<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.30 (Ruby 3.4.8) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-dult-threat-model-04" category="info" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.31.0 -->
  <front>
    <title>DULT Threat Model</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-dult-threat-model-04"/>
    <author fullname="Maggie Delano">
      <organization>Swarthmore College</organization>
      <address>
        <email>mdelano1@swarthmore.edu</email>
      </address>
    </author>
    <author fullname="Jessie Lowell">
      <organization>National Network to End Domestic Violence</organization>
      <address>
        <email>jlowell@nnedv.org</email>
      </address>
    </author>
    <author fullname="Shailesh Prabhu">
      <organization>Nokia</organization>
      <address>
        <email>shailesh.prabhu@nokia.com</email>
      </address>
    </author>
    <date year="2026" month="February" day="26"/>
    <area>Security</area>
    <workgroup>Detecting Unwanted Location Trackers</workgroup>
    <keyword>Internet-Draft</keyword>
    <keyword>detecting unwanted location trackers</keyword>
    <keyword>threat model</keyword>
    <abstract>
      <?line 46?>

<t>Lightweight location-tracking tags are in wide use to allow users to locate items. These tags function as a component of a crowdsourced network in which devices belonging to other network users (e.g., phones) report which tags they see and their location, thus allowing the owner(s) of the tag to determine where their tag was most recently seen. While there are many legitimate uses of these tags, they are also susceptible to misuse for the purpose of stalking and abuse. A protocol that allows others to detect unwanted tracking must incorporate an understanding of the unwanted tracking landscape today. This document provides a threat analysis for this purpose, including a taxonomy of unwanted tracking and potential attacks against Detection of Unwanted Location Tracking (DULT) protocols. The document defines what is in and out of scope for the unwanted tracking protocols, and provides design requirements, constraints, and considerations for implementation of protocols to detect unwanted tracking.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        The latest revision of this draft can be found at <eref target="https://ietf-wg-dult.github.io/threat-model/draft-ietf-dult-threat-model.html"/>.
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-ietf-dult-threat-model/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        Detecting Unwanted Location Trackers Working Group mailing list (<eref target="mailto:unwanted-trackers@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/unwanted-trackers/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/unwanted-trackers/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/ietf-wg-dult/threat-model"/>.</t>
    </note>
  </front>
  <middle>
    <?line 50?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>Location-tracking tags allow users to locate items. These tags function as a component of a crowdsourced network in which devices belonging to other network users (e.g. phones) report on the location of tags they have seen. At a high level, this works as follows:</t>
      <ul spacing="normal">
        <li>
          <t>Tags ("Accessories") transmit a Location-enabled Advertisement Payload containing Accessory-specific information. The Payload indicates whether the Accessory is separated from its Owner(s) and thus potentially lost.</t>
        </li>
        <li>
          <t>Devices belonging to other users ("Non-Owner Devices") observe those Payloads and if the Payload is in a separated mode, report its location to a Crowdsourced Network.</t>
        </li>
        <li>
          <t>The Owner(s) queries the Crowdsourced Network for the location of their Accessory.</t>
        </li>
      </ul>
      <t>A naive implementation of this design exposes both a Tag's user and anyone who might be targeted for location tracking by a Tag's user, to considerable privacy risk. In particular:</t>
      <ul spacing="normal">
        <li>
          <t>If Accessories simply have a fixed identifier that is reported back to the Crowdsourced Network, then the central server is able to track any Accessory without the user's assistance.</t>
        </li>
        <li>
          <t>Any Attacker who can guess a Tag ID can query the Crowdsourced Network for its location.</t>
        </li>
        <li>
          <t>Any Attacker who can observe a Tag ID at one time can query the Crowdsourced Network for its location at another time.</t>
        </li>
        <li>
          <t>An Attacker can surreptitiously plant an Accessory on a Target and thus track them by tracking their "own" Accessory.</t>
        </li>
        <li>
          <t>Attackers could launch Denial-of-Service (DoS) attacks by flooding the Crowdsourced Network with spoofed Tag reports, disrupting real updates and overwhelming the Network.</t>
        </li>
        <li>
          <t>Frequent co-location of multiple Tags enables the Crowdsourced Network or a passive observer to infer social relationships, routines, or group behaviors, compromising user privacy without consent.</t>
        </li>
      </ul>
      <t>Detecting Unwanted Tracking is currently left to individual Tag manufacturers and Platforms on Non-Owner Devices. Each manufacturer and Platform has different implementations to prevent Unwanted Tracking, which may or may not be compatible with other manufacturers or Platforms. The goal of the IETF Detecting Unwanted Location Tracking (DULT) working group is to standardize a protocol between Location-tracking Tags, Non-Owner Devices, and Crowdsourced Networks.</t>
      <t>In order to standardize a protocol for Detecting Unwanted Location Tracking, thus minimizing the privacy risks described above, it is necessary to analyze and be able to model different privacy threats. This document includes: 1) a taxonomy of Unwanted Tracking, 2) methods Attackers could use to circumvent the DULT Protocol, and 3) design considerations for implementing the DULT protocol. The taxonomy of Unwanted Tracking uses a flexible framework to provide analysis and modeling of different threat actors, as well as models of potential Targets based on their threat context. It defines how these Attacker and Target persona models can be combined into threat models. The section on methods to circumvent the DULT protocol includes a threat matrix and description of several different possible attack vectors. Finally, the design considerations section focuses on specific requirements and constraints for successfully detecting Unwanted Tracking, alerting users, and providing guidance on disabling Tags (if desired). This threat model document is intended to inform the work of the implementation of the DULT Protocol as described in <xref target="I-D.draft-ietf-dult-accessory-protocol"/> and <xref target="I-D.draft-ietf-dult-finding"/>. The DULT Protocol is based on an earlier Internet Draft; see <xref target="I-D.draft-ledvina-apple-google-unwanted-trackers"/>.</t>
      <section anchor="applicability">
        <name>Applicability</name>
        <t>While there are many types of technology that can be used for Location Tracking, it is infeasible to attempt to describe a threat analysis for each possible technology in this document. The threat model described here is likely not applicable to the following areas: app-based technologies such as parental monitoring apps that do not use Location-tracking Accessories, Internet of Things (IoT) devices that are easily discoverable, connected cars, or user accounts for cloud services or social media. A notable exception to this is GPS trackers; see <xref target="bluetooth-vs-other-technologies"/> for relevant information and recommendations.</t>
        <t>This threat model is also more likely to be applicable in regions where the use of Location-tracking Tags is more prevalent. While Location-tracking Tags have existed for over a decade, they became especially widely-used in the Global North in the last several years as Crowdsourced Networks were deployed by major smart phone manufacturers. However, due to their reliance on a high density of Non-Owner Devices for the network to be effective and the relative cost of Location-tracking Tags, Location-tracking Tag use in the Global South is typically limited to affluent communities. If the cost of Non-Owner Devices and Location-tracking Tags decrease, an uptick of  could also occur in contexts where it is currently infeasible. This threat-model does still attempt to consider possible regional differences in Location-tracking Tag use (such as differences between rural and urban use), and also the sometimes limited resources that may be available to Targets of Unwanted Tracking.</t>
      </section>
    </section>
    <section anchor="conventions-and-definitions">
      <name>Conventions and Definitions</name>
      <section anchor="conventions">
        <name>Conventions</name>
        <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
        <?line -18?>

</section>
      <section anchor="definitions">
        <name>Definitions</name>
        <dl>
          <dt><strong>Accessory</strong>:</dt>
          <dd>
            <t>any product intended to interface with a Platform to connect to a Crowdsourced Network through the means described in these documents.</t>
          </dd>
          <dt><strong>Active Scanning</strong>:</dt>
          <dd>
            <t>method(s) of Unwanted Tracking detection that involves a user initiated scan for nearby Accessories. Contrast with Passive Scanning.</t>
          </dd>
          <dt><strong>Attacker</strong>:</dt>
          <dd>
            <t>any individual, group, or organization that is attempting to engage in Unwanted Tracking and/or circumvention of the DULT Protocol.</t>
          </dd>
          <dt><strong>Crowdsourced Network</strong>:</dt>
          <dd>
            <t>a service that Platforms communicate with to share and retrieve location information of Accessories.</t>
          </dd>
          <dt><strong>Disablement</strong>:</dt>
          <dd>
            <t>the process of preventing a specific Location-tracking Accessory from communicating with the Crowdsourced Network. This could be through physical means (e.g. removing the battery) or via a command sent by a Platform to an Accessory (e.g. Remote Disablement).</t>
          </dd>
          <dt><strong>Disablement Instructions</strong>:</dt>
          <dd>
            <t>steps Non-Owner Device users can take to disable a Location-tracking Accessory suspected of Unwanted Tracking.</t>
          </dd>
          <dt><strong>Device</strong>:</dt>
          <dd>
            <t>Hardware that includes software for a Platform and that can connect to Accessories and one or more Crowdsourced Networks. Examples of Devices are phones, tablets, laptops, etc.</t>
          </dd>
          <dt><strong>Detecting Unwanted Location Tracking (DULT) Protocol</strong></dt>
          <dd>
            <t>the protocol under development by the IETF DULT working Group to prevent Unwanted Tracking. This includes protocols for Accessories and the crowd sourced network, along with algorithms for detecting Unwanted Tracking.</t>
          </dd>
          <dt><strong>Easily Discoverable</strong>:</dt>
          <dd>
            <t>an Accessory that is larger than 30 cm in at least one dimension, larger than 18 cm x 13 cm in two of its dimensions, and/or larger than 250 cm<sup>3</sup> in three-dimensional space.</t>
          </dd>
          <dt><strong>Location-enabled Advertisement Payload</strong>:</dt>
          <dd>
            <t>the Bluetooth (BT) advertisement payload that is advertised when an Accessory has recently, is currently, or will in the future provide location updates to its Owner.</t>
          </dd>
          <dt><strong>Location-enabled State</strong>:</dt>
          <dd>
            <t>the state an Accessory is in where its location can be remotely viewed by its Owner.</t>
          </dd>
          <dt><strong>Location-tracking Accessory</strong>:</dt>
          <dd>
            <t>any Accessory that has location-tracking capabilities, including, but not limited to, crowdsourced location, GPS/GNSS location, WiFi location, cell location, etc., and provides the location information back to an Owner Device via a Crowdsourced Network using the internet, cellular connection, etc. Location-tracking Accessories that are Easily Discoverable <bcp14>MUST</bcp14> adhere to the DULT Protocol. Location-tracking Accessories may also be referred to as Location-tracking Tags.</t>
          </dd>
          <dt><strong>Location-tracking Tag</strong>:</dt>
          <dd>
            <t>a term that may be used interchangeably with Location-tracking Accessory.</t>
          </dd>
          <dt><strong>Non-Owner Device</strong>:</dt>
          <dd>
            <t>a Device that may connect to an Accessory but is not an Owner Device of that Accessory.</t>
          </dd>
          <dt><strong>Owner</strong>:</dt>
          <dd>
            <t>an individual that is in active control of and the primary user of an Owner Device. An Owner may be associated with one or more Accessories and/or Devices.</t>
          </dd>
          <dt><strong>Owner Device</strong>:</dt>
          <dd>
            <t>a Device that is associated with the Accessory and can retrieve the Accessory's location by querying the Crowdsourced Network.</t>
          </dd>
          <dt><strong>(Obfuscated) Owner Information</strong>:</dt>
          <dd>
            <t>(obfuscated) contact information for an Accessory Owner. When an Accessory is marked as lost, this should include a phone number and/or email address. Otherwise, the information should be obfuscated to ensure privacy of Owners in cases where Accessories are falsely suspected of Unwanted Tracking or an Attacker attempts to determine the Owner of an Accessory. The information should include no more than the last two digits of a phone number and/or an obfuscated email address with the first letter of the username and entity visible, as well as the entire extension (e.g., b<strong>**</strong><strong>@i</strong>***.com).</t>
          </dd>
          <dt><strong>Passive Scanning</strong>:</dt>
          <dd>
            <t>method(s) of Unwanted Tracking detection that are running in the background on all Devices and may trigger Unwanted Tracking Alerts. Contrast with Active Scanning.</t>
          </dd>
          <dt><strong>Platform</strong>:</dt>
          <dd>
            <t>Operating systems that communicate with Accessories.</t>
          </dd>
          <dt><strong>Platform-compatible Method</strong>:</dt>
          <dd>
            <t>a method of communication between the Platform and the Accessory/Accessory manufacturers to exchange information, including, but not limited to, BT GATT protocol, BT advertisement, HTTP, etc.</t>
          </dd>
          <dt><strong>Remote Disablement</strong>:</dt>
          <dd>
            <t>the process of preventing a specific Location-tracking Accessory from communicating with the Crowdsourced Network via a command sent by a Platform.</t>
          </dd>
          <dt><strong>Tag</strong>:</dt>
          <dd>
            <t>shorthand for Location-tracking Tag; see Location-tracking Accessory for full definition.</t>
          </dd>
          <dt><strong>Target</strong>:</dt>
          <dd>
            <t>a individual who an Attacker is attempting to track without their consent. A Target may or may not own a Location-tracking Accessory.</t>
          </dd>
          <dt><strong>Unwanted (Location) Tracking (UT)</strong>:</dt>
          <dd>
            <t>undesired tracking of a person, their property, or their belongings by a Location-tracking Accessory.</t>
          </dd>
          <dt><strong>Unwanted Tracking Alert</strong>:</dt>
          <dd>
            <t>an alert from a Device which notifies the user of the presence of an unrecognized Accessory that may be traveling with them over time. The alert allows the user to take various actions, including sending a command to the Accessory to emit a sound if the Accessory is in Bluetooth Low Energy (BLE) range.</t>
          </dd>
          <dt><strong>Unwanted Tracking Detection</strong>:</dt>
          <dd>
            <t>algorithms that detect the presence of an unknown Accessory traveling with a person over time.</t>
          </dd>
        </dl>
      </section>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>Incorporation of this threat analysis into the DULT Protocol does not introduce any security risks not already inherent in the underlying Location-tracking Tag protocols.</t>
      <section anchor="security-considerations-unique-to-unwanted-location-tracking">
        <name>Security Considerations Unique To Unwanted Location Tracking</name>
        <t>In a situation involving interpersonal control, an Attacker may be more likely to have access to a Target's Device or passwords. The Attacker could have physical access to a mobile Device on which a tracking account app is installed, remote access through a web portal, or both. The risk of an Attacker accessing a Target's tracking account remotely can be mitigated, though not eliminated, through support for different forms of multi-factor authentication (including hardware keys, e.g. Yubikeys, as well as more traditional methods). While this can also be used to mitigate the risk posed by physical access, taking overt security measures while frequently in physical proximity to the Attacker may lead to the Attacker escalating their tactics of interpersonal control. Risk assessments and the weighing of tradeoffs in such situations are often highly individualized. The ability of a user to access a tracking account over a web portal illustrates the need to consider web app security as part of support for detecting Unwanted Tracking.</t>
      </section>
      <section anchor="balancing-privacy-and-security">
        <name>Balancing Privacy and Security</name>
        <t>In order to avoid pitting the privacy of Tag Owners not engaged in Unwanted Tracking against the security/safety of Targets, the DULT Protocol must consider and balance the privacy and safety of different users of the Crowdsourced Network. Existing attempts to prevent Unwanted Tracking (i.e. where an Attacker uses their own Tag to track a Target without their consent) have been criticized as potentially making it easier for an Attacker to track a Target using the Target's own Tag. This can occur if Tags do not rotate identifiers frequently enough. However, Eldridge et al. have <eref target="https://eprint.iacr.org/2023/1332.pdf">demonstrated</eref> a technological solution that employs secret sharing and error correction coding that may preserve the privacy of Tag Owners without reducing the efficacy of detecting Unwanted Tracking.</t>
        <section anchor="security-against-unwanted-tracking-for-potential-targets">
          <name>Security against Unwanted Tracking for potential Targets</name>
          <t>The DULT Protocol must make it possible for potential Targets to discover Unwanted Tracking across Accessory hardware and Platforms within a reasonable amount of time. It should aid the Target in determining the location and Owner of the Accessory while not providing a full name or contact information on demand (as the Tag may merely have been lost or otherwise coincidentally in proximity, and providing excessive information would violate the privacy of a non-malicious Tag Owner). This could potentially be done with obfuscation, such as showing a partially redacted email address or phone number (see <xref target="active-scanning"/>).</t>
        </section>
        <section anchor="privacy-for-potential-targets-against-the-use-of-security-measures-for-further-surveillance">
          <name>Privacy for potential Targets against the use of security measures for further surveillance</name>
          <t>The DULT Protocol must consider the threat vector of an Attacker with access to a Target's Tag-associated account. In one study of how intimate partners misuse technology <eref target="https://dl.acm.org/doi/pdf/10.1145/3173574.3174241">Freed et al, 2018</eref>, 72% of survivors reported being forced or coerced to share passwords with an abuser. 41% reported that a cohabiting abuser "went through" their Device while they were not looking, allowing the abuser to obtain saved account passwords in many cases. 67% reported that an abuser was able to "hack" into their accounts remotely. To prevent use of a Target's own Tag as a means of surveillance, the protocol should minimize information that can be accessed from a web interface associated with a user's Tag-linked account.</t>
        </section>
        <section anchor="privacy-for-unassociated-tag-owners">
          <name>Privacy for unassociated Tag Owners</name>
          <t>Any unassociated Tag Owner, whether an abuse/stalking survivor or not, could potentially be the Target of an attack leveraging the Target's own Tags. Survivors and activists for women's and LGBTQIA+ rights, and/or against intimate interpersonal violence, may face severe government surveillance, repression, and even imprisonment <eref target="https://www.amnesty.org/en/latest/news/2025/03/iran-authorities-target-womens-rights-activists-with-arbitrary-arrest-flogging-and-death-penalty/">Amnesty International, 2025</eref>, <eref target="https://www.hrw.org/news/2020/03/18/kazakhstan-womens-day-activists-convicted">Human Rights Watch, 2020</eref>, <eref target="https://www.theguardian.com/global-development/2015/mar/18/honduras-women-gladys-lanza-feminism-human-rights">Ruiz-Navarro, 2015</eref>. Broad issues of technological privacy, including privacy against government and corporate surveillance, affect many populations, including but not limited to human rights defenders, children, migrants, and LGBTQIA+ people. Some people in these categories may <em>also</em> be survivors of abuse or stalking. The DULT Protocol must not eschew legitimate privacy interests of Tag Owners in the name of safety and security for Targets.</t>
          <t>The same person may be a Target of both Unwanted Tracking via an Attacker's Tag, and surveillance via their own Tag, either at different times or simultaneously. The DULT Protocol should account for this scenario.</t>
        </section>
      </section>
      <section anchor="taxonomy-of-unwanted-tracking">
        <name>Taxonomy of Unwanted Tracking</name>
        <t>To create a taxonomy of threat actors, we can borrow from Dev et al.’s <eref target="https://dl.acm.org/doi/fullHtml/10.1145/3544548.3581484">Models of Applied Privacy (MAP) framework</eref>. This framework is intended for organizations and includes organizational threats and taxonomies of potential privacy harms. Therefore, it cannot be applied wholesale. However, its flexibility, general approach to personas, and other elements, are applicable or can be modified to fit the DULT context.</t>
        <t>The characteristics of threat actors may be described as follows. This is not intended to be a full and definitive taxonomy, but an example of how existing persona modeling concepts can be applied and modified.</t>
        <ul spacing="normal">
          <li>
            <t>Expertise level
            </t>
            <ul spacing="normal">
              <li>
                <t>Expert: The Attacker works in or is actively studying computer science, networking, computer applications, IT, or another technical field.</t>
              </li>
              <li>
                <t>Non-expert: The Attacker does not work or study in, or is a novice in, a technical field.</t>
              </li>
            </ul>
          </li>
          <li>
            <t>Proximity to Target
            </t>
            <ul spacing="normal">
              <li>
                <t>High: Lives with Target or has easy physical access to Target and/or Target’s possessions.</t>
              </li>
              <li>
                <t>Medium: Has some physical access to the person and possessions of someone who lives with Target, such as when the Attacker and Target are co-parenting a child.</t>
              </li>
              <li>
                <t>Low: Does not live with or have physical access to Target and/or Target’s possessions.</t>
              </li>
            </ul>
          </li>
          <li>
            <t>Access to resources
            </t>
            <ul spacing="normal">
              <li>
                <t>High: The Attacker has access to resources that may amplify the impact of other characteristics. These could include, but are not limited to, funds (or control over “shared” funds), persons assisting them in stalking behavior, or employment that provides privileged access to technology or individuals’ personal information.</t>
              </li>
              <li>
                <t>Low: The Attacker has access to few or no such resources.</t>
              </li>
            </ul>
          </li>
        </ul>
        <t>In addition, the Target also has characteristics which influence the threat analysis. As with Attacker characteristics, these are not intended as a definitive taxonomy.</t>
        <ul spacing="normal">
          <li>
            <t>Expertise level
            </t>
            <ul spacing="normal">
              <li>
                <t>Expert: The Target works in or is actively studying computer science, networking, computer applications, IT, or another technical field.</t>
              </li>
              <li>
                <t>Non-expert: The Target does not work or study in, or is a novice in, a technical field.</t>
              </li>
            </ul>
          </li>
          <li>
            <t>Expectation of Unwanted Tracking
            </t>
            <ul spacing="normal">
              <li>
                <t>Suspecting: The Target has reason to believe that Unwanted Tracking is a likely risk.</t>
              </li>
              <li>
                <t>Unsuspecting: The Target has no particular reason to be concerned about Unwanted Tracking.</t>
              </li>
            </ul>
          </li>
          <li>
            <t>Access to resources
            </t>
            <ul spacing="normal">
              <li>
                <t>High: The Target is generally able to safely access practical and relevant resources. These might include funds to pay a car mechanic or private investigator, law enforcement or legal assistance, or other resources.</t>
              </li>
              <li>
                <t>Low: The Target is generally unable to safely access practical and relevant resources.</t>
              </li>
            </ul>
          </li>
          <li>
            <t>Access to technological safeguards
            </t>
            <ul spacing="normal">
              <li>
                <t>High: The Target is able to safely use, and has access to, technological safeguards such as active scanning apps.</t>
              </li>
              <li>
                <t>Limited: The Target is able to safely use, and has access to, technological safeguards such as active scanning apps, but is unable to use their full capacity.</t>
              </li>
              <li>
                <t>Low: The Target is not able to use technological safeguards such as active scanning apps, due to reasons of safety or access.</t>
              </li>
            </ul>
          </li>
        </ul>
        <t>It is also appropriate to define who is using the Location-tracking Tags and incorporate this into a model. This is because if protocols overly deprioritize the privacy of tracking Tags’ users, an Attacker could use a Target’s own Tag to track them (see <xref target="balancing-privacy-and-security"/>).</t>
        <ul spacing="normal">
          <li>
            <t>Tracking Tag usage
            </t>
            <ul spacing="normal">
              <li>
                <t>Attacker only: The Attacker controls one or more Location-tracking Tags, but the Target does not.</t>
              </li>
              <li>
                <t>Target only: The Target controls one or more Location-tracking Tags, but the Attacker does not.</t>
              </li>
              <li>
                <t>Attacker and Target: Both the Attacker and Target control one or more Location-tracking Tags.</t>
              </li>
            </ul>
          </li>
        </ul>
        <t>Any of the threat analyses above could be affected by placement of the Tag(s). For instance, a Tag could be placed on a Target's person, or in proximity to a Target but not on their person (e.g. a child's backpack).</t>
        <ul spacing="normal">
          <li>
            <t>Tag placement
            </t>
            <ul spacing="normal">
              <li>
                <t>Tag on Target's person or immediate belongings: This attack vector allows an Attacker to track a Target in a fine-grained way. It is also more likely that this attack would trigger an alert from the Tag.</t>
              </li>
              <li>
