ࡱ> [@ bjbj44 9ViVi}F  6668n,T8"yyygTiTiTiTiTiTiT$ WRrYT/ W"y/ / TsT]#]#]#/ F8gT]#/ gT]#]#/$OT 8:P6u 'Q,CT$T0TSQZc!ZXTZT$yr]#\HyyyTT$6;#"6 Statement by Daniel G. Wolf Director of Information Assurance National Security Agency Before The House Select Committee on Homeland Security Subcommittee on Cybersecurity, Science and Research & Development Hearing on Cybersecurity(Getting it Right July 22, 2003 Thank you Chairman Thornberry and the members of the Subcommittee. I am honored to be here and pleased to have the opportunity to speak with your committee to discuss cybersecurity research from the point of view of the National Security Agency as we conduct our mission to address threats to the security of critical U.S. Government information systems. I also would like to thank the Chairman and other members of the Subcommittee for their strong interest and attention to this vital area. In my opinion, your leadership is important for raising awareness of the serious security challenges we all face in our age of interconnected, inter-dependent digital information networks. My Name is Daniel Wolf and I am NSAs Information Assurance Director. NSAs Information Assurance Directorate is responsible for providing information assurance technologies, services, processes and policies that protect national security information systems. We are also responsible for conducting the research and development of information assurance technologies and systems. I would like to note that NSAs Information Assurance Directorate and its predecessor organizations have had technical and policymaking responsibility regarding the protection of national security telecommunications and information processing systems across the Executive Branch since 1953. In regards to your theme for this hearing: Cybersecurity(Getting It Right. I am not sure that NSA has all of the answers or that we always have gotten it right(but I am quite confident that during our 50 years of deploying communications and now cyber security products we have learned quite a few lessons. We have had tremendous successes and our share of failures. We also have gained a deep understanding and respect for the challenges the nation must overcome to begin to tame cyberspace. Some in government and industry want to keep NSA in a box labeled for classified information only. They suggest that NSAs perspective is much too narrow due to our focus on the stringent requirements of national security systems. However, I believe quite the contrary. It has been my experience(and my testimony will soon address(that there is little difference between the cybersecurity that is required for a system processing top-secret military information and one that controls a segment of the nations critical infrastructure. Both systems require the element of assurance or trust. Trust that the system was designed properly. Trust that it was independently evaluated against a prescribed set of explicit security standards. Trust that it will maintain proper operation during its lifetime, even in the face of malicious attacks and human error. It has been my experience that effective cybersecurity must be baked into information systems starting at the R & D phase. Trust cannot be sprinkled over a system after it is fielded. Homeland security presents another reason to suggest that cybersecurity requirements must converge. The information management principle within the national security community has always been the concept of need-to-know. But the fundamental information principle for homeland security is need-to-share. With need-to-share we must develop technical solutions for secure interoperability that may be called on to tie top-secret intelligence systems to a local first responder system. Because the threat always rolls downhill, that is to say, adversaries always attack the weakest link. Information must be protected across the entire system. A three-sided castle is not very safe. Therefore, I contend that in almost all cases the cybersecurity requirements found in national security systems are identical to those found in e-commerce systems or critical infrastructures. It follows then that the research challenges, security features and development models are also quite similar. With these similarities in mind, NSA has been working hard to converge these cybersecurity markets through a series of programs and research initiatives. Our goal is to leverage our deep understanding of cyber threat and vulnerability in a way that lets us harness the power and innovation provided by the information technology industry. We believe that the resulting cybersecurity solutions will protect all critical cyber systems, regardless of the information they process. I think it will be useful for me to provide a brief description of NSAs cybersecurity responsibilities and authorities. I will then turn to the specific questions you asked me to answer in your invitation. NSA Information Assurance Background When I began working at NSA some 36 years ago, the security business we were in was called Communications Security, or COMSEC. It dealt almost exclusively with providing protection for classified information against disclosure to unauthorized parties when that information was being transmitted or broadcasted from point to point. We accomplished this by building the most secure black boxes that could be made, employing high-grade encryption to protect the information. In the late 1970s, a new discipline we called Computer Security, or COMPUSEC, developed. It was still focused on protecting information from unauthorized disclosure, but it brought with it some additional challenges and threats, e.g., the injection of malicious code, or the theft of large amounts of data on magnetic media. With the rapid convergence of communications and computing technologies in the early 1980s and especially with the explosion of the personal computer, we soon realized that dealing separately with COMSEC on the one hand, and COMPUSEC on the other, was no longer feasible, and so the business we were in became a blend of the two, which we called Information Systems Security, or INFOSEC. The fundamental thrust of INFOSEC continued to be providing protection against unauthorized disclosure, or confidentiality, but it was no longer the exclusive point of interest. The biggest change came about when these computer systems started to be interconnected into local and wide area networks, and eventually to Internet Protocol Networks, both classified and unclassified. We soon realized that in addition to confidentiality, we needed to provide protection against unauthorized modification of information, or data integrity. We also needed to protect against denial-of-service attacks and to ensure data availability. Positive identification, or authentication, of parties to an electronic transaction had been an important security feature since the earliest days of COMSEC, but with the emergence of large computer networks, data and transaction authenticity became an even more important and challenging requirement. Finally, in many types of network transactions it becomes very important that parties to a transaction cannot deny their participation, so that data or transaction non-repudiation joined the growing list of security services often needed on networks. Because the term security had been so closely associated, for so long, with providing confidentiality to information, we adopted the term Information Assurance, or IA, within the Department of Defense to encompass the five security services of confidentiality, integrity, availability, authenticity and non-repudiation. I should emphasize here that not every IA application requires all five security services, although most IA applications for national security systems and all applications involving classified information continue to require high levels of confidentiality. Another point worth noting is that there is an important dimension of Information Assurance that is operational in nature and often time-sensitive. Much of our work in IA is found in providing an appropriate mix of security services that are not operational or time-sensitive, e.g., education and training, threat and vulnerability analysis, research and development, assessments and evaluations, and tool development. However, in an age of constant probes and attacks of networks, an increasingly important element of protection deals with operational responsiveness in terms of detecting and reacting to these time-sensitive events. This defensive operational capability is closely allied with and synergistic with traditional IA activities, but in recognition of its operational nature is generally described as Defensive Information Operations, or DIO. NSAs responsibilities in this area have grown considerably since the late 1990s. To meet this DIO challenge, NSAs National Security Incident Response Center (NSIRC) provides real-time reporting of cyber attack incidents, forensic cyber attack analysis, and threat reporting relevant to information systems. Through round-the-clock, seven-days-a-week operations, the NSIRC provides the Departments of Defense, the Intelligence Community, Federal Law Enforcement, Department of Homeland Security and other Government organizations with information valuable in assessing current threats or defining recent cyber intrusions. NSAs responsibilities and authorities in the area of information assurance are specified in, or derived from, a variety of Public Laws, Executive Orders, Presidential Directives, and Department of Defense Instructions and Directives. The Secretary of Defense is the Executive Agent for National Security Telecommunications and Information Systems Security. The Director of NSA has broad responsibilities in providing for the security of national security telecommunications and information systems processing national security information, including: Evaluating systems vulnerabilities Acting as the focal point for cryptography and Information Systems Security Conducting Research and Development Reviewing and approving security standards and policies Conducting foreign liaison Assessing overall security posture Prescribing minimum security standards Contracting for information security products provided to other Departments and Agencies Coordinating with the National Institute of Standards and Technology (NIST); providing NIST with technical advice and assistance While protecting the confidentiality of classified information via extremely strong cryptographic systems was a major part of NSAs mission in the past, our mission has changed emphasis considerably over the last ten years. We now spend the bulk of our time and resources engaged in research, development and deployment of a full spectrum of IA technologies for systems processing all types of information. NSAs days of just building crypto for classified are long gone. Specific Issues Related to Cybersecurity R&D Your invitation outlined a number of areas where you wanted specific comments and answers. Technical approaches to optimize cybersecurity. I believe that the highest