ࡱ>  wrstuvys.TM Ibjbj== WW@]lDDD$hPPPP.Q$RRh@S VVVVSd%jl$ 3ED m3b Sd m mzVV 1Zzzz mVDVz mzzSCtD VS Qhv2Pm: H:wp zhhTaxonomies of Distributed Denial of Service Networks, Attacks, Tools, and Countermeasures Stephen Specht and Ruby Lee Princeton Architecture Laboratory for Multimedia and Security (PALMS) Department of Electrical Engineering Princeton University Abstract Distributed Denial of Service (DDoS) attacks are a virulent, relatively new type of attack on the availability of Internet services and resources. DDoS attackers infiltrate large numbers of computers by exploiting software vulnerabilities, to set up DDoS attack networks. These unwitting computers are then invoked to wage a coordinated, large-scale attack against one or more victim systems. As specific countermeasures are developed, attackers enhance existing DDoS attack tools, developing new and derivative DDoS techniques and attack tools. Rather than react to new attacks with specific countermeasures, it would be desirable to develop comprehensive DDoS solutions that defend against known and future DDoS attack variants. However, this requires a comprehensive understanding of the scope and techniques used in different DDoS attacks. This paper attempts a comprehensive scoping of the DDoS problem. We propose new taxonomies to categorize DDoS attack networks, to classify the different techniques used in a DDoS attack, and to describe the characteristics of the software tools used in setting up a DDoS attack network. These taxonomies help us to understand the similarities and differences in DDoS attacks and tools, and the scope of the DDoS problem. Given this new understanding, we propose classes of countermeasures that target the DDoS problem before, during and after an actual DDoS attack. This work is intended to stimulate research into creative, effective and efficient defenses and detection mechanisms for DDoS attacks, and to assist in creating comprehensive solutions that will provide a more generalized and effective approach to countering both known and derivative DDoS attacks. 1 Introduction A Denial of Service (DoS) attack can be characterized as an attack with the purpose of preventing legitimate users from using a victim computing system or network resource [1]. A Distributed Denial of Service (DDoS) attack is a large-scale, coordinated attack on the availability of services of a victim system or network resource, launched indirectly through many compromised computers on the Internet. The services under attack are those of the primary victim, while the compromised systems used to launch the attack are often called the secondary victims. The use of secondary victims in performing a DDoS attack provides the attacker with the ability to wage a much larger and more disruptive attack, while making it more difficult to track down the original attacker. As defined by the World Wide Web Security FAQ: A Distributed Denial of Service (DDoS) attack uses many computers to launch a coordinated DoS attack against one or more targets. Using client/server technology, the perpetrator is able to multiply the effectiveness of the Denial of Service significantly by harnessing the resources of multiple unwitting accomplice computers which serve as attack platforms.[2] According to the CIAC (Computer Incident Advisory Capability), the first DDoS attacks occurred in the summer of 1999 [3]. In February 2000, one of the first major DDoS attacks was waged against Yahoo.com. This attack kept Yahoo off the Internet for about 2 hours and cost Yahoo a significant loss in advertising revenue [4]. Another recent DDoS attack occurred on October 20, 2002 against the 13 root servers that provide the Domain Name System (DNS) service to Internet users around the world. They translate logical addresses such as  HYPERLINK "http://www.yahoo.edu" www.yahoo.edu into a corresponding physical IP address, so that users can connect to websites through more easily remembered names rather than numbers. If all 13 servers were to go down, there would be disastrous problems accessing the World Wide Web. Although the attack only lasted for an hour and the effects were hardly noticeable to the average Internet user, it caused 7 of the 13 root servers to shut down, demonstrating the vulnerability of the Internet to DDoS attacks [5]. If unchecked, more powerful DDoS attacks could potentially cripple or disable essential Internet services in minutes. The contributions of this paper include the first taxonomies proposed for classifying different DDoS attack networks, attacks, tools and countermeasures. DDoS attacks are relatively new and not at all well understood. For example, this paper is the first to characterize the setup and installation techniques of DDoS attack architectures, identifying both active and passive methods. By showing the types of DDoS attack networks, classifying the types of DDoS attack techniques, and describing the characteristics of the DDoS software tools, we hope to aid significantly in understanding the scope of DDoS attacks. This understanding can help to produce more effective and encompassing DDoS detection, prevention and mitigation mechanisms. We hope that this will lead to more comprehensive solutions to thwart both known attacks and the innumerable derivative attacks. Based on the understanding we derived in constructing these taxonomies to scope the DDoS problem, we have also proposed a taxonomy of DDoS countermeasures. This is a comprehensive set of possible preventive, defensive and forensic mechanisms, which target the DDoS problem before, during and after an actual DDoS attack. In Section 2 we describe the main classes of DDoS attack networks. In Section 3 we present our taxonomy for DDoS attacks. In Section 4 we present the software characteristics for DDoS attack tools. We identify how these tools are set up on secondary victim systems, and how communications work within the DDoS attack network. In Section 5 we present an overview of the commands used by the DDoS attack tools. In Section 6 we present a brief description of some of the more common DDoS attack tools. In Section 7 we present a taxonomy of different classes of countermeasures for addressing DDoS attacks. In Section 8 we conclude the paper with a discussion of policy, legal and economic issues, and suggestions for future work on using these taxonomies to develop comprehensive DDoS solutions. {sspecht, rblee}@princeton.edu Abstract Distributed Denial of Service (DDoS) attacks have become a large problem for users of computer systems connected to the Internet. DDoS attackers hijack secondary victim systems using them to wage a coordinated large-scale attack against victim systems. As new countermeasures are developed to prevent DDoS attacks and help systems that are victims of such an attack, attackers are constantly developing new software and adapting older DDoS attack tools to circumvent these new countermeasures. In this paper we describe the taxonomies of DDoS attacks, the software tools used to wage a DDoS attack and the countermeasures available. These different taxonomies are presented so that similarities and patterns within DDoS attacks and tools can be better understood. This work is intended to assist in developing solutions that will provide a more generalized approach to countering DDoS attacks so that as new derivative attacks are developed a generic countermeasure model can be used to prevent secondary victims and stop DDoS attacks. 1 Introduction A Denial of Service (DoS) attack can be characterized as an attack with the purpose of preventing legitimate users from using a specified network resource such as a website, web service, or computer system [1]. A Distributed Denial of Service (DDoS) attack is a coordinated attack on the availability of services of a given target system or network launched indirectly through many compromised computing systems. The services under attack are those of the primary victim, while the compromised systems used to launch the attack are often called the secondary victims. The use of secondary victims in a DDoS attack provides the attacker with the ability to wage a much larger and more disruptive attack than a DoS attack while remaining anonymous since the secondary victims actually complete the attack making it more difficult for network forensics to track down the original attacker. As defined by the World Wide Web Security FAQ: A Distributed Denial of Service (DDoS) attack uses many computers to launch a coordinated DoS attack against one or more targets. Using client/server technology, the perpetrator is able to multiply the effectiveness of the Denial of Service significantly by harnessing the resources of multiple unwitting accomplice computers which serve as attack platforms.[2] According to the CIAC (Computer Incident Advisory Capability), the first DDoS attacks occurred in the summer of 1999 [3]. In February of 2000, one of the first major DDoS attacks was waged against Yahoo.com and kept Yahoo off of the Internet for about 2 hours. This attack cost Yahoo.com an estimate $500,000 in lost advertising revenue [4]. Another recent DDoS attack occurred on October 20, 2002 against the 13 root servers that manage the Internet. These root servers provide the Domain Name System (DNS) to Internet users around the world. They translate logical addresses such as  HYPERLINK "http://www.princeton.edu" www.princeton.edu into a physical IP address so that computers can connect to the websites. If all 13 servers were to go down, there would be noticeable problems accessing the World Wide Web. Although the attack only lasted for an hour and the effects were hardly noticeable to the average Internet user, it caused 7 of the 13 root servers to shut down, demonstrating the vulnerability of the Internet to DDoS attacks [5].  The contributions of this paper include the first taxonomies proposed for the different DDoS attacks, tools, and countermeasures. DDoS attacks are relatively new and not at all well understood. By classifying the types of DDoS attacks, the characteristics of the DDoS software tools, and the space of possible countermeasures, we hope to aid significantly in understanding the scope of DDoS attacks. This understanding can help to produce comprehensive solutions or countermeasures to cover both known attacks and those that have not yet occurred. Additionally, this paper is the first to characterize the setup and installation techniques of DDoS attack architectures, identifying both active and passive classes. In Section 2 we describe the classes of DDoS attack architectures. In Section 3 we present our taxonomy for DDoS attacks. In Section 4 we present an overview of the software characteristics for DDoS attack tools with an emphasis of how these tools are setup on secondary victim systems. In Section 5 we present an overview of the commands issued to and by the DDoS attack tools. In Section 6 we present a brief description of some of the more common DDoS attack tools. In Section 7 we present a taxonomy of the different countermeasures that are available to prevent DDoS attacks. In Section 8 we conclude the paper with suggestions for future work on how these taxonomies can be used to develop generic and comprehensive DDoS countermeasures. 2 DDoS Attack Networks Figure 1 shows two main types of DDoS attack networks: the Agent-Handler model and the Internet Relay Chat (IRC-Based) model (See Figure 1). 2.1 Agent-Handler Model An Agent-Handler DDoS attack network consists of clients, handlers, and agents (see Figure 2). The client platform is where the attacker communicates with the rest of the DDoS attack network. The handlers are software packages located on computing systems throughout the Internet that the attacker uses to communicate indirectly with the agents. The agent software exists in compromised systems that will eventually carry out the attack on the victim system. The attacker communicates with any number of handlers to identify which agents are up and running, when to schedule attacks, or when to upgrade agents. Depending on how the attacker configures the DDoS attack network, agents can be instructed to communicate with a single handler or multiple handlers. Usually, attackers will try and place the handler software on a compromised router or network server that handles large volumes of traffic. This makes it harder to identify messages between the client and handler and between the handler and agents. The communication between attacker and handler and between the handler and agents can be via TCP, UDP, or ICMP protocols. The owners and users of the agent systems typically have no knowledge that their system has been compromised and will be taking part in a DDoS attack. When participating in a DDoS attack, each agent program uses only a small amount of resources (both in memory and bandwidth), so that the users of these computers experience minimal change in performance. In descriptions of DDoS tools, the terms handler and agents are sometimes replaced with master and daemons respectively. Also, the systems that have been violated to run the agent software are referred to as the secondary victims, while the target of the DDoS attack is called the (primary) victim. 2.2 IRC-Based DDoS Attack Model Internet Relay Chat (IRC) is a multi-user, on-line chatting system. It allows computer users to create two-party or multi-party interconnections and type messages in real time to each other [6]. IRC network architectures consist of IRC servers that are located throughout the Internet with channels to communicate with each other across the Internet. IRC chat networks allow their users to create public, private and secret channels. Public channels are channels where multiple users can chat and share messages and files. Public channels allow users of the channel to see all the IRC names and messages of users in the channel [7]. Private and secret channels are set up by users to communicate with only other designated users. Both private and secret channels protect the names and messages of users that are logged on from users who do not have access to the channel [8]. Although the content of private channels is hidden, certain channel locator commands will allow users not on the channel to identify its existence, whereas secret channels are much harder to locate unless the user is a member of the channel.  An IRC-Based DDoS attack network is similar to the Agent-Handler DDoS attack model except that instead of using a handler program installed on a network server, an IRC communication channel is used to connect the client to the agents. By making use of an IRC channel, attackers using this type of DDoS attack architecture have additional benefits. For example, attackers can use legitimate IRC ports for sending commands to the agents [9]. This makes tracking the DDoS command packets much more difficult. Additionally, IRC servers tend to have large volumes of traffic making it easier for the attacker to hide his presence from a network administrator. A third advantage is that the attacker no longer needs to maintain a list of agents, since he can simply log on to the IRC server and see a list of all available agents [9]. The agent software installed in the IRC network usually communicates to the IRC channel and notifies the attacker when the agent is up and running. A fourth advantage is that IRC networks also provide the benefit of easy file sharing. File sharing is one of the passive methods of agent code distribution that we discuss in Section 4. This makes it easier for attackers to secure secondary victims to participate in their attacks. In an IRC-based DDoS attack architecture, the agents are often referred to as Zombie Bots or Bots. In both IRC-based and Agent-Handler DDoS attack models, we will refer to the agents as secondary victims or zombies.  2 DDoS Attack Architectures There are two types of DDoS attack architectures: the Agent-Handler architecture and Internet Relay Chat (IRC)-Based architecture. 2.1 Agent-Handler Model The Agent-Handler model of a DDoS attack consists of clients, handlers, and agents (see Figure 1). The client is where the attacker communicates with the rest of the DDoS attack system. The handlers are software packages located throughout the Internet that the attackers client uses to communicate with the agents. The agent software exists in compromised systems that will eventually carry out the attack. The attacker communicates with any number of handlers to identify which agents are up and running, when to schedule attacks, or when to upgrade agents. The owners and users of the agent systems typically have no knowledge that their system has been compromised and will be taking part in a DDoS attack. Depending on how the attacker configures the DDoS attack network, agents can be instructed to communicate with a single handler or multiple handlers. Usually, attackers will try and place the handler software on a compromised router or network server that handles large volumes of traffic. This makes it harder to identify messages between the client and handler and between the handler and agents. In descriptions of DDoS tools, the terms handler and agents are sometimes replaced with master and daemons respectively. In a DDoS attack network, the systems that have been violated to run the agent software are referred to as the secondary victims. The primary victim is the system that is the target of the DDoS attack. Each agent program uses only some resources (both in memory and bandwidth) when participating in an attack. However, well-designed agent software use up a small proportion of resources so that the secondary-victim users experience minimal change in their system performance. 2.2 IRC-Based DDoS Attack Model Internet Relay Chat (IRC) is a multi-user, on-line chatting system. It allows computer users to create two-party or multi-party interconnections and type messages in real time to each other [6]. IRC network architectures consist of IRC servers that are located throughout the Internet with channels to communicate with each other across the Internet. IRC chat networks allow their users to create public, secret, and private channels. Public channels are channels where multiple users can chat and share messages and files. Public channels allow users of the channel to see all the IRC names and messages of users in the channel [7]. Private and secret channels are set up by users to communicate with only other designated users. Both private and secret channels protect the names and messages of users that are logged on from users who do not have access to the channel [8]. Although the content of private channels is hidden, certain channel locator commands will allow users not on the channel to identify its existence whereas secret channels are much harder to locate unless the user is a member of the channel.  IRC-Based DDoS attack architecture is similar to the Agent-Handler DDoS attack model except that instead of using a handler program installed on a network server, an IRC communication channel is used to connect the client to the agents. By making use of an IRC channel, attackers using this type of DDoS attack architecture have additional benefits. For example, attackers can use legitimate IRC ports for sending commands to the agents [9]. This makes tracking the DDoS command packets much more difficult. Additionally, IRC servers tend to have large volumes of traffic making it easier for the attacker to hide his presence from a network administrator. Another advantage is that the attacker no longer needs to maintain a list of all of the agents, since he can simply log on to the IRC server and see a list of all available agents [9]. The agent software installed in the IRC network usually communicates to the IRC channel and notifies the attacker when the agent is up and running. IRC networks also provide the added benefit of easy file sharing. File sharing is one of the passive methods of agent code distribution that we discuss in Section 4. This makes it easier for attackers to secure secondary victims to participate in their attacks. In an IRC-based DDoS attack architecture, the agents are often referred to as Zombie Bots or Bots. In both IRC-based and Agent-Handler DDoS attack models, we will refer to the agents as secondary victims or zombies. 3. DDoS Attack Taxonomy There are a wide variety of DDoS attack techniques. We propose a taxonomy of the main DDoS attack methods in Figure 4. There are two main classes of DDoS attacks: bandwidth depletion and resource depletion attacks. A bandwidth depletion attack is designed to flood the victim network with unwanted traffic that prevents legitimate traffic from reaching the (primary) victim system. A resource depletion attack is an attack that is designed to tie up the resources of a victim system. This type of attack targets a server or process on the victim system making it unable to process legitimate requests for service. Bandwidth Depletion Attacks There are two main classes of DDoS bandwidth depletion attacks. A flood attack involves the zombies sending large volumes of traffic to a victim system, to congest the victim systems bandwidth. An amplification attack involves either the attacker or the zombies sending messages to a broadcast IP address, using this to cause all systems in the subnet reached by the broadcast address to send a reply message to the victim system. This method amplifies malicious traffic that reduces the victim systems bandwidth. Flood Attacks In a DDoS flood attack the zombies flood the victim system with IP traffic. The large volume of packets sent by the zombies to the victim system slows it down, crashes the system or saturates the network bandwidth. This prevents legitimate users from accessing the victims resources. Figures 1 2 and 2 3 indicate a flood attack for an Agent-Handler attack architecture network and an IRC-based attack architecturenetwork, respectively. UDP Flood Attacks. User Datagram Protocol (UDP) is a connectionless protocol. When data packets are sent via UDP, there is no handshaking required between sender and receiver, and the receiving system will just receive packets it must process. A large number of UDP packets sent to a victim system can saturate the network, depleting the bandwidth available for legitimate service requests to the victim system. In a DDoS UDP Flood attack, the UDP packets are sent to either random or specified ports on the victim system. Typically, UDP flood attacks are designed to attack random victim ports. This causes the victim system to process the incoming data to try to determine which applications have requested data. If the victim system is not running any applications on the targeted port, then the victim system will send out an ICMP packet to the sending system indicating a destination port unreachable message [3]. Often, the attacking DDoS tool will also spoof the source IP address of the attacking packets. This helps hide the identity of the secondary victims and it insures that return packets from the victim system are not sent back to the zombies, but to another computer with the spoofed address. UDP flood attacks may also fill the bandwidth of connections located around the victim system (depending on the network architecture and line-speed). This can sometimes cause systems connected to a network near a victim system to experience problems with their connectivity. ICMP Flood Attacks. Internet Control Message Protocol (ICMP) packets are designed for network management features such as locating network equipment and determining the number of hops or round-trip-time to get from the source location to the destination. For instance, ICMP_ECHO_REPLY packets (ping) allow the user to send a request to a destination system and receive a response with the roundtrip time. A DDoS ICMP flood attack occurs when the zombies send large volumes of ICMP_ECHO_REPLY packets to the victim system. These packets signal the victim system to reply and the combination of traffic saturates the bandwidth of the victims network connection [3]. As for the UDP flood attack, the source IP address may be spoofed, so that the return ICMP packets from the victim system are not sent back to the zombies, but to another system. Amplification Attacks A DDoS amplification attack is aimed at using the broadcast IP address feature found on most routers to amplify and reflect the attack (see figure 5). This feature allows a sending system to specify a broadcast IP address as the destination address rather than a specific address. This instructs the routers servicing the packets within the network to duplicate the packets and send them to all the IP addresses within the broadcast address range. For this type of DDoS attack, the attacker can send the broadcast message directly, or the attacker can use the agents to send the broadcast message to increase the volume of attacking traffic. If the attacker decides to send the broadcast message directly, this attack provides the attacker with the ability to use the systems within the broadcast network as zombies without needing to infiltrate them or install any agent software. We further distinguish two types of amplification attacks, Smurf and Fraggle attacks. Smurf Attacks. In a DDoS Smurf attack, the attacker sends packets to a network amplifier (a system supporting broadcast addressing), with the return address spoofed to the victims IP address. The attacking packets are typically ICMP ECHO REQUESTs, which are packets (similar to a ping) that request the receiver to generate an ICMP ECHO REPLY packet [10]. The amplifier sends the ICMP ECHO REQUEST packets to all of the systems within the broadcast address range, and each of these systems will return an ICMP ECHO REPLY to the target victims IP address [11]. This type of attack amplifies the original packet tens or hundreds of times. Fraggle Attacks. A DDoS Fraggle attack is similar to a Smurf attack in that the attacker sends packets to a network amplifier. Fraggle is different from Smurf in that Fraggle uses UDP ECHO packets instead of ICMP ECHO packets [12]. There is a variation of the Fraggle attack where the UDP ECHO packets are sent to the port that supports character generation (chargen, port 19 in Unix systems), with the return address spoofed to the victims echo service (echo, port 7 in Unix systems) creating an infinite loop [13]. The UDP Fraggle packet will target the character generator in the systems reached by the broadcast address. These systems each generate a character to send to the echo service in the victim system, which will resend an echo packet back to the character generator, and the process repeats. This attack generates even more bad traffic and can create even more damaging effects than just a Smurf attack. Resource Depletion Attacks DDoS resource depletion attacks involve the attacker sending packets that misuse network protocol communications or sending malformed packets that tie up network resources so that none are left for legitimate users. Protocol Exploit Attacks TCP SYN Attacks. The Transfer Control Protocol (TCP) includes a full handshake between sender and receiver, before data packets are sent. The initiating system sends a SYN (Synchronize) request (see figure 6a). The receiving system sends an ACK (acknowledgement) with its own SYN request. The sending system then sends back its own ACK and communication can begin between the two systems. If the receiving system is sent a SYNX packet but doesnt not receive an ACKY+1 to the SYNY it sends back to the sender, the receiver will resend a new ACK + SYNY after some time has passed [14] (see figure 6b). The processor and memory resources at the receiving system are reserved for this TCP SYN request until a timeout occurs.  