<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.15 (Ruby 3.3.1) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-linker-digital-emblem-01" category="info" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.21.0 -->
  <front>
    <title abbrev="PS-DE">Problem Statement for a Digital Emblem</title>
    <seriesInfo name="Internet-Draft" value="draft-linker-digital-emblem-01"/>
    <author fullname="Felix Linker">
      <organization>ETH Zurich</organization>
      <address>
        <email>flinker@inf.ethz.ch</email>
      </address>
    </author>
    <author fullname="David Basin">
      <organization>ETH Zurich</organization>
      <address>
        <email>flinker@inf.ethz.ch</email>
      </address>
    </author>
    <author fullname="Mauro Vignati">
      <organization>ICRC</organization>
      <address>
        <email>mvignati@icrc.org</email>
      </address>
    </author>
    <author fullname="Tommy Jensen">
      <organization>Microsoft</organization>
      <address>
        <email>tojens@microsoft.com</email>
      </address>
    </author>
    <date year="2024" month="June" day="12"/>
    <abstract>
      <?line 86?>

<t>In times of armed conflict, the protective emblems of the red cross, red crescent, and red crystal are used to mark <em>physical</em> assets.
This enables military units to identify assets as respected and protected under international humanitarian law.
This draft explores how one could apply the protective emblems to <em>digital</em>, network-connected infrastructure using a <em>digital emblem</em>, and defines the requirements of a digital emblem, emphasizing security requirements.</t>
      <t>Notably, a digital emblem has a unique combination of security requirements, namely, authentication, accountability, and a property that we call <em>covert inspection</em>.
Covert inspection means that those wishing to authenticate assets as protected must be able to do so without revealing that they may attack unprotected entities.</t>
    </abstract>
  </front>
  <middle>
    <?line 95?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>International Humanitarian Law (IHL) mandates that military units must not attack medical facilities, such as hospitals.
The emblems of the red cross, red crescent, and red crystal are used to mark <em>physical</em> infrastructure (e.g., by a red cross painted on a hospital's rooftop), thereby enabling military units to identify those assets as protected under IHL.
The International Committee of the Red Cross (ICRC) recently posed the question: How can one extend such markings to <em>digital</em> infrastructure such as servers and networks? <xref target="DE-REPORT"/></t>
      <t>The goal of a digital emblem is to prevent cyberattacks on humanitarian infrastructure.
Parties to armed conflicts are bound by IHL, and are thus required by law to respect the protective emblems.
Other actors may not be bound by IHL, but could still respect a digital emblem.
Either out of respect for the humanitarian cause or to avoid unwanted attention when attacking marked assets.
A digital emblem can only serve this purpose, though, if it meets a unique combination of requirements.</t>
      <ol spacing="normal" type="1"><li>
          <t>Digital emblems require authentication as assets must not be able to fake protection, for example, by transferring emblems from medical to military infrastructures.</t>
        </li>
        <li>
          <t>Protective emblems must be decentralized, i.e., there must be no central authorities that govern the use or distribution of digital emblems.
Under IHL, states themselves determine which parties and assets may display the emblem under their authority.</t>
        </li>
        <li>
          <t>Systems with a decentralized trust model are prone to misuse.
Therefore, a digital emblem must be designed so that parties can be held accountable whenever they mark unprotected infrastructure.
Protection under IHL stems from law, and laws must be enforceable to have an effect.</t>
        </li>
        <li>
          <t>Those wishing to authenticate assets must be able to verify protective emblems in a way that does not call attention to the fact that they are screening potential targets.
We call this property <em>covert inspection</em>.
This is analogous to looking at a physical emblem from a distance: A flag of a red cross does similarly not raise attention to the fact that its being looked at.</t>
        </li>
      </ol>
      <t>Work on the digital emblem dates back multiple years.
In 2020, the ICRC invited two research institutions, Johns Hopkins University Applied Physics Laboratory (APL) and the Centre for Cyber Trust (CECYT), a joint research centre between ETH Zurich and Bonn University, to develop technical proposals for a digital emblem.
These proposals were presented to and evaluated by a group of international experts at the invitation of the ICRC <xref target="DE-REPORT"/>.
We discuss the proposed designs in <xref target="proposals"/>.</t>
    </section>
    <section anchor="conventions-and-definitions">
      <name>Conventions and Definitions</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <?line -18?>

</section>
    <section anchor="the-problem">
      <name>The Problem</name>
      <section anchor="legal-and-historical-background">
        <name>Legal and Historical Background</name>
        <t>The Geneva Conventions and their <em>Additional Protocols</em> (APs) constitute the core of IHL and establish legal rules on the conduct of armed conflict.
These Conventions and Protocol establish the meaning and usage of protective emblems, namely, the red cross, crescent, and crystal.</t>
        <t>The emblems have a protective and an indicative function.
In its protective function, parties to conflict may apply an emblem to assets that exclusively undertake medical functions, such as vehicles, personnel, or buildings.
These emblems inform other parties that they must not be attacked.
In its indicative function, an emblem signals affiliation with the International Red Cross and Red Crescent Movement.</t>
        <t>Since 1949, the Geneva Conventions have been revised.
AP I contains additional regulations on how parties to conflict can communicate their status using technical means, like radar transponders and radio signals.
Recognizing that technology may progress rapidly, the amendment process for AP I is streamlined.
