ࡱ>  bjbjVV I<<&( ( kkkkk8,u";u=u=u=u=u=u=u$wzauk#"##aukkvu0R/R/R/#"kk;uR/#;uR/R/jOoh&l:'uu<u)md{(jd{toodd{k+q R/!B"~auau+Xu####d{( 1: Securing Information Systems Chapter 7 Study Guide Key Terms The following alphabetical list identifies the key terms discussed in this chapter. The page number for each key term is provided. Acceptable use policy (AUP), 250HIPAA, 246Access control, 252Identify theft, 241Antivirus software, 255Intrusion detection systems, 255Application controls, 248Key loggers, 240Authentication, 252Malware, 238Authorization policies, 250MIS audit, 252Biometric authentication, 253Online transaction processing, 257Botnet, 241Patches, 246Bugs, 245Pharming, 242Business continuity planning, 251Phishing, 242Click fraud, 244Public key encryption, 256Computer crime, 244Recovery-oriented computing, 258Computer virus, 238Risk assessment, 248Controls, 235Sarbanes-Oxley Act, 247Cybervandalism, 240Secure Hypertext Transfer Protocol (S-HTTP), 256Secure Sockets Layer (SSL), 256Denial-of-service (DoS) attack, 240Security policy, 250Disaster recovery planning, 250SQL injection attack, 239Distributed denial-of-service (DDos) attack, 241Sniffer, 240Encryption, 256Social engineering, 245Evil twin, 242Spoofing, 240Fault tolerant computer systems, 257Spyware, 240Gramm-Leach-Bliley Act, 247Trojan Horse, 238Hacker, 240High-availability computing, 258War driving, 237Worms, 238 Systems must be more secure when processing transactions and maintaining data. These two issues are the biggest issues facing those wanting to do business on or expand their operations to the Internet. System Vulnerability and Abuse Why Systems Are Vulnerable Information systems are vulnerable to technical, organizational, and environmental threats from internal and external sources. The weakest link in the chain is poor system management. If managers at all levels dont make security and reliability their number one priority, then the threats to an information system can easily become real. The figure below gives you an idea of some of the threats to each component of a typical network.  Contemporary Security Challenges and Vulnerabilities. Businesses that partner with outside companies are more vulnerable because at least some data may be less controlled. Partnering companies may not protect information as stringently. Hardware and software safeguards may not be as important to outsiders. Employees of the partnering firm may not view security as diligently as the primary business. Mobile computing devices like smartphones, cell phones, netbooks, and laptops, add to the vulnerability of information systems Internet Vulnerabilities If electronic business is to prosper and move into the mainstream of commerce, everyone involvedmerchants, financial institutions, software vendors, and security suppliers such as VeriSignhas to make security a top priority. Security is very hard to get right under the best of circumstances and just about impossible when it isnt the focus of attention. If the industry doesnt get this rightand fastits setting the stage for a catastrophic loss of confidence. (Business Week, March 26, 2001) In a survey carried out last year, security professionals were asked to identify the most common sources of automated worm attacks. Not surprisingly, three of the top four causes pointed directly at dirty PCs. Forty-three percent said employee laptops were the primary source of worm attacks, 34 percent fingered contractor laptops, and 27 percent claimed that home PCs connected to virtual private networks (VPNs) were the guilty parties. (Jon Oltsik, Time to send a consistent message on security, CNet News.com Feb 23, 2006) Poor diligence Information broker ChoicePoint sold the personal information of 145,000 people to inadequately vetted bogus businesses. As a consequence, many people later became victims of identity theft. ChoicePoint paid $15 million to settle charges it failed to protect consumers information, the Federal Trade Commission announced in January 2006. Failed processes A laptop containing sensitive personal information on 26.5 million U.S. veterans was stolen May 3 from the suburban Maryland residence of a Veterans Administration data analyst who wanted to work at home but did not have remote access to the VAs system. News of the theft was kept under wraps for 19 days. A week later, Michael H. McLendon, VA deputy assistant secretary for policy, announced his resignation. These four articles show how long the problem with poor security has existed and how vulnerable computing systems are. Every point of entry into the Internet network is a point of vulnerability. If you connect to the Internet with a cable modem or DSL you are much more vulnerable to hackers on your home PC than if you connect with a dial-up modem. Thats because you are always connected, with a permanent IP address, which makes it easier for hackers to find you. The only smart thing to do is keep your security software and operating system software up-to-date and include firewall protection. Because distributed computing is used extensively in network systems, you have more points of entry, which can make attacking the system easier. The more people you have using the system, the more potential for fraud and abuse of the information maintained in that system. Thats why you have to make it everybodys business to protect the system. Its easy for people to say that they are only one person and therefore they wont make much difference. But it only takes one person to ignore necessary safeguards in order for one other person to disable a system or destroy data. Wireless Security Challenges Internet cafes, airports, hotels, and other hotspot access points need to make it easy for users to use the network systems with the 802.11 standard. Yet, because it is so easy, hackers and crackers can easily access unsuspecting users systems and steal data or use the entry point as a way to spread malicious programs. The hackers can use war driving techniques to gain access to wireless networks not only in hotels and airports, but private businesses and government centers. Wireless networks are vulnerable in the following ways: Radio frequency bands are easy to scan. Signals are spread over a wide range of frequencies. Service set identifiers (SSID) are broadcast multiple times and are easily picked up. Rogue access points can be established on different radio channels and divert signals from authentic points. Wired equivalent privacy (WEP) isnt very effective because it relies on user input. Malicious Software (Malware): Viruses, Worms, Trojan Horses, and Spyware Have you ever picked up a cold or the flu from another human? Probably. You then spread it to two or three other people through touch or association. Those people spread it to two or three more people each. Pretty soon it seems that everyone on campus or at work is sick. That is how computer viruses are spread. You copy a file from an infected source, use the file, and maybe send it to friends or associates. The virus is now on your computer and spreads to files other than the original. You then send the same or even a different file to a few friends and their computers are infected. Web-enabled and e-mail-enabled cell phones are now being targeted as a way to spread viruses. Just when you were getting the hang of protecting your computer from viruses, they must have sneezed and found your cell phone. One in every 10 phones is now a smart phonecapable of handling data and messaging. That means its become easy and lucrative for hackers to attack your cell phone. And the dangers are just as real. From 2004 to 2006, the number of phone viruses doubled every month. According to Symantec, viruses spread on cell phones in a variety of ways: Internet downloads, MMS (multimedia messaging service) attachments, and Bluetooth transfers to name a few. Theyll often show up as game downloads, updates to your phones system, ringtones, or alerts. McAfee Avert Labs has identified about 450 different variants of mobile threats, and thats not including phishing attacks and spam. According to McAfee research, 83 percent of worldwide carriers have had security incidents in 2007. ( HYPERLINK "http://www.yahoo.com/blog" www.yahoo.com/blog, Robin Raskin, Oct 31, 2007) A different type of malware called worms can also destroy data on computers or clog network systems with software-generated electronic transmissions. Worms are similar to viruses in that they can create additional file copies on a computer and generate emails to other computers with the infected file attached. Worms differ from viruses because they dont need human intervention to spread from one computer to another. Trojan horses cause problems because they force a computer system to perform unexpected operations, often to the detriment of the system and the user. This type of malware is usually masked in email messages although it can be stored on Web sites. Web sites are becoming a magnet for hackers to gain access to users computers. Its imperative that Web site programmers and authors create underlying code that properly validates and filters data entered by site users. That will help prevent SQL injection attacks that target databases and unleash malicious code. Not all spyware is damaging to a computer system. It is a popular method for some Web sites to monitor how users navigate through a site, providing critical information that the Web designers and developers can use to improve the site. Unfortunately, some spyware is becoming a preferred method for hackers to install malicious code on computers and allow them to infiltrate an unsuspecting computer. Key loggers are an example of how spyware programs are used to capture personal or business information from unsuspecting users. Hackers and Computer Crime Hackers and crackers, those who intentionally create havoc or do damage to a computer system, have been around for a long time. Many companies dont report hackers attempts to enter their systems because they dont want people to realize their systems are vulnerable. That makes it hard to gather real statistics about the extent of hacking attempts and successes. Unauthorized access is a huge problem, though. Hackers constantly develop new ways to get around security software. Unfortunately they usually have the upper hand because they can create hacking methods faster than security software companies can create, update, and distribute software that blocks them. Users who fail to keep their software updated inadvertently help hackers continue to ply their trade. One security software company is trying a new approach and hope they get the help they need from you. Even as hacking has grown from a way for geeks to impress each other to a means for criminals to steal and blackmail, the strategy for computer security has remained largely the same: Companies and consumers erect the thickest walls they can around computers so the bad guys cant get in. Now security experts, realizing theyre losing the battle, are ready to try a new approach. They plan to recruit victims and other computer users to help them go on the offensive and hunt down the hackers. Its time to stop building burglar alarms to keep people out and go after the bad guys, says Rowan Trollope, senior vice-president for consumer products at Symantec, the largest maker of antivirus software. Symantec asks customers to opt in to a program that will collect data about attempted computer intrusions and then forward the information to authorities. Symantec will also begin posting the FBIs top 10 hackers and their schemes on its Web site, where customers go for software updates. Next year, the company will begin offering cash bounties for information leading to an arrest. (BusinessWeek, Hounding the Hackers, Edwards, Cliff, Sep 14, 2009) Some hackers penetrate systems just to see if they can. They use special computer systems that continually check for password files that can be copied. Or they look for areas of the system that have been left open, so to speak, where they can enter the system. Sometimes they dont do any damage, but far too often they destroy files, erase data, or steal data for their own use through cybervandalism. Other hackers attack systems because they dont like the company. Even afterlast weeks unveiling of  HYPERLINK "http://www.computerworld.com/action/article.do?command=viewArticleBasic&articleId=9069680" privacy upgrades, a security lapse on the  HYPERLINK "http://www.computerworld.com/action/inform.do?command=search&searchTerms=Facebook+Inc." \o "Facebook Inc." Facebook Inc. social network early this week still exposed restricted photos to anyone using the site, according to an  HYPERLINK "http://news.yahoo.com/s/ap/20080325/ap_on_hi_te/facebook_public_photos" \t "new" Associated Press reportlater confirmed by the company to Computerworld. A spokeswoman said that after learning of the problem, Facebook engineers on Monday tested the scenario,found that it was a bug and fixed it immediately. In a statement, the company added that We take security very seriously.(Computerworld, March 26, 2008) Spoofing/pharming and Sniffing These are two other methods hackers and criminals use to gain improper or illegal access to computer systems. Spoofing or pharming is becoming a common way to steal financial information through fake Web sites. The spoofed site is almost a mirror image of the real site and unless the unsuspecting user examines the spoof closely, he/she may inadvertently give out important personal and financial information. Using a sniffer program is a popular way to grab information as it passes over transmission lines regardless of whether they are hard-wired or wireless. It is almost impossible to detect and encryption is about the only way to safeguard against it. Denial of Service Attacks As companies and organizations expand their business to Web sites, they are opening another point of vulnerability through denial of service attacks. Using botnets to launch distributed denial of service attacks is becoming all too common. The hackers seem to enjoy attacking the most popular Web sites like Facebook and Twitter. On this otherwise happy Thursday morning, Twitter is the target of a denial of service attack, wrote Stone (Twitter co-found Biz Stone). Attacks such as this are malicious efforts orchestrated to disrupt and make unavailable services such as online banks, credit card payment gateways, and in this case, Twitter for intended customers or users. We are defending against this attack now and will continue to update our status blog as we continue to defend and later investigate. In a denial-of-service attack, a malicious party barrages a server with so many requests that it cant keep up, or causes it to reset. As a result, legitimate users can only access the server very slowly or not at all, as appears to be the case here. (www.wired.com, Van Buskirk, Elliott, Denial-of-Service Attack Knocks Twitter Offline, Aug 6, 2009)  Computer Crime Computer crime is a growing national and international threat to the continued development of e-business and e-commerce. When the Internet was first created in the late 1960s, the designers intentionally built it to be open and easily accessible. Little did they know 40 years later, that structure would be the very cause of so much crime and vandalism. This table lists the best known examples of computer crime. Identity Theft The fastest growing crime off or on the Internet is identity theft. Even though identity theft is most likely to occur in an offline environment, once your personal information has been stolen its easy to use it in an online environment. The biggest risk for identity fraud is from the old-fashioned theft of your wallet or paper records from your trash. And from people who know you. People who are close to you can set up known accounts and have the information sent to a new address. So the fraud goes on longer and is harder to discover, says James Van Dyke of Javelin Strategy in Pleasanton, California. (USAToday Online, Jan 26, 2005) Several government Web sites provide extensive information about how to prevent identity theft. The Federal Trade Commission at  HYPERLINK "http://www.ftc.gov" www.ftc.gov gives you information about what to do if you think your identity has been stolen. Another government-sponsored site is OnGuardOnline.gov: OnGuardOnline.gov provides practical tips from the federal government and the technology industry to help you be on guard against Internet fraud, secure your computer, and protect your personal information. There are many precautions people can take to help prevent identity theft. One way is to scrutinize emails or phone calls that ask for your personal information or financial account information. No legitimate financial institution will ever send an e-mail requesting you to supply your account information. That is the number one indicator that the e-mail is a phishing e-mail. You should ignore and delete the email immediately. You can also access  HYPERLINK "http://www.annualcreditreport.com" www.annualcreditreport.com and receive free copies of your credit reports from the three major credit reporting bureaus to monitor the information about your credit card and financial activities. Phishers are back with a vengeance, armed with some alarming new trickery. Those e-mail scammers who try to fool you into typing your user name and passwords at faked financial Web pages have been around in force since 2002. They remain active, though many Web users have gotten adept at spotting, and avoiding, ruses to get their financial account log-ons. However, after a lull at the start of this year, phishing attacks suddenly spiked 200% from May through September, according to IBMs X-Force research team. Phishers are going after log-ons to Web mail, social networking and online gaming accounts, security experts say. With possession of your Web mail user name and password, cybercrooks can carry out a matrix of lucrative online capers, made all the easier if you use just one or a handful of the same passwords. They can send out e-mails that appear to come from you to everyone in your address book to try to get them to divulge passwords. And they can scour your e-mail folders for clues to the social networks and online banks you use, then crack into those accounts and change the passwords so only they can access them. (USAToday Online, Change passwords: Crooks Want Keys to Your Email, Ocohido, Byron, Oct 27, 2009) Other ways your identity can be stolen is through evil twins based on wireless network intrusions and pharming, the use of bogus Web sites. All of these are classified as computer crimes for which our government is continually passing new laws. Click Fraud All those ads you see on Web sites cost the sponsor money. Every time someone clicks on an ad, the sponsor is charged a pay-per-click fee. The fee is based on the popularity of the search words that generated the ad. What if your company is paying for an ad with little or no resultant traffic to your Web site? Thats what happens in the case of click fraud. A person or a software program continually hits on the ad, driving up the advertising fees, without any intention of actually visiting the site. The growing ranks of businesspeople worried about click fraud typically have no complaint about versions of their ads that appear on actual Google or Yahoo Web pages, often next to search results. The trouble arises when the Internet giants boost their profits by recycling ads to millions of other sites, ranging from the familiar, such as cnn.com, to dummy Web addresses like insurance1472.com, which display lists of ads and little if anything else. When somebody clicks on these recycled