In a DDoS TCP SYN attack, the attacker instructs the zombies to send such bogus TCP SYN requests to a victim server in order to tie up the servers processor resources, and hence prevent the server from responding to legitimate requests. The TCP SYN attack exploits the three-way handshake between the sending system and the receiving system by sending large volumes of TCP SYN packets to the victim system with spoofed source IP addresses, so the victim system responds to a non-requesting system with the ACK+SYN. When a large volume of SYN requests are being processed by a server and none of the ACK+SYN responses are returned, the server begins to run out of processor and memory resources. Eventually, if the volume of TCP SYN attack requests is large and they continue over time, the victim system will run out of resources and be unable to respond to any legitimate users. PUSH + ACK Attacks. In the TCP protocol, packets that are sent to a destination are buffered within the TCP stack and when the stack is full, the packets get sent on to the receiving system. However, the sender can request the receiving system to unload the contents of the buffer before the buffer becomes full by sending a packet with the PUSH bit set to one. PUSH is a one-bit flag within the TCP header [15]. TCP stores incoming data in large blocks for passage on to the receiving system in order to minimize the processing overhead required by the receiving system each time it must unload a non-empty buffer. The PUSH + ACK attack is similar to a TCP SYN attack in that its goal is to deplete the resources of the victim system. In this type of attack, tThe attacking agents send TCP packets with the PUSH and ACK bits set to one. These packets instruct the victim system to unload all data in the TCP buffer (regardless of whether or not the buffer is full) and send an acknowledgement when complete. If this process is repeated with multiple agents, the receiving system cannot process the large volume of incoming packets and the victim systemit will crash. 3.2.2 Malformed Packet Attacks A malformed packet attack is an attack where the attacker instructs the zombies to send incorrectly formed IP packets to the victim system in order to crash the victim system. There are two types of malformed packet attacks. In an IP address attack, the packet contains the same source and destination IP addresses. This can confuse the operating system of the victim system and cause the victim system to crash. In an IP packet options attack, a malformed packet may randomize the optional fields within an IP packet and set all quality of service bits to one so that the victim system must use additional processing time to analyze the traffic. If this attack is multiplied using enough agents, it can shut down the processing ability of the victim system. DDoS Attack Software Characteristics of DDoS Attack Tools There are a number of software characteristics that are common among DDoS attack tools. These common elements include how agents are setup, agent activationcommunication between attackers, handlers and agents, and the operating systems (OS) supported, and whether the communication within the DDoS attack architecture is encrypted. These characteristics can be described in a taxonomy tree as shown in Figure 7. We will focus on DDoS agent setup since preventing agent setup is important for preventing DDoS attacks. 4.1 DDoS Agent Setup There are both active and passive methods that attackers use to install malicious code onto a secondary victim system in order to execute a DDoS attack in either theset up an Agent-Handler or the an IRC-Bbased DDoS attack architecturesnetwork. Active methods typically involve the attacker scanning the network for systems with known vulnerabilities. Upon identifying such vulnerable systems, the attacker runs scripts to break into the system. Once the attacker has broken into the system, he can stealthily install the DDoS Agent software. Thus the system is compromised as a secondary victim, which and can be used as a zombie in a future DDoS attack. Passive methods typically involve the attacker sharing corrupt files or building web sites that take advantage of known vulnerabilities in a secondary victims web browser. Upon accessing a file or website with an embedded DDoS Agent, the secondary victim system is compromised, and the DDoS agent code may be installed. 4.1.2 1 Active DDoS Installation Scanning. Before launching a DDoS attack, attackers must first set up the DDoS attack network. They often run a scanning tool to identify potential secondary victim systems. One common tool attackers use to scan for ports is a software program called Nmap. Attackers can download Nmap from various locations on the web. (for example  HYPERLINK "http://www.insecure.org/nmap/" www.insecure.org/nmap/). This tool allows attackers to select ranges of IP addresses to scan. The tool will then proceed to search the Internet for each of these IP addresses. Nmap returns the information that each IP address is broadcasting such as TCP and UDP ports that are open, and the specific OS of the scanned system [16]. An attacker can then examine this list for potential secondary victim systems. Another tool for scanning the network finds random IP addresses with a known vulnerability. This provides the attacker with a list of victim systems that all share the same common vulnerability. One example of this type of vulnerability scan tool is called Nessus [17]. We Below, we describe three examples three types of vulnerabilities exploited for active DDoS agent setup techniques, as examples. Software/Backdoor Vulnerability. Once the attacker has scanned for a list of vulnerable systems, he will need to exploit the vulnerability to gain access to the secondary victim system and install the DDoS agent code. There are many sources on the Internet, such as the Common Vulnerabilities and Exposures (CVE) organization, which publicly list all of the known vulnerabilities of different systems. CVE has currently categorized over 2,000 different types of vulnerabilities and they have over 2,000 more waiting for consideration [18]. This research information is available so network administrators can make their systems more secure; however, it also provides attackers with data about which vulnerabilities exist. One such vulnerability was first reported in November of 2001 by CERT. The vulnerability reported was that the Kaiten IRC-Based DDoS agent software was being installed on Microsoft SQL Servers by making use of a known default password. Attackers could scan for hosts connected with TCP port 1433 (the MS SQL Server port), and find systems where they can then log on to MS SQL Servers using a default administrator password. From this administrator account, the attacker can utilize the xp_cmdshell procedure from the MS SQL Server to initiate an FTP session to download the agent software on the MS SQL Server [19]. Any MS SQL Server that has not had the administrators password changed or been upgraded with software patches to prevent the default administrator password could be victims of this type of attack. Trojan Horse Program. A Trojan horse is a program that appears to perform a useful function, but in reality contains hidden code that either executes malicious acts or provides a trap door for unauthorized access to some privileged system function [20]. Trojan horse programs are installed on a victims system by the attacker and allow the attacker to gain control of a users computer without the user knowing. In the case of a DDoS attack tool setup, Trojan horse programs already installed on a victim system might be used by the attacker to gain access to a secondary victims system allowing the attacker to install the DDoS agent code. Trojan Horse programs, themselves, are typically installed on a secondary victims system by using the passive setup techniques discussed in Section 4.1.2. Buffer Overflow. Another vulnerability is the buffer overflow problem. A buffer is a continuous block of memory (with a finite size) that serves as a temporary data storage area within a computer. A buffer overflow is an attack against the buffer that sends more data into the buffer than the size of the buffer. This causes the extra data to overwrite other information adjacent to the buffer [21] in the memory storage stack, such as a procedure return address. This can cause the computer to return from a procedure call to malicious code included in the data that overwrites the buffer. This malicious code can be used to start a program of the attackers choosing (such as a DDoS Agent) or provide access to the victims computer so that the attacker can install the DDoS Agent code. Passive DDoS Installation Bugged Web Site. One method attackers can use to passively infiltrate a secondary victim computer system is to take advantage of a vulnerability found on web browsers. This method allows the attacker to create websites with code or commands to trap a victim. When the victims web browser views the web page or tries to access content, the web page indirectly downloads or installs malicious code (e.g., a DDoS Agent.) One example of this type of attack exploits a bug in Microsofts Internet Explorer (IE) versions 5.5 and 6.0. These versions of IE contain ActiveX, a technology developed by Microsoft to enable control within IE for viewing specific plug-in applications embedded within website code. ActiveX controls can be embedded within a website and allow the IE web browser to automatically download client binary code specified by the website being viewed [22].  An attacker can build malicious code into a web page that can take advantage of ActiveX. I and instead of downloading client software for viewing the web page; , the attacker can set up ActiveX to download a DDoS agent. The attacker will typically post a website with the malicious ActiveX code somewhere on the Internet to attract victim systems. The malicious html code is used to reference an ActiveX installation package that an IE browser will think is legitimate but actually contains code, such as DDoS agent software or code that allows the attacker to infiltrate the system. The malicious html code could include the DDoS agent, and takes the form: This command instructs IE to use an ActiveX control with a GUID (GUI Class Identifier) XXXXXXXX and if that control has not been downloaded, it provides the address where the control can be downloaded [23]. The download address actually contains the malicious code the attacker wants to install on the victim machine. If the software patch for IE to prevent this problem is not installed, IE will inadvertently download the malicious code in place of the legitimate code. The attacker has now installed the malicious code on the victims computer. If this code is a DDoS agent, the attacker has now created a secondary victim system that can be invoked for a future DDoS attack. Corrupted File. Another method of a passive attack that is commonly used is to alter files and include malicious code embedded within them. When the victim system tries to view or execute these files, they will become infected with the malicious code. There are many tricks to creating infected files. Most attackers are skilled enough to embed a DDoS attack agent or other virus software within a legitimate file. The attackers redesign the Desktop icons for such files, choosing long files names with legitimate extensions interwoven within the filename so that if only part of the file name is displayed, it will appear like a legitimate filename. For instance, one popular technique is for attackers to generate a text file with the binary executable code for a DDoS agent embedded within it. They rename the text file with a very long name and with the .txt extension within the name when the real extension is .exe. For instance, the file might be newfile.txt_this_file_is_really_a_ddos_agent.exe. If only the first few characters of the file are displayed to the user, it will appear as if this file is really a text file, not an executable file. In this example, the newfile name would need to be around 150 characters long so most windows Windows systems would not show the full file name [24]. As soon asWhen a user launches the file, they his machine will become infected with the DDoS agent software. Some attackers are skilled enough to include a legitimate text box to open, so the victim will think the file was legitimate and will not realize that the fileit contained the DDoS agent. Corrupt files can be exchanged in a variety of manners. Currently, IRC file sharing and Gnutella networks are two popular file-sharing methods that make it easy for a corrupt file to circulate to many users. An attacker can also send e-mail with corrupt files to victims, hoping the victims will open the files and infect themselves with the DDoS agent code. Root kits Root kits are programs that are used by the attacker after installation of handler and/or agent software to remove log files and any other records that might indicate that the attacker was using the system [25]. Attackers may additionally use the root kit tools to create back-doors so that they will be able to access the secondary victims system in the future [26]. Root kit tools are typically used when handler software is installed since one handler can be critical for the DDoS attack network to work and since handler programs are usually installed within ISP or corporate networks where the possibility of detection may be higher. In comparison, the effort to use a root kit on all of the agents may be time prohibitive and less important since secondary victims are less likely to be aware of the agent software and if some of the agents are discovered, their loss does not significantly impact the DDoS attack network significantly. Attack Network Communication Protocols Used. The DDoS agents and handlers can communicate to each other via TCP, UDP, and/or ICMP. DDoS handlers and clients can also communicate with each other using the same protocol options. Encrypted Communication. Some DDoS attack tools have also been developed with support for encrypted communication within the DDoS attack network. Agent-handler DDoS attacks might use an encrypted channel either between the client and the handlers, or between the handlers and the agents. The method of encryption for agent-handler DDoS attacks will be dependent on the communication protocol used by the DDoS tool. IRC-based DDoS attacks may use either a public, private, or secret channel to communicate between the agents and the handlers. Both private and secret IRC channels provide encryption, however private channels (not the data or users) appear in the IRC servers channel list and secret channels do not appear in the IRC servers channel list. Agent Activation. There are two key methods for the DDoS agents to become activated. In some DDoS tools, the agents actively poll the handlers or IRC channel for instructions, whereas in other DDoS tools, the agents will lie and wait for communication from either the handler or the IRC channel. Agent Activation There are two key methods for the DDoS agents to become active. In some DDoS tools, the agents actively poll the handlers or IRC channel for instructions, whereas in other DDoS tools, the agents will lie and wait for communication from either the handler or the IRC channel. OS Supported DDoS attack tools are typically designed to be compatible with different operating systems (OS). Any OS system (such as Unix, Linux, Solaris, or Windows) may have DDoS agent or handler code designed to work on it. Typically, the handler code is designed to support an OS that would be located on a server or workstation at either a corporate or ISP site. This usually leads to the choice of Unix, Linux, or Solaris. For the agent code, it is also common for it to be compatible with Linux or Solaris with the addition of Windows. Many attackers target residential Internet users with DSL and cable modems (for higher attacking bandwidth) and these users typically use Windows. Agent and handler software can be written for different operating systems. Encrypted Communication Some DDoS attack tools have also been developed with support for encrypted communication within the DDoS attack network. Agent-handler DDoS attacks might use an encrypted channel either between the client and the handlers, or between the handlers and the agents. The method of encryption for agent-handler DDoS attacks will be dependent on the communication protocol used by the DDoS tool. IRC-based DDoS attacks may use either a public, private, or secret channel to communicate between the agents and the handlers. Both private and secret IRC channels provide encryption, however private channels (not the data or users) appear in the IRC servers channel list and secret channels do not appear in the IRC servers channel list. DDoS Attack Software Commands Each DDoS attack tool has a number of commands. These commands are designed for both the handler and agent software packages. For most DDoS agents, specific commands are entered via a command line interface. Although the specific commands differ for each DDoS attack tool, we generalize these commands and describe their operation as listed in tables Tables 1 and 2. Table 1: Handler Commands CommandDescriptionLog OnCommand for the attacker to log on to the handler (usually password protected).Turn OnInstructs the handler to turn on and wait for other commands.Log OffCommand for the attacker to log off of the handler.Turn OffInstructs the handler to shut down. If the handler was actively polling the network looking for agents, this command stops the handler from continuing this action.Initiate AttackInstructs the handler to contact all agents and have them launch an attack against a specified target.List AgentsInstructs the handler to poll the network looking for all active agents (usually involves a ping of the agents)..Kiss AgentsRemove agents from the DDoS attack network.Add Victim IP AddressAdd a new victim IP address to the list of addresses for agents to attack.Download UpgradesInstructs the handler to download an upgrade package, usually an executable file that can be uploaded from a web location.Set IP Address SpoofingInstructs the handler to turn IP Spoofing on in the agents. This allows the attacker to set the spoofed IP address.Set Attack TimeInstructs the handler to set a time when it should communicate to the agents to begin the attack.Set Attack DurationInstructs the handler to set a time when it should communicate to the agents to end the attack.BufferSizeSet the buffer size for packets sent during a flood attack.InfoReceive Print information (some type of help/command listing) Table 2: Agent Commands CommandDescriptionTurn OnInstructs the agent to turn on and wait for other commands.Turn OffInstructs the agent to shut down. If the agent was in the process of attacking or actively polling the network looking for handler/IRC channels this command stops the agent from continuing this action.Initiate AttackThis command instructs the agent to launch an attack against a specified target.Download UpgradesThis command instructs the agent to download an upgrade package, usually an executable file that can be uploaded from a web location.Set IP Address SpoofingThis allows the attacker to set the IP address to be used for spoofing. Set Attack TimeInstructs Agent with time to begin attack.Set Attack DurationInstructs Agent with time to end attack.Set Packet SizeInstructs the Agent to set the number of bytes in each attacking packet.InfoReceive Print information (some type of help/command listing) Examples of DDoS Attack Tools There are a wide variety of DDoS attack tools available today. Examples of many some common DDoS attack tools are presented described briefly and categorized below. These tools are often taken by attackers and modified slightly so there are many derivative DDoS attacks that are created from the earlier tools and the core functionalitytechniquecore tools. Agent-Handler Attack Tools Trin00 [3, 25] is credited with being the first DDoS attack tool to be widely distributed and used. Trin00 uses the agent-handler attack architecture, and is a bandwidth depletion attack tool using UDP flood attacks. Early versions of trin00 appear to not support IP source address spoofing. TTypically, the trin00 agent gets installed on a system that suffers from remote buffer overrun exploitation [25]. This bug in the software allows an attacker to remotely compile and run the agent installation within the secondary victims system buffer. Early versions of trin00 were found on the Solaris 2.5.1 and Red Hat Linux 6.0 operating systems [25]. The trin00 software is typically set up to communicate with TCP between the attackers client and the handler systems, and UDP between the handler and agent systems [25]. The trin00 software uses symmetric-key encrypted communication between client and handler and handler and agents. Tribe Flood Network is a DDoS attack tool that provides the attacker with the ability to wage both bandwidth depletion and resource depletion attacks. The TFN tool provides for UDP and ICMP flooding, as well as TCP SYN, and Smurf attacks [27]. TFN setup has been witnessed by buffer overflow [28]. In the TFN attack tool, the agents and handlers communicate with ICMP_ECHO_REPLY packets. These packets are harder to detect than UDP traffic and have the added ability of being able to pass through firewalls [27]. The TFN attack tool has been discovered on both Red Hat Linux 6.0 and Solaris 2.x operating systems. The TFN tool offers no encryption between agents and handlers or between handlers and clients [28]. Tribe Flood Network 2000 (TFN2K) is a DDoS attack tool based on the TFN architecture. The TFN2K attack tool adds encrypted messaging between all of the attack components [27]. In addition, it provides the handlers and agents with the ability to communicate with ICMP, UDP, or TCP [27]. There is also the option for random communication protocol selection. Stacheldraht, German for barbed wire, is a DDoS attack tool based on earlier versions of TFN. Like TFN, it includes ICMP flood, UDP flood, and TCP SYN attack options [29]. It also has the ability to perform updates on the agents automatically [29]. This means that the attacker can provide the installation file on an anonymous server and when each agent system turns on (or logs on to the Internet), the agent will automatically look for updates and install them. Stacheldraht also provides a secure telnet connection via symmetric key encryption between the attacker and the handler systems [29]. This prevents system administrators from intercepting this traffic and identifying it. Shaft is a derivative of the trin00 tool. It uses UDP communication between handlers and agents. The attacker communicates with the handlers via a telnet connection. Shaft provides UDP, ICMP, and TCP flooding attack options. The attacks can be run individually, or they can be combined to form one attack with UDP/TCP/ICMP flooding. Shaft provides statistics on the flood attack. These statistics are useful to the attacker to know when the victim system is completely down and allows the attacker to know when to stop adding agent zombie machines to the DDoS attack [30]. IRC-based DDoS Attack Tools IRC-based DDoS attack tools were developed after the agent-handler attack tools. Hence, many IRC-based DDoS attack tools are more sophisticated in that they include a wide variety of attack characteristics found in many of the agent-handler attack tools. Trinity is one such IRC-Based DDoS attack tool. Trinity has a wide variety of attack options including UDP, TCP SYN, TCP ACK, and TCP NUL packet floods as well as TCP fragment floods, TCP RST packet floods, TCP random flag packet floods, and TCP established floods. It has the ability to randomize all 32 bits of the source IP address [31]. Trinity simply adds a new set ofalso supports generating TCP flood packets with random TCP control flags set to the protocol disruption it will support. This provides Trinity with a wider set of TCP based attacks. Knight is an IRC-based DDoS attack tool that was first reported in July 2001 [31]. The Knight DDoS attack tool provides SYN attacks, UDP Flood attacks, and an urgent pointer flooder [32]. The Knight tool is typically installed by using a Trojan horse program called Back Orifice [31]. Knight is designed to run on Windows operating systems. Kaiten is another IRC-based DDoS attack tool. It is based on Knight, and was first reported in August of 2001 [19]. Kaiten supports a variety of attacking features. It includes code for UDP and TCP flooding attacks, for SYN attacks, and a PUSH + ACK attack [33]. Kaiten also randomizes the 32 bits of its source address. 