WPCa 2BRVTimes New Roman3|B #&a\  P6G;-&P#"5^*8DSS88S^*8*.SSSSSSSSSS..^^^Jxooxf]xx8Axfxx]xo]fxxxxf8.8NS8JSJSJ8SS..S.SSSS8A.SSxSSJP!PZ*8888C8SSxJxJxJxJxJooJfJfJfJfJ8.8.8.8.xSxSxSxSxSxSxSxSxSxSxJxSxSxSxSxS]SxSxJxJoJoJfJfJfJxSxSxSxSxSCS8S888SAxSx]AN:*LS8JSSSSS.4}}S2S}288JJS88SS8J82N8[[^C`^SS`*********************************8DSS88S^*8*.SSSSSSSSSS..^^^Jxooxf]xx8Axfxx]xo]fxxxxf8.8NS8JSJSJ8SS..S.SSSS8A.SSxSSJP!PZv**8SJSS8]8****88JJ:S8A8x**x*8SSSS!S8.S^8SC[228`L*824S}}}Jxxxxxxoffff8888xxxxxxx^xxxxxx]SJJJJJJoJJJJJ....SSSSSSS[SSSSSSS n9B8*XB7  PT6QPP2;$ Z_O S'#&a\  P6G;u&P#HP LaserJet 5Si 4-C342HPLAS5SI.WRSC\  P6Q,,,&Pp=3=V\=Q\Q\Q=\\33\3\\\\=G3\\\\QX%Xc.====I=\\QQQQQzzQpQpQpQpQ=3=3=3=3\\\\\\\\\\Q\\\\\f\\QQzQzQpQpQpQ\\\\\I\=\===\G\fGN@.S\=Q\\\\\39\7\7==QQ\==\\=Q=7N=eegIjg\\j.................................=K\\!==\g.=.3\\\\\\\\\\33gggQzzpf=Gpfzfpp=3=V\=Q\Q\Q=\\33\3\\\\=G3\\\\QX%Xc..=\Q\\=f=....==QQ@\=G=...=\\\\%\=3\g=\Ie77=jS.=79\Qzpppp====gf\QQQQQQzQQQQQ3333\\\\\\\e\\\\\\\ I. A. 1. a.(1)(a) i) a) 1. 1. 1. a.(1)(a) i) a)n???WPC 2BVRs New Roman n9B8*XB7  PT6QP2 X<4 Zp 3|a n9B8*XB7  PT6QP DPC2X=?XP7  PT6QXP y>I=.X-&I7  PT6Q&PIjg\\j.......Sg9xS]?g9xSi+SS88WuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxN,O6-m8.:/<toc 8toc 8,X` hp x (#(# (# X` hp x (#toc 9toc 9-X` hp x (#(#`(#`X` hp x (#index 1index 1.X` hp x (#` (#` (#X` hp x (#index 2index 2/X` hp x (#` (#` (#X` hp x (#2D0>1A2AKBtoa headingtoa heading0X` hp x (#(#(#X` hp x (#captioncaption1;1#XP\  P6QXP##C\  P6QP#_Equation Caption_Equation Caption211#XP\  P6QXP##C\  P6QP#"i~'^:DPddDDDdp4D48dddddddddd88pppX|pDL|pp||D8D\dDXdXdXDdd88d8ddddDL8ddddX`(`lD4l\DDD4DDDDDDdDd8XXXXXX|X|X|X|XD8D8D8D8ddddddddddXdbdddpdXXXXXlX~|X|X|X|XdddldldD8DdDDDdplld|8|P|D|D|8dvddddDDDpLpLpLpl|T|8|\ddddddl|X|X|Xd|DdpL|Dd~4ddC$CWxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxNHxxH\dDXddddd8@d<@d<DDXXdDDxddxHxxHvppDXd<"dxtldpxxd2>NKEK]GKIKK"i~'^:DpddȨDDDdp4D48ddddddddddDDpppd|Ld|pȐD8DtdDdpXpXDdp8Dp8pdppXLDpdddXP,PhD4htDDD4DDDDDDdDp8dddddȐXXXXXJ8J8J8J8pddddppppddpddddzpdddXXhXXXXXdddhdptL8LpLDLpphhp8ZDP8pppddƐXXXpLpLpLphfDtppppppȐhXXXpDppLDd4ddC6CWxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxNHxxHjdDddddddI\\>>>\g0>03\\\\\\\\\\33gggQyyrg>Frgygrr>3>T\>Q\Q\Q>\\33\3\\\\>F3\\\\QX%Xc>0cT>>>0>>>>>>\>\3QQQQQwyQrQrQrQrQ>3>3>3>3\\\\\\\\\\Q\Z\\\g\QQQyQyQycyQtrQrQrQrQ\\\c\c\>3>\>>>\gcc\r3rIr>r>r3\l\\\\y>y>y>gFgFgFgcrMr3rT\\\\\\crQrQrQ\r>\gFr>\t0\\=!=WxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxNBnnBT\>Q\\\\\3;\7;\7>>QQ\??n\\nBnnBmgg>Q\7"yyyy\njc\gnn\"i~'^5>g\\>>>\g0>03\\\\\\\\\\>>ggg\yyrF\yrgyy>3>j\>\gQgQ>\g3>g3g\ggQF>g\\\QI(I_>0_j>>>0>>>>>>\>g3\\\\\QyQyQyQyQD3D3D3D3g\\\\gggg\\g\\\\pg\\\QQ_QyQyQyQyQ\\\_\gjF3FgF>Fgg__gy3ySy>yIy3ggg\\QQQgFgFgFg_y^y>yjgggggg_yQyQyQgy>ggFy>\0\\=2=WxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxNBnnBa\>\\\\\\7>\7>\7>>\\\??n\\nBnnBsgg>\\7"yyyy\nlc\gnn\"i~'^ %,77\V%%%7>%7777777777>>>0eOIIOD>OO%*ODaOO>OI>DOOgOOD%%37%07070%777V7777%*77O77055;%;3%%%%%%%%%7%7O0O0O0O0O0aHI0D0D0D0D0%%%%O7O7O7O7O7O7O7O7O7O7O0O7O6O7O7O7>7O0O0O0I0I0I;I0OED0D0D0D0O7O7O7O;O7O;O7%%7%%%7M>;;O7DD,D%D%DO7AO7O7O7O7aOI%I%I%>*>*>*>;D.DD3O7O7O7O7O7O7gOO;D0D0D0O7D%O7>*D%O7E77%%WMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxN(BB(37%07777j7#TT7!