ads, marketers such as MostChoice get billed, sometimes even if the clicks appear to come from Mongolia. Google or Yahoo then share the revenue with a daisy chain of Web site hosts and operators. A penny or so even trickles down to the lowly clickers. That means Google and Yahoo at times passively profit from click fraud and, in theory, have an incentive to tolerate it. So do smaller search engines and marketing networks that similarly recycle ads. (BusinessWeek, October 2, 2006) Global Threats: Cyberterrorism and Cyberwarfare As terrorism continues to increase the possibility of physical attacks anywhere in the world, computer systems can be targeted as often as buildings, cars, or trains. Governments realize this and are investigating ways of preventing system attacks or minimizing the damage caused to the vast number of networks that are vulnerable. Just how real is the threat that cyberterrorism poses? Because most critical infrastructure in Western societies is networked through computers, the potential threat from cyberterrorism is, to be sure, very alarming. Hackers, although not motivated by the same goals that inspire terrorists, have demonstrated that individuals can gain access to sensitive information and to the operation of crucial services. Terrorists, at least in theory, could thus follow the hackers lead and then, having broken into government and private computer systems, cripple or at least disable the military, financial, and service sectors of advanced economies. The growing dependence of our societies on information technology has created a new form of vulnerability, giving terrorists the chance to approach targets that would otherwise be utterly unassailable, such as national defense systems and air traffic control systems. The more technologically developed a country is, the more vulnerable it becomes to cyberattacks against its infrastructure. (United States Institute for Peace, Special Report #119, Dec 2004) Internal Threats: Employees It is surprising to learn that much computer crime against companies is committed by current or former employees. They know the system best, are entrusted with huge amounts of data, and have the easiest access. Managers and executives need to be aware of potential internal threats to their systems and put special measures in place to safeguard systems and data. They also need to impress upon all employees how important security is throughout the system right down to the last person. Internet behaviorsurfing to unknown or even suspicious sites, for examplewhen they have an IT department behind them to clean up their mess, a recently released study claims. According to the July studywhich was released Tuesday by Tokyo-based Trend Micro and based on polls of 1,200 users, 400 each in the United States, Germany, and Japan39 percent of enterprise workers believed that their companys IT department would keep them safe from  HYPERLINK "http://www.techweb.com/encyclopedia/defineterm.jhtml;jsessionid=5LUPVAJRYOFBYQSNDBCSKHSCJUMEKJVN?term=virus&_requestid=147768" viruses, worms, spyware, spam, and  HYPERLINK "http://www.techweb.com/encyclopedia/defineterm.jhtml?term=phishing" phishing and pharming attacks. That confidence, whether on the mark or misplaced, leads workers to do risky, even stupid, things at work, such as opening questionable e-mail messages or clicking on unknown Web site links. Password theft is the easiest way for hackers to gain access to a system. No, they dont come into your office at night and look at the piece of paper in your desk drawer that has your password written on it. They generally use specially written software programs that can build various passwords to see if any of them will work. Thats why you should use odd combinations of letters and numbers not easily associated with your name to create your password. The longer the password, the harder it is to replicate. The same password should not be used for more than one access point. Using multiple passwords limits the damage done if a hacker does manage to obtain a single password. Safeguarding individual passwords from social engineering maliciousness is the responsibility of everyone in the organization. An effective way of limiting access to data is to establish computer-generated logs that show every employee who logged on, what they did, what part of the system they accessed, and whether any data were used or updated. Logs are easily created by system software programs and should be periodically reviewed by the information technology staff and department managers. If nothing else, it gives them an idea of what their employees are doing. Software Vulnerability With millions of lines of code, its impossible to have a completely error-free program. Most software manufacturers know their products contain bugs when they release them to the marketplace. They provide free updates, patches, and fixes on their Web sites. Thats why its a good idea not to buy the original version of a new software program but to wait until some of the major bugs have been found and corrected. Because bugs are so easy to create, most unintentionally, you can reduce the number of them in your programs by using the tools discussed in other chapters to design good programs. Many bugs originate in poorly defined and designed programs and keep infiltrating all parts of the program. Business Value of Security and Control Transactions worth billions and trillions of dollars are carried out on networks every day. Think of the impact if the networks experience downtime for even a few minutes. And, the problem is far worse than companies may reveal: For some time, there has been a string of high-profile identity thefts. Bank of America disclosed it lost computer tapes containing financial data of some of its customers. The personal information of 59,000 people affiliated with California State Universitythe group included prospective students, faculty and staffwas stolen by hackers. The ChoicePoint scam, which was reported in February, affected as many as 145,000 consumers. The most alarming part of this situation, perhaps, is that these are the known incidents. In the case of ChoicePoint, for example, the only reason the theft came to light was because California law required the company to tell affected consumers. The fact is, consumer data is semiregularly hacked and never reported to authorities, Panda Software CTO Patrick Hinojosa said. (ContactCenterToday.com, Mar 1, 2006) In 2005 ChoicePoint, a data brokerage company, revealed that they had inadvertently sold personal and financial information to more than 50 companies that were fronts for identity thieves. This incident underscores the difficulties with protecting data and information on millions of unsuspecting consumers and legitimate businesses. The cost of settling several lawsuits went far beyond the potential profits Choicepoint probably made. Indeed, the problem has been very damaging to Choicepoints business reputation. Consumer data broker ChoicePoint, Inc., which last year acknowledged that the personal financial records of more than 163,000 consumers in its database had been compromised, will pay $10 million in civil penalties and $5 million in consumer redress to settle Federal Trade Commission charges that its security and record-handling procedures violated consumers privacy rights and federal laws. The settlement requires ChoicePoint to implement new procedures to ensure that it provides consumer reports only to legitimate businesses for lawful purposes, to establish and maintain a comprehensive information security program, and to obtain audits by an independent third-party security professional every other year until 2026. The message to ChoicePoint and others should be clear: Consumers private data must be protected from thieves, said Deborah Platt Majoras, Chairman of the FTC. Data security is critical to consumers, and protecting it is a priority for the FTC, as it should be to every business in America. (FTC.gov, Nov 2008) Legal and Regulatory Requirements for Electronic Records Management Because so much of our personal and financial information is now maintained electronically, the U.S. government is beginning to pass laws mandating how the data will be protected from unauthorized or illegal misuse. Congress has passed several measures outlining the requirements for electronic records management: HIPAA: protects medical and health care data Gramm-Leach-Bliley Act: requires financial institutions to ensure the security and confidentiality of customer data Sarbanes-Oxley Act: requires companies and their management to safeguard the accuracy and integrity of financial information that is used internally and released externally All of these laws are in response to computer crimes and abuses that businesses or individuals have committed or experienced. Its very difficult to pass the laws and costly for businesses who struggle to comply with them. Electronic Evidence and Computer Forensics Several things are happening in the corporate world that are changing the requirements for how companies handle their electronic documents: 1) Companies are communicating more and more with e-mail and other forms of electronic transmissions, and 2) Courts are allowing all forms of communication to be held as evidence. Therefore businesses must develop methods of capturing, storing, and presenting any and all electronic communications including e-mail, instant messaging, and e-commerce transactions. Computer forensics is a growing field because of the increasing digitization of documents and communications. Many people believe that just because they delete a file from a computer file directory that its no longer available or recoverable. Thats a false belief. Ambient data remains on hard drives in magnetic form long after its apparently been deleted. People trained in computer forensics are able to uncover ambient data and other forms of electronic evidence that can be used in courts of law. Businesses and employees must increase their awareness of the necessity for keeping good records. Establishing a Framework for Security and Control One of the best ways is prevent some of the problems Ive discussed to institute controls into your information system the same way you might in any other system; through methods, policies, and procedures. Information Systems Controls The two types of information system controls are: General controls: software, physical hardware, computer operations, data security, implementation process, and administrative; Application controls: input, processing, and output Risk Assessment Companies and government systems constantly use risk assessment to determine weak links in their physical building security. You can use the same methodology to assess the risk in your information system. Use risk assessment to set up cost comparisons for developing and maintaining security against the loss potential Security Policy Companies spend a lot of money on physical security such as locks on doors or fences around supply depots. They need to do the same thing for their information systems. Because of the increasing liability for security breaches, many companies are now establishing a chief security officer position to help ensure the firm maximizes the protection of information resources. Some tools available to the CSO are: Security policy: principle document that determines security goals and how they will be achieved Acceptable use policy: outlines acceptable and unacceptable uses of hardware and telecommunications equipment; specifies consequences for noncompliance Authorization policy: determines what access users may have to information resources Authorization management systems: manages access to each part of the information system Disaster Recovery Planning and Business Continuity Planning Floods, fires, hurricanes, even tsunamis, happen without a moments notice. Perhaps the most important element of a successful system is a disaster recovery plan. Some firms, not just in New York City and Washington D.C. but around the world, discovered the necessity for a well-written and tested plan on September 11, 2001. Those firms that had completed business continuity planning were able to carry on business, while those that hadnt, spent days and weeks recovering from the terrorist attacks. Its important that managers and employees work with information system technicians to develop these plans. Too much is at stake to leave the planning process to one group or the other. The Role of Auditing Companies audit their financial data using outside firms to make sure there arent any discrepancies in their accounting processes. Perhaps they audit their supply systems on a periodic basis to make sure everything is on the up-and-up. They should also audit their information systems. After all, information is as an important resource as any other in the organization. MIS audits verify that the system was developed according to specifications, that the input, processing, and output systems are operating according to requirements, and that the data is protected against theft, abuse, and misuse. In essence, an MIS audit checks all the controls weve discussed in this chapter. Technologies and Tools for Protecting Information Resources Access Control Continuous headlines telling of hackers exploits in the past year should be enough to convince every company of the need to install firewalls, access controls, and other security measures. With the installation of cable modems or DSL lines, home users must follow the same guidelines. These new connections, which leave your personal computer always on, are just as vulnerable to attacks as corporate systems. If you allow employees to keep certain data on their machines that are not backed up to the mainframe computer, you need to ensure that safeguards are installed on the individual PCs. Make sure you have controls in place for access to individual data, backing it up, and properly protecting it against corruption. Do you even have a policy about whether employees can store data on their individual terminals? In corporate systems, its important to ensure authentication methods are in place so that unauthorized users cant gain access to the system and its data. Access can be granted in one of three ways: something you know passwords; something you have tokens or smart cards; something you are biometric authentication. Because most simple password systems are too weak and make the system too vulnerable, security experts are devising new methods to control access. Tokens and smart cards are small, physical devices individuals use to securely access information systems. Biometric authentication is becoming more popular as a method of protecting systems and data as the technology is refined. While you may have seen the fingerprint or facial recognition techniques only on sci-fi movies, rest assured it may be the next wave of security thats installed in your organization. Firewalls, Intrusion Detection Systems, and Antivirus Software The four types of firewalls described in the text are: Packet filtering: data packet header information is examined in isolation Stateful inspection: the actual message comes through the firewall but must be identified by the user as passable Network address translation (NAT): conceals IP addresses and makes it more difficult to penetrate systems Application proxy filter: sort of like a fence through which a substitute message passes Intrusion Detection Systems Firewalls can deter, but not completely prevent, network penetration from outsiders and should be viewed as one element in an overall security plan. In addition to firewalls, digital firms relying on networks use intrusion detection systems to help them protect their systems. In March 2002, Wright Patterson Air Force Base, Ohio, reported over 250,000 unauthorized attempted entries into its computer systems by hackers in a 24-hour period. The intrusion detection systems it had in place allowed authorities to track the hacker attempts and thwart damage to its critical data and systems. A honeypot computer system is installed on a network system to study attack activity. The computer system would not contain any data of value, but may contain data that appears to be of value. System administrators monitor these systems to find indications of attack activity. Because the systems have no real business purpose, any activity on the system is known to be unauthorized. This helps them develop more effective defense systems for their production systems based on the attacks they see. Antivirus and Antispyware Software Whether you use a stand-alone PC or your computer is attached to a network, youre just asking for trouble if you dont have antivirus software. This type of software checks every incoming file for viruses. Not if, but when, you receive an infected file, the software alerts you to its presence. You can choose to delete the file or clean it. Make sure you update your antivirus software at least once a week because new viruses are constantly being written and passed around. Some antivirus software companies now make it very easy to keep your antivirus software current through online updates. McAfee.com will detect when you are online and notify you when new updates are available. With a few mouse clicks, you download the software to protect against the newest viruses. Unified Threat Management Systems Its a daunting task to individually manage all the security tools available to business. Unified threat management technologies help organizations by providing all of them in one comprehensive package. Its a great way for small- and medium-size organizations to ensure they cover all the security vulnerabilities in their systems. Securing Wireless Networks Its becoming more important for Wi-Fi users to protect their data and electronic transmissions as wireless networks and their access points proliferate around the country. Security is easily penetrated because of the very nature of the spectrum transmission used in Wi-Fi. Unless users take stringent precautions to protect their computers, its relatively easy for hackers to obtain access to files. Stronger encryption and authentications systems for Wi-Fi than the original Wired Equivalent Privacy (WEP) is being installed in newer computer models. Wi-Fi Protected Access (WPA) improves security on wireless networks but individual users still carry the responsibility to make sure passwords are changed from the original and encryption systems are used to help protect data. Encryption and Public Key Infrastructure Most people are reluctant to buy and sell on the Internet because theyre afraid of theft, fraud, and interception of transactions. To help ease the mind and make transactions secure, many companies are using very sophisticated methods of protecting data as they travel across the various transmission mediums through the use of encryption. The standard methods of making online transactions more secure are Secure Socket Layers, Transport Layer Security (TLS), and Secure Hypertext Transport Protocol. The next time youre on an e-commerce or e-business Web site, look in the address text box of your browser and notice if the address begins with https:. If so, the site incorporates one of these two security measures. Watch any World War II movie and youll see episodes of the good guys intercepting coded messages from the enemy. The messages were scrambled and almost impossible to interpret. But the good guys always won out in the end and unscrambled the message in time to save the world. Now we use sophisticated software programs to encrypt or scramble transmissions before they are sent. The sender and recipient have special software programs they can use to encode and decode the transaction on each end.  