<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.6.26 (Ruby 3.0.2) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-celi-irtf-hrpc-ipvc-00" category="info" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.16.0 -->
  <front>
    <title abbrev="ipvc">Intimate Partner Violence Digital Considerations</title>
    <seriesInfo name="Internet-Draft" value="draft-celi-irtf-hrpc-ipvc-00"/>
    <author initials="S." surname="Celi" fullname="Sofia Celi">
      <organization>Brave</organization>
      <address>
        <email>cherenkov@riseup.net</email>
      </address>
    </author>
    <author initials="J." surname="Guerra" fullname="Juliana Guerra">
      <organization>Derechos Digitales</organization>
      <address>
        <email>juliana@derechosdigitales.org</email>
      </address>
    </author>
    <author initials="M." surname="Knodel" fullname="Mallory Knodel">
      <organization>CDT</organization>
      <address>
        <email>mknodel@cdt.org</email>
      </address>
    </author>
    <date year="2023" month="March" day="13"/>
    <area>General</area>
    <workgroup>None</workgroup>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <t>This document aims to inform how Internet protocols and their implementations might better mitigate technical attacks at the user endpoint by describing technology-based practices to perpetrate intimate partner violence (IPV). IPV is a pervasive reality that is not limited to, but can be exacerbated with, the usage of technology. The IPV context enables the attacker to access one, some or all of: devices, local networks, authentication mechanisms, identity information, and accounts. These kinds of technical compromise exist in addition to on-path attacks, both active and passive <xref target="RFC7624"/>. In this document we describe the tactics the IPV attacker uses and what kind of counter-measures can be designed in IETF protocols.</t>
    </abstract>
    <note removeInRFC="true">
      <name>Discussion Venues</name>
      <t>Source for this draft and an issue tracker can be found at
    <eref target="https://github.com/claucece/draft-celi-irtf-hrpc-ipvc"/>.</t>
    </note>
  </front>
  <middle>
    <section anchor="introduction">
      <name>Introduction</name>
      <t>Intimate partner violence (IPV) refers to physical, emotional, verbal, sexual, or economic abuse of a person by a current or former intimate partner. It is understood that in IPV cases there is an unequal power relationship that enables the abuser to cause harm in romantic or sexual relationships, as well as child or elder abuse, or abuse by any member of a household.</t>
      <t>Digital technologies are central in modern lives and can be used as a way to enable and enhance IPV. At the same time, IPV is not considered enough when designing digital technologies, networks, or Internet protocols against threats. This lack of consideration has put pressure on health professionals and social workers to mitigate technology-enabled abuse and its effects. In turn, survivors and targets develop ad hoc strategies for digital privacy and safety for themselves alone and only in rare cases are protocol design or cybersecurity best practice available tactics. This type of abuser, "the attacker you know", is neither on- nor off-path, they have complete access to-- perhaps even share-- devices and local networks. They can even coerce their targets.</t>
      <t>This document describes the tactics used in technology-based IPV. It provides recommendations for the design of protocols and implementations to mitigate those tactics. In what follows, we first describe IPV and related terminology, the kind of tactics attackers use, and we end with the recommendations.</t>
    </section>
    <section anchor="definition-of-technology-based-ipv">
      <name>Definition of technology-based IPV</name>
      <t>Technology enables and enhances IPV attacks with pervasive surveillance, overt monitoring, and coercive access. IPV refers to physical, emotional, verbal, sexual, or economic abuse of a person by a current or former intimate partner. By "partner" we mean anyone with a close relationship with the victim that can exercise abuse in a romantic or sexual relationship, as well as child or elder abuse, or abuse by any member of a household. In cases of IPV there is an unequal power relationship that enables the attacker to cause harm. <xref target="Dragiewicz2018"/> calls this "digital coercive control" whereby Internet-enabled technology-- through access to local networks, devices and accounts-- becomes a mechanism to exert control, to conduct surveillance, or to aggravate and harass.</t>
      <section anchor="terminology">
        <name>Terminology</name>
        <t>In the rest of this draft, we will use this terminology:</t>
        <ul spacing="normal">
          <li>Attacker: By "attacker" we mean an abuser in an IPV situation that is using
digital tools to enable and enhance abuse. An attacker can also be referred as "perpetrator".</li>
          <li>Victim: By "victim" we mean the subject of a attack. Notice that we are using
this term only in the context of an attack scenario: we prefer the term "survivor"
otherwise.</li>
        </ul>
      </section>
    </section>
    <section anchor="technology-based-ipv-attacks">
      <name>Technology-based IPV attacks</name>
      <t>In order to describe IPV attacks that are enabled or exacerbated by Internet technology, we first describe our assumptions about the attacker and common tactics that can be used. Then the types of technology-enabled IPV attacks are described.</t>
      <section anchor="the-intimate-attacker">
        <name>The intimate attacker</name>
        <t>The attacker we present in this document is one that either has forceful control of
accounts, devices, and/or authentication information for accessing systems, or uses
public information to exercise control.
