From 84f0700c2ea23a190f5ab9fce821368823f79bd6 Mon Sep 17 00:00:00 2001 From: Stephen Campbell Date: Thu, 21 Nov 2024 11:50:30 -0500 Subject: [PATCH] Corrected columns for urls sheet, added back asset into technique names, and tidied up mapping of existing incidents to amended techniques --- DISARM_MASTER_DATA/DISARM_DATA_MASTER.xlsx | Bin 1334695 -> 1298036 bytes .../DISARM_FRAMEWORKS_MASTER.xlsx | Bin 1330744 -> 993550 bytes .../disarm_red_framework_clickable.html | 148 +++++++++--------- generated_pages/disarm_red_framework.md | 74 ++++----- generated_pages/incidents/I00002.md | 3 - generated_pages/incidents/I00005.md | 5 - generated_pages/incidents/I00006.md | 3 - generated_pages/incidents/I00007.md | 1 - generated_pages/incidents/I00009.md | 1 - generated_pages/incidents/I00010.md | 4 - generated_pages/incidents/I00015.md | 2 - generated_pages/incidents/I00017.md | 7 - generated_pages/incidents/I00029.md | 3 - generated_pages/incidents/I00032.md | 4 - generated_pages/incidents/I00033.md | 4 - generated_pages/incidents/I00034.md | 3 - generated_pages/incidents/I00044.md | 3 - generated_pages/incidents/I00047.md | 2 - generated_pages/incidents/I00049.md | 2 - generated_pages/incidents/I00050.md | 2 - generated_pages/incidents/I00051.md | 2 - generated_pages/incidents/I00053.md | 3 - generated_pages/incidents/I00056.md | 2 - generated_pages/incidents/I00063.md | 2 - generated_pages/incidents/I00064.md | 5 +- generated_pages/incidents/I00065.md | 2 +- generated_pages/incidents/I00066.md | 2 +- generated_pages/incidents/I00068.md | 5 +- generated_pages/incidents/I00071.md | 8 +- generated_pages/incidents/I00072.md | 8 +- generated_pages/incidents/I00074.md | 2 +- generated_pages/incidents/I00084.md | 1 + generated_pages/incidents/I00089.md | 1 + generated_pages/incidents/I00093.md | 6 +- generated_pages/incidents/I00096.md | 18 ++- generated_pages/incidents/I00097.md | 1 + generated_pages/incidents/I00098.md | 7 +- generated_pages/incidents/I00099.md | 9 +- generated_pages/incidents/I00100.md | 1 + generated_pages/incidents/I00101.md | 9 +- generated_pages/incidents/I00102.md | 21 +-- generated_pages/incidents/I00103.md | 9 +- generated_pages/incidents/I00104.md | 3 +- generated_pages/incidents/I00105.md | 15 +- generated_pages/incidents/I00106.md | 13 +- generated_pages/incidents/I00107.md | 1 + generated_pages/incidents/I00108.md | 17 +- generated_pages/incidents/I00109.md | 33 ++-- generated_pages/incidents/I00110.md | 19 +-- generated_pages/incidents/I00111.md | 15 +- generated_pages/incidents/I00112.md | 7 +- generated_pages/incidents/I00113.md | 21 +-- generated_pages/incidents/I00114.md | 13 +- generated_pages/incidents/I00115.md | 5 +- generated_pages/incidents/I00116.md | 17 +- generated_pages/incidents/I00117.md | 1 + generated_pages/incidents/I00118.md | 13 +- generated_pages/incidents/I00119.md | 17 +- generated_pages/incidents/I00120.md | 11 +- generated_pages/incidents/I00121.md | 7 +- generated_pages/incidents/I00122.md | 1 + generated_pages/incidents/I00123.md | 1 + generated_pages/incidents/I00124.md | 1 + generated_pages/incidents/I00125.md | 12 +- generated_pages/incidents/I00126.md | 15 +- generated_pages/incidents/I00127.md | 1 + generated_pages/incidents/I00128.md | 13 +- generated_pages/incidents/I00129.md | 14 +- generated_pages/tactics/TA06.md | 54 +++---- generated_pages/tactics/TA07.md | 20 +-- generated_pages/techniques/T0002.md | 2 - generated_pages/techniques/T0010.md | 11 -- generated_pages/techniques/T0015.md | 1 - generated_pages/techniques/T0016.md | 1 - generated_pages/techniques/T0017.md | 3 +- generated_pages/techniques/T0018.md | 3 - generated_pages/techniques/T0020.md | 4 - generated_pages/techniques/T0022.md | 1 - generated_pages/techniques/T0023.md | 2 - generated_pages/techniques/T0029.md | 2 - generated_pages/techniques/T0039.md | 3 - generated_pages/techniques/T0040.md | 2 - generated_pages/techniques/T0044.md | 1 - generated_pages/techniques/T0045.md | 1 - generated_pages/techniques/T0046.md | 12 -- generated_pages/techniques/T0047.md | 1 - generated_pages/techniques/T0048.md | 1 - generated_pages/techniques/T0049.md | 2 - generated_pages/techniques/T0057.md | 4 - generated_pages/techniques/T0061.md | 2 +- generated_pages/techniques/T0068.md | 2 +- generated_pages/techniques/T0084.004.md | 2 +- generated_pages/techniques/T0085.004.md | 4 +- generated_pages/techniques/T0085.005.md | 2 +- generated_pages/techniques/T0085.md | 2 +- generated_pages/techniques/T0086.002.md | 4 +- generated_pages/techniques/T0087.001.md | 2 +- generated_pages/techniques/T0087.md | 6 +- generated_pages/techniques/T0088.001.md | 4 +- generated_pages/techniques/T0088.md | 2 +- generated_pages/techniques/T0089.001.md | 2 +- generated_pages/techniques/T0089.md | 2 +- generated_pages/techniques/T0092.md | 2 +- generated_pages/techniques/T0097.100.md | 2 +- generated_pages/techniques/T0097.101.md | 3 +- generated_pages/techniques/T0097.102.md | 6 +- generated_pages/techniques/T0097.105.md | 2 +- generated_pages/techniques/T0097.108.md | 2 +- generated_pages/techniques/T0097.109.md | 2 + generated_pages/techniques/T0097.110.md | 4 +- generated_pages/techniques/T0097.111.md | 2 +- generated_pages/techniques/T0097.202.md | 4 +- generated_pages/techniques/T0097.203.md | 2 +- generated_pages/techniques/T0097.204.md | 2 +- generated_pages/techniques/T0097.205.md | 2 +- generated_pages/techniques/T0097.207.md | 2 +- generated_pages/techniques/T0097.208.md | 6 +- generated_pages/techniques/T0101.md | 2 +- generated_pages/techniques/T0114.md | 2 +- generated_pages/techniques/T0115.md | 4 +- generated_pages/techniques/T0121.001.md | 4 +- generated_pages/techniques/T0121.md | 2 +- generated_pages/techniques/T0122.md | 10 +- generated_pages/techniques/T0124.md | 2 +- generated_pages/techniques/T0129.005.md | 2 +- generated_pages/techniques/T0129.006.md | 4 +- generated_pages/techniques/T0143.001.md | 6 +- generated_pages/techniques/T0143.002.md | 8 +- generated_pages/techniques/T0143.003.md | 12 +- generated_pages/techniques/T0146.001.md | 4 +- generated_pages/techniques/T0146.002.md | 4 +- generated_pages/techniques/T0146.003.md | 8 +- generated_pages/techniques/T0146.004.md | 6 +- generated_pages/techniques/T0146.005.md | 3 +- generated_pages/techniques/T0146.006.md | 2 +- generated_pages/techniques/T0146.007.md | 2 +- generated_pages/techniques/T0146.md | 14 +- generated_pages/techniques/T0147.001.md | 6 +- generated_pages/techniques/T0147.002.md | 6 +- generated_pages/techniques/T0147.003.md | 4 +- generated_pages/techniques/T0147.004.md | 2 +- generated_pages/techniques/T0147.md | 2 +- generated_pages/techniques/T0148.001.md | 2 +- generated_pages/techniques/T0148.002.md | 4 +- generated_pages/techniques/T0148.003.md | 4 +- generated_pages/techniques/T0148.004.md | 2 +- generated_pages/techniques/T0148.006.md | 2 +- generated_pages/techniques/T0148.007.md | 4 +- generated_pages/techniques/T0148.009.md | 2 +- generated_pages/techniques/T0149.001.md | 6 +- generated_pages/techniques/T0149.002.md | 6 +- generated_pages/techniques/T0149.003.md | 2 +- generated_pages/techniques/T0149.004.md | 4 +- generated_pages/techniques/T0149.005.md | 6 +- generated_pages/techniques/T0149.006.md | 4 +- generated_pages/techniques/T0149.007.md | 2 +- generated_pages/techniques/T0149.008.md | 2 +- generated_pages/techniques/T0150.001.md | 4 +- generated_pages/techniques/T0150.002.md | 2 +- generated_pages/techniques/T0150.003.md | 6 +- generated_pages/techniques/T0150.004.md | 8 +- generated_pages/techniques/T0150.005.md | 10 +- generated_pages/techniques/T0150.006.md | 4 +- generated_pages/techniques/T0150.007.md | 6 +- generated_pages/techniques/T0150.008.md | 2 +- generated_pages/techniques/T0151.001.md | 14 +- generated_pages/techniques/T0151.002.md | 6 +- generated_pages/techniques/T0151.003.md | 4 +- generated_pages/techniques/T0151.004.md | 7 +- generated_pages/techniques/T0151.007.md | 2 +- generated_pages/techniques/T0151.008.md | 12 +- generated_pages/techniques/T0151.009.md | 6 +- generated_pages/techniques/T0151.011.md | 2 +- generated_pages/techniques/T0151.012.md | 2 +- generated_pages/techniques/T0151.014.md | 2 +- generated_pages/techniques/T0151.015.md | 2 +- generated_pages/techniques/T0152.001.md | 2 +- generated_pages/techniques/T0152.002.md | 4 +- generated_pages/techniques/T0152.003.md | 2 +- generated_pages/techniques/T0152.004.md | 10 +- generated_pages/techniques/T0152.005.md | 2 +- generated_pages/techniques/T0152.006.md | 4 +- generated_pages/techniques/T0152.009.md | 2 +- generated_pages/techniques/T0152.010.md | 2 +- generated_pages/techniques/T0152.012.md | 6 +- generated_pages/techniques/T0153.001.md | 4 +- generated_pages/techniques/T0153.003.md | 2 +- generated_pages/techniques/T0153.004.md | 4 +- generated_pages/techniques/T0153.005.md | 4 +- generated_pages/techniques/T0153.006.md | 6 +- generated_pages/techniques/T0154.002.md | 6 +- generated_pages/techniques/T0155.001.md | 2 +- generated_pages/techniques/T0155.002.md | 2 +- generated_pages/techniques/T0155.003.md | 4 +- generated_pages/techniques/T0155.004.md | 4 +- generated_pages/techniques/T0155.005.md | 4 +- generated_pages/techniques/T0155.006.md | 4 +- generated_pages/techniques/T0155.007.md | 1 + generated_pages/techniques/T0155.md | 2 +- generated_pages/techniques_index.md | 78 ++++----- 200 files changed, 625 insertions(+), 701 deletions(-) diff --git a/DISARM_MASTER_DATA/DISARM_DATA_MASTER.xlsx b/DISARM_MASTER_DATA/DISARM_DATA_MASTER.xlsx index 6582d482d4edc322ba74a8a77275ab0a57335317..c826385391e7f5c0bed11446bbd6688935224433 100644 GIT binary patch literal 1298036 zcmeEPc_5T)+gFNKN{dQDil}H2O12hT7>T69p;XF}Js z8#$K2v=BpMEMtZlGxI$&ZPa;VjPI?}`ktXH!Bmb9Aawi<@#qUg-xZ)PiMBx7i z|M?%@fmh)cPFV4|=ZMk-^*s%SYn?OP8|TIe6Ff3a_fmKb-!4mk9)2?RB^r0???#iB z13Om-ib#r_!0|uqF8Szk*ECH_%=_5hzhCd#eS7w9@}as%Rv9=c;lydPFHf?anQnjS zltmdX_eP_m=(&sDh>AyYT9mWB;+tO2I@(cTRQlX|W{4yGs>-aDdzPvr49hbgO5M2t zzpha0>k&BpiCGFY>vmz#vL&W}RaYO#Ypz~*+^}!r(vY6C5c&O55P=PSuN=12WOrRz zvjB&G7<&^wM&ygcLTi}16MX62P<-a{o8 zi%ommzh_FJm&D@eX>XsbIP>0BVsUBe++bsm*Ri3i(`0NR4vd=EMKY=q;6Ay+Cj}BDF0sm2$F2`+O@LGpGc}G?U58V>C=Lq?xXfBmsY;58V6dfMT$6 zv9))Vmt%c`3gLfP3k-Sn#H$97yfrh<5p@OwiYV2M!LzpP@YK}FmN4-7EbHg;Sl~`DLYCu4y?ZzRjQQ zQQcQfzM-w>wZa1xB%AQ$-t8SPagth9-P=-TmCKnenmQ+D@wxe`H%{$+VPM{5)1Ne< zddn`tgL4lvly0@d%Mq}eYq9v5>gPA=f5hCFSLAAQxGu@J$X=pvV3FyrBOC1=+C;f* zTIywW(Ee%fHUxSO-FLNNM3M1Q1)=_R<=TbIZ}q|UrYdxoM0({bP0dRv>Uw$llGwc_ zz()RfNxEx~Tbu>{rfnJz&mx{F6HeI6f4V20PAFxgX1yRvQs;Dlka!%zFs%|;O*rOW{nvc&sLo`*A_quUp1`4*Wi>y zvzq*N+ja@m&()JUb9VMrjcH-?*X=0kVBj5fCmzVu_ljS(ta-*cd!-Dej>9W5-7o1| zzLq*}j?~q0bbvzQXKyrVICGy5e@H;jtRd@m*^$zMki#19SKQo1U(a7ha^cHXknj%A zqElMy34<_4cjdVgmxL*siW9bNyUHWRB+r_CUxpM}a6RhW$ zlsPHCJD7N1u77>ZBcUy~@2lbY@({*_(^f$;TSNmDd-!>9t=d6ikJmP?*;o^tyN95M zbKB-^{p#}BR?MDTVY6v+uNT1I@0%(2qVGxf-is-%n7;hO9YObO-lt@t9Y2PR{5E5t=ms=<*+hxa^eh;)|1bcnYTT@CX9Z2?+5} z@kQ=-aC)aai{Xc%2duDyNH{m0yyrG~SzUrj);vObHYH}=g$b9I8HxsAlE`SBa`3D- z>F=_pEVeJ#|Il)yFt%MT@(7IlB_#KUV1_h|98 zuatQW35PM9yPx+TeNn47f!BPkQTUeTs3hUatH>v94M@kaxUqZk2xH-mdDU$qzrkULE;##)Sxy!ipb3A+J?cS`@#Q$Jppi`{3 z*V?$LUbS1yo_YEC?=p|yW-7G*ym;*CeBQL_yU1Gv=AXC`q<8aaQr*@=R@L$%$~c$n z8iarg;+ykMUpANGIjT|v6W$$0=)OAPe3*=voQ!mZ3XjATeyzn`Cw4d3q?qVM*~3jV z%nBl}Z{IF``xxfs`HGnd!shD(^5=Uv*w=eE&OX~|)i^V5j%su8%(}bO(EMUQ^2tp} zO{eA52yo^E%f&An@WIIr`dDURrhml~GhWi}6(N@S$7QamEYo?+TYc_Pw7o%B zY?J0WGt3F%^Pmc%gtWqon@$UJ52>I+6lZ8jmO8&^bS@{7w^lJ_{KFzB8ZURG6kd*y zMQGnF_-K3UXc14DuWCfD2_i^g{tli<+f5bwuxaS27OS2eICxub)jJ)H5MsCet-b3e z?V@fpf-T4n;)7TToSXkVZc#g`SRK{!S3%mFBYh^1?yH|RD0^bmSvVQvOwoGuCNcEz zPWXO}ZFj4E%vRbgpC#b5lCrOOo_X5JU7?pIKNPtTUGza%KKxa-`~&AfZ$smBKQl3^ zeKPFyOy&0_sRa3>{=8D!dxS2Fnh2()On^&v*Q4g7DQ+>EJR8O5dj{TiZDr3+&1}J( zowfolZWiZDrk|LYXM7}ac50S&pFt^Kai#rhrPRuzv<-!VtK%*WI=?xiF7iBdeyiB# z9B=O!gNG|l^(}vE<_fv;)-laI!b#Y}z(?a{)9dh!^>%3K6Z{!Z&P2#8R*R5P&b`q9 zDGNmjbVe`9b3GdX4^iK2<)<7efX4CT+RfUSH;hD&Hp=!NejzUHdA0ANv-y;3)IDz+ z-%2>moBqMUIu++|+e&er+mThur7`bL=-x5i8Oxgnd+fDupiDi;A|<`leg4CY{zHri zq<1sm=wDuP8J*age5w3=65ocX`H9brO$MGX*dNlaLb~IUmbImLh9hstfyvgW+*4Kz zKr#KOw)!&{5f|`I;8}WN3eSRXYRmPAt*x7@Jo{g3S>`tazS9Y@W>z6inxG<%mVTj7 zx@b~-tU;qJL889iv>tI_#-3+t2UV6=rxJ7XCK<~Z&zpB@0*(%2L~neA^>@5;*e-G+ ze2!v}?y|s>TW-io2MKyU77^N5ZtzTG%{pm$ObE8GP|%#;qxGl^^vtC9F2+8%*w9To zca%0R-fOqU_;hu{`-BJgjy-7JJ_~rdvpil58yKk9BKDX6oZ5slN$WS+&YLE3 z2Y05Zc%5{#IW<5c2{LUXI_zUZLTgcV1@!U#{@a)H$ptTn`@E+=?AS%DJUUBoWzKHg z*=t(s&#oHC?Y6q*WqdZdQV8+5TGm=AI_c#C`qW0x`1|z-791{U@~WuPcYrJ{i=f)eFN_i zVhk$6kMy=w5ItC)jHVOR;po9aGz_k!&g?Jg8^k41Y9MsHfR$6%;6&+w$6MX}J>|tR z8{W{T=L=le+8(^IS>WteywS$j0)bmQDmIb?{PWt@Y+?Q&goen7SL^uH)i`yTgiRZp`bdI}B#U-MK}*`_pQ zN&n2#{GGwdNP!z$JB^e>1;VxxDwI9=F8%)2p$5 zVVOWB@J&DeH>XsV3B+&x5Ues+AZBZek&1%AgRQL?eihVBGCP=wWdEVz& zQ#A85<#b-1L>90pr&*hi2jok*7cF)Pcz)aM-r}PHFK)ZHE%pw0X6<%;@u7eMYxmlT zwW?k6L1^J5u{zaWkv5oB?gy9?@hrBWs-uQ-SjP=6?k_TFq4LNtCC96J6V@fh5MvH@ z5!PqV>g*w94MgO^{ay|j7xL3KzNH2FZS3)xyq$s&56V8XtD=vY4{@?w{>)(7OYx1! zlcB-WjJGb*nT{7%J$UkR@YHo%=NC<@+ft|G+8DTI3PY^4AwBjlN#j+xLt9j{aZqSZ zlP^xF9NA`Qy;RM;fPz>v8?EaM*L2aDAR{pkc}^jCK1S2Kh-ab1oP+091O_~e3Qr;WJOmoSeis(*TmCMY2erQmtz<}?i#AM_d zli)=djlDYjcnRKvXY_*?KGN7-G`~3aMu%+Qk@XqNSK5D&stKRuQD^U+_N#UQ6-)NUv48 zKRi_%k@>*MdOhp4)M&?AT0ZopO}rT8I9KZ3dn;e`)H&UVxk?L{1kWv4)<`~7{rrrA(VUaVh0S8u?a|Of%+-4{N)>z`Gz2BxEh8GH9udQpcrR??Uaq9I}_4Y~*zN2zB@UO=x+$7>Woe^$> z%U_S7FAn*HH~O?h*V?0Dt9+AB?5(7)xXgE#K$ikOSN~kzDi<$sh+bRYWXrVaCa(2T z^@gS#PeWM&zdsFyI|F=354~#vDqIjS26RC(&z`Wg)ha-YYcjRWDT~-iS_wT z%D*{yqVX14otbvxtC9Ys;0f!tNEOX67hidBx~*90sXFq)#{>(q{CwKqsZ|}79hc5# z6X>$`lYmbt;B$l*2wYt2kPJKdlJRhwCze(z#?)&Q`7w%d)#f41_kC%{_(pFe*K zwVS+og!Siux3F487JU#`bGJr#dN`J5T07+$7PxLxuI>A|NQrEG*r0YG6IIf=@*2!0 zlg>zKG+V_e#Zd09S)`u9fWY2b4X z@HzjdcOzS?Nwn6HC695dGaH+N7+ou`5tTll#pxrRLYFf}6h%N3oN(4Ts1inj4K4)A z62+8HqL>4SqWt`kMKK5JiL>>`DGwSx^K8h)5Sd986htGUp#Ea67>cp*c1h%Ovr9o~ zQyqnTd?th%K2(-8y&!OPpJ zVzmPe+!NDFu=fN&OcT!X$}!#w>&(yRgpf;(}ReRz73R#t;a4xZCIu)>7s=~nsUJl zu4;_1;Q_oWKdMA;MsG0;Ucc=0e(|--PW^muEd+>yGm>y>a~SRuIr=@j+I?_}qyIfn z0sh@plw2dfvk~HlbtYwM*yv2umH4TZSS*lun+Ux;IBlb5S@0B>Q~4tb{>H@%)NnLp z|2&t|5fZbTCti@4y6o&vO^B=Vnj^V|x2AIND{AF%2eQv_@)lQ#DSD$m5Y|S$r0iMF z$(biK`y^f+wOEDc1@I;`XOw^3ty?tJ<=nR5Q3!AO+o!Sv6B3p+PujS3Y0+e%twJLx zk=EmXg$oEw=}BmFdJ>YHp2TcUFU0x($7Ar==(`EHLbO+o9G*lp zr*{Iv=}Aa)dJ=OuJ&CEDp2QhWPvSYJ7sC4g@fa)wq6HJL;?y4RGuM+jJ&Dttp2RZ_PXf)Uxwhg|HOX^& z62hEbi0PbO2u_ZnrHe#i?#eXs70$C4s| zCAo~pk`V1x`!3%fk0oUQOKKXACGGeK$WjWoOFCjzTon>X#s-i@R=1HRZGtbwoSh37 zGS(~B*%&V#hP-G3Uu3+aT}RbUJP>(70X`q2SMPB!X1`JzehFzDam>tS>Q zb#F#^2ktScggHpX;uz}(N??ODCEwoOAoO4tCAw)4TLpLWvC@?-NFG_>)Be+oO)!_K zG3b12?2Fws+6(hd;)mZi@KK}GIKT$}`Flm!;idMd(vMc*cXx7Rl*VXvdWRIHO{JwS z1C6E^yNaI1hvHC0j z6WRl`N~3dL$5|Kvr42iHmrlM-*P6ab^;8-1yqiP;@=WN}b;gFWI?LmiRwK{7zPia6 zvPehLZfPm&7Qed;E>9i|uQ1hu+{=DEvvsv5lWNrp()Neg} zi|WoB|1IUY|033s^Vesu!G4>}F}R9cfkQF}J3n*{ig!ZOUW$glOE(+K5ddot*;!oQ zd}W6-Heu*vIS~W79RtK@`&6`;g=4CJ6KbKGDxQuMgsT~5-EdREJ7VH=Dexsys)p3f z_!49?JW5IxLRG}uVmgpSxSu|CBfe%bYYm3XP-YeZ1zms7IEOPyWG@^%iu>S=MC#SG zJqkrL00)8I=5kk*)LD9~LzgHGy-sq*lp?XZo^UmTtZ332yfda%*GdW+Nm9UjVKQ{( z;g-_SXwm^pxh`6ceW|H&gDvS4a_KF-?)#kIO;9z(8~+BX>6crmyCud920V~VxmyzG zQIW0WpCpZnCRt+&b(P?b(v1dG1-u_74_T-iEe*Xva>rC5TXk_#D1Glp5)>1pt1eB? z5@#7Xd~{C+XsSU|&Aq8^g(%kJg5;FyHHl3#vZ6?Sm;hZd=|=smNH-;X6_Tba2wx%% zjUw4%YIGs+C}}8yv<~l%q3Ehh(IZG5r&(7j4pyx0=;MT&aer>|7<@NSG01}U0k98Q zD_YvEU=J%9#L5CK6?`LdjHbFjZa=-mfk;4trkZn4g&p;QH&WIXFx5?iFSTg2$`&n^ zw#MqQJB~TdSRbDaU>Gyzi1L@aZNEOT0E96K>UBq8>RAm(_)*!5#vW9!%s^$B{WnrP zss=y0178&jh1{+;hNwOSw3I-0LqKNhMoTq9yswj#@x4fSc&?%MP10sO78$Oa z49|s7*Wz1|R>JJWD}5KE9B>?~!6eVWIRE_1ZzL&zagpQ^`)?WR ze<;;}^%&!rKd&Ccjj4u#rW&kIa#^1QOm*`31TyFb&~XH-<=j=v0cj+TlQe?55!8*` z>&EEukwzG(8$oI0RvK5d;FwhZKr$>yPO)B>C}jchR>$WdgW!%*jfPnWk{yPQ4A2dN zt3jyi@EyoFT>xKZ;C+L%2~R_c!5PtWR0{9&)}^ngj|rbTFim*Yy(A5t3g)@Nc~rv& zuf$-L!l_PyYse+Yn(1uN5<|v}>4MF^VIpJs57Ed-n6f{?Q~%|W>#xsqa}A(#GcUG+ zJ*s5*xn))gWT6%TRqRrB6}!pMTj?_p4M16ZN(2G8Ga3N4fB?8N?554~BLF@68GGgcz$$_OKqUP- zke>vSk}Qm_}MqP4*bH69mAZb#-fEF@5L$<}rHRHyO4WPbta#(hCTX6WLiRaupr z13>oz(6YdCG`%%h9RpSBE%l&o{I!_>KSDP$zrlUTM=KhUO7Ko;Ref(3676#}vFb|; z4HoECSR$=z02B|sSQv2@L>Ki1nF}=0l!7J1e{&1VFBfN436cJ_gosVh^n^F*vl|r% zNZ`j$-Cd9`k+&02#`cZ?S{DidxHy0jzX?Ee`@SG^0eppH5})ZsvoSP9ao-H|%Xjh* z2x)(PPngBEo^OfCM$4H%^5+mc`Qs#wLVSjdLvND2FyXpZEQB}|Xf})k5aK{*7tqed z0$O~%a@e3aXimugF}kOtn=83Xz~Wh6rG(DF~1FGvEpaokDXnO^EU5{bDl&T{cGO%nQ0WJu3EsUYvm(|z-_PetBU01cVkB@Eydb$uD zU>Nhi%(^oUVa$H!x1id4?D=mO0+8ZS{oiSKg$#F*hsOYo|Ih?ELT4MO8$apBp&3U( zE;5eJ*zC+DqXd=F#iYqsEGA!d*qOS+JlSY>%ygl5f>enM45j7=w<4bO?m6`dwdOIr zVhrYjz+4dEmltaRxu9=l8&4-b3rN-tAU{rE^PdfeorwX=e4o1#?SK+u`6og?_b(-F zC!q7o2`t-yRDN7g`3)=EpnTT1c>|TLdGoWk(Do2p#lq<{=pd8D;F<7u^N)G{u+>B4W0mG0!e)?I6&lI{qRa;sW z!ftZ-N>j>ew#i*MN)Pk9)`p=_#4+WWK?;mNBAMj2v$*;@?lUC-=aUu5CWjneK0JVF z{LIS-0MIr905l*k`GuyG#eD|wlzMy*c^w@aGngbE4_xb?VXCR$OmzalDDDW9vH|*L zR{PiR40$2Iukwk|835@o<2q6hv73PZNT3eIJ0R8u!gqvluMg)&s3v z*neoBQI~4`Lg-utz{I1Z+1$BbX-b)y1Qco!XsW;SLPlpDK+F?su7N$!VTk_P(?#lJ zkxe0hc7;Ym_Q-`{pj-eR?)bS$7U=4V0J^$ZH22@grU(F|IM~zm3uhH@t(ty^sM_f} z>a#IQW788*H-h6!xEo&r=*H^tvD9Ip-^k%08InT$w@E4A7ZHKPFK2Ane*&Bn$T-5j z)wJ0Z&SMIyf!QCRrT)cJh5iUj%^Vn?pqe$N3k<5kpqiUuYd}y<`HDUxCUH@!Mgy}y zlEG3nSgPi(R6V2`!%d2ZHHik4MsNlqH!~0|LVGCVQ;ivY}NS3;(86Lkkec<5AIaK`D@{K&#-4I2$l96OV;@;}V<1dE7&MiFrs_gU^D zHpSHE!E&r|u)}hbY&HS*^j8BmcL2ML_yz9+1M}qIC|fQ^*$&H-yFoX!v1n92Q%ABU z9u6yNv*8u&0f#r)?Xm1K;#blDF!~0gZ!SkW56=Zrk5;fKraq53{IRIbLPCmt>d$6% zfU)ssUwI)xX#}N_dubfPHpP`Rz6WcFT;Tw@o_GGIWhVQoZ?Pz*K2K|BO@ked&1I23 zvxmPPW3&9Q8yCK^l!BQ_?h0sJ^FOeuw7H3WfBk(3kJ(TE+KI@GZUk6LL9`DyIpQ&) z8XUi2^>2l@t4cy_p4s1lXHdOyVpeXEsv& zD@$o0SheA>q|L%xeZ{8z2D0!w=*A&c8?K}gtlA(NoWUL%u6$=eH=@4|tg*0~$)2!) z0D5RTrG9KNWH-AWV6)}2iJaMB$RX5cpsD_^o9b`uE#KpXhUnd|3izi#{06NfKo1Q9 zMt`P7W3mU<)O_Of;oMXM)Murv;c|u`z0WrR`45$&f9A6I6QqgjNNm`oLksjm?y51+ z_5VAJD&J9@{TM}XHaY%JfHKaGNi^tuGB*P?rY2Eq$a?eUb>^g`|Cps-5`QG~%T|OPA+A^k1`>06vXrXAfOqlT&==P#dQ~ix?iYrsi1e$0-Q|&xR3Zj`>|pHJ+)Q;`(v( z@neB^cFC$^m+#iwfUJ!d)-8pJ6EzIGh$5PJOW`{6DY+xrS3%BP~>o5dK$*{48$v+XA!gDkW}R%Bmu*r z7A!#I_iR%D*K^13YSMog3NrV*KLHbi0JrUL5q-CQjlQ{(Mu7V)35>oQ$YAu%MfAO* zr9D}__6U>GW^*@^^kw=h$ENxd_nD{akT!S@susg}yT?F~!@ZIC^@;(EzS)WLZ}2l< zEHMiV2~hj6>WD!@Ih()Z&;4iaGXPA<8SlbpiwPRa-@;J-^83IV1p95e9MIUxPLv1e zvbwsU5kokezbEDUNA5EKq5&q#K~v3zsb1BB`xaIEeCp{MTaE{q5(3=-*0dA850OUa zvVb|yPc`i!iE^$?HIOI=O?AQ86$9wH+OkYF?d!~TU=Zx*k#a0Nq?+Ln2JvByuOt>C z^84W*05%uE_JRnDkt#p`L3e_o-2KqNVF(MZ97h0Q0ZJnmr3eu3!;(g?-tp0mKo<>Y zsX1#HkIP1SuE92ASI#JXRxaf~BY%0O3M4&tVfa)p_!CM1a(V-;<5P_p>;<^b`Z(kr{@wH6baiQu zr2YKIEq0RNiRN40ot*S^>YL4{ZcH?l$zY&!5FQmyjo}Iy(~QR!q7kExU%+(EctF?y z#woGr$CV5}x6DcbZ?E-j9_&d;$x^5&(jg31mnfyG4{)9N{o}wn0BK=B{W^X#$k9jM z5#%%lIZe6aG>vPuPeqGaIHvkrHqFS2WY=pFbd#k~H`rxvL7<-j75$GRzRGohIh+== zSZzNf$N(JMbO`|tcn1f(KOu|(nZRn?WzQxa*eF6EYKMyuZiOrPJ4&-hB^||d=sHQE zB7yeAJY*q2iuPmYHk;9+YRKH0kLi?m;51lpZVeao2`oN7uQDwft+GW+rLCp(7OVBE zQyO)X81$rvZs5dpf6AnTL^cWl&O-5 z(yyl=`{mvO;5sr-jF0OG16@b%G{Y|!hF@3!`keCzvW}&$iuJf4Ii-3{c_+TcPgtL7 zBtSr=@2!Gw1o(1;K4Hke8^OTlw21pMx}6%=07@e$jbop>z#0IVo^Z*S(I23``2dp6 zG!tG)nCIhF;Fw(7I4>J*lblrBv6B4ZA_`?gOsdVB=aXYYOs)-BN$$P~&9aG3t_@#F z?z;%hw!tOW2CXFbUR1S6u?i={X47k!gET89wVa^N>@8<9tax~Mm`wIZVi?v1v1Zme ztL@d>iJKN+OXHvF+emxfc)3h4cxUM%h1q+v&gb7S#HlX69C$jR{m%ZUWt|s^;U5A5 zr`?*d`<6+8;+|u3dV{4aB}%5GuSJ{he;~YB=gynjsBHs2Q;|r&cr9o2U!rBoyPnL} zx^rdVJ)w`vAeS6?GHv4yTT|I?wSyb6m8Pq!t}~+u$xfxNbxnr~u|~A2V&!1|`axLL z^C-`o>5HrWlD=rH+2`fCwaF9aD%@?aAL=c+tK!h<&2xQkOc(C8d6lSZaNMCRJk>4u z!!@&W1`BGN_cHFsNvjaLOuHLnp7#XL-xla)6-PQy5bpiqj$hB!379RmXWYG>?|gq> zp5CxM!*_CaB`rI8Lh!!)ispot=P?C6`%DinG~vS>-ch}+3`g~yXR&GS>Qz=kbNi_f z)wpcm>iyZT_b?ikRu?oYP!r_|FSbASwVM?e4GSmPKG?sih?4%cDl_XK3VfI3UTGpV);dL`Y`0enSG4Cdro~FHaeogR5GPH5Y4{1g(Ac9PVVV}dFGf|r+D`}SdU@*Zhk^FHj16cw&vP2UB%(We z-|%8_<&AZ%gi_t~XLFQxA2D4jq_yJBMZDgSJLF|fKY7dk!lKr!i3ds+$;HofFP!)4b-hmeo0`QB2{YoVS6p3v`zK$^nR9LR8ni`h+ji4C=*r9oPla&X6VCT{n$iM1uzF9Y(h?`;bqFfT^;U zRk`lb?lf(aq*FAFEmvFD*7@$e>qXWS#63|~5Qw!7?fcs<^KyUJbw`OcZM-srF{k(5 ziK`TtuDI{voWDFy{0-4l_TM>`oT&e|^;IWKeqryqS!AENr&Xsv?w7URk1MaMrPc>YF7;pV-? zPII0gn@J=lzx8-Ygn2PL!*R$6t2r;3^tW$2h<-E}tiRETiJ^46e7N1l>(!2I^Iu zec$`-7j2?8$xz?CTE9*+wrIu;$>|3#BnEGIq?ukMP$$XXd|shws$Ix>7tN#?6R2+v zItaTQ|DGP?2{-Hs$jQBv12Yrut&JS$_paV0?S-Q{S8s(@M`x|~LeQK)K%pN7TJ(1| zjkvB2q3CBm>LCqsx?2mRuNvlFgH?&~&2&GU8+KUj@551+WxgwLjZLscCVeikD?Ti| zA-?P2xmO{RA8p%Rw5U#e-@$;7A-pcz7B!zqEn1i^*j@|EhUyr!d$$c%1TaMwc zHBmaEuixCQIN&K2{nYXh8b@jZobj1jVtvAo4 z=|(5?EU;YuzNMx{VtgAmdmO%hi;s8)B7ZpRR_;uzTUqKE?RH&i0}YM0+oq0q%%PsQ ze0+e%QAkVOA^s4RpvD{bBl3Ng+CW-&{?Jk#_UelAan@ z%DNNTht|x@tqABz$Q1MsQVPN`6LHKQ39C7SCu&4;)~mS(7@MM181d-Ns+FpgxQoY; z@e1${m@RwtR@$w0Kt4!?lQEi`^a9!pG-;Qz}fpL-S3Yt zI&os7Ndd{ZYoIk=#iZc1MR@tiKM>{^m(0FBJ%q6!6_sTlbJ)00_86nra zP)3n8$BkI4Yu&JaZq`;)%SLxo%e;lR(Mhi^xqG(9-%tpjk1^h>d(2MKAto|4TmZB4 zC=&i!?=XI;#mf7=Sq8T$AF4~^Y%S%1CqxJ@u@rz7)yz&#-V%L|w#D;aaYA-yt5-^o zA$1>pg`@07liIq|KK_sqCXRDH&`ore=qe_QFUOp?T%GX%jpmN$aTjsqQx+ZpKqkz zdONw*$e7fte`B=j^;GQSMUi)3>qy6km0`AL?KY`)_i@gAoJ0&iXeQs@e$P9Gx_L0l z8fKAM2wUP;^-v|0`83(b7oslf)!FtwyJpuMh(XNHrDNZs#`iF)USBSvu;iL$+kt^I zuUelKb{BSL1+^&62*AzuZ5J?I9oXpGb%BtH_A(E5^@UNy%*%dy6)bAn7BhRZvfOhL zFTJI$g~e+tbc%5wLZWU=B<#E}2hHp-x%fzn2k2%r?#5q%ipCfr^PQ3EGZt z2`Pi%_$YLE_~soWpXuKs>D?5^_o`vZ8m}rK^!T26=XaGi9a}om_HJEhkqKi=BduEk zdu7$#kx{QE2Cvd;BR;FdEAM1v^udK{+BKDg9a%Lu zb7zP_fzwH-2!AX48kgg{(8k@b6EZJon$9jesh?iF>rHFS(4I-1@xExAoqp|*u-nSp zN3*Rh3>hlDL}5S53c7HWKkTExJh5|PF>z7FE{mf^@dm}2^u+fl+-#bk0lmRfJA+an zMl{PKwo+>7Cq%v5;|DhqJL7w7Ov%qjJYmDunGi3WU+uvzNnX)v{EWjbm0SIZnd*H? z@&{~|u(m5Jyx`ly?_u67cuW5QCeDPnfl z>-yluMPsx!={|6~CWlG8vnf_-b25~6)ptQvQE$CffK{bujp(i4$vi-&rG}(q4C{CB<5z6J=pK!E>=u$VuX-)Y`bn;8fcoI8 ze8ymHw5-yy=-cGij}<~j`r_@&0yXN)v#DOWVMf;xV!(c_P!lJ_AGRCuT5Wkbr@)i= z8kZdJ*?y&GWo-npUwA~PQC&>fN)_byQP=7{&|a??X|+>#SZa@M-P zwk53@408x-L?^2(y0V21Ex8hrK-*OiZizAZxin$@_L^UmLw^YIR}f)vUX3lWK7p zAB#c&+4N}EA&lTYsCeh;Kz;Uj_j~7WVV#JYHpS%JJ08N>k(Fk#2wxj^{gw}^Zu3wm0H(h$9jo1{a^s3ZL``v~^%^9w~B5Ja)Ej&d8ETg5Vii6c+ z^wN^+wby`~(IRpU-IllO=a#dObS`s%>`?huWPUI40PMbRo{Qe-1S`i{kI@#|P!%M* zgr(`s=0=|yg?AOqHaKqqpjqZp_7gXZd_{At%jwNg*j)>!?I7%e-JemQTH|9dqLN3OSJCexWk$$X9 zPR+KPBRFOOJ?Cu6@Dh90B0Vm$7Fm)wx<$V7bGZR5vcNW-b!wwoqikro)1E_sjL1Lc zP(~iU^7G*Emwnn03)Y4>-yi^v!jo5{laP{+hr{at3E6*$rHkbrkH%T@%3DXPvrUg% zH#fYFvpwYewYqJ|(M=WQ zW7PB@s$pTu&%NJ{cx%kosXb>Pg@kM6XT%3#c0p{H%RRJI9#N5mU6y~S9-lwZcM095 z0a%m7{DJC`tqE{&1AV~3q5Q13KtrRvWmh`;^o{IjCN(z^`YvIQL0W2*9h2$tkAyPJ zMxpG&8nRJ-&OR*JYPAM#z;egrQQUx)nVvrMcjWqA<`)F>$Z^Gb4VI{pm5-SVkxVTh zqye%ReFnIrz&noOj^1zXKw)7ybB-Vp*M`Hm1ob>vXU;wA7cvy2)*7Jd2Hw}#w4 zvR=))>XT8E?3fHlMn8`|?0#ZCp?Va$e>uf5*{adfM|Nd5zJ_69egT^>3azTw*=UK* zLXm+>c9+8wbN_T=mYkhfJNv}2$HwqpfQXFtz}S+Q07xQBm^c%}Pp?HtV=1}O9M}D; zPQcFN!VVSZeJluCLP@_E7=;Q zZNJW@YBnOU);E8?WcuQi>hlk@?bq92XJZ3v{qhAQJr<`N$~Tn!`%0}>zMQ1T1BY1^ zsO*nawFcPb(L+TRNp_j*v+ckbizjb zl?M3<&T^w%3j1*}Gbd(wwn0y{VrWNAH5^gNt@lsv_tEYQKdBu4lh+u!6xPe$!thOK z%$}g0<2uPNO;-Hyn;KVB4S{EplpPuoqu7Al8&Ah~7IdczSn7rmVQq zyAaxP@v_lxvh~z^shS!Txk5o=#1*Rt(~7$L`}WTZ?(Ht33(ac%`2l@h3i}vM>cwyQ zXtxA-CKV^|p4^-?=$$mJ$kwabZ|Zs1QJwea$H}t9$EP<>g};?0J}!PN@oC%4x%lkn zCmp8<(dieT2{rCp7)&Nr0H3WAK-n7uEk_E3JhWV%QS z{k*8wM`fGR^O0JKqA9)SEwn!F#fsm;zUT)Ebjeomd~|O4;TSYsk{K%42phmzF}o?u z2u7begPuLu1C;k#l$gCVD+b~1?S0G9gFVUv6c@Lf7o^Wv9 ztPWe&AAwsmObHm-xoZ%KmUqxrYxmsoSsAd6fWMuwPP|+d9knw2NV$P_S*e!2n$4xz z`>xa;&Hr06ePIgWJVDD|-6mkR%9TCqZQ^Dh)Bd>GCVY1G-=B`ZZyG6g-|`Z(TTS;* z?opWYdBbZD=5wSsSjri@fH?i$zU2ug_sENhH60kAi=q!0nD)eJoar96Mfz?@bAZdU zDS<!oy zc~R}eg(+3%(|shN9OE14HqOR1}fd}{XdrD z0NSOW`okuBMJo!k!`p~vGp@BY6-(^&@osxCqsX;9xwUwCy=zs7>*Lvopjw;!Ym(`U zQu@w2XxXdSWY5M1)mrCYk^K8|tzCZoY?Yu|+x(<7w$1fKO@w~j{jz7?y$o6L`K4bR z0mX$WoH*%hS9XYoD+~w%mG1W;&36vmAE9*VFhhcU^)=Vhq_%|XzC0>vy`gUu`gOGH z?|1Ylu1%M}{H%bMZ6K3=eu3(m{7izcb4|bSu{9I)cvsB45(G>JKXsdJ*IT16ofk)V(S<*ACZ^>f}`KsYIY5$aw~|?pV58m0zwM zdOw!O+u?GMh6$nMN(0^%o}*l(nN0cye)DQT)6Orr{mGg)uG*34Ad&fx(&!+mxMx8wDom2q+b2L9}%9uc^ zUl2WE)9#nkZzYBUukiVmM!Var6Z!6qfU|5nBCL_gI?>Ut1NceT#DYe|OzEz2E2|;c#ptZ+Bp;ft=cDSZgqGLTpi4cGwzc--aW9hzC zewpd4Ll;A7z<^`#olZ)!;IXZo^!dyPcM*J}mZI+tEtlC84T>Qkxqq4%I`E(rUmQMp z#k6PQijL)g8Xl9rnpY7mCSQs6Tf2jl?Xg4%t9F8Dp~BnV7=Xq_hPO4LP?@y;Sg1>t z8p;0T_%sQ$MSYdTphdEd4wxW%k{n`7%-JaiBIFFQYsz+HictkY&iZHk&JNp*LIJ zfzfTQwRsXYFH47ZHD!D7z0MYdp;hE7Q9eGdlx_oBb1c-mN-f(i8kZ{XSRbxLNI;PL z3}_!>p*~f)*>*Tws+ePakP;ydLGCr6wbZjsAZa4KWzX_*`HF17U~HfB*@C48IW8K# zO&#t@4KRFQx}Z^Bq|y4PiQ%|-Z)O@WXwEh!wO~~xvEEC^p7sXiNtkiZQ;gx~X?e$o zLjKVC9zlL-KqJLMJ*w2uc2*6k@=o<;N`wvsxzvD0j)i(w<)ZD>8&bub>LE&mRs^{u zjqQoGO{R9F=tWuG@&p{*OHyC_d9g-?(YtoT53PqzVcZ0LLxq!NzmYZ^7cm?b7L7HC zkUQBl*ju%nnjxRGgG3}KENe;?^mCHdQ1TRO0#s-{7C|1XUhbKQ8fZNbwi%^?&X|5{ z)y=UvK|`%i2?aOkI<_DeRAfImb$?tKnmy5**eyiw5PrN3eXLa?h2XD5tY2tER2!ss zk`QeOGN5?J9{dr3#KHI`GI}jRSq8#iFs1Ti*2fi)<=zt)7=4$_@8HsUgKNpp5aZ`# zc)N~w>{p5yTfPRg$v@=$zRMB)`xARWep&vzoSfJA<(FX_$2%wY!3xaDfjPN>g;23j{L)~t$R>CT$ead(4(O@#lU(vBlI*!>2V+3U|ThPoJ zCK)z}V?daAbp{sA;r=JF{Hz*7KX?hGYZ!`MU*p|de2q^G`l$&NaQAkL(A=vnVtB$I5=nG)Ja z9_t-oEhHgSoh~UtNEWkDsz*|A%b*n`N~|D4?Wi}FeSz7M*xM}3Ojh0-gmb{3qfKakb*ZEO(g3o zZ38ESnj;m7uZk_dspdqzgD;6qzM1Ptjm2YQi8phdsJHQjvC%jE9H}i=wTh3yeWTAG>eh-~#vtXtv$aMSh$&CgsNR4L(^f?J+56_Abi=hSo??_7pq%aB0%n zW)xh=CtLR$9gS(R6*DA|ToaTe;((z!T~#|m^{EOl5Zi!qpgzIFV<8B&W7Hh{rC51H z?onzM9uez=$UR2Q#RtTSA^eU~Gx6a&*scj4(Noh%W{{;WgrY|8m=C?m6 z-{}>$4lV((;%X~k`Xd}18b0cwd&8%PgG0l=9~!P?2F!>WlQhP`iov1b2H+^t`sOP; zoUsYRFIvdA$wAxi|KzW}8;r}9G=hV1L1`@JS{gH{@IW%>sBgG zH|(7$+u6DJX`t7mArluIrA#lH0mB79|JCSzDAwZEY5F%$4Ii&T(OIinN~6CF7j;Ym zrcSU&O=Rm*z8f`Rjd_nuhUXf1-z06u(~x3tODTE;=@_PCGHaBKAv07792yQSKF&x2ojPc$ka}2H`SKyFrj2u%e zrwHgqCIiUD)7xC`in_UO0Oo+RhJUli-3}Z6&6>XqjU+i>s*tU^IB8(c?K*rb(h6=V zf8H3F!$OT4j0PsySKrd>zR&qu{)DlZTptB^BW>@N7&GY7Uj{ED5;Qa5O@`h|ct;E! zNr9{BQm$Z~kDzV~&KGQI=p1dozZg;3S-g~)JSb!j><5m%GtF;%IzfI&4F#&93T z43v+Lsb)R_P4#=@2J)E9WQZ(iAL5N!rWy@LEuu25N~yS z9x@27WKzR15Os{X;R0bSSM z;Xbt82~~p8pJ~z1+QK3PBtmzLraDi(r4+2jfKfH~Q8f+nWwNLeYqIEAb3EuqauRL^ z7*&I&nyaWfTD|TFOg*dN2!CVFLM}|TGdA0A{l6pu4w~v8t8~AC>)Q4xG+}(CF{uI6 zjbIqVb;fZ>HKu7sRwT&-ldTH`GSaAMk~OAKH(ClBMY6@@Aq#b_q@f6s0^SQl(N&j1 z=~Fl2Ymhb5S(&m(hK$qymNWvv+_2>8@Hi-gb2!s~y+Haq*av27epyQI(+3+a8ou5SXlFQi@?LLGikRsOyB$t&U zXGt!*kj;|Ql5b%+tCGl0O|mN5ROpw)WU&L0fYAJ|QVf=ZKUK^}-UoXy&t9w*9y2&j z(kP#S%5dTv12h4^F^GUAz(1h`$aUSx;#v>om}0$pkepJzW{ndcfb?09_rS1_KI}Ro z3y#aG8p^}f45Gm5%%e(M878z;i`H7%qNUPCExqLlca#E>ldOUb z3xKvnO4X1JH?#c~_^?_R*kH(VU9=QE_cIi-#|kvn4bC!-KHs_KqrIBojRbC_MW{<( zvYCA<)5k5P(l9G(tjck4R}!Noo#J5(Do4(31KWOp&hsbb==V)I9<9j!)YZjG1F^cg zSeP?*57#>Udn5#|2BEHFgMM-$)U|BznV;3Hm_&n45@a9)+k{O3qiRb|{gltX4Cp)q z&NC2In4IL@?31q>-oUtGk;kshd(3>PLO!%k#B&)-a4L+l>`wM}N zE@mbHg<1s0F=Ghh#-~^G4`_P;;ux6a<4T4X8}5_4Xso6hfcv~pr;v|=af}&gs>kd+ z196Pg_()^Z6Hqr6#ylZ_x)D2OZw1he)#GES!$7~$bN@w7PJ-kxBltpk*nr9P#W1CU0&m(8w){c z1f@|ilNu4u#PFSTei zc10VARy+X~m8=^>k-J|D*aUWsn~m{dajV4XmIIV3D9bNJ8$cMTU|upE%u9~FsL#Sz zFuqbv0VP196e=2kpABh;{ffiIvZ1@4zPsCNh)X&mjOL{$s^3gI!c)BhJ3s`5WK(D?n+K;xI7@O5^b2Kf9pa`;|?FD`^x1 zbt5Q^4lZ2PtpIpM>(>@-r(^&o4z$md0^o`tQQ?l#Y~VPHv|W{|E~IS^68GC@lv~wP^T%+f;v}ZVwG) z&0pavi1_7v=#|@LoEUxlA_S&-R_&2bGe5>+szm|*3ZR9?Q#JnIL2f_1b_GyL52v3P zLsQltfc*OPFmr(02mO`5nM7vw7jjdLDFykP$4sRSqJ6&OZw81Z#-8H=Y52H)RTU6rlYYdY$BqiPMdihTb5thR@&tHhZAYi$yZd z9zOG}&+8jwt_MiN$JKnQf4}3$bz%T8)v$3g)c_O{pb{9y1~xj_6-cGcibg=!RhDh4 zhZG07G1aVc%s(;aGJ@u)6qfO3{JmmROwVHrn;4U=7bCqxUJvs32sBS(=FSf7bPtI< z`vyLWBE+9ia`->?t~;K}_W!puP#Q)kqeQlnjN*ufO~{dTj7W&=?Nq`O71^07l070a zi$r8*uM;JXnVrLNe%F1pd%l%Uuix_>=N}~JzVGY0Ki6k}-tYhX*@A!Gses}g+(*8e zkMRyj1sOGr0OUP97XFg?{>Huo0DNe0J1xLX`(yVRm~J2{Q39xgi17}jM7tM0_d-Ij zka!GJ2ylvVsfNAOh5J2t1q6qt!-mcKi0<=@D2@M-(+z0H54Fbc%a94mpq=~Ifj$W@ zLw*JHT=*g05tGBCSiJrcZt7e^zchjsPv->z>w=cZ!)U{Xp;*L6=rbbFGco%91JrV# zLGTHZ#zi6sK4I+8#OS*X@YN(0FY4aKqVD=!Um`jDEmPeSZ8aSNm=3?j;wDDlzYxQH zU^6F1-%HW=_w8q;`0+0>g}iVZ7&Q z9UB5Dg+Rpto;_5R@U=G#~IUmH>JlezgbeAn1ksq8dYprN-qFEj7_n6KJXT_C^1hYRp6}lmK5o`6;9# z{_a>+;;i-iD{WV_P#uFk58K1CNoqyJikfYq>`FmaL%6E^bL+6puF|`;Z4Y%cJ^4z{ z{7gF$GtGay;md%a+x73ja0d{lkS;YJ@z46IZ!f`06^2bYHH1rBuz`^WsOJY_KXi?l z`o7cRz~=}YmN!zEOQbs_PR9~99UC15XhPf|nh+;P{(+?t*fiF{s41fcz01N2ItD~XEc&b;PCSQR3y3IP+s06L(*-z=+`QQJJrT?b-!$D>swNvE+D-og{T zLx4W`&Wle(?_U(R6~E}uebCYELnO*3;_(r}l>#uQ`h@96#!iILkK7IsbpHS>WzsMt zZNXX?31C(rBuI!G_WO}A&@%q=b4TQ2@59+%A{p%eGtAF_8Fm109bNy7>sU;59sk3D zBnX}-B)IwmfK^a`$aS8_kqB2xAkq+U9bf+;*RhA_ zIufKAh=a44AnPbt+h&Y}<#igbD=eV>fL8$z&{1^aM~}qX2QaXTDgdzYzXQIH1}q|< zCJn6s8!R!9At1%^zb%a*CYEVS1K(AGv0;y`V{ctaqq%nea6(*a?TmFw`-9;BDJ-Jb7sWbwOAjP+FHvwV^ij)-Htmp zg}_aYA+bZS9Na=J3^$Klxnczlw*vZdEvU=fosZlDLDHvhzw=51>PTF+W}LQMSQeY^ zuE6`;N6sal51Sd~4^+Nu7i_&{hf)y}BO@D65vQSjUMB;!C5^LM-&OVNSI+i}$X;=M z9{a9nctJhQ?Xn&DE7~R%zV&BBW5zibOkZtZDao_BVmfz21k)=&GV%?tC|B<0xgfRT z?E3X{Z~FLlUED8zRBErU(4D_-pO5E16L?~W%F)d^yCq~CpKds|#`e&zH-RT2l#lw& zDtGy*GFTmFcJ|ae^!BENewEb2v%!>G!;fcbKe*%9deDC)oQ?GA_1$eXj;wynsn*XQ z)?kot_778SX*qQMM1EI8Nz`GjNvTBHF16g^u+S4@iGUbc?JC{=PV;x~Qu3MJXqYbaN& zU9legn|TG3BuiiU+LbHjudH9O9sI_@jMv`6%GBD}(9p)37ypf)$KkwLL;%VnoNseE zifsfb?nd!UTw0vDDJwxUPE@YRP0HE&+6J}s>t^w>VKc>Je13M`2V-`LxvB7RQziyD2Y}+3abIIf^RkPC2+Y{YIkqLyhsRqLx19_7*5J=kqrn_H>en zD?L1V-CFxnhT+DLM$f$0q=&N)`is0ju+HpI>AAjRnPrxghU&^Oby9m@Z1qevee!-? zwSqsVpai)^g8Rbx-6DrxvS?loXxyRL<$bPgr9Q7lPt;*b5`U`Mb#WWJa+GFo#Rig` zU2RXUxZi7h5`HsQ_qe8Z{^kmY7jt6U#h+T-j@AlI2os# z=bp4HhBU3|TK9ymCLS%mgVwmTr*w15t^pFh402j&{I8QJ-DpAKb2SDX3nj-Zqt_`aFdfdM9&!s#0WS!B*kx!RxIe*6(n zqKj_+V8J5oi!;MorVFOBeyL_IpkxaocvwucdkLl)1M zGa`i-Ci0PsC>U-QHjP@Wt?oy-&E_D{#a)XXSl;6KD%`>(0*Om|3A6>QsDl@YDMj$C zTbS?r3$|z#kE&EoPDLvA9JvMKP|*_ARr(q;Qm@T(!&9vr(!1h|=h3fhgg{ zP+=Er-)u|tqKoJt+`&>vIAZ61ug;hYdv|hpwZ~W*?-cRs*1NEMC#zSRo~8QEhb!FD zY}`irS?g=7Ly+?mGU6eUhi_X@E9t*|hYp|$+##Ya(GtTKQyNciI#90ES~r~@y-_$~ zN6n^NlA}sOft!LPN9u&KHbqK~@d;hq6i_;xE|k1UbHz!?oH4hJc{}tr>=f(LkbE9< z$aJsp8Q!ysEit*w&Z37Fx0BN6G0Z$*_6jI%W45l?N$S-QV|9NgomX>=^}x=xUiErb zp*yL)n)Jw+Oa^%B>#$hUmW-+`#uYr`6wjISSBbKE4O5MvMJNSq(&1UJePhyNhV)?c zRzF|x9Z#ETr+(*{sx94hPg1|Rn&6o<<8nqxJ;|0*w}WpkSP30Ev+0p!kCKS$rfkXA zbs{#K3QJ${iO6kwP}-X=Vz%<=Ml|=-A^N->mpm6X+FDi6%WQI#gw|Lbj9u0etMZpF zq7l4f!qZ=}yUup6c?B$FSr?JQp;1Y1Z~Tya`J0Yyfqn)H zI|>$d{8tvX#Z~sGO}wIIaW-Av3+E$(iy2(PZ%Fod4M*0zw3RBxriI@xy{;|n3-c_w zoa%+;s_1!h!LDM5l~+lO&HWuFUe97|2X;7lJ<+oX-C^Warf1u_>Mv3e7a5kR>Cq-^ z-K>G%&B9}jQi_fz(Co>yyv1>D`dVA5ufy)$k$*k?Shs1wsvYTpI9uaK?k`CywIP8? zAofz0-=+r1wH51cG4Y?dl0qcCS{ z4uey+q#y=TRZeOZU2$zwoHmtVtDyBiVkNbbotY}u^MD_9!x5*76|~IT&UkY9QDu5; zEw??b?xYo6T!1ORIdp@+a;Ta2lGmHSG}f0YMd6+Cy#))ayKFfst7aeY&L>xZ~FMpzBuEz zLs?u#iX?$~W2}dbAH#m};}vUeF_WF~FpGKWsNEb9)uL%pn3`07KkX30n89DANLos9 zjzcfndwwGFtu4o3RZAZ9SVcd3EU)M6A`-K>K(&H(IJ&J*5sA=}=NKW7q-y%^|6sw_z-MTTY) zJ#+Dz--i8?)D@&{5?3el%oJ|6V28r54m}hY9AX$74N!5gkB%tGpC3}~r0MR$g?eKq zooP?(9Pyswidjh{uIg0+JDG!y3;vOP6JnU>Q9qvkruxjgf8cZ{tt|BU!vfD0E@hxfitjv@Bkfep{7~m`JTY$GkJvi`;L^{v$>et4=d(?mdYR zOen+lOjo_0HE^-SwdveqXi%~1ah6kT^B6k^-fJfO#cNxRVN=+<{$2*F%Mr{!x|$^d zTujq7Ze}EUBy8qFK!gP1IXepIcW(@)w~Dg?FeWrb@mRLw zj;`4>&?Z%qRn22nkLaj(|KweAJ}N+prZpB}leA|U%>7mDy1;(VVYTN~BSL@*jr5)< z8Fho5@&lU{`eS*O85u=6fkoybr#p&xP$$boJrVVAD^hrQJ6>#vErle&|9jU zU;OmV^+9irdK6*lC@1e)DySHs@_z7~i6d?!O0;icacz}z#Re7e#p z%^!Ev6#2W9pKeD>N$c}S3w4r_M?Y7>e%I`>xjc{*X%~U-%Z1ytm0+S4aaD? zId;aE6q&y>_8d}eZE<^5n}hKCnR=L);T}VP11LY-Ve!7g^9^NGn_onUBz>xirH+G1 zsc*tw-r><%#A1IH&Ce7K^x|4mx>@aJ1)~?buTBM`Xd|O0iZ_m^oJ2U>DFv#OEFTgk zL~GZNg=v&CJ0JPF3wvIl6X||JlqFs)Chg55a7nC|CBkj&=`yY~gw3Dtcv^&g`zl8v zHhw{|BO#%b2H^${i%#z0#rK7G3exjYz*2a0i5mS-_Z4&(=NHSH^;vAn6=98kHy9LA z(zMSKg}n~j`^o{kbRFaz6WFXDpWgoIOVGklZq~2u6-h4)k7~0pa*gvGO!{|1KLfC5&t|TkH=@qRi`i>U0B-z9tUj6D8mo+F3^-+;Jodj z9u>^V6=RKGs43}q6NoyUt9Z;}%mQ0e0_nwbI>;mNL7&-d{ zkNHAm%0W@XkgW1IfiV47!17`+!zg;ZiGuXpz|ZvDQ@rvmaDi+u)>+a%fgQQ^IZ&O^ zY~xvqWsY;Bz-sn+%#Y5hkU0L#DX`QDDVv^;nzMB@<`+BU_H2+-*rN&P@+4rvBWTnR zz&R^OUAH!gH{|6atiR6GAKeq2RvNZ)0d0e?iMVtLt7t6 za}W}BIIr1HG(w+kbbDv<_}iiReMOIOz3}p>K;+Oq(LNMidwg%vf@XG0LV6nZaWwC* zD0A~sgzH@1VNynTIqzah%oOm?qN>tv%s&E7_Mih~g?rs#O|>DsKXKXngETskhYDt% zmdrQyGWbSFDa@6!FuYV*w2yHGo@cbgg#t+2E%D~c=f~y>h&%Oc8q%gfk-Gz1wMc=kO1v=ng#?*V2R0{_MftY`aiYkarF2*8>!0^-i!~4)oE7Ly#McVen4y4IIH~ z55om~^zr(~{tIx-pE2?%?#6wUUt63>16j5AeTvBURbz|e<%mVBwZ5y{kgqkcN;iGcW*X|BT3Tz2^W3|{6*)l8XB8u!s;iMJkXbu2r_L>x<>hH4`Ld2I8%&bP54>SKP$I>6< zHdSp=Jc;pdZ$ZuFApKPqu{dB#P^bb$66E|NW!0_VnJi(5`#*7Ww3JPRk&Z^sEegGG z{uXe}w`c;<<4JxC&V;3&z)wUkwb5j8dITNP*pBVCu$NL~ z29Ep%D!IeGZ=0j(E`R_E2yy=`f)m6%jz5ffo;vOs3oLfDb;gvnv{Cq-sMz*qy`yJ= zxPsr09o!n`xuao%R_{h8OKC!u@u|XjH*C|BmNE*276Y@Q-|jcG6RU)O65$JZy>WeQ zQ6TdE@@$V!)$TVNtgalE)M5JRtMk*~W$dnaLX)}7n~A)?zQg4b=3QCemWegO5>d>& zKXr($-iK+SilRzq4YG={)1|1@Z+`is)>5gOsEQ|o;S>n%xWzbmg!_6w`?c{x>8)&FySrY?W~7Zsq~Lkc9Dq_N}yy5x@>VfK-F6j`mr}w zIYQMtK*my;U4f%adg=fF_Lp1zf+j8*zU|re@D@u@ugZr%c8QFLRetATA3fSOUocp)ZLRn zdDuPZ^NRm=MPL1L4-;qK>W=zSw&WAi9A)tz_QWBWLptu&xx_D4{PR6qd77P3J%T|@ z&ss*AT`X>CgP&NRl;$8&JPw}h!gomrwZm ztCBK^eX->4pW<6V+p45h*|Yml``Eg&LmG9jSN^h0^BfY!t>Z&E@KyG_$}e2^d2_zK z!SeocLco4PRdO%X0(vhUd^D`;gvz(O*3d|LPQi183FtyfB{< zHL|>u`u(#(C$36iv@7ntx#ACw`1c?Dn`Z+@PRq_}jHk@r`OAg>q89n;7SNf?3~;t* zFX~YFnfm$agMTCM;LwFccIL~DcSZezGW+4xz^QvQ{H9ymdu-;{RO7$CnvA$5yC7p* zy&G(Acl~7sirZ`rH>c#Bm?NdmDj%?tKetOCHTxRM5Ucr{J4a^Sdv|gVjIVIowNtt_ zmZssV4Xa^ngsPv6^07qejR|{fW1|lE9d9@qCQWv3&-pF*qw0)MF?Y?Gy|7|A2Jz#K zKR+T-dH=|1`&Q72%6l0a9a7%*1SszsqVoO)XX9_JEgHgTX+6!@W8}El#7#b?$msL;8AokWqh!2lJl>PeSlmA;hrt9Zew~eYspZ=Oe?` zxrW!V5W^N8Q`E5G!vwzwx*THA{KT+TMdUR4kK{D^2($KYa2^1|*5cx46g@%rZh8EW zOE|=@^^qtcUfLH-xVT2)S&TxY5p1sEQ?7u{h%vzJ3!(&zoWdbNcaE~8w>F4Gm(2O*!HT2S2fF0p>wDjPPgd zr+-D7`6~d2LKqOE6HSv5Elw31E&LMmsiC#qtIeDPRtw=VM!zNC<~6Lquiq$V%M5U=$`Q$6un^ zA}U9~@twD~ZxDe@uV2J{OZes+@Bs#j5B(CLKSA8Acp9Us*tCEmd5jp~GxC*&edK0^ z2;X>t>$nUi&t0cJMU9om12YLbRzySh@8I|m%%B(&S1|WEj!F8=6udlXL`P3ROu;5f zaSo^0mE)v>zL2#~LiaC!Ae>^BV9=qXgwl!(EXob@gSn$wEqvxP^Vj}>^h(IDqh4t zQ7(^R24y}&#r+J3`3ux$!ncy(d>ipZ;rRz=|CZEf`C&DYM&=O_oSr~%dagd$pV5ws zuZheZL^e!<*)YGX$Cwb1w#slAWa!h(QD z6yi@@Mn>@1(jODa+WsrZ+6d0hLfw#`;vE}n0YI+>acV7F8bON%G2S71n1p+npW_|E zq>&i!5T%iDX-tBB#H8=i+L#xKCwPPU&b}sigE+SEO}Pg^+s`cM^#Pq|pcOKVrigP3khcQn7EqrWEb<=FfzcU=!Dy7V zOYv(4BQG%6g>Ml*2Zm|JzyyucEx^i}CY?ruZzII2EE0oiqNyg_RO9}P<2dI_G}S~? zO}MF^|1?Dto^%8RF$!SJ(7XYQ@6p8wfuRKux5zn#g8p1+nk$M`R1pjzG8-zPSo zElUJG{qetnEd2Ap3!wQ7_qm8T5)MEEy5vBH+^)e3z@LEuZO4Wsv@@Vq=Rqk4>WBnw zkOx2;WIt56`9g`phz=&v!E7h2Rsg`yhCUS$m%z`AfHBVj$N`_SlK94oe9(>yN;y!1 zvK(|-z?NVlO&f+tpiUVDTwpN~--kG*ZA$Qz_SmQHvqD#XfMF31irHNX0IT#hz?l+L z{D5{g%IX>odVur*WGN#^mSZFEFp*yt5$%YknwXg+I5YXVGk0o+0LO8zoEUu*qi+JE zZyylGOs}IK!NKxcjhA|TszLeCoXs^9K>R?+%^whb>_G=47_5QXetZEEnwtV13GHKR z?oQB}ivxj7)VD3KzlJ}x$mcu4xsham(b6xp1v{9LwK0u2xh=vD;%;(86`052CH zH!op`cR}cTZVgbsI1IF)fhKVXCi2rr7Z{>}$~Hvsvxo5IW53~n;{FR#Gz6aq0Dgx1 zT(;?ep!j|_s)ouoNk@WuPc0XSZx>N900}1A2OtI^aSOAbqw2J^AW6;-1{ONLOp@cr zT)RLAB!uV;^5q6#<~4c=(fNzkTx8e(6Bgfh%{s@3!=j)#@!v2rtQ|b@_RmNoJyAFQ zuUDl10BEk(7y0id!m2Svbi^p;8vxZG!3Qe_d_k4+?c_$6+*d`)ug5(84yFCSL^l?H z&Nvp*O_?|RPEZZzU2)bO`9yKd9a)ArehG9<461?e41#LJry&|AJcje{=D$IPhbWCi zY1H!W&{=*UyM)9Ir1A4e7h%!}sxd@qBuXQJ()cZc^Y7|LOQJNE$NeWs;}if|J7h-% z0j=>E8a8h`#k2k@OlpwDRg9Un;A9p`Mg2&r&}%8{vQWH}FvL&}Zwmg20}Z-w^Eia^-4y7o*yVvj#`?FT~J9~wCZqPey`xa%SI46KE7`IR9$|$ zpKz)d(0zt1G`fqO#6vxgn$%506-3tW8!Ye`D$snQ*U|tYL>q$dhFk*T163P91Uu67 zzth6|O;|%rbN_*A2Lxy8R(*WFzrOGIp@FWZ+e1*ZkKFe)M0^i91Z+XEgj@l!AL6?q z5g*`vpwTa)G?twwf=zYK{04{#l-+{BrWPIlj5LCFAEGo8rI8TQ9!MIoVb^DB?^a#6 ztIJP1(gJl?K(pH4OfBGH0`jG20R|dqgEYmHxI^?_*rJcaHh?5M2Tml(E?hoGIMH`r z%KPKlyoy`QvXBhg=2`CD+8gtt0C02l-&C|AC`de#E*~Da8DfUTx1Y^^>=Orha%X1& z;t);J*P-ec1a?2HybyNqo02h6AOM>r2M_fKpq4$u7}4F7gYdw0EYpn_!u7E9?Z~K z5UVkSO&$~6NC+V!5|UvdcDjj1Le{|x}eI|PY29%7Eivg5ZC3jhmXUVwfi z`a}r*$ZdOzwb~GJvr)symqZJABj}e+&t=7KUK_( zJOXj&TfJmDt9 z#Zb)lA>irzXweY>cidv_DR21l3=wfad8y6ozri3AoXrArh_j{#+hM*ug6&6^u%;jq zFR1+tA8Icl`~ZllCEx&j(+@=Ag^dEBQ~36?kKA&|{1NS9TH@%}H%)0j^a=4t@lRnY z{`0Xj!44{zZV3PEUl!4V$u9`R6ly=ix8Z&OvEV~j#ij)mK_C|8_{Lm}D8N<0x1W6^ ztm)1rO5=Z4Klz8=TTz9j5cO{@tquP&U|GMNrCj#Gq}L9%`a`BV2oTnU69FuKd+dqe z$dzD2`I&q4pTgV)j^pH?aU5Yp$Fb9r-Q4*%{AS2l6CFoYc6#kVtLZd2n4!T9=-*u; zBpw5(X8=>ht^w)_|A3oY3W#7oo^p7W_zV6J$V@(xC1JpC98xrElc3pzOrvQ9jc;sBDl!&LsMgb^id^e=k zM>a2zCvPEk=H?KqHiT7eYClKS5Y`mv%=N;L7~=bIm!Kg<0sfwwA^@Gj zj~IUH%mr}_kp}kn2T1-4f?|SwUr@CvPHQv99nR}CURQ|6Q~AxPdU5EXy(_U#{P)Yb z|G1(2=g$K~w(xn}b;hJFA5V?FY{zj*aW0xj14~43CamEIavYsL4H$v}L3=RL1(5Bb z77J*AOH2WC06hsNt`V$wa7bvB20zj@1{i4|Mp&muA4j^ND26zEO&oVs{(Wx+lE%-& z*91u;sAv08sLjVL-aX=T)`35Ke5>>!B;?w1&u)eo~IfZAJ zH68rvbp36Ke>o6bM10!+4sHi9Hgu^EcfE*E>S-Qlv6{vv;|w2 zJU%do3XC6`F7TOiK6D45RRR?55mS?&<`=qVqPmC^iN6hw_|Mn!{&|N7)V3`Y+l-N- zP;FbZnD%!gnU}CW3v=gMbK*D+u`9Co_h}!&I8C|A!FB|GoTk=dZI^=6K6GC!JU~a$ zi60G>6vtQ#A(rf~03*S$SNN1GAcpk~aMSsSo?Ci;tgV`e!c z8Ga-uKu69=7~K>LfJ^0^4x!B(pymrObodpOyO%TyP`Ly0!`HFVALnTniGlU=ogoBh zhJSv3fY5Rv!R`h`2gh(R*FD&LD8UkBkV8a%CX#KHzP0TtHm1Fqt&J;n=t8J+~GIQ7* zR1{ysA}+}%XvSN#SU(3oTt?;WSf-<$(E=Z?rgC;J8%=G^=bTye?m}cxz=vN`&D)fT zAu@R3!$VZgx%#No)>+P(*WRK!8POp#sJ|AcigA-;NL>F60yozJ!%?hQfy1qUzNlW? zx2c4W{8-vnM_m@}&8yE*vm9h$QP8Cnyn5U64V|T{jEu*-sl}XV?J}vefuU7r7!DXy zblFiHx02)JY-t{S+^HT^F0iLWd_NoC>IXc=h4Tvq{$fdb&s8Y}tkE%<_jT1m6{)8i zxyFR9@S0yp_A+R>H(u6;YHmZ;7O9V_>{7<9g`Q*e3MJXqYbaN&U9lcK7xM}}Y1$dv zl`B_dm#kZ{9sI_@jMv`6%GBD}(9p)37ys=5kHdMh2-UV5;e3>?X^lv6Hws;e(9Is# z5^3e>*(pwipdT2>rC;8c9cidKjdDI8eAJt={>as|4A&Y_`+ZgA5AGN2Rtc*Tk!+>7 zS#H8%tuwZNYO=iQ%#Fk6r6L1lnzm{awpGL7jj)Xk7waye4=$cOAhe0{kd@|RvQtxH(hdhN9HYrZAA0V8>BT)+ z?oEel>!Q=0S#>jZmPiX_mo`n(qy!6lk#^iaT;@&gTH*sIKcSSakw@*+HyoSxHj1YY z{h)WwvxOY9MWoGd#9nQm$#$Vlt?aG&OTvAV-eS>nJKV?^ht)@=Alrf zQr~3JqO}E!BeBWj`tGF;V$M>@VY+_SqGNG|xn%E7ISO-D#Oznh#FSa9TxJ@6ec<}L z1wBtpm&L@C$GG-6U3xY25qfq{s-f$Zr1$lv*5n9M(*;HFub~yQ&AQ4McXjvqp2GZ1 zUA?`V);%ouxEW3EG%9{1#CpR+ugl(tF2=6DII?2WGKxWjsdc5$u7mH-2w&1Yq`s#5 z!U?7WmshuX8V3l;V;x0&;~yTdzqs9D=T^zJi=4Raqi~-q(rNp5hES82*|iQ_E}Knc z$h|kW?$cQabnP(TE$!czwkGouTKl%CjG&I{%Twb1(pPgRU+dJ$v9nnE?;`Q9OdgJ3 z^lJ0ksXN<`k!?P_ow~=UTtC6&c6}S0Z@BYbU#?DUsPlp=PK(k@v8r?;r+Dlk%DpR% zu?DtgzNODd5sB&R?Jc!H7TXV;Sck*JSkEvEEnxH%-{qiE4^vXk|*+BL6}tWPeQ~i?(#b3zmfFnNAj4 z!`NCX^g?NE6Rcq;6PdV#_%3mM@vY*@;`_y|80T&sP$wHNp}ylT{nr#MdoypojG?=? z4ZGAJ%GB6Di;`Pe@wu7m&D2VSkIw_^>9h+5YwPzPkk;^|N_Y)ZS3GB?OyPyAk2f+) z5ivd(QoZSrQ&IUu`C>sQ6$RsE?eX_RUUOx^K%mzM#jt0 zmnr(9*G_Hr<2etYVel zX211*+x^z~QTmblb)LB5ChelO%Qn5)Lh)>aH_KFqN+Mkt%XIj==PYO~jhiM|4#UpS zBUx_p{uo<2I7Ih#xSfmQSn%F` zYCVVdt;$@%vW8_9%UYI|EF>(eS!TB|ADK4aW`gAMsvp z>6%d*rg&ohNGHv^u)&b3?d6{DUeA`i*yzGI*>&zbw*JXd${`}s8Z32jw9_1J>aq!mGhj z;bX)SNyDi;^roJ4m18{%de-)szeZ!yJ13!R>grYvpQR<}hhzzLrlNF;l7qu_-)j{l zkA|3HQ&aCag{?WWQfj@_8YyzARZ^rp!VZb2?8(;(MzoI{>^8OO$a#J-jfOd_hJS23Rt?=8Q%lKZJlX$LrpEOl!om( zA~mg(4xc_YePF})qQ{zcUS34~+{B<(pj3ywr^<& zIL67fzHZ0uN??6iNbYB1pI(c7c0iy!R$zm#NJzDUY35jWn+5Js9-Je&*MZ}2R^-v2 z#cggLc4&vq{cd&lOo5Ep&8ODx)ZkLRLp!832H&4#%WYt{7L#>I<&nb+u9!OO$Xz4q z>CQS>@v_c)>pJ?WlIC0^lHSFia+2rR7!4n48X7WD89sq5pw4&i)=I;S+qbOLxX`kZ z^XOiQy~p<+*?VlS_YO>hWg$zb9-NRLs^R>ay+@uyqECYcScCkQ{aq)q^IziT*;J~x^skvMP5ykf+T=xr>sSa(5t8;I2UCKr$&-cn-70 z)vWgWA-hOmh5A?DIK{vx`qx%%K36vJ_I_tNbpmG3ql{e$ZE;qC6A9`DH})JOz14V) zN1cb?`FQO78|nKGiX*7Hs(k5ds121Cgg~62Qw>OkUQR)ZfpAd+O?Oe27w{2h3J}$ zE8@I*VJ2exJ(=sIaF?oH@3>Z2g|~ zaqA7&_pS1mv7Mg@R!+jYB&deQt8v|w;nj;WNhgm}D`j_kNheUz2AO0iB~Zz7 zoZ_9Ut!8UBb@Q>kD&xTxmE;*8G-!6WqbW~lIKC=JeoF&m&bt~QEGiseP3?*akG=h< zK5rpu)A>P7iIju$aY}mpk1r^s@_=s>aNVS-PH$V1@Rd|auBj%rp6vps({CrLOXR}` zukY)*Bv`DcGI{#Kv?@&Yfs_Ah5pLCf_KnYNQKJlEDKoPj7G~x?q%hQ%_4=$I6rsm(o>J}lzB^H%JSA!1)O%1NWq43 z#0>hg9NHgf7j{=QiwKww70mRNIR4~0&$nhZy zr8Ol6rE+s635x*wAck9BZSBRzSf{>?H5=i5gQOgO@?*z3 z-q~^Ol}P0dlew2S@siZ~>Z6xCw!W$H-eZ_JB$0apW*^q0*V2eV+ctLSr!ov=Sw)fr z?NNQAIt-^Mdz-G2>aMTd$*88;8M>;!|Hk~}B*(Y!k(w$9$eQO=qDMWC zjAv@4xZ7qd&?Q$$*tR#lT#^3Q==(XBN2@rGs$Eg~ES$_OKGb80PqXct>NQng_~W9S zd@A*O@+xn{Rmq1o4QdPMy|;BXouL@wFuJ z2jY@i`uEJi^AZ`ZbB;dU#v{Qj@zu+_pm{BctSYyG&3)~QttBIaDV#or>vIO{!;7s- z?Skl{w!A(402jrRcs6*mIov{9K+@!fN2q(9WAnnvCr`yQ6cVRO9;t@dFtG@62_mwO zmDLxtaY>L}k+`z!ivE?YSCp^pzhbpg+T)?Rs!j5ys#SS;hdoX!$K;8X>GzQOoGy|u zrHGF^T6TjxJ~)xjDlkvV!$8_&kehQyUn9esy^VBhI8-wgI2%u^GTQT!a6i(BPd+S; zxc^Fv+mGsN)j`@My!Bb&^c^dXr-4)y9jEWf(*jv+{4U$M~gg4 zV`zdOtd5riI!Wt-9neYIxkk7=uE)cSCh*Wb9%QCG+xr?fQ9N&=<46QMm6UaORW>d| zlRG-63YI02WW0E7#cdK_6o1C%uU0|TuCK4H&Kj)aM;^LIIZ5p8p)7Sz3GQvO(InNA~kAAdE|t?`~w#Awjew9pxvOC*hOF$AZnze}b5 z_KZ?>=%3YAw^Kv3tmBjAP-|JI&Lx@gYW7;L-q0mV{{59NGaq0~Xa(M?D@Sp_6vLPW zwyEttOuaf3#u3;bZIjCrQECg{5#CW20Crb)%ApZ~-)>pjyp@Z8KWWQE@Dy|VzVfXlP4UKT z)qZq6MOCl%BUSfm(GE?Wc}%M{o1Zh^^g7YueWu47?lh?5*o9j9ch9OyHRc@w#VSTs2%zcdOdZ^)4j z{Wb|K>g;9aue>hO+_E+K2jtQ>Y3+N=b)ZwC0ODk;9n%H*Sda!t~Xg#STWq z)p%6K+kskuN8im*KR$Sj{~GXLQgs7w{*>dm`6PLCvy#NXnI!t^OpAP4dyt|7CA*v;gTi_&954UUL$la4Ui z`uW~V@00dV75RN7%O+W6^LYmf(ry&-=|AR5I62~anoIKTfU9Mx-F3Q$0WtNn>CZZE zHSXnlq8q3(InEbC=gxNk!&aD9HBt0re@Lp1j!z$!pUQ@DYG$Q~?qMUu{eg>LpZv{( zr+ikc^*YUqqg?mt22&>5J?5e&ZMqS+lg}udnodJ6^_4$YKEG=r*@IZS>7F(tDO)#z z=-1?$$^x`H)726*dOOu`ZVaO1QR&~Rs*!O;X1a?E(qS?vTmPyZ9Enqk8rtxhL8mq` zF2sP<2wZL@)qv;#+6UZDtnigNzUuK?b*fC%5m-QGSxk0Ozo3WAw~J9 z(ds7HA1=u_D%nI;UTiqC0EYnfz*qVrSdz+tYIrWjJ+du=%JV=f6Niwpk!*8myA^p@OX5 zjDX@5^viXfw^aGgAgZ1W-ABwM%ssuY%TK-cy&|0+ysyinRPREutEKFI*P}Pf-&RqJ zes^v%ZSQ#n`Ec?debak`M>2Q6R>X~>oBGBXhX}qHj%KJ(dnOX;5V`K4wixAWee70BBxU}569a3(DJ4Yy3T}ss zQCJV9FP+bXF6#NA%FN;^+ik0ju5L&xdZP<&H=B1K(N?2w0xSyVMSa9ZpONypwpGEFL*eA90Y4FxRex3JvVDSZwI&etVJ&6_yji+B>k&D|l3IKlU}=E~vhMz*)xh7O2kBYBt< z9eN*`IA}!m(WZ}#z8g;EBFn?t!H4^-s_}&IyGc5Z}Q@4iF-~p z2Z6gI$890QD8y))Y}XgYK)JW&47z0ds2m3z{_>!t2`fqSgMlg;qt*+lZmRKygIZ~^ z>T5g7U%iGsL}eYVpXz0Bxq1ifk-R=;d(4^`${6w(Epg>L-1l0744u#(jX>n@!HaW6bz28O;lif9GvXfOgd$pDeg-pJGkZA>H~!@7*`E$p{oG_vXjlGma*C-$t}6U z>|N<8R98o-XL~rec5#0dNN)8W&dSx?liJ1Y+VU7I1lZq z;6}A+)Lzac5wu7>j#PfQv;RESaM+wh{jk{EvU~5#H8YwYDBl?5q~c2Z?f}I-e6P8) z3U%3eedwN`L>fivDy76e33SJ*<2#aU)lBR>Wduaol@bjdpERv`OL2tJD>{sek~h=^ z$gIysw=g8(ut;)U?g#`9-mDv5aVS3;A1IjV4WZXP?M} z`>72no+lagp-<|~4|{4Qj))!5XZ|KrLwU}}rzt}#+4MYcd%ab8lemI!8gMK2YjmvK zktABK@r>GKSIv&C5qAxP(>hYc+Qc&SZKt0Dg>YA*>vE7Fcu7MKg=+-dG~IaBp1d@v-Lr>SEak|%CPq4PH+S9nTQ8>sTp+*enQ#k?n* z9dPA;Mt3Df%Ao){s5ff@?iepCq~3pYdJrmRS}$xc!+b9JP^8H+XZbSSk!0 zP^OLZ_mgV0#4?;!(RL<43*Ldp(M1KPOeV5U z^~r0fiKe1RF{{p|-?n%fGP~u7^05~0`N@O2TfQ-c0-e1Yw&X2|NwAeL-QdP_F&*8E zYl29ybE>BIN2)DyCAIHA&ODKjlyz$lNfP%;qdDnmZEC865lNPjYVi;5i_svHM{}Os z7a2%wQ88Araz=_dgpP!bE?+&ppfzXA)yI&(j=wTKQUgX^ugH<4mJ|jM(_q z{=^=fV)PS6-XVnXDQCn2=85b5^j23+v4w*%zT0dox2eN|!)Z7&?oF=N#B5)9>1%j< zs>;%%=wJOJkL{2g-X0-D<8zVWv|rDAjkIZ<1%jzlN+gMpUgS!bi9%) z2H~3Sq7U0QFsrS0YSO{hGMW^*zt}GFl&y`rg->;}Ylc!1rLUePn@;ety zIp~xUd(KIVtR9>+DZI0q19sV>>{9cIa92Mbd&ROI@ms27lv?qJMjL4Mew*r9b$;KS zJkKpn9tN#1{8u#%v4E@yrP-}5f@UdWIrDJok!BEq#{$7f6pS8bI3*LM!6o^?_-KM> zyui@4`%i8(D|kgepmlYAbRRp+4In8$wg~a)Nck?`H!97}DY?T0Cf#;Cev&(im zqkk!z%V|Db!}KUDK3SJkDFb9I61t&`#iOv=JGHs`rH|;a=VCq3LZ* zD@l0M%gIaBs%48I7scL7pgd7Ub+jCLH{LVf=2pcF9z3O1Y<{jiJug13?B#Q{!kEg{ z6I9w8D{6~Zc(n3;8ThK&_{cV8YjL>hI)EqJc8)TIqG;2tJ(MX!*|4^Z#<9A;PA3}| zM%x+KHaDGBuo$UnBsTzQcH{Tk?aQo8+uwTK_PrxNV#)qMzxlAvZYy*~B=w`o%tfd9 zf-c4)mFK52=9Bt2k%#c6RW-eQ8^YA#(p6_KblG>-Ys8%K1sR9KX)!9*weyB!iMd`K zA%k#z#G*ncSMl(GV2{$_I>bp~nl4)B*0ntyi^92@qY-`LD2erAsq8{0-4OM2x89#G zM%)y>NjYnAYMf@Hm&w*wf*WdG$0IT2hMwiskzelKWy3ioj7)JmhL!OAR3|4MN znKw@vVqWFv=ie4`;q{ikQ1JY5;o8dZjrXq^&5_)=XzArPx(<2%Qu5}QuN;*OZX=DB z{V%7`MJpd%(YG}m@;e>EsD3nh`_`9CuCFYfCL7JaUu)2{>wuBeeMLrHQ0rlT7RGGa zonC2%)G(x!(+Kz3 z*PMNApHOibR|2oLaRnCw;d!gE$-`~8`M^+;c`M7|i_bd!x{p^6=|oT80yo@b>zV9W z>J(oTad&$B!d@MnuKc;(+RrjKicysfy`JDKEDIU3&2Bn2=78BMm)kk!USBojG=KME z%IO1-9S#%?)UA;GDyznvr{l9yt+#!J`vaaATki}Ffo~H>Tf~bv8V^}KdvYyl_p#lZmty618O^bvC!Hu38%kycvmqicK zE~<{no!6oW?K4e}FJ?S&COGX0M?taMD7t-Ui{O-ix}e#C_26k_HkN48EyO?);~om0 z#w6Y5CTSwItvp}-9l>8ri-vQNBw*74dk!GbA zJ0iVzP!U9>sHlh%LJ<&Y(rd^l3ZqC-R79Fc6G56vhX_b-0zv{I6zL`qS`tV|^4(x} z<_+qs|64vj)?!`K?zyMzv&(OnQ`6Vu_ogGBB<4_<+^b%IY#F#cKA*_^n4iBZy(uYA zPW5?N`P5p5q}El2-vQ>^&ig!x=~Kt`J~yb}boE-3u|yqvg6Z3tUT%Y~H|!TsnHzWQ zH@Dxr#xot|$)r{h*BC0}a2C5I!8s6cr3g8!^Z}1)wdA&gN8X^+Ck6vrjV3J$$y{%2 z=7kQtX!htjCfqYSEGvU6{otY|ueGp3A^sc;P?#jjvGJeOuQ*GFeJDAy3mQw!G&| zI<5yTum-f60>-oI@Epx}#ZecZ%cK?+vgxCZ0ff`^S@sca1D(K*a-DEXH}l*&&0+Il zefFpix8BO_Nqwt%Z;F-G#wyOI!!De4rQJrlK6_H0;v3%Gb>!)uC_Xqkp7S}AzXN)8 zgsjWjU1=xYX!pgXVQnmC8cuYz7hvbvUbv`fCal$&!V`}gpz|BM zRBxZ3yzALEv1ZP6-f*{~@b|*kqU&Ae3{ya2vf67v$Gw}CZfSX6%)I|kJw0~4pu9M- z{sPmT<^T^oUVYX8q$57RB|ve3A?Q~&n#M8n%0AZ;(AL^) zZ)kT>G{V=NDnf9-S{OfX?QEnY)4>UUepK4hqsZ4y!<_Eh$r47fm7J)2o0@|sOD6H% zm5?}Ay{Y!WgTcCNS^bA9Q+#iQ0p@hywOsT5ilF?syNT&)WfS^5@0kpz{c*a6isnPk zj%V)&-cQ)(Jv7K@r)3-kifV4T&ZczNMsOob?u8ZUMqY{6j>O(es@XHP5=HO#&U4Q0 z<#o6>uGiOi&BanbyR+Z!r)w)nB71ah2!$mjtKFh0|BpmBb4b>0Hd*bt>aB*(PD{^K zug~VL3*y|g>TTQc&A^U2D|MlvZA4GZChACkj_3MwuWWnp<3UCbuMV{NwC$GX=?dHW zSFG6ZC5I%WJan{FgHV4byCv1aaxPnvDZ==0#{K*_F(K&-;`0x-Zx_moGpcZ zs>8*0p0*|XnjH>&XM(2GvcVD^W<^v$Q!;=SnX*q1xwvbFtBZsOBJu(jnO zoOhnSO|||wO73>0)1&kESE6p_c_ZncBUeH|H*#{17+X}H=PNELMjlCM5^YAi;zAy0 z8(gK|r@IR~am+BFpW+33Jg8kvKX+87>=Z_ee_b4BYlsPKer5hk$VaZXE!7nO0~dq748VOBOHvYBpu<%8Wa z>#z=&kElATXCax_n%7Us{JBSab87ck`nD7N-F{akzAU*eBWX||#7OYa(Z*hb&Y7eR zlgsLIwS0`b#&2T14Yr(!@E=F^3~aP#IrUb*{p5bUdhGRp0U_4!L8rl&v%-)%t7i9e ztPghIO}44?ub+AztNhBTYqEXN63|D4SRrgoYL;3T)F8;I&m+b)y1$q<4AwNh?160F z-nG@PLpkjU$L*)4po-PSF)7>HbLmqgy$=VPY~bw_R^|e`TztOm8^_L;Xr!N9jw!LN zy9nWbg(zXk(0qW*@!Y4`P?qs+2(aydJ4|RAfy;3<|Gs2^T`njq=poCq$-{kZRR#U?aVR+nhwXcfl2*dlrEP(r%H!R4lyN{*~ zDO28)jt0kHnq~V4UxkvVVON{^GtSq#>LoJdCA3vjCR(rFwCmbq8WOCRa`48blOUiV*)JNBep2J%xPu5>0YX^;l%&*oOO%z`9E%@Nhcem2kzy~lI3}$x zP8(Ha?tEp8xi}rr-s)mfE4M*y^DHq(6vF=Oi1Z1MOu$w@bl@BPFy%-t+P=6r73D!4 zL&4cCScqGXT|5cD#~d+elP#rGz7f%s}8VsDaDl~4~`h{IQc zVV6v=hB;O3#9wFlF1F&Dc*gnqdz%b~j`Cjuw#xMsgXa3FYaRPb#BrkX&y`Kh(#~J2 zWMVKq*ue2cXEkVUG~(1hAZORKh7-kooKN(L9CKYQuR%kkY@&WEa7fXdUU zzGm+cza!R1<3`(7yYU3gO8n;F-LPJo}b915TV`01vWw-vUZ#0J1n6GwR-Djq1Y z8%GJ8>8cS@{6lXpY<)qU;tR2=>Gg?r`tt`8t%!_lT^Skj%G9gh8%~ZQ_H{4&a%Nnw z_W}^FV?o({Lm(P7HxZhmm*S)jb{xr}ZQzrRp-hwWjFk`jwhb|(qi;G_-YgvKlM;D0 zw`mKJ__n}{d{R;v?eN6q);_x^$5}&rRnc1H_P0E@5BH&2LkhQjhbq1W2evxd$%{bp z+=2`bLNAYTJ@+AVR)L6@tGMK5Z~?lE{`^wAX6Oltrl0Jz?iAS2b7i?YT*;&U)YzLr zN`+5z+-A?jyiX`O@2zh!Hr01lk!^hB(6%Ga>h$z+osm@osT8^0fz3%G+{v}+^kkX0%^_xn-)T7vgW?!DJIb7nyG;)_xCsgcU zz-@(I>vHFj*Gjp>mEhf`8C}wT;E$(Peg(nUiKko`f{W#8RE+9tm~()Uy_$42ba9L!A(4GO(uU>`)4h;HLKCG0-x3dzucrHYF3IthcLt0u-J z%`)OBTV&*B+HP2~0IPFouADJrJTB(5A>Ey#Yc<59W}Fjme%0Ik&shBB+Mt*t`wg_b z#$W1Qxma-->%0Dt(0969^|`bMHgz{g-!l@0?r(}vZ7Iw0xovpnR!NxcYi7vpxUID9 z$8dXeUoOK(ZU9i<4(BuVS#QwcQ~qIsb7C&}?^^HQWRLCh_T=eqGB%0%%h1-RR_NvD z%-@YEIiG8G#1uDkZ;+>s{r+I`NM|-+bzQ&iyPigF*ArP2zl=sucsRLB6nxY>pA@*9s#d-H5L~-SW)z~v{9U!tBK{o`wYC=i8nKQVn-X-or^r4A_5|4%Lyc%SA2C4 zK9U#dHu79iu|F=hY$sldk0|&pWOB{Zx83Xs5A~qZzT>==(kVK7SySUZ-_3|)2kFUIQ=MTgY-JqZd-TT2gm!aAr&q(R}S3EbGXsk zvASd=Sa^$o-ko07&f+~@^O|UjhlB>y%NIxQ;XI0btW6kKGcpTHW+Gl~T78UJSSr)V z>}ae=W9?jo#j}x3Su0x;R9z1sGK2TbSmz5BAZ$*_Z6zLpR*YPoF`T@niZf^y&}2{0 zqrEk4IIa~tC8#?ZMiJQ?NTJM^pMEo5KIJl#Y?qb%E~c6Pu9_dUFZf)3XC-M2%~~Mk zNma8Z`xI3T96P`sjj3_TPcCP8bnLS3`1>r+xt3R2;cxD{FmQ}+5^vdUl5h-o|Ho}n zi1ui9#Tf;)=RR8@TRBFjv^EzMwHtWd7A<9-8!*-BE^6l=*#kPGb6vFANTOgH=!`Nr z98NTEO*l4k)rA2RDthH`!Cks$Ymj2#^|ayGGP!dz??IJ4sV6(L0UVENkZu?gqZLBh z`YakHqU1tfagj=Kow0EM0v zirJDX%M>KKH{c-quJ-ktv2NB1(QK(wc2P%DEUSv^)O4@Xm*~v(o>2=yjy>!i9N$Xa zAFiO9r&h>Y6)s0idQx&Njqgr%^u;$E%6E27Xa)aqn`h-tg;knPYify9h`P2ON*sR?OeAXv}iHuph4vU{1xo4jz11B;j-Bl8L7`l@vqshLj>ZZWJlVi8{ zx&z%gJaTnlopNn7ZQ`2qWr0ZZ7a2O}@%}2Ms}dp&bz-*j=veBoRNJlm7Rltp*nKwu zO^$kh(Au8)(2=|A+f1?zgAVQ8EPigyO3m6ex9&1<2yPZXxyK|y`;}J2AGakT+Jet3 z9xA9w6-A&KUk+;3Dz_v^x;|qS+|0A}WRhu<5qj0Ola?BrYY+KVj$FM9YywHwlnsKL z3$|GtWKYoUy)8MYA9W__x%Ja$yW9`(Iqc5w8eP95<;A<%Ts4T#tX{#J+diDcq+4}& zUhH@*N9^eW^ShEfNgJ-65*$|z+#lS?s>pT1PUCcJ^2)KRa_VB9Gd4`OUN9=Rh?*pT zUTGEnaocU>&aqXRoj8d^6kGq$eEntnbTLQGa|+@wwxo*Ov4KQyv1XrVYe{$9G)z2c zFxD;|2YTUfOH`|HtKLNe_}x%9p>wTkt=S8S<{E7zKs_vdW&-4gb@0A7q$oL0)Hj5bXpFX^~PM~~E zfj?uy`=ok0FU8)dPjnXEXlg=3P zYJiUlQ;Rav9b7WJ&n3f-N9ZYFU6czhhe!%U^o6*{gdR)kiA5dYzH~6@Wd7YUI}ewD z_mhm#kJT3#DF2Eudp~D#?YzlIA2G_UtSnY-lMb!t{-}V}9k@iH60OT-)f{RSWw)%FUiKumUviy-p)sn$5nPOyUH`8ESaXEDY zN7>>v4IZ3TDZ~@;8S`^_a(>0U7?cT?o+OT_DpifP<8FAF!0&4?IgYBscjwHA%X?n& zRIuf4NK?~xEn>UNfm|itKq^=hq(JH5BPc4g8yWU*H5Uf&Uybq*i<4c)NnUoayil6jo@kM%v1Zj}J59U8Y$7b)z9!Jd0gP596j2xbWIj zesg5MHfGFG4O;_rG(SFr+y!w3Ur{2U*e;?j&%ZZwfisa-UL-rsf{QgUZ5kL~*Q&6T z!i)3BTv2V}bTr9+ngA6QePmWhrU7$NcjpB&T8ETx*DwXGag| zO;gij5_3ZR0MOBhE{8Q1dmQvKy1F^3CIL+o$gy|YQW4K(EG1d3fcvM+k|XBF+&GgX z>XXI8JmsY#`s)XPzB=!L--wqBk8lBB#e)1wKnFBhuQ# zotJRGD!L&mKq6A2DV+BAoKq_D%jGcA(s>M1)lnoot@k`1eBgp?1}pFpfL9M?P6swk zbKXZ|CtxUJ^#=`6Q4)~~H_TfY$y+R?SgmBI4J0CmGu|b`$}^@9bzib4 zZ>ne`P8VjNj`#BWR*rGq~$jA?=Mpq zk^9q6ljTFhc`4T02&q9#w28XXl_5NJ!PE0a>#@f3O3H@g227mQb*9PTQJ(UvIi*6` zm6!*xL}umKvi(DSOc#QsLTR0%cZwEta=1kgCgng}@6XQ>N(8{54FnRJQO*IXN(=)J z=TGC>P|_vSJK9DQ_+b=3$WUyCegC_*i}rbLB)CFxNzwdPy`DPrN-0a_uP@UVksj%G z^YSs_GGs?(&;(9w7%n?BP0VZcQM9K*ZbbGsHa!^D7cpphpz21wcLN!sqH|Gq_`#b8 z48;h?gOFe{VUK^4>7i*4%^9<*ik9Ji-yyIzJ=b9o69J;tJ!>U3Ja?_AE9V9wLdpH=t-UentfDaJK*Y0FK+ulFfNj zg>YrPS^f7HKD)>YvFL$(rKkZ%*I_)QozRc&&oRU#YRHASdzE^q9&n1NFh1`xot2EO zQeZG=Gq;>H8#csLXpng9u&~wi3Rc=x(*N#4nhs`%*O?}2h|A12Qkyr|m91Ej1L1!l| zK^2ai-LP}{8OH`nVAHYabF9!QFezgl%6EG*`+bFJvruz71B&E zMz58u&fhTV)FoS8ylHf3GT3jvLzOzv|Gout!#-Gv#fcwVgX(NOuf*z5x9&r${hlyV*9NdZ{c zB&4Sl4av{w@o*~^jILA3z-}BV3rIjDttj7tIOrSLFdh zrA}pB(Yp)Tm*?(R%#SHI;io6LIN_!bQe{dFy?P!*6hNJqtN! zP*b?QjJP^?c9vL`s>F*@H5%t}CK;&e*fzF2Kp-MZwK10~pIDj&NNLJ!R*I5P?2yf} zaa7aASj0nP5ae|AJ$PcCof!d1uac)QuACL#BnM}W6!;V_WP%iSiy3!y)$nk zHp|8+ngf6SqLw3OpD)2V%&2qyA?ofOSO@jop0@t+Vst+~4v9rOI(N;bO#8eWoGOR= zdUL6VhslNnR7ttyhPabhlylwq3doy;)x(=iN2WadMXNXqrs0!e8HQNY{Noe;_9!NK zwLK{1dFuhEqm|Vaw~Xq)xpXz>+&-T==Qtp$M4GN1bMP20#Nix~)nizPVbAd?k7WKZ z`>|PN0y-+YXb#ajZN%49U7_3rvgOXl#1Iv3(cXhFGpnX){HYp5mAtLAs!;!aPo)vn zo7gw>p3u&!_6k}e5H(y@&N`JFEyhlR64j6s}U9!=RVkIoXXuqH8nl#fiZ zbqR36c1pDJNHu(Y@p)nQ5MB$78mi0xV_F&u-ySgp@Gk3aF-6G+1*z!?lPc?OY-m4& zwAE$hD?^jo&h^q@jB*2s>tK>|tA&Z1tZY{@fsh@0E~^g(}5P9;P0ugHCgN z#XX~ye}aOQR7{5^Z=J3G6NFJVBiT9KI;$G6v96ypi^uA9BTcB78uwtv(EJ(p4`$4Y zE#|>kpZPvkQGaJv9Gr?DL6KOg#BpLWM`XN}&4~f_4kPauIgh)|DGvD&Wewmy>H7)} z=ECNcl9u0G0PWyx`aO#L{csRf_CCnn80g_3#onq?a@bsXI=ZRYsL}~m8k9xTM(dPg zvTkwK1x8mn!Hg@;4moqsKB;%CoT9DX*>qVymj)x5Zgf*S!fMvRYe>08>T z4dkZI8Su_=4pmW!eMAG%5NuEjf1-13Wk`!eJg3yd?=FXtn$9AlRn0}V*rxahcez4u zU_(Kq3(M+9IpaN5w>nEb1ep#=2RqbyD${Of2YwGLpBQsYzJ8pq>EaO9OqwQ!LxvO+ zXVg^FgaXv^5GZ8)Jf#s$B^Ks7&X+gvBBGBIizEuX2w0igxs6K6ARv%Pyz=`?e{*B` zY@k>)TLICJ{36tX;9J~0m^Uq6aJqahkKWyZ4?8>EXr)wiaHei%I0WKC%BmW!QSA=v zb5<^X*(y#<9G)Kbko5^3F7Geq2=?}rAGazwXq0?iHBBxO9PVbMJFQIZ=6;jm{-Rj1 z&zBmK4uWQv#8R7Z9t*jcO(2POjFDH~d9< zvxJDwNb0#N?D$J~F1W^#yQ9CGrK*@4LpI^3BgrF@pWEq^08t0aQ(<(O-Z4o*ag$JL zs0Y^dDR%<=B8s9^J(YQ^ru?N8uSk1&MCPS2S)R9sF^v;>GxM8;Vn%0{6>mfhxx3dDw7VeuS-&AFbRhp-kEb@RG^ zGa@iBI_9=hRQ{iyngzgzQyxP*_|Y8#RS|*6e&4B%;o+u=K?yzQjnh6GrPw7t{crm4 z((#3zXnU|{RAAlIoHRSTQiF!Osfp`+Q?