payoff for optimizing cybersecurity is the creation of an interoperable authentication system deployed widely throughout the federal, national security, first responder and critical infrastructure community. The typical approach used is a public-key-infrastructure (PKI) system with a smart card that contains your cyber credentials. This is the type of system that NSA and DISA have built for DoD. A national PKI system is required that allows for strong authentication in cyberspace for homeland security. If we have this national system in the future(then when a first responder connects to a DHS website to access information or upload a report(we will know exactly who they are. We can then assign various privileges according to the role that the person is assuming for that specific information transaction. This authentication system also forms the basis for all of the other cybersecurity services from protecting the control of Supervisory Control and Data Acquisition (SCADA) systems to encrypting your email and passwords. It is also important to note here that the most critical infrastructures, like a PKI, should be built using U.S. technology. I have concerns with foreign software of unknown trust and quality being integrated into critical U.S. systems. My next priority for cybersecurity is effective border protection. Just like our national borders or the perimeters of our buildings, we need to protect our cyber borders. Effective border protection includes many different technologies. The most important technology is a firewall. Firewalls help networks resist attacks by establishing a strong but resilient border between our protected network and the external Internet. We also need encrypted tunnels, also called virtual private networks or VPNs. These devices sit between critical networks to protect the information as it moves between secure networks over unprotected pipes. Another necessary border security technology is called a guard. A guard is used when we need to share information between security domains. Consider the case of an intelligence report that is created on a top-secret network. It must be sanitized to unclassified and then sent to a local police department. It would be dangerous to allow this information to move between security domains without review. High assurance guards are designed to automatically and safely allow certain information packets to flow between systems but stops all others. Finally, effective borders require the ability to detect and respond to intrusions. Just like a security camera on a bank, cyber intrusion detection systems monitor the flow of information around your border and detect suspicious activity. The best way to protect a system from attack is to eliminate its vulnerabilities. The best way to eliminate vulnerabilities is to improve the way we write software. High on my research priority list is the need for assured software design tools and development techniques. We also need to improve computer operating systems by including functionality to enhance their ability to defend themselves from attack. The elimination of vulnerabilities is the goal but the reality is that we are a long way from achieving this goal. Attacks are common and vulnerabilities are discovered daily. It has been estimated that over 90% of all successful attacks on DoD systems are based on vulnerabilities that are already known and that have an updated software fix or patch available. The rare system operator can keep up with all of the patches that are issued each month. A system left un-patched soon becomes a target like an unlocked sports car with the keys in the ignition. Therefore, another way to optimize cybersecurity is with an automated patch management system. This system would also use strong authentication as provided by a PKI but the software producer would sign the new application instead of a person. The patch would be automatically and safely sent to your system. The PKI guarantees that it is comes from an authentic source and has not been corrupted. 2. What areas of advanced technology should be pursued to outpace attacks? Research is required to improve a cybersecurity systems ability to modify itself on-the-fly. New attacks are constantly emerging and new vulnerabilities are discovered even in the most carefully designed systems. The ability to update must be safely executed and as transparent to the user as possible. NSA is working on a multi-year, nearly $3B development program called Cryptographic Modernization (CM) that has some of these features. There are over 1.3 million cryptographic devices in the U.S. inventory. Over 75% of these systems will be replaced during the next decade. Future security systems are being designed to use the network to safely program and reprogram their operating characteristics automatically and transparently to the user. Research is also needed to learn how to build cybersecurity systems that can continue to operate even while under attack. Resilient systems, like those being investigated by DARPA and others will be needed in the future. The goal is to have a system that degrades gracefully instead of causing a cascade of insecurity. I would also suggest that considerable research is needed to effectively coordinate information during a cyberattack. Today, most of this coordination occurs at the speed of humans. But attacks are carried out in seconds and are often carried out automatically. The CODE RED attack in 2001 infected 50,000 machines per hour, ultimately causing billions of dollars in damage. We need a capability for our networks to work together automatically to weather an attack. Incident information formats, automatic remediation algorithms, the ability to learn attack specifics from intrusion detection devices and other network sensors and then share this info with other networks without human intervention are high priority requirements. Another significant research topic is the ability to enhance attack identification methods. Most intrusion detection or system misuse systems today rely on patterns or signatures to identify the bad behavior. This works well for known attacks but is useless against novel attacks. The ability to detect attacks and misuse from anomalous behavior is needed. The ability to detect suspicious or anomalous behavior is also useful to identify insider attacks. Studies have estimated that 50% of the most damaging attacks come from insiders. An insider is unlikely to use sophisticated attacks because they already have an account on the systembut the ability to monitor system use during off hours or track users accessing unusual accounts provides vital clues for detecting insiders. Continuing with the cyber attack theme(I believe that one of the hardest problems we must solve in cybersecurity is attack attribution. That is the capability to geolocate and positively identify the source of attacks on the Internet. Without confident knowledge of who and where an attack was mounted, it is impossible to decide on the appropriate response. A rapid and reliable capability that separates nuisance hackers from more serious threats would increase the overall effectiveness of every cybersecurity practitioner in both government and the private sector. Effective attribution by law enforcement leading would also deter the casual hacker and allow resources to spent on more serious cases. 3. Suggest advanced technology programs needing higher priority & funding. A significant cybersecurity improvement over the next decade will be found in enhancing our ability to find and eliminate malicious code in large software applications. Beyond the matter of simply eliminating coding errors, this capability must find malicious software routines that are designed to morph and burrow into critical applications in an attempt to hide. There is little coordinated effort today to develop tools and techniques to examine effectively and efficiently either source or executable software. I believe that this problem is significant enough to warrant a considerable effort coordinated by a truly National Software Assurance Center. This center should have representatives from academia, industry, federal government, national laboratories and the national security community all working together and sharing techniques to solve this growing threat. We also need the ability to trust the hardware platforms we use for critical applications. Most microelectronics fabrication in the USA is rapidly moving offshore. NSA is working on a Trusted Microelectronics Capability to ensure that state-of-the-art hardware devices will always be available for our most critical systems. The DoD is currently undertaking a major program called transformational communications. This program is developing the military communications infrastructure of the future and it will be delivering high-bandwidth, secure, multi-faceted digital capabilities across the defense enterprise and down to the individual warfighter. Many new cybersecurity requirements are being generated by this initiative and they will require significant R&D resources. For example, additional key management infrastructure capabilities, techniques for multi-level security networks, and ultra-high bandwidth encryption are a few of the new technologies being driven by this requirement. It is important to note that the results of this program will be dual-use. The technology being developed will have application for solving many of the same challenges that are found in homeland security systems. In todays Information Technology environment, the need is particularly acute for ways to counter security vulnerabilities found in popular commercial operating systems and applications. While many of these vulnerabilities can be fixed by properly configuring the system, the goal is to configure these systems to be as secure as possible right out of box. Building on the hugely popular security configuration guides for Windows 2000, NSA, working with Defense Information Systems Agency, the National Institute of Standards and Technology, the FBIs National Infrastructure Protection Center (now at DHS), the General Services Administrations FedCert, the SANS Institute, the Center for Internet Security and vendorsdeveloped a set of consensus benchmark security standards. These standards provide a sort of "preflight checklist" of security settings. The benchmark standards represent an effective model based on agreement between security experts, system operators and software vendors. A number of standards for the most popular technologies are being adopted by many government and private sector CIOs. I am happy to learn from your last hearing that some equipment vendors are now offering the security standards as the default configuration. I also understand from your hearing last week that industry gave high marks to the great work being done by the Center for Internet Security. NSA is proud to be a part of this project and will continue to support the community in establishing security standards. This consensus approach may not eliminate every vulnerability, but by working together, we can harden our systems against common attacks. 