quayle
-----------------------------------------------------------------
The Public-Access Computer Systems Review 2, no. 1 (1991):
164-170.
-----------------------------------------------------------------
-----------------------------------------------------------------
Recursive Reviews
-----------------------------------------------------------------
Copyright, Digital Media, and Libraries
by Martin Halbert
Running a branch library devoted to computational materials, I am
frequently amazed at patrons' lack of understanding of copyright
issues. One patron, an otherwise very intelligent research
scientist, was baffled concerning the restrictions inherent in
checking software out of the library. The magnitude of his
misunderstanding came home to me when he asked if our
restrictions meant that he didn't need to bring his own disks to
copy the software onto. He thought, in all honesty, I finally
realized, that copying the software was what checking out
software was all about. After a very long discussion with him
about copyright and why it is illegal to copy software, he went
away somewhat shocked, but at least informed.
While most librarians have a better understanding of the concept
of copyright than my patron, how many of us have really thought
about all the ramifications of copyright and new digital media
technologies? Librarians are ostensibly supposed to be experts
on the proper use of the collections of information they
administer. This month's column is devoted to a brief
bibliography on the subject of copyright and digital media. I
know that I had never considered many of the issues raised in the
sources reviewed below, so I think they will be of interest to
all librarians who have added any kind of digital media (e.g.,
software and CD-ROM databases) to their collections.
+ Page 165 +
-----------------------------------------------------------------
U.S. Congress, Office of Technology Assessment. Intellectual
Property Rights in an Age of Electronics and Information.
Washington, D.C.: U.S. Government Printing Office, April 1986.
OTA-CIT-302.
-----------------------------------------------------------------
This 1986 report by the Office of Technology Assessment is the
best existing review and discussion of how new technological
developments have impacted the concept of intellectual property
in the United States. Many discussions of the topic begin with a
review of this source (see below), which is justifiable
considering its quality. The 300-page report concisely covers
the conceptual framework and goals of intellectual property
rights, how current laws have tried to accommodate technological
change, enforcement issues, and the role of the federal
government as a regulator. The conclusion of the report is that
the new technologies, especially functional works like software,
have rendered the existing concepts and implementations of
domestic intellectual property law obsolete. An entirely new
approach to the issue of what constitutes intellectual property
and how to regulate it will have to be developed by congress.
The OTA report raises profoundly troubling issues for librarians
and the entire information industry.
-----------------------------------------------------------------
U.S. Congress, Office of Technology Assessment. Computer
Software and Intellectual Property--Background Paper.
Washington, D.C.: U.S. Government Printing Office, March 1990.
OTA-BP-CIT-61
-----------------------------------------------------------------
Drawing on the 1986 OTA report and others, this OTA background
paper further analyzes software issues. It goes into greater
detail concerning questions peculiar to software, such as
addressing the following questions. Can an interface be
copyrighted? Can the concept of an algorithm be unambiguously
defined? Patented? Is a neural net to be considered a software
system or a hardware system? The paper includes a few
developments which happened after the 1986 OTA report, but
fundamentally the paper only raises questions and provides a
context for discussing the problem. Real answers may be a long
way off.
+ Page 166 +
----------------------------------------------------------------
Duggan, Mary Kay. "Copyright of Electronic Information: Issues
and Questions." Online 15, no. 3 (May 1991): 20-26. (ISSN
0146-5422)
----------------------------------------------------------------
Because developments in the law have lagged so far behind
technological developments, many issues of copyright and digital
media are being resolved in practice, if not in legal fact.
Duggan discusses emerging views about what constitutes "fair use"
of electronic information sources. She concludes that while some
consensus is developing about use of search results from CD-ROM
and dial-up databases, little agreement has yet been reached
about LAN and WAN access to databases and other network
information sources.
----------------------------------------------------------------
Garret, John R. "Text to Screen Revisited: Copyright in the
Electronic Age." Online 15, no. 2 (March 1991): 22-24. (ISSN
0146-5422)
----------------------------------------------------------------
John Garret is the director of market development at the
Copyright Clearance Center. Taking a very different view from
most of the other sources reviewed in this column, he maintains
that current copyright laws are perfectly capable of dealing with
the new electronic environment. He calls into question many of
the assumptions about computer systems and monetary funding that
(he claims) underlie the move to overhaul the copyright system.
He describes a variety of small-scale pilot projects that the
Copyright Clearance Center has undertaken in conjunction with
publishers and researchers "to provide owner-authorized,
text-based information electronically for internal use to various
sets of users, and to determine what they use, when they use it,
why, how often, and to what end." He further claims: "For these
pilots, and for other, larger-scale programs that will be
developed in the future, existing copyright law provides a
perfectly adequate context for the development and elaboration of
systems to manage computer-based text."
+ Page 167 +
While one has to wonder whether Mr. Garret is unbiased in this
matter given his position, he does make a convincing argument for
the limited case of electronic access to text-only databases.
However, his points do not address the larger issues raised in
the OTA intellectual property studies.
----------------------------------------------------------------
Alexander, Adrian W., and Julie S. Alexander. "Intellectual
Property Rights and the 'Sacred Engine': Scholarly Publishing in
the Electronic Age." In Advances in Library Resource Sharing,
ed. Jennifer Cargill and Diane J. Graves, 176-192. Westport,
Conn.: Meckler, 1990.
----------------------------------------------------------------
Adrian and Julie Alexander give a fine overview of the 1986 OTA
report, as well as a conference on intellectual property rights
held in 1987 by the Network Advisory Committee of the Library of
Congress. They conclude with a broad discussion of the potential
for electronic publishing for the scholarly research and
publication process, which echoes many of the themes discussed at
recent meetings of the Coalition for Networked Information.
They maintain, as some CNI speakers have, that electronic
publishing represents an opportunity for universities to
recapture their intellectual property from the expensive and
fruitless cycle of sale back and forth to publishers. They also
point out that publishers want to capture this potential
publication medium as well.
+ Page 168 +
----------------------------------------------------------------
Shuman, Bruce A., and Joseph J. Mika. "Copyrighted Software and
Infringement by Libraries." Library and Archival Security 9, no.
1 (1989): 29-36. (ISSN 0196-0075)
----------------------------------------------------------------
Shuman and Mika provide a good overview of the current state of
software piracy and copyright infringement, with a few additional
comments that describe the situation of libraries which circulate
software. They are quite critical of the practice of
"shrink-wrap" licensing which many vendors have taken up. This
is the familiar tactic of pasting a license agreement with many
restrictions on the outside of a shrink-wrapped software package,
with a statement to the effect of "if you open this package, you
thereby agree to this license." They describe the many problems
involved in trying to police the use of software by library
patrons, and state that: "Librarians will continue to find
themselves between copyright holders and license-vendors, eager
to recover the money they feel entitled to, and patrons (and
sometimes library employees) who wish to 'liberate' programs,
whether out of simple greed, a love of the challenge, altruism,
or a 'Robin Hood' complex."
----------------------------------------------------------------
Denning, Dorothy E. "The United States vs. Craig Neidorf."
Communications of the ACM 34, no. 3 (March 1991): 24-32. (ISSN
0001-0782)
----------------------------------------------------------------
Finally, I would like to conclude this column with an example of
the kinds of troubling legal actions that are surely brewing on
the horizon.
The March 1991 Communications of the ACM was partly devoted to a
debate concerning electronic publishing, constitutional rights,
and hackers. The article by Dorothy Denning was a description of
the trial of Craig Neidorf, a pre-law student at the University
of Missouri. Neidorf was charged by a federal grand jury with
wire fraud, computer fraud, and interstate transportation of
stolen property.
+ Page 169 +
All this because he published a document (containing what turned
out to be public domain information) in an electronic journal he
edited. The electronic journal was called "Phrack," a
contraction of the terms "Phreak" (the act of breaking into
telecommunications systems) and "Hack" (the act of breaking into
computer systems). The document in question concerned the E911
system of Southwestern Bell, and it contained only information
that was already in the public domain. The charges against
Neidorf were dropped when this was brought up during the trial,
but Neidorf was left with all his court costs, amounting to
$100,000.
Now, regardless of what one thinks of Neidorf or the ethics of
hacking, the fact that the U.S. government can bankrupt an
individual (or institution!) by making groundless accusations of
publishing "secret" electronic documents bears attention!
Neidorf's case may potentially mark the beginning of entirely new
types of censorship revolving around electronic media. Denning's
article points out that currently the government can seize all
computer equipment and files of an individual or organization,
and hold them for months. This kind of search and seizure (again
on mistaken grounds) devastated one small company called Steve
Jackson Games. Denning discusses this incident as well, and it
is chilling to imagine happening by accident to one's own
organization.
Problems of copyright and the new digital media are only now
beginning to surface, but they have been inherent in the new
technologies since at least the sixties. Libraries and society
as a whole will increasingly have to face these issues, either in
legislation by a forward-looking congress, or more likely in
painful court trials like the United States vs. Neidorf.
+ Page 170 +
About the Author
Martin Halbert
Automation and Reference Librarian
Fondren Library
Rice University
Houston, TX 77251-1892
[email protected]
----------------------------------------------------------------
The Public-Access Computer Systems Review is an electronic
journal. It is sent free of charge to participants of the
Public-Access Computer Systems Forum (PACS-L), a computer
conference on BITNET. To join PACS-L, send an electronic mail
message to LISTSERV@UHUPVM1 that says: SUBSCRIBE PACS-L First
Name Last Name.
This article is Copyright (C) 1991 by Martin Halbert. All Rights
Reserved.
The Public-Access Computer Systems Review is Copyright (C) 1991
by the University Libraries, University of Houston, University
Park. All Rights Reserved.
Copying is permitted for noncommercial use by computer
conferences, individual scholars, and libraries. Libraries are
authorized to add the journal to their collection, in electronic
or printed form, at no charge. This message must appear on all
copied material. All commercial use requires permission.
----------------------------------------------------------------
COMPUTER PRIVACY VS. FIRST AND FOURTH AMENDMENT RIGHTS
(By Michael S. Borella)
<Mike Borella received a bachelor's degree in Computer Science and
Technical Communication from Clarkson University (1991). He is
currently a graduate student and teaching assistant in Computer
Science at U. Cal. at Davis. This paper is the result of an
independent study sponsored by Susan Ross, an assistant professor in
Technical Communication at Clarkson. e-mail
[email protected] or
[email protected]>
I: What is Cyberspace?
"Cyberspace. A consensual hallucination experienced daily
by billions of legitimate operators, in every nation... A
graphical representation of data abstracted from the banks
of every computer in the human system. Unthinkable
complexity. Lines of light ranged in the nonspace of the
mind, clusters and constellations of data. Like city lights,
receding..."
- William Gibson, Neuromancer
Even after reading William Gibson's cyberpunk novels, one's
conceptualization of cyberspace, the electronic world of computers and
computer networks, can be insubstantial. Gibson describes cyberspace as
a world of simulated stimulation that a computer feeds to a "jockey"
(computer operator) via a "cyberspace deck" (human-computer interface).
Explorers in Gibson's cyberspace often have difficulty telling what is
real and what is not. Frequently, in our world, the novice computer
user has similar problems understanding how to use the potential wealth
of information at their finger tips. In Gibson's uncharted future,
people access computers by merging their thoughts with a database.
Today we can "enter" cyberspace through keyboard and modem. But what
actually is cyberspace? Is it real? What does it look like? What are
some of the personal and legal issues emerging from this vastly
uncharted new frontier? This paper will answer those questions and more
as we explore cyberspace, meet its frequenters, and discuss its
increasing role in the life of every human being, not just those who
actually use a computer.
Before we embark on our journey through the legal battles and
rights issues regarding cyberspace, we need a working knowledge of what
it is and how computer operators use it.
Envision a roadmap. Cities dot the otherwise sparse landscape
and roads branch out in all directions, connecting every city. This
network leaves no city unserviced. Although not every city is connected
to every other, it is possible to reach any one city from any other.
Like every other mass transit system, certain areas are more travelled
than others. Some cities are larger than others and some stretches of
road are more prone to traffic. The size and complexity of this roadmap
defies the imagination - it encircles the world.
But the cities are not actually cities. They are computers or
groups of computers. The roads are telephone lines or fiber-optic
cable. The system surrounds the globe in an electronic web of data.
The travellers on these 'virtual' roads are packets of information which
are sent from one city to another, perhaps via many. The roadmap is a
worldwide computer "network." Each city is a depot or terminal for the
packets, and is usually referred to as a "node." In reality they are
mainframes owned by universities, companies, or groups of computer
users. There are several worldwide computer networks currently in
existence.
Every individual who has an account on any mainframe in the
world has their own unique electronic address. It is not unlike a
mailbox, except that it can only receive mail of the electronic kind.
Electronic addresses are similar to postal addresses in that they
contain:
--a name, or user identification which corresponds to the
individual computer user who owns the particular address.
--a local machine name, which is the specific mainframe that the
userid is on. Local names are only used in the node consists of
more than one mainframe. This is not unlike a street address.
--a node name, which corresponds to the physical location of the
node that the userid belongs to. This is not unlike a city
address and/or zip code.
This is all a network needs to know before it can send
information from one mailbox to another. Just like postal mail, if the
user doesn't address mail correctly, the network will return it. In the
case of e-mail (electronic mail) a simple misspelling will cause the
network to return the mail, or send it to an improper destination. Each
of the several worldwide networks has its own unique but similar method
for addressing e-mail. Corresponding via electronic mail has been
available to some academicians for over 20 years, but today it is
possible for anybody with a computer and a modem to have their own
mailbox. For the sake of convenience, many useful physical objects have
been abstracted into cyberspace. Computerized filing systems
(databases), bulletin boards, and electronically published digests and
magazines proliferate in the virtual world of networks. Many of these
electronic items are being treated differently than their "real"
counterparts. Often, due to the convenience of having millions of
pieces of data available in seconds, individual privacy rights are
violated. This is leading to debate and litigation concerning the use
of various aspects of cyberspace. The next sections cover the
situations, people, and legislation of this untamed and largely
undefined frontier.
II: Databases
A database is a collection facts, figures, numbers, and words
that are sorted in a particular order and/or indexed. They are stored on
a computer so that retrieval is quick and simple. Often, databases are
used by the government, corporations, and private businesses to keep
track of the names, address, phone numbers, and other relevant data
about their clients, subscribers, members, etc. For example, most
public libraries have databases containing information of every person
who has a card at that library. Besides the name, address, and phone
number of the card holder, the library's database would also contain
information regarding what books the holder is currently borrowing,
whether they are overdue or not, and when each person's library card
expires.
Similarly, banks have databases containing information regarding
the persons they transact with. Again, name, address and phone number
is essential, but the bank would also be interested in social security
number, credit rating, assets, mortgage information, and so on. By
organizing this data on a computer, the bank increases its efficiency.
