<?xml version="1.0" encoding="UTF-8"?>
  <?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
  <!-- generated by https://github.com/cabo/kramdown-rfc version  (Ruby 3.0.4) -->


<!DOCTYPE rfc  [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">

]>

<?rfc rfcedstyle="yes"?>
<?rfc tocindent="yes"?>
<?rfc strict="yes"?>
<?rfc comments="yes"?>
<?rfc inline="yes"?>
<?rfc text-list-symbols="-o*+"?>

<rfc ipr="trust200902" docName="draft-irtf-hrpc-association-11" category="info" tocInclude="true" sortRefs="true" symRefs="true">
  <front>
    <title abbrev="FoA">Internet Protocols and the Human Rights to Freedom of Association and Assembly</title>

    <author initials="N." surname="ten Oever" fullname="Niels ten Oever">
      <organization>University of Amsterdam</organization>
      <address>
        <email>mail@nielstenoever.net</email>
      </address>
    </author>
    <author initials="S." surname="Couture" fullname="Stéphane Couture">
      <organization>Université de Montréal</organization>
      <address>
        <email>stephane.couture@umontreal.ca</email>
      </address>
    </author>
    <author initials="M." surname="Knodel" fullname="Mallory Knodel">
      <organization>Center for Democracy &amp; Technology</organization>
      <address>
        <email>mknodel@cdt.org</email>
      </address>
    </author>

    <date year="2022" month="August" day="04"/>

    <area>IRTF</area>
    <workgroup>Human Rights Protocol Considerations Research Group</workgroup>
    <keyword>Internet-Draft</keyword>

    <abstract>


<t>This document explores whether there is a relation between the Internet architecture and the ability of people to exercise their rights to peaceful assembly and  association online. It does so by asking the question: what are the protocol development considerations for freedom of assembly and association? The Internet increasingly mediates our lives, our relationships, and our ability to exercise our human rights. As a global assemblage, the Internet provides a public space, yet it is predominantly built on private infrastructure. Since Internet protocols and architecture play a central role in the management, development, and use of the Internet, we analyze the relation between protocols, architecture, and the rights to assemble and associate to mitigate infringements on those rights. This document concludes that the way in which infrastructure is designed and implemented impacts people’s ability to exercise their freedom of assembly and association. It is therefore recommended that the the potential impacts of Internet technologies should be assessed, reflecting recommendations of various UN bodies and norms. Finally, the document considers both the limitations on changing association and impact of "forced association" in the context of online platforms.</t>



    </abstract>



  </front>

  <middle>


<section anchor="introduction"><name>Introduction</name>

<figure><artwork><![CDATA[
    We shape our tools and, thereafter, our tools shape us. 

         - John Culkin (1967)

    Article 21 of the Covenant protects peaceful assemblies wherever 
    they take place: outdoors, indoors and online; in public and 
    private spaces; or a combination thereof.

         - General Comment 37 of the Human Rights Committee (2020)

    In the digital age, the exercise of the rights of peaceful 
    assembly and association has become largely dependent on business 
    enterprises, whose legal obligations, policies, technical 
    standards, financial models and algorithms can affect these 
    freedoms.

         - Annual Report to the UN Human Rights Council by the Special
         Rapporteur on the rights to freedom of peaceful assembly and 
         of association (2019).

]]></artwork></figure>

<t>The current draft continues the work started in “Research into Human Rights Protocol Considerations” <xref target="RFC8280"/> by investigating the impact of Internet protocols on a specific set of human rights, namely the right to peaceful assembly and the right to association. Taking into consideration the international human rights framework, the present document seeks to deepen the relationship between these human rights and Internet architecture, protocols, and standards. In that way, we continue the work of the Human Rights Protocol Consideration Research Group, as laid out in its charter,  “to expose the relation between protocols and human rights, with a focus on the rights to freedom of expression and freedom of assembly” <xref target="HRPC-charter"/>.</t>

</section>
<section anchor="vocabulary-used"><name>Vocabulary used</name>

<dl>
  <dt>Architecture</dt>
  <dd>
    <t>The design of a structure</t>
  </dd>
  <dt>Autonomous System (AS)</dt>
  <dd>
    <t>Autonomous Systems are the unit of routing policy in the modern world of exterior routing <xref target="RFC1930"/>.</t>
  </dd>
  <dt/>
  <dd>
    <t>Within the Internet, an autonomous system (AS) is a collection of connected Internet Protocol (IP) routing prefixes under the control of one or more network operators on behalf of a single administrative entity or domain that presents a common, clearly defined routing policy to the Internet <xref target="RFC1930"/>.</t>
  </dd>
  <dt/>
  <dd>
    <t>The classic definition of an Autonomous System is a set of routers under a single technical administration, using an interior gateway protocol and common metrics to route packets within the AS and using an exterior gateway protocol to route packets to other ASs
<xref target="RFC1771"/>.</t>
  </dd>
  <dt>Border Gateway Protocol (BGP)</dt>
  <dd>
    <t>An inter-Autonomous System routing protocol <xref target="RFC4271"/>.</t>
  </dd>
  <dt>Connectivity</dt>
  <dd>
    <t>The extent to which a device or network is able to reach other devices or networks to exchange data. The Internet is the tool for providing global connectivity <xref target="RFC1958"/>. Different types of connectivity are further specified in <xref target="RFC4084"/>. The combination of the end-to-end principle, interoperability, distributed architecture, resilience, reliability and robustness are the enabling factors that result in connectivity to and on the Internet.</t>
  </dd>
  <dt>Decentralization</dt>
  <dd>
    <t>Implementation or deployment of standards, protocols or systems without one single point of control.</t>
  </dd>
  <dt>Distributed system</dt>
  <dd>
    <t>A system with multiple components that have their behavior co-ordinated via message passing. These components are usually
spatially separated and communicate using a network, and may be managed by a single root of trust or authority <xref target="Troncosoetal"/>.</t>
  </dd>
  <dt>Infrastructure</dt>
  <dd>
    <t>Underlying basis or structure for a functioning society, organization or community. Because infrastructure is a precondition
for other activities it has a procedural, rather than static, nature due to its social and cultural embeddedness <xref target="PipekWulf"/>
<xref target="Bloketal"/>. This means that infrastructure is always relational: infrastructure always develops in relation to something or someone <xref target="Bowker"/>.</t>
  </dd>
  <dt>Internet</dt>
  <dd>
    <t>The Network of networks, that consists of Autonomous Systems that are connected through the Internet Protocol (IP).</t>
  </dd>
  <dt/>
  <dd>
    <t>A persistent socio-technical system over which services are delivered <xref target="Mainwaringetal"/>,</t>
  </dd>
  <dt/>
  <dd>
    <t>A techno-social assemblage of devices, users, sensors, networks, routers, governance, administrators, operators and protocols</t>
  </dd>
  <dt/>
  <dd>
    <t>An emergent-process-driven thing that is born from the collections of the ASes that happen to be gathered together at any given time. The fact that they tend to interact at any given time means it is an emergent property that happens because they use the protocols defined at IETF.</t>
  </dd>
  <dt>Right to peaceful assembly</dt>
  <dd>
    <t>"The right of peaceful assembly protects the non-violent gathering by persons for specific purposes, principally expressive ones. It constitutes an individual right that is exercised collectively. Inherent to the right is thus an associative element." <xref target="UNGC37"/></t>
  </dd>
  <dt>Right to association</dt>
  <dd>
    <t>'The right and freedom of association encompasses both an individual's right to join or leave groups voluntarily, the right of the group to take collective action to pursue the interests of its members, and the right of an association to accept or decline membership based on certain criteria.' <xref target="FoAdef"/></t>
  </dd>
</dl>

</section>
<section anchor="research-question"><name>Research question</name>

<t>The research question of this document is: what are the protocol development considerations for freedom of assembly and association?</t>

</section>
<section anchor="methodology"><name>Methodology</name>

<t>In this document, we deepen our exploration of human rights and protocols by assessing one specific set of human rights: freedom of association and assembly, abbreviated here as FAA. Our methodology for doing so is the following: first, we provide a brief twofold literature review addressing the philosophical and legal definitions of FAA and how this right has already been interpreted or analyzed in the digital context. This literature review is not exhaustive but aims at providing some lines of questioning that could later be used for protocol development. Second, we look at some cases of Internet protocols that are relevant to the sub-questions highlighted in the literature review and analyze how these protocols facilitate or inhibit the right to peaceful assembly and association.</t>

</section>
<section anchor="literature-review"><name>Literature Review</name>

<section anchor="faa-definition-and-core-treaties"><name>FAA definition and core treaties</name>

<t>The rights to peaceful assembly and the freedom of association are defined and guaranteed in national law and international treaties; however, in this document we limit outselves to international treaties. Article 20 of the Universal Declaration of Human Rights <xref target="UDHR"/> states that “Everyone has the right to freedom of peaceful assembly and association” and that “No one may be compelled to belong to an association”. Article 23 further guarantees that “Everyone has the right to form and to join trade unions for the protection of his interests”. In the International Covenant on Civil and Political Rights <xref target="ICCPR"/>, article 21 stipulates that “The right of peaceful assembly shall be recognized” and that “No restrictions may be placed on the exercise of this right other than those imposed in conformity with the law and which are necessary in a democratic society in the interests of national security or public safety, public order (ordre public), the protection of public health or morals or the protection of the rights and freedoms of others” while article 22 states that “Everyone shall have the right to freedom of association with others, including the right to form and join trade unions”.</t>

<t>General Comment No. 37 on the right of peaceful assembly by the United Nations Human Rights Committee affirms that the right of peaceful assembly protects non-violent online gatherings: “associated activities that happen online or otherwise rely upon digital services [...] are also protected” <xref target="UNGC37"/>. Interference with emerging communications technologies that offer the opportunity to assemble either wholly or partly online or play an integral role in organizing, participating in and monitoring physical gatherings are assumed to impede assemblies which are protected by this right. Moreover, any restriction on the ‘operation of information dissemination systems’ must conform with the tests for restrictions on freedom of expression (see below).</t>

<t>Other treaties are sometimes cited as the source and framework to the right to freedom of association and assembly. An example of this is Article 5 of the International Convention on the Elimination of All Forms of Racial Discrimination <xref target="CERD"/> which stipulates freedom of peaceful assembly and association should be guaranteed “without discrimination as to race, colour, national or ethnic origin”; Article 15 of the Convention on the Rights of the Child <xref target="CRC"/> which recognises these rights for children with the restrictions cited above; and Article 21 of the Convention on the Rights of Persons with Disabilities <xref target="CRPD"/> which insists on usable and accessible formats and technologies appropriate for persons with different kinds of disabilities. The freedoms of peaceful assembly and association are also protected under regional human rights treaties: article 11 of the European Convention on Human Rights, articles 15 and 16 of the American Convention on Human Rights, and articles 10 and 11 of the African Charter on Human and Peoples’ Rights.</t>

<t>From a more philosophical perspective, Brownlee and Jenkins <xref target="Stanford"/> make some interesting distinctions in particular regarding the concepts of association, assembly and interaction, deviating somewhat from what is established in interpretations of international human rights law. "Interaction" refers to any kind of interpersonal and often incidental engagements in daily life, like encountering strangers on a bus. Interaction is seen as a prerequisite for association. According to Brownlee and Jenkins, "assembly" has a more political connotation and is often used to refer to activists, protesters, or members of a group in a deliberating event. The authors refer to association as more "persistent connections" and distinguish between intimate associations, like friendship, love, or family, and collective association like trade unions or commercial businesses, or “expressive associations” like civil rights organizations or LGBTQIA associations. For Brownlee and Jenkins <xref target="Stanford"/>, the right to association is linked to different relative freedoms: permission (to associate or dissociate), claim-right (to oppose others interfering with our conduct), power (to alter the status of our association), and immunity (from other people interfering in our right). Freedom of association thus refers both to the individual right to join or leave a group and to the collective right to form or dissolve a group.</t>

<t>Freedoms of association and peaceful assembly, however, are relative and not absolute. Excluding someone from an association based on their sex, race or other individual characteristic is also often contentious if not illegal. As mentioned above, international human rights law provides the framework for legitimate restrictions on these rights, as well as the right to privacy and the right to freedom of expression and opinion. Restrictions can be imposed by states, but only if this is lawful and proportionate. States must document how these limitations are necessary in the interests of national security or public safety, public order, the protection of public health or morals, or the protection of the rights and freedoms of others. Finally, states must also protect participants against possible abuses by non-state actors.</t>

<t>The Human Rights Committee explores a few restrictions of activities of free association online or activities of free association reliant upon digital services, that are also protected under article 21, and stipulates that “States parties must not, for example, block or hinder Internet connectivity in relation to peaceful assemblies.  The same applies to geotargeted or technology-specific interference with connectivity or access to content.” Additionally, “States should ensure that the activities of Internet service providers and intermediaries do not unduly restrict assemblies or the privacy of assembly participants.” <xref target="UNGC37"/>.</t>

<t>Interpreting international law, the right to freedom of peaceful assembly and the right to freedom of association protects any collective, gathered either permanently or temporarily for peaceful purposes, online and offline. It is important to underline the property of “freedom” because the right to freedom of association and assembly is voluntary and uncoerced: anyone can join or leave a group of choice, which in turn means one should not be forced to either join, stay or leave. In other words, free association means that only the association of people itself determines who can be a member. An assembly is an "intentional and temporary gathering of a collective in a private or public space for a specific purpose: demonstrations, indoor meetings, strikes, processions, rallies, or even sits-in" <xref target="UNGA"/>. Association has a more formal and established nature and refer to a group of individuals or legal entities brought together in order to collectively act, express, promote, pursue, or defend a field of common interests <xref target="UNSRFOAA2012"/>. Think about civil society organizations, clubs, cooperatives, NGOs, religious associations, political parties, trade unions, or foundations.</t>

<t>When talking about the human right of freedom of association and assembly, one should always take into account that "all human rights are indivisible, interrelated, unalienable, universal, and mutually reinforcing" <xref target="ViennaDeclaration"/>. This means that in the analysis of the impact of a certain variable on freedom of association and assembly one should take other human rights into account too. When devising an approach to mitigate a possible negative influence on this right, one should also always take into account the possible impact this might have on other rights. For example, the following rights are often impacted in conjunction with freedom of association and assembly: the right to political participation, the right to privacy, the right to freedom of expression, and the right to access to information. For instance, when the right to political participation is hampered, this often happens in conjunction with a limitation of the freedom of association and assembly because political participation is often done collectively. When the right to privacy is hampered, this privacy of particular groups is also impacted (so-called ‘group privacy’ <xref target="Loi"/>), which potentially has consequences for the right to association and assembly. Where the freedom of expression of a group is hampered, such as in protests or through Internet shutdowns, this both hampers other people’s ability to receive the information of the group and impacts the right to assembly of the people who seek to express themselves as a group <xref target="Nyokabi"/>.</t>

<t>Finally, if the right to association and assembly is limited by national law, this does not mean it is consistent with international human rights law. In such a case, the national law would therefore not be legitimate <xref target="Glasius"/>.</t>

</section>
<section anchor="faa-in-the-digital-era"><name>FAA in the digital era</name>

<t>The United Nations Human Rights Council adopted resolutions on the promotion, protection and enjoyment of human rights on the Internet in 2012, 2014, 2016 and 2018, affirming and reaffirming  "that the same rights that people have offline must also be protected online" <xref target="UNHRC2018"/>. Therefore the digital environment is no exception to application of the right of freedom of association. Various other resolutions and reports have established the online applicability of the freedoms of association and assembly, most recently and authoritatively the Human Rights Committee in General Comment 37 (2020)<xref target="UNGC37"/>. The questions that remain are how these rights should be conceptualized and implemented in different parts and levels of digital environments.</t>

<t>The right to freedom of assembly and association online is the subject of increasing discussions and analysis. Especially since social media played an important role in several revolutions in 2011, there have been increasing and ever more sophisticated attacks by autocratic governments on online communities and other associational activities occurring on the Internet <xref target="RutzenZenn"/>. In 2016, the Council of Europe published the “Report by the Committee of experts on cross-border flow of Internet traffic and Internet freedom on Freedom of assembly and association on the Internet” <xref target="CoE"/> which noted that while the Internet and communication technologies are not explicitly mentioned in international treaties, these treaties nevertheless apply to “the online environment”. The report argues that the “Internet is the public sphere of the 21st century”, demonstrated by the fact that informal associations can be gathered at scale in a matter of hours on the Internet, and that digital communication tools often serve to facilitate, publicize or otherwise enable associations or assemblies in person, like a protest or demonstration. The report notes, on the other hand, the negative ways in which the Internet can also be used to promote or facilitate terrorism, violence and hate speech, thus insisting on the “extremely important and urgent” need to fight online terrorist activities such as recruitment or mobilization, while at the same time respecting the right to peaceful assembly and association of other users. The report mentions the following examples that could further our reflection:</t>

<t><list style="symbols">
  <t>network shutdowns during the Arab Spring, to prevent people from organising themselves or assembling</t>
  <t>California’s Bay Area Rapid Transit (BART) shutdown of mobile phone service, to prevent potential property destruction by protesters and disruption of service</t>
  <t>the wholesale blocking of Google as a violation of freedom of expression</t>
  <t>the telecom company Telus's blocking of customers’ access to websites critical of Telus during a Telecommunications Workers Union strike against it</t>
  <t>the targeting of social media users who call for or organise protests though the Internet in Turkey’s Gezi Park protests</t>
  <t>mass surveillance or other interferences with privacy in the context of law enforcement and national security</t>
  <t>use of VPNs (Virtual Private Networks) and the Tor network to ensure anonymity</t>
  <t>Distributed Denial of Service attacks (DDoS) as civil disobedience.</t>
</list></t>

<t>In 2019 a UN Special Rapporteur noted the opportunities and challenges posed by digital networks to the rights to freedom of peaceful assembly and of association <xref target="UNSRFAA2019"/>. The report recommends that international human rights norms and principles should be used as a framework “that guides digital technology companies’ design, control and governance of digital technologies”. The report states that “technical standards” in particular can affect the freedom of association and assembly, and makes some relevant recommendations, including:</t>

<t><list style="symbols">
  <t>"[Undertake] human rights impact assessments which incorporate the rights to freedom of peaceful assembly and of association when developing or modifying their products and services,”</t>
  <t>“increase the quality of participation in and implementation of existing multi-stakeholder initiatives,”</t>
  <t>“collaborate with governments and civil society to develop technology that promotes and strengthens human rights,”</t>
  <t>“support the research and development of appropriate technological solutions to online harassment, disinformation and propaganda, including tools to detect and identify State-linked accounts and bots,” and</t>
  <t>“adopt monitoring indicators that include specific concerns related to freedom of peaceful assembly and association.”</t>
</list></t>

<t>In one of their “training kits” <xref target="APCtraining"/>, the Association of Progressive Communications addressed different impacts of the internet on association and assembly and raised three particular issues worthy to note here:</t>

<t><list style="numbers">
  <t>Organization of protests. Internet and social media are enablers of protests, such as it was seen in the “Arab Spring”. Some of these protests - like online petitions or campaigns - are similar to offline association and assembly, but other protest forms are inherent to the Internet. Hacking and DDoS are subject to controversy within the Internet community: some finding them legitimate acts of protest, and others not.</t>
  <t>Surveillance. While the Internet facilitates association, that association in turn leaves many traces that can be used for law enforcement or for repression of political dissent. Even the threat of surveillance can deter association.</t>
  <t>Anonymity and pseudonymity. Anonymity and pseudonymity can be useful protection mechanisms for those who’d like to attend online assemblies without facing retribution. On the other hand, anonymity can be used to harm society, such as in online fraud or sexual predation.</t>
</list></t>