#TT7T!%%007n&&Bn77lBTn(nBB(AZZ>>n%07\n!"IIIITTenn7TnB@;7>lBBn72WKpNKPKSKQU"i~'^"(22TN"""28"2222222222888,\HBBH>8HH"&H>XHH8HB8>HH^HH>"".2",2,2,"222N2222"&22H22,006"6."""""""""2"2H,H,H,H,H,XAB,>,>,>,>,""""H2H2H2H2H2H2H2H2H2H2H,H2H1H2H2H282H,H,H,B,B,B6B,H?>,>,>,>,H2H2H2H6H2H6H2""2"""2F866H2>>(>">">H2;H2H2H2H2XHB"B"B"8&8&8&86>*>>.H2H2H2H2H2H2^HH6>,>,>,H2>"H28&>"H2?22!!WFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxN$<<$.2",2222`2 LL2 LL2L"",,2d""M\\>>>\}0>03\\\\\\\\\\>>}}}\rryrr>Qygyrr\grrggF3FM\>\\Q\Q3\\33Q3\\\\FF3\QyQQFI3Ic>0cM>>>0>>>>>>\>\3r\r\r\r\r\yyQrQrQrQrQ>3>3>3>3y\\\\\\\\\gQr\\\\gQ\r\r\r\r\yQyQycyQnrQrQrQrQ\\\c\c\>3>\>>>\\ccyQg3gBg>g;g3y\jy\y\\\yrFrFrF\F\F\FccgBg3gM\\\\\\ygcgFgFgF\g>y\\Fg>g\n0\\=(=WddddddddddddddddddddddddddddddddddddddddNBnnB_\F\\\\\\3;\7;\7>>gg\??n\\nBnnBb\\>g\7"yyyy\njc\}nn\"i~'^:DTddDDDd4D48ddddddddddDDd||||DXp||dp||ppL8LTdDddXdX8dd88X8ddddLL8dXXXLP8PlD4lTDDD4DDDDDDdDd8|d|d|d|d|dX|X|X|X|XD8D8D8D8dddddddddpX|ddddpXd|d|d|d|dXXlXx|X|X|X|XdddldldD8DdDDDddllXp8pHpDp@p8dtdddd|L|L|LdLdLdLllpHp8pTddddddplpLpLpLdpDddLpDpdx4ddC,CWddddddddddddddddddddddddddddddddddddddddNHxxHhdLdddddd8@d<@d<DDppdDDxddxHxxHkddDpd<"dxtldxxd2w^KWZ"i~'^#)0<d<d<CCYYdCCddCYCdYzzzzCCCCqodYYYYYYYYYYY8888dddddddnddddddd\5hC:,%rXh*f9 xr G;XXW!@(#,h@\  P6G;hPMMMMMMMMMMMMMMMMMMMMMMMMMxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxN(BB(37%07777j7!#TT7T!%%007n&&Bn77lCTn(nBB(A\\>>n%07\n!"IIIITTenn7TnB@;7>lBBn2^+ba"5^.=K\\!==\g.=.3\\\\\\\\\\33gggQzzpf=Gpfzfpp=3=V\=Q\Q\Q=\\33\3\\\\=G3\\\\QX%Xc.====I=\\QQQQQzzQpQpQpQpQ=3=3=3=3\\\\\\\\\\Q\\\\\f\\QQzQzQpQpQpQ\\\\\I\=\===\G\fGN@.S\=Q\\\\\39\7\7==QQ\==\\=Q=7N=eegIjg\\j.................................=K\\!==\g.=.3\\\\\\\\\\33gggQzzpf=Gpfzfpp=3=V\=Q\Q\Q=\\33\3\\\\=G3\\\\QX%Xc..=\Q\\=f=....==QQ@\=G=...=\\\\%\=3\g=\Ie77=jS.=79\Qzpppp====gf\QQQQQQzQQQQQ3333\\\\\\\e\\\\\\\ y_, X   )y e, ;#XP\  P6Q=?XP# Federal Communications Commission`*(#DA 991194   yxdddy )Њ#&a\  P6G;-&P# e Before the ZAFederal Communications Commission  y_,JwWashington, D.C. 20554 ă  y_,X` hp x (#%'0*,.8135@8:ԍ Letter from Robert Lewis Thompson, counsel to Trojan Security Services, Inc., to William H. Kellett, Federal Communications Commission (filed August 24, 1995). Trojan alleged that it had spoken to MUHF on several occasions after  w>December, 1993, but that the conversations related to complaints that Trojan's "reception was  y_ ,deteriorating."; @g nZ,ԍ Id. at 2. ;  y_X, 7. Trojan's August 24, 1995, filing further stated:  ^  ` ` With respect to the affidavit from Mobile UHF's consultant, Glen  y_, ^ :Dechert, Mr. Renteriav nZP,ԍ Mr. Martin Renteria is the vicepresident of Trojan Security Services, Inc. v did have several conversations with him but Mr.  ^ fRenteria expressly notified him that Trojan wanted to keep its license and  ^ to keep its same frequency. He also informed Mr. Dechert that Trojan  ^ had never been informed of any changes in stations utilized by Motorola  ^ or Mobile UHF. Trojan repeatedly refused to sign any agreement with  ^ Mobile UHF, as urged by Mr. Dechert, that would effectively cancel its  y_,FCC license.