4. Role of technology transfer among government, academia, and industry? NSA is motivated by a sincere belief that the requirements for cybersecurity products and services for national security uses are identical to the requirements found in other mission critical systems e.g., homeland security and critical infrastructure protection. We have developed a number of programs and policies targeted leveraging the commercial information technology. The National Information Assurance Partnership (NIAP) is a U.S. Government initiative designed to meet the security testing, evaluation, and assessment needs of both information technology producers and consumers. NIAP is collaboration between the National Institute of Standards and Technology and the NSA in fulfilling their respective responsibilities under the Computer Security Act of 1987. The partnership, originated in 1997, combines the extensive security experience of both agencies to promote the development of technically sound security requirements for IT products and systems and appropriate metrics for evaluating those products and systems. The long-term goal of NIAP is to increase the level of trust consumers have in their information systems and networks through the use of cost-effective security testing, evaluation, and assessment programs. NIAP continues to build important relationships with government agencies and industry in a variety of areas to help meet current and future IT security challenges affecting the nation's critical information infrastructure. NIAP also produces cybersecurity specifications, called protection profiles that have already been developed for low and medium assurance applications and are periodically updated. The profiles are available on the NIAP website for anyone to use to describe the features needed for cybersecurity applications. NSTISSP #11 (National Security Telecommunications and Information Systems Security Policy #11) is a national security community policy governing the acquisition of information assurance products. The policy mandates, effective 1 July 2002, that departments and agencies within the Executive Branch shall acquire, for use on national security systems, only those products that have been validated in accordance with the either the Common Criteria, or other approved methods. Additionally, NSTISSP # 11 notes that departments and agencies may wish to consider the acquisition of validated COTS products for use in information systems that may be associated with the operation of critical infrastructures as defined in the Presidential Decision Directive on Critical Infrastructure Protection Number 63. The Information Assurance Technical Framework Forum (IATFF) is a NSA sponsored outreach activity created to foster dialog between U.S. government agencies, industry, and academia seeking to provide their customers solutions for information assurance problems. The ultimate objective of the IATFF is to agree on a framework for information assurance solutions that meet customers needs and foster the development and use of solutions that are compatible with the framework. The forum serves to increase awareness of available security solutions and allows attendees to establish contacts with other individuals and organizations dealing with similar problems. The Information Assurance Technical Framework document, currently in its third revision that provides over 500 pages of technical guidance for protecting information and information systems. The Centers of Academic Excellence in Information Assurance Education Program is an outreach effort designed and operated by NSA in the spirit of Presidential Decision Directive 63. The program goal is to reduce vulnerability in our National Information Infrastructure by promoting higher education in information assurance, and producing a growing number of professionals with IA expertise in various disciplines. Fifty universities have been designated as Centers of Academic Excellence to date. NSA has also been using the skills found at the service academies in a number of interesting ways. One exciting program is the service academies competition for attacking and defending networks. We also sponsor visiting professors in IA. We need this type of program for our workforce development - we must invest in our future. NSA is also working to transfer techniques to cybersecurity service providers. One of the services that NSA offers under this authority is system security assessment. Since NSA has limited resources to meet the ever-growing demand for INFOSEC Assessments, a training and certification program was developed as a partnership between NSA and private INFOSEC Assessment providers. NSA also created the INFOSEC OUTREACH Program to combine the substantial Information Systems Security talents of government and industry partners. The program provides insight into secure design, security evaluation, and the security considerations of system certification. Working together, the partnership of government and industry can meet the increasing demands for state-of-the-art secure telecommunications and information systems. NSA and the International Information Systems Security Consortium (ISC)2 developed a new Information Systems Security Engineering Professional credential for information security professionals who want to work on national security systems. The new certification will serve as an extension of the Certified Information Systems Security Professional, offered by (ISC)2 for information security. 5. How are research priorities and programs determined in the national security area? We base our priority decisions on a number of factors. The first factor is determined by the technologies and systems most used by our customers. For example, we recently started a comprehensive R&D program to enhance the security of PDAs and wireless 802.11 networks over the last two years because of the explosion of the use of these systems by our DoD customers. We also maintain a large number of cooperative research agreements with many of the most important technology vendors to help us keep ahead of their development cycles. We also work with small firms ensuring that their innovative technologies are fully informed by our cybersecurity expertise. This insight allows us to program for anticipated cybersecurity enhancements of our systems, or in the best case, influence our industrial partners, large and small, to add additional IA features during development. Our researchers also participate in R&D agenda setting panels and boards with the NSF, DARPA, National Laboratories, and industry associations. We collaborate with the R&D functions in our customers organizations. All of this information is used in making an R&D priority and programming decision. NSA is also unique in that we have considerable insight into the threat presented by various adversaries from our intelligence activities. Threat profiles are developed and these, in part, drive our research agendas. 6. Share your perspectives on leveraging national security standards for homeland security needs? National security standards are developed for(and are intended to be leveraged for all critical cybersecurity requirements. In order to promote secure interoperability between wired and wireless systems NSA initiated an industry and government consortium to agree on a common signaling plan called the future narrowband digital terminal (FNBDT). Although in reality it is not just narrow band anymore but a broad specification, FNBDT includes a common voice processing capability, a common signaling protocol, a common crypto-algorithm base, and a common key management process. FNBDT has become the primary security standard for cell phones, military radios and many emerging public safety communications devices intended to serve homeland security missions and first responders all around the world. We also created the High Assurance IP Interoperability Specification (HAIPIS), which will ensure interoperability with all future generations of IP network encryptors. The IP, or Internet protocol, is the backbone of the worldwide Internet. This new cybersecurity specification has become extremely popular and new products, based on this specification are being released regularly. Many of the technologies that we are suggesting for homeland security requirements were developed to support coalition military warfare. These systems were designed to cost-effectively support a highly mobile and constantly changing set of information sharing partners. We are confident that they are exactly what many homeland security applications require. Conclusion It has been my pleasure to share the work of my agency with the committee today. I believe that much of the research and development initiated by NSA for use in the national security community is directly transferable to the needs of homeland security. We all need to work together to shape the demand side of the market. Everyone needs trustworthy technology. We cannot afford to cut corners. We must change our fundamental assumption from need-to-know to need-to-share. We must share policies and processes across the community. Cybersecurity products and technologies have been the focus of my remarks today but the technology alone will never be good enough to protect us because( ultimately(getting cybersecurity right is more about what you do than what you buy. Thank you for the opportunity to speak before the subcommittee today.  The Computer Security Act of 1987 defines national security systems as telecommunications and information systems operated by the US Government, its contractors, or agents, that contain classified information or, as set forth in 10 USC Section 2315, that involves intelligence activities, involves cryptologic activities related to national security, involves command and control of military forces, involves equipment that is an integral part of a weapon or weapon system, or involves equipment that is critical to the direct fulfillment of military or intelligence missions. PAGE  PAGE 5 National Security Agency YZf     @ O !!?"K"4#@#"$1$%% )))))*[.\./3a3556 6CCFFzMº°¬ hmW5\jhmW0JU hmW5 jhmWhi,phmW jhmW5CJ$hmWCJ$aJ hmW5CJ$ hmWCJ$hmW5CJ$\hmWCJ$OJQJhmWCJOJQJ&jhmWCJOJQJUmHnHu4AZ[f     { B g  !dhdh $dh`a$dh`$dha$dh$dha$ZxgYww]U4(P ~#{$&u*,..,/Q/////I0022/3 & F$a$/3a3|578t92:;1=$>?[BCC EFHIJ_L NPQTUHY\` & F & F hh^hzM{M0N1NPQHYYZZ[\\U\W\_`[ppq.r/r0rsquuF{{{{āwx@cdʅ˅cdYZ[\]cd򟙟 hmW0JjhmW0JUhmW5CJ(\hA hmWNH hmWPJjhmW0JU hmWaJhmWOJQJ^JaJ hmWaJ hmW5\ jhmWhmWhmWOJQJ^J<\]_`aeg#jwmp1rsruu;w;yizF{{&|~OāT 8^8` & F & F & F`T̈́YZ[\efgrstuvwx$h]ha$h]h&`#$$a$`deghnopqrstuwxſ hmWCJ8 hmW9CJ8hA hmW<hmW5<CJ \aJ hA0JmHnHujhmW0JUhmW hmW0J# 01h/ =!"#$%nӊVsxhPNG  IHDRoGPLTERB1ޥΜ9νc1s)έs1k)k)Ɯsc)cZ!)ƌ{RkZZ!Z!{k1{Z{R!{R{!ssssskkkkRkJkJk!ccccccBcBcZZZZZZRZBZ9Z9RRRsRRRRJ{JJBJ9J1J1JBsBkBBBB)B);;89cs9999198724311k1Rk1111!1!1*)()JZ))))!))!c!!!!!!19 R!)J{BsBk9c1R)J!9!1)!ItRNSbKGD cmPPJCmp0712HsqIDATx^w[׽&rzf( ILKܪTTG`j$VAĤo cށZ%f1 c@"I3bppzn{?_ٌl4Znt{Wo|f:Q~#)q_t!&@O:ZB.I_xqA|J;'Q VF{4ƨ?^c\ev< 7!