6.3 Other Attack Tools Many more agent-handler and IRC-based DDoS attack tools and derivatives exist that can be categorized by the DDoS taxonomy described in this paper. These tools are formed using a combination of the DDoS attack taxonomy and DDoS attack tool software characteristics. Most notably, newer DDoS attack tools seem to be combining multiple attack features enabling the attacker to wage a variety of different types of attacks from the same DDoS agents. 7 Taxonomy of DDoS Countermeasures There are currently a number of proposals and partial solutions available today for mitigating the effects of a DDoS attack. Many of these solutions and ideas assist in preventing certain aspects of a DDoS attack. However, there is no comprehensive method solution to protect against all known forms of DDoS attacks. Also, many derivative DDoS attacks are continually being developed by attackers to bypass each new countermeasure employed. ThisMore research is needed to develop more effective and encompassing countermeasures and solutions is the area where future research is needed. , Tand the purpose forof this papers attempt is to shedassist in understanding on the nature and scope of DDoS attack networks, attack techniques, and software attack tools, to aid in developing better preventive, defensive and forensic methods. We propose a preliminary A ttaxonomy of DDoS Countermeasures is presented in Figure 8. There are three essential components to DDoS countermeasures. There is the component for preventing the DDoS attack which includes preventing secondary victims and detecting and neutralizing handlers. There is the component for dealing with a DDoS attack while it is in progress, including detecting or /preventing the attack, mitigating or /stopping the attack, and deflecting the attack. Lastly, there is the post-attack component which involves network forensics. 7.1 Prevent Secondary Victims Individual Users. One of the best methods to prevent DDoS attacks is for the secondary victim systems to prevent themselves from participating in the attack. This requires a heightened awareness of security issues and prevention techniques from all Internet users. If attackers are unable to break into and make use of secondary victim systems, then the attackers will have no DDoS attack network from which to launch their DDoS attacks.  In order for secondary victims to not become infected with the DDoS agent software, users of these systems must continually monitor their own security. They must check to make sure that no agent programs have been installed on their systems and make surethat they are not indirectly sending DDoS agent traffic into the network. The task of having all possible secondary victims implement measures to prevent themselves from becoming part of a DDoS attack is quite daunting. The Internet is so de-centralized, and since there are so many different hardware and software platforms, it is quite difficult for typical users to implement the right protective measures. Typically this would include installing anti-virus and anti-Trojan software and keeping these up to date. Also, all software patches for discovered vulnerabilities must be installed. In order to successfully do this, the end users must have the resources to afford protective measures and the knowledge to choose the right security protections. Additionally, potential secondary victims must try to detect if they are participating in a DDoS attack, and if so, they need to know how to stop it. Since Tthese tasks can be viewed as daunting for the average web-surfer, . Rrecent work has proposed built-in mechanisms in the core hardware and software of computing systems that can provide defenses against malicious code insertion, for example through exploiting buffer overflow violationsulnerabilites [34]. This can significantly reduce the probability of a system being compromised as a secondary victim forin setting up a DDoS attack network. Network Service Providers. One strategy currently being discussed is for providers and network administrators to add dynamic pricing to their network usage, to encourage secondary victims to become more active in preventing themselves from becoming part of a DDoS attack. If providers chose to charge differently for the use of different resources, they could charge for access to certain services within their networks. This would allow the providers to only allow legitimate customers on to their networks. This system would make it easier to prevent attackers from entering the network [35]. By altering the pricing of services, secondary victims who would be charged for accessing the Internet may become more conscious of the traffic they send into the network and hence may do a better job of policing themselves to verify that they are not participating in a DDoS attack. 7.2 Detect and Neutralize Handlers One important method for stopping DDoS attacks is to detect and neutralize handlers. Since the agent-handler DDoS attack tools require the handler as an intermediary for the attacker to initiate attacks, finding and stopping the handlers is a quick method to ending disrupt the DDoS attack network. This can possibly be done by studying the communication protocols and traffic patterns between handlers and clients or handlers and agents in order to identify network nodes that might be infected with a handler. Also, there are usually far fewer DDoS handlers deployed than there are agents, so shutting downneutralizing a few handlers can possibly render multiple agents useless, thus . Since agents form the core of the attackers ability to wage an attack, neutralizing the handlers to prevent the attacker from using them is an effective strategy to thwarting DDoS attacks. 7.3 Detect Potential Attacks Egress Filtering. One method for detecting potential attacks is to use egress filtering. Egress filtering refers to the practice of scanning the packet headers of IP packets leaving a network (egress packets) and checking to see if they meet certain criteria. If the packets pass the criteria, they are routed outside of the sub-network from which they originated. If the filter criteria are not met, the packets will not be sent to the intended target. Since one of the features of DDoS attacks is spoofed IP addresses, there is a good probability that the spoofed source addresses of DDoS attack packets will not represent the a valid source addresses of a valid users onof the a specific sub-network. If the network administrator places a firewall or packet sniffer in the sub-network that filters out any traffic without an originating IP address from this subnet, many DDoS packets with spoofed IP source addresses will be discarded, and hence neutralized. MIB Statistics. Another method currently being looked at to identify when a DDoS attack is occurring uses the MIB (Management Information Base (MIB) data from routers. The MIB data from a router includes parameters that indicate different packet and routing statistics. Current research has focused on identifying statistical patterns in different parameters during a DDoS attack [36]. Current research as outlined in [36]It looks promising for possibly mapping ICMP, UDP, and TCP packet statistical abnormalities with to specific DDoS attacks. Accurate statistical models based on the MIB parameters from routers are still being studied to understand how accurately they can monitor DDoS attack traffic and predict when a DDoS attack is happening. Work in this area could provide important information and methods for identifying when a DDoS attack is happening starting and how to filter or adjust the network to compensate for the attacking traffic. 7.3 Mitigatinge or Stop the Effects of DDoS Attacks Load Balancing. For network providers, there are a number of techniques used to mitigate the effects of a DDoS attack. Providers can increase bandwidth on critical connections to prevent them from going down in the event of an attack. Replicating servers can help provide additional failsafe protection in the event some go down during a DDoS attack. Balancing the load to each server in a multiple-server architecture can improve both normal performance as well as mitigate the effect of a DDoS attack. Throttling. One proposed method to prevent servers from going down is to use Max-min Fair server-centric router throttles [37]. This method sets up routers that access a server with logic to adjust (throttle) incoming traffic to levels that will be safe for the server to process. This will prevent flood damage to servers. Additionally, this method can be extended to throttle DDoS attacking traffic versus legitimate user traffic for better results. This method is still in the experimental stage, however similar techniques to throttling are being implemented by network operators. The difficulty with implementing throttling is that it is still hard to decipher legitimate traffic from malicious traffic. In the process of throttling, legitimate traffic may sometimes be dropped or delayed and malicious traffic may be allowed to pass to the servers. Drop Requests. Another method is to simply drop requests when the load increases. This can be done by the router or the server. Alternatively, the requester may be induced to drop the request by making the requester system solve a hard puzzle that takes a lot of compute power or memory space, before continuing with the request. This causes the users of zombie systems to detect performance degradation, and could possibly stop their participation in sending DDoS attack traffic. 7.4 Deflect Attacks Honeypots. Another area being researched is Honeypots. Honeypots are systems that are set up with limited security to be an enticement for an attacker so that the attacker will attack the Honeypot and not the actual system. Honeypots typically have value not only in deflecting attacks from hitting the systems they are protecting, but also in serving as a means for gaining information about attackers by storing a record of their activity and learning what types of attacks and software tools the attacker is using. Current research discusses the use of honeypots that mimic all aspects of a legitimate network (such as web servers, mail servers, clients, etc.) in order to attract potential DDoS attackers [38]. The goal of this type of honeypot is to attract a DDoS attacker and get him to install either handler or agent code within the honeypot. This prevents some legitimate systems from getting compromised and allows the honeypot owner to track the handler or agent behavior and better understand how to defend against future DDoS installation attacks. Post-Attack Forensics Traffic Pattern AnalysisPacket TracebackTraffic Pattern Analysis. If traffic pattern data is stored during a DDoS attack, this data can be analyzed post-attack to look for specific characteristics within the attacking traffic. This characteristic data can be used for updating load balancing and throttling countermeasures to increase their efficiency and protection ability. Additionally, DDoS attack traffic patterns can help network administrators develop new filtering techniques for preventing DDoS attack traffic from entering or leaving their networks. Tracing the AttackerPacket Traceback. Another set of thetechniquesories to deal with preventing DDoS attacks and for assisting in identifying the attackers deals with using packet traces [39]. The concept of tracing is that Internet traffic could be traced back to the true source (rather than that of a potentially spoofed source IP address). This allows back tracing the attackers traffic and possibly identifying the attacker. Additionally, when the attacker sends vastly different types of attacking traffic, this method assists in providing the victim system with information that might help develop filters to block the attack. A model for developing a Network Traffic Tracking System that would identify and track user traffic throughout a network has been proposed [40]. This type of system has been identified as being very successful within a closed network environment, such as a corporate network where internal client systems can be fully managed by a central network administrator who can track individual end-user actions. This method begins to break down as the network becomes widely distributed [40]. Traffic tracking on the Internet or large extranets would beis difficult to implement. The cost of setting up such as system would be daunting, and sSince different network administrators control different sections of the Internet, it would be difficult to determine who would be responsible for monitoring the traffic. Also, the loss of privacy on the Internet would meet with an unfavorable response from most network users. Event Logs. Network administrators can keep logs of the DDoS attack information in order to do a forensic analysis and in order to assist law enforcement in the event the attacker does severe financial damage. Using both Honeypots as well as other network equipment such as firewalls, packet sniffers, and server logs, providers can store all the events that occurred during the setup and execution of the attack. This will allow the network administrators to discover what type of DDoS attack (or combination of attacks) was used. 8 Conclusions and SummarySummary and Conclusions A number of conclusions can be drawn from understanding DDoS attacks and from looking atlooking at some of the current defensive measures that are currently being researched or implemented. Importance of Understanding and Preventing DDoS Attacks. DDoS attacks are quite advanced methods of attacking a network system to make it unusable to legitimate network users. These attacks are an annoyance at a minimum, and if they are against a critical system, they can be quite severely damaging. Loss of network resources costs money, delays work, and cuts -off communication between network users. The negative effects of a DDoS attack make it important that solutions and security measures be developed to prevent these types of attacks. Detecting, preventing, and mitigating DDoS attacks is important for national security. National Security. The Internet is an important component of the United States communications infrastructure. In the same manner that the Internet has become more user friendly over the last 10 years, and more individuals, businesses, and government agencies make use of it, so has hacking and disrupting network traffic. In a recent report to the US Senate (March 2000), the FBI highlighted that While remote cracking once required a fair amount of skill or computer knowledge, hackers can now download attack scripts and protocols from the World Wide Web and launch them against victim sites. Thus while attack tools have become more sophisticated, they have also become easier to use. [41]. DDoS attacks are easy for attackers and script kiddies to obtain and the potential for other attacks like the October 20threcent attack against the 13 root servers is quite high. Finding methods for preventing and stopping DDoS attacks will be important for national security. Understanding DDoS attacks and tools is a first step towards this, and the main contribution of this paper. New Legal Implications. There are some also additional new legal issues that are being debated due to Internet attacks such as DDoS. Since victims of the attacks usually cannot trace back to the attacker, there is a question of who is liable for an attack, in termswhich other parties may be liable in terms of contributory negligence. is currently being debated. Since some DDoS attacks can be traced back to the secondary victims, can the secondary victim owners or corporations responsible for secondary victim computers be held liable for not preventing their system for being usedparticipating in an attack? Are software vendors liable for vulnerabilities in their code? Are hardware vendors responsible for not providing defenses against malicious intrusion and use of the machines they sell by remote parties other than the owners? Do network providers have an obligation to prevent their networks from allowing secondary victims to send DDoS packet traffic into the network? Should software, hardware, and network suppliers and operators be required to consider providing owners or laws require best effort defensive practices from software, hardware, and network suppliers and operators? Cost of Prevention. One of the most important issues that will impact how defenses against DDoS attacks are deployed will be the cost of solutions and preventive measures. If DDoS prevention strategies cost companies and individuals huge sums of money than these systems will not see quick or wide scale deployment. It will take time before industry and government agencies buy new products. Additionally, as each new product is developed, the attackers build methods to counter the specific security measures. This leads to a cyclical pattern of new security systems being deployed, that are capable of defending against all currently identified attacks. As new security is developed, the attackers developand new new attacks being designed, which in turn lead to new security fixes. This pattern can get incredibly costly for companies and institutions that are trying to keep up with security measures.. For the DDoS attacks, what is desirable is a more comprehensive solution that can defend against both known attacks and new variants. In this paper, we tried to scope the DDoS problem by describing taxonomies of DDoS attack networks, attack techniques and attack tools. This may help in facilitating research into more comprehensive, multi-tiered solutions, rather than just designing specific countermeasures for a specific attack. For future work, we plan to write a simulator that allows accurate and parameterizable simulation of DDoS attacks. We also plan to develop analytical models of DDoS behavior. These simulations and modeling techniques can then be used to investigate new countermeasures and more comprehensive solutions. Summary. ThereIn summary, there are many DDoS attack tools that are currently available to the hacking community. These tools are easy to implement and can have disastrous effects against networks. There are many new methods of preventing these attacks from succeeding, however many of these new methods are still being developed and evaluated. It will be essential that as the Internet and Internet usage expand, that solutions and countermeasures to DDoS attacks be verified and implemented. For future work, we plan to write a simulator that allows accurate and parameterized simulation of DDoS attacks. This can then be used to investigate new countermeasures and comprehensible solutions. 10 References [1] David Karig and Ruby Lee, Remote Denial of Service Attacks and Countermeasures, Princeton University Department of Electrical Engineering Technical Report CE-L2001-002, October 2001. [2] Lincoln Stein and John N. Stuart. The World Wide Web Security FAQ, Version 3.1.2, February 4, 2002.  HYPERLINK "http://www.w3.org/security/faq/" http://www.w3.org/security/faq/ (8 April 2003). [3] Paul J. Criscuolo. Distributed Denial of Service Trin00, Tribe Flood Network, Tribe Flood Network 2000, And Stacheldraht CIAC-2319. Department of Energy Computer Incident Advisory Capability (CIAC), UCRL-ID-136939, Rev. 1., Lawrence Livermore National Laboratory, February 14, 2000. [4] Yahoo on Trail of Site Hackers, Wired.com, February 8, 2000.  HYPERLINK "http://www.wired.com/news/business/0,1367,34221,00.html" http://www.wired.com/news/business/0,1367,34221,00.html (15 May 2003). [5] Powerful Attack Cripples Internet. Associated Press for Fox News 23 October 2002.  HYPERLINK "http://www.foxnews.com/story/0,2933,66438,00.html" http://www.foxnews.com/story/0,2933,66438,00.html. (9 April 2003). [6] Joseph Lo and Others. An IRC Tutorial, irchelp.com. 1997.  HYPERLINK "http://www.irchelp.org/irchelp/irctutorial.html#part1" http://www.irchelp.org/irchelp/irctutorial.html#part1. (8 April 2003). [7] Nicolas Pioch. A Short IRC Primer. Edition 1.2, January 1997.  HYPERLINK "http://www.irchelp.org/irchelp/ircprimer.html#DDC" http://www.irchelp.org/irchelp/ircprimer.html#DDC. (21 April 2003). [8] Kleinpaste, Karl, Mauri Haikola, and Carlo Kid. The Original IRC Manual. March 18, 1997.  HYPERLINK "http://www.user-com.undernet.org/documents/irc-manual.html#seen" http://www.user-com.undernet.org/documents/irc-manual.html#seen (21 April 2003). [9] Kevin J. Houle. Trends in Denial of Service Attack Technology. CERT Coordination Center, Carnegie Mellon Software Engineering Institute. October 2001.  HYPERLINK "http://www.nanog.org/mtg-0110/ppt/houle.ppt" www.nanog.org/mtg-0110/ppt/houle.ppt. (14 March 2003). [10] TFreak. smurf.c,  HYPERLINK "http://www.phreak.org" www.phreak.org. October 1997.  HYPERLINK "http://www.phreak.org/archives/exploits/denial/smurf.c" http://www.phreak.org/archives/exploits/denial/smurf.c (6 May 2003). [11] Federal Computer Incident Response Center (FedCIRC), Defense Tactics for Distributed Denial of Service Attacks. Federal Computer Incident Response Center. Washington, DC, 2000. [12] TFreak. fraggle.c,  HYPERLINK "http://www.phreak.org" www.phreak.org.  HYPERLINK "http://www.phreak.org/archives/exploits/denial/fraggle.c" http://www.phreak.org/archives/exploits/denial/fraggle.c (6 May 2003). [13] Martin, Michael J., Router Expert: Smurf/Fraggle Attack Defense Using SACLS, Networking Tips and Newsletters,  HYPERLINK "http://www.searchnetwork.techtarget.com" www.searchnetwork.techtarget.com. October 2002.  HYPERLINK "http://searchnetworking.techtarget.com/tip/1,289483,sid7_gci856112,00.html" http://searchnetworking.techtarget.com/tip/1,289483,sid7_gci856112,00.html (6 May 2003). [14] Chen, Y. W. Study on the Prevention of SYN Flooding by Using Traffic Policing, Network Operations and Management Symposium, 2000. NOMS 2000. 2000 IEEE/IFIP, pp. 593-604. 2000. [15] RFC 793, Transmission Control Protocol DARPA Internet Program Protocol Specification. Arlington, Virginia. September 1981. [16] Nmap Stealth Port Scanner Introduction, Insecure.org. August 2002.  HYPERLINK "http://www.insecure.org/nmap/" http://www.insecure.org/nmap/. (8 April 2003). [17] Nessus Documentation, Nessus. 2002.  HYPERLINK "http://www.nessus.org/" http://www.nessus.org/. (8 April 2003). [18] CVE (version 20020625), Common Vulnerabilities and Exposures. March 27, 2002.  HYPERLINK "http://cve.mitre.org/cve/" http://cve.mitre.org/cve/. (9 April 2003). [19] CERT Incident Note IN-2001-13. CERT Coordination Center, Carnegie Mellon Software Engineering Institute. November 27, 2001.  HYPERLINK "http://www.cert.org/advisories/CA-2001-20.html" http://www.cert.org/advisories/CA-2001-20.html. (14 March 2003). [20] Colon E. Pelaez and John Bowles, Computer Viruses, System Theory, 1991, Twenty-Third Southeastern Symposium, pp. 513-517, Mar 1999. [21] Crispin Cowan, Perry Wagle, Calton Pu, Steve Beattie, and Jonathan Walpole, Buffer Overflows: Attacks and Defenses for the Vulnerability of the Decade, DARPA Information Survivability Conference and Exposition, 2000. Vol. 2, pp. 119-129, 2000. [22] Microsoft. How to Write Active X Controls for Microsoft Windows CE2.1, Microsoft Corporation. June 1999.  HYPERLINK "http://msdn.microsoft.com/library/default.asp?url=/library/en-us/dnce21/html/activexce.asp" http://msdn.microsoft.com/library/default.asp?url=/library/en-us/dnce21/html/activexce.asp. (5 April 2003). [23]  Executing arbitrary commands using ActiveX  codebase= parameter , EdenSoft"!, 2 April 2002.  