For example, this process could begin through expert consultations convened by the ICRC.</t>
      </section>
      <section anchor="problem-domain">
        <name>Problem Domain</name>
        <t>The concept of a digital emblem touches a variety of stakeholders.
First and foremost, there are <em>emblem issuers (EIs)</em>, groups that provide medical services or conduct humanitarian operations such as military forces or organizations like Doctors Without Borders.
As part of their activities, they may display the protective emblems on their <em>protected digital assets</em>, such as mobile devices (tablets, smartphones), servers (both virtual and dedicated), or an intranet.
Prior to commencing their operations, EIs must seek permission from competent <em>authorities</em>.
When they are given permission, EIs can apply digital emblems to their protected assets, which <em>present</em> them to three types of <em>agents</em>.</t>
        <t><em>Regular users</em> of an asset do not pay attention to the emblem, for example, when they visit a website.
<em>Verifiers</em> pay attention to the emblem and only wish to attack lawful (under IHL) targets.
They are typically part of an armed force engaged in a conflict.
We can assume that most verifiers (typically military units) will be associated with an authority (typically their nation state or an ally), and, hence, that such verifiers can obtain the authentic public keys of their affiliated authorities through secure, out-of-band channels.
Finally, we define <em>adversaries</em> as those agents that are willing to violate IHL and search to abuse digital emblems.
For example, they may seek to issue emblems to non-protected assets.</t>
      </section>
      <section anchor="reqs">
        <name>Requirements</name>
        <t>The digital emblem's requirements were adapted from the ICRC's report on digital emblems <xref target="DE-REPORT"/>.
However, whereas the report introduces requirements on a much higher, abstract level and without a detailed consideration of security, we present a comprehensive list of actionable, technical requirements.</t>
        <t>The purpose of a digital emblem is to prevent attacks on protected assets by informing other parties about their status under IHL.
(Note that IHL also permits the indicative use of an emblem, we subsume this case under the protective use of an emblem for clarity.)
The digital emblem's requirements are derived from two important insights.
(i) A digital emblem critically requires adoption by verifiers, which (by definition) intend to attack assets not protected under IHL.
(ii) A digital emblem should comply with existing IHL, which facilitates the diplomatic process of adopting a digital emblem.</t>
        <section anchor="covert-inspection">
          <name>Covert Inspection</name>
          <t>A digital emblem <bcp14>MUST NOT</bcp14> reveal who is inspecting it.
We call this requirement <em>covert inspection</em>.
If verifiers were to reveal that they are inspecting digital emblems, their targets (potentially unprotected) could use that knowledge to protect themselves against an imminent attack, and verifiers would therefore not inspect emblems.
In particular, covert inspection implies that emblem presentation must be <em>active</em>, i.e., verifiers will be sent emblems and need not query them explicitly.</t>
        </section>
        <section anchor="authentic">
          <name>Authentic</name>
          <t>Digital emblems <bcp14>MUST</bcp14> be <em>authentic</em>, i.e., a digital emblem only marks assets that are used to provide medical services or conduct humanitarian operations.
If it were not authentic, verifiers would risk that their lawful, i.e., unprotected, targets could avert attacks by displaying fraudulent emblems, and verifiers would again not inspect emblems.</t>
        </section>
        <section anchor="decentralized-trust-model">
          <name>Decentralized Trust Model</name>
          <t>Compliance with existing IHL implies that there <bcp14>MUST NOT</bcp14> be a fixed set of authorities that can regulate how a digital emblem is used, i.e., it must follow a <em>decentralized trust model</em>.</t>
        </section>
        <section anchor="accountable-display">
          <name>Accountable Display</name>
          <t>Systems with a decentralized trust model can suffer from misuse.
Should a digital emblem be codified in law, it is crucial that any unlawful display of digital emblems can be provably attributed to the respective parties such that they can be prosecuted.
Hence, a digital emblem <bcp14>MUST</bcp14> provide <em>accountability</em>.</t>
        </section>
        <section anchor="removable-verifiable-presence">
          <name>Removable &amp; Verifiable Presence</name>
          <t>A digital emblem should work just as the physical emblems.
Just as a flag with a red cross can be displayed and removed at any time, a digital emblem <bcp14>MUST</bcp14> be applicable to the widest possible range of use cases and digital technologies, and also be easily <em>removable</em>.
Additionally, agents <bcp14>MUST</bcp14> be able to <em>verify the presence</em> of digital emblems.
With physical emblems, unprotected assets will simply not show the red cross.
Likewise, in the digital domain, these assets will not present an invalid emblem, but rather no emblem, and verifiers must be able to determine when no emblem was shown to them.</t>
        </section>
      </section>
      <section anchor="use-case-scenarios">
        <name>Use-Case Scenarios</name>
        <t>In the following, we list a number of use cases that a digital emblem should cover.
These use cases were derived in collaboration with the ICRC and a broad range of international experts, including the medical sector, the information technology sector, the military sector, and cybersecurity experts.</t>
        <t>It may turn out that there cannot be a single design proposal that covers all use-cases.
Nevertheless, the number of ways in which a digital emblem can be distributed should be kept minimal.
The more interfaces supported by a digital emblem, the greater the burden on verifiers, who would need to check every interface to ensure that they are not attacking a protected asset.</t>
        <section anchor="personal-devices">
          <name>Personal Devices</name>
          <t>A digital emblem should apply to general purpose, personal computing devices such as laptops, smartphones, and tablets.