It is able to serve more customers in less time, and provide monetary
transactions within seconds. Anyone who has used a bank card at an
automated teller can attest to this.
But all databases are not used for such beneficial purposes. As
we will see in the next section, even the information stored in "benign"
databases can be used to violate privacy rights.
In 1967, J. Edgar Hoover, then head of the FBI, created the
National Crime Information Center (NCIC). This organization's purpose
is to use a computerized database containing the criminal record of
every United States citizen to increase the efficiency of all levels of
law enforcement by facilitating quick exchange of information. The
NCIC's federal databanks interface with over 64,000 state and local
governments' computer networks, and even with some criminal databases of
foreign countries. This widespread and far-reaching power is used by
everyone from top FBI investigators to county and municipal patrol
officers. For example, if a police officer pulls over a speeder in New
York, they can check, within a matter of seconds, if that person is
wanted in any other state, and if that person has a criminal record.
The NCIC contains records on every person arrested in the United
States, which amounts to approximately 40 million people, a number
equivalent to one-third of the work force (Gordon and Churchill, p.
497). It goes without saying that the holders of this information have
incredible power. However, at first glance, the existence of the NCIC's
databases seem completely beneficial; in fact they do much to protect
the privacy of the average American. Authorities can find out if an
individual is wanted for a crime and detain that person if necessary,
all with the push of a few buttons. Effective law enforcement does make
the country a safer place for its citizens. But, as we will see, the
current state of and uses for the NCIC do infringe upon individual
privacy.
There are many cases in which the NCIC databases have been
found to hold inaccurate and incomplete information. Keep in mind that
they only contain arrest records, not conviction records. If an
individual has been acquitted of a charge, it does not necessarily get
entered into the computers. An example of this was the legal battle
fought by Los Angeles native Terry Dean Rogan. After Rogan lost his
wallet, a man using his identification was linked to four crimes,
including two murders. Rogan was mistakenly arrested, and an NCIC file
was made about him. The file was inaccurate - it did not contain a
description of him. As a result, he was arrested four times for crimes
he didn't commit. Rogan successfully sued to city if Los Angeles in
1987 for violating his Fourth Amendment rights (Science Court Opinions,
p. 99). But some victims of NCIC errors don't get off so easily.
In 1979, Michael Ducross of Huntington Beach California made a
minor traffic violation on his way to the supermarket one day. The
police officer radioed for a check on Ducross. When a police station
desk clerk punched up the NCIC database to see if Ducross had a file, he
got a surprising result. Ducross was wanted for going AWOL from the
Marine Corps 10 years earlier. He was seized and held for five months
at Camp Pendleton. The Marine Corps eventually dropped the charges
because he had never actually gone AWOL. Ducross was a Native American,
and he had left the Corps on a special discharge program available only
to Native Americans and foreign citizens (Burnham, pp. 33-34).
But these are just two isolated examples, right? Wrong! A
study by the Congressional Office of Technology Assistance (OTA)
conducted in 1982 found that, "...as many as one-third of state records
lacked information about the disposition of the cases on file.
Therefore, an arrest in one state, which may have resulted in a
dismissal or an acquittal, could in another state influence the decision
to withhold bail or to prosecute the defendant as a 'career criminal.' "
(Gordon and Churchill, p. 514). The OTA study found that, at best, 49.5
percent of the NCIC Criminal History records were complete, correct, and
unambiguous (Burnham, p. 74).
It's bad enough that the NCIC files are largely inaccurate -that
your Fourth Amendment rights protecting unlawful search and seizure can
be lawfully violated if you have been previously arrested for a crime
you didn't commit - but these computerized criminal files are used for
much more than law enforcement, and are used by more than just law
enforcement agencies. Approximately 90 percent of all criminal
histories in the United States are available to public and private
employers (Gordon and Churchill, p. 515).
Nor is the NCIC without local competition. For example, one
Rhode Island data merchant, whose clients are mostly prospective
employers, keeps files on people who have been arrested but
no necessarily convicted of a crime. That merchant includes in the files
names of individuals taken from local newspaper stories (Consumer
Reports).
If arrest records but not conviction records are available,
might not they influence hiring decisions? For example, might not an
employer finding a record of arrests in the file of a person claiming a
"clean record" on an employment application question the credibility of
the applicant's claim and make a decision not to hire influenced by that
doubt? Given that the applicant would not be aware that such a database
had been consulted, he or she could not possibly mount a defense if the
information in the file was inaccurate (e.g., someone else's arrests) or
misleading (e.g. no arrests led to convictions).
Since 40 million US citizens have an arrest record, the
social cost is potentially high. In several states, including
California and Connecticut, more than half of the information requests
to criminal history databases were made by employers (Gordon and
Churchill, p. 515).
But the problems don't end there. In 1981, mainly because
of John Hinckley's attempt on then President Ronald Reagan's life, about
400 files were added to the NCIC database. These were of people who had
no criminal record and were wanted for no crime! Why were they being
entered into the computers? Because these individuals were considered
"a potential danger" by the Secret Service. Secret Service Director
John R. Simpson stated that listing these people would provide an
invaluable tool for tracking their location and activities (Epstein, p.
17). This shows that the government is only paying lip service to the
"innocent until proven guilty" precedent that our freedom is based on.
The "potential danger" would be to members of the FBI protectorate,
including the President, Congress members, and controversial political
and social figures such as Jacqueline Onassis. Considering how
"accurate" the files have been proven to be, one can imagine the
atrocities possible (and encouraged) under these provisions.
But there are more culprits to this mess than just the
government. The use of databases in the violation of privacy extends
into the corporate world. The U.D. Registry Inc. was formed in 1977 by
Harvey Saltz, a former deputy district attorney in Los Angeles. "Using
a computer to store information obtained from legal charges filed by
landlords in the courts, Saltz says he currently has compiled more than
a million records about such disputes all over the Los Angeles area.
Over 1900 landlords pay Saltz an annual fee ranging from $35 to $60...to
determine whether the individuals who come to them for housing have had
arguments with other landlords in the past." (Burnham, p. 34). And just
like the NCIC, Saltz's database was found to be less than reliable.
In 1978, Lucky Kellener paid the rent to his brother's
apartment. But when his brother was evicted, Kellener's name was
included in the U.D. Registry files, defining him as an undesirable
tenant. When Kellener went looking for a new apartment in 1981, he got
repeatedly turned down and brushed off. Finally, a landlord told him
that he had been blacklisted (Burnham, pp. 34-35).
Another victim was Barbara Ward, who moved to Los Angeles and
found that her newly rented apartment was infested with cockroaches.
When she gave her landlord a thirty day notice, he countered with an
eviction notice. When the landlord didn't show up in court, the judge
threw the case out. But Ward was entered in the U.D. Registry as having
an eviction notice, and when she wanted to rent an apartment later she
was unable to (Burnham, pp. 34-35).
In both cases, errors caused a major personal difficulty and
breach of privacy. Also, in both cases the victim did not know of the
U.D. Registry's existence. Therefore, neither could possibly confront
the unfavorable, electronically-stored data, analogous to a "false
witness," that led to their blacklisting.
Perhaps the grandest scale of gathering information about people
by a non-governmental agency was undertaken by the Lotus Development
Corp. in conjunction with Equifax Inc. Lotus and Equifax developed
"Marketplace: Households," a database of the names, addresses, and
marketing information on 120 million residents of the United States
(Fisher, p. C3). The purchaser of this information would probably be
large consumer goods companies specializing in mail order. Databases
like this are currently used by organizations to send unsolicited (junk)
mail to potential buyers. Imagine the volume of junk mail if the entire
business world had the names and addresses of almost half of the
country's population on-line!
Fortunately, on January 23, 1991, Lotus and Equifax announced
that they had cancelled plans to release "Marketplace: Households" due
to 30,000 letter and phone calls from individuals who wanted their
files deleted from the product. Apparently, the companies decided that
the privacy issues involved would make the product unviable. (Fisher,
p. C3.) Ironically, a similar product, "Marketplace: Business", which
contained database information on seven million U.S. businesses, was
discontinued the same day. "Marketplace: Business" has been shipping
since October 1990, but was not profitable without the revenues from
"Marketplace: Households" (Fisher, p. C3).
A similar example of the same type of database belongs to the
Phone Disc USA Corporation. This small, Massachusetts based company
has manually copied the names, addresses and numbers of 90 million
people out of the white pages of telephone books from across the nation.
They put this information on CD-ROM storage devices, and sell it to
mass-marketers. In a recent ruling, the Supreme Court decided that it
is legal to copy white pages listings because they are not copyrighted.
For the next version of the product, co-founder James Bryant plans to
copy every name from over 4000 sets of regional whites pages.
(Kleinfield) Unlike the Lotus/Equifax undertaking, Phone Disc USA shows
no signs of halting their product.
How many of these computer databases and networks exist that the
average American doesn't know about? Just about every government or
private agency that interacts with the public has its own computerized
index of names, addresses, social security numbers, etc. Every time you
open a bank account, apply for a credit card, attend a learning
institution, register at a hotel, get medical aid, or obtain a loan, a
new file is opened for you, without your explicit knowledge! And these
are the easy ones to track; there are many databases you get into
without anyone telling you. In fact, these "secret" records, not unlike
the U.D. Registry's, are more effective if the "victims" don't know
about them.
Now that we are aware of the problem, we can ask the question,
"What do we do?" First we must clarify one point - does the mere
existence of these databases and computerized records intrude upon the
individual's privacy, or does the use of them constitute privacy
invasion? The best way to do this is to find out if similar privacy
violations occurred before the advent of computerized files.
The Census Bureau's charter contains the provision, "in no case
shall information furnished under the authority of this act be used to
the detriment of the person or persons to which this information
relates." But, during World War I, the Justice Department was looking
for the names and addresses of young men who were trying to evade the
draft so they could track these dissenters down and prosecute them.
Under pressure from the military, the Census Bureau disclosed this
information (Burnham, pg. 24). Computers did were not used to record
information until the mid-forties. One of the first organizations to
use primitive databases (stacks and stacks of punch cards) for the
purpose of information gathering on a large number of people was the
Census Bureau.
The violation of privacy did take place before computerized
databases. The largest differences between a stack of papers and a
computer file are that the computer file is easier to use, faster to
find, able to be disseminated and/or transmitted quickly. An example of
how efficient computer files are at finding people is the case of the
California Locator Service. This database is used to track parents who
refuse to pay child support. The names of the wayward parents are filed
in the database. The database is compared to that of the Franchise Tax
Board. In the case of a match, the parent's tax refund is intercepted
and sent to the parent with custody (Burnham, pp. 30-33). The Locator
Service also has direct links to the Department of Motor Vehicles, the
Employment Development Board, criminal databases, and several other
computer networks to help locate the delinquent parent. According to
manager Richard Beall, the service is able to provide at least some sort
of information 62% of the time (Burnham, pp. 30-33). Imagine the
difference if the California Locator Service were run by pen, pencil, or
typewriter instead. The proper information on the wayward parent would
have to be sent to all the associate agencies, processed, and answers
given. The time to do this would be prohibitive enough to make the
service slow and negligibly effective. The computer facilitates this
sort of information sharing and retrieval.
We conclude that computers aren't the inherent evil, but they
help the government and other organizations to procreate the evil of
privacy infringement more easily than if computer databases weren't
used. So we can't necessarily eliminate the problem by eliminating the
databases. Often the computer database used for the questionable
activity is one that exists for a different purpose. Cases of this are
the Census Bureau's information, and the NCIC. Both of these databases
exist to serve beneficial purposes - population surveys and law
enforcement, respectively. Eliminating all computer databases
containing personal information would to too radical a step. Our society
would grind to a standstill as bank records, medical files, legal
reports, etc. (the list goes on indefinitely) would have to be hand
copied and disseminated.
Think of the examples of given at the beginning of this section
of a library and a bank. We saw how these organizations used databases
to improve their service to the public. These same databases can be
used to invade the privacy of the public. For example if library
databases are available to the public, they can be used to list the
books or type of books that an individual reads. A magazine or book
club might find library databases useful in deciding who to send
unsolicited subscription or membership information to. Bank records can
be used similarly to determine the financial status of an individual.
What is comes down to is that any database containing personal
information that is used for any other purpose than the one it exists
for is a potential violation of privacy. As a case in point, under
current law, our video rental histories have more protection than our
medical or insurance records. Under a 1988 law, video rental records may
only be released under court order. That law, often referred to as the
"Bork bill," was inacted after video rental information about a Supreme
Court nominee was made public in the press (Consumer Reports). Must we
wait for similar abuses related to the medical, library, or bank records
of persons in the public eye to similarly secure the privacy of these
records?
Is there a solution? Is there a middle ground where we can have
the databases, but control how they are used? In the January 1988 issue
of Omni magazine, experts from various legal and scientific fields were
asked to comment upon the Terry Dean Rogan case (see above). Some
responses were: (Science Court Opinions, p. 100).
Sheldon L. Glashow, Nobel laureate and professor of physics at Harvard
University: "A centralized computerized crime file is absolutely
necessary for crime control, but it does jeopardize the rights of
citizens...Under no circumstance but one should the NCIC files be made
available for non-crime related purposes: The exception is the right of
each citizen to examine his or her own file."
Melvin Konner, M.D., professor of anthropology at Emory University:
"Centralized data banks pose a new, probably serious threat to
privacy, yet such data banks are too valuable to be forsworn.
..challenges should result in the emergence of a system of check
and balances that will prevent the abuse of data."
John Money, professor emeritus of medical psychology and pediatrics at
Johns Hopkins University and Hospital: "...it becomes imperative
to have strictly enforced safeguards on the usage of such
[computerized] lists. One such safeguard would be a legally
guaranteed principle of freedom of information, so that an
individual could access his or her name on the list and correct
information falsely entered against it."
George B. Schaller, director of science for Wildlife Conservation
International: "...as a potential victim, I am pleased that the file
might help insure my privacy - that is my property and person.
The file should, however, be accessible for criminal matters only,
or it will be misused."
Furthermore, an interesting precedent may be set for privacy
rights in the United States by the new European Community. The European
Community is proposing a set of laws that would strictly limit how
database information is used and who has access to it. Basically, the
laws would instruct owners of databases to notify individuals of their
inclusion, and these individuals would be able to obtain copies of the
database information on them. Also, owners of databases would not be
allowed to sell the personal information of an individual without the
permission of that individual. "The proposals would prohibit...a
publisher from selling a list of subscribers to a real estate developer
- unless the subscribers agreed to be included. Banks would be required
to notify credit card holders before selling their names to mail-order
houses." (Markoff, p. D1). Interestingly enough, these proposed
regulations have the U.S. based companies complaining the loudest. IBM,
GTE, and AT&T claim that the proposed laws would strictly limit their
business abroad (Markoff, p. D1).
Privacy experts maintain that the companies are overreacting.
