<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.29 (Ruby 3.4.4) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-dult-threat-model-03" category="info" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.30.2 -->
  <front>
    <title>DULT Threat Model</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-dult-threat-model-03"/>
    <author fullname="Maggie Delano">
      <organization>Swarthmore College</organization>
      <address>
        <email>mdelano1@swarthmore.edu</email>
      </address>
    </author>
    <author fullname="Jessie Lowell">
      <organization>National Network to End Domestic Violence</organization>
      <address>
        <email>jlowell@nnedv.org</email>
      </address>
    </author>
    <author fullname="Shailesh Prabhu">
      <organization>Nokia</organization>
      <address>
        <email>shailesh.prabhu@nokia.com</email>
      </address>
    </author>
    <date year="2025" month="October" day="17"/>
    <area>Security</area>
    <workgroup>Detecting Unwanted Location Trackers</workgroup>
    <keyword>Internet-Draft</keyword>
    <keyword>detecting unwanted location trackers</keyword>
    <keyword>threat model</keyword>
    <abstract>
      <?line 46?>

<t>Lightweight Location-tracking Tags are in wide use to allow users to locate items. These Tags function as a component of a Crowdsourced Network in which Devices belonging to other network users (e.g., phones) report which Tags they see and their location, thus allowing the Owner(s) of the Tag to determine where their Tag was most recently seen. While there are many legitimate uses of these Tags, they are also susceptible to misuse for the purpose of stalking and abuse. A protocol that allows others to detect Unwanted Tracking must incorporate an understanding of the Unwanted Tracking landscape today. This document provides a threat analysis for this purpose, including a taxonomy of Unwanted Tracking and potential attacks against Detection of Unwanted Location Tracking (DULT) protocols. The document defines what is in and out of scope for the Unwanted Tracking protocols, and provides design requirements, constraints, and considerations for implementation of protocols to detect Unwanted Tracking.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        The latest revision of this draft can be found at <eref target="https://ietf-wg-dult.github.io/threat-model/draft-ietf-dult-threat-model.html"/>.
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-ietf-dult-threat-model/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        Detecting Unwanted Location Trackers Working Group mailing list (<eref target="mailto:unwanted-trackers@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/unwanted-trackers/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/unwanted-trackers/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/ietf-wg-dult/draft-ietf-dult-threat-model"/>.</t>
    </note>
  </front>
  <middle>
    <?line 50?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>Location-tracking Tags allow users to locate items. These Tags function as a component of a Crowdsourced Network in which Devices belonging to other network users (e.g. phones) report on the location of Tags they have seen. At a high level, this works as follows:</t>
      <ul spacing="normal">
        <li>
          <t>Tags ("Accessories") transmit a Location-enabled Advertisement Payload containing Accessory-specific information. The Payload indicates whether the Accessory is separated from its Owner(s) and thus potentially lost.</t>
        </li>
        <li>
          <t>Devices belonging to other users ("Non-Owner Devices") observe those Payloads and if the Payload is in a separated mode, report its location to a Crowdsourced Network.</t>
        </li>
        <li>
          <t>The Owner(s) queries the Crowdsourced Network for the location of their Accessory.</t>
        </li>
      </ul>
      <t>A naive implementation of this design exposes both a Tag's user and anyone who might be targeted for location tracking by a Tag's user, to considerable privacy risk. In particular:</t>
      <ul spacing="normal">
        <li>
          <t>If Accessories simply have a fixed identifier that is reported back to the Crowdsourced Network, then the central server is able to track any Accessory without the user's assistance.</t>
        </li>
        <li>
          <t>Any Attacker who can guess a Tag ID can query the Crowdsourced Network for its location.</t>
        </li>
        <li>
          <t>An Attacker can surreptitiously plant an Accessory on a Target and thus track them by tracking their "own" Accessory.</t>
        </li>
        <li>
          <t>Attackers could launch Denial-of-Service (DoS) attacks by flooding the Crowdsourced Network with spoofed Tag reports, disrupting real updates and overwhelming the Network.</t>
        </li>
        <li>
          <t>Frequent co-location of multiple Tags enables the Crowdsourced Network or a passive observer to infer social relationships, routines, or group behaviors, compromising user privacy without consent.</t>
        </li>
      </ul>
      <t>Detecting Unwanted Tracking is currently left to individual Tag manufacturers and Platforms on Non-Owner Devices. Each manufacturer and Platform has different implementations to prevent Unwanted Tracking, which may or may not be compatible with other manufacturers or Platforms. The goal of the IETF Detecting Unwanted Location Tracking (DULT) working group is to standardize a protocol between Location-tracking Tags, Non-Owner Devices, and Crowdsourced Networks.</t>
      <t>In order to standardize a protocol for detecting Unwanted Tracking, thus minimizing the privacy risks described above, it is necessary to analyze and be able to model different privacy threats. This document includes: 1) a taxonomy of Unwanted Tracking, 2) methods Attackers could use to circumvent the DULT Protocol, and 3) design considerations for implementing the DULT protocol. The taxonomy of Unwanted Tracking uses a flexible framework to provide analysis and modeling of different threat actors, as well as models of potential Targets based on their threat context. It defines how these Attacker and Target persona models can be combined into threat models. The section on methods to circumvent the DULT protocol includes a threat matrix and description of several different possible attack vectors. Finally, the design considerations section focuses on specific requirements and constraints for successfully detecting Unwanted Tracking, alerting users, and providing guidance on disabling Tags (if desired). This threat model document is intended to inform the work of the implementation of the DULT Protocol as described in <xref target="I-D.draft-ietf-dult-Accessory-protocol"/> and <xref target="I-D.draft-ietf-dult-finding"/>. The DULT Protocol is based on an earlier Internet Draft; see <xref target="I-D.draft-ledvina-apple-google-unwanted-trackers"/>.</t>
      <section anchor="applicability">
        <name>Applicability</name>
        <t>While there are many types of technology that can be used for Location Tracking, it is infeasible to attempt to describe a threat analysis for each possible technology in this document. The threat model described here is likely not applicable to the following areas: app-based technologies such as parental monitoring apps that do not use Location-tracking Accessories, Internet of Things (IoT) Devices that are Easily Discoverable, connected cars, or user accounts for cloud services or social media. A notable exception to this is GPS trackers; see <xref target="bluetooth-vs-other-technologies"/> for relevant information and recommendations.</t>
        <t>This threat model is also more likely to be applicable in regions where the use of Location-tracking Tags is more prevalent. While Location-tracking Tags have existed for over a decade, they became especially widely-used in the Global North in the last several years as Crowdsourced Networks were deployed by major smart phone manufacturers. However, due to their reliance on a high density of Non-Owner Devices for the network to be effective and the relative cost of Location-tracking Tags, Location-tracking Tag use in the Global South is typically limited to affluent communities. If the cost of Non-Owner Devices and Location-tracking Tags decrease, an uptick of Unwanted Tracking could also occur in contexts where it is currently infeasible. This threat-model does still attempt to consider possible regional differences in Location-tracking Tag use (such as differences between rural and urban use), and also the sometimes limited resources that may be available to Targets of Unwanted Tracking.</t>
      </section>
    </section>
    <section anchor="conventions-and-definitions">
      <name>Conventions and Definitions</name>
      <section anchor="conventions">
        <name>Conventions</name>
        <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
        <?line -18?>

</section>
      <section anchor="definitions">
        <name>Definitions</name>
        <dl>
          <dt><strong>Accessory</strong>:</dt>
          <dd>
            <t>any product intended to interface with a Platform to connect to a Crowdsourced Network through the means described in these documents.</t>
          </dd>
          <dt><strong>Active Scanning</strong>:</dt>
          <dd>
            <t>method(s) of Unwanted Tracking detection that involves a user initiated scan for nearby Accessories. Contrast with Passive Scanning.</t>
          </dd>
          <dt><strong>Attacker</strong>:</dt>
          <dd>
            <t>any individual, group, or organization that is attempting to engage in Unwanted Tracking and/or circumvention of the DULT Protocol.</t>
          </dd>
          <dt><strong>Crowdsourced Network</strong>:</dt>
          <dd>
            <t>a service that Platforms communicate with to share and retrieve location information of Accessories.</t>
          </dd>
          <dt><strong>Disablement</strong>:</dt>
          <dd>
            <t>the process of preventing a specific Location-tracking Accessory from communicating with the Crowdsourced Network. This could be through physical means (e.g. removing the battery) or via a command sent by a Platform to an Accessory (e.g. Remote Disablement).</t>
          </dd>
          <dt><strong>Disablement Instructions</strong>:</dt>
          <dd>
            <t>steps Non-Owner Device users can take to disable a Location-tracking Accessory suspected of Unwanted Tracking.</t>
          </dd>
          <dt><strong>Device</strong>:</dt>
          <dd>
            <t>Hardware that includes software for a Platform and that can connect to Accessories and one or more Crowdsourced Networks. Examples of Devices are phones, tablets, laptops, etc.</t>
          </dd>
          <dt><strong>Detecting Unwanted Location Tracking (DULT) Protocol</strong></dt>
          <dd>
            <t>the protocol under development by the IETF DULT working Group to prevent Unwanted Location Tracking. This includes protocols for Accessories and the crowd sourced network, along with algorithms for detecting Unwanted Tracking.</t>
          </dd>
          <dt><strong>Easily Discoverable</strong>:</dt>
          <dd>
            <t>an Accessory that is larger than 30 cm in at least one dimension, larger than 18 cm x 13 cm in two of its dimensions, and/or larger than 250 cm<sup>3</sup> in three-dimensional space. Location-tracking Accessories that are not Easily Discoverable <bcp14>MUST</bcp14> adhere to the DULT protocol.</t>
          </dd>
          <dt><strong>Location-enabled Advertisement Payload</strong>:</dt>
          <dd>
            <t>the Bluetooth (BT) advertisement payload that is advertised when an Accessory has recently, is currently, or will in the future provide location updates to its Owner.</t>
          </dd>
          <dt><strong>Location-enabled State</strong>:</dt>
          <dd>
            <t>the state an Accessory is in where its location can be remotely viewed by its Owner.</t>
          </dd>
          <dt><strong>Location-tracking Accessory</strong>:</dt>
          <dd>
            <t>any Accessory that has location-tracking capabilities, including, but not limited to, crowdsourced location, GPS/GNSS location, WiFi location, cell location, etc., and provides the location information back to an Owner Device via a Crowdsourced Network using the internet, cellular connection, etc. Location-tracking Accessories that are Easily Discoverable <bcp14>MUST</bcp14> adhere to the DULT Protocol. Location-tracking Accessories may also be referred to as Location-tracking Tags.</t>
          </dd>
          <dt><strong>Location-tracking Tag</strong>:</dt>
          <dd>
            <t>a term that may be used interchangeably with Location-tracking Accessory.</t>
          </dd>
          <dt><strong>Non-Owner Device</strong>:</dt>
          <dd>
            <t>a Device that may connect to an Accessory but is not an Owner Device of that Accessory.</t>
          </dd>
          <dt><strong>Owner</strong>:</dt>
          <dd>
            <t>an individual that is in active control of and the primary user of an Owner Device. An Owner may be associated with one or more Accessories and/or Devices.</t>
          </dd>
          <dt><strong>Owner Device</strong>:</dt>
          <dd>
            <t>a Device that is associated with the Accessory and can retrieve the Accessory's location by querying the Crowdsourced Network.</t>
          </dd>
          <dt><strong>(Obfuscated) Owner Information</strong>:</dt>
          <dd>
            <t>(obfuscated) contact information for an Accessory Owner. When an Accessory is marked as lost, this should include a phone number and/or email address. Otherwise, the information should be obfuscated to ensure privacy of Owners in cases where Accessories are falsely suspected of Unwanted Tracking or an Attacker attempts to determine the Owner of an Accessory. The information should include no more than the last two digits of a phone number and/or an obfuscated email address with the first letter of the username and entity visible, as well as the entire extension (e.g., b<strong>**</strong><strong>@i</strong>***.com).</t>
          </dd>
          <dt><strong>Passive Scanning</strong>:</dt>
          <dd>
            <t>method(s) of Unwanted Tracking detection that are running in the background on all Devices and may trigger Unwanted Tracking Alerts. Contrast with Active Scanning.</t>
          </dd>
          <dt><strong>Platform</strong>:</dt>
          <dd>
            <t>Operating systems that communicate with Accessories.</t>
          </dd>
          <dt><strong>Platform-compatible Method</strong>:</dt>
          <dd>
            <t>a method of communication between the Platform and the Accessory/Accessory manufacturers to exchange information, including, but not limited to, BT GATT protocol, BT advertisement, HTTP, etc.</t>
          </dd>
          <dt><strong>Remote Disablement</strong>:</dt>
          <dd>
            <t>the process of preventing a specific Location-tracking Accessory from communicating with the Crowdsourced Network via a command sent by a Platform.</t>
          </dd>
          <dt><strong>Unwanted (Location) Tracking (UT)</strong>:</dt>
          <dd>
            <t>undesired tracking of a person, their property, or their belongings by a Location-tracking Accessory.</t>
          </dd>
          <dt><strong>Unwanted Tracking Alert</strong>:</dt>
          <dd>
            <t>an alert notifying the user of the presence of an unrecognized Accessory that may be traveling with them over time that allows them to take various actions, including playing a sound on the Accessory if the Accessory is in Bluetooth Low Energy (BLE) range.</t>
          </dd>
          <dt><strong>Unwanted Tracking Detection</strong>:</dt>
          <dd>
            <t>algorithms that detect the presence of an unknown Accessory traveling with a person over time.</t>
          </dd>
          <dt><strong>Target</strong>:</dt>
          <dd>
            <t>a individual who an Attacker is attempting to track without their consent. A Target may or may not own a Location-tracking Accessory.</t>
          </dd>
        </dl>
      </section>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>Incorporation of this threat analysis into the DULT Protocol does not introduce any security risks not already inherent in the underlying Location-tracking Tag protocols.</t>
      <section anchor="security-considerations-unique-to-unwanted-location-tracking">
        <name>Security Considerations Unique To Unwanted Location Tracking</name>
        <t>In a situation involving interpersonal control, an Attacker may be more likely to have access to a Target's Device or passwords. The Attacker could have physical access to a mobile Device on which a tracking account app is installed, remote access through a web portal, or both. The risk of an Attacker accessing a Target's tracking account remotely can be mitigated, though not eliminated, through support for different forms of multi-factor authentication (including hardware keys, e.g. Yubikeys, as well as more traditional methods). While this can also be used to mitigate the risk posed by physical access, taking overt security measures while frequently in physical proximity to the Attacker may lead to the Attacker escalating their tactics of interpersonal control. Risk assessments and the weighing of tradeoffs in such situations are often highly individualized. The ability of a user to access a tracking account over a web portal illustrates the need to consider web app security as part of support for detecting Unwanted Tracking.</t>
      </section>
      <section anchor="balancing-privacy-and-security">
        <name>Balancing Privacy and Security</name>
        <t>In order to avoid pitting the privacy of Tag Owners not engaged in Unwanted Tracking against the security/safety of Targets, the DULT Protocol must consider and balance the privacy and safety of different users of the Crowdsourced Network. Existing attempts to prevent Unwanted Tracking (i.e. where an Attacker uses their own Tag to track a Target without their consent) have been criticized as potentially making it easier for an Attacker to track a Target using the Target's own Tag. This can occur if Tags do not rotate identifiers frequently enough. However, Eldridge et al. have <eref target="https://eprint.iacr.org/2023/1332.pdf">demonstrated</eref> a technological solution that employs secret sharing and error correction coding that may preserve the privacy of Tag Owners without reducing the efficacy of detecting Unwanted Tracking.</t>
        <section anchor="security-against-unwanted-tracking-for-potential-targets">
          <name>Security against Unwanted Tracking for potential Targets</name>
          <t>The DULT Protocol must make it possible for potential Targets to discover Unwanted Tracking across Accessory hardware and Platforms within a reasonable amount of time. It should aid the Target in determining the location and Owner of the Accessory while not providing a full name or contact information on demand (as the Tag may merely have been lost or otherwise coincidentally in proximity, and providing excessive information would violate the privacy of a non-malicious Tag Owner). This could potentially be done with obfuscation, such as showing a partially redacted email address or phone number (see <xref target="active-scanning"/>).</t>
        </section>
        <section anchor="privacy-for-potential-targets-against-the-use-of-security-measures-for-further-surveillance">
          <name>Privacy for potential Targets against the use of security measures for further surveillance</name>
          <t>The DULT Protocol must consider the threat vector of an Attacker with access to a Target's Tag-associated account. In one study of how intimate partners misuse technology <eref target="https://dl.acm.org/doi/pdf/10.1145/3173574.3174241">Freed et al, 2018</eref>, 72% of survivors reported being forced or coerced to share passwords with an abuser. 41% reported that a cohabiting abuser "went through" their Device while they were not looking, allowing the abuser to obtain saved account passwords in many cases. 67% reported that an abuser was able to "hack" into their accounts remotely. To prevent use of a Target's own Tag as a means of surveillance, the protocol should minimize information that can be accessed from a web interface associated with a user's Tag-linked account.</t>
        </section>
        <section anchor="privacy-for-unassociated-tag-owners">
          <name>Privacy for unassociated Tag Owners</name>
          <t>Any unassociated Tag Owner, whether an abuse/stalking survivor or not, could potentially be the Target of an attack leveraging the Target's own Tags. Survivors and activists for women's and LGBTQIA+ rights, and/or against intimate interpersonal violence, may face severe government surveillance, repression, and even imprisonment <eref target="https://www.amnesty.org/en/latest/news/2025/03/iran-authorities-target-womens-rights-activists-with-arbitrary-arrest-flogging-and-death-penalty/">Amnesty International, 2025</eref>, <eref target="https://www.hrw.org/news/2020/03/18/kazakhstan-womens-day-activists-convicted">Human Rights Watch, 2020</eref>, <eref target="https://www.theguardian.com/global-development/2015/mar/18/honduras-women-gladys-lanza-feminism-human-rights">Ruiz-Navarro, 2015</eref>. Broad issues of technological privacy, including privacy against government and corporate surveillance, affect many populations, including but not limited to human rights defenders, children, migrants, and LGBTQIA+ people. Some people in these categories may <em>also</em> be survivors of abuse or stalking. The DULT Protocol must not eschew legitimate privacy interests of Tag Owners in the name of safety and security for Targets.</t>
          <t>The same person may be a Target of both Unwanted Tracking via an Attacker's Tag, and surveillance via their own Tag, either at different times or simultaneously. The DULT Protocol should account for this scenario.</t>
        </section>
      </section>
      <section anchor="taxonomy-of-unwanted-tracking">
        <name>Taxonomy of Unwanted Tracking</name>
        <t>To create a taxonomy of threat actors, we can borrow from Dev et al.’s <eref target="https://dl.acm.org/doi/fullHtml/10.1145/3544548.3581484">Models of Applied Privacy (MAP) framework</eref>. This framework is intended for organizations and includes organizational threats and taxonomies of potential privacy harms. Therefore, it cannot be applied wholesale. However, its flexibility, general approach to personas, and other elements, are applicable or can be modified to fit the DULT context.</t>
        <t>The characteristics of threat actors may be described as follows. This is not intended to be a full and definitive taxonomy, but an example of how existing persona modeling concepts can be applied and modified.</t>
        <ul spacing="normal">
          <li>
            <t>Expertise level
            </t>
            <ul spacing="normal">
              <li>
                <t>Expert: The Attacker works in or is actively studying computer science, networking, computer applications, IT, or another technical field.</t>
              </li>
              <li>
                <t>Non-expert: The Attacker does not work or study in, or is a novice in, a technical field.</t>
              </li>
            </ul>
          </li>
          <li>
            <t>Proximity to Target
            </t>
            <ul spacing="normal">
              <li>
                <t>High: Lives with Target or has easy physical access to Target and/or Target’s possessions.</t>
              </li>
              <li>
                <t>Medium: Has some physical access to the person and possessions of someone who lives with Target, such as when the Attacker and Target are co-parenting a child.</t>
              </li>
              <li>
                <t>Low: Does not live with or have physical access to Target and/or Target’s possessions.</t>
              </li>
            </ul>
          </li>
          <li>
            <t>Access to resources
            </t>
            <ul spacing="normal">
              <li>
                <t>High: The Attacker has access to resources that may amplify the impact of other characteristics. These could include, but are not limited to, funds (or control over “shared” funds), persons assisting them in stalking behavior, or employment that provides privileged access to technology or individuals’ personal information.</t>
              </li>
              <li>
                <t>Low: The Attacker has access to few or no such resources.</t>
              </li>
            </ul>
          </li>
        </ul>
        <t>In addition, the Target also has characteristics which influence the threat analysis. As with Attacker characteristics, these are not intended as a definitive taxonomy.</t>
        <ul spacing="normal">
          <li>
            <t>Expertise level
            </t>
            <ul spacing="normal">
              <li>
                <t>Expert: The Target works in or is actively studying computer science, networking, computer applications, IT, or another technical field.</t>
              </li>
              <li>
                <t>Non-expert: The Target does not work or study in, or is a novice in, a technical field.</t>
              </li>
            </ul>
          </li>
          <li>
            <t>Expectation of Unwanted Tracking
            </t>
            <ul spacing="normal">
              <li>
                <t>Suspecting: The Target has reason to believe that Unwanted Tracking is a likely risk.</t>
              </li>
              <li>
                <t>Unsuspecting: The Target has no particular reason to be concerned about Unwanted Tracking.</t>
              </li>
            </ul>
          </li>
          <li>
            <t>Access to resources
            </t>
            <ul spacing="normal">
              <li>
                <t>High: The Target is generally able to safely access practical and relevant resources. These might include funds to pay a car mechanic or private investigator, law enforcement or legal assistance, or other resources.</t>
              </li>
              <li>
                <t>Low: The Target is generally unable to safely access practical and relevant resources.</t>
              </li>
            </ul>
          </li>
          <li>
            <t>Access to technological safeguards
            </t>
            <ul spacing="normal">
              <li>
                <t>High: The Target is able to safely use, and has access to, technological safeguards such as active scanning apps.</t>
              </li>
              <li>
                <t>Limited: The Target is able to safely use, and has access to, technological safeguards such as active scanning apps, but is unable to use their full capacity.</t>
              </li>
              <li>
                <t>Low: The Target is not able to use technological safeguards such as active scanning apps, due to reasons of safety or access.</t>
              </li>
            </ul>
          </li>
        </ul>
        <t>It is also appropriate to define who is using the Location-tracking Tags and incorporate this into a model. This is because if protocols overly deprioritize the privacy of tracking Tags’ users, an Attacker could use a Target’s own Tag to track them (see <xref target="balancing-privacy-and-security"/>).</t>
        <ul spacing="normal">
          <li>
            <t>Tracking Tag usage
            </t>
            <ul spacing="normal">
              <li>
                <t>Attacker only: The Attacker controls one or more Location-tracking Tags, but the Target does not.</t>
              </li>
              <li>
                <t>Target only: The Target controls one or more Location-tracking Tags, but the Attacker does not.</t>