Typically, such devices have no stable IP address, but have a powerful operating system and support complex applications well.</t>
        </section>
        <section anchor="constrained-devices">
          <name>Constrained Devices</name>
          <t>A digital emblem should apply to network-connected devices that are constrained in computing power, bandwidth, or cannot be easily modified, for example, medical or IoT devices.
Typically, such devices are deployed in a fixed environment, however, due to power, hardware, or legal constraints, they cannot support complex applications, or their software might not be modifiable at all.</t>
        </section>
        <section anchor="servers">
          <name>Servers</name>
          <t>A digital emblem should apply to dedicated and virtual servers, e.g., web or database servers.
Such servers may or may not have a stable IP or a domain name associated with them.</t>
        </section>
        <section anchor="networks">
          <name>Networks</name>
          <t>A digital emblem should apply to networks that are controlled by one organization, e.g., the ICRC's internal network.
Typically, such networks have an IP range associated with them.
Each device connected to this network should fall into one of the categories above and could thus be marked individually.
However, marking entire networks should drastically ease the burden of deployment, verification, and distribution.</t>
        </section>
      </section>
      <section anchor="excluded-scenarios">
        <name>Excluded Scenarios</name>
        <t>Notably, a digital emblem cannot be applied to infrastructure that is used for both services worthy and unworthy of protection.
A digital emblem must always identify assets that only serve purposes that enjoy protection under IHL.</t>
      </section>
    </section>
    <section anchor="proposals">
      <name>Proposed Designs for a Digital Emblem</name>
      <t>Two designs were proposed to solve the problem of a digital emblem.
First, JHU APL proposed a DNS-based solution for a digital emblem <xref target="I-D.haberman-digital-emblem"/>.
Second, CECYT (a joint endeavour between ETH Zurich and Bonn University) proposed <em>An Authentic Digital EMblem (ADEM)</em>, which was initially described in an academic publication <xref target="ADEM"/>, but was also specified technically <xref target="ADEM-SPEC"/> and has openly accessible, working prototypes (<eref target="https://github.com/adem-wg/adem-proto">Go library and CLI</eref>, <eref target="https://github.com/adem-wg/adem-chrome">Browser extension</eref>).
We focus here on ADEM as it was selected by the ICRC as the most suitable proposal for a digital emblem given its scope of applying emblems to digital assets and using the existing physical emblems for labeling physical assets.</t>
      <t>ADEM was designed following the requirements laid out in this draft.
ADEM follows a decentralized trust model and utilizes existing infrastructure wherever possible, e.g., it provides accountability through the Certificate Transparency infrastructure <xref target="RFC6962"/>.
ADEM was designed to be distributed over many channels and as such is not bound to one mode of transportation.
The academic paper foresees distribution of digital emblems via TLS, DNS, and UDP.
Next to its prototype, ADEM's security was thoroughly evaluated and formal proofs of security are described in the academic publication.</t>
      <t>Once there is consensus on the scope of a digital emblem, the plan is to propose ADEM as a basis for designing a digital emblem.
Although ADEM has gone through several iterations in collaboration with the ICRC, it is expected that it will be refined by the IETF WG that adopts it to ensure industry interoperability with good protocol practices.
In particular, it must be investigated whether it fits the needs of all stakeholders of a digital emblem.</t>
    </section>
    <section anchor="considerations-of-potential-risks">
      <name>Considerations of Potential Risks</name>
      <t>Because digital emblems label digital infrastructure as legally protected, misuse of a digital emblem may
not always be automatically detectable. In this section, we discuss two examples of potential misuse and
how the <xref target="reqs"/> section aims ensure that this standard is utilized responsibly.</t>
      <t>First, a nation state could misuse a digital emblem to wrongfully protect infrastructure used to enforce
Internet censorship or shutdowns for its population. Second, technology vendors that provide online services
or resources might maliciously or accidentally apply digital emblems to not only IHL-protected assets but
their general infrastructure that hosts this and other services. In both cases, such misuse would abuse and
potentially undermine combatants' and resistance movements' respect for IHL only to label one's own
infrastructure, which even may actively harm human rights.</t>
      <t>In all cases where a digital emblem is deployed, it should be noted that verifying a digital emblem
<bcp14>MAY</bcp14> include more than verifying its presence and authenticity. Verifiers <bcp14>MAY</bcp14> also observe other behavior
of the emblem-bearing asset, applying heuristics to check whether its plausible that the asset displays a
digital emblem. Additionally, we point out that digital emblem's mechanism of providing authentication
additionally enables combatants to hold emblem-bearers accountable should misuse be detected.</t>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>The requirements "covert inspection", "authentic", and "accountable display" are all security requirements, i.e., one must consider powerful adversaries trying to break these requirements when evaluating a proposal for a digital emblem.