_Iu87kk!M6SlD0X25D!k_%xszuk{t{p|0l zgm$0*GL*6y5;XiA0iv%1=SluS0{uL~Ad)+j_s3c0=llK(`v(vn zXV}c)7`dNjc1w_q^U)3^FB||p&93K^_vKvt<;=r=Dtwq46FquwS;TayF%#Y?6Oc7B z2y|&T6W%TJYm53B`kbLQ)fgH^V+t}L=cpgt;xzfayaXTQ-2a5U$^F;z2G-!)PeDCQ zSJ3@IS-dRrztwkt@BQL7PAn7~i%h4OAm!Tlx}K@n`Nm1`u+Edl4~(R42+NiQA<60q!B-D+5i?n zUk|z%S_5zrlY$}nAJnvee+IiO4L{2SmCk%L>MKT)`b&(Yu*0DXX3#2A^@C>0QneJ9 zC}A~%un_AW7aTpZBn97VJl1CtLg%fF2rG?Y!P{mI`xSFw22H@s_)D2^zhX|zm*^NwWXQd4=BambpRJB{y)-3uymhj?+axCPxJm8WaB@812oua87BFFEBrc4 z!v2-oYVb=i39S16kW4;fSzoARX(3g=J^umJ*1CT!ZNQd*+G@P4wk}bY1^AEJ!tpvl z(8E~dCD!pazMli+0j+hk2c41KlLyU6vI+iCNbED*x(u79|Nh`$bRmU!jFgnBhQRB* zq$gZrrT3Ob^q0mk;axJV{8acc6((Zzq)V9we#Ly41``K*Z#e|1RFw(un5kz)bH7x~ zU~%wet@V?0@An2fe$5#LIQOO#A+2rvwxpy^Kkt_Tekxp;NfSLfZ$-rO(im2}S!TE& zLML%v`^3ywQNG&5TGOMq=c~ds6?#CHfy+Fn^;vQDa$@4mYjN&DpEC+u($+ zTcYiulgvkMG|UG~$quYhYqu!4{G7a9!L{Q3&9<$nLT3!p($9jj3e5ic0cvcdU{7F{ z5J~gzzyI47Tyx{m4*~xghWoD#{_PF4KEP4I={A6;EZgDjKX>Vy7TlEz(re5xwIwJ1 z^BBIlfi}wDeo%!NVowu3NsYCtI{`KS48`Imhk%!k(|dDZ95WsKApDpr6E%8oE{tbp zc&RTl-a8Xs+D+%pkLhorP2vLz8rmV3PHlf*3;Mxj`|YP>Nv`v+4JsS07CWW`Ob6L&udFUB`Bpp=iEB#R)F`ZD32Gm}eW z=)E~Ha1$84H!sF6lTfNEy1?rDV8-M?NWWKRfs?@xvec!?gMV%Me{*RG2o|`NcWZ2b zxkHP6`U_;~I2}n5K{jFaQ(?i|Wn%rv9GGDfJwFvzyd)x{)Rz^nh(MZP{UAo2&8|9Z ztxy_m5Raw`x&NSKUseS^X&=A8ep8nYh33eSJ>~Ix#)gjmf?RmGaSf^I(uBJ@h0AL{n)Doi`uGA`|RK=EJyV=9YHTlk#5B48}o`m_fDd$t!7DHf5J04wH?hLjIM?K{a0{j-_hKW}~61$ViGZ zk9U}xbKfgkRw&%*q4=#rReAv zEj0dO$_D-d&S9|3IL?BWCaMZpD}&FAN1MvC!TUEN%WQW@GQ^#CnSV!O1 zv>(q#FBXGE((UKqiU~gu^+CdG08t(dfX`*YNk^iEd)O>E_!mNg0Ot!6;J1za zE+lB{vg}!^L1v`iu`f-GeE~*Q1z=SCSRmkVi3CD`7W5MW&GQ2P5d1+47XxB}I04t3 z+IQh%)XZh#SgL3UfU&Cq82i5Z;rPBhE7h(y$fiQJrdXm)Fv4rK&Vj?}DlKybOO;*8I zfja*oUEwd#YsLElBrS5$+yEc+clix}a|2BsN82BU%K#kLhhkOA(w!xf0lCqQON87l_sas}lMnOv-zFAt zv41C37?&BxQdMrkK^b4Hm7~81kp6!yREk;8z{%s^rZCyl{fO7$e?jFS{wt|MLrB5a zKbjoyzhkRR(;P7W-`gq+3AGEZm0z+|)Rt|Pv~OK{ONOEVTLt^?Y!$I(m1F6u98|); zk}A}yWm{#bB6J$?4C?F!2O>3~uGsoR)sCOSz?i5wv>K4XK>s5O*as8t_Ybf9R=NBk z_-2U?3doC_|Ln8R_!XR^28andy-XZSvD6Si9K?S|92LvN@pVQmSxphcQ@E+C^KtLp zgp5swgL_Drjz;KS=+433?V_kxIQ&)T%pU{{Y0+4}d$P^n9 zHO6vFOIY#dnXw-#5-yYp`mVHCv1QM!)3V>T*|mXV$wez!z+tp7(_d#CJs56q`f^s~ z63wb?`d5sD9I&i$ELDV^9h5=E)pXCm7C_XNX1{)IXl+lMK{S|8n{QjEb^H} zh&#qk%61+dT9W4E?>?vw96$I|X)!mT(E7rm3=3r(J}2qdeKwC1}x*hYh~u>gRqqd~%_%*yr*dk_ej51*jzjoZ3;UN-OSw zEv0-sF|3#p2I(IHP7I^|P_XxM>5c!Tk`_R&KCbOcuKw7Eqkd2(gf9i>7D^E!X{VL) zW6U!b%EEYOs(m;W$|Zwp){~bHob3Yp0pp+Mom-*`-tR6TXh(Q0oR9UbfAF93MhlRD z)(U+oM~2XjlS9%D{-GT`2^?hm8A+v`Pr6{^Hqp+4;=s@f6$14Mn?4*-~%ML^^P4|4!xLUsgGma?0($Q#pVTIb3K z&F=9d=YKed(z|$B9bK|Iwgnvh?`Q)!hH{y2EKRJ#BNM*B96%r;P$awR!;vjN=vj#bU=AQWeOcvLk}Ajazf(DYBW#ydj-_d? z0EsRCPUV0us~k(#UDSbt{yUXJZCT}5lAaX|wb?ZJ=oyg{TQt;0Cwbu8o|ItgcK-RQ zoJv2v;$0U{AqFvOnPBLOLOQ~m_mpNA8kW#J590iVbTNGU9zN}B5@5x~hkz7WzB_lgx%>I&NB z)fV{*P`oGi$i`+O!p zi*?Y@5J{g$78#)h1VMUhV%QeT~^;o7dHUT1SP%M^A8Nn^)Jf8HOM8KLm~vuJ`so zWFD1PPw#)oDoVKFu>T>OsI&$F|3eN@!i`(iA1mmd9zJfBjC@>n#Qmvq@aYTpf(kB$ znC~|1dvg9l4PVuz?AjQvQ{Fs6wd)U~cGw6So<1Z0p3P7_J3H<2Taj%43$6>lWUe7* zmz~J1=DLHkxURRE_JfkNX1>6*?S|m?iy<2Ap=n|^FRFIfXtjsSbei9m*@doCJb$hR zpSkce;Y8&v&7+InK{uAQ@B}~n*$cEM9`F_hdI0Hoq_Xfp+czH`DBE#ta|d60I5Y5| zmv_^|xIaFa_MZ0OPt62=Y(@iU=9==0%FzF;l-AC9TXsc?4 z6m3F_JfV0LpwF1W)}G#`N2oq3ocD-p3*u(^J$dYb(|g5*KsQ$Np9)wNscT?Xwf6Mm zSGi@)kDr{|GVAkL^F-U;iMe{+m8U{hMK@u1wms!rs~F3oa`Wlo+l|R~ZLk>8Lv8U| z!>#!DA=+*6)ohuKvgn0Z_ahtKKD=VJc@zJ{Ys+Z!%`rG^2y-fAhswGvX3|c5+};** z#sEIor-$iLda!lc-lPZmxF_a%SLh;b^SwX0h4&gRzhoq+5#I{z2f+>)oZq_pj)vHc)xwcN~W{k z{R}HtOj@p6!2x{YVJqhD;AG=`(Za&TS#05-jHrj5ZB!V@1}VP9A4^YS)g)vIBV92Y zl5YjuUpKy$#fpgDQJ3{Z^;Uwkpg9#%l^sU6s^YD@V(su(h_n$~Wyf;k_N<7a%QoR$EJ#w*6w=X=p<=R}T_EB-0 zC~FAQ1!b?2Zr|%d+8q%t#Z*I%JLYw<6~|v0oFb|o8yKoT3O4OfGOgg0_%hw@gu@_bB$(ya-oMDf>aQ zlcxm*!{tU^5K%lOPFZMW;c{W5lEYh1OY!4Nnhs^bRv`KecV$cHJ`J$Z*M6;0ud$Mp32Q3Z*Bi85~cFh8bE0 z9$DwO>As_ad01WRsL}fH(;IKP+HDEQo~QpTfuc}I`<Iy)_< zMjnGvdsv~QxmI#AKZT+OrDVX+YUHZ&R^Tm>m7H9qrs6X zTY+1>=5A1n=Bt}xWBAm_k2+w1)VVq`nT*m?qfCd#`p)ANacr>#J-TD>^jVQ95TEzc zZtpk5dUfgY!gN%8iIc?rdMs7}ueZBa^Ed^R#koA;xfDv`=xsu!8?>pasruUv+ICCR9FwB|?4txcps~d+K9v0E_R@!E_NH8BR=N3B~&TneS)_`=qq~9Jkm>bAq$U+(kB|8U<_<3b& zh4ds{&E{!jxuO0(RAGSSy87sGg|{q0>gYELGc11PBjO76EP>@*uabm$-yCnp7Mp;E zZnyarUo8S9%NnX6m100H)xl4I26_8fCh0A(?ZH5UX+O~59wC+K9@16UxsCT;S`St9 z6dw+lZ}4`h?kNObJR`YkQAPaRA*`~l^Rip7{m9&zsz9N@SPz_~un8$%sLG>t%#nn6 z69%g&U@<&PiI_m1+Hk+TW4ogkuVg@1+~vKz`vN-S953=J26UTV=HT5E&|&I$b~WM} zZj;i665shovLyC&ai>uEd6()Czvk^~ESdrH@*cd|Pca4n!K^*45XHMG;O%zjYToq$ zEpbjyc)0@FnQfogVPA1<3rNb9()VcZgp&e^zD;c3z%?cdFmyQ)|Wn!opx_ zpUCxPPV!2-SW?u7LY20#B&rV{SCVFVrat^eiHRk?d_Y`Dn8jvAWajwGQ?uRKB^0KX zshy@iwXD}C1=ZLzlYMr3d&FiJVXp9InD^bBnNlljiuDbXvfQM#zGj<3!XI}-*Pm49 z(qbIlrgGtrTcHe+>TK0qwK@59s%_y@v8P7@xaS-g5e?qNVQ(c$G3szK=E=)Iy^dpV zR25wVg647H7rj2^u4D_-%Oz&2=6kLrgfiVxU$4cGvP~x8%8O8z7InJnbrIX7E?h~A zv-K-XGlU7{Ie2&2T`mE86^7{cZ8`3;KKYNw`s>COElNA;1}BNH%6fgKeJZtA9of#g zD_~3LrjrLQX|1;2&YKXx6uMFJfMxY6L-h_icf(g+m*v==5qj?DwDSZ%Z5HG?9j`C{ zv@%H*dH!`dslQWp*t`mT77>+^*!1AYHo;wf1EH%<9^9wJY`sk+!EYvXrR2dq)l7!l zZ1y6DL{kkN#_P&sXNn*mM&z6Z)E)w7Rolpx;8dVpgLr+mxjssdr%@I9)Y+(v)J5BS zCwd-Ns+ zhk?3%Z@41g9d1Y8l^ITcJPzrBT#ee!uL# zOY$J7xW{e3U7=g<9B|TFDY$)Wg1>YqTgw5j>J^;ZH(&4<4wboU=iD5|>JIgyM61-4 z=em-^VhVeS(M^*UuNK(@vIP3Z1In)( z*Y#dXn7s=Q-V!^7zHO#YAcRnY$04@d(OBjXc$T#B^@qk(+GEl2k^@h#^}rSHi|O%?)zsdI*^y|y#X+qgq z(t$baB#^-`hI~}qc^M+`djaR)9gwFYHa>SLK< z?gAR4hx4 za?U&HHI^r}=xVmFO}KU{l&fX`IW79p?W-?b(+=g#-rs&ar=dbuy^F}SQ9*2CinFR6 ziq?LuZhNyqBPk~4jnRzu>v-@TU$Q_sTtQ9FaWQr%?LPN(iV$N@CQ7;OdAIgh-|Ssj zV@2}3tEepQ7NcxWG6r#zB-*R}8b|L3SI}DZkGxfuPz?5)<(a!$UKbCm23lEt$fs6q zf03TyQOZ7c{%QRS0AHQhN3Wp1h!n{~SpQj-+*5dHb~-n)IGQ-M`Gf;Jt05(Woz;Xr zc52MXr#9CatB;h1&AN>P>?@#k!=jv;^2++prrWI>#K1mEpWB!eENTSthsz8j^U-1e zK^QJh5d2ZsJ?7ym6jgB3o@-45b(>idvz%G<J_{%z?f5n0X} zs~Tpq=byF`H-cVZ^Hqb)YPq$>m&wh;hyv$!@!y2}ZDp(QG;DTyZmLl)pfGIzW4dC9v*}xREiZ{*7uP)b~A+ofXN#?GT?@GnFE}>sN}26#{?+272hc zYLOmBzTz_>e+I$VO+|Ik3U037l(+HZyyM)%cZyrr z&@D#HvY7~m711N}V_Pv2P7o@(IQA$swv%os`N2DV-gw8g+;bSc_buUhFnKBn;Nd-fzz$YHklyaeZ1NR(LnG)&pT+p4NtOWC2K9F$1n@$)b!A?(WVS!*v+>ya^9eXK2Td@RUlcEjtyeus|Q2( zuLqa^0n*5T~Lucj)?(V+L zGxX-ZZ7#MLPJ(xluF7aEWsG9$p7;2jBAceao$6wp%Z`K(LT}hkW3iWyRFKZjN+wCb zlHU1AfJdO>L*csMsx(Qe)FD6=p5;74T&#<=_USXQLuZJ!^w`QB2E#T?4plqMGYEeQ zOI8TEr-#&YmEYS6Xnhj4IEh7MO%STFqB3y1cG{=I@AZ*r|g#i_Q$PFZ-Y@xF0W^}^Uo3$ z807@?25Rr{c(cJg)*Q($2@7Z)_mi*{-w{p`;!hKQ7s9N>1b!cz&bl+L-fC0*KN_C< z3cC_^xNVN@apM3B*fv0+gbEmeteW$zp6b;EwAy3pBR&KsQ+l)J++i8!rIVW$)#EMX zGCH9*QTM3hHL!VFQ>Y3{~+5r`}wBT3uxL6`w7<~Pmmp<)J+vEAXLRldGaHR?v5(YeTMG<43FIBpa$)Ph!5pz-wIOccYtZ~cNX_-==0!Z z+_`u^xjP!XrRzGfQ`FwTFu0fwyrrCMYc2k#cGRi zkeqBpH*~tKRsb9cJKz?oGO$A7pl+ztu73teV&@SDeMtkPB;r_&1$~D)OX$vlHH&E{ zLp9Lgu^Kr&3j9W_8X5m?p048nK6LfKI)wv`izp(HDRVS>EDRgjoof}&dx2G9e{ksL zMdg5iTF&Wi)wz;CAl`02^QgLR;8EVqKlLc;P|&Fu2x#u7#+2GTMxBNP&EhfHewgj_ z)f=4_g%3yrRcG!a1$yA#4o#v;)qGBW@N5^T=3InR>G|5;%Y#fo(D9KG9>9ODZX;Q5CX;L)% zX;S=|ZMZ;+89z;mKeHUNdL{OBoARRvhdRd`c1H5@TOaNWV@cRKdPp&B)5)W?S_&!K z?j_tj6~=Y)*n2G%>uo^^H>AVZS_-zK-womQpb5Qb5b`S4A?)pSy%a_P*S-YNsJCnF zS&y7#S4{+7UJom{e3D)Fec2I^{O9lg=EGIlqV}S6t{MDpS274rM?tf9Kis!U&Sh5$ zW9*MK@#$eJ4cX<~{R?!I3SY@V6%s{#j(&LbmGk0vzV7AU^x{(!ANw2lM_OPc`VfjS z8YDj||Bg1a4>#pm?>O?gi;E3y;ih%f1$p__Z$(-=)|QCX3%d5{f1Hx8;n0N7U0j&G z#rn180;tRA;CmJq%qsBip}PeWKx-dnT}SH|W_?@$i_Ltr3mD(0E(y3^iDdYdsY*SD zGQX4Y)oNdXkQ8gkD~1bwyOwf>^=D>YV?R=K+yScu z3$`UhKZ>>o+2Alo=v!{P?1(j zwi%3>`QM+hROdV=!}S0D&Uv1By}TH++;cD2^}hD&rhR(FIx!+=4AI=*@X!+3rs}x% z*`wR#ZzjYipzT{eq+8ZF+@D6reUDW~m=K>GAkN9jXxbr}DsS`^JqSeKf5r*G z&;B<`Zz#GMJRD}gzuAnDSP`I%qEw8OX;0|x@59l^YXn?qve68l{8=MFFogU2At7uy zn}W2ja#bGS~?(D`~Prn_FZ?DQo}CX(B8V9KuCHZWNO5CmWJe3c0OcEslov zaAe)nXxO6Wt4~oYAplr!I|h ziiY;+RMI~y0RIpyYT!v6Q_9{in>}xP#J)dPt&d9XljUk}m3`SirNi;F+Ijz=Sv1Q^ zYW)o(Nkda@hs7nA_kjmzf0aDbu4Z4Qf8gt9hhHA~fmA{I;gp%C&v66ejr@VHz8rdU z`VRZpc`@50TTcv4X_Q06&N6+R-t_*m`k^nY8r2a0fGzMh?RThD$Kp*|LoOmKrzeNl z!y8%%Y@IeaGQP{AFjEIFhY9VnEG*R#$H~ZR==E)Ea4ux&AmqrqT|&B0g)!5@y`DL7 zdd>Um^c^`T_n12EAN_IuH*BPcmV{=f0!v9Oo|Q+J_jhI73xZ!n%G2~*)EnFjNjh!v zn7du)3nO&!@|b`whr-u{OdSJUs-8<|7pBl#M+s*p&k62o^7wRYjTx3Ji6!Ao(-!QL zG#djn`~#R$L`y=`lF-m>U!IO&kULq~b(N~0>T~Z=bkMj;{bYO>vXHFn|#o#6wgaXw4Nxnom_I+cno4jB;zDS zTOcWA>ex>2tn6ji+O;jR?>zawg+S7=m8TiFz#BLOah#@p--d=xf)XxO-{o%CrUt9R zB%OR*szKkn2Ft=G0v_jX`U|A0`RBl0)WEZeQFIBg*Ai-9lD%`L7!$rCc$4P z2IsEd=b!~?TL`XK6qblHHFz{Frg7_|X_1PAWFNsFY=n#;>Ev_rQKS9jz}I-)fD~6x zMQXO--}%i1k1d6ijj(CxxY11et0BsMSNu@z@aa{^&Ms; z(KC~Y3+>e#kcAW-7Oqmy1<~-D;EmJN>)YIrLx{o2$Z6=i1a{dJb`sif?z>$Ay3`sN z1anEqC(_rM=2WBah*9}NF=f=0NJti)q-YBO6?}^GiW-*ED3wo+g){;HM|pBkmwTb7 z4on^s*yUX4uVXH+vD+oMYeNHtz|f(~bMAI2H#ijL>!c|{h|tZzo(GPd{}WnlurmCM z_h{HNRNh^32l5(@%D*P^^6~fUAK>T&)^u9FE29mULq@&NEfK<+PNQW<$B3+Hk<)za zaRXq$;C~1-w!_eIO;K77Rr^J_B!cF#NvCfDFwv7~`pH3Ej)fco@HQIst!=0w7~nJw z`ji`*2%b9LxKKGvP}k-LHUWk+lOyZ*sWy~Og2G_jekHD*JSlad$mczJRuqLJ2P3jT zO4Gmiysd?BGun!PQ52aLE;tW>5j7l{777^8i-7Upouu&pJRS;w5&L7z7p%y95xKmD zba{Ure-XyB(~kI`kkY)Jzmu1hTv&EwPKe>jaF_ihbANsh6Pq}@6P85@YkXsheE3PR zvwov(@ZY%3Mb7z0!f(NSFU4rCT5AYTomi$WZ)%Vn01_#nFgEax|HaOs%Yj4+D2(k5 z!q{eVAhYL8Vbg$})1wp(3>{bXNRe-R6!EFyD2*sQ0K!|4Z~Tilvb*G75J-1~3~vxN z{A)Ue4M=x{3~%5W-we_zfM;BeY&Mim0qmS4^TD2Wn+^Q^ zG9GbeN`rZ3?IK%RltL_I7B#S?^M?~~g;5#%GeeqNO74w8_4jG~Z*WS8($R&^$iJVX z$aNhGV1txJ+HO#-1!dua;_AOtv)Y1cEq)emCdk57g6a}f8oGz7S$Pis9%K41g%ct- z=MRXU2<_?p6z&DbO0)8KAtucsxM=yY5@Wxlttk8=GNy$#roRfm1PNhG(_2s2(x;1z zX^}BK=CUr@%$AKv4&G4o1jVdOX72xvEghlrO+nCC!9-9a1IPV2S)>oUwRstF>WT93 zPq)o3n4NT-wKaUl_^@N#3BBq)A?wcoMuIjeWXyU|Z;Edbb0pzBoUAL7 z(tpms4blSHx4S`t8RQ)QrkNQ(UdRTWN8O=}p7S8V%z&TX^Cg=?;BdKqC_VAN$IiMu~0;-PL z1hO3?_@y#~l?mRw>PB5K&^*Fwl^K%r|Z(ANy~*BiN9L`c-8DXnv9l8q`CDGT%0Ngc89)>C9TtpdJs32sweEGc!~~I9$vM?%5KV zFaO(jw*3Gp{pFr5P|PY^_(cSaB48Ba5=Q`xUzcnN0gNKQ&i@aWS#n^DnZEm`_@3Qs zzw1yy_n!U6uwU-Mw71^t6|ZgC<4~;#Uz(hgLd=zl5I6_@zo9-(5yWYlo};;Kwa40m z2d{+VH#Ivy*wjpO=%x>FMrNuBf%1=yEw>@7IGmNP)|(5&X-o(I93B zb-i@~ULfzGb}7U63ES|mx8~o)g#vX6AZiG;G{f*?hNZl8a08O4gOuo^LSgP|1UZk8 zYy1aDX;B9$Q39@z7l#63Yy=H(g_qLNqHbpY_eHNRfx}l$eOu`Wmt!o%sQ_w5^C3|L=+M%XPW`08?1#8L*&sJ?KK~9}ZS8_q z`2<~*0QHdqH>?jdHN(qcLc1&rOQ9Rqp&NxU1L@#;ARQbEVAJ`@;4U2V{!&qEJy9{M zaK)@%ik1BiRCONOE*7m1Qo+YajNRrby`u1oh!}+<#&5zepmj#gkyLw)K8jcL$xV$6YQQO^nCPU43O$p)TSERLY&W9b!c{u?SZZ(IVl4j)MVg{td36H6G}b!jIGhfF!dT{teff z13BPdCHM?RYM={+n+WDZeNw=!nId8o+1$do9R_XgHh%uCP%0xt^s%dq4^IH#ZLaEs*^Q_0o3;TS+c-^CA&0{R5;EXsyQr3Ah9H3whz#jcF*g zr%%+iXB1s~zTrqwYdwcpsI{K@P-{KVbZ4w8BUh4#k|(8#TI-2g>#2`<3xLXKKHSa> zTn9XMm$wo+P9&v;=>95FRCWL z@5e0JmtwM;E-w3&z2{f<6P|aazjaOO9VI8)T&q^?n)m64 zQ)Zg}KU{FZc1d`eG%Jr6YSJ8n3k8>Eb{#9s(TR~GhjyLh=Tz8&YvBgfPEGy6K0Y$? zn2;{0%{}NQWx`MJ@#j_7!_jf4{&Lajm*ULtgyjDLS$F^Mvs*+7J~u$QAqV&*H$$y^ zG}0D;REl(hKh8|gMWZ2?pHoq(5BlmM!F`%v-M9emo*D3zgAP8=`O%sfUV2;WiF~9e zS~KQQ#lJuDC$zx^qBRU~#X@JTUE89r{*&)p2$DE6eHWF6ZUUU2`skt#QXdCmI3WLQ zFavVaUnQK)C`vc`*QJ{crR@F##1oVh9?Z(a^BYMq;1`kd&^5g)1QUwJhRSc$zd*cQhk!B8ggo+5TfpoL(v>q?@^7tT8>~J7WM9`=yKc@tG zvnYHDwg7k~yMK(FHm7BW(xyL}7SlMGm^pl9?#K`R#&8q3{pCM^twmbr4@tze1=cr% zZ+-XX-lOO!$&rJ*tP7iTY~^Tr;9dnskm55K#i<$U{&=3>vjP;(Y-q^j`^eonO5A#V zX7fqWC2>PJbfW}EQ6!rm$;SR5IsH1Mxjgrt;3@520p>rTaOgif)kN4#_&?kNs4sv! zh#rPQ1v8=a>0@>7l=7-Y_VoXHChd=~r@eoSJV%a~yxdRt@ z8vn;@41_^O4ZTNREsfz`bS%4NlM|Phn_lgl9%>#-QD9bIBc~jTi7snWVAfxwnZ~je zn9OS$Cb4MaX3kvpxpYmlSOeqc&be&6beWj4QUzwqHB8zu@Kojl4m<$CY2)>?={zE* z6wB?-=S>(lj>j7Z{kk4VLso40<+Ayt^97_iOiAsBvBIqNw7BN^_p+Ydib%GsTBq$x zd}{I0??I-lUj3_G%XGc9!i#UM)|ecr?EP$CcHwcK)lUeSab5FI=qgCA(=EDaZ?)XV z@8OhQ@bbImdg2|HGEKiUoObb1>O82s4E+D#&K9*mncAGq9}Ji48YqRwr=~d0*3K+E zeoM&#j6NxKw{zdy7l&L{cRaXxq9HcRUtgtgwZ^<&W$Y5mkI)0d?Jj;Y)7%1ri?5u5 zURU#dkU8F5PF}Cp3Ve$L_>Rw(c817MFbBh(gch4vSPHG8m;OAom$qI%?9Uh=eS({nLnu*{jgg#-WA>Plx9*7zvJyS?145Kw}J;SFOM9`_9~CGw z@M#V2Q(-7fn?^HhTv^!Ykn%c-i{?FkEqb@w|{yVO<}xlMN6r6x|V24?{tWdnc4D? zR_a;Oa}aJ5U!D|!cMLY`>+O0JWl5$nJ=->lXNr@z>SxmZa2@oz+TJzhX7JuaaI`n+ zk#!9BCkQbnjN79-Vd9)|lgIrG5M=SVL&S`8Yiq}ibJ#j%+aX-i9c zloJ2XMnxx^v%xr>1AzaiVq)oz*OGY>S&>qQ8uC3bm8$CDp!}aSLBqT z={k=pw}#zT2)uulM|aN3W>zh$_!waI`p)XTi*~Fy>ig(g&bF)WTql#WdycNYHP`CS ziRCU9lQo(v(u+NW6C`(6tp7FM@8IwB4Jqp-^xnIk^Z0a}zUGhF(z48y zI%fK|y|Smmz)wkb&Bvk2tJfx58@4qAeGV;KVl8qCUH8b5p+;5_Gf7+d# z$5Y%Ld@MJVNO@truOrc?y5!w1Gm9MftGEUAZy$Jt8ZYmYx=}j*Z1a`Vvz}1To#$*L z*`!-|njW}t(&4J+n{<4)+D@mWZs{(s_?IRrQy%VpeJVF9#zgt_&eJDK!(AWTY%P^P zC#||J)ezA)kMr>2wGx7D%gz#R{T-W+o8DLiGjvi8#k^1GGo4{RAF*McpM@VYW7WF+ zP2&5W{WAahg^#VfwG?jQl3rgotq-zq_~R6(*7i33^3w@sKReE;5At$Ct_Y)=i8&fx zDG$z?VWBql<;_>iFJZThTi|4Hbf;Dzov|t??xKIB;-R~>0ZPngy3IL#uwkikn^t~v zS&qZWD&xg@6E>`0VmC*7e8`;#Z$CSSw*I{JboX{$kE{b}?!3KLewk;LqU?L6+b#TE zWzM}^`U*WA+s97h=A`x4w8Zdwn#{RfcpjI>{fx(QTe>JPE*FO7B&9WBIYqtgNr?U? z1h=2k+lmc_xwBu>xovb_dmE3zG3T;)$yE(WY5fhhN!WITEw45|O~ZO?Ke`>usjI6p z!1l+0*SxW)^)ZnF5l;0-j@8?{Jok>MEHtWjqZ=_?Z+ds-BkRFeB&T&usg<_7e8Oju z;g((6lOh+-AY8Whkx|~VBWq&7;%O%?pAGBZ8-Pi4)K73scH3Lg0{bH&;@*b29j6bY zjPl!WKUs7Bai%M-;7H#dIYJwo}V*$=TCn@q%TZb9`nSYFTSfuv#ol@SN^5 zOIhn=*7!qRt9EsxIrRtN?{vvm3EGf&%BXV`>Rz$ zn72V{>aHfH_+39tN8Q8fDQ|XmKJA4TDvz>qWzTmh+}6iHk&7A%HYd6ZK1r8V*ws%c zh@*$=BlDXwZi?u%E4Y#h+o?#`s zhH$aV=O^W@a#_<4$ts+fwtSbaL8kWu2lf>0rtHn#&JITH`@w^=?z)S-tT599qCVi9 z%lcbq&Lz|>)1KBblekq`d*({nZfpXQ z_nTEfgk}uVTK>tK*t-Y%_AnhU1qr(UF0XDT=(AR}8z&K=fy#r#VMeavzh6DRZVjBk z^Y}>g!+;q*^hgMvXr)!T*jRgV_Tou|OZ$8l7H&DLJ*8psgcFx``z(mtav*EouG=4U zSW|AACc1N{Wmw{Ede`ADVUq8tRn)9U5-Pd7Le^`R#XD#4Xt32kzcX@T6iYXwT^Pl8 zZr`#q)LNx8H&RZ8;8%RhrEtqa9SJMBHH13}+vgagN%_}~u*}IWn~Cc2$)6?}-#x|t z^__Rie*aB}!`0xHkJcMBrLs|1N~-cY#1V53ct$EjC>!dp(q109q=ay#*jLTaV4?O> zt0lRF%L%@TzgIURla6}tXCNyA8{fsZm*S)-QHtjies##cSgu=*#^ya$quO(;B3?DF zb*S67-I2~XbrY-c>a>}nrCU@a5vd* z)zUhG$3EXxhI-c8Ya*9+6E1Ag&dHZER2c)Tr0RcZ?RSl%GrR-FM5{aGSM`bfo+Y!mSOrP8M!GtaIeo z^A1TtZ!#aDlJ4j^IH^=+Fdwn!gF|&*n;LlTxP`;bS8RuSEQwFM-fF8x%HAPd+lO0d zsN1NmVI_NmaCHN2Ug55aCD)=zG(=*FsZ6SiN>%HopvLB@)s8s^aL3%4)st+K9FDgy zeN1~xx){JR(X2kq;3k0mTgR&spJ&!I5}oX$sXhzpiA%=w#*?l}vaMg;XxY!mOpVUN z7g77;+tzm+*K!E;I3wKz;Cax;?=yg@9sIoOuiO&TY7~F47z^4#6IyTH z=DBP?wZql8H84iPlz8-2&dXP4q|p-Ys~+DZiRq8HMut+9Zi`$Vx@SWPG`C3FM1(=z z%!ixYv6(M>XXZCO588x+Yq`jq>U^InJkb(K;=a{3_6+ruz@GV(CyLL4jyh!1CbkCm zAl9UO;I9&zSn&5LL$_5lV-U=4>9(Wv!Kgej+QV#0L~-WfQiGNO445&b}#u2a>-ukbTrHJ)t-;yG{8q( zxYZ&04Co}|@E1NGFIbb77ICR>^05|Z z373*HX^D%w_j<;+Gz6(v~% z#5K;uC;;PmHfyU{!5^iYxd4QydOeXJoux;Z8ANEQ(O{LED5N+3wQ5z@8)uWmG+%M6 zk2IJu`hfvFm+>W!(BH&e-;p*~EW{i9*#bBmlENmK| zJud_1dKr2BHg2k+&LeG=$i>eHH;ZwT3$+8a*IO-qLRb_2Jh_%3m)aMeqzl+95pd64 zv2=Ht4>!`ipGtO~K>+0k0 zHpi?tm`$gu*4XmY%s*Ruki>YUS4!1domM$TCzV?!@?g*<&w`##aV53v zLblC%kK=v}(Pur^eMh^*_V>1MIB1-LY8;8;5h+1Ey-H7mo+p75Jm~g>l$75@Ed%s! z5I}m9sD{n^IO~Ja9sxjKx>AoSkCtFDokL*jOUhZZNwMTct}96lQdL^z`uBZKxjB;H z7#xFn<8F*QPy~vRoPB)4~pQN^7l5WxN3@7(;W`EP70Q zjGX)VwLq?UL$ocJ;OIa}xlSet4)14u;%*rkKgh!OejHR&q57FqpMj0LXglB-FRAxZ22 z(BoQ5dl73M-^BBwpr1N%1pRVmn;eqZe{3K;zo$AP$5pf;Y)gLY(Q! zr*FW&XCu@QbIqGRrvOabTMaN zRi1Z8P4TiV4f%Zk4Wt&B0JQ*G%N3>l~u( zKtX6b>S|`Kb#=D8RX7aTBgDX`Km@#eXFVQK+>pQEKxPSGwP**z2r5|X=S(>nT+~&0 z_GCv0CCvjr0c|dXJfjn60+n{vqft_zkw{nNNmshT20zf;__C3zdjDek6aLmf8j}FH zgm!|r-vvBYuJRb>6&0^EE|nPDbNG~bL+S(ZE2U4rXeKlPfD)R{DUv6DIuJ?{gPanj z)(uIvgCpza>M23*(ePy(kL5ef2Z7uz{YFbMLyA zonqIixxX`MYTn7C0h2U)duBXFAr^vL0WBCHY&XlHCGs7Y)&nABZ>lhJXboOd_=o?#P~iNW0W|70@~SCGFDa4v?DqKxJu z1 ztU~YeVSlx|oY0ImuF|yoe6a=u?)SyorsUVKAg5hVptY^LRUv26+HCzwdQEb%2BoPU znAG$ac~cIe2jmiV3nWs$uj@Q=)daSFuTryhwOt&fR>~Z;8PH6gbsl>)pqB`U-Hc*r z4BME_F&y5iDcmLXD!X=430r>AxG9r}&1?xzF7@joOzsXQz^Z&NbSxyg1oi z#(a^o338gD7}r^goF=Qv1 ziIO)cNJAoj=4(g?0sP8ewQW6`gwC6orgN6Hh|X661$PdpLM{expp}vvHE$-OpP-D| zIcoja1ZTPJC1ha4Cz&7YFM&Vh^-GokX9HMLKx6Yl;2J0~eHUJnYtXWfk-uOcV`Z71 zPo>TXDl=rw@jVO!0A77uA|F^Ov0`6M>iLIT0_g9+DNud3Ew~3P4KkP*55v#U7OV+|ifO*9@ zJXUOvy?W{Z@SK*F=8pE{mIDLKys;Y?V2^a&9vFou7iY@p4;o;CYXm8f2gVgx%>j+? zbZNH8)$W&`Ayn8v?lz>mPa=&@(m`$*?#cQnpjEckoOUf)o>q7j^1VVT3V>eVXYv@q zVGgV}CE$pegx2TtD{W$o1Jb(9Jw$y_L4lxlM6(h|ZzsrU@*GwDLChtii#@x^&bF23 zj@s!J?clBCDBcwD?qzeP1qVOxKqd{cD@U5xUWW+MYglkkk9?UvmBLBGlQ8pGQJ*y# zuarWLI;W`xbFPHsBa}|J6?x3v{;E>KQSYGN)6Ev!U%kDwUo1-E!?MSE2mPOFT5Nlj zaY;`sNFs6BS-rA(L1G=BE357OO-!g1_(C?3BP$W*wa*9nuFD3Y$nIrq*RpeMSCurG zDe+LY-FEJ>-CD2a2=ME~X}PS|3O9;O?IJ8}bII;`=>|WywTv&#PlwSHlRj4#da9Sx z_i(wYl9RI2GZ-dwmKjT3RhDFB%AMhi<$ZIDp2ozH${@iQLaZJ`lZf$KjF&}e?64h2S@IF2T2FPE=JDzI>Bib5qYtR8;wt@~W7qSEE3_5&YBIuQi92-O zt<(lTBaaW>GCg-<0QIpO82;HYtj_@@Yr`fV-6dIX?CMs|I?;G8lHp?#gqIV6o$oMAbE$8Z7-$b27BuUj~ zwmV+5kGKKS{1gZXn>ou8Cm}R>>t9K#aOpd=s_Cl)JK#$zAu398t)FtyKB-*Khbdhi zfeWI{=s1pqXLVJbqh#VYPMu8|KS``;?(ByO0wBWBTfjl2(AFd76G*v8k2f}WT+n*0 z>O}7#uZszY7u}A#WE8u7TJ)tRUA4I|BBlRnEq|IaW0iqC9NG~o(kJ`%a+x?9fSJTe zBOm3TPJ0`F_hHiuX(!=es`=TuEt7lKB}tv=JI8eO*5?A4DVw+APjeaZU%*1nq*KU? z#chgi=P3+ujG0;$uwXY0B9WpbJz2>;wAoV!!RSh!qK>Hz_2IIyYxW2R@?XTvg2RhydwU+%GY~Hy)@QrdltSklpk}rt%RKl) z%5z?;K@|Q9uLh(wbz1l2y?Wxfh`XSjq#2&jjZnAlCEA>}$HOk;TX6Xky>BOlhcRdh8C_*p7suD|)8#*@-N_ zTVOFYfSF%dHNia9U2S08uAN+Wiv0P@yYU~~z3w7x775Q)`YA2qOehrWM`@kj*`_lKj>Y zYt|J$8Nx*Ym5rhI0fh$8iTLCOWPFfp`_1;wOscyN5~-vOf5`Kr!{Q9CdY)wgZA{Gz z$$lZA%o|ikzGcwQC-PFwo4f6~cPZk9xh<0#GQwr^nF_lcF56?xAbd>TDv%oUp8-Hl zJM}I1?s~0?{3q_}AvBXk1m_hWFxv2WlboHaFxt=xjvcuth&=rogq0IEW#zQ%<>q5O z^lor&mX|`Js4%}}VngO`pM%nU2&L(TM|ynpTv^zT<2|z`=UHAQ3ZnTs=J%J)?WhJ@ zuCVNYClZOs@~%lYcVYhyL}#$r?5J%#{(L{z)G}V_&1eY(8sw%>!KBjHJgEofXr@^o z`fkwyPj_V7)Bv>>4fk{0+L@9xX8SzT#j#rNfe;YkMpdxA`I2OjY-CsmnY%yULJ1B`7`L6nc<$zY;{df zKr>xFH-r_{ZZm;A9cHB7MTHz^A!MriT5WU?ZDKaV2Zmy6B@@ZAw7X)nVI9fO`2Z^v zZvq*O_GnVA%?uXnfFK*_&+d1w!HTfDJ@r$Yfrin)h_4lmo%@^arTL%7zVb`~`#w1P zgL7&*V(<)_Rn3^>TcB76AoQbr!9N=xNpu?&4)(_ZxBhWn;1ew4F`6qKsoH)Qr=@wp zUXZfoNF^_>{G=OL(ChZ$iA7oJTDNvsC|zOy-u(fwTh;fXNWUymeF0C8*4`-PWBuE{ z3512RCF3F|XQkedRmwE5cIV*S3{k2L59R6~%9awvvK&@lDAvpE>u~Wo)5P*Y<{KcD zt})|I$6RA3pSHcmOg!CojhT8Hc8wW(8h?#RJZ*lB`Rp|P8k2k)agB*OD|Uhs03&TR z13BE$KFN_+iPH_e+8vPNdVSoB-CPc5?(pejUuvR$_9Lg({zTCK1x!U-Wy_YW#5kLPN7Y;Jlz*WVI3Q@Q@6?D4aXMiK_<9?b@mt66cSMDC~eGkp4z zzAW}X4>$Ow%}2(UJJwIp$_UheR&E&(bn&{XS*^RFk;&qrk&CTf#uur=%9O2MK88Ne+Nk@;x!%+2hE`${Dk@>BVnyq};FY zk8D)5YctVV!`-m63IB;ue*il6NyI$8Ez!r9YAa=w`j=ibIg&OX?doplx;MdpyX*dh z((SHB2}#>sjT2bg*?SVax3l*pd65~8UJ7nHw^(QEfOySts!U19nV)gh(yZi;DDpq;TT;4dblwCjbdg zjVu};EyTImJDGktH=1Q;(M>SbdE*2@nqgWvL7$zKxE}Gd@`q+ILTg-14t3Fqcez_K z%6j}-Y@>gVkQR=%x*gm~hd^w#>EdpM>Fo(iv$!W@^{qb;0S}`DX5nup+7{S$?FMW<1XORxZM<@_9?@0lw&8fK| zui~C#22&(kHg)j zclljfcxP9_%^R||&pfXatHAtU&oz|)d5i}sp-r=-uNmYy1M8_i>-?g9)N*d}srfgB zu>*X_;INR?SeoS(G(t_-Q3C=A+XwUd)H5ZM~S$r`x=kVW(kU%*fMtFXn^O z=3dMvr|DkI`==3^e1#`gp%(MFJX4{T3>}=A~I{QD}X(RY;KO;+m?S_WSID?j4ZAmZH$#V$S6@ z-R#TnUiqAOL`v4d5ulYyqWCAj!8>b2gD`mu;A32kZVM1%?9xdXPxL}wspFoXJvu*ddA<+eq5K`OV}nsKAV;~TOtX+&gi zw}HJO4oj?SUs*ppYo|+&8Dp}KBuAwTvhSwY1C7&sap{M)#k9~EB_hQ*bwx!^IC)h? zQ#g5L1tpxUP{9tztfPggkx4#l!jvzDp=v16&3lhe2t)aYVV2<&A>Jg|CB*p zRNLWXb11oO@id=x8$I0K$GnXG!j5TUWJjPKrq#ThYsc3-0ZL14>8NR^^O!tdT^p92 zwCPUoaZE+k8g;X`=L~By=EfnkdK}<0hw%RI_0K^~=ZiH7#O-Q!fiir`0#r&C*6H%~ z*q>@ud3R=Q0Xh>9jB7ql6;xZ|e|elO-w2+#;0$x3A-de#52#C8r^=hC<2nLmS{tmS zb#2Qb%eWmR9hNj6iJ5}DEz!xl|VL!01Uydv9qNB1*3Uk;fo9t666@#f3QV34S zYPyjZ2ji5Km zr%+qbhX=fer<%=au`Do~+u~4AIj6;@pmJ^tra*H}%kcuuxh<%I)Hy9@3R35`xE8q2 zXMx1ewVi?y=bOw`5A~Cv_{1ZUrr4$8QNOLk2tHgdxv>uQeOKK7A}y~wX~tANNpo| z>knWx*DTK=eppSjWS`1%;+wug7rQ3i|T0=rCIH>i5luaN(cvS?? zfqnh#_e4M&@-L`Zh%O)A*Kr+8E!ca^@BYBM2Km7R7WWV)*o<>dRdq9r@0SQE4(`az z{{Xakn^xFGY6kE#s+6_VImjk`Xj$yVOgTMzFJ|)AP+Ptm)43%+kMCFsEj}$y)Bt{! zdL=U5ta2PMck>g8tq&ib{;fD|l3;TBYeW46x2L@KB(U=gdTphVsCb1Fo2gDlsJt`y z?y5dg^AjO`D~Q#dJ#KvG;3B0CSa9)K01_$LkUMswaITfk3dX>=kkfHU540^Gy{dx49z@0Sdm4RT^YTA{O)6nLS{(}a;R79)L!PehHpN*ed7zI6vI+THEu zkd)Jv?S#=y@Q&k%skM-$=f+NAQ@z5;t1F_y$%++0;p8oUSgBW?MOsSFC^Eth+mvD!&lAtH^RbYC9;u| zbyTz;X&KJ&wf5O}@jpMs_R~&$(re*Md4zcyCKXhq43}SkijM*w_GO%_c+_Samdz>b zyp}@+vXQt+BMmnEm2tLLPf&tja>O;1DZa_iRDrJHyDl@QIq!_yo$Ij|2x${q78$7f z76<$!;4}wEX0Ew)HmLLUvLpxg7G>V5*S!hva&G$#nxEW+2TqvmyFs_E$Np-_q5waoPKeZ&@9yH)!$Erupf5X7 z1F_rg2vK}lr~l+&gB)rwaHnc#99+_%jtrUoIsQK%$DarK@-ArUY-s5Z*jozG)S>ap zoLoCsV7=3O38?V`AJ5=g__NfK%x=1m)kIlxIP*?ZNaAwcvpS44{CTTitJY_%*~9J3 zG$@T_md;6D^L{&iCk3BK8Q;(|4rhIL-)q7`xstV!S9DZ%Ke8~K@tvpGe!CNw_npU4 z8Zj@bq=H@YNk+|xqZfqK7L-Rg?{-K z=I-Pc%}`WcfLf1R=eOIe=tc>QR@7RW&3VvFu}fm4r(s4Fagd`d;e2-JNO?k^g6sQ) z)G)qlB4cZ9w?Im7UQ-9hN*$-R-N});NKVCb#JFopWrI~q`$D&yRW+jdFs1I{x>tVgl0Mw%rw3= zanIp%(@}kv<#%=Eipq*m*O%k^ZYDS&H>H=G??QXuFPbzGS$+K-7+pEaM$YqWnz8^6N}2fRP?(l2HMZ zZb8?lW)=`%;u)L=_N6+x-)DiZ=W2cTn{m-v-6qKhtevJ3>VCG{$t+hi=UhcV8;a&& zcuLGf{@YKEz;zITH9<$W92^~k#u#L^zN#*j2C&R_R{`0N(FhY5vyTyXJ}x=ZL_B6=$1$;z$Gx zPFzzp1(%#je8M;jo&RH)K5G-Z$Pr9_`MHo0j^tZxD^EHR_oT=>i0b$Gq7JQw>W4~q z;14O2M;F6X;uF_L#!nP@etZ`EhM4l^**2+S4y>tvDA(lKsc|!JhEv-C!I664%$MVA zLfomfiI-rz`(z?Q4L&+50{HlaFx_lBZh=|m5M6^zz$~LY zN#rDOK1as_Cj$rWzP5qgItZm745H%Gj|e$jWPVrW2UNq3-fY$S9XRpqiXw-zZf&WU z_r|{hK&91u8Z~il3{2?<3}nvR#n{yQTVH$cARE=aHf`;?gJV;Xg)N6z9Uq8eWTm(@ zRh~_RRuXpoDO^sCp56fiSN1);JPVR2qn<2~C_@_?+1aYA0fwX&pXfg4*0_>BAW;sD zL81)95`KMJF=`_u_dbX-SjZvPO#C!f)^x>*S4=W}OWesH^nf^;Sb$-16NJW3(mh=b z|6epzGpR>A>`}Pu2vbHzo7xIw3X9RQr*Z91x2^B(oA6-aijpmnlXt1?d33>W#&@1# z`|U}@^qs#=ndiPG((?U-(DiREkvHR9QW_O^%1=pgjr#t_|NJGE^x1C{_aJWC9eFLj zqFbuc-$jwO3iZIGUU?TrugzA*0Hy+Ze=0nnkD5A*iK?g)s)+*-O-He z0G{rzhP9dDUqAoU{F{Qn3mzPjxhCwaLU+xIr0xB`6|yS3gZF|Yh}+#Yz4b>tr;KI; zq4D0P-dGWXZCJ}FO?&I9itf#*Z6^kk>h)MS2jsOlx0Irbn&qVY7F#+pKe;psU+>hq zeI08QIbD`V9>G!#&64)Jp&z7>3TS9m<1nE0fn%!7*^V%3&8LJF-x|N7Bvf+7?LYy~ zo_|vN!AVil!AU9nQfeK&mG~}q?*VW0TNu2rCIw;ZX?SYt=(eIf=~CR267Ty|zxD~c zo?MD9F}Vz#(_@*Kp5?!DoYilu?Hf0$lX{!F{I*Su`=YwU8?Zgr%k7`kueuFfSC*WV zz6}}N6zN?dtA6_~eGgO6;Jf(CHinj+0hTQmc19z@AlM%TXLPM^Eb0UVst|^W-WF*z zX(Yz^cHrhCTgyQUmc2+y&rc8BRTzi!7g(wohdr*p)^@8BpCr_PGL~FJ?E_ous5kZ= zK+S#I=iGgn&F*wu;qYkO$o&2FG%>m>C}x~ZZ*8Oy_qre=y7w4tX9?AY`+gRhuBO!! zfBIhWA_0M8fbPFKoxWC5u)-c_hSoRDf6sxnlN%?F5{yc=fcSMC&0MXZw>!o@992j| zYn-}WXL2Dfm_)U5P90#OJY>Gt=wjD<63Km43UxFk>=OHexwk!EkLA0h?tn$fHFH%(){MGTA?y! z6co>w8AIEd%2s4dy$$dv&fP5LlD)?$S;zX`w;aBc5j{xkfE_Pf=Qxv+Y=wd%49hf+ z_K;-B1pJt5lRRGY3FBJ6QLA_97`D^qS7)BTzP&p~A>TG=jVko@HqjX2_8^6x*v`4raR5zE3t0cQu^obsa&tW*BrGDvAS_xSVUY-g z1r3wr?aOYZ*wX938M&n35X%z~W?Bp1ReYjB` z&7>>0a2=exyiOf!Z-Y${lH2>XWMBZ)@#UpdT5F06`-9jkV8cIa&OyQVG}1i;7II&M zeDSVNsX(FQOZEo}bviIp3OTT_niwRHUlJac9NlDfVo4^RLO|2R^ZS&>KWxod9GT%k z>qWl>vB2XA7Cb#J}JQL~eLJ3{NOG(SufK_;fkr!1&g^^_{g2Kqs6{IjStim%4 zv#25>3?ozFABK^xND9NiD!juuDQAPSj~_r_!Zuf)etwl+$6Cj&3YLpt1ntg?$uZ3c zDmC3>XS7(rWkXw2SF!PS=3{r6y6*Yd_M#v-9h=MeRW&4Nk3K`@b0xdpQW8fs%38Jt zm$17~Stn=Y2gJnO+So^UxHB2FjAOChaz4xC(@JXXk;e=c1$moY1Ug1(oTJXwME>4NDhSr{$Y+)iTH+z_Y6rHky<9^YoT%7}&jD zHg)-1i&@o7Ejg zLMD_e9d{w#k*QJI6Zf;m-FzF{LKtlU7&y(;c^lY-&n3UW8S`#a_lV&umtBAL49&+qBMoyE7e4uOYgI2j}SlQh$9aar4K?uZq+Y_t+^4 zjBDQ>(E1}X*BO&<7ZJtk>|5XF`=vV5>UL%8T^2|-4DvmM6Y&sE90xcdAJ$I&jW2NW zI27-8%!?V9q6MBCUoJtzk)Ywu@P`A4rbvdX6%mhMZHy}`Kka5*0n=1XGFeHC`bA*L z1F@sziWnp(TRMd9U41i;d%UX(5klFU2gnmoLY?AG3#p^3ybaTksu(>BId;bzzl}Nq zW}JSOUKJ&fAqIxPkzIupXQgw$QiwF%>Oxv@_ru4eeb=wn{FIq(s%hRz1*!pfBvirDFxd~9UTQ%( z>y@W*CoydckU@L63@S5-!Mb}18QM1aK}&f@8=FlX3o8{Fzoh_9a(UqPg4EUvz{Dk0 ztga2kqu{rh&{A4Gd`VLUQZ~Pm>|cn=R?L(p!&f&Y-qIO~2sSg5mD{AaVzgKSG!J7) z^SF_=g~+>+SJEvhBqm^}oAf>dTjb5E}32DG+Z2?K1rZ*tv4&R35A(o?m z84WlOs5pb80s|{zKo~>hq`0>-E!|d(RzGtz5+2B~Qpc+uc`zDq>HWdEnaAPKI$lTd zf=P6*emaj^%IhuV^_TM4cuEpWeXTdpq+%5Mx{0oAgSyO`*wmlA;dD4JC5UHO5o(H{ zld&}F`*x~V6?GI^V8G^+-9QUe2O>QE^8d%)mj}e0|NpZnM+%FO8aYZrh(e~JT#>Ru zg)ZGUN$HxgQXwiGDy5N9Y^6g==SUJ#)3J0+HRv2QO~*7f_wV(d4%u~79I>@WBYOp=h>>2fL(TyEjY?Y{$*QbHF7%(U%86Sb~!uN zXAkc9ZJPMjqwjkzRRt@L`n^BfL~7d1vg8jDd!C6c9y_9r%-9-?ZyAE2t4 z=Ov1nnfQkjW8DhG-c{m&z5hLA_?zf+*jpK}_nn1Yu(xRUwx#on$IITtIc0T-WAP}s z#qoG+-v?H{UKArUbuWsQ8P`xf$AvVr-`8 zMX@%+dr=I{5Hg(eP}jTMkz%IUo`2mXW`@?-0BZzjjD@*=N~(@v?{Ppk1R5MM_r0`B zcBI&hQGX~jI_+G2b6lrjCjK)Bn8W2(JStU-?fhq&7EVm3T1*Hi(g;Cfb!mhUv7l5} zkocxlSBO|#S}#bfE3FqI=9el85-Um-g@{F^xq?JoX|52luoS5a=@I3K+&Rp!T|MuE z*6a-b8`peaL5;*L-l6`VDUZLM)K7w%IX@OPlg$*fQ#>x68N0M{Y#i>C01vKq&fu84 z|EFfr{}0aAS-LehrEA+AJ>Q!7mbfTsTtg&$VNJz&;(g*<9bQyu-l4C)DU@h64hxN^ z#RmK~$P3~bG{6gD(V_}yl~HL0HI&v@lyhe4p1`xldQx1?WIQQ$W{I8@XER$*ih~)+ zlY%sZc~VZBp*<;1W_q5Kvu1ctiklh2lhTs{JUY>Ca!{+x{9-T7w7)nOqqC5H1{K1? z+@Az<_wN*9nI*G&?^!3O!8231_RO81+@W^9n!mJU9AO(CRsj2l=lnqK#aoBpTRRdE z+VLpFN4sRP8m?nTE-Nx!yn*{O)=1<)RP4WD9&vOBH{lWlP-Ti>?(~A zAQDO=W)i8Tx&p+eQr(%v-qLyjBC)i7CXrdHC_ro|Rh&ueDa{oiww312B+^Tf0>l<$ z5ad>9BuJN816}TD%`-Cpx4mlag)8_{2czsHv+XzBNoyDTO74wJLGR}LES`}$7>8sb zBprN2O>7c=v)`BI9iO6c`7qx5usr+s>`6J3pXI(xv`_SIUp-lGw!yB8^JX92sWs{^ zWj1?uT6$$eNr_Sa&gTyxI_yk!c+mz@3iChz!D#pLQ*1$f8LiECej7f~r{I_iGOBK- z1ER`1Pgjs)kyPoPv#_10PvUbyRC(no3R29Ium-spb3uEHJ|?1O zc3F+M40|UE1eLPNu3XAm`t-_F>80_Pl1BaIPMy!Cw}MV^kXab@?|lA%8sa50qF*IQ z(5(La2cz8!ZwnBmehMl??6&XORs+PQ50m|7VuRJk+x?ELX9#VjECP`17!wxE zR2;;%znXOI>dD?*Kb3qtPmW;=d*++SY8@$;XK1~>n*!l$K2 z^UMDj8UC`(A8-;Cmu%R;b7y|kihtB1UsI>w=bp2my-7cj&jnr;mRB!Gu}SK4cU#cj zppWLGZ>tK<%N3-ot7_24^U)QneDjckl(zdEhUiweFS9wW>SBBNRQvOABIbwRrC;TSM_B&_nb0O_}%feJ2*$~ZYo*++lBRo(SbMR)Ex(I=6+KT;fO0xX-Q7*By+~h=-(^Aj=_FfsH&}b2K7ya#`zJ^H zQYC31Us-+a=+4@)SyLRW`fnISJhSlPydPkhQa0W}K~c^hf|X<;@8*Xh36~y^&8Fnw z70)b$%y1qR2B=`Zlg$Kyq`o-ASt1rNkZ;!i`y&o(fsrc zRh4;Sd@hUIar$_E`uZwt9uoeDW74rMvkG~JCC|3~0T#Z?oH8PYWt7ZfYpM&k*+y8ZD~s2C`N8}xWAxbt}QR^PQBx_k>Z69Ujb@02auPVyZok?*{l6TJ$ZLiZO@zd8;73L|1eY0e_LU!xwfAq8BYFz?v6>Bt3%vp z`QiVuBreY^G}!e668i9Kt>_;Hmdt#f6V9dkNk^1)81G4HT$SG%w*)caqfORB+??Ha z)@t{;9C>SOA+CSk?@2a7FHlm_(0bag1HqI~w<~#wEyqC>+%_)i03M|60#$HOYyLP( z5n3&Nf-UqdqcOeaw~_R$K>)r}lUSzj%bz9M{!(9^-$kyf=NtL-x?$@S=Z1r-GP?GY z6}+3>^~UEV{S?&r2@Zs}g{N0qEdX2g2(5XG$AI2S;`_v!s5~(t2ZgGDya+*xRZ`10 zijP1{bTE0DPUlEyLvSk=G*%+VX_3ZRLuG7GBf~hWGc#-EgGxGRe8zaIGkIHpsxyBE zD%5$mHpjxWVzyMEn7$}_ABNc^gkZl%vk8gpPCSa5kEvxmy{)aR zHPc|z#W%B#j_r$P7QPf#m`7uqx6=3EbQ9p&Wnwca=aO)F5dswZBvW_zw|X<`hRT(4 z>(Ub6vPB)Zy%+aAvaM+p)^$fK>Cg0AbrtL4^)^a+`1apLj%#g9Y*ZHHukM zp?jSm#V9G(9WK&N{YC{{$8ggSG1q!#0=0`QN(&P0$-8z`xpvIBtu>R!RFJCUQGr7R zB2rl%k)nZOo8j(rVTEo=Z7!^EZ1v=E%?jP{Od0Wu@38;`&S!#=5K2c-#`F4>0bcZi)A7}m?I?(qDWSn|?h!9_#c!$N* zIPrMTq(x6h|K&j%WT7^AR;{-j`!7RJ0vUK^OXN12OQH|Q_T=Gh^0ok-+Rs1*2TUXy zH5?#9Rg61s$-zs+Lqo;>13b3mNd}kr0N7IRQ{0kUw!|dy*pkZw`LfPvXKzl{SfLOg zef5s7QE9$0-yxN|P7&JfKI%arx4hox#o@or5}CYi*F8g2oKCs5UVKzPJ1Ft8Ix?Nm}x$~ zz`M;JpscgG2)q*=HUfL0h>O5GZwpZ1{b!(pkO+;b>F^Ql>vQXvi)%#(pUZ}-3aGQ_ z+a;WXBasG1$8AgHh!@ifXjt zjwZy+^P#rJj4yYdB?_gK?8cw6O~pZoEyG31mbV2cB=s{;0dCcb)vLabQrrrXlwAiv zy)abl4#sSLJ8?eLipiNf(^bmBxn3A8K(wc9oSxASutt6YgNV0rhhuKv`0~XSKG_K0x3A37 z+4AH>Hmik%VQ0|W&=?jIF=4_4HkH2lKK4Qa?6*i>CctF zeEW3cqSJ2s_IY%YS?Oqz6n#ozQiZ&x+WqfCpd9JokYiD`J%-Goe zj11?0@@vmoTZIQ6w+&l2w-7H$R9J%HH{82-yZD>b`^WFXRo|>VgkNlUVV>18T;Sn~ zT)JTT@;Qfs=Kn5K#Xz-un1ss;h|e~)i7#EH{7lHNa9%~mK`#L&%?VSr1iSSQyJO}B zvgD_0GI4HiLbJ6NlQ`Zc1xOrC$FtFKUbaaS^p1-R07Y z`F31gF>m_Ji+|QWE!`!)fPF`MS%%%DXPsBJUc%qFllJR@l;fxTZyIXIgxuJ)gmPz2 z$6c?b>M7*+w^JkO)4LU~uQ0BE`DEeKc?WE0)KE#Okg}t~CHx!2PDaF{-%ZwVkSOlK zOjEv5)oEI0{cg&~u?G?9gX>_cT7ZNcz2hxr$PXc4BEN?Hci4p!ZyJRDJbCa4qpK3bYLa31Q`Oo16(kgcj%VRXELKHqMJ%34L!f9RJtCWy zo>i!hp|>HBH2XdVD%X`(hi3Oxq8MPTSbs2^;p=@%k;y7V=!tcbg7+}U1nT<=(pA(Z zAZdEJjQ)HCirpZDqJ(OqlTE4C%~B<41?MG;*k=J+UwbqRBTbJR-M1pUY)-+x}&VxIc?pHuo-lWUUcfNMgq^!`&zqrsmT0 z_E?Q@+N20(@rr5Fx^q?L_&@b}svUW7<-AoM$0C0-o43_N*WloSc@iGl2ES?jI#s+5 zCP3K0u80+G>!$B7CJ^i;WsWJ%Q{MVg`dOv*$BuON8)OM0%QFz=FmoD~mG)94^t@|mN0*XpzVoOPldmqW|=q>ghLml$Pno#xr)w;1Zoj~eTv6{u)hn_Q4*pqs;q zw1-%qBDn~rb->2uFX$2~d#A&un|dfk9=9%H>6A>MDDktLtOR{Zg<#oc}u8ZNs9)cht+PC>`oQxLJDc^t(!T4@z&Go}d(4 zDlITQ>S^>k>DALMe-U5q0zkyD5obNqGF((iAKZhyE8`fvF*I!?lTuV3E* zf4{kkb4#XsDBV9O_2=|!N^zx9C21&FxbOMr=daDgtg&h`(-n-+J?D z-bF=SX)6vKoj{#*P=ht0vC;75L|ZlUgVBz$_M0-8+Nc1b*Wuz*qAwoyTU5UN*j|2u z_#~r?s(uSow!b}m(lB^M%-ZMdHx}MNm?PKM;+*B7;#69-)c%H(av>q0am0SPZ z=}DM|nUzb*#d^0@)~do!U?E$Sr|+G1f61ok-&6er%a!?FObuNkYxH~k{b$eD(u*yj@p@APMuHR@=6wu29LadQz1ZWkRlxwc-1-R#Bx3TI<+G=7yOftS7G*9@@Td z@09!EGowB1{lqqG-~D28sQ3({11sblwB5uktZ+dVhR!GiHDqIq@HyCwYsNzQ&~jCB z^B3V(Zsc?BLul88Jh+BfcgAzB-<(4`EcQ+^7Z;8867ZY7VTZ|!U$iwYU(-puT@k;u@i@et1)IY1cfS%T2%bdp%SAhFpwD)3-_HL5O^wHZxAnQvu_vV)(en z)-W=;eWKNBmkA>I6K#WW%}sq9%Jp_n$e|yu30WKV?QJ>S2iv-lShJvm0e1Di1Ov7L zC=V?tz@J?$v-9@)(k%76*9c;?NwTJUCrXLWi}u{;H@|#`^NR@!#eX&OTLxMZ2ph1Y&lQex(aWLfD8ZAwe9dbGZl3Ya1P7D{B8APJ%st236MK9 zz}e+|=j=+Lvum~hB%+6G^i*Jj^C}X1!eOk%oeniGSbE(!8LtZiT!s4vS6zJG;nP9I zz$dt{_;Y$lhUFpkRJYaEt5FkB=JvSEB2sjB`tGhBPs3n-a=V=!_bqaF-CpAN%ORyz zduN(2SrhF}_M5mtN#cco_7clg$;nYJtgQA$tcjSQaGiX_yGnmRsVZw17885g7)vrF zbUc;X_#BP_R5!r-hRQ~t5A>UUNO{rT8H6Qpqw`n&rfpE3|KjF8tM=9i_S!5@_8mu- z+iHocO{hwf|07Jlj#5$YjB9Gc(Ng9N<(H+&ETIxf~e(;&mf`vVK zZiDNgKlG^N>?hlYaFi_!+oxA(-+VRnD=Zk9Ob0w@EA%9S{Tqov*K*aP-g894_UjdP z^WRQpOgyLea#DSGdFA@@ERF81eAM&bK=3_%jK1nkjHr4lPzS0bSn%3=_lxoEj1{fx!JAfg zs`nS#reJK?7g0<;%YJkZf2V1aH3qQIjrziHrBRCnps*yw%-vgKpzS0YrW3*8cb*0B zGp4t~vM)l%4n8^T+`kow1s=U7+o!7!@Q<4wVKhugZ;xP4<1pbg$FDKr%4(hOpboUk zLe44+zqE=c93upf{`ErHuj*^gX~WsF9Sm^h;FICTVobCGaDhP_H@gamtP#1s?j!qy zvbo{bGtX7OsxCO^jb&fuQ0D3YWkw3;yhZsDcrOlKd~K1^s(i3YI=?=a9S^ZhZldd3 zpb_tqqc zU`*Fiea8hR!%|#WpQ94SM?}?g1hSKF>gE3X<_Y(;3%JL*NJ0p0xnx zyBbeCy#>VrjAJvC&ET-{L;h{apFuLj$1CXTUwp%^v&XXia6Jgr^IM2?PiQ$Ho7Iyx zjNDHoKpVG})&efb*I%{j0OBATDGV(7bPG1&JsQzaf`y|f=T#xBU{()cjTu-0HUNNM z5i2D_J&t*?y^n#V!O@9yt#f)*#zMT;*)57JI@lMmT+d5pCz6v>*T<4e)PaT3Vdy9H zo%dS-y%;1Jz@UcYf(}kS^f?2vF|YvLM-7CS#QodI7-(KzNRDc|7l= zGZX{c*M7%52yTyn>4j(c7NCRrn@_-IAfz9n41m1}UJd-slJ~{1g~+2Pd)XbpNC>fE zebcB1T#0%Kj5>SlfP(-;4ZfsjSnoi>_Wmq~EA^@-r z1hV3n=P0Z|NQ=Y#zHRQV&uS^`>+Be`zyYC29D+Ybr5BFg#$<=o^)$Gg>r1X$kn2@B z%+JspjcpNp+bt9<;5iw1JdqIdKnMb;>np$kG;=^4!*4h`3Yjga*Wj3X0a;WGom=__ zynrz?Gr|OzU;tJ*pPaKkGhi~`$W64LevM;haA54)R-A7&oSoAF6rhu6K7{emJ_amH zj`3yh_#PN4`0v^8f1&MD?5hE~Afz)OJ8r;89p!E&0V@OFf_gHzo614?ge)-h^h6Hp zrMP>1|E-{P;B4^u1?fy`>5Jspl^S1(0c@n$17$&+SjAzP^;GTqkfn?|YQhNu^gs0H z&)#wuA+17Edx_omg1_hH0X4^Q&3pwo9`$H^=}%Mvngp^2UbhW+ zot;~s1E(JNX^>q}ou~9|_cazM1bluLC&I%K>WUEdmiFR$TlOi+L!@RKj4=lL0t@VR zyx4g-2AS8<2F~kcqN!_dGTGD^#Anicb`dQ+=j6D<7#b&Dz(ziK zG&UuS0Ek7Kl9dRgK>`!eHE3A$O?t2i&}sB>2lke%mP(l_w>n_rQhTo^4#Yq(uu}=Z zA!c45H4k9{Mg*K_)`Q$w%G^+{HQVvR&YP2IwCAY@##fKVr8F3>&k8_{B5 zck2NZV_vAM1c8Sby}Pt=v*C(QY&aA{8@o(kAQ!27zXBu_!&Wk0=>EfJi^_I4C*w^+MaMyL~BFb4WKBe=c|PD~Y~v*nicb0~UMN++Wrk{rg6LiE`Cr zdo7o|B(<7Oh{a}zGH2v&@1>u3Erh?Fi7jB*&=FVyU5keo<2G(<91>!W9YjO7G1 zZRA#Cs+2Zz-wm{XQ>@X~zfMy@?m>ucb}LCB>2=oqfp1xkV0wpwCy>&7r{^)_MtMF#6MHP-IUc8MU142k?(^`&YpB-41tNAf09^3isp-XLOwDdIQM543NF| zjW29(yYDq>*RsoQYa6|UR%|w=5&-GHag;-6y<$04lo|MeyoJ7gO74eVdU#`Dx)|g3 zQq=B_H!^*{?do{ri;^@zENd>r1SMfT7@ba2Vpk(>eUBgtc~8LP_gh+xZegaMs?ED*tICRP~ks)|OXRH`r?00o|=dI*ez>E3E zh0rq`G3^UO8I%l5M?^$d8k?$wR18KwOT*r!Qnk9pMPk1pktu#GG=kZeh;ZA=#NE=F z&9)G^8jzzw?P0TMz8GdDjNOf9cOBrA6Rh zWR5>$?F@n;)mqx>r4Zi2Wh)iHw4P+gsIq5}6@uN2S)jVVv^Jp>e(MVt{b2YTXUTeXZ9v2P-TK zMq_n~g-o@OVFe8R8)%!ZHKP%>A#{bXqDYCRg~Uxi-qQf24Z;e;FmGy8$&03zGnzg5 z3vb{}DD0as*H~)d)p1b#3bjs@^=AWaS?7KJ+#P+XSQX^Cw)bbmhlHBibv2!d74GiI zcvjz+VNYr?B-AXlZ=N*ckjfu>H{BP16z%h80AKmun|o!=#S?z#Y_~KHUzhguh9<%_ zqr)8SO?{6$+xLk*FxG3cdpi+&uWiA55azRknZAoht5LwQj^L4EAzOF{AT|U;pGblO zM+y;}@{z+K1b3s+0sugLo%!X3-MFJwH(~Y8wO z8Z3~T^Sg1Y2Oslw%Vvc14}Bd$BY#+KL!UjBxCYtkDMPJm`6Nkc8I1x(whu#Kue&SO zSI1%Xc{}1r;Pl)NbKnrMH=6iK`F8mj?^R^EOg@dT> z!ALPR>c+J^XeyMgSF;gE)X)`!*Xp{i)=_XTan;|kN@d=CiA~Wr{=Dv7zI~C(ujUeK zqBjkY*10zef3&LmV=P{S>0Hxd)fBRN7g_o;rsK?dOzpx9hHHlf5_bZC04g^Gs8hw> z&I~{FS_*=~zJiY#i;*)7T=~a+UC`c%NSbxQ4Y1;%E1LH+^gdN zI-|<1c{V*E%qibc>0Kmx|1okiw&GEx;9TupJdgidEGi5sw zgw8d4$+o{4=Jg!f5F?M$%p3w7e>74rxsK_&wmDYsfF;5;{S#pR5Pe$g>xcl_Bgr8b z|C!2bO4oiZWCCy)|9yLYgi-~jeb(w|-=_40q)mwUTO`OBtf~GC0?zeujW9Q1Z%g_B z#~TpaKV#0d+l;jSa_zf57!qQ|Zp*^7{PrE%^@qyL`zy{yM{M-lUB2_C$_(?F z99`t4%M=5)Xf`e9-LU8n8gv|6Xg#L*BywGmdU`*`PjT-Jv|{O~PVp}~RP3udlskh3 z$UQ&cxlUkfjnoYxc#i#+uHFAWZWO-QkU)K=8P2tJy*uL%lyv`)?f;OSjiTP?$DUKj zC}5aJ0p(JX&-};J3_aKW3sR`Vlf45y_{jyL2eLYGnl>zMm5`bqDxyca4t5O zh7XyI12U8dnY*yuAw@Z~?Qh}0NRt{kn1Iu}5(*)J48L9sIU8QGz|t5z;J?HR`ap;` zKu6_4yJ{5a4*#qTHdl6W9=nbmvsID?fhRspTM+#gF_p48p#-8T$;25^;T5V_LN<@V%DROT+Eno- zH00jS19>3G}VX<_Mj&hmM-uDy@JL+Z{wKY*;vLU(7?iaKE0&iFFcI(ofta&~;z zlEnT{|M&`8^KYm08I^7KLyK=g22VSVY=|qgtyJj0mMB)4wG1PIef*N-+^2yI27lPE z&@GaXj+SQignno_^1Y)Q!=h`D!4Bu>p&v}Iprw#8{onXvJq>B;r&vhZU{C~JzMtsK zkLh~T;OyAw*sxHZszajT=w6845NsaIgn{tFQraN}oPtuOPA~uCS@&1?jo0O?Os3GZ24nw=IXVYmg86zkN)D z0*9N!c)P^S2XFlJ2A=WpbdEdpnW4~~)pa$D@xT$$Bp)&RKe%G~bv!8+^|7nr*M?ZJ zo=O$AlVhVi>K3`T;|b}ltW6iar^A%dEE`dql{N`e9l>-;7m}%b$cz^%Y$##*q?%6rdeDMfBhg z9QPpQBTfh4dplwwv9isrY!RdCbO-_|uNUp#(vEp7|KPjQF!IRyKX%ap8-OSD4zWRP z0{b+Zjc0bSx;0sgY5n!CfG3JfeHpvkh%Hyxt}*>i^S+3+Bcyo5BVc+`9e6s^nIFNr z+W!taB*u1qX8=mDksbvDJdD39I#$u>ZjjyuSd3}xB1?5aH8_6ay5gJce&R^R%VCb# z++TIX@Q*mkLLJFw>|vsqp!uf-!^TyxnTc#r*CNzckI-TFTxC0v9KDE1p?1d3n=7J1 zX_|LoudfgYsw!Qpq++5&{7>$?BK55=$CX~y_^9tc?XLFifA_VuUfu9ZF{!UO6z(1H zy+?g{iIf%5@w+IgbA#(fvD+^#VKq(4avOY2!ECv2z2}#HbC5d6x9+1hP(oO~?49%m zWp)FaMVIbix-5f-5Zu zD%ym$ts*!yw}fmRL-M*9xJf0#Etc^a>RHIp%keJJ5R2-_Md>2u^ENPIKALvM(o1QcFhjWk#67v9sH3il(;}vs&bd75JPviEF zAL;(*N#Jvc#gY~w`U;84*IXB?6&W`|0&sAPjc2>|BK*d$HwGAr-p8`}j+W!`@>M}lZ8!pf$OAIOjy#5#d_Ad3n{2uk`9D9r$Zp>TRB9@W1RFfiO_8UbPv@we@kC z5BZ%vogSqpD{@ z+ggzxnhWDZPAIp!Wo%sfNW1r4(HwjH;U^GJUi@cR(fo5EFcANtjPSOvkx#|!k%dPP zUaG2_I?Gk`gzCN~+r? zK=SNJUI2=_7#y%8`+guqW`TfY)^-06N5&px{x5`g|NV~cKOf}ZBZXqT+70qHh1VRS z`5l+R!wF@ozNXF_Dk?%Fipj1q!m>Hxgg2^*rp~ezxX}7y;8O_6x`h)eRMDoi4HcE4 zxy59r9~9kwND4&M@~lW+h@Gn}1F#}-iB_oyMf+N_Jk^jp{K(4g}fJk=G zHASDXyAM!J!O%@kKx7!9yju^kvm%faAO<-1kVwfwPyTvCuU~e zB0H34sW=97Namo)2IYk+XbHCnvT=ESbfF5U`wt^;Bsi7#sUReBRB2lXmC=zSaM1!-#L58*~?Fs{D$&Fy_%e~jIu;yIM}56SVc5yD0m zNnNf6@4HsMW{13{yNzVdEwW8{T{K;VB3{#m*q==*|3NZsIt6I^I$6LOj6xlgnJ)gh!>6v5@u|WrCR* zi|iE$#AskPO4O-4BMAA?z5$8{Xxj)y(OxRP0l8{4If8k4Pc$h2sp=d`K2x5kk|@jx zGch$-Jg1tcs<~Iy>>pz|Qhj-Wmn{sA! zUx1=2Z8M=F8u%@$&LQN@gtlngfCve=I!%#K7#*yFkYwH@JMVzPt`&$T%)iL1{#%Hi zXS)6rrt8{$PCb<{t5mj&eR7#vX6SfTHAADG!OO<*B92@~97kkhdQ8S28kU~ZCjT!9fb&%K7XooVL1<&`{tViW;l@`y zY~;By+*NM;B^y(G8>eC`nG0T7im0m?jmWK@z_AK{ zxXoyx1P*kUF;Kau} zB;3%T2FReiAsPmP<;-yMHc;_1GKuKGQ`Nl4B-fG2PnEe`8IIJ#|1E##vr@`KcX_pt zKcH_S${V;bz5F6XHX^giY@pVs7^DwvKCAVCylzKO0SOvwpt2ud;DRI7K-tfR;nG}D zP@2mIj!eW~OI}CUnZ!HGA8?lcfu1mX?N^`DHe`xLX_kt7K)pJs7avh14pp7i9RP`J zB&S{+0ZPz7k+>5G2MxD$fhHO#ZDVn895vQ^gZ>N6asRv%@b9;M%Z#PipVBtCI4-W%PaWsuTG@kX#ltEZ{~4$vJJVb)W*WLy{9O zHv~PeXb>+4eKaFVb5V7a2Z?+~u4s;}X_(h6IuOj}>4(EoB04v^n|};9itw=UpKYZ7 zPhjJT5%KRg++|~O7xBE9zc}098ZV(9FrpvxuR+&3)iDNde}aG^*YW_c5%VeHn6n5p z(2U2a2K}yVFqV(Uj{nnxCAhYofm5wF+(hH-vWbiMH;C}?xRJ+=+>HGJ-1w=bi#u)v z*%%%-^0<*pZbbYbY&^~5#-Duz6aywn@zI&$Z~a^9e(liSok25{J_z}5htcqU=@;xi zlo)!{Zc#gDc`^C!x5kV71Qsf1^qJ;RvkfS(a0cZS@?Xf>K-11RrIh&twUXhS$tp$B z_<_DyhQ!qtCdHWed^xaZi9+_ zRR5ks_G295seR$l+<3?`A zq(b9;m^ZIcu$)H3thgPOP;~{=tNoX*1tU~qHs7c$z=C`is+=XIRH&0>5t(?X&yHI-}le}9W^xi@bgwkPSJ+^$Rs5+LjRj> zBx7oY{L%z|?u)jdzS!&^;#6m!=3yhRYk}*o1@@2OMh4G~;qKZCo>M(A`s~NJF?u{z z{eQ2jM>K`}7dk&UqtB$}YS?g24^5ao9F*mTeWBfz1O}64LSx1aICI3|YG57!)M7~D zjJF3pG`75K3~x#)_ftwoW@C!Eh<}5D;yB*0sqv3x;JS2+>pQakd1C?00-$daA)+}` zN*!(abfC%2CgsGD7cFomH`77WHD|DM2xoG$FK1jSmU+9&ppK7`M#NNlm_ViMqz5NL1!RD#CQ=oraCho@;sqw9gWp$ z#Q)_>T)DQ(K(9@orCbeyb79TEtSRUcFR1*C<7y8~_yHrPj5*iUaEgAQOT3s7VCWQd zTS)NG-Eycbq7G&uuk~vTtzRSihq+IA{5J+zgnhCva~FcnFKCDd^ z1{w~@DYJlvn9|^2t_pNLvCPngHT92q-1xKClYg-*60SDjqJB}++RKh%EbCu;DaS0B zph?^A2dU~HaA8dtZ-B)=ciTDFit?YYbO(lG&yO)25j?}O_Oz4@&v4}8(tDjiyWT`i z&_ly+JsCA{Au)8rA(*M+z`5=aCh2yQ>;y(k$qd{q2gN5jHyrkXONyZxf}s z88qnT&Ee{kFS%V`y~_Lxr79zhsw-a_pFJXd#v4`zDaHTBJn<2gxtv*3IndSEP&FiU zPqy2@7mN z1IxQViR=55SkA)@hM+;v5wvuH$@Wl*1=PT$s7BjJ=m8zqdJ>%BkWecPr=^PouFQsR zgmumsYUzT!7+&)=ulf4W_^lPF!SGY_HCNmSGTJwRvpezok z0oM8}~SYCI_aJ2r-e<qMC!B0i-lk$Jkpoqt)qx3pAgLHa z9!TVHN_F$2ZNVL1wDq784Le*D>40-_;B`6h;^o}M%Q4%GqnN#%@sJFYQew1lfUcS| zxR53q-0lU+bU9U$AXKS3SUb+iaT^TPj&CNk3?&mWkBRUsUWqPo%$0xxh{-cIfVlyU z!$+r-v7GHQ$^@N}vaJr~-YPPZIXB79k|c7VTe3eJ7zvua!pLsmVp!h*r0&r4 z+r_p@jRe}8!Rbc;k%Q}=!WCdQMRC4B(_Jr+7571S0-a>d24F;F0 zIx7%t$^k=4f~LdIu5$MRH^g!py&9s?L;W-?o@4z|G?)uy_~-iv0#iN@GJa=>-*A|2 z@C)~#0$m7u?#DRR>{C3)nwL=II-wXAYn6)OjL(h03xE;#C(Dae5+!mX$R_1b-8iQ; z8!Fr#Y-R{n(F6Cw(&PwGGlQ5UGkdV~$F6}Fb>x9#*m!%2pwX+<57zFZGSl%9>&jW| zIPW0J6*%T(x@LR9JQt?|U7h4g&GzDXE-nQf52~`HDXc4XddWhX?G5wj_63T1$ugSl zZS!0npTs|?>XW84T!HH*qk}2YI1v>AG2- zdMg^=9jM6cn0}LTdrA9_S(Ir@L(_H;FA`p4ULx7ttaoe7y6Av$n$X$$eL;j@qdlxVK0*UnMd%dcJP2SlI3}H`AADzu$c2hSs6q zqI{CxYApC;<>UtRJcWI_IKewkyVg9j-B-3iJ-}+Z+99{ia*W;tD&u)( zx<;*+2uv;VHl8 zE!z7&chv$3XB*=ELM5wPC3J%EtqB(R=}#yZ-fTM|c>3zf$kK#4@s5wCwwR}cWKG_8 zy(N2w*~R46h59bL7wIinrqo%wmA~y)VZ~Ej%DyDhMfeB1ru}U<>ni0kEUGUB3RwT{ zmF2z5HSq;~1#HF>;hQJQ)t)|+w^Sum_{jX~uNr6HF1eiVdGxUchns+@DPp&uGP;Dk=Vt*i^jL8(4a(L%1PnSCr;I|BI zB7$b*OABMCGZ=I{i&lxUVKJ}>HmwK2VzH65LK%b!0!d@CSyU7cM z^7Z&iEZ)7)*j-}yO8eImhRv4!+9H(b*uaNP>NjKKHA{{~$IF)-i-~tEnI4tY5bs6S zb^+gxoI1MTvj4+~ibaT(ZLGD%ZV}p8p$^;4m@FX_8oyckDpT0hBN-vE`m&PuqWkNw zGGW;GyQXWzo<{kYmbZ5m!aV)rC)}TCKEa&7@nuAhSXO?3yST-x4@a$=1!JxTE9Hu}eAE%1z{^ANOeH%UMeHELBiaxJa2g zZ)(s~x0R_$4sNSbH@3=O%$>D$rM>MG_PtW~9eXaWx@d86(Z!mHc4d4opr`#xt{GBu;x2+B4sWLPS3daEKO|oAG7|LZ86J&|HZBq zOYrCI&u3?!TX}h(_WmbJjilCxAHP6$z4Xd!9U;CXzFMc>#pC`-c&Ul`Rm4Se)2NN+ zHv*n2pX;)b4f2#HS$fW|&$its(!dgp6jgG$IQ`-)Rq2yEEi3ExAK9PTdE^G8jeq52 zmL~XT^Y{~avxDHOe#gIb%yN_&Zejz?G&b z88=gRT!3v|Y`6qzp(4z9b#p39U=1JU=(`Irg;P84Dc#$BZ^u2+CBlsJu9M0qc6Wb> zT;6XC`(32CkbN%jmyAkRy~$CCwTdOHFR>o?FED#(kLZ~z4BNLqiY;Yk9v76^icMX% z8xaeiGB4NEY=?(}RiRkqFOi4np$`folq?Z}H`>!aNH=JpNs}X|NKU>Uxod~n6t!7Z zvCEX^DQ!}ksYINxWygf>nS1$P6nT5i+3~{f!jiSt3}?lA@1<-QCGqz>V;}d3n5Dpa z19~-Tsf3E!Lnp+AsZ(>r$v&lmk zztp3}Y;wRBp7NH#%g%VZCfAk!*wplv{_Z2kXx(l;GJ3iMwIYg%ihfGjn>!Q8(U)ptf!f-OR6a*6Q$NVsvM_GmY#al-E_PqW-Cd!3C1>eVmx7e1cZXq~HU z+}RSjAy7WeSiMGbR{ZPKruAYTRgcdZo8{;(oFq5n)zsN+V{F!I1uc5^h9u0M^7JeE zoAMT2cyz_dcoyBaAN6_yS?iCh^$C|>ojaF%ZezKZ#BY54ofaEjT5S@0Rnqan;ncYk zA+pa(FWWFWv+oI(|2{mj!LFK| zTRs#b1LqY?E1OJij?Q0glCrr>=3_>~%`4M0}yx$|=Pd zxVherr1GS7$VeZdrrsG-T$a^g^U3|@zCHWO#BUvXbvE1m&HJDW%BPmsB}_f~YrMEt zT!`lMt$)1uIBU*bqXTb{lpJ%s%c@y@;t#d^E8_W%ov^^aW- zTln^5zUWWv^0{ziHhEI!lHF?vHP`j$c#nO=I~M@5!=dx@>hxrABHA$`9G0(IAM{$ZM2W$ z1>)2+Nv$18{`#;hFEfuO+MpI;_pCl`H;tqp;=A)?vwzy*A)@YCdMpz>$$#(b%*>pq zEBl4DcNt;oH{*=f&oNMlM;a`;GNVdRDBG#~L&zF^h4^iuR<$Pj6LAI`m*}axUCg*( z<@LyFQO9G^l1}~WzBWzuH6Mh0`g_ElhTI56zB4#v(ymNb>~-o%UV~XEG5ZW*esfT^ z`=jb2{=%lc&+jhPI*{b4pKwxFv316>IOV;K0gpUgj#J(Sv8(%M{BrEcTJ4-d``?n! z>vTWaKl4NNFAgs!*{*f#`sIR7%G);K&8cg4ZeOTtRzx@d^U{*{^w`%6E>f+qX!+xl zC(e5=LO*I!bHRI=Xv^h->vGlVn~vFAoDO`S_h3g`=gp@G+;#i(;m2zzKSIjSJm@uL zmqx@5Wa%>oX_`WmUe`MZ=Y=v`g;F0|UV_bh5G3pqaii;xhh61$1sm$mra9lbckcMX z!&`Lc&bx0IOdu_tzOvB!m!)R|Gbp=yu+Lwij@_l?YIt`^{ORAY>yZ{c{McTE&*Zov zDbkpsgr9nL>dQVY?c>>qu8f!1&GXJ{)EI}O_!jM5QG$3iLsGqHGkc|sRZ{S2R z;RobrPGP6rZ@vFrQmrNhI^PYNd$Q9_8(LbZQ%=-AEOfei!aM+1svf>uTU1x-nS|s> znXPFYkXh?)*3{Ow756k2&fUK)M$~M{jdQAT*~lG)`37ATglk>pPAibxavnM7XgyAt zxhEyN*v!1~-05`XfhU&J!rJGP^k~yG~|$ zsxf{l>6X621>&@$v*MRmc^M$ZqlrDUy{m$QM4kBaU6;=hxtTi5IEr)1Ja-@U^4odx zt!Ib2r%mli^cDTpN0(H#e}VWE5f_O?lmFlsIC^a zFj`Qg;jXN5wp#KdXJ)xaX3@@7wI0Z+4+|6km$u1-|7!g4{F$Yx7W)s8ysi~BDIbyk z7<6GRS@^xEK+p6gY8%XTcO~7_pP6^8Ap4h66^OVim$WVKld81Q5&iA|5%LyLQMKKfm8y_x{&9YtC>uoOjOq zKF@yk-p?6W@M2%3WrX9uFGB6xzecySdS8j!hX5-ajnlSwiLcbonf}~CvEO55<@EdF zDg-Kilh@dHe*;sq2eZ?Z4A5u@#aBEfexE#4m!&naRK2thzfHe5t(SKDbB9&_dfebU zWY8*UsQGTkNB>37Exdkmw@!@CLG9~zoBCzKdMl zSB=V5KOy$5t>0&rE$g^(65Dc(Q0%6n_bj%3f!QFKEx|Ohj{B>iz}VV?mr

`l^w8 zd+ozi*nC7qDvsQtBoEE&L;&rxA?ZnYdAEgVo6U)#C)G(cx@cQ*kE6EnLPN_pN_3Tj zVxXn85&5_s@2@E`r*p=&zAeVZ+?$4O+pOr7rV)z#IMK!59uQIII>-Ri;Pn^4YxF4< zFDF4w7>X!|=6$(EP1X`INJ(Klm8i$6e|N@>mPhVjL!gRM{2YIWe2YyH%$+wv12TEqW$*hGKNTahV6BP7J^f)IvM>S`;DAvpC%(w$-m)7g zb)*ll3VE~UN3GAFR>#l;vxTZ!+)uQ`|xL6Cu? zdJq8bsuP_$5wwZzj(cHm&o zL$0NgR{&o@dz%enT-#&!lI+$cDcYpnU4*feYU>K{4ta3i4M(7sd;OM)ZLXZJ?RTiy zg#>xtfAE*5Fp(`9Ja4NVE3P)o(7v-K(!=d2rvA5H;5@IN{6#<(_h8-@(g@n{#D`S$ z@NemBBUP4erF1{YT5o=_{&q`r5OT@4NQyXv@j33UZ~m28On4cQkWG&Oiw{$W2m8$o zS$7z9^{GTmLUQ%WoLo0ca{Lw>!APFKaG^}U0uhI)yTeG%`oU{)LWi;CKP30{Cn#{` zP<}lHq0b8Y&Z^!J`-XqZKs%i{VqAWpwNhPA>2;+icbDvIEcOi>kERXig!x6D#jK!v zJD2d$rhhn|PU`Bk?L@^@s784p3E`AjTD8Aw0`cAQ|=;=r;&^$iBj+H$7vxr%$Gs&0kLriUjj-( zYj!Dve2T@|Ve{3_M=*#Bzr7DTK?dGB&^+hdmHZ8U2>Xh^pk$<8AKd;3U}mved?(TQEC!{xFNh{qgi5^lXc*bCB~;W%^_N??lhF_tqw z@dr@En?ArOae`|bkj__R&29u4*q_JZ?<`{_>TMA@&&l-ZvT zWDR%I!d3r(0mNz|Jki%ULskz;eI+&h7pcK`{)^Pu7nmaLJ$)N1&J4)t%VJ&Az=C3W z0TsJU%K`^_#bv>IPT9PAxt2`_D#O@#!$hiRHj<^k60*95E&hx;vf#i`4_AYCf@=VS z9XPrAL4@${oG{E1{h1RIQ=g8QT2enay5ijjMXFD{Lo03_|Ln+(7Pnj!kMjX-X^dbU z#!$?9Wbcw4$XkbD25Zl*9q>}G^7+4-v*g4^C-#_rO>yMi+_42c z6dKDg@iOZ%bx6`Y{wul=?smWlS!LpVVQP=RbVI+9a_xTM*jLs5&)(JZx+pn0zm(hSf~+Dc@P+8=oNVW`5 z?1Kc1Yc~0yuQKxzTAXqj6vJT&(;>j~-exdt<+j^bK7kKO4_{OO5^szzo8-rktW0oFn4jyjLgRn7O;Bd^sdAUQ_K~@_^Ub^|zi4(YrK<@a1Q<5^;r8RK@rujzJJr9r%$umyW*t2BmNdI2$W&66B z(@9ZG4PI$boyeP4UQ{y#txNDfhl6RA@%KhO7%xq}T<31@`tFT(U@+r;xE_@gNzqE* zE@3zk8UZm$IzfIx6Zjnsr0`1n>qlj`B!;nZG$_s6nbROTy-W(n<2G9=^^tD#!QV_*NCF z6*)A*@mex467DtJBpfGP72G5IPa34BhtBwNe77A{kuQ^39wCn$btgL25;VN2jMF&e zh8aMw-okG|uFp$K-#0o{+9TUeccD>x_5zB!=d)p>nzJ(MaTkHc3qF-&J+^BIRS|b8 z5{7|fk$Z^Hn@X!idfhU*;RBha);$OIXS+xL+6iyjpZx^L5a#md=K}0WEa@&8FS6*@ zymS1pqwI}*zEqvHX_-4Kb9W)25gdQjZaTW@>dWn>aA0}ufwG&6_u7wZFLI*cr?!v6 zQvNX4dQ@K>e~Df@##QZ@%u@)WVbH<0a(91XoCTsX0vzM$J#$^x16)cz(sTH&tSfog)73OeR;)MrZSAbL>bbdEqRP)UV*GF&UYt}V$;ha#S)}Qv=*(dTB zN@3i}R5Td2JDyJ7{eF_xCs&G(vayIb2U zRfr_qH75T_;V=wQ{`fZpEV|DH#O*abR&|8TzJdx|BmG20TCM9xOZK$=x5NvzGcjP6 zWRih%t!)~K6TwDM*sl=-DhdMaO7dT7D(Q14L>Wy0(0?)9LRcmfFgx=s$37FNh-OLu zk@+Iab4?(}FTpG!S*X)m3d;71b!dj5^I@1BcT3#wXoFz23FCL=fxcH7FfZlKh*EHN zYK8+jCHlRn+zEea&ApKbaj@3Zor-8Ow>#*}=OfTu-8hF=2bgOI*C$Jy2-0G%)9OgBVw>O7L#kR3F0rw!2R?n_j(7WL5 zdZhP*FjtBC7v}cvCy9(%6C^r+!Fns?4WbWW-0LAg?w-U+wkpOE$14@(0a=)`&~TA| zpoo4a1Uzz1?4{T}d)u319Z=cUUK@Px_uMKZ88;qh5_0=6pdEW^a+qyDaB_drX)~y$ zaZrru!NWl`xzbdz6r}QUnHH^zLuz9a7gy` z%vE0xRHxTA_|jvOR(vip{9op=AT|7%hTU_#}xO*r-P@3M_pX#pOztw+1E3CUUY z?phT>P5eQA*6;b(V4;s${LT3_<#x*UNvW`KR}!Uv3z5)U@upK9cl3iW1K4(*nHbNg ze@z?&zMt6Y=^QwK42}kUpR5KwLQj-wqls>FZ5RVq;k0DF z4?V9VWY2s!Lp&kNxBcHVq>E*%;;z(D8U%yJ=^*WhBeKP?SX)#>PrWp%9)yE%E0g$_ zU&VM6&-@EQFn#J$Z(|T-c4*ek;Ogkr;T}4f{76_A*VygbCMqHT*+$k>qDsFbvIO%&8$4|?y`IG= z1J+Fsve0?t`SI?n23daUMv$1BUxZ?+lRBYk`@*zCaFE@b#26<0I`wHvw>^qiH1huF z4tA>#v&Bh~6F@5&1`Xa)4Z&lB#S`t;PrR{Y`M)*Y^b6inFvBS}A)0x@@3Uq2Q9%@+ zvBhFUUjfqp4lIUf=k~?%iBD$T@A(R&a}sM{;x6!q3t#QymJzM~wvCL8 zvUjK&6xVNI#^bN@1z4o08efCxDvIsFaZF|1Z&EB+IZ6yp=|I;h;`qUhh)>>Ejjt@a zG3^V--%49_M?H^7B)$|A^)==vncKnn4)TjSx&8k|jL?CA z8rs25b@<2SLlM7_15eIQH*y6vAgf{@ zTXnBE9tRnE{csp$A40Vz&DvOB-a(1jakk~XY8<>VBq}iO?l*FJAY`HLrg8bm^&Eo^ zB0LceDx9#e4MCJ>t>1c_~shRmqpsZ6hChJ%!QI;Ur;o%yy+K>H%+eCb$}iAi*A|2cBwq1+EiG*!I@$%(4a-iq9fIu{9#^ zMFlcouM|rEsrl#!qHMm(ouK%uBoW+0<C~_rstr)1BD~%`8Zcs3o>GP>8hU%q*Z$Ce-1L>Z?SD(+oFIuyu=nh_1UP+MI#MbA zzWl{j^v}y*ZV@MQyIHck(Z6SBEK)46uMRE{ng;P>LvMUlU%T+cZ;Hm%oyBKIV_r%t z)0^(6T|uX5`jWqIWNQw+*|U=EWV|-A0_89~2*=Ixsxjmo(K<8n+3AVY@*n0x^`4j* z46Tq_D95MjD938gC{ZyyLAFxTk+Iodgx1pp0pYkYpHc!-Ve(Oe^Ivn>LQ9IzTR-@VpF zQUqBRNJC%pfQ&1B{QOByN0#^+yyGvRfYzh8?ElrkB07PIhzRo~`OI{addl2v-u!KY zsK{FnuS12>`w#wTJl75dgQ}?sQ>UaEokDtwvc@T~I@LmNz`N8u>fn3aqfcFkz66^v zru>0&p>H;CQ9dBa#-laA@a{h$UPoi!7Fqg1^n1uRr01VNF75;36;HFfa=_cYK*sg} z48UWYR~ahz-$}%{V+Ky5j#w9VlH^nm$7%N~mo_c&f!#V@0i4I{r17`KjSe-;TeS-y z91ndiPzLrknFmjlur#}e`gr3${A|%RXi5iGZOJN>LkjE5xXxYB7Kx-xMeO3E@BC`(xfllhtve6j>p+G1;Q4Yr{ zOr9wRz@NknXxx$d$BpA)v}M;BR@Xb@!*LgwC*IBrV<3_yxGQM-h8%{2;7IwGN!{rm zN%^b%N}h$hj7=1J!-M4~4{L%#WZ^gtF)JF6QwcdM8j)xPQy!$8T2Q2EazP(%9^7k=#k*t(CAuW&ftUxIqXG(;vdlOV(RMwt@o|(8Cgt0|fBH6N~ zP7ND47pB{xK9;@*Ti4YsqY0pFWF!LhR6c(4h?D6(F(CN1cqu~$QkF#GY#1`behM9za zFkITS_1sIYx?ZqKI4xd{u|Mg|31pK0+!r>QKuFB{3t<_V=3yILc(|RW*-HM?;T*@- zd0%j!F2}&;{gfv#WW6a9un6>#VdyZR`8!MW7%WP`UP@&w=S*f&tB)f@7vhzv-1mAA z-u!yQrFW*Sv(%dK25CF%<4wiN6~9n%J^_E#>)w+!Se=|mqGOhqy_}|ez0rSK0)?=H9=}BA)`RM?*wWcLUmm2R za&=?a(1S2SSox-|TvI_K&u|CjY8S#@NC7t}KQqGPh%xWF=H;qcG%gh=F4dvI1G+8Hzm!?h8VIn&&z8f2mwqnBt!Us+CVYoHw7AofIJE!;IM@SLS0& zHCr~GOe4?xMVzV7IKuC8A9^S-H8R!C4xg@-X-493-~S%V<-N9zPTS1~F5kKHH0`2; zj*i&%&XCSM2MmPW`M>N6E0G<7PspDV6QN~?Iz1)Vr%1AR;zg=D>P)lzwAU808(C`x z))tH!o$W$)5kbXD1L1nHm2}m%tB$H0swykFk>>E{gFV7k`Ll`}HfEY@(w1W@sjDME(C=jR%e~ANX zHJB%OBo%-}H%@>26rVl&JM}Y#y_sJunyLin`V2&C+ekCtzZosiGNI)=jr#;^U5@j- z?C`I`@xiZJ09-h5wdSAdxarmz$M_Qe^T6fy@`g&!L3fGJkIg*ahqLufwP&xB`G(rZ%LrLAB4fUT&|yW5 z{er0uE}-W0(9!4XXtru7D1tFQw;y1AnYl6N`}@HftNf|tdoWE9zm46c1}5LDsv@0V zC$e>J>?M1y^d}iP6*tm;b#Jt3Bn7`-dMfMgg52yl7rc}ykOlUOk2KLDa?a7@;@f86 zbj9m^M>?Ot4|l))PY)6Ss_7kgg;~q>p4iXNSdy9ZAXz6nCSpL!KQAST7c@-%i()Z598m zCnYZ`55WNcwP)^XxMuz;k31_ZiOPv{B%9eNp{MH1AH0h=RnhI>e+LSoeRAUpNxly? zcn3Gvge(I(d_xqntaE}Kw9?BUkKx23eD?m_R8Hvz1bnK4@lW3$BXV=`*N)@9|79k# z&|h4Ghs^G~yB{7{Zg#dkPN!m zor&J#E@)CUNO2|Z4%_~4pPsat!}Lc8eF`>v35py_%nCCPUuz<+nZy#)^iTuVHtbaG zzJ4m3vdMD!@5h>5MYgG*=CpXeL}<-d_nl9dBg$6KxHE;F_tbC8G^G78YHpTtU2h2w zoV+q{TH{^oA|5BaQfD^*gEL_;AZOrbHoD#(MBZ*D>Md-elO`m+a`@7Cvlj`!G$oPN z8*BSOXoaWRXxl|opLh*dU*nc*SJ_?Bu@hBc<%+n#UTR>FTu6Aq8mUzN@_p2oE?8cX z@DDWAu+!)$#+-JLh64P6QX_-G7NB3Tp8_8AJ+-D}X<{O#oI-+`+W<*s>BGdQ~jse_E z7Gti8;nR>1D?o=3$56ZKDaXMm?$Q+4HLF5SS+949~_EgP2nz-ARup@Nv`e7ji+ zBAX{sGI9274B47GpKQ1*?EWXXNbWQ^1=ukvCqh}8HI=Q6j~~e-f{cr((Gsf{JP3=T z$eB$-Yf&*B$!OQ`TTEmi+j)YX^CpLvk z?}%wbu`Rp`nf)ZLZFT$HQrz6Th&N^`e#tX;)kd(7pG{BP@G#~BQOXEFl8iQX^|IyD zF^}->w6^0e!&^+YrS7pfK>e5}Nujif*nr!VeGD2vTmmjM92FA}$$*@qMNHy-NcgjT z(~VZr&r1s7Tn~YkJPmwa(aO@NX~G_kra0^qA+Zy!@#Ba!mm!v|V$w2l@tEiSy_6rm zA6e%L*u;*FwbphYDglFK+OC3QQ8B5=Xl2$eqkAP`X$77ImMC}8P-DaeCgE3;c z_?6LJm9M1WLjO7QmC{F!_aU**FsLA?Wgv?*VqpVflOBCMUS)524M@{qpt~)vSLw#Y z+_g#1FdJKu#KfQngs*9|8&CEIb`ZHsEyr8(q(%qB4)0<2lB!Y$WJv*QVx@riryFX1 zJg4hY3iQ=zK;U3Q?pH4jW)(ce!~_ z!gjaoHbc~z_BI=L56D8YK0JZTrWwuVmq-irI%f+=l;ht)?eBQ|g)ft$3sd%3%jjWB zP}HP>Vot)DTnk0qwlPS|c3`F3>uwz??v~DYaow^bp7@8RJU|F7G1KME1W-YDIbYdnZO{MtHra*gEc?m_Aybhc9_dtbF0(DIlG#jWe~S6oQ+{T&a-z+s-`c@ zqgBkt3Y`Xa;RUrSn!mmAX$+meNN!py8LcX!KLB)BB2g>dGyNv_B?FWxXbhl=wIMuJ|Y{Se|azc5t3T@g(k@tVnpRW#Eag?o>}M!KYW&f z;f=)ZyIqPSNuwo}5Vgl8-o>bn0e$oW895vkw#!60gvvd>8>#|AwC|&RXuWE!g^}eL zoLRR_R>DdX@3ZpBR26U7gI_t1FfX6tdl=ecCCD}F%3?ZN4kl*O`j3C7^ydpW6~Lh; z86}O3v_KUZCH2o1fff&dO0qy@9VIo$7HRQB@?^D$UL>sLS51qUq-{9~icR)kCVbCt zD3K=3u&4$R(k5X z6q2FOFt8w~=|LeG1FMR4Ny5MIvB=1k9-@IjiY&KLbyJUURlI@Ah*d7r7`-e8R}Fd_ zLKNfPCHJXu0hAUSnu9X^`4LDo+Ym3w2@7Mc4!WcIK;N|S@@G!nb0PlR0mn9Z4L7`1pwl!@slL==s=^$J882xcy7NY^ZTbSY#rcJj8TwjZ8saG;+d-7+*Ac5&)NXZ|Ur3V~_)~x|2`W2ka3y#6laZtG!^=1x`5GeMI`597@sb?%NsRyHAlmB2L~w7{v%}YD z=>FuCb6GGZ(Ik@71Rmztf-J%TRfK3ymXm6a)dOM)ybmxDJyJ~rCV3tt?DV1G&yAL4SU#81MyLA; zvL!Q&0OITXrv@X%V6#)>OrBaK`yTwV21r1waNf6GB^&b!$Rk@r4;bEolV79GIj(A!ekxLaf|T#C34e zUOZhPaPW`6rUP1>!+GK;*j%`wqNA|(szZ!J+f#)Dk38i$53a9?F6O8~vp5G_s0AwK zC@F0=UW*uLLM)zPj6RzR>k1IzXku_Hv=~y*!$evj+il{YPDye(y|8u=U`rc$HP;z~ zD+Z+>q&XR4Vd0fzG1T!yu%n!kD-A(nHsB@I$5ohFB=6~oCGdZ5Eav#l=cp{MU3Qqh~P5}?`Ko{?EwXX zcLaqbc7r+i^&sSTx74&y(7QJ!*w;jTF`Z!6 z9#5vp_B9l1mM1f4)z*uARG<-kaP5;&!A6^Mk}KtzS_31ZSu!D-8Q%UU4Yb{>7?+0M zL{U#%yRIe|ZC^@DS@{(r{T@?Wsw?wjkpBwgl4y13Y)cruzjGLcV|dvh+?{Tyz}PSm z^gH9>cjhaReqPUI0@16pUa|j zE{i{#`gxMaJ~{2Du&hQGSXOx57D{J`xDl8l-+d7N+8tLf-t0qF+|Fi)jS~14ih7)^ zMF>q9cKF0>a@B_=jlHFmiQ;G5x*#l6&>OKb0KS$U&`Yx9$z?H_492(M+#vWwhz6j= z9o6q$`O-V271GPxB10onKlC<1dgaGkS3ACh^}eb{9N+iK$*(=25TU+(f35F!edN`Q z4?KizN2&ht198eoDIB*umO2;?HBBgDNYW3 z*q1zEuXzofpT}yiE)N4#3Yda#i73Sk!G11;>bsR3QWNk^QQFHQng`^-USCI8_iq!#W zr%^ZYvvov2@)@eziBWIjmsfL}yhlpH+?`U+Aq(XYiviM(p^7UcVbTG~JC$-~ls1sV z$R)`Sx@@K&sXWv<3yP)KL0=!YGGrEeS>d?e>#b2zO)hRAjV5HlFlNOofGTNq>Z}Za z%9LT&!b(dqL#<;^3SK~sAs|0vXi}@UUJQ@3N11|;!!cu^Ip#d=2HobpM01?^yASSN zsKdBxc%uBq!RFL*8EEb7M(z?e?q)%q>=Z9u=K)W#3WbrQ-#*_<9c^-pR$VbhCi|JH ziWm3yjR-=88C%JZu&A%x(7O0i=oNKhqMGy1TcG*n5im`?J|yzagCDU<4ikB!*LVP2oh!u zs|QAQZ4ok~BzJU`y*a#mx!3n7Rb?l9sv-LuvbD3X&M8=jC90;jaU{p@DaWt#Zg*^- zZ!uvF(x5!TFY}l;Lb`QxoXme)U)HUQd6%Vfecnme|NT^Z?ILJBydi9A)I16$6Zd9( zbl@m^tKRqM+kGPP(_HH^@6Ek`Ls<5yfThiq##=^a8NW_(ZkmYYYUy=tp658?DrgAy z45jrH1UQ2&XHPrIbzv@DkI6=@8%foNW*B2t3JH#v?T(z1?D}pesmMlA-$j=oy{Ja! z8Oci#yC$Ej zh0-JLgniXU^$oetYlSrXQLXU+=aoczW*N02w@i|Y^7<7X&;B%BimHYl1Y;?NP?xw*~`1+Kt$!UY9OX zaPeDZiu9NZOUyU2F;201pwu+#?or5QRP)HAWP9|twdij%(MQN(&XR&h)p#qhtqh9$ z%$WCA=o(9P^$G{!4YHY$&vQO%+o+ovxB=0BWtMfY6O!_`f6~pZt+LxloO-is753qj zXBz@fjsie8R{U8?6w@-890{CrX{<=OMzku3;-N_5N2Rn*8x3}ge5Y5jl!e)9Xi0b) znL*aYh6z+L2`1uIOt;n_)Dx)CdM-*~m$qR=C-!Z~_K=biqz45<82ntigf}1YQelm* zVK)h~--&)Cnf9&@@q{@`d90G3D2z9Wwt#6mI9_b5ZAQ)@w*bW^e4~->*EQ+B-A_oNxtrx!P~p)b3v!Od3lq?#NK2ey z8BvOcn*_%ovc-}~q_E;iBT|GIQkEI!5Mfh9K(E?b=g7*G)l1<;)WobXGSjycFgsCW zc0^am%FuCU>kRF($!nNXoTjFSt!&Fdc>&8IyAOD25ZSH6W|L7;(ns?CX*1 ziso1cJ0pP?H=R{l193N$Ot*||kqCP?l7G>5tjXl+t8-IqeMkIeQ$JF(iy-=@LJ#(w zt;ey{$NwziPt06^KM%0{iI|PtCLScL|F2b~125qxsj^Q!MA+hy95eE}t2K!oTFNHH z8iTPW)H5<$U#1GpSkwI!`LXR~uj&oak|hjMI7syRxFL%UDFWOd?xXEm8mryvZW;Ur z8M>ds2V*HARm=NPXRq^YmbUaQ-%#z$`-+~AZq(Ox3*65;b|**Z>mPSFZ(RzfZTb!_ zqqr}Sq;1{@R3JJgkPQJkv@od6Lsl8t(x|x7s@e~V+;p*TbKLj3jXz3$dtJ1=JXm|T z@Q{5Sjh0l{FEoMQnpwggnNHaN-*58RIePJZ;rM=iIrlj7X{5D;??xWB`EbRJ=)tG8 zVs2{R>1y_~pAhlj0ZWkjhM*T?t#zYcv$O7xs(@yflWQ2a2uVJ#$mxTUElrLL$gnQ^ zq0>mqcKAY^VskSc<(tp_P?84f;9W_}h4B5(Sxez=&I#Ax+`-2kz9pOZTI_s!5c6{I ze;d!!ib``KaIGHV65!Oz{O*EtG-M*@!FP@Ywzqk zL|jBlW663c=zx6bjKxN|oi`_kkAt#;r*p^(9u3VdHzs*0uQb6M4FktmJ*48?xHxiw zo{75Y%#p+l?`}StOY;lfqFodPr+Rc6ytSO_bn43nyOE=upnIneLWDGO5-G)LcCNa` zY4~(^>ERm;4|NTopqJXB0L66AI}SrYEEudLKwuT+su|7!u;wP%jg2ID;=j1Lk+2V1 z5_e*SzdnsvLKZhz5E?S?Mx%J(I1UN`ttH-q;1H88CWkW=p$2#rg0cL#o{WU zw@VwfOY<=*;N!KXE~zy&Y@mik>;VGI6J>RLR4;d8OW2uxA1YR!BCA3=h!oO%CPj#a z2z%FqKuIOG3Zz{?So6D8?N_3m}gpU*!Em6Y#Tp;N!qF0XGzrAaub{ zc|)prF}Ft+@Qq#tYin8DiWTLc%Iw744NX&B%Izy_Gh~0uQJ$qaRgB$yCbfqv)rkGq zZ!n$)Zobh?WaZpqSGL0qSYwC-EU+ZUeWK4~b9ju)B?%+6^_YSypHNC*jXqmY&-Nq+ zMI`KE_x=_=!hB`fJNzN~D;L zK&@D`WJ!@!l(&`!P>qt$R4w&9j&qk~oQ zVgQt;Yg>AzD&(b%vO2zQFk7a*O?^2_CZ_kI_&eV?xweIN>t@Hn6J>CRl<*Rr!N-Vcr!zi8jy#d8T_tdR8yB1IMX{Mb&qPB z^26SM~@Nn8rnx5`hI6M5}O1@~0CA>yJ^Cd$@NKnD~` zZ!9R=?cP1}sHGg~v-+xjVJZl!LEM-2RY@t1B-U^3@hY|H<9990j?TE-qpH;C$73); z^j%L1k$rYnrinUU*ugR20>0q-`09*2HI|acb*-N~M)+Xdj*lvheS2e$%qrFZ9Do2? zOh>;oXv@(p6H4W&EUaaNJt(zs%gMC!M0T&GEDCk9hSB}#6~fS04CAaN^>Pp>19cPy zAx{~4u?m&|_}TyADBcIPpxj?S$pIb3`@f3c#kg%~BW2N7@=L%r*_b*1n*-yVX-an1 z={LU4gY!JbL~>2kA-UrzIfsfh)OF}PoFS@Bl4HI5 zF~_R31+*W)ilB|jzTFf`X4bl%8b}?`D#UBF91V`Ki8FlJ0J@2 zG=@wNVDdHCn*ToE5hlZfT3b3JL_HMif&U%V$Z-3p+*x?ZzY+!UbRe)7EKv}LgOP?0 zN4+MT zk9a39_^H_!R;wL@$c|V$h`d?Si8bAV-R8T)*ZTJM1AB=o;>W$y9WN}kK2FLx1(l$> z;jSTzE*J*$Av$)0er;4Mis%-MW+4AU*#&z~X*5ys#w9DqSxFoBW4X zE~f1dEk9G4(W}hwyIZjQ-(V7QJ?7q~KNa_2U@r$qZX=EdBaI)FCYgaoO;urj*|3M}op$aJ!VooGCC35`kz0Sf z`<66IVUQw_7H4wBDz*ZITR`*EB`;)mdkQ{MlxvJ`b@EAYjoh3&;3qaY9q~=@ z%joack$f>XkYO${i#?z?b8dO66h1&pm%BP~F-8$RFbozzEDIvLN@ATAMf3_bL@6_j zA~N&hU(#{ATSx0-oL(C~J~q=KD!n|j?AjE#MmSQiAa4#gyJ~OVTM0t;S!}iEy|IOD z-e0*!px*p8blhjV64m|k8p2EbDAdNTXIMAUXLqH9=%F~EnWdHifWKT(Y39q>o!x_} zi8*U(sb8FPJF{h>+wReo&fv7wJ|>awaiU8vSxfqSp8LZ-H-!3%o(}uU6f(VwD@wd8 z-Q@G^G3GCG!fN<qNmLsn7C0U*?Q4!