                <t>Tag(s) in proximity to Target but not on their person (e.g. child's backpack, car): While this is a less fine-grained attack, it may also be less likely to be discovered by the Target. A child may not realize the significance of an alert or know how to check for a Tag. A parent may not think to scan for such a Tag, or may have more difficulty finding a Tag in a complex location such as a car.</t>
              </li>
              <li>
                <t>Tags nearby but not used for Unwanted Tracking (e.g. false positives by companions or on transit): While this is not an attack vector in its own right, repeated false positives may discourage a Target from treating alerts seriously.</t>
              </li>
              <li>
                <t>Multiple Tags using multiple types of placement: This attack vector may trick a Target into believing that they have fully addressed the attack when they have not. It also allows for a diversity of monitoring types (e.g. monitoring the Target's precise location, monitoring a child's routine, monitoring car usage).</t>
              </li>
            </ul>
          </li>
        </ul>
        <section anchor="example-scenarios-with-analyses">
          <name>Example scenarios with analyses</name>
          <t>The following scenarios are composite cases based upon reports from the field. They are intended to illustrate different angles of the problem. They are not only technological, but meant to provide realistic insights into the constraints of people being targeted through Location-Tracking Tags. There is no identifying information for any real person contained within them. In accordance with research on <eref target="https://dl.acm.org/doi/10.1145/2207676.2208573">how designers understand personas</eref>, the characters are given non-human names without attributes such as gender or race.</t>
          <t>The analysis of each scenario provides an example usage of the modeling framework described above. It includes a tracking Tag usage element for illustrative purposes. However, as discussed previously, this element becomes more or less relevant depending on protocol evolution. Note that once a given Attacker persona has been modeled, it could be recombined with a different Target persona, or vice versa, to model a different scenario. For example, a non-expert Target persona could be combined with both non-expert and expert Attacker personas.</t>
          <section anchor="scenario-1">
            <name>Scenario 1</name>
            <section anchor="narrative">
              <name>Narrative</name>
              <t>Mango and Avocado have two young children. Mango, Avocado, and the children all use smartphones, but have no specialized technical knowledge. Mango left because Avocado was abusive. They were homeless for a month, and the children have been living with Avocado. They now have an apartment two towns away. They do not want Avocado to know where it is, but they do want to see the children. They and Avocado meet at a public playground. They get there early so that Avocado will not see which bus route they arrived on and keep playing with the children on the playground until after Avocado leaves, so that Avocado will not see which bus route they get on. Two days later, Avocado shows up at Mango’s door, pounding on the door and shouting.</t>
            </section>
            <section anchor="analysis">
              <name>Analysis</name>
              <t>In this case, the Attacker has planted a Tag on a child. Co-parenting after separation is common in cases of intimate partner violence where the former partners have a child together. Child visits can be an opportunity to introduce technology for purposes of stalking the Target.</t>
              <table>
                <thead>
                  <tr>
                    <th align="left">Attacker Profile</th>
                    <th align="left">Avocado</th>
                  </tr>
                </thead>
                <tbody>
                  <tr>
                    <td align="left">Expertise Level</td>
                    <td align="left">Non-Expert</td>
                  </tr>
                  <tr>
                    <td align="left">Proximity to Target</td>
                    <td align="left">Medium</td>
                  </tr>
                  <tr>
                    <td align="left">Access to Resources</td>
                    <td align="left">Unknown, but can be presumed higher than Mango’s due to Mango’s recent homelessness</td>
                  </tr>
                </tbody>
              </table>
              <table>
                <thead>
                  <tr>
                    <th align="left">Target Profile</th>
                    <th align="left">Mango</th>
                  </tr>
                </thead>
                <tbody>
                  <tr>
                    <td align="left">Expertise Level</td>
                    <td align="left">Non-Expert</td>
                  </tr>
                  <tr>
                    <td align="left">Expectation of Unwanted Tracking</td>
                    <td align="left">Suspecting</td>
                  </tr>
                  <tr>
                    <td align="left">Access to Resources</td>
                    <td align="left">Low</td>
                  </tr>
                  <tr>
                    <td align="left">Access to Technological Safeguards</td>
                    <td align="left">High</td>
                  </tr>
                </tbody>
              </table>
              <table>
                <thead>
                  <tr>
                    <th align="left">Other Characteristics</th>
                    <th align="left">Avocado and Mango</th>
                  </tr>
                </thead>
                <tbody>
                  <tr>
                    <td align="left">Accessory Usage</td>
                    <td align="left">Attacker Only</td>
                  </tr>
                  <tr>
                    <td align="left">Tag Placement</td>
                    <td align="left">In Proximity (on child)</td>
                  </tr>
                </tbody>
              </table>
            </section>
          </section>
          <section anchor="scenario-2">
            <name>Scenario 2</name>
            <section anchor="narrative-1">
              <name>Narrative</name>
              <t>Strawberry and Elderberry live together. Neither has any specialized technological knowledge. Strawberry has noticed that Elderberry has become excessively jealous – every time they go to visit a friend by themselves, Elderberry accuses them of infidelity. To their alarm, over the last week, on multiple occasions, Elderberry has somehow known which friend they visited at any given time and has started to harass the friends. Strawberry eventually gets a notification that a Tag is traveling with them, and thinks it may be in their car, but they cannot find it. They live in a car-dependent area and cannot visit friends without the car, and Elderberry controls all of the “family” money, so they cannot take the car to the mechanic without Elderberry knowing.</t>
            </section>
            <section anchor="analysis-1">
              <name>Analysis</name>
              <t>Here, the Attacker and the Target are still cohabiting, and the Attacker is monitoring the Target’s independent activities. This would allow the Attacker to know if, for instance, the Target went to a police station or a domestic violence agency. The Target has reason to think that they are being tracked, but they cannot find the Tag. This can happen if the sound emitted by the Tag is insufficiently loud, and is particularly a risk in a car, where seat cushions or other typical features of a car may provide sound insulation for a hidden Tag. The Target could benefit from having a mechanism to increase the volume of the sound emitted by the Tag. Another notable feature of this scenario is that because of the cohabitation, the Tag will spend most of the time in “near-Owner state” as defined by the proposed industry consortium specification (see <xref target="I-D.detecting-unwanted-location-trackers"/>). Tags do not provide alerts in near-Owner state to reduce false positives.</t>
              <table>
                <thead>
                  <tr>
                    <th align="left">Attacker Profile</th>
                    <th align="left">Elderberry</th>
                  </tr>
                </thead>
                <tbody>
                  <tr>
                    <td align="left">Expertise Level</td>
                    <td align="left">Non-Expert</td>
                  </tr>
                  <tr>
                    <td align="left">Proximity to Target</td>
                    <td align="left">High</td>
                  </tr>
                  <tr>
                    <td align="left">Access to Resources</td>
                    <td align="left">High</td>
                  </tr>
                </tbody>
              </table>
              <table>
                <thead>
                  <tr>
                    <th align="left">Target Profile</th>
                    <th align="left">Strawberry</th>
                  </tr>
                </thead>
                <tbody>
                  <tr>
                    <td align="left">Expertise Level</td>
                    <td align="left">Non-Expert</td>
                  </tr>
                  <tr>
                    <td align="left">Expectation of Unwanted Tracking</td>
                    <td align="left">Suspecting</td>
                  </tr>
                  <tr>
                    <td align="left">Access to Resources</td>
                    <td align="left">Low</td>
                  </tr>
                  <tr>
                    <td align="left">Access to Technological Safeguards</td>
                    <td align="left">Impaired (cannot hear alert sound)</td>
                  </tr>
                </tbody>
              </table>
              <table>
                <thead>
                  <tr>
                    <th align="left">Other Characteristics</th>
                    <th align="left">Elderberry and Strawberry</th>
                  </tr>
                </thead>
                <tbody>
                  <tr>
                    <td align="left">Accessory Usage</td>
                    <td align="left">Attacker Only</td>
                  </tr>
                  <tr>
                    <td align="left">Tag Placement</td>
                    <td align="left">In Proximity (car)</td>
                  </tr>
                </tbody>
              </table>
            </section>
          </section>
          <section anchor="scenario-3">
            <name>Scenario 3</name>
            <section anchor="narrative-2">
              <name>Narrative</name>
              <t>Lime and Lemon have been dating for two years. Lemon works for a tech company and often emphasizes how much more they know about technology than Lime, who works at a restaurant. Lemon insists on having access to Lime’s computer and Android phone so that they can “make sure they are working well and that there are no dangerous apps.” Lemon hits Lime when angry and has threatened to out Lime as gay to their conservative parents and report them to Immigration &amp; Customs Enforcement if Lime “talks back.” Lime met with an advocate at a local domestic violence program to talk about going to their shelter once a bed was available. The advocate did some safety planning with Lime, and mentioned that there is an app for Android that can scan for location Tags, but Lime did not feel safe installing this app because Lemon would see it. The next time Lime went to see the advocate, they chose a time when they knew Lemon had to be at work until late to make sure that Lemon did not follow them, but when Lemon got home from work they knew where Lime had been.</t>
            </section>
            <section anchor="analysis-2">
              <name>Analysis</name>
              <t>This is a case involving a high-skill Attacker, with a large skill difference between Attacker and Target. This situation often arises in regions with a high concentration of technology industry workers. It also may be more common in ethnic-cultural communities with high representation in the technology industry. In this case the Target is also subject to a very high level of control from the Attacker due to their imbalances in technological skills and societal status, and is heavily constrained in their options as a result. It is unsafe for the Target to engage in active scanning, or to receive alerts on their phone. The Target might benefit from being able to log into an account on another phone or a computer and view logs of any recent alerts collected through passive scanning.</t>
              <table>
                <thead>
                  <tr>
                    <th align="left">Attacker Profile</th>
                    <th align="left">Lemon</th>
                  </tr>
                </thead>
                <tbody>
                  <tr>
                    <td align="left">Expertise Level</td>
                    <td align="left">Expert</td>
                  </tr>
                  <tr>
                    <td align="left">Proximity to Target</td>
                    <td align="left">High</td>
                  </tr>
                  <tr>
                    <td align="left">Access to Resources</td>
                    <td align="left">High</td>
                  </tr>
                </tbody>
              </table>
              <table>
                <thead>
                  <tr>
                    <th align="left">Target Profile</th>
                    <th align="left">Lime</th>
                  </tr>
                </thead>
                <tbody>
                  <tr>
                    <td align="left">Expertise Level</td>
                    <td align="left">Non-Expert</td>
                  </tr>
                  <tr>
                    <td align="left">Expectation of Unwanted Tracking</td>
                    <td align="left">Suspecting</td>
                  </tr>
                  <tr>
                    <td align="left">Access to Resources</td>
                    <td align="left">Low</td>
                  </tr>
                  <tr>
                    <td align="left">Access to Technological Safeguards</td>
                    <td align="left">Low</td>
                  </tr>
                </tbody>
              </table>
              <table>
                <thead>
                  <tr>
                    <th align="left">Other Characteristics</th>
                    <th align="left">Lemon and Lime</th>
                  </tr>
                </thead>
                <tbody>
                  <tr>
                    <td align="left">Accessory Usage</td>
                    <td align="left">Attacker Only</td>
                  </tr>
                  <tr>
                    <td align="left">Tag Placement</td>
                    <td align="left">Unclear</td>
                  </tr>
                </tbody>
              </table>
            </section>
          </section>
          <section anchor="scenario-4">
            <name>Scenario 4</name>
            <section anchor="narrative-3">
              <name>Narrative</name>
              <t>Banana is a social media influencer. Fig is one of Banana's followers, and has become increasingly obsessed with Banana. Banana has no technical background. Fig has no formal technical background, but does read some online forums. Banana keeps a Location-tracking Tag on their keyring to prevent loss or theft of their home and car keys. Fig learns, from reading an online forum, how to find leaked passwords in data breaches, and is able to find the password to the account associated with Banana's Tag. Using the Crowdsourced Network, Fig is able to find Banana's home address and track their location. Fig makes a plan to travel to Banana's home and approach them in person.</t>
            </section>
            <section anchor="analysis-3">
              <name>Analysis</name>
              <t>This scenario differs from the previous ones in three major ways. First, it requires no physical proximity between the Attacker and the Target. Second, the Attacker, like nearly one in five stalkers <eref target="https://www.stalkingawareness.org/wp-content/uploads/2022/04/General-Stalking-Infographic.pdf">(SPARC - Stalking Infographic, 2022)</eref>, is a stranger. Third, in this scenario the Accessory belongs to the Target rather than the Attacker. The Attacker was able to use OSINT learned from an online forum in order to gain remote access to the Target's Accessory.</t>
              <table>
                <thead>
                  <tr>
                    <th align="left">Attacker Profile</th>
                    <th align="left">Fig</th>
                  </tr>
                </thead>
                <tbody>
                  <tr>
                    <td align="left">Expertise Level</td>
                    <td align="left">Non-Expert</td>
                  </tr>
                  <tr>
                    <td align="left">Proximity to Target</td>
                    <td align="left">Low</td>
                  </tr>
                  <tr>
                    <td align="left">Access to Resources</td>
                    <td align="left">Unknown</td>
                  </tr>
                </tbody>
              </table>
              <table>
                <thead>
                  <tr>
                    <th align="left">Target Profile</th>
                    <th align="left">Banana</th>
                  </tr>
                </thead>
                <tbody>
                  <tr>
                    <td align="left">Expertise Level</td>
                    <td align="left">Non-Expert</td>
                  </tr>
                  <tr>
                    <td align="left">Expectation of Unwanted Tracking</td>
                    <td align="left">Unsuspecting</td>
                  </tr>
                  <tr>
                    <td align="left">Access to Resources</td>
                    <td align="left">Unknown</td>
                  </tr>
                  <tr>
                    <td align="left">Access to Technological Safeguards</td>
                    <td align="left">Unknown</td>
                  </tr>
                </tbody>
              </table>
              <table>
                <thead>
                  <tr>
                    <th align="left">Other Characteristics</th>
                    <th align="left">Fig and Banana</th>
                  </tr>
                </thead>
                <tbody>
                  <tr>
                    <td align="left">Accessory Usage</td>
                    <td align="left">Target Only</td>
                  </tr>
                  <tr>
                    <td align="left">Tag Placement</td>
                    <td align="left">On Target</td>
                  </tr>
                </tbody>
              </table>
            </section>
          </section>
          <section anchor="scenario-5">
            <name>Scenario 5</name>
            <section anchor="narrative-4">
              <name>Narrative</name>
              <t>Orange and Grapefruit are university students in computer science. They attend multiple classes together, and are acquainted but do not regularly socialize or live in the same dormitory. Both use Location-tracking Tags to avoid losing items, as do many students at the university. Grapefruit has become increasingly obsessed with Orange, though Orange does not realize it. Grapefruit places Location-tracking Tags in Orange's backpack and car. Orange found the one in their backpack after receiving a notification, but was not suspicious when Grapefruit said that they had dropped it. Orange has not used their car in a week and is unaware of the well-hidden Tag there. Grapefruit has created a new account to associate with their backup phone and plans to associate multiple Tags with it, in order to place them on other possessions of Orange's.</t>
            </section>
            <section anchor="analysis-4">
              <name>Analysis</name>
              <t>In this scenario involving two technical students, the Attacker, like over 40% of stalkers <eref target="https://www.stalkingawareness.org/wp-content/uploads/2022/04/General-Stalking-Infographic.pdf">(SPARC - Stalking Infographic, 2022)</eref>, is an acquaintance. Both Attacker and Target are familiar with and use tracking Accessories. The Attacker is using multiple Accessories with a plan to incorporate more into their strategy.</t>
              <table>
                <thead>
                  <tr>
                    <th align="left">Attacker Profile</th>
                    <th align="left">Grapefruit</th>
                  </tr>
                </thead>
                <tbody>
                  <tr>
                    <td align="left">Expertise Level</td>
                    <td align="left">Expert</td>
                  </tr>
                  <tr>
                    <td align="left">Proximity to Target</td>
                    <td align="left">Medium</td>
                  </tr>
                  <tr>
                    <td align="left">Access to Resources</td>
                    <td align="left">High</td>
                  </tr>
                </tbody>
              </table>
              <table>
                <thead>
                  <tr>
                    <th align="left">Target Profile</th>
                    <th align="left">Orange</th>
                  </tr>
                </thead>
                <tbody>
                  <tr>
                    <td align="left">Expertise Level</td>
                    <td align="left">Expert</td>
                  </tr>
                  <tr>
                    <td align="left">Expectation of Unwanted Tracking</td>
                    <td align="left">Unsuspecting</td>
                  </tr>
                  <tr>
                    <td align="left">Access to Resources</td>
                    <td align="left">High</td>
                  </tr>
                  <tr>
                    <td align="left">Access to Technological Safeguards</td>
                    <td align="left">High</td>
                  </tr>
                </tbody>
              </table>
              <table>
                <thead>
                  <tr>
                    <th align="left">Other Characteristics</th>
                    <th align="left">Fig and Banana</th>
                  </tr>
                </thead>
                <tbody>
                  <tr>
                    <td align="left">Accessory Usage</td>
                    <td align="left">Attacker and Target</td>
                  </tr>
                  <tr>
                    <td align="left">Tag Placement</td>
                    <td align="left">Multiple Types</td>
                  </tr>
                </tbody>
              </table>
            </section>
          </section>
        </section>
        <section anchor="bluetooth-vs-other-technologies">
          <name>Bluetooth vs. other technologies</name>
          <t>The above taxonomy and threat analysis focus on Location-tracking Tags. They are protocol-independent; if a Tag were designed for use with a Crowdsourced Network using a technology other than Bluetooth, they would still apply. The key attributes are the functionalities and physical properties of the Accessory from the user’s perspective: the Accessory must be small, not Easily Discoverable, and able to participate in a Crowdsourced Network. While many GPS based location trackers are not explicitly designed for crowdsourced location-tracking, relying instead on cellular or satellite transmission, they offer different affordances that can have a critical impact on safety, including increased location precision and real-time tracking. Manufacturers of these trackers are strongly encouraged to add Bluetooth crowdsourced functionality so that DULT Protocols can be supported by GPS trackers.</t>
        </section>
      </section>
      <section anchor="possible-attacks-on-the-dult-protocol">
        <name>Possible Attacks on the DULT Protocol</name>
        <t>There are several different ways an Attacker could attempt to circumvent the DULT Protocol in order to track a Target without their consent or otherwise take advantage of the Crowdsourced Network. These include deploying multiple Tags to follow a single Target, using non-conformant Accessories and/or Devices, and taking advantage of possible differences between Crowdsourced Network implementations. This section includes a threat prioritization framework that assesses the risk of these attacks and how these risks may be mitigated.</t>
        <section anchor="threat-prioritization-framework-for-dult-threat-model">
          <name>Threat Prioritization Framework for DULT Threat Model</name>
          <t>Threats in the DULT ecosystem vary in severity, feasibility, and likelihood, affecting users in different ways. Some threats enable long-term tracking, while others exploit gaps in detection mechanisms or leverage non-conformant Accessories and Devices. To assess and prioritize these risks, the following framework classifies threats based on their scope, impact, likelihood, risk level, affected users, and the availability of mitigations. A Threat Matrix is included that provides a structured assessment of known threats and their associated risks. This categorization helps in understanding the challenges posed by different tracking techniques and their potential mitigations. While each attack included in this section only includes one value for potential impact, likelihood and risk level, in practice these values could differ depending on considerations discussed in <xref target="taxonomy-of-unwanted-tracking"/> such as the proximity of the Attacker to the Target.</t>
        </section>
        <section anchor="threat-matrix">
          <name>Threat Matrix</name>
          <t>To systematically assess the risks associated with different threats, we introduce the following threat matrix. This categorization considers the following factors:</t>
          <ul spacing="normal">
            <li>
              <t>Scope: The DULT WG document(s) most relevant to the attack.
              </t>
              <ul spacing="normal">
                <li>
                  <t>Accessory: The Accessory protocol document, which describes the DULT Non-Owner Device protocol and other requirements for Accessories.</t>
                </li>
                <li>
                  <t>Finding: The finding algorithm document, which describes the DULT algorithm(s) to be implemented by Platforms/Devices.</t>
                </li>
                <li>
                  <t>Network: The Crowdsourced Network document, which describes the architecture of the Crowdsourced Network and includes guidance for Platforms/Devices.</t>
                </li>
              </ul>
            </li>
            <li>
              <t>Impact: The potential consequences of the threat if successfully executed.
              </t>
              <ul spacing="normal">
                <li>
                  <t>Low: Minimal effect on privacy and security.</t>
                </li>
                <li>
                  <t>Medium: Moderate effect on user privacy or tracking protection.</t>
                </li>
                <li>
                  <t>High: Severe privacy violations or safety risks.</t>
                </li>
              </ul>
            </li>
            <li>
              <t>Likelihood: The probability of encountering this threat in real-world scenarios. This includes both the frequency of the attack and how easy it is to execute.
              </t>
              <ul spacing="normal">
                <li>
                  <t>Low: Rare or requires specific conditions and high technical effort.</t>
                </li>
                <li>
                  <t>Medium: Possible under common scenarios with moderate technical requirements.</t>
                </li>
                <li>
                  <t>High: Frequently occurring or easily executed using common tools or skills.</t>
                </li>
              </ul>
            </li>
            <li>
              <t>Risk Level: A qualitative assessment based on impact and likelihood.
              </t>
              <ul spacing="normal">
                <li>
                  <t>Low: Limited risk requiring minimal mitigation.</t>
                </li>
                <li>
                  <t>Medium: Requires mitigation to prevent common attacks.</t>
                </li>
                <li>
                  <t>High: Critical threat must be addressed.</t>
                </li>
              </ul>
            </li>
            <li>
              <t>Affected Users: These are categorized as either:
              </t>
              <ul spacing="normal">
                <li>
                  <t>Targets: Individuals specifically targeted for the purposes of Unwanted Tracking.</t>
                </li>
                <li>
                  <t>All users: Anyone using the system, even if they are not directly targeted.</t>
                </li>
              </ul>
            </li>
            <li>
              <t>Mitigation Available?: Whether a known mitigation strategy exists.