HYPERLINK "http://www.edensoft.com/exploit.html" http://www.edensoft.com/exploit.html. (9 April 2003). [24] Dancho Danchev. The Complete Windows Trojans Paper, BCVG Network Security. October 22, 2002.  HYPERLINK "http://www.ebcvg.com/articles.php?id=91" http://www.ebcvg.com/articles.php?id=91. (9 April 2003). [25] David Dittrich. The DoS Projects trinoo Distributed Denial of Service Attack Tool. University of Washington, October 21, 1999.  HYPERLINK "http://staff.washington.edu/dittrich/misc/trinoo.analysis.txt" \t "_parent" http://staff.washington.edu/dittrich/misc/trinoo.analysis.txt (8 April 2003). [26] Alex Noordergraff.  How Hackers Do It: Tricks, Tools, and Techniques , Sun BluePrints"! OnLine. Part No.: 816-4816-10, Revision 1.0. May 2002.  HYPERLINK "http://www.sun.com/solutions/blueprints/0502/816-4816-10.pdf" http://www.sun.com/solutions/blueprints/0502/816-4816-10.pdf. (8 April 2003). [27] Frank Kargl, Joern Maier, and Michael Weber, Protecting Web Servers from Distributed Denial of Service Attacks, Proceedings of the Tenth International Conference on World Wide Web, April 2001. [28] David Dittrich. The Tribe Flood Network Distributed Denial of Service Attack Tool. University of Washington, October 21, 1999.  HYPERLINK "http://staff.washington.edu/dittrich/misc/trinoo.analysis.txt" \t "_parent" http://staff.washington.edu/dittrich/misc/trinoo.analysis.txt (8 April 2003). [29] David Dittrich. The stacheldraht Distributed Denial of Service Attack Tool. University of Washington, December 31, 1999.  HYPERLINK "http://staff.washington.edu/dittrich/misc/stacheldraht.analysis.txt" \t "_parent" http://staff.washington.edu/dittrich/misc/stacheldraht.analysis.txt (8 April 2003). [30] Sven Dietrich, Neil Long, and David Dittrich, Analyzing Distributed Denial of Service Tools: The Shaft Case, USENIX Association, Proceedings of the 14th Systems Administration Conference (LISA 2000), New Orleans, Louisiana, December 2000. [31] CERT Advisory CA-2001-20 Continuing Threats to Home Users, CERT Coordination Center, Carnegie Mellon Software Engineering Institute. July 23, 2001.  HYPERLINK "http://www.cert.org/advisories/CA-2001-20.html" http://www.cert.org/advisories/CA-2001-20.html. (14 March 2003). [32] Bysin. Knight.c Sourcecode, PacketStormSecurity.nl. July 11, 2001.  HYPERLINK "http://packetstormsecurity.nl/distributed/knight.c" http://packetstormsecurity.nl/distributed/knight.c. (18 March 2003). [33] Contem. kaiten.c Sourcecode, PacketStormSecurity.nl. December 2001.  HYPERLINK "http://packetstormsecurity.nl/irc/indexsize.shtml" http://packetstormsecurity.nl/irc/indexsize.shtml. (8 April 2003). [34] Ruby Lee, David Karig, Patrick McGregor and Zhijie Shi, Enlisting Hardware Architecture to Thwart Malicious Code Injection, Proceedings of the International Conference on Security in Pervasive Computing (SPC-2003), pp. N/A, March 2003. [35] David Mankins, Rajesh Krishnan, Ceilyn Boyd, John Zao, and Michael Frentz, Mitigating Distributed Denial of Service Attacks with Dynamic Resource Pricing, Computer Security Applications Conference, 2001. ACSAC 2001. Proceedings 17th Annual, pp. 411-421, 2001. [36] Joao B. D. Cabrera, Lundy Lewis, Xinzhou Qin, Wenke Lee, Ravi K. Prasanth, B. Ravichandran, and Ramon K. Mehra, Proactive Detection of Distributed Denial of Service Attacks Using MIB Traffic Variables A Feasibility Study, Integrated Network Management Proceedings, pp. 609-622, 2001. [37] David K. Yau, John C. S. Lui, and Feng Liang, Defending Against Distributed Denial of Service Attacks with Max-min Fair Server-centric Router Throttles, Quality of Service, 2002 Tenth IEEE International Workshop, pp. 35-44, 2002. [38] Nathalie Weiler. Honeypots for Distributed Denial of Service, Enabling Technologies: Infrastructure for Collaborative Enterprises, 2002. WET ICE 2002. Proceedings. Eleventh IEEE International Workshops, 2002. pp. 109-114. 2002. [39] Vern Paxon, An Analysis of Using Reflectors for Distributed Denial of Service Attacks, ACM SIGCOMM Computer Communication Review, Vol. 31, Iss. 3, July 2001. [40] Thomas E. Daniels and Eugene H. Spafford, Network Traffic Tracking Systems: Folly in the Large?, Proceedings of the 2000 Workshop on New Security Paradigms, February 2001. [41] Freeh, Louis J. Statement for the Record of Louis J. Freeh, Director Federal Bureau of Investigation on Cybercrime Before the Senate Committee on Judiciary Subcommittee for the Technology, Terrorism, and Government Information. Washington, D.C., March 28, 2000. PAGE 16  EMBED Word.Picture.8   EMBED Word.Picture.8  This work was supported in part by the NSF under grant {withheld for blind review}  EMBED Word.Picture.8   EMBED Word.Picture.8   EMBED Word.Picture.8   EMBED Word.Picture.8   EMBED Word.Picture.8  -67[\wX { ~ qryzȼֵuj]NuHhu<CJPJQJHhuCJEHH*Hhu6CJHhuCJH*HhuB*CJph HhuHhu]HhuCJWHhuCJ cHdhbuWmscHdhbu5WcHdhbuWcHdhbuCJHhu5CJ$Hhbu5CJ$5CJ$-[\yPT$ C$Eƀu]^a$H C$Eƀu $ a$ FFIX nK$ C$Eƀua$DC$Eƀu xzggggg^$ a$K$ C$Eƀua$K$ C$Eƀua$ )!*!˸έ՗ՎxoaXQo cHdhu]cHdhuCJWcHdhuCJcHdhuOJQJcHdhuOJQJcHdhbuHhuCJHhuCJH*Hhu0JCJHhu0JCJjCJUHhuCJCJ jCJUHhuCJHhu6CJHhuCJH*]HhuCJ] )!*!9!:!U&&z*M-<0$ a$$ ]^a$$ a$K$ C$Eƀua$ *!9!" "$N&O&T&U&&&&w''''''(((((((q*t*z*|*;0<0Ʒ鬡vkXUCJ%jCJUcHdhumHnHu0JCJcHdhu jCJUcHdhujCJUcHdhuCJH*]cHdhuCJ]cHdhcuCJ]cHdhu<CJPJQJcHdhuCJEHH*cHdhu6CJcHdhuCJH*cHdhuCJcHdhuB*CJcHdhuph<0=0U000000008 8 8*8I8J888::;;<<H>K>??AAiBjBkByBBú󱛱{mbW5CJcHdhsu5CJcHdhuB*CJcHdhuph(j5CJUcHdhsumHnHuHhuCJPJHhuCJH*Hhu5CJHhuCJHhuCJHhuCJHhuB*CJphHhuB*CJphHhu5CJjCJUmHnHu"<0T0U000006gK$ C$Eƀua$K$ C$Eƀua$6 8 8*8+8<AiBkBBBg^^^$ a$K$ C$Eƀua$K$ C$Eƀua$ BBBBBBB C C$C&C'CCCIJ$J%JJJ~LLsMvMjNkNlN&P)PQQ[SbS=T>TVTVV¯¦›››ˆu››jgcgc5CJCJCJPJcHdhu%jCJUcHdhumHnHu%jCJUcHdhÄumHnHuCJH*cHdhuCJcHdhru%jCJUcHdhmumHnHuCJcHdhuB*CJcHdhxuphB*CJcHdhwuphB*CJcHdhuph5CJcHdhu%B C C%C&CHIIJJjN[S=T>TVTWTVV$ ha$$ a$$ a$VVVXXXXZM$ & F Eƀbu..a$$ a$M$ & F Eƀbu.a$VVoXuX}XXXXX ZZ!Z#Z%Z)Z+Z-ZLZMZbZoZwZZZZZZZN^Q^x_y_``0c3cwcccccdgeeggg9i=ij j_jnjCk𴫽ƕj5CJUmHnHuCJcHdhuHhuCJCJH*HhuCJCJcHdhuCJcHdhuHhuCJ5CJcHdhu5CJHhuCJCJcHdhuCJjCJUmHnHu5XXZZR\U^|_``/bccc$ a$K$ C$Eƀua$ cddegg^j_jmm$a$ $ !a$$ a$M$ & F Eƀbu..a$ CkGkblflmnnoppppppppp:q;qWq[qqq_usuvvwwwHxaxbxyyyyyyðqcHhτuB*CJphHhuB*CJphB*CJcHdhuphHhuB*CJphB*CJcHdhuph B*CJph%jCJUcHdhτumHnHujCJUmHnHuj5CJUmHnHuHhuCJCJcHdhuCJH*5CJCJCJH*&mnnnnooq`uauZM$ & F Eƀbu..a$$ a$M$ & F Eƀbu.a$ auwyyyzz}}SG$C$Eƀua$$ a$$a$G$C$Eƀτua$$`a$$a$yyz.z/z{{}}}%}=}R}T}}}%~&~*~O~~~~~\^stu#59<@ABK䷮~ulclcHhuCJCJcHdhuHhuCJCJcHdhu(j5CJUcHdhڄumHnHuCJcHdhuCJcHdhuHhuCJCJcHdhuHhu5CJ5CJcHdhuHhuB*CJphCJ B*CJph5CJB*CJcHdhuph&}S}T}]^stm PQrs'(3 $ C$a$ $ !a$$ a$M$ & F Eƀbua$KLMSTbilnЁցځ QUWYqr|ńƄ ;@·Ꚍ{pllCJH*0JCJcHdhu jCJUcHdhujCJUcHdhuCJcHdhuHhuCJHh݄u5CJ5CJcHdh݄u5CJHhuCJHhuCJCJcHdhuCJcHdhuCJHhuCJCJcHdhu'ȇԇ؇ %(HAEdh4K-1яԏҐߐZ[\lx[_efj~~CJcHdhuHhuCJjCJUmHnHu6CJHh uCJ 56CJ CJOJQJCJH*5CJHhuCJcHdh uCJcHdh uHh uCJHh uCJCJHh uCJCJcHdh u134[\wxHII$`a$ $ !a$$a$K$ & FC$Eƀbu..a$$ a$jIX9: <+3;eilvz qy{ ٥ݥQ[y}ިߨHhu5CJ5CJcHdhuHhu5CJCJcHdhuHhuCJHhuCJHhuCJCJcHdhuCJH*6CJHhuCJCJcHdhuCJcHdhu5CJCJ3 ިNO$ & F C$Eƀua$ $ !a$$ a$M$ & F Eƀbu..a$ިߨggggK$ C$Eƀua$K$ C$Eƀua$ .J©ũƩǩǼǼҬulcXODcHh؃u5CJHhuCJ5CJcHdhuHh؃uCJHhuCJHhuCJcHdhu!Hhu5CJcHdhuHhu5CJHhu5CJHhuCJW؃u\HhuCJ\HhكuCJ\Hh؃uCJ\!Hh؃u5CJcHdhu!Hhu5CJcHdhuƩǩggK$ C$Eƀua$K$ C$Eƀ؃ua$ǩgK$ C$Eƀua$K$ C$Eƀua$ԭe\QQ $ !a$$ a$M$ & F Eƀbu.a$K$ C$Eƀ؃ua$ӭԭ diJgqt{ӶԶzj_HhuCJ\HhuCJWu\CJcHdhuHhuCJCJWCJcHdhu5CJcHdhuCJcHdhuHhuCJ5CJCJCJcHdhu5CJcHdhuHhuCJHhuCJHh؃uCJHh؃uCJcHdhu% OM$ & F Eƀbu.a$ $ !a$$ a$M$ & F Eƀbu.a$ $ $Ifa$$ a$$ a$F $Eƀbua$öZ` $Ifk$$Ifl40D%(04 laԶ[bc ;<>ٹ*28iJ_(FGоٵ٬٨٨٢٢ٙ٬ه~ulCJcHdhuHhuCJCJcHdhu WHhuCJ\]HhuCJ CJ\]5CJCJcHdhuHhuCJCJcHdhuHhuCJHhuCJCJHhuCJHhuCJ\HhuCJWu\*Z[cFGW $Ifi$$Ifl0D%(04 laW˸=>JvI??I?? $Ifi$$Ifl0D%(04 laK $EƀjuFIfvwعٹfggh|ܻݻ88  $Ifi$$Ifl0D%(04 laݻ$%*hijyll $ $Ifa$$ a$$ a$i$$Ifl0D%(04 la $If ܼ $Ifk$$Ifl40D%(04 laܼݼ½&ž T~d~ $ $Ifa$ $Ifi$$Ifl0D%(04 laJK_&'(h~ $ h^ha$i$$Ifl0D%(04 la $If (FGeM$ & F Eƀbu.a$$ a$C Eƀbumqdh[_` tx{|}㯫㐂yuneuuyWB*CJcHdhuphB*CJH*ph B*CJphCJH*CJcHdhuHhuB*CJph B*CJphHhuCJHh u5CJ5CJHh!uCJHhuCJHh"uCJcHdhuHh"uCJCJcHdh"uCJHh"uCJcHdhuHhuCJ"|Wv $ `a$$ a$K$ C$Eƀ ua$ QUpxrvjnvwAM,0;Sl[_%)ǾCJcHdhuHhuCJCJcHdhuHhuCJHhuCJCJcHdhuCJcHdh uHhu5CJHh#uCJCJcHdh#u5CJHhuCJ B*CJphCJCJH*5ge\\SF $ `a$$`a$$ a$K$ C$Eƀua$M$ & F Eƀbu.a$)ghlpYnr®~qhh_OFHh'uCJHhuCJcHdh&uHh%uCJCJcHdh%ujCJUmHnHuB*CJcHdhuphB*CJcHdh!uph'B*CJWu\cHdh!uph'B*CJWu\cHdhuph'B*CJWu\cHdhuphCJcHdh!uB*CJH*ph B*CJphB*CJcHdhuphCJQ()K$ C$Eƀ'ua$$ a$ $ ^a$$ a$  $.159BQTqx6COljĻĻԫԫԻԻԢԻԐԍ{ririHh)uCJHh(uCJHh'uCJCJcHdhuCJCJcHdhuHh)uCJHh*uCJHhuCJcHdh*uHh(uCJHhuCJcHdh(uHhuCJHh'uCJHhuCJcHdh'uHh&uCJ%jkv')Y  %-2SUlt`Ļээф{ri`WrCJcHdh5uHh4uCJHh.uCJCJcHdhuCJcHdhuHh-uCJCJcHdh-uHhuCJ%jCJUcHdh+umHnHuHhuCJCJcHdhuCJcHdhu5CJCJHh*uCJcHdh,uHh*uCJHh)uCJHh,uCJ")GHTTK$ C$Eƀua$ $ C$a$$ a$K$ C$Eƀ̃ua$=@Mg #+Wdpw~ƻxHh8uCJ\!Hh#uCJ\cHdh8uHh$uCJ\Hh7uCJ\!Hh#uCJ\cHdh7uHh#uCJ\Hh#u5CJ5CJCJH*CJcHdh1uHh1uCJCJcHdh0uHh0uCJCJ.fgrs^^^^K$ C$Eƀ#ua$$ a$K$ C$Eƀ0ua$ 3Zqw !#$3457=?@WXYZk±{ri`W`WNHhuCJHh@uCJCJcHdh@uCJcHdhuHh;uCJHhuCJcHdh;uCJcHdh;uCJ5CJHh#u5CJHh'uCJ\!Hh'uCJ\cHdh9u!Hh&uCJ\cHdh9u!Hh$uCJ\cHdh9u!Hh#uCJ\cHdh9uHh9uCJ\YZNOKLK$ C$Eƀua$$ a$ k`eh%(1NO^LWxof]f]HhIuCJHhHuCJHhFuCJHhEuCJHhEuCJWEu!HhCu5CJWCu\HhCuCJHhCu5CJ5CJcHdhCu5CJHhBuCJCJcHdhBuHhuCJCJcHdhuCJH*HhAuCJCJcHdhAuCJ$\M$ & F Eƀbu.a$$ a$K$ C$EƀCua$ 6GMlnznr),2BETWabfgj̖̽ЂyppgЂyCJcHdhQuCJcHdhOuHhPuCJCJcHdhPuHhNu5CJ5CJcHdhNuHhOu5CJ!Hh.u5CJcHdhOu5CJcHdh.uCJH*5CJCJCJWEuHhKuCJHhLuCJHhIuCJHhHuCJ(34M N   > A f  SG$C$Eƀoua$ $ `a$$ a$+/4AN P g ~         - < > ? A y { W ] f    f  zzjHhuCJWu\HhVuCJCJcHdhVu5CJcHdhuCJcHdhuHhuCJCJcHdhUuHhUuCJCJcHdhTuHh.u5CJ5CJcHdh.uCJcHdhSu5CJHhRuCJCJcHdhRuCJH*CJ)    w{(-2=NW祚珌zqh_VMVCJcHdhZuCJcHdh[uHhƒuCJHh.uCJCJcHdhƒuHhXuCJCJcHdhXuCJ5CJcHdhƒuHhXuCJ\HhuCJ\!CJH*Wu\cHdhWuCJWu\cHdhWuCJH*Wu\HhWuCJ\CJWu\CJWu\cHdhu:>Xv )EIS`p)QT<FPżמzzzqh_OHhȃuCJcHdh]uHh^uCJHh]uCJHhȃuCJHhǃuCJHh0uCJCJcHdhŃuCJcHdh0uHhŃuCJCJcHdh/uHhăuCJCJCJcHdhÃuHhÃuCJHh/uCJHh[uCJHh/uCJcHdh[uHhÃuCJcHdh[uPT]~Y   sORǷ״xof]f]TKHhbuCJCJcHdhbuHhauCJCJcHdhauCJcHdh`uHh`uCJHhguCJCJcHdhguCJcHdhfuHh_uCJ5CJcHdhɃu5CJCJHhɃuCJcHdh]uHhɃuCJcHdh^uHhɃuCJHhȃuCJcHdh]uHhȃuCJcHdh\uRSj}z678HUɷɮɥxoaL(HhɃuCJWɃucHdhsuCJWɃucHdhɃuHhʃuCJCJcHdhouHhsuCJHhruCJHhquCJHhouCJHhduCJHhiuCJHhhuCJHhluCJHhcuCJHhkuCJHhjuCJHhbuCJHhguCJHhpuCJS79  !"j#:$% &!'(( $ hh^ha$$h^ha$$C$a$$a$J$Eƀpu`a$UY,.u   _2 3 ` a b     !!⍉zpzez\T\CJWʃuHhʃuCJ0J>*B*CJphjiCJU jCJU6CJCJ\5CJCJHh1uCJcHdhnuHh1uCJcHdhouHh0uCJcHdhouHh0uCJcHdhuCJcHdhnuCJcHdhmuCJcHdhu(HhɃuCJWɃucHdhu !!!!@"A"B"y"z"""""$#%#&#W#X########'$($$$$$$$$i%j%%%%%%R&&&&&&& ' ':';'^'_'`'n'ܕ0J6>*CJj 6CJUj6CJUj CJUjCJUjACJUjCJUjCJU6CJ 0J>*CJj^CJU jCJU 6CJ]CJ7n'o''''''''(((()) )))))b)c)d)))*"*#*X*Y*Z*z*{*~******2+3++++~,,,,,,,,--D-J-R-S-w-ٱjCJUjGCJU0J6>*CJj>6CJUj CJU 0J6CJj$ 6CJU6CJ 0J>*CJj CJU jCJUCJj6CJU:()B++~,'--O.Z//0V234 6:895:n;e<=Y>/?"@.ASB@C$ hh^ha$ $ hh^ha$w-x-y-------!.".#.<.=.w....///E/F/////0011F1S1T1111022222333333354J4_4`444444]5^555550J>*B*CJphjCJUjCJUjCJUHhʃuCJjCJUjCJU6CJCJ 0J>*CJ jCJUjCJU=56 7:7<7777&8'8889999#:$:K:L:::::;;\;];; <<T<<<==@=A=B=p=q=====>>>E>F>>>>>>>>???@ 6CJ]jCJUjMCJUjCJU 6CJH*CJW˃uHh˃uCJ0J>*B*CJph 0J>*CJjCJU jCJU6CJCJ<@!@@AA(ABKBB:CC+DDDCE~EEEwFxFyFFFFFFFFFFFF G GDGEGFGjGkGGGGGGGGGGy HhmujHhmuU jUjoB CJUVaJ HhsujHhsuU0J>*jU jU0JmHnHu0J j0JU <CJPJ<CJCJW˃uHh˃uCJ 6CJH*6CJCJCJ]/@C3DDEFFFFFFFFFFFFF$a$h]h&`#$$a$J$hEƀbu.^ha$ $ hh^ha$FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFwGxGyGzG{G|G}G~GGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGHHHHHYHZHvHwHxHyHzH{H|HHHHHHGGHHHKHQHXHYHZH[HrHsHtHuH|H}HHHHHHHHHHHHHHHtoc\PjoB CJUVaJ Hh+ujHh+uU j9UjoB CJUVaJ HhڄujHhڄuU jNUjoB CJUVaJ HhÄujHhÄuU j8Uj@poB CJUVaJ jUCJHhuCJHheuCJjHhmuU j+UjoB CJUVaJHHHHHHHHHHHHHHHHHHHIIIIIIIII I IHHHHHHHHHIICJ jUjoB CJUVaJ HhτujHhτuUjHh+uU jU I I I IIIIIIIIII 1h/ =!"#h$% 1h/ =!"#$%@=~ E\겡 <7.L x[{po7aIؐ`$QE2-0@! F N; $h )5:0Ki530աqCKI!4ܷp؉h4jxhZg+X3[ֲr6:w*/<ݸb?~{:w ]~_b vyް2C5E(~|BZAPt(UJm}x{xJwU=w0p_nx'ܛ6\GCtmb(܂9՛;r==62k=/2@jC ʽcQ-OHg5WTt>1B}__w \l]|6Ȗѯͬ? p#pSZ>A(A} ~Oi{&{~[qx-!G=ɱvHc/mkIᦩ h.K5[Vul8u!)"%~:/r6dmO o3!m?:="N9&u#=WENx;Nx~/C Eeq7ͮ1ma}yO$-Oz~IApW7yȦp:`!3k/ ~\K9TwSs=;=&Uob/Ù$;1tʿA7 TIt{TwwcCWt=``d6U|ԭҭJ:JG3$4ui}a ׫n瀷-o;"E:y(r1mVќtSuSK~Z'1o^!5Ct#q 4XiЙ@ x=|^GPY1q%yEΥQhL4cE̹&H:+R&_/}a.fD{kwB$ 4C \@͕<+4~.}Ճ x~-1, KZ/3nVXu.Z4ƭ0rXcףRkAK:j-ص ;i$+4:Ryy</eז\wN;:Dם:^$NjFf/zwBo^v}jsya| U:#/*׎<;u"KrV'F>%sŐ-|)D>>a>';E}v6/:wVŋ;gHӦԦ6Qp_1o?ǒݱ cGzԱͨ6lϓl/s;`W ۷MOh=xc^*/6tڄ%iK"m-Yo+ yָ8Kq/]e.o>+“q-c}m {<(/GyvS5Mg_T܇pFPu$km=^uy=Э>67ݘ>-ƻ3HwvNn'{MЦHUgsCn-|'^JcH#^JAQ+KEC>" ='Kػ5wb {} `ߒ%̈́}0mC=`؝>l'لLV_wZh{}pFTGlptǮ5/e=ʖFc/yt5eh̾"1:W`Z61m ɣP Kߙl-\emq*'_~ӝ|Zgva'D(j} >ymb:-a6zCmr}ORjd2TcK~ 8Z7ΰbkVneg e AY"`##2}rqDePy?xW~{evw Hτ~W{J=I{+JϒЖg}>Y>Y'dOƿـvLkH>ʧ:. %, TxB-9tyluEiAs!6? WgLqPc*Cl9#7d^D}J]:gG|?ڛ"_ דO1697hN2\oF<-EHzƒgϱl馩&Wbg)O7VCk {]U\xh)˨vZd2t]s05xytXN_~g 7giǟ~ qPhbT2"`!4 4=3 F | PL0,:xڥ] xŽٙ=`BG˒Z"UhL!xOBg /ҊBU,P@yP(JU xg,&{Nvf7Ir~3cy*)7(JPFazW.IQz+^L./Esjg j,.5OzwT%?U5H%)_:Z%i*UҪKJ$;=O;6V^\ϛP`ϦWǒT^nX3 5%chVN%SS(_kX{=0e7˵ycAڛ, w5\@+#H]0ZY\$אKM[ ŹeKm9JzbYQ>=))$CYno8YSI7ڮr-һç RX^VG [+. Tҕ*},* l7+kֻ]YptNx„4hLuPh:͂t%Jb%CW+w߅!q4*I:;zKj;0q"۞acgͣ m$qΟ0Ciu Du;z!x եǵUB횀>q.NvvõwO j FfpywDc5Ұ2NTl.aa}A])aeVk@Awrӛf79P@j ֢Kz8z$؀κz)q'K P|z6Ѐ6iъbh0f:46p ( >h@O9b բAY 5cd|^=PY^U6J⃝!]y^ lad|"M>@}E>p OZ\ZVDxc&~ܖo@]{u3/±Zcd  $[/ƣ *J]JAB:R;;Dxc)!(/Hx_>=1 FS!H0.~u=mY&=_24tـ^1⺹+SlBEU Ad+1vHv ~12m7 y}^mbp ܁ַi,[߾6H`^v1A>) ~Ȝy7" N"?+sxDr]\G[/#\]LjX^2K:c#(Ɵreyx´Mois ~>֘V}Ƨf5fǍf,瓜8to9P\{x3M4ϼ{&%5 "[BKrOWG[;LKy#{02-$\KD+*|枒Ri)g{L i)81a&o)9FGZrxNc=Jk,FFi'#7w +ӟJ1B3Ha i8>dw+7v"u1X=G:cHC8JWFJ?>/HIPohi# ]Z #n5S';%Ns :o51TkER^"VZ+gq iKoXZ?Di Ŀˉsċˁ!nt9li{z.cZ/Ɩֿ^^ .ؿv g5vaY֞jtmD{e$75赺[18~{ P,~7 rHي;W[u^ܣ5 y-G} P?@0:%|Bd+-3{Ljk\^~ }( kS|D2>чŽ# G%a~:eU2yĵ: 38#H[iA.sokj~u.GF@O9F\û[9S3q` aHA%m!4L@.BC66tv/kJW޴a{{b&Ag7_3j}xߛ7C rrF2aXg$ix9#4; 3N!zp' 3q8i! ]ךzG_3jVǑ5{.g }FI+5s%W&9}j~0n*| fz GED&ȸM P6^x9@$^!s/ {0ndϽ4"VQZ&Fu5s!NT~/: ̃\S;Xa99qdvP,2{AQW/hʼdv9jyDiUUi#h!A:XmO.=\}П6s|pOt\9X Y/RmG z,W1bɜ64޼ SU\o rrA/Q?#t@=XA3uu/culGgNP]I\aTcauM^qxja#cyUT>2MmhLsˆ6_iBsҍHhad$um'ƁI8R[>-qymtR4VQ k2fsimAY8FlQb;J+Oj'30b gO'h!hSwkE]»b ҞhY2JV>$Aeܢ6^ʟ 2]Fw/83Z5ljmFK50DiV#'BO*O ]a28r~^ |_ASz 9s/!=`ufiy:Kjdiƚ͋s`Xfa ZߩϢzݯtF ۍ\=ru7*֍ku/7*c.@MonYcZcЇ_xS]\8jϓ\똋kYxZexLjg f[,\zJ@Wl#m#Jb?m#j"ᰵ+ ?&#G<\{w|1g8d5h.m&_sO8F>2ydd3@f #7o~%9+כ[Dvy2X/!Ð{1]R@^ozGc1hPuuZkj!v^?u9F</IWԤ(_ǶR5GZZcgԚǼPG@RcҚ]Z_'/=VWwi#V9ؽCTY.6_}0I 5oZ^{"exJԌA"e{Wi5rgP-Zc5 =&6LjU =քk+*_f:ah>5Jys殁y?ϴo#~@t,ԭvx\m[J6l=,;gq5[_|di*,\S8Vg[_]w׻ǚ>jB1:W: ZTʪ5[ON\u^$b#V'{P7-na_>:둷/pE]=5׊נ@%7 4os #a amyh!R\]͖VPfe9]6ToTr?r89:-9-ؒCo%$_:NXdw4*;aw"_LJZV@:/vcK؛{pގ-?^{p-:vuI*l Ce J1k, h8iBSbњh {7]9h q%60 $rլ)Y@OH:] tj?Gҳ8 iwXZ%޴.%z)MҺx&`,%'Dk;}| |O@ k85ۯc֖_uN `Wns{Qsy#/"sy OOJ8֯eg=D䜍\r2fsـ_oU9K,kOA}Z}533Հoi&6kdcwR9h2x} P_A&)k E}@‹R9bF:"ĵB7N{ksOOsOOɾ%JOoiO\=nzq{<nHzLd,ooN,!|~̨8M6\a4łHܧ\LXFXUB]Wz.:ہZ_}q=r-1e02Qο8bځp1u/3z=3^TOv9{ݩry8j '}oz]oW M7\4,Lj~8]=M_۸wis8O2ǼUq<YZd}Cu+/>OaꝻww.%(>S~b%˅[W=;uɍ}A8[T\K o4r' HY5eʥ$a3>(!E$T7"OK^H=^D?yHd+*P۱*ȯd)2ȗ0YN7tg;:?kQHNxz|.B2ãƆEEpaCCYߏ,>IrIot")d?Y~닗DdL|2uonel'|B3iwN.PRBaR~a A`~T(>9OJK|:rZ<^V*R˂I^ΖíF[f T}u}xۮ3,%_)^kug[mf2['}V%>Q I` w[Qu6|_Wcj%%4+%kUcWD12`udqCdh[4Jt/ޒ ֩Q|m|{g } [}m+*W4ƷW>Nx)i2۵_9b~u0~ܤJT>YDgYu}78#(89tk[b=_ci13(|E˖T7D~7GyN"OOzFSݚ6?Ƙ}hP*g%k4X+Cic9L}Hcs|0J_:c5U ,]Etb:-RVM[T4NBclJ/jiɋf/O1wk0_V3?sJLYt/z0ypk~dEW6oK\v0~Wlh/h&ȧdia%5 kT@ߐ[$Afq]4d.68k`16?䟅oHtwx&}Dv O:37p{ۃ01ռa1g_0OPߐO lp7я4X>g3S$A>g;x~?8#A{ SL])x;ė)u0Fdo kgEmlmN{?_1~h;aTs[m>1~:>ȥ__>%|\!&Эcݿ[cl[>I>[89:[zG h owowk.ކe`O~06ޭgmԃwAGB{Da;":DkXqP6twY.;8#-b-)Ξqw奜^)ܭn}(vΈGz ېBbKrGkY$$+)`:m%nǐ7j? `M|-GlmW߾(o6; pQ!42#=H+KkDM\rZoZy7@&~r]룐@@chٲu&y -b]̾-Iͧ2Hg;`4HGo.@y=MeZ,%l--ak] Z@b Kg,`km]ŕ?l?lX;Şy e-dUn+^!!mVOlHʲ8-D뵴m+yD땐6Pk-+<6bxX(\cʕE?:y"ˍ,B2yrw&F-nU!*UAZ_I4'hH3yGZKkuإ@>vew>u@erVy볗6r, t0YDYm1d(_,,q|';DI~?, g|JZ5(nAtZ"v"WOJD%|_#EaUU]u}?]Y?WZ6l`12jFu7-\geWoƕ:YB,R#U~/O+!&?xyb!5Ƽ-Qrz/b8Wܺ63m)T8oSqކx(q~ֲa= ?ksm|Kh8sщ58És9`\sqy+?Ms۳0ga9sKT/ue'O|x'iJϒk9%JT?O q^ƴS]U|ᤶƘ\dy*k˭e8 5|>?|A8sVgndif,ďr`q.Q2Ώ&^[ڭez.M5ۀ?Gڵ zTW^y:OA]xku3HLGldy(⶧V?5&70ﰊM]Mzǹ .|Bum":|w!b4&Ws竁 *n- ZclC^"z_ zל8#`"_#Λ83P7Cb+ esq~`l|o818(uKgݬ:*f( .u]9`|%†SS2Y?Ώ9J0.} u*)vs\vvܑؑ:H dG$~Egع8vD:L5akZo ,'XZ˝u'쇕@>cʕ>&-^%v"2s?,Qu>:,Cf}C{Fܩ׭eav#2dɈCn*.ކo |5&#nSA YfkDo|nÐܑQgܯ[ߦ=-,_OsR|] ߟ' c?u?<{Gv De(fD}K}bo)ĹE(D}<. uB%buv(WiBeA8ge*Z;E=cɡ`rIףf9Na g Qc̳rCmC*7:#tf|7{^num.M `ƘG%Gb+ d35зScXl ^c:IƆl1 V|] 24Wcl1 U?)Sa DOf?|_7uo6fkT_mfzf7Y7 cR'Hj,Q]L8b*;%#sW:eFYۤX̬_&>Hiͪ z[?(n-֯d`16zMJ~Rm GWGUUFDzrt%W~U "s,BY&_*;Pa1d!BgT:RBCTu6YP=?hpY? (n]ui&!b4&Uq.$dck 0*8V+P<\ r>$B<1{_u\'*b;W,U쥶Wo!zqVq^gq~E" "K“lIF};b;0@JV3~ MٸOU/1V܂Vu6|3J3GODq]nSɻky췩*MMU^AYcM%XYH,Ǿ!j_`YJc_xZBк@Z7Cb+nC k!|c{ʕ>&- 9 % o+YHQƋE c,6^U/h(}:PT1̦}9W3s!QU Sq(S|] 6y-v@%%~1׃'(0LJ^!e#!nx8=҃.Z1haZh~AQ2_qf ;5=oʕ>&-ofSxeȇcGdr[o>^LDIGEɄWUܺh̒G̒c Ly7Ʉ| | ɄD St]Sal\*\EDQ码RIpyeizJ?UrQQe _iGjmig$]!C[vh_geR3n?}up\p01>_;#; ՓgFT^Dn4(06%RYY6_,}W*g&&ie i冖͂mQ1YjS!4?U&.$mjjo*J|(1<^?]r| \O}I:,Lijroώ(cz ߖ#UCV8D9Bm٠&J3P3=kɏɯmqaT…g@LW͸[k#~{F{|ObGp3|͇+/WGm1chͯ6FڧF _Xy۩t>ݧ7^ ݘ%sUg".Aj^(ftلbm>fPX ]Ғk_.2QNpH]et*[>\fcV0T4T+M:lnT>V@55η1"#|(|JtM1grg#aSLO&kм6~^>~ Y)-lj]scM rpVu54͍{CFCD-ϵCC .Ԕ%Zs~#v3UQA㐋ZébݥC~I,Ms"n,+`=MWZgrM9ҽY\,3\yYG)"K9Fİ3)2 >Mh=vƁ8Wm<Nb\#rK1 v.q񒃖rss*baըk Q:0B< Ɨ#[naU/=w}F m+/<{6SKiqZ:5GK׺ZZ?BѺZ Wv_ֳTKBe[uPbmk6X9O^zQϲ(CXu_k%v-G|bO0"vZc29;:9;mDO_8Ktj ̅<:},8?̷N}A_/}*꧃K5?sԅa \31QVAOUPzY'gN*3( exWcDk{-YgXf5<*ET#H mNyCv7%[sɅD5yz[S=<2NԼcxMKGbKF?vMVаƢc}w2}Jp}D9F>.]b򎶉'I&s漚n圝6(>\?|c1g #o\W7]z,F'Taդ_+"}C9-(f9ul.JE+\_}J^Я;B8怐b1r'і9eL"gx`>_O?̝r WrwZOZ%`UvR5 =E_圝6 |Ksf7Tݽх|P~_8 EZ-r{?W|(kQ3ٺ5دyךk0K՚ZNЬ]bvhtl b fR)U.9M}FuizWv?Թނp ]Y6jBkĵ06bOʚ&41ԅgsX*CjjӍbTHȣT@1ȯf8, L"Mfyf"ۼ^Px= $fnaԚpeµ)b,::RLVFfJ5CV Sk6@j e! yDc8_{m|>WMK䖵gDs<^s3~ϙVrG{[B1r0G=~PQm/> ZDtckz3~vZY$hMzzP׷iɇnz}i-/9fUn_7Qi)$@Fc>Xh#LoG/\vr֌^(JU>l_Uj At[bI<%|=$GGyRϨg #[;9{èʂ)n Ysnv)&?BbOqz#?…)p~ׅgݴ?6'bka˅'¶]_N3.Vҋ6@~`՝쫃ku<`dGLk# daq>ʃU)Uf|L-ÿ.e9F[bvb(=X=;ثq~i)o#iag?cb˅<*~kڥO!/}#U/f#_kf<(3<` t@{=b&# ӄݗ55LkkINkb ӚZ1O0iu<7L0 N[I̤ӄbE x PAt&=A[rKږD,Rho'5)xΤ'b-,<- 2n3) 1O^OFVH_>3ߜF^-mˢ3Tt]4r^2yOrA&*~6lc ]2;m'{5{J7.eS!2(WD_K3%DWS+x3qʧ浔wZ 'f Ê(@1շr%zBc+5I`gY vfmn-.}f+4n+K>AK닃i vk`Z:`3~Z ƚi>Z֌G~<L=&rgOH{L|Μdk᫆ op33){΀ Nzg`/~>#\"^GcuND]Ƌ Ėga5]_փ׆dYI]j{_@ ^͹;mxÊ[/^_ WC\y~ZIrj''I{bNOR[ZWv?4y@[b뛉Q9jB)/"٢xyeNlQй/Λ›hEh򧪂.A:?광)7hP+O ?(vRxUզ%2TD,^?8^ﴗSz ߼}PX] =Jd<1G֥ k?:UŬ}#A].]D [r t!}8]E-@IR+ y Œ''I2L{5h}:ܪ5Lkk=I}ܢ$W iac},YkHbE)-Ѥd'׿VVj&_dc3t?G&-S$S9MᚚW)dPBDf>ԎZNߗ6{{$'7xeO~o~9Gkd*bPOal6.d#xclq>cp9v`dNJ Eyi;e"k>ZJI-xܦaydk`Y=Ȫb7C~[aWC {fj'+e ~7w} "DƢrZS1!Ֆ&`/si>o=^sݙVxx-FdΚ8K;F{QXOd_A8}<\A_c~ݖ;ԋ5w%p_ZZ-,0sL\Cؓh<Ϭp/i:H}5Y ˾D ۗ}s;/pIn|t6҈ʾj%Va/Ag w,b6er-2@\ e!gR*3J)ˮ]& LOL𛧠\$D2}Vw\3AOn≯ pi[\ 1fkgSNz.Z6mc9)5qg2͹VP]C;hXuPnݮ"i:XiO0d_9[I4BVYc}khw_Z?δsPZ05I &.= R=Dd)Fz15q Ǟ ĥ"']\#.ag8.@~ʁ^'] JH=l O=^풾Mۀy|yΓf5W.g v?; pC(t*T7|.Z3 eˀC}- f tއ hD9hBHcp? #,co01F*+%?Բbi8@ buV(CO< @Gc6 :#`X2)/Qwɸygc,ONk浴f KXf͟F}9͓`!ע@t`#!'Js7m9 z\ "|q|y4;LO&PwR|}u'M\;F^# _õa? zFE-Z +U8[Nc8öe v5sWY>WH,;F;Os/O<,;iPvH$`u֒gb*p|Nݙ6'=MIܾ,]A=5Yz5V*b ,m4\{0o{T$}ii'й Re>1ܴs7X&.ef=,b]Cs'Lo 󦘕7yۛϴbyBW='ŸgE >AՓf3 sX{gV! RiRD?_W5⫱_^ | o+X<"zw-E^ۂ{M5K޿Π>37l:;"sCf`5u)Xp8Zu97 |d-t ԅ7mšz<'U<3.TDI|΍o/Oztpγ=<'³Wbd¸|a3|U^F/Gk{ze 83|RQ^G|犓4ǯ>cPq1]D"2<Rkc<$YY+%{}Xl{e)/V<| %+,Ǘ{5/gޫg\@g diB=G&L[N :JXu} }< |/Rd{+<[dRϟaP~;,Ǯ1 6{2sL1wˈ"?7E@=1UVXWbhӥ^jx4 6^x\W͜39̜s|3ɤhbI,ذ*"@Q PRX `AT%h̘:sfi~W=ɦm6{kY^?LAK&#,諯/_T[>2{o WeRz|)d2iT`6P޽{w?[qrqw LDA(G:xe"` ~P>H |W\|ŋ\ .11p8\@q\n&lRLI*Ga HrΞ={̙SNƥ@8 E%JiN)OzQ2,tb&$=СiɁّ#Gb3Xš8 z*DJNP d*{=OzI 2`@@{a7wK@O˖-ecvXׯ  asrr8'R @ (:`,kѢBN Cۭ@SJ?Ewh[}OQZ fb.抋  QI`)..ހ ͝;w١y慇… s48AN2A)L~[@&D)Di 5DBo_ @SM&-V6MUrFzIl0j)++LCAlȔGC OpppPP|}}bԩ>W>gpq@!}JK!K_.BJvOH' W!dLwn-BFjY%OUR:^^Z}"i47Oj*iYe$˴#+.>TRRv߷o"Ӛ5k:88Ҝ9s`̌3ĉ'L0~xqƍ58M'OOOd{`p*< eaԎ;O>)ofGJXɭ rj `'P2]'mɩmî Tk{& 5yM*p5*K_rܹsNС]Y[lIOOGր Ȅ)Ú͟? 4l0[[[;;;l45k֢EO>W^= amm \]]οnnn *@9s&(+WrRw)vO͛<2z2jbsw~|r}xS~ (3qWFKΧFH&k|5Hh$D;ѶY*䕖4*B 2IyҢ"Mh7_0PK#www2iҤѣG9rQ@٘1cFj,3@ؑ#'4G2e R 9`tt4/))ؾ};vOB~!##d (C!;^}ʍC;69|9GʹΧݱTR),T2oDͲ !SʇaJ&>Q G^RMe_z6oތlJNNF6͞=!@ŋ8pAsQ ݩ C8, :@L5rJ(͛\[|ի{ݻw8 G+++W{9h"&!P4dMȸP |9Sډˊ*4RjQ3FD$Y2M T,b+}O7 !JÉ:Jރmh&ܹs]\\:wܱcG4 IS M*|Zg5_:Bi999s"(R8YfEDDq\\B*##!{<Ԟp[ $:'xU*@2Z ʟ}X%b_yW2}B?> %/2zǪO[6A*-RKj.vrF=\!2ݖ6X&ZBt@<C#GP#s/aTb#VUV>#M6-00F"VX/ҶnݺgϞ,CC!Ty2FNiWiCNP-#P?u>=W2i)WI$Cl2˖JUβymD&> ieX@ҲJr(3(D΁C)]Djj*n0Vp+Fpԩݻwa?@ɓ'+!%O49硝6<=$c؆[7tMv ;~ō xJPJL T)*F.h_)t>=?7bɈl5]DԒLWlU2oTHcOŒأ!3n 좬 R*2YvK?tNl̙3}||P-T_n=Cn! 6lv%qmjoݺu<{nTG %Xq@(Sn j*MLLP2=++ Pq@PJL*S 5P\? Ѭm [P*JsjRSl"/<.B 4,j:nQM>fdd9鶠Xԉ&*$g"3./G[v˱W#Fvʺ/xh\P_~ݺuR...nnn&L@`):yPJ_\KIIIl)aۢE=***22uҥ : J$\/q\l@2ZtVjڠUΧ5E ]y2$j?}%tLgYTrjv4C~fEOjRG%/u]E'tS؀ -,7n@=cC?e˖Xe;LʈGm$\+6ȌS'RBBTbKcOK@ʇ2V۲=ۄUTҡ@26"r.ӼySԛlQ04p@~qW~~~T}Td YA08$oS 7&h2zB]Te;R/H#G'ɫWF[n.O잼lօΧ 8I2[4Ah*$-k3CHWhX*U6Vx&.k &΋=ih%]5 ѳ6lAH}$S<ģKvvv;vԩSڵkgee|}}!98SCCٳ9LQyG̮(T:+\! *2`'B|*R,OFb{L~:S;_%q`fB}BP@E``3%@HM|T&4ɓRevjJ 5 Y&)TE1S#棆\- 4`)B' G#@k8Ӑ}<@f2FB)xzrrrJ24?4@T30ؒA$/)6(BJӳO|#T>3 -Ǐl0?Ӹ94v-`PE-Q ::iTÇSoP  1b\[a"?TGpN$L+)$jp:GUf{. 6CFACt?GGGB ! 1cxtG)"YTFNsgۧOr@YˀG[Q󔷁` b+z6ʿ3j?=ΧZIIzõv'Ib7yfW 2 K9O":Gd~-!?ϴATp Q+O 9P8އ9)Y \]]{GHqnnn@{ƹ={(T $D7n@b,--9 jRG-<0-Laa!BTfS*OIk 8KIbX3$R.](b^UY 㪰'dVը:Te(*Sks j-S^t飏>Bwɑy/ =t[0O`橢x*Vi/ Y>|X&7K򔪰\GΧrNēIP$MRpR ݜiqGEc u.+.\ܹ3-:6ѺQl_ʃ€t_tYLLLd8 D߾}[mIHj?Y6iʜABF@srfB)[,%$GSz:t;u*U$'f<(N('Z &о">gٴ4 j0EѢP_ܹsE<-&Ã֡C"Q hB6k׎;)99ђJz,?7uIp}1aR/-t>v*'礔ͥeggx4;$E>)ȑ7|RoZlhѢgϚ/́%KKKѬm499Y`PäSJ.{2\2w|8'm9ANI Qi(M///J\Ñ)h͛4i_ ヿۙ9ka.5ݝF }G{FE 4HA/^,ȒERܣ iGG|zi4S$J9I%BJ v1zI>!%eUAŏ^>)]'S%Y@8}W F7ٜ=߿ }/Iц ߩ #@TT$ضm,% kӏw;IT,yWRPJsRhF$uqFF^o(xnⒸrIrGA}9;_h>i4’!,KFi.\@IA9'dl]HHȡCR)Ziff&=&&| LK$\]]vڶmv$ d~U* d={pdl.]$,R*Y_`$v/22RIOO缨Ǐ={VfT*'^4/(T^J- *j-lJ˲78]Aο4 T\ YfY[[5/ĉ)))umڴݻw߾}aF^Ν[XX8׮]'eֲe˦M::: PH?eќy| saĈ&BjȐ!$ s#˗SPQ62 I\~y$ԋ'M*K%- ]M$uC|קO=~cM gwWFuS8{?j^x!duSXbJ b3PT|ɻkiiSVсΓw\?xKBbݣCK!m%95qDN(D%%%eeeٳ'??4ʕsn JSĒ"ɤ:ɤȪp"( B&ނ ߲erjOM/IӇoatXXDI!Y|}TqFSxh(V8>SL?!zke~Oт:qqqSfo;;;#<==9* Qhʕ+RPaP\#^ >%P#ѣGjLYIX+2*~~~K.}IDI joM\\\hó[nݺa1}52 Jի9ZNS DM4) `Μ9/NHHHKKw#DBl#_>UZ$.jqY[֝=rH^^it!@_p!ma護ޢfQu<ףGӧرgq(\URxbʔ)XuٲeV\޽{ EBA\Ec=zIrNjvW> u2;d%$  HII1A'L@HCBqSݻw>|(.OF˻<5E|jI_]NP~qdZN}K%Yk0L ?>S{ݺuRiNI` 5dȐ1cL<9000""399:,,,Nz(5bNV8+ܹ##-%ѥ&OZZںu B\Ϙ1,M4bB֭lv=M|#G}ƎGf69rvvvqq?+v횝hюlpiӦQ܋59svҋtDU(Be$53o޼2H ϖ-[H$w,Y"`)8ⲲJha(+WUF |jAF(@5뉌lݺjTZ(غW^yo߾ѣbEіnذv޽GQT(#Di^-On> ߱cGff䔐̘Xɹl3sciNݻwCBB BQ4@ǿ4hаahх⏏ݺu}@=QQ§'9!n]獊OxRh0N$K 8={M))|zJMM5]{xxhť!=QV%FsuL7//Z9%X@HVpB,;NoI(z}_η2c$zU !fmҥn H"##{=m4ZWOOI&S Eǔ(arС'N`! 4׊Rh)q|*} T2SuM5X-H$2Iido^^p5kցt8 @K  9,M0OƎ 0z( 0i&<_!ҡ۷q<ЂJ(%Jjj|ga?+W࿏;GHV=˜@eG zPΝhѢl1Fׯ_ׂJz;2v^)vTáTcLvo2""VD ףJ@;]v5m۶ݻwwrrҪ((k׮MOOߺu+ciO<|.]z*j^(*(%/TȨ']nisϩacߏŎ0A;w*j{* 85|p[Aƍ4i߬Y8ŋRWJVرcϞ=@UPP@uy@RA)yߧ:zS O1I$`,ӻG,̙31hUBalmmRjرӦM)χR+V@K[.%%%##Pegg ("dYYVN}*>ˏJxƔj`|RpRC1N$d0>;..y&CjOxx|:tУG(&:t^o)(8{lv"::9Ֆ-[Pr999*tN)@C}ҍ|PkH|&:ӭ[d:"$$__hDaÆf͚86mߍ=z &L27007w\@Zt*)))55Pm۶m׮]ҾT2SFWCTԳATZv<*ZTݷo_RN(aaaf'AᏉqvvizvB)E[=iҤS*Zo}(*v\rebb"*|VNty3 7>|Fk@g%+9=zt]t_0wٺuk-Cرc݁=o !ջw~ r3Ę1cT3g IEGGZ~}ZZ'RܹsB)q|X+zEV9'` ,`I>q"sĈkU!=Q޲eKͱT<Ԟ={~_?|Ю]֭[o&={y„ )}0j(A1c:f9x˗ǯ]V>@-CN?~ӇݼyE'z|f%Pԫ::N`jr=xP1S-ZPI'##G9uΝ;lT xӵkVZuyРA`iС@@ʩ(| t8K.ݸqCujˬ7։r8InYل]̌5 џzף'G}DѭP08 4 m;YfժU'99e}C)JݻСC/TFau꯻I$2U ´999<-2Okٳg4ѵ\_sk׮?v؂ L8 @W rjܸq'NT~~~20a޼ydɒ+WB)qhx .(Dz~|f%@9qN|'NM6^FGQ޽jÝ;wPE666,F 'Yd`BBF%'wwwɨYH#رxI%2<|Pn%+\qI5$+u NyyyhcPli-\022 "ho{9tS)5ZJ'''1}UGE988D!C0}2-[|9Bjƍ۷o 2zu8Y9IōaJ9- 8|={6_~~s_Q=L=_.lř1t]hRa2pG:t@KI﹗rjԨQP 0}P޲e@TZZ1ˠFiǘkSI^K=> D<@< _#\O< rrrx w<`;;zc03חL7ON{裏tvڔB-#Gb\q!!!x^zz:t4BT }|2ZE%+_t <o{>%huBD 3ghu!fs 22 F 00o_.#wиq㰁ȁ1c hpppDDkFEK=ATYYZAvZyIē6Y/vgWRRrqē|,Yh,( VZ> tUFFO˖-y)S8q]06l0h QȁGC :T')\Q$piiŋePc푒~sv<l$fjur %>eeeoѣG`lƌIG&aBP 6m VVV .|a:>޽Ν;SD>. jԩx@ҥKeu+ض{J;YŒJJ*YUSJ=[>N<$|E IC2w\ܺu <}=[hSu}ܹEucEQ# O2-DVׯg{&G-p%26l0w9ݦM$T޽ƌ:u*^oΜ9 ,0QiȀLym%={nn.MA*s/^ԋ ƶjԩSfaϞ=}Oc)fʔ);*bС(A-\pL ._c7mڄ:xѣGeJL)Q2̼'DD!Z144 Uaڵ<0= DF>Q> ?ڽ{wݎC3縹^{I&^f͚7oFb!M6M-b ^oǎ2D?^! m*J3J?uvFkl\_~d>>2{Nx`B#"""} [~.\)+4d2@%sĉV___׌< ~ZMC:3cT:Oyc@^W)!O>ǎO:~PPP=`b>`! @;d(TR|e54J2z=-j'$aNRFJS{Q\,|¿xyf޹{…sѣk׮>vXw@e?eV^-Qi<+A*JZJV!LidͱyZbD2̙3lh $"1FI7=vrr24* )6z'J*s*>NF2)DI( $V}&I)'mRI4 kאj&nh&Ȕ#Kfٳ#"";[nm^r]rzTT *bv5QP !Z˱:'$;kڴi۶m!))((@xa]$dQFI*󠠠y恨UV FD *2$/#J$T|q'tB&9$I$>ڽ{7dB1[?~(pFc5)66vȐ!iiiϲyجYɒP >@8hMqpayϕ_i^Ex^AQSTg|v>wiBmӦ 42UBmժ 1e`^^/~_Խ{wpdQ/90( YjAeI "0 CJJJ?RE0/_rJp=oՑ.όO잞,X)*s hJ2y$!ֈ蠒v֭i}k`LbUZZjkk*B;???S%% )y{{Vd&1**..޼yckP9D< J94e4{۶m".'_paTT [g$d8[a"\NϾCmuZ8j( I2xwW_}*?:m8Cpɓ$~0ayHSGFFE:P72TU§ ^_‘D6ɨL,AtR4oJM-;CI=0Xn@ ~CkҤy:K,OpW}(YCɓ!Bsȑ0˃H()((8s l=|P2U''. i dQXkׂB9-pD3Ѯ 82VɄڦ.(-Zx*dzJ,O>ß~sek׮͛[@3f qppOHӧ/[,99,ϟy&RHU'1% i.\2zqqq0ή]v:tl *-ߔ+?qz=KPOҾaÆ?ːѶmv@VREUl FSx޽{S9;;bb񢣣q_(}?~v.I-ւˠVXXyfBqRftCpOuf޽ڼGC5-mHHZ#G^}UlT&I#nAg5bԩS(Q XVVܨ">v6Ν;W^={,;M+N¾_.IO:{6v~ssLSNOC *ӧ-۷OKKêU[iӦMlllɓ2x RC=zG} ,Y 1k,'-@u|*/@ŋ'C-͜9,ݾ} '[lٳgBBB<{ߠA!=>h1IIIho2eJvʵ͙3ޞmJ TwFO>ܹsU\,8q"R = zQOA]FPNS+? \ZEv ,a4iBe6lyk4Pؽo߾ӧOum޼y߾}HZO"}7" 1** ͛7a`^tiHkرcGD^QУj]СC6믱4&ѫWI&<<<:wZ`` Y3bGƒ͟?ׯ߶m[nn.pB^ {RƹYqر$#G4k֬\&V EknڴiUo+g?[v s'0 UVf21 :eUv)S\i}BV'msj1'՞qZkkʆ(8!Cpյt/COj[_Sr` g׮]|[!eԨQ\'"lٲe2 ''uuGU4~\I}lɷnjzgVORVeeeo&7guCj>=1NOOwrrZdI]RRӎJn߾SNQQQ$`PGш +}P7nbL\G"y`j)=x[ԵkW???F_^UX er42Ç;;;%%%)/_ܕ˯" PY`6uTqx\Zzǎ2WG#~annnׯ_7ou9::bQK """"lawnذa 퓝}A><kא$#3ɦCOj᧗>=:ɺŦWXlTlll3 cǎTj''Jm۶o߾Gbe!m rnd QH)ҥKG>G׿pС[[[E#s΍gw"=OwՊr5Z*V++-[ưzT|§Ç׈Ol|Ů]7&ÕÇ;99UՎټye ݻesn߾-}xOhɓ'^FWZx uz$(0]%KP% 8PZxɼgܸqnnnF5S~ `, N>顇)q:͚5;qoذ_?i2wxBtdkݺ={K,ӧkzuҤInnn;=:'N5jy]ڸz*>1883!!!Æ >a8NTTT|||zzՐO*3)ݸq۷oșdGi5osΝ=[t)^όW0E`W/zQEІcW5VaP?ٳg״gb s7h `9y \RIZeԲ0;v U:thaaaeZrqqAיM ]"\.(=iNL I `RRRj#r()>|piӦn0QT2@C3gݻs{=Puq`XϞ=qu?]{u0Gc TիWMt}r`Ϸi&((F{>|W_gkk ƎjժtY 3f_wjZIaa'YhѡC Gm[npB_wйsg=/O0GTkS I^^^/_jj*}w{7z=`GGG777ùd,^nn.nܸqC;J*tQ 99rdjjZ<$\UV`>(]pp<וCn˖-ؒjS.4irѺqǎԩPQ*z e߾}Ǎux!,L̹*$P 7E1b"W^]++ * shEHi^,=hA}EpHƌCŬN~Y!7;v 3}ѣG{yyeffcOC e*!!!##cϞ=gΜwjRjQOjMNe/ݻwU;2))^,r|<0<=^HOO#>*<ٽ{7$ deee5Z,I&ub̙3,X'q(˗/K4|R'.^SA4"(}JyQTT4bwww3QG ;>>>NdJ#6qPA^jU߾}iɍ A WS45z ׯi۶m;wOo߾-ÞD) % tuus3`)kڴ֭[M.8退 é7tVzX:(( d+9 hkBm޼٨'4`+,,<}4pevU'kڹÇU*oC׮]C?Q7kW<|p gZCl)ZAΝ~ ;}:Ϗt aRh[z/^`0YUE0c)SE0!C 斞v!ʮ^*XS GTŋJeҋW_!C nr!