_GOw$Gg590iOkn&stE~>&J@> zJ^&piBN@6omDk=atM~OAhZsWp}#Jq&$?1hd2} z$rWqK+G1&&5*w#uzCX(B3ftJ(Sv4r$6^VD84j?l2e$#G*9j=t;wpaTGvlr3#f}hwZ z885A%gB|$GI7t4!U-gltLVO{d<4wnCFDaTwHNJixKc^H&oEerr@^iKhQXp;zY5=ZL zH2ioGIZ&j7HF$=#2RTec!hb(EXp(KLo;;v1c(|7LOKqq-bVAVNSGWT-y5>qT6!&`4 zdUOj0v6V8XwiiInR#XODBN)*lhcA+Dm)p8iL^Ah74-!7}5&VSx zLE_S}E63CP%$?PC-cE0{s3pfC6a520wu30<68F(G+caeHok!Qh<$-rG!D;)bbF4RE z#0x#9J?zJq@?yo2G+sA)2LE3njqMdqIB9!TYf=>|V72NrC6`!xCafd0Y1X@;L#P0k zl(r(3X3+E5pKQJU=cfiaQ_+r#(VGK-w^;IE>2ns^6%D~>paNn@zkH&fMdGEQ3YY+j z#u$ml@G*uG!e^zD_^@bwrk8o7-80@OJxe+)Ujs2fdS-_2kmv2k6;_hPx!1bZpn9%| zdf&2z(P8a(2VJ&{(&q;HS2P6K4_69YLZ`KMO3WVTI@reHhmKtv(eT5W!9q-^G~(>N z(%;3>OoIRTj$WSZ8Nr8waMMm=hX$)QNeN2NW^l+ktzy1j1>w|XZyQ_Xd}0WO1EaE$9s)?AV+Z;6L= zD(dX(y&N$t>(4az^CscstUW}JHBn`e9JZ;7cnPb(;$^y(TLc?8WQ&K932jcy|Zz6kXyj0qg$4a72#f=b97eG8Q0G@%!4Pr znNCrP4|>%wNb$~C+ClT?Ob?$h_esw@;(O|P^OS1#{kt`3uA>ST2%hf6wr(akKrTg! zg{gj7vATjhM)61CRFDk@@|gkmV2*4?0;-Zd2mdl<T{*Q+2Y1 zU#WK4IftU&jQ=`h6)HIhF`@lUO^k?}ABB?rCS2tI3?c&a~3gP5*dZKTqT{ z#CHLWhC7BuFt%tIb0p=xNWCaqen2HKE;y-jbbKuFfl*?+!TjlHjER#k#txd;m~JdR z8h-ueL;ZV8-vxim*~JG;<+mJ8uKs8sliFPLmohjH)EWZ0**0Jc#C{@`^=z(&bKsh%}6W%k!*SYI%WKWkrp0<5|+&2q8%=!RK882+vj}G%HKt?~G&H_FEWpP3LGG!UKsAUkVsSUPd!ODT zza^Xq+w3Iq<9*+Yh5m9*R2m+ZP>eg|ThVzJw`-51MZU-PeW2PUw{SXs`ePiDP5puo zuU{j$43RB?tP9Yg3B;AfGfZGM!j(ld4nZB+L?ORyt>2#IKkJwP zvh;T)HVT|eptb8q{pEp0-9XED`WUyl5kG$sZr|u?5f16$ zj%V|Gj~#jQA$fDd9K|8Io|~;NUhUj0QaQQ4ukzWtqp!Z(n4%<&TL8!O&0DvKW@pe- zuuoI1%Qy>2=n*6b!_-G5K*MNf2ezIcir6j(s3(O7cYH`7HkU@2E$#xX9`vya89C%a z*Hwy1JyP`U!fZX7!Oyh^(S$&O#YbmC9O= z6TG)G6tS8E`tuI@`y1?j11&~T+B76y9eCGRqyAo3=ILi6LmK-h+j+WcjzjB0gOn=| z^V~#YYms7Wz-1B*aC1m{2#9zDMBF%fSZ*0G_PA3t zRu-9ec<$V_qOxcP65TZlBPq@p{7k>TxVpa5&zuEgAgk(NW9&G#8R2z}>k{4vNW*vd2pS6XS{u4WVy}LhDC* zV>)*mke3Y6;cZ*^IQf}=@3?$TlGj$;?6EsY**{c^NVth&vjUS0+Y%41wc$wEZ!7}s zgHMp~P8(cPu6G!YO2?KX15iG(!gt`I1ZR9cY?qaTJVN#45*vmTk5a?IDV$@d5nAEcmgsYv;MC_4+VsMa=IZ^1%I0g;xFknRSRmJ%eTLsB}1Mhv=< zE~Nx%5gCS-Zs~529-5&!-+=o2$JzUw>sp&@SRk`!X030%@AKZzvslb>*{?y3Po#oE z2peyqCvCM|X)-?!1H z+$m3Xz1NR(gc&xRXCCau7}H7P82ZYm!>br zyK)Ho1T%0^^6TON7J3Q`edc}Few`#+g!PtB^s}{O{KNS-2y5q%Azzz*9c}O2xxEK# zNh#j5gHv)4#$V-;EnzpLxvc*>$(5)OnF>VH zEY3a+laDdS$D?mEi`xy~1!wm#P$PX=aL5T~(s%`#e9+^B&~1C(n6Xj&MAq9x4B7Nx z21ZJ3EoW-q6r|;5_yB2r0%Rw$tlQ;H65%}UU05YULiUoEjfwlWW-6`)ROq^XH~q?_ zb#uq@) zUCd6y=A$W)<5uune$#i@NT|3;itA=#!#T>=`oG_6Q>96MwwkOa8Uxj`n$Gt0_tj4% zt|z(Ft9e(FJ>||;q8{iXaiA0^Jm;-tn8_=&r#de#CM{waKDlpEXvATTzlSVfu!&29 zl;_#-=(+LA>QbA-Z_@; z7+9Ydxj+7MEwr6qN&@xp#TA>FReCUw>i;%sFkT9YaRJNhEY9OT;jF6Kpx!OfT@1=X zsZ!ODvtz3(KjtO1J3Na}dda4$MC9VagbV3$?U}}epgKM;W zSo`x)rw;M~X@NFv5@}d!o%@Ylb#h)+OZ@(kWA=%CPK){Q{nJzE!xm|*k}r!`O-M0% zFPVR-7sXb|L6EN{=3m9R53kv`IclT=m6#5l1_K`2V53nvi|iOMR?5xL(spl*>OV2m zpqQql#kZBM@fhwCo53VMRk@~ENmUKMdjmp!E=6a#eER~^4VNyn-LHaKQz{yX{nMx0 z0t27!m>T$WrDC9;qzb|ki$udOMN*RbUrgP8O}c+}FsjJENc0(nO$_-HCo(F?&ICw>-Bo0IS8;TLxQu?I(F%(SMaqC+D;C_ z!dvG{xk&Q__AoK!(Vl!&o^@Z*qp|nOc~Ikhb+dZ3NP(HD-l)cpS7uU8Y08?_km^=A z1v7iSxDV9y+Z-jE7PU`cy-%Q%x)x`TCQqe{R~dEvr@$}vCXM}9-0}>(1C4$1U{V4Q zRXy8qCwOjVWFS}q$gk~@u9JC;awti$4bB*E`PJ+!S|IBbBUlrUfUTDBO0p2NJgOs8bO zw6wX@(v~JAvgPBHV4y|pzM6ZmU#93 zaT>m+X)_#aKUq|oIGE$_UJKNS|9LS}fXQXXpeu)GTR2pIL93%BSkm!!!+3oqk~#@U z^Zyd;&n5SCiikwkf*DY%uv01w(yO8Da`i7i`KN+Nfd|g!Sw@}n$r=25P!0qB;8sXY zx!|4hXvB?nO&b9q!7?({_=hAquZmZTk6SNvBG2M7qkkXP`&^vDByuC zJqN1-y{*G%NwMUS*~jnKa5|{n_U#IRw8dIa<}*}>?Is(WiO04|;UiSZQwI&6$$dJfjE6O3iJ ziCOgsQ7Wj4s-do!FPa)hS`D_P2<-oA6g_I?U>HZm`d(bCx~KP$;|zY-bBZ%tNMUbo z$^DZfzeop*?mj9T&1Q12b`F1GDX$C9r}}dQ|NmQOf~PQyaG0#xTZul;^ z@MFlPj!FoH?ify7lO1uKz*r+n)fW9?;pc?Wolh~s1w?XF$hX{aKiLta2)TfB(0eJ8 zW}H8sQ!LWQvr5_UXU`qxI1> za`E04N!y(klc|-(&AQZ49&tx3{HNla_KR<_zgf;+FgGLRKNPA$6N)NTMMC7S`rl-M z6=ISKlV#h(fqC)J+{8p={Mf(_w*&_A384-18UHuuUGk$ovd+0vw$ z=CPM0Fc%8y+{2=&Zg6bI_*Ec|VjXwNgc4=y$vThpFXSqe%!e5XO0YH;waFjs8DKFq zoS7O7uAyA*MbU^o(3!fUdtNR4gsx)2&+BcF&=qmWu)b}3^YihqtmQ`4Ti;d>t{^Z~WBg5)5vV%Yd zIXATqFaxBXyunx?x*O>}*s0F*&BNoemD?);q!2Fv7x%oBAyg}Qmt);kZv&o?7B#N1 zDI&d zPRjqag-+&3tIc&buX#p)b&X4&X(hOn@>0vBP$4`|1ZDdu`I$PQHJ|tXyzS2L%6Hzw z9gi+^V=vN?FDG(?6oRulGjV(QT=Q!cOxEzupNcPv%$$ih0zT#!S9JdJh&%si1 zTji>{#hqkDl4Km>|A=L(SO4ga&Bhjspe&CI4=*3)h~d<6InA1{jx!y} zU9o36>kz~Bf0`We)&GYjQ>DvgJ8?I?JeUnf-a=QNZjY^mRO`5|@#?dWMG2PDW-G|}ojGtuq7TlO4dMg84Dtc7-!x1R zQe(tBU%;jnxxh{AQ=Ys)7C1eM0g=9`TDPR#-xRshG?hHLtPQS~VvzBL8b&VM2*c~c z7;1CPj9jQLkrl0;WUL)ZNz*fnx6~o3xy((~OiF*uUz8^CF?pcc`!lGf+t4@jADg zR>aGGGM$?pM$?)D2BWR>NrR7YoR6hYRj)fAUsIpuy>&hok$52rw%>5Y-kZK^|B^dE zFJv;lbT;r%;)Nt-%S-79D^h@0wD2CQlOZ7susqSqoAKf9(auF3^x?phZdRiLULzK6qv|@!qwpW)mef_$SKFktWQL0!lF{mqXR*3U zoOvx42%#tUQ4gzXiXiSM&QAzhq*m(){V{NgDGa!csJX?UKGz4s!g=|LG4tV zZx#am7`z{g78v*Vt?5u|iM}DOl%@KLBnDx)nK+uiIW^Ec`m#$S1$LaH*@vxSgO7LD z*G;rK#6ygSI-wCdjvUeE=8OsO`dFCD%EsA8awI(9#-2uO$ZTRCj zayeRp-C?cu@kN3BiXmSHwV`wr0Bi*&3O1a#Fvq!vjcz=ucV)&0_pEYNBLY*SietiZ zqHbk@uW@sfx<8wpi<)OX;>>g?1=KwJPEb?d263u!r`d_%O{+#>C5r7MLN$-{M?WO> zCI~Vf{a`3Ol%g-`ci0NYjn&P23a{q%a9HF$UcvP2eONK&v+=0LBUO*X?Ihy^{(k)- zV&f5$UQN&~T3H>|cDumT3wmr~^F)_U)hSo>k_-b<$W$!(d6mMH_C2^8TrmQIhq#ev> z?8>Y(^{={xAIiM={B#f{D#_e6MC34;$6ow$atD66u-xf>pTov-=aLpE)X5!}rp}2G zOe8VVQ@b(=Jq>Kfm*XEoC#SdCUv%Z)_XIGTrmgm8-T7=y$EC{tv<^+p-_{ z`xpw_@ji)qB(jy!*}Znj&7WlFaMMCjfH3Y74E15Edz;nHE8mL@qM%t8n2=@XV6{9p z{P3irl@S+|Ht`$BW%Io#alxs`4}r26*>oBKzDnGuT>>|A;WnEw73e*=wZ7D`69*rU zS~A0oRzC%rlP(_}HIviy3+G_&-e9y>97n6y!dvPSB?5+W6FRpZk>@VsdRi9s4q9@sylawlm;0&iB3km9#DU72R#uyPcr>Gy&b` z1;yyY+lFl-7n^v`r?}oGddOw~Gq6}|t-^GYf%<%4g-b7S$}^SXhtFiPw@fhk}6_`OHJ^UE)ib zS>RHnMB;9q4r)9pz&%71Aeq=-q-xKb7Ab=}NKzGp3XB2Fs7a!9Tq^B`Pwq);xGPIe zBM=<3cDzo)tD2mO>VxO3D?zN&6`S$dtPGPT+S+*ybBOyid#HLC6^_3j|Omc zl%iGPbwVTFgmFlU##^Yi+sS+elV)wKlSf$o+YI2t~-mXkV&V+SF;B-!ZAc|Af=Mnk{n=VD$QtA+%6 zo1Z>mk$xQM?Y1DsxxBjld-fV~X?9*z;|&5+oI%ySp?Al+3fTiBF}Z_hE=A&_6E9H!cLt;Qmk)q>OaHaKX1|rXypO?#ZLNSn@H#&)alqC3NWk3h5$>7E)vB5clm4 znVryU^heqvO731Fvs>juG1v0GQ{{)u-rLxA{Kg)VqkPo8#XRvX8c$~`j}FY##C8HC>S5>IBT6k*%=m=;<7P<6CP?yRi5@sG0a zs(&LQ_v^53N6{VXE4N=eXsi`IKhiy0_c}#XpRLqYpDa|LU9$-NIfvq!HnLP5%@{G! z(r_+UItpqN-FtNuHZJB#I6jOeIW2DwF7SOX{LUR0=G=gm060z59O*7|ZL|$Lm(y)*8u< zB`QCO@y`mM&duddY=t3)Pi`3DO`@v!J6sK64{sU`=H<5xwYnRS99PbCOPn~>R20wB zFBL=a3q?Tk#)nu9;^_euvfjPPnMFk|CgzhSO!f_l*`wPFnUYzE$Dyt4SmI6e2+OWZ z;6LL<4e37M7D~qVO)kIu;+1$8RgS}~aZ+iFtg`2Ow`}n~4Z*G;m5KdhrJKrB3o=tp zy28A3$Zv{WLmr^Ru0<2D>gHya=JlbESbD+wx1%0-oROJ~#n;~0Uc^A+8G3&Bhm9wV zhT}mV_KqY;*N$CU`KMNbB}qKkIrQRO8ZEUB+#r1Fje~wdGaGe<==(lkyJPf?b1G0D zn+=_k`|2_2?bktb-z_boWcag3M9cb1W1tnTo-S#@{T%tZ$y6NCs$KFiA6!MRIw7}z zee6bhDXay_RP1@l7=-m0ibgeGF5CWXdDmvQ66Vp;t}M5lQ(I)^)KVYAGvapJ``~R; z8}XWuruXyafr;XN2iIxPv}SMjLMnzox-&hwClh~q*L|TIyNcqQwcAAHQNt*l+3{AjP;eNa~&~h?+a-OPxV_I1$X!w3<3H zAlRJGUR5{-%Kl~0{0F0ZB8p)+E-S`bh>|9!n zq21B8O6dGd8N`*fB`&WOxSnJ~!6W z!0fLqP^amPy$V_QerIg#an7Dtae=6K;zc0NgVuA zr0h69`}thE4?B*CvKN{%ssrIL`ow!Nier4LlR92ub>=MF@w5u6vlEnKSiT}IsfY7v zMZ5sK-g2ECb64`w!ETeuAThl|W1}QH0tYYu4j!sOl-&-g-tBexQCfoI5v<wAE30daANDyc zB;ALhMzx8u|@Rf(XYdlmt~k(PES1>Rip>DW&l}?JghsL9gGLII`d+lb;Nz} zxSFX{=-~zXAQU2R|6rT4Sj2GqM7I~{bn=vLqDGUDW~}m+tMgpC9ACktLkLVdLe|t! zguY60v`AEmy)gP0jgFgHq>WDOuTNE^pGJC{IC!T&n9v&%^G=O$)S|@}_+_B!O);f9 zR2?~dns@jo5|f~JGIci)Z`cpt&2^_=9Ejg_VHF{@_{9%Ajl3^bGQS<5VySZC%dGbd#6 zr4&_XoSpxU&KRBD9~0*`6J+K;Cq^wpEgCK5!x)aPK}kqyd(p3HP&TO0@BvDpcpBh~ zp;FOOIB`bHV8l%E``DI`J!dw;vWLQ!Fau>JPnQRZP9nDNKgxSfPdGYCGB1-?(oSi1 zH6(y;H1a`SNzfCjHg%NUx($!sj=}Lklr~&0N(es=umjrtgrQvA2IFriuNWt~msHBf zR$xQ69KedT_~GQ16sh+RR+B(lOHagF#%<3=@hY6(YA7%`gx_Jl^;-<(D;>RhBom$Q zDkVTOA>PS~wU=L9fzn%SO_Frg=_3W<5Jq zxwF~Tb|>m4Z^k3Zal+{`Wt8AcnVMmYS9G|WH>={Ukzf)`3b@TxvJ6nwqw>{bx1 zvdgdHKccNz@HC1}U<*Qgse*j_#X)uj&7iJf(fU;yCODj%7^k{DeA?%H{ z3p_s_9(RxObwMkv>}z*wLVJvox3e|t*seo;TJGvyaBxU<+NXIU?4jN_!Rum1J;fBm zl@wTrm(m}tNRx1-s5S_R z;@%ici#s885QpElv}#({W;t7&N+CVYdF{ml&EX^x84{5jtHuz`Sei=h$-jQ|`SIwD z7vndN+ZG^}(;J51QSXhhJ!SC>TL-0V2Fpp3aJP9=(q!f3I>l^?`&?i$oYjXNB_B(c z2wZ^dlm(v`99wf%UH;K8Hq-mMmv$X~B`5wmolCNhY^K{n4JD$k;@byD29i(!ezV0%Phuzy=b8K4R=6GtC$a+AB zS@k$eje&(2UYZs+N2Lq+^Lk02{bp?Bm>w-Mw0_7kd|0!lYeCIy0vGxvMK>AImpARuFZod4M{eN3PvA_nPf(u>g%Szuu=u`=d~jmq z=J?Ci)Dd)u*`kMF#X>kFOmLDD~? z^2PRW*u!k){ruC+@IHag*hIWiM2~dAP3qkcwJD&9dicKT9@`Onj(kS0Znf#lU}L>x5C2wmqRU#$hS;n|*sS2(Lq|C`LlA?7 z`KmYC_Fe37X&8ONlH6kMLH&yJetbOV)lZ@uTL2eUnqcS)*s{C;=E(*S!}<}rSd|d zQb%~XUUh9whJX1PM+CaR{k;$a3kHqs`9chpdT}n(qDOW_aRPhm+h z8GG82S+V4HS(VnT7lE&yn0|s!$;xN;5Z)Ac#E^J-MB2pr{x!~%1O4%oyhstJjgP3A zKunJ26)C9s4Cy3z-hMjII}1;DbSq#lSG#)Z#91tmT}D_989b4^cD6dDOM2{9J1*V5 zuXBt0sFd$EZAQ&Zx}u$%gRHApL2ndWOSx4SFQ2qw&yBhIQBAjTxucwg>x?-)%h8Rx z1vRVbSq3`%z%rZYaLbgo>}9|O(riAul*ox{Z>L7!Y?ywbNtmS%UNJ~Fr6Ful`{|lJ zH|?5zGomi?isubVhhBJR<45ZxUDB5gzlGFVf9Exz^GDqU%-Mru2# zU+Pc`Ztm(OvwYM`4Wac84j*B7F%c1esz)88f;8kVkJ{RmT0N163rDjN)Bb+@9ld#h zc~^ex9@1a<3%`zM<&#E7egH)mY{#uB(QTvkb@4iLDoa$(S#$qGLzlR35{e!T>*c|% zHE)9{!`d{wOL-izv>U0^6sq~A=AH2*7itvmTXgh>0&h6;7XEMJ4^XM%S<8^dpJ~dX=~U9&1i|KWhRm=*mdL;`yX-{PJ01Kc z_am_PkHHP;z0L-`P8QDMQc`NfaiANY8sI;yQBSeLrI;5cRqrGT+c^Z^Vt7$SO6M|7s0q4Us8(nIA34N$$_#lxLSf;Bu zdsa{gQ9&}n-}|)bB!r=+dnc7IH9Y3D?zd()NOoqV-fFMkPp0IH38-03kF=fw^bi3DCWC@|z+>yEI(}NQ`F>7s|+-lQ!QwlF9&}>Kaq~GCj(ad7b8tLpJ zo4K{XNWUv{rmY-FFVr*mBE@3~PUKl?Hqz!YDN6;aY>S!28KNleK_RbU9cUxZY<0Oz zJy(_0MMD=%ksrrehHU7jiHfG}8~>!>6+LZEPhSFEK=(evYD>iC9*`hv-y(`j?CJ-vG0EQ0jbLT~lR`M&(qZ zg{oLvLTPCcP3Xb#L8x+^(Y{S5zPHPM7BOz5y?C$L{^H^G7-O`Cq;98fiOFiv95~_5 zUGRraM930~Y!I~%(xN}a+Jjjf z-YAJerfIi#;HNZMU74+E;&mW6yT!=r9bX+#Gm{E)+*4Z#%8va;81*JE6GBjOvSj?1 zJcmmivE6V_bCqo$-DTx8(4GTP0JOBL-&e zsXZ3#u0(HU%}wcwfU4I1FHjAks(bscRtv-rn?xr_Y0aYSgp$^C;k49Q>vlbL-Pyh& zTimg-I2Sh9KkFqV@3Oo6IbIrb=?0?X?QB@S&Ex};9(*_|jW6e0x29>ZBSp`)IZI4< zXL)N{r#yF$PJ!@hd{#RAY;iOJ*0T8#+&br7ZW=-@=1T8hGXZO*O?;7wqz4`Z{)wdi z=iV?73h=XNxi9(bqq_^<{@NlE5o)O$2Q>bc4G)0i1;=P*d+?7w`isH>h_MjJ=zy(B zP`VJH2Rf`+jY#pd#)!i@!&A3f8M?X4H6gt;k^v8xO|Tq7=319{JiJCovR8PmXEJ65 zhevBZ9@a^(PM`kt=Ku^{&T#yF#Z>(ymX?VucfhEdSsGa9(-xgShqK^-SuGWazd&}E zz~LxiFeC+9OAO*QK=Qq#B<~D|@3t*dFGv-4YD^4UcZM75#ckz{n$4zPXOy=K0X=1H z>Wacjx^SVb67djU%Sr8pJA9YaJQ0tFuClngEb7u>%xqALwCzqtqz-{!Wa{jHI&1#z z+6pdgf$l@n2oz&mrE$RoHu~0V7uipv6p`}c_ndVr9o?RmiZ)8)#3m`L(Qba7e#~sB zG?+3V?V&fD9{HfUv|Qw(I7+WdYLvEp{W)?X`r*&3%c2ZzCG-Ds_WbAbe{g3kDIes_ z2^PHDF=BG)audGs5-($DNA(tKWfasjPzc?HfsGoUgL;h}XzWtJPD;F`%C7Ip;EyyX zSGuwmRKYXFC z@7r)A4P`$TAI?>0er17Av6fNQCV5tg_A^$j(Yh4!uVc7;MpmW2#=CaOtP6ZNap}b2 zF)p3b@3#~Gz9?_+IhmOjsum&taKmw&`k-xr5Ro_uo1kxsvvn~!yaJi$4xbd`IGUbx z+9=2LoUA41-#5JG#eWy#JUOq*C%toGPQMCk)SkjP-Zee+J6?NPZj*4d2UJ`yhm9`G z)Bf6Og0Z*6!RuW5#a;=9I94|pzpa^nQ$sr>u$0?R3ee%mr&)9iom1$-ac;X`5Q(ju zSMwQ`3V(34dqcMRK<8xGOT6!a82m9cC6Cygc3x?v&HbKvOp4>GQ%yw7{sDBu!MDQH zAc+<2ES);{STLkYYK~0`SVqzr(0CBnUOU{IzG@JbPffx~m`;x-fQj638TboZ*1FBw zS>TSah?u^$P#36Vzl|4se4=6yD-3x0-CbX{OK1f65+9Iz@`iRnDw0tc=|;)2Kjunzru%Y~nZ>>a&TmiUR|OFk=|rCx<}0aT54kK+wv(xmj2PegzG`(M2({EY_e z;(+ZDLi^&77Dui9x5~}Cuul$?l}A`1yyL2Sfo{Xu0czD-DYjhCv#Qm^Dio{REUqk{ z77GSag`t~jR;waX=9&6-dBn(A6`cA`?;c0iuvhvM%A?5iggzW2MsDDrFq&->OSy zynKt*C+>QCo$PqUTm8l;0YNY-;OM|&KdLc~+tGL*oerc-NjNo9*RbqLnA|TQe)j`% ztoYsW+guv7JZ5QR1!YrlN8kX!&OZ(KNC5=E&Qxsf)IOp0J|IKIo%6mvmO{Wpn@PXq zA<7_uVtX44vF_qcEu8&&8)$~U?z=D7s5&^JrMqDSmnG~-ai|p zSD}^6gQ_(4KF7c3AG<0r6#;dYPq_=?CbP*r%)dRF08RiN?Y7+1EU!Gd2 zTFM{l-z#$KR`+%*%JG(}$RXmv_7}M2U;XtFiMJXHJ|MZ#3i7ZERCPRu&YX4x_%d^_ zd18VMVK;11ZDrLcFk?x2mHkM4kvm>Bu%%({O^x+8xvk~SJtB{~*}>}~QTF7rY8M^B zGw%kDLu#c_hn2W2Zua)Ir+cn^p&VAC7fhNeifF!ske!EDgy%8@-ETb&*(2p~38;vkGDtU`!^w0$q-ak&JU|$>+~( z7iMb}yJV|2yVfB|E38N@S1|1=V*Jkk0rP@$hx4Zd3XWE&(?N%=L;MZPuT7z8aaDdj zXmG!$WC1m#k^MyV+Hi0=1(#psRk8V~?#;mo#kmspTzpI3 z_EuKFvU5kb)Y!*gB@X2#bnE1!HqbK#F-7j$aZ^uY0rTF#pFH({5}gNYMRW5y zg*iPc!E1(Udd~?Q`-do5&r-t&-y9b|iin{L|1sAhSfdwvISZhpVicGL{`*Z#g+AG$c~9fN@YLwDS4oC)uuC+gne(0ZC#+rAv8{(eppw z<*Z&IZj>BeZSJe5yZ64wuggv5_%; z$hN#~Zl3yki_AYNjXgtYPlXY7&+rSP89ah!bZ`nhak0Ihqh~2FH@>9Pi)MRJjixU5 zk?n3smAiMatG=suaE>%f;rP9;EQPe*p5Bh)c(1=mLXdl^a@Kp%F9Ag?jd$PfIxkwE zc}BnNR(JtYuB8%nH$pC9ipRu*ob_j%0NTMM_s1Y#18FbHjby|q@RBdflqO0DsMe|L z7JSH108%BF;>BI2M|6p#<+@(;b?go2dp~x;onrs;x!A6ch2a1N9!1PZDW9UOl0sU# zCS9sDv0t%2o!Sm^?sf6;4^q>{8T;O${4z~YyOmd*0+ zQ;N7+PFYKGBm}}3jw@gPQEF-R6?zfvS=XH+&N>UBSqzk+y3C18KYqAfPD!boFViVi zYZBMy+t~yE3r*sR-SsP@bMoU*A_8$eTg8r$5MWO^+{(Rek07<42va~wS;6<5+`UFn zMidYj|7}ZJKw-D|kq9}DDWto6Bt;kS@dTBh3*EoiZN72`bbKFPba`8&xSW33YiJfd zBTKB-+&4R1U+_=ud>X{lJolOfaZ?CQwUvw0{Cd@u7vfa)m>EQb23<0#Sj)5E)*b3| zJ+sITt;m#2$f<17yrV-MuVZzublfKV==Hht#t;Zm3#o*$(I$e`IUG(ybe*v;@FaCB zj7ZLWWr#r%0hs??MK)>8ddNPFFo;H$`<5Z=tvU$Pc?(9B*vyo|m;wOz*@9SdRkvdT}0n4yYK zDOU&7cJmj8vI@AovL+w$T76e7;|-CIc6qLSz&oGuJRW8TAco9r1_*W=r{g@P0pVa2 zvCnfYHLIb*b~Eib(g)(N4D{D-1iBUH6EWBvj}ob%oeyN zrd1+4emfy1S>sE)0H1KbWs%F0KhZLGonsAWCUoS`QY^&f9o5ZV=Jm-uj%bHG)vA_n zV>dKnDZnPrI#>Dpn+N5ppX{g5=9q@#72DQZ>M|6P9MZe+d!Inm#?Ls_L$s$(_k5Nc zo>UG!0hY^UN$>R{rR&5bjs^6N3QjtE<&^NXYRk9 zx3lUP#N5ZG1#@ek|+Cg-B~wwyq`S= zqSBkKQqgkw6vJT5W)wwLz|qqmRLiPHl6S9>@R`r%nBF_M|Ez4MU;4cVenf8B6XE`jkAx{&u;=c}hrJ_NST9~U+)|IRaQt1@;rHjOXO`izj2p_78pTJJudgOdz)%TZ{HuKT$@=(zFEv6^p%MIu*PH z653wR2zI@L1LaZHC=u5#EHQY49(+XNQ&9jT1w)Gc9&uW4C&m9V&ivb`xSg4(t5lLl zUhl*j0ZU(trplMcH7%dVj}>7-fNw)x^q?%o9zi8KISYZURicrVtgX;%v;jS zbCLf5w4=-GM%!#F_`Fr-g+2TQBm(kKVtRfTzG0`^bX0k56Ty9Bfs+8FO?&O-v{8V0 zT8RW{kM+(tZO^#TsWM&%hQsi$c9EYNx=XA$gx5+{tFNj^P+PXSC)lzpX}>B%kznZAsMP5Av(OQekfT`iK_&@PX5u=>KpY}K(KlSb6geH=a6P2XX58S-<-lnP@7-EN z78~LBeYrLq4V{$H(wcliak+9jGVY$VaLF&hMoL)i9UCvHXL|X zt?f;)J-W{nFf|`U2Bl=h(DFgo^4X`$KkAXhah^{D2OpSfw*I9CVfFw5Ci%e)LMSp> z3pEBAt~C|UdLR|#ErU+(AM9=6+aNh^{w5I1YK%^wQ=&(>5=SjK-NRLFiuG8P{p3ls zxu+x2Q}F&abvrZsW;R=o1p&2~Uh=ht?a#wQcUrji*Rf({XIuG^9K^{CY5{F<%_xX$ z9yn?Aw_l}zpUOwG{mS`?W}15}*Yy$&nj{V1+vsS&EjEo)yzrf<}Y zg(Zx5Y$?6B+;$N2E^Z32=(5Ers#_nr@JhgfMx0E4sYk)UDo0}ySD zPH2jZ4l{d?3^+yyv3nc>jHn%1!@^%krk8Z)^Fq4q-VmxSTRVy>qvMt=Sz7p^!Wpns zjat8HjnK@p8$Cg0X~|x?bDpHNzx_(^6Q$;y89DIA`cylGS3CmM!r#a9WOO#+xv+%X z79U`8bn$`AuZ=#{z8yquayMm5bCMQZTOu5GW852m#vlHdaR?xrz(jN@l6su~5Bv}~ z<)|CNkU@#W5o7w{b95xahpKKY+^UKLx`UO27YTsDN^!x&oLsQ6!mvgaUPeWJH*<8sS*AF zm1`JhlDIF)v0uR)cIlr(Y)ACDdY)^~>ew(!d?H?npbmC$C!_8)uWezc7Tz7r=f7G{#5f4~F8B^UTgHG=j#C)0UP+ zZX5PM7WeP54-gT=(=AyH?P|)py|0+_)L1J?=_IS49!EXXSJ>Ru^h$KCWUnZQ<;jDt zDe&wkUb!DAa8vpA;Ld`tCaTx!l)|++^0IYYM)Ex3cR7NNHwSe?IN%b`By}@vO}rn^ z4%~xFnCBlM;IKd73}Sks$(&_mKWmVVrykU&(yx1pK5BWKsVH8xz+=7DeiDPD7PO;P z+I{i`Wjpj<$_iNq(BB021qX#5R}06>OSoDpdg$nBH_kA^8J`@12r>^ipvhXE>jw29 z#tKAnV%1b!4JUwPEme>gU0|$32J;jEal*@=<~tk>)AOHAJOIzyhDt-l)o<6N4|XI2 z@{H~;;X`3g&ys%LY%3er1Y0|$aXil}As@Es#KIi=?OYOz__M8UcyT5r;&JsK>p@xv zoGM09XBoeXMzoco{}j!ItieQf`v`kC#GRHf0>o7V(R@D4;npI>#YmK$8kxH4gB*-D zhat090i{ABuQYZi!bv@`ufMIpCp}-Q^M($FwDvSXK}=B~1-*G`w$`Z@B-uy`%nMBI zwZ>f{C|Vo`tTCO<(p`4ux$oq}xl1T8?s#|b7Zg9p+cwX~uB-goS7l}NtU1*S!zYk~ z27EtI6<9<1EROTyEo?vqcOmm5^`rN@FaX;9|C*96D8?7?#` zd%?JB-K4P*cStqz z9eX_|Zl>a6kX^<0*dG}f7^IZ8eDK6<`#^^ltaNjTAYvBFax6}S&}@%HbmYb-7S*3a`G{Qu4Y z=;ipgi07?o@W%;A0x4G{vSgXSDQ<%ANTs~BpEaiRayU8DF+tjh$eS;;Ab~8RseCKI zq5RaLZC4&8Av@zVNRDj%^zMaVf8wD%)B74a$N73Y!|9*M@p5#l{E|l5qMqhBhr)*s)AABvi8Aitrvfrrw zyiovn56_d#Y1;#WnvvO{Ak`eayML3sk=tDKVwz3dQ#e)ib;=5NsqO?wgf<$V-+Nj= zUs~kCnqvPfP@x)5d4clhzn+9__+p+8)u!-+i(T%zP_%FX!wCK`@)&?y8#36b&An>+ z()>TPwVXe+HC5fiiKVrHXqC!qYe6{;ch?^hdmH9^w0Trsv%DNl$c6m=`RzlGmOEkF z(zTyGDfX$KxTR1XMb21Cn-{)f@J3Ed95MzRS@Jy<%1~OybVer4N+L+MM;@=3XHa*x z`l@lXXlQ4Yl)XsoS9wP4R}6b>Q8SmD*|W@x+=0v3NtBUxP0c2Ba=q;Pa-O+KVnxO~ zUX-S9RpXk^jyO=`$~(ND9pRdcIhi&}B0QhA!1lH6Ms10hh@Z};(XG#O99G(0fy>+` z@(a~sGm_#nlRQcn*E{r|-_Emox!Z=MafjRYHTtURvphqrNwrZe(-)oDBUr*IT7ip& zT?}bt@ySBwyPulPutv-@VwV8sJO4YsXNNs3sWFeKc%UOtIv#F&&uj}`!jVrcr${X$ z{j|o=fCvIjl;|-6sSSkm=wMSsMy^wv#j|E?GO*M0U`~E4OlY1A@rn5R)Qqgs#fGhe zc_AGu1f`ryX|BLss#Z4={P`W~{DkkG0X3LyBrOx$dk~>S!|&{ zlYalylc2Tm6@@Bm{YB2>j?mWa=9PSHS<3=2jI3vpyu)I07o43Bz}d+LQTOe$gRq6K zU%qIqnz3=^V$WME*6<-#kdfgp!MF6GtYNhBFBLgu_6Nyl2&n6|wzVcv=7i~(mrI-L zQelE-4brJWL5Choy)=M)@GHAo zK9-u^2U*Y!g@OBjP)l0=V3VH6;Zuot?)sOsgk`qW=X7fD1kti-RbRK~f^_dZv$r~8%s%J})Ih&3{`p1;%bpx_@vzigd;22XYxw$-Xho!JOkztDPY?$J5>Jxev@l|FHr|hv#gUQxfm5 z*mhQeNMwjOH_sd*U*->044)7LkEPJSCw)FNJJ={1sX4jZ%0mQMwTU)$W;yaZA37Io zUU#ovhkikp+Vp6^2YX?MD&NvY4L4FdwYVD*WIkSnHWVNmA(*{lMiu1P8e@XtDc~BH zKH9$W^E|{r>7_5B~9wYKT zkUZ&fY}+UpAe8AouH2K>mRqlW|Kg~39%kZwsCcIF-t*z`j<4_6KthIh#A%tm7C6dwvT74;GT9cYC;F1& zVng|v7WHh+F@<&&IFBANg2(!f@$}{L-ucSwZ}V?>Y@d5&vL@c4l(I;9{l*p7T%L{XI9O@LyPb=P8_j3>KP}(pOd78OQoZno?_VSK_ob`#tS}R@7*7GTFOxvL;nAh=y@JMnXKPP7y>ac zfs+z(i?#EG*6SG=%RDA(ii`I>?OnN0b0%BQu2hTb?P-obPA+Qa;_fNT7s;DEtZB6N zcpp>8eM0fpo>qDqh~!#`j8MvrR>|(iTZ$y^OKFi0jsV;z4B)o0ts_;(sG7gn^L(!d*Qk5X?>>aSrdm?$1s6bqP zGu69#kI&HK@L7#iYp`kWu%{z8Fhe)Kf|98uUPC>O#^Q-xD_bkACyf#-1Q?9Ji~naF zhiH#O+MAQBrrm`fIZm>?v+dx;z-xt47Gi?0s(NH}727A~t})J|Df#jM7T|Btct2qi ze|l_Vf#m6zULF%8AkLP;6;|IHMw0q>;Hi!q{eRiq&bp+>Ra~A`w)*e#6g<_`y+9@5 zWRxT@P)X0WyRKvzVwpEG`hQ3}3#h2qHQaAeQ4|EEr6dFar8`xmOS)4UX^;jHr8}fS zrE5SCh6Y8tq#O~3Ze)h;xZi+!-20rny=&dIX2CeRWMG)@|HkwDp0VD_C2Cs_N?(h= zG$fGc8=tq6>lRf5spOYNq(I>H1*$wasQb^Ps^yBl*`pqy2jt0oTkNC3X?UHUx#4*C8e?;u!S zM?kff^+}21ZUrI1PagS}O$a^H*Mf)i2qWfQVR0JNxAjbjy8O8>7%9v}u>qWiV zb7yAq&T|vApU>aZk#&eFjy%^0$T{qP5d*y___r}3sLIDKYO3Y0k|t0*vw1o-x7K(h zzPr($sDdx#GFciB$dN~)5jG>sh*tIXaqxy3PkpN-1nTYBC`02+j`Z%ROKLaU9912l z44sh&2Vdx*OPdHoXyc)>jklfVPM4mUtUS>IpTT(Qk_^LOzGiE^CZO4 zZ#9xroC?y-cHg6w#n^0ZU}8#bgt|#q*Y(W|S@MIv(dUt7)G*YmRhz!t%yWR30c}SP zH%WeqRsxk!qRn+#a}-l{sB>QX=zSN<8IX;T-hyCiU!;~y(v*l?;Sa*yjyb>CSeG43 zbFS#QEK{BK6`QSPOk#$mUW@x*R>GbV0erk70|% z%PaDrW}Wrup4$LTsg8Xs%cVTnMRrNChL|ePmkFIXjwD9RqFp9|Rdlj**PC>V5@env zfCE)0BXsZ4;tafQRWoI_m#eF?HZ3}$XC5;R*OE|aAVLr=d*vFDEKNi~U8a@4Yzhgx zy=mKm;aOkB0DEB}G#f125!Qr_stL}&ZTqjT^q<$1o}I5RzSgm85G-agEXD4vWOyUa zONj?@(aR~wCsCIOE~j!j%ekbphGloYo^aTgdfmCmWT*dl_?|J6pBd%NS($aRrL_0! zXW>cfVD0LZNCD(=FdR#gM?1Pf*-iTgZd?1>yZQY(Nlo3E&_xRMwB_R$O*NXET^FM; zHXMZv@`^1Uzvi8-U`#agBJ)~EHmjrRbr*eT8@Pal3-0b?I7ZP@$0T97eIZ>h#7zfF2Rgt@ie7ZGk==Y49qR&y@0T%}&lW*cjG|H`GjRKS$nbL$W+ zEH`|($^;6kKK|nvD+I?_;OQ||29B{WO$2K@x?(AJU(6KdCKxTRi0x{Uj`ZNor6cZE zs(&IH#XCUv_OL=F8rA!WIN`i>Ay`8P&lMr_77&vWR!md&nNHSt-QEz2t*&h#LYG-uFMKc-T96mAWPI^k> zHm2*nOV35sw233WKPN^>0sR9{6AaHRizC`9u#sa2vJ@vuGuieKs`e1uRv#Dg2fc_} zDCn&J!Z41ILc-=9|Fq`MWnVvUTnkB)Set(*u~w&}GWZ=Eq@V~!r$oyi)L?QzYA3{I zmo0p**O2*3V&UddQFA@a^bZ`wiMm0pB>Irw(ECFOn5s0PW*uCuLyz1){>xzHZJVN` zn{3ohzl>^TJ#_ULl)`z8yP-@hu8LyP%Ga3hzBwDuoQBT*cQG7kX8hmsg1@(#!E~rr z(=;!5^UxaK%b{AU0k*c-qSNG>@P()rn*SUu4W|mOQ21J?zqz<`>||vJ;QmdH8pXh6MJgXlr3|+l!=rZ2X!B`J95LH?NJZV zf$n~Z2iruJ52H*!+c$A-|m!m z>o$YRC9E2g1WmRF zA1jjW751k23)?$3JTfU2Bc|Oe80Fxx>6jUWM52&+*a)^y3LH+)VO#(o}cyuT> z3ELeS?mJ~oMv01zRY)ptrak;7*OBA++xJ#VXIsC$xAwV^tuLu9k&{ztr6t&m)y{iF6(6XuhOyB*Uc4)Xwj!WhF2U10^~F@(%h;I9i8invn@?vIaig zJ*gz})`C~%4sO(fs4fdo8~scJ0}(&}0Cs0MIKf8LSfEOF_w*L zp}YEEy1heqf}21-u$42C3C50vCaskf0go~5Lr-CiUM!@oU5zPwgC1+sKsJ>CcJx4` z*E5{~rf2mJ$Q}p&`j`KJKr0ScyDWJW_!IQHE+5C|b`$jSN(46^+Jrz65ge}+=ft#k zinEoOhqiLIx};tUIbP4LV@W!mpn)-iRkQHY$l6ocWpv#qPpae-JUO+i4$nb`I$AgQ z#nS+5@9%mo;H{7_+C}x5XIibn3dB}l5rvx9%&pAa9s)`?EDQ8k*T00oBB@y;gvO%N ztF{9A9Vk3NM}4Yu_|^#H>NXa1@L4@uMS2C?plrsfUROM`_mV{b#|;IL3jN#0@_PnU zmuh!$F{AjAH?Me>0kRGBwhUhd)+G$qqFiS5eVZk|4L;$ji;%GP8LQ1hT6-RSzErY8(}UB|X&ngWeZEi~n8RPsWI$)zx4;h^F0nkpM45WALt?qqg_3J$DjrdK zmgNCtTz4uDZr>R1tVabAO=aL~cn-#S6?=c1vew@7Dwy>np{KFfyNOm1_1?1tEd=!u zZ0Lfc>3ZX=Q`7GIYI^=i{X>K=5>erVm&J6!{lcz(N92O-ry zvKxKG=nG)GI$(j{5QMo-K^gDS5+KS$qHXTC<|(m2qyLGy%rK7 z4qt_sR6?QBfMW)gPPcc6dIe%4Lj}hey)HWNY4gFgvx-rAwFk}|>nRrq9cz8elMH7p zB5b_xE#4^!#5JpW7FxD1&rLIkS*ryB=N>>>u?$p$R*-2wHD#9RljbSK>U5;TW$5sV zxaT^U=rm~xfW<(0&r)IMdxYA}qPc$lCfD(&wGwG#>Rzs^+lzo6oaO9KkkGZYuri=N z(5|EFQ|;_uF>S3yWG0yO0cbBIPB+Dybx-CVaIpHgA6C>Gbh!e>C?qI@Mc47VIShRB zT=frsIp^3uapBRSoO5hCG~7CX?3kozT4yU*O<-DPLQ$u%KXMxnsX5q`u_FbvFo_b# zn0mAjliJMBT<{e=pgS&C^bv2+^>z?Prq-kFKs!kT%XMs9wY&oKI$}a(ZPE3@C2-Yc zRchDL!|}WYS927w4)-cw&2Z~;*>HTa_OI;5fs#yd*Lkf*_)l^-PjbJTtRN?ZhV6g% zvZ+yZDj2Cnd?uK%Pll13P9$%B`_ghTJ;hxtQ2G97NR&)hc-6eL0W!Vvm-F=n zJ{8ihCNIE&a@p%8ZwXQ%2Dc@wR;w%!a5(N>t0x-)uYCo0>si-77&Q$X!L(1NLOlua zw{n=!pkH768=}sN5bAEXl?=P{mOoX32U&H@ePtQHEnI4F+G?e$9<6M=cHaF$_Q!$e z7Ts^PS&{sRtjng_kcJqX3JI4npmu_eVva2d4AX|&y9`LE^=`$}N&)p7XhAo#s^rnE zA?9?6o$-NHm~8P>s8-cK!Rn(iGh5d!|Ef>^RZlg#xUST@C_rsgr>2;ZHOCc9OCo~q z(_5Fj($NL$nWt%(o+~!8Ao`batp}_TU$@?MlY<7h-u}7{ z9COm>jE)xIG6VGs@g@DFRoc&Vp{CIoUM~|qGJ>t;9-X=A?^ z(k5ZMD?Hsn6csVHDugxwcD!~%`A{{2JWgM`s+qu5_wQkhF*h@Og-pzQJ7Ar zl#OR1lpss3;46>rgDl^f^>ksN!smi_IQF?MC6!-LgA_q%S+(jzyzo zjOD(Yi|gkxnV~TWyazGg5lu|+bmL5=sI_+*qicfm#-_^N3+d4${_TC=QHe1XE z0EZ?eq%mWjH`BJoHW@fn)+$iRZc3x+1$&d0v(w>ClJ#aj$YUO22I>fq%Jeffy6(jh z@?_HIxYcK0q6sV)&-|$&QR0)x9)iyY7GOf0G9nz&kq#2oQ5|dewXy;F2D~ytkr0fl*fwb8IB#r17h8els zbMFyv4%JH(@ueNL)OWU9#Bmd>Ra~C5i0cj%g~_9pCx7OjW^0UEs!Eg2H~SG#Xznri z?Jy^ITEOU_#G3c=(X zen;EO`_v`GnS%wafgy2Sh??W~ds>uVLm5E#{`Fg8*4_WJ(R5r)y z6nQrU4!?a-iTtbDK#SV(9WEY8=|j{!?bi(q)}%7&x@3%T6JxC;`;8@^Q|mLO9= zp;Y(HxzYMvuAjcks@D(r;Mu-#nh}b55ICyx?NqmLjwkME(XVI@)Inv#XbsS&2L*;F z+qNWxap6l}g?i=cHFj5}6x?hqS&)GR#dzi%NP=CuoF-=$Q{x+1A65*(E?AieH_GCk zV2xLQk>@UF$y}4}NZYVA4Op;_x=7kuK^iyjew;2~*WX>^HB>r!GP@M^G9xa6{!=B* ze(LBX(o4I}M?Q>g_kU75MkMfsr)QgdJw0sJSHv&0?Q}MX2hvyfyjqic9puk1oAK%T zlteLQqFg>(LbgwU?|Eooe5m-#JH-^X;oIT$8ghKc*p$U+tR0|8`X|ea4h8Z8$@Sx$a1bh$p z)VQ4mH0IvO-6W}}8zQ(hBt|@<-%SJInD0hjwA&bcmBXwF!m0tzbL-e?gy(Q1GQXzT zubP2FMn_SxYg!SGL)sVe{O5(`e;6R0D+I=)jmCYy zNa~pdDjBjx!$?dGhQ}wGmx19KiMylWa=~=LAujq&!LovY)0S_yC0yz?jAoQF)EGrh zQ37NU+U~}H!^}JZDh}E+xCtTs5H#~kpL)ZP9qJhW*C6$+4+pQ7Z3vp9&snCAOEA)O z3#&zZn|Ha0NVg%A$jRc1mjx8MojvkoiS{%2qYZMm z==h0;#{{~>6uRiBK_KZq1y`c-XlSgF(4aIC_95?M2RSmYM1HUVb`Ca;w(<Ku)xa9Ib*F?-GD2M?x<{b-A`>F zXR@`1_g7{4D_u=v1(4Fw{w2eo$}l;ccg)G~X0KA^Ljm&(B5IZeaTwUcVU zA4|})InpHd)og}Opc+mM&{vzDUI?ihjI#N&UApBU)1yF2ZP5}p=wu|)#%*#n^-H9w z&bNUD`wy8qFrEMG4RB^}ywwqnwF-2g@9GF^%hYK~4|k-9x(zfu|1P|`{RN)WrtMbD zSXv+39sU#=uy|f!UC1xj)}*-6+NiCGQ#wv6`kb6tA;B zId@#o-AWkx8)y+JZfE`H8q6&^H+9^AIC zC6`_~CAno;`3pJ&WhB$OneUdmwtR1{dNN=UVY^%hTi%HJd2f2a$ao*oB6`$bGK~r; zauKn)MzKxrn`R~65c3BT)snNVg;m!TQX0ND;U9I`l=^7IfdHHQLr!%o54cCu{w+*} z=PwOkXL#0aGDl~xCq(8tFO6l{!0iWF@x72`hsLsLCWHCW_pMg&1kNPb7QV)EeW$kj zUkpZKqa=(N6oZjC8<#X26%cyc4j#`1mp0Z7-X` zW}*Z+KXpNrodF~x{UrATk=gU8ud|Dg6!qr5-GT&oU4{eN|G8X~7Eu|C~<7kB(lq(k!v2yqZ zdy`a%Ud}2a!Bohvj zzi;40+cKF_8 zH5DGG7r@5%JY{|%^sAST%l#UhS9h)*znegyEIptL^Wnmz2bP`~@%ClN z6YJW`OBSwhATS)j8Yq5))MHckm>T!{44CC_Opffauw)KZ{bLwujw}szeE-yO60m!Bn<4+D5n(Ji&M*XB-!DwbjB~n^typQao`t9lcOWvW zfB>*xXd08NU(WD9mMR`Izi7dgN;|eS-@RPzANqZyQC&W(2TcgA(mm)b?tDRDF!V2u z)%A@^=N97(-u-^@bV6W5C0F2HzlEw*ev(a-Si}DM9X~U;h$!nTDpj}6G|A$DR_aiA zyJx6ok;Hd4UClmslQEu;!2QdZ}?I0Hjs9eO)3CieDs>- z?SB*KfwDMy)Qho>U@cg>9JxK6tgWN8NE%G!a}a-W01Cr+pLA{f$n37S2JU_$H*M`& zrSUWmL%TFK{E_^F3-a zI&L#Z(_1@!u5J~;aK6BP{k!j0Yg$CMGJ5}3PWQcUjm+oyFr3h*jBa)CJlylY-C zes2mri_hGvD4D?=5WQ%xiL+4lPJ{Or4H!#F);~BaO3w5X|G+UTu2+vpLishhl#a;f zTX}Rf@o3^g&jEBS+vL|HMRuo9{J3_b%;;lQ%u0hcBY9Z5jp`S9j*z5E#W-#gxiurLnd!6fR9KNV@mPoO4o!_`nvG>&~m91Sk zoVk<*n;;sZaP{GK-x{rl{%Hmlpp2e|;bFvlZ;q@ZE+rx@9XE_R%58+JntC`E3=<4n zh3vGFs571WHsy8kmGkS?>gEGnjl(x^I<*0Yt0BRrNykr@?^zqfzXXNNRYx|0Gi(wl zvyBZoSce1CzjtHbC@leNMwHI%ZOpy6LBJ6FgRtJZ#&)%GXg)t=Gp_OLa|wM6L5t;W z@GM^Wz8y?x!GKYc&}06(;r_^=48_2k!+3g{l3oaO_Z0uyvzm$tAD-a5iI8PdBQw6x znWa#yXr+WUuDNuYFCj+s1;q_Cr;0~xeX7s~)*p?e+dL=tWic5~+>uaJ+Dg|!z#U2pG4$oG|?;3;6lR%^1EGz&muj>K8O&G zhT#J|j$TR#*8KF#(Qt}}C+`|wW)^#XyK4MW zMt=`@WnM*@`Oc!*C$r!{op}zst&Z{$SGqWMbKL3ev_Ue4^+zjc>IF;0yCkXeu`IZ# zQMBmUXc#m))<%`6xiA)VrKHk&@Cc!M&byM}YRKf0{6wgtV)f|DgH@Fcyp~)N4Yg;> z@)O4H93`QO&dDa2FfMoDu zN~A-~488Cwci?*nG)aHhyK%a~UK~xTbrpv9U2+1l;jpFbab8n3iOy1WFY@zXt)@b! z&uU_a>(*Et(G;^p9&{S3h239JG^H5(dAg{g`lKDV9-L zrm^N}VseGNF@5)Dj+~GyVt>NRvR)OxAZd$#r|B-F_T`LFwV95dx0ap0wdw(&`;|LA{qv3mi?N%)2c9}~iMwa%d~&nCx-E$dCb)s6aj6z%ILN_=4>$5ETZJLODsB48Bvs=5x3mMD4ncXlag6X@ ztUf*qVIx0${6V)G@Kl+&4+{7Q7qc6|fE%x7`HetY1%v=5yHVCkLch4gbBTsk$O#70 z=a})pXgqTyPKPpW37hz)8D-ch+7FdHqB{-u<3%f`_ym4ExB5Ejc?TXIdv4O_4GT$h z`{xehaFL>-Is^@s%D$${ky)yZJ_1smB#G|4{Jq7+bdmkr^+S0rnozE2DC3N<_)w_5 z0k#Si4@g_;+e&R=p`a-lj2p|3tVtS+39Ar+)2;(eR9o3SRfpu`32b$OwE(K)1%&Z( z1W5wZ``#^{8{UFF37FR<^t-8HCzF`4LF0&cu#Qh;(c2`w=Bqufi%@%zAi(X7Ois@UeW_(qHV3NE%@aTJG3;+wG z-Rzx5#hS&9N8NAHr)Xi6_DUlgrg*K+e*Gaz*v`u~DPTv4lB<^IS0zR0yfHoZUGWqg(&iN$8dW zny4n=jph`%lTES(_1LJ??uNLF+ddZ&zxd7-e3mfqrb1RBK0Y^_BPlaWTb3VlZE2R7 zW6|~b)|Z35N%WT9%!%#wBDPzKKoE+`GEPNw{tK3LMsM=|bBqjy6cl$0nH44cvlM&y zZ>5+`jmKuy&_ZcU+Oqe?jJ+b8th~FoYAM+|a8hRTec52D!>UJ9rr0@@w)F$D1PU;I zb5^4K%DYJW*)1g`=XdZSeOb(se-|$UiXAOMM4tz#024?knLHTD{DB`m^K|^daFL|C z^~}qcw@C;|-3+PF#-EIkiJ;3~HGw=}|4dx^$h7Tk0+m$!S;i2Eso)yJ*th{0_lx2) zvp2!H$u;)xe7-yVd>!B=P`kYhx zTI357y-NGQRreY>$+v^^AhcrOgRQ_Wn0X;5uv;&#G(0Zduj;Gc}T|2 z1)mSJQt|qKAI<>F5TBv+Dgg8uKh&FLT#lvm!KZY~!OGYcxI z;3#_OgR#`kECuM4KCUg?H{I+>EVWxBWmfro^@+e#m;=+%==rV3V@#|$jLzB!mWb?_ zHZYqB5d?A%Be>>kLN^dgp3jNnSLq#ce?QG5$_)NG#3cs?Q1xJj9G6$92KnL&>g#_K zy8wHBOASl{+ONMA#hvZBBwdc(>%8phiQlaDvKL|~r}JN5lr3lsyj4dBrvm4IPI(m#-P#SA48>sEq21sLD6(@k$zA2yn`JKda`OecQ8F;#>~ZM0jGH; zvGv)dmG!zL`6?AyI(Piid0kek;>gU-s#vBB;!ik!#72=7qP@;x!~>tOq^kxuL`l+p zz_lb4oF6oK1{FzrmD35a4_jlRJcG{Q1!q`cI@wchAhFaFV!)r5%y{*5oY=0QUX?V@ zU>m=@(TIkiOU>ZM`Kbj?^vc>cVuN3|z)wG7%79p!?dB=U%mEW*O%UV!`+gsgQ(rv= zBZ(m>qpoUa+FL@6%mPcz3v*eodHJPavtpT6fxrD?!T@3yKpo4Rz=RQm6J&W@H(vz4 z&VSeM=9*QOXY6(?bMoqDV(HxJJz@58oTlZAP zwgRH%-KNQAp}yV6U(I}b^hYVli~>b5?c1aR-gh4Y*Y(yo%HW1V5q1IqMF|+{{eiV@ zu1X`+a4=8Ao;J|S54!FWOWHc9(6pu4grdj;0^eei!iwhC5=Rpgpu6hFz6Qx2czDzD zMa?^HnsVRND4+((yeu1%e|l7Ht#F3i=UBDO*h4)BF#7_(yWD^l@;@-|zXJ(9UG{cB z*>&QsfFy}`*?0F=Vdk1%m)F0Fs8Ye(8+r`JOcMtn`S3rd($#Do%PmKBoAW;WJyq)N z>NAkGxo8 zwJ^V}w2U-3H0cKR!d>6h@D<#Ioo!F=eu4dE5NoQ-0oOKJUU*z7QO$h#kEG!;{@mbjraLaUT7{FJegi(Tv|f4jxnjH61I1KV!pbQAA3+UB;S`YN!-9~aal@i z;PRa<#goldsn=KY=zaAbids4wI`%cmV-rjHi|x zK8=^w%{h=*=m<x3M#sYTJhQ$HUqP6v6n;fbftaj6vo# zA+>tIe|gBV?eG6e4h08&$7eYBYAGs%+VmU7T#BO|nsV@J$}RD85u;WzK1*MY^vQff zojhJ&$tzg&I?7y8P?r=!A?XoUY93e)P?AkeQKI0)UIKa|nl9{N=QeYXmB#rWJ18Ae z3fthI`^Mb6`?~OtRm&sic~XpC=#&~)G+yEDasryg`RI8J{djD}rA}R9hK`_SN%<16 z#$sradR;#joDHSadaPm37G>CsGeB%~LsZtWpT^6n6o8b)kNNpYXl+Ka?t}MG6iHsXk$K~>vcwBIx$eu(K8h~@XagxEN?2~p%GG;V1=L?s_fnifz91K_UwT_9a6|AS8ubVg6|`^l4sQ@@xfChXktf(YDXFAg-) zln+?49cC*|@V!NzFGHUximQ>fEg$f9k+XPVf1rnHztL3B{`x}st({A!M!N5P(19){ zFsQ_RJv?ondb$~xO$MMHZn4&wFwdYfNaoo*7zMZkE9tM2PrjN542w?_y+o3p6DE7} z@q36vHc7lg_B>2%Jzb=SwH{}9n*$@ko8I69oDA#GJ(Z*TTvD5Db=$8>>1y`;iKQ3O z*_i}0QJ-OM18<_gpGlG6Oo~4}lkS5~uubu14NrtmmFkeRni6#Tw~Y;zVn;tuL1Gbl0UI5}}}%MGx|68jA5cYJfN#0I>2uE(Ue`0y|_}DB-9i|I@SU zs*a1g&4~lksw&Z9b2$n9>Bn7v{rkJ|K1U+~%gtzVe6ys#rw*$RNYyH~bqUP73ekmo zCtp}uqI-TVK|EwmV!a2gQ>pg2H|m_TC~X9xK4=!sn^ll zL$dDg53Zn8)qt~f8cnovan$vF$nUr%`vPJ2tAeQqK&9@~EH)PB)uKw|roMgoj_noj ziJW4jjHO8qwm=brHg&Y3}38+0gdJ<<$%0o7=LryeX={ z8AHcxLwa`R4Zyj&@_IW!8ix5gloyr95hBwIEEGN)bp{kbAHm`8dWsw)5f$VxTn{Bq zL!rb_9I-SKf~o`mG;J&vfw?T3(jGL}U1p+u{UwTJ;+8mxE?m~`F7hB;%*4b?qdP)R zsN0J?d4Ia@6Zc-Y4RL``a;(HeQg#mPgtV!D*zToJoKZ}%V64-WQv7cS<(VQ*;4z91 z(R=%-lAcnqY0IJS%IJ=T28ehqmq2BDW4X=!gd6-&IG!>mXx69QF0u<@s8G57F^#IZ z2&~AN0zeuS6tZ`>V{U69e!qf7L0NsxH3?m|-Xt{U>vK%(>vm;dY3I@Y)a9;3NBEb+PJ)E&*C29qJWmi~ z6R84ed|bIZXP)fgJp=E)Vlm#ee5ojsyW7)eG(-^F&c6=9OoMDCbWvlfDf{w4on%|{ zHT(BdgV7bA#p9sgn!;3qFr=z6swuQr1M|ll&TLp$uqltQzCxi|S|o%^PY=_DdU)Mr z8Z5|s_gb0tzyq#K9VyM)w6m2i`Xaj-XtK<*b_AJbG z1itEH!D`V^5N!e=0N=FxWY@uf)RtuGu4t`EAQW>A3`n(6<9JsY`zCFHJ7YI4)_aV9 zcJ(N@qUOjjpJdM-KSl~180&BuuXlercDoxhPuC5G!Pw$EGZL5#ZYb*QU1F6-BXz7I z=`z{1zSOXMGdswtmQ(J6ULxIo42o8tG)Max07HS_gyr9|3%QUGnCkf0l20?+STZIH7*;C{;r?P+S5f&CdF$-mP4j}&Ao>%)wsZr+G-KKLp3SZQWl^g+_Dm}buM_mIpDV1eI z9(UvIPahCS%gZv#Md3%V;t(adPAZ)U<;9|UHPxl>3xw*bOEYb%_piTsCY2RVyU2D} z?RUFB>TerNS*tw2+hM<^5X^bFXMX#C)Yjm=`3rodH3$@us>S)#b)TI=n1VOu4{dcF zMWX=pi9F~xfbh>1DW9R5@k2VX8|x^K*q_Kyxnd|q$yWaD{)6QW3KOU$@@PwaLeEYM zyzgiEQ1APimYQ)=;MAtqkmHbqS<|3Kv@UJ7pC1}Xd#5ka_nH{jY3^zxG zU0v014YmaMKBxztW%96o!tm!c{5W%gE#;;^-Y0)Nz)@qB*52WpRKqNgzuj;6W}PrT ztsA){kRJP&&WGtfGSQzKXYzl;dqfAuB?Z(SCFV% z-7U1AwY*I9AehOep5p+a7Ma(pA=hTALtuME z9?(lkv&uy{qUN@Y}^yumn$L9>rvjtjN z64Oq2`)R0)9BdiZ;YHHQU~+9egBs=2=k-wfW|b)Uw4DQk>_T2C=VMSMlmHi| z?Hjd;$&3C3>dnMzm?UbL_F#yNk)S*6@)*G8zbZUE+orW%B9H}kAnFcFy2KXswguo{ z!zA&-L;>h}fmX*TRM;p%{7Ib#X8phg8Z7G^ikFj%9Y@t1G=M3a?A@iNmm>!@ zqYXvYH-lnAly8sX{0B=Ul|t7Qq>P%N8b?9!z!b4WBOcD622xQ5UFIeg*!3oDBUhOxt^jJFo#Clcw}qI^D3-0SiAxEFE+M5OrNzz_x^{w8zCFncE}gON zLSrB(>TZq_q>gO^u|MEmfc>P_`MSow-}tx29+bX2xfrJb!1NC`3Q4ODiiXq8Qd#%z z9$)=Ii5YLVt$%Q6`XBi>9$iDwBuf6xeOS>n1yv*~@Fuk-NU@n(MX1Ra*f`!GY_6N) z&N1XD2{)c?cs@eST2plV=r5VSAWTyg00MfwQOdwx!~#e*;d954OC-@tBvWteQ%whh zNu9V7fq4<^+Txjk;pYEg(N+lONvw*S3Jy8kKm*Q?*>3cc>c-Gc+ZT5e2z?bS--(qI zw{S_#@%R&eh@@)4`EioB9h!a=YzS)0G!@OBM9naM2vqh@cm>MHWgKQZj)Pxgo0}M$ z8jJsBc@8?KsS2HQufw4gx{Ri!i9@fZ33mSP?Utf z;irJQ<%zcH;*iV3bX$gMMwKi#GacO=_xTS)U3+oL*T>xKxXyRJ+N*Ysnj5Q<9wcS$ zme6b1N&=Rr+KB$~HC3S~qS+eZ+v7O1q;C)FA9M%X9^RX^D=y{ix^oMWKz3bSzhZ~p z*9Mu9FheUsEzkbxjAcnOm5C7(^T`f1_9m4FE6IMz%VV&yaizc^aSE<(mB;)RC*23t zTrc-d?yhnL98%`okl&5GJFN_%W>(nBSn#@JhbQHMl>CoiEwe72m3(9`TNoQHA|$2} zYY`1|5eG=)60G&5Un)2tp4P(OMp~mL@~k(w)6C5{}6KNqw1%jZGHV5 zVDzgjE>wKw!FKulqE{`S>arDx~HA0D- zo{T6yyPkR5+k66Bf-U)RH9ZPr@4PyH?YRGgKG7)IK*>1iwnWqMdOT*xB;vJh@3@-9!wgvmtRk{IQ znz2uYNpv)6Kn~b;0Ot^PpOMR+!^+#o4T+$JbOnsV#IgcqF72~a&Tn5!2%XqmnAfF6 zbD{lNmFs<29XW4vuz4*ZmNcGn^#GW>QG80791Pah8$@{6Ti4%qJdlcr&E6aLm3K4H(Txsri z@UCWU93BJ@1bZwvI?mte=c~`>^*rVK}081ND_Q@p*7-u*ySHM9I58{(d*(ypzO!6PGu$=NhS(b zjQ%VdNzn@yfj6;mGpU}Zu$E65T~@-pAB=S$QF7UVwiGdHv9r7M>L@>{5P9)oO48c? z{U8F3Lp?(|kA ziu2{UdvF)AC7R|qgj8iEPFj5LwF7_d_JU%uPB5*H1if`=P&LJAEdg@n@v^t|ewTY1tHmwKNZ<+AS7!mu=T=ZqU_n@& zFxxvcna9NnvShwh?_g60;Cuc~!{-2B5kH*AR2GceO%XX#2)oNxO zL8=31e_9S(pI}@EIJDVTQ@h!RGzHS<20jf(@wP+;l~J8%KzSAKbwv8c0%C~qO#;@U z-3zk)T*i9?k-jR8V4W8Jo7&moBdrwMDe%yr)+ON6`D4t4a=jkBR-bw5FRSlG{}_XTYu)OB98FX661`q5xrql9fxhY-`{UT=8h^%Huq3ow4{06%p+Zk1XkSwqruD z6a1BM6T1xC9(6>%iKP-{5WVn&q$`?-u{R8B{Tc!IJ(ZsNllnV?H&5BO@qbTd`8ztr zLB)k<1^P)%kJ-(Al{l|cwB9X0UHE<+2Wvyj`sVAGZI{VXhsNG}gbotGQ&LNVnVa5Z zS0RyKIl(oYf`{*F5Gf`q4}PID&tu!J4O4dbFQ3VcO0Z(r3H8^L9AiJ(ExFf4uq8jY zj`xFcb!s+FVoj96bPW2ng6R6@)qQlANIiA-zOpg;&V9k2_1EnT578yhDT8Y|x~TvA zogcTKRWK09*dTxH=oVDdZ-dzFa*&Mqs{j@-{CfsmUV*@lRruXY6a|9{-&xgyX0$;C zoQnbfh>+*-=Arpe2aD=bxW|_IJu&Eo52UpcH69hF0ra~wM zKIq_Tbj`BGxp@|P{YDRJo#Zh z%A=Tk&AY}R8j(NG41f06WTshjMe}uLP4IBm$f3B%Q`M6^KM|MJ_-n`26U^}2o(h+f zkNR{%oRk6PO0p8p$3-mACCHVl|M-4w6#FN>k^P?Jekjct&_jlf#jbs(XDTTq9xBH2 z{6++q!}`X5Jy&+*%IL@%x)HjWG@BolDeEUpcyUWT-^vc)|6JcxX~^0c;qjQHG$3y3vf{hbNdC!w@&}F->@0<&7BsL`f)_bG^r3N*C~?0&aX%k%zW|Czd5XPB6qQYw$3fX^caQ9Qg;Hy;0RGtG z-=|H%_`hTx_TQ*It&w?MsR=9K~lm)xwx73n{=Yj;rV67HYHC8NO*ZnY1Z|e0i#G)+c*V40gKf%!Tl*LL#Ka8P)c4c}#K4!I z0}X0b%Iz!x_Dlf)z&`_Ya9MsSo@%XRmm38#VCH(x?tqI%Nw>k&Lg7aVed;(e{b+oH zO_s+0XAvE3x8p1UeXnaTd!+Ukyzefgi*qSRc~hJNYZsyM>LXc{uPg^v&aK1%QuYB< zF39Ck9ADDYWRN!5#}Bw8$w}2w$b6l8TODg^MbwC|+Ub-L1sG7MEj=C`YG#P)9Pq1} z-nK<)*YI4m?`&0-d&R=`roHXj996%78I`Gl+pRYg)!~n5SfNwSQBi7w!SVw$5aI3s z%l%*%md`xRHyz@`+OTk|sHh{%YTYBuF7}T-$ytu`Ie!(RD82q5)`2e%j4d*$gQe2e z@TS1t0u_X^266#Wp@5jZfs-WfCKJg`dutb?dmee#*+(hD1-s|qCaecVUwce)B)APO$Wn?SmO1Ly@0KxV{weV~7^JeE6=c^VW_ zY2qCwkyA#=GwOv;q;J|N!nzuekpP$Iethy(Xj_5&u*$E&X%%+Sg;H$N1AX*+#GICA zEE>SUq!n)q5mBzYdOFHnd)1SZ)*BvGZH!3HaTgX44|aNzmJZt(W>dN_*ONmL00v%f zYZyLhzRt$+GAQdPN5k&*bQ`26Y0uL^sS5X7*BD{@zRcMK%l_?>Ys-4hk_E8^RlAJ; zhqAMPigI1w{uUHOX{4ltK@jPZ2DeDb2!c}5EubJsrxr*tUY(h>vG3^8=q z_YA1Vz0djYy}q?r!Ww3wGV?y~9oO}{nEpqJl0P0J7?515pA6E)1FuYI_xg1Y2(jvv z7*8c?YDKB`h1zjU;d6lNt{-m7}6 z>Xjv_dNXiUEmU5UY&7(&9*RL=-)cb?-VTPvibw&&3m8RUL;0;jdKa;WW422aXLL8v zx6gOG0$R70nLVQ|vYeSAdpN%bnzPg#YW{^75wcpHdK96`#*vX$+FK+O^5SH?#tD2q zm3VPfpp*kXY%k+JpndFwZ8qX2^qTw^#_QR^o3dx8A_-TgytO0iwn%;jI>H7A| zLIo7g%uu(NAVL-}NhHfffZEZl3~ZO=r&W;V`pEl{4pQZh)%|LVhRbpkdhAkvzxket zOwf8d@ZD2QlyW(<=WtAwpIna}JM8DTfvV~6S&L(fohsb|C0ZJ!xnpcG)^=~_tW+gv0<60cT%t08J+OCus7cZ*JPP>`toM$@igF4B=|hoWu1+7&`)OWKivw zg|BVTX$xt0>RmutvGBdK{5HMB;3*veVYNZJ4sO3cUjIs7x_j~n>fsUlpK6a*rpCtamUCr}HC5%-@|gr@hAzZ; zf@n5eS6s^7U$-HpQhLmUmj`=yFEb%Kn-{O|h2EAIXa&FdfBbz8EQ%w?){RukX$xfr za%2Y$w<+OGOV)NFmbFD;PyUC*Y{QoK^aU&EKMnl-m$GW-S!8(C{ug8dISc!u)w%Xk z?;W9$1*>y+^(c!DH2+}bA{b8Ke-d03^OP33957om29^a9x8rz_Q-X-0B6t6Z)XoPID2#k&}UC9ID0~+Q;}npOY?s; z-w@j{)in3um|6>_H65+1IHKE_Eu%GBU%TX*fZEkkG&*6#(4AxKe<60`px3TxiII6l ze1+k(+^ff{W=5xxpW{SuVQ#QCjV0$ojDr;OTyCNZi_IrWt6$BKP8rLoxwzT@S&Dy>M|au_@a1nEI~VP3|R9c)8!4 z^Cmxr!|+NWrj9+SwcS9X!)lhnz4sND2C-jI7~o5`cdO2Sh;Q6qzC`WvX*;2EGsPCr zQ>TM)IOi@eo~+s=yz)j((q_PHp8UIMqFGCYJaD(>sLSJM2T*3nPu5pX z_N@+OXpfH*j@P;r&)F1e=CF2=$LpGTnl^?T_spq1{_b0w-~HrZ?m%?$VmsADJe_U) z)=lRGwW2L#Q06=)-J-k5KFJ&zQV};lfIb4?1Yv(xJthX>X8w|yVbky%Gv;!(;WkLP zBYc`d;uL1*CD=&VL@`Nm-Ppr|B1nlkh=?j^NZ-0$7LE`rEjJ$WGjny_8i@*&Pg|{a z+TH_Mn`tavTTA*_Y8yfQe9kP-NaLWr{b?g&!>X}6t*ty5smPUi@~_eRdda2x>5S4m z^|H(}^B0OPQpf1)48N_i1QO30R0@y`hHI)fF#hf2ybmv@{k@;p!(3+ZwzC6B zRh>^$U{2kX6w<=)PW=y@GMH>dE=^6!n4j^2^#HUULIh`j7+h%bk;MkiDE*1$uGn3S zwtAX}fKUP1=1R5}IQ#gOk~`Keu;yFtDIaHE2e= zs_~*wdCj(r9jH(wdxxs=W9iQ3O)@nvs;xiF9xY5?1ADD2NZH@Zs2^U_W}J=Z5a7o@ z)kC76)bpdvI{iMdR-;op9wdKz05UZgWH^?@rN#J;cEG8lv>T7je~?sm z=G1|Sm1laoRnElR!(7~mGSxEEa}(VNaQVg)ks!(e4_kD-+RA^o%60vA_rBzk}$usw_tPqDA+!uQg13(^w2><@5)!-_gvT;qmz)q^^r=7Y7TBlG55X=DKffW|&47g6EK}?$nZ6fZB%L2zQaaphenn*J9)!v%F z_`%NznnA*?tBE?2eHOA15q(P|2oHaOS91@c1{O3hOI{}8^y{k(@{&eE`sPLrgeer! zr+Ilw)6GKY|5ZfdO=Xt^T8L=~)sXXmNZ=AK)J1QwUoJ$U?ivvM50Q?geCxz0#vi%z z+E)9_x&O8jA4C_eJQUlHj}Sn?0fl*Hj!c!ClXKGG?F}Z4&%r*VxcNU5ZS=nwUEt2T z=0#fXMQX2}#T7!cW5P#k1tQI`61XL%77ja1+hz3RR1X67NM$_=@eIapY9PoERTly0 zmEI{cr5DCO4R?qG^j z>Uy1)2;1ycAy~z>g4kHWjed=LdR>A-@{~)IyUwoG#sUHO%|0R#&#rB?uPV~1bsr?^ zXeOYp1C(No!tj;42dy93&cLD2+9i0ZM6{=xi}fI0sNv*fqzk3AK2ZOY<`{$+9=`c; zTuY*#9fqpoHV~A?ZSuiuTFMhNNj61MMInfV8@RX59|Y6VL8`)JOt#LuNSp9-1-DNw z@bSE8^n*pwLwF^bE}u&Deu#06fP-Dbrx|GUjLc;rv_SEY0y#@>`5|x$d{_Tl3}SQF z=%CLykFZLJvp$M@U0w=&=D=uMZN_fTtrZn@-ds&*EvKQ~@)T!&?*_MD?;h_yI2fSW zkzBs&LmHc2cZoSz{T8NSFs0+rx2DtoWLx7gM+H6iTU>qb<4nh(A(B zwxqP+*7U{!*PfX~py8`qeSgcDx@_~U z0A}(o_j<%(j}5mj7_N5JH-J3&8+H5RAW^{TN&{opE)KebgTh52UZ(Y{0pC{J z@e57I>{xuMB7c32KywNNWqySr;uCmi=_9UFuG%}w!i(hOR-`xB?VyL;_Q zunQ{Y=D>^`jN`9KIDeJoC1b3_J*ljiA@IN9hIwaD2X`M$&e za4hcU-;9r)mie_t24RQEOFLG0b#i{dCJNsuHBtG)vLm65X7sUD4~Fd% zBqgTSS)DGYesVJr+X(vtXd>?2e}X>l=QPS}gc*umjmF`ZiWURmEA@rzf1gsMe$xJ3 z+_b5wGClKVH=-~zv5%prf}>%7c4+RajNTCMj!vd5SaU8vmU=9e_NgkfYteh33CGV8 zQ@4s!(Wf;IA~oa2-SK9ZF;5iF@;P^@{+G5F9BS7xH#w_3tH4IrSNZE#ZZi)RiKO~# zz`ZBA=Lk3AkoW=ZJPnY@!3iy^=ZXYJ8P)8tKKEdAA7XHH+{UFrLpHVqWMKw0JzCo#66MUZJ4#iX40 z%`Ik5-0AC;s8+s8hkfFvdiD*Z>{g+gpb1tGY=--$qc$dzJP|HQw0W812Rn|4OR@W? zs(9OatdA6Plt=)I@)@7B`M#m=Sz1@qpj*LQPvib{RNqGg7Y%iSbCpTrI`~ZB=T8LD zkU0e4j=G^rXO`BH@Giw+`p(<4UE)kQD;+PyaHt(dF?1uvQ{&Go(DAP99t)ntAJ_Zd z13!rbgElhBS>{&{TScGr0cYcj$z3KPDjpMoyQ$|MLQp+u3D?j1K>==b(+k@0?&G(2 zAkzXW{8AMp}2Fb^^8xO^HpRM(awX;*~~dsj{=M~+4T6_L*ylB+pR+3 zLAsA(IGc&Hz&*#W_PshK(Nouf|77;%A$f4nthQL_>IkWNP$_uAO&155+O}uIbQHUF zN^1zI|LPOTL7zB0i0%`$K%eL@&5?O)n_Sn0)|BiZ{hRYA0r7>NaK0U98Fmbd7rCKi z07md?b6X|uiXI~~hQ#7xFU>-qYUKzxIn^8A>e_GZWxNI%%1yE`vnt_Tn+rUUOyXFh;@V4>I~2x8KX4w5$*@p4f09U& zm0e_sWREVr!Qsb|)Y44Mo&2s8NXhV#)gfi7}o=sOc}zsMe% zR^Ybtu02Zr@=Fp|euPY|n}*qE#*k5BfLA1#*H zNxkxNG+F8?W4in^OZ0C^V?V7>=ys#}f+=a(zqA7(NYD=SD67DRuWXBl7#Tl(P=22g z`Sj}4%a?K?L3jV}1V2c~$=CSv{rC3DjdA+ul`{Wz|0|6sX5Bqv_fSdJtWm4YyH#MO zQEvC_4`gSpH*xyWHtRe3_I-&OH0a;|m{ z@ZT9bt-hE&hA#3gfmh&Go}XM081hn_7G9?$_$V$Rbm=ugkv{>aA!`aK>U9e|Vpme3 znNqSz?(icLy%*GX?Zr35McV5!de#Bk-8Bx4K?)x-6)R$Uux~Af04G+Yt=sc6jjx-~ z*i%Z+y{+c7@>g5v{ZSHFmx#m@TsFEwM+(qIkiVjf{;JYH?5kP~DTxJcB$@l#mqLQR zB&EvYn?UyR_I8Nifzx%f5H8MDhb<5ajTOSU*W|HVbFvwHvRbl7$sn!YN#C<|>PZ5s zm;J}LQhn(l?5fpnY{m6_=rva9e!&U=0F9%SK)Xc$WOn|vG=_I)#fs(AwgZV8#ui zhJ8Z!qXk}K&b2NvEuXXKLGx6OKXbki6E3?Mxn>F$R-;M9=usz`2 zR%z!z%z7W>XYT(t%R)*|xZF8CqmpAV{B2Jph|3l4-yvT!|IRnXsDl^Fz_lFUc#siq z6Z9T31IJd_3foWw?<~RMEvKXJVu>JdSf;3EinXSt0%M2cy(dMo{Cs@aLm*7$)1ECE zx=>;XceM@q+TS{Ob7rP`(tAojB-pYc+0OcS$k-FhVlT4xv35|2r+Q}F8WwcG+@><9 z4m=?6*&rK6RpH>cWhg;9b8^yG9Hx4VN7L1}DS2J;%%V$!| z5<|f1lKRwMigd-b_Mwjh5>$Hhi6wZ~I%xxpikfBH5JDCns- zp4=@zWsYaI#OY3lH<^Z-6@3D6^I`P2c+ectCtr-v^ir?Ddapox^{0F`zB|=}d$#ho z$>{nGlaWtM5_xC}wzgHoKJQKe!}TLYE)zn574_M*Eh#eBD^e>PyPz}U^1?!voE zDNN4RSYR`cQd`tn(C|FaNxl#&IcZv9+bs8qCzZuKByT-aZqA z`4jJG$h-r>W)S#gGeVh?n=R#O&E+U|5quU*W@_T7nM(1)Pn+6;j2QBY5BE8!dq@!} zOkEh^(ORA^<^`UD^(`i6KU7wC%j5=`L}Nq7Ksj3Y0N4Vdw_}(V;-FK^KelYAS0}GN z51PUE3m>7;R-qiKSR!g_7of8gWo`FVRgs~Q8x}97Q~H_aTyI7MNm)P{u0}skG6C1m zY#~saGR>3Bs$}~>djgvow7VJsaXo|df9w-}1Ds2hLmoN;19Vvf1HyTlzYfHI&Ndz^ zjbuXdmc-opwioQ080T`}pY$DONq>0Cf13a9PLi1T0zPQz#7>jg4#FezJ)?GH&~J8W zw2z-Vnbpg-!OPYGBaPfHEGhiJMS($Y>U?;y<*UWrXD+#XBQ%dHg?tNL#F_H2ITUVHTHkZHXQ zwSFcNJr!dqb>4J~w5)C01Q=SZ^-Oq`zE%9;e`&E+kYlU5h{51 z?S)6od)(xAj&$>fwUbb`7*WJcUG$#AS*4X8r{Vr9|4r2 zKSqS~pW`FGwYFay7Sqbv)=qDp8tpSp;($mqlfv}$%Fp|!Fzp%r59zoKT^~P2ogA*z zoMh|Q2;fp7hr8F7^1eL*yBK$vT`0I-Fmm9wlQn%rLW)tdcS>$%;Z%`^rUx^GFPEk-7~A8GR#LOg|YW8iyBFw zN^6SQq<)Cm;hVp{1>J&wzp5!qD^e%AN@BrkT&y~-`>_$B!%%fU>KQeOr%R*WXFeYP z=DsxB8QY;5yEeW{8|+F|zbJ$)px7L%)C<`NsEl`wJ@33uWXvp75rHlZPos*T`ouCr zZO9}$4VpEcHamGsbwUK}6Jo7~if)<`qyR7RWh3q6yB(e9dIqqe=Jt#)E=dkspg+#w zNoP@SB(r8O&@ecj?*c}Th=CP890Ee=J5^{~Boa=*GWjvsiLnHXe7Ch-#?hV)wy{ z+ZM7-KlZ-wtmWa)_Ws!0EUicTU{DBxY0iwRg6Ebz$xL z)Fh(>U^tJ@*>KT%s=Z#j0diD1+=pZ~FEe|#`eu8}d2Nsw2uk9b`b^-WBUNL#C>3z) zeDwwM^-F2U>H=+t5WL?sgR&`dP%I{*w3Ialf>rK>p2k?3igr!UVf}1gV11l9&u6)^ zAZgxO*nca}iMgD`3)SSSP)>I$I3E5o-q))zA7XN?iQ}YBYse&!IY$BCH(|Mlp4ro0 z_DU%AWYcGQFTr|3Z;DB9N8-`9@u9#cs-rikqZeVrr(`KSh`47Z_sN_fIF(^WZE2#r z4>xQ3!LVZ`K38?ggKdqz!aQU!Sn0<}ntFbMddRF)36>@8=m56Wvr;UBq#Fl5_0nsa zTH9hoj{Q4#Sz0u#*HQ`?N+r_TeGmS9 zguhj2katwVue8!}|NX;PYFa{S@8idhS}tV`0M2Iu?R6_LMcp{2%fP42R&S=)amN6EplY6+#E)q7j^?hL3@-qA6nSZA&nq8{)R@*zrglDe$TyZdCUCU z3f@7IzQ>-tSA+D9NzHhbdExk$j}x?S#(KOuL#ExM5<`Bwg0?uwe==xo5_A97rU1nC;E=wzc1`9w*+=b`C2Q9;y>kSkm8h!aiM~-kq#wK5ZDs zIZEe*f&hKNX-~xqOdE_X=t%GV%Zhp(6;F9sp;lt68*X`2tzRELaQwlY<{Yx~P(S{& zMBl?j*o*U%^;5eqy`9a)dIKm+6SR8=)0WRoE{uLR|Kx5Xll?}YVDP6qUriSK9IeEI z=z*FXs_yx7lR+)gYa2S-e=vL6mAhXFeF|oB|GY&vj$sTou-oF1>cjZ!g!$`d^3 z;?(r)mo{#|rRorw9TFDrI0(sug%)pK(RLdia;Ey$F`$Sc_RhvF@2r?~6ABER#J;y8 zKiCDENGt^?O)V|0>5om`7kD&-4MO}6-<+*&86?rOQYI(|ah;SwsqE9zC*BQGkUb4; z+v0gUc{mvza(BaF^TP2c%EC?S$VYzM$1UB0|Jx1ap)!FC&RhBr=Ae8fO&YpXC*pZq zc{N-ykTC*Y{?y!e;upcV7jLPFz;>Rj3#ik1*ByeZ}8=XH#VEgenxj`?5F?1D5sZ&6(ElVVb{o1_9K?`DS6+x8LFK7Id zFVhfiS4OYkdaq!6byvQE*qy-dmQLLZiP5dDJ2wl88l?Ec%P=ziE0;*4=9dzkp~Bk1 zB=xpp;FnIMMfEN4JE*;0z4+DUb}VAcsEfcoS;p7*wZ)#tqkuH<=@p5U8A4PY1~MoS zZUm8FIIHzRz5%5{5>9B~?~y06W@DyFn#4ul(&MKUO>O<#MBJUyxVj#zEBN#+fATnb zX?DF`PG?lV`5v79=neYghZL2NUlFeMg@K1_nwY@&IkU{5@=dt`SI^3Co`?X(HHMH#2F%b9h~Es9W{bA#B}-ZnaLS-7)S*4)aG@*e)st}({BiYbrIGK=0EqMm?If4)0@wLEv6vx#~xwR2?5 zeek%d!p5=x_0U;!jibh$ES*T1ZoZ>QrXkdmZmh4P2|+UXiJ+q{myV}w`QxE!wTLBr z)IP*3*Xl!VCMSd)=s?PZ+H^Pd#3v5C@!O-bvZDjZ6CKYrL%js3EJrZ?N2JU1 z@sk_R#m!k(T)*Kzve0t8sR83agl}wrprunx;K!6+m6PO z-1|-&!HT5bEoO(O`}v=O;xIwNQ|-mkPkQmkSMDw5((SZ*t|>Z}HSNz$)!6Y@XmZ>DQr)a0;xHFceuI*xLPEdyk#$wQj<$39lPCE~@#i2R9JF*vK z@2nfxp4W*@wHf8wGAs;RRGN}|KhUp=E@1z%aVwJhUg9-D(eP{NlZpZ109>TD#gi#f&ar1K5g+OBYk6Q3>=8t(-b_UR6GcM7_xZ}!Q87E zk=NRX`A$=-MRp$d*nxm|5xzZ(#TZH4W2`m7cH=jN$4@@f^cxKrQPi2J0UZSUk8Xw@ z(;YltE1Z%<*|_WzOX_fmF>7{7gShM(jJ9{`ri*l*W!!F?Jql{JBEF(HeO`gv`oj(V z$3Y!EL4`@`p9xth4Bm!DyR?{KnYe(3BQ24JSIaOvg>kU{)Me~6y`&ppm=XN?pN1Lk z{nEMPC%HSg8lB{FR=!^rlAWusXkKt;b`mndQU!l90U?zr8`94*t`BS9BCDzHsZ6%r zyG{nns1V1~(r{B{P)$`$Z;W7Tn2K+JCe&gwtuj_C{=BmdC8=W08stZZa_T#d;wqEI zMQ7&aPejw03$=DbN;U*v5GZBG{R zv4OOfYL};I^HhMBlqxoxwl%9bm197Xt#WUuacxHu1rl zi{vQ;QXmi2aH8ySrmz@#IrOQyS{}7boX8ACF=|-yTG+F8nV;+8Nm9W#e_*a$b#K4l zV&DG30bQRb2lbl+Ypji+FH7*yKPbm#_!Rb!TxeYD=^r-WMa44*G&S`&D0&}@$#!j% zFE<0`rHTj-5nKY{u6sEosV~ZiwSsTU1v7rRbI(mw&)NLe!-P*$2!=_v2Ubt`j{e+3 zF}8y7#JPuEbmlx50`+(|k#E+$1{48VT5@u}4f{Cl!esKiqx1IzV(Sok1)gb7E1ytY zr|*jJSVk|jzxCVm9{e^;52Heqwz}x3vYxTN(&Z43W1gvuQ1d@+Oyqdew&4EE~fOC()SW)f7Vz4o0kdq!6@5`cFglzF~0QUZ2V^ zTu?++iQYAT9=Y6mFlbXqX=w5tu4*YMlfCb6XrgBgMSqSBHxfne_vX}tF&D7}PF90! z#qoCr2V%4subRe#x7zY+|AMFjTN%2*QNw#H7ofy~b_d>3@O! zl&(k6lFYt!M7PezuCXsXI1Tv0=49ZXgjBODoty=9mP21M^eFNtS~!AK!{}ws&*|(IKSUb+X2*f#J}s7@52Kayc&)i^!un(EJ{ag?Vy z`~yY*^sBABm@AbObxn#vU?iPvyg^zahUZUU_g8oa>byTe4SBxh=<`|OUc6kn!#uQz zwd}B7=6=K1AH2{Y=j4aV;NNKVu*;QQQYB01U$Z;!pMF{<_Dbww^?H1mZF-OV7bX)g zvT@v8Z-5_-<)#<+Osk9?`B^E)L>)nF)$-a%3bRdn%u8t>#RBt$yr@ybuCl%~?x~Uk#fy-iHLR za+M{?=L*0|Aq<5ghqMFbe-6Z=J;)`X<4m4 z<3&s+a{eLbrU~#^f}VA^ti;${qUIN#iun%_y~ayEo5^znfz*>BR{SAP3J{-IuE15!e4hIQEig{*E*(LR4`oi;da1NmUhR@odC4i_SVJAe`=2 z!T9d`BfTFtMD*V|4<5=kXfyv{QLX}PA#>siNr^U+k1Ty!@s!HwZ%QCx)%qZ%m|{U4 ztG-)q&w7OLi)Ibdb#%N0(^{4f%#ParX?A2*e?W^WsW&Y49{c7N!1p8{eAf1CdPvS% z-)*Ka)xOXK;SnpM@%;rM2MgzS-rH~XKG6KM_SNpcn3nl(dLt9kj~+eYzm<#*^@NpH zD3+Hz(hbikco7V9Wb09}=fG&HsBF50l+1n|5IYqh*Qw3B{IC*8ctoO|?pxG3C_KqM zUcy<%GPuC3j~4t1mQhO#nd))8olYoGXNCs(zVbtq`3znMpJIQ?PsP%yT`pAFvOP=OzkNIa(!;C%<4ruH5NEM-Z6yZ3pKQq63UQs zhT)Mi?eeY`T7{J<@o#F0ysV&h+Zj=`=KqM&qCX#;iB?{7pB+sQ-zrnva?5 z(60&a-N^U$1Zp8ABc-Sp|fdJkus;U zX*8DNDDAS2ZVu+eLsx9Jt0VaCgP&JKb|tYrw76Jo087;f(?h(oEY0W#OLe(?Qxn?* zq?yqizWA&SSgP?M{0C`2SgIV?4`#_*rzX-l!|2Rumb-LKw3Lk4la8e7Nu{Ji*jaj_ z1pcR*xR3$D!-7UM9ovA4yyWlx;{2Kz!7Cq2KQyD64}6_*E4PD{*9Vdp)w)Wfv#pO7 zF1FW{t$yF{XXVO;(5Xy6;jbcC1>Ca1^PL!5>p+j9Gxl`<^=e$YRu@q`R^qH*+c7g#oahC#J0ZIP0XYA8TU4ktc+c2ttYW$exDjg%C%AlK{ek5Anr= zEay>}F?yl2dBqV0a&-wKpL{G7x=NRly-hn_LUJluR?~xVRQ0%(qmZs!1&|~*_|Dp2oaGuB6%jDSl1f#6m_4hhRvd#_p-p4eoWpdm12!4-A>-UK zoPm-@ipR*$sQF3@@XPTiQvl0cs_eO)E8VZ;%7~n9r^7?#f@!Bb^EUt4I7+ldPBHb*HfJeL{hvQD~?4gH}Lo6 z-aCAaF(GsUn4ex6Q_qGX_-D1(l>3=x@!Pzs3o_UPV0tyF$5^D;S=37_qZ{F+1wcQ0 zm)0Wa$9U>Bz0kOy`|!%^UM2Ob5#Lq;ilIb$c%eG&h`k$7WeK_Lpmqg5T_R{{42+d9MZy%kcK4LCIngv zr5hwY?uaW>iR5v0PH!m9S7O{)=cy!{I?K@Yw>E?@Pvt2MCZJ@Z6fk1S!ec&zG2-cb zII23bBbLRov0>-&;%PNK6N_Yg;5*O{wF$^Qb$9%zyFoh5Uj)NOm8dbZ@|2bgGtp;$ z$=bBa@nX-SJ&iLzqU7|WFS4bssXpY3`xIS%T;%czIDEIkS}7CMcV|hK#mk}tk)NV+ z8u0F=T&9h$GNnRiFC=j`#VcMmS^`MCe?tEc$#pp}`<#f~!7+&Z7H@5w+d}%ul$tl; zSuTs7v$6hX1P$Kdev0Sc4=HwW)kyo9TdQ+Zu`aJ1rBHrPIW`6Xgx(GvVAlOvf_#*e zGH?aQpwJ`QP|4^LP#H#*SC~k4m5k~*<)i!5W3CfAZ7gnGtQ`LHF*8&Fo~<>DP-V4}Sn?3s zkE5Pqt>^yfp^>CcV%*flJE+hXly1U5lVne$M&sP7Q`Ry}Hz$VzLQTUQ{A zQBk+qDhi7iw$)fy3nnE;nk-fFF+xpaZ#DcRVMe`-jQ5SP&VL2&bn(8gb5#i!BXpga z_Txms-}>`Or?||k#=lR8Wor<{i~Fwf-&C6B+kBfMD>!zve19mES~ky-cfF13S|tQse*+3i{3j zE6>$P^Wm|q16EKE>xd>*ae#@XhG_~d)mGgMSY>a4Tt!uyuotUh7ZdMw4 zn~EbEtN}^?X$?3!S#?m_Rr1D&KbF}5MvJ&`y!qgAqhTqfdIU$Yo~W1qmFKs#5PHUZ zFH9nEGzSyx`4%y$>d=K9WezH#)aNGdDok05Cx6=1=7>pw@P3gHx)0ZQyu-T$Oa z{5O}mnQ^Sdwrqyh-_V@&!K?>R#v5y%Y*CoZ@;oHnd+F3RP^J=~*WB9hF5I8~2ZRaS zAqs4w-VrEGzHLef0y1SmR}Zo0alFrl&?u&VOp=Q#Klt?2s;nwQRx!H#5nI=DD+#F( zKE-HrGspM|fMuSD=M!r2wFQ~mU8~}GPF@w1jAOKj`==eE4X-*qs-ZvgJ1Zex<<`yJ z1qT~wkNo$E_Cc!HhmA7wUdaB5E;?CsTPWW}PAj$8ti$BXm6pwAJ@bAwmc zL0Wdf`tJLJRO`lqVAV`(4?Di9m89Y$Bp}W`vC6Kkx&igDoyrCwv6&!>-p+S#=UdEr z+G47le3!Iq>7YQVyBqs?AP^cM^X?cd6m1Kn<%gmVVh@|lYb+!+&WGaCzb^LT7( zN3&v|KElfQV7&L%(O%Bt^bSqEl=bTz>2y-ZnZ(jB(}_=J{xkbH!TY;m@z`?mIc(C) z-(FpduOM=#Y(8S8ox?dRW!75BNSBh9;DzXb@{!Bvp}RBJog|T}%?#!6t8hVQ*j3!vkNcPDi*Mh7 zmaTl1D!G}}>c3~{ZYT2nKnB%W$h3PmB*0O2ZpI-N2JF$8aeGc)Ar?UD%^M0Dz} zc`9h)-M|g`(>cM=lBIuvVp%Al!0FL_mPLjtg3eN2On*bIdY20(O?{Wz14O!QZJ>h* z1Ki+tiQ4o${+yjEQQ91b9x2_h{F>s=u-YmGh7mtv`zmfk%WvO=Nvhq1!IgD_@b z@82wB$wW>kfwz7zc{>omC zS3LoOB#)B=kE4FBD<1`a@fx_QHi})vU)gAvHSNU9Nwo?D|4|$*2myp`(l9!U`zF#a zFSbK&XScLNZ$>LXZiAADs=;n^Y|Wl-X*z)R+$h}}D<3rGZ9J$ZSXbZ)9Y#FemhYsn z{<_R4qKz2kwimA7q~g^wg}U_Q!F}U(f@o_ z2{wjk*wx5p^Yb;)$`RdECvS&8!HRg6hkeAfYAzI&zNlc4DE^gh{}XvLRn-315+nhW z%{CPYAbM9z2KoXHJ$aKw&t4h`b-Qc*oLgzFv8$_h$bWc|Am8wQ4}4l)~O5{H2-ubaOCbqCJ?p z<*@nP9_;6`^W9$e8>CAlX;d;5EV2h6slz|?Lql?0{+^-pOM3@T5pn-8Esg{|V@I!q zcsliDK<0rG?H>$zxPKIX+Kl8}45)}DAEn!VHiC#2!r=5sPcfSvNs^Qq8Mj+Kz(0O| z`&i6M6%p8&>z;0GXXDT$ylZa1>FZfTeFWxSqwjSq+K$giuK34g-%&wNT)T>6j(Vy6 zMU?fdn`Ezzm9;unU8iYFLiA^vYHfLEs>$f(=p4;2pxZnittw~!IMLqOteAwkz@(<* zQTh?@{h=WN&dexDX2-@T-7^^}v{t^WC~`x2T;m8SXb5te+|XJ|c9!UvwFDF~cVO-h z5IGP!htZy7>U#*__RfFPkES8(4RD>%miHUf^vZuME%%v{x$OoEh3EB#we(~VcoLzc zocF9eliQjs{VECXswDCHhCC5IhfN4M7$l!vx)?g;Pq0#9bI7&)O=5Bo!0taeFHa7T z)KcBhtIi;m{L}&dQ%WEi{QF2*sNTgpUUMvew^_wg7jn7$w)f;{Jrtnw}&Q!r@dCD9o$ z*T~k&t^=7tyw!KkenDrxHWv<8%S$m6lnrNi60)vP_Q?GH>xSzH+3=NLB#E}y{Y+rexy;peq*%N-y4|FFag`%Ye z#bPS~e3-rS8>18~3c%=%t-E|F3nU1_Kn3%+%mJLAwrRgBBZu@G(P9S>5vCSoIvt4*4}0vqJ18sE&NPl(A< zdf&1XzYbRn3_9T;d4?NA|0?_m=3jrU(s}i5&{H9BxYu!uumw?mY(1cUA#Vv5wu!X~ zHI>pC{35Aj7aF;F--#ZtRWK~h7n#m3EjLxic}GTz@9tlOl5ivtpAjR*wUeuSNnAIB zFYBO!8$Qcz0lI1jH7s3-Av796{~zD&-3}5abS@=#AKR_I%DTi^7+0kgj)y$AD!&U^ zzww&{TJ4h^ew*T_d{09mgD2XaGkdxFHAL`B#cV*fz|m(zJYSLttg2*SxFHft*hu3g z_@N>cy7=hjb&L(GPkYO|c3`%Ud`3v*YZ4c8Q;I*Q5*s#$<{)%&<}L10qm;!&R<|xsUKu;dwuk; z=AT_`S~G~$vg?BWX6DQKv&y_gkCg+9x4B+?q*NbR1z)84)*4)`3M2M(+KiIX&7C;7 zT@zLi-7=-YyI)WF5Y(?iN zmk+oJaM6o2&@7-c|0WpoCz5GQnBD9h%umK4VZ$EXnk>91x7KJ0u>qTU-O8+5f{_qL zy$s``@6`?cwYh^r0uZ;~B8O-Wtv_d`G%oDt%${awbMmWB=k(0l9}aJ=m*5|REL!2+ zxmOkUlGel;EVmV3u-&}xDU||&ISzi=E7V+AlhmQ;BOXksX%`f)l4tda)|X5vArTi{ zx;%$79-8Rezo|x4R`d2a|8;twhWaD(AB5dgm%Qy4`S8Zir`Gt@NKB^ia>>72;}0r) zB~$#UZX)!Rkg|Pr|KT&SG+2lGeH{_3u^>bp&*tM7FCt*Rq*m)EFj7bF#D8S#adOdF-%=t!$!uNkJ z^Jz(ZVr<<)rSv+^o97j_H(J>b2yQrFt&>gWbCv~-?OZ2^hW=qniY5mC#q}?&@62x} z#Uv*^-5;?Jrt>7)$y78zi^lm+_!;+wPJwIEDfZ&8awhv@?(*g^z0l@#zL4s$K&Q(Y8iD(f*kRPa_J}e?^b&G z07<$IcRj0@V}qBYgL=J)veb^4gH=n)O>MWh?IHFYS8n8&HeQaCO|@E4q37!XEuR0B z%k9H}`Cs$4zrm?cWs0zp^GZra*`poMYdtDUQcpidmkTvO^{^rac@}4{y!dv}$e=Jm zN#dwDT7jT9M*@*)2$Jgr48g$D1lmhyv|>wJAaHlvtt+lqL*T~D9{9uzEQb|sQx+$v z+X>Fus$=-|QlR1iQ6qmZ?|%z%mE9Q?VJS=T$p{u@LGm~&2In*#YB0{I=b^U0E_Sfy z?KX!J&$UuulpotBK;thgkQ;!10AlUZs6!f+Pw?mq*S?+61ZWObSgONTP~lhr2@_pI z&4+K2W!=9foPRC2LWAp9(KAje@nQY7?&d!b0#^|>(*08LbW&KX!O}TZheNn*zDk2S zLA9c0Hi@`R6g*};Mm&}opO!rA<3HCYX?^{{pv-sAmW+nrF`hIcuD#zfVF(2qcQa~$og?r*O=J92rqt!Un| z)aAswI_?%x?x8Gi;*pP$>CCU<%NubN`q*_hGYRR|I=($O;l|E)Xg9uQ**cz({}Gjk zvGegBX3dK8ah-;@s0w(A@9#;tu)Ro22;xQIYk=%kl}?OsS>4D|k&k64-HOHEE3M=w zu8K<0=t?UTR9ZdFml6CI14ffe=q=oyKE2|^{?rvZosjV~zZ;hk;j#1~H)#j^_*DyS zXM+BPI$)1Fjl3Y<5rUOY1Yb^dYC&UJ>vp_dNcP&gAB2E0!EXk>vNVFZNCguQ;AK>9 z!k0tk$=VpXqC%(HWy0pJD{|-_(etQEg%FgvvxnH4FScPa$qBC;ItYf?GKTQ|ZUhw4 zj{rzF^m%~a3eJOIa31`Rh(5)Kzlv929N`h)k=u!YWb~*=uS*(b`PqiU0&2rxS~AQ? zVH_{uI6=J`5rXAF{(7dQQ2ktA-6n0*_}4?HdTz|&p~Ps&U6rcgqZn)Bdq=$4k>f( zho8E`IV9VSeae`ir=SbC{8Km}@oPa;R64fmF;6xf2E<20G#fN>UW-pHI8F=C6TwRy z^O@l4T-ntu#&<2VpL4Pf2G6_NSL5$0q%3ESzk% zU1NhKQ_l5%8Tw1S$tf}i4J4d>3v3foS9u`Z{~kmlD}fFo`I2$7$3+Mx-nOy-n3P&h zxXX(XTru`(Pv;iJum5s!|K$7tEghbt(C6c#+taSZ^I{2Lzg_AQ^fU5u(n}Vwu&lWm zIlSr{yy_j`jK}+^vD_P0GJVtw57{4{IMw&#Y)c|mg)oAVtC85FjAK&nOFx)7_Nx{6 z?&F{7gm6{W|JFa;s2fc`~$xG{~Mp#Oow1bXf}SlS7J#~ zUF{DX=!ehf@>F9^CNF~1Dk;=9PFeCdu;JlNsPo_X}iH9|I1F;LnnI)@6EIq@Q8+a-Q3v@mRGg za_HdVf6*D7--I?YM16|vETk2fTE^{0cW6VcDwKQR|DFBTFmb$vyZX+rYn{8EyVaj( z88w|xOmYU@2;c*>3TgS< zTt>_K&BJv+iJ?BVcp5HHcx1;ZjcLQW6LJ} zdF*sw$>a6Qk6&>|$8SpnDTLU@5BS})@sGN#MPUVk1LjLA*#iPUN`K~sm%!>p%)$_5@hDyeHP43IOxA0SsED^b< zQ@6T(r%Eq~9oznlNyw*kvifXJ02`C=nah>Tf#=99>k87;VPPlJAmMk?_OWPY&Q55n zm4#RhI-P@td8@13`P&pcOtL>w=(Wzwq|XF=(zR{NcQSz?=goMv$>djoc*-m~`pCBu z(>8)~Rq6d4p6EfY)Jp>M{(MUH2YD~HRFDT6 z44q~9yM&|8hNSyDw)?_<=C^8BZV{Wr4x&zFj;}YP^A{KBM0(SfV+aZHB9^DLZ3{mWPEC$?@l8%>4>~|x%FwBa!@ZLg!xI6Lt8wp!7|j}Q-Ah!fnTOW{Pm8)ul6Ts3j@bpdm*{V(d*88z_}D>al!Q;dhSZs zAH^@1az1nnHMtkM-L9RP;6lTBe(Qx$klaXGXY%w_QSvWP!9gsScchySzJ{;AboBDz zBhVF8TtC=_yzl`>SZav1{#;HdbZ8EksyR0av`gK2;;SNFakgB^y01n7L2IL~Az(&s zUT#1C;nE6Tv8;3WK2V_M=Y8i`43>3NG!>>^mMI}?AWUa*&+bPa*bR|ala z)D>V{C5ie_nWmKdR`ns1Y^rf=6P0YL+JpB4_Dq36#kY7W)q?4_!)@j-O!{TKJbcAwPORs=?LA(TJ#%@!gOHbZK zVhe*{ZLj2zW$%hc_f7#BLoCkn8i47h3f!6RjyNcj0kmz0;rG!iSn-3a~alifkQ~dniWS)Pqp>(wImYs zMa13~Xh?Vmt4*E|k3L^=p-6|E-G41L8nRH0x(l1y3WP`iK6gy%>PBI!f>rYkt-l;> z*|wH)b)FaDf1R?d_x*kZ5Q906RT_0a0;O&Nb1KVN9qo?}zV3vdG{vu_Mhj<0O zd(qF>ciC0_P|WUK#1k=cpa0}m6=QJQ8@PslH+g`yQ`}T>gV+L z7r!orY0yjhv&LD=u*^>24Z(6)o%6~A%q|A}tk_t7h|9YFL7mkjzb zt>)bw%J+ui6|Psj(9+VaZp5W5i;@0bzjG=bfZ&}K|MWGhK*%wAvl_n2gsqyo{7B2F z(chsO67%fg72}b2PxQTJwst5xBWG{0GL2z|7E;=Ai*=rcYa+e1u-Zxyo&S`|1|gJJ zb@hRT9H8TH5Mg2}?t<112!~#s|6fL>X3h5Oa}I$gBp_q_c80JMs!rS>vQfgY1e1Ni z=~jZ`nw1knw0R0)mpqZK^||YjSW3(5D9;2pgI$5W^rQPHfH#~*$a;C7#3fqG{~Qzi z^eAltwrMrttiE4w>$SOX-m{H2ns`mAS~bYl(PVD~1j-2vO9)=A61s70r_;V#+P}LY zf+(*1GQq#^b_uySnQ&#*^Hmcz@Z8>$uV2^ZFWa}A^?M^v=ko*J$B>u}Vi30<`ls)Do;&qDaN?4cr!LNn-<)*wMRZ#pETnI^loCj6MFi9s~WP>Ra>&=jiQM;!Qs z-uv3)O!55MBW`mgow+CQA6dgtSp(JqkslEyOEV?oP4UgNniN(=6AdFjZ(JiZD%AJU?7bvpOe z86r4BfE73}|Lf)OXV;G@`2)GH_s-Q`-?JM+QruSE#wT#Z09)``gd-$M>VAJjLcIC0 zWBeWm>ziM6B-0l>V%cTyV!DizZdRRbV5ln}*H`H)gY~Icb4@9hm*Ygpz#XN*YCRzG zTeHW96rH^rb0kSRUt>J1zFe|pf!Z}HVN*OMJX3mLS4)7@gAc_$-EOJk#yx3Ds^P=hmD$z`O^o4%YLEx?Yy+!mfoH8 z9YxZ?18|z#eHL;1%#Rmb+8Z=eX?(=-bG|!hm;zk#2o6~no%#CysV2Num7;owVL3mz zGyvSW!xMAMOG76`UUnXRB4X|^yfrN6gCI#iG0~@s>CD7|z&Vo{em>?PCdOd)l+^<+ zERZKFk-*If@-O+fI6F_+9lu@44(cYP4i0r=MEzcmj99jH(8{|6nen4++d)@;R@$F@ zjCOD_$tD38EG`?-5);}RZm%Q{vo)iE~waL)s`%<9VI0};fq?(PrXRL){EZapxRH`Qq9 z&#wd|c31LD_MbdiX85ph7<0ai>b;MKy*5tY#ElPR9IQh1ud3#D{YHrWsJSe{Io=bfpk9v1sAWPQ|0mizcTDi!rfJ)w^)MigwN-^9 z%r)k8H)u21BxWYtO!fgcc6H+P#DReOP+9%8vlv5c26jF~r!j`=$pAM-L|l9{YTNcv z)%h{`Nna`i5R5>tQMU729D+e|ayDVtLD*7{57j>z<9^~8^-2DEla32i{>cGm@Qd(h zEHB|`zFUf>VreF20x!?*`}}H+Oi^Mx)n!2MJ8P)$zc<;-+^tQdp$VcQGTvha1;c}W}%jfT!=0D znv|6eMt1K{^ssa}S)85W?p;&=-MwpFT_+%Je=YL3_QZ@xLg|JC4ygnPoZ8c3I9A+v z;?U-%O1KoWLQIQFFEjdOMe{tm>Nysfx zB_k>SL)&P)Mv6N^Rq4`-?ho!OTIkdznvhx}v3%(K4V3)dU#7H#;1P$N6{dkiP_Zdd zOZYcP_^W9sak^?O&?v$3)TI?Y!Y|-vn(H3KdwTScZQa>}Uxs|(G_kuq#cI@P)DrtC zgfE=(Iq9u3kl0B_vUAo? zlHC`uWjy}1FRAh36yBN}gZy;DQ&ZU_CBcX-&Dc8)taKQ{R!I+}@G$+JQ!27jW8kLU z@x6}5mUNRl>0KR;cegJ;p||;R76=Yy>SmXlO>5$jYB?}Rp=imfxi)ZPfYi>8yTL{j zljkfk7M1J7HMUP?k1}tmctt635hCI05Wv|WC3=>`vJ%rlLk)@OxC3+yxHp%UP8Qaf z`jAzR9c>0wsrpkA9EV!4@+7$5+*RdUVQAz~9u{ilVelKUzdgxC1_rbmq5gT+d^AdtZ2s1H&IWMf0jl$0 z1obWW1XPmtbFrZ?CkU5P?bs97+-wPWdRJi{5pi6qQObxck*RMe^!Ev_F;y}<@o7FW zEAdh{8*swFI!o;8j8cds{0&kDS?#<*&!zZGW{Y=}0{co86C|j7>FVDLet|WL860qD z=@S-u81@vArX3|Nmh2oJ2VP9d)7Ho^_pN}QB?1O&JoMpb|IUS1kdrxLDZ;LuCA1K@ ze_|dH+#kzPU89dI?zKH!&y7V@H+NGwP)|=U23F4b31vniy`fCg>r`ERZD@_eLH%n#df;lNRq&1bh>PP_@cT6iK`f|Dw3UT zOM3UVhu1T9;Zw1NdAoPu{(ObKkJ%n|EFbBx@?(?-F{W=G3P;qI)NT8hJ9$+koZI%6 zO}EZh5c1EpIo2{gFYW85Mom3=cnMw;hUYC=YdVjOD6<&!bi=PCTpskxsQ)#0Rc*YNf)xw%?Cd5za^&1Cb6a3uog z>P}noyY05+D|%9j+e!ER`&cHRdPj3BCl2zf!*mX{Rm4zp|4KO>WlZS+N9L@G=#uVdi_5;HII65xw;{$Q*p<;N95M zeZcFiSG#*ZD>a@>e1S&OReb`j;me&0WyXb38X@PMT&74;@1-hF^@-uSFD97YJE%`EG<;dqiijXxgPVI_R&+=m zD9y8Aje{q%%erFn^^@9V@yx1N`+{?NRv?LmpU;!m8hyadL*MH%7P95~;ZN|;m}*Uq z2i?nBG3KQ+_V)Q0P4!jRHS$IDUd2eyd+#i(>B~Q=e!5sw!?`YdX~Jn;_tJ#(y67bl ztMx_N3nO}YZ@JfdEhCF<%T&Rm6Wnwmb&9vN6Z+}jQ1@h!6o zr_7_ACb@N*tiCiYu+4_NZJJ*$FUmx?lityUcNg?slfgPm9O{fR2fNa)%Bb=%>KYU{ zI5^66gs$az{A!jt-%^+tFLMk6xVD>9IPWCxWC#c-9M}qinPl*?^fpB+7)!7Us#0F$ z+tf=`yLMDJpE>8|Jr^t^IJ!wieon@J=W6{O2t%O!vVFrzjR)A^5G*%3QcIC}$#0r0 zYn6w=2G$H~+G8v=-1i0HTrU*^mx>vb8o`hmmY{;`4Cm!$hn4sot}f|v_6#78 zXq~Z(dx*TbEFUq84bRgK6q%;llJa-hR2-Z34iIvi+GmGcxnJoRkrQ{1wyi!SXJ7lq zSgMuxCFjf$&vc{4J3gO=>H2ix+>rZkgF}pn!x%-w9!b5&lpc7w#7`sfzCr5kpws|{ z%zKH1FFNn@;)cet0HNsT&dp|ld3bWnL9!cQV^e_m| zsd-lu5?AEn6BM)cdwnva{3bJaX7Fn{E@Qzc_CcA+m|l|7DyB8~+w- zH!p+-c@Eq9WXy^B2K2(mYfD(6 z_Jza4-3y&NRswc;YrE-joIBnfDWB?pEu-`&O#;c@i=*;N#mHKE6|bXKEO)?7-9y~Q zrj-)#j=$N+O2;OA?