The original, academic paper proposing <em>ADEM: An Authentic Digital Emblem</em> formally verified ADEM's security, and any subsequent proposal should be rigorously analyzed as well.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This document has no IANA actions.</t>
    </section>
  </middle>
  <back>
    <references>
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="ADEM" target="https://dl.acm.org/doi/10.1145/3576915.3616578">
          <front>
            <title>ADEM: An Authentic Digital EMblem</title>
            <author initials="F." surname="Linker" fullname="Felix Linker">
              <organization>Department of Computer Science, ETH Zurich</organization>
            </author>
            <author initials="D." surname="Basin" fullname="David Basin">
              <organization>Department of Computer Science, ETH Zurich</organization>
            </author>
            <date year="2023" month="November"/>
          </front>
          <seriesInfo name="CCS '23" value="Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security"/>
        </reference>
        <reference anchor="ADEM-SPEC" target="https://adem-wg.github.io/adem-spec/draft-adem-wg-adem-core.html">
          <front>
            <title>An Authenticated Digital EMblem - Core Specification</title>
            <author initials="F." surname="Linker" fullname="Felix Linker">
              <organization>ETH Zurich</organization>
            </author>
            <author initials="D." surname="Jackson" fullname="Dennis Jackson">
              <organization>None</organization>
            </author>
            <author initials="D." surname="Basin" fullname="David Basin">
              <organization>ETH Zurich</organization>
            </author>
            <date year="2023" month="August"/>
          </front>
        </reference>
        <reference anchor="DE-REPORT" target="https://www.icrc.org/en/document/icrc-digital-emblems-report">
          <front>
            <title>Digitalizing the Red Cross, Red Crescent and Red Crystal Emblems</title>
            <author initials="T." surname="Rodenhäuser" fullname="Tilman Rodenhäuser">
              <organization>ICRC</organization>
            </author>
            <author initials="M." surname="Vignati" fullname="Mauro Vignati">
              <organization>ICRC</organization>
            </author>
            <author initials="L." surname="Maybee" fullname="Larry Maybee">
              <organization>Australian Red Cross</organization>
            </author>
            <author initials="H." surname="Johnston" fullname="Hollie Johnston">
              <organization>Australian Red Cross</organization>
            </author>
            <date year="2022" month="November"/>
          </front>
          <format type="PDF" target="https://www.icrc.org/en/download/file/253888/icrc_digitalizing_the_rcrc_emblem.pdf"/>
        </reference>
        <reference anchor="I-D.haberman-digital-emblem">
          <front>
            <title>Digital Emblems Indicating Protections Under International Law</title>
            <author fullname="Brian Haberman" initials="B." surname="Haberman">
              <organization>Johns Hopkins University Applied Physics Lab</organization>
            </author>
            <author fullname="Allison Mankin" initials="A." surname="Mankin">
              <organization>Packet Clearing House</organization>
            </author>
            <author fullname="Bill Woodcock" initials="B." surname="Woodcock">
              <organization>Packet Clearing House</organization>
            </author>
            <author fullname="Casey Deccio" initials="C." surname="Deccio">
              <organization>Brigham Young University</organization>
            </author>
            <author fullname="Antonio DeSimone" initials="A." surname="DeSimone">
              <organization>Johns Hopkins University Applied Physics Lab</organization>
            </author>
            <date day="29" month="March" year="2024"/>
            <abstract>
              <t>   International law defines a number of emblems, such as the blue
   helmets of United Nations peacekeeping forces, the blue and white
   shield of UNESCO, and the Red Cross of the International Committee of
   the Red Cross, as indicative of special protections under the Geneva
   Conventions.  Similar protections attach to journalists who wear
   "Press" protective emblems on the battlefield, under Article 79 of
   Protocol I of the Geneva Conventions and Resolution 2222 of the
   United Nations Security Council.  The emblems of national governments
   and inter-governmental organizations protect diplomatic pouches,
   couriers, and envoys under the Vienna Convention on Diplomatic
   Relations.  Other marks enjoy protections against mis-use under the
   Paris Convention, the Madrid Protocol, and the Trade-Related Aspects
   of Intellectual Property Rights.

   Such physical emblems have a number of weaknesses (e.g., no real-time
   evaluation of their authenticity) and do not translate to the digital
   realm.  This document describes a digital emblem which addresses the
   shortcomings of the physical emblems and makes possible the
   indication of protections of digital assets under international law.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-haberman-digital-emblem-00"/>
        </reference>
        <reference anchor="RFC6962">
          <front>
            <title>Certificate Transparency</title>
            <author fullname="B. Laurie" initials="B." surname="Laurie"/>
            <author fullname="A. Langley" initials="A." surname="Langley"/>
            <author fullname="E. Kasper" initials="E." surname="Kasper"/>
            <date month="June" year="2013"/>
            <abstract>
              <t>This document describes an experimental protocol for publicly logging the existence of Transport Layer Security (TLS) certificates as they are issued or observed, in a manner that allows anyone to audit certificate authority (CA) activity and notice the issuance of suspect certificates as well as to audit the certificate logs themselves. The intent is that eventually clients would refuse to honor certificates that do not appear in a log, effectively forcing CAs to add all issued certificates to the logs.</t>
              <t>Logs are network services that implement the protocol operations for submissions and queries that are defined in this document.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6962"/>
          <seriesInfo name="DOI" value="10.17487/RFC6962"/>
        </reference>
      </references>
    </references>
    <?line 301?>

<section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>Parts of this draft are based on the initial academic publication describing the proposal <em>ADEM: An Authentic Digital EMblem</em> <xref target="ADEM"/>.
Initial work on this project was funded by the Werner Siemens-Stiftung (WSS).