žgϞn1}e jkggaÆ&qIIICВ^юM߾}qa 3gί~+\ٳ"""-[~[۷˻|Nr}%|zT>~<<CAv=/R\xb*+h*;3f̨ ,GGGLLNk֬ٸq#Ch-ϩZ8Uɧ'OK^\#gTHџ|k|1+WK TWU (((@hĩ8sNi֬Yiʕ[\9;5N\ҋ+8B&$M,TX^>6k֬}u>Jߣڶm{PR NlPKy{{;vNξcwwXdI)I^U8ɮ|Ү@px___WWXڦM^{ m]PozHA{K{T6_`!'%%988.]'OEEEΝ~OߥO:>8%999zs9O}/RP+z]fwڵ[ QPI7oa͛U8wv2tȬ9ӝi|z4;,у\Wzzz&R^^^еkx'NqF] +V4m… z<RtW `Rw͛OׯصkסC$q͛7߿/Sή0O"8p_~ͨ4$ЫWUVIw9?;*cգǀ6nX}>D9$$$`!qvjYE)sf3c<%.]ˆ˺1u] .--QGڲeKmۦNjׯ_ҥK```ں'i-6 rVƧ={jH;81YPP`R_wzq=^@t-44UƌӦM%hQ6QM[nݻw/ ԩSSuO5zgWs>P">O;w6ʻR{7rHdo$zwf{s 6'ň"KK˸*H;vj߿sAR`t&MZhQvv}N;w~'sg6 Mӓ5e.3$$dʕAe~rss3O*x/^__J֭[ٳG/z4Py*Vb?}v7}QWWWbv&bEO8<;kd> ]B@/(@_%͚5[z^h@tҥm2VVVSLV(D?~ٞ7$&&4UXX( ʒfİ'B9.\jvܺu6 @RGc'O/442h"*ٌvkҥT|ى''ONAMNj^՜OJUJoivZYW<))W^йy!Îd7 ڳg{J۷o㣗q=oǏ5JTDk˖-_F>JJU5kի_Ը"Z+ڀ4h5kaops/_TR<;PNO;ʹ -z̙j)lJ4i҄PO_,ť^C JϸtT@{{{o~$Faaappy233C{WP DD+VAnnnlVU94?@&M@8۴ ӓy$ NfګvЁTO.rROo У^/0`v Vkƌ֭[!`G6iϞ=5jnii)b4|UPP_> g !ݻd; ԕr@tDq-~-hǎR7oԩWu=H TK'A;sAH-㴴GDDrrr>5kIBQ/͛?ѣG}k0ORRK&W^͛7?zh %,;xѵ eԨQZ2AXw:? {ʿ{^wM%@KdL0a*lQbÆ kݺ +Pdzn޼x<}hWJ"]Gq#UE~K. xP֦MYݻ7..r`N,VoX94'0)^)ۺPw^Rcnݺ$HR:DAڷo?bĈ;tđ "==,) bccΝ;4hPtt4: 8&Y-o`W~D'–d\ lSHIG)fR~,((HNN'NL:5%%=vPI`RRRRbb"WN6mر\_zu[,)… ,X`[BQ}Q0Ü0ߊQ p̘1uA&L@eч&[\4IL?Jl d R"|xJٌH111;w۷/ ?~|BBf͚ui֬Y ;y\^e˖T` WiGvFo;,j_ hO׬Y322R<[^=qF9\(bEJ|| [ |(_ u999а ;X_&@@;,Y*&ZNֱcǢ\xnݺÇ8# _5кu?[0i*㕙3g8e*yta ,>s)k,-VXjU ~sر:uꤤ0`/\BqD٨QÇkwlSYv2${.XDPJ*}y))*#ٳgK Pիsmg̘QN]q4k֬f͚aˡiӦ+W\dɺu벳ޕ[pL\-|ZIY|Q)@K"P`̊+0K4}|Æ ڵW_]`A9yw)a ӗB.NzFf I&k \hGccc7233%ÇeWBQQ999#GAɓ'k׮=w`sͶmfϞ]%bP1.].Y{ fΜٯ_?ȍޓ)f͚ t෰?ӧO3fLjj5kl;/fee)o_xK45lpʔ)X jډܹsN$f]O $ЃĂRQ |EGG_t) 76iҤ]vyx̾}:wܢE S`n dTܱcǐ!C7oN`(A(-***##cXtcǎ={CARU1>v!C;V^Hp_~B(_/ܣGp^zKWE*߿q˗/N`t/۳o&;;{ҤIspR>3e٩5>ἠJ.dOslh={ʨQ@, x'|rW E!-OR#Gӧ֭[\Uۺu넄*hР}_gyƍG-726FGp&;I UMGu+*My={CQzA){k׆Šxbeg}&xHZ_N'xAw=w\޸qcС*Sg\ūS'"%=ei{ڶm,wҥIII VaWwիWJ>ܦM~WRSSJ߶dȐVZ5nxذa~UZϟoذiʒ q8;;X:t8t la VuU5|{]\ySm.X,~> INOOoڴ)ɓǏ裏h#Fdeeڵ :|xÒڕd;`RBBž={d]V J  'x򔜜ܹsgڷt)\zu֭&L3ݻIw=s8Ce`J,x>o>`I|~O>W\EkU$*Hx-[} gfb z… o'OܤIW_} :-K8[M'/ 80|z_v/b M˰ @h"P߁` 4ӧOAAAIC-Z&'V?%d\,NUI)aƶ7F蔸Qg͚ԭ[7n©s1u}'N$~Zh0j(T=@),G: ד: u*$XP%KJPDocfo޼9$/WР`v)FB!.S^7i$,Ν;MF6MWu*rA*O:RSS*IdѣG7l $jՊfǔ[jUnn.8U$%!v@;g۷t[sHaڵcǎ=ztll,pBgQn ƍ'QƸҥo3:LвB cQ!=? ׏p}7oXŨKWltŋsk׮ W61$T$nmUħ?V 䠑MR E@ءk *W8v5)`07j(E78[\C_Ԉ# ƈH䀻?N_#h]&%}dhÇ{1Ԩ @ۡ(k4)S0.^zCZ ɓ's#!APi F\y vO)6q8H +b6m{rƘbc [eєHO=O@zKfff&M5k`3|QcjilnB S2FH'LBeJTSUUݍO4P_R&;=&L˫=-BXH5LF!_RwcYkpr\p.]92l}!Oׯ߱cGnn.$^.]$$IK7bթPOwMLUQC,GdK:|.:QFdzy$qFTbeΝ;wĉT~򓟬]6 .::}o.N:%.PLs}azgʔy+(k^1kd ӗ9(3PaYulEe Ξ\Yj1uT~PY1۵k׳gϏ?8ܺق z [N1'qc C$Z:Wc杧w=>[_Sgu[EA!Qb0~EFc /((Xpi .pG*k urƍ)-(+8$U'lsY+d{?:m伃W:T!gg6OƺL_ӽ9GOJJڷoߥKu=jD.y%??ĉ-;wD* O޺ukheh-5kVVV̈́YwA 8qƍI|V[w:}*:J@t[c&Lо}{`gl޼yjj*v+3g|6i_,KP_|[oEGGcC'y['sNl>7'GJ.jƋ. e9s̶m'rhs0M jgB>y7.d]Q]R-;tdɒr<8,%Pffq;T9bQj4(n: dĈcǎݰaCY03/[l)tk֬H=;j;"/׮]|r.zϟÒ5 eaR@=33366Pȑ#O֙WuhOw4D c}7( Ю]W^y]ހ:+VCf̘ݨQ޽{Ăe뎬q:g^-x;p~Y~E^,Bx(0Gbb^Q { Ws (/fd\O>(/iVp8A9>ca|7nȐ!V͚5kԨm۶={=zĉ|ɓ'K 5^0nq aKKH_:(<q۶m={/^ n޼Y dEX<Soi#mԨQμ<ߗhUGsr#RRFbh8qqFq2_ F|;ILÖA%]#bM>}[ox"8S\\D-;;[' $e&AlR~;jm̙`e$vt[KNjBۑ#Bm'r,#աJ-ăȮSG5=j%Yݬoѷ I ­ZjΜ9hp)Bƌ E;y$x $Hd-9QK.cd9Ղ E#qJ|r0+&pY0'zҹms+*~~_軖M:&݈D`'BԦM6o}:dk0\ZeLp6q/޽{ҒDSLQŀČ5JSB #N RIDV:0F*&)9*Mb=fKG?Pxqx*셭mP>w(f+r$ FX[:lxYQo x槗3_ ̺KfiQ/7qɑTEyoWP3>}_ҹ{}%sYJ∃O+yDVH_Zy.lK0)m];#UmRJ_8`ЊКN*[1\tЦC.>n>hWs&ȟ<.Hzv)OI:V:Mӗ2t33ޔyn&׃\]\\]OwGW,u w/K\GnOtGa~]~3|6/mii4,aQDLԑL5c}[Aq׵boxD-5j>Js{%jm>֞[ŧ3k?1V1 ottsS|~i޾lU=]w~{?XngC\*kyyttK_LfԧeLi$G-鱍GV>vU',\=Ywv>Ye{;܃Ť9ϫ+sfY>UOX}Z}B}ULO4G'gX5 Ox]j!r̲_Uѣƪ7k⭱ʨcL˵j }ޘ离o4_۞a\qwW_ft4-n?TF 0>s> J 06>6o:mH}t4nGmch,H ZbG c0$1&cD}d®>Z_mGF"4a;Y>r:ㄱ)=9l.l < c{`ʫGt p wŹF{ou;\3s_0vO6|4B9ksϸ%(˚>!ܿ_ĭ;?/V^gl>sm>kν|S'W}uY'ֽmMs[yZyEy͵ׇTL+ygZy;:is \և#e4ms #xYNg1—wV^&F4v u P·.Nιɯ$Bfw,tzb01Oduou_5ėף#V< GDǴRr P{4X6x\gOffw2dvLQc؍-X* (`C@) XA)"Xh"XQĂ(b5Ē>3y+W|̡}'y}}~򚑑t#wu#)1FF 62z`osM#]~k~moʿq?eQtWv}r7zhYF͍oggF^F4O}sf?ۼk};ٿzٿJa~dϧoOxYWͿ׿ Dg{|It=1[#ק/?MmT[iw~./tnj~'ߵ~\4?m87M9ֳxV&*?f/?-/?ZеL>}>~geW|[m2_70/ui^{n-?Kϧ&F3T;_i5гg~Qge›F.idKzל_훿Lpgy8&4h_"5vO;99~=*/=O'ׂؗ*ѿFKW#mٿ~n;e$/(onTjF{Mt۳IJ>dTvQe?o??~o=z_|׮]x3gJJJw޽cǎ[%&&&$$X"***<<|ѢE .;w߬YfϞ/^^^ӧOwss,L2uiӦ9 %K,]4&&&..nk׮p)~u9r7[Gimm=d;;1cL09s\{``CCC% lƓ7ncG1qı_7]qs6\r͚5FrrrJeaÆM6|vڵo߾G8qٳW\qݻw߿_w??)B$QSPTSP|(J__?Po޼Ia,++;y#G|uy=$_2<\ʃtW|  Y9@ѱbp#ٞS s322-Oy@qq C']:t({ޚC~B)v/5 .cc Vq蜜CSSQ_Qkݾ}/S(j6gIB)ʕ*5T>ՒL (J)oꫯ)z"JKK)T{ݹs-[_+b3(TT`)88< ]DݻlٲMy/(3Y= n1|"*C Y\.229 9I2qPyp) p\8߯_?jҫ(בƝ;wf'iR[-7o[RYP0T P!8m۶梞Ν;Gu-1j3N£I) yIg[('%%Bga(H"DqsԩILAA2u҅'?I rP8p YP] ^͛7GO I0I/*쌰<W @(FtLh'Q{㏹L*=@ 6"8!S',jK~ʍEl 0b Uk_CH?~%QUR Si68ݻwOD+))),,0R$7mڔH!]j:hA߷o_AO+-ӧOW<:ř? [߿_ ZjeffF>!)˃$[  I F6n܈X! d#G+Gnʼn'3x@$h9|SwRHU*""}紁+Ojmw)*͛7ܹ#zBY("JSm4N>NK.cǎQwލOMMM*8DKK&QRBA I#MЈԩH8@EN.\|9_l܅\D\xpD*X(yZĮ[ڧO!Cp،_8<&RaaaT#"}j"Tii)իbBI)F)R*6'Dw HCYNx1R^(b^ɉqVo *C*j666Oud-S^ѣCNۈЁrqCw%7,t/[a*J.a[ΝK1@:#X?++ !uA|ڣTTM*T>Uu"4ۜtu WfZfM||5.:h,Bnߩr󱱱={F'ۨ9e~( 8~E골;R(DoU 7'Z8M9<7nA ,YيnFXKXR'O pP iA!APf'm9rNdir֜4i+?ML 1,23R6:~B|+Rjk&u$Nĥp۵k%Btss5fjժN:ezLHXOOOݕ+W uTo)CTbC @EY[[KJi J%%%I7) *•Ej?@QIqVb4{G|zSI$mNh:N%נd۝^&$3j޼yrrOx#F [aʘi5kּyPZPJIA vǎ!%ݤ@u=MD|zŰىjN/_8ISVV%Uc~~>娡4-w5p 5dի'uyuw}Ge˳8ptR...bҙs͚5u:u W!$c SDQD)NN;w.^8Qder-/s#a?SkC;7ѣGϞ=틿J9R: HNI)R6ms G 駟| IJZ*ZȄPꫯK4'e / A0Gs>zh&MBO煇IQ #@XX̙3Lm6>ȣZnݺUvDvqz` -3'(((jdŊ֭KOOݻWT͛g2W&l%@D-,(:J 8Q%&&b̙sydJzvp/3 ݣy6H^ dX"ػwO>Ky aƌ3+;;G(Tף0|r^ZZE=z̙32Rqy.U%8ML$&42Q"֗.]:w܉'(/iڵr~R6 I3xs5111iGC\~s0>>>\E+&&҅Q={sC).OFje֌MG1qX#qsB&t5EL$Ӻ!M`XC'OR>X'<G<&q-Z㏱Z.\QhҠ<ȟ錣[(O??ܹ3w{XM:w^f][-Qrh)DNM2!QׯߴiӮ] @9;2B|jXRȤdRK)6QpRHGӜC}EXr%uSJ?!zkU~Oт:qqqSFo!&O!PQ=(%RGňv/_ ^ Ik'4|?z32G0QJJJ2n۶m˖-˖-{EDI >b iԨQ('338UVPW^z!R jԩϏXjՆ ?~ a' *UQRI@)eK22I7X~=zСC{҅L`iƍ%KP- 0xFM4!]\\,--z/Ow̙۷oGJ&gnllܭ[7L<.FGGcZqyw.** q;-(ʍOpRF2zN/QS!9PK%JLn>>}:4~Nj<)oԶmA[wGYE UݪU͛S<޽߮(~&LZ}9gΜ00++Y\\LPPңPO %.aH!4/Q-!Ү](8ҺuPײɓ B$hE :vń33 * B0w ">.]fJzTCq,B u\^cIIt@dիW/\f)K%ZK^AAAbO MU{^^^ΝMa*z7wׯ_~?~<.ѢETTSCICtԜ}^U1IĴɲOғ 7GL٘{5ECXU Pi޼y|9%w]z 9:3dȐ.]"3sҤIT=$9x Q\(wyʠ򩡊'e5d/LQReRpp` LM8>x>_Nx9$czYg7h|!h4cPNINs]hє)SLLL>=z8:: 0pww:u277?~|Yw*ӦMդ@|#kVeeenݺ ôz{{Jw(*XcnnnAAC%6dj|񤴉Wʚ'ul`EgC.--եxB*E*6gPjھ}}ժPuoe+ggg/8<<499v݇R%_)sDi!J5ۨTq'ivu8= } Y1mĈV`z X-WsR_5vwΙ3gE 8q{gbb2h kk#GR+ ! O}g%FOT)kZ7F'n4; Y_Eq8E!Cׯe@j*IED iӦ={߿?ɠ PQs=,mQy0!M4Al\j<|v,ϟGvœӥQRxjƨBؤITek6m{GvtttqqDDCEn޼)oV~ϚrJ@%.I7P$m(%K`q<%5Qx!q=ܙ.S)[nC i֬_8pLfTj*1z5##dOjorDVKGN UuH4+dqqv'Oėp^zUC Cb֖-[Vƀ$44t3f̠v} A.P]+BKPS@%]: Y\:<;;<7Nsݷo '5^xdhqrpqBKpp&M'* (F/((Hiڼy3/SQRPȸkJ(%Jjj|g,/_9r$22[I"8C~9>B9)`!m8f@׃R jqqqׯOOOV!H`@q5MPI#Ë9%;p(=8i6_z]TTē Q[h8(fffPƪ`9|ΝcǎOLMMG@H]6---331TǏA/^rPݺu &5RO@%iKߍ'/TsIQ1PIp6OeU9"00SNlCꫯ*2{ aDUV%%%mܸQ(:pѣGO8 ׯ*viZJ}CaՋaP9ҁX{"tT j6bǎ@q_c+TU'6m4j([N&L:uܹsyDDBjB)۷ڵT J)J>JT/uInĘ$dL=]PVo4ʪ;!rX< ?~ɓg̘!CJ-Z/_Zn]JJJzz:Pa3PTɳgj)}JO){%)pRb I `|v\\NjL 5jT?;vtR]Bݺu۷/B988899M#)MPmݺ%~iJ. $DNft \x OIYEl͛b1g|VWErrr˖-긟͛7,^oĈx=ԤIݽp| ,THe˖ ֯_ m۶sN|'+ ]钠4J=D5>)KV\[=C*SٳBNtFC'N@ ˓GEE0=v;dܢ:u}||>_\bEBB*|:~ST>0#ݧOhu?o|RIS;R8y'îjWi%*O>&&&V>|,7f'EpPENS6mʒ}5W˛?p2_5:g,bJÇsrrzōW ?`@f233 MMMoذa !5`A r*qƹ|}}gϞH9a@%O@s !`Q/OIip 8vNn']v=E**[nmժڵkw[ҥKv S~p|>i$>~;v@5k:f9vZI 9uQLZ w < U(|T J?U:N`}߾}*)11Q-j4 1Smڴ!븫$ؓ:qĎ;l$ݻwvzimm JJSN (P񕖖^x2]'FsFԋS:QN'@E6a322d CZh\СEB8::(4?'4lf͚+W@&ccc{{{Lɩ%fΜ)HDŽ(= 8[({ N>}2ֺ \B$pҏU -2wPę3g4u\$%%avYGYx1 `*>ANM0aʔ)[:&,\,]tŊP -C! TTE8>iJrrE9 xǎ͛7^FrԂFр븈Ý;wPEfff,F ',F1aCCz%899';IYHGؾ}} Jext3t]'$%(NS~~>![K, @?!ԂF~988ݻj*%%?11oannN߿ÇPTh)_LL BjƍYYY|aa&d>uz$Z˰_E9-7mӼy󸅃 MLL^zjľ~!luP-W?[K?pg0CKǩ}vܹ[nh)i=wssCN;J!fΜ݋Q6ltn%2(]4kN%Uw-"$p+iFW9szQQQ^ZZtB(3WRu_,Ike^ŋ8]#22O A9C*U?XZ>!D:uZ`z BCC` OJkפ0a690n8  !8gTD={VYAWZEIēdYӧ= ̒7 QR "HePrJi@W{zzm۶Yfǎ#dFrr2spp.(QQ d: .2\EJ͕{'i5SV'WtBM6oÇ&yجY:"HM3T+ 7o K,yA:>355ݱc"$#壏>`2 >}:l2Y ߿_f[2XRV YU[J=_>);q4W', * p/͛}ذa(-(֦Ms΅ӧs+zPD <Qgaa1|pvO$[%%%{=B ,p%h`f˓v\x7Vűܛ޽{}j< [hK۷#PK~8 h2|O&=GEM4IY/""bŊ.023T\85U+ )PZd7nH';!!zB|g\\ZhA:Zn]'++={FEE=wy0pj&&&ׯYN2e-dNw0o޼PNLel߾]FH7seuEJKE)40>)8;EYH H`jjJQ&sぇ֟@(^zXZZbs2aW!DH!7dy'*JkUsJLSj=٧O>aղFRK.=w}.133C4۲ ZxxyrrV}vNP P5n8tz_xqddasss!@L̢ VCOHLymez< .?uA*}.\P ƶkĉza׮]Oc)yG2jipy888Q(*s)#a,Y17oFH߿2XȐbQͼ'eNJC&ЊZw`k׮冩?:ݦMD]##,(px¾[CMzlۗ_ɓerN{Yr=###;;bY%O'O28T03zC8; ++jѐ֭[OEOrrr ;sC 4HG~MhѢe˖ZTccTyݛ1cˑx۷`UVV m4UBϑOsNk͒+V >|]f 9jƁ/LYYYݻǏ&&&ӽ[\)`F002ݹ=L[xqTT2Fw9Wqփꧏ>i-%3< ݻ'CΞ=jժӧ#kz5 >Y+sRSNW\1ax(grr{wQrvǎ s\A]qM6}]vE?A&$J!%K"##Im [!C>/*]V@|ZcSSivNǏN6?}#VCZ =rHjQjf… }s QE666&p~8ƙLlֺu'M QR_tILe4U>)-L2,2фb딉{Q,|¿见=ǏGEU_Up2RrV*ԨՋd56 %V уOPH۷7o^ŮZ9D9a^yDE7oޜ5$QJN8QKbKWY`놏91e9Ηkz7[I&M\4E*DEE+3gYFP W\9hРz:< $zUjbb"D$ھ}j 1BP󱶶Dyxxn$&&nڴIV[Q$ J+-mQҼ} ա8nB&4(NAYX&N[lz`͘2exb:Q1-ʣ]v<ׯsnnnjGPu6|ҡB6 :tƇveƍOʧm۶ݺ`!4pbΉK=V{Jsb(~42`+`1vV4GpsάTKKKp].W[lT J V7K.ElQ=pJ~Ap5^ )}Z^D2fff*u L۶mׯ_*ioV)j1bĸq@԰a'L0m4___r}&-<ఠCQROkp@ܹs14[ 5* GFVVV8;|RRRNFfS%G) Hb\>)IZ$]LիH5 7wQ4d͕Q3s޼y!!!GNNN`./`Oa*9zZ ^ 5 DҥKN}!$@qr 7o'@]vRXXºpJ)~`cT .Q+WD$2$y4DO I< %&n2`,IǦbrrr ӦMP֭&NyF8S5YٳC&V_25xnA&>|Æ ϳzجYɲjժeO[F8hbx9sh^9sssԫW/U,cg͚ K"XT0k .OP5IuN<۷oqHݻrfBB| )sdd$w_8p G<~Wj >) =קMcƌ \@BANaaS` 2]|Re!M 8q5kvZP`"h&ꕡCR@JXX 6.(mڴxUTCX9g}_ܹUVz ƍ3".ŝU?{@-a!ܐ5a7{lP)))h|x@NVUYU'e9M;n߾ͣ8wܱciZDdqwww_UOmtTxSIs4h/0宅vѣwlkѢŎ;iO++*v>¢bcr駟'$̙39X˫ \*ͰRAAAd4)_ wh 0TݫW4ΎBٳѣuR42DlٲrPJlYox2,5wF=j譙i̙ӹsgyСz Uo5NN#nHNU8ѣGcON:D1`6m"+NiyθsΕ+WΜ9AĎeggSodҒη`_XlA5\޽;MM5Ԩ^tǧ , Dԩ5WWמ={"/^ k;~tF(1WxE$%%m۶-//t?^B^t{R:s5 پ};ITq jٲet4(@h[;<ҥˌ3  47|֮],++l;1ڵ;w(a' ^r v!C\inݒO*$wA-!>kbbRUwZG>|8.3ƫ6-eSY0wݳsNiQ$8xyyj2vX- rss KKKQWo~Qe>ɛ-Խ1a+VSVgϞ}uV'5Ԩ1%Iy#F,]FOi&%z,722񔒒Nsdqw'i D_'ƍq+if~~~+\ vPK騡Kآ޽{{{{=$i2D\NܨQ֯_'>t, *ҹ@* ,b֦O{#v+533S;\2qǿ+Pŏ?t5XZn-EI8ADHHMi9r$pBdgg߿ʮ^T O3{/'x P?F__n رk΀ݻ5rqqAm۶ٳØGYEs r.d QP.SSGŋ]C57Rj /=* B U_|`M6;txwj +|_'Z-gwx֭z1HXtZ/\лwo{2jԨ#FTԎٲeWtt4$ɑ[Ν;}쫈֚6mիkuaÆ{ORC 5OF|ҥ`( d~~LX8;YRVͧW3Ŏ5o<**;%%wީ~,j!={6>k׮] 1+kFVV֠AoΉ2dHBBܷop:}Kn޼~0*[?XVkS>}f͚U3stܪcJSӦM!ZP ga]II~(00G`C 9&Lprrꮉ-Zdmmxb,޽{ O.^{ĉO2Ee K..ݻ}}}ΝڴiΝ;f'Y6H.e;QN "3LqRD13Q={I 5twv hٲczrr[VVa8k֬Aåҡ@Hg'pbUᓳaWh6|w]flOjjȧ] 2yFF/dС>>>`k'O֭]z:Nk5N)洂O23m'$$Da#&&Da7:w!33+W>G 5^ aOo4\2hCN5OOϏ>G3g 7n p̑OjI^*ȭ ^ϟP{zɭ4iҨQPjSC۟tdN m۶z)88, >|Ĉ&LP&6§tɋ/:RҧH35lA-_|4yCCC܌b"ƍʫ_F 5Ԁ+>},Zb?| Z*k׮͝;&9:: $<<*>I˸&4w'th!K'ˬ0۷ߵkrҥ8ԩS:99P קL2vX5ʕ+Āڎ&a̙1rHvǧiZIb_~ҥ,(VZM~qi2J4 V֔+شӧO9s&==}Pz tQ|rٳqCdRCW'MM4Yn]wy{{jbLwx:;;;0zhoPPPtt4%33s޽BAu4{>U'VE1wʲ09rUspp(**PK:޸J4>mٲYf5 KȤP&%%V_DΠ"5uƌLTBB#Fd*__ H炪L+N:{nGhѢG1F_~L~iڵPʕ+:[n!w:3u߿V:x[oձcAYXX{xx̙3',,lʕiiifLk)?Sqq|嗕 o~ɒ% gϞj::ֺnݺ@D#v*nހ bfffkk9sfpp0Íׯkv&]q3&55UY"$\]v`>. `ذaoJF}uVlIS.6mzaCeܑ#GzTj!O8p x^^^.22/Òe)s.Z>I8e_E1b"W^]Bcc㨨JU0shEHYj|EpHƍGbV\DfOݻggg77 ,i᜼_Z*==}׮]EEENwjR;&r>)kr,h>٦V_߮Yx0<5^HKK#U5@ NP={lΝkh7X%$$Sbٳ/^'qJ/K.2Oi8.|L … D#Bb ,077}dx...zRC;*>>!yMF]۾طo_޽#""tʌ3O  4yYf&''gee痔ȂRd|b?#qر*]Zp^pi$7o Ч1~g2iӦZ AÇ[[[c2QV ug"IifggwJ˓>)thL?KvGB=~.57|ÙjgСÞ={2+ jhaÆic\|,7o]a}眕tDZ4S-&($SBdioo7E^zΝyK]'[] 255T`+.%%EFhI 4GFI >o2S (͛o)8~Zfxu¿{n!KdQ խ@ ׹sgpR9TÇVRHN{ʕ>N"+5IȲS .1bK /z?qK.:K*y޽Z`q'E 5B +++''E111޲۶muV] >U:C<ٵk+(""qF>,,,T1&g>I'Ke$=O\'Љ19r$RLw`?SNEEqYjaTCFu򛒿hѢ+V#D {p <~x[˗UHСCQ2Da "\Eq8 ?q ,X5*8Aĉk5XsNt\l޼Y-j4j 믓uME+8н{wDf39ͭyb)Vdq)e| |z1>X0tf[o?, Uɰ٤I]х |E-j4Bn֬.π2HLL$7l`lmm P}mUnnnqqq2'yy Dc~$Dqp{j=zؚVij*--MۉvF_`fW-j4 0ItFÆ SjXXj=z4!֭[X 4T6I&OimmMB8%[ti.]kҤɖ-[y4s?OPDӧիWj$I۶mkAeѤΝ;V 7oĚ 2eOQllג%Kpv[nݽ{7|)?S|dJJ 2==]W]*cKxڴiӺI5X~!f>Ĵfe˖-1jV%EjuFfffm#8_FǗhe˖ pv999dhII\POOD+V?wl dʽ?Z b lus&aaagA;|Gj)5^Z~@5IrʁRkASTz 4hi۶m;v }goߖnO"eͫ/ūe׈(QٜV\WyYn3&NҾ}{uE[ ;c`Zq$Nj0"iʔ)֭<99BMkYsT~… {}nzҥ[[ѣGjIaa!HLL׉SVZ?'QC$Kvv~n߿ x8ٴ{n4bGg'gO{3ZYY9i~muO'O>qℎ \v kh"=0q:j4AQtXU:W 7t#M8N>[2, pOttt sJSG4ySp-giiټyL]ˁ)N׷f'LPtVjX߿S[[[JNH-[h8pIC 8q"@'O'NXlf]| ;'">x TlǏ3g^o…ϟ~|oPCW^E?uWt5jӚFCl)ꍝ,XB ;2gW4tBőx:7hРnݺA;֣.#&M4k֬C=zuw<9aĖQ&cU+55PEg}֣G@l0^^^ Nsssܹ3e|rlѢE ;q,lI"N/KQ.ZPJ&~7:utQ]Ν;[}m׮̙3ӱ7PIEoߞ_ JOj|QdU? SLprrJKKN۷o~gϞr劌cN<"NռOJ[ zu+b-]#3gDy@/o---I&$$ׯ_5hA>}*WjE f0ȡ ̟?=.o޼yAAA!!!III{)**.]$ġk_ht*O\]]xe7 >f̘aÆ3dW'Re .@t\e&۬YYfNĦMlmm1E0!888Yfƍ8. 4$mN5©Z>=y֩\55r@燤DOb=3WPC JKKIWUPXXhӦ S~cǎ)dܹsӊ+dnq)ezqNI>A3>q-[ڵ{)/ O._j5^)> jix:#G۷owqqYTK.8}8;ivv4WO ؽc}gԩo kS&?jq5^>fwy緿-°666e˖ss]vMOߥ)t?DM|Rzlcr0QQ ,09O/S}f޽{;99iIڪU+l٢4Nyg']1AƧ'f<1zJKK3DJʊ z*sʔ)ׯ_7P[|yϟ?k5^c*!wp &SpBxJJJJOO߹sd7n|2}!tH(xrRuZ1@$rJ4cOj/#< qFö?xdooj*,$.//OY@VeQFː9=֙сOO/^ĈKC`LMM.ޥ СCuR[n֭۶mԵx9ڵkz~|p+IMM%df'Ǣ91-BI;9b gU|ׯ9{CELd0`:/M SX* ƍԩ"H4Q.>>>nnnȦݻw N8!c*JZ=D| z5Jݘ1ci@ׇ~;wnȑQu M5^(..ܹs\\\5A?L=ˆ:ujxxxvv={N;w~'ebL̝,ԍOOͮ)csYbkP颟 .S2qwڥm5{/f͚U/9pppRڦ>]N^2+2s=JJJY{;mu@ZKCu ?.lٲիҭFc ҫWªAk&|"s'NlO&$$ 6"QNMe^Y@u!񞔯5ydo9q5.\wܼyWNǏ4hP```U$8;<֚ETqe˖cǎ!ONHi\; 9Rǥndrӧqf S,1jQA-[ 8*mݙ?>BJkYǏoذaذa!!!(܃beM:r Bh2HyܸqD=zʃٛ&dqS/'gܕ+WeIԎ?jߡ @:I ̙3/`3!155j9@ݹsg<-[K@Kd.D=w>i5Drg̘amm-Pq۶mkҤɯk@o^Zg" ]jWH4{^vm t$8!A;\*p71kg!S $dJE0)Qu-Ap۷F衸2azz:%666<<_A.}Dj>>>S 5#2|bŊ*>y{{;;;_x9mڴSS999Ig u%QLH\!D-I#ҀM&7aYYYDD(_`Yxqtt4wX/x Ok֬Axe&ήaW^O*mmTC?`mm]PPP}k JdccBBB/_nݪZ2(Jxn >)~(驥|/Ct}i>A/nט둦z7SOXZZ"NYVpRfƈ22rC$1foooFZZ,{1$ӂ+ >drOUPtݻZ\\ ?tN޽{TT.C&;;kٲeb **µkR$u,JZxxĉ7%23Etԉv6{옘 6dee۷ȑ#ҡʂO- VP)2 ŋ:ˣy󦕕9VFF]@@~3?xQPPU,2j4^zeff*M_0e|إKwwwJxZ3@]߾}-Z[P/^(CA,xPJidAAF S >Nz5̶l2p@[[[yü39r%B%1'*ѣGIsN ktt4FV;m+Wܱc[RRryJ>Js)_1$e'MD)9xzzRSSipؕvo.\hooOBc'''{C'?~|>}0j7@*M<<11P8==駟rrrI }>> CAQҞ.Mxh* 1sLE~+W\Q }ewm*0??:00J254ZqΝKc625|r ޽{N(3dwvZ@SeQJ?t+C)]zU('P(:<5Z>)} 96byw_<ŋ/Ywpp2eoގ;w7o{WOˇVZ9СCg̘q-5uP/_ܷoкKGz]'e  Uřo/$c1hJdEd}fߑYe_\<~c|;NQ{nMC7x^rj9uS֥O>sϸKWkkAz͘1,z> I:uj5L>xӧi>}t}/2t: S+ݫ ĂI زe ei%Y < 'y4v&Mо%᷿ڵk DgضmZXX(gQl_ .}|Qʞ77cXR9x 7//oǎo~Ek*t<Ś5k>]t33_ٳg=Ѓ>󜭦8s̮]MF_~P>].\xYu` 5kBT2O>'R] %N>VZ:uTD+П:>d\ݥN2>ٓRfÌoo(_)m~qa45ot)Fk׮$~ZiFd5E#H}l.Cob4@u|(TtIHQW\r b6 4042 \jԩ E@ءkosb|܀ܾ}?t(!"}>}ٓRr]aÆ=zԏIÆ a؏7o>9< M(ۘŨI]FI蹅y5jCe7ހ|+"儬Os^z˖-Ц={u~Gj׮Mo>1؃$:=A ֐E 92-'*;KKPx;x3]:r-[3uchQ3dpQ݈< p/@<1VYx4%&_Sn{ eҥ=@dl/j, Ȇ&b%Q'&2?T%O4Q^;.l_{03/o[c!j2Se}əލEg -XS$Ϝ9Cs=stig}6o޼N:aC'Ӝd<[˛soO.fƋ. e),,\nbT.;{N& 3gǏ׻q! 0LܹsÆ ̙s6p'Nr?1i$NY'p?d]̰(tZ|9ҧO|03ϟ?)tK,={뭷>dR? E"xYPP)0# hѢ=z?~ӦMw9i7N[O!DY.f+wLkp͐ds@Eq6oތ5!رcǍ[z=裏٬vGb|ٲe , Enڴi<,S,3W.2L ԗ.]ڻwo CI};vfN9foHB|!J\._(Ҁׯ_jUFtM:cИ'NHo@ bU>lNU֦M,wyG[wYug,x8WVX1k,b^8 ]r%1$߿S2_`<yر;WP@a:qN!>tYY`Y ػw/տnݺZ+Wя~t뭷֫Wu}PJayB$?ZJNfVܨg;I[A&~ÖAmf{-\D<ox"8Snn.DmÆ z(He&@׬Ysv0Sۘ1c^t[KNfB2ۑS(EBo'q,{P~:u h[ٓjXf{MH%gnѢE&LxDKp[3`bB> Dm#5w\8H@u.*Q{M.0{s '4o_nذa޽gΜ JyJZNA^v-lE5j&ZGD Cݥ 6?~%Kv؁H|{% >C6iҤVZծ]xLT<2pSO$S>_̶|6m8d=(!c~zKDP"L 8}hB9r/uV8B&7>jZ_7nҥKj֭ۿ{dˁѣGA:uI-[}6i.ħP|XeU> .Q~h@zŽzjԨQ ve~4iҤYf G~~s=j*187I m kO7xt5kVN#7z77tƜ9sH(&)G B.ħPRT!=}4ޘ1c&N8dȐ={I׮] &=5{là&YL8k *!`m۶cBFai޽{߾}vLqr,H'SP:0FҦBITTi0{\֓7]:vxCxf*$mX!Do|3 ?1 wf{0p&_IBp )r? fk8p׻Es`yf9 Y1.c/|0o3uPkİ7_I#ʥ`T ?dmTF xl1o }hI.C~9k>E|JJOW.l"k_z΁]`$Sb]ՇS(ڤ!qk:||{v7MO #ȻȕȚHdAV$RqOD|,37h6<%lAEǬ + tP~oO2G F~]a̿K `x1sQB %ħE&{ɑ%s@<`k$ʼnvG ܷVpR(!>;Yk2L%e1 9`;[o>}7ߔqœ'OAҍOM[PVk^{&kL&X%icǎ>|߻w}8pСCD>z(ErUfR† )] :I7l`SNA$ ٳcǎm۶mݺu˖-7o~\ʫJCA,83^PEt,7dlG(aۅN '_n 2 u&?@ˮ]@^{ ٸqu֮]z^x_ypeժUk֬Y~=I- ``]@Qh6{zgۓRE{&(~o BxfOWlT_|a9LƑ#G;%È7ϲe˖,YhѢ ̟?ܹs̙ d޼yD /_NBɦM`W* zwu~|]K&yw9$P  u p DDcnh3ħo628dL"\&ݬڇ]%W`- ׶m@uցL/F+˨Q$'//駟۷SO=իW1ѣGwK/C|1Gd Na.u&O:%W:&R`>@2^Yl,RWwUՐK͛1?f7PR*ܷ׬ T8.69rcǎW^y NÂ, 4ׯ_޽nݺuܹcǎ۷o׮]۶m۴iDLXBPI| `f=\jڵoq!Piybьw(-r7sre<=Г]<5a鲀%_e#3db6}4nVhXf 枈u8NuE+#F JA_C! "-2gkuϡTyNT'M*K[eD[E>"wbJC̜mrJG Z>kiժUЦ @[! p>;W_թ0/k;- [8V(jƄ+9P :%vC Mg&+a_r%@E=>X j*PVqVYzh_TvSM9f1]D",a!@4B91*uB!._j-BB!\uab/90#&HZr;wɓ17ov.`T5^ޢECg&ͩ PJ5͆S1cƐ\?܈z D(EM sAtj4G+ݸ2̈́\ȢB|bL2l<>%xi-@[l5E~B؏n1&:*: DhPha! ڦMVZ+o?)&^׵kWl5RT؏0[曶)k5iAAEp/$//qРAXDx$C* R"gT#%ȧ`a he M*fdC|gMf3$Я 6hLj i̙R'j-=#HK/VmhTۄUUƇVO;h("z2dt )u Yf-=ԩݻ7Tx|b_ Z]H6tPpHoxR@cL'#7Т+jU i* jҨ:9$>V-[R.=?4ԩJ&Lrlq&Aˎc;06UI^| ?5X@`Uk=0qwٌLMU2Lhٲ%&^ڵ4i5RݻwHQ <>Ƃsp*>}ԪUo;nwu dj׮yfi((5p@26kj:*p]wVX`h&ٵ`OD*BǾS6YA'g{GǴ7$Z,1]'=*rss뇖CcI;w ҥ E䠚QVͩa2\2(´Nd&n +U SZdzGy-D}  %vHMzVڰaCQf (pEA8# - $;(%"R6("e|ާB|*%?7xĉCa-^l %THrXM6Eo` u}4&͛7j~ #pխ[7P.m%s.s2)Z+J"7vSE) ޺ukaP@.xvj իYJ]# U7%HTzXfJ `> Թ72plm1.D.6YsVb|ЋA&0C3" ֜3#_ P[E(髀Jv؀v>\؞s(4Yf5b³Cx-Z*<;`-`t PL,[oLF)Zx/?0T aФYi]%FKI?e-6gI B|*YgId4N7ܳg] 5ǘ 244&(Cf(Jr0 c0iGV1:WM`&ZTa3 AD |(f'-$ [ 6?t=1Jy)Q*o cdBjխ[W t\B:;TTr!:` AwpK ,6ɀqc1" uJ ɓSLUw͈1S%%( xhrԩS&N!rJcǎ>H޶$rGbnZX3hnɁ›GP`b<{R*o0>]D'ύh$2{|H'73 |m'XA呙Do|vz|Wȏ`c|Y=+S'jBHHHHuz|X7FzE?̼~S5'*DyWy߳b U,Ε!d+|stiVC q2s;zhC8Q:Y!o*S~ۉ@͝Xmko+w|֑tu:^XG3m+>V#OGNg J|?+AGJSǗNnˋDfP'r}lU}~hxϾ*rΧENXyWt˝nX|SnRwc>M-ͽ"ڼAL"¨)O^OS>U֬MguUg^_*UyNW>7gVtǦu}zV^7 O{]!4Wm4[kO-a5n%W(VDټvb;\|Lt-2SknZ<5/c].y4ȿJOs{NjuOl]nq:el^XY{ޫ1.u੫Er6>ҝեw Gׯ#+Yc#m$h/N9<V3d+٩n^v}Pη%sR+vy '~ :0ƖrbU^м.ș k8媒aɫ$5]w^Xx^#'n:m+hߣ|ٺܶut&gVM" +.3OI:鞵\~wFιꄵY/ug)A]~Jqe/,%Ĺ+ܝ8kWHVƹ+].vsʕ=[3ӣ_gmr8uuf(!tH]R5Ccx?]*RKTK4Y0xFӑfnoVX|j q̳v53Ir-̐ݓ=?7dhjIuƽWq<܉;>i +.Wd ghYܬh?Q9[GS뎜ѩ-wq;٥7.{Ne^=YX/cqYNIW|>K.RK/guӬB7'U/w<[:r"t=SANj꥛zzi׻f׻/M.tJPV; 눿T7U/x79sݾ?h]:1;[|箜㎍|wӥ һ59qG]Ή^Xq_̾ .\鬭̉~+Jv*}iWo/Ev俜JΜz3ceWhf;R,^^:sJnLmQK _}vQfR/2v~e8Nrf{s2Э_[xz5.^d^FK [/3U/+2K+;f^Y9]e/­Ys7E+_z`W=z^%zuKhlwYK[/#xn əͧl^jGSz6vEhlw2{u=CJ3X)kOX.Y>J-]1 Zcw{1n91+k֌uŭ!wwKֹ<_GsF}D%ڦ+Y)nvJ?=W|_n{aj]:rol_Qrs@?Kn{sR'm#])ygӜq7?Bk^Y,1q"G=/ɷ.+=^[HM?޽0{w{/a}V]oa=gb͹I/Nw5SPGǿ~n GIַ?|خ^)kc+H;Y2ϚH_۸%̹;ze<^r M>Ҵ76ӥ&^Zg>_g^]g޵rYux''[qEȳy,/rw{96L,%ig_ӏ Skyn٩vc:a~]g1]zٍ, /,/zG45%ST%+vӥ:yi_^=yɺxcsO/}c_=J2UR>SlW/]Kp@:a~}˘t K&TϙcbWwugBӥ2mivnyavyޫysG_^Xq_y.uI|N/rĨuyNhr~"}u=^]z{|z~W]1`.weN7%by|W>/?yLw;x@=4^R I>;Yv kp@x< py۳Nt'Kcqr!Hb@X[ϖd;uZ754)()%q0$&ab~ v!mBS Iܐ}OnwoO;Ki{{;)(i2/-zG~N"gB."0^?+޵!},lSH- 9p(T!vdQ]e@O:eC"D W [zg+F1O@[Y򜗬xfs6۟o(;gUZ/z+[DO\ق\gU' qrWw9TN| ?PoQXB\pG=[s?'6-]Rs%>bz^L|@9hXNa`9_M޷m|*\T}'x^< ]ptbBU@D9΂r U&{C2Ucn8Zu pf E2M)OՔ\;8;GjO&':4Nxe%'E}UWȚ W*g}$a]9qʻe߱.sH FWX۱=^_oŏ2|~W|lѳ7Hpbv?> ;\&%=hCep r t/J\=1DQɑMt? WOfT7G8l?`i#?d?:53}ϲoQ-oY h3v0w~S>c;#%} dߩBCJ~ dRSuʻʎ~e_|Fe^m|My[ݜ)Fbǩn?=D}#*A솾x x J6#~ P~ K#쳒bHE1t&Nt|m_:GԦ?uS'#tJ[,g)Z#X%.[=OSݿvyδ!Zz4#ϳ˰T =^3td3b^ ]L9A[ 6l?aU,;6bɴ^ Z_nY -mgk9j}χ`X hApֈgv٢p~8.d~6OBdu rꞄ떐2{u *hA*q67T~'~([_| C!>V=-Ҝw͡u}|?5(t+(Xs4h/wcx`LT_,gmhhG\/G~pn5v{nG=3jWCk l Gؿsl|~{@x\79 ~Rg˥Ʒ!d';=UojsS:v >ؓs7-9=W#>K+d> ~ 7v|Tr*@j|v-HV+3=ǎJ4cnU ZKĥ)!8=?ubh lMi~(S1bҾls _ }AG1b#vmd/CA{fegott)}kO\ u:YWgd ڋmjSh[c{36[)769Jumne=诡a< ubQ>imsxxo+ALGF.SBkEY1G7Ol7XӑnmtN8zM'k:'.r;k:wz]>7^6{\' Dw Խj;=sPv9,z';}ʎ>e_,PF`Ȏzo1br Uw\Fx`]Øu8>eaXᇘVZGM!NϋZC{ TjO My}ʳ }dJ//Z/<9^BurPr~|!;o:O'{i4CfP۟eq$-'zDE}%8ӎ>gct+hc?)!^h2YRs,?Ht^a2m&r,}ek}Ȓ;y bwz61k1 8x벎{-=1GRZ9@S>#e_ d>> g菱šgSa^/@*揰p^ zhfx5ی\}Ν$s :wT4a9z/`#'>2k\1t0;vc\$MoNiwfL טۅs,26sT͜&K'*7>%\]<{@&WwйGD<ߎ&x.s17*=̍\Iue4Wa^:_@V~!~_RPg)=q f2e³:wԤ0/V;eTxM~ mkh.>v6oⳆRG73];.}\!{Di6}F.K bWc[$gxxK> ky|= ~d/[?]bYDK!ؗi)r\dSOsHr}> g{ö3ިI_|qذ>vwKzv1=<ezd'ZqZuls^PTqΟgK09.yYu}9ԹY?":+`,;:'ZFul Zx6Xݣ:|}]tZXoeVyXzus|bɲLd'Z V:~(Wl |1o7}hL깮[~pGc/p^knon&sg,_ u59o4&`ղrl*cJ_d2:'Sf6lN e2O72=eCdc3m -&W[pc~u8~NwӢ :epUs\3]zSh׷ ЮqƫzSv`E>4&;Zv(}Q׮wG?5vGcۣ̮]oN7wG̾hvLW2kcPwgwe{G^]gHNNk<;ߙ7K+[`UQZ*|֣y>Mu/?g81r[\C`r fMSֱE;=>4 F׫yjJ>g8w*Co;eg6T>}φOOm`y8-7ŽNgO,쉎9}@p6=!5rOha$}2opa6,Tm< \˕}FV[ّɾreƪ6E6Yd슩F3;3짘Z)r[Q`\ͨu6ӉO'v6Ʈo!x y+:at3-O[ 2< #Dߍhi:}wGv~-8ί}L7ɷK,/p}Z'{_<;-NT]}rHC`KKm0offC2?OyL):'Źt &eT2@Lp33Yh,M&C`dKq7`g!skʼn1FMo$/^dO=xz['Ds&b Txf%@ƑF ɅP~|C`-v|1j~Vݙ\&q]8os|?KU-ĺ)QoS~k3܇}Ls)W;V`{v92UaϏ#+ <ܮvshgDkgӝ}af5z=uJ9s@5p.vTvd~͇.4ib"_J]%/H xϋv:f%nl;m&+BKk+m&M+{=^hw7dž?[Q\? |UYUkiV?5ԅ<i..<<ͣ%LOLW~3;a2q}dÜn25ؐNw?s:s_1{SKƙ_X o~\+u<&C0[hi-rX :X/%Sh'hpn֙?D0#:g/vHZΝ" 1(CBܷ%@g aƞ`nxq𬍤ް ΁Cg<.:'ZpZuN\SZX4Szu*;Ęj'|p3yv3Sp.ZD~H > &fo^?c@ 8 )zP^xģ{^'Ni'wYiZ'dp=x\p}/{srUq'l{LOQG81NZ nUx$yl`ϕΚ lPq, 59l,w\?Po 2<2?Gu<\se+Գ[\cɺ[\;+znϗYǥpgLyV祀w/]Ryמ% /{.eWU&{Xue7nP#' }61qjne~BBDhr_zvrY~QOѾ{PnyP[~h _-(l~^|)vyT{2T?8O/< +(^3 ,u ۊ6D$Uw@J=qo*edct}a< A7(̓o~<?!r<`c5ZϿwUNSdF'$@09Z7/PqeJ x^}3^YS5D u%cp4oCh?KG3WKgy]\63NKHoKW I;ط7DL7>1TY8ǽCseJ"t9+^|SyF=| J~YgV?A[Alsm'/&;rNRpLd:ᘘκpvh }Ѻjp[SӉݡ'ƅIF 0ojnOxgWST"/ [8u\c y=q܏e+;fّLg7e?hs+ԍ]zlKbMqyj6ON\BeqvՍKV=WkWs$1&,dQ\Wx(B]P-_s!_w >k_jjىnwgcxC`Lo> Pv''>J0q.H>X^4iܙU=q~__%@˪k|E[ xAqZ >\0njG~, p=dyAC bŕ=0ʔbepjkb&ep(bEi ݉g0ɹ`Bmhi\8G?5G*u$}JǛ> )sØON>HIQ+d}(## 7{"A.5WfVmfG3L&{~٣1{Vؐ,u~t򣉯}sW=#|5_ٱ+{EVZ=ZݫMsrcfrF>Vzgc  fzh@ZqZgs}ۤYg\S*Okh9p`> z͵PY_xwIw=c7peTn1+,W3DL+;YL+,Wx &;W[!i+/έV]#<3"=N+==O|YɲL\%Z6p)j:2O;̇tf_U83ϓBbpjY?}0kD s@ZO͔Z,V;kl l!~ >Ή^޵6{>&1B;tq1hD̜gEop|-_g/ovEֱpȗ5|loNvϹ;1n`!F N_Q.] ̃ 8 98 xڭp߾E@!w6AV"j6SD`G!S 41-L EX*tI Nu,?NDtZ3QGpv/}{]n?}:P1i 4#=qYEXk.A_HZղa+O- nO6* K/nXٰ"us; ԊR=9R kMSr8yatHj$Zڭq!ԼGFLPe_b&ل g0CeE=mg^[4~k'k%Ѻ:N?V1Yc>LX]u(XM Tع^&Ύj>_NnK˜5hsF[wPܩ[Nab.D",t)/ApvWRՍR,lXҜ#:CZ>MߥF`7+ݳ=Z,[ H1&*R4&9O$aSXdf_y'cE Mkw90dFP Or+"ҏOƧ1駔c|DHO${;+:ь ,53w,zIXYEvzk]d<)C]|DL%n³:d [,_?DzQI^|­BGr?A5ho|_Bg.`%_K`/9#Z8[Y SkVWxEY?#&Ut59LsckXaA趓d(1՟v&Bx1f3sƖ'Uv\Ku*$R;<mkx:u 3Q%VZ{=#\nKao&ϵa/ڗHmucȎWv`v*Hog5_qu!)ƽxgIK#[;*2L|{(LQ#L+O³0EA"ypg2mc 6sv y?k! V9l;",|B1J/qDk#73I;~PI$Ny $<SI6aPHI$&*'ᑨk<۟%99h"P >1Ъ'Unw}LfM0'թVJO?gKnm)ݹ{ˡwu].ZXnE[}eѳZ7=j_ v&TO.e!b7 ҈XBDs-PZo쟸G=CDe[OZ1J};8>´2 a;Z(VKlŘV״wY6a;liLo˘)i/cz2 j=Iu@eIl$W"]k}=+\7Ϳ; 0=^55;9e?mLs1Y e4|-00Y mvN.c _ -qs4˷&y{H۬]#Q³ H\o˘Db <<sIJUip.Utܓ޿ÊY75X;MeLiu'l/ X6aR?b}B>z+>q}DzN~K*m}5ݤz_UrzlK1 }D9wpm"^ݭiV' :p''͆:fī!η_?qE*J)9[1&Uf~2s*"[",t*Eo2>"~gA;n$qR:z?+$ov#ѐCDb>H+zp#3?Lz?َW+*Zaz_´aW [_]ƤW 3vx?C8}⠭+ƤT>q^?Q^G?sf6b]Nf%0:)kW%q1n Nr"&Vvԅm=JzZcoZ#x0o{aB c^a*^U|Ӵl"ue6[k p8K cP=`]p } u%V?{Bur"zOx|T\ z cy=N,ЕB/kyJz>(\gB(U{cy ƹ^yogחx^_ٝpXJc_=,B܋5=GE?Ⴝ>y} Ix}1'uw:\³ f^\Fxz-WQ;Vr_뻹mx)7 _5B66fmZVznWRb^Ox ]ymvVVehom~ob~ 7Կ_ <7+?Q9'ldxlhc9Syή~FS:`!Ҏbz5LjIeH,_-xTYmut3zuW,J-e* `PETP%  *H"QbX*CgjӇt8}֒qk~~kMI_m&ך4ioҬ37`ʿ5;wj`Mo+_54?>nr8Ν>?_+O:~M'%Cr_qV޼In|G\/֚ɛ&vlRxEM?o_ן~O_?y?nܸqgϖٳgΝ۶mKOOOJJJLL\j#""/^p¹sΜ9s֬Y3}t)?ԩSMO,X.]f͚uqTذa8ŋrF:tƎ;qDnw @=88xaaa _W6c?7nc~F1iҤq_===7]qs6ǯ]HIII,6nܸyLovvݻ_XXxر'O;wڵknݺÇo'EDqrZ*4>%/ˏ?w=}ѣG۷oS/\pԩG:th޽999[l Je ̙3:iTѣGSongg7<ƌC%P:<\˃:sT֐v8PLLʟcŊp:GUf{N 6MȀ"#GW#P+>~xn³?~̓`WڹKC a[+++v/|W(Ů61%֭,~XisĂU:777??%%%TWZw/f "YqPr@5O$E2E?|7_~%"EOdSYYEs߾}vںu++zR `&,-Zz@ufu֢E!όbW*+H}P!RÅ.)͇ҥK\Bÿ$5i`yp)p\8߷o_jҫ(͛7fff:ub'R[-7o[ZY04 P!8۷塞ihΟ?Ou1Z3N£K) iNN)'%%B駟b(GH"iDqsI 2uܙNBP  ~`AZ<¢y > )`5LJDvFXE=W @(FtLh'-Qz裏L*1Z A,6l;DTqn#C)&5%?"ce1*5Z ݌!N8Rbh*j)*i|2Qt;-Lqq1B }u{P Iҥ^F)OUIIpu'L6'ԳgO;F5*krbفL*ULUE~{m~AEt˃ݻoi=s:0^!Azf%#nɒ%45p;]EiqU bKܹs)Hg+6ggg#:W{\CƧ NēnR8Qn޼I‘QLk׮MHHpppE9rW[w@xʕ+mllzANmddp-CyaHH˗/P-_C4) J3B$Qaaݻw9㟃Γn-&Q2 ق .]lE7#G B)JΩSRx(UcDH14>UI('D88p@:6oތr՜{ML󌭠cXd -zQQe%x.ϟ[ښIm9qhvMuDP6=<<(q GZlӤ ~w5Bo`.:j߾}QQCn?DZhQddP*99YIQfP(r2L;:Jӫ%z0N!9Q(t%Sv⒘2' QSRRLOD ^}Ȏ1يSsrGj̙CiA)&222xRC?~\ QbtÒ  ZC8]zU$}Nٴ4VjL k[P_~T-z!O.;oipy666 PU^PPR9׮]F[ӧQ\&$FO轲Q& RDQD)N:N]v-Y8Qder-fff/s#a?kC;7޽{=郿J5J xNI)R2cDQh!?^>)ԒPB&_~_,@``ٳ s6'O 4ydd4y^x(m_ 2  I}v>ȣZܹS~Dvqz` 4rHh)(%9)E!!!4#VZ~͛zE}6ę̤($I[aIhҔ@&QRPN-)) [7gΜ6̋ S۶m}iFF}ռq$/2-prrիܹ<0cƌ󕓓ã~V* ^}dvvvٞ={Ǐ=Z9 [b^/==;vYULS\{|+tՒ - !MAL+WΟ?I3 pZn4 T\K<ֹs皛#!?~<55޴k׮cǎ0`ׯ߂ \~;ƟdY6m7onoo6(lC!|+±ZlS cƌB6aRÇ_$yfϏ hRPQ6sqnH:d˫&^F>elL4?b yN J$iݐ&0!_Sh_Y Sq|G}JKKtҭYDA6Hg=BQ}'~Nj:йwoIPDʡ Prww@rAԆ 233w]XXى 7v qbIIdR߂%RKTeʣ&ʂHz÷mۖh'ʩ_>5ܾ"zdee|V>m:$$ऐ,TtUܸ+@||)8K:5.0dIh`iݔJ`ikYM`ʔ)GK!44"e BkJ|rbb D!O#G(Zv-|{찰04o5T/]NP~qdZN}Z|9XZh` i=<<&MôO?4hZBN9޿kk묬,#rҜ"jǏ6mZ```hh(-gRR*uX\\;E:Ԉ͗;Yyn^yUt=i).E6Q|6nܸ~z$P(3gKSNP@z 8]_|Ŕ)SƎ{U)u*(K(69oii93Z/AKݠqIV~<|P^tIkڹs&3!,x{{'~"hQZ*MƀTnѸqN8OPj]ZTFggg;p.\0:::11Q&pϟG2V5A#Aw'!C9'Y08AL|rr2yʕ/vww777裏w䄳W2wtj„ ?mdfC#GGG\=ׯ؀Z}.]:c >kfҝ"QU!J2k56>>q).e[n(Dóm۶!C8IꝨ(YOٗ;wZ= >{|xUm%hUMVD|#kW.\u6l0788XCb (F%CT#䓈''_53N2255$0Ϗ\VVfHq44l0LS L',,]vUipC5V](Q(۬{(1zdOY;Or-Bܨ3d}Ǒj`zbb" n޼Y ZhQ@ggg*Hf͚ѣ_~ '^d^B* D(2{Xy0ݡJl\j<|F;`L$Kŋ8ݻw$tVcxA!lڴiZZ2ͭu֎C#;99zyy" 衢poߖ z_}7|# P']9%X@H;S9;t;I7iҥXv:OI(Zx̐,iJ/@ڵ{=kkk>`IfVZz=QQ%%%kQ#dOZoꈬP)F1꼑Iuwv8SNyzZ/#Fj P1k˖-qc@ֿ3fкN2eԩ666<BE"}J_0G9xϜ9.\+J )PɐN5`T#tˀ'yg}iܹ x -5.'p`(7yd>0a|衢0bBBBT_Ԗ-[ ~YZJRwE=|PTB)QTTU8;nqn67>z*ѣغ| NZ42dʕ+eNQN ǎ zP,XaÆ͛7E1=PGոq.w#Ӌi畜J鎝j8j | tů_...IҊhZ4@ AKKKP}gբE]v7?1bQ nݺ,6<\8q._|5@u J>'I^'s2I0Hpi6OuVM9i"88cǎeeelC/+MH= rÆ 0 yXXXLLի7m$BK(%T.^xTĘ$dL[|9ywBZYYfa(F*Y[[Մ L2c Rxb(b SSS7o rrrT UII FܹsrJP)Ս^qTsT㓂)pn'yg'qqq/*7ZԨ~-ZԡC+We? Եk>}@)4ȑ#zӦMCHAyQ)]Pm۶ %w頢I! NT=' .']٤Vb['p}XG̙3_hDҢE:g˖-;A1b^!5ydOOO@߂ kٲe 6۷ڵK>SdcTՐ)|`{U){q]jѐɓ%$$$(˗/wpp033izvB)E[=uӧ*Zo}(*jժD`)T>]9uĉӧO }2aFOA)O%znt8vjp*++C7p2JZhau^Һzmnnncc%7ec <<<}AAA( )9CNefffgg݁ .\Q ҇.oF'Souͯ 3tȑܞ={rE{eeeq?nݺYXX'[[[,ްa@B\ǏwuuPϚ5+88&-r*99yƍJ|J !`Q/OIu8k d;d'7LscƌyQ iEmZlv__[jչsvu&}})}2n8A9s&:f9n:d` 9u1LZ w-< Ud~>*I7+G^I9pWç$kjݺ5:tL=7oEÇ50A|?JQp|eee/_y.^߈zq|8<['I$ d_dv9###..N0Dj_۷qW(ٳg;99(t?ih`ڵ+WLfff>ɩ'd}|r*{@NqPjϞ=DH9sҥKx=QXo].|8j#@U'0D^^w ̝y-x>qYMtttɘ]vU%ѣG,Yfi@&XOS'NtwwT20a…|%**jժUP -C!ŋ Qz*^t\QN'7x˖-k֬AQ9k(gԿ:.p=T! jA#0hР!!dT,p$vرb$u=zVa敮8$Q@:1(B6q.]~BNi_F}9r}Z-@HP򓒒1VVV(;;~Y[[(;|pN E|FGKbccR6m䋊t% ˠp t-"rB[fffBp4o[K?pg0C>}tԩk׮h)=@N7J!{111 jƍ|]խd]54Jwn*k'']1e.ĉ)//8<:nʕ`Zc0-Jo2"vݾ}={[.55)PKkر>FW9sz˗/ꥧCG=DL!D>}V`z°` Oƍ2rM8?~N$yD###d\wK}6@6lJK+Z4 >n://v{ԩƊ^gm B ˳>|8Z ' խnNNξ}!Q \I~s c{|y[Î㢗,YiӦ8֖{ӫWB>1T  O>NNNT[-QPEDO{5yd_ddUd]Y!%3a$3TKK6N]DJB=/>1Iu xZ}}}',Gi_TGPVj5?dkkۣG˗85ss 6ZNrww4`q d] ώ;d& 3WK)=i`|RI dO(';m44ܢJ[oApk::gGGNJ+HU_Y‚NK^w߱ &?!PN={$aW!fW"@^퉊z`z.|]cS Ȕ1رc!}̙ &X+Z4vW`So%n_IaeeW>3NcǎH+D?]5}t,Y-3apxؼ<5X, QR\|M"2\~T./]-[re۶mO>"n<==wTF=> *#GQ(*s)3a.] 1[lAH8pȑ#2X&ȔbQ2̼'DC<%bpp*úuaZ'-x&S[n~dqؐmrNOxx7|>D`dĦY>}epyșL2EsȒ999f=P8;YK3N"tdhq`f̘160;hѐΝ;^^^'"p[Ź!7qsoFf>-ZlP-!voƌj+V z;v0 … QhtR|RtVB<=~=c呻PMZ4䠦/--V/3ekko߾JC7.>}J477JY<<믿%XXXFoĈ~~~0 #aޒ%K/_&èzϟzT>~Xdx8=x@ڝ;wnӧOG֪k>|8"VTBTَ;^vT;;Lx)))oc'ٝ;w7$$޽{pu333Q.] %gϞ׋j欬<(nL)Vcu_U:ƦʍSYYى'pӦMm{Ϝ9䄰|nsТVA5j(- w{ҥ޽{{{{9E@u8n_xssʒUUam&SuT\mA'CLhWǏc[}||8_#7s#G6U -Lg&Oyc@ndeeuQULC&6kժոǓ'OQ|Q&(DԔ+WQ*ETz$2,IVhBIu*q/JOWWWW4g„  Nay@JJ={RYMMb…8GDIՂvݻwV'(v͛7M:D9a\\\^ yDE%$$lْ[PP;4bN8J 4OĉZ+'XjM>TK9ΗkFw_iӦV .ۀ"Esc/_><֮]kD*B-1ܼys=v*zU!,,\ _# #8C DEEFFr7233ep(Lzuj'սKju( $JSP K^uVڀٳg_o0f'|#caaAymۖ'Я_}vC[] ^׮]ϟOuP:ܹM۷S Bhǜzq(c(qVL"ʁ%Xđ!D &Dڵ+;;;--\-Z #PiĪepp0&** E9+%WõxeJ4 z *cVVAR@ʹifÆ ooJQ Ј#Ə 4qiӦSgڂ BrGK=Q b!+O>e=z{n߾f\& 7e7w}1)\\d Aƫ3>`ܹs14[ -* Gf8;|G}RSSz:o$toX9$ o:}4t=pы-1YuWXboG3AmDVQxg9r$xpܼ|jݺ5H;v,u\IIId[(2d$ÝB$R LbWnr&%dH _~`:;fLyyy49jzΛ7/44ѣ,W0\%gXOKkE5A"vܹ^S_u꘸~B⨺͛ǐÐ!.B2Yoܸq<((h… *>>^0z nP!Ǐ#J$T|q'tB&9$I$:ͅL(sR&M<@Y#kLTMpV{ 7L -[PV\9|7>cvZ$ի2>j ᠻ.I̙;{z=第SϞ=eV,Y9s&60""/`SQ!^ @qyJB'e%x:1twy}I$={`diDeŊ!!!@Sh' 5-7h -U-^TP)TG19߿?uPs;v>GPy۶m H /XPP_ꭷB?YXX`"*22R,dJ!J'5@o$8;;sLII ׇ`P`&\llUoU{T#F1%K@Jh&L{Q9@98:":{tZCXY[[#ԥKIK^^^IhJKKnݢF?}TT'OjRN2M`e9M޾}&΋.]BIbNv'sӢEs?-jq㨚/4$˰a߿o׿KP),,A/ao9'N&ɓ'O4 T>}ٳ" عsP=SW*Mz)|e {$222ne`… @'Rϗ[vN)//[>4I-0Xk@ ~'Ck֬q:QQQn #ⱐw%+2`!>m4Ȅ;v,L@` z pN> [f=LvUIB'+pjdVkݺuD L+C iv2!7n4\QZn UBX~_ڵe˖iiiF Əf0".ŝUˊ=0FOhrn 鈚8q"5kHT4NAAX< '**Z@c!ݻwyϟ?~8~8mٲ}ӊl7<.鉢C9Co*7iܹ7m#@#Fv1btlvYM8BVƍ8kk늝UM'|bggP-IJJB`˅ nݺxIe @B*ŋ9̡#^\\Lܹs׮]%[1DD8jFK"!7L`z@T$T?yԎ?8??V_D; +pj6JPռpCEH1xѸ/޽{;h _.UI-ւˠV\\\XXuVBq~B)Y=<8'Seٳg088.QhDK;gΜN:'''7ÇبZ}Kט$Zט_MV3gƌq>}:%̤uW'NW]LZh* oqK9ޮ];~s=vwEZ/ƍ<a1112 // uu'OT6~\I=~m9xVVIl[Q"fmRlbRRჾL)pB "ҧɺņWXlʕ+;t`3 [nT'oCi"{̣,䢛˩'vA.,, ;kHj|kyh#Т_Jճ;x`kˈ㢊-Zdkk~?