>m)bqh`ZRYw!&vV#A^0#wn}|i|nQqIEt&RG`G)<9bR4*yewOE zX!n>rVr>ZoFkrsD>?)&PUi0wTXE6hGSxx+#oU80O(N`ie>0V$i7K~Q(9xi>|X z{L~(|85G8oEDRQ#YptGs)w&@=du?@jHjCa97l!tTifThA(nlQwB^!z*yBKeBEhD+KJFa^!o#56w zt!rPZbzX122(xIMG(SJ_MZJ(|=)U)D?PPOTIQfa)N+D{6>t6m;G4RH1pBCQVUV#v3 z!^+!Rmz~QdG9CkG7C?-Sn`J!5c`w!kd?&{dGZ&+X8%mv!HL5iBmBz=rQOoN0xg!I< zMDKJk8yLZItZzy;|M;e6_dv(>oczZR$nm{zbcXdG`dc&F#40Dn9vn^|n%fy_E8tQw~G&KfZC%_q)H~i+BYJ}wz zZlG3M3RrEDV6{We@aj`;9$ZEt-Zu_R zHu5>OL`cKsu))hc7&0Le>04hK7lz502onx}GO!v-R*zv3-Z4c$rj4gWPju&vo#zB@ zLZ*}6%}P~ASuQ$kEbXROquLG{4V<5TC}oWKDS$Exa9~yY|MF<7JMCZTz*Zm21`y&U zscYjT3%5Tac#GyOz;dU7HtkLRQ#vwejyv)D%}2gFPz~$Tq@`8;!%hr6DTH5g?ojqk z+UC{@M|c`JnJiX!-?g)Z7832Bm`N1vk0q~jL7Obi)MCh=c6Djqkc<^x1 zuyc7e((WpDWPro%E%JI8S%Z}NnRNG6#9Q)F)_%m!&Mgn5KBGTlbO4qpuL6OCTaWF1 zP4ctMrs6yzO^T<%p;p4DA2R$PPJ9zAXxk+u9~Dv{&D#R=^UT%B5pT?G3wTy|C*`{Eb|4A^^YRNrU1JCd3lJDMsVq-Fn3 zEK8X!k;x7_xBOzUZFaMFg$gOCd+a`vs5&;^wUIiq^BX&*I!1(O^5k}`C4p9$&LmmE z%!CfdK6;E;=2~li7=Ju+J#H>2XZ&3CAV! zd+q8j#!lsn-1QO>>IO?$97Cyl6}7X;%{#Q!DaHiz5o-PV+b14JAMjEJ%Vz8E9-4Sx zpxYHd%Ur(3<0BhVan<%bx)O}?YUJ}i2VY%DRK|0#w|;aqQ?v83^y}C3oBvcO2Yb3% zd(VIL6BXOJUak*sbk1YyJBOG*WhlQ$WLQQCB?Sq$d}RJP#i+i(R#8W1j2+%yOP{cc zahbexKn!c)`Tzv3@{5qjKKvPyo6riw8IpH(Nvn(WamstcKJ@UzyGMK7_-%wgiI{pZ zKzbtv`7@U#NWV!?Kgv>?V;K;*#9U&9fVUbCR2uHe@?Dt2Qgp6MK?!q-K-KK*Ee_5I z@uja8ld1Ig;~q2z+aj9QDi4XcJ1YuVYn9-6p6U@Cw(f>Kd=H}2iIVI~MT5yX?QyIF zr=fSOd_gjP_2iu}*0~iE1DD9|7wmT*{*03lnRHEiYmLI|ZWY$n!abUsY!LtF*r9ib zaL`20)CP4g=`ak%?grfP4ZM@{PRyXlq*Huq_;aS>XV*=SqKH;ao#jv32K=v@2c+Gc zb9i5oCRJ0K*oxxuhgV;`58uIO13$C}9iK$yY6 z-KT4y=W1KvNo7mUQu0kKbJL=RGZdujQ8HRZ+`qboAizJScagAbNXj^ z6RWiD+U*|zEeEDZ6eX{c!t>r`2=LRU*Hk_6S}9g>+?i|CRJT4tkUzb{_=?sO`-56b z?uYj`X7+xv5KWhsc1RkyQ~Zinz}r>b*6pQxQjJK@7wioilYl2gIKiGih`i|)?AP&B z%3fq2MsEwVrarE#hZ$HUBlxV^bqyn5-=a8W6~68YNyW6h31(Ij{wk8+bV?OMT;e|2 zAus|(^e}xi8w#v!cdRFA)+`bRSYb8QW%zGzE}hd|`8+lfxQo$-76`;tYaphUrxD?h zh~9fB^|+!|t8$w6%9j63_+d7;5^h4I60SBy=RR1gSYeituSqCwWwKFoK~tJS`iR1! z(R+&}1NwYJNeV)v@!$3Z1iem|4Mrk9|9WIjk=@j!oW7X#X7CA|^9sd6y0uX69^pa@ z_Ev-^%g)dW<9PGurNf6(H!9*Rto@xasuk7@d;=*9*r>SyCsYiOl7(x0>_~zSut78> z!m;mH@LXF7>Qe^yulb!7gElmU3_>CesU$2Kd;eg^84rb{Hf@879vyi2FtP%xS|V*MK@!`1Qg2USyfFjWaLJSJqgvT+ zCCPrx$QHJMK;L%dG}V@?^6}KdL@Bn8a*?I`>m)CY{R8gy=%o2~wGKYV#V>#zuKI-t zcUjtFT}y>%v>&a0WwgDvy4?RekxyI zi>c=0CN(UioR^F22y8XVn@S%s$hixX;P3<$n82~IJQ+`h4)NRQIkPa>O&le!mf(;uo>L#2T!z0DDMb6_am;&iCv!a=^0!EQx#7PHHbZJ|L!h8a?v@lh;21K2jXy+J@_2aeZnRJU>Avbqs zIGsB-F5Ry!@YsjQl#S4)-E15{NkA$K53kl+hi-Xklz%#ySbc{cfg}JQ*bw6|i`H=& zU_=m2;ZW%qQt2=-PLZrM778_(z~YT$BWix;T857mQJj!_b3qTKE%DwOOL@rgEDbN| zEo0dVc*{;7%3Cm-2zb}TmOq0`V@k(T`i=03RSTORCFlCN>1fyJluw^mo}>}1F+iGl z>y#TtI?QceN45G$stgl7f^sUF)mtXO#_u|F!Sy`+w>E*yv*qZM#nzhPbB;;X!hfOUre|9vWYEUd$wja}*9{Uuu>#C@6_z|cIb=r`i|=;*=pVL(uCu>$0ZSm^_hz>nGd;kY^5&}`1cPk5>i!m*E+15U#fLn zce~_eVZ-*`K!kKR+W@&GLQFu_wfpNDMUl|r;q*NqGlJ&-aniq%^p;Ir>_l7j1Cd-@zuG8z@rc613Qq30JszDMCW$C=lBEUC*E zC@Ie#*EE(f%W2hOdZt1Brc31ul#i63QH*Nm0xx|-&;1EEtPyY{_np0jUW`ef3R$PwQ;nd7ltZEo#kUj25c|>U;yAVU{}JVYGhTi zAS$mjoCU04oQ95oV*jT@S>(~BZbEIAPyWQJjkQGWmyY{1imdn(;EZ;#Q5uzd)(jXC{rtzGUU&`c#!wNspa+QkO zzy=+!Cg{LNDD^D7=Z=s&pN?WTlJ}awm`dw-)RNw{I||JH1t3L;69!pI+`UVme$c!; zao@-d8E>S}qjDj=J$FZfuf1C?(H`$oxE+v$C84t|AvcJ_s6_2J4JvN>g;KHEQFGfB z)rBQ@GxEnIo4)|s&hV7S&U06kJOnQA`PU&--yX7h+Hqc4M$630nh<8w4FO6<`y%DV z8!LGHlBiCIJ}a@mn9!m>2nIXci?4HVlHCFyfMlXy#fZQ7xSnfzCdzdyN{RL{Ni7keY@a zCyBa=y@RFGn;T2`czZKfR6Pj>#q)n1#4rznGu*NA=96@;A$JrlWytq1DBOe#-^%_8 zn)CCiun)xGL!lm-fYQ3=Wr`VF4~Xs#fv%Ily28g1?IVry_IvOF9li zBZ+`^-@x`9Ruki*&s|LR$K&_N#soShjdeBWD|*>sIc_cRb;~I87t8Fhi!eXU^ZFA! zf6$h*GTB>J7DbPIkT313QU#W={+4;xT8GN*-7OL#MrH(h>thr9V?sdF?JX%Ag#~{^9d{XXV2vk0`(Z|c&4oW;) zZyM}1>o*Q6#%yV1qpz&sn=u#RGf(s_IpM5~$%`Mw3FV8x%8#FIj%j)%)J>GiLpCDo zZ^REi^txIDlMXO!Rt|9YJ=3pIiK6!0zWXQ6^}eBS-_SwdZVZ_KiNf5b#nmAS3QT(u zL8q{7x#t<#(mev`C3OYKZPTi%vD6*o4`h`TW2wtk53(i_R`U!;D#SXa{SEFXhR+^P z{cI=|hAG|C$t$OXcy=`$FCj7vPn%*)%>s!n+15A`lumtcO*)KHnw?r2O8qH>S~ikd z%8*(*fZ8vRI`})-&mhV%StURWa7?(y3%4v6$E!ul2J6Zk-v3pIC{at@~2%CQ{ z_QN9O41qw)Ki4$+buU^B5D8H_9kEsH-fOEaCuj2#$vf;oJ=EgAwSJ&(Sx(X+&&ZZF zjFU{n-?0pEE?)v{@FXroR=Sve0hFO^)a(K;1lTv4d8;;oCZ(lez$bKw&cO)iIEg84 zp2`1Q|&?v_ohni{KJYeHoHX-pAObGtL+y_9=O1wgwv&sFQ@ z-Er)K^m85ESi$W*E_cS+!eSE%I?7Nlz$f3PFHuzb#qf2#@{wGk{EF?LZ}h4xdH ztIPL%mVHj;#NU}PHVpg$p-Cd5Nd<()|J3*fw9e2JKxl6L=#~)ujMi(=MZ_4XH=EV< zGp!V?f?d*ep0DSN)Z3UX6LCp9Jf@MbWIGQk$!_V6y{Tg7dnHa7%N+IA-pkfZCAkro z_#EFDHRbBE16ndogw28LEg9vfsALRiYx|dfNN(O48FQZR8dK33@!4rjUW*nCFg7mV zT&$!~z%QQD1ng!!mea%dzmFGH>%Mlcm{F zIYwoDKKK4b!N*k|6&|w*U4seM0!3LPH)bQOV85x%)g2$M7k69kW)BfKDg(s?=bFQ< z8l=6C6@;DBWy%@yzI6Gs@YKTX_dKpSnWD|Gh2`=mK{|S4ANF3@PwDR|w($7W$E%Y< zmRHB3A6s}th`Fc;KvO>Ej+TxMrhKf{=y@PT0;Kr8nZP@YBI6nQmyV8h{ph$hctoOW zEWEaqGL~evn)fGGuSo|6#{e0gL{#aal-U6HHev%h)Rh+0_ju$?mX{dIBwg4bU8G?@ z#OllGMc3EI_Nyz1Sl$*#J&a0Bwz2p_wt34x=hn_=V((X2?_IykHI?8!qe)(h?XFe( z5vam+Z-3KZC!xy>9Ou^Nu1}IbAieDkc6Us$FN%WQomoiu-aR8JUrh8+N=kNWG2Aqn zU?NH!DltPUF$P9T63YtZy`O^f0;}DzKkUgnjQMfT(2wH|FITL#gYL-q!k3No$Gbx9 zOATK5JOlb)tbn8B?^2tA6#t=+Sr6Nl;2PXYV8Co1Et6}9b7+;0@!c^pBshxu2T~qc zIgs*p*Uk9*oZRrp8pE#U(uo_Ci+W~orRKhCkTSnN^4U~vU`1YlVfo6jcku4z7!&U? zo+D9z!^jail%2b8^|P)Jr7a7`l`TSHjhmVJ`-3REPRYsEg@B_NFEy$EWY?jA0K=Aq zVS|)K!(;E;63Ky2m?hv6cBGz<D+b83SWhpm85x ze_!uCE}l+>j%)ot)AZ~3{ZRPpXWRyAO!VPr`RBsT$jSOK6+!9Kga(r3ml#cy<%iX; zrlCSA6l1y_`d zO$C=UEB9RnHwoi{igLom{!z?(U_4hMRqSv7Q26U-!!I?9GazUAph*{p9{>`=nn?pS zGt8jjR?#+4vvfCEi#4k)-Ooo(s__n^cdfl(5`q$vxx2i`HtU$rujtTs{v%VAS+au2 z(mF3PCcLF~aBxw*KU$eE~)h`ydNA9M+H zO6x;PG{bjz{Q$Z4Eb&K5r*LF?pwy9^{0#)eNy9ItQ6LcIDo7m0cxCo5_c+!}>%An` z9@<|sOIKhED!qq1SuUZdsYJE@=KBKqVW}ARC$VRqE*t{Z%=zvg#$Z{Of|~Qh=s^Wb zZ}H-SGB-J{-0R8Fgh{AE|NUi@T?smPi!ICLHpySp!3xkpCY6K`;rFX`jKgiVn{2^kGR7cgEUVn@pMiIgF#=4@ll*}FW5jYxu{uoRO$pT_T z)&NS3(5Xbzp3Bm*kJPWwJskdMO@)NYA{3Y`byP^RE7Lp8W|re;%0)}7 z-8?B6v*+hbzhQgL>doI%5t{FaBQo(15XW&3AP%(zSH2jy0{j%+VtzogZwMzFsrsrl z<@6s4StTWZBdNvc;V9w(D2Qk=K0$vIe3h@iNGiZg&rjknpht?9Ijix?vacF4=HEO9 zL<>c&)xVR%ABp1M9sIt<{f?sl+e1)oWogOk;~G;dj@7%Omm@!7j@8}&Xl5M-W>&LP z@7H4OcdB_=Ts{Y>BdI@_SGkavkf+YC{XI>9@K(6Nb9Pl;HGqxmQGbGG7Jt}4xDAw0 z9EO6dMMg%KC5C1z%OaGXCmT4$ae-%z3U`kMX)BV3YD5~-= zuzmmD5NyvHi(4f?j3+rzw+^ISXCT)uXeF=mgI$oPd07V{`zFeJ*#;SJxtX&9`^Ug} zUjZf@ky`Axs#}|!-`G@r=WD-be}CH@6RiIM1N0kzq3>`F#Wu}%{J<`KXO_S3T&GOe zpRs(u?Odo0>%Y%Pt2uXNrimM>Y~APlYk1PXJNVz_>i<#*vSvH+jWO+4i!TvekdZ0F za(Aiys9K!1*`I5-LcsagaA<^o&3dQ*>hBEDoKlimreNlKh~S(IDoqnU#8m0}^ij7MYDlCo56 zeN|$j9oNlpUq!Pd&R^z|%;38R{st-7zl^5pQ?oF$*X+9iUKIO@cjTiAetW}c1}b_H zt(CD-ka_HK1bdz?uj9!SsfN2sS#z>=-Pz2iji)Q(C?CzI%{jeoFMWRsPb7XiT^WJ! z6<^tS<7DQuKX=eI>c#X#XSMGtGRiBirl(XH;ps0Tx3NIA+J_)SEZgiIeg0LAqDG;u z!fjcQ01$y}O&g!q)B64xaYhvN4T2LLAjg{e*{#TgzvoIPE|F zt7wwGzF*S_%-pI_^#w;u7-qQmc{=(l#Iz;N2mdfORC!Qc?qJ{i`!jF==;-?Zczk=K zfvV{uSFys#jJMXnm|Gtwj%bGrCwR|Yka2+X4M<;$^WFQcUkWiAeF*+<6`|fFfr_{? zGQEe%S^D0ujwh#u5}D~GeFZrfBWfPLR|JN}z+GIL{_0h?agS+vRmhCQ zFLC}h2>=Ixt2_E{1NaKI5<_Lw?4qU_2Epi>4*gpdt~vXZMm`l!sNv9@cx9{#u42KZ(~Am znevwYdVc-bn&=BHkA2j*bG`cY9#eZBEEJ{9yO4ZE-u+#?#It^%Vd-yEQY+m2Ppy<= zI9?(Oe<*%f>tD&i-%I7sm&$j-h(gt3{Fq@Kg44x_!j^x63_$_r02I{!f%bl*HUB@R zLK=N~h?UiRG$a!D*!*Mi3hpXhjb{*PaqnD=G9cY+avR5Vp1h60>HAA~A|lgrD+hMT zPX79G8_V{i8F6~ZWxU$B={;qHt-lC`ZL-tj+N&#jiN`Y(WT%w!Kz*fgf)l6K{YNDD z|FnbsNJ|d;>F%K@naB^+@LwVT{}nO$dxdLL}Z^a zf#0{o-F!xPp>t@UlcwtTc+vpS&$7z?>=x>K3^mV5cJ z*Dd}==k)y(JdxPxW@Utfe*#58hENScZsl67ATkO_6~S!)YrJm$6H-I1Ibf6w|CSp5 zmKuPp`frM(7G_A-@0-M_2<^GyD^OfN7qifI40~QbSJ^vvq>Qlfr;y+1rStS`NZQ@M zFHkIs*hH8BsX~w$h}+2aS~>lt5jsziMvC-(lmvcq<;1b<$m6j>Hnu)W+~3I`t~L7` z8U7ZbzbbD2eUZWG{|+*k{*4TOBg4NvGI;*qL59ECq`#G`-&FelzB|Kjvh@EXo8*O3 zuKq1E{B3DK*|+|Ek>L+!xBnrT!Rv3C;qRT{-+pKC8b2wXT*8gezmnGf(#6d?JxA|@}-{0Z;r;MtL>gktJ z%9#`1-`ROlhW6h~c&CQt{~cD<|2;a)e^Y~f+V1pjKAL<&8A6LSmu6Jd{doF+#2ZT?N! zksqCE{tc|zyURA0xW<4}&8uMwucMK%gewD*hkMT#%JR#a4_&ikN@rGL9(uUttOe~H z7kKgx1UDZpX^4ox$i|&2KM4%5G#@%xf@IvuPl>DOJOoIC8nD*r#Y6E}sTn%_jJ3wu^ zr%gIv{#KgP5Y$66?U?GviRf6m4WxaW^c3G1Nmwc!1vSH;7Af4<&20mO?yhd+ueFV3dx>}+ zE$@$cal`Z{8YYhR+va0B1W&>|kM~x0kXK5miKZd%5P64559FUyc3#N79vk++m*b=H zg;HtOhNuTT&+TzAZE1LkKi)=%^5Tw?eAGq#Cpt1gxNgu#$SPqvrj_wF4t92F3(Q8% zc1qtbp0pbh_@u*vM%eyQdfuO|%qU2X9R~R*Zf_S>Zic}eQyAVpQZ-puKKfP=KQtxP zzPON7KnT|PS@P&T@2i~hCm6Z$(~$S`aNUn|)?t%Se!OSvml zINZT=$R5;y>czs>3L+}Wbc8xtPRpyI@;&%Kw>R4AU++C??w>&@-L~D~t&KIx?uD0E zG_`s1&E*Qe4H$2mN7%J$doV^x567%m^*4t_rEIm)X|HRrgGTrsU5S6Z!?_TlJPyar zjR!?zc)G>1)A?#gTWON|dt>#j9^rPwO*>gi-}~8s>PL-hN2lSop5?v2gG_rhQ}UPCMk2-}j>{$B9buF-VIVIiVW z$5u;d>|l;jJyuQL*|U6>L6}*jQn17^s>3o3RgigT)cCYS*tZOq>|l?sahZh(8E$a< zSnyWcZS}4@w@dDWjJ$Zo`vAyux3FwbFpAI-N`5^^AE&=+w-ca*>Wg!^D}j~}%+-Ae z^(aA?s491wDM7~uX1o$rJ`%u1_gh8GsHy?cL$OmAK0$E3h*(dy53W zku%Qnt!!SBqLS2>mRKoGYRPIieHQxX{l z)8)~^0BIwf)YKx!6V0YcR=*ytVg5@@x7X6y>0jyI5nzW+&E8?6fv3;ANWM|jhV*rH zILb`9z89viuYLa!?NOjglb5+mL4Q$8V z$CSD+rYY|9ERm|HT1HbIXn|VzjW2fjptm!$56Cz7-Sq2Go^XsAU+-n(c|y?GUS|lJ zXGc@M@@hvp>Q}sWCPq;8q~b;5XRQtepaa3rhrAmPGckoQ(g+Da4|nfG>TBdAv`!{J zcy0g+*!w>xhJpeRdWEGN?vF|Od^#m*K)x0y6~DO9lb$2s`N8Q|e0UIE)K{MqA2b=59IG^4MN_^iu$kYsd%so9yo0V+;`Xx-Z?My@<&T_X=4;(yDg-v z3RKTvw&c}pp)yTVi;{NVCc<_%cs1U?(el?DX^wn0s2y~Y-K=0E4w^dbyF7n$w^Ke_ zkVlCXy};R1YwlC%b4}mst=_DahY-;(aS3Xc6c5P_t&df}x4vb1=>SghA+MhiCU$te z^UM-5g^1tCNiaJivcG<5Ieqhs=trZ5kB6Cp#|o^Z*K;;kE>UGWxw4VjzVoE-BEV~x zJS&Wg0}2ldHwB=|mISli2Jf@t^xCDt>sG3BXyIq?$(?`7*#!&f;W@Oz)12_8cc?Ew zjZC&4GS>T8N(utRSn&TnZK-{oyU~~mA`ImXy_hWgV~B~y2I;Rz`G^& zr0qUuRN?27&6U^;@Wq6U_U0{q1!|Qv@I}vJ-V1R^t!(dDkg!)eRQrJs1SC1VYgu^Jmpnit!QJdJx zfeJZ=hP77|s-EQ#wfhWkBgD2s>h0R`llO0iw=xAI6l{a)KLMCUDX?+azF$x_{iGf{ zXY<~Zp6P%;gmE`sOXSV2ZDV`GClQ_m+XDY6zwjO9XOpl>uiZ_smgHTlk4#YA_NW>^ z<^T(+E;rv9iRxI$^75DnZm}o5&=UA)`5u7Rb_(cgCn!v-3)*t>Bq@nJ#^b;>aTd1x z*-kxn)5ghj_~mR~WE8J}h-HsZ{y%(pZm-@BiH%Drv2}Gl8EtNF7&3p4?0DA3q7z2T;y; z6^tDa7s?7Sa%M2{+xlSSfO1ILpH)~C3?skIzugq@kgGQ0p=hdy4jaeyFgcagWLAy> zKjV>(lvWy{rDDlXdY-X&tzTi#R+r#LJuXcmCdi458ic5+kZ^!si`>WaDA?W#8>mk2 ziTv2!U|i1R`nYESfN=23m;0#)4h`@q=H-Zlv=;dZev?u7@%USJ4M_&faIZug~!p8V46=P&)xI0+0okJ^~V ze@FRlG-&y`3Kxrh$UG?ebSE|=Ac&Pi5g;ZK%x>fUQUQ7o7#7ID_`@&2Tu|UJ^K&!) z=`TRW)9=y=Pycd10>I$uPD^?z3>L*@n_jC2bv45wI?XKIrjP-(#FZfec>_barqRbQbp5HWPMltq`U7Edqk}DSX1EXha!gVt4?32KZrF zUVs#Y6An=ut}mzBos2!j^9j=u8RhG;$f6&5*X&=6{yPc#?`xGqv2h1#ZH@Hiaq+8r zlH+GZ`z~(H-IsmNFIbxy_iOZmCGjC))42Gf1!k3veFsfRpWnnM{u#R7$>sCM_{0NN zn@q~_exPuyJmCb_5po_k#<;>0p0IFff*-s@;%dD4)`o4danEXP7kzTY$>p*=ZkA2{ zKmVVW1OKg!v-EQchGpmTt1{MkJ6`7#CLM$S-0SK-lJe6%Si(AHibh3X54C zwf*#gSOQPjmlnek&cYI6fh(%mD-8{H;btMSdqMNyy^724?~`tS!ho-S65=|N@-#<5 zUHX7ajxRS-@Aogd?)S85UcY$NQ$rhUVA+51gNxI=CGQ#V-4&#V}JP- z=YQGfYxqblDC)GHJDPn}4{(Krk4LXR6o}!N25l1$c={Wc?36JfH=_5@u+ zjo&E2gyEIgkNigI-mz473HEVU^sB#7Tz6dK?E5wD!~?Y7OYm#(wbix@5r3im9J_}| zns4pm14qD~|NLwUoYL8V%RX*ViZ4CBfc>i0R*y2}M@(`5{Bq?fqp@?EdJKKZ=<>bI z%D>E7dsp!TDPhVbXU|l8dvn}g#V>m5ZGN;K4!LIeF+zMAb;{EGLBnUw2yqn_ou__t zdEn@;LBdbBv%Q&UrImMV?a0T|z@*&j*g-yi0u0iIJ`0&=6o93lcPszt>$GLK;&pIj z?_{;e953MKzrGh~{cCx_jd38t0s&38&V@ZhpI0OV1xVAZDH z4#1N%cMvx?`mm+e4d*v~yQ~Ss;LqF6Xah}~hmyOdm}j1cmB`=$S!-A==qh1y4w1b2 zI)RXleGsJWcmHxc;26(E2Y(;?ZpAJzRL#P!9p6qe#||cKHD{xr;$we=HDY8u{}6uJ zfIY3>{(a@s9}j$=HdK}N`(+(;!QDIJEi@EQ>pH5#K|8OgKk=v&Td#R#Xjv8ZMVsx} zGeI9n2utF5Hi{qmbxQRU<-bWlGXte{`>D!1=~c4e`7qGoh;?q-DnB}11JnbMS$Yv; zJ^0R$vrFsK!zrK1JB#1Nc5r=o+17-|z_?$x01y4T?$EOHCzWj0Ao(BP#`w;ij4}Nu zv%b$&oYtQ^brlP~ra5KFkMQ=;W5N!n3qbG+(iw0;0CP4tS!KY|0Wn=Ue&$Q&InbpV zC(uVMsgLZqX{(p!N3Pk88zWg^b$;Wo@UI(>cwgQo1~>sqMg+gs3d*H)E_Q^jjz#Y- z4FnVcdT5DGuf?>tfaFGB>@f3V^mRj(%O}IJfbM!|)sOulXPa_k3$JBqVBhZUeb-Q9 zNl&u51(;vZK7Z8#efaOUiHsw@?-@@ww>BM)6(64{t@il zmz`Ih>95^iPgdMf31}5e_O*UhEasa1Nt?q9kuYCSo^qZD`Uz%;5%}X4?dD!*0m~ZeAg1Okk z7g{Y;H=CgdVRF_Du7=Cv)>U)1f+1i9+&EtPs0c1Sox3nTkrMXf(X`bM zRxOOjU9Nk7ee8jq8J|?>R%$3%YbkXrrs^aAe5 zT^6$(v|7d8lgjhWKi^%GOx+5qbsgiQ)-B0_%2N-s?Mi`TN&K@YdAM3r_j?;aQ3{?u zKe_d&LX5^V@b;xs6t~&Yt>pGmJ;l8M?OC&sYG*1$W#LkXhaW0${;KjaN0gs^q+l4Z z(8&r`Sh@n!zaXwc?4#?qKkb1pUwXD~>?W`2Qx(jzxv!1ai3#%UXob#x{7u9;jl*Rc z=*Rm7|G_s(ZS8e(o{KOkOR=CGOBG*z@pCrYNA#F+e==>`q|6PQ%JJK|$q_%@gFCu5 zRQ27e{R>;ecbtQ#uUkF@G$8Bhn|gaA^FEx+M!w%=A3o@JUvmBjU#(8IyOqrzxTST02%lNpc$1>NHC@MI1pR9eu9>!*^XlJ1s)HfeHl zpslX1Rbio6@_cl7w7;#&L9&D{uPhTKLm>3IOv-2A3dO=9Vmh(xwoD>0$)L*nF4l>- z(B9iJz#v*Ra&Tb+92SLr=dJIzyz}nNw!0sQxZw}ySI%jT_~^p^JfAHMY&{N=E_ zexR3+o9}`B`~7_NvHvq$aoEE>;jDujd*#gIy!XX3z7=GCwZwX_M)Ijh&tnd!ZqBGr z{Jbpl*F|$Sd2TC}iKE(0yFNJjy>n0f84fq}*#Upb_sfH4*KWG91%Gzt!b^E6SDP=4 zG6dldKV8U;OW)~s>&tnOW~(aW_-MCcjp3f-2-Oi>JqQJ zdM<%sCN1mzf2x15LlpBt$;N?J@6^cs7iSMz{XM7c*^e#Er*To9t&(F)7UdZ+tF0!j znzOeEk6U8qBw3eVE?@jn;wQ_J_SgSqxHQCm<8c4|N6Z^t+D=0nU!5zPU3h)7WQnDt z#*Nh1bWq*F-XM`)*e0G0Pg7ws2D54>2`A^dljPTnTbdU5KG2yG z{Rt#li{lwD8{@oaWQOlEmtFm(`t;<--a9Oo+y59Un?Nd_b8(sbR*6Hbw*G_)$LELBeaX=P$o{Wcc)?Ro^atFm2V^*$=cf&t-;{9R4!FW68mmQQ9s!-MQn>L(e}q z57Hv8qr5!k$Zi#mIkFv&c^0jtJ)#R8bMRjg&)N@0=bqp>S_yWy?(6`$Gpe7fJM!gYfK~pJ{a6)EzNg{J`Ri@fguB zBFx4!Q#WiNR*Qfq?|)MI%jP0(etBG0G0Q(;wZx<{y6Ag+q~2UP-zrRt zT6E)vEZcIGB+?!C)vph|SYZtO~FOuRcBd@i)N_-kP&OqkVGRf~ota zEsE-T79f&+V$~ct@@z|Kb-i%7*Cc5X!?ABue~cfobyHa%+sIx z9NT_c>+#pSH@@Gs;GKO(@u#)-9slaI(Yf3|u1xLm^>OOcj|IiW)v)^hH>*g^#Vay% zHmuiNOxz{U*Of2K2;4aCYCaVw?6JU!nhlI-vCr93xyOmZ#MusUx%ZnXE{FEt`&4_J zg_zQ=Z0Ys&>65evvfyMj$ZfVsrOPy8>e(}XO~)7Al=;hZK1jz~opoCLy8V1f3kN#9 z8Gn5$ei&1qk~!2>LTTfa-s6mJ;%tnON~m@V#${AsG$-llJv+tIpDj0{9g@tGd3-hH zeF1^eR=ppG`{4blZsRGaLs2WP>zgaU7zu; z#WdkcSyy!N3oz8vc zBU+G`KpyPybH%qjea|3-@t4Ax+_;c%$&rICm+RT z`A%fKXRP$fOfOJ(4T2LyY!M-`N?mh&&N!O)%Y@`B+MS>>j|;QBV$oqzuVrVhRFg6F z@|4eT*K`iElA_DMSlYIj0Klfoqm%?=e zK-t2KBY^#xKesnQg)8+XZ|+aPiJ3@GJRdGe92$A>EajvHS3LsKg*{#=22Ib~0*&Ax zLi*S{XKK(*gOT|NIWXQXVx#&mQO|@Np!iEJ09>n|BIOkMI$JD1d7_|8N}6ooWHPP+ zsj6%mCis|0TLW<*<};|zx#xofu$3?8HcRgyF>hKuj+k#XWo-zo;^_X=G#tUBA>O15 zN!nA1>&{}Z5m)^4oweh5E~Y?$^|0v{rR|YD7@<*^-nIJ9>?fu7Qa=XZ3M|nv-Xgs5 z8)AS&$1VLp#1ij^?g0ao{%zwrUxl)=9+!aW29rwGL+jxPjx+&5*Yr{Z2P_hmB3e71 zhyon2=W^R?g(W;c#8R9|9^hOwnkyHenzm#;Ov|D;)!V!FN`9iR%!&N2MR~lO@h_A zC^5^kCi6XfkVJUxM(3FGFd@Ge0mF;qnr~*M#~`=eSXh(u5LvA{%bg0#S$bEYBH8=K zQ!a<1JkJ6s?m@xdL0k&}uPux?7YU?m2Ui&Z!acyDa`abXR8%R+RUx~rQ?FDL7J zs%(DYI<-4lDbt2hIlm%JYf2V8Mfb^j{8Vw8<4VTmLyl3Nv2@&DCgmAa3Av*>wy5v1 zmmhdNhc+slo|dnh7rfpN#F#3k8tzp7v;yO*$bL+^(v)UPMd{k)ah8Y^YLc#&&Wxhm z?w9~$o_VsEE+V;LnpV>F1OZ(3J|)1lRzb@c3m4tCCQIAd?Ff=JG0_r2&MGynYQlw` z1J0d~Zlj3N0KigBz9eoFbLwo1tZgC_b)P4@olP$M@#3AxV_Uva_-^AfcPz*UaT~k6 z&X!CE88v8m&oJj9d*KyWh-#YZ#eMS6dYvUWb2q?Iwjb2b4FS`&x7B2CF9Pc0b9Ytc zw4p6N#i4^<_csFA=dAQ{u5??VI&*)SP^ZL}4Y++Wh`Hcevz|fBXnL1+*G;P2aIPxO zc(EkDaV1s4jz{)C!xXWlNx4#4jlTsZY{3m}VVW;!nqQ$}3R%8lrR5u6M}Xy9NndPI zzJyN1yf(|U3HV$_;B)cT25mvE{4C2LElL#t5Y8=#NI($RJ#jq41x~O(+1fKv`W})^ zis57VQ8uW{W4ZoHb!o2xDD_Mvp0($m#r&oB^<#yRp8-RG1-8RDYFsw~(^GYz>DskB zAskR?@)Pk)@}i`o(dBd43y&0m@q-B5xSljb;CkRX&Bb=1g`jcI(%D6k-`NuHgpa8i z)f^sc(Ak249FXw45eLXyN&y~sMR3k!B2YPPJcz&5G}(58UAb=bUs1x|K!YV*X7p$l zL%ip3&8GUCqYh-rDXR2z^QJj^OJ-d?L!z3H8UUszw&KDc=KRin?{ zx}S{*hxPKvBVKbuw=h%mD4(;rt+d>qZOT*hIHvN=+Xz;F&=RW8osIX|MzC>xw8`2m zMQ@2w$JKxPt1C-}y9hppVIviOKK+u>UfrCHR7T7b@t)E0n3evWQ(gU!CmL-^ z6rMBp-A1zMF5i@BmSVWXzw;_Hp*rsD|Ni6D2j&*}46CrsD{h9ZO>?u`Ym+Ek972uA zaA@4Wq_g@QFTG}FZNnEv9Rw8?Ikugp^Wgwais1m-M)bG+KsaG$)RDmw3k zqhrTRHdzbLsd}pL15+Nvo9Dla3)}2@R~iyhvwg3PwJ^u#4^~@Kop_H#D}p_s%RNTd z-HT)D`F9djJ5=oWznb6E`-~}pLs%^^@vYglw_oy%^2z4970t1UEBodib{mPNeqwyg z$SipR=KzJG$?g4;-az*y-0GRcoF#PIcd2t5Sa5H5+{6slG>hULiLlz_f4%tsW|3WA z*EUpIi-E;zWKT_efp8q<=JGJdZnHCj!@THeoMExIWBr^9&l9$htp0cnPyHw9w@+GF z=ros6DDRF8%6=I2O0I4cexiGn&AnVFU^`!N)9f2;BfV?ghZ}jn(0A#=j;p_HKa+m- z7Y}@ zT#md=njx2YaXMmf(iVNXn4wD%)>R#3GrDoBMHgiea^cx+1MGWeeO;$y@N$M)X;$R* zjWhAq!u(OYGx39ZuMxq2aHB$4-@ZxfzgX>T?NMN-GspN?p+wIhnf5$1Ha-NuM%UBV zo1}|d7;M$ZnwsHI^vw=cWpeEN-rJW5yJeWOM>1>UI6soj7j-giWjbcW$G);i8BvgF zniZ}438_ggD=6suqMfxONZb{f3#azMfoOQnw;D-C?Cshy8x_ zm;+PqpkDIz_e2}rPCJmMcbzxuA@A1n!yj>(wxjI>dS)?)gXG?OLc4y^GbAouroyHD z$Mx>|`a(k(C-|!@kG0yQPHJ&wS^E8iRmBDC*a@;(6uL*l@Uk|B^E*|4Or_C6f4=^2 z#^rx-_Lyy&RAQYt!>gN)d;6kjL*qBpcmg4}!0lp0{N*r<$`u8cliBG~#^j5^-h#>Z3BVDdXN0#ZO02^qr=FRYfcl==PTa%;OEY7;N)}PE=t;W> zf~M|FTDHgasE>^Kvbs$i8!qtIJztKorU`$bK36X`esF*0M42rGFT6Q?CrsKwRU=sf)Iz5E{(axp#bEA`D1r^PKg>; ztXv5qW}o&CAYPr<<8EKLo3yixPCV+rkbegDuY(oO#2m?xo?nxzamUA8Nf}Py)T((*eu(=|Unl#`SyGGxeTWqZ9zrH{+ns;|MS^ml0 z-Sf^3{A`vo|NPZuDWBI|Jzjmre4DM-#)StzZ`x>ha6#H9yGVkL?n`A2#o1A}%jVP$ zLUQrAf1R#dUoo}x!xh|IG64K_oX3= zI^?s$pV1ZI7}_Tqom1)CF7qvRi_t%?wp>iY)}6`B_P_3b{0He;fTJzUPLCBu0by&5 zJ*UvzV!R^!`^L<{IGFhr_CSUsCKY74HnVnS?cfZ6i^pOF>^+Uu4Cgl5kLWzqz_(*? zeb#9se-H{cR}c!q&NAE=z+zV4XCtMCt(F#QI3b-2I_*28(`r(Uj?I#+1>`vVOHJ)7 z`mEx{o9eS2&(Rr_aEqb=mB*4bkN*Ft8~JH~_o4mb*a)P+K=V#`r8zXXt&!{A1lh6N zC;DH2cFbsu1U1&T9@p8*T^nmYRCD8hyEOlv#R!Op#oa#6H^iS`i}%(z-6W)k&Ql$y>_XdJISUQh=?v z#qB{S+(6VE3J%0nksa$NVjqwkq;-KDSf)mO6!4ri`sqc+{YGINamAVVE%2Jqyxc7C z9*C?^BT3Ie&_YuQ~%p|Z3d9iC^w zZ+A;qMc@BsmD8g*JrXS;&d23-4-I-P?)G*(GmDX(36T!6zLKW4gR;fHws}e&-6?&p zuD9@JnxseP^awP3+^YTKKbSAVd-QZ$5*YI$QZmcvg}G(b5}B;K$01BVo0G;|Ulym~ z!^E2zc9fqpB#i%%MYz|Ho!jgi;C{UYhhkNk!ieWKcmn2$UrE4fPt0Edo z3%@`YoyM&$aE|UUgWabV;3HYZZJtKA>5RdI_`o=y6*5;^1~89)xhhMp)^l>T-^PnG z&#o(KKNus>%@FtU3nCEJB8+N)kP}&cpZynw9;l-f9nbYR5;M>ts`p%ge&_W z%`sI~Okjc7emBB?jeo#L7D}5+9B7>+4mk%gHPCu!GErI{K&z>(t4Y$!=IsDdNQQ+j z_nSAD2qBhVS0B^=48&%c8323TxMHmZS0u~e>Bo5xX zB9h0&CUV% zYb&*@L{)IA59wr?gzueWl|NFKPFvqo+0lAYO=+2S6_$E-DXsLD%+EU}#Xx`VOVN8{ zVrjbnU&I852cu7gjr0M%O3{_4pk@auRMA<=&-ibSeKPrR2rX*UEQ0fH3U(j2zq1Rp z!|e@iOk<@>Eo*sfho604Yl&aA1GI$1Pnp@3!%11rE+q}IZ0d@BA7k7MK>@$PXg4dp zGB_abZFQ~k6(rH+`SGHaog>MZ9ldSHXmWL>^obHc<)r_mmK{B4#19Selyhe}d)7T7 zWgxzmeRa5TIn71f+R?L|8m7^RI+o{NY~({&Mf)2J?@AR5s{ z-1okRJIZqq4j?H^b}NyKDP2_=e%aO)W_ z^x*3s{-M7;q(U$TZ5fB6&@vU4dQe>!nvGb<8d%7lQiO1mLVxq6$n3uvv5+bJr`*gFRzxy>3f#+DL#TE^LDij)^^-av0 z{!vpcX0t`Oj34b;)uZQE+5t-BI4jMIB|ApHPqNI(v3X?pO0U`oY-$%EFtIZMAuv9& zTfAh91Lu_qo(-)a*Z@Zl^YL+m$5ayTmxljIj3m&WhlmO^1EWcl_0pj_g|fh0f;WK^ zbY!hKx&KdsLIJBXVEDuT+uB0bu!s)+jcGK@JhYAAp&9>>5a}V6B9~x#FlJT|gbfZb6OQ!0URC|Wlpz=B zTjTa)9;_h;&r;*=A_ZqyJaDVsz@bXQU2mfYUwn`Xl!}3PHxLYVQd=Bs5rG48*OFT@TtvaN1mQiE+%{yT7x6)lh4gJn zGCoXUUgI`kF58#p{TEmdF!)$Tok47Fll1y5SKV_%ehbh|aSlO#3vN&2epmAPeuPd| zf&JG@Zb?$tIlvq%JAC9cSuv=y2Fl(PR&hi@8LL?8DP1#nIf+@KvQG|vyUm9rc78Cc zA(PSS-aDv^(1}b2xAeF{#@|7@(oz1Q+4!M{7l7v7IKPXQFFIDCE7py(6`JN=QI98z~+c7Mrwh* zRCY46Ml8pN1_TKX&x2ieK#Ds50CCSPYI})$;)nH74tPgKYLP!@AaaBw8%YusIp0=Q8d?gWg?t?QJ{*3z}W5 zSsBjJp|QlByv~tgIWNQvTy@eFerDHh)z@g)(R=Ptc4Vp`LC5ziX2SQn86bz9(ZH*?Qv6|D@$V@RFdMe6KwNnBQUTMcLmshd20puV8IT&;5yYpDOIj*ZGt|+dH9anU*OB_dz z?PA1{f9}yP~=H>(D zA$JdYGCyWC3_gor?lS!Wv0|oSh8mp1wg=9c{RCoTDT18ip(BUGyfw21ybt>a@);0z z^UtO;Rs|M@7FJy|-^NTxQt{rA?gh$b7PEIJME=0%!<856{t>pWKd@&*`+=}^2#in4 zBgKsGV~quvkp3-2`qvEf@3&!L2%s^FQwt)f`9X67d$Qap(fo!EHDvLhd@gy|$>;%b z98F0}au7otSSt;@2Frpy5$Z;f79ax~Tv8p|K_oWrKZ)Dz(%srWC{CAph6Ml=sB2XT z0x09_C~~_8BDb;5-o`G%I?X_{i`3sablRAeDkrtH2qKApn~C zoApMUjZ$vbvYCF78ZLH_pMaqaGJ#yGE9c22Ecu$Kx}@E-QU`VELj=t`TGz`O4%`lXjR@oX#*Hq~n zO3kah45e08j5w=`VFsSU9InGt^f92()4(?!*_q_ve2t!8)-bweP5%W_ojY-jOW8T! z0XxGmO9Cy_NhLFk;OZF!ehWty*%nCH169muU?%YZ`^>yof+04=YH5)dL;+Dh2YL`b zd^N_rdcra0$@1LXkUP5cl1^{`K(J~`bOjUq#!c+J01X(r+6EGyZI=M>&)YjDOIRo& z=U5f2?+LjMA@Da_9>gh%q#!p9;6XrS%BOR+x)yAC3Rp1qGG?h_w-j7xx+P9m*c*K!&ri@n=XpPQN^BmvbvJsrBD5vPFwCS%U?^Q#6>TV8 zUBxn#uByr~lp0s@48sz-s_>NZVJ@ChF)TO(F|L%HB!X8|-+72NKh5Z$$K!gfH}Bs; z5QlulN(qVq#{qM1@WOj49qLOr1aoiXjyEvKSBk_M1rFZ`tfge$rRSko!0j1tLM;`A zHJOlEK-5A)50_Bq;3%&|ncpPA(}@CIUO04sZgy{);Hf~K0|)m?%(`9OXu2YV3DNXy zStmpk07 z-D`a%7P5W9&+>ugUk(gXjTTId}Au)-5 znUaw;1|pA6urrAOQ8Q+N+EFvb-k-#*>3e3|Mrz>ip!o!aNa-(0Zb-r2=or*L*xwd)SznV3e& z1Z*~CL%f;^@oEyptAS#cFen!@0ivR?TS*QR4I`nT6t>~!n`?&=MF`=(X#gDUcR*mI zH1G{3kVXzw7cD}#I>njbU@eqS%H9QDj4N4@E(*3mRRbKA^r?~sP}RT!WTdu3)c`*S z0<1HJ0vQUO)#Iyveifvp01GgG2Eppl^Zf{ZQD(2fGW-LvePuBLvh)4=ULjB5C0{N@ z&((2bWF;0W+y=H#mD#k|PJ zcu@k8#8}p%ux1)B^9_;;C@zeO8Y+01BM?P75cdWVS1f*u01lmzpIacA=SH{3&Dc;D zXLxA*!kQP65Uj!`9x7~lubXOzh+%Dv_j69LbYCg4VXBuJ1T^f5bXQh7tvQ;yf9&i^ znmV#zg^DPvx~|nGR21XrZEQRW{DNF7O%$_**=?;oNV8t~B`2~L2 zbY8dntpu}W6qM@kDA(*%rTPi+^zwAzX>AWk^>gUDIBmI~w_x-sog)^4MSKx#-KBQ0 z)d}2z0Q-bUsjRDY1*uJryMtCqDa6jxRlV~xWnX9jJFr}n@`Gl+A zlHaIM?^yJ*97QklVzn;Hphn`N-H@PaPg7wC|F32Wc#u$*#%Zhe>6EDL1ZBZR+xK_( z7S{{0Y(F`p9qPzP?MkObsP-MZAeV1XLS&*G-SLp&U@LG8ImcWZg8eMDg8c{mM?yom z$i3$V@>>AcsXd12_^g=`$(DqY`gL$ex9YzOJk5kb@ZF zb+nh$O3Ct2Z`l1sVbEdkKn(DplEy5xOB(MXg_~`vEtU?UYzMccr0I_=DU6!m%}j__ zF?9DLWD7gaa?XKF`Y>eDo9_f$$SQtGE!aX*mLMi~s;h0|khb*!Z7bzQ6eLt|fo;h8 z#=AM3Xmlg$LY-p>>UbC!VbmZ4)%!{+W|x_|iL5=SV(v*vwVT`{X(Tph-Msm*k`UCO| zQr5*7V7dMRAISCJDpTKSNd>2c7mbiteFv(yF$N`z6&bNubQxt!xY5aRikG2UMZ$iJFfa7aoNFvxat^A7WHaFZu#|bH7Vs$ z|Khx;q0M#Awl8&kd(p?gZ(N^y&B^|%Y|)ud^-}B&|18y!J3PeK3oR`y8p8JK{vEaR zH}2C#9~ji!->yNh#v3Ufl4p)V5SYF96r#HZMjSB)xA2jr+etst;$vO+UOSPpScM0| z$uY3*?AqIx0j?N5*l6UK;()?<+L0+XMPtAFVgavtKxlySJjRP+GPOVE)RHkyHz2DQ~e^{{;bL+k*_)Y;Hg^n<}rbYPNbD zICPA|8ZO4;n8Q_g9Ba4?PiGF3X){pVEGLdkh2R-fZaUL&B$3-D1E}oHNpkRtN;G1n zXXX%_EXg$#(#QiYG{h|L_Qo8DC~VgZ-xY4WES%;6}1hfC6Z^7kO$h3nN_+=5I`5TJ!%*&G-Qp%?B9eF zo7hrbJ z#y+l3-_oc&|0Czxqq{U*tYeLw#(zlM7VELL+tP(GtmTsURJtr-nTzefP&BuIUwNAj ztrS`WhvVw9ydq-?cl?~3FMV7s`I3%gd#JAk6vZ5M6~*ytP!wJMM*R8@n{AIc#%ZCN zTm)zW!fe1w$2h5AoL?AlWTiKvx&TM#YZ`Z`H}h8;;j($CU<$LUWh>RPs%f-&p0>}4 zjs}ZI83uR36j+@i4z(oDEvmQ2SBzAYG=Y^7Z5@d#O6)3#E24IV$B`4dlH#A)Hy#Vu~;*3}+2FS!Y}R6Cys2C3^%Jjuu+bZ<80Rmt)sVEsK83n0Q*A0c8mh*z zD~~7H**y(3G^kmo;?W{~z8>lGIMC;fGAN}QT}iesZmVf3p{(c?Ld}7EPES^9*-Dks zK<)hoy^;pwtKk0NGrWx#kA_Ep0VfGx1nN2)YWByf1k4n7-+gYctGzY&1Oc_NS{jmK zu!hdRyvW!X)XbSMu@Et;lq>F$J^5U>U_}vbZiOKH%9|3@A+#|vqYC(DV{EQI7&Suf z)Gj+h(+9FBR*kVJn5+-JD8Fr|GLnzW3DoKwk6B(}D2qQJf>RA1P@fS>!JgL)-Z9Jh2#>W?A|2>v%1;jzKK0Itjqkh2 z%?N~|w+vj{tw<|*rd;N~YN%U1VX{ZU_0S%djqBF_UWCz`!>w^UK;Ib%dUNqq0{k7CpbT1ImWO*wf zqD*H1zg7h!84!wz%(5v~*Rm;ASlR%N&7Q`fU!!zdp*ofq45^_88R@y_dweD2oTd#+X4>snvaPzEjzy55T+ zbyzLL5a5hAU7vvw&KYy%V%4Vwk%K#hWfZ7ITW~6(|3--h%>JzHpPK$p%`P z8!f*eq98yt_}P*4Iy0;;piWR!`34XWJh%Z+3Nn)IJcVaQ&|B^gqkF?Odsq_8$(lYx<}s52LXWo_X4%}9Ix1+!G6l9>!(m_gvaftM9C zV2caX1s;lu82}!YM5MDg;uZbrvZmqzDEkw;*#g!oQWtAMptd111+Z2vP!uwphosNP zvS@D*lz^5;Am?pdgaceDcz{hJcrz2yfh;iZPL%llUwm3k`E3X=cT0ZD)aNE){x)tOW= zgty+ax**A}XUzkWV?OqS1Vrv4AiaMBX85kq^gsXM3)IiO zNqiSF4gM(8F!x2JIniWl> zIdYn7>31%(MX?GkD#@f*kZDmnJ#bi)7^#Eut%Np1(JTD-Ca{XwD2%>x ziUmux&7cm($*Iw(WK(Wv^M>Gx2x!PE=S5cqNU%^{e?c*@2>b#8Aua0C#`cYj(WQ6KqcC~@l0*hpNk=lU`V2S6=*f7-lMoC+AD??clD2e1M+RY}8 z*X&3$0ARtEsawlgf){0x3H~e8)BUDwXqsk5SsF7-SAaQ>%EI6uXW@pSd1jCvjZg{K zD>KhF5c=&LS%E^oF_g~`6e6@)4!-K8#~?4gK%%ynp57d6Q)o6)za|-)ut5}mH7z2o zL2(#r<{d!=_#v8fwfzvRSG*Sdkii+STu3x;@0Sf69_#RSzUFJ7u6w9}z6KC(GXc!D z-)_Icsm2^vwNaL$w;34w2&|1u#c@N{)4;JAd92Ktj64RrEHXI?xuUJAMnh4qNHMn{ zG7F~k<>j`y7wI}SLQMv0Lk>#vUoo;qwWuAIXh7urQQvU%7`d+klSt70IL|Cz@Bo55 zd(8p{2n^7L?Nb1E3(tCK{x|ar26=c!&;2 zA38(h{t8Z^lxGWY#JiTYGX|AnE3+97)V-Egw^(oJurN-?YhP)l`=t!;wF@;%uYv@nwj3U zY0b6}sA(E~}B_1dJSZfX%! zO@{{8IPis@VbL)45kjL`sTw!cj&`Sl%!Ih({ZlETZWPNC%AhaP(g)Stm+o4!PhIOb zHi%Lh^Z{psW22>2BxlAzDD;hDqj4b5zDixan2SoMZyD62HPeUlM2-Al&mS>ZR?rPG z?{C%1tJPE&_od083@lw_3d1KYSSbU$WC{~gg#y7{+z!&e%(?hi4?YEX@Cm`Dn0!5taz??{N{Evdee+wUCkW66>&`e7nODdIiwV-%^=+hx(3*|&S?^kR> zE;v7-`mdNP^&>T7j<+$&#?wSYt8K>`GAH6ny#Qif6lh)!ZQvw|qmy5WcZaHlBp~*q zD71puPZ|!X+A;r!V*;>5ZDKEi=L%x4l!bB~RIG}?Kn^N6nT9g)wsr(*)9E5!0qj+{ zGUsSSK`K4Ntf*N;&ZUpMVX-7|N)}3Tpjyc!`7${lM-g-6qjb5D#yq> zU~_7gW{zM)KjX8I5c#xv4mBMdd^84W%)zHf^OC8FL9&H1sfAl-4dl*MPoOkFye~MZ z&@{UaT3;qp`~{;oYG1|n*a5+hX1G5#;Kk_+G`R5$3wK&=U&l{BU11+-EEXl0#n)a1k~BBVKP zU`SX`vMtyUq{Z` zRTBR3fw6%b%2Bc}XB73JPGe&QJ|{KrwpRjv$K)N38&iq0y#| zFRlGV`ZC5wO^eZ}>4ZpXhxv=jj|q%kW`KpF+MP<11xef`HE=1@;Zpd$kkuz;g*AKG zHQ^YE*`nWy66~;sV@^3#7DIXQ|DL}5vdp z)Sa0Gg_{J%@W~W|yD-24=JSqbwI@I4FssQPXM;riI?+s=hoaNJ*Y_e>p^lqq)LmSvtVfknZ(;BSyg_jwc zghrG%OZU?B;day*QLaeV0-W0r82AWHKr4+Rj|B_L&JB60$%WZt^CD657Y2Zh!14Lyq>fSvp+y{}CutF0r;amYV zxeay=?i9tvPwg&d?pPPI{0=i&TAXIbO1CW)w|M8QDR2>wiukh$8JxD^g}jAfLLTKI zT|E;6bMB$t%z?$2SC-`_c_6NFV5JWTu%;EcVhFQrSOi0u)luPS?12M<%+BI7$qurn zQQ-)*7c$D&1N1h)xKbe`OM&H`!vf3}PzHuY%TWQ@HfE@kO5N^?h7a=g**Oi3+0$@G!3r=MYXO#Yh^dIR{9vDT1F_1yk!*_SsQXyLtTpl z!2~q=F;>eS+CH1w_RAi{Lp38*0Q4wECmmH=n9%UQkgu4fJD@KWCUB5SvEgO4S#H4m zZ}8p@9BSN?ShgwB23EsusZ*t5LUS2&EK2Apq+9f`0e~Tvhtum7hT) z85NbP5m}ivu)+>^Nn^z;szc2ei|kG;Y;5jEqh`A~(bP+5ve@Bhm@Ed3WL8!cBSJR| z`A1T)Jbexe!;FZde7vgg48|}ac&5)-53=LV2a~2rsbP~ar&=LA`yYKMjEE}&qg%96 zrT*7{h)$YJTHj5?I^+9ad2_C zbL-iw4Z(kwwEkU@GG1?{_JxJvd^J zz^X&4pPgckxgxL=tEDX|1DpbN3y^Rk!C-W(&0N*_(~358XuE9cn})oZY0VtEw5zHH z#!$avZ7x)_@Iw-e!+$H12O;FyDcbVn65;t<{700*QrEYT}1 z6hTZhKTs2#kW>{#2hFyGUI|)M9{~LrY_iEf)=w{y{zL%>HogoZNO#IPF-ow3CfC2o zjblS*1Vs^0Ex%I?Nm@|1)6`YB5N1RZaI*jf!AoEoBttN!paduI3(bS^w~zVJr_xJQ z^e(Y?kl1|a!p;qjZZKfnb1xs{foH>OK1B?JS>|4ffIt7)gy&=$@DCf3_sGy&bV`o` z#j*MAZt9L_hTbGYe|$!)R+a=EVI(E#sX_+P+o59A8%Bst1Na4|0oXjBL3!_KvMrjR zqznB&$h#rZn+JosL1<`|3ZYqjH##+gJI-{>SN)qSisAn*F#LbcqrqL0$gm8oZn>^81`0s;V=%s z1O%92P&o0>1jn}d`;R=VujL>Z)jt)>sw(E_PINLFjO#(v05)z^Ry$#^QO%cc?6wZe zEliUSoy<%Vvpx(J`Jwq4c`$nb`Ys3fJQ^5 z(?;kRvzmKxDGQPb=+y$Dp7i_z5wycBXQekFc?l+wRur2Vg1j*AyzaGmN+$v#9;o(W zMkU^c_GLD1PKX#Lx-$xr2T(OBWUG~9BS$0RR(1TKqWMO%6csZAz%1lI5(RitQ9H{g zn*y@34Fi#MRLA%XHwl=5b@ESoJ^iYhJaMJt9A1}NCE;Va&Vmg1!?sNxH|0%7V6 zWxs%-Xd<&Q6&*Fuo*dxb1C6w+#wLhZB4*DN(c9aW>>&AMLCq9a?U%^eR2RF|ao=d}q-PJy3;3pkwX3lC1sqZHvR^Wek3EI#>m8#f*UP9wZ(n%BS4=4u zH;-4EVI5Kk4Nl6JUrun0r5#~L4xeiRI3b>g6gxvv-wqO)j9B zU1|=?-9ey^y+}sa*`A&saz_xjCu}6N5xt@8u(tr*dui35hGAw^b}&C&-JtRk26=2E z<{&jQ)CyIg33gi9D&FU(E;v%;ks&Ci(Zvl%j?f>6hi(Qs>En1>jheQfdk(#v@MTbo&bdZqJK{{!wnI*I&6Iq>`U8Up{ zqN2l~O>~;o#Hgu8I*e(msb*@L^Z&k|>7=!*sd?Ym&ws9Kuid$_?w+}y`~Dt3-_Hl( z==*nBnSt6EQ^{bOECZCs0I4h}k41rUC@eJg%EtaE+C4N?KO~`njQ)~|bHFLPQ%LHL z;$*;t1;xVj4E6N1QASc+?Eh&aCo{M3zwhJ&aiY#)7Ac|MM z2iaJF8@MJzv@`8+!rcb0| zj2s{jg{Ulp%6X4?rQV;z(Q}g2TtG0k8e@xSR13%Z240}{3G$8Lb|VtiJ@GXnl`Gv^ zpnq8h=E;D7%owI)vKbx{^VRTgwB9fP3V%h8*D63n#*fFKKo3*5r9;X}GT=0ZT^Jlt zSgwGx`#`9|w{NB_Abzn$X}(=C8^9){(D#!-#~@RA2N9I8U_u~h9+r04|u=*Wy@ z2b|m=Db;TQNP2~Q0AfLC#nGr4?C-jRQY1lkp!7P|*OTJim@VS$-OVkc>f&S~H2L^sa7Q4GA|Pt%;u5HwI~fE_2xRTE zWF5C7vWHqZhD=|ea_rT7ZFSb;8Vsad*82?*$X2WX^J*0!C=uiv+X4AFDQGbzRdaxH zt`RNkLZotob?STSjH=SeOuh#iYd*cP zopiPRJ`qC@+r0woA!2?5$`?*j>*e*U4Fc}r9*Y14Vqk~g(?i-YRsz9>q#zI>5hTV` zJ3`OdT-hV7Af4n_U%YT5N#K_Yabw2qQ7D8p^N!E2Ada<`77QbS|EU9AK+xd_^(t|l zMC3!lm0V3&frfmBN55*|uO1jA2j#v7oJ0-z9p5c+g4hRGcd zbT3*!6CWCi0jR7o(h5Nipzw#1%H4b#;D;&!oE|+v;Yi>sfC;*L3D)t&fEKj$=#_r6 z0EwUUHy|4N(+yWiYs>D7N1sn#4``$|H zDjTHF3DG|z(RxAv3q8Kwz(B>$U8v5K5?ll5E;4kwv4HO4u$WK|gD+?bizTc{0YY?0 z3YqD_TiGq?uTZ7UQ!bQ4)(Z!J&`beL0iYL@gD7Z&>%xrj#iIxqT$&nr=w0{zel{7P z$AUOw@79&x&|a|mrto1%B6V-2w~epe4chnx!CXE_^KZau%ByKY|7*-(>7`vIvrg??_Q*ol)0q^Kd$K12$Q zpr;AoY&mEhaDn^U!Hf#&#n9e@cSWS!im<<>~D;jwOz%sjap-F@!O603DeFCOl(Hx>gd=V^_rj3V1V}ZzN6`xp z1MR!gMqWT(HfmK8z{_lxJei%vfKX&4IAmBG4>-J3lrd#MA6RN!a{_F&7DHS!SPv)% zVw##-TQ(VN5_j^t0iINNH~E5AM6I-P1(GpsMaRIughF>Q2S*UMfGHV1K@2KkGy*^E zl|*7;faKvwN|jJ~&0bV^ttbl|CsC(FlVrMdngdtUGJxYk+0~9wnT5Bp^o@SjxUT#7^))1Td2MwSd6K7`LibT1{fcPJVq~A#b4eVI%G5I5TZ*qaCU|4;4X** zVRJ5S^t?>7oIBctCR~?x8tEnqg84u@3-CK@qllt~OOR0?&}TqU*(75jVnv z4tNy5$AJxSa%mPjqH?nIi^SYhON;o}@%-jaM7${!D7yhsoq>E%1s*MJASpp6f$YXjg1jSxDgcxr z<;4OKwHs0=n)~5wQrd3k;uZi!10rhpN?1?s9LZugl5EeY1c9dm9Lhcz6heQ9s2588 zUHcMO$#>;eATkQWQ9=w!Ne<4U@PHb?b-vkrgRE@e$7yye?5HIrP25(2{)=_~VltUe z)L!*o(7>Sk0%LA%VqFkg!vK$oORcWI+JF(4*6khI}U+X&d=+s@KWBmOz{vdcO-=G^s_%B^(VNjT&M$r1IV^D2y)3 zBI7hGc8EIz0JIw!DH>+)s->yQmdttuwZJmU@bZa^ z5emM0k`m#t^|V;zkk$IuRrF+Cd~l2aXd|D>kDTOyG(mq4D+^$c%no(To8 z=9gO$#j`me;E8QvW+B>ag-A_dCnw2lWdZ1b9(nRve2+-7~&_Ge{&^BpJ_qLY+G+jN_!r?$5kkD4c zo@t{uxrsbq($b(DMgFoQ`q+D{jNNC5|DMgh6$~7$(0)|o;8UEwM9G2?0!kl>IMz-P zcw)^& zSdz)NVCSM$KrIEh()bbPod$D(R!C&NvfXLwX||W2Z)ZVX?-0>ZXZSRwQD)hLVF%i`!8U%L4F5`(;y!$8-Q?NoQBhke~cfEOco=sv%7)sNqKe4aVO5VYo`Iu-Xn+Yj9r~h_IauSMD59 z;sD`ej<5kZ+mMVpJa6P$>cA%`;o}UE-wY`1sYBu{aXthA4bd0nW0ZYKmfwEiL)kUteJY!wm z;L;4r!X3>Ztx2w^L1mD{CEj3ESt?%xrZ}OdS?Za%-+-?Hgr4BIOr!xNs0s<<85HnG z5TP9w+j7&AEdg3YQ$^CaNIL*UBR~;*n9Xa5cLr>pz*4BLj_?Hotuh!2z6ya>AW%V| zU>qAzR2xY<6LLyz5?h*!10>f(f)SOvB;J=62LZZKpe#+3AXpJ`QYm{N;3OhkX<)iv zJlci|NDucqH}{YaAc@g?G#B4tVIjc1nl5ecOrSaA{!dXDVQpAis`` z+6}lR)b=F};Y0H0X+WE)pgGdkUV9%GoR_6as17hPkGp{|UoUHrlFwk91ujDs6wj8< zKa6eePD_TJnWweLhya&G-WhKJvUJ{A4rux?2=yp22XLpw(_{XLKn+pNSS}H3QUN$< z?Px$TsIRQG2uL&m=_kPCFdoS=k&&7jls=)L;(Q(ey4#hUS4&+sX!qU`ZN!11+%u>h zzYk;ZEO=|QeLocifr6blNvK$IO4*)2wfKqOmZ zJcNCO+b0p6d+lP}2DT5UDOCL~P`MR4`a3??hU2RMPXds51hfG)BG`8Yg2QkavKM?R zb-kI4)SCgvpiW)EE0}aZ{zwFSLvmr_DcpirAQEFAa9sZ$PywQ!VWuV2CNZ^yx8@@1 zGLB>hXp&YSP11r0v$_l~r0D>aYO}!*BRJYpHfA1Ve|&h z(>x?V9Dtx%LVi-A15$RWk7EBk4R|vB+yE_lQko?-hEt-A0x_I#F!*wis+Hl8FWYCT1tYCIa(WpSBU8+!@iM`3H3F z#^7?H?j!>_gxN7e|Dt=F&V!H`5n5G~h|~bXs?URBM2lfUK75#hVS8*S2_QLkS{4Y=-p&!3T)1p=uD?N6O0wE=&xC z!o!0RwEHn!M`Ws5d;<7mFr?WRfmOcP!0SjApCd6(PP4QlUj4`MfI%1lsE!TpOXJHe zex^VR7f=B_7sM%B`YIB%TXc6S+oa`S(V|0+`zGcsg=3n<*+U3JeKszkfaXE*nJ6%( z8BL*vs_X<@%8F@ALzR6Q2|Y>6h^Cr#;Hzp(wbO-@K$7HniqyUP{@x3MDnRMvWM_5P z0Wck?+Byi+i}vacv63EjXkTH4TCEE}1FY0bvWyM=5~2Z08#6j2Kpyvo4IrkIGVES* zcLGc_NFXHnTnwAw&l&C5(|X7kmZU+`q^%0}NWd=bgv?ME5G;9TGuj_PL4S^g zPR0+R#^YGUTd-P%B(SszgnzJ~gJFS%@AnJ{R!t(Snp=+rH3`wL9>f&55hCX&SOZ{w z5fb2{^IB3TE`4w?cgQT6(w?Bzk0_D8Z~(?jEeev5!U4bzlz00-9MGE&khZrYp_)ZT z*^!Z&mv8!OYo@vX=k3gGK@-Y1pY=QWlANht0w4 zKETq0MGtAi3j;V%ckmzW*UuVBD2vPxVL-|PJOV;sBXwBZw|Nw>mVPc;rwgb-LOo|; zvl5uxkZ${cfiz6bGpLYwueoI; z_oQ!drKb_E%xGfhcM}rDWRgT6BVs0l8%U%&+?zUdmKd1#_F_d{+CUfmkT#(J@Q^YH zwNESH;MjEv6MJyVqhsDybN>vmC=Q_m-MCwiUTrJogEQ?Crjz zciM^PiMvlnMPZ`pCC2WKXdMzi3KI`BoC(Ej1{89J8qT@JZ11;XJoc(iFY0!`I6!hz z0kECgXteKb&~Yj{Kz2b@p)ffKpfn#Fg#iFh+aXjh_2$L`ap)C}{4P*RaA|9`$nlA* z>U7A$iUo%=a($}fZQ$f!a_vyTZb&Vm?~Q}fbPyJO2xQop!&%Ur@oS~u(8$WEW#IUj zAR{g4L%zN`1}Y3ub89_ky$bUM`38k!g>40Aa)`Gr2|$Z|459x&P}&tY#SzTOfG145 z6$&b~2gt}f&+(Bm2n99JtMnBX{8AW%qV(?-mA^z}5Qley`tM5vmDB0Te`-UzjHk89 z;Dmz!;z)Ng){$8VD6aIf^e8jjB!leI4e^8l080uvwgo!qF=BQ-01OD*e8||>)GjK8 z#}|s4|LCOU0gOkoR9tDnfGf?%FG$QfdFvq+PyjZ!ww8+5aeX=b>fO%iOtV(ZVV7WW zXSXpx+IS@4_o1~&l&G2#HYN%02oN@!TEbNln2leOrdD7aJtGQ(r{m_?JMT2n%rVuc z_-?aJ2D$`3AmP9qM*DVv!K1~g5=8WKDKKg?ky**;v_SusP0HHcdZ>^_QN>e)3K1}2 z^j{fi3TD9|eKX40=S;O-3QFjXs=mIOk7-KPOvLCSHd4Bl-~by5-cWNr2%LRufFR^B zZCdY%M6RF@xX(Z`UIJU#XTEk~;ofnzcrB2tNbe1>g;FkdHH8+D(FvRj zg%@(`Iv%tpo59p7yd6wOe(kN98Jz|0d>qjWZ;2{plZ@T>q4h{vQ8h$1%NUFa>`k(B zHA{FY?eQ13!b~7}x zT6mr(!1HXzKNmbxnE&z_9uHXt0!u)lwbxH)Ns~-NKRq1{{4^exMTusx{}&MmV&ond zC0&8K|M_5nng;KiK&O*B@WM$~RE8Js4{&JsNKsh;E*y)NLV++Zpy>)?l97H_Dj!(t zo~+zgnvw>L=2oylGzTlxGxT_@@T@FF7VDbiKm#Fl(07rpR|0O_fj7X}VSuwsK%s!M z1LR}KiB2720lgoJUOpRG=e4O(l^hF5amalN%IA%KFjPPgIa0oZZ5F-}zHD$i^zP&T zXloHxR9BA|-{1l=zWj1gb4QI1MFAU#%cJ?O#!&Lk7?j~y52f)UYk?Q325&eObVyKH zpwOgO5BLzg`O1iq$>uvJk-?i8JEXVc4eY{;zd%?cyrby{#LCai6t+Su%?ul0SEXx{ z^sNXxI0QZLUb_9D=%5TPNLF~3fscEDc9(2!udgaVaiPqrLEShZ5KF-3Mu?kW^&|oJzfaNa6_ry6=3uu!_ji2HY^|5u*U{)?8A+C z1NI%Hd^>-CG~%n5GJ7=fro>xjfW4|WG?LQ7_If$Gb0La&cOJ;Sd(ZXVd8dbe>!1@> zghqiGm;nN<{RoO;1TIt4w6)dNAZqxlfzoqF#~BgrTX5LE!!r)SoWVbSV5Eg2H?&if zF)D$HDzqR}3432shE`4t9q2X@+4f0x`*_|-IIX~FI?EV*Ue%8+1LqDMhrY*5&Nc-O z4_v)EgjEN4ks{)o5eHiK&2Kc3&?p`bGRfdHHvmgm#H|P!c-5prR`gw77%dQ11Fsao z%&La1dm1eL4DW?r^O#$38*z1A*;tm)Lg8aA_VenKc4rmx48G-;w zXR9%2g(I(nCcD)TMF1prgO*AVlss_klChy!-JFhmm{WpEt9uw=}0Oh#mM3%?*W zLvUKutv``qwz`Z#5N(=BNHDm8iMAYaN-~}fQWAck1#l!T4CqLN*jkJ)LE=idp44o9 zZF@x>l?-D!D)}_K4x}cf1w%+F`rlC3JOv6*2T+5;AoegKhShUro^qZW=a~BaHbh)W z|B|rN#~EPBayTFuk&Xlv<|eaY?zCm;iu6uCh}R=np0KnG63|X>>2Xp6Z{T$*Ov7N# z*q3gPB(A|%Rp$h(?1Hpl-u@B_!(m1?HpV#t%M7%HB6wLG*%Tymiig$QA-MrNz?5bQ z-hI1II$x#NSY^NlmR$vsJ(Z`$t^JBVqlRec86o>VAl9gj?;smDPPG+l=UeHpdT59FQ zt2r7(4y7HJ)^8XCpJH7YbwHM|(i@aY+qGT{D0GeFa0g2c_Z1mcS9D=6I*rlX+6>Jt zGD#;D1bQNZ;Vr4i1rX@w76nz%6xJK~Riz`)gZFp^yvIQEpsNdfRWM1PHz3HICKWgc z`T-N*2Yg=uwLDN{hM|{0^k_grCe`pWv{=s2O@ZNO(i|-Z1cuVlV+^b})`$+m zDp!rKk8hVJzhxLoGc$qGOiYoI0B;7AX0W5gNG2}~Z`YduJUy_4`4uiGL1&;smY^;} zx4C1EP*+9Zlr+Q?1*+bcF)DQUU4;ywO+db>sLWB97@dGEJDpButX)W8cgIQ`#P4o^)M}mc@DW9m=p^u%=w+5!i=bn z5mw&I%EGRq>bUzB5e0lu(gc-t)p}{m%Qo;RIsli#bBF1&!B`*)-d7tKI)fF!l){7E zyP6LdSxuy31HLUYI70%RmyRkHUc1+5aP6MGc5&&X##U8Vqm;zBOGrQ`>FG&FiUAKd zSg<_z*^Q(-W!f-X1hQypS!tkIBq3T}H1uvSps)u$vPI3HN9G2ImZ?}zU;@E%lxkk( zib@WLPu2q+$n8?`2f@p14THKJ#-Tz{46uTH?)LRy2UBgp4(9rRsc-3ob%XEd`X4^z zO(5tm?czIPO8In~(g0jQwqCAJ+#RM_C9Hd4T{?mFrx!@oZ?wtjsO)Up1CsZaLswBb zMdz`cZrF$l#MLp%L8coUBDFu=48C{(c zzmzK#AZXxX{(QJt7GF^$WYrHTbMOHr z>p@`#sNCuK*#Y6238Mf z0097N#YGG_5W{M{DvcUUUkHy>z(o2r846}*t*yMd2PNY5J)J2jW6|CUG=lgCJ#aPb z26ipmO?2Z?U3F7)m;OY+`JFq2(Wk!gC}_w*?pu+Y0t`6=K4EJCO-Ub&!}c`RrS5mV z)jWfbh+;DB`~B8PV$WnGOAD6V?CntcPrC6F@J`0Vo`2H)==(rjfdp=&XkJ(MJ)tZT zef_y&Hq&M2TLrP<)*)a@3f={%kmv3rFi`F8{2CD_xMG<%AEX=7ers@B(ux4?-|Vz& zHI=~cs%>t)LH!Z5kq8j^FRUZ)G}g!9@|c%#Y#u=VV+G>Pj=UkqX3%_q@^M;U)*sbD zEkwmu>+?@Ux`GO4&)DDh4=?%M7_C@fQo3v zK7KK{M8z$lXh%&ORWOH&J)TCru4#iL{=zmgM>p4NGY$Og@dVm9nr3w23mS~*el7GvfQZYOOf=5C`=r^&KSRs zx0)0Ym0Qa0AukHM?Rv=4&Z4!dD>v{vH8oplj6~06pZKL3WxntBQxw}F8kasJ@&E4v z;)rkkpB8>bPhU`ZN&H*X=F#5-{4r}>rT9eEl$wnJtn-hWW~e$J_{rY#)E2ePmkfXV zerwN%+uvNeX40BDIU{G|*@f$_OitOHDBXvOUpK#)?`sX-*1%=^)_?y8m!H%QgzIVK zyQWI}t9u?;`@VWZDym{X7InXB|Jds6X>6aemPFt1*7?ZY?R#~btGb4D z7SAr+J7?qem?{r7H~;=4F4Z%P{64(7eV!oRlOPnnIg~Kdi?#1Bicv;*jmiBOFBDyv zs1R;o%3DrnB?cSW%@2%Y>(ZUdGK`4fxn{hj^u1+_M0_~L=4*H-*=AgdE0b69`^NSw z(%*~^U?cwbhCzNG_9hf<7IDKvyEq9&p+0|=#H?{wtu{sL(A~;}iJWi)W1cRZlt>I$ zo*x*+_AaYSOg5s<*Ei!C&=a7LQpwyMHdHsdICG0E6MCHZOmKOVLX|1_qCLo4(T7pmIq%H-4`g%8j; z-Vn*eRo{~bj`F~9go)Ifi|4Omg%8*B#W)S^N+X@{VH(F^Y~gc4Ro4yGt*0!95e3VW zfZs-*1bhUsug!%HW`9;~Jprvp_bJOV0(rG+4xVjaR$zpm9~jSGLN7{84OdpxH{og1 z{mM8-sQEd@=s31#S?YLb;p0SVVjoIY?({8cw!_E@M_wHmzMGL;9{GLv5blH5_CjpG ztM**+rX`VL#GGGkav#selm#29s0K!}{mSwZHN$gF(Xs61bV?%4h^i`#WG|z8ml2H! z8pxgGB?}5bR_*-rrNdjLuad|O!xlC9efaJ6v%P9!VSiTr{P&D-H`SaNFC99jjBlhe zKQNZy*e?=h!b98##=(KOEe2NFhfVO_m+{3aN+Uu17p~$>HI{M zaNGGgro5GO@@ROaOvUG679&56|HEF!M_`@7Y2?W0G*-(`qHInhR&E>r zw|(A^<1{wPCT@h?7-qd=4eRyZG&&C-HvyY5@_OS355f_u zsCI=0E%{{h8n)qs(fgmQ980?Q!^HxQqQe?{1Is7=t6hiE+xCh_fAWb~{0aQmmeWfoK3ekCy3|R2yXM+_ zJ<4h7T>zBJzvY z2US+T6|9)|=!a#hOGc$>?9br~vd+7@XxwXeYNy^T!dQn{YQKkFp_E@Q zQ@-M~6F<}8=oFVZ6t$G3K+eoDWgGq0ta~+zBBoYXIHvnLR*ccCvif7|NyG2{_+?Sj zqCY0i;|Uq|zy0xG)s=;n&iR|zg^TY~ssk#!DrdOn-5dYQ?=B~&)9!!fP&8d5WrBCX zl+)#vhE1wvRqRo_Ak0U+DOm=hro^ffIz^WM?pIMp52~ zV!nB<@Q3c?x#v56PV~Qy%PZe-ur96zaQm!OkDhZ z#7oUqEOI=Nf5lc)&eU0B;@fvl3s4M83G^OY_vw|5{%0!>n#E5$@eOU3$19Im3i0aH zOO0qeHn93q+GB-~#2o>1%?}t|AqeZJBEWL$*+mp{0q-saE8vUyMOXnzg@Y9|sEBEJ zF$cv?6^q(ha0CGb+hhku5<0oybCFnBfEDq@JA@3eKn2x?BZyn*fN%C@5J zkjJ960y``g~kRcZ0RpX{gG#MPL2_ty>8 z$q5(QF9&;-FI4V~JhKCr;6)U9XFF&oE>@exX~yGeUaBR@1aw;oz8cs(T6d&?i-XQWUtA} zjugK5hDI|djhVga$++7mTxRVw9P@Ox-V^0Rzs#6DI`P<+u<2z#>@XZlpFOI+C6sM& zDRGSr26Oizcp|qY-*vWi>`pzVLNl-V-NvgF!}yiOy6hAbHgC`9?Q6Be7S9c;51YA1 zVdW2J!am#l<3hs;PO}y#2C>6F?dV#M#&0hBz2;Rw|59xw8XBn5gllUEnXyto)kAWs z&f&^>@`N!7%C_;%CQl3e&g<-Vk8~t>|H<_$zq97aq}xZY%~pCc_1v06PbS_Do-u2K z;iqb|rzDdK0OpA?^1ftH* z&0++r9v&!?2e`kYc?LehjEhy3a|(O(HVws4(d>@2$-$lA?x?(@_y z3hZnCAkJOy?~iGJTEx|L+3~%T(T=k(5+^uqDl}Z_w4pM5V&a^XS-&No+7do}^QI<4 zeWzJY(fn9q{bZ+Te`lxPlcPFPZ#0}vV-OORxUpmp(= z?Cb`weR|nWW|5S}(tlrCZAa{!b$WM~SCY1LTPEn6;l5BkPvnUa00I ztGv-Q}ke-m~CeyVlIVwfryAYOduded2ZTvcGn{%qzNTqJ^o#2mAeQ zFvnmbKYtCa?q>b=DOX2rI`h6SulCojyU2obd6uK{tp$8xlsaDV&%?_5mgZJQb6lz@ ziMLlet=VyITjC0*wUy_VZ8ohu+m$$qZn)5JUds2+6Hk<%TeaD2y5TrYtBXeJ6PU|A zOWQ>CL2DxcPuu`ZSFcr7qV)RHXB_rT#+*SZsM8p@G<8W=AGQK*J9HmJ(E4yySG{OI`Ks=8a$hb zEy-&6iOc>vozR##`u*oCWm&A@R_(iYZj-ijS}xKvb4RUq{&64g6dmu9Gn~g+sFyQa zP_|Wso4}rT6puH+s1A8!cwU}2*Ppf8L7H%2vO?s~7!`W0xrHA&`4&@TRCcgDuR0uy zX$bcab)NOpHC5SlcXVdHW1Y*)J=_XiKK7acAKM*aVxZ(`)*5rLDj^l^j-tew{O*Vk zP5ZJ?kmjMCe}~`fc1zfjTBn@q&Y0-ZF!+$514b9AoxFrgRk~oIyhKH0u$kA5KK#mZ z=i_-(O~%^hQkQ4B@kxzG7Js&LO!_#NnJ?$xbltUmm*1|e2VDs!8X*(2IfFe;;_Hi= z*8+H!&{;Z?xV*e}~`&0I>tYo`Su&-8?f+tWwCBGaMGg@20<(rqwZf@Ph zc%YsAl(Nfes+ICfjhn*#M%I}LXR>FHPMNzkF}gf#$L0-9Mx%^8Mju#p@{&jO%_L8r z%@I=SH^#{drRN{7iwTV}Ehrha^YiqtT&BESb+csu;Ztck>Xcm+^_#12+U(*#JNNn^ zbEaSL)VH5)ieiAx{9AW2m0tKNx9$CvbGGbtXX#Kmu$qlFsXm78`udFZIO#~OT9n;)mP z_>8uaj!DRXwUlb=U6-hXSKy-f5_4y+MwR)7ny|OynZ(Sa%(S@|{`BUp&a)&dU|qs( z<3iboIiAzI=G@%Ai}hgYk;S8Sj!vKGq7{vb3(VM#cfIM_yZxlshnX{t2JJp!(WGml zxfiDT<~0$WE>*^tuD@MDCvU(nno*!{qIfdiE|=dy^!6o9JC&>&qaI}!ER5Z24PJ?_ zVzKfV%8gN!&(kOLJhSMKnNaXc)e#Q=?3S>No7Y`2nvgQjJ28HFSh@4fbLXron9ifN-jm);czb&hSM(T@OPmGQrMQjo{c?o<9)monZSm-N0 z#m;oPz52VC0%sCA;KujrM_nV1T>ot6*z_-5l==_)aqEUxan^5d!WR3Rg}~O;PPjTF zdGw;xHe;V!Zp)X7@iY(7?pC{U72Gb(MrwS^XWp2ZI)O_GRp;^Pr#Xt*k#^}Ob+nL` zxLaSk6(J9v8)$uhe0nwR!cQg7r^KfXIw6;Xp8xh|*=2Vt8^8LdLPO3O?0h5s>}<(ee4-eo|KxijwZ^?|Pw9KmfG#ckG;-@ab? z)76XTUU-bodsI9}ao_q!za?YYo-=5~2ckGSqxD>dh}vvJ7I021zLA%dVw<~qx&Bdu z+qEjUzDTzT4t~BjUH>QTT5MP6#BZ%5Vmerjdmq}f+HO8n1slnUh*=g$%-=dE{^g+W z)Dg5b;m@)TcdHfX`YX>2w}}{W*!ul5A})xV2&}0|o!R-ef4}6ZaY>2Vl!>Z9cH^?zy zwDhg)Ho?Q&c~|vDYUr`o0$R_#jrPBNk3G6}W0(X3uWFl)Bt~bA>I;l#)$3Jm9iOR4 z?4iVe9clTDV%K`*>G);L?!ob`+KXMCi*7A{p|p(<;B}Eg;!O`9^qgd!ltmVL*=b#1f9D0i9#FMe&0 z6D_7Ufcr&#b7BAHry_^`-_oXys^Z$=D*~6b<|~W%9@d9UPLmGTM-6fr8&$*!8JnVL zOtnjN>P?Mgz5@Brh;i?llt|x6QeU!H8Ml%%^oO-HkhW?C3${oeK2}#U7!1S%SOJ={3~DY&fA-u zlDX@TMbOJmy&s?X*NRD}SjTU8#OBnax>fh3X7QhQI%U3QSEo8Cl7%LzW_hkFD^y&v zCc5;jD-w6C)qa@HFS1#cbEd(0$~%m?^HylguWi%!xa&OkrxtwV%mTl1QSyl!S^TZ# z?N_EIOx$+!MnRKQ5f28Xq#~JX-}#N&fSk72e&-gLlj1{_EwF zc6UxY>JeMer1d$uTFCvJ+;iMinnOt)tK81H!vN+8a)(DzMyC_1{K5nL7XB^ZLuE`? zx0`pN(Lb-_xmHB#`X6(116G`21+-gYh#L%RHrXhgRbSE;eE79TDozw)fo~zA=5eLhKp(sH4=ab=*NG1^vV4SG`YOQutMA8zcVS4xLHLUmJvK zpGh10XSn8K;6|*AyCa^`2s$nvGqwG+rnyZI!0OIOMom9S{tWY_`?oWE5hF`A$bI-# zdbM3^y;Gz0^SbToZy(3P)mG0psh0>&Y|U}J(G*%Ah2q*}Wu1vBCcPCz_P+xa*HvZ( z{>;H~{6Y<@XlU~8M7QT(y61T9mu%dz*9R|o)Rg0`JT7@`|2igMOFQ~ke0t^%^ypgb zeatkMtij>@Jo`hnr#b$EwmkCTqwTw$B6ZYb^*w7{<{qQl?N=)BixdT;QnNPMwlfco z4%mKzPqGg==#GA#KK|KWU5)$Wex1mFK*V8vti>A7ysOxsMJ_tMeTfFn-Sgny2f`Lj zRR{Fm2UAwZw+uR&LASwYB2LpJp7UkR6Q!U&U9B;rsv(()Z|uf|v}I43qe-du~riR&Pfl z<$gEaBCRU96Bs9m);cr3jH^S}XQ$}5pz6?btw~v&ljpgeH|d>E(!}Or#K-oHa|G*^ z2usk_RAMlLm*((tQ|0`ZKFIr3o^uM-tzDJrItfKq^m7~kcE0*r;f3P2o9YPmf$dR@ zkU6t4#eR65&hDkOnb(yJUV9!QCzw(SZm!d9rni@(!UJaN*xWuz;B-~Tmy#c*_hdq~ zt`iMZ6ASB?3U4!R)RVKvXC#xWz`wm};tMFmybnI#~6&m_EZLcR3Cu2c#? z;2%#J?6-1qMt8+q@eXI&r?8H1iknm0{%TQYoi27YDENW^xgakuM{IwWEAcHVUq>{Q z*MBFtw&iBas+&FTrCa<^=bFUog+_0RT zrY*a*yh-W8Y`e^_R!+LuwfBif>^fmnQ5d=U5_8qG&b{qSMJ+90t`kIicH)n7>(f{B zrUx86-ShBmndWb-KLJ;{(dmu#ul0U|uJSm2t6z=PCkRg*f1;@I)0z4|`2GbrM&?s5 zhk;qiK(~_QKF;s&`AGig@n=t7%8%O?oSXSI_vn;MoU=d2nh9(QOhWXS8p1D2H;Au> zvlvPApMu5P><=D$E1VJ6nAD7pY2C1CbAC0ZK5D_+)@I`r=unLw`toeutfB?CLQCxa zq|#aV75wjXI8j_eDP4!;|c1-?%;p0 z+Lc{(iDVg|v7{q*%G>erx|!-r=3g)n*W7&2{b=;#vuy$fqoqz4S4pO%X2k@2UGMC3 z?*OxN>cjM+!<1cPG^~sT&6&B*qNlpzqDPchT_F3f6$`f2^h!Cc}KuF&SAIH z8=Y%Qat|K&n5!U+!D_Xyazp>|&0@xA#p#3?KEVJctC*)o)nD$K2iBj&%V`S1T*7 z_8m*zB&h!m<4WMxYqSx}0;{WuW4)p6(MC5ln$+026|z%e#s|MEsIFadtG>MrWDvDD z*Rt`ZOP=-NeEmq}+abh0p3Ajce#UDf2yda;Wl+)q+X@b zrtzr#9l7N(Bs^c2X{qrDgy#WC-K*SoSZ7Y}dV^h3d!Md3wd&|vbrj`=VigD(L-_V0CZ}dshD|aHHD{n&sC9^L(qTHETpR z1;T(T_0M)b=GRf~@1k_7W{h@c9CgirMJEsvT;?hzB0-t$EB7PsINH}(^De9p%v(ie z`1v(D8ZyHao_w_|Sbf%eyAnTDbQ=Y3Ds`S-GGUQhDy;$Mv|K~wJFTGN+2h||@;6_O z88@ZmSlNCzt7m9^&3VQN9^40!)Amf<{{GI&uNT`bF7Kaze!XX2(_f74dAAuQgPNrqo~vM_^nzIpld2!+#8YZ}8w z@A-23nipXc_KbfzYvrD?6>BGk%}M;_eAu|nYo{BIr_a*g^UH$isN<*h{phq@r}#D& zl!r}+x7(*XGg$1}VgBMTuz9DK40)%_m&bk+zZtwEtw+=)bH3vKQasD^$!G8H08O6Y zcnsO3(``D%U#vBlrS)XS?O)VqFM2Zl_7Rua)8+;@&+>or>7iqj!zOKB<7_y}Y4*&- z;IF=3mp83e?b5TVC36JeR}TFSJUh7l@J6_=!})rXN;pdUj)97w6i*tKp;N{`5AIFm zH=;As?4OL?GbU>7)b}_3F7DTzv-;BVXz&XO4(q?`_;koer}PUmHE?97)iNW$IWhEG zc0%is#m0nt_UpU#_8pt85;oMkU3?-{kyx?Xps12$Q+Q-gvXQ!NzqfQx>RBX-K>n zyXAcNsY9F1O&1m#4e^J`7k4dm-o34SLikgTZ=}imlm#l6hOllUL^Gj^zA;YYkrMB^u?_ zs**s=y#@H6o_{lpTR-@nma$yd#Wflbtk0WWZ2Ce9^YPX~y%!1C6goHkqNyj|PNPuO z-23z48mFGsfl;~14%lg)e2=K9*f8Xm{Li-!SQRUD?)A&0Dq2KHhtZaq4~J?l-}!wJ zv!bp~-B#|@$|_pNoqOfXtAGCGLpz}G7&7l%4&K>VjCDC*8Wm*Fx<;!k_Rg%uMvKa# z@62{Jnx>}OV(4FX#B1)L{C3LmZ&OyXQns5XbN@;;*r4AntLK5&LWL*eYoQ>N@wEt+ z^|e?l<7>hCL&n#F`w<+Aq^ZI)f=#eE7n!u3MB ze204unEcqi{rQ@K48jIw-Tz*#fo*TGj(c^`Ede*6i<-AUe(v6~A0OjoWTsul3QG5hSZ1_+ zxo>KNWRS3_$fE{%)bKCuJK2R&AZp;sAZi#;S9A`&Bq<}N#uZJV=Oy7{3|x8H^rEEHm|Rz0F1;Y>)Q(^mE%9?$1E7d6 z%VUc^D4{&I=*?~i`rf_(RcFuKFID00PGGGiHx5ifZtuu z5=?M9`W0+1Qkn@-C+8*m5b3H(s!mP?+lQ28!qf?T$@U;6o8WZ<7QB6#FDY(~J%C71ulNA1At84T&kZ}m$cdQITUX;Ay+S@pnmxA8`B9Pst z7=)nPU>ierXLs!XJ-b_0U^1m4^(~ad;G$1(%)&yuzC3KGALKFbJAwxpZi=HhRs<5H) zlt}~+3T0SiKJ$%?ns7KCN^W@NhIbGYum>)QfI?(ycoF1|3=OY*K2wf<_?MhOrX7mZ z{tm^+@xG!B!Xi2PL5_ZS3v2wZiSWOe=zsYmXuToaS1j9XjrxDD*6??R8hP0KpDhx| zB$rSDaNi8-%VIJA*{vvdbS8ZmY&twfs@Pt<@-&?85#V?%clqg+cPIt`83soXvTNIb z4uuc`epQeWH>}1m0lyuo;u*+@8weY!o2ovdEg9eFuTp4APu z$pg%_OtU&N-ldTsLU3pLR?_oDp>!nV56s>PWcjddFOpk6f!y0lACT9{Zd2d{vTV=p ze{%wPK=-0AG5a6pV{E@c1JQqL^aEmzQyrEAtkAz0sJ=gvou&Htpga14@Dc$T;p$5O z&>d-6Ch4>uw0bpyR(CI7EAL~-`xx)3gvn+U6f}^zs(|ka;Vsz!cuS-uJNtXYEAL~- zBi=r*@%In1^CO^voQeXI7D8l-6MgfI)O=AGHwig4wU?Y)-pA<8#s_29{>2*o%OAOWsm}K7;hA*n;hB{8G5R7}*%duyf^_-#0$w4_3{d(b zJd-$Ob?JvQ@i7wW2j3p*2eF5o*GuNSUUCMw-Xucep%9nGU(i%b746az6Hqf_xJkp% z1OVBZSi}+E>TSZU*B8Xd2k1Yp0s6j@j_jt>WCPy>V0CeSts!{0wFUvRrwIorep}`9 znezF}cc3R^zA0cn6D8WCCGJGH)!)=!lv+xNcdti~MF*MBRO(ca7s`5loIKU~PfuF# zWMFs!B}s3Q*G`Vykt28dQr5qJkX;gsU#H(K+p{}LZg=H&_rFs2BVJS%_1DSrWKbvj zL!PXSFj-^oeXGO#j>rR$bxGS{mYuo#aB6li;uXs_;{CrfTTI775!d_Y=8V6%^ZOX} z$!b%V5?Ptz<9Ehho@Ms4(d7bB#^gsWUuN`n90m?*4Jg>it606B=EK|+&_R~5QlXr~ zx({UaH|WmaFUk9VB0HSc$95M1hc&rh`9dc0#_|qwuRWJ{kbBXi15|Hhw<&#-a1!B* zk&~plmlNdT0lhF+x#4{~>Oj1V>^8;V6uM0^3771kMP(l(4TGwWO|}!~i9Gwn-gM+O ziQaeij*RU6VZs0_CF8gKu}OD#!dH%e=sBVCXtmb|^<@DIH_C2P zz^H|IfWYy{>CTiovGPWSypi$u{zczUWLMb(Bgl2K)f^JbRW^IG6xrFBkF87~llTP~ zUOYl~Mj9DAwQD0`I@CAjhw_r;os1E7GWu{{$OqXOst>0HAv4&Sj72u($eq6SsXSZz z4(qXxNB zp}a%!FV#TVb|{3hmFAXXCjSFj^~V;h%7m*Alp6RlE;abbYrOIrZ*R3_aJNOKHQohH zM1t_~J`oj}aSM(aj(#RV#8c_Q=Rro2BKLAU)>D3Z|I4SBhc#`U@#T&BCl}vbcyeWT z!h&-W6<6M>9cyN|&--1u=+4)IO2zoWA?$yWb3rCSt*mMi;sL<3VJl_{h**W*DP%AC z8UHVz@!pPgUoqtGA3nzN2q*^QWGp~mD<9*O`NX1Z43$jc(GMp`mzN~|ZlmB&c zOT_ltEZJdOWr7xviM5jrMWjra*TAF&Ud910PHuSRhId`h7W5G>_kEBd1GA&Kf{cTP z2Xf(yk4yN1cR%H#U@JV0|I|Qcd%ZO@{q7v1uPQ9NWCD~Lm@>A!E%H)>ywvc|kP6vx zrh!re0qdwG<|2$yZL$EXyUVA9dTXv9V`23Jikop@N~plyrBTco!HgSTEI@Tpd%JK{ zIb8ie;2}StGb58+OC|~EAh2*nFF$V6u+jK^fdrYo7?-nHM6SE|zm*QS7 z=XL0t=#p0(dY#aKI9PU@0;&xI=7hwy?ER!V6Eki7YPJiBWumE_Q^j^BF-+XGbE?^H zB)*A?c3>6Ti9|E8(+;d=yOKC2C~b)rR%)*nmV8dA7r7$4)I@H0-@XMBf@<|9Vt>9S z@P9Up(fBRqjIaT7LUP2f9P#_#Li`SFuQAu*w51jl>QS|D?oqYSl;>-`MnayiNjE2S zS={hv?%6jx&ZwUE zDj!gm^g)dYi3PG%Zo$go>TyuA634C-a<%8Ok` z|K;NS%OA<^PRb+1-fEqsX7y2aTtI7>iK-~Z3h7nFiu&lxH|_tAy(c)O}KOltOT+H7be3h~f`c zv8E-EnxbTb)2wNUBzlx^u)Fn*>qnl;HC?+WWA(maZKeJou44sOBz2@%ZO;_duN}dBqju$#Uh(%*h1)v_z z;~1yTDDFc0&gq;AfT|hF?#wqVyM5IU){fjFurcsN5s%;Fm!3h7O(rg0nMt3KG!hxg zL}G-F-1I<4NdCH*_)WQzu&{Oy9VcZ;{wMmJ-QbDWrX9J%C>6Nh@;ZOx;643>v#Z{@ z+nn9$QbW2n_$1@bje=Hqg^jnBsSaBPU!T8yZDL|s@U^!>sFVeR2fuFH!b_xRZ8^xV zZ0J9DqJ*2*J;|+6*YA6U$z%=66-`;GyRp51z0*n8gp7B0WFBBr;ts74t}ohS;HfNJ zpRq@l*JZ`Ky2qvCTO98=dE$iY)Atm5y3MW6-xJPDmwQ+EIBi0U+Z|y~#@u?dJI0=d zM%rx-nfPR7nj6}w_3#n;VR|J$4-XHE#s2I3WgD9-n+3e^} zQ7=@61sjO#iyFL4Tug6JnsHYsJ{6PB#~0R?a2So}wMbNO+;4Y}DCkKkAiX}nPBh)N z<%{E<9F%~HnzHL=+nJ1I&L>_(ILRG<@l@%>UOyMft(P@%m|2=;r7z}6*i%e~VNNni&Do07kmcE!Gp+TvfCJ|SSbijpGSkZ6FI~oX;dLLl9uC<>v+HrfV>OY3JHq7iu zNXIDA1f7TzI^Hyhr=6h`^Sx(2IMQ~^Y0b%FJk`T8f@()ujvT4TzhLYh59p0)!!##P z`mp+{#IX_3+m|Oj+Qt4k<&hHfQ&HsDJkiY+L&bG!!0AlMa5EO zS_P)GW_)o*SDje*@!1$h(?-^O%BYJE_5_-#i`q(zN|j&s@u?~0X;DVdRJ8)W$w{k1 zUv-G;;wIT<&tI@{;jQJ54|!h|i}`$3!`fwJB=Y2aiDdHR6AQv=YS6#cPufd?fBP?< zmKez=b+f{Q5cy2huefDQR$z)#^{2#5o73Jr@bN1V$_kvl$uOR{zFoI zizb#mzr0AhO-|?Y1cJqx8S}CN#|8xFPvJ+l%RNrkD{gU^*GTVtr3U_MqAy0W?x}ct zIywI|M(GLBLVyh0QLm&-_YQ28Xy zUzIK3^}PKu^x2QWu}w>%Z^{t0Q~4x1)>x(4x4va_+Fa_or`F&Xhoyxkr;esPy(>Gv zW3kbUIrkRVN3EXg8M-5#wfbYOb#hitOMIE$5xUIoDjWTLJ$iQDTY*LU%NLA)t6vb} zRBl_m6o2KD9`7aToPVUQ#IHL4BqjcWbXJtxJ{!a;8^nrNHwtbL8G7|~vLy@e(`|M* zgqr2G8yKm~U|g@K+aA}0X zqgJv`Hg*T?515)d*vqniEL|#d^pI5u#_%9)pk~oPATH{V!ObG&~>A z|1NZ1_TAGe=fw)8_OskJIr>e1BBJ+hQzEu?WwqL-I-=*c8lrJkdkq0Gww~1-wi|1+1UOjc8(}eWI+m# z_|&o<|6yC}v3Kg?=}jXu)S7Ddn%~;LYm~F_fyaug6pzXsZNdawbUeWX6z{Mh`tSt3 zTxuL;?B}<{UBd7adfKV!PtQos;{QDA5>8qSWp8FGd#B^VovK;Wld|kvl@mu% zmtS%4E#263gOL$@WPbUH{o9_ONqpv%K-1bgRwB4rZyh3XCgY|}rIM1nV|@F<3&&6= z)Gw|`x$h_(sB(;g)RcMCy7hv){q@PxbM)E{6v!5xnAk8v>%a~(hvxFp;by|*wvEpX zXY84++Wx__pxSq)P|~>JBhDq94;*KCMli}fNbu_|nf`N^%iQyVQ@y)`2yz={gj5 zAJ#$^B^>Wc`=Y~QGuuTO8^-Wa++w|YOx>0*(vDE-w^m*PgsT)Hb$>m2xDr?M^0t-ih7^%l*s zK0TfE0+lFvlL>xl`W4FDd*=TzGM6%1ThE6Hg^_pEFm3BeCE;oJ3oxSzYFE^n7P+-C zp3U$o*lYie|Ffjq4hHjnGxb^F+lnSu`~4%SmC;U=GGY8&6}P+Qtg7ZW`ChH~GV+H@ zLU>nZ=sMjEXOUy2-01E*tY^u-M2?CP)5p>-D1D)R&TH7v)FS0FhFG{&ScSs?SFT;Y%8YO;_HU7@Y2YZ0inMo1M*$B#rF>I488Ta+U0kmbc1Bm5+?)o3eJF z+Hj=kEHN(un~tI|Ar+#5R{OJ<*6{ijsZTBx+LS7mp2N9i(Or~})bkT6gvR?!mRtMD zCaGf+dg9IWPj`erya`vCgwHE$MW~g%s`G3Xwh1#5876jOgU?LAHM(k}Ux<#vp3w7| zO<1#2jh7_axqA8&!)e|7GF)27N&m1CI+kb3nssU;&xno{J89xGS9guN+Nc=O3D}bk zK04M3e7tMP^{=k2iydcOojYyKaJ4aKM3#yj$NG%-TR%>1Y>dbX?C}JjiG=l| zpN|O=X}URg;o^ewNB7bmVSD`SN-KIQQ~pP|MxR&=u1DKQ@bzqNL1 z!=yx~VNWghnNC=Xdd@RTbgIdz#Xi&G*S182*gwc|ZT<9NS9x}X#=t*w!5(~uuZ*M5 zXjy{Kq!x4Z8S)oM`b>^4_zdwaN1q{Y1)rH;$kAse=!4H3EIgN3+Z0{KGiBX3 zM{|OOh&0xd>N8Akoy7C;J465`%t1k9!s2tm| zF2_guOzL$ie5UBGwNx8nAu5RVVhg|7^Wi&0=a?X}R(kQ>temBPVL z3rd-S?@6q?_+K5oWhTdO`Amoxt_n#%soyyErkL2V6Fy_6te>Jb?uE!o>@k0zak}eg ztMQRUlueGE_ZcgCxak2;f1==eg;_s-t<31&D_#Mg|ZgyJc z!m(pTM8DP8KBEciR;lsN5`k=#ry^3UD)lUX?#t=uH1&-V!(}&0vao|2kci&*Y?)4`V^~ zT$x*bl)L|r8)El>;s4YHZ_rq`B3ggSuWU`9`x53<7)Nj@D7Bd>?KcYnm;DdFcp7_-XTpDb)|zLL-3cbMPu z^BJi5s6M>+lIt`03x-1u^UtjE|ML=6ef~12efH)+mLSE}KAA&9hSU2pl2g$; z!J+7JvI+j_)xf_lJgCj-f!ojFf#X!wcbw<+sX0Ax%Q!u7oEo28PDO9l|Klb|dC3CT zH?A;*)2DvS;enIo^r=U2_|$j~{j16uoE|t24n@zHQ_q#}|8WzxPW0xVVfLc%oOY_1 zl*mc!X#va>UG*%rl`$fhuxIr!vvoCU)s!tnE@00r$4n=vzgMH5x#iDyuBu{$godB` zm#qskkdcZp0+N?LVs%6G&SKPUb)~ci_U1~TOLlu-y1G8Pg4C6AS0C(Uz!&ny>&n!J zc=OL(g{CN+qM>VEvW&()LfTvSonBP1RpfQaOD zZMrX`7~?-;ht!Ny`I)?nqs1uh+fulAWRzd6(gdyb1O`*ll?On%^??_do@RT!O@We z6=kACD?7K3Mzyx(>Y$XG3d^WBtI;WpkVs=@U11rsg+elBl8x~nQ^V06RbF@&wZT|O z*p28SI-q@xng5etgLWhFMTy~A8<&9{m+x1v`?Nt)dkB-7Dp1zKg?O+JFti~=2`4A1 zG%^>*h^-SK!A;U?XwY>fZXKvf_}Mdp18yB$ToT!q7(Mut)TyL^>=w%>r)qpTq{D^A zVXHXkj32Ud3j9b6^#Uw!3OCrDGufK5j;+!p_Z~$BaWx zmXZ+1`uqFZ>8@RfoE9Uo0vqtg7e!bz8#&cNLK=H1!M9~9d#_3h{Uysb z9H1%u`{i*c6^z3lI!tE-yTS%JLr#%HJQrds3(3o$Kh zP=e1kg6ex6_JMaX-dajeY;7FFy{iFhq5(R3u!-Zq?(wb)Y%I@Gr8i$|Qso;bv{qDV zUIzArzn`40_ChuBn0W=*Q*ZoM>FUf@n{P2M2YWKXPoCgDkL^RyuQWbR!Ub;f;oct~ zDjPJEXC8KL2JF@Se;X5qtfb?`&{2N3w>YSuydiflYubg)o+mcU-@_c?EO}JBgTC{4 zYT*RRttDydz6&?r5Qx#m4(LTuO}sy7sfb`OYV0BesVzBIoiL?3v?U}nLMAc^(;!iz zgSt$$AXH$Zk>QfcI;bG3DWMQqCgB!NT}8^ohGX0fCq>@UYM|=0XCI=_a;~a>xiP@+ z?scQ4^VN3*7u!l%yIh*5e^yUQH&TtW7x9y!n|L6Qgd5Of_xkFt#VR_j`&Pnf_gSJ5 zr(fN5!&V!l4q}vKG7iOY{`l;BkiX`C|Ak=S$3z3pAD?{>bGBr?ue_*XOT0PY?eDV= z{udUQ9=faGeoD0Msun_Qh(ES6>gN#OdwT}GzGH)4$_iJs+#-kKS3@ks!TEZ>FL5XBd zU|_wF;S$Q)s4G-wLK7CqqJ�^$?*I8HaJ#q^%?sj)KmlHp?Gf+!9+h{)Rx@AWp^~ zun@mpF~H|RS3YHN6&@X*$8>i{&YOs$o4rm&QY76jJ1iqrV2Ma4OoODdCT%&%mXMFl z#e_-XG--0AI;;&QO$QZ9-A~9x;$_%Ijuzcf2%BoyRC8~tTP5d^DVqZ4kgq1$jK&31 z-3eYu1&oSzN~nVZ$(@jn)xii!Dr?bJlbi|JSXoS(Hcg&H#}*c}!NsxeJa2B9bD33#aZSCqL zkq_Iy#xXb74pJIP;f>FLskYo4c~qbCs1Oc{^`!oSpqOiwkY_4o@YQj2Sy5AhZN;c) zrUX%K31n<4vK1pF;dX_pNU|VQBXcoE5^h1%BZMSmnIuk|wv<$jHJ-svZZNjS0!tk? zTK}v8XW1Ff(-Wv5Jt?Da(hxlv77DFaec&ms-uVTtml94h4Z(>5VRdV`RRUhv&^p1h z)Mx@1VRb6m(0BqIRu3Yp0Og0_v}+7ItVRrtc4Ss0I=QX5uKREh$_dUt-+vLtApG~BN>)PSQ@!2(E@2i_o`KMBaN`7{+CyZ{|Md4 zV!lwN)AOoSm1@WZTp%anh^5U1FmeJ$PH=~u=v9s}-~u^;wst8rfRPh0l86f=k&JqK zE6a8t<()t?^?Ukw)*aHr;AfdXYZ}YGxtO=%Ghb<#>wuEBDS-NPRc?CW&pzuU(*OXCjD_)MF#c?a z@Mpj#4^kQd8j=Wv5w__t8j?#iU;TrH0+Y@~|xUHx$BR~MO5^aDM zuV7aZRUo9#UN%-d7n7z5u;Qz_0BGM;5kb}G-%+(8nd*L1d+#Yjf^cO}FcG*cKNMwo z84c&A9{5?^&9w>`HdfpbK+phI9K!oR)ogw?01e=MOaTC`up2Ah3-8m3uz)Q!+_%7O z-$L`yNFxBBCBe}*+{eRB9}fUn;1NX!(1?`c1H1qr0gyh{1Ul&FQqiO-vila;D9Fof z$WIdh<{C)=q|Yi65li`|Z-He`ba8=8+W+E~sy`x8j%M{F%4wFbbFfg8VM-`~=Vr3| z76ACn8KA`>aBi3+0H4VLOm0_`Vc)(5IH-nO42Ph_aEKg7Vc1l|Ew@~@+yYZg>A^w* zY;B1q8x2WB3PVkXP!|om@mdoVLR}8JXabSISW9*_8TRd>L6@}rYohA!+S6g|7r=h~ z{uXr5MU%tsqM_tvs49_ApnYagrn)WqAw&lNS7YG(H<$VEuWSI#!Cd5cl8B{%O#o&C z;G7JB%_Z>%sHWe~j?sq=pwNa3Q;o280c-;Qjs!Sts()~1{($oU*Z^vKxGA`j#!Ikn zgu@uF!f}mU4SKHw0Yyp|9Y9~+o(umiX{4@- z>D@2XHx2^sH^*=$m@Q@@n?|ZvIff%~WZCbdY(LV8T5DD}(N9qu^P1Pq_ZU;5^7iK5 zs5N%761TgH{VdsznCiX^?*01ra*zEHiE_O0y*#G#SAri<)dq=jb{+_-Yj-8eWqYem zkQq8ip!AhS2z>@~@xe81Zfn|2S1z>Ve&yl=bwu|r#sGFDvD2paumvzKQ|$rz#~9~iG)&gcfV>7Gv#;^S#wCzQg@e>|d*u(7fFr9N$>D8UhU%`Oj2UKnl zBu7FCmd>u-bivQkG<)MJYzc8lJYYlvfHb>qqEb*rgo#RF;$E(rgJsl{X?4@)kXb^8 zRtcC=ZBRorV*`HJ4Kxrww+ryoL*5MGD!ei7S~O+A`U9v-`PlhYCLjt*CL8L&sY#eo zW$>jdkeW39YN~Ow0r)HjFiv&R@Ij!TaEQKn$yW+KsF6!Zl5vIV0?13Nk+R)owo6F_Q31F&ohDI6{VAcS*ipX^pF&Q-^mf8;X8#(nGg(Q2?x_+A@O8EgD zYrhkE{)Qe$pc^TLRtadKuQa8D393VxQfSyx!aJnki_pHFyZN_MsPS%?ieI z|Dfpo2jIE?h|FZ&S44RigQOW7?*la>vJ2WhIdW)b2pjJc*Tu{S*nUvmC2g3)0?w0j zJBzl@kPy%q%f^%Eu=C_S*s~sR1$*=%ds0m|-;W%rxf^|khZ|$z=$rfKo6?(6h25kb z%$|_lQ?u#8L9%CNvxzIZ`yBvhX?N8ImPYQptKT2{{{AW^$V`S0jWhyeE=(H0MT;^l zjo%DVN=bv@K6H=`g5W-EYDfrr)>F-9&*5bAHfwcJS^!=?HuwzW$yv5A+Z0zgK(6Oj z`g56y`TgesWF~J8jc!~7)BF7IE83ucq`T$u2h-^kFq}|0`~jKzh-}@`j^5m7Y|30s zc1u@J&qB{6VrXPGyBl@|dx|>%LSl?$+3p4{`XQ_v;i}CLKq0@5tN~1XgOZFXxGnG;xFDAQRAPL>v-mp?gS~v z+KswR!q1g_rgqR(H>VVCbe!%12noK!t#!TggDf#;(gO?4P>kamig<_7GeHR`K{npU zi(N-_>mv4xA!q2y!5Sk-Hf^RYWqxHiZiZ(~}@Lq;Ti3!zJvBVIQakn>c`7LzHBsbY;q+ z##ja%eGgtSY~dEy%C({V6QXa{*P1pr(%1-f+rZH`(Fl&d$%6{`pnAy+pc|Wc`*5E@ zv_71g>WM7>oA~0E*xqgM9E6{9V8s9jQk~IvTo3#V$L2nR_#jIFKpnI13F~>fY5DZY*^sY^epg0S&-@V|?C5AdN#)jX^U( z0zB+b%zv|T&x9^29Jbp)fFX7;z(-MJ*x})dI(wql=x5z#$x@;Osk>UmFE|vCtqgcK z{T#X0GhXY52m?5s!x?sm`vM$boT{*we_zI)%phwsx}uwlB9#Cfxp!y& zymOvX52*zkX%XEk0?#`{$;i3d-N@dv(F1t_3qy?VAJ7f>+pAAdcPusJLQ5-q{APCW z+N92U%?eU87EtX%Bfj>6euh?ziY7p$eV-Jv_*zLs+Yw!C;n~DQcs6ko?g!+Tzn=Jr zRWAaxDhPymcY3nX>@^viifqLgX`z%!IoKo&XitPHiM<9Y^(}5+`HIgCFKIC<9zSsW zTyN+%tQi)<1_Brez1D(2;7@;zh}XJ_~H-H3BYx%8zR@S0CpW=VioR* zRa%C~b+m_FN0^b1J2q?JI^u`Obu5EjN0`c)%bY)O9fgO;b>xR#N0@es`F&Ep2K6P=TpsN6HmGMz zqaV&tF}kZ`P~S9-ZkLf}bl1k9o<5Cko8fMBH+oS^9f2u(jYSJbv+9gl$&6|=v%QSP z$HT*7@j!o__bIVVUo!rraYoxdr_lWH+pkw1KeVJKW6vGQ!*~5IC;D#DOI%88un&n^ zk#N3dol1OO^nMa8a|C(!y+eF%Z#}NQtjgX!Zs*Eijh)08fwF{E4h1%jXOW6C46`JP z>;wH2)sIZrE%vBr`-g<+(vd1+k3Kktq!%F`WsaO#d~w99saMr!)M|~QoLX3zu#Z=~ zS}xW2)Y#Y?yg4-$huU6@4zfk)t(eItuuw{ULxbr%i_DIZDo2l3Ufr8MF?cshOrk(BX(WHeMx8Y7AEPw!klKWZGi^2X};^jY3tr6uHc!0Wu$JR-xX=7nV+bhYJYz0wmTQBw(4rpDN6F97X((EJ^P5)si!%I)cp@yr-+clj$Qx-+B5}+Fp@ew|s`fX7be$F0UhBAcbc57p)!Zs5`vUgJ;T^ z*hkvQCC|?7e<8DA##Xz}a;AY9O@-MW>vyn5^c;zh65_?VFZSLpH<qKyfyve&)bw1pj&FJ|Cls}(3=g#E_Cf^;kVoxqCMnKc?|jL-6JdhUqk zhUhXc)?2*d!&L$kBiC1LR$4ys_WJ7AO5-O+q*pFcT0HS)`lmaaKD&%+!#$~PnpPTn z{fPonK*#1*I&XAX8T!r>nbxg3;b|;wGw*O~X+!U=!g%A3*+R|jnfHu7Q#)j~C{B!