صور الصفحة
PDF
النشر الإلكتروني
[ocr errors][ocr errors][merged small][merged small][ocr errors][ocr errors]
[ocr errors]
[ocr errors][ocr errors][ocr errors][ocr errors][ocr errors][ocr errors][ocr errors]
[ocr errors][ocr errors]

The United States Court of Appeals for the Ninth Circuit bao liaised autores Sally the scope of the ITAR According to that Court, the ITAR "probibits only the expertation of technical data significantly and directly related to aphe articles on the Munisone List" and is drcumstances where the data could have both military and peaceful applications ⚫uch prohibition la en forceable only to the extent that the saporter knows-er has reason t know

that the information is intended for the protubitand (military) (United) Singer. Idier Industries Inc)

Unlicensed export of materials or data included on the Munitions List-i "willful" can result in fine of up to $100.000 and/or imprisonment for up to two years The Act provides for avil penalties as well.

The ITAR must be viewed as an imperfect tool for restricting the transfer of harcal data Its infirmities may well explain the NSA efforts to construct, through dialogus, the informal mach ⚫aim recommended by the ACE Committen. The problems of ITAR areas fellow

Firet me ens really knows what the dchainen of "technical data” eno paser and how it might specifically apply to cryptological information The dið, oliy of pianfying this deĥastion is mplied by the Department of State's prve nawoletter (Newsletter Na which that chowed det" desa bot invlade mathematical concepta bet racludes vertara algonihmama kamally software park

[ocr errors]
[ocr errors]
[ocr errors]
[ocr errors][ocr errors][ocr errors][merged small]
[ocr errors]
[ocr errors]
[ocr errors]

sountry with the knowledge or
intens that the date will be shipped

treenitved to another forese
country Technical date may be
reirard for respon shrough (1)
imal inspection of US orgin
equipment and farristers abroad.
Q and exchanges of information
abroad and C) the application to
situations abroad of personal
knowledge or technical expeTIENCE
acquired in the United States
There is a so-ca Bed "General License"
-that is, a lure granted automatically
by EAR without the need of application
-for technical data falling in the

The deles articles and defense following categories
services on the US Munitions List ar
expressly excluded from the EAR
beensing framework. Nevertheless,
included among the list of commutes
for buch validated expor lucenes in
Feed we

Cryptographic equipment and ancil
lary equipment (such as teleprinters,
perforators worders, visual display
units) designed to ensure werecy of
communications louch as telegraphy,
telephony, facsimile, video, dese) or of
stored information. their specialized
components, and software controlling
of performing the function of auch
cryptographic equipment. Also video
systems which, for secrecy purposes,
was digital techniques (conversion of
an analog. Le video or facsimile,
signal into a digital signal). This
tem also covers digital computers
and differensial analyzers fincremen
sal computers) designed or modified
for, or combined with any apher
machines, cryptographic equipment.
devices of techniques including
software, micro program (hardware).
associated equipment therefor, and
equipment or ayoleme incorporating
such computers or analysers), except
simple cryptographic devices or
equipment only ensuring the privacy
of communicatione.

Assuming that certain cryptographie
equipment falls outside of Department of
Stave juradiction but within the purviee
of the EAR, the Commodity Control List
indicates that such equipment may not
be exported to any nation except Canada

without a license. Further, the list
indicates that the reason for control of
such equipment is national security.
This being the case, the Secretary of
Defense is authorised to review any
proposed export of such equipment of
related technology for the purpose of
determining whether such export would
"make any contribution, which would
prove detrimental to the national

urity of the United Surime to the
military potential of such [foreign)
country or any other country."

Techawal date is treated as distinct
from commodities under the EAR and is
regulated in depth The relevant section
define technical data as follows
"Frenal dala" means information

( Das generally available Data
that have been made generally
available to the pubilar in any form
including (1) Drase rebrand orally
or vimally at open conferences.
lectures, trade shown, or other
media open to the public, and (2)
publications that may be purchased
without restrictions at a nominal
eet or obtained without cost or are
readily available at libraries open
to the public. The term "nominal
cos!" as ward in paragraph (a) of
this section is intended to reflect
realistically only the cost of
preparing and distributing the
publication and not the intrinsic
value of the technical data. If the
opet is such as to prevent the
technical data from being generally
available to the public, General
License GTDA would not be
applicable.