              </li>
              <li>
                <t>Attacker and Target: Both the Attacker and Target control one or more Location-tracking Tags.</t>
              </li>
            </ul>
          </li>
        </ul>
        <t>Any of the threat analyses above could be affected by placement of the Tag(s). For instance, a Tag could be placed on a Target's person, or in proximity to a Target but not on their person (e.g. a child's backpack).</t>
        <ul spacing="normal">
          <li>
            <t>Tag placement
            </t>
            <ul spacing="normal">
              <li>
                <t>Tag on Target's person or immediate belongings: This attack vector allows an Attacker to track a Target in a fine-grained way. It is also more likely that this attack would trigger an alert from the Tag.</t>
              </li>
              <li>
                <t>Tag(s) in proximity to Target but not on their person (e.g. child's backpack, car): While this is a less fine-grained attack, it may also be less likely to be discovered by the Target. A child may not realize the significance of an alert or know how to check for a Tag. A parent may not think to scan for such a Tag, or may have more difficulty finding a Tag in a complex location such as a car.</t>
              </li>
              <li>
                <t>Tags nearby but not used for Unwanted Tracking (e.g. false positives by companions or on transit): While this is not an attack vector in its own right, repeated false positives may discourage a Target from treating alerts seriously.</t>
              </li>
              <li>
                <t>Multiple Tags using multiple types of placement: This attack vector may trick a Target into believing that they have fully addressed the attack when they have not. It also allows for a diversity of monitoring types (e.g. monitoring the Target's precise location, monitoring a child's routine, monitoring car usage).</t>
              </li>
            </ul>
          </li>
        </ul>
        <section anchor="example-scenarios-with-analyses">
          <name>Example scenarios with analyses</name>
          <t>The following scenarios are composite cases based upon reports from the field. They are intended to illustrate different angles of the problem. They are not only technological, but meant to provide realistic insights into the constraints of people being targeted through Location-Tracking Tags. There is no identifying information for any real person contained within them. In accordance with research on <eref target="https://dl.acm.org/doi/10.1145/2207676.2208573">how designers understand personas</eref>, the characters are given non-human names without attributes such as gender or race.</t>
          <t>The analysis of each scenario provides an example usage of the modeling framework described above. It includes a tracking Tag usage element for illustrative purposes. However, as discussed previously, this element becomes more or less relevant depending on protocol evolution. Note that once a given Attacker persona has been modeled, it could be recombined with a different Target persona, or vice versa, to model a different scenario. For example, a non-expert Target persona could be combined with both non-expert and expert Attacker personas.</t>
          <section anchor="scenario-1">
            <name>Scenario 1</name>
            <section anchor="narrative">
              <name>Narrative</name>
              <t>Mango and Avocado have two young children. Mango, Avocado, and the children all use smartphones, but have no specialized technical knowledge. Mango left because Avocado was abusive. They were homeless for a month, and the children have been living with Avocado. They now have an apartment two towns away. They do not want Avocado to know where it is, but they do want to see the children. They and Avocado meet at a public playground. They get there early so that Avocado will not see which bus route they arrived on and keep playing with the children on the playground until after Avocado leaves, so that Avocado will not see which bus route they get on. Two days later, Avocado shows up at Mango’s door, pounding on the door and shouting.</t>
            </section>
            <section anchor="analysis">
              <name>Analysis</name>
              <t>In this case, the Attacker has planted a Tag on a child. Co-parenting after separation is common in cases of intimate partner violence where the former partners have a child together. Child visits can be an opportunity to introduce technology for purposes of stalking the Target.</t>
              <table>
                <thead>
                  <tr>
                    <th align="left">Attacker Profile</th>
                    <th align="left">Avocado</th>
                  </tr>
                </thead>
                <tbody>
                  <tr>
                    <td align="left">Expertise Level</td>
                    <td align="left">Non-Expert</td>
                  </tr>
                  <tr>
                    <td align="left">Proximity to Target</td>
                    <td align="left">Medium</td>
                  </tr>
                  <tr>
                    <td align="left">Access to Resources</td>
                    <td align="left">Unknown, but can be presumed higher than Mango’s due to Mango’s recent homelessness</td>
                  </tr>
                </tbody>
              </table>
              <table>
                <thead>
                  <tr>
                    <th align="left">Target Profile</th>
                    <th align="left">Mango</th>
                  </tr>
                </thead>
                <tbody>
                  <tr>
                    <td align="left">Expertise Level</td>
                    <td align="left">Non-Expert</td>
                  </tr>
                  <tr>
                    <td align="left">Expectation of Unwanted Tracking</td>
                    <td align="left">Suspecting</td>
                  </tr>
                  <tr>
                    <td align="left">Access to Resources</td>
                    <td align="left">Low</td>
                  </tr>
                  <tr>
                    <td align="left">Access to Technological Safeguards</td>
                    <td align="left">High</td>
                  </tr>
                </tbody>
              </table>
              <table>
                <thead>
                  <tr>
                    <th align="left">Other Characteristics</th>
                    <th align="left">Avocado and Mango</th>
                  </tr>
                </thead>
                <tbody>
                  <tr>
                    <td align="left">Accessory Usage</td>
                    <td align="left">Attacker Only</td>
                  </tr>
                  <tr>
                    <td align="left">Tag Placement</td>
                    <td align="left">In Proximity (on child)</td>
                  </tr>
                </tbody>
              </table>
            </section>
          </section>
          <section anchor="scenario-2">
            <name>Scenario 2</name>
            <section anchor="narrative-1">
              <name>Narrative</name>
              <t>Strawberry and Elderberry live together. Neither has any specialized technological knowledge. Strawberry has noticed that Elderberry has become excessively jealous – every time they go to visit a friend by themselves, Elderberry accuses them of infidelity. To their alarm, over the last week, on multiple occasions, Elderberry has somehow known which friend they visited at any given time and has started to harass the friends. Strawberry eventually gets a notification that a Tag is traveling with them, and thinks it may be in their car, but they cannot find it. They live in a car-dependent area and cannot visit friends without the car, and Elderberry controls all of the “family” money, so they cannot take the car to the mechanic without Elderberry knowing.</t>
            </section>
            <section anchor="analysis-1">
              <name>Analysis</name>
              <t>Here, the Attacker and the Target are still cohabiting, and the Attacker is monitoring the Target’s independent activities. This would allow the Attacker to know if, for instance, the Target went to a police station or a domestic violence agency. The Target has reason to think that they are being tracked, but they cannot find the Tag. This can happen if the sound emitted by the Tag is insufficiently loud, and is particularly a risk in a car, where seat cushions or other typical features of a car may provide sound insulation for a hidden Tag. The Target could benefit from having a mechanism to increase the volume of the sound emitted by the Tag. Another notable feature of this scenario is that because of the cohabitation, the Tag will spend most of the time in “near-Owner state” as defined by the proposed industry consortium specification (see <xref target="I-D.detecting-unwanted-location-trackers"/>). Tags do not provide alerts in near-Owner state to reduce false positives.</t>
              <table>
                <thead>
                  <tr>
                    <th align="left">Attacker Profile</th>
                    <th align="left">Elderberry</th>
                  </tr>
                </thead>
                <tbody>
                  <tr>
                    <td align="left">Expertise Level</td>
                    <td align="left">Non-Expert</td>
                  </tr>
                  <tr>
                    <td align="left">Proximity to Target</td>
                    <td align="left">High</td>
                  </tr>
                  <tr>
                    <td align="left">Access to Resources</td>
                    <td align="left">High</td>
                  </tr>
                </tbody>
              </table>
              <table>
                <thead>
                  <tr>
                    <th align="left">Target Profile</th>
                    <th align="left">Strawberry</th>
                  </tr>
                </thead>
                <tbody>
                  <tr>
                    <td align="left">Expertise Level</td>
                    <td align="left">Non-Expert</td>
                  </tr>
                  <tr>
                    <td align="left">Expectation of Unwanted Tracking</td>
                    <td align="left">Suspecting</td>
                  </tr>
                  <tr>
                    <td align="left">Access to Resources</td>
                    <td align="left">Low</td>
                  </tr>
                  <tr>
                    <td align="left">Access to Technological Safeguards</td>
                    <td align="left">Impaired (cannot hear alert sound)</td>
                  </tr>
                </tbody>
              </table>
              <table>
                <thead>
                  <tr>
                    <th align="left">Other Characteristics</th>
                    <th align="left">Elderberry and Strawberry</th>
                  </tr>
                </thead>
                <tbody>
                  <tr>
                    <td align="left">Accessory Usage</td>
                    <td align="left">Attacker Only</td>
                  </tr>
                  <tr>
                    <td align="left">Tag Placement</td>
                    <td align="left">In Proximity (car)</td>
                  </tr>
                </tbody>
              </table>
            </section>
          </section>
          <section anchor="scenario-3">
            <name>Scenario 3</name>
            <section anchor="narrative-2">
              <name>Narrative</name>
              <t>Lime and Lemon have been dating for two years. Lemon works for a tech company and often emphasizes how much more they know about technology than Lime, who works at a restaurant. Lemon insists on having access to Lime’s computer and Android phone so that they can “make sure they are working well and that there are no dangerous apps.” Lemon hits Lime when angry and has threatened to out Lime as gay to their conservative parents and report them to Immigration &amp; Customs Enforcement if Lime “talks back.” Lime met with an advocate at a local domestic violence program to talk about going to their shelter once a bed was available. The advocate did some safety planning with Lime, and mentioned that there is an app for Android that can scan for location Tags, but Lime did not feel safe installing this app because Lemon would see it. The next time Lime went to see the advocate, they chose a time when they knew Lemon had to be at work until late to make sure that Lemon did not follow them, but when Lemon got home from work they knew where Lime had been.</t>
            </section>
            <section anchor="analysis-2">
              <name>Analysis</name>
              <t>This is a case involving a high-skill Attacker, with a large skill difference between Attacker and Target. This situation often arises in regions with a high concentration of technology industry workers. It also may be more common in ethnic-cultural communities with high representation in the technology industry. In this case the Target is also subject to a very high level of control from the Attacker due to their imbalances in technological skills and societal status, and is heavily constrained in their options as a result. It is unsafe for the Target to engage in active scanning, or to receive alerts on their phone. The Target might benefit from being able to log into an account on another phone or a computer and view logs of any recent alerts collected through passive scanning.</t>
              <table>
                <thead>
                  <tr>
                    <th align="left">Attacker Profile</th>
                    <th align="left">Lemon</th>
                  </tr>
                </thead>
                <tbody>
                  <tr>
                    <td align="left">Expertise Level</td>
                    <td align="left">Expert</td>
                  </tr>
                  <tr>
                    <td align="left">Proximity to Target</td>
                    <td align="left">High</td>
                  </tr>
                  <tr>
                    <td align="left">Access to Resources</td>
                    <td align="left">High</td>
                  </tr>
                </tbody>
              </table>
              <table>
                <thead>
                  <tr>
                    <th align="left">Target Profile</th>
                    <th align="left">Lime</th>
                  </tr>
                </thead>
                <tbody>
                  <tr>
                    <td align="left">Expertise Level</td>
                    <td align="left">Non-Expert</td>
                  </tr>
                  <tr>
                    <td align="left">Expectation of Unwanted Tracking</td>
                    <td align="left">Suspecting</td>
                  </tr>
                  <tr>
                    <td align="left">Access to Resources</td>
                    <td align="left">Low</td>
                  </tr>
                  <tr>
                    <td align="left">Access to Technological Safeguards</td>
                    <td align="left">Low</td>
                  </tr>
                </tbody>
              </table>
              <table>
                <thead>
                  <tr>
                    <th align="left">Other Characteristics</th>
                    <th align="left">Lemon and Lime</th>
                  </tr>
                </thead>
                <tbody>
                  <tr>
                    <td align="left">Accessory Usage</td>
                    <td align="left">Attacker Only</td>
                  </tr>
                  <tr>
                    <td align="left">Tag Placement</td>
                    <td align="left">Unclear</td>
                  </tr>
                </tbody>
              </table>
            </section>
          </section>
          <section anchor="scenario-4">
            <name>Scenario 4</name>
            <section anchor="narrative-3">
              <name>Narrative</name>
              <t>Banana is a social media influencer. Fig is one of Banana's followers, and has become increasingly obsessed with Banana. Banana has no technical background. Fig has no formal technical background, but does read some online forums. Banana keeps a Location-tracking Tag on their keyring to prevent loss or theft of their home and car keys. Fig learns, from reading an online forum, how to find leaked passwords in data breaches, and is able to find the password to the account associated with Banana's Tag. Using the Crowdsourced Network, Fig is able to find Banana's home address and track their location. Fig makes a plan to travel to Banana's home and approach them in person.</t>
            </section>
            <section anchor="analysis-3">
              <name>Analysis</name>
              <t>This scenario differs from the previous ones in three major ways. First, it requires no physical proximity between the Attacker and the Target. Second, the Attacker, like nearly one in five stalkers <eref target="https://www.stalkingawareness.org/wp-content/uploads/2022/04/General-Stalking-Infographic.pdf">(SPARC - Stalking Infographic, 2022)</eref>, is a stranger. Third, in this scenario the Accessory belongs to the Target rather than the Attacker. The Attacker was able to use OSINT learned from an online forum in order to gain remote access to the Target's Accessory.</t>
              <table>
                <thead>
                  <tr>
                    <th align="left">Attacker Profile</th>
                    <th align="left">Fig</th>
                  </tr>
                </thead>
                <tbody>
                  <tr>
                    <td align="left">Expertise Level</td>
                    <td align="left">Non-Expert</td>
                  </tr>
                  <tr>
                    <td align="left">Proximity to Target</td>
                    <td align="left">Low</td>
                  </tr>
                  <tr>
                    <td align="left">Access to Resources</td>
                    <td align="left">Unknown</td>
                  </tr>
                </tbody>
              </table>
              <table>
                <thead>
                  <tr>
                    <th align="left">Target Profile</th>
                    <th align="left">Banana</th>
                  </tr>
                </thead>
                <tbody>
                  <tr>
                    <td align="left">Expertise Level</td>
                    <td align="left">Non-Expert</td>
                  </tr>
                  <tr>
                    <td align="left">Expectation of Unwanted Tracking</td>
                    <td align="left">Unsuspecting</td>
                  </tr>
                  <tr>
                    <td align="left">Access to Resources</td>
                    <td align="left">Unknown</td>
                  </tr>
                  <tr>
                    <td align="left">Access to Technological Safeguards</td>
                    <td align="left">Unknown</td>
                  </tr>
                </tbody>
              </table>
              <table>
                <thead>
                  <tr>
                    <th align="left">Other Characteristics</th>
                    <th align="left">Fig and Banana</th>
                  </tr>
                </thead>
                <tbody>
                  <tr>
                    <td align="left">Accessory Usage</td>
                    <td align="left">Target Only</td>
                  </tr>
                  <tr>
                    <td align="left">Tag Placement</td>
                    <td align="left">On Target</td>
                  </tr>
                </tbody>
              </table>
            </section>
          </section>
          <section anchor="scenario-5">
            <name>Scenario 5</name>
            <section anchor="narrative-4">
              <name>Narrative</name>
              <t>Orange and Grapefruit are university students in computer science. They attend multiple classes together, and are acquainted but do not regularly socialize or live in the same dormitory. Both use Location-tracking Tags to avoid losing items, as do many students at the university. Grapefruit has become increasingly obsessed with Orange, though Orange does not realize it. Grapefruit places Location-tracking Tags in Orange's backpack and car. Orange found the one in their backpack after receiving a notification, but was not suspicious when Grapefruit said that they had dropped it. Orange has not used their car in a week and is unaware of the well-hidden Tag there. Grapefruit has created a new account to associate with their backup phone and plans to associate multiple Tags with it, in order to place them on other possessions of Orange's.</t>
            </section>
            <section anchor="analysis-4">
              <name>Analysis</name>
              <t>In this scenario involving two technical students, the Attacker, like over 40% of stalkers <eref target="https://www.stalkingawareness.org/wp-content/uploads/2022/04/General-Stalking-Infographic.pdf">(SPARC - Stalking Infographic, 2022)</eref>, is an acquaintance. Both Attacker and Target are familiar with and use tracking Accessories. The Attacker is using multiple Accessories with a plan to incorporate more into their strategy.</t>
              <table>
                <thead>
                  <tr>
                    <th align="left">Attacker Profile</th>
                    <th align="left">Grapefruit</th>
                  </tr>
                </thead>
                <tbody>
                  <tr>
                    <td align="left">Expertise Level</td>
                    <td align="left">Expert</td>
                  </tr>
                  <tr>
                    <td align="left">Proximity to Target</td>
                    <td align="left">Medium</td>
                  </tr>
                  <tr>
                    <td align="left">Access to Resources</td>
                    <td align="left">High</td>
                  </tr>
                </tbody>
              </table>
              <table>
                <thead>
                  <tr>
                    <th align="left">Target Profile</th>
                    <th align="left">Orange</th>
                  </tr>
                </thead>
                <tbody>
                  <tr>
                    <td align="left">Expertise Level</td>
                    <td align="left">Expert</td>
                  </tr>
                  <tr>
                    <td align="left">Expectation of Unwanted Tracking</td>
                    <td align="left">Unsuspecting</td>
                  </tr>
                  <tr>
                    <td align="left">Access to Resources</td>
                    <td align="left">High</td>
                  </tr>
                  <tr>
                    <td align="left">Access to Technological Safeguards</td>
                    <td align="left">High</td>
                  </tr>
                </tbody>
              </table>
              <table>
                <thead>
                  <tr>
                    <th align="left">Other Characteristics</th>
                    <th align="left">Fig and Banana</th>
                  </tr>
                </thead>
                <tbody>
                  <tr>
                    <td align="left">Accessory Usage</td>
                    <td align="left">Attacker and Target</td>
                  </tr>
                  <tr>
                    <td align="left">Tag Placement</td>
                    <td align="left">Multiple Types</td>
                  </tr>
                </tbody>
              </table>
            </section>
          </section>
        </section>
        <section anchor="bluetooth-vs-other-technologies">
          <name>Bluetooth vs. other technologies</name>
          <t>The above taxonomy and threat analysis focus on Location-tracking Tags. They are protocol-independent; if a Tag were designed for use with a Crowdsourced Network using a technology other than Bluetooth, they would still apply. The key attributes are the functionalities and physical properties of the Accessory from the user’s perspective: the Accessory must be small, not Easily Discoverable, and able to participate in a Crowdsourced Network. While many GPS based location trackers are not explicitly designed for crowdsourced location-tracking, relying instead on cellular or satellite transmission, they offer different affordances that can have a critical impact on safety, including increased location precision and real-time tracking. Manufacturers of these trackers are strongly encouraged to add Bluetooth crowdsourced functionality so that DULT Protocols can be supported by GPS trackers.</t>
        </section>
      </section>
      <section anchor="possible-attacks-on-the-dult-protocol">
        <name>Possible Attacks on the DULT Protocol</name>
        <t>There are several different ways an Attacker could attempt to circumvent the DULT Protocol in order to track a Target without their consent or otherwise take advantage of the Crowdsourced Network. These include deploying multiple Tags to follow a single Target, using non-conformant Accessories and/or Devices, and taking advantage of possible differences between Crowdsourced Network implementations. This section includes a threat prioritization framework that assesses the risk of these attacks and how these risks may be mitigated.</t>
        <section anchor="threat-prioritization-framework-for-dult-threat-model">
          <name>Threat Prioritization Framework for DULT Threat Model</name>
          <t>Threats in the DULT ecosystem vary in severity, feasibility, and likelihood, affecting users in different ways. Some threats enable long-term tracking, while others exploit gaps in detection mechanisms or leverage non-conformant Accessories and Devices. To assess and prioritize these risks, the following framework classifies threats based on their scope, impact, likelihood, risk level, affected users, and the availability of mitigations. A Threat Matrix is included that provides a structured assessment of known threats and their associated risks. This categorization helps in understanding the challenges posed by different tracking techniques and their potential mitigations. While each attack included in this section only includes one value for potential impact, likelihood and risk level, in practice these values could differ depending on considerations discussed in <xref target="taxonomy-of-unwanted-tracking"/> such as the proximity of the Attacker to the Target.</t>
        </section>
        <section anchor="threat-matrix">
          <name>Threat Matrix</name>
          <t>To systematically assess the risks associated with different threats, we introduce the following threat matrix. This categorization considers the following factors:</t>
          <ul spacing="normal">
            <li>
              <t>Scope: The DULT WG document(s) most relevant to the attack.
              </t>
              <ul spacing="normal">
                <li>
                  <t>Accessory: The Accessory protocol document, which describes the DULT Non-Owner Device protocol and other requirements for Accessories.</t>
                </li>
                <li>
                  <t>Finding: The finding algorithm document, which describes the DULT algorithm(s) to be implemented by Platforms/Devices.</t>
                </li>
                <li>
                  <t>Network: The Crowdsourced Network document, which describes the architecture of the Crowdsourced Network and includes guidance for Platforms/Devices.</t>
                </li>
              </ul>
            </li>
            <li>
              <t>Impact: The potential consequences of the threat if successfully executed.