The kind of attacker can be technologically savvy or not. We define this
attacker as one of the strongest ones as it can have unlimited access to
systems and devices.</t>
        <t>The attacker has some kind of physical access to the victim (or has had it in the past),
and often shares a common social network with them. In some cases, it can be
the legal owner of the devices/accounts a victim uses.</t>
      </section>
      <section anchor="tech-based-ipv-tactics">
        <name>Tech-based IPV tactics</name>
        <t>There are many ways in which digital and networked technology can facilitate an attacker perpetrating IPV. Here we informally list their main groups:</t>
        <ul spacing="normal">
          <li>Ready-made tools: Attackers can use applications or devices
that are solely built to facilitate IPV. These apps are sometimes called "stalkerware" or "spouseware".</li>
          <li>Dual-use tools: Attackers can use applications, control settings or devices built for beneficial or innocuous
purposes and repurpose them for harm. This is the case, for example, of anti-theft
devices that can be repurposed for stalking.</li>
          <li>Impersonation attacks: Knowing personal information coupled with access to authentication mechanisms gives an attacker the ability to fully authenticate to services and accounts of the victim, effectively impersonating them. This can be executed to the degree that the victim can no longer successfully authenticate themselves.</li>
          <li>UI-bound impersonation attacks: Attackers can abuse technology to enhance IPV by abusing the
UI of a specific tool. In this case, attackers become authenticated but adversarial users of a
system. They cannot, however, escalate to root privileges or access other underlying
functionalities of the system. They are bound to whatever system they managed
to authenticate to. We will explore later the ways attackers use to forcibly gain
authentication to a system.</li>
          <li>Social media and forums: Attackers can learn and share information on how to use
technology to enhance IPV through the usage of these tools. They can also
receive narrative justification to condone their behaviour. They can also
perform cyberstalking, cyberbullying, doxxing with the usage of these tools.</li>
          <li>Perception of threat: The mere presence of a pervasive threat is a form of control. The perception that technology can be used to enhance IPV
is a tactic of attackers to control victims, take away agency and abuse them. This can lead
to lack of trust in technology and further isolates the victim from seeking and receiving support.</li>
        </ul>
      </section>
      <section anchor="kinds-of-tech-enabled-ipv-attacks">
        <name>Kinds of tech-enabled IPV attacks</name>
        <ul spacing="normal">
          <li>
            <t>Monitoring: One of the most prevalent methods to enhance IPV is the usage of
active monitoring of any online account that the victim has or of any action that the
victim does in the digital world. This includes a variety of behaviors that
feel unwelcomed and intrusive, and can involve threats.
The monitoring is "active" in that is a permanent action that the victim can be
aware of or not, and that the abuser might want to make them aware or not. It can
include:
            </t>
            <ul spacing="normal">
              <li>Monitoring e-mail, chat-based or social media communication, or browsing history
either directly on the victim's computer or through specialised applications.</li>
              <li>Monitoring location and whereabouts by looking at the metadata of communication,
by using location-help applications, or by using specialized applications.</li>
              <li>Monitoring any data sent over the network by mounting DNS attacks or other specialised
attacks.</li>
              <li>Monitoring any information found on the UI by looking at laptops screens, or other
device's screens while the victim is using them.</li>
              <li>Using the Internet to seek public or private information to compile a
victim's personal information for use in harassment.</li>
            </ul>
            <t>
In this type of attack, we see these dimensions:  </t>
            <ul spacing="normal">
              <li>Monitoring of the content of communications either at the application layer
or other layers.</li>
              <li>Monitoring of the UI content of application tools.</li>
              <li>Monitoring of location information.</li>
            </ul>
          </li>
          <li>
            <t>Compromise of accounts: Research suggests that in IPV, an attacker may demand
access to a victim's accounts for continuous monitoring
and/or restricting their communication with others. This is different from the
previous point in that the perpetrator demands access (or uses invasive tools) to tools and contents, rather
than using "publicly available" tools or by monitoring without coercion. This type of attack is mounted in order
to reduce the "life space" or "space for action" that the victim-survivor may
have to perform activities that do not involve their attacker. Once an attacker
has access to an online account, they can use that to:
            </t>
            <ul spacing="normal">
              <li>Delete data, which can be communication data, documents and more.</li>
              <li>Have access to friends, family and contacts.</li>
              <li>Have access to communication, audio-video content, and any associated metadata.</li>
              <li>Lock out or change the authentication mechanisms that grant access to the account.</li>
              <li>Impersonate by using the victim's online identity to send false/forged messages to
others or to purchase goods and services.</li>
              <li>Impersonate by using the victim's online identity to publicly post information
that can be private or fake.</li>
            </ul>
          </li>
          <li>
            <t>Compromise of devices: This attack is similar to the above, but the attacker
demands access to the victim's devices. The goal is the same as the above but the
result is more impactful as it restricts access to accounts that are accessed
through the device. It can also prevent any connection to the Internet.
Once an attacker has access to the device, they can use it to:
            </t>
            <ul spacing="normal">
              <li>Phisical prevention of use of the device (the device can be used, for example,
to call police services, which is restricted with this attack).</li>
              <li>Access contacts and data (media or messages) stored in it.</li>
              <li>Access to accounts and authentication mechanisms for other accounts (saved passwords or
authenticator apps -2-factor authentication-, for example).</li>
              <li>Perform impersonation.</li>
              <li>Perform denial of access to the device, networks or the Internet in general.</li>
              <li>Destroy the device itself and any information stored in it.</li>
              <li>Impersonate by using the victim's online identity as accessed through the device.
to publicly post information that can be private or fake.</li>
            </ul>
          </li>
          <li>Exposing of private information or media: This attack builds on top of other attacks.
Once an attacker has access to an account or device, they can use this access to gather
private information or private media stored in it. This can later be used for
threatening, extortion, doxing (posting private information), and more.