(b) Scientific or educational data (1)
Dissemination of information not
directly and significantly related
to design, production, or utilisation
in industrial processes, including
such dissemination by correSPOR-
dence, attendance at or participe.
tion in, meetings; or (2) Instruction
in academic institutions and
academic laboratories, excluding
information that involves research
under contract related directly and
significantly to design, production.
or utilization in industrial processes.
(c) Patent applications. Duis con-
lained in patent application
prepared wholly from foreign-
origin wchnical date where such
application is bring vend to the
foreign inventor to be executed and
returned to the United States for
subsequent filing in the US.
Patent and Trademark Office. (No
validated export license from the
Office of Export Administration is
required for data contained in
paient application or an amend
ment, modification, supplement or
division thered for filing in a
foreign country in accordance with
the regulations of the Patent and
Trademark Office in 37 CFR Par
& See $370.1064

44 Executive Order 12356 us National Security Informatics

On April 2, 1962. President Rengus signed Lecutive Order Ne 12756 replacing Laecutive Order Nie. 120 which bat been promulgwint by the Caner Admistustraties. The new Order DIVERS BANy of the prerum plans d the pear Onde and in grom CALO classification swier to the dret form there Order had dimand the excepties according to which """beac acebufic research informatics clearly related to the national security may be classed." The exceptœ www eventually mentaled and new appeare in the current Execeove Onder following norms opposite to elimination by the academic community, led by WT President Paul E. Gray.

The complete scope of the Dre Esecutive Order is not clear By berma, il criends to all information that is "owned by, produced by or for, an under the control of the United Swim Government". Informal interpreta Des include all work sponsored by the fatheral government. (There is some concern thai the new Order's elimination of as excepties for private sector resarch cuz be read as a signal that the new Order extends to private sector research, b any such intention has been informally denied by the Administration.)

The most important new proviam affecting universite is Section 1.2 which provider

1.205. Exceptional Cases Then on
employee, contractor, lucenate, or
granice of an agency that does not
have original classification authority
originates information believed by
that person to require classification,
the information shall be protected in
manner consistent with this Order
and its implementing directions. The
information shall be tranamatioł
promptly as provided under this
Order or its implementing directi
to the agency that has appropr
subject matter interest and cinne fin
tion authority with respect to cha
information. That agency shall
decide unchan thirty (30) days whunchur
to classify this information. If it in mat
clear which agency has clamufionto
responsibility for this informati
shall be sent to the Derecer of the
Information Security Overnight
Office. The Director shall determine
the agency having primary under
matter interest and formand that
information, with appropres
commendations, to that agenc
classification determine

The obligation placed upon a m
lor or grantee anginating inform
safeguard that information
section is encertain since i
formation of belief da
information requires clasCH SE
also Section 2.5 for the
agreement which involves
Bent) Another portion of a
(1.1(ch) augment the problem
province where in reaso
about the need to classify inferm
shall be walegrardoć w t
classifed pending a drummi
an original caseloaban es
would be apes to the Cen
contend that safeguarding
the grazine has reasonable s
the need to clai

If information» camiñad
under penalty of crime G

[blocks in formation]

In addition to the above laws, there is 8.1 Critical Technologies evidence that the Government is enadering the noe of contract and grant termo in federally sponsored research as a means of controlling the disarmination of research results. Such restrictions entered into voluntarily by grant recipients and contractors may avoid the constitutional double sur rounding ITAR and EAR and may become the most effective means for controlling the now of scientific information. The Defense Science Board Task Force on University Responsive nes has suggested (ore Section 17), and the Department of Defense is reportedly considering, a mechanism which would focus control of research results on the begotiation process at the time of the government grant or contract

Another potential controlling mechanim may evolve from the Immigration and Nationality Act which empowers the Government to refuse admission to an aben if there is reason to believe that the alien will "engage in activities which would endanger the welfare, safety, or Recenty of the United States." In addiben, an alien may be deported for failing to comply with the conditions under which he was admitted to date, the immigration laws have not been koed in any general way to contro! technology transfer. Recently, however, the Department of State has made formal inquiries to universities of the intended areas of research of certain foreign astionals from Communist Countries

For the purposes of this report we may regard university research activities as points within a cube, whose dimensions are: (1) basic to applied; (2) civilian to military; and (3) internationally noncompetitive to competitive. At one extreme, basic research of only civilian interest with no potential for interna tional competition presents no conflict and can be freely pursued at the university. Equally clearly, research at the opposite extreme does not belong in a university and most probably should be classified. The concerns addressed by this report involve research on so-called critical or sensitive technologies located somewhere in the middle of this cobe. Le baring basic and applied components, dual military civilian uses, and international competitive interest. This is indeed the case with both cryptology and VLS! research.