              </t>
              <ul spacing="normal">
                <li>
                  <t>Low: Minimal effect on privacy and security.</t>
                </li>
                <li>
                  <t>Medium: Moderate effect on user privacy or tracking protection.</t>
                </li>
                <li>
                  <t>High: Severe privacy violations or safety risks.</t>
                </li>
              </ul>
            </li>
            <li>
              <t>Likelihood: The probability of encountering this threat in real-world scenarios. This includes both the frequency of the attack and how easy it is to execute.
              </t>
              <ul spacing="normal">
                <li>
                  <t>Low: Rare or requires specific conditions and high technical effort.</t>
                </li>
                <li>
                  <t>Medium: Possible under common scenarios with moderate technical requirements.</t>
                </li>
                <li>
                  <t>High: Frequently occurring or easily executed using common tools or skills.</t>
                </li>
              </ul>
            </li>
            <li>
              <t>Risk Level: A qualitative assessment based on impact and likelihood.
              </t>
              <ul spacing="normal">
                <li>
                  <t>Low: Limited risk requiring minimal mitigation.</t>
                </li>
                <li>
                  <t>Medium: Requires mitigation to prevent common attacks.</t>
                </li>
                <li>
                  <t>High: Critical threat must be addressed.</t>
                </li>
              </ul>
            </li>
            <li>
              <t>Affected Users: These are categorized as either:
              </t>
              <ul spacing="normal">
                <li>
                  <t>Targets: Individuals specifically targeted for the purposes of Unwanted Tracking.</t>
                </li>
                <li>
                  <t>All users: Anyone using the system, even if they are not directly targeted.</t>
                </li>
              </ul>
            </li>
            <li>
              <t>Mitigation Available?: Whether a known mitigation strategy exists.
              </t>
              <ul spacing="normal">
                <li>
                  <t>Yes: A viable mitigation exists.</t>
                </li>
                <li>
                  <t>Partial: Some mitigations exist, but are not fully effective.</t>
                </li>
                <li>
                  <t>No: No effective mitigation currently available.</t>
                </li>
              </ul>
            </li>
          </ul>
          <table>
            <thead>
              <tr>
                <th align="left">Threat</th>
                <th align="left">Scope</th>
                <th align="left">Impact</th>
                <th align="left">Likelihood</th>
                <th align="left">Risk Level</th>
                <th align="left">Affected Users</th>
                <th align="left">Mitigation Available?</th>
              </tr>
            </thead>
            <tbody>
              <tr>
                <td align="left">Deploying Multiple Tags</td>
                <td align="left">Finding</td>
                <td align="left">Medium</td>
                <td align="left">High</td>
                <td align="left">High</td>
                <td align="left">Targets</td>
                <td align="left">Yes</td>
              </tr>
              <tr>
                <td align="left">Remote Advertisement Monitoring</td>
                <td align="left">Accessory, Network</td>
                <td align="left">Medium</td>
                <td align="left">High</td>
                <td align="left">Medium</td>
                <td align="left">All users</td>
                <td align="left">Partial</td>
              </tr>
              <tr>
                <td align="left">Physically Modifying Tags</td>
                <td align="left">Accessory</td>
                <td align="left">High</td>
                <td align="left">Medium</td>
                <td align="left">Medium</td>
                <td align="left">Targets</td>
                <td align="left">Partial</td>
              </tr>
              <tr>
                <td align="left">Accessory Firmware Modifications</td>
                <td align="left">Accessory</td>
                <td align="left">High</td>
                <td align="left">Low</td>
                <td align="left">Medium</td>
                <td align="left">Targets</td>
                <td align="left">Partial</td>
              </tr>
              <tr>
                <td align="left">Attacker Accessory Disablement</td>
                <td align="left">Accessory, Finding</td>
                <td align="left">Medium</td>
                <td align="left">Medium</td>
                <td align="left">Medium</td>
                <td align="left">Targets</td>
                <td align="left">Partial</td>
              </tr>
              <tr>
                <td align="left">Tracking Using Target's Own Tag</td>
                <td align="left">Network</td>
                <td align="left">High</td>
                <td align="left">Medium</td>
                <td align="left">High</td>
                <td align="left">Targets</td>
                <td align="left">Partial</td>
              </tr>
              <tr>
                <td align="left">Disabling Target Tag Detection</td>
                <td align="left">Network</td>
                <td align="left">High</td>
                <td align="left">Medium</td>
                <td align="left">Medium</td>
                <td align="left">Targets</td>
                <td align="left">Partial</td>
              </tr>
              <tr>
                <td align="left">Disabling Target Tag</td>
                <td align="left">Accessory, Network</td>
                <td align="left">Medium</td>
                <td align="left">Medium</td>
                <td align="left">Medium</td>
                <td align="left">Targets</td>
                <td align="left">Partial</td>
              </tr>
              <tr>
                <td align="left">Impersonation Attack (Tag)</td>
                <td align="left">Accessory, Finding, Network</td>
                <td align="left">High</td>
                <td align="left">Medium</td>
                <td align="left">High</td>
                <td align="left">Targets</td>
                <td align="left">Partial</td>
              </tr>
              <tr>
                <td align="left">Impersonation Attack (Device/Tag)</td>
                <td align="left">Accessory, Network</td>
                <td align="left">High</td>
                <td align="left">Medium</td>
                <td align="left">High</td>
                <td align="left">All users</td>
                <td align="left">Partial</td>
              </tr>
              <tr>
                <td align="left">Impersonation Attack (Device/Network)</td>
                <td align="left">Network</td>
                <td align="left">Medium</td>
                <td align="left">Low</td>
                <td align="left">Low</td>
                <td align="left">All users</td>
                <td align="left">Partial</td>
              </tr>
              <tr>
                <td align="left">Replay Attack</td>
                <td align="left">Accessory, Network</td>
                <td align="left">Medium</td>
                <td align="left">High</td>
                <td align="left">Medium</td>
                <td align="left">All users</td>
                <td align="left">Partial</td>
              </tr>
              <tr>
                <td align="left">Heterogeneous Tracker Networks</td>
                <td align="left">Accessory, Finding, Network</td>
                <td align="left">High</td>
                <td align="left">Medium</td>
                <td align="left">Medium</td>
                <td align="left">Targets</td>
                <td align="left">No</td>
              </tr>
              <tr>
                <td align="left">Deploying GPS Tracker</td>
                <td align="left">Accessory</td>
                <td align="left">High</td>
                <td align="left">Medium</td>
                <td align="left">High</td>
                <td align="left">Targets</td>
                <td align="left">Partial</td>
              </tr>
            </tbody>
          </table>
        </section>
        <section anchor="deploying-multiple-tags-finding">
          <name>Deploying Multiple Tags (Finding)</name>
          <t>When an Attacker deploys Location-tracking Tags to follow a Target, they may deploy more than one Tag. For example, if planting a tracking Tag in a car, the Attacker might place one Tag inside the car, and another affixed on the outside of the car. The DULT Protocol must be robust to this scenario. This means that scans, whether passive or active, need to be able to return more than one result if a Tag is suspected of being used for Unwanted Tracking, and the time to do so must not be significantly impeded by the presence of multiple Tags. This also applies to situations where many Tags are present, even if they are not being used for Unwanted Tracking, such as a busy train station or airport where Tag Owners may or may not be in proximity to their Location-tracking Tags. Instead of distributing multiple Tags in the same location, an Attacker could also distribute multiple Location-tracking Tags across locations frequently visited by a Target (home, workplace, etc.).</t>
          <t>The impact of this attack is medium for typical cases involving a small number of Tags, though the impact could escalate if an Attacker deploys dozens of Tags. The likelihood is high, as deploying multiple Tags requires minimal technical effort and can be done using inexpensive, commercially available Tags, making the attack easily repeatable. As a result, the overall risk is high, requiring robust countermeasures. The impact of multiple Tags can be fully mitigated by scanning for multiple Tags, though a sophisticated Attacker might deploy other techniques such as modifying Tag firmware (<xref target="accessory-firmware-modifications-accessory"/>) or periodically disabling a Tag (<xref target="attacker-accessory-disablement-accessory-finding"/>) to evade detection.</t>
        </section>
        <section anchor="remote-advertisement-monitoring-accessory-network">
          <name>Remote Advertisement Monitoring (Accessory, Network)</name>
          <t>Any Device with Bluetooth scanning capabilities in proximity to a Location-tracking Tag can receive Bluetooth advertisement packets. If an Attacker is able to link an identifier in an advertisement packet to a particular Tag, they may be able to use this information to track the Tag over time, and by proxy the Target or other individual, without their consent.</t>
          <t>The impact of remote advertisement monitoring is moderate, as tracking generally compromises privacy but, in many cases, prolonged observation primarily reveals the location of the object rather than of the person. The likelihood is high, as Attackers can execute this using off-the-shelf Bluetooth scanning tools or smartphone apps with minimal technical knowledge. As a result, this is classified as a medium risk attack. This attack can be partially mitigated by rotating tracking identifiers.</t>
          <t>Tracking Tags typically rotate any identifiers associated with the Tag, with the interval depending on context: when near the Owner's Device, identifiers rotate frequently (every 15–30 minutes), while in a separated state, rotation may occur only once every 24 hours (see <xref target="I-D.detecting-unwanted-location-trackers"/>). Eldridge et al. have <eref target="https://eprint.iacr.org/2023/1332.pdf">demonstrated</eref> a technological solution that employs secret sharing and error correction coding that would reduce this to 60 seconds. However, work must investigate how robust this scheme is to the presence of multiple Tags (see <xref target="deploying-multiple-tags-finding"/>).</t>
          <t>While rotating identifiers provides partial mitigation, Attackers can still use advanced correlation techniques, such as signal fingerprinting, timing analysis, and multi-sensor triangulation, to bypass this defense. These methods leverage unique transmission characteristics, RSSI (Received Signal Strength Indicator) variations, and environmental factors to probabilistically link rotating identifiers back to a single Tag over time. Prior research, such as Eldridge et al., has <eref target="https://eprint.iacr.org/2023/1332.pdf">demonstrated</eref> how statistical models can be used to correlate Bluetooth signals even when identifiers change frequently. Additional work by Despres et al. further <eref target="https://people.eecs.berkeley.edu/~daw/papers/deTagtive-snip23.pdf">demonstrates</eref> that BLE Accessories using rotating identifiers can be deanonymized through RSSI-based correlation techniques.</t>
        </section>
        <section anchor="physically-modifying-tags-accessory">
          <name>Physically Modifying Tags (Accessory)</name>
          <t>An Attacker might physically modify a Tag in ways that make it non-conformant with the DULT Protocol. Physical modifications may include disabling a speaker or other haptics, or shielding and altering the antenna to reduce transmission range. These modifications can make it more difficult for Victims to discover hidden Tags, leading to a high impact. The likelihood is medium, as such hardware modifications require moderate technical expertise and physical access to the Tag.  Given this combination of factors, the overall risk level is medium. Partial mitigation is available, such as monitoring the impedance of the speaker, but these mitigations are limited as Attackers have physical access to the Tags.</t>
        </section>
        <section anchor="accessory-firmware-modifications-accessory">
          <name>Accessory Firmware Modifications (Accessory)</name>
          <t>The DULT Protocol (see <xref target="I-D.draft-ietf-dult-Accessory-protocol"/>) will specify that Accessory firmware images <bcp14>MUST</bcp14> be authenticated, and that Accessories <bcp14>MUST</bcp14> verify the integrity and origin of firmware. However, if these protections were to be bypassed, an Accessory's firmware could be altered to deviate from standard behavior. Attackers may manipulate advertisement intervals to reduce detection opportunities, allowing the Tag to evade tracking for extended periods, or rotate IDs rapidly, disrupting detection systems that rely on tracking unknown Accessory persistence.</t>
          <t>Firmware-based changes would have high impact. The likelihood is low, as these attacks require significant technical expertise to bypass firmware verification and modify low-level Accessory behavior. As a result, the overall risk level is medium. Partial mitigation of this attack is possible by requiring Accessories to verify the integrity and origin of firmware.</t>
        </section>
        <section anchor="attacker-accessory-disablement-accessory-finding">
          <name>Attacker Accessory Disablement (Accessory, Finding)</name>
          <t>An Attacker might intentionally disable their Location-tracking Tag to make it harder for a Victim to detect and/or locate the Tag. This could be done periodically or permanently and either remotely or using a <eref target="https://undetecTag.com/products/undetecTag">physical device</eref>.</t>
          <t>The likelihood is medium, as this attack is relatively easy to perform using commercially available tools, but it still requires some Attacker awareness of the Target’s actions (e.g., an ongoing search). The impact is medium as the Tag can still be detected and physically located, though it may be more difficult to do so. The risk level is medium. The impact of this attack can be partially mitigated by minimizing the time needed to detect Unwanted Tracking and maintaining the same identifier on reset.</t>
        </section>
        <section anchor="tracking-using-targets-own-tag-network">
          <name>Tracking Using Target's Own Tag (Network)</name>
          <t>Attackers with access to a Target’s account, either through password reuse, phishing, social engineering, or credential theft, can exploit DULT’s Ownership model by using the Target’s own Tag to monitor their location. Since the Tag is registered to the Target, the system assumes the user is the legitimate Owner and suppresses any Unwanted Tracking alerts. This creates a significant blind spot, as the Target is effectively tracked by their own Tag without any warning.</t>
          <t>This threat differs from impersonation or replay attacks (see <xref target="impersonation-attack-tag-accessory-finding-network"/> and <xref target="replay-attack-accessory-network"/>) because it does not rely on breaking cryptographic protections or evading detection algorithms. Instead, it leverages the legitimate trust relationship encoded in the protocol. The impact of this attack is high, as it results in silent tracking with no alert mechanism. The likelihood is medium, as account compromise is a relatively common occurrence in real-world settings, though it still requires some Attacker effort or opportunity. Overall, the risk level is high due to the complete circumvention of core notification systems.</t>
          <t>Partial mitigation may be possible through account activity monitoring, anomaly detection (e.g., login from unfamiliar location or Device), and notifications of significant account events (such as Tag access or Tag movement linked to a different Device). However, these features depend on Platform implementation and may not be uniformly enforced.</t>
        </section>
        <section anchor="disabling-target-tag-detection-network">
          <name>Disabling Target Tag Detection (Network)</name>
          <t>An Attacker might intentionally disable passive Unwanted Tracking detection on a Target's Device.</t>
          <t>The impact of this attack is high as it would prevent the Target from being notified about possible Unwanted Tracking. The likelihood is medium, as executing this attack requires the Attacker to physically or remotely alter settings on the Target’s Device, which involves moderate effort and access. The risk level is medium. This attack can be partially mitigated by notifying Targets of potential location tracking using other means e.g. sounds or haptics on Location-tracking Tags.</t>
        </section>
        <section anchor="disabling-target-tag-accessory-network">
          <name>Disabling Target Tag (Accessory, Network)</name>
          <t>An Attacker might intentionally disable a Target's Tag as a form of harassment. This could be done with physical access to the Tag, using a Target's own Device to disable the Tag, or with remote access to disable the Tag via the Crowdsourced Network. The impact of this attack is medium as it is a nuisance but most likely does not involve a security threat, unless the Tag is being used to track a valuable item or child. The likelihood is medium, as executing the attack requires access to the Target’s Tag, Device, or account, which involves a moderate level of access or effort. The risk level is therefore medium. Physical disablement of a Tag cannot be mitigated, but other forms of disablement may be mitigated by notifying users that a change has been made on their account, similar to suspicious login notifications.</t>
        </section>
        <section anchor="impersonation-attack-tag-accessory-finding-network">
          <name>Impersonation Attack (Tag; Accessory, Finding, Network)</name>
          <t>Attackers might be able to impersonate legitimate tracking Accessories, enabling tracking without complying with the DULT Protocol. This can be done by <eref target="https://www.hackster.io/news/fabian-braunlein-s-esp32-powered-find-you-Tag-bypasses-apple-s-airTag-anti-stalking-protections-0f2c9ee7da74">deploying custom Tags</eref> or by using <eref target="https://cec.gmu.edu/news/2025-02/find-my-hacker-how-apples-network-can-be-potential-tracking-tool">Devices to mimic Tags</eref>. By impersonating an authorized Tag, an Attacker could inject false location data, misattribute Tag Ownership, or evade detection by appearing as a trusted Accessory or rotating identifiers frequently. This tactic increases the difficulty of accurately identifying unauthorized tracking attempts and undermines the reliability of the network.</t>
          <t>In addition to full impersonation, adversaries may exploit Platform-specific assumptions to suppress alerts. For instance, Chen et al. <eref target="https://www.usenix.org/system/files/conference/usenixsecurity25/sec25cycle1-prepub-1266-chen-junming.pdf">describe</eref> a technique in which an Attacker sets the status field of a broadcast message to 0x00 to emulate MacBook location beacons. Since such beacons are typically ignored by Apple’s Unwanted Tracking alerts, this evasion method allows the Attacker to remain undetected. This demonstrates how Attackers can exploit trust assumptions about certain Accessory classes to bypass user protections, further complicating detection and mitigation.</t>
          <t>The impact of this attack is high, as it enables real-time location tracking by exploiting the behavior of the Crowdsourced Network. The likelihood is medium, as the attack requires deploying custom hardware or exploiting Platform-specific capabilities like unrestricted Bluetooth broadcasting, which have been demonstrated in research but remain moderately complex to execute. As a result, the overall risk level is considered high. Currently, no fully effective mitigation exists. However, improvements in authentication mechanisms, such as cryptographic signing of broadcasts, and anomaly detection techniques may help reduce the risk. Protocol-level authentication is needed to validate Accessory identities and prevent these attacks. Operating systems can partially mitigate software impersonation attacks by restricting low-level BLE broadcasting unless elevated privileges are granted.</t>
        </section>
        <section anchor="impersonation-attack-device">
          <name>Impersonation Attack (Device)</name>
          <t>In addition to impersonating a Tag, an Attacker could also impersonate a Device. This affords attacks against both Accessories and against the Crowdsourced Network.</t>
          <section anchor="attacks-on-accessories-accessory-network">
            <name>Attacks on Accessories (Accessory, Network)</name>
            <t>An impersonated Device could send commands to Accessories, such as a "play sound" command or a remote disablement command. Accessory firmware should either attempt to verify the authenticity of commands from Devices or otherwise limit how Accessories respond to commands from Devices. For example, Accessories that receive a "play sound" command from a Non-Owner Device should only execute the command if the Accessory is away from its Owner. Similarly, Accessories should only respond to remote disablement commands if the Accessory can reasonably be expected to be used for Unwanted Tracking and the Accessory can confirm that a Device has used other finding techniques to locate the Accessory.</t>
            <t>The impact of a Device impersonation attack is high if it is able to send arbitrary commands to Accessories. The likelihood of such an attack is medium as it can be done by any Device able to transmit BTLE packets but requires some familiarity with the DULT Protocol. Therefore, the overall risk level is high. The affected users are all users. Mitigation is partial; while Devices cannot be prevented from transmitting packets, certain rules can be enforced by Accessories.</t>
          </section>
          <section anchor="attacks-on-crowdsourced-network-network">
            <name>Attacks on Crowdsourced Network (Network)</name>
            <t>An impersonated Device could send false location reports to the Crowdsourced Network, or selectively not report to the Crowdsourced Network.</t>
            <t>The likelihood of this attack is low, as it would require the impersonated Device to authenticate with the Crowdsourced Network. The impact is medium, as not reporting would have negligible impact and false location reports are a nuisance but can be mitigated. The overall risk level for this attack is low. The affected users are all users.  Mitigations include requiring authentication to send reports to the Crowdsourced Network and only trusting reports when they can be verified by multiple Devices.</t>
          </section>
        </section>
        <section anchor="replay-attack-accessory-network">
          <name>Replay Attack (Accessory, Network)</name>
          <t>In addition to impersonating legitimate Accessories (see <xref target="impersonation-attack-tag-accessory-finding-network"/>), Attackers can record and replay Bluetooth advertisements from a legitimate Accessory. For example, an Attacker could capture an Accessory's broadcast and retransmit it elsewhere, creating confusion about its actual location. This could be used to mislead users, interfere with tracking accuracy, or frame an innocent party by making it appear as though they are carrying an Accessory or in a location when they are not.</t>
          <t>The impact of this attack is medium. The likelihood is high, as replay attacks require no authentication and can be executed using off-the-shelf Bluetooth scanning tools with minimal technical expertise. Replay attacks pose a medium risk owing to their higher likelihood but medium impact. Replay attacks are particularly difficult to mitigate as they may involve different combinations of Accessories and Devices. Partial mitigation may be possible by authenticating messages from Accessories in a time varying manner.</t>
        </section>
        <section anchor="heterogeneous-tag-networks-accessory-finding-network">
          <name>Heterogeneous Tag Networks (Accessory, Finding, Network)</name>
          <t>Attackers may use a mix of Tags from different manufacturers (e.g., Apple AirTags, Tile, Samsung SmartTags) to exploit gaps in vendor-specific tracking protections. Many detection systems are brand-dependent, making them ineffective against mixed Tag deployments. The goal of the DULT Protocol is to enable a cross-vendor framework; however, any slight differences in implementation could be exploited.</t>
          <t>The impact is high, as it circumvents traditional defenses. The likelihood is medium, as deploying or selecting from multiple brands requires effort and coordination, and may demand deeper knowledge of Platform-specific behaviors and limitations. Overall, this is medium risk attack. This attack can be mitigated by manufacturers adopting the DULT Protocol and ensuring that the DULT Protocol is sufficiently clear to minimize gaps in vendor-specific tracking protections.</t>
        </section>
        <section anchor="deploying-gps-tracker-accessory">
          <name>Deploying GPS Tracker (Accessory)</name>
          <t>When an Attacker deploys a GPS tracker to stalk a Target, they have access to greater location precision, real-time tracking, and even global coverage through satellite connection for some trackers. Attackers are especially likely to use GPS trackers in rural areas and areas with low Crowdsourced Network saturation, or when looking for more advanced precision or for Accessories that do not offer safety protections.</t>
          <t>The impact of this attack is high due to the increased location precision and real-time tracking functionality. The likelihood is medium, as these trackers are currently more expensive than Bluetooth based trackers, and not as readily available. As a result, the overall risk is high, requiring robust countermeasures. The impact of GPS trackers can be mitigated by adding Bluetooth crowdsourced location-tracking functionality to GPS trackers and adopting the DULT Protocol. However, the adoption of the DULT Protocol by GPS tracker manufacturers is of course optional, so this is considered a partial mitigation.</t>
        </section>
      </section>
      <section anchor="what-is-in-scope">
        <name>What is in scope</name>
        <section anchor="technologies">
          <name>Technologies</name>
          <t>The scope of this threat analysis includes any Accessory that is small and not Easily Discoverable and able to transmit its location to consumer Devices using Bluetooth. Larger and/or Easily Discoverable Accessories/Devices such as laptops with location-tracking integrations may also choose to implement the protocol.</t>
        </section>
        <section anchor="attacker-profiles">
          <name>Attacker Profiles</name>