              </t>
              <ul spacing="normal">
                <li>
                  <t>Yes: A viable mitigation exists.</t>
                </li>
                <li>
                  <t>Partial: Some mitigations exist, but are not fully effective.</t>
                </li>
                <li>
                  <t>No: No effective mitigation currently available.</t>
                </li>
              </ul>
            </li>
          </ul>
          <table>
            <thead>
              <tr>
                <th align="left">Threat</th>
                <th align="left">Scope</th>
                <th align="left">Impact</th>
                <th align="left">Likelihood</th>
                <th align="left">Risk Level</th>
                <th align="left">Affected Users</th>
                <th align="left">Mitigation Available?</th>
              </tr>
            </thead>
            <tbody>
              <tr>
                <td align="left">Deploying Multiple Tags</td>
                <td align="left">Finding</td>
                <td align="left">Medium</td>
                <td align="left">High</td>
                <td align="left">High</td>
                <td align="left">Targets</td>
                <td align="left">Yes</td>
              </tr>
              <tr>
                <td align="left">Remote Advertisement Monitoring</td>
                <td align="left">Accessory, Network</td>
                <td align="left">Medium</td>
                <td align="left">High</td>
                <td align="left">Medium</td>
                <td align="left">All users</td>
                <td align="left">Partial</td>
              </tr>
              <tr>
                <td align="left">Physically Modifying Tags</td>
                <td align="left">Accessory</td>
                <td align="left">High</td>
                <td align="left">Medium</td>
                <td align="left">Medium</td>
                <td align="left">Targets</td>
                <td align="left">Partial</td>
              </tr>
              <tr>
                <td align="left">Accessory Firmware Modifications</td>
                <td align="left">Accessory</td>
                <td align="left">High</td>
                <td align="left">Low/Medium</td>
                <td align="left">High</td>
                <td align="left">Targets</td>
                <td align="left">Partial</td>
              </tr>
              <tr>
                <td align="left">Attacker Accessory Disablement</td>
                <td align="left">Accessory, Finding</td>
                <td align="left">Medium</td>
                <td align="left">Medium</td>
                <td align="left">Medium</td>
                <td align="left">Targets</td>
                <td align="left">Partial</td>
              </tr>
              <tr>
                <td align="left">Tracking Using Target's Own Tag</td>
                <td align="left">Network</td>
                <td align="left">High</td>
                <td align="left">Medium</td>
                <td align="left">High</td>
                <td align="left">Targets</td>
                <td align="left">Partial</td>
              </tr>
              <tr>
                <td align="left">Disabling Target Tag Detection</td>
                <td align="left">Network</td>
                <td align="left">High</td>
                <td align="left">Medium</td>
                <td align="left">Medium</td>
                <td align="left">Targets</td>
                <td align="left">Partial</td>
              </tr>
              <tr>
                <td align="left">Disabling Target Tag</td>
                <td align="left">Accessory, Network</td>
                <td align="left">Medium</td>
                <td align="left">Medium</td>
                <td align="left">Medium</td>
                <td align="left">Targets</td>
                <td align="left">Partial</td>
              </tr>
              <tr>
                <td align="left">Impersonation Attack (Tag)</td>
                <td align="left">Accessory, Finding, Network</td>
                <td align="left">High</td>
                <td align="left">Medium</td>
                <td align="left">High</td>
                <td align="left">Targets</td>
                <td align="left">Partial</td>
              </tr>
              <tr>
                <td align="left">Impersonation Attack (Device/Tag)</td>
                <td align="left">Accessory, Network</td>
                <td align="left">High</td>
                <td align="left">Medium</td>
                <td align="left">High</td>
                <td align="left">All users</td>
                <td align="left">Partial</td>
              </tr>
              <tr>
                <td align="left">Impersonation Attack (Device/Network)</td>
                <td align="left">Network</td>
                <td align="left">Medium</td>
                <td align="left">Low/Medium</td>
                <td align="left">Low</td>
                <td align="left">All users</td>
                <td align="left">Partial</td>
              </tr>
              <tr>
                <td align="left">Replay Attack</td>
                <td align="left">Accessory, Network</td>
                <td align="left">Medium</td>
                <td align="left">High</td>
                <td align="left">Medium</td>
                <td align="left">All users</td>
                <td align="left">Partial</td>
              </tr>
              <tr>
                <td align="left">Heterogeneous Tracker Networks</td>
                <td align="left">Accessory, Finding, Network</td>
                <td align="left">High</td>
                <td align="left">Medium</td>
                <td align="left">Medium</td>
                <td align="left">Targets</td>
                <td align="left">No</td>
              </tr>
              <tr>
                <td align="left">Deploying GPS Tracker</td>
                <td align="left">Accessory</td>
                <td align="left">High</td>
                <td align="left">Medium</td>
                <td align="left">High</td>
                <td align="left">Targets</td>
                <td align="left">Partial</td>
              </tr>
            </tbody>
          </table>
        </section>
        <section anchor="deploying-multiple-tags-finding">
          <name>Deploying Multiple Tags (Finding)</name>
          <t>When an Attacker deploys Location-tracking Tags to follow a Target, they may deploy more than one Tag. For example, if planting a tracking Tag in a car, the Attacker might place one Tag inside the car, and another affixed on the outside of the car. The DULT Protocol must be robust to this scenario. This means that scans, whether passive or active, need to be able to return more than one result if a Tag is suspected of being used for Unwanted Tracking, and the time to do so must not be significantly impeded by the presence of multiple Tags. This also applies to situations where many Tags are present, even if they are not being used for Unwanted Tracking, such as a busy train station or airport where Tag Owners may or may not be in proximity to their Location-tracking Tags. Instead of distributing multiple Tags in the same location, an Attacker could also distribute multiple Location-tracking Tags across locations frequently visited by a Target (home, workplace, etc.).</t>
          <t>The impact of this attack is medium for typical cases involving a small number of Tags, though the impact could escalate if an Attacker deploys dozens of Tags. The likelihood is high, as deploying multiple Tags requires minimal technical effort and can be done using inexpensive, commercially available Tags, making the attack easily repeatable. As a result, the overall risk is high, requiring robust countermeasures. The impact of multiple Tags can be fully mitigated by scanning for multiple Tags, though a sophisticated Attacker might deploy other techniques such as modifying Tag firmware (<xref target="accessory-firmware-modifications-accessory"/>) or periodically disabling a Tag (<xref target="attacker-accessory-disablement-accessory-finding"/>) to evade detection.</t>
        </section>
        <section anchor="remote-advertisement-monitoring-accessory-network">
          <name>Remote Advertisement Monitoring (Accessory, Network)</name>
          <t>Any Device with Bluetooth scanning capabilities in proximity to a Location-tracking Tag can receive Bluetooth advertisement packets. If an Attacker is able to link an identifier in an advertisement packet to a particular Tag, they may be able to use this information to track the Tag over time, and by proxy the Target or other individual, without their consent.</t>
          <t>The impact of remote advertisement monitoring is moderate, as tracking generally compromises privacy but, in many cases, prolonged observation primarily reveals the location of the object rather than of the person. The likelihood is high, as Attackers can execute this using off-the-shelf Bluetooth scanning tools or smartphone apps with minimal technical knowledge. As a result, this is classified as a medium risk attack. This attack can be partially mitigated by rotating tracking identifiers.</t>
          <t>Tracking Tags typically rotate any identifiers associated with the Tag, with the interval depending on context: when near the Owner's Device, identifiers rotate frequently (every 15–30 minutes), while in a separated state, rotation may occur only once every 24 hours (see <xref target="I-D.detecting-unwanted-location-trackers"/>). Eldridge et al. have <eref target="https://eprint.iacr.org/2023/1332.pdf">demonstrated</eref> a technological solution that employs secret sharing and error correction coding that would reduce this to 60 seconds. However, work must investigate how robust this scheme is to the presence of multiple Tags (see <xref target="deploying-multiple-tags-finding"/>).</t>
          <t>While rotating identifiers provides partial mitigation, Attackers can still use advanced correlation techniques, such as signal fingerprinting, timing analysis, and multi-sensor triangulation, to bypass this defense. These methods leverage unique transmission characteristics, RSSI (Received Signal Strength Indicator) variations, and environmental factors to probabilistically link rotating identifiers back to a single Tag over time. Prior research, such as Eldridge et al., has <eref target="https://eprint.iacr.org/2023/1332.pdf">demonstrated</eref> how statistical models can be used to correlate Bluetooth signals even when identifiers change frequently. Additional work by Despres et al. further <eref target="https://people.eecs.berkeley.edu/~daw/papers/deTagtive-snip23.pdf">demonstrates</eref> that BLE Accessories using rotating identifiers can be deanonymized through RSSI-based correlation techniques.</t>
        </section>
        <section anchor="physically-modifying-tags-accessory">
          <name>Physically Modifying Tags (Accessory)</name>
          <t>An Attacker might physically modify a Tag in ways that make it non-conformant with the DULT Protocol. Physical modifications may include disabling a speaker or other haptics, or shielding and altering the antenna to reduce transmission range. These modifications can make it more difficult for Victims to discover hidden Tags, leading to a high impact. The likelihood is medium, as such hardware modifications require moderate technical expertise and physical access to the Tag.  Given this combination of factors, the overall risk level is medium. Partial mitigation is available, such as monitoring the impedance of the speaker, but these mitigations are limited as Attackers have physical access to the Tags.</t>
        </section>
        <section anchor="accessory-firmware-modifications-accessory">
          <name>Accessory Firmware Modifications (Accessory)</name>
          <t>The DULT Protocol (see <xref target="I-D.draft-ietf-dult-accessory-protocol"/>) will specify that Accessory firmware images <bcp14>MUST</bcp14> be authenticated, and that Accessories <bcp14>MUST</bcp14> verify the integrity and origin of firmware. However, if these protections were to be bypassed, an Accessory's firmware could be altered to deviate from standard behavior. Attackers may manipulate advertisement intervals to reduce detection opportunities, allowing the Tag to evade tracking for extended periods, or rotate IDs rapidly, disrupting detection systems that rely on tracking unknown Accessory persistence.</t>
          <t>Firmware-based changes would have high impact. The likelihood is typically low, as these attacks require significant technical expertise to bypass firmware verification and modify low-level Accessory behavior. However, once a vulnerability has been discovered and distributed, the likelihood could increase to medium as it would only require the technical ability to deploy the attack. It will be important for Accessory firmware to be able to be patched to address vulnerabilities. As a result, the overall risk level is high. Partial mitigation of this attack is possible by requiring Accessories to verify the integrity and origin of firmware.</t>
        </section>
        <section anchor="attacker-accessory-disablement-accessory-finding">
          <name>Attacker Accessory Disablement (Accessory, Finding)</name>
          <t>An Attacker might intentionally disable their Location-tracking Tag to make it harder for a Victim to detect and/or locate the Tag. This could be done periodically or permanently and either remotely or using a <eref target="https://undetecTag.com/products/undetecTag">physical device</eref>.</t>
          <t>The likelihood is medium, as this attack is relatively easy to perform using commercially available tools, but it still requires some Attacker awareness of the Target’s actions (e.g., an ongoing search). The impact is medium as the Tag can still be detected and physically located, though it may be more difficult to do so. The risk level is medium. The impact of this attack can be partially mitigated by minimizing the time needed to detect Unwanted Tracking and maintaining the same identifier on reset.</t>
        </section>
        <section anchor="tracking-using-targets-own-tag-network">
          <name>Tracking Using Target's Own Tag (Network)</name>
          <t>Attackers with access to a Target’s account, either through password reuse, phishing, social engineering, or credential theft, can exploit DULT’s Ownership model by using the Target’s own Tag to monitor their location. Since the Tag is registered to the Target, the system assumes the user is the legitimate Owner and suppresses any Unwanted Tracking alerts. This creates a significant blind spot, as the Target is effectively tracked by their own Tag without any warning.</t>
          <t>This threat differs from impersonation or replay attacks (see <xref target="impersonation-attack-tag-accessory-finding-network"/> and <xref target="replay-attack-accessory-network"/>) because it does not rely on breaking cryptographic protections or evading detection algorithms. Instead, it leverages the legitimate trust relationship encoded in the protocol. The impact of this attack is high, as it results in silent tracking with no alert mechanism. The likelihood is medium, as account compromise is a relatively common occurrence in real-world settings, though it still requires some Attacker effort or opportunity. Overall, the risk level is high due to the complete circumvention of core notification systems.</t>
          <t>Partial mitigation may be possible through account activity monitoring, anomaly detection (e.g., login from unfamiliar location or Device), and notifications of significant account events (such as Tag access or Tag movement linked to a different Device). However, these features depend on Platform implementation and may not be uniformly enforced.</t>
        </section>
        <section anchor="disabling-target-tag-detection-network">
          <name>Disabling Target Tag Detection (Network)</name>
          <t>An Attacker might intentionally disable passive Unwanted Tracking detection on a Target's Device.</t>
          <t>The impact of this attack is high as it would prevent the Target from being notified about possible Unwanted Tracking. The likelihood is medium, as executing this attack requires the Attacker to physically or remotely alter settings on the Target’s Device, which involves moderate effort and access. The risk level is medium. This attack can be partially mitigated by notifying Targets of potential location tracking using other means e.g. sounds or haptics on Location-tracking Tags.</t>
        </section>
        <section anchor="disabling-target-tag-accessory-network">
          <name>Disabling Target Tag (Accessory, Network)</name>
          <t>An Attacker might intentionally disable a Target's Tag as a form of harassment. This could be done with physical access to the Tag, using a Target's own Device to disable the Tag, or with remote access to disable the Tag via the Crowdsourced Network. The impact of this attack is medium as it is a nuisance but most likely does not involve a security threat, unless the Tag is being used to track a valuable item or child. The likelihood is medium, as executing the attack requires access to the Target’s Tag, Device, or account, which involves a moderate level of access or effort. The risk level is therefore medium. Physical disablement of a Tag cannot be mitigated, but other forms of disablement may be mitigated by notifying users that a change has been made on their account, similar to suspicious login notifications.</t>
        </section>
        <section anchor="impersonation-attack-tag-accessory-finding-network">
          <name>Impersonation Attack (Tag; Accessory, Finding, Network)</name>
          <t>Attackers might be able to impersonate legitimate tracking Accessories, enabling tracking without complying with the DULT Protocol. This can be done by <eref target="https://www.hackster.io/news/fabian-braunlein-s-esp32-powered-find-you-Tag-bypasses-apple-s-airTag-anti-stalking-protections-0f2c9ee7da74">deploying custom Tags</eref> or by using <eref target="https://cec.gmu.edu/news/2025-02/find-my-hacker-how-apples-network-can-be-potential-tracking-tool">Devices to mimic Tags</eref>. By impersonating an authorized Tag, an Attacker could inject false location data, misattribute Tag Ownership, or evade detection by appearing as a trusted Accessory or rotating identifiers frequently. This tactic increases the difficulty of accurately identifying unauthorized tracking attempts and undermines the reliability of the network.</t>
          <t>In addition to full impersonation, adversaries may exploit Platform-specific assumptions to suppress alerts. For instance, Chen et al. <eref target="https://www.usenix.org/system/files/conference/usenixsecurity25/sec25cycle1-prepub-1266-chen-junming.pdf">describe</eref> a technique in which an Attacker sets the status field of a broadcast message to 0x00 to emulate MacBook location beacons. Since such beacons are typically ignored by Apple’s Unwanted Tracking alerts, this evasion method allows the Attacker to remain undetected. This demonstrates how Attackers can exploit trust assumptions about certain Accessory classes to bypass user protections, further complicating detection and mitigation.</t>
          <t>The impact of this attack is high, as it enables real-time location tracking by exploiting the behavior of the Crowdsourced Network. The likelihood is medium, as the attack requires deploying custom hardware or exploiting Platform-specific capabilities like unrestricted Bluetooth broadcasting, which have been demonstrated in research but remain moderately complex to execute. As a result, the overall risk level is considered high. Currently, no fully effective mitigation exists. However, improvements in authentication mechanisms, such as cryptographic signing of broadcasts, and anomaly detection techniques may help reduce the risk. Protocol-level authentication is needed to validate Accessory identities and prevent these attacks. Operating systems can partially mitigate software impersonation attacks by restricting low-level BLE broadcasting unless elevated privileges are granted.</t>
        </section>
        <section anchor="impersonation-attack-device">
          <name>Impersonation Attack (Device)</name>
          <t>In addition to impersonating a Tag, an Attacker could also impersonate a Device. This affords attacks against both Accessories and against the Crowdsourced Network.</t>
          <section anchor="attacks-on-accessories-accessory-network">
            <name>Attacks on Accessories (Accessory, Network)</name>
            <t>Any Bluetooth transmitter can theoretically send arbitrary commands to Accessories. Accessory firmware therefore must attempt to verify the authenticity of commands from Devices or otherwise limit how Accessories respond to commands from Devices. For example, Accessories that receive a "play sound" command from a Non-Owner Device should only execute the command if the Accessory is away from its Owner. Similarly, Accessories should only respond to remote disablement commands if the Accessory can confirm it is likely being used for Unwanted Tracking and the Accessory can confirm that a Device has used other finding techniques to locate the Accessory. However, if an Attacker is able to circumvent the DULT protocol and transmit arbitrary commands to Accessories, said Attacker could have high impact on the functioning of individual Accessories and/or the Crowdsourced Network.</t>
            <t>The impact of a Device impersonation attack is high if it is able to send arbitrary commands to Accessories. The likelihood of such an attack is medium; it can be done by any Device able to transmit BTLE packets, but requires some familiarity with the DULT Protocol or technical awareness to deploy a pre-packaged attack. Therefore, the overall risk level is high. The affected users are all users. Mitigation is partial; while Devices cannot be prevented from transmitting packets, certain rules can be enforced by Accessories.</t>
          </section>
          <section anchor="attacks-on-crowdsourced-network-network">
            <name>Attacks on Crowdsourced Network (Network)</name>
            <t>An impersonated Device could send false location reports to the Crowdsourced Network, or selectively not report to the Crowdsourced Network.</t>
            <t>The likelihood of this attack is low, as it would require the impersonated Device to authenticate with the Crowdsourced Network. The likelihood could increase to medium if a pre-packaged and unpatched attack were discovered. The impact is medium, as not reporting would have negligible impact and false location reports are a nuisance but can be mitigated. The overall risk level for this attack is low even in circumstances of a pre-packaged attack as there are many mitigations available. The affected users are all users.  Mitigations include requiring authentication to send reports to the Crowdsourced Network and only trusting reports when they can be verified by multiple Devices.</t>
          </section>
        </section>
        <section anchor="replay-attack-accessory-network">
          <name>Replay Attack (Accessory, Network)</name>
          <t>In addition to impersonating legitimate Accessories (see <xref target="impersonation-attack-tag-accessory-finding-network"/>), Attackers can record and replay Bluetooth advertisements from a legitimate Accessory. For example, an Attacker could capture an Accessory's broadcast and retransmit it elsewhere, creating confusion about its actual location. This could be used to mislead users, interfere with tracking accuracy, or frame an innocent party by making it appear as though they are carrying an Accessory or in a location when they are not.</t>
          <t>The impact of this attack is medium. The likelihood is high, as replay attacks require no authentication and can be executed using off-the-shelf Bluetooth scanning tools with minimal technical expertise. Replay attacks pose a medium risk owing to their higher likelihood but medium impact. Replay attacks are particularly difficult to mitigate as they may involve different combinations of Accessories and Devices. Partial mitigation may be possible by authenticating messages from Accessories in a time varying manner.</t>
        </section>
        <section anchor="heterogeneous-tag-networks-accessory-finding-network">
          <name>Heterogeneous Tag Networks (Accessory, Finding, Network)</name>
          <t>Attackers may use a mix of Tags from different manufacturers (e.g., Apple AirTags, Tile, Samsung SmartTags) to exploit gaps in vendor-specific tracking protections. Many detection systems are brand-dependent, making them ineffective against mixed Tag deployments. The goal of the DULT Protocol is to enable a cross-vendor framework; however, any slight differences in implementation could be exploited.</t>
          <t>The impact is high, as it circumvents traditional defenses. The likelihood is medium, as deploying or selecting from multiple brands requires effort and coordination, and may demand deeper knowledge of Platform-specific behaviors and limitations. Overall, this is medium risk attack. This attack can be mitigated by manufacturers adopting the DULT Protocol and ensuring that the DULT Protocol is sufficiently clear to minimize gaps in vendor-specific tracking protections.</t>
        </section>
        <section anchor="deploying-gps-tracker-accessory">
          <name>Deploying GPS Tracker (Accessory)</name>
          <t>When an Attacker deploys a GPS tracker to stalk a Target, they have access to greater location precision, real-time tracking, and even global coverage through satellite connection for some trackers. Attackers are especially likely to use GPS trackers in rural areas and areas with low Crowdsourced Network saturation, or when looking for more advanced precision or for Accessories that do not offer safety protections.</t>
          <t>The impact of this attack is high due to the increased location precision and real-time tracking functionality. The likelihood is medium, as these trackers are currently more expensive than Bluetooth based trackers, and not as readily available. As a result, the overall risk is high, requiring robust countermeasures. The impact of GPS trackers can be mitigated by adding Bluetooth crowdsourced location-tracking functionality to GPS trackers and adopting the DULT Protocol. However, the adoption of the DULT Protocol by GPS tracker manufacturers is of course optional, so this is considered a partial mitigation.</t>
        </section>
      </section>
      <section anchor="what-is-in-scope">
        <name>Scope and Priorities for the DULT WG</name>
        <section anchor="technologies">
          <name>Technologies</name>
          <t>The scope of this threat analysis includes any Accessory that is small and not Easily Discoverable and able to transmit its location to consumer Devices using Bluetooth. Larger and/or Easily Discoverable Accessories/Devices such as laptops with location-tracking integrations may also choose to implement the protocol.</t>
        </section>
        <section anchor="attacker-profiles">
          <name>Attacker Profiles</name>
          <t>An Attacker who deploys any of the attacks described in <xref target="threat-prioritization-framework-for-dult-threat-model"/> is considered in scope. This includes: Attackers who track Victims using a Location-tracking Tag and applications readily available for end-users (e.g. native tracking application), Attackers who physically modify Location-tracking Tags (e.g. to disable a speaker), and Attackers who make alterations to the firmware of an existing tracking Tag or create custom Tags that successfully connect to Devices and therefore the Crowdsourced Network.</t>
        </section>
        <section anchor="target-profiles">
          <name>Target Profiles</name>
          <t>All Targets profiles are in scope regardless of their expertise, access to resources, or access to technological safeguards. For example, protocols should account for a Target's lack of access to a smartphone, and scenarios in which Targets cannot install separate software.</t>
        </section>
        <section anchor="priorities">
          <name>Priorities</name>
          <t>The technical documents of the DULT WG should consider all of the scenarios discussed in <xref target="example-scenarios-with-analyses"/>. When it comes to attacks, while all attacks on the DULT protocol are considered to be in scope, the following attacks are the highest risk and therefore considered the highest priority for the DULT WG to address:</t>
          <ul spacing="normal">
            <li>
              <t>Deploying Multiple Tags (<xref target="deploying-multiple-tags-finding"/>)</t>
            </li>
            <li>
              <t>Accessory Firmware Modifications (<xref target="accessory-firmware-modifications-accessory"/>)</t>
            </li>
            <li>
              <t>Tracking Using Target's Own Tag (<xref target="tracking-using-targets-own-tag-network"/>)</t>
            </li>
            <li>
              <t>Impersonation Attack (Tag) (<xref target="impersonation-attack-tag-accessory-finding-network"/>)</t>
            </li>
            <li>
              <t>Impersonation Attack (Device/Tag) (<xref target="attacks-on-accessories-accessory-network"/>)</t>
            </li>
            <li>
              <t>Deploying GPS Tracker (<xref target="deploying-gps-tracker-accessory"/>)</t>
            </li>
          </ul>
          <t>See <xref target="threat-matrix"/> for a full list of attacks.</t>
        </section>
      </section>
    </section>
    <section anchor="design-considerations">
      <name>Design Considerations</name>
      <t>As discussed in <xref target="security-considerations"/>, Unwanted Tracking can involve a variety of Attacker, Target, and Tag profiles. A successful implementation to preventing Unwanted Tracking should:</t>
      <ul spacing="normal">
        <li>
          <t>Include a variety of approaches to address different scenarios, including active and passive scanning and notifications or sounds</t>
        </li>
        <li>
          <t>Account for scenarios in which the Attacker has high expertise, proximity, and/or access to resources within the scope defined in <xref target="what-is-in-scope"/></t>
        </li>
        <li>
          <t>Account for scenarios in which the Target has low expertise, access to resources, and/or access to technological safeguards within the scope defined in <xref target="what-is-in-scope"/></t>
        </li>
        <li>
          <t>Avoid privacy compromises for Tag Owner(s) when protecting against Unwanted Tracking. The privacy of Tag Owner(s) and the security of Targets should be considered equally.</t>
        </li>
      </ul>
      <t>In the sections below, we first discuss limitations of existing approaches to detecting and preventing Unwanted Tracking, and then outline design requirements, design constraints, and priorities for the DULT WG moving forward.</t>
      <section anchor="limitations-of-existing-approaches-to-detecting-and-preventing-unwanted-tracking">
        <name>Limitations of existing approaches to detecting and preventing Unwanted Tracking</name>
        <t>This section outlines several limitations of existing approaches to detecting and preventing Unwanted Tracking as of the time of writing. This includes six different areas:</t>
        <ol spacing="normal" type="1"><li>
            <t>Spotty Implementation</t>
          </li>
          <li>
            <t>Lack of customizability</t>
          </li>
          <li>
            <t>Difficulty finding and disabling Tags</t>
          </li>
          <li>
            <t>Nonconformant Accessories</t>
          </li>
          <li>
            <t>Activities Logs</t>
          </li>
          <li>
            <t>Anti-theft mode</t>
          </li>
        </ol>
        <t>A successful implementation of the DULT protocol would consider each of these limitations as described in the relevant sections below.</t>
        <section anchor="spotty-implementation">
          <name>Spotty Implementation</name>
          <t>In current implementations of the DULT protocol, implementations of safeguards against Unwanted Tracking are inconsistent across Platforms and Devices. For example, the types and methods of obtaining Unwanted Tracking Alerts vary. Current Accessory types also vary widely in the amount and type of information they provide to a Target who has detected a possible unwanted tracker actively or passively. This creates a situation where a Target’s ability to mitigate threats to their safety depends on consumer choices and access.</t>
          <t>As of this writing, major platforms do not currently implement both Active and Passive Scanning. Android users (including users of devices with operating systems derived from Android OS, such as Amazon’s FireOS) can actively scan for an Accessory, but passive scanning is not supported. iOS users can receive potential Unwanted Tracking Alerts generated through Passive Scanning, but cannot actively scan for Accessories. Because of this, protections are contingent on both the type of Tag and the type of scanning Device. These inconsistencies place a higher burden on targets of abuse to find information specific to products, and create challenges in creating easily understandable public safety information. These differences can also be exploited by an Attacker familiar with target Platforms. A successful protocol would support both Active and Passive Scanning as this increases options for Targets who may be dealing with highly individualized situations.</t>
          <t>The information provided in Unwanted Tracking Alerts, and the options for a Target, would benefit from standardization across Platforms and Devices. Currently, Accessories made by different manufacturers provide different amounts and types of information in detection reports, with different options available to targets. This is easily exploited by an attacker familiar with the differences in Unwanted Tracking Alerts.</t>
        </section>
        <section anchor="lack-of-customizability">
          <name>Lack of customizability</name>