Starting with crypology, we foresee that during the next decade there will be • progressively increasing number of interconnected computers commeni cating both within and across organiza tional boundaries. Conceivably, if personal computers continue to grow at their current rate of some one million new unita/year the aggregate of geographically distributed systems will extend to individual bomes and small businesses as well in such a future Betting we believe that the protection and authentication of data is a mandatory requirement. Recall that by protection we mean that data may be

4.6 Interpretation and Conclusions communicated without interception,

As is evident from the above summaries of the relevant laws and regulations, the legal structure surrounding the control of scientific and technological information is bewildering. Nevertheless, we shall attempt to draw several conclusiona

The regulations appear to be impracti cal instruments not intended to regulate scientific exchange in the academic world, for the following reasons: 1. At least ITAR and EAR exclude banc research from their sphere of contrel

2. The scienter requirement of the Edier came-that the person discloning information know that the recipient of the information intenda to use it for a prohibited purpose in a foreign country – provides a legal precedent for a similar requirement for EAR

2 Nether EAR Dor ITAR can control

information which has already
reached the public domain. Thus
the Government would find it
difficult to prosecute a case where
the information disclosed in a
meeting had already appeared in
some generally available publica-

[blocks in formation]

whereas by authentication we mean the existence of credible means for certifying the signatory of an electronic message

Data must be protected precisely because the power of computers makes possible the malicious use of these machines in breaking the defenses of a remote installation, selecting data of interest, copying it and finally erasing all traces of such an invasion. As the use of geographically distributed interconpected systems grows beyond today's banking and business applications to broader financial, legal, medical and governmental services the potential and penalty for such misuses becomes greater. It is for this reason that we assert a societal need for vigorous research in public cryptology. For it is only through cryptologic techniques that the protection and authentication of data can be effectively insured.

In addition, the unconstrained pursuit of cryptologic research is expected to have beneficial intellectual repercussions in allied fields of computer science. More importantly the uming of expected developments strongly suggests that now is the time to parove effectively such research and thus to gain on the frontiers of theoretical computer science knowledge. The above motivations are unfortunately in conflict with the possible damage that new publicly available cryptologic results can cause in governmental communications and in the acquisition of foreign intelligence

Proceeding to our second major area, we believe that VLS! research is instrumental to the future evolution of the electrical engineering and computer science disciplines. More specifically, progress in the formation of new systems depends critically on the structure and function of their subord nate components-which are VLSI circuita Thus, for example, the development of successful speech-compre bension systems appears to depend critically on the design of proper VLSI structures that will be word in large numbers to carry out simultaneously and in parallel many mmilar information processing operations.

If automatic speech comprehension is

achieved, it will have, besides the obvious civilian and military applica bons, international competitive reper cussions. Japan, for example, bas already embarked on a ten-year project to achieve this goal (the Fifth Generation Computer Project) with the express intent of eventually dominating the world's computer marketa. As before, we De bere the presence of a commercial conflict, which becomes particularly important in VLSI, because circuits can be easily copied and replicated.

The same argument is applicable to VLSI design techniques, an area where US. dominance is expected. In this area, we are concerned with computer based techniques for effectively designing very mall VLSI circuits (e.g., five mm on each side) containing ever 100,000 circuita a design process that cannot be carried out manually because of inberent complexities. A successful" system capable of such design complexity, along with its software components, can be easily copied, perhaps by foreign scholars who participate in this research The conflicts of purpose characterized by these examples are further compounded by a confusion of boundaries: In both cryptologic and VLS! research the boundary between what is basic research of civilias interest and what can be used for military or international competitive purposes is very diffuse. Consider, for example the RSA EDCTYP tion scheme discussed in Section 3.2 That scheme can be viewed as: (1) a mathematical theory that defines certain functions; (2) an algorithm that implements these functions using subordinate functions like multiplication; and (3) one or two VLS! circuits that implement in hardware that algorithes. Here, the creative and most difficult part has been the discovery of the theory-a basic research activity. The conversion of this theory to an algorithm and the subsequent conversion of that algorithm to VLSI arcuits are relatively straight forward development activities that can be effectively carried out by any good team of domestic or foreign engineers. Can this research activity be clearly partitioned into non-critical and critical parts?