Public Key Encryption. This figure shows you how public key encryption works using two keys: one public and one private. The keys are created through complicated mathematical formulas. The longer the key, the harder it is to decipher. Thats the whole point of encryption. Encryption software programs incorporate authentication and message integrity in its program to ensure senders and receivers are protected against many of the computer crimes committed on networks and the Internet. Another way of providing authenticity to network transmissions is by using a digital certificate. Just as your personal signature is connected to you, a digital certificate provides a way of proving you are who you say you are.  HYPERLINK "http://www.globalsign.com" GlobalSign.com has lots of information about its digital certificate product and other useful information about this technology. You can get a demo certificate, find someones certificate, or get more information about how to use your own certificate. Public key infrastructure (PKI) is another method for providing secure authentication of online identity and makes users more comfortable transacting business over networks. Ensuring System Availability Many companies create fault-tolerant computer systems that are used as back-ups to help keep operations running if the main system should go out. These back-up systems add to the overall cost of the systembut think about the losses if the system experiences a significant period of downtime. Add the cost of lost productivity by employees to lost transactions and unhappy customers; you do the math. Just imagine what would happen if an airline reservation system (a typical online transaction processing system) went down. Have you ever called a company to place an order for a new dress and it couldnt take your order because the computer was down? Maybe you called back later, and maybe you didnt. Make sure you understand the difference between fault-tolerant computer systems and high-availability computing: Fault-tolerant computer systems promise continuous availability and eliminate recovery time altogether High-availability computer systems help firms recover quickly from a crash Fault-tolerant andHigh-availability computer systems use the following tools to ensure digital firms have continuous computing capacity available: load balancing redundant servers mirroring clustering storage area networks As systems become more sophisticated and able to self-diagnose problems, recovery-oriented computing will go a long way towards helping businesses get back up and running more quickly and easily. Security Issues for Cloud Computing and the Mobile Digital Platform The concept of cloud computing sounds like nirvana to many companies. Someone else takes the responsibility of building and maintaining very expensive information systems. Someone else spends the money and time to ensure the systems are up-to-date and use the latest technology. You only pay for what you use. Sounds great until you consider the flip side of the coin. Just how secure is your data stored in the clouds? Security in the Cloud Regardless of where your company stores its data, performs data processing, or how it transmit data to and from, your company is ultimately the only one who is responsible for security. Even if a cloud provider has every security certification in the book, thats no guarantee your specific servers, apps, and networks are secure. When it comes to, say, compliance with the credit card industrys PCI DSS (Payment Card Industry Data Security Standard) a retailer or credit card processor is audited on how well their servers and applications are deployed on the platforms provided by a cloud vendor such as Amazon or Google. If you set up your applications badly, says Staten, it doesnt matter how secure the platform youre running on is. Securing Siemens cloud environment required looking at IT from the outside in and securing every conceivable path by which a user could access critical information, says Kollar. Securing each platform was not a significant challenge, he says, but ensuring all the needed security technologies worked together was. Staten says it may require architect-to-architect sit-downs to assure a vendor hasnt, for example, cut costs by simply giving each customer their own table space in the same database, as that would allow any customer to see any other customers data. (InfoWorld, Busting Cloud Computing Myths, Scheier, Robert L., Jun 22, 2009) Securing Mobile Platforms Hackers will go after your unprotected smartphone just as gladly as they will your desktop or laptop computer. As Internet telephony and mobile computing handle more and more data, they will become more frequent targets of cyber crime. From the outset, VoIP infrastructure has been vulnerable to the same types of attacks that plague other networked computing architectures. When voice is digitized, encoded, compressed into packets and exchanged over IP networks, it is susceptible to misuse. Cyber criminals will be drawn to the VoIP medium to engage in voice fraud, data theft and other scamssimilar to the problems email has experienced. Denial of service, remote code execution and botnets all apply to VoIP networks, and will become more problematic for mobile devices as well. Patrick Traynor, an assistant professor in the School of Computer Science at Georgia Tech discussed the concept of the digital wallet, in which smartphones store personal identity, payment card information and more. Already in Japan, people use their cell phones at vending machines and subway token dispensers. According to Traynor, malware will be injected onto cell phones to turn them into bots. Large cellular botnets could then be used to perpetrate a DoS attack against the core of the cellular network. But because the mobile communications field is evolving so quickly, it presents a unique opportunity to design security properlyan opportunity we missed with the PC. (Georgia Tech Information Security Center, Emerging Cyber Threats Report for 2009, Ensuring Software Quality There are two methods to help improve software programs and ensure better quality of them. The first one, software metrics, allows IS departments and users to measure a systems performance and identify problems as they occur. You could measure the number of transactions that are processed in a given amount of time or measure your companys online response time. Testing software for bugs and the inevitable errors is so important and yet, so often overlooked. The two best methods of testing are walkthroughs and debugging. Walkthroughs are done before the software is written. Obviously, debugging is done after software is written when errors are found. Here are a few items cloud users should address with cloud providers: Make sure all the answers to these questions are documented in a service level agreement. Are data stored and transferred at a level that meets corporate requirements? Will the cloud provider store and process data in specific jurisdictions according to privacy rules of those jurisdictions? How will the cloud provider segregate corporate data from other companies data? Are encryption mechanisms sound? How will the cloud provider respond to disasters; will the provider completely restore data; and how long will it take? Will cloud providers submit to external audits and security certifications? Biometrics is based on the measurement of a physical or behavioral trait that makes each individual unique. Questions: Discuss why wireless networks are more susceptible to security problems and how businesses can protect them Wireless networks are more susceptible to security problems because they are built on the 802.11 standard of transmission that allows computing devices to easily connect with each other and transfer data. The service set identifiers (SSID) identifying the access points in a Wi-Fi network are broadcast multiple times and can be picked up fairly easily by intruders sniffer programs. Corporations can protect their wireless systems through a combination of Wired Equivalent Privacy (WEP) and virtual private network technology. Discuss the security issues associated with cloud computing and what cloud users should do about them. Cloud users are still responsible for their data, how its processed and stored, and how its transmitted. Most cloud providers will not assume security risks for user data. Some of the ways cloud users can address these issues is to develop a service level agreement that includes documentation addressing security issues and make sure they understand what they will be responsible for versus what the cloud provider will do. Discuss the threat employees pose to information system security Employees pose serious threats to a security system because of lack of awareness about security vulnerabilities. Employees fail to adequately safeguard their passwords leaving the system open to theft and misuse of data. Employees may enter faulty data into the system or fail to process data correctly. They also can misuse and abuse an organizations hardware, software, and data. Discuss three laws recently passed by the U.S. government that created electronic records management obligations for businesses. Three major laws recently passed by the U.S. government to help make data and information more secure include the HIPAA (Health Insurance Portability & Accountability Act), the Gramm-Leach-Bliley Act, and the Sarbanes-Oxley Act. Discuss the elements of a good security policy that every business should have Security policies should cover acceptable use, user authorization, and authorization management systems. The policy should include statements ranking information risks, identify acceptable security goals, and identify mechanisms for achieving the goals. The policy should describe who generates and controls information, what existing security policies are in place to protect information, what level of risk management is willing to accept for each asset, and estimates of how much it will cost to achieve an acceptable level of risk. Describe the roles of firewalls, intrusion detection systems, and antivirus software in promoting security. A firewall is a combination of hardware and software that controls the flow of incoming and outgoing network traffic. Firewalls prevent unauthorized users from accessing internal networks. They protect internal systems by monitoring packets for the wrong source or destination, or by offering a proxy server with no access to the internal documents and systems, or by restricting the types of messages that get through, for example, e-mail. Further, many authentication controls have been added for Web pages as part of firewalls. Intrusion detection systems monitor the most vulnerable points or hot spots in a network to detect and deter unauthorized intruders. These systems monitor events as they happen to look for security attacks in progress. Sometimes they can be programmed to shut down a particularly sensitive part of a network if it receives unauthorized traffic. Antivirus software is designed to check computer systems and drives for the presence of computer viruses and worms and often eliminates the malicious software, whereas antispyware software combats intrusive and harmful spyware programs. Often the software can eliminate the virus from the infected area. To be effective, antivirus software must be continually updated. Explain how encryption protects information. Encryption, the coding and scrambling of messages, is a widely used technology for securing electronic transmissions over the Internet and over Wi-Fi networks. Encryption offers protection by keeping messages or packets hidden from the view of unauthorized readers. Encryption is crucial for ensuring the success of electronic commerce between the organization and its customers and between the organization and its vendors. Distinguish between fault-tolerant and high-availability computing, and between disaster recovery planning and business continuity planning. Fault-tolerant computer systems contain redundant hardware, software, and power supply components that can back the system up and keep it running to prevent system failure. Some systems simply cannot be allowed to stop, such as stock market systems or some systems in hospitals. Fault-tolerant computers contain extra memory chips, processors, and disk storage devices to backup a system and keep it running to prevent failure. They also can use special software routings or self-checking logic built into their circuitry to detect hardware failures and automatically switch to a backup device. High-availability computing, though also designed to maximize application and system availability, helps firms recover quickly from a crash. Fault tolerance promises continuous availability and the elimination of recovery time altogether. High-availability computing environments are a minimum requirement for firms with heavy electronic commerce processing requirements or for firms that depend on digital networks for their internal operations. Disaster recovery planning devises plans for the restoration of computing and communications services after they have been disrupted by an event such as an earthquake, flood, or terrorist attack. Disaster recovery plans focus primarily on the technical issues involved in keeping systems up and running, such as which files to back up and the maintenance of backup computer systems or disaster recovery services. Business continuity planning focuses on how the company can restore business operations after a disaster strikes. The business continuity plan identifies critical business processes and determines action plans for handling mission-critical functions if systems go down. Identify and describe the security problems posed by cloud computing. Accountability and responsibility for protection of sensitive data reside with the company owning that data even though its stored offsite. The company needs to make sure its data are protected at a level that meets corporate requirements. The company should stipulate to the cloud provider how its data are stored and processed in specific jurisdictions according to the privacy rules of those jurisdictions. The company needs to verify with the cloud provider how its corporate data are segregated from data belonging to other companies and ask for proof that encryption mechanisms are sound. The company needs to verify how the cloud provider will respond if a disaster strikes. Will the cloud provider be able to completely restore the companys data and how long will that take? Will the cloud provider submit to external audits and security certifications?     PAGE  PAGE 18 45?s t  @ A O P x y < = I J K L l ˽vh.OJQJ^Jh}h~5OJQJ^Jh[kh~OJQJ^Jh}OJQJ^Jh[kh.UOJQJ^J hAh6[h6[h6[CJOJQJ^JaJh6[5>*CJaJhKCJ$OJQJ^Jh[kh 9CJ$OJQJ^Jh[khNKCJ$OJQJ^J+5?  Mkd$$Ifl0%L&4 laytb2 <$Ifgdb2'gd6[&gd6[gd6[   2 S T n  XMkd$$Ifl0%L&4 laytb2 <$Ifgdb2Mkde$$Ifl0%L&4 laytb2 XMkd$$Ifl0%L&4 laytb2 <$Ifgdb2Mkd/$$Ifl0%L&4 laytb2  XMkd^$$Ifl0%L&4 laytb2 <$Ifgdb2Mkd$$Ifl0%L&4 laytb2   , - 7 E XMkd($$Ifl0%L&4 laytb2 <$Ifgdb2Mkd$$Ifl0%L&4 laytb2E F h v w XMkd$$Ifl0%L&4 laytb2 <$Ifgdb2Mkd$$Ifl0%L&4 laytb2 XMkd$$Ifl0%L&4 laytb2 <$Ifgdb2MkdW$$Ifl0%L&4 laytb2    - XMkd$$Ifl0%L&4 laytb2 <$Ifgdb2Mkd!$$Ifl0%L&4 laytb2- . B s t u XMkdP$$Ifl0%L&4 laytb2 <$Ifgdb2Mkd$$Ifl0%L&4 laytb2 XMkd$$Ifl0%L&4 laytb2 <$Ifgdb2Mkd$$Ifl0%L&4 laytb2  ? @ XMkd$$Ifl0%L&4 laytb2 <$Ifgdb2Mkd$$Ifl0%L&4 laytb2@ A B O P ` x XMkd$$Ifl0%L&4 laytb2 <$Ifgdb2MkdI$$Ifl0%L&4 laytb2x y XMkdx $$Ifl0%L&4 laytb2 <$Ifgdb2Mkd $$Ifl0%L&4 laytb2 XMkdB $$Ifl0%L&4 laytb2 <$Ifgdb2Mkd $$Ifl0%L&4 laytb2  + < XMkd $$Ifl0%L&4 laytb2 <$Ifgdb2Mkd $$Ifl0%L&4 laytb2< = > I J K 7RSXVVTRVMkd $$Ifl0%L&4 laytb2 <$Ifgdb2Mkdq $$Ifl0%L&4 laytb2 7QSx *+ '(67F󰣰|hThThT' *hjqhX56OJQJ\]^J' *hjqh 956OJQJ\]^J3j; *h[kh[k5B*OJQJU\^Jphh[kh 9OJQJ^Jh[khEOJQJ^Jh[khXOJQJ^Jh[khDOJQJ^Jh[khNK5OJQJ^Jh[khsh9OJQJ^J *hjqhNKOJQJ^Jh[khNKOJQJ^JSGH)BC8HIYZgdXgd~gd[k]gd[k]gd[kgdsh9gdXgdXFGHRi)BC8HIӹsseesseQIh"h[k6&h"hw:56CJKHOJQJ^Jh"hD6OJQJ^Jh"hZ6OJQJ^Jh"h 96OJQJ^Jh"hNK6OJQJ^Jh"hsh96OJQJ^Jh}hsh95OJQJ^Jh[kh,KfOJQJ^Jh[kh~OJQJ^Jh[khcOJQJ^Jh[khXOJQJ^J$h[khX56OJQJ\]^JIW"&WYZ_dW`iADdevviiiiiiivih[khNKOJQJ^Jh[khLLOJQJ^Jh[khDOJQJ^Jh[kh~OJQJ^Jh[kh L OJQJ^Jh[kh`OJQJ^Jh[kOJQJ^Jh-Dh[kOJQJ^JaJh"h[k6OJQJ^Jh"h[k6OJQJ^JaJ"h"h[k56OJQJ^JaJ' `t    a b Y!Z!}!~!!!!!!!!#+#S$$ؾ󣖣ˣ~qcqh[khNK5OJQJ^Jh[khNKOJQJ^J *h/OJQJ^Jh[kh+OJQJ^Jh[kh~OJQJ^Jh[khwOJQJ^Jh[kh~5'5OJQJ^Jh[kh~5'OJQJ^Jh[khDOJQJ^Jh[khTy OJQJ^J *hjqhXOJQJ^Jh[khXOJQJ^J#  : ; c [!!!!S$T$$$@&((C*D*?+@+|,},dd5$7$8$9DH$[$\$]^gd6gd~gdX & Fgdw$%%&&4'5'''?(@(g(h(i({(|(((((((()***A*C*ϨqddWdJdh[kh^OJQJ^Jh[khDOJQJ^Jh[khNKOJQJ^Jh[khNK5OJQJ^Jh[kh:f5OJQJ^Jh[kh:fOJQJ^J *h[kh~OJQJ^J h[kh60JOJQJ^JaJ+j>Qh[kh6OJQJU^JaJ%jh[kh6OJQJU^JaJh[khDOJQJ^JaJh[kh6OJQJ^JaJC*D*Q*?+@+++++4,I,O,_,{,},,,-------- .....˾˾˰ˢ˕zmmmm`R`h[kh5OJQJ^Jh[khOJQJ^Jh[khM9OJQJ^Jh[kh^5OJQJ^Jh[kh^OJQJ^Jh[khLLOJQJ^JhTh7*5OJQJ^Jh[kh7*5OJQJ^Jh[khDOJQJ^Jh[kh7*OJQJ^Jh[khNKOJQJ^Jh[khy$5OJQJ^Jh[khy$OJQJ^J},....N0O022A34668:;;;;=gdX ]^gd. ]^gd6gd?dd5$7$8$9DH$]^gd ]^gd gdXgdX.........?/@/P/Q///////O0W025363A3e3鏂mXmIh[kh#COJQJ^JaJ)h[khDB*CJOJQJ^JaJph)h[kh#CB*CJOJQJ^JaJphh[kh#COJQJ^Jh"OJQJ^Jh[kh?OJQJ^Jh[khDOJQJ^Jh[kh05OJQJ^Jh[kh0OJQJ^Jh[khX5OJQJ^Jh[khg'OJQJ^Jh[khXOJQJ^JhUOJQJ^Je3f34444g4h4444455p6666666s7t7~7777-8;8ǽǰǢǕǂoooZ(h[kh`Y5B*CJOJQJ^Jph%h[khDB*CJOJQJ^Jph%h[khXB*CJOJQJ^Jphh[kh OJQJ^Jh[kh#C6OJQJ^Jh[khDOJQJ^JhTOJQJ^Jh[kh#COJQJ^JhTh#C5OJQJ^Jh[kh#COJQJ^JaJh[khDOJQJ^JaJ;8<8j8k8888888 999999:99999*:+:::::(;);o;p;;;;;;;;ٳƠƠƠƠƠuj *h}OJQJ^J%h.hTB*CJOJQJ^Jph.jh[kh6B*CJOJQJU^Jph%h[kh6B*CJOJQJ^Jph%h[kh?B*CJOJQJ^Jph%h[khDB*CJOJQJ^Jph%h[khXB*CJOJQJ^Jph%h[kh@B*CJOJQJ^Jph$;;;;;l<t<<<<<<===========>>>-?F?G?I?O?̦̦̙̾~~̙n`Sh[kh`YOJQJ^Jh[khX5OJQJ^Jh[khX5OJQJ\^Jh[khDOJQJ^Jh[khM95OJQJ^Jh[khM9OJQJ^Jh[khXOJQJ^Jh}5OJQJ^Jh[kh@5OJQJ^Jh[kh@OJQJ^Jh[khXOJQJ^J *h}OJQJ^J *hjqhXOJQJ^J==>>>??ACCCSCTCDDEEEEGGII^L_Lgd r ]^gd4gd#(gdp~gdjqgdjq ]^gd6gdXgdXO?V?a????????]@^@j@@@@AAADBEBBC2CACBCCCQCRCSCTCɼ䯢tg]V h.h.hp~OJQJ^Jh[khp~OJQJ^J *hjqhp~OJQJ^J#j *hjqhjqUmHnHuh[kh7*6OJQJ^Jh[kh7*OJQJ^Jh[khDOJQJ^Jh[kh6OJQJ^Jh[kh+/OJQJ^Jh[kh+/5OJQJ^Jh[kh`YOJQJ^Jh[kh`Y5OJQJ^JTCbCDDDDDEEE!E(EHELEEEEF#F*G+GGGп{naTnGnTnh[khXOJQJ^Jh[khDOJQJ^Jh[kh4OJQJ^Jh[khlOJQJ^JhThl5OJQJ^JhTh#(5OJQJ^Jh[kh#(OJQJ^Jh[khp~OJQJ^J *hjqhp~OJQJ^J!h[khWtB*OJQJ^JphhjqOJQJ^JhXTOJQJ^Jh[khOJQJ^Jh[kh5OJQJ^JGHH1H2H3H>H?HHHIIIIIJJKK KKKKSKgKhKKKK󥘥}p_pK_'jRh[kh_JOJQJU^J!jh[kh_JOJQJU^Jh[kh_JOJQJ^Jh[kh r5OJQJ^Jh[khkOJQJ^Jh[kh?OJQJ^Jh[kh rOJQJ^Jh[khDOJQJ^Jh[khh0JOJQJ^J'j%Rh[khhOJQJU^J!jh[khhOJQJU^Jh[khhOJQJ^JKKK]L^L_LHNINNPQ5Q6Q7Q8QjQtQQQQ,R-R9RxSƹoobUHh[kh4OJQJ^Jh[khg OJQJ^Jh[khfWOJQJ^J *hFYh r5OJQJ^J *hFYh rOJQJ^Jh[kh6OJQJ^Jh[khDOJQJ^JaJh[khOJQJ^JaJh[khOJQJ^Jh[kh rOJQJ^Jh[kh_JOJQJ^J!jh[kh_JOJQJU^Jh[kh_J0JOJQJ^J_LNN6Q7Q8Q-R9R7TX9X:XYY]]]_gd"gd" ]^gdh^hgd" & F gd"gd"gd"dd5$7$8$9DH$]^gd=A ]^gdzBzrzszzu{v{{{{{|||}|||˾˱˱󤗤}pbpUUh[kheOJQJ^Jh[khM]5OJQJ^Jh[khM]OJQJ^Jh[khshOJQJ^Jh[khOJQJ^Jh[khvOJQJ^Jh[kh7>OJQJ^Jh[kh1tOJQJ^Jh[khDOJQJ^Jh[khK>OJQJ^Jh[kh5OJQJ^Jh[khgdbqgd;}gd. & Fgd.gdg ')Yhkz|&(f泥}pcpVVHch[kh=o>5OJQJ^Jh[khD_OJQJ^Jh[kh=o>OJQJ^Jh[kh^GOJQJ^Jh[khbq5OJQJ^Jh[khbqOJQJ^Jh[kh;}OJQJ^J *hjqh;}OJQJ^Jh[kh.OJQJ^JhFYh1t5OJQJ^JhFYh.5OJQJ^JhFYOJQJ^JhFYh.OJQJ^JhFYhP@OJQJ^Jfhz(*hiÄĄńCDM˾˰斋}o}bTFTh[khDOJQJ\^Jh[khtOJQJ\^Jh[kh;}OJQJ^J *hjqh;}OJQJ^J *hjqhg OJQJ^J *h}OJQJ^Jh.hOJQJ^Jh[khOJQJ^Jh[kh=o>5OJQJ^Jh[kh1tOJQJ^Jh[khD_OJQJ^Jh[khD_5OJQJ^Jh[kh=o>OJQJ^Jh[khg OJQJ^JMNḣχ GQabɯɇyɇk]Ph[khCOJQJ^J *hjqhg OJQJ^J *hjqhCOJQJ^Jh[khW5OJQJ^Jh[khWOJQJ^Jh[kh;}OJQJ^J *hFYh;}OJQJ^Jh[kh1tOJQJ^Jh[khg OJQJ^Jh[khDOJQJ^Jh[khNK5OJQJ\^Jh[khNKOJQJ^Jh[khtOJQJ^J·χΊϊno NONOđőG' & Fgd=~k & Fgdgdzfgd=~kgdCgdCgdWgd;}gd;}Ίϊڊ_no)*45n $%;I}~23Pc京䟒ʒʒwjjjw\h[khF5OJQJ^Jh[khZOJQJ^Jh[khg OJQJ^Jh[khzf5OJQJ^Jh[khzfOJQJ^Jh[kh=~kOJQJ^Jh[khNK5OJQJ^Jh[khNK5OJQJ\^Jh[khDOJQJ^Jh[kh1tOJQJ^Jh[khNKOJQJ^JhhC5OJQJ^J MNOg`ađ GZ[ޒ'˻خء˔wiYK>wh[kh=~kOJQJ^Jh[kh=~k6OJQJ^Jhh=~k56OJQJ^Jh[khC6OJQJ^JhhC56OJQJ^Jh[kh;OJQJ^Jh[khNKOJQJ^Jh[khDOJQJ^Jh[khg OJQJ^Jh[khzf5OJQJ\^Jh[khCOJQJ^Jh[khzfOJQJ^Jh[khF5OJQJ^Jh[khFOJQJ^J'@b+3uٔܔݔƸqYDq(h Ih I5B* CJOJQJ^Jph,a.h Ih I56B* CJOJQJ]^Jph,a%h Ih IB* CJOJQJ^Jph,ahNKOJQJ^Jh[khNK5OJQJ\^Jh[kh;OJQJ^Jh[khCOJQJ^Jh IhC5OJQJ^J *h;+hC5OJQJ^Jh[khOJQJ^Jh[khNKOJQJ^JhhNK56OJQJ^J' ?