We thank the WSS for their generous support.</t>
    </section>
  </back>
  <!-- ##markdown-source:
H4sIAAAAAAAAA7Vc23IbR5J976+opSPWJAKATMkXmTE7HoikLDpIiUtQo/BO
TEw0ugtAWY0uuKsbEMzQv+zDfsnuj+3JzKq+AdTK4Vk9mECjuy5ZmSdPXtqj
0SgqTZnpM3V0W9hZpldqWsalXum8VHNbqFhdmIUp40xdrujnoyiezQq9oQem
o4vLoyjB7Qtb7M6Uyec2ilKb5PEKI6ZFPC9Hmcnf62KUyigjzaOMvjqNXDVb
GeeMzcvdGrdfXd6/VOoLFWfOYnSTp3qt8Z+8PBqqI52a0hYmzujL1eQF/mB1
R1d39y+PorxazXRxFqVYylmU2Nzp3FXuTJVFpSOs9VmEcQsdn6nJ3eUEX7a2
eL8obLU+U/cvLqL3eocr6Vm00XmFIaK4KpcWI6pRpPBvXmWZbOqlzswHdc2b
4p9ssYhz81tcYiNn6vL+lfqPqjDJkn/Uq9hkZ2ouQvgLBDTW5fK3Mf3cH/ki
3phUvYidyf+5A9/EVWHVX80ix1gHhr46vztvD7rayK1/MUmRjHHv/pD3drXa
qZ80CfrAiDd40jo7L9vDlvYX3P+XVfhtnNhVFOW2WOGpDQmd9Kf+hgcnF5c3
/AH/yrhY6PJMLcty7c6ePEmzcZysaHVPUmuenH41Pj39+psnz7757tvvT78Z
P/v29NtvvnseHvYqzgOqSa4mOF4olkka7b4R7ZYH6uMP/0bNR/x7RBXCPywK
x6nXcVGyHdm5OrerdVXqQk0To/NED/sH+ugsfbX4Y5OwhajXdqPJYtTTr54+
8784XRjt6Aha2z4/n6ovnz47UwCHRMMG84WjmSA9flZNzm/U9OrH6eQcs+dz
XdC8yubNWuI8pS+rKjcJq4dTU51gTeUunPFoent5/thBxyngYrsY45iW1Wxs
rFxxa508EYTxd8jfxBZ6vCxXWffo22cOEaS9c1cjrLHQaopRzdwv9J+nC599
1jrPjVM/xcl7Zw8c92ub6z+gLY9ow9PnkM2icmWtDheXo7vL2zd3948dyna7
HQd0eKJzmGBSkRY+oYs9rHejQq9tUfZs0R+A+Q06xfp0h1M5BzS4of+oXUKK
TQokF3au8UPud5nqvclWca7uLNzJ8n/+q3KHTqnGwUeH2UfS3znAdVwUOwyz
m2m9//wEZ1BAJLTSIIxPj/fKZpnR6ie7zF15SGM+MeQ+FDz1vwgKt0R6e/Hy
U2e/zTMbp0/mJtNPnn7z7Pnz56wH/0hbR/wPHPE/CroqWjFep/MoikajkYpn
tMakjKKrHOqx0gwxcbHCguHL4eOScsgqsi5sqRPyD8rrVgCjgu4V5ZGPojxD
1h65ItoDFqBw/CnckVrFxXs1WC93DhafDVTsnC7dOLpfwgh1HmMGp1YmwyZw
agCw0tFjhjiJme/8/fiDGQiPCFdoPr9MfKvAXwrwIgBhzpiCFSwrqCINSYeS
xVs/H2OZ0h/WGYDIqaXdAkY1BFBlGHW9znaPiQBLGnhRD4Yq1yWRGwBhnssi
gOlFDBFXSVnx7sni4voZP85AZJXquckxvwj118oUzAXlSFT3kSH+rpfAGrZh
51G989g4il7bEpLcDfceV3gUFyHXXyva6GpmREg018HRhqz2PFYD5ngA3xMI
KsdEdFo72UpMwlrroiTJxaXaYpI4y9Qggc4XJeTCh4bnB+PovH9NrXScO3kS
COO02hq3ZLCy7el1Sw2ag18RnM7wGzZKD6RWOYsRMFJVYk8bDbtg4OPh9Q7K
CIUqS0A/JNIMRLOUcMxjsZWVSdNMR2CwV3lZ2LTitZLltFXsVVvFruOtOr56
dX2CKXIyer+pnmLzinNbhkXA+sgq1DxO6EYsYahclSxpnxDHmg6SbeX/xxZ7
Snusx4vxUM0go2Z8tY7JtFLiG3G9qC9hjhb80q5PGDUKjafYmkngnzBnOeVD
pylmDBnKfrvCJnJjylLrsP8aaCF2eIQTLJj2DwNeW94t7oHGO+HKr2DoCY6J
jF1/KBHxiJhJIEy32ubdF0s4EPgzqK9jCXsAcD+oh4fakX/8GPHSFxYrPmDK
yvBEa9JM+NwEDqoQRXAk3Q5mddcwjm5BQY3m57ug7fiEZzDMlE4O8vOGiasg
cy7YNv8KJKQRPJI+gnXj6A2dKMwdwaBjmyGVnfVnmcHIBDkhZZh8GLW/7XF0
aXhAskqIJdxHkS+toLPvJIayUtRJG91YQ3qxjVkBISpSIkhqC1zwJsTqhlOk