< zcyc{y^U609FRZV7y^=c7GreZX%9j(*rPtnBSwC5<{Gqb&EAqH>=fuMe(bvRed={@J zl|(13bqRVPl&KP(Sz5%GZ(Hx8A=`Gg-SFDsxkiHHya@l;T^F3~_4Xh88o|+Cd3)_H z3r_bc*lYi8zS58obR$zIiGO+F;aXhjv54HwIxVwm>(afH ziNUpe?vueSrv2&`X@uy)du}DMSL4j-w;HS57rGmInDB>FE2U3veM`89^K{RsFctw< zvi{YTQu4y}UOC#QHhP8o8HBWkhmj3yvKjtvuiO*)WdrFkZAVDu$_WDQ6Hxar7zKop zm75oZF^9jPOo^=gT)SD(f8wR}M7lCsy_AUx1rZoTJv# zh78ML_?tGpRVj5H@O7LC!ZzBnK1oVrs&At!+glFg1R)YH^GWelQVy5CvaQEOovy*v z-bUA#8ypp_I{uOTnOR2idiYUun3U)=?5X8G(+O))&v|BvPBl5T*k@Y&+LrAEto5>r zqAhe4t(~K682PXB8Qc8?7Vt$g@yL^LG1214cDbjrv~^h{GLY>|+Sz5JuqX6*Gi}oWiDHD9mF)7{wVgCH8I_2-^No9d}jXP~kRNI$tpP4_@ z7WCFY%*8bq)zF*V>o0WNaK5Uzu*}TZHtLwa&p6%nv(@-WBFZMm&ijm&TR;8zxFQjk z#TI%=wvASLt!wimo|NHByv5_TUacpUr-yaKt-QFOvSQ~`8#ku2QpmZq8a^q00m-VH z4Mz zKYPT+9czq4`w`fCZIX#K=8Ln8)n@3bri@0px9&IW$l5Q9UA;MEREtT!`;>vWD~Tuz zENs&{;UH>?T|`<$I_b}Q_U0pz^ZlKXn{AS#%gtY=^n4|&!amDD$OSsBi}f`;p^Tc|d{LPQ$tN%a{fw@%{u_#GmPOg!uF zVzpKq>7ygY)(03{vu@?S9S5zOI&*vHq7{#H+|u8oy?mix%$_fGBZUH>8)!S<-mjJkKDye9sXBG{ituDhzxXw@OLJ2To3BVvVjuJn5{&Sc*FWV8G+vMC57A;ssv+!o&!vV8Jl>*2Y%>FHn>BFD+{f-VS!X5;xz~_+Vq{zi?>rb= zf4Tqlx~KGsOphfj{m2KNSFLc(3zf(0a{{(pv;QqG5^R!o(j=VpAEj<2DO7(s^KRP_ z4<$3jX$r>$`+r>Z?({OLcqy{;Ot+S2 z=C*%~nW5{xyW`9Jk0NnC{YW=5By_0_qV@?w`|z{MnDY)3{F!%0@Vk`f0DUHReAcgS z_nB+8?Et=3IsL=g%VxQY)7`^m9w`I!Z zCH-#Y6m!X!M4k8~gqNQT7TON6$LO+G=h|(Tst@Or=-1AFtoMj1Lx?@5Jnh^_vB$$O zowqvrSGPK>NszbeR;lNd(jGS~(!u#OLQk2-->(Qr*g8IX$k;51uJ~~5#a3X<79c(7 z;i4F>^VUVW5101)khG^!53(VCA5bqkH?~gv7aNOe533XJR71!q zyJej_MHlxA(KVE{L5zA=rr5^+!g(QBA93ViTxCYbgPG#To2T@rcEPTKr(CjL$D>YM z2U101V`Bp!UKXAaA$G^8zhg}hdlefvpa7VIkC?q%di#yTD~`*oi{4g^g2fl-fg zZ1(F^ac?#Hv&ldkH#c&=X?|@-9dR9wqJ~`?a2E5S)2#ZAtemF%^DqQD>s6ZuwNAo+N!EVko8+x%a8 zB!$^JgIkg_gIf~YK`n{o;N_pI61cOUPg{gl=yzT9#_kG4q?T$Cvv_5HxqH zEwY$T9=k)@JTNC(Aw*vIvgPBI1;e*W@5P*F$_^I}*(&|u=1$k#j+5A(9sZWKy3*P= zGLZKbW2Q?Me8lby(L0Cv!J8Tzwq+OPHIXJ5-K?q?qESzI){NLHtr)#?&kga#K}hM{8-JLFfV@RE9*EN8^tu0B?TV# zH%3M6d}4X!&680rj|~exp1W!Jc#MXww7dGRcC+&aCj%KVFN#(uHvK9io3$*<73m*h zEx#v-A?2j3!Ued$z(@Xb2RHA1F?^peNUydqnSd}p>6J{ zX0mD+;HFbsn12KRh&V ze1Gy>K$O5uR9hy?x>*3B1ZNOPWDEZu+hFH` zJb~@EyZok85L{2|4d^6ye*ts`6N#ZWtJ0{E;4}ll1V?)NL`>)5KF9Anu;bFLKY*YY zJEq#-FAhvg07nKKL~w4h_v&_@pf94j1Cz-vT?9!J(b_3CfKCW}%U(A~fvwc+Qe`R| zZuDK6U#KuhLlDWY3haz&gwAz?6pk0NQ}twcsSWHfck4)S46Rd3l6N*}81H1S8+59x zmc(?P@3u)X13EF?PXMXbLrF>o*>0r#`DkJJndG66mB{<6!%OY(C3mC)9i6Y4^4Fub z$5%BrWP7Hzx2EO=%!z%rOXm8AjDC+#w9&3GiiUCH`*l4^+Uv_fzTBAUKufD^V6H;} z{eZtdpr`$h?x@B=_DO)0;arJMwK!dPo__Zs>^5OPH@x6CVKp*%HA2`~8a4#SptLkF zt@8fKZqMf%n?O|uMt94=6dbI?|8^z*Cm#98`wx|HRqm;Kcgc_&H?SiKlkBRJKwhUN zic^HN!tM)6yEi{RCmu7e0DJ0<-zr_5*=qAG=H*~dCiuw{!h9g}sf|l~m@4b`;vk<^ zw|_VHS)BCh=$(**H>sVE1bMR82IkZJznRcKarI%p?GN$W)DJqNQP~W~^u*ootIh-{ z->C!T^40E7G7Gz+YACXhonw=H)nkT+?#3G|VRNVWeZ<62bE^JJHy(P}gOpj@hm%+5 zHr-f~IPS@wYzjrb^-A@D^KrZ$&NqbJHpDFDL-6g3N?L{sCNVUH&1j1G(LpM?RMV)q zWp2SFx+Wq~KswXfi9~FyCK8g|c9}((7U#*$maevYU@^-n;k>Gb*YoOSxXWh(RIrg} z0wi``Ibd<^Coclnm(t2UL?YflubO=Td^$UMuJz7mg3=Lr1W~{KKizX-_%i>sB~Ccl zo?Ru~T7Awc`JQrzY2v2VgiL(mq3lqb@Y1H1A{(1P=~mYi>*V>k5PstvDk@5087`Dm zqDe8QEy>ReQpuq@N69X83ndXX%gkwaBM+=}Ow}k0z!wLkk%@A1q$@548t)INe_PbW~jvQ-|EbW#Gt}*LE=Y_PgA4Hfg z-??f7q2EvUTo}I0e{P8#rO~*DRZLf3X{SUl{L7Y_u$H#M#6!tV6*`$5UlpcP zDD8v|Y%0GQWRy!a8<3VR{8mf5@A@PtT_G(kI4?Yxx=&&!&F5EYc86}l+|-g4(n*mv zg+S9se53Bw`cv^eO8UwH_%c7UgMaJV5Mrxr0+WivW#g+}wR{dN5-Q0TV!cn4c1m+Y zx%rkpwgFA$0(;|xNuUsrm#6}d46?J+Dqz@D4S(&;iSv} zNVUqi?P5Caq9xj7TP2)V+Nl~*wR>WrP4>eG(}$6f>nodrj9zZg5dNi_)i@ilKPfe; zDv?SC*8r-SeIbQT%}<(y?9s&izko0E6FUf&?eAQh_xC#(jREwgjfurYLQFYggvY*sgGR8Z$YK^qXF0;`nYdI8jA;5MM@Pk9L%V~##fH$3#;BeYiCI4K|0n++ksaaEG zo?X3TVFGYs3_E>k_JyK4{d2*27C-gFdnsv)Yw%@$9<}_XYZDxhiZCj%vyp9)ZVhYs z9M!TR8Q`_)e{E6&jAd++5ymFjq2%%sEAIviZ}cHzfKr(Xu9|$W ztW;)KL%Tz}VZ%ez%6ty|X((BdCVlU#Oyi}SE(UxF2$<-bYmQnvRoYFhf0sckVX@TC zizN+L0)S_JkR2eh4@YsQI}^EH?5DwH-wVT+`FSY*r>;%44l@Z&qp%u{nYjpN`Qs8< zb~F`{XD8zo+-dtAPX97*)@857$vYcDQ@{@wna;f_@Aorn(*l6s{n*T+XMPV`NEM}59tHPL7&7wK2W*&A|XSO%Q z(#t%94wI%yYu#C{95nWlkuQM?B}aS-UfAWngbnIbrL=zXBFk@H)w_Bb4N}XdetxU_ zzo>g9bWt0-|J8Zj#ZtN#aSieQ4etC64Oi4G=0%?Im(bIw+XKG*Xl z&;_)?1zJ_OxPU6SKoU0>PyrWk;^qSK&>C=a0U2lwln1*82^#JB3?(u;?IFXJ>Wyym zmZm-~QR6p9EzhqA3VTU)h%#TM98Sv6lr={UAT$JmRT=BPmHFn7H>U#8wXxzGv+lky z3?RT4_>ZpvS(jPfYL$QxCeIZd#@sMtY&CV~&!~hf-ctyC{QYxG++V zrj0pDA)g+k@{(#BrL)W}jFhcuY)+HUZw+#{0>)FTp;nd=_`(MDxIq|DSWTYs zht~kC0Z@~TF7ofgy<09gV!fQ^D_yq#Vw6K4}8dwB27M9)1W4b2TB+OTS zIER#{>1~dZ%g+xA%VEbTxDZl-W}G={Sw1nSG>7UQ#lOrggp{utZcdZSFAPe{p}Iv0 z?>g(hACpScYCo8S<8_+vOIXCYk86sAAR_9}a!d_9Wq9B~i0CTF?xxvK+Hd$pUWaS5Q&iI3%yT3sDhYC-FE!T@9 zi9(!vqU>*jFECZ=Z&-u(ksXX73~)*hQ9$I5rJm(H@ZO;d$+f9eNy{KSQ7G>NU*PXp z1A;`A4!T2d4w;;nnD>f$IEu3XhlP-Iyr|C`e`rgBhV0bFX);%*=y`};Wld;bL=An= zv|ZHc;?&aFd+U+87$XUs(WJ;*S`D9dl4*g&(i|*2S4$T=s5w4=z@&^nVy+eq(>+%U zOtwx%+DPC+sn%T_%MJ)IS1TGBF6kCTJwixAmPvv+GFPbk3AsqTgt87Qh>BVZ4Q=Jn0f&r*d4zx)k@U$_?MKw#P>=a4Cz0_Tvg5^t_`>Yg>& zHQ3FakdD>CsOa>}8bpOqmy@6wM($duFsdA>*#o+VXmnPYwTprQJjZCz6V6WSzLnr= zF7&^78Zq0P_+OCGNFE~Hn01Kq$#Qe#QGL#)c!K}@QH2ZMo;fgJ9_cP7*d3|epQ8MJO4H@ZZtYqndd4s8jk0!v5oV^p+gt4Z0| zI82%rO$7`}$j1s}+_h;dNX~?8Y#|>s;5(ElRS4_G|K)-Dek=b9-Pm5O(>)$I$-uKg z0vAMeB%~rKl5Ur&wgd(k4;(Jx7DhEC6e7zc+`_>)ObdcH5+TXBLS0QVCDe_A283&~ z{L#fN*0H1Y&l-HUPQUgexgT@PwaWr~u77~%Y8cQ+L39tmEHRpp5==EC5RnuKTsUDXp$Qv^jGMtelZ>rQa-x&{itD-$2QaDp z+X2?x>-fJwF~A23nhwnBc+ow@sKxSiN%xHE&Vj%w;b4kUpBdFclFC}_vFXN`FiD&y z3MZnzBe<9p-Y5(Q)&KP?!qgNOjYq*^%J2G6R7!~hH&M5E*L znC=eAc@tA`vmF$=C#H9fr*4o`)}$>bHDP-ure`8`Fz%YPm83#!HBuI1B+Cw^Xwe6 zi*k*1_YhWhf)`R)vP1`UnQB3(MjA`Fg;Ea@T9MwEFbT$Gsy!jDcd44H(@q4Y8uc$p zfWxMmZIk+B-~NCKZJw!=!O-Z&-N_(~;fKSRh2JKydHt7x zRV>B3PW20Ytj=9C%tD=vUuftv3H_QMNyUrWjH-GXnmMj`rS{Q-C+ z89Yv=Z`r0Kcx@rZ8Wa#6lt}4V?{A{~u`*Gvg!BX!wTZAmsRcNM9y8({&; zHn4Kk;9@JdF2Vi#K_WmoqM6;fAZkO-)jFgCrc@^-l#Q?Gi}cw~C}E?~*j4S7o!B!Z zUZ%TjQ<2!(k~0tw^ZW1=4n5&QDu^abBhKl@GNG~!+FM5cJ;3=G>ZAlw-3eqYz(8vE zEguSF8YI}6N(g|K+nJZtrX69oEux_wtz2gDK&x-7A*rxM1FrJ zVf)aDuweBv)t0ZDvB3bATcXW|iT7!r0hlvuHdL2gxC!Y5=3ol80eZp)kPL#i z;zwmhIL`%4b+#_^YfqPxfoH5_i6#m`a%7hf`+{=4kxm#0|HJO;s_sPlNHS8o!H_n< zQo}u6gHLd9-GcI0m}=*yo(@Bpc-@-!a+4>%CUFJ9uBHIgKB&a`V8f?V(_JE))AtM z3*2Ei_`(=mje(H4y{j?Yq;IgR<*)Sbe!Cin zGLv8VeVPld0=6koMg({t>mTGMAwr8T!T<;C-^;To9ZKlIJu7(Z|W|nVR zKfva)`7D-_s;#WqFb##Cp5 zlp}1aiALRV#lS3dPjVZ!51ppES86o&cBb6z zG8+z=*_$Mw&lDv#Ad+1}{K_^3xSkF1aP&QR#qjT^F5{Z^08C{-^hDoWNn=Mvq7ws- zzJFs^>0c0iZv;H}jK`{U{H7Um$k-&zAWd}__gP)Vvj8wsxK zv0N*Lzkm;g>+=8-<#j#qGn+0jq!%EE1T4-Wy*QiujwXgcKkTN3zT9U3OvxedLYEu+ z7t~|9uAsr^L23>d1dIM^s$EvF6XhzJ?5?hg-ki;S#@4X=y4XXB`*NSr{w*`xzsvf- zIi5cx$HQWNjjB6)xzc%=m<+=CO4%BSQ;T|3?3TY2)bxsOAT9UuBiMB1MHf6ICDYw^dJ+Cpf(6P z4B?picakb{o$ed7aweIw`vZQGs3Q(I3k~VUUey?`EVV6csbNbk!Bw^1VGEGPp{d4% z1Mag}$-gN7UBy~?*S>1ivAVO@!cB6fOyL#d(dMZh`%>V#dU7+XswBbFy)F&w8=DeJ zuKmzY^5*;hg3~!eklutCr`kd;w6sQKUvPY#9lSQFb5ha@QZp9J_R>ZvkoFQP0MPtL z1LtTf0kZt-_)Q0*i!D5U6XrDKf>{PI2OyNqBN&Vty9hyQquFbSYpNAvq=ix@<#d+0 zFH;r4Sf%gT(AY_#D_^H5g%`IN6_1ApymLyr4M;TEa|z&5B%3-QH@D~j8j(_bfEV|0 z7Mm85fi=Jw>7bU8$XF-9c?PDxB7V@h%`R?Be4Sfko`jnLPlJW$)^Ia|6mU*u+snT% z^OjL~zgE^}G}QV9K)D6jLQJV9N{Lhg=t;c+f9dxmD`3V~H6SegI)5|c5G4bizX=bn z;bI~Hn>u%hTt`5M54(==aN-BtxsLcDavjTH*AZr&I*8$l%^EQBQHIEMbb?*S25vM1 z4Dn?TQpy}6*D)P-9l6pBT!Ut|aLc6p`wBo^xdq@lT8G`sW4b#e=S@U8FROtF?&-)l z30xS}j6ejl+}ZPA-G4BG0phe!*6JGF4yuV@0w)~Ez$9oK&VB5ex&Q`1#v2;?H)bL_ z%4f|dv+ya~E#lr~FLHFrXo!8snC5aM!^rrqfZ`aUBxL6EYjX^y zrrVk*u3YA=GR5l@W@}UBd|RvC*$H^_bI&K0S*?nDdeC}dQNm**e|giq+r)L-nz!$Y zOtsm2kKgq6s`K}DR-Rn4WdGV2f3n7d;*fTk`YpU!YI*O9)eEqii}q{D9CBhE(Fjk~ z-*N5iz6Caoo@sN8EDZ4Cq#f|45O_twQSa+A9Z{*a?#BBL91rf37`Mxa;-`msWi_hq2>L z>7uPyvL)8PHK=ZujBX;wQ%EQ-|gnB8`><+$~KpysA)+qEXViCa`!dt9s1zGkGp*Z$P!kq3_N%RFdZI#;T3Lz;W3f^MGSgld(F z%b!YjJob8|Fq`n8Jy_GDTHSKTY~jnEv7d+)(Q9YFb~Q;+W-XpQm-j5rZqbL6XCKCi zJ)E2T{N!Sk*P$!YD<&5GyY!tmN`<-X6-VPIk;fFs?K4Tn~yZ9 z^&ev*v>5s+XXk6Yf9&O;oRWTg|#-KmGZZ=9;==PV*;4t01Qq)|?4@RQJ4GWTNu%eUdyD{Kph|p5Gd`v@IHwGdm{# zg3lr)O|guK${FM(*O!i(wc#F}=AhVu$#dKKZmmLH<}iA=gC|erwPs5rdAZZtGV|6% zPGycOKH0|GbCCT*i5KfqF5Nd4-_HM9D%;c``K}XBc)%fKfJtb9(__`wq;n0+b-jppgAb^iy{736JKN;V1Z?Qe!mIjaiL>=n!UyH-be9#IwjOMmYt~+|FoAr?BYN ztad|YDvHg=y=Mc=}z^VZoihH3a2 z!Ac-@G-jfiq(B7IY`Iso#QU`5Yy8FzCf9PRiP5r3JAyit6lUUZajr!{g)OnO8MAz1 zRAq-1y|STZnFcEuJ4T=<7MQ%;P)B|rw{UF2b>?h~HPhSgmyD1rI56D@N55ZnTvm^f zH*V26_l~@_s=awARq<=%wp_Tr_RYN7NzJEEN$zxeRYKzzaakrZH?Opfb%wd1!b-?$ z@+_;HT1W3(pc$jx@Sq<5Fe9R>_pn7SjDKWL#~zQ3$+F%qr|K`FKDlJF>1n$S zC)>5>Rt%RquD8ZgWP;ChH7~*1$rDDed^Re+Y<|4f$+f5X^o0(pX4PA%A^cbW2Z zsf^DQwNcp71Rjgy4)6XE%G=|!f42x-d0w5^^4ME4(`Pxo@w7#}i7PFS8D6n)lTeVA z;BD&cvgZl51xtjW_(3!PTqFzwpxEuPmmz7b_F2@_h9RS%x; zTI#x(O1Zv?wa|NR*uu+43!Z#zQ!aY(d>ivg`_|itR}bYs$6Z><+~`ns$?b-IR^OXm zLtUdc@5ZEp)3Y~7Uz@lE+SM6#}pDcJ22LlrO1$j1NbZf7aW`B%jp5SueR! zD18khO38{ro!MiuYlmpElO|R3Agy-hwC9&v^%!BrS9gyWbN0Jm7Om4f-eiwBbYfRlJkiRBx7E%tW1n23~w41vX-ZET;*u7(SAJ0DBV zuR47y62!{w&lT5cjHZWLmPg-~@uQz=NVrWAxHr*8#mO=@b)T2b>3u+`mcPc*N|N`# zfOfynLcS8oeRpC)K=SeDO>-P8yp^-Wrq~`yOU=~WDCxth4f|X>>&f-tCo|XmAA9cs z)%3D{fvTv8N)x0*R1`!71O)_ys37Q}iJN%9r;wvai(B;-Z#`fZGuV3_gilb7}! zvn%)4k`PTlrl`5kW8V?RD|c_o(^qvF%y58JHT`pceOsk6Unl&G_`e5N%ay%_;2@YIOFNNU1#T?z5dS*Xs2 zM#J{;huNGaA|^B@0w%6iqE!x6JFEL|aHt2Sp3~&L$?)>7R9jABcBN=nww1co_et3F3Olh#RaIetuO%iJ9wDyf$@3mb`!2BDUnq0`r@ z_EcT2n)fyLo$%f3E3@M$P1=q$8mk>vG^iaY8qQ;mO)BrtLllJ>;A0 zJ3!O0qk-n=?q#@j;|}#J`=2w4-PM)nMrx~d8^@w1QV=?x>WAm)z;KZ_l{o(z6Q|z77i@M1q*%d>`dArfE7!*dNLMs4uQge11`5q{ zgNKV-YE_Nc*~Xp)&%Kb?_GDhc>C1gTO$8OM7d!rF=dR8TfV$_D&TpOFD0ckfCUw5; zbQZVAd>9&bTc0}svE+J|JZkcsHD&mMp!hw7f@RtibAG)6?AiXMMgh? zd1x^ubXq9q^N(b2VbUElS9g@`ap672cWnQ$L$j*d3fijLXS;o}A7lq*$7TCxM`hp3 zUeDdS`nzVR9q<6^u(gtuC_X<%rJb%;Aful8yznj$_a&79N@`JhAjVYs(2$~c=0Ygt zmd7L{C+kydW$km?zjY^Mhh)cR-^r#nIb^ceM9hTNM9_rWM8?F&JhSK`-`y9)O4IV9 zXp1{z)q551)->kr=XYB8y^RSn z`2_aAdDT%FdFwQvNl#TA+;<@x22HuOko{!+JiKdJS_y;{rP3>&(o5KRtFaH*8YRX;v0%5Cr8E( z&Ja^v#^CPdjU+6>cpF|%TRykiMAu{^nl@)UxZ_riIkyWfhCcJ4NN~v1i>%5Ae;4vS z!1a)a0G=c-jcIPOm>1N)B%AwqsTpVGX@Z8k4)pdK8j)W=x^QfgFI111*OtD_Ge2a5 zS@YCiE%H85sT^jm-K{a2>8Mj=VSl+rP+v9f1+>eRX-rXxAvu2=S;Qw}rk`8Mf z6YkD4G>aZlROAcJ_jnbbK3h${f{{E$d1{H5j}}60r}S3kLMs~j(@pWQuLrKwtpGd} zV9pMRHyzJj?@KHp^cqEUBbKbjQwR$*rklUF40ls+%9+1@Y~KT_nhWtr5%RIpWcx|1 zJ`5_OE6ejeGv!>nTEZAX)`m*4MYLU5g%n#wa4Hfj z4!PHr4|TI>zU==8E)#>|p`)MC!%s&^lJCt*ZXGZ$hz_E zo6>>1s0%|yr<$Z7CQn+9O6m(1DLZ<@P!>(s5CjXZigS9OE*t#w)u3aiM$k|-C<*x{A1QPsX|UXim`-pB%> z`Hx@hKH5M9aTL3>i+8#C$-(r4=?BvJ()XtyO6T3U$1$=OWz_iw>EVf})l~XapR`T(GD_Ee~m{dn>`*$%B9@9WxAB)TApq4;GA@ZTCOE_)P+!@OS)-} zhljCCvL_&P856+b{WIn0eA?HB8cXK3)tLOi6Tkt2VsA%@$7IWh>Rb%!kbLyt+&8Z4 z;MXWU6g^)Szw>s{h~^$%s`e_Vsq%q|ftL)+(}GKI+2aMxYZ>!L9rXrM018!mr~5Na zv1_@KN=vbllYh%4`tOd{h#ss!$B-X$l?ZkwPaMsJK_)G0;I1kWPLf)RzN_pGha&=vX# z)xP_pe5t?n4EgHYUV9x9MR-SVIH~>OczsF#w|T)$f3QhDHYC6}P9SSkKWdxGHsg*h zb&uG3qQ^ErD2Nb5mbq#Z;6r2+N*)ePMm5{))$3d?dh705ooqnlV8Bz~0@1+^P_mG8 zuyN{=j{n1nyE}cn)cTHh28st}ewBkKUrVU-CDKho7nGJMN6kYQXk%{nrX7Hz3wkJ- zm6ucRnG))zG;}PdSXd_X*+fkg=CqAdZ#&L5kVsXSC?1yDS70gy6rTr+d$^otH$V#zo#$JS zR9Dxrv0X)B4cRZ1V=j}znNW=Dpw8*18?%%IkbV06wm}i*-LA{j%Mb zER2q|M%hfl$vz2??VGo62-GwMIQOvj^kusfGm4v=uTHt^^>bJ^Hr1umK?fq!d>f2{}0amX(grnP|rJ!>L-o%vIgjQ3YpuTDRF@(M46pn zuuyva1?K7kpOj8)0Z3zTXR^c~=Kxkaxg^{B;=p)>(EzQ)TeyBrW69tan9{~lP zZOiE@lN@?Fcb@-l6@4Y97i>8RS!CIeR8FT z{TPlpigMLW=yo!_Xv>E+*xL-Bn5LEf;IL6)(u`ozQH|K^cS?pf&R*KNZy2(vmpop^ zq|^UBl`!I-AxEALhn4EKRxD2SaX7N%2&Y&VU|m@cxWQAUxzJ;|k8$tzPPFJu^()G{|zk=y6es?7<0R zvtFbJi&V4Jlta7d%lCsbPx)K@%hldT{W3!_qh zx3NB|L}#&!!s>jPbns|sGIBz5)1)29<#lC!MTZBYEJ|Mss{dPwF7VEt8&n3NjDvo8 zp0w{$vRv)HR9IDD?o6Nkq+{QRcjE_FD2$S;@rZ;{?weviQ0d$~Fo|-Rv&Z`OY-(^=a5NY@=!;H8$T8i+82Rl1BZrO&mH#Cpp;JbOJ|438Tb(VKk*m}DISBhSjgJ~rRo|AKh=Ys zGdDA~CA#F@S8ZD4PiyxN=;`08dh^6)jznbr7O(jst3?AjkU#ri{?ZZ72;82kwlka_ zUFeUY-{Hw{bpz>{{f@xST5) z&s^EJFIV!S*u|3dEq=!EaR;VP#Bt)|!*LY%^ZU|$grZ3LD{ndWKY3{_e%thvsku6;woXr$rd%uul6yBfqD=QuRB2O2nCq$a+&oFrNAhwsm(pId z?MJ$9B&L5~=tt!I-9Gy6eu`eCFgXP}ICRW&Pn4ii;@Sg5gF|wQ*C}Pp=!>m}sN*Po z-gYO)pUy`a&<#qZNPN8qu&Y|-Pi93fw(g7DlL}S7+ zR012v^`;>0l+2=dYyHM?rR1J9^@m9RjS=|atUhR5QhsBuV4+xa2;(TAFu8Egs0>wiIp$a|GGURQmvbl#)4RX4txh4{@`>4|7$0L|muYpS zOuD$_!QV2{vsUQebL3D;50n}qrL6u8RzhJCZr4o^r|r(beAJDpKCkHPey-(v~NyXB=>f5YP53WaWb|Cp8EYKvRkx zsEacjE(C_lD74Ia%`~6nt|*Z%?oqOSK+yCR#8O@6&?PL;48Y=FVgCVco}98PZzoF0r1qe5B*n>gOcMYw)_q z$bI>lk(;h@7~nJ4fPFk{dx$56vnf&q%B%A|+0PdECU}7L-u7JcOKX=ElQhbXbD)bT zy4v)~NKYz`w$(MU1upJf#d#WI&gp#5wuHeYxg!Hj!y&=zXbs@~&DxywURBue@*v+m zs@$;7wH@r@ak)TY&h6Q>Xzz!g*I@wL*>=-kouZ@KlbEFJfA;uk?xCErSw(OE6x?`3 zwWcr~6;|D?a}uDe3T94xu|(8wwz~r!#4B?iir$f}^8VUyQdi5j%X*ia2U3crfoDCq zs9J}?zdbQ8o z4aA@rbZFtOsJvuS)xHJmQ{TF*z=$1t%}1wfsJi>WzH(z}&T=>;duV?GQe zkr_4=qMYeFy*&nBImS2kBqu5F<_@_Gj8b@}vANLb3B8acTdZiF?8N8|v$Tig^C%4= z)qE-Pbj#lO8x%=eOkjV#)-KMYZ3RqUuGbp&K~8PYHVZj?HnI&jH0;fGEOx!1yCO_l z!6|>oMV^Y7r921s9o0Bb7!B$?pZMRhqI@b zKX#6p@q4+F0(J_2U2nsBwC@?a5wPikUJXVfA{lRI6BJWIhnOU9YNAXBb^w*a%ZkehbytH?{ z4taO}u4rf1+|3m5CdXqsY~v+duCJrywZ0?|#qnFS4>LtmQ*|$e_BH6+HebbLU2?@$ z`aUzn?(IfWGlevkja^fE&JIbD(5BXHH8~m~0;~?t(ds?(R86gLMDgx=9OYf**^{`` zy{ElXJLGIbk}Dvflb|*`d)J=7Ub$ zpz>$-_HoXX9`ZiH+S#LcyC?J#CRpoP%uFdVF0y}*Clna5d~5U7s83&i_}al<;oJYL zqlofT;LWSS%KJ`UtdpXix%W?c_%x_Rj24mHAzk@0s!eI?*`!v<@z-w%MbaKVN|)Q7 z6K?qw1%@;Y+~+pbfy5R)HnaY%SdHP+Jbq_Mx?45s9!!5#!w8Gm%4|NmWW43b!gYgb z`>5Lry`}57QI(0{wFAIamf*7_!Ke#}eJE=^tV2HEvjZniZuRb}xbB9Z2qQ z(ek$B-d5K#UeNK@%KCTro?HNoJ8n=(ureUSc*I0b8nTu_e-0;EfRbXPLRh6jZb`?_ z?mA?1@Q-Tltk(EJsn5{_)YlaE#t&Bp&6l0K zS-8fXN4_GhMLxt2!rsuVnj)&uS!3P1lQt_tF^W zR(+dzs>jU>PR3GdOlg?Mw-n%X_Q6h19rC26Vgoc%(~Iw(ZZRi5GXPkkKgjXtYJg3O zUzWOOyGEqC&FX|TzY&_12c_kENW&t+dP9OubSYb=jX@*V%{&Y{71Jp)N?I7Y`$AI# zuKS_mBU-29wdSmC^J4F=gWhm{kb}Q_tl35ZDB}wf-v~{qnDIO7rEbT{fj0eHM>f$J zrWq~!gnRpR2*2OZ<0D}%+2!@S^1SJ4iQtcehks}BYzLaZ5rA}j-jt$eW#yS$1t%FO z!J!OFp!f)txC3_UQh)6pW#~s6Lt~K?`L}(hJs|I^dLgBVp-(Nx@~!@^Jh)8x62qyO zwYew@Fhzf7%kG(?m>`w7lMg8(f!n%`bHW%@^+vLFyA+#G<}S-sj+qnsuT4NA&xHRd zF`FRhx+)n?ed~Z6zlgrXM@Pr!QIZ@usJV%Ix0Zvr%KNMr=%vGo8VRd(S`B$VBfs4% zphU$CMOk{YGKM{K{443Y5%YS!@5Ef*Z9V3^r2}m{?2g=~^FJ!d8L(#Cs`!dxq?h}s z=unov(pO^d8LjG$gx9(RZhwcZ5#&crZ#DT_ z=J1)FjDzVBYNN$~Ost!4Kqen!qGdHPw6M7mhQ}cJCH|i1cl96al#7j#W<$L`ies7d zXxU?IS4K}^s~(-5Y7RU`=ceon*`G`50`@!7iBY+LX^b>_{3@-or*J#(KfK4T%%;p< zdLl+7=7jcftZ}wk_O)z_Y?EyBY}4%Pw_+Zf+E=Z3Za4C;j!`o_UerBdz3W!N*r^qmo>$0~#vIN2j~nN75m)!L zgYT#VtB3ld(w)vZ4Lu4~7hp06LwmP2uLj8y6($`*W>imT3UvjH*6TMz_Y3g{?z7U< z=b0{Q-l}71FPYCPq4_HQ~fB{k>@qY8B zoRw|3=kKrJf}w}f*<%|-eq)Z-ORY^Qe_@tfGohVa$o2T2w*E6M6BP>4yk6}0io7i0 zg&t2zb_3DoDIG}XBH5}7lm{c22~8Cx$yz8*I_Tk)q9e@0UkVCMU75-Cv|SHnALD-( z%IA9<+WPG=7S{xIwn<7zqH~nnQdOqB@JPqlR}*Ywfer2}*k_3%jM2*$^+A45!_sZ+ z-5*W4VJ>dDaFz0a4@cKG2Y=5*K`5H> z;x&h;;|f+~+YCbNj`XK4`LRA_XeP$*g5=0~k(`<{?5oT;0>sT&sQFg5^UZJPo7~Pf zxSg+a5^}}aNZek2-qD5QNS?5Wf z%PHE`VOD;!Lci>-%3YXLWu6qdvHSwy+ClMvQWY+u*;@sn6Y)m7L3!cI6AIG-ie`NL zQZI6&Iu!@S_uy{1dG7?MDo`C~r>!tMnccDi4?{&WZZS9a-4wxij(in&a3A~rOIHDhk0N5-Sj<1dqK;N&uTfv6cqX3B<>xO zF)3^?5w&c4PPPH3=zAU)&&|H?KK^y2TJNC+*8S$@kE`+NVK)z%*I-*&MP!e!H^~oe z4kl};s!V5IGhXrP>!t=*zIRF4_R)0*<0r2fo58#Ru_|2;gI$7Tlqzm20;&&&%97XLw>5e{Grmok8y>fgiC4R;lL<+@=alK%= z={5m;vlubcy(0(EU3Tt_OD<+DtHl6isxzvy`kZnl(PGp>pGpfrx4o&_)pw!iOG6^T zoU}s(;>Ajr+s3{BD)yS_xgGIMzbV$o*b^6EWJMuwEi%vRg%%_8iSh?&^FySCRS01Y zkp)@HBFER$JFcr%}-bA~FjbsdssHV$Y2WUV zxLw?XAE_52R;%A|nz*|*G6kb9**2{)6?=ilLo*_)5huS|?q_OveV`DDcCIPy z=W4j7?-@kq9R=x=bKUfyq*>buFR7z87-sXI=z~y*DZ-c4|EDK7M5+?GnUIsr8;pC z=E8b08K*Ff+ys029S4=Y=;nf2yaWHL!Iamy9%CsWI8~tl<7I}GTx#k!1;1>ZYI&uE z*Uu1r`Zh%s&n0vtv{|OaO-R}{-NnKZR1wtJ20t-)jCS^%lPIr`s)d=cC@)n6JA2Hj zy?@s*uOl@WgEVN-@jI=Zj#TxWbW-5)5pbG8gl28oEt~+ej1oEK|DsOQ2N=|j}AYP1h3Q&DBIp!WADo|pect5+>zb<2Fo=v0RN)5U7 zE*22;_l^8IlFS%HrbQFzt2yudU64A zS-aovre*}>DLo9*F|9HjGy8h?y-V<0zM=uV%uKw@th~&eyvzVzW?o)qeqQFIyv)M9 z%qMu6C3u;od6|K{%yPWUioCPz%!-`JQ#XvCJYg(vJkP_e9ct1hstBD{lH?HWcxD08 zT;gb6)zL{Pk*pRKbFAJBbTolX@{NpGqyXxerRDDO+ivHx;KSH-Svj|>5@^k91}k0- zRJ`i1c-1%S==FdTeCcXGopK|caw(m1I-PPnopJ~rB@L9VNoF@k6%LC_wB}N-*2x_; zlR}zGvm&Ot7LH8dHSqws+i<4taq%RHhBr2+OC_&W$&xd69+ly4D7En;30LY0@|bm8 z^DSScMe~H43_wmEGYbOZ5AuO;IzuPZFFpWhN=asaq-wkclX_(#f4!mb|Pvpaa zOw5Ra1P&>m0=Bu9wmiT0T8U+tFmb!tvsM#+NSS%YHG-2?YR*Vd}S>s zqoW5ff4sTn(9F{o)XFXbN+Lz?kK_ zIrr^Y&V?jGTrUB_`>IGqBrKzeue)BikB=QtvvX?Xlm~HO%>j+=s?J%=#Y0fCjI&&D zSQJYNzyr=Dy4$e{fq68oDF4U>_fvwkB ziNUQIGU--rFxN6wBauau-_|!I*)s)_E)A*~CbT9$1?=i_^Z_IxOOpY)epaoKsW`Tx4)+~8=FDTy4YtqSo%tv(^RH(sbwf0*7t5(yg`l7@N!N{ zsQ*((>o&`aDTflGoOHkLpr>4lZ*%5?U(Ib%)$0sZhlKDWt$b$U(5BKh(eq4^oh>)x zUG=D{sUj)6z{+7)mpL?yxs@RcsXX>>cFtMjT<}T3x9yx>MB(y#sGPt_Oq-IDuwYpp zx~)yR95E8*Ys#deMES`2iQMS4%pL5FndY@kvQ)|wc^kHL(8K1m0TakNB0)Yk3x{(b zKt_$9&Y157rT1kGkWbsab5e59b1Qa{cBSN?o@#X;`$Ab5a4>)3Bw4*%M`myY99D%g zhed&OS1fx{%we4mp;3;y&6biW6Y(E95L^DK+IWDyqpDtWs3at$WLYBGRUOD(DKxVd zu48A!jZ$rHX}N-XpKn{@FmzAG=1>CcB^q;UQDQ7GV5mrv3qR0W4(O$q!`t5g(#}mi zCW_`6O;OUEbR0bgsV7FP^(}gQ4Q|1*gTv*L9>HNrHi0~&yE2i02)oX~_T;0hDZI>0 z@OwI%a&uk%} z$u8)WGk+GLYFvx_(zyr>F3Yt7pPbh&unC}mia~BdG-{+}X$`u(?F5Po>a5#osRL^k zX{?nICzl$MEZ2Z53;;gbHHpcg7>Fq;^p6g3bP|@IiK@*+g)NOk<_;MwLuS1a2+MMg zc8OgH1Q=qi&zXqG6C&3YV_r7Z(GRYzTJ*Eb12*NO%DFrJKyD{s2uWb&vDs3?ZcCFC zzl2V|1Qu)EY|Bd7d@9%OT4PQho89>$e{>Z4joVqQO|t=GG%LMZinrstvwKZoh&zK9 z?eJFy$cQsu%Qb67=U>aR*dior{oaBNu{boQcDVplA_8QwC3lwAkZ0}h)fLa#E96_} z+DF^y=3Dl_&7o0qWArZ&*CBk>rpsXb0%9PJbJ@1BL}a11^iv05zpSb^80zX#y;?k& zKJeITFw7<`!qu)dV6H%dECtynK3`W1%B!j>9Ac3L-!6XR5ez=oUzFR|nH*1PEH=7% zmT%$bq3fLhvVMD4;c4;Smb%3Gx1n#v75dn0O!Gc$XJONn) z6K*W)4@wk(;1TjJqU0xjDc(-`c3FjLbuIL-QJ3dywd7b#3qz44`awyJs*&kN{Da35 z@If|D)A`VWEXsFdW>x!R98BMY3P`{|bqIH%4!xIcmDfy93m9>p?TQ5SU4_0+S$1TU zMlKi6sS=QYDQaft&A?6@)?2Lpg#26h?mP#`J^lJH3KGQ+cjr0p&Re3l(nK|%cpzVaLgy+X*= z?nD&tnf1ow&*G}v|0&d#2Cpp*>Mi%f&0|(CHRlm5_s&FmGr=&!jTFH zE5+%!Aye|qc$dkW<>FkU#53qgZP#L7804S;qQDP-sDEnzAj>>BtbmC1OEVoIwJ3E? zL`NCvf-TpQfA4^7Q}8yXcS0G(ExOsRnFfW5h`X?h*JAH-n)Y6^4p}noUyx4}S}+7l zjh1#%{x&>Am@|Lv6h8}iZAN<)>HU-*qJ@wm_My}Is@liLk%S$^Sw<|jA$E57@SM4l zzDoK$#MfvPurfaZ>~fK?$J=2UhSZKiV50yHf@2T>j}~JD}G&qiELR-P^*xzfvjed z+tRqAM9n`(w0%mxt_a3^NVcBCp+%JaZn(kf7 zmVM}imE{w4t#{{$ysBm3l>5~2dPOT@vtQgFE0V~N6&h!CH!LBO=~{Unw>aVr&Iw#< zQNUb>k|9|W=eh%6UNpycA=rBhB$HHY2UEmG(IaZ=fp z4wo+{+L%$XpP`-Qn(18%^epv0DDua;GhH_r0A#+J;=k@f;VgLC8Yn->-Bqu^F2`#n z4wmVq(``T+i|x5qB-n3v_+CNTz@^sFjk997{4~vUU`6GMUcaPbUW#L>6nO?!=xE(< zX`fO3%dnS%^M%XEri>%ddbV!U6Yk7x;VhD9^#jRNeaaQkP ztIn#dxMdBgb%V`cAq6~>E6qkXPv_ssy<4zxne#NQ;rphX zC3rHF#g>A%Z{dfaofG(?1k%8bKikxDHxA(;tK|ufQByf9gnuF|rsraSN@hw*OPL1% zwX#IL3m-6MGeTOeTnmq-!2P`I(Yn6D`KveH@(iv_sZC8Worjt}Q3)0o?9IE;o+MKm zjZ`|o!?|jzWrNTYsU2W*HSG_zm-xK{9IZ{rFXS{D5AE+VY!aKV<7*2nF?}%QJY|({ z`k>FS9ggi-yY4s&E*&N@MXK3h`A|98Y9wOH9Xo3B^`VvJZrROauyI0vlk8^eEDX(~ z&zrM-N-}Z92(#1&mQyY{+HR{{A~IK-$N8b7*q_%P#T&kgFglS+pii{+L? z60Ej@NN>lbJtO3^=|0ShXOx)BOCE?>sVlTH0%p6Z;8S?J@1G_| zF7#>D6}P`61`gGEd6w1Tm-=#4LTsa_vZh$Mz|?b2qsTe|nI+c($I}%g@D1SZxw^;1 zlXMm))*}Uv_N(Y})S1=GtzeLOvo#o+iG3^dDk?BzDa`c@H5q99_w=9gr_89cJ2v@No95#H_ZA#jc5>Y(`w#MavSx z@k@0j5Y16ll$7f43H33v0C;!l&#&zd_xBvHZJuRtzDRG_lDwx4gTa#~Sq=VMQ!@<$ zlgs(d(m5Nv{IoXod`(wyXLjX7hw z(OJ9;J=44AMk&>r6Z+zCZ+#Kp{S27uu*KysKlbVKf6@6gRP5HwvIwg!J$H~>ZD$Vt z#h>_-x55f(o(g)`O5dj}h?cS-Vub4OJ>~yyL9{`X1+`6YwSDkkE(lP_ci+Zeb-4EY zf487mqL_CGN!lAq^Z9oCNkqQbveuXiUfV5}N{^Q4%own16B&=y6wwpacs+OgOeYVY zfsyJ`ngCd)#tx31V@5znS2YMGK|s}|6amud8Y4Is#XO|4R3K0e8(q*Km~tKli-ZfWnawXKxwQGO)iUHgwa!;BK%d52ovs6}b? zt7ojX#Jam~Ntym{9(7M4Uw7A5(dGHAs&9XEHI$_*_HS*AIy1&yfAE${b{37<C}0(ABxS!hk5LoF6eCub=?3{Op=~2G>`CB;_&hU9#-2tiWJF%cT%q;T*JN0qtZm(4K+0dLE^j6-|wG|(C z#$qs`Lcrs{%W;|&G4IAwX>SemKhB#^f&3$Zb`Yi}WWv=H<5%QuZTgtlN42v2u^47V z>}Y`o!8T|}Z7D#2bgBjh$1XENVn?$yyd-Ld;8<`FLTxEbfFxN%uR%CfgMedKmAse_ z`)#FLn&VluOC>p~WD6Tm0lDp2rkRNiS_OXe$C#$y{MbrA?jns>2>;ItKV(4gZB+o{A&;1?k$MIQvUbIyY2G0&U~5h{b0<^yGCkDPyw)X%>o=tWQN3yhG`Hi zgMeyF(E=o?8dnX_APScLLiO+5ivI^t zT^|9NiL0Q%I$v8s{#@Yhr8F%$f=AGh@=~7wSfYlK*450A_)#?tf_o4`d8tdF96D;J z;RUQ2O2O7KljBDN1iwMbMDyQi%WV(H}$v|h5K$65t&(Zag`tMc$)nf^i7elC)} zysdsr$58m_FXiypocI&Q?cQQ!Fvzs#^vd!8$ZCL!5Jn~f$qNuXgp5K!);#VSsVt!c z!0Yw|c7PcH8>QDE*arbsmZk(qqBTY-Slb|k$`Xa;eCsqHzO<8uYqU>ho(ZY-Ilh1A z=KRdt_!4M7$f=LgS;U)CCj3c45NS8^OTm5TRQ;jg{#TXA*<}azppHi5=8HRHHz7oM7N21(07l(h2 z8?uRQ-QQ2pzz=l@;eay@!gUY6TF?!r)SKELRzEJOOAz|C7avvF-=i|vfpy;a{L zyg+(|6kkWgo99Q$8Xv2O%EP9ozl^>M?Vlp|_bVlT)FVkOhX04Ha5C`v>WiC7#THsC zSL9FMzU)9>6S(Oj0~j%sm2%`kW2$)6(%$qF1t-#ncOE;E zom!E!CHR{T!0qU9m%Z9v+Z~Q9>Sh}qJq|6PGI+aJThmzG`}{VRf8L=l-OE<8^O!7^ z()8EYZ?Fznrg?eyjh`}}%n0NfnQkL1SosE-oXSAGtWGNrkJxpb{ ztu}K@aLXCGZKU>wA^AZWkzh2;1<&VD5jH42T*prs_k|@c<}!i7Rl=&+2^xgdNEbh0 z(sw9vv4jZ>sRF2C$7mo@BQ5-d3139wVgVD0#9A(xEpT}8HlTm0`~taM>?#7yiJcD= z%sz?>SRk$i6xbc0)-(oa{XqDz6?&9!+)#FBXq5Sj(BWwRblbiT+J~)O^e)(9s^wjC zeP0U1FKZkA<(6D`>DIjlKem(W;rqCz(G&MIyu0oYb-jB^xu=6NzneneU(3gQ^BT^m z=)PjS#9sfb!m1LSQDHqu=XCx@!t*f|Wf!j+&mPIf?jF}1erb%jYAkL?U7U3EPty7? z*7ScQ{tg=(X z4$vTgBlP@)C0}5|;uI6fp~^@N+eZT-?;2w1W@dJ)pr3a$dP;T)?GPqzFZaB*Yc_~9 z;t3&*%t7ln@9nPp=SXpW+sD03ttdFP&2ZO>)i#S|mq$m7w*-T!{$k_4_tqcjg)|!Z zm0#aS`Ja!ds$Xu~kD~l%IJM;`!IYdgnebjB+*Pgd05N5tJdkVg$toRoi3TV+lEP1z z^@YI}gPFkYRavT73=KkZq=26=?>hur3}7O;Rl!uT%QO(lkt}|~oG*gxXSd6G=g!l^ z)UKt%ZDg-s8UKCi@aa7MUqIA%ULtUmErlhA_FWzB<+h>0K9@Ko9b50BkXW z3G7kTqKaLkL7W&T*@>d$gWeo5F*lH%*m&j;3j-w~Aa zUO*63#s`>kFOV(QeMG`EkqYcprKXBS(g3ALruYe?zD9|QX-r^Hm7OYfjs_t;vdT{w z@dYL>rZADbs*F^zC>n_L$O2@fZwvI!7J3S~S)h=cE^T6)-EawiensXqpqxAf7^Dc~ zOWq*;A4vJ%?bL4&ep=#3J-9zMleD+|hb-P2fLdw=Dftf{`}@)pc>3`ceDt4P(%-Ye zgLnR-H(#H*Z{zgG#{EQVe(Y;&9{5wN`LS@nCer`o&{5GHr zQt_XPSUqEnOT(Lig=3&_lG?u;=2@@{WQ&e9J2IKP3MAvn_#W~anP5a-C8M9L(ua|a zqIn^WgJf(MxvC-X&^95Y-9?a6uioXs2lG*y1y73()d(VOF4`#R>Rs-A&>W?i|1{^2 zpCHoeqJdJc?&Z!0nNgZA(W`A8??^p}!J$QxBaN z6u5a&UFn~`R2&o}FcYex-c?0#P=_?O75rzzY|NjTbS=okRO8)CHiZ5=z=`FIA70I; z$4E{~rTi=J-OSE{6~e5TI%}_^Kk`tYhS`V)^2iZ*s)YD?gW&n~a8dn~aGk@ihpYI% z57%lE30XQqUg+|1r6)#1-1Ic3t5@X!4`qcwmvMP$9prKwYqGGC(Zg~fkOnRvZGgnL z(I*3xfDge!#LKvsXg%a=+mKSwo8Ua2(w71=97;ySP+SU-rBm;pXTg^Nqoj|Py2$ym z9Dx~Kc_X2jFm}w<|1`fYziYdqsjO~i9aOy18Xerr*x~o1Df($~l%(h;g4EQzR@NNU zrIU)Ye>~kkj^(s>ZwX>SV5V2rNa&`bChLE6bT-DK6 zB)P~toBRN-d^r~72)aOqD5<_;*V8y8<22ML2Pg;NQqlIvh_;mEmfv8}<%dB!xaVkR zB($v{dEvLAXz*d8HtreP5gFZ(1uEBn zcP~}w*bm|6=g((wzGi;G^JgYF5AJ6rxZKZ5aL?(VmEiQCpOoNpkAGHz%bOk!+_l^sro*cnOz-)<90R2`3vV zAs&K-iDgeyOD{mz^q@(ZGU$$>RLI~@fy-an^jDkBnC0L}aAm}Qt6n!4q(597~r8E>-E(p@Xm80d5b!}?NFeOAJSde%X zSB74Fko5k5&7_^pI#_B!o{-Fc%H{hDoBoRWf4F@Ah1o=5a(@a~oo5wse`V9&ahfAEm~L{^xk8zdtC5=Om(O3^d+5qvbxxialwMF#&kZnS zow(b(>+k=-_XcfaemPsZs{YOgL9DeP4FS2KYw!RlkBvtu@-;jKnrP!uj;x{l7o~>uMJ($G#CLRxiNZy;m7yc%gf3i}IcQ2L)nZ-P(oz?H9mhJn?{rHn1_8wAEZ)o<^ zcsKjF>-?{v{GQQ2FDM`u%<522BZP$PZ)BD6%AS4;uY)F9dlVyk;8RdTYmXvi2fPb9 zXzfvg9DuJvWvy|A$aZ)OwA>n3jO>FiK*83}Q=RJ(BuBROe8Gp}N`7U`NA%gihhN9& zOC?ZgZ~rc4bly;K0)qSN8UcWcR((6&$G`DKTCQV^x(*E zKh%j!ib`08r}oHY1v|*kZTnA#cz)P2NY`Z$nq)y=CiI5!CF_r`Vq?hyH+$Ueg5qS* z#fKH&8Q%ZF2l@Ea@Kp1uG670hP?Y~B?^jShVDBnB=49klf*Koa5fP+41C9&#Bj3@x|CVcA8EwTyB~iFMf_j80w|{r_Ev!R0+mB3$`QuzW+C(Kj^C zuciIqh4k}~>VNG{Ye^yzelBZ({gOAobG&bo_fLi0U&z5<@cnx@KNH>?L4lno4lP(u z0?AIclfgW)+UOhYV=8LmG6QJq_GJ}e@v?sO&32TEop{**+O{390uTrFqb=K~RE)$y z18AG}RTZH4m3LBR(6uZDiuo}JenM*b#WO$B>|f;jJHqGZ1!W;O6+&vZAT6s+S(HzY z_?!-5py-Q_C95jSB z)i|Fammf>Mx$Y{>NzD8L-cJDW3wXa{`To41P=FWpb15(RmrL+F-2AdmzGF50yrAHZ z%?u%OW66Z}qF7-Mtnu3?Dq#{bJ!q%)T$L7yvTn3Pdzwm?L|G5orM*ODK?2l`wr@{S zfk}XR(9Z1zDnk;)ZcTO6eVa)H$48I1;Frhy%j5k_vwpgUK6HMf$E&CgA021%UH9U zCoPIZ)|ikbvM<@!WG9q;i6O+;m$93f-$nIk^H|2`=leYOpGA8l1QC}X(XQE`4{#f3 z=D7_W{-SVdsCg_B8KeRCfttr4+k-B_m7(Tuki9`B@FwVFG_o~F1}+Glj74?_LE#zD z$(RuT>irGxVJBw5s8OmBVi1n{CTI|&`wh5>JD~tc-g(gQvJG$DO-z_9Kt4%Cyau7+ z?>I7uEqq(W^FSHg2}RJ}e1H!=Q3mmbPx#xym{$%Be}~sFzPtEDZM1k|4<{Xr6>oN- zdu-;Dk7fy!c}W^5dX%6lqUiji>oQ6IOf&mAtq-Q`|CF)^xobaa(^nirVBDo-x@MNS z696!Gmg-m_JA&qzJB?qNJNTe$@y#eLa~B2psCGk_zDM%E$(@$FNRhTjecuKa^8$BP zaqYm+0FYq|i}l1#&gRolsvnmO!J$8W&8Jb#<_dhyr z3lMg`9|FUGZ{qy!M|~|}0RZGF8O~vqS-!6$HPg~-gnYm9eNDb*g0XkNOfZ-U{)VCd zTC0G&^!U`_t`-DFl^vToTjI8iJTMThVW&H=F<9!aARINO1auofx8Z-}He_P|b{n#n z>o#CIGHt)+f;0KRQVX!u;#)Q5ckk!>3*5OuK&b^}Uc9Ea@?66t4VWogVW#ZI+P;5d ziVHW@g8&FO$N*5yXMqe+V)7-^eJjdl*be{*m-^N4f;DcdU}L~++i$XMfZ;8J0EO}B z*}{19q|PN*XIksd6vlH7BOGSxdC_Ok6`;opdc6N5k9RX}od)w}5TN*)4Z~e79z<<^ zOqR{H)45Waja$1bUs1k`=DX8igeH3$B}IXHl6O5>EVa%MBWec_rdn}t~*k& z>jFtv4EERqJ&Si>|DQQO7k3y0PAK{_CCJ#nOOP|kmRXN6j}{CAQ^BBp{+^Wi^#$%W zEvwxl&CtvkPwbdX{>=pnM){t-+3+2sUI_ zK@DW#pnM(%8eY)w{;v!#*zW8bOKeq&yw^@S3rY`cb7ox^2{1r-{&uYh= zP=2c7Bm=8B=aON#gE_$#kw11C!rd0|Qx#`4SjD*}dD;Iq2m)thbsRelV7s&L=qYHu zSDWq&wmbXgpngvz*g1pELe{=e0On4XulAQr%7>hk$=WM2elM26vDZlR* z@=rVB_pR~k3oz>YQ`Dy+iyg*ouRg3k*mq}b^xc_n-T#dq3=pv4x^qc8$lL*$JO3l* z4g_<99Xm2xCe+#DpAYxZHcvs;1$Drcwat@}RY5iICT;UnWMj}6Tu^&530VT0cJO0{C$YKt@lJ#CH{xXs>CaIH;XoFbJ_doap|ACUPS(B-{?*jxqmZtc z<)MPQjr#@Q5K6l;io-pmww&Y7F4!>(kKHx6$LTmvFM z=A!kNhp0_?Uwf6WHW~xy{JtKG1d7=|H-!WFL z**x0!R+p$}^lcwe5BjbZceLZ?QRG`enpzM1R7kWfzQs`67Hs`s<|pf^j(#X2L&X}6 z87YIU!^6X3@n-&c0+*F(J+u1(R>IXbL#I`%%=Bi$U#DLl)d`Srnuvu|-N>g!Q! zrX#f5i|488r?y>{GPUN$%bS2ATf#``YzK!MY>mXCLN1#I?SQ8YJdrh9f!OVW|(D*ez69puNm_NRlw z8xbt-)axSCqK*mh>V=(72%q`;tiU7wmFQ+>l8M*^ROed}I+bd7>U~LKZN>HF0r=#P zE$c4No{fcS?riGUXU~?Q%_P8k?peU2(y3Ve8W@wniJ{peiU;TZ+Mk~N#LVd(zMej2 z?)00!o+o<2|LT?b-ZFP$xd(h#*R8-KYwlVofFGSX<;;Icc@$dHSOVrw&ZaPPku8RL zk}@}tnohHC&wTIW%=ZW^lb_7plO#=Hc?GS?nK9>0k}~%!DULZkdlf8{QR&(`JSbLi z&oYEDzra0c^Tc_%ATclMw&Lpbb>%2pmD@#e5bCxH`ax-ki? zn}{`LA&5n77!Q5*Dp(y!P~hQZFrB*#_(Y9|7n=xhq^^JB%{)bJ>u&N!zX*KIVaNMMBY_8TxYvtt#IT0wP&t&8()ifJkMog zB$Yg8|KbXh>-m^1@dISZug)KF_anRV<}%Z(Yx{4v=omB#e#xoWlSS3;CL(u)lHN4z zDwoq0Mh6n7j-lv#LFan+pNkrd8@Q9KE4fP|djs@&cLs+ahtz<3vhLYkMV~qPrU|)9 zj5WN@xd(56!Y>h>Pr2{pBu30v5$<~M$bJ`zcGg$+TL@ko8B-RKxH(DM`q=QvGRYDY zprmtRWNLPj#3D5hOJ1;fbwFR(?J-MkiJt+{Z{?7(eeH3 ze68JG&Uqc~l=@ttMAVG!LXbNlkzm$nTa6|Ztf1ZwcR&WN}=}WuW29PWUB*5?a z$tdj-@AMLWC}^xi?`OZ2LdnZc>%iktvcqTDQ6b$22$U`sybYGrccAy{-byi!>f-<| z`joHF%(b8LO&N9l@an-ftFB2o;TkeFREX9&0;Q`3orUR1L~b9dW{xOa5cVJkj&#cs zD5(^D2#yp#Sby^+>pqjpjlL<&ZXZY=u8)#Yf=hIgoVqJ$Y<0v>Yum=j$`hgYnb~%C z%GHFBq!gWdDWeo7(aCmdouE>o_~9x3(6`-km#RrpKFl0ZlI)b2`RapXev;dPugWK! zCM4J!^fox`o=1=tV+6gPAMmT!4;sb$o%Bs{cl*%(aJ^NR`NdNjp6C(a_A4afyiN)P zwH9Wg9^#vPl)SW87kIZpBF^V+#O}#Tw}AVRJfDPpZy&f_AFLqTeDStbN;Gt;KFXIf zGcq-}x465f`%6rw&m~Bgi(7BS@RWXL15F0+bTs6SRp!*Fpa8U*7_R&L%bWbhNEqMV zrioXcnb67psk+DpUFAvR%*OPqWn-z4{nZVafiKb7iPpT9H6>MjEo%JJYG@s7#g?j; z@x-uPROTi7M4AbVl|96y(W9oLBq(!&cxJP~$2%v9zhO7tCcG`c=CdE~!PbkE^+(s? zy$B`1qX6D9)n+k)8fY2bQdc)JWSRYQoP*g^NBe~f0t#o{k&j^Lg`Kn}&ZF;LzcnOO zr140vTIgtNU5r$;jm{0Y@QGd+f`ZcPG5H0;ZR3_Su>Pcm#*xscJ`aq`JJ&zs7JByK zyt6RwRn+d!xsz{sE%z#(d|uXfK5ktKM_ck*g~^TD0RJj6Bke3Q+Z)oa`>5B z(XM$%x>_oHqP4buB=PC+x#@v z9izU5T*R*3kwJ$^pn5>mJl2n?>)2JsPu)kejI7HI3SFfF%?^>P6>L%*WICmp?pHph z{_NA)aMbn$YlfaXHV=&I(%jNc!klYjY#0dSVkL;wQYc{`t@967DnB|B>(BH-ps=5K z!zgVUVtW-@(ymk~T{M!dk^JZcSIEY=tsGZw`34;Ch#uKVMDt?s{gm1*-+s=|{((BZ z5cp(bTZYZWgU1VFU9};NFYQMPjZ_}+%TvFPE>h@l@VaQjfAjW^O@@ItI!z8Aswcm- zZ+E(Ziz!@(tNX8g>pbx9L8$TOT#Z?O<3(fLQ>81O@hyr%X6u^u`blUXTtbZXQV73( zeeZ|_y*#!TdtHZNhhZAu)?7hJ0k7iZfid%kXq{aX4ZhgvUxGGvqtri)lqbM=SbaQ~BL@ zJGvhu&?wBXOlJ8<-(2j}R2dB<9oq}VjE!ZYOK4y`Bk0l)sLDI`kKXLQ85vWQK6d>+ zLogKsY^Ci$zC^#TIk`_!pYP-zpCaJ1vJiRf_~Q@VFhWOC7-V#)qZ^&-DAN)%)D$D5 z0;!AX>We8;5wwLUpvSJOD5o{pmW{soIBn2{uJN@VF0NHLFWM!JuSqWz=o#m9vHVQE z_+})%09K%j970+KlNo=77O3+W9XkoDg`&E?zpmRpy9^WJG=tT1N*5f3dx+k_`d@-R!@=(Hp$3-CqNbN#kl)fV2^ znh^|l`^con!zqY+%~WfpJ@y0v{ev4$d(Te~xzl8;TpxWEl4D33_>jYitX#;v0FPq- zt{V@ToJeDZ?i8%!*N9mCq}>z4J;Ej@ zwzZI!Cvbc}&AYRZhJFnR{!2o)#qc%v?+diu=CqSd=w`wCEBmQ#*zR@OH8g#8QhHK- zI!kAA=z>#-ouyn*%>>LF=_q#xZk>QQab^t0REEkA@$eKrFLtLRAA_obg?Y9nfA-+2 zDXXzZbXz7s&bXRJ+EhCISrpzVNfMzH7MYF6E=Ojl#29ZBLbKa5xOR}UVJ|Vz3px%lJg78=ksOXd&!%wSXo@ZSTn(TRBXfJ{a>HjNeQuy zA^W!nJ}`2kW;=PNV1ws=!W$2?o%R`=lr9)%NAf+MyXcWXrCNAoSOdP=W#I9-kert& z65|P>bqln+;6iy`vP(=rlhz^dF^3CTxkSAfAClIa{#a0yppCxPaj8`HfeyXTYQ{B0 zdugUDCr8N96wOs-R@OZw5KL>fO}`BDBBfYVEc!a-Yg$}hH7q>Ls&rMmMY$J7;=Ke|Y6 z6Q^aQzt`rp{=D!JvF)0)#{%!6oYt`kA1c^(h4$!;dp%D02EwlH#Ah|{a$kHk^7+E^ z>iA1mS_+UmF)S4ZkA1E#>Vf*lS*l79=ENL{AP;^Q7x}73v0^f&z{=BI64gd>iezr- z{N?Jj_53MHF+wD*z>UA2I1#X&A}iQhN6Xjt*NYvm+VSNSXrIb!rgM`98SAJays8~b zdW++(`ZIX!aXxuoY*XR>je++sI8m0LR1n*Y+>d|b{#hrA*pn9vHr4Il+;;!)F`DP) z>-EDWx^qKVBeZr+RmWLtLsf#>Ns##YTJl3>?8|u?oTD>Oqd8-lPoq2qbFojcB1K?$ z=*%S1W7;6R=%b5p7k{_zr z9j`NO3#fFW#ydsA2GbXdv~$2+?|x>J{4lW^f9Af+?^_&OqQt6a^txqEudCm2Qfn;I zyd^m>hyC8a=o|jXtm(jW!9L7zb9v%FzYS4`9K)6&x3z#dN)=d5tuE4D2 ztw6J7uRv3+nN{@JzM+3<)*0}WK4;BFJ1R@Ik+U(&-1Av}%(C>KosC&k=5~bTnC4Fk zDsur(xy>SdEPjYfh6{IfhiatSOuUnMZK-Dc)r>pZy+U{N((>H?niabJQOolQqgJ%x ze|j(l%jInN z{Cj5i5~}6xC3D`KwNTEIqhDbAL-pM?o_4ggNfO)1c<5lDtLrm^^Fl|&Nka~u2z0M} zW?p`hQhb-@p<{t=anJ6Q3-OAVm6`NR?VHQCUTnf|m<%?#T;qbGvzF*@2^@NH!N;Y@ z@VuGykuvdio)CTpw~j@~&XGj4L}Pem50HCPl;v9+^ujto*@xtAKk9~{R2yy#vd#kg@tI=4oHY4{59-&2wOuIH^FG-$1$RVZZ zUI>4!_gxi}CVNBRnbFYmr)Qhg?Z?@9+vmi1Q`Qc=_{WxQ~?XuKh_OgxKHp>Bz z4L`HULcg@gqWSuxV3YB^Hi6`Wa^}Q~Rj3~XFsqNqBg8>NswSJP-Nrt@a2tCYyj!N< zG9ZF0t7A8Px~=chb@tm&L;`31VudEa?|Apvwp~DAh$64oZ-9NVYpV zI7yrr2^HTSa?m)?hr{Vi`Drh4Ld}CZf!;<=(#}QMw7!{$7(VUCecvrcvvQ;k0ITTC3@tLwE0ek ze-{0Adbf_>E9va5MDRHRccN%k(=<`iJ`t+`{TxWHUv9zu?S7Z8-m|MPqbNIB@AJi` z`0Lh&W*Kj*;oL}(7bxnbT8h7~qCy_97->;Mddx49+)R4C5m$X!!WJuozfbeCq5|rd z%HAKw|ALS~w_SZJU~w3to2^h6`?h-TyWQ+h zJUYVDv>@nezW#KUcpNDcw9$-zX8%bYErl|dc~qJ2Vn~1FvO??#Q)LbPr4DjUpS+lU`{By3xM0k^qc_uPD$Pq56 zGns}g4vK5Wtibn&@3*v7{99E zf67|pa&OZx!%lib_dsAq*4dX)1CAn&oJ*dtAlDutGP?bGL+-n&hlAaGMer$9BQ_0G z{y%vj}r_Z7P2@$M>T-*PpppeV@*Nj z2bF(KhxCB*qgP4!%|Yb{m48huzo;28W{?WOiouHJb3Iw^uwkr~8a6fB{sGoX_r=f` zL91a%e-?!QHrL}y+Vh5DZVd817tGGLi!b&CNBgnV+A#zr0CWSV{tooaXV@48PxwyW}V){F=)vxe?!ya3o_KSQ!kqWSyL-fGeh5u zDc`ZT0e4))w$q)kU6R?K{jgk9ti9EkZz95*DmX2f55Zh^-FOk_Dz}w#>j?V^Tms}a znn{>?d3?G9J)~F!PaW`{)!7kx#($@x_Jb za|6Mepv060-IJLSkd`ciK$lHb{LhX5Z*Au6Mj~U@-I%P88_VyS*tE1g3B0VO?BM@H zX+esox=k|Frl&tnY`^|7dozgg&NG8Q1Nk7F`j6rFJhyZ0OY0|;H_KlXP7O7WMIwVV z;670E7-W0UCAc!w{0*`<$OPU5os34d2Fbt$p_8%5?jR^U13DQKGE_}B^)ROQT8mZo z_{hHY606BRSX1T-Gd?C*vnkM8FD6L_?rn?m^}mK?e@kodO&Sba%Jsw-!kekaWInF? zF+j?ZOJD+0+Oya8Y463Covzx&7;7T+5i3L~j20#*ZA5mI@fBgm`VC3?_|;2TA;^v& zXh37%Xh7J}*DH$|(H*^D{JEHTdtRUiM(h8WeV->SAS|AA0UUbkSsG9$z=2!p_V6d= z2WdbHf%2=Aq*myQ1O?Ytxtk#{NXad64`6Pelsj;_Pymn>TAtryIgS7@CsU6$1WeM*@cIlMX5v`CB6Oz_)?^JLMT@YI zt7I7e{Q<-@Q$G!C2&h+?V?qdAUe?I?CWXK8fXr`rfb9xxe;)*z2^R4!f-e9D5Q`Af zcXq`*X#pjV&A71q->bg9r+bM1uct(PIpuw#en1E2$qkpqM_`z`lrR;C(gKvf3^D-} zYl(JnJrQxFW?Fi|qc41Zy)WW>y)TFaFGP9$J1q?Y)c>5&T^(rwNN|lWQ0zW3TkI}M zOt$2LM$jxAfGWScd5S%BpqTP5Z11uZ{l`PVep@4!+j}%dF5p0y#hnMb`5g4Xlz`{7-OzvgUPu z2EefTrL%zMgJDtMz%XjC8OnTnF9SbPc4?ji`n~wVkq977ExPB$uO7jFCHeunL*Y7! z2KfA$IPv*^?S|q365xJ@f9K%?YrkR^hh!UEx+*xlEPw+Pg#b7}!?PS9Vj3Lw{4WNP z;CYt*=fwBlIR}sf^s{V!72E1aYX%8k9k&MqBEbt)tNfjo{tu9C)+jXzK!Q6~rxglV z@3>IWH5jC>jZEhh?i#?&&vatJOy~T7cb>aH6A6Hs&NYzf6g7jPTe$%G0@m>G-%frr&$9Uy%3CFAl>se& zaN+j++WixM(fo!cto}^|w~==KdXZpyQHia-o#~0gGzExU-+}P1Ku_iuguBmCalLl` z88n*B7lJc@7s>nu`vCm|hx~`6#5`&FwhN5UYXO(#zvQ79lgU3c$VGo^kh}OL@(a~v zmLdRBfPRt7chJbH?t)py_ukd>9_LSqck|egAxrs%QnNqX;?*fb!KFuo!zcrwLD;TN zA0UfPuq^Tilk;6!f2z>{!LXk<{$ItmI?y2ihE1(bA0V*p^FkJPm3-ZQKVuV@v!ejo z|M2S61cNhx7xF|wFzg>7jvsb|Rg%`s4B*xA`C$Sp8-ofC#aL+PnD48Dz``@9UFkIupoXa%Km|jSti;YoRRoX&ldEd zmYH1zI^Xusk9e;xz2*hNH8TTP<=YHk^!FLSV;~;z=cfW{?4M;be_xwJ&R0oVfY(1b z&+E^|T_+%L05<6LlTY~!Ri_%Zu2CWv;Pp?>^ZHwGm+6OqUjMv`+@G!4e=4KCb`$+D z^t?7$dbn$YrLsb=A8doQ(9SWRSG_uE@ShN~A90FbbMe2vv*s@gn0|e4e$R7eob@~x zSSj}zobR|0f9^Yr)Q#bL(fn)=veLxj;ma$VtSQ%I{-2n!15ki4t7G{6z(V&QlGXD~ zb&<dU|ClZ4_I z2z@S?Ex6w1?Qh?iO$)qOojnl9h(^uxjxg!CTO(jAl!e%vYiWm==hgqGE(>Ud;=4-9 zPXlfc|8rZ0ONPupZxFw1>_6P^{{hQ?xIYVlX{O4?PCvVh^9;@J56w|NY{?0IhpeZLwU>a+(f=VmwC0`gHOg=W zvOM;;InZ1$6chdI z6ReK30Oo(|Dk(n*2>cBH&P$JgmVXT-zGfQ!&*K2$a2gm4Y=gBxzI>Iq>}!;4vqmoq z-~dg|;{f5X+7}#!w@^9+TVqX|`9u$njQFsWD1GE5d=FjEn3w-Gh zhgQcS{_k;sm_QEDpY8SP0FD2$tcq2`w-yu&uSxTSrL>?}ow7Ed30C*&1iY}7X8JM1 zqidHkzDB)R@Us2^6ZwID1^E0EtK;*-_`z!5Kl`<-ivv6~&p}gt}SLAl1*AjzFnZt&X$+ z_Os(E&BAK|c@Uu2wx+!{z&)B+ory?bMf^gh4UCNcoHdw77g>EYY+i44)sF#Ej$8t` znEei-VGB*^`A_-QxC~}-82SS)KWvr8UxQ^Y3-xYW9Vhl*hOB+}{Z~g?fXknmIlR5K z!?6^)$DUg7@^T7afEI8!5UdHnEHLPv%#47vWSN;+U{Nc~iS|LDnS3)16-_dfeDb>v zJ)=B*n`i+}*&h!5r%L!hX)O?C%^jLYJp>9Ko9B%~+H6m)vvejzk)nMMRbGPqgR$+c zH72fHW5`sj88HZk{p!1Ze+P8=7v=JoCrY_>g#7^D{vPbs_`9XWk4d%fo5%MT^L7z{ z`#k9l-2;IcS!Z8H4P-5M4CJr#kiafjpwFM15u7&CH&X?>7K>KLWr10};||{&Kik5W zWBN0(8DASe3x03>TmxC5=^sPPmitbC<-WfIqkcrh7bcti_}PDO4E|G*I1uteU>#I> zWpk~7rnQ!v?}1_afok`rgA+9~)P?8$m<}{J1$Ch=ZmUCS#NiaIHOk$=9FrU`qvk$BP~GrTj#~RxEuitmisOceSzh^ zYopwEdS1vICF01rWD=ZQdxXg7_UjF~@1`COcJmd%r%;X9G!WwjF%qRcsUA*>c?5Whln|tILG=m5`)^DuL+a5|hJ8Gai z4;M|kqWc-4>8ZNY3QfLq0fJJd8k70>iU8rurU+JRt8cwRHC9A}Bbu6l1yXf!f$|XH zUT)xJE#Usm9h%t)ziQbUl@_49Q(g!#Z;huWKCR8R1mUFpMn8QV1<)m zqWfp+;&B?^tWo;|Ue-Ks@b~5dN8v;H*bKJ|#G_wSp~Rzos{O>HEvhucqexX>;?Z_h z72?reRRr;9t14_-{~cDKh4BI8RtrQ8Q-ehh(_qJI0y44P{n%kB9v&VRJNwU*@{hOg zvF_f~e2E~rRw-CVhl_W_|0q7orh5WH342dedg<}MI(of7<8{@hYH@>|*nl?4Z4At1 zo1)K;WQeyOXTQ(i(y&n@NtUhUc_EL6N)k^(m5C_@`_z+q#upD#?-=9}6J!4JB&_e* zTxu~wmZZeX5LZWhb(;7l^PUNtVuBBJt@|P^vu=I%IL2n9rJ{F2Uzpr-U}Fu@o+N=A zr`JWTCzR(3w|PNA-K0n=FH7VZhis~MfN(q$+$K*TyuRM<%~h?g0G)tp%gwx$L9#+p zHm;GobU8@2iYNseORA*EYlgo{%i+^!l_^83rB0J=u8GqB0Obh}d%456W1pQ%sD1Yd zNCMvm28XGj4KGpTGh)HVJ12?1VK?3;ye)u)_T$w$PCWO)$HQ|Y!o%AIykn}(VsuMg zM}6+!o&0NNF(orY)Rp=Ziv~*Al9=-Anx$F#7kH{i5GKi$ z_u|@krS{Q|=K4P@ZYecz&q$i|KHmRqtLGO>Bys6vhNzj7Eu*6cri=zI(~-eI+Ol7b zCs-2eDFLWNt1V&dIf9bcn}?IHI=%8eEYD;vK=GFKnTDAVPnx~Kvz;3q>G~en@C$u< zGV&0OiSu~oIz`Puali49>k*{NMKvfz&KHTUyMH~7Ad+aP9k716^L$P!>8_>&YLc0b zG?^x59}n1*yuCn`m?iW0=(-m4z-9gotW|lvxu@_5*4K(y^bVSGUUevrKjt)1_tYxY zCqfi|Gc=bbo?Ar*Rg-m~AcrP#0A8{+_Dl258v`z6)&}gES5gOo*A-;e)tSnU8q$^< z4l=cmc~c;?C5*N|HW;1YP7}I2Y24m<(Eml)DPz}XsaLh}UfzB3+SQ^f`Q=W6mzMHz;mGZXt6OW5sxAmn% zQGPerQrAy@U@zKw%hg9Ka&uy^iH1b)MhQOpa05f}%j(aaoZPE4Oo6tjFShu3q96SJus# z6Q$?3gjAnCbg1PPZ{GIU3$iUS9Ey|XQ^qG)pHka=+H{KbzKNtRQNmDD!QIZt0uH-d zFSY9;cJ|nB!L#L3{y0GvoJk$7@r9UnjFZ4OZJ)&s1c7Vq4bBe)+vGxCRz25#7!v&? zJR~zc??Sz9ey?nl$mM5Fu>rL=b(?SbpV()~2G3*OOki}rS~qrFv+m=_;G;+kIQZgS*^V<--o9+a=eCPLw3+ zWY@nbmi4G7VA*i-P|)U~i(`*U&!!~|XQ!b5M}?ZpHJIDtb($-SA+rYV=jD7oCgh~#4m`XKo7drOpIgp`MrPXThBFJfM@bRd znnY^N@&T*b=?A3{cW;-Z)Ocp^z#Q#;j8{%og;Y`ce%EJ-q3|~%SPOBUr;L)Kbehio zY%XTcYo8WoXB$FjLg2omvfSfeg0DE`7-nN`P~bz94|da9`%qygQ_{RB?=g*ijwe49 z1L0CezaK}AmcddAhiX1xhdxhD;BDWjVc2@GEU_lYGeUW~pjhyrBIJy(wll|&0gBCv z^NmiIMfWxsmFVf_i0!szSG%?5Vg7s4n!QQziYHBwfl z?`$r!pUxQSm{z3IflYhxHkp|cc*z(MN}Tq=4ftgZCDCo)3%fZwx; zGqFk)lz!KttJuWdHcxtV@YcttD+Z0%2k_fy}CUnUdN7De|mM7{Bx#u(D>uFhaa9%Aki8_ zu5IEX{F15iGKdLX*~m2Y8x40FZEa)sKBAz|Vqz%S&TnPf#I zGI@)))$!cCUaU%WUxLk+2wOs&Ibjw(w8ngut*S$q?3U$0s)6eYkbb(z}Tj$G1hd+>c5*U$bDo%6aiwfF>zgG1v_S!cg zgc-`UXSX5=BuwbN_e!~R2iC=zUZAN?lIOq}Q+m8TO$mvt-TCt5VcOez|Y65*cz!eTA?&a(qD0yVX`!0 z1Hw&O!-AgoHT%XUj+6S4Z^}2C@aLYg)sFMqE~u9}a)7LJ0$!%`=|huXO-}d;H!Alt zSEbfn+(F*vaMgt-`Fe-nb0_?uibJF)uB+5`X;a1|YoGI_v`OzMQsrp>LfN$;ci84k zP=!tAw1!6;>{x$gi-671jm<|-?FgXVCi6Cae_n*2i7s?U4$D}D>0{+>P1eAw5oylY z^8A|WjX(}W-)mz{kH1ob{(6`EsojK@b~XR-4%Cwa@T;PZQYw> zdn77Db+k@9n0P~J!eu6Jb=f<7@Lts2w{?9qG~rY0-|BHTAn~7RQ8AM_nw*$QFvXs1 z)^>c8+jxDaj86pc!4GxR8jc%x`>{0);@^FvwvqcnpcY5-z}a0)AyIZSW#dsQ}&YLY9XMmR|Sisx{q?Q1pKptNlva_5MY z_2N}Sci%QmE{n~cj@6$!`YoX?Evs%rN>;F`wY2~C|;&JeL7xaM(dqu01Vxa?8I zD0|m8RK1wTc1#uJIgcv}sa+mzJDe%hA@`W^5v`5ER)yg@j!)s^JdW1DyNPG6Z7n)M zf>1Tysi7O2ZzHYN#q2??IQZuJsu?Hg6`;Ri63*Ay?e+dnOHc-50L4J zQwE)L+ZZ!#@krsYaRgP33N-R?qR2(lQ#%ee&}*ghY`rF9Q{}q;^$o+_TU14_&|5^8 zW$8^mkM`O7FnZWFa0;W4gKAo)D-x8+#G}Hek zrXk9dL9>dUS;8u<6ma4Z7Ji2NgD_ z;1!r!JjgIKH&!uX9@L5>tM>d5XLr-!M(O4kxWLNw{>I{IUHZ;j~Z0 zobPYQrE4{w-2ORCX1!VRJMY7?AFNJG)3j_+PM6H!b*ezZwOejd-zAdffW4CXW`Ad;PBo@+1>?%QCtn}B zPJ70}NEy$8O}>--e1H0*D%IF}ay1GY9!2OyyhB%yTso&o`MHBp=m`H?nUliAmnKPR zNUgP!E*)(O+(~1jSuLtS|D3@xP{bzW8g#d`z0S204UIf|4s|&6F|4!WN+*C+=D;09 z7@antgrbC%Q-$?-zVN6eoX&fDid8_qFjI2b8k`t)BC+!VX=U3Z+Vt2?UWd2#Q7_dE6o8!8a_S%!Xxx4ut6(Xi{wIQox@_43DVX`?kENLt>oKi}N!y!0wAlaqdpV>9R`@;HM()X!e z#5Yx#pO3saN^zDa>pAU2g%>xEXzQMm?Vrfbd6I3Z*CpMne(F-lx-q+vle8tm_!e2p zyM)s^znqBY<1t#tW}|$LJ_%iYa;x2dd|t6l4<(}Tau(&L&!!wiL4KDNUTupr9;;_x zek_GZIC~Hp$AwyQ>bI+Jv{OBnNqbnDS!(hJ!G3(jl?q6nB;OIW&%nm4q0GTuHd8 zuIzQ6)R#-PLWff5%A?C9H{_)yz2Qd+z44)0Bt0Aj>g31?kqJ)cT7%A|0;DSA}0_3gzZAlOiv}+d;VvL$1G*&aJhJi1|~fcjuMpkxuh% zWK|(M!+8Q4uHUi4=(%--O4M`Y$iL*=SJNPwKpqfhL|U`+!mGWZMt9G?_S*TJER27s z(B4vKuqfr~1p9ieP=({3bZ6e`(aASek`?V`uDzZpiWQGgwME}6^pK!Gcs>8dhN{7R zC2V=+1U$#MkLBFwrSxdu!hC>0P)K`Ui5~s#o$eJBPTRIbN^Ywn|9I}4ib?)aXxEWA zR#68cr{TcA-tfVaw8XvqPD$>k?jWs_=!#0?Dm~hTe@nYg>9w4e7Fp;A+D!T9cM>xE z2+3}q=xa(nw=0sbKj*^4eq>FQm5hwHAlibwr)nfRHw5~=t2`Uu_z2;}^eDDM^|(A$ zhjWOOAVT#dtK)f<&ArU0z1nn%vn~u7l#r!^^Ycahy>6twvgwu4lp| zJL8AtfikSBr0*Tx>$^yfc*UzbBBH`u1HRPj5+!YY zSRZDt8_c_dDDShqE>%ji-v$S&tJhywKIlKuy>DwUpI7cny$g6s_s=Qx7HhUuhgzBM z&xzr8B|p14Cx8K2h8px^2$422xgK)ytLMTdFM?!7;?MR zD;`d;-}{5gXsr-ti#c(rMYUHr>U0T3-x-ol8vbM5XIjO%WHzxV?e_a}(>+MysK7>Y zUz7X3u7`#4NE_p8>07sT%UkKgxIBl791S7rmN%K7nHr7u+^rCDaC~#WnmuL*Qy@J1 zkOy0a<(^2m(S7sn9Oo3I;o?f9J0!wi-lRnGF{p|NUpYwfq|Q~qZQcE_!#y7IMRpPH z8{6RL;@d*yUN`VOA}BItm6hwd^?vGjzxr}MXO$!N>wGc+o`iK5t(c0|&;llXPPktd~-0q7eauW!1eYd)67RyPvHUq{)S zf|uZj>b-7b%tHECJIiAAA2NF-y zcprT@<8&4Lpkr6u8{kG$X zS5V3$@$m^Z%X@N4tcvO`;n$qEiyZ0_dw#N7l$+p75pgzxv#xhLrd<+4Ia#Ob*7JF9 z_twEa+EF@~uBCK&0pVkB>-vpq)H$1_-i_R^;0D}T^cO1*LM`P!fd|%RWPva(SZnXQ z>Fz08!&cN30&N^^@6?uou7cP=#g(@m=aSCElJIA?jqWLH=^s{!O&fa5|24L7JHtEqsG`)?|z_vCp}U0$0%7O>xfkB4HuZg z!DpV@oLNO&vw?C??%42Q4qNvV>>4-QHXgr5McKwn_)+B*)ZXdu}J=a<{KOKAy@xLcHByvkte^4AgJP z85wBmYRo1d-g|c&G~99y!d^Pvh%X$^rz85vpI$PyC)B`^sW2hb^7g*aAdTzU>zrvf z+SAwKF?x=K^{b7En&gz0jJWj--?YYKTpvDo2by}*KUmvk!@$0w;%qqdP{tHG_#m;@gwA8ej-2rDL!$aZ-BJg-%m|9xKJ7}aoK?Kt{PROV#l;h>#0 zPwo4;B7-XmEAFIrDl-Hm)fOEpd=8zwB4`&p%}x_%FYc3*{+U-iC_v4^#A52DfL+Dl znaYxzt&C+>aTae~G+I$IZ`x`he6@V0af3anbXKE{sJeDzh12Qbd{hTpHI2y0WrsAK z+baUeM~1a`r+Yi_p1pRI*CDm$BS+u1T~qR0RO~!xZ7-2QZeDby)WeTT?uc5|1pj~* z)}o*qacXsMM{yH{({!C_;g7JcE?FD&guUDVEpTl+js)pU#qu{vIC zs|DkiN~uX`jaPZn`l3n-+D$AWDCJ_gmw2-oC%iH;bu6NgOgM(O`WojR`i*RZEj3Vg zhJcCo!iFZ4?gWHM;aSh z>c8Jt_C~E*Qc&j%17^6>^m&Q-v%YIGkI_+2)SZc}?nCqvJHoW4uemq)l@C736E7!Z zh(25{Tg2G>2xb2MiI&A6$LOhW#&J`=Le|uV`cUu3E&;^>_7%nU_2LBy9HJXoWxCl6 z-w$uP;zM?4@?um3nT|7Q#gxjIvW#NHuCVDq>mr2CC_>V%~OH!A{G}!Oyv+ zr5Ma$j9{tCjn@oQjk2W)$T!ySpLAeaA_Z?X2n3e}auT9$a`h;j*Yyf{-`LyOJ6fu1 zp+PLq;~Cw5jLfh$we>~()g#(t3Kij`^xlqB*%V!Tntu0;|N3wuqAx`ejn}j_{#|D0Y0f%RGI>Yka%g^?7zt&E zA!Frja(X#?~B?XUB%G}>9AaMlkpJW{w9mbY!V*Ml`YPP zWc4mhr5IxLOdLLtyycW4)1dSC12bi1hAV0DBCW&FII+!a*}7Kx&H=}nl`Eb1KaJGa8@$*W zsX3~mv|&n<Qe7mRKD7 zY=caDbvIGFd5gZHuY*fkZn&3peOA2LdM+2>BDs?G8d8So6#lIrsy&Xvosp35* zs%^UzKd`;l8ms4HkIQdu2+Q`q)HIVjB90C(0@k$yuPI zm|jPnN(>4fRAp&lZcd_dCX^h5)4Nhk#U7xa0 zQRE1HWFOG#Z*@l>rF*b)+CVq2Hay{i%6kH`Pf3v~(ESVG*SVTkT(LBtbbY2G*G_(J)-M^jtR+_O>$EeVVH z#P6Xk7n)fWE%hw_{{b&R(7*X`%m2b3?ek=CLXgr(Y5~L$i7WDhR-h^TwVwL(x*GyTl)uxkJ=aSciU%g&Mw~95J7`w@kWr*;DwjYeLZAv)JhE~!~Vge>TX14&wN*wYT5fZgmc}pR~GjKlNvP%D7uWrxA|33Ti^xrT3xbyDa{7LI7E8bi@x!j%qd^8|TGcWy(qy;-hE1QHBtz6IHCt3KpOK&QWPu0U?i>YC66lEj7N`B=8!y7M?C4-STSr*Z3IyRLe+I80SD+TVH?mvT}~2 ze<24Wc#1{5ccc2i^BJo?XVhT-1YFVL=eqggU#($sOJ2-0X6fhM-^F4^%m6C!_UQ86 zrfuETTixUIim|;R7;9R$>hUA{0TJymnSTA%rQ(nJV5`+CSWwo*FCynQ)q&B&EMX*| z$Fd;=HS<-`J*!Sj^nz?*EiV&{*oZ_Om|kI{D3au+P~aS3bUg`klFuenR-`;=3q+j> zpO6~rBF*!#7cK~|3Ej}pe%m-5*-eYtM0(qn4EfS!;EWMl+?Bv8#iPVo+P8xpPp8Rf z!VwWbH0vmLso^Y!kqm=k+%#~cgcu?@q1=~c1DWF<%Ejs2w7EJN58{DN4QH^MXGPH} zES~Z&?6-PeXO<3o$hV>?Wqi#!_Y*(8Rz`}6>l9YcbU9o)r|c<_D*zwQUO+dx&jTIt zO(_uH)ykM@c1>e{xT&l(s35DU055acF&$ynh*}+!Bqe-5tF_1*E?q8_B{Vp|#2N$% zg94C|8}azCLq)W}cA`;6{Zza^2*s!SzrGE?PuDH6ICp9>qks z2o0#g%0;2$v zK^)KNj$Qk9gC?q0)l!x9Gw8SlZW6N9MIFX~sVoU&Ns)IOjW1s~)8&Cjgk4>;+6;=k zfzoBG%BVcMej*%;P;6TMob7Ae)`j@l`lZ4Mf%e>HE^@C)H!J2C#S!0-#vWWpNePN? zhV#K;CV|(T+b-)2bEi=z?@!~H;LxU`I4mR%_LwVQX=|@(OxIRNflgkylr^o z8-b|xFMhE&_GWg-f#exzqOa#CoD5$mrHauawHb|X(>yciW>q6!B*T6y`W0_u=_}I@ zBn6NLgb977WJ3}0^cBD3Z-4$PADbW}=kaY!PFd@*l;K_-$Lq}V3#*^MOcc*guF=WE z@DnLzgp}3h07L7LFiJ|0#Yb8lQx4S+3bz|J(!nt6#KW(@dW*)dz*~vj5|;b*R~|Hf z{nb&C#{Aa+U;dntYXV-0ZFAmr0VDPGOS|RjsISgn*CuE#MrJD&^jqCwTfImsg7fQw zVoaCSUl=*yclv>3(6F}ORbX|vT-l4pi`}*HynD?SYX#Zpx{W@+dVBopIf?$&v7Eql z7>E@jhsqWlz&21)*p*%q5?LjQ=F5R&U0j{+wGzDsYA?HV?IAAtY|`3oa`~}eaX$Kx z*4%SvBQ<;>k9l=nirHvH9)0!WQ%mC4I6Rkp90s#s8=a(`SV)woUrsskPS04qClJX2 z@qhD=NzG?jj#4)Eip(K49QYY#3R)w!Q~Oe$MDzkk_YNb4%Fd!bE93;0Y50OKsfqdm2P8!3Xl6AsZ@s|N7Q)&(9@ZEnz9zNlYfS=zxx~OK zSxBXf)kO783ikj_4(&!t6`z6eBQ)(&aSsw0Gw$MJ2d7B0pUjN#2K$X@N%tWblzu56rb!bsqHGB!_`N@aCvXnT zMYE}tE9bf?fpWM|WEF0T0Y|b%gk#hBM)Ux`Y5wrrXoGxybTY$7jck3=Wyei>(MdU@ z@I+$Nd#fCl#7X|@%-kjxWOWN3ug*+cQ2X$GY@^2ulhjIh%?S@~YRI&I-tu4F zh`E5*TgGCMBgauU&0(kta;#LT={)(>N?HwO91M&3CO#U!6O-f8Y5GfoYGYI~am4JE zbfQy09;!jRQzisABNH8&s$3_YhpTIIbQ{ONke^UY%1*eRmHamnDx1ac^eQ@Cox0sO z;Q!p$TqJbIINIOdCc-L+NmA5e?SYzarSQ7#SZmpdb!+ovb!}b{Oce&yJ6@$RTwO$OX322K>Gefhxu|)C?q6c!aquvbZaO0x_aZeaRS~w!$$W6%76!DyZ@Dj@@-Bg}{2;iyYpE~IoNy+26@UKF{tvCqd=r)5f zW%BGQ%uKSQJly##5VbiEQ8``m5{fJ1VQZN7$@igfvED>InNYu9qztZ63PkIs3MNU0 zR&d}AJtPO8kXPDL=fyUQ`1k!a?mx~SPP{wMZ&EmyYqou7yGdQt&dEt4;&}8@CzkVB zJ4P0eS%5(NiFaaLL25>UV!zmQ_q7$zGWN41fBv#PFY>!1W zje8=m_o8Bw2pL0B7@i8(*GSSpKCrG7D~Wa#y+VY?2+c@{9knYhN)nKB#qu7% zIsMz8|HIZ(+vDVayA`3}0*bmo=;2Qp;k1IdrUCCeBA&}~ZqtHZOXTC;tF~cItQ~_2 z8~XB^kSyt)t=oboFSNcdMu&@D34+%84>Of&)VAPaE*t53nMj;y_9!3CP4hf@NV$T^ zhcT+e6`I~rQ-A?h=|l{+^ijY(+@r#vSM7|$=_|^?y+Un)xrO?TftS&9iXrfA-*w^< zw~Mjx35Px%e?(20sDeOOLs(1#QI9>eUz#K;iEZhFHHi;k*l9O*{2c&z#0T2#$#4dE zB+1y>dxS57sGF+PmY!sHWDf`$kcpn6YN5$T9A_eeHK(D;<=(09Pcr`S^4&^aaQe)S z{J&nFzSWmf41Kuqc)2PW(Rkdmj4qS0;4z4`P*R-VLfS%fG3b#g>ogmKvdcAr%7*~S zRWak|P60(A<#q@hzUHK(s^R&MUDGRhE#kj9=5OM8pIazM9!F;|L|dqhftgY9{!tjpm;j;GYY4pwVPhW4yU2udCi&lXHXlDe zFt9ySqD&(dDnR8L)gjj@OysT6mzj)INMq%7qj~FN4xhM3J|;i`$;aCiML7w%3zVscp$hG~3QvaPi{# z86m8*)FK8->awPxeOMd!e@c!3XCHsr-M*lbgXJbRM}955RssM=D>p&1m|_^;Mg0`y zyqB>$;R^d^8h=U(2EXPU)m$AGf48RU{t%O=6bc$lcWoiO5bSC6ha-OYbm^Bm+_HnN zd!+1<1S5f?287pHe5AY!iQ2#p7s!BzpUMA5q81JV!6vCoWsvbu@qjGo6w?`;H^jcEJ(R*?! zMe0eb)m2;mE_y)n#@rdrZ36j}v?DO$O)Yh8G4*cEZ@nNld}GCkQ{tq$SN8ron`VeT zx5jlWe{5izKJbfV2jp8wSzZ2Hv&if=`HH(Wg>;eJko1pRhL&;vn$>D@>vrqG=JBxsSW48^ z0#N~?n%WC~WXPtVuBKnQXwq5TmQjDodM8gztP- zbRN(e!=#N|WU!y#4OLp*|6&r~3NAwL{FvP$88})3JT3n~_KsQkQ=nUm$Sh?sJTYZa4;_iByqR2s~_LT1=fA z!wuX&5S#^Wz_s^As-tyAPP*esC53EC^x+I^xhxv<2%tZV2RhCb{lXFk5OCeK4o_b& zS=OA%CXZvUX2vg=YfOM)F8gPRk~!Ur%b+ENS}BjM-Z{7Vg@T!dv;3w!BT_ui1%@eTzutm>==M1t4tb z*40&%{lW)<^-LgwxNn4fH}UWIPf$WcKiX(^gm&vIxJ=#YO0N2fGol}HLPu%7Dxkz? zY21DbJbIE0uT!ggDz8%QsKHCi2%*km83iqF8|@y#bRg$bf)5k$cDy5C)H!A~L>G=S z9M~b2n5&CG2gpT{uc?3iJ_KB?ma!)Y-aOkO31&?ZV`ZWOB`FBHTOo^34P91dAw*Cb z?uMlrN>ZF0}{Y9F5CFn~#ZmW&D>OI1OvFzb!5bWtA)hswf@7EA(h zk1Uj7RY;_$c>)Sy!0K+o@w+Q#sUSwN1AvzX{IwGk)`m6=vb2>0t*Cnvt7SqEOV=(` z5GQ?I%5#8}tf#^{i%_$g95Cmv#H*sjNqii2GPIcI*<{nTp^GaPj6%9nG&=T=ny|sW z+8{iZ7gPEof3tB*- zH%DZXOfErgxFsIF8{P-|+eVNwoC>!AU!_djGH3xy1`}-DPZ)1JY*s~&YF^iSyl_#H zBIk_BuGoV=>&#TGDO6c$2`gQz!+#2qGNn+9sD^Y7W4^b=jkF+TI)Qyc=F60LOVmiC z!j)*SKmfG&Q1%w&MrXxPePIMP4^CP#2E%c*heW%3wB-b=`K>uikD4H^{o01>7(KOx zH{a7F$%0T;!8}nxc8qU#w@Ot6dr`Wm5>G%T{(okC7OV=94h&&K8_lUKA*JR>=TQ^V zv)=&5k=IbPVNAX?@u_Eyl>w=Ksc2$IAxN2^hcc`JvQ2{>PssbS!h;18yp_+;nw-M` ziDIl!dhf)C!rw!aiqXv#M$;*2Yg^rT%?YbVO=w$+e&8~kqyv!bVPtID&-Okxm7+R< zV*x+0Yq^7`(Zv|ykRK;jVIdHz=@Fa2qunj*MI(v|i7#;p0|Cv820<;OG2Y2{&xmK%Tj@na{W9wR0ii zbg0WlY0s#X>ug(7ntZ>e6wa(HG^_{9PF|`c-mtH$EBqYme)C$4tT$pVbBNv~@DQ7g zYm;ZQUq9?AE3fF0ECMR*BFT=G-tndBmqu}3HhB_L7|f~H=04z zXW!I++Bo;UCdXpGChO;y?F)jjaat?kSbQTFT^{9a{HdZbn|0Bl2#LUE-Luzd-D_f@ z40Yh`>6S>=;`D}mZSA0)IvV(}%#{;TIJ&b$T$a}u65xRzhn}e2y7b_$wl21?y*8=k zm;&o*MNs;ka)x#?or^i+esYv53R;<7UaB|o>}((}G;dYS&{QCY=hYVv(BOjcvz9kY zwAIyHuiV3`vqT&%*>Y_IBYTiub;#Q+i`*qWAUsr&1iCYjVvTEV&bE`e?eS}Nz0vO1 z4ubn+?w9JZf&-0uXAArarZyNzy&s2PCcu`8fobsHD#W1a4#xW`1AQfT?G|gsUI%|f zX{;#{w|AdqGJ|Opn2yD4-He5vloZksR9B4~+~}+^ReLqPam?82Nkg+AP-X&~zA1To zX0m+f2V|wBwlqp=7h+9PSZ48wmTp&us>EcL5nb^}-J&-OdrbwsgiI!DdoPX;#_U&S z5H2$g?o)B;JWFPHkex~^lBNzL+=?iGV6u5kHH~EJS`&rmvtNGctCx!BTN;Xvr_UC@ z5#_`fBx2lJI^kC?GgP%6biX)#bM$LZ^Y8zTC)H1*=%_WDQPw9_DOT{3aZmkHK1=jp zg&&JfQ`QWt`$Agu+Iy^g(^J@KBR&V9ss(p@;6$B-Ft0$>1 zK#uA{85O$K88nKgM?y~Ntuh`A#WU7yk4JeANoi}T=jD!jivlwDu9gbJ@P=(P3$mb- zPXxCLCQ0D{$ykP&xRrzJMdGL&MpZ$AyO?~UY*6fo>H-^&D$2YTtxvwl^m<=xo28Pn zxfLpiWC4V$DXG$`s#$ZCm2@glkWprJ8v}Kg#~%o!!iqpegHTAapVA*K_qwKovd zO2Z5(CoA;KueOC~Uc9a79Y%v|WRi^cp~!c!d|}Q8TPp<_g;E>iI{<%b_nfm3YJ$8} z&X7B=mHP zo56bQD|tVt>Fyg6-etPq@h2Aevs8m!DH9%WD{TzTF=<$-#*e}I4J3QOoO(sx8XH-U zFEsMUHO*!=^5o>*g{9bpEh-sTZ>vd+BerwPe!rmK+LaaGeEsF7*XtpNjj84)y$0xj z%9g3yK^KPqXDy_tOB<_KZg>C}Q|Ko`isMOA4`r%psS=lrw#U?l+?7mY3nPD+33rjt z%b==Y^uYO2LG0CN&A8yO=~(HgA{ZMq{MWPK8Su{PR2Sh!v+FZGC5G=e|Th*6! zlb`dyrLdcfSZb+B)PjDDx~Wor{4t<4KOMjo;JTPGG;nWnO4 zD2lSiQ=$k?Sa52u(}^pdUeX~?u5ZLR-HZs<$aMR6UM#wvyipJLp2tH$C+e_;LX{%$ zdS+{$3$?aeZ@l~R9hA4~D&W1Qt3q*nq57BmmDQ30M$f=K5si)yz3{ZPRZ$-{D3B@r zVXn56EVl|<-?*|;aB+)pjVoYixS+*luT}1@Qb4WT@>6V6QOsy%eMKI9HWn>d|DbvC z6ly-5Bn(SKA&?w230Ts6$jN`0!Mj)aZ@rNnHB?6u)f0;CtUKKsqb6+?ikyj&o=(F; zin)Shx{{?OgqVM*)UtrsdmU|V8LhUx*=49HOC9>dTCBJ1nuOF33kyr`b2VwW zfm|Ew4eb_y4ItWM;jEO~8e>~mL}5qx%0aWPFxk^FUEZ2!)94}}*71Zy8?Pn;pm6|! zCHKRC+>c`0tlr-GY;$nOj5kU0p@^)83mSrZ9_|Ys z?RRb6+#=Nc@7FJ%Use`WHt8Eq>I_$VURyD{!$HlW>2XhLHU%KB1x`gh1HHm~gPLNg zDw^;_H~>62oc2aBIH&J)G_S!47MYNtxW zs-s;XOD`&(&FdI!qn6Y|clj4s&Sj3dp+gj;^-L|9Z&{YKSf^~$kciHhe(|ctqg+6p zI;;^w=#5}!Kt|XxZBJ2ILd{gBkcj{bY!VHJCn+}#=`Oib!J~>uLVe~-B4%T&VyUPA}-rbv@J(MQzENKOfrQCOZhy8OwEoAP37sJRDCDAi8gwmc^T zIDu)JeXQ4$h^ey=Q^yMT6e?8}T9$x`qveb7xQ6zEfg6;&v+W0@6S2oixyWXlH58Xp zg^ipsN95FSfcPuV?og(zWsI0p>Bq|e6|0;92wor5Y2m6Od{ zsRgUe-k85g zk-{~@s35KIn(p1+U6KjlE6M^VMIJftogjfG4QWWLbx~1mpm)+xK6(Ma(U_&M*C4oY zM}EspP)Ah|ifDxp(1=JaZ4kDd{r@gq{(^%?0w@$U*>BG-&Mu<=aaIheZ0QEJIKL!6 z^(Q|R;(h&39X3*fR@`M%fj`kJ%*R#05%}0D5b{EBbMDKo23C~lb#Ze&cXYS3Qi|=3(e$ZYt@mC6c7YyYuJh<3U>I6CTY;k?wK!^`VH(1Fe;96} zJF~m+f8ijZK@51XG&@u$RE*mcnlqsZ|MutqO`DYo6$vWC!p($GXq#xdON+cj>W5i? zKCWUA84+X3aT7IPaSz&d*2P)QvAL-)t?eymyTGY-ZU&1%5k?l?Ng*eQ?MGymE-zsl z-R8k_RrTJbUDn@JMl)hi#|DB$vQv|1Sv|DAGNljiPZid|>IPpsRP>3Vx9GP(plT*k zWm?uuIMj-3HI~~wIoFyQsa-LW6W^FVm0!5R-Bu?Ll#Mu)s?cV~%&?2q%YFfEyRjve zJWwV!P_kqrLaUO|dgIvSFz-C6X)0fYqn?z4Ro$pk#L4^ITJ1~s2&lv4 z{E9CUNW@FMtU3wdMK21{an$2|Ej`PYfnUMgy~fuFA+$X12@bY}$UY`Umy45y_Zqt7E) zRzt|OS9e55s$Zu4RCoiF(dGWNBbrU~qyH} zdnp73;BbP*W=YdKj=&z0`Br!A;;mq+z5S%Udq@v)F~FB5h*Ya@j*hD3kXvDL zwDYB({o1#cNISH)cU$!$65G+**pyRwq>P{shw@dGr5^Pgw|EMr6_l)CGK;}D!kKa>(+{K6H6$o6JB1-8~ZTZ7S-^J=gB-%VF(M$nV*(y zo-eyAm~-oSp>`Fkd-KoThEm?Z}c*?5~%0JEupGSeugZj zuCQ8MybEsyi;vkF$yuQa)Ljv3l-5goE%bPv(=(HI$JJiTGJOUL8c5d$fFKz3ng20* z|0X)2)kF_>Tqq}zBmH%~5tJfQqX3Y2FS~3R^dtAz3$sE724a#YSS%*L`q7ws0)K!) z$hUZ$qhn%J^ULXPO01I6 zQkMTHI5Cnkw^K!n-%6eq%1r%EVvfwBgD!vo5=_QT!8xnep{GSW^X|VITu1Jd`Z{nU zumkP2c9tP2>w$X}Fo+EjHSC<| z+_{=wXXA~nSDwhU6m}&}+#JDhp$fF*^XOOuf8>Lm?n?BM9v_B$FSYgSXSKrY_-1`nu0~Sg*G=2JP1gR)z%bOa6!TiXP zplHV073qDT<>bmL0i({SP>Gs6a-ZICC!kD7!%N3E$~`DTdoH1KNjk#wc>LThjNIdMjzmsZoivZO5QQ2%AXN>aVQ_Tv$I8y59(s zFpv`@%V>30)6lbqFO+-+5{@T4j7mW6pLJY@&4G|1Spa?gHCm#R2R&5!Ksxxq5Mech zX8wg#&gSm^?xH`L_iZOqRacpXhWW;CrTc5>awZ%b`-{a=d(Kb@&#Nk;f?gV`+-dJn zt=B#AY%&}={etuSm1Z^Se^SILg7PCw6;xkvG&u8t)*z_=FZc5c2ACV$)?06h=o;K- z;{eHdlb#7gMeAXf(Djy$`$>!*$Q{7*?2i3q>+}ku!h(#ykkKlfW~{c`0ue*WJK4+7 zLEI0#=5~>&Yi30a#2bC0Cn{Lth<@Pl+6E=LKt6pQ>~MELxV+RH?F5s1W8! zHF6(KvG zA>n$2v}6gG$m>4AzVVJ#&_@+Hm+HEtAYA>ZRv9{u+91xW6T||uj0^1cS2x%~Gn9t3 zC1cL3Fu={|Egh%y4j(la((6Y_IHc;J+5#gArcgUeTTe&%+ z-m;pWiC`=J9J@LXWD%Sxv=DKloiy2L&S0u}o>xD9snFM6A(-XR%{`P--}!bz!(NieG-~T+ z)2aLPJ3H;|oz=KXnI+z^MSduQY#Qn~} z!G1pky$xP}oefj=4bqFzym8QH#aX9T3|NZF18PSe>I55XAuLKci?S$190ZD%t%qzs zrVLmwsO){KKK~T)QEvkYk|+yC48)f&wL8gp>n`PR%fdSUnSa4_4sDb^RLk+ABFQ;AU-HDWj}x5&lc{9fhOIys zs$qOjtAy`{s4h}eB z7%a)gn9~=)Fsk4yRWAaq3^`uOPvt11#$~h>uh--+`U|LUc>a0hqW4wvzz`@c+7yt8 zQo^|xy~!Yf-I>-$aMa?*QaKifRl)g!KaP7MWHB^8Rjyi%sEq?&H6L6-wX4aiW*)=s zN!g{L+;4@4`59SPYkWuYG*TMsU0O`lYY+aK^^0LXOE*yL>P-^O39ecIlsa=cRdxhS zs@{rnxGhZ=`a+q1#clBp;JvD337mojC>wIh>GKi}Wl%XyYAlc$0zcCkXZ%{y(`2e?{!QOoX8|G5uqe6ZQfwy_B(a6Jh|g zj9P!PLTql*id(dW4gD_!Od_9_J)xBTdfIqamgZ~kb|R3o0PJby62S;xru}np%-~`8 z`~eLtR2`jq>sg}G8_Y`Yl1xY~tD!!a=)lR~QZ0@=80>RLRO;#Rv9o7h3 zJCiYS4DBq5oGUa+foJZm;ziyJ4e-PD`uXo$41fn~qr79iB z1J0o#;;ZVlR8`~OVbZSyoL7Eazog|E&yA8-=1jrsAGLWO;EeZ`25D;*dJ!gUA`H-A zz{|+Szr@4jm$kW-Qc4#Kx~d||>`Og!W^!N89rGd)Ymh0y|B{Py*PUdxGICDaWzgG} zH{(^GEle||g5gb^;SHB9f1kTv!fB(%cY&2b46W2NIIF1`bW9=87|ACcLN28Z0AAAlcYu-2I&C6Fy zDtX3XIiLHb#82J=&?UG&D6B!zX2m^L|_xvM$T1;?+}X0#!@+yu<^Y7C*p~N#66<)z?A(lXH!rL_Lp-jhfKS zn6hBPasg&z6=uS$7Uyb(lhA0rE5FJdYZZrlvoyo#fxIxRH1Soaz;HO)=?1__&2m)d zw33>Hrls02p_!l82T2IiJE1Jb0=w{T?u5lOeg;GG-h!la{MM9ssV9;dGe&K14zTjE zysffdx_>>a5Gjpbw~&u$0GGT-hu>^;a{SBJ4T?J?=%}o)m}BmRCW)r*Z>sTTbF4VP z3s-qNAh<}D@+-UhsSHEWyFKUrcfzQvHwKh9kFt*V#yAC-e-W7&124Wqf9f>rO%dMo zE{xP~96Av$5{}L$bo^W4K*r!d(WCGebA_Q%s^zw|FDq+2MW2JR_9cxBQ;MfT3(~HM zcECN0wrGoL@8DFX-8M$3HS)Jhz*tg0wH7$Yo$T^m$%DWWspF*5x}F4T?;paZ-dmem ztT$4A4SYSbE;>!LtY_8NUviD`m81y+%--%idc3{U*@3^Yzqi-g*-4(XI*)esO5@}J z9>{*b-}o->XQt9>V2gT|lwp^;&{g^H6^*!#lLrn{wqUl-NFDWlRTeBXGV=)2AsG9? zK=mM&)zC{EM50!4lV`9(EjIL(kg5X|`>XQ2I)vWeO*sFT717=}<^9sPZFQ>WjmG8q zZJ!+2au8Bj~y! ztKjXeApes&Rzaf9in5*$7L9Rep5)OI!NQs$)}RaLI$Wj`AgFPT?*OPD`T>V9j4*po z+i7~Y%o@3As`E-is1O+RT~u~T>wx6{5_fL9ZKc_Ez7LRhAk;{=3n+@B&aO^XMLw3R z%7?aGRq5R*7!*ZGEFGv8N!#+(euMzo7r9B&*#Ytbd4t}_eLX{-B;Ocw{%et3l-mKe z)xh4>wnZ(j^{@Xh=a^%R$+m97sLr7=UXZmYpBZ+Atq-!7>a*WdxCEiR&4qc8wi*hM zy+p-TLb}+wy6#;_y*m~@(UI&g_NmG>xln;9<>Yy-4NbWfpL7JhY&xNbk#+D5udL~M zy&+k%Iw>#Y%b$?DRtIkXA*`!A>W2$kKz*TkS3$k>J+-%Xwl=$K{mrB8&2-CZ!tYH# zZ9EVm4fJl@sJ_Y%{QY880UYCCcj<}ko674|#?wZrue)z=ZuU0&yE}t}{$>^!mOOit zi5Ck(dqe{QNyiZ_F2x!3QVTH5E|`P?cOTzN*@Uh#I0TPSdt|opI%?rJa^)?j_ub0; z$-qAi6>10^!4?D_4?%mgw{di^yTcqB!a`^%Zv{uecERmF6!{k8DEJlAR%{~;yK3xe6Q z%w$~y{_e(v0u>8m2PuX~J#z04YNwGxF@wT`e1-B5mGp|>qicIU8sQ<%< zURiCWZI*(aK9=f40DJiMob>>luTB|Cy)LCW+z_!-&-tB5Xyjfge+|oZ6(7DOfe)0# z_s*?`tGGo}aZ|;1ZN-~u+8sF;EmrW(zj3`07QA9sgvNv>kY89dOM|JH0;FBaW!RVX z(zrTrI4_;so$rS;6>J~HzQw;7c#;iSW_7b|g`j0t0}q5M)zl5KfwDs;M-ZHm5r zu(`goy|xa@)<5bh+uUmJ?rtBodutmzhX=il-Ho*_3KrF$PA2EsRC>v9HWE*yczsK^ zaEe$Qxupa8>7ot{Rj8ZrUrJS{!_}iX?*MPT=p(nNvhNy%UOX#a)%6P>-VO`AyL&1HgLjWNdJ7PN?@n*JqvwKam zx$?qvUk^S(!ZSEA0|(bs`?wy+U`iY