@<=gdCgdCgd1tgd1tgd)gdCgd IgdC & Fgd Z[:YZ_`?@BC Ȼwj]]O]h[khE}5OJQJ^Jh[khE}OJQJ^Jh[kh1tOJQJ^Jh Ih1t5OJQJ^Jh[khOJQJ^Jh[kh)6OJQJ^Jh[kh)5OJQJ^Jh[khDOJQJ^Jh[kh)OJQJ^Jh[khCOJQJ^Jh Ih)5OJQJ^Jh IhC5OJQJ^Jh Ihx5OJQJ^J ʜ̜͜qw֞*+.8=ޡ̽uugugguuh[khb55OJQJ^Jh[khNKOJQJ^J *h;+hCOJQJ^Jh[khQCJOJQJ^Jh[khCJOJQJ^Jh[khDCJOJQJ^Jh[khCCJOJQJ^Jh[khCOJQJ^Jh[khE}OJQJ^Jh[khDOJQJ^Jh[khb5OJQJ^J$ƤѤ'+ϥvii\Oi@h[khNKCJOJQJ^Jh[khQOJQJ^Jh[khDOJQJ^Jh[khb5OJQJ^Jh[khNK5OJQJ^Jh[khb55OJQJ^Jh[khNKOJQJ^J!h;+hNK6OJQJ\]^J!h;+h/ 6OJQJ\]^Jh56OJQJ\]^J'h[kh/ 6B*OJQJ\^Jph3jS *h[kh6B*OJQJU\^JphѤҤcFGj (3IJTgdfW & FgdG & FgdGgdGgdg  ƧǧȧfgΨc;͗;ygYL?h[khGOJQJ^Jh[khg OJQJ^J *hjqhg OJQJ^J"h[khNK5CJOJQJ\^Jh[khDCJOJQJ^Jh[khCJOJQJ^J h[kh.]0JCJOJQJ^J+jh[kh%!CJOJQJU^Jh[kh.]CJOJQJ^J%jh[kh.]CJOJQJU^Jh[khNKCJOJQJ^Jh[khNK5CJOJQJ^JOP`}BCƬ0j| 3IJU䒬DŽwjw\wh IhfW5OJQJ^Jh[khhOJQJ^Jh[khfWOJQJ^Jh[khGOJQJ\^JhhG5OJQJ\^Jh IOJQJ^JhhG5OJQJ^Jh[khDOJQJ^Jh[khG5OJQJ\^Jh[khZOJQJ^Jh[khGOJQJ^Jh[khG5OJQJ^J"TU˱̱:μgd.U h]h^gdpv ]^gdu ]^gdpvgdfWdd5$7$8$9DH$[$\$]^gdl|gdfWgdGʱ̱³ó 78KLUVlm12:Fce朏xhhOJQJ^Jh[khhOJQJ^Jh[khfWOJQJ^Jh IhfW5OJQJ^Jh[khl|0J6OJQJ^Jh[khl|6OJQJ^Jh[khDOJQJ^JaJh[khl|OJQJ^JaJh[khl|OJQJ^Jh[khfOJQJ^J.-.=>ͼμ9~$%=VٰvfvWvKhpvCJOJQJ^Jh[khDCJOJQJ^JhpvhD5CJOJQJ^Jhpvh.U5CJOJQJ^Jh[kh.UCJOJQJ^Jh[kh.UOJQJ^J *hXTh.UOJQJ^J *hXThjqOJQJ^Jh[khu6OJQJ^Jh[khDOJQJ^Jh[khhOJQJ^Jh[khuOJQJ^Jh[khpvOJQJ^JμfU"Cs~vh5$7$8$9DH$^hgd;+ & Fgd;+gd;+Q% & F Eƀ#&^gd;+ & F^`gd.Ugd.U s~dRV;<)ƷƣyoyoyoyoyaLaLa)hahaB*CJOJQJ^JaJphhaha5OJQJ^Jh;+OJQJ^Jh[kh;+OJQJ^JhXTh;+5OJQJ^Jh[kh;+OJQJ^JaJ'hahaCJOJQJ^JmH nH uh[khDCJOJQJ^Jh[kh.UCJOJQJ^JhpvCJOJQJ^Jh.hpv5CJOJQJ^Jh[khpvCJOJQJ^JdRV;<)*%gda%h^hgda & Fgda & F5$7$8$9DH$gd;+ & Fgd;+gd;+h5$7$8$9DH$^hgd;+ & Fgd;+ & Fgd;+)c{|*+q% & FgdP%gda%h^hgda & FgdP%h^hgdP & Fgda%^gdaabc|7+q®®®®{w{w{w{wmgmgcmgmXmgh`n0JmHnHuhWt hWt0JjhWt0JUhb2jhb2U)hahaB*CJOJQJ^JaJph*haha5CJOJQJ^JmH nH u'hahaCJOJQJ^JmH nH u*hPha5CJOJQJ^JmH nH uhP5OJQJ^Jhaha5OJQJ^JhahP5OJQJ^J"%^gdagd[k &`#$gdY )hahaB*CJOJQJ^JaJphhb2hWthF*8hWt6CJ=hxhxxhxhxxhxhxx.........0P&P8$:pV,/ =!"#$% Dp@= ܜT걖mAapɂXЃx=-շn vВ%$dlP'"@MdXX$A 2'ol0|kCkU͚s̷̷Nt_?o:Ow?oVNݟ?ߞϧO_ ۟?O˧ۿ/Or _7<@:t@:t[W_~믾._z݋ɓ+ʓP*o%wy⭼8lUֿӇ?~Ƴgտ?4:/!S}P,}OŃ<<9Rܚ抿TF(I:ыSKkmww=Sljlr}eoOpe*j9q*lifmekETlZnlgZJWږ]I[W~r^]XwWڶJ[TlZN@+]k-{yyD+mwٴ-]>`N}J߶ogϩ~5vq־IEVu<֦W|idʊ_9u,nߛ{t@t:3Pm_zv^j:=>qڠTm[MŖ`|8*o[tGm:0{ NJ~ :`է^ e Gar7Ug"ӷuF7Xyŕl-/ݣۗ-{m^Pm*Zn*\ =:਼핹Y[txl&Rcz6|3^S_ K2zy2ǘXY:F;|:f&Lܮ(r\|׍Iq:m-cbq]hsrQymSFbTzKe3ίsy8wWLq>H8)_-gN9.n#ZӾ3eZsij?ӻPiVVg̖`张h{IϿ=?ߋC\3͟;dzp}Xrtig@@:t@:t:xz=~_ _S^WNv'ǯ?|C[ѡ:|`vW>m’o6oF/_OI|ӏ~_K=x6te9U;Ok}Ѹ\FSqiLF6tGTyŨL{kzqhQ>ݺŨXhj9b֨Mq5eT|ݾF|OlkצZɓr #v%7h緟ƩY驔Ya%#mw{Y5k{ZiKÌ,-{5|Zc ඿Gw9VϷ;z>.U`YifMZkCl{*GO12=++}fy0J\8ļ} Zy=:`d8w~k{:#{u4v|-ڤR׷Vݶ?ܳj{WTת6}O[8Hà^t24>{gη'3Vi]J:g>3Ns=vzQ핳j\Fk,}fyqLQon:b-:`d\[ǮtڔuU}ՊMr]ߒǣ6jGV#t@|-ai8'?ѿh?R0+cJy {g?`T{s:=ZZ;^YgVg@ŮvG9>.+*ToY;Ҫ=?Vn:ӆ[{aYol@O::kGev [ap/:mV}g?9#ѫ>4{}9/8m\o0j7|F eǑ{Ls 8m)GsazzLO+qmf鮜1YY^9wxϠugG{̯܊l sf}^ۨ=/(G$ƿצΓvr7*g[t@ocʹcMc:mFO|m0GeyA-=7m9/hmHa> :E䳄[Ya_y}\;$Zȣ>,z|n.z6xis6ы3mlrzfOhV٦3G<Btx&|\k8.c=\,v9ڹe=V)v)[ʓJiY]ߒǽo7gFv4c4ƺ9*_ TœlCbڠ-YaUf6 p:R\K05 <-@:t@:t@rzw_zO΃=z.zy耧?oߛ//.>oy-Mp8w4v-_X(ct\#o<{/yCs3t:lmP}=lkzm0m*v>G-eKo?١FFZG~\G㐟SY.Gzg[󮧱Vw%ݣ4@VG{qliVX&[{`ZmLMlkKާ3jq#86+V1:`܏Z3ߪ'Q۪Qn9AnΪmZv/fN9,}Wrr82\ZWܚwY+QWA{ǖ^RjVt\ZXem9=:`dAתvE:<: ht-)Ћ묯_ڠV¶}(Wϵꀞoڑ:`Kּk+{YWAǖl%}b9u@mޢFycfvE:<:8Z}=xrn}y1^PQ:`O?]S=RlɟYFa[JlGJW(sfu7hJWtyt@o<&pZ9y©:]޷W#"|T'3n`~Wӽg> {d{|Z[1t@\;zs!1~*YYOZo+\7?l[cïY^֔[g=/+}['3Z*ړwHrG{z]Vي\玨qZOY 5^;cܱ>gs+烌}#=OܟF?s;׳q69~4~qo9O_} /Ok!Pp^x׿[}hk]w]kBzp?@gkt{'L;ߋkx7a¬G.[^Gq{+i㾎/?l+2qi}%|X)ܨn< syvXNumguu] =-_^GBo ǾLX+ȏq|ٚoxF+Z_ӻsֽtM%`[(7[<Գ1zF鞕[zFﬔíecK9<7[#l-e?qZvGo'Wml }=3Gޭgv:tK7l5&Fh@u,HTխ]g?7Ct:} u#?j9X:0G;4d;lk zMKї5{F>FsW_ξc~osxy.WtBNH>ߪ?y>7r0˛ܨn첧<=|V6m,uTsZ%|xꚧ_gkv^f8wςOl{uwYTln:\9/(aT[e#rʛs5˞ldI8k^}V>Or|? e{Y={voUN}ޘy~ [}mmwfhQ~|? a48IQ)=7[=)Q XSgݫY /^>8Ʈ5龶EYnK5Yt:HgOgVA^lUN|Z.py}U]佞^ @:t@:t@:p :xK^{sov?p~}W_<{ 7_W a֛/?{ߺ>c~w*Jlw^=t F|ćjVmъk4n{]+:@ު*aœEio{عWP1}1M8x99͞@ܟ4@ߢ+{|:WTŽc߷Q͞*ikguE1M=-Ҍ/ bF~:-:`vk52C٧oWPCkx+ښf- Xc `_2=0XV uk[s|, 3[t~*:wGl=9iX{ -Fkf(?ugD{p}NQh8⼠|., |[wD߭7gWsp:>l<+;y~^1x^nXV>ϿaG?_Ƶq,>[i.XcLb}^[Ԛr\Rt뀕54T9gn> иHct>:^u$5O'kov):pn0ۏt59:t@:@t@:}[ob @{gV\镝C\[qqtѳ1>zO@OtE['*_ux_u]/c9< ]};ΎO+ 늃ӡ}l&+FV|;ї3=Eٮ+qth9G+VutG+ UZZE*=q#_>|Khl_:wqt:S||̬%=}К:=([bmZ±Z^SV͊eFڠ|/V\z tcmxu_?z>5?[4xMP\&@Coy>oWto>z@O ty=[xMP\$F7`?vJkO?0?>gz=qyAս~^i|D2>KTxN yAQK49 y 8/U_,ʏY=佳x{}c_ٗ6w߭yZf[‰k\[et\v/gt5[Wt:`M0t:ul݂س{M:t1o|;?~{hoW_{?O 2(nٳAM3ng/^@myo /$w{q ř8 ~ӏ~6UaַTTQ8~: U7]c]ìٟr}3VY5VJ(e4W"+6ߕKsu<3ιjVۥJ==_o9ۂ-u0㩸;ϲ9*gWwf}BojY8_~i:-. (fmDL5Pm'/n&Q_R^WF[[y`~g-U?b?Ǿf񬜢;Ⱦv߶4|mWn֠>~(oz}qk-5]o4Wu5rk Q+[)z\Uy`s*ϏE/>ҷTuMlSW<^߫w?^Y1y{ֺ{kPr[>꫶Jxtx+6Vl~o*GlTnz4(.3֗+Q:5w5̓yȾ525pc|lMy, XAzߓ漷` QC~+zUtyS< ~ǿWVLNsUvUﯖJ=í:m:`ϊ`k[[)6XisY9F떶 p=MyYy /[ol[|-mv-^GUdk?ZGkQi_5˴}<Q{ܭ[U{ꨌVeTF٪{JS-|2ۚmm'{Jۨxz~"[JyXA^nS# 7MoX3<|@7 zޚVm<[Wt@ O{1֘k,w{*4/1P)z2кo6-RgZt?|:N:*SGlT ƬW#*u)yʖ|.?b՟yDףbkMzzQq嶷-ճ{uu uװ?{r^wg{nFesGh=Ufkrƹ4޷zfeR{[ioq=x`֔l>l=J-uyH|w_{[w+Z奕f̑z[Ə앳6VΆZ o{#Ξ=zTo]c8^z߷}6?jnu*}V kRڽw-qv: &:R+>wA>Sv9⼠\6zsw]rvNoZ^l{Z[c۫8ijWqS掿mi=|0@dlyA2Zǭz%ޗMj V`e5v0Gb֮}Ks&=Ųz;!ΡU0ꫪ}v/n1-| r[kGy j3sDy^c|~BOqٻrޭ5u_}?@Ƴsَk6ow%Uϲζj1/YߙWnWΣu]ygs[<_ڞ{ɓl׬n,:} x9oԴ}мuunCJ}xtt:@:t@:t8߽K矞~͇믿w9x_}э?tS8z{{wճ1?~9<]]bdV헿ݫ=+GٲO?of]L)b<:u|OX.>|L’?)QωP_eкֳ֢z}/m<#[}_OX[}~,Tó/#tM>z/? q̶s~x}1^X]|˖,5=Wu@UC͝f+8N{}hJx4@5?y9q/~td gg[[:@k]:xo+~zuF#80 zc<ӽܿ8BɿZ{LWz.c_}q,٘|Q^lxiF)}}xǝ[oz}y]Pe>@c{b~ݸ W[y9L?z p: ?F?=ߣkqsg{k~]kCﮤ^e@?e+Cp: $0=>~rOսνyAF|N~5}x^t3? n `k+YZalx^cֽW953Mҟ [ \8n48l٠7V5K|ofA%Q*qZ@olӟ OwTTٳ.h.^tגGvՑ:hr]btx:kxzhmȑ: # &^~T~v6}J%lx<>{Sqw?g6@:t@:tܻxW`-; @t:P:}[Ϟ>ӋW~zow/='[>GklW] )Lfiml{({OmalU=4]%V*zW޳7S:6gVyD]%Ezigg=ߣ4ni#t(M1Fvj-Oq\Wu@n6k1c=:ZC:r߫8t 5f}=Q-:cq9+6hK) f[8l[3>Ì~hS/NJ7#k> IjsdQywqoOף>[Ou_lWGX+u:@Z)֟\~GkwQ\ G >s|f$i}Zv6|}=|+? 8B1]Gq4{V_Oֳ&̶պ~iVg66uy﷣t@+^Gi޺ n3O˺!:F._8Z$cGKw_񻏨U}}1ۭ}LOg>@~Ց: DZCmYYӬ{NCkIڛOb^sV}-:`Kyjmz=Tt@fXr>yuS{;x?h^]%[(nq^;\|_\xouu}|fN_\;:iEĵr;+vPm:`Kyjmx~O+L?jR]wg6ۻ?`dtjeQUOr^P^|-Wl@ŗlg~}ѧ;d[?֙30K/MzgŮ|3Vu4YP-Zhdl~\G:`kE]ƚ @\o{)f:r|hxɟTg7n=_}|O87S\zmEl-O׌isп1݊lVfآHɣ\]93=/(^u=]߹|op:!)1st:^wY>{Pw Y2^Ӿ UjMzzT]< ?Q}tOsO[}3ޣ{vu|D'O?~z3_s|y|IY~-@j{_t:p7V1dAzQ{kvFSїZgZ^1Z?V:Za)]1_Ң1-~YO_k٣*{}wz5G+~,m_~w+,-WsN{'fywڞc<_sRMKF'έRs'5kT{C%?{ezi$_s}h39Qy 5?أtt@oz7V_~Weo}^ Kbt),㰷ƻL؊h+<omh[Vd_6+ni~&rVk Z%ay 5pG`l3k|T gV*i㝵@˾+YUaD{sv|춢61ooҞokrx9)9-:``:ΩԟtȧP_=>W=q|~Ŷ֘kD[Evin%[u@wWΏQ-i[$򷒖Qqͣ'[<4ˇ^~VtVk$V9ثZmPl#rۡsGľTVYZ1s耖7f[kFs mW|iY|V헝#}M氜%xlb_72Kl]P+}xJyũn5?{6k[9_@?h[olF= :?lv7m՗{^o59.GŽu-ּBZj>e5f]JTl7 uo[JUK<wTb+m+יx-p㻫ǭsҲe>DZg|@Ϯ-|띘G/t@k}mQ[kn!_R5GY;#߶ZlrZ*Z`2'{r{be7nߪmV|e(Sgf{suB -zI.Y?ļ۪*Q/r->iOgq`ߕVs{碴t5l9/Haz~<_6ٶw8~%{㨣qw:S=F>Hz+Er{C+x}\JZz: q/>gZxʹ}d?+=sTgCyAF{ }7fc$^ɏVx: <{٠|#f?g{kWc_ų<֬{V??D_dP?筏l;'D0yi:u'~!?qhM86=h-{o?Dմtl_kJh=Hhy8t/:o09k[\%׽3-ǷA[\H=%ߘv{U)w3xZ\z t@:@` t@:t_z݋+F|#u :@:ZƳg_}o|oW8ѳ?!w9x~^}7쓨'xfdǞmc|dwtҮ68`E~EcZ5iLug:>uƣlzxeFo3_/wg~dY|l#Kh=5۱gӲ5@Li館{Y~0'_>ޛW~oˇWxʇwkJGvǶh={wE]Ek fSg{[׈(اmkdQ;#;c[D;#t֭4ҖYtΫFVet׹ +^[4V;t,^մ*tu낪1N{zzM^1>8<[u@%?zq@w?F~~%-2'ެخnqcV⳺? GZJ~TlX? _x̗n}S߾nOG\I~Գy(\#c?>YIc>>1^><Dg6'i0t|>^]Slޙ?yPk,?Fe]=r4SZž_t:^6=W 큭;{`+:[@:G]z=>޻lxF 6glپiw38=*gzݭ|BWlZrjJL%G}@.U}~*El~]?g1Ӟ|t@{eNuYfz\5Z>Kiy ^Ymm= KZu^Prv5tFdW*1MWh=JcŦtiKYqh-yz/+:mbKU.*y1?J}7uߕ]rzT˂f=T;W:+w[8Z?+c幭evΓT֑V٬g+gզ+}ƖrjJL5ek_mJ,7>v~]^q8.wJӮ):_IKToΟv_{ 2m3nk\p&VЪ>Zۛ0HpdX9<9mhP<ŕrJÛ[E5@7}ilO}OˮqX#uۿsaﺃOnk[c}FuLoV۳jު}YͯmU{V>Tc5]@+9Yz+׾jt@_T_o_,ԭ/ѸC,xsX5+U5l:v6>U7]-׭ګ#:`Fhn>RY܏z5w=O|=ZFGj{viP)G逽j՞jՙ=ew]Df?>0r:jr *\qk)yG耼-<ϩzwy=X-r]ͷ#:`KuH0ȲZg3Oxd+}.ǎ:R>{ժ=*k |=uk{vј}ڗ]+ptΓnZcV^GF9)g>r-\Yתf}u1Z;ש{oO@ztzVxl^OU֦3o[ϭ8}r}8Oo@e-n OGk=\"گrinj;? }e@.ƭs~[ZO[,Җrf+*宒:[ee$I5{V{GڈޚQF~JY8X=zVFb yjuv9k$qh:j}&TCѪ/ދӺݫz{蕿9|ށ^Њh^0j`C`=\ =4o=07˭tEuv[T}֧Ox\PqzzxFUzK:>|ܴ؎+>hV>7Mzb.GlZ}(+{M>lV>+6[UϧsV}Jw~ MZ}Z9Ymosv  }9[K}Op}O=Vټ> hwĞ@GگfQעV\-޷[skQ._V4l6ݹk3_{:oMc<3`q[|SW @:tt@:t/_}^|M/[o>^9;g;u<?tڰ7={(]}ڎh-OӿҢ~zBm}{nmj 9:tms?\gUo}TZ>oyH?]/zD;|my*{ ? JG`y>ޫ6zkSi1) 'Q<1 ֘:OGkw}q#kS'?ZwkcnWm i{JQ)Oi9r+wŭfkKݪ7o ֶQrPVۆQ=pQ]mi24KCc9:JG 빫e82O=][unVwu}6.+WZa%OgmӡT۶}fNIεڏ*tU|U$teu@X]SYpqp_uMrO?{+گuc߸v2PijֶWw(,O׼&R-:Uj=.wqjfu=+/sZGcb]-Ok9b;=ϭIqcnU['--m4tR+?.~G9նf)yQ]wJOanN׷4z4ѫ~Glg*?*O=unVwo;qJ;ܪyZi g݇U=߱2|]c\ڤWZtejjg{+~:u@s8k][+zŪ_k[: 2[ӮwڼJ>ӈGOF6uj]-Otc[{ݎoϞUo9;rMZ k~TujЋW+*`T{s1M-:>;GW[О<*Թ-m0+vx/Vtkݫk$#̚?8 mUp.\NVR{[W>G^}{*q_k=k[S}lkZ|h7qV:mu>}X 7UӓE۟9=|8ˆ UQ^|:Z${|@%c>`V8V~zuh>|@<-ն7<-{V\fh5Au:[f{ zuM5:JW̏pV$teu@[k [[Ź:\Osy8z@%=+k Zk;\ֳGgge6Ҳ(/{߳zvy=co%rnշ\zfk*:oⰵVژV^UUu3_{wuVH|nlLQzbc018Nb>ѭ\i]+_+ug[g{uMNVΩG@ l)6&\gpgvs=v<^; kvWxEk]jש={g6+ueYy-К-cP9-8w6D&:.N7Z͎'>&:Gj\w_א߽C^|ZT0 Kk^|̆^G5okOmѿ^ch>yW#{y5ZM׽h_0s{>fLuf[Nknw)>+L<ӧ+NkEV3Jk#9]+m;ʏ˛J oTekƽ#^\MVjw=1[T?_s:tr랖_u'"[r6.G9#_\랖Mz:`TV||ua±oF]cu@KTuoScx}bD{tmUyli/Fe~(jLogwV'|sڳ2gtUt@GEM]erJ<Ṧ5耪:RZ^8V4@UU|_}-~k/>yKlm0ug뭣"-w~;PgZhO=wː򫗶J>uםFbV8alGTۭ3#ܺJٰP# P5mjTlq,mߺ)u k#>϶PbmpN{֮=27,#{oG wJWUM[G^PMj=;ͭJ&:`iѸߖ81kzkaf>o|Ǟ^lO]{k/=КXYTkD^\&Vb~8Y0p>0}3p=:e_3' ^_ܿ|(QŸ&(_97G2sN{VǚZ뽷h;Y~Q>W⳺? %3_G^ e? ߲?/}q{}s$~˾O;o1sڳig\Vf뼠ת91co5ʯ8ig\/5hS=/(+sooy}YǴUt@/?|su9QulR]:2yA8>Ok0{p%q+kclK'mЊ GkYY7Du|;-mwY/yN{9Ϧo}?>kmtfhϵls_ދf9lXTx(P]kzp|Oki7[0+}lU?<&LH\ԲWY@˹~e%â.>-{mkm6מ>5-@@sTJf܎^yO.{[zȏsͽMowatm[ATO|jWέ8W[@:t:[@:t@:ï?|zwN^9֛^|}iUn=m_~C:g e(:O~?tz@ޣtR>zGa\:ZpH)=pS_t(p:@>f6_ֿL'o^{g#1s7'DkTuV{y]Icz92P-cIu%졿sr[ 1 {nKk0ݷo[ڧTxշ5j+}"~V8aw(\þH8N7#ئ!觵ֲֺGߚ ji6kuN"h}^1*N^_ Wl޵j.VٚJ1%ڲU[RW@VE T(ݽr p:@}hLcb{;/u 7 @yeP_pF\w3-ճl}@Qq _yb'|ݺ6)?}soqP}L?JG޵ T˘K%[d_~K^7kCU]-׶?=]o|~"5q>Kp\&7Ac{i[UuU(/<^p<|@~}Qqi\4yml>bkSVպ UEoc{]-ר5>>gHk;|&nat@~ !lGTWc>{y+壷Vd#ut\f_Qiף>R)c[u@Tּ)I\\yA?8l~kdž|c/9КsؿY␟QXo5$GNq#u@cIrGL=:`VW<2SM\܂hc#~zt<ֺ֚ ym9srZgz{t,_{yR)qݺӾe_Go/ﴶⵙҁ=QlكrCZٿpk sv>N~}3wU r\31 3wyA{<yA|=Ƶ|u|֊/?n7}Aw}bSLCo-H+qSn=~XcsϙTxl++w׏9/MYI\җ胨n5Y^>gZ{cZ d㙲GߞkȽy~l}7*" +ziwq]#҉{G~Y<}=/=qDzyr5W#l˽ w#(O>~g~{h:DzЬomg{bHMqmtWKƵY-ĔmYZ&zG[>'{DZ\Y[>>lGmzuU_N9ȳ)PvYk=kwmv:`kij=|{Fs^ލyi_<]RckZv]amI=ee[;(|OkLk|?oRui|?gQ.qOm&z"|finV?~#6M'UlPUڦ;\}L/:E#}^37~ꓫtG}"}ðy꽝1y1G󚞭\7=)gim:6f8ڧog lsby;52f6OK;}_}Xʣ*8> wacܓ[s}cmw~#v;VnVam^#:^?uz/׾{f})Θ9,Szì_9z63-Gk/zj > |sKu39ԦzlUz>~T5>`o\V_lSziwm=kOIwf1y1rDlݫCnm;;"V>F}jýzt1?wd68BۘV:`-u^33N}Qyzƕ:`ꀌؑ9Qy][Y]yf9#Gt\uY{쎥g8 o5Gi:`o@Th47Duhw=J޼ej<\&Wu5cmq03;};lms̞M#Zݷj7;/(ٍq͙1;ezswP/^h^33Qq7L3~wFQЮe[bs@AolMfzm}'^p]8vcdڽghUv;0sqA3:Z%egl ygsbO=Q{ {򜋌EzH;go{1!yIֵDyl$tŽ,v^}u&Mw[tjֹUkQh5?ey6 9}֎fmv>|3GymCZ&5UPiݞ eyy#b?|~@g9,窍YI|DZڤ3bG}#T}H~;Cq֦>s˳ؠ\ͫgkۧ36g0yo{N\z^25HqM΍eja;۾3zϐYl=F}>,gSl3m{tyRsIǭt}eo*ig= (O1 M:ߟb[?S\i^?^Y}y"Q36ׄvsܹ_lS|&Īznq]@t[t:@t:@xi-}o7/>c5gÿw6;#|YL]Zλ㧏 {ئ:ྈv?>NCo3;|}cw/#|{|r3T?Lhdza"Ha[vl#/|qMEggeg3ѶG3>6룞mvis:fw5FΌl'jWTsT%|uN^}ښW/~=O?sTR 궲L 43&'ULS-kH\Pq[kV6m3vuGsR߮r]n,*QH5V7O>f)f";:`waQgr>Gb:wG]؍O]9+u@só69+?͸ȣmibҮGe3,*G[=]nptl}g6FFe썻 UּFK;? W;2|GOeh|1әvs5< 'ի{{gߌ≪_ݞwTWczg:Es=U۝YW:vдci4Rָa۱p漠6^w5~3vtwn?jU~jlTfZ`ajgg"jhƫ{:,=whe_Y4y~*jsh=:9OЋR3ofGf\{kvϲrq_ǶD9]Ж9u}vPSQnjkiegtS.L;졩z,EMp iW缠~SoA?张+Ɩ9z[ gs"͜ž~mwmW:JN]u彳3qaok} V⪱U x9]{Z x'tjoɭVQȳrhc:@:-:@t:@:뀟<<<bc$$If!vh5L5#vL#v:V l&5L54ytb2c$$If!vh5L5#vL#v:V l&5L54ytb2c$$If!vh5L5#vL#v:V l&5L54ytb2c$$If!vh5L5#vL#v:V l&5L54ytb2c$$If!vh5L5#vL#v:V l&5L54ytb2c$$If!vh5L5#vL#v:V l&5L54ytb2c$$If!vh5L5#vL#v:V l&5L54ytb2c$$If!vh5L5#vL#v:V l&5L54ytb2c$$If!vh5L5#vL#v:V l&5L54ytb2c$$If!vh5L5#vL#v:V l&5L54ytb2c$$If!vh5L5#vL#v:V l&5L54ytb2c$$If!vh5L5#vL#v:V l&5L54ytb2c$$If!vh5L5#vL#v:V l&5L54ytb2c$$If!vh5L5#vL#v:V l&5L54ytb2c$$If!vh5L5#vL#v:V l&5L54ytb2c$$If!vh5L5#vL#v:V l&5L54ytb2c$$If!vh5L5#vL#v:V l&5L54ytb2c$$If!vh5L5#vL#v:V l&5L54ytb2c$$If!vh5L5#vL#v:V l&5L54ytb2c$$If!vh5L5#vL#v:V l&5L54ytb2c$$If!vh5L5#vL#v:V l&5L54ytb2c$$If!vh5L5#vL#v:V l&5L54ytb2c$$If!vh5L5#vL#v:V l&5L54ytb2c$$If!vh5L5#vL#v:V l&5L54ytb2c$$If!vh5L5#vL#v:V l&5L54ytb2c$$If!vh5L5#vL#v:V l&5L54ytb2c$$If!vh5L5#vL#v:V l&5L54ytb2c$$If!vh5L5#vL#v:V l&5L54ytb2c$$If!vh5L5#vL#v:V l&5L54ytb2c$$If!vh5L5#vL#v:V l&5L54ytb2c$$If!vh5L5#vL#v:V l&5L54ytb2EDdxY.XYH  C $A fig07RgD6) X-o aeCD F;D6) X-o aeJFIFddDuckyPAdobed           !1Aa" Q2qB#uvRb3tV7W8$%6X9rCScs45&'wтDTdEeᢲFHUfGh)( !1AQq2a"3BrR#45bCS$TD ?6~>[Ni|m2֖UBy42"pϩT=y=e~bylr-gRB!*:)4 \+XI cwӖhh}\[GB33Qemጃ%گyOԎD2%EZzd#5ۮ/2a.&I Ѩnyjϒݣ &\!kJd)[xj#};Ö|մܱ2L>c!Ңi3\DYh nObNnRPiZ 1?) JWDQ)%QUt#]- %*O4IBK]vxΰ{9ACpB^߃%L1ƀܶ !ߝ(ΆtZGf;.Ȑa)qD! *JQЈfyݬHxWru}>mS%my0(^Iu3Df]M]Վu}n]R =-ZY$JVFdȖϔY\d--2-$8$)IЈ'?ޭԜVqz&d44*Y6d+zX?pKc/YFk6s#.Rb&ګi䭔*E,'CۚQcpLc ym&KG}!:%-ϡ@oȲ\wNB7ˬ`Z[ABkJJ̈c$ڨDnPCjZݮ1ZyPUcqU[\׼:n/8iM}y ;cwA6|M<)8s\8KsIWCFlkՙYRTHKO&GdGC# C?y=a7l׎"3&<\N!FmI222Q &k>s]+q(2z"PrtUDdG̕CO$1=mDҠ"6c+͸ qfNDH EN6 e{\/}'nw-p$;%2S*2d$(^ ?bmcb*ͪ1!J[_G_-K3QC3`fJ!uar v!5u-Wi/Y$ϥNV%G vDTHChArRPfg87uYꦥfڝeo?FeiǧO2QdNCj_l78-3s-WhNc[nfiZT###k[s}kq4.mNnLnL%.o2AĊT,)ԩ)RSIr")%`Xŕ#^پcgJce 6Q<rx[;jۂsC 8JsֻO}MJmĉI>$`$ݙ4(ųv%5;tLy3#qR*THzTۉkMe'A".rImfEˇ@fu/au9pLj#n;M4n>b)3$:xrzϭw٫y$XmT/[i6QyYT}arra@G jlqqJ'y$˧>]5^v| q3N.vݰ2&qSmߑo|U#$YӗXEؿijw\aQo簦b my?JȐGNvݷ\s ;rFōoΩj*O+74:+tF-,،7aۥc͑hR"E+Ҡ gNZl.Y>* sL8o#2.\80Ͷ ~} %cQq&iuIiI%5Q/]C}k["oZ8T|IڋMPʥh+ nۓ0|r>"8kSdˈCQ;&^]9?dƲ?F9˳hSYqqh'JuhMJJL`&CH[-MN8"JRES33DD]byrp\Ypt8Y *;n0T> dx[fb2zHnTWFi3m攤*FGC?-/xi5 ˆGk~6*R fm%)]RI$fdv/nKBKPr<guԪO5Q]'{H{J?J^">b&Olُ!\ۀMJZ][J 5gZS>1ӗqgVIyz wn[ W'WЖ3#PJ4*Wڞ}؈Lo#zbGl)k̎f&u**rJLX'hi|o*f5dɱIs_ZcDZgCU#^%Z~}i]r텱0H9E/aW~R! }IpMj\UjI $u|mZ?vM/jYxWZZVS&JyDQ]÷MEu~ _qD$B18Ӑˊ:Ш!r{ǐE^qq˹b[SIηHi">;K*2gl˲|okǙ)1DrRImDW*2}۪2Yʼny+/H!tkJ]YK۪~R3$E]ݖvdVW[sZl!"0y6JH/ Fb0ɶHlGYj@[(]ʥ$DEZȈ5׻7n+d87=ɔwrPܟ%HZG)\IEU%Ķ(wܲ:҉\hRLIy(]zҌ{[Xd8hF]̥]b:%}Y:ڞym)պ5DU*Db8F˓X-7t? ٦^|՛qKQfm45P`\=&E*ڜL뵟M+[djUQJ8rUJ+JcwEζt-NbE7XҘtC5yQ[mgB3 GX&ok[e00!~Ӫ[Ҟ\nН~)?v8婋E2n4DLFf|KO.ʾkN-rqɎnuY0C3:*(ТFzrHaڟjOzr z/lk#"BK[Y疄BeJ3*۝=|Cvyirukf+كA(u?&34SvgīYiJ D8LFNE.{( Y-NA]-6ڐq>1)F7zUQ :ڱݙyzc,)Js.{D3Z~;kESpOntl}vAh֖ Cm̪ݕduFzZZvcN(R[i&W5 ݎm,n)iJ)aVD(!)ҝi %* 5MR5mz"EW!(X܋p^]YA(yIɧUz&ec~5N<:X3S%?&૙F/KtJTH4[#"Iu35]}ima; pp?o$FCds2iQĩ>=M woI=h,-e-RbZL(O:&w$4GpDN!|VF@B]nų*&:ܳahW>8JSRTu%糭k >g#qdۍ<婲 䚜3R8#U)cp3 ݗ}"HqN{aOf*T nǚ:\mQ 4& #'w;EMɅmRXy8qQ|D^ճ_Kn^q)m0Ke~C wB8]QQU ũѳf:{8h.VdFֵ֨.idReYW+$`eh}0>^O>ah^vJOŏY 9 j[4L@ :%5$[JB d~o,u+,sܖ~DP,H Htym,U?cJ E^)܆XޡYZLTE![O6y!tU}"ōȷՔl\W,~uYRf^!f;WT_#l82Sn i4MOI%2$S3YLv#! Bg cNDd:Mn3&> J d/vSvY],b&-„"lg}тCIDq Ddd%߉f[;a¢ch-6/qs裄E5'ji*I)'RQ K{:XVێr7ln6K}ۣɝ>Z/xn I5#*8Ro8 0}wb$&bIЖy~@%Ka۫i0;pzXT|V%aHs]WEm[;~Ժb&O&Y? t-.SuZZ;mF*oITmjk\R晪FCϭUiyr/eEFK͂ɷ;kc.ƞzojm!~*m(} )/@*mњclg%cm--LBP(⢥J;~? %tR +Dc#qKzUlpm%yiDhKN#h[GR̰!~=Ȓ0{hKjid= jmLEԀ;Wr Ie^}ooAR8}y U:xywgv;~\dآg 2 8fL[jSRyUDѾ4MHZkc^l}3(o(6kﶙOri$|: a>{~y\9y yiu[y6{q+,i[n')*~deHk HKʹ0.-j5 .RL?][-/oD|Y$i4/h@K.lkάi+%)ڌ +Y.Ib7 B$["$}ȑˉ!Hm$j_f∺I!>Nf/{N .1CJmŧjd5 Q%%S=ǩخ}q'FҸվt"5$d.Ҿ${o>'Ͷ,ejITE:~hZO%$fg""32k%23gtFY*mp3tƹoqDdOi'+%nTЎ+Y* $##FDL8vݵiu^չ ñºm/{6ZKR SL ..ޚ?n f";9Ω$җ<Е)?p4>D" lzP\4Ir޵J%X1QJMII:p: Zw~ȼ's6H)%Ib& )Z"RmI"#$a~*y:"\G'ss^]e9M”G%T\| j1EǺ=vwyk|m,Z{R&m[%\ˑ"F(n.dM!\#}/$B.$#e/GB`n%HZz#-mlmMkCcs 2"C۩K^i[du<$qIBpMZ^ ,lkclRٯ|D63/XkQNǓa©L'ׯR0Ftqӷý7rOsOim=ݾgŢw߉[eR1̒i b;hY4ˡuYoY!r-GO_ie (Q` +⧂v.ؼI7KN[b!N-1HIR̔ZK~(B5}h,\kAM{$`Zll_-}?a(PFf*u4.Err}ER22TCߌv.˲|; XpA;!:Ip6DiZN.{8^ԻUbe֜&"- 5pЅ)-Z7(lғQP5XYՕ]/RhQOS薍8QʅTU@`VeK+$[qߙ܈R|J^k>x7pB4OW%*J D4=YdF&B'꿡۶\;&FCoTȉ~I-HhԢ3G^ Qd{vAEѭ .-iƒ!J:$‚v?vN;D)Hm6Rt-n! IQT8;v߈;AF8F?w; "$8ͺImL1SBM hem-2ƶ6I*%)MIID@CaC2dy8*) ʒ}z#iIw;q;ʓq#Vϣ*ZYTJI)G'\I"lFBg!M,"> X.pw?˭8LD[+j;e! R[z,nQD٥& !ߊ/ljq*_% fТ-pW y^E/.WqId.823oG%2 LnkE?^P+_urm֘µm5+HeQ""D^;1-qpƭSIl;%$GVYS@dJ#Jd~@:aĂ1 +0#5,!-|RD]@v@tu3#\FNĔiDdduB+]d[T;DJa0v =%+Jв4 *220첞fV+!Ca\%g0&;IA[]ff\r3tu)%+LƼcBحW&EjJP*U$TDtzvb;HaIiIJR^X]UWPW_OPcW,Lˬ%F2#/ړC#BB&T/Bi mImR*B" +{7dK(sYnCF3Cԫ[-$T["Z FÄq%$OOJiʝ83K\Qwfݛt $'ͣA^@d FkRHU>@u-_.^u 5&t㶧\:!$J>^&9}w{fR#Wi'+ٖ꙳>clG|KFS=_~C]֚B[mi%DIJJ("$ky7/{8,M6pJĶT#4(,'L^0!.6%Q^lXq [FI9&KA$qiITȋ($fDV/z]e6 y9vߑ􄸟["}h+s{7UAzR9Q4TdIBz}F^*RR*5߾˯b[s=Ij4Nչ !$rb*+2"Kg2Io-q{e3/1.rٗ1Ze ~c8ҕqΊC޷qki)qu۟6;feGf}i6 T2JE`Nma =>0EE H#-M_3qE2wck%p2SF\~ǭz;8eW *iiC*Yqm>F!/I{j4,dRӖY1=n*ߛ?lw&vt))hejO5% DkBSUE[~{mO웮5;+kcv.BuQ!h%GS. Ctf8/n.mɹ6ē%ǡE3 H%ə+}/b2E~rSRRo,sAqIIЖ%P BݝODxqoҸqGpB%I#Dw5:"SeDEM/W x³ⲉM̩Sr$h[K2j4CHw{w_=FN"l0Ѽ٤=_4\#2}yظ;P~`즡.\DTXK4٬2O'H} pﷲrZyk$U19YBY*JZ\6R~mMizһ5G6&hfhg}F%r3!:B6xV*}Cc9yھEu݊Sͦ\j2Dn$UGuJ?I)K&ң E3\rpۦ^'%0lO|>DDmZRJNQ) 2"g_c9-KdaNBk%,5pZ\R]I)3$(̒ FĪgg^ݲ+S@KzL,.##,3RiBBϠ}kVy-ȵ";J2Zm 3"J$=^5ժ-[{yvzdy]X[r#Re!Df|CM`ihj}x6=9p]'ڴS"Wu$JY%ITEћ;#8B\Yݵ-%U^\7_mqU8m06~ʍJ23"d>Hwތ' X'=ĸjiYlK6]-RijRD$(AϷ\q&{#.IJJHt?QOHeFu-.cj2Ok+.K ?v[,#W=s? %.64P:ךt6"Q uw3eǶl]AncKZE"$7|ko=Z6fLn:yoF|O&EKk"3O$3*阿zYG׭vT)w|Dmq̍!Dk2>304Hݗv4ݹԑ5l^5%E$WemFDd@J "OWk2W,)z.)5$Ժ̼ jC-h ՠ9M;RuMIvCpϗ:|mB~%1^m/2 ֖D*~F22 wEn#JmIЍGO<,h̡,9H.&녋\x_@t1g.dǰⴽvkp8'ҊQ#u3$L[,(׹R4Ø[}qCm--+$DdF#,v>l*N%nqٱ⺋87ʖ M >) *oc8ͫeCˇ"`FK$6.̜RJzq 8禶7+2y6QN"~3츶$Gtf\u&Ⱥ$>4^;$F N59'/po2FSDp5^cOi9`_䆈7[7bL P[uK\bR<+EˊTVڼKбvZ֖&\qds#vBB_ rf׷i'N܊9pf[NCܖˮ6$M3uI hwkφ%Fbms ռK6Kn8)DҔ^tݺ M?1[sܥR unQOOEGoxZ'*UK#%R'=GBF"wO}ޱHxPI#%u( _H "V|HwBX kuRsEH&-LmL"yM&EN w}ha m7ޟJ$̦8ӤI4<2QSD ^l٭9d6XKVvk rJȌ BnkAFEnwu;-ƚ.)7[!/\R~3.:>v;aoz4E"Bu_X3-#djIDq;< V E$xy8T)y)u4|Zr4Jd0 gGW1KIf>wdZb܉*!$B% H-Z "KkeRpٚTxF]%yj/I(U"D3zyx+o)On^]S)լܧNU-ۇpz۸M6E{B(^L6ӣHCPIOffW% D|+;̈8܃Ib}Zbi{\bM=!حi#B*1cJ{WlQU&T"2P22f*ّ DeI΀x}=5ٺ4*:#!([ʈˬa4yf)4אlg,=kYL+BVSz}H'yɩID'^$V/`s5s6Y&]|cFQ[k?ˏ)] /(DmnnwO"eؗnuC>mOB#j틻3\ kZo%ǰIA6jM}h'ZJO8]V{)"Bww&757qnr(:s%"dMAhRJR,MU# nNgVɁ6{hvܬr-(LĈ~|5%m$J/OBtQݙGpu ̣ˉ1J!ĩim\B4ɯJE·]]2՗ߚA!*I=(I2u(3>@[5EanqN:W5rm S8[Kr~d]\H2b3cXVhsATfoD@ݿv鴵wm e7u'aYpݽ*v KieYJl(qRJ6Gfd"P GvsI(lx,QYIzFW}{ɋqpa[_{'H6\&M:>Ċ_IbīuᷝK}eX7#ͣ#8_KmsKh•Ƥ* v ==S^9].M*t&SAPnAI"jepn<_$j\-s#Y.51:6$8dקN5 YN b'g7*"ZR\Rs·܎UOĺ2N;D{&xًKͭIv<%;PO)KDL3CMȊbk.ﻮ2ݱa{Je,\ ZQ|V\[4 pq qd\Ҥ-+Sn{=HD˾)"ſsMu! %!ܦT}e3ζ?k9>c \~n]cS&~#_[IqM8Nf^%v38,lWT}1Q61I2RJO0XI[ozeW,nu~O: 92S|^Z;MT̾ % w5ږλms}dii%DK W3JjSeݢI{Buw߉ÎNN4(a39Ri^ˋW 52ɝM4Rhf5o}?_"HȤ^mӛjlkʌ)7FU !5 fQ3 5wIEQVhpDfjS߉>aj jZ:_dXE:w)-nhA0GP]OfYlӺ'%nܭa T[Rt|[#J)U: jnQut륢awɯe\e2u-W2/y^5in-oV1Mqe[o%`1_nP+p&Uo,l{|m Lߣ̉kg:FDGZB|-uΎl:j܋eH5)³Y Pa7UDp48pPSw샷kؘxw|&!5*Rݖî?.2OPV?o5ǎlKRHnuIjcd2dqMyI!(#5(T}eM[;#nn!JY*J#IJf±-owec+fi17m1j\v ;">jIQC E0 ڄZV1=}YW)A SjQmA(ЮfU'tnYYܬvЛ0caQ.=S#{$މW3q6f eTR@BLj_d~@۞3v=g .^9w:w tI>FgZ?eخyfcM%.{.,߼̄-NPȌU.˴V}:*+u8yǥŖRFn3--/6uOt*e+5@==2`ⷲBlqE]͔P+OҤ^خk\3˒ndFFcADp)|JYU)#1+]w%qڒ˱#'&pdȖ.iiRj\jMJ hu9.ʬL喵H5\aKLLe"25֪0 F;ḕ0bţmںg&+LuيDQd2"5rrPi*ڭVeAbhFj1㰂mBH)BHK;n--djWrkkAKVȆO$oڔo>M׍})*R *&.u+G:[Zj3LSgUvp.w["CC(q3ԞJx ojGϱ] 3bjU5};VI/**7_[~ f=f]39y9s.o~ !%0V(t>@%wNsH3x[*9*%Gߒu vs٦92fD_lGjod9,柼(N-t 7ngrX6/9Dn Kg̕^NkTnar8X. ٺ'q'%ېE,2.+Т7hTWP*}iәƲF;TؽNLIM2di(4jTnar8-RFomo5}wݐ/vB >'Ը,US@*n;#U tEئڠ]%c;%6TM*3N<~Jp._kY;twJe$\jQԈ gtˌ&\tDI]:3hTnar8-OQU\`f+:bn3q2\_vf[ڢԃ>A>-s<[dۍHra\} .j?%F8 o/ӁVڻ{֗}=0}m~7]X68He= D%O_>{Sp}HxmKRaݎ)ڰMN|bUTnar8_n{^̻ggs 6r]*cBJ2a' Qfx|K;繋;ؑpf'5!2TrU1l) /wRK&%I%F8 o/ӁUMnseYv̉¾؎2M:rY?xQZ2ר)_n2l_sF0+]d$Z(1*#Ӡgmp*]tNNK!e+T%d]:Պ~Jp._v.{N`|o$_bmp!NzA(5K #_]|PZQU4NKƫYc9컪nĒjCL6f3:+wvln|ڐc6(ZLQSaD("zīmp*ݘvlϠl̺U.LdCZOwi9s<v"1n NjBdbR^MJ~Jp._yf(ʲ7}5:et~M8eӯP&Rxݺe`ؾ+alWҺɸH'.Qc/w2Uy:Gק@!QU`_'fǏ윗nB-x~fTGBQR]@ANdPb:hm1%6dɒ/QIwὶv@1 +ChJgROMTENg W0EK_bjwpi얔]Q6d$ν:4*7_[~g \ӝߖכ)hqFR *ݝ".0ZprlWmӭi%tQ?%F8 o/ӁVp<~V%a鉸lVT˂yq}Qan/jR jv;j‰4Q:EVQU}1{2ٟA3˙t{] (ɆҴ)G훥/ s.x ?bEbԄQTŰ(I/`?&-\NV6mQe2&o b;Tk|t%4e4Fqh˧^L~t;|W&دupO]h<ǔ^dtNC]u vN;9.܅Z,g%q\GUO߷555>tbJmɓ%IA#V_u j4{m}{bWY<%Υ41fzVq``6,<6,-)lTIzuiTnar8-]_t@ۧ;-7 S/"U%=WN@U @IgmtBGb\K qjՔZڙ5JBQ*s,:FZYR ~R߼VqӠ@0lL>G\f8D0D^$uQt3Iwmim럱l5ֽ/g8.rO=Q}8Ti$uAbhݧ 8[Uc!![CQX%蔛)ee_4&g̓tGӭ>o2^euJJ)&] c1E}mU2GD%Iڔm."f&+"Xb `w ڦiߌö;aSq7$MC2R=S%ylשgNC`ub|ľ\-gܹGSL)DzM$c8t4D:S+G0P DL8,?1b2~څ` B9K %{C>r,; :x FEoɚYa~Kl̫%{ҬL-x3Kudξ:DBuŃkl||9]5nA`s(Χ$I{CF|AL̕SIIdb˹M-Nk1lVXyr|kYvY'0k9$SLԦD%)՟J|n1&b=-w/Ω}|Rnx*3ʌߚFgd6reީ{؟3?>V4m2$$U33? c4^X˙>lgR"a%~u>EA٘L&dW?/[l}caupNƒF.=b\O5Q/\}uRQv0mӏ=znFm`zܙم۬}|V|S?}LK#ד-Fxȷ.%4tεFGm<ɝ w&JH 'u<vl||9nht>;gM. uY4mϸޯSLUJJ|dluՌ[=?Y=VMȏajK0vj{e 5ZօC?%=G._'͂kmq6mWk]eƻZ6Nøu2Hqi2^ZH4kowWݟ;rߏZe;6W.${&2UL˨sa_uY,if֖%ϲ/OÐ*HA'CGT+J)yV0ZLD "쩒i *KZ̒"31b&fLSrxo4d0&[6HF}%iJOI%ďSq͞i?.[Ya p=Xj{.VaԲ[VԙB.\ 5Č4'rgymꏶXg||:%sۛٲ5'Qi!4Y#a:VTF\v [p=xvpkJc:^?6lx}^Ҫ}hTIzC>[f;l̮@nSb|w#EԚV1=L*J3E␤ygEFRgqt}68Y!6uD)tM'ޮ.eTsBjM$U̾i(vmY3[<rf:zkڛ^~Һ ^'fuI\'Ъ}$MӲ0s]C'{HJ;h[#mQ# ЈԪuRTu3}_5k,"41PO?2+b]o0~Lت#JeI5#qgv~ ..