|ᙙ> ^Bq'%|󋌌Rq&|[̶mfZhJ :T+>Kzތ|WF=bĈjQ=[n񉉉d~qvwޕ̾J<'ִi֬YS357ےJ -'>I̞={РAޕGEEJRp222@,)_dooūbǚ7o|:7|4Zhc֬Yݻwv3LBȺlľU 5xD~t̙+Wܾ}[w` T~֢˧޽{Ϝ9gz=UAf͚AXiEAiݻ #4s&N7\9駟.^xСK,۷ԩSj 8ʜsZMJO=ShcMj|B C A4ɓ&Lpww7bY$eܹt0gsb233wڥdG!ԚwDg>qR|PЙ(=z≿v `@ShF|=%%孷޺pbB]͂#GɀYN MV'6O...F0]u'-0O]t1CF7$yFF/dȐ!~~~`gSL֭[z:%%%No5N9dㄆ2-bƂ(S>liio-xe ~2|~KIF :Ĭy{{ݻwwtttss  oڴ "e)N̑Ou$/$ roE!0(:Ğѫhr&O|#&NcSnn.|:u˗e)Ssd@rv'ޚ-Ȱ+Vlذp~ oXXY~ [\Ayhp]һwŋqW?TTKqƍs$'''{{{DDDT'u̝dC+-v! \:Yشkn˨(++Z ԩSwZhQ}PǍg\׶n\v 8{Ι3kԨQ' OHHHOOwLIa 1w7o޼rJvv6D0$3}zϞ=;pJϋc4׭[gaaaA -K*]fsrj0 :vTo:t_СaՄ ̙.K!`BP "|7w;9A"""<_T:j 'خ]KL\A=Z::Q 1$]vju?4ߥKTIw{?x`KKK{{{gggO@@E8$,^~~>nܼySwtAU' v}%Iwz]|Rkr,h?Vnذ7ި,r<n\TSUuB NT=w\Njh7X%&&RC1nSNѣBEYf-Y$..NVQW\2OuAIu twш _%ٸ())3f㨴ТakkPPyMF]۱ؿ^"## ʌ3zO!yʔ)3g ]reJJJvvvAAAii,(E6O~#7WeH V?M-[Т1O?Dn֬Bȑ#C@%Q^H~I3Nz`0999]tEbŊd' >f===1nGq|$ӧOB|ל);ƾqHݻW+ZR+F6lވ:իWe3p(: qppw!H+???ᓮ~%$ź!DpӸ,}͚5?|K\ʠAƎkB)Ν;${n7n|i`,,,bbb*2xyyKMMY.|'ݙwӟPÇۆ@'.|}}v[$mo޼Y-^ٳrȒ%ijѣM5@ԩ8qsyӇ WիWӎOKKq*O2EZp# \ 77y4ם;w60/xnjՃŝ0.ӋZ4?CYY|kA-''M6۶m3 Sݻ]]]pGؤM6aQQ_jjM |O('.(#  .|F?NQb:u**3̺^Z4S)/^jBĴ G@'NT%XbY~~~UDz 25!SLƮ<)U^ cKi5ZDM4V3EXt@+-[bEP^^^uϦ֭CU:˫FsRRj~ |z3?X 0 f=>, UdXDii)rϮBZq-u {<TDuFT ߿=TAD899yxxx&N:,b~3*H(ݻwOHH7(..nٲezzqԩF=Vȑ#[`fW+Z4ZbLYy:#aÆzV^ rƌ~o',Vbb/u%p8-/>Ir_tCBEEEu8+Mnݺ \G;D./>ܻw5kTZТJڦMO*ڵKoOpmyٳg'hʕ>>>K.m۶mϞ=2N򏳓ZWӻwʰ'OjY*Lgg 8a*5&322t1 FG$=9W`§U;w9cƌI&k>q]Z%4"C5vXAU̒Im;FD<_>//Aey7ol8p$x8ٴg4bGv3SETOjьFy`:ҺSL9yYnܸ]x  Hmb-^Q XU:j`S(n$ՍJ=m4tAt$ߒrj;YAT-trr s#`)i޼yVV!'_z8'֘J -Kа1QIIСC |%' pmT[qxw6nXOOد_5k ZhB'f]jSG RhH:EW _EEEŽÇ>}fT*.p(T5OصkWYzedɓgΜy'OѣG5ljҤI*z왖fZhO?޽{ppk&yxxt Xbl^^^ ;y,lदHjK>))#e7@ JIB;v}mvȑ ___~ä"ڵk/'-^(cRiP 虳LpvvNOON;vqΝvcN*OS5/ƪ+I/.ޗ_~B ep|={,WWY<்MJJJ}*ztt'|]p̘1Z\B -^(++Tʯb@QQu$NmQW;w⦐Ms΅OV٩q^\2'1hbؽ r'.E]t1(?իWB+'8A- 4OuQ}ǎ#**bqv$/*dW>鮞@{''Xڱc7xm]PZLA{K{T6o~+,i O˖-s߸qCҧO&>=2e L4t$gXX˂ LdS?ʂ>}DGGWYnnn^nJڲeKnݪCf ӳC=y6𰵵傮_twwy󦩄ڊ+7o~E\krCV ~+KV01 'Srr͛wuAI{֭?\ҧ:>7.'UQai H2_~&.ǂ'-^2sGe~TƦQd'Ǣӈ!;~hxuY*>Ww d֭ې!CEEEF/ dJ޽_%a;vT≊&ejuٔgɓ'%1Wjή|RD| z街wnرIOH㡍zϟ5jwTK%%%:u4( &XZZf?;ps)lxSFDDݻW$KܻwxR11wF0>=9bΙ3gժUAe~rvvO*.]/ %qvvޭm-{P_(^5Rg#GV}Gqrr.FW^j"V$ `oyR$$kzFW[H/v 9b^ှ%-ZXfVh@ٳm2fff >Qs'Mdx'oƍUqq('̦+K1Zn|"d:޳LP4-64ƅK۷o[[[kYhqĉW@ÓYA888Վc-[ ;~8ԩS4 II-y`kIJB!֭[:Mu7lЯ_?\OYPP^^^4<"kѨ#--wٷo_U)007ިM:t0bd+.$ùsRRRf̘zСgϖIV̻w*8F3tIm^() [~=赊Т!U?,,SN/_ӟ'[ogEN8ZF[wJhҍ'OlݺuڴivQ]'>-uj%é|R/$C×d7 ڷo{Jtq-oI&7NTDk111}=KχPIs]f ߟWRR"SkwY7 hڵܕ+W>-*)P([Wn'c;9 -z)lH6k֌PO{XZZZYiEҥKg\U:*-w]y`x .@ٳ\A)V\bcŊ29))j 7f$ ('tb,&Q|zs^(Iy*]v>SK;99@-Zk|4֝՚9s&ƭ]v>>>{Hр pڽ{7u[VV @Zx1*((]O̙ps_~%@B0=x@3vN`*T7>H\[ =Zǥn$ٯ9H Te˖'A;GH-Ӎ76,44%w! IG]6H"zq=<ər7>>(L v„ 'NWiZ4@I^ _ RPP `3!j/Trw=Þ<-ot,-jy2,%F˝1cСCe<x:uM6/ M;@LD+Z4 W^֭tPAATbHT.t 8poM̚q琔B# IR2t/35<QYcgwA0Fŕa7oތuuu]reDDz\"($LS -#e2ŪU`IU|uqq|2B'++kڴiSNN'$ýJ!$BZNp5҄M&.ԛI… |fɒ%111Ғ&aaRHH… 2,,lΜ9l_>N`N(>Av]UtM<4CU_'Tۨ !{*СC -A !Thh+ӶmVTwuSqzbD|Rq(>y!Lztq7qykLYrxÆ HS;i'lllOU%h={GZ1ǂ lmm5v =O>k֬2ҥKZ*&QP(6=ʑ.JouJǑ\.\0"T<1c8dZ*d973gάQSqAuvieMɼkܲOZ%^ꐴ`#55DoJKKwShtnnn^BТVߠ߿!kN84n'+fǠ'B)]PAke!o2^lB\xG|-9ҡCKSj-- A3pý{HKv͛7ҼLRfl'R[e%+p;aLrr2V;wlڴ-[jܒ3˳LHH.4vʲVQP=zN*E <2irCT.jرc}}}鲔eW >$9KXUM(`}!\KJJݺu[|!S&''kٲeb *uQ$u.&JZDDĤI7%23Etؑov>k֬؍7fgg߿ѣeee2Çj'}T+ Ԣ <"`dɒÇn߾mkkklc0{l3?xIHHM,2Z4ɞ={fee.?Ϙ2>ܹ'%VO>/-n'˗/;;P`5 ^y>)JNv4DaP P=zhԩ7n0l֭ 7;sСQFp+,1Q?3… *ڵښi`K||Ν;qҋ/RVK!i,0tf!KsFK+_/\ё ]"͝ 9rd„ {hu1Riʔ)VVVIII]h{C9 $w*g4Otf!Kti 'G@@Ģ@޼yڵk W4EBzm}v877,;vL޸qCNz4gTQ2C> u5lذ`=7aDUf:}ɓ'\CNam}%ۿ?I8YIeMYꁶ)22rԨQ<_;v̟?pA'ܹsWwL7OO7WcdrXOнg?{eК]AY";;3m443Mcy׮]u֑#GBCC `iiI%u쭦}+**O2EQ9Jrr2~A-@Cf!ʐ} j; ID!:ut5Q>M<3P|]d\]cScn077F䔤Q|<Ý;wFEEaƌ(&˴Fcǎ\`0*IYSf>9nmmk#ZH@{`w{<߰s굥zPhE "@@@2̣ SgdCd42PkњzԶGOz}A ~}{k][2xh+$Ob]/nر Y-[78cMF6&\p6eO62SSv *ȤL߿ڵk!AB&MxrX˖-`=hcY;w9SU:t C4hPjj*pBg1LaÆi1n\hQ6mvʽ3:LвBWEz]qzj Xy4ѣUOl-]ta@c<߿Νg̘V1** 2|mۖA`&YԆtM #|O'>0* J# K6K͜9;t g86pn7 e< IOO8p C;p45.׏w(xW(V6߻w 7܀]{ohȻ˟y%8=7 =צU8/edd7ZgT7Uq%8|2AImGddDP$ O[ do~3##: |}mJ-`؏999?'a  8N6{ر ԷAХ [oA^Q H9!h…֭۶m)??KPƍ7jԈB{bCIIt z8֐E +-O$*믖 ̳Džg媉[LfLO\chQ3dpQ݈"+p/@"|1֥2xHUT=޲r{ _b?-fhdv1LiCVf*2Twu=M%aTWyijŎg ;֞&˛m{-XhdنF!_L"'Q)PKUGif6] <^W_eԩS"I_[=Ug6tՄO6PT,/vh2{R$b5{h]=Q1 N:jԨ.]`.~ ^o933v9Xf])w w@8Ms+X=3ƔSϼ¶*4;j^1i4hP۲ږyk >i$Kvg?~U; l@RSL\=؃>x>;O_?yѢEݻw 6NZ9'D4>7g_|I\̌#.]rرM6Op) .F7G` 2vp&@J uIѣG-,Xp'6mRK Y'p¬8n2p.NfXY: JZ IKK:tڵk'* ;ŋGAb ЈggLZ_ǟ09X5ˌ FTie˖w[nݳggIs2W7|Bg'ҥ *b% @% 3*JՖ5!֭[_z%|Ef;㙙K,!Ekj7k,*K`*xEIʕ+SSS) %wQ9/^6tEC]s+, >yuiA̙3009~Yt)Z/v޽^z:uɂ{庣5Z#y] wYzyHy>,Bf c Hؿ?.eh7x*ya* (Ygo2n'h24+8{E10 ֻwo@馛WެY;4hԨQ=ܸq㴇wq/IB8{ lI_B#{<qӦMm8y*~NVׯ_/HkwԈ\诊#m]vLnv'}GRr1 qIBk14:R~*B1P&LÖgy E!j(He&fdd@7lp2~™جt2Ĩ h) nٲgϞkڴadˁȑ#c&MO>='' Ӈ)l9|9`aWy*{,F}0P˗߿UVO>d+W`Wum۶U/gee]&@Lb@dv5_[z-q޼yݻw'G2jY$*O=1 Ƃ H(&)&F |'_`*!w֛8qԩSGݯ_Ջ_0i„ `45+f'2I{퐨f;vȘ4i7ŀgZ;O A&8)Vj# iO$NTi0{\֓} a" m"_x6,yF7_ 9^*4S||OŚ7ml+<=AGm<(}>R&m2hj2)8yrݻw4۷o{lٲiӦ7[W^Yv™,._~Æ 7op<2eN6V;0M%</Ҧ3 ύ5g 8|0t\bŲe˖,Yx .X`^pЕEd$^j7r;ٺu+J@!QaRϫ9{@s\mcg G'_?SΓ9$N ۪SK L%D ^oϟ?wٳggddL:uʔ)'OT\^z%Nriڴi3f 1XK.!< c_{5 #c5}zK)6̼Ҕy^_wB|)^3vφ2vÕg*\m2.8gϞ\ K D$Kfo &?~̘1F1bÇ'4zcǒ_9mK03>P   p *cMm#m,!,OW728dL2\^<{)\vv}3 رc ׎;@M6L˗/F+ /&8 &q#Gn5mn[F&7BVװ: ihѢQFdJ@޽{c 6lܸq$5kDjժU)σ WG8Uuح-ѺP.Q}J@ŽVh1{:?kO6E;߰%& `Nr c 0NN1^lrMB!Y˦*@ή]{cjٲeoK.Ep'+yJL2`*q};wnڴif͠S뗞FB222+V[n˖-چo̻p @`fmۨ %å;wji(HƽYдKKsVyKt^,oIKm/[~Je+6d%E_2U綻x1|I<T8|r9. ܢ{8۷o:ux?@PgϞHM2"4h\QKZE&իW?55*%X6"l1_mV.؟=}"Zs{]DlI#=Pxl"-[lw[m|ndɦw:uӧgE}/nyB#`ӵqE!2sE(رcioѢE< ';;[}]p X%starٳ?>5kT}:O?v*FEnIJ5hРv 8ܮ]]Bg&i PJ-fŋIu`ĉ]@ɓ'4>hCRv4ɻ1"ڪ[n >>]D1(2bI’X'ɝM^(9Zbj \%c?R*xPH4M:uС7.B3bCUV/~׼ysc [of #̖&7e&i@ lޡCveȐ!#Gr$#ayPJfe i0Lo!H l牙狏O60+I_lLj iܹRSŖ~%IyݖLMX%^eb  E$/ѣGCЛж0`I&hUjj*T>)M-ՒW m3 5亹2g{6Dǧ Nldb&i98eͱ*@l{_G\aG1UPV@jc@]6#e!&|싏Otrۙ3g3ԩStL߄%ѺG`a>P>h &"A={4KCykb$f$jO} @,3} gO\A8q||*2ٻ3h&]Oxɚb|ЋA&0C3" ֜Ⓢ3#Etcx P[U3W.5}Ev>$S[[Bem۶m uHQv*ԝS_W@ JH W>Wzub4(ES W0hRP4ɮOW]vb?cϟ)A0'ن Nypa~~>] 5ǘ 24I! 3/ h@̽#P+xR/WԩSregM`&ZTa3 ADw5>MMcF|4kԨ(Ea=PժU&Tԉ_ AZ֬Y3" ̃W*DDl 4IvRR5#e);JK||JܬNbmtF5k,YB';w :ЂG94%}_cÇcs;sIl߾gjrz룏>>A)#8J_6@2Ms6//W YB~aÆ[W4d&v@癢k "(~PO8! nih@@I&RRfpH/?K2^1>Ds҄:Ӎ^h{nݺV%8DkEh#w 9h}*2Qp:((P+E=EyPK?4lzկ_EvU4iڵ7nL38)0aÈf>>#̞={ RG=F)c'۬Ӝअ 8aa&}|A;T 25W_S(72Up5TUF՚6m*F:mB:f͚ժUw~/O!:` AwpK ,<ƏPn´*Lfק@ʎuڹs%&J:!ǧNɞsRpzb)l'Эe˖|8[PO81cƌZj1m%ctGIyYO>d̘1&yM:bH }NJ%Qh?,6)AD+ hp' o6AUPJqRO1Ib|*}dG(xv~w.χ78"ѳE?&|Vy<F`.;ǤMnف7M!77%ߪ<3sN<ի_AuRej/~5ZW9$IDk/}5\?@^=حr:!__@@%w #:-rMQ5I? ۮo*!uv]Kkhh Li{,UF-wHh Um꟭Mu]\앬+v;wSiV9jSo JVn^8SӢ7sL[P|-ΌL}28O 'Φ)_ %ַnwK ? orUy[c'he8685xpzӆ5]vRӜpTvwΥ(ru.XO 2< x2/kMN3usU wbGMhiU/vg?8;T*%TuӜ{T WrnFY])uL&%}j8}ʏE"[|)E_ioDkwR/v-'uäk&j͡!_N*KvCI:5D۰fr =)6 "enx0ϝˋ8#6LJSӆsGV On?"I;-/~SRMs&)?3I_ODJn;Ź6qq9\k#E5"ſ3#Y:)z\æAhM7X8 ]|Pw[+jY賤qyk0-"XH*o uÉp0rȯŸ%E[a:IiLJΣgkDŽjMm#qyk$ 7cJj0U)w!N"~K=Ν>qyk=ѻ~@$g;ɻNsf,4j޹-=%2ÒơΓݓt]soGJna#Xճi=gޘT9&Jף[A)gT TgO$\Qܜ3@m1. @|,oo0Lmj̉ _GϦ)g,l4硣A}S60r-opo;Rt׹\CFjS<$Xvls>6$P͡}{Roek72HJ>=8;:9R^38v0ѹIB{lomw7x97LhX\+Xp-zP_73jkUY$zg[pYIՂx#J-Ep̤k(<[%@=nU.Tk 2h ) 6` 3u .=7`k7=_`F pNpI @3 Xoo0s  2(78. ]"^zG =ٳ{ \R'fOg⽗T7&A?u/Ƒuq&ƐcM 1cWؔ}'{>,׆Q٬d.-QY~Yx!=ӰmzcTWMW+$,u8=>K͞u jB,%sm.c˯p~G s5 T^V l<72c@&*u2[9< ۮ_ߤV{f߫<goPv76,{~/8e5[Pb0wf_ U9}˲쬢 ׽i𷕛S|7߫,^e{]#r]#1eaܰ{ c9͍O$JΟ ͣ_:?\<}c:b\:bc(ǀO8.aEX:'#M5FPJ{GLVh(tb!ebZ5>ň ׇ} |1X4.zN ~0o-x~8#, "^Wu>"jZ o^ua{VakאkĮeyeyj%~1|7.yb#O/=Vֿܼ%sǽ"_׊f{OxYrd>Ή!7o|Q_{7 ;]Gcg}LfGzGb@,u) `v.v]`u.r?M[-ZSVZ9e:sؑsrrX>F|݇? [rK>k|!|l|7$sҴƵ4miLN4?xi(++f!D&g|F%R?[_Pze֌I]?P)FdIiB(؎Nrp8˰uw8UarmnR(ɣ>(Whh,HQ+7#OaRnu)g;R'I9oU\?G!U,7; >vşVϚ=lTVϾI.0>Q{!dGd%O,u)w)ޡv}Yh\%&-Tg%0 9.+JHܹbd;e1l]ʝ.6H#6w*:iTlB%gCW"Q {bغ]1?w";֝Ymw093O9ˍ(IU/,u)wDb7^8$`5aQ-vAA~ ǿa [ 6zԝ? +[Q#YƲlӔn](1 M֥blbgxe媳!0˼sjV6 c<2YRj,ج 6h:slɞ7fEZnFߴ#_`vBFo1^n ['$vkAڟ[ehEZ/Cky{(:aRrjb6~)?Cg^PP\ٰ |xǛ&?Kݲ 7v /;γ#0Z%O ~v lu)r;eRh$ %Ԝ#g]^ x6mhغ]lbڀ)mSàV%b/ ӈQ. $I| v&uRڶ= -Zw_1- ^|KyžľH}Rmr`_K'L2o7eL.)#6Cly'qjݼz0.?ndi'V<.={J~kVʟ0lkf:- _,oE2bS6,^o˶C<7ylb֎@ݚE J6wݙo>1G;֥bN~=E|6{+ 3@6\KhPи ]js+QXY[eΥ!RF?Pv`ulKMsX}q=Q8:.{zwbj\[5c{t (!3|ϖqܭ*`FHhmY +*vC];T!up$C]>rOuey^ c=u1N..!er߹K-FsB|:m6"w_  $ܩ^f6l6`u7;lwOhbp#b4VKa>^={w1Ggd|dz:BUv lH1+f:UQf&f}bIK[|7f X9}gZMÍ\9vO08&5v \u[4>luhwxZdfl V.%u6\VHqa 2~{g#iHq*H<ѓ ] ,)Zښaf/(3wgڳURwDVHV}Ʈ}0}{73p|`غ]RRH!`8:}(F*9FO^.*'R{  [7=!R>_;-oηCp|*R|ژoL'iG+!0aM~^nk#UuGW| j:e *0KYrjdmͲ I H'sob[u-:މ&VeEB{?g}&SD}:"ɜ0Mak5ٽ~#o J' zE33Sb^cY=V9(2;mpoa)QW牳ԥ\Rgk%}/SK9`GUYWfM5`P m)sW}lw3F |_{)9|mѨ [m%dN*nfz+u֧W6.7aTvh›*h{c}:mC-%y g6o Cf`u7y=Vqݡ埭>wNѻ`"~8VX{à?ңuŠِӢ(fMңئE&q^s7?C4ټOWrUEne|[;k4Bs+Zu9!Ck$D}3qhqyGx8|Kn7+f8x6q@{N|7oK5YֺnMbc̎epRx]-@*X_,E>R ~q|䔺.>E|dܰXWZrQ  Os7H_v'lݩUx=Űu)_=E$ɗ*rW;V" +p#NT2:O X{} M煸H]ynslI_OIy ?rvVϚ>gZ1>%|8˰u/>ùf;֥UVC9;xVZ3g k#? z pw^4ۇF]hOW>>75Rr%sO *EFePΊުφ'A;||d6_>U!/R/w͖3n=vƶߺO?ðuqϛPx-vyNl6Wû arYԥ/p׺&-,PK&\/|dL`gK9 HPm K%Cø"!~ZӷI/B,u)K+„Z$&ʖ CZ< obѨr]\Nmغv݄SHpHe-{{ZڳKF'>BP{Z#_or9}FR~3] 'We GZTPf𰂏;`q/C|][㎃.Mdq#3;`*5 ؛9'Α5+ꎖҔqOE И/6׾zt`ƴ( Qt,u)@v5u.Tk۲oht̾yh*Z>y jB,u)׸pO ;xб7sP/*j椢y >gt {K,pVDh#Zܗٞ>W u)!›[Htov@7y kOS$QbyU]R$ީ!бnۄkeL )!x o\?;O])@Zo]Ui  Ev/ػ/О8n1Z%` ugIe( +(Ju;~ga u)taŠXA6cqބ}}29@3x*?MN|}MHVl0/j|֥<‹‹' /zއbJ> |c$~PЁq*jU NI(6{Ѩ ^|d2\p(|q8M1b:'mJ_%͝ZHbJ0h`58^1l]J}v&$1R} EkfAt! vIn'ۙ.wiEvV~zEK+xj^Ʊ|h8sTpaRsX]±IcSlTǖ`O,\%?{4ʹh)M9PeAq3v.<{liS6V>_[6iPX?vіΡE}{M$PqsLŘBU97q*;zkvjbg 9~TD-Z| qs`Np. - \K*j6KkѢ"Ȧ+\!'Qg;tF{֥úE$k6F$2ӬӢEK3.unu?. -&k̺x5hRlҳW$x?-۝PO. Z}BڱmڱOmO-Jo;i3x{ H . -#1^[gE%uӢEK={1O>ב3L[.VS☭jyӢEK%?{A4}oOQ&4mK-0zH`l-ZP>ɜJ<=zx@^%֥w^'½$kַ{v-ZL?=rP%> 1m]J' [CIǗّ-P KhѢ"GgA6ȝ6xAcUL\֥~kI}"s RE| Hp6\<֥tuaaa$쪶ְ+y<-ZJ/`.E[<:-)$qǡӴqͪUM[͠nߊu2m]~.%*WZZ) Gf-"˔S^|дu/4<ȁ1`f^QH9m笞̇Ā^^rLi)'gK('vG \5Í<ݔDң`kR!i?㑜|Xp/{ၓ`dISњZh)sud+p`ߣKЅ; '?1$Mv%2q!y`vZ$l\$d1>V|| <|>RÅ v>[$2vL826Z$g;mF1=<񯂍6vSYumjGXсB+9p0ɁG=jђZ jF4xFƧyh3ƒѭEKJp wp`?L[+ܙ66!yߩ+Kْ6Olۤ-%= Mo1fqg ?#/?.$y?4]fBR/Ԣ%?Ov. zޭIR訌&?-ܳd[pE;y}99E;}ӖO:,ٍ^GKy3fC}Ȥm3/{/)ґU3}c{DojR>YA*s1$I )'g#RWhw?4=.ۄ*};RK3ǏVP(@c +i~Ys k?V~HVl*z/dL[Յi qqљ'}LJvjgҒRA!oEK^|CM:ʾ>tրP^LK9@bEXӒuq`<|˴u/&~*s@kIi+#rgX$䳕4@`";K˳g+͌LzOj2jIu,ߐWYb3Q`ѐq31m]J8qXژ)=zsG.ZRQz^K҂h,w뛶Oy*=EZRT*o3dk ac?`#;Kݯqܑ}<&UNlۤGMH-(;*[ o4Mb287F628F%ű3H,cEG .2`ccֽč^'S2kROђ[>%g=O`cjSƍ'Kڢdz-)'Q9[f'?{A$neldku753mݯѵlUǽêwBV )(𴝖ZX\i~95Ri. h7Ԓrd͊FP_hXilMBW6$AsP/rҟb=.xj^u(0KKsiϩz|NM=y#K %r7kMN'2-ϝ6J|vxN}`cou[U nYT)iN^_kBj+< ;2hL<%ꢾArm v+!~I{Zem}\>ĭȧ4iZ(KmWdG#o+d/>-c`{0epi1'z4iayP]o@Aj9W:; 9~Եpň gʏb߿NKy߅N$ y-e,,)Ikb#Nz +"NZ}Xm`T4֥4vaKmHXjTҰF?_.`^署?v5#lx0SPa3DuIxNxԑ+amDf. ^ \"\křf T:-Su!NrXjzĈUYv) Du!dLB3C,u)0.a$}Oi_lبH3Fi7/ `ZJ"15_۞+{h^6m]J}&<$1Z}1n*i|[?]4[H 94|$%|JhJx5m]ʻq86p]5iQ`6iTv+'Yo)Sg{yܻ}xCW4ߟ_P OeQ@8ay#!~]8((Ҿ|[ /B0e~y#[sW/9e! [I^ZV1Oȏ c3L厼0q|a6m][.zk8Rۯ!g_Oآihæf o8}kp >=ZF4hNi?4]{Os~HwгNWX]Yl'`3^/4m].A5 vNYU$#5v$YRKCVbJFaLT_xcJ 2^Mw&0C,u).«񝺫GV.Z|"D wbc-|swUΝ6ݧ7ZHYK#ŦKyUUOVmX Rp^^֢$gS1c6.[^H{CDls! K!6EF̀ XjRM,L-lĴu)1aj?;BȖm,ط͜y֛_nۮ]^K\9g=Ar͈;b aW9C8g! ,"\pJ_tF3c628"R3r@U#`iPg &Z#Rq{I;5[To%]ׇ\ԻI0maZP&Ύ*'ROG> _h?]c>2 e8r֥\RZLw{U e:4ϳ#-^9KēEL0v9ѽ0X+`'w%v; rgIre+9 8 qe̗.j&/L#6]A| N1Jrx/$|,rOnaspl%+ %>\܇,WA|xA(p*ފ9~<syo#>uc;ѥ\V&_jc/R1/Ja)}qo bet6o),Jk=z ]Ɩn cb8zT֯Lo}:}fmՏv/6os| q\&K229-k7k)Ö)8^8axb܇dNiHƎRW7çq/f>jtņDbVIN&l|7ߤ:z2[e ~qbyزA'Q>|~aŔ1Px5ZX>FȚ8f6oLӸwԾs22p |`sBؘN_Iݯ9!ێRABļ]ɂ={W- H"bF(͏!-ν].v:r!4>4zW2;uqu-[nWF,Ou׾$_>gI />}YʣFmhH^'*.:4_; |ѽZЃexޤ敹~_;a]kח$/RE%՟$dߞ* :"Zr_>VQl)^}iߺ=.6Mo4S20Cb~`p{6V1uاn݇\|k)AMct;; r,R)t'=Ҕʫd T.b9+  z1xضUˑpo[hJU3gOZVZ8r `<צZBƗT<,_ߖl c/N)>v:R.>v*r+TG˓w9҄o&N^=k.'^}#WђOTt-^{i̻p JxE'\'K'*/*B8Q_Lj.t%uڋyuȤJ X OTJe(w)몼?:8.8ѥr}ĿViU&nӀ73/<5[et|YH7,8w\ڋ#CZѥtķ>!j/DveUHC4Il`}qoV#|Vᷧc=z&|%]뇜 y #ROm&>C|Zh-|a yEÏ4sDC!\bs ;5-u]I-Zr ^q{^2jE&vp{ߑ*~G)I+ktv<_^<1;C?;҉WC~Hf$0bB=kX /gKy~EaGbG_3d?!gB֭5}]YN2-q֨y 1>{"uZ0дu/2<03]Sf b DSz(Q M[(H:.1[`w-Oybzֽm5O"xI;_&oUaܮ.;&v~5_K6`6q<[tgK6/%FFe ##EYHGٞt[߃)ۓe1^_8 l 8f64Id6 RrDl|W KƦ?zؠ l]u oTc=oBפzI+Guk\O5@)ok\ cTav<-AuJ]U.6Elkbëꆵ]Eټ ![kFJw=#}*'u]`: ?.{|uRWߜpAar.뱱ד`aakB.8ck@W#˱MANn׆lݯqw)g7\ gWQߑev v.d>eI:ŗc]{\"dRvbܝ>Śzv< vgKmg/]+ Yalp#lp1lrS}\g&I?@Ug7 ٺjC_u2 j(&?K]uE-Ձr||kU>q|m»3~' lx+x+ӧk !r_,?ԥT]VUAB.#FS:dq2ڏ"\1| XW8&dRsu$ߗ|Vx3#+0NqK}Qw&yP`xu6PTnaוvϋۆloژTvoD>L|Y@ 6{1guD|1O.5{RSx"uaov W|@Q8.J'{E=!~n5wTq F=QBo5ZZ(͸6zl'^83b<\Z^⚆j.*>sS ^HTR{4 _"uɍcZמ= 3kk hx.pw^A~Z*/.=GS}(W z}Q^Uq}]gB{/Y^73Fy)~v-t~`\- 2 dmÿ9YFz԰vAʖhYT8tWΡ-p;B.^bCoZ۫{M 6~onj_4L.7'TUem.|C!¡Cuĵzl*zJ߰koΞ9=ۭTzW=I;>Y5 i߇"~-i\ Aw.oWpe/y'b[ILy 3X^qɧ[|;ҍ/] S-FHhXJ,ʼ]w~V";T&1b(L[D{9 aQ[9J~+}Z̾ e|a %ƾ999EFߗmbYEJkQ zWb}k ر#w ׈{WC]U[bƫ8ݓw˿̉`߇:'pYd*EEy2cg}ŵMZ.y??((({BLԶ*@|1BBeG<՛®e1^l(5Wk[o K\'v!v!K"޿Xʮ@=u *5ڻJat0 )EH$C xZ}PU>@@EKO}HuFSGhZEy vhfjMȀfFؖNOd$Le&A;fz]޾SO޽{voٳDi%ɇ$dNf#Stq,BgI# |~b߯dR^3B"zs:|_>nԧJ'ۤ rSA5}-ZGcU +oź+ԮeXM$^fv1R#:邭|gW rnRsXYުf$L׊ ַ^r>i7"SeDSɓJ,ځh"ޭ=sʇ*T>H|idcKi9֯Vkr+umBƻc?6i|nR_Oo3g@vWm麫O{ ӷdGr6uTd7xt^>k3Պp>^9m^_Nl:w]qG%Kn~0>)@9 |se*sw8jEN%B{L{uн8[qe .(xJt#8M3d+ ; |FXuʲ@4mjF/(ǽ9-$j? AMf|Gl^VŇeqo<SRjI/$x cxv؍&4Av»,fgj[V\Un)I6XT-[͠~Qo:S|AۙxnA;:#s%&Hk3̷v dƬ-8Mr}Wc=qDc\Y`//^(O.E.;kɱ0Dc)<'1wEqmݱoW#8MJ%^~Mei4 ml8'f֌9~OFdbO_dc Wiy&1> zs?+ ~Çm9} _]T-rrd#']%5d󝶆Jf'o7ƺ^V}mcθ>kTAg{f\w|)T =0x>{qa0_ cL9X ; l'߇}ֶT \l^cÁo.4|/<,hFc7w=e#쯍w.I6tn+(-Ӹڤpj_5hڐ;[K>[7<'D_&`N}HǜoX +hζDv.t{𖭄y02a@ }dX7|na811?Bڌot0k7"̛⩾TȽyMi wvG] tLsFv#dex{!9&.Gȣky;Rϣn:3EFfN뵧ȉw񻣙g=k*}'C8=>`Ck*t?x^:灿erGg\ t{Yǡ.Zv]"g=t1jcπ'ߙc] 7.ҋTw-tPhJ\:X_&#bC헦k+)A)Pcxt=]KX#e|:tQ2w5r)`|5Əpo _Ѽ58hӣwA~e_rliFGmonꌷ8d ãU-ǔ whĨBckw ߬{\uôN;΋?[,sOQ.E9ʞQU%ΨHQ/Tu+_S[L4&iT[Pe=)]իjqqAT}iPU1[2UjJsbq8W2:֠L5‰tT,J.| Ovt9ER"bnrv)"}8J;znEhخ]F<ևa; [nR'c+S,LkVS].*rUw0YuVgj NM/MW]M4jZ$lC`+Z;7H.r?DtVro:+WW(.Eq,X^%rG*k{N4 m~rqle;S"JFBf9Φ(I\ / SS%4ߗzPa̜&9JsbV:'Z2~K%F%}tA  1Xbq{ZFz& l^Y埋kԠFR^[\S4]s٫MBo, =1_(cM ȡ䫌ɛePl]t,*b]aǕ㈿beWA:Ă_!}7 .-|y0]39Zw8EUs(?~G3{6܅|0JF<wxz_h# -JN^;n<ـ>^>5C<9ytgm)Sh ,ݸuƭ, E;G z=F(0 r=[im_m7Gqz?/4BG1RWcQsª#P8}̳r|#0AWCO:b1pdKe,_Z:&?k.8ۻBXS}K^UJыVoXVDȹSv [xG'iD!dq~y?mܤwOrY:qw O5PFvz7O^;O5cI4}IQ>~RrKZt1xVtLգ/Ώ"|IZ^W|מ[#=HgBn*`! w܄WaˑS{# '0EH$ xڥ}lޮƔ3;KW+`'X(T %6U*58c $Z?np&( HU!A8=NԉQy{׻ݾơy3iXȟ0"%V[+dcc}m[-5>'l뜇lGw)cԼiW +Gx5f \乲g]B sU'ΏEywM!]$1:H&Diq<%GAR:Ʃ4.U(SFI%NI4c23NfTJu/P|uscKm-uѝX[[ÑLi& _f)@(i;#L-! 3֡ ή/1S/I'<5ΉQ[,2FYQKx&.%`^ASYe/Al~g8YY}+*{̆.tˈGpVϳY/0yn}B%fH)g=K%>YQAg=C\Ouoλ>%]-q?zp{",fb<3Gb]1m,nC('_.0_‘9b̮ݔO7%i*ATPuߕexNqSf} F9]|:"J]Sa9B_N&Ky] A&,c?Ez4H_* x7?̤}o&-BFoHi9m[YJIJ\-6Q? +P@I[,*E79c]v/`q_=WrdY$Pr˯+ȉe$=O2AV1>>c@F% _+y-)dɹ {1Wf3-c `0y0 b,Bb# Re_7{,z$>q՛lWS.j US,[}Ӥ)onߒ]ȨCP2?lNY:u "j6ܝ ՔKԍ쪎fu(򱲜cNd !+ջϖ|Z<|͊G 3wJa21)2+|6qm±PCYrɧf:I=Zz3ўC@S3N5;ڶEvJIȜBcb:t?mge@rw\L̹Iv1חlWe4&X:UVlu©ʵ{"UO֜mbѮY>+Zĕ~4;o }KB{'FFoH;i6sw ,~Z=;A GBa}YlYhy)L'Q7?;z*;|o.dy(ww~ ,%?[2[+,,::.f19?CiD}sv+4t P(V}^pɚwYZ|F+2~ -§t^HK]ck]WѸ;b׵6#+q]I1>{7x-\2;"c<=ηe[_j]witHֆv8A19ZIVcݱ:YUmWĈ\"1o1S.[w1x.{-R.^x\npwDyK www.yahoo.eduyK ,http://www.yahoo.edu/DyK www.princeton.eduyK 4http://www.princeton.edu/DyK www.insecure.org/nmap/yK <http://www.insecure.org/nmap/DyK  http://www.w3.org/security/faq/yK @http://www.w3.org/security/faq/UDyK 8http://www.wired.com/news/business/0,1367,34221,00.htmlyK phttp://www.wired.com/news/business/0,1367,34221,00.html=DyK 2http://www.foxnews.com/story/0,2933,66438,00.htmlyK dhttp://www.foxnews.com/story/0,2933,66438,00.htmlQDyK 6http://www.irchelp.org/irchelp/irctutorial.html#part1yK `http://www.irchelp.org/irchelp/irctutorial.htmlpart1ADyK 2http://www.irchelp.org/irchelp/ircprimer.html#DDCyK \http://www.irchelp.org/irchelp/ircprimer.htmlDDCyDyK @http://www.user-com.undernet.org/documents/irc-manual.html#seenyK vhttp://www.user-com.undernet.org/documents/irc-manual.htmlseenDyK %www.nanog.org/mtg-0110/ppt/houle.pptyK Xhttp://www.nanog.org/mtg-0110/ppt/houle.pptDyK www.phreak.orgyK .http://www.phreak.org/QDyK 7http://www.phreak.org/archives/exploits/denial/smurf.cyK nhttp://www.phreak.org/archives/exploits/denial/smurf.cDyK www.phreak.orgyK .http://www.phreak.org/YDyK 9http://www.phreak.org/archives/exploits/denial/fraggle.cyK rhttp://www.phreak.org/archives/exploits/denial/fraggle.c DyK !www.searchnetwork.techtarget.comyK Rhttp://www.searchnetwork.techtarget.com/DyK Khttp://searchnetworking.techtarget.com/tip/1,289483,sid7_gci856112,00.htmlyK http://searchnetworking.techtarget.com/tip/1,289483,sid7_gci856112,00.htmlDyK http://www.insecure.org/nmap/yK <http://www.insecure.org/nmap/DyK http://www.nessus.org/yK .http://www.nessus.org/DyK http://cve.mitre.org/cve/yK 4http://cve.mitre.org/cve/1DyK /http://www.cert.org/advisories/CA-2001-20.htmlyK ^http://www.cert.org/advisories/CA-2001-20.htmlDyK [http://msdn.microsoft.com/library/default.asp?url=/library/en-us/dnce21/html/activexce.aspyK http://msdn.microsoft.com/library/default.asp?url=/library/en-us/dnce21/html/activexce.asp DyK %http://www.edensoft.com/exploit.htmlyK Jhttp://www.edensoft.com/exploit.htmlDyK (http://www.ebcvg.com/articles.php?id=91yK Phttp://www.ebcvg.com/articles.php?id=91iDyK =http://www.sun.com/solutions/blueprints/0502/816-4816-10.pdfyK zhttp://www.sun.com/solutions/blueprints/0502/816-4816-10.pdf1DyK /http://www.cert.org/advisories/CA-2001-20.htmlyK ^http://www.cert.org/advisories/CA-2001-20.htmlADyK 3http://packetstormsecurity.nl/distributed/knight.cyK fhttp://packetstormsecurity.nl/distributed/knight.c=DyK 2http://packetstormsecurity.nl/irc/indexsize.shtmlyK dhttp://packetstormsecurity.nl/irc/indexsize.shtml%DyK ,http://www.genericwebpage.com/myactivex.cabyK Xhttp://www.genericwebpage.com/myactivex.cab Dd  !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijklmnopqrstuvwxyz{|}~      !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijklmnopqrstuvwxyz{|}~      !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`acdefghijklmnopqx{|}~Root Entry= F Data biWordDocument<ObjectPool? ,٘ _1114619035$ F,٘,٘1Tablez`HCompObjhObjInfoO i8@8 NormalCJ_HaJmH sH tH <A@< Default Paragraph Font "%-1@CHINOUV]forx$.    . !"#%&'-2CDFGIJTUVWXZ[\dmhp  "%-1@CHINOUV]forx$.1     !"#$%&'()*+,-./01  @Vc00 flrs,2$)@(JC `D@*cr)(  x  <a <  # `x  <_ x  <^ x  < x  <] <   # \x   < [ x   < Z x   < Y x   <  X  x  <   x  < W  <  # Vx  <    <  # Ux  <T <  # Sx  < <B  # I  lB}CzDEF9z} @`#" <B  # I  lBCzDEFEz @`#" <B  # IR  lBCzDEFDz @`Q<  # Px   < O x ! <!N x " <" x # <#M < $ # Lx % <%K x & <&J x ' <'I < ( # Hx - <- B / 3 GB 1 3 Fx 2 <2 <B 4 # I <B 5 # IE <B 6 # ID  7 lB}CzDEF9z} @`C <B 8 # IB  9 lB}CzDEF9z} @`A <B :@ # I@ <B ; # I? <B < # I>  = lB~CDEFE~ @`= <B > # I<  ? lBCDEFD @`; <B @@ # I: <B A # I9 < B # 8 x C < C7  x D <!D6 !< E # 5 x F <"F4 "x G <#G3 #< H # 2 x I <$I1 $x J <%J0 %<B K # I/  L lB}CzDEF9z} @`. <B M # I-  N lBCzDEFEz @`, <B O # I+  P lB~CzDEFEz~ @`* <B Q # I) <B R # I( < S # ' x T <&T& &x U <'U% 'x V <(V$ (x W <)W# )x X <*X" *< Y # ! x Z <+Z  +x [ <,[ ,x \ <-\ -<B ] # I  ^ lB~CDEFE~ @` <B _ # I  ` lB~CDEFD~ @` <B a@ # I <B b # I < c #  B f 3  ~ d B.d .~ h B1h 1B j 3  < k #  x m <0m 0<B n # I o rB}CzDEF9z} @`#" x p <2p  2<B q # I  r rB}CzDEF9z} @`#"  B S  ?  !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`ao(/4n}44m44R  4VR  4 ^ 4  4R  4I J^ 4  4kL4p$  4r (g 4q# }$ 44dU4hU4- T 4Tp;4" \ 4b : 42 4j=y4fM4cQ4bcd;4aE;<4`k 4_E;F4^Gk 4];4\_ : 4[z_ : 4Z w 4Y_ I 4XL  4W3  b 4VV R X- 4U yw 4Ta Aw 4S _  4R  4Q k 4Pt R 4O ^ 4N& R 4Mk l ^ 4LR @ 4K ^ 4J}  4I  4HB ( 4GM  4F  e 4E 4D  4Cg  4B 0 4A;4@o; <4?+k 4>o;p4=t  k 4< ; 4;k l <4:<c=49`48<47*`46c<d45o p 41R  4/ R 4(_ 4'%`;4&`S;4%x4$ `,4#8  4!  4  af <4 $( H4+R  4o p^ 4  4 & 4F  4  4q_ : 4  w 4 M 8w 4  {w 4  w 4 _ U 4`4;4`U;4x4!`4r,4crvc: **FFGGHHNNSSTTVVXX]]^^bcceefkllmmooppqxyyzz||}}      !!))**,,--6677??@@BBCCKKLLTTUUWWXXbdeeffgoppqq~cg@@UnknownGz Times New Roman5Symbol3& z Arial"qhuuA;>0dG2Q Administrator Administrator   FMicrosoft Word Picture MSWordDocWord.Picture.89q  FMicrosoft Word Picture MSWordDocWord.Picture.89q  FMicrosoft Word Picture MSWordDocWord.Picture.89qObjectPool ,٘,٘WordDocument"SummaryInformation( DocumentSummaryInformation8M bjbj== "WWc/l@@@@ L$,E|||||{>{>{>DDDDDDD$E H^D{>2 {>{>{>DD||*DDDD{>(2||DD{>DDDDD|p 0@>DD$D0,ED`H>`HDD Agent Handler Client - Handle r Communication TCP UDP ICMP DDoS Attack Network IRC Based Agent-Handler Communication TCP UDP ICMP Secret/ Private Channel Public Channel Figure 1: Encrypt? DDoS Attack Network Encrypt? bcdfkmnpxz{}  !(*+-57>@ACJLSUVXdgoq6B*]phB*CJaJph B*phjCJUmHnHuTceflmopyz|}$a$c $a$   !)*,-67?@BCKLTUWXeffgpq 1hN N!;"<#$%Oh+'0x  4 @ LX`hpssAdministratorodmidmi Normal.dotoAdministratoro2miMicrosoft Word 9.0@@$@$՜.+,0 hp  Princeton Universityr  Title_1114607607 FP9ܘP9ܘ1TablePCompObj hObjInfo i8@8 NormalCJ_HaJmH sH tH <A@< Default Paragraph Font $'7:ADGJTW`cfiqt|g    #$&')*-"0   @ 57#$%<>?DEGHK/01=PRSXY[\_;<:dfA .i}~ $'7:ADGJTW`cfiqt|      !"#$%&'()*+,-./0123456789:;<=>?@ABCDEg  @Vglnowxz{   !"$%'(*/124578:;=>@ACDFKMNQTVW^_abdh0000000000000000000000000000000000000000000000000000)g ,Tg fl,2$uY߄H(@@+l*(  r  6j <  # ir  6h r  6g x  < r  6f r   6e r   6d r   6c r   6 b  B   3 aB  3 "`r  6 _  r  6 ^  <B  # "]<B  # "\B  3 " x  <   r  6 [  <  # Zx  < r  6Y B  3 "Xr  6W r  6V <  # Ur  6 r  6T <B  # "S<B   # "R<B ! # "QB " 3 "Pr # 6 r $ 6O B % 3 "Nr & 6M r ' 6L B ( 3 "Kr ) 6J r * 6I <B + # "HB , 3 " x - <- < / # G x 0 <0F x 5 <!5E !< 6 # D x 7 <"7C "x < <'<B 'B = 3 "A x > <(>@ (x ? <)?? )<B @ # "> <B A # "= <B B # "< B C 3 "; x D <*D: *x E <+E9 +B F 3 "8 x G <,G7 ,x H <-H6 -<B I # "5 < J # 4 x K <.K3 .x P <3P2 3B Q 3 "1 x R <4R0 4x S <5S/ 5<B T # ". <B U # "- <B V # ", B W 3 "+ x X <6X* 6x Y <7Y) 7B Z 3 "( x [ <8[' 8x \ <9\& 9<B ] # "% < ^ # $ x _ <:_# :x d <?d" ?< e # ! x f <@f  @x i <Ci C<B j # " <B k # " <B l # " <B m # " <B n # "  o lBCDEFT @` <B p # "  q lBCDEFKK @` <B r # "  s lBCDEF-- @` <B t@ # "  u lBCDEF< @` <B v@ # "  w lBCDEF8x8 @` <B x@ # "  y lBCDEFbb @` <B z # " <B { # "  < | #   x } <D} Dx ~ <E~  E<  #   x  <F  FB S  ?  !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijgK@ 4},4# 484F4-\ 8H54,Z HS48 54 S44Y4>4~Z4|;d- 4{qDr_4zhDi_4yq4x8dy_4w4vsd>24u 0 4t d4s ` 4r d 4q  4pd8 #4o-  4ndW _4m_`4l_4k _ 4j_4i3 e 4f^L. 4e= 4d4_ d4^I s4].  4\kH V4[H V4Z >s4Y0H V4XH vV4W s4V  4U  4T  4ST  4R  4Q'= 4PZ ;4K d4JD I s4I . 4HH +V4GH V4FZ s4Eq H V4D H V4C R s4B  4A  4@ 4?    4>   4=D h = 4<R347 d46;I s45 40D t" D4/ )h S4+.  4*H "V4)H V4(R vs4'hH V4&H V4%% Is4$h  4" 4! 4   4  4T'544  4  4;`= 44_ 4 'c 54h_i4h. i 4   4v I  4 = 4 <4 KJ4 RK4 K4 T K4 K 4K4DK.4q*4)4l~hlNPh: HHPPUUggl{{eh@Կg@UnknownGz Times New Roman5Symbol3& z Arial"qhuu!>0I2 Administrator AdministratorObjectPoolP9ܘP9ܘWordDocument"SummaryInformation(DocumentSummaryInformation8M gbjbj== "WWll  , M     -L-L-L)M+M+M+M+M+M+M$`N P^OM -L? -L-L-LOM)M  +dM)M)M)M-L(:  )M)M-L)M)M)M)M )M  ey UL)M)MzM0M)MPqLP)M)M   Figure 2 : DDoS Agent Agent - Handler Attack Model H Attacker Handler H Client Victim A A Attacker H A A H A A Agents klmovxy{     "#%&()5B*CJ$\aJ$phCJ5B*CJ\ph5B*\ph6]6B*]ph B*phjCJUmHnHuLlnowxz{$a$lf$a$   !"$%'(*+,,-./124578:;=>@ACDFGHIJKMNQRST)/0235689;<>?ABDEKLNPTUW]_`bcg6B*]ph5B*\ph5B*CJ$\aJ$phTVW^_abdefg 1hN N!"#$%Oh+'0x  4 @ LX`hpssAdministratorodmidmi Normal.dotoAdministratoro2miMicrosoft Word 9.0@@]@]P      !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNrRSTUVWXYZ[\]^_`acdefghiklmnopquvwxyz{|}~՜.+,0 hp  Princeton Universityr  Title_1114599488 FFߘFߘ1TableHCompObjhObjInfo i8@8 NormalCJ_HaJmH sH tH <A@< Default Paragraph Font$%(18@CJQY\jmx '/2:FPS[gqt| #-58@DNX[coy|     "#%&')*+,./01345789WXYZ^_`aefghlmnostuvz{|$%(18@CJQY\jmx '/2:FPS[gqt| #-58@DNX[coy|   !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\  @V &')*45?@BCNOYZ\]klstvw}~  #$-.0189DENOQRYZefoprsz{   +,5689KLSTVW_`ghjkqryz|000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000p 4rV ~l,2$lK*owqjuG@fQQ(  r  6 <  # r  6 x  < <  # x   <  x   <  x   <  x   <  <   # x  <   x  <   x  <   x  <   <  # x  <   x  < <  # x  < x  < x  < <  # x  < x  < x  < <  # x  < x  < x   <  < ! # x " <" x # <# < $ # x % <% x & <& x ' <' < ( # x ) <) x * <* x + <+ x , < ,  < - # x . <!. !x / <"/ "x 0 <#0 #x 1 <$1 $< 2 # x 3 <%3 %x 4 <&4 &x 5 <'5 '< 6 # x 7 <(7 (x 8 <)8 )x 9 <*9 *<B : #  ; lBtCpDEF5pt @`<B < # <B = # <B > #  ? lBsCoDEF?os @`<B @ #  A lB}CoDEF>o} @`<B B # <B C # ~<B D # } E lBsCpDEF4ps @`|<B F # { G lBtCpDEF5pt @`z<B H # y<B I # x<B J # w K lBsCoDEF?os @`v<B L # u M lBtCoDEF5ot @`t<B N # s<B O # r<B P # q Q lBsCoDEF4os @`p<B R # o S lBsCoDEF?os @`n<B T # m<B U # l< V # kx W <+Wj +x X <,Xi ,x Y <-Yh -x Z <.Zg .<B [ # f \ lBsCpDEF4ps @`e< ] # dx ^ </^c /x _ <0_b 0x ` <1`a 1x a <2a` 2<B b # _ c lBsCpDEF?ps @`^< d # ]x e <3e\ 3x f <4f[ 4x g <5gZ 5x h <6hY 6<B i # X j lBtCoDEF5ot @`W< k # Vx l <7lU 7x m <8mT 8x n <9nS 9x o <:oR :<B p # Q q lBsCoDEF?os @`P< r # Ox s <;sN ;x t <<tM <x u <=uL =x v <>vK ><B w # J x lBsCoDEF?os @`I< y # Hx z <?zG ?x { <@{F @x | <A|E A<B } # D ~ lBsCoDEF?os @`C<B  # B  lBtCoDEF?ot @`A<B  # @<B  # ?<  # >x  <B= Bx  <C< Cx  <D; D<  # :x  <E9 Ex  <F8 Fx  <G7 G<B  # 6  lBsCoDEF>os @`5<B  # 4  lBtCoDEF?ot @`3<B  # 2<B  # 1<  # 0x  <H/ Hx  <I. Ix  <J- Jx  <K, K<  # +x  <L* Lx  <M) Mx  <N( Nx  <O' Ox  <P& P<B  # %  lBsCoDEF>os @`$<  # #x  <Q" Qx  <R! Rx  <S  Sx  <T T<B  #   lBtCoDEF?ot @`<  # x  <U Ux  <V Vx  <W W<B  #   lBsCpDEF4ps @`<B  #   lBsCoDEF?os @`<B  #   lBsCoDEF?os @`<B  # <B  # <  # <  # x  <X Xx  <Y  Yx  <Z  Z<B  #    lBsCpDEF4ps @` <B  #    lBsCpDEF4ps @`<B  # <B  # <  # x  <[ [x  <\ \x  <] ]B S  ?  !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijklmnopqrstuvwxyz{|}~i84$ p\ i 4hA4 A4 b4 WDy4z K L4  K4m  W4 K 4F  W4z K{ 4B A 4 Av 4  b4W y4y4  4@ A 4  4  4s  4  4 ]4@QA4< p 4y< < 4Sui 4 ]q 4?[4&'?47?4 ?k4a4j74V4?44 ?4?y4?E4ma4a4C4gV4 Lk4U k45 k 4=  4 4 & 4  4 [ 4& ' 4 4 4  4 % 48  4=  4 4 9 4L  4- = N  4z  (4u  4  4 H  4  4~6  4}u v 4|1 4{ p 4z=  4y (4x? 4w?4v?R4u?4tqa4s4r@qV4qs?4p?4o?+4n ?4m Ja4l4k JV4j(4iT U4ho4gC4f.4e`o44d(4ca4ba4ab964`b64_N4^ 4]'Xy4\aU4[a4Z1b64Ybf64X4Wd 14Vy4U4T 4S(4R4QU(4P4O T 4N  4M  4LT U 4Kp  4J  4I  Q4HQ R4G B ]4F Q 4E]4DQ4C@QR4B  #4A.4@P#Q4? 1 .4> # 4=PQQ4< #P$4;Y]4:Q49<  48<  47i 467]^ 451<  44< e 43>0i 42w] 41 k40 k4/;  4.=  4-@ q4,n k4+ k4*  4)*=  4(  J4'  4&a=  4%=  4$ H 4#0=  4"= o 4!  4  < 3  4< <  4]$  4  4 7 4f :4. Q4v 4+ 45f:4.Q4YC4 C4 4|4474 `44 '(X4 F4 O4 4 `p44(41 8 84$ 4nin4:  &&''))**4455??@@BBCCNNOOYYZZ\\]jkkllssttvvww}}~~    ##$$--..00118899DDEENNOOQQRRYYZZeeffoopprrsszz{{      ++,,55668899KKLLSSTTVVWW__``gghhjjkkqqrryyzz||}@G@UnknownGz Times New Roman5Symbol3& z Arial"qhuu!