`  nZ , w>ԍ  Letter from Robert Lewis Thompson, counsel to Trojan Security Services, Inc., to William H. Kellett, Federal Communications Commission, at 2 (filed August 24, 1995).  ` `    y_, wV 8. MUHF responded to Trojan's August 24, 1995, letter, by filing a letter on September 11, 1995,  y_x, walleging that the statements in Trojan's August 24, 1995, letter were erroneous.x g nZ%, wWԍ Letter from Charles R. Wells, president, Mobile U.H.F., Inc., to Anne Marie Wypijewski, Federal Communications Commission (filed September 11, 1995). MUHF argued that  wTrojan must have been on notice of the switch in service providers from MCE to MUHF, because prior"P,N(N(ZZ"  wto December, 1993, Trojan paid MCE for repeater service, but subsequent to December, 1993, Trojan sent  y_,its payment to MUHF.=g nZ@,ԍ  Id. at 1. =  y_, wo 9. MUHF's Request was denied on December 24, 1996, by the former Office of Operations of  y_`,the Wireless Telecommunications Bureau.`Xg nZX, wTԍ Letter from William H. Kellett, Federal Communications Commission, to Charles R. Wells, president, Mobile U.H.F., Inc. (dated December 24, 1996). The denial letter stated:   ^ : ` ` The finder alleged that a licensee using a community repeater was moved  ^ to a different repeater and therefore has not operated for more than a  ^ Eyear. The target licensee states that this, if it happened, occurred without  ^ tits knowledge. Because the licensee has continuously operated on the  ^ appropriate frequency, we find that an award of a finder's preference is  y_H ,not in the public interest.6H  nZ,ԍ Id.  6  y_ , ` `      10. MUHF timely filed the instant Petition on January 15, 1997.g @g nZ,ԍ Petition for Reconsideration (filed January 15, 1997). g In its Petition, MUHF argued that the December 24, 1996, action was defective in that documentation had not been provided  y_ ,by Trojan to constitute a finding of operation of Station WIG912.9 g nZ,ԍ Id. at 1.9 MUHF argued that Trojan had failed to provide any documentation, such as canceled checks, to show operation of Station WIG912  y_X,during the period December 6, 1993, through December 7, 1994.4X` g nZX,ԍ  Id. 4 MUHF further argued that any operation by Trojan of frequency pair 507/510.8125 MHz, after December 6, 1993, was on MUHF's Station WIJ816 as a private carrier user, since the transmitting equipment for Trojan's Station WIG912  y_,had been removed by MUHF from Mount Lukens on December 6, 1993, and never replaced.T g nZp,ԍ Petition for Reconsideration at 12.T  y_,  11. Trojan filed an opposition to MUHF's Petition on February 3, 1997. g nZ , w3ԍ Letter from Robert Lewis Thompson, counsel to Trojan Security Services, Inc., to William H, Kellett, Federal Communications Commission (filed February 3, 1997). In opposition, Trojan argued that after MUHF purchased the repeater site from MCE, Trojan was forced to "spend  y_@,thousands of dollars to lease radios on another frequency so that Trojan's daytoday business  y_,operations could continue."Vg nZ%,ԍ  Id. at 2 (emphasis in the original). V "h,N(N(ZZ"Ԍ y_,  12. By letter dated October 8, 1997, the Policy and Rules Branch, Public Safety and Private Wireless Division, Wireless Telecommunications Bureau, requested additional information from Trojan  y_,relating