Some of the restriction that are under consideration include: (Markoff,
p. D1).
--Companies must register all databases containing personal
information with the countries...in which they are
operating...
--Corporations using personal data must tell the subjects of
their use...
--Private companies can only collect or process personal data
with the consent of the subjects.
--Companies would not be able to transfer data to another
country unless that country also offered adequate protection
of records.
Taking these experts' opinions and the precedents under
consideration by the European Community, we have a basis for legislation
concerning computer databases and the privacy of individuals. The
following guidelines are suggested:
1) All individuals who have personal information stored in a
computer database must be informed of this fact. They also
must be given a chance to review their file(s) and to
petition for changes if they find that the information held
within is incorrect.
2) When a person is arrested and/or brought to trial because of
the information in one of these databases, attention must be
given to the question of the file's accuracy and
completeness.
3) Files that exist for purposes of law enforcement (e.g., the
NCIC) should not be used for anything other than law
enforcement. A system of checks and balances should be
maintained to guarantee this.
4) Files that exist for marketing or statistical purposes should
inform all individuals who are included in the database of
their inclusion, and give them an opportunity to request that
their file be deleted.
The constitution was written as anticipatory democracy, but its
framers did not (and could not) anticipate the advent nor the power of
the computer. Although the ideals of individual privacy have not
changed over the last 200 years, the reality has. In the next section
other outdated legal concepts that are in danger of violating the First
and Fourth Amendment rights of every citizen are exposed.
III: The Printed Word vs. The Electronic Word
"The right of the people to be secure in their persons,
houses, papers, and effects, against unreasonable searches
and seizures, shall not be violated and no warrants shall
issue but upon probable cause, supported by oath or
affirmation, and particularly describing the place to be
searched, and the persons or things to be seized."
- The Fourth Amendment to the Constitution of the
United States
On March 1st, 1990, Secret Service agents raided the offices of
Steve Jackson Games, a small role-playing game company. The agents
seized three computers, including one being used to run a bulletin
board, all company software in the proximity of these computers, and all
business records contained in the computers' storage.
Why would the government want to virtually shut down a game
company? Because Steve Jackson Games was just weeks away from
publishing a science-fiction role-playing game called Gurps Cyberpunk.
The game is set in a high-tech future society where the players use
human/computer interfaces to "enter" computer networks and infiltrate
(or hack) through defenses to valuable data. Playing the game does not
require the use of (or even the knowledge of how to use) a computer. A
Secret Service agent told Steve Jackson that the Gurps Cyberpunk playing
manual was a "handbook on computer crime." (Barlow).
As a result of losing their computing capabilities and data,
Steve Jackson Games temporarily shut down and had to lay off half of its
employees. For three months, the Secret Service retained the equipment
and data even though they had no evidence that the game or any other
Steve Jackson game violated any law. When some of the equipment was
finally returned in June, 1990, the Service kept the drafts of Gurps
Cyberpunk. The rest of the equipment was "lost." (Barlow).
According to the Fourth Amendment, the Secret Service agents
needed "probable cause" that criminal evidence will be at the scene of
the search to get a search warrant issued. The Fourth Amendment also
specifies that the search should be as narrow as possible (in other
words, the Secret Service should have known exactly what they were
looking for.) By taking all computer records, the Service not only
effectively shut Jackson down, but violated the Fourth Amendment.
The only "probable cause" that the Secret Service had for
seizing Jackson's computers was that Jackson had hired a former "hacker"
to work on Gurps Cyberpunk. A "hacker" is a member of an underground
subculture dedicated to breaking and entering computer systems. While
this is illegal, the hacker community in general frowns upon the
stealing of data for personal profit, but does it instead for bragging
rights and the thrill of gaining illicit access to a "guarded" area of
cyberspace. This is not unlike breaking the speed limit for kicks and
the excitement of defying authority. If this is indeed why the Service
raided Steve Jackson Games, this sets another frightening precedent
regarding privacy - will employers now check to see if applicants are
hackers along with the "normal" checks for arrest records? This may be
an effect that the Service was looking for. According to Steve Jackson,
the Secret Service suspected this staff member of wrongdoing at home,
not at Steve Jackson Games (Computer Underground Digest, 3.20).
At the time of this writing, the search warrant remained sealed.
If the object of the search, according to the warrant, was evidence of
the staffer's wrongdoing, only evidence of that crime should have been
retained. If the object was the game, the agents should have taken just
the hard copy and soft copy regarding Gurps Cyberpunk. By taking the
whole computer system of Steve Jackson Games, the FBI seriously hindered
the lawful commercial activities of the company. By holding the
computer equipment and software for three months, Steve Jackson Games
was almost put out of business. The non-relevant equipment and software
should have been returned promptly.
Along with the computer equipment and software seized, the
agents disconnected and confiscated Steve Jackson Games' BBS. A BBS,
or Bulletin Board System, is a centralized, information gathering and
dissemination point for many computer users. The BBS contains e-mail
from and for those users, who can access the system with their home
computer's modem through normal phone lines. Many users who don't
have network access through a university or the organization they work
for use a BBS to enter cyberspace. The BBS stores personal mail for
these users and enables them to read it when they are logged on. U.S.
postal mail is considered private. Electronic mail is the same as
physical mail in that it should be protected by the same privacy rights
that physical mail is. In the next section, the seizure of personal
mail is explored in detail.
Even though Steve Jackson Games did eventually publish Gurps
Cyberpunk, the company was hit hard by the loss of its information.
They had to recreate the game from rough drafts and memory. But, a
positive result did come out of the SJG case. Mitch Kapor, founder of
Lotus Development Corp, and associate John Perry Barlow, established the
Electronic Frontier Foundation (EFF) with the purposes of educating the
public about computer-based media and supporting litigation to extend
First Amendment rights into the computer world. The EFF intervened in
the Jackson case, pushing the government to restore SJG's equipment. In
April, 1991 the EFF in conjunction with Steve Jackson Games filed a
civil suit against the U.S. Secret Service and several of the
individuals responsible for the raid and the withholding of Jackson's
property. Unfortunately, at the time of this writing, more detail about
this precedent setting case was unavailable.
Although it will not set a legal precedent, there is a similar
case on the books. The Alcor Life Extension Foundation is an
organization that, for a large fee, will freeze an individual's body
upon death. In December, 1987, the Riverside County Coroner's Office
accused Alcor of hastening the death of cryogenic participant Dora Kent
by prescribing her a lethal dose of barbituates (Computer Underground
Digest, 1.04). In January 1988, law enforcement officers raided Alcor's
headquarters and confiscated its computer equipment. Like the Steve
Jackson Games case, the search warrant for the Alcor foundation did not
specify what information that should have specifically be confiscated.
The section of the warrant pertaining to computer seizures follows:
All electronic storage devices, capable of storing
electronic data regarding the above records, including magnetic
tapes, disk (floppy or hard), and the complete hardware
necessary to retrieve electronic data including CPU (central
processing unit), CRT (viewing screen), disc or tape drives,
printer, software, and operation manuals for the above said
computer, together with all handwritten notes or printed
material describing the operation of the computer
(Computer Underground Digest, 1.04).
In other words, the officers were directed to seize all
computers and computer equipment from the Alcor site. Even though the
warrant states that only computer equipment "...capable of storing
electronic data regarding the above records..." should be seized, this
can be interpreted as a warrant to seize all computer equipment because
any equipment is capable of holding data about Dora Kent. So once
again, the warrant was very wide reaching and vague, exactly what the
Fourth Amendment is supposed to protect against.
But in this case, the issue became more focused. H. Keith
Henson, a member of Alcor, claimed that personal e-mail belonging to
himself and 13 other Alcor members was "stolen" by the raiding officers.
Although Henson repeatedly tried to get the court to turn over the
private e-mail, on the account that it had no relevance to the Dora Kent
case, they would not return it. So Henson and his group sued the FBI
for not intervening on their behalf in this case (Computer Underground
Digest, 1.04).
The stealing of private e-mail like in the Alcor case is another
precedent that can have dangerous repercussions. This is the equivalent
of law enforcement officers obtaining a search warrant for a post office
because some of its employees were suspected of illegal activities, and
proceeding to seize all mail contained in the post office and reading
it, and not returning it to its intended recipients.
At the time of this writing, Alcor case was settled out of
court. The result of the settlement was not available.
As we can see from these examples, there is a fundamental
difference in how the legal community in the U.S. views printed and
electronic media. Print media is protected by the First Amendment;
electronic media is not. This is a difference that should not exist.
Almost all newspapers and magazines exist in electronic form before they
are printed. Electronic digests follow the same process, but they leave
out the final step - the actual printing. There have been cases of
electronic hacker magazines being shut down for publishing hacked
(stolen) documents.
However there is a hacker magazine called 2600 that doesn't
leave out the final step. Printed, not electronic, copies are sent to
subscribers. 2600 has included similarly hacked documents, but has
never been accosted. According to 2600 editor Emmanuel Goldstein, it is
because of the physical printing, "I've got one advantage. I come out
on paper and the Constitution knows how to deal with paper." (Barlow).
Computer based media and e-mail should have the same Constitutional
protection as the written word. But it doesn't. Why not?
We can answer this question by tracing history back to the late
1700's when the Framers were writing the Constitution. They had no
concept of computers or electronic communication at its current level.
Because of this excusable lack of foresight, the Constitution and Bill
of Rights do not contain specific provisions for computer based speech
and the computerized press. In fact, the word "press" implies the
printed press, not actual process of disseminating information to large
numbers of people. In the Fourth Amendment, an individual's "papers"
are safe from unreasonable search and seizure. Electronic, or
unprinted, "papers" are not specifically protected. In strict
interpretations of the Constitution, electronic media are not protected.
Of course, this is nonsense since the only difference between an article
in a newspaper or magazine and an article stored electronically, that is
intended to be printed, is the act of printing.
Using the Steve Jackson Games and Alcor cases as a basis,
it is proposed that the following guidelines be legislated:
1) If computer information is to be seized, the search warrant
must explicitly describe the data sought. The officers
carrying out the search should seize only the storage devices
(floppy disk, hard disk, magnetic tape) holding this
information.
2) If the storage device(s) seized contain other information as
well as the data described by the warrant, the wanted data
should be copied them the storage device should be promptly
returned.
3) If any electronic mail is confiscated, only the pieces from
or to suspects of the crime should be read. The rest should
be promptly returned unread to the addressees.
By following these guidelines, we can avoid many violations of
individual privacy that the Constitution, in its current wording,
allows. In the final section a somewhat radical step to help our
society into the information age is recommended.
IV: Where Do We Go From Here?
The untamed electronic frontier is an intimidating domain for
the computer illiterate. Many view this mysterious technology as
responsible for whittling away their personal rights and privacy. Thus
they find it fearful and intimidating. Ironically, the only way that
the electronic frontier can "dehumanize" an individual is if that
individual is ignorant of what it really is. We've seen that we can't
continue to function at our current level of society without computer
technology, but unless the users of this technology are monitored, they
can use it to invade the privacy of individuals. If the general
populace is educated, they will have the background to challenge these
intruders.
But where do we start? As we have seen before, the outdated
wording of the Constitution promotes this dread image of computers and
electronic media. Perhaps a good place to start would be with the
Constitution. The current wording of the Bill of Rights is archaic, and
it represents the mind-frame that many people still have. Computer
technology and cyberspace must not be viewed as separate from or outside
of laws protecting free speech and privacy.
The First and Fourth Amendments don't explicitly mention
electronic media. They should regard rights in the electronic world of
cyberspace as just as important as those in the physical world. A new
amendment stating that the rights guaranteed by the First, Fourth, and
any other amendment for that matter, apply to cyberspace would prevent
many of the violations we have discussed from happening. (As the final
revision of this paper was about to be printed, word was received that
Laurence Tribe of Harvard Law School had proposed discussion of just
such an amendment. However, this author's proposal was developed
independently of Tribe's.)
If a new amendment is a step too far, then legislation and
precedent setting legal decisions must be made. There seems to be a ray
of hope in the Steve Jackson Games case, but it will take several such
cases to approach the benefit of a Constitutional amendment.
The global village is just around the corner. Whether it is a
technological utopia of peace and freedom or an aspect of Orwell's
"1984" depends on decisions made now.
Bibliography
Article One: An Overview, (2600 Magazine, Spring 1990), pp.1-10.*
Burnham, David, The Rise of the Computer State, (1980, Vintage
Books).
Barlow, John Perry, Crime and Puzzlement. **
Computer Underground Digest, Volume 1.04, April 11th, 1990. *
Computer Underground Digest, Volume 3.20, May 12, 1991.*
Consumer Reports, "What Price Privacy," (May, 1991, pp. 356-360).
Epstein, Aaron, "The Shadow of Your File," The Progressive, (v47,
Jun., 1983), p. 17.
Fisher, Lawrence M., "Lotus Database Cancelled," (New York Times,
Jan 24, 1991), p. C3.
Gordon, Diana R. and Churchill, Mae, " 'Triple I' Will Be Tracking
Us," The Nation, (New York, v238, April 28, 1984), pp. 497, 513-
515.
Kleinfield, N.R., "The Man With All The Numbers," New York Times,
Sunday, April 14th, 1991.
Markoff, John, "Europe's Plan to Protect Privacy Worry Business,"
New York Times, Thursday, April 11th, pp. D1, D5.
Pool, Ithiel de Sola, Technologies of Freedom, "On free speech in
an electronic age," (1983, Harvard University Press).
Science Court Opinions - Case 6: Computer Privacy, Omni, (New
York, Jan. 1988, v10), pp. 99-100.
Wilson, Kevin, The Technologies of Control, (1988, University of
Wisconsin Press).
* These are electronic publications. If copies cannot be found,
feel free to contact the author.
** This document was originally disseminated electronically, then
was published in Harper's Magazine. The author used the
original version.
Date: Sat, 28 Jan 1995 09:00:07 GMT
From:
[email protected] (Brad Templeton)
Subject: DRAFT FAQ: 10 big myths about copyright explained
Newsgroups: news.announce.newusers,news.admin.policy,misc.legal,misc.legal.comp
uting,misc.int-property
Original-author:
[email protected] (Brad Templeton)
Archive-name: law/Copyright-FAQ/myths
Last-change: 11 Jan 1994 by
[email protected] (Brad Templeton)
Changes-posted-to: news.misc
[This is a draft FAQ, proposed for inclusion in news.announce.newusers. It
has not yet been sent to news.answers for approval, so the Archive-name
above is just a proposal. After a few rounds of posting this as a draft,
it'll be added to news.answers. -
[email protected]]
10 Big Myths about copyright explained
By Brad Templeton
1) If it doesn't have a copyright notice, it's not
copyrighted.
This was true in the past, but today almost all major
nations follow the Berne copyright convention. For example,
after April 1, 1989, almost everything created privately in the
USA is copyrighted and protected whether it has a notice or not.