It can also be used to gather information regarding bank accounts, tax information and more.</li>
          <li>Denial of access: This attack can be built on top of other attacks. It can consist
of denying access to a device, but also denying access to the Internet in general
by destroying routers (or network devices), changing Wi-Fi passwords or network
settings. The goal is to disallow access to services, or contact with family and friends.
It can also take the form of disrupting digital communications by flooding a
victim's communication tool with unwanted messages or by sending a virus program.</li>
          <li>Threats: This attack can be considered as a dimension of the previous attack as it can result
on a denial of access attack. It consists on sending e-mail, chat-based messages
or social media messages that threatens, insults, or harasses a victim.</li>
          <li>
            <t>Harrassing: This type of attack seems to appear in different dimensions:
            </t>
            <ul spacing="normal">
              <li>On-going harassment with the goal of intimidation, humiliation and monitoring.</li>
              <li>Harrassment that appears after a victim has "disconnected" to continue coercion:
"[Disconnecting] often makes it worse. Clients are much more at risk when they actually separate
from their abusers because he suddenly no longer has any control over that victim.
So often the only thing left is through the phone, so he's going to start
harassing you, calling, texting. If you change your number, now he's most
likely going to go crazy. So that's when he's going to start stalking you
any way he can."</li>
            </ul>
            <t>
Harrassment can be anonymous, but a victim often knows from whom harrassment
 messages/actions come from; but, due to its anonymity, it is unable to hold
 atackers accountable. The systems we have in place often need that harrassment
 content is permanently available so that an investigation takes place. This
 enhances the abuse a victim is suffering.</t>
          </li>
        </ul>
      </section>
      <section anchor="means-of-attacking">
        <name>Means of attacking</name>
        <t>The above attacks can be carried out in different ways. We list there the most
common ones:</t>
        <ul spacing="normal">
          <li>Installation of spyware or spoofing: This form of attack consists of installing
unwanted tools into a device in order to gain access to accounts or for active
monitoring. It can also take the form of remote access by remotely "hacking"
security questions, passwords or any authentication mechanism. Most of the
time, these tools are installed without the victim's knowledge.</li>
          <li>Coercion and control: This form of attack consists of using coercion and control
(which can be physical, emotional or psychological) to gain access to devices,
network devices, accounts or digital information. It often takes the form of
forcing victims to reveal passwords or account/devices authentication mechanisms.</li>
          <li>Shared network plans between family/relationship members: Often times, an
attacker is the legal "owner" of a device (owning children's devices, for example)
or accounts (a bank account, for example),
or they have access to accounts/devices as they are part of a shared family
plan. This enables an attacker to carry out the previously mentioned attacks
without the knowledge of the victim and without the need for installation of
tools.</li>
          <li>Monitoring: This means of attack consists of the abuse of social media and any public
information found on digital tools from the victim that has been shared through them. It also involves installing
tools for active monitoring on devices or using "bening" applications in
a dual-use manner (applications, such as the "track my phone" one).</li>
          <li>Exposure: This means of attack consists of the abuse of social media to enhance
harassment. It consists of using social media to post harmful content to humiliate,
to harass family or friends, for doxxing or to non-consensually share
intimate/private media.</li>
        </ul>
      </section>
    </section>
    <section anchor="specific-abused-technology">
      <name>Specific abused technology</name>
      <t>In the research of the ways attackers use technology to enhance IPV, we see this
specific technology being abused:</t>
      <ul spacing="normal">
        <li>Passwords and authentication mechanisms: all authentication mechanisms can be
used to enhance IPV as they are the single point of failure used by attackers
to get access to the account and/or devices (and, once they have access to those, they
can get further access to other accounts or devices). Attackers can use
specialised tools (to be installed in devices) to record authentication
mechanisms, they can coerce victims in order to get access to devices, and more.
They can also mount these attacks against fingerprints and biometric authentication
mechanisms, 2-factor authentication devices/applications and more.</li>
        <li>Media and private information: attackers can use the access to accounts/devices
to gain access to media and private information. This media can later be
used to bribe a victim, to humiliate them (by publicly posting it), to
enhance harassment and more.</li>
        <li>Recovery of account mechanisms: as with authentication mechanisms, attackers
can use 2-factor authentication devices, accounts and/or applications to get access to other
accounts or profiles</li>
        <li>
          <t>Lack of blocking mechanisms and abuse of anonymous mechanisms: Often times
attackers carry out abuse by:
          </t>
          <ul spacing="normal">
            <li>Contacting through fake numbers</li>
            <li>Contacting through fake accounts</li>
            <li>Sending messages to applications that have a "open" chanel for receiving any
message.</li>
            <li>Abusing of read-recipes to enhance control.</li>
            <li>Abusing the lack of blocking mechanisms.</li>
          </ul>
        </li>
      </ul>
    </section>
    <section anchor="recommendations">
      <name>Recommendations</name>
      <t>We list here some recommendations to protocol designers to mitigate technology-enabled IPV:</t>
      <ul spacing="normal">
        <li>
          <t>Build proper authentication systems: authentication mechanisms should provide:
          </t>
          <ul spacing="normal">
            <li>A non-deletable and non-modifiable list of who has access to accounts/devices.</li>
            <li>A way to recover access to an account and to change authentication
mechanisms.</li>
            <li>Provide mechanisms to revoke access.</li>
          </ul>
        </li>
        <li>
          <t>Storage and sharing of media: media should be stored/posted in such a way that:
          </t>
          <ul spacing="normal">
            <li>It can be taken down at the request of a victim if it consists of
private media posted without consent.</li>
            <li>Provide good and private mechanisms for reporting the posting of
non-consented media.</li>
            <li>Provide a way to destroy media once a device is in the hands of an attacker.</li>
          </ul>
        </li>
        <li>
          <t>Social media: social media can be a way for attackers to enhance monitoring.