          <t>Potential Targets’ ability to customize Unwanted Tracking Alerts is currently limited, as they cannot control the sensitivity of tracking algorithms. Because Targets have vastly different situations and needs, they may benefit from customization options. Some people may develop “alert fatigue” from false positives, while others may be more concerned about false negatives. Some circumstances may also raise the likelihood of false positive alerts, such as may happen on public transportation. As stalking situations often become more or less intense over time, potentially with several cycles of intensity, the same person may have different needs at different times. They may wish to increase sensitivity in a high risk scenario or timeframe, or decrease/disable sensitivity because alerts cause anxiety or false positives condition them to ignore alerts. This document recommends options for the customization in the frequency of alerts and detection radius for receiving an alert. A successful protocol may also consider whether potential targets should be able to customize whether an alert provides a high-level assessment of risk level (e.g. “high risk” or “low risk” for a pattern of unwanted tracking).</t>
        </section>
        <section anchor="difficulty-finding-and-disabling-tags">
          <name>Difficulty finding and disabling tags</name>
          <t>Location-tracking Tags are small by design and can be difficult to locate. While many Tags have speakers or haptics to help users locate Tags, these sounds/vibrations may be difficult to detect (especially for users with disabilities) and may also be easy to disable. Advanced features such as Ultra Wide Band (UWB) finding are also not supported by all tags and devices/platforms. This can make it difficult for targets to locate Tags. If a target cannot locate a Tag, there is limited recourse as it is also not currently possible to remotely disable a Tag (whether over the air using a device or via the crowdsourced network). A successful protocol would consider requirements to assist Targets in locating and disabling tags that are feasible for Tags, many of which are small and low-cost, and that can be implemented without otherwise compromising the Crowdsourced Network.</t>
        </section>
        <section anchor="nonconformant-tags">
          <name>Nonconformant Tags</name>
          <t>Attackers can deploy a variety of attacks involving Nonconformant Tags:</t>
          <ul spacing="normal">
            <li>
              <t>Impersonation attack: Tags could be designed or manipulated to impersonate a conformant Tag, but not implement the Unwanted Tracking features</t>
            </li>
            <li>
              <t>Replay attack: a nonconformant Tag could replay packets from a conformant Tag</t>
            </li>
            <li>
              <t>Physical modifications: a conformant Tag could have its physical attributes compromised (e.g. disabling a speaker)</t>
            </li>
            <li>
              <t>Accessory firmware modification: a conformant Tag could have its software modified to circumvent Unwanted Tracking features</t>
            </li>
          </ul>
          <t>If any of these attacks are successful, attackers may be able to authenticate with the Crowdsourced Network via any device, and therefore access location information about the tag without complying with the DULT protocol. This could also make it more difficult for targets to locate tags. While it is not possible to limit the deployment of nonconformant Tags, a successful protocol would minimize the ability of nonconformant Tags to access the crowdsourced network.</t>
        </section>
        <section anchor="activities-logs">
          <name>Activities Logs</name>
          <t>A successful implementation of the protocol should consider logging for two types of events: 1) when an Unwanted Tracking Alert is triggered, and 2) when a location of a Tag suspected of Unwanted Tracking is accessed via the Crowdsourced Network. The account and device are particularly important as Tags may be shared by multiple accounts who may have many different devices. Logs should not be easily editable to avoid gaslighting and accountability efforts.</t>
          <t>At a bare minimum, a successful protocol would include a log file that is clearly labeled and easily accessible for users of a Device that is not easily edited, clearly labeling the nature of the tracking alert. Each log event should include: the account, the Device, GPS location, and the time. This log should ideally be stored on the Device where the alert was triggered. Ideally, there would also be a log file that would also include the times at which the owner of the tracker checked its location while the tracker was close enough to the device to set off the Unwanted Tracking Alert. This would require information from the Crowdsourced Network and it may be appropriate to be stored remotely.</t>
        </section>
        <section anchor="anti-theft-mode">
          <name>Anti-theft mode</name>
          <t>Tile has implemented an “Anti-Theft” mode that stops the tracker from setting off Unwanted Tracking Alerts when a target runs Tile’s “Scan and Secure” features on their own device. Users of this mode must agree to a multi-stage ID scan and send in a selfie to Tile for verification. This implementation plainly fails to meet DULT’s recommendation that tracking alerts should not be circumventable under any circumstance. The ID verification that a Tile user must pass in order to enable “Anti-Theft” mode is an insufficient mitigation against stalking because it is only useful if the physical item is found by the person being tracked, a circumstance that this “Anti-theft” mode is designed to prevent. Any mode that makes it possible to turn off Unwanted Tracking Alerts is antithetical to DULT’s recommendations.</t>
        </section>
      </section>
      <section anchor="design-requirements">
        <name>Design Requirements</name>
        <t>The DULT Protocol should 1) allow Targets to detect Unwanted Tracking, 2) help Targets find Tags that are tracking them while minimizing false positives (e.g., avoiding legitimate, co-owned, or nearby Tags being misidentified as threats), and 3) provide instructions for Targets to disable those Tags if they choose. These affordances should be implemented while considering the appropriate privacy and security requirements.</t>
        <section anchor="detecting-unwanted-location-tracking">
          <name>Detecting Unwanted Location Tracking</name>
          <t>There are four ways that the DULT Protocol should assist Targets in detecting potentially Unwanted Tracking: 1) active scanning, 2) passive scanning, 3) tracking Tag alerts, and 4) Crowdsourced Network activities logs.</t>
          <section anchor="active-scanning">
            <name>Active Scanning</name>
            <t>There may be scenarios where a Target suspects that they are being tracked without their consent. Active scanning should allow a user to use a native application on their Device to search for Location-tracking Tags that are separated from their Owners. When a Tag has been identified as potentially being used for Unwanted Tracking, the user should be able to view the serial number of the Device along with Obfuscated Owner Information and instructions on how to find and/or disable the Tag (see <xref target="finding-tracking-tags"/> and <xref target="disabling-tracking-tags"/>). Additional information about when that Tag has been previously encountered within a designated time window (e.g. the last 12 hours) should also be included if available (see <xref target="balancing-privacy-and-security"/>). Allowing users to "snooze" or ignore Tags known to be safe (e.g. Tags from a family member) could also be implemented. Tracking Tags that are near their Owners should not be shared to avoid abuse of the active scanning feature.</t>
          </section>
          <section anchor="passive-scanning">
            <name>Passive Scanning</name>
            <t>Platforms should passively scan for Tags suspected of Unwanted Tracking and notify the user. This will involve implementing one or more algorithms to use to flag Tags and determine when to notify the user. (A dedicated DULT WG document will address tracking algorithms, and will be linked when it is available.) The user could be notified through a push notification or through Sounds and Haptics (see <xref target="location-tracking-tag-alerts"/>). When a Tag has been identified as potentially being used for Unwanted Tracking, the user should be able to view the serial number of the Tag along with Obfuscated Owner Information for all accounts linked to the Tag and instructions on how to find and/or disable the Tag (see <xref target="finding-tracking-tags"/> and <xref target="disabling-tracking-tags"/>). There will be tradeoffs between detecting potential Unwanted Tracking promptly and alerting the potential Target prematurely. One way to handle these tradeoffs is to allow users to set the sensitivity of these alerts. For example, the <eref target="https://github.com/seemoo-lab/AirGuard">AirGuard</eref> app includes three different "Security Level" settings that users can customize.</t>
            <t>To improve the accuracy of Unwanted Tracking detection, a confidence scoring mechanism can be used. Instead of issuing binary alerts for all detected Tags, the system assigns a confidence score based on multiple factors, helping distinguish between genuine tracking threats and benign scenarios. This section outlines potential factors that may contribute to assessing the likelihood of Unwanted Tracking. Each factor can be considered independently to help inform an overall risk assessment. A confidence-based approach offers the following advantages:</t>
            <ul spacing="normal">
              <li>
                <t>Reduced False Positives: A confidence-based approach can help filter out benign tracking scenarios, such as transient signals or shared family Tags. Instead of triggering alerts based solely on presence, the system can dynamically adjust its sensitivity based on behavioral patterns. For example, if a tracking Tag appears near a user only briefly or follows a predictable shared usage pattern (e.g., a Bluetooth Tag frequently used by family members), it may be assigned a low confidence score. This prevents unnecessary alerts while still ensuring that persistent and anomalous tracking behaviors are flagged for user attention.</t>
              </li>
              <li>
                <t>Context-Aware Threat Evaluation: The confidence score can incorporate contextual factors such as movement patterns, duration of proximity, and recurrence. For instance, if a Tag is detected only once in a public place (e.g., at a café or airport), it is less likely to indicate malicious tracking. However, if the same Tag reappears near the user across multiple locations or over an extended period, its confidence score increases, prompting a higher-priority alert.</t>
              </li>
              <li>
                <t>Adaptive Alert Sensitivity: By dynamically adjusting detection thresholds based on confidence scores, the system can prioritize high-risk scenarios while minimizing unnecessary alerts. Users may receive warnings based on escalating levels of certainty, such as:
                </t>
                <ul spacing="normal">
                  <li>
                    <t>Low confidence: Informational notification (e.g., "An unfamiliar Tag was briefly detected nearby.")</t>
                  </li>
                  <li>
                    <t>Medium confidence: Warning with recommended actions (e.g., "A Tag has been detected multiple times near you. Check your surroundings.")</t>
                  </li>
                  <li>
                    <t>High confidence: Urgent alert with mitigation options (e.g., "A Tag has been persistently following you. Consider removing or disabling it.")</t>
                  </li>
                </ul>
              </li>
            </ul>
            <t>This approach ensures that users receive actionable and meaningful alerts, reducing notification fatigue while maintaining strong protection against Unwanted Tracking. The confidence scoring approach could include the variables listed below.</t>
            <section anchor="duration-of-proximity">
              <name>Duration of Proximity</name>
              <t>Tracks how long a Tag remains in close proximity to the user.</t>
              <t><strong>Rationale</strong>: Tags that persist near a user for extended periods are more likely to indicate tracking activity than transient encounters (e.g., passing someone on public transit).</t>
            </section>
            <section anchor="movement-correlation">
              <name>Movement Correlation</name>
              <t>Measures how closely the movement of the suspected Tag mirrors that of the user.</t>
              <t><strong>Rationale</strong>: High movement correlation (e.g., appearing at home, then work, then a store with the user) increases the likelihood that the Tag is following the user intentionally.</t>
            </section>
            <section anchor="signal-strength-trends">
              <name>Signal Strength Trends</name>
              <t>Observes how the signal strength of the suspected Tag (e.g., Bluetooth RSSI) changes over time.</t>
              <t><strong>Rationale</strong>: A sustained or increasing signal strength suggests physical proximity to the user, strengthening the case for intentional tracking.</t>
            </section>
            <section anchor="persistence">
              <name>Persistence</name>
              <t>Evaluates how often and across how many different times/locations the same Tag is observed, while accounting for identifier rotation.</t>
              <t><strong>Rationale</strong>: Frequent reappearances over time and space can indicate deliberate placement, even if identifiers change periodically.</t>
            </section>
            <section anchor="hardware-identity">
              <name>Hardware Identity</name>
              <t>Analyzes available Bluetooth advertisement metadata, such as vendor-specific fields or Tag model indicators, while respecting identifier randomization.</t>
              <t><strong>Rationale</strong>: Certain Tags (e.g., known commercial Tags) are more likely to be associated with tracking. Even with rotating identifiers, consistent vendor metadata or other characteristics may provide useful signals.</t>
            </section>
            <section anchor="environmental-context">
              <name>Environmental Context</name>
              <t>Considers the location in which the Tag is seen (e.g., home, office, public places).</t>
              <t><strong>Rationale</strong>: Tags seen only in familiar, safe zones may be harmless. Appearances in unfamiliar or private locations without explanation raise concern.</t>
            </section>
          </section>
          <section anchor="location-tracking-tag-alerts">
            <name>Location-tracking Tag Alerts</name>
            <t>Location-tracking Tags may be difficult to locate, and users may not have a Device that can actively or passively scan for Location-tracking Tags. The DULT Protocol should be built with <eref target="https://cdt.org/insights/centering-disability-in-mitigating-harms-of-bluetooth-tracking-technology/">accessibility in mind</eref> so that the most people can be protected by the protocol. In addition to push notifications on nearby Devices, Location-tracking Tags themselves should be able to notify end users. This should include periodic sounds when away from all Tag Owners, along with lights and haptics so that people who are Deaf or hard of hearing can still locate them. Tracking Tag Alerts should also educate the user on methods to successfully find and disable Tags (see <xref target="finding-tracking-tags"/> and <xref target="disabling-tracking-tags"/>).</t>
          </section>
          <section anchor="crowdsourced-network-activities-logs">
            <name>Crowdsourced Network Activities Logs</name>
            <t><eref target="https://www.usenix.org/system/files/usenixsecurity23-stephenson-lessons.pdf">Stephenson et al.</eref> point out that Internet of Things devices like Location-tracking Accessories do not have ways to reveal abusive behavior. This can be addressed through the use of detailed logs that provide insights for Victims about which accounts have accessed the location of which Accessories and when. Crowdsourced Networks should log common user activities for review by each Accessory Owner, and should not be able to be easily deleted by Accessory Owners, who might do so as a way to hide evidence of Unwanted Tracking.</t>
            <t>Logs should include sufficient detail to detect Unwanted Tracking without being another vector for surveillance. For example, a log could state that "User B viewed the location of Accessory X at [time]." By including information about user, Accessory, and time, Victims can determine whether their own Accessories are being used to track them, and whether or not their accounts connected to the Crowdsourced Network are compromised.</t>
          </section>
        </section>
        <section anchor="finding-tracking-tags">
          <name>Finding Tracking Tags</name>
          <t>Even after a Tag is detected through passive or active scanning, a user may have difficulty in locating it. For example, a Tag may be buried under a vehicle cushion. Platforms should allow users who have discovered a Tag through passive or active scanning to request that the Tag signal its presence. This assistance should be done in a way that is accessible to users with sensory or other impairments by using multimodal signals as described in <xref target="location-tracking-tag-alerts"/>. Manufacturers/Platforms may also implement other methods to assist in locating Tags, such as precision finding using Ultra-wideband.</t>
          <section anchor="lost-mode">
            <name>Lost Mode</name>
            <t>Some Platforms allow Accessories to be marked as lost. When another user finds the Accessory, they can view a message and/or contact information of the Accessory Owner. While helpful in a benign case where an Accessory is truly lost, care must be taken to ensure that the lost mode function is not used for harassment. Platforms should use a non-customizable lost message and display either Obfuscated Owner information, or a full phone number or email address if the Accessory Owner chooses to share that information.</t>
          </section>
        </section>
        <section anchor="disabling-tracking-tags">
          <name>Disabling Tracking Tags</name>
          <t>In order to effectively prevent Unwanted Tracking, users should be able to disable Location-tracking Tags. This includes a Non-Owner user being tracked by a Tag's Owner, as well as an Owner user who believes that an Attacker is using their own Tag to track them. Platforms should provide instructions for disabling Location-tracking Tags once they are located. Manufactures/Platforms should also consider allowing Location-tracking Tags to be disabled remotely.</t>
          <t>Beyond simple deactivation, users should also receive guidance on additional steps they may take, depending on their specific situation:</t>
          <ul spacing="normal">
            <li>
              <t>Advice on destruction or preservation: In some cases, destroying a Tag may eliminate the risk of further tracking. However, users should be made aware that doing so may result in the loss of evidence that could otherwise be used to prove tracking or identify an abuser. Destroying the Tag might also lead to escalation in abusive contexts. Guidance should help users weigh these risks and determine the most appropriate course of action.</t>
            </li>
            <li>
              <t>Serial number access and use: Platforms should inform users how to retrieve the serial number or unique identifier of the Tag, even if the Tag is not from the same Platform. Serial numbers may be used to report the Tag, verify its origin, or, in cooperation with manufacturers or authorities, identify the registered Owner(s) of the Tag.</t>
            </li>
          </ul>
          <t>It is important to consider where educational and disabling guidance is hosted. For instance, information about disabling Tags should be publicly accessible, possibly from neutral, decentralized, or international organizations, to mitigate the risk of government censorship or politically motivated takedowns. This ensures access for vulnerable users, including those in high-risk environments or authoritarian regions.</t>
        </section>
        <section anchor="notification-management-for-trusted-accessories">
          <name>Notification Management for Trusted Accessories</name>
          <t>To reduce alert fatigue and improve user experience, implementations should allow users to snooze passive notifications from Location-tracking Tags that have been explicitly marked as trusted or friendly. This is particularly useful in scenarios where users regularly encounter the same Tag (e.g., a family member's keys or a shared vehicle Tag).</t>
          <t>Such snoozed Tags may also be de-prioritized or grouped separately during active scans, helping users focus on unfamiliar or potentially malicious Tags. Platforms should make it easy to manage snoozed Tags and review or revoke trust status as needed. It is also advisable to implement revalidation mechanisms, for example, resuming notifications after a period of time to prevent long-term blind spots.</t>
          <t>Some Platforms may wish to implement family sharing or shared Ownership models, where multiple users can be associated with a single Tag. However, this introduces the risk of abuse (e.g., an Attacker adding a Target to the shared list in order to avoid triggering passive notifications), and therefore should be approached with caution and abuse mitigation in mind. These features are optional and may vary by Platform. Whenever shared Ownership is used, information about all Owners should be made available when a Tag is suspected of Unwanted Tracking (see <xref target="passive-scanning"/>).</t>
        </section>
      </section>
      <section anchor="design-constraints">
        <name>Design Constraints</name>
        <t>There are also design constraints that the DULT Protocol must consider, including limitations of the Bluetooth Low Energy (BLE) protocol, power constraints, and Device constraints.</t>
        <section anchor="bluetooth-constraints">
          <name>Bluetooth constraints</name>
          <t>Detecting Tags requires analyzing Bluetooth Low Energy (BLE) advertisement packets. Advertisements are publicly transmitted, allowing passive scanning by any nearby receiver. While this enables open detection of unknown Tags, it also raises privacy concerns (see <xref target="introduction"/>). Some BLE implementations employ randomized MAC addresses and other privacy-preserving techniques, which could impact persistent tracking detection.</t>
          <t>The BLE payload in BLE 4.0 can support advertisement packets of up to 37 bytes. One current adoption of Unwanted Tracking detection requires 12 of these bytes for implementing the basic protocol, with the remaining optional (see <xref target="I-D.detecting-unwanted-location-trackers"/>). Implementation of the DULT Protocol will need to consider these limitations. For example, in <eref target="https://eprint.iacr.org/2023/1332.pdf">Eldridge et al</eref>, implementing Multi-Dealer Secret Sharing required using two advertisement packets were needed instead of one due to payload constraints. While BLE 5.0 supports 255+ bytes of data, the protocol is not backwards compatible and thus may not be suitable for the DULT Protocol.</t>
          <t>BLE advertisements operate in the 2.4 GHz ISM band, making them susceptible to interference from Wi-Fi, microwave ovens, and other wireless devices. The presence of environmental noise may degrade detection accuracy and introduce variability in scan results.</t>
          <t>BLE uses channel hopping for advertising (three advertising channels). Scanners need to cover all these channels to avoid missing advertisements. The BLE protocol also enforces strict power efficiency mechanisms, such as advertising intervals and connection event scheduling, which impact detection frequency. Devices operating in low-power modes or sleep modes may significantly reduce their advertisement frequency to conserve energy, making periodic detection less reliable. Furthermore, Platform-level constraints, such as OS-imposed scanning limits and background activity restrictions, further impact the consistency and responsiveness of tracking detection mechanisms. For further discussion of power constraints, see <xref target="power-constraints"/>.</t>
          <t>Additionally, Bluetooth-based tracking systems typically rely on an active Bluetooth connection on the Owner’s Device to determine whether a Tag is in the Owner's possession. If the Owner disables Bluetooth on their phone, the system may incorrectly infer that the Tag is no longer nearby, potentially triggering a false positive alert for Unwanted Tracking. This limitation arises from the inability of Bluetooth-based systems to verify proximity without active signals from the Owner’s Device. There is currently no straightforward solution to this issue using Bluetooth alone, and it represents an inherent trade-off between privacy and detection reliability. Systems should account for this possibility and communicate it clearly to users.</t>
          <t>To address these challenges, detection mechanisms must balance efficiency, privacy, and accuracy while working within the constraints of the BLE protocol. Solutions may include leveraging multiple observations over time, integrating probabilistic risk scoring, and optimizing scanning strategies based on known BLE limitations.</t>
        </section>
        <section anchor="power-constraints">
          <name>Power constraints</name>
          <t>Unwanted tracking detection mechanisms typically rely on periodic Bluetooth scanning to identify unknown Accessories. However, continuous background scanning poses a significant power challenge, especially for mobile Devices with limited battery capacity. Maintaining high-frequency scans for extended periods can lead to excessive energy consumption, impacting Device usability and battery longevity.</t>
          <t>To address these concerns, detection systems must incorporate power-efficient approaches that balance security with practicality. Adaptive scanning strategies can dynamically adjust the scan frequency based on contextual risk levels. For example, if a suspicious Accessory is detected nearby, the system can temporarily increase scan frequency while reverting to a lower-power mode when no threats are present.</t>
          <t>Event-triggered detection offers another alternative by activating scanning only in specific high-risk scenarios. Users moving into a new location or transitioning from a prolonged stationary state may require more frequent detection, while routine movement in known safe environments can minimize energy consumption.</t>
          <t>The DULT Protocol must account for these power limitations in its design, ensuring that detection mechanisms remain effective without significantly degrading battery performance. Consideration of Device-specific constraints, such as variations in power efficiency across smartphones, wearables, and IoT devices, will be critical in maintaining a balance between security and usability.</t>
        </section>
        <section anchor="device-constraints">
          <name>Device constraints</name>
          <t>Unwanted tracking detection is constrained by the diverse range of Devices used for scanning, each with varying hardware capabilities, operating system restrictions, processing power, and connectivity limitations. These factors directly impact the effectiveness of detection mechanisms and must be carefully considered in protocol design.</t>
          <t>Hardware variability affects detection accuracy. While newer smartphones are equipped with advanced Bluetooth Low Energy (BLE) chipsets capable of frequent and reliable scanning, older smartphones, feature phones, and IoT devices may have reduced BLE performance. Differences in antenna sensitivity, chipset power, and OS-level access control can result in inconsistent detection, where some Devices fail to detect tracking signals as reliably as others.</t>
          <t>Operating system restrictions can affect detection efforts, particularly due to background Bluetooth Low Energy (BLE) scanning policies. Both iOS and Android implement mechanisms to manage background scanning behavior, balancing energy efficiency and privacy considerations. On iOS, background BLE scanning operates with periodic constraints, which may limit the frequency of detection updates. Android applies similar policies to regulate background processes and optimize power consumption. Additionally, privacy frameworks on mobile Platforms may influence how applications access and process certain Accessory-related data. These factors, along with resource limitations in wearables and IoT Devices, can impact the feasibility of continuous scanning and detection.</t>
          <t>Further, Platform permission models can restrict access to BLE scan data. For example, Android requires coarse or fine location permissions to perform BLE scanning, and users may revoke these permissions. Additionally, radio coexistence (BLE and Wi-Fi sharing the 2.4 GHz band) can impact BLE performance, especially on Devices with shared chipsets. User interface constraints, especially on wearables, may also limit how users receive or interact with tracking alerts.</t>
          <t>Processing and memory constraints are another limiting factor, particularly for low-end mobile Devices and Tags. Continuous scanning and anomaly detection algorithms, especially those relying on machine learning-based threat detection, require substantial processing power and RAM. Devices with limited computational resources may struggle to maintain effective real-time detection without degrading overall performance. Ensuring that detection mechanisms remain lightweight and optimized for constrained environments is essential.</t>
          <t>Connectivity limitations introduce additional challenges. Some Unwanted Tracking detection mechanisms rely on cloud-based lookups to verify Tag identities and share threat intelligence. However, users in offline environments, such as those in airplane mode, rural areas with limited connectivity, or secure facilities with network restrictions, may be unable to access these services. In such cases, detection must rely on local scanning and offline heuristics rather than real-time cloud-based verification.</t>
          <t>To address these challenges, detection mechanisms should incorporate adaptive scanning strategies that adjust based on Device capabilities, optimizing performance while maintaining security. Lightweight detection methods, such as event-triggered scanning and passive Bluetooth listening, can improve efficiency on constrained Devices. Additionally, fallback mechanisms should be implemented to provide at least partial detection functionality even when full-featured scanning is not available. Ensuring that detection remains effective across diverse hardware and software environments is critical for broad user protection.</t>
        </section>
      </section>
      <section anchor="priorities-for-the-dult-wg">
        <name>Priorities for the DULT WG</name>
        <t>While all of the above design considerations should be considered, the following topics are considered highest priority for the technical documents of the DULT WG to address:</t>
        <ul spacing="normal">
          <li>
            <t>Active Scanning
            </t>
            <ul spacing="normal">
              <li>
                <t>The documents should ensure platforms implement active scanning for all DULT compliant Accessories.</t>
              </li>
            </ul>
          </li>
          <li>
            <t>Passive Scanning
            </t>
            <ul spacing="normal">
              <li>
                <t>The documents should ensure Accessories and Devices implement finding algorithms, issue Unwanted Tracking Alerts and otherwise notify users of Accessories in proximity, and allow users to manage Unwanted Tracking Alerts to improve detection of Unwanted Tracking and/or prevent alarm fatigue</t>
              </li>
            </ul>
          </li>
          <li>
            <t>Nonconformant Accessories
            </t>
            <ul spacing="normal">
              <li>
                <t>The documents should consider how to minimize the ability of nonconformant Accessories to access the Crowdsourced Network</t>
              </li>
            </ul>
          </li>
          <li>
            <t>Remote Disablement
            </t>
            <ul spacing="normal">
              <li>
                <t>The documents should consider whether Remote Disablement of Accessories is feasible to implement in a way that cannot be used to compromise the Crowdsourced Network</t>
              </li>
            </ul>
          </li>
          <li>
            <t>Crowdsourced Network Activities Logs
            </t>
            <ul spacing="normal">
              <li>
                <t>The documents should provide guidance to platforms about how to implement activities logs to help Targets identify possible Unwanted Tracking</t>
              </li>
            </ul>
          </li>
        </ul>
      </section>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This document has no IANA actions.</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-normative-references">
      <name>Normative References</name>
      <reference anchor="I-D.draft-ietf-dult-accessory-protocol">
        <front>
          <title>Detecting Unwanted Location Trackers Accessory Protocol</title>
          <author fullname="Brent Ledvina" initials="B." surname="Ledvina">
            <organization>Apple</organization>
          </author>
          <author fullname="David Lazarov" initials="D." surname="Lazarov">
            <organization>Google</organization>
          </author>
          <author fullname="Ben Detwiler" initials="B." surname="Detwiler">
            <organization>Apple</organization>
          </author>
          <author fullname="Siddika Parlak Polatkan" initials="S. P." surname="Polatkan">
            <organization>Google</organization>
          </author>
          <date day="3" month="November" year="2024"/>
          <abstract>
            <t>   This document lists a set of best practices and protocols for
   accessory manufacturers whose products have built-in location-
   tracking capabilities.  By following these requirements and
   recommendations, a location-tracking accessory will be compatible
   with unwanted tracking detection and alerts on mobile platforms.