The default you must assume for other people's works is that
they are copyrighted and may not be copied unless you *know*
otherwise. There are some old works that lost protection
without notice, but frankly you should not risk it unless
you know for sure.
It is true that a notice strengthens the protection, by
warning people, and by allowing one to get more and
different damages, but it is not necessary. If it looks
copyrighted, you must assume it is. This applies to pictures,
too. You can't scan pictures from magazines and post them
to the net, and if you come upon something unknown,
you shouldn't post that either.
The correct form for a notice is:
"Copyright <dates> by <author/owner>"
You can use C in a circle instead of "Copyright" but "(C)"
has never been given legal force. The phrase "All Rights
Reserved" used to be required in some nations but is now
not needed.
2) If I don't charge for it, it's not a violation.
False. Whether you charge can affect the damages awarded in
court, but that's essentially the only difference. It's still a
violation if you give it away -- and there can still be
heavy damages if you hurt the commercial value of the
property.
3) If it's posted to USENET it's in the public domain.
False. Nothing is in the public domain anymore unless the
owner explicitly puts it in the public domain(*). Explicitly,
as in you have a note from the author/owner saying, "I grant
this to the public domain." Those exact words or words very
much like them.
Some argue that posting to USENET implicitly grants
permission to everybody to copy the posting within fairly
wide bounds, and others feel that USENET is an automatic store and
forward network where all the thousands of copies made are
done at the command (rather than the consent) of the
poster. This is a matter of some debate, but even if the
former is true (and in this writer's opinion we should all pray
it isn't true) it simply would suggest posters are implicitly
granting permissions "for the sort of copying one might expect
when one posts to USENET" and in no case is this a placement
of material into the public domain. Furthermore it is very
difficult for an implicit licence to supersede an explicitly
stated licence that the copier was aware of.
Note that all this assumes the poster had the right to post
the item in the first place. If the poster didn't, then all
the copies are pirate, and no implied licence or theoretical
reduction of the copyright can take place.
(*) It's also usually in the public domain if the creator has
been dead for 50 years. If anybody dead for 50 years is posting
to the net, let me know. There are some other fine points
to this issue -- check more detailed documents for info.
4) My posting was just fair use!
See other notes on fair use for a detailed answer, but bear
the following in mind:
The "fair use" exemption to copyright law was created to allow
things such as commentary, parody, news reporting, research and
education about copyrighted works without the permission of the
author. Intent, and damage to the commercial value of the
work are important considerations. Are you reproducing an
article from the New York Times because you needed to in order
to criticise the quality of the New York Times, or because you
couldn't find time to write your own story, or didn't want your
readers to have to pay to log onto the online services with the
story or buy a copy of the paper? The former is probably fair
use, the latter probably isn't.
Fair use is almost always a short excerpt and almost always
attributed. (One should not use more of the work than is
necessary to make the commentary.) It should not harm the
commercial value of the work (which is another reason why
reproduction of the entire work is generally forbidden.)
Note that most inclusion of text in USENET followups is for
commentary and reply, and it doesn't damage the commercial
value of the original posting (if it has any) and as such it
is fair use. Fair use isn't an exact doctrine, either. The
court decides if the right to comment overrides the copyright
on an indidvidual basis in each case. There have been cases
that go beyond the bounds of what I say above, but in general
they don't apply to the typical net misclaim of fair use.
It's a risky defence to attempt.
5) If you don't defend your copyright you lose it.
False. Copyright is effectively never lost these days, unless
explicitly given away. You may be thinking of trade marks, which
can be weakened or lost if not defended.
6) Somebody has that name copyrighted!
You can't copyright a name, or anything short like that.
Titles usually don't qualify, but I doubt you could write a
song entitled "Everybody's got something to hide except for
me and my monkey."
However, you can trademark an adjective, when applied to a
generic type of product or service. Like an "Apple"
computer. Apple Computer "owns" that word applied to
computers, even though it is also an ordinary word. Apple
Records owns it when applied to music. Neither owns the
word on its own, only in context, and owning a mark doesn't
mean complete control -- see a more detailed treatise on
this law for details.
You can't use somebody else's trademark in a way that would
unfairly hurt the value of the mark, or in a way that might
make people confuse you with the real owner of the mark, or
which might allow you to profit from the mark's good name.
For example, if I were giving advice on music videos, I
would be very wary of trying to label my works with a name
like "mtv." :-)
7) They can't get me, defendants in court have powerful rights!
Copyright law is mostly civil law. If you violate copyright
you would usually get sued, not charged with a crime.
"Innocent until proven guilty" is a principle of criminal
law, as is "proof beyond a reasonable doubt." Sorry, but in
copyright suits, these don't apply the same way or at all.
It's mostly which side and set of evidence the judge or
jury accepts or believes more, though the rules vary based
on the type of infringement. In civil cases you can even
be made to self-incriminate.
8) Oh, so copyright violation isn't a crime or anything?
Actually, recently in the USA commercial copyright
violation involving more than 10 copies and value over
$2500 was made a felony. So watch out. (At least you get
the protections of criminal law.) On the other hand, don't
think you're going to get people thrown in jail for posting
your E-mail. The courts have much better things to do than
that. This is a fairly new, untested statute.
9) It doesn't hurt anybody -- in fact it's free advertising.
It's up to the owner to decide if they want the free ads or
not. If they want them, they will be sure to contact you.
Don't rationalize whether it hurts the owner or not, *ask*
them. Usually that's not too hard to do. Time past,
ClariNet published the very funny Dave Barry column to a
large and appreciative USENET audience for a fee, but some
person didn't ask, and forwarded it to a mailing list, got
caught, and the newspaper chain that employs Dave Barry
pulled the column from the net, pissing off everybody who
enjoyed it. Even if you can't think of how the author or
owner gets hurt, think about the fact that piracy on the net
hurts everybody who wants a chance to use this wonderful new
technology to do more than read other people's flamewars.
10) They e-mailed me a copy, so I can post it.
To have a copy is not to have the copyright. All the E-mail
you write is copyrighted. However, E-mail is not, unless
previously agreed, secret. So you can certainly *report* on
what E-mail you are sent, and reveal what it says. You can
even quote parts of it to demonstrate. Frankly, somebody
who sues over an ordinary message might well get no damages,
because the message has no commercial value, but if you want
to stay strictly in the law, you should ask first. On the
other hand, don't go nuts if somebody posts your E-mail. If
it was an ordinary non-secret personal letter of minimal
commercial value with no copyright notice (like 99.9% of all
E-mail), you probably won't get any damages if you sue them.
----------------- In Summary ---------------------------
These days, almost all things are copyrighted the moment they
are written, and no copyright notice is required.
Copyright is still violated whether you charged money or not,
only damages are affected by that.
Postings to the net are not granted to the public domain, and
don't grant you any permission to do further copying except
*perhaps* the sort of copying the poster might have expected
in the ordinary flow of the net.
Fair use is a complex doctrine meant to allow certain valuable
social purposes. As yourself why you are republishing what
you are posting and why you couldn't have just rewritten it
in your own words.
Copyright is not lost because you don't defend it; that's
a concept from trademark law. The ownership of names is
also from trademark law, so don't say somebody has a name
copyrighted.
Copyright law is mostly civil law where the special rights
of criminal defendants you hear so much about don't apply.
Watch out, however, as new laws are moving copyright
violation into the criminal realm.
Don't rationalize that you are helping the copyright holder;
often it's not that hard to ask permission.
Posting E-mail is technically a violation, but revealing
facts from E-mail isn't, and for almost all typical E-mail,
nobody could wring any damages from you for posting it.
-----------------------------------------------------------
Permission is granted to freely copy this
document in electronic form, or to print for
personal use. If you had not seen a notice
like this on the document, you would have to
assume you did not have permission to copy it.
This document is still protected by you-know-
what even though it has no copyright notice.
It should be noted that the author, as publisher of an
electronic newspaper on the net, makes his living by
publishing copyrighted material in electronic form and has
the associated biases. However, DO NOT E-MAIL HIM FOR LEGAL
ADVICE; for that use other resources or consult a lawyer.
Also note that while most of these principles are universal
in Berne copyright signatory nations, some are derived from
Canadian and U.S. law. This document is provided to clear
up some common misconceptions about intellectual properly
law that are often seen on the net. It is not intended to
be a complete treatise on all the nuances of the subject. A
more detailed copyright FAQ, covering other issues including
compilation copyright and more intricacies of fair use is
available in the same places you found this note, or for FTP
on rtfm.mit.edu in pub/usenet-by-group/comp.answers/law/Copyright-FAQ.
Also consider
gopher://marvel.loc.gov/11/copyright for
actual statutes.
Laurence H. Tribe, "The Constitution in Cyberspace"
PREPARED REMARKS
KEYNOTE ADDRESS AT THE
FIRST CONFERENCE ON COMPUTERS, FREEDOM & PRIVACY
Copyright, 1991, Jim Warren & Computer Professionals for Social Responsibility
All rights to copy the materials contained herein are reserved, except as
hereafter explicitly licensed and permitted for anyone:
Anyone may receive, store and distribute copies of this ASCII-format
computer textfile in purely magnetic or electronic form, including on
computer networks, computer bulletin board systems, computer conferencing
systems, free computer diskettes, and host and personal computers, provided
and only provided that:
(1) this file, including this notice, is not altered in any manner, and
(2) no profit or payment of any kind is charged for its distribution, other
than normal online connect-time fees or the cost of the magnetic media, and
(3) it is not reproduced nor distributed in printed or paper form, nor on
CD ROM, nor in any form other than the electronic forms described above
without prior written permission from the copyright holder.
Arrangements to publish printed Proceedings of the First Conference on
Computers, Freedom & Privacy are near completion. Audiotape and videotape
versions are also being arranged.
A later version of this file on the WELL (Sausalito, California) will
include ordering details. Or, for details, or to propose other distribution
alternatives, contact Jim Warren, CFP Chair,345 Swett Rd., Woodside CA 94062;
voice:(415)851-7075; fax:(415)851-2814; e-mail:
[email protected].[4/19/91]
[ These were the author's *prepared* remarks.
A transcript of Professor Tribe's March 26th comments at the Conference
(which expanded slightly on several points herein) will be uploaded onto the
WELL as soon as it is transcribed from the audio tapes and proofed against
the audio and/or videotapes.]
"The Constitution in Cyberspace:
Law and Liberty Beyond the Electronic Frontier"
by Laurence H. Tribe
Copyright 1991 Laurence H. Tribe,
Tyler Professor of Constitutional Law,
Harvard Law School.
Professor Tribe is the author, most recently, of
"On Reading the Constitution" (Harvard University Press,
Cambridge, MA, 1991).
Introduction
My topic is how to "map" the text and structure of our
Constitution onto the texture and topology of "cyberspace". That's
the term coined by cyberpunk novelist William Gibson, which many
now use to describe the "place" -- a place without physical walls
or even physical dimensions -- where ordinary telephone
conversations "happen," where voice-mail and e-mail messages are
stored and sent back and forth, and where computer-generated
graphics are transmitted and transformed, all in the form of
interactions, some real-time and some delayed, among countless
users, and between users and the computer itself
Some use the "cyberspace" concept to designate fantasy worlds
or "virtual realities" of the sort Gibson described in his novel
*Neuromancer*, in which people can essentially turn their minds into
computer peripherals capable of perceiving and exploring the data
matrix. The whole idea of "virtual reality," of course, strikes a
slightly odd note. As one of Lily Tomlin's most memorable
characters once asked, "What's reality, anyway, but a collective
hunch?" Work in this field tends to be done largely by people who
share the famous observation that reality is overrated!
However that may be, "cyberspace" connotes to some users the
sorts of technologies that people in Silicon Valley (like Jaron
Lanier at VPL Research, for instance) work on when they try to
develop "virtual racquetball" for the disabled, computer-aided
design systems that allow architects to walk through "virtual
buildings" and remodel them *before* they are built, "virtual
conferencing" for business meetings, or maybe someday even "virtual
day care centers" for latchkey children. The user snaps on a pair
of goggles hooked up to a high-powered computer terminal, puts on
a special set of gloves (and perhaps other gear) wired into the
same computer system, and, looking a little bit like Darth Vader,
pretty much steps into a computer-driven, drug-free, 3-dimensional,
interactive, infinitely expandable hallucination complete with
sight, sound and touch -- allowing the user literally to move
through, and experience, information.
I'm using the term "cyberspace" much more broadly, as many
have lately. I'm using it to encompass the full array of
computer-mediated audio and/or video interactions that are already
widely dispersed in modern societies -- from things as ubiquitous
as the ordinary telephone, to things that are still coming on-line
like computer bulletin boards and networks like Prodigy, or like
the WELL ("Whole Earth 'Lectronic Link"), based here in San
Francisco. My topic, broadly put, is the implications of that
rapidly expanding array for our constitutional order. It is a
constitutional order that tends to carve up the social, legal, and
political universe along lines of "physical place" or "temporal
proximity." The critical thing to note is that these very lines, in
cyberspace, either get bent out of shape or fade out altogether.
The question, then, becomes: when the lines along which our
Constitution is drawn warp or vanish, what happens to the
Constitution itself?
Setting the Stage
To set the stage with a perhaps unfamiliar example, consider
a decision handed down nine months ago, *Maryland v. Craig*, where
the U.S. Supreme Court upheld the power of a state to put an
alleged child abuser on trial with the defendant's accuser
testifying not in the defendant's presence but by one-way,
closed-circuit television. The Sixth Amendment, which of course
antedated television by a century and a half, says: "In all
criminal prosecutions, the accused shall enjoy the right . . . to
be confronted with the witnesses against him." Justice O'Connor
wrote for a bare majority of five Justices that the state's
procedures nonetheless struck a fair balance between costs to the
accused and benefits to the victim and to society as a whole.
Justice Scalia, joined by the three "liberals" then on the Court
(Justices Brennan, Marshall and Stevens), dissented from that
cost-benefit approach to interpreting the Sixth Amendment. He
wrote:
The Court has convincingly proved that the Maryland
procedure serves a valid interest, and gives the
defendant virtually everything the Confrontation Clause
guarantees (everything, that is, except confrontation).
I am persuaded, therefore, that the Maryland procedure is
virtually constitutional. Since it is not, however,
actually constitutional I [dissent].
Could it be that the high-tech, closed-circuit TV context,
almost as familiar to the Court's youngest Justice as to his even
younger law clerks, might've had some bearing on Justice Scalia's
sly invocation of "virtual" constitutional reality? Even if
Justice Scalia wasn't making a pun on "virtual reality," and I
suspect he wasn't, his dissenting opinion about the Confrontation
Clause requires *us* to "confront" the recurring puzzle of how
constitutional provisions written two centuries ago should be
construed and applied in ever-changing circumstances.