          <t>An Attacker who deploys any of the attacks described in <xref target="threat-prioritization-framework-for-dult-threat-model"/> is considered in scope. This includes: Attackers who track Victims using a Location-tracking Tag and applications readily available for end-users (e.g. native tracking application), Attackers who physically modify Location-tracking Tags (e.g. to disable a speaker), and Attackers who make alterations to the firmware of an existing tracking Tag or create custom Tags that successfully connect to Devices and therefore the Crowdsourced Network.</t>
        </section>
        <section anchor="target-profiles">
          <name>Target Profiles</name>
          <t>All Targets profiles are in scope regardless of their expertise, access to resources, or access to technological safeguards. For example, protocols should account for a Target's lack of access to a smartphone, and scenarios in which Targets cannot install separate software.</t>
        </section>
      </section>
    </section>
    <section anchor="design-considerations">
      <name>Design Considerations</name>
      <t>As discussed in <xref target="security-considerations"/>, Unwanted Tracking can involve a variety of Attacker, Target, and Tag profiles. A successful implementation to preventing Unwanted Tracking should:</t>
      <ul spacing="normal">
        <li>
          <t>Include a variety of approaches to address different scenarios, including active and passive scanning and notifications or sounds</t>
        </li>
        <li>
          <t>Account for scenarios in which the Attacker has high expertise, proximity, and/or access to resources within the scope defined in <xref target="what-is-in-scope"/></t>
        </li>
        <li>
          <t>Account for scenarios in which the Target has low expertise, access to resources, and/or access to technological safeguards within the scope defined in <xref target="what-is-in-scope"/></t>
        </li>
        <li>
          <t>Avoid privacy compromises for Tag Owner(s) when protecting against Unwanted Tracking. The privacy of Tag Owner(s) and the security of Targets should be considered equally.</t>
        </li>
      </ul>
      <section anchor="design-requirements">
        <name>Design Requirements</name>
        <t>The DULT Protocol should 1) allow Targets to detect Unwanted Tracking, 2) help Targets find Tags that are tracking them while minimizing false positives (e.g., avoiding legitimate, co-owned, or nearby Tags being misidentified as threats), and 3) provide instructions for Targets to disable those Tags if they choose. These affordances should be implemented while considering the appropriate privacy and security requirements.</t>
        <section anchor="detecting-unwanted-location-tracking">
          <name>Detecting Unwanted Location Tracking</name>
          <t>There are four ways that the DULT Protocol should assist Targets in detecting potentially Unwanted Tracking: 1) active scanning, 2) passive scanning, 3) tracking Tag alerts, and 4) Crowdsourced Network activities logs.</t>
          <section anchor="active-scanning">
            <name>Active Scanning</name>
            <t>There may be scenarios where a Target suspects that they are being tracked without their consent. Active scanning should allow a user to use a native application on their Device to search for Location-tracking Tags that are separated from their Owners. When a Tag has been identified as potentially being used for Unwanted Tracking, the user should be able to view the serial number of the Device along with Obfuscated Owner Information and instructions on how to find and/or disable the Tag (see <xref target="finding-tracking-tags"/> and <xref target="disabling-tracking-tags"/>). Additional information about when that Tag has been previously encountered within a designated time window (e.g. the last 12 hours) should also be included if available (see <xref target="balancing-privacy-and-security"/>). Allowing users to "snooze" or ignore Tags known to be safe (e.g. Tags from a family member) could also be implemented. Tracking Tags that are near their Owners should not be shared to avoid abuse of the active scanning feature.</t>
          </section>
          <section anchor="passive-scanning">
            <name>Passive Scanning</name>
            <t>Platforms should passively scan for Tags suspected of Unwanted Tracking and notify the user. This will involve implementing one or more algorithms to use to flag Tags and determine when to notify the user. (A dedicated DULT WG document will address tracking algorithms, and will be linked when it is available.) The user could be notified through a push notification or through Sounds and Haptics (see <xref target="location-tracking-tag-alerts"/>). When a Tag has been identified as potentially being used for Unwanted Tracking, the user should be able to view the serial number of the Tag along with Obfuscated Owner Information for all accounts linked to the Tag and instructions on how to find and/or disable the Tag (see <xref target="finding-tracking-tags"/> and <xref target="disabling-tracking-tags"/>). There will be tradeoffs between detecting potential Unwanted Tracking promptly and alerting the potential Target prematurely. One way to handle these tradeoffs is to allow users to set the sensitivity of these alerts. For example, the <eref target="https://github.com/seemoo-lab/AirGuard">AirGuard</eref> app includes three different "Security Level" settings that users can customize.</t>
            <t>To improve the accuracy of Unwanted Tracking detection, a confidence scoring mechanism can be used. Instead of issuing binary alerts for all detected Tags, the system assigns a confidence score based on multiple factors, helping distinguish between genuine tracking threats and benign scenarios. This section outlines potential factors that may contribute to assessing the likelihood of Unwanted Tracking. Each factor can be considered independently to help inform an overall risk assessment. A confidence-based approach offers the following advantages:</t>
            <ul spacing="normal">
              <li>
                <t>Reduced False Positives: A confidence-based approach can help filter out benign tracking scenarios, such as transient signals or shared family Tags. Instead of triggering alerts based solely on presence, the system can dynamically adjust its sensitivity based on behavioral patterns. For example, if a tracking Tag appears near a user only briefly or follows a predictable shared usage pattern (e.g., a Bluetooth Tag frequently used by family members), it may be assigned a low confidence score. This prevents unnecessary alerts while still ensuring that persistent and anomalous tracking behaviors are flagged for user attention.</t>
              </li>
              <li>
                <t>Context-Aware Threat Evaluation: The confidence score can incorporate contextual factors such as movement patterns, duration of proximity, and recurrence. For instance, if a Tag is detected only once in a public place (e.g., at a café or airport), it is less likely to indicate malicious tracking. However, if the same Tag reappears near the user across multiple locations or over an extended period, its confidence score increases, prompting a higher-priority alert.</t>
              </li>
              <li>
                <t>Adaptive Alert Sensitivity: By dynamically adjusting detection thresholds based on confidence scores, the system can prioritize high-risk scenarios while minimizing unnecessary alerts. Users may receive warnings based on escalating levels of certainty, such as:
                </t>
                <ul spacing="normal">
                  <li>
                    <t>Low confidence: Informational notification (e.g., "An unfamiliar Tag was briefly detected nearby.")</t>
                  </li>
                  <li>
                    <t>Medium confidence: Warning with recommended actions (e.g., "A Tag has been detected multiple times near you. Check your surroundings.")</t>
                  </li>
                  <li>
                    <t>High confidence: Urgent alert with mitigation options (e.g., "A Tag has been persistently following you. Consider removing or disabling it.")</t>
                  </li>
                </ul>
              </li>
            </ul>
            <t>This approach ensures that users receive actionable and meaningful alerts, reducing notification fatigue while maintaining strong protection against Unwanted Tracking. The confidence scoring approach could include the variables listed below.</t>
            <section anchor="duration-of-proximity">
              <name>Duration of Proximity</name>
              <t>Tracks how long a Tag remains in close proximity to the user.</t>
              <t><strong>Rationale</strong>: Tags that persist near a user for extended periods are more likely to indicate tracking activity than transient encounters (e.g., passing someone on public transit).</t>
            </section>
            <section anchor="movement-correlation">
              <name>Movement Correlation</name>
              <t>Measures how closely the movement of the suspected Tag mirrors that of the user.</t>
              <t><strong>Rationale</strong>: High movement correlation (e.g., appearing at home, then work, then a store with the user) increases the likelihood that the Tag is following the user intentionally.</t>
            </section>
            <section anchor="signal-strength-trends">
              <name>Signal Strength Trends</name>
              <t>Observes how the signal strength of the suspected Tag (e.g., Bluetooth RSSI) changes over time.</t>
              <t><strong>Rationale</strong>: A sustained or increasing signal strength suggests physical proximity to the user, strengthening the case for intentional tracking.</t>
            </section>
            <section anchor="persistence">
              <name>Persistence</name>
              <t>Evaluates how often and across how many different times/locations the same Tag is observed, while accounting for identifier rotation.</t>
              <t><strong>Rationale</strong>: Frequent reappearances over time and space can indicate deliberate placement, even if identifiers change periodically.</t>
            </section>
            <section anchor="hardware-identity">
              <name>Hardware Identity</name>
              <t>Analyzes available Bluetooth advertisement metadata, such as vendor-specific fields or Tag model indicators, while respecting identifier randomization.</t>
              <t><strong>Rationale</strong>: Certain Tags (e.g., known commercial Tags) are more likely to be associated with tracking. Even with rotating identifiers, consistent vendor metadata or other characteristics may provide useful signals.</t>
            </section>
            <section anchor="environmental-context">
              <name>Environmental Context</name>
              <t>Considers the location in which the Tag is seen (e.g., home, office, public places).</t>
              <t><strong>Rationale</strong>: Tags seen only in familiar, safe zones may be harmless. Appearances in unfamiliar or private locations without explanation raise concern.</t>
            </section>
          </section>
          <section anchor="location-tracking-tag-alerts">
            <name>Location-tracking Tag Alerts</name>
            <t>Location-tracking Tags may be difficult to locate, and users may not have a Device that can actively or passively scan for Location-tracking Tags. The DULT Protocol should be built with <eref target="https://cdt.org/insights/centering-disability-in-mitigating-harms-of-bluetooth-tracking-technology/">accessibility in mind</eref> so that the most people can be protected by the protocol. In addition to push notifications on nearby Devices, Location-tracking Tags themselves should be able to notify end users. This should include periodic sounds when away from all Tag Owners, along with lights and haptics so that people who are Deaf or hard of hearing can still locate them. Tracking Tag Alerts should also educate the user on methods to successfully find and disable Tags (see <xref target="finding-tracking-tags"/> and <xref target="disabling-tracking-tags"/>).</t>
          </section>
          <section anchor="crowdsourced-network-activities-logs">
            <name>Crowdsourced Network Activities Logs</name>
            <t><eref target="https://www.usenix.org/system/files/usenixsecurity23-stephenson-lessons.pdf">Stephenson et al.</eref> point out that Internet of Things devices like Location-tracking Accessories do not have ways to reveal abusive behavior. This can be addressed through the use of detailed logs that provide insights for Victims about which accounts have accessed the location of which Accessories and when. Crowdsourced Networks should log common user activities for review by each Accessory Owner, and should not be able to be easily deleted by Accessory Owners, who might do so as a way to hide evidence of Unwanted Tracking.</t>
            <t>Logs should include sufficient detail to detect Unwanted Tracking without being another vector for surveillance. For example, a log could state that "User B viewed the location of Accessory X at [time]." By including information about user, Accessory, and time, Victims can determine whether their own Accessories are being used to track them, and whether or not their accounts connected to the Crowdsourced Network are compromised.</t>
          </section>
        </section>
        <section anchor="finding-tracking-tags">
          <name>Finding Tracking Tags</name>
          <t>Even after a Tag is detected through passive or active scanning, a user may have difficulty in locating it. For example, a Tag may be buried under a vehicle cushion. Platforms should allow users who have discovered a Tag through passive or active scanning to request that the Tag signal its presence. This assistance should be done in a way that is accessible to users with sensory or other impairments by using multimodal signals as described in <xref target="location-tracking-tag-alerts"/>. Manufacturers/Platforms may also implement other methods to assist in locating Tags, such as precision finding using Ultra-wideband.</t>
          <section anchor="lost-mode">
            <name>Lost Mode</name>
            <t>Some Platforms allow Accessories to be marked as lost. When another user finds the Accessory, they can view a message and/or contact information of the Accessory Owner. While helpful in a benign case where an Accessory is truly lost, care must be taken to ensure that the lost mode function is not used for harassment. Platforms should use a non-customizable lost message and display either Obfuscated Owner information, or a full phone number or email address if the Accessory Owner chooses to share that information.</t>
          </section>
        </section>
        <section anchor="disabling-tracking-tags">
          <name>Disabling Tracking Tags</name>
          <t>In order to effectively prevent Unwanted Tracking, users should be able to disable Location-tracking Tags. This includes a Non-Owner user being tracked by a Tag's Owner, as well as an Owner user who believes that an Attacker is using their own Tag to track them. Platforms should provide instructions for disabling Location-tracking Tags once they are located. Manufactures/Platforms should also consider allowing Location-tracking Tags to be disabled remotely.</t>
          <t>Beyond simple deactivation, users should also receive guidance on additional steps they may take, depending on their specific situation:</t>
          <ul spacing="normal">
            <li>
              <t>Advice on destruction or preservation: In some cases, destroying a Tag may eliminate the risk of further tracking. However, users should be made aware that doing so may result in the loss of evidence that could otherwise be used to prove tracking or identify an abuser. Destroying the Tag might also lead to escalation in abusive contexts. Guidance should help users weigh these risks and determine the most appropriate course of action.</t>
            </li>
            <li>
              <t>Serial number access and use: Platforms should inform users how to retrieve the serial number or unique identifier of the Tag, even if the Tag is not from the same Platform. Serial numbers may be used to report the Tag, verify its origin, or, in cooperation with manufacturers or authorities, identify the registered Owner(s) of the Tag.</t>
            </li>
          </ul>
          <t>It is important to consider where educational and disabling guidance is hosted. For instance, information about disabling Tags should be publicly accessible, possibly from neutral, decentralized, or international organizations, to mitigate the risk of government censorship or politically motivated takedowns. This ensures access for vulnerable users, including those in high-risk environments or authoritarian regions.</t>
        </section>
        <section anchor="notification-management-for-trusted-accessories">
          <name>Notification Management for Trusted Accessories</name>
          <t>To reduce alert fatigue and improve user experience, implementations should allow users to snooze passive notifications from Location-tracking Tags that have been explicitly marked as trusted or friendly. This is particularly useful in scenarios where users regularly encounter the same Tag (e.g., a family member's keys or a shared vehicle Tag).</t>
          <t>Such snoozed Tags may also be de-prioritized or grouped separately during active scans, helping users focus on unfamiliar or potentially malicious Tags. Platforms should make it easy to manage snoozed Tags and review or revoke trust status as needed. It is also advisable to implement revalidation mechanisms, for example, resuming notifications after a period of time to prevent long-term blind spots.</t>
          <t>Some Platforms may wish to implement family sharing or shared Ownership models, where multiple users can be associated with a single Tag. However, this introduces the risk of abuse (e.g., an Attacker adding a Target to the shared list in order to avoid triggering passive notifications), and therefore should be approached with caution and abuse mitigation in mind. These features are optional and may vary by Platform. Whenever shared Ownership is used, information about all Owners should be made available when a Tag is suspected of Unwanted Tracking (see <xref target="passive-scanning"/>).</t>
        </section>
      </section>
      <section anchor="design-constraints">
        <name>Design Constraints</name>
        <t>There are also design constraints that the DULT Protocol must consider, including limitations of the Bluetooth Low Energy (BLE) protocol, power constraints, and Device constraints.</t>
        <section anchor="bluetooth-constraints">
          <name>Bluetooth constraints</name>
          <t>Detecting Tags requires analyzing Bluetooth Low Energy (BLE) advertisement packets. Advertisements are publicly transmitted, allowing passive scanning by any nearby receiver. While this enables open detection of unknown Tags, it also raises privacy concerns (see <xref target="introduction"/>). Some BLE implementations employ randomized MAC addresses and other privacy-preserving techniques, which could impact persistent tracking detection.</t>
          <t>The BLE payload in BLE 4.0 can support advertisement packets of up to 37 bytes. One current adoption of Unwanted Tracking detection requires 12 of these bytes for implementing the basic protocol, with the remaining optional (see <xref target="I-D.detecting-unwanted-location-trackers"/>). Implementation of the DULT Protocol will need to consider these limitations. For example, in <eref target="https://eprint.iacr.org/2023/1332.pdf">Eldridge et al</eref>, implementing Multi-Dealer Secret Sharing required using two advertisement packets were needed instead of one due to payload constraints. While BLE 5.0 supports 255+ bytes of data, the protocol is not backwards compatible and thus may not be suitable for the DULT Protocol.</t>
          <t>BLE advertisements operate in the 2.4 GHz ISM band, making them susceptible to interference from Wi-Fi, microwave ovens, and other wireless devices. The presence of environmental noise may degrade detection accuracy and introduce variability in scan results.</t>
          <t>BLE uses channel hopping for advertising (three advertising channels). Scanners need to cover all these channels to avoid missing advertisements. The BLE protocol also enforces strict power efficiency mechanisms, such as advertising intervals and connection event scheduling, which impact detection frequency. Devices operating in low-power modes or sleep modes may significantly reduce their advertisement frequency to conserve energy, making periodic detection less reliable. Furthermore, Platform-level constraints, such as OS-imposed scanning limits and background activity restrictions, further impact the consistency and responsiveness of tracking detection mechanisms. For further discussion of power constraints, see <xref target="power-constraints"/>.</t>
          <t>Additionally, Bluetooth-based tracking systems typically rely on an active Bluetooth connection on the Owner’s Device to determine whether a Tag is in the Owner's possession. If the Owner disables Bluetooth on their phone, the system may incorrectly infer that the Tag is no longer nearby, potentially triggering a false positive alert for Unwanted Tracking. This limitation arises from the inability of Bluetooth-based systems to verify proximity without active signals from the Owner’s Device. There is currently no straightforward solution to this issue using Bluetooth alone, and it represents an inherent trade-off between privacy and detection reliability. Systems should account for this possibility and communicate it clearly to users.</t>
          <t>To address these challenges, detection mechanisms must balance efficiency, privacy, and accuracy while working within the constraints of the BLE protocol. Solutions may include leveraging multiple observations over time, integrating probabilistic risk scoring, and optimizing scanning strategies based on known BLE limitations.</t>
        </section>
        <section anchor="power-constraints">
          <name>Power constraints</name>
          <t>Unwanted tracking detection mechanisms typically rely on periodic Bluetooth scanning to identify unknown Accessories. However, continuous background scanning poses a significant power challenge, especially for mobile Devices with limited battery capacity. Maintaining high-frequency scans for extended periods can lead to excessive energy consumption, impacting Device usability and battery longevity.</t>
          <t>To address these concerns, detection systems must incorporate power-efficient approaches that balance security with practicality. Adaptive scanning strategies can dynamically adjust the scan frequency based on contextual risk levels. For example, if a suspicious Accessory is detected nearby, the system can temporarily increase scan frequency while reverting to a lower-power mode when no threats are present.</t>
          <t>Event-triggered detection offers another alternative by activating scanning only in specific high-risk scenarios. Users moving into a new location or transitioning from a prolonged stationary state may require more frequent detection, while routine movement in known safe environments can minimize energy consumption.</t>
          <t>The DULT Protocol must account for these power limitations in its design, ensuring that detection mechanisms remain effective without significantly degrading battery performance. Consideration of Device-specific constraints, such as variations in power efficiency across smartphones, wearables, and IoT devices, will be critical in maintaining a balance between security and usability.</t>
        </section>
        <section anchor="device-constraints">
          <name>Device constraints</name>
          <t>Unwanted tracking detection is constrained by the diverse range of Devices used for scanning, each with varying hardware capabilities, operating system restrictions, processing power, and connectivity limitations. These factors directly impact the effectiveness of detection mechanisms and must be carefully considered in protocol design.</t>
          <t>Hardware variability affects detection accuracy. While newer smartphones are equipped with advanced Bluetooth Low Energy (BLE) chipsets capable of frequent and reliable scanning, older smartphones, feature phones, and IoT devices may have reduced BLE performance. Differences in antenna sensitivity, chipset power, and OS-level access control can result in inconsistent detection, where some Devices fail to detect tracking signals as reliably as others.</t>
          <t>Operating system restrictions can affect detection efforts, particularly due to background Bluetooth Low Energy (BLE) scanning policies. Both iOS and Android implement mechanisms to manage background scanning behavior, balancing energy efficiency and privacy considerations. On iOS, background BLE scanning operates with periodic constraints, which may limit the frequency of detection updates. Android applies similar policies to regulate background processes and optimize power consumption. Additionally, privacy frameworks on mobile Platforms may influence how applications access and process certain Accessory-related data. These factors, along with resource limitations in wearables and IoT Devices, can impact the feasibility of continuous scanning and detection.</t>
          <t>Further, Platform permission models can restrict access to BLE scan data. For example, Android requires coarse or fine location permissions to perform BLE scanning, and users may revoke these permissions. Additionally, radio coexistence (BLE and Wi-Fi sharing the 2.4 GHz band) can impact BLE performance, especially on Devices with shared chipsets. User interface constraints, especially on wearables, may also limit how users receive or interact with tracking alerts.</t>
          <t>Processing and memory constraints are another limiting factor, particularly for low-end mobile Devices and Tags. Continuous scanning and anomaly detection algorithms, especially those relying on machine learning-based threat detection, require substantial processing power and RAM. Devices with limited computational resources may struggle to maintain effective real-time detection without degrading overall performance. Ensuring that detection mechanisms remain lightweight and optimized for constrained environments is essential.</t>
          <t>Connectivity limitations introduce additional challenges. Some Unwanted Tracking detection mechanisms rely on cloud-based lookups to verify Tag identities and share threat intelligence. However, users in offline environments, such as those in airplane mode, rural areas with limited connectivity, or secure facilities with network restrictions, may be unable to access these services. In such cases, detection must rely on local scanning and offline heuristics rather than real-time cloud-based verification.</t>
          <t>To address these challenges, detection mechanisms should incorporate adaptive scanning strategies that adjust based on Device capabilities, optimizing performance while maintaining security. Lightweight detection methods, such as event-triggered scanning and passive Bluetooth listening, can improve efficiency on constrained Devices. Additionally, fallback mechanisms should be implemented to provide at least partial detection functionality even when full-featured scanning is not available. Ensuring that detection remains effective across diverse hardware and software environments is critical for broad user protection.</t>
        </section>
      </section>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This document has no IANA actions.</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-normative-references">
      <name>Normative References</name>
      <reference anchor="I-D.draft-ietf-dult-Accessory-protocol">
        <front>
          <title>*** BROKEN REFERENCE ***</title>
          <author>
            <organization/>
          </author>
          <date/>
        </front>
      </reference>
      <reference anchor="I-D.draft-ietf-dult-finding">
        <front>
          <title>Finding Tracking Tags</title>
          <author fullname="Christine Fossaceca" initials="C." surname="Fossaceca">
            <organization>Microsoft</organization>
          </author>
          <author fullname="Eric Rescorla" initials="E." surname="Rescorla">
            <organization>Independent</organization>
          </author>
          <date day="6" month="June" year="2025"/>
          <abstract>
            <t>   Lightweight location tracking tags are in wide use to allow users to
   locate items.  These tags function as a component of a crowdsourced
   tracking network in which devices belonging to other network users
   (e.g., phones) report which tags they see and their location, thus
   allowing the owner of the tag to determine where their tag was most
   recently seen.  This document defines the protocol by which devices
   report tags they have seen and by which owners look up their
   location.