&`a1j~3)s+uM@C^R%KmM=QTL{3XGa_F~@esw2paOEb zN4LXou#^KS(uqy)F_3q)O%&S|@8{?%{JHEkPS2t8ZXx{ttgbM^@Ze3Z3PmOy8A)kC zOfpil>TI*9kyQi~7pEP)Y_w{2>OE>HVG&C2s8hPaU5(L^>ui)HiTENJ{2E|T+S=$r z)lPMuNj9)TJFyYbA!M|}ZCo7Fgi*F}VU19+5q+?8V>k`+JMW@TsoRP~+<+unK6rB# z^^&3m&^CC7BO%lv?uC9SH=BAJ^|qy{terHf^zH6ucXxBMn`!R+ zX`^V_Tp%^YIHzGO-Rtj&NM#2RErD=_Gs5P7PBy#?ESjUa&{kKO&wKm(Emg?3I<(K! zufT170BCuQ>A#+WOGB{#;pO+gQxo_n69h7BPf9{YMtrq9RJRdk0j!>4MtDOMCD^*@ z@A^Hvz_;xBw-s1P%`gZUK9mN@LtX1=KWhKNtw0q31SPniQTUOQ@bi;Wph(d5LxIvp zg8+~Y=8G{>?{a}W_UV>r@0ZJy)gHiawqgzICs<~n;lmCw57E);dY84j_w9>sRwWf% z-B{b)+P*QmZnhx#uEzp_0(tULhvU7VbZG*o7-0YY^H4Y!>x)yhb|?SI0Ik@NMiPesTHq>S9=*f-g}cpL(?3yVl@kYUN1T5ujFR;qNIRp$IK5MXsISqhZ@n5U z)0XrzeASO7CN(dgu`PEP+v7}|F^NH<8Px4nX8!!%tFgPecDK8>zDNZ(?kah$0CrpX zIrI$i3UMP5A2)r-zMb>oW6I^;iJI17;%c;J8uTnK)Y;xWrcm9#|H9G@IPF4*+WO16 z+SC#1B%V|S-QkCmZGbL`&kBw}7$O%Ym5lKi+uf~9#%j9wyfb<9&sD2*nGP`jO9MGB zbR@2^c4_V;oXchRRN?{$p=sW)T|cXI4o#;AqOa*Lqd_*aErM=x?J!bu8^elAW?8pG zAstLJa>oJMH5n6uI!)yzD|<`fB|sMeL}e4sRp_>EE=HJ@J^*%jf{_YMO;xjqnu&b2 z*2JkH$aN*$!JEiSdUOCQIy32~M12=bUw4L;!H3*s`10#Cz*EGRwl)S`kO)hFlRETb zjHiBm*hOFHda}eLvhKy247E79u7S+qrHis^JQVxk_G4aZG@rJB zs+WdkTilG=h{&5f9GSH35Hymlp#VMBagCxFYcwP%X<8{BT@A-8#&&RKWq50Yzg&|{y)G}(j_k80BX35eucfHhfgp^ogai@2bKXf5@H!jBhuhm5H$oqE z(3Re>R$jTbE9vj*@oJ0o0{Jk@nJV~XIi;rA<>|rjpjY~2h)B+U&$Bf!|8NhhKkzvQ z%?Fgu-0d`*&AWH3x*6i(=dNS@Yw*N&X$_|ilhK<(($!j)7Md<2#@~Wv3tV1bv(eUe z>yBphAtE@@yDLujE3j79#xZzPDDu<<=$Ix_x^+@Fh#+yqazJH3N7qbY6(I zuUfIiyj{QDdhzmpy9mWt9jTsN#eZYM^UB6ssu4MKB|2WtJsqXRZIuo;IJ0wUv+hWE z-3)`=P6JB!&#F6#i8i`ldB()2op;T*W~I+l^XH5qTMYQhCxS}1P-|@E-{;4=xSHA ze?`;4q%amB6)tyZu_d`6;6XI-vJNAqx^A{+bGu zcfA81smhq;KXH&0{srhv`xl}r5KIQ7%_L=uw`(oAstb%})V9MniXD(t9A{D~-{pWo zNuhY}+{iK8SYlt%dk>^F zq>tWRJsO>z^j4>%Gi6?@2Uom!FxCz?GwhE5`wg-CKiKVH>btSi-OvM4pdYm_M%3{E z*$3w=Ch1iW=S_y7!65H&pr#0Gux-U62KMGi|8q4u7>!rQAH+(UibfAV>~NXfiw=An z%Od@9ps7P*<@D>Ipr5Fb&JlK9Jrx~sh-0I1bJdG6f5z=;NMnGr^B&{!h97Cu))>xX zgC)a}!H_RJgTHhjcWq)X(Y^cn6#?=SY=}{<^#`v$4mRp;jitH;fDjF{Nyq6XJ6(e0%|rtp_O z-8-LB+)*zWg3i^$0hI}`m(D4#cmO920UmNFTICt?V+!zhe7??l3K*^~Zj2E&8%#f2 zj&}ZlrViI60s?Xo>W_=G+vSzRCutgu!F3QrLg`ybxY`g10A-~d=uv4g%s(3YBfvQu zT}Qe=$27v)xn74}&eG{d!(gR)G(FL^uvW?Y1mujquybv?wZ#2M&M)p0VnvK^R7|~0 z8rM-YZlQ(6^2uhJi+iiyS%=qnR6>p+`3Za|4r!@_RkBkPa2_cwJsg7jRva^9;{YPI z4~BAjLbiK8q_qYc*Eg&y>Jw+}S45gaxK8|yf04};c@*oMGP$0h^yo1{lwZW-NV%a0 zARno}s>&W_JlV5F7`9asc)WG7&?eaA6>6tMTVka-kkvS1#LeN64ooHz*{SUO`kn$K zk$#FQq$WcO^h>wHy|dQ06xm1&o8F23iui`bZPj;wTN}$Sm`jX@mpwMrFqUwruV`Qr z#T8Kl9Yy^@1&_d;5K!vo;{ZHB!@ud-(Xvg`zbVcYIUNFd{U#k&LR}Lz-ptK(ftAHa zfBIy2KoFkAb1pVsVBmuEiFLt&^{l0u^?Qhc_a|DT% zA+F_j^bKkOT zus%H}*=25$Qs018$(6s_w6-*RgEt;~4Q}k0iPvaaQw37|F~@lO4U-TX2FSNJdO>A#u)g>Gvup_MVeY9&i4R5P(^p) z9n%uIkK4c?_yMyzbQzS*)O1Rx>phZr8d`&M(nUp21ldOI0zy-!0c?2$Aybq=G*Th> z2T}T!N?EQ6Wq)&~NzXX2i@Wq;2wwxy5!E$JCRAcBXds^-u+z2n4yjX_3sC&~Dp*T! zvVmj6Ux1bZw^UIwE@Rr{;eg&TJVDT9;Gbjz@7OCbT?BInk%f0n2Si?j&Ylq49{%SK0d**@uA zgF&>Hh7^^-Zv%QzLfve}yHC6VrD1VNLI&Qfo9EGT7iW~?!LXGd7s{CI;8Gck-W%o_ znBoeI-rqUMX_GSOp9{+_r4!$*Lt6IpZbHS>?l;X-L zn&6GRB-n@E1mCxGDuyHCn4Uam!?-8j`_U94$eG+AgOa`vm52F9a26%Q2-5iY;*5-m zy#dm&^weomcGUqyB>Mp_dd-$uH~ioebDbKV6L)3%WY$k-0L%Mw&|wdaJ67_PMxKR3 zBGWx5OLH_LwwP;ov00VdN~c$R|CM!N@j~^gzNW5_SL>|b-Pu{&-ss+#el4)gD%MWT zSg-{!D>1vTPp-@pWGN9LBP*h=lPo~;3O5E;fmhM1iRLo#4LU-o1;}#vE32Po2Xr+^ zvqkOUoO39kwMG@bwVv(0dfu?A^ZwRA%=SYLu=jrSW?|kePoVY|iwq?gstJVL50pc; zm&&Jfm)eC$ew;gHJA4#`eD+O_XQ8=lpxWbFcOLEE`-~VxB?E8g?v!>&pFTaOO6;(E zC|9Tyt;WGsYtq)U-kWO2N2e5~eI z3<;7I{hXq$-%#F^LaMiN2XLtBB)Kw5$OMm9DPzXI>;;CLiHJtP?mlw5%nY3^F@quC z>-ba+#%qxYIrUq#@sUe4r>-(okF!y1o~g{&xPALqx0s=sG$(gM1YUKZ4AV{*pXgDf z`Xe5y7DdF8r`2HrAo|lIDpraU$~Tmo?70t-U9+!xMEnt+3&&Ex)?1wLlj*UL;yV6z zI0(B?<4xq?y0zGai_67Ntnw_Zu(7O=qIQNA5pf74EIB#xPjP#kOi3GV?GNA0+{1+y zUDepo7|HPB7p>1ouj?7=PnLdkx9H3`f11A)ubsSbe(w(2zAF>VY=ld>L==_=+hc;Lp{9vwiOq{v?ZQAHkvPi^| zJ!%qhI1ek^w-Ot10jG91g0l_Od~V#nXhergLhhZ`9^64_^sp$kbX16*;XJrIr`Z6W zha%ob6s#=?H)3g&RNurRpbFJpt za9Q8_@COpYI=}Rx!3OW{wR!?|uMM!!6_9aj#f12kIQDggxlwAZkf5^-=;!k050BMy zGm7`60KJt2E-O28wAW%+qRqWOJc}YAr-;}Q$I@k1u~%`#TA#1#AP$%f&&_oQwdp0J zcwO_bJT+VyXA!O%^bYWBf$4MY^5Vkct}H^6PVLXkP2~BzxVQ$|Jq_D}Lvgq(LbHO= z6Pg`ik`01{fIZYOlA(3#2L-l1m}d^&BYM&+{bv|No1VI5!?(pzm{x=5@C!NmXli|6gqgH(a;?{l<;lZEQtW zL+99;k0fp6S;irlrjH5kIIw9uJC@yN+%czwV~*j(wq1n1YBs5_h8>l?Q76*Vr$D5z zie~6`vRjli<7p4UNqA4zR{k7nM1{(_wD4%PF+D{5nola|SD+BjsuL_Pz>0&8C9Cx? zOo|B7Dw?-7Z@?1Or*guyg%JG5G!_>#QkM96I1(V)2y>rfA@R3qD;Dz*dVgSw-R5>P9}Tk`i2+Ra*f z3!l*3!FY@hR>gP*IA4ff6Be7{;e^JP{o3h{HZ;}#EWJ&m7RQ_OJ@1_+xtl>a%oj_C zZ0DK7F(Zf5_2`2dxkCgq9*nn=QYGVyk`AhsN&;Su(?xbnC91xybA17PD5eJ>Tt>GA zDh0M3&^}eovqO3P#sUP@?nBeJGvm!YlC~N;3X#)}orXPOf~(EOn+6K4a2((VO1#6(y(@Rta5vkqa7Ay%^XoKbiU zYP0{8n{u^E#P18FZBn~yq#oUWZlGPXXJzQVtE2ru=*;^jmQN~~FObzYi|+MdLk3PB zQD>+l2DeaH1mXA3y?fuG+=ZHC^G948`*}MO*|8sqH{ajdzW>|uldO{NJoE|pY(m(lR!3o=^i^L#o zs8x>w&Bx#`hHK;k@Z*+b=srDx2o&{=y5{XQ2N=)=fc9=`mu_5BV4%7H9ad?Fd!`6(hBB=3OSl zqb3k;3c+sGlj~p8J(;S&)^hh$>-HG&+d3N50fK6l8;u`Lg@J|W&W5PL_fE6>T9>|b zXw&1n(g3g*%e7HaQy8bxH`dT9H3{**DKrw1)ok@2QH-M7x@x&Ah@(;cZY+5mj}^-> zloS*L1DNBY*ERWIJF8=QG(Hz7X2Fm^rKPvvQ>H>!mm-{7H;9nFnfBgNpSl0&IdxHa zfi9+(^i^7IbxA`(g{eZipEk`TSQiTP{41@vh@#vRX1)Y57_JE1O7%Z}D@?h}vwi!BtG$Cg$b61-LJL8i z#iE{KD|U5)QG9*$a5tmh zR*^#20NMlca`0go&(W$I?wm<8#52SfyIXs3O2%$ijjzb|ul>_12lGOqG| zA)7ISs@YW<(A{dWl|6ILQFJb}Ua%G2==9$sM`*tnf=M0YfI12GpDd#GyCEELnBiE6 zLbKeRKQj0Z?Jq#vhcazkbS`yaH%y$z?ZL&H(KP~;>v5*d9J|U5`qwhafMzA(`a}j9 zcs-#~7ah<(zN4e18ymzTP5mOdsACgZ>qe}h$~V2x+)zf-_A#NeqQE_6J+1%qmw)*m z`om29HkNu3b7)Aaq`=nPi$z+uOkiCjf-%06>N#so#P z=??I^Wv4zD6`^V(FII(EQzgrY-39W3oEqSK7@5DJEx}fU*b-~-DI`Czhub_Q`;#{z zQR`*xP|CDkOf;TN`HP@S^T(nG_PK8|?9?#Hy#VzScEJqnu5NaBcGou7=W2>q1Gem| zfQV|&5hP`^Q=r8~INyou0+g~v@L%1=(wQ4Wbv2M;G+TDK6p`W{y;8@&#Ofo9W2Tp( zK~DJ7J93V+c2;2~kb6Sw?JtkbnG9Q=8JubAv1Ry%xz6VPW)vUh{a1{iq7ZdXMm3H2 zP7cWy!k(}paH04D1ze(XtKg9R#hYb}qZw4Q+4sWnTpi4pw}dIQhteT9cj$GT5jum0DPLaH>o)u_-LwW!GJt(w8rDDX2?6|s0bci;w$ zk~v5*jaD`#24gti8+2Cc9sxr10~I{j4hWo?QCaNxxAwu^CAU8k_THt8B}64Ipu%pI z;lGuB)5@(n&dWOqHfkLEwX{v;Cp;^2BDrQZOXysc?vApi?T|(P5xgXm4x#t#WYFC1 z1iGW3GrPg&X3ad^dnZG-qt?SWL+Qys%cJ_qSli<7xlf<>B|8*JG_7Usd^31|pms=M zj=p~a$;J$xVJOLXCcgI1(cVK6X6C<^3tO!m3=)-kId}t6Q)@zO4%;L$;`%8JVKyNP z)B)4H42sOuODcTJu?*ojIOd&kC%F0-y!2a&{1f*n;Z#r%?^!|a`lDQ>#} zr92TZEOo?q5_{G=7bY~kpw8T%=@h6kAszjwwO4vVxi$*h;h-5}7G!5U4|shc&Kh!o z*;Av=KR`n$U_f!=Ln;*u49?zUBTpi~fSKQ=KYOY*Y7+&K{*+T{C_FBxfoNr8IthSf+jgS3;$;mO-Ldz{6R(x2ClTZ10W{f!5>&684kzQJ`Ql9FrL zk{F#|k=InM+O0wo?9ztGsWFznS^DHvue-^;nLQ^9t4|j6)=}$9_=uUHn&;*G@o5A5 z{FE#K&aVwcm_S~D4NIQ%aWv!>K8qbs)lce-J{;&#yXDp8@0#N-{>wv zlBas;vUeXPbib^Ae{*Z&?)EM&&WFW0K$#l%Ft3ihQ4e_+CnZBzn;k9b_EWl}t7N^b zoR*t`Pb0er*f~+Lw}f-qKdP~(1khYkU6C8<*F1 zdnU<1xN*?Cl7k*)XN9kMG=J9m_R-^@2@L6U%`RM78eI*(D6Q5Ti4b|zc7s_F3>ttQ zkKk?2nepNlN%tfLPquDVU`Tlc&Z`dVpp8^xUeY%AWQGtyP7cpMcEp|aP3?%2yQj@~ zYZ2jF)-#A!e!JN`H@>ydOG&spTid%EoW64tW!O7Hn*spKJFj|7udj9HY7VrpK+TUD zh)u%2^J<*nt>8FMmNS)rOD=_g90z?sQlnE@p`yUp>XrK7-L#=a}t+>gf z?BD`Q+@5lK?V|$#Qf!ebEgDX`I)#EIq;0c2Pui_jBh_8q+Syp&-JBc#d6Xd;M@yn_ zeSw%(?cVSlk0P~tDx#Cl=Jw{=&Q@&Ca~EIYh;7!DN_u0Gt^NtD!Z4>`ms-19xyjWk zExt$|A!#6|lfBY#%Q`ryQPmUc=jFEAQMadV9*hMebe*rKlk?ZS@AEHL54Vqc8=Hrl zyWP9}>b94Ll2yW@`kn^ivZssFFqsa@H#dIXZj|<-1APakLt4?^5Qg1u=l5L4BMDMU z_Conpt?_!NsY1&~)fFT~gaPby9DEd-uZ^FZW;Xzxv^hg7nX}H?UY;8cr33i=Blp(nMD^ zSBT(->9hlKGw^Z0wwmA4eoy0dqDHv5#UOZwGNQ~4UbiA9Ua1i#L@Rnc#5UmtdO}X+IH;*g{KI1zrNwB z&3DrK_w=)T7$K((9J@MpsKX5}ASE-feY zyud1l=je{(YFSU91ROx21c+Wt9N%i8&Ovp;DXC&=$^0yj>kPF0LYm*wRbj9a1>`MwSYMEgI-B z80TsAdZX^msL{q-K^6QVwE#KuQ`ogDDmA5Msk^42oA6!j!BxGv#R2$+se7eI&Kj(2 z=5$}xFW60kK#KvW%fi03{g4jlv<;%l1V`rPXLnmaIVWh9&#q!uOtlK|(KX%byTdW9 zb$5rImcTM$ICru1I0J85r3+Ab!<%K?;?`GNzdf7${^07j$CKaJe^MoHPR`8>Q-K%) zgmmi)IC-BHWjl)GoW;^KCsIf)IFyt~i%@9DI#PcKcy{K+SM8mI4~8a8n~~S*AFtpwgZ-f@`gYy*#DjIn=ya9p?*hv2ptXoKSe^N)gpQ%8oQK+ryR$6x+ zym$)gZuW+rCp1sj@JBB3L=-`i1sKKxGw%8<*tLa4*m?}AV(h8nYG7X+he)iheABb@ zF*~gC=tT=WqW-9nv;V*Az;AmX{j!r?sTwEYQd@h)hByw=8~Qh01*n*ILt2@Y7MPJ{ z#f2}yy@xL!K5l=|%x_RPdP3>gZM((QM#HM4L5xONl zFoZ8q`cuv)>7gFpY_Bz|kjkkWrTtg(`nzgfsIUQ6Q@Z=g)&Xsz$5o?hhH72xQx>!s zU}?jDqMe_b4P+#(6WJSEpLDN3m!?V;#r*TuwX#nY$Z3DT($r)- zQ;UrBN9$=7gWMFg3QHB480QlD1Ca$s}H_EM2GA4zZ3nKR4DsS4)>o z|4%V8_3uY=#RGMBX?YvU2-x@DDuN)cC-9*elvf5pd^XcY9!$ZfuZh%vZA-WpHzF{G zi!$`wuk`CWY24RpecgBOR#tj*ouOXca!h5~`Rd<~-?!*P@#RW)ZH2#4$K<749UpwT z^5_v2?~VIi{qxl$3c&F>RCHu)&`_|ToeuQF&eaR1>g20g3u3Xe)b3jjizOT4%x6Zb zXMC{3(g%mCBk2z@!@)Ju2oLkJB7%i(bkkUCS_;Btg0uH{boCaQ*aMWoP=%@G4)HVV z!RT3>&p+wj7XNX54a{b31C(@We$gN_{O+-;+;2(n23Nm>qgToo_p?#O7YI?ps$oyn z@p0>WliArEe~Lumyc5pAf^({ zt2xnhUv5OCLXEfs>1u9FKs!%m-QJ=pB1_JN>8Mjy{WUQ2Ds5(h=D=;T-B85OQZH7V zaskW1@RwGk_@Y;Ll&rzX^RV{Uad8-6k9|@7KdLo4S4671WxIa#X2{%9LZH-?|M6E= zs49F@@leIh%CpaFwzZet!CSAa)J_kM_m0G(p^X@0pIOIc9}&(zm7^#OWDh*pWPJo9 zh7Y*avzSF%@F90pY`}I=`_+&p2EUV=y#M^iClA`)yOo{&%nge#mL~en(#y;6>94!8 z-w2(>n6ObzKb#&MIAA5qsjR`7Pcth)M=$^9eaA<};ylDjqX#~=_|HqmI>z}U_O12* z&wcBrElVu6>#XeJ6o$oKZcw7U&stZ^{jQl2R1kXg>0VeZ*bO9XTI*e~4YX z-K}mrWHf?)k=|$`&Nx;tJ9JbN+inD0j;=}*`^V$kgMP?BLqlH9QKM(dU&f|8nOkD=v<(zJ?{&c`f|Qsx|N zEgxI_ndvP1c==UC2hHda9j1kq(5X)Lq8)&@chMk|fEv9(2*%?4@SU>t&AOYlXy_&a z!Vh~7bvn!dFzN2Vm~+JP3D$BC-2s*k7sq%na*UXfR@4U2m*AW0O8X`W)|}(YB9=v{eG>BaN@!v#`&WsX@{){3hquQz0( z)JsOVD4k)QqOgNA3eFoPKN7>3>6-HlLE9}LTd#g(&LY&3La;n7KxCgZG^HptBVhyMDqa{29lLdmh@1OFMstFrH@g}B%Z2}1*OFhM-`VEC9M%< z@pI-1vLp&uMhrBKg7~PztB#nLPS}9UiO?B$Y)#?3$iKx(W7#vx-LijblpF|B8a6fI zoauUixGAGQMicxo;1Cl-aWn-imJ4ZhNNZ2UuH_hbO9nzZ`yF2xZZWx+>)DaUifq(} zGmu`L)8WW_Chf;<=Ku!>{mcMdud??#loB!*)&M=^*Y9rbt}pE$FItJbc-NY+KJ7PJ zFGzVfF&nYPz5AY8O9S{u)?gzY0nN@~3E(S6J@Aq7m&SFJ`x@c(s=be>29%91j3N;+ zsR#kFuyDN0Cn@TCH)jI23;sP5LVwKLSblszdUR7pwk)!7&#gnXrZnGP9wai2)QYAA znJ#|Cq&D8n%w4K5?6J7PsZTKu#`sP3-R#&bjw5t1*5m`-)6!Sfh?w@mDT>vy2g_@O zGHP(C+BKya=&(_6Ccz?ZejyjBhhV)p05^iB1suaCD;xO87-7n^%0&XKk|`DYn0#|D zfY60N$?NL8Qp5QOu?i{bq{RQ)-tv7#!*Ff|1L2vzg9}cYLi< zC3QYiYYpupkz9p5aC+8GZKnIj4O@1lepU>P$RrpCtZV>9L);Dl1H{gbI&yGrxcx0x94* zVq~*2U=6;y3!WX79Qp~~i!iv1A@suHZ2{ z3{sH9p+g{|JeF%&yUTza!I+3-o2h^Xg)kDCkVPO66YLR-I^KmAZJ5**AVXEL=!>RI zKWiwoJS19GS7PAr6zin^<|1_>#>!{RK&nz$srr3jreMrN6^eb+b6A@Y4a?LOQ6Yq) z4XKLtd@^)#nW45_?58z*IhNjidz3Z_4!;pk6zuf9;_a*62?21QcFwphQz+x--!tMM zb&W>!%3gOGo908l;Cqa>&~l4pfjO%^$?Zv9+Z&0pxc%P{|&)nMtSxOc5-DqDrq`GwxalC3(q^i~W+-N-Ei987S7&?D~Edp9(0K z8z-8JJ8y)Ee$ZtH_)cRD1@=pd8sNCHFtwmk9SAAfm6FTo1M9}?T2m_9WJ!_vvE~HzT0r=;19fQ9WSd>XThE zf!jyxhuhoRYyG3OyA3lmzj(5PwMMx0m{-$!jF@8r)PU}9p%3=ts}OoEef3Q?-~d1( z(4YrX$dGujyPJ0wH-1zfI@o4p`TGdFUx=nEyKSffuhgtG)r;3FD!N<*A)%32R-SiB z4^a%p1!tV~qKFt0p2BGWJE==L;)smCSPCl41(1_gcjJqVwJ+B0wjMuyB}haBwW>#@ zIBJo&{BbmWH3c0=TccvE_UnKD^*{ak&%gfV*Z=bCfBW^HTX%qcUf@?scTTG-r-az- z716pc`Z4>?NIZt{VGdh&SPhjU=x37Y?Og(48F$$Ghvz?%|Jc?%ikl*mxJsni;0R8> zBE|GM`+Pk7fy?~osu#P&$9f(9Ue0NbSS?dLODmI7`IC9UOfQH!U4n(c%86B3X|RQX zfk}y62`UiVE5w*3TZRknJvEX%v!|@>_jTpjrvzgW;zx{eOGU#MSHZaO5MctxC*hDOB=l0wTBKtJF!eqc)6uEsQg_XUETAg9PX4r6h|F{{Lc% z{3BG@<~12-fZjJ1)yc-c)g#wqiid-%M(P%8mnBwkktf z;y|snm@OsDo_Rwl*VW4tYN@RtHh_pk(zvJQ6X;)lsiLnYM+U-%JQBs%TtGX z?pEq*`B@2~vqc~wMg;e~yR`jf^> zz9~O@-;udB6F8!ldT=UzTnvK=WxV5_kaNdB3YW7jKyGA1UODkcF`)@PvKeVcx^mEY zu1p7NKwSeZjspK80dhjzx*523qHP!eHWV5`Lwaus`nAwEKn+djiW-)T9`KN!de&?6 zS=h5@w`}6p>`$a`b>&;lTVIyO+DUlTjSAbqMV^Tl}?uIqrGRJt^V~d z-l+UQax^0sV4EcwQNIU?=!MFLs=Tl(y+Ki@xS~q2KN_E03`PIViFNPZefRN>7iZl0 z4O^?K79s)ayeP8+f9{c)C~x(Xp!mu_(z_rI(})|(($+_53!=QW^#>XfGckB!<)t{x z^ehN2B2$WCwXjcSj`kz}=-6|a`Rnx5Hmm9VFD|Q~AKHQR+l&8D zf929}paBp+n3EsZb!sXBtWnotN*BPHfGwgsSLAP+NFT~x$Z_`RSe0)27|Rp;&`!Gg zA~wa->`mJmp9{2{T^}JuSDt_(miNeZT>Yk)yD(cp2$Z7RE5M|sLcz=&4a;H0q!lSi z7pue3v_uU~csySU5)@3J1%laUAQY$xUcr<=K>jpLysVx%6fEe_@r=P!U90fPR(c~c z|B89%t0`iS@kvrJ;?hCR)UHR_*k|vvSl4xk zkT#H6{ROd6+(+DSo{g}@L(>+q%$>vJY%ez!Q8>EFPOP>~{iwy$48U(PK+bt88E&P~ zsjJozwo5H5iU@wjMO4#PgBnbkHu?vLySs;LhrMMCr$Fl)RKaIR$Eed`vWdIR8$=Ma z!^1w5q_Tf9Z9uC=6`FKI-p;GsBg1Wry*f)EAKITkw5)zmLy6*|mWRW> zU@BQ8V{67p`(c%EpCz-h^Zqa}8 zK_l_5W&mE7h%QBXi>D9!h@cfHZzXrJ5k36<-jHU~S}_LV#ziYlprH zXPF$#QWeLPwP}}RS!RgE_TMg{&#Y*y)~tOT9(-tY;!K$iCH_@t5pLwzKOS~8@Hu~1 z`TN&dME$ahZGm?_|M1=9OAr&q#iM?M?q=r;Ex#cDr$9Np`+B;CD!u zjVTqN6h%_hPc`5%_0K9vC5x)kbTh`@1h0E;lQLuEc?%HkcnH?ow3O&`XBKLqX& z)p#DEQj}`UQ47dY>L)Sag3146Z=e9p46f!NK?FyR_6FGgpm8bD_lmM|@X1G&Zb9vSR$oZlzdljQ4ONUG7x708rHSCa;RN)fLIShc|td~TAUmP%B2RI8l7(o zm5;#S2_&xOf21V5Frb=2YoPk;DdiF^{MqZxc(igmRhy+X6Ri!#qdM)&^uTyEzCthB z-9Li6e?h6~3I8Mpzt6$lA3i59@ki-2zs91LN;2Q+&$DYVf!&C!@D?!4vUtQ1UCSic zh+}SW`J`1N%Nnl-qb^kX{397IdU4$DvHTBLWPj{7;|5A8{!(&$tHEV^{#LM!NJ!*x zA!N3cD=z_BORot9a0uciQYBH5wii}>O?7a|S-H2{iJ`*wg@ z(?8?|6xFs>ky5)?+uB0pU9#JvHPnLBc<+X^)rgC&hXs4hvQG$Z-y_9cr_-rZo4SHl z83lo@t}aDB>aeMjAy@)6w`mlqdy^@m@m@)Rs>m5m+bnKhXavW0?v@ z560xPT16_6T{Mtfc0htZJRa{&Il!O|ZyJ7BZ_1o!%qxU(5H%9#mjUNXOTU^~gBFyp zH8{j>3$!Y={c~(w#bFuTAm$t!Ff&qy)oKe;r*AX;vnL$9S*y!OaN3U$0ZyN-~ zfoG*98>i5buGm!GMMIpD;NnxVaI^wxYkDZ^?0NHF%KQ@b-xXBUX9E@8_?)EOXL}2(!-wGlKn7z+JfP{9!js?fPRr@u zhn7S#x->{F2gjdv{hv7q0%wd|d=`Dz6%P+dgJyJ}Kct)bImqUa#Kr8AXnYQF;qA7D z_jC}d+?Xn&G`HP8E5xSKZ4a(J*kNL)y51|l%F~ZMCZ_uhDvMt*qLLU4D{W4pqP=JH z4;OK@BgDb%jl(@N7EA;dIBK05Efsc7?_a%tkga;w(W4RfU&g)mQWeu*n6EQ1PpoCrhoPSCdw`SZQu(4#bX<$jYVNuu6PXjjgo~xtJWJ9z~7wVjHqNh1Nb5GPJV{r)}5_e>o@mr9p1jR1Q%SVtCG-i zNogJ8-!U2RvL(FRBNjcSmPLjG<>ydIU#eL);aw1Q<=8CUNR=eIRt8TsN$bAw9q&b4 zY*LK&#~Sl?8AP}}xIh2=`LSk*xPH@>qu|(6cBojW{g#T>Y}bJY|8fa>mzDN_b|ULa z%3T*?!x$u>86uu7>?njP%hSdwSloX(0Ns%&LHZaP$D0FT!NKySD!&`?XvFf>x~wUz z(iGxI1Vj=t_VSg<$+SK@D9uE)MdbAJZd?27is2tw$R6u^$oiT-E@oUIjsH4={_^SK z{iic&+^o$MbpNKr)3d=d^&WEOE59aoXq9y6ofIRq5Y;px;j#!#j;L_TJ0B#x zZ%nT6!GwZlK$bV}gG((Xjc!AZoR6#WZ2ZS0+)RBgJibex9TdBPg@vuv=dPWtEuo75 z09-I4@aXr zn}>IYTWF6B*Vo7U!@HXY8^eQp2cx~4!=ucN@X_m00rN^|f4)qhq#l(7*ACk)SDss$A6M+O#G)`MF1mL)4 zF=DumG^D`$a~b`tUosy@M4JLR{bnG6uyzn@?Mfon2~v)()~Z%O11;UfF)8CMa5%$@ zcJ61Yti(c43ka@qis0llJvebjwkoA6c^H_EI%=H?rujD^yH3Lzp|6`DV6Q;_1PG*Y zn%qh#WP?RX-co5W&dQ>I^*)mG!X6W2gNNB4U(LEZA>h7_|7h^y(VN}D&hCq^Uk6v_Ig8HF z6)`laM!q&wDA7^Y2OK1-6rBJJ^KKc<-@yqeS=){E^=Z5NM5tjP3 zNH$2X(?0@9z6nyyj}0LMgk$5koFbYjG#kBVYB<%F{V3gk`kD~Uu?ZXjqtyVjvxz%- z2(PO2tG1fTcL-P|uZ!Ky(8$se#lr?kUwpD>Pwv0|@1;4Dw_&YQ(d#^6$akmfF(B9S z(?jW{`(e%jaH(CDNpbWHvdMZb!CwKhPYG2QVHGl-8Y9eonfsBWI|rm7uWPsQ?hUJFPp`HRY7C`~Fz zSf9`zeNmk5qTHPMU=yBk0+Fu0@+weT2@V^g{|!t;1eOs6R`2;xC$j|*uEFke2oB_* z@2cejR6d5^DEgV$pHOdHrS(*krlFQBFPXx;*d7XtY)YC{g?J@Z;v#Ek8lABDSt5%= z8>+b^;k&AW0^YmV82Y6O3PrTX62i_2BZZVF%|!AL_aBL+@&N+=`3;rKbjRy0fZ1e~ec4-~qZtp{ZK6sWSNi&Oma7-zfp}S`AQ041Vz%(cd5aiP1 zDEN_%l_fJ*8r@7+O0q?2R$}FkoTU53s{>q+pm`hZA&ME5$)ut?clqT`9EIX&mo3i ze>eilw)hEz6&FL)EaNQ45qjlhPuga1@!DBjl_>=1i_>hBW7=rit#2kLnx6A!(6ojGNfkcCwafIG zS-hC|!#*+~G!W;|!;`*8V`A_G$b?SCGf{Ozwj z#Mtp{uLk*_-;B4XW1_EJX-BFp;nBzJ`V25nx*WqFsG;)(gFB=X3xv|F(_}v|uUJ&G zEIziYnwNoACU$4Vusu9NEF8{m^Ky(q>(FQfXxrIYjdv-|QT$4&)zPBws}=I5$+z5W zGF&(?3Asg&CjK3?9^6%=O~f`nWoL5vfRJg+td<7OjEl=H6@6Ci9y`7n87T4A{EYu! z@_*V?rz6B?iLf0jRN+V!GXQ^%qlY)n)}q8D!jGgQG*!2-eahnzPbUUj#bK4$s$3Ia zSJ$CZkqSy`=1>7l6d2eu%tLflWVql8aLaJ;+2%pAXGbawaVrLf;z{20`DW3k;xDby z+qJ6q9ibhOrC#l$x1Y{aayvR0V>PepS?|egAU(K=9!W%jmnOS&OS`TP!5K2}yaduslk!2?{5zV6a0&YPTkfM#7 zQJZy8V;v!;Tj4~|+)A_bl2@!};cFZ#vO;9FP7O%JjU(>6;L=Eo=u8Ra8!g=298})7 zxLXpKRzi}1$%1a4Pn;DyTwk7yQTkj*Cv)oxYXY6}xu{Ha=0G>-wvRbQ&idAcb*@`$ z!5xfamgLodW?I0+FSv1hvgX9$W;oy>4tOy(DQtlv8=&6P<8Z)IR|PMNb7ooKLexSn zvInL7IHl#9=G}A7m_@(+N`)oSp&=g2`pKr2f_=Sch%RVTkhEkZ^`bEG0{E{PT)1s2 zR+BxTJ+T6y0;pDgSkwVAjSfEsvA31t_wC+6;gTKBqtdYX9z2I?=Z4KzykrG6RHEE_ z>Q1IAX_!6zc*DHh$?+jPy6q4yt&|capukO$|FxneQ_~CWtI49Qg|4#$pJp;AOdp9{ ztN^Q(+KK%MPQ;jjkn&O*-3j)ubEWZgUtkZj9%1m2Plo!ux6}kMMsJ}R;~VM?nYub~ z#IwhmsSL|$liJ1Jx{(84#tUOqq$qZb;|@-soB^EMXccFJbN*;tBM(ZrpC>B!1Tl}q zQ&?|XWZ?Q>@0k52qPfqthOP^IhVt0{yS>RrQyxyF2zGIVkhfMd23V$4WN?olcLgCX z012;xpZ!}O$G|h#K7hGqb7MAwJ(Szvwbk&acLMaW^1*kkuMhcIwh#o5wC@KRBPh}* zBR+VxV(ey5(yR?D5x1yM<;45;`QIbpcZ{23uWe&;Zj~%1)ABTF3}EF=I|>uYtB|)M zcF2eU17oSg-tl^*@CQmjj_})eQd)6%hH3O{?T?75a)j@KSFE~{!k6f;NtT)qUQipx zee!>2S96-YAYpY^9M}hl9I{$>*7h%cQB{!$>Em+DS?XK*-$hS{TqV?&qtW0#L+%0g zK3pHX1aV@Ey>QPb=hEUw=*c*r$Lv_FyHyshG<<%h7T2X-wNK*EFzoGv2?S&MlnCJe z_by8o-K(UG=*>BM943pZ(dDiBJ%dNI=JFcQ9Uy=r*MFT{mdi3m_|nqYz`;dJq=-#f zmTIwem7*6h$T)<(&z`bs1dPu>mCmG_%x>V;vx!z1rkbpAy!xH=ctp|TO8hl(LhPyU z#vhyzi)svK`#)*Z!dB3`r+ZXF?i}w^Y>`srF!Y$aq3UT`jm7?#*w6%6LWE|}8IFI&%jfXiLQ%9xnM-m_DLMJZ?W!=vny44o zzQH@!@7%oAjhXLl-J-_!RwzTU0km9*^V`C{^hPz0)6DB_vHFT|oj)jh!5W?2Q$P#> z>wR&uh9w$Y`s}5;c<{3h0 z0+x03E~7OWKiNN_Ohed^;bu19GsKNFM@7ClN^DUd>;wQeK*+xqp-aUfk#h)Q59!}R z{`HBp2H@z`T}|!uHdBVG&LlLxX<^b7#(h8x2nLdeJEgPDf>JF%!Z&wJFX&y3I+jYi zx0s_I@7!Tbw<9!iTP;S{_}Ph#NvI*HVT;A8Y0=VfS!`^)b~_oh)=x_FXCoke17#mz z_xWBd8B0;uG@Y0{+?*_5JplxTVNBc#1{NiB7akh_eO-oZRT zRo{Sf&~dh`u-|R8(sg`63nK8_nCw=Hlr`Y33dgrTnNJXgqm9J{rVp=Y_2itdRu z1rW!*L4U{Ef1a18KP@!VrF2zJj+{m%z6kf`lB6&!jWh*_?}iU(BC^ zlP0{pjZ>Tk2_|J|VH}l|7p_RSVe~gtux10t3B~HCZd925(ebZVLaz2=%1_z3s$P`7 zG#bC$OoQzy-6-unKKOB)OYYuQQ;x{W-Do}Y>b((tRsE~BMmHM>(;T4DiF>x#h^{TG zDaRv5)#acrKH?ifTIg6u0Pki(SezeBkKZ8M)*(X*>uom^G2ex-L=I4K)w zevZqR@w<1Yw#aL*3B`+@)_$Z@HV1B**UPFTcv>mW+BUjs(`v6`bgHPrG0@mDy@_rv zrcXpwoA^|`((G8!&zlzO$hS0qGU_%8w}L*m?}4VI1>=UAE5o=nfVt${@Uhg7!J=>w zfq2E)Dq`+lqC=W#aU+iQ4m+m)xSSbUQ%+)%XMnA_D@pCv z*{7>mJDaJB&+5kcoUuC3T21gxZ7cRpm4}RSKIf`eIl4C7*^+}n3=N1%6Xm?XQ;2R> zu3dZ4^w+UiIPY+<%le($irkrCx9`1lEd)wJ37>bN`5EjBOdHd(XAQPM zrQ##pAuC?m`|gJ4LyCrKy=>zWIs&zca55Taq|^9h^yypPowAuZ0;13^2nmJ5CPg8- zR50&o9uXihX&oTRKz5xvXEAzjdowic`1M>PhH!5U8%-gpx}J0wn299-N+}gIqJxl! z=0yiSygF(4@ZiAxVx=6DlE9m58+X=D*|b9ntwYo1z-&wYz5=n;hZb}5=cA7pF0JUe ztZmR+^)qjuk~U%NyvN6^>v;GS|IN!aXu$}b&$t-y3MK*#zEd}jn!EQFFZ@`7Ofe`= ztMd>oGu6d#01pEW({QGxP(`n!;Hl1PN<%+#2%9Waw<>2*OrGMhl(J1`!c)Bw_@j5T z8$jnz$AHBa*}qV{Ds5|tQC~`AP$yUd6B=eJ((yJFmNe z;3WGeS76(5N4Pt&&SJZ35MRXzRzrEk_1r(%XSu;lJ-&LaLcF~C1BMt*v8hkGf7oLkDnTLc z$xuyVc{v@uoihzP`dXFxL1I+>E;Y%w-@_~}@Ih!msCLLnRJp_=H55#>w#f28Z`4FE z(K_J{j2|N>+v*@!w5gIk045N=D~p%04N5;}AlE&*TIxq;v}B5BWE8R;vw7r4#4HKj zyowF9D-{@EJVy&j2>;NYIAzGT5SYqUIItI(bp&%is=qz2wL;`#M$FFPnVCArq;(Cl(k zvb?1>+ADY!8ND@{g`9=ScLWaSlF=d#OeTzxVX{Z1`KJUQZa1R!UK}s4|et{FNXm^SprG!uQecgN`=P7y(zj89ebmEaHt0)4g?m^1&A@A^>y@#dEB5JG__kKG%n(ETM>fR6ay}~K<-e?Zrtu+-(&ph~f?N{G7L=oS&hL4sd8gf6a92jQ@Uf`B82CfY_2P){zOM&mGc>KV=%S$g;^5$=L)ZdAT~^K{ zODIe~K|!r+bb%}Z$th7U2cv+#_S3GQ0l}D0Z;(0-el8%OLc`KUJTBZ^qKUQCWTkoz z;bDo?@}HghPWRyk-$A1x&V){Lz>L>ReLRR1zNkEkeS29(>vFo$OF=^FzR1k0M1V`1 zP6b2=aL`ad*oAshk%6GlFh6<6+0K@168Jh}W!ZDC2JNczew5xE$}gj~keAkR1(mcmsHo$`&(7D((13#YMSwbUQ735@_?SVv@#WF$V42i0`&zH4-yjJ!_#ON=+^sU!*Zon9l z$wImPn<1o1V+}35dbE)bmCRjyY!qC z*-9$eB*)9CO_x4Kx1ZheLVC$MCt~qd$lYcZC*IH?CyY(eCJuVYj)^u`PDb%epG;P` zp#x%VM1)UYAN=e6cX@K#EP)n0m64FWdz6%dMIsOQKicQyy$SUdy^cA1NLyTXpPgYP!cpuW^E>8vGFg-qK*d*G9wa^b;hP#ODQZgo%wFUq<^4#98h+n!%#A z(%ieMp|E!{cd1DY>#CZo4+z9!I*-D=m*lea6zryUK4T{|d8;_V04DYoy@;B$0rUWH zC2T0<+jccZp5Tj+LU3#=X$uuxzhXB(dxy@-KxmC_lMhJIZCso>R)YIhuFZ1=#&d}E ze=tCsEN%)U5|FN)m3(&z^H;B%e9Pp-&7e(+6Y$i5&c5J6*TuwQD6}T>By8qX;{2WG z_3F2qLoSPp{;j&lgc8Ed6eb2#vo;#0X=$(wrZtSvmgnIIr7NUv2Za6@1y9rN&^={k zF@~}%wR}pq8AK{9OFe~LPqRl9Dy^DJ2-A0&qRIF3ce6P$`-{=(qD>MwEL`;ZeaGps{*X zMj5czsw#&ER!~$stR3yBYTv$3JWJj`2v6R0sWwM!uav-f7=R^n+ngdSiq0+cF=+)? zo__d+iXt{6a4Lov6scx2r#@L9Pe7Kn!4o>XJ+X%~{**jho*-Sqg;u6H$(t@3&Pvn4 zbZpg?OFGlcM3&~n%9^*t4AOy}j(+7}{T<;zb1V6l3M`vwM7|^S_-2=)1ras-S)fI< z9l*(8Z4c1u0nkYL?fe{BV3a=x->bJLMif542{M0}7)qsELn7eZQauRjIWM=kS29Ku}}^MX*jW6q`Z4Kl?<~FfgMxh6O1+0wp#@ zR;83xyO2W=w6m_x8>lghv#m?F1-riOSD_hpmL!{S_7+F8F8=%Lds35YKih?_WMOrY#%4A;OSB{{z zP8?wl*Oc{fRR#Nb<#NbCg7Sp)7)-vr{a|oyd*>UW{_IRdQ;KpoJ$yXAuGyIc@pj^k zm94ei+iy3MH9l0^s-cYRiU!gju&{7sbfUe^WHepv`LWKk37qJZ%-Kdl3J3}u8y7_N z?%MO$+Ye$S=$h4~7ZdzzT0!qnt& zxV^IgA}uj5&&R#F7*i})2>OrzK~_gCW;*#uhsNU79^`Gl@olbrpruN#8@F!Wy1BK! zb!%hmUPsCG@Am8lzk2oj5WxA?vM7RfC|Z|}mX)SYTU6209Lzp(xT*UEM+M3eB>2#d zujPgq*NOp|tb`Mc6H2T(W0OE#htl^T)xgv(WI~k5I~5D94zvOfR4=0Ga;Fm&W!M`< zZ@lUE3dp#64NQ-Z|(yR??bqCj-}RR z?vuu4N?@t|q6hE(8r9f=MrCU7=+99WHv`D`r}c`O*lU*cX3Upu^0gItocJQW-gex_34f+*{m&P!vf~Ux*1WL)jcqeF6vk_BhCn%ERDXP4l<*q;% ze!&#ZmZsH)kYjuq{eI?#s8pJ_n8f`=u0TfMZ4pIBGXmorw1|1%(VWBGvrgK`1h4TZ z(4=7ea@&eJTQtEW$qQmGdqkg0!i~8*Eox?5YiXj@-lYfA5wqDuzftW@w+Ep{`;Km@ zKZwK)dDW?o24E!RNB1msxm@{@jnIU-kCTHL6mVNqif4ZaV5Vr!#ju-z|EgF;DqG;C z;@T}Z7Vp#y!ra(g`atOe^L|V&g2@THKt1Suu{M{=ha3V#FyoU$4|vq5(r}U4hSrOL~5FxI7$!k`|bkd zgNxg*Y`X3Qr7~v~A6Dp5QxsPy+wU)U5)`N;>*j;$)RoZB-Xwa`(}_d_P#HD%(%c>1 zfH{yFq!7syB`pm*l|{I7fTqBM3O{x)0zA|b{5HZe$Hs8w1g9jfUeL-XTY z7^{=v$Z(T4!*E=A%G4}?K~VQiE~Ro^4_QB)M=}uZaJzKj=yAF(LA6ZZm=$YsWMbG_ z#A+^?1i!p>+E-gI-Q)H6_pWQW$TDFO_dV9Fwr)v7Fgwi<%3;2Xk%dT;4z{XVg z(LXWWA}yluutbi_4bZMru!~571x=~%p>(uI)S{jhmc&~>S6B5$Q0)@~-U?6j3O+~} zLtH*L8Ani&maJdf1@tyaxlc47RiB;GP+Hj_Mu~WXqnyZMQZGd|I&2h9VWKfjMeRGX zNPP=$=bZ|LUYSPN5BxbH+jwF;eL?Z64QJ``-#jkW0c!(ear5`z%*b znDg}W3CakYluAE=!&zOJ_@5;!MBb9FahF9n)%D!GJ> zMv}(q*6{&}sENd?9M^b_yIqmM^Qqq)szs>~|CK8p0!(DsDsaWfLbX1L;oW_P^lwd^ zqFfaMxx^(wK+tq;Du7VG0uHa`aWmA>6|pu1 zTq}HqjHZAZ>&$%BcEAc9O&YouTtO_dR06>$@T_4|U6;UFpD*-4b3P{LByuD)1(eHU zN8LUVZ}1C;0l0zgh0YN~(5LdS_EC613nJ3GGQDVjiPQ<}P+Tz3h%MDFHeg0j;0KfK=y{QMRQM*ST2O?!pw_5{`lbj(^ruo{PM$# zXFD$*{rK|X_UlIvpN~GR-(I1F8<<>=wFnYN?mQa&0A=qpG$ho*=&3*-1K8Sh|L3S! z!G|07h3U8v5N_`Ji<7N;>l+&zo440DYqIrsUjgT1y*7jA8iE(C11OtmQph;!?0nA6gayn}5y1m@1 zj3Gj?pjRv79=Rh}b8E~I#n0(1)!k z^rb1c4=3ZM2Sf!orG50OT^4%{Gu6WM{@3kwxCsS_)>WNA{7@E2&)QPK8SG;Cb?~=n6HZJlO&$4++sT_-JT6jndoYU8V3?` zUd|>ZZ&t{o-|Ae^c5ID*A**F-%9&cQQu`jv zha!cA%>#13@L`%#nUOAqY=0;s}(+#*4U#D|x zVk^l&;z%Tz2>)={0HMfS0+c$X)k>{KIRz`4g@Ow#J#PjplKnZ@Ra=ZV)`7=jB+nJM zHysbhFb`r8IGrKYpKwA0g9Wekkdv4gI{ROXm^3<%3=5jm{pMKO0WrIjwLcrrRi4oj zkPs@WcAp9eUr|Nz(a$TQbTQw{@t>x@x+9}dQlgOB5=G$h-7=}zmJJslHP-i4?ouM&py?A!a2va3dXB; z>;ov!7d|yDO{wyuh$hmpS3UF~+{?Zj>ErB^&f$TzB^VgQ^RhC+rDlUWch{}pa|*Yy zbd^L(3J@R>EUwq|a)k(jm!qYq_Jn3`K|m^v6cw0ub7A<(fS{{fN6P?-NIfV7p-)=zzD}g;Qz9^l)|F8ms-Zn_9=?r>ELCxB8V$5 z3fM&g6?g=!)Xy!1s=JZJ(zdLLG8QTQ2FfI{Z5vS)4xmxDntv+Xq_~NgKe4jc@$}OB z5ELgx8+NI@SZygx{2l*HE8zukn*d4t+(%vYD#s?MF5H?Ckl zjb3%%Av!P`3qgKLmXFnc7@aV-v;pjp=v9FT!(4neEZsj+Zxmv;AQs0XCASXQR3<@r z`}*KrItJ}_>cVVE(1PfcfjREUT9~}%N`~-~YmJ#^tAWmv>-smy$3!8M9z_wgml9bL z5C(J3IdD58$42JOZpW)Jtaj#d6ljO!yXgZ$tUbhdRr5>}^i(DEH z_n;#>umlzYvdow>_Tc!CdO02v^r0*nOHlefo0Si=sr)tIG_fL1%9r;N>%4I(LLMz} z9j~N{GlxubSL&Puff#|Rcn9<-#fl$(C8NV#rSYOjkWZz!$@V^aoXzm;~K;YU? z%~W3J`(_@xy~fmyjk{}L9BfGw|P{Zm%>H;R36I;r-=+>BhbFyG-zFJfAyZ|D8OvyiQ=bfp z8JSiM&p;R}S2wo8p}=IK(!_=#wvf-uhzDn+F*zl@lJQ5bMBZS?Usn+5Nzy0RW%VjY ziSsE!k15vX(>|*v_t67n4Am6u<31`%*%LmSm`5V%P3wwA4?Pm9Man!u)fL3kp)?dh zG{_Q4#1oKWdPKe^l2eeJf7H=&h26Ec&$e0w5gBOm?(MyITLqzdu0TWwPkAeE zls6NQd2CpUsi-a5nxDA+eAFtGKQ&?jV%>b2(RQgkYj zBV~Bt&6?%JSr+1Qn(9_8-;>vdA9SCk6s}L{y=ojS(au;`7GluQ^xNSpU&!SFB@b0T z!rTKc%%yLJBB(Z-y%Xvc5M5O4hzy2XYOx$MRu6HkRep||Jqq(2%hpQD_Pa-2c2$!{+?js>(zDR4e>kI{N0Z6m$|2n z@C|~J>KkDNuL$I$tpRxQt0d-qz-6Pi&o+jQZLN*-#d3P-#SW$S!{vuIm?4Yzjv#cz)V~*ejQ--^9dt?8}_sa z$4N3`q_IFTjnmFg*p^b+g70El&77#d1?Bs{FRz4BlzyxpI$$KIKz>_pZaf< z*R-bGXd~SpBMX~j@Lp0IQ*To)hx#Qo9YrTEgMo!l53ap@wey&@)FqqWi&s{}6FD#0 zEf4(IUP(8gm+&e~9gD882fbcsuNC6>viv#n_NAACz^W7MyZrsS?k58b3b0o6N;Ik z*uHkKmO!w2#O?$=Z8~-&cAp+WJ2P8e(rNo>62C(Y64}t=J|m6lX_2Dwy&AcY*pa5# zshecXMBdI>-DXiQI=XPH&6=76sOm*kaB;~<Z6-dm zGiFz5q+@R5g{sVUqDFF^Ro%R;#42rpHvovC4lbh_+^ewL1w)~H-HKE6+mHd^M(S*e z*>LaEu)afvK`TsI(Sf5I=s~)$d*n@d#cvqc2i~Pvk>L2vF|XjHN0-PUN2RruEmdNq z)4@NGviu=Dt2L*7PmXwV^A<`VHJJQ&xRwq;dtI$n_ix98P)M>KpD@lA2j(>NiLIM9 z$tSf7bw?uw?XR9vtH3D9!ptS2Q-~d|Iw($QbxtZtAe|OmLs6A`TS;4VhU(C?%APB; zYHJ~jQbj4rUhS%k>_%&;Zw<)Mv*Q@0zloyNnRoMI-FBp zN3JL|RLkmWs_yAK9+DT-_kn;RKQD;?BPR(wg2s}i=Tg-U->(1{?5kw z=Dm%kh3$9Ty=}7BVycknnd~FWU7Bi+yLJ=MO1t6^lr%nN4`$K0U^(!M&4x-kv^6WJ zT=Q&En=((zX7tI!2^E49;Ce-$j5_yeAG7TIHff7%{y?ocMeldPb;ktFD2Wj&hGs$f zd}zrfKOn^h(6Ak~24E;(A&J1Si5_ONIct(o_QIe85*L;G-2#rTv~%xP_NCLjiqje@ ziD03qR5?4_*zh(fvXm(wm)}>W%9vUeQEOQ;%JpaLQY97yNM54$Y&hq1MJa}bQt^?Y z@40hn@M{{AsF$d1*3Kn06MhBpAa+u>Vvc6#q_p~U8A9O&2I$bS3v5YdP%;%FJkTEg zg*uHkDCoQhsXJNLRHHoy2JcJWAi4wJL%ivVeMl~g>M7U}U~p8a(j_ggEsKQKVx*hp zl7TpkxRC!O?;8i{+%s!QnH!o$m_~eG;iD8Bs%vuptQ^d3#sJ(GLN|4%dex3m%DdIW z@k_#4IvFOkoqSMD3^hld%y3add@Fq=bzVn|98~zvx*=jLQT=Ud)|!GU3|ZG+phYyZ zKIHv)Z({QqL1e&o-I}*zpf)!FENS?0?%q-^2>(!*b^l8%Oeg5Ek|3E42`DwYQW_JG zt!n&i>{8F>M)QK{Xv6VVSsz`tv#ra$7R!=^zULhhAsiH zHv}Cr3XRv6!#*<2Jpenw%l+;D9vnb-qVO;Vc_F{Uz@rU`%PPC~3hU#kmgu^J7D|r= z*rT8sQBMiXpke;W&M|IFtWV8Ek;7Ei8Bf#9z*+uWv`Ms~POY?7s%naBvo^~nbI_ki z(-*Y(%&a40KG|WXugsxZKqDtAyQEr)J|=uI_aJ}2bR|YJ{RQxtZOel7g{PxWS7E)5 zXrJn{!MWQBT1rhoqIguQx&bsT*u9>q@!XIaXt>GV!5E|?2cn5|^l0p09SPDx80V2f zq$5^8$-L%Pz;4Qsyd!N*=&06J(bWAOFon4!a4M3gxcIf>6b`eH+ z5xczzJ@TH`P^Crrc1@AnF#daJHv2HzbC*UYH}9=&_F{J?cT<-@RlFCaKZfP+={(yZ zF!{TxHAwO@JGfn~`PV;;1C?HtRdeXYQHzmg7yj>NPN*CeEe=^g(ceilfswZ7a0G*L zfQ_r{L1YHvt>Wcsq?Y)mr&O7hl;}aE67n3)9F$WyvQsNbjdDGE{pXzcg8D)*+c#J)R+ zOb0f~iNre;*Totw31ee13&WNwFR+S;Ru!(F(DjBzcEMB7r3oESi%z~UCOssONQ}&# zbJ}RvdFPFjMo+*iswfg$@5J`5UW&@J|fLLP`D7tRPR$b+XG4@rJ5?Qn?(rB zi?87|#S9E+m>y7^=p~kmT>&d%(4}p+jJ=Bk5Drkzxstk*(uFegOhlv7IG(S~k1sZ7 zHt-8MIvX#a2L0z7H*WmA46(=40FJ7DLlYFF6sNN;L2@m2W}t;ljB92RT(XxV{ywA% z2(yT#0Jbq-bX;F^VyfE@t9^aUJ4l+2^yeI`h@hHEXe`Kdq@m#HA`3;g!N+_ULKqUI zLmNLtdi0V1&)(T3$8}vUt+lkThxd zDtq`@mWUSA{{>exzCP_EhdU9-ByG-TK!0+V=L= z&N7?$Q;k`sv0H6Xp!49_*H0cIb>phKS}`22M82uvw2{|CN$kzAEbmOQP(RFTx^dB$ zmkLM^jKk@U99;ZBkAB8Q^nS+=;9kGXNTdAibRq!Z!( zbLV=yR6JEC(%Cog(%#T<mm0}t$LM4B@4G*^D6LPC?nKJcHt&0-&4F$g^+5M;EUuaE9_Jf zhfKVI8*_|pEd#KEM4qq!2`NynNf1Bbj#*VTWX;cb;T@Vw8`b!@y!1*6LbHz{>3S_l zqs#Y}WRBK2q#Q3VfdfDRjeAYO4Jrq6gwF?Dn8t-&$|!xo?tOx7q8$2KJkrEP_Psyc zKF&C!qJSrKw(6BR7OE+5_i{sTWscSMDzs|9fZJsXR6{-)tN5Faa>rA9uk(0seQkXg zp}?hv@-H{|c{^rP+HF&gRqCnU3K|EFO^5zON}|&SR;P+nhzhBiZ3Yp9;{QY)KIpG zeI;;vVS%mE*-3989LqV4*)}#3%f(k;+`i&2?ex1b!^!vemb`s3r1BkKKY8%EaEzQg zlJdjAs#G+Tu!aQk#wM!n5%)%9qGF3#Jy2l42H>UXo-vL}d8ndbc%cq(B%6*0XW}6W znTg=-tKtjlgW*OpY7mQ?6z1d?Lea-Z|PYOkn)#gc| zS(btgsrnGsijZ7zqb!M%^&9~(XVa;6XMuM@n%f<2Np8ybPjz>TD7ve42 zU!mH9zNouV`)`1k(CU1^@mPc)fm7t}f-LkyDmcU5^C*b;hG)psEU@T_dE$+6( z?x5TZzxd+*_vja1{-R;MTIaW_cKOAt&P51@4=+Q^z?l5G6=EE4EsQUr-Vw?a9!KBp zmj}9#vy@gD%VHsABq{6_??C+<#W$AWQ?>eBKI8V|n&1rLlDg~*U;3rG4I+CLr&{1M zH2LIcvas^3>t>VV0$7!Nzw$DL@RGj*fkQeG11=shYV|C)y}W8z)@8 zM@@anf^`Ju^{JI)KJj|DZAukcM?&}4fap;S)kdF zXCx~D-{^chGH0~q$WYu0zLmOI7N2)?S?$Db*1Z9@U0ar*13ju>juy*33U1tq0H7aBZJ#eHPWG|E0u zE3*}AjnQUMs~eml(TAbl=imy+NDAx>rAsIG-8y%AMvU4=6|%P=icc=e2}wu@nr&+mqQsyfFwdT7VSK_)lpcxb+P;MT z0>lo1V_lV2wXgVGaOnxVlKsldQ7pQ>n;rsB9kOTWyTXWt+)gB)Ht+24gIQ9aB3OJ2 z+r_5jNh{}DVoF#B4h#^7SxpzRByJwylq=A|0F~B2RSMPk??@8c7VTlQ zgsAyg#x8?5GbBl^^2q#=m9ggl$l_4pk-=1Y$|D%I9FFPJ?DmWPbH3E!lOzcS+(&52 zo?k7gK)WB>FJg39Feu_t@eFl38^)CHP#tu$H6)ObcQZeXc<+qFsw<^rQx(C`NJX?L z5yZkeOhGOu3!`s;RM8{R?cj}LeZ5f8cx|GC{PLJB;o^dZ-jSvh&Kb1d*W6gaIxoqrxikM0JVldtVMf%?oI<*ag+XV+)630TG5-4wEf)qxvz7 zSE@~6^eMwm<*&*aR(3gs)j;HtkQnBQ zFx_Hu;M!rdOuI=vfREp4ZCqG2L5wM|f!tTSEqd5I2Z>hE%qpuEUMPQFR@ghAyeT}I zCdO~}WQal({DAo7E2cmth?&^$9TUvBVuGbZ#xey?To}5h<%JYBttX;I#doiJPuTcuC$c4J3WQ^*8!DSxk}rPAX=bTfQ)3CV#z@uKY1mG^ z^kNg^ppDHG=cXA`qgk!S5qSi1;d@vv7XFzGTO?=ZBG>!N_7?|-0zEsEVVxQMhXpbv zJ3GSTJMHV@=(p~Q5G(4B4=)Cr+q<14A4R2*sV*aK%@yX##D_Y^ORvq3P+iFXaNp#d00rmwbWw6R2_EKu#Qp9l@e zW4AHc1eP3mS_VL^i*BVqPnv9C=Sti0Vt=(xQB{o$;s;BtzWxzfYT z%Lvq2d(Na4VNaDMaOQ8armDp5*@$ui6gk-(FrhJI3J_0}#mX*16D536T>1g*rubGH z2@|L5U*n>J?Kxk3g9sHa(@ucr3Yq9lO*Miq8wbrSWF!^i=YYR5P*6Xj8A9gO#3Kjp z3;{HzWI<%fWd4eBQ{f~`{xwlnhd470&jP}o-*8Q+Wmeuh4v*qWX@4uc6c36>MokPJZh`{oMuOp@e@bbpg?0qoDhrA~#M0)JakrOEb& z3aZfN4Q4nxD^*0ekgl;9Nd7G`*xH+T#EMt-7m=%xd=y=!q*PLrt-%{x<$&MW$6_03 zEP8=*Yb>tY zmpPY#AUK2rwvB^y9q^cYERx@|%Ve8E7T_54r5F#*;he-$wKf5^6HknUTQo+PU+6%Y z2-T?D?EtO!Je(%RbpdbkeCmSLmC{0F99o{@TKZPnY%g^e- zqN`=^uzG+nxD8cztk-Eh`V#p%UD!7o_vd`S<6_xHVxhC%GcedwOoAg9>TO^ExE~;| z{2jp#)W4stplU%c-5J(lPdvC_;;6764|;#ZWqWsh3*T!N@%B?rh;Q9a^XF%02z0~i zaoV&u23MP-5_V@6pWL#gK5zE&e_nbUKQQ5b_cJ<>9JoU`I>{kdDhEHzb*)H_SC%+c z0&BOWID5PS7fLW2(m{jBP1Cnm5@=B=3TpLqlm#=cZPdaBV|Z_)A}IDVjGpy(xY6gg zswHT-OjkE{RuxKm-qZt)y|ZLP|1C_Hlx7K^-OH(Y?YGC0Wi2w#9Bf{A0eTa1?_IuN z{x^FUFfzP4Iq&ohC@J|EHYExAe&GJxT-!ySaBE|CdzJw1XPp9X;Dw!{pPx|{!HqD< zWeGiWM~OYBG|kIsy)p=X>GlN}zc)qN{<^ohh|Uro^)`_u3u^*}Kb9(kjkub6WDFGVX7XDwIO8T>$Zn%TFa~XVp=L?dw*ZY0>^4*;=8TqNmh8Oq7vL zaANx5pq@4U830IhFBOK{Ah>LSqfairhtwOkn`eaO(KJx_w=wAbsP58IFGmfV=yAP~ zyair{*^VPz%61Q*1i>=wY_nBjY-R~bgCY5r*UK$9 z8h1t0$n^F{XEgUgm{7<)jbza;L~KyDkcbXAoAgmE;bGL{KJ2K`Fu04VuVSw`db#&= zE&kaC?~~OjV380NQ~s-CGXt5HNg^$Y>42wLXbW8lYCVf^iadE_8H>PJOaHL#&akei z@`}9ETotn6)8&Gqpr(cAJL0cQnx+DaYE#LFlWI{KShm;5M-Pp{bBWYrgc&xbpAdjN z1!h_0adA@kP+H}VJ|ZF{LK6A?`2jOD4xDw8hujEQQ=0{OXuaSfuhW%OOGHMJOX~<* zlGI!TB;cf493opr0OwN-dptuem2%dw#uC6iRSA8-TQU00+ahO$~#9$(cvJ z`}{V)g$2H*0hhNh$0UdfwT~)5UKQE*b=Va3L`~1pU#FxBhymMrcpT2Z2?Q59^>{(+ zgae%l)!?nt8CTcL-2CreF_L6>c|IMh+wlY4p{@1x^}FZXPt2vrvO`x(^Rys;iGR6`PDuw?nSPMF4~u-4D!4%x;v5CR zal20M+>yklqAJvkRBH{#gM9bKa0=iSA#d+nY{AA|@d1SBd2I2P;6~HBMbIFfDwj3d zWuKBkiHeZ%IE8ssnG5aP;J8R5s323O3Dbk&ldhhRm0-5B+}$+;&TujG4nH_#M^FKX zh68F+Fgfb#MJ+@4o>sS+W^phQM`8gN8zO!*}t&?*O8Yr3}IspJxK&rpw zQ!4L5Q^V>bUCmACo zBg|7i18&#H!{wdmwub7>eZ7|#-?4F{rWfbK9~b)L_f**MqvY#79B~&Y>3q?9^6G14 z#x;1gQ(X6UuObtU8{{9k%RvHtQ<^6qgnUKsxe7;W$rS-e5LV+T3SyU|RkEPerAfL- z`$&cNV?b*hcJto1Nr34q6re+Mcq5n7_hTkz9$bzOZXor2F4cJJgBF2TrF9xh@@Bv? zmW3Mn4S~0)$wMv$Ni%q_loiNSV(`h6Yc8Ktn)y@R%gR3!^Y~%>@HfA}nxLhcUTJB02a4N!BxZjKZ%MbsVFBzJreCf@!=?UuYo^t z+D^#eaL1IUVZ*3hnMZ_!Bd3DN5mu0aRVmm~1TRsuoC7PM$1GvVwDU}K9vly$XX;At zLFyOMx5a>@?ZA^=F`vkX!X@PEBN=MX3U?2&Vwhm%7mjX}eiX_=bO?3~0U4ZKlbDjEZWsJth}2$B~y0&M23T>LU0y z)0=2d)g1E9wunhoa%Y^&3!$o8fXTqG<|32&7+72#)`~HUy}j@OY9rtb>$*=#2?8D` zv{~v@Y1g^qg_sc00Yg;{!4v;>AuF_;gBZJ1S&U-|-Tod1>(gweJ^y1kU zy$28e@LP+7O%G(UIbPo_7bjB7L|Q7h8%P3}GLoX2kVT78IB&~dWC3H`LSn0eq02*) zWZ=b>h}D&zw>TXo1C~>FnND~b)%Iqr;D0XpeJ)Eoz4kb-6WUloU$D#M(aj4uM zp2GCB58*@g6!>S^g}im@fe`knD5;``-o8H|{Y%QJItu=U*J{+wIN4L_y!bP-DQYU8 zVRO&GwBL92hi#P7QEV48ZT2YEaNEf?jX|VR%F~*fO0Cp(BD4=u#v#|F(l53O;oUB0 zs!61;uF>R|QF+bfN2R|-3vSX>QskJiF;{{U54AmP85T1Opx(_zp}zfQy1L0p0f`qH zMK_nsbZ*xm(@q#$YM2Y_u8QhRC=|7Pex)iHGg&=&{o~U|Pri5(vT+;`fF(+JN%&q= zyiLHIb8K#Is`GErABum9{i7?L z4~Wb%hA3adr-m$xm@94(QFve3{}b5MK+~ln;CEN+zS=MQYX6(hKU;z#MK=5{VS1-h zafWs*lM9>w9*GXptv^s(+dGHf{|47{LaW0Cjianruops9hp^Mx@C4BDRQOZMD!r$q z=ewu*fehNClkw!kMNB#28*AHJRBp;S|EXriC$$yNsuEri`>BW9O@u~*~s(n^I7 z*a3WpbOfWk-Grb|UOu!xq{@e!b)1fd<@RN$dM|V{@d_p(-(!1&n{N@G!Fs{$f&(GO-sG=c9lI$UHQC#FG9}Hy$&F zg@Rz(s87h?1o}`wBBnguHVw$Zg&*9Rm>{*SjFr;VFx`cPY0Jvx1>aLRuM!O~|INk$ z$&AQ>bZ^ha;7VwBLskT+FL6`puJJ;6v6E*gH_a`x2`7_btd)757ax7#;3_f{cIRlH zRP&5B=W+=7qB6+drATm;5`W9^UUs)`lqED6RTuWk|W-l3^(qw7GC5!l?oir)DKI@jHx! z>Wp^0v(}@#^L$JUS2$({?U>r5jpvd**jXlOMJG-IXskDSyfetU?hw0e`-lnPN zbk*TsyS3O+8wk#G`QALTUFL0GHxfdT2aO(oJ%6rsH2W6HOrn=K5*eFdnwfWD)-3xI zi7h>XT!T2*N~@fP(nx@@OJ*n5_QkEhR5;z4;hGn0=`^6e`*P~s5Iz7n#uu4f~X92T)~K9`q!(FsbvxS^Q}H%NrQNB{nR$ZAh+P9;2XGC3uS$xkLf3_dhv zv4vNI1H8SvHQQ1A|KGgZ&~_RG6etDr_)_cl$aL0X>4?U-D>brEtRovn02w49Y+C?K z&((!AfiHqsI%0D9^`v-#c`D8ZH~=6Bb_iwq#n3`gBxLVVEDQ(#4FSWciVK&A&Sx|&Y*YukbL&MJBw1DXy-hBApf6n6IG z>+`eUbYX<$Go9dk=tc+v>2Cd;Hb1z9vk58#1ao zwb@Qg+T{vdTc7s2(0Ff}$|I*bH<;2lR+I}0BG#o0pc%bNIx+X$qO+`o68c9<8qQVh}7U*;aZgNKxRnG07QVM9wmw=*`_4R34Ts5n6r`nPv(bq z&XlUZtPPv#5xL%}XcsiFI$5SHqu?Z?2*Vy8j!v2pVA1g69U`7!z9gKV@>R}oYKfY4 z;Z6iw5fy>?6|G-cXlxJ(Pyze8`+0qrS!$R(W3)$a!~2zJkZP_03$foR@&lEuf?GVc z1BFck*{w)88uz_wdJub8y62J5ElMGhj+fkt8OhzZm0jFr;v~b)qc=6oiQ`A3MwYd`)W#QRVlr(efP?gQu=`Kkyf+Ju_R*Z_~s%G%B;gGd$Jj+sX zOdLbAKa07#Q6#?(MCxn9ImlTYqk{1>OdDqgBjL7guMC?OdI*Yl8YZ~kw~A^TwboFue&wzt=2 zJ=4GB1lU>VbPp7`*5311liowY0(xJe@vhd$!&9|#s*Oy+6uDJZuN`VVsnO=Mt9Ph1 zD7&d+89j;AXoX;{nvbOrR3iHOYGE+tq>AqqYg&5N(SnsUq`OHA^p#k{3G?SKY`%CB zTy{D{rl1Ov_*-s8IHXRKSuT28oDKKZDkgqaNHV^^Ke)PvKuL4Orc}*RIK!MPv)pqN z=3KQSv+h)Vspk1F5t8j{#XV#^FQQET!MWXy4d9xa+jFfeKg%0>({+ILfB#AW1%Wm2 z%<=u+v+1?FjN99))b$+DXp=4vd9uHpw1pTWhP|ELO*XLDWZb`Lrh{4i-a<>`-&bUD z_V@a;=EsOzl1EAVN%4Om8t|JL57c~u2N%wMZAmeXwaAx95=^;Sa7qt_%Xe#}Tj~|Z zRj&V%>4<)7ToU^p_E-xWV$_J0b218_tAQ^rC2FA`3ZGA?`!;=!?qd~s`%)Z?Zh?Eq z*PG!TyDFKiV6-)ABqo$ZiMj*c8h#<{Xq5ml26lyGwBNN)LJ;ec(z@@5Jy z1kJQ=lzeuC+!h$jHcWecx39nMt6|IEEi8`oDNL|zOl9ww&VTB$Zgb|LLH>rSK(yd-+A+24lo`{+sJQrze9a2g zkRQF}&4r11M_1-Lsgd#O`rTE)E@MDOv={)DuG3q(E&DlkUuE5#iE100JZ1hjZ08fM z?djPE-%ERR2;+}u{cbSgQ_Pd%}IO6*PiOs);3^?{|{>O+IbpCP-6!wSFJ}82@ z+Qj(R|1^Hie@s_@{ZEr0h4uQ?C+lmU@Gk^wu#@B02fzB{(WABPyPFTz_2cm)Ve9;N zXv+QoBlqC|FJU^;FIWAn>tDCg;%`)O$7>NLt8mD&gTV*mEEk9sI3r` zc<-BSeBfFvTL!f(IXYLT58j~_=O(L;YhEj$6LyI;X_ECNSN72?!CgGZyBlk*tHa^w z3b63kz$*1(ejR8ZPYx#}TLl@Jb&}uxrng;_KkNB8I5^DH;r=VV0XW0pZhYO}+S<6c zwOjf+e(rO?-F@G3syu(0B9uZ~vYiqiY8n5ZE>=n0g4DYRPZEkKfcdqskklx8P ztr$VxW!@O2VSq4htx9!*)HN^&so!0~IX=1)K$Z?F%0ofuFyS7F2lSJ!Ew9m!;7ZXO z-`hqEvw=1$z4jsY3=A7=Kmull|4;D0wb8G@)6$~(v%f5s8?I5j{;gTY3J&A}0iaB` z<(=gZqF)D~kbLU(rIs4i=q8@#@IufT{^*?|u}Z`Q%-|Lb&s!=U;6Or>~=Gb_`Jvz5_sx_bEfWK}Sr!Uf5{f0Ot6 zuc&5k{sW!Hzw|HPUjK?+t_0cTVTMW{gXu?6@$UL2{V_9*wX+3xH_u@FOdGp8I2sdb zrN%S(n<2$&pwMHuQK$!#`8K5BBXQON?_%$_w(e~=OG#A(Eu+pbGeyKaOLQr zAy!ZhNA%r3wz{iY*;r0#&BpdiHa3s&$78HygYnU}8xO5ztTNH*s0+%H)Dm)s6|NY3 zD*f%9Z6xy!w~p>^eLNP&)rhsN?OAoIgXxbyid3+&#+I0Yd?@wi>mP0?C7)idP6s22 z24_>#M{@S$Dd2CBW1W4e1?+WUS@NnxntH(I!?~JH`lqiCsy~of?_l|Z5)bo?`1@dI z^Jurfy}32)udj~|`@5UNjsEc7aB#3T+SokUf&5-6k&nqL34*u2j%MR#vxR34>asQq zUiu4WXVOP?N*s>@`}SW&ej!NzKfoN_GQfR+A4dz3!rLRdg{XKq>E=(rE6;W=pJzuj zEOvLrzkQk~@MsE;mVc^^&CX4>cG22NDdFQWH9KS(?rqWoGIKwcRN`O7E7Ie_ov}7& zc`_w>DT(P~bkeUM!jwg~jjFpdH0FI#_JmJATCjrGzkd1e|FyUG;h^) zSQV(rUQPo19Dn%Hq%hUkMCbB$lgFWNTpeC3Cugh5ZuHma{)IoJzXN(?Zk@9#o8dj- zFM%qx{DC6lAm5C){g}cVc+0nTwi-8gI64&<6+z0~ZG>W3n zfYRDBrGdtb0URSlCjmrS!@I7=g0wMR~tdNIWP-X3lKK04#AkBVNl=d= z26wg=Jn|y9?`LxCl*}Zz)hZAEZBj&8N49Tkt1(5M6nE*{kxdtO&fjxDPTdk#GVO`< zc_Uiy9{uZIgC2K#;{pgt?N8u$9l*$wR}?GYI9~5G&+dQnBp4v9uO(JDL64?arK#ep zr-pGunz+96T{0*%Ja%_PD0F=cHeOIMJ}4OCne_sL&w|zj5zLr50-1NoJD949Kem+R zE5k&37oy#uFeJk5P>B+@n`etb!^-4>0jq^fByss6N;=n|N`mSEm-)JYq!On{7(bN| z>jeGB*F90r!aOFpRJ0N#^-^**@thg(S8sDo0)zc6{}BnU*s!2)6=pbfYOYVN)fg%8q-7i*PGL~H3AMMm1#5zuM`eF*bV^yI*A zhC3$?IELMpWfPIJgoxexOtcCloi2$ZSiqqwN{YYsV|j!TZDzkqdQbz`M0HF&N4=MB z;R9sl4p7cjgJ#p>o2cq@%`wIwy*xF3XqDL&)*v`1g^^9!H0ZQ-?I8{{FKA5I|NWmJ z7=m@r%|d14NKP}GL-?PN{E+JLD@Qq1U4`I1>pox$(vwB%T6ou(-_VSLQV)`~D{elY z7JaDr#u|Js1tfRp;5}R8X!qK<2T1c+RZ?8cDA-!cdEPkc%^1Uh>XCi*R0Q!fQ>xj3 zLB*r}3@^ek7gq}jxUoWd{Z8;5mL+0oXr9Ww zCvi8yIX$$R)OR~zIXcnYmB+9-5G(Vjy*e55zo-Vg(}cTE8>|?hjMQDkf0ZwJWC5bm zhQ>J~v}PihA^PNlgjxiVCLPxPZuoN5M<>;!*d&miYpNPj)k992RhPu-B`_^5G{Hhj zhrC3u4qJZ=X&IR;HC-7x4&0b&)Eb`9G3(xm`ZzTbsTUV|%nPwj@c~nDCPFqYKI_I= z8C_>dE+Uy)tOTE(aN0t3xWxq8AiB*Ov?>My#9OZiqCaX*IyrH`L)jt8cT0OI-&hSF zL71toWXN!$-LJMzH3Z>eYpk}zn?s0xfZO8n5J+Cf(A~rSU!joXzY_ue`;U_Jn$^Ze zf`th+=TT@k&$0+WRBD~_nJ*6@gs(5Asx*MMI|K@zpWZpX!wgksItxoNqDISHbF>O6 zC|5c7sW9;-uN?F~#ml(2vw~}=UK+8)K1-rzy1mC>rXd?+$8T+}P`|z3dvcyKPTGDm ze{lDHPt>3|4!u1!Qut%rYkX|`K17wxr24nNSa7Uz97~T?2T5H0APx!pNldzC;Mmye zeF4X`+#g+GCK7ekBM%fqPYSJc=VdPbfIQatANBd*sg93DRsK%z4`1$Ka7+;rmsxI& zq~haq>|~mPUqWnfdfaDqGzI>g+_ZR)<2TgWgoTO$`BCOBYt8 zG+ZL4xp6a|CS;8H0sU}$XX8C4(&Mo_Ts6<-^s3d`g1hnpbWgRKsOoK-{mUV12d$>$ z3hgH7+KjfpbTbd>2;|)*8t9FQMQhWO^G&RI+D&S@_has9NQ1fm!;I$k2Ig@KvFyky z{IP};2$sz3Qp4HlrK^1}bf4`7C%RatOLMyqjT-K~WvQfwic%G=me(Fm3T-L!s&GAg zD(${qBD1O-$qenNV$BGqYD15&p=xc*TB`Mv-6Ke_)Mvy(QVXIsO(p%57e6iO`um66 zuV|^rk-3ncNbgT^35D=zo}r+qLUTglWYGKS#qYHhzP}tD$UFLWlJH3}|{JshPo zuT2=MI^&^<(rUTWl~Puqcm#U+w(0}jb~5sOAtKdGk;yOQ8rXJewaRpbR(7L{K`Vs> zNf&kls(bMj&y@O>*28p|X>r=~raNO|BIU1;DIdXC&t4Nf71xb!3H_cHKSCBY=Zeu4 zK1mX}y06EVh%V}PNdQv#FEg+ex(>5N%_pc$p5Y`5yYW>@Y@>;`PZG zH41&d3nG;^me>rzz0#=e24qxCubC~&?ldpsV98rugq@{p#!58UT5&emfsPHt{+iwT zgqjO9IPx4cM4(!$*$SV0vlUh$ola0^0y<|On;MQLCJ|p$A4(T< zF&_!{pb$-T+G!WJ2UHA^^=j#!)McoaymCxuC)8Tv)fK!b=Q@Cyi{d|f!=1ETjsH4L zjct1ys=Vo2Xi~miSy}lGV;LxUY=A_RB6@ZZ7g-f^Zs0*G(5D0TYzh^*C^pPrJmyDt z$c;^|)ebL~cxfaxs^0QE>KBwqTu!r9S}sW=GJ|-u(xv6$>Z8?HSH5y59Z23J^OBD$ zDp6O2;G!EHh#3cU;N$@DMgdhQV{8X6d*p*IM7p;`1Mw;;Vvi9|s{zaPnA8#5O{C|# zl_yYsY0GgNqo*Sp<#f!ROB`TJa6jHQBqmvZ!AxRl~?~mQr<4#{+-CY$psA##YEj z$ckc%M3ZwuDEOu` zTIjJoRZN>2)42l`I;U)R*%6->!a-L-aUaQ{ zMWvX(smUbXMUM&ObDLtv={|%g%N7h$K3@f7)~*}?J9l|bJWDu`{og@7?C+b~h56#S z1^vR5#f3Q=4Un}I0`FpqR>zKZ4A!e1Au5ORm;Un~ARm#>V6y@!RS?i=N#0X0R zOpU>;BKb0udH-`n-{kD%Ucyg;V_GwIN?>jC8?t$yUzmM{r6NKXt6J__KB0{m zjP0aN`MPzIhjO|vuX=k=`j0UfiYbSP zhw2=D`Y=B?`Ng8#fb)-CnaE;tyW&HCGr2YlHimyQxqmacvUUxt*+*`2yY6PSxy_ZF z_e+}7>im?1<{xQJx$GL>D{1w_(^ae-x2OtG)yT_dRc)keXFtHqVqkwd)0x(HS$3c+ z1CtrywT@h5wYFV3hLRy(`Yjz2DH-S|iZX~HxnfarCd?DT!=2u@g<#4-SAPOU9G$;% zt!|{@28%4-k4h2d;Qg)#57pKNo0~)p{>?0TSvY*r(weVfy zCP%F1Qig;K(O?K7OTT>joxz_eQLPX5l5z@o-49w!N!(;Esd1`esLk7pXmZJ1*3(a| zVlP1mHHe&>>BjTI6MB(-cuaMTIjsm4SW#t8scKlu2WN^pn;iSx2=>0So}wQgA=;H{ z<~5`xP57w!arugFZP7)LwT|*ZJ$jv7UOBB@mbS!?Y;-wx^0ao2aru_b&e3n5)<5oe z21jAj1FcN7@;@T?J-o5RG@FG;Fi40G*uG@J3h|+4)e3Ku`>m`*^FRAaMZN5XHWPAd zLM(95lR$I`h5?-xIYywhIDUoXxM~WKqMAxg1PKieMdAgt+D$?2%g4{+5#-y3!inPe zric(B9daD9S!5E4#%d59*9wU^A&bQa>=3}U9}&trql47XN>&?W8vEXXGa+dmlwx4y zr$o6N1g;t4$e1ZXJ4Vq7*=v{lOJY~m6m;x(bzT55*O3q~`lk=QO(pXzI_MxyC-l0Z zhS1NNoBL6J33~O!(6MS(-wG%YN^@wDufb^ZW+S6aTuIoP&wnS>u&Lu?X z>fFKQB?7YfJsv9XPjS#h?BK~IBg;C9AvM4*7`KM86Sjg7ZR5zYpI#1*MsQ@k(S0lH zI<*LusC%^#708fx!~>-LG$t9;A;tBW+5>%FMsfC?1kRE1A|cY4+pH`g*yKBE#(Pmh zs;}gf(>%5x#9SmJ$NouH7zYI7PCWAE%*5=vI*V+JS+W3e-{q||H^dmj=z`!*RJJ+F zqW)|AKo&wsZWot?(;^%Q$riSb?@ND`Dd-%Uw~j>w|CCll^qC^-`WdGrS?C#&ayw*Y zqynjN#2x2T*?fH#eN9Mqz~%#cnZb_i z?tj`?bI4<6mf}uH5vj21 z{q%##a~m6_5OQ9WR1c`%7mJYTH-qsdX^2k}CC5N(O#zFT;JOmxx^z*#=TkePDS0Xi zL2fyzIEYfQ5S`lZVQdu=B*$iU4!k;9w8=3qslUiPT#66Gm?XilHh! zie;2LZTtmMv#7Fo8qrJrBkNGjLU%F)S0aO^OL}U((7GDUiq;xF2&KspelfuEz=U3(`iEI#>ZOYKOfEENF) zYK==jvivt4$kmKd(&aFvHR8IrzS9G3jt%O);xrkjC#W2HzQ-qo^}4jV{^YU}9Gy)> z6Ewu11`~=dy!=h=+^-4&PNRQLp8QctMD5Ysj#Q;0TiLh(8wNDeXZ5qu8NH==QKtj6 zO02)k2K#0}U-+Bk?A7Va6P6`{!Y7ShG2tEfqat`>36cp98gbs?Too~5d9I}&kmF^o z@-dCVBVa~5iHhrG%Zl7V^KKv+T~`4nC)t!CIR#$ln{S>x`7Z9aX0in7M5zclL)UI9 z&uyR(T`mcPXt+tzUaWspL5+)Gl4X?Wdz@Tek9&{*{eO>70s1MM|CSrsuCkVdlCRhT z%6lfta*tdB%Oc-Rdl%a2lPN5f-we(;L<5Z0K+7XMW_%v6%6|yg3u2^E8JB7Txei&7 z`1T;CPfyAonpB>^B|yO1mJ-mg^6AZ8V{Zx{(zsP^3RTib5G~jg{Bq%{F1=;&SKH

4QA+)3xV9!&@hsEXrki|U|B;O_O>9*FnKW#wI zgVY^m=g;%?(fWA0m59lg{&bakwd^WZ;F+x$P;X&A1}sHPFm_mmMB^+kA%ea$8~)yY zs)=V2{3{Fa$Je_|!^&e3P0dt^rCUBuo-i!vNHGI6l23&dR@%SEKEzTt;|dXn&5gv6 zr6~KQTRlCyVmpu=%(9U)_aL8W{8Q=R+-|VN>5|#{!SMOnE0)y5)vR7jb9NaE9z( zOyBT0__qhs0fv#v_pF1KsxW$UR*@5Fjcr+{vp-q0q0+ILLC8cS^ny)UKxXxcX4 zAR}DnbpZnoylBwn4~6-R=jN^J(lAM3MtAkZ5Ay#b5>pzLQ+jey6wsCPZ#HEg!YFEHBk4OeEq8(MDzai zPwLiC|8xiJxQ|Fm5=3<0pefrbk*r?LhM(ARbIeHB*oN_=J8N@^c<7 z-&OhAd?wF;3NGvV>uyK0`)4Z?W^Usd9iOdaf3~zLbI(KZPq-XnHfQ5T1w!NQcQ~Fp zh-Q44hKgO3$qk;<9JlCItwOwP({P2mK^Mb>R8J|HkG5>THW0FIKeziAptQ$$@^c@mm~%u2kB+LlLAOoa{ijbKZ)*>r_rRqN-QBZU{pmBdIF^tl zb-jEG@`Cr@P5wKHR4T{_Ju)3E?+m_G0_SP!ePSVa0Tq2tu$livioe{yx-t~NoA795 z;CCR*i)EH%#cc%kJ?rMwP3kYFqbs{l%KL(~#d_RmOZQk;e@af;!7K5`W%}UwrqB zj&=M$Q^o$~?@*Zk#mBQjH%_1Ti2+9_D!UPU701z~*(U*rKwnOt+T#mRf>5ZWXVvh$ zNiU2OMxgBNHbI(aB^at(Dsbn>>$BqeZkxPXU$MGSM{6n5-n1P>C!={F10w zk|)Deq6u>N`()uNsc^nYa&V-y24o3KlN+T*xun}9TFSe_&p&2137PYmCu?P{;8iaB zP!zd}*>*|eammJ_oMvm}47sq-!;lZhL-9w<_3Ed^7agh%<6d5juD3Ij=1aBBDQA%# zm3vzKHmK@>V2Rcj9RdiX+Svq)>aB$laedn(9ek**1|NMldS3tp)(?bk?7ldgz+wK7 zH+tVMxqB9=!X_3F{B(LUv1xmer{lrncivH4&}_lhY|*#u>)cg>UyFtdjoGUXmBZv| z*a$VY7QdwN+cp@?-aR6V*$C$H#r5bM&2TSyxqJ5GcmN5&li`+GDd<6w z5e)sm8os+Q`NYPuG(8Doi)=uD9yPxbsvkLNGb9Gq6tHKf=@zd$@0mOOI&xggzYEdL zqv&?A>A3yj#PkFyJ}vFFy1abP{~`2j*gPv3Hr|?pGFolLi&xY4nnPS9#HxDtT{lS> zQtc*=8yZ?BOccM1x7mzvcc4xrspQ=V=N!BXQJmCTE|Q3Pm_WcFxQMPsOS4&{Z8tht zDw-Rb)3R;Nq@OgU8z7~u*jE(GRq9ZwrSKsMOT2>Z?LB7nDAip(q-1r1{>2%@mTZ2J z*ybjcv2oa;Z~4O;q+>?m`Tu@Fb`!;(1!?TQ+=0|~+tSlEz0ZFe`z;Pnlo0n?LUuZb zOxhO3Y0SOr(qwK4F2+(#gIFsw81=lJ{)+WoyC7LYa&|K2j4hVk*Ye_S! zp<$e9unB+AxZN6%m70Z6WS^Xox-kyb+Zlu*DLlnXj0b^jy=2{*22u+c0k9fYeR+5D zkMAq*e|@&uM=hvbUv~5II=b>@r*;HG!_AHA1L?%%eEve@{B5l;)oFD7zH&htpYbuM zx$*SP3@T@B1|TLE`aP!}$^p6c0sTv~;fcc@aQn zB#-95#S=R{`;i%~UeNgwCDF6C9ETHmaP3nMdgdB>CM^yJIM+zHRLh{E z;E>6|K2R%`)HuS*Xb@D-r^;pZT>N^Zv}m{W7W`3xhn!f$IMKHWLF}!W2a|VCPX;w6 zdRVHPfSC^@^ivOMW6brn(#iS`h#@9*B<;&il63$xNp~oSZX1gW(-K`@3LP@3>R}W^ z)Cd#QoJ|=zjfr{T)&Sb34TKjh1s?vW)(955kG9^z4Fs!c?Y_?VQ+V zGI~G<26)0P-?pc!?$Me|#!Rw~0VeX6txTYO`PLZSIm^Nycvo)|`8culL+9}5GuBs2 z*JePB!((9-&{|he_X}@s=jn@s{pTN31UKuH;wE#gH8u8wXeEo)b`R8G`r`QEM61>O zrTam*%i6~#wx zq~xS?*TQ(XV%3r2-pT=kik{9V;UHXC4QXi@de7+t^*%5*r(m7pC1i|*6X-Jzv!(m& zSp^*sqqYj7htLD{;R#bp86Vti+1!FV{JfzakbYpSK8aC+I`u{ z=DFb+rw}b}@l$@SSq*4IW~q4xLC5lWSwfI4YPw*Q5)K9|pG2tJ>HbKC(f&-zrLAzR z*aYkzfrBq!K?D2|rZO6w7dj+Iz zFuMH8Y&MgKTw-fx=(5D?BaYrPcvTka6fY=+TP^aVR-GafQ82B+nz*0T+;r~qqnF95 zpe2H#3A3ysTJAw6w8;i)ngO)Eq$qgK3JN<|(anYAWx)e~mo`kcKjh>{| z;Ssjff5$enX1n!m$Q|_qy$^#+xwMTg)`jz?Et2?9PX*}9PV%0Y&SUD#ocVOAH6hXp zd)xw4axc;3>uF~%@@m~u>`of@(?SEUR3*GccMkSnJbke(Q!P3N;AKAMf0tfh5+~`+ z?$v4ZNo*g?Hq><3`A#p}TkZOqT#dD9(>vE4P>t=V9ol9Sp~+j!6rGGjNe(R+j76iB zD=$~81~+{DuS6N|5HiViyX43X*V4D}6iOzaKf+P%6|@9wJyT9aBu;F?4m6 zukZv66WkbAx*S>&y&!Y97-d<1P@WZ&F&t;txhJHq4PCZrnb?TnEdE}MXq#y{6)=KK z$I=$joby@MqQ`{^YdDwHPsy)38TNZlS`G{7iLBZ-<{vZGpqgQZYNT2^Aewme;Bfz@ zllAsQ=sZc0K`)2?qFl_Iu$g+audy#NxAn+fB!iluNTixHQ5r!X1YAMOvD(8bf1~YC zl)r^+HvO>_S2sQUD5s3kJX|irzoTqf(aCu$fr-zr zwt1&ow)I6D@4QWkY8=D?`0&`+ND65eTwdc$4J_iK7OzvEoK3A~Zgb#~!%Us_M5|7a zc%_Ca_lx zA|xQo=4eD^qdiXS%jy)|51ScH4CPnpT>0S-K?Ko0@6$zLR};!uoPr2(`o^_|oOeAB zM65gshq8~21;~EHGxch`65};PTO=$MQG~!Jb34M$UZxfccTbLm;j)DSyGv#XHZn8l zHNub-agE_YnM9Y;@+9i6MU=vEg7D(^-p);3CXq;kmNB=z5Lr5UmN3=7r1;2VA-euX z+9&QamFLEYTwzxh`qU@~Ht2leUea^=SD-qAhP-iZ58PhOdsW7Eo}!^` zhS?)IE-RN!S%zqlV`1#Lb-2K72xsLV`7vEpVj4HM~;*HFLV?bywOvpWv$c zcj^aM7e{4tl=6~8GNoyE=qrk^VuIVk*2ev5-Q#E{(80;yM-OO>(gXsPxci#`5#F&$#s0Fx392>5%qfqMKWD7k!-n&S6G9%;uK$Dr>5uY&z~W2p?XXg4aN&R?JDp z>#P@nBkRkdvLR9WAcfFUJ1jg{v~B53n7dbY2V!PwnguwMOQ+3}*2HLxjZ!p#hotU} zbP<}W==ye#i>XX(b#nPBq`jqj$mo7HMNYa<3lwTQp0wPbqfW*lY2~`8iSYwbb&hm6 zCod<~d((NCT}#uRy`u}ZHcO?+5Y6_sB+={~JUH4)gfyP4`fV&89Cax@HX}+u@X~Kv zyL73flpbVCj7^CR$@Tm)Q0>G(O0vcQcMpv$IqEY(g!=PgEg>O5Gpiy(v&_21*6EW7 z+snTf3})6%nEGjk;nuuf92;&@lYzMHqKn0C0laTZ;jg+FbLTzlaJ7EXR^nhU;}bNL zc{?(w07voF@_cQdcng;D<67I@O=rRFnwQ9FVM+ykvbvnTb2gZ(K5dy2Ov#&~+p|4h zZys*}g;!li$H>sf`nSLR(ZkI5c2%_&hD ztwh)#8GUpVaiFIi%Zf5*&ZrK#XB3F3z`uv)KD=JatSGdOMzt5amp4dz$9Rbjxk}bH zKD)AIA`YOdg~Kz(<}Vj{cShwfcT<+kMluCpe)tB5CASvQL0FWqzP+XfJ5i?>*%-1w z>=h{SRIAET4^;l#nrVh7W^&6*p&cvfHz6IzS#xua`&+Bd{NHv#)nevzwPAK-&r`nH zB@bUM=I*VwgzRM>_|am*n`5W9m#gC$3S>IvOd0j>lnn4arhBVVg`~lSw<2H9$+yQX z!IRCv-{z{Y;F^3{dsTZ%>g_Wi(*j1^miTd-hWO?MUs_JrqnzJ%am)65t<54%x5H=q z+XJ}pX0Q+^y&t>ic?*`%?L4`|&Yr7rU>^*^k%q}N;+*r@)U)8h!=o^wCVD} z)l}sH+a}dm*|)YIzR$x{XXU6Dnf(T=ui3e8`Ry*hseHhJUl=0ksgqx+lce7Q4ob<| zCyJf9^53%rx?paz1o{m0DE~bF;0qw^TqSuPU0B21e)PTR3l_Y0g`P_bjEbh_s zW~NDXW(^ocZ1;FePuJ|Ca?i395kde+@m^!VpwzEvqg#=(-SZlh;xzGlbqvRAC9E+^G%F_}^+uCybCh)auJ z1#EtcHI{6dHEuhkwOjYJJxww`Xq5`X7@Opy9K3|Ms{2OdC~g)bFK~BHEt`EIfmg-$ zmq3t#UCvp|9zD zfJ_vxeB}Llepzp2v^AR-GEf5cNt9$q`HLrMY@QsUtEIUulcG6T4ye;b>V<|R5>?y^ z&YZSwvq_EZMRk2}Uc0+y+P2ceo-Lq@^8ey3;F|>m=>Mor>j779tu&CEr~;q zxxqAHH?mo}v7x1Ijyb@Q{h!d5w*WY&o;zq4Z|=5~;H8EM*;U-#D+FQp8r&%0_Bz^d6B5Xg!+yt{LAFnqectg-9U6t zZEoh5*F=LfwPL{z+2n`*#+KTA;=v7rtzdqIX_ zAxCM=+xu=KT7U_iHkew_cFv*R+R6&n1HF7TUZ}t7cy)TZN4|ie?P_z>o0ip%rNH?Y*y9r0V04R;O>9(;Sl+4UOBhZWVcr zd(*MdAg@|7@sMqyl}F*>qZ^)uzk(CwczQP3JzZA=9LCi>5ZTY8;dlhIM94l@1V(U3 z<;KFvy**cw*za=>V)8qSXVIYL)M=y9M{aeDcqA0}2O5&{;=*d{J)m_9&I@qev)#ac zQ#GsUKKu-_vlmgd!a;S95~DWf(y5`lKCt2UN*z8`H6VP5rI{+rAe^o z)VV^DCI5ky2_HDM0Bs|f{toh`9^&sHf>*;9AmnRbG&R%CmqfAoaE=ity^g^Kr*adL zUb7(#q>~#r*{O3i`EGPx?yUZAaok1MQ9HWt-K|2~#lk6}?WSmPVx&urjkg2($?zv-%`(9<*|}Vb>xu2XyH!LvW?p-Jd}IB_tZ`i9 zJ)@Q=-#pr0eFfHKxK#Jy%Nn2d$f7HQ(nQo-u=c>b$_lJWrBk=2c4@3tH?!xRBZt)S z1E}h|HDH3ebqKHKx>5N`d#YZw!2r2?leE7+8EjsbE+WnfQGDUlB`%tIse|X(ScuSI z?R354j~aHWXJ-kTG^Q^tT}rpuvylwDX57w+{uUyB=2sE!>I7x^x8T9 z>3_b)75i`hZSwYdhT0Y_A&h!4Q(ipYR^?*6yfixc6~5qg(;^1<9`)8nBO)FJC(s7Z zz$&L{^+#b!e|Gy*y>kLF0DifC098TCc#D}=Z(~i;Xtt-UFiK$7&cXA;7h9r~F~NzP zycPNGXe{!5HHy;+oA*{2Z&>8+y0#@MGbKiOZ(tQd$rt;ysOJ^FGa2M+nLH(B`NmmO zgfJ|-%bwa(gNd@2lti zcacfLrkm9geucF19TB7-Efqk^{G&Ne4~)yV;-68JztLU%DhXo@$)M!fDzgOMt)P$; z0Et-TMyN_4BCw|Fw0e@Q4UP!WHdd$fOYYdqkLH%4`2)xa31UIEsZ`1elq6&{JIT4} zq8t7_z}23XLDr4>AL@rf7b~O0hsE;Xv!+q<)}Ff$^f5FI(dJd2XkWQb(SDnJ^|=M+RZ@Ih;e2vh8zL?-bRFP1K+) z5a)_fj)7aOxVE~qx`gg^5wX)L_Ee9r2m6z%VDsL+E*4;4!Fy=2JzFLXfu=!p7{-{1 z47MIywFjzG_?;^)%$gsJ&ZxY|_lrZ_m}N^=n!Zi5ZsVT5AA1)#>PFDUpy=vkC z_vtfUg&_yavo~U0EG9$cUzFMk_Xc*-&~|5=Abzsh47?;rT5mEVPI6Aynft2w*h&$K z)h;h6jZ)9!p-eqGG*TsQEf!pXk6d`g~}Vbn%2C={Rl-`X`Lb(&@V>2lV9P7N;Qofw{<0${wU@J4qqw#g~& z2F~l-+r2JYpjU3%=lcBbW{0{fox*?Qg=3UraL(o(?W+Jxz*a54-MiOK zp=h&6MMO_%^QY(peNpwYCL-y4_KYg@_ZWgjH76MleHbC2)$23@S(3f!U;25FPWcUe za56H>iIkaV%&^09i=eZ&5&zofF{VmQp1X2nnI(p4l~as7Rddq^TbgjXq>8^Y_~;0x z*~NTv4fXY-Mobj>QW}ey^=qhw1vD1gxAC1_zJAg)<%x|xkZ>KZtwI0*j2zQ#- z0q0{qCBFXSKiv?O`#)JaVBh6Am>*hW@FDBgJFacns zWrLmlOIYcI7%ixLJ4_xQU$QRj4fCrbhD{SqJKOgcw0h&(#2%-OuWt*DeGFh7RsfS^ zf_h5yokVdZ%=eDN-i>78UMizwYqaIoP?1Ita9qg;F_LZhPX#I`5d-=^$gkRyWv@yv z$JY}i(YR^ae`^{fbLb4nnPJNA;3)vT$DJG(u~f7hd*eldY_$g+$dT}mXHzKVXcMLv zS0eW?pX4}d&P!hIF%y{d6-^6lKk8vnH!Tzewr%4!DV=$3)n}Rw&UeB(r13+z?KN2V8{clIfwRs@>Ibo$C(f*^YP`@uX&)gI-a|MlBA`|6k zqQnnkqAmU};!X4K<=byn)|qM!hgLNGrZzn5Gv6~EKIvwKESPZ`2>Ha4%FgU%buN9< z%@6tVM%ycQ#2K6qUr4YvnZJzV3F{#P(gn071eE{tP>`G;($+z#o#gr%cRl%yC}t*-F- zQbjLF9WW*>McW({vlVPI-AYIa}=Fi|Fl5G!_mj#!|;Vnz4EYr1K_)c3$W&PR-;W(>?+A7wSU0 zV%m7s*Zl~PZYau`SP%3zY*{~TKIvwnXrf@ITp76Hp~?*tf?oqM*I-cFoYKElMB1r& zK~S%&E_xgJ`l@l;;q&1+Q?%f{GssR^4)!elgl^VK_)=N84e^ZS61G9H`wLd&R0Xw3 zQtefiS#wXo`@5%nQVwmyFwYg3b#in?ML)+QaUJ>FAr?XesAXqD( z+Vp%5^NSt&;K_biapOI?(HMTNZi|`)7i)DwZWE1aU8pVzEnZ5x@UQ>;U)NTK7859} zZ~VYvF7Q(v9=_ZDE*ce_XtFd%l3^=42{NTBOaos5xTbyywGl+;27Z5^7J%bXroKNu zn@pGzQhNW6hxgircz!^MgHtyO|)GK_4~3Y`O5|6Or_3bHuipuqmvglnpe zXJ|y$6kwco(~fFP=EG+w$^P}9|I3(VBN|Z8)bD0;bK{reLv;AVHs;=V?lY{HJ~tme zvMd8d3XfNmuQ0SHX?F|bq(@jXSx95G3z*LmT{75G2?Im~%JV}zOXEGQ?Ir9ZZC4B9 zx}5Fj%$@_!66MK+-O9Mt?YSLzco?X;UKSZ&cHdW*E%&n41@V1qnN3$nb%s!9wo}uH zBzFfUGo!za&O)on$pt&d8;wwd;@u~AKe^X49lEI)N$T}Hb^5;9gt%RxfgToLsIiU1 z5LQ{;yqqttaZcCRQrGW#;IS@;U$420nCq;qKf;uMyM|lqwp^oDVPtS(4==%L7PiM9#XK}f8B171$(?&A&X*cl# zkG{l{qlWQ+7=V@gvk@3#-4D)}pYrIG7h_-CY=WM^L(6MY)E;%ZHXT$2^`R9vbOd10 zqPkjV+NA5$XH7Rf1w^zb+8`VQ3;;l4>Oas;8PX3lk#+r>-59z1%}pexpw>6zyE8a! z$`+01_B&CVtpJ22WE1!5nT_C?AruOsO=cyS(ya|yZ}$NK8@}^CNq-I6(}~?ifvS(P z_9PRL3J<<1hu>syLIf2>BN1)w@beaJeohsx4tP6SK`96v2@)i{sGkj=cBAClq&QN4 zwnoF9aQ0%#?)*P^`?t)zsF`@2%P!$-OfSC=vMX-U!#r8+MWE2kBVK>%f-zJ>$w8Jd zy1^sa3aP(r6wEvrpyEW%1S!EP1uacIAyl|tAfvFof*W8ZY`t{$7|=fLN2webdfZ~7 znT@NW@?3O`O|9ppcXJr?Xwl`8z@sf`sc$IV%tl__^mnR%yb_gOLIr>Zp-8%AG}su@ zZ7oycR$wG(Xm*y8D4X<%8Qkqq#JG8c6(hpsUjAcVv0l#)W~-l!R$sYxl7%2IArjtbU^4UiVXhqZ*sv7QX(|DdtcH z>X=QncQeU#DSD^K=$&RX^iMe!xFhI5HZf)P z(!`SyRW$GF>Xt}eIgVGNKO$u_r~#8Qv+LmVpr~~5P${OqBY##&CS*}V*GJN{Cr<_k z-~N$V+OTW3CqJ6aAb?!BEY|+5pMa_+8O1%k2RF`c)qcLZwm+-nBj)6DGsEy(#us+R zDv9+WC>Pm1u679Y2k~m;iAd2CtJA!(zP}i~rF!L!3&h4CftMlsdxJuvXMdpq)HX(s!-FISvwwiWB2SLNU~^RP7Z+RIG| zyo`nc!m!83`uW*U|BDkwKrYsUqmvO7{_lBjKmE%qtf8As*=%l58hN>j-2N|X&c1nf zmlhoXhh|Noel!FF+rvio$0=|ee~Nqb$}(@+|c z6S^AOc9|>JnH44MHxbAzVrWqzlaaXzvjfUzbV8mE z9%_rG)1ShG6OsEF(0pcX1l@5x0$_1U}f%X%!mip}59H@pnde1Uhg(Zt5n6Smf(?U6Qowy0FKD}0_#$>%lZ`myb`4MPg-0|13h}@ z`?wjtal7Kn&&=v~k2~gFHn3CIh+GGyW0$z(p2b-<<-LQ5#?p@JMXPK(wt7vHcRlnz z@q+8t3-ZHr-cI^L7;-1(gmt0@WstREgtovc=C>lMVv^t3kk;&kfT&7(O;-{o?db+v zZHo*UIaa$l(2e7>zpRm(tjRuS;1b|*Cpu~9v~VE~#np6v#VQnRgxiUN?C_Ofi_f#p@ zMxICsvFu9~UGh7S!woaAElVyZdNGoo)1{lR)yDEQ;ty*azy>&g32Zaq8^Xpb1R(iu z{`AdO>TSWx;*7V#Y@4Pvgf2l#E-_t(Urz7dJ)Zpb-k108M%>s=_?$zX-(915x5d~0 z1n{pa9|GQ0A0t_U%U-^U%#VjOLd?ldt}~2fyg@4ybr9^1bB5&1z50!7(DXN@L9|$J zW3WLxOE@(GVq~eOR?Ry{N6%=|Zs@`Zq1Du!!z@L4$%Y0|w7oI4IFrO#UZE!dl)r4u zv)q)DQHMI%a)N+UH-A#MsY9?Yu<53+vJAP|3G-n8-osCRv6hJCvFT+}3%X50^?5f1 zmKx#+7p+Z&;Rh59Y6#Ts7(zcOp&6zo5<*{x9a7e1uW*j}7q2>l=Fuv5Y_A?RRHA1l zL>u#Ui(knMjM{I#kOS?;lBu|4K7Mkefq=0c^e1SW)9ag{#=-b7ee*Wq{ea=;T|D8% z@X?F?r}eXTQ3~ zNgeDLzUanz{KD7L!7NQ*<%U>~atGUOWDAnR*0e8)LrR%_cs`RRB$yO1NP)A6yl2z3 zglfa)+k2WvP!S{Ocm2I~qo?c9@#2G)BTTMrSMBXwYJY29ff29pNcJBE zZ@ZNRsgR(PLX`sYWezs#^5<97u2nHrCTqNGV_Mc*1Cj(Gl~hi|KOd0CX>~80Gz)_v z_dY-_Cuodq>+C98+Aaq>`hun9cCByrpWqO{dmx0q7_Q_$KKQ|Cnbu*VWJDbJJ*wC# z3ODzW!ghtn5ZwuhC4uZTx3_K+R@&n_{5AggSQ}EQ^uo4%+nS+MCmmgL6pcI z#4I{`F)_Q2*||PReUkZ|d+&RhiI+*sq)aR-N|pfR%gp!Z-gD1AXVRY!J5-EpWbG{9 zl&-U~n|H)6)Z70+0)hOX&YTNUV#@aHUsB4SK_U1IOix`PHSR4{S-vi!qMfa`ZBYr?x%xNe83|r&`JVy)`gQ*$J<>*@Xe{RjUsF*7m7 zz$R1;2dp9_3dV3g2sFe2$?Y16Cg?wHt#JxT(&?lD&CG4*14~fH4cqi&s&3oVLe5di zy5`c<*0#9Xosxw5svD=XPBCh;bm}zKU&9 zD3}5YsmQCypR(W$i_>sFsKSKSZKAvjhYHvN1~9&=Z^x}R`HdBEGIKxG#(Ff;8LQ-9 zhJ(NeLVOhwR7^Qq7J}}XLGX-J6NCU~JK&o%&JC4h4^ksX+^@i32yF{Y<7O_>Xet$O zNE3+cvYSYMfH@*4U^K$Y>^VqH)+_A#0)09g*ySW3HPsi!Qx!$UAC+*T#dMrHxPU|t zc@R`9=PPD3|8zV$VF9=*x%DaOS!y+rgPMm?B5fwUrMW#b7RKb#f3gBYEsjD+#z8@T zEuzPUk63Gr{kX`T%6CnzFl5uR+PUg429(X@EDtuf<&D8;Sgaz8>YU$ABt2rbby_$& zGosG>B7EL@X&F(=6JkDqyy-BkSw9uvHC(3g@TcApqQvKF;&MT*j+Sia-B$MalizyM$glmGkDMHQ2*q8Bv}Jexqq0sgY0% zwAQ~F8CzXPO3N35Vr&XZN(5(eCTeAVlrm59C#<#!g-tc9p31e*&$gO9T| z>FpX_o-(JFWLtF=L`=w~=*VS%to_}a1;PsIL@i-c%r`_+;HZu)4EZ0z8j zJ2|^))9CFeV@G!Fu8z^2-DmH<`=iH$FPT{jj(DRvCqPMfsqB8Ocfwajqp~KVx^k!! z#YX-NMV1dp9NViOF1vS2E9%$hQz6V$RtSn;u)7yr1-Nc4^Gv6{NyHt4N5n8Nhs>_1j0R8`97!rVxTUn7t?st;_oP95qoBN0f}X zf7J7xWc1Oa7zmD1WwNrL<|5TCV@gztK4a^kho=?wD{Cc2K|(vfDVJq{&*40N%=04R zN)jJ-(xn+0m34%Z`v&OQ%>?=seWcbq;62L%pp4;g4*Te`CN{LR$ZYV|`OfYR$v<@j zxL}d}U=+lIgJ-9Z0Fy|`0@GR^ZIY$wd-JYLI)5l} z$9b$2dTPwSW&Ac$U3x3~%l6IYNg1{cMG0Ku_I={M zaLeip>@QuqZ{)Vl9pXuOsxEsUaymj*c}^L}5E%x+7xv@syjt9G-pB@~}#|TH0xCJ309M7khj6 zzxw*&_JgGYI!e(alri+T$0TO(%6Lz||H8h#F?++*z5M$m$7%SS#?l{OTD=VjWjw`r z+{QE;E#|G6W%J3j1_DpYP!dl335H>9J}a&3={LAvCXmLEtZTZrgr(^Aw+>@`REHnS z0o~P3lSa@En8jl|{HT0M)=&tFO5ng6ZM3Kb(p;+TLCg`(4S0M+AF)0N7lYJhMq}_J z!HQgg#aiF3N|9P;n((Uju+MpwRXOMPHDNB>!?JDcz24$diM{i!sTkz^1H~$A zG!|w7N+__rF?y+_CNAikaZ@Z>u%$#xr8jRpBr(>|k>{sR_|3?}J2udke8iv!4vIZa zp7tH6EQNqq%zNvmP7t;}ntxkKppZ!{RGY)X(3REX2Mm$;PA$GEms}SsbmMR^Z?_fj zx!scGs6GsXV*wCdlBzoBYr^Ei?V8i21MumHEZE#IupH9Zc9bBv4qc@4; z8*CEF|IVNbXK8YKg~3~%Q}2g))f*w>9ZDBZTLOQL#Z>N?90W|W8@9&XQa^i4;Du%n zGL|Fji|g2~%fa^6ULpqWj}$BBPm{TcF1eS~M|IWS4}-&>|IPKzKHIMRv`iTGUhK54 z=%;0%{%t!t^|Xw*M0)P+UdfIcz~V5d-PqcBv!O@% zW_nFk#2fKD?&+S6C`!)$D-eU}{6qp`Yk&J41j_I{sVtdkgHkCNP(HV5xge}H_%B9C zvdG$0r9p{Y9;%O2fR2MSIy`|(XeuD@5L`jr1VX4oIKJfu#*jZQMB^~#k*UC#viDpR zxs0-NbS0XDx(0KICU~2IG2eHfJ4i)->i#5EI>TYA8m3S+uJ3MohFZ>5rZzmwDD1>)nzc=};9Mc4uOGnvl+NS}?24PO7S z_2WudC&Nkq!{}^up_+-!IsMnhK3$J+Y5w$TBx9{{XiPWHFke(<;5nLIsvAy<0PWh; zPs@5Q)03rI6#wpMim z+t<7i;^oWj-kN=6>j?A|agi^zM0%39wQR;ZeOz8N#noI0bhB}%a44*Ro)#7joDlg~ z@dV#zcw>*9lMnxnAXtKJ>9<02RAk9|>5UV<5+OAt_F@4&Nm8_#6`490x#q7eu0Abe z<7Q@n4X-?2R#E*nOrkLw1F^x(JGyI^YTPmO41d|SYVBa)-wthM?U@8^H4GOV;}Wx- zy>5STu)aSy9e|Z3xz}Y_JrHB1&%C&`2oA=A;cKX-<381z(gCuzM*ZqyNQp zx`A1Szc&B(X;wDGk$Qve0m?kW{7V9xoT-|U!6T`$6ubH!BKe}ku=ZE==d zhOT* z8gCZjtIAn+mNdMS8Bs2hrAstV3>_h~m%4{X>nP@DWN`p$m2iZ$iFVAmG81_F`uQs2 z4%4Pb-O4JxVnw$WKp31SwUwrY#jP%#!CeE3(Ea?^GY&dG~DVN0+4Q zeFq_e_Mkh-gX3E5kFbp77xZ?3T`PbkVvy_AM(+=!llh=klXvre8Q1F<_K7f@E~;Yb zy!Yei2vPI)F_f{Je&KsH%s4gIjeNJK1m51k(f&JS?4aMN^p0Rf4%xjgdp|N&r4CY4 zb#?lgUoL0DtC&d6v*OWTCuD6D^QC)vwNtq%?KEEEf6`kl9Ln=9%@I)whE-d!q?)oK z`(T73Z_dIch-2h&#!8LElN1#=Ocri<8YYSuR~Z*#slw7wFeqC6?I20+PR(?@o@*z-Ns=uB4k>QQeScLK{Zsmcr;#D^wPG;&tK&Ahx6q zP%lX<@OS%SQ^m0ZgR~KB#ag(jz3AYdfYM;0W#SHjXBg4I4)3!O#|uA0m}jP&p`4$4m=HJn>{%%4#XKCo1iH`(u(#1_gBfm1JrXcV60CJQgy=5KW4n5Ir25 z7r>0FnaS2FVSPyDR?q7m?JRW4N+s1^nFyj&`jd%1krl9(0w&&i8pLw`>2u0Uyj5T- zh&flu{LP=k5}K-&gnz5nMac-$zXPPqXv;ZiVjLz$mH9-=_enC19I-9aIrrzlPR%BZ z8Ca2v{Z_53AvH=AiZ3m9ih7A2Ni8&t5Wdk25L4YMlwhUYVs_QYT2dWTzDR(Z?