371nmfTFLicP1eATxJw4h3VVkKKQ8tpqsRwqM1cG9qpZLx/Byx7ono5rhhus
09/Rg07SHq/yNQK0cGsev2/OgYCWJKM/xKt1ptkc4blzB95f0G7DVPPCrmoA
IeMORtdVHSz06ZhCi75HC+iZsuEQf/lNp5DDWI+9Sde35Fb5ezwTNKKLhHAL
wvScD9KfXGowuYF2eKl1TwPreRssHWBXeqzEDzrb4GOqYfcruEecMki0WnvF
Z532MoRGYpJ1Fou79scsAIILpqiXuRtHz8ZqCiikLZNrIPVs75jSF9jlCqxV
wBIHkWsRqMOOGI0KjSPRB7xrI0QHworR4IBYLGHZpHv4famJYAT/mWlWYcBA
EfxS0fVIe+Zfa0eDk0o2xXoAwxazx4fmaDXF+okOeraMcfxYj57PMdY4+nqs
7j/H6fb9LJZNUH6AJRnyEdvYc4HUQgCk68wIGvMtLR8bnF7Z8s0kewc/pnNa
ytry3aTaHBZBbd55aiH2G1jHQaLBZM+Q0sSZXdiKcTOzluEiJogKTjAcJEsx
Zt2NEV2D1Kt5Fi8ExhtnyFtyBrYWF5ngYhEb8miP745c4EzTzLQCBjKAxzu4
D0J9urenVMIfZkwQqqw0gAG103EBGYC8I4b4Spg6OT7se2NIY+CPCFlxG4wG
wgCjYQsEQeDIBT5wje079TY35MaI9k3AeA2evWVhOLCYmYVHsgCR48ktyAxp
FM10TvaiGZfOyWupezaa4/PL85/vT8gufrFgCc0CEnlgBjeJA20FxTzkC9Dm
1jqGTN5gDZldK6jUMueToSO2DgTI50j7XgV26XTrrq1m68VFdhekzJhLb+Ks
4mwE8xrOR9KpduMFhARQIqdEGUWoNezXsu74elZI6EtSORc8qXAPAQO2hoeH
en30BCjluc03oimCaRcUCxj+LuzhPWyB8qROHd28nd5TKpb+qtdv+PPd5b+/
vbq7vKDP01eT6+v6Q+TvmL568/b6ovnUPHn+5ubm8vWFPIyrqnMpOrqZ/Hwk
MHL05vb+6s3ryfUR7YItLqQfhFlYAgSWISTO3tlF2HcC4Gf4Ui/Ob//7P0+/
hgT+5e7l+dPT0+8/fvRfnp9+9zW+EATKbOyc5StBQYRIDGrEaAJ7T2LhwUMm
YYjZQJU0gWI0+BtJ5u9n6k+zZH369Z/9Bdpw52KQWeciy2z/yt7DIsQDlw5M
U0uzc70n6e56Jz93vge5ty7+6YeM3OHo9PkPf45IhUhLfCEBX79Q13pBnhmC
fAX4gtsj63kB+CBlz1NRqx/J38R76ifucjBJU+NNgVyNTWzmBgQC7oSYpqCJ
ZjWn5B9ZBXkgNjBHHg0eRGW8jqKiiN4jG56l8Gk/1xDMt7+eMHtrWBqH4kTG
btxSuXjBK9h3QE3s2ouRuvGRj43GUSeyEvfYHpU5B3HxlIkcrsyrnH0MIzEB
e+vu8Nuwdv6wkrBfCT05w0AeWICeIEpcLDsK/SHJKoehsp14+ZKIYR0j+uFb
IeJGgyJlFDQCvRzlIjKu2Mwqk3EaOUi58c+UdlKW6Xi9yiY8bpNTptc6rXd6
QArD1l4I8giF4/kcRFSwk/lWuRfMNbFbk3b0ecgbypThA45maijLffr919/L
aR5QYD6xGTkYhFTwwljs5FZdkdDLmHxd3Kh1oRdV5nPjFGwhIjx0TMTXkjqT
rr19EE0FiZCsTuOhOHsxVJnBMRVxCshipr62dHiyO1w2NghnHN3pxC7ykI8l
udNgFiRFkhNQpwVkgUACoJcGRYZO5ylj75pKBE48Im8VwAyaqOMVYQT2/7Id
OgSmxI9IqDbTCwb0gqIe7/bYwkE0vHQSlrA4zOD6xgw0oXp5YVcQr1gP7k70
ujwY75YWikrcXW0Q3WkwDko6kVYvbUYiwnpN4ST9TAx7ZV0Zgg9yM4M6cHYV
SfT48sqdDIbixb3mYn8bkzZ2QkGeSQiCihp+OiEmEUe/1WBIdezEfJkfbRfb
nBzxhZWI+J3PML2Al+ZNTBzrkucKhkNns/H5nDrx1A5ZDiVZ8wDGTRgQ5Cko
MWgsf2VnJqOwQ7Z6zEEF5e4cQolyvUQI48DLQsrieAaTVxtTlJX3FClLC3Oc
MGIwypHy6pKCDSMBOBmCzhNfPMDSGtENFY5CAMNp/Z4AyBeahUrj0bUmSqwG
rZAR1Pwdxe414V9AAnnrYRmWjFCwshc7enKNlTQyEtkMfbg48ARwwDGl3I+Y
QlH5m5NnAzgPhO8Dog93jAkFBa4F3B2pcC7jUS6RgHAtCcMutQ+J2U6Yvq33
BSQyFGJs9QwfwFMGf6WAyfAcnxiwRYXY7dmQJURMN68ydVxHfidNUHQfJIkN