            </t>
          </abstract>
        </front>
        <seriesInfo name="Internet-Draft" value="draft-ietf-dult-finding-01"/>
      </reference>
      <reference anchor="I-D.draft-ledvina-apple-google-unwanted-trackers">
        <front>
          <title>Detecting Unwanted Location Trackers</title>
          <author fullname="Brent Ledvina" initials="B." surname="Ledvina">
            <organization>Apple</organization>
          </author>
          <author fullname="Zachary Eddinger" initials="Z." surname="Eddinger">
            <organization>Google</organization>
          </author>
          <author fullname="Ben Detwiler" initials="B." surname="Detwiler">
            <organization>Apple</organization>
          </author>
          <author fullname="Siddika Parlak Polatkan" initials="S. P." surname="Polatkan">
            <organization>Google</organization>
          </author>
          <date day="29" month="May" year="2025"/>
          <abstract>
            <t>   This document lists a set of best practices and protocols for
   accessory manufacturers whose products have built-in location-
   tracking capabilities.  By following these requirements and
   recommendations, a location-tracking accessory will be compatible
   with unwanted tracking detection and alerts on mobile platforms.
   This is an important capability for improving the privacy and safety
   of individuals in the circumstance that those accessories are used to
   track their location without their knowledge or consent.

            </t>
          </abstract>
        </front>
        <seriesInfo name="Internet-Draft" value="draft-ledvina-apple-google-unwanted-trackers-01"/>
      </reference>
      <reference anchor="RFC2119">
        <front>
          <title>Key words for use in RFCs to Indicate Requirement Levels</title>
          <author fullname="S. Bradner" initials="S." surname="Bradner"/>
          <date month="March" year="1997"/>
          <abstract>
            <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
          </abstract>
        </front>
        <seriesInfo name="BCP" value="14"/>
        <seriesInfo name="RFC" value="2119"/>
        <seriesInfo name="DOI" value="10.17487/RFC2119"/>
      </reference>
      <reference anchor="RFC8174">
        <front>
          <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
          <author fullname="B. Leiba" initials="B." surname="Leiba"/>
          <date month="May" year="2017"/>
          <abstract>
            <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
          </abstract>
        </front>
        <seriesInfo name="BCP" value="14"/>
        <seriesInfo name="RFC" value="8174"/>
        <seriesInfo name="DOI" value="10.17487/RFC8174"/>
      </reference>
      <reference anchor="I-D.detecting-unwanted-location-trackers">
        <front>
          <title>Detecting Unwanted Location Trackers</title>
          <author fullname="Brent Ledvina" initials="B." surname="Ledvina">
            <organization>Apple</organization>
          </author>
          <author fullname="Zachary Eddinger" initials="Z." surname="Eddinger">
            <organization>Google</organization>
          </author>
          <author fullname="Ben Detwiler" initials="B." surname="Detwiler">
            <organization>Apple</organization>
          </author>
          <author fullname="Siddika Parlak Polatkan" initials="S. P." surname="Polatkan">
            <organization>Google</organization>
          </author>
          <date day="20" month="December" year="2023"/>
          <abstract>
            <t>   This document lists a set of best practices and protocols for
   accessory manufacturers whose products have built-in location-
   tracking capabilities.  By following these requirements and
   recommendations, a location-tracking accessory will be compatible
   with unwanted tracking detection and alerts on mobile platforms.
   This is an important capability for improving the privacy and safety
   of individuals in the circumstance that those accessories are used to
   track their location without their knowledge or consent.

            </t>
          </abstract>
        </front>
        <seriesInfo name="Internet-Draft" value="draft-detecting-unwanted-location-trackers-01"/>
      </reference>
    </references>
    <?line 718?>

<section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>Many thanks for feedback from Brent Ledvina, Barry Leiba, Michael Ricardson, Eric Rescorla, Christine Fossaceca, Eva Galperin, and Alexis Hancock, and for contributed text from Corbin Streett and Diana Appanna. We also gratefully acknowledge the guidance and support of the DULT Working Group Chairs, Erica Olsen and Sean Turner, and the Area Director, Deb Cooley, throughout the development of this document.</t>
    </section>
  </back>
  <!-- ##markdown-source:
H4sIAAAAAAAAA92925IcV5Yl9p5f4YO2ViE5EZkESBZr0K3uShAgCRlAcJjg
UG20tjGPiBORXvBwj3L3yESwimP1D/M0ZiMzveo3pD+pL9Fe+3bO8fBIgFS3
pqWSponM9Mvxc9nXtdeez+dnQzXU4Unx4Nn3L98Ub266UA7Fq3YV6gdny3II
m7Y7PCmqZt2ena3aZVNu6eJVV66HeRWG9Xy1r4f5wLfNt7ht/vEnZ/1+sa36
vmqb4bCj6188f/NlUfxNUdZ9S6+qmlXYBfo/zfBgVjwIq2pou6qs8cOLq6f0
n7ajf3335ssHZ81+uwjdk7MVjeXJ2bJt+tD0+/5JMXT7cHb7pPjkrKSX01Ov
w3LfVcPhwdld273ddO1+h88KQ1gOVbMpvm/uymYIq+JlSx9GYyvedOXybej6
B2dvw4FuWj05K+bFC7qoa8Iwf4avxG9W/oy9PaO2Zwz6DFwn01DwNJzdhmZP
Iy6KXzaSopApe/ADfQQu/gq34/fbsqrp9zaEub3591iHi7bb4KKyW97QRTfD
sOufXF7iHvyqug0XdtklfnG56Nq7PlwePe0ST9lUw81+gZXCEt9teJUv71t1
3FXTEvVD8vb07gt55kXVXqb33fvQi5thS08+K/fDTdthcegtRbHe17Xswwev
ys2mCsWzUJdN+4D/Sl9YNtVPPK9Piuu7shtutm0Xii/aug6bwBcFncztiu98
9Pver7sIqz298/hd/0ugHR1oze5CXU+96xv+b1kX34QBW7AY2uJ5syqetVua
l2pZ/KeqrUOzzIbwh5qf9/umCatbLM/Uq69v6NrQ3xTfduXiZj/58vZtVaYP
7vWeix3f8/sGF1ws2+3ZWdN2W7rtlrbnGU52/OlsPp8X5aLHbhjOzl5Wm5vh
LuD/+l6VnYKd+abc9LThAkmH4q5ahWLfB3xzWdM34Yeux498VOiiIWz7C5Iw
ga7iW9f7Zsm7v6THFDSyXduQSCjaNf34Be3PVd/uuyWdE5tQvOimWt7Qgt9W
y9AXi1C3zQaDoRe1w03oikavlfc/DBebi1mxu6FH9+dFF3ZtN+hDeBB0z6Ho
QyhKWin6oer8bM/o530vn8OvuAnF67smdA/pSTRI/EzPwKshIbpt1QR6dKAZ
kQfhj3f0cdu2H+jVS/q4ml/WXBQ/3NDq4Dq6GnO4LZtDQfuzGqotpouG3+tL
dL5mMlZcDDlakBRcht1QLWqedRK4mH9aTR7Ybt/tWvqZHtEPZc0Lhk8sF3TV
RXFV7Lp2aJdtTVeTzOKP7GUKe/ui5RBF1Rtb9e2ePqZqli09v8NIy4bE4opu
G+j5uEKn5vhWOmqrflnuMN5VecBmqPqCtMp+i3WnEd3SNsJmUEla0mk69HSN
fBX9Qz9rhhHUe34dXV2+a5t2e8Cbj9+Kr961A72BVExRDgP9nt6xKauGvkSl
Mu3C9OZcMOMpD6Efz33WZCfHsa/Cmla/p+WnYdM4aafive2et3O/bHdxaY6H
6E+dyWhtIuj/VZuGts4f91UX8CK6AjqQzmDFP+By/IIu73jEMlfVdlfz9aV9
mr/ivsW9EAGwrVarOpyd/Q10Ydeu9jxBJA5OiIB/a+d9fNyhpmneXWfTC+PZ
vylvg57JK9pxxQ1JOzqIt6GeyZbD03uMed3yISExWZCy5yc8fHC1pHH1ZL6E
/sE5rIGm31Z4jk9WaEo6oqvianUbuqHqeV2Kb8tD3Za8eAOtJT7JHnWY97uw
rNakMVw6t41sOLuNTKgK04wdF3ge8IX+BGzBPuxKHNBVse7aLa1HH6WXCDsS
bn4wSDDVJKYu+NvumW6d5gff0Jfx4+xi+vp2QX+8hVSD5NGh9vyySmSCD19O
SDJGKPyZLRjGGi2s9sT2kLG+SaXyH/cBK8HvmtxRdgbTvSDC2ueODsFV0ZSk
ECeOEe8IPZbhHUQRzRLNDA2RNsRvep4fEbTNoWV9ANEMBbqgiSm7TeAVabuR
CYlJXhyyx8zw6X64IeZ3XXVbLg9FV/VvL+hwFjR7ZFjsycbTXfliXSQ7sujx
BbrHy2JdvaN3V7C7aXfxnhFpJdNOf1vQSPDWU/PHOkhOE7RZRwKVl7zDU0rV
RPw9+P5kP96R9QdhiDvxbb/BiSLJTjpjGWQhr3ADS2d6HKZtSZpls6cHyKwU
L57xr7DGh/tXON0/9vD4bDyk33cdlCddse9phnakm6BvkiFDUNF7sWLxvMi3
0cu3WC1fOdlCD9q75kG6kfjN+tqelnJfk+dQkhiERGvo1M3b9fyaJpAOEGmY
9vrc9RM9fV237coMj8lvxawW/a5t1xDiNEWykKQXVlXf7XfsbZAmrYv9bsXS
gpUSrRdJjXprz87O05fQNpBQy3aenpItWecVHQcRfCLU7jlotAolbU9aY9p6
Khg67A4SafSPvl1CG3dkfrPWuql2NGpydQaoUXYA2W+iU0Obt2o7Vnxb0mJk
57AnhnNm58F2l7iHJMTOJpwt17a0VZdYfrbG6rAeZFiripTungaFiSRzbL8m
G3jfYeUwa9/SSCGMe2yMI+l3UTwvaVXT27K76AiS3KjW9O2Y21ywsNrcdaRz
mgmlPFMduC0PmBb8p2lZnGBCSjEAeSeIhM6HTnf4yEWFbFr6RrXR2DF/r2Oa
2D936pXK4lQ8cjb8ym5V/QQh43blgnYCqdUTjsPseA7FmpnaTT2tKEk78tBl
D514I47+6vTCqz1P277aVj/Z5k9lKov2ZVctAgxlOidkZ7KAbALOdAm504pV
+pN4DLQKJvbYZU3W2B4stmw/tnbFgA39k+LR+fts2Fnx+LzYkp5vSZ2OBYp6
XcuqoyfzFsJncTjnW50ZmdlPzk1z3Wcx2rzwA2xqZefcb2ezx0JKpg7veEuu
O3JezQ9WkzZa9BgQz5h6DHHezPZfDnzq6dzAQS7Yj6Lr2SuK9rwIaJKXZU+D
EUuv6uwhsK7Cu4F0ZTTRb8hYFa/KNQIGo5J+RxNLTry9C7pCTtqCbobdxdox
xnn0UPXmRDS+TifWxHerbYDo7pCh11XveDSyD3cmfHuSDVC2ye5qSbRimkVh
FLeB5+ui+LJqYM2xpj6x3jbYNe1FdjNJH5rFmfoa7l2ou8Ebpd+zfkN04nD/
aStr2LsqqzPXhiXIvlpB+ePtpK3oFLlD8ZCsRYy8C6tzPTbplCdnCGbkgEji
SlULRC0+XHSQCLkpK250QLC74tEn0/RPf/p3L+bPLsbRqWii2zL+/DN/14nr
1xW7xD//LLskf2eV7FraZqHsahhlFn8sOP74dxycyB5PzsQtLfK83NF3zTdt
u6H/HAXy6J3kwf1NcUVXkauwqOpqOJydTcYdEHKUaENY3jRt3W4OYhvq9t/3
arMe6QUTkNDqZW+xCNqTYbsbxNWUWT3h1AdoTd/LyeurRm1tXWuVQNk28AXj
r6GL6+ptqEU9lvrZapLeBHXfOCJADyG5S5fMZQH8vWwz72lItB/Itsaeqelt
DQeocedu18vMrFp+DYTvsYJLTPBZXE+4nTf0Z9rgL1rSpeZlSQCGvuA5zSAN
/1nVL2GjYfDs7pP2wclalp1YRuJjLEn826Fc1u1+xaY4P7F1A2sbVlWJcA8N
licjvOOgkfhVPMP0/3/17bUHsm3DLep9GFoyKea3/Zwti3k6TbTv8WIy4MJt
yerMPVU+EF0gmUkLtxKZQ3vx+BxDDSCSxeFZXTsaFTZLXL0K8Y8Nyy2PrfG0
03SeCEhUvTwSJhUJIWwe2fYnrmf3iLRWb64ZZp827CosS3ilHCdY0A9buowl
JfvLiHnWhzkfjkqcoq/qdoEAMBnhN/a7uuwHF+AHOuUcTJg0c0jTdRDau7o9
wBs70PH8AxZzS36eRDVy8+6i+Lq9w6PJ4t/bTq94WSoTrhrSIK+vJwmAaTuy
vNwtbmLkmlYhkLJZIjJswVG112+hEPvh9ArMpn/Py5bP1DWZ7TdsRx52tOAc
hiDrbBCBXq7Xtfoi2+2eTmEFS/uFCHAbwvHXYLQnlpqWFIc/zDhsSQdh+Xba
mhHbirdnuyR3AeNWa8I2oki+6EpEGZgprbkpLciWoarrVDyaZo4yUDZ7ouvx
RdUJM5pn9KFJrPQOs767PbYdZmTfLfDNfTgXVczfhonsWzJZqm3ofeq7IDtT
ZRNcDhzKW2STVKKa3TU1eVA8xRdtA8OHDy5e9wzmV8U/s15K/n4G0f6Wzhhy
cH3x4NX312+QC8R/i29e87+/e/4fv3/x3fNn+Pf111cvX/o/zvSK669ff//y
WfxXvPOL169ePf/mmdxMvy2yX509eHX1Tw9kTh68/vbNi9ffXL18cKSAWELL
uYDN0ZFwwTeX/VlmODz94tv/839/9Ck09ndffvH40aP/QJJSfvjdo88/pR9o
8zTytraBFOEfIWLOSOqReODIGO2SZbmrSP2ICdyT1dqwnqPJ/ehHzMw/Pyn+
frHcPfr0H/QX+ODslzZn2S95zo5/c3SzTOLEryZe47OZ/X400/l4r/4p+9nm
Pfnl3/9jjYTK/NHv/vEfznjLZFvoo4/cGPvooydnTzjgtJNo9cgqpNUiialO
chl9cjl/0K6ng4w4xO2e5CdOyjaUzchQFE/CNgn0HAbGMvKarCcEdmV44hZo
6uhY3qw8DyFBuea2rW/ZOWBtz9/NgdIeNhnkdUN7ZXFIbY0LHCoSDyQX+VO/
1fCLDUQGp05PnLQY+piJX89GRppe9EChSi6NCIdmU25Yok9mXS5hmLgHdMr0
5kFNzbwO0KwaGUOMwqhK4FwDfy3iAjecHWPzg1wpUowxypoaKG0WJeURPGMX
hN0EebHEBlpcJfkTDs9Iwsm9pdOm30Gi7nGU+KOM80TITJWGKJ5F8I23uyFr
ecm2HHafZDjIQyNHSl31BZalO5xj2W6rUpIrW0wDomESVk43fRbmlOd9R8+j
iUxm4Xw8LWTIkiMouaBe5ogMJrKHxwpYcwTYp0P5loWmOHghTYtMzFi/x8Ri
G53QKjQefoO8/euyW92xVJYTo+50364H/vWaY5D+4WLDqFOTnPs0Xi5SOXCc
jTEDk8Go4vm7Ej4lbww3OmBwct6JpDk+FmHYutwNLSKbYVjq+D881mYn5KOP
4nYUz5HzrSQybkPd7ra6xjGeh+N1l8JHJuOLR+/VDegTGVOGmMnxNLEJhukp
bH4ayxGUyBqptK03dMtws+3fF53j6ZnwgExOJfvEpFENG4SzGE3xycfFcsuq