They should:
          </t>
          <ul spacing="normal">
            <li>Provide proper blocking systems that are not limited to an individual account.</li>
            <li>Provide mechanisms by which only "accepted" people are able to send messages
to an account.</li>
          </ul>
        </li>
        <li>Browser history or searching information/metadata should be deleted by default.</li>
        <li>End-to-end encryption must be the default in order to prevent network monitoring.</li>
        <li>Considering local attackers when designing sensitive applications.</li>
        <li>Plausible deniability for sensitive applications.</li>
      </ul>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This document has no actions for IANA.</t>
    </section>
  </middle>
  <back>
    <references>
      <name>Informative References</name>
      <reference anchor="RFC7624">
        <front>
          <title>Confidentiality in the Face of Pervasive Surveillance: A Threat Model and Problem Statement</title>
          <author fullname="R. Barnes" initials="R." surname="Barnes">
            <organization/>
          </author>
          <author fullname="B. Schneier" initials="B." surname="Schneier">
            <organization/>
          </author>
          <author fullname="C. Jennings" initials="C." surname="Jennings">
            <organization/>
          </author>
          <author fullname="T. Hardie" initials="T." surname="Hardie">
            <organization/>
          </author>
          <author fullname="B. Trammell" initials="B." surname="Trammell">
            <organization/>
          </author>
          <author fullname="C. Huitema" initials="C." surname="Huitema">
            <organization/>
          </author>
          <author fullname="D. Borkmann" initials="D." surname="Borkmann">
            <organization/>
          </author>
          <date month="August" year="2015"/>
          <abstract>
            <t>Since the initial revelations of pervasive surveillance in 2013, several classes of attacks on Internet communications have been discovered.  In this document, we develop a threat model that describes these attacks on Internet confidentiality.  We assume an attacker that is interested in undetected, indiscriminate eavesdropping.  The threat model is based on published, verified attacks.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="7624"/>
        <seriesInfo name="DOI" value="10.17487/RFC7624"/>
      </reference>
      <reference anchor="NCAV" target="https://ncadv.org/learn-more/statistics">
        <front>
          <title>National Statistics Domestic Violence</title>
          <author initials="N. C. A. D. V." surname="Abuse" fullname="National Coalition Against Domestic Violence Abuse">
            <organization/>
          </author>
          <date year="2022" month="September" day="06"/>
        </front>
      </reference>