Should contemporary society's technology-driven cost-benefit
fixation be allowed to water down the old-fashioned value of direct
confrontation that the Constitution seemingly enshrined as basic?
I would hope not. In that respect, I find myself in complete
agreement with Justice Scalia.
But new technological possibilities for seeing your accuser
clearly without having your accuser see you at all -- possibilities
for sparing the accuser any discomfort in ways that the accuser
couldn't be spared before one-way mirrors or closed-circuit TVs
were developed -- *should* lead us at least to ask ourselves whether
*two*-way confrontation, in which your accuser is supposed to be made
uncomfortable, and thus less likely to lie, really *is* the core
value of the Confrontation Clause. If so, "virtual" confrontation
should be held constitutionally insufficient. If not -- if the
core value served by the Confrontation Clause is just the ability
to *watch* your accuser say that you did it -- then "virtual"
confrontation should suffice. New technologies should lead us to
look more closely at just *what values* the Constitution seeks to
preserve. New technologies should *not* lead us to react reflexively
*either way* -- either by assuming that technologies the Framers
didn't know about make their concerns and values obsolete, or by
assuming that those new technologies couldn't possibly provide new
ways out of old dilemmas and therefore should be ignored
altogether.
The one-way mirror yields a fitting metaphor for the task we
confront. As the Supreme Court said in a different context several
years ago, "The mirror image presented [here] requires us to step
through an analytical looking glass to resolve it." (*NCAA v.
Tarkanian*, 109 S. Ct. at 462.) The world in which the Sixth
Amendment's Confrontation Clause was written and ratified was a
world in which "being confronted with" your accuser *necessarily*
meant a simultaneous physical confrontation so that your accuser
had to *perceive* you being accused by him. Closed-circuit
television and one-way mirrors changed all that by *decoupling* those
two dimensions of confrontation, marking a shift in the conditions of
information-transfer that is in many ways typical of cyberspace.
What does that sort of shift mean for constitutional analysis?
A common way to react is to treat the pattern as it existed *prior*
to the new technology (the pattern in which doing "A" necessarily
*included* doing "B") as essentially arbitrary or accidental. Taking
this approach, once the technological change makes it possible to
do "A" *without* "B" -- to see your accuser without having him or her
see you, or to read someone's mail without her knowing it, to
switch examples -- one concludes that the "old" Constitution's
inclusion of "B" is irrelevant; one concludes that it is enough for
the government to guarantee "A" alone. Sometimes that will be the
case; but it's vital to understand that, sometimes, it won't be.
A characteristic feature of modernity is the subordination of
purpose to accident -- an acute appreciation of just how contingent
and coincidental the connections we are taught to make often are.
We understand, as moderns, that many of the ways we carve up and
organize the world reflect what our social history and cultural
heritage, and perhaps our neurological wiring, bring to the world,
and not some irreducible "way things are." A wonderful example
comes from a 1966 essay by Jorge Louis Borges, "Other
Inquisitions." There, the essayist describes the following
taxonomy of the animal kingdom, which he purports to trace to an
ancient Chinese encyclopedia entitled *The Celestial Emporium of
Benevolent Knowledge*:
On those remote pages it is written that animals are
divided into:
(a) those belonging to the Emperor
(b) those that are embalmed
(c) those that are trained
(d) suckling pigs
(e) mermaids
(f) fabulous ones
(g) stray dogs
(h) those that are included in this classification
(i) those that tremble as if they were mad
(j) innumerable ones
(k) those drawn with a very fine camel's hair brush
(l) others
(m) those that have just broken a water pitcher
(n) those that, from a great distance, resemble flies
Contemporary writers from Michel Foucault, in *The Archaeology
of Knowledge*, through George Lakoff, in *Women, Fire, and Dangerous
Things*, use Borges' Chinese encyclopedia to illustrate a range of
different propositions, but the *core* proposition is the supposed
arbitrariness -- the political character, in a sense -- of all
culturally imposed categories.
At one level, that proposition expresses a profound truth and
may encourage humility by combating cultural imperialism. At
another level, though, the proposition tells a dangerous lie: it
suggests that we have descended into the nihilism that so obsessed
Nietzsche and other thinkers -- a world where *everything* is
relative, all lines are up for grabs, all principles and
connections are just matters of purely subjective preference or,
worse still, arbitrary convention. Whether we believe that killing
animals for food is wrong, for example, becomes a question
indistinguishable from whether we happen to enjoy eating beans,
rice and tofu.
This is a particularly pernicious notion in a era when we pass
more and more of our lives in cyberspace, a place where, almost by
definition, our most familiar landmarks are rearranged or disappear
altogether -- because there is a pervasive tendency, even (and
perhaps especially) among the most enlightened, to forget that the
human values and ideals to which we commit ourselves may indeed be
universal and need not depend on how our particular cultures, or
our latest technologies, carve up the universe we inhabit. It was
my very wise colleague from Yale, the late Art Leff, who once
observed that, even in a world without an agreed-upon God, we can
still agree -- even if we can't "prove" mathematically -- that
"napalming babies is wrong."
The Constitution's core values, I'm convinced, need not be
transmogrified, or metamorphosed into oblivion, in the dim recesses
of cyberspace. But to say that they *need* not be lost there is
hardly to predict that they *will* not be. On the contrary, without
further thought and awareness of the kind this conference might
provide, the danger is clear and present that they *will* be.
The "event horizon" against which this transformation might
occur is already plainly visible:
Electronic trespassers like Kevin Mitnik don't stop with
cracking pay phones, but break into NORAD -- the North American
Defense Command computer in Colorado Springs -- not in a *WarGames*
movie, but in real life.
Less challenging to national security but more ubiquitously
threatening, computer crackers download everyman's credit history
from institutions like TRW; start charging phone calls (and more)
to everyman's number; set loose "worm" programs that shut down
thousands of linked computers; and spread "computer viruses"
through everyman's work or home PC.
It is not only the government that feels threatened by
"computer crime"; both the owners and the users of private
information services, computer bulletin boards, gateways, and
networks feel equally vulnerable to this new breed of invisible
trespasser. The response from the many who sense danger has been
swift, and often brutal, as a few examples illustrate.
Last March, U.S. Secret Service agents staged a surprise raid
on Steve Jackson Games, a small games manufacturer in
Austin, Texas, and seized all paper and electronic drafts of its
newest fantasy role-playing game, *GURPS[reg.t.m.] Cyberpunk*,
calling the game a "handbook for computer crime."
By last Spring, up to one quarter of the U.S. Treasury
Department's investigators had become involved in a project of
eavesdropping on computer bulletin boards, apparently tracking
notorious hackers like "Acid Phreak" and "Phiber Optik" through
what one journalist dubbed "the dark canyons of cyberspace."
Last May, in the now famous (or infamous) "Operation Sun Devil,"
more than 150 secret service agents teamed up with state
and local law enforcement agencies, and with security personnel
from AT&T, American Express, U.S. Sprint, and a number of the
regional Bell telephone companies, armed themselves with over two
dozen search warrants and more than a few guns, and seized 42
computers and 23,000 floppy discs in 14 cities from New York to
Texas. Their target: a loose-knit group of people in their teens
and twenties, dubbed the "Legion of Doom."
I am not describing an Indiana Jones movie. I'm talking about
America in the 1990s.
The Problem
The Constitution's architecture can too easily come to seem
quaintly irrelevant, or at least impossible to take very seriously,
in the world as reconstituted by the microchip. I propose today to
canvass five axioms of our constitutional law -- five basic
assumptions that I believe shape the way American constitutional
scholars and judges view legal issues -- and to examine how they
can adapt to the cyberspace age. My conclusion (and I will try not
to give away too much of the punch line here) is that the Framers
of our Constitution were very wise indeed. They bequeathed us a
framework for all seasons, a truly astonishing document whose
principles are suitable for all times and all technological
landscapes.
Axiom 1:
There is a Vital Difference
*Between Government and Private Action*
The first axiom I will discuss is the proposition that the
Constitution, with the sole exception of the Thirteenth Amendment
prohibiting slavery, regulates action by the *government* rather than
the conduct of *private* individuals and groups. In an article I
wrote in the Harvard Law Review in November 1989 on "The Curvature
of Constitutional Space," I discussed the Constitution's
metaphor-morphosis from a Newtonian to an Einsteinian and
Heisenbergian paradigm. It was common, early in our history, to
see the Constitution as "Newtonian in design with its carefully
counterpoised forces and counterforces, its [geographical and
institutional] checks and balances." (103 *Harv. L. Rev.* at 3.)
Indeed, in many ways contemporary constitutional law is still
trapped within and stunted by that paradigm. But today at least
some post-modern constitutionalists tend to think and talk in the
language of relativity, quantum mechanics, and chaos theory. This
may quite naturally suggest to some observers that the
Constitution's basic strategy of decentralizing and diffusing power
by constraining and fragmenting governmental authority in
particular has been rendered obsolete.
The institutional separation of powers among the three federal
branches of government, the geographical division of authority
between the federal government and the fifty state governments, the
recognition of national boundaries, and, above all, the sharp
distinction between the public and private spheres, become easy to
deride as relics of a simpler, pre-computer age. Thus Eli Noam, in
the First Ithiel de Sola Pool Memorial Lecture, delivered last
October at MIT, notes that computer networks and network
associations acquire quasi-governmental powers as they necessarily
take on such tasks as mediating their members' conflicting
interests, establishing cost shares, creating their own rules of
admission and access and expulsion, even establishing their own *de
facto* taxing mechanisms. In Professor Noam's words, "networks
become political entities," global nets that respect no state or
local boundaries. Restrictions on the use of information in one
country (to protect privacy, for example) tend to lead to export of
that information to other countries, where it can be analyzed and
then used on a selective basis in the country attempting to
restrict it. "Data havens" reminiscent of the role played by the
Swiss in banking may emerge, with few restrictions on the storage
and manipulation of information.
A tempting conclusion is that, to protect the free speech and
other rights of *users* in such private networks, judges must treat
these networks not as associations that have rights of their own
*against* the government but as virtual "governments" in themselves
-- as entities against which individual rights must be defended in
the Constitution's name. Such a conclusion would be misleadingly
simplistic. There are circumstances, of course, when
non-governmental bodies like privately owned "company towns" or
even huge shopping malls should be subjected to legislative and
administrative controls by democratically accountable entities, or
even to judicial controls as though they were arms of the state --
but that may be as true (or as false) of multinational corporations
or foundations, or transnational religious organizations, or even
small-town communities, as it is of computer-mediated networks.
It's a fallacy to suppose that, just because a computer bulletin
board or network or gateway is *something like* a shopping mall,
government has as much constitutional duty -- or even authority --
to guarantee open public access to such a network as it has to
guarantee open public access to a privately owned shopping center
like the one involved in the U.S. Supreme Court's famous *PruneYard
Shopping Center* decision of 1980, arising from nearby San Jose.
The rules of law, both statutory and judge-made, through which
each state *allocates* private powers and responsibilities themselves
represent characteristic forms of government action. That's why a
state's rules for imposing liability on private publishers, or for
deciding which private contracts to enforce and which ones to
invalidate, are all subject to scrutiny for their consistency with
the federal Constitution. But as a general proposition it is only
what *governments* do, either through such rules or through the
actions of public officials, that the United States Constitution
constrains. And nothing about any new technology suddenly erases
the Constitution's enduring value of restraining *government* above
all else, and of protecting all private groups, large and small,
from government.
It's true that certain technologies may become socially
indispensable -- so that equal or at least minimal access to basic
computer power, for example, might be as significant a
constitutional goal as equal or at least minimal access to the
franchise, or to dispute resolution through the judicial system,
or to elementary and secondary education. But all this means (or
should mean) is that the Constitution's constraints on government
must at times take the form of imposing *affirmative duties* to
assure access rather than merely enforcing *negative prohibitions*
against designated sorts of invasion or intrusion.
Today, for example, the government is under an affirmative
obligation to open up criminal trials to the press and the public,
at least where there has not been a particularized finding that
such openness would disrupt the proceedings. The government is
also under an affirmative obligation to provide free legal
assistance for indigent criminal defendants, to assure speedy
trials, to underwrite the cost of counting ballots at election
time, and to desegregate previously segregated school systems. But
these occasional affirmative obligations don't, or shouldn't, mean
that the Constitution's axiomatic division between the realm of
public power and the realm of private life should be jettisoned.
Nor would the "indispensability" of information technologies
provide a license for government to impose strict content, access,
pricing, and other types of regulation. *Books* are indispensable to
most of us, for example -- but it doesn't follow that government
should therefore be able to regulate the content of what goes onto
the shelves of *bookstores*. The right of a private bookstore owner
to decide which books to stock and which to discard, which books to
display openly and which to store in limited access areas, should
remain inviolate. And note, incidentally, that this needn't make
the bookstore owner a "publisher" who is liable for the words
printed in the books on her shelves. It's a common fallacy to
imagine that the moment a computer gateway or bulletin board begins
to exercise powers of selection to control who may be on line, it
must automatically assume the responsibilities of a newscaster, a
broadcaster, or an author. For computer gateways and bulletin
boards are really the "bookstores" of cyberspace; most of them
organize and present information in a computer format, rather than
generating more information content of their own.
Axiom 2:
The Constitutional Boundaries of Private Property
and Personality Depend on Variables Deeper Than
*Social Utility and Technological Feasibility*
The second constitutional axiom, one closely related to the
private-public distinction of the first axiom, is that a person's
mind, body, and property belong *to that person* and not to the
public as a whole. Some believe that cyberspace challenges that
axiom because its entire premise lies in the existence of computers
tied to electronic transmission networks that process digital
information. Because such information can be easily replicated in
series of "1"s and "0"s, anything that anyone has come up with in
virtual reality can be infinitely reproduced. I can log on to a
computer library, copy a "virtual book" to my computer disk, and
send a copy to your computer without creating a gap on anyone's
bookshelf. The same is true of valuable computer programs, costing
hundreds of dollars, creating serious piracy problems. This
feature leads some, like Richard Stallman of the Free Software
Foundation, to argue that in cyberspace everything should be free
-- that information can't be owned. Others, of course, argue that
copyright and patent protections of various kinds are needed in
order for there to be incentives to create "cyberspace property" in
the first place.
Needless to say, there are lively debates about what the
optimal incentive package should be as a matter of legislative and
social policy. But the only *constitutional* issue, at bottom, isn't
the utilitarian or instrumental selection of an optimal policy.
Social judgments about what ought to be subject to individual
appropriation, in the sense used by John Locke and Robert Nozick,
and what ought to remain in the open public domain, are first and
foremost *political* decisions.