In conclusion, certain new research activities are by their very nature multifaceted, Le, they have basic and applied components, and are significant in the international commercial and military arena. The pursuit of such research is essential for the fundamental growth and leadership of US technology, yet the easy "export" of this research is believed undesirable for it may tend to weaken the nation in military and commercial terms.

staggering and probably not subject to

financial measures. The NSA, in view of these national security implications, feels that university research on public cryptology should be controlled through prepublication reviews.

In the case of VLSI, the governmental concerns center on the leakage of this critical technology through foreign scholars, as well as through the unconstrained publication of research resulta. Since approximately one third of the engineering graduate students of our major universities are not US. citizens, the fear appear to rest en a sound numerical basis. Since VLSI circuits are used in a large variety of applications, including the control and instrumenta tion of weapons, the Government fears that we are weakening through such a leakage of technology the military strength of the US.

In addition, the easy export of forefront VLSI research gives an unfair commercial advantage to the international competition. In blant terms, the Government asks why we freely export precious technology, while paying dearly for formiga im ports such as ol and

[ocr errors][merged small][merged small]

The imposition of constraints on research invariably resuhe in a loss of effectiveness. Progress is slower and fewer people, brace fewer good prople, are attracted to persue such research. In addition, certain future opportunities are foreclosed and reaths that would have otherwise been achieved by a wider, intercommunicating community are either never realized or postponed.

The inherent coupling of research and education in our universites means that constraints on the former necessarily lead to constraints on the latter. As a result, in such a constrained environment we cannot train as effectively the scientists and engineers who after moving to industrial and academic settings will generate this nation's future technological progress.

In addition, and from a geo-political viewpoint, the control of US research in certain critical technologies will tend to weaken our albes and is likely to lead third-world and neutral countries away from the US, toward possibly adversary countries for the acquisition of beaded technology.

The imposition of constraints on foreign scholars whe participate in US. university research will lead to reduction of the effective research workforce, since • large number of researchers, hence of good researchers, are not US citizens. In addition, sech restrictions will reduce

& The Problems of Technology the number of foreign scholars who Export

The export of technology that is the focus of governmental concerns involves the leakage of university research either (1) in the form of research results; or (2) through the training of foreign scholars in critical technologies on US.compuses. Is cryptology, the NSA in charged with the responsibility of (1) insuring the security of governmental communica bons; and (2) gathering intelligence brom foreign communications. These two pursuits have the technically conflicting objectives of desiring good cryptography for the US and bad cryptography for other countries. Thus, public cryptology work, if successful, usually helps one of theer objectives while hindering the other, depending on whether it enables better code making or better code breaking.

The financial costs to our Government of the disclosure of critical code breaking techniques can be measured in billions of dollars. For example, the NSA Lee that encryption devices for use in our governmental communications mort operate securely for several decades to insure: (1) certification of the encryption scheme, (2) operation in the field, and (3) immunity for some time beyond their removal from the field. Moreover, the political costs of losing the security of our own communications, or our ability to collect foreign intelligence, could be

acquire first-band knowledge of our system-a loss for the US, bether such scholars say in this country or return to their own countries. In addition, the exclusion of foreign scholar from certain research activities is impracticable and creates an unpleas ant chmate. Impracticable because it in difficult for a university which is predicated on the free pursuit of ideas to police who persem what ideas, and enpleasant because of the evident discrimination associated with such a restriction

Finally, in today's arsting of multinational corporations, is not at all clear that control of university research of of its access by foreign scholars will be effective in reducing the overall leakage of critical technologies.

Takes together, these consequences suggest that such constraints are biely to reduce our overall technological leadership and weaken the very strength that they are introded to protect

61 Introduction

The arguments of the preceding section have led us to search for effective means that can allay governmental concerns while preserving the funda mental strength of unconstrained research. There is clearly so perfect solution that can thoroughly satisfy both sides of this conflict. Accordingly. we have approached this serious problem with a degree of flexibility and a tolerance for less than perfect solutions.