ǭRw6bWVH#2ES7gIIIzL~&@ɶøߒ?%ը6nx̤JWؐ¨ΤdU**2<|&VdK=<ˌ%^[-MrK- jQT~]|جDeDپԽ~eM裷DYru]:)i}P}:}<ݥKnIu+39g"R$Q2E\ztd6M[ -"k:RyQbΎ9J _B\m+hQd3XD2wkȿ}߱N2.MRTO4-4Wa[6MlGBc{7q lwVJSl,jo8S6Q%FGS] ï95n1 :] kb2 RdB"/Ir֮rq CfV2LUo3:r4~uC\EAۦ9-5-}>V2ّ+=0rݎX?_d:e}q(ːq.厾M[mlZiiIJRt""͏6OmW;rJ+_gL6c3#QK`(}*fEAfb[ީkK0툣CZɘ[JҞ2&c*.8GKH%}H"|G5H6<.4͗_S{k̽ -om{=kILȒT?Qmbߟ=ԯGޟ/*'Lqe8nns룻>YqMb?miҥGכy3G-oYن"kv65$IndKc^tFfdD$uSFkOu2%qS]wi]"wZLY:n%Rd ФV|G󇱃mwzz^ï~+ca滪8Go[=_ ֘˳BT5\))NSd"ң,LJWB[dZƖ`(Զn+rkُS3S$iCU=: ̺7ts[?c\ֱpf{&pXm)s蓛ɅҚJF_'͂x-M_[EDXQ!au>BfGקnl]TLLV@2"33S3XsmPrpQg^۪L%Z`*MS&쟊R~>ɭ&=,u͒ymd9DinW)XyQMX-ZniPK/kxn(-sS ?lSf.2>`Fqӏ5G+hPݷ颶V38&9? vB4d[k(3QyM%tm l7mJz"+NhGܤ-e26U^Ti(&}cKzVLǏRݡm}أwdW`OgZ?yڊ"5WPEOС]G0wO[#(X1+mfюڣ-|ȱI#:~+QӪfg1ktYű@cG*,r#<[kB%DddeF3!6IfG-&B ?/62M:g-4W "ٲkdИpNlWK͵9s{ ,4ډGJ?RXl#'V /9Xn._Y ItO>M 25 #І8/w-Ya}UgwY+MkC",ʫՄ$ M(:RHzvö|}p=wS,O =:mՙx"\Ȕmו 93nkL؜b5k>6we|Kе]7'T+I*:xIꐝ<aO~]F0\ +?1%S?f)-32ݥ weˑgtԝthCeV"_U)[fg^\g֍l;tWr2,aܖoIZ|MF| iҦ:3#k0%]!.~p*#NQp~QJc?]lsck|cDv$ddFGR>d"éۖi7!0MCSϾ FLffDDG~ov{xɒ,`!tXIzT^)>ɲ" =ŏi4sCn/u&b(j%VQzq"Vϸv j[8;GŽfdrt%\!ESZOj: rlg,ucmql߱ KlF]M 㭝ڋҕypߊ[+ kd2MɭrlfEnnjHZL8I$}➾ %po: :(S ITϧAQAewokWHLbv%:r VR?}KдzmvX枮Lg<[{Y\k5]r{)j:N>&~evM'Tp--HCK0=amrђ#9Z4j(zdcEu.[e璘QdJj"3sɃ[8[=I|r6 NWUOܘ>/_0Z_(ڂ8dɏ;n,Xͩ2^Y!ЂȒDES3"fi\=dF_reF`N%`KS"IPSHzx>,lH<4_?C^kvee4_Gɖ^1lU"gTRf_9$茷ymꏶXr[g||:'~ :es\Z?L6H•]}iY@˓ۿ^' #ڗ[x5ϟ-FuR}EZ&iQɟs~iN1gqyocXegYT ݢÔ%T$~)#3+߃auwote[V=7{Wifjj _mEjUL =+&QLqO?L&n2!Cm-4I-$).DEЈ &AUj? Y˖JymM>j1q[w]{ic$-VN5U膳jބFpS4wTg:eY3h<[:˩WBnf{.|ObkPUQ񙫥$T"IQ4(.͇?廯XN;{Yq>mԮ8(K>yp_@Y< DzkosjhW&TR$gfK4cu5{Tꔨv7nӓ5iz$??kozޑcģDvy&%%S^)R:wۓL1[zx!ëɒR>@tOI Su+߻> Z0wg6Fpg'f|I)A2&l+p[{l7[vSuDWI[_e)EӋ,StIzTCF-ddc\oK (]Go뽐yeȅl7 =V/qgU(nz~#3?*UB0FOӃml4=ֱeMޣNza Op:V|Dgm\8ƺLVu"X%v3i6ϝvSkEw)Sj=lb/{ߩܙ+r%#h{.ݘZ 54tWR.RGV oTj҉˶VYF6f{gōeh.;DSUQPCqC1n>ݟf;ZkdV<ǻ_NTeҕT^C.itR["bx=#Xbɳ2nA eV՜ke\OR/E݋=cx0ȻѴmCp^Io;Ewŭ"/kRM,[mucl6fm-S44%uⴑ )./,jdvƻ$=/ މs{HCKcȾ,5E ƼZ)QWE2^.klXͱtRU^{\t(ܓoo[>DȽ*5F< W #^lQ/a&2J$(DdGG4|Ǟ۴%`xK]y!Og/\jqUraۤ:cߖSh&+u> ҂FF8ە&EH%Z)wڑ ^"PG&E½G~-ӗ,sGvtk2䰞}tf}>=IQm6)掮kfEn6mˉuRKi)*Jder6CwJ[ a|YFkm".d#g||}J5#?D͔ۤ\c9ɋ~yr)K:+x\G6u}ٸ[(s"\"ǝS3KB]2:NET ATF^F~To9A柜MJ3[۸LK10PoD>Xl#'V O3α-{e{ ̯VjIu{ni$kuf_Z8ow-Yc}dVUB屶l<bO?.I4|_yQ塮KљOB5-GBƦ8owL̷iluBe=^wiq.2 ۗnmb6e^ʮ|QOhz8fgkvzѝ6FO>r׍^hfMB"EҴ:XiP,uXjN3U=fb3:A5Sꂹ5ĵ(>)l7+Zh#qϚb~2Gr,<椿\b߱6Br4ƌעŰDO {wJ[3sGB,󎠖 xG,:j uH?wBl_r/{0n| q*BKBҴ(FGWC3U'r=0O+I37/lS]06.'VmyNӨ2RTHˡm}/z#ZfFjg^^\S(dCm%l%=q`N%5Փ6Kz9^kU q~&J>9rl]fn_l̉pt L΅- v,K:R-iQx&&ꉫ vƻ$=/ މs{HCK`?5!6MjK}z~LFj#fBK׉5d7߆~Yt5ߎ#7#o*gt_4GS73?xJJ:MHIPwvdMǵ*a)[ ܛA#!ּʨ*̆n4[t]lab=h#YT":y4R~21fcuwh7>44q%n,w*JKLHITe.?ڴ:m{RbI+. |D}9RgVk:%v3(m8[ElymDZ鼮 ldsWDкB/_5egzx*mĎ_۲^G~'!o.Mmg-qi6}(J"?z(#klXͱ1IW >qwoZonJ}%RϒDE=wxi)?kpfzc Hs8H^JK&I:^S29[z- JÝҸmxR-X,\mh Kiu~!Ddbt5)1T; uDnC!iR]{qoڟ335{W8Wʧߏ-}?N1\tYox22r3rF>JQlD~9f+S2e=]Vl|/ WbfN,{Bh[ {ɵo{s jO ܈ʊ)W'R]軿%ݷtxݲ{-UZtH;)5R|kzٞٻOdO8DC$zkItremܙ/(KQ{oul#W_jmFOS2JmL5u->HRmGE1enn]J*7~Ӯ>h}{O(Y{FY6ç̻l.4Ƥ8K\v$8FiAQƞ ӿ?뭾^?qZDB|:L48Ye&]YRjQB"/&q{#yW,R1r< *2$M}R=L>:gg،]±Yl2X݌"y3nEƤ4תRqGZbߚvm=친ܛLlN j2>exNkwtjG]⬰U*.tɧ.֣Ԉϯ'Jٷëv2lTn>MYtʩh]T^IF+G5[c~xHUnʶ֮JSe~e jj\GWTUTgrQfQLqsMem4 6 !I%[I% Ix$DD0g@^NΝLQg^"8JBq1}jBuCs³:?It7Y|O~XQ6^cgv/*&l;jz>SɅ>Nzfh)gLuZv\xQ6\mK63u~&dcf٤l"+VcWG^%b{!9`c*zu3$e$Ii{$_̺9i[zk',k|]W"g=CKbw.rX(>ی $%:׉$U{[0_&l_yIgmtBGb/_5egzx*mĎ_۲^G~'!3cxhڒ?&tUKPμN3I77៖} w(9m8Fsۑu5\{)ffg Izjg5 nø]얉~xL;<3q\{WEQd?yQh:Ĩ~22emw^5FBծ.좂͢7/wIW.(gNgNEMT1ovH|X_|㶭ɖm{Qol4,MJ^^"C/%".V5M[xccٰ$O)P ܓ)m Rח-cΑ %m33!\[< cjA@Bs[ 1Fdg"S>9S6l,.6}0ݷ;h|v+=\s;䞩TTQ3&^ᓞ}ee!GM{-o5۸+o bfb2(Ki/T Dy+|陟;ϕ1rǔasQ)yF1rǔasQ)yF1rǔasQ)yF3ûb+]-Q,ʞyM_øD}|]87ٰw.z:Oa2v֩E9 q/eo"#"LM/5~1Vyw٤cnr@⻋eͦ&}MQ]N:ӭ <#.ߓ'oܻf9BYݖļ+ kR[Zb"j$f}9uJ9s'ܙ O0}W&D9q`,m5U>K̍ ָ; sgk/R'2<C;;e!;<$EBo;uE,[[lGg1'~/5S8&"> JBqQgNkzIʋ:5= iufcv:d7Lk('[u$Hǃ16Bncnp|bqNH6*g_Oc߽>}׹NkNܧNPm[~rf <8fȄE/`3H}%Ȩ}xRgno5} w(93֤m| ?Iw~.KD~?<{RbXݫi"2DuּʨkT?A pݎit2/!ub\DKV\bGR"RY"֪"tݓY:ne_f%ғndKZ&Kޝ#4/lًT< Z[#%a_l LH2E-n4|U]}oD=L$!*$Yџ:3S!B%ƜBJТ2QxDMa&*wħH.ΟOR޲2.RRIf/\_?L9Mlc{Ķ-sEo)fgǜ91d.g&~i͎y}c&IMc_;+mz]c-|RVI#:P^+QӢRFg!]|جX2Ը: qg{28R/R_C[1~kD䛻؟v=xY#~iv#ȅۜ&ca}]1/% e̽oOI=8yn}{smptn;\crrG[iKį>?If G-5S4߆.4zi-Zw]˶~T-fmO['ޚBy0uO}l:iN땾 =9ZIqq.Oҕ̌rl4-5wDP5_}0S<(BURL"*+W~TV[3nM4Z"+ydGRv="&v^uEHĥ^Iȶ]YDb1QD)uF:?2-["aWY#8`DTJmwICۿ{n?ͻ#ۙ\c &iM['Epʕm'&uwg[#t:?LN|Vg-~e-Eme-$H"JR*B"!n8)H7Mfu}>*sO9Nc)y>9'19'1~A{ruK|oaq9iڵ|FhTyN)3Y;i|?$!\L߱G.~B"dfIgR"_نSj|R^᪝ bgN(3%*PQj? 3#`8U/5Sꊎ#?I?cA~fYK+z\֫,F]kWc6L8uxf\Gw{n{LMGRWD_E_̯QbbORyN:ƿWr;C/m=ɘr!,Fc=|vd:lMe63iKįJ?Jzi ]i(+3 rVfRBy2}: _ݞ-3uwir^!GZ1rO8c8Zq?*V21ulxD@fgq,v~?d FYMT+JmņKażU}FkHmm8%G$:x _klXd]y=AW9n𻛔lBEG $]e$Cѷq?廮8z|.iucKR{\D\=|eU'ik˷} mrFY8uqK,[,)BRURDE"eHjjsGɾ,62LDУzW$:Znnü_QSB>#* )u^")Y$)"*t"/!\.--_]d{6Hʪ2BSJS>Q̓4XU}<kWLxA]DȷE~c&f[NuOPwy 2 <G/wmrnpJtgNr} q(F^$d3XI}G]I=!}q5sL+_jJIRlm692kK9[{q\%'r}#r8Ў|QSTz췓r5떩e0j+PTj;)$$01YQp UkHM)?BRU:|-,! 3-O-)4&UP~$KjTk6Ǟ=-r[l|a{2F3Li:W䨒ZgQks_ov^⌻VO z`1ƙE;JSU?DVٴe#o>ɣ(G+C<9$9NcSC<9$9NcSC<9$9NcSC<9$9NcSC<9#;~nQ! ؏[#Qł+6olEvYtvϱhOT~s{sp=sc"s/A{hs/:~tYh}VUu?'?y_Ï~鈵~bx'eݽ2J[/KO5Ȫǹt`wc.8h&RM6*LƕL֙w]l1åc;*"dZMu. ~>.?v\7GTı˥FfPUqЄ`3:u0fubξ8Ԫt!Gq ]!DFY{VE-fKU:qx"3×-z% iug'k4`$UI2"&GSۨ=WS |u)7"ߵ b/{ߩܙ9T@*PFsc5.$rbۈQPҴ(HX^t}'#7i(޸aMN'* A >2^ Cǽ4W{S[4>1 =sQ0E_^iww­\8s}Le*EuQxyIQ6ERh6ݖf)GREudfE5qݘ͙6ru(>DeՃ6&Ji fz?&ַ&xuZ;>,#}wsUlK¾\ F @*P T"0턦ό&E[rZ^t%֟[Tk r=>ñ-gC= nElϋJgvE廪~cjlJd^^S?On1.D'Xg)}omo=m4t&_(}7+(9NcS<9(9NcS<9(9NcS<9(9NcS<9(9Ngf]!԰SSO]6 <(NEk#Kifx$G9+cdR BMFIS"ZMY:5ݚ#_;M4^&*KIkm'󭠺$YE!uwìw,c+ vwfca^/c;Y-PFQX .!LILMD/] 7ٷ3]mp-/51!eJݭ>'Oq] f^!dž;\䛘]ziol{~z kYQ.=_z^''ıcu-[}#sg<RdeR3._Qso63mo-٤yQkMm:˂}zݻbR#f07#^rIUN^/eTgniv6]? j e*&gǸ_~;q5 gC/IQx3bo6;뉫͋&om>CZ(9NcS<9(9NcS<9(9NcS<9(9NcSe+s뇃vf>^Y_Aȇ}LVݍntzh^e/N@YIgn Ì"ϓCNJʝ=L_"߸+zIMjRH;I GpK 4З$TIԨ2= uԖ1*ԝK*;NM\Z; 续ȓ&[y_9VkQjl9֟= ֖5gK<}m'XX|ߋǣݫcc?|t=^>!-YVu&)-V&k2e*`3O.)QM|/QPx< ]φnw]OgsfL-+jl4IIfB)E% ɿ:xߦ̱[zݷb7o3!0kݡUߊΎ /&dǮ(ws]Ϫjo<)Y炚';1~O&=G6Ocgb}"dÏVɜi1- Yǽdd{.^~M|}wGlO%ZR)*"4d~F:i?Q|ǔ_ rǔ_ rǔ_ rǔ_ rμO9rYWJ 验vn=fnu^Z[R~sI_R,]ꉟTjỼWzKݚ4A60!W#tITy?T-ɺmߏEr [ ?27O7Qc5GYe_-6Mb1FN%*gO(3SqUq^q@f`?ӗ24&1h(/Y<ey^eֱcgtB.~r FL2lY{:xݯakͅ7U:u_n7)-*3{  T"*GԵt|N^Kh7ż4a)D(}6iܺ+^K#1*%iqJʆFRC.=><,r_6Lö٬DǸzV m[~r]m9~s(A@ ?PP9~Jܠ}=~*V0oڌKo˗(nkMv,}hGӖý^ddz^w=094fs(A@ ?PP9~s(AA[]pS6<=>ӺL vz;^FnEuq/YzH/+kv{uj4Vs˝m_1AFqi3?5⮾e#Z?qecE;?|?=WvevSmC}{ޚ7L:P2!Z,e(ke%Ã02O6#2cD[vKL 46M~9<7kwv"e!ͨgU)/?~GvَɟwSqЈIvgO&K|*mM~ZPXKs?YK?xn5Ŝyӛm%=LzqJS;RL37IzjTltkuW 4LPE_BG.M,bniKg6]ڬl)Dxͥ%,ԣℑT-M7OvDDE!TK+Pؿ䏩wܖ9*T @P*T @P*T @6(jjߣgd>ʗz #8seJ:3dɻF/e{U͚ӛ%kɖq[f=mN9"[aĊId(q DjTm I_)}o]Z;>,-{ U+z%ϺzaTEP*T @P*T @P*T 8ڿᖍv;Ut.׾ӛ#r?FfDDfft"/H i_5c_d"orbPZnDʔrU^EC^\Yco7O9Ì֖6K}m#?XX|׋v{uǎhvK_+po@V 2#]a?چVw'-~Ǖ}k;j9jT @P*T @P*T s0?%ȝ]{a.%F0~9c'guJJNfB6;caJTl ڢ̾Ȳ!?sn7VaumNJDa%"D \+¼Lʣ џǦu@x{Էa/Do9/7/aqCX ve#vSmCwq{ފAe!Zƹȇ]kLueCT, _,e(a2! &YD:Wa2!¥S&YC fYD8T &Y881dR3,*Wbf1X 1e18K?{;~׺;\~17?V+/dyJg_ti'#5x+sɟIިdž;zPnR9ӸB?b/{>ޏrYz60TS L(0TS L(0TS 1$kp0>![lr}7lWVGC/zQخ Ƒ{_pD\Kt$Lx{[rM#;Ⳗ&cUv{4vvh D(,tCd>mYor3qd%dJ4h}a3ok?x+v|HK}uUAj}=/ މse1(0TS L(0TS L(0TS мWxww~ gٹf \Bu`X2J9SӪdԦmJ"cyxx.v7u=|lA K<޺]e!;}5i%H :1:=ֻˡǃ 9(TS L(0TS L(0TS w03~Nacf(7psf=R{\wTznGbI~\VVFhy!D^4RO۬ZCMb6 &Mu)59<^p#/ETgޭcބKMqGE"*e-u5^5LyM賮￷=?R̽\,xߨg{}ǽcʦ=a1}=Z>-Q0g)C\8]JeCza2!R,u(a2!R, U>eCTc2!£eJ̳p(3,JPeb PY3+R,&cQ5,6:};~׺=-? ?b~`?艞}ұ~,FOPPJx[̓8Di7Jd蓩r#?#2m6ؤy>ߟZuKC9kRnJܡyԯ\D.7X+vuy5_v3<!GҳTuVGC/zQֺaN3:m#ॾ#[mRQx76&Ebh³2{OC-ISWKPtJ?QCn=:4e"Dޕ)$ɐqֵGSRu33?IȊ4+_+GG5Z;>-ܖý]ddz~w=0ȹ2ȀȀȀȀȀȀȀȀȀȀȀ6dx^-jûeq;Us tP6E1hÄf~d,6meԶ4%QO.sK) f_gi7Xf\_22DLfH $Z|G% 9O6^܎P팗תӒNذێ4i黋[2ZXgJCi=xOV>5=]qI3Cv3&냾Dq(S5mj:ZW|Nڧm) ٸ$.R{ۚ91ưLn&l^k'[P$RݔE0r}7Z.&D9r *r *r *r *r *r *r *r *r *r *rQ"o 1wTs:k??ُc/Ԟ%-$5k3[(q*3T΄^.߻\of3'V/Ǖf3>rqKf|O^xȉ)?I[[1Zn7!A~=u ol{~z ۍچΏRrCD &e.KqFIJKBԙ>=p]uvCi*ulfDjZl\,xߨg{}ǽc/ZHCt>uֿO-CtTC s,e*0gZ0ek>٩Ոk; <ɳn-} _٢Q(3:!ɗym4ní.-(U\j:TG#~3gϗkGzم{?^~fgy^SA)x_idIEԪFF3v-(i(VGB/씡ke%]JgO`Z~H"bIRf&] Y&~e!iK4l˳^6- '"i:%ju=)7krE vaŽ8H%ВJP""/qYlb8i\ïJ~i:^:$&Cf,Wd!EUlZ}"«rl9J%O_8v[f<_c_Gm 8lX%=B]zKBVDkW†xŦYJzZ~\-]cإS~cVhS07y! G`(.vJL,Nd}i&MǰVv$I0|~ FӸmVFLMGHfWnl˛*/GC&"e>[4zJ]g:5Ȑ٥\5)GTA&^8җ~6xӝvY,,)+Aaωp1۸۪F5/ğQ_]JU'l K?Y5I/#fGd~BѬ=bJJֆ u4$քdҦ-_h=ٝ.ٍW; YNI6l42t*%I/A/Ӹ@_UϿDxv2K ":J2~) [fϴ6Fq?ya0-J]L 6>!ݱƊds}|'fЛz9Pq)fU\J*Qv ΅sm&q.84#vhvK_+po@V 2#]a?چVw'tX?_Oۏs}qBi/X/X/X/X/X/X/X/X/X/X w.W왿,l߷T{ /ms{9~` 蓮?pnh}w6>e>T*ZHBԵDEUm/~P/צ9o2LsݍLS dߋ^iwLf"  pq:qm3+/j}"-W흷c9+Tb<~wƌ,HIz~b?艞}ұ~t|}Sɜ=QhY?;"AD42Iu2 "ѵG`*b[-r5R *i5t#Z[UI$Ӕ/6Ƴڐ>Yݓ2McO<֏tq)0D?Ůs_f7IYcֿORٖ]JeCS s,e(a2!r 2{˩e.0\Kܢ3>96%֝i- #%dd<8m6% Z3,RVYm^2#kMGLftl^g[ S0cYPmp^=)h||,]C+ZMxr+'| lHXݼ*"k9h(JqEST"yZz];zr){;ο}u'p|~}ztREW\&ښFt#B:; ,Ne7W<:B/ARJQQ6ETEҴ3,R4ȍzY:53{}Xts|-^ef>Cnr@pm&RPd #JTu3* ;ێ[옭)IQ4cF#97;!ەB[%)RCکIx9pߊi|R]EbYP뭰ۏ0uc:LadEVf$ FgsN2݅~.] ɻ"CnJqK(uƐk2.d]_Vg[pl݀(o;4%cC}'^O%ˍ*W).mf@{ zGuHZ &i3I܎.h~V?y['m` '߻=gok-Wmr.}ob/ƛZIqpP(zNԻ+);b*EFl+4_\v?{lQjN[)¾e*D8Do-$?Z 6{o׹9]oOZ*_"K"'ROAߕVgn~viܗuzX͑^_؜~f7Ļx6Fkn,qF[#,?,ܖJ &Ddq#.}FV?y['m`n~v]}o; a`ͪ;hT[1ؕƐˋQ"4HdPǠ x3L/cgWl3a27$? " *## ծ(\ͷDEH*P&qϧqj`]媮; Zx%Z^x~yF$D/"_=%Ӆ&\b̷:ri#2`QiZum\K̼[NIRTU%$ˡ>RKw7~l_qwܔ*4P*T @P*T @P*T A j^>h\Tߏ/ڬCo܇6^ѹ3[??_9nn-{ S +z%ͺzaTfT*JRT*JRT*JUv[ xwl;e?W Ȫwm9=(6?ᭃ,jܖxOf8X|ߋǣݫ؛DunK:Nq%pP˥RעG9G2Q^qd7JRfIuU!ҕ8Uׯ EPwg86X/pop'-Xg^Uid[ZϊxPj2#]a?چVw'vMwZ.!3rԨ*JRT*JRT*X] drf.vIR%_}h"z_=k;d=7 a#?pnhw6>e!͗q{9I%ڙ%Ē5n+O*^J Q|Vwǒ8(z<4[a(зf_E#-?{H|sICKx]B-3cߞ7e8>bj1xz $]A[p d0~Ƅ.KٔKmCfI%-%ZUD]Aݸ~O?Cv?{lPݸ~O??+wnۇ+dCv?{lPݸ~O??+wnۇ+dCv?{lPݸ~O?Vn> chXimedEynfScR%=Cf}|i"4 .;,.v{M*ECyl>ڼ*4' ?~5coa5GKfZn>KQaã^l^L}j-8 E?6HE¾#}f ΦbWjeftFD#O7Qs1[Wx[int7 Ȉ̌dt?AA-s[1~]zydO,1}^?{Tnkp-T5̲u8]JLji+=^=?wke7 T)W+m-)铤iTFD"31MH^DVZ7z{'z"x6RQlI-NDM t[P H}~}^>ҹ38GBHjn'3v3@)^MoE.R~Γ8A!Ifj"I|q`~}Lߛ.L*Vt}Mg}92[S;%S^*HG3}FΝz̕""46kfffz WݫOs藥L&5qb֨Iq*A$ XZ_-yfMu=ǹGu,msYfqm˶N:P|mK$WU$݇9l]|kv\n̻u֔/{kNi>or:wnSK?A K4/Vf8p6xm Bn|1Xt7ty[Hvż$% Ї>kM&>7`˶ݙ{)O{(ʘuhp˃DڟĐEBt~qflYE8GCmV)HtN $Cc2f1V]kIpG -+pX~bd Opr= %4EN1#_$ǯSXorn>tR۹}Ż *6OGO-}\WGU%={JyL>f_%m!rklji&?6G]tpt}۟nIDFxϩT2N^*W\frkzEbIzpw& ՆD}nI< X*u"/I 6|^g.+nyimYy,";ȑBZRFFGR2\.Qx(kh7{G #)$>@c:CL/*~c]~4lmGf`Qzj; ꝱ>Ԯ՟(z{2z*Tf|?)*F^khx]+LfQPL""*/XU6T/Ûr,ۓ)ZzV|@ |-NWc`\ٛ4 +yل' >BqڻįvܓӸgxZّ#"[n%$i:!X7sm 6E9}1Ȉ̗ɆJCDg&b/??l_67Ă#T]Ͷ>6e婫F:$l#j$&mbAH Say~ K͌Y=lf٣7i4v.(i&Ds,ؖG1e^nC{tIZ:mdeT0G> -O }@*vFbVrCv{\tF]:mEUu0G}Y{5m6;g"]2'Xåm:TA/??l_67Eu՟KwghmDu<7"_G$@{fXS>8F5)J:F|:WG> -Y~Ʒ!u7qvٌKhHГ2"Zd]vY&Oq;Ⱥ^&#"CDFRLt"`U4~ؿl# -O }@* =:i3mk.l͙njji$' >B4~ؿl#sbV3l^#pT{xR : ]0ِMj*)qi%Ke8$[$ "n3QYIP)JJP0NwT?j {q/I!ʐP*A@ P*A@ P*A@#kmϺ>}+;zU[jWVGC/zQCAF}hGr[@sMOKuFTC /_T(P9}Pr@B /_T(+r\;nYݰᖜ#\?cmjT@ ,?icVnކ{5_5s~j}$YD..IhQ| ߖwnsאi|qrnn0lKେEU4_ ]=|' ,mž0Z^ 5<`&^7olS Say~ /Th GxߤG> ??l_67bAHO }@*4~ؿl# ??l_67@ }bV l"4tj7M."ŒM~FحrWY$u^<[iJ?Q dǗ+/+]#\"fG?1'C͔}> _{̝o3I[~36W zG}iKgJ /kZ,*ͧ,w9lP~@5%U*UZvXض (amJKwkvwjuwo2ug2D| h.<_`2#]a?چVw'i'<]܄J6P9}Pr@B /_T(P9}PDzLIQl%%H=ǭOkꚏMV=<=ǽ݇[hq:n$j"4&T22>F@ ߵ6*] ??l_67bAHO }@*4~ؿl#sֿORFɖYJ̳p)_Luԡ(&ݧ_vڵmkp-mZN[)ȐS?76#q~\\Y3'<]I.od&ef өZIŽIfJuW |Nj[gm]$yypuõf1Y,ekqUNo>㊧U(EB"!g_kpƊ˺{Yf["[ cZecΏ--⤙+ʢJ%IIGvǏkq.~q0c s2\RiJ}Mۭ<0D 3l^g짇NJ.(>Iyj][e]9INőĺөIiTO7wmKu`M&uRYvߓXִ1Y>)ZOܽ ')3":t=ƶc庵[MV)J!h=luߞ{N2i"uD8j:%RIJ҄j:Tu8sYEW%.ԝ{r% q>nv.ޖ%o<~>|S!ͽ# YODtm>qd毣e8*R3,FcQ#1ʸeuWοOm$?-x6)斉c6VK6'qM(ږĄ-TD3.ԀF?ͣ)g6BZ̻I5=_-UQr̾>g7Sr3#䬔c E#$4QO -W{gts?ߡd76O /Jc<ۼ[}- =~̈́^ gb%/3!TﮫqM ŧ١P_pVUr8G_Ys;q,؃|JM>j:ll6V8_/AkuࣨE[V"Az[nfLV))]>lZ3%dѥ fIKƤT>7XtBoVվ=9\2[K->=RCG><.&%1 ۷) b)YxZY[Q(LJAyz].ۣ)w˓z'ظkoWR;cuK} &]ۈ>ZeR1v+ۢnɆ@f?"]lZym\0Mi423Y66]|IY&FgdԴbyQgS2<]]3Ym>F>ʛ=+nL gK [j2%&dԹ$v㸻߽Eڻߞqf2'k9,& #O$zb~|C0+wBJN}:cLO*ִZN(^Yq3p9ԟֽ9rKK(Cq]ڃb/{K539z9z9z9z9z9z9z9z9z9z9zRijopW+;޹V6y}~hz~9 ` 5Gч-Z;>-ܖý\ddz~w=0rrrrrrrrrrr=ɫckLgnǿ?Zspu'\5ٌ\n۾՗r3MwXƬg vkԷ$z;_ڻ#u1|óKegn9%.Dx(e0 +{W^.:)m۪K:D Oa)/Pd[@wc/68A@{. i]RrҒ7$:E~"hwpfHӍ…jmhmD'J[Ɠ2PbRMkkFn\~&wrZtqR/I) ghl_mgl8-h&U#lZ xW$0/% e̽oOI4Oo{pBe/X/X/X/X/X/X/X/X/X/X ,Wɺ쩿,lߎcw Rl,_ǩOkꛏMV=ol{~z #1&Öcܞ0*uȮxZ@5>>LG=h+qJULp$/JT&^m$^ cw ҙ8hXf8ᾘYqǥDp!jZ m$Ffuj L2>W`%]lign7&D #R$FD ki=rfٸ\O!V4޲jV죶8QdWibJfL/mZ@\,xߨg{}ǽZj?IcV>uJfZu(a2u(a2!zLa2![\z.~]Zxj{<j͞=.x]M+!=&ZYO_A]!j\omeCtM\uDT%j31~YWEűHdʮh:[0A"SKmR֣""/XfiE\:ӊo{ecܷe$'HI\J:x%&V_Fc Nq͕!Y!5?H 3'RKBȔFGԌ38|&Uf"83, P57ΟWm$??,PoD>Xl#'V QD9M%[2YW[n$Ҥ,M&Jfe6{%ݨe?bE~3Oxms\4RǷŭͷ^a~b>YK;WV*[,L1ӮmophmOɑ^(WO4sa?z~g[8r.m^+hoɈ#"5Ql ~Md~uLdk*>E>7- ݇xd%:(D34<t=,kv8zevko+=QI9Jr9W /O/yzI4e=4Q,-fQpQc";Y-P2? 65Ϊ^\]٥":9j^$FG*IOþȯ~[ȥmmxF+_4,K2"LN"bXY.2K4Lb/' yFD_rA4ևU~)ƫ{YꏵMְ6U譮퐼FrKj/kFDLmt#qojN=?P#wU}=ey+)Rq)b)'2RS>]ĺ;;t.~h#YC\oj uF #K7bVő~x_ևOP&kyi-1mgWSՈkP;3%[Kq c҄j/4u7Xm힗n=Y+ <j]JRmYT3mq'䮞${HcTR=urׅsu-*s7&wy NDJ&Dv$i)6jf}NzG}]>epW_X}`W_X}`W_X [ R>HzozUshW[V~߹|`sXDvveeJRu#i&hQt"Fe_}Ju-6c߳O^7-LoݖǽF1x hzbX-Lt9R֪WH*ş(#Qlņr7_fZ޽CRm.%bT\Q7^eq岕ZENѩG'}&'o~jNfW_X}`W_X}`W_X}`+qCgKVnگ;?cmkU19@]ZI:!ҧOYfD]LI,B`p!K9CBRRL\I|BNto;3񑏵ltm~jkf7^v#z$c7pC E;@I9_itYWç-h&Lxqߗ.CqbmNɒ TFD"*3H7uX1gk"69ңo2֚Q%+{[?鋲i]?śwZ 'Fv}c + +V_$~z;RazK/Ԟ֛;x=7[Cmq$ * QXMcCD_0|i%)$uWOst1et׸o61H~>ikŗُs?8_[E(~wcMջ}6L8fYD:U~Ca2ZFc>&cx1`SjEw?-d3_M+5uxȊqe=L'6?ͩyܝٽrR ^ܸcۭ垏/cagXOLīfM*KQz݋'5ODRDZnK)uܱ.ںMwVײ͎Hm)|Q&Pץ(dWyg9&<-ś{#WO4yu/˚٘o6by+bwE[I*q4n,g}/]݋O]!^xH5hc+!V|̅sonºqZve%Ir9z$8b(qmvlG54n./ޮ8m pW&"ELGDeR#"AltfiƑzN1{< uv]%a#[q[h4MddU$qsÒlb;t÷l{(7iW&Zoʟ)i'ԏԂ䤑$y6Řżwz8jv)p7e;csm[ }ظ=m# }eҤ%)(hJR EjmvV1V韷LJewI-޺LcUx.؈8Rgm6a&)y؇eF"*):~׼=ownoxl~lanB~Xj193y˥h#貯 95GL=ḩc3\q2$b? jAĔKwS2[dH:SBQ${ Mi^ɹ7cZq[xiolxc4_K=( ʧSI$}9G-xLkl|)/݋-Mbk OEWSkOM&]l$\=4љ~/6L!8Yݎl3\6">N~gvhb'L)B%OB".DD0'aA;B);[}Ft$zONqm:CxK]mܱ[ÒHUDUa ȕ> M = po5-}!j5ogP1n~4Z_[v]RM~T.%)i1>N=zqL[MCHO[mIID<[(툮ɑ-dN)0!Nʙ!ii)"/3"fi+'F̓+rM)L\v+f^*Jʵ".Dj=\^G6y8˃t_?B;F ,R [vnwv"Uz QJz2TSµ.6D[zR.؜5qvlkֻ٧%%L^5ңqYO5}1 t%dF'n:WIΔeR1|T5GCoɞidzzeZ}gެ؁beϧ٤Y(P>CR}&qc˺#HS3333S3v;;:G/ľtWb<:JP*a@ P*a@ P*a@/|GlK;;mJu|?j;sKޅsQ^駱I'֥x$fcxDeoJMyH47W!0҈qi!ߑ%R\3-+<4D\JE(UJz'K՗CMVe~rem7{3V=]y ܊½&r FzIjNɤut컸-լ?v-w*pUI>4Tu40I-jD> 0dRuYO]H83S5GTS L(0TS L(0TS L(+q\ClYٲde_[1׶UA9_#QRFfgB"3./kgGK5I|X_dYBOkѫ8z^ѡvy csLRjj(~ɸY~y:uI.鶻[xc^'@v4p ?m<ջˡ݋ 9TS L(0TS L(0TS +3>acqջ}Qe!Pa2! fY8CS= {Vk_雄h'#ȕw| byq9C|cLbgIx.b8q]nnkMC䘖%pU:˚i~ShtU-'МZ):#lqO.].]n;5/.vLzy73%%FKFZͿOUx4 O-}H=SOkow싻?oݥӷn,cYoonǕ 2j[O<j5}Ofa6EbEkZӇw 1N 1[sW䙬mLV:Cjq"~jR{ q䒌ʄGUQ$f<ooVi_߷6w B;{E^?$cZ#{ł67tbD{MPqĒ\U4qЌ[[fmpגnꉯv&x mHsBNRjZ܆Ifmzf5;좺k:ݷH9xL-?ofݕBGc"-*Y&=BZ?h̕C+Úɚ+1Fg;[<[jZ}}~VhIzⴘL_pߜ 4tSy 2~fD^s/XP9(e 2z̽a@^s/XP9(+q#1~xvl-YxGj>osM% $61T-tc.3"dJp$Ÿ/.IKrOCnbcTD>$d,֒T/S'BJD?~#nmV/6累&x >),vy 5SFR&-+|jlմ꽵$3ʉ)1GOTqOk-f=[qW񳱻kWpxΰiSfww9"Č'zjdZi]6OXZTf5YTtf dS_[G٧J4a'ʴ#Q%R}LK#ד-F'>fwfQJl_fyde▩C6{v]iBL h5j,0$}7V.v.&el9(e 2z̽a@^s/XP9(T<也,ldjWCn݆+1dfji!F Zj#;OOAf;1؇iWnKu.kJ&G3>7N.Z9\Sj;nq*_*+DQ"UhN^[tBi}nORo_aoǨ<#Ś~ TISO)&Tp~'iq<%`4׸q6kcݏG1N\,xߨg{}ǽT,Gi=ϸ}[g_&Zu̳pC uԡ83=:d5MLُ.D2SZ֯k=E"s3݄bo+ƭ%Bj#jW甖G,5fgNJ"C8²?f Ri&DeԇnrFŐ6MzۭWTbj J$ʝ*1(J/Y\cļ8oyuiU<7ow?Baa)$2%%D).D]yS5wDQf]h,"k[t a*ڷW[~&jOූ̓O='aۯ= x6=i1k~1JmAh)pȺGAǹO6Kf(DKvQvzxPrv$P+ԶHe?xs{[rM=.;K 0;38`YRDMi5-gJ3?Xtxي["cf1W,gZO~-?䗙sa#@ -+pX~bd xՃ.kLkݚKB$eJ}ROKlRb褨o=Wl'+}ma]OT)ȾJfoqd6wubx49~Փ_&Cz?M>5/ʯB?Lk2bb.sw/|qZ)񆛽ȌEwG&yV2%NI^u5bLvev^vV݄֊)K$JnQ%RO7(yxvN鞄ulgWvj-;&ds'暸2bHZtRB>Q޴8.&^ۂ4^tj.cO*I}rtm3,^L)ܻJi''KgdqW$eJ8Qzʴ?1=G%ʫcs:sP/A4Ѕz>}cpDw%o~>934eQˡnb,d qڎIc\E 0y`Ѕ쩢kSV<&#[]UyN + + +M:l>ƛ{ei}D2S|W2O*~2>>R. n&m.JXexr|̿vPׯɄR~M*iyf:}O/)yQQۄ㼢%x,6cO˧˭(eLJ6ft>FNWJC/rK;dW[햆lݕTj-)lFï.|P t" tV_- $̸%R:xzH|MI]5_X}`W_X}`W_X}` ._v<:]얬#)_'Fh⫂wu~jKʪ"^QOM>#2!m)kl7:\'3:EEK󐣒*TƜ=.YwYhEX𖝚ZDŽ4ޤ]hb7O/.3s4wIJuD~i{O+{//\KŇ"$>gׁW8gv߳Էlo3WvY|;Dqͳ,Y]`2o5>$u [3\Pmwl{۱H>ikŗُs?8U_{QlWHm1}xݳv-q(a, PeCJpCQ:fUĥ YD8D8,JP3qY8+3eJ\Fc!1WDޡ?_?Ogsac@x_kg- $Jfuf%PD ĆȍH":xS=~vO+?8-[HV=F=3&䷅gSr 4KtBs7(4:J5ӗt"/Ki7ndcIbǴZv>rݸq-Odneҳ|Q^ToHFI&Eӕ9m[zqYRlBp [P_R;mQ+Q/)-zK:.Y:Fy~Kf˃ir/5n%̳WWoBC'z]6p-ax;{wGhvK_+po@V yg>mdOl!Ư n \c9jWjG]=Ft/wG+.5ybs[+aZ4,q'E!i:(i2?yĥevJ"l8E">ylh.2hJ=| !: qaYv0f\ڹXP$y%_6'T?lǖzͳ mbۮW DT⫝̸y֦A#mJr5t _i OK./_Hslzl7ٛp`!\1>-e'iq֗q>JfFQqOh_Tb-tQV~$FL׫Vck[>rHLO]ky?cd&MT]^g c%Vg#m7j+SUփ(y|Ya^Ȉ-DDؓSOE=5wa X)"ڊ;{v?G;-s[1~]zC?21}xݳvԡe! fY8Tc dR3+R1dR, PFc N%(Eq(,FcN318ęd3#185e΢1?kKg ڟ+/w(:+&t ]fm%ކ̘w hw +3*,wGV ɝ+dͣ =޲+d3l$RTxuG6I{!~#KuBk(6 =l"rfoW^c.+b\1O?ޖo5&Yf3-GaaPIJJDE!3V( 6ظS2k"Vː~M2h}*tIzLX/4]|[Re^r\ո2%+rT*Ⱦ_A.ŷ 7_3HzzD ;*mG949ͣUaFKQ*$UV}zy+u4єXͧϼI)HI32.$~IO<&yNdž8%sLvGlvM̌]MȏdcnỚɤȾ)-^nʲgdr|v]ۭ™ٯV拍tE**[fi> (]R2Hz['XrD%0=%j%!iQTHCbaR*@ HRӶ_kggz]n2#ȶݍy.8%1_t/<R8LKrkKmfsW= #~Ę~Z>ץJ?Aatt]TEHRT*@ 'pDƫo{>K^^MC69xkjq'ԇTwI*\+bi}Q-7LWG;TH#-P^HRdCH/Y{!cW<&nIHJJ( %_@'˙̍)B 8m664"mKF{n{o*5S(Tl%R? )4T_Zܻ{#\G`d8qϲͪnx%]Ji]f_\R:b)T#XHjX]\W+,׭h/[:=B Ot?A:"蘬0*$ feg`g Ւ٤UȯR⮟9&JӠӗ #Vv6_=o,aDGg>BstW<[6dUHr HRTxYIE2_+Gj]OEoJvNhi _c_&ȕES"_0eҾľ3嗻f~}sPF3//'fQ#IҫU|(DuWӸ zV JHs6kcgԏKhkYQ.=_zZKM#~_VGݳveCb¥ &V!Tc2ĥ YD8D8L3,jP\&cQ#1'V!f$'ɝ#FO1Cbg!3? 9׼=?<? ?(PoD>Xl#'V ^n1`z }Fvkf}F?pYV\mԸU[|}2ǷuYZasvůwc0R~Ŕm*.*|_lz6e=ײ"j㸻Gs^&L&BK]*,sgz?c.c[uQ+v)P$J^m)y4kIMFCژzĥr0Ō݄b9k͠7%gѓB#3>M=fKu:X]Xk.mrmRP}RmHEP֔qXͳ ,lbm7{K5e1ՉqhZkʥF] F7[E%bhz㹸Ni0IaYOTy)!f[=Mf[HcNRYJ Z\mğcϘ[`T`T`T`T`T`Uw fx9miޞkŒ2mGSq]QID#֞֩z}joun'_/7"t:A%$vzsQn-:eI ІQg^P25KWp|>]u)5ODJ!^^Uc)Q5buOUu$}OǓ-waaFؘn?|6}idY"3mI RuEÝiDQ F{틦'[  ]i#aX5VSEl -X1dƈIqVy䲧f,eDaĒд,'R22:4?uvKY/۵+du3&LG^DmuP~1u.]c"uIk+ò,1O1!&RHN4U. ̺-d~G-mk>&٤^̉y?mLWHA#E՟_I(5݆bkfXK1de$]\&Rt\oҔ|E6I&ΘEc{dI:Ed8Ges%D29]=ȝ"u:,;o%̳W1܋9tfN4[U]~;]'#c9ew@? oF;w1aD+ZyڪOA2e}JkbsUzBkt>:L\.SéAIL>tj35qoYN_)&.o폱2e#݉ +&:TIS7.~_Jׯ bG?G@nr߅0XĜ?%93;K,:re9!.mTHVu_9]XV=0bKˎ%9u_dѓngĽI}}|:WD͏qژcwF.%OUB3C:) *JA˓M.KeDafm=B:QD3D>'CFųkkMz#YV{$%zn]QՁY@e44T䥕idewG.;k-sŪk3Զ˕we !K3&x̐/KgB,<NJEa>Uio.i[Yv֋TypC,!""x_7nˮ"")HboAlAslڛo^e╶42ۦ٬M%&"tWc&̋NS 3CpIP񙏗/˳ϑ᷷m5} !&2R~$c,ܖ&. i)2&ñ[z-Psx J.QO^J1qMgŏZaWD2Edvm.̖ʪeER+24]4'Dl71r2ѝnDwV쨖ͨҴ)'RRTT22H\^Edn+K{2K D~T^QnmK|LK@*P UOdm!?Nq_$BIBJA99NEUx<Thԇ&HA$SzKSǗU(cdkV_ԒogCWٍX;/vP!e8>C^خѺ&LuPn48T'ܸlo-Xs[|5t{8PP8\Zk#nlFjqgZ>7u6-c[K߶wֻRב>Wn-d5i2#l"$6eJrO-.iThۗ;zڟݽlM9%n_mJck_ye*rRK+?ά^&*n#OTyp][$۶y7r]J\St󌐯S1E𞶸a{N֓>q7$NQ8ꎾB2z_ï˖.gZ?oCz"#6A艉 :bG[d34Bɡ.N\ŝͫۮ>%V+=9k"R9Н/E|!]rEts@*P 㿍::얼(΢;{ig9%oURb< /2#ɚtnuP׻6LUoAՎ= ֓x8yQ⾶rmp$lK?4T?e qԪ;(Zq(dn*VQ#)5uiBfliT"O$ EBGYt[*hdyU:W qw!ɓ+;5׺Y2{9DG$/礿8~D<߄ͭ-[uXU-)r_Y!Qh>C}iu5mԾ(mXHC0IgmtBGbssl3,qpfT#-z}|n M_ Yn̳,1V8En/FPDOͳuXt['϶nZZ\iĒq&F$ʤdepѶ*P UE2_+GjLx11ۛ&><ň rЄ*jv{^%dMJGoщ1+̷pv{I3MHO3=>1:cQJ6^xw!FQb̪eF=QG80\5*77Ghuβ^IWES.ǗGgJ$uo~\xz"%Qf{<҇f4gَ) #p&H%?CӳRfG\p/֜R6tj]l#zXv> in=?Y^v-pq$N˧/h"/}xoSŸ'V4p7*~WK5vwUFW2Uq.u5Ka>%ֽzRx\nmrYky۵M.,xSgGl? ? u O"}HbfXW CJXL *P&u̲qCpYD8,FbI3̳|b8d3Cc2gq1e\ֻ}"axtKH'BS^f2˻p[|3 seǷ9sO-G\0uŅPN\Vۥ)?>ﲛ<{Ż G~5u.ũN:.J1~[<ܻk5xų< \%B=)y{**tKd= |j狦O6.>͝vǕK4~,)F}DF}FߏgiEy3}..Z kو.H͵RLo+ &&8!2S30\ˣ3/x`/֏YuKC_ Lp]s.9̐oˢR(QYJ1f]frDXn^rrr?:;2d2ݞB|S|.DG*}5$&>;#GfASdO?{)u6%+DDZX|t!0}l Mٲ*.ӯ_إ] If KrMQ#U:)u>]"ڻ7<Ģ}`lrkY/~b[5ϩ%nkvt+z.=`P] :-uw3bsM^f >Rq;"33RmS^B5.돷}kMnSťP}VfF_8rm1ǖܐ{ =Dv:!%fPQ?utl( U["ȇr}>..l8mkG"Ʋl$Lǯ,n&|\mEI3/ei3##C%-k f lfIԶprؼQwUW/I+: sm< ^/%W eLjsY ^ЪiUz΃+3D'I&ޘF-m-66j%6LIQH=^$ū4K 4Cw4KF"xFJ,8[trq]\&Vћ:y~uRyuIs9POpG\OEΎz{%0=Ld]nHC^QLdND3?l(Zt6> 3r3TBTU|Lk S:XTWˑ9-Rd]_ca."M$!Z }}T^#tL<[> w\K A(֌&M8%{nІ3KYR-QKo25j$_Q|ߨߏoZ3Li{Uᗘ+yb?OT:U /T4y1[[ۦ٬6;,TLGaYɭ-oH)VUnC78lsTu ;m._"2QdR2?Iusyv\pU\v/% {J]O/Ct ;Vi2nZN!UCrVrNi_茋v'_>]ZzS`iփL4[r(zu.*W+Qm=V׫v9v]xx$cm.weEZzҽFXzEd/UU1n(G"*ft}j1e4˖'SFu&I:T|7խ(uۍG?XʹL_Sh|=Iƌ{rv{0-&o]PRr(4hKɯyyp]EK#Y_/'`7#ף.[uMYݜ=Jx҉Y|:R-h$HdKwu}B*clDDC &KMM/""R4J,s?Gژ3u/GtH#IGmm听֖&f ! /qh fxyU[/#hBU d .Ht/)SA=MnԆ̕=%MV5(44Lm.!֖iDAT$FF]H^!ގ]f%) DEIhR*,>.,cg;0.V^ %݅1eԫƝJV*"25]wmtV~1vkuO$rqJfF?Io'9qo O\Rn6;1]? c ~{75ek~K%\sʸDiDоQ;-{[k>x)}^vwUGkEaKgزl|KQ&i=S^rDV"iYRODu#^ TJ\*1(eB!f1e: UgQf#(fY> #Eu}JQ\auogmc{x}G}ҝ1n›I~bҕk{oMuݥ3ZO ưwѸݱ %/u}zT^!/xV^ "鞙3GG>|Vz::H@ -+pX~bd lYmoѹ?MċʙV$#S">'d75ia~;oan!JQ&Lr?DrJmgSψuC^=kVp)|I0wu>lIYWg0a˗kmƒ^Ƭ4lyf4ZOU/DG}6 <ɫͿM%c>L{r1ix" J҄~{fEU:_[t/z^k SEMD?C_Au4Imu< RBfJI Ht0Mze87od8(Y'ku4tI?!Ͷ&%ܓja!?pKTcD< nҧNETǙ WEE#Aelо!wӵ>2O0 8qP*iĩ&G}%bm*3!qQk#Nz媝=CgOǷ2zK푗J(!?Ǜ/7.5aW . c'`?ОB}GmUJ=;f8$=}|}\fz{u(?>?G4,pn-@xl:~O$ Y}C額_mXa11ōѐcyVAQtno[elKURF0oL,L]X?"זr!je3hY^fM۬:-c-)RLT]H q SgYյOdÁ,W rVoIԣ6~g?BiIreGk zI6FYa4Uu1Q&ٝ}j/(mWl 5*mS_!?/vUb4̛.!rrT>{Ψԣ!fi_uXmO< 45)JQЉ$]LL5 ~+vs`]BQ?g?w/]MfB7aΏ;,qu ңI?ǽmmcX)Ijٴn I5 ?Lh^JR*xNTl3Ųozƣ7y9)+,~c #'RFji^%tB3ٚ.ӄ1h.hdC}Q$9Tu䲳CZz|$E]L\"B"^{I"' IRQ8l7[q-]K4.V%Ve0RO#zGul]5z\b<MAtX[/f%c|K$ё\BO(] VM٤k=Lʲscip5}s4rsirbGR~LqT1Ӫ#iݟϝtX-O.Dn8{U)Ff}Dn&#=Okgx7[r"U.;n?V5' q?mfmݱum\Wod"[nbru}y[f,kSTDxu㋱n.gn/?oŒ.om&*Ͱ$̏pJe >{.'__~e>-+A~snM%eyF뇟wݿtOu6wocW۬VIH~O5Iwkf6,mo:xgU:_'>Q#llGD~OGkf "WiJ"_H쏴G]ƵFۑCoSi5q5p=fwWCm|V]x[wћbM vM3yӭ?R:l#{nԾo޾{-ёC7~Iev{y8l&S&j;3YodMW&OK{وU[`$OhjUHO 1s_we-peg,V[R=Gj"X %.aSCSH63ob=#qI1ڔF DXa )""Af;q-w8͈y2mcOove]}iL9HpHp҃"+BtQxLF=qkSa)c'DY/-*hJ^v>gX˵C2f$*ۑAW BU&fEUC*]Fym7[0.pLbkterb\un$JI1ksȵlɧ:!:=~er /ggܽk_ |;V'[56adkIR_F?::Z˖wY*][qO5UȔUcmtPfKM"XtcU5T7_$~4Pukqթ3RQF~&f~#l\SXZ`q X7^ 7DEeb*a S/e\~Il`VINЦIlTzHse;:gbVʿdSg1YqZ|Ē:ƆT]+Ԉ0ź3t˷W/plnJ* ʴ$x$ƽe΍vۍFF]Q~a.