To be sure, there are some constitutional constraints on these
political decisions. The Constitution does not permit anything and
everything to be made into a *private commodity*. Votes, for
example, theoretically cannot be bought and sold. Whether the
Constitution itself should be read (or amended) so as to permit all
basic medical care, shelter, nutrition, legal assistance and,
indeed, computerized information services, to be treated as mere
commodities, available only to the highest bidder, are all terribly
hard questions -- as the Eastern Europeans are now discovering as
they attempt to draft their own constitutions. But these are not
questions that should ever be confused with issues of what is
technologically possible, about what is realistically enforceable,
or about what is socially desirable.
Similarly, the Constitution does not permit anything and
everything to be *socialized* and made into a public good available
to whoever needs or "deserves" it most. I would hope, for example,
that the government could not use its powers of eminent domain to
"take" live body parts like eyes or kidneys or brain tissue for
those who need transplants and would be expected to lead
particularly productive lives. In any event, I feel certain that
whatever constitutional right each of us has to inhabit his or her
own body and to hold onto his or her own thoughts and creations
should not depend solely on cost-benefit calculations, or on the
availability of technological methods for painlessly effecting
transfers or for creating good artificial substitutes.
Axiom 3:
*Government May Not Control Information Content*
A third constitutional axiom, like the first two, reflects a
deep respect for the integrity of each individual and a healthy
skepticism toward government. The axiom is that, although
information and ideas have real effects in the social world, it's
not up to government to pick and choose for us in terms of the
*content* of that information or the *value* of those ideas.
This notion is sometimes mistakenly reduced to the naive
child's ditty that "sticks and stones may break my bones, but words
can never hurt me." Anybody who's ever been called something awful
by children in a schoolyard knows better than to believe any such
thing. The real basis for First Amendment values isn't the false
premise that information and ideas have no real impact, but the
belief that information and ideas are *too important* to entrust to
any government censor or overseer.
If we keep that in mind, and *only* if we keep that in mind,
will we be able to see through the tempting argument that, in the
Information Age, free speech is a luxury we can no longer afford.
That argument becomes especially tempting in the context of
cyberspace, where sequences of "0"s and "1"s may become virtual
life forms. Computer "viruses" roam the information nets,
attaching themselves to various programs and screwing up computer
facilities. Creation of a computer virus involves writing a
program; the program then replicates itself and mutates. The
electronic code involved is very much like DNA. If information
content is "speech," and if the First Amendment is to apply in
cyberspace, then mustn't these viruses be "speech" -- and mustn't
their writing and dissemination be constitutionally protected? To
avoid that nightmarish outcome, mustn't we say that the First
Amendment is *inapplicable* to cyberspace?
The answer is no. Speech is protected, but deliberately
yelling "Boo!" at a cardiac patient may still be prosecuted as
murder. Free speech is a constitutional right, but handing a bank
teller a hold-up note that says, "Your money or your life," may
still be punished as robbery. Stealing someone's diary may be
punished as theft -- even if you intend to publish it in book form.
And the Supreme Court, over the past fifteen years, has gradually
brought advertising within the ambit of protected expression
without preventing the government from protecting consumers from
deceptive advertising. The lesson, in short, is that
constitutional principles are subtle enough to bend to such
concerns. They needn't be broken or tossed out.
Axiom 4:
The Constitution is Founded on Normative
Conceptions of Humanity That Advances
*in Science and Technology Cannot "Disprove"*
A fourth constitutional axiom is that the human spirit is
something beyond a physical information processor. That axiom,
which regards human thought processes as not fully reducible to the
operations of a computer program, however complex, must not be
confused with the silly view that, because computer operations
involve nothing more than the manipulation of "on" and "off" states
of myriad microchips, it somehow follows that government control or
outright seizure of computers and computer programs threatens no
First Amendment rights because human thought processes are not
directly involved. To say that would be like saying that
government confiscation of a newspaper's printing press and
tomorrow morning's copy has nothing to do with speech but involves
only a taking of metal, paper, and ink. Particularly if the seizure
or the regulation is triggered by the content of the information
being processed or transmitted, the First Amendment is of course
fully involved. Yet this recognition that information processing
by computer entails something far beyond the mere sequencing of
mechanical or chemical steps still leaves a potential gap between
what computers can do internally and in communication with one
another -- and what goes on within and between human minds. It is
that gap to which this fourth axiom is addressed; the very
existence of any such gap is, as I'm sure you know, a matter of
considerable controversy.
What if people like the mathematician and physicist Roger
Penrose, author of *The Emperor's New Mind*, are wrong about human
minds? In that provocative recent book, Penrose disagrees with
those Artificial Intelligence, or AI, gurus who insist that it's
only a matter of time until human thought and feeling can be
perfectly simulated or even replicated by a series of purely
physical operations -- that it's all just neurons firing and
neurotransmitters flowing, all subject to perfect modeling in
suitable computer systems. Would an adherent of that AI orthodoxy,
someone whom Penrose fails to persuade, have to reject as
irrelevant for cyberspace those constitutional protections that
rest on the anti-AI premise that minds are *not* reducible to really
fancy computers?
Consider, for example, the Fifth Amendment, which provides
that "no person shall be . . . compelled in any criminal case to
be a witness against himself." The Supreme Court has long held
that suspects may be required, despite this protection, to provide
evidence that is not "testimonial" in nature -- blood samples, for
instance, or even exemplars of one's handwriting or voice. Last
year, in a case called *Pennsylvania v. Muniz*, the Supreme Court
held that answers to even simple questions like "When was your
sixth birthday?" are testimonial because such a question, however
straightforward, nevertheless calls for the product of mental
activity and therefore uses the suspect's mind against him. But
what if science could eventually describe thinking as a process no
more complex than, say, riding a bike or digesting a meal? Might
the progress of neurobiology and computer science eventually
overthrow the premises of the *Muniz* decision?
I would hope not. For the Constitution's premises, properly
understood, are *normative* rather than *descriptive*. The philosopher
David Hume was right in teaching that no "ought" can ever be
logically derived from an "is." If we should ever abandon the
Constitution's protection for the distinctively and universally
human, it won't be because robotics or genetic engineering or
computer science have led us to deeper truths, but rather because
they have seduced us into more profound confusions. Science and
technology open options, create possibilities, suggest
incompatibilities, generate threats. They do not alter what is
"right" or what is "wrong." The fact that those notions are
elusive and subject to endless debate need not make them totally
contingent on contemporary technology.
Axiom 5:
Constitutional Principles Should Not
*Vary With Accidents of Technology*
In a sense, that's the fifth and final constitutional axiom I
would urge upon this gathering: that the Constitution's norms, at
their deepest level, must be invariant under merely *technological*
transformations. Our constitutional law evolves through judicial
interpretation, case by case, in a process of reasoning by analogy
from precedent. At its best, that process is ideally suited to
seeing beneath the surface and extracting deeper principles from
prior decisions. At its worst, though, the same process can get
bogged down in superficial aspects of preexisting examples,
fixating upon unessential features while overlooking underlying
principles and values.
When the Supreme Court in 1928 first confronted wiretapping
and held in *Olmstead v. United States* that such wiretapping
involved no "search" or "seizure" within the meaning of the Fourth
Amendment's prohibition of "unreasonable searches and seizures,"
the majority of the Court reasoned that the Fourth Amendment
"itself shows that the search is to be of material things -- the
person, the house, his papers or his effects," and said that "there
was no searching" when a suspect's phone was tapped because the
Constitution's language "cannot be extended and expanded to include
telephone wires reaching to the whole world from the defendant's
house or office." After all, said the Court, the intervening wires
"are not part of his house or office any more than are the highways
along which they are stretched." Even to a law student in the
1960s, as you might imagine, that "reasoning" seemed amazingly
artificial. Yet the *Olmstead* doctrine still survived.
It would be illuminating at this point to compare the Supreme
Court's initial reaction to new technology in *Olmstead* with its
initial reaction to new technology in *Maryland v. Craig*, the 1990
closed-circuit television case with which we began this discussion.
In *Craig*, a majority of the Justices assumed that, when the 18th-
century Framers of the Confrontation Clause included a guarantee of
two-way *physical* confrontation, they did so solely because it had
not yet become technologically feasible for the accused to look his
accuser in the eye without having the accuser simultaneously watch
the accused. Given that this technological obstacle has been
removed, the majority assumed, one-way confrontation is now
sufficient. It is enough that the accused not be subject to
criminal conviction on the basis of statements made outside his
presence.
In *Olmstead*, a majority of the Justices assumed that, when the
18th-century authors of the Fourth Amendment used language that
sounded "physical" in guaranteeing against invasions of a person's
dwelling or possessions, they did so not solely because *physical*
invasions were at that time the only serious threats to personal
privacy, but for the separate and distinct reason that *intangible*
invasions simply would not threaten any relevant dimension of
Fourth Amendment privacy.
In a sense, *Olmstead* mindlessly read a new technology *out* of
the Constitution, while *Craig* absent-mindedly read a new technology
*into* the Constitution. But both decisions -- *Olmstead* and *Craig* --
had the structural effect of withholding the protections of the
Bill of Rights from threats made possible by new information
technologies. *Olmstead* did so by implausibly reading the
Constitution's text as though it represented a deliberate decision
not to extend protection to threats that 18th-century thinkers
simply had not foreseen. *Craig* did so by somewhat more plausibly
-- but still unthinkingly -- treating the Constitution's seemingly
explicit coupling of two analytically distinct protections as
reflecting a failure of technological foresight and imagination,
rather than a deliberate value choice.
The *Craig* majority's approach appears to have been driven in
part by an understandable sense of how a new information technology
could directly protect a particularly sympathetic group, abused
children, from a traumatic trial experience. The *Olmstead*
majority's approach probably reflected both an exaggerated estimate
of how difficult it would be to obtain wiretapping warrants even
where fully justified, and an insufficient sense of how a new
information technology could directly threaten all of us. Although
both *Craig* and *Olmstead* reveal an inadequate consciousness about
how new technologies interact with old values, *Craig* at least seems
defensible even if misguided, while *Olmstead* seems just plain
wrong.
Around 23 years ago, as a then-recent law school graduate
serving as law clerk to Supreme Court Justice Potter Stewart, I
found myself working on a case involving the government's
electronic surveillance of a suspected criminal -- in the form of
a tiny device attached to the outside of a public telephone booth.
Because the invasion of the suspect's privacy was accomplished
without physical trespass into a "constitutionally protected area,"
the Federal Government argued, relying on *Olmstead*, that there had
been no "search" or "seizure," and therefore that the Fourth
Amendment "right of the people to be secure in their persons,
houses, papers, and effects, against unreasonable searches and
seizures," simply did not apply.
At first, there were only four votes to overrule *Olmstead* and
to hold the Fourth Amendment applicable to wiretapping and
electronic eavesdropping. I'm proud to say that, as a 26-year-old
kid, I had at least a little bit to do with changing that number
from four to seven -- and with the argument, formally adopted by a
seven-Justice majority in December 1967, that the Fourth Amendment
"protects people, not places." (389 U.S. at 351.) In that
decision, *Katz v. United States*, the Supreme Court finally
repudiated *Olmstead* and the many decisions that had relied upon it
and reasoned that, given the role of electronic telecommunications
in modern life, the First Amendment purposes of protecting *free
speech* as well as the Fourth Amendment purposes of protecting
*privacy* require treating as a "search" any invasion of a person's
confidential telephone communications, with or without physical
trespass.
Sadly, nine years later, in *Smith v. Maryland*, the Supreme
Court retreated from the *Katz* principle by holding that no search
occurs and therefore no warrant is needed when police, with the
assistance of the telephone company, make use of a "pen register",
a mechanical device placed on someone's phone line that records all
numbers dialed from the phone and the times of dialing. The
Supreme Court, over the dissents of Justices Stewart, Brennan, and
Marshall, found no legitimate expectation of privacy in the numbers
dialed, reasoning that the digits one dials are routinely recorded
by the phone company for billing purposes. As Justice Stewart, the
author of *Katz*, aptly pointed out, "that observation no more than
describes the basic nature of telephone calls . . . . It is simply
not enough to say, after *Katz*, that there is no legitimate
expectation of privacy in the numbers dialed because the caller
assumes the risk that the telephone company will expose them to the
police." (442 U.S. at 746-747.) Today, the logic of *Smith* is
being used to say that people have no expectation of privacy when
they use their cordless telephones since they know or should know
that radio waves can be easily monitored!
It is easy to be pessimistic about the way in which the
Supreme Court has reacted to technological change. In many
respects, *Smith* is unfortunately more typical than *Katz* of the way
the Court has behaved. For example, when movies were invented, and
for several decades thereafter, the Court held that movie
exhibitions were not entitled to First Amendment protection. When
community access cable TV was born, the Court hindered municipal
attempts to provide it at low cost by holding that rules requiring
landlords to install small cable boxes on their apartment buildings
amounted to a compensable taking of property. And in *Red Lion v.
FCC*, decided twenty-two years ago but still not repudiated today,
the Court ratified government control of TV and radio broadcast
content with the dubious logic that the scarcity of the
electromagnetic spectrum justified not merely government policies
to auction off, randomly allocate, or otherwise ration the spectrum
according to neutral rules, but also much more intrusive and
content-based government regulation in the form of the so-called
"fairness doctrine."
Although the Supreme Court and the lower federal courts have
taken a somewhat more enlightened approach in dealing with cable
television, these decisions for the most part reveal a curious
judicial blindness, as if the Constitution had to be reinvented
with the birth of each new technology. Judges interpreting a late
18th century Bill of Rights tend to forget that, unless its *terms*
are read in an evolving and dynamic way, its *values* will lose even
the *static* protection they once enjoyed. Ironically, *fidelity* to
original values requires *flexibility* of textual interpretation. It
was Judge Robert Bork, not famous for his flexibility, who once
urged this enlightened view upon then Judge (now Justice) Scalia,
when the two of them sat as colleagues on the U.S. Court of Appeals
for the D.C. Circuit.
Judicial error in this field tends to take the form of saying
that, by using modern technology ranging from the telephone to the
television to computers, we "assume the risk." But that typically
begs the question. Justice Harlan, in a dissent penned two decades
ago, wrote: "Since it is the task of the law to form and project,
as well as mirror and reflect, we should not . . . merely recite .
. risks without examining the *desirability* of saddling them upon
society." (*United States v. White*, 401 U.S. at 786). And, I would
add, we should not merely recite risks without examining how
imposing those risks comports with the Constitution's fundamental
values of *freedom*, *privacy*, and *equality*.
Failing to examine just that issue is the basic error I
believe federal courts and Congress have made:
* in regulating radio and TV broadcasting without
adequate sensitivity to First Amendment values;
* in supposing that the selection and editing of
video programs by cable operators might be less
than a form of expression;
* in excluding telephone companies from cable and
other information markets;
* in assuming that the processing of "O"s and "1"s
by computers as they exchange data with one
another is something less than "speech"; and
* in generally treating information processed
electronically as though it were somehow less
entitled to protection for that reason.