   This is an important capability for improving the privacy and safety
   of individuals in the circumstance that those accessories are used to
   track their location without their knowledge or consent.

            </t>
          </abstract>
        </front>
        <seriesInfo name="Internet-Draft" value="draft-ietf-dult-accessory-protocol-00"/>
      </reference>
      <reference anchor="I-D.draft-ietf-dult-finding">
        <front>
          <title>Finding Tracking Tags</title>
          <author fullname="Christine Fossaceca" initials="C." surname="Fossaceca">
            <organization>Microsoft</organization>
          </author>
          <author fullname="Eric Rescorla" initials="E." surname="Rescorla">
            <organization>Independent</organization>
          </author>
          <date day="6" month="June" year="2025"/>
          <abstract>
            <t>   Lightweight location tracking tags are in wide use to allow users to
   locate items.  These tags function as a component of a crowdsourced
   tracking network in which devices belonging to other network users
   (e.g., phones) report which tags they see and their location, thus
   allowing the owner of the tag to determine where their tag was most
   recently seen.  This document defines the protocol by which devices
   report tags they have seen and by which owners look up their
   location.

            </t>
          </abstract>
        </front>
        <seriesInfo name="Internet-Draft" value="draft-ietf-dult-finding-01"/>
      </reference>
      <reference anchor="I-D.draft-ledvina-apple-google-unwanted-trackers">
        <front>
          <title>Detecting Unwanted Location Trackers</title>
          <author fullname="Brent Ledvina" initials="B." surname="Ledvina">
            <organization>Apple</organization>
          </author>
          <author fullname="Zachary Eddinger" initials="Z." surname="Eddinger">
            <organization>Google</organization>
          </author>
          <author fullname="Ben Detwiler" initials="B." surname="Detwiler">
            <organization>Apple</organization>
          </author>
          <author fullname="Siddika Parlak Polatkan" initials="S. P." surname="Polatkan">
            <organization>Google</organization>
          </author>
          <date day="2" month="January" year="2026"/>
          <abstract>
            <t>   This document lists a set of best practices and protocols for
   accessory manufacturers whose products have built-in location-
   tracking capabilities.  By following these requirements and
   recommendations, a location-tracking accessory will be compatible
   with unwanted tracking detection and alerts on mobile platforms.
   This is an important capability for improving the privacy and safety
   of individuals in the circumstance that those accessories are used to
   track their location without their knowledge or consent.

            </t>
          </abstract>
        </front>
        <seriesInfo name="Internet-Draft" value="draft-ledvina-apple-google-unwanted-trackers-02"/>
      </reference>
      <reference anchor="RFC2119">
        <front>
          <title>Key words for use in RFCs to Indicate Requirement Levels</title>
          <author fullname="S. Bradner" initials="S." surname="Bradner"/>
          <date month="March" year="1997"/>
          <abstract>
            <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
          </abstract>
        </front>
        <seriesInfo name="BCP" value="14"/>
        <seriesInfo name="RFC" value="2119"/>
        <seriesInfo name="DOI" value="10.17487/RFC2119"/>
      </reference>
      <reference anchor="RFC8174">
        <front>
          <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
          <author fullname="B. Leiba" initials="B." surname="Leiba"/>
          <date month="May" year="2017"/>
          <abstract>
            <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
          </abstract>
        </front>
        <seriesInfo name="BCP" value="14"/>
        <seriesInfo name="RFC" value="8174"/>
        <seriesInfo name="DOI" value="10.17487/RFC8174"/>
      </reference>
      <reference anchor="I-D.detecting-unwanted-location-trackers">
        <front>
          <title>Detecting Unwanted Location Trackers</title>
          <author fullname="Brent Ledvina" initials="B." surname="Ledvina">
            <organization>Apple</organization>
          </author>
          <author fullname="Zachary Eddinger" initials="Z." surname="Eddinger">
            <organization>Google</organization>
          </author>
          <author fullname="Ben Detwiler" initials="B." surname="Detwiler">
            <organization>Apple</organization>
          </author>
          <author fullname="Siddika Parlak Polatkan" initials="S. P." surname="Polatkan">
            <organization>Google</organization>
          </author>
          <date day="20" month="December" year="2023"/>
          <abstract>
            <t>   This document lists a set of best practices and protocols for
   accessory manufacturers whose products have built-in location-
   tracking capabilities.  By following these requirements and
   recommendations, a location-tracking accessory will be compatible
   with unwanted tracking detection and alerts on mobile platforms.
   This is an important capability for improving the privacy and safety
   of individuals in the circumstance that those accessories are used to
   track their location without their knowledge or consent.

            </t>
          </abstract>
        </front>
        <seriesInfo name="Internet-Draft" value="draft-detecting-unwanted-location-trackers-01"/>
      </reference>
    </references>
    <?line 802?>

<section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>Many thanks for feedback from Brent Ledvina, Barry Leiba, Michael Ricardson, Eric Rescorla, Christine Fossaceca, and Alexis Hancock, and for contributed text from Corbin Streett, Diana Appanna, and Eva Galperin. We also gratefully acknowledge the guidance and support of the DULT Working Group Chairs, Erica Olsen and Sean Turner, and the Area Director, Deb Cooley, throughout the development of this document.</t>
    </section>
  </back>
  <!-- ##markdown-source:
H4sIAAAAAAAAA92925IbV5Yl+B5f4cW0mmSoAQRvSmVH1lRlUKQkjpEiW0G1
pkxW1uYAHAhPOtyR7o4IQpkcy3/opzGrNpvX+Y2ZP8kvmb3XvpxzHA6QUmdN
10z2RYwIvxw/l31de+3pdHrWl31VXGb3nn3/8m329qYt8j571SyL6t7ZIu+L
ddPuL7OyXjVnZ8tmUecbunjZ5qt+Whb9arrcVf20x23TDd82ffDkrNvNN2XX
lU3d77d0/Yvnb7/Ksl9ledU19KqyXhbbgv6/ur83ye4Vy7Jv2jKv+IcXV0/p
P01L//ru7Vf3zurdZl60l2dLGsvl2aKpu6Ludt1l1re74uz2Mnt8ltPL6anX
xWLXlv3+3tld075bt81uy59V9MWiL+t19n19l9d9scxeNvRhNLbsbZsv3hVt
d+/sXbGnm5aXZ9k0e0EXtXXRT5/xV/Jvlv6MnT2jsmf0+gy+TqYhwzSc3Rb1
jkacZT9vJFkmU3bvB/oIvvhrvp1/v8nLin5vQ5jam3/P6zBr2jVflLeLG7ro
pu+33eXFBd/Dvypvi5lddsG/uJi3zV1XXBw87YKfsi77m92cV4qX+G6NVb6I
V5mvqmhJuj56W3z1TJ4xK5vkvotTW2d202/oyWf5rr9pWl4MekuWrXZVJfvu
3qt8vS6L7FlR5XVzD3+lL8rr8ifM42V2fZe3/c2maYvsy6aqinWBiwqdvM0S
dz78fefXzYrljt55+K7/paAdXNAa3RVVNfaub/HfvMq+LXreclnfZM/rZfas
2dC8lIvsP5dNVdSLZAh/qPC839d1sbzl5Rh79fUNXVt0N9mbNp/f7EZf3rwr
8/jBnd4z2+Ke39d8wWzRbM7O6qbd0G23tB3P+CSHn86m02mWzzte/f7s7GW5
vunvCv7/fYfLzuCd2OfrjjZYQdIguyuXRbbrCv7mvKJv4h/ajn/EjXRRX2y6
GUmUgq/iW1e7eoHdntNjMhrZtqlJBGTNin+k/bjsml27oHNR64Tyi27KxQ2d
wNtyUXTZvKiaeo3BNFnT3xStXyvvv1/M1rNJtr2hR3fnWVtsm7bXh2AQdM8+
64oiy2ml6Iey9S+d0M+7Tj4Hr7gpsuauLtr79CQaJP9Mz+BXs0RoN2Vd0KML
mhF5EP/xjj5u03Q9vXpBH1fhZfUs++GGVoevo6t5Djd5vc9of5Z9ueHpouF3
+hKdr4mMlS9muZmR1FsU276cV5h1ErA8/7SaGNh2124b+pke0fV5hQXjT8zn
dNUsu8q2bdM3i6aiq0lG4SM7mcLOvmjRBwHnq77Z0ceU9aKh57c80rymq5Z0
W0/P5yt0ag5vpaO27Bb5lse7zPe8GcouIy2y2/C604huaRvxZlDJmdNp2nd0
jXwV/UM/a8IjqHZ4HV2dv2/qZrPnNx++lb962/T0BlIpWd739Ht6xzova/oS
lcK0C+nmI4KYn3Kf9eG5z5rs5DD2ZbGi1e9o+WnYNE7aqfzeZoft3C2abVia
wyH6UycyWpsI+n/luqat88dd2Rb8IrqCdR7dWeIHvpx/QZe3GLHMVbnZVrg+
t0/zV5xa3JkIgE25XFbF2dmvWPe1zXKHCSJxcEQE/Hs778PjzmqZ5t11NG9Q
P/s3+W2hZ/KKdlx2Q9KODuJtUU1ky/HTOx7zqsEhITGZkXJ/y0+4f+9qQePq
yFwpunvnPJF1tyn5OT5ZRZ3TEV1mV8vbou3LDuuSvcn3VZNj8XpaS/4ke9R+
2m2LRbkijeHSuallw9ltZDKVPM284wrMA3+hP4G3YFdscz6gy2zVNhtajy57
bdJLhB0JNz8YJJgqElMzfNuz49Ot03zvW/oyPM4upq9v5vTHW5ZqLHl0qB1e
VopM8OHLCYnGyAp/YgvGYw0WFWmU7Mt4e6h+lbHyrPh3/XFX8ErgXWO3+BlM
9gKEtc8dHYKrrM5JIY4cI+wIPZbFexZFNEs0MzRE2hC/7jA/ImjrfQN9wKKZ
Feicj0G7LrAiTTswGXmS5/vkMRP+dD/cLOa3bXmbL/ZZW3bvZnQ4M5o9Mix2
ZNPprnyxyqIdmXX8BbrH82xVvqd3l2xn0+7CnhFpJdNOf5vTSPitx+YPOkhO
E2uzlgQqlrzlp+SqifA9/P3Rfrwj64+FIeQf3fJrPlEk2UlnLApZyCu+AdKZ
HsfTtiDNst7RA2RWshfP8Cte4/3pFY73z4mH2371x+csK+gbyk3xS16VQWXJ
OeFn2KvDm/mh3a5tWW/THbuOFmdLapHvi2aLH0Vj4s0SjqpMKz18wxsliGDs
3ntkmNyL9zDerK/taBftKnJScpLAN3Rgazrw02Y1vabPp7NLyq25PnfVSE9f
VU2zNJtn9Nt5QbNu2zQr+iVPn+whUknLsmt3Wzg2pMSrbLddQlBBH9JWIYFV
bezZyVH+ihUdC8dFM40P6IYcg5JOoshckacnzjitSk4ng7YXra2uccsbk6Qp
/aNrFmwItGT5Q2HelFsaNXlVPWtw+Jpw0ejA0rkpmxY6d0MKlEwsOH18xO0o
2sYWT5Tk59mIX+dWBJ2SBS8/DMGqWPUyrGVJ+n5Hg+KJJEtwtyLze9fyyvGs
vaGRsh7oeGMcCN5Z9jynVY1vS+6i008iq1zRt/PcpjINGnvbkrqjPx2Md6Lq
d5PveVr4P7S9WZLxhORie2InyKZPh053+MhFe60b+kY1DxED+KgPHJled+oA
y+KUGDlszrxdlj/xKXaTdk47gTR6dmiwvIUhfTCHYkiN7aaOVpQEbdMuZQ8d
eSOLgk/5GPUpaP+Xm/InOwWxXId6WbTlvGBjnQ4M2boQ0nXBhztngdSIZfyT
eC20HCZ64TZHi20PFnu6G1rcYkQX3WX28HxgR4/shUfn2YZsjYZU+lCyqOe3
KFt6MvYSfxZCSG90imSKH5+b9jxltdq84AE2x7KFTo5RvCZSdFXxHntz1ZID
bb64mtXBq+ABYcbUawnzZv7HosfxpwPETnoGX46uh2cWfAqR1CQ4844GI9Ym
u3/yELbwivc96evgJtyQwSyenasGHoyK/C1NbFPn9i5WGnLk5nQz237Q0CG2
pKerM0em9nU6sia+bW0DBJeLjM22fI/RyD7cmhTuSEiwwo92V0MylqdZNEd2
W2C+ZtlXZc0WJayFI+ttg13RXoSrS4rRrN7Y33EPR10ebJRuB0XHEZJ9FI0b
2bN5xTa3Cu3EvYIo2ZVLNkD47aS26BSZjMjuk8XKI2+L5bkem3jKozPEpmzP
0cul6hiWufzhooxE2o1ZkoMDwrsrHH0yj//0p797MX02G0bIcncTbBk/fMB3
Hbl+VcIt//BBdkn6zjLatbTNiryt2DC0mGeGmOfvECBJHk8OzS0t8jTf0ndN
102zpv8cBA/pneRF/iq7oqvIXZmXVdnvz85GYx8c5pSIR7G4qZuqWe/FPtXt
v+vUbh6RqaUuw6rIO4uH0J4sNtte3F2Z1SOBhYLVp+/l6PVlrfa+rrVKoGQb
+ILha+jiqnxXVKInc/1sNYtvCnUhEZWgh5DcpUumsgD+XtjtOxoS7Qey73nP
VPS2GkFxvnO77WRmlg1ew8L3UNNFbsAkrCfNL+3lmjf4i+btuTvWEgSiL+AZ
5ENVdgs21njwCDmQ9uGTtchbMZHEz1mQ+LdDuaia3RLuAJ7YuKW1KZZlziEn
Giwmo3iPwJX4dphh+r9fv7n24LltuHm1K/qGbIvpbTeFiTGNp4n2Pb+YLLni
Noc6c28ZB6ItSGbSwi1F5tBePDzHrAY4moYQsa4djYo3S1i9kmMwa8gtj+9h
2mk6x20Mfi4eybYVCSHePLLtj1wPF420VmfuIc8+bdhlscjZM0asYk4/kGtS
QFLCZ+e4a7Wf4nCU4ph9XTVzDkKTNX5jv6vyrncBvqdTjoDGqL1Dmq5lob2t
mj17hHs6nn/gxdyQrymRldTOm2XfNHf8aDL9d7bTSyxLacJVwyrkeXYkAXja
Dkwwd83rED2nVShI2Sw4Om0BWjXcb1khdv3xFZiM/x7Lls7UNdnvNzAo91ta
cIRCyDrrRaDnq1WlTslms6NTWLLJ/UIEuA3h8Gt4tEeWmpaUD38xQeiUDsIC
akJNKezGZkFuAg9TjQfbdyLoggsRRF6io6amo1iU9GVVxdLQFHEQebK3I9XO
H1AeMZ8xgfdNQMV3mNXd7niX8QTs2jl/Yleci+bFt/G8dQ1ZKOQhdz7TbSEb
UUURuxp8Bm85YaUC1MysMcuP9Uz2ZVOznYNzyq97xtZWiZ+hhqK/n7Ekf0dH
itN8XXbv1ffXbzndyP/Nvn2Nf3/3/D99/+K758/439ffXL186f840yuuv3n9
/ctn4V/hzi9fv3r1/NtncjP9Nkt+dXbv1dU/35M5uff6zdsXr7+9ennvQN9A
IMsxYBOjJVnC35x3Z4md8PTLN//X//HwCSvo77768tHDh/+RBKP88NuHXzyh
H2jz1PK2pmahgR9ZopyRkCNpgGAc7ZJFvi1J24jF25GRWkOt0eR+9iPPzL9c
Zv8wX2wfPvlH/QV/cPJLm7Pkl5izw98c3CyTOPKrkdf4bCa/H8x0Ot6rf05+
tnmPfvkP/1RxDmf68Lf/9I9n2DLJFvrsMw+wfPbZ5dklYlxbCZAPjEBaLRKQ
6hznwReX88fK9Hhckw9xsyNxySdlU+T1wC4Ux8E2Cas1HhhE4jUZSxxLluGJ
F6DZqkNnaempD4kD1rdNdQtfAMod343YbMcmGIvnmvbKfB+bFjM+VCQeSAzi
U99o2MUGIoNTHydMWgh5TMSfh00RZzQ9NqmSS4PQRb3O1xDgh99D+/uC7RB3
eI5Z2hjU2MzrAM2IkTGE6ItqAKQ38LUcD7hBQg7WBnlOpAdDODC2R5okMIsR
PIPHAa9AXiyhgIavkpQNwjKS43Ln6Lilt5dAfxgl/1HGeSRUpkpDFM+88I23
vSHjeAHTjXefJFXIISO/ST3zOS9Luz/nZbstc8nnbHgaOAomkex40yfhTXne
d/Q8mshoFs6H00J2K/l9kn7qZI7IPiLzd6hvNS3B+7TP30Foij9XxJmYkRnr
djyxvI2OaBUaD94gb/8mb5d3kMpyYtR77ppVj1+vEHv0DxeTRX2Y6NzHIXqR
ygXia4ApjAahsufvc3YhsTHcxmD7Eqkukub8sRx+rfJt33BEs+gXOv5Pj7HZ
Cfnss7AdxVFEipfdhaJqthtd4xDH4+N1FyNUTsYVdd/5/IXkJE/gcHZgaPGs