҉$Fڍd uW>RШ!ROڲt*+~{^h'uYnqFgqWZ(==dpse[~I5{nlDi՚m* d]jĂ"#:M*"Y}rH}6u̒ Ys|"m(ҝ>Jx5%"i<okɢ?|w%e>lFUu^)}%4u/h1m_8N2y4J4ҤR2 & {2 L7 ȕf}> SH˷'Y|+ϢIfR(ܦS4T'Izy0ݏۢN=nf׽=v*b7#\d,dkyj jO{yvX { uZJNFOP]?4e{1k_Yı$u{# .#fJyGCC>~hiS8Zv߫fmInKW^qQqe'TĪUU|#(Z9%ԍG2ze4_K;o87+O⇗ҹ mb3>-z$bHQնdl:b$jW`SwҲ-5C##LF5Oϑ*ψmϤwW]fabyEIq,F\n͉%T4ʺKJi&37Jƥ/5/JQ!]<Ʈk:YR.ᤢk?zn.گ筓axDfZC˵cXo$J[L2YPgz;YOΘoF:swqar.8>d*)|/T 1]($ϯYWuU/reGU'q} _Szn<6$W9&g)QV>=f\\?.,tҦ^WZxa~Kl-H"5)2t .&4?K|r|"&Arrj<)M&A}BmHa7LNwm=+,ڹ>bGV} 3J?E;ŃN7uGߋmuu2ՄdJo)S<㏸\R%)*GB"Cw;7^1z?RL(J/3(}>14.-^n\cb; V6s|6LTR:rbzڢlK؉Ty)8H`W'HS */ԅu$5e_ŕ"~k٦mAz>2B I:H:"bbb0`2$T']E\f~&GA&rqemk d?zoЭi/%v;mqgLEd'X}&^wi_\􎦂?(>A-YYR>DZ3e32 +juT椫U)FD^&cnL㷚%HlsNv//w ͐F-OrCYhȿF>w3?./\ųUi,;lkEd+tF- BQ_|5k.興=!hui7neߓەDt%(bx+f6czͳ mbÛ2)%; dU6j/JddPI$L}{ɱe%mwHڼ5FuQIRۦc?2X~I޲l!G[UܙQeнC,xm$Y&g)QV>=f\\?.,tTSBO/mYE) : lů2p 5~%ƚ_('2,w77gvOeִh.f;lD0x;ڦ"9WCqi\lϩčTޝIFiGpO 8k~-Q\ifU?ݩQDЉ$~Q[]ӧWCdž|HmhvK_+po@V ⒕$Ң%%EE$ ,=p#cܫR-gͅ{EO4(Σ[k}ɗimۤgkZ^Wb,R,zg\:y<}<}. řjuIEb]k?'4?\!W(jJ*tT}HԈK[fEkw"3,-)vOkȈ_AutP5&'M0ʆ] o`q-ٔ֩xgXDv+,YͲ6:*҅s߷i,$ƌkBE@ڒPJ+>[ A"&eJCqqnu58ԥ1l\SXZ`q X7^ 7DEeb*b Q/d~.#)>-I>TF~G]î~|o-lI6xcŘɌI#yhnLҽHgf^3nvjmQY"}EYVx/׸},Ѵ9޿G3̱.!m[]K⫑)I?SF[&m-mގ-k:O 񪻞?M]sNG&d#nJR\A֭SÀ?艞}ұ~,FOP2#ǖe0ܘGu$BJ222dbX3tG~jYjA0dF?Auo=]g˗X,HmѬ|ʰ+,/2YƐ \ii3Jf^f)%T&\U}N:H^)`klhyy=Zo %S$ܡ/8J.JQ׵:ut5enN-Nnnض[Wز I*0~3Gȳ>#q yvc#ij܋ uҵK].6)iIAR\e]:J;2b-Qt="֟H22ׂIK2I{<[+Ni5KNgYkTplx(9Jc~+6}oG5eoH]yNA]DȷE~c&f[NuOPwcngvgiQdt2'YQM)J/A_k&"褵{$ȱziӴ;t3&hDRR^*9D1{?.=?.c[uRu]J]\-mjAPۉ?YQIQz1ƺÎ `,d38To2"L+OPhwX3]ŁeE%lEyФMKq fن61R)DJ:%%K[0Y6=԰4'4,EYtu.YY3:ep[Iaw}W^\/Hh#:tYYR?DZ3e32 +juT椫U)FD^&cfL㷚%HloNv/!žqq.)2\ij5Aqzv-MkN?mfcZ-P&[4YiJDE YwDDE! Tw8oݿ iN"?7j(TO?bvZ,o;-;ڴJYdeFPgYP!j{hݶ)O dqۉBԇߵ[.S#Ҿe4>6ԯRh5613׹$< GBZ>{n6K8$-)QzHev96)m;MCr~OnRd8pim4Z<[-Hd[{ <s,W gtv+B"QKu N5wꘝuudU4I22RLG@Y>;?sFOcf}5J;st4ɲ%pנfx[7]Y3wyQɧ]Ji)MDiQ)$i*ԌW*@avUYsƤ†>hzNJC h>TB#@ibf/`i/]%kC(ZLVDDDgSt ̡F RJKJWCB Tf\HU %vF4&ZHXkU }؉$&CZO*uV#VRK%Ԫ9<#48{\Nw淋kE+$ha|9ҟ-uiP<7FVγ*ǚXD.J2ɢW:A7sY4a~;oKV;\ o|r;m S?1ty)/l4$v~-f_d[5Nr{%qMrz1D"?gT>R"bf8%/z4=1n2pQJ?4{k=.J5p 7zuTYI㾏Bu>ʈ˯^!̖lÏIJq[c.-4?늢P_T+2DLIurqU,/CRG\|Hȏ[pcK|򏲼%!\h ژ/*$d҄YOBNO1v25m{#otqU.ew$ HvoW85襤rCIZ6ݓMCf 2ow)JHIK ^wE80]LNRC.I[Z[{qo|u m%IDiRLdd~$`( ]Z)3$U\vdej3PFMC\4u]]KW k۶ &tbB/aМaԙE ̇afkyξɲi,ϳ@g6-Wsȿ:ЫB4٤/X8{&r,G!L'UQqR$dU[Z]gL"tJQ%$jRIu33"!]jpA.q`qgLAd7:Xu4I Hh#:t pk|}ԏk# Y1D̂5UnFS"ReRF~ҔdEf6dn;yB[l4tb[aLI T)~BߌsCϦSa6=ngcZ-PQ÷Ci |h _]|5k.興=!4{Gۤ(LCz倓yiiddH#":C7yze9g1z3"JKu$IP%IOɷ5|h˷'kS{w݇%-ww8 ,Jr:%.*O暋}>Ytܸ.ǃ Ķ-imcR\1|莤4UOČtdz`g.vm+_\"zSWQ]Iz GZLˡ v=/epCMK~#fQDGmIQ艉[6)^MMj"!$t> U Q>d5ߚ-ӌ2fYb 3_ky_3$dB=JW_ vNk.h'9%S.R.H\5:ԣP:K li0iʳ嫯뵻Hl_,Wf¬ ))d\JRk}U[S:TUHWf;lD3ѡ_8wv_<zwGw4ībfƑN*ż%Rf2yZV>FR?"ٽڸwsOێ2Q4/3*ҀCkfVҙEsfXf36umز[8DEb֮uFUm᝭c7,wR(fĔj5$G穷OW>\{ "?k7ْJ3:?OQR[s⁸q֋3lܼ}fƜ0mm)A ׉IR\ʢ/B|@xRaDbcSɅn}3:#SU:*;qHk eǺk-̮Hi.= N#Ymm/ v^ mpbD* 2(I,7 OHFM2E߲=jØ#}6#=.3MjIi!QA>jg!W+FDժz4.<&cqj4ԉ "2,vE꬛**22Cm%aRԍ[|zt;Vӷ{dfc f^ {,EkˈQpTb5JmiJL'R#(ss̮ݳj7k!]\z^X^!?sw2ioz8ۭlBZiiIJRt"";p,GbY^+kښ8̩2L21{dXd_WeyflBidiGFG1g׋iuݤ6yk<#XZf¬I)#\+/ҧBIt;q5վj,mHx43hvK_+po@V q.dAХMJ! uP,*#/2&bkZ=Znj܌t<Wfl*:6ȇˬu\9vq:kO 2\&"o呮,)Pd~ˈ?IҩZLH}<䶶aulR$=Qc5bmeNQ!/R~^*s٢r%!\h ژ/*$d҄YOBNO1v&锩;k}&۠}t{+%H`G{}iٯE-#uLѷ읍j5mӹJRDWrJ\J)e*tR>guwLިۏ`G xE"EaRk̚&V˥kw#%yPvKH[Qi*2""g2-yO ^vr0;3VJ,i\SdPC:TV5VtK6ư{%*r|$V8o)ڽ͓2:VL2]&C NInS1q9N% dFiK %6[6Kܘ,2##=Ծ)|4OSA],gmxŌ%&+n_1FDu$$ru! > )f}^{}ܘ6l@FZ>z* y308> UmE̘ݽ\\.Mܞ*;IM\.pSDi~@%wlϴv8m]lh*mm-% Ɇ/ KtѻcPݭnB32.KjjCWmdF#*U ՇdmaW^3wK \RL6Pm5 QVԛ_̭:6V[GerM "%[%oۆD|R#IFU!o1;v0Kx,P} ˌ|fByV?]~6q˲]a$$2jJiĥEȔF]:C^>{͇QmpM<2Q[N@jSȹ6:x/W}?m3Swg,e6KQ2V2vD9!amH}ɿR@oN 6Zbئmx8RUoLs#/#Qw}2ryxGZ"\o8sK瘔/Xl#'V2fd6vk5=\tƒ.2:TC2klRb&)-qn߽:mqJu"sS!I_H~3r?ggӝɑ00|\o :F׌H3$Nd* 񨏗~[>MՃűc6x;<2{|6dg"Wf}Lǁ%'鬻-C(nn5D/&mFRt3%Amw@h[S3HN!)X5RԧaR|xAhk ϟ~֗Mfpˎ8tA*Dw2kZ DT iabIp0Sq-4h*kZ̒"ffųO9*d̲̙^)MN6O0&t: -k+{{fѓ{mN(gH4Ͷ EqܚGbf{3$g'$(Ib3 ufI3KTISuq/ wo%~Oj%7p[ECMס`پ51s\u2h2pS/G7Y346!&^KZlvؒg% 6KM4 Zֳ$1lm-,&C>JjlSy)h3I$d^/$dIkT%^3 :Ci[jQHB9~?[]EZXzB]l:{ElҘՑY#BnTJ_ye.( Lѭ'A+ط.$r$ 3a4뼌~RS]ϡw1}Ѣ3Y/loM nGIt8hےKA>*!᩶?̆[:2SYנ6R j?6K(ۛ/3uN]bM$2d=7ݏIjB|iOg";۱i4Z8Qoo۔&KImmo4 -$UREKz3uuï*[ *>kbJԔIR蔥J>QlkrEVy%"GUV'"/hHE͋_h8*o0l*מ6j`U*$j E{ELdmylWVeIaNDn3.kF6(5q2%'ċD^]ӯ'12v;[ٶpTdUO ;+[k&$|2e̔Ho/d1݌˻,϶ph2N˞e J>^Qwah-ju̪%;ŶIpq3}B)'R$#5xtaw#0}1 ]wNu?䤓80Iu˗l:-qCnrcKI[?-\&u]hddw.ԃ~;yFU* >t[BmOFaI64:GCA$)/а6]5l '3o,rG"WPjPkZu.TMUⲎ6rNbsҮ$h1rC)>FK5P F3.ơlnF4H/Ed4ƍͬrJ&JMC&jmItU09"N9 [SlZT%F#"??᳴w xVMi9/j9/IdK#(_ZJc Z=ݶAm8ݿ]hܧ3)vhA8>J%)8 0Omm|KQw]ak ԱYɗj~B֖ӿe|FЅ(A!\Q*4հ_%lStr],ESl)ZԘD"Gg^!Z;cg`M-S>fM-K~)r q"]I'5qNxݼsem#%\$%__d/)2,2gR!Fi{ٹ:iqSIbG'q(Q8%+G% -;ޱX~ZևHpQ:FqDkm(lt:GTnlsݽW#D9cwBܨ]}Je:MJlat'[3ϺV/8ňjfݯͅ1}є 5k s2K9q Qq-/S䓯Ջ3UڝmٳOs~U/devi+ͮfwZnl.Dnh5~SC+E&_kfVVǙy#2U2y6SQ(WSkO-3*Vݯ2ڝOOuţ,g[_P%lUn-lPPrs4cQX8a&.o1ey?dn"lVw)$)6juM8|ڕ:'yګ;r27-j99[*ө4-'%3Z.cZ'n#׻z>qoDiQi5G`J #GN%S"Q\Si3n(Awt[[{jNĺ]˜KtI˄H8ӊ5.B[:uD(|kSGql?xCąVѲ ,ҚMϯS !ݍ{Gh+휀%]V7܏lt>{JS &C"SIJEmI1{i'U]EA)Mu9(3.D.I3G"EJ.űT"M0SYJ+Ƹ%z|Z[8M^vbdZQ-Ȓ6yLȓȐj$4U 4&Jg kEY{`y|HN[Њ%ZǕ )(#yt3"!`6g}oVvvF2ç㏽G#Y$SbNtWu%5kf m6y4:Ȕ%VőD} HCFgۆhFfdr$_DYX"mëmORH֢Q4a=;p]7۞Oc3[ʦ~7!ĭ]%I,Ȉ仢T_#*AȈ2 JoiV<$𫞃K͑%8,) *ybl nY%$v*$=JM 2uJTg}՝w91 KXmDWyߕ0QcjR|#-WL֒p!㐍 0xi@Ekk|mSYvݲW$` RBTX%$ʆ]Ae/ qlt}Re)%q̼WeOoL[𿷌aa\5SٞˏdIBKDwX)E쩟s.^%9+rg^- v|x*a4<47+Jk Ŷ\8&q/ƶ!ܥ=zb)y*|I%ֵ,6zߺ&FA]h118sC.L6ymTR]7F_ /yFeXv =97dEft#X0.<:4=d/12|$^Y?<ɺsdcp+52/=z󖢶2iIĈM4rB5|R4X~!v?3=qe*pncse_O(EN=|H!q)/&#,3-ΉhqOu)GCuY|h{L%tVmBv\R6C[jH5QI:@mcf;%+r.TF-6BPIJ.IxWNZk2M2í·reԸII6jjUhvK_+po@V }>{\/dsw'uE[M[ jA(J` gny|X2'5MѨ[N%."e%R2B5˷ucMYo##\-<_.%IJj"5N^ h^s,t\ōQ) 2ۋ *$)D4ߴhE!(M Dк9pfqzVd76ZzBPfn8DBTB@6&^7xbk}H6^3SѥN?)4P,X K&yJg?A|M齵vx~k4gu]PJThhmhlSJ"Eƍ kl].eˡ{n-4ͭ* e2/Cv[3h?! ,buWvV8f;7cgAFZn)+tq %êS|i#c{K>{M0VR4Y 3!lEy B#' jp,Af0yFFm== lh_ ȶr0clGZ}j~JPZV6MJ"}5gNEsX{Ѹʙ= 71IJO-JQ!$Fi%q59%܎K펻aǯQaڙ86˱$]~{绮76 Sk,+JTr ~HAz+'ŁXhh_)^iǠ=Ej>8k);vfǒ^I)|oSg퇈vc-#x/"Yt Q)YHq)/HY[?rxt6ٻj_@vVQXq4]a4M+e%}kDUQe]6Mr݃_l$y^CJK%udjRU""~36bxe!iƬ\R5P|KO5tKF4X;VW&͏.Ǧ}YJa2I}*IFfUq-X{splǨ5s$" `٭rb= ǟ_y,ɲHAվ]/gɰow(hxrMސfc)ND %4[o+3sO!d4TCpm[l˥ $kWj yyg!#lP}%d2M9US腙ГPVǷnlaIg/˭ab*SCg2+hԇ?ii *F ?nWl\/pէHfej+yQ̉n K܋=j˦Zڰ VMF&4Kfk&Ci%TҢR*3.%/6DlJUJUSƆYŁf'%}ʿP/Cd;=X5( (5He7PsRn.9ҾϤ^=x;{nqBGqdyI[0 -\Ēr+`m6W aEɕMIyS6ۭ(T_j] 'Orð0_k+,M"oMl0KQmm%%gÝʠ%{ٹF{j6Ѹ" W&YKkq6ћ^a_mmqB?O&qw)cؽM-兣]AG!4i2(R8#>Gj^l/¶ν"9e L7omꩃ WZ tsm~݌f=]Ƹi]d)l> 7ɥ!J&m9EZ0D]ئ{W]$Az}#6;#ƈ4ZrRҴ"5wM.c .Ӎ3i~k)[d=(\ԾR΂{}1N9Zdq9%a ňWP1$[ypq8 Utr;pDZ6cUv}K(ƶ٥k"[!(JjRqLT~"#]j׽o2‡7lP}B--3GjC̼SvlRZ-Ym/u7R鋰xd:! KoT2*y c@R^{ɵvjƢDƋ1ͳu4^ \+JYJ.TW=K;:^9t v22 d{wNyc:hmF+%$TD`L.P LOoE}ҿ~}sE"5hZ^cZl\E%wU.B:nsx~ϺGPa[ԇ$% "$/~%Xs߈OkKn϶0ybO#Asni4Ul^ĭUvq8r8r[*"%4 %81(IT(Ƚ qkvQ'Td8վlY&fqK^d3wQu$ diBjJ ۸(} cC;M _9g6ti8go¢4\k%s)KuEa$oƼw :9NM˵P`&0VrUdDP/d}mMn˳Njg;e"i ѷn:㮯4rP,w=\;Z#XX>Rcc!i\q4mM5Q.70o{Xfws JjD\j:)g0̅% 4Bt3 {c Pv*lC X- Udc2NTHIֵP脨ȔtIG%lOCV?e<ۮه%۪KՑSY7摨]b;w{o|ZvNW ]gDz%+2KB庺Dg 9{e~K?em8sNs$ܢ|Ue† UFj46LӲmX4LtvLDxfFI7_ueDב cXY:)qX1rf%R%QU&DC)_Jx.ۆcvDge7^Zp2$XV77dq%$myhG+U{HGB2, M}}m-hȱGRKK2e$IUJRDDU30F>me˺Lޓ,Riw7$8h'\/!ުU,DG.>.ĦwOl!ikX+v;\nΕ&qBL˒tJ]T$SkK![_aw)Ru%5 #e;΄iaTQ.GPY>.v1-ۺ#2C QֺBD^&@C6ƻ92vǓ<{[wf#m.60樀a=E vl#;e}W4ҢYQy|FUp#TmLy<mKEYq{cOKá^_|__TKzhy$OCo ܿns:}\kWLw"]v PipQBдrMH)*"Q}lY-:fsr":V8ZKxH,` 3v_ *}QV͗;*b!_aM GE,N-IG4$Q ߧhXNx}4sB\M3ȷ\d6ifΪRϥ*"Ķ=g aQsC];X]ݳLq]_c%"8nE核eS>Dɩ5ItJƆ[=n׶9 fcksƭn)$h(2>FjBGWۦ#{>rmNƸO2!%N2#к3׻α3@&ǐ"1Le2jITK#AF@.hcy ( W܋$r1ClڈK(4!uffk3YNIJDނ4W+0Aa/['ޘ]eX~) ]8pXn;FEIJjdES/B`xmKVݶj,8pʎt(ێqkR( BUr]vg 3eNؙ؍]߿"ɔOLp5>՟P.,ݠFֺUŖKmN?^IsWR`td7~ڮwyc[ [-B6!đ*7JFJQ,s#Ǹ"##4|_!(?Xo%'dlF|g!&dJͷ4R~hiR2~vV nE6ܵlEJ8ҎTZj$αk_cfr &J[u%5kf QaɿD-r NCp3L(-y\$ҙ7Ίimֺ Jvp{vv$t7n[e퓜M}|24tͻrf'Ⱦe\%9(L6(ȍ\MTMxkywWo|^pƳx{aIS|* ז\Ƥ F=6љޱ5u '@ܶ餔dזtJDFd@CVo͗T,Cw=Э?G28hKSQ$(l]a$Eeopkۊ1L&SR"DJSXpN$.E&23#[^}K-inzwQj~>mXTl]fʆElTA8MBY-T@+xV/knefpi^y8J4%@6Mw}ycѠ\rS&L$jCN giMW՗{3.oY$vI>R0iI7Қ^EVϸw%|tCg6=|S҇I+#CmI3*GCIȌ#ݳ ormr`Vw#CFRǎ٤fd'($Ҕ]NPڥ2@ebRD$Tf:#Y,f~e cw#;^s*;ZAa-C2Q-4y0tlER:AToq.t:}iDt%HK̩iRL*4 #J~T)Ýw3 ]ߤjv+{X  r}lRM= }ZҸ>ֽsyD&djK'ztN%(JY%%$D)"JHJ.{bBΤe&:m D71i^qK Gk WwM8269w;JTJg8gR3lX[6V[]BKrm1d2HBF᤹Ԋby^1նlrlHfj47d!S3Hu֏ݑ.VɲgbyV͚Rfux"ZL|LB"Yݺq9NQkqQ0%HufkTZ|FfgCaWeyaSߜ7&NHbOGMUK"tjIH-X/6{ld#y}KjK$\0JuU3>^ !VSvyU{cbϽ꽜]Ie\>8 $h.GҔ^,ܱL͚O[OA7x2۩C8FƥIԣ@yó96177u^o{LKֵ. ~ǖB!.Qy4ȌFBRX,{1x9HaM[)InRaYˍiP!C;L/4}y}瘖 ܍_bqQ7ymA6Jd˒Τt&[EѝjwqmidT-_/r҇%?D׉( JUqIrUHՏuؕ:j|O.ya3d![DN4uRPh?h(c_|.V[n7;Y'kJ3IW2JZJ"?/ϯ$( q'2)NЌp&D)ќN4|5":P ^uu+1&*򛤈Xh&"9Tޠm}@+LfR{Rc2^DS}4a)$fEB}>anv̬bnlTx-)k=GU6I@|Fr)/M76O g\R"ЄJjnBT[9 #AH8JHO{̻mrۧqf7 k~7J&1~I͆T(QctILU}{4ϳo([-L1)zm)RI5HKI"M Z`@=ߴ=ΤaMaOBD㒩ɎgcZ)Ա+y|iKM$qdDJ_.GքYinp$a,CD-Ҽ#hdeN or1qJI[uś8ΣyF;`aS9$$AQ>Tl:"1ε'MG1b{m$l%I{(5zfZK~oymF[/(7.]ڋZC.3DvchyUNj< qӠc]eεL7,G҆m.FڒO)N{.u^u 0kxfwcfQ־"Q}[6Noik1& 7dEuk% ~kQVI>%*)ŸYpDR[&䤏^4S7#4j)wlk%^r S4 $sh,'?2כĻYQLC fi:Y7ÊK/si| ܁)R'UkQY2%@ :ByZGC2I-&g %Rq[vw_6ϞhleE^=`C%{ϼ7-~gıI \%4TGC__r&|pWoyEScG 0rVI_O S[2C{X1 46Z( B$͇ﶓ/g#*Wkm9meK"//W'fY.m>Ѽ#*d %*mo490Vvڊ)b~&|GhN4@%X?r>ճВ~+}!~|7 Dy0"#~)wtLS>17V껲Aq7!rFۍ9R22*Rj#1UKl(z92A_&\vQ]}S/7K2֒JIRR^R&8]Z[mqFDfgЈ38Viv_e>y1fyEyi8Y6O^*Ө ݘsϸX[,=+.o(W%OQ&A>GJUAǯ-Wle6l+1_kɴ=5^iiv:q&TWU _ َS&)/J݌8j;qO;_X-WVj-wqfpilMoFISuKq Ej>DT""Eߴ]/4}7Me֦Ϳ6Im6hB48ۄQ6G^&U:yи&_n2ٜi$蛒b:ʹ4Y]RN%dCl\ 8NG>;D8Wf伦MIQ">&ftx) 4jOI-)5/ITÍSnoYa6w~̶\IU\JeOMHg'Ƥ]]1G3'eRiy0K5*Ux䋫(kIFLZ ;YSRǧ席z-wHqxMH3/B:PC#YFK+y ڲrnFFDSx!(SMgǪj ;>ໝyU+V+kFa6MqTgp mp$Ԏ3={;|]y&A$;e@z#P~8θqZRRL !-Vm&Q%)"""p2$U02K&!եϡ%.F![O|@m}gi]⥆2j%vPnu_͡+S/Ck %YIVd)*gЈ`Ev3Kz+XQ3HRӞBV"6R^bT@aȱ"{'%bFb:;:B[lR]uT;zʽLl1!z$Y4:,^!??,RN{̘ԼeYWb#C Ukw_ك {*=M<;>wG2#~=G̈Z԰= ǐ__;m }0%=)1ie[q\f"g;cSwۙU2ȷHQ#djmCR[$׊ /X YYDllY75"R4dQ$PB D^ ^77mlm+$F]c-Ld;)yJmqjuIlʼT1?n֥2挶aǸRb}5U(%'*}/h ߈M]q'vwsTlq3u Pk#U>Ky^qs4^.Muټn9#Yi2R|(cU{k쏇~_\'gY_0F9i%NG.n$*VP"nwi3UoB_s ҐG7^ٸᯗ"Eû2;1]!p<ebn6-OGKQp)5?Ug7#v]XR2w\QԠo ⌏UHunט>!$ʙll&MY9%栰JRZ$U>Eɱtyֲ^2<-~Q [؏GѨH[e-ty aJ~kuo^&-"*שOlR [||,Хr4x%p@B7YðZXlRq0QSlz,A)Im>IIT FXPy=v&߇wIf85"ؾ- 7uk͇4G|]?ŒpԻk%`Ҹܖڐ<d7貙3?-袩R43$jVU -䘍r~9pZmJ 5JM:S) /M:"~mn`'̬{=A)Ki)IGBCR%o˒ךlLn_LHӪCO%q[WGEM|*(&C turLT2YnŢFy ɋW<56ӧ9/eZw"&I>NDØ3Che3ۙ~YQ^F/H*هjgo}d^Y 9mcH)TWO,w ݠ䗝mZQkC$ڥ}8>/ɘM<̥ WX"j"uKb;]IϠ6Ó kL/fgxVIwRo/Mž&}Я*2I) ?eGB *;/){cY>nC+n6 \V2݃)J_G)$քDBUwmnv۝d=n1!މm2E!*CLTIJTۧF瘥U#}\;Q.Y=Y]_Q)M\EL(ۨA&WTVUI8 ۚu[3Ry]j-6JEg;fDFFX{ 61qx߶*\oJ2>lG|%iRK.FJ:p %@~, p=cw;tmt[q$xdA',,Wp{#=ǕLY[Amn*>?-fU埍pu?nD;X'[vœ`ˡ)+n/H%$r^W N*LY33[-xUTr:T&^件]9e^JVs Tkt2vB]B[GkMPfT 2ӵ}VB%ImRjpJB"5u #0 _FmL$4R%fggf *v߭k{>E`ܭS&Dx&ǐJ\Kdp#:+sݻm;F*n O+O8 K&Q%7kZZ"Z6ilmE?QjY)cGhY6JBn8k5tJH&CQy,IWr%&Fr`ҩjˈZNS \LTd6],;/V۴=-1!^}d)KZK-3J]T!no]{U]qe"dd\Z."zLIv#6_F1^]s]7XV}PV9j\$XP#J^q-6t%)I#+GT'YlmٹW%5ҖF<]9:┪r+ą^o+x?,(V#(ހ@-\?rdK0n_I.1>HYT=Aa1W/c߹-X4GmN]̰q'8qZ&J)$矻he1J-OU^`k=W a}d8Վ֋:Z D 데-MFBEBn;r3Ov-*(U2_J3-lϧ$PϪ@{>֙5VWn8KrһͯRk0衵o`3m97lwc*IfksLɿ<\HΪI NÚ͏ucL[RhvZxGU3xP>|I1iSۿrqSp&lw3l~lRy@",͎-KeYqҕW,'<6h8lFz2d=g,] A&t2BGm .}KSliMƜsӊ.)d~_575A l7ך\bX3<.ǰ>;^unF.;/#iW )(jS`T^\vAbϷD2qr 5e8݊]t#qKqLCB}$% W0/We{_ue?[{w>c#mh8HUOɦ9J/b3jI[/^5*K[TfgX_½j 1\o6ܱ|$ny7;-ńHHEɵR%$RdFT2#k ![M_0JCBo}8꒎G&&B*A_dHg03r[or*dP~bKP#?jy#ԥMk݆6 %ʐ‘&^Gyӑ{DD DwrSBW,u:sŠHA͆VX9J}i4dL G? SF'k!:^Cs$SBq A;SKi5YJQ%_$%%fdD>/Ɵd I6!51M/6!(.9^Qʏd/þby *7$dHBq$z!D~T]w$>/Ɵd lWړs,8N#8˩R I#k"LݢZMl{K%VA$̼hfr+T,{PdykK3R]\)LQnDE4DhYvcN]={beGgY;{6sGu~b98 $ԕ`{Xk`V/1+vacI\lDi'Xq&Y%F\RUC2 .ָǛ5+uO|DJuՙYHKQ"Z*u!VFx! ehG^s{]v>vdO"q$-ȩRCS{5y)DdߣĊ#Ƌix%m ))JHb+ / $}%#)(S"%ߋ5t_-Hh5C/,$GY cHn[n%fIʶ4jkBRo( *^n6IěV2䔮"*2"3IF}puw'kgf fUMѬw%eq4ĉ o DeP>q+%c[AJVymk|2?*ӣ]vo؃9 Hl TWBMIL˞K/dɵr]LBTYlJÒvwjd_.>f(.g72{9X6)`J dt] ʣ<9jw-W GƷf&(̓u?$m~Ĥ\j݊w߮vg9Z."Auŷ*ĵ)s'ϕZJ#v5a@k9\cQV $C:y*MV^Miaݶge?fZdEkKlqI\.J'*o.). _)o? A SF'k!:^Cs$SBq A;SKi5YJQ%_$%%fdD2O#v9O#Km"9B> *. M?7j-ipȓ˅ԧ\)GvDZ4.Dk%y~|zDyiIhN8}JI*2 Ъ}@%p@iSfww9"Č'zjdZi]6OXZTf5YTtf -+pX~bd t>޻66dKezqGDHCF[Ky)"Rᨋձ#?K=-3r!4}p*3qfj#fLIw5!ϱ߭q/Vk*se#HeeE6Nx j쿵5 #ɧ ֊CNI#9}J!r[oVž5qeqɍ!Qmӄ*.FT0e[i#hoKo4 DdeHO8]<TK|ИmʣJ\aV*mm*IdeJIڌnhq39ZCD&LzuS5xEbv"*m=̐M7WW~aU-3+A(FShIk ^}ձ۳wfǎ{+Z=9"2-י*V}ae)$4%BJHx zZ.k;~z MhSi#_ufrUi2WRmGظ56fښjbcI8mWd֞4*2/qX~[[,VjYLz|t=qJeDiT c.n1+,-¬;SʑmyԶui⥡.ˡ߷oz6]H@R S GIҟ qM]dA"lK]+PH[$$jco|qZ{y_rNlLQ8!ȑVT5'ˡe`8K7_Yꙴe$e1ԤeS.$%*R Q쎆A37bzr`[c- !CA)&V$f^U4`͎ܸs[⼒[nM+Bu#% 7:XBmxU s|cY/<#$ 8qSq 1|`rK3'*K:%,wUO.֛U>|żY9j!RiqZpDt22q~;hre8!_Yy2"LuJLw|vd֙ROM<Q5nX- uq۳Af2l6_QgJLcYh=7[]SMEhܘU%ykxR#ύz̼l} DYn==H!|iR WwY9]+&DISSKB})nZIL ;u啼sxVmDcv44T*/jmyw_L5܉Ɲ=hU[&oM|9*&me 'S*)~\Gx2&n4x+uK|iFjd9mQB\iTRddvۮ3'|J|JlMfy 2(MNJhY֯>¬T+ɑqgT>+q-Ќg*U=χh=yr+4UY漧Ф8^t.|}`DvgXfbU Hl HlԂ#<@Q?#ۇdմ@xغzT|:ǬO4k7 HdN$]u&*W ? #-% E ׯ-=h%KQ#!N(S)#R}LW˱L+ӔŠ&ekm$-k*:ֆո\m3.Y{+>-2 \8d%$U331̗-?3en@J9=42 GqfQ_ 5v񣶍2kST5JI K[$:JQzf8>uv]}['$Cf"^pMU:rYf4_K;o87+esEd;k_ļԙߎ%feE_NVxhns[11Bw$ =6f)Um22%3#b}L3&3ȑBy (%IH( ]F6&:Y)&KJ1cs͆ЕCR^oN%S CGnvqR =):u#3 *q:÷L~ۑl˔qR\fߒH'\ZKĵWwtm|*nwtJk퇆mLN՜`&1yA1{I>+mI[n!EE!dJI"pǮ 랶{cvJ9ooy^kĶ:o2S-5׺G,c}b8vc*I\Ra\|Г_I'RC;ib&Q:=, )k&.C%ʍzh"X[=!ɯ0 ~yh#"Ω(ITȺ O^mgaLlϚEM\N).:ˁ<63I%ȊR!bcv2zGBM3PO2XU4߮*SPﶛ~Y6 6%5kvɵ|%h$Yw,*SN[;DFq‘'zqZZK !Uk{q%*E71pּHk{Y6MQ%^X1-7N~&^yiAdFD3;ћ4kQ2iC8 ؋jgѤ2R$PN9+MTdFZ,nƿ5!}I[!Q)n#Q)QD>Id':Sq鸮(cΫZ6ft>-׮t> mɲYłSJY3 k2IDjQ$fwIv L/dc2 `mOKY6ǔyrQ,FTo Eۻ{L큰O[1/3Nǎ\~Bi*:'DL.Z֜\W6Ux2q' >IxѰƮv筭ZKkw4GOr)IrOj}(nԿ*uZeʂ\^6G*A*(hzGf`eEcsLkY8mN)FF|"z[ǻ71} ͮhKLf'7U6?-KlmKq&#*%~3Lo|^`vg[[ńenkpJ}2Oljh bWdE]kr\\?&"ն2m]VkiqM $gR}j^ە7g"YCT`y$p*A&=i`%}yc{G 6!)s1"fڟuӆQҴT*IE2iupleR8|9*3.>-DL)F|ˊ*gOO>!ɧX\m]J4]" IUwEC5JдK7b.lkYPNݱ;FOJ2JI3"U RQ=j=خxv(1:|$&1IeеU_*T&j};hVeED%f-e7Y5pc+ChqO4êlDKyMI54 G~"L+-`MeQc̚ɲTF;-2UD^[JSE*`Qc 60{i<|meW%Zf9l]Ti (ٶwF NޮwQPIJ JZ%(BԵ%$fd@,_} \* g(2v%\ ~o:ץ* F mQ\mm-LIm.6%h3JQA Jw/W]-; v6T556tAS^=~Y$,Gjg 諬pyw̃CeW#\M\V23%obZ&9f&c[%w?ݿ|ҝiR fc%[x#p V+CB_c_^sh'uzqW6kyxBec2t8q%rZPȔfot=˶K-\nM!=ls^ek˂ć pxjdFvk`-KY_Ox"5'ݖ٥eeYV*D۱6p71 /wy{F~W'B}+S"~Q/{!{;11GH9M%o ϟ6sȏ1zG7K̋ZL#aAds>DZkl +!-m >(I*bZc_^s)/bZc_^s91=b]7-|SDo%#kIZIEdGVn{NòL-rh[Mkf޶(!F#2 GF;5X0 -nl_^~/EDC y<^eiUJd`KcwF̯:`쯠2/h/Kg ʹ2Z h(fEԛY\nn]_œzrr2s`,[^\#tnCgȓǭ+R2"0~Y$,Gjg 諬pyw̃CeW#\M\V23Ec_^shtqko{0=vƏϟ+JuJ7qk@~ yo~{3|"~̭)֕*}i9-?_?p=!GϥkҴ:%F;5X0KRw_wI7yNCnwo*&^f:'C W.̉FmNX,jdݢ5^,HpwJVDa](fћkhY_k_-C^byo}\YOYZiBMca y{w/ Dg1yry'Aҵ:*bZ=g^ӳqͭCܢZ,6g<sqi.KQ$LȺEɲ;6vG3{˻߮[yJ_УℚϠ"~Q/{!F;5X0 ."Q/{!F;5X0 -3ٳo˱ɟHM%pgυ9HP9^D}o&״;$1k})v+D/.JbZ%-I~޹$GU翅9 e諬yw̝;gG$6\I\֔#2%:Ecp cvws;יzB!«q>F=)Zw,_C Fm{mfVm}W}>} y{weipYen AtiKK.u!fV\Cə{ ˨ea@hbkg|N+go38լdDGg~a.v%p, ][LU#1t Bv MeBM^U|]MiـCa:{W: f)k{WgňR'B֩$qeF:5Eئs^{ݿ$ XٹnS,*xO:JϋU*Dj"0Yg_3;Y~CfHÊDb1hI$=ES9#K(E92ELJ#U? 'ٯu:.p孹3vaw5Iit_*Np:Mʹd3W%cQ[͍YvVÁa MD}"Y!N,8,\H{\;l*!,Z2E᫄Z6ѐDTm̜ͤYt6lvNI[irvmNmmRufi#2#OI)1۬-Z=p֒-I EoB dy,&2lޡ|ԟJwEv&*u;big64E}-|yb6+Z)'bd錩kI6 sMH\Ixr5 -tj|~vuaVo|'W#0̉F~xɺDk"BTf5^gh d`ZɭʺO) JZ`lilFR| EҠB_پUö[pÕ3'lhC*C#")a O\lU5W ΀tjhlo-\vEpkdwgM%].}wѧ4o$%5»\#̃dGLUCl$24(rOC[kfFGl;j{ܘn7.s qǹo]328rΎh*(ORR^k׾t.ڷ~7qzW\3coOן$eЋFxi'mClgb/Ҏ9 c?΢[0}wאk$zMaLKɦW#fd]M]Zq>6Rvd]ƧZCYWdGmS1&x֔sqJ2I_@,ܻ]`|XV6Ò@ryI˰ޞ;9}L)^ttT7?ˎp.W+^n5q?­M?~yy_Hyݜo/vnJt0'rs\Ou3.ZݳK"2bU ؐrZH:W=&Yb0h~`ċ[ԙt,܎(ț:@4DܾjϵcDZ秳)̯=v%z<Ъ˩t|@{85\}+݌3GYR:<ivù}t~q*!ly@}Z[\A`Un2fњb&GTYkfCiNC㾄%$̈u/Rɥ' Sivù}tUPɥ' Sivù}tU1Fxv?Qln)7ԣKh"3QLQ򿇿kyQf9p./7HZK'-JIN,̉%B Zɥ'VXkLCO`=svيcTvJr]]yKZ>Ҵ@?s|%:^nӣ!~lѦ^BFAt.-Xrs54v8;XX.WGo2Ȗ*c1k'$-j"6㠨GN#@vv3.ڳD2S ߐqBL :W= TG4Dܾ{j.ݿ 'ᇹ}=M~ߏ>xҵ@Qw1*dw*fʴO~M.?xw/?Z19DX24R.S&%P} A7!դ܎zS`Un}w/և6 mѫH IBB *ӭ}KOXv;۞l{ħ[2w~t#; B.ҵgLCps@vd^_v2ZeHZh(>֔Toɥ' W|=[o1['tyJ][HajmoTIqfJ*UFivARee)9{  Sk2#IԼHJ?&h;۟@-Oɥ'WB&h;۟@-Oɥ'W_m^/uEbvvk$UT8 ";S3R-GS0EGFIUU,L"qi.L>)%82$ j?&h;۟@[a1 =Xf)P^}+Gvcu-j,Jl{s9cgW{ҳNfFyMeкҾ `?KO ֘@ch~`]ˋ"[0uێ:W`sQ1̻kjT{iL6_~Bmu 3'$,e^-QrsHvѨv' 2lO7?~>8˕JׯEOa{ߠ}|^WGrgݛ*ҝ* !FN, ݜl7:bSLؕ;z|x8gͧEYzH>ٱwc{2HjY)\ۋ{W %vӫvV-7=0+ ʡd20nH[徢$miZs3rQ;w#[K uM45e/)*[nhZM@=&u4fW|WН}ƌ#Y<}QlCScMu$ƅ=/mD;)Iཻ#4%aږb7ՖpbLJ12G Qt/m&#;{زMqz4ˬXe)dum-!J*8&4F)n-Eسt ~&/n~4=q%5d#>F0\3\lvCbUKn%teaGsZKAZ_U>V < rb9~ij2,BA&S-\]"I5LiK[?cng>q<6l9y Oz; [i/ffd$i1Lb a)a'2Ü8[K!EE j0W,~vGv6f[nB8ŐTHB 8}--mTh_T;:;_<=̛z31mW9(یBR 2qfFH` |GSfbf&IkZ[]!+!,jRt̼ Ã|g5|߻rSpmqroʐͺ*q): I7ԋ^@%DnµԘ?7qcr#6"&bF}Thó UҝVW`uKN~Bq8m&FlR#|h}b.LVN۝=ϔ4!.\mIS[5-.$i[e+Zrݕ}׶8mBC`ehiԥvJ$GR=^5̷jY.26{9y4D7$H۞IqMP̹xٖ@˲,76^~i%U)JiDzLa띃fñlL&\ei=*6($#:SBuđ<||Y;4D'Umm1rJpU I,6BǰV_[ej/ Ghl֒3.fԽj fg=`:wvL&Z)h}*SrGT(p{nO,G|%KܒǴeVfoq)RZ{xS4ޓ97+)gn=[fjh庥?!-RPfDf.Wnt|\YX.-[/bȳ=!JDw$1_4!gh|LT>4Qζĵ&ɽe8 -v tx-x;1q$J#:xYoel\S`^vݑ'.slmaLs94fZ)O"J~Kb ;an->_Ӷl~:){X擡sIT5xn5.i,6g"kņ۠>mZi&FuUOǨ,V1vie"_\-*CaoH&qoFG'B%ogyLcp)׉44qDЌKQRDFf}>1d+q*fn^K^.rۄJKJ`+&3ctvin8n|H?qdw뭁i}&ŚsWɥtTF6nȒ%iLDMi%RUƴ:T <.5ӱ.z$eDܹ{ˣS!6TWO"KǞ~E*KII)MKQ 5D_!=/}`xu5:..۱NCE풟4ՑP"ԓE lk2^T"mM)a=LYFMI~yH׻rȵJWcݳ̺eimu$|3* A=9&ЛC<3 %˛h)KMTt3@`ݒ\ll=yM'^1k'ʊM3ĨЪu0YZF{m[]v٠,v.yKkyuCmIyh]qIY:%б mRӮ0w]ӓ축,+͉.*SL$?f9UD"N#րFųbYy=b8?q1)n8O,ЪA[%F1u])6{X5=NJ%ëy:ektȚJ5ɴ6sHvseW\*g2,bԗHu nI\gF ZUp'fb <O=k'`֚RVZV m7Wm݁\'3/@#]k^;+zW#sx| EEuq O:i7E&AVZ/pys0GnN5Jܓ)}Mô7݊/ېSK>ekktl;!vT򷵐ui؆iUdBԇFGBo5s5&lݎNͱ'57$1K\_Eϻ w57 ; ,:OluJu E-="\e:ф{DLK"O=v² yiX!R{ߥRߐ셡DI_@+~k-ۢ?me22jFEzϣ- H2qљ%,ܢy%$|H"큿U6 }0=nW6޷J$(jemq R@\ϽӅy4vlV2pɏpz:[SmHYQT`_}K6Gn%s"ܷ6x.LCiKku\A4W>Moq-۶2Q$9_SnJ4+BM:Aln)YUG/DJH_%HwlRFMg4JvݖN3|Xұ\yrlZ[ȒlQbBߚ۞Zʦ(#M8i _Vg6?~8%1J'kd*nC*6j"2)!+'HiZлkL;XChdm 8n04sYm$$\y%g2}f9M)4lM-[-9Jaɷj3K%dMqA3 w}jhnX˥x5lLD7/!-܂"|x4!7ئV,Vϡ$]2l_>oݯa7&qFş,z Q98Y2K eU(҂w,-װ0n/$HwYm8;%rmnFIYV޽uY>;<vV\&ynL8FKo8xԕ}wt~;aC@ Y2 bQ!ykG,皅JʦAwwRcvk ߼Zd 2wf+B'0*q=n=\Ym]5ҡ}\fB'$L@"_+hGlw5! J.uDDF{S~`CŭSonn{ 4&*(JyR|JϾݤ):6xr.7qi\Eⴿ1mWU^,6;-+qRohыC~$Y@_޷"n.I_~-eۮE]ijUsmDEU#0:6nhVp;52Mt#f.QJnKLk]hT?vvr~R);|9? Uu9_)f`t6hu^dY52YKޅ6$BG|4--$UDhW"4%췴;VrdL9lcb4Ǎxm^RdUIq.512@ 3|JYf_SZ~;`ZU!i%xɥhQT OW)[ U_Sv&>ˇrљe"Jl;B.\enz*"_~k7ʵQ{n뛳wL}PTO}n8͑҄t*>/Ɵd %i=x}"|){ЁeF;Cai5%&7-ּchushv4tTѸDIBR4dXNӴ `mܖw",Jc']Eq>ߪK6^%|K@[3w^Ҙ SF)o(fDDjObt87SQП Bq/FL]J]9΄uOH S?n~N#P˙뵃3"/9TSzc1@w4]:qoǒi"$%mDDEЈ]c_-sC 7hm]fijhی'v&Q~*KK)3.2 גD$R/?:w}?aC /}1dZ_CR쑑/wы|$^>X=? Xc6̦ri־e)@%|)mdZޓ&^q:qsYx6I<}NQr;cng|@;p eXٓ5.G"lGӘin y]:,Or6燛?t:mzࣗe)ˡ[]`cyn[^W+ιs_f5+aƒ]A$ʭ4^u>I*uyP,nUgB"Iu30%\62%\yժ|y`J:L8G_d}=+/kr0zoD0he>N֤eN 3ۍh>5NeR)㆔TdES0K6fVS#((lT2qkm|H)wkt~nq}IPЫE BY&qץ`Ŧn/T!3`܆I%&*=QD3Lψ[Jn7dN[i_LOa`9/Is40u2P3⋙bN=mqnJ%HT*ZHBԵDEk_55g UiBD0ɻ ]#RU> ,,giyhVlyI$J3Rwi|j>Gp~.D̏yJ$˴{+:ymxpr)xw׻oJǪp+,kJfUɯISJ>2\2Ki*Ҡl!ۥ=biK%%WGBc*"Q8nduh,Md76tYx1}N$U.YwIڬoex.N}, yH3i(34! *TX_q.XթiUjB1l!WYD89/DeUr6uh2VRTTvԻKcyã~O=5kB# ﶛkz!9_2oIb CXT*yQF#KږߝwX!9UiJqu2%k:K%! Ag>ܞRĺYR1:Rp$-dl̉](iRR"fn[{ŀ  /^Q$I./=i"s7&%i72y ^3uL.[eK"G5-fnR&៣۽϶M_pW<>dY [hjړ+^JS•ʾ "@YD]kn&h՛~Qfɒa2ڣ- pҿ!^JжCRd!TMv7SmtwH'&ՉhZ3(q9 ufVᶃQR7_lS庮=D\}dE}1&Ԥ.4IIIHNvy`->1k˨Vfjm(5(t:˳Ojw ^0V!"dtW)QI4ӏ(xq7dE-﨎R"\ BdJ3'ț[f@U=w%fc軇uksb6PFN;EJiZKRF|F`Uu栉vS1 }݂7c6RlDJ.+]173j22qn"cLLDx+֝]5u;GgQ&EHu~jGP}]@Zc.ȉ)$Gem)%ZdTδ Oh~clH>lpG DU~iHON,! t^+۳(bq" JH}4Lε"Vv=1甹MZlzmd뉎L)&dGq#PEakfW3Xdw~<A&)ƾ^Y,m=m [jN%iiO[.ㄅUwy6B̉FUMBl.wyN?cݽb\_qiCm9Zz<@gq6R"W4'&Hy4k0ۺ}ptJ}5cwHi&`vv4!Rw/WLnD)i-Sl(lD?0djV1ur70?)my-9 SMReV>qgvL--/;M%6]ڀBPf88jzndGKJ((f3l3>ݭ陼Bɍ=k6֛5=19P2/М~D}8G%~+2%R* μHtkWhn\ ڔFG5@~P4[~6j&lkȒldXaF;\ Yx9Jp퓜kY)hjCh$OȺRw;C;TR˝^!E&JI)lj9:BuLɏ(iZC%S|KvE4noJT SnƵk̛-5Nl%^ ]:TGK? Վ`Iܥa6RwOͺ{p"'=+Odǰٰ3/r/{h<ԅT[%%ϰ>ҒkiJ>iP Wnzcm-7-ȸ?#:KhtQyӉgSd-OesGa6>5>VRnSIEMzJI5 0pMulzӍG֡%k')ykePDI=N7N޻/f8/sjׯp]L쾧\ei6d6߲TKZ)Ux>ӘgMܗoO_̍ɑء>LS.SH6m梼/eDi>$H}i+lkfff]Km6O?--1+5Q4Yt.պp+jؽ4"KJRӮ) !gD|#Psn黸w`zhH*L?vn{aRB^aв4)kJXz{fɳ, 2KNj̻\dɜ/Tu3ReђKa="+vI(p̖kKdG $W)>T»+b۱N.s#J])Qa2#OɣTZWmTfuÕsg(*yhSv˙MGeʊZ]L W'ڶ;K eJט53-Yz<[ R:"SE(}D"նh23t^j QV'  CI{kqkrHt7!gP7iKjPsrn4QϟhX%f: Me+{i7i%Ȓ,N(G1XoK\3Q!ƣ9{'A#û佤k2.ݥOj}Dt&zFɻ%w"u=U+lPm"_}v&cH\nm#t:թהf䔚yd:/lɻܦidKZ6f4kVĸ0jjq ;b"J}8_)&+k^زv~{NY5*;:qJBԄ9ԉFddt0XcŀjWM{cf1i*Q@iuS;we8[8R̓nT3]e ʤ/q:n$j"4&T22>F@40]<:Mi3.$"+S7N~@Yn$빍ͫ;4Q+L+|V&=%p 55RT>R-CRkQ!#R֣S33kvq {ifv7;+.JK) ]M…t_@W\VE6Ҍz:-e[Uk.(aQZm)ITx' d&bv2UUxnI4Fm F~џS?QŻ|Y:VȌ^T8h8!i`n/b춈ˆ35+a! м@{`0Y뽓[汢w|yA} 6d`:>:5;ȉYBVr3MƱ̮vm-f^;m+3#Oijt:tݷ[mx-vv{Ib#HaAQ-d).DT ]e 5$vFy$d'u*B *ۦ?>a.Hv;{$smO0 mfuIԀg6Eng["ZmaZ2o% .@#[f\KNYrFBnR?[q-gjM}j}LoaĈ-hţKY9*= x- KLt dG`"+L.dHd|J%PzTI/gmp廷snn7rbc[Jlɍ"=đl#l͢QLLf&Tm;Pl-_~0;*SHWedeJ|,C±c9fQվ+Yg MqeVٓ)dh"^ 4qtoc.7Ls|,.L"fP1Ầh#u*Ej3lݴ2ͩ]ݤ}wɮ)RM<ŸuFjqiCRƦfu3ggmww_L^tjkFSaʊ%I)NeMs>;8~<[n[ ~ u7)mHB[eŴKhQW+N+or5]%عO"Prf&FV)B i3%%&qO-8{߻ 7V]%q<foMMPM$@U| 3[~jU5pwn?CS-,U IEÊRl/;1Yr/S \JI{e(BƪUǒGȌĶpOw{Jb߾1#RIpY3")zsZd px͵QmXj3+כ ĸ| >w^v3;m`Ƒ\eZ{&fcH R-ۏc7{!x=xEdIԍ"LJF3EC  lM/Y3+̉V[TNjZ|yD^HJkLGpSXWZڒj%r[/O}Y}$7Xp䧛-KێK+Q5I0!T5`^[yWkqQS2T%t42hA)LU|)mlXly{?;Jyh"TI#QjfD]}Jw]tiinhڠ>+qO>d!J&%{)&eiFٽK>e0kEOvnRMK[lxnS{ŧ'e#;dv2K1pg$!