      <reference anchor="Dragiewicz2018" target="https://www.tandfonline.com/doi/abs/10.1080/14680777.2018.1447341">
        <front>
          <title>Technology facilitated coercive control: domestic violence and the competing roles of digital media platforms</title>
          <author initials="M." surname="Dragiewicz" fullname="Molly Dragiewicz">
            <organization/>
          </author>
          <author initials="J." surname="Burgess" fullname="Jean Burgess">
            <organization/>
          </author>
          <author initials="A." surname="Matamoros-Fernández" fullname="Ariadna Matamoros-Fernández">
            <organization/>
          </author>
          <author initials="M." surname="Salter" fullname="Michael Salter">
            <organization/>
          </author>
          <author initials="N. P." surname="Suzor" fullname="Nicolas P. Suzor">
            <organization/>
          </author>
          <author initials="D." surname="Woodlock" fullname="Delanie Woodlock">
            <organization/>
          </author>
          <author initials="B." surname="Harris" fullname="Bridget Harris">
            <organization/>
          </author>
          <date year="2022" month="September" day="06"/>
        </front>
      </reference>
      <reference anchor="WHO" target="https://apps.who.int/iris/bitstream/handle/10665/77432/WHO_RHR_12.36_eng.pdf">
        <front>
          <title>Understanding and Addressing Violence Against Women: Intimate Partner Violence</title>
          <author initials="W. H." surname="Organization" fullname="World Health Organization">
            <organization/>
          </author>
          <date year="2012"/>
        </front>
      </reference>
    </references>
    <section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>Thanks to:</t>
      <ul spacing="normal">
        <li>Lana Ramjit and Thomas Ristenpart for their insipiring work on this area,
and guidance for this draft.</li>
        <li>Shivan Kaul and Pete Snyder for discussions, guidance and support.</li>
      </ul>
    </section>
  </back>
  <!-- ##markdown-source:
H4sIAAAAAAAAA8Vc3bIbt5G+51OgmItIKZJHUrx2wq2tiizFsZLIVkmyfZFK
ucAZkITPzGAymDkUnXLVvsZe7rPsm+yT7NfdAAbg4ZGzP1XrC4vkzACN/vn6
d856vV6MdmzMVi1fdaNt9WjUGz2MnRnUt9Y1pquMemkPdtSNeuE6b2sz6NHi
03Khd7vB3OFR299Vy0Xtqk63WKoe9H5cWzPu15Vp7Jour588WVRY/eCG81bZ
bu8WC9sPWzUOkx+fPXny2yfPFnoweqv+YLC7bhYnN9weBjf1W/WV68zi1pzx
U71VoNQMnRnXL2mjxcKPuqu/1w1u2qqz8Qvf4gjf/21yo/Fb1blFb7fqL6Or
Vsq7YRzM3uPTuaUPf10s9DQe3bBdqPVC4T/b4aF3G/UCtPMPcqp3bm/1/KMb
DrqzPzIvturzQd8Z/t202jZbVR3NYLpbd/e7wXoz9RvQW2zwx436w2SGQWdb
/HFqrO50fqHc5iUWrY7OR5HgrNmeP8jjv6vDXXW8aYNVis1fb9SfOlebJtv8
tW4aCCe/UG7+4uX7fLf2lm/8XVWPvP5i0bkBCmTvzBayhYTTN6XefvHis0+f
fUIfv3rx/NstLzTq4WDGrTqOY++3Nzddpes7WuumMXro1q0bzA2EO1o/2kqO
GrX1KyYKSvkuXVcvXWvoU9LcJT+SxMv/rcNx0wIvnG4sfVbPDxrcGe+vo57v
Ji/iraHDW/XsybNn6ye/XT/5FD9CCw/WnGz147MnT39z/Win02lDWrp3XWM7