cyjqABGIdVyRWdP0nMtPL370O1z8rnj0id5EA8daIm/gt0jEAkIsvfXxZ3jR
3/f73T988veX+I9ogS6Eud+KtMiONM7F/b5h9PzgSk58e8FqvVyJ39NOxOUw
aR+WaYxS7al5dsXDp7TNyuzqnWboXOLbX1dsqeQLgaC24RpmmTHMKuQOxq7a
++s9PBaPA7pYtsQEFLVlKKe/6nqgC+NX9IOCD7KkJ2eMxThPUogaxuhYyNEc
31bhTvyrE+88Fk5RXY72IeagPrqPjDcJuXAIwMEKs2KxH3i1o5czk2Nkpyii
T8grv/zqm+vr5Fc/VF9WyY9LBEbjjxAyIwRBlutMVaBl+mhmMtkt+mPSEtr3
pnAqDWnICJB+NIHq4/jQnf9Ldr2bDO95OPwV9m54zckl6tSd7E+4hScWn/5k
RgjgPZkzpF4//X5JYmETaOCSh7pPw/F7xurSXqEL4C9JTdN0l2MHISXRDkeL
x/YV3Z6/kC9xMZokuoYErLJUtx6AD04PmYzfddUWiQ82Q/n32TsvkFqVX5ib
2HPsCZtbslKJPh0pEQhXS6D5SO+Zlqo/enoOe+CAddlE8y/7828SkUBnnxPJ
9+VXeUwPXy/W+x5m5upcP/RFPEcyyodtcg0jOpZ5RIxNkXQRReYUPxyJVMSu
yu4te5aMyFAUCjmAsAtVOSPrxdEggcfaXDL0j07Oihx4MlNeI2p3V/USwsoG
pI9bIDdrQxeTvhcxLbkrWm8eKe+RZdkHi31kCwlbi84bJOv9Jlyh0+B5F3En
HJMkEDrH2el2i7uZY8ATn2Gz0mgskTW1x96g3FfVppJoxfTM0fXJRGTzGPfZ
uup6WBewts2XwbEASpO3HhyEAeqFQzlZ7grX4s8dIo2DmAmGTlx8pP/7fcX/
AUpTzO+xB/drXEksT7fn200ZQ/jD02sk90AjTENnOMd0fDaweY6ffoWszpGr
OXJ5ZfBqecugX+84/0RP6A89sGFqjI/duLFjZk+ZJ9nuVzwBJiFkOjAXibeF
I64hMAYe5V5AIhQu49nLM+c4De9EuKd77r3a/Omb4qurN9FG499kRtas+PrN
m2+jU3DsfP0PckHf6z3ycH1PPLR3nye+y/dvzmX0cFI4hxdhMnL8OMM600g1
fR/9YhCDUX7lqLNeXv4+hXpij7rG4zwklqlau7g3bSZTHPrQiPpkMCtyF5um
+gmmdG7sqYqjgdxK5tqmcys5A4RRixRQy3+CDQNH+LbsADdiZcv+RQSx7ury
oAtrx3IE6FsfI/wQbnRb/mV7Vzwnobkhl/7py+fnRYede2KCHPWqkxS9NElu
CT50cnLeNohEJvOSz4Wtb5wPHoKEi+3EJjYIgF6pSjgKMgniKsGPVZ3jfIor
S9uPwDEY4vs2zt8UVjECWZbkx4E1MXhzCvsb5y8VCzBO63KgH4OoFDwb2G3o
7WUCNGHzraYHrhCAu1FYkKw6u/c174fpqH9EIXNc9MR3kPCuyMYp3rT3OP0M
rKFdVw17cxIQeRRlgTC34CFqMw1n2WrpeRgl8ARuyFMtgVVZJDK/zE7tGBrG
4X5R6hGcxwqdn+CBr/RR23aBTJ49yADCZRQymhhFDlEOCfDv5EDO1P/zx2l8
rSQdvSiAm0MAlIYGPKeMCktlRojbLHy3nFX/rqOXu6uprieph2oD2wJyj1+L
DRCgNxr7tQyn3+8YA8vhEod7KPJMYXjzNaNjChTGQCPomj6M8uTGYmNvwwHh
J8T4/mm/qOTHDFPTsTxbVVq8ovCV81iiUEkszzwq9ny44EA+SRKDmCnAYdmr
Hq0cAmIi/6EE40nYhhLWJmzKigFDgjzkVFp8Bm32d1CvB/MFs91Xh3J19IdA
dlxdGpQJcCCI3CVP4OSuvii+wwfQnqThRuwLI0lQ/mJlDTRPoV2vWfRy1s3P
jZjB7ZpMO8631mlcHapEdpTiMEQTshLCrpYNObGHNREdN2hRkb8NPM6gzn0T
ZDU8kYhrsfV9lgXKIHUI6d66NxRHUuUpTWGzxAXfqjeAKTFZkwPyytu2WhW7
anD4WOJBQGKpF8GbnrMGqxNpAy3LGARTxa+67Mt1GPRRnHWcTYhdrkvxWWBs
Hn9AyIbDZo0/Lp4vCVmrQTAdnX8OgACPMfFaTqI26TBekHMs3lIqPxhxJbsS
WkoLiBQzbepsUt2di1hcwKZd0sRUSzZRyhzFv5WjVtFElz3wROuR03X8thjY
cYGmQ7OcBNwjyYJr6YTCX2jyudbDIeV9eopDA4mWYBSe16uuWpE9DUg1HTr+
nh9XJCsb2dOrf35oxYOBloxUfFUuO65afPzx408uH33yyeOL3WrNiElHo0BK
9G29jz4PrU/dHhjp1tG7kBeyUqDQdchLtV2nTtLSQNZq37HF092Ge7axLQ8Z
t/ulzV1Ykzmu177vcCU623b88Q7Cwh0BHc/OjoFkvPW3sDCrBBg4ebsmYzjW
NnX8lh3dnkV4VY/kEGhMABdwAEzRNpLb2YrIWovVB8iluudltUp2Fw6+Ofs2
dx6WwWvc988NXlES2HURRFhylWTBDjiv6nHoBfDCwO7MQ3XDBd8N9dMFK47g
Q1UzoqQTHDXiJvRAUqm8u/lsQS2ZNhrjGQGsEmc9ffsdT8Bt1damKZMdVdLX
NPMt6Ycl+wW+w86zXGB6uhfINTeG99aIBXulBgIBUkCmhotD+C7ap+XyOLCB
DZLGQh4K8ktigfNeffmffz7XPWt6YHpnpaJb8VnHmh63rvcdA9XpN7eB9BmE
9Mlt7RJ9iPA/wbqODTNxP6asTprXeRI3VOXKBTT4+n7Yr3g9gAwmmSMFmJg9
PuxaWJlgE3/8soPWZSE2Kx5//Oh3UWyt6otyuWWJtWqrS5JVl48+vnj06NPP
Lj959Pknn33+6QX999PHnz46nxWfP/5bUcvdbXXbdmkhTlAJABXEOzvwPz3J
7fazfncjlZ3dRfHpo7+NzxFflG6/IctDtBdfVjy4U6w1RPQDVTRqVd8ZRvQg
gDSOcLStoXqTclh9GKrDFihjI916G2c4GST9iZGmHEO8KH77+dEY7QO4YtZQ
Rg9uaG0fuKdVJbBHs7Av4N+YGtZ9Vx4pMqk5lAy6zrhtvVmeW1WZpVUC+WlO
MbGy06y6Tmy0CDUZh6lLq3rCXiRv+W2yD48P175J7o965+wMNVLTf5x5IaDN
5KXX/dr+wkaitZxNy5VEQsvJUmR5zdDFzSkTgVbz2vcv48ogPshUksN+15I5
/RvF5H319M1/fHH178lb2NwMMb9qksPPXm6j32rZ/IylNk8vwylRykL/aThv
ma8o7S1IOBaMrPRpdwAHTm5KK9f/eLVtQk+iSeC5WrqP0/z4s3ia7+7uLkq5
kI90aC6F5eCyCXc9bJLPLj/+5LLqymYuLAWc8ZtLod+cP76fy+fOfWLm2BLz
sqMT2ZXdgf5Fgx3maxIumOY5jXi+IkF3M98FGhRZwCQrfvx6TyeI/BQ8q/ih
HJY3PNqP89HedHc8Uhvfxxjfo99dvi1/Kt/eoHDGRrUqD8mQSM7S2UcCg171
3b76af5NeUsDa1nAjaaE9sFmj/qbskGs+nLDYM55Aki4xE2X27LDu0nHrPZd
2cub55u6XB36OS3VT+V8HXDS+u38Bp+nU0X672kndaL9foRMV5+QD0sWQTML
XzdTsjekjMHq1fOdUjLGVYTTrt3ttR4tffJxkLfgweo2RmFJ4AJ4OlgkOUm3
0q7bVhvaFFai7Tt/F9od8KHXNBP6Q0SRKd+KpTD/Mzzu/4yjGRUETuaCpVzn
df1TtQWsO9nb6pc34S5lFrCJ4kMWesmKJMatBqHEplqbtyTxYFXnONiq9i9E
c/clfw9H/iwPmEgTLpE9Njc53BxVuIhHmbF0lfi6zGWaFaESYTeklUMMYsXM
VAiTlE3g4s6p+THLVBWV8wv0SzpxXdWKC/zmvoIn+nByu2GQhFH91qiC6S6I
ziCXgwwMVhekaNUH+utf/ltf/PjKK5u4XIPeYurg4aurb89jLdVJQwN28NfD
to7WxmeffvrZp7+7+OSz3z369HefmkkZq7LS4pn1CPCnRduGBEr/xHljrmiT
EIl8dxVGdVm2y8hY0cLDLtBbpKIOlqWUMJb6uXc3JOP7EkfDvUUk7KSajGMm
s2ITGgbR000kHZYM+VMtoedMKiBDbVwJ7LnEWoK283gcOX3rSg7zukrKs6xi
TLb1koYPy7mD67/sjxbX9npSNug8AQan8mCwI1L5cLDjIqVegmq9jQV2klhC
TZAAzcw4DRaCyKrUBK7eoK7DC9ZsXrXMjr/1QkrEn7/bSSpKWA6YM8Z++yQP
xkpRQoVADwfm2TFAlhcWs7x2u9sjG9ovK1HRCgJjU9H/qkugkvXFm5kkgmW1
WLKzVKdB1qsLHRBgEmFqUB5ftzpjsd+rZmbDpL+yHYtflVPPn0MQxKCiyCl9
79ck1J8ULyuAb9l0MynWMdSHHJmj+GZ8hlk08hOfbfjjYor09mmvwqrabwFg
7Bl8P/U8tklFngqBiT+FhTLdZewC9Xio0Re8s2L9qUpHnI1lO5cyJ/EYWX3Z
KF+2d0+KZzbZeIt6nd3J8PyHTsJc3Xrc47UG2fxnK455L49viCEbHJJqLRBI
svIQAqBJku01OsLGSLJMgQN63szVSZK5631D3stDjS0wNAaRk7/+5b+zG7b6
61/+N7mGzCZZLiM2UHuZ4YVuiVs1O29VCVJtxQ8rE/4byM4KXFWrdENE/xPb
3GPLPU1w4bZyShiSruM987km84AdA9k2Pr1Sc12uJDMwS/0DTgXgKWP5KMkY
GgTKdjT0OkqbXRRXultjzid/ykzNIVsPF53sw02Iyw8WbBZd/Tck1nRI/yJC
DZ+6jFWuxxaLDOFaMDr0i2wIAuZEOE90VK0AqnIqNskj0owfs5Hos79v+tNP
py0WCUuyd4n+6hqpu99PUhN9qNiwKGNv9gIN0eIJMGbxozxm13FaSOujvJQx
ngCVFcLfYiAjEQkwPSB5UJVZbANwItWSI2owfNiHvQXr26YccNzrkrR3w/Ec
PvBAFYcN3uwsKDMPPaZncHSGpz5u3/zKzxtN6SigTs9iJ+++GR69eC+Fdatc
wsxOPtkVlcIPLeTIdbb+7SKO/9989cxAlnFqOQTILggbbsD3Lsl8uGeBOMOf
3v3rRqJ1nXJa+sQjay0XDUE9eDEtG8e0CTne3CrrARsK+B7P9Jzi8hKz351l
qRBuNPUOTka3alEQywWdKbkYtCPzAtAIOBjy01HUO3shlJfTA4xRAHh6mZoR
RwkzVrAatl5YvnKuL+M4ivmsEsVmwqi8frJUSsjI1MN1eU/GsATW/n2GZj1V
/LpQoqORbLe9Ygalv0V/8avecWQWX4y/Jpp8T4qnrUFmJwxCt3De+/oLiURq
iiZT8MAQgjkl1jFJhEWBAXVpAtD5Ex8i3PMl2zQmCIXvyZ/Ad61SQqbf9A4j
4xtzkIBHHixy47QgalFLzZPau7/pGQ9J5/mtb5FyE4fqq7bBc0bv59dvucp+
CAly7Ykck4ycwzBh9ydjOa2GMzvfgHUDvjGoEpMTnqFtoJ6H5FWScDL4pqPf
OOqgEx73Ieb+aPY+aO7GMzeDHjx/kmJGxESAHM6+RsbJYYAUp88XZhwAlqaU
nRPPE1Bf/HpHe4HhygQN+E6AiywjZk1mgOYf0DWhf2npCWH5VkvEONF9pYQP
/lRkOLlEwisuRVBL/EnBZuwJ8YIgDAXLBuExYf3QbcwLCpuxDu9iotOFPiYu
WZHe6jpt/p17YwJiwEvB0Gt4WGwUM2aSobKNOItdIRRzqP4/WiAtIsi3KQ2Y
sdJ3GuHkcHoQJsHRuzAFvE77DpWgvollu0Es8DwwZBiFnMK25n5wRikmuslp
xpyTxA/i5JlSsHJ+gtx+9cT+4FSPQlyjKdAgiWk7O+ou65UQpjh3olbl7MqG
Id+LDoPieBJ6EBmzLEv66zRtsuvCkn0UL9tJ+UX8YCkVWvZXmJqssCwhq3WI
HrX0ZKBIYolhRd6TeJn4/lteyKDAfqFC2e/axmjkotQQJwPK6qCMv0l9tSOS
klBs2WxqJ7CFfAGwOXmASBac9dQqErWGLN2Qkkbx+WYGZVIREnN37GVKT4TN
IiF1SZ863aJh61ybvcm0mUQn5TwYluUgCMhxCcdB6PRUFip5pyb5JHC+5bwy
Asud8BvxkgBTAt5tHMYfIYKEmQnx9kie68HMk1FeC+4+fvzx57/9/LcX9N/f
ffb5J+finbsfLQu8qZD1AsRA0hWI6EfsCu35rqLpThhvNpzGgMjoULwo28fh
rjS7zNZjuyjh642BSt6etuwenYxB5xG/mui1hAjryDazYK6QlNlWg52sVMAp
BwpzYPTLPR9s5IRF3mgJjT1pAWqaoNBHdsT6PrpHQk3PgL8mZoXDreKLLsiD
H9Qths9Kg5Z5dpVusVk4Igwr4WkAxBORb7NpmB9n4XuHhYodnpyKbCZl3UiD
0C/KWeSaS+/xxAWbUrocM4WYSMBhTHHmY8lHwrma5C7On8o/x98o+GOgmWxP
PJJf/E3xTdnJOp2dvSJh0PJjrm7pAK4UIIyynEO7h1zTrNlFwZfO7LpZLDTW
K7hWBW4BM+JYuTWEhkrsQul5GBkXgyTQ/LQEm6CvENpH82BsWII82APEo6KK
4Q83tFvEjmHhTwJ5uJkYWoIjqm4dD6/P1uexAcLoaPoUxEIk+kczMZC6pbff
CS02XaoIO+h8HyCtPNswCf+MewJ8x51KTnhE6eBM8iZrsA0I5AEcstsvapKt
KEGQoiC9Gntl4DeBmuxQMF1MGUfD5b0YI94mkT+aPNZcih6hPVDdGsHZqngb
ws4rHbwQxSdQax7iOEg0DoArrRFss7fWgeaPPvuXj0acLvo41IOVh54bFnS+
2xg5ReJ4h1nhXcI+56pF/GaH8ahQwCDxW8lT3rCiVlgf+NZUXnL0VMHTVoGX
RWCZchaC0FwLi78XX2RRef56JUpmgL5wXzBUX1W3wJoz3JKjJhLWLCgzHF5D
NiktsBjTQ7th/Ai9nn9GEVuST6LlYewwWJgOSqui1Q1JZJqRYSqXM+r5xHw/
O/tznIhvu3YNg/TPvgp/pj/P0/8VRz/TFTHW+xKx3oIuQmRVfl3wJRMpHlwm
yRe5JMa+vvOkAl3yvRS5yNHSCQCeZL8F1xwZIEYGkOwSidLEX0hZvMuOBu+h
d579WUcSP1wEEv9v4tvTn97/4XbFfVHgPycB4PtmAQVFRRxXvOpNFsi6joEs
uglBQrmDbuH6U9pOeY4gLjXOT/L1eM18+n+nfi9zEjGi37PJoE+Lu+w1LM34
P9yDM/etRyP8L7Dd4sZ5CBsPp+EcH5RruscTmu6abJO7Rei0Evl5TeaU/Mjp
s3jEvlH4AgcrURw01lo+vYnmSp4u0XSaToPPJa8SuwMmTsSk0uf/gexWgEz/
+pf/CjgUKrekWA2SkVULn3gEH7oqNOZ0b/tQs7xN3kDGraHYtyJ71qDCQzgU
YDwF6tVlt51pGZiV4t6FQK4/MCLm5rVLEmGSQBl9A3KcsJSl4Ewkug6NB83D
5YACT6FYYfxNFgYm6dMZYIf2YC/wX3lGn80nowf3HE0XLKuUC1phjaIo2Zvv
p6r/zByoGiSWvE6wstgJeW6Jolb4A8IEdLFq21qgwxIQmHuDJCartLp23CWr
pB+R8arzS0b7zmOKMJzULP/rX/77utxW9QHJS9Ij4aDaNA5NeHvkmZaN9iSH
vTN5DdZoWgl+Hbqx8jPLKclDCy9eRKlG8yotDJx0qVnaJh2lFH8oVIFvpIGD
UPnVQvybBd/YnKrWM3EvPACZDE9wsggq7toaVnhvspUjAdbbx9UtCaBmqZij
ycyaxpU8KoHvV3+VKThXJ3aKRe9iScYNCOMaKw2VwtFAgmtIQ2YbLYLbIzxV
Kel5u1/JFFd9kpJDXEQquWwfztR66JlMed/feExJcpxC2lis6c8M72bsLWfE
uJBC3HcZGIZQJ640KdIVrZd9UhIFF6+kCetKA0nImXNwRLdgvxUDRKgc+Tvh
nm3d8Tw1FSCr0K4hSoeqI/caT3duK4UXmI/QGukkb9EyTYlvxPbssQGl148F
xiGMaCrpwCGop6wfTFyDo8ecw2t2vHSIyNy0QiyygqPL55cU2wCLxSq+tdZP
kh7MCmzFJpEEOCekYTZgAMCSyh0n5JbYHI1yPETJOrGFNwr7nTLhEoHwr23F
iZ1xj/ViF0wYXInc//++wfViuyu5yP6hyoobUEhKyJuPwfn9tliq1lHel83N
L7bGfp099kssMqQZ4l0jm+yTCZvspVkEL1FmlnjpKwlOM/QToQgw817oVYIQ
ETkFe0wj6jJHUuQZtjuS62SxCaP8FjE0JR8JohAVypBzajfIZ4cZJ2S1s9DA
dVR05vZADNsQEOpkcG7j8s83BB7Bei9CUeDZN6uOyzC5psf8Y9MjkEJcI8YE
L655jCdO6oGNIm9wfvAGvnKzCR0TFyAtD9GlcwkHkedXqcE2uotuSquWD43Y
X5gIWYm+2JRWymu1jd2thvTY6+0Vr8ClqoMSKLzYMqKaD9n/VHxB0rHd9sXz
BFJBapDfQN8Jr1NyUzJa/HqrZZUcelndSpMqnnsIy3pCk5OIpDcqfUP9Vpdz
0xoxAY+/vwk108FILHDB+bo+cuVq2a+9cFWtBPKnSXwEARo3JWVrMGZTGDND
th7cNoGLe5mQT5fbi1I8T+VJppgq5inAy9mcCEEACFYcLxZVxQvsGs9OAtQx
lI1aqqQn3gnUWpc+5CEn+1SlzV5yL6hSbogJlrdNuPMT6aBYhT9J2KdWHZRu
WrpCbvJPac2s28qH8ivkmk0r/rcYEUrmau8Wu4a/AAOARJiwXt94IhOBloQb
QUi15/1baH6TazML5TJhYCF/jKTMTkgzkXxXqy7SMIiQIanWC/2zc6DLG5jS
m0FTzZDQVKT8+WpB4LuZKdwyWSlnQwwkkWNKtv0cCUxmjE4Yt+Wd/Eapq/FW
CloqMPFaToJ49Cu1py2L3e8Xf3DmXfZHY+c14fIRNILnoCLSIWU6r7Za5i2F
CznGBgsg0gQFUwH18zBt9r0bv6Qtb8E/52kkZ/VFscFOsfC9SGi0MdVE/L7h
82O86fptGSfuCM4jBDctB4aYUl0Mr5heh9TOLGFrG5ZYwuInGKqIvlOxOU1k
DGgcgSh6gHVYpifAfoh7xVznlBbHqnRES/RJXaZpM2vj1Ed2p0n7T47drzb9
/pXNPj7r/3+Js2U33WPeyZKw+RM/f/J/v87c+5cx/ybGctIc/L5Z1jBxj4y/
TyeMv6dlQ/+fSPC0I0aEKHfomMM+Mh+WdSG3/MbKOLxzTRJWU8+T1pW+A73N
ON/IUlLuvtD/Guo1JqIi85q8Vy/gNHM9eZ2oNUZ3gS1IrIe2YW50um2P6hp9
G/Ir/STvkWYYRNK8DYdObRirm61bKQenC9bmvtKVrD0l9sS39TJozD8CdiyS
MCjhVshGNTOgDccu6A5UvGb1wGR/k73UIaccokA22eYhD7vHwlBO7zOqsPV1
Yz//ewc6Trcx1DXP3uZPkM/WInm2iQ1smHQHlqmAcYIphx2nYC5IC/rX6Gko
jPWyJS0LkCzqKbPDQxFiQSRoDMtsY8v2Tj+svULuSlmmDtSR1WANnQR9fcyp
k5LknYjQXYCsom1WeRhvxmgtjhrgFDSs89asJmAtY8A/Prz+9uq7LwA5tzwQ
qDPJqN7dVEuuXn18nleWWsKoBOkEkiYMfbjbzbkuqxku9ztuKorS1seXH396
+ZXAoOf2hnnyBmYKmenpH5gPrWNDq0MyvhlFfIaMbUKgfF6Ko9qE5Ionf9LJ
GJFYpSXsMKVfX7/45o0cGy8Yz4+LVCMomw4qWMdkVekwfpMwdJzSxdic/5La
7oRCPqm8phJqpq2OVLPKrw8a7ocMuPhABZ1WK3zg+H+Jkh7ddo+axmqVLoJ+
iS6+T+HqPJu6vU+rvm58UScjK59NKNfXfKJ43F/RgQvrbl9JOJ8cBwPIoY6F