ɖoBu]7P[*B%kC4C`k `ɞS3V\RfrU^aY$ton}v5/ywv_[njFI)9 qo.#؅!㍴HJ̗5W.ww;"m6c36>GηHCo9(BfdTS7w.6)jıt[K}.-ě]'FQjpLmvwbN]. ^%dv<ۗnkɹ{mB,V;C7틴8EJܜ9Lt2D͢4/41žX1<;ݕ܋;ʭXtj#&*hSO%Bcw[I)Qԕ2f:E]mwl͒g06ˬ"4"ReHZGRRL|gKkLhd0&,fLn&%y㠛'V>sgUJƻz޶}Y+T{P.~WrJ~J֚z{@'RՅM<fo"th1[&*|lIR~yPAˠ,B0v~-s³z.Oϴ%qQD- Am "4 %$LvץE^?2IM3<jC^|]ZIA&dFdjuG_ijC2%qKAuiગ/u}̓g| =,hQ(=&duꛤ2**B;n(gbzY|Cr]c0pvxmӁ\E[IdGqL kNrk2ͭF_u%йbGQ[JM]Ͳd+Zb7hBh1#6h/A%)" !9vy-hHFn`vg$w֜.GP"&oS>ܢAZͥ>(\ n?I㝯%\R? nnA~2شS->rLlEBAqŸ1Ow} E? [-C&I2+Bh̹)(~%(ȍES=@Ic33"#2+~F3޻-IH;)#6Epe׍%Tހz ėv]`;kTȕ`- 0I)l*֞Rj#2L˨Rzq4KIޥRITELƆi:}@%@U4ޘ8#ȏrx܏&:u2"WPmOuUjY^.cmɐMH[$*]D]I 6 &r?**j̦IP˓%&dUn)o hq&*JmXFRȎ[>i!7({I/B~2n[~f۰-nLJ$JES 3QSJ+?gXdo~ÿ9eI!\*+a L52$ZxfJ~_d.>Нl!n$q7ŶљrRQ|JQ $mJQdC3?/x>+\{-Ezj5DZ.^UkGrA{#Tj>,& m^WmbofFA\g6-'": 3IHY(3W@g\ 藋͊ufF97ե|D֥ҽ@} kq.[&:\8Y% [=$ZmyIef)6:iZ;*nGeP+,w[-8"opL˳3HdLiS¤FD:ʼn4uim;qFDffgЈN?ve~!5j_ὢh۞й[mxTuZo/(%W\HjQ-+lqNTn#̓P/NMg~ڳ99%1#lu'Gnj4*adȹ8A 3s|W/$؎ȑ]1Hk6]MQ|iROKNrҲ݃DM+6w휰%P;~2_I`I2'6V +uKmg^觹,٥zE֛6- \2SD6I5j?A%$f`4QpwGnNZk]1% .8v6nJuKR)I< v:л+;j"']ݭ p f2ML+6#{V WmFuⓡџ>u- 9c2¥Mo6y߲6UB3O**so]ete7!M "dȹQFUDUSMkWMmM D~ TNnIr7tlJT2/Istڵn&>uerz .3*AԿ[+O Uz ؼ/`Z1{24u50$89c6l;ˍc-Zd̐JuKY3Q2jsel\TLWVΈRW"4Y 0ȍFj.11]1 ǯLk{Iz;*hY HȌ |?JƮn,iiQ>>3}*J$Z+Y#B}AjU=+:n];:P5>㋩^>Gn\0ظ3u/dvC-RjpEHquFqL8b9>nWݐC[O&B (i!Tq$m&IZ헻t=i\Q"4\.+m֜%!iQ FFY{G[m^ΛOyKeCԔ|M DMt*j{]Y#.0Ix\bZZ3]2N+ž hz{R\fqm 헥U1ۯmէzO+moiAbk[Siyy&uIRLʆ@*5>,Ieu$Gyl6tknֵ(/H[ Mz * T4ҖWb*;'m&G!NCqb7TayO6-?!%C}/Hqն[!G%ԈiQٱXl\mן) %$DíM@gœtfšؙ %ƝiĚVۈQT$̌d3ؿiBv_Rvjĺ q<}@JCj=As/ \r!YYI6㈪uĠTdH"`w޷agJ"Tt- DDu{Hdj"""2.U;E b>--V\ m whJ'o]U\{̨F""!VmfݍXllmמ5)-%&ӣJM'WNv7#1rsޚ[< D0jyJJ5Ej #‰n:AC:kxȩ>X-^Ig|.WKhQHKC/.ČSX~yp0Y V C^BRI*m&D/,GXv52|Vfg_rKSZϓGUSZ3T묿,pA]e\$9Nhy堍NIz:;UmK)||> . H ؉q*7ZVU"IyQGWAUҘ+yriB9Nk4TTLV.`>δϿ]bs;@_?$u˯%:ls\m]/%7vK*!З᥆O.q#?4[}j;xŬ[0\$̒1̒VT5F-e5[f`Ei$XASN(jWfg#Xē|o{ŢuEa\t䨐U"&-]t*xlrf́. ]^3l58|S:B~cxߵLxb91KV%-ħLS؉!~F4!e~\+u,X5%\YuԉH]BT]:#UimwMA(ny$9 ~ҽ@;\ 793"fޤ1*K"*g;mʔ]qɬ]3c-!.rbK<YJI)WE< ǻK q Wŵ>Q@ZФ;")!R(i BK_N]LDI0!cez^DӹdfnȮ*W#>,6騌ĩUWkܽw/3m^;=qNI DN8M'58nM{~L(؂lcL='6DHRȀe9lV8;Tk,䶉-)q y--zf:S.Vq6I2h:F^4eZT^51Fx*CfCkZFgDFgB#0 Ӛ[.\ n3vmTq8NڛE]IBr;ǯEKEJ\yeOiI|⃡z@C=/9^m@cׅY]ryfAĒd~4ۼ g,˯B3q!P庶Y%ő)Ms"# Z.X Q[W7]߸^^rg#u}]!mKO82"7 n4U=Y>盶kq)f螾2 +N|n-:eޡb ihyP[YK\1&b)l1%RPY<\L;-ea~{7ۏ_@u -jqn8-j$!*se m;?–Xݚ,~ݿcVu=4]izW+"ƣm'Nj9$˒aǑj[d(|YRBjVMjX0hDf h1M4JPIΚ> &nJkAgm|jju+^/vQߟo{o¤^!fCr4IQq^[RP%Zк|Lr+t>~k7iJJDyFaVf_5 ;{aDS[lHDz~>rOR$aR#cq}[ 3-I7)Yu$j"qDf\t3g`5 h{UY5}rl NFyS>swZ5pJ E:,NZFK;V)>DkԿw['.D"'|BF߂_ ۞su#tM~s.ܭ%G64!/jL)\;rJd-Q8R?H 6uolϬnc]s:x15q{M>**i{[eb쬒#3tf4hL|1F(2 ӉBIk =Owݢob_Y{kn vմJtXi:Q84%Kܦ1Wvn{㽴+[[bw5q*R"BTGTn!^8)UI+(`jL[ fjBkkj: ^R<<Ӧ:S|@{RX ,0t*JCfaq i59rIruXlNi2BĬWGoƐu$dW쿇J3wˋ jR &~\j #.r,+%M] qlʲ&8jZ#_pȒY=jmxَvN N$:W#m(R6F҄YlT;ũ1.s?LdφOmJLǐ)h:MfTsN;׭3fUV ʳ|Pq!ӎ6 ZS%$/F4fUzbPVԛ%}rJ*|RZBҠx>([yl+_ [W-33&ң%jig9iјL%^^vL)k( E}KJudmRFӔXlK?5H>ÆH!T- Z33!2vOw_/h?z ݿk#כo\&&$V!BmY$i %t :ă^`jSKB؇M,3iuuB D]^?om~M4eMh7l_8w[Yq9+ɗ)ςJ yȰ>6Ű͟x &N+\Zq~[|a &HR dTYc0%@~+-?O߁L:W{YN&mvnҭ*uOR2SJW_AaQ3KCmrlJ̕*uIH%R4䶞'UȨ!{v9Gk쒬@Xo-2ѦD/T\K(u#20N;ͩ߱kӕY`ۯ@[\yrC B ʄI".@%|*5er<͑f /wHr<(siKCU\ JAZ(̈v!`L^Ƀ[yMl땒 hf).F99H"J"ʴImܗenN/#BV 7YhFúu&+ɬ7 &υ; Im-DdҼI,|j|$d{'nvGfjzثT*hM.|fc q>%7Ux( dayOa*:T ZOOB[BR_PTA MӖޟ m3fk"&~ \u5fiQ<ᲇ*^ʀ ݮ6'n{6vARbwe W&:(ɢ52H_ rlԓt lvX3L,߈^أDFjs*b"&)yoi?%IT,Sov̿]Mc`*z ?u5V;!Kk_d˨ wMտ|_+6\{(>͕ ~Kdm(33q4}w;m_8ETMYi'5R]2"ʆPYBM4]_=ͺo6Ïċ|҄)4{Qt.BskV1bjncmw (ۮG\CIu)kULJ:#{GܸEa/nj>Lg"%Ȯ-Fw{m" I5 џ3_'9~gPۏ1wsNyFW)(mf)GD֧S-܊.!d,^61mBao)JPd@5nlsv+NX2X9Niyq$Nkxϟ@,2F}QG%RIRq (Ҳ%I3#*De x|5c'/%f)iwB!mi%F^5Ɂ V髶wסd,aɖהLe!Kyf'ǥ@M (?ėrvbr.dVlDzdBY~SZ:PF.;u/]= lWLpu $“pn[rNK~n;DyFqk|Mʞ/^O{X0i'mѠdVM.B)j$R&y8eI23*C﬛}CGo{,FYpv.Rۃ9F R4-dH4&! өsDSM 0+p梸N6cg΄?jPosVc#7e]֫5hf縨}-Qs&ˤt^UA` MRl"x}/;*D崂L'&_| @Xe7A}l@T]Kb 2xڄčmÙGG.Զs{ؒ,!-[FnMƛ( 4~N$ woҳk97JtdN͎n1#aZRF* fDb˙md2ZUdh)̒q֤J .;[KM0<&Dz)/.T6ԩmaĺ8o*94k#B}:%?4 ,k+tFmd˱;)9yYB~ eeSh)DJaDf]+X[fOY8}^!ĸx[[ b%%Rh#W2Cؕ!Iε[&Mf+Gv.'ť+Zi=>w bsZ&VE0yrJR3miI$g쑙Ewisl_6TDW_%SVs(¢J-n<[WS ;+lwfA^#?a&3$q tSSĀB ,k*4>kd˱K)=yA~ ae[h)DJaDfE@%FKXwԸ|6=6݉ېe(m7Go=H vJWS1-ȱc ͷ*ڔܯm;\>/=m?G;2 kL3 6!d\3Ja'@{ٽk|G"֋Ǜ_WhMETYIqZ|iW=rNvip{4 [LdxTvZ^~DuÓ1H'%%E% hDA0  g\hs$? pm<ξ^ 0;wײcE= /1,9!ie qMѥȖЈJwKOPqȹ dܘ#ܪMiWϡ+Vsܖ< JWZ~:s,r2ia sZHTgݻnkU/61J]~.qLv\> $D xS`}z"O Oi;m-]7DIQ*O5 AG3J̊s[&7kҷfrHɓk+%[JBim Cd>Iw{nvio=raܛߗ!pCAFm L=[Q pg\; Kǚ;YېwKX)4\^im'pؒ#$h}J6E-r!dRjt'T˦ɬDۜIĒ$I{bb{G3"UHAd%8M2I tIa#Ml;tbV'Xs2đfbuĶX[iR|TY΁8M;={d3(~E0gƻem9 IA6q"2JH2`qs1J8=s | ī;lwqQp3v=*%Etw[MnsBrr)6WaiV/4m$ DjRH•ø|Mv%+6n7v;26)s.4jO$*-(GT>]Se;v=߾_,j:̷Ν3䶧\yĸ47MeԐt$>*^>fsi)-="4֟d/E?vIu߹}:'ݗc9 %MƐL!-6,N6iU( \@^\XӢɅ1I1*36M+BȞ|#V6KW6t:͙3vNr܊M8R7 fU*Zhii%I%DIJHDD]`< %aE_d[./muH3"Jyd_5Gݣjuߴjgw;=hiҔf}-_SI$qC*% »ŷl]i2UmfXiy̰٩M<W:%϶=}rD i [G֓dd*Bw3?mnb0ßPh'ӐʚLNsj$;#ypSQCsg=efg7.C,;q? >疧 #4>RSJkOt2u׹(R1Neq$Dj/@b?q umcj2Y[Ie(5%hR܄ N8&2y=kwR|GvY)1r=TNj}ju'Q<we*B7W?qq-+šTKI)S^S,N"IZB:RVjvb[iɖ9W7Ǔru))s^^!4(xjEl܆2:򖎫D^%IY_`aP|C@14d`_8wv_P#O#n{e&A 6JJUđ/2;kURl7QbW5"Didml)IZV24H@FҚvɈyi*qVHY6F8jLpx}jgLMmk9(;qe-s,vx~@:7OGSȟۋPn΀Йnƣ#'Kmxꤧ,ʜ4RyH䴤)DD} !Kfw>wuY:Qs(xl̋16M '2M%*5$te%6_㺿ka-!7lZS!48Eƍ*T}Pۑ8YOi`ПY%_#jmѬ8yV\&'%[2bβ֊||iS֎ԶYd,R+*Ier}$>Iku*t.0tػ~{~xbknjN4m:6\:EԒ~᭷Ʊ7m6#ZUC9yۛ~DZJ9J~$|Yb.:~iDł^,-sr^iD}0*nee3%u9l.\;y=56n>iNq5K#] W=msēZe Hqz3 1SҾcgf{m wuyFж`76u6%EvW9O!W*G S7u 0kxfwcfQ־"VFl;uf\ aIiAH&Ե6UIsM%ӭՏuc\zbpܵ:3Snmۧr[6d9!IY^W#p-Jj#{}ΦanjٓE(p%r9.|<Ѵh8EC"WuX7y==Vsv鏻sCd&؆[5$h'9jU*@Mbk*Gj.DTCR}ZKHqΉ4gS0Kgl?1 ٘YOaJ(wCo7ͣq-WT\FZbi7nǷw7^i1Kmj_4q&ЌN1Uo[u˚93`saČꎃ$Dk4*>u:!;a3&:D4SJ8Gy2U}>+L7n?^.ɴJuPEZZcDnTWT\I)I#J̀PR'CnzԈ#Cz'".iUDsEiȓ5/I"gNn'jUAfkwO6D$(!eD!\%Sx2|>r#<2n{\s2|޾٫q(`*:D96]<`U"n{y?2[9(~\ԉ/NMK58ZHU9?{V&r2&]ɑ# RMu1,iu*I0"_hHͯn\/2bl:7^~oQ܊O$j#Zf(¹b=z滕^29LULy,fg(AuWFVom!nf-d7;:L4CSk6u2kP&VoMv\%jbCPm-sJSQjB f֣5)$IJϠW.5s;5._e 4yҟ+RUKA-*$r*r*WVJ'8ŒhQ|TeVf#  u& qtݜ@6k'f$u%zq';nl[ n:.R(bA% .T3;3+e FsXں\sl%(~Z- a.('I{F^ xw7tɄd9$%Z(N*T丗қ䗈в"R(uHvJϳOBy0xiJf*R#B׊T)J$$fgFFn $;Qٵ1Es]PϣRZ)Rt& ++"HG n_p%6nCw3XP6c%˕~[M&M($J2:{F@Qo2vmgm].9yEF ?-ODHxG줽/Wl]Sd2woQk'IZ*r\KiMKhY):QZ+VЖ͋kڦ}/؅%+rqrH&׏P!v1яۭ='x'璍.;HT,o>o}ٳA`(]4&:9ymOL0FĽ[o['8 9MB[dд Dˊ&֥xYKfQdC"?ciB:M$ʪ*(ނ(s}گa3OLlm˟p-ӤybGqntҶJ_⌍҄'C XkYﷱqF즮y!2GوCO˖'6I&3*[t0tlObv&ҎQO[7-)Z-iJHШIZ"-} ל 5js#ļfr>y6[K?B}QbMI+-g6x\ sbL6M 6D۾aGN= JtgzoY|6pWr=|$8\Y$?'7 QǑhd1o=ZqZ!ݵ 9'opfFAT3:PQom}X6'&mL:[˒m{m G~ g8wXlJ؝+21:l9S&bLF@(;wޭy.D0AIyJ[\dj$ꤤ|a߈ CnS0نōClӊiSJ*I>eow3܎5fsI2|iZ|* rdFeȒChrQ%GU%$R/*[UaǬ"/k4yiO!~%N]M, |HdVuƶl|>Blͷu]I8ˉSk"3.I:PFtݽ:vM<;'x>MJaD,ۡ/ 4gwr~Om Vޛ,-Pd%"bTiK|jA*Eymlwr͟/2~u .JV,ͯ-$R^>!zfnNew:bպ߉ʐ*\w2#eiJI<|P}qSν=k`<Ν6"3-heNc}-n/{DZ=* ٗl90CZY-^*x$Ebاxkׁiu?#hb%l%.;FT˂/=ImSdYNEn͈h=q}YHj9ɝ1V̋D{)0EŻfّlg9*oZ.NGqۄ?0TQH oyOe8KcA~.7Q-ndʷuȎm)\JBLwOo׷mv;!g[c;qx>N>Jx%-(6DUq➉Z(^'n-clȬ]6[f%k5>ҋSS"a [v.F |aS!7km\hHRLF0A`,ɯvxSN*.CqRJQ] @bh0w2+E2di%-g 7)##3B|2ef=t]Y-gf_N4,׻.GmzǮyvHnTg SkiJB&22RkQ!#R֣S33ԅr\OC \gP!t%qQ·C# =e&KzicDy%T5u.)mdi֮B0}{&)iZu1$%,q%&iQ%TQ aYoYgl>V׭8Վi2V>Lf?ž(BR|D&[PkߌoV qkl[ŋ$ؽ=ǹA%J2Xuuj'K5jKOfqjog4N+zӘշ L_q rR^J [/縳TN8f4(EIT̟y܇q[ fõZDͶ qy=A0O!# Z*+9+VoxYg߉mrUֽ+ ~A4[5%ӒL&n}vqf Kz~@qahzmfn22DcOSOBQ6k\I!nBT""#^ M ,'%y܇q[ fõZDͶ qy=A0O!# Z*+9+VoxYg߉mrUֽ+ ~A4[5%ӒL?1o59.7$Oǻt$Kzo sJu5z W.>&E_,խ]KKH[ҳ/rT u̼:y}K6\IGS*yրBv;lS(#] !CM!-GeKmB" Yn@;#yn%t}suҙa~+u[S.\JIQ,J;}a]m{[{8v7$Hm6HB$!iG_Qa8Ԏ4[\ZJ)_)BK*AK&mޑ]*MΥGD=N0:6߇qLe YHL#%"iRdC2hoŸj@q }@ʼRť(KJ#JGm##*Jis&Y7<6&Eon "\;}.0mDڊ:T"Ёa:Y!wiܢ*}'mkχ12~cP9!f\Qxo:jѫ\]|L!YKS7ɴk3?IJ]ܯwۛhk۴J~ɹiSih'ί3m-(Oe@uK$'voޟn@= ꂎ憑噥$"5"&O%Hm&YX#VSe;,-bmVg ȸGD)CeN;nԥ(\I95yGR }ܮ57p]!ݗ|+g^L]ĦT)i.W*ON,,ű_B$d/O*BX?fRio҅_Tmlc-Yvbݩx("d$qJ5XP??kM+IwAvVOv [<}瑑c߷Ei e Q4pL=s/iff7֪uA)֜+^wH[0$Œ.i3*$5.Uj^ؾ*#m#6S Sv;#5-3" ŵ߷~jKQ%N$fU;&DFfl L͇%$.4OHZLFnٶN8phd\C>)Ќkܢ܊ 4⼇Dji|VDeTPeńʤLH2%>URƜn⭺Gqٍa&#)*mKT+SJ:u'_X/Cq^{'rRuQ2AiTb˃vKj^4V3jB7KY(^d:܇b1:m-55S@q%ş<2Z[iz,uR-&d2:]UbEڻHVddX%s{`4ܾ<#=LYWwet~Zi\LH""22+mjBˁ`bxn5gP}eqUWQK?赖b]cg%;{B*c J"KZuϱ[0+[{ p(Eqƹ)p5#*0;!^WطҷI7c:dv4Q$#i>*%_@pb'vA՝VM}/r##>>Zke@&fhvw' ޗm~I(lJQs_"2]k:l68Ye&]YRjQB"/2 adܗ IjJ[YI+6I`=pw f\^ndݠ\>orDEJI z{ BJF ];1CǯklIDrRSjIROJ]v;kYl.g%×\¸0U5Fѻk6ң_*(Պl{YP1̱ K zZ&HCvB|Ꟗ(̒f0*裳>27XYtxAF! Z(VDt%/1BJ>Dtu;$O2' J8ѩc.Ԓ:k]2uiݝ>G"![nȼgRSɟPʱvŭrl/-^*ҳ}1B2/>};r͸.WeNLcuvz'J`rچylU Ś G1 RB#.yjQ#LUg{5\l.}gȬWvoxRe]i>nkO3G>F外[Uh;9qbfŮEҌ-JR~ۊA!-6뮵>/w.\'X\"ên1)RR4AT~*h}ff; rK-ݵQ'b AdOtdwЕ%FӪm|ФIW(c:yߘ=$ dLYۙR<\^эg1~u]N I#}؏C}H[xO:)*䔨 D5Y|O,\}ݯeZ1gsY\c$n:I*UĩF4_Gdű,.d֨}=N!$HBFXp[ ܶwˋjxbb3I% -n}=O4?g.׮7>0Zû։VT'a 9uTr"4-^uܧkYՓr&/ƯZbȫm!!i JM+O$US6.[r7x>F1$`Ƌ.<& یyoG-Ԥ$FAU Eb]k;˖6d%9\X%2J%jB9 RjF|/h߈F֘fnxMtKN:$U-Iv:K.ֶ Kscۮyq9jIIr =2$]Y;aY2s Cǰeп"-(TʾZ9L_r8kk슷[[zeă24”n#eqK))2PArv;g\Z0S(ZẍJ/1 J-(I$#If6 56?~#\lŢ)I%r^qoɒW2I)$7I2 GDri- Ǫ̉%@~[wN[IE5ےTx 8mNk*D?,y|ʏwz;ʣ:i[djmJ"3At3#V.`r\}7=Sdr3p|yyʜƽc)Z M1GwrK'߇lyyyJRS"&~C0?W9JzlL'. "p"2\qSQgiN0 Ȓ &D5jf֨]{e.2usCͣ"$-MR\4yI/? ;!?kn0aCݗA)# ֒J "UW {X\E_Nޓx[tVTVc楢:'"zT*7n'n elݙb$h9֢H'xsm L*ƻQΣmu5!kf1jjSć[>nqB,dZbhS`J>-)Szq &/@Џ{goො[r8}j(5) \mT5D~O+ !q1>)ڋk/c{exanxW(tO0:^cuGe9vnض\+ᅓ/Dnɋ%N*nY+F׿ <#qfýdRQjms^U)^mINdTV(=3g%H;w v.SXSZl֯hɳ$Ή$"*צ9Fs~%/!b:"=|{cJvJ^Gn6"#Uh\{ӚcAk\>Fb|k_,lĈI*h{ tTp'~w$Xrlrf=NqTwx͛K$֩UH [~n\ugeܻ^/wf6ِï(wVgS0%v-Nw߯4JId D\q%dO_̋RĻ["bm}an-qΒD][~%V>Y/kLS97Er_x_ÄR ۉZ7暾}S dey;.îcRkiMȂZPIN"dۉIGcBI##$ΝUD_g@:g]e{}?čuhܐS3Ti/[ihAzTd*g]F0m3sn+%sfBPHwҒSDR+̖J.4 /Ķğlg|rr4ː[RI+O/!j"Q"&|B#/Won{F{ W/椢F4f]~B !ewQюD mQZtI ̎9MzZؗ8[tP##nkTY%Ë3!~v_@Z>Ev|-Uِ Jj&R|pBT1RNٝkbDzl"×L!aӌE܄IS\QR&ddz Mj]QՑIEzFd^>(&Ѧ]FQgYg\yiDydSiDd~jH Cξyf%.nŤ, Ȍo\~2̽\$ꖃKIJM V@^KZF7l=PJhjt'"+M2gQւQH@tAh7JؠG"M+CwfR}}k#0^c|gѱ.z5l̞Ylq3#[͢25>r*t3\ 6vYl\q{Jډ)KT*5WΆjſ2?"߄p&OgX'õܧzQē.8U(J"֚P%c⋞d;6cvٲ 2m]WDk>⚙=3uN!gh;2p&-RG5nJA fP\mיq/2Pd*I2de`>J6dGZ 'C#TWlY 6ߘ-(қgn^ ^ Bq|TI9LsJ,Ȋanrᧈ꿽bY )T+;br2D88V2Iy$d5l(vq-e`m-2-$m$)IP; #Pja"+],*M-Q%-8m$Mj2L],rkDKǺ4i]M62QtpvFbVrCv{\tF]:mEUu0S_mٮTkzxNlxϒ+C/FuRB^TiUd3C\KrPm.1pohJ짧@9ZK^Ż[wdCm2r|dk6ɧ̹n*?IA?lf̧N◬0zCN@̤lHzc;)kwzxܐ٭./ZLu:S#ρe Om/0.n4*IPx}5|#i\j=YT7Fw, 4P ]z_a.&JIY5 d-)Bq-%m]t2 #QuBPnM+~5Vo7 l)Y^-КbL)<ݛ5F -YV_ѯMhDo2a1!C͒"JȎ_ۻUՎ)JGag9 E*vLvi^uqTor(Sr1:wZf]}M*e}eN{"vX؝cai-׭fLTYn%(j ΤJTsS 63$Lh푩DIQ J.EPvWovMc5қ^IXUJ8"ɒRfEUh{.'/7\\kZh~}-jJ:jKF0^ &7Mrudل#{KI Pp%Kͯi2״-xאǬˆ㉵Tf*wfq;2S6oڎ7ދn 'SfDF|ҝ@^ݻc9%CJ1iQ%ʐۮ$L23>;Ýε3lL\_H9*3ʎZڌ̽P''[g{s7Ҹԛ^0:Hϒ, gE,&^z;2]eXmƭ$B3JD+"^Z%;=B;SY۷Z#4P uj##SN,t%R(ڝ5[5wK\ ֙E>}$E:mHlV &EJ.#FGR+@Z.>|amz;őǗ[n$ĔR#edFGI$){zSaxmț70ñU!lG \Fo$]OTb"dDFnj? n5`]>t;Ŗ,UOˑw\HTˡ"X2+nYmMKU>F{ijZ * &Ýε܉l _ѕxֲftωlhT_/tcۛIxL-)Td@Zcnf7R0ww]ț~;sC0M)OH5O E;3}={}fpJƤ ˡFk@_EאZ=xU#uI-Zq&d&FF@Dx2m 8 qf)%wmImI> 2U=@?*;>\$5vA~{4)},IMs' u3*sDeW:j; }җIȈ)\V.`"QTDdeC#2m˵\9[Cn<ͱ+•`)q%Z!(M3wz7#OdΓE)/NJsṖ$!n4闘jTj\mf63?dXRcƭ \5!]=SY$}^p{w|ԟZZZH܏6̸ҏL͞e)'˳;`jf.kmYE L+NDttM<1޳a٭lkmK[iSAi%TJL `EZ+WF^ɯ*tHğŠmn-[dL8`inKt{nޝjK>ǒ])v Jj"GYjJka(zkmw.h64Zq^|/v8j%5,oX+!^g:SR]: G]yfBIʒNeOy^ [N݋fr%bg~Z}GwjJ}-%~"{5ϊfL^_F˵Ifni 56ݺEa w4F}?ߒKoLI#Z$0}coli}meoËsLHu !I"i$qE@KmW[!OoXde3Wm.a!$5ӑHT0a,yD\sb↉$HnFgŴqj3$$F(%S0E;Ƹݩk7ּ1jmd{.DBhaH3##h>.KnJPbd:0nb&ʧBH.m>i3mz*ט66y\">tڛIUm)4T2avf ۝ xf^.q6ˏ88-5Q>cHJ+6g+kqwЇ4(ZCC4JSs7n<~Ff%kr$@diŀwGvT4[ !4[ $W 6).qQ [tw%{w/{Yظ;a6"/ylu)g%շD&EM)ں5'{d\/HL$˒-nU֦Zn湝K-kŷ!ozWZPUо)Zj(/^(DLhlޢrƚ̳(8\g.1ƒ0H;Xȋ]W&sy]we\, Vz+u5-jSNƿMSErw=ki|jg7~nuo?ҫOSa։k>Kݴ(S]EbȳPբxѻcouoSʎjzmZQU;{Td W/=K>=<0-MiZdK+$S[$]Uʫ2$s:{,Dko8O!㏵t<~s _9ִO |_nܳc+3=eWobǬ\ܩ3XvcLCK?:>X6'MQp9eǬvsM#[d;Q4RrŚ1hl,nSLSWLcOf7j ;*}TQVBtr"#;QQOMMQTcNrT11Jyn+'Xk[0XkJiX^NfNTE3uWrb&bx\Я5MgLqf7gwr7t5oʹqI.Iە,eu{\ZdM4*wigѻ^RzUUU SAbCWh+uܯcde3Axv[ҶW%MsV8;2XFdlllocQD2>e9{D$N֎_oe-ͧD٢y|ZKSEʩ#CnUJiW}#'I=N(M7q,psuӳ]I1\bQK,Hez#WUT*io%DHr|E"b%Z^߱[zhu2fb5%gh'x 'O,]nf2j?jV;,_~Oz2D=E$Ed+F,qUUUO0EV3׆{udyUs˷Tpo>F>i]䷚M%n'_s**|֫ѯxT$fh\36.U5STcL8Lihw}c{c{,pv ǁQէ~qںhC_?c9sxZ'پnWnY~5]DeU+QSz⽫N0\L\-'rxSz.h0_:aS=e)խz*iN˚szOtnݻf}HӇ.:o\<[rK^HD}Þmq+-FA^Hӕ4y;{C3_۶;33UP8n#LDul7K}o3?&n`-ùwR>`v;.=o3?&`-ùwR>`v;.=o3?&`-ùwR>`v;.=o3?&`-ùwR>`v;.=o3?&`-ùwR>`v;.=o3?&`-ùwR>`v;.=o3?&`-ùwR>`v;.=o3?&`-ùwR>`v;.=o3?&`-ùwR>`v;.=o3?&`-ùwR>`v;.=o3?&`-ùwR>`v;.=o3?&`-ùwR>`v;.=o3?&`-ùwR>`v;.=o3?&`-ùwR>`v;.=o3?&`-ùwR>`v;.=o3?&`-ùwR>`v;.=o3?&`-ùwR>`v;.=o3?&`-ùwR>`v;.=o3?&`-ƻܬmŮufe[bb6X9k8'/ЩۏwmgpǦ;ڷ;oN3UjTy)!g艫W.&8>3~Q"gbeܕnY ׄ2GY[n=)S-LQ;XDV1)^.r&f)yb]uE&bff|i战h̖,zyflTwc *D旕ʪ֮^:*^fZ1M4NHo[FAEbb"i*qUxjcf6)P7Y:Tg)ʉ,NEӛE[&;sKS;bo[Ÿ&&8csp(,pm76hwS5VڶpI(Uc5W*'Z"7bbc,9V-roSUv5TncvgM}}N*+MkI#|o3MDE]FWmcV^ݽs=ܜf*~b071oqQ\W_S7W,LW~;l1O}MƪcMiG"<]kA<50<$H=qhq*i'JRʀa2lI㿵 E꼄GhňQv.C!7Wh$||I#H\UUO+338DF!.>-{?pxpQy_||Ŏ> :ao2n8WM~{p\<`z^SkD762 :(6XZj۫Os+O,ֻ5n;J('rbbz3KFCX#u4Eh5NU|ⷵN W.rx[9|ܜgC7G˵9^FzUU3BxlkKի;7iQy=_ڞY}BHw]}Zsz'hxM8 Q۩/$<|Hkl/O RLcz#U٥4e[ۯƏ_y}wDh1^jl952R?=ʟՎFzj_'Q\W_S7W,LW~;l1O}Mƨ{,9+J2Ɵj5M{;NƻD{S mqs(/3#ֲo}og=k/n(=ZQ{=ogG kG}ogGe>z<qB}VXM[lrRd/o3xvynS6uaU؋rz|G+$9]$]UʼUUT33TDDa=31|g ;+Wq'qGV;MCj飯yy| ]sh#f]fWEe BNuY99"5W)rLbZ*##vn^{UZkB+!ʍY~+;Uj/a͚U/DL;3#\>h6o ;=yk&舚wUW;WWjl6)4cYٶ4n>5[ލQmeG?[?a ,~k^G?W=|vxZJj+~z9+$nG\.LLcogqFˢ"!13"Z!dH@k3dT'c-qpY8GW^;l~N{Rܬ{s^+ծN ,sKaYoMjA:+bHO/CnVr~FhdVyņG=xܗvopiŇij^z=Գ 3qgj)|k|3FkUQPMc1xj{Rm妽œ?lDeD%D<a$<$ޛ˪Q]l-PVʓOr"=cNdEЏ+nr w5ѸiEfJ i)ukasUr]QU4-݊c rrYlۦf&7cCpN-ul*+)|ӹUbj'x3bv6險Dg ym)u<5F=g22q] [b53n)LN8=woBf䴯Օu.%EEj:_5ZodS܇#s']3.O죨`з\Kx:n?[)"z%=J*G7 k*pF-B@Q\W_S7W,LW~;l1O}Mƨ{?=cby3s6nc<(ܤJȕJL_0\e(UJJ̥*R)jVD++B)U*J5R"rĬ~i FRednvjY B%R)|*)U>t)2.RDVVdS> \כWdžr@?}[wϘ~ࣺ5w}1@X2Ǿ<[%7+$e{WEEHب `;7 ,elʍ5Wƕ4OբqR/Bf B@8O!㏵t<~s _9ִO |_nܳc+k%mMVV2ʒ,hƪ*1ݦjƆziq^]6~S5w,ȌOh}~387uOU;?FFuȯ fwN>4jV=(c#$nGG1]QQxj)_Bqưv }ҎHy\c;Zmd~],뫡8Iؤ%}Ǻ_?iQj26Wke/~z|0ݵUz9+$nG\.LLcG,Qr興LD1r.,*AY>!ec:\)X7iÙEӇanFF0^*g;ʹmgSC6~K3sEjF*psJlչv^jly+n&bYq¸s)l93w[֊<%*#LN}czU[TpҧfzbiN8uY\5G5ɫ\QQ|(ft I=utji?UDN&b#crtUN nu5]fT\cn9QUQU_8F;GmS]Loo;ܬ^QܖiVh%dQ1l""*=dL\okyr*b'#r7tnz a n}%9d\;DDUT۵E˜@dl(Y)*26Hp!hB[{GylsWSvE7*_&ԄQ\W_S7W,LW~;l1O}Mƨ{?=cby3s6nc<U!0WR)F|,TLb^9HU)2#r)YZ!U*L"U++B.YYtU(JЍTJ\WB"RJ̬**JUЬd.<3yl|x`-=31|g ;+Wq';)5Xx>V`y= Zftj=Sjho b}}ֆo45zJv>9M|R+⎭?v [>G_?A'޻הZ<.Fu}r͌v٭w:rSQNDrꨈO%UQ TS٢kD41|s ./Mį#G9ʨaʹl>~ ?9,9zzcGcb(#- u?5/x _dl]7пPvWVk73G,ddG1bpR-1D>'R:Z5z*OO=*qtU#2zU-fzݶY:.T&dHJD!Z9R"5!Zʔ,9R[RrH]_V#:ԉn5d]Z֋TBrvTi4BKOMʵѩ\4kE5!ud4ktjB?|:Z{zt5<:Z2"u읕#ZޭoɄ+%WoU'dS#Z}Vד"7ַaKNoq=z֌&.K}iS#Z}RדIjytZ2v|B ]g֟S%ʲ5<=b^2V|D"N˼5<=bLd0nH5<5ޣcɄ._GO8XJc!cɄnrdY7<[,ys,SS#nyRX!yOS#nyRgF)OʟLpT?/BOO8YJ}!gUwʕgeVYUp~2.rjݝ,u[i"jf>xܗvopiŇij^z=Գ s?7ٗMWԘb]G_Ḿف}gkez|I|,MO#_P2 }kMm[inҢTA"'飑+U1Ta11ݳEf銢w1)qtf͗mmN76m]Fvx흏ַ1xͳGܭ1Z.s.W Hj%Nn\9 DUN^tUpULar6mm=MqL0^jm{my#J5EWTTj8rSM|4W38<hvTM]Qnΐm5"pVGaNAHc*fWHU]Nζ[eӍɜuCң5D]MQT覙z1clVkejbEUs9Us^ݺmӢ+ƈ_:CMKƅeܼϣ~4ʪ'yNN!t_2=<^m {M}M'ŮOcYt"'gǧrb?|;g~|_MBn5@3ݹ/;ٞ㙵ps@|*Va\wmE4;CAOId{5EURLhy' Ct56TUC3aWi2G 25TӽF;(m`|Zf[a:fQd 0L e<CL\UXw2ݻTsi/6qfz+ tl"rL"U)+D!r%R)jVB U*L,YUm?}ҥMAΈ4DRh'F%X30pͲMƾ6sɝE@SS2Qȑ1ƊuvM-La]35N;U9-u{Vc}|oJ;c)U=DbrT*uQSSnU5F84s43.s\0TTVVpwP;ͺR[X} f-UIO,誣Idb>+SȽé[/]uFcC3~/DNw2IQd*JU+)DJ{]mLgĖ[džr ?}[wϘ~ࣺ5w}1@cO[XHdU՝8n/u+?2S{|o% v)T8O!㏵t<~s _9ִO |_nܳc+mp^:8k#tMTTV5JO*0aY0v*FoMvˌR^,W"]폒9]5%_-9zÇNs#jnN40ǓܗئWal4&7^ˍhfo5DZx9Sr})-4 1 `F }')4D]@/qS5ƒq"ǚkUOdSkrMW!Iķ =Й[ ]c_2`M?-FF J%"E

gȧIWȯˇeE'gȧIW;#v}Qh)g=svKq}Mz"(RsIW:{]deJǑO+9Ǥ=2DO+(RvgWΞrTx~ՓV=̽WUBaYe-Զ,Cjː^s2LDvdbƚ\d܉ ݦfyWEybɎM1ziUYdΩO3U⧏Ǖ6yj꫕N_/zc;T[_4WJk J[㝓9Z5r=UMMUNeX䷣ ݇ya'O?4yf"dj_IkVwG1y/^+|WMzf]s0]1W&+<Ũj6[#]eI,*"C3S'͉y88Wa0{ՖQ7Vd2֖%p2y8j1uzk^ZVUO.߮1 c\ֺ*dZ.=NVG{B$cV98j覸|]Ů<.gF,L[ qh#Z,XEOp; Utct?K;7P{KC-%}M#sNdNh絯hUMtSmE ޒ\bꫪmڽ^_]+T7 IKIjZE{wvĭNmWȚ3MUS?HkbU1Ru]{in76/C`FS:zc_F=DuEc-f8ӹsmU[_[gOY }ckeD4z^G=s#uҖeDnνߧak3G*p;m]ȦKEZlPwQ5ꈮk&芩irGwanIoyMOrYmb]Xl됺dΕ%R@Ԧ(8#+""tf&&3:svbb#Sw{%"fpUFrFk2F+_9KKu-hjfntwA=?az+wU:hc]gWU-X$H]_29cVZ.j"sy_&:G*\Qzl>mԆlҭ u$Z.^"|"bT"Tnr|w;^VkNN:ynm:KUœnx=~DZ쑺D^(?99;̭W/Sno:W­wVWCn-(WI"b1^Hܫ#DUlh7iZDW~pzf\i[ekud$cZyV+x+ըzjׄ3g{{Uܫ *0D5u4a9{ 7ޫLӥ_ t/Fa_슁U%u*.QLXN(D_=Cݨ/ֺ ͮteE$V=5MSبːG?[?a ,~k^E](ҡM\25xFL2{- LhVTR JӁxRTRaYSK’{B*w)hVTwKBre)*W.I@,Ьܿ- LܥU;)2rЬK)(hRP9KBrReLK(ZSšI;)(2rW G*?{Ėl9n {UOy&i1?t~e-Ke7/s}mSCGhviopB-ehSHYT_ ) D rR JЅ* @ B_ YYN!hRB* r!rL!rD* W.RB,WR~ۿР穞 41jf>xܗ9;6aMkWy]%r~fu)?EIWV'62'!C%ʽ5ҲTA%杕' /7dΟRE v\SLT8 2Kv^*yPIdH?}w0ey*k?~w0BvP_y(d̲^ z~<`(er 񀡗9S]2[~<`($sD.I!xQIveW4<`b~H2ˢ 0n>z}? VWP7::,U4T={+\QF-CrʙMq^e`]"JLbzDDTTTT; ,yۺ]86'_Yw k!=lV[ k?,D]~,ΛtqVS`-8rp'N3`uY6Tw ̥y coyh3=njMJ9HYr }nb^w8]t2ɪx{ U1E3q!mx[ܪW[#U;Q$oJULӥzjbqVJ)T)ܤ.ˡ B˩ B) C@oPxO+E,ݮjZgx㦚$jrS_0fݙyb,ctU2V2LƻG".i1ic딪-B/BP9H]R%tR.RDBa9B!` =Lhh]\YUg1,_wmgTm=!,מOm7/-%n@I t[[ [[REO'jV{@Jo!mHN-҄-o |[zrܿ‹+j&+޺4kJW)0:Tވh26nDTH( \myYbKμ]%$z'*K EoTO8=nzW6FJױŚ/b&EQV]f)krJTcop˅]/oWQX)S1 %:8dnl>ۖhǻGMUQLοZ3U[:i::iiqhɊϒV=5Bxa<>OIŶi,ȧGtUӽ$v5#\9V`vmՌ3])\e2ݰD[YGF} Ĺ:#XJ#lˣyRw7D٫3kTShkӖ'v a5YTYtkEQ:,Խ5̯)Q/Nf]9{=8b_ˎo.n=ׯj2W1:"H]1] vk/4W5cP=6pv7)qض+oNrUT$$biN^їŪf&17r ǼX$ۣYse\rD6zy4sĭqV{J&lKchZ˴woYTΦkWQTe_j4\tw9q6f|\okK_pQJ6'JKPGr14{{<QhܣrtlV.,y%DIzG9{8sr5s9G&# u6e)5ܜ' u&fϞsF*]=-D|bʊ/f***c1UTݳMy2MYmv5I H 9i^XYV#Qx#%jyӡVw+ryU۞Wӫ9[G&>.ͻm GWnEpT]oUdTZ>YcXֵ9DN?5~.Ս4b# {3n&qq9GE5;>nn˓G#9rE#U\&RoQ}^Ϫ*Uo0tvup<^ArȪ.njR]MIx,h͢2"zjڴMDaՄӳ\׌/ANUЬ敔!U"WJVZo e"ymkC{cyo||Şk-x|e lJ(~@JHKؾi"'h;T`-҂{nP--vo%o |ttչv/n[|YfEӻ] Va0꒩Qէ~qںhC_?c9sxZ'پnWnYh?5w/`܊pz~)4_Xa-&OQcȋGS,ғ/b t-A+tt[0-D ttOO%n t[-@(B/ |!+| FTOI<5TҾ햞xZ=5S**jh7 in=[ir f蜳8J6TNdoД0mЙ; ]c_3`M?-FF 5,_J5}wOل]L*g03/ ʙ&;+,:L keV訩_WN&JIq@V{+FSHcUT"bt1U{4)*w)xRTqhRT_ ueRZ+j:ۍ쫿`U#G76>N~+)uf(3eDվܮSjrVX5~eMMceQ+a⺹VmSʫBmZ\tss1+Vo<%,2*STIM"5SljyDٻiDzڪi0ʞ40JRޥ;)(J*g/ZS=x&P9KB{B(u,r} WIgyl׿W^:l~N{Rd]17l|4vmBVV;ԅ Y:Nn~S{;|ؖ慯Y_ KZ%SMΐ:n-j,1fg7ښ毮s*Q"6CTszM\nf*]\weػIӆlu*-u =S{]꣑98&q^Ta-9zm;ol%.fǨbuUƳG#UbBs9ZxkZ ]E6-<|c˭o]_EFWjSk9Es݉궖 >W֊[(OM5S媒)fdhؚ5d/]\;LT[l]MƦu /koUutTOKiuRGwsʎlI#5cܭ^ er9qtnvX>aޙyH$z5K识xT]8V*ns]cK}, DW[m5(V:xZW۳] Kɞ-0.뫫,7y+]pJv,OcEbU]| tzL뙚{ "wVU[*kk*"UUJ(]kQUU{aF3Ʒ^V *&|LgY4ΏMU,NVbڜvgܘ:h[ߟ 0ܜjߗWo *Ckں>9#z5r"rVW)N4㞲6#/WTauinC+bZjtr,Uwhv.ՇUVеLn787)*mMnc#lQw5Z^TKMM3޷\WLUceRBBUH r"~/A/S=|iWc{}1zw}#g/U-?xOF|K5S|M,% tD [P-B/h{VB{m耷ڠ^-ҁo[e-n t |[(@= ȭy%ɒDUQƼ$} ڪB^Y)w.*XjIPYbI䑾7] k. y֛h2Do?61tMtK$z6 j s6\Wf%ū6o:j#m<)ڬc>F/)M3=g,+vV<98NDuc},9]ii$ ]kD^ Eȩgi3 '27aw`2QI[UVRdm3#rrUׂfv:9; 9ޡWn0Qtp5H=^őWDcޟE+psوUuLG' :YH>S`S f@ؾ`T Tt[^-I%nN B/h{H@-xI%o t[o'j+|[j.7\k#㚢z672-;Tvby0f|\e 5/Xq͟)o}7 vlO??f{f1 ƪzgNR)FI/*)Y*ҫ"U+2D)+B') !U)2jVB++BR"U+2FQhBR)|*D*^BȔHTU(U|$-TܺL-7e2o0fb ]U}5<>i2_%n tDI t[[ [[_4m | [0A tHK(B;^~bnAhڧI]89Dkڪ'P[q=e{RZPJdwGrӊq1C}7#"K;qh3,M5ɓI )%<5ܐcO;148nkh]Dۈƪ?[ܙޘ rn;q\:/FMe R2]f|駅8k:1Vn5ݯG*")^c^J+M[iguMʲxᨍI*z"c:sLcUSN#+Osū8* ]$ I4L7F#Gk34‹ܛfjcřӎ"quuAs2L/klu5*ctnW,?w|^ӭ]Tۚz]=wo[n"pf04f5(|?R`[_0!n_%nn t[_nn@@In |E_| [[A/%o!n%vc8ݮJXKlΙHc|n][oe"HnЙ ]c_4`M?-FF >P[Wڗz~) reNiļ)*g)eeL%N%J=?m{IVp6WYQHJfW{];{4s2)5r.o1UWoѮmwכ ( %K='ttɕ?UcVUN[^ETN;7=b=h7OhZ}MTbbj=S·""j!ǵ=wl5;faW2eL3ΎGtú׊pׁ6'%^u^?X%n^WRsw4rƪv******"*)EQTcU4ϛՖ5صֶeq+UͬZ]$w} ݻsQR2M{ JK7{j)IOM42XSwNVpo;-vUp,5d}<9 3m0+璡"bi*~xܵTQ:#1nZdATޱ;;(*\UFDI9un5&*fw`%r}aeexIL#9tND"~ua%ݟvqܞ[X0[th諰wwPҁ\֗{Oz)fm;4Uqi'<my,mQF9Q㮫IU5La (+e3N6W4PsաeJ{{%Tܮ] 73諓3gܧlMwU7L&o{c[*#ttz*&QUj/6r/F4W3bpW>yv%Ȗ~lxd4uSVJ1UnF+\5Rm[T%67nQ˦1 mE֞ޡ D+MQs9yZ{lcUW9\:v17j#[>YvmU7Ju'\mu} 69M"HAjlf6wvbpznnD:sI[Uج{u_׍ſ+ZԞEjz\M-T3-LDQLySKBZTRФ, bK>[Cepgoœ`4:t?xN2%29g+!|m7\hR@*)ܤ-\- eƂA]k]nSKpf$^ 5UF8n1κ0kVsVWJZZu5j1xGPOlӘܪ;}y*mӅtue9.oE[E[_SGoJuo6*"iEdUF)yWN];L[>66[\ |gt}Uc6i\t.D45`r? kئ橹kWE-L]Sp/Z{jƬHVgT2H[\PЮmMtQ11Z:rب keDPSzkHG7T]8"\ʨфGiLkWʌtޥOOGORRFiiabGqƈ1j"5DDDDqqݗj"#r) D!r9BЅBȜ&9H]P>HH =Lhh]\YUg1,_wmgTm=!,מOm7/-%n@I t[[ [[REO'jV{@Jo!mHN-҄-o |[yl)yS5#&kĩP4r&O#D_DDaEH+l4|nDV/Q{B&"w%LY,M53\QM; {FQTG1+hO՜7~Ÿ1UY99??G/?eVbT"T](!g!{xx?yz[Gc^+ qRTWVRe&UOAZTM2udWU&&fb'wFQcSDDN؈o,Fؾ`T Tt[^-I%nN B/h{H@-xI%o t[o'j+|SCKQ]UOEG j%d3EFDUUD@=8mۜkxV=<0,W~;1O}Mƨ{_=cby3s6n)eDRe(B))*WFRdB+2CZoKrvtr-Dtc]l1tt3M"H^ Mh8S3xtyvn6}O>KKGOH5d+aIut|5N&o-Er L }`8F['h1WEzRR6j'TO.m2>7q7w:EScwz*{}54āH4vk95rk ^6b7zieUq/X!Ӆk)eZhb zvk]SHHکEGR'@SX]#RG'(]W# R(^_jwt]y5׳aY&1#J._DʖQUȚJ98F*꽞@p88&U1̬VSBUJTձRTT9XɢUZǏaDƔ~ZJ\WD"VJe(J UO-<f1cA{ɝ=f>=זY᫸깏'&Pҁn!n t t+t |-voA+|[(!nI| [(B'`VؠmU!ƱeMcx_2RG?[?a ,~k~EU}Ҝ[zjROم#ݮf SK’{_0z%N&T]T)/ge}IܶcxmFMjCUWj.n,\+؋ȟ믘XSqZƨ&=ϫ|n+>CGMDw==J+V6($oȩlzUs_5_CO&'}QK!D*Jz}9#:+\jylSkaSTut] /n3BX=}*i׏ihW'NfW+zG;[5r?cW8[4bUNRNUur 7{ yLnvV. +o%gVAWK-c#TcSVZIBzks:/QI5ÑW'nca͒oNMmmv$-?nRݢqGئJ5Ncnƙ;V{^XU ZkSrMxj]5⿢f_+/31QO'1onےmvc[qNw5[hR齯^$m~yts9;Qܘ N6nD᎗?tm4؝Zs .veIW_uGK B/y*jZ]r.KW^ӹ=Ibf4E[t.GQlŋl[LTW#y%m Z9kjss'5M9Lű7*4\Ӿ}xiWrK .Jw(\^Zy\]9&9^ 1~M,9{6nS?Y]V+_ܝ\֮MfkՕqe rT"&sZriμyNM5ugkVpq:7ug[Uw '-Է{I'|tRܒr#z.fs^ $᭸mfG_ek]*ҝ uKesIU"rwIw~mDXv'ûK[hsxN|1KINfw5s3]uECbj")ݵ©qf_+fy]L!KxzɞUkY$$z9ѱ.j7=b#1ɧse3g;csOk]ն=MpSmc6{469?kj}Z4Ng9m1n1־ZǬrgKsl'/ݥK%{J[4pwU36Do/*5DGܞo+<8]ie۷9v/ܸezͧEJc5EӒW/62-42.EUaLi+vt&%,ͭ} \]Yrsd=זY᫸깏'&Pҁn!n t t+t |-voA+|[(!nI| [(B'`V.Vlz:vIjmEإ咥]wR"wDkRRVv@ %$[zr[ڒ6/nL#Y"QQ)]t8Cc3k/O.QLkÝ@n%u -_Qq!FSFC%IUy5M<'?8;vv9o3[11-۔