<t>Online association and assembly are the starting point of civic mass mobilization in modern democracies, and even more so where physical gatherings have been impossible or dangerous <xref target="APC"/>. Throughout the world - from the Arab Spring to Latin American student movements and the #WomensMarch - the Internet has played a crucial role by providing means for the fast dissemination of information otherwise mediated by the press, or even forbidden by the government <xref target="Pensado"/>. According to Hussain and Howard the Internet helped “build solidarity networks and identification of collective identities and goals, extend the range of local coverage to international broadcast networks” and served as a platform for contestation of “the future of civil society and information infrastructure” <xref target="HussainHoward"/>. The IETF itself, defined as an "open global community" of network designers, operators, vendors, and researchers <xref target="RFC3233"/> is also protected by freedom of assembly and association. Discussions, comments and consensus around RFCs are possible because of the collective expression that freedom of association and assembly allow. The very word “protocol” found its way into the language of computer networking based on the need for collective agreement among a group of assembled network users <xref target="HafnerandLyon"/>.</t>

<t><xref target="RFC8280"/> discusses issues of FAA, specifically:</t>

<t><list style="symbols">
  <t>The expansion of DNS as an enabler of association for minorities. The document argues that the expansion of the DNS to allow for new generic Top Level Domains (gTLDs) can have negative impacts on freedom of association because of restrictive policies by some registries and registrars. On the other hand, gTLDs could also enable communities to build clearly identifiable spaces for association (such as .gay).</t>
  <t>The impact of Distributed Denial of Service attacks on freedom of association. Whereas DDoS has been used as a tool for protest, in many cases this is infringing on other parties freedom of expression. Furthermore,  often devices (such as IoT devices and routers) are inscribed in such DDoS attacks without the owner's or user's consent. Thus they do not have the possibility to exit this assembly. Therefore the document concluded that the IETF ”should try to ensure that their protocols cannot be used for DDoS attacks”.</t>
  <t>The impact of middleboxes on the ability of users to connect to the Internet. Lack of connectivity can significantly impact freedom of assembly and association. In particular, if the user cannot retrieve the reason for their inability to connect, there may not be access to due process to dispute the lack of (secure or private) connectivity, either in general or to a specific service.</t>
</list></t>

<t>In June 2020, the United Nations High Commissioner for Human Rights concluded that technologies can be enablers of the excercise of FAA, but technology is also significantly used to interfere with those rights. Specifically, the report mentions network shutdowns and the use of technology to surveil or crack down on protesters, leading to human rights violations. This includes facial recognition technology, among other ways to violate the (group) privacy of people engaged in an assembly or association. The report makes it explicit that companies play a significant role, by developing, providing or selling the technology, but also by directly causing these violations <xref target="UNHRC2020"/>.</t>

</section>
<section anchor="specific-questions-raised-from-the-literature-review"><name>Specific questions raised from the literature review</name>

<t>Here are some questions raised from the literature review that can have implications for protocol design:</t>

<t><list style="numbers">
  <t>Should protocols be designed to enable legitimate limitations on association in the interests of “national security or public safety, public order (ordre public), the protection of public health or morals or the protection of the rights and freedoms of others”, as stated in the ICCPR article 21 <xref target="ICCPR"/>? Where in the stack do we care for FAA?</t>
  <t>Can protocols facilitate agency of membership in associations, assemblies and interactions?</t>
  <t>What are the features of protocols that enable freedom of association and assembly?</t>
  <t>Does protocol development sufficiently consider usable and accessible formats and technologies appropriate for all persons, including those with different kinds of abilities?</t>
  <t>Can a protocol be designed to legitimately exclude someone from an association?</t>
</list></t>

<t>In the following sections we attempt to answer these questions with specific examples of standardized protocols in the IETF.</t>

</section>
</section>
<section anchor="analysis"><name>Analysis</name>

<t>As the Internet mediates collective action and collaboration, it impacts on freedom of association and assembly. To answer our research question regarding how internet architecture enables and/or inhibits such human rights, we researched several independent and typical cases related to protocols that have been either adopted by the IETF, or are widely used on the Internet.  Our goal is to determine how they facilitate freedom of assembly and association, or how they inhibit it through their design or implementation.</t>

<t>We are aware that some of the following examples go beyond the use of Internet protocols and flow over into the application layer or examples in the offline world whereas the purpose of the current document is to break down the relationship between Internet protocols and the right to freedom of assembly and association. Nonetheless, we do recognize that in some cases the line between them and applications, implementations, policies and offline realities are often blurred and hard -if not impossible- to differentiate.</t>

<t>We use the literature review to guide our process of inquiry for each case, and to dive deeper in what can be found interesting about each case as it relates to freedom of association.</t>

<section anchor="got-no-peace-spam-and-ddos"><name>Got No Peace: Spam and DDoS</name>
<figure><artwork><![CDATA[
Should protocols be designed to enable legitimate limitations on 
association in the interests of “national security or public safety, 
public order (ordre public), the protection of public health or morals 
or the protection of the rights and freedoms of others”, as stated in 
the ICCPR article 21 {{ICCPR}}? Where in the stack do we care for FAA?
]]></artwork></figure>

<t>The 2020 report by the United Nations Special Rapporteur on Human Rights <xref target="UNHRC2020"/> described how technology is often used to limit freedom of assembly and association, such as through network shutdowns and the surveillance of groups. Because access to the Internet is crucial not only for freedom of association and assembly, but also for the right to development, and the right to freedom of expression and information <xref target="Nyokabi"/>, the United Nation Special Rapporteur advises to:</t>

<figure><artwork><![CDATA[
(b) Avoid resorting to disruptions and shutdowns of Internet or 
telecommunications networks at all times and particularly during 
assemblies, including those taking place in electoral contexts 
and during times of unrest;
]]></artwork></figure>

<t>Whereas states have an obligation to protect human rights, there has been an increasing call for non-state actors, such as companies, also to respect human rights <xref target="UNGPBHR"/>. The UN adopted guiding principles on business and human rights <xref target="UNGPBHR"/> and talks within the HRC are ongoing about an international legally binding instrument to regulate the activities of transnational corporations and other business enterprises. This includes a chain-responsibility of actors: not only that the company’s own processes should not negatively impact human rights, but also that the company should also engage in due diligence processes, such as human rights impact assessments. This includes an assessment of whether the products that are sold, or the services that are provided, can be used to engage in human rights violations, or whether human rights violations occur in any stage of the supply chain of the company. If this is the case, measures should be taken to mitigate this.</t>

<t>In the case of dual-use technologies, where technology could be used for legitimate purposes, but could also be used to limit freedom of association or assembly, this obligation might mean that producers or sellers should limit the parties they sell to, or even better, ensure that the illegitimate use of the technology is not technically possible anymore, or made more difficult.</t>

<section anchor="spam"><name>Spam</name>

<t>In the 1990s as the Internet became more widely adopted, spam came to be defined as irrelevant or unsolicited messages that were posted many times to multiple news groups or mailing lists <xref target="Marcus"/>. Here the question of consent, but also harm, are crucial. In the 2000s a significant part of the technical and policy debate on spam revolved around the fact that certain corporations, protected by the right to freedom of expression, considered spam to be a form of "commercial speech", thus encompassed by free expression rights <xref target="Marcus"/>. Yet spam can be not only a nuisance, but a threat to systems and users.</t>

<t>This leaves us with an interesting case around spam mitigation: spam is currently handled mostly by mail providers on behalf of the user. Next to that, countries are increasingly adopting regulatory opt-in regimes for mailing lists and commercial e-mail, with a possibility of serious fines in case of violation. Yet many ask: is spam not the equivalent of the fliers and handbills ever present in our offline world? The big difference between the proliferation of such messages offline and online is the scale. It is not hard for a single person to message a lot of people online, whereas if that person needed to go house by house the impact of their efforts would be much smaller. Conversely, if it were a common practice to expose people to unlimited unwanted messages online, users would be drowned in such messages. This puts a large burden on filtering, and in sifting through many messages, other expressions would be drowned out and would be severely hampered.  Allowing unlimited sending of unsolicited messages would be a blow against freedom of speech: when everyone talks, nobody can hear.</t>

<t>Whereas one could perhaps consider singular instances in which spam could be proportional, legitimate uses of online campaigning, or online protesting, would be drowned out by other spam. Furthermore, the individual receiving the spam never consented to receiving it. Finally, the widespread usage of spam constitutes an attack on the internet infrastructure in terms of mailservers, bandwidth, and inboxes. This in turn thus hamper the freedom of association and assembly that is happening in and is facilitated through the internet infrastructure. Finally, spam leads to spam filtering by users and mail providers on behalf of the user, this in turn might lead to the blocking of messages that a user would consent to, but that get caught in the filter.</t>

</section>
<section anchor="ddos"><name>DDoS</name>

<t>Distributed Denial of Service attacks are leveled against a server or service by a controller of multiple hosts by overloading the server or service’s bandwidth or resources (volume-based floods) or exploiting protocol behaviours (protocol attacks). DDoS attacks can thus stifle the right to assemble online for organisations whose websites are targeted. At the same time there are comparisons made between DDoS attacks and sit-in protests <xref target="Sauter"/>. However the main distinction is significant: only a small fragment of “participants” (from controllers to compromised device owners) in DDoS attacks are aware or willing <xref target="RFC8280"/>. Notably, DDoS attacks are increasingly used to commit crimes such as extortion, which infringe on others’ human rights.</t>

<t>Because of the interrelation of technologies, it cannot be said that there is one point in the technical stack where one can locate the characteristics of “peaceful” or “non-peaceful” association visible to protocol developers. In the cases of spam blocking and DDoS mitigation, “peaceful or non-peaceful” is not a meaningful heuristic, or even characteristic, of problematic content. Their commonalities are their volume, and the unrequested nature of particpation in DDoS and the receiving of spam. One could say that the 'receivers' of demonstrations did not ask for it either, but in the case of spam the receivers are generally a larger group than one particular target, else the spam could be described as a DDoS attack against one target. This allows us to draw the conclusion that DDoS and spam are not examples of freedom of association or assembly.</t>

</section>
</section>
<section anchor="holistic-agency-mailing-lists-and-spam"><name>Holistic Agency: Mailing Lists and Spam</name>

<figure><artwork><![CDATA[
Can protocols facilitate agency of membership in associations, 
assemblies and interactions?
]]></artwork></figure>

<section anchor="mailing-lists"><name>Mailing lists</name>

<t>Since the beginning of the Internet mailing lists have been a key site of assembly and association <xref target="RFC0155"/> <xref target="RFC1211"/>. In fact, mailing lists were one of the Internet’s first functionalities <xref target="HafnerandLyon"/>.</t>

<t>In 1971 four years after the invention of email, the first mailing list was created to talk about the idea of using Arpanet for discussion. What had initially propelled the Arpanet project forward as a resource sharing platform was gradually replaced by the idea of a network as a means of bringing people together <xref target="Abbate"/>. More than 45 years later, mailing lists are pervasive and help communities to engage, have discussions, share information, ask questions, and build ties. Even as social media and discussion forums grow, mailing lists continue to be widely used <xref target="AckermannKargerZhang"/> and are still a crucial tool to organise groups and individuals around themes and causes <xref target="APC3"/>.</t>

<t>Mailing lists’ pervasive use are partly explained because they allow for free and low-cost association: people subscribe (join) and unsubscribe (leave) as they please, another example that explains their wide use is that email functions on low bandwith connections and across platforms. Mailing lists also allow for association of specific groups on closed lists. This enables agency of membership, a key component of freedom of association and assembly.</t>

<t>As we mentioned before, there are interesting implications for freedom of association and assembly when looking at spam mitigation. Here we want to specifically note that if we consider that the rights to assembly and association also mean that "no one may be compelled to belong to an association" <xref target="UDHR"/>, spam infringes both rights if an opt-out mechanism is not provided and people are obliged to receive unwanted information, or be reached by people they do not wish to be in contact with.</t>

</section>
</section>
<section anchor="civics-in-cyberspace-messaging-conferencing-and-networking"><name>Civics in Cyberspace: Messaging, Conferencing, and Networking</name>

<figure><artwork><![CDATA[
What are the features of protocols that enable freedom of 
association and assembly?
]]></artwork></figure>

<t>Civic participation is often expressed as the freedom to associate and assemble, along with other enabling rights such as freedom of expression and the right to privacy. Former UN Special Rapporteur David Kaye established a strong relationship between technology that allows anonymity and uses encryption with positive effects on freedom of expression <xref target="Kaye"/>. Here we look at messaging, including email, mailing lists and internet relay chat; video conferencing; and peer-to-peer networking protocols to investigate the common features that enable freedom of association and assembly online.</t>

<section anchor="email"><name>Email</name>

<t>Email was one of the first applications of the early Internet that showed what the architecture was really capable of, namely allowing people to exchange messages much faster and much cheaper than communication networks could do before. This enabled many collaborations among academics and other users of the early network, showcasing the importance of email in the forming of assemblies and associations. Whereas many messaging solutions have been invented since email, it is still widely used because of its distributed architecture, reliability, and ability to function on a wide range of devices and platforms.</t>

</section>
<section anchor="mailing-lists-1"><name>Mailing lists</name>

<t>Not only are mailing lists a good example of how protocols can facilitate the necessary ingredient of agency in freedom of association, we can see how particular features of mailing lists that enable freedom of association and assembly.</t>

<t>The archival function of mailing lists allows for posterior accountability and analysis.</t>

<t>The ubiquity and interoperability of email, and by extension mailing lists, provides a low barrier to entry to an inclusive medium.</t>

<t>Association and assembly online can be undermined when right to privacy is at risk. One downside of mailing lists are the privacy and security concerns generally associated with email. End-to-end encryption with OpenPGP <xref target="RFC4880"/> and S​/​MIME <xref target="RFC5751"/> can keep email communications authenticated and confidential if properly configured, deployed and used, but users often do not have those protections. And with mailing lists, this protection is not typically possible, because with many lists the final recipients are not known to the sender. There have been experimental solutions to address this issue <xref target="Schleuder"/>, but this has not been standardized or widely deployed.</t>

</section>
<section anchor="irc"><name>IRC</name>

<t>Internet Relay Chat (IRC) is an application layer protocol that enables communication in the form of text through a client/server networking model <xref target="RFC2810"/>: a chat service. IRC clients are computer programs that a user can install on their system. These clients communicate with chat servers to transfer messages to other clients. Features of IRC include: federated design, transport encryption, one-to-many routing, creation of topic-based “channels”, and spam or abuse moderation.</t>

<t>For the purposes of civic participation and freedom of association and assembly in particular, it is critical that IRC’s federated design allows many interoperable, yet customisable, instances and basic assurance of confidentiality through transport encryption. IRC differs from email in the sense that it allows for real-time interaction, stimulating the sense of conversation. This allows people to organize, develop ideas as well as joint identities. This is strengthened through the federated nature of IRC, which gives users the ability to use and connect through different servers, contributing to freedom of association. We investigate the particular aspect of agency in membership through moderation in the section 'Block Together Now: IRC and Refusals' below.</t>

</section>
<section anchor="webrtc"><name>WebRTC</name>

<t>Multi-party video conferencing protocols like WebRTC <xref target="RFC6176"/> <xref target="RFC7118"/> allow for robust, bandwidth-adaptive, wideband and super-wideband video and audio discussions in groups. This facilites exchanges over the Internet in a similar manner to IRC, but including the usage of audio and video. WebRTC can be configured as direct peer-to-peer videochat without sending data through a central server. This ability to function without a central server is a strong facilitator of freedom of association and assembly.</t>

<t>However, WebRTC comes with many different configuration options, which can leave users open to unexpected privacy leakages:</t>

<figure><artwork><![CDATA[
‘The WebRTC protocol was designed to enable responsive real-time
communications over the Internet, and is instrumental in 
allowing streaming video and conferencing applications to run in 
the browser. In order to easily facilitate direct connections
between computers (bypassing the need for a central server to act 
as a gatekeeper), WebRTC provides functionality to automatically 
collect the local and public IP addresses of Internet users (ICE 
or STUN). These functions do not require consent from the user,
and can be instantiated by sites that a user visits without their 
awareness. The potential privacy implications of this aspect of 
WebRTC are well documented, and certain browsers have provided 
options to limit its behavior.’ 
]]></artwork></figure>

<t><xref target="AndersonGuarnieri"/></t>

<t>Even though some multi-party video conferencing tools facilitate freedom of assembly and association, their own configuration might might pose concrete risks for those who use them. On the one hand WebRTC is providing resilient channels of communications, but on the other hand it also exposes information about those who are using the tool which might lead to increased surveillance, identification and the consequences that might be derived from that. This is especially concerning because the usage of a VPN does not protect against the exposure of IP addresses <xref target="Crawford"/>.</t>

<t>The risk of surveillance is also exists in offline spaces, but this is generally slightly easier to analyze for the user. Security and privacy expectations of the user could be either improved or made explicit. This in turn would result in a more secure and/or private exercise of the right to freedom of assembly or association.</t>

</section>
<section anchor="peer-to-peer-networking"><name>Peer-to-peer networking</name>

<t>Since the ARPANET project, the original idea behind the Internet was conceived as what we would now call a peer-to-peer system <xref target="RFC0001"/>. Over time it has increasingly shifted towards a client/server model with “millions of consumer clients communicating with a relatively privileged set of servers” <xref target="NelsonHedlun"/>. However, the foundational networking protocol of the modern Internet, the Border Gateway Protocol <xref target="RFC1163"/> <xref target="RFC1164"/> <xref target="RFC4271"/>, still functions like original peer to peer network, with an extensive practice of peering and transit <xref target="MeierHahn2015"/>. For an example higher up the stack one could look at the peer-to-peer architecture of BitTorrent <xref target="RFC5694"/>.</t>

<t>At the organizational level, peer production is one of the most relevant innovations from Internet mediated social practices. According to <xref target="Benkler"/> these networks imply ‘open collaborative innovation and creation, performed by diverse, decentralized groups organized principally by neither price signals nor organizational hierarchy, harnessing heterogeneous motivations, and governed and managed based on principles other than the residual authority of ownership implemented through contract.’ <xref target="Benkler"/>.</t>

<t>In his book The Wealth of Networks, <xref target="Benkler2"/> significantly expands on his definition of commons-based peer production. In his view, what distinguishes commons-based production is that it doesn’t rely upon or propagate proprietary knowledge: “The inputs and outputs of the process are shared, freely or conditionally, in an institutional form that leaves them equally available for all to use as they choose at their individual discretion.” <xref target="Benkler2"/>. To ensure that the knowledge generated is available for free use, commons-based projects are often shared under an open license</t>

<t>Peer-to-peer (P2P) is essentially a model of how people interact in real life because “we deal directly with one another whenever we wish to” <xref target="Vu"/>. Usually if we need something we ask our peers, who in turn refer us to other peers. In this sense, the ideal definition of P2P is that “nodes are able to directly exchange resources and services between themselves without the need for centralized servers” where each participating node typically acts both as a server and as a client <xref target="Vu"/>. <xref target="RFC5694"/> has defined it as peers or nodes that should be able to communicate directly between themselves without passing intermediaries, and that the system should be self-organizing and have decentralized control <xref target="RFC5694"/>. With this in mind, the ultimate model of P2P is a completely decentralized system, which is more resistant to speech regulation, immune to single points of failure and has a higher performance and scalability. Nonetheless, in practice some P2P systems are supported by centralized servers and some others have hybrid models where nodes are organized into two layers: the upper tier servers and the lower tier common nodes <xref target="Vu"/>.</t>

<t>Whether for resource sharing or data sharing, P2P systems are enabling freedom of assembly and association. Not only do they allow for effective dissemination of information, but they leverage computing resources by diminishing costs allowing for the formation of open collectives at the network level. At the same time, in completely decentralized systems the nodes are autonomous and can join or leave the network as they want -a characteristic that makes the system unpredictable: a resource might be only sometimes available, and some other resources might be missing or incomplete <xref target="Vu"/>. Lack of information might in turn makes association or assembly more difficult.</t>

</section>
</section>
<section anchor="universal-access-the-web"><name>Universal Access: The Web</name>

<figure><artwork><![CDATA[
Does protocol development sufficiently consider usable and accessible 
formats and technologies appropriate for persons with different kinds 
of abilities?
]]></artwork></figure>

<section anchor="accessiblity"><name>Accessiblity</name>

<t>The W3C has done significant work to ensure that the Web is accessible to people with diverse physical abilities <xref target="W3C"/>. For example, the implementation of these accessibility standards help people who have issues with seeing or rendering images to understand what the image depicts. Making the Web more accessible for people with diverse physical abilities enables them to exercise their right to online assembly and association. While there are accessibility standards implemented for the Web, this is less the case for the Internet.</t>