fXrun5OX1RgqYRg4cmopoWXNPFyeLtN2NQhILP+4B9QLEdO99+Ai10ij16Li
AQWFF6wJlcHKk1ekZJE/IOeEcdDTvbukM7RRWpFiFDalsBXeNCAnOGNn31Uq
44l/8kU6Gx9mNchMOjWcTqzXBBm+FR548mwGRp6itMaXy3MSlK7p8gt7xZoD
5Ri/CnDRcfF6Bh+IyyJub5oXU49bcpFM/atENuyEJyPtyyoGMg7scK+6drcL
kv/SwWhSUwnmLG8muQgkDs1E2DesHSzKjsjVPCYTJFZytAhSqA20Bbx/MyKY
FFztCM/m6QTsd+pBMTKvLqVNa7w8b4jLN1fDLBPkvEKaJm00ZzKq5LQ1ugc/
EnMSHn5gxJAbi7YXJxU0J2A//fhvHY7xb0wzN36quRW0HM1T9aqct6xKI/tp
tPvpBAn8SCNXR/jilMHamEvViEsLYDhMkvDPCNJ1c1LvJtvu1+ldV2EfhGK5
X+8aGuOU3tWD9/9M7yYD/pfWu8n4fw0I5Rfr3V/lCH+Qy5vs4/vUcETEM5I8
0cUJ0+8tbe6kxlQbMipal2tvnIxCDPlx280luw6nansiSNvQr/Mkvf53iLML
FEKbFTKOWUoUcBj1LN3TQaLMapmjQe1fqKFjDT1Ly7zdzog83orJYODl0sBt
+2Yp/BQStGSpnfg7vG8jJH1Ekj0IaVkn1eokInfS+fDJ6GLmVVkw/rSuZ6f6
tqjFoh6AJNirnVSFnpgbo1tl4wL9OAWO76F8S+Q6ej68Q/FxNXC1XbIGk81E
fIlRy1Ertr0fEE8AxMmaeKDGhUZZ16gK4JqRbaUsSrwiLRzRFOW/XivK3djc
y8ZRhcxQiZJ0LchvNOeRUutYDj/5UKmPMC5AmD5zASp5l6JXeYNzXk/TAjZD
JKZbNrTIzpTiFOkAslolBymbqnT/RKxrxhrjaEjlUZXEfdo8VWhjvjUKRjn+
FuTNH8bnVZNsx+2d4cVPVESmnSPv6fedGSEfQi2asx4y+qdcAQ6foPlP9SwL
nBiR2mhpXZrpWbOnNVMDqmnUhjhXhcgE4M1pLBwHa4ZMOed9QhQZJCSn2Rid
+HKqDeakOMobQxtcyLpjH/fn9ppWhbHEBueMD2O7Tml5jTlatmap+4DjiN5+
XIjALR1jBNFa2vNGXvlt/sov/ZU46rzmeiEzCGFPCTVPlew4cj+k5QII6JnE
kvcbU+pIx1Ll18HwuASvumnblXFjYaKFHhdBu2yHKo+V8QFJp6YCgZO5NMxx
qSOUgrzFehZdLRlIm3LXGxuozLkDfHopzGDmufCe3eEtZAA+lFVQbs60BNkm
XIzkWBQVV5H9TjDl9P5Fo67yJOF3YDBiiTbL5ooXnJNXs1jxmjQ+59ClJIWd
AVrXXPbela+kdIGPndjUdYrlNoX04dt3zIlhlNV4osQbMn4mAWPGYClPgoPI
hHBMd9dNqGVBYkmSRVFpWeo6kLHYR5bvhHjLDAjxSf64D+nLIylU9sGi77ik
SOvv/Hs9NqfbgivFIhtVg1YKJMVHRKTHyyIqJFkZrnVlVgTbE/wgY1qVL8pL
gJY5p36sL+Iu8WZpzdv1qAU7M6d6aZWiu9SUNxskrQJOAfKJAJDdwFxjcojL
Qfsk6043aXPcGilZH9kQTEWW4Pazc2Cdufl90/vDpqIfHyEhw3oixdPXOCRP
IufaD195e1SUGzNAzqutLKjPM+Gl62ZuaRG+W1+72GNBHjhTXLCVlfVR6h11
pfSbI1GYxsaF8H3U5NAG86UU88pQvLLXGmZ8yEj8Yny+IB1c88hJcmLlS++G
JS9XTSUvn9Rh978fJYcVhOu+u1eP53Rvm30lpYuYksmxzRl3tlQOm3gE2Zz4
4150b04PUIF1ladXKnDDu7Dcs76TT2UGjVdgXaXnSOdxqcBLiNuVy2HMowXd
x856vI2ZZJ10oosSCrtApMpFxmtyLYyidoswNhvaVcE6IjrPhJTEZIxOQdcu
EsnOVif4FR1ZY7PQiElLkw7fxgpyx603F8bToGzqS5cZKirNkmA6MmlEDvCB
zGk2pd+VUuXoeSDvHIScThXZ/hh+EYNKAbb9MJ5qN22lBaniR0b1x1tbj/i0
9KTlE/9l5ItninmeMpQwiltl20TtRH0h2e+1rAxDPGRNuIUDhyWekDb9I/ou
DIIrS5Ska3R1S3KbJ5u5l9YNHc+VD2DLVvdoVGbjSfrOpjpekiZb9RvUKMxn
4wvzmkwcq7/p9epK2mMWxvewMJ6oFc5V3SayhS9L6kyeZMwjdP2LSB8WccU4
lV4ybciWtJprkpSJhyNVmRjJVXOAfo5EM6K1ZkrBu47IQzixqwos/Ml75fNe
xXm7MiDdP4K7QBmO1c5JptfCckKR6JP6TwFDAn8o9mxyfX7Zt8KU/kTM2cRK
ketyejgVX2Ib3/ph+6Z9Qv8v/j59m7dFTXCBCEupjv+z6ExF8y4HBqu4DfPn
ZGMjpJQtPWJGU5OVRPPG8JsY3pv+/S/+230X6wU0mGfuGua0D382DRujmkkE
T/9puSxcTmvKD9SuaXmz21exRCSJys1cz43fkfzsm5j+rRtCIrAaRKLVewUm
zYOnWNK43/Hz/B9x6Olj461fVt2WExr8eCOUm3468q3vf7TZlfEBaR/vbGIm
Jv9Dv8BJFARs4bnp18rS9Odk1seTc7Sq6YNlsPGZ/DRvWXbvc98z5Mknv2+j
fOjD6fBKWbycRVHUD+kN55NTPvu10zP9HrHOLo9f9963nNr4975Hn3qerYY/
Wbap/N9Tj/8uoNLbnvsvdVq/RmeRFuR43FFD4nLeuv0XL8TEkn/TjuQZAoD2
ovtFwj3Lyj7fKRn5UEd6fnbmHWMdDRuk1c3pTLZH3izkxiqYqXv43qRnKlQ3
46cyEolqLcXqGrxPQWWxUCxzaAW6KulPfSYXNKy8qlBD5ApVLdfr6p1HWlAt
wNda0VXZneQ4B5VGu8C/pLQuofAWm1p6PnAEBfjVPjZKMFgrE+lBZc+8mxYs
Lo3ed4Gcp2Y0RwIGjqkQvDbtfCs43dPUTTEmJLHtFrgCYLONtn2RMllxRzQ6
jKu0Uiy2ZcxCrfrVRgVYV9JbPelTJsh3zjMI5V9njxtOWGnv/5rIZkVLwT0h
hfXWCyWrjqs55N0J2fyob6PUzI47vlXdyVzVC8tioJlXL0mh4/BzigKJvEsT
4XXMmj8nSfGfYkuUdkn2yKz5lZUncwtT1TYPgQWcMSSfz4a0gD1Xpp3IXJwS
uvEWZvnBJrlWXArvQ1qPwBkp6+QjjP69I0qG+Hj5Uu2Qx+yNU9Jk1f4UGusM
oMn0JK4G5DwdcUHEnIj5d9ELEodp7FtaVbM3NRKnoWrANtP0fCDhK4VuKU1K
3HjWj9NWZ4lbrE6j8JVJ+c1VBO+LkOIkHU2VFLrah0T/TsWJOvDWuUh7T/sS
5d+qXyGugYfysfbO5onVy27yxQE0eXfDOWm+ayRFVUinrMIcYLUzt02NUvSo
FmPyIRo5qSqa22/n29TEnPsFP/98zty1YGhbqbG7cltJZBweqCOLN85X0bCc
p+9jfYXHIixxW3JuyAMvrOzeZ78/PDYIzoV30toUMezXs3k+0+Bm5VBMJejY
ETfkNDpausZLaUZ8Zta2uQAkCi0vihf5oUmAxGjtg7/FjnisIpvJJ2lZeaRE
ZmZB186JEhL2WY4QJd2IEhZUQXhby11RLwsOmL5LuRNj6XYkEJ+daK47FkoG
SM0+JCnJ5wJ9CfywXPDpjUzFAAB27ZZrmizSRoJ2lreHmmHYSCJBly60OlBC
gVtS7Hy+bwNCF/gwTxyrsdBKWVGK1DUWOoFb3yfLbEnlRGvsSWZehFO7Xs/p
WXOU/a2nNl+MTDlDFZdNamTsSBQm/B4jSSWVZ56UWlkLK9YFLLw0ap7RIhpd
jfd+y6QR92t0qgFetdi6ESue246ibOqD9XnEEqW9HscZB92Is/gTN5m5RWp7
lFNBk40nAhQEhJwvZpvAuwTPslfpCBIF+1BYTB599te//NdPPsbUAg9ybrlG
tkyVNimspKR9phOgTWqkpSUnl7h8Ux74+NOCTgO9Ukvs/90vqrH/N9/iUlA1
Wtgvoem2+O3HeE7LtCjOpscuEVukkcs8cNTZLG4xt2/CNmgA+l7T1CbUDYa5
/Xk+0J8TpXEBPweL6Ps13QqxT4J6TzHSNhudYAEPMY80oALIePC0KBFF1KZJ
/0Qyu5lWH9UCvEBs4Q7o1LxxFJVW6XIzZvranlMMVdlslOOCWfoWh52QzlTa
JKoPTikvXZZjinsvvbpT0M1xX4Tvrq9fFA+/EzW1Kq5lqNdDF5oNHThEdZfg
mz/nVvPWmIC3RHNbddL6DB+n3WuEY1MSF73lFVmFTU78gpVNm2I4EqVzIWAF
p7qMUzo6EzMG5P66M4Hdx36FDFeIEN3+stbUtsapKpd17cXDYbmTfhpgB5tU
vJA4XnlPbD4JCxgePXa3nW1rZJl+SsLdqb2+Qlj2F2SUk8IJhws6d5f/ZVXe
Xe5K6KPLVaBJlH6bTbV7/Il8Jp/Upy+fZ1AH0UCTK2NWNPm6bXPYCo+UVm9i
08wl7TG9960B4ck4Z7TE2AA7cvPjjWKLRuJjhjFpmxZpTzuCcriiyFz7Cx9M
kRmsLLUda5TYp+R6l2+FulTMm5tyJ0cGmvgG7LUmHMva03JQaENomjKhOskO
IMNj/chmI8GM2zfl/M9s6f+niiTvNm+3GzHqNK5ay+b4OHHqTSytKfNEdD4b
KHykvClvPiR1uKbSb8FhuxksclxctLkoiq+ER0vaz4IX1K2rtTU0O/KipGjb
R3rhca0kB1IlpAizxHnJKJ04ymHU3eyyy8I6JVKfp2dKZkKXNF1mvp3qUKTf
aXv+vUH4bOsfh6AyE6Er18O8CsN6vqJtMPc754Y8gDtkVEFL6VdUDikS1cZA
NiKQNq++v37DXsCeht2oe2ihozLHQfG1QHVZGyTa2RtpMA24Q1dtKllEfUfa
Z81gajE33gu4VyJhosbkzXG0qJC18UaufxwukcErMuLEYmu3BWOJaNd6A6SL
ZK24F3NJ0m/PIjt3MMyA7JMzGvFikZOyYmhg2ptWG0WI8+n27poDm8peLf6u
SAk1MF88o4NU7qoVaIPp6Hb7HUvb+E5JaKpY4w7SBs/lKJnWfCWgFZQF0S0N
UyrbPjOJzHrHOMp4175HGNAXzhRRlCAL7ewnQcPJ4x+tEl883jRGK+X94kAS
djeXg51WRfry3RtW+RCBcBzncgQnPBWPx6S7HCyFv2CP6yG/Px328DgjMKnm
mPNcDAKPjlhPmOmYgpGXcAkSw3GFUUiUgxwS7CqDuNbCEeOyOOkBbiGyLEIj
ERs6Oppbhp1XKbBJmiMXDMoXHfmji8MV+1fRUAGWg8aBd6Kb647xYUOf/N5C
lCf10mglxcpg3klGqAzcqBFKP8FxTMT12HvW7juDWu8RuILkfKyosDqk2ErE
6QBLFWLMxD+TWlvh7RHT9DyL5sUIa9IgPnoPCxM42k4xMXdkwVYeyYvMjyOT
wAL88t7pI3I6BHy/T6+dqk3scUIBeQwTw7zDjptH8EnnsquqcawGAuRJ6Ipb
AfQRkviehO/DJEzn0v1EW3ZdJ46yejfXlHCEa/67wH2dEB29kUSDkDgEdFkJ
bMex8CYXeKUQtAEUBjON3wjOGDqb3ydJh5tqpwTqi0MCVJnuM6QGip7zWPx/
XVl/O83/gKCnd+0XHzhLUDAImOy3is1jiFqlQazYnlcwi9ICd8ddrINwxE4s
IRO2mJzgAkdGByc6AAYyPWmHrt++u42Hx7Eq9cG4JzW/FDvtxn4BNAQ6csr/
8ibBtGX8BFWWNGZ3kNO8pqjUYsoum8sfEQU4jiHPtfXezz/zpPzpT/JAuyde
79edx9ZUQ1pEK5oajBM8e8vusBusIDGzfWAi3Ip5HtW+ozhj1on5FcyDP1rI
odsL0lVMSew6wAId3xwRqfed/TQ6yWwO0Lgc1u6rOsNe80FrWuX+cyT9exwK
q4SNoVnhS0gkuOLVBJ3HkZ0RijEMMJH6VAzeK7o1/QNnLXKKXxSvxYKYxQIK
l5FsE0XeJ22ng9YlXgWjJsWylaRlNGnUXqNNO2GEqLh2y8MkkLOMCJnsIXFU
oE/abcl1V7Y5VNEgUtfIOdg3XqsaI9SGRT4XIz4dptClJyfXRsCYQZwb9Zhw
JlWcco/VDQ3tViwZRG60zikBf+srE4NfTEcnbZXQLM6GYX1HlTGqKzxFS+uF
q7i6ivn3rGjlPcCdVD98oHllOfpj4Zc4AVlfMPnc96VUeUPJkRLT28CZiYRM
GLdkpbw7pW+XY0Tk/adNMgoOCtbx+DEZFwUkpkabGHXsZfmxM9BEor8sgG7t
WJElDjE9k+ZftYXgvXbJh1oiPEuHuPyjluB5LaNACjghwLpfcBrcOol5S3tp
NLyTvtsnq1Xv2XinEogftvOSLcVHDkKRzwZ6cTObOM7HpJHOkvh08GHmJrm/
AcpWs5oSMTLforBmY9pFaMQJM7oSQNeTGP/3aJloAgucvCyaPT2deQvRlAll
G9qfzXWq7ixOtAg0X20C+sSmtuoUNZASFElSlYj6G/4EUGywKSc9MD74GIWj
UzRFmcPHgufSzoa0zxTzc3ROynhSnI4wilwFxk+cmMGa3Ee3112uxOFsDTWk
jL1p9Z/4PnIiuOpCkS1+87hcMD93gohTunqNacc+RAiEeC2bf3xP3kMtNO8J
hYeoskxD6Vk7CXP8u/uwdZlPYMyGnt+O5uDIhDomdphJmWGWxDQblc2CvLvM
KK7s3Ol2Vmn6fowIliXzyrJkydkvbmC8ktS9qNrLJtz1l+tyUZXNfNGV2OlV
M+/nod998ni+A2dcWLH5Oj+0+zk9bK4htH4OSFaga8uqw+8Bqpsbs8Y8sUHn
H68fL/9DCJ+vys8/ZWyG+yo/ah0Oeye0dsvRcJdhebHZ7jnTwEN9/PHjz+Yf
P77kEW0P8xvBcNy0dzKc3kzn+RJfFOYusl3WzuGYkwnx9JAa+ML6huikFhzw
ATuGVVUNp+SFRdy1APjfZvQFvRfzJ8AwspZnZoenAT+gqXa7oLlOaRlGawbU
jAd3LJg3TpKkyR3xX7gS0IvQRVolfRzl2O8hCOpD1hhu3yRf7dtQq7OlnIYL
ZMg3t4JgkmRJgRB+pbOe91lnwCY6DGce0kyion3JUTDIAPNtzWSbe1kP+5jK
XMpnWrxI9xbzVqtfIBOm+awfrXgs3/skVJrqHWfjxJa+BH1If4k0jtRZX8ol
pgQef3ZJ/3z82fKwrMMj2tZht1/MHz3+7W/nS3rd/A/7BsnULMvN2c/K+nyk
e6iHIcE+NFO3Si9CEaKLri1XSzQWIaeaiTfogz9+9/HHHPjdSjz5Vbl82rZv
48ZbhHLJFajiw7Nhrb8TNgmHPZA53mr/0SucFNYip/xw6zJ3y/1MNMNrfSPH
lh1p8lILbSW0pFsyzSRysnOMSJFVF98yXWkxTJc0EDw3HoZIpmWBXy2Nc1Ez
8zwmi0+W9rnnC+s/KXZ6v2Vt3qoUhPcJi8OxDbjwvWz63ILM7yUeuC8ceWwW
HEl5T6NxSsCHcHyiMkAZkyrtGxC2dxUHBWOO2fdjpTXvnKxzwvkk4S0utPaE
hMrXDWGGh4Kl0DI2qev70Ki7Fepqu6qL4gsrQJox22hewTRRF5UkhxAWuNUS
2apJc1F5wX7M6eWBFfZpGTkVp6d39PfIj07gjdxdN9S7CFURc+vCtblmJ0Yj
QhdPj36SdVmtIATigRAxHiliot8X0ykXxesdV3wjYqzpHhy/Y7+HfJX1oDm7
1CyycBdnMmSn4GExp4LkfrpdzGDmwuiB21dWtyRmN0pxs+lY6Nxrg6mnf6RP
Rir7lJpm9HNqiZXmTKsPyGwvfWSzAE8lIPjM2DXiZLA/njzAyjCYUKSkjzjp
uyXjM+IHHX6PIAZiVSWcR/rszGiMCPUHHI9kH/OBXS8s2epepea2/v1iKkuL
1n+1p1wSapYkReWbU/W+j4+DC2bJZewrnM8W2Z9MCO2iXdsoumXiGaOSjSxp
JolKpR2f/n7hJD0umtdvZIxchEMGv68asylV0sRSg8GDxtyha9nLgARKx5Y+
P/nE0yvRH79SoLtor0QXs3cU3mkphiSw72mh7W2msqfBsqnAXyKOlM4FHCl+
lLpnWjmXyCzmZPccXsrRmqtMf+SU0PDwFH2ouuLqJfEOL7tFRTqkO5za60eq
sV3r7m9Oufsjh6iMGGt7tcJihuLpGxJcCoRWxZXGeC3oie1+2gdTN/k+FSZ6
C1+Ss6kID6gVf12k1a+VIwL/TjGgdr6io63i3lh47bNYMOpXzdyK6vZ1cG/R
Qp1sDKY0EUdybJJg4eEvkWIjT8nacWtEY5rRGkCnUHs+R1Ie0kLl9G3Had1j
g84AB1XEjgrWwAA74w9B/DlBrMR98N6oVG7ExU9gjz4iJJqwqasNB2CTKv4T
k8b7JY9l6YpGyiUew8Q+lCL48Wx8yLZM9qXTOiSYhpHNYmf7AxZaoA7cOR0+
ACMC9a7YXUU/UJAdmiU2JK6zeGgRRlqEOa1177UmkmhNpr9/fZrvfAziRavs
bmVNgTDcEwUavamxiUEdxo2xj8wfsvKZJmUEcoo+pgzAJSH8G9pxXNI2k/Sr
IBua9V7469glgw4EWV0SAB8HjS0muq16wAKNNoqhT/Cw9QS5zuKYxPLAZ57p
q7jihETcUmpLOvC6H6w8CpzMHDIRx8jqwQ5KF9F1Bw3kZBEUhs/7YYpbS2sC
P6xk7d5ai1Fi2KRK045PR1ImNmID+cBqjBOlF46KurBjYGPZSc+itNZCcWVW
j6hdgJNP4yC53GDgrdFTudAybbaY4UPcoxD39aBYVwmwx2xegsnk2PBJLrQP
SHZC1SdTjQo+CaPoQUqfzfuBXXiQyPG1NMdk2YkcGZVdl5tYcj2BrzoRFS4P
AtWnMb+z0kMZSfz+bUb+qHlXDs4UVxxTpYPzpsIJvy63PbrLX6MQB3+QWrQR
9xxZA6u2i77+BFFQz5SThwkIILfuJHmwiv1a06pEsPpHL9s8oi1XOmOKJCIh
nDh8UjZt6V1aR4SOwu/TaGqK607nMvbIYPd38BrEbWeK8lrqBxM6xKoZp3Zd
COnEsIuZq+Q0ohPz7Vzg5Qh5LW+YrBRNVHqMwURzBaBMrLFrKJ7RpH40rRZt
SRNUHhPVtPQqsC+yCrQIXayowkweB3MsutQr9c+2cvrHBIAgxVcfWGyVw7Gy
DVqu2p0HtvIllbKMft95ac7ksmeNW6X1DUsLBn2FX7aPxywDKXNBhnQ+yTJQ
pnSnbLdIa7ycW0AoYD0Nt2FoUjfB8TqbIHjVghWg0Dd1u2BWMS2SMXRGJKkl
bdvooYSxxj6Ik7EmdgROatAu21zjwolMraxMGVw5MMcd0NB4ubfWA6VqERAp
TJplPcAUui+RrsUE1m3rmGMGBHoRUiS5bbsx8ZzsBe1tIIy71iwwW8r34xsS
wMyvINrNGXHfH3AdU/BG0iP+di/qLnKyZ2XkslsdGSMmAkmYjDXpX6ucO9sC
U8caFjA97QR58BHP8ohOmFYhewPvqpOiIYfq6IWxwjUXETkD8Uj8VL0EnfYd
WhjvZEDa7VvrS2OouJwoqBNC4x+wIytBnYGpSuGgR+zj/EffjWPi8Uio2xwS
Y3PQhwuBga3+BKt2RqqdmOF9klVo+YP2W49gWdmUL9xF8RKiqjPQ9dSLktNo
rIceQKzJTWh3Lg7G6y6Y9KRciaOqSzoyvWW6NaCVIQBHSHWl6O9zuAp6xrog
bkaUgL1TPxo1KU//PCctnruxMCexI4UqeiFDYn/+ebQpbMlHDIVPEtmKYQmc
w6qeDN8yDYvXXlh1Urg0OuZSpUFmlfjWbOUVjXD5RTcoPiJzGTGc45K0Ewwe
8ugESeO1ZIrRy5/LcH6GX5WeYMUSeEyYOypKFiVDKHClZKcg3RRmINs/Y8ZU
nYZn2+bTMKWiS+6PqRsEKtlDdK4MkbXT37KItsUFeLnsVnVE01dddI9miSrv