ZIP8ILv3je3xvFrTLf3NRh5yIiqAWXkufs6zyM8x8RRtDxNCFZseyJfU2eMH
2WIDjdlnVcGSj5dvSdZM3QE1EF/88Ld88fvs4WO9iQbOS8hpA79F4hIsu+Jb
H33OL/qHbrf9x8f/cMH/EeHfFsXUb+UEzDZfQEV/9mkpxyBrnpp7ld1/Souf
J1dvNVXnctj+uoT9kM4Th5gN4DBJTFQI9js2QdXoXu3YbfBgnAtLSxOw+rRU
5fhXXfd0YfiKrlcUQpL9ROpYTOYoQaOxhBaih5b/tizuxMk58s5DkRGU2GCb
8BwcgmTIpJK4B/xwRy1Msvmuh/ceXI1JmgQPMBRyjS++/vb6OvrVD+VXZfTj
gqOT4Uc++gMoQZL0jBWTpfxoZhKJKlJ91D7ZdaYGSo0ryAg4D2lizsdxOjQR
Ag8jBzKDiZkvxeVuRhT5Rx7OXgR8Dqw5OSqt+nTdEd/syOLTn8w0YJxP4qKo
602/X9CpXRc0cMkKndI7eM9QidkrdAH8JbHBGO9y3kGcF2j6g8WD1UO3py/E
JS7lorRTH6FWFupbM/IDyRoTwdu23HD2AcYhfp+8c8aJTvmFOW8dAkC8uSVH
FGm5gYy/aEI6y0d6YlrK7uDpKf4BUeO8DkZZ8udfRyKBzj7SvKeynRjT/dfz
1a5j4295rh/6IpwjGeX9JroG0I5FGpaCgRAvosic7IcDkcoBpLx9B38P0AyF
o5Bbxtaa6k7OQSEkI7hYm0tgAOnkLMmtJuPhNYfO7spO4kjJgPRxc86U2tDF
0O5ETEsCidYbI8UeWeRdYRGJZCHZAqLzxpL1tGGV6TR48kOMfAcnCZauN2iH
brewmxGIHfkMm5VaA3pQpB4AY927LNelxBDGZw6wAJ+IZB7DPluVbcfKn21g
h7vRsWC4JrYem+09qxcEWJIEEl/Lf+ZY6/tetLjBFOef6f9+X+I/DNcUo3jo
V/0SB4+Xp93hdlPGLPzZ/6olAUAjjONXfI7p+KzZJDl8+hWnVg4cwIEjKoNX
e1gG/XqLJBA9odt3DBJTE3noXA3dJXvKNMo9v8IEmISQ6eC5iHwgPuIamAIC
KbXNI6FwEc5emsfm0/BehHu85z6qzZ++zb6+ehuybfhNYmRNsm/evn0TTPVD
l+h/kGP4UZ8Ow3W1SKev5aOWJmgS/Skh/ZNjpFs5oydJ0lKwO3gLh/1sjSOt
xTCeWIgcBAsEMRNBj8rWcRrZlWVbB+AGDnqd9BkxKD8O9+3K88iZ+v7tuYyX
vSbkEANeRyQPMrwTHRMtLf2iF1tZfuXIu07m/ZPHkx5PV/bIg8o2cE0q2A76
ZgaDdS7ETKDRLuuKWowJYHw5nbKuy5/YsUhNX1X4NLZbSabb5tpIGgNgKMhs
GYeijf2NvFbstt/mLYOiYITALQooXxqKon1tU6pBGA2FzqlgLztINMUcDt2C
4PW8bO6y56Re1ntygF4+P89aPuNH5tOBwjqnwd2UXJxAakcn7l3NmyoaaDpP
th2iueJottWvsICNMucMRzHwdQxKHGY2FSUwTPgiJ8D7vFRobwFfprOXCQQF
NmVFD1xyrO5GkUMiQREJqGAvjScIAkYaIdQj30EapSTDK3vbnIhLAHtD61n2
O/NcOEgpGowj4oKUqMxenSQCQbflILUnYEgshsRgRQ6QTWjGcwv0GDIDsmsD
fg9WBp7gMbL4UZtmzjk+e5DBl/MIjS4pU84uyn5kdD55tRN1Sv1xGorLyXCY
Zwyt41gpDY3RpjIqXiqzjNyQwt1yUPy7Dl7u/q/6w3RqyjUbPCyR8FreAAUr
s9p+LcPpdlsgdBFicSCIgtMUqTddATeTcdkOqyld0/vhMN9YGO1dsedIFYcD
/3k3L+XHBG3TQqwsSy2tUWDLeSigKCXsZ24e3DGUQ8gnScqQZ4rBunD1ByvH
sTORzKyZw0nYFDmbwGzoloASCTgRWbfwDNrs71nn710exbuvKvLlwR8KMi6r
3EBOqBMhwbLABI7u6ln2HX8A7UkabkDFAGPCxTlWdEHzVDSrFaQcEnR+bsQ2
b1ZkbyITW8UheJboKp0FoSE6yiSzbsiRPawp6rBBs7KqdozU6VWf1IWshucc
+Vre+j7LAnKQKol4b50M35FUeUpTWC/4gjfqovCUmKxJMXv5bVMus23ZO7As
cmtYYqlrg02PBMPySIZBi0Z6QVvhVRddvip6fRQSlJMRsYuqGZ8FoPbwAUUy
HNha/rhwviS6rXp5PJD/nKEDGGPkSh0NwNJhnJFGFhculh/AYsmuZJ31No8M
KYckj1pU5yIW52xoL2hiygUshTytMdjIUSMtzXlreuFq4Akevi1Em1yg6dAs
fcE+myTMV5phF2AMTT4qURzw3sWnuKhZokXohefVsi2XZOQz6poOHb7nxyXJ
ylr29PJf7ltpY0FLRlZkmS9a1FA+evDo8cXDx48fzbbLFbCUjlNhKdE11S44
YrQ+VbMHBq6ld3EKyQqVirblFFbTtuq5LQyHrWYWjIv2tjixjW15yOzcLWzu
ihX5CHrtxw5XpLNtxx/uIF64Awjk2dkhxAxbf8PmXRlBBkdv17wNAoBjx2/R
0u1J2Fn1SIqS5glAeQnDLJpa0kAbEVkrNUZf9BYzyMtltLv44FsEwuYu4Pvp
NR6QSG1LURK86wK8MBd/BlEBrOphPIiBhwXM2fsaGxAIOKuftrDSDRyqCliT
VqDWHMyhB5JKxe7G2WK1ZNpoiHRkyJVEEOK332ECbsumMk0Z7aicvqaebkg/
LGCU+w47T9KG8emec1q6Nki4hlHgKhtehEEFMjUoXcFdtE/zxWG0hTdIHKC5
L5gwCVBOOw0wfPhwrnvW9MD4zopFtyK3DjW9uKAtsOz0m9uC9BkL6aPb2iV6
H4CBgoIdGmZi6Y9ZnTSv0yiYqcoV5T389V2/W2I9GDNMMkfKQ3n2cNi17DNC
Lf74VctaF0Jskj168PC3QWwtq1m+2EBiLZvygmTVxcMHs4cPn3x+8fjhF48/
/+LJjP775NGTh+eT7ItHfy9qub0tb5s2LhMqVAKwCsLOLvBPz4e7/azfXUvd
aTvLnjz8+/AcCUvR7TdkeYj2wmXZvTtFYbOIvqeKJritgh7dC1QNYZemMbxv
VKyrD+PatTkX2ZFuvQ0zHA2S/gQMKgKbs+w3XxyM0T4A9bwGSLp3Q2t7zz2t
MgJEmoU9Y//G1LDuu/xAkUlFpCTbdcZt603SNKzKLK0fSE9zjJaVnWa1f2Kj
BVTKMHaeW00W70VyTN9F+/DwcO3q6P6gd87OuMhq/I8TL1O0mbzwqmTbX7yR
aC0n43IlktByshRzXgHUuD5mItBqXvv+BQSNxQeZSnLY7xoyp3+taL2vn779
Ty+u/gN5C+ubPuRkTXL42Utt9Fst6p9AamN6AbTkahf6T41karqitLdYwkEw
QunT7mCEOLkpjVz/49WmLjoSTQLcVWIBPs2PPg+n+e7ubpbLhTjSRX0hHAwX
dXHXsU3y+cWDxxdlm9dT4VBAGnIqZYhTfHw3lc+d+sRMeUtM85ZOZJu3e/oX
Dbafrki48DRPacTTJQm6m+m2oEGRBUyy4sdvdnSCyE/hZ2U/5P3iBqN9kI72
pr3DSG18D3h8D3978S7/KX93w7U1Nqplvo+GRHKWzj5nVehV3+3Kn6bf5rc0
sAYCbjAltA/WOy7RyWsOoF+sAfOcRtiFC77pYpO3/G7SMctdm3fy5um6ypf7
bkpL9VM+XRV80rrN9IY/T6eK9N/TVqpYu90As64+IQ5LHL5yC183U7Q3pMDB
qunTnZID/SrCadtsd1qyFj/5MPKcYbC6jTmaWqA8nw4WSU7SrbTrNuWaNoUV
kPvO3xbNlqGk1zQT+kMAnCn7i+VV/wt73P+Fj2ZQEHwy55ByrbMOjFUdQHfC
2+oWN8VdzHtgE4VDVnSSqomMWw1CiU21Mm9JgtSqzvlgq9qfiebucnwPgmyW
nIykCQp4D81NxMCDChfxKDMWrxKuS1ymSVaUIuz6uKYIeFeemZLDJHldoP5z
bH7MMlVF5ewH3YJOXFs24gK/PVUKRR9ObjcbJMWgsmtQ23Qnpa5zcjnIwIC6
IEWrPtBf//K/d9mPr7zmCYUc9BZTB/dfXb05D1VWRw0NtoO/6TdVsDY+f/Lk
8ye/nT3+/LcPn/z2iZmUoV4rLqtZDbCBWlJu6KH4T0hmo9ZNQiTy3WUxqNiy
XUbGitYmtgW9RWrt2LKUKsdcP/fuhmR8l/PRcG+Rs4hSZ4aYySRbFzXg9XQT
SYcF0IGqJfScSZFkURmTAzyXUGXQtB6PI6dvVcphXpVR4ZbVksm2XtDw2XJu
2fVfdAeLa3s9Kih0FgODYHkw2MGrOBxwXKQITJIxt6H0TrJdXC0kmDQzTgsL
QST1awDBNDVXfHgpm82rFuDhW2dSwP78/VbyY8LBAEYb++1lGoyVcoWSAz3I
/cAx4NQzW8zy2s12xynablGKilbgGExF/6sugUrWF28nkp3WOm6W7JDqNMhq
OdMBMXajGBuUx9etFFns97Ke2DDpr7Bj+Vf52POnLAhCUFHklL73GxLql9nL
knG6MN1MirXAH5EjcxDfDM8wi0Z+wtlmf1xMkc4+7VWxLHcbxjp2wOmPPQ82
qchToVfxp0Ao013GfVANhxp8wTujEhirgeSzsWimUgCliR9WXzbKl83dZfbM
Jpvfol5nezQ8/6mTMFW3nu/xsoRk/pMV53nPD28IIRs+JOVK0JJk5XEIgCZJ
ttfgCBtfyiJGM+h5M1cnyjCvdjV5L/c1tgC8DkdO/vqXf4UbtvzrX/6bXENm
kyyX0S6ovQxIolviVvCOrSpBqo34YXnEzsOys2QmrWW8IYL/ydvcY8sdTXDm
tnJMZxKv44n5XJF5AMdAto1Pr5Rl50vJDExi/wCpAH7KUD5KMoYGwQU9Gnod
pM1m2ZXu1pDzSZ8yUXPI1sNFJ3y4EXH5yYLNoqv/jsSaDulvItT4Uxeh/vXQ
YpEhXAtwiH6RDEEQphzOEx1VKaorH4tNYkSa8QNXij77+7o7/nTaYoFOJXmX
6K+2lor83Rig+ZPFhkUZO7MXaIgWT2Bjln+Ux2xbpIW0lMqLHMMJUFkh7DKG
fBKRwKYHSx6u18w2BYNXygUiamz4wIe9ZU66dd7zca9y0t414jk48IxELtb8
ZudomXjoMT6DgzM89nG7+hd+3mBKBwF1ehacvFMzPHjxTkrulqmEmRx9sisq
xURayBEVuP7tIo7/33z1xJCfYWoRAoQLAsONQccLMh9OLBAy/PHdv2wkWvEp
p6WLPLLGctEsqHsvs4VxTJsQ8eZG+RBgKPD3eKbnSOWkmv3uLEvtcK2pd2aM
dKuWS2VR6hlTn7F2BGMAjQDBkJ8Oot7JC1l5OXHAEAXAT89jM+IgYQYFq2Hr
ueUrp/oyxFHMZ5UoNuis0lLLXAkrA5kPSvguh7AEaP8ugdgeK4udKw3TQLbb
XjGD0t+iv/hF7zgwi2fDrwkm32X2tDEc74hB6BbOR18/k0ikMTTGCp6Bjcyp
EkqeJMKiwIAqNwG4slzMfQ73fAWbxgSh0EX5E3DXMuZs+nXnAC/cmIIEPPJg
kRsnDFGLWsqj1N79dQeQJp3nd75FGGNjQ/VVW/NzBu/H6zeov++LCFN2Kcck
oe0wUNbpZCzSanxmp2vm42DfmIkcoxOeoG1YPffRqyThZJjSFJemEx72Ic/9
wex90twNZ27CevD8MsaMiInAcjj5GhknwgBx8QAuTNgBLE0pOyecJwYW4vUO
KGQSLBM0zITCYM08wMNkBmj+GSUmxDANPaFYvNNqMiS6r5QKwp/KGU7UbXhx
pghqiT8pnhGeEBaEw1Bs2XB4rDQkHW8aLCjbjFXxPiQ6XejzxEUr0lkJqM2/
s3KMQAywFMCDs4cFoxhoRuB3a3EW20wI8JgX4GCBtLIh3aY0YAC47zTCiXB6
ITyHg3fxFGCddi0Xjfomlu3GYgHzABwz13wKIZv7wQnrmOgmZyJzthI/iKNn
ShHU6Qly+9UT+70TUQqljaZAC0lM29lRd1mvZGHK507Uqpxd2TDke9FhUBxP
RBwiY5ZliX8dp022bbGAj+K1RDHziB8sZUtL/sqmJhSWJWS1ZNGjlp4MFEks
MazAiBIuE99/g4UstNpASFJ226Y2prkgNcTJYGW1Vz7iqBTbEUlRKDav15XT
67J8YbR19ACRLHzWY6tI1Bpn6fqYTgrnG/zOpCIk5u7Yy5i4iDeLhNQlfepk
kIatc232NtFmEp2U82BYlr0gIId1JXth3FNZqNSimuSTwPkGeWUOLLfCfIQl
YUwJs4DzYfyRRZBwNnG8PVD7ejDzaJTXgruPHj344jdf/GZG//3t5188Phfv
3P1oWeB1yVkvhhhIuoIj+gG7Qnu+LWm6Iy6cNdIYLDJaKXgEYs3grjS74PGx
XRSxCYdAJbanLbtHJ0PQecC8Jnotosg6sM0smCv0ZbbV2E5WouKYHQV0Gd1i
h4PNOWGRN1rXY0+aM2lNodBHOGJdF9wjIcoH4K8OWeHiVvFFM/Lge3WL2Wel
Qcs8u0q32Cw7IoCVYBoY4smRb7NpwJwz970DoWKHJyUpm0gFOKdB6Bf5JLDQ
xfd44gKmlC7HRCEmEnAYkp/5WNKRIFcT3YX8qfxz+I2CP2Y0k+2Jh/KLX2Xf
5q2s09nZKxIGDR5zdUsHcKkAYa4V2jc7lmuaNZtluHRi101CcbJegQIadgvA
lWOV2Sw0VGJnStwDZFwIkrDmpyVYF/oKYYY0D8aGJciDHYN4VFQB/nBDu0Xs
GAh/Esj9zcjQIhxReevQc322Pg8GCNDR9CkcC5HoH81ET+qW3n4npN10qSLs
WOf7AGnlYcNEVDXuCeCOO5Wc7BHFgzPJG63BpuBAHoNDtrt5RbKV9OxeKpX0
at4rPd7EpGX7DMwyeRgNao55jPw2ifzR5EFzKXqE9kB5a9Rny+xdUWzxmqQ6
xidQSaTDOEg09gxXWnGwzd5aFTR/9Nk/fzTidNHHcZFavu/QTqH13QbkFInj
Lc8Kdgl8zmXD8Zstj0eFAg+Sfyt5yhsoaoX1MRObyktETxU8bWWBSQQWrLQs
CM21sPh79mUSlcfXK40zAPpCkwGovqpugTUnuCVHTUR8WqzM+PAasklJi8WY
7ps18CP0evzMlXVRPomWB9hh5mfaKwOLVjdEkWkgw1QuJ8T4kfl+dvbnMBFv
2mbFBumffRX+TH+exv/LDn6mK0Ks9yXHejO6iCOr8usMl4ykePgySb7IJSH2
9Z0nFeiS76WeRI6WTgDjSXYbZqEjA8QIBKJdIlGa8Aup1XfZUfN76J1nf9aR
hA8XgYT/jXx7/NPHP9yuOBUF/nMUAD41C1y7k4VxhaveJoGs6xDIops4SCh3
0C0oiqXtlOYIwlLz+Ym+nl8zHf/fsd/LnASM6PcwGfRpYZe9Zksz/I/v4TP3
xqMR/he23cLGuc82Hp+Gc/6gVNM9GtF012Sb3M2LVsujn1dkTsmPSJ+FI/at
whcQrOTioKHW8umNNFf0dImm03QafC56ldgdbOIETCp9/h/IbmWQ6V//8l8Z
DsVFUkzCLZIRqgUnnoMPbVnU5nRvuqKCvI3eQMatodg3IntWTJLH4VAG4ylQ
r8rbzUQrrqw++K4oyPVnjIi5ec2CRJgkUAbfwDlOtpSltkskug4Ng8ZwEVDA
FIoVhm+yMDBJn9YAO7QHO4H/yjO6ZD6BHtwhmi5YVi3aW0S4P/Xmu7EiPDMH
ypoTS16uV1rshDy3SFEr/IHDBHSxattKoMMSEJh6uybQWFqxPd8lq6QfkbC+
4yWDfecxRTac1Cz/61/+dZVvymrPyUvSI8VetWkYmlD8yDMtG+1JDntn9Bpe
o3El+E3RDpWfWU5RHloo9AJKNZhXce3pqEsNaRv1t1L8oZAIvpX2EsL6Vwkl
cBJ8gzlVribiXngAMhqe4GQ5qLhtKrbCO5OtiARY5yFXtySA6oVijkYzaxpX
8qgEf7/6qyDnXB7ZKRa9CyUZN8wtV1sVppRkcn1mH4fM1loEt+PwVKm86M1u
KVNcdlFKjuMiUsll+3Ci1kMHmuVdd+MxJclxCp1jtqI/A94tjUbyVgspxH3X
WlEaQhW50qRIl7Re9klRFFy8krpYlRpI4pw5giO6BbuNGCBC8ojvZPds447n
salgBg3taaJEqTpyr/F057ZUeIH5CI3RUWKL5nFKfC22Z8cbUDoRWWCchRFN
JR04DuopFQnYdPjogY14BcdLh8iZm0bYTpbs6OL8kmLr2WKxMnSt9ZOkB/iC
rdgk0AOnLDngCWYAWFS541TdEpujUQ6HKFknWHiDsN8xEy4SCP/WVpzYGSes
F7tgxOCK5P7/9w2uF5ttjvL3+yorbphtUkLeOAbnp22xWK1zeV8yNz/bGvtl
9tjPscg4zRDuGthkj0dsspdmEbzkMrPIS19KcBrQTw5FMGfvTK8ShIjIKbbH
NKIucyRFnsVmS3KdLDbhmt9wDE0ZUQpRiAplSNm2a85nFxMkZLXvUY86Kjpz
O0YM2xA41Alwbu3yzzcEPwJ6L0BR2LOvly3KMFHTY/6x6RGWQqgRA+uMax6j
lJN6YGPT6505vGZfuV4XLVgDOC3Pokvnkh1EzK/yla11F93kVi1f1GJ/8UTI
SnTZOrdSXqttbG81pAevt1O8AkpVYWPS1S82QFTjkP1P2ZckHZtNlz2PIBWk
BvEG+k72OiU3JaPlX2+0rBKhl+WttNDC3LOwrEY0OYlIeuNGuBOqd7qc68a4
LzD+7qaowFEjscA58nVdoNXVsl974bJcCuRPk/gcBKjdlJStAcymkGsWyXqg
oQKKe0Hip8vtRSmep/IkU0gVYwr45TAnikIACFYcLxZViQV2jWcngdUxKxu1
VElPvBeotS59kYac7FOVUHuBTlW53BASLO/q4s5PpINiFf4kYZ9KdVC8aekK
uck/pTGzbiMfilfINetG/G8xIpT31d4tdg2+gAfAEmHEen3riUwOtETcCEK3
Pe3eseY3uTaxUC5IBjP5Y+BvdpackeS7WnWBhkGEDEm1TpiinR1d3gCyb4Cm
6j6iqYiZ9dWC4O8Gh7hlsmLOhhBIIseUbPspJzBBLh1xccs78Uapq/EmC1oq
MPJaJEE8+hXb05bF7nbzPzhJL/zR0BdOCIYEjeA5qIB0iDnQy42WeUvhQoqx
4QUQacIFUwXXz7Nps+vc+CVtecukeJ5GcgJgLjbYKha+EwnNTVY1Eb+rcX6M
UV2/LaHPHcB5hHqmQWAIZOtieIX0OkvtxBK2pmaRJSx+gqGK6DsVm1MHxoDa
EYiiB6DDEj3BlIx8r5jrSGkhVqUjWnAX10WcNrNOT12gnBq1/+TY/WLT79/Y
7MNZ//9LnC256YR5J0sC8yd8/uj/fpm597cx/0bGctQc/L5eVGziHhh/T0aM
v6d5Tf9HJHjcKyNAlFvupQMfGYdllcktv7YyDu9pE4XV1POkdaXv4PZnyDdC
SsrdM/2voV5DIirQwcl79QKkmavR60StAd3FbEFiPTQ1aNTpth1X1+jbOL/S
jVJZaYZBJM27Yt+qDWN1s1Uj5eB0wcrcV7oS2lNiT7itk0Hz/HPADiKJByXc
CsmoJga0QeyC7uCK16QemOxvspdazikXQSCbbPOQh91jYSin9xlU2Pq6wc//
3oGO400Wdc2Tt/kT5LO1SB42sYENo97FMhVsnPCUsx2nYC6WFvSvwdO4MNbL
lrQsQLKox8wOD0WIBRGhMSyzzVu2c8pi7SJyl8sytcxnWfbW6knQ14ecOjFz
35EI3YzJKpp6mYbxJkBrIWrAp6CGzltBTbC1zAP+8f71m6vvvmTIueWBmM+T
jOrtTblA9eqj87Sy1BJGOZNOcNIE0Ie77RR1WXV/sdui5SmXtj66ePDk4muB
QU/tDdPoDWAKmejp70E91sLQajkZXw8iPn3CNiFQPi/FUW1CcsWTP/FkDEis
4hJ2NqVfX7/49q0cGy8YT4+LVCMomw5XsA7JquJh/Dpi6Dimi3lz/i213RGF
fFR5jSXUTFsdqGaVX5803E8ZcPaJCjquVvjE8f8cJT247YSa5tXKXQT9HF18
SuHqPJu6PaVVX9e+qKORlc9HlOtrnCiM+2s6cMWq3ZUSzifHwQByXMcCnx6t
dtKyGkMl9D0ip5YSWlTg4fJ0mXa24YDE4o87hnpxxHTn3bnINdLotah4hoKy
F6wJld7Kk5ekZDl/QM4JcNDjXb0QJHVKK1KMwqZUbIQ3jZETyNjZd+XKeOKf
PItn49OsBplJp4bTifWaIMO3sgcePRvAyGM82/zl8pwIpWu6fGavWCFQzuNX
AS46LlwP8IG4LOL2xnkx9bglFwk+YiWygRMejbTLyxDI2MPhXrbNdltI/ksH
o0lNJZizvJnkIjhxaCbCroZ2sCg7R66mIZkgsZKDRZBCbUZbsPdvRgSYytWO
8GyeTsBuqx4UkHlVLp1cw+Vpz1zcXPaTRJBjhTRNWmvOZFDJaWt0Aj8SchIe
fgBiyI1F24ujChoJ2CcP/t7hGP/ONHPtpxqNquVoHqtXRd6yzI3sp9a+qCPM
9AONXB7gi2NabSMJVSMuLoBBmCTinxGk6/qo3o223S/Tu67CPgnFclrvGhrj
mN7Vg/ffp3ejAf+t9W40/l8CQvnZevcXOcKf5PJG+/iUGg6IeCDJI10ckere
0uaOaky1VaOidVF742QUYsgPG3Iu4Docq+0JIG1Dv06j9PrvOM4uUAhtYwgc
s5Qo8GHUs3SirUWe1DIHg9q/UEPHGnqW7nrbrRF5vBOTwcDLuYHbdvVC+Ckk
aAmpHfk72LcBkj5g7u6FtKyVanUSkVvpiXg5uBi8KnPgT6tqAnU10lZDLRb1
ACTBXm6lKvTI3BjdKowL7tQpcHwP5Vsi19HzxXsuPi57VNtFazDa4cSXmGs5
KsW2dz3HExjiZJ1FuMaFRllVXBWAmpFNqSxKWJGGHdEY5b9aKcrdKObz2lGF
YKjkknQtyK815xFT61gOP/pQqY8wLkA2faYCVPLORq/SHuhYT9MCNkMkphsY
WmRnSnGKtCVZLqODlExVvH8C1jVhjXE0pPKoSuI+bqsqtDFvjIJRjr8FedOH
4bxqku2w8TN78SMVkXGTyROdwBMj5FOoRVPWQ6B/8iXD4SM0/7H2ZgUSI1Ib
LU1NEz1r9rRmaphqmmtDnKtCZALjzWksiIPVfaKc0+YligwSktNkjE58OdYx
c1QcpS2jDS5kfbMPO3d7TavCWELrc+DDYNcpLa8xR8vWzHUfII7ojcmFCNzS
MUYQraU9b+WVb9JXfuWv5KOONdcLwSDEe0qoecpox5H7IX0gmP0dJJbYb6DU
keamyq/Dw0MJXnnTNEvjxuKJFnpcDtolO1R5rIwPSNpHZRw4mUoXH5c6QimI