</section>
<section anchor="internationalization"><name>Internationalization</name>

<t>The IETF uses English as its primary working language, both in its documentation and in its communication. This is also the case for reference implementations. It is estimated that roughly 20% of the Earth’s population speaks English, whereas only 360 million speak English as their first language. <xref target="RFC2277"/> describes that ‘"Internationalization is for humans. This means that protocols are not subject to internationalization; text strings are.", this implies that protocol developers, as well as people that work with protocols, are not people, or that protocol developers all speak English. This means that it is significantly easier for people who have a command of the English language to become a protocol developer. It could lead to a divergence, with the development of separate protocols that are developed within large language communities that don't use English language or Latin script. This makes it harder for people who seek to shape their own space of association and assembly on the Internet to do so. And is thus driving these communities into, often proprietary and non-interoperable services such as Facebook and Weibo where use of their own script is possible and supported.</t>

<t>When Ramsey Nasser developed the Arabic programming language قلب (transliterated Qalb, Qlb and Alb) <xref target="Nasser"/> he called it ‘engineering performance art’ instead of engineering, because he knew that his language would not work. In part this is because all modern programming tools are based on the ASCII character set, which encodes Latin characters and was based on the English language. This highlights cultural biases of computer science and engineering. Despite long significant efforts, it is still largely impossible to register an email address in a language such as Devanagari, Arabic, or Chinese. Even if it is possible, it is to be expected that there will be a significant failure rate in sending and receiving emails to and from other services. This makes it harder for people who do not speak English and/or don’t use the Latin script to exercise their freedom of association and assembly.</t>

</section>
</section>
<section anchor="block-together-now-irc-and-refusals"><name>Block Together Now: IRC and Refusals</name>

<figure><artwork><![CDATA[
Can a protocol be designed to legitimately exclude someone 
from an association?
]]></artwork></figure>

<t>Previously we spoke about the privacy protecting features of IRC that enable freedom of association and assembly, including transport security. But now we turn to the ability to block users and effectively moderate discussions on IRC as a key feature of the technology that enables agency in membership, a key aspect of freedom of association and assembly.</t>

<t>For order to be kept within the IRC network, special classes of users become “operators” and are allowed to perform general maintenance functions on the network: basic network tasks such as disconnecting (temporary or permanently) and reconnecting servers as needed <xref target="RFC2812"/>. One of the most controversial powers of operators is the ability to remove a user from the connected network by ‘force’, i.e., operators are able to close the connection between any client and server <xref target="RFC2812"/>.</t>

<t>Moderation and de-federation can be a tool to uphold freedom of association and assembly, because it allows groups to have control over their own make up. However, at the same time, these controls can also seriously hamper the ability of a group to get together. Some argue that the low cost of creating a new group is a protection against this, however, this could lead to a repetition of crises of moderation of membership and speech.</t>

<t>IRC servers may deploy different policies for the ability of users to create their own channels or ‘rooms’, and for the delegation of ‘operator’-rights in such spaces. Some IRC servers support SSL/TLS connections for security purposes <xref target="RFC7194"/> which helps stop the use of packet sniffer programs to obtain the passwords of IRC users and barring an ISP or government from knowing which user I am on IRC, but has little use beyond this scope due to the public nature of IRC channels. TLS connections require both client and server support (that may require the user to install TLS binaries and IRC client specific patches or modules on their computers). Some networks also use TLS for server to server connections, and provide a special channel flag (such as +S) to only allow TLS-connected users on the channel, while disallowing operator identification in clear text, to better utilize the advantages that TLS provides.</t>

</section>
</section>
<section anchor="conclusions-what-can-we-learn-from-these-case-studies"><name>Conclusions: What can we learn from these case studies?</name>

<t>Communities, collaboration and joint action lie at the heart of the Internet. Even at a linguistic level, the words "networks" and "associations" are closely related.  Both are groups and assemblies of people who depend on "links" and "relationships" <xref target="Swire"/>. Taking legal definitions given in international human rights law and related normative documents, we can easily conclude that the rights to freedom of assembly and association protect collective activity online. These rights protect gatherings by persons for a specific purpose and groups with a defined aim over time for a variety of peaceful, expressive and non-expressive purposes, if and when participation is voluntary and uncoerced.</t>

<t>Given that the Internet itself was originally designed as a medium of communication for machines that share resources with each other as equals <xref target="RFC0903"/>, the Internet is now one of the most basic infrastructures for assembly and association. Since Internet protocols and the Internet architecture play a central role in the management, development and use of the Internet, we established the relation between protocols and the right to freedom of assembly and association.</t>

<t>After reviewing several cases representative of FAA considerations inherent in protocols standardized at the IETF, we can conclude that the way in which infrastructure is designed and implemented impacts people's ability to exercise their freedom of assembly and association. This is because different technical designs come with different properties and characteristics. These properties and characteristics on the one hand enable people to assemble and associate, but on the other hand also add limiting, or even potentially endangering, characteristics. More often than not, this depends on the context. A clearly identified group for open communications, where messages are sent in cleartext and where people's persistent identities are visible, can help to facilitate an assembly and build trust, but in other contexts the same configuration could pose a significant danger. Endangering characteristics should be mitigated, or at least clearly communicated to the users of these technologies. It is therefore recommended that the the potential impacts of Internet technologies should be assessed, reflecting recommendations of various UN bodies and norms.</t>

<t>Lastly, the increasing shift towards closed and non-interoperable platforms in chat and social media networks have a significant impact on the distributed and open nature of the Internet. Often these non-interoperable platforms are built on open protocols but do not allow for interoperability or data portability. Future research could further investigate how the use of social media platforms has enabled groups to associate, but also how it rendered users unable to change platforms, therefore leading to a sort of “forced association” that inhibits people to fully exercise their freedom of assembly and association.</t>

</section>
<section anchor="acknowledgements"><name>Acknowledgements</name>

<t><list style="symbols">
  <t>Gisela Perez de Acha for co-authoring the first versions of this document</t>
  <t>Fred Baker and Jefsey for work on Internet definitions.</t>
  <t>Stephane Bortzmeyer, ICNL, and Lisa Vermeer for several concrete text suggestions that found their way in this document.</t>
  <t>Mark Perkins and Gurshabad for finding a lot of typos.</t>
  <t>Nick Doty, Gurshabad Grover, an anonymous reviewer, ICNL, Lisa Vermeer, and Sandra Braman for full reviews.</t>
  <t>The hrpc mailinglist at large for a very constructive discussion on a hard topic.</t>
</list></t>

</section>
<section anchor="work-space"><name>Work Space</name>

<t>Current work on this draft is happening at: https://github.com/IRTF-HRPC/draft-association
Pull requests and issues are welcome.</t>

</section>
<section anchor="security-considerations"><name>Security Considerations</name>

<t>As this draft concerns a research document, there are no security considerations.</t>

</section>
<section anchor="iana-considerations"><name>IANA Considerations</name>

<t>This document has no actions for IANA.</t>

</section>
<section anchor="research-group-information"><name>Research Group Information</name>

<t>The discussion list for the IRTF Human Rights Protocol Considerations Research Group is located at the e-mail address <eref target="mailto:hrpc@ietf.org">hrpc@ietf.org</eref>. Information on the group and information on how to
subscribe to the list is at <eref target="https://www.irtf.org/mailman/listinfo/hrpc">https://www.irtf.org/mailman/listinfo/hrpc</eref></t>

<t>Archives of the list can be found at:
<eref target="https://www.irtf.org/mail-archive/web/hrpc/current/index.html">https://www.irtf.org/mail-archive/web/hrpc/current/index.html</eref></t>

</section>


  </middle>

  <back>



    <references title='Informative References'>





<reference anchor='RFC0001' target='https://www.rfc-editor.org/info/rfc1'>
<front>
<title>Host Software</title>
<author fullname='S. Crocker' initials='S.' surname='Crocker'><organization/></author>
<date month='April' year='1969'/>
</front>
<seriesInfo name='RFC' value='1'/>
<seriesInfo name='DOI' value='10.17487/RFC0001'/>
</reference>



<reference anchor='RFC0155' target='https://www.rfc-editor.org/info/rfc155'>
<front>
<title>ARPA Network mailing lists</title>
<author fullname='J.B. North' initials='J.B.' surname='North'><organization/></author>
<date month='May' year='1971'/>
</front>
<seriesInfo name='RFC' value='155'/>
<seriesInfo name='DOI' value='10.17487/RFC0155'/>
</reference>



<reference anchor='RFC0903' target='https://www.rfc-editor.org/info/rfc903'>
<front>
<title>A Reverse Address Resolution Protocol</title>
<author fullname='R. Finlayson' initials='R.' surname='Finlayson'><organization/></author>
<author fullname='T. Mann' initials='T.' surname='Mann'><organization/></author>
<author fullname='J.C. Mogul' initials='J.C.' surname='Mogul'><organization/></author>
<author fullname='M. Theimer' initials='M.' surname='Theimer'><organization/></author>
<date month='June' year='1984'/>
<abstract><t>This RFC suggests a method for workstations to dynamically find their    protocol address (e.g., their Internet Address), when they know only    their hardware address (e.g., their attached physical network address).    This RFC specifies a proposed protocol for the ARPA Internet community,    and requests discussion and suggestions for improvements.</t></abstract>
</front>
<seriesInfo name='STD' value='38'/>
<seriesInfo name='RFC' value='903'/>
<seriesInfo name='DOI' value='10.17487/RFC0903'/>
</reference>



<reference anchor='RFC1163' target='https://www.rfc-editor.org/info/rfc1163'>
<front>
<title>Border Gateway Protocol (BGP)</title>
<author fullname='K. Lougheed' initials='K.' surname='Lougheed'><organization/></author>
<author fullname='Y. Rekhter' initials='Y.' surname='Rekhter'><organization/></author>
<date month='June' year='1990'/>
<abstract><t>This RFC, together with its companion RFC-1164, &quot;Application of the Border Gateway Protocol in the Internet&quot;, specify an inter-autonomous system routing protocol for the Internet.  [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name='RFC' value='1163'/>
<seriesInfo name='DOI' value='10.17487/RFC1163'/>
</reference>



<reference anchor='RFC1164' target='https://www.rfc-editor.org/info/rfc1164'>
<front>
<title>Application of the Border Gateway Protocol in the Internet</title>
<author fullname='J.C. Honig' initials='J.C.' surname='Honig'><organization/></author>
<author fullname='D. Katz' initials='D.' surname='Katz'><organization/></author>
<author fullname='M. Mathis' initials='M.' surname='Mathis'><organization/></author>
<author fullname='Y. Rekhter' initials='Y.' surname='Rekhter'><organization/></author>
<author fullname='J.Y. Yu' initials='J.Y.' surname='Yu'><organization/></author>
<date month='June' year='1990'/>
<abstract><t>This RFC, together with its companion RFC-1163, &quot;A Border Gateway Protocol (BGP)&quot;, specify an inter-autonomous system routing protocol for the Internet.  [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name='RFC' value='1164'/>
<seriesInfo name='DOI' value='10.17487/RFC1164'/>
</reference>



<reference anchor='RFC1211' target='https://www.rfc-editor.org/info/rfc1211'>
<front>
<title>Problems with the maintenance of large mailing lists</title>
<author fullname='A. Westine' initials='A.' surname='Westine'><organization/></author>
<author fullname='J. Postel' initials='J.' surname='Postel'><organization/></author>
<date month='March' year='1991'/>
<abstract><t>This RFC discusses problems with maintaining large mailing lists, especially the processing of error reports.  This memo provides information for the Internet community.  It does not specify an Internet standard.</t></abstract>
</front>
<seriesInfo name='RFC' value='1211'/>
<seriesInfo name='DOI' value='10.17487/RFC1211'/>
</reference>



<reference anchor='RFC1771' target='https://www.rfc-editor.org/info/rfc1771'>
<front>
<title>A Border Gateway Protocol 4 (BGP-4)</title>
<author fullname='Y. Rekhter' initials='Y.' surname='Rekhter'><organization/></author>
<author fullname='T. Li' initials='T.' surname='Li'><organization/></author>
<date month='March' year='1995'/>
<abstract><t>This document, together with its companion document, &quot;Application of the Border Gateway Protocol in the Internet&quot;, define an inter-autonomous system routing protocol for the Internet. [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name='RFC' value='1771'/>
<seriesInfo name='DOI' value='10.17487/RFC1771'/>
</reference>



<reference anchor='RFC1930' target='https://www.rfc-editor.org/info/rfc1930'>
<front>
<title>Guidelines for creation, selection, and registration of an Autonomous System (AS)</title>
<author fullname='J. Hawkinson' initials='J.' surname='Hawkinson'><organization/></author>
<author fullname='T. Bates' initials='T.' surname='Bates'><organization/></author>
<date month='March' year='1996'/>
<abstract><t>This memo discusses when it is appropriate to register and utilize an Autonomous System (AS), and lists criteria for such.  This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t></abstract>
</front>
<seriesInfo name='BCP' value='6'/>
<seriesInfo name='RFC' value='1930'/>
<seriesInfo name='DOI' value='10.17487/RFC1930'/>
</reference>



<reference anchor='RFC2277' target='https://www.rfc-editor.org/info/rfc2277'>
<front>
<title>IETF Policy on Character Sets and Languages</title>
<author fullname='H. Alvestrand' initials='H.' surname='Alvestrand'><organization/></author>
<date month='January' year='1998'/>
<abstract><t>This document is the current policies being applied by the Internet Engineering Steering Group (IESG) towards the standardization efforts in the Internet Engineering Task Force (IETF) in order to help Internet protocols fulfill these requirements.  This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t></abstract>
</front>
<seriesInfo name='BCP' value='18'/>
<seriesInfo name='RFC' value='2277'/>
<seriesInfo name='DOI' value='10.17487/RFC2277'/>
</reference>



<reference anchor='RFC2810' target='https://www.rfc-editor.org/info/rfc2810'>
<front>
<title>Internet Relay Chat: Architecture</title>
<author fullname='C. Kalt' initials='C.' surname='Kalt'><organization/></author>
<date month='April' year='2000'/>
<abstract><t>This document is an update describing the architecture of the current IRC protocol and the role of its different components.  Other documents describe in detail the protocol used between the various components defined here.  This memo provides information for the Internet community.</t></abstract>
</front>
<seriesInfo name='RFC' value='2810'/>
<seriesInfo name='DOI' value='10.17487/RFC2810'/>
</reference>



<reference anchor='RFC2812' target='https://www.rfc-editor.org/info/rfc2812'>
<front>
<title>Internet Relay Chat: Client Protocol</title>
<author fullname='C. Kalt' initials='C.' surname='Kalt'><organization/></author>
<date month='April' year='2000'/>
<abstract><t>This document defines the Client Protocol, and assumes that the reader is familiar with the IRC Architecture.  This memo provides information for the Internet community.</t></abstract>
</front>
<seriesInfo name='RFC' value='2812'/>
<seriesInfo name='DOI' value='10.17487/RFC2812'/>
</reference>



<reference anchor='RFC3233' target='https://www.rfc-editor.org/info/rfc3233'>
<front>
<title>Defining the IETF</title>
<author fullname='P. Hoffman' initials='P.' surname='Hoffman'><organization/></author>
<author fullname='S. Bradner' initials='S.' surname='Bradner'><organization/></author>
<date month='February' year='2002'/>
<abstract><t>This document gives a more concrete definition of &quot;the IETF&quot; as it understood today.  Many RFCs refer to &quot;the IETF&quot;.  Many important IETF documents speak of the IETF as if it were an already-defined entity. However, no IETF document correctly defines what the IETF is.  This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t></abstract>
</front>
<seriesInfo name='BCP' value='58'/>
<seriesInfo name='RFC' value='3233'/>
<seriesInfo name='DOI' value='10.17487/RFC3233'/>
</reference>



<reference anchor='RFC1958' target='https://www.rfc-editor.org/info/rfc1958'>
<front>
<title>Architectural Principles of the Internet</title>
<author fullname='B. Carpenter' initials='B.' role='editor' surname='Carpenter'><organization/></author>
<date month='June' year='1996'/>
<abstract><t>The Internet and its architecture have grown in evolutionary fashion from modest beginnings, rather than from a Grand Plan. While this process of evolution is one of the main reasons for the technology's success, it nevertheless seems useful to record a snapshot of the current principles of the Internet architecture. This is intended for general guidance and general interest, and is in no way intended to be a formal or invariant reference model.  This memo provides information for the Internet community.  This memo does not specify an Internet standard of any kind.</t></abstract>
</front>
<seriesInfo name='RFC' value='1958'/>
<seriesInfo name='DOI' value='10.17487/RFC1958'/>
</reference>



<reference anchor='RFC4084' target='https://www.rfc-editor.org/info/rfc4084'>
<front>
<title>Terminology for Describing Internet Connectivity</title>
<author fullname='J. Klensin' initials='J.' surname='Klensin'><organization/></author>
<date month='May' year='2005'/>
<abstract><t>As the Internet has evolved, many types of arrangements have been advertised and sold as &quot;Internet connectivity&quot;.  Because these may differ significantly in the capabilities they offer, the range of options, and the lack of any standard terminology, the effort to distinguish between these services has caused considerable consumer confusion.  This document provides a list of terms and definitions that may be helpful to providers, consumers, and, potentially, regulators in clarifying the type and character of services being offered.  This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t></abstract>
</front>
<seriesInfo name='BCP' value='104'/>
<seriesInfo name='RFC' value='4084'/>
<seriesInfo name='DOI' value='10.17487/RFC4084'/>
</reference>



<reference anchor='RFC4271' target='https://www.rfc-editor.org/info/rfc4271'>
<front>
<title>A Border Gateway Protocol 4 (BGP-4)</title>
<author fullname='Y. Rekhter' initials='Y.' role='editor' surname='Rekhter'><organization/></author>
<author fullname='T. Li' initials='T.' role='editor' surname='Li'><organization/></author>
<author fullname='S. Hares' initials='S.' role='editor' surname='Hares'><organization/></author>
<date month='January' year='2006'/>
<abstract><t>This document discusses the Border Gateway Protocol (BGP), which is an inter-Autonomous System routing protocol.</t><t>The primary function of a BGP speaking system is to exchange network reachability information with other BGP systems.  This network reachability information includes information on the list of Autonomous Systems (ASes) that reachability information traverses. This information is sufficient for constructing a graph of AS connectivity for this reachability from which routing loops may be pruned, and, at the AS level, some policy decisions may be enforced.</t><t>BGP-4 provides a set of mechanisms for supporting Classless Inter-Domain Routing (CIDR).  These mechanisms include support for advertising a set of destinations as an IP prefix, and eliminating the concept of network &quot;class&quot; within BGP.  BGP-4 also introduces mechanisms that allow aggregation of routes, including aggregation of AS paths.</t><t>This document obsoletes RFC 1771.  [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name='RFC' value='4271'/>
<seriesInfo name='DOI' value='10.17487/RFC4271'/>
</reference>



<reference anchor='RFC4880' target='https://www.rfc-editor.org/info/rfc4880'>
<front>
<title>OpenPGP Message Format</title>
<author fullname='J. Callas' initials='J.' surname='Callas'><organization/></author>
<author fullname='L. Donnerhacke' initials='L.' surname='Donnerhacke'><organization/></author>
<author fullname='H. Finney' initials='H.' surname='Finney'><organization/></author>
<author fullname='D. Shaw' initials='D.' surname='Shaw'><organization/></author>
<author fullname='R. Thayer' initials='R.' surname='Thayer'><organization/></author>
<date month='November' year='2007'/>
<abstract><t>This document is maintained in order to publish all necessary information needed to develop interoperable applications based on the OpenPGP format.  It is not a step-by-step cookbook for writing an application.  It describes only the format and methods needed to read, check, generate, and write conforming packets crossing any network.  It does not deal with storage and implementation questions. It does, however, discuss implementation issues necessary to avoid security flaws.</t><t>OpenPGP software uses a combination of strong public-key and symmetric cryptography to provide security services for electronic communications and data storage.  These services include confidentiality, key management, authentication, and digital signatures.  This document specifies the message formats used in OpenPGP.  [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name='RFC' value='4880'/>
<seriesInfo name='DOI' value='10.17487/RFC4880'/>
</reference>