޸7775 2G@9Jܹ`/m?f%ܘ r/Jwr!W%e%fdo,=AN]<{ yq6o/u+rd>x0<6T^j^_BL}\;E݃倮-fUVD0RB+~`׷2\A%M숮ɔ *mùh4 FQm [ia0Z&W?͐hg})͖c@\\c yS}=luG?{yJzݏ$}QbE/ݏ{chШIvk&^u4>i6o+mvDXrӷy/@E;nUukzu)b\s8T%yoیԣ_i]lu>w^Ӑ y|5^mzj}p݈PXI݅<&}k֩&kUvo,y7>zbs=~b7^YB}'=?UBwiŐ;T!vХPWI<;*W$oT.U_r֪;yhV,w .BdN]#~ZFjHZlئ!_,!ַ7NrLFuwދ"æͅ"جI\neJFȽ mMQ&Zf1Z8K9ޜ@Iak>S/i">g7;6͝B"w(;ut(/7Qz[e5O*0EIt9O?f!+5'/bΛ.l\0 ɧ"w=+?D.,DoSZVu-ܯr4jyd~s )`UH0X{;x 4\tQr=LDI9[4F>HtoZ-KU B"q vhPJy5Ljla?n&-Q w;[zyɰRxɾO\3Mp4=ٴ´Yԩ)`k[?j cV+,p*gF0l).jB:ZVȭN-RLE< 7Zxl`9JKsjVJW캮h`{Y l΁P칲cg<s?l 3xZWxerC{b;)<1O'ړhW]w֗ofXr+eCqsgtt/`uBl?_F.;__[F5"uy=}r( Oǎ섴\d"ѻrE^J8o./۽eIL!&R_%߸URIE*bG}-s=UeBm?&J$o@4U#ˡc*/}o6Uoq,1;m{;"]#:l@נ_FJ E:T+]ISigj6Z ?KI }\`7% UW?^ҞZDncXaʍ !v9.z/Q]Ki¹cݲXlr!?68;=>3N嫋h`SEc%/1݌gZѥܙf3H 0˕+W":/5w]kqcRAob_<%ol wqq~~ x_)w/6t%bAQ1֮_1JVU9֞MOIeNmcXLa+|Bik9HNR9ᾏ]Xmb6=k(;d;kBeLB"6nSHWZ%V Ushje^*nB?T])ޜWKo0-#"/g[ޭCe)sq*"h@?Io2^$3aY Q,cevӊYzb]:Y`йhWZϯQwuL?6T0٬3ƹYݒ27nAU!NֲB[\r3K[Z$'礸PqPx.Kwk9CWA\̋QR'||߻#MMmT]+R'^?}HQ/1kj%ob \ \_{t.?xu O۵ӵ1dmQlG&yޱV\ᷓDqD=BjEq #]D~Ř_F  d<_[ɶH9@]^XqF<fqjTwl0qd?hl+`1UUA.3`/ Z.`$p \iUP{cSM6Sֳ[ ծreL4!$H)ZH Lt@(_ks#֥q#R,9¦ί>#ij .\9Ui Bgz jl(QdnqNy N|E8QRW^X@ʤi29b߹r̯rRsVO S^ճy^i=vv⥀>@);ݱV2`Uۯ˚/ѲR;-(<| u<.6.$67!řm#2`vhME O 7_!7)@\ 5" aZnƠ:Uo;1Or#֊c{u;c'.& ^'W=8EoWzٙX7TRO5 \#BtAuPnT͍z]U dkPǵ&ݐ+0]O ~PdwǾFR &䪹IRI 9-\ *z6ؤ>Bd+kUWZ,u 7YOۦ~p-YBH54.mZ#Yw? h( < v/Yغx}kk^ rXgyYěߺ$?NlJB?G8 ~}T> JTtD/ɞ(ҽv.;gNI)VMA.fY~E}͝;Ay1{*NM띰 W;tr?4G)Ӫ.k ye䦳Oh@6l 8 vFwqf']Re=NʐwhɴDjW8!)Fs!74.{N}|3YvdgmQ2֤fo4Zu˶3N^֓VsF!WLܬ;A\ƅ.@_9d\5JZܢim3"rX:c6Gm&f|6y'4TѤ(zi%.{vQ FC:)4W0wN5tDtTS c-EٲTd )Uy]e='NgRKٓuRHHӵ1nzzkFu+KzLI^ghm^h!WƖ 5٧Ta5#siz^/o==&a".hF= q)6ܓy_rn.;0vC/Vps>pLo4jT+V)R1Y(q& Kr"5TO=3>l$mbq+%sDR;kYrE/ΧԦ\"Cx`GWg*0hg[o'u2%0Sl://Du.S?NFL> ,*O )6# 'NubѸZsy:*q,6;͕e&Mj{vUbn`,Vm"eI݌[7iե}9NNr!nwIuDR'N$;sk8̷GZ]k n^*ځo٧έ#.7;gfDžk]2K9?[BFbFID99RAfgG]"S!SrO.HۼO3S4e;WxEoG[x˧9nݹN'^FLA 7aM9i mi.'r^|4&͙h;LN/~629WS~ΩF9M(wsd@Y=;m<]p>CZeH玚w3kCjC*y%5 j&3I`ORwM) 8 ^Q "TʖyYN۵Mƚa[dd&gCFҊ&8r1-dٺl= m~!;ncϫ%lf`gz5~A8Jȭ<=`$aޣmdU ץG3x.nk^,mJ;ȟwu68ΎVF|eeX [rZme誨+@)1IBwt⁩0Nّa-Ϫ@@M HD `b'h 9KM d2 9"K7EJe=\Duo{<9|Cu&~|6-+X1?ۀhy?_F3Cf^4 >ɐNi41ԢMn] q9`:V6+@| р`l-$q65sjg{8nM6\"i@ZeYnСoJ'D@c:MfNdda0qTPvˤëMHI"Q7SO'$NzXL \4 yf>c,7a6{{9If["%Nn$b^7V]a7D/J;9u&itw\.a%2iM` T̩Fy I{ bva/8RJg5?L B׋eh؁~>,4UVa19<PS* 撰?TW rXO> Yr/~[ hu[aA*g>jxB/ 7DwW*Y _K\aexq'L \2[-)62_+|t7r2Gܷ:PJGP%6꒼IZ4qTz񳋼y9o, s"&䱾1k 6ȋ~|}~z?@vUݲpNK$ pe쐯MJЍj;"bԖ)d^ ~ن6ANs*DK^̂ʽ_ӃWƊ7@Ba|W{d{OJU8up;AґjK<Gji22/D 4!8$Gݷ0 jkNjL[84[19NbNW˷<6_߹((uaX'<)*j⒁ @ЌE2. < w|yq2r!)3٬+k̆aV>`i+=^`'Â\eV\Õ'IL {\RXpy02tq52/Ww=:syVխO6+ҳ=Uϓnk--aӎzs4d^d[=7{Z]o;|H} e˚^'y "$YJә̥F[/.g{7T㒝8n#SXu,ʳR]X7]|Y&#B .ѓYK?2i^ Krgy[v\Vf`!`C!g@B1X)ַh { n`sDÄ㚍>RpL$sWp ylW&Tk"2/69K3bfJ%RIh!Ky^nP?)7͵J=d0A]No4%<唁u΍is#N)(#K."ȭM>4Jw-4 GegeG]Oe}V_!%֩%hEq _Lgf'G1cK]1'fK N8rFrX︫^k8}_B.fBHҰzٳp~FXnIꐋo :/ Y'?(SyFYzuo%+kOvmR9Dy X;Sdf*rH?5-ǔ@΢e@^֦_#My^#cc-EXЈ|Y=я"N.SJQ?XF 3츉 ~aƿPEEFR ?+uM2(Zo~ͅ\lr.RJ^)! c(roKz,m<||sc݇FL)_Nhiƴ 7Nx{Y3QnЂΗ*϶bBFi]l2{VO  ӺԢQ#Yp,8/>·6XlF^X%c[BF~ᄙtC8On+Gk!L="^eT~jBYI~"*gǍZpCdgb9IA.47jA[d9R=ْ.܅5R[0"xFU#Zk}?jeG~76>A>O3%|o.OT3'S;Cl4;+s; A.|Zד[t٪"ѯzɼTL\էffn~o!?pDr~u1XˏiEdpZ]$YN~xr@_ ܶ vc%yLVJ[Cr%;Nˁ\-4aFAtd]j&H^V $4%grcNco DqÑ\{QwLJȬ͍&;;I~o oG|k=4t!ɹb7NpLicNe^RꆑV.,["W}n̋ǰΆq&K|=jp 2nm&"wL` ;,3NR@*C3 e+wFS֧uT'P۝:$'fwa=*]KPI4`_7X3]:gP!&e!#HY\ruK<&#Օ璷^?hGb=P|"t;e޻71ex(aAuq%z%NrR1>WcX_&=e8,]pl\WrܢVLho]Q&~Jĥ?8T=qA FoJgmnǐNuMA.ݡѭ g& "~!Ǔ,'I4hlh:m GUw1CJf7q^Z&d,m%q3 9#!xF#\/"Lnxmjv4!vPz>yCTA]ኣʽdek{0$ ƭK:/Ľ`F-yp$3!n)1sh ico&{^?pd}(~9T>G3-[T fkjӐ9r,t$#sS(|Oň8{*jC #DnFl]Ԧ7yye][$𧚬ĸDܯ%u4ቡC3hmak>ϭN”g6 4 CJ(Q邳̛e  t3$Iu>`%+&5@+Lza;p,ם w~c]a,DPk̬٘]=qAys-%N@0Gi_k(&w[3Gova2wCNw'%|’sd mCE=\ $sd/a JCNVW"yN&um) b冏>>rGV?*=5dzZ\0*<Sz XSSN-@c5O|/k$#s}19c*}ĸ먆)+sr׽Who|S'zP'?}V*{bguk$ J(kq:Xi/[ڠ'QdA>Ym.ZIK1M_N`eK0^uwEevurČ܀MGT ܍w'%}ԍ80!3[JRz3ɎT2Y9DqGjAx~RRA,.³k;#k:66)syE'9F)ظ{ BSi߃Q6n%%dc UD:{7v_D\yN㚂Z+fr|\Pusud ҙ_# 7iҹT)1Rw൙83tD- *0\Rܓ9z|ךS nNwQSD捎H%&B?{9#7Fn+=+=[ ma\SM?A;,KCV5ُCY32ˣ8p]J][[M5aYU8֤ yoaF-ϏfYC <)̑ެ7p:vSӒpDzK=p.տ֎7}8Zgu(I#͍X':_g_4pDta4!-qMa.jn?KFJ$\ۣIz dN;$[r9CΫ)pgOC.ʚWQYM&V&AL C)U#yZ9]c6/&/$n QoS7|jЭYc9:9nJtʅ?KU"W3 E}>KNH>Ad\,?[_Q2IHdRK02{TmE?/,Mi瘻[̔VRHe9+L(e!.1IY*i9 6lq3f5`M]Hx"DL?e rqsX,ȪY(4aq F2>1Ao)Ɛn;`?,l¦Y;t״Ƨ،Pk8jIHŚhRP. __g뉝;Bki",_B5#adSGUَX:t(끃]:l'=4_3Cư&y1OJ t!0@T ub g83AnR[ẙc63՞ p[ٰsM$9~C0X:L39^ߦEt2p)VWs̒yѓgzFa-TԡMscs[<!6LiN!M4^%_8+KE H U yg)v@?P?s߾ ؋9 .ǰ "]ݷI]ᰔL2bȥ- |]U:zKwg[n|lIN!zpr7h/vk*vsKȖ&SۂՑ<..w)jP3T.޼FQ>_禮0:A9 e2&\`[ݵAw&p:Xd_&b=C`ɛdWfœSi\iV[*sw(/HJq׫S2N8)' n  ePTܚ hG4cilC.3~AP% g_p=]Apv#1zkKuB0&!_ȩwm[W/$rWG\!ηC5}9)KdUg(Kz8C˩pF} n[p:~f,՚TIyH̡rO*vRk!mhiV;c/w܀0gi>^'kc#e{ωiB NUs+k** ?΍ϿpvǍ ꆸ3T.B+‚ɦ=؋ۯ.qzNw] ]ЙiKZk7_=dMX'0MOX0ZnvwK%΄P~k&/R8bXNAyхD"X+h=JohؾfopB*w4+KB[=$wʱi sUL)9R)[c vE+'iH+jK=`2[Ax 龆v\+%qY#L tTyF5IkC(e9W"hk2ȁ yB`WԮnimJEem[/ch-1hKU8۾V5_Zi#:b~"IGa0`mpzGܛQlM CwLAkDT4 0\oA(93沈aIɮ%䠿45}G /cșip|]C y>O=B@ŸߪL 2pSt5K>/Wgd{%6P~ a䩀H\O(6nnH%h/:Z-!]'c+ P>  'n5 s@و`fv)4ar&ڼرs(Tg݈rk;>۔;PgB:3Dnލfk=u b5BmXɣQm.K4`m/>W@#[_lJlR<0be;v%#iF;P) #?q\(#SYpOI n)4 `3imҪ}0C6ampoT8'D^F~<˵CO'v*{c6XɈ uwr7^YaUvckd;Ok(ZLs"=MtJ{}KW"O*WQx/ (ArV&g&*\xCCO4iaBU¬=λ#r~Zccl֐7o\"v~ywlcE1.9R%m#_H\ӳR"tŦ2|]/oG_>>YN~q& `;\en)ٸW??aQZ P]P g45*T;8ՅH])HJWK0)ddZX(vU-I&,3 T"G:[l e ^vZi4Ma/[1W0Ɣ Rʏ~1MT)'S=L{BK +weĉj^ㆍ!2x\7,y;|G-^@SXi\l4Zn_OܖPk)i|o"j!7JK8gр+u2]]dk%>3\'.gORAPuF+# Y rx'~LXl39.xqfbf'8)>]i:NGgzDuQyfT(^= wAsT5?S( -O%uA>\92KehvvŮ7QNvq]M7k6nZAAh~Ib@PnFpL9L휂טYYhM[1Bw鋹.W6iD20Ù(x܊9D=2|qBh?ɽrRyY {T}5M -h͌qt)H"Z&{d on1ѽ>6=6fq:6@j sGE;Sy~-], v긛@vӐ{.Hsj9Îr֔'XD PE?:׀-zX@puNQ}!Kc#tnqsfyPȃ2kUo$K OKi~&@MK$: ԐkEkO!c>,Q k/̻tɐ/)WYs}΃79y5a1Q S' NgcȃrgƘMqpOy*])k끼K-o#)hr$y r~ڝ-5mOL֮x2R(#2|:f* ~NNo Īklc׹iwo&P"g|$%R᝹aeQyݠk2݈_EU/A2Waˋ1=o' ͓|I*M#7GYGٓ2óT \OrI&ÇRDIl Y!eϴ K-NB^MUnCB>4E oӁVI!y|C%/r3f=ԉt0`DFBTrG{faHJ `@& [SIV=;wʁ: \֗- yĐon.{+Gk(]h @I; PweS6^jMYd~#E]5;';dyy[Äz$4rZTBw0 &&R9hL|!϶7qFmz _F2?yV҆4TG$W!su}ǹ i\ @^ݛG&&fI9_h3I[!Z9 .]-tb۷,}8g?8OF'@:5T~(t5B%Yt?C4܉7mZ;B5 |Ti*v!)-mSu@, - Bȹ s"Em3tgMeyT;~ܰ!'\셐coi?W$eǒʈwG+.6vWm SڟΆ8Ԡ 4UvSC=*:dz9<:{Jo`i*"9 9.) b!%=rj j|EwD!P6oz\[#eb[CIuȹk^]:̥ryL)1# pwc%ɿҖ¥P-_ޣEط0|\Nٟ(͆,P7ÍHP 1ۨS6?,'' h^cS0YZ+Ezw k&BΤAZ&Ղ~ZX+LHA=_$m"a 'ș 4ǨRT6g3[e[ǩHUirVrbUr{a~Jtfls(䤩 LvAWsUh/ G/AejiV"ҫ͜À9Z5Vro3Qdy H/\g -KӾSU0grW'ӻRbrrn??Ug&Y`ju>gti«TY:Kc&ȃI0iQTm)]q?>Qx!p0vۥᵚ"L]wAK7>3 ,5 t@Cum[6rbbAGX-@, B033]VIJ{kBn'^9R!GKif{*} s/3TnP 0v9ۧr: L -4bݎ2GAD0r]=Z*xJ ?Rɼ+]p=/#_L /2qAHowg 7n{VQu/˭{>J Qj{ WvLqbI9Ec>.g#ib,rn|4,!!s;qG2}Jՙx@ɑi#z#eoE#)oqh\s6N~;F15&b#iC)av6>i\ hуgO![/B[7wĀ&/PzoQh@Ƹ OrƖ\r&1v1ܷq5\, uZt7-q16QwRu~ n!EÉ 5 2IwuŹ$y3ejΗ3؊S-qt.ONpVؽ-zqpKc?IT^w("*k5" y x A rP@KJkLrg!mPDʴ3{T3+nR֫T(-J+/0 !OI]|iSum(I7.= =' !/ C&gl]]vb&_ v }ZTY\P7,K Q}&lY1.:Eq%,2IX[l52qA]StoXrطӍZtIXJ`oL 7jKa7G<{ɀ\8V;_ 4]O_NTT3C3g(:iܓ&|0JF_ 3اrsSw;+!ܚ>ySlj%u&Q kI׈/PT0ǣ-9)އ4J5Y3숨d/$[S(֤RyCSSC v+Z`x:TN7؏Lixɧ=O s1e׀XNfS>@M`SB! v2hQL÷-#RC!8'a7D65;~Am1ҩv+U^QLVQ4řo"$2[>LjV 0 A"w/^&r<"SPڝ{dm==yq!✾ V$!ww3gMB>]Ser'3OhNS*-Re[]`O',,GG;q]Ha-%5+ܝvVʸj͐:asOn)7;9&*bl7`u*I7 HLeahtNyb@:( i:(gE2=<'3~*n 9]/ep?4#5LBnf5妡Fz:rx!VE}_H?4%r! y@E6y''/_)@ўb&@@t,7ZEjzo]n&FӨ@z,~l%@cK}7G|3XxQȢK m@A+vgvccwD/_x 54^mmق nely4G`?ɕm{KGckҕgS6V^ov/-lc7W znY~йNܴ1=DʉUy@@Ah/1k4h2n=/|rOHq+99(ZwxQK#i hM12̘Ie!J,6gp ;̵}L-Px&uMGbi֨rȃ݌nHQ]+tfBeץh?Z{D=xlYgx7Vpb*,[e˧=FTi; g!`It 5ߩٵbνӾ:y!kncLVtޅEhews4Ve#xJ 5 )C'O< [ [< m*Q:ֽ0z\M w]$DX/n&ה&DިQǐ\Ѯz2 AC9.z\Qe(^&X9м3+nWQ =g,~OA&&O }C/TNηҖz10 q-L* d ) 혞;qH VO1|gҥ͌#!,^#/B*n!b|LHY 1KZUim46Q!t.vlzj6͂+9--p V@OÜiB'"$ \q[~poy`rɒ o%Pw!?/0Nҝ8vH/xu ɺf`זiOVU܁zQLI@1DyRu)[i²TUW}w.l=]ݷ 'QQh"mlC$A rͣ>>^எV #r6_9{u% 'E3:ΠTM3hvpkR[jVqT.TkMLt;HS8#nm3um,ajZy$1 %n㯆:;/kN øbYxSw^ߍ84lxʥ0[W7a 3Wr)߰^nYur.vլ&'' +%իXRR9"u ] JÕ8kV(cQ ggd X@xㅿRvRJ#-`qvȍaΆAF3<ŧUH+L~(< wUDVFƁ!?ȹCVO~pLP9\vZ7+\ٗڐt`iعrKXȃ\Eoc*6DT3a,dm ?ԹuT.ԒiHOH"=ehIgB[ xv~k]Μ6qKr<OL3y@qr8smZSZg^GhJ 9k3싉nm6D-gG嚱1T_Bit?S]2~;utpHǽ1ƩfpCNwb] oXcɇTː,(p%cm)zWnWST"hxyjYߕvT ܿSa tyE 1_̒=vnp7Mg!RnlYXgEdɛW+c}7Ze<5(Gع)=1p. TW$K{oy`UM2 !w;g+m` d؂e*1xw7Y۹MFVn%8$dF{ ]܇$1CS){$u7GN-al Oٱd,שRv%~2{P9qC -ώ>-0&m w4`)0pu O3^Q|-F]H9 rbBА6,8Te:drZT tX䞹U̳ 34EFGS5IL# [du^-t!C'(T;$aExG+Q(a/Q`3gݬ .VpZuʍȕ;}m.NdBr^rb6Bo\E6 Gtǭwj4azNT07d=:VS'al3ާ ǻ$≆i-,TYTonM(!:Q˼z/ y^E?RFfw;v_1&{G ~lv[֧c7w(+nAZ" *ǁfz0O֨> 8rԶ\JL 9]3oS[FM& mۖ ̱cUP!G; ,jA.GM|3Mw;dqXAm8_OMІ硢23pbi!7Yh29ڤ9D03n隖i!fUVy$VD UtFxnjvq9??m{?֒&pN?Ly fe$hˌXkί'= w|_u;D.2J"U[ԟ"f ílHM6"jׇsi\F8IL Nj<dn3,?|Dw0UUjCތ}o1p˕yp3t۩u˜Ѭ(gkRGM3ڬXd'vApa-AoAe8CtvR6:5p/Qޮ+IʬR>8ditK@QN݂x\هh*VhN{['!DnԷ{>)рp $|O@$\,4ȬC>T;j_ݯCv^s\[N`)XmS g (By v6}/(.j/,Nó ^p`C.Q"aE@VLKZ*=11$rQ<2Kԁ3&41Cq\Zi;ȇ‹!2vRkj߭Ǩu\+~{a`–LV}y$5 BE`[Hi R+ԩ\:rkJXЭΊ*0\TKPmQu37m]Fڟϊg).X+&4f F@f{tl8b\[`ZZ]w耛]K$HQm"gsq:flfz%/[= JZ=lfs70`E9L3㈖D~7C6GRb+yȕְMl~"ٛ(ZnkJ ]P{0a4YM4)Y9@I8K=v|gpIS7CzST N8c$~;ˬ x[sIc쀕[)6YS5ڗ.Ec DJ챂=IޘwshoSGXwR@a+ *hor !E!j5(tGЇ8:5-ڭa[×0q߄bd+鴚F%I"^9p!mp ^p7V;-d~Rf݌ONϤYD`_ednӂV Ev p1Y*W|0렶%A0!tvxcbXvc6`7ꖍ[R_J6k 2g>5eyW&mZO`[7:ntǑci&0bn b~m9A72AnB-8Ԝf\97Ymtv,8X10+ىڅ"`Q,h$(v.SnKg "(nuՇ?xP׎.V^#\]v±Z9o*UwޤרRD,1M*'"!;&`HFLD*͞ ֚NҀV\;γd|중 vNxp}nn@(+OsE Yӌ!\)/>j[v@ssT zBD*⧭NW=Zfg_;:TRK dr' y`pvcASuq)a޿`%0x[!nR 7@.drq\3AX`F & ?E/MtNKie}jgA]=lj7 ]sLJUwZss񑨒t[mK d7[~`g*-cs:58A4ɳIdlHo+ ՙr`4;CB]qNKu,V4i䶐ɟl6E=[+]f k0*9 yWfR]osaUVo p,ur}!|68BBв->R.LPyB@\~aWWw@ޟ;}E->5;է7|N +sskKr V!>h6Pc{n;l4=3L')Zpz1T-8~z `anƇp.{ғKQ}e-؂Nu9)3kshb,>ͧFA~6z2Yg-ŪZQ.@0-0ܦ'[ S).3( ?m =2 g ~9[DLM4m5̴&Rqxs kPWpN(JEf T% |?fAE0ʔ ћ{^_ޮ+^kḰމ3-!xF[m=;͍ƚ8OwOɑDB<£'Zc5>fzåUVy&3kB3ةQ;!)@]0UZrRACȅRt9QN_M#8k),>=DXD6]J$}wCDfeܼJ%*Ex'd.ZrEvY-Eph x(_oTpᑯ.*Sc"LSlK1#'&5adސll'_f; 2w9ׅAth!ng\ -x#U *p$iMr xEu/e Ef*\NL%z7Pq嶠!!McMSeufgnYP4CrJ_GGI[ehKi.\K BAs&"-ta  \ O\bV(2Mf tλ:TNE"G7 H]3v1vԫTM_ٸG*TnR6r%֛& CGXMzNpNo s<蓯p^42[Ygc~ڥ/PTsx-L Ž0*% 6 z*뀼ދR=e~@; )o*ڈ%@NdeA!Z; $_*mdGͭy'LQX^`kL3ȔLP}vNaGeIsyôii);16P;Vj2Y; $h՟~G1nl9}iH*%Q],OpfQ ԟkw\"T7pvO0Oa;b% nœVs5E? %雅 r!8&S Od#n˿"$t^ɷu|WМdV`gkB? . !s&b-< h PƢ0S hv/~0ۓ_=Qy"L r-O$+ :{'KD W|0 ðy>Iz$.R7OΘSJ. E. {U!Ρ]¾9~1Bix|q;V0gܑodr& imBS_Ӧ sgTLr )mqaQې_+: ~0rq6_E(m?I ǽt8I91veoT/tDUA|< ,Ƀny#{$N-mϐ2K!A"#"kV;s@roPՋk\*#o\L42aY"}w@={/ˍ0MT |1 p8_@މֈZ>V#?/358 yw NԺT `&[RO·i }KeldJF{G|F{m }>6OI/{t#Z;H7험.>v>qgzu6LD.ʛEyFc+Eq^խ5%0^w3{jInr48D#h# J]0nG!66X uGkoXq?\|4UY"O?ky{D oT\&R*pc$NW4wt&Lc$&JݻmO$85I!> 2[ k+:d荙Q2@){\An9{SV5du<47O+i҈v6- Izyʍ'S#K2J[Qi!IgԴA5?$ ozGpiC$!O#R6 9n\A)N˜l_RX;B. Gr/݀49DbtTyd?w}n _oV27gP[o mdj1Z\Oݽ!KtR'La< 8[,䩳ڏ[7Z.hi}JdX)\ yn2;okzۛ[@e<ʕleF'\FFW ʖX6콜\3gZkMc'9~~{{.vbJٓ3|Z|zocccnf1_F~r^OξmYr `kaRhBNb8yV2 d\*G\4 ,iUtmx_Z3 )$F@@KT'XX1AmW8`i‘`M̷{`HGnjBB?}uWoWIՖ _84{ϊ}VⅡ%t*t%l3*M]@L@M8mcjdr}wn,\;0Zjy* 0oj pq)cE]?F\%9DlqQvDtci`:N}Vvx; ]Xe|ziQ/̒TM?Ҁ]yc7u+ ŽKd4X\D &, 9zItqSvb(aaxiYY&b @Nvi5C^h3e3qNxuEBaGPeFi7QAjų20mU火f=1 Pa1 c0(-iqIEFh3Fw.ˋ߉?n?|yKT vS^`/N[2-4wN<3kDI([#B+ܸc0U tC^JPﻒ;,הL7i* mRr~?W;-雷^OUt[e+;@b/|1=:`h|P.;b 츝|mKsTݘq^0(y[1G;Oީݤ̯O//O>i5[6fO>ş?M`k>]w=Fx|t' ՄŘC ioߣ|v9jn%_ ZR3@ 08%F=9hqXa)]%LiJ!tcvW5^/agCMu%~ eWZ7Ā51j[C{,/m ;b|To/C|m$P>ը6oƭzx2[j$/KŭƘL;M'b?`W![h7@7v_4>*`d$QyovOnJx @[\D27 '[L9FΩu ;i $0w>rMxYn\ǣyR;R҅q-=) 3Ű>Zw+I[SC:{$΢K_ot/rIr>l\*u']lg|)~= S؍mNw]3ɴcV;T2+SbZ;0nBCXK!<0 6ѩ'G7VQu`5"0j zL\Û@ eJ[Pd>5pȓ0y޿1؋ 7o23g<(s= ~KREt€JK<0THג.>H W2/NZu=Ԩޖ咼Y鸅=ݻboo8Vz!M u9 3KX['=04ѦHZs.\~10{92PڝͰ鬦POv/Ξqr-h<#̛8y>rL"鯋ݬf1DNWQbʝ%0n\sHTm&Ifs|RIѕhżȆyΔxpew]Lz\&_,aLM!|0sOrʷ/K ҵ^c 6~$둯|]Z"; WyR/yأ=%q$ ċ2k"F|uN>\/fRZދɢ%!EA5 X +_B!`(;@.ǎ0mV`ԧÞIT%7{O)1(L YDn+`oAWGUTN[ hv! f Y"lɇDy=ωE/čmiJ~ƛ\ms 1V~8$7&OAzᨶz^h]zț5^"6Ӹ~+X'CݮqXNՔͪȨ!i%ˤʰ]Oi4qc+E'2+X*8H7(g#v(CnD;ÿwFw¼uX' rY MNQhDVYR—9TӧRC'Zo'#͹],`@8?qGY P wn>lMa >>NO -k0?l!hcVwin\>e"~e3qơ ӏy"IoKw;Awl9ȑDd}*HDiGt(b%^>/?uebRԋDzRїrdRrL_?ZtƣlakQkz~w{?R=F8M]N4ȡx-Wȴfc.