>0c2 Administrator Administrator  FMicrosoft Word Picture MSWordDocWord.Picture.89q  FMicrosoft Word Picture MSWordDocWord.Picture.89q  FMicrosoft Word Picture MSWorObjectPoolFߘFߘWordDocumentQ" SummaryInformation(bDocumentSummaryInformation8jM bjbj== " WWl 8<ooo$ʐ ^ ocp oooQΏo4  o8  t *0HH  Figure 4: DDoS Attack Taxonomy Random Port Attack Same Port Attack DDoS Attack Resource Depletion Bandwidth Depletion Amplification Attack ICMP UDP TCP SYN Attack PUSH + ACK Attack Malformed Packet Attack Flood Attack Spoof Source IP Address? Spoof Source IP Address? Spoof Source IP Address? Spoof Source IP Address? Spoof Source IP Address? Smurf Attack Fraggle Attack IP Address Attack IP Packet Options Attack Spoof So urce IP Address? Spoof Source IP Address? Protocol Exploit Attack Direct Attack Loop Attack  %'(*35>@ACMOXZ[]jlrtuw|~B*CJaJph6B*CJ]aJphB*CJaJphjCJUmHnHuT &')*4~45?@BCNOYZ\]klstvw}~$a$  "$,./179CEMOPRXZdfnpqsy{   *,4679JLRTUW^`fhikpB*CJaJpha  #$-.0189DENOQRYZefoprrsz{   +,5689KLSTVVW_`ghjkqryz|}~prxz{B*CJaJph 1hN N!"#$%Oh+'0x  4 @ LX`hpssAdministratorodmidmi Normal.dotoAdministratoro2miMicrosoft Word 9.0@G@_]@՜.+,0 hp  Princeton Universityr  Title_11146177654 FSp1TabletLCCompObj hObjInfo - i8@8 NormalCJ_HaJmH sH tH <A@< Default Paragraph Font01234567=FGHIQRSTWXYZ]^_`cfghklmnqrstwz}~&7+,-67 54E# $ %0./&312-34<= F! # $ M% ' (UV\)-.c/1k2{9*I':)8(5;<>A?D JF"C!MG &H@801234567=FGHIQRSTWXYZ]^_`cfghklmnqrstwz}~      !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLM&  @V&`'00&&%?2$^0hךdGST"b$T<ꕁɘFe"b$dS-~ZOʋ:Iw@~!`!(  r  6^ H  C A]H  C !A\<  # <  # [x  <  <   # Zx  < <  # Y<  # Xx  <  x  <  <B ! # W <B " # V <B # # U B $ 3  < % # T x & <&  < ( # S B + 3 R < , # Q x - <-P < / # O B 2 3 N< 3 # Mx 4 <4L <B 9@ # K< : # J< ; # Ix < <<H x = < =G  < > # F<B A # E<B B # D<B C # CB D 3 B< E # Ax F <#F@ #< H # ?B K 3 >< L # =x M <'M< '< O # ;<B R # :< S # 9< T # 8x U <+U7 +x V <,V6 ,<B W # 5<B X # 4<B Y # 3B Z 3 < [ # 2x \ <-\ -< ^ # 1B a 3 $< b # 0 x c <1c$ 1< e # /"<B h # .#< i # -#< j # ,#x k <5k, 5<B m # +% n lBC~DEFr~Gr @`*%<B o # )% p lBCDEFLkL @`(%<B q # '% r lBCDEF2k2 @`&%<B s@ # %% t lBCDEF? @`$%<B u@ # ' v lBCDEF0X0 @`#&<B w@ # "& x lBC~DEFR~rR @`!&< y #  &< z # &x { <7{- 7<  # '<  # 'B  3 -<  # *x  <>/ ><  # ,x  <C/ C<  # -B  3 -<  # -<  # -<  # -<  # -x  <M- M<B  # -<B  # -x  <L LB S  ?  !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^&2Ga4q4{ 4u_ @ u4Z  \ 4\ G | i 4k-~ \* 4c,G i 4ax \\ 4$T@ 4& 4RUa4TT v4 4W!4$ \ T4T41;43 !4 4Y!Z4P T4D .4\ ;4r 2 !4 2 !4s  ;4N2!4f 42!44q4z q 4yC ! 4x O3 4w C 4v C 4t6[ 4s C \4rH64qC \4p64oC h4nO4mC !4jq ] 4i'q \ 4h 4eG 6 4bG I6 4^ G 6 4[ G 6 4Y 4X 4W   4Vs 4U@~ * 4T@q  4Sq $ \ 4R@A4O G  6 4M G i 4L G 6 4Ks  K \ 4HG x6 4FG `i 4EG H6 4D \ 4C 4B   4A 4>%U4=! C 4<Z u 4;Z O 4:q >\ 49ZY442G i 432G 6 42 p\ 4/'G 6 4-G yi 4,G b6 4+ \ 4(  4% 4#&4"&' 4! 4& 4 .4 2?r m4?m4&`R 4&PR `4Km4`rv'`' $$,,00112233SSTTUUXXZZ[[\\_`ccjlmmnnooppr     ""##$'@迃&@UnknownGz Times New Roman5Symbol3& z Arial"qḧ́u΄u!:~0G2Q Administrator AdministratorObjectPool"SSWordDocument;SummaryInformation(!#DocumentSummaryInformation8M &bjbj== ;WW`l  0 0 0 0 < $ @l l l l l 999???????$@ B^? 9.& 999??l l S"????9 l l ??9???? ?l `  00 :???0@?LC:LC??   Figure 3: DDoS IRC-Based Attack Model IRC Network Victim A A A A A A Agents Attacker Client Attacker _`aclq  !&5B*CJ\aJph5B*\ph6B*]ph B*phjCJUmHnHu.`bcmnopq$a$`%$a$  "#$%&$a$ 1hN N!"#:$;%neT<ꕁɘFPNG  IHDR҉sRGB pHYs.#.#x?veIDATx^wtWU>"_:J(B/ %^Z"DMP" R{g~Vv̝9{}w޹:{?ggK`$0~w__alrsѺ1CP2~yS{%s:0jw'^"Yr|&GW"=`t边XPV)D4H*0*l*||Od<]h]}#/?MSARi(5k/T4ʩ\_*[ cRF"=5}>%vIT=%ʘ_ |/H|MBEV 10Txы^4'GRNOJ젵5?yc3OћtTc̪& RL3w~!il ΝԤ J2$Y[TjG5@V[HlO?ߖsBVu}g>+˴Wҕ.yKӿ_40 KpճZ],OdϿkO}??_ R_mߦ~~5y祝A(5+N ݘGpht=*GV1FfS#픲 ѕww/>яi(V%}/;!= uLƧoolQ~U5_5?C?d0H}}`aXa~W!4VO+oZ|Jgk̀iٖ$^1:~>Onwnw}W]H'O>2K]R@* {i+qcOog?Y\rɟI+ҏ~G~ShyD'?7~a ALC)P;i{gg߅ %,ש5ОZC)Muž\.Oz׻8 =WUm%A|j@(J@ |;]r8>P-<sWug/G a|7}ӷ|˷DK79 2Θ~>|;_җ. U4IT 3.Z%k _%~.s`"ŠO|8R #AEǐ/WgB(_A^(`e Tj@ˍ@=⁺TK6hUtcEaYHT:wZۿ}[Ž?c?v\B.t>𶷽b3GC)aB!>'DCre09l v]9`tx:8Ն,ŘEVE]o??d"Y am$н>pD'X[-~oEttխhxP^~E3`H^ZB Ѷ~~}׿aS~7~Nb&''#H2j@uRŲ])A o&Œ:N/|_jbEEo "ZIʋ`5>! Z׺N6! `.pIk5Ik֍S_:&Ɛ> 6/"sGGQ`$**NCM}.67]wRc H%@xxt] ͯ xP(bP5g?ymn|_M8OJ Ufz{;??FŁr9vZQ^e͡7= -~#!:$W&jcPLިWŦW4}{^:-6YΨaQ@6pjEߵgQ(&T_P 4%굎¬x-0S?? "&|9CB!ݩ-n7)]fP .] @ I|Jf  _$^1sx{DErH,ߙzիN8k_kȮا:F7Ԩ'z[ atVϥ*TT8|mG:5}:ڸw:Uo6f~,^Q,1CcZ;m[i&%E6Q&yӎ>h0M?>#y+_c=^@%P^08;]_*{xtמ+ V4m9b3Wrf^Mā@hI}pU\jbr6#婧j`¸owmê&W^!gb|)75`6dO?ڍi"  ~ǝh* ,嵯}K/;)//$>{zʕ|e#7aG-MsI'OBԂEm!)FvvihI"BERdSh.[ ~=q]z{" $G^iьJ'B2[iWo&sSiq _&v `k.Օz6VSAjCP+뷿p+,rآe¬8Uv܈?T@s-N ɃKA HI1+*K}T5wu40jd D@'?K,gs9lDP.TV/T<&${OࠝIx $Md>hPs9G͌ FMJ2NI c'nsШ,ࢴ7̤NY2f =&W'xngY{f@밝q>OZ=MN%Ń6[.ݔ K ܠINhBGX|vЂ(2QsJiB@D-EEy!b3[  6Lwc\P2k&_ބeY'Jq2 (Sy{{L8=я~}s=xQ97:IȻd`XI,2d6[s'ЭR@*O㯍QؿjAО)l*S.P7q\)-3Dpܩ+b6 '1N%{6)R@ȀGjis_jɋ{/~\ J:)ޟ0\*t9Ijԫey%NuRdr6#WFTYzp~ Hn7 #{ܯ!3U8"eærR X ̍dUTeU~ס7\[N4N;bBH!J5M&B=,7ga1MGG,Oz؏h )NaKxFbobdy뭮HASfouS4Eu `DÍOo?q&ΎO>yX<R푽  Mp2~oP:eַ5@Hx54!(J3Qr<Ծx[=wt6͹fj!Sq 0YNwzzqO[v,s6mIx$`&uQn~st+d Ձ7(:U(Ŧsb}47oE.3_zuL Iub{LemigR[T ۶jh1i&tסy' 7'j;G5)0XzJO8e~Kb1F8>V)gobH@ T ԮSp'혣pۘ&!mh <1;n_z$bA1iVm,%@/II>RY|4E4tiO0ބoT _LZ֟`y]L*iRe6m4*EGduRh㒳2GPmnsz֙LB$^=]L`(S| ^ _dxpޚE5s q ʛާxJ GݵTKISnE%S<ԇJ`|HEq0` Jsbh<%'O_W38}(cpCpOxQUc\lU5wjGijq*EgTJ2hb5P;c/M.Vu-NxE,Ep[5JYl+/ Gpdk؂#o;6)Hl rvH=!>_Uֹ iUP L><ӐNR]["<CeX8f[y WF|,2C@-S4ܾaG{*;n]aKj@` k%2BK14)S@4dxr~ٱi{&eII+Nl7dŌh+H TbJ՛:Y-;>4 Gx`pIl5|g":HDiF!byQ\ )$~kppX"3U~һ( rc5|DJE n6Y0k2 TG(X?~Ѫ'@p$Ms]e"K¥*!PKWdQ_J"aSGS9D^??|+^q5ެK`O$`2P]o:iQXP"U$wTD2>&1mJQZ>%l5<DT$@(Φ69~g90N5 K4;}|}~CF%XZҩaè[RM}z Őfg~^UڂPF&q,M= =eEu;{^j`Gr/Ꜷcjۼ-Fz|I KYa>OڛўPA6W?^J|S[]Sy^ڴ zLmHZsW`hlD$b1ID1!Īz7tUN'ZP&e߭>དྷڶDgWƒe൯}=apU:U"6{+>i`EJhO40$r%B-T s$Pq(%LKrj$ Unv,K'3cglDbzD4Z XY,1A=A|y°%^5OmO'\| `PEI]tq=FAB-z޾K`w$`(AB*Brpi0RGSN]Paa*սA^yaCwF/"$MT"c{2=~V 9,;~fҕ5۔p <9]T!d6L%ny,<$苺DuȔ.$w׸JRKPh%g?Б`DUqn5)XRr-y N<y޴4B͇@"UsV`|} SO=u*wgdžx%{XH b>ϞҗTV8PSohO &PtXx2i$ "knB'FMUZ3 zg-jZbXɳа{.J2cjlAQA{ W݌[c$BSôi.S;7 (Qw$S*[}I' {=]l"nko%i pK~[:ZЁk<,A>0 Xx }k.瘜&["US/bmmI5H^7؜/53#59s 'L8SY1ʑfx *%eR9abDOIb[`0qxggj%@sa^.*{D%e';- v,ZȠI{"е:aҁ%Y+K@ڙ ΢/E|E%% CŎw2PB&TK %(!  woahwqP_bчw lX"aW ox>%!A%T_VT,\4yRlLbs0fy'kv$W=nw㉓84 PH4 t&//)O9Ӹ]</M:I]/m8Jac@<)kAB ХD6> R<;@ؕa'Cj{-2@|Ӣ*W_]uW!Ha58{.푀h7u:,^k/}/2Z5׵ƈDڷ/m= T%.OAMh/JH5Xg1\9nwjLys1$,SrdN#SLĂQWU?K`C9,5V2TKߍ%|?/|ZVErn$HecM "?{ 0QPF))(K xT}Lۉ[k<$fOXQ:rk!= Pӄ؜J&ێcnXqdŕdPTX`T#fp }#sR遣n+չv V;옞{.Hi%tJ8ɬ6@0Na`=iOCϐnͺf%y@ h jH? ё, bfH-IUpJm"?q:x¦:<ro3iO zid4FIyG݄T277Ɲ# Z^ &/s'\"kixsQyl иU/0Ց])n`b?AƽMJ: K `L{Tɡ}ћFq91x^ >g BU"Kԥӌ%?̹ Q̷nf*=۹N k xakgY󻉒p'NQwg`#E֛u  y晢gX w]&α]0RRZRp);t"JvɟwӑojH"g/:y!`SI(%A9冊[N&I\]t G~#:S8RZ6Ck?@lހrY#&hU]K.XWA;(qSo̅Aj޹9L5޲K`K@6rl'%n-#"jY%/yIr HS-դ.cÊ)l2\wPBMεAS*URnx'd\H|q4ofq FNq猺3i֕Ŝ`rH/5B;cˮSlRzEcp.}WXV5v=]8ҋw 0 /@ԎI}֝%q_G0 *g R-</>~qWQQ(/@ϘmNs%JWbH/z$tNu{?`3N@IBjO,*EZT*$jըUTȅG&!j|NsMhz..|JQK,[=(z'^HO}+v!85'aP0seCO@V U"w~j= J0E=^SKSW\%$ԀPbqӋ“X'⧖P xpOB+l}‡>!vkՖw-S}EiiIj \LKXnbw .Kj,R/9hSXj9ftA 8O n9DXFLCP<i=ݐb֗W佇./X.SI0J{Qh#gusl& N>ȼqS2ZۚwCC@ܩ; 2B1 8,kw[v ` d.jٱˤvbDS/ጢ؋A;3aVE긡lDPx)WE'+9}tT1;jO<2\7,i|t\q2*y-Kh+^%$`KPBW%#(ɮJ$`[f=yϣy[܊=aǡaNayB7K5^C/I[YvY3$?8Rf S`B(ZxA؍w\qS^:wHtK^=aP5= cߝ,)PI2=qPAΝ%$$G/טn# Vv"p/zo.,⌹AQ,=iL> R0[hػn{8Q NÏ\ HATA TY;RRN.z;g=5N Rt\)t=^dkcm0Vf'> k>O[ڳmtg.  v{(S o zV:uĬKlA8>{ G\T'H;Nֲ+'"Q\zz.CPV*b(ĖZsel$;Sė-B=U|@ I/>\4܁o4,FT%:?ɖ:a*V36#\*.NdS5,V*`X8p/ a Uf\ QP{"9JmM8#̳Kx9j:Tߣ1: 1uC?ٙn`QWKx~zeÌX.cz*bՍk^crX<ʺSzԣ]698k >@ A|ɾ SrEKQ93Ԓy#I?|K_2ǂx *1Tdž~R׵6]EA@[}k2 52*[7M',nٺ.'<6 ~˦LuǷ!CڪQy~ \&|?PbΗVr(=6#un׮͉~CA&07 _WƱUjf (/]R=#<@Q8ꨣf6:AƳ@И`K}R $T/M{ #Lu{#!PX/kdq-Sע& zPo%0Wh Ә`ў-!'nu[ v+_J/:\N/f+EE Pyķ gCO'1,3@R,1hy=:)c)݆s;'Or](̇+:TݛrՇǏvQo6>u-++(k;% sG38LuR/%ﺅM~ HѤrԎS*+8SPGzĴ9_ɑX~S#⩣TWGG}>sJo%v 0p9ymGN൏:|c91WR($@Q`L"<2y!90=\⢻)݃k6&|ӄ> 6`T2q@|Ɂx˧6)R!tôAzH(g~t 1UowЇTv 3zRә>N@)>.X٪"DĽnɳp8;t$B2С Be97Q4|aQN?t]~s:ѽ~}{[ans_ Iy򓟌zSbyYYX'nĬ,;%^Ab!P"}'= UMbӕ/Ã0-a >+% [BC<OWdU%C]%Zi 1/ ~t 40oT4wy .wgIBR ا䆻N; ~I͛KCRԶҭzpܡʄ Iɗp9R%TS_c3as]y `MEp,wšt%iԯx %f ^ V с>gW*c`xTP/\wCOt ^cG)a'xx/~55ŦNmWTthe`*ʕ\X›0hs ?H]4K|HUB?K`R"j ჉xbEy -3>vx:묳mv ol:h2{l7*!"rN)zMc5ћ@G]bP`Op.BUGC%.^ (c=Vd:*8W釬^ǺQא֨^F/}bOzhԧ>Ղb֍ Vwի^UW4;J[< tAs**W G&/ԐՌX{-6$nl^hS*[ʎ%H%4SHVöQEqK 9HDQf{MTIq>QʁWf0'zZ0=f8=RbyB:9뚠 IKd_ȹ E/z 6v y m[-2-E0WʵR% Z)VTCx*bSt>}9*(+gThH؋*<]k* ړZKwW8>Y^BlO3Hecp][$Ͷ St-Slf)jTP!T!mL'"J <\|v Q=v"g--kL)GK0#$G^IR(M(?`Vy-Xj;bٕVu(ZۦDij eWhd11?-P%6"E.RE8Eo9@dбod'(8G f $*W]l6vkO T*5x v[u :Eg4˞ga*n:t@0TM"?3Z5LEGe/d^#^k륥 R-6$Ӳ*,,H!b[I'R+?ݫzCɮ='v oI KRIQ4E٫p 'ؗb,-Jn~?!1{.g U#A7woSJ: MT'+c%4ZL&(Zjy]qk.mxrmbj* &3 tE*jmheV?K`$@KvcQr9heZKݢJ#a73* qj!(aM>I˩GJ@M੍oiCzӶSNѤB)Pfɧ_<Ʋ/>z]l }Eɛ8r UnՉ RuT%b+'_Z#EKGi傗k%L1h@*MtK,*.Rtyj|+;_K` , IpH7r%Jʔ/K?Wd/ţRzSYvsPS2y{@|ҽ.K K_5WX^ɝIepϧ}WheQ+Athܵk]C-?\ݙs*]#% ZRW f`7ʩ4Ռ=3`*ԲEEBV ZZE<EW*D]&r.nPʙ!.RܛA:eJl<ͺ%LXd[ȵ]aTXd W’/:MuL.U}6I%VK*?rRLS==; 3!Tס]E&$7ZHf9FgTq,¾ɞSu`-L KQ!ڼ)Jn7+zZl:LDYݘE4%| -/)2$ ӡa"h%W1{XX'x"Ș1 f] NGr"\;3i^&6 R$c.4Ќ+ZRQ%PJ(! d40ZlsJU@0u#^~]c@a%|)/! $ALd eU@iIS9z*@//{U9D$@yғdw1}ޣ5aWʡĩ-4Iۭ BRw-r 2PEU$FnطF6l,_bBSV 5iCcⴙە9fe`sM p)6M8묳FB1-"ScYoH)F'#/d%3NjO*|R*x*(֎%q0ю6BO}oʾ %KNpxtf%A+ @VVujQmI-MjI:yUƔ8&PbyZԥR ^@' ~GJ0>]+ַ2%Sai wܞWvO&w ^Ro-԰6RQ*]i۞gM*HB(B?J) /_|_"J3恼pg,.M\z׻jX) uQVϽݖU݃ ltI—߻K_R>oGml -Ն5U@lMΖh,y 6%[@vN#C.wqf~dz F7QtcBwS)=t9ݼt{-/g=Y-o0[0Nޚ!* )uT&)1{}]o񉷹mߧ <׼5H`X흸pO.Ƈ"w~poo4hŠ3ְiLʖN1*47m`aUzSeTTlAe { ST3'|e <b78#pX{w]xG$;rmU3 E 36DN,Z瘙ꮣL~ht;نEtb K1ڴPtrT?tT= MSUj `imBi&B%b#2`4'9jY^S#P<=1b/1mB&҉f(TTp*_ycU!O!`4m#6+PYmm>ٸ< 5k5fkY \4Cub61,TVi씩;K 9y>e NB冫/1rYaSKpM~Lĩ4t{@hVF"qԹ{~gZuk ݄a7wUO]_С;;A H0Jł\~wTC'!=M-N˸ UZ͒Ah@[EV QcژI1ÛJW^6v 9B6"w:MEuGWBhLme"0\]~]x'4PZ՞)bnnl88[>R{[BPgm hh(gq0k\YE!rn6^,Rkx'Mx*)f]rhb邩SS-Ȳ@{J1ǏkLN8#.AÍm%' kq1I['o~У(7٧i{ћ|M6Pl*BURz(6ĩ5"I ~`BR.^k&<1B «%?؇0tΦՍЕiR^M0SroÄ?V3pW0Eږ:`"[be/+v_!VKM tY!BXmNDrMF32„;USͥA1aQ\ivxqzWLyUb=O9MWMYq5A;01>1M mw9ɥwsT'%;^P) {Kfg[' ?^yONB^Iw`nF mP2xFjP^M]5=QrBʦ *Eij<0ݱov\}XmCEQ/ g=)&!(RBf[(uQ֭,k^.ĸp7bOt ⌿( 0Q];q`YmJh;Aɻ OAfUȤH!?|Y 6嬌%6U ]/߲ӜGZyw /neM* UhU E0DFHn~IDfNX},Ki*P-ܘU'+O#Eҷvfrt(;YvTV?_(]VB>*gE)8O*"^!͖'4_2JT)0j\8J:\L¼NZ^)gO^yw Cr-wX ;PveW_1WZEWs{WSێ@`(xJoY~<Oa':$lذa= ".\掋*[\Aƿ ɰ~7nvT?xw2nn;|#oa&?CRj^&2]\7nzpOMk6%eKuXQn~ DڐDxʕ& ȼ/7Ŗ7p'5*)MBJ&cS<3,Y1)t.9&oa|ǧ~_i Vf~]w&[h[#<묳N9YTM=yzdY"g\rVeJB,)@ ciŬn<Қ8R5mft)),!"kfΨ6OSwc=V"H'$h<)5yE2MB C,SHxVG} Յ^|拞Es7b|/ Fp&| !/w0K+E $0%a/cHW\HM'Sɧfht_o"m_4^TKN$bV0EFJ2))5dQOj49 W\pOF'ƗkUdHc:8z9M4M 6.q!Fx4;4 ;}'lp<#iS)!pQ^{YnlrFyUJF©8*|^02[3 Vj,^-w5AœH VCx؜ro~.̈́@|?ODte2 Xytӭj/Դs' G2m[3W j AF(P6Ҁclt}Z97/F~ ^a2~r7^sNwqPSLN/"WүY% F2Veji!``IH+hF?Z 9@3%Pdܛv4+~=ql>oJiMadS˗dfkGW]4eu<ͥFȨFL1詜 mOra"GS[D" p< e!)~/ruCO 3pd!sI+8J Twc/lS= h[XLze֜9oVB8Scպ)ljGIoQHYi`8$ьTW,ݍCJZJD¯!<ҕ̇/x \z(&ZScZ7XrʦrRxZ*}1Ml:<>;SeGohn`l(%LU|XvD 9ݨULnJU=5xH|YjE.ˁ?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijklmnopqrstuvwxyz{|}~IJ  C A? "2P W cbV9l\d, 4 x`!$ W cbV9l\d./Hh[-(g% xڥZ l7{`¯ .8g)61%0mb0`\sΦm6!B6Rܦ :M) hRj)D4TB  iCh73ygon}ofg{ !??` cu/)  xsΨ,{!EVwd}F:K+zGgM~ѩ:*SߔR=[= )yNdx[#"=ZdȮGHT4Dg6s X,ͥ]{'#9a~ WTcKԱ^c mfnoͱ-P<8V+3ofVh`䵙ճz~=1fwH74 % 1IYAw0ks9zgDi=%c*ýlo "JJ wgƏ8e0r]5ZcR|GgC헦k+)A)Pcxt=]KX#e|:tQ2w5r)`|5Əpo _Ѽ58hӣwA~e_rliFGmonꌷ8d ãU-ǔ whĨBckw ߬{\uôN;΋?[,sOQ.E9ʞQU%ΨHQ/Tu+_S[L4&iT[Pe=)]իjqqAT}iPU1[2UjJsbq8W2:֠L5‰tT,J.| Ovt9ER"bnrv)"}8J;znEhخ]F<ևa; [nR'c+S,LkVS].*rUw0YuVgj NM/MW]M4jZ$lC`+Z;7H.r?DtVro:+WW(.Eq,X^%rG*k{N4 m~rqle;S"JFBf9Φ(I\ / SS%4ߗzPa̜&9JsbV:'Z2~K%F%}tA  1Xbq{ZFz& l^Y埋kԠFR^[\S4]s٫MBo, =1_(cM ȡ䫌ɛePl]t,*b]aǕ㈿beWA:Ă_!}7 .-|y0]39Zw8EUs(?~G3{6܅|0JF<wxz_h# -JN^;n<ـ>^>5C<9ytgm)Sh ,ݸuƭ, E;G z=F(0 r=[im_m7Gqz?/4BG1RWcQsª#P8}̳r|#0AWCO:b1pdKe,_Z:&?k.8ۻBXS}K^UJыVoXVDȹSv [xG'iD!dq~y?mܤwOrY:qw O5PFvz7O^;O5cI4}IQ>~RrKZt1xVtLգ/Ώ"|IZ^W|מ[#=HgBn* Dd>J  C A? "2r N_Q.] ̃N ",x`!F N_Q.] ̃ 8 98 xڭp߾E@!w6AV"j6SD`G!S 41-L EX*tI Nu,?NDtZ3QGpv/}{]n?}:P1i 4#=qYEXk.A_HZղa+O- nO6* K/nXٰ"us; ԊR=9R kMSr8yatHj$Zڭq!ԼGFLPe_b&ل g0CeE=mg^[4~k'k%Ѻ:N?V1Yc>LX]u(XM Tع^&Ύj>_NnK˜5hsF[wPܩ[Nab.D",t)/ApvWRՍR,lXҜ#:CZ>MߥF`7+ݳ=Z,[ H1&*R4&9O$aSXdf_y'cE Mkw90dFP Or+"ҏOƧ1駔c|DHO${;+:ь ,53w,zIXYEvzk]d<)C]|DL%n³:d [,_?DzQI^|­BGr?A5ho|_Bg.`%_K`/9#Z8[Y SkVWxEY?#&Ut59LsckXaA趓d(1՟v&Bx1f3sƖ'Uv\Ku*$R;<mkx:u 3Q%VZ{=#\nKao&ϵa/ڗHmucȎWv`v*Hog5_qu!)ƽxgIK#[;*2L|{(LQ#L+O³0EA"ypg2mc 6sv y?k! V9l;",|B1J/qDk#73I;~PI$Ny $<SI6aPHI$&*'ᑨk<۟%99h"P >1Ъ'Unw}LfM0'թVJO?gKnm)ݹ{ˡwu].ZXnE[}eѳZ7=j_ v&TO.e!b7 ҈XBDs-PZo쟸G=CDe[OZ1J};8>´2 a;Z(VKlŘV״wY6a;liLo˘)i/cz2 j=Iu@eIl$W"]k}=+\7Ϳ; 0=^55;9e?mLs1Y e4|-00Y mvN.c _ -qs4˷&y{H۬]#Q³ H\o˘Db <<sIJUip.Utܓ޿ÊY75X;MeLiu'l/ X6aR?b}B>z+>q}DzN~K*m}5ݤz_UrzlK1 }D9wpm"^ݭiV' :p''͆:fī!η_?qE*J)9[1&Uf~2s*"[",t*Eo2>"~gA;n$qR:z?+$ov#ѐCDb>H+zp#3?Lz?َW+*Zaz_´aW [_]ƤW 3vx?C8}⠭+ƤT>q^?Q^G?sf6b]Nf%0:)kW%q1n Nr"&Vvԅm=JzZcoZ#x0o{aB c^a*^U|Ӵl"ue6[k p8K cP=`]p } u%V?{Bur"zOx|T\ z cy=N,ЕB/kyJz>(\gB(U{cy ƹ^yogחx^_ٝpXJc_=,B܋5=GE?Ⴝ>y} Ix}1'uw:\³ f^\Fxz-WQ;Vr_뻹mx)7 _5B66fmZVznWRb^Ox ]ymvVVehom~ob~ 7Կ_ <7+?Q9'ldxlhc9Syή~FS:DdyJ  C A? "2#=!^$?Vt29x`!#=!^$?Vt`fYy?C5xڥ\ tUՙޯKI#i1- G&AZ@&Q*5Me`dftLbKgT&(2%Ƞ2*)R`q0"X:ܜϽd]vr/%Ia# I&c-H]U^.RY~o&kRؓ I>Zd}Cu+/>OaꝻww.%(>S~b%˅[W=;uɍ}A8[T\K o4r' HY5eʥ$a3>(!E$T7"OK^H=^D?yHd+*P۱*ȯd)2ȗ0YN7tg;:?kQHNxz|.B2ãƆEEpaCCYߏ,>IrIot")d?Y~닗DdL|2uonel'|B3iwN.PRBaR~a A`~T(>9OJK|:rZ<^V*R˂I^ΖíF[f T}u}xۮ3,%_)^kug[mf2['}V%>Q I` w[Qu6|_Wcj%%4+%kUcWD12`udqCdh[4Jt/ޒ ֩Q|m|{g } [}m+*W4ƷW>Nx)i2۵_9b~u0~ܤJT>YDgYu}78#(89tk[b=_ci13(|E˖T7D~7GyN"OOzFSݚ6?Ƙ}hP*g%k4X+Cic9L}Hcs|0J_:c5U ,]Etb:-RVM[T4NBclJ/jiɋf/O1wk0_V3?sJLYt/z0ypk~dEW6oK\v0~Wlh/h&ȧdia%5 kT@ߐ[$Afq]4d.68k`16?䟅oHtwx&}Dv O:37p{ۃ01ռa1g_0OPߐO lp7я4X>g3S$A>g;x~?8#A{ SL])x;ė)u0Fdo kgEmlmN{?_1~h;aTs[m>1~:>ȥ__>%|\!&Эcݿ[cl[>I>[89:[zG h owowk.ކe`O~06ޭgmԃwAGB{Da;":DkXqP6twY.;8#-b-)Ξqw奜^)ܭn}(vΈGz ېBbKrGkY$$+)`:m%nǐ7j? `M|-GlmW߾(o6; pQ!42#=H+KkDM\rZoZy7@&~r]룐@@chٲu&y -b]̾-Iͧ2Hg;`4HGo.@y=MeZ,%l--ak] Z@b Kg,`km]ŕ?l?lX;Şy e-dUn+^!!mVOlHʲ8-D뵴m+yD땐6Pk-+<6bxX(\cʕE?:y"ˍ,B2yrw&F-nU!*UAZ_I4'hH3yGZKkuإ@>vew>u@erVy볗6r, t0YDYm1d(_,,q|';DI~?, g|JZ5(nAtZ"v"WOJD%|_#EaUU]u}?]Y?WZ6l`12jFu7-\geWoƕ:YB,R#U~/O+!&?xyb!5Ƽ-Qrz/b8Wܺ63m)T8oSqކx(q~ֲa= ?ksm|Kh8sщ58És9`\sqy+?Ms۳0ga9sKT/ue'O|x'iJϒk9%JT?O q^ƴS]U|ᤶƘ\dy*k˭e8 5|>?|A8sVgndif,ďr`q.Q2Ώ&^[ڭez.M5ۀ?Gڵ zTW^y:OA]xku3HLGldy(⶧V?5&70ﰊM]Mzǹ .|Bum":|w!b4&Ws竁 *n- ZclC^"z_ zל8#`"_#Λ83P7Cb+ esq~`l|o818(uKgݬ:*f( .u]9`|%†SS2Y?Ώ9J0.} u*)vs\vvܑؑ:H dG$~Egع8vD:L5akZo ,'XZ˝u'쇕@>cʕ>&-^%v"2s?,Qu>:,Cf}C{Fܩ׭eav#2dɈCn*.ކo |5&#nSA YfkDo|nÐܑQgܯ[ߦ=-,_OsR|] ߟ' c?u?<{Gv De(fD}K}bo)ĹE(D}<. uB%buv(WiBeA8ge*Z;E=cɡ`rIףf9Na g Qc̳rCmC*7:#tf|7{^num.M `ƘG%Gb+ d35зScXl ^c:IƆl1 V|] 24Wcl1 U?)Sa DOf?|_7uo6fkT_mfzf7Y7 cR'Hj,Q]L8b*;%#sW:eFYۤX̬_&>Hiͪ z[?(n-֯d`16zMJ~Rm GWGUUFDzrt%W~U "s,BY&_*;Pa1d!BgT:RBCTu6YP=?hpY? (n]ui&!b4&Uq.$dck 0*8V+P<\ r>$B<1{_u\'*b;W,U쥶Wo!zqVq^gq~E" "K“lIF};b;0@JV3~ MٸOU/1V܂Vu6|3J3GODq]nSɻky췩*MMU^AYcM%XYH,Ǿ!j_`YJc_xZBк@Z7Cb+nC k!|c{ʕ>&- 9 % o+YHQƋE c,6^U/h(}:PT1̦}9W3s!QU Sq(S|] 6y-v@%%~1׃'(0LJ^!e#!nx8=҃.Z1haZh~AQ2_qf ;5=oʕ>&-ofSxeȇcGdr[o>^LDIGEɄWUܺh̒G̒c Ly7Ʉ| | ɄD nr8Ν>?_+O:~M'%Cr_qV޼In|G\/֚ɛ&vlRxEM?o_ן~O_?y?nܸqgϖٳgΝ۶mKOOOJJJLL\j#""/^p¹sΜ9s֬Y3}t)?ԩSMO,X.]f͚uqTذa8ŋrF:tƎ;qDnw @=88xaaa _W6c?7nc~F1iҤq_===7]qs6ǯ]HIII,6nܸyLovvݻ_XXxر'O;wڵknݺÇo'EDqrZ*4>%/ˏ?w=}ѣG۷oS/\pԩG:th޽999[l Je ̙3:iTѣGSongg7<ƌC%P:<\˃:sT֐v8PLLʟcŊp:GUf{N 6MȀ"#GW#P+>~xn³?~̓`WڹKC a[+++v/|W(Ů61%֭,~XisĂU:777??%%%TWZw/f "YqPr@5O$E2E?|7_~%"EOdSYYEs߾}vںu++zR `&,-Zz@ufu֢E!όbW*+H}P!RÅ.)͇ҥK\Bÿ$5i`yp)p\8߷o_jҫ(͛7fff:ub'R[-7o[ZY04 P!8۷塞ihΟ?Ou1Z3N£K) iNN)'%%B駟b(GH"iDqsI 2uܙNBP  ~`AZ<¢y > )`5LJDvFXE=W @(FtLh'-Qz裏L*1Z A,6l;DTqn#C)&5%?"ce1*5Z ݌!N8Rbh*j)*i|2Qt;-Lqq1B }u{P Iҥ^F)OUIIpu'L6'ԳgO;F5*krbفL*ULUE~{m~AEt˃ݻoi=s:0^!Azf%#nɒ%45p;]EiqU bKܹs)Hg+6ggg#:W{\CƧ NēnR8Qn޼I‘QLk׮MHHpppE9rW[w@xʕ+mllzANmddp-CyaHH˗/P-_C4) J3B$Qaaݻw9㟃Γn-&Q2 ق .]lE7#G B)JΩSRx(UcDH14>UI('D88p@:6oތr՜{ML󌭠cXd -zQQe%x.ϟ[ښIm9qhvMuDP6=<<(q GZlӤ ~w5Bo`.:j߾}QQCn?DZhQddP*99YIQfP(r2L;:Jӫ%z0N!9Q(t%Sv⒘2' QSRRLOD ^}Ȏ1يSsrGj̙CiA)&222xRC?~\ QbtÒ  ZC8]zU$}Nٴ4VjL k[P_~T-z!O.;oipy666 PU^PPR9׮]F[ӧQ\&$FO轲Q& RDQD)N:N]v-Y8Qder-fff/s#a?kC;7޽{=郿J5J xNI)R2cDQh!?^>)ԒPB&_~_,@``ٳ s6'O 4ydd4y^x(m_ 2  I}v>ȣZܹS~Dvqz` 4rHh)(%9)E!!!4#VZ~͛zE}6ę̤($I[aIhҔ@&QRPN-)) [7gΜ6̋ S۶m}iFF}ռq$/2-prrիܹ<0cƌ󕓓ã~V* ^}dvvvٞ={Ǐ=Z9 [b^/==;vYULS\{|+tՒ - !MAL+WΟ?I3 pZn4 T\K<ֹs皛#!?~<55޴k׮cǎ0`ׯ߂ \~;ƟdY6m7onoo6(lC!|+±ZlS cƌB6aRÇ_$yfϏ hRPQ6sqnH:d˫&^F>elL4?b yN J$iݐ&0!_Sh_Y Sq|G}JKKtҭYDA6Hg=BQ}'~Nj:йwoIPDʡ Prww@rAԆ 233w]XXى 7v qbIIdR߂%RKTeʣ&ʂHz÷mۖh'ʩ_>5ܾ"zdee|V>m:$$ऐ,TtUܸ+@||)8K:5.0dIh`iݔJ`ikYM`ʔ)GK!44"e BkJ|rbb D!O#G(Zv-|{찰04o5T/]NP~qdZN}Z|9XZh` i=<<&MôO?4hZBN9޿kk묬,#rҜ"jǏ6mZ```hh(-gRR*uX\\;E:Ԉ͗;Yyn^yUt=i).E6Q|6nܸ~z$P(3gKSNP@z 8]_|Ŕ)SƎ{U)u*(K(69oii93Z/AKݠqIV~<|P^tIkڹs&3!,x{{'~"hQZ*MƀTnѸqN8OPj]ZTFggg;p.\0:::11Q&pϟG2V5A#Aw'!C9'Y08AL|rr2yʕ/vww777裏w䄳W2wtj„ ?mdfC#GGG\=ׯ؀Z}.]:c >kfҝ"QU!J2k56>>q).e[n(Dóm۶!C8IꝨ(YOٗ;wZ= >{|xUm%hUMVD|#kW.\u6l0788XCb (F%CT#䓈''_53N2255$0Ϗ\VVfHq44l0LS L',,]vUipC5V](Q(۬{(1zdOY;Or-Bܨ3d}Ǒj`zbb" n޼Y ZhQ@ggg*Hf͚ѣ_~ '^d^B* D(2{Xy0ݡJl\j<|F;`L$Kŋ8ݻw$tVcxA!lڴiZZ2ͭu֎C#;99zyy" 衢poߖ z_}7|# P']9%X@H;S9;t;I7iҥXv:OI(Zx̐,iJ/@ڵ{=kkk>`IfVZz=QQ%%%kQ#dOZoꈬP)F1꼑Iuwv8SNyzZ/#Fj P1k˖-qc@ֿ3fкN2eԩ666<BE"}J_0G9xϜ9.\+J )PɐN5`T#tˀ'yg}iܹ x -5.'p`(7yd>0a|衢0bBBBT_Ԗ-[ ~YZJRwE=|PTB)QTTU8;nqn67>z*ѣغ| NZ42dʕ+eNQN ǎ zP,XaÆ͛7E1=PGոq.w#Ӌi畜J鎝j8j | tů_...IҊhZ4@ AKKKP}gբE]v7?1bQ nݺ,6<\8q._|5@u J>'I^'s2I0Hpi6OuVM9i"88cǎeeelC/+MH= rÆ 0 yXXXLLի7m$BK(%T.^xTĘ$dL[|9ywBZYYfa(F*Y[[Մ L2c Rxb(b SSS7o rrrT UII FܹsrJP)Ս^qTsT㓂)pn'yg'qqq/*7ZԨ~-ZԡC+We? Եk>}@)4ȑ#zӦMCHAyQ)]Pm۶ %w頢I! NT=' .']٤Vb['p}XG̙3_hDҢE:g˖-;A1b^!5ydOOO@߂ kٲe 6۷ڵK>SdcTՐ)|`{U){q]jѐɓ%$$$(˗/wpp033izvB)E[=uӧ*Zo}(*jժD`)T>]9uĉӧO }2aFOA)O%znt8vjp*++C7p2JZhau^Һzmnnncc%7ec <<<}AAA( )9CNefffgg݁ .\Q ҇.oF'Souͯ 3tȑܞ={rE{eeeq?nݺYXX'[[[,ްa@B\ǏwuuPϚ5+88&-r*99yƍJ|J !`Q/OIu8k d;d'7LscƌyQ iEmZlv__[jչsvu&}})}2n8A9s&:f9n:d` 9u1LZ w-< Ud~>*I7+G^I9pWç$kjݺ5:tL=7oEÇ50A|?JQp|eee/_y.^߈zq|8<['I$ d_dv9###..N0Dj_۷qW(ٳg;99(t?ih`ڵ+WLfff>ɩ'd}|r*{@NqPjϞ=DH9sҥKx=QXo].|8j#@U'0D^^w ̝y-x>qYMtttɘ]vU%ѣG,Yfi@&XOS'NtwwT20a…|%**jժUP -C!ŋ Qz*^t\QN'7x˖-k֬AQ9k(gԿ:.p=T! jA#0hР!!dT,p$vرb$u=zVa敮8$Q@:1(B6q.]~BNi_F}9r}Z-@HP򓒒1VVV(;;~Y[[(;|pN E|FGKbccR6m䋊t% ˠp t-"rB[fffBp4o[K?pg0C>}tԩk׮h)=@N7J!{111 jƍ|]խd]54Jwn*k'']1e.ĉ)//8<:nʕ`Zc0-Jo2"vݾ}={[.55)PKkر>FW9sz˗/ꥧCG=DL!D>}V`z°` Oƍ2rM8?~N$yD###d\wK}6@6lJK+Z4 >n://v{ԩƊ^gm B ˳>|8Z ' խnNNξ}!Q \I~s c{|y[Î㢗,YiӦ8֖{ӫWB>1T  O>NNNT[-QPEDO{5yd_ddUd]Y!%3a$3TKK6N]DJB=/>1Iu xZ}}}',Gi_TGPVj5?dkkۣG˗85ss 6ZNrww4`q d] ώ;d& 3WK)=i`|RI dO(';m44ܢJ[oApk::gGGNJ+HU_Y‚NK^w߱ &?!PN={$aW!fW"@^퉊z`z.|]cS Ȕ1رc!}̙ &X+Z4vW`So%n_IaeeW>3NcǎH+D?]5}t,Y-3apxؼ<5X, QR\|M"2\~T./]-[re۶mO>"n<==wTF=> *#GQ(*s)3a.] 1[lAH8pȑ#2X&ȔbQ2̼'DC<%bpp*úuaZ'-x&S[n~dqؐmrNOxx7|>D`dĦY>}epyșL2EsȒ999f=P8;YK3N"tdhq`f̘160;hѐΝ;^^^'"p[Ź!7qsoFf>-ZlP-!voƌj+V z;v0 … QhtR|RtVB<=~=c呻PMZ4䠦/--V/3ekko߾JC7.>}J477JY<<믿%XXXFoĈ~~~0 #aޒ%K/_&èzϟzT>~Xdx8=x@ڝ;wnӧOG֪k>|8"VTBTَ;^vT;;Lx)))oc'ٝ;w7$$޽{pu333Q.] %gϞ׋j欬<(nL)Vcu_U:ƦʍSYYى'pӦMm{Ϝ9䄰|nsТVA5j(- w{ҥ޽{{{{9E@u8n_xssʒUUam&SuT\mA'CLhWǏc[}||8_#7s#G6U -Lg&Oyc@ndeeuQULC&6kժոǓ'OQ|Q&(DԔ+WQ*ETz$2,IVhBIu*q/JOWWWW4g„  Nay@JJ={RYMMb…8GDIՂvݻwV'(v͛7M:D9a\\\^ yDE%$$lْ[PP;4bN8J 4OĉZ+'XjM>TK9ΗkFw_iӦV .ۀ"Esc/_><֮]kD*B-1ܼys=v*zU!,,\ _# #8C DEEFFr7233ep(Lzuj'սKju( $JSP K^uVڀٳg_o0f'|#caaAymۖ'Я_}vC[] ^׮]ϟOuP:ܹM۷S Bhǜzq(c(qVL"ʁ%Xđ!D &Dڵ+;;;--\-Z #PiĪepp0&** E9+%WõxeJ4 z *cVVAR@ʹifÆ ooJQ Ј#Ə 4qiӦSgڂ BrGK=Q b!+O>e=z{n߾f\& 7e7w}1)\\d Aƫ3>`ܹs14[ -* Gf8;|G}RSSz:o$toX9$ o:}4t=pы-1YuWXboG3AmDVQxg9r$xpܼ|jݺ5H;v,u\IIId[(2d$ÝB$R LbWnr&%dH _~`:;fLyyy49jzΛ7/44ѣ,W0\%gXOKkE5A"vܹ^S_u꘸~B⨺͛ǐÐ!.B2Yoܸq<((h… *>>^0z nP!Ǐ#J$T|q'tB&9$I$:ͅL(sR&M<@Y#kLTMpV{ 7L -[PV\9|7>cvZ$ի2>j ᠻ.I̙;{z=第SϞ=eV,Y9s&60""/`SQ!^ @qyJB'e%x:1twy}I$={`diDeŊ!!!@Sh' 5-7h -U-^TP)TG19߿?uPs;v>GPy۶m H /XPP_ꭷB?YXX`"*22R,dJ!J'5@o$8;;sLII ׇ`P`&\llUoU{T#F1%K@Jh&L{Q9@98:":{tZCXY[[#ԥKIK^^^IhJKKnݢF?}TT'OjRN2M`e9M޾}&΋.]BIbNv'sӢEs?-jq㨚/4$˰a߿o׿KP),,A/ao9'N&ɓ'O4 T>}ٳ" عsP=SW*Mz)|e {$222ne`… @'Rϗ[vN)//[>4I-0Xk@ ~'Ck֬q:QQQn #ⱐw%+2`!>m4Ȅ;v,L@` z pN> [f=LvUIB'+pjdVkݺuD L+C iv2!7n4\QZn UBX~_ڵe˖iiiF Əf0".ŝUˊ=0FOhrn 鈚8q"5kHT4NAAX< '**Z@c!ݻwyϟ?~8~8mٲ}ӊl7<.鉢C9Co*7iܹ7m#@#Fv1btlvYM8BVƍ8kk늝UM'|bggP-IJJB`˅ nݺxIe @B*ŋ9̡#^\\Lܹs׮]%[1DD8jFK"!7L`z@T$T?yԎ?8??V_D; +pj6JPռpCEH1xѸ/޽{;h _.UI-ւˠV\\\XXuVBq~B)Y=<8'Seٳg088.QhDK;gΜN:'''7ÇبZ}Kט$Zט_MV3gƌq>}:%̤uW'NW]LZh* oqK9ޮ];~s=vwEZ/ƍ<a1112 // uu'OT6~\I=~m9xVVIl[Q"fmRlbRRჾL)pB "ҧɺņWXlʕ+;t`3 [nT'oCi"{̣,䢛˩'vA.,, ;kHj|kyh#Т_Jճ;x`kˈ㢊-Zdkk~?|ᙙ> ^Bq'%|󋌌Rq&|[̶mfZhJ :T+>Kzތ|WF=bĈjQ=[n񉉉d~qvwޕ̾J<'ִi֬YS357ےJ -'>I̞={РAޕGEEJRp222@,)_dooūbǚ7o|:7|4Zhc֬Yݻwv3LBȺlľU 5xD~t̙+Wܾ}[w` T~֢˧޽{Ϝ9gz=UAf͚AXiEAiݻ #4s&N7\9駟.^xСK,۷ԩSj 8ʜsZMJO=ShcMj|B C A4ɓ&Lpww7bY$eܹt0gsb233wڥdG!ԚwDg>qR|PЙ(=z≿v `@ShF|=%%孷޺pbB]͂#GɀYN MV'6O...F0]u'-0O]t1CF7$yFF/dȐ!~~~`gSL֭[z:%%%No5N9dㄆ2-bƂ(S>liio-xe ~2|~KIF :Ĭy{{ݻwwtttss  oڴ "e)N̑Ou$/$ roE!0(:Ğѫhr&O|#&NcSnn.|:u˗e)Ssd@rv'ޚ-Ȱ+Vlذp~ oXXY~ [\Ayhp]һwŋqW?TTKqƍs$'''{{{DDDT'u̝dC+-v! \:Yشkn˨(++Z ԩSwZhQ}PǍg\׶n\v 8{Ι3kԨQ' OHHHOOwLIa 1w7o޼rJvv6D0$3}zϞ=;pJϋc4׭[gaaaA -K*]fsrj0 :vTo:t_СaՄ ̙.K!`BP "|7w;9A"""<_T:j 'خ]KL\A=Z::Q 1$]vju?4ߥKTIw{?x`KKK{{{gggO@@E8$,^~~>nܼySwtAU' v}%Iwz]|Rkr,h?Vnذ7ި,r<n\TSUuB NT=w\Njh7X%&&RC1nSNѣBEYf-Y$..NVQW\2OuAIu twш _%ٸ())3f㨴ТakkPPyMF]۱ؿ^"## ʌ3zO!yʔ)3g ]reJJJvvvAAAii,(E6O~#7WeH V?M-[Т1O?Dn֬Bȑ#C@%Q^H~I3Nz`0999]tEbŊd' >f===1nGq|$ӧOB|ל);ƾqHݻW+ZR+F6lވ:իWe3p(: qppw!H+???ᓮ~%$ź!DpӸ,}͚5?|K\ʠAƎkB)Ν;${n7n|i`,,,bbb*2xyyKMMY.|'ݙwӟPÇۆ@'.|}}v[$mo޼Y-^ٳrȒ%ijѣM5@ԩ8qsyӇ WիWӎOKKq*O2EZp# \ 77y4ם;w60/xnjՃŝ0.ӋZ4?CYY|kA-''M6۶m3 Sݻ]]]pGؤM6aQQ_jjM |O('.(#  .|F?NQb:u**3̺^Z4S)/^jBĴ G@'NT%XbY~~~UDz 25!SLƮ<)U^ cKi5ZDM4V3EXt@+-[bEP^^^uϦ֭CU:˫FsRRj~ |z3?X 0 f=>, UdXDii)rϮBZq-u {<TDuFT ߿=TAD899yxxx&N:,b~3*H(ݻwOHH7(..nٲezzqԩF=Vȑ#[`fW+Z4ZbLYy:#aÆzV^ rƌ~o',Vbb/u%p8-/>Ir_tCBEEEu8+Mnݺ \G;D./>ܻw5kTZТJڦMO*ڵKoOpmyٳg'hʕ>>>K.m۶mϞ=2N򏳓ZWӻwʰ'OjY*Lgg 8a*5&322t1 FG$=9W`§U;w9cƌI&k>q]Z%4"C5vXAU̒Im;FD<_>//Aey7ol8p$x8ٴg4bGv3SETOjьFy`:ҺSL9yYnܸ]x  Hmb-^Q XU:j`S(n$ՍJ=m4tAt$ߒrj;YAT-trr s#`)i޼yVV!'_z8'֘J -Kа1QIIСC |%' pmT[qxw6nXOOد_5k ZhB'f]jSG RhH:EW _EEEŽÇ>}fT*.p(T5OصkWYzedɓgΜy'OѣG5ljҤI*z왖fZhO?޽{ppk&yxxt Xbl^^^ ;y,lदHjK>))#e7@ JIB;v}mvȑ ___~ä"ڵk/'-^(cRiP 虳LpvvNOON;vqΝvcN*OS5/ƪ+I/.ޗ_~B ep|={,WWY<்MJJJ}*ztt'|]p̘1Z\B -^(++Tʯb@QQu$NmQW;w⦐Ms΅OV٩q^\2'1hbؽ r_1114620698,& FPn1Table/CompObj%( hObjInfo i8@8 NormalCJ_HaJmH sH tH T@T Heading 2$<@& 56CJOJQJ\]^JaJ<A@< Default Paragraph Font58GJSV_bilru} $*-67@AGNQXagpy|.1>AJSVbhky|   !"#'()4567<=>?IJKL)"STV+X[\]abcdefhijkz{}~#58GJSV_bilru} $*-67@AGNQXagpy|.1>AJSVbhky|     !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghi $ @V "#1245=>@AIJLMSTVW\]_`ghmnpq{| !"*+,1289;<BCKLQRZ[cdfglmuv~  ()+,45=>@ALMRSUVcdfgoprsuvz{}~000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002y h1V l,2$L*Tnn[. '@fgf(  x  < B  3 x  < x  < B  3 x  < x   < B   3 x   < x   < B   3 x  < x  <   B  3 x  <   x  <   BB  3   xBkChDEF1hk @`B  3 x  <   x  <   BB  3   xBkChDEF1hk @`B  3 x  < x  < x  < BB  3   xBlChDEF;hl @`B   3 x ! < x " < x # < BB $@ 3 BB % 3 B & 3 x ' < x ( < x ) < BB * 3 BB + 3  , xBlChDEF;hl @`BB - 3  . xBuChDEF;hu @`BB / 3 BB 0 3 BB 1 3  2 xBkChDEF1hk @`B 3 3 x 4 < x 5 < x 6 < x 7 < BB 8 3  9 xBlCiDEF;il @`BB : 3 B ; 3 ~ < B< ~ = B= ~ > B> ~ ? B? BB @ 3  A xBlChDEF1hl @`BB B 3  C xBlChDEF;hl @`BB D 3  E xBlChDEF1hl @`BB F 3 BB G 3 B H 3 ~ I BI ~ J B J  ~ K B!K !~ L B"L~ "B M 3 }B R 3 |~ S B'S{ '~ T B(Tz (B U 3 y~ V B)Vx )~ X B+X  +B Z 3 w~ [ B-[v -~ \ B.\u .~ ] B/]t /BB ^ 3 s _ xBlCiDEF1il @`rB ` 3 q~ a B0ap 0~ b B1bo 1~ c B2cn 2~ d B3dm 3~ e B4el 4~ f B5fk 5B g 3 j~ h B6hi 6~ i B7ih 7~ j B8jg 8~ k B9kf 9BB l 3 e m xBlChDEF;hl @`dBB n 3 c o xBlChDEF;hl @`bBB p@ 3 aBB q 3 `BB r 3 _ s xBlChDEF1hl @`^BB t 3 ] u xBlChDEF;hl @`\BB v@ 3 [BB w 3 ZB x 3 YB y 3 X~ z B:zW :~ { B;{V ;B | 3 U~ } B<}T <~ ~ B=~S =~  B>R >B  3 Q~  B?P ?~  B@O @~  BAN AB  3 M~  BBL B~  BCK C~  BDJ D~  BEI E~  BFH F~  BGG G~  BHF H~  BIE IBB  3 D  xBlCiDEF1il @`CBB  3 B  xBlChDEF;hl @`ABB  3 @  xBlChDEF;hl @`?BB @ 3 >BB  3 =  xBlChDEF;hl @`<BB  3 ;BB  3  B  3 :~  BJ9 J~  BK8 KB  3 7~  BL6 L~  BM5 M~  BN4 N~  BO3 O~  BP2 PBB  3 1  xBlChDEF1hl @`0B  3 /~  BQ. Q~  BR- RB  3 ,~  BS+ S~  BT* T~  BU) UB  3 (~  BV' V~  BW& W~  BX% XBB  3 $  xBlChDEF1hl @`#BB  3 "BB  3 !BB  3    xBlChDEF1hl @`B  3 ~  BY Y~  BZ ZBB  3   xBvChDEF;hv @`BB  3   xBlChDEF;hl @`BB  3 BB  3   xBlChDEF1hl @`BB @ 3 BB  3 BB  3 BB  3 B  3 ~  B[ [~  B\ \BB  3    xBlChDEF;hl @` BB  3   xBlChDEF1hl @`#"  B  3   ~  B]  ]r  6^ ^r  6_ _<B  #   lBlChDEF;hl @`<B  #   lBlChDEF1hl @`<B @ # <B  # <B  #   lBlChDEF1hl @`<  # r  6` `r  6a a<B  #   lBlChDEF;hl @`<B  #   lBlChDEF;hl @`<B  #   lBlChDEF1hl @`<B  # <B  # <  # r  6b br  6c c<  # r  6d dr  6e er  6f f<  # r  6g gr  6h h<  # r  6i ir  6j j<B  # <B  # <B  #  <B  # x  <& &x  <% %B S  ?  !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijklmnopqrstuvwxyz{|}~''4>84<M4_ 4 4  4J 4V G4a I44X /&4l E ' 48 t 4I 2 4  4 f [! 4rf 3! 42 04+ %4%x&4xWyQ4Q R4WK4Q4 > 4v  4 v 4 v 4 v 4: 4P: 4KI 4G4x%y4D  4  4B4%4( v 4Q; 4S 4t 464&40S44 & M4" M4^r 4G!4xy!44y4nQ)4+y444'4:<  4< : 4 4#x4 & K4 Q 4 4!D4  !4!T4#$!4G^4xy4K4m44Y4cY48x4x4Px44 x 34px 34X 4 4 % 4~% 4} : 4|K I 4{A 4z h 4y 6 4x%vt4wD + 4v+ , 4u %4t+  4s %4r+  4q4pH84o 'y4nHI'4m'i4l89'4kf4jM,4i~_4h~4g4f(v]4e]<]4d(4c_4b6_4a~4`4_^4^4]k4\4[FYW4ZH%B#4V Y4UZ %T#4Tg-4S9-4RXRz4M 4L  4K  4J{ - 4I& - 4H 4GZ [ 4F 4E)  4DZ [ 4C4B4A $ 4@  4?84=M4; ^[4:x49I^4847 ]| 46a 6| 45  44": 43<K4 42LK41}Q~40WQ4/(Q}R4.TK4-Q4,YK4+(Q)4*j4)o4(J4&XD4% + 4$(+ , 4#4"4!4YC4 %#4 Y%4(+ ) 4d4=4YZ4%#4 F%4 +  4l: 4[v: 4K& 4ZK4Q4|: 4/{: 4K"O 4: 4u: 4  KO 4 : 4 I: 4 KO 4  M4M4^[4 4u#44#4/4jkY4Z 48  48 9 4F: 4: 4K 4 J 4  4  4b  4  4P 1 4  4 3 4 4h d 4 D 4f V 4 M  4 M 4M  4V WM 4+ M 4f g M 4: 4 : 4 K 4K4Q4Q4 Q8R4 K4 Q 4iK48Q94b  4 4   ""**,,11228899;;<<BBCCKKLLMOQQRRZZ[[ccddffggllmmuuvv~~    (())++,,4455==>>@@AALLMMRRSSUUVVccddffggoopprrssuu33 ;;xx}}      !!")**++,,11228899;;<<BBCCKKLLQQRRZZ[[ccddffggllmmuuvv~~    (())++,,4455==>>@@AALLMMRRSSUUVVccddffggoopprrssuu*u@l@UnknownGz Times New Roman5Symbol3& z Arial"qhuuA0I2Q AdministratorPrinceton AffiliateObjectPool'*PnPnWordDocument"$SummaryInformation()+DocumentSummaryInformation8M bjbj== "$WWlDT"T"T"T"p"DD"""""'))))))$^ ~jMpM""gb( ""'' 2"" DT";4x06$6 Figure 7: Characteristics of DDoS Software Tools OS Supported Solaris Windows Linux Unix Lie & Wait Actively Poll DDoS Software Tool Agent Activation Method Attack Network Communication Client - Handler Handler Agent - None Agent - Handler IRC Based Yes, Private or Secret Channel No, Public Channel No Hide with Rootkit Buffer Overflow Trojan Horse P rogram Active Scanning Software/ Backdoor Vulnerability Agent Setup Bugged Website Corrupted File Installation Passive Yes Protocol TCP UD P ICMP Encryption  !