<reference anchor='RFC5694' target='https://www.rfc-editor.org/info/rfc5694'>
<front>
<title>Peer-to-Peer (P2P) Architecture: Definition, Taxonomies, Examples, and Applicability</title>
<author fullname='G. Camarillo' initials='G.' role='editor' surname='Camarillo'><organization/></author>
<author><organization>IAB</organization></author>
<date month='November' year='2009'/>
<abstract><t>In this document, we provide a survey of P2P (Peer-to-Peer) systems. The survey includes a definition and several taxonomies of P2P systems.  This survey also includes a description of which types of applications can be built with P2P technologies and examples of P2P applications that are currently in use on the Internet.  Finally, we discuss architectural trade-offs and provide guidelines for deciding whether or not a P2P architecture would be suitable to meet the requirements of a given application.  This memo provides information for the Internet community.</t></abstract>
</front>
<seriesInfo name='RFC' value='5694'/>
<seriesInfo name='DOI' value='10.17487/RFC5694'/>
</reference>



<reference anchor='RFC5751' target='https://www.rfc-editor.org/info/rfc5751'>
<front>
<title>Secure/Multipurpose Internet Mail Extensions (S/MIME) Version 3.2 Message Specification</title>
<author fullname='B. Ramsdell' initials='B.' surname='Ramsdell'><organization/></author>
<author fullname='S. Turner' initials='S.' surname='Turner'><organization/></author>
<date month='January' year='2010'/>
<abstract><t>This document defines Secure/Multipurpose Internet Mail Extensions (S/MIME) version 3.2.  S/MIME provides a consistent way to send and receive secure MIME data.  Digital signatures provide authentication, message integrity, and non-repudiation with proof of origin. Encryption provides data confidentiality.  Compression can be used to reduce data size.  This document obsoletes RFC 3851.  [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name='RFC' value='5751'/>
<seriesInfo name='DOI' value='10.17487/RFC5751'/>
</reference>



<reference anchor='RFC6176' target='https://www.rfc-editor.org/info/rfc6176'>
<front>
<title>Prohibiting Secure Sockets Layer (SSL) Version 2.0</title>
<author fullname='S. Turner' initials='S.' surname='Turner'><organization/></author>
<author fullname='T. Polk' initials='T.' surname='Polk'><organization/></author>
<date month='March' year='2011'/>
<abstract><t>This document requires that when Transport Layer Security (TLS) clients and servers establish connections, they never negotiate the use of  Secure Sockets Layer (SSL) version 2.0.  This document updates the  backward compatibility sections found in the Transport Layer Security (TLS). [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name='RFC' value='6176'/>
<seriesInfo name='DOI' value='10.17487/RFC6176'/>
</reference>



<reference anchor='RFC7118' target='https://www.rfc-editor.org/info/rfc7118'>
<front>
<title>The WebSocket Protocol as a Transport for the Session Initiation Protocol (SIP)</title>
<author fullname='I. Baz Castillo' initials='I.' surname='Baz Castillo'><organization/></author>
<author fullname='J. Millan Villegas' initials='J.' surname='Millan Villegas'><organization/></author>
<author fullname='V. Pascual' initials='V.' surname='Pascual'><organization/></author>
<date month='January' year='2014'/>
<abstract><t>The WebSocket protocol enables two-way real-time communication between clients and servers in web-based applications.  This document specifies a WebSocket subprotocol as a reliable transport mechanism between Session Initiation Protocol (SIP) entities to enable use of SIP in web-oriented deployments.</t></abstract>
</front>
<seriesInfo name='RFC' value='7118'/>
<seriesInfo name='DOI' value='10.17487/RFC7118'/>
</reference>



<reference anchor='RFC7194' target='https://www.rfc-editor.org/info/rfc7194'>
<front>
<title>Default Port for Internet Relay Chat (IRC) via TLS/SSL</title>
<author fullname='R. Hartmann' initials='R.' surname='Hartmann'><organization/></author>
<date month='August' year='2014'/>
<abstract><t>This document describes the commonly accepted practice of listening on TCP port 6697 for incoming Internet Relay Chat (IRC) connections encrypted via TLS/SSL.</t></abstract>
</front>
<seriesInfo name='RFC' value='7194'/>
<seriesInfo name='DOI' value='10.17487/RFC7194'/>
</reference>



<reference anchor='RFC8280' target='https://www.rfc-editor.org/info/rfc8280'>
<front>
<title>Research into Human Rights Protocol Considerations</title>
<author fullname='N. ten Oever' initials='N.' surname='ten Oever'><organization/></author>
<author fullname='C. Cath' initials='C.' surname='Cath'><organization/></author>
<date month='October' year='2017'/>
<abstract><t>This document aims to propose guidelines for human rights considerations, similar to the work done on the guidelines for privacy considerations (RFC 6973).  The other parts of this document explain the background of the guidelines and how they were developed.</t><t>This document is the first milestone in a longer-term research effort.  It has been reviewed by the Human Rights Protocol Considerations (HRPC) Research Group and also by individuals from outside the research group.</t></abstract>
</front>
<seriesInfo name='RFC' value='8280'/>
<seriesInfo name='DOI' value='10.17487/RFC8280'/>
</reference>


<reference anchor="UDHR" target="http://www.un.org/en/documents/udhr/">
  <front>
    <title>The Universal Declaration of Human Rights</title>
    <author >
      <organization>United Nations General Assembly</organization>
    </author>
    <date year="1948"/>
  </front>
</reference>
<reference anchor="ICCPR" target="http://www.ohchr.org/EN/ProfessionalInterest/Pages/CCPR.aspx">
  <front>
    <title>International Covenant on Civil and Political Rights</title>
    <author >
      <organization>United Nations General Assembly</organization>
    </author>
    <date year="1966"/>
  </front>
</reference>
<reference anchor="HussainHoward" target="https://doi.org/10.1111/misr.12020">
  <front>
    <title>What Best Explains Successful Protest Cascades? ICTs and the Fuzzy Causes of the Arab Spring</title>
    <author initials="M. M." surname="Hussain">
      <organization></organization>
    </author>
    <author initials="P. N." surname="Howard">
      <organization></organization>
    </author>
    <date year="2013"/>
  </front>
  <seriesInfo name="Int Stud Rev (2013) 15 (1): 48-66." value=""/>
</reference>
<reference anchor="APC" target="https://www.apc.org/es/system/files/FOAA_online_IndiaMalaysiaPakistan.pdf">
  <front>
    <title>Freedom of assembly and association online in India, Malaysia and Pakistan. Trends, challenges and recommendations.</title>
    <author >
      <organization>Association for Progressive Communications</organization>
    </author>
    <author initials="" surname="Gayathry Venkiteswaran">
      <organization></organization>
    </author>
    <date year="2016"/>
  </front>
</reference>
<reference anchor="Swire" target="https://ssrn.com/abstract=1989516 or http://dx.doi.org/10.2139/ssrn.1989516">
  <front>
    <title>Social Networks, Privacy, and Freedom of Association: Data Empowerment vs. Data Protection</title>
    <author initials="" surname="Peter Swire">
      <organization></organization>
    </author>
    <date year="2012"/>
  </front>
  <seriesInfo name="North Carolina Law Review (2012) 90 (1): 104." value=""/>
</reference>
<reference anchor="UNGA" target="http://www.un.org/en/ga/search/view_doc.asp?symbol=A/59/401 para. 46">
  <front>
    <title>Human rights defenders</title>
    <author initials="" surname="Hina Jilani">
      <organization></organization>
    </author>
    <date year="2004"/>
  </front>
  <seriesInfo name="A/59/401" value=""/>
</reference>
<reference anchor="HafnerandLyon" target="https://doi.org/10.1111/misr.12020">
  <front>
    <title>Where Wizards Stay Up Late. The Origins of the Internet</title>
    <author initials="K." surname="Hafnerand">
      <organization></organization>
    </author>
    <author initials="M." surname="Lyon">
      <organization></organization>
    </author>
    <date year="1998"/>
  </front>
  <seriesInfo name="First Touchstone Edition (1998): 93." value=""/>
</reference>
<reference anchor="Pensado" target="http://revista.drclas.harvard.edu/book/student-activism">
  <front>
    <title>Student Activism. Utopian Dreams.</title>
    <author initials="" surname="Jaime Pensado">
      <organization></organization>
    </author>
    <date year="2012"/>
  </front>
  <seriesInfo name="ReVista. Harvard Review of Latin America (2012)." value=""/>
</reference>
<reference anchor="Abbate" target="https://mitpress.mit.edu/books/inventing-internet">
  <front>
    <title>Inventing the Internet</title>
    <author initials="" surname="Janet Abbate">
      <organization></organization>
    </author>
    <date year="2013"/>
  </front>
  <seriesInfo name="Cambridge: MIT Press (2013): 11." value=""/>
</reference>
<reference anchor="AckermannKargerZhang" target="https://people.csail.mit.edu/axz/papers/mailinglists.pdf">
  <front>
    <title>Mailing Lists: Why Are They Still Here, What’s Wrong With Them, and How Can We Fix Them?</title>
    <author initials="M. S." surname="Ackerman">
      <organization></organization>
    </author>
    <author initials="D. R." surname="Karger">
      <organization></organization>
    </author>
    <author initials="A. X." surname="Zhang">
      <organization></organization>
    </author>
    <date year="2017"/>
  </front>
  <seriesInfo name="Mit. edu (2017): 1." value=""/>
</reference>
<reference anchor="Benkler" target="http://www.benkler.org/Peer%20production%20and%20cooperation%2009.pdf">
  <front>
    <title>Peer Production and Cooperation</title>
    <author initials="Y." surname="Benkler">
      <organization></organization>
    </author>
    <date year="2009"/>
  </front>
</reference>
<reference anchor="AndersonGuarnieri" target="https://iranthreats.github.io/resources/webrtc-deanonymization/">
  <front>
    <title>Fictitious Profiles and WebRTC's Privacy Leaks Used to Identify Iranian Activists</title>
    <author initials="C." surname="Anderson">
      <organization></organization>
    </author>
    <author initials="C." surname="Guarnieri">
      <organization></organization>
    </author>
    <date year="2016"/>
  </front>
</reference>
<reference anchor="NelsonHedlun" target="http://library.uniteddiversity.coop/REconomy_Resource_Pack/More_Inspirational_Videos_and_Useful_Info/Peer_to_Peer-Harnessing_the_Power_of_Disruptive_Technologies.pdf">
  <front>
    <title>A Network of Peers: Models Through the History of the Internet</title>
    <author initials="N." surname="Minar">
      <organization></organization>
    </author>
    <author initials="M." surname="Hedlun">
      <organization></organization>
    </author>
    <date year="2001"/>
  </front>
  <seriesInfo name="Peer to Peer: Harnessing the Power of Disruptive Technologies, ed: Andy Oram" value=""/>
</reference>
<reference anchor="Vu" target="https://www.springer.com/cn/book/9783642035135">
  <front>
    <title>Peer-to-Peer Computing: Principles and Applications</title>
    <author initials="" surname="Vu, Quang Hieu">
      <organization></organization>
    </author>
    <author initials="" surname="Lupu, Mihai">
      <organization></organization>
    </author>
    <author initials="" surname="Ooi, Beng Chin">
      <organization></organization>
    </author>
    <date year="2010"/>
  </front>
</reference>
<reference anchor="Schleuder" target="https://schleuder.nadir.org/">
  <front>
    <title>Schleuder - A gpg-enabled mailinglist with remailing-capabilities.</title>
    <author >
      <organization>Nadir</organization>
    </author>
    <date year="2017"/>
  </front>
</reference>
<reference anchor="Crawford" target="https://www.bestvpn.com/the-webrtc-vpn-bug-and-how-to-fix-it/">
  <front>
    <title>The WebRTC VPN “Bug” and How to Fix</title>
    <author initials="D." surname="Crawford">
      <organization></organization>
    </author>
    <date year="2015"/>
  </front>
</reference>
<reference anchor="Troncosoetal" target="https://www.petsymposium.org/2017/papers/issue4/paper87-2017-4-source.pdf">
  <front>
    <title>Systematizing Decentralization and Privacy: Lessons from 15 Years of Research and Deployments</title>
    <author initials="C." surname="Troncoso">
      <organization></organization>
    </author>
    <author initials="M." surname="Isaakdis">
      <organization></organization>
    </author>
    <author initials="G." surname="Danezis">
      <organization></organization>
    </author>
    <author initials="H." surname="Halpin">
      <organization></organization>
    </author>
    <date year="2017"/>
  </front>
  <seriesInfo name="Proceedings on Privacy Enhancing Technologies ; 2017 (4):307–329" value=""/>
</reference>
<reference anchor="Mainwaringetal" target="http://www.dourish.com/classes/readings/Mainwaring-Infrastructure.pdf">
  <front>
    <title>Infrastructures and Their Discontents: Implications for Ubicomp</title>
    <author initials="S. D." surname="Mainwaring">
      <organization></organization>
    </author>
    <author initials="M. F." surname="Chang">
      <organization></organization>
    </author>
    <author initials="K." surname="Anderson">
      <organization></organization>
    </author>
    <date year="2004"/>
  </front>
  <seriesInfo name="DBLP Conference: Conference: UbiComp 2004: Ubiquitous Computing: 6th International Conference, Nottingham, UK, September 7-10, 2004. Proceedings" value=""/>
</reference>
<reference anchor="Bowker" >
  <front>
    <title>Information mythology and infrastructure</title>
    <author initials="G." surname="Bowker">
      <organization></organization>
    </author>
    <date year="1994"/>
  </front>
  <seriesInfo name="In: L. Bud (Ed.), Information Acumen: The Understanding and use of Knowledge in Modern Business,Routledge,London,1994,pp.231–247" value=""/>
</reference>
<reference anchor="Bloketal" >
  <front>
    <title>Infrastructuring Environments</title>
    <author initials="A." surname="Blok">
      <organization></organization>
    </author>
    <author initials="M." surname="Nakazora">
      <organization></organization>
    </author>
    <author initials="B. R." surname="Winthereik">
      <organization></organization>
    </author>
    <date year="2016"/>
  </front>
  <seriesInfo name="Science as Culture 25:1, 1-22." value=""/>
</reference>
<reference anchor="PipekWulf" >
  <front>
    <title>Infrastructuring: Towards an Integrated Perspective on the Design and Use of Information Technology</title>
    <author initials="V." surname="Pipek">
      <organization></organization>
    </author>
    <author initials="W." surname="Wolf">
      <organization></organization>
    </author>
    <date year="2009"/>
  </front>
  <seriesInfo name="Journal of the Association for Information Systems (10) 5, pp. 306-332" value=""/>
</reference>
<reference anchor="CRC" target="https://www.info.dfat.gov.au/Info/Treaties/treaties.nsf/AllDocIDs/E123F4F71DCAE3E7CA256B4F007F2905">
  <front>
    <title>Lorum</title>
    <author initials="" surname="Wikipedia">
      <organization></organization>
    </author>
    <date year="2000"/>
  </front>
</reference>
<reference anchor="CERD" target="https://www.info.dfat.gov.au/Info/Treaties/treaties.nsf/AllDocIDs/2F70352A0B65EB67CA256B6E0075FE13">
  <front>
    <title>Convention on the Elimination of all forms of Racial Discrimination</title>
    <author >
      <organization>United Nations</organization>
    </author>
    <date year="1966"/>
  </front>
</reference>
<reference anchor="Sauter" >
  <front>
    <title>The Coming Swarm</title>
    <author initials="M." surname="Sauter">
      <organization></organization>
    </author>
    <date year="2014"/>
  </front>
  <seriesInfo name="Bloomsbury" value=""/>
</reference>
<reference anchor="HRPC-charter" target="https://datatracker.ietf.org/doc/charter-irtf-hrpc/">
  <front>
    <title>Charter for Research Group</title>
    <author initials="" surname="Human Rights Protocol Consideration RG">
      <organization></organization>
    </author>
    <date year="2015"/>
  </front>
</reference>
<reference anchor="CRPD" target="http://www.austlii.edu.au/au/other/dfat/treaties/2008/12.html">
  <front>
    <title>Convention on the Rights of Persons with Disabilities</title>
    <author >
      <organization>United Nations</organization>
    </author>
    <date year="2007"/>
  </front>
</reference>
<reference anchor="Nyokabi" target="https://repository.gchumanrights.org/bitstream/handle/20.500.11825/1582/3.Global%20article%20HRDA_2_2019.pdf?sequence=4&amp;isAllowed=y">
  <front>
    <title>The right to development and internet shutdowns: Assessing the role of information and communications technology in democratic development in Africa</title>
    <author initials="D. M." surname="Nyokabi">
      <organization></organization>
    </author>
    <author initials="N." surname="Diallo">
      <organization></organization>
    </author>
    <author initials="N. W." surname="Ntesang">
      <organization></organization>
    </author>
    <author initials="T. K." surname="White">
      <organization></organization>
    </author>
    <author initials="T." surname="Ilori">
      <organization></organization>
    </author>
    <date year="2019"/>
  </front>
</reference>
<reference anchor="Stanford" target="https://plato.stanford.edu/entries/freedom-association/">
  <front>
    <title>Freedom of Association</title>
    <author initials="K." surname="Brownlee">
      <organization></organization>
    </author>
    <author initials="D." surname="Jenkins">
      <organization></organization>
    </author>
    <date year="2019"/>
  </front>
</reference>
<reference anchor="ViennaDeclaration" target="https://www.ohchr.org/en/professionalinterest/pages/vienna.aspx">
  <front>
    <title>Vienna Declaration and Programme of Action</title>
    <author >
      <organization>United Nations</organization>
    </author>
    <date year="1993"/>
  </front>
</reference>
<reference anchor="Loi" target="https://link.springer.com/article/10.1007/s13347-019-00351-0">
  <front>
    <title>Two Concepts of Group Privacy</title>
    <author initials="M." surname="Loi">
      <organization></organization>
    </author>
    <author initials="M." surname="Christen">
      <organization></organization>
    </author>
    <date year="2020"/>
  </front>
</reference>
<reference anchor="Glasius" target="https://academic.oup.com/isq/article/64/2/453/5823498">
  <front>
    <title>Illiberal Norm Diffusion: How Do Governments Learn to Restrict Nongovernmental Organizations?</title>
    <author initials="M." surname="Glasius">
      <organization></organization>
    </author>
    <author initials="J." surname="Schalk">
      <organization></organization>
    </author>
    <author initials="M." surname="De Lange">
      <organization></organization>
    </author>
    <date year="2020"/>
  </front>
</reference>
<reference anchor="CoE" target="https://mk0rofifiqa2w3u89nud.kinstacdn.com/wp-content/uploads/COE-report-on-FOAA-rights-on-the-internet-.pdf">
  <front>
    <title>Freedom of assembly and association on the Internet</title>
    <author >
      <organization>Council of Europe</organization>
    </author>
    <date year="2015"/>
  </front>
</reference>
<reference anchor="APCtraining" target="http://itrainonline.org/itrainonline/mmtk/APC_IRHRCurriculum_FOA_Handout.pdf">
  <front>
    <title>Multimedia training kit</title>
    <author initials="D." surname="Sauter">
      <organization></organization>
    </author>
    <author >
      <organization>Association for Progressive Communications</organization>
    </author>
    <date year="2013"/>
  </front>
</reference>
<reference anchor="UNHRC2020" target="https://www.ohchr.org/EN/HRBodies/HRC/RegularSessions/Session44/Documents/A_HRC_44_24_AEV.docx">
  <front>
    <title>Impact of new technologies on the promotion and protection of human rights in the context of assemblies, including peaceful protests. Report of the United Nations High Commissioner for Human Rights A/HRC/44/24, 2020</title>
    <author initials="" surname="Michelle Bachelet">
      <organization></organization>
    </author>
    <author >
      <organization>United Nations</organization>
    </author>
    <date year="2000"/>
  </front>
</reference>
<reference anchor="Benkler2" target="http://is.gd/rxUpTQ">
  <front>
    <title>The wealth of Networks - How social production transforms markets and freedom</title>
    <author initials="Y." surname="Benkler">
      <organization></organization>
    </author>
    <date year="2006"/>
  </front>
  <seriesInfo name="New Haven and London - Yale University Press" value=""/>
</reference>
<reference anchor="W3C" target="https://www.w3.org/standards/webdesign/accessibility">
  <front>
    <title>Accessibility</title>
    <author >
      <organization>W3C</organization>
    </author>
    <date year="2015"/>
  </front>
</reference>
<reference anchor="Nasser" target="https://nas.sr/%D9%82%D9%84%D8%A8/">
  <front>
    <title>قلب</title>
    <author initials="R." surname="Nasser">
      <organization></organization>
    </author>
    <date year="2013"/>
  </front>
</reference>
<reference anchor="UNGPBHR" target="https://www.ohchr.org/documents/publications/guidingprinciplesbusinesshr_en.pdf">
  <front>
    <title>Guiding Principles on Business and Human Rights</title>
    <author >
      <organization>United Nations</organization>
    </author>
    <date year="2011"/>
  </front>
</reference>
<reference anchor="Kaye" target="https://www.ohchr.org/EN/HRbodies/HRC/RegularSessions/Session29/Documents/A.HRC.29.32_AEV.doc">
  <front>
    <title>The use of encryption and anonymity in digital communications</title>
    <author initials="D." surname="Kaye">
      <organization></organization>
    </author>
    <date year="2015"/>
  </front>
</reference>
<reference anchor="Marcus" target="http://www.cardozoaelj.com/wp-content/uploads/2013/02/Marcus.pdf">
  <front>
    <title>Commercial Speech on the Internet: Spam and the first amendment</title>
    <author initials="J." surname="Marcus">
      <organization></organization>
    </author>
    <date year="1998"/>
  </front>
</reference>
<reference anchor="APC3" target="https://www.apc.org/en/node/36145/#tools">
  <front>
    <title>Closer than ever</title>
    <author >
      <organization>Association for Progressive Communications</organization>
    </author>
    <date year="2020"/>
  </front>
</reference>
<reference anchor="UNHRC2018" target="https://digitallibrary.un.org/record/1639840?ln=en">
  <front>
    <title>UN Human Rights Council Resolution 'The promotion, protection and enjoyment of human rights on the Internet' (A/HRC/32/L.20)</title>
    <author >
      <organization>United Nations Human Rights Council</organization>
    </author>
    <date year="2016"/>
  </front>
</reference>
<reference anchor="UNGC37" target="https://tbinternet.ohchr.org/_layouts/15/treatybodyexternal/TBSearch.aspx?Lang=en&amp;TreatyID=8&amp;DocTypeID=11">
  <front>
    <title>Human Rights Committee “General comment No. 37 (2020) on the right of peaceful assembly (article 21)”, CCPR/C/GC/3</title>
    <author >
      <organization>United Nations Human Rights Committee</organization>
    </author>
    <date year="2020"/>
  </front>
</reference>
<reference anchor="UNSRFOAA2012" target="http://freeassembly.net/wp-content/uploads/2013/10/A-HRC-20-27_en-annual-report-May-2012.pdf">
  <front>
    <title>Report of the Special Rapporteur on the rights to freedom of peaceful assembly and of association", A/HRC/20/27</title>
    <author initials="" surname="Maina Kiai">
      <organization></organization>
    </author>
    <author >
      <organization>United Nations</organization>
    </author>
    <date year="2012"/>
  </front>
</reference>
<reference anchor="FoAdef" target="https://en.wikipedia.org/wiki/Freedom_of_association">
  <front>
    <title>Freedom of association</title>
    <author >
      <organization>Wikipedia</organization>
    </author>
    <date year="2021"/>
  </front>
</reference>
<reference anchor="RutzenZenn" >
  <front>
    <title>Association and Assembly in the Digital Age</title>
    <author initials="D." surname="Rutzen">
      <organization></organization>
    </author>
    <author initials="J." surname="Zenn">
      <organization></organization>
    </author>
    <date year="2011" month="December"/>
  </front>
  <seriesInfo name="The International Journal of Not-for-Profit Law, Volume 13, Issue 4" value=""/>
</reference>
<reference anchor="UNSRFAA2019" target="https://undocs.org/A/HRC/41/41">
  <front>
    <title>Report of the Special Rapporteur on the rights to freedom of peaceful assembly and of association</title>
    <author initials="" surname="Clément Voule">
      <organization></organization>
    </author>
    <author >
      <organization>United Nations</organization>
    </author>
    <date year="2019"/>
  </front>
</reference>
<reference anchor="MeierHahn2015" target="https://papers.ssrn.com/sol3/papers.cfm?abstract_id=2587843">
  <front>
    <title>Creating connectivity: trust, distrust and social microstructures at the core of the internet</title>
    <author initials="" surname="Uta Meier-Hahn">
      <organization></organization>
    </author>
    <date year="2015"/>
  </front>
</reference>