-p1~ z&Mml0S{rn4ZFhHn`_2*0P|l=%=rBsrZ2`81R#pEyr-nPcMfxO`wA!tB^Gi2wv%(-e z*A9-a1@8};Wj%CWk9rAwj?KaNX-Sp*MvZvxBqq~qrjbQM92_ONVx6oNO0O&KxCWlV zf3%IItxY9ltyP^Qef7N+Hi8lr5e)XgUHcd@^6Ds)WV0&>th{88s%t#Kyc*c@z1!w#8t zQKei`Zf*CbR>Pm6N`#scqG9vPK8mlcX(NM+tkE4hyg9&MmZgv3y{mwLCMQ%vO*kKq z0M}r&%};jmwf}_A5B;Tcg#?(9+npRY27Pd4>PpFvu^Hmcb}gAbP5fVc+F#UUwaqIn zjatPbTFM>mupUD8L&<5wT(>}FDc<3t?joD|uvE30OleM6f0R~*d3K5T{)I|bCQWIb zKj&&jtHIu^iSu*PR8`eZVBQhoT?C#E+{q<$1 zFK_bLEDgwa&xA+-qP(KqM+4DDZ&xkqNa+3x^^WoIbSY=OD`Ma9V%(>R7b4?uxN&Cw zP}D958&AH5Bl-0HSBCA5&Rq3eRsHp^hCe~ZZ!^}4&a2Nv^4l!UgR_l470eMrluvU zRP*y7tc$rV=&~#$*cJ{}_+L+QKr9WUQQX~uCdJ-Q-yAA$7Y=_njYEIB%-SEVVWcPwjYJ<)+Njd)?V zmcqAn@wr&Do27|)@^!oGfF|W8g7~zLi`%$i)4df%ijR5NQbi!pz|{-ttRu%11JO_` zedu*0YGbzG{bj2`BoOe}bkoeLvSo)&t;5Wyjj~pt3)`gAn)FN`oTgJ$o3izbG0gqw z3IbRX`8_D>1>U4y?l2uYKvAtFKN%eT{J*9c)oP%JD=FNj@S-n#`)FX<15QR8IEtL$ zZRdZvo}6=9r@-=U_*`)JqO!(YSB#KdCc6P;jPx7YDL&t#Dw1Q-H#bXHcC$1k+^Bh4 zhQljo{~x|v4M$Z?yMuA1LK*!y77QecbyoNF#kvX8Mn4G)y zbfKPaB6@vh1;hFDLb@jrcrF!Vaw9&9WgH_`G0^+nedi{r(cR#kY&yN!i|ex|6r}Xm z-jv+Frx6w#6{E1K{@!B~^EskQ#GVvON1_X*B48Y3!g&zu@VZaY{Jvt?Y#%W9!W+Od@ z{C_Dd=@aivy(?ktw1&7C5&XSmHvHwU)9~1QSc3iw`0_eBs)Hk$yuib4pSoo%Ws<@K17gG3K5Qq-~ec)#>r=75(@}I^alW5H61Y-k#o&EAtuBxKkU_;dIzP9(AHp z)i^ywYben~N&dU7?_VeEHX4n2dxv>i+H9B`yKN~XwmNQdXG-i#A6F&TU>H!yMwDy` zPs(b;^lF{$Bspua+|T-zYJ}RDqluD{r6{uAO(C(UZy0M-`AE#|&_Wb3$clcH@}g#K zw_S0JH6bc&v}}`ttq)ky+Q+>4uq@f+$wwB;Y2_--c1chz%3&gqS$j+SY%VB>xlF7{ z+wH8jdt+<0&jCEhiE6lLuj0y2td`H^`^hab?rWxZm>oUBYE6HaUtep{*3be2%-Zg8VW(M2YIMOaaObGdh?)U@ zkX1zAXQhJ{6gZ2&wZ&zp*t}6UDPg^}Y9%*gKWn#ALS5zDbpcmJdsYtec($)!h37GJFi}^CQCaypLPV>mI*v8%Z1Cg^Hwj;jzQ(qbAz zP5qLSL@ltSI8-&@)9EgRK!#hFgF+=+uihPCRz0@Ta0fh(5tu}Uq^rA_=j zL&MLLP`75Bvbl8Y&<>$W=www7N^`P$HbH&T=m9z^;_24}y!pWF`hI0ybyl zgZPjt%IwnMwEJph(mI6DG5d>t#%ey8Wg|BgmI>RZFvKqfO(v`F`O@SMzRaVx9G_%^ zZ`wKpze-c;lTe4d!GVTkwk#%f5o=AI64wCTSwBnTKUhlVLkSf9DH$0wp#dW+kff)@ zxBHGqc!XzK==KK{yz zzz8`6E>ArL#u7j&pq0Ag;>`nxiQc@f8o5n{Hk2}r8E60+TFcG;>{K4DqADc)YY3#G zoZWZpAH+o5hNh%@dK29X+8LVZJ@-f;>Fx4vm=FU_8DHv-;LtfD%7owNM1Ui1c}8+x zv++qJT0MOA(E~fs|8MFSHHD~VQ%q}`@~90j^2PLn3lFaSaW*^$T%1%{QJN22na z`6xbU5S@ooTK6$@ly&C4#_+|GN=#2gw*7s0WMF*KVD%dxQbmuNXjS|Usz>zfTPR)Z zhW+Nns*DGU&lv^M>ex_J;rxxtD#$rRvwD!euAH91WGX=I|{K(14 zv4Ack4+K>yxvd!0Lp!(!fDoRSo*|osI8>jR_WY;=Fk&vpyQ}f5vn{sst8Y|${T#V* zJek10<%uC};MQE((u_w1pr!6O>yGto>BZ#mW`*S2wS^9epEU|`5}EMx{t0qni^)}= z+0uG9dDuCHmur`+`$z|KWQPEBNBJ3OYHKZ_um**lzy^~p zB{3&1;GhTe=I(37R^2!ZIb6?IZ~!qhYbW(M9jKn3-yu@L3s zXj_WnFUr zEfS7jkK;4H)LO01WQtpL?>8S65Z4~`Rus%uV}sPLALK*&QyNk;n9Ad&Ra1HBAtvJ} zCTi*>`6Uj%KP-rrh*F+L_muSF#lv3Yf&iyAT5)jP;r; z0+S3=Of}^yp3q?UpMCpMsZLV+LhZ2S2pmFsi`3cb$22J}ZU*I=M zQL6pp1wN7ms7lIbMCD%5NiH`_LE zPbgL=<^i@JM(5VHwejHTSDO#-KYsAllLrqUe3fA2M%8g5!4@#KXC-8Jcxuat8 z)!>w&Nf=pM<2kUSPlX70N!L>Ih)s^B9EUfZc<(4X7HBi)KT)i>$}%|Sy7UbJN~%|y zP5O{%lQyub@yU`!c35>iRgeoak9VPPfRv%$a1C7+Mgp7_9K%%8_E*xzoJ{^?8`NzPm&*7H>n1#7CQ5d|fvb$gDnCH6-hGq?z7YQNCY z`0-T{A5`Dba@oe|{mxZqV4CUGCe7jgVY?S%%SauNtmcI$FWLRW)j~PcG$Y=K&ntEn zd~&=!g|F2#5i~#T=KU0m_S7uY$4=dxef5Jr_+?D&)~#*Xs`|IpoYqr17+|E>#`~}s zu{3MecYNZlDc9egiZUls<#e(Vx-+lK+RkDOw(~7oyH}Qn8(fyia&4Px6gLNQE8(+Hm$<}Rm*>3%}-*#;aMb2DrfEQ6{mif@796;OK^Jv7aS_x}@X82hrJG-5Bb1>*6;P>E0}z z*EOh@6eimrcWVN${BG`U=fUj0Ljhg40ea?#eQY-6l<%-0vGmm7x^n>&wN}*dNo$f! z$X4ashk~hcIv^78KLAJ5=W1MY31+^jwEAXg&#v30b#WzP^jhM&_O&7TpuCCoEr(cZ&l_Vfmn<`NnJ6e0t} z&y=-nTk{v=Kx}0HdFzvZck1kO^0vX4mZzI_$;Ff;n*#2b$wk@X{CHuW#rjJx5?Wt^ zvBL((xJsJ~xnNdQ+WxH8Fc&7z)v#!CJf%JvQ-#7HINrC$BN zR4%(D!fnXdvqQMCA@fH*E@;N3fQ)133YZ24$!X9jX6nkbTursbBwR+7U~z7mAl{$h z&euHVD~>qOeeVf2+`h&>VD1?GM(>=8u0c-+Ltskj_2uhObamMwrMMlhqy=f_m6%Lu ztB7`_3tzV+Wqj}T@o{er{PdL@dakUCc=LX;6g_V5@T_<1*c;WzLj>X;kaV&n?P&c3 zBQz))On%0qlrTZvY`}DqB*+Tltx~7~GA!0uh^l{>;?AwRGCN*s3(9;p{FZ9|Y9!IM zxK8creJG**i?RHo+JGCq2_I(S;2E#s@+us0QU|3Lkh?KyO{879qMk-!z|XoNoloNd z3?50@dFe~y9-#WJU+vC1uqxkdz4?-zi2fbq1--lA`SiW%Q1bctnX3gP%}FG(uBcRD z2&F}cqJV@6eeuxAPGt+^)I((i1=+y0` zPUayR(@O{Gr5F^~ngatl014s#XeFDxc%}ZBTLj|-$IuW!&x>jin)mJI-|3s^) znRZ>1>n&x41X+>#5e7h`bIsANrO{GQIHUft5)ZtH9CZ2qq+Ov+b^-jeKdJ9vd%<~U zhFu919b0c4}A{2HUkZ76+2@a+fw4d5d? zbSkvgqMh^m1hHDyLikCI{*fgO7)jcxSeTB>ij;W{=(!*StSw8Tcuqr7LuaSIrxvYYS8 z5yOBP#yhq#r@OSSs)?({IV|a>kU|!e1vP8CX2j*egvaoTpqfIP>c_0@tBY|J(#4$>z0B z>N2%JoQuv^sj{siDmtWR2)yfLIz1U1?6o0a4?JTiqg#yJHe`-ShN}T?a7vsHM;D+Q z$0sLzVSG5bm|PqT=ow;eOb`Fd>G=1<$@;r+HeKRtRd?zUF;0*lXsqD%@$yY9Pr3bb z8wyMn4b0cUf&*+WY8QE-vsLF{xXSm2a7HB`naQDczGkRaL9yhrFzOXf6YRtGH&bS1 zqi5}(EVGc&5Vf?Eg*p}(UnUo}f4wYeNaQdQ)u60GAU+|D)i1TPM4yx_r^v*zz_r#; z6Y&q5Q9_XyFSb^O&mE6A9Xne0HLxoDZnQK<=W$&!PrJq}cPty)Vv^7)BVXzywE9SP z{W7E?Um@BTOrl-Ws`*v=BYgeO_e++qa20;M{SKn4faPU#})zGEaOFj&IG2vKtY z|29QHr<$5xT-hAQ)UCrxx&3XqU%I*drG3gVD3-w?t$ZDsb?Gm^2bPcJ@Hb4Mimmgy zGJDX>%GPBmP`%j>c6&RfW4W2)PTb|NWu&ktW$ZQLQ0eWEkUEsJlC)G~IMNWzBdo(G zlDCmZsuH8fpG;W^fi$xD+<5H$QX#}*Y;*ps9m?8_wa?a-uPi{1Dd^sjS_8Qm;UpYg z8n8~Klc5mUPVj0iHX)9RW}#Lyd6gAcufCv7zD}C;g|xWf-D;D}wiQV?Y2t<-x`nFd z!Euq7Hmm2LRJ4oU*JL%~hlKOK(|y|uDT}Hyn6XZYy4(S0lZrrWxpoZLJ`$bHR;Tq) z(1Mw&@6GxJ6$L6xv>Aws9CJ%M;q2HPM^XQLYi54X~FKlUqkmtpA)B{?wF{C?vv;^ zh*E9W_E=^uXcu)VUPYbkX-VGKdq%VO#VU3hlTRP(fK>2~OA{-q4RG1>K_L3Dx|VufCsks})yr#H2DhXXu|RxjOjVr?_59fI)S zG|VZs49}%^Yw;gi{j|;{^gt1pb#~6d&)MW&yp9sLwY+-&A&np`FO|;iTVR?l6&0ou zc(ZtRV08lH9)mvcY?VJg5vK5?aJ7xtIbst%b>Y9qB4y4vaO$mvaBNDs%&E}fAk3I~n zO^{Fe`c|y7xXmxy5O;5QwKk{_+()|%yb_diTAS4zqPdO^xH?W+RGnjO)aO;OR3thm zTxodBE9(m1o|ef=CFxy>cW_LQe{$$oFOd%n~!MK88iGO zLd2_TPf4Gai7l1V$>|im{nh(D%P#G(kNt6s2+I{Q5uom1rn^2pUUz*gKD7~;9IG}` zwf^bl`M9$-@w80ELvdZJdLOpI5pNlYqAs)lZ1&fGegD^grF{o*tNPGi|C?sY9&UT{ zFMDgx_HU@ge~Z3s&WD5f@j6HQ`_Z2V{qg%&^pcT%!h#H$GG^sV{T$m*QxM5^y~bK? zX7scY7tT^zzD+%_7EiLJg)BaMlNwtlThJ*JbSwHKOfs87u2lH%{@)GhecB}S2%BN-ivcNF)#+;&C>OK&NkFTc_rO|bj;`MBkQ2VldT`l!DATYHP z6wLuCr0VVE%jMSG+Hw6%BnT)jwL&CYMk`UQ=bpP9O)veY97J?bGwGI)JgG>$p(5D<)4; z7WNSNZ zAKow1bgiz#(a--^;Y;s_=|`Lb|6QrX4b3ZV*X0w=iAU~v*Lv7?j#mg=qr(*CD@cC4 zk4%uPmC@47aivBbeddmW;z0|8$;6-x{>?4v!8M~*P*#sec<6ciz%{)u0SY%kV7>ITJUSNds-hHq+yd%KY=81+bpB9J9p3MMHUoClewAD z^Y)x%U3+Q16c-n05nzk7q-RP}pxNa-j*bTNT1N$+t%SsqP=`TB>QbLU5_Y@h*1_AB zQ2Q6Xe4QWj-=P&Ul>yv|lZMhl$e{f1Dq-x}jr|Tr)NE!Ln0P`7GN^~Pe(%*o1t=u^ ztK}0G0oLq3oSGGZV@`{d)4O@Lg^ykEi% zi^~N-TsoqY;5>(Iby}~9k3V6X2MaN(z<7E9PMDO;R;HpScF3a>=K;Bq%X-w1)+1Lrn8uJJWGf% zsuG4mOux5PY0g34`!HRP zS#Pu34ea$-Zb|1$N{^=p>Mv1Y$Qm-*V+N|7jlEjq!@8jnl@QVa8R-oVM6s_?y#kQw zt!;m|wXcSa=8b*UoF*RA<6 z{FNAgHD^2Z_#WOb;4dU9$TR{ln~(nfKkI*Y=L>{b9bA!dHyOZ(hgQ>2Y+8C}ZCVFC zLvL*;r#GDl=L6zpb4_QdppdCzFgy>#lWLm%EG9n6(l9&7Z+fphn@DF<)p!0oTPj8! z8P3*o*~!aX>4!xkbpwv-1G)AU|02^rW4#sXs#zh*%!pW4=d9m>-AzsD6mBpLGes#& zy$MMeO%Eb<$|iQwIVYud2c5JkWRS~FuwT|XtkvGr@Z-|MvZ%VHtl*Es$yF;!^x^%| z%uMPfh$|0Fjt#Htny!&3Dvqd2uWx45>3h}6^9?aPRqwpqrUskQ(a}Z!bv9t5$OOt<06ln3ML*C0m8%y}_)#K+l7)*3s;00WV8i6};9t;L^ zgVW04rK*AT72hT0vB zteVM*c+xWaNNQBnTVsxy(B5mX2kFUg-ru}`ulIrnNA!a-xY6nSq(jK`(z*?`*c4Oz zI2?$9ZJKCP6o0?z)q+cnq=WbNy_8qKXb%}mhrIlf8~fGE!G~VFmgK>t%IxTUDp}Ts zvbO!^`;~+Zg7(LQ4@(nu195Q;bG_=;2xGC<2!X-p+(_#$N$o?ElI6?907@9y?}x;P z28`;_+smF=tBY0seRfIVl{c2$ji6@-^W2@n17dSvj?U7<%funTq<}1;3V>YJ0ZudA z727u7_4oUUCro#Kya;YS05)@+sW+(LJ!zC>E9MJb3z<dq{qBB>~^%f zr5{hXlr^Z?l8qf^xL_2uJGQ?9%#XUq^$tio!^I_waR^ilC1K1TwaAWt{(rOH)?)tQ z=YN5k#1ZQUIzluDjC~%oM#UTU_ZwE3MJ)JvJT7Bzsb4ri$J=#x+_#wS;h-B zlQ^8a_WafAoZL^)De-(bCBg}w(?L^DEPlbpRoivj)95+y`0JiYLNZe5Zsi)f5C%uC z{AxIZ^ph=jKv#FjQ!MVf z`Ahu_Qtj1CW#?R+Z;&O~ID@@I5{WIZjkA?2@oFzC&Ugj4`#y;&Q;kC>bS{WG`sCuw z+2$wq-t*y*s*H!6D%me_4Lq8V--^mYiN{`%a-NakL8O@s-00C$iPrWB@4333#1la= z^XXeNR%B+>0D}f2OA|_FxO0u0^S!95j}VJ ziZ)NlYS$mdQqfwFV)}Y6kF*~)4+_AWN+aerN3MOaw)6J&^Obax5IY|Xj*Ox$*8ktJ zo6n+!ve|Z|5vC=ZAEskgB-3_wd(06;@~Y_s>3ehRjxN2A3c#0JEHJM!6u~wS*B*Z% z%0l&w?y0pNZ(#Cj=Zo}aQ(_mUbA*~403kll`npS{eA9JmEM-EQGs-@RN zCo1~Z*0_t-#?f5YAaWu2)(n>D`h@ImemGlPEXKGT;YI~$2-xraV--*8$YAJ z(Gw8I8|aW*pY!|j?a;{eOcxjaC~8-+TL_U4`e}W@=2D`z+;8j$$9fc_V}HD?vflLI z{YdwUaur*|Oz#Rm9rGl!o2#6}|3hp1{-6M*pHoe|r201jJ0~`Jg;>{^JOL2I3dd{D zUw;4g&SyV}!pZm&4bIl-ZU^S|!;Wwk75rfD)(X)g@KUAD8vNtY83qkZJC$#hruXKP z5gre2T|(!cN&KI%B{_Q*F04Am7gEzwSt+R75)6Yz!JL)~&%jGT{hpqmO$>r$=)Xo4 zPF?1Hu&Suzv*S`16C`YtyKcc^M1QfsHRB8kj$n_!Gi^%yyV{+w_UJwk0;Z)jqMt*{ zG0}3_a;;Leo{44Hx_DRodUd1e+y{Ef8gPe$i-EN*L@UUa$<3wjRO`KCt1S`d7yq?= zqLz@WS3i)>TQ}CT_7g{>*Pd^^eYG@Sy;tGkgA#J{pOnoLXQzo~I$sUP>#8?n z`-;Tdz?$CL^X>iZl_U&@Hi$H=&eTEUv+0_8L^31yWJ*}a6sU@I=addaL5I{U_tYdl zT5Ch@4YX_9)OrtirH!YSk0$p;hgj=viayxHEbZB#yajLu1Ek4}vl4Yh@U`|Le=QTs zT@}pa7a$Eey!#SXn?>fxM;qljX<}*irjn_nAQlH0g9E&daw3%gGU%CjY<8cH+IbY! zF@H-~E=?hK=4ClP)1L2T5=CNFp~S_LUR~owe}@GG8#c2Zt`; zH52ajUc0WNDNt?At^Yvqo4?v0r!yY2|1R09|4`OJ)0pED2{QP#uf~&P6(gL((}baY zeX+L+dqX8sj&4lBs%7443sqlf*3&TCyt>K<@wySbLTN2C+3ReN3U5|it%z_2t1C6| zAgW2gq?SoUD%t4u89e~!d(wGrHgKAZ;g_1%&uogosyS{hF|mB>Mw8~%U#!NzUf33i;h>4LxiQ| zM0{A9-|aZI7Fug!mFGQ{z zNYT|1lXnP)S)pNxVT~Xj7@sPZz8z$qVF+fwB{-Xubo?6N{>wak#hFD1X5M0ohTxjg zy5;~xJ%Y&=E_KCWtaTe|!Rd(1$*&9}Wf~@1Kh6}OOm5heWMdJ_7s}?!vh98F!Btp^ z#xx^!5{lMdye9SMwdac`-WttqmhfL1OXvR2{;>CIXC=Yb$?^G-9gM9Y52JE%kD6g- z&G#(zQ|gWS4lDs?DZ8*WM{!G0ROX~HrDe1foHW5V*^?9JPxfxg?#8vYh-M5CN-D;{ zEw*)JaVL^hHI8InE83n?j?h&(E3LHV(l?rBf$v%MDErB^%+;1-At8$*2ga;F7 zokoIEYoR=c9m8szQ;LW%Eqi=3->2u$ar_SL)Z&w5^xiVS$3s-stEJ8{H)0!AUb?RG z#~A!ZbF}UI;bw_YzI^>`e|I~Osnxe}X>(K~S66x9d5kxcO&b~_b?4ElIq8>518r?c z#r79?bbxiP3T$nA%*BR6lHfx}_nb&YCv*}LP?mwj8Vf?-?*i@87Us<<2!5-J`nbh5 zH3zBbp}^Kq#AXva(WEpfudq;6e((JDZ1J5IYfBbVe`F-PnHuWBll_h#JxYn?;kTaA zo?4^J{&@PHvKNO%RShgAX8KV3-dVzv)9^X3N+EZBj*Ii*>Yz1SyXR9A->gQ}&ZsI! zUy!%`6x5T>$wf0n(pH!XR)R&2oWrMWMmkE)u}JnDe0a`Fa!SXcxPb31JR=^?xo_-C zwqcV_7=Ec*CcBLIC>_*Ynzb#-JXX6gu;h5z5yV;;PN$fZvgxMtRy*epkK!GA-V;;R zClt#i_UE~@*Hw89-b-$^snJ?&$i@|p4y_89mtqzEd^!RI{=loHN7z&*Mxd)*qUjGe zOOR0D7(W5{a@W;TL4jO-ipbemTVmUh%r4OES~S$-kF+20)WLFy#Vbw-Icaq_9&=f^ zZZ$YNyhV)9b|>NoS^zQ~hcg6!NzWT} zo17P+Bzrr?-F6_NMlAK0Rby=fwsTr)zOhAOo#3X3W(eb7)>friK}PB7()HowGO0Yn zp}mGaCWd(?J24K&XJbFL_7=s?Yj&p0Sl8*-{W%7B0+rDJYv{ncp`kFmtvYLD^d;Gq3mB^+Vj z+MuZO{oy57q6M(3DZ_+TGOP_&{n1 zuiIxkSZrdr+WbNbw=##xev*zAyCUpz5O+Ahjhjkur*eq zSIQSBM+nz`n70R0K15${LICYgk}(z8R8O2EKqRmh>a6$o&QlFGIeZKbbN_inKZG?Z z0Rxwx_j_2ct1JtPMEf(x97)%bD6E|!bZc;|O0twXC_lt_KC&s>_(Cp8C#m^w+HR7` zZ7Qx^TzD;R&YsU4km{r)X!QTp&Dkl-0ZAHYG)!07SM}DUr&Z2md;lpzXPF*QA5MY| zVRKwKX;$29)Z}Kc7r961>f+ls(r&K!z=rAgrGU%eFMpV zJR}%>Bj4n2Bp0f@UtAe)vsqRHjyl)F@=TK^PbiPyZLb#axuJU}t(X+J^@+S+=UJ?egj zsD6=tlK%d+_U)X#4-i1%HOVBv-OoPzvi7?C>;I?2A+3F^q{lYLS!*6ji&kX99B4hL z)?Yx;BEVyW^0Vkg4;M=ZHXsyRgO$P^qGg?GCxsBOa$Y8{-BzJRuG#=NmpjNxJ*0W>Xc{)3B5GoVXKPpg#?|1!U zQKYpOas6W|+U(}abY0LYowd^1`>l3c-n`yvf3$X2mg6~)r;GN-t84iw8e5!l2D=K2 zdBW4#DANnMuh&D-f|xSz-K%^98~WS`BQO{3_pN*beQ7cBuQn-z?rm1?!Bgb4&gk#> z=35xW7AN~NX1Mvd&FV&aN_vBcW`Z50CooW>e9}yR0amM%#Ud~awVcJ~PzO-0)*J1$ z6$__n(X}AHQ&TPwZ3@h5#;ceH6Fk2MVl8t{9Ue0UaXZh!> z=#-Mg4zAt9$3j={(>BuQ`Kwmj-=Mgmxq4ss(C>T~sRPziQYD%^YG+lO1neM_X#jEn zM1hFyC9%)0*MoP8<(pifdo?rAKkcaUeA$k~>Q-&)bf88gh1HE?3yCrXMVm><$_|-) zLehuSS8#a^O3#VmDKw)@CRik#=qt$`2EKOnw8do5m3rEAA1hJTOUKJ)asZo=(7eD8}q!dt#WYk7!Av zA@3A+Lp&N9RxtN8Rx9-dZNe!kEdSl=4}saz!-5{d>8184JCV$?%Qia!GM%f2XVK<~ z`7^ezwu$AkLbtp%lVheG97?!k^q+hLZ=Vy)&k8zYjI*3tZ*+~Ys1R!@#0#ac#9z(} z8;U?rPwi->%7eR{N}EO6PPw0n^hd_Qv5jGoT$Ga+;3b(PB|XEW$9zD^NeS@|Fm65E z63>Mx3lt4OCM}5J@oTZWvPWfYpiGm?IWZA}iuT85rsT){9o)6|HY=C6WdvSKC%Q;` z0QZcBT7?gGVPh)q&Sr{0WxNj!KPQ8ZKp7KqleE@tV@{Ust8jdhr`Dwr44{iXQD;v0 zWxRhF3K=zTGRQq^x|};a;W{G;aiqp`4*eJ{S>4FebjtMY^woKZM;9%zx@%4NXM$y7 zGxuG*!$}k1RC1K)A=sW?srkM9<@YulQIWYfod(I;(aSJ6$W21s$&Po2+H4g&jVw%b zNhK4O&5BCx?s516Y)~m zj>h#n#oWUveNK*{SA)rB0M4|rmAG(Lge`egJ3L7jbOr5yy- z;rQf&hyPhYIV&8(n$g|)+tt)V2qz8Lf4LlbfI4Ajsuz18Z0ZM`ujoqLPv{1pUp{<^{1b^m0f<=l=ga>W? z^n3T~R0-{O$j~-d|9+hvp;!M(AxyreSC$(ILmA3J=~8}L4>#Y#T})5G0B()khv-Hb z1Wfi+EiUS;^Dem!Yr7}Yi5+lD+Io)VM?7z7czhFaa|hX22(HAD#3pGkcD8aAJW>`& zVKAO|x`PK1+M_0>JLki-~SQNwQpUkLBX>K+_^4I(v5MUyVYMBQk?^Tyeq zfmXH$xu@?{oFEA=K0&TiqX7{4xC=+O4gLK(@iiNhuh_a8FG;sS&0}f#iS*V2L!B19;u=ItFG9AbKW@S4Po}N8tmvs%5IertCKDY4(T$JYQIaETFwd}Alu1)_nB%d zpi?}o9KQNZVp5@eV0W~SsIiqmQRi*rMq!DM zj({>+w_s|>DvI9ybajP{wC)j+^jf9LL9YsR2Eu;E+7weG(+x`~RhT6Uo zzlAx8w*a|`fs_1c3d)~|S$TSWsXQRLpqS+YI z2;CIrO=Kuze+b+>BFyx1IRAHaCAgDsR_pXE6d?s{H6&YxW7vi;4Jg{h0 zvSVlKVZd148ohkA75?15S*y5qx<$E^-BST@z7oe2zTU;v#np0y2<2qCPrGn)RnQ>m zoW2*9(I5nUGoHR>VM=VEjIC?_f$d9gCwUWvHEYEi|Do3xWSKSdPe3n-LfHwzWFay| z?`5p%LvqSBZ8>im;$7M`v#RF=E2bb6tgv2c)}nA70%*TNvbq?58WrOs@E)HX&#-1E zhWRri#vX9_~hBZERtCw^YHIed*Ps(PKwSei|O(3)C&A`{#Dc z(`!$Z*s5LX_VHI-8ciqXxD>_db+bWV_2>`jtq9w%pbRrTq!T)3m6_5_ZZ1=<`|CRK zJV@{aEON&-Yc1Bb7Ji>N1`Fp)$Vm2ybpTP`rnVFE#H7KMwDks)0Eq#1ldp!j$$&Ay z<7_|c>QhDwsmubwhLp&n!;yQblrTS2`wEzcj)uc{ba;J19UI`ku#fAGQAp+N_CETi zitl#3^AYpa+(X|~A>PiTz4bkqPbTk*Q``P-6$k7*dEAQw0$}Ew$|>DBq8sy{mVjAx z=dKlma;)So>LjF>E>=>=Iar*}HSX@dGN1vca^~aMD@bps2eo|2ck=7 zLOsi?2$1Ql6u>>j6$Zog2+WxzKuYJ~peeT&&|UU)jHI0p`f%gz$xv>947CErGD8^UV>7UYE0=o5MA?2~zS0??SK0c#*f}KkSeP~+!8cX;acB3{ z>&JV0pX8H&0rDeVQ#3Mc*#EZd;*ZaqP@Gu|nZEYXtG$fe($@Y)mN@!hrF}I1CNUL!x=oPau9B|3pPs>0aYIK&Z$cZ{=9AHNCuZW8`u(WTd-s<`_sP zho|@o_q}w@MJ3aosro|J^Wf4cAtO-&&HC9rg^F(wxHVqx&2}d%F?%zmF*c^liz)wO zmajE|Ha?{`5^UHn*Ql)+3ye8C9WTO!^1x;o(o>V$zeJmAB^x7qDzk448@5StrMMkHpr>~Dpml#5Iwp`JECh*N{}kV zm_Zgb-CxQedL0ZX=3Bj{$-(JsHY;U`Zsf1xH4FJJ%p+-!cdFNFZ&lYs&y5HPDPe8{ z$TBo|BM9|gYT7$Yfmy@48vz4A+eVIYdA3>4bUJ1 z5x`)>)q~nGO4|o%!Y$M{R1d?&8>oals2!#92OddR8ei?v?68eTdr&(|soiqx@^U5c zcivWt(V^>eFfRv(ZRiWtK%vIHIN0#^?1;GNHK#h>D8S3bwxJFy?}9kPt?U3Kv^hPl z!*R)NcqM!#vX#Ts7Lghrp>I&cg<~u>BH8cAEI1j5e!1X>?X=G(E>68o>UtH-UA4W% zQeKX*8Ss8U_mPuZCInpksM8AwJCY4v4le-yE6l(h>-zg-elWAa-A`~Cl3I9N`gr?x zc~JY%MF^4^mL_xSJ$p$=4oGTkXZz*o$7gN-=t1pk6+cN3hVm6z(xL932eo@ueEnsD z$sja>KmSXw$n+IGgxR{RA|tSD=-&+hM?kp0CYG9P&2jXG7K((BgoZhnpq)0Kk_f<{ z>mRPdy#S{td4A)L3*aL6lADh)0AO1Icwj#?e87^yK42PNqukaDtRB{9~8j*0GrzvG%CW?4$W z%)o7yNz5Qqy933z;IbTMu(%=LLt8Ss(aT?ubO@F58zDSWj@bA$Em=*B3Fw@wI53Wn zT>k}xrls3;g z&T%x@vJQiP0<~sDbmDyU>|dz+d%fN3`zmb-K!o?p{JNr|8q~m7n0G&(uVd{`NV1U9 zz;&JeYMTUCVsS>oPU0r-kjCRr(CrR1J*ZdD`2n<_3gHd|8FiaD3txymP0T~Hptlor zA-3TiL_ClCVoiJi7|pK4u*_aCiY@g(pvv6@S4*!63n~cq;$7sJpD-osHgQz6*VR-N zA38JFD1jH*hJ6HbVpjOjg9i3yBe-twO(-iZ3exs};`-y5J^w6+5F<;3q$tS|!@vFY zc#7|-e>uZ*`t83#bO5s(^$ci%<`X#VcV6#3?lWF~Mel{~hI2H>n_i0zE#@yWqQz4e zI`L1q2FYvhI+EKuA@tWWOyJo^EW|amRvc z&1~2OW`8UED!5DTIy*=DsVGW+(^w)nt@JM#v5a=_d;+>_p@zPozTwdGilfE`mBc-Y zqR^)uoCpTDyrrQWW9lNq93ybNNtx5k4Sm}PK+ElGYh_AfB}IR%l;Oy)paK{eXpjd# zGRHYA^16JMb^R>@V1Cq4df!)%vf&s_*TO4&2NV6vd;IP86j%Tg5tg}L=(Etk@Kx1( z+Y;JC!K)*|#^x&YwKd(LG%qs|00t!+jhMblbasF}Pt0CFH4#ei_Y2Fno2bYU^}6zb zxum7!4xwb=^94!9-2sWGD}3m0)BSAP#D+gRpB@6}JJ0z4A2Q^$TPxG6sJ*-U6ycEK z!7J0H0lQcR7?F;=kI- z;DeNs=9-J#ju!f6KrboXhNX{a-F!Jmt~{}wyprs|=n-N7V*7s$_E{!KVpe+KmSU`4 znTl9yjAI{%Or*$-Du0secMO{ zm-`!>!j;!~N=meLO3lSU90ynHCPbmX&8%Vz?X}QzqN1KCjI-38Ho@dwhqRFwwF2dUoonRu zJCm2_G}8(=A#E0f8VUw&WiY#(6pvm=@f|kC#wO8pEm4hGCD`J7gFQy`U;-iL&gxWe5D;;a)G8Wy8+5J)iLn zeOl~&6q^uVu-0U-QBF&s(^8&~0ZjI{jrvHr*zO_PvDwoLBA0$7r;uAJeJkd}O^f_~P;a#=7-w zql8oLb!ulol;?*6ms@wkHpFc0jAbL?u3tj6E7bExZ+>zCzh-?uK!3k$BtGNMWW|}4 zq;AZTPmrEV!Z*Y8d15sCu91TZukzHJsj(yk!OiLXuFf&Mc=P!6i^p%CZ$13p0#I$7 zqLV+>F||QwEOd0lOa#rBRQSSXaO*w`MQ6t%x9twk4eMFbAtJu zJQrP&j(AaY?iECp?UcoT3}IlBJSd9yg{2Fb1VP6r%Y~NvI+rTgAh%jfc4cYHYLH&5 z%S8)aln&;$5*M}mUnyWf2>pw=63o&RTs?_6AjW@tC|Fb7^SYyFbxr?i0m9mnfK(ij zV-#g}AaV%b{AqUZ+yCM**wZ=xLvF=-7*sq49z_rt2ErWbXECboNrpK9>OQCONkZ~^ z_~Fuw;s+!>zZ=Mhkcf_v<|>k9?%%6BYlwcy-JN2Xz`f9SoU<`CIXx0G(T4lvXMA;1 zeTpxdau``U2eoi8?<_jm@u1uR8H=KNyD+)?3b<OF zi;3h&lGG&fa6U6VDr5x+7@U;gncjYNr zSi)Xxp~;I8TFEc!i|k0;cM0$!3?*?E<7kfPuMIZY~8{~z=?HMRLeVZp{1 zvy1CcvfYp>JNkED*yfKDv{>ln;90q6Atl5qw1bx;aHbkOS~W z$T4;vfVNLiN71kQ9aLWvXz(7DwjBl*IOrXAqc~s|5>M)mGyZ0&Gke(L!Py z%uIOtO3ibV!$d;JpY%oJF%!_unck?;`rW14DGQ@9n98Ml-93gm+af{_L`sa17tuJ! zI=7-nNg{J8E|)~2d#hn{WEOao6 zVYN3iVU{G+T#CuK`ZX(Vfi)XR?IwCFghJ>s9RTw`rNLpyu-4J;-qy?Z{;Pw9y@y-v zkJiz^-plP(xb5Ea<9_#tD1Q_ZZQiaU5Q2R82|kgqo8P?sv4$eI4`NZiBM{+D<47q{lGIKx+eJh{5MjHL5o8Mgs!%m-NKZQymh;otkqYDOML z&C@sb$8EBF8+IM(#7ezN9`k8Tp8jgk$|+TZt<}g>+E#)zeL9fpLwcFx?YO89l}xcN zJJ7gPf{1~bHf1(z9WXb2iIl$Z!|IGizfvDXzp#1*ZmZ15$?e3e=shH>E;09gZIM55 zm5~eEh2cm%wxcKbIWlqsf=lUM3D@_donH&RasMQV)?hCc5<8LjERf2DKL zzd=aBO-8y(h$H)!PSSK``Eo@XtdL3y^kKqlIe4I?kL$uCxN)61%tFZV6cueYWj2$I z8NA};SL60kdQVrb^0)yp_%WGAd21?~k@ZUr#vzRv9e3$OS$9qXN!%kJyKUIo(9A?`ae zf%=@G>q5TlD(Lt)7kL47=n!EI+<;Y>`)3*pT|Cl>(*x8-y@m&&$NMQlDzta zx%1zv=H36gZ9b~_Fp+FGD;Jx$t0?i=~-;hUrUsb zxnDSu`{>(&XU5D%^6kBs)UTb$VC5)ZE-EYuhUWy{mXNUyjm>j|(7O4EV^2TNc%f(( z91i*;VihMSkq{TT8ByU|N3#9k5fE+_6v)KJFNua{HIYLSB3MD}`YU3?CHqkVMtkN=IaH?d*GpyX|s2ES}>1wcV znG+wIchuKWrnGSZY)M~Eyg^YtOZj?kNID7JKY;}ch!D$`yhWtUPA#b)TQN39;YqIi zWw*o;!sp=pi9%AZyPoBXXSyIGG)_rY#6HMUNHG225)}oby0X#~jub^zQB-$X$t4p9 zT3DOg3wI%A^}sKYr&+~gd?{4Tg$quQJDgm-ozVW+=ln=cn$3+7-0tghaW+Zpim( z&fDi_qJ&4APw;;YxjU?Bsl?8mDj)Ui!kbw<05tHL(Y`Nmp8Sd`(!mF9clJ(|E(*Uo z#4+u_g3UWsTphmmifZQU>KX!dB`%tG;GHU3dN#YDopXH))~zwrT{D5oKJQ2Zb>h(+LvdN*I+~u-ty6~Ax;b{mNFAsx{CZH0kiWE!FN60i z==;Bnr6?uytjOJ0^jx>U_V>o66eSA=Onm^rAZ}V@kg>-iz`{G|!2T={()|Q8=Rk(y zP89__qe+^ku+h)stAp@BQ40ZUM@k3!Dj?e76Mn69h@@m?w5=bG&rU_8q0QI@ z;N2YAizYI7BXUhDCb`8}Z=i2?ncxV?9J&~an`$6}pejcF?JZEdpmV5=&8uHU)$EkB z|88dY`)L@+q}@{fERFNMym-&j56Xg9IoT2m(UBa=6Q|-kB%dZ)Y^hD|2$9?SjWFK# zMS|gdG5clKNVQpb{rN=h{`<{Eyj%Hq&&M>ukh!7^+x|x7BJmCIS)Udwe*r(@Z2SvP z=QcTN2h3r30V5G}?;#gvjJhe!ZUB`pOQ64bw{rf-QIUOBOCCh}?K!U1o#mb0t$e!Y z6D5=2by#~&c>L(MzaD^fUCtLPYgi&5uknb?fyQc@PQrkisf;*!taEqx@mL0G2QAVi zcl?|WcI{SYc$#~Ai`zk+1`ail+_x?ohb9SIKg2s$IL7ajn5E-y|$3}s)y^y^g8Bw1jW zUa0=lHfA4Q9&f-KUY^RsvW+u2z@lGiBHV($O*!bNcbs3+` z-MU-3TY8yDo~pMQtp#?MyPGR1ea`lkGtp{rZP6cdchk1u06MxFeLp*#UM4ghAi!E) zq5;h-4<%GOO9-jZRaU^fjxJ0<2IxO0*AtRG#$_7nWd*6JpWV9Psg4g>3&YZNdY)7# zsQV|a*#0GKOyxU2N4{;$3GJa6LmJ?2`Y`#F1w-yep&$ zxr`B6@x#%b+w1h~YAvzrq{WYxXK>{TnGpu!6+dwfs!K_1!h)NSR(D*!^#j1vp-P*8 z#AM)fhV0g{Acqthg(x*-8CDWHyP1)Z>Qn0TR--SKQ)(R)98}CO6`l$A6By%jvEF$W z(>jr*fY`p&@6|4ANQ;i(T<JvaCFO=&r#J6a;ft3E3ZenoaO=-=`p0W70Wv0#o6xd|M9%Y_?d_F# zJb=;;0#oNO{PSKNhgliKw7O`t#HV=78R^1NPV{lJ2;=Uie3ijjK!5Mkm?mG)W~@^2;+0833@W$v9Lh zt#4oi|Ne3)`+TpCjo!1J9!=!_8h-^d<`@;d-WRCZeTM0*c9gjZ>kMqY3m&{>kl%G< zEVh3xz=Q#;nVN!XvR#fOd~Jpq=Kt_A^yWoh>e`!of3TTgv2+i@mO!;XfsRP!;hV@V zh6O8b#sFF}Vgma@=-|{*s3k*iH7m@OScTZsZ)ZWTF!B)4#ts!AhdLMS;zdE zAc&#sLWtzIN-v&I?BTMonY}*nzN(lKkfRLrp0<8y@d|W4nwe*4andMGb@y@LRSC+^ zJBVA-1*V$gz$IKqwC~x1zhecOxte=*93`G5l50k{lod(Z->##o3kAOwtqi9zx=^W%IxB; zchdW(ZjScek_4eRyKTJ3a*Fs#;J*TDNIj5iU~PBr;U6G4`EmWl)|;23r`J$3VX7T- zA#dZ|fxz-&FwsNpLqnUU`7Q5r6E!UWEB4enMlX`0$Z`cL7q?om$Cocf;fjxDiQU|+ z{Pf*15S_ySn*N>D(J#=bbncJG>D!ndHhsP@z?fL|ijI2#9iOBpu4Fa;pvvgd%epZt z`Ccv9XQ!<=j;Im4n$$AD99;H5Q*CaGM9@s(4#j>$9EKNaMB!~yYp<*kj@xT9&2I~fvhL5K?Q&wzu+ zdo@Dl9I6w1KFgSd>`4bQ*uL|tSZ~++Vt@OeSF`{7FVj`z6jNs|wJnLvw=UK0D02pi zVjL>h9`a}=0#wr=y0P=lR%%c{Nk|&gi&a>L*Lo>VkG_^bKc}Hb<^F*7OjltLU4Eyh z5Ifn0DHcOKWAaFxeLxf>Ee{6Vw91*~htyU;fBn|ZDhf@A!ua!t5=!L&2W_c^q@1}y zo2p5+koVVN3+s8;>G}AQfB9X_c*_54D|f+o|x`tk!dc5S zq%JAXY+PNz`y*3G8Lj*=MZh^d(IWwE)kSZP?9J3l#m-&eZ!RyrK9>~bYj_5pWgfMX+BMe~Ii*UAOuVpSTz`Vw?1mrF5naLP3*JF=KSYytXB~UxzW` z>>fRj{1ukq4ip)Z3|V`;_0wu7049)g4Z%J&sMenJv?aM45>Xiw?XFjWrtVpoR6g7o z*$;;%!G1rWdf+F-d>*WZex1IxDoT+ommiDN)=mmb!8#}w3&TiaIptH>0rjwyY1@ZA z#Vc0&uZ|-a{ah8Er#QmPb9>cJ=Vh1upm({kS#z6* z|4EE#vc7hq#xqioZR+nQxk_N2Zn6!ru)x;dBV!93KePwH`Z-aD5~L~>HQhke5)K4i z`+1ouikoCOE|RD$tgoPBLu1EEatUJCGfdn@>?qI;d;P=&VM3YLJ0|=zRi`A;6f7o_ z(_o&X2wlS`$vp3cm8N^B+xT9cr*aD02cr(T>|nfns|37ka_GZtf4dGN?At$+Xls9= z4j1%=hv?U@SVG+99LV}Y;lJ^#5B2G}lcgcw5(LVTIoOSdPqs-vTDJ{0nEfjW=IJ%&~<49erp$swZZQifr3$1~g z!q+U7D$tM-J)4)ang$p-jN_xrh@=B)LyGs7y*CV`tss2s$t#cMBE`D%lR1#azaMT$ zowg&0dBwS1%8SV)Ir|6eXGfZ^MfVZLFa;3wy2__u}g!C5sq!Kyr94+#$j;|+v33xN~@C|5xH~5&~oBz-noCrGs(i( zQvD6Dd$z!>3q#SH6S}kYA`GERX7aPh>h9iz2`jWA50au|8zOHG!{SC23-AQ?zmh zT89lO`%TZ={-01M_X$(dPRgYLx>=yRD6|f_-%h7H{cD9_cR%_u zk{PIf=!xxMv|=^xrdxj3EHsHN^)eX~Ae*_!3T0A~ltCqY#5PDTt{-<B_eXJD!P-q_Vh)k#UU54SeyY8rG?jyKs(G3yR+g9any^ z1I>Tv+eysgyFz5S)Bef{iz5e4RuFROci|&tPO*Sg1U;Ws>pt047_K;3=ZL^EcGWBx z{EsIMSK1e^>X;yV_djpUR{&iS$c;Bi4m#5TZoKIF@%Gh~s)7_bFk zxFnd7NmFLjyMkzQH%Ahfm$a3A-{vp`H;h@1ry5b@8Hj@5+dLEVg>$Z$b=~;ezp?EU zE2QZZT+YO{3id}m%pxH%@)O*7V-qPzMs8*X5HrO5TI zqZ^$sw7~2Foemi)T*nL)iLB3=={X@Mg1QITcKN-wZ8BpCdqMoZnE}(-`<+4<8!@m3 zjffO_5(2ySjnD|5AhR2-{RHR!8P4j(;#AVj$QD9(L23J^huB$mI`gq$(6K zulzwBas27k3UeI+JbHe8%$+qDQ0#Wb*ves)7ver5#+LDTN>9_l$r7VEp1zf|=N|t( z35gKy(ZEw@K(b`>OF@=Dhg^llMvWxhk zAlB@qW5)+%HLOd(F%*YjktK-7W0dJ|O*sWDhO;wy?H)C~kddH-K~KOX8DzFkAaP@> z{h%>PA`c?rR70ms#)U2v@o|@G)Z>aDL<2$cpA2$jwlZ@Tnb-{a6Z84zw1hfaOZd%| zuze9|C^Ixz58;uA-nKjs>WF4aH#Bc`Uf{LAcGdzzgLt_QV`CYdm@dkEw=ql*sW-OB zh(f$IM(^hA7~IX($+CS6dS|&#V3kxa z0RZlhRx>v-wZSTrRmj(QH$)spR_+k7UBYjL{9=BLSjptG(BOc%BEbkIcR43OjXTeN z_ChRq9(-KU2Ms2}+*&8FRcpBQDaALzFN%1vx1_;vQ~iUyBKr@38-3Nn+L%lc*avr_ z%er5lL!XxLGklwz>QV*9P_$SA;SE3Tn#{uV%FTjw=~U%v0-8C>8Z3w|?*rJ9l|aR( z_KYJhr4B_4XrKiOJ~f(zy6|UohZL@0??Nx0kf+mBGZcKqMCj#`f`pDFf7k0?X&dW0 zdY_&H^*--$c6_~NxAXA)jd7c4emDI4`@F0in_H=`MQ(KZ@v^t%1WTL_& zV#>sd$CBB7d+512dNd{Sp&geg#+5-=v2S$m=6&+zlXskL1v|<^Q5Pp7l4BZw+O}{; z$Zy^*Gx%cxPh!S=vBW;T{J5(PjzKGm`*{Y-IXfw&j4eYU^77D|oMmGrBb>|h z-Yb{6U0p!IH3n_B74OZZ97T=1572RR>^{q)i=7&W2rVVM%3NZ-pyE!Q5fp)Bk?bz1PyY(j>Z84$R zQQX1@#H$c1s-nWkpUQubKKFZm&5Oa*PFK=9G=^bS#jz{{KE!$;uYGstP3U1%t=Guu zb(MbJ45+^^h@T2AklOzqPUfdl4|#Sr;UmSiN<`vXygi(*38@*gQu!@R-6>WFq~w$q zLc2RIgv9E+*)EW$m-R-w978c-WV1AepE&vW0ple9-MksoelSy!$X=KLF@Ovi_h*Ac?-SHTv z+*BFE+FWCqJ$9P0i2Ngr$k>0^QaFGf+j3t%-sHcu@8@spT!xm)5`n!AXVQQRd?D`q zKdHC+-`{$*vzwFF%kG8hk=r5N02lQ%9l``qwe4*fKP!TOPao^SKe4RD%`}}++ z`Gk;j4>b42$4b0sg4NR0<9pyYZCCN1QIO`B0h-)z>-56To7a!qmuww!;YPMUT1Osy z^wvu%yM0N4fXDc@b|_!&y=nh=o+sN=M0B|8bq7!_u6rTAF+JnlL9)ImOfd$nO+mL&($h2mbldlU1>5 zoF5*c%sD@vjyI0gJbirYgfc?g8e~=K?(0#IR2h(a`q7h*3cNE!HRU_pDyX5vJaJ(d zVgvBZRE0rAnTn8Z*FX7)&8S?RbiE3{2)z+{C+AZ#WS$$vM>>=TPy-C*w2aaYu1*|} zQeC-8f_}28(!DWajfH5Nj7GabQa<|$f)9hwI4zHvAJhZfpCjevb$J;#w=dRm6PTW9 zlRP*j^!%74PA#^s)dL*HM0{dp^wXV%R6NlLNJb3HOBaJIMM$jLP4-N1zulcjTidR~ zV+raWmwC=tb7^#y{9-qNlB8rp%?D1PeUf&|tJ!)Kh)CV%x%;>64%EW*yVpOzY@63w z_4`G{T5R!fNPU!(%v=q+#das}rUx@3YYV4$E-vUyvl!KYr$4^f+FeP_ba^p8_Yhl& zCAGP{+c>#85Afxh6-5JWzk@OHBu9?j5k0>Un1AdPjn-^3oc>XrYwD~OFe0ElIjv%! zQZ?n5*_jE&M=<%#Lh1|~po{*+pI$D!#$Y5V?p!*jwoah+!)X%+9W7R6LT(pa>=F)o zOWTeX*97T2&&7!jA;ANV%HC7WB#y;kYieYt7sk|M_#OJ3%p4fW838DJ)twXtFiAro zyoPKEt`AvlK+Vdgr9_gBl;9#k|&&JhTyWL&^vwebsO>n8Y+cS>bYXhd}!KSfBqVpO2|EiH?!A}-M z+Ts9jvSgwNywi1M!p@>TWStXG*wP*WnQO_CK#t^jlCbB()l_cAnCBEgj4Hp__3((r ztiy#kc?VCGm)nd&(bEA%G@m6R6-Prff~+?C%n7Abm#{K{;v`Glgqk3nAh_m}vm?qG zl7iHXjIN1e7^c^XiO_P@&$qcn>c&fREW!z%MIqFt&T^&(oV0_bkzDX&c+fg7l&skB z8b|Rt%l~4IPgKN`E+&aoBYG4a04Y~IPCJCQJO`vfyk1_uF2y7=!PkOmT85XZrvQ)B z3t$n-8t`un5{T4jjvkgOF(${v5=8x}R3Y`KfSds*l%g1EI)2A@h`q2t7xBkszx6<$ z6np<<+KlTm!PuO!Nl?}j5@m$`MbnBVCVRPd!t*Lw)=-ruc?)AS0c;*y>pyUHRiQ*W z;-M0+t)I!%)?Tcz4VEIIIrnnYuMpP&nbh)E86vxL=f#tkx5B4Vh9-G_W!9kQJ^Zpf zqk$*tVQPZK*(4^9K!1at7jCnvX{m-Sw=p5)8pS`e%tJpwm9N7LK_?= z<{+?xfU^(CeM}t_r~Qo$nL%R$uojW{A5yO>4%_v`w$f_RBs$O1wr#gBF#(LSKbhNcd#*POx4ox5Pm~*)! zKqNUbF{TTYFBuDCP9Wp@fB*GgFuNo$1)LGTv2Ix-=sP%r9f4EmSFsf|rNV00Wg%=d+vAvnFX#=Hnu@~ z3SDf!#6Uh)xKG0x+E)!Bf#t_s@t%Ny{O$8%{@Q zxDx*hzA$T4s8Knahpos!cT&Gk;OdVr9`C)`YA0c;d=6yaqb;m7^@;CCF9GY70GSz$4Dw39R z=;ax+^z%!FT{v!iMQ8#$`4`^DQsR{z9Nty@Q#EmF#GlUNRJQd-R_F{^j=j#>i0=ga z5+7#MmVz1RuYPBlUpdjGof@Ic3%bo*b^Ld-WjZY(DBmoiJx{ zBInl}bv$~LIEi~}>ZslV7|Fawl2q?? z#dddJ5u1;9VV!lVI{+Q$EQzyEmhpcBS~6l@vWikFqTO_Cx%X4N8ww zLY#}4NU<#S%I!&jN+SnBSZLq#>z88A6ctb1uOiR4`i$<0+~dckvbeeyIX*#@7iP_q zi_p#>P3lNGlQFemE)ms+2Xl`|2a5O(v`%QAavZ7tLi?1V5Ut7cvfKvlAam?7;eue3 z_$~|E^BRScq6L$ZJk-cPB3F9!t*xO~P=EhFQL}MG+!|P?PlhdhCZvs(WiSbHWBbA6 ztKXY>?~cC!VTnP-R+jB$yT;fFEW*%t&cT>5?efZmm@xYK5P4+OPbl^;A#{L$9@DLh z3nv2BMPdtBv&cYz)rPoBM4u|AQw^P)01P%>bm5Cj{0ymjapM4UocA$Jl4YA7QCAJp z5Z*CvT#zM}Js5pf3;Kk(Sc8hU-_ziD=MRN$OvFcLG5cQF7K%xLu5R+(yZ!I>(>}_! zhNHJevYd;|8a4kvduOv8M{;H9S4m@UP&Q0}KSfYgHKjHXBt2Li~_Xg0D0G67^U zk%`V9lHf`&&~MPaklAdtYO`64+03S<|AdC@Z!`WJ)V*+|)`}!z2qMUuo^*Ss5PBwUSuPq;wrS}%Aru9;# z3pkhJFL14I|9o4BX?4vWi*t6$OtLSiX8NsH*~Lu|)gAWKZI^jdqPDP5(rseqn#>R~8tGv?FLJjpx&Hf1G7tX;=5#qR=Wj%)a{ml)M$ z;~=sI(ZX2VjI%{0SAnXIe{#@j3mKdmt{uT6yA_W8{3+SVEc%wn5bROoSf0FeV3dQux`TG(y{8hnY31-=~T0!*up!@IP+_n8;v5yNaDYkaYuh)pk@ z29wT!jd3OU>o`$7f=X>EnOdOMMgX*+!HtJQsRAKllX2Ypm=s>#!n}Xtq@&> z$lWljuz~oelQcg_Jg@C-CBIN8q6Cy zytmglrq_nX)_f?CtuqsTVuhtp4j)gUaMUpmeI5> zXTQ#bnS3{}hlR+%oC?0`B$mdhzSg;~wtB>k@_IzzniuOl5NHYRR(Xj7Y?1S+ zn#V+Xap{JWF|R)N(T?(5v|dv^TL}jZb?4ZjCWQw=%Tuyxk1S!{TBTGA)^k+vuqNek{-S;NE>@Ko98@H8kv>0jpM14cL2?21mvWA_2 zUaCA9p8}U#CUuCu2AVGgTpFxvqPiBxF~o!UurGl0(sq8g5w~{bXA{ibee4|jYTpJ( zRe{C#pSn(r#$gf)Rca4k4*>>PaN*?$Dt0xK-VrU$!(+ZoWy8tfP)`o=n@fqrC&NDRBwG6z|E}jwI*<4 z8(md9r(BM)sS5ArF<@LsmF2@$DKf|GqH3fc99hRyv_>l}ZNj(7GRIWboV8(RN9dYE z23$H2ld-gc+k2NDJt&g_qOifOHx3w(W>@YE-e1|TeU>v*1wg|lAkVRSwR5knvpQ5B zE?^Hje^WOU(k)orL!?efXAM5J6DY=b9kaSjcA%H9Py0c;8ntSoYlhMJu;AfAKA~J{ zuo~h`Y&+rr@~;@DoGitG>kk(FL7xCaJ$=Ru8ceALsWfdhoQ~Gws#;{zJaP-vkk_aW zLTVqV*aU0{p;1|^@-L0W@*{fU{hbi`o7iB-TPQOIWmlnQpYhY%cbPI~ZU1Xkdc9vX z+63jK*wONEeeN)^-_`AlB9F71bjOVxnkz@mp~;zO5jKz_tYwW!K}OsMQXVa#8PS_H zN4p6r+)aveXO}>dY83aHhd|EMjXI7cv*v!IVJ;aw;9p!5~%MIRowFhXqcl&LD)=U{gzNr(f{l@C85{%6S5ELKU zhzv48u-^T_S2?IKDK!U7+ zN=AuEZ-tebG`bSGR7W#su;HcgPtvE32J8`*L2hY-p^=gRMu?myMHE`Ge+T{s5=QY$ zqS|ett7~UHyFt2&dO~V~XjLW5>R9ZA4)bMI9qh1-qDkNxb}(nDCR77(aR zB2Ch2jviDRYA7v%52y*pgi9LZ%xKlzmfF{x-vgx}Nt$1!-2CWaS>io>-n!8~yjAi3 zS8q3`Egg=xh-a@Dz}6IvI21oyo7rCJ6IW!Y^-=%_Y}MZV>aA^}kUmIZy7N(XyU$8V z+uv8246gjD?H@1mz}2Tulact%?SD`vE`Qklx{~j?9$a`c+V}MG*w(95*t-1tUj1P= z(-^Xr*!lrONu9pm7>Y;MHHd^05^Hv{_474(*P$X7dxtrK+H`S<$ZF#-ts_;Hr&A=U zE8Us@62@xgE-|+R15h?qerjj07qzxr21R7Da5#p&)yn%?q5rM^`d|8|7wRWF5uIehCU}whhcjr#J(MzfMSI(m&y(aXp`a zBoLJBEnTI|uu@h$C?eOgrfFjLbI_TFTO+!!s0&~lWjd}j;kw2T(}9vhy}8yc6YXXc zf^kxXLBz{f@~Sy4R=Y(Q<{7ohOt@0xo%WuOj^-4RFX>BsaL;m57rZkP1$!ga837m! z?E_EluYdX%7!~ZnfBnX~^?%Vg)J08UvH>~D|{>-mRAM3!`sKk@=E$Ii+F+pJRrR@;l~*D*R4WV<(F%xq!dAa= zb!eWy@D)diVrr$e6DVWhK+ajY!lT4d2@DD)ciL4xoUtqj7p&tflK*?*-q`4~EIM)k zIY7q0lUp#DEdNr;ljSFnN=o1+-cUCFvcE)q-1ezZ1gCC|>cqyKkn|`w+j#w|%k6Z9 z$LUp$r#FiwGg4M(EXmlku7a+vRBPE}%(#dWPDCTJ6%&;kbz=dWFebRA089yJ;(DNw z3Td>n$WLzhx|mXAJt9Zy$*Tkpoa`BU4h=4e&GcXbQ?8YdjtS=7w0tn=_JZm#MP=Cm zs^IB=b~SCa@SsrX<|q-A$u53iZMhSssGg1vIIGWvEY!DYC^DX|W84s^a5QcIh9cjxZ^$LM zI=|xf(q{FHWQcSoyn2=H>s5E+)sl#hE6^}nPH4flSWB|@L=_}X?0)V=>5yOA-qgU& z$b^<71dIoU@q;b&bv9U<_Z@*ik-ylGTTA-4`>=zaS*Bdl^`Irn_vp(qXHwsGxRDAe zRW}w54joP0A*K4VOsV)Xfzs;1^|4zC{3ef9u|Zt@~eYO$Hc;NUnoL&A*`j z^Z#=%fc}DZn!YHZ^H%s5aPYHrHX<- zn@eg$$H&2lHgemX69@bC?(V@gS=hfsDs_B3zlfrc)+^O-_tdbb`KXKqJ8;KGWvKA) zf5y0?`4|r;YR7Ch5qR{d+%KfR@r*C;UedO33 z)^y8INy#+Zn6^>UG0otl#gX=%&uJ)nP@3I8+J3luUq8;w?ss8S9nHu3=?OL@L~EG4 ze|yLNdTYMVw!QrI*>ZWI3Z10~W2$o>HwVWZ*nn6>KYL4o38F^-&~L$mPyHH1RI)|! zP@-NhA^wjTgV%I3B}Hq=t5X20fZIE6a#0WytIKsuLar{mcvt|6L>;2cwTWt-;-n^( z*rW20q-N57Ts|s~%W^uj$*g}9Wf#Kv!_1J)6a6pHA@sm^CjvWM)F5c$$T~Fc2Q2 zb@ZRWRu=;bbIK9&1`3^xiXX}8{`$okS)Q%vT1L?TSXgWTqb2105nV--u~OGC=&5aI zQiVDQlxtF&15aHHIM|c1NFw&=Xd0Qi;OdOes~Wc10C!+FrHTCO^8JS&mHW;*Cc)=! zI-P?Kv~(GnD~%bmg`lZw`q{3H?&Of50ZbrF%8^SV)#XtAGAaj{X_UWu+jZ(Z4_>5x z8lPduj!;HVoo^$Pl+l1I(MWdNSbN@h{qfDS-L;4W%s7FMYfH3KY(KoI&$ywx03CKm zdWR;(Oxhi!Jj}8?hzSUF!V$s*1K7DdM7@**m@^eP97(S@{<`3idkdIGL-65DB_4x<1qGdMFbIo0SgZ@npmk=Sx8 zGK%Xx@*FhefKk`>nwqL$e)xs~k8z-o`PtA3y zc&i$EO;au%ASZNM5d6{t68a4gI{^1FnS>am=AF~j5iH*u}Vx;ohG?meRHxz{P=vZB@HDXSKofo-+qv|b@ifbeg`iIBvxi;XcPI4@w1ph zuUE@E=+#`&x0?NB*{s_0vH5@9q*vA0Q7IAY>WS)j`$hh}|Lj#%SGZn!bu)1RnTd-O z#()12362Hkzc~opjr?vGF!%mwhMamonH0p_XB``^Gcn>&z!jHU7suniTxR+YwhV~9 z;?|0^Y=5*ExX8nwM zx_ST;i0AVp!OKFbEvokd(hSn?S;Jw`VEEh7^l~8W{^=(zYu|U@x=}2QihSq|9Z8=; zro_e=R73HWL*+oBC8k(s@^tebY_Nmq;k>mBbMp%R}`VbEnd($3mZ&_Sy z-Tm}LO^21=duN8-a!*w{5rXm9kdi~NN#zAUZc^eX214sB-6pQe>QR49#m}iXA@RN2 ztex9NoOR%YBt2JTb`oY@B-afX3vBeB9FmDPMEnADo=H$CJ%}`KVzB{39zZ1)%S34e zs@P1HRGSY*4GL4h-_2Pu%xFEAO1rveJA<>LWXnM0luvw<9dhT()|2^hnO%IhFYR=y z>DN__xY_nDGjmGt4sVyC-TPXeYX<{`-ZPL*|o@8tLs|WY*J-+|d=JEOB zA6LusKf0pGw}BrtV{hb2FiET(T_4cYUY&otq}?<9ECM3m9$#E6S{d^G#M>obAD5{M z(~uylV>c^fNv}}vn$CiRJ4PSZa{SsbT(uR3B#MyAl{O$ml`|jofb!E+hXtxj;Ia z6)JPSnL+n*j4+5M(`;{EgwmQ(-SEQ*NW;HixquSdQ)|DsgLyeIus4DHR_QlCu7;=j zd3*5qxD5Pflb`-VE$HNW)PkGh5WHo(_~rsIqKkgb+YMv%pxc?yXk<3UXKLYzLW`!V z^mU>EUu|X7?Z`3b$?o7njv?zRZ6uLytoJmI&9jxZwD}AzG@W>x7iU3Zrjal;Z@|vW zBTYK@7ZV}a4VI94IAewf#ZBSe7h_~!tUd)((<~$+nT*0lNi|cFuF_ebqZPEfk`Sde zT9_lK!M#A%GgDg*=9m~aA-lj?i#;37k%Vut9Nry;k|RoXG_&;Oq~>2@9s)UHPZ$gH zbao2X9vg}Wa}a$FwD=6FIxyVb*k@mB8tzztWzJ)-L4oPoU?m%YqMa^*2!|^5iLSn^ zn!=|1#qb$1PNKNYu|3tIqFSv$pF~*Js-LIkDyGkzW8DQeTC7StZbuGBP})T|fu%9Rh(8d|)Rjps zEn|YS{OuWf%M`C6aq;wGV*8TmBq6)&9ZMgHhOLvSs;+Rh)}D-Y2;`#2f(m~?+)diO z!)(+YiR?7DJE)AhnSMml}*wHkBYj z)&BKvR>RjjVS92#>F9;boQ9)8K=zo6bAgBh>h%1RS{#N0m@}(8g?DA-*>bkTIaY@9 z(xbjUjqiqMt>uS|z^HukitR>_(>UvZzy8S4&7}-)MTd|=c-1Mud&))QHq!C$yUT;>LsMeS~uj#or)=+*VGQG6>dEili>&I>>jmeQXguC z;xDWECibY(wFTQhmRvPb`E$>`I?=>Punlx02r z=`VYaYWEX5!zAGhO2NN-gR|M0VfJFM#Ni#%UBZ9G{hZa7Ol!&#fdGC4EHNgy1 z0J}JwU4+S|C0M;LH?6@1$q9H?e=>qt9f#ti8dCn^vf5n(EES#A(qod81O)xq<|yb< zYIR2LanGM{m%bG3c?lB>ZN>(_(gh_mRws_E6y|FOH7m|$;9Ol-S~_ljmP2~(f%hJb z1?W*$5zNRdp;V@0G;jd8cfCL^o|p16t(^3RLU!*072^d5@;`(kA_#7Koc*g32BDRO z3f(%k?F+wjXLRkq)?*L~Uf6^1LQ<<4ybQIVdCy>WzOn&XITm<|vsGsF@bQUOBx;xO zV*MNzuFnPuClSXBmqyeO!N`C<1=LDr9Z1vU-bs0A%Zn7DP%w6?4y{1O# zuP*-{Mg7*eq}fF9gs8f@W#5hPYyv!0{~T#%Gg0)}jD8v3$Jm~fiX`!Z713AUpUF6R zhi%}PXiobNTylkVq)`!r1yLP=u?(1wVjfa!0hU=?DUz0|QNAPilWQu7IO1*0K%-4{ z?eQf5$I*(#e20MNuSx_*Z4C3x!FVk&UH#&9gu#%LUzNxSb>`y{X7P3R?Q<{%^X-a< z8gqJ=b~O0fOYN7!zSdDYLl^pZ6Tt=_vpl&wt0vDr=N@_+&kkSjeh~!19AtTL@7`B= zhhiRGLH%0IwFadqXJWC)+vVG70)U|2(|v9#8)^rS{j}B!8RDcFVwcE2F@Pu+6ooj% zAvB8ffW?jeCh^j#l`p`~=QB1F*~7=>E{_e#6h<#Jx$N0g53LU|yJU5l`A)^C3_3}h z1SOZmN0Cvc6&P=tBh>8Ro&G`RuE7Hsl+i=2&UOc=Lkh}LgUwI>y~4!KBlhfHT$dy6K~rYJlmXN4)=FvcxJ8c0m1@S%DF7# zwBzyoSQ;2wAPSNBZmR8}jirT}m%Od3eyUt(dj>ffVllolLv7#}s@Qr2;`P=@j*ga2 zZ20MtTt3FTR{tehjL+on6f%BQmN1=u%;?=Sf{cn_+heZ{>o5VeK-P^sNB zNJY^xMbUMSrQ?^?{Xzq)cGjS%s!+2Z;Eu|cM8-cIo9u$);+U4-3iD%ryPPC$+iwbH8U!qC$M{|jlG-TXy(-`_XLl7lEPRSw z)T9~s#uvD{Q;GqZIItgi0V_^L<{4hBOhIQO1# ze7rO{^0hP%3NS}*N<-lwb6xcL&kIu@o{dM7;et$k4lU(B7UcB z%Ym$-t)Hyx{b+Old*!i9a%E!xDJ8Y8g{poY`H5WD4n<9hycDa^nGqW&L)KOm9!FF< zGHulC3Eo7MP}$`6y&^9>7%arve>b3|?8k-)>g{C2^V$eDj|QD&?d^L-{#PG9Z%1OD zBTnCS;7@)G<?!E*|p{_z~6=vEWoye5|x>VX&?g?I}~1 z2GCV0d1zth&Z8mi(T@vMI(GMl&oqV?u=Te6e*0dL#pnSl47`DJ<;@xuHTjQ@jxFjk zX_vrgKfZW8|JD1`$%Fana?2*l^0IFo4t{6lJV>_@`+pD(l{0taByh@H`{QXOZGZpc zkcANL4Z?-#skS%!hPU*F4;eTjY?h=)At8P3{E%~^uCJ=eRTVO`?ssn(ucynJW(BEF zg~J%0dRpZ2&Q=rggjt6s5v{Zm70z2XUxafnR<3h=1a&86^Yx2t(yvu1ud91q4V$LA zpR0}Of|!x_Rhk;3I0bQkhSVJQPh!Y7UI^}x*xu#xjG8RM@*<>^_tY8yZ{I7^Z-8Pt z0ER*LZf)^z7{-aI?{(D{Q4P!o>+PVSK!}rlED-7uO6`x$pUM+{qd@=65aqdgbc7FE-{1bv7x};Ao^VS>oyM zIE_KklUoPeg`ZK4+0<5rQIdM6V5s3#U{n4q5XmaQ$}1lFVk!^|-ZOqvAeWOfp zshd(IM?tpt{HH%lRADW3Y5F1t!@(vyDCG6C+1&j07)!?{Q;gZeZ=6=uswn}X`evFA zSR>flcC=%)Hl!dG2fk)9lp=iF4>iinjR8~QRz6m&L-Bd>mSQx0ZcO$N$QQ;@fsA9;XhQ>L)<7p&O`|LLz)^!|Q^TkQ1XtjoEhtGRRg^6^l z&d|nO%2bLB@vRWY<~{OijY+KirLM({`8%|K!N(zFf!V@OT*(WZAay*j1t{|8oT*Rf zr=w#4SA$y>UR?F04RMG|Zzu3xk=PBpOb~@)W!1j(q?h|M*iy;R);I~}UmbQV%6e90 zXEYx1cTAu%$?cv%nF5ZP>(vTh2Zz^m_qri}`RcioZ(mmqpUIJ_UO1X+#}YLy_6LA= z+yA9Q&UThKXiuVVfaZkxU4@QRJ`^=3++IDl6=OqC9XbMSvo*@;!c)}b%v7I~Se(n) zSV17)u_Q!JyhWW>yw$p3Jj8f5FX<<_`@8K-HO7^Q*795ucU>B^b;T=PYyf|sY!#Ds z2Iq$9|G66fPOGs1X%3=}wg&ahcod4M8I2Y zE#4u~13kbG8?V{g&cq$`>*-MI8PAOYyBzwr^nyJ>Oclaz7^FV3VZ+dTk+nU7QZ-Jf~dWG$O zSKVYT-Zqreeb?gZ7iYv7MVEv}6E*&W4JveRC<=NXL~v?~`&o_Ga3Zlp5BdTfU)vCA z3h{Yp%SYNUT4AUcEn#Bw0eP~nDn-za^P>go(4*^Zc$OSHEbT@yasj7>=W^>ugdx%z zSO5H-+yL3(Hc#iE)cP58Gt?qFOYV9XSKUm#*-#Liz2eGVR{?o|9&Ml1&K&&C$LBzn zyqyY>0Q}y4cJSu={@$BCJ2{@BqzPYn)cZYvaMxQXaij5YIJss8^X8?G`FJ>ykrHQd z>tSkxBcp^Gf|xWn82f)RsR*-mm5fEjs3dii_0+MGdYl88X+U=oi7Gzd8Q(`^7E;G# z97*GXQ`O{X5!;){^;j<{P!n=#9tgTTQVC{&IWC-}l~E@`_XdkO8PwP}W#zD#5wo1$ zIXm1hlaQs~Qg-8)?Mv-J6HDoRJfD0GFmycn_KuOV=I=*$er*nkfGaHW-wy!fdi~zZ z6~&4JRV=Qxm)?+Zch1$->1@TYAAzxk{Rw(xNaaNVg0?wg75WEd_WyG4O>gJPuJt3Y zPnb;gy#e(-nm0EGt1T<>CH%8>&hNG4?+3b>N@e@5-I$S+GYWJaoVK!9;3nIj*Pn$B z9pl3V;|5TlF*3+zxx~(rDVCB?*W}8w&J0zoPT7|XRSKUPj;I-T>^=|5tZ?>3rH2=T zqqVuYp_IW8I%#hQX@o@eEK!M$Xm7A=O$gZjcmA(B@9r z8%scC{s(GaH2#zq1)@$&KRX`yr`#<%GW7>#nl!s4(25P&qxpLiInR2k58ht4OZtXe zKCRK1r68`^ItLh4OGCavdD)@gN=1xJH-%K#E)pG3X;ldZs6}5;SHN%Y8CIk9Vu1{k zONRIn%slMkK6dvf+a(n-=Zf^u9#`-lLt<<-=oWT=#}Y5ov347z?FVI&B}I!yb7JtJ z4+X2i(K_}AU$M!DyQ562AiFu*AQfX&CVSLICuY&NSXmI%&&*!{?ud3oBDfjqe;_ur zt`m_nPn?qN*xj;sP&_UVANe9{o!9!+tF4n!!F41sXFv`k{s0Ts1y^l+c@2+GCTC#w zje>8kU1h3MhaTk2cx25%F2KB7Ovm?cvSrEz+BP9p}JOLTiP+R}XH^x#@M z1G{08gYdGjmjoG(o&w-@zF~H}z#_Y6IYFA}?JBOMPV{~}`mmNw#fD)=j146pN#ix9 zPx_05^s_+0q~2qwx9}bX`6IdrLGv}sDP|cc0)FdyTpg&M= z7mGmYNHF7(&RV{=BpK{LN>lplXHP7MD2YuHZJ`N4MdQpm>I~#fbzcv~tVTjZ`~*ad z)#>M3_$5cBH{*Wqe-ht@jd(ZwMf_p=M)t4(5|Xx!uB@FgHkXP~goUsjn3dPm8+iFD zc^$6}Q)7b=>y7vcRIM^Pq6gNiZ)%U)iY+0rAJ&Rnkwn99-5;vIiHt* ziy#+gJy#}n`Bl=ObDF`f#-u|rtBZorN%3HDCNfObv-f$AdE;>J&9g5MOpi}n7nfa~ z_A~9$scj@ysn{1)tktQQ7iXjRi|7M1gTv?LQK&I7nb+%owp6eJsu)^rhlhXpQj`0QCm_FjxJEayLQ`zi8!+9^4!F4qw((c!5}CwZ1qe_;Dzk&qrz zkK`;`$9M(EG5K}*PRu6^ui>N`z@NCs81%r@^_&TfT&s*k&j5#sE@sS!{_Lbrzp4GY zR?exY#FT87z&TMz&^X{642FMl{geO6thQ1rc)!n8U~b z$Q}buSvnlyF*ekwSQ(^ojG`Wu_+Zav4(T_nn@!ch~m&51#JJ+je-T-I|w5P?%#b9&suB+Cjp;c%bsfFrA z7TgI)k%XZq7g35L$P~q}%xlCvU_B68u?MMEl_-YBDx_mv7gF388$?qj+-i7v{0N=u zM4dGusY-ciR(Pw$oALAd{ab2D1Ou^^8H~mQTHvGfR^i<21krEysAwzAY!29K$5Zeu zxl@b7_v3)LgrV0Tf;}6_3AQhbFB|c|?Ib?7PflUGceCLR)31B0C4to^VP9ycr?y~^ zlYl?eAd|&VO?Bo_X_fpndLM4~){k*Z0< z=L2MN?US<);wffQ8PvGF?XHwq`YCJpJtQpK zcj!L2=xt>3kMO-STk|OXsQf+Pn|he9=a>M6)=M=h(36II_%&$}H#AD&bXcIeGdqP{ zAafC67F!N`_G3fcmi(jsQKfGg%YPg8;Zj~F+~SoFE0N{Y5_3LUqMk=BCe@B&;Up7F zR4Q7DM7Xi71~}_Ou=Dn>q#1FFhU1i!0J+2FG1?`cABK!AQN;DCHX+hODF^$rY)tD0_*U$BA!WiI@=S_S~o^R*m+2 zJ*fah>pOGAk=bKgc6@AhFym3nJ8hrfWyt6g+ymb4WB}a$hh>zQ|KV%22IlYO@axdQ z)6z|$hVQ3^v2pnN8MJ5({Iwgs%{y<2sT;L#9$gm6KAGb zy?jYo(r{e;MO`eT!f``|&}UCZ!LR!M>SX)i<`~NrY5Ii=#DZfw)1wRoYN#@POZZzp1kFZ@R*=*EsgdT{2BQRK{ zd+jzx>g%{3n6#B~1io`@$J?a%BRJo%N+tjk!VLg<1A!(3rH$;HIzRDn>ow0u=fn{a z&Hs$9!(tbIgRW-kbJ4%jSA;&M#p4pq9sX zG{z6lG>T4C$3GSZY#;5B%T8vObX-TzcD*qV8>-HXjGmjKh+Jea_Hu}zp=JofGOW zK-|LW>Z^z0!r9CHC1IdRn)KsFt9}l?LYr9|0p;*_Z}(okk<0}AyMt$(rfRo+H&t3e z{`%KH{Y!{c4r#VNB=AM@L}>9L)&BH9|N5tY1x^;H%S*@-HM5-|61y%YE2?n5<3}bF zio_p=ewvCQ5{tNsPFu`Gj7m)91O7IbQQ+O%a1AUSKlWW;=#=0o9lt}YPqQ4YfHD6> z`iW=EU!j(cGZrY5*LSQ~$qi9SP*IaQr`n?>I?>=#2`Z8mwSDP?(x@mD;pzMIwK33< z_fB7+~;;^2n|yLGxp)#;o1k4zD>I!2`n*$QBkv=l80>B@t?V)@@o2xpY=m-vh@#A z$gj%wjbgdpiz6z7==C6!ru~`4Dk9?D>~e{25}*-laZ)%Tk?m*;=z(pK>s93}4pnPc zBYiPLoe-i%vW%xujoc#ZSWB;2H7lcM2B~k>M00>f*tYrY8j1ehS56OY4=6BA1fgk# zlp>N=L!AURk|A8x073v+>;7t(P8TUbrjvO$mr|mI(6C)K>;w6FBf z+nUs-YkCNWdhKo>AE_knJ7d+i45~2m8pA#81dH2bSStkjnk?xy1@PFZe*vxKj+q|tMTH?S7~;15v!-DG-|k=~ct#%_sd%e+_V%L^ zQwblhd5>hMb3K!+kz00WNmmx2dhc*&cP$;-$B3LAZ=OI57e=L9@AM=wv1!;NE_WiC zBTnev;RO)&xKaBi^ z#rin22DE*157DRgSF{8yQgcTX|6U~Z|ErXANfA`)NX#qFz{El)_hY=LYI0NOPB<$m zk5q-HoNZpIw6^aeC1`WSMB+|U9DbL7no3dl2TL6OF#l7bosKltG0jf; zY@EiC@&<08t=?tg7cP5 zEon035j@e)6t^ z=w=n!zw6c)e9QvFv%G5n0;F1`PDcav z^vSn(b~rgE`q>G~iU(#te4rm}&G!M4mcKq*E-$o|cEoyt%ZT2Bict1$`hnZim#U4} z%BYpEf`3&>FZkK#r-Rz2r$vu%m^puYj7-?s^74#2P-$z|HewsIF+9qbUTu^Hmz~Q1 zM;;qYVEL<<{*P!_&JPe7USDLZyzj8FIy=(yl9__IQyp`&L|WUYp?9(LvZDQMw>H=` z(dJU_We7(Y6{{8fDDQ{X&2+HkEChR55kCwkpb=B*n|SqNLDUxu)efru!tBpu7@&A5 zXgTQ+3w$~6n73G2Y!&TUUab{4P8??4U$E~H@lq%kTi)U!9m5y=eQG*)eiHr1}hzyJ#)eBBDBw6@gV^!iW~W9MPAqBP4cpZrzZ4 zBR`l7s2J#N-tl&J{mkTWF7G4}f7X9`*Ve~uN?L4`%{Rmm2WR=~{Un2{W|?q)66w0V2hq3tt6IO=_6 zR-{O2jn&;pAGupSl)T`S^dDkotEDe8gvG6HR>S^5BBBw9UYGC57CRaiZ;m!GHLJuW z;ufzz49pKV&hj{S#?#J7KpiW!1bD6B`V@Z0e5sS9717ylK@!I&%M}mc)rjDM9fs_h zXv%)Haro+owItJ4vcx}Iqv%iHZw^hEF_eb3&g{*JJ|{q93t62(cE>bMGXw0-L;p+XX$(Z{^WYVa;8#XI?E`${|N330X!Fmk&u1Pp0RWaKv zrBbFj&weLs1D8z1Ttp2WL@Fp|fHC=wrY~1?of{L72D9EouQJbd<1)1^-@84HQ1n(h znh2A){0n3{^C{OL+0wj0S{{O)LB$&Jbijd2m>AQc(REpNne|mYh=?W$Dh<51c&ECb z8rxJ|Q;Io2g|(=|7oNlA5|3ZMB3fj1`m=JfoISAkkQ2k$p)WoZ^+o$OAv!VLll6>r3osj!8jCIZI+esj@YE6cL?I! z5St-`cST4(nv*3;f5$76hprZ=m|3%Xv{LiAWk^y?WBuq@>69pJh;&Mzg1V&eRD`83 zRv%#}b6^FLjz)j_;{sfIGZ=qhoI88hSNgjl!@#)mi_PVScIH5Bd}tlj2)w>)!S>u+ zP>@nR*4wb|LhTHieM^D|F}_q98A+;*og8HGf`0)43B9Y@k`gsMH0mUN7MuL?Ymd~T zI!q-=@Qwc>$ip&qY&y-R4k6UO$_Svb&xvInr>AE~p*$4oiP^8UA=}vE#jX7S<(R6| zAj~C5u!d3kLeLBZa4`|A;aF0wg0AeFB*-A+hOi}C+=^ec!zAt5&f@~63X?}V(=Ic; zzM9JN2kaY>-;KE4S9BH7RwCB1o>$&%tZWkBb#p9i;B@+Ecu-Dy za!FU)-CzLTw3om{Rv#CT(HjE3>xu{8tZ+aE%#{^~ji=ap{Zq%X)`!9Y5J(y}ag8yd zMF~AXURZUUPc%U@s%8C#-oNSb{PIFaZgN+s6eK(5agnu~dttDFY7KiI7a6+*J3BbF z8-f%rsfEZr_mb?;P!s-OMyFCy@O6(RTwn&N7 z{o*JT3Pd#l6uM9#1wHv6JU=iI^A!_*>zE($m&{swXP!%CE>a>TmSZNu7qL*6%yaT& zuD$o#YYqHgc9N#G(-}jzovn)!_OI^dIb?{ga|9<>I8#Xg#wPSNX7(q}?09=-pPGcJ zxFYeU_Bn&Mcmyx{;MLC8*jPF2gz_AMNauHwX?!Sq4NyzP_0}~M?8YGv&qh9pgR-?) zGzp#S`2tQ_D2u+gLhc8in}7!VeejfZSNLFzCKLFCYSPw$GO$lXQ#K5*dx3%1$X`1D zB*4~Tse`(z#JVSFNnj(SH68>!79APsv^Y6>ibSl%)>l`Q(hoziVOV1SdI@_>(`vPX zNt6w>K1gv7w&LGkH)-*Fakn&)!Su=aINBncIDq^P8vpvX%!u~^jE}SEJ>obS{crR` zbfgorP#G0=1c=-Ven!`u$1#LnU1KCN)$7we(z)(T{Cm$(1L}wQO*hFkuv~C-N}d#3 zZC(yf;OsXXCXu~;1N|bO-&%~(EA8%q4+zbxd8{mkvczS+llm|XxyFTRGjGDd-|@2E zD;E0&$h$_HK$c>DF2gZ{5Qk}Kz!|Newza--^3D;mOi=k><|T*@Q+S9k=u1;O+b5x7 z21$NylSd?#v~et)B`i?v%%4 zPahcr{MDD3i~s-W5`)pFdWr6u))7x zT`(NA8q`4O5{||T*BC*C3waNWiJdH7K_Xb@A#81D-iOA2+Gk9iW@5Ap+ljnXnkDM3p*VUHqmq*04Vha9G07z+{35Ik(YT}4&%t_vP3NiC1OsZ1CpXRLCyXUG54rfpAR)`Kkn>`QzoBDQ{+w|Bw%-lb;NKtR#wKv z_l24QN>F&I%kh)Tg8UWB(7^zGBxk){en!J2%5+Se+)SckF?X(5JquKP+wX>d50R3S zNV{v{8BjA{poMC$_kVteXWPgXXEgRDVXjVm!BUA z*|DcuQ&f&u?BbPc*x`H@+LOJEn*RO zL>8C5M(GN95H7RIvsKqaIuCaa5;kaD^qePT^BBEZ!x`HAt$}S&+&m+o3g-(#RIsif zR?Gj7*b5~~)}@&RCjYf_xNu@MN9iJa{B_$c`jvG7RJ%qLCgO$%*|-5m(iM6OVngRH z=p~jq2j9a-5@>KTr*brTX^nRXc3&@yQ%(W^iWOi4m;^c+{LGiY+Xn_amuCaa0q&1S zunR$|6>l{et21P?X;}dg8`SUe=Uf&hKVO4AibL~e%l;s!PCdwiJf}QkQL}|M|6^GY zWuN22ZwJO(KHuKYLI5LJM`P75BTM7n!{2W=J^Sd}``M%Y#SEb=$c4CoPoXb6$~WdF z)85Y>^IKo@n}KQJV!f-J-kWZ2$dtH29#2?Q+vb}+lTll&MISyqNXHijc(2DT$PWc3 zP*e&M(yyTxz?r^b`#T(3O$m<_7>XkW zueqIp&h^dB#l>7xgrHXYwsAA3$oZK1#3@NTWO1Q=G-;;tV!Hk)8k}$_3-XJ)j&UxSb+TPo$DKC zpHv%ITo*K8qDK@P@l4GbTN?|TXv}cQU)NhTpcO03=H!gb*=#*OM+VN$T(*7?H^)~` z0iev=;Q*S!jDLW<>>|$G z5f>?iKWN-Qv5evfs3ZoxxncIgGH32WbMN`_L$ovbgDR}lnAJd3y{mm0T7@>8 z)!DFthlMk&=zeaLYYfR5YAJN8jlM7u7D&2vJ550!znKi;E0oBd%tGsMtj~NriG7=) zjbqdEL@W&N{<+D{%iI}UXa*AT*Dl!VCG`+jy_YH?$79-GY>{_&QDm;!#{ zh+Tksw4uIUz=<3fK6|t|DVbb~)N{IDHDJy0urZm@8$0a`3(+f)L|LvKEFxrVa5kC{ zD0WDsB)r52B%Fm1(-gj=Z{)&)26WW!VxIzK`{IH~8^6DQhk>6h#bx6_!y9*%jp5OP zMQVK#A%TO_i55N-5k6mnM!19w>b3-${UnH(G*A}Y~b+Fl~2+SKv!5^FqGu zG>s$JJQlRKX_$+Y9&$Ek%u-tG$$;j(vtSYE0Bqv3P$Ef1MLbpIg23;X1Jt(3IN)AN z=^6@91EE$JWIONSkhYq$@3I=r8(w=*k z{ekIN=(pBszDUavbGr_ueQQwVAA%5)>57oIg%}d@0oKj(dI>FAt?%DX({Rsj?h|)t z$!{2GglC`0=Iwr6EbP5iY$ZXkC1_@5W^6OGnVGTOW@ct+!!`-^qVAF0(eB)=3^-5yuWl=pMC2aMLm_c=_^T)(&uPmG95pq=@ zVBXr__+9P}`5_h&A4#->xsQ4yTi|x6m5#y{nx_+BfUj9^?~J4#QqO{kC-B;-E5*Fp zU@=5exHWe{s>FA3Ow`#zv)d|xMwMtKOT zhQ{aA-_;35IW<||#z^{b*K3@}&|Jdh?%jM5#`J5rJ@{*>2zHWw=7!&y(DdKvjvg}Y zFGev$O4FwwD$0Obj%;?{m967oAFs(WO<5osFEf-XoXo8TPuw%BmZA*-T=Hrb0VKk< zM<{8Y@NwydJR_?ko?RU!Qtgo&XksNq|DYwiEP_Z0@@o~>g1=ojf4=G!Z<0Cr7)=GCM?=*KQIU{jXimo=mQ9X3o9``=#SVLMJthG ze_c)+*TSBrHsLg(XmOh=ylvv{Z|3n&<1N~93S$sASZ^M<*Lc?rtTdb`=NCNr8(vZT z3eEi?O+)bu@(kyg8eWf{(#x~99If|8cPJfqR~amZGY0DNRXj#d5btSFvDF1jSrBQm z6bqLw2+LMdPSe=8IIq><`|K(Bj}fkr09rq$f+`<8j2%10wx0H=EoMAcu}O{hpF8(( z+W25-R73#=_BbKX@;f*Y3}oo|cUOklu{{s{F{#^{PAqT&PXsCKzB?G)3vI#)OUtd5 zFWEW#BuJO?T>%czAVeGIX*dHe#852ix3b(Yjoe=sPs7Bxqx=Auci?-b6EocN8HX6Z zag(EVVd&N59)IVlAai-l_GY)hvSk7p|Aqau!^tj8ZK?%0Xhdkqh+>vP*Jci%zW^Rm z9caHhlq|BkT7c61V6w*3@M&Q!!pLVxKS%GGEPf&Upc!>nkzTZd<}bBboec)E?h@PNPiz4j5zP{jJPV zlLjMnWrU26RM*MecL~*Eje+Oci+YV>XyX-EFEmp7+~eI?rAz5KK;HY`weH~$eAtb{ zK_KZS@;&_4%deFKm`K)iAG25*-;`KZj4JT9ng}X8I=f%&8nw*%stj;T@*U?NmV=*K z^L5O7S=2eo>zPa|#l6$UOd#+uqk%$*FxzBT=AI5gybqhicg^hFtWlmb@V2++zQ_~M zttH!X8}00NygoyoPS^MLfNnO-VGBwqAcJhsXlijDqNzgVtll6?16j!B6f0XMG`XLi@CO_I0Bvk+>w&& zywjb})RUeayxo6YT5%fq6gGVorE0Q{OulkH&^v*m|la9#7n%MFZZE2^d&3KG^**>$-Eu=Z&iMAuhd<(fe%}V7V6ikZRC4{#~z$k?k3&2L@jjB^^y3;hRl^;N7 z7EUH}=(vm5NfR?^3fnjResQt=+{-nzbcGBsU%9MN)!D!kcYmh5u1_pturQBd(BHf8 zch4OaMU=LM-i7KLC5z$@MI^Lt$Wb8jdGdg_?y$W|^ok`C^fj^jOV~W52#an4SZ73k zgTrA(s*6Df=+pPT_%zBKrw;EB_SV8{2gLVESgEwjO@hE{UDQzyQIS}p#rwLyFDe7P zy)#$MJjf66e^8*=D~B}pR0fbENzWYsRYMDo?t)dwc_(Yh#QO^)&EiaiAROUi8$$4kT5WwD zB=iq`*u6g12U;AYPf>5sZU_A(~(Vj8Sid?suDf)zGZ0eY0XW- z_RZi_srj{wo4e8mQ=iN@!!f&^ckl@A>tACR#enlGLO;@N$LsceYT|88M1tY<*COuz ztL>?}=d67r3|}}AkU);eO|RP5Yi|X=bWR9xh;x{Mf;+BLLk)P#@t^MY<%LQ%@r^a5 ze`fJh9mA2|dPeeL^v~133DMB;wQmyBB7wG2&LEZ~o75YMJr60I{Ze@emsY)pkwyt4WF6~Ra7fzXoj zanO*w+)lMyGJ1ql#g>5l7yl8&^qHfqNpghZ{Pip#aY=<(601beY*j&M2xs8eM#klb z#g`ZwG^~iz^j0{YR}}2~NrjglIvX=kNF1jWmu_lr4B;I;M#~L))5rp$zb_Jtkp_BKVr+3t1;HSo!B3~#RnSAPx6$umo8co;6{XVaz4J%r4SnJShDYCS*$muCO&d5o_w^NxO+n2x!r z#gs?N%Vlmpz6*-HGBm$2RQphUAun}XF(S&OCnYcQgve4Jyh8!6_c9JqoRk!Tu4p5& zJXQaKJ`vgiEyW33b4P&DxftqUhPh(bpC|Ze>v?bE3^~););~ zPHzr#s_b)yD2%G0cII?Xc916_mtrBvRu6EA>LnKA2El|mU!LR256ZiXrzq>+skWbg z^t6L%nx5%`JrXVaRtU)~Mr)3LqHva-vGB@TC>azlD0PO0IV{5U%yo2rtF>tqDtVhM|D!1Uic7%R{jxBfAllaE{p3wlwx38uD0 z2WZ$Cui@z&zU{OX1|Ih(`)NiS(ptd<*N7G$JaO2(gY3UKn-ER13*(zfiH^S~v?p|+ zSqbzY3}z=w^AiK|#=4-ENh@$dJ>>d|%434{cRhtxrA_D-xDtyEt0{_P`5x z%@e%fNy?%92j*#!Go(cA7sBV+lI3{vysR+`A(OH9D`U1(7-(MHMHX3Uf)jo&ux*G; z68mRbNBR&S0Vxw$oX z$bgvd6o)G6mExjDk`P1^Q*JuJDa;pTdi4s&MDSqll!R25#ULQcWWG${(VZvb$mLiY zF4D?PjZeDdMa)^nKm~W@1)^RWy503&726PjXsG zl6Hrq;YVJUr8RQseoKXoim=(FksXks0nLNFJ%&R4|6E#uwoJT`G?TN3Q@WFaj>AshtB!3|KsK!Jml2u#&&pLv@ zA`%}H?^IbPKc9H~vJ)o?hz?7`nVb#nRG^G*vB(%7t_B%St`6I?&6Aa{RC1+6wCK9i zaiELe6yJUVlFp+e8_ogP5@%m0**1Ym6cMhT#0i9`*)p#=PD6$s6YVFEAMhL#w+?)K zaB*~Xb#}kSvn}V_0B-)sEuB2jj!@nT{IR|Vmn^|VjvT|gMuXYJW;Jj_ISlqQ;^EeeYSJ!h(?tX0~K74Nw z-|ko{hpliB>1>!q_gz2 zBwzqUoMKrP3_mvZMf|+q{)DFX*Wdj?Kxg9ON9E+A%NQIe{056PiZ%CiG^DKV5L^j| zji@iLAr6b#P{>P(^Ut)Y%rlVk*ThJTXEb3PVF}K6`cV=%A~<3xA-n5;iz0%Sl)s~{iXPy? zesF`T=~P>i%B}o*X@TxNnC9rm!xIhNP(?D7=-K1H# z=PC_V+g`xM+^&aKm>50t;G_{nbnvX;+xlrc>EI?2Mw3;BmXSUD()H9y%P^@TJUYOd z`cTjT2N;Cwj1aIYj?Mv51|JRP7do=&n$8P~9h0e>#>0B8D4-mIR>#;H4xdF8^6tk+y#tsz63?oy5W0P%-zzbGa2&5hAX0 z^$yOKKB-(391if;$h zBxO@#=J@T&u+4_t$9hRifh^qN54Ol2?qI@}Xwbxka~x@HfYc||7xzo#&MXJ7AMTYO z!_RNV`V=)R))~DU9N!i&XNM{D`^hoy`P1k-e0X_5Npcc0zUmE+7tWRixulGH0~_8Q znD821cq~%sgOJ?rF%H7=SyKCxbSS_LniGndcsfl5B5Ka?e7Y9KOS0j@#{AE|M&pRB zH86vJP9Xu;Pc=0g^eD1q#US}yHscj;3v(Bb2h&mc&lh*{n}Nga>P*dPUoX4~VIRYi zFrcKN)b6Qr4Q!^^yku*?SJhg5fkVmOe11rLr}9`ot}gc28w8~`ZeA>@^`pgT2m5E0 zLKc?NFDpkDh6iN*j6lQVg@b_35t#j)PxK@}6oacYLXm+f(%oU0s*;t^K@=yK;*MEx zIAfK>lv-OMixCRu_=>X>hps-jEMIt1bPcZR^p%lMs~4d12t5dOhdoujn*6{k#>7iO;^!yD*N%cr|N* z2P0Rs%>HPv4N+W`y)4pY1t)3WUWV=KMc3hS&p(}fJzrPRXnj1x15K419kr~xTLD=> zL^L56k@xlsX zt3WWCbPJbfs|G`e5xDPZ8EMS~N?m)%N4wT<;5=1p?rJWa1<8L;^WMexGhCAf8Vh6$ z#~Dz9?4L~aEcsV}?IO9jR&^3gtL|*=-MwT`E5^ILNh=O1ko}v73^>00+0wnMILpw2Dzv^uJ~Ft3#WlB ziWAn1hg3?9TeaoyY!_*-AKq=sCXja!cIB#n1{X)W3{DgGWF(3mk8=IVPP;Dh{O@12 zcSFaD*3KxaUrXM=TE?GhdsNOh)ty6ki3E~r1L}vDZYH7~O*~5JwiyNbdv_DH(DC<6 z?cIZ|{gP`~C&8NeTkJJt7H+K?LfXwEBe3l(CUCOq<=Tv zPub%+NJ4wmSEXIZKq1h)+FP$Acc@rMnl3pZSP=5X(k%&r!w@E>T+_ZcJhNntpK>Tl znCvt;nghpKH+&cpwH^1$x)DL4QWGs3;gDZ3HV^P1yg{i3I()tTuKjxD!s#wiVjjY= zsG?KClYgG$3!C5bY8-zHM|<%iPgCF-U#ka$PUP>8_sT{7N}<6n{gM2 zV--B1_4Y5rBQr&NoB*Fp)xN-#{zpzl2mC7J?eF}c8Aqu(d30a*?-QzBh+7?=9It!3 zj-TL`5m1{*4RRyS>8jhC*TeuX2>D$2in}daBWO!}Eclw*Hi?bi=nPVXXf`KxE?y66 ze?u7<*s2LIY7P69_@5|u{YFr4tp}gdeb`U8x0ciAyAmVs6k5C*&9~G$n~);S_@cS- z+X<=}d)KJw`7Er8#WMVU`|FD8LrIfWF$*uvUkgCZLWAzEuajA7=x*TgBY7b}nX>KW zl3KF#ul`LV8;Jx8#l>I%6G27J9_*$IqL)xG{PwmPa5)m(oc%OhV z;N&FPPt^*09NDHx11KzU#Jp=mdA3d;6SnZ=PVZR+XgVo5~|X75s**BS$)EB zqnGju{#-01!_pV3Ynq`bSZs5n__2jaMuRVi!m^7MgPxz80ZS5Sjap9$)|RWs;m7V- z6KHI~7omN61L1o9F{&OJUG{Wy-ji$sAK;Vm)8tar+RLT!6JO)jA*@65{bTzBRxmun z6-39WsX#V!%ct!Kb&4F~cS%ZU8P^B#NQ9IK0Ejc&larBDheUqy)$cRFqc z1RvK4v{nvs2{h~lJTOz!S5*_vr$mxElle0$X>kx2Y2s>oDOj3pA^idji|SHwdaDQK zGs0^OL1udD)CelA&kR1wqh5rUMegeTxFVCFsAhsas~$E5_D|SN6N#dqQ-vBvo7SMG zKW6N8U!xc?Ohf0_=XKYRT3>O4-aBR;8p>94Cj1EYt)$c|32neK2Kz6iU&?>=GL4D} z#cA~D&kYUVaK!n2^LHR@1tmyb&=TzI6j?OA{|<)Oh;eZe4GG~a)yp%A87Uq{q*Iuq zwBHY35$yBpg8Wt;d12GB4zjbMJTfhP(&h`?ky6r%Uw$0&rEy9t)w&1o8V=vDGEj_w z`Vj>c0M*Yts#iXH4_FiLD)#1~wNKpg0H^!wm$>y*r5cW1!Jop)iL-5lgi7_}jJ#k> zd=R?FehSgzTqi4TY3RDWmQNiY8^*(}<^F^BqK~Y$|DB#)vZlsJ{@m%0=NXpLQuA&( z{1L3)Ssz*dr9nNEJI{^L)z15XN%p46op$Q!XcZO_lO@ z0Aw^KL6_t{sNAx zlQvo(=R0UZ5KrpaiZpg1`UO(-a~>0C>74RxO}*NUyq-{^HWtH1PfrDbX=}GqY^VA> z*Jk0hgp!w&7Vs1nOYv5c6uql5aC$#Ne<78 znzJ+vJugk=16HgmauX z)v^mKTJkw>DayCc+v5q#R!qh3JJuXKBRqjjbtj4p(!^6s6!b*dyRHP#lE#W1 zxET}E{QO6J;4h8O@dN`D{ior@GaGeDs49@RMN*1j(fyvx?w#42WjmpL0yP{uCd&hz zM-odR+`?sO1tX@WIV6YxlWE7YuMz#XV9;Ly{Q7)jV?~6;jMK~uoAh0+Q(I;I3sbLy zuW$lUCQK^Tr}}PaP2@Ots2BR*WEQ8>yIUFei+Ub}wgan)0P7p1Efs7|PBO^6XtIuu zVH;qR%Iw5DLOVmOKp$7rmY^?6^B6vO`XoaxX=m|wVaEbcOi_4HUEw@p_-S~ZxGd*-|sH@eOK1?cv#6Kt0s?PFB2 z$k)_-0odd4ZL*mv4MQSUyqTSd9jdW#tkBobHQuSc9CFKC^mQQ1@B~_|>2U5vQ^p(4 zl3|1TgQ8v7y>&Er%FL?*d6!4jlY$iU?PJ|ZiD%!$_BgpY8mZKSAsC-Flv}XhVdW>a zss?Tu*lkQk%aE{OZ^{ZTLMcP{_F)VXY*TK|zLw)x&RZRbkOn|#t%S_f>Ocvqbzz4o zBSh`mo@?=GqlaF!ED!>cV>r|95e{APNX74S66?J$)xsa3zqpbJ$PYoj``5 z%YQfAuEr20T$#89cAz4}D6c2*Dsc2-bvx;~zhr^pgW&Wzg=Q}oBJ=$Gd~QQZ5XxVa zS>a}O^AIcxjV?wg_H{s5ZA;~aziwVKu@fy|UfTV@s6)yr+jgNNRhE`s?(rG=!wZi#sA<9$4o7Jk`3))(}CnpF!i@?vHNC2TtoxbF*1X)vp~+k5CyjZ0Dx z4h5};^62vi(PkBrVNVIT*Cx0~Y{VWnn}IfF+R`1ZG%+Fu!!CeN7p%frd?<_6580O3ekOdr_`~B^+_ig-!7Qhh@(Xp-jyUu7hV8< zR2Ir50~xA+M{5k3)3yobdit(ao;J%eT3QiY85NW6yE+NjCPRWwvLMj;jx_ArJ0F@3 zPy)9Jc9zo5`#lYtP|5QPM3hC5Hp9*~S*DHtQQIsD?-dGeZE!$DhnNe!ltK?4ft-&^ z+s(1@u?sRT$)S8C*BBg zmp`5#jSP+T?6UBSHn%9yZ;9g0@wA3-4h5`W0cwLZV5|YS*rHy3&6iZbqcVN3ERFoU zUWRz^a6|wRU4$mhH0b7`p|u9OH%{g=)a{D3apBw-j@>+LJ?+gr@FG@A zkVGX02E7l{+fVN(g5BGu;mqsAv_hr=LV2mtXngotfkSvpi8)io!bHV=UluOE>pM9{ z6b9tsDVc;b^plIs&6s)-i=M$0Y^@$OJcoc8KpiSDK~;#O&=2S=hVuuz2HS+q%TG-% zdHHwf%X*kUO5mTU(ATstVtfR*{6ktK*f{py;L6wc^33(_8C0@715D4ukgldwD&7!O zYIU{{xcv##QfJwWr1~8u=ahJE?Xcv?&YgZ=&`-t`XFg9gMb5fuyCap)*mQn_7tG-8 zj6IwyTPp!kQg#-9E`xL%E*NgWlbaC(GWjiFjgU7$H2ba&nqMhUTz0{9CuTa&g5##Y zR?tuKXHf~_GdKL-1YX2UG}?g%2VUVNoR%_ZiuNa{nfQ^;)`7t4n>e?%%i;uL=+d74 zuW6ubf;#Y8!&FoJxZg5??iJm0UlJ>|;8RZB?8FJ=dBz^Mjmdqk7euVtHxyKRx$o|X zrx{N`Q~-l}b8^6J33;U;w0SZ{(bHlU_vz}XEFz8ppM^%3dCrJNeFJDo29pUpmSW+= zZY)Dq*-}92d?-M9>kus+lq>sqk)C!zg#58P=JsnUsXa1OmK1q@P~`Kh0HxDoL7)Sx zSL6aGsp*iv4J%;5HnF+&!1{^JoAAD45>Bu+4))_~J z^bpYj=5|M*Z4a~6%=?hm)1B)aw&v8?OQkXPvqN@&wJ9zg$-V7b&-f1% z6nfG%^P~ z03Whb?bhqOd5*2PYxjb*e)wUMN#7?#Sx4-2WkgywFYvK*Rb@3Ec(Y}RY41nF7gNY4 zT8vLYk1^L{Y$1V&mT^qt|mq*CD;^h?lhzBK?_~q%6jK-fv zLb}j==QJHUPl5YfVxKLzg&EYUZF^8zyKu%X4euZPPSB|mGYC%kwlzzcwQjh;|3J6J zelb(nYrRjWTUeL-c(+{<6lp&CT!f$)^SXo>j9# z9*1A%e2B9lHehX1a{|7_nH!L%;Y~1%#GwpN1s{Arvkq*V5F4e)wgj1&qzm6xBGDg? ziBnQ20OLGzIBALIH^?s89eLu(W|7pKbO0+L)sVP3@<%r#IylKXLM@x==ffaNhQCUe ziU+?Y&hFzuTj+A42YW~MKz8g+0dj(Re>*x3v7X|Mh6lee==XTbV(c`U({p%}xVV=E%@kl%T^|w)1 znXmo}fMt7Oo}oj3q8aU89&zg3%gWK$`nwN@-a9tc-bw*ui|HssYa!^{o#HE!&(DQt z@^AeNE!OWI;Ck3AhY>%gQCGAFKy`G1naI&sHD1Kmm+mM7t|RzcrOBwPGS&XOIi?Y` zjrrV+c`px1^X{d>A9T~EFF8F?d7w7>UH3|cL{CLMwjo8nick<%aG^eV_tdg=G~9iR|QoOZ4X~S*F5mM zejWJ=xA0TG73;Izl7Z*jYdWRnU%6GM?A_TVV6O723z$RXM|3xfzjn$k@q%8T;k|z{ z+)ZD9H_Lj|RsE}r!Sv-JyVBvje`3B^{rE3(|HDAC5&yT!e~z&?@;w9p)7H1l{DLH> zcee+Cjz#}}GLx=V{`T^1bZPJPTQQxdA@~}5y81sfSSPzBza1feqWhmz*1}%@n+pw? z_y4^w^S>+1|C@Aip9*06+jOy$-0sKTyF6raA8_#gzxniE7c?K^MqKi}y!gYkZ>v5e z|8)aIcIYfdsJWGndf@!4BN~oJkF*P4BJ{~;qQ<5$z+5qD;RWBV0DrN+tKYE7{4U6r z)nFF>2NV{ucMJTd#Q%dOS^57k$^SIxe>TG^ev>Mx|38L0tze<=G^1AkvDW`9`~`FU zKk@Br#F;wnjoN>pPOGR#{eR=X-+{k9>i--6i#yQRqyE3~zqkX@J?j5Gx)!WY258VRzC2jk^Ofgxd+{)GBY zd6b>SOSZSYi-g(yHq(C*45jVj$=BaaCOkND*BALn8X`pj37&AeGuH?et|8JZy??w* z$Man;VfiJ99nN-Gt9@+O{hStlVBhWe444}pDHHH~8123O{PO`bWuLfQAGr;15~IfG za^q;%5jmdIqkrk^eWQJV;Ovg1sx@b8W@$^W)*}`Q^&%mHpETCm+%_o^>vp|=J-!+E zSm_VBA;u7;1xicmk$yg(M^YK#+%L+O=3cdaT~0xXR2oTDU+L1DG1+5_bl#F{BK7B= z1bs57Gvx(Yiss!eSozF!r)w$@n>&CzKfXqshw7=ISZ}WSooGvm&;4YaZKP$Cr5rD~ zj*a>3i2UeP13a5oo7WR>Rsf(ttt^67jJYnbzt%1@z9OhjvUC+%#w#}O@Tf|fp0Es4 zh}y_}GaKDr&02kZYTIRNHLI)i7?*hUw_I!mH7oU2Fa1b+&01Ty0y||M9450FVyCBa z^AU+tbm?Cx0p8nDjb49OIx_~p!?M20nw`f2u|mN%ES8uQ0l?7$$rH==FU?L@Dc^P; zP21o7qJIFjZT$R!J{NliT{_cDJA%(I>-*I=Uu}XdBCUUVRg}GaeSPaVUyWK{@17`1 zUI=6Vc&uh_XTRvKyrBZaNBJMobNZAnpN0?bAGo9HyR@<^%+K3>U0iju z{bw4H!Pf6*c@2?;{DI3i1s>qywyE!P=hu;c>DIaj^e#R-9Uxk7n0^l5VMeu=o+J7n z;VV2)SA;xw-2qVl;}p#11Ts{%`K$qYjLUA?W?o-&khGn!lm4RXkU zEvcXsOs5InN;No*|2|MknwEB!bWtWe|GnJan9PjqsqsSglrHV~V@ZaPRUNBkOzOip z-HHE0e9a#Ha--B}3C(D7?7L`J0~12rhb)4e0>IlOvj zUCTZAFh}OW^?XE;S2U^(M7(LcTS9LFR-`^b-w|IW&ggVc>@gqriBIY=Kjb~^J4_ja z*ei4_l(hNC9wgvwHQwBWyP^I?|LYYpbm(F)`rI>CtB9Oe)|%rHl}gkr84$0=Fu7&t z-eNyFSYzs~2NpC%#X$cRlKWUoXb579F?;BW2szzD6X;gR_ww2c+YWn}jOB=YSAkIA zFOPXi)oyK)mpO^~#VsjxpgzkiUHmq}r6|!B)YtD0p>sr3*g+xX3)7Md)40v!`LRCA z5*SHx_cPzM%1AJ~=U2ZoTG;B&!HI;geqk2rR&Z5x{4&lxuAp8`8LmPX%oCMSl_3|T zd$@8ag{~u%5E;nNbbR!vlXo3q0|t(2d8>0xn+;<;fr-U7QC#C6#cBQVW(CuRb>Z!h z)LiWKuq!vXcr2f(eVRtocMJVOOVdN0gEV+0fBM<}9w-?wV8@r=eyRHa%k{eMhVip4 z)kp?T{w93!33_zK4R1j<`Bw1;)TfHJ-^B|S^vy9!Mi-#F@1JHmBe@=xU;rT;M`$tg zaT8GHA@JkEx;#_u3d05=sal0Mglxx6%goixOjm}!>7Pz0nOAA<~-Z7Zk0@}*-&IG zS!&u*crsFKc#d3^Tqwl3E>Z9c1BJ~uY(^fO5^7AOXsT8?VzCXm>YBkFK%e(Z$j@$e zwvCJV<1jjV?RfEgL#Do@Z3ajfjTA%m=dZzP;PC=Jxc0p6o-pa5LK@kjFc~bTQ&l=|!V;<_{ z@!q(Iug>^g1A6A(f_6oET>14P@uq&wYZ zB$8Ysm?X@?#-p-!N&Leav`VQP6re4Pd`pK=l@YZMSW1b-dcr)09ySj>6n%U@d9mP> zkY^?QxoJctZ5<|eX-;pr;VD-{eMpF`-RZ%l7z#mZ&IOJb`}(Z84Wz5EVGT~e1I-wk zB;#wfG~n0o5v8JvJBDd$4he(@~c5CQqftnN(jePCK8j#WT&@zV^_1?J<4_eAxCJ6X|G=jEVM8p4#ht5z$9*eS=A zY=ZV6+*m`TRI{U0lOUOJrhoo6;ux}x6Ir~*)g-Mdny2D}mDmu|OH#&XTq|g}Z#Hvj zGnBM&_*-kMF{6^pw~4XHWzx9HljF?>d|>VF%9 zx1!z2CvE(7C>StEW=CvRX6*}7gM-8?(JVCp5-NM*Ji9f&!jkoJU6_|MZY|X3>9dKW zOo?LFSUgMXnCQ+HUG+4GVbJV5=k?pUHVYFmx=&1L*Xm9C-jDRPD3DxdEuRW%vmi6;?)k;HA;nf6w zb-{Nv682`PTN}xvGKQB3Y_1d+nCLeVzNL* zvySFq^oK?YqoWB`tMF=(F;{=a7lQq64osghJhyPuBbHfsdQ4H>W&Qd`c3us!U{1G+KBJ(u_F5z1^8QM>^r2^ z*gBHRVN#zZ;pA_zWET@fr~_uH1ZIgxmL3nvSlFZf5V>Pk*Z8gC>09^0M!+e4yV*{`VDIMrrqtmS< zrZG8;QgE5sC|HjPAuId+hAZu}j=Hf-wH4$3tM$4VyB`kJSk;q?jUGCwBx>-Z>n(dZHD$O`KD(5*I5RZz zlxHvo5Da$deyV$?5Cnd)^6DN0=JOhTWIbTNB)I3d3y@iiLb=nc5HRWn+gK%4h7ppb zNca&>=P|iKAL6&_QxCftK3zM?wle8ZJV|*PIa68p@5u6yj>*5RIH=T0i<|I8OtBHM zcUwU=+09D=>g2{Y)&3>5FYK8l7%O`=wzXfy@V@P4F08T6-kRdxSLep)ItAY#`wL9D zTEuQ9ocyb!I81!!p*Hyih?k=!I9MxW`!mzdJ;NGwJW(#%(8K`F-r9HkD^J?CY>LjP zZHoR>LOom^gYL&Mr=vh-ktm!M6|oyv+3Fi}Iz*~ShFg``olUP{cLcz2=8$3SfxiG* zwz}b6SOx}TFyaE7LHHd!w32IV&mU5+~-&UX~MFq`*G%PW-0q~zFk|kM8Nn&TY zPaJ!^{z*Xi%N9+5?SV?9j#-L83drX2gSQc1O*(1ICP#X+l;9hUrpZ?Lo7TrTw$JjV zoJ5-K$`DH-amvSOEK)}ID^D?*gPgLRCopQK=m7Kw5x@NJ;Mhuf=rqcceT{H+m)uVY zmViNuhYljc^$QhIvSFL;FVZ*tq?)#d=`+rfq&Bp-y;~Us+P0$a$3^37A=*Ea6q8>k zpg|Yjo;$Gy<(RZ7IFX$(zR731loz`&Q4Y+Ch z+KZEaTJ695{=_9Gj=wFKqa39^)1ziQGt=a%cS^Eza-=S})-&y4M!jpD6Ql!