kvpTAsyrIu2FfS4rNYLBBbaeSozWuGGOqnjXYHc+aQkrlCDPsPI0Q3cTeydY
KPjZjANFmxhm2RJj500E3n5ezs4nVDj298pHv56wcx6C3HFZlZfC+t4shTM5
M8J2wcW6wryuwBUS4s6uZYXeFZGSdNIWAn6c/cZEMOWRnY9mzAyWMXlRBqac
FjWkjLbk66E6KVkTQZmjQkZIZrJCyXrpJEgoPpreGJvRJgNX8tERHe2MsiV7
qZEefHvkYAujLCrBYNsWcpuP+pYgUH3XLis8fFHoX53PTnbn/NJ1KxAcRMGV
rWlAtuTgAvhOqjESUvXtshcZvbJbSm6wVcA5hUoHP218Tl33Zub88orOe2kW
S3o41KxALDdaYCsk9ymJAzXIhFE64H+xV9Xgo/NwwCq/whfoCzEsALoTI2Ei
Q+g5bDn2XqKPxOYThp+R122ldPtnQy5VOBgpSJeGIfauyh7faFLix69t6c2T
lSlzVmCzdD5irdlZ5VeZ10C1pST2zBu4ITPCLXW6rO2M+s8yxiXASEqlnXyG
/pABYFyMFdRnC71d0cnHOWdpcLgk1GNzovYztWSiAhV+VOJwds1HC9nVSBDg
/hgX0zqCPuGINE9b2Onlzlh+qNRwbA6tA1EmkSVSGYbjkqgSNIZOjfOWMrsv
24QUJkZZZ5Z6a5KadZEweQNcDuynMGCplBHgBNZVncCK9lPYIaz1VS3MT2hQ
J70wuCl7GbLWsRxOkl3NW8jKds+lAR6/m5ZrTdMz/KFXWO+P1HGdt+MYphb5
iaefpF889vvcbmG9Cy2Ww7e108Dxggh8ycRkReng2rAkhGutnAcuQ5KWj9ov
uMFVxDBsZwn5e4SDe4VIqGhWB0Ne6B47BFhCEnTA3E4PQqa8tRDvDBlvAjBK
sQg6R8v6FSR2J8SEatAmMWW281pQd85EUb+owIfPU4d76tn3oIj5A6WTXSe0
bFcB/wBhZqUxpWgL1zHDioZ7J1IY977WI6iIsJiw8JZuDGvt8XV4PpuAorOa
OJP6zYu4SqusJeHD6sDqc1gVWNoXnRKAZDNvqAQQRdRURb0cid43/K6aSJxS
mybxIDU3H6gKoMW59IslxF98IKo5BD3kSuicgpioJEVrm9ss49sHjxYvBkGR
WlWGC5EcgunPrYDQCl01nwMfpcDkiyBTQcS99c4oAkxJ9swsuQ6BRZOTKarE
BCiJc4IDT2RDILRfGwrlElJR6mcgLeBSkmiusAixWTir4DmZJDaI1YxBTKCk
qPiVUMq91fPZBXsYdPsbgjzvEJVuWJr/qoTI85dbBodEHwBr7z2oQKx+IdF6
AtSrOUAXf/K/xlJs8KfTlBv8VrzAfOcLhckbLiOwWKmZ57GtkUpSjj8JpRta
xhabxbRgM87QZUR9kk8jcCZqIKgVxqszFBzNckqMyAeVl2JncEaDIkgIImsS
idxBItS4XotfxcBXkIR8iBwHB0uFFGrvya2DHgHmGH2dYYdNdk+J4m4WcBxd
I4pHbAVxmW7hJeWEBjuzpjuBRxTi4DkkBckbGE1aMyuqgQMbicfltr7aRaS9
NpVWhVPnzXNqW+e35aSEIKi3To/OibFNYbRAZOukiYuKTAwLACfmeMxpYyWN
2t0DFSN8lOZgsSFV2DzDIB+4nKG0WJZJgaib26PKiLQCzQobp40+HSyxkOyT
rEpDR2LjhSi5MvRk1vcoU4jcJMjat9SRaLjI0RvVpuqmJj8hhHgl6deyKnIl
JLtGb1hYSHgqyu5loZZbF5Y8clvp/YBKQEIjltA4ek1RDgbKtBMq1BL+Nt5x
CUio4p7sG9OuEc4fx4xqQGvqHcrNirLUxLpXtvD1FpBOxrw1cepQ1ur3jNFS
Foi8Sk/xZ1WRauqC6FJo690lMxRK+Cw1ODNtatdMRj9Qq3+he7SwaWQSdtuz
SY+ft5yaxtouJFn1OGD6BjyrgBqamg3qJo11GCPhjmcmoj71FTJiGUJWu+5m
wEQrfG4Mcgx5CJ9HC0NwGhlm6MRpXt1S3rjgIyX7DnUBxLQFuS9Ph6gbj72q
RPZyHhIy6A8BdiV7uNVZVpP9nIJaStb+DoHs9xuGtdfsLmkNzMYaBMXrxk6w
SiB/ueR8X6P2HsRX3on3slrBOnHtyt6HWR8XpYR/iIJ2IdMkhEjnG1PYfMUl
mGXIDqSV0H9Z4TIu0m3MGZnC15LqTZUhkeoX/ilx8/M+jrbzkoaELSHqDKUN
2SufNQmvPpupZEs/4zzq7KlAvc+r+mzrUEkf3VbPuB0mhloRfPufwaVIYiE1