=8Otrm+U (5͍E`~n!5$ON(}WD?'9~xOVpOZ/eӿ!>9Pa{s܂WDtqTvz#ALf2s_[?Tw,Ld9{Ʈ\~ ^[4gNTX +5ThR!0)"'s8ձiάӇ-mͲY\iN2vd9%5nn_$aN/V8 4պnQ.IPRk 8aѕݎKҟPaDQWak.׀S>vUp="B7(O%UӤ:s}:L9N3l8PP.g3u~JW˽'zB@0˂DwʥLrx-*(q)2$l_s`DiNj)Ն v& 4<ĩotf!aTTٖEh)f_E}d.i.9fu<HzeIf}KcOͳ*@3l=s=>JOp CTj\uQn糧!CO:[n}E{,!3>/j,Ȣ[DAA fR*N|:km+3 g:E}t  ViԦq$` J-i]&Vi5L kUncQK\uceZg;w6$esSk%cH̙y/DE gʕgԝ|_;+!]\4P7bUgS1vk{ӈKzY ooaHs8Ȓe'<5G} M5p*rn<c =.c+*ƚ4ffr(;TH~:bOPQpY.x|Kt#C92XZĴ.> 6i {Z/ QqqO@wZ[4qhphl}jM=/PX+Fѧ;!ДSrx۠c8aM?y}7ʊ`i gV k" V⊑s*Ka΍\:VĶ zGM#f<42WȔ0 7Hk5>P% h44GVuZ& c㽎E8rWw g'ғny)0aM̵;c7@^ϥ6qV3ߝE>f58p'ds5Kۆ0< ]s w(|}KՋxqSGyģŜ2 JΎ0X3E>,'NJ9ԟ6gi[rtm0JW\qSkqS j4Nm0>߃]h <ԇLw[.v$F#$Qݰߣ|?E݊sXva]gY9q4W$mO]MQvMP+u~6eXY7S."gfVq#{,F~}:KQ|| ѭ {|{Mv@Ѣ: ϳt驡S$YbNؗyݦvZ}6YxrjPˆh~>!7j&qMdׅrt^BhFU$;ݜ驅4dmP:  *9K.0e " ^XN)u*B>ed ̆s$̌]lfXW}`EkHĆ0j_,Bߩt!/`KڬuS,lMiRN™Svj5X GaIsGt\+@쨞MC.Xx^kwtIi' f>m{W%[. b]Wb"&P׻Tlyc6~,Vq)x ܐpI.0H&D>.+ WN7M'ɐc>b^1R'^-LkugHr~$Cfrh&7?YKꚣ`< H 7WTEj'Eqxxel`ʍEuг!Z_؉Z⒥΍w+<>#('U:pqhkS5F=[˯REyh· ƩvLSQIfz:xza5iڬ{X>yXTحNB=x4]|xp;%.sWLzvNAkCZN2,𯒶幍cZ9(RyƗW@)K (>wF,Hw=)Ucq TQ ?˄9A1Pѳr+̕mcݸYg@nz6_9l>VPulV7~u<~ SSAX~@@G;+qڋĠ[כzڒ?C Qk,91&bz%Ņ)7<~:륜~uFږFR}nV/'{# ;3-^y|J['̩p^u#RnL5R\GUu+Wtp\5nW>.Ť#(, V)E4ZveE7H$8 V$i4Ӧ.SMjCfU hSZQ(Ly@Տ脽khgO]ꠁ~dF~'[:xW}b˅@Qb汪5!UBᕎ*Ǝ3To/ļL Vd^y}s#tBIB̸AZ7^zRBNr/$EF#w[0TeAկ؍}Eujc痕GVgc8Wk!ENN_ZRA \wڙU!V11#uκ{.+d^Sގ"\O֡QWebkp ANh)*tL6h͙Fb} Mq\:?}mz>W :U`+L7nܺqx1k=Ԇ_ W t c,%T{+ 8${o}y }[f;f̒;چ i.czVAc Kl߀,4n z]^%r85JԲnEU[,s8re./αUY%)Q6N$qoߪ6F6J 7)3rCWI4+r9] EQY9٧RkT9De7oo~e5/˳篰g|܆7.QoeSAJ+ s:Bcƙezį(#٢1NBh~&_AZ[_Kl1ze9hP^" gͭ®륣|4~0I -UE;4Ta?K~A܁/"FGrYy șܥF v}v2w= kf^oѼ>㚊`Y)ϚF`kss.D0nͭB|=p>^Fct=le-.įʽ]g5i}VLk^8<7QM[ɞ/E^j5oUX`!תs= 6LՕI"XLC6ǯ>x$(h"  Boi6; zdbaJe@?odB?M#f4Ϯ2Nqrs @nwEK5MqOFMН>owlfk%leOW/TG}3ƚznj%fr&Y/[GWN ۠!ÿ[2b# mAaU׊nE{îr:tm'ٲ-ҌM@D;y/8לUӲʷ~z 7۬;l}l1.g@) m:`"p~R U6?:P,msPШ?LwXVś™-fwTGr̐ZL!jf?3JTN#:69ӸJd _62U 67 M s*,f+u6 O0 GjHFA^orZiOƯY1M :3IK_\S+8yb߳`*¾jTs*5@y}&hܹ2(߿oHg&a=$A?sj-twvb+WnaS,JǢ!@ t]-K6rMa4ore)z  V{"PkyOWm[xrvYHRM4]6'S)ހ5^\h5w6ǟd=.X&[2'Sst5);Mzw3P2uuͰ1lJrC[{`z45V Ta,!$Ǝ0ݪ9,Ue cLl6Umkv9m#!o6*nLd[jH{O-4-j4 UH  [0Qfq1(LFXm7ӝ %|hjG0|F,AQNY">6KxFt{I涼(HnPT֥@QȽH!|{Y 5vLcZghAm!7S\/x 9/2vby*;ko{?ZB۟S:v]lC4͵ "G!?ItЎqi:{ZO;[=)- SLD W;( ‡*Y JJ,)ePI :]<>?Gc遘ِ:98]6J);`1vRr(N\qɢbu!')J6WU<.zSs#hvބK-y5b֥"}X -/sqr Iz)"9 Hg县E˫LgE\q qCa,oq}F:AGSeS!l:fTY 4r\8,bᇇLmr-kwi1q0ta砱NwhY};SI<Ǝs􉀠k&n>giցd ŧ߇z6wV2*QA/KZ۽y̺08j_7@.=ɜi#䶉GHח%ٍ\=굚|iWm%?do~Z]x])\PxK(^mʌJT-fi^)tj6 1G,?ܧE"0[A/PCe =݃6\‰t*}B`5zcr}CbOBl7DֱSWLxj֐5 '䒻:܄V[=5pp!Όiꛀ^؅#"s6qnFq]s֣iߪg D:;1K7{5,q _''0s\Yj\d\@\ۯG҇Y:6Go0 3vތKv];93,m`D}S#Y"TAt?E>Zz5=5LRs{%jQw uim81L> ~.ɉ{KfT:>Ee|3dDٔTd$$R8_8!FѝvڮCy*䐗߹>e[q"@+D_uRn܋4ߟX2D\k9}~R |p6Z(;y ґW6STS`P[dy.EtAdy,-n$Mk{gd]LOڛSUM7˲ux>B^'m&eB.{O7}WdwySHf;7J+z֧򷚐F\jf_y*r.-}!-nn;uKDWW }esz5jK~xݔBl8ݽٳl 9|;۫\מNj-+אh#&wIs;Mo5eu@[7?GHjMp,7aSeK7/[{m1ghCh"u:Htn"'Nd;w!q ~+Ql@?{fX`7)CoG2-7ϰ;Cg/,o1#~ܬ^V7s:7c qZH#|pʆYJڲ DzbuMiR{i/mr gúvt%;f7[gE\Vcoxz^ޚ-U)H 2l~Yqzy2𝋀Oc*w*rW 6`` T Wr/=fPv[ ?tjEgC?.0b7 u=ylG}L4+җ?F!w+G[~O!QgP&@JAzɚ?a韇#IENDB`n4 vO+ƍ PNG  IHDRCPLTEr{~:?s=pMݿ^>sWwcπ5בڮ{'7z"|a.;?l=pYKF}p~:vQ3`oLhib7݃΀5!Ӡfѳǐf3`l@:4gf,J%94R= Bޭ'̥΀5ގ)Vտ3 j 7y< Xy/ZLu]mQV6π5A؄vCq0ئ XSӋ ی׌JE7.tvcm Sa.Ơ (51N`f:a7gv7+"Xp+ӟ㴆dkoq' jmDin[ OR}nyi=Ҙ9ntLMqπ5I7tPy].[}q΀5Arj%X4ܘo]nAP\*O}Nm j(1K>{dk ju:l͓uvwLjyV3`ՌV 6=a3`^d 7f2:r8I%mVǛʓz/Z-Cvg8] @^qtU-!Zytǽ Xo[C i7go۞\p>{<V(΀5R6>`UHcym8ʽ ,+sY+h163`UO9U%X˗ۛʞV9߰հw4+AW^( ~I̞!Ѳ{v= ڃxJ TaMLZPaA# 测]7=ҳ΀ճ7[U}9aŔH=2uJ-b^()-F3`˖'U&'V%zCXE r⋖C9ٰ;sN WקTJJM]RJ X{uv3:58]srtcC8Z ElS snkx =p]bxRjS}w,Z!UږiV X;RruRJƶH'*yPm˄hm*j`ogym eV ] wM|̲1m3`\}1WG+D(߇1>M+)J kӫ1\q*4vnkhuB. \XxXTX75Nvͦ{ײJȃ3f5N΀UgwCǓ{I67'˔aU'8bo[%+j5g:+*;Ve5_^\'(ȤyF*ć1y"esǢ*ypF͍gkK x]+؎U4"1I4jeỌ +Vz׈^8ViO PRKt.S/S*8)lXLO,a,jhY;fI٭g*W]֝OJe6 [UXUC"6kL~J. ~o}4骷̞+TX4" kB QZ Ѿzo{ XZH9/Q^2bTn$38xT𬿏7΀5^%WǞ }6 0=E*sE46^kv ρYcM3`ճypOhb(*E*.Sel8JY6!XcQrQ:Gf2΀5J%_,ZGқezgn0畊#6{6kDCUPeypֹS Xc_Q«Bhp\؁7* Yc~>t"WhcVPIER*5q'Btخ^Sqk~.@{zwf.{ByM.R`頸ÔX!ht3kEavݙ- PM"AC=)Z42,6*)&/S:g?yQ΀ss-QJV!H"fh_ iGM%B",Fu~㟁M0P/RJ< WhM[W4HMy7b[Q(~ft^㟁^ uG# WNXL{zQrɱx0rϰgટ/h&2]k@U+.pRȪfWaS{O9VU}h Q;Ĕ*V?}6A..3΀5|y:SI+*ȵfDy ݛbIMTnn g:|αW[ LV=ST)T Vsΰ wa2:Sɂ+HX]TAaIu#7c;d-"ΐ5dʝkH-_ik ^q Bi*"C{ɟR}ͽπ5`9jVWP (PN1$ .Y R+Sկ IW EB MȆ2lugj:8@+D8s z,!U{耲eu$mxgj76iucj"Ahm3BCVB)Htb,)}Raft΀4>PBe 2P²{RndxVZhb&bX鳫0 2̇c2׌\%-+/x.=S5πU]x WWۈ-wsS&ج-N XUr:Εa5VЁqMK pg/ jp]@Q{6 LEsUse Xؙ=RJ ,eN3`#^ pSMVٴ%kDLTWtKDC~QmlQ(} ǟjj@L\94UB'&>zH&tӱMCtQ{%΀U6ݓpZx:29#ЀUS2tgo8-`Ub E\騶b^\X_JV\<VA'>5aE9(素D D3/ $l q]*JĢ肣'`hvW-)1}Od9ELK6}Ɛ@*$[aLU=:&ul,.K-o3`eǟcOebV(Jq+ 쳪v ,4| M?ryJf}_pJGFg7ϱ랴Zǵj`1eU,ؤWⴜ!{)y,HvUm@ʝ\zȲai9:?_%dľ!+3`aFAWCݐffSVPN.@rXO,KW yY^\YlF3b=p&㻺W 1 vfË75 A(Qiz># w$zXw>rME,D X `x>!CbJ4Ou˰20,wH6NQ蜛acFe+gWu;=Qq%x~3HqׂA[ѣi9IG.n0jYә<ϧD3 X!`Vgo0q xmDe3 "z~|7W]Aݽi9p1UUIYL9z, "uh6NΆ ?-% "O}K:Ҵb@Ӭ +Ig XC!Ӧpcn', CTjzuw^Krƻq_Y_diz, X'-Aՠ |Iݣpȷ kE:ق!QP_EK[_x&YzW#E#XІ} *Uݽs:}>aiZN_x=p,e\uJsFm)4ʓ'֣{ ;O})bdi9rqgu,hWjq\<Ͷ Xw(,avՇnCRY&Wĭ& ~g%̰$dWׅ"H\ s?tmx'mN'5isqNFHXвT;/rnr^ ĭ\&\P9W^TgЫp£8@Xu&q+̱gdU$:'ZZjCVN|uY\P b5N!.r9B< lxpDNc}Ai9%K"\Vm?]*MALkACXrFMs½8NtI`0{,2됿sÊ},Iv1>P$Iyr^yͼ[r9%et8J,&j\)RC./u7HᝑXL_ .kf'-)H_TPLAlY]mAi9 ysiQl>𝑬wX;Xj9%vMH!2V)8==hHa~z™u#gqSEvQGs `jW%#< \NpTH rg!b)7x lżAi9U «̂X:V&hӐXˍce8,DX_sQzT9 4䠴[7:,|LAwXj{ ٮ׻<nX\ӂ qNZVu uP(YrN{PZRޗ+s[3;,\mܱ50%A;2JߝC\ќ#1%70Q?` t Q̃r r\,{XPwp6s^mxTvv.Rg $SdADcyJCr ZE;n ë*}gʧƹvclQ+*]蠴+ٟ, y]wXL) tS}m\i%qyN x!i9C "Y]7fmUl+9Ea$ G&>^<Rł0wPZ@([3od $̮8>3yJcVmcAXsL 0y${uC UXXGX^Uxx9' EGl!) $3:<ӀD?IJP*NпXo fRuhQc ÷)z*A\(w>Ԗ*s,ULG*b"l.dy/_#MpEUTz_eҤ!i9 XUk!I[, J tG%Cui&ڭϊXaS7t+3`agu--|々U Roj!>I8w^Ou %V(n4+-PakX=? xLfN_qKȐwVK1y*Vt XX s o0` L7)B\W~i94 {eH,zÀE3T^uzzo.&J3>X$mm,g׏b.Te;Ra2(=\o.`ݧUem;nZN6hk-kDR7m=w)ԚX^l`aa m;,`!a,1ghWx%%*f@)S*Bb ^ `+w׀ ȲVܲ&9 ,^%Yj5j)҂%ДF΅- XXVM-x7)Md<!ry;L81P%ayq{ZNVocIbۖm<MpȡQnH~RZ#LC÷Vk/n@ZNōՆq bE!_Z |&qx3mo@x[m i9}7:2ӵdABdrelvFP9S5=soOC70sB[+5CG#k,0ipu̠vl?Ʀ't}Z1[t"X Yo 0jz{`,2 <{S^,L(`hJ#5]q!ڤyd5tD[BXn R %fHuaє]EaPkƧ.I'V3V2B[*+Ʃ*L)'t " xԌWxSkDnMEvB\ 12j~PjƸd"֋`aaX NȟA !růScCƟmxv`_ Xh-̉equUuJ>:Zݨ$¾ VJv 2t ?Jxj X|Y50 6<^P-a4Q1P-ҷXQu37 Q2jOF5ޟ.X:lѺm.`<|1 o\2p `V)'B(~`m3aGhTWb#c^?z5^8?grݵd6nPE^W`dB_Z;fw$XW鳒 P،h)\ћ^?`UmWYix2tbwPTUsFˀkMPI@8ap%\zJ۳[mDMP˸UȾVF޵!¬  2$$Yz퀕b ,;U0<~ަ0yM}f7cVW)8jYl L5WXX ^>p6|`e:0+b  z {ň+ū2 N\.9ȥJ`{9+}þ ,;:iq{xE9@a4[ ;\ֹ+kļZ 8B Vʈ( S}\C\WXS!* $!8_Q])">;'z_V+ Ʌ~xu JdvV g;oTf%/gо!7V0p`,౱tΙ[SQ0a wT*Mm oxaQ-~,0SB3bh Y+{,-H+о Xmx%MӈIJdf: cG]Õ/ X|puVJ󋢡6d)gB@+Y 9`aGPyх!}vTv"2tUr\E놶y.1L6%F$Xt[BXmx dR3t]U6Bx.rvd1Pi(*8^ (pV^\+dO go3gOUO C0H\廀zm^6BΦ+"CzՊv1S[bF>(Ԍ(kq,][A;"}7X*ގn%VKV7\_8CQfnYGBFt\GX VfdS `Le~࿢89_KPǼC(pcjxt^{bjx3]q= k[@X'/XЫ3p5&IM!,ۄxO)d$_2S\WgKgociK.'5cWWAmY|D9)IcL|E;dݘC{^`{z6wQ.*_hTJ%ь˭;T-}ٲ8gbV+^]]=Jt5d>.nv9c:~IP;^yR~8N#]fnĚ?`8e 2eGdo*rn|(5[5cYH)6(Uܜ >FP<mߑV^s2N!<+UQݬ b}ٌUAgɱf X1^ue'#[aT~W:s@xyExhvÕjPj8kUϸ'Pa@g o:v=?MtSSaKʷ!ǚ%`WO4Ȣ ØMy6 *5'"֘/'vt:~+BWXu jWT/Tt:ǂ$VrDw>(?>#B*+ "@6 L@:3VDM[!eMAt={Y xe~\Yb}sbIƚ`a.jҎM'4q2ŲXDnv0bfEWFsmM9A 4i;T D;#y-BK ֌+`x D){]:V&E2?%OT`7:ᨤ( W"g5#lU*T9g]>+1HE9Rdk홙(,E,"p.:|bV>K[^7Zh~aۖP+s`!b<k>oZ-{>5B;zǽ mopZ|ьz cO9vCWЛaGD8L(l6!>Rzw(yyYǑsh`5ێPQŽq s @xO223Q2F燆=m &JBD=YpVڋҤN_02}W PuzAtM~Ls@yVWe~Gc"\x^'ߊ/Zu'3n`][u|dM!L*XMl'VUv=aFaxUZX KC;vwh#3Ux?-bM XCw7Mһ ۼ9ڌu WZlBW-a3#B`5"M<aUY [Vp>>Wo){`a\2YL,&t '`UDcvX/;?g}߳;89@̮[ض>O]A{?`r\x!2}جVq#EfԹA$sc\A{'ZXN8Bb`Bǝ9Olqޗ`dN|U02HQͱk{[\A0հ ?+"Xa~:]}OdT|{ V0|'XMxT2d'bY} | 'ݹCz u s{ԍL#@l'UqkXrb4a 45>Ev m([l6,RxFƚ `Ue *x>j()"w9\ |l3=)1|*'{T KҾy@[7*bi&~#X H~EeSGc∆>)͖Hc5aIvnpH)2VPۑ[KVx g!czq4v䨦4i=~3K% W'$`CƚeK&XyuX;I};nk[bD!c├#[9B)$$;h0<߉ŋ_z?Whb%F8?iЧ(a`|+rһ`? P55ޞv럟/^../?Rˋ{㗥{,#*yVhRIV=)`.!`46ݮʬ^/gHyD]P=z,"uRV~䏨zIn24ڙ+EfߕBw%O}פZC9^Tm/EX'DSV'NjTpK| 8oe>~PFU%Kvs=]G4ԑФWIPrE]۷22q{wQVw=L`h9bMX^@%PoOz& 9'OMpŷ3b$~>4!0 tubJQA, ^Φ]3؇L%9V&BT,s*u2jh`<]5$Wi7+Z/+[wi`PR :: `!W Yj*:bg}4!{~y&&;#X+SOXHhPC!+y4! NM bժO'$XWW8cjvO(xU0cT|2w;锶Dz&r OX^e`9\1[.e.a> H{vV^Tq,`+_UCݒ֎(TQpƫ%3E._jZ~厓B2}v[]UsB7#XS8:bX!ZǶ 8h noJW[u'ی@, u$XWW8VU+# G+NxUWy~㢵.5EXClnmlF,4]xQHwfjl#p GJP<א(Kz#m WESo/&9bnv(~:,FB 2MB3 U;tpdpl FzTL9g.|;LO:Vx,\[p" Mɣ+7NȀGu-wKySģ+}ƻ._VoW :ThVL&OW4˘ ]YpB9ɱm ]8j}k~xfN'<\ɢ؍P zBL.'O>:.`EWxLGN|ƫR]%D> EPa-BjH_WXxI=WJ|q1<>.`Eϟ2?4xUܛK?j2':•ƕ\ܵJB#X5\wO X*1$/"ZzUeoLPDp% kd} Ф=M*7R%S8"" qw)(qW5-\! Y 9$"VbDȐ׎\q(F,nQ@YقWϡ3CNX%| b~(+*ȭyyQy|x~#DskŎ/b50~|5Du™!xuiݶl8S8`ņҺ;4 \}@+Q/"䎧eG*՚j5 1p VW|0' C"2ou72-^bnԴa/[ױ9x|昶RfxHO˺bXO{]L}MFǏeG_DKr }zBEcY&^*OL"& ŭ Ce-Zu>||;?Ֆ@Vƀh5x?;L1B@BXH5`E]1)^ic2z,?N b^on.\b0!# IF,-) "^,u38~dłpzחlg l6'@򾷻꺤,>09M- )nFnx{{ҺE.s/혂tW@r_WI|Wa1bv!rQyUL] EcԴWXw"XmCzv O~JTgf}tns "֘Wgp"0dLQfP5NµFQaXѨ%r87Nɯ?P=YXK(ŢzZrxh2Szb1&b&GO>Ja61GN3 `E V|(&m݄ r,6tGr;l YI#'|efO;_: (TgSgTYcXw;}xo$x슕zæ` 5߫?^pVVS%h=1bB{*~"!5`$X{lڝd|EL 9!ÂRە¢[\mǏ&'bu Fnj")c 1Q0P|M!1̋-6up/ǕDhV'T}9,'M.42pT˵!֨tHQ$sAJl7]z fS=<ԇ~|a'7'bS'׏hD /\?dsصSx }ta!G^hu dA!TF3 kωXbݧ+&ٮdQ㯉?w`jJ=)t5nGticypF!13U9q2-0.=iF6-7U"@gFs,_l tݽ7`EC=˱fܵC+'GyU؝!523-`0|P=V* Zdq!ir ZѰ# tC # XZ3%uq"~w@uw2hA}DXb~aћ(_{_w X+vHѽc*u$`vF//*~_JַQZLӥA;P;RbA(m#l5 SV1uZPM}핓ei)[NR|co4*?^<;V} ~߿{S%,dck4׈_SPEk(ns6&B }[O שaWHUO n#3ZWuC( -,Xv# b]6 X! z :&Gx 㻃f}v/w ^l݈zcKczTk"TM#i%HX% L|v}WW"`e3ؐZ=%"@nCΥoծEć@D$>ʹ}mY9}#b UUox%"M6nԺ,KkhkMq)VG0S&>h-VÚ`oF,צF.mhp,qP f8LTv|R/mXl'f. J5p{ !zlZΆñ8- GX+n:Մ6*- #mNWM ` !w"1t2GYGQу "z(̺A]InxkYɽvT7= *V (YeF;HGKܹfx:C:PPrZ=,~!'\њf;ZE2EXBYVDeMGv XW.ʘr/ ,`5\D_I4hZ[v V_SUcA&eҢsÜQTB:nn=0uLʅbD43rgN48w&hzu45!1i`f0rv;^q1 T̉x4d> ~dUI* cHԚr^n+d3Ő_nܯ]H=pG.^@ Շ'Ի 9 Cf$/ÊvXnq1&GzȖFNW}&X1+EɺFscb6[nr@P;ɛF6XԸwS=ڇbub54IY"|yو/I>U'`пD;0֓O†u!|K.EPE_lwL }<%B  Z.h#[#I_4]@XtzڬiqΦ F;1JbY"MAخƯٯxA.k{H1Vna'>q!_FR%g1( " I=#ᝄ8ޒI?0eshcb:]Z=JY ^`)~"j!tBjAر٪*;Tr1u`cq(֠>ӱ7@0e f9&p 0Mi 0<^"$q).}l :`p?=U:><~Ud+d a-^AH@~txvY g%Gޘt>wX]`ťzWM^TH[c.FLDKM+TyhsU5sQ㠎Q<,H͜>L3<u[v3_!?(hO)A`EJ@'$Ƭ07zA턌^>hNa  ͽn,2oM?ЀU.#Sa=4NCU{,`e:%>ć+&Is2-D\p`Ex1Nb*Ti tpUM KMB!Yaz0;h͙AGxye#.˺!!Z Vf2!`t,3g*Ush8Ua JWAxa=tg XȒ JGHlƋ}H@I])c5SU`y00pI܋K$2Vc :i]k.7]=[  X"ȱ/X~]'* @Q8"C%dE<*L5'CfZBξ1r;%~ 6=>fH?ޚ< 5  '9 M:ře`[NNrXB_JUE}">X0G͕w}tfAxp^]s U<|&Ma,성>`*%Xm+/u"}|v~{/%ثx_/w]7C rӯ ywQAܫNkK.t'-z[r{I s#oE)#*V|zKswY], ;MjXp5^(c!+#:<7IV޽HPp(`UBk< 9_"`צAl!N)/-UdɰxFI$oʱ,tYb"Vg.]}yze[@vQVDeoŕzAͯ}4i{a/(0.su23+%P W|zcڂh\WP X\r·5s~P ilԬ um F4a@VVj+$gV$r `Ca*zܐS|fetfXh5_Pa9++2kvT0t .lGVBqDև(,A{qeT̩ge"p[usTDVi.0}W ~U #Truc f:JO[1O|nJ7XYvhn r-!XE@Eq(MX;Zv>(AXY,@[ٙb #$9is VWCǾ"oHUǗE$6|xmalC*Z #Fǀ bg5J,{eWf?EBdo]3ey<8ugNXzrx6(D27T,:](XQB # IC݆g0/U\y);+20 ?]D.vldXI#S}>"EjJb9?zalamD _-]d;&?{lJ7o2oK6v0M2o}Fr.gCW5"2 8mqSRh;.KHH)\6K|ez-OT^qsjbX3g;3x3\F}bKTlل%6op4>Ԑ]|3UpVhQXunf˂P:%n$YsWWt}*,P/\ŗO8.d 9l_V"Gv-,@4vKCH ȾFw ˋPH,.cYk\m&Q^ĩSTw?9`ExUrp ==:@ z">Ik" s0J:I>]-v̰"b;@;u[UoWOxEf~|aXl2!My= l|;2qߐɈXUN܁Eax=!o\I(;$׷`sq˝=_-: "~?2ɜW\rCIʾ,V]b~!v~ޮax`zeP$( KYi-mA̙/pZ"?YWOۧ?nHZu|?pΏ'EC儅diz,wbVTˊ`i=^n˯_W{7p,:c ,I8$S;EuϦG( :y\u dׇ_ md4X"%Q,#p]W J^L +LzCG.C5`7I0^?*NO/!+'=B }D<)t)99d:5o.p7ϵU=/2=E? 9f T8sܤʋ{r+vQxu S&:,5j2"^\8EqC\{Uw'_'aFֵXv\o%Ԃ AX -oAǫ/RKIJ !^LB=pc2ل|q @ͭtGt 1J$ mE=KYOn景WOJT-Gy2c^7c'Jl"Y+4FDNDz;v7k㦉Dz9/2b^C7Wߤs$4oV)Lq3,)S#* Za. xrVփZXO$GGR F]qtrM}91Ǒ +;Zo,한^EE$aHĭ?^_R48H/%~6}z w)̏ܿV`ѡ.3߬nUx}޸Lp4͈6_֙ڞg\ r6aq#?\׬G&20A_ |}<#a awxkV;B,{# Dtj@-O/ x,&${\ P "5 t-da("V1!a2#Z\Lj<莃>>mF嚢eh|>Np%+9]XIZ&a=lB;姕f82s XTA\dz*=ڼD3qح7){Ewyz@ykM1X*cZ,;KdOorK46~oq\sO~x[>aYtc6db}'KZv];Wȏс%?Z,}έŪ> 5tF(&!EqGAۙ8T-ْ/z dSs}\&S󅫸îgSh]r*,"VSQ5hOSHD~sRέXC@BG֬B0G>,^ؒbdMI'd$ k)b%mo.n<@/" |U:VO;w3#>٠J^ ;Hd{xgJe8tm bV0O{w&i'Sܑdxv(3^r_I&b!w* !z!bbGĜՙ+ώqOL8d`Ul! ΰrbEGDه{Ȇc|(x _ b%:NBֆbVD \E X O,>?&$w[x6ŀM(꠺J[^WJ0&dCH @_:nOh%/0=-?jK.7oίMJĪ>t:|8.