    </references>



  </back>

<!-- ##markdown-source:
H4sIAAAAAAAAA9W92XIcWZIl+I6vMGFKVpDdvmDhiuisKBDglkkymAAYnKqW
Foq523V3S5ibedoC0IMSJSEt/TTzOC9ZItXvXd9RP9H1Gl8yqkf1buYOEMzI
GZFJiYwA4ObX7qJX16Oqw+Fwp83bwhwmr8rW1KVpk3d11VbTqmiStMySdmGS
l90yLZPTfL5om6Stkue1MVm1TKpZctQ01TRP27wq8Tj9bpaTYr2zk04mtbk8
TJ5XRztZNS3TJb0kq9NZO8zrdjZc1KvpMPVfH+7t7UzT1syren2Y5OWs2tnJ
V/Vh0tZd0+7v7j7Z3d9Ja5PSVE/Pn+9cVfXFvK661WE8Pzv95LgqmzwzNUZv
klPTmLSeLpIX/KWdC7OmETK/7uEJz22naWkZH9OiKmm6a9PsrPLDnSSpZ1OT
Ne260L8mtA/T4Me8zEzZ2j80Vd3WZta439fL6Ne2zqfu4Wm1XNJ33ad5WeSl
f4351A6LvGmHNMiETuUwGVb/6T/T/nbtoqoPd3aG9BT+l5f04dsRfaVMvjeX
prYfyN6/zQ2d6caHVT1Py/xH7NJh8r7M6bMmb9c43WVDm5OlS/uwWaZ5cZjw
v/+h5PFouIpHG9EO2od6Mzob0VF0bVebeD5n7b//22qRlsZ+nHxhSv/+b0lm
kjdV2db//m9p0ZsTTQWjjaYy2j90S37SpMVomvZ36c0o+UNZZaaIp/QmLQoi
v95n8XSODRNMMqvq5MQsq2mdTtfJ3yXnZrooq6Kar/t7dYHB/mGatSMaaWen
rOoljXVp6OyYzP1vSXL6/Hh3d3fvUH/ce/DA/vhk90B/3Nt7GPx43/64v2e/
tvfokfvxycGu/ri//+iR/fHx3q7/cV9/PNg/cOM+efBYf7y/+9i+4v6+G/f+
48d2hAcPn9gHHjx6YB94uPfoof74aG/vsfvRPft4n0egn9+fvDw9xJ4pIzon
jqNnnha0x9MilTvMFBledXwpI5ZxmNC4j/GrvRVyBEM+O1BQa7LkrXKCF6Yk
rlB4XoWXp/Xc0J1ctO3qcDy+uroadSUf2NiUY+JfHe7ouMsW9Zin/er4+F08
b2EkeEfK3OfSlGnZJjTv4/wyL8Ae31VF3uZT+nzLEh4+/JsvoVpMFzVW8ezt
mDjjzDQN5ofJmqYdv0vnphnzYkZps/rES3vZNU2aly+rq5QYZLjEOx8WaZs8
pe8lzz6tCnqoSc666ZRGnXUFWC9/dpw20zQzzXe0S+dejDzvfvxxTR92jWn4
LPlvR3U6Sc5WdV7O7wSbsb+7d7B1M/T20v3VWcafvBsR/5OJb2xJQ3uSVTl2
Y293tEf/Gy/zph7t7e/u7+LxxtS5afhS0lppi4hHdRlJjsvkLs/oXrL3ILm7
d+8wuf94+PDh6A7v1tG742iPAuGY6ulgBwJRRzTBLJ6mTEST5emAGU+6bvJU
iCS9yFkMjZLz2pRZM0imC2JMpqSTwgO1EZmRCTWM4o27gYpCac0MjA5sXjNJ
XDITXi67kmgTY8bb+iJdp+2CGOMPprwgQmxog9Ny6w4z1aWrqdycZtysiS8v
x7O8oF+ef3909FHW/hELt8t2K15lM97Ts6u8NjHlnfHEi+StaVnw0568q/NL
Yr0D7Mh2jeQwOUnbNHm2XFVXpuYLnFw2I/kjaHXKT/Xobv96untnmPNjclvX
3jR1SeJnOU4nJOLTafu7vSePnzzYe0i7b29l9mkUEOH+3sET+Zo+uUmGb0mX
WNCtqYl1lGnyOr1igszNFWhy/17yZFdocm/3vlDk+7cvjqLNE6ZZi36UmRlR
DjHXaNm7969f9kt+7+/zgoTgl1nlPB2LnjXmOX4kzsl85TtRXn53NH7wZHx/
dy9ZEQGNkvub67VPgBGlM2ZzZfZ6TYcZrujDgrhX8oGEcp0RC2rTdfJ+RXvT
mhHkx/e0WGZOymWsjhex2yfbJQaW/IeRf3mf9yQ8m1/NXZ7nNXHK86qbLpqW
lM3kWZbjXt7lmdFxPjmQ03xnyibNqmj5zJaYmo+IgC/zZjlK3rfVKqdDPiGF
Z9nnCDeQ9O/TfGnsO7adLunwfDVHWU1yuBkt0vqS9nxksm48qaqLcSNTGaY6
lc2VnpofMALtKL5ryZfOhg6MeODRkh6fpkrPylUnE559LF9JotLz8+uO9Gah
8fuUjRsZd+vpLfN2xcxwRD+49TXj3L52mIevjJZ4nC4ndZ7NWYV8dU68hYZR
kUGUtqdLml4QE0rL8g/84vqfSFmdxzzuDSmMvL7XtF8NE/ma5KNhgl7TkedF
kbwksh8kLIV/+flfmuRDXdHjH3JiEPTQUnghiT9iF2XygSRu/gkffNfjcY9u
kq2ssNu5xp+djJJTUpwx/fiTo1Hyf4wSLGnr3q5MtSpINSeJXbj9TT/9OF6l
K2JF46WsnO2cBkJgY4vf0JcS+ha29RFvq+zqU5JIhamjjXxnDGRb1k2dYXpc
VSu1BWPG9+T6vfjHkR3+Or43kY9x6/mtv93fXbn30i/0Zvr31L/7t/xGt8Lf
bC6TXpl2NP2/S5erb8Ft0vZH+v0umZ+jewO6RGXGhMl6Jd+DZ9OqrJb5dIPX
DZLjhSnIPlukS+wABAmNStxmQNyGdaTkWTFPayVPCIWqfNGlNZl2dR7T5nOy
WJlBdbCwIc8x6gczOT0//qax8jh5bdKLJnnfkLbaVskrZg75bJ28IlbKDEpZ
Vtv0SHK71oJjOB65yW184Ga7lexyeinpLSYlqprTLekmo7wiltZUXU1K6/jK
TOp2OsxMWlbleqk2HvT7t2TcVuVLkxVdLHruHFklhHecD51vDZt4Dd21uurm
C3Ga0CLZluwdS7xsknPXLps02TckeeuN+ymTihZ8R2myyCd1Wq9JHrO5kFlb
fsQUOD4VWll/PNUN+PgunV6M31Q1q2PNKq/VePn4Q56ZqvnInhA6SFLt6fNZ
BQr/2FYf+b9D4uYlq47l/COt7+M7VrE+VrOPJyT0uhVbtB+dTUz0zTR/Z/Na
46oSnfB/DxM/JvYMY/IG+jGTcMwBMYRDpo01Cfx0CTL+oYtPC3NtqyFeRDru
qmNefsjkWk7zlSXjo9WqsLpvjzJ3rz+iH7pB8seOmB6dtuniz153K/r0Tb5I
8/iD76t8wHxlThc033KMVotuYBURc2GNclqKuH3y6PHBw/v7uwcP9g4eYMFn
00VhSAbHLND9ld56lMxX8yFZo5OCLmXAapMrlhy10T8Np+kqneRsoZq+CrFd
YsCoeJtm+SaDhD5sJzEq+RlwSZ7ycZ1ezaq+bcl6m3CT5Id3b5Nffv7Xp938
l5//pxNq7HnMP/VO58H1p0Piyr7pWlNlQvbq5Uq0diK5oXIE+tNw0s2H9Orh
orpiAprln4Z5i/mfk9idVk1l2rToWSkwd4iMfmQaPjFT4n5kpytjEetO+CQR
CFE62/KzmgwXMiz/kdRmcHHnqeTHT8yqqNZwPtxCiAec0U6y9wnxj1dNml5k
edP75AVbRqX5ceODl6y6FSul1fj61tWULC9abMMCycqAZyR06HbRFoTXNfkW
007u3r93eLD76Jef/++D/Sd3rj2alWnJalhVTd4tQTr8Zasw5E3Tmfvy2+NH
Q/5oeH8obM1akaROlSTl+BJtHBTxszolI40kdVcrDyACzGvmNcQmW/HIvlp6
tgCL+f0kJ1JZ9bj4NuPJ7t7ZiOjQT2XjOJ4TlTq9KQktkEjoRdt+8vT1O/Zv
z0gdLKc0h/BnmiLzOcwLv/25y1uW2wH3e0j3vu+vsiMMSFNo+TFSFgbJ+z8M
kjOzIqqeEDN5NNzbHWDkURKc/eYh6hlmdCB5sxAWVrA/pCHxm+JLY78pw/g4
7AE+ra4uenztlXWYErUt17Tf7HHF6eXRELGld9P5ENnLe7Z5gOiW0sddltx9
lrH2Fb7+CD5B66/ko+LQARM9T6drDN/lP5TVFXHdOZw9rCXUJY1HL6DLPzit
uhYfDl5XZUZqGU91sFqN9g/26Hbs338kKm5RXWxQcLRj/NJn5WVOVx6c4suq
VaC48/CbTOJtepH+WNVp75OnI7IAPpAlxAZ4frG5Z2fTnIkoSYneugJu/f0H
h3uDZG+4v68Wbb4yFx+6YnbDlQSVnsORx5cTxDon/YQE2Dva6RW7bkgbUCX4
hF4/F/b6XvY9PCjvmu9d222qvxPtI5ln788faPVVscU++T1ROt8j69fsedrC
+YiQIANxb/de8mCQ0IEnB7sPhwcH+9if41P1KNqteV3VnYZg3NxFK9ku+D7k
FzT1LNfD28ZcedajbJa2o3l1OUq7MRS8c1aVaU3jVn8Ylc1sfFQUJ9X01Ukz
fra3f/D8/vNHeyfHR88Onj06Ptp/8PDp/ee7u4+e7z/ZfaARHF7Ds9OTeBHE
YGBIw/0ppkuRL/PSufZTsm95k0QGpnD3MTOu3VPhFjh3+W385X/rfdh//og0
sP2j3acPHzx7+lD34eEz2ocHz5/tHUAvo3lZ5hWGNogL83U9I9Lunene/RvO
lO1yjCh/DmmPLnC1bCZdvd6B1+z03fFwukjrjdcfyx9BkL1waDyRBzdM5BbB
1uT0xfYdpxek7BglbjvKTTuDWM+q6Vin6yPDoieevvsiEelEYIrV0Keg1BLh
OFW2d3Me/QqysQ7urmmLPGcvBtMM/VMxQxwzITmaIX1l9/F4b3+0aJeFuxhv
19UFzSxeFnRf+GdZyc3MpSmqFfzVItk0Mt8sujarrsC3WZQ6Q6muCnC9POAy
/M1p5NNPWscIWRplEr1s82n0RnbIzdgfd6dHFE9uIIoTjsjo0jas2JOcw6r9
PxMnfduaxms++sn5iFSfD4u8Nf2/J6+KSg39DcqqDSuKbHCP5tMFk6i4u0Fh
k7xt+FSWY1K0ssLQyYwe7LKT9vH+g/Heg8f744PRi6KapAX7bGraksLQTy9P
T44+7n/ktbNK8l1j/tyxcPvd/b/LG+IGZJ5mv1vjspPo9xbNllBQIA++Yltp
J57WdOCFMf39Tn7PoZjrWNuqSNtq1Ois4G1jS4SpciaTCqEXuGw/kNwu0yDc
Gq9FPo7CsWLNVCSWl0uQ39F0k0s/OfgbcGkfxjTleBWEMXMbxlwhjHmJSSKQ
mfCaXle9i3Z+VTEPmZJCC54B5mfNlvhg9m+SsOyXq/KNvx0vSNsl02H7Smi2
F7FVr6SGgAExpnGzd3Bw/9GQiGK4yyb+cJdX8YIU57xreizjVVHkEwSB39Kd
p0s2m3UNgl5sK59UyYvqktgG9EF2ypHiSbyF2D7AJ/Slcu4eoEG+D0AOzXd3
vm4vdIbx338/Yi9EWlxsPH5iktd07832bUo5drzMpyM6GuxS3vzZ7dTD++P9
8f0HB2O6tAf3NYQDhaN6du3luyEOuxlL+KIUBOUeVx0ZuFD3nnV1tbpmLcuL
XXaWzvI/p/tXB93jJ2WXjfjatuk0E6/D1Wqo9ua4I1M/zZrx8ffPhszQ6nZY
lUOOmg6Fm/Gv7KWwEmHoPMm8BUfvjkm45mVu4wp2K96QIp4vWSFM7APJRd5f
7jUX1fKbUPv4a+PJPVGaYzYSEMbtDv8wXi7bizGt6eOr05enx11NZNsV3fIj
7cdH9oKT8RQt//1beoxpNV48mfAp0TsdVGmuvAhkf4QePzGUZeU42soFhvk7
izB0msvzOK5PbUBZ8EXm5bToYP+tTDplr6mMxSENund8nNY66KE5XtLw2K8c
bE01tEjROhrT4sb3ifrvD3Ahk6+wB97k04UpSEV4mvIPDqn1V3PhZ29pOk+r
jOUJz+vUzDsSC2fClpux/kDTPXHIGTq00+OP9+9/3L//8ejZDyNS+z65s9Mw
y/6munxl0oL0Odo4G/qnaTOHawQQ4MMtTNukpsOCWKY1mczi1lGB19uva4yH
bXGfDbJtRvNsXH96vzr/46Y2/pao7GVKWipeLoY9DfyPaWFCdB1ihG79Hw56
Jt8RQDU5VNj1V/AlGuj6A7w6wOnBT8GGNcc/MpjOxHQ33sfKKtN3z4j4j//+
H//jf/+vr+AdpyMdZ/vEyrQZNfX4tydPfvt4H/++/9uTx789ejxOgqv94t1T
CxOzE3nR5bhtgSe/8s4V8Rr30WJ+xnt/U7XEA8RW3cR5DMdzmeLKzXCis1vU
H00Zca8/pGuzSf3qRSKls16vHIvSaFUranw+z1mAT7fw21sZdCcjvPzW937y
xXu//yS89yN6crT/ZHSwb++9OGfr6YZOwzzQ1LjXZytDrLovoQ/p7xrO5D/P
AKJIGQrFL4u0FgfwuAYOMNIpXGvkTemKVD9WqSn+dJ2gZsof7+6PZSR/nlYc
H/Ss16JqONxFVkjiIbhfUrJ+taTdgGWVY4akjg8e7t1/MP5NW1VFE1w1SFGB
bAZH8/5tLJCsAsSxxKLDvL45D4XpIJSkfGCm/JMEMjbkau+Qv0nuirg72B+/
Hu3v3utbord3/Gyd8zW+CblHPoKKvWKoXZ2N9x4ePHl8f/e7ovyd1e6FLR0f
POptVO+NJNTb1hgOZ1nQpgK+SQUfJQePGNBAa7SbIF4A2iGnRDjt9a4qwcn+
3r1ffv6fg4RRm+Pj8QvaqVsq7LfYIp3w9k1qJ1b1DLjCxyJdkzLWkCUtzo81
sYg1aUgcXijG50/P4GmCWfYdK/60h38HF9v61cnvHv8d8Yrz9crQz5YrY2/P
TlnzZUxQvMOxKkV8AvziNF3xn01XRzuJfIWZNwU2d5VJUzQ5e8HuDFTd2t8d
7z/q0d7+TXpWyki5P+RBxPe2XiWeop0SY+mv5TZ7u+OjIU1uuL873H9EUmSY
lmWXFtZgeJOuORq2HwmX59VRZmY32UfbnRP7W6Wk0zVudjOTgLuyT4BO+Lex
vpaRAhuvpX+fdu2PpvwnMuN7+tA1eSZWJz9RKXhkrUpZAkdgEbi6XuI7ZBPe
vCEkeCqbSt65Y1c2fhb4/99W7ZB49BA4mZYRm4PkB2KSS5PsHQySVxy6TODr
tXQOMn/y/zGZ9wj7Jj/UcfHv/waW9UPVFebriJtJoSMleCq+ODVk9ugfqAEm
N/XLdFGyktLXBuBIJQ2PLkKJgA+pPJoPNCC9p8FPWJkaA8t8WldhVLdVg602
diPzCIdzOw3pfZvKRIc80+1LlLj0yEGASSoe2D9OZ8vvLCT4Y579bv/B40eP
76vOvDMcDhP76c7O+SJvEqtOJuYT3X1eydXCsIc5QdwtoUfSpDaF3IcJGUbG
xDI0YY6bs/jlCJzVl8QlvhYKYUQek435xCoXKZot4t+enrYT0RYg+yh51dKc
aZpNlUzosebCeqb/3JH9C6/UFacOpLWxJrfEDULP8zRO2GI1Z/ZlJ853wWU0
7L6eEtmwZ5wehc+jZcOA7ktBuhKZ6fyj3bpmka8aQU3yn+32hJvCfw+VlRGx
Htr8ObzFdlLp3Azi7acFXtJa+FGxCJJmlXJsfc1zbPkEVzUvLeckEZrqpMsL
JIus2BnZml48e5Sc5RxWDV8QZOlFp70ieUzvVeyJBAeUTdI6aK6824Nw6wdh
yDoGEV4x9aTF+kc5uA2ic/MYRJMYOJrz9KSbZaITBAmSypHP7aLZPSpeS3A4
Upnd1seXg+iFPS60ye1Cb/pVColwtcjJdoh3kLdcjF2TSVhlSReABzL4mW5f
o7cC2NptxCA35BZEiRuRN3JdZ8x+XM4G4yLtdHEVKhbyzL3sJBC+1mOO/FXN
gthvRluP99I/2YDGnRXMG+m+9dJCeJzLtAZkk7R3MdswUc5Ao918TrRXFGuh
3HBXcQsb+kYrUEaO07Z20JKzUco5cA49oZw7V9sdWvPURFtyZ4v7TPNgOFoB
v81oB9xwmWcZiZmdHdoG597Z+V3wv52df/7nf94BA/1gaF+Iz+KmwpbhuQxk
69MZ7eMg+EgeJVvtl5//zx2rzzCj/321KBmxQJyLIfgPH92Tj4+czm3vhsvs