LdZBdDVkIK3zbWdsoDLnDvDppDADzHPFR3aH97Vh8KGsgnJzxiXINuFiJIei
qLCK8DuNqV++aNBvniT8lhmMINEmyVxhwZG8moSK16glOkKXkhR2Bmhdc9l7
V76S0h8+dG9T1ymU22TSsm/XghPDKKv5iRJvSPiZBIwZgqWYBAeRCeGY7q6b
opIFCSVJFkWlZamqgozFLrB8R8RbZkCIT/LHXRG/PJBCJR8s+g4lRVp/59/r
sTndFqgUC2xUNfcxICk+ICI9XBZRIdHKoNYVrAi2J/AgY1qVL0pLgBYpp36o
L0L/eLO0ps1q0JwdzKleWqXoLjXlzQaJq4BjgHwkAGQ3gGtMDnHeawdl3ekm
bQ77NUXrIxsCVGQRbj85B9azG+8b3x82Fd3wCAkZ1qUUT1/zIbkMnGs/fO2d
VLncGAA5r7ayoD5mwkvXzdzSIny3vrahx4I8cKK4YCsr64LUO2hg6TcHojCN
jQvh+6Axog3mKynmlaF4Za/1pviUkfjF/PmCdHDNIyfJiZUvvEWXvFw1lbx8
VIedfj+XHJYsXHftST2e0r2td6WULvKUjI5tCtzZQjlswhGEOfHHnejelB6g
ZNZVTK9U4Bbvi8UO+k4+FQwar5h1lZ4jPcmlAi8iblcuhyGPFus+OOvhNjDJ
OulEGyQU7wKRKrOE1+RaGEXtFmFsNrSrgnVEdJ4JKYnJGJ2CtplHkh1WJ/Mr
OrLGZqEWk5YmnX0bK8gdtuucG0+DsqkvXGaoqDRLAnRk0rOcwQcyp8mUfpdL
laPngbydEed0ysD2B/hFCCoVbNv3w6l201a6lSp+ZFB/vLH1CE+LT1o68V8F
vnhQzGPKuIRR3CrbJmon6gvJfq9kZQDxkDVBCweEJS5Jm/6R+y70giuLlKRr
dHVLUpsnmbmX1jidnysfAMtW92hQZsNJ+s6mOlwSJ1v1G9QoTGfjS/OaTByr
v+n16kraYxbG92xhXKoVjqpuE9nClyV1JpcJ8whd/yLQhwVcMZ9KL5k2ZEtc
zTVKyoThSFUmj+Sq3rN+DkQzorUmSsG7CshDdmKXJbPwR++Vz3sV5u3KgHT/
xNwFynCsdk40vRaWE4pEn9R/LnhIzB/Keza6Pr3sjTClX4o5G1kpcl1KD6fi
S2zjWz9s3zaX9P/C7+O3ea/WCBfIYSnV8X8Wnalo3kUPsIrbMH+ONjaHlJKl
55jR2GRF0bwh/CaE98Z//7P/dupivYAG88xdw5T24c+mYUNUM4rg6T8tl8WX
05rigdrKLe3A+yqUiERRuYnrueE7op99E9O/dUNIBFaDSLR6r5hJc+8pljju
d/g8/0cYevzYcOtXZbtBQgOPN0K58aeTYLoYfsGR55txGZ4S9/1OZmdkBT71
M5xJQRAXnqB+rVRNf46mfjhDJ8cvgw3PxNO8RdjJ535kyKNP/thu+dSH0wmW
2ng5kKKt79MbzkenfPJLp2f8PWKiXRy+7qNvObb7T75Hn3qerIY/OdmrDBQ4
/pbvCq76tsf/rU7uN9xlpGGiPHTXkBidd3z/2esxsvLfNgPZxsFAe9Fp8XBi
deH/HZOX93Wk52dn3tLWkbGFtL05ntX2KJyF36COQeODe6OmrqzGgaVKCCXK
lRSuayA/BpiForHEuRUYq6RC9Zkoblh6haGGyxW2mq9W5XuPunDlAK61Aqy8
Pcp3zrQazZz/JWV2EZ232NfS/wHRFMaydqFpgkFcQarH6nvinbXY+tJIfluQ
I1UP5kiAwSEtwq+NW/MKZvc4jVOID0mcu2GMAeO0jcJ9HrNaoTsancllXDUW
uiEmYVf9aqMFrEpp/h71LBMUPHIOQv/X2uP6Ixbbx78mMFvRUqAVozDgetFk
2aKyQ94dEc8P2oRK/eyw+1t5pPspA9wto8GNvTpJEB2GomNESOBgGgm186z5
c6J0/zHmRGmdZI9MGmFZqTIajarSuc+4wAng+Tgb0qP2XFl3AotxTO6GLQz5
AfNcqy+FAyKuTUB2yrr6CLt/5+iSPjxevlS75YHJcUyaLJufitq6BGhiPYqx
MYqejrigY47E/9vgEYnzNPQzrcLZGxyJA1HWzDxTdziQ7DcV7UIalrghrR+n
bc8iF1kdSOEuk1KcqwDkFyGFhB1NlRS92ocEX0/FiTrz1sVIm2P7EqXfql8h
boKH9XntndmTVy+5yReHYcrbG+SncddAiqqQjhmGEWy1M7eJDVRuoi2G5X1u
6qSqaGq/nW5ic3PqF3z4cA4eW2ZrW6rhu3STSWQcP1BHFm6cLoN9OY3fB33F
j+UQxW2OPJEHYaDsPmbL3z80CM6Fg9JaFgEC7Jk9n2nmaUVYphSk7IAnchwp
LW3tpUwjPDPpK50xPIrbX2Qv0kMTgYq5zQ//LXTHg4qsR5+kJeaBHhksg66d
IyUkTLSIFkWdiSJGVEF7W6dbUS9zBE/fxzyKoYw7kIlPjvRyHgolA6cmHxKV
56NYX4JAkAs+vYG1mMGAbbNBfZNF3UjQTtJWURMeNieUWJfOtVJQwoIbUuw4
37cFhzH4wzyJrMZCIyVGMWrXGOkEen1KltmSyonWOJTMvAinZrWa0rOmXAK4
Gtt8IUrlbFUoodQo2YEojLg+BpJKqtA8QbW0dlbQBRBeGkFPKBKNusb7wCXS
CL0bnXYAqxbaOPKKp7ajKJtqbz0feYnivo/D7INuxEn4CQ1nbjnNPcivcMON
SwENMpwcF8Mm8I7Bk+RVOoJIwd4XRpOHn//1L//18QOeWsaGnFveEZapUigV
Sylvn+gEaMMaaW+JRBNKOeWBj55kdBrolVpu/3c/q97+3327S0HYaJG/hKmb
7DcP+DkNKFKcWQ8uESzSwGteIAJtFreY2zfFptBg9EnT1CbUDYap/Xna058j
pTFjP4cX0fdrvBVCzwT1nkLUbTI4wQIkAqc0wwY4+4FpUVKKoE2jXopkdoNi
nysHsECwcHvu2rx2RJVW7KIxM31th3RDmddr5bsAY998vxUCmlIbRnWF08tL
x+WQ7t5J3+4YgHPYI+G76+sX2f3vRE0ts2sZ6nXfFvWaDhxHeBfMPX+Onu/W
pABbor4tW2mDxh+nnWyEb1OSGJ3lGKHCRid+DmXTxHiOddyKHsAFp70MUzo4
ExOAc3/ZmeDdB79ChiukiG5/WZtqW+NYlcu6duLhQO7En8YQhHUsXkgcL70/
Nk7CnA2Pjne3nW1rahl/SsTjqX2/imLRzcgoJ4VT7Gd07i7+t2V+d7HNWR9d
LAuaROm9WZfbR4/lM3FSn758nsAeRAONroxZ0eTrNvV+I5xSWsnJm2YqKZDx
vW/NCI/GPIMlBgPswM0PN4otGkiQAWnSli3SqnYA63BFkbj2Mx9MlhiskNqO
O4rsU3K983dCYyrmzU2+lSPDmviGmWxNOOaVp+hYofVFXecR7UlyAAGV9SOb
jIRn3L4p5YKGpf+fS5K8m7T1bsCr07gqLaHDcUIaTiytMfNEdD4MFBwpb9Cb
DkkdrrFUXOEQ3gQiOSw0Ws+y7Gvh1JJWtMwR6tbVypqbHXhRUsDtI515XCvK
h5QRQcIkcl4SeidEOYzGGy67LKzTI3VpqiYHK7qk7BLz7Vi3Iv1O2/MfDcgn
W/8wBJWYCG2+6qdl0a+mS9oGkTdkKAR2h4w2aCG9i/I+RqXaGMhGZNTNq++v
38IL2NGwa3UPLXSUp5goXMsIL2uJRDt7Lc2mGfrQlutSFlHfEfdcM8hayJN3
AvSVSJioMXlzGC1Xy9p4A+8/Hy6RwUsy4sRiazYZcEW0a70Z0ixaK/Rlzkn6
7SCyUwfDDMguOqMBOxb4KUvABOM+tdo0QpxPt3dXCGwqk7X4uyIl1MB88YwO
Ur4tl0whTEe33W0hbcM7JbmpYg3dpA2qiyiZ1n9FABYuEaJbatAr2z4ziQy9
Y3xl2LUfEQbBKKdvnSjOKMIbmhSIwoejgiDYJ76M2D5GNuVd5PCiqRzxuFbS
FtL3kdKh3O4q9vcUGOGMyBG1PzrgeZRNa0yjr/Q+Xcr11ZjXk4NoT+YKZrt9
bH8TSzt7N3YhgicR3ojJHHAIBZJD2ydXpumRg5iGguFX9WTvGq4YxcLx96II
5XTEyWUlr/OopDwMADrMdb6PAlXx8Wcqx59x+FX6nU4X3j9MlYzqfxDDi6Xk
YSNrnDMebDGGF9RpAbMstEuiNWXd+LgZDrgSIh1XUlGjdIsdJqErCWWRTNEE
PBvApaK/pIN0hsoFMR5+dD2xhOMZLDgGvNA4+J3c8nYLEF3fRb+32O1RhT1Y
STG/QM4JGE+PbpZsDUVgl5GAJ8IK2qKoV7cmoHsYwRDKTqxYK/Rbcc7EXKU7
2hVMpCBZyI3EZj9Pwpwh9KxoRguUyfvnJon1SEd2oCzY0kOcgR5zYCtZ5kPe
O25MHI+Nnw52aDtv0wfItHCCx/QTdthhhw0IPtSmlbUDWjhzEMX00C+hC7jN
jyTE70fxS1d7R3rX6zoh/Owtb2NWFhAjtAWaX3HY+EYyMMJ0UXArmgIGLrQa
idCl4vR65nmYaGBLwNhszOB9ko25KbfKMj/fR2ie8WZMarnpOQ8MCdelNQHU
xBizGHVuFoQHTiKoEEeSdhsFMALHV2p0L/QwFmCn9AneotV3IUS6I0sIVhuT
E6gCBYQ6UonsOdCTttwa3Xe3kRU5oKfaG0GnJt5CO+LQVIGGQEdOSXLeRsC/
hMShTJLq8JOR/za9raZkctlU/sjhkcPg+lT7E374gEn505/kgXZPuN6vOw/9
u/q40lhMGKblwOwt2v22t6rNxChk2+lW/JZgDznUNaTjQEJhoY2DhezbncCB
xcbmXcfYSQeBB9juqbMfh21BecH6FvH+rqwSgDoOWt0oQaKXG3zE07Jy4RCz
FlKJSIIrqE8gjAh5DaCeRc+2YxeLwZOiW/Ni7MUG4vVZ9lrsh4njvlMjIiLH
0p5D3N/FS4XUpFg0ks0NFp4asrRpR4wQFddueZgEcioWYdzdRx4c65Nmk6M4
zTaHKhoOYdZyDna1F/SG0L0Bts/Fu4mHKZzy0cm1EQBYyedGXUk+kypO0Yh2
TUO7FUuGQ1pqtEUIeX1lZMGKJe3MthKz5rNhgOhB+ZDqCs9d03rxVShBA0mh
VfZ8BNgU64dPNK8MvHAo/CLvKGmeJp/7sVwzNlRsZxuCNZKQES2ZrJS38PTt
cggbPX3aJNXiyGkdjx+TYeVEZGo0kVEH99OPnaFJIv1lmQXrWcvp8yLkreLE
tPZZPGmXfKolglnah+Uf9E1PCz4Fa4FMCXS/AFjQXwrkrp10Y95Kc/KjJb0n
Nt6xzOqn7bxoS+HIsVDE2eCG5aBc5/MxaqRDEh+PykzcJPc3sLLVdK+E0sy3
yKwjm7ZaGhDnDK5kNPDRQoiPaJnE95SuvDt6OsgduXMV17ZoEzvXqbqzkIGS
+gW1CegT68pKeNRAiuA1UekmFynhE5iHBKacNAr55GNUHJyiMV4hHAvMpZ0N
6TEq5ufgnOThpDhnYxC5Wj0wcmJ4HxcrVkAeIHSXK3I4G4NTKa1xXCIpvo+c
CJSmKOTHbx7WVKbnTqCCyumvwf7QrIkjRF7w5x/fkfdQCRd+xHMiqizRUHrW
jsJAf3cKdJj4BEb/6CGHYA4OTKhD9ouJ1GIm2V2zUWEWpC14BgF3J5i3s0rT
92OA9ixAvgvJklKE3LDxSlJ3VjYXdXHXXazyeZnX03mb804v62k3Lbrt40fT
LRPrFUuYr9N9s5vSw6YaW+ymjFUr6Nq8bPn3jDacGv3INLJBpw9Wjxb/sSi+
WOZfPAFoxX2VH7VYCd4Jrd1iMNxFsZitNzukYDDURw8efT598OgCI9rspzcC
brlp7mQ4nZnO0wV/UTF1ke2ydsqOOZkQT/exgS/UeBy21aoMHLBDvFlZA6sg
VOuuBZgkb0Jf0DnjQYSYI2t5YnZ4HAllmNl2W2gSWPqq0ZoxnMiDOxblHGaP
4qyX+C8ol/QInEirqNmlHPsdC4Jqn3TP29XRV/s21BJ2qTlCFRH55lY1TZIs
qqLiX+msp83ogWTlNsyJhzSRcHGXIwrGMsB8WzPZpl77BB9T6V1xpsWLdG8x
7Uf7JacINdH3o1XYpXufhEpdvkeaUmzpC+ZY6S44vyXF6BdyiSmBR59f0D8f
fb7YL6riIW3rYrubTx8++s1vpgt63fQPu5qzzEn6H2nh0pqhxHuoY0MCPjT4
baVhowjRedvkywV3XyGnGuwk9MEP3j94gIj4RgLtr/LF06Z5FzbevMgXKNMV
Hx6Gtf5OKDc89EzmeKNNWq/4pECLHPPDrRXfLZq+aOrbmmsOLTvS5LlWI0to
SbdknGJFFngI1ZFVF98yXmkxTBc0EH5uOAyBcczi4Fo/6KJm4gleiE9I+9Tz
Zes/qgj7uGVt3qpUzXcR1cWhDTj3vWz63GLuH2VnOBWOPDQLDqS85xeRK/Eh
HJ6oBGkH5qldzaz2bYmgYEi++34slRgAWUxn5Y+QAOJCa+NMVvm6IczwUBQZ
99WNih8/NeZu1cza02uWfWlVWhNQsqZlXiPFY1HWjMMCt1pHXNZxki5lNQjJ
zjSwAp8WkLIwPZ3D4gd+dIT7RAviotoGDI+YWzPX5pqsGYyIW5169JOsy3LJ
QiAcCBHjgUcn+H0huzTLXm9RFs8RY82D8fE79HvIV1n1msyMzSILdyGTITuF
HxZSTIx6iLeLGcyoHu/R47O8JTG7Vh6gdQuhc9IGU0//QJ8MVPYxNQ1YeGyJ
5eZMqw8ISpwuUH4wmSfXJoDWbEBcYX88eoCVhjHikYkfcRwVG06bYhh6doYX
wlpK0trwPV0BZsV5SZe1EsTK2auk+Ui41MbSYcGOh5gNzDRR8sm3nWp0fwHC
BmajJeQzSOGLVI8+lfbHtqkV0DPyjEGVSpIOk9yssq5n9xBphfd8z56llKyH
nAHc3dHyiwEBWvh95ZBMqpQenhrm7TWazloU/gPLlnhs8fOjT1QXNnZp/KsP
XsmrylZGySEpeKXqgX6sVCP02Bp9ljpIOhPsIOFR6nZpxWAki0BI77m5QFCb
gAuOQKXHyIwSvgbbxh/frBNhmxwc22E23eJBxvqkwjcgoccoiE4c01Tb+6yN
yTuPrNF0aBRBZ+FTT+NAqzcr1Sr1QaTid+g5nHpyeUDN24t9dp++JYmr0PaJ
qtw4Om3hWj7O494jyBZC9t3zjyH/nrM6mfJLwMoVgMsqTz6eJ+fvTzl2hB3W
ygBncU106djQ3yka2MROiCyofjNuZpeZvCt8NsxsbHdV4e6xxXZh/cbkIQeC
e5R2Iw32RmrFSI10+2JnDFxDa9KuIZxxnnOGvBWVJ7AkxyONdY7fdpjHPrRg
DXBSBhRxgF+MfQgH3CPsUtg+n2S5HoWBoOwu3VDwKw2coSMWrkKHnYyntvFB
YYoQIgnSoy7WVblGRDvijjiyKNiPaXBQd0wg+sIYRva5UC8MZ1vL8WqVleKa
ase9kQOlBr4SzKGgIgHLDfoTnTxN0XFyjpIIezKwLU2QfcL+FEhKjczqTiw8
uyu0CtJ5E0CSZvMNSu6UNFpFFFcRj1tHJ62+KKqW2Fm/PB17PkShc9/3dmkd
rni4RyqMOjNKRga1H3Z5PzBTyRsD588ApRdiATIAF/zsh9JGRk3mRNLkgkCp
VzshY4TrzBYNMy9GiYphcN9i15uyY1yrcaABu8eRED34boMgdrTYQ1SBiw0l
UySZF1Ic1XKTgr3V97EFgNCW7G8raNwr90nb7jXglkS6UP/hZzRsLS1q/bSa
y5PFQoMEvgnDuhmejqjOcUBt84nlREdqhxzMN7NjYGPZSgOuuFhIgZFWUKst
raNPQzJDBayiDwdPRaVw3Dk0wfG45ydSaK9gbUmEhKxrBCqGJDtK7PcJSWm2
bKKp5hJUCXfpQYqfjf2AUAszIuJammOy00WODHgD8nXgDBjBwR2J3ud7qTWh
Mb+32lkZSfj+TcJkqvlxBNGyK8S+6eC8LfmEX+ebbkfjvOZKMv6DFFMOiBRJ
QyybNsRkRlivOvCn7kcwrOhDS/JgGZoPx2W13KIiREPMc92gVJ+nSKw7IXjC
SVk3ubccHrCTCllVrSlEFE5PZeyBjvF37AOK3wC+/UoKYCNuz7IepuBdCOnE
IBSQavo48ha8DlQoeomH1ueMljpHlkKIlQUri1HFvMauoTCjUQF0XO7ckCYo
PXat8IFlAc9yWdAitKEkkGfyMOhmUcBOeaw2pXOZRkARqR78xGrBFDaXbNB8
2Ww9AJkuqdQVdbvWa8tGlz3pQix9nCAtAM4rft4+HtJkxNQbCVT/KE1GHnP3
wm6RPo8pOYbwGXu6dA0IWTtCWDwZYSvWiis23dZVMwdFnlZ5GYomMC6Ttq31
ULINCI/LmYUjO4JPaqEt41GkBXdfS4NjOmIEUNHOj7uId9ZHI1ctwlblqFnW
MehF9yWn1XkCq6Zx0DyAm15FFxibm3bIoih7QRt1CH20db5MlvLjOJQI2PQL
WKNTeuePB8aHfNKBwQvf7qwEWcpcrvRydqsjmMREIAmTUID9W/ERJFtg7Fiz
BUxPO8KEfUAaPuDGplVI3oBddVQ0pJAqvTCUaKciIqXTHoifspMQ4q7lftxb
GZC2rtcC6RDSz0cqQmmfnaGpDZOt8aiNXbnonO/OKEv/9Ks72rnTspty2prv
+KD43gPOffzVt+2Qbj/QSNf7yCrFuWCJCKoO2yYjXPIJlXxkr3dRmqjBl+82
Hri0AkFf4Vn2kmVaa6GssRdFx9a4Pj1dUZE/0Wxdbgw3iBQZRIV5CJMv6Gx1
Bl3QOGYC6RyUHmhjii7FH3GnZJfY9YAIs3PCUyPkxfRPU6ruqVsVU1pnKcnS
C4Fx/vBhsHsYOcqrOuDlvIyEMA9L8DlW32eApfE6B+0AV0UlegN5IPVIZH+J
Ew5zMKuFwTL4S+ERiW/JwzksvjzCVSOPjqBRXjWpoMv0uajPAJ4u94w5gqeW
C0AfUUmLJZAT1AS3irqOcSOy/RM+WFV+/GzbfBqf1jTD6SSJYdqiPUTnyiB2
W/0tZLktLqPR83ZZhfKIsg1+1CTS+a01JTFElEGn0pp8b0IycM9tv3u832Cr
UuniALeKd1OAUUl1tVNHyMoEqlXHAdhHajxTezo734Fn36y214WeiK/gQxqX
cJcIZxKGOmw7IIgNWVGmj2fAjK1fP/ULpiw7piIXi+7DB2YA54gW3EDJH+iZ
NtoGSMaRFgohM4B6Qz+1yq1cG0879qizVMeeK/8FXi+Dz2EQJ1stfmZ0pQqV
/YGyCBVgl2dn0+PUbZ/Cd3AW8V8frUT9mXw+9MyPlqWQ6DQcEwTZVChZu2lz
VyPKFWJaZ9NTNIf3f2Gk7OhTY1JDJx6icdX+uLLoRmsckrVI/IN4Jdbbzng7
0lk7u0bczzQFmNFJVcipBf6IqRJwYo3L94w9Es7mZ18mvPEkjg5OiCGBpinF
/IcPk5Fc3QJRMUOSMqVDISnV0O7LvBbpNbR2oce9BYKoHfrMgZgYu+PgxXL2
sa9faOg3eb91NdUTrIWQIcbh5z/u+6K9sYEtGDSXHgP9t4p2lrPhonNEFiYQ
Is5ZwneIhLoTQE3MFBoR8zBzjCgOqmJZrKw3+J/+dGAZfvi0gamK4mEhoP8R
VXMwvmPq5hcNF+0NjXgpJmNaacUEMtdMWQ/3z9w1XiCN/RzB9Tvr+ip9jGWb
HQWNC0R1qYKZJ6K3YArvaj/TTniFtYPo0Jz1Dt0MVtzn1g5WHAABC7sZJOke
df6eGNsyuvmdmrFmGkp0a5VeSwmf+cR+6U3kDbuzPe5fbJpb9aZJdgtiRQjH
/4bDt0bCVgIin9B5u6G/9XSxo2Ck/+x807/vWuDFhvz2Xfk+biPF3jxJmIez
7Hrb9LQ1XiQy6uwRuy9iG4kRSXa9wETPHs/IiXEwqvdnkKpyL3dYd2dPZgzv
GO8ic/Y5Q1xQxFSioyZd/xv6FQOPe7TEZjeBZPgJORqbTG6g3KV2E5qdeFeg
ePrzgSOjaFhpkpHuezXjxmeKj4rGKobtjUZHOBm7KpIsR8+6WtL4NCY06I0A
0/tFpBH8xCDGDkGHO0Q9lf+I3tzMrdL28IVXAJAiYu9Yvdihluex34k2R3c0
4+gaI97iRirV+DjvxVtP6PM40KdcUnEBLtyfGyyOFTeHjIOxf3m4Irc0e+OE
sg6jjitPlX5VGVDTYt9AV+A5FGvn4/kajaBJmL6zJjVw/8nldtdJq5Zgelh0
Qs/jRJuFb32xNEQX4lzBZVfommvsN6qxr1Vj80FZtqxO1HENel5+wdUZ6tIh
ftAc4AbpcIDFSjI1+rTX1wEuebXJf2pqTBHZxMXr63NYRD7jbD2IYRal/gTB
cmBglNavVpu4zbLy9bUONaZ+DEVZRzej0Bn2EcPScHImlvtHFPBguAmu56lW
5OpiTZJ6W/V1eNpQH1OHJiG2oy3MEP/OvzqgFLVhm53cBYs8oWfOLRU437VM
T8QnIxSp5fOdRHNYyibHJwTqQSIGYgTRgOb6h/ZRjGCw9LJStIZ2U1LOuCOx
vbBdHr3HBh8ngbAL+NDHWR+BOQVDMG0b22ukwPb+wD4eCG/dJh89BU7wECol
GoWdi0Ul8yjxlL0ydFVehsMTD3FlADRUTQSqZouRR7Ou8gr64tgODeTS8WBC
huNO7a6aDMY+5eexrk+n5XoEmo7D/iijSnqEpbFck7WREQAJ3bmI7oYyOmkU
pzCRybDTlX1lzJZhe9iMkC70lkn3S35kv9wUw7zjselW3XzMWDl74yJF9wNJ
tFjm2w1jtbwqcliXuJBWvquJ59lV0LCgaJtKrWY66FqgzZIlFGSEWn2TPLZL
kfO6zbu+ipcwIg6Hk1YUyy7hqI12kX+6cjNpVhINVoQMT7OdJA+bbfbXv/yr
lOSv6Ib1rvjrX/6bPEfwVaRz+ROKbtBJMCYSWTDnUFt7/bHcWRdrRFDt3Sl6
ykPVZLV3EhZKUW/p672IxSnLGH/PgBTIShVcCNKDTEiEFqlfq16Lp7BZ0V6w
5vD4ArQ87Dqpte2KmMPXdVGlwEuz4VE+pGelx0rvlUwj3xjNrQ4zgV5g8bK8
j37Fb7L2v3zHXdndIHhvqLt4JwFCAeca8TPvUd7IiBFwR7R0WcjdFxZrjp9i
HBQyr5n+UL+X4EI7XP3QskoQCTw4VB+lLB8WxwTYarMRIykSf0BwJ/tTrcSk
25aOSZLxLnfyZbmTp4iZYPV9fPExRRISIuYIeNsBlwf9gSfs2GiXCXaXvS9u
CclLYbUeSUvICFgoYX86ar5ufMzoU+hXHJCw34iK2DKkv4Vjk1q69MnnXlL+
EdeLg5tnZ8co81ttpAxNIT50zAMfI4oEWp50ScYzsK01eZFUw9M9qIwRu06R
6ca1zlaEhJQubst5nLgavlepge5H+XbtdG20PfhYLXw6dxiH2yTK7KS7n6lE