󽉏tĘ;bYQyHfrBXڒ"1A>!v;4k 3 Oᯊ('jj#p< s[E3&E.7G=P:}aU^* һ%Xtv:I$+/񕟃Ahb@,UZݐ`w,YrGG( Oǟ#"zm~ 62ՁkL–4Ӆ]QocO 3T"dz8&`6]"'&EteS!C3*>!Òkv,V}fH:.t0{}#8`_2r*vZ2YP1+ZP-i=5,܆KA'ҾFH$fӪ$*Gp>!uŰd 9wA=vPo&But}kd2f`6,Qi "O 2u$a5IK?ҽ5(OƜAWa&al{륑aBl]~=*'Fj'?2f.+UzJiz ^ k(!MQrB=b~NgefMFĪn$wL[oG48= b1c% 0l˖f ~/iBYs?sM!{:|K3+] XD6ZܠG&0uXi>r7v9'\a CbcE5T:h XI42xn1dyU݀T5(jl)&L#mFLT()JFeUņbXW@,lBvCthƏݔcEUP %Ia%} r)eiETNduubQV9xe%PŐ4t' >D’ /.$G*&Al8KZsA {~6-*Ϫ H}ik8IXj&7_(+w3quҕF"%VVVHc τ{<7Z#;tbN,am&4CvGA|r*@P[Fr; zg*Ncb=R*ZCRq9EDgۃ.GF:wU Ǘp.qc Bӎ8爮!{q%ۛ:}N>+@Ohg>.,[{ikKsz;EoRl;ka2(dSYXoZ=V-BHC~3MzGSXiA,!Sx|E˝SO1a汖Mèq9}(bpͣ9z8ՓX֓~%/at_ *qdN؀6ZA5 K$&l4{I =ί#_8-<Ї>v\+'}]D#4%W IںS8#)j3e֝Tv Bv.sk zV2^dI8@OkP*6'0/U$ĐVth|qoXR$Àd+7Id]~Hs{~勷e'?\"8=G6>*?'>{8(p%Qș*ֺ\Yv/ȟo{N=-BbHQG3]1Ix, Zs詚eB.˾Ze=www'/?1!y_2r%]X{ZHjsl3Y\Xnv/>1UH邙<>BPhiy&>MV?WI ^ݯcG W7MTtO UqCÖ֗yzyd5.sSLaP1 8i.2SXa%`cx[7Ǖ T%=s,qcO2d?&H=LGHFU,ႍhPIYwv brtã^NDm#bof ɹYn%Vٽ NO\>[Uu^a4p#YNElE{~4ؤ-;_VbX_rrcv^{I +g^i'$dE64V:s'>5 ,˗/")mа3I]8$!#TOZ2~\ `g"Pj({}bq*@"OwŝtҊ9''X%Q.^ȒO~ BϭϢl}]o< ìnJ 2 #qi><7 0x[٘]İb)$ݒ~j~1) <+G!Po4W4& :t=.$O߽BN.~9he(Vii>2;WK @[UX5)V3(;G@|G>hW޹*F/Y:pi:U| V[yhy--0Rd՞̄v|ܘ.xdOXT+TiT:x0NO>[q?fAn1`@^"._~O-C*sՏ¸={^,*maM-u ̌|T(a 7XܶP7] Y"~$[g+ڇ=g7>cVs&Eݑ?ïkkͪ̔qs0묺@SnUXI!p`u}n75oמ$x/L0?=}#A#Yn8 G`G1! W$̜qGXp" AyHP؎ O;_\:R鿅hK% Y~Z"ljy!:~f-Ƙuu!L^ Z'XHjvN[sx9nǡh0 ꇁ_??e] i}|j'T.1a,XN-Rԩ%az\òA5!mtwin;/* k߂ۇׇ}>D2>ܯ_ mykb#>CsoN\Cz5( BRz"%,ho$0 s!֩ýoΗy {F)7le0f ?0%7|&ZW9)i^="d]<8`7W@҉&0knCzN"EFP%#cqzYlL2pJ>Ȫ 6 "yq[eL\S|]-𬉖<5"&ʎ`' ӗ;/" >a5`-]@E "b4BS֡^J}yy~so^q}$K=Btspxɬ#~?ӧڐS XdXuOZ4M筥 -+AhRCk"V_q Ϩn?l'rvΏ`]<'oNL4]zXˇ~PZEy|0lH'Jf9e~9Ä@pZn%1 J%,H++^Ϙ mԛQZ>}FZVQ:NB;׽9-89EU|UlV{C9s*q9I<]%R`է[H, `o3`IJ% b]y/w XQt?77g֣N.-}.eܠKԺg<n](29LF$^%>a`3>J }QMPOX X(x,m@C VWh;0CʨX^A?wwO£U^dچ|J,V ג|RE{y?xU|{m O{ ?7nf[.tR!*1t>%%b56 'VCN⢭r5>{f yU Ois;i߈Hد4A:|íOi&\÷ej8!3#X`AɸpfGO o*(֠en 3U^1c 9q)] /ϯL>:cma }m M̨%^??jG"{v{^C23>_j}:f[p~fB.x{ZϊMu?XY+b0auTJ,^ {|r K78F=$'+fUh.!^]Ƣ |ǹQk«p%!o f%׹YK:"(sANx\hDG'dXUtF+gˣvߤ]3 (d{8jFxwF^-ڱOetJvxޜ "FUՆ o%ȴ=1?[P"lh`&̌diWyaܩYU,GZSp%!s0 K\ a>9^>Q;6ïϬ#A3(V "r"gKj:dğmr~Yf_ ,22 CmzfeeB 'FRjL?xC=@\ f\NOV0T,a`CO" nP"ρ{b|{A2M8òaɕŭ$TV9}m[nJ0'0'+8^9Um-)[0Ư\C_ peIA}u>ɗoU_lL xŖ #bQ Tn +v=|ACj"P5")8js_2eQ'->XQt(!ڐ?,+#ťWGw7G;km - `ڬ#W |ahnM?4{PO/GJ~]kP27;bZE SƏaX@"L N9& F8 &7_6?5ڇͭ:`RAhh?U=^ŀh!+o=P`Ssv-󁉍L`t]t0Cv ,ljM>'J @Rb`8+HdL0i%zka]7 Y\W\P?eJbEAc #''^w %`f{yW; -l0!ƚl*Yn2ǻnAѴh7O]Ăi;5U*q ,=^:B W5,^d_? _J)|60Eib1HC&[IoWTe/7Ws8_d>в{9`ӑUI/4 s`r.I5})]Q) hA1q1=aaqc~xeK2l$d& X/.-ݒr"V &Nn l+rW tHEVPmhǖ'˸}}J@Z0O, 9 A yTCЭJ%%@*wjxDh鿉ɪX^\Z: K!XPv@AE  wD+|BԈlF:4_3O:āEK'sh$P.ZmFI12=NIlXd"ImQ; WY`:'`?lʁZJM-(V( s=mgdwd{ "Ѣ<XC]|C b m#Jn 13ccEKy >7ʾTuZy$qK&Eb QBb@d${+RڙGLð%, bwV[:ȏW)O.eXĻ_CtH-iMO+k'Qjo͑'CSALآښ$c85+Jy?"M?]B>]5h/byN kh2+2CO̤Uқ ʂ7/tǜKNo T, bԛet'd_=+ RrʆJLj^j20TIis\ȸ`p"VP\ #=KTZ<}#{tjyă9굿bl2+h[e ZY׍b9ЄSY':70/[ ]-;0[eC}?е]V,}_w>d#oڳIj\ -­b|06/9vt u]jXx+D/u'$X~=l fvƨOVyey&;$Dh"״nVF:#ce1CZ!;;eNzbW'RJٯ ZKՇMDhɞłUhkﳅdH4'OӿDpQD` 8\;j ^6aͩۛC +,:_Z'e tAV HqQOtMhu(1 %?Iuw&Wbݔǰ=uKH+нo ,`wa3Q7O&uP˪.3;dQc%XfAFG`QM`uaQQk) +-a.*J(|lC<# ws6i}jv!AmhwTVkbm wmYV ̩-v5UypO%25ItMME."5,Owhpm pthiK֞m6q\ l)/U-Q E vxXѶB2OXİȜA(!^jV#Ҡlշ.h8Huenz!SS~_s q|B4|׶DB VNXvȮ 2ߕJ+| XA'<)\-ų0_1 #;w'rsҳ/"Vr@˧ 5ee=J_ W0?QgnCW`^+Y,u`ދQigD4 Dj |-`OS:mW[M~"E`29^]#־L;8[R9y.фJcj%ޠ5Gѷ,W?M) +|,njg(H&ȅꭤW=oO84K7 +Xr&ꍗ]\j闉)XtEZS]w`Ӆ΃ô>ᐤ:+ Xeh:+ZtGAXPx#ً`!SضE>*X!LDKCODB2*bQ:-vc:jgy]!G Akʸ vEMCjt+B@KX Ê'{"! Xvc@޿ E]dֶOӻ x¢ֆƓ 1P զ;[5haa_Y…Ltq7!;@+Y i6S5)uOA_=.$Խ kfw:`ekb%0[ie9mF>5)~LbN~{]XTڟ|&H?Ea2rR:d+'YZȂXZ>CdHb}o9E.r.ɫm~˷n{3fpȔ%J!za4V`DY^M1yev2 YZPhO?80p5)%yZ,|J7x8,]?N.cAǬfSQkaY3 dOPg]VyQX5\L,=W9ZjAPLW2d>=x <'Du+)>-`gW= 7,BkAs#L FwzbN|Z?_v~8w ͤ&rC=>}itYwȃmMb߸OX6xNN%I-4"U6.aՁaX~Xֿް3z]K֟&+>= '[J.8/DI4',>k' oRPXx7A[Zp;m5I /2 $4 +VK[B뗓  u@J95`6ɱXQC\;[zVOʼns\]'Ju6Qtr#gˈ_pAcH u]-w b8ǿ7׺Xȁa^qAԚBbnS؀i;w"mzoasX_#3! D[>D0C)6zwXe!{y'R^ b{+ z~ekV]9uIfe22qmBa/wVD:P+,bﶉ.~ NޑY yE.Rdz!;PUwѵ.|5Mم[pD <`1Z!O @,˗wFPX4D[)C(,EY鰌зspR  XwEA7% h_# yd XJcM|>'j,1vu'(qhG{=4hk:zJ))VWS^]rN"p` RZ JT) `Vb(+ ^'>Z$t)\l9nAE,f'"fr.!v E[8avMYq-?Nu\Bk0`e (H1,9D(~ OiuP8 `aL^:4÷` R]ca2·¾$}1ϫrO̭9#A9\oH"Y%g":Ѽ@^SḆdJa#}w;BPǫHNѕR+Q{bu&KSrDz!E0"DREp9.Uvk6&zpBaů@;{V/&9ll`$'y 0um%WyТV u ɭBJssuom\$ %Շ%E)byUՐko IXiNLL6"pM_eHӜ-\hRO^Gj] u ںGYF,Z=`&VA풀!5pC'$j= X1"pN>7µZ f>bhA<㘃9^4Y$b ^/1yEJ.7Jx83~fq f7൸5ܫPj8ѧvLB}k`e UiCv7\]tbNZgJ9@f ͙,S;c'e1; X95*颉RX@O<`śMT({~eSWo 7fLP@)u*B!+5!)'0U~ap(:P/L%:*$,}|nꥫ "X WiX 8D5/|ф?s/Sz5Ӓߙ0n^Nc!2nJ2VL'A20_=`$p"(6 o,]  TE1w/往f*տ-X9X)do`&n`#E֬`,+,#Ґ[hŗeBCX5 kJ1ta_ !40c`W "Zske2x+6{«ON|lKR Yw]:TSY/?Țnf x"Y]\ XSvFݗp=**dO)3NpZ/KQs0ܡ4rXG] (]_d+YJ /S{jphEU*n\|Iv(Rmg `THnΔo.ɶUU/0&$+I8 27#l}淆r%.'2i6d)W*/_lMt,% (#UB'}ɕv-ac @HR1ĆIѪxMH1j>K,{r)=M C9a ./wOXGa}PAkȲ$ː]IjU7Xsl$$`M”DK%$K X*K^aW6x_n~x^V^1,qYwn>~x커YєZ1\+ғeXHn>~eX՝){/o[CX zG:zz-_9ė aEq =p%4磩 0L9\asL/LЄ˙@,&TgdJXT8'_] "c.|̞E82t,Jm4i8hXrEX˺K10c]KC#fXǑ B" I*|0"ŦNCXWIX ,xQSwi8QeLk݉җ껄,Ag ,D"|fjz`.ảLg@H +1, -=T\gZ͈W̼x֌5,t_kzK| We3C3](3sS 40lq a̔heR 61#2&aJRݑ98:˻O^Ma0R@+x)[w׺H,XW,nXGHX6G?$yz}852w;sSL1P#n +Q߱`o!6ɞ۠cjXz+:kz2qɘ2L \UGKT/Rb8T`{ dvkxȕ XjX4R A?|}by Շ,2b9bSF Og̛f2mBX5L Rń J7wjoUr?^>ǵQc֜4mb)# Q,v!BݍĖk@rsNme`q&u6!ŰNհܤ/b.BFGT,`Qn=HK1XWw!DcV:iX[\|ۏBCJi'")35!K %d*:p1]UQ[KbX>*?E(^cjX0ѼO/"!(~AkEʋB4ԡpB|,'?ߔcru[nc*V#wK `aŧ>+>k$@&԰$])u Uѷwh%3άm̶DYsJJFp")R}S[ʌY Xhྤ|ٌ0ʳ$1kB %ÈCy%X8[`-#tӡ %;R}i4d$ FDT=j. ׇ8o]a)RS,*2A,׳v%/#3aXqEN;$c "Y5{;l"xtQVt Xă]UX>EE6 H#5EPMUUtίa?cba O9R}"SXU]i𛄝y^Gl$m9 Em_ˆ݇ҝK#֤N}/Ye-kkZ NJzPkP +} ],R=Xt0K8ҕGՀU]ƻOWKu?]”O.L6 ILXpAm> -\4CeʫŃW/&\Wɴ󼰆°d{]>0lࡹYR8y"|nsfaJ^XKg/=6@ֳݍ5f3܌ĥ M& 4+nmHfnT !3h٢RޓDv^F}h|BڍA!^=ߺI #`}>-ÒuPl]G]aiDS1uU1ʯNBI_KU" qy` lST[ճn)vW*a4PSaY ɘ5%$XcP*fI14CM%l)9qh^  X=Kf0%%gX4RoI(>To oۭVJNzVƞ|OI[ B̏u<ҫ{AZϏ>#`}7*%X>TF%Ι(#sͣK'aC f*@B=XlfMK>YSXjq9~6/$X|MB XkXr[Ѷb3T@t ۅP.D,,$PGLaK$J^J2aX.36z?֫| MW,D@9,HlwiݬMR+(`ǍjyUZ-&|,U.w8ѥJA?%ŒBM!XӰ] /hZIJRxLŝM(B Um,),5[* khE *'1E]f9kbͫ`+{`rFL͙6Pd@m;b9E}//~fZ=XH2\A"x6@,a#n9F^N MypCb;ɔ HEh#'E#doY`'r{|KY" d>Pp2Ih;DD5੄( 5fO ıkP0(%L5,qv ΢}}t/0HC 39%s~pw-Ο6(n;(~:P͆K7TS-"lK4i,gnjYnuơ2Ӹ̖5G zıd!Ϣ7pC//O_&rw2aZzU3m!iȘ-C\F.!U_,WX!\xZ,mhPv{DD˗燯a}+Q| >􄎀vqX[.C[(+Qx||w|uӧQH4 {YA,9O3 `ӟ tm_n;M>4 , 2|E`Vuq9YRXC딢gnooW__`?jE/.H ~ecqX wjIj)B9|n9ԛ,\ݕTZ ~0bCJUVҐW74$ YW,cệOPJΰOYHc܀ }tyLz,מ$Y};S=#Ss'f8@x=ZinlV.Cwb.N:92,k)u,jkrg4"ﹶ4"n+CzRÂwѧs. ma{> a|v%O=WXifˮ*5A}/4rTVҫXP5eKzMkXHIwTC /~`}L58, fu\_^n=ulo"UY,5l]t^+`e,>Wi~h1`5DSpX @s9KL(dSD}r\gyhXBӣ~RDKr đݹ`M;E[V+ u)v]b0DVJ`1܋Q n>܀_X> 3 Bf 3yP>/D  >Ỏ XаT~\~1Ę~nV&+B6g(Q={ X`ڭS X vibLfh d\rPmL$#`U26'C^QM5gJ%$ŬhoI`z@?<4v@83:ϱO 2\|^:VjsÊWvlBYg9e +)ELo0#+||B,s 1)J:\o|xՀR>âAtZbS0iqbv~#OsL*vBO'|eme$^H ֖WXW+=X7ϊm{?.,.3G.XNJ{d5AneY 2 E5Hòu\?‡r'c^ĠɄM޺X&0q 8 yTC.!!i{*?x寤|+,& ȃzSj K&ӰFC㮋RkyfYz;JFWRrb.K%K A C~ʕD)$1F ɯ3wAJzg(\BqB-dk>imR-58B,<;́Xz\Pk,fbC}Kz$5'~tI]Fԫ{ .ō&}e +;ǰX\+*8@l K_ͨTqXLNeI2XG`= qSna5\O^%VdQX5(`Q*'\aə* |,'e/ X("bRէ{ϧQ,r[L9/)5,bEWl(L,&Ex&gð/ #}HY1o((02 W=&jtO4-3OXhp*0'͎5? BdQ'J!#G"pk=, 62U֎ DB *kDw} XT2 YHf"HXz/"^k>V&jfE/BǷbPwakXB V!VaYAq;S؈+,63' XjO]m\"V{2>WcdobX>|ٛ|*<ӓ H.GFI*| إtVD?zA XH| X.쑤4֌2sb25 ,xV`Iʑxe#'Ӱ&įn,Bf wA_(Y᳟ܜYVDWEf0TkRG)cXeY2s\c3.;J?e}f!PSZXYI bzA*5K#SvdXѰ'@G[& 'AL[])Nzڜ`c"ԛNj?{[TXK E< XN(~FU=}25TqX<HAd|k 2H#$CIBݧ6{7`ő3,$Ѱ*; ˒:ax+ _ |PZq[T1k2 ˠ4R/'냮Xn,<)i7Q $Ȫ.gUP ,3,|-$JՑ?w,>&`Ma d JsSݕ.m$oɄv23waw'6ߚrJX$M/:pqY }dr-y< L/U|a\G孌fsڜP\uNY/JpcIhdi5(p7`r6-޲Z҄X$^K(ؓojDbE֜HI[o u ҰlYEhRl]@|cAL`e"xJ+攟WK9JFegKb3}NȔXdH2=P'O  $ p^ڜ1k2 T0 F22;/)Jqg dX8`M"ߞ=G `Xc! MIOі_ {@~5Lww`; 71k2 -0?X/EOZz0GѾ"Fe `4< 2~bTtdXWXשo3[ǣ_U`EtEmuG'1^K-:V:iXFڬr9Կ|&ţ8s6 aXIv]x#a&GvƱ!9e ⣐KHɁ:"Fa`ѫZF(G\C`6#La@tb$DRj bC @J!J2 sAjNJ{cXQ3KlM?,䎏~) ۆ"##k#ַ?'6;W\#w;0bU˥}h,g v>U DV[h70yrz/n_{XI*.@_:?ռpƀ%;,=P2"% +sq}R g1,Vj 2 V*?aj4qz4 טV77u EV_1b '+ߓf XTԶ X2 -^'y7&6+ǰLxdBԑ,x l SX"J]iF71̎(6/_m@Ŀ0``V,kȡD<`}ODbw^r`1c%4l0ۍaD#MkT|X8YH,&r*=fzB"6ؙc }@zvm$;ցz_'`YN6=^ v]&pD_/jFFP @#^&y(?`q!9 G)AD`ImB?(GB~(f%Q'p59EـYv̼ޞ lO XD$)YrFDHy*ww 8,:/RYmb5X)fRf.NN%H6eIVBa㔯>0BQĩA4~ K|<I*&TkJ~?.J1~Or:z`yӰojoEWJu B(g?KJdS> XɁvct r<=`d5tYR<@zܚB> t  Xuz\:V)|,zVWBup+p lG4cC;Wj{m{leK-X m˰/wI8F Ű̗R!Q(,2/Eoal] oǰfa2t l.ex6,0,m,`YR8-x]Y:q&9,d`b&NȰȸ/pPX'ބ X=e&%3$|*tQXUi!|6.;z jSu`MY)2d^c$^eV̫u Z1ݵE⋍kX\4nV OZծ5Ag)21LIM XQXbUbzrR ꮌ.,5,15H/ek2@pX2K ̛A\̔VI:kBS #kVj *z.+ 5,;4Y%ڨ֞TuN5oDWMO* g'kFţTw1=wC$L Xg'WdʥP)rˀ_+ 5,X0WM4`m/ZY]*r83}aI#A`aF.kbXʮrIa?>)XL% jX^ ;K$M1ua+k 8}ʓ4U"r6<ժX XlXw&`5,76k75f6"ǯ`q:Yą߉ *6GEaX9p8`kaCKfoK!`];k6DK\qZXWbyq Z 9ąͧɓ kg*BR=:`~G(m0raO%3 jXcD;Gwtfq V өZk6e/gnFSdC׫cX)'$`y+6꿉"~~%l\G[k_wamETI,;E*{QLD^Ͱɴ87X6NuWf2W@,,86 (咵X-"]lvYP`ƨ"$n"Bz `1Wp.x#_gqآpl1hX D Ɋؿ=xI@, "9DVЍmkeO=X@QedN3 X'c$^]|6%fIXnEtw XJ(Aф̯]H=S@=-`AyM+f XqN̗LX@=o5qǺgmnGiSӏXb!kZ5Sc ]s;h@dX*}H52HЁ$ߌ'*?# Y)MC7:SFͷ΀z+AA&`jU&ɲT;qa.}>lܸE}K>P΀)wYO0nu s)Xt)tXKkRlDBNot$Z*Xs]_׃o5^{NbX˵szKikƀ}n7moe"GBuaue9ӯb=:t=10|fqJbSDr.9Aa}[9u:ǰ^ׇt7@T XF1/n% R4Ǐv9 'V[U΋fG) `m#\nEiyq`#;)_wSjX;Izq 2tيXܜ `B2` XsV1dBߜ ˴ Oa RL NH, ]B)؅:!`f^L#V~BuX/άDGwPU$ X-c cL(t혀\|]æ-ޡoX1d*BE W\O֟WW86̈́A#GJ'oQz'k)fʰsQ"ݨfZjDj6=;EMBg敞Ԝ}n꨹bo=~1ʰ!1ޚ6sWxX)p~c֖Cq 0buxJ+ʪ.ᢁK1b0`"GdwX>Ͷ9S]w~_Rhۊ[ 1" wJ+x X ֐t WNG<&*mW}"/8?9-8,۩ 𔘩_X鸏u/! _z[_~x*N5Ʉ4]U"3<K$DXQe7`ڝC+Cf s` X_ݜpC!;l{noVtD9 ġj}ڸ}HM5QSVjr(|PO&%`Y Ͱ?.Zs%LJ32E\# Sf}>׉ xLgr a= ?3d7)jA`$+z׺7/,1܅r_C#ۄuu K:`bEPL] rENF Ezr*HDX}J5`kgZXԔ V#d}vBuֽpY]tY50Lc6ܓQY96X\ 9iq tipX~wD}MT:L !y (U+T㣌+5,iGHK6Xncqa\&^9j;+ꮧ Xgq*|[[;i,ڙF'nbg*ޫ4j-rΩ. Ĝ,[jXiq|> nR/9 BT.,)c!S$Ɵ4ǎknѭ8`%0o^=#\W7E+bfXC*,Oɓ"RQp{y륀Z17 g{bP, 哨h=Y)Z77BG~BҸ,a E%0ihƓ ƪ} 8ruW` Yd{Y?:KQON^ji?JMLB DX kL oqa`7Y%`Mu/=`S! mY o֑TE]d󣝑X?-,eGؐKc0+$#K಻_LT[L l+348sܜ(NM6"-n-.QsE<}6YP e{:MMXN `qcgX%%e7%\=7~2]o7XkL k-E[` .anAs > XcXjDV2۹bX gX(`ȓj.e+r V`)@:r@O3kvk?bp&BXS1,o  ?z]71n y47~16ݬV바 cv[0BdJH_+, Uf=鐟1_X%k[lj,d)1qK,vÔ+q)!r^X VA{X Z-6bf&gJ7DvL h'Q2%8CP2fMox@m|&7d0K!, t]B`J4GNFZKi,ټDGaL yc 8ʕ?┃ %ł:`-4&+4pЦf\;2V>C Pz.(VrLK"TViZWd92O5X'R Zxh|kk֙i"b%^~7v,oq P31waRK2MQb)΁?[T( `%+Vt#G67͚|+avRYj]} XG XD2FSha: Q#0#4I%}4Na\5?p(eNlYM3 Tഺ$]O/5;U=QvSn nΨ3τm$-Kw#qU 'W_R׈Q(*y&VhjCVa 6 X|\ڃ<5#ǕĶPB.;(Kty2\ aUaSͯ(X-waR@ZCIJ0hSDӦuBb.mH[8`e4?<3 >Y DpRtJŖwE! j^=$rH:Vm 3˼,9Vq;rR$ӥ:>|+dXtjʍ(kl B*HX`^fzj%+HpH3yhi۹^pXN!i `hcXEK4g2>f.!kbc4 q "Xu'aՀGxmaT~- IE&?d`<ےc `)D,`/DR?i~aRaqΐ~59 O2:ر2EXG0C=Z R4dqrzc|3?ºuӰ1d-,3 (X8yNѝng%/;PcXca l 52` _8 3D.[X] XŐJ.}0Cn+,Ә62 䛄eG>RH!VVa-l6c+5LQ?KD %CM>8Bnm$3հJīzAwXo! U'G3ʼ|+)Nw+cXhX)p#M5 MmK>3wNN<n~2Cu,d7L Iun|F[X^z QӌuA]du - r -xUXS%< U_cz_8"PniFf]{\y֎8d*b^0 &x]qs}Sre(C6zǰTKOXո=ũv 8Ofٱ\~.MhEYB%X*0#Cv7w]G8/sF3ܜUzB0s%B g`.-,4NalvwH,Ç IJ-Cp:}E^/돧@y,^leWaU,<Д}Xm)鐁j$E}^&V876esۘE8Dj:X[עPD:=k*!Y{fmG,3z0±cѓu iu%>ZcCGu7f\< (lj ɭϫ6մ8?* `'z5XEwaSGo)˰3re#~!bw[Q۝?J]td7~z;2az)yB4kk9?0SŸ~U1?Czm;&I5f9,B GU[}ø0%Y{kQ%d;BqcB{"r㧞;d {v3G bc\ݠ0:l`߳Ji, Aܺٓ?r>%ꕔa^}/AH&a>ī>v<9?L,H+,٢X qda;AOoP/K3 6!.A~,d|Бb[xѥx5di%w ? d=" `P6V:z1[s.a5`$' [0,Yay鱈\)K~9`+l3()˨>.D*DwN5عlYXű(XtH^;KߏX?nR6H3p&n_&8֚:m*vC:HtWk8枥CaV:K$HezojO'eOi]9=>k$,`-êvsv\v83l,%ŀUXkjbК-fcNts@|J->;Ee TX x tW{9J +Qfi;W4Nͅ^꼢b/©YVzUQ~x5'~t'U,p!]-4x^\i YRZ\ 2?_̌P@g ݄[x+9*#~.Cł9VYCڛQtMOHt3Xf1=OP5Ћ`%6 ?,˓!jݮSY~BEJ XWG!VyCQ,93M܏Crk{zQ]X* ĢaT;uߕa ˝mxX;<(,d _K|$V#k`J"A?}}JǍq+ ܸEN^!gs{";p0\5${m'XQ]0*c\q3֤FRI\fV')K8ٮLTWcMxDžiXH"$ Ժޔ3,bLU,ÍPyUe?QV(m&O֥/XҽpJx4, #{%в}2l>Nz\T0,+Jo.`PmAu Yrٴ[ͅ|[VL,Sh]ft !gL"!MAXEq T{i3օc%Z>D2Z=u}K0 F*)HMY;X>d3CވEp-I0܁0:X70-Ś#mr؃%`n|\= 4W&kNMie<i-aɮ%WKR:UT$̦m!Jf\l%@AwWqr!%A EJPM. j0`qZX@` Dy nM4Vҷ\c:,mJ YQ@9(IU=N3|TX;VF2ɫ "xz Y6)1 ê[uQt~V׋h[nqLqq 0%kJX%q ]ayԜ2Qj˵L7$cAbrƍƜ ϵ ~t=.RGG/fqնj}]L(UĈ$iC KAh p ObCsH K}* 3 :<[K=qeCğ Flx+Mv g<­MNt%^3; Al:(Eԧ૑KA@O_\7g #g]ƽPON= PQ 4`M!i񴊶%͌])VFz7hKv KLʸQRl)Zg^^,ֻ5? 7$EL!f)B&oEjҴ6+;̆'gM"G~(jL6w>M"rtQ\™nb]:{?kբƟ/4`ykb `q[S RU0`dKdS%F Z-7#뛅HhB~\q,@`7Ft$!XtFҡmŹ=9lܰfˮ?t;!