Uvum2WCUuTDsmm08cWK0DOFu0wuslUE6FUfyqhpuQ/wgTAj78S3vlHIN/itG
sGwBbKT5ljNKUrYkJjaCjvVWs1G0KmtyHKvJQeaGruIaM0WMERnjlZyXdTA4
Jud54yy84aHage9f63ZfpERcTKxEWixG6ZHMrAxSaJnArJdEhkG+JS2/Ye59
BX5QmDmrWrRDcyFLMjYr2i74YXFlkGOHrztv1yCZMbMVRUHwuphYMa/qvF0s
m2RKO5LOZnSmvK5GE1L1ujfxzh5B67ZaGjEJ+HWvMZJJJgZKnB/mV2lzfphY
rwNC/sm9kdwR99AOi8lpV9e8ycjDxk3Myw4MlHgnQ5ppt2owxJItVgcSIK2p
ulWaNeM1P3/W/M6ffuKVcwJFA/5ulQLPJ7aIM+YlCQN88hlLTbPhLhggWbdY
B+bytcpK9EjEn89T6ChYWKR4BFqi1e0jZwXJlKXhvRqoJkN7xDtq+WdjzEUj
YXym6Uhqsr4RqmtEYtHYPOWtGtwgkrOs8FqqHsk1JYFCsg/i2p6qP9RtV/46
5EYECxkwjKtIc1aPgAzI6ZuK1RgkTCGQjquq+ZJ2gEnHpwicRkpq3rRrbiR/
ekEtjsXQnx+KX6G6EPjy009E/z9U03TCDso16zZZJEEgRI6CLd4Rq05UBAye
eDThzlHXMnaeZanAt5K7R2f36DsbHzROyWUQPg9EOwnSB4tyFutSwIB0QEUm
q6Rp58TW7eO4RpzAzWs5RJZPHiv5TApssdgJNH5mYiLQzhc+lqVmlAlozFHB
3Vfv7vmJklKRfyK20DGs0QltUiRFaBuWPkvWakqbCYH8FhZjOPxFWsx0C1kR
J30lI0WXDTakujNLhxlS07VZprkSsF4lmfhyyS5EkrxpDfFAvJsm3ttKZbtu
Ob0tA8dj1CkgLjRC7rBm5ebByZYpw+EXsQ4kO+DW4WVLuCKeadcI8lNYB58j
K7SsjzpbxyJyGLpqOAoPQsebkhWDoloBL+kpH52pVq4DOwLZGHhjFPoDAEk0
RrMjm/Lo0R7uxNOq5hW90DE8ATx98Q70rCsYbu6PJw/9DkbmqgAY+Tiw0nXz
ecoleK9o5CkbHfkU9GNJh3d9IpYo6Wvs8sfM5cEmeLIRVRzap2HDPR31TD+R
Y6zowXgUG4xnrNZa6EewtPLgMU0e6AkDydiuV5KdHj3MV3rW1ZiZyiYRkrIF
u4/v8yigt0AlU75Lig0nEBgElzUSNJBdxr0RQ0M9Gvmk4xsaM3+6GPSMgLOJ
x+bWNkEyeEXqUishL2U8SPXgdc9IzPKlxPWiQboCXDxaGgtGqJ7RVaLz7Gcv
7AgcHiaTro+PyaYn8GoDXSsQ6LUyJqFuliTMQvRGrapcvqschl8c7IN8k+nS
cjeIjSUjGth/wWB8Go25Bha5SC+tmcZs6JLvy7QaEtHzodCAl3lKt69pSJul
6wIIHQ6uicbineyajs2jHdK42TwjLtQYTltu1X70ATdjL6klVZHRS7pfE2tz
Z3CM2FXXVSWuPXiwWJeH30noMkwvwc2K0fE7hwI3L9b8zkna5LLHztCdwTaY
kerJp8QPsd5jmMTCUiYJtgZraNcc8Z5yZYYtVnPKnJmORxKUd3h4uaOS88tY
R3ZpsFbPj1Zk+HVENkSqqfqsiHs1TDNT1t0wbNbhxrM+ob47bCkQ4/QLO20z
MpVB1p8/O8T4Tz8RO7N4eLlyNMGlSUs9/y2zL4jPNU41SYvD/kP6hPpDAPNw
igzNsSE7hZnyHLtMvzD10iyQNKDno/gh4XpBemDpyhVgdlA0G7GVtigOrXWR
eUndBhmF26X2CJeD/YyAnrXYz2roJZXeGwZ7KRtuTC3Mld9FhhCDEuhdnz/H
GTM//TTA2OKDGNpzci4vXoWyaZZ/hq1ZEuANzFq/chWlg0TwZim4WCA+8bhX
ICwGB8xDBBKxHLISy3YI4mqaYUbGMDRosShS8P5JReoUkqlEYbGqj681cmYc
l1hBNa/4fs5BpUhXnYuTlU+hXCdzeUm+1KICzE2d72bNlZSQ4gpGzh9tfE0J
U9x9qV8Hr4/Wy8zXzwYmMW4gRtcfAj5qdSD6xqtn58+J7k6vNX52IkzxVhPS
eS/4LWVVDolXFjw52Q/wljXoyjpjnVG26mpW+cHlIc/AHa2ajrQM08AFxgRP
ql7XwvPEvg5iGBkbzmqV6dlZl0Lmzo3u4pptm4WK5Sqw5SDoO4zobDrWKkU2
je4QJUtoltiF36Qw9HEowWoZbtOocKY0iVwSCvC2iTssWsQ3jTcu/0RyjBkE
Kaw0FRQma5LLquhIWNa59bK58+Bf8BBWxo4hv3DwVeE9tNONWnIW6gpyZr65
RGSr6XlaVbsNF8FrnzLkVQT2FD43/TYM0pQ3nh17RJOsjU9JEBEFpKNvaCcl
dsg7ueOMQ+vV71tUbFNhX/sPypJD523e/L8YEtjZeUM3ucqkHlc8P5jLwUxg
M6utzn5CCbk4BW7DPvcXEpEOC8OHSnOD1+LwOhLTuWMhdJaompdDyUCoh4Tq
86OjUfI9TW3pF4WtyCoR7lbznVWMSUfqFJAxWJpGIkg0T+rc0DFcVfRclhR8
xiKMaynIkWZZHSQVrBZ5QVoI/Weq4lncbt6SAinS7MS45wxd3lghQ2gDBef6
sRJk1KogDsErYwVFggqZNYc9jAneYZXsm5OkP5YVB8YWnITBt4UUxSTNl4j2
eZW/gXeR3Yg8SUuHTl5M4UknIW9YUYR7wNoMG1Q4Ss6g/mA7C669kLYy/jTV
UlZb/FhOmJMuYS5Tz8OabjK082mSBe1WwTvmt2LLyQD0JVEY2WfWV/27SDKx
QcCaKK0hLxf5JG9v4x8LXWJ0wV/7N0uRlm0X/De/wZkHBrVow3yPNfVFucAX
Iokg2WsuBRQTlXf06LzjglOtkU1yjrkivQoyZOxf7Sy+5b1iH/xAdjZkP1ca
1WDHVmOKS9M4Ub4xzsgHAXYDBO+XC9SxHDp5efrTT9B+rfLxy8//+oy+u2aO
wbckOqYven2DXbK58XbUtxW4kJodLLgY9JuJmlNwpRjYer0hgtUdOBvX7fet
5sz5B6koQxCDpNVlcH9Znm35e4Crzhsv0TCLV6EB+nVV9GifUY6PFNbEY6Ro
0/NVV0Qb/wWdqOE6a7x5bO/MyVAy2ZZNrjWHAsvT3UZYx1nRcYTE8cTKm0MS
18w5vV1omhgM7yNbgLBwwQiUvNV5An8b67/s0MxLeFNcCpeaeJaHRNqC287G
TLtaPW82LJ3OYBnqr+Idukv/4UAy/nZvsOX89PGForPhDkzF2N98OPDsBroW
poYtQdSAFsmOQnt8+9feGTkka+hvvTohK8FuymtCjP52Ct4gX5Dmzk4/jqbQ
vS9j9jTycyvIHcee8noZhLNvo76HqrvGU50GT1oH7ZwLtWehxR4aQvo9a9hf
MenWHGLpVpVHGDuz8b+ORqP/BnqkI6/sVOSueNV7JHdZqwrIOcACEkjP9sxE
N7OKHXLYhAoxMngpIhSByXGdrhYVWx9M0UQ8/JNbjAAhRPWYh1AIdYPQRAb4
Vs42TCvxIHHdkKpA1ii8nYt1A17jd1WW3jQkSsQCJE6bmTj6a2+s2xwhBcsL
RgmX3akgnNhoDHiKpapffv6LKxvVT+7Mcn6X9TOqe+2Xn/8lWbI/SXmJZyRI
QgEnjngXY4m3hlnuNkSNLDOuOIz4vbAtlYZYFXwiZOE2yRSErSJB6m/oJdcw
WWy6XX9PQz14BKv/U8ruRsdD6R8rqR7EOJWghsXNKeZHxDie35hiTvTLqesk
stVV4mXI14jmAKoRqC50F60HNIvfmkooAAgh0uhoGweea9OxkeJfgjtzWUO6
Zt+6rdhze3FTbjQ+JwbLTp7j02O3PJVzjYSAHdIGpDLl5+nuejKKiEcPfkI0
/K1AMrcgJf6KbG3M8J0/gdy6zErS0lMHH9J8lQLuTroVWmY25CPE2+pqVQNk
BN0+fGXmPP4XZNBjSlkwC/X4BJLqy2e+yRA1fFSb+ZZAsr1Qh07o7bmdk5xC
ejbewlBuOFWnYRrguXCdUfV0SUXFL3wduDE7xK4M4WYgOeClqxngvg4FDDAp
MBwZjbjEc/a8pRIWjE3HlS/YMXD5zBhHc5jpyG0CNR37kr0hMK+sEsNsmIMj
eam0x/gYTJ2Du7y9ae2E+jRI7w1OZxCfm3Xa4ZMMFre1GuGVgB/xynqnSBUh
vt4sRFVzlqzHWd2AFyAlboRiwvZ9dxizxbFFaONr0J8bQ2hU7e1q1sJwnuaZ
JOmacp5acByn/qQ5LafIZ7SvRX5h4K7qEH/ktXA+3NzUCqmYdI1KZHUv0cIa
NszVbU87/ecub3K9LBFY4mg6rXSHq60nOEju2O29o4EAIQSnqbNLu2oDrFij
y+u0UiA2RXxVWiFwYPMnobqxjik+K4ksi/dM1WBJhcYRmkuY7Hx9JajSBEOH
t7WRKd4JXOc2MMZF4DBLobo57cvCYRronPIl85RgtEYPgC4NV2xe5Cv6Q8X0
zh6rdAkHoJjJ3ssXTAZfjswmDc5oNpRFRBnZCBIkgbc1nAerYBhsCmvJQrPC
5G4e4PWLp+d/fHUUfXXEovHL93MQS/NwFXDYlBdynp7BSjDl0rPTQ2YJmuya
3A0GgdbGuo38do8BAGm+lOxnPMnKINtV0OflysyE3EXP73jbSoYM3mNMGNcP
xAuKVrVJtio6MT26iMrvDRTDKAGx5C5YgJhsCpYOX5eLtxAzuze6JptC3NR6
3QVOWal51neE9z3IlsDVrg5DGpd9y8VuWuG/B4bshVdf0doQZgPvK1GflRyZ
wEVbBqhzmpcZJc8+WRPKxsKwUT2fs/MpSyy2MZ8GUG+cjRFuAWN26NYbLp5A
Wg6CdiRGhT9oFgxgrPkMk8kLeCIBxV6KeLOqyOALrNgDs8X7ZJXUGTae7By5
2n01OVSOAIq6MkWR9B0hKy1/t4E8ux7MVK3yEiz2NNKtUkbROPcAWQ5iDA/g
7CQDZ81bYbViWhaOUpzTbCzx2vmszsSEhlHgXF/egRjieje8C7/ai/AVboPB
X+k3CDDMTbDUUAnz9h3i+nPuWUB/rFR5TCfoRkA7zHY0BkkENDESJ+Y1prpL
zEiTmbnq0csstLPpN574tvr/Vf2lBwH2oDPbaocPvI95q9rpXWEWM7jhD1MC
wR7Z3aMbNsB9UAOMiK6opheoYZ9jYOftjoAkvbD5FlD0KIFYbujSsXIOS5me
nJtKsmkkMuCrFA1dQCXf8CREr8ZGMu0mguZkhjFiUXiUCWhBaMQvWM0zUzYd
wk/qb4lPwy1TN9zyDg1SY07IMOG8MLpf4E209V3h7fnQKeBoXLhEGMAKiXTU
c6MovoAVTkWsBvyt4OSyr/Mg38YYd94lVlC93Bn4YLl6X1YoE26QwoKzI5ZV
I+CpJpethOFCxkr7ot/OXPoQszL+bquREpAwnlS+IAFzmiedos6aNyoImn+V
i4FfaMOzsi8dKc+GsxYOedUs2JgNb5fKjFdaVDmb69ZKTdquLjXiL25KkBjT
xAQq9VT0It04Hhdca+1Ghw9chCO3pmLAep8fBEgXSAEQbchYXGJXzmENxmcw
kSIMdrWorGBJVZWGnyXcEfr4Tq7y1loh9kzXATIAGnigj0ANtykKgVjgZAXF
I/XRA4fwXpcWQekyIWhqIHQGk9AVuhCYAXAf8ljNSdqqCLOyn5DN0gzzUsP+
R+x5DNNFA3MErgJZVWjTKSYJaDpnKviT9ppKI2c1hynWCqOYAKDTevQI6CWT
UUI0A3OXgZX/A02UZ2Q3YvwDCc5zbw6WKbkRVLDiRb0g5jX6zGiFQJUXrP2Q
aiBav40FRGo/69LdhP9jq9EjHe7ti+8bARXOoWLFRo2331REDCIrRcwbMjld
J5qdDwsGv6QF0PUyKSbSQA+zgu6LsfDgFilEC0AJQPaJ3bOlK1fhDgICUaC+
tjo2xLxqhRBPnDTVcekwKYjNv2goT1F7XQvcH+0JPK5cxphJa6M+2nb4mVxJ
jtUCl6dJpy7hIXUgC07Ngjsr9sJey6+C3cA2CKPo1ScKd6aquI6eKeHesCBi
+MQYZRtm3aVeHyrNPNUbPStQ7E7UX+u37p1KU910NMaPqzuAgZYKEJD6rbIO
m+H3PNQ7IkxDeLTqGMGYLnz2JwU8in5wiy097GnvMa1LSIDdQ9t0/OuFrlfw
+8gcxeE0Gmp23nxZNYqClSJRTHmrqTHH5o4OLJAHsreyMxZRtm1j0kDtt/R5
G/qzgvaGucjLM4jOCMb1YXNFqgRtriBQjwIfnwKqrGnojv5uUw2nKcLcv/z8
F2HZOgJ7Jz9/fl3lP/10z4ppl2xJC2K5wPgiLeroI9VbfRtxeEL6D/W2LjDt
Qg9VuMKm47CQODC1NpiohYLy9BqnrfSpmwLfgQzTRD6JfqpqTSZcfmkRYz5g
FEHOfK5ms7FgZTbyuOoSrDlwWpMA8LFI/nipwAnIVxn582ctAgq91Rln+ex2
GysepGWu4bK+lgsAhxEAEDNdRVYqqhawDqbwLzljScuScwB+R25yBCm5Ei7r
cndVhwv8A58/a8lDFgIOEtODMpGQFRvyFjVpkjSrVvxQ7erpbNan++tL6vDU
WF8YoMww/v0QI3Cln4EGnm3pck6btb8nd5xxBLPNxi6QryPUIYxcVPnA/p6E
sU9R+kVD0/pCmjChWxztm69kLnAvzvowK4dl9K06IifB9XrFKPlB86BV2AR7
LAtmw6ORlYSKIcLPaq/IW30BheDyb3WxeT1mWTUtLiasJHymaP9UNcP2ekcD
HdyWJF5J0w1j7UxnHlWmCR/IrWKB6X0+eoA+Pqnxko7zPLZlxpeBJ5cZcqNQ
wEtOoEXUbOPUrO/kGnvs5p6IjQXJ/cmIyuQrOiBq2okd4DFxdPdHybNGcmsZ
xINCCbYiCKpeMhAAawtsTIsFaNjryX5Yc+mIQm7LniaRC10oiNHNBfePMfWw
LBDsYu+lwCzaNp1eCEK0ay1EZx4UZPULtikYNjlfUyv8zrDBEvglppzDK4jT
+Ip//uyL5wj6Atd8oKHYXr1SMdEclSPZF6nMiljxFCiSzdQyay6w0gwnYuHM
SDWLPCVkHMxmmrbu/uhOv/xrirKKN+S4euYiwsSObREFAQ1F2xCn5oBnREFh
5efswCPlpUWVEOtCtsG9DQjgQG+PA0GUfPQtF9NsEGguIH05IdazjOBGAEaE
KyGbnNbzLqxbQV/sp7E5ExokqAxnf4/hHTRgV69RAszb0BZhEuYpqAZQRFad
dQI4Vw6jWadpoVY8ybdWui4Ri6g3JIlVatN2e+VBrbMgqiA7zpDn4wGq1kdM
zCbGG4k5Fs9U4pDWf8ZKE8KjGmxLrQ4lpnPgTIj2mskFfidh52I22RIR3uCB
FeNqh0QkhboAKtNsuFLNd4nvOfQtG5nE2JvlIBFMlqJhFlK6gUsaDiQoJLCG
4B4jpkf0hdR2z6bgmULWCF+E0sjbZyLwhM7sS9uQT1hNk+RO3eWtKAnMrFiC
/aiWjWLuAvmOtBWSjyutKRIr7V+EQFjPvKQDRcegt6yHVLfGnt4FgWVbFKqU
6plpHs8hKVr/yaWNOg05yaT/CUALvpvwQA4J0WCrqUhED04Ri3K3OmxAaeWc
33NM8pAuT5mnULGfpujFmHLJhjxLzrnULGmfd58enZ7fc5Ph9WOHGQIBQ1k8
x/FkXMEX59XMjGSjIXK2DsLeNgiN7meyvzokz5GXzPA30/DthZdenXMvqgpp
16yZMyG609lqrtixWmJndJkBHWbH77kpuuabJhqZ5G9bLYHZ/JfAnL0yE4YO
NMgdgXVIz+L79nxS/tX0cH8f6Ch5me9LgKbg73NBmrx1E0N4QGcQSXbQmbo2
pX8IuIqcsfFGFqOu+ml0dNnPO3r/Gif8wvyYJ+9SIi37JX77kqiC7hKxsbwo
0jIOYPqYhIKKnFW7UemGzQoDd5JxfR02Amr8Qi3C9MO7t01y94e8ZsVMCtS3