s6lce1M7e6N3/ubpk83TJ795cvP0k09/8+Szzz7b0DKbp5988tmvP3laHPo9
xNq5xh3Oaq8rC7JBTa0qZ4YKjMaHbhwcZFPHE9zFE2BvNR7plrY3o+0OCjca
r9xeBTVRramh4H2jRxKd/xjzXrumOWcHv7j8R6M79fkEFnh/cen5YHUNFX+t
Rw35Or/+Arb8H//e1eZylde2OmoDCesG9n4pPlu5Rnv1ZqPeTT+6y8svTQPN
Neo75+rGVbcXlz8fbA35qC/1APN8SLDfffn1dWnqvveb09FtbDfeWKxws7Oj
B67o9uYITjcGQv3003+6+eyzT3797AbrfP/2y7ffP322+fWn35vusOnrfSHY
b3D8gWGMJEOyel7XA7hHX2ctDPr5HaTbMQxeB+yPSe47NzS1+tKAp0f1dWbf
BROePlss1uu1gnqOg66Ase+P1kOtqglbj0rb1qvRKbFydXSnBMqqHxyQ1jU+
6pwdlG37xtCT4jpUaw/HUe3MiGfwZbQHOsdI6m0rqKIeR13dYoWRlRbGNyjT
1b0Dw9XurGrjq8HuiDtjson1TntYQ08E28owgb0ZoO4DrW4ju/rArmQbj169
+fbxRuH/CofU9NCd9mRQkCiM7AwiQAmudW5UjQXB2Gd0K7WbRlVB13dGmQ+6
MsOODfJkx+MqUK4PhoxsJnOj3uMCbUbmaj6MOJnekS3SA3JyUAfidYVTwEQ7
Q36rxTqDAkhjOVi4uaMzrhS0GwwD48ld4juJHYwGGxnTWuwLGfsWl+C7cQHH
SeDsuhVLCTu5qRs90+aNurVd7RPZLBICjsG1cGY4KgAXiyhd14KcINZ1615D
p4LowBtH3yryALxHrz3z9O9/D87gp5/AczxbaNbJROEa5sfIwhTeEM8Sf6AT
omEnkg0RTPTyMcywbo32EwwoSgdr2kMH0YDqV79//8WspRvR9NbWMNvF4hek
yIOrp4qNYvHq41oDDdnDclnVjmdPnFrBQTrxLSt1RyqBf735MNG/kKCB2MHH
CsaFMxDRrHEebIRma1VNw0CcwK0kJWx5qblgG2vjJKgBiAsK2olaaS/KNBjW
5w43mr9he9W7E5YbgI1shkfby4OFAu7Y2nCgShN9Rw0Dx8qQvSa1IrrkNMVC
pHke0oN64t/qaIEydNgGJMqafHg5M52zO0M32x2uMgeODheOrqkhjxhvJpux
JGqcpgJfEBkSOS1ij6GDMd4FNQiCnggCNFnxSZ/pFHI2vsV0MIWK9Wijngu0
eKAiYLgFecH+ycarEOkaeshNhyO0zHRBiwh16iskrjIrxFGvAWIA8PEIYBFr
w4YNFFp0NwuvwXev+omeBgZAlRX9JrCNBffkG0jF5PDeVRbU0OZBG0tQFXwU
VtRBCPQcvJYy+72piBiyxWkAImC7O3vnhoDg7Pw8IY5pXA+jh7Aq5RlVWTRQ
08SQfrB3ujoLVXpvgDZ0GaxuvWlYWBSn83XEQmdWLZYtay19ivwK7CZeVmco
ijcwDYKvHWKbBPNK3yEcZRkHrAhsHc+9WBcr9EotC3g9u0khgD0tVyxzY8le
CMQgf1LJPaMZg/gZsriTyKkx4GiA5dEBNmC4R92DiXdQDw9bMfgxYDOfsYRn
xtcz6yo/wZGbCU4yMHpz6WwjHvoCEFnRwbx7/o+1+xWr3R3UycNMQTpWqoPz
DfJI7N1fuOxLZ11oE9KKjNFQGYbfPeJBd4LeA773Fpg0gziDNlZlsCC3aYbW
CsHiIiN0x4NFEfERxT1hVdOJW+VHLk60Idh+afa2E29UuNuZK+DrHD9HyMtw
wWcOxstmcyRANmFs09CNMG/g+ggMwoZuAB4ImSkOFw2RiOL/x0F8flbL8GVJ
7GspIgfmkunxybBMQ6IsnEFiMPQXK4pzYGX9QCfzwTuw6/85h/B/5g9IyQQc
cIE4+j/2bFloNfu2DQKSMoP76SdcbhovkckyIttllrUknzAY0J7qERFgM+1b
E9izB0mwcS9ky/EiRmJ4cEdaTj/PQRw7tA+ke4GIFR/GdRSvXOqoxJCHwwCE
HAVxcWBEYWQvv1DvZ0OkMCcYFkyXzIcBiKorbNInLErWKL9nFoxE/1fwpMLX
LWtd5HKudjGosPyFZOjtOImfi6H1RLkOkpDkWR3h0XUHzsvBhXezTElL4Q0d
xQBscoPEAcuUAbhhuQG137JqC62i5jOlHBBMux/gD0ULZfmN+sqxq2FacTN5
qUhvYklyZ5JmS2hPq0QqlUf8ogfrtrRGz1QKpNPTy+h1KXtzpOMnGBxD2/sr
YBZxikXnhlrUukTdgGRMNZEc1ZPsMMtWMg3ONPcalrsJFotopO3FM+idm8bS
tgQH25Ykm0J3PebhGTtBYRP5aH+B15HK/AhEfaSiDup7zFK6uD25zowYYbMn
sLSXiYblxCqghHh/CrmAqJXZT000MBC3iDa5mrMuHPOG4KtMtrK8ir2smDzF
i/7sR9NKYEiZy6Kfdg2wM38i2DbjbNh9w+eJHrJQ9l0W2pFXge55fXd3ph0Q
wm7Ud8Qy+ESx2sUsITk4W7mhMM51Bzb7jrDGIybk9TnmmbqY7Sb0WoSjsKQD
PzYXfCdGcsIaKY+uLwPBzM08cvLIUVNEGk0I+eL4eLXgQHE/xvCK4DDoVwh6
A44m59Wyx+Dt2W2s4ol2ZkHrNuaAp9ypE1cjkRAf4yYKGnsE0khWES6rY2Z+
Qbn54IMgQks+DFmHpxOcjrY6JjCjQwQ6C/fAdM2lvBkrQFsCLtIfDuq+pJ1O
JioNibyxnE5Q+Ngit1BcL/cMy2+Nrs/rVtdGsHSbgFqyYs4B+r4JyutJcQIj
GNYCaHiku9hoN9lmJLll1DJRUjCgili4vTWUTnn2oTjs0oMB2PSEq0vaY+l7