rD2DAWgMaZNXKns7hpHXbfvdA7+GcpTCCMdD1dhNEXUjNadeUC8rE0knPW1s
H6nxPu1u61XgnqzBRKGYs9o0xRcZvy9N1hHHr6W15zkV8M8/zyYCykt2xQ0W
hTLcIJH/2JbFTCXpCbHxJQEHdNwIY0M9EkgyAv/oxTKhT87O5sULjTdl77fu
cxKmtu520bHy6Uz5+bWHKSfKRk1ApxCsnUL3zpjD1xd2YqWyfDgC62ywJFvO
STtmJqgnNiELYSP34Y1Mfoj1cP3Tn+7oaM2rfg50Dv76888fNjA9QBgW7L33
HYSj8Z06DL9quNyGysgyUgKNtcJ/OcECamG2Oc1GxAKpw3kCpOrsuOv8MZYS
cUgfXyAHS0/tIqQqIoBqtT6IqaCn6ruE73WqcFIf9OhcABL+gnsqVmbF43PJ
CNvF3LUxClHGbjgTOdxvyQIkBTISI961fYV9HQuEMMl5NBPUQ/OW5mTFkg4c
FQslzBIgIy2Cg4tWhTc871VvfHJuPAUshsDXLgxRvGrxYx3ACftAyKqUfUts
Bqs+TlttxFVIeaTlY21dHByJY7/ruBRzikt5xMyrDqJtIV8EU5++Gmn7ijWd
hKTU+9hGNWHfoxDSPz8y/8NNNcxZPVHp8oQ3yrifMm2HsVCaYd5zY0OxOfjm
T89PhNQF5M/ojnYTUzrywmt9tn2xRtESzmOZCBMbSgQXJ0OCprJrrMxmmnLH
Xuky1iZOCfwYuqNOa2kGUWIHRXRnTMUoxgT77hRFoB2eyJZiPXHoSYLHA11/
aBS36ojS/ACkS/h+yjgvgYq72Wx7blAtIqiDOxJJzXhraWYSDEHaPm+x3vfC
nSXJ6xcJS5IwmycnEI0Okta0Kr3HSGpNYFh2IgIhaca8FMkpCMZ/P8/oI1LS
JkkKaDy9HPL5tMau1remkXoyVRulNvrhD2VX/Y5GR5+iRiz8c+QpHj0WApvz
uH16YZ33/grrxNbWL5U26gJDZTExR1zTxIR8kpVXK8y4LR70Tdv+FB5wxoDB
crKltA8Fv5UbpcsQY0C3lEwxmecBa3ueQlByuXYRTZx8txptkO9R+1zjT7wp
tRhPWjmWCxwb85lGB02LYezof6tyJZ59p8G3t6joqYXizbTxiAdyGnAgeG0/
AepaMTOAmY4+ARwrlTbuEkLyMjTnBaONXJfGSMhx0EGQp7rN2uMXPryiq1bK
Nzfu0iAjMQsx+lv+ZpGmd1ocq1VHQqkyZDwPF+dsafAx90Cz19J4rVWx2/c3
edFWG4tBr6UaBK/8WstBdMseed+SWmSJzxv234zMEk30YQKLXaG6NteoT8q6
/FH/g2SaKEBbeMT/Q7texy5LE+p84gjAgt1ZwTqvlhkr8S7VpTvAInEwgdl+
jR1dcjDthm6trYVLHIdkSURbuozqw6AL07DZFxHY0KIJKNq9VFz941XVfQWr
PWKhyTS82S+4RJ4mctu2c9rkl3bdORRxjHFJS+7oXj24NoOLidwfxPItFmgy
WsYecWyg+olL2FrDX6rQksTvtGTx9NQMCSIgmFZcrEm+hPQtMKhmypaUMahW
fb9nSG7VAF8kc+P70YvgjbwyrWom4d8fvzbEdgue3XEWGZjyPG6Jleyr/sY3
0iY0ewiwxJyPLY0WoYGLMW6e4c2C9kPNsPu4m5zvSpiIOMRiNQeD9YyyTZiD
YSacp+doWSSPtKnMAmaeC5QMA7ssYgIwE0Ear46NKeD8x9lTdhDvGN9KhTWH
mrztjnc/s8473zFSdlV8yV7Ot+blPLn30dyyD0NcV1xWCPNEZ9hnP4kNeEMj
xF8rDhwosRYzLbHKVdV+xNBLU77ZiGuie0vG0re1Fmcbd1y2vTDC1aGhh2rj
o9UfmJQO/mhypn2rWYYPfR+Byuya8QFn3ubcTWCERC9GhRrajLJZdFVYS/2l
zDy2OQ2TlCcTzNo377n8QN/nfmWSL2By1sheuNcmWpkZBOcxckjIseLAPATa
+GzpttegENoiNwERiOToiksotdh5qtFJaYYEiY3UfcTlxzwpXDyyMDbBu3wK
3LWRDAG23hfC6Di/4iio9rV4zsV9uEia5BxJBwmWxWa7ygu5T45sJIq6NepU
WdJZsdKEG1eZZuEiQIa0Vn1c75JSdrtEixSQbGbv9qQAl0pfbkvJFXXl+v/6
PxI+a1kuoMJgKcWkYiVEfPAVa62ni+0rR7xLQrqBEdGcpbvQjQ1lmXYJGumm
gRu+5VTGmNNoxsfjaMK91GmmWlji9IJmsVSBbh/tNLOCzUUK6IppBa7jgXuC
arDjc5nXjkBuk7FUr5JeeuNR9UenPench6HNWVamDvcorHO89S+0PQqOkkGf
lb0iGYmyYEvk5xZEgsiWCfoTW0k335PYFSgZ/JPUaoPFl9qvumseXDUpEwDz
acAQVaHiG1DCSxcPzrNOQtnLfpDRWyEwE+jwgo/Ibh5c5fauv8P3D1xH3WOH
dn+BErDlW/yTBDidGpjbmKY4Gm5bkI7lezLOIDl4Syi6KvI67e4dT5Q8NAFR
mclIVI0y/vtWYSKR568aMCbhHnH9xXItZGaUY90lA2upQ1SY02MQW7eoENeW
VF7gr4u3pv9s9sH2WUKSI21lk0T8+4KsE3ZY1LxaHCnBehwBZu3kiinwcUJB
BOBNrTX8s0TgeV9wJe2VajF2MUqVJhg4R9mWddun7QfVk2BX8Ozso4++0y0c
PvroSeJk60plOnGKPq0QKsIuTEnABLWoeprT/9F88ECH7xj2rDHZ7Taw69uY
RJa7hnOfkVemFb6IzJZnZ680yc9Twh9fi/PrSsTYBd1XZx6NCry5+vF6xfQc
8YHwh6WsmqYtYo0qSjm2YtA0hUC1B3FLyc7vEnQ0XnU+KkZNbFEPrarySjs3
GplQSmTgczRmiX1D/131Z2evmVpbZ4lnQy7s7cLJSdIPjHYN6EXPnccussEe
TRqSWz0OUlgJwJQ/lBd69OJ+T7ZGj2Rl0r/7eO/O/I7gDFYgEOdNmsxF1L02
Jd9GSr6zM7VSdCLa9RAaZcZgtYtfMjd50k4TAvQyquFMiwNyITO7Mipq9eQN
CpQQbBkd9fFsWVs8twok9O/zK0H8HSwUsaL0vK1ovyyEu2BnDeZjW48JytuU
Uc4n6GsrjXwh1XIHABHK+vBTSKI7J3nyt2EopbrbrLcxOo1reBMCG5BxVcZe
3Nu8dUHasGd13CBlXcFBPjFxX2jxRkzvzzQcGTnnCoGDTsgtMbtzUvPo+DF1
MOvfifrymXiBYlQrNNNmIhLTjjid2UCxRBFtaigndah8MZ5n3M1qaZ+dmbIc
0eCPMpnSmwaKV+dCpFELUCHSrImp25+f0AZ8u/bg9QqfmQR2f2qb4E2s6du2
NdPJXCV7tspsoFb7cg6pIWvpEIBQS62G6kpUwy1hlneNBWanESVsm5JIO5Hg
0NFlcGup0xJvYe+mIkLH2r/eMijW1r60ypq2m4r9nmpQczL1CWLVPbncsqF+
lOyxtuLmfgh0HhJSh9XABfhoorS5GfpLQP3ZlZYOHHwbMsdmiNEfsBo9GhMv
7JwmIT1LUR8uz73ZvajIHpofzNXO9iPWTkiaDxlObVQachTH5cik5k69gfvJ
NFTYkqa+zRKcFl7VCHaw1bKYz01mQ5ksMwYhjknHcsSScTBGMTFLI7IMldY+
qBpktlnRyQD8BwLjWSjXQk3UcVDjRhV9JIyMJYDbPHmh+zRLy8AAtYJBjTo4
OTyzNyTAIIvtemA3ZdX/1VFdPVmTmdGrmBl92W7ohP14PYTdDQjvjTXiw7gi
RgQRn8x7f84cEgOQVqaD2LUV7DNOjdLkv8AubwLbY29u2HtbKSaKC/GP91KK
pFUQLZ9oyU+32juEs0HVbSQbyKlhvN2qZyF0fZiOh4Q6fdSKk8VF2pu9sOOZ
cYBbyo+JLSyon0CkwyqX4PQKuXhc24HtfDG5UL6naEjG16exA1/ANVOIcZ4C
nAtl8oKDHAnFVWVZNDuAqBAQpCTp6jDkdZAHP1IMkpOyA25oxhXXFrTHDIVb
dYem+8meYZuNj3WEwOvc30tsarpE0jnWYe42cLyWUT97Ms7ooJYeHopVYTqB
XIk5yLmk5X2AYELxlJM8E6sVp+F/hb3/I+yzf754wGw5DqU6TgKLDZtUxzDy
htv32Nbh0GeazhuEJtUIOrMd4iCDnGMLcmhm+4fvB56lNeyB70iFHcZM0zRW
ogsJCsn4CKyLaJaqhWkN+bseQjcRdEvJXrM2fAmaQ71O5oIobzNynqrRNZDA
wHgd2a4Uvb8gmROUkAeYuECHq2YQ5g0X4x2ldtMEEja0vloAwhyPZXLY945f
xA0qw4fcfVOHp2I8pkS8rbCEITJcqRqVINdlc2SST5Lipc1i8A5RRrYr/UgO
Sa+n7a6sOqmQdBopDgeR5V26wSkFOhmG+P4MK9dFRbT5ZZxIBz5HuLOx/Llq
UzRQuo6SWTKnIRYoWKm9jPz7mkYzvyM5sgA1g1uG/cCd4M/OuItzHIws54hG
HPj+snsrWeCa7rVsscoLiXZUXF6f1vJrhQsOJovS0qmHNOmKGDYXTiXnvR1T
FigpgjS5QfaFAZ9YYU29sB+rwKK0MhMZzm7P1NM9sxzDhdE+mEP5VtL9EhKL
Ww7XspPlVQnMktIOMdmdMhoenQeFG6FzhyYnWSvIY+PX44hwwaMyYhxluZMp
EfiwMF1JkyxLmNMp3kLEG/7giO5BniXoOLGRbkr72uQNx8yQuWx6AZDBSvBU
KRGyEcJMpP/ljB0bp2aOnfYBsuqHhGWDd1mODNN+kZvf9K6U0Y0BgABYAUVy
I2TTgvz9cGvxz1FXOie3TvicM70wsdgnUYsxDnvCgG+VEVvwbsqNnsmIVESk
RrClT2MDh9PdbBdOC7JyRlRa66fhAO6QngUOGuFgPXWrZevGL7QI8WZfabuR
6MhwJCrskipcHKxZ3sFM5tTjGd5eVTOxVyt2HsFyF3waxfUN3tAOCQSpWNO2
d3ytVOZFBRZQotiYiyC1yGun7JpIK413KdM+Mlt+oZVlElzV3Ig0sm1MUHAK
xI008X6FomUwgpqkYl2xCbZGMbh1YLaRhaCNnsXvMg0oNiKvBZe84xBqMkZi
GGafa0qQTtFXtlb6aZy0VrUXKjHRe5mhMQ7KHdsUDWtVUWvNE0i+6zqD7yim
W4MET45Pi+b1ZRgKwQFHAM7kFByos0ZfKcu+Y4Sy/rtmMEFOGx5Twow2iot8
tB7osNUx/g97uPISweyQZhmQwtx8cdm2O61r0HxOVkYGWS18h9JnxReZt2Qk
vncMefwksBtK7dgWg+G+JMmBFxUnTrCcvejfYr/4AUVlX9uzQBkldI/s6lVC
BrxJT4IEu5CpdNNpZtXwGiJowp52c42ziAgL/RMUj7NCI8pdY8MkD7dsNAjZ
z7IC/vScbmAyNpImYLOMeeAhCFrwyVmJEssqLBpJmhVJalMaltzSfQgxfLuv
Gy1Tc54I8zEERU7rGbOmSeO3bB2RaWp47WJh8DdpEozENul1HjljG0c0m1Lz
5y15JBVoiTPGpylwiTUVl1BUguzI61omjW4odQaWunGdB5V4qe5DM0fSPUQU
wb6FaXZ7zzhDuXiehrVySlDjEDKKBg3JVs0R3ttSjRu90vNYeTrAkSAZ0IOU
+9twkAUxBIn5Jdpu5RpWsMzCKoYxDSC7CrGwTz5kQ97IDmAaBXHDUxfAR+KV
JLArGf+6JZMOemoUoU1gkRHDINbMkQy0HjfW6WXLOycfu4Ay2GKWMET71jok
KK1nabx9F4UIDGlhToq0T1iC1ZmgBwizXzXiIFynXiCU23ac3e3dIZVoIcsq
bcJuth/ignMoj6R/Bg7JyLHAgtwBtpaNTRfaGnJGWNSo+4h0ou+SLuMRBDiR
hkibLmYFwmxbDtyzx7hmVfgI4jk2wYm9c6SY2UsW1OHXcdbqlrl5LPjpBL01
eSrPvam9likmhrLVnum3LMu9Y/NlkGmjOIl9W+GLtyng8spdoiUw/SAjgckc
VSK8OEzN8axXQt82pTIQGc5B5G44ebbrLoKJq/fCvDUoqxM1t4iAxVvT4kMS
X5VVSWlBjfShl0uW8ZJT5TVbKXAXlZrqg4TdwlRyzNkBzfKcPnlzKB4+ffn8
3MP60Il3oUvfPEu4ZdLfq+JIquLTD4p1RG+yhvBcEc7AnXtGc6L19lVO+MSc
OqbWnc2Ne9WZK3FUuKgMd5qWUFfAvXEh8VXiWrKKmgTNRHNo/d0kVFGpDcu5
qj4p0+OkVaTB0vOJhzCQmgUJKEDHylC6+nqOk7bUq6svPBwtclQCFFaloR4F
q/+kna1EkBViIjQHCebPVWbalB2pqqfM7neo25IjQPjx04uPJbmx52Yt0wvD
U7ODsPjkc5rgAdWswGsrCUTGYXBfLw/fI48eR5A2P09S52lZBLbzouy1eY/s
XEdTCPyFBbDJjF/Vz/lFXoU7ScHAgHgor8y0lbFnBDM5CLUpfsw7435oF9xZ
Pg+vuAvxswAbjDwCbgd9rdpH59MIs4a79sT6cb9HJc6tImQXkRmlEbFtkR5/
PTPYJp/RNtEt0hePP/vs3+uyIWHCWIA0c2h+DToK33FpLGLKNE2G1Rpu9jEj
i2KefTU4M8DRCsD/pyGMyODEpQnm3D6++LT46uufihfXrwoEDnOmJpLny7Ab
LJzq3GvwPdjc/KGaf1mBrx7EHzAvybi17spyIu9oohkIujIOrjc3eTvsvAtz
08KbFgKjTZfz3DvUX0o9VL0rQMxzxL3Q43FLKJ2DPaQE7KEm1OQx7XaGOrHJ
Ye0k1Qnpr/SWHsJpycxefbKlbyU2o3varo22ATfMFUh6sgIyASxSnPSIc55C
pdkXQoys6iZokmd5mGSVTgcbm4IKKZRzAIn5hpbkq31dRRJulYBxfhWJvTxc
RBJep3zmkPSddHJgW03A7XUIO/0Ri5Y0a2LyWmOprrrREfN3mXgAOIgmAcrO
N6GnruMYeS9J3wAw33wpIZ8tE6c6r5UQVWaq2mbs9fUcTjcj7E33sTjSMgo6
extGe0ZsnnNVZ7zwOnvDTYgQF92awtkL/eqtGI+FelxOEYH2XOVZMAj3sdGh
RhT+ME/+8PPPtNljfSU4hd2QmCd0Qhznsm6tTupvjeAc05GbL7aVtKsSW4VJ
UyVLPeYZOTcLq+Su30hH08BfSJpkHf9kIcw+ebdHFZXjIsFEa9tr4AyXA8Nw
1qxgckRg07LjEqxafZa5cWnxxagO3rz3qaI39YujGiOTS+gHLCRVNUlfi/E6
+PQ7K3aE8nlnQfVPNQvlDx5PvdWfIU3v3FINKMhoW2xucB6gS1BOsjdEitIc
9fsw5gFi9IcCgLixnghqPhz0TTcK9YNcnrfrtZcmpUX0qd3i7T1IgOpHT3Cc
8Hgk5CRzVipp+b4R/B449kDy5uxkXS+FYF6PaSK4rgMgl7PJg6ZJIa7pDYlo
ndn4Z9b9S9SMAO6Q4bUUuu7k1P0wFyIR6DBlZbbz5uzaFdETjXBvBRZp7ogB
GWeRMkmQ1QueR6DjCsX9e9u9FRtzCvqPRfLcUgEsVBHZL0Y6RpoaYNrofixo
zs58298rvSaEiIvtSfLRGCgdt4Vmnm534hHkrpo9YiyJVPYH7TjTlTf2VGlp
22CWstsJ39wiZcBWkJN0Sl9wCc2B+1osece+SjDuHDuMOovDRtO4b1gfHr1/
xyFVV2zKw7WTDIxoEDxdpejeMGuqimRALL6giCa3vDpV6YY38cK7Pa0kEp0R
HDeSst9AbNrJcBoM6dnWcUcgJbzz0pepnXaiKI2FNmMCfQLTuherbooc05Ol
aUkfriz1O6oXOaqbQQcC+v6uYh0hQPLxcAxae2t1t63Ul6H+xw0eCXY0bay7
7MySBfUvcB3DXDVKWGUe8lr47cQkZqos5amA261JufT0Gq7Uc2kTFT9ezSNF
IbRXMegm3GW9NbU6gH5im1doBmjZeVcJngf2Ak2lQHsk/yWswwwDtvK8tJRW
p6tFu7mkgKAyEcMg2CzIjul2es7jw3AxRYfD+zfXE6HXXZxFcUDgOvQaG5qN
ivomZZY2lok8tKZ2c/tVXBAOj+hh1IbdgpLKWLKgCOQcJz1ypixQdld84Edm
viLsI7EX4haADcMyEnn/on1j7tTMC8+XnaROOFSYSK7Sj7Upaz/eksEzDW00
N+Nw1v2KQInx+NoIhl0heIS8I6PpfWb6iK2IcCYG3bGkMRJl70GU9hiaJb6I
nu7cMKdNvdSKZZ7UWeYHsSWfxR00kqollavKzMho1/v2MDN+ci9x1FXRJoCe
OF9dwhborp7sUZprLyZIvVehz+8nXF4LKtDxRhQ3bg4hcaXzutt5UNwIVe8J
JC5vql0vrHA7DiEgfW4nXXwYcbGShWrrVf7umcWhC/t5tDsjRq3TKmw2k9Iz
9CwnYsY+a5oyrWGe2WDTZSU3ThsdSRKQa9dpfqPvz1KhSaoPMvkFk5lRBrYx
1zmCMrpKEQamU3LAv1mSw3Ya90TKNqVg5HlRkzUV6mbs2Iz3XAJKialzz/Il
VhDyULCbnuLC6vW1EDQ2qw4hiJiASQ02z0ZN2VWG/Z0VTn5jAjuVUk3Kv5Yy
ACLEiXHMsk+hZY/KTUJQan+5sZgJS4lQYPtI5x8u8nd1nR3F/Q7NrBAF149m
7icEUrSHp82RZP830gAvGZwKDgskizEdEtfblFSRu9f2/c4eyjlDtTHzhBj5
pvWeA16AQ2Q8nwmaQgdy3LBuzqV0sCnKoRxJrgyxbwR8Y/XoCsRPqBcecKFU
lHlrAJqj65oY4RnHYRoi1xhMjL9gTTn41Taa1bNzKaGtSApo+0I/LO/WpMvp
0e9lWzI2hSGICdg4vo2fqeIl23PjkhbLtYpBEe8fLzG0P8JTzF3K6/eQY6r0
MA59ekIzjaUijnqezutI6GVuSdvk7ogm6Ew+i5GnkdcyV8zj5yRWgmfFY9+s
vArYoBsY3qiRhpSKn519G/WpFApvuRNU4vpyVk6NWn4Rm5i8LUfCDRof0UOU
qoycMCX87Nmcmtxrxx3xUtalZA4E6QEvVAFpWzIteKsEqRO3OJgwMSQKwSze
fr8AhIb5Ucb2BI/lu6tXF9P+I2L1+8GQMJGNk6OiQ7ffbCSIbrZZYnxGmvH4
iWaQRhPUOFIy9fn8g21dLuZhTNiQyTkxx1IbLjPckffrewmYXXB93aQ5lYTj
E8hgDMhodu++LFc2ZNnRy7rdr3TRwBu/36VBM47w5Y0LDfXK64sNXtNnC5J8
BAWs2C0DJ072vQmXi8GGQGtBijCwKJtlPPijDRCnRjtPLWEb0YGwNpl8vfb0
GVmvhlJrDNdhQpJFFCczOXsCdOSeGWr6UZgLJqhNHGRjnZ8i+9qbsLcyS9LC
UjkhveJ0D6aTLs2SloYd/uURt1i04lGI8r4IggB2JWzgMQLzSUbegAe9khMx
RU+g7s5F8TI5AuloGX0fVz6MHPlsGi1xHo0zZiUQJaMynyFeibHUNtn58m40
ua5Z039glUxM34jUVDGmACTTbJFw6wdnqU+yORnZPmMoOYAB/2SuhnvycZp8
TLoKnJItRqKQdHERn9W8Pvff+EhaL9CxWHGHFfKHG0qNu/AyI/WLq2+ujvio
pS2wUfPdcF80ubL0VhDz+ZytPDzkamkNUIR8909PBB0aVv/zAw77P/j57Iz7
2eAwvJXQ3jqEFS8IR02ecuj7ZVjdVk05K56iRxT9WC3oh1dkrJbkjHxH39Ot
emiU53S0i+8C4rR1iY7SfOjo/H1JM0WKfEm/fH5bFl+VNSxgbdxyVcPSKL6m
rdwu38rvVDwrNRetfnin2Ncv2m5BAgokBmEQqf6sIssehca0qmRQ/aCwGUSS
1TEtl7EXDKwWB5PyYimcIc3o/6Dx76+ApaMPIXnYy/eVxWuaOkEsXQfa+2/2
nVfMcX0CSRUaUhfEJHgWFjTmtg4cpONCIaV7hcMY6nYXeSiS9b04+78BZWzN
g5NHAQA=

-->

</rfc>