The lesson to be learned is that these choices and these
mistakes are not dictated by the Constitution. They are decisions
for us to make in interpreting that majestic charter, and in
implementing the principles that the Constitution establishes.
*Conclusion*
If my own life as a lawyer and legal scholar could leave just
one legacy, I'd like it to be the recognition that the Constitution
*as a whole* "protects people, not places." If that is to come
about, the Constitution as a whole must be read through a
technologically transparent lens. That is, we must embrace, as a
rule of construction or interpretation, a principle one might call
the "cyberspace corollary." It would make a suitable
Twenty-seventh Amendment to the Constitution, one befitting the
200th anniversary of the Bill of Rights. Whether adopted all at
once as a constitutional amendment, or accepted gradually as a
principle of interpretation that I believe should obtain even
without any formal change in the Constitution's language, the
corollary I would propose would do for *technology* in 1991 what I
believe the Constitution's Ninth Amendment, adopted in 1791, was
meant to do for *text*.
The Ninth Amendment says: "The enumeration in the
Constitution, of certain rights, shall not be construed to deny or
disparage others retained by the people." That amendment provides
added support for the long-debated, but now largely accepted,
"right of privacy" that the Supreme Court recognized in such
decisions as the famous birth control case of 1965, *Griswold v.
Connecticut*. The Ninth Amendment's simple message is: The *text*
used by the Constitution's authors and ratifiers does not exhaust
the values our Constitution recognizes. Perhaps a Twenty-seventh
Amendment could convey a parallel and equally simple message: The
*technologies* familiar to the Constitution's authors and ratifiers
similarly do not exhaust the *threats* against which the
Constitution's core values must be protected.
The most recent amendment, the twenty-sixth, adopted in 1971,
extended the vote to 18-year-olds. It would be fitting, in a world
where youth has been enfranchised, for a twenty-seventh amendment
to spell a kind of "childhood's end" for constitutional law. The
Twenty-seventh Amendment, to be proposed for at least serious
debate in 1991, would read simply:
"This Constitution's protections for the freedoms of
speech, press, petition, and assembly, and its
protections against unreasonable searches and seizures
and the deprivation of life, liberty, or property without
due process of law, shall be construed as fully
applicable without regard to the technological method or
medium through which information content is generated,
stored, altered, transmitted, or controlled."
[Note: The machine-readable original of this was provided by the
author on a PC diskette in WordPerfect. It was reformatted to
ASCII, appropriate for general network and computer access, by Jim Warren.
Text that was underlined or boldface in the original copy was delimited
by asterisks, and a registered trademark symbol was replaced by
"reg.t.m.". Other than that, the text was as provided by the author.]
Civil Liberties in Cyberspace:
When does hacking turn from an exercise
of civil liberties into crime?
by Mitchell Kapor
published in Scientific American,
September, 1991.
On March 1, 1990, the U.S. Secret Service raided the offices of Steve
Jackson, an entrepreneurial publisher in Austin, Tex. Carrying a
search warrant, the authorities confiscated computer hardware and
software, the drafts of his about-to-be-released book and many business
records of his company, Steve Jackson Games. They also seized the
electronic bulletin-board system used by the publisher to communicate
with customers and writers, thereby seizing all the private electronic
mail on the system.
The Secret Service held some of the equipment and material for months,
refusing to discuss their reasons for the raid. The publisher was forced
to reconstruct his book from old manuscripts, to delay filling orders
for it and to lay off half his staff. When the warrant application was
finally unsealed months later, it confirmed that the publisher was
never suspected of any crime.
Steve Jackson's legal difficulties are symptomatic of a widespread
problem. During the past several years, dozens of individuals have been
the subject of similar searches and seizures. In any other context, this
warrant might never have been issued. By many interpretations, it
disregarded the First and Fourth Amendments to the U. S. Constitution,
as well as several existing privacy laws. But the government proceeded
as if civil liberties did not apply. In this case, the government was
investigating a new kind of crime -- computer crime.
The circumstances vary, but a disproportionate number of cases share a
common thread: the serious misunderstanding of computer-based communi-
cation and its implications for civil liberties. We now face the task
of adapting our legal institutions and societal expectations to the
cultural phenomena that even now are springing up from communications
technology.
Our society has made a commitment to openness and to free
communication. But if our legal and social institutions fail to adapt
to new technology, basic access to the global electronic media could be
seen as a privilege, granted to those who play by the strictest rules,
rather than as a right held by anyone who needs to communicate. To
assure that these freedoms are not compromised, a group of computer
experts, including myself, founded the Electronic Frontier Foundation
(EFF) in 1990.
In many respects, it was odd that Steve Jackson Games got caught up in a
computer crime investigation at all. The company publishes a popular,
award-winning series of fantasy roleplaying games, produced in the
form of elaborate rule books. The raid took place only because law
enforcement officials misunderstood the technologies -- computer
bulletin-board systems (BBSs) and on-line forums -- and misread the
cultural phenomena that those technologies engender.
Like a growing number of businesses, Steve Jackson Games operated an
electronic bulletin board to facilitate contact between players of its
games and their authors. Users of this bulletin-board system dialed in
via modem from their personal computers to swap strategy tips, learn
about game upgrades, exchange electronic mail and discuss games and
other topics.
Law enforcement officers apparently became suspicious when a Steve
Jackson Games employee -- on his own time and on a BBS he ran from his
house -- made an innocuous comment about a public domain protocol for
transferring computer files called Kermit. In addition, officials
claimed that at one time the employee had had on an electronic
bulletin board a copy of Phrack, a widely disseminated electronic publi-
cation, that included information they believed to have been stolen from
a BellSouth computer.
The law enforcement officials interpreted these facts as unusual
enough to justify not only a search and seizure at the employee's
residence but also the search of Steve Jackson Games and the seizure of
enough equipment to disrupt the business seriously. Among the items
confiscated were all the hard copies and electronically stored copies of
the manuscript of a rule book for a role-playing game called GURPS
Cyberpunk, in which inhabitants of so-called cyberspace invade
corporate and government computer systems and steal sensitive data.
Law enforcement agents regarded the book, in the words of one, as "a
handbook for computer crime."
A basic knowledge of the kinds of computer intrusion that are
technically possible would have enabled the agents to see that GURPS
Cyberpunk was nothing more than a science fiction creation and that
Kermit was simply a legal, frequently used computer program.
Unfortunately, the agents assigned to investigate computer crime did not
know what -- if anything -- was evidence of criminal activity.
Therefore, they intruded on a small business without a reasonable
basis for believing that a crime had been committed and conducted a
search and seizure without looking for "particular" evidence, in vi-
olation of the Fourth Amendment of the Constitution.
Searches and seizures of such computer systems affect the rights of
not only their owners and operators but also the users of those systems.
Although most BBS users have never been in the same room with the
actual computer that carries their postings, they legitimately expect
their electronic mail to be private and their lawful associations to
be protected.
The community of bulletin-board users and computer networkers may be
small, but precedents must be understood in a greater context. As
forums for debate and information exchange, computer-based bulletin
boards and conferencing systems support some of the most vigorous
exercise of the First Amendment freedoms of expression and association
that this country has ever seen. Moreover, they are evolving rapidly
into large-scale public information and communications utilities.
These utilities will probably converge into a digital national public
network that will connect nearly all homes and businesses in the U.S.
This network will serve as a main conduit for commerce, learning,
education and entertainment in our society, distributing images and
video signals as well as text and voice. Much of the content of this
network will be private messages serving as "virtual" town halls,
village greens and coffeehouses, where people post their ideas in public
or semipublic forums.
Yet there is a common perception that a defense of electronic civil
liberties is somehow opposed to legitimate concerns about the
prevention of computer crime. The conflict arises, in part, because
the popular hysteria about the technically sophisticated youths known as
hackers has drowned out reasonable discussion.
Perhaps inspired by the popular movie _WarGames_, the general public
began in the 1980s to perceive computer hackers as threats to the
safety of this country's vital computer systems. But the image of
hackers as malevolent is purchased at the price of ignoring the
underlying reality -- the typical teenage hacker is simply tempted by
the prospect of exploring forbidden territory. Some are among our best
and brightest technological talents: hackers of the 1960s and 1970s,
for example, were so driven by their desire to master, understand and
produce new hardware and software that they went on to start companies
called Apple, Microsoft and Lotus.
How do we resolve this conflict? One solution is ensure that our scheme
of civil and criminal laws provides sanctions in proportion to the
offenses. A system in which an exploratory hacker receives more time in
jail than a defendant convicted of assault violates our sense of
justice. Our legal tradition historically has shown itself capable of
making subtle and not-so-subtle distinctions among criminal offenses.
There are, of course, real threats to network and system security. The
qualities that make the ideal network valuableQits popularity, its
uniform commands, its ability to handle financial transactions and its
international access -- also make it vulnerable to a variety of
abuses and accidents. It is certainly proper to hold hackers
accountable for their offenses, but that accountability should never
entail denying defendants the safeguards of the Bill of Rights,
including the rights to free expression and association and to free-
dom from unreasonable searches and seizures.
We need statutory schemes that address the acts of true computer crim-
inals (such as those who have created the growing problem of toll and
credit-card fraud) while distinguishing between those criminals and
hackers whose acts are most analogous to noncriminal trespass. And we
need educated law enforcement officials who will be able to recognize
and focus their efforts on the real threats.
The question then arises: How do we help our institutions, and
perceptions, adapt? The first step is to articulate the kinds of values
we want to see protected in the electronic society we are now shaping
and to make an agenda for preserving the civil liberties that are
central to that society. Then we can draw on the appropriate legal
traditions that guide other media. The late Ithiel de Sola Pool argued
in his influential book Technologies of Freedom that the medium of
digital communications is heir to several traditions of control: the
press, the common carrier and the broadcast media.
The freedom of the press to print and distribute is explicitly
guaranteed by the First Amendment. This freedom is somewhat limited,
particularly by laws governing obscenity and defamation, but the thrust
of First Amendment law, especially in this century, prevents the
government from imposing "prior restraint" on publications.
Like the railroad networks, the telephone networks follow common-car-
rier principles -- they do not impose content restrictions on the
"cargo" they carry. It would be unthinkable for the telephone company to
monitor our calls routinely or cut off conversations because the
subject matter was deemed offensive.
Meanwhile the highly regulated broadcast media are grounded in the
idea, arguably mistaken, that spectrum scarcity and the pervasiveness
of the broadcast media warrant government allocation and control of
access to broadcast frequencies (and some control of content). Access
to this technology is open to any consumer who can purchase a radio or
television set, but it is nowhere near as open for information
producers.
Networks as they now operate contain elements of publishers,
broadcasters, bookstores and telephones, but no one model fits. This
hybrid demands new thinking or at least a new application of the old
legal principles. As hybrids, computer networks also have some features
that are unique among the communications media. For example, most
conversations on bulletin boards, chat lines and conferencing systems
are both public and private at once. The electronic communicator speaks
to a group of individuals, only some of whom are known personally, in a
discussion that may last for days or months.
But the dissemination is controlled, because the membership is limited
to the handful of people who are in the virtual room, paying attention.
Yet the result may also be "published" -- an archival textual or voice
record can be automatically preserved, and newcomers can read the
backlog. Some people tend to equate on-line discussions with party (or
party-line) conversations, whereas others compare them to newspapers
and still others think of citizens band radio.
In this ambiguous context, freespeech controversies are likely to
erupt. Last year an outcry went up against the popular Prodigy comput-
er service, a joint venture of IBM and Sears, Roebuck and Co. The
problem arose because Prodigy management regarded their service as
essentially a newspaper" or "magazine," for which a hierarchy of
editorial control is appropriate. Some of Prodigy's customers, in
contrast, regarded the service as more of a forum or meeting place.
When users of the system tried to protest Prodigy's policy, its editors
responded by removing the discussion. then the protestors tried to
use electronic mail as a substitute for electron- assembly,
communicating through huge mailing lists. Prodigy placed a limit on the
number of messages each individual could send.
The Prodigy controversy illustrates important principle that belongs on
civil liberties agenda for the future: freedom-of-speech issues will not
disappear simply because a service provider has tried to impose a
metaphor on its service. Subscribers sense, I believe, that freedom of
speech on the networks is central for individuals to use electronic
communications. Science fiction writer William Gibson once remarked
that "the street finds its own uses for things." Network service pro-
viders will continue to discover that their customers will always find
their own best uses for new media.
Freedom of speech on networks will be promoted by limiting content-based
regulations and by promoting competition among providers of network
services. The first is necessary because governments will be tempted
to restrict the content of any information service they subsidize or
regulate. The second is necessary because market competition is the
most efficient means of ensuring that needs of network users will be
met.
The underlying network should essentially be a "carrier" -- it should
operate under a content-neutral regime in which access is available to
any entity that can pay for it. The information and forum services would
be "nodes" on this network. (Prodigy, like GEnie and CompuServe,
currently maintains its own proprietary infrastructure, but a future
version of Prodigy might share the same network with services like
CompuServe.)
Each service would have its own unique character and charge its own
rates. If a Prodigy-like entity correctly perceives a need for an
electronic "newspaper" with strong editorial control, it will draw an
audience. Other less hierarchical services will share the network with
that "newspaper" yet find their own market niches, varying by format and
content.
The prerequisite for this kind of competition is a carrier capable of
highbandwidth traffic that is accessible to individuals in every
community. Like common carriers, these network carriers should be seen
as conduits for the distribution of electronic transmissions. They
should not be allowed to change the content of a message or to discrim-
inate among messages.
This kind of restriction will require shielding the carriers from legal
liabilities for libel, obscenity and plagiarism. Today the ambiguous
state of liability law has tempted some computer network carriers to
reduce their risk by imposing content restrictions. This could be
avoided by appropriate legislation. Our agenda requires both that the
law shield carriers from liability based on content and that carriers
not be allowed to discriminate.
All electronic "publishers" should be allowed equal access to networks.
Ultimately, there could be hundreds of thousands of these information
providers, as there are hundreds of thousands of print publishers
today. As "nodes," they will be considered the conveners of the
environments within which on-line assembly takes place.
None of the old definitions will suffice for this role. For example,
to safeguard the potential of free and open inquiry, it is desirable
to preserve each electronic publisher's control over the general flow
and direction of material under his or her imprimaturQin effect, to give
the "sysop," or system operator, the prerogatives and protections of a
publisher.
But it is unreasonable to expect the sysop of a node to review every
message or to hold the sysop to a publish er's standard of libel.
Message traffic on many individually owned services is already too
great for the sysop to review. We can only expect the trend to grow.
Nor is it appropriate to compare nodes to broadcasters (an analogy
likely to lead to licensing and content-based regulation). Unlike the
broadcast media, nodes do not dominate the shared resource of a public
community, and they are not a pervasive medium. To take part in a
controversial discussion, a user must actively seek entry into the
appropriate node, usually with a subscription and a password.