8u38nQD5Jfz3mp3LP0LlKhmmNyOxJqc7UEmmtzMdlJ8VxJHj6WD32BYn66eh
d7F4MJjwlTWHn5SggENwK4EDqdGKrwE2KTheCa6Pdo3L+5G8ViAgx7q0ds3P
Mh9AMJ35VSsBnRh+QLktld5PJO1wsSngAarZN6G4lNnRg/UedQi5cRb4cH5v
paQFUU6kQtkCJAPwdbgfjkRLEbNYhaQRG5DLmw9D9Ti2QGZfqowhcZOKWbC2
w2AC8mYoQHd3FBwBjsCtiU94jcSUShInv3m1hhOSrOUaS0ttknAzsz+OL1JV
gAPRHXt22gZy/eaVBAK+N5WFPrGSzmUr0Yw5Y5GQraC35iKhrhHoezh/zYHU
wAylDo+g6ZwXArpXVE9FeoicFS5PN0Eug3Mjp9cWCGZY7WOBkL0XV4Oas0Ql
+6mrJMVASmSS+IrdyFyFd1id0jjaM9wieS8QTR9MTXDgLvWEHQwHhuZD3zis
RYSKjjEIFnkcqxtcq91BnFQFWahLzaUtIoEQ7DtBd2lKkCri8am9J1HuFEm1
gdxDYTFUMXEnWli6Nw/LPcboZcmWkY1RKcvbKcjEWkhBDSUDCOgG7nKpHyY/
koqk01BYLiEGwfPOwKNaRFD314LichldqhwBJlbydUcGwF9r9+EDKWZK0q4S
Cs69oZpCnzJhrjVtOV5qzRAjompOLEOGKzdKBZzJkZIUhyH8dD+vK7ZburFY
fCtZi+PxiuIv8yjGBx4xmAsGAN1HfQv7ododDteFQlIw2xJZIPmgmbGAxq3k
siYimjMNbCEWvgw66nPU2SONBeSZ29h4EcFyzDb1vRtGcf9/yivi12JUcrmv
U0Fgq76eY6zWcb3K3OmGIk84yKOr/aUOBmcTpUoGIsXzucwgbuespIkYwfke
klIs5YZ4s64ykTGohdtqZ3wMtmKgcqL2UPR+XdVMNUdcd0AuKuVhyaDHg/g6
ghpjgGkdUn3CvlpKSB3JAsSvUm3WdneuSWoGRVWikvPhKNmWIy+FrKiNUDwg
EfedyrPkrmNHJ9MUVRCVEgSvQgsq3B2yUGk+nXTH8UxLCsfOPzwcwudX7MdJ
fYUN1EjLJazMmvrgMFMsHwJD8vI5bFGgOnUBEjj23w3uxO4FDMY6Z2moS/pR
W+je2JB4s8P957/+m+fa40ToyqU7wSp2ScB3LnhnEdLmklAqN4hT5G4JMIDz
Nk/ernFONF84BNXUtR612H5OPBOKB8Q5xiXXR9P0F/EZnTLeF2n88edoJEXl
jTlZo/Ia0xNjeyzYkqrTrS+/epfyQtJy5l3GDGl+yg1X9ymztIkL0bwbnH3J
kkb3o0Ngi8TTmHA23k+apRzz/TJdppi/MblexrKGQBfT8k38nuXcjgFIhZQQ
e3ARfTSX2SFpAe0gkyGyB7a/Gi3uJdEkQ5KiDyW9gDKVYpdUH2dWcbrvOSwj
Z1IjhO+ow0C5xAUPA6pxiaMb76mKj/ocrW6WOxh6DsxLkuOf7gsqbAKRZPvk
SwV3d/+xpO4ZOzaEzi/mDiatFSLbLRIljyAC2ZqfDpQJ+7ybtioC6FZT7xlg
VDM8pxh8FkYKmEkARLrtKO/IcI6elOoBVdsGelA0wg4lI8XTM5f8nJDUFqE3
13/ZdQmik3OxtI10yG0GkVn9K5DuI+WPQjGCsDnEAMTUxxyou9gOCPyH9mMR
0X0s3gXNXorWUpAe+zDL8LAAQQbwdB4qGEklFVK5aNRIlcx6sXVpb3BpS9z8
YOpJmiVq2dg91LXXVcop8THUXIh3y0sfsY7lNZIh1uPyhgwIcLDDjkdiZX6y
dtwInL0WiSfqwQbevSqydV7R5yrRXXjp0EqKOa2Q58SrvDTcWCIAXIXKQYio
SoWQG2IJS8RDQ1JiBl/qu6w5BfWwBsJG4qpb25yTLHU1+qsPXHgrPdXWramF
5KIOhGEBCio8OzoSUvQZsuafHcViE3cnKBM9iMAezlKZEYdBs3fPi0OBb7Ls
nDCb2bvM0v2lj9xOMw6MqhT8Icg2N5DxgWn1FF5xHYtRiI0rlMqRrYMqyObg
KDzjnCLkwv8LIpJ99I6D04RJMgCU1Qsi6lNfB0HJFcwKVYat2M1sL95CwnpI
nNs5irx2F7VZLlMUAFCU4X7pUzmPI7ODI5fi5y659vPqcXHOhPzUjGK2lIC1
MMWRKqhSS4wgVxhHBMlUZZJrkmpmuZgQFIMxKfAT1nEsCDWEXnamiv4x96ok
sUsjvTDReYML27SzZb4Bo7lwGXYNSVXoy80rqEfZ5ywbKstGInLHpTHoQ0M3
RxWLhm99YplJLc8k7ceiic/lENGcpRZL4dMjCTwJ5oKqP1YUaAqY2rF4PJcE
G/aDRrpP7jo98MgDPWSqh6ZyyYjS2FlYhNCY6oLrZ+s9yLxXL18X3AlHexMA
uajnlJdgXVzX2z8gzNhZU6HRnSItKpDKcPEm4C6Vv8+5HO3oTbNPOJeHVPf5
+N8HhKSAlCjfV/SoIA+Cxs8Cxu8/4JEQCV0LI1kzoCIlhlDdlERIZtRz/hQi
uBRF/4wt0ZWQjaZy7D2PZ/MnDjGYeIDK+LModMH7rAbAJadYedg7CU4owTQd
F03MBzwo/qx2XD55RCzlIuv9fR+vCpeao05W3RDKC3oHc9ADz27udHebjITK
GR+KG+flqfJ9ocelTIKQpaT9kGQijTw75CkdZzfRnTmDyQLUKBIuRtKB7t/0
gKksVJi4JFORwWFKRSV8jAla8ByPV+L06bbv7PoLW+BDvJvKnqF4f+FqQJb1
NId+yuiaETKE1MASAcYssgnRzqXYxpDdp4oW1h+mfsxnuC6yFxx2jxxQJnEX
WZ5VxmIU4woVU0e1hDy6kMiXwg9eBEsMFJsPDnFOy6J/L1WQqxLPhs94kC3l