S8CEu0KXlVe2RhWl9M3+iYtbe7m22lF8oV77rrTP16iuApUFIF4ghXpg2inw
sKlWNsjDexbG2teKepLQeYL9iHc4vInLuFYl1ag6O0MQSj9a2MqcsBhrsLJW
KdP796R8PsWX8BIfIVaOT1+6xShhAtpX0XJbCSvfEcgtoQRxYQd+0pS6cnyG
QsdOd8B17lVftFyAtu6dZUbVNEaJa7+kih+Uqe3aH2/lbfkq37hBOcFus6J0
nEgQwabMmf86xMNmyuVOyqi5/9KqpNK69lSH+UuciT/rtWXzdK3eOo/YIY7O
f7G71uDtxEvE5SRpmLjwDROH3oVTD180LRRRdL+1dX+Fb/jwg5TU/ZttdEhp
STi8n63zNaeh+unVWzW5vW5GwNSvpyOyVerjyqSB7VDviXp4+OFqdDFexvD1
CJR7L2NQBnSqKZQeKu6QUcehQYbetYs3tio+szXmpFnd4BOvVKljesWHKmPC
NohJck6MFbXTl0HJ9oTe4qmz5sKzHh5oiI8fxefRAEzznbysQ/IN2VGMKDfz
K0UfP/K6qc0cjpE0AWGUltBiyDEQOyEq60sN5vhvP1pQ1VlB7I1fXLq++vtx
ePHBv4EEXA8vJclfHuBkqP72orBb6Jq08VLJ6P9+NlkiktUnJ5wgm9sEOMDc
D7umbRB7MLJlByaXlN3SZ4jeuCriKiPIXLPDg/ohZS3KzboEUmE1JORt92+S
G+mU93xzQyDGdd6hH/7wlGDiOuv8Wmf/eU+0m7opsQ4T1N4bB1mMaIY4cd3m
Q69IjGUQec59umWSFl0a+sE1a+6hEpcBqNsxBJ3BnZi6fut6rxfUZRrpP0Ok
P5eK/D2X2GN6Ca7f60p2effy/Nvvv31KNrgvCGlbanNuovXUs7+rSz++01Q8
mJHUsTQ+e1dD+2Z/I7X+QhKEQtMb04rXlEKh10w0dbV+uicWFCJW99fTISGQ
OIu3F7cUX3woGeR9pwmb0JC19kvXvL6xlVoUy4scU93y5uvqK+mms3PXeetD
yFoLG8rODhpwgFK9oXyYhEyGWwTk7d/Q59Oo+cFQZJ1R7OyrJIxnteUhagQD
FaWWczqcKp9k0qktDxLcLLhPty7mbThkMGVd3P90yBrSVBQlCs2QXs06jVtw
0a+BAnpz+t2Pni9RSp9Ro4mNQCjoPTAfOHGQ4DWZ511YKy8tcXfTmupaQqV7
qemQ8eP2ug29wLAQmrTUnGbA7/NQ9KGwTUoMlPto9VUc9nvSfdgUy/i227rR
9s44oo4vtPTg91WUEae+2jM8CsCIsWc71crrSvLwYMkMfDfi+FF4xYyLuVI7
8T6LBiGoHasrD00u9MdvW42X4AM+WuHtNH3DfnKYQBRSQQ8PXAf9GEZSsVm5
XmzLDTX0Dk+RMo8SaEs570jCm3HG3lOIuFvLFqIZJt7vhlFbxEALesO7FtP+
i2MCU751279zpEvqqHW2cEuzppDALauS3gkUu2F4sGvf3zRWgXy0cifwRyn1
rnRaZkDcKA0V2GGEobBNsJOE38mjkAnQYRJjK5dxmAKMZgrIZ/RoiwYdLJNC
ML29+jTxi0jCsxDnH+KwS7hbJ+fBfRGs/GGlrBPMbDkR48MNL3hfAZiF0++W
pFKfe6NXO2KqSbovfVbV+d5vtfJNaPil/a4K5f95V9RLzsYAAAIM4xii7g4C
DaN6sDT+ccIajyLGXUlxRRW+EEoAIG2unHST3qcDZYEQVjNENKkiyDqAl2RV
D8FndDP52efdfCoJD+StB8TBSCZWHGBgmlT4VXUDi6KBmBjamTB+OZiZRohn
bBH5OMz/HyhmOuZ3Vvjkhw0HWmp4IAqkXJN1agDOkb+oJDkdMk6hLUcy4dCJ
qIduqpt5ptI/M+4637dXt15pcvnGrXwEBJPgtXZe3Yni1rD1+6qN8vB7FQDd
9o45UdiqwvjD8urJb4uIRTAkhxf1e9gsXQcdrna0V7akPu56vaF1uz21l9cR
+3r2Eodf+ZRqE7Mbcj6hp6JJerVaX0B8dr6/ZVbo+L3PmnfbSCiz7XlInRx8
nDALeULcvqCum2GfRsmzNM7gU/93CXnF1hOerO4WSPt8yVcxwPmoKwLL9p2V
sr7GtLAc4lSOe3bjbPcbY1idzVNXk9eTA6fW7pUnnpJbuVNaTcji+S1Ter+D
RpkkoRbOooseziSHrNN/O5rD1PQRwl56/c93NtWvMfN7fxysehLmI77D8Z0n
eiEIqLf7SYneiERDbEhkRabY1m+vSIfpLwSSREPnhLA1aXpHvqtQU0Nq4UZT
kPiywgqO302nEo4RDr2Xe6fT8EpgcA304o7P9I2j/wWnZchyR0cAAA==

-->

</rfc>