The balance on which we have settled is embodied in our recommendations for a relevant MIT policy which is presented bext along with summary of our rationale

6.2 Recommended MIT Policy

We believe that one important part of MIT mission is to prepare our society for a technologically advanced future. To do this, we must continue to pursue leading-edge research in areas that we believe to be of future significance, and to prepare the future professionals in forefront technologies. Current and expected developments in communica tion, information systems and other areas of science and technology call for continued intensive research and development efforts on our part In some areas, eg, very large scale integrated circuit design (VLSI), continued academic involvement is also central to the evolution of the underlying disciplines, in this case electrical engineering and computer science. At the same time, Derious concern has been expressed

about some technology transfer resulting from normal university activities in these areas. We therefore believe it becessary to state our policy with respect to this issue.

Freedom of inquiry and freedom to communicate are essential features of a university. Accordingly, we must be able to teach and perform research in an atmosphere where ideas are freely pursued and onchanged. MIT's role in advancing technology should continue in this open atmosphere. It is also true we believe, that scientific and technological progress are best secured in an open atmosphere, and that the scientific costs to the nation of Imposing restrictions outweigh the benefica. Openness also requires that as a general policy MIT not undertake classified research, or research whose results may not be freely published without prior permission. We believe that openDess of the university also requires that, once they are among us, foreign students, faculty and schol. are should be on an equal basis with their U.S. counterparts in their access to MIT academic and research project. Moreover, restrictions on access to ideas or places within a university are difficult to enforce and likely to be ineffective.

Exceptions to these policies regarding publication, classification and foreign students and scholars may be made, but only in those very rare instances where the area of work is crucially important to MIT educational mission and the exception is demonstrably necessary for the national good. If these conditiods are Dot wel, MIT will decline or discontinue the activity and, if appropriate, propose it for consideration off-campus or alorwbers.

MIT, bike other universities, has a responsibility to the national interest. When sensitive but enclassified research at MTT is important to the national security we will take appropriate steps to ensure that the relevant government agencies are informed of the results. For example, it is our current policy to inform the US. Government of research in information protection and authenti cation by sending prepublication mater ial in this area to the NSA at the same time that we grad it to our close colleagues for technical comment. As a further example, we have also agreed with the NSF that in those rare

[merged small][ocr errors][merged small][merged small]

La view of the significance of the Corson Report, (see Section 3.7) and the similarity of the issues and recommendations addressed by both the Corson and MIT reports we make the following com media:

We are in full agreement with the

principles of the Corson Report Our concerns stem from the possible misinterpretation of the Report's specific criteria under which "gray area" research may be subject to restrictions and of its specific methods for imple menting such restrictions. In particular, we fear that its detailed recommendations may be interpreted and implemented in ways which ignore their accompanying qualifications. If indeed such qualifica tions are ignored, the Corson Report recommendations could be read as restrictive imperatives.

Our own policy in Section 6.2 above calls for openness of communication and equality among foreign nationals and their US peers. "Exceptions may be made but only in those very rare instances where the area of work is

crucially important to MIT educational

mission and the exception is demonstrably necessary for the national good." By not specifying, priori, the criteria for or the general nature of such exceptiona, we feel that the danger of converting qualified examples into rules is mitigated.

[blocks in formation]

The Five Presidents' Letter

February 27, 1981

The Honorable Malcolm Baldrige Secretary of Commerce 14th Street

Washington, D.C. 20230

The Honorable Alexander M. Haig, Jr. Secretary of State

2201 C Street, N.W. Washington, D.C. 20520

The Honorable Caspar Weinberger Secretary of Defense

The Protagon

Washington, D.C. 20301

and conferences where foreign national were present, employ forego Donal to work in the laboratores, or publish research findings in the open burrature Nor could universities, in effect, and foreign nationals to graduate studim in those areas. Such rernictions would conflict with the fundamental precepts that define the role and operation of th nabon's universities.

The regulations could be interpreted in cover instructive and research which although potentially useful in military applications, have much broader stility in such other areas as medical systema and communication rent. Such interpretations of the regulations. coupled with their orvere criminal penalties, could have a very rea and anintended chilling effect of legitimais

Dear Macro. Baldrige, Haig, and academic exchange.
Weinberger.