YtHlpGg/PDc37cQXkxZ0LPMLnIzt7FdjVBi2+UjolYpGPNJC3StuzLGURNpi
ddRu64gIEZfknmbuqPHpaexac2N0ezUFQB4q88VwH0jNSBnntCdPTQmEv+7W
B8cllZTnzjVS1iwszJ1iW4fQ9jhBb2xukTFHiYHxkJaSEIXpwCn2hDc6L7Qt
oVEhDDH1MtY0kfWZlOfIDPbyLy/Tndjpr6GrSfUnlh8sg4YaXjRWYnvqKE4I
CDiqAg2D9bcyhsiwCiOYpOtrek2jeLxJzAltGK2RnoQMu9BsQw2dwDNzn4Vh
XCIpaXdL6QX7RXnRsu9coJZ4ynMOQHOqA5n9KDHi7Mr6YxhYxo5cvBLpkCGP
ehh5PREV/Xx204rjIYZrmpkgKahXe57QCxnEmQYPuommg+DdAQ5hZSqs8nqN
vaVOVNrpACkM+sfzhiin0/DtzLyrRKXmHG0lYYz0chW3/7rNkqoghV4EY9Wd
687IV32A1qgawi6aMPQilNPRkcKkBWi9aEI3krQyxBi+/Z9pNfisiZNUywEa
bYQYgvvZPP0rQ4/gs2u46qVjYT34H7ouABt79icjiS8Mqm809wCIzM6YUCa9
IDDWXqyfi7B5qk9SFgPhAi+9c3II8MhqzZuIv6bl0qBdqsbODKM0ZiIbZyuk
kvtrozs/owKVTmTMgBOQWAKMoElvclAJdhpLuKBeFPeqYqt8MKkovwiTBDT6
wD3zVx0pQqNjnO/7cywK+965/YxY0Z9E6E5wSljDi0ipJzkHqYkAh2ZvnOob
ElXY7lqKJFN+oReABTOs+rinG2jKMOX38EfyA8S3PAo7l+yIw1Dt3yaSHldw
C5/N2f4DicFGvXZxYIwbbDxHnbWjlLTkmB8hm4kTQ8mtko3g4sFsON8VyEzV
Cn6d6ec4LoF3deVZEPWoKKhcGcLkaNOfq2McpXl8RR5x8gcLXsQ8q0JWMajI
i48kpwCfbBWZlKh/Qm1RkB9aYFLpujOUcxZykE1u0rDgQ8kaN0+pF5pGTsgM
KbDBN2O6EDXdFMOSMnqJeORroZMmOCgYXqg54g+1AJmfWfIAzVKaiDEHxm8s
CJr2hPHNFYUy0ZNgYs4kdRE1l/eu5OYxjWHfN5GZJT64xkEmYUPrXnghp6Z8
A8wIKcQ8BHwxHDoMZxUVNUZbDQ2ocgWAArPQ9FOFTidVLsclpPGS3cd4u+e5
lAJvuM4Zurh5L5GJbUs4LAxgxlMCrcvOOZmwZJTczrrS/SiHLmMQUYwBU6Cw
M3EMq8heW9ZwRqFQL/UlCIZlE4wVLc0uDc9wOZqLyjtO35blfJIMDcAnhnkh
uCOa4XpUtp88xUyhVLWkl9duVXuWoGRJQP94E7PkaTD/K9bO/duFypssZXgd
0enyUc7sadYoDhsa6UfG2JSrRfSdF46pDnmDVNcluAlDAVLBRIiwpp0RH4fY
kGTFQpdByZsiq+bh0ndxsoUPmQ+n5VPB0iAJ7Lg23vHQaEXWV0IMMI/RzPfv
DCdJvDs74TcJ9j5alNryu3AP16xSU/jKVEIBFVzgBA0IZ6R9gmPuEeBMQ8j5
aSoonlaEQu+OXq1Wx9ZOVOlH+I5EqJO+xT0I49cppE6ChYliWjnOK8z3XdTe
5g0eb+7Py5FXz3rDYnyPRq5hzL7YJrt7LC6nAssv2EnhRvb+YCrnhNdWoscq
wpiCM/m8bCqrFOMv0usJMUMa9w3vSVG8ZQbobKxQ7iyNFw6krR8j9IF64zzn
mcPKTBpAN2HmlerQNtP5uaj1MY8UlKWMJNqP7bGJgMTjA1mFK9PjHc9i6zSL
l4OGTDI82p3LEiKPV4yPV9L3iIaQJcw5E95CFZAFnrMuaWl24eWYj7xpmptL
ZNXPCCULo+JwdS6le6oV+/C5UdCLcZb+KMKv1J/DTNCO3v6m42fIMI8U8YhM
SOCKM2ZhUBYC+Sw0iG+uSBHihZSlpP4rjpFKsiFp9R+9J56Ab3oXajFZp+qC
EeKMCUYQhPWmW3KWbBr2B/P0Epw+J7JhoVD4D8ONnB7oeo3bbW+KUaQ0eZ7f
z3HfwxxlR/K2fClrsYg5F6dcPI99+SYaucHyZb9/4O1FwDe7ic+pZk3P9+ae
ToV8d/sR9+ARjcnz1OIUKT5nD1pTNza9c0K/tA75pOWf+ETgAtL5yxL4hfEH
Dsb3UAexqus1cy1DmKHccQ/bVMFrboUI2UUjlfMGd5teP6M8APZG42RxPjLI
PnQAQmldGLEzoch+Q4AhDkJiKTkB1E6Y9CrVPiibgf0i6o+zHoPhNFIC75jY
77k6OQdEfKCyvB+2nAcEKIYZy6NSV7aAzYv+1GBoWi9qa0S9sN0cGUmhlqOf
fPX0vnAodAfC2HPP+XqalzvqMA6YpQ6XU6vbi2GwUDDijTgWzgcho/mVpUh2
lSKgbUFuUPtki7HAkxqq5V8qkPpMDWSg6LlsrV9RJbgPSZq51Lckfeq5utkb
1zfytkMsPnGTPSsTq1K1iSmf09Ab1Rpl5k1eGKSAkt3S7Pxu0vjZrJNsjBKD
1Wavp4ZX/H1Xr0e3NvxOWDWcZSq1pfHP8HcDws1FbBI7xzEtznn9q/TXjeJ8
W5MJ6OLtbwqwrfxhg2KoDcxsNBCTWMPF9zBrz+P/DzxDIXiswZR/YIn/GMHz
r57f+7l8PZhQqHMqlhBpL3oq/F2DHU5ACz2vYnLKoyOLv2/FNZn6X5Y8IrH8
iRZGHu65+c0utNPqrW5/sAJQ74+uxV5vIUXTcX4d3iS2nMja3sqUD7HWhSEz
+otOK5l4UofJ1qzj8lh8w1DqFTDpTv1JT/KuzBsah3nXnUlw8na5ryZ+4x1x
QlqHUS0O6f4XmgR9vstKAAA=

-->

</rfc>