to Trojan's alleged operation of Station WIG912 during the subject period of December 6,  y_,1993, through December 7, 1994.g nZ, wgԍ Letter to Robert L. Thompson, counsel to Trojan Security Services, Inc., from John J. Borkowski, Federal Communications Commission (dated October 8, 1997). Trojan was provided thirty calendar days from the date of the  e`,request to provide the additional information ("2_Equation Caption"#XP\  P6Q=?XP#i.e(>2_Equation Caption(#&I7  PT6Q-&P#., any response had to be filed no later than November 7, 1997). On November 10, 1997, Trojan filed its response to the October 8, 1997,  y_!,information request.! g nZ , wQԍ Letter to John J. Borkowski, Federal Communications Commission, from Robert L. Thompson, counsel to Trojan Security Services, Inc. (filed November 10, 1997). In response, Trojan provided, inter alia, the declaration of its vicepresident, who stated under penalty of perjury that Trojan had "been placed at a disadvantage by a radio service  y_,company usurping our frequency and providing a shared trunked system to their clients...."Fxg nZ ,ԍ  Id. at Attachment B. F Trojan provided two statements from radio rental firms, as proof that Trojan was forced to rent radios  y_,"following the piracy of its frequency by Mobile." g nZ), w}ԍ Letter to John J. Borkowski, Federal Communications Commission, from Robert L. Thompson, counsel to  nZ,Trojan Security Services, Inc., at 2 (filed November 10, 1997).  Trojan also provided copies of checks made payable to MUHF, during the subject period. While the checks were not station or frequency specific, they nonetheless included the notation of MUHF's customer number for Trojan in the reference line.  y_ ,  y_ , III. DISCUSSION  y_i,  13. We note, as an initial matter, that the burden of proof in a finder's preference proceeding  y_A,rests with the finder.t!A` g nZA,ԍ See Report and Order, 6 FCC Rcd 7297, at page 7308, para. 68 (1991).t In the matter before us, MUHF argues that it had entered into an agreement with MCE, in which MCE transferred ownership to MUHF of MCE's community repeater. As part of the agreement, MUHF provided repeater service to MCE's existing customers, including Trojan. MUHF alleges that it dismantled Trojan's operating equipment for Station WIG912 on December 6, 1993, and began providing service to Trojan on Station WIJ816 as a private carrier user. Trojan originally provided some evidence that it had operated during the subject period, in its effort to refute MUHF's Request, but the evidence was not stationspecific. Based on Trojan's evidence that it had operated on the subject frequency pair, albeit not stationspecific, MUHF's Request was denied on December 24, 1996.  y_,  14. Based upon our review of the record in this proceeding, we now find that Trojan failed to provide any conclusive evidence that it had operated Station WIG912 at any time during the period December 6, 1993, through December 7, 1994. There is no refutation on the record that the equipment associated with Trojan's Station WIG912 was disabled on December 6, 1993, and physically removed from Mount Lukens, rendering the station nonoperational. With its Opposition, Trojan submitted