#0235<>?AHJKMRTUW[]^`fhlnoqz| "),02B*CJaJph6B*CJ]aJphB*CJaJphjCJUmHnHuT "#1245=>@AIJLMSTVW\]_`ghhmnpq{| !"*+,1$a$1289;<BCKLQRZ[cdfglmuv~279:<ACJLPRY[bdegkmtv} ')*,35<>?AKMQSTVbdegnpqstvyB*CJaJpha  ()+,45=>@ALMRSUVVcdfgoprsuvz{}~y{|~B*CJaJph 1hN N!"#$%Oh+'0|  8 D P\dltssAdministratorodmidmi Normal.dotoPrinceton Affiliate2inMicrosoft Word 9.0@@Xf@Xf՜.+,0 hp  Princeton Universityr  Title_1114628350. FЈЈ1TableڍCompObj-0hObjInfo i8@8 NormalCJ_HaJmH sH tH <A@< Default Paragraph Font>B@> Body Text$a$B*CJaJph#&07:DGN`ckux)3>ANUX^ampu{%(/29<EQTanx{A  #$%)*-./1234<=>?@DEFGIJKSTUVXYZ[]^_abdefpqz{}~#&07:DGN`ckux)3>ANUX^ampu{%(/29<EQTanx{   !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTA  @VA   2356?@HIKLefnopyz "#-.0178ABDEPQSTZ[efhistvw  "#)*,-12;<>B0000000000000000000000000000000000000000000000000000000000000000000000000000000000000 A  tA @l,2$ ÅȃVqUV@HvH(  r  6 <  # <B  # ?   lBCDEF@ @`<  # x  < x   <  <B   # ?    lBCDEFN @`<   # x   <  x  < x  < x  < x  < <  # x  <   x  <   x  <   <B  # ? <  # x  <   x  <   x  < x  < x  < <B  # ?   lBCDEFA @`<B  # ?    lBCDEFN @`<B ! # ? < " # x # <# x $ <$ x % <% <B & # ?  ' lBCDEFA @`< ( # x ) <) x * <* < , # x - <- x . <. x / </~ < 0 # }x 1 <1| x 2 <2{ x 3 <3z x 4 <4y <B 5 # ? x 6 lBCDEFA @`w<B 7@ # ? v<B 8 # ? <B 9 # ? u : lBCDEFN @`t< ; # sx < <<r x = <=q x > < >p  x ? <!?o !x @ <"@n "<B A # ? m B lBCDEFN @`l< C # kx D <#Dj #x E <$Ei $x F <%Fh %x G <&Gg &< H # fx I <'Ie 'x J <(Jd (x K <)Kc )<B L # ? b M lBCDEFA @`a<B N # ? ` O lBCDEFM @`_<B P@ # ? ^<B Q # ? ]< R # \x S <*S[ *x T <+TZ +x U <,UY ,x V <-VX -< W # Wx X <.XV .x Y </YU /x Z <0ZT 0x [ <1[S 1< \ # Rx ] <2]Q 2x ^ <3^P 3x _ <4_O 4< ` # Nx a <5aM 5x b <6bL 6< c # Kx d <7dJ 7x e <8eI 8x f <9fH 9<B g # ? G h lBCDEFA @`F<B i # ? E j lBCDEFA @`D<B k # ? C<B l # ? B<B m # ? A n lBCDEF@ @`@< o # ?x p <:p> :x q <;q= ;<B r # ? < s lBCDEFA @`;<B t # ? : u lBCDEFM @`9<B v # ? 8 w lBCDEF@ @`7<B x@ # ? 6< y # 5x z <<z4 <x { <={3 =< | # 2x } <>}1 >x ~ <?~0 ?x  <@/ @x  <A. A<B  # ? -<B  # ? ,  lBCDEFM @`+<B  # ? *  lBCDEFN @`)<B @ # ? (<  # 'x  <B& Bx  <C% Cx  <D$ Dx  <E# E<B  # ? "<  # !x  <F  Fx  <G Gx  <H Hx  <I I<B  # ?   lBCDEFM @`<  # x  <J Jx  <K Kx  <L L<B  # ?   lBCDEFM @`<  # x  <M Mx  <N Nx  <O Ox  <P P<B  # ?   lBCDEFA @`<B  # ?    lBCDEFM @` <B @ # ?  <B  # ?  <  #  x  <Q Qx  <R Rx  <S Sx  <T Tx  <U UB S  ?  !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijklmnopqrstuvwxyz{|}~AE=4* p48_` 4)p2 4_WO4WO4{s4j{s4{ws4D 4%F & 4:  4 D4: ; 4 ]D4  4}44>64ph4+s4+4:;4y%w %o 4L"w y%o 4" % 4!V !& 4# $V 4# # 4?(w (o 4&w f(o 43( ( 4|& M( 4%V ) 4$$ 4 F 4]F !> 4i a 4 4 V ?" 4 W' 4R V 4  4 ' 'V 4W' X' 4n o 4R4ey4~D4} 4|I{14{.y&4z".&4yn4x  4wQ)4v _4uQN4t _4s- V 4rno 4q e 4p $ 4oV  4n/)4mn/4ln4kgno4j`/4in/4h&/4ggnh/4f74eJ74d4c|\4be4axr4`@4_-4^34]4\"\4[w .o 4ZN w o 4Y  4X 4W V 1 4Vw o 4Uw o 4TB  4S \ 4RV  4Q|} 4P g 4OD V 4N 4M& V 4Lg h 4Kw [o 4JVw 'o 4I  4HV  4G F  > 4FF > 4E; i a 4D 4CV Q4Bw$%+4A$$4@!&L&D4?[#L;&D4>$p&h4=C$p$h4<#p$h4;2"+d'4: Q 49W X _47% W 46 rV 45% & 44V&43&}42IA41R{cs40D4/Y  4.H f 4-  4, 4(+N 4'+4&:;4%VLD4$L}D4#+p}h4"+4!:$4 .+4|}4`+44LOD4 LD4ph4.ph4Q pUh4B +s4^;_4ldd4ld4vz4$K4LXD4L D4ph4ph4 p/h4 +@4  V 4 W X 4 [ E 44+4_`4(414 irB      22335566??@@HHIIKKLLeeffllnnppyyzz   ""##--..00117788AABBDDEEPPQQSSTTZZ[[eeffhhiissttvvww    ""##))**,,--/1122;;<<>>?B33vv      22335566??@@HHIIKKLSddeeffllnnooppyyzz  ""##--..00117788AABBDDEEPPQQSSTTZZ[[eeffhhiissttvvww    ""##))**,,--1122;;<<>>?B@,A@UnknownGz Times New Roman5Symbol3& z Arial"qhuu!m0G2 AdministratorPrinceton AffiliatedDocWord.Picture.89q  FMicrosoft Word Picture MSWordDocWord.Picture.89qOh+'0 0< X d p |ObjectPool/2ЈЈWordDocument"SummaryInformation(13 DocumentSummaryInformation8    9 !"#$%&'()*+,-./012345678;<=>?@ABCEFGHIJKMNOPQRSVWXYZ[\]^_`abcdefghijklmnopqrstuvwxyz{|}~M Abjbj== "WWl   < 4< 00000yyy$P pj? yeyyy?00UITy@0 0y ` 0$ @< Dj0ڍzڍ .  Figure 8: DDoS Countermeasures Mitigate /Stop Attacks DDoS Countermeasures Detect /Prevent Potential Attacks Deflect Attacks Detect/Prevent Secondary Victims Dynamic Pricing Install Software Patches Post - Attack Forensics Network Service Providers Individual Users MIB Statistics Egr ess Filtering Drop Requests Throttling Load Balancing Honeypots Study Attack Shadow Real Network Resources Traffic Pattern Analysis Event Logs Packet Traceback Detect and Neutralize Handlers Built - in Defenses    1346>@GIJfmpxz B*CJaJph6B*CJ]aJphB*CJaJphjCJUmHnHuT   @ 2356?@HIKLefnopyz  !#,./168@BCEOQRTY[dfgirtuw  !#(*+-02:<=AB*CJaJphT"#-.0178ABDEPQSTZ[efhisttvw  "#)*,-12;<>?@A 1hN N!"#m$m%Oh+'0|  8 D P\dltssAdministratorodmidmi Normal.dotoPrinceton Affiliate2inMicrosoft Word 9.0@G@F@՜.+,0 hp  Princeton Universityr  Title_11146185176 FCC1Table<CompObj58hObjInfo i8@8 NormalCJ_HaJmH sH tH <A@< Default Paragraph Font !',47:@EHijqrz{f-  !$'./0234568=>CDEFGIJ"*+,   !',47:@EHijqrz{"   !"#$%&'()*+,-f  @VfEGHOPQXZ_`bcefklpqxy{|~  !")*,-/0LM_g000000000000000000000000000000000000+ffelRS,2$jiRSEt@ER(  r  6C <B  # "B<  # Ax  < <  # @x   <  <B   # "?   lBCDEFx* @`><B  @ # "=  lBCDEF~x~ @`<<B  # ";  lBCDEFi* @`:<  # 9x  <  x  <8 x  <7 <  # 6x  <    x  < 5  x  <    x  < 4  x  < 3  <  # 2x  < x  <1 x  <0 <B  # "/<   # .x ! <!  < # # -x $ <$ < & # ,x ' <'  <B ) # "+ * lBCDEFx* @`*<B + # ") , lBCDEFx* @`(< - # 'x . <. x / </& x 0 <0% < 1 # $ x 2 <2 x 3 <3# x 4 <4 x 5 <5" x 6 <6! < 7 #   x 8 <8 B : 3  <B ; # " < < #  x = <!= !x > <"> "<B @ # " A lBCDEFx* @`< B # x C <$C $x D <%D %x E <&E &x F <'F 'x G <(G (< H # x I <)I )x J <*J *B P 3 <B Q # "<B R # "B S  ?  !"#$%&'()*+,-./0123456789:;<=>?@ABCf>4=4I@  4JQ 4E P~ 44NPE42/E4.,s4$ ~ 4T4TZ4T4![* Z4'g4$ g{4;du4 i;@ u48"4R 4Q 4P! z4H 4GT  4F  4Dm  4Cp {~ 4B% = 4Ab1  4@ ~| 4<h=G4;  ] 4:K47 +46oc45Tc43mc41c40/)4/)Z4-~4,b 4+T~D4*Z(4)vs4&'4# 84  +4  4  4  4;%  4y4$44nT4L)4)4; 4- n 4 I # 4%C 4  4 -  4 I 64 4I4 44EgEMTg:  ##$$'',,--..22556699@@AADEHHOOPPQQXXYYZZ__``bbcceeffkkllppqqxxyy{{||~~    !!""))**,,--//00LLMMU^__``aabbccdg@\fp@UnknownGz Times New Roman5Symbol3& z Arial"h؄uڄu!O>0G2 Administrator AdministratorObjectPool7:CCWordDocument:"SummaryInformation(9;DDocumentSummaryInformation8LM fbjbj== "WWE lLLL  9 3339!9!9!9!9!9!9$V: v<^E9L3+333E99 Z99993 L 9939999rL9 n4 399p9099<3n<99`r Client Server SYN X ACK X+1 + SYN Y ACK Y+1 Figure 6a: TCP Synchronization Agent Server SYN X ACK X+1 + SYN Y Figure 6b: TCP SYN Attack Spoofed Address ACK X1+1 + SYN Y Process remains active and resends ACK + SYN DEFHNOQWXZ^_`acdfjkloqwxyz|}    "()*+6B*CJ]phB*CJaJphCJ B*CJph B*phjCJUmHnHuREGHOPQXYZ_`bcefklpqxy{|~$a$Ee$a$  !")*,-/0LM_`abcdef+-.0KLM^_fCJ6B*CJ]phB*CJaJph 1hN N!O"P#$%Oh+'0x  4 @ LX`hpssAdministratorodmidmi Normal.dotoAdministratoro2miMicrosoft Word 9.0@G@h:@i՜.+,0 hp  Princeton Universityr  Title'.E]t1(?իWB+'8A- 4OuQ}ǎ#**bqv$/*dW>鮞@{''Xڱc7xm]PZLA{K{T6o~+,i O˖-s߸qCҧO&>=2e L4t$gXX˂ LdS?ʂ>}DGGWYnnn^nJڲeKnݪCf ӳC=y6𰵵傮_twwy󦩄ڊ+7o~E\krCV ~+KV01 'Srr͛wuAI{֭?\ҧ:>7.'UQai H2_~&.ǂ'-^2sGe~TƦQd'Ǣӈ!;~hxuY*>Ww d֭ې!CEEEF/ dJ޽_%a;vT≊&ejuٔgɓ'%1Wjή|RD| z街wnرIOH㡍zϟ5jwTK%%%:u4( &XZZf?;ps)lxSFDDݻW$KܻwxR11wF0>=9bΙ3gժUAe~rvvO*.]/ %qvvޭm-{P_(^5Rg#GV}Gqrr.FW^j"V$ `oyR$$kzFW[H/v 9b^ှ%-ZXfVh@ٳm2fff >Qs'Mdx'oƍUqq('̦+K1Zn|"d:޳LP4-64ƅK۷o[[[kYhqĉW@ÓYA888Վc-[ ;~8ԩS4 II-y`kIJB!֭[:Mu7lЯ_?\OYPP^^^4<"kѨ#--wٷo_U)007ިM:t0bd+.$ùsRRRf̘zСgϖIV̻w*8F3tIm^() [~=赊Т!U?,,SN/_ӟ'[ogEN8ZF[wJhҍ'OlݺuڴivQ]'>-uj%é|R/$C×d7 ڷo{Jtq-oI&7NTDk111}=KχPIs]f ߟWRR"SkwY7 hڵܕ+W>-*)P([Wn'c;9 -z)lH6k֌PO{XZZZYiEҥKg\U:*-w]y`x .@ٳ\A)V\bcŊ29))j 7f$ ('tb,&Q|zs^(Iy*]v>SK;99@-Zk|4֝՚9s&ƭ]v>>>{Hр pڽ{7u[VV @Zx1*((]O̙ps_~%@B0=x@3vN`*T7>H\[ =Zǥn$ٯ9H Te˖'A;GH-Ӎ76,44%w! IG]6H"zq=<ər7>>(L v„ 'NWiZ4@I^ _ RPP `3!j/Trw=Þ<-ot,-jy2,%F˝1cСCe<x:uM6/ M;@LD+Z4 W^֭tPAATbHT.t 8poM̚q琔B# IR2t/35<QYcgwA0Fŕa7oތuuu]reDDz\"($LS -#e2ŪU`IU|uqq|2B'++kڴiSNN'$ýJ!$BZNp5҄M&.ԛI… |fɒ%111Ғ&aaRHH… 2,,lΜ9l_>N`N(>Av]UtM<4CU_'Tۨ !{*СC -A !Thh+ӶmVTwuSqzbD|Rq(>y!Lztq7qykLYrxÆ HS;i'lllOU%h={GZ1ǂ lmm5v =O>k֬2ҥKZ*&QP(6=ʑ.JouJǑ\.\0"T<1c8dZ*d973gάQSqAuvieMɼkܲOZ%^ꐴ`#55DoJKKwShtnnn^BТVߠ߿!kN84n'+fǠ'B)]PAke!o2^lB\xG|-9ҡCKSj-- A3pý{HKv͛7ҼLRfl'R[e%+p;aLrr2V;wlڴ-[jܒ3˳LHH.4vʲVQP=zN*E <2irCT.jرc}}}鲔eW >$9KXUM(`}!\KJJݺu[|!S&''kٲeb *uQ$u.&JZDDĤI7%23Etؑov>k֬؍7fgg߿ѣeee2Çj'}T+ Ԣ <"`dɒÇn߾mkkklc0{l3?xIHHM,2Z4ɞ={fee.?Ϙ2>ܹ'%VO>/-n'˗/;;P`5 ^y>)JNv4DaP P=zhԩ7n0l֭ 7;sСQFp+,1Q?3… *ڵښi`K||Ν;qҋ/RVK!i,0tf!KsFK+_/\ё ]"͝ 9rd„ {hu1Riʔ)VVVIII]h{C9 $w*g4Otf!Kti 'G@@Ģ@޼yڵk W4EBzm}v877,;vL޸qCNz4gTQ2C> u5lذ`=7aDUf:}ɓ'\CNam}%ۿ?I8YIeMYꁶ)22rԨQ<_;v̟?pA'ܹsWwL7OO7WcdrXOнg?{eК]AY";;3m443Mcy׮]u֑#GBCC `iiI%u쭦}+**O2EQ9Jrr2~A-@Cf!ʐ} j; ID!:ut5Q>M<3P|]d\]cScn077F䔤Q|<Ý;wFEEaƌ(&˴Fcǎ\`0*IYSf>9nmmk#ZH@{`w{<߰s굥zPhE "@@@2̣ SgdCd42PkњzԶGOz}A ~}{k][2xh+$Ob]/nر Y-[78cMF6&\p6eO62SSv *ȤL߿ڵk!AB&MxrX˖-`=hcY;w9SU:t C4hPjj*pBg1LaÆi1n\hQ6mvʽ3:LвBWEz]qzj Xy4ѣUOl-]ta@c<߿Νg̘V1** 2|mۖA`&YԆtM #|O'>0* J# K6K͜9;t g86pn7 e< IOO8p C;p45.׏w(xW(V6߻w 7܀]{ohȻ˟y%8=7 =צU8/edd7ZgT7Uq%8|2AImGddDP$ O[ do~3##: |}mJ-`؏999?'a  8N6{ر ԷAХ [oA^Q H9!h…֭۶m)??KPƍ7jԈB{bCIIt z8֐E +-O$*믖 ̳Džg媉[LfLO\chQ3dpQ݈"+p/@"|1֥2xHUT=޲r{ _b?-fhdv1LiCVf*2Twu=M%aTWyijŎg ;֞&˛m{-XhdنF!_L"'Q)PKUGif6] <^W_eԩS"I_[=Ug6tՄO6PT,/vh2{R$b5{h]=Q1 N:jԨ.]`.~ ^o933v9Xf])w w@8Ms+X=3ƔSϼ¶*4;j^1i4hP۲ږyk >i$Kvg?~U; l@RSL\=؃>x>;O_?yѢEݻw 6NZ9'D4>7g_|I\̌#.]rرM6Op) .F7G` 2vp&@J uIѣG-,Xp'6mRK Y'p¬8n2p.NfXY: JZ IKK:tڵk'* ;ŋGAb ЈggLZ_ǟ09X5ˌ FTie˖w[nݳggIs2W7|Bg'ҥ *b% @% 3*JՖ5!֭[_z%|Ef;㙙K,!Ekj7k,*K`*xEIʕ+SSS) %wQ9/^6tEC]s+, >yuiA̙3009~Yt)Z/v޽^z:uɂ{庣5Z#y] wYzyHy>,Bf c Hؿ?.eh7x*ya* (Ygo2n'h24+8{E10 ֻwo@馛WެY;4hԨQ=ܸq㴇wq/IB8{ lI_B#{<qӦMm8y*~NVׯ_/HkwԈ\诊#m]vLnv'}GRr1 qIBk14:R~*B1P&LÖgy E!j(He&fdd@7lp2~™جt2Ĩ h) nٲgϞkڴadˁȑ#c&MO>='' Ӈ)l9|9`aWy*{,F}0P˗߿UVO>d+W`Wum۶U/gee]&@Lb@dv5_[z-q޼yݻw'G2jY$*O=1 Ƃ H(&)&F |'_`*!w֛8qԩSGݯ_Ջ_0i„ `45+f'2I{퐨f;vȘ4i7ŀgZ;O A&8)Vj# iO$NTi0{\֓} a" m"_x6,yF7_ 9^*4S||OŚ7ml+<=AGm<(}>R&m2hj2)8yrݻw4۷o{lٲiӦ7[W^Yv™,._~Æ 7op<2eN6V;0M%</Ҧ3 ύ5g 8|0t\bŲe˖,Yx .X`^pЕEd$^j7r;ٺu+J@!QaRϫ9{@s\mcg G'_?SΓ9$N ۪SK L%D ^oϟ?wٳggddL:uʔ)'OT\^z%Nriڴi3f 1XK.!< c_{5 #c5}zK)6̼Ҕy^_wB|)^3vφ2vÕg*\m2.8gϞ\ K D$Kfo &?~̘1F1bÇ'4zcǒ_9mK03>P   p *cMm#m,!,OW728dL2\^<{)\vv}3 رc ׎;@M6L˗/F+ /&8 &q#Gn5mn[F&7BVװ: ihѢQFdJ@޽{c 6lܸq$5kDjժU)σ WG8Uuح-ѺP.Q}J@ŽVh1{:?kO6E;߰%& `Nr c 0NN1^lrMB!Y˦*@ή]{cjٲeoK.Ep'+yJL2`*q};wnڴif͠S뗞FB222+V[n˖-چo̻p @`fmۨ %å;wji(HƽYдKKsVyKt^,oIKm/[~Je+6d%E_2U綻x1|I<T8|r9. ܢ{8۷o:ux?@PgϞHM2"4h\QKZE&իW?55*%X6"l1_mV.؟=}"Zs{]DlI#=Pxl"-[lw[m|ndɦw:uӧgE}/nyB#`ӵqE!2sE(رcioѢE< ';;[}]p X%starٳ?>5kT}:O?v*FEnIJ5hРv 8ܮ]]Bg&i PJ-fŋIu`ĉ]@ɓ'4>hCRv4ɻ1"ڪ[n >>]D1(2bI’X'ɝM^(9Zbj \%c?R*xPH4M:uС7.B3bCUV/~׼ysc [of #̖&7e&i@ lޡCveȐ!#Gr$#ayPJfe i0Lo!H l牙狏O60+I_lLj iܹRSŖ~%IyݖLMX%^eb  E$/ѣGCЛж0`I&hUjj*T>)M-ՒW m3 5亹2g{6Dǧ Nldb&i98eͱ*@l{_G\aG1UPV@jc@]6#e!&|싏Otrۙ3g3ԩStL߄%ѺG`a>P>h &"A={4KCykb$f$jO} @,3} gO\A8q||*2ٻ3h&]Oxɚb|ЋA&0C3" ֜Ⓢ3#Etcx P[U3W.5}Ev>$S[[Bem۶m uHQv*ԝS_W@ JH W>Wzub4(ES W0hRP4ɮOW]vb?cϟ)A0'ن Nypa~~>] 5ǘ 24I! 3/ h@̽#P+xR/WԩSregM`&ZTa3 ADw5>MMcF|4kԨ(Ea=PժU&Tԉ_ AZ֬Y3" ̃W*DDl 4IvRR5#e);JK||JܬNbmtF5k,YB';w :ЂG94%}_cÇcs;sIl߾gjrz룏>>A)#8J_6@2Ms6//W YB~aÆ[W4d&v@癢k "(~PO8! nih@@I&RRfpH/?K2^1>Ds҄:Ӎ^h{nݺV%8DkEh#w 9h}*2Qp:((P+E=EyPK?4lzկ_EvU4iڵ7nL38)0aÈf>>#̞={ RG=F)c'۬Ӝअ 8aa&}|A;T 25W_S(72Up5TUF՚6m*F:mB:f͚ժUw~/O!:` AwpK ,<ƏPn´*Lfק@ʎuڹs%&J:!ǧNɞsRpzb)l'Эe˖|8[PO81cƌZj1m%ctGIyYO>d̘1&yM:bH }NJ%Qh?,6)AD+ hp' o6AUPJqRO1Ib|*}dG(xv~w.χ78"ѳE?&|Vy<F`.;ǤMnف7M!77%ߪ<3sN<ի_AuRej/~5ZW9$IDk/}5\?@^=حr:!__@@%w #:-rMQ5I? ۮo*!uv]Kkhh Li{,UF-wHh Um꟭Mu]\앬+v;wSiV9jSo JVn^8SӢ7sL[P|-ΌL}28O 'Φ)_ %ַnwK ? orUy[c'he8685xpzӆ5]vRӜpTvwΥ(ru.XO 2< x2/kMN3usU wbGMhiU/vg?8;T*%TuӜ{T WrnFY])uL&%}j8}ʏE"[|)E_ioDkwR/v-'uäk&j͡!_N*KvCI:5D۰fr =)6 "enx0ϝˋ8#6LJSӆsGV On?"I;-/~SRMs&)?3I_ODJn;Ź6qq9\k#E5"ſ3#Y:)z\æAhM7X8 ]|Pw[+jY賤qyk0-"XH*o uÉp0rȯŸ%E[a:IiLJΣgkDŽjMm#qyk$ 7cJj0U)w!N"~K=Ν>qyk=ѻ~@$g;ɻNsf,4j޹-=%2ÒơΓݓt]soGJna#Xճi=gޘT9&Jף[A)gT TgO$\Qܜ3@m1. @|,oo0Lmj̉ _GϦ)g,l4硣A}S60r-opo;Rt׹\CFjS<$Xvls>6$P͡}{Roek72HJ>=8;:9R^38v0ѹIB{lomw7x97LhX\+Xp-zP_73jkUY$zg[pYIՂx#J-Ep̤k(<[%DdtJ  C A? "2$4 4=3 F }`!4 4=3 F | PL0,:xڥ] xŽٙ=`BG˒Z"UhL!xOBg /ҊBU,P@yP(JU xg,&{Nvf7Ir~3cy*)7(JPFazW.IQz+^L./Esjg j,.5OzwT%?U5H%)_:Z%i*UҪKJ$;=O;6V^\ϛP`ϦWǒT^nX3 5%chVN%SS(_kX{=0e7˵ycAڛ, w5\@+#H]0ZY\$אKM[ ŹeKm9JzbYQ>=))$CYno8YSI7ڮr-һç RX^VG [+. Tҕ*},* l7+kֻ]YptNx„4hLuPh:͂t%Jb%CW+w߅!q4*I:;zKj;0q"۞acgͣ m$qΟ0Ciu Du;z!x եǵUB횀>q.NvvõwO j FfpywDc5Ұ2NTl.aa}A])aeVk@Awrӛf79P@j ֢Kz8z$؀κz)q'K P|z6Ѐ6iъbh0f:46p ( >h@O9b բAY 5cd|^=PY^U6J⃝!]y^ lad|"M>@}E>p OZ\ZVDxc&~ܖo@]{u3/±Zcd  $[/ƣ *J]JAB:R;;Dxc)!(/Hx_>=1 FS!H0.~u=mY&=_24tـ^1⺹+SlBEU Ad+1vHv ~12m7 y}^mbp ܁ַi,[߾6H`^v1A>) ~Ȝy7" N"?+sxDr]\G[/#\]LjX^2K:c#(Ɵreyx´Mois ~>֘V}Ƨf5fǍf,瓜8to9P\{x3M4ϼ{&%5 "[BKrOWG[;LKy#{02-$\KD+*|枒Ri)g{L i)81a&o)9FGZrxNc=Jk,FFi'#7w +ӟJ1B3Ha i8>dw+7v"u1X=G:cHC8JWFJ?>/HIPohi# ]Z #n5S';%Ns :o51TkER^"VZ+gq iKoXZ?Di Ŀˉsċˁ!nt9li{z.cZ/Ɩֿ^^ .ؿv g5vaY֞jtmD{e$75赺[18~{ P,~7 rHي;W[u^ܣ5 y-G} P?@0:%|Bd+-3{Ljk\^~ }( kS|D2>чŽ# G%a~:eU2yĵ: 38#H[iA.sokj~u.GF@O9F\û[9S3q` aHA%m!4L@.BC66tv/kJW޴a{{b&Ag7_3j}xߛ7C rrF2aXg$ix9#4; 3N!zp' 3q8i! ]ךzG_3jVǑ5{.g }FI+5s%W&9}j~0n*| fz GED&ȸM P6^x9@$^!s/ {0ndϽ4"VQZ&Fu5s!NT~/: ̃\S;Xa99qdvP,2{AQW/hʼdv9jyDiUUi#h!A:XmO.=\}П6s|pOt\9X Y/RmG z,W1bɜ64޼ SU\o rrA/Q?#t@=XA3uu/culGgNP]I\aTcauM^qxja#cyUT>2MmhLsˆ6_iBsҍHhad$um'ƁI8R[>-qymtR4VQ k2fsimAY8FlQb;J+Oj'30b gO'h!hSwkE]»b ҞhY2JV>$Aeܢ6^ʟ 2]Fw/83Z5ljmFK50DiV#'BO*O ]a28r~^ |_ASz 9s/!=`ufiy:Kjdiƚ͋s`Xfa ZߩϢzݯtF ۍ\=ru7*֍ku/7*c.@MonYcZcЇ_xS]\8jϓ\똋kYxZexLjg f[,\zJ@Wl#m#Jb?m#j"ᰵ+ ?&#G<\{w|1g8d5h.m&_sO8F>2ydd3@f #7o~%9+כ[Dvy2X/!Ð{1]R@^ozGc1hPuuZkj!v^?u9F</IWԤ(_ǶR5GZZcgԚǼPG@RcҚ]Z_'/=VWwi#V9ؽCTY.6_}0I 5oZ^{"exJԌA"e{Wi5rgP-Zc5 =&6LjU =քk+*_f:ah>5Jys殁y?ϴo#~@t,ԭvx\m[J6l=,;gq5[_|di*,\S8Vg[_]w׻ǚ>jB1:W: ZTʪ5[ON\u^$b#V'{P7-na_>:둷/pE]=5׊נ@%7 4os #a amyh!R\]͖VPfe9]6ToTr?r89:-9-ؒCo%$_:NXdw4*;aw"_LJZV@:/vcK؛{pގ-?^{p-:vuI*l Ce J1k, h8iBSbњh {7]9h q%60 $rլ)Y@OH:] tj?Gҳ8 iwXZ%޴.%z)MҺx&`,%'Dk;}| |O@ k85ۯc֖_uN `Wns{Qsy#/"sy OOJ8֯eg=D䜍\r2fsـ_oU9K,kOA}Z}533Հoi&6kdcwR9h2x} P_A&)k E}@‹R9bF:"ĵB7N{ksOOsOOɾ%JOoiO\=nzq{<nHzLd,ooN,!|~̨8M6\a4łHܧ\LXFXUB]Wz.:ہZ_}q=r-1e02Qο8bځp1u/3z=3^TOv9{ݩry8j '}oz]oW M7\4,Lj~8]=M_۸wis8O2ǼUq<YSt]Sal\*\EDQ码RIpyeizJ?UrQQe _iGjmig$]!C[vh_geR3n?}up\p01>_;#; ՓgFT^Dn4(06%RYY6_,}W*g&&ie i冖͂mQ1YjS!4?U&.$mjjo*J|(1<^?]r| \O}I:,Lijroώ(cz ߖ#UCV8D9Bm٠&J3P3=kɏɯmqaT…g@LW͸[k#~{F{|ObGp3|͇+/WGm1chͯ6FڧF _Xy۩t>ݧ7^ ݘ%sUg".Aj^(ftلbm>fPX ]Ғk_.2QNpH]et*[>\fcV0T4T+M:lnT>V@55η1"#|(|JtM1grg#aSLO&kм6~^>~ Y)-lj]scM rpVu54͍{CFCD-ϵCC .Ԕ%Zs~#v3UQA㐋ZébݥC~I,Ms"n,+`=MWZgrM9ҽY\,3\yYG)"K9Fİ3)2 >Mh=vƁ8Wm<Nb\#rK1 v.q񒃖rss*baըk Q:0B< Ɨ#[naU/=w}F m+/<{6SKiqZ:5GK׺ZZ?BѺZ Wv_ֳTKBe[uPbmk6X9O^zQϲ(CXu_k%v-G|bO0"vZc29;:9;mDO_8Ktj ̅<:},8?̷N}A_/}*꧃K5?sԅa \31QVAOUPzY'gN*3( exWcDk{-YgXf5<*ET#H mNyCv7%[sɅD5yz[S=<2NԼcxMKGbKF?vMVаƢc}w2}Jp}D9F>.]b򎶉'I&s漚n圝6(>\?|c1g #o\W7]z,F'Taդ_+"}C9-(f9ul.JE+\_}J^Я;B8怐b1r'і9eL"gx`>_O?̝r WrwZOZ%`UvR5 =E_圝6 |Ksf7Tݽх|P~_8 EZ-r{?W|(kQ3ٺ5دyךk0K՚ZNЬ]bvhtl b fR)U.9M}FuizWv?Թނp ]Y6jBkĵ06bOʚ&41ԅgsX*CjjӍbTHȣT@1ȯf8, L"Mfyf"ۼ^Px= $fnaԚpeµ)b,::RLVFfJ5CV Sk6@j e! yDc8_{m|>WMK䖵gDs<^s3~ϙVrG{[B1r0G=~PQm/> ZDtckz3~vZY$hMzzP׷iɇnz}i-/9fUn_7Qi)$@Fc>Xh#LoG/\vr֌^(JU>l_Uj At[bI<%|=$GGyRϨg #[;9{èʂ)n Ysnv)&?BbOqz#?…)p~ׅgݴ?6'bka˅'¶]_N3.Vҋ6@~`՝쫃ku<`dGLk# daq>ʃU)Uf|L-ÿ.e9F[bvb(=X=;ثq~i)o#iag?cb˅<*~kڥO!/}#U/f#_kf<(3<` t@{=b&# ӄݗ55LkkINkb ӚZ1O0iu<7L0 N[I̤ӄbE x PAt&=A[rKږD,Rho'5)xΤ'b-,<- 2n3) 1O^OFVH_>3ߜF^-mˢ3Tt]4r^2yOrA&*~6lc ]2;m'{5{J7.eS!2(WD_K3%DWS+x3qʧ浔wZ 'f Ê(@1շr%zBc+5I`gY vfmn-.}f+4n+K>AK닃i vk`Z:`3~Z ƚi>Z֌G~<L=&rgOH{L|Μdk᫆ op33){΀ Nzg`/~>#\"^GcuND]Ƌ Ėga5]_փ׆dYI]j{_@ ^͹;mxÊ[/^_ WC\y~ZIrj''I{bNOR[ZWv?4y@[b뛉Q9jB)/"٢xyeNlQй/Λ›hEh򧪂.A:?광)7hP+O ?(vRxUզ%2TD,^?8^ﴗSz ߼}PX] =Jd<1G֥ k?:UŬ}#A].]D [r t!}8]E-@IR+ y Œ''I2L{5h}:ܪ5Lkk=I}ܢ$W iac},YkHbE)-Ѥd'׿VVj&_dc3t?G&-S$S9MᚚW'l뜇lGw)cԼiW +Gx5f \乲g]B sU'ΏEywM!]$1:H&Diq<%GAR:Ʃ4.U(SFI%NI4c23NfTJu/P|uscKm-uѝX[[ÑLi& _f)@(i;#L-! 3֡ ή/1S/I'<5ΉQ[,2FYQKx&.%`^ASYe/Al~g8YY}+*{̆.tˈGpVϳY/0yn}B%fH)g=K%>YQAg=C\Ouoλ>%]-q?zp{",fb<3Gb]1m,nC('_.0_‘9b̮ݔO7%i*ATPuߕexNqSf} F9]|:"J]Sa9B_N&Ky] A&,c?Ez4H_* x7?̤}o&-BFoHi9m[YJIJ\-6Q? +P@I[,*E79c]v/`q_=WrdY$Pr˯+ȉe$=O2AV1>>c@F% _+y-)dɹ {1Wf3-c `0y0 b,Bb# Re_7{,z$>q՛lWS.j US,[}Ӥ)onߒ]ȨCP2?lNY:u "j6ܝ ՔKԍ쪎fu(򱲜cNd !+ջϖ|Z<|͊G 3wJa21)2+|6qm±PCYrɧf:I=Zz3ўC@S3N5;ڶEvJIȜBcb:t?mge@rw\L̹Iv1חlWe4&X:UVlu©ʵ{"UO֜mbѮY>+Zĕ~4;o }KB{'FFoH;i6sw ,~Z=;A GBa}YlYhy)L'Q7?;z*;|o.dy(ww~ ,%?[2[+,,::.f19?CiD}sv+4t P(V}^pɚwYZ|F+2~ -§t^HK]ck]WѸ;b׵6#+q]I1>{7x-\2;"c<=ηe[_j]witHֆv8A19ZIVcݱ:YUmWĈ\"1o1S.[w1x.{-R.^x\npw1TableSummaryInformation(>DocumentSummaryInformation8HCompObjjDDoS Survey Paper OutlineDoSAdministratorpedmidmi Normal.dotoPrinceton Affiliate2inMicrosoft Word 9.0@G@lN/@@b.d  FMicrosoft Word Document MSWordDocWord.Document.89q  Prin i8@8 NormalCJ_HaJmH sH tH <@< Heading 1$@&5B*\ph:@: Heading 2$h@&^h5\<@< Heading 3$$@&a$ 5CJ\LL Heading 4!$ & F hh@&^h5\:: Heading 5$ @&6]J@J Heading 6$$ @&a$5Wms\J@J Heading 7$ @&56Wrs\]88 Heading 8$$@&a$6]L @L Heading 9 $ & F @&5Wt&\<A@< Default Paragraph Font.U@. Hyperlink >*B*ph>V@> FollowedHyperlink >*B* ph0B@0 Body Text B*phNP"N Body Text 2$7$8$H$a$5B*\aJ0ph<C2< Body Text Indent h^h,@B, Header  !, @R, Footer  !BQbB Body Text 3 7$8$H$ B*CJph&)@q& Page NumberPT@P Block Text $ ]^a$ 6CJ]4>4 Title$ a$5CJ$JR@J Body Text Indent 2$h^ha$CJ  !"#$%&'%&'()*+,-.KLMN<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\CK0oLMN123    mnopqrstuvw x!y"z#{$|%}&~)*+,-./0 1 2 3 4  465768798:9;:<;=<}_?`5OBPCQDRESFTGUHVIWJXKYMNOPQRSTUV՜.+,D՜.+,\ hp  Princeton Universityr4D DDoS Survey Paper Outline Title 8@ _PID_HLINKSAQW2http://packetstormsecurity.nl/irc/indexsize.shtmlv8T3http://packetstormsecurity.nl/distributed/knight.cnzQ/http://www.cert.org/advisories/CA-2001-20.html(7NDhttp://staff.washington.edu/dittrich/misc/stacheldraht.analysis.txtVGK>http://staff.washington.edu/dittrich/misc/trinoo.analysis.txtYH=http://www.sun.com/solutions/blueprints/0502/816-4816-10.pdfVGE>http://staff.washington.edu/dittrich/misc/trinoo.analysis.txtzsB(http://www.ebcvg.com/articles.php?id=91D?%http://www.edensoft.com/exploit.htmla/<[http://msdn.microsoft.com/library/default.asp?url=/library/en-us/dnce21/html/activexce.aspnz9/http://www.cert.org/advisories/CA-2001-20.htmlO_6http://cve.mitre.org/cve/=03http://www.nessus.org/LN0http://www.insecure.org/nmap/Z?-Khttp://searchnetworking.techtarget.com/tip/1,289483,sid7_gci856112,00.html^*)http://www.searchnetwork.techtarget.com/'9http://www.phreak.org/archives/exploits/denial/fraggle.c>;$http://www.phreak.org/df!7http://www.phreak.org/archives/exploits/denial/smurf.c>;http://www.phreak.org/yb,http://www.nanog.org/mtg-0110/ppt/houle.ppt:l;http://www.user-com.undernet.org/documents/irc-manual.htmlseen<%.http://www.irchelp.org/irchelp/ircprimer.htmlDDC5&0http://www.irchelp.org/irchelp/irctutorial.htmlpart1I2http://www.foxnews.com/story/0,2933,66438,00.htmlu| 8http://www.wired.com/news/business/0,1367,34221,00.html38  http://www.w3.org/security/faq/LNhttp://www.insecure.org/nmap/ [http://www.princeton.edu/Ehttp://www.yahoo.edu/3v,http://www.genericwebpage.com/myactivex.cabWXYZ [!\"]#^$_%LZa[Ac`&fghlik(mnjqrste'v(w)x*b\{]|^uy+,-.>=>?@ABCDEFGHIJ@abcdefghijkl/d  !"#$%&'%&'()*+,-.KLMN<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\_      !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijklmnopqrstuvwxyz{|}~C"-[\yXx z  )*9:U""z&M)<,T,U,,,,,2 4 4*4+48=i>k>>> ? ?%?&?DEEFFjJ[O=P>PVPWPRRRRTTTTTVVRXUZ|[\\/^___``acc^f_fiijjjjkkm`qaqsuuuvvyySyTy]{^{s{t{m| ~PQrs'(34[\wxHII ޤߤƥǥԩ òZ[cFGW˴=>Jvwصٵfggh|ܷݷ$%*hijܸݸ¹&ź JK_&'(FGͽν|WvgQ()GHTfgrsYZNOKL34MN>Af  S79 j: ! "!#$$%B''~('))O*Z++,+../1:2354n5e67Y8/9":.;S<@=3>>?@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@wAxAyAzA{A|A}A~AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAABBBBBYBZBvBwBxByBzB{B|BBBBBBBBBBBBBBBBBBBBBBBBCCCCCCCCC C C C C CCCCCCCCC00(0X0[X0[0y0y0yh0y000000000000h00 0 0 00*0*0*0*0*0*0*0*0*0*0*0*0*0*0*0*0*0*0*0*0*0*0*0*0*0*0*0*0*0*0*0*0*0*0*0*0*0*0*0* 0*0*0*0* 0R*0*0*0*0*0*0*0*0*0*0*0*0*0* 0R*0*0*0*0*0*0*0*0* 0*0*0*0* 0i*0*0*0*0*0*0*0*0*0*0*0*0* 0*0*0*0*0*0*0*0*0*0*0*0*0*0*0*0*0*0*0*0*0*0* 0*0*0*0*0*0*0*0*0*0* 0*0*0*0* 0*0*0*0*0*0*0*0*0*0*0*0*0*0*0* 0*0*0*0* 0*0*0*0* 0*0*0*0* 0*0000000000000000000000000000000000000000000000000000000000000000000000000000000000000 0*0(0(0( 0((0(0(0(0(0(0(0(0(0( 0((0(0(0(0(0(0(0(0(0(0(0*00000000000000000000000000000000000000 00~0~0~0~0~0~0~0~0~0~0~0~0~0~0~0~0~0~0~00~0~@0~0~0~0~0~0~0~0~0~0~0~0~0~0~0~0~0~0~0~0~0~0~0~0~0~0~0~0~0~0~0~0~0~0~0~0~0~0~0~0~0~0~0~000000000000@0@0@0@0@0@0@0 0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000@000000000000000000000000000000000000000000000*!<0BVCkyKjԶ)jk PRU!n'w-5@GHI <06BVXcmau}3ިǩZWvݻܼ()S(@CFFGGGH III$$$ŀ 2aAy%W'    i!!!"" #:#_#n####$%%%c%%"&Y&z&&&2'(()R)x)))"*<**+E+S--...._///]00011&233#445\57A7p778E8889CXXXXXXXXXXXXXXXXXXXXXXXXtXXtXtXXX !tR ".FH79_X:::::::0 _$"$E\겡  D2$4 4=3 F 2$#=!^$?Vt,2$@,BՂh;DA"$ZM# F_% W2$:PQRo{hgZ?b$LG)t\""$1UVXWbhӥc2$<R1癓An "$R>DǴRr92$+bn\L"Mlj"$^R I>;<W"$J0W+<u92$N_Q.] ̃N $2$bz5Lڎ"$.Tk 2vUM"$*5ڻJa} 32$W cbV9l\d, 2$w܄WaˑS{ ܹ@d (    c R(. ``T`T`T`T" (n  0A ? ?" T  C  NB  S Do6   A 6   A 6   A D   A "6   A;h  s *A ? ?"6   A 6   A 6   A  h  s *A ? ?"  h  s *A ? ?" *n  0A {? ?" n  0A q? ?"n  0A ? ?" B S  ?z&{&<,,8i>&?jJkJRcmsst{ClHl4Ll% 49%MTd Q_T&a T%TL $4qTh4rTpT (TmT9!T (T0t( T@lA(R TB)(T= _Hlt40782658 _Hlt40782252 _Hlt40782138 _Hlt40789363 _Hlt40789364 _Hlt40795813 _Hlt40770347 _Hlt40770348 _Hlt40800029 _Hlt40800030 _1114598258 _1114598296 _1114598431 _1114598434 _1114598454 _1114598460 _1114598476 _1114598493 _1114607476 _1114607706 _1114616635 _1114616660 _1114616774 _1114616800 _1114616826 _1114616853 _1114616858 _1114616885 _1114616888 _1114616948 _1114616954 _1114616970 _1114616981 _1114618785 _1114618833 _1114597886 _1114597954 _1114598068 _1114598073 _1114598094 _1114607587 _1114548326 _1114599407 _1114617124 _1114617429 _1114617533 _1114617538 _1114617577 _1114617582 _1114618544 _1114620418 _1114620487 _1114620495 _1114620648 _1114608638 _1114623445 _1114628253 _1114617873 _1114618119 _1114618277 _1114618281)5*.448 A AiAiAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAArBrBBBBBBBBBBBBBBBBBBBC@@@@@@@ @@@ @ @ @ @@@@@@@@@@@@@@@@@@@ @!@"@#@$@%@&@'@(@)@*@+@,@-@.@/@0@1@2@3@4@5@6@7@8@9@:@;@<@)6*.]5]59jAjAkAkAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAArBrBBBBBBBBBBBBBBBBBBBC}f i = F __hnsy9BM\++Q4]4@@@CTT__mmmmt{t{ ~ ~ޤߤ¥ťgg TT  O6UU??@@@@@AAZBuB|BBBBBBBBCCTT__mmmmt{t{ ~ ~ޤߤ¥ťgg TT  O6UU??@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@wAwAxAxAyAyAzAzA{A{A|A|A}A}A~A~AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAABBBBBBBBYBZBvBwBwBxBxByByBzBzB{B{B|BBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBCCCCCCCCCCCCCCCCCC C C C C C C C C C CCCCCCCCCCCCCCPrinceton AffiliateE\\Eehome\rblee\conferences\CCS_DDoS\DDoS Survey Paper_05162003_v5.docPrinceton AffiliateE\\Eehome\rblee\conferences\CCS_DDoS\DDoS Survey Paper_05162003_v5.docPrinceton AffiliateE\\Eehome\rblee\conferences\CCS_DDoS\DDoS Survey Paper_05162003_v5.docPrinceton AffiliateE\\Eehome\rblee\conferences\CCS_DDoS\DDoS Survey Paper_05162003_v5.docPrinceton AffiliateE\\Eehome\rblee\conferences\CCS_DDoS\DDoS Survey Paper_05162003_v6.docPrinceton Affiliate<\\Eehome\rblee\conferences\CCS_DDoS\DDoS Survey Paper_go.docPrinceton AffiliatemC:\Documents and Settings\rblee\Application Data\Microsoft\Word\AutoRecovery save of DDoS Survey Paper_go.asdPrinceton AffiliatemC:\Documents and Settings\rblee\Application Data\Microsoft\Word\AutoRecovery save of DDoS Survey Paper_go.asdPrinceton Affiliate=C:\DOCUME~1\rblee\LOCALS~1\Temp\DDoS Survey Paper_v7final.docPrinceton AffiliateA\\Eehome\rblee\conferences\CCS_DDoS\DDoS Survey Paper_v7final.docF|~ v Vmd% [>6:r4=">/bg$s.8ft#*B/bu}7(C;B9w=ĶC>& WGT~t:M2MS#RtdU8)RWh`LBYJ/,[A]m ^{.S Kdx9,f8_pj/f0>rqixTjOR+0Atj*hh^h`o(hh^h`o(.0^`0o(..0^`0o(... 88^8`o( .... 88^8`o( ..... `^``o( ...... `^``o(....... ^`o(........hh^h`o(hh^h`o(.0^`0o(..0^`0o(... 88^8`o( .... 88^8`o( ..... `^``o( ...... `^``o(....... ^`o(........hhh^h`.h88^8`.hL^`L.h  ^ `.h  ^ `.hxLx^x`L.hHH^H`.h^`.hL^`L.hh^h`o(hh^h`o(.0^`0o(..0^`0o(... 88^8`o( .... 88^8`o( ..... `^``o( ...... `^``o(....... ^`o(........k^`ko(k^`ko(.0^`0o(..0^`0o(... 88^8`o( .... 88^8`o( ..... `^``o( ...... `^``o(....... `^``o(........^`o(.^`.pLp^p`L.@ @ ^@ `.^`.L^`L.^`.^`.PLP^P`L.^`o(^`.pLp^p`L.@ @ ^@ `.^`.L^`L.^`.^`.PLP^P`L.>^`>o(>^`>o(.0^`0o(..0^`0o(... 88^8`o( .... 88^8`o( ..... `^``o( ...... `^``o(....... `^``o(........^`o(.^`.pLp^p`L.@ @ ^@ `.^`.L^`L.^`.^`.PLP^P`L.^`o(.^`.pLp^p`L.@ @ ^@ `.^`.L^`L.^`.^`.PLP^P`L.XX^X`o(XX^X`o(.0^`0o(..0^`0o(... 88^8`o( .... 88^8`o( ..... `^``o( ...... `^``o(....... ^`o(........^`o(.^`o(.808^8`0o(..808^8`0o(... ^`o( .... ^`o( ..... `^``o( ...... `^``o(....... pp^p`o(........^`o(.^`.pLp^p`L.@ @ ^@ `.^`.L^`L.^`.^`.PLP^P`L. ^` o( ^` o(.0^`0o(..0^`0o(... 88^8`o( .... 88^8`o( ..... `^``o( ...... `^``o(....... ^`o(........^`o(^`.pLp^p`L.@ @ ^@ `.^`.L^`L.^`.^`.PLP^P`L.hh^h`o(hh^h`o(.0^`0o(..0^`0o(... 88^8`o( .... 88^8`o( ..... `^``o( ...... `^``o(....... ^`o(........808^8`0o(.^`.pLp^p`L.@ @ ^@ `.^`.L^`L.^`.^`.PLP^P`L. ^` o( ^` o(.0^`0o(..0^`0o(... 88^8`o( .... 88^8`o( ..... `^``o( ...... `^``o(....... ^`o(........ ^` o( ^` o(.0^`0o(..0^`0o(... 88^8`o( .... 88^8`o( ..... `^``o( ...... `^``o(....... ^`o(........^`o(. ^`o(pLp^p`L.@ @ ^@ `.^`.L^`L.^`.^`.PLP^P`L.h88^8`.h^`.h L ^ `L.h  ^ `.hxx^x`.hHLH^H`L.h^`.h^`.hL^`L.^`o(.^`.pLp^p`L.@ @ ^@ `.^`.L^`L.^`.^`.PLP^P`L.hh^h`o(hh^h`o(.0^`0o(..0^`0o(... 88^8`o( .... 88^8`o( ..... `^``o( ...... `^``o(....... ^`o(........ ^` o( ^` o(.808^8`0o(..0^`0o(... ^`o( .... ^`o( .....  ` ^ ``o( ......  ` ^ ``o(.......   ^ `o(........ ^`o(^`.pLp^p`L.@ @ ^@ `.^`.L^`L.^`.^`.PLP^P`L.BYpj/fc>6KdCt:M)RW WGTjB9w=rqid% *B/+0AtS#R~ dU4=",[A]m ^;s.9,fbg$}7c @CJ OJQJo(" òZ[cFGW˴=>Jvwصٵfggh|ܷݷ$%*hiܸݸ¹&źJK_&'@@@ABBC@mmtm_@./12Cp@p2ph@p6pp@Unknown AdministratorPrinceton AffiliateGz Times New Roman5Symbol3& z ArialI& ??Arial Unicode MS?5 z Courier New"qhuuvub.d4!h0dD2QDDoS Survey Paper  Outline AdministratorPrinceton Affiliate