LrOwuec8C+dBJjVbZxLQcAViecQwnfbElLmczZnGNKyqcvfkpDq7xxQjPkQi
umpCW8yrQwgCNeLoFN+/3VaMzsrkEK5pNZqge7WLZ1rZEeZ2B+G+r69mZx2j
UkrPasTKe1xlJOemu9ZCRG0kjaW6usJeWwb7x7XysWNIfRqVq/1yIEiXFnTb
kAuVC2JKKkwMXEkF5De41MhQpQ4Vl74G0UNHB+meNgeb5UUMlIrr29wyIQmJ
zBeo7bYMkll6xaYCaPUhE92d/4ocZfYK/reek1I8gZI5JcqwDaFMq5ojDa35
laRwpV5PTuDRvN1lRVbMWpl+Xtuy4XLSLqBKW0Zzp+1UPV8m8me2jdrAI+Vc
XmVsLjkuaz6pbEeeOoeVLwzx6Qxcgy6GOt/d69hblk5k6WAkoamAKxT59X2P
mJDItIYG1BJdF6kT5ZyWwHlGYe0V9+KmW0n9okWQtAeZEyTh8e4GUEpPlSA3
ZzQxOkcUEoZzyNmiqEG/Kw0PRTyeSCcC5ENvxNIQt8fO2u6xCNsOFVykDmZZ
46SS9fAvsiZ4UkIENwcCpqkvhCDvDNL1YALXpSaJq4b1FWhfjtiCRaI0ykxJ
jG9l0G1BSyMFTRosluooVqCuL+1sM/RMFtjkQdU4B9lg6VaV17vZ4PRIkW/L
7XFNyCTQWbHhCGS7AKkxa0cuIl3svVHUKAS743ocRCZYJKXZ6BL9XtB79juB
Q5TrFykgMXcKcaDPgf+dVUu7waFwH4o9YKvJmTZ35sOUtMuU2C0/BOB6vsx5
lUys6rK6nvcBbCPOVjU0pLuARJfizGRXOCN5mYqyxGOxUJX3qj9D8Qk13+9m
HZZ7CUAVCkE7FJY7y0sLbl2GPkh76jq3gfcewENKQnufdixQXdBWqW8ue+Ml
iv1ZbEmI7tMQN2LVnPhEGiIXLXW6u5iVLpWyr/JUtWYghF5yH01ASgMjN59d
arBAOjdD5QsVMH4Pwtq97MUDjmbbwvjgM43pMv3DTZ8FM3dNO6YabudqM2TO
2eAAYw9J2SQxnilms2INypSZ8xMGSSCK9ectRnlGUcNgn36/aY36qv7hTtIL
iJ0ufQmPIISgryRNpANypjGfOpgVJrOb8n15I4277GvUfZPKSrYeC4mcqei/
odHI79XSVZp9JlX31B1WWneYFEDcmj0TuNOWLkDIJjzgyuymBZsUHQ6BERtF
lmJZQ1/lIWAQvFOvGQLs0e9N26Gk4JJum5el/L3ffKCbVTZvIO+G8Y3guJB1
GJI504GPwVsoppkmGEvU18aMZmnT9rJyeik73tOhVWmdv0YBARbOQF+Z5BlN
3H7ulQEuhULTJgkHkEOIyn7ZNU2qCslL9M3srcoUK0lB4UqzzJ+LnNREJjen
gwciN3CwhzCPzMEeRGsFdg9VnjTQidpMbO9UAvpm3+rcbObWTuoqzaa8afbt
NtESPiPVsW1hUMlHYWuq8UqWOttmHcAbSrFeSRKIlt//uOiLVoyTTZP9sjYD
F9dQ+MzAJyELNqbibDlXTUr59B2gI9UI0xKzUU2TQULnmlW2VoNVtJhRo37U
wf7BwU8/ueBmlDJ2q2KzJ94vPrDtBVRx5AAnGYUstBinkdDrRIC5m2cDu6pA
BMcdBDRbSYr4cpiYW/1dyUZywiaQTHxUNlmdNx6IEdSwkHq9KkKJvc87rSsz
Ra9i44xbLXXkU2zhCROy8Ih60pvUvF5WcDk4DI/NGszcQYnngGggnXF4pcxe
r4Hp2NkJ61dqxIG9j6IXVah4MHDKI4ccYPHwimnD2C8k9Hny9kzJRlWf/r7x
7IlbcCDIZRw5lG7fQxwNzX/g4YFsZx/8DG6Aq2TOoSJi2+dkGrxmFT45QYE9
su/n569PmnuQLWDAHulhFchrcSgBhTig66VxJVeBTxbjcA5fg7FhNfyasiNw
i7zDhNTjB7pXD3AYEOHUdbArWwjQsic8KbVw++kqyV0rIkfzdM0JjHI4HoRz
O4/Itfuh4X96AdQ7qWZrM1nAt8ISdKKbsdQEljKVXDtBbmu5a/UCq6qpWNyt
nrpR8lx8oyxlB4lFXGitPLfwV9W5+yNOQkow3VPNlVMPJxLuwDdES9VlW60F
x3VF5PQNFGm+Lt8oYELyazq4ctcW+OoSsoWxBMWzc8X9ePhEL+7bL+gdVMgG
MyaeYZFP9Tpwc9mncl+3A9ENjdc7TTRcH9sRmxQhFacn1SffFS4I9QqrENW9
VC0+1vlfp9MLYVsBKhkqCAkDsAnEfvWFtysgHrpuHISCp2KXCIXS2DR4okfl
KbIjpIb4Q9B52YAmFy3QTfIuXC7JpkBLyd9pmAMrZ5bl3YWnUhCe4pK8Fy15
YNGtRFlzjVpXCqcMiuPgnolT8fddadCvRkzhr2+M16eZMNanenRoeQornfry
DGDmbOiFzXFVEMeHZ9Vx5/e1ibFhhfqzQCwoRqwX/tgMYFil1ArhwKVTWdMH
tix3Tk4kzlAGQYIBm2RWD4x8bc71b2vn57Zi/kySnzX/Nw6TstcP8lOxyID3
VTqYEMRdCNZ7EVhLYiySopiJbywAFPUyCsPAELyLuQ/J2lCQ+kxtP4PgNKCO
D+BHdl6+QaCbwxYqChsWCleGakGF9KnIclo/Hy2LN32YzsDvmser7KOk7E7C
UB97xgHeQp0pzi7ZKOGzs/MS1Zw0d/5rvuqta7BY9jY6h1CvZBFvkXhpzoRf
BsWqbGljRaGLrA3cCb0i/33Lf9HLBiKV7v8PZUWQrAVfuSuvhFIxYZ0YVz3m
O8X16YPcpJXvG4pqp1pYk/jFd/CsHKdheesgBkzkX8qVCGqs5dGONoPQT9DL
R26+gy/jQ1gcbWZS6Wij/p6gxJSe5C10cxr3PtkKjKDbWmyt6Ri7kQtMyVZe
+7VJ9xyV08T7uPwKXCnXZOK7NHya8gPZ6tTPuUfKnoZRhFB9u9fnJn6nNeDC
KHRjS0VeQf8zy5XgFMvmSvJGm/DKYtpOnrkIduUL4AJK5Q/KUp6Ubdw5UtjS
ji+qddTE5rrrXLNZFtCmEUvAAL66vL2FFh8jWM/d6iTK3i/Y55PqGTvmvMpR
oxkhPRDB2NcdU+xBr9i7jy9wVV/FXHE6me37AEparyRZHFpy4I3v0bz3IKm+
YdGT6jHhjYZDJYWUzowV3z0wyyhBXT32YwB2U/l8GQuZW4dX+xaKG17rvmtL
sUGouUquee3KzNe96BFnUIiYSK9Sq+I23u29DTkxZ2AKGa+RFnFNoyBBbF1K
+Fq02BBPyW4vRNDd4Eq61lkuHrgrtX8Ep1RLSra6D2yHCV/oEVYcPa+6iyhF
WxoiXDPlCIJyK9X5Ld38VrBZUt2x8gW9bAgoLOAnYrc0YWsGqQcV7A2zr+io
gqYjYTYba+JaycSnKkwK3pZMsUB1lgxtKrPzgA6jpHm+/EILNrlti15QScgZ
N9hq7vA6/rnLa0nAQ0V1gTlrJnnGrAT1LmuBO3nXvfplgqobksDjBtFIjVzM
fmg29saTnvSi4kJZyTuDjjeucStbY2hL8qt1FNtl5m+hqEiTnb+NtoKx/lYq
i+0f9LfQW1wfGHQQryPAZ8/02t5wsF/d0CvHfHLqVgD3i6ypuNKHFF68FS+1
Dg3LPK83nmKMzkwTRnxZc2/nxhigxrn4+ToiqXKzyuwN8UHYEhuZIxu91a5j
Yr1yAKHDOsil2GIcbzugNLuUUk7VofQquju5lxxdVrmkFUiAR0x7BZQpTsDt
Zig4Ktu7ahO25SMGLRQ8KQWGuJpzWXDXDkF+hc2gECvqq4Gt9OJBDUUmYn5h
W9W+GqxeKQATFO2HN7JvpuSb/i0SDyGTFBgDFYFo1TeJsnoEO3Bi5aRVlLf6
8dII5+1wZf0CAZ46nak6EHJAHg4glLE5Drw+NzK3oYb3b53moq3CQ9RRFXTC
guC4ZiwhsLS4iNqH0M0UAVTOK8/K0z7CGdmsnN6lUWZG3tUiubGMeeeM/jg7
nqsLNW4YC91xNCW+Azf/oIlX3xWRMkAsL4e8ZWx0eL+b7POhv5nOLagIRQD3
WKdQ6eehWvwV6+H2jrf42N317Q8b5TeKQwN5EB3nqBA5AdbrXunp4As4p42F
l8GnvN6gyacHKLkaD01VZK5QhqvF6D7W4gT0SC987BdwjW8Ig9p3X/OM5B2I
VwfVSOZO42MMERuMfIg+iISNHCWvfJkS/B2ayJKuFqxZj6tjhFQZJaXy10Y7
ibXVoH4wNo57HUMnCqzOgUabI8hdiNjrlXfx1QiYBoIQRLBt26SUh+nUgRiQ
xEvPZyS/FQlqFpNFRwkHpPil+EddurwFB65+f9gN/BRNwgeFSTNFz61+xQqU
wrHLCqJ4sfzl2+AQglxuwpU/KdcSSWDlhfO6Eb1nLZSZeCu5bb+B7uas5r0n
T3YbW/vGSQuOES31+2pxKWvjWBmpfvgYpYjDoGpeO0QhBxnKBho1M0Rt0qIU
fmUkZIlPgDyBAGCCsa1gSnPV2DxRLCeHA7DIJW2eY/2Sr/fS5m6G1ek1sBFw
BYZdSDUk1RBcjeL93d3dpueR5OOLNt9VTddeVZmZoDhCKduBdCMEuiUuKyAC
m7jhKvEHbHUQB4a/rFEMnBOHTW5+qWx/qlWjZsmdoMSYZCfc0fQE3/jARaFD
XcUJIb+r/8hpq3LQYD+OaadJ2eWNpDZjcxMF9rB327ZMKzNNGdAOyAoy6tTZ
kpaRWSK2iGwc3qlcA1kC+APrdWKJItO3zDj0y4l4UpOXiSMo51KFTctsmIXs
SAZvtyIfeDO7UoOb0LWDPsOgdMH4QF5WZH3RX4YoiTMHpc42SNImKun+myF/
7NrihVE0Qf0jgXGGUh5MGcoPHYuWE8DdSJuLQ5T3453A3eeoBxmFl2mhogbk
RtqYphjwDtHLyHZBSpttaqhFziLjX/otT/K5M1ankeHM28olCX3hWohHd50d
7M5jpmzOHych2WIwElKsM1s9RLtFwZOIa689nNKkqNog/iBDDpyLAnEzJKvi
mwwbEP4+rzjBqQGqR35oo5Cg+GnMbIbU0CsrTpa8mGbJiHaiENTXrIlbS5Jz
rozKNrCjvWClaap9tuEn8Y23u9LmOnflVVpGTM8uQ/Mb7Nszrs4XRG7t86pa
rDp0z0NTVbprdYbazkQ0hdSE1BJ3HJacaXqP2FUgGzvYQJU3f9+3zECUycx/
AJ+ewW2TbPdRwvV2xVfll0p0lWkix1Zu78ZLOe3kyiWDBBxOONWhwLyNLQsO
BXhAdDOpMom9kl1ej7xhIGUJ4HEw9SJdNd7HzdQl4FctwhBkgglPs7MKCqwV
gySWvWLGa1an4k6x6ZwyothUCdrhr1u3lIhRNp9f24v2i2vDFw5Eqr+Nccld
x+1VUWbLatqn8rbX8pnFdLPiFh3s5BeFTlcbde2RyLn1nTpXcL/VFkcQtbQy
czLguNhKmhCZ0KvahaU+hNmdMiygUggdoRzhTbeAGtnmQVLtIqjenYfxmLiH
1jWzDwvJ8Q5wQBXaBX5z94ePR26kpEV8WYiodujKQ0Fg8+jWExHmVsUqjyQ3
KZnomUInRLQaCSfITUT1ITX6ZKZWbYOnbed2aBeWaUjqZpVE71wqYLxa9FZ5
Hl3sNHVFMU1OAyNjvgUaiB3MRZW6mrwbw8Bwc4SRSGFyFA9vkruch700Q4F7
zYqqypp74pNeFVUet6DUJn+cqHrXN9qUNd0bxciWaap0RsQ9K3olwyxAzIFq
fRqZWkDSetolusE7r2XrRslRP4dSfArSzI1YAVm+0i0i88Iymhz8MDlUBodr
//z5LO2kmS1jOnG5+S1I6w8KIkPWe1300OpdEFMMD55bC5OBeEGpOQbjSZ1T
f6IKdFlyJgki07ZlJ2OB6CDy/sRdrIKtyFyi7gGEjt3xXFGBrtbG9yIlyhpe
U2SecyLhMshjJVVM+K6vuAbslK8hhOSq0HzlbqcxttFXgbL+2MiIzNsAPdRw
22NrZ0krQZYggo/W6xZlXRGLFCvUlo5jDKy6TuIKp9YvbRNL+Bikqi/7mMK/
hrxPa1mF4TDrZ0SubWAoN46VO/bishG8qjwI55Cohyt8u6phKWxZGoQfW5hO
FuFt03hxA41R01SXKHtg6zGy3pjXqhmFIRLRtOTWe28pO/ZgoPkCbS4By+df
CUlZB6uTdbp8xh1aod+kgf/oG62TUzffwKkQVaKjq6VFbxspDMvYFMQZhffm
sUdCLCv3ekgHmqzin3ARoZDVtuEb938BKfmkG2EkZN4XqofGWof3rQNeGNwj
x6tFBeJRVLICGAoLij2+dXqljhn2PnlIr9s/vNAXR/Ah7S97QCTa87IqpHzv
EfAPh8kbtXZeO2tH3Ajsyf2V4ImeR3kbgoLl35vQ3trZOUNhEAhd0tvKUgkl
jrtHJpqPM6fJBbtluDr6DQEL4Xu7ew8e/PSTNhje39vTYhwz1P+LX3Bl+UVv
HpCP6OHm+rimrj3CJmKZRt978miPA3h1sia1l7ZkZite574FwCwxYmSKrsDD
h/NBChZzZNUdWaUOaviRmpMKHJK/cFSTCDGtNKJz+HPFrSzSTDMdC+lVY1tR
LYz7Iv0VKVE0ANIVQNpWDeAuP7UGBSQFgOc2r9PMFufTjkvqCbFzcy14ZTgt
xznj3neCs3Xml1Zr/Pz5aMKOGT6kN4JIJdq8/0C3ER3i+qcGdyspMmljS2Rz
dkUfuCx+14EQURYi9HltUXmuAViNA5gIExTgs0DDkROVNr2sOqkNoOPyPnZL
eMCu+hNmFpyXnfW/hYgIWv/0AkVcyz+AS/0T99fWoALczm3Opa5dmAzYZk6f
szn26nKTO+grZXq/lo0NQRRrcs8B6Da6oCy+/a4iZlcb29SHdb8UTsOoS6pH
v0upVK5MVF0Np1xxKbiXh/bYm24inDS5ywVYJY+e7FD/Zzie7ql7k0i3MBo8
tzaxNKUR6JVMqlEJxtuKeecWmgULwV5gWAg8XdF7gxrGrpwRius4kqdzfxPT
ndRbtEvuFd5wgCTrAyXJXCDfHt9WseAwO1sY7UDZnGuEfQP/j9BEwC9dmaCS
zgTwbhtaE3L3/rsNDONtzD2Y+9x+EepM23f8qV/3iiu5SPAqTNGQLFaxGGcI
jFvbP2621URl8PrsHQfgHft3yq/vuHfHNQVUU9PqsVrkz0aP0MWVfYjMfV0e
olXJbLBHHMxC21DBOQoRGv7G+5YiflPV0uYuBR4LjX6FLwaI/ivueiEcQwpJ
tuwaY8oVic8N+aawbY/XTEEr4DzewIiFh+O4KsVB6FxPb102j+gBfz3IcQP7
0UM6YnLXlahUz5ZvXGUHbsNeFMGIzAFwnr6bnMwpKExqLZXro/uRwanQaRT/
XNJw2+tqnJB1myV/SNdxYbqUc/srOJy3AKn6RQFUFUyjDFjwYjqbei2lZaSA
SUUqDlK/UCbihhZhnz/zpFw4JeiMuvQE4AP9qndsesCdQ4ZXgihi+23CtI2k
BUc+3yqlm3rYVkP+b5gZFlBLBX2ncUFEY12xjrq+EjWrDoGRqJTPeAU7O/gP
VJJAeROFKoSMuYwDwCF8lTSA+rjhRib4K0TXQ2TlFSo3gXFN05WUCZ5xSzBU
h0qtW9X7ks0n5hBz431IcFRzWirDI9lbxb/TbU9XtgdlXLfLYTrE6sgq5eGR
3NDgWwQ/bWy23TQlO4o5go//i7Ms2gV9zwAbME1du2Fb8krgOyI6rVerkmKU
XvO2Sn9oFvi0rMCbLX1KbImKsJDfpbhIpVqgkqfUExWNJ1SSggQ4xrdmgUct
PDapo61pN9pgy+fgWD1A2jFBWXDpsmGyViD+d7baMW9dZA2pPNGNSuZVlYWt
8xiMFSVHReXKFnHTj3mNij9S8kMUhPw6PPFA4GVc5E3AsoE5G3LyeIJfefm0
kCQ2+TItgj3sD6w8DgkRHCauc2kKwUE7ewgY2ZWMlKG7Sf7nLnf5wvRFpO36
yJuSBjTyteQ6gwFGr7fJJ4CziI5X17nUgKf9lKw1wRWx9X0pSeDdEprTjXzH
oTm4nM4SGjAUoW2VlLnmZ95ciNcDgC6gQze2ynVc9+1qHDLS1UIJ/Be+f6g2