a copy of a cancelled check dated April 10, 1995, as evidence of operation of Station" !,N(N(ZZ}" WIG912. The check, however, was not stationspecific and was for payment to MUHF for service subsequent to the subject time period. We find that there is evidence in the record that Trojan was provided some type of notice that MCE had entered into an agreement with MUHF, since Trojan began to make its monthly service payments to MUHF, and not to MCE, after December, 1993. MUHF provided the declaration of an independent communications consultant, sworn under penalty of perjury, that Trojan had been notified that it was operating on Station WIJ816, and not Station WIG912, as of December, 1993. Trojan has not provided any conclusive evidence during the course of this proceeding that it operated Station WIG912 during the subject period. Rather, Trojan admits that it sought cellular service while it was also paying MUHF for service, due to what Trojan  y_,considered to be loss of operating ability on Station WIG912."g nZ , wԍ  See Letter to John J. Borkowski, Federal Communications Commission, from Robert L. Thompson, counsel to Trojan Security Services, Inc., at Attachment B (filed November 10, 1997).  y_H , 15. Upon evaluation of the entirety of all the evidence submitted by both parties in this matter, we therefore find that MUHF satisfied its burden of proof and demonstrated that Trojan did not operate station WIG912 from December 6, 1993, through December 7, 1994. Under the Commission's Rules, a license for a station cancels automatically upon permanent discontinuance of  y_ ,operation for a period of one year or more.@# g nZh,ԍ 47 C.F.R. 90.157.@ We therefore reverse the December 24, 1996, dismissal of MUHF's finder's preference request, and award a dispositive preference under the Finder's  y_X,Preference program to MUHF for Station WIG912._$Xg nZ,ԍ See Report and Order, 6 FCC Rcd, 7297 (1991). _  y_0, #$footnote reference##XP\  P6Q=?XP##&a\  P6G;-&P#)T$footnote reference)  y_, IV. CONCLUSION AND ORDERING CLAUSES  y_, 16. For the reasons stated above, the dismissal of the finder's preference request filed by Mobile U.H.F., Inc. against Station WIG912 IS REVERSED. A dispositive preference under the finder's preference program IS AWARDED to Mobile U.H.F., Inc., for Station WIG912, formerly licensed to Trojan Security Services, Inc. Mobile U.H.F. has ninety (90) days from the date of release of this Order to follow regular application requirements and file an acceptable application with the Commission for the targeted frequencies.  y_x, 17. IT IS ORDERED, pursuant to Sections 4(i) and 405 of the Communications Act of 1934, as amended, 47 U.S.C. 154(i), 405, and pursuant to Section 1.106 of the Commission's Rules, 47  y_(,C.F.R.  1.106, that the Petition for Reconsideration filed by Mobile U.H.F., Inc. IS GRANTED#&a\  P6G;-&P#. " @$,N(N(ZZ "Ԍ y_, 18. This action is taken under delegated authority pursuant to Sections 0.131 and 0.331 of the Commission's Rules, 47 C.F.R. 0.131, 0.331.  y_`, Ghh~FEDERAL COMMUNICATIONS COMMISSION  y_, hh~D'wana R. Terry  y_p, hh~Chief, Public Safety and Private Wireless Division  y_H , hh~Wireless Telecommunications Bureau