/uvo䧧w xeVX3A׶%tظ3ۈср嵸0^ "5w{ú6kG+#5th6%DBmsb 0A)EqM47e M7;lUy }DsO? X碮Qmw&HqA$wⰱte|]ENH|jusp#0ɩ(+ mJp;˄'F+%Kn `'ctAN>͝jVe0XK&5Τ tnוaX_ Vf?B<+΋~,PZ@|BuðL]ԸOM4,A2"*~;׈ Pu9 NW:EOAL?*Xoatƭw ȫ=HW Xv R d>5P= -Y E\Dk!`)O`~y5{iwyMPJ}<`l7S)uT $:9 X[Xv1,@W$őւ6(.put[nxT8t&YB ¼ cT\ 6E5Z)ZnTFuJXD A\nnN*X6kSO`e2&x=L+|D `I-7p`@;2X!]^;v|߄X(Z̓@J3Es}9fm iI49O'^@ X>a%li_K@Bdݽdj,BȄXB3ܯ }{n "E,,Iȃ,nЛ6R8Q#5kUŵ>TW#URI$`r]_*mU@+p[Tr>IYt@`j  ]ՌVJ[>YB' Tuo7̳En2 kmB:r.r4CoH+y0m&!AfR%$)(Aok@!pD8 .bw#ܾ\ۄ$Ek*ily++{G;3MI $yO|5NhtH 0P$O(  xވ8 (dv<[BJ3F$v"65p2)}6* Jbnhh`#K.kZzO!N<&!ǰ$NfٴzUdM܄k2ۨR0u!DƸ^'QB4)Sq`,+WTc%E!#gZ6Й7p6 %ѻ7jR;< {߄4juC{D3&Զ-q)IRzYUw&7@B%+P V`aaNW38*Tá \*˕thᾝ`j .k=\/!Ú!S9|a -U:JcTp;Tь)MFj܀7[cr^Dk`M?gC.yl&SpQ|Ki%U@p&#XW"Q` z/+az^*.&Y{Ȍ.)-LBWDvZMw {rl ,thd,lk`>,5 :/`NG* 2q@q_ ܺ@ExgPݯ7SWMmd\8k*`0q?:$ãi<Ǝ-j /I(Y; Q%MszFh%p eiZ5E(CusbDUL,آ GUBk`J*%j'v !Ra,+\ J \BH^- fzwK2~7hp 6 $i*,TvF5)O&vs  2*cx]jԧi,C`x1Q>JOᮙEv8p$!F^^ "ށcVYuΤGÑUX7Ľ{!>s6dX: h#kh.\fဎr22"ˍfV)h7GOujP(7P1wB{ԥ$`?l6 7o43X:?"S (LlG6EKpAX˕`gpmRy#,VJ=R+LN!2ӝRz!S*U6Q5m)ɩɪDޜ[U ,,1,(KIj$$<u.0NG,U({lk&2xD,LqM00R\ XDc+y>*WT@԰@SMۤQG!l! @A$-@B y gu+ wNJl$rV]|zvn|/ոut̖V-"a%u ֬TD,f]mna% QMMp]-s&aԤx9XTÒ07q#KdgXP#. ] nplDzh|/'xl*鏧())/Qb l\$,Ns\Y9kA|VZGhOW/heX_= h'⇾ H%Xu5zŷ!"+^ - bC }?(@@i)FEJxQdIZg Bb .!d,-%("Hv2"?[KR~bլ̈P>vn7܍w> C[k qH`iMnoR͡=#qAQX' b$^I1 J'xs%bYGq8s )}iFMh_~PlK$1#CT ƥX^>mJ^h2 &2dVsV)TL&Rlz{FГj Xci9^iCSW"$XN 7 'RPJ4X ]@H(t {D Ihi8k8Z+(~(v[ ֩xRuw[wp-^.(fyUO͸\CiwV{MkBQm WmuJ \BaYa,W-ww@V6׽]D? P9 :B@B0 tn'JbѵD9(/:IUT̜gR8~  Gdd/QdYl$.= MkMZaƷY iX?X ]»__ h_ ~WDwFrGn|?g Err/"^ (9z].F`9ޮjQ7"I([{b|F)| f)n38#cL7?$3\m VïuwVZSRPV_0(_⽙q/_ޢ7 ϲ. B}Q0zdG`[+8!6Yč^%'pV_Lm* ]|kIUt?Gh?^ŭcDYX2K?Mc5) ?w)_4*rl ^~A̿~6~/?=S xY/7  ɠ*"F_v;5(V, \H@ɂʠvymϿ|>`>Z]#ym.w@x?G:2_> {tk LUrkFQXYDVwƫ HXdNmV:@x1-PgQ%JO+7k!q&Eͬ|9@CY?y8#`r~ bDzϓh 5Y$vAz:,{uDx$ݧ/ xT?/ZbOi/f[zdq] [Spbz*q + /⅌U7{}H1Dԅ8st!įd=9m ٷ <@es&nu a+ jhOܰ^ `A:!(%+e,x Ȱv ԔqIineۿA e?! k鞺{z)M'e3B\~My9@GoL(#iOXbXt7hDKrAAOMBdOk.Kn]-%Ę"n3^tw#F X9 d xPighNzVX2mYV ݭ{Dd X7[ ނOxfh  cXW/?+?L oݘwf sїz@E*^N96]mq,0tQWVѽG}ֶ˷`eZ8͘ (V0{|,Pc@DnnLbs?˰V-K5 W8 AQ} >m$Mb8 LW X"bC(_.W) #%"^*ē?hH ;5L|h"'է`^_Fwdi\w ayT1beJT%na g J챯VuAs a0|Bi6v1;.!A`Ñ~ ګvJ nS>'n$xXQ&3pD D;އwP"@C)pmQ|5@bL4a𢴁C(l:k^ `G1ی&LM/)q<,ISQ~㰌3aOR,5\ǰ FP|b_ EŮ7oށ.w OjuЋ<.xK(yd b灏5Nq=ܥAs`%r}Zo-zFVr# Xʥ?޲bi%߽C-Kۨi$w$(!U@y `>񉏦_0~@K_ KkgS?gOz?%ىφ,ًÂ& mELLk)X [ ?wJ :\6K-\B쏖h,S$,%(΍mD͜4-[Hr{Tݳ+%#\||2]oL,gh jb!ԻHVm^La9)EFt[4˲!` Lˆe+Q{Xj6׮$c@EҀ gX k!H]2,9v]hd XZg* ǰ~W9*|ؽwC?hZA?!_.?SDW^sʙ ,R+M%aMK偫X2¤u"t3*}GįW.t| D[(AuW;2PoIE),pAl!sORRaҰa }7y¯rSsj Xؖk/A(A`HM M_v|]3}ptd< ;}Ѝw"t/\(Ko Ro=( IkEBu!b4,SA?9"~ g8=~PoD`"EfxcT wd0K X&uIτ0= l%EX`mAVS% Kg% w(]:}w %aa yN BhX/{] j%[޸}D5Mm/ ܼ:),]8 *P̡8,&Q؂]Z5<`c$ N(R9Wd&/nw"K$JɥEOO>P XqS!xj{_.lA4A|dE7ai}X\A Z:XJ}A>bGx*dV+Ds/"Ԓ&14 G"Q"6\+:09r(fOvtOP1;eR%iXA c;aTF ݅\Bg@Fy$ HH܁dg`قVݕP~ri$2 Fxc,n"+cZò:xυ ,aX6/] ΝeI5-Vp`c옖71/a!5[e!}|Bj,8kWqDy.<ܓa ĆsR%^D9/$4"q\e-[!Y\O*PÑ?/"r?TN8P,-Dq>?i}^z/4hXB z=bְ[= 1"YhA90W6x%40y3eەΰp KhdfR8 'X-S K.pZrXP\u`P/D]HX&bɶ=E "KxG o>%\A9aʴmNxs.!a3Fo,<ְd»:2Vlo+Ԏ'zr><1aVx(,$9ө+U@Ƃ%X}8NےFO&vP%`>pl2c':% ,X1,ǓQ_jt. !X08>E>DqXjC(RCt`A]dbIZo6=⻄/8xՖN T qxOƕZʍ j4|kCkk5,r,I%Ew!dMǭix"56z*+>*~$m`IJ }ޒfZO4+a}B8|Ұ`pfz>=g':FiwW⡭n,n% 5kޝWJf.]f}Bx;|g}l|^AC{MjXcNw#.,l}Kv X"mKţ!&'AÕs \Cfi@k }"Vz-Ktː6Oh`CV7*K_D`a,< Kf!_XZhmE=*R;F %-e.j?w2O*V/"Ӱ&BWBVtمBEkX# ZX&{(ubĭ3DՍp@eu#Xq@kK7>ZiwQt}t,A~Z8q0hp=6WLX:T(mNO@~cX&r@*~(`'?Wm6px=.Erw5_[>| -t`45Vz:]l٪B3"+7]BϗkGXd8gy"ǫWWL={a}pG0׊q۞Oz$R=ν'uG$|qR3@= &) ih; XN{Ǝ֓$*(&h;MF j R}BmjaN* v 7/0nT,%νa|V P/WJ@v' |oͬns#ZXn8^VT>E>Buuԉ =!|%l [ U* eXE,3>vu$,'D1%q F+hX"I^8,zW% X^_>i/T'K(>Q#ec $XBr?J'䵑*xrТ"-e$nϕw)NqO&S?SFύ(ca]mvO~&Ӱ@>Qs ^Wzi7mN*sJ$,Xl`QLcF8q1;\ $%~e>_5@!Kl\/ً0g7 aɐfa6gU]ED1 )%JO.rKKh Iw%IeMϒin$Ҟ~YTGI Kt kD3LY?}~lX1Kp_зH*W^旄H̤fz?#a d0dxXc7tdlY!骃zX 0+[.޻m7ZoTۖLYJ$˩1 ^#BSuJ+.NNL`$b5~e  aRCgdҠ$tvtYNJÊ^GUMuPT^ ?}ʃ_2,xܳ7CLg- ;BOyg5@l#zyS$0,b!;+U?P2X'08@2W4C &=A!2_VA99 k$`p݆4x-۠Ǵ#~cuQ樂q;aSJ PꮨDаI*.L+TAO(?ZBt`,P-./tuӏ"ԏVɠ_O1\*+^2/>jI.E7h4s8A҃g,lyƽKKD@3J/eY B \S?K ؄nE%fha< Q?Q74V4DZY?zռ9]iojGW<VX#bDt65WF4,2yݴU XW[XZ2<^c ̥VمXY8{qnyb=΀IIFdݮT@N5ʩAlr@/f=[ǫh?XU&N@x-!īfUdɝzRJ1/hkAifU 8bnxRsŹjKC}[X`iN{2 fs@/*ucYKI5QC7/؄֢ǥH^GupHY~*̕ncw3eDwbҫK8e` !4ڀ¢SV6 $2:Sz!m>[;e~ȉI^>O0lؖm,0zDN=G׊bqi(myt,e{$j==d9xsnRǏw$X wp;U=!&${\\Z-$,g(Ձnj_qrxoҷ>Ypi3'`>{ٟi_AL[͈|;M$WgTTLa℅#x2n!"L2HZsl>]bv8(Z ֕! ^‘P25݅/)5?Yރ j|^lZ@w7Y5!A4f] t]? ',;C/ 5/ܪ`0pDFEުE5kX?➣Mm$u~mTKfo'e`\.wMr Z Fg+ǚR1t c%Ȫc` +'nf!M"M]&rƫR`-9 8 gu"Plh5՟!PEP%wݝ"az"i^`WJgOJrn %)>_ .*T݉{!:HZLꗯɖC/=q7qO hCod@WZ175CيD^%$Rx Y[j!(Eeӝ@ ڝ b7b>{{ƴg_:_,]`'XW= 4<OvJ2\gNm6Gwb~n+Wޢs,^ރ7ic7M'CF|W+o[6PMF'b iOL_)h ~ZMlR}J K٠w(f>pqLj0- l hFjnӀ(,"|K.:Ǭ="ȋu/F~js#OH=v7rz{Sw|LekjS'{pO)Ri 3  ˡoᠠl Y}ǸΦY] $[hY QX (}@^Xjl3z]Y]z0ǂmpGDE 0n >%!r:OLqGۄʋw0ڹ@qcsPXDe֔M߄.-{Le&ܳo\+yi,U^85 ~/wlE_WԐJ/ xy[C7i|S)8+\ ח~Y@EvVXlTꥇ?ĜMasa6a֣HL.Ѝ5PIS5zx!@ %X м(düƞ\22aB/լh 9./;ݠ sV]ҍg)$(»lӬJ52dwt'$k zkKsWՑ#n g9O/]&Ү%w` )gz*Wv'32Ǚ= 516/J{7vYk+@IXj0jYF*hҬOⵘum9=uG HWi\ТBao|ѷ/BRJrWա:8S9`!BS ڔM AO\bv#|܆,d-592:hշ n޳B~Q$a'`jOsL ySVW@F{FiYop"1`ν! VE\ ']P"cjox,]RL||XH FDK*ի  =EfҼw!+Z*b?A,mƀU.ύ6S`nKy*ۯO$w?l><|3 Kk!®1gxW͂i:]MfM ub E-Be*]{fRJ^KۄfcH:p9Ұnub&[ciUhbv ]{ AGFK?`X[Ê}^ߊS(B'' Uu- [՟a|QU8~+wO%kPm jA(b^f!nVA`9:(Rժ;bb~hl` Oš>(XT.h$}Q؉&W95Mh1J菹,X 0AX!1/,X߀hf$!.SqR)niPaЧ >c:Y85J)Pelz2tv-z0,l K/؁M fԟgMHAgda;`=3!%[yS/ʀbf+Z{7'Aa3ɘZ@,XslvYCAQ0<?%5zB2yX)s4iRq Rw mB&3n 7"XrVb52r҆n&hc =#ˬ*LM$-.zt2buofFӋ&C& 뒌ŘXCS|.r.zƚW!j81NjsP389)m)-B%KiriHTMewdl4 SYhJ_ш"G,F͊u&6oN>Vh \KEai_t¹iȋ{/F.6珊UUYʎ5|I,̛nC2-d׆G }P3/jJnҲ+jZRWݣ8M (,(';ĭص*USX lBq  c}aX q;X!XY0zmB3sl;{hkVgHrE}?3 !q, OZ*J*jSӀuR褘*ޢp3RPMrF+ܰC)\aQFb2㟷+1Cbj!hY!әCt]jElB:WcPՍ])a2]{s0` #]jWSm_}xiPXb5TT9T 4$7LBE[2u ~],,4bhCBnc7CCG% k6_^hV#`-?u'%p^)Q8p{^'K*OfYeJ7e_֧K)n*Aد]33]+G !:`iڅHT%5[-<`A=e;~mfڙ0((aŊJ𪔁"*fV'Ws2 +@>]x|"s3M3F _41_]~xpRDhRcF- T;]DIU!B2wWeH 3vx ^`G$#u_6:n"\ Qw z6Ԗg_c?c=ךP![5](˧GoLj+oKj jPk05D!9R^98pW^qڷGo<޷0n7 2̖S;2MǨ5"7W`h !Ⲡ%wcj5YfMB2şlH4̇aX,qQ+bkl)lRF*61xacrQ5 ;(v4?b3UkhXze QUuZعYvq/`U s/a7b:tT E5t+2*7 uuJJjMewffJ5>tOWF ` YmǨU2,T ^_N,~& C:{uRjQo6)/9$ߝs-(jOnPfEq`eXa F )YU5;䛠X-|(5e#As>}Vi~[/^i ꫂt-Pj[OV '~zk'k]%ʢ(nhƏ>&t'l`;P# qҾ_ӒV$GCLX?X=lZBq n#3z)Cv}wjsJiC-9[ r~.>P[;icY؄Fv/mĪֱπJ[brX$v&Ml<`ZebA#Ƹ.Fԕ8^f\H4~ `uZ[: F]BnGvZ0K/g}_mB^X({OOCpi4|l7rN%UZ-"`cx\,O#-*@|3{.`z!  VaSΗo^tTJ"pc) f+C?K?Ҳ{""Ӳ&i׈J+g@z?Wqo CbfzlBnpͥr;^=_vb9FT#{g'*$s*MZnj6HMAcjKO9>8>C]&blBEɔVt{ۿmjЙst)?b5{BШU J&sa[?-q݀rc+wf'cԿcY1'5Sޟ< |+.0vtfܭEh\HU h`a+5׺ q I|UivVþ mW1jM[bQ70zdpwa@YRzp4z: #t[sVjmWr~g/]ZաBԃzM e[-YpnfԸ!XL <0, d#p1k/YtAHcqsNS^М\8i^6׃)  ^V XpţkkSu_T5^49w+)xu7g`mqļf m$wcj1R92QC+ Vp9Uc̥9FAS9I)Eև1UK+}\owhS5K#(VΟYFiFId憷SX+RحyfƸ38B`iJInWU]j:M]֦cMߪLdLBa*®5Mgw]SZ2;8!z-vix`!͕,ڪ"}1 rkKH8`6 z)VmPnA8#P3)zⒹwpVx4t?eGuBs#2I7}HC8_t:fRX-&:'K,k/o_,5KxUeƀuٖ-X&״DNKzHltjz dwE-Bæ | oi(2솇YXn4 ,yg 4 ers=,AhR+XnވTn3DVSSC/g,z!Z5EPCcFu7Q|s ` ^.k?W>Y@{jnw*%vkK8Lk WM]b]o03}pHk&Ȣk XbNQve$wGhZJ*KS0(.C9$(u45zKY!d]Pʸ9U˰F nbe %!B/zŽj݅jbEJoWiB XQétzd7^&1fToY 1piFRQx!ս|90V#mqIf*p$kVIN_7ዕܑMtеZ>6 +5H~Fr/#Mclش52kU  VX մ-dI+7GUmDkhc&(Vҡ\ sFt;Ք;<`m"ZTQH"dNՄ8#yubjMũ\]^(yYHYv+)X]NX&a XHXIdQhl fY5cm=YIa7W,[zNð̡g'O.5e[PѵTTRż9UX1b]lmLXCW(fg2~,+z6N &ȳݚ5ܭEM8%s]WF2qw+\!v;d4jjZCEOiV<@ J)-b=NhjS{{;GMrUb Uϛ;Cw;/ "(Y?/zOzNe Z:Ӄ`ϼ`!]UO恭eWl 77suO Xs$ (U:B0l2pA0ދNXqs65"  ScqSPT ԳsO絮<_'eB,"x]"(dFͫV? Uȶ]=oT+3h^aUKx`)ͧX<)Sp'K%VRª`yesΖ4=w췝?гN _WO0}Р{_h~ c{H46+'j=0wx~<E{xP@b\nlse ݝJm ^%Rv_rz]]ՠak|.9WXb.rPpÊc[js 𜅛r=;Bm!mVSNu7lB{>t Jr:={@0txz_Ơ-J*;ɻ:X>>~l"0}xO4ږf?66l ? erW/Q_da]*^+s/.Ͻ% o g#? 07g枺beC+Pub?QRy83]ϋzE G^G_feԘAOW -Bۄo.z2XI_2xe,c!) Ϡhyq<՘dk6P[XO擱EX稝]xeNa=k,37!= Y+%mԝKt?fb@" ̰#)Elp.2m|Z3=<|.xԭ+{P8c^ '3S:o{X2&ЦQ2LwePPt)K1hMpm{y*mC~%gmҋXՎUP8~ϰ_ڝ5ܻH Oxpb3pTm_{C&\edVUjVh@=Se޳5d_|MgGM޼wvgy`ϝ?FMƓz pKWEm-r>=ěd-4[gyK {@.^K%x}&aa' 'r2 H_LℷL|U DnmakZª%Yow~xeT<۞ vi" LH)&|zL ,w2\֯V!N Xx]$jay_UMhiM1sX=EfNb1ox!2,y~<[*^&K?/+-24m6@ݗj`Zu;/%ǕŋWqc)-Bo0l֤]<`$7bXRplG4,=%/;fr&a`t+a54Zm N`}&!qq(OUa-_CU!޵άeД;qe%? ܛLBAv,IL<@ AnAv S ? ~NsF*Zby6,OXfr `YܳlQ8.&IY'ܣ_$h 0,ۭ<ԕ0<3)d K; Hi/WM#WSlobFQ=ޕK@)SW+s\AL*|g&K䦏'aAY.PL?,֎1T0xIe'@p|+61pȰޜ>*aXn5[IW;4,Jz~OK*{,5dN )2!=Fi[Ὃ{dq~-֥иgS%{7NqP"m{QSԓ K}#deMr,`g$z4V踵r h0/qxZ㵿~$(S7@ z,CLXX踯 6|ФI6х`a3a<s [n~>7Aa{'p!p87(bmKzڟ$t zFX4j:T V,ͦXȁ0ɽQ(C9a3r"%d7v/Ǩȹ'H`pqgȑ"+`aq-|Z/M=e#"Uz3$n`#QiXg |݅G]B[sW,Q9B k+*NNRk4lU]kkVeFLf 㨺if ˖(X 6O2s~ v=`{"]RZU3?C0Y|:be~ Ȑp'YwY?rvH[aYO==92ȝ_ /_MdȰlkCmf QGxpˏD2QѰL0@ԶbC0b獸4H6q#jgX7%[ֲ Rlp{斛N$+̂rqA/5d^CRw8k傘R>`5:ab;4uk\ U,^Sw%F`R1 sdٴ4;>Q"+eP2E#X08]VnoMwOq#؍!`h?q 1#CIVlt8|M7o:݋1 "{MB"Vյ:[(bßiOJA8YJ?!úY";?/X8=!HLb|`V`X?B1S9hpSwT&ay:#ȭ7è n=%*G:)ri{=Τ ^xɈIx (4iH]rv Xo;Kȁ9bot`.GO3%CushA̢;BGE6=? <YXPq.Kƴ,sr^>ġ66E 08]FS xn\y/ǗEp2s觮VQhb9v̝*'ݤr` pxTBXC9>#j lAVl0!2 6=R Q]u'iDc"X MRh QFNH,3s5fM*q~Vc\^וQ)vGynXv9]PI%]݋4Q9`(bmljkO0J C,癀B =>.9sDٛt=X۵.zW6 # qԃv>ϟ`@G;L/X^ϯ G;&8 OC$F(֍`uhX7&NM'?,kb$6QsrƬ8vU%MWDQ'7;6fLQAqGvHXx\ ֈCXn, oV}q劯 A+(.vOX:6#fI{}4y;}W\PH'L|Xz )BO'zQ 1 %a 1)'BB: @׸p?bRQ%K hg%_bĪexO}4V Z䞰Д Cݟ$2o^6,:hXpg`g޸TY\XBZkץ Q3 *6G&֡I#*G\YφۡX ). Vj `c8X='a`< .Pw9kD67vt=%cbqoaxGAmEep68wѽ"R$ǻtt ˿qxղ,H?Rʖ5 <6y#Cäz &K`, Xϩݝ~Q_=MCH<􏾇fafzo)gAy`S Ǣ63ʋ;H8K^,R8?;6|eJ3/P>YE.!\wQumnoXN"O9p ¤Cܑvz*J KP&ݑڸR)&hraϝ[]Y,D 1 /|l=FT뇁8Q>J)| &vdXO$'j!^}WlT #Xtpӽkv t~}f>]LNP9D~!{F[/}6`T&Cs'q~8`*\h#U|#fĢ ޵3җ-dz`Үټ__Ϯ;I7O[ B5C8uO~N%G/bGںvz:'0{~=m6O fw?ͩr~3ؼQX<ש,w"6#6ǀeRE؄>.t@҇B>ٵ]6;O+5WZRk2UT |w.n ♪ d_!d]*Ϳt\ށ3 ?Pp=dLI70߰TI.eyY('1wz/-W&<ѵ{/Gh/sXMg4xVq] l:w ttzE)z S?$oW,A "cm  8Ƥv/\1L"۞vi?|EҠܿ2/oXTF;qwuLMX7/:xbN4`55J ozi?boz_C:flAnV[ E}s zƀ!5sk=Cc<W!Б(i[J9h> [x^jy~oo+UN}tNw M_AH81|iS4DrCb|w.E@GbBkeHJ[ܜPm]5tovoҁ uPVmJ:R#[uag;ߎ ٴCrYXK: 6.^^whG P(`G鬠j,/,Cwp6^`Dk_)]]]co  K5". a'?f)X=Sjr̛ʀeV:ixg5HHBPC R`*V A K֟9qhGA9nѣMz'c~^/&,`hLȶy,팱hdXaF[WVTua ?*j%X k*R[OmeU'1h,mg, Ka TE&V wGvؿJoU$`fRQ g G"O/cxw)\ ^olߎf`NU Xt&Ǿ|55`UJoYXLmFբ*[*uSBO C B^'{ߴO"j5aMA(Ļv@? z =#I5QiqcJLIxö,U#(0cOz=Hqmj^}`Co5#p[迴{[MiXl&=| 2BO?v*gwk9錡k5X]S.divrCDL}k(`MReEUzm yZF]B$`$(Z hBqhiz=l? n âk[>iZcɿfM3:oI!7;a/ٯ=C`?kt\i `5MĖ=rSX[-T}D+x=`=B֪΃8~rK1ލKC힥k0`+ [rvW&{T)qTc=I%Ԅxڐ7^t'Ծ pRR"ѽ4kXzGzήGvc@3ڹۈyI8'1TKy;'#?{1`)Q/ aBn,\E8V(j@jTuJ^=j7C_ݡ,^5|`uNE8حAvwoGb=ī~I ↑P3ЮG^%V’E]EqAkt ԰_ySZQ` P#*u9Ee1mkDK0 l3ZS pP ;(IAV%n@nGA$g;柙ssɵJo*bYJh[- ShRk- ^X'D8;wtTCX[hZR `O޶ %BX(m+Ө~-{Pu%^,$YpPY}+Mת 72ʛ\j1؊݀.pV p<loAQS~+ K 'ۃRo_h5cŧjcĨΪ`I y8:Pӭ +OM+U]N7ID~w҆-ZnGB:1S4k~** n>G!rkLc;:<%FLaUz |)Ryw_Sp8.s;1DE*UqHw`&G$/%#`qZб_)*}ӊ u^N{1I(v9EQ䴭1nm(RWU/)Bh&[*e#6 Aʂw<#2Q% }MJ:}jKŽ[xugkcWVR`#KI wWltz #S(Ϯeakb JSQn,ՄduxU4J;^TlES 9x@ q~莻|=6qZ$2` nȩ91u V}U-Xx yu!.3r "\/[oֲؓ`֊ⱉ<_9a-քMpji屐 XI!Y~ܘ% ֮`ugטyf*>T9G=?2|j(p|Z,>q27LDMHX]omQ oR?U?U͗QY4^bUcD/g f+g趹Vy482rBՊ5%_^GOBCo5%%gݜcX}ޣW[7j%L1vܙEHT9'&D*k4 Қ:(跉ԅ,`yJرpQ&iXjZ8|W^$r`ݜgt\CV@#yoI>X͓oj /GL8ߜc"='ji:!f6҃!C<ۿH,HUZwXGq+pMB(,- ]I5]E>ݏCOX`q?*BTGI5EoNE| b~VHE5c^\7InQwՍ&yH E6%S:.h[ 5 KXeQXetF!+Սl?dG,29S&AB hJ *ĘdXj'vj;d卵e;X`X ZtdV$m@7Rv )[g,kL B2: RoC k8TxEE *H3S ݣodXN t45=EM5*VX†bXZ_zr <;9hXsiuP* q*B>jBa=~ckCaDxKٰSri2E_Fw`i8tZ3.Ng 5WocsM >R7f`Xb6[H{X3LȝXa;;2qGZ%wko XR9Pc{Ym FnMEzV `1;s=#ld6!;dk.{Dx0,U\?&1v噠DESհ$UrjsvHۨY놊B L?>?ڼA:߷7ϯ; fwA'M[ *Pui?ؙ~c8,2Si#M3(V9j(d BUfhed7)EWyRńބ ,/Ssa6-SbIƷzC~xzbY$\pj| KA6z(PE I(OwQl=jx>R`]Lĵ\2nm>婥8q ԥalѽGww|C;P=QˡaR7 Jo== Vc/u`fĔ,C*xX"/dTɰFmD*i]&`Xhl/TiЄl"tg VڏW Io "?R}1\$}X<}G7~Pxq&>>=ۻfNX bTVɊXޯA7m-C֍hTo.MXXewUʳ3\ͧzhwbUٮU" qT<`9s!RV ء9| bct4=#\iت`X I \Xn!צ[ xzǘ a潭-}rgIgg3 ϙso6̅+:u*7O} -t-ٳ݈?e0ly`%LWX*gr Si)fzw-fkj(yJik+!9<NlmǗ_OQAyAduA;"_xX0?זmQg(:/<YhoľO!ŸTM~"Ie9XT!n!l_Y.