љ*}1vQ7+dazpm4?rnY oS+VR8Q\x*/UvgVb6>2瞌qzɱ;7I^h]h*(UU7=,g:"N<Ϣj6Ю&'NJgw wvo2[lX;j)mYk*ڨa&j3tqs-LLuek|XlFS;fKrt{5oknr5+UTD3WELri6+URn||RUpJ -O-L)&F1U^nfi5nG 4rw#{+Nݾ˭u9}nJjtDckɮ'+fg/Uc3wL!͛mnJue}3k&˱PIܯs;94{_Ur*94ӱvS+f7a]UmtZIl[6(bF,E~4T:lw&)L˛f&tF4I )KV-KiX*8Z% TXQ54Wkkn]5hlvQ9QF;cy߲}ڱ%~As}$vm4sW9"rStlm;uWg bfq ]r/TFqV%$֋n"II]%=\VVxNz-VZ(<;5]׎1ǭ.r_)0zKfdK۪[t|Zi#,dt|^F\w3t^&̹rjtkZw܍.ry@&TRУZ>Q+$6Ywk ??~Y6I?P~cCg)n2^p-rn6rr;G[Sr\;ԪHԪa) B)YYN!h@ԉZJU!rU"W@*B) rZBЁD\VP) D!rY 9HZ!-2wb3ѡwƕqf0 Wܱ~3wݟ6x{f>fW6yՎ*yŘNSXMoct.LR1;;jLPN"avU( kKj*<~10@;c.ۋj<^10B;{v\x 6ۗC#.aݵO]&]k Lc7v. L;avܯO!va}zq0Bpv/~M wNXCn_XQv%]jx暝csjv0q[mvztK5ӌTU4O'+Cʤ ]ނmbWAUeF/k\ǢSF wmQvtۜ.ݹ6]m:HetȵnϖT9^#W1^U6(Ź܎|5,Fn2LEȯƘ cӂT]VR1*jcs+RS]2ls~5~CR^f;rc3kOO4C ?bj wSFwiNl|5< uݲK[@e7ԁ zvQ @B}3=@B&ڊNc vgwmMg( ݕݵUޞ?c!vXW_{wme"!m68ۗC#N iݵ?]F&f1wv=v`!v]v` vb.zq0Br?`>a޽za0@pv/~M!wM;n_Trɻe#Z'} U+%c9sکl4SZ%RvHɰ,*>m4qJʱTNEk{\g-Ce-۠e=$ k#M_%Wx}\W_S7W,LW~;l1O}Mƨy=_b3s6m. ! 2B+)D9JL!Y^J\-,nCmt]jtᬜ|LI:ayo=XoC95|"*K2&tL1=]/Mּج~7anuNuU`6 ދ'RʮURMx =bzkV\UO條l2z._|E<1ӻk^}7u[1حmlpc+tzɪ53⫑2ƩX۪Nr+6נʬyT6|=][lFiG5حTGkMLs5<x6r f!-Z;rvJVHb#iUs?]7jnxNJ~}6n2mr;NQS%V=C`5ʩxO>];x,D*)~kj^`YT :J(Pۻii׸$]2/ IjZʎo,1y\9ySZbnh#uo0b8 rv's:jY1 ʪj3͆HլUndꯓ\nkjŚiQ;^̷F]Ij. l>TyjV8\_DZ#{Gc9jql{< euoܯ]rLtWTw;ND]0㙯1򰊺a6\,Sfp:OȢe<2h'cQ5uEEN `Ӆ3l^\-f~{\U߭EUX: ܴo*rHrׇR幻jQ˫8wZ\UMii6df%EY6oS휯qҢUHtR%H{W+UѨ&ܹ1MTb4CE5SW*gLp1ͺ:*GqmРņu߷=֬SA$N]UTYܜtSx7Z(fzHLg? p-}?qGCQP6h׊9E]""ɈiQpvXl~mRܳkIgTIoiz'58yG5ὃf]UD35jRGGKoSRӷ5Z""0ݻtۦ)0T0L](9ۄtH1dtQj/+;SS "bg},ݦ>ۘl;mȭ3OC35DTJFYHVW8?Mt76USLu;=7]3"gO}}<dUO0 gPB?槜.S; @ dԁ v?o';sf [g.- v]U[1mݵu޹ Lkz^10@][q}b`vwmual0.LUݷ IݷA wmkQtz( xt7Ô`8=~a0kٜ_ ĦZ GW,ETUѐFI0rľP9Fr֧U_=nZQSxrtU|o+Z|?x&=sX̽-OQgJCCH~ZWڗn~(5JqU,hVTqxReL- JYIRکhVP9|%IS=šYSK)(E++(ISŕyc-];cwH띢H)o酪Nwmꜵ ڬJ93uNکF1q:fzݶrNT)ܡxBЪTRB*BЁUh@!t.R%0r!rBw) BN*) B) rB.,BЁBЅT]./UHL!r(Z! /A/S=|iWc{}1zw}#g/Wl?xOGfj{kf>~o/暯0<Ő}&pQN%U}5Oڑ|XU4O"gҸ0&"5kSDj"pDD(@Fc'+Urtrh9墄Lc<=v*sTVSY(fI[+4zE]"w9cv{흛{g4Q?;ϋTuC_mkc)m5SsV,v|ld34] c4M:ŻߍqԽ<<اچê84S}rRYsU{v`jrdw̞4TJr* Ln}'M[m0bTv߹M\Eݬ]Ưr[ȼWR\joDG'ynкhWߒLtMwH4*#{pM;xvw1no.ՋSW.'u6y3vt-Ӡy mUJ"Rȉ٤ȾS4 c؆Z0#<]eVXՊҟNU&TjzurVL㟬]ˎݡR+j)IiiUմr.<9<6*700ӑq{+Wc%\aH+lQ5IhEbNUDTT⊈ҦTUʦpTEQɘs껅eSUqzwp(=y/+\l״.0S͏.'m=-CAmi\q~y#ϒ#J֢&oݦnN Y8nbޞ7t>Et:k&m7eNqYuҟdD%D|TD܎#s ~J7(^V;cNo&m\iKhs*\bƌW7Ws^N*WyjbŹ]9ໝgK}PM4!"vr.; vg' v.YaTbѸF=7hoTw]u,.U2*AQ;w=]76bÕFϳLts[U|%VDUdjJ%R%hB)|*q]i[~ykcp@ǟ{=f8(>b ]`Lx_4afgnWGgD|v?oum1STE3F]{H4p2&AKOhkSEQ?.t|VKEsԐRUB%F"򤏙^9B1ɧqyٵ֊sԈՌ˛&߳jtPPQ:b{؊MUdW34]jTN1bj:%`ErcWU}4cQZ%cDK^t[6qʪe6HGQ$йsu~tN$ۻSL`^khqމ[Cepgoœ`4:t?xN2%-{OWAU3nWW#(yUr#q+= X{{.3L&kZjPGg^I<^ku{)bI<^bGgO4I}k?'!˽hN5O/ wƱ}c:>x/wý_IrI<^kukz=zu'|z*/|;^Iz.x/ZAzOs|*^P=vu's|./^P=ru'} wr"zOwfczOJ#GΤ/|./4~ZI%>_c]Ш_xy}@ԟbǗsj"?^_PGΤ<Dž:$Τ<Dž:%3Wԑ>ȏ+]ĝGN&Ώ+3:n}W`3ugG? tCv9~o/7Pty]_GM=Waq,ԥRvk^Cfثs}d<453{?5cf;/^;n?l%4Zia,מOmu,eU&STVTAGK *d415s{Z֧UWD.] 1ZKR_uҦT<N-E,i׵Tu ;+ҥކqGMsF/quDګknnnn؞9QVSjQL_Pca9kfj]adTs; 4F|]O5f0|՘6 +{W_Cr.1n\~5/x1c/\v;=O3O>p)68C?\hV_89u;-Ejxop{TUJaEEr_y~LW\d91_o>?Mz!7}3|}qf>6̸WUdJfRRexJ4Q*ZY 2)B*"U"e(J-++BR%h|*L!r TJ̥!*VRץ~wQz6Su$*hh&rUڪjпn0δ8=b`oKF[jTC 1=8#uED.׽vqqffq13U0K:7)Q _0JJPH9*je(-l5>ykXM6>-{?pxpQy_||Ŏ> 1ܿO'i,&DK,FG\9ˢ""qUU2*khv<6޺&N*T!E"E)3aHHqgk[X˫p#+:R\*lԩFcfsNNo1T4\iӆ9ޮmڷL5U1""cFrMߒ}*ۛ=.6u&"#gG.Ǡk }؉NI^~eXsN[Ѩ=+DEAW:;W{zug~8*dzjGy)@GEG1㼉z_VM2~G_} \qFFP/Q{? W#} \qD(WןM2~G_v} \qFBЯ?d5W/ >`5qyDo^\qxUgKKO?U5qys{[ڼ>Z5qy{OyqDkwѯ7d?W^~«ˎ/ >7觎;xW __o-:Eū"}O '-i~2O ''v<*Ͼ4z)xB"|DžYŸE<'ntK_OP[3v<*O/>?d_wzz}>Wc~WqgxO~WqgxO~WqgxO~WqgxO~W[mZzI-2E̕oQO#SݑT1n3e𢛔V#'J ;=}C**v.9SQ{-rVj&H~Es3 ŒŸOMbo;[aVUl9L=/ѿnpY)80-MLyW.;QDDFBXfXGE4NGG#WEjbU1Ta:aZ6i3&DOD/O W[s~o/暯09ϧmKˬ9c=8>^-};Z DC 6)_ g#ڦI\۩sR 5*tEMtE46& yxl\whjꙘQ(W#i¢MSy v߮tr93ÇsCk1n\~5/x1c/\v;=O3O>p)68{ v\}eKcyWԱ_) FKqlr߉Xm"E$SܪK uE1_upOiϏO <Ӹv7[꾛̄jg{y3|}˙}lS.4"U+2NR+D"U*))j%hDȬehJe(JL*HQYQ(UHYJ\JUФP%YZJ/Z!YZ!YY!rYJ7) RrOaZ3QzgcϽn?3w^W1cO< w/Sk~zߺGfHu٤F-bqY<ȑx~SZVU`l'ɰaNSuoҫ嗞F]'$ںnQ8S=\%!EsM5M鈪1ޗcC-S=+'uWJfF{9vxetrf~3zNO&bf&5M; gtz{锚tV͂#&3: %o._+<2CHH#- u?5/x _dlfSSS1TTHkƦ*DD-M3TDc2˔ۦkb)ftD8t7B0}cTZǵxI"vQxqvNɌrݮ']s֎}WCg׮uSɧ;E:xppL窲U=Ub-{Nn7+ܗ m|mNjz\PW*UIT|uEEʝxTTa0_.[iؘVfk ??~Y6I?P~cCg)fyVUl9L=/ѿpy,ߜgrhj疦WMv~g=A)iv~=6P93n(\UC '9Ha{[ɯXQ\W_S7W,LW~;l1O}MƨG_mmUQZ6QMʮ4j*fkNe\Q[g\xOo{ML伩`f қz&Kʞ)Ll ߓpw{_)7+>伩╣`k:\f^TJ}c/+>d 7>vpԑOʞ)O^Lq7n{_RW _Xԑ;w+Olϓp]W]/IJ{o+O&8V$}/IDϽ\Ŀұ'jv_c_Kmp}[.\ȿ=g_bS7uv_wutnjzݻ}ZڣqB@tLym>cc,pv ǁAumr:EY]2&ęr' tP!Y1Eli;\˪Uu{8[ Y=_yM\3Z}!hJ׉,w2~yTϝbγFcu(y}1onҫ;{?u޿+(zc>3o(mDY(`z}5IW$nKD"pD@?@Bg>l/w?ŏ|4TWW3)**$r5cSUsx""jfY\3]sLF33!ۡC6=Iŭ_;svLec^s=H랴u~3Gm*8ŘszM=y)m6 b5ԼVJQUůcž;:8q{~^ͯVOW ;=}C**v.9SQ{rVj&`~Es3 'ŸCk)9,)_zS>;~]QWx2Uf6ٝcbzډjY'w4;Tљe"bc`qK$2h^襉jT⊊'ULUNC޶/sbEG"O/OO+j/rtv##6vy\[R45,>3g$=̚OlbL2NV5|5⯚Tn{s*f.ohՃrv0FTw^Px-Vi@GDEGjI G+J[szsLՏ&';fWD{?pCg1ۗ;_Zz|UYPu@Er_y~LW\d91_o>?Mz!7Zz y*H5s"'T۴ۦjwnri: kE6NWc9Zއi]lxmֹr9V\B'LbͭգiR⻱fyV=:_r۾|dzוX᫸ɝ殂xYPKQx|gQ1k|jݦTccq6j֚ȣ(繍D^EZVȘg;)¬4K>2f}uΩt^UrFUU]; TFO*Ϝc\֢KK بi%N$>GrӛMt Qr&z>_iؽ&sg F569Q?l^ߦn Cpm}܏g]utw8{}憟}Y`M4k*ʼw)eqzX=(pN3 Te^lj_X $OQx^:#}1]{#zմj6fbO^y4wN`f#YKUdz-e.^Z9<)ݣSnW'/G5nڝ1{mz}{}サ4]xi{< ?cڞˎձoa}# 8ivzٍF3-m6Vٗ 쭷3ܧGy j.W>dIO?& \}{+d%?|H:x|5qq\ٓN jDZrOfO;kS;ăɫWg=>dIO?& \}{+d%?|H:x|5qq\ٓN jDZrOfO;kS;ăɫWg=>dIO?& \}{+d%?|H:x|5qq\ٓN jDZrOfO;kS;ăɫWg=>dIO?& \}{+d%?|H:x|5qq\ٓN jDZrOfO;kS;ăɫWg=>dIO?& \}{+d%?|H:x|5qq\ٓN jDZrOfO;kS;ăɫWg=>dIO?& \}{+d%?|H:x|5qq\ٓN jDZrOfO;kS;ăɫWg=>dIO?& \}{+d%?|H:x|5qq\ٓN jDZrOfO;kS;ăɫWg=>dIO?& \}{+d%?|H:x|5qq\ٓN jDZrOfO;kS;ăɫWg=>dIO?& \}{+d%?|H:x|5qq\ٓN jDZrOfO;kS;ăɫWg=>dIO>]Nj^ֺpT_Y6WcnywgOTRœFآj5D|:q<%uMuMSSS{>oUNum$]/𱲺F=ԍDTHx5S^9PJnWGx7MQS81l6یY諘UC;7r5|DTEOn&)V2c#p{?pCg1ۗ;_Zz|UYPu@Er_y~LW\d91_o>?MzpR)WW'$L\x^<0ڵUڹ4i[PV:hޕS_%W%ٿr/Chj{ʍ:>%ٿr/Chj{ʍ:>%ٿr/Chj{ʍ:>%ٿr/Chj{ʍ:>%ٿr/Chj{ʍ:>%ٿr/Chj{ʍ:>%ٿr/Chj{ʍ:>%ٿr/Chj{ʍ:>%ٿr/Chj{ʍ:>%ٿr/Chj{ʍ:>%ٿr/Chj{ʍ:>%ٿr/Chj{ʍ:>%ٿr/Chj{ʍ:>%ٿr/Chj{ʍ:>%ٿr/Chj{ʍ:>%ٿr/Chj{ʍ:>%ٿr/Chj{ʍ:>%ٿr/Chj{ʍ:>%ٿr/Chj{ʍ:>%ٿr/Chj{ʍ:>%ٿr/Chj{ʍ:>%ٿr/Chj{ʍ:>%ٿr/Chj{ʍ:>%ٿr/Chj{ʍ:>%ٿr/Chj{ʍ:>%ٿr/Chj{ʍ:>%ٿr/Chj{ʍ:>%ٿr/Chj{ʍ:>%ٿr/Chj{ʍ:>%ٿr/Chj{ʍ:>%ٿr/Chj{ʍ:>%ٿr/Chj{ʍ:>%ٿr/Chj{ʍ:>%ٿr/Chj{ʍ:>%ٿr/Chj{ʍ:>%ٿr/Chj{ʍ:>%ٿr/Chj{ʍ:>OiM9t]?ď9Oʝ]Gu_KS?,{Ml:}Hzh]N e uV};>">3o\^=̓FgGndv39i X4F8~jˢ'rqV8hn,g#LeueeGdFEj+=O78&`ەu-²IG+V4Gjʚ*\^7Sa1ٴ{1m%5dQ\L4Z5^WXj_ct({fƍެw??YKI,JO0^ᢎ LR=Z*/3;.jӧ{Abrٵ\DU;U*5b!vI7vjIU$}4jWO2+Ƶ4׷v*b ;⚺/\L3>4DᎏLNdVz}*ק[UR jfjwN.v(7ft?9ju߮~R?M1.67^q7:8fIqr#v;.*k1އS'u3D8)ݜwun;Kq1ȥm#gNeIDz艮؇V͚mSɥ9y;]pffwfft+p삃\\͟|wGw-f..zx>;;|Rn?=)7zxهˋ93?_OtzxMޟ/a秎l= &oO0qs6~yq|?xC<I[>\\͟|wGw-f..zx>;;|Rn?=)7zxهˋ93?_OtzxMޟ/a秎l= &oO0qs6~yq|?xC<I[>\\͟|wGw-f..zx>;;|Rn?=)7zxهˋ93?_OtzxMޟ/a秎l= &oO0qs6~yq|?xC<I[>\\͟|wGw-f..zx>;;|Rn?=)7zxهˋ93?_OtzxMޟ/a秎l= &oO0qs6~yq|?xC<I[>\\͟|wGw-f..zx>;;|Rn?=)7zxهˋ937Nmf_jjkx&# t+S׊߮{"Usˈa=Y{oShfgN:pF=c̰̀\OpmLfx6mL1:Ia|r㑋ɪ*S4]+aQȽO*1~7xc rk[n(aZ}$V;I4ם4U׳{f[g;/?-My|bn18q7EUPQ$0$sU$dh5D]SMtg714UN3ŝmѹRJ]NNS^ ʇGhdٚw|-Җ2fl3:dX;4F-E ^/pvOQ54.Sq4uNht}%ߜ.Qc{u]C+Ltz{l\Og綡*v'"S_NtTntq?UW^wuϣu}N^ت"m9J6^^Bѩnsˆzwj;_›vwp<1ƾwL{I&7l](ISl3&G7V  ̇>2Ux9k]ؘ )[髭δ;NYnbǐ°ӫ^FfeM9~*rɳmtw4Ɖߦ~c}Rezc5t6^f9rc_yNhӢe1ݧX%[Srygb1j. HyQUUxWDӡSb77g[v538N۲5-u4kY"K c]Nc{5j9X9Wx45sYXN&4KU9q<ݦ8kK>"7o">9ȟ+飛>"7o">ȟ+|_omFKoed9=VխN:+z,mwxj^Ȧ]SG[e^VfyVb "Ǔn1cGayox&Qk%u#}zԖ'RK;4J=藱8 i\0u,G bV#Ѩ*WA=~;,՞n53K{4w"SCnEVUX}:L4]'^dy*MSMY *i*"^x^cUEUEQP =ߐ+ʩSlZս1,pM#bsHF5]UP(kt*Yt cO d$UsQTdR4l,R'4r1Qr/8(`SUSW]W %+;ʚlq=TFAkگtYntz 沶h!s9HUE*uu;A]o9-6= -IYO TQl*׿EF׀L:W W_JtHsYh+-c'YR&=9rDUd7nGsDX1`U7Hn :Tw+mQ¢*x[K?ϔzLvwl"8/[E;hlrƲU: bETjnn'yVPy #iJYr=5CZ#dVUZC:VJWW^nt٣ZWO$ ktWk P7F3Vj~YW3tD ȥx435Ts\&pTTP>Vk`R3E;9#SU;myhh&UHhdZ/,/.O_1CU,{Z{L+*\RuTo3$]{t6NqybxWM[bsPeP.dm;bb*{i5=l^ Űzmףv]-$\K_NUmؼ.XǷ\ ^9V_.MV9wwDɧtDydFkEA.E?:cwwnb&zeWT~Qֵ艢x!3-au?'U[?U 3UdleE=-b*Ү)Qcsw4J]nrbv>[mSxR4s[ Uڽu]{Sz{mzf(v{Ru[TuNGQVݬpʚJuɿSJuMW6EDڽ~xL;˦j{ }¢ hzds\ؚj?E@`.nVn.Ae6ܾ E%;j)Ң:=Uj[#Ut_CI wN:H՚-ƯH񑯴ZQTX,U͌Y|+W5e\1ρѹ".87ɻ[WuOہbfTZVHµ#I{u@n:r:UtUeZjjJXc]<Įc&G+FD:o~6W<*_rΖ6V])MF. 6*WPW ONX%sv+nE!k&AS գXDBTI*&^b=WvkꦪRQWTQIAK5{eIMZr9\N:(wW7O}qWS ж~e4j/:Bzt+HKoAY]S$F2(h`s]'2j-4]y*7DDUW&?m׋6v:cKOQUj|"lPn Qfzy|:",v[wfF ZF,Χ,D)ߪrǏw6lv=ư%UKEQQ t|M#dxx^<;Be}2himgGWpmKIM$t:5S8`D{|oMPJRC4+d΍K7*yzwn%EvL֞*ynWAXk *[ ܰxɧg}Mޡ[7/ 4Ul1l3={9\EVP5ğ?;}'vnvFĮOF6 ]WE:ʪcQDZu;ub6:pZ+{XG+WN9áݚ&Uț /X؟ Q4c,lo5\qCch *)gjs1詪*jڋ4T _m[1kM3j)Wqd^fQUMOS];qn}٭݉­tr>bY>W7Nu=u*6hNSYKq;-,Uv/X5ҒD6wE5md GG&J!O˲A>֌ҿ-jmɋ+uzF#9dt?D///l\;m0bՉ ^h6HhʈӊjWc9?r3K#Hv[-f1ȩ\sU8Ȋ{ %mvߑ+zҟkQ$FvED9~XjGzYtRurPb6mN,ݸ0guQYhRJuxؒ=?\dW)7CnmyM},]wԕ"J9 UQ&qP-YoiVvH&W_-DѣU8/6[傿1 ]g@ʈ$ujG5x*(t9ҞSeGyTsV.04ncM[U< Vh qg{5ۛtoYnn&7]Z9osV>W7M]W٠y;O-+(b:fƟOYpb"M,FݺW^j~/b'yCOcsv͸>f.ܣӹ2"br*.ۼgE>?VJ{M$4TUUlP5E]8B60k1<cX3x^-sU< 1')AsmvGQ^eE:W+&Xy$z55P6Xφ9_U-?[*V:_QQ"G\^V"*W6Ө+$ Mc}˯R}*rʜts9g'Em6]a-YMGOqccGOTru^D wpCSmmFOMOK$T̵OYw%NEN]=@WzΟ-6[_gPo:K}[MNmvnqOh{v[I{"l+ZǦ^@dĺ܍7.X+'z:Z9Bꚺ{J|XUUWKj3j6FIm6!O ט橛}:=+YU9QM;@ =Lm6Iݫ]6U>jYFgc"=|C{nd3%b㧡tC䦎NDo6]@qnVx}z񜞑z99U4r#\EEEG&úح÷Fk5*wmTTNuRx'bшS#ҵg+v55|w;.==)j০{SC4H扪1] yŰ=vvN2.o{CU VRS5;a6}U +;;G,Cd4H#\;M^=A~Q~1w[ajS|7O,;eXޚߩYhѽ$xdNjQxꊈѐ^1 $,l*nW'*AI4sV.j*N k ͵yɶQuXnMUK-9V̈;^dhjTRglQYeKmcY_w,uSbX5Ѽu^87fnfEp뛭tJj#-{ܮVׂ(CwvOmNIkmC3j 2~TO gwBYŒ(Qdb5[K +gzwU.hm3SFc;N*ڈ]5Ѿ?s۽Owkovm}lrVV1ϸT#(=hl_=3-+~! SszE-55]$.b+ oa(KyaCs.jQj:^XdFbWFWDN* K&֭P樖O\f(.Tp\(jʚ*,R7E{' kN1L^OZV˞7jm}UANd5LkaVN+ʡl 5{R"&jj+USvoR'4)9lv{N).= %eJi{XG3r+ʼ˨kovt[z&9xG{c|y5T$ X9!6 VK5ɢȼ;POM;km=w^,k;Q)-Uoj| ׳Pr.eWnGNrS^;px>Zh576'\{Kwa:`jExraoM kU5{9xJ!֬SlMis{%X),WXbb*"v26 K7]%mun(_j䖙AI^櫣WrMt@)NlooI?6nn@ZR•wQh r>ề-6ru뽾r'mlVE3vXDz*"TEA'h8ب%&E%.TGM#%#kUڱuw.zafzQSCO,.{k8qU]@Ok2 dܟ /y*=XM?u-tz'b(L>: sMNfv-))5,1bsrTFtNUXT ڝnR>q. (uZ)6D$PV~:%[blMXh%K}YmѾi;k{{kZUUJ-1lӗcV>]]OExZi-v,iQ|WxBeS{Q&Uon]\1Բv.owriݿŝczikcf$ܱ"vW_iښR6Z#_nc\\=&[-sn7h45lEs*#Zs7ɯ`ȱhlF;u.%η]硙̑ѽ69+]Țjw@OnzurmcXmUmƪSf\Eә\aؘ.TS M5yi2+MUh76 )nmXnZj[;{.;ӉRw*j5drTF,GY#eT|MlgStp(k%PWHxWH#OZTMLbL]nijM;!FҾ9G:>G|m4P9O\lj`03c(.ye%-eY#?rV_%oڌ_.N,owk%U%S-+se-UIcVsZtT Eb9^awCl1l4v)륎/Mv=o35TU=%EqՖ e[e'yKPE4nY$Ȏk/vr[{cU)yXjJ)+ZXr#xSqS{6^nEk6EM6ʺ:G.rЙvpCξz͜ݽ۽mѺuR GTT$R8r1ɪN^<&!;'S;RԽޮrhL2.fJkI'3Ng@믗LGZ2[!F5S05s9DW*P20󿥞Sy:o3T[Q]omkkmYdG=UWBe@u'4}rgd-udQ%GȉW_ _&;]/0Uj[N=3[II,UeD=饙źr˪*tP9f ~Y,^iUMGcR_[-\M M:NGJE60󿭾Sc3M[wBxZU&2UywxICevc=]Q#UuWsD㦚j`=Ku鿛}jvdp=VգKcSE۩嬉hĉT{} InW۝$4 #)+!s#2gVwG1#r9,źێ1MF7YpȦt]IO["264}'jw0m7z5knպ^F\i\ܹUo9N#AMW[m0;}u?{*xO̎!ػ7ӶbL56Z`棤mE:5\sT!ivM]efݺt+}E$PEqXb E$`7W+]`ҟ(S$oj:>N6ÜcxOS|#) wIUT*>M}*y+F!0nUm۱[I5$nF$G#sdȘUUVU^!=Φb6g|2b,WT\^ԛtXkfsW[)F] mT> eLDZ,̍%n=9\r(CjFWV=^w M{ȫn:pS>Yd{FEUU TԾu)7o Xzs+'fx6[x&^gqOfv}Z3,Vm7s]"ܝ|j9y MoMwN6a=ˮ,O`mSȊIydGckխFEV 2 رE9m"eT0%J@yrUkf=QoP{1cvWWYcjd6**i卺ux,2n>w/VX1d6{[glQW2G{bIQQts|7SoVnE}m2\i3H裙X梣ƹȈh{Tu e{?XEj5{^h'sR i*⑼я{磴Vz%X& '؝"ۍ$Rj̑Y&VHֽ7GH׼cSelǧ6ǁPeOw2WԾJeAO,,1$r=9ŊCam&'Qݹ6BR\nxrQ:y]$z>}/T ?h}?tӇm}$6zJ2$:7ʬV"r/aktg=ϩ}<(-|_m֦X$O,&̪ʚ'X/S۵rEUFKrd̥m;(*Mcӷ}f]f `*夳UcQucYPT@Kܽ }0~}Hhsec|OlE#]dro0Ӫ\ y56\eBۦl.|ZxZ=·O?ƶNOݮb쯭Yu1WB mFj&-bIQ"Cq{Mc[dfv'AMvLFkύZ$EGs3Ψ?io˰m۫Z=s\ɢ#\dccڭUT% ~T?FKL:O2Ov0Ο nF_l%%}ϳQ=u[1܋=U$hr`{F-r.S6W\d剔QL;霍b=kV|9#`7[0ecx-jح#{ʈZ1++cr+yn-=/ɵص#7'\%L-SDŅ#gXW^QUaԅwS{KS_m|_V9'{;%# 9n:7t@CzqW;3cUCZjTݽ%Tәx#_1mz|ɺ!fT3 ̶mwxةnVI]lkuW!ݯgn\.e/<[3SUr:xjU;bwoi {f[Ege G?A 54m(5DBU\o"Y0_&`WΠe+F5Ri0}ɞWShE$Vz޹jrWyQvclGXލz#C"*/AL7)Ќmq]5]-i"l)zjױMs\ڊ˞Bi:R!̳2Kɪ*jʚy|{şzݼeuL!Lޭ|q9ɦA-yoU}{Tfn=eWwt?{vvF7TH'l3F?k9/ºOª݌2-uLZYugOq|̵N*%s9NTUU ϺH!)i>j}Ɨ]tUW~~MvWuۮq[[_Xm)$I TX9Uj_-]˵gW=Τm+BfmS[MΚ12eߡT>j_G4VDss5$kتy( _Խ2uy{3CYS$ķg i\UQtj"w3ytc?}[n=?O^ܾ {8v5/9[hXcmu:1~qD[?^sdݙ<ۚɹuvJhយkVȍ-֢"4."lRW}R _/r5+u$K9+{_&8`|[o]lLۍ̷S^jjΥ{9WNzl z9oSܿ]&xd]5ulh픐[k$mV)WΒ=ʆZ闥k5ٶJ꼯5\3 戕Uc(HbzsW7AU{N_^otFG JzyWL$qN|3HDtockN{\A`WL_w+iAifm¢u'X֬cFZPb]<ba7}$ cI{8_r1&j9yu]t8i:Eeꍽl^zl}mTsԲ8)*]U59NBqtM{߷'%nSem?Xڇ#m4.g5*">G*&j1X:g7ߝ؜ɬ ]-u;T:i۴u)2(TJe&K%k<ͯp,FhVZ2kUegH=m/vk**"M4NCu6Ŝlcmp,wicڊur*eED!O^}?T[#^A.YL2ړ?HVEs告gwmsR^lnNKlݜcnmmU"bMTɫ)cVƌ#ZF1;Utn8[mݽdvK7+}C텭JRu&Fȭw+vp ŊY26ê<ыy3\okcVԥSlMV679;\\*7Mb˺y[w6~o{V\Gu|k#$k]:9jRڍ؞Y6`׻x3wx}?wCLv+$CL)"C-es֣|u^TN!O`ꛨL{.xFnQk$MUQtseGxBe@n?~ mXN;[mʮ 5'^i+fmK:ҪNg5[3\ب z-/IXGMtˍڷ7ۨ%dHs5tR*3vw#v=msKsq˥SUG=u$>^DWr5Ew**z~l*/v|m L4ѵY\颠Lë.m хd=7mBRѫڐD湏QE;tKL[bx%ni.7zY4ȏDW7<ºE+׺z~]\ةruE>$E#XIʊۣt'}ѵn-NSgM-%lUIJ48u?vƱރt,Γ3w68a{/b[e2ETe4Pԫ]ڵн5;DM"[.C-&C:6NGNһ$DzHb8鋮Y_OUQde4=jjwS#_5\.mw 6:݊msEImDm6{H̵ꙺ>;*7^PNctuluګƾǶgbHRחNV ]z"fS)qmj&3TԲ=zY]"7TI#r"^#Ÿu~tݘ]xEx,iez:JPcQXsjG+mt셪ڝ򭽠WCϒ+j+Vos][M+D;_}ݬɽ7]+T = DxDWq8~RͧFˏتq_.5sd.DE[ԮQ"ثۍ,햕6{ =DC 5,m5D@=a~MmN r^?9~vszݝh!v(ϿkdtjK cejj"+F֪JӦzϸ{3IXֽ7t9r̚pI-^?<&+¢j +۲kg?o Ȇ}ʷFFU @5#R2DR%k=5OZW=w?ٿDyK yK Nhttp://www.globalsign.com/yX;H,]ą'c^) 2 0@P`p2( 0@P`p 0@P`p 0@P`p 0@P`p 0@P`p 0@P`p8XV~_HmH nH sH tH L`L Normal5$7$8$9DH$CJ_HmH sH tH P@P  Heading 1$<@&5CJKHOJQJJ@J  Heading 2$<@&56OJQJD@D  Heading 3$<@&OJQJ@@  Heading 4$@& 5B*ph88  Heading 5$@&5DA`D Default Paragraph FontVi@V  Table Normal :V 44 la (k (No List 0U@0 Hyperlink>*B*44 Header  !.)@. Page NumberR^@"R Normal (Web) ddB*CJOJQJph@V1@ FollowedHyperlink>*B* TBT inside-copy dd5$7$8$9DH$[$\$aJ@TR@ Block Text]^ a Z>body(Wq( CPStrong5$$ 2Gbyline** 2G storydate  6date4 @4 ;Footer  !$$ Mauthor.X@. l|Emphasis6]HH Z Balloon TextCJOJQJ^JaJNN ZBalloon Text CharCJOJQJ^JaJB'B HQComment ReferenceCJaJ88 "HQ Comment Text!CJ:!: !HQComment Text Char@j@ $HQComment Subject#5\F"AF #HQComment Subject Char5\vORvaquestionanswer %*$1$5$7$8$9DH$^CJOJQJ^JaJmHnHuVoqbV 6[StandardParagraph&CJOJQJ^JaJFB`rF (6[ Body Text'x5$7$8$9DH$aJ</< '6[Body Text CharCJaJPK![Content_Types].xmlj0Eжr(΢Iw},-j4 wP-t#bΙ{UTU^hd}㨫)*1P' ^W0)T9<l#$yi};~@(Hu* Dנz/0ǰ $ X3aZ,D0j~3߶b~i>3\`?/[G\!-Rk.sԻ..a濭?PK!֧6 _rels/.relsj0 }Q%v/C/}(h"O = C?hv=Ʌ%[xp{۵_Pѣ<1H0ORBdJE4b$q_6LR7`0̞O,En7Lib/SeеPK!kytheme/theme/themeManager.xml M @}w7c(EbˮCAǠҟ7՛K Y, e.|,H,lxɴIsQ}#Ր ֵ+!,^$j=GW)E+& 8PK!Ptheme/theme/theme1.xmlYOo6w toc'vuر-MniP@I}úama[إ4:lЯGRX^6؊>$ !)O^rC$y@/yH*񄴽)޵߻UDb`}"qۋJחX^)I`nEp)liV[]1M<OP6r=zgbIguSebORD۫qu gZo~ٺlAplxpT0+[}`jzAV2Fi@qv֬5\|ʜ̭NleXdsjcs7f W+Ն7`g ȘJj|h(KD- dXiJ؇(x$( :;˹! I_TS 1?E??ZBΪmU/?~xY'y5g&΋/ɋ>GMGeD3Vq%'#q$8K)fw9:ĵ x}rxwr:\TZaG*y8IjbRc|XŻǿI u3KGnD1NIBs RuK>V.EL+M2#'fi ~V vl{u8zH *:(W☕ ~JTe\O*tHGHY}KNP*ݾ˦TѼ9/#A7qZ$*c?qUnwN%Oi4 =3ڗP 1Pm \\9Mؓ2aD];Yt\[x]}Wr|]g- eW )6-rCSj id DЇAΜIqbJ#x꺃 6k#ASh&ʌt(Q%p%m&]caSl=X\P1Mh9MVdDAaVB[݈fJíP|8 քAV^f Hn- "d>znNJ ة>b&2vKyϼD:,AGm\nziÙ.uχYC6OMf3or$5NHT[XF64T,ќM0E)`#5XY`פ;%1U٥m;R>QD DcpU'&LE/pm%]8firS4d 7y\`JnίI R3U~7+׸#m qBiDi*L69mY&iHE=(K&N!V.KeLDĕ{D vEꦚdeNƟe(MN9ߜR6&3(a/DUz<{ˊYȳV)9Z[4^n5!J?Q3eBoCM m<.vpIYfZY_p[=al-Y}Nc͙ŋ4vfavl'SA8|*u{-ߟ0%M07%<ҍPK! ѐ'theme/theme/_rels/themeManager.xml.relsM 0wooӺ&݈Э5 6?$Q ,.aic21h:qm@RN;d`o7gK(M&$R(.1r'JЊT8V"AȻHu}|$b{P8g/]QAsم(#L[PK-![Content_Types].xmlPK-!֧6 +_rels/.relsPK-!kytheme/theme/themeManager.xmlPK-!Ptheme/theme/theme1.xmlPK-! ѐ' theme/theme/_rels/themeManager.xml.relsPK] j %%%(FI$C*.e3;8;O?TCGKxS_show|fM' p   E - @ x < S},=_L_q'Tμqrstuvwxyz{|}~? h { 0 119111*222@2@>@gCCCY,Z5ZQZZZƟXXXXXXXXX !(!!/X"$vDC32̉6nj@"$ ܜT걖mA ?k@Z(    |AXX?F  lRS.T`T.T`TISll#" `?B S  ?A; *}@{r|G{rG{rF{rH{r|H{rH{r>W?W?c?ffmmxnxn}}}}     CCa?m?m?ffmm|n|n}}}}  8*urn:schemas-microsoft-com:office:smarttagsCity9*urn:schemas-microsoft-com:office:smarttagsState9*urn:schemas-microsoft-com:office:smarttagsplaceB *urn:schemas-microsoft-com:office:smarttagscountry-region <   7?.<-1 ,0kv!  b.n.-0;011 3333x44O7V777::p?x?_DgDEEbFjFFFGGHHIIII:NDNOOP'P,P8PQQ4RBRlUxUZZeeff.g;gggTi_iiiiicknkllm#mGOyelɮӮT[űHSX_F9BO(b(}//n3p33355\8^8198999<<)?+?EGLGNNQQYSfSdgfgggmmmm35_cМUŨlq<>33333333333333333333333333333345JKLXX) ) l l $ $ D D ?#?#@#@#&&O(W(333333t44A;B;C;C;R;S;T;T;<<<<6L6LPPWW``WcWcfdsdeennToToqqwvxvwwiyiy||||j|==s~cQV;45JKLXX) ) l l $ $ D D ?#?#@#@#&&O(W(333333t44A;B;C;C;R;S;T;T;<<<<6L6LPPWW``WcWcfdsdeennToToqqwvxvwwiyiy||||j|==s~cQV;''=1 J@|6* *>~$n ~,7-j>qK:G&AILfM*>~$: [7[p]D)]7Tk]hcQc70gSuiqStt*h^`OJQJo(hHh^`OJQJ^Jo(hHohpp^p`OJQJo(hHh@ @ ^@ `OJQJo(hHh^`OJQJ^Jo(hHoh^`OJQJo(hHh^`OJQJo(hHh^`OJQJ^Jo(hHohPP^P`OJQJo(hH hh^h`OJQJo( ^`OJQJo(o pp^p`OJQJo( @ @ ^@ `OJQJo( ^`OJQJo(o ^`OJQJo( ^`OJQJo( ^`OJQJo(o PP^P`OJQJo( hh^h`OJQJo( ^`OJQJo(o pp^p`OJQJo( @ @ ^@ `OJQJo( ^`OJQJo(o ^`OJQJo( ^`OJQJo( ^`OJQJo(o PP^P`OJQJo(h h^h`hH.h 8^8`hH.h L^`LhH.h  ^ `hH.h  ^ `hH.h xL^x`LhH.h H^H`hH.h ^`hH.h L^`LhH.h^`OJQJo(hHh^`OJQJ^Jo(hHohpp^p`OJQJo(hHh@ @ ^@ `OJQJo(hHh^`OJQJ^Jo(hHoh^`OJQJo(hHh^`OJQJo(hHh^`OJQJ^Jo(hHohPP^P`OJQJo(hHh^`OJQJo(hHh^`OJQJ^Jo(hHohpp^p`OJQJo(hHh@ @ ^@ `OJQJo(hHh^`OJQJ^Jo(hHoh^`OJQJo(hHh^`OJQJo(hHh^`OJQJ^Jo(hHohPP^P`OJQJo(hH@P^`PB*OJQJo(phhH@^`OJQJ^Jo(hHo@pp^p`OJQJo(hH@@ @ ^@ `OJQJo(hH@^`OJQJ^Jo(hHo@^`OJQJo(hH@^`OJQJo(hH@^`OJQJ^Jo(hHo@PP^P`OJQJo(hH@hh^h`.^`OJQJo(hH ^`OJQJo(o pp^p`OJQJo( @ @ ^@ `OJQJo( ^`OJQJo(o ^`OJQJo( ^`OJQJo( ^`OJQJo(o PP^P`OJQJo(h^`OJQJo(hHh^`OJQJ^Jo(hHohpp^p`OJQJo(hHh@ @ ^@ `OJQJo(hHh^`OJQJ^Jo(hHoh^`OJQJo(hHh^`OJQJo(hHh^`OJQJ^Jo(hHohPP^P`OJQJo(hH hh^h`OJQJo(@xh^`.@xL^`L.@xh^`.@xhT^T`.@xL^`L.@xhp^p`.@xh ^ `.@x L^ `L. hh^h`OJQJo( ^`OJQJo(o pp^p`OJQJo( @ @ ^@ `OJQJo( ^`OJQJo(o ^`OJQJo( ^`OJQJo( ^`OJQJo(o PP^P`OJQJo(h^`OJQJo(hHhpp^p`OJQJ^Jo(hHoh P ^ `PB*OJQJo(phhHh^`OJQJo(hHh^`OJQJ^Jo(hHoh^`OJQJo(hHh^`OJQJo(hHhPP^P`OJQJ^Jo(hHoh  ^ `OJQJo(hHh ^`OJQJo(h ^`OJQJo(oh pp^p`OJQJo(h @ @ ^@ `OJQJo(h ^`OJQJo(oh ^`OJQJo(h ^`OJQJo(h ^`OJQJo(oh PP^P`OJQJo(^`OJQJo(hH ^`OJQJo(o pp^p`OJQJo( @ @ ^@ `OJQJo( ^`OJQJo(o ^`OJQJo( ^`OJQJo( ^`OJQJo(o PP^P`OJQJo(h^`OJQJo(hHh^`OJQJ^Jo(hHohpp^p`OJQJo(hHh@ @ ^@ `OJQJo(hHh^`OJQJ^Jo(hHoh^`OJQJo(hHh^`OJQJo(hHh^`OJQJ^Jo(hHohPP^P`OJQJo(hH hh^h`OJQJo( ^`OJQJo(o pp^p`OJQJo( @ @ ^@ `OJQJo( ^`OJQJo(o ^`OJQJo( ^`OJQJo( ^`OJQJo(o PP^P`OJQJo( hh^h`OJQJo(@xh^`.@xL^`L.@xh^`.@xhT^T`.@xL^`L.@xhp^p`.@xh ^ `.@x L^ `L.@xhh^h`.@xh^`.@xL^`L.@xh^`.@xhT^T`.@xL^`L.@xhp^p`.@xh ^ `.@x L^ `L.@xhh^h`.@xh^`.@xL^`L.@xh^`.@xhT^T`.@xL^`L.@xhp^p`.@xh ^ `.@x L^ `L.h^`OJQJo(hH@xh^`.@xL^`L.@xh^`.@xhT^T`.@xL^`L.@xhp^p`.@xh ^ `.@x L^ `L.@xhh^h`.@xh^`.@xL^`L.@xh^`.@xhT^T`.@xL^`L.@xhp^p`.@xh ^ `.@x L^ `L. h^h`o(hH. ^`o(hH. L^`Lo(hH. ^`o(hH. T^T`o(hH. L^`Lo(hH. p^p`o(hH.  ^ `o(hH.  L^ `Lo(hH.h 88^8`OJQJo(h pp^p`OJQJo(oh @ @ ^@ `OJQJo(h ^`OJQJo(h ^`OJQJo(oh ^`OJQJo(h ^`OJQJo(h PP^P`OJQJo(oh   ^ `OJQJo(h  ^ `OJQJo(hHh^`OJQJ^Jo(hHoh^`OJQJo(hHh| | ^| `OJQJo(hHhLL^L`OJQJ^Jo(hHoh^`OJQJo(hHh^`OJQJo(hHh^`OJQJ^Jo(hHoh^`OJQJo(hHQc)]8w0gfM-: [[j>ui=IJ]`h('=1 6* 1$n K:G>~,Tk]StG#@MV=P @h h^h`OJQJo(v                                    FM                                     FM                                                              ]{IN_nOoLY$:#RV-Jj9=EOQ'O@U SU=<)_WoLY9~u#f|lvtOQ'O9~u|l qshIuaX.]y$ug Ty L / a;u]xCPvTi!`=i=Z>=o>x7?P@A B#CEF^G_JNKaKLLT3W:ZWfWYFY6[i*[K~]D_q#a`^a4e,KfzfMgTg[k4fk=~kFlMl l)l]l`n~ o)pbq:{q+sWt -vpv@svOwYxVyl|E}p~AQQXTe EMX:f|8P;DKUh5eK>#72GPBfjfhw' its.U`Yl ;yV||&)V,h+7>.jq7HQ+;1t16T r[pP) IM]?^:~hew6=".Q=A/` AlrZ,0}c@v 9eV[\}6FMmRY;}r[P Gm6kCK.+/D*K@|iy*b7*<4g'plFG$]; KG@ ux@Unknown Kelly Loftus G*Ax Times New Roman5Symbol3. *Cx Arial7.@ Calibri7. [ @Verdana5. .[`)Tahoma?= *Cx Courier New;WingdingsA$BCambria Math"Ah\F öm öm!xx24dff 3qHP?lr2!xxEssentials of MIS, 9e$Chap 7: Securing Information SystemsBarbara Ellestadpeggyt                     Oh+'0  ( H T ` lxEssentials of MIS, 9e(Chap 7: Securing Information SystemsBarbara EllestadNormalpeggy2Microsoft Office Word@F#@w O@jh@jh ö՜.+,D՜.+,D hp  Toshibamf Essentials of MIS, 9e Titlet 8@ _PID_HLINKSA,6;8http://www.globalsign.com/13Chttp://www.techweb.com/encyclopedia/defineterm.jhtml?term=phishing&~http://www.techweb.com/encyclopedia/defineterm.jhtml;jsessionid=5LUPVAJRYOFBYQSNDBCSKHSCJUMEKJVN?term=virus&_requestid=14776854#http://www.annualcreditreport.com/e? http://www.ftc.gov/5 Ghttp://news.yahoo.com/s/ap/20080325/ap_on_hi_te/facebook_public_photos`qWhttp://www.computerworld.com/action/inform.do?command=search&searchTerms=Facebook+Inc. Zhttp://www.computerworld.com/action/article.do?command=viewArticleBasic&articleId=9069680\Vhttp://www.yahoo.com/blog  !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijklmnopqrstuvwxyz{|}~      !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijklmnopqrstuvwxyz{|}~      !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijklmnopqrstuvwxyz{|}~      !"#$%&'()*+,-./0123456789:;<=>?@ABCEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijklmnopqrstuvwxyz{|}~Root Entry FphhData _1TableD{WordDocument ISummaryInformation(DocumentSummaryInformation8MsoDataStore hhNQMQSGROQMN4RZ==2 hhItem  PropertiesUCompObj y   F'Microsoft Office Word 97-2003 Document MSWordDocWord.Document.89q