NW3u1BImTL6vaHqyH1gtPuXH3P/+h6fnYV6xy7smtV2huaoK86xbFYr5Yhus
Gy/nNZ6tlJ7Sdl7A72s7BUaWqq2kakX/njs5eVtIvYE2Sis0ORvq423AQWUF
FhGrcxjwCayz+7bRRQCy+1YGii75Ql5qK+RPstca/T0/bdX5SUxaQPboH8sx
XVOEZa3ZztGdrTUSbaF9dDWHZx0JJFmpxZq+14HUae6mi6brIwJH3fRxZ0ir
2A7FMR6ns1T7iYRYGu1ADOQsxaI6ID8O52qWJLSTOHzO5dnZZ4NYvdx2qR0Q
nOjBGpOjrYexOi6Hxex5lr5AfCbkspK88aFNZGeIxpPgEy8ZfD0ct45LoZqK
6zeUbXopPW+cdfby4NK4wISz8oHSIvSoD+HVpQrhEcLac3rpSJ1V/PqPv90r
7eQ2pUAO1TUnpvAMnQz2IT4VJ8zCSZq4mewC0zTVp+P7cXQFhihEE2n+TUPe
DnCI3QAx7uDi5h8nNdgOSA1CDd8Jwt5DidhDIoruEcnGuzMWZVK2BlfBgZA8
lQe7kF2yE4LJsXAQe6EW/vA5mHHNDRwRgs5sm4Y2PyWO6cMa5n6rZr02HBi9
JPhqwsF0mT3UjEF+1E0CALQt12sO88vaP7Kbkh4Oog6SbkqHjyyNzIR++XFq
F+escl15CGUOVKBCJeUbnYn1BxUI+rzg2OMoQvYHy3pp3jJPv82o1h6ZL0p2
rZ8j5GbWuWBeTfXom2xPCJAU4T0u05vj0PPmAYjtxA4rPYtHS5lxhtDBSEBk
sluZz4tKS2l0fDLFruI8sOelbvYM/qzom3iBk8ea5qrzuClx5JXCkH7OkXIe
nxQe65Tp0C/lcBg3Cw67yhFO8sZdnUJjLZUA/Ex7GgdgKlnYHhQGBjLQnjKw
b/Aq7Nq7PNq2ZB/J7WYH3QXRMj+c3OivNv82MHhhIUnYoP40nhaEdQsQDyaw
L/GE48t4hIuKMVdFLaURjYokK8HqCsAwj6jTK5l8TFRa1RVLYKmRO1XSEyg+
kUratmB/FniGTrWZfiaiBqkWRr0j8B7bQyRRyFPBpW/5UvZV+GpFEwGgFk+H
hLOEAQxffTSoorJHrd12R84AjwDxZnrlNaKM9GHXnLuU4IRZ784VxPRUSw2y
fm/HAxFBjFGqpNdtoQkG7RfRMxT4xTOJCEuTawRXQRdVkQbnqzEbfOxiVmYL
Z6Xim2ybkguqVnkpPNmboojIPd0jtrxH3g/O3lA+BeMhD32f0Z8niqSIbKXP
SGijtYIYowehBuYA/BrMQQyy31AIML60LN3ZAAjI8bgIxNJTHl+JSC0ZLsoz
QT9CzaleM/MMVFolu/K7OrTSk3iJVE4r2ydL0/hbDd5edj7kfjhkN3wDuoKz
JPtou7L9ATcptiLQXvDkTsV89MwEq32im2OLK8FIg6N8F/k5Y+z1uuikvEHG
4g7QCXbcCWtt+Nh2MRIDbxPHyDcXAjYisiIy3mGAx8iIWQOmFXnc/42xSLwg
dBK4UdBcYwCyXOwVGZHRUgKiyJsppPHxuQedecu0u8VhcD4hi2s66xioLRAF
zmpJCCF6kDBiCNok7hs+1gwn03uxRBxrbj9ola5FDpaC90WwkEqS7LdyT9rT
bdRv4xBnbTjEA2c3JPvjiOPB0sPKUxBP55ku2g7DZNuE5z3FwUZ5iSfnR3RI
MFhJjYZqanmhZVzsi804C03ok7yq2Y9hMqTwLznkR/qe2Ss9i2YTp11UIdW0
8CI3rG4E0Q3a4VmkgsFnw/vuWJ9WOzyhZZXpXHqScH8pelIsZGevSw9AvIQf
79vJuwTfcxiCvC2LO80ltBysDJ0lI3Mp5zZt4n69nq92nTQwFDqNF7EDB/0W
nUD6HdN9WGJRYU9D1kYtwjXcYCBdoxlz2mN3q4d/P096+Bz6k1oTmvfpfLLs
ZqY/sLhq1YVuFqhokfMS02DEyx2Njj5F8dWcTeBa24ePpIvYedg+nUJVYQqC
RyRkrPRL53lF0qUE5R3ExJRr80xMyCcZtlUpDZvsXlc3zU/FPVS9SmgcW0oa
UagFlq8KHWIoSswl6UUaquC1PY9d5VSuzYJOSner9W7zPTqwJNR7cgdH8skG
5x8cNLWv7OgPs61nZyEfqW9xxEXIrmN8H3EfHW649xNgFjCzMxvm0icAtmSN
+KOUQXkazQQBb+Qqtxi3pg/AcqfbrDl84f0rumqpTT8NI+Z5DIzEoJUjCTyR
ptbJQhmO7xRdHTfbmZ3DUMMx9yid8/Y6r3O23XU3KUF0E4jnr4V5ll/5jQbb
dcseFIYI6BcSHxv2343MEk30aQIL6ZCqCq5+oJD2R/0PkmmiAG3huYa1IOuR
J7a/Eza1A3U+cgQ4Nrm15hhYLTNWtoN8NQvEDQ4mA5te847Okd64oVvlw7p4
HFLpK9rSZRT7oGOJaTGrIgLGBC/241XZfs2gtMC7SKbhzW6Odhw0kZummdIm
v7DrzlkRB8ghW4NxAvTetRlcLzk5di9QRUOgBTiQ598YgtEY15uFIEBeMC5Z
PGs40bAt7/QFILqwBp0WLm5Zl7SxLrtuB6+mrBnSpv6Z7UfHpHlWK+qgQMK/
O3xtoQWKnBO2CJa38mJTHuMWGOiO07+2kdZFvWMBFpnzAkpDc9miZhfDDTCV
nwe407CbvOmgeEJ7ASwIv6kkYTjYpJswzciPoI4RLJJH2lQmtVxezy5VsnBZ
xARg3zKpuQy5U84fhdnTFk2GjJVSVok2RBUmnNpjh54zJFk2JaeLWfmW2Vfw
ct6Yl3N58tH8BRjiqgSFOZsnOsM++xGo3rKHQB2UAtOQ7oZodweVq6r9oE26
RrMi31/G0jWVNoKwBp7J9kLuaF/TQ6XYLF/+AZ1BOXYQJ/dtq1mVOi28JpWH
BxwsPqmbAJaPTowKNbThzs/bslgJxlJmvhMCHFKeEqHQb96B6tSS2OZXRjWv
6JAdWshCzcz3qRnEzmMUzOrUq8+B3x+eLd326u932Y4L2piDIhxdcQml70Na
Lu+dwfqI9ZHpJwIHaKj1ZxePLIy1KkZMDn9oLVWuvPW+lLa60ytkg95KUepz
EIlLJontgAPpIFUm9M9tg9Ixbc67i45s6NZ3a/2rZUkn2VKLxsFon9RZcGhC
+2IMuXVLC/OXEco29OGFma3AGgEp2lKCvTtf/d//J2rySh5yL8vFYV7kj7ww
vpRuqOwrVsrd3bv4GDS/E+QMj4jmLN6FbmwoIs4lqJk9wmR4KwiNQWO5CY7H
wYQ7WHCiWlhSggLDnHrBmUTFsbBXS7a5SAFJKuU6HLhLZp4+PJeJKoLcJmOp
WnbhfA5H1R2cdi+nlWK4aYL56Q7DOodb32KifJQMYKudcqKRFGSEVcbFdMvd
XBlFJ8RrvJV0813STPBcvExO4WVstbHFF9uvumvuXdVx1xH07mFDVIWKb0AJ
L83uneubXgl5RvyyH2T01nRAQ28sHdLGWveuUnvX3+H7R7IA2GP7ZjdjuunF
O/4nCXA6NWxu8zSF0XzD+J14LN+3AAVrnkIYgkIPue3J8QTJA2yLKTMZSYBJ
aMGKW7FIvfU8Jqkycf0FuVYkZpSzbwqLgFW1czcLegxHZy0qBB5bfnSyeAoK
tH0WNeQik7upY16Qj1UnjdhhQfMm+TE+AmidDHZmrvRjBREqMDguFwm8Nybw
tHO6MFPDxchVmvDABQCNHI2LSPMk4AqenX322Xe6hYvPPruMnGxdqUQnjvWw
FMq3pi3GJGDEvKV6GhQWwXzwQIfvGHjWPNnNpoDrm0Idy/7cZ+SVaYUvQ3vh
s7NXSlSBKcHHV+L8uhKxamL31dGzp+Tm5frxesX4HOFA+MPi1samLQIfPpPL
bsSgqTNhSezFLUVqKgAI+FXnA+L7yBb10Koqr3B0XFEkTVN8joatut+2jFA8
O3s9p3tudZYwG3JhZxeOTpJ+YLBruMfzuTcTDS25DyaNUQAdHyQB6OiHCko1
fXG3I1uji8Eto3t34ncU3i1vwcDRVZPMRdC9NiVvQl/UszO1UnQiBCYrCXCo
Xf7lIL8OAXoR1HCixTkPJDO79MJy8eQNxhA185OeCKAKGczWV2oqulWg/Is2
vxLE37KFIlaUnrcl7Ze59EmB/bIBr5aQOa7G+o7H3St9gr4xGvYXwsy9Z46M
vNr/VMRY9yNUglxhlUsnCbPehgxL6BcQNcvixn+ltZB31HULFOSgZwR3xl46
lPZw4r5U3tTAPDHRcGTob5kJpdmI3BKzmxsaGiIustyeo3879O9IL4tJFlWn
Kb2YzUToDr7gPkUL7gPeIZTFBoolijR1qA6VL8bz+rYktYOka2WW9tmZKUuV
FAG8lJQAY0N2rHh1LkQaNZzeZKB3ZOp250e0AW6Hjcyd1NSYmUhg96emLhyw
Qt+2qdC66iras2ViA3EZGAeY+9iQtXQIl0jkivETjLzC7C0wO052IsnKo8Df
MaCtIK3EW9i5qcihYyHgSnAmSe1XXG0XYr9HWmFlR1Of3N16Ry63bKgfDfAi
aBvuOkDnIWogs+zR7IM0OoN0ugumq4QrPXVA8J5Lrs0Qoz/wanTTZjWd2zmN
QnpW272/OBdKI9Uu6CmlFRPWWUysnSKkrR3lNqA3PYjjIjKpuVOt4ZkcT0MV
G9LUt8UYKl0j2IWtlsV8EqCOyzLrViY4CydIz0HRYu1sJnFEFtAnCS8Zottm
RSeDAVcsMJ4V+UqA3y2CGjeq6ENz2kBLvkmTF5ZUj9MybIAaiblGHbxCFZ1i
Is4ai+16YFdk3H9nVFdP1mhm9ADK9+N1X2xpVhm2IB1qPq0vzaAZzeNp58+Z
ssRg/ABaz2ybku0zpEZp8l/wLq+BIuIVZ+/NajvR9ONwL8VlYVplihMt+WkG
gd8WaNS9Q4YnNBOP21Bp8iNKUuj6SHEpKZgKzGVuKodUv2wkFglG1GQpP+Cy
Lagf0fwp7UuMRJSLh/ykvJ1nowvle4phYNobVGMHvoBSRII8Bfd3yaMX7OVI
KOVPkkWLGpArzI50daHCYHA/FHejncTQW1naQVnQnmeouFV3aDS2yiJ8fXCs
IzCOzP0pmIjrEknn5LXo3dsC8VrQZezIOKODmnt4KDAb6wSiErOXc0nLe4+D
CdlTJHlGVitMw//K9v6PbJ/9y+weOnN5bfJhElhs2Kh8GPhB1F/Z1hHYfJTO
66UlswHAkh3iIIO0nx/LoYntH6lzaLG6fdxzrjNGrJBpGsdKtFFZgPc+UW7a
NFXLpjXL3xWHlQ+DbnFjaT6JTXsI8VCvMyko0wKguFSi7A/WEXal6P05yZxi
aVAy2gl0uCqUZN0A13aQ2o0TSFKRfxuzuevTPz5+ETfcraJP3Td1eIDf14i3
kaMCIgPcV1CCaKWAyCROkiJfI4isZIKtQoiD4spELXufqRrLVmpOvGUdwkFk
eeducB6wQnwswwpu31BlexEm0kuSQkWFdRR11aZooHgdJbNkTkMg2bSiJBk5
CpemTLgwp10dLEN62CvwZqDyMiogxnImLKGQZ5u8fSdZ4IrutWyxyguJdpTo
h3FTxKe0N5Z4iNLc25xp0pVj2CD/jc57M2yiom1aBOHP2RdABnmFNfUCP1aB
RTG7OKDsO7S579BR3RricD42fyfpfgmJhS3H1woU0Jg1DTntye64e+rBeVC4
EW2DUGFc2WPD1/MRQa2Ldo4/yHJHUyLMdsJqBbo5T5jTKd6wiDf8wUEDGnmW
oOPERrrJ7Wvj6v2DLrSpbHoRQ0KjpuvWfGok/S9n7NA4NXPsuA+QEHNGfX+w
y1JkGFfY8X2/7lwp07kuGBAAbGp0I8smhrgXtxb/HPS72VlSM+odn+iFkcU+
iloMcdgjBnwjaFXFu4kVvExkRCwiYiM4ZvqTmNYxH6ERRw7znaC6nxZ77mbU
QeAw1wGvp261ZN2k/lojxOtdCUwl+lUHwBYbpxGTPB+sifKfCB5H59TjGV5n
rZnYq6UUDbL29mkU17fg2JAmxWgPgnV5ISkZXCvscUGBFVzqU5uLIHz6K28P
OJJWGu5ScCPkd35Glo0EVzU3wmzAVpBcNZ3W1qiRJt6vNI3qrSow6rqg2ARb
oxDcEoKDuaCNnoXvMg0oNiLWAm0b+BBqMkZiGGafa0qQTtHXtlb6aVG57V1R
ioneyQwNcVDu2MZoWGP2XWmeQPJd1wl8RwueNEhweXhaNK8vw1AIDve54DM5
BgdquVE72mqGgFbACIVAXRS8YTntNRAIM9ooZuloPdBhq2Otd+zh2imNzQ7S
g+sSUniCDEGjJDmNBrhS+gyW1dJbtUfLK19kbMlizUGv1sQ8k6+FT2I6NZgr
ocqpTyvTmd8aTrCcvbTs1Q8os1M3HQTKIKF7YFenTFzRSZBgV1JdNDE8vIYI
6mJHu7nis8gRllaIUSaZRpTb2oZJHm5eaxCSE5gJgVI4p2s2GWtJE8As4y66
EAQNl3Abey5kFS8aSZolSWpTGpbc0n2ImoxdVSuDsvc6MR9DUOS0niFrWoTg
YbKOnGmqsXaB3P7bOAlGYpv0OkYObOOgpa/wuTbWCTJh0xB8mgKXoKnAPVgK
smPIADZidLNSB7DUjes0qISlOoVmDg0+OaLI/QB5mt3es/7EaABBw1o6b5a1
77LaPKvmqA/w3pZqXOuVnsdK0wGOBEmAHqTc3xV7WRBDkJhfwsSjtCDXbAXL
LCxDGNMAsssicE7Lh6zJG9kymEZB3OypC+Aj8koi2JWMf9WQScd6ahChjWCR
AcMg1syBDLTSVuMe2GDnpGMXUAYsZglDNO8K7ZirLYRz6xE6y16EYv6cFGkX
dSRXZ4IeIF1Ey0G/01XsBbJy2wyzu507pBIthKwCd7/XziCNOmXlkbEc4TxL
g+KIgWORsJb42HSheVVVJ+oCexdtSXggWoKCAkvMBxDgSBqCmdzqteyPhOQe
tmUPGizra63CRxDPtgMj01AJ+b1kQR1+HWelbpmbx4KfjtBbo6fyfFhWHRnK
xvCo37IgKWTYfBlkhB/Q2LcVvnjlG5i/t5GW4OkH9x6ZzEElshfHU3M466W0
lBxTGRwZTkHkbjh5tusugInLj8K8NSirEzW1iIDFW2PWXqXwjAtqsPUPWT6P
lddspEmDqNRYHwwYN/nOkLNjNMtz+uT1Prv/9OXz84ikcUu7qz3kF/Uegf57
VRxRZ4f4g0IdEWSAN6UBKTeAOydGk6YUlT4BfCZx0zIUU5ta7735LFfRmStx
QMinTSk1LaGugHvj0jBcm2Q32yKmAQM3jSQTJVRR9hGfUxfx2yJpFVq56fnk
hwBIDUHC7YaHyrDYgCPDcpy0pV5dfenhaJGjEqCwKg31KKD+vTuqNbpWiIm0
6ogwf64y/duU8O0pGnLuqyZHBIh/fDJ7IMkNZaYbXRhMzZaFxeMvaIJ7rj5n
vLaRg8Z9OE5Al8MeefgogLTxPEmdx2URvJ3necfpS9+5jqYQ+AsEsMkMXYy/
ezF9NnOk+tTIhqZprIvmCiv14jjtqp8/AOJZeSWmbT9kXR2CUOvsx+fVsi25
3RJyKSGVUtDq1v2szBctcimPHjx6fPHw8eNHSJJM0nkA6/v0WcE2GJcMk/+R
Xav20fm0pm/MoDC+fuhYqU26ywDZ5ciMtsKxbREffz0zvE0+p22iW6TLHn3+
+X/QZeOECbAAcebQ/Jo5vf0OzK8cU6ZpMqxWf7MLGVku5tkpX0FCbPwmdPbg
IQwaGopLU5hz+2j2JPv6m5+yF9evMg4cpt3GSJ4vim1v4VTvH8i+B8zNH8rp
VyXdUzLzBZuXZNzWKhjlRN6VTKHbeYbK+KklwAu/Osnk1w1700JLt+Yahugc
ONRfSj1UvStAzHPEnfCHsgvf6RzsWEqwPVQXFXlM262hTmxyoJ2kOiH+ld7S
sXBaoDtdF23pW+3CIHvarg22waYUyFa6AjIBECneQgE5T+liyzx13IRd1U2h
SZ7FfrSDfTxYrM4tQtZobOZ9rJS+gS2NXYWYnchBlYBhfp16bRbagjtNLELS
d1MZFttqAm6vimKrP/KisXaG9QMko/pBmlNJjligeVPxwOCgrICy803oqesw
Ruwl2lKlMHl9JSGfDXoWe282oVpLVLXN2OvrKTvdQNib7oM40jIKOntroD0D
Nq8tZEnEqbUgk85ef1MEiItuTekizvq1tr4mh0I9LKeIQHuu8qgbhPvQ6FAj
iv8wjf7w4QPTkHi4jkkx3JCYRi2xEOdSyt9+v1Vvu9VaA8d0pOaLbSUl54BV
iHL3UFJ7mJFzs7CM7vo1mmGitITTTC9W4U8Wwuyid3tUUduvRJhoaWcJnOEC
ZMn1CgomRQTWDRyXwqrVUxrHuPhilGdyvOjNeExcjZHJJbz9FpIq64g3aLgO
Pv2NRZ8ClM8SteafahbKHzyceqs/SyhJa26jR9tifdMruT2Xk+wMkaKturpd
MWxRBfSHAoBK9GCGoO6VAOJGoX4sl6dMkWClSXERfWy3VCaYSYDqR4+038F4
JOQkcyYCbLPZ1YLf4/40yl9jWT0pBPN6TBPBynA8GT1omhRCTW8RidaJjX9i
JD+iZgRwxxleS6HrTo7dD3MhIoHOpqzMdme7FCn7Cnyha080snsrsEhzRwLZ
qHfzEmT1HPPI6Djj+gRuWjUtqWgF/Yci+Z7VPDdIC8h+MdJ5pLEBph2JhoLm
7Oz7IePk+KQeChEX26MNdEOg1NyGhIDbnXgh2t5xjCWSyv6gLTJdeaxxTFra
NphkA8bITTOPm88ryEmIE+cooeEkJsl17NhXEcYdscOgsxA2Gsd9s/Xh0fv3
CKm6YlOO+K1kYESD8NNViu4Ms6aqSAYE8cWKaHTLq1MVb3gTL9jtcSWR6IzC
cSNxjwkWm3YynAYDE7RlaCavMCbFS1/GdtqRojQIbWACfQLjuherbgosqaOl
aRxc0Jhbkvod1Isc1M3Qf/n72xI6wmh00+EYtPbW6m4bqS/j+h83eCTYUTeh
7rI1S5bbVzOuo586OVXiIa+kR6OYxOjipjwV7HZrUi4+vYYr9VzaSMWPV/NI
UQjtVR50XdxFMJzWqgPoJ9i8QjNAy45dJXgethdoKgXaI/kvIZwCDNjK8+JS
Wp0u0lOs7x3zX5qIAQg2CbKD+tRo9Q4Pw2yMDkfYmhI9UXS6i5MoDjch7o3w
ZzIo6huVWeIIhxS3q93UfhUXBOERPYx0yoX/jzVv0l6KFYGc44DoHrVA4a74
wA/MfEXYh55zHLdg2DBbRiLvXzRvzZ2aeOH5opXUCUKFkeTK/VibsvbjLRk8
09BGczMMZ51WBNqzEdcGMOySg0ecdwSa3memC9iKAGcC6A6SxhqB3xjQnmWx
0fpODlpWDAxz2tQLrVjGpE4SPwiWfBJ30EiqllQuSzMjg13v28PM+NG9hKir
ok0YeuKtFKNGlu7qyR6lufZigth7zfHCbsTltaACHW+O4obNIY2I6bxutx4U
N3bjE4HExU257aRh4RYhBE6f20kXH0ZcrGihmmqZvnticejMfh7szoBRa7UK
G2ZSfIaepaT+vM/qOo9rmCc22HhZyY1Tom1JAhrZfvD9IRXi3jiJ/GKTGSgD
25irFEEZXKUAA9Mp2aPFEktytp1en9qUgpHHokZrqqyRkzSppgGlyNQ5sXyR
FcR5KDQu4Qu5iQp6h2r7lpCAiQ02z0aN2VWG/Z1kTn5jAjuWUnXcuCxuncch
Th7HJPkUWvag3CQEpfaXG4uJsJQIBW+fQOqaMMOH6dxtlzlCq/bR4H5Cg6tN
SXPrcyTZ/zX4j+PBqeCwQLIY00XkepuSylL32r7fG9siZ6g2ZpoQI9+02iHg
xXCIpAVthKbQgVixbTBzpiilY5si7/OB5EoQ+9a5bqgeXYH4CfXCAxRKBZkn
JNruukZGeNIcMA6RawwmxF94TRH8wnRwVs/OpYS2Qjc92xf6YYnRZ8vp0e9F
kwObAghiBDYOb8MzVbwke25Y0mK5VjEowv3DJWbtz+EptGXD+t1HTJUehtCn
JzTjWCrHUc/jeR0IvcQtofEn7ogm6Ew+i5Gnkdc8VczD50RWgmfF5fTcOIjA
MF4G3eDhJQVdVip+dvYm6FMpFN6wwR27vsjKqVGLF8HExLYcCDfW+Bw95FKV
gROmnTI7mFOje014GPaxVoxYl6I5EKQHe6EKSNuQaYGtUkiduMXBhIkhUghm
8Xa7OUNowI8ytCcwlu+uXs3G/UeO1e96Q8KENpaIivbtbr2WILrZZpHxSaOp
pki3h080gzSYoMaRkqjP559s66KYB5iwPpFzYo7FNlxiuHPer+skYDZDfd2o
ORWF4yPIYAjIaHbvVJYrGbLs6EXV7Ja6aFXTvNtt46AZInxSimnFIIZ6xfry
Bq/oswVJPoAClnDL0E4y/t6Iy8VgQ0xrQYoQdO6Mn9gxhwraJQ43QJgaYKNg
Z0NOqwkr1ysv+MB6NZRa7QTUTiuOri+tZk8YHbkDQ003CHOxCWoTx7KxSk+R
fe1NsbMyS9LCUjkB4Wx7MJ70hOv2l0TcQtGKRyHyUxEEAexK2MBjBOaTDLwB
D3pFJ2KMnkDdnVn2MjoC8WiBvg8rXwwc+WQaLXEejDOwEoiSUZkPiFdkLDV1
cr68b1eqa1b0H7ZKRqZvQGqqGFMGJNNskXADo28LqRVlcxTWngtVOcp0OYDB
/slUDffo4zT5GGjqjsoWI1EIAkx9VvP63H/DkbRuCEOx4g4ry595y1lUwOIC
j4SgQt4cbeB6dvaD9yg3CsM5z32EEgmG6WiD22GD8r7Z8skYNDU/2nz8E/q2
92lf8iF/KsNrOfQR7tdhar1C6A4ZbPkDnkYlI8Mr0YWhHDRXndGbD+gbP/bq
YaWdqb0I1WV9cSJ9LHmFo9zJnhkGalorWJ3JPn6luM0xgdEADalOzNFX9YEo
LkGrjPJPXggO/VYoXPJ2Y7hNmrnjPWuPTqEDHhT+/GktJQblOFFnibGyszMm
N2Osv9ZzYE0+YUiWnzu8+WAJutBUJ4HzpXVX2pkoAlmHYrhTo/+k6tqj32Mi
0NHQLBZDfRMgbDr7g6MTWI2dis7ply034YzgIx2df5W9uPr26qC7fNr3jLl9
6kauVDYikmfT6RSuJz/kasHR0qpYroUR/E+XAlkvlv/zPeQi7304O3vFqCzW
0O9E/K2KYgktgVDuU+TjXhbL27LOJ9nTvG2ZS7Gc0w+vyIPOiyr7juRTS9NM
Zu5zsjdo2Tl5VNEVX97AEiCj4Cv6WvIuFrkcNDpA5PBk39C0Not38ju1EpUh
kFa5eK8Q/C+bdk4bgrlUir6f0Iaig8lkB7Qt9IHPb/Ps67xiX5/c6B8UzMf5
LQ2X5T4XsmN8UaFCFGSVSFbNyn3NCF/6ErLSOvnAPHtNc2e9Akgjv921XseL
qimydWiQbSGOyrNiTp/QVAVSByhftO422hkxsONECzw7+38ASF6jREhyAQA=

-->

</rfc>