Anyone who objects to the content of a node can find hundreds of other
systems where they might articulate their ideas more freely. The danger
is if choice is somehow restricted: if all computer networks in the
country are restrained from allowing discussion on particular subjects
or if a publicly sponsored computer network limits discussion.
This is not to say that freedom-of-speech principles ought to protect
all electronic communications. Exceptional cases, such as the BBS used
primarily to traffic in stolen long-distance access codes or credit-card
numbers, will always arise and pose problems of civil and criminal
liability. We know that electronic freedom of speech, whether in public
or private systems, cannot be absolute. In face-to-face conversation and
printed matter today, it is commonly agreed that freedom of speech
does not cover the communications inherent in criminal conspiracy,
fraud, libel, incitement to lawless action and copyright infringement.
If there are to be limits on electronic freedom of speech, what
precisely should those limits be? One answer to this question is the
U.S. Supreme Court's 1969 decision in Brandenburg v. Ohio. The court
ruled that no speech should be subject to prior restraint or criminal
prosecution unless it is intended to incite and is likely to cause
imminent lawless action.
In general, little speech or publication falls outside of the
protections of the Brandenburg case, since most people are able to
reflect before acting on a written or spoken suggestion. As in
traditional media, any on-line messages should not be the basis of
criminal prosecution unless the Brandenburg standard is met.
Other helpful precedents include cases relating to defamation and
copyright infringement. Free speech does not mean one can damage a
reputation or appropriate a copyrighted work without being called to
account for it. And it probably does not mean that one can release a
virus across the network in order to "send a message" to network
subscribers. Although the distinction is trickier than it may first
appear, the release of a destructive program, such as a virus, may be
better analyzed as an act rather than as speech.
Following freedom of speech on our action agenda is freedom from unrea-
sonable searches and seizures. The Steve Jackson case was one of many
cases in which computer equipment and disks were seized and held some-
times for months -often without a specific charge being filed. Even when
only a few files were relevant to an investigation, entire computer
systems, including printers, have been removed with their hundreds of
files intact.
Such nonspecific seizures and searches of computer data allow "rummag-
ing," in which officials browse through private files in search of
incriminating evidence. In addition to violating the Fourth Amendment
requirement that searches and seizures be "particular," these searches
often run afoul of the Electronic Communications Privacy Act of 1986.
This act prohibits the government from seizing or intercepting elec-
tronic communications without proper authorization. They also contravene
the Privacy Protection Act of 1980, which prohibits the government from
searching the offices of Dublishers for documents, including
materials that are electronically stored.
We can expect that law enforcement agencies and civil libertarians
will agree over time about the need to establish procedures for
searches and seizures of "particular" computer data and hardware. Law
enforcement officials will have to adhere to guidelines in the above
statutes to achieve Fourth Amendment "particularity" while maximizing
the efficiency of their searches. They also will have to be trained to
make use of software tools that allow searches for particular files or
particular information within files on even the most capacious hard
disk or optical storage device.
Still another part of the solution will be law enforcement's abandonment
of the myth of the clever criminal hobbyist. Once law enforcement no
longer assumes worst-case behavior but looks instead for real evidence
of criminal activity, its agents will learn to search and seize only
what they need.
Developing and implementing a civil liberties agenda for computer net-
works will require increasing participation by technically trained
people. Fortunately, there are signs that this is begining to happen.
The Computers, Freedom and Privacy Conference, held last spring in San
Francisco, along with electronic conferences on the WELL (Whole Earth
'Lectronic Link) and other computer networks, have brought law
enforcement officials, supposed hackers and interested members of the
computer community together in a spirit of free and frank discussion.
Such gatherings are beginning to work out the civil liberties guidelines
for a networked society.
There is general agreement, for example, that a policy on electronic
crime should offer protection for security and privacy on both
individual and institutional systems. Defining a measure of damages
and setting proportional punishment will require further goodfaith
deliberations by the community involved with electronic freedoms, in-
cluding the Federal Bureau of Investigation, the Secret Service, the
bar associations, technology groups, telephone companies and civil
libertarians. It will be especially important to represent the damage
caused by electronic crime accurately and to leave room for the valuable
side of the hacker spirit: the interest in increasing legitimate under-
standing through exploration.
We hope to see a similar emerging consensus on security issues. Network
systems should be designed not only to provide technical solutions to
security problems but also to allow system operators to use them
without infringing unduly on the rights of users. A security system
that depends on wholesale monitoring of traffic, for example, would
create more problems than it would solve.
Those parts of a system where damage would do the greatest harm --
financial records, electronic mail, military data -- should be
protected. This involves installing more effective computer security
measures, but it also means redefining the legal interpretations of
copyright, intellectual property, computer crime and privacy so that
system users are protected against individual criminals and abuses by
large institutions. These policies should balance the need for civil
liberties against the need for a secure, orderly, protected electronic
society.
As we pursue that balance, of course, confrontations will continue to
take place. In May of this year, Steve Jackson Games, with the support
of the EFF, filed suit against the Secret Service, two individual Secret
Service agents, an assistant U.S. attorney and others.
The EFF is not seeking confrontation for its own sake. One of the
realities of our legal system is that one often has to fight for a legal
or constitutional right in the courts in order to get it recognized
outside the courts. One goal of the lawsuit is to establish clear
grounds under which search and seizure of electronic media is
"unreasonable" and unjust. Another is to establish the clear
applicability of First Amendment principles to the new medium.
But the EFF's agenda extends far beyond liagation. Our larger agenda
includes sponsoring a range of educational initiatives aimed at the
public's general lack of familiarity with the technology and its
potential. That is why there is an urgent need for technologically
knowledgeable people to take part in the public debate over communica-
tions policy and to help spread their understanding of these issues.
Fortunately, the very technology at stake -- electronic conferencing
-- makes it easier than ever before to get involved in the debate.
C.U.H.S. Flash Reports:
------------------------------------------------------------------------------
EFF Sections Revised by CUHS
------------------------------------------------------------------------------
EFF Action Alerts and Special Announcements Archive
What's HOT
* EFF & Bernstein File Suit to Overturn Cryptography Restrictions
(Feb. 21, 1995)
+ UPDATE: Bernstein case goes to trial, come on down, and show
your support! (Oct. 14, expires Oct 21, 1995)
+ What YOU can do: Support the EFF Cyberspace Legal Defense
Fund
+ The Complaint (charges) filed by EFF & Dan Bernstein against
the State Dept. et al. (Feb. 21, 1995)
+ The Dept. of State's (weak, and dull) respose to the
EFF/Bernstein suit (May, 1995)
+ UPDATE: Phil Karn has also filed suit against the Dept. of
State for First Amendment violations via ITAR crypto export
restrictions (Sep. 21, 1995)
+ More documents related to the Bernstein case and the
Karn/Schneier case
+ Detailed analysis of the problems posed by US crypto export
restrictions
+ The EFF ITAR & Crypto Export Archive
* EFF Opposes Censorship Bills (UPDATED June 19) - Exon's
"Communications Decency" legislation would criminalize users and
system operators for Constitutionally-protected speech. Full
analysis of Internet censorship bill passed by Senate; includes
text of bill. Info on other bills by Feinstein, Dole, etc. below.
+ What YOU can do - ACTION ALERT! (NEW - UPDATED Oct. 1)
+ ALERT for sysops, ISPs and online business providers (NEW
Oct. 20)
Mail for latest update on status of the Comm. Decency Act (just
send empty message - it's an infobot - but be sure it
includes a return address in headers.) NOTE! The Exon/Coats
Comm. Decency Act PASSED the Senate June 14, by an
overwhelming majority. Action now moves to the House of
Representatives, action expected in July.
The full text of the Exon/Coats CDA as it passed the Senate.
Editorial examining online content regulation issues by EFF Board
member David Johnson
Leahy's counter-legislation to the Exon bill. The Leahy bill,
ex-S.714, is called the "Child Protection, User Empowerment,
and Free Expression in Interactive Media Study" bill).
UPDATE: This bill was proposed as an amendment to the Senate
telecom bill, S.652, as Amendment 1288. It was accepted,
removing the Exon bill, but then was replaced by the new
Exon/Coats Comm. Decency Act. Dark days indeed. BUT: Leahy's
bill, sponsored in the House by Rep. Ron Klink, is already in
the House Telecom Reform Bill, so we have a fighting chance
at stoping the CDA. (June 15 95).
US House of Representatives Bill HR1004 (full text of House
version of the CDA, currently going nowhere, fortunately.
Expected to be introduced in modfied form, however, as an
amendment to the House telecom bill in opposition to the
Leahy/Klink legislation.)
Clinton Administration Statement on Senate Telecom Reform Bill
S.652 (incl. the Comm. Decency Act.) (Apr. 1995)
Dept. of Justice Letter Condemning the Comm. Decency bill, but
calling for "better" DoJ-authored legislation. (May 3, 1995)
Cato Institute Paper on the Exon bill, the Comstock Law and
Censorship (June 28 1995)
EFF S314/HR1004/S652 Archive - more analysis and related material
VTW Internet Censorship Legislation Archive - more analysis and
related material
CDT Internet Censorship Legislation Archive - more analysis and
related material
Pathfinder Internet Censorship Legislation Page (provides links
to many items of interest on this issue.)
Paul Ste. Marie's Internet Censorship Legislation Archive -
particularly geared for Ohio residents
* Senators Dole & Grassley to Introduce Worst Internet Censorship
Legislation Yet (June 6). UPDATE: This bill was introduced on
the 8th as S.892. Currently in commitee.(June 9)
+ Full text of Draconian legislation introduced by Dole &
Grassley (June 6)
* Sen. Feinstein in On It Too: New Draft Legislation to Censor
Internet Bomb-Related Speech (June 4) UPDATE: The Terrorism bill
with a version of this amendment PASSED the Senate on June 8.
+ Full text of draft Feinstein censorship amendment to
anti-terrorism bill (June 4) UPDATE: Please note that this is
NOT the version of the bill that passed. It passed with very
substantive amendments. Check back later, we expect to get
the passed version soon. (June 9).
* EFF Opposes Church of Scientology Usenet Censorship and Legal
Harassment of Sysops & Admins (Jan. 23, 1995)
+ What YOU can do: Support the EFF Cyberspace Legal Defense
Fund
+ BBS Sysop Tom Klemesrud's court declaration against CoS
restraining order (Feb. 21, 1995) - the judge removed the
restraining order against both Klemesrud and Netcom.
+ CoS Press release in response to the above (Feb. 21, 1995) -
makes many fantastic claims about one of the defendants,
Dennis Erlich. (Includes a sound critique, showing just how
bogus much of this release really is.)
+ More documents related to the CoS cases
* EFF Submits Amicus Brief in Support of SysOps in AABBS Appeal
(Apr. 19, 1995)
+ What YOU can do: Support the EFF Cyberspace Legal Defense
Fund
+ More information on the AABBS case
* EFF Announces Steps to Defend PGP Author Phil Zimmermann
+ What YOU can do: Support the Phil Zimmermann Legal Defense
Fund
+ More information on Zimmermann's plight
+ More information on PGP (the 'Pretty Good Privacy' encryption
program)
* EFF & Other Non-Profits Urge VP Gore to Add Free Speech to G-7 GII
Priorities (Feb. 16, 1995)
+ The Letter to VP Gore (Feb. 16, 1995) - signatories: EFF,
HRW, CDT, EPIC, ACLU, ALA, Article 19, PFAW, and PI
+ The EFF Censorship and Free Expression Archive
+ The EFF Information Infrastructure Archive
* EFF For-Sale & Wanted Page
(EFF needs to get rid of some items, and needs to obtain various
pieces of hardware and software. Here's our virtual swapmeet.)
_________________________________________________________________
Links to Related Off-Site Resources
* Center for Democracy & Technology's Action Items Page
* FACT's First Amendment and Censorship Alerts
_________________________________________________________________
[email protected]
12/13/88
--------
DARPA ESTABLISHES COMPUTER EMERGENCY RESPONSE TEAM
The Defense Advanced Research Projects Agency (DARPA) announced today
that it has established a Computer Emergency Response Team (CERT) to
address computer security concerns of research users of the InterNet,
which includes ARPANET. The Coordination Center for the CERT is located
at the Software Engineering Institute (SEI), Carnegie Mellon University,
Pittsburgh, PA.
In providing direct service to the InterNet community, the CERT will
focus on the special needs of the research community and serve as a
prototype for similar operations in other computer communities. The
National Computer Security Center and the National Institute of Standards
and Technology will have a leading role in coordinating the creation
of these emergency response activities.
The CERT is intended to respond to computer security threats such as the
recent self-replicating computer program ("computer virus") that invaded
many defense and research computers.
The CERT will assist the research network communities in responding to
emergency situations. It will have the capability to rapidly establish
communications with experts working to solve the problems, with the
affected computer users and with government authorities as appropriate.
Specific responses will be taken in accordance with DARPA policies.
It will also serve as a focal point for the research community for
identification and repair of security vulnerabilities, informal
assessment of existing systems in the research community, improvement
to emergency response capability, and user security awareness. An
important element of this function is the development of a network of
key points of contact, including technical experts, site managers,
government action officers, industry contacts, executive-level decision
makers and investigative agencies, where appropriate.
Because of the many network, computer, and systems architectures and
their associated vulnerabilities, no single organization can be
expected to maintain an in-house expertise to respond on its own to
computer security threats, particularly those that arise in the
research community. As with biological viruses, the solutions must
come from an organized community response of experts. The role of
the CERT Coordination Center at the SEI is to provide the supporting
mechanisms and to coordinate the activities of experts in DARPA and
associated communities.
The SEI has close ties to the Department of Defense, to defense and
commercial industry, and to the research community. These ties place
the SEI in a unique position to provide coordination support to the
software experts in research laboratories and in industry who will
be responding in emergencies and to the communities of potentially
affected users.
The SEI is a federally-funded research and development center, operating
under DARPA sponsorship with the Air Force Systems Command (Electronic
Systems Division) serving as executive agent. Its goal is to accelerate
the transition of software technology to defense systems. Computer
security is primarily a software problem, and the presence of CERT
at the SEI will enhance the technology transfer mission of the SEI
in security-related areas.
END
C.U.H.S. 11/95
Volume 1 Number 1
Bibliography: (Web-Site Archives)
------------------------------------------------------------------------------
EFF /pub/Legal/*
EFF /pub/Alerts/*
EFF Pictures provided by EFF
CuD Archives provided by EFF
DnA Pictures provided by DnA Newsletters (DnA2i2.zip)
Group Updates provided by "Su Home Page"
EFF-
http://www.eff.org
EFF-
ftp://ftp.eff.org
Su -
http://www.csusm.edu/public/guests/fm/su.html
------------------------------------------------------------------------------
*EFF: Electronic Frontier Foundation
CuD: Computer Underground Digest
DnA: Digital News Association
Su : SuperUnknown Registery