< z/I?,'6=`yӰT*7*gbHUTx}tKwr:'Y~Uv'nqUD͊/8r-#b6uBAcÛ@J B}<'jڮ){g[MfmBWduGxGlSVx[Ih< ڠɰSז-,qcۛb#L2% XJsgrbI>ßMa>` e?!!y D%Sij~e3,H宼aamgom%h X#K%k(%M;5yV~`|70,0]zɮaHQ_hdhXN'`Jx`zSJaaøIPgA\caQ29 |L 0l)눆/i( iX#] yNyѝh.,,DXVPGl\5r_R\$k ' 8N7^pefiK+V1 ; чe2M wѽg;\/A7@M+]$_M^hDIswkᏀj?흇vʢ8R_{sGe]m< N <* g3+PK)S2`l('J{{%$uqe"WðD }0.莟}8Y7-:n 1#G |M-if32(J#?4,Xl3yK x, Q,ࣅ+rxU<%7(yj'kXJ.X(Vįsx7wm;`/iYԪ,O4&XlEw^BzgJ^"v=wV "҉UBQIɖs2g9ؤkIV#f7:a ?Rt0&< s K ,a& }fz]^I]AÖ4,ϰ29P -au<߁3<-6td5ہU.<f~׈G=D{mx`s 0sȗ;]2`E K/\ zL> XH&#x?%ؘ7rajBH6 n5{X)ޤj \i!+VJ KbXOÎ-$|(XW"2p*. KDb@SFHfh1'kZ۽<6ϒ(HB‹gRaJM”%>!-"yWa8HPqRLM"+`J)/-Fy3KǂY1"Y<͚aIRz* =b] \l9;~XJh8@JCV'GD^S~3*ad=ia -]6d5,ɉ`gNNW[8W$1 6ԣ 5hX93ciQ /'g2ZN2:as/Sco Ah8tѰ5 *D>`6 [` bA$ JY)g?'iX=Hh,^sHrMlGi;O`bv38oH19S`Mϰugf0ȫr7,gIHG[K%NFcvj83G=Y ϰ·~XHP>CkjLJ!͚lpmӊ;a_!ˈnu _ȰdE|)HV7T0Sgܥ5 )C5,LNJ\h>ቿ,s6a6 |^xh,1kF%({ P!.3b0($7(M"{?x&yS~LrN|q(߽Clj>A·8+b]9yP.Zިnz4,uD?-U+R yܭN]x k @#oXieXdUɰ!+eQpm D&`_xA'= VRP-\x }4\I$ۆ#VEm4w29Djǭ:;MBu؏9#Z"`YNdۄ4L9?,#fk4x WsNX3,b 0 V{xquQ"G؉V dl~X(u+8m&~&Iӛ8[YTE˓4,B(+Y|E5+n5 VW0/X$>`~0` bomӰdp#)Yݪ VjC>ZP%X3VIf4/+5jMҰ ;QthGu ѥ6h5b %/P&DnqP \E)H[acRaDCʇS?G,5VְUJtsB?,sF!Z;Wf F/!ф;sI%E J \ `di =|Ka10mˏզa evo԰4p#W&/XAJWٔH"W(&ò/l9oV kL ܇xU0o9#\EBH1b:,eՄXM kS>>M `,rq,<+(VQ"I 1@wSSm?,q{Y/o`XݭG6h3-OieBvL b^F1 i+ƣT= ˍ([shXdʬ"+eV'#ۄR԰FB+(} %$ ,+>EuPoڮ{J)Cm$!_&&2G,{_Ax=jMG_l}h(^X- $G)VB,0꣐1JnuwHf+{ȀXBrt {s ooqdᕏdsbLs2e:smyd 4vx=ЇKlËzd8G DZ"Jg&N#`bg9tЌ|M2GF3vk4:jX{~M>rx{@+$ ("8EϢ[\ܘ^Mv/Zq*$He_!VmqejϩTmo4blϟDg&dNɔ w$]^or{H`Ѷ,EU1Qa<!Ihl nUczs p+IzyuO-}BK:za9eZK[JbiX7a^tttbuZjt|#tjaɯY8ߨXU6Q[{Dg+lXP)IKV]"@ '~аhC 1 gr}%]hXSH%0ڴ1^R~_lq>SXwHCVnB/C,) 2KIΒ~3缘}u=C5,%*G[t>)>] [B_pxɯ bXIY `j-P:Bjr!2̕S?;G(fZzbOBC F/a_={twhXhԾڠ!xQ;ַxP=fKڊv*o)Մ,ӑhx5e7n+ w!=XE\ơp0Xn,~L^Ӗ@v]>o/@qgbvw)k`i>+6SlBo0iY>ނٜϯ͓}6;tA^#'`yU, } ҖX :XU=~yrVYBh7A@6?~:[.Yo>{SfE0qM 3͜XxE'~Hȕ30'Ch;bsZ-fC'MH#M%um+ |=W&;7XκyoOไgd-^}I?,V^(VP "%bn5b~K`]D*)[r9WVXw&@y]U[Z|AU=+>" y,g`>@<%3=`3j4]Vz)+P gqy7|-`,BXPQ tԲŗNmFP~߶c( :B![ R|_gFrb'y=oR_ϰeo_Cl#N޲IT$zD2#3U8 C.WհDdaa%Up, =EUëX"vQ¢>/#UroRW[>Z`$+P xui%sC3nX D$Ê0?UZ F?$^ K-h7衃=%mh Q= C'J7 `]+S5N&]XI|щ7WH9:y=z] ɹAxy kd+冕ۡ-T؎x1>?uZ ":= nױ$KC[°dNJ(F.*zk'-v E=GdFXMnM?%(v2A.|wTKX0Mvn-W;u ^ic0 ede]$'®u^jq-߅Xq,d}7R8wB`13$w%Ӯw XcXQ ̮]h40ѮS!O>]"c]fJ]\& 7"`]IJp'D΂$͏B'Ǒ ?)}BWbe|nBW"`` Ì'D+c_z<$.4KJ ĉH!.1!Wk.s<_ޣzVb[.ȫ!}BW) w[Gs9.1K+ ^?t-1֕9vcAJ?ڜu֠%_ ak}2Se[@X~;b$S^oc9݃=P Z0H.O~%Uh~92vZ f]8")<宜=HfߖB2 ll aL3Zvcng%L :A̪H斘XXkW e0z`v+feg`vn,Njn8(ڸ PI8B6?1߅,˯Ԕr&\ަN/a,@,sGi+0'ncP ҕ2`I 9.KB j_˜Pņ89bi"^]Љ0zV·El6nX \8R>g A~ ݺcTܯ'`]q@] =}ҹesT^d᫴?3P y)Sb9Ucβ sgɫ2,Yƪ;+1ۻmD Ǒ2)z$[ &({.[B>5aʀ%X՚R %2%ܐ]Iu[cbн-y9]9/mOJ(dWW,*_hQ1}ux%]W azk9M@䉻l~LlՁZ7nq KJ=e~9QY8k3&⨀X@XF&_P[0 eK:(`F]DN 2߫bq֡4ch2b>S\/Ĕ26o$L V_DW,tt۪K7J=[莃p7b.NYf2T6IpNێF),nW,Ϥ{7 i;Bg[Ǖ'83t,>kAʴ mWo$N+ׯ'A:d&YSA-WWeFR-6ѱ1cYdGDdGZZ{[xI-#4eU&Tl䈧VVP W8ɥecUwYh+jVtgb Ba&Y­UW(M DԱ+N~7X2* JP&ws33ɺUh\wq!CXBw2ZxuX2b_1˸ֈW4UYLvYp&Y@-TWeC!U#DFHV^`HVar4$E(s YɺEtLW`R$<[w>ڎ OX9:K9Fn(DOpco0]\݋ Oȹ-$+xXqہW#Bw_nl^ő[@mO, r{~&K$,e "|h揶śutpX7gVhLcڟ0!q{{')xu]%>Ɖ$>^ݠtǪ ݤ^eG#\ˁ*8gTH Kp>SMgF@n* ё2^ WN;"oHk ,dgl׺s7RjB4kmE"V͐$9n=^Ý`K83[!Hcb]̩#T5+F;xuM„UXw 6 b̲Jvp5ϴlPÚtχW7 X5bpðLK3+;>CV{FGz''^,wvw;`nR5xF{09xn.!e͐U|+W#WZnJm,VcMQ,'ha{2ʻVXvsCi g>PTr,_ *>QUPQ[>M3EUy۪eb8nӡN(aX \X}sCzqa)MTA <>˒NJ} aH3)Ekw%\2¹!=ωWX *3'TmND;[` ued@IG3׺߀pql*'ūOX##VC}t@Ŗ$C;a8hG22 m@q(;7ij&1gūX"*ׅ;5U7j58TYG V87Rzէ+X!clp8D)2RV9OT lC;'2M(qnpC+ݾH@0 #d4IeAڼexA(]'\FI dsxIk,jrG7(Q#IHilXozCRi."WV2lόWZTDG~%K#85Mq)QŎoؑ,otsudl[0MXgp:؂J:VeՉOYp*·p znP=;1dڵ_4؞j熵ëJaaXCѡ!h7oqE"/ɝy`I 6uXD7Zn` E,m*P}E(8)l̹AEfGVʚc;-+U`& tWWU0(6?tk#Grdіw 1++ud?7P*dMBTbc/uN񫭥YE?]hi؄UXo=p٬[@ fO z W؂:(kjCX7knPeTXRtx VRǪEBҠ# d|cgͺ9| h5 Y(RDcaۃk?-ln fAƱ ;hN{)(O3zG^|{fY-R 5cA/wڡ/#fi+«Oɰ!"yOwlCkM".0'eh5M1=YPId$Xvl|gt-X.iyڌDFvwnՔȸ;MEzH(I'?/` "V"$,R )s&ƯA B{!eVJsV 8tEQEidO'x:6iq/L͇/ Zu`; 11E(ei2L?aMqӅtJO@i_KC0!V5f}MЪR54}5 bkOΰ{V<%G#s A.^/X) = Uy;P\[ ((AQbħ?I8CV֏Ģ.aɚI5q]RəW ս%+X,F]{p$R~vV& )0F )δХA8r5bqsj}RE5R{};0m/>X(+ԫG+8otǫX0%I2^ YZIRlXUvr3t)(z&f>еǫ/XI:U#DH 9 ],*~r84Pk]P< diOZVzR,@ң5`nu#._`%6TAD$`8QhKb5}w&"Ъ]ngN W U2FI G)f.5ӈ X_`%:H~I*ƟaEiT?h#Znm=CNd3U,@zpI'K]u}r{jn $Knϕ+̋V Vj@E~uejodUq/Ӳn)VH)lfb*+IVc&:-~Tؒ IhfU[Zn{JU3޼$HXb/PIuQW }BP{Os5. VU C:Veh(ִȥpjEL/KZH=bkO^?a!2xeLœCVCd!Q, A7nSly@aWz]8\v`OA+83{UPߖbu"՗ҰTe^r.iRgt XlHvU-*ٌ=\+xfM=O}xRf kQVzh(O|?IurumS瓚HK3>[!b҈$8ޖ$&FrRVU__BjX8R/b^t4hP6SZmpuO!V5CgAœr+ 3H'J4jICso\yۀA9\=ψZUWȢ3bAX&nƾRDɄ. Vv 1hZQ.tƿ:VFk L6.{lP+q,FvaKBX1PMӍ; &]Vs0+wGW_o$d|(bkȡwont`Do$f(VRIY}[io/G,l^YDag,R^ͶK-SZC;|eV*lKWlT1X j[uHeF\ǥ/ X m~I3a``P& X"zgEԁUJ X9B8W;dm}AS!,iҁM.78 J.,_'[扞 3u&yenf~Ir!UѪoa,,i0nynn5 P$6PC7v&{#!v]2/a O9MfVmOUԢ X;!|/E 1Ol)m0~U5{áſ FpGb \Yu3-,8 bi}7l/k~qqo:@@Z"LI{mnf:hGpJ)Vc%OVŠȋKw<]>dПoW-ݵc|AiN| a=&_X~Xg .F6J*|쪳(I%*UfO;rqө:ρFv3!/2 ,nO}r\{j36նB+c>|Groʕ1:,G7S %=JPgĪ,Za6jk-%m4 e~}RP$7G2 *aáFVhotP;O:9x!庣.ߌCQGNʻn_ڭu`,l<[\BT: Bl~;R_̰5hC$qt<g9ZMC᧿9CsrFC=0yؒO ݎ0[^&?}HWh#~ ,*̧Z.zBso8 ɺ&%Ow xU43i$0Sʈ91hu z|?RTn۸#gN.xm+ Y%(sc{Pɝ@ ;n$y?x\IC65eg b#v]I% /^F3fa.0J'YՎ=( kFa// 7A=z0~%0\DvrY1LBmZ]||x\ŋ<W}~6r#Lk~_^˹^Աe&~}4RƙF흞y X8r Yv6+0+S >cZ^Yn)*B*wNwkM1> Gv8qVV0IfhqjzG+ &Dқ3xHs箉ajeV8c6jIeLK/rXx>'_nCI؀dY 55ӜP ݞ%KSjUXeΙ%R$rWR9 Oզ|ۿ\}7 ֯u(ū2BW GfPă&X >,e.&HgzŶ@IX-l%BTaay[Qj C Ƴ AXB,"JX ߏ_}KUpp6tPe7U3 C<'لo n\EC #*}HM##V;ɺߊޢ/n+u޵4[}T1r9b;$0Ms*o X9'ñdJ4ZEdIT 6 -C/b->ܹjE(a!"b5y2g[:ߒ_}Wpt% .<MV={3h" glP%s,wmM񆬃 0ĒVgvX+G^;%%Y T{CjN2nUzLhCK6bw+XH3J*tߙav z.I0oBfAi;)~qp6_̮BJ`9o>YgG`B.JMK蜒C1썽@ ƔrIZ:*R77Gد MhT>&κgkPMoΰJ$s9)dVz q߭Jψ9JF}ɣSjlBfӁu1- uC6,rlbF?hjg?{QʊL0ѳżG nD&gRTK'TW175833@id&_;ds~AҌ[~G]0E5 sV7StNU;X#{ZJ3^&Y!1b T VsJ[;kZm"L^kշn*[ 6{PӐVW3"+V:6[g!?B4nUSY vLB`\S<ȣ*L(zn(v4kZ\mW3`1P YMoD,_4deЖ27$M3`eYüeB3̩aN HܭY <԰|cYRMKpWz3`pY}OO|)s>f~ {-;}H:ǿ q-!a#)FG)eM67w>c4TЧ[pB \Z=ppBm,f|jNJ /_}'+3Ր0WܭAh. 8hTqKX%Xd(*&̰*"T@S'HE0-3AܹA ZTw6e*XTrmBKۄ3`մR~$'&S[-xafn#FkGqݎۛX4`]&,%e*@Q~I*-nAn+HLKG{=MXdr΀UPRȒg|&Z\ d!+|oI&89(J"QKU3\Uϱ3`Q$Yݾ0ȣ<4ۉIgk6aѝi1<:^R坠A Pk'Ufjfk~λ mUA@=$ly|,xV~6r즼3)a0W0g~Z f0m&W\3\5M3*cRU=^\rZ[X(%Xto{ Wm*r Un'3.{{$dU ܃.!omZV3`U4X Êe͝Q9±5? OwN'!1ւaY5 'Hy\ae kjl}3`57Y5-dջGF~FԪ5R +~+\߲&c^<2VM+E԰T[Xt lcT'׸,+օb-T:M%}޷h!PYHVk&K͸(sֽ V@:mHcWmK9fކ2 j7wkM G1_d/؄E݋T ؄3\O'gUH[*HVQ9P%skA^,ԙ\+ XTʤ؄}BX70 G9m 6&s j+"W3-BTq>JI5\{ &x.R%ڧ*22`k q  )n BGZ\rfV9.ͦBM(%db^֣>WjlgڄU2WZ+lͬ-{InVjz/Pp!b(t`6`';g[:v^7ퟟk7Rl6q>0}X-Zb8dI Vx܍Cf>f5BVmD8*$֜95֝/JJTr9khMa&_Vm p5T(XNI1Sg)9;hRnVa]Œe )4b~8ۿe@axfj\I|fKZ9qtfXXh"^)JF\TJj֮ƚf3`Ւa<1 uĴ:TOXp8#@qmpfò5^[Bֈabv;)-(US䨳gK2#CLMCQJ[p1 Xcf-d5e.Rgf8`%ݟL5Xru?ְ Pt~@T_m3`=괬Ibvtr"ʙUXTuS Ybl>KjS@T|/^*g0zVs)+`3*ͳR79v#v-\kGK@7h+ w̰cYݲoMrgq.u)ܵw-4k٫ʯ<2kpo~bd}w΀5 hȇp4eӕoŸKL%7},O3f] Éhbˆ%X^b ÒAVF^H9g5V3`Mղ uӝv:VerP_)|jvtUЂ*<ݘok!P5S,?N`7%zIE $;#ؕ.[7^V%#rD}wπ5ǬRo䪼V(Bs࣢joHڭ5W6mȅ#ۿ~ɇ@=dMg&'/|%Q:Gf}v|2~X7quQӐ,3jQ]8 #1&LFDҮtݿ13z5Ѯ0elթS,`i*%"F[vVH#3`]h@doX>aˉG2V %zÉ1[xGR.Ί="\puY4tXCÇZ0rp(W9s] OX}oZ|f$%[ìKpqC d_$*fFmKN.m, \QJ,(~6|ҽ)s4B<2OVlE.;fl{7ZWƬ:GI+Lo Saf'flh X-6M1 sujJ ˙n|vkF\0Z_1Vks3fMmR}JEN8@u*ܽX.goill~ 4fi[Rdxgz{v\вu'B pH5S a_kX]1KP[HcvgކW|4o=!r\- ɷkkp^Ӂ~q]yq=*3 }5h ̀5oL<LU.#ݣƷ*Y=7Qs! Xv/؉nЇ;+V8vzi.ɰkXaҧ~u\A-0֠Ň?5\[쟹LCZ`!wώתfjo/-oz-0Vs}\ߦ状 X-p}k3`567?L\roظsZYx7IENDB`@@@ NormalCJ_HaJmH sH tH @@@ Heading 1$@&`aJN@N Heading 2$$@&a$5CJOJQJaJH@H Heading 3$$dh@&a$5aJT@T Heading 4$$5$7$8$@&H$a$5CJ&\aJDA@D Default Paragraph FontViV  Table Normal :V 44 la (k(No List @Z@ Plain TextCJOJQJaJ4@4 Header  !4 @4 Footer  !>@">  Footnote TextCJaJ@&@1@ Footnote ReferenceH*\B@B\ Body Textdh7$8$H$B*CJOJQJ^JaJph# FPRF Body Text 2dh B*aJph# .)@a. Page Number>Or> Style1dhx`M@A Body Text First Indentdx7$8$H$`B*CJOJQJ^JaJphb0b List Bullet!$ & F d]a$CJOJQJaJ4/4 Listh^h`R^R Normal (Web)dd[$\$OJPJQJ^J6U6 Hyperlink >*B*phFVF FollowedHyperlink >*B* ph[&EH AZ[f{BgYw w ]U4(P~{u"$&&,'Q'''''I((**/+a+|-/0t122315$67[:;; =>@AB_D FHILMHQTUWXY]_#bweh1jkrmm;o;qirFss&tvOxyyyT{|}}YZ[\efgrstuvwx0000000(0[(0[(0[000000000x0x000000000(0[0t0t0t0t0t0t0t0t 0t 0t 0t 0t 0t 0t 0t 0t 0t0t(0[0+ 0+0000 0 0 0 0000000000000000000000 0 0 0 0 0 0 0 00000000 0 0 000000 ;00@00@0 {005 {005 {00 {00@0@0@0 {00 {00 {00080 ;00&0  zMdDILg/3\TEGHJKF  !!4/Xb$ӊVsxh%b$4 vO+ƍ $e@h(  04 7*}  3  `x" !.;<JyJpS`T0WT0WNQJQJT=T;T,TR>TTS#" ~B  BDjJ Ȝ s?7G*7~B  BDjJ Ȝ s?} G*} 0  A?î@nsa<(#\+@8,:<XM 4S 4S814S54S$E,LPFK4S@8`T0*`T!Oh>4"`&* :  A?î@iad6@200<(#\+@8,:<XM 4S 4S34S54S$E,LPFK4S@8`T0*`T!Oh>4" f  S ?n 6a&~  B S  ?"*@ KKTK̲KtoK4KtKKK4KtK//p0p0==MMbb  00t0t0==MMbb B *urn:schemas-microsoft-com:office:smarttagscountry-region8 *urn:schemas-microsoft-com:office:smarttagsdate9 *urn:schemas-microsoft-com:office:smarttagsplace 2003227DayMonthYear  }YZ\dgqwxW - -88:;U;FFGGHHMMgWzWWX.l0lTmVm}YZ\dgqwx33333333333333{{G&J&)/7/77(=4=AACCzE{EEEEEEFTTUUUUUV5VVVVmڊqM[av0cl&%p6^y zsG|Ȏ hh^h`OJQJo(^`o(.^`.pLp^p`L.@ @ ^@ `.^`.L^`L.^`.^`.PLP^P`L.^`o(.^`.pLp^p`L.@ @ ^@ `.^`.L^`L.^`.^`.PLP^P`L.h ^`OJQJo(h pp^p`OJQJo(oh @ @ ^@ `OJQJo(h ^`OJQJo(h ^`OJQJo(oh ^`OJQJo(h ^`OJQJo(h PP^P`OJQJo(oh   ^ `OJQJo(h 88^8`OJQJo(h ^`OJQJo(oh   ^ `OJQJo(h   ^ `OJQJo(h xx^x`OJQJo(oh HH^H`OJQJo(h ^`OJQJo(h ^`OJQJo(oh ^`OJQJo(h ^`OJQJo(h pp^p`OJQJo(oh @ @ ^@ `OJQJo(h ^`OJQJo(h ^`OJQJo(oh ^`OJQJo(h ^`OJQJo(h PP^P`OJQJo(oh   ^ `OJQJo(h hh^h`OJQJo(oh 88^8`OJQJo(oh ^`OJQJo(h   ^ `OJQJo(h   ^ `OJQJo(oh xx^x`OJQJo(h HH^H`OJQJo(h ^`OJQJo(oh ^`OJQJo(h^`.hpp^p`.h@ L@ ^@ `L.h^`.h^`.hL^`L.h^`.hPP^P`.h L ^ `L.h ^`OJQJo(h pp^p`OJQJo(oh @ @ ^@ `OJQJo(h ^`OJQJo(h ^`OJQJo(oh ^`OJQJo(h ^`OJQJo(h PP^P`OJQJo(oh   ^ `OJQJo(h ^`OJQJo(h pp^p`OJQJo(oh @ @ ^@ `OJQJo(h ^`OJQJo(h ^`OJQJo(oh ^`OJQJo(h ^`OJQJo(h PP^P`OJQJo(oh   ^ `OJQJo(h ^`OJQJo(h ^`OJQJo(oh pp^p`OJQJo(h @ @ ^@ `OJQJo(h ^`OJQJo(oh ^`OJQJo(h ^`OJQJo(h ^`OJQJo(oh PP^P`OJQJo(h^`.h^`.hpLp^p`L.h@ @ ^@ `.h^`.hL^`L.h^`.h^`.hPLP^P`L.h ^`OJQJo(h ^`OJQJo(oh pp^p`OJQJo(h @ @ ^@ `OJQJo(h ^`OJQJo(oh ^`OJQJo(h ^`OJQJo(h ^`OJQJo(oh PP^P`OJQJo(h ^`OJQJo(h ^`OJQJo(oh pp^p`OJQJo(h @ @ ^@ `OJQJo(h ^`OJQJo(oh ^`OJQJo(h ^`OJQJo(h ^`OJQJo(oh PP^P`OJQJo(h ^`OJQJo(h pp^p`OJQJo(oh @ @ ^@ `OJQJo(h ^`OJQJo(h ^`OJQJo(oh ^`OJQJo(h ^`OJQJo(h PP^P`OJQJo(oh   ^ `OJQJo(h^`.h pp^p`OJQJo(oh @ @ ^@ `OJQJo(h ^`OJQJo(h ^`OJQJo(oh ^`OJQJo(h ^`OJQJo(h PP^P`OJQJo(oh   ^ `OJQJo(h ^`OJQJo(h pp^p`OJQJo(oh @ @ ^@ `OJQJo(h ^`OJQJo(h ^`OJQJo(oh ^`OJQJo(h ^`OJQJo(h PP^P`OJQJo(oh   ^ `OJQJo(h hh^h`OJQJo(oh 88^8`OJQJo(oh ^`OJQJo(h   ^ `OJQJo(h   ^ `OJQJo(oh xx^x`OJQJo(h HH^H`OJQJo(h ^`OJQJo(oh ^`OJQJo(h hh^h`OJQJo(oh 88^8`OJQJo(oh ^`OJQJo(h   ^ `OJQJo(h   ^ `OJQJo(oh xx^x`OJQJo(h HH^H`OJQJo(h ^`OJQJo(oh ^`OJQJo(pclqM[a<G.sG|z2#$Vjg]. Uu37HMC$81R!y                           V                                                                                                                     @ @mWi,pAb}X@O@Unknown Gz Times New Roman5Symbol3& z Arial?5 z Courier NewG  MS Mincho-3 fg9CG Times9GaramondIArial Unicode MS;Wingdings"1hcwFcwFwij?XlA#4d| 3QH?i,pStatement by Daniel G. WolfHouse Cybersecurity SFRG.Wilson GDRX              Oh+'0  0< X d p |Statement by Daniel G. WolfHouse Cybersecurity SFR G.Wilsoners.Wi.WiNormaln GDRln2DRMicrosoft Word 10.0@@\(M@kP@kPij՜.+,D՜.+,H hp|  NSA?|{ Statement by Daniel G. Wolf Title<@0_AdHocReviewCycleID_EmailSubject _AuthorEmail_AuthorEmailDisplayName_ReviewingToolsShownOnceǠWitness TestimoniesMGilbert@mail.house.govGilbert, Margieilb  !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijklmnopqrstuvwxyz{|}~      !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijklmnopqrstuvwxyz{|}~Root Entry Fp:PData 1TablepZWordDocument9SummaryInformation(DocumentSummaryInformation8CompObjj  FMicrosoft Word Document MSWordDocWord.Document.89q