8aThyCYpM+bFnPrdFyPfr0z57sU7MYHvP0YmLRwAv/z8f43p/29evXkmHz54
9IDsYyzywpiV3vse3IzLpbJmqcU1Ja15JqmgjNyeaSU1SVuY5fMOxZYzshGr
tX6D77G4byxPklrVYe5i1YR4Te77XOqSe4ethaodstNCLAS+HgAsBo516DDl
2l0EVPaQOE6+yiVjW/0vFyWA0tovnAHytSZNhtB3LsqZL6UzXFSGR8vEWORN
03HB4rPpojBdxt5kG0JA7KTRTEAu1xhmL1S1ZYF2H1UEvjo91pYkLMtOIbaP
+VrfpU/uaReJTVC581kGLKDpyaCA34t39pPHzZMFyjX727EGEwLxz/UoCqGn
/cd7RGyHAipznVtGPGn9fuOc8sgvX3G1nXQZx1ymuKq0HSQHKtfDClgFnAOd
px3ML8A2prHvVVc6cHLcVMJHdyqVjjoGqYABv+SZKkTskBhpZqS2p60ahuGA
2/WXDkX5+S6CvjjZF9oXPDnW0V0RaWpIhQtOkfwvTaFwY+v+Y47J/ZCkwIdF
cj+3SGYFTQEts0W7DgDNN+pTeS+xVUG4WgYGx0B7IB6w3vItl8c6A2bNF23N
wTAUJ8ybVHs+2GAumDepGlOeRVdbJSPkIhDSNlC4ZY+FhATy0EhaUaSjcJUF
a2C2oTRiNW6IkFDUc5KUjCVDRXyIrGzspNCOwuZJeleu1/a0sYcZuDpg7P8C
KMs2JvuTxClcwQ4bb22CqmC92Kjfbe9vp0XbgMs8F0QO6HphQtUGzhphy5If
raP61C4XDUagCWVwxDq+NsXebCjygYKRCro2UlMCh7GDNTg69sckHPubp+hp
dW7dgG+rq0OcMC/j1My6hmz9b6QHsvK9D2Zyek6s7w1quvFk1lsMlUDZQoEg
+ZYwp4d7jx5ax/CjPS6BHnhz6oquXhuEy4dplq6k6xIz4oloLxnjLckKcn+S
KeBDMrWqqEY2p2ErDh6nr6ofG35qLzSSDBRj4ksAbqRQFjsGRY8BKUj8I2yi
7qAD8no3pZFduiowXjIzeUrqbWzQ4Wtgn7YGgQWLZGmbhoKAVSpthCaSMW+2
atp2nP5XIKSsCe304aq+rb+LdMeXtl2iXWW1tFVAwZ086duFKy9eqYtXLhXi
hGgtpWrJSmCwXcniHVg/q6bRYxcsPxTb/8vPf2H9VV/vpCtbjluSaCy4+tJ4
hoRheqrWBjUMLKLCA8ORuKcOGJdAyZWxYaR5eoyuRWQWs3uqK6PslklNLI4P
81XQPoljw0WUgad0E3hOMYL1fFix3iR3J2uGL1oqdeViNkgBXVla609iC4re
c4H8qHuDYHtFuw+jMaLUdyRx0lb1Pt1SpGzivVIHCWadJAu9eueq+MXpFnL+
d18dP3P5Q2fn79/eswqHdyOr0op+vbVx0BCXQQ7ciUuYsL0kIQxbV3hKQAyh
0sPx5Taq/5FrBgjC+wzjl6yFsICx2h7Lvs8D5T4sjxZXn+wkMjJZRtkEQZNp
Z1yFvCohqLHuHJ2yJytHPwKc5gkrBKQecQCBq/ccsb7cVOWLLq1LMsLyn37a
2dGqcuAgSP1b3szGpRzl1+Z+yqax8h7feoWE499AAbKZVRvuNEoGW6+6nE35
W/qyOSiqSS/TTRTrQ4sdEC3lUCQTq9WJGhHea9s4VEZrbREeUVUai01sovwj
G/izs+KTc2USJAwkPCwGNdnSqVmUkjXoFxaz/tCoAw/IUYZD1JvIy5dGSFuv
wxjf7kENVqCzgl6AXixxLWXfN8ZmANm4ORxTvHqr8IT38/Pn4zq9kr7HrqdF
cyGg1iDfzBYMQd1XKc2nKFcpURQYXHloWTcFr5XDW8TolBexf+JH41LKBIl8
Zs1zcBK9dSIhYk+jmC8WN2CrsTCY51JsOiCQbKWNHghPoGa0droaogVIMT8p
+qJZ3rbLn/nki6hch0W/rvyHKFTvtntzw0D90em7o7fPzm2sWALXFb0KljOC
vnT987JX7O5KWjshAAJ140pyCHSFZF1LWlcaKyBi4WkQf3cXgfvvISOgvktp
wAizRNrmTILlHMJuNoxUsUyhFZDVtWR0lB4W03239EZgeGFtnCF1fZgRROfy
dmYODG2rmPBLSRnlXEG691X50mRFVwZ4MdtEzbbo8yW3IxidnqEWdvSyn//4
VMTxCzp0Ltf2zn5H8A17Dw8c1mHv4X378/39R3sIccGX6mWXFGq1B4hdR2MB
TwEDh/hXXxukgMKogfMWKCYYiJbh//z5jaH78zJdlPu7ew94/Wy1YgzxhC6I
OtkfvRIrQAGtFhtkQxewMkKKiJzy9PKneXteSYK7uK8ePrkP1qD4v7DjIpLr
6OgGsjxN6LJxKB820PZAmgWTl2V1aSOjzPj6JSFcaV27KU2vEuTnz09NeVGw
o4fHb4x37bOcXrPmCDUz8OKj4Z99sYhjdR7w7GsWCrZuO/DubHiqHgVnkUu7
EbvUFU+X1EJ2+mu72JpPkbVThgiUDmPpdmxBx8ibzg3JSXob0eAWXJWhYr7J
ORDcDOvS1VEpbfV0dfSR9o0CRK5aYJhR2S5s8EMAW41AqW0/Jjh8BegI3FHQ
B8laH7BfaeNH0l7ObbWgcKRXGxGTqOaSFz5zdfsH/hv7dDpxfSlU+MsQckOn
M06Syn16EgexGvXg9AgKSjN/h8sCDITZCTx03nG8sOl/PSJF67NgEVnSqkCM
a2k5LeWFuFp3K9j3OjdomMseysJkc3PIjO0cMCPJPigBZMfPSuC2NAHQJAx9
yaSzrcgF2tCwR3Ou+bcCQBeigD8Q09S0IFaOOKFF3NOXKVmqWpRG0pHVI6EY
jumiYh3G1YoLMPRsLHNfZanhHZ0OSqT00+3cslWII67e9KYAKErHl2Rj2/8k
TZVdXQjZDtuvuxTzj0QzO4N2diIBeffd/rt7ovs0rodhqhLGBnq09686mhLk
HzEfyme+ziedF9fEMFi+FsCSsDaycrToF7uHWIKx0BQcgGzQDx1vzftG9l6w
FDCuWKnm5OM5auiwksRVKQycPqw+WiVDOux2gRsUDyl+lf1TvPiBQ3UVvZtA
2+CoFojZTGGkqYJj3aJcTNRjyyXUoamzYbUPbQMTFj/0FUYDRhfIXAH7ojZG
4Ail9fOUglgAyvIA2wHzUjUDMR2cwuB2NhArUDdsriRr6o1slUB1M6sv+yRa
uwOhT9rtxg2rtYZy3NE86PQEmSnKkX8bF8gdKvu2AlmwbpFosG0uQnmZfJDK
eaJ7LnPbjIlNMmTTOKrW00ZCFZF2K/GI6EQwL4cKb0RnZdbetB4IZOgzTc6D
UMt5h7BZNrOM/aUCeKW7bNtBS+9oVR5UEKa2qRPnq6nXqVdzJg8yv2Bs8jJc
rmMtOdOM8IBM3UJfMj7K/gDaLhu7WE/qPJPNaZT+PP174Sulfa4qibw00ueW
3ghN1tTRS8RJcWU/UrCEjKo0iRQq3NRZkKjhEJqo3N2m9vfBxmIdUOaWxXs0
up1VfYyfgFJygVNeW2nbGltmDf0L9afFL6TWsvICaDM0BnE35JRWLoyMudrC
3mELVac2yTQaqzNazCn0vc1kkIHgp24kYPGpB9ysa6uyWqIlt3px4lb04Xut
pAPybZj2EPlqVqPMYnCTu5ILxedTRhWZwxB76yxwnAMYuxT4sGJu0KPPYFfd
d1GzU8gjL+3iHZuzBVNDh4N81aVKYb7XQM77eerAo723jbxZH6Z7eKha2EQc
pn+bwncY6tbV77Ty3fZCd+LSiqvdsV18ZN/GDZxcyZ4PB8ciENBXLMg87/V+
cgybFg7W6ecOS0s6+sp8oMv7Gv1uInRM9DprRkX9uDeb3YiNYV8jTnjXhEiQ
0UEfYalhqT1GUEfPGCWTGoFuwYfaQCk0I4zmkVL4lKPSRLvAyF5YpxQvGZQR
Vyq87aptUBrqJUBV6uIQvdF5OOJWD1t4mOuzodjX6zYnNDAsw6E12KRBToNv
fOEM94gvX6cR+bCii9pS4q1C+WQg/Z6RlGM9DhW80GV7mUp5duyerb0+EE2F
G2Ey0El9tN4s1A8i76J3y2k1lWC60PaQIt4rnmbzvDnCt0xdQ08YWbSl+7u/
tebDM1KuFggHr6qVCnAW6emFW5VP9wbHOni4m6ivRR4MVy9nKVg9u2pVu/b3
Hz0KKlk5JfMvd7btMNJMK62YYiNsknBgy37YKnYK6wiawORbBvxWAA+MLeM2
GfSt0R1LCuxgN72Bg+yvQRj6dVDeVJmD9qbT6QzcfORBrSmzfWDYU9Eebi5U
UXOxMSsOzfDy2csvyfFSMU8OWA/H1f8H5pgDamHVTzcnUI76bdTnnMqtRmGe
gS3LbPpNrBpDeroasiG4mLfDjp7ZEkqSQ++mFOV2wL6uym8QtNmcPq1ZGpEw
Ga2sk9WVOeaqBptbY/urkxa1sgyH4whwIH8Bnxo7P9kEonEqgS/BVOIujLXL
FW/i5bC2OFB7NDTx+SWcERjhLLz1ZOHOz2l+cHlIfCKf2NYvPu/SLgXbgeCF
rz+TeV2Y2dkHxradpmShrJO3vMQ6OBp4hBmbN7WwnWXIu5L/+O//8T/+9/9K
7sItqPUS6Wt/TAtiqX8sJnjdUTG5x/5SDM5GloEvWEwsuuuG84TUxxhp/DVn
ZcEzwVTHyED/pMd5wUlgizajkomd3ZUrTMWX0hV4d7zejsA3Th2x4SolIMW0
GvXBODo7fvXKK3zsG7a2ENdwYXVSiNE9ImoLu8ijgfpkrGTLtk+hpdZJ0+o4
cjrJbY6pg1E109w1uw32ZZScmGbFWXNAz4dqi1bWiEG3uHXa/9YrLdJIQjwk
ArqxCDcEKdwOW5I8YVdqOidzZKD0Ah53vODiKUazqaRcR0CMdiaS8eDC70EK
MGc3S2mKcCHWXgRrQUNxAS3wVviMVMxb0HmlhrS00INeqNuxCY399qSaRGaI
JcF9Z0NgIRPaos7cEuhA+sVtsDKiqNrczr+yWrMo19tKNmP0d1z4lCwidlhx
aK3iZrEuPdGGxSwuk424Hq7uK9HHUaVChwmzUNlR8rRrEUuiyUgRi6oPjEL6
dVAywlmwMGEEbhUhdmgG2NlGU7F0BVFlqSCzo5fNFaGgbDaXj8PfDnD9HF55
RWDQ6V2YVRs1qqP5eRC/pqxMi9QiGmS1KsB/+flfXRsk2+EJGjHb2VrbWZis
axjB1Q1IFoHpRrlzgcV7qHA+1/o25Si6vf+8oQoQoZO7y+W8q5pFmlhkxM9h
6t2zV9Q/6zwjja0UZFGl8Ah/34va+FZ+CMiwG6VRP4Es2ZY2CkiiNtyOzIIu
HGhDJ2F8g6IJIjXon0fXmmhxZEZBU6nI54lEv3CcHNVIxOOHjA3xMlr/JxJf
/cJ2dt54pBzSSs1Q0YD8F4WQpC73s1txN9NbFklVseZRkRosalUftA5CCz1S
bYEZIb0oiGT2+5QPnDKDARrfp12rZbliRNEZABOgqfgVaqjYZGBtMInWS96O
Zu8TEkpZ3iEqhtZSaLeEUeCfDNDgHlqQk3hb+EBs3mzorbWx7Spl+FwvUYBc
jHPhBazL/kxmznwXLc1yFqJAtQNPg6tQbW3HrW1tkPIdglcckISrUvylrqpl
AxqE7NKRMlOYuZuiBBVBmvTk0KYxap0qgUHo/oaTtg1oz85ej89fn0UpsTPU
i1Hgg0MfK3oSDnLRc9jFwApEtbIQCKkUMb3gknQl9iLAeZP9PgHSSDClTcMt
ypyI8LwaKRyQ48mrs3e8FUEjPtxbjgYh4IFp4D6/ShhHXXqwJLtsaMPbQibm
CrWzyjOlHUNVURUcChGL0LfuLEg/6O2PBYDBYt+84HZr76r7b+2+4IAiMEQF
5s6DT/Iydd27PGLeZxav0nbK4URpqNwVrluS1PUQ6N09PWZfJJivJC+e3zGr
6gB5pz8FqxooxAWwL9s2iAWMbEMyK9K5b3T1n8/uqUPG+onpHUPPSxVUqQU7
ZAioxwXErvP2WtLto5RYb+bOY7DMByIQuRBn0rXcEVPr4mYcufeFm3iZFjDI
7R6OXc2N5lAyXplRccYkjVw6EdCo24S7VsIZ+Ltf/T9+tzP0BnHaHvZZUOLa
WIIO2/JYLp3m6gR6d5OUIWDEYCGxZfYuK8iBn5SbdMee/B28406YpHdHsi9Y
XKGKAzo8jJLkKeJjdVRNIMj1q2aREoymEXysd7gltH1PmAvbcJ712RVROyK5
4iJEreMgnNgA045TvqEjPPexFUVB2lGU4rC+9I3LGpcLp4BV25TKC5Gtzcyv
zTO3ILVe8w90FdN0VEWF6rj2C0GXVeR0i/dZSyi6W6wdGwCdkO1WuJErzJov
VRwz8Em+fsmsQbuga42ggUsI1jIY7C4I/uTL7CKdXTPXNnKyufJP6VwOpPFV
ZKcg3ehFLqhN2wzOIdTRnVPybxVLhLCKmhla+oMT7DagkFqIcwpb0AZQ0zoM
EkuSG8d1xULj6lN/Rk0LQYY92T2wJdnDOvJsCfRhPaKlxrXmXMPCa5zHgn67
oRmG77MdopO0S5ZFN6NhrQo5gcRoP/bAJ6Z5cf17DmoOs80FK6OeV6tV/som
HTs7R6hQI70sRPeWpjC2+YsWIZWrVqFTmwvOKEDKNeHOw/lEaWxBH0F3Szev
p/QhDSqLhYUNA0A9XOCB09523RHm9E2UhXCjuX3N2Z/3fEFekfOlxmQy8MFv
dFCSPEjXoLdXdswyjZufcjBhCzpWg9mnH7laeeH8zXUYY6lakmmta1sQE5XD
HJKcfQGl9H+W1LX+xFGaR3yUgG+VVasatQgDL+SlY8AoOdroGWpxalLbT0K5
MUhaHJcuUQ+ReiUvDAb/vDKy2vhTZ0bLHqoo4wpf16JtAy1IWsDmCOtdlTE1
aNGfWlKBpNiYJgvaVgjOBooh5lraFIw98k/JtiJf127wxpF7VIetvy6l5gVy
xZau7mUALXElLMMk/15hdhvlaV3Dz9pIf+Koy2cbZRW4VlZBdkQUZQ0QL6if
z5Ol4Qs14t0rPDSahReH0t+/JW05s4RfIst+Z+d1ynWhbYFV1/kB4F4H7dVa
Otu94i5nPxFPqyriYbUmpw5rECQ8Ilt1WEg4Ki/Aeg6Tahn5gbxK9r3eCeA8
b5gXHMdEXHgLRgz67nStdSx6sMVmLrziPFCmwcJennfakUj7hwkVzqRsbZTB
pz2xrMCJ9sZPk80lW2rC+wl6PEbKs3NbslaDxk7V70rnEhHslxt6EBBh0C+T
DqKqbW1MOFsilsw+K+0Ypc3NPBskDQg+zK9m8yT7pg5JCAVyQ9ff2RkmL2jU
Ik3e0ax/JDaXHNGStOX1UBGrGveWaCb8UGEGjtVPebDnvEdP0wuFnv3ezDjE
wqPB2VQF7bcCBXnEXz1rzYo2E0jw9selWbM349Xx29diq70mOyr5gYFj6q52
gtzmuEhYs5vPbQM96SZu64PltZW/0azx7jcpTY524CLXGlkvupr0tUkqfoiZ
di1xVcDbNXFAfPNtPr1ITiouxOG/8wLeugHYLqrhMFMQFcQvKlyQLPGM/lWn
ydM6ZbsAL6az1y/K6zjavqhXU1sqAPX0mH0ijqgqNDdER3Fl1i3yqCycVAVB
xXPkajPqig/mjD0nO5FJpx3W7LnJptXprFcMOW0Pk0XbrprD8XhOakI3GRFf
HL86PX8+fHn67niM7wwDwtx5J6tCITotzyNIDc3aYpWD3U4uHeU40seus1i1
vaGbpqsxkXrGYU89LBlWVlFdiuBNjLY+ent0i/drPwHXjk4KHqjJK6o4j0QD
ntqpvICS8Mojk26wxAVmERwjzt0BNWiv455ZLnsinnnSeznHDSstd6E5SsMo
8PVfmNb+gQyy2aiq538/Cqdr5YgoO4LaiD4EK652fNU7FeSYu9QR+S+Wcq6u
rkZ5La8Z8xRoMWNU+qQxxzyLv6fjRX0W4xDfGChqKkfEuHP9mEMp8GLGV2aC
McfavGHMHSI/jRbtsvj7nf8H/BLmZ60QAQA=

-->

</rfc>