*bXP#s z@24<{Re1g0NQ=kb^^SuY7!kIO+H0-P$yVyz!Iq57zpaCrqSB^3k~~##oiFOJJU5 zIF=jU%RM|JF9xVZJot@F_>0{)V8wztI(MlIebtUSy5>3 z{qb}+W)D?GZOcj%al7FceP|KtgzF@7c6anuOk!=t?p{*0d^bC`(;3fw#uUtYN;G{Z zSAc+k>cp>!fm68z3AjVG*(4`{fM-<)T< ze4~hGEYP_u2u6!m1ZswYY2qM1= zvQ*B(hewhenn68N<@VR}MBx8gyd)xSrzWa%3zoR`xOQ=JYJEpeK7}DgKbMS&>~AnE zp2&_VcLz9LVp%3}4sSZNP`1j*{yu5~BX{O+TSDm)!swnT3`T)mpeS}mAitlJ$%xCX z){zQ8yfZBtXRaoYtpBZ0nlY=m0`IP<_ueKeyx#mL9!cHXy9K9l%@V)Fb}3(?MtrT7 zJ2lovB>&f13JM@iM{RI-5L!+W4t=a7)?$r9@^tKo;VyO>1$5;6Oj0c<cIB~TsJ+a!t!&i^jdJjkw5I}_%ia#I zr}X3eu#9KE#@(F>b;MIZklLSZuz30=7GNWRxYW_RlycwOQ;J zjdlffK4;P!e>r3~Z+$#;Xn0kKUFvZ-Lus6U&`{Zl(CvQqFF7t*4!u6i$1?7%PVy*z z-JRgtNN@9ZyI=p=_j-B2+a@9wu=f7Cbf3nL?S}S!yk$9122Ow8oxD_=jO9Fpl?k|( zJTN_9|9n~2+<)Iym*FY{raipg$19554V%M9&~KKTzwmbSeLZFH0TVy+opZC@5{V8& zoV_eFci(omTvhGX-^(J{McfwbS%R|`Du4;IcX?ioxCmB8nOx@n7pAnoN!cDQnNV3R zriRA^AGDunQ8-tZg5Ohpw7AyC87Y2Vb{K7G-59a1;Hh42DpnU9FKnrd&$CnliWj;+ z$uwp5Nvaqm0jraB5gE6W5f2*(bH6JDy5>9pZfKpd`j=BfodhQG6b|EKvDyn)$fwwi zWZEgKEcctqx&DTJ4k|9xE^}RfYqe~%m6VxHi^`m^2$mwayxoWhRj*ch{aymZVZvh9 zAF+W%k}_$QLVeWcR}3cM<-kEfn@0TBMdK={7E5M+?E^x}NPv>`!})!pI`*$51+1K~ zsfi;KkT7l~5nVU9rujqa$uS+CKxREVAp7n-wOkmU^rKWePRnI3Ja2xC=+A==vS4M+a30ke(Rp^TXF; z3HvnX`}@R(jKj8>iBtIu;O+0U2`mu)FugH*3Y1ULveIgQsHsUt+ntCj>#DI2)k||7 z5A)wVsH*<`6l;UIowTFS5Q>el+ql)Qo!6~MXQbrJE6!1rg33ZS8%!0`u^*`kBZI2S zH4Sm6G>Hgq47@6N;LijH8R>iXLsbSrvCYmi&XHJw`K`&}{dcNVW^>Qv9k#u-`|DCIW913n zB4^U_UshaXL~$;1;LXojV{DsmLS>CLW06?3!5@jYmk;`KhaS3E| zXYZzq4Ym0VqZXQz^%b_?`#jU$YSZRWK909MJk{yW>+x>)e?qR+e+~JV6?TC{Pj8!9 z+8=jRVhZT_VkJqj4#b>T2x)>G8O&I1O}(l~NShLQ4BCC4__u6?ewKbr{?2epSfmoj zF6i*0i1c~tv*V-1TRGGCKAu&P@%`Uch7kT9oY3^J?#B=eiA-AgS_O@hzNZr4V^6)Q zD}vU0<#F_q>EFiZd;w@yZOcmHNon`zR3DtT;d-TNI@_|YMY^6#T z7ZGAepfJx#6!j%?=j}_s!-Juix*T)2(@If-bCt+OS8RitGFeO_0SNiF)RBAZ87W?N z_+Tmhk#wWJtM)%8L@Y7KF+qvR$s*70gPH``@_^x0JGFSb9N)3F$T8K;@?_WTV2S%u zhsgn`WoGqKXYqcc_(4S6B5UK{jnIa`***heniG}GpZRCuL{B=HsZxZM@zo*u20{5* zhBTW+TDU0bTq$q9G^eo2G*tO^80uZY5n2V0=>~~5BQCLnOUG)h4lT| zjMWbD_eP=fp~6aAl7>Qe-p_LDl$x?+NB!mk=b^OFc6i%fT6?FrILaj0QCs+p%~${E zu81yAiP26m-`xvL)T+yg@xJD9)P=Qxa^Zhg2~J$MckS^lresMmB+WWCvx(en zEYvH|xcu@`%Z~p)2z#gCT-c~tFt%;mc6Myrw(acbjcwbuo$T1QZJXzt`DGSYgnpZ{0mM13t5mvo6oc=!lSIq~Uhv~vFEx(__= zm)F`ls#<%)m{)DkY-a|qQP=(KU@Y~rSMAZE69)y#L3Rrr^p@XE6&QO%qMDjw(uJwNE$_vs6~` zFHk;s2&yO-X~_cjn;(H0R{h}N;}yb)u~z>SdgqL?fUQ@y8rh~lKuMCKp4DzKS}{ri z92}h;orYUyWgp-X-5(ec;NQ*-1FyKTCz@|a3Fy|9RuyAXRuwvJK*S#U=0`p()Y?ll z*Oq_{MAM2pe+O6EV)iBajrQ@E@fxPhP`;Cd22LyS{%}T2iXQ=7rA?4}N}$#AZEDfn zvFc}02Xe?C<JU+BOtXbu6D6KgMh9i*2Q`nGT#uE;j}B4ozTY{~YRw+nDk#VRQ>tG`R@&u(<` zsfS@gEpBXft!2p`Y9myw|44=yF|tB41Pigr08-yZnVMT|qeq9~v?ppe&0z3{SqngG zRCE5}Auy<=44#$Ib!jIH*f5HRL~ajD!?V%B6v>XRxr(QYu`stBd{K`$t> zyZXrpacKSNSrONSSJcbRLbh1_OM^7cSBS=W(Xdfn(iMZ@bv#zFzz#E24<*k}SGT0a zvpsGs>t+9!DUuV`^~eR(9?|a3FD3oXmr5y1??!s=^yj^Wl@-L(O={q2C*)$s7LQAPeQj(W@K#tXFY}=GkiqNvsF!BoH%h$ zE5N@eDn@P9W2Sucx%AuFH>(LDvV=wN)LqsnF1-5Xky#Jbts8|X8Ptl#Qg0PeCl`1P zBhRO8W64x2H}W@?t=uMM(zA$P&Hf3aSSrH5wN>?4bNY|sZ4|T=(*_HG=WmTkZah%H z;eLrxP9TM1ox=O~QBGDZ2~2s5*>aoNq9jhBLk427?scC7{H?ZqnmDMWY7iyk?z zpww zSq}*aiOkx8U04Xhl&*f`nY4>7tIHBe#vbrh*R`uHqWlo0Dy!{TNrHE$&gZ}H^+g(N z12|xzgX37jey8~t%K*LI32NfdD0^cQYGTye|6qa&-lDdAE69|`=q*R;5+PuiDifN)XEqISKys#n0h zEb&qmF^bvmDqcq|A|%@T$6F;A9ZxJpqb&`#XoUK*eIz!1rbAHJ>$9?iiO3Wk@hZ@F8x!><20kFF%5-Fz;GyLQR zDq6{+H(NQfm`nT#cZ~1YmOdQ&_wXpB-_mkmClDH5Ml3G#-0vZxwNYQ)C-b#R^f9+7 z!LObm(~{HbOiQCDtwo8B`0)^MqJfGQT@4BPNb7J)$E?Z4jHpT{cv^L{TQ%3#D>d{z zZ|l=p$}Y;_V}jWmNIUrQ59X#AnkdRSeZ}pE*G_i|?5cD|G38U(**P_L|88$dr5flT zd@Itp_RK6zVGBg!*si&nMeGA#q^{$Gw>L%mxicB z6;0}UOJ4XHJW@Rg2L`?c`@c_S$Ak>6;j+Ez<`ue-mVnJR)yH9sk;m&b7#KAh|KAK9`3N)Q?BnD&wmN0YJtV24|%!` zHu_tSqVg7J>(tPHt_Hzg{@JFw5IB3+l~12tXV;l1I@ng@6Q}+9q64CAm<+E)6@*Y- zp%%C*6GE{m3!hxOw>#-9(VkhxmOpI&fx{&NE)F0xm9|)A&S~zP}=m zVkwaCBBm+4AKu;gpZj|1(T_kowpsOIj#$=CFQ2!ZQ zm)90y{g;mG5fXh-f7_$@sTU0FPC-G2mkm0g&&%&`s0{iq2%Wk<)YS?|7RDtO=t#fk zq0<-dQ~R$_P$xLTc=DgxWULM~Tx^P_?tnY*Ts1G=X(i>5GuAECwc zx!GEs0SEOo%Yar*V2QeuBusL|-cuiaMUil#ZWt8B;sIh?Y}ovyK9sYgxXKVr8XOlB z(D<7NudrPCGDpyzFyp92yUxmA(t#UrB~PizhN6!Oi}c;JbyH1YoSmJiDBz_Xe!Ds6 zN<6PSEc{1@oSfxo9V8lg*@0#0_qoGUrs>;F=X9WBP2lDYyX<`9h`DC-K~cU-ZHRN zJuYo{`|6!p*acS!mNoIP84#YY(H8&aqQczVCL=7d>%7NL=5k8Drb1-)EMQ-u<9H+f zY7M8|p^nCvjPX&|k;f5<-B zn~*EL+LfIs@!Jdx$b4OH(`}>uY0nfe!^nRjiDigP_%w5fh{;;%cz_#NYr+mSUHkct zr07)CmaReR;wmcKYzkYgDl)D8l!R6!t98ciH-2?Tdrlu4UZ+Daaa=*9S+9Yud_J8; zX~%Fkey-Fq+-V){`U-X?n?COk`zyWwv8dGfC`LS(mF{ zSIr@CSZ;OKdO49)cloeYCyX~1ty1!{GF`K^>L`u00b~pQf!*OPsEc{niO;$I)YbK( zACAGR0FGV5-af3E=T<}hiAeLZ#u7glB3S`=K`dcwD{5Fp=GdmPtadGOhUAH__EvP# zW@MlRYv08AgQ&i$?^u7*QMDtR6JC2%!&MDlkg)xC-2knX9A8pj@WpK(zg*XFYGhx58*p#cs7z>3kR}Cz*rpbZU<5zEipiJj>WwD_Ra&^a(volks!dT7*E{mM$;8?u1_K`%a&zWwO z&ds5K@jNl;p*K?mxNc7te?_lm8lf6jkw6qF#kGa2g|dHCirp*GuJ=aW-sMnff{Vo}l_f zDMrRqh^BRWB*;)Wg_oc;=}}{aUFw&$22PM<>x^iZg*rSz9+N6d{8|(C zo=o$m`BC!2fzbGpw_)^0FfcV@m4h6 zxyg=L4cxG0%AvY^dQn(j=dd9(pU!ZJpPIewkrS|bdmOx{TvPIAHS>AYAG+285#ZJ4)s$dZ#6$84-)@7MzI?MI%9 zV-AJZKa4bX+;v(OhRLb2?+=p9Q6um;;--eYG$UKN7y8}a11XMsp4#JpUcK(arz`tn z2)CVO-W-n^WH#Hk|>d6x}R zI4?8(AVdPUkZ#<_$=r%uQ4Y=e@f%+*-dThch)*Grr}iRkdM3p!XZ{ICOy|MnK+FbX zh<5Lf5N(ijxRyfIbvp}QN5+)uJS!&}Lz!J)$|8VszmBZ|3abeC1Wu4uae#AaN*+wO z{SF?WO(1eP-yg*O6$>#I{54eBTw{8^z)rB2TFtf~paq;7nv)vYV{pLDFJC~khHuPI z?klRmE42b}4gVp|TsEu?+=zk^f>F?NZFnG(#(fH2(AvpcGvFAA*OJK+o|J`fTRAFBE!0qtmkk~J>|2+R50Rol)h zSxTXYWRnP2NV;^@^D)`wo9uAMH~Yb^m#kc&dHT=-U83U7&fNf|&x?*`A3dZE7|l!h zP3I?spAt!47=RvJEZCD3qdAFwQvK3ag^N?&ac)M|4XxXXF~2o zIAbTviV8v_k1S_jRRUoJk>)dx@+M(Fsw(03WbMae1lKv7a2XU=CExXsCDnB82I70d z0yW!gQ=q8Sp6}$#O0Q6(4p|wf@6zou7xxAOMA`=Mne984>y}Bz>*?_Q-c`GtA#1$+8g&$~bwAt6?&{e?~4qz^scy@MyS}CfH9*6vzpxy7h(Cq;irI>IDx3t+g36Mw?w? z9<$jiIN<2?#j^&s05Luc$;_iWrz*#&)pdQv7l5PF<@a3axut=Kv-Glf3KP?xzcwC+ zL8qfki2!?c^vb5MFE#5AZ7Ai>-#(OfyjNqn)UWt;!F&WmEc0nehPc%5UfkD3STK3Y zYH*iR`0cr+WsYDy{5_<*G0tV^Hqlzjj6ZPp^cgm5(_SURF-;Rj0J*HF*P=Fa%NOgg z4#c+#)Im}s7Hs4^zEk!kNl!Yvp_&YkJPG}Bb^5r}e|qeAX2;LT>#Fm-oYJzY?WuxL zsWYz3QK%D)jBr1kv!t&GoTXUpV5>r|O@n8&;-0Wxb@Sye!Aq?8+*O}SZgcSChvc%w zw1DBD_bjBGX4?upmN0*bSS+AbjOiuO7oN~sF>%(VG9M%#EEe?4v~&;UAFZc1o}nY}1Ts(2<>T_?i+MVUos(M@QV=yTRca5)a~o3CO`2=wMOnevgevnO7m*C>mc1I2Dftw^E| z4}&lbn${F70FCN$x7QCd4#V{mnqzH0b(*k3zcm?=au!(~w}8HQgPqRJjT~|ilPiO% z)1}`Fi-CJ8jdaPVQX^jNO?* zB)wY}6s!YPL)0Pc)x;bWtt=@!CDmvut2{A}xS3d5zuobs#jNqx%~hllyD$QIidZfS z%bhclxom#t**GC^?>>?zU!$OMVlaqKJAfp!8}joDOIrcAWL}Gp_O&PPgg9C{GM69k zKp?=u#P1pOODRqL*-gc9QYS@5%Muaq`cDF<#R;yAsipkV2(;n`^QPax;O(vz{+CC1 z>H9+UuAlema1`Y0vp^4@j}WjPSkcWQum3kMm8gQBv^XJnF18A9gXEUYhoO!8NDV~) zQrx`PKQxY592X%02RP{^MxsLH8;kv3|3pOBj zJ1c~(aXi%SMm>2Gq=%u72Fa2_URa~01yNB)0|`*gaq>ScxP*8O(PE{ce@($P?M&Ij zA)DB`L^UPW(dr$amQ^J!t%2L_-I896jrYuDvaNkWJ#s;U>Nfl+#!@&MiqGCDD`Pdg zvp@v4Yg73Ycwntd58|A@y3qaUY~1syp3^SBCDaMd)24QI{p$@F*{k-mG1r35#Lj>Q z61sFMf;Xh3j!)r>35s$%gxbbxqmx`W;uiJ$6fmdDSu^BIuer`k6tT?kEhyN7rpArt z;(}fs*RO)o4%dg6CE9UZ|AKb;Qd1n7ef)Q4E7H7N9x|!a@*driw^Syj$}EHV$xZSvzOa>w$-+b0TP>4hO_5Lv|*FrQ5DX zLzUP45IbbCf%zwdEjSt(#gvRU>Fkco+A=C%E^kU^qh~FQe*ZgrY^#(By2JmOldPdW zwz{qjp6-}MyAq1mYx^h+oo3G6IqLpOmX=Vsm$a4$#3HHm(+#JIf2fr|1hSj2%W^C3<&`i;oU~=H3VA&D)VQf| zl9w+~+Wxpj=}_zp1Kk#yGM#l!4bAUdwJVS(l6y;P#A*l$2a75huYj6T+WZ5CBbvH{ zSl1jj=q~lM;JG^shZ*XYBDklZ?H`t?Ih&E5sQKE0BhRyoI1$8hcaB!by9C7#oml4d zkg`2Fo$Rul4HP~aaJ39`v268fiaf-m@HwrP&Kirh5~$V!e*mDlDszq{Nrt~ron`q= zosTASx8hu|A$4bR7Rv0+DRE-(Y4D1O>W*mv4F+jv=F0p(2{ z9RubhAfMQ>QtnN8HIm(yW(Y)DZu`9VPN=7DTguF{PP@!_U85q+E4!Xwa}~jIAhPlU zf}MJiBX^8)Ujj(s-Q>Xe%4g5JB~i*nPS7!1WWK0oz%xp&9C_xi3WonjqHD;zC~oaS zPuMO$7Ym~Gv>MM~wdJhxyI4=U_7d%>(0UuJgcVbsLP;H@w`b@G1(YMM}|zgmw)(%f5&MhNAsq8p zs^(==904=mn8QepMYd~|KfH7r>cS1h5-C9~Ou-f@oG6T-8%T$M+dfF7NFJY$-|x>) zm%3ht?`VFzc1S;2Z`#03u6Zq;82*cpxT2-HAyj+Xu*$pz!_&*m0$Ot&Zz_K1+<3b@ z%&E7rjBZ4yb93!c^wDLxY&GdX2OUDsbQA0IkP}X);(h5LCOXy--5SM+QQcR*E9UFf z${VIfjUNu)Q||uHo)S!YsEs?tn`8<*YfO1voFsd4@(g+MnNtpT6vUcr{OF5;4!}N_*z{59)N2)tjIUINVG0J6lI<5)qddCSICD4CkM4;;kU;` z@?hpRi^J4dG}OdH)F5{)W}!|mY8rqDE~vh{SkAlJXZW!{YO`>W+tU)om6Cb&PW;>Z zmqP70KGAEjaL68P6|<0rb^l&vFllqVC4VB1)&3J#S;zyg#dqc%oVwDVlIy{`j_yqn z%tc{Xt`}BC;uMRdavnXK3Xa%!3M~IzJEb%4n0|-Rqt0GJ&&${g9YSl5v{~fR=nLm_ z;h$%Umh}l_A9Q4yZuhl--jR()>Q0yKQqc@lnU{u7Ci41VNpas_8>^_p-P)fmt?on$W)zEB>{F1Jw)LSpnV*zz;2Sq$5|SjS3xV zm-qjsTDM!Q!7_gnp&-l~lh}Bl!x2w=E@XUL(b~ThZ%Hv|?sVTXiiyI}o^K27^XDYq zH;~kx|S}!DCj5Z=3Ke46o@(&Mxk8XS1%pO^cX>t`4s7 z&Z10b;FRnopnOoPB0CwhivW$^mQIds!5)yLFHjj|aW0iOb(q6?aAtWLP|&QYVWe{B zZZF=4+hFbsXDuD;E)4k^xgFR_;1Q~+6EhK$!7NRV)DTlutd3z);b`Cphr41}Q^|a! z>hl1H)5Y+!>*}R!(-G4OTeL!jfT(~t z!^4+n3zajL2q10bvy6xtlV1R!dfO!Luu;v#l72W9)Tja^Ne$|H^sS1VC~@dZ8d+Oc zMwSfw(RDZ3eJd|MV*oWNSF2ji|JKV_gX;~^*B7%axJ9^H!Vj9-pp8cXwPYp1kPsY^ z@0i4Zl)5%~rB6z&ysZ1MJK~5mcjD`pLle1u$1xgPNuvv|cxbY#{0o*I zKxoWIJ0U_8SnOy{?pBVP&3z}G^T$nD%1+Fp&)%}qi)b5Sr&9WFcbnP$-giwd>5}kf z*j~}8UUL-YKu9x`E9oK3C?MMqZI~?zI`B`mPsyV@Y6rjnMCUi0ZqQ|Jntj=LXZ~S_ zNQ~2vSe-WYvN#mToE^t~9PioGwYSK-rGh%oE$UkaK^5?KHbkQ({rDSv?@AQjwQYaZ zEo40!9rum#x(mYE{q_;IBz_vIhOVjo*_@ocgyXMMiEfV@AH+>GTbD3c#$WJbU>l0k ztg4uQKRmAXeg6ut5%-?ON6qN57_}HyCgc7)u=Tk+bIa**|M_|yxn=$7-qb0zp+H%i znL8&w$Pj!U=1FDWF)%1&My)r={tvd*eARIu*aBgbv+P^h08TR%`!L?R=UV$#>2r>8 zL0vO8t{FgcQ{hqh*>_67`@78#gv6ee%Z>re?-wfh)7+r zB;CDDP`Jgl^NBFUgenpYBi>D4@>`jNUrv$R+D?}!fZn2tD|dD*yMa6dKLT3nGzon_ zYTUImlTpK|Q7~2UlRTZV>^mM|7#UJ4t_>zkRU?8uEwgw^n9^^XA)tw0DicxFK-VWE z38DjOLAoWcbC!kZUlGKpG1fYN2oV7c5G#x`bbjzo2=WfQB#RUUo4h4o(b^{aASth% zbVCwIxN5oUnhLz;0UNh1FoQ*j1R*FGefat(S`cUqU0Kt)lE6=B;jJJJV+*FbWAovqj@C`vYG9_&)K0I^&xTE^^=og*bN|zi{&kS-IPS1!UAj1d4f!}Wm|Gyxx z3=~0eiv|Rgtp9%i0k;1S1a$S{HpNr_8W{cp=KKGoQb{kZ8sj+_Q{pO^ClVzYHYf-u z&?PRDXvv~ew|uPLcBHAwY`0n{_XvVRW!uZtxHsI4cAVz={65?iRP5rVxNS5$+#ald z-Nab4CSA7r`n+z|?M7U0$q4H0)+r7L!68bKew_iCP<}LFhyu(}G ze0zxcv3Jhi-we}VS6}g%$CQ`3MReK_KlZjX&#)@&u5Xcb64!WcM9Z+{shCt}V`(a_ zN#Wy47&A+-=X|77VhX>X|877fj}oM$c{VX|{wGm6B{img_EN4}C&Qs?1f#SUE1F;i za!P^fG}y9GsVh0JwHWT%rEA-|`8@F&pCuS}MSDD>J~>I=ppe6pU3NWw6jsZ@;=%Oo zi8>s02C4UNL*{F(&i#zGQLgV&hY>XA%9UqY9>*gPHXA-nazo$Zu0y}Aqp^^+WyD}i zyBK2Cy{_7NhO1R>wkF^`bHJM*x|S=rY@47Oo6(#=!ZzY>h$1PH-oDXr{>A(s9Wdnd zB4-{8)N2LlXNCvf9S&&EZe3Dy4D-^^a@+-+)u9Yx63(e9rBjlfgosXgoeZlmSW!Xr z3*h;deFw-gu)=9-#?VyfxU+aYDhIB4Tt3`xT#o9Rc&)m)da&bfL3iR?+=k?>ndTfP z{;*=D=oP4b9vlNQu-=fJGpa(09^8kpTP)G+C=t70uqb42Igic0Tq?a3DE% zB#Cqfdcy|O>tL$@f3RVKZea5n%-FAW4Jh@Deo7$D@Y+JGEpF2yVKb(`SS-C1c=_G} zW%>}4C6IXL>QX+*9C;PK;V^ptj-@|7&uzF~2_)7n>RpeQdf5UJ=*^b@6067v33l|b zW~4sn?uBk8v9|LQY!kG@FsAWrlDhBNZ~?4dYtCOQ=>riT`RA~UxPFsc;1Z&NvBu5g zy<9o|iHT#Qq*B+=HAfc<5~z@*wLd|WS>g9$NK}~BUW!Lz9F@RJL&Ho(0UKycgQCYA1?5ie3o-hwkBXe`$TS_Ppz|xIS7}W zk@`B<)2KN|uUa9bES@llw&!^V@H#t-UjwqPXBtH$+;*i=vFHx#7-cMiqqK_2CqvS*#@uAn0(JTW-++_S71FSdF#>5RdY=4@nIccj z3Yd8?oXELp80}9kC(&|JkUP?-!h1@Gx8mxOFUSVLCa^@1Z%2l)GYTgVqfP5N@Klz( zqp0C7m&1iznpQc57E+**2#SE%p=d-9DZmjwa5V5k*2D%+03Szy7~=`x(Pi-Lzi5N3 zqJ)`Vkb(m+mj1K88bKH2?mxO5kO>jQhPtx7T_v1|8VZf96ZMNGTQey9MkeH}O`W

4OjgY`~9OQA*Uv2?WA(2+kn{Ncy>6r5!VcL%9Kv$i1ToLbtMF{q(2IN&Ht3vTEj` z9E&E7Lb36x+$reNV%T!7<0S#Qo&azP0r-hW~$n%KmVf{OEC4nP;yAyr`a5YArp zHD$ab!~;I=4&009sa(McW_GFozK}T`#Oz+BPA)X!V6{x9r-7?r|-`mXx?~& zhw1-$9u3k95DbyO5vl^J=5hB&fILY}!TLxaNnr*675iuQJUoSaYMl*J?)6(M5U;*{wm0FtmyOdra=rFSp?i!91DWw z&W27S!UP|~a?#*KYGt}tcubQ~w>r7%sV*tFlIsKi=BAQgSLhkx4*WJCvx3Pz5TKlo zscvO-;j(x>r35GS=6Nefh1lXeHq7?S(8aq8C);>1~XOZ@=Og_g5EgChdea@65VA@ci9hCtdT8)4m|g398=j zQfk_dn`t9f(#oLmo{$1z7w=ulClV{iVm~`_~0J1%en|KzcX33ce3|p z_+u&uK8#9zf#W@tS5&dOy;HCdqNm$_$#JI3qgLvOZn$49H&n;@I^)L3ZK1_fgHjjH zwctyg*vNQW59G(?RE4b`%?rv=FAKkM&hMEpLhOp&QZ6mt?25?BBAmYnptf{sAR=)q zCvR(r|9LA(C)kWbt&>8L7rD=aau4HuQ1{#58J46I3ln* zBOenS5|B+mq%+?G76BW^^dvwNy#8FMk8=_ml98Z+L ztrQ0Z&n3V^8?abQIOqM;^{OUGfXRS>p*Oy-E--u_Hztj8gW^SU!VAnL3?QkwA>1c) zhk|!yamR|fbq0QeL+5jKI z<>!Ai8HpO;cT|emiDj;ut_@rO9fPC*!!HF*^dY#4@0-9iR%A;|UZJll-)pxOzcd63 z7h{w@hEGS8zOlLsa@mnv5Ur%`tHdY}hBHa!Q(Sq9e5e)AD%cGZ%{-R0a3G}8*LV&@ zo9Nl{d@U8`%8Nqej(Q4`fr7a$nQJV_f-V*b2vGIL`4$pLy>eTkS88zy_JvMVb^Te> zt_V1_x98KbONAxKz8kB!j1Pavb2}vF3_nz(v+TSsT&X7C!c;mfoO(IZ6HY{yXkM;J zl4%k!dFD}CEWQ&8(x7_;e#;qIt(4HH@2a`temN9stB0FS)PBvANbj9Mbi0&|6GL$ouiK~Q|^0`fBr0szpC-t=o zIwv6y;0U;Az@#H0|97d0T0x*ivb}dQkATN+GFND2AT_|Cx^mcnVUIKq2Re-_mWNM) zcf2T|=j!^IhoopZ=lCnI>vuStb0ysRlfOe6cr&KnWD8AmN?tJ_R452ztcB=Dq{hl3 znYOqD)9FWPAGXdc!SqLB!BC0_1v>bVl8K>LIN?2yb8E8FJhO>Az&HR3KAN2xhcUB; zGUSLVdMF)rgs0K8Wviy`Ea^Bm=K^SGo~#ED49ShG!j&{b=xje{BAOKqjHXTJnyQ@r zsilG{P}F6FXK3+~k;HS6i^ zhlNrekOc@^$tJQB(>V;7mk|Wd)?dL2?gt2)lfUCmSDhok(}r|Fc=A0pff1f5z2SW2 zjk5DMy;cpzos~p=y^ox5Zt^8rH*M2X-FXM}z0JlK=x&yw3O8bj7rv899P+K11W=%{ zhOK6L<5&|RNB%Qq#=#TB6>U#o32~jxi>fetQ^?z?iDR!Vp{SSr^bw-Oi)mQevIo_9pGp} zNH4zVVm5+2e0dRkTFG$JbJTnZnFG#7c-PBnhj&+94C)4M)qZ-+1zp1=L|IG>LV19V ztbf45foy3H-xDm4psLY^@@z%OT;ir@1==-$0NuRcN62&;Ir78yG&-&Ng%)g*+u95r za(>KIl(FJBvH@-`S&G0h;y%ou9I-l$+#9wQazN{IjzE>!HDHY1kA?P5MwWk0%c0Tu zT`+(T+~8dD+{_7xK;A71F*Oz_`gJcS4IkZKrxf*4&1HmoE(_Eqq3&p@@u`LxV*%M~ z)&k8DZm)Kjv_OU_G!ktkbYQ`?#$nA1wLVpf$pnk?cAkpgqmYxo9`2P`CN{`?uo2SmM=Uc4p|{dbTw&0PMok(Hrw*o@*W8F3*=q9A;R5803q?Nrh(*hLj3>IyR4? zhOGPRdK<=;KpL2G6?fq=aKlL5ozQ@8nzSjj*6 zZQWYec!fSWBm8ix;xww$#Ne$`J$){Oxp+Y&sAni7s(6LPH&;w7DW#~6wFEl3W%!B> zhKQxbX7@CM*l#CNI>dN?Vc)L`t*X1&4vs++5SytEm~UmYHdL!d@UGnE&&W`GzZE}y zG9c{zJa$+smLw-Y=QQt^L>jrS_{YWIrDLZq#W$O1oa5z?AvQ7dPCyLAQ?h1@`3-Wp!8@$pe7;4eTr z#Gx~jgpPRe7G50`i+6!T9FV$P?!=U=3_=2)iMsVHFF_D4)92(uU~Q*A9zqkjg0R&c z#T7P*0Cg%=5iA>&2j>zfBdEu94pD@8xsC_%YRPrtn*)`(rYH$k9|9x_`XN&9n14G7 z0+)NEJ&nn>o$_2aKVvVf40rCL%0!NeX%^<}p?N&|#?0AEQyK4#FyV+wJuSN@nt=Qc zti(%14O0$FO~IQi#T}zH=L_AguPw+1lRt{hZ;HoDq&fffD(64Bm@o41!Kjfg_z;Gl z(Za_f5SjxZzt#$pSp?i?PbNkX>dYPNq<6$7bsf}9{bZgY9p-0Rup8!vXL73 zm+Hr-Qk{4|L9N+D!ibm(J;fGt@up+*&Q0(7U~)59Sjft(p%|iNv6>%|Z}4>(!3XdA zt*@`=_vF*yCo3)a+W+I;fzbc!r7cgu_xrMq@P}dc{sX<|B_1bNLEJWbqF$#^Kmu|p z0n(b*m{TZ@oF`4oQoH`2Hl4Ex$X_y{t_QcYMxdZwG%^sxgQ2Y9Sj^IQx;2nd$ZrpIO<1)+r z`jXe{x4Tq#6Vjkuwdyf2(dR?1S|C&LQg`e3{?41a)6Mt7a?DFvjT}8!x9lpZ$>DzL%+I z_M6_$j+3gk<4fMhR=8D!OwSx zk*t%}om@@eb>KFl)Z8{cI?Ow6g;u)ZOB)*~gwArEORB zvszU)SIn)4A!99n<_014k-YuRuHCa83iT!usTj17!h=ebup3!uy>6nICOD04c zOU=Eoy2K2VxveGJ0#ix^yL|k(_cIGd->yUzJEnGO=Ax|Oz*p%sx%J*;*1v5@&|B7Y zIJmYq@7(su?%N61z1u(Us=3CmLcOH1a)PK)FTucQBioVbBqW z*nM07$KK7GR@3OIq1a5A%ZOeX;Xe!!IM34LCWb#0qr5evOvoCk|8bgUjj`Awq+vW` z>M}fwZABN0Q}KO35N;5m*D;mZgszCEt@pPjr~9`+HAzDzw?R?rpsjvadhA@M$$i3Y zTY*QNnIU{{h-&_4m@RGVk288BwuaD#v%zKdsz~hcwdJx>zk$e28EjcaXH^8dbc9%Q zB8pMCkETnWVQ-)++a3~74#4*CT43w^6N8xWN9q~Fhc%ge1Vaod!SXO{S0d5SJOLG=ZQYA$;J z7hmTTU02wy?bx<$uh_O%(8gG?ZQHhOG`4LuNnv+KKVL^x0w_=EwD}bfP$GeJPY6Htb{DfL}gEm0Dwi}L}c!CURenr zK?a%CW^0@tYJ~@FjA3XJ1Wo3dKBH~94RH~g9M}(DyY+xNu}4w{u9{el2Uqf=!fxso znoU|Pk?ckPRW|>Cs^0x=pjk*=ElBYXNo|hVZmQ%9gz!W5rye+q+a>KdtJ06!p;2@) zyW0ho6om;0CCT*wYMX>gnPWjx?CU^yVOU4pjhqdyCjK|v z7GX#`F1wHs7vt_8cE&*bl5gkBKP1rTgcsb3IC^G28++9SR@aI(U1d8l7AwsvxsQ4rQ{W zesd3x_3x|l<}$yAIkbOYM4%|?xlbz72nl)yjLxK!70X#vcI%e4Ib)rG4j6+WJ)xQ( z)R8S*3|$nOMr{6+Z)x+<>q(m*j5mFx+F$8PpT-uO2Hr$48LW3;FuNBLX8+h9O7N&? zG-&s;NXz04x$Xwy%$L4VnscfP)bMJm0lydmf}ZjrfyhY`x84T5AHVz?A2@^?nRM_# zU_vI}N1f93g6TV+e;Xxv^G%4OEv0&Sz~LKMd24^&ZGU=W>UK-N@!hv?Hj-_*laVU; zX>8_Av>Ufjr#)b*{`w7zTsfUUDbl&%gw1vr4GYxa4-=jiSr!5P!#tQD^C0DX1Adc+hh6h8lifwO3Y5 z@IbvT((wbTSVTt;O;Rst4}CnN)oG+Q#Q{cE=yomvtkVU0z+8>r(Vr*|GsMh@0>)75 zesCQw*$A^Xg%Ib9YwSr1$VvtCM=4E=^0%-&RT+Wa@qd*q+rlc$7**2~me174os`?WY9Y?=*98SU#qm(MA95Jw$w z4cfR7#L9l{1e2F1^n0x@2im!tUvSWYTi-VS{&}ANc`<`Lg?Qzo-c8>dGbh4pXXD^ZWNR>`CVRnW2Mn-+M6|V^Kn4uTK z;R&mv0y&NA3!;U#5L#y8XzbI{hzP6hd&b)>B&uZsc25MQh>zyDlwStBnzHgqeu zyo9^p08c)*&@TGOCug;hjXl1@;>j!rZS5HCZF}SmA_+UPm!YelBSouYs&#mZ>y+5u zA1L{X(Uw`#P1m=iGJg7xB7*qyRjFZ1Xdmfov1|Jrw_J6VzfRQp3P`F;I>n!EMh)=h zN1?EbkLGMWfE%&lKEzHR@a4Z`I}RPOj0UK8aQQKJZ=7H%pJLGj?#1Z4tCXiYD@%6s z2HCW7HML>26RGL6SUp=;{W>>ndOg0j#!6~Wg8rn2g^8c_&|&moP$}J?z@hHgYMtk5 zUG$jtT>W|OOfsbnVolD0P!PrS$L(pKB(#n6eEDYXAA}*eKX?Ki^JVZ z6%*5@oe8cQE}Qe6XhEg}48*D^bSr5TlY6{-PAM{oQums#5jBV<`Wz9?*g2doMmA1Z zX@VVmjaH=YEZ?yWYl?DmqCq;bgdQbdjW(8fi;*PUp9-k>c^A#>v-B=?oiNiW8cDj{ z*SUz>9spVSwfhb1hab=5FC`g+oKa1!dtXVhcQn;bshe7TF7FDlsSL^3!ka<9&mNcY z+$WgvgXcOM#C3>Yc6OuWvjuJSeC9PCo4WB%F-Bc=s?GLg8(;dBn7cGJcA8iP4VKOO z?pRr@Yj@Y)2I?Pw?BjgvEsUJ!xb93>@*&cK zMA6m_*+nNv>9DS;uJKuy`*qNWh^8)I81i8hDKuI06Q0ilj|-^4^dPY;1JPeNX;_7U zEZ=jsqBDBINNF(KlE-)~e^_~N@(n$`lH?wtc)0(;ekyJtGxZO&Ra|8ZcBZ=Lm9<Lsf>J{pe{K8kfB%hUDFh`gAskNLu%6k|xCd z{BtzUoE;5EPZ+N|px^7yggf6I$q8IEo-%Zy>jvS@H%8}30}DuU+86lT(?tXS&`>rY6~~{G`)-K zeH#3}Z!YLfdV`*gM?XAz(TV(iCmw*gyUg6(M1)2GW{%Fmr=fy zgl6)H0J0zFfOoIlr7-a$rn~%~H z-LKh)R~(k@nts63ipYOOvpv&z1SJ1G3H^s>|DQB0&;Jf~dXj}yhS|`UEgw0(x)+HXZSydznjkaGo%ytSSKSot3oxhC3E)eA) z?^Fv5iH}ij8M06#hAF0!IL>_*kX!RTD5-xZe7J}qs5dagVbLP~>B};>T7cXXn!Hpb z36{E!L|gW4w=%gZop1=o2U2%gi%>%&Mk zO`c&%mIF*yS9RVxybxxYYPQF(x*uM`AmJr)esVG6FlOQ3jbS=`{5)axd)d}jnOoa` zQqLFmeOE>;tD9Nq@qf?g|I8E&c%PfKuGFxA{d_;G-maJrcu)AdU*Nx(mwlI^XCwVW z>_5F{Akz9E_;teMVpijGq$Y31mkJ3YzpY z>limaZ*jdxM(7+Sv3o8@cx7g^09?AUsv2i(ganDh>eKA&a;~&$Ql52JT1=HH=0duv zO~-pKKb6geDi=%rMteGZX`j9_QtB0r`8f;~YHndskOCaCa#jpL=zDkPt@Ro+*d(YJ z4!n744s#uk#g3OKv$5TB|5_#TzOA9La}d1q(EosrceTaBycYCu6I8J4B$(d_4IzN7 z`+aR30b4~F-#m?iTnvF=m^nD`GiLAD>^A-@N3lh^ASm^%{*RQ-)PA&168pQ=%{Ds4Vpg1G4s zAE#Ym@5@z&K|<3pYRQ)^lN++uba@wUvyB`+3TY9N(bc5v>9!^%ew$~MjDFcGM{ily zV^eAGmroX%0yB|nh?u=!Hvyn)FH{T#BjhmpZyXP{K7TDryosA@4%McOa}^UpB=N6t zJ}J^5)zN%WS)?z_10?7tXRI~n;G5#_OFJ!QzUbZ{99y;EQ|O1S+c;kQNz0rMhGr;( zc_Qracrt4^Ww(Degj%}19qOM8d%BIoeX?lMvpSB*EO{qW2oI&{cxDgx2?)Gz! z)%A!C#iYp9?tO9N-et4*oct}L|K8yG4tTC~Hy;>o+4?BfGz65zNS{9bMoWdR#6O5D zEWO_I-32Yh@N`9SDv!p};Jh}RC+}I$%Y>G~LDgNo%U?cYhfJ_^#9Yt8Z^?RP)^6zn zKY{B-&MP$)O@75~j#FYpEcJ$3gNoJd_j%L(_*=o>KTi$`oquZI@6wute?)%m!sqz_ z(4)SwT_xbs&7yle(G`;!U-@$h5hnq>iZjX7S@m(fl3>x%!@pIqTp2aO&P1l`S;K^u z?Mo!{)4R>k&1TcN(XS+K9bg=SqQ)k7PbE8{V1dCyQqJ7fr><&D6Dy9Z<_K20>sG%u z6rNw3rb+YfGg>aUPt2|Z+}yL|Kcg8l8y7b>{uZ?4`~^>#5LrT1jc~c5!;R+Gl+1M-4>2VQXr1oCvRM)b&73@3Y(6~h zeg$9o`S#tmo&WW?XV#={bMy{|$~r6J=+daRQL(exXd;bn@4DGl-q!t|U1U<7IG;>l zNGT&|ss-O8kNHy_C+Y1);R%-)XU z#>+*n__F`3aRG0dql{K4L$@{$is-Ld3f8rpbD3<0oNOjYN1wKs9=5{VC#Cuma%lYm zxTpiIDZ1n9OPi?@9rrQ}s#|7gOKP;(xTL5wVk8IH)7IMS*;UT6nLUBQ}(k7Q2+K;t%jK}CUT z0I@(<_e?X}zm1oZ<@}>oTwZIOBtz|(ZK4Vl`gQ^%ql_2nh?^`_%I4o6uW*7A$Xx zx4>is#@Z_Z(-|ybj%M@5XE07=&qq>paj9U87x4rP1uPjTc{3e8LsD%TSEJJG&0$9@ zdgTMPj3!oz)5;F;UnPh4Js;%AdpZlhDtXbdRVB=!u#Id|E2D}Y{HR1JVa_G)Ad(2L zMwpO$Wy8m*7h_u&RS$g6E_6Mw^lA}d#-DTYncH}LU7t5Z`rFb(bWg9I>*r5d;kWaC|$~YSSAwNur-BQSi#(2R|Qu?Yp*@(ef1HFn@{e0ET%1g{F4W)wW0h^wPwk%!fW2wL>gI0 zt5TmXlolvFm+Kk{HI zwq^BL={xk8=79`j&kJ1YJ8^%aD}Q`Mr{+{4N1+P~%PvVkmW4r-25M7iX(Im%l6PM@ zC%FsE)6UTZy{|I?#z9|H+V9T|@U7Kb_^Gm4-(pqo!zKxS5qcB}0AeBi4(@`=-Hvjszl?OiTVC$gIuMit)#ms69bdgN87?f*9lR zvd#OEbx5H!jK;xOC-dW?Ve`+uMHLqCd+*W3pbt7-)X;?ocFc}Hmp(54>uak7;69>_ zWoTJ+j%+EM42he~4)7BeME1|n}P1t()|r2R(R z@&P!9)Z@+;SGfLe(`09=HSykW^@lk6z(Guht&j*` zqv>2bOHF&WtseR1iB~(;d}zE_ps;q}H#^m7*Gw9iz_Ojoz~gUxuhzLt0@RV<513Ez zb_U>rc^?uHOo&!^^MK`jg=Z%gAA55y+c2TF6d$0DYvhlTk+|B`ICZc9u0)IH(C7|6 z+Q>M&b94qK_jqhUyxcEfnSkhj}^ERw^I-=^B4%pf|Pd!6*_h;z9#qm$9Hlpwzr* z3bdQBOt?gSfLEc1g8FY^Gb}&k<-EhfC~-g$^jyV_-j*=ld7 zYtwB;wP(=e87N3V`!63Ch2kMM80E)CZYr8Z5{8ko!cDRN{FZWB0vy zMC@9gA>DXOa;eZ+X#5bG^$m%}czx=(51wRIup;Wu;w1cPmWQFqGpR zJ<*BxdwxTd%KG6r4)y^72=ibq2-~;?7fiMCfTM<)brJ_QIe0vNW>Bs+8K$SD{N=kFcPJ)g5i1BXxv10i9a0r9v_zl z(-P=@Vsf#ohEzL7(w{5)dt7lgjLj%C_|oQ3BVjuqUWj=M(qp$D2ig)gC89M;zJTqM zkk$xJ@uewp^NMbqWg8@6HN|B-C+l0~B$0&4mBE{H*`$O|w>^S+=%b?8*yn^K?aiFH z--^h-8>GQNPhayB%En*b3HbnAp>y$ zukBvhl`&-G!In?LRq;V=FO+}r5L(}bEl1~52U`Hl1A&tfu@oQ5AMT}BM*EU5yxv8L zAkk&gF{j&v6`4svO!+g_I2tSnX**-~QKZ_DEl*!%sd`k~MJn7zMz5Qo^!z^OBnSGv zFp}4~vlT-g&!NNwu&3X}G^9*Q0M&4&@jclnVBZc^csL zy?ZP=$mP#mDiQ{IR^R6amiDW)xCm)d7OA9?O1Yf|z-R3MxcnGe3@1bl=SPvrK;KpZ z6WJ8S0eo@>gdgPTZJkNG+2g}YN1~a!R4M)run3vfIFf>;YF(ANMyCk?1&-@J33$gL zmdVMN!Z8A3MsPD1wH$Mt59SlRR?+HjNNE_ryAx8N&10e-P|$g>TcM^@NX%b`r*zZ9 zLL&Wv$LYVnvR)>N?kafl6Bu!>O1ns=`OQ5YSU}MSC&bJa-@|nAi%_G)`2CI1-ds1C zOh#;gs93R)6dkT+JvZLy0S{gnnudP@ZL<-S<0o%&^-avZZzLBI>$dB}!Xb~yXxP!0 zO;aHhXYSZ>bGOSmFu~H|*Eym115um!eZ`IESE4 z5|mO_AA%f`9ivd^8?j9=1t-CodGDypAM#9nR6pYV>s)z-0 zZE45IJPD&Gv2@Z_-YlNq0k%o*!%h--qeVDKyTicV#~3I zIkb61QoXX~nM0!s7H=V`JTjeRueE`=-8l5@qePm)!@5{4`Nf5Z zwc<$NO|CPP4;Z7=B!b#3TmuFS$@p|*vQr48p;z%68-ASK8C=9LS!{v<$4AE%U8kh- z+>}$s;BxoH)qhfG7yYy6&$dO#c~k zzf7-C4p~F;PM6D9J6o1MChY~*2f4vZ3*`!%>t-UuYqF*hqGy}$-l@`qM2db{k=-zJ zT=y0Mj<-Sol)!?QG!Eay{Wv&NMt_mZG&l?sUC!^gEiQP*se1GzY-`!@=z%Gv;uIxy zZYVrL%U4)CWr9Hyqi}s!G=R(xBKRy_MD%~!28ux|HNXhOM3sC`_^371aH~UNddZ%{ zv8?KvmzEtG8%1UvorzkVLp<=7wAo%N5j}0)b5<)adIc-ovGPOLJ5`d;k^FHwnmZ%g zSMfDjGT+qS#tCNi`otP8ZSOwgG~t6jVb0k3R2>du>~vRE)sYa3XC|=;v8vFutgl7M z`G77Bub{#yHn3-O;!TToElBh$U9`n>p(LnZQUhu6N?#p9WZ5%SgA36V+_W2uiBke% zk9{VaKqL76N;8j5HE#NQbh2bAv5(I!UZxHb&AYt4r>tmTMYCV62PhUvD0^zJM_f*i zS;7Xu;)i@~C@ieQzM0FbH>e3kIa)ii++%BmN8JJ5S;koP24X zeM1JFxjwsIytKXts5H(=6Cv7ZD3`|v{vuHO4)?&?u}X|1(sLITv=#e3?#T>tWM^8J z{EE_Y&`a#_x^4(5ctp`>p&t9EQx9${9^c>(99=C*E*+%5nNQgH3+QoV&Uv@gaw50= zYE!6_a@fBx4z!&QEzT6#>^tP@N#nBZ&8040_PrjvH`w@idObuy;TOd_qG{PIXpA8K zy=PD^+Vvy<3OBNZLk%@&fVZx==U*foYOLzN?9%?1qYdQ6&6YN8l2bP%?q1Ig)Atgq z^p!6=$kPc^(z>+50lP@4g+I58bm16ybq6yLq(3H0YSteUpC^ClBAB|Tet9Tfm0)O;fVbDyMgeTwf_|Cvh}9$7Gq z%E&dNsqWHU$}~5?0{ezPiN!p*-<#&H6zDnwzd<8_GizDY-`pr;v;u{a_udHZkc8!@ zB1ogiMsN;yNr=wf&g^J=L~ra&Ed6tEaT{|j$B=VWQuUq&@5-SH@Q30zN4A@v+^-L3 z+IkrtDLfAE=*lKar1`s`Pnvi|5lIanQiF2}UdQqzZKhs;~k zz7c5|U2-b9>xJtLDb1k!L4w)7r-`aEWOpqIgRRNK);J$dQb%{BXa!B|YWoVb#Q@m9 zWe$xAi+}J(g9{rfL6SacDcAurh=kmY61oUNUR>Sp6~Kv27<~MFd4>A~i8$B++_bKs z#h#GRsvkEa4V2X}tEvS+NTYD%VyamB$m?qkSK6YqaP182Cz9;Ftz%s^mRnCb7XF|a zN5ZxvWf=cOY$FqEcm=@{6?J(DkHd(L6vREbuqh2YP!Y64eH?O=HC0lEvNgvz|~CK<5J@rY`0^A_!l2Hflz*8uMlM1d7HW!Y#Dwj z-r|2Swsmgg$#Jy=-b6=H&7=ub)3+ARGY{-MdAd}>g+sz z)b5@U!ZXj6suA4r*aVwAQ0$MTPh4!am`_RM*)x>wkhguk*PqH9x2{d4crpElHeQO|w* ztwb{8J#}hH$v2i&)}>$@UXNqDO8@C`6L27|IJAsDMCYMjcM5R?>{MAN3P>k9gK{yO z9+&AO#nv``w~^ee%#oO3xQeD?*!Z2N7L{F5GVteMo}+94Ixc6!y?C4wDx2`^!U9R# zG2|Qw77jK8vOAmyc&7@X1w}>foCFZvoe|65P*dPCzpIHzho5v>7Mt=6JyHe|EUUX_ z5V-b7EHd{f{noyJeD%r28EqLv-nmDPv)j~qf4VbmYLcN>HZ8%Ie{R77KoX6R0XP=p zDTpwGz8_Ah2f>|n&OUWk?k>W5XnEqqYJWLzU7_C+7d-g+KYH=Wl%Y}Ixuf>tv#lq1 z;@DHsjKOf7Qb>2cv{MvWMn@V>ClaKh2G1xv> z?UU?eoS?*8lw=VLV$??{6*Y#Iuu&-Xi;piBU6mTf$I354=kKm;1wL)IFXMZFD7So{ zb_ZN)kL?j)(M<|lkDyk}mZv55SI@hDYL1t{K{TRfno9aQ zC2l$LUs@BIin!UQM07uW{{5Q;y-(NhlQaV14JLfKQoIjTjQmrRUF5mu5TvtJzto3O z{9cNO`)Pct8pLy+LQTe!K&KeK#QTVLxZ|i+&&9VGa|WmGjzq5O-w|E9?Zy)1LXwxx{SFOA))~(qN@xF|lW3fo2it*CRV)kCx+6Za#O2OQO@(bJkWjUK>oar) zcU(+!aAO8}F=Kyg;yM^G^WW8++1Tnoa=vBaq>o?%sML#bwYV))*MVWZ*fgu~Yfp8t9y2dCPqWeT1*$OgBX zq$-?%PyT-FCbyIT(-0bV6Y`PPLlUXpVqa~{aqjw8VhCBEgDdsxDi5FGQ(teKi4Dfo#Pnp#KPeB|yq*rB# z9M^0qU>FxYm#dJfPm&9Rbi|Vc#L3oL)K=IfO^EImZ6u^sd2vS=Js*!|IRB(L`W9`j z9SpY+*Fv&Seoa@d3j$xVPCMzrnRZCa|ee2U? zx5i0IJXO_#qE;<~*_P5fR!-d?Xu!iW=L8Bn6@$TALk)O$T~GZ8At|FnK^v$y1T`I& zY$ei2KHq?sDDk6aF0aPTZGsF-Gc|XEW8H}bwFg6!xOG^?#~Q3UBL!A)bPtG{2aoa% z>t>~ptE zp-ce4s&Xj%PHPTPTjFsyt-Ts$c(Rs-51v1B$Y214Ykn`Dw6l8Y2U{FFjS*jD z5S5EQ4cIdk`Y1s_C*r(dys!3#5rRei%i_l=Hasq`=9$Y5>J40AquRqczdqh_P?8*}z|4O%94|gh3?Eb|2DU z_(_K}0j51{N^x`=zdGkn%qyB(YUO#$*4ctn&8cS#fFLnEfv{Dpl!>^4ECI|RcsnQt zQyw2W-{3qiQgYa14GRv;9HOFTLPrh9heQ6%zr>Z?nDZOodNfrMK#&-I5;e*{`@Q(9 zs5y<=&mm8xu8e?tQnJE5hBT#R4r>T4x|yrYUC&g})mBr+K_OD2#FKmyc7|?5zuc-jTle(#~F|gDk_$`)wr{;xCmBvB=Fw`#vKL& z7Kv%ed=9J01@R}eJek6%68NpMp3LWaRo=YpZ+7de66VL8^5!O?Kl6G65iN+4sNC))n;;4lOaWMv z$y^g=PMv5Qt(4ei)7D={$75nd7<>0i<1?-@FS0YMC+lA$*=zW-^(0h`t;nZ@htJN^ zzD`q;Ao<*td(w^fx)>eTE2k&d!`!gNB91&#ojltj-mpK#szVx^-ZzXA zjwoJQJFVaXVQAr$Y@o^gS}$CMWJUXp-*9RjJiQ6Ab-=AvFkBkm37NQA=AEs)Xa2Hx z9$Z&m@UkotQi70ydaP5|=A&fN35D;3j2fEB+}hlK65-UeN)}0+phpX>^{tI=RmrY4 zc^KTC?!f2|>@8X3J;2%nyQcIay})UiX2-a#t_0u@PKzQx+MKV>DVa4#a9pfAFB~=? zge{@io^pbR^LZoFKpR+*g!FJs~|%t?=9Lzu1#;rtd|mXo}@fW2~4775WzQu?^? z1zJkF;7KJtq;W{$1!oD+pzfBY2c?UP#Y-0=wvynKM^0uS>7T7QAe!r1J5t?<1gXgX zh)OUMXuFZ>EJgv~C7ZAxhK`dmaVhBTA2k-?0j4bRH4L*Kx;mkW(+%ggViu)aU{se; zREfsa8-|-gDiyZPZxfe6Mc~-dR}+}O+5v#li~@^qlF~(_nRyJ61Q`Pv z_6QVb{9d!e%$#UX$SVfC;w7aLXT(ugi$x0>fYz(QXf^{FWo?k9C!$Rh9@9_LOYGuUV8L93U3T_&#Cm7TBRCmPIS%|V*maEF|Tf%GRmcv4nF8C8C{Pka?7ZBbBYb5`)LbnOE`T$3$V zcQrCLVZ0zZbE_a$V_K)5Rji&ln{q8>XQ?6djv41IN|1Q>9m%M;k)_(moC`Fvm?Ob_ zTTEnInq!y#&OF0eGI{Ip8{OfM+i^Op^L9BUbpsPAMp(}pX_<12bbCYF2nGk76dqcv zINXYIF9$b(vM%D*@{5~tZ~@k2S?}o%-;91}DZg*%h{&XG4lqn@JeKp&hS3X0 zGhfMzg<6L{0UKYV>`A!IhvG4iXKT=K#vG;jdrv6xrTf%`+7EO5Jg}gqu8O?*e{Zv6 zbV+JnEI0yc|24J=nPF%bD`IkysHT>kTo4Z=h&{xs)pKO(bn+=bZk2H3KH+a1H|JyP zSOba>FvBN(QfdgJjG3`|hluj8VmmO&bytN>3l zu;`&?y{(iZ%Gv&e;TY7{J4pGe%|G!oaRzWWY16X>thJW;VNJ=sE9m;+%`r76nc|70 zMA4&(bnz;Si>wG)FpJg%BkARXmWG%2qCdbv_qu>)tPb_^Lc#?EjbK~RT@r#PFw?*PbtqaesaCo^@ zauJXY?)DjeiAgj1Y(H&_`#i(lt}Ka%j3KNE?>Ay8^k)85|M0517-#i>ad~^C?=_Hd z7Qxp`*c9c1`5_j=? zfsRLFuI5QDm_0yptJ;|5!4*S8@m9n?K6(Y8$_PmSL-4%|1hvcWe<{{vPD@I=EdbgI zoQ!H(8Uqq{{-47p;Q<{!4OhpdxpCk4>n<-b)YUg)ygOBAmI@b3i+zZOk7Bw?e5F$K z?D|JE&Ly=VhfehJ2GS30cQiKgI!9TPbiR}v+}U!9?xr?_h<>(yQJs7#=PKSZZJ)o~ zwk>2<)e?1&>Q?{q*IEkNB=o>y3|f+1w9ycVrz(Q0fzTj=iRB2U@^D$HXns3>mj^L> z^}Uxz#^E1V7ZpRxItx7*+!6fDfeE-Z-k=qf|8aBP<5c+}Rttw0nHmR1p&x}m9ivJ1 z4V>RP`re@Scu#2mR+ry3DqL;!4GIs~KOMZY;iS5N`bd(?-@g^}h*&>Jifz z%B%LWdiWmK#@T|H$EP){c^SC~!d;PUq=pG$bq1RU7_cgS%B=8%qUA6olBHeRyj~i& zLqH0yKuzu5av8L=;a(??dohdf6QXWsdg767o|LL=V-Ab$v;qcpS-unQkAW+9Z@&g> z3J}$=4E=59c{;$`%j>stH-Ge*K%Wd02byDm3^c2Bs@)zNG}P^L9FqEL(`;$0UKhSn z_{|3*@gQZCZuF+1?1C)_HkHX0BCN(^@R+URu=dk%hWJFvx&Ah9&PbQ^Fd9KbW=>@1u7cIuM#7SvBH@4(i5^IWEJKGVl1e9kaKth=# z|Ae{wrpU~I?6~ega?VW6Sna=z{Wc0z={HEPv95 zzi4=;J5)ON)EO)E>0_f1m*MrJB#_zs$$Y?Kc{TSQ!~O(~2%3TLcz?3sfhG*~ahZsd zZlYfQhvljmNPI@O{w(Y_Uw5(Ig|y3@*~^0nkM)(yA^x53dT06E&6w-!IhzjsUZ43` z94jJ}2RXW3_AQ<97A1=XV)8Iq?ELT*!nSmR=IIx%0nf1Px8x|A1y= zBCI($P&FGf^?iAfJ05@G{&Hi6-nId_FLwuY!fcvQmzeH?fc6B=KbvsGrn`iXgov4I zIvw%*f-N}|wjzc8ob(5*VneJ8^RWwk=XfS1r?ik0uTMOZ<`HguE2Jo4`UPJsX^=2( zVqlZ?5Dz59KlsfLr148!Ju5n94&#@qB+h8OOPBg*H*4s%9?n`gq~OSBFzWx8X3N9h_E**5Qr~krQvwp7I)!&6 zUmr$#6!}R0mWo!sB%iBrZO2?Q=erJ&NjnVW59Iw>G8wNF zkAH-iAwv;`0X^$d@=x9K2W%*;>G=SIm6^yQnW+E=r{#gI>0wp1Bp%k7@_R7O#xE{$ z;fiW?<03b(M3~mSpTyejRibn1^1_YNvUtj24%-^V5HA}gY`bTRQsLPc_`)}p#0xJ2 zdE6C_FA~e^c-_tEszP#beWje) zmcxCyaiifHjfhsE7z>prZgm>TysmY9)iRV%o+tvW>h#81SYzOz6}Xq+xdrr?RH7Nj zO@j4%$eX{VM9Iv_L#5W=w}E4S5P}5C*=#LU6G7GKeCRfvCDJyOeBCy1}6~3&TU_B(d4(` zR2<1Sc`)nykwuo&`-WC3g{&~w6k&n&3SMA`M0d=W&4-R9PGA=8$&vq4RgIpa`y@Qk zM_Zv<{2<27J6hxDr))c^2f1|7qt*&SQFCBeQi~8aeSF*cnzdJ}L9?8uMaXZzF~Uri zRWnvDqZZQd<)B|Ak0D*p8(l|9`W(=le(vmD)%I}ND$bl9u=)qIT=-LCJ9w!l|XvQ4Vmh_QG1aRPCfKujkchGeC3(Vt5_`TYjijuAa~MWIRQ3%|oxE;{P_W%W23g#L<;{SSr_4{gyqY)#8_ za8?zWc;R2&ag4nAzjaxiGqnApaw6xO*Ypl4BS4n}TBIexi53I^L zK<1c{mr4J;J9rl2>QK`AB*;e!}+~E zP_MrI;f=eS<-1v1&)eCM@O-0py73ldWWJ7`Jn}~cEd%=wh0&gaDoF<$D#oKx()JA1Zr7HkgX94N0;YTxZ04aab|frrcp>+vKUuhfW#$W zWRCcqL8pT;jrj#gQ(zwPw4vL9+GYd(HUX!P7)6jk7(`GVDAFjG+xaph8iriw*&2T8 z^HbfC{jV{t9cSFqxD>4g#?!e`FnfSLzR3CQNv;!!}KRl;=PfYRGuWPS@J6xi2a0ns+1DEUt;rUT{uI`N5Z0 zbS)0_zQ2y{{a2iz=}*WekTa~idQFvbm*O>Oek(!y)IaC<-|iLAQMO;;!f7S^K}oP^ zabar7t={eZs}KB!s`Y(sVqE^5_B)wTt%-|KCqN$`ceYw#({vq7|yoRqhf;PA>Olbb_qlWR79(!&?hFT=l~Et_}l zS5Wq>jA-BY;lxBQCN26XQhgl${QH>qRQvZ3&$>CM2i_^r!|ilUZuUh?uBp6qe*>8qI=){- zs9tR$1YMk~7M`STSAJbxUHBy1DVn1)5QaH;w2s6!eR{MRFlXxgS~iqCC8gf5#&!}CLIpPNoa;u$cG35Q?D`A9y#bX>{6k3w`A=S zq2c#+l;!Q}AE=R5&R=Hjor#}HJCw03aq;UP>ZzHJDZVq(I<0Xn}2y;`uOq1D0@Iq=oXaZ8vI1K02OEG(8u>zLjnxur&p4$mA<0(aP8r0F=U80VH*Lih$?ZMs zk!}pxItS_@6A^EUr89>GSWwn$UuVA<*oY)3@f?U8*;B4voILkFl{wYC+VW0|(^(eg z<*FQ=$u@YR+BK?$!cQu#dEeGF|C4PW7MSZvg{ZgPZmDNub&j!0ny!gvif#kFxUrsC zKIO>l_x&iASsxAB(b=uq&UMq=AE^cDa-+OVp;jK`g$+@cEMRi>aU~|(vXN`k5Eh~5G9wKa{ikY`x?D`1&!01agqiq>2=$pgV zz&%mZDZmy3M-?V`WJ2UVXaz&l3#=(LKNW8NR#?EsEInsPHqsz^h;kL5b!AK`?@<5~ z#Ln8-nHfx3LTfRky^-pt7*?i#@?44XadS^@i<=;Q&6R-cHISiHoh3pt&kkN{KNj6t zjl}?SDJm*1e@;Z*R7SZ{3p*J@LU3}%@O=F3Gslya*b)g#9NCR?ji_u5Kbf#gEVuo! z7pBk3XST!bG9QX_EFH-C^qV7;F>G$#e0N8wj$X*(jl@ao z*OuC$Hh!z%QU9Tosi=zk`A@iC)kaihKH_sOm()F25CxLUQqz};&{;Uwj>Q7Cr!A|* zd4^MvR|oo-mN;p80jT29%5t0;6qj&3Q9S|jI&Ms}R}VXZqfDHjl0;-s*nN{4YQ_AT z@W6RY%;^ZPU>j{V;_BV=JUoMKJ=RIk7sjLLt`6v{;v?zDbod^Yj%>V%=Ryl#$ccMJ z6@(rnn#q7`it41rQ)DEH7BBoO*vA!-2$fpwK1aoT%Z1bLzWnLB78DK1#FY6UdJrNT zKr`>6j3`W7fQRFg3=zWA2vp|x_3z2u7|*fo!EkMDE6!|!w`3AOrqF+7IIY)^Oh5eC zpaPZ58nDK+8HT^dry{P{Rsv_o>FjHCK-0%d`11X7Tif!xpk@vvKKN%Nh&Y~wMvw+x z(7v31q(H@{+M9F3<8BOGxU4zGC1w_g{48yib_IO8cn2KOk8W=05&120G+6n36hs&) zaE=3Z1|WLFa<$1d&(AJe6_ah3nYeKIDW0N_<`^cbjg2$EA)CXgme^sFdGT3$OgEHl zlBdbg&b7L-OY{bAx&gM?6XH=Y!SE?W86Yo>`zO|DM`$Y1&1jXpxXcgbP2#1Mkm}|0 z$MT)BA7!o#EvVJV8}<}7BrNL@!w(faXNk_MUaivi{u#sr@)2lX zt4%|UB-q$C;G)EbZj4Ou*jq=0G|mw}EsE?v zD;lVZ7?^wi^(LX<=J=;36VuTfpL6d}_etTycsb>d+IHzPjTl^!R_z`vZfg*lZ(SQm zKZGNh%Pe$s_Dq!-v8sfK1`w99>jd<7LhpBeU`qAr&QTIgnvvlMzX#uAH7iw+yPNHP zk~H3dNH2wYLXW14Rw7h}B@z3--5 z%2S$6TI7);uA?d7MfX4%epk+i!+7TEJS1D3E=2n;S`CuaI^xQoQf7P$9@f*_?RJe* zVZ2_#p$9ycBrj0nFdxX^22wEL0n$@d*{tJbBTSD@S?c(5t@THmGMSHg(5hFxa2A+|GZm)PMo9|j3N{h1UmN=F zo0f?wRlre$>=?mzmX4x8L=T4|Y1Pl1BG6XYbuU4|{Zq!&`h*Z4!Fc<6!aiHIJqu<- z#?pK2BycF9Mr(%bgUAu;$ua;*)%Ec)QwIMdq-MtKPRkAhdM~r=r*8BZxWjLCdNeyK zc_HO^icbbtm)pQWTONL`d3Gu0DpUc9IOnf8*GF9}Rh|w+#qe}JD|L;HATlp(q6^6h z{a|R`0LbWlTURUin7WRStlyFMv!!OpY@0)t>x(!A2WQ=yGs5j5thphxjA=!cZtrvf zkzPCOk0l&m{e0oe`8U&=JZoo-jbk&E(CQroxUiYM7CqkXTQff;d7t5pq2TWnIIB{U z@UzrQ*EuzAWkwL|Id`j!@xsxQhmj+Z-U2(9mE68A-xq2i!o9MW5?~d|t{@Dupf&mg zchnGrdeK$X*)lD{+6Ah6rD!*q-=^__8>CfZYHYwPl;P0tSRDb8LOzec&uSjy&VNq* z@TT#p27w@9?90ekJlbl7R6ke3E=8rDv#8Zf(7GKYj#MYE_qr0gY*nRc8Xuvj%-Sjo zK3!oC7bh_Gs_py$Os`oBoT7Cp78ZK>5tSw|!-=g37j8Yt&b1&f^w8{Zx462>fMtuM z4}#3t**7ctB?+xkfBPd@4&eYty%R^&l%1lddg$6A09AzNEQooYY>`GY=lN2rJ4(;$ zy&Taqrfte5=tZM(iil_C@%MZTcQ=K^XfhP?!iLg&26x6wtuo`cD{E(?FSuqJHLEkV zOgX&R)`J;*YJ{z*@0DZX=b+tN3IHZv1@E3SqHRW*%O;0fED15aXOlUC4}-%N?apu} ztEw9_LDEoN>$>_x$}%1KN@^ry7M&l=P$ErXC1e&H6V)d=K4Gt->4t%(&SH@LlHtu^ zyvOvK5OZh9(h;aHoG36ath40WzJd`2;`VG@7I8l25%^I>IF6#Z;R9KU(`d3P9W2j_-g%y}p!3@aQIfMX zKyTaHr~T>TB=JSY7_jk;)}Xmi>q`U(;rSr;*+FB(nV{Vk{F52YbJ@hAaqV4%Bvj-D z=h`Dh8t;mPM7Fm$G*c0|!rGDy>!CWWK;E+=ETMbk(^{?X3Fn8rl4@fXa4-12lv_Vd z*&y>SVsWNaO%iGzWjvQ=U`76#)_qJ2 zPjxUpWgPEKJyUiOoalI-bE#3<{WuvC@d;m15v3~E3gUYh=a!9IO%c|jrP8ZEGX&A) z$1OSHnxmCEfY=~>!OzSlnV3@t6t)+q@9#X?Bu4iD{sHtGZlwQfu629K*JSd53iNCf zxpVm|nKdyljXcrGqO2#Ah@@KL?Tw7s^si~-<{N@XwA98xa%E-F$;D!4IlR1QIZ6U0 zQJ+57x;=oP#(@!Zgp6isAe1rFS&sS%{-YBV=CGmki5vqOFw%&+?v zn{G_@KgML#h-|dAGWOCUD+ifK$`fx&2k)&&iLQ90MolO+rCG9+3omQE{wei?gFlT$ zjZu3DGcxdG$kwiVfZ=h|k#0u>1xf~iR7lIy{hDj9L$8R}hgT+|0-ep1kUmxmrH za}R(5v~;#mb8~ia=d^HkgZ!G+QWYQoneqV8pZve=o+TKmc2ePoA1Gg8W1h2*wv-p` z;aYpG<0ehnyps`}j|{_=e0%K=Ui^C1{4MbvC-#UC{zSD?qPL52V~H#uEfbJdzkKkG zEcU5rt8^6hg8Whg5~u+_u4L*0OwEQ@9qK==?;;hVO4H}V;1KnIS}(kokaTpxy4K9R z*)C^;nqrZ}fW!EL#6_hS!5+o%sQr*4eJ&&tOP(32D9~LQJ04C3oD2D;+^@er*=$UMrodf#!6T#v)TgyFL;IwS4WdPTePdUn(|`?JS&fp;}rtZ0`)19dd7BN=N7UsUdVxLK`-s4 zi8Hv|E(||Yo>v0PuxW0nHX2GS9%R1a7NVvAY9Cx*A5=n*sJ>%uMNv}5>jPA&Fwp=2 z9Oy5g`&Jfa4i+*tX0}eh)Xw440H{-vD14>$v)I#F`;CD35)K4ij#D^k;n!hgAY9pl zC8{~lk`vs;=EzzG^@0Pg~>(nQ_WAuj-27(ZTNlu}yo`Mjr8)1|k1U;Zuw*hKNb<8dFS06+;qs zYT6U6`)W^`!h@ZQj5S}DPfxOby?+|*2Q}g~R)1Nh``er7r_fqttif5HHmUfP{xs1K zH4skxL$0K1JYzfF0_rY;C!FvHGP78&N9nYK_cl=6p9*#S@*=0h4+1v;?vI7q$xN|+ zdnv52>mz16cg@bY{L{q-e|bY^KkS-%afzgp4`Nv%|MEJRz2-7VXCEZ6Laz^-?fB&- zO~)KWvVyM+zy3e;S{nISJ?(v$)A2_xcn|v zHR>xljzg3B%8Wu+_NTDIlZw1lvyNAgA{RZyFZ8KVtZ3DyD_WYN#cMpuFL7sZXULAw zgYlpFf80s^smteGaZH%|Kx8DG*LA0L41~MP<3EaKwpv>Mk z8_(XPM3Ox{!&q3qSItNNraO+(Lt4G2_MJsGac139$@rUq2sY`xxpQ^jvP{1#dAI$+ zOR|$?E)||5mis1+fmm@ts|1OkaV{rH^mK8lHx-0pKh{$33mw`BC%gsC;U2+nvX5eJ zYu?~NCMp$vFt1;bp2!{@ZCVCH>%f05G-JDKA#^~M01x`@zpmW=>uO^QXGceflZX55 zu8-Ep2fI!#45ZJOc?YH*CfWO3-H{Up`P1WKkFD%g_Y<1wqXn+t77XR|-ia6`ds+KdgF5@s-&QpNg| z{vjTHaxD6KYJiJ!nPb%$!3p}qI@Q1%hn-;f?&r2DAEd;>#L@?<8#YYlP2_~G`DHhn zH8zDDxi3F@`dS;~G9zg@pna16nzzT$&vIUbEP~~A-2WZAxAmV%&t-q|(*Qd5fL=rX zzx}}96a7q6-FbowC#Xc@CKN&eu+2!SBB8Yt4oi&%!DA9l7%z4yC|Q_TiWup11#c$u z;n|3~MDHHwTwfe5ZeBntS?UP8L8IK5DuJM<2RM6p+AS-UG)Vkt;F>8gD2Ln@jJ?+!`gy}@zXM~ zP!d2l$g-~W_IB9LFI$ofzzXLx7U~7#HkvkE0S0FI)x;qN#~6BjlaIp|a%gZuMbpZC zbWFG`9_~VVFpLI$S3z7}9y8{{xzdj~YKlE$5{S%YDJHOi^qsGj2{h@ZQ{NFhde5&; z%Y8K=kr{F9EATz{{nzl}C)5|{_AUh<(J_Jq1ZUu9kI}LSG^!ZF&@i|^J}B8abtyv6 z;M+|OzXnY!4=whQuW9)rnza`vfeL)uJ7_Prt@0+^s&8ms4ESvf-0hv zKlzW9L3FqgYByjc)q#``>wF(zoMa6EMsZQ;l1(?4<1IMnMv@*xS9f5Zok<<7=Gj^rrR!Y zBGhY&Xgh)Gk5hKTFe zFHMj_&Zs@9Y@!Vb5a6`B!} z#1Z0QW@+YOCO0|+f>S3#`pj!Lgw4KYL#5gE8KggX(RTcPq9dM*aWKfMfd8r4!#DO* zZKPYcZyNSHhMBhazkNFj;$&p$K#gHdu(n}(E<5n7vCn!`FtReC)CNJ?29+!w)aFI% z`i}BGfXu$LWiq^PZQ6UcV=I|-2q)#0{ZOY+Ax^6MD~F+dvQf3iDTeM{%JAOmh}mF1 zzj;>ol!t{nfE#^)luQ%wKB(ATOrN=sdK#`cMSsmNozh)>ZQRaf^8q>=Cgu}BpPJ+J z2HsQINgH-2w1!JE%P0AKRw>mHrkEt%2*z!XL}nd){AF0Hryaz7$#T4w2|7RR3T0Wv zST!C`supTU+EK8djvI?Ci76t7o>Wj2dGGy{6KIt<8+kO*=Ob?BAI_%`VVH!>g9WF- z@kw4I;4oC$x5e-WCH*ZRG@qBD760FZzkgNw zUwO{8YW`r77e|AS&x?)Y>*Tc!l#jv$td<+h$<}L?%%leTgseqt)*HpF z$(BVd$(w`_gAg!raZ8l1u&I@~ieHermBPcCSm~eyX^kL-aOoftd4}mFhVtH6&1oTt zRzZI72O$YYMs5Y>uo!d)T`3iFt6Vjr1s+cj+ZXA2xq;A_W!@&L_hoeaavy3N=xE=| z_iLHFZx(#S+1gB3OUDc56q3-DpqFUTqwMV+8ktb-XI6gBIXu|c%c;!HtkB3e!9U8{ zt0>USwb%dC^C1CFMKAhMU&=ZcB_E0VR5cc5o_?Yy3#+jx<#FP=^6_Zg$Oart=XMaJ1M`E0? zD^BcxqD9Y2A3u?FbX@NlgL^!#nc|TQ;?+#9!th9@3Sgy|QADRjhlj_bE!GF9DFWfx z0k@@SS=aISGqe=#pj)JP&~p8!Gmvq1@__bTCR)BO5O|7A+|Zvt#2zPFGZ5WxchG(IQ*qFYJm(;KMG!9VTr+-)Eb zkKdg*EQN`|D!U8?2p~^@rJ&#f@1p!RNPwkK$i;qRjSUW$RG05SCZS5bk0Lo3+0#L^<%MfrUT5iAAV((S^v1^{?U z!^WkQ9q}&8gS#|L?l~#N11un5tr#{gn7BxHQGOqs3mcaq342S_IUwN50s|&re5sJ{ zqWnJj6_#@1J~=?a2LzBJqry;{f1un&5xOfy+K>I7myiPilj5iV;(urz1}EBGl)vmg zVIxx-BXYh1UDRoCLxI6;Lv3R2Qr;x5v2p~KM>Xf^(4yQcpZ`xnN; z2I2_$>+{ZBv8XMVRD||x2*^MHv~B#GV}Ab|;O^n;0CB&oc9@P5VK(#_2KmoTT7ql4^U z&)gi)XIK^4St!-&f@Z@7v}L5dr9hvqWqyP1wllspn1TgP0iqZVpovO0h6TdO{{eWr z-U|zaz31#Uk~~I#0N&nu1`C8eU;7q_?)(Sf?P=SvK-jaQZ-MbHe*oT|91RPEHTS*+ zQsn#r_&4KkSR$3Mh`(EjJ9~cE z?S@<8M*W|N|6LjXxsZO#0|1O0@c{p^tPY!LufKN@oBlM5eQCR7JF0b9nLWedj ze+&Fyi*2ydu*(m(@~iKDhyC9cBVa+WllfcFQtMxd`1{lzRvLB&b}Mb&{#*Lr^D$UK l*y+Tr;KYZ21p9k(p{9rk-D3g(7@>bX&|zL$=dVWoe*imDXw3is literal 1334695 zcmeEPc_5T)+t;Q=(XNsxMJNhU$(FJ&B|^nSRLYWlota9dw2&dySXu^IA|v!$Yoiuqq7dO{5E-tR+ zTq}>>%=qN47uP(lX%qLVJ2|@9I=aD(y^q}~UI>!kb)D{-Ye3)bw6(u+G}v`P1{-PXHj zu9hVqn-H|YRz<$Qi|4t2>WXYX@8pLPQ@mgTQ}S=PICQ~8=Vh2JI$axIa3-d+Wzxw@ z3s!7!Z}Yb*I2N#NpV|Bli?ZYHTV7BeCPWNXP;KBe);8nk^b7~eP&7layL67Ps)V7VvVt+YbpH>jQZDZ-&cRj#&-Yb?8=Du4U8-E<*a%*Ay()jHXhmN%4 zcun5tpShpCjM>^^L(Q=eaX5P6z@ZBUZqcq&CUglpFWh&D_e&gg8E?~d`CHFYnHRBb z%D#81Y@a&YH!AJGwn-sNn=_vD7Oqu&oHwB_r@l1GYvEt2+=RK^zE3(zF4F>TOFm0i zE5E}mN2|O0PhK+31LNZ8E^LoiRhfN(cG2PCBNc(qfe4=G$%<%|NnBh^<|M8i-zkcR zChJ5ffb{DDdVmK|6fhTCdsk^G@GGPs{)e@~uvbqC(KpOnH}ecxt3RNyyQ)5T_Eud_ zHLdLB#)#wEb$kym-d-tCj}u!u+jxopBuyk1(O-nG-*WL&;d1JGxuo-R=PQb&d)_@0 z-skK-RYKI|iiUI2yZkvGRb5roYnnRVt39wm5{ZxQ+|+$e5Yeb?->qb-L*wSr{ni>p6dJ9No7*E(rdhD+Mi+8Vnp}Hv zq<6l;^t{BvFV9b&7rN5`*vua<$!gJ(*7K9Oxc=hd;^G5##>-yX)5+ziwUg6P(2`vX;*Vp=f`XKjesfqaHQtOC&7bvexjqV6J zG8wHOPq%kPq&}QDElwiMj{!L;VrFNe>D_4#` zW7R4ido8Q-ZTnHTdrwbltlYozT8Q4~&|@L{Cw%0Wyw3kHT`o(*BCt2>#ly2Po9vffC<%sDh=@7aZSUVCc5dV*#O z-bBr|mp*VTQgm0djk+x_-)?7G+70q?#Kma|??eX^h@m#1yH_Pm@Eq03DsbSDJn`bTUmb4s3L zrk){qL@;lr+yjExqN3^`rTTN;5H~QAf6xN?+0N+M6Pr zCu!$b$1F*$yLt4{&DRgJV-KD&Fm=sJzFSkcWCcMp_S{LKid{8d4uBDYW&$9v%oL06<_Qj@%>F9aWxn8T?@+Epz$%L#r6tm?l z?~^IpmSQ3ZI@^;@Ip(4Na#Vlx$++aj{3e&_cQ59b+0f3H*y5F9UvDHtp+X%HlE{e{ zdF&rgfW_+j?wq$&HNr}Jokxh$t9Ls^#$X-5rn4ar!WcO^3B&iwP>XM;w4NK>oyRRO3 zH9v1^36pzr>(mwLZ1{FxmzmuU0-is0w1%aL(ccJ6mC^7e64o2Moe>@^c`dId?1F#F zZDNZ~1MMB9S3KuRjZoJlrVj$Sh046fi>un(!d$#V(4}6hNAsDm=)9V)KsEDeSGdjI z(%&slnXmhiwBK!?gK^Lrn>#Pfj$PM%@+5Fu>n%OsPh!4HsI$@;Jr_6bRf?<$dLRv} zEpH?glzAc;-d!7o%1)`6O|_{{Y)`Y9x@LRW+6xn2e&V6rmwA|_QZ%h?>E#1ctgyKV z0t3)aKkBXaH^(ea0~)Pm1{c>7u4xkhy)|Iphik8IwtfN-3;_T3fBV0jD`f_!*3EuK z7R{YRw9u(x9;{J1tVc~~o%BkE$L8iL2h;kDj3;Z(nrrf6_(KdTiPZ!J!K?u~KLBwRH#L_C0~A%@tkw>Ct{cJDvRY`k%YzyHHm1`30YwQ{{Z0 zt=lA9W`A%sdS{}?H1xEv2TSH%awkt|Y1<)-DdFF6_*2adaSa<|;Yt1GH>o`uc{}9W z@2GG+(QOaz-0HEQ@{H7u!(@0?FW`gzD8#AL)(Os;G=Xb{*EFt0L&n$ju&u3|t2FD6 z^`I4wK<#uwubW*!5F;rHt?armjpA6$%l39+G@cj}hZFWqCe&gf)S-G{`xcaGj|+&-IlM$|b6b6rxM zd+QNtD^+ue<+zh?j@tEerQUzHjGn#cp(Do5dAfmXHaD-5ZKn&-?pje51p*8dZc$%Wv{lR)e|*hvsSEsb7zOC+xE<>TFqUsQ&v1jnjU;o zc{@EUr)+L^l-cv?9$f}+Tuyf3Z7Z=7E*%QW%VcvNAkG@*Euv|@Hg7>)v^cajrBRwF zgui%Er%7nP|GYPer;=qi+b)@HRS~Qa%^`pi06@Av*c_BKq`t z&-jGe1B(tlZSa0sspn*<>i_K6g|tshHG3t*v~I`8@8cHPe2~$s3Jxj{#yy^Rskf&r zceyIRTJRdNDS4mD7RYU+0j?I437j~S8BvG7w6xp%Vf)@WUK7?Idc?PKf|aK`shhT0 zcBV+F+WW^w9rcWi>-7=6)jn%hScskYl80Y$!N*8;-;$1I0)twOV;~rvWF(`j8QD)~ z(kVf(hAr4$Vg{4ZiKNFO`>LCRoDh9@a$g)D@MkfzpGqSzWqVtZ{WJyd&ek$yW)u_O z#psJysejixD+>0u@tDV1$1iP7BH;o#$P;gtJ8KEb1k~L;wpvgkp!TNoVZqG-4OYh% z35o{PSUH;srgJechv*%TqlNt5R?}b&eqQjm3Ozl2j|EG4%V#NLmA?o~=Bpd|DIR?N z_5OVQJ~-dE3SNv3Vu_*8rv6ydCrm~kwONHuPElbJrMoj86KN&Q;fMSf1~ALjSvy}o znRSwP>D+)<%UufvX9QH-bh#tAB;fT;*A_wUfO0FBtAYyys;qeSS3jXmReaPy-uy`I z3$us!P(Ta!lSw$WFOLOB{%rT-E|dP7(xhry{lG`S7dtr>;s5r8;!56l^^d`d^Lb;` zn|3J5@!nN$eyKQ<_jX?6I>j}-iFpejx1DIkX9O(k=|XfrcACBASil2yH{g>5VXwEm z=hQz1Z))T{txnvr=@suq_12f0D7^l8E$cSD;60!B>E4ukzHj>iUrc56OGnQy6oNAm z^uo4lgtx9=9@3xZrgy&gMmm3dnoZyCmOV`-Q!V(M`upI`HoTeY?{;i9=6$IC;pJvG zUTogmb({5gALPBix7mKeXPNRmcnkIzmaxIa|1I_{c-XVIjQ)&@KafwiYI>CQbNAt- z37xo%?!QRyiKNzy{@@l-HExAzGRL%*8U?&q?zwuYPC(I3kHbs%1eD(NT(ndp;JKBD z+0xwsYmZxS`^fPj;XTxA7SlYved_%T2->(NzxWUSaQz;{ZNjDgooeND(ZUZ>@8-MF zh1!eJrrO6)TV=F(#f4X4PQD7}uGqR+i*K>8h|S3t!Bg&UP2WK++2<)T^P~zRYOCFw z;tx{QuqHm3P>KQ}BVSfLYuDAYh8FE~QN4U8qdJ@5rADecT2tbe&%&H`3tlFps!=%k z+HxM7)Alz%&&!n34-$3R8+USXJ5jXHBv*w|DM^3((1m#wQAsOE3B&8ZxsYPpPOqMU zZb#2oSiCY|e(+o)wIf=S?3N2+0%iu!kx@HXIMICh-qo~&$%(ISm(*QJx_1rz*-}!7 zlpPWmj;^kru{sNO`dm-&LW0v@+xkVH>T^F|J_U2iICx2g>K?7B#O0H0PU!_NzOTBw zaAA@1<Cq2F&kRwYp*1~T zcmw7{S}<>gI(Ol;Yr?WNCz68KhQej5#XpxHbnG;L^FrSvCCreq$2-#-e)ssTR^+BC zg+!|rxeZUd(d*{mw4G6EE?N`BmoLDakqcf}q2^P_wRrhFn=@;I7u-L6->`9Wl+yJ= zhhseRGM~3S?AWT}b+^vxuj;_C1xodfe;xGWxt7zd&b74sv9$Uf-cWvLaYxur}@~)`*qfHNRyDc3pVUjmmh#FQalo_L3OBNPf zOUi#*i^^!%atBMt+QMSmDwFtwsDApqOIf9EY za|9P*<~ZUaTxb`XfP*BPG5Cr}-9e<>1MNara)nNp@6Q5u68QS-om9R)sgfic3+yCp z4dcMW6wMUrg^n5BiTCE%XLO^%uaBM!Z^9f84W417zC??MD6C|2{6g?_8TEyQGitWh zZ0Klv>;a0Tiofo=2UPqqV_m}4d^zVes1yzoRjwI1#|i;?%va|Yr)HH_hfr6V5rJ}}!` z-hI1TMZ_(0SI?35RQV_Rzh1~8*ZsM0Paz8!Gb?~Rm$90OV!kA`mbWIJ?j+GAdd{n~ z&6R(Dz~Ll%gxl5l*pJqh`{GQ>mGD$*Q$Q~cMsHEsh{V-k_w*My;)G78ES&kM`}P;f zx!n7HZ7LpYTK6`$^C6|xf=YPU!`G0z44b=W5bw({#7Q8~dNg)K~2YXj77b{#mS8X)H8!#!cacWXX@Vv&E z=Y;vSW@?Y1L!$Fem~>3qth9-!X8(`J5S~{699%}(XLe6w4!b9Dmfe%cXZIwm**yt1?gZ;3g4jI?O?EGY$p7at zG<_jHmgptPX0v+|f3bTKR&1U`G`n}gklm9IWA`NHv3nBJ*}V{_{vVIQW0RlqJskw? zg(JHs!S08$M?4ASDBd^XU310IX}x)faUd*yzF63Mj8TMfAWFyC zNZdf;sdmi9(fx3huw>KYtG$$kM@6+`dcxTK_^@9z5m?ga2w+KWgHWzsw28q^qECi~<}oPXWj1507R5X=bFaPlp3}bnhN_ z1!L5&^OGw9N`KaKrG0@;zHHo?VM0H2<)BCXbX$J5;}$Pd4ZErS3(>L)uedW-t!Z#zlX+tcPYoqCh5!LwQEL@DO1 z+w!NFQ=uU;Mg|gEtKwHwVa~h?*=%IEL`%eOMG59~T1dJeOBl;NixdgeT;&s-yDX5> z9=&@9?bRsv3Q*eQAp10eavI^VTAbL+Yx6HlVXlS-8yRU7X-|n?X@a@_DtM2P<|pk* zb}RKU*V2M_SEP%uJcvF6Z!*52S}a(nU2?3hIG}eX+r;cs$PCbJcQE{kx5AcUf*v)> z2v%FtNkThWE#Ln#~d$q_p-Xl>Z<=g!%DC7@f-!+eiOR%~_+@qMrK#@s=@KVJl1m zjm3@F`^J8o_)(Oi)KiBPc7OHPb;{ogefV53{C&D9yTAJDf(5{BxTNchPh|h~!8L?l zTy5*%QV{cqG=|p)*HEMpdS5>CgHauoot+G6GM;PDXyr{BiY@hMHL{q6Vc$C92aF*~*)Z!G#kPWk$=2>ht{t%+$-`h1=@zFC^4*FpFEL< zsn%8zrAJU&PlA^^4p{_q^mQW4OqicChPw%=CW+rbHU0AzDr-#>S*7MMQYEYI@Kmg? zYzrOJsx2f6kD%C9G;1rMa`mzz-4uw3ifU~>)G{$8eV-_b3=xkZqb$YfS1GO)DLkN& zi)4r+vmsLrnQD$rHIf0O1?Vj8TtlBo%7Kb9ZJZSAO7+F{e@O49mfX;3Phj77gA_x&5o8}EY;T`8 zN@jFT6(BK}S=gtc8uZ6#ssoTkRk%88g8^i!$Ka`eQ6F?8fg1^!>XK;tG@OuyW14@1 z#jG((Bj7j+WMDH)p)h955#>Mcw*B*o1u5OkKGa2O_wC|~9xt;K#~xH?y5N0%H~be; zJQbCgAKZZ<#p0Bb%w~QGO7eWm#SQJ^Kbhn~GKZ2pRUCMZcn3163i2GGr03X^p0|sQ z804WOPck<)+D(a=hY3O{>-TLT9;^u0&Oo(^)*JS1CR$Z|z{F{np)5t=XbQZd6(fW~ z81%WTfr-~jl_n0AI}YAPx3IG|4YXDXQdjb z9`h&GV>mI@)sU%%>XV$+CqYv^K7mYcF(i$UG;%JDjByF8d!aA}!ftSg-2ioC@Ayb# z0i+ut-N>PCJa5FHr>ML+%Bh2y10(Y!k_UnLlcpiq7@+0?XRn0N4k>{Qy`<41u2oM5OOxxZtxhml%s%jseXF z1H6O&+(5aYpO#hr5NvMZ_~^#uI;vwbw@IMsPxtEA;P3x7 z%$gz>|2IVYFt`l>M*g8pIWp=Ug4T`)*gZUEAMW67dM5}!bMxKM;#h&!b`q;M^id$v zzcny`^_nsO7YUSZ@T|g3t|8!D+JfLSQF^X02zMt&yFj`T>RaHvZvkofpq$|iR&BDd zO8^*d2?i(|ieb?d#5ctFI-)ax(}jt`BZ2;zN=!2l>;SM_88FyEAzW=R!LiE%wc-2*roP-(oQWvWpf$6)XsAbC)?*Y<4F*7;0vLyXMT~m|zw~{u&(N_V2pN+kt3A#|ME}F8V^0g|gE*b#L*d~g- zM)3f0Kc1+DZ_Qm`5(q$B6a)F7TzytHhz5WwEWsX{qZQtzmzED6= zjf9PlsRmjMOCa>w*t2c_JTmqlZ@C4_Hr>}RQp;G_TmZ|Mt?eX=jRg9w>oMKm66Rpz zwXz}5P}2(Z&ww4+eab+yYq++G82vhh_N~PbK%f0t+C zy3kWh?bDb{ux!IB(Tpjoei!XRm(IYVwZq<la^mh#@$1V<( zBhY`XPz|-wKy5S}@N)oc0JIGPq-f1>0n!b8s~Ql#==mrD{npvqEPegn=gFc&loP_E#g4A7_m%mE(X3W$TCGtj5>1geW)iB+0`TB0;a@{{$o zq}`DLk)LtILkHc5fwIjIhXr;q&=q?SC?95g%SsLcD?q>*iz0HMJyu1GMG?6fVupm6 zA-{oNIrmC_V1}#)P~_NXAVoRYsy$FVWaY*|ipa0Ha#t2bBtTXQF+;KtC7d4xq#Rkw zv3ZCzpkZcKl$$JoJHvlNR}A8OKx{aRA`(RZR08MAD^Ha;`f1q>Tw9FX<`B-G7AgoY05#V z8U_*EL#1jCC+7jk++o!iP8>%eNE#t&5f1_#(${@au+Kdj+Th&FzMBI25+l)>?G z7O+_?A{8`?{Qk$>Br8kKn&LIY-q$+V-T>u-pj;5=xuBsuc~4&+Mii$E z@` z!XQg2l$nGwlbmNJlLyBVbEF#qmQrY%m(kdJLPbD&O=odOU$$6YgHRGr6M-?Z+kb|o zWRu=~7*p%dc!|HZXZ+%Sah}>uH0AP^EUz$0G3qT~aR z;@EF3UC*GBHk&2wZzC^R;H=+37Jdt|siCS3N74vYZ8!s7{qyO*f1Z2|sM-()8w`_E zxLI7eB|s02=TBM;!DiQi!5{#`3X51phS)WX`V2DF|8-M6WY_CTG={+{MGteJnZqh1Wame{qg?=XfLjc^0~Ve@7O_-UdLLJ1qZA zKgdCj2b^_?R)csUf5Iv@azHvB9VmamjRbfh=|fSqf(m|l5EBhz?*B}!BFlPar zhZMwO&jp4f`F!KIcLMM}PXCfoG!X9LCwJyIuuve|)cBZcB#?51O!XtuH`)+3JQavH zcwp1)L4Nz81UN^g8Z5{B&ZfFwNX+9>t%sci$4Hf<{-P2-OxlYkm={| zgevr14UZscEciE$tWh!?VEz0lF{GO;8x%R5m!3eb=fQXfh*wyd@&JHU1)vRx7)BDH ztUowIiA96aJP8ou?z>I6{qJrsT82BU8ZFnV)f zHVCVZSTLNkxpHVQG030$bMCV~Xb^0=Df@G9p+f3Fy5l}L2)293aWoxBl;;8DkN}Ib z!7$F|XwmOU`F_fM20%2Rn)ZQE^7o$~!}`x-p1wm^05jWJ2#YZ}jsU^}l12_n5s)+%X@tk* z^p1~i1iEM-OAT3Sw%gLax74OXoVmUOTmWOL4FVm8P)yB%&-8De*lx)h?f4(k0$Gux z4Q)Z)*gvcq!-=H^xX&O<4OwcAs`dPUG>%U-hS3XfpZT!KJN&gg@gJ_$cMYMx>`?lD z>_-Y^Hs_aywQ?m(1|mW>=xQwu=Gr(RLTufx8xl>gnc<$5ynT0RAsShqJkk^WMMjn2 zfgo(-0bv8!$Aijh4kJ~v>JCrE<}3!FKH#JzQP0q1*Ayh_;!4CMTgWQ7G8zdkg76IMsHteZLd z3Gc(LIp@gEe?HR-b+>ZfLI${wDdXfinnJE4L_p3d0l983ewst?>F2hF2HmzOGLjEK@yAKfeo9vP|tZ{hYUe=JizBBDKu)bMXS2&(mCs zRI=&kf(111r%}moQgms!vy4_GgPww zeZ%;vyxGxtoxx(|%ZsO_ug971yUV{t>(<*hQQLZbr(-aPcnxRVe!yB^KaxOJ)b z1F5TzK`lP;XvQX8TN8*c|dTju*+aN9+1SRCcR({P`Uw-6m66Dqdao^tp8Yv+dqX?orE z48JMa<+SYR3Bh~wUp6K-{T1`HW3S1f#m3wfhjgp9l@j{=7FcYazjh65?);uUL#4QE zzp8!Nugn;AE2^G0%Jn5llb&sV;Ab~GE*cq5vAw%*P4Vfx=}|U&w!^4C`Ml566X!3k z<0--D4OztBR&iF1p&a*lsTXP()%8vhsoU+9!{zO{jcBoA>)f9Q+jJgn zD8tTu9vmEtHm|S9b~Kr5b-gVwrKG1PRV7LaarWea4KsWi?@4*7`^39&q5N0}I*DtC z?xe}{xwyHe0e@f4wOaIG#GPpqxCAdx<5~p##LHgV)5+zi>tS14H&xJpN?_IRtWu#9dc%D&}+@5f2&)Z3O zLRo!HGpR&7{mDFq-G@z9%+*-^Hjt=uNBtavp0n3s$9_SR1r872uk!i0u>P|$;tg-@ zQir@up5r&{&n;=rns}giiB$Y7_ksm4Ue#)SdRx8p9%*J=)#{M7mu|1l3z>0RbgNae zRZG^w3&`@M@O_!nt-W*w^PL3BYp#jbY}lw>l1kpKSIj%xw|qwTmaRL5&7F}uYG1;6 zyrZ>r%#X=@$^Rny0PWoW7i#{C!-+@vCoVQz4~vcduyj{?uv8~*hPsh`59-U*o|AzD z{<-GTNj+1pppWs#`;v*Vp*%x$R9=<0CxUD90OX725UMF7raqm#dD;*R@O%?~ggT=T=-f zFOU4*d-L{tc)d2%+33G>IyFh}wN;2yMSel&nb}m|`6rcl9`s09ZT5Y!aFsT}=>7Vd zfm_Xzgot{)qX^#WVY%sg>ZJU;%AWfL&aOJ&EPH-?N9no?8~M-q+lw(r`R%2N39G1SY|W(cF#O(%*rGF==JYuA>Yh zjDTb`DIjT@3}PkDua{En#OT1`7$3;YP4re|Kh3khi4R9BCIuq1Eke{`h+YRVk!2h|IGId=b3qzUr028RjAaHs?PFE4ip%((;c8Ubsnwzj05I)4acq z&LWdj-g!JHBfXhz;RH+sY~FJw{oT7(GJ=Lg_S8EuE4tfVKHhAZ+(&`nr(2W`&|n(9&R$3SlwK_R_*BnOBUu+TSsh9m8kRdgNPfD|UYQ(Dh+^ zpmo${@xHe&WM$N13uj&v;juZF6ujZST6!UGjmXr-vvP&g?Jmo@s3pf3!~Jq_LHJd~ z5A+~UltD*8PVTK7q$z*ro5GA-h@8qDs^~Obe60)n&$iw4*%HOq_?wS#C2^5 z#Xa#=xm+iut^QOj#31(yvQmh9miwXHutUnP4@Fs)`mH9^Hz1c7ce%u_{@GhG( zFD_5HzioHnk{aQ?HUXb6PjcC|r14Z*;o?l;YNLcR9k?&P0$CPD3X~N>9ahAG#HY<_ z>h&fj>M-tE*a+_)D*ZuuL79K}eHHhNJ97p6j{CGZwttxPYQ&{Z>1tx!a14K?hSd^$ z_4fA51D>MMk1cQ0)~)_XY|`U@MKkpGyr<%hJhu2%z!SxHuAb*ttRCU8bru*mTx)}$ z29`UuYlX=UA?^)ZJPsw?;3l6kls=SoBX<_;MwUv(C%Z4oy><0BTc(eA%%Pq)e0_n( zbyHTj8~Ph62Gw6nhDW)gTw0y?4Ia@{xA)#j4w$=XC~Ae;W}S;}A$y2xEHFp6yX$2Vc1Bh^+{;l&aco@E>2q^)%DW?9zPQ{eJ-SiAEg&H$tF`0Y7fnll&u7hy zEE(yKHSuu=EB5Wt(zRQ4H|Anmm`8=>W-ZP5%LYc0kum4p?%pYFP4{d-n`T_T;*H%A zS$%8=xVq*I`{rk^y=& zz0x^ETwx)Z(3z!wv-@LJNt~^vH1LE7{$-ZD@WSdjDJff{&(OAd-YH7VZfo{V?J(%u zOJD6MG2&aU!UAt;z7}{(i4;TsAd?_I>3~l;+|f6q2G*uhc7B3a1tHnuzswS3G*Hny1RUy{5HkM4_{UW?SMz?7MV&P z{un>P3GM)&bZX#9yOYD!t2AkbN&D(cigT`>i0&-;sJ3aI-3aRutaQ*@6dQZJ* zep1k0(3Ta{q%bppFvsr`ugThr^?qN@kuq`K=Hae>$ZjF?(qCQ$i|Ur8%+9PV_nf5j z?`Z1{&owkGQ9<;yzd597vT0vW9n8$*eR2aK@$;!&u7=!%iHSADTXCXz9OBC`zn z0@mJ|QLD^{>>yG_!ZQrzqLKYAD9WpyUCRS_qOr$Dd{(h{-tow2o5jkS)#W7Jtm^Bz zGlk&5=_I}ke<$&ZkmI-5+8xnmxFBeT)-F5IUtYYc4eLyCp2=IlRjVxb7%;CdYz|cM)y-8 zvS}W%g~#Ecw_TLWRhSNaps|>a&>=lrb?HB z^a1N-;5G=kk8A{-ykcqoWp19vNXKQ$J?niA_q^3acFKr`e`FXhM(I8nK}laC&eH89 zXxqpoYa+AUuj6P9*GzG8Q+ zwl7gwFh*mu_FcCtQWXzxZH`sgk^-lN_${g|?5u?az{)+VP1eH&5!(sCQ_g9oM$>lL z>P1}lIWp3*-cv;$JJEK>2Tj}Tmvn&g@=NL^#z$Md$*I4;&(9*(=Ml17}V-cC9d93p?xIgf!pQe1y$>@R*!O(0#y26 zI^+4|ONFTg;fwx+Pc{ko4Xs>h`$F1fUo4llkGkx1M1G~BYn_}9{qbz9*@RmP$B0fO#^8*w>H;qXO_ zGa4-vq*ru1uwfb114y$ zT-WZwBV+e zA@IfPlljPkx1(X*LZr)@w)mN+BfH~OOwPPtGK$}}IaDF(N%TH{UkP=qTX2>c==K?f zb#0pEN)~Hw0N$;C!6HDj%4lCqmz*0&xgWm014T55Y)v|4@ToGdFRQ{YHZWv zWafw0u(yZozgD{~ke$U%gL_;d#V6&P1G~Tb{hCooNLEO@IaMs|(Q^dV&YTz@cYm&e zxpc&cmOM-sqS@kH0@R z!*mqNF03vai*WV@Wvkf=xB;siQ$}$EBr`pI>F=qvyUfq=^fzH6V+A+^kze z{WP*(%?k0&s7`TA0VJb`%O07KluxP}h3;R~?U(|qxAc{eY$sMTjLpyC6Gx#{b=vAJ zaamX@aLI17d1CGZCuYgsiG5<782;!O-U|?s(H!|D&aK~tfo)XRW+OV*WB4xj^F!_KMIqd z*3$5t`YsYpN;H{}S(_ULJS{^o6E^YvzL7pV{5R+bOm-t*r+q2i)LoTue5o6(%w)nQ z;-xz23C>cZTng)PF|#ISdA7j4nk#5WOjI4QDa{GT_xWnJg&*G-{)^Wbz7+6fZ&Ywk zsL!6DlH)oV@lZne(A#QP6II?PBHg;G5u@0Z!N={e^FQ7e86eb<$%ossAeg7UHB&-Z z;r(UWD&f-6Z?e_&J85dF-BJa7!{BA>*FLq@$v1Q?&jWAxc&}&DWeAvmo?X?-+3Ux-pQ~o3Ah~&2Xdru zIEE!nw8r}Rc|D%HB^vh1*5~K! zz4Yct{%eu+#i^vTBn^8N>wr0mm&|0XQqLLuXuU&pn=Ha(~9zE*ZdRjf*b%qqb=C z4L(olaze_YHRaea^;<*QK1?^QIaZ|kpoqLs>eI7pHSIT8x6Z*|c;k`pA(AeXns-)E zGih;Z<=KZK9?MdT&srQEkVu~?eJ}5ZG)eAo8m_znPlzpZ_BRa|#3uwP-M{;PpyL49 zrC<8P#(M-`7G#IFkWFV^X=x~0zSGyI#T!@y`pvY9DL9ltNcqMuP?l@%defI81%+AKlvfc=6Yf$!awhR-m&0LhJ^6Kl5dWH z{Nhx0oOG5eJ50kB1O!1!_wOOi-yFCIZz?iAdIp%D4m*8>j4et$VzJYjf?C9c^5!osJVFEeM|sD9Qn^JS`zC6_IBGO&W%7F&t5y+*w zZsdlBI=Ek@a;9B$Lt2?*ZL#b(laV&N{8 z%2>PT`m{2qT7CsmF`8PXPwR_?yH@66?FjX0WT#p_1yTW;TB%R#jitLdu(YYq35H)% zNHc$n1z<34P5-JoYBd#Rf%%a zLej0Tw0M%XtW1Z0X~_2AewEFK#3@RbV|{&HyW90?jj?c_O66?3XhNE_V{NzsDG^QW z(x-ilh5J_KX4?@6X+n;*K?O+ffs~2#CbLy#(l4_CgRyr?{KY?>e?17gA(DICXzq7@9rNhul7w-pc=A8}4ZH@>G()0=aha4zhAT zy^VryK~n+6JNDp@3?vT5H<8h43CS`L{z560AG1ELfGl@|qwED8&!iKW%}7R22D1sr ztY%V?{RD;~lc>VL<7hBupCPliL=ulapA1w#3rI=SX>%-*WH58M|YJGwn98a;R?ABM2qrai-sw~sT z?W@r8CLK23$y0oT&V;Zq!dr+iND&QL(sjZO5>TAN}nchoj6)2(p`Voz#^pY^UK;wk!V zsiF1MvEBi2A&H?XbP)kkijajuEvB2W68@6X9m|JSKH`I?I9H14N6W)sQ@ktr^kf!#li0q^ zgZtv5BhvKnxzd&U_+_J11cM(P(jcI2fEF@br~W=W0w~;Oq|I%5*X>pfG=+i2@Lgv# zP^>C7^_|elj(r$nWo+4XWv9Md#NybL>$#47u|#|<`FgHX-%VmcZ1i=6V_#Emq`rQWw|CqbVqePl|dCf7m6LdV?O*UkB^J< z+xS}0LcaMFeaMJ6CA$}DrEf1cEz(QcYht1L1h!*GXg4xA`>#*=3Wk!OOPz0JXvlf6 zMpJV>sq6N6qhv;(|3xY?NJ_p|TLI-L#-a?a$I$*p8N80@Tv4q}5LMFmiK4(Og0!Vk z2!lRgde2F4noIz)s0!xjTaAK7mgx-68e;34|HpxW!w1g%Vrb!SFpCBlSw=JbHnL2? z6yUNRlQhO5iwJ-)nnDBgu#hz36Gtikf4dr?7XfK(9v^8`fus?d$;0tXp3J_%5%wij zH}Kj{Vpz1B0ufO`(-sniM^Nl4nzdn~N_svK6!(e@Z9`O)7(AMCprRNPjY8=AV1;$e z(RIXVm!@=2_=bPU_`Epnu=ge`XXhuAc^z3Juvd&~#O>gmQ_h_xXzB!O>O@I25WWjp zIHvhKCIiDoSrbLU8G7GO6a|Mmrl4~5eXdis5NQ}8l%*&=f^xK?bqYAS&VU)J0O>|Z zH*%~Sd#lGs8j+bK3)n1Zn4`q@F$`C|EMW`jMwV`5GJsq>YqqGH>xLGO3cNO1v|c|e znu4eZ&=wMdU#ECiglqGmmWjb5DGtC8o@Q-=82u_mhS-dOp)94(8od_v?2GG<#y50T zL4%i}!ONTtUZ#tE8xVy~1O_j&rY(b`>A#z{%o=#xig5x4(JLADDH97Y;o2%<^y?HK zHE_ghrAiYNRC6{tj&-Z|1>!A-JG5-Lubj`B{pV*-13`7!_?T+uBgj;LFdDmJfJ`;Z zRO68M%NYo_%yQnW%q4D$L=whxU^2Z5F%J`jQr7R=LM+AvXa}Kk4f^DXb`_l%G76#R za}5}tm!h4*zfBw%nMU8m0OpJQYoh8OvVy-s?iU(LU(<3cQ~^nUqCvxH@(YkKXzekY z>O7UE5~vyjMb(@~)x)YWP8{TTaP`z=!b~WthN5bRF^6)%oZD!Xn!`wyth&Qf>vI-! zV5*(**$CNxNdg=))jwvUeuFF%Fa$hte55hC4$_TK7=u!jddiV*99E5Kn3)wx@uldkIw~H@&yzD}&0V#4lKytwpIVicTLN+L;#Y15@SV?51 zCc%n!AN*TlvdDoezJ6!RzK6**2Hgva!clQc?aU^AS!O#)5- zCh-4B1P7rBz&8S5Rs52!^Vm^K9B%}e?1v08X9k($JiEn}j_#xKwJJeU3bkt0PTT;} zN0#WpLi(`kh#(vntQtzAlnwgih@BYef%GJZuwdbGyT9QpfY`escd@a!C3`R#mQX^9 z!344ofPHW?FH%XVIn3Mw#@-gV#T3Vi5)4q&7K2}90nqX=1uVE3;7x8MR$|Ifxq5w@ ziFj6`oaJ8<2GiuucwgGV9Wh=e;-gWA-~F5Wb7GR90vu!?%5BA&@DdGLb9s}7VoP7i z4NsJ#C;&hM3pOACZJDT&0Sj(sI~4eUtqUwLWSKTjl%D$)3fTdJOm&^JxTEhFJQeV2 zLN^ld*epU_x>8K-)0n<)spSS)QDaq({kxJGP3hepMv!u3-!`y`~1V+iB40P_yTF#~Z7((*w$!^uXe z+G%{GvEdP<8w+9{ks#eTc5E?_ zcCit|XMDn#VxTw(_0WtRT)=TH0;O@Bf@(Y@jT}K;AZfG(rO|tQbYlS|jgT~Q zR_+I-kv0V5sp7C21CjP*K%_k!z+a?vdRt*BZw@oNTdZ$Kx+xLs2l{9X`_>V`mRGQm z3v6)p=|viR7R;Wp5`XJ(xP;_`ZDEqC{c3Yt@XRwg3$}>0ZQ1>{)cLQyA{UeZ*aet4 zXJsRYU>9F|w0q+A(E$h3XPEy!9M1Dy{rX3@9jc!}h$pa&3S@$i^yeBh8mpoWL@S;E zi%QnD;mF;=0yc?N<7Q!eKyH;d?J|H;1#9`OXafjiAC#9&hw_qRFY1FOM8+W16i@;r zi(;bz_}Q>_*g+gFo(0uqG5QRFfCj0iI-D}FtxySZ>`6IRb1^5K0e?Wa1e6em_$xBN z5+Z=~IXIk0Ww2tH!73`U5NCsS{@M_K1tg84Y$hg+hnIICG$>F-1*EZakWGanX%vEV zBP5LuE*#aZ0BIbeD0NB!VB$dgObGz4_z@NED8>SggQOM1FhB$J%>cXt2{eACKurr{ zF6KhmWB>^XG<1!RZUh>-peW}3e>sZri5Nsz{b=fm2iZz-{05l~prDN&Y|#dwV*uEP z24EqTf6}9n70GI20I}i2x(>fl&<>4y{KNkwcfgl z>@Vb`8dC!CH;kmj@bE;iIe8sT*H%J9A)*KH+!^aua1!Bx)G3Jto;uyGWOFgC= zXupPEr8rl_X-A8}ud#;DfNb_apBIR@U=5!c>hl_6%=Lh1_#mbi&Ila3Cpa z9b>E>80mBQRsYlu-p0wy+&Q6b?w2D^zeSCLY8Hxj5`F`r`RAPqFy3K)n^*HK-T_iU z|Hs~!2ST~_?^8*ev{;I4B@$6dLX6U4Cxo(0XhD{c?53zBiR@*INV1oGn<5cO){$+p z?3?WwCcQ-rr-Cx=e+Yzo!6UZxu5&~tk>td&Q=Wq=Di`VW+kFDh|zri4hZl^ zfksG@ud~i4^ck3LARAE zIP?P#&pDC9-*VNh;g;ipKzx~z`N)O;d7`FbZiGe=YyF8&91>3=4c+DMBdTtPkQ* z_P6XOl;s#vzuL_ni=LRDW5awq_hK4naw$fMl+^3B#9%P|xG9Mo)S}A~Y zs#An{5OXw;dGLOquUhc+^d=(nL zx=Qwfy@OFUzN}p0ihykVuZZu%fr`lINkdDZ21`z4NGNgqZ|_Es6U)9!1j;q-Z1@ki z?o1HiI`OF*1D*6adHOaQ1NfVH+4@OI^})Oo6F2j6^l3E)hHvH}_1O~Zi+Lw{Z#w1c z!xQUKyc2^rosjyl#QF-}iHk+fIt_%wV{pPK27&8`We{d7V1yY2B?Se6Kmq-6%fH#o zb?2&UaH>vy8g zpU->7CcBB1!Gh62z0+OO^Xj>7QMs#5ucAKW56o&NIlEk1^?qZm>ds}S#UqA!XV1Ui zKqhh{_@FNtI@AHCD?b91hp@#JcVr)Gw1xKNmo^F8Ih3 zou`rB^?Q8=gSl6@dv1C6#*WLIBhl(r`Wq~wWA_04T9laS(VXV0g0TJCqtcJ%j^u4_ z%RbsB(cA72DJ$G3l*X*Xnj2cGv)N?^n>7A#U-28Ya;-H(h5OD;bRUnXl0TujTtN6` z=)uhG#$7p<#ifGkaaGZZ!MoS`r@VRCAe15V)Vg`#}e7cb#DTR+39`h=H7_SAFg;|x`zfvCnoqB-``>8P2IkB`4+khMHjc$L>xlrw%=WQ%xuijCJv^z(_5RUB$d+-d0OdQNjXCkSaUtQeZ~H?y*{E-d#Fvs z3XM7sKPj@HJEN%*@m6}<>vh)?&p)4{E?4y76+XDiJl1vAbc?81HK&$~Z_Os9=9@iR(&QPAb8|6oJZn4cOrQL4BqZ)UjP94$G$yrlk`+7Qic2jrI zla;;M_`@4~^b6UFlCM-enzH7(6TFhw`TEwRt7jPNleHi2bANmY8QFXC%GSa)37dPU z2zzIoA2g@0OD>c;ex=pgz2#0DHzlkfC&4@d<1#r>fzQeA374$SKPT%DwYOE%EG8@OS9retPo#WMLkV&1e;ew5xV6f$=Ke6GOMcA|n{()=l zglMuae>nq{JU2(ZOr~PMlB>HNpADRe45p$_>|Q}oNhF-uJRvtj{rOOaG`}<3(&(Si zs>YT4Jq&QTkS73_;z3F>QE`n&V9F5`xXu) z?~7lpMR80j1LI7Sy-9C5i$wEDsaFwV=eLQR7C5Jbipb<}5EsL5SizjlI`Ndl&A0F! zhgAv73b(2V%SS9sZgmk>JuFMzD)lUbSQy-D^;WVQ_wZM~#o^AQQp(mEmhel`zT(JP zB+lhFKtI?kN+)zNStGUGD}oqH=pB&(xCOmpSUm9%zTxKy&q(ybuk;-gK*ZZ9LOdp6m- zJ=eP!wCSu{k)Cz^q8lqj9c4Mk#)oQgZzm1B@8lh}lUA}j+RGEaQ2-h3tgpR}!4