We are writing to request clarification of the applicability of certain export restrictions to teaching and research activities conducted by American universition. We are deeply concerned about recent attempts to apply to universition the International Traffic in Arms Regulations (ITAR) and the Export Administration Regulations (EAR) Examples of such efforts by government agencies include a December 12, 1980, memorandum by the Director of the Very High Speed Integrated Circuit (VHSIC) Program Offer, attempts to restrict publication of unclassified university research results arising from DOD-sponsored projecta, and a Depart ment of Commerce mandate to at least so university barring certain foreign scholars from that university's spon sored research activities due to their citizenship. Unfortunately, these initia tives appear to be only the first of many sach actions to follow.

The ITAR and EAR regulations have existed for a number of years, and have not until now been applied to traditional aniversity activities. The new construe tion of these regulations appears to contemplate government restrictions of research publications and of discourse among achoiers, as well as discrimina Lion based on nationality in the employment of faculty and the admission of students and visiting scholars. In the broad scientific and technical areas defined in the regulations, faculty could not conduct classroom lectures when foreign students were present, engage in the exchange of information with foreign visitors, present papers or participate in discussions at symposia

Restricting the free Dow of inform among scientions and engineers would aher fundamentally the system that produced the sostic and technological lead that the government is now bying to protect and leave with nothing w protect in the very bear future. The way to protect that lead is to make sure that the country's best talent is encouraged w work in the relevant areas, not to try i build a wall around past discoveries

It should be recognized that the only realistic way to "contain" VRSIC research is to classify the who program. In our view this would be m defeating effort the science undergring high technologies cannot be put into the bottle. Furthermers, universities have conceded that p formance of classified research a incompatible with their essential parposms University acestuia esil prefer, for the most part, to change the Beld of interest rather than here the research and teaching so consound Forcing high technology research was d universities would decrease our ebm's competitive position, since the d would have to be carried out mare sewly and less effectively in classified atmosphere. Moreover, we would close a continuous Bow of new gradu from the university programs which have been flourishing up to a pat Elimination of such waching and research from academic in would endanger the future of gradua programs in engineering. science, and related Selda, and result in a tremendous imo of pour high technology otherwise avalabi a American Industry. The new ONCE A

they fail to protect the status quo and virtually guarantee that there will be no future.

Moreover, application of export restrictions to universite would pose gnificant practical difficulties. It would be virtually impossible for most universities to administer such restric Dong gives the necessarily decentralized and Quid nature of most campuses. Because it is so inconsistent with their character, universities are neither structured nor staffed to police the flow of legitimate visitors to laboratory or the dissemination of information by their faculty at interba Donal conferences, or, indeed, even in a campus clasesom where foreign students happen to be present

a given

The December 12, 1960, memorandum mentioned earlier pertaining to the

can be differentiated from areas such as
device design and fabrication techniques,
process equipment, and software, for
which approval of publication or
presentation normally would be denied.
Such distinctions are proposed to be
made by government employees, using
criteria of questionable reliability and
suitability.

There is no such easy separation in
any engineering curriculum intended to
be relevant to our national industrial
needs and problems. Furthermore,
producing graduates with no "hands-
on" experience in these areas would be of
little value to American high technology
industries.

The proposed extension of the restric bena to university activities ought not be made without a thorough assessment of the policy implications, the necessity and prospective effectiveness of the

the established role and operations of
constitutional questions raised.
universities, and the serious legal and

In the interim, it might be metually
advantageous for DOD to continue
(selectively and sparingly) to rely on its
classified research facilities to carry out
the most sensitive segments of the
VHSIC program. That has been its
practice in previous years, and is far
preferable to the application of these
restrictive and virtually unenforceable
regulations to universities. For those
university activities which remain
unclassified, we urge the government to
crase all attempts to apply the restric
tions until the broader issues are
resolved.

We hope that after examining this
inque carefully, you will clarify what has
always been our understanding-
namely, that the regulations are not

arising from unclassified research and leaching.

Sincerely yours,

Donald Kennedy

President, Stanford University

Marvin L Goldberger President, California Institute of Technology

Paul E. Gray

President, Massachusetts
Institute of Technology

Frank H. T. Rhodes
President, Cornell University

David S. Saxon
Prendent University of
California

[merged small][merged small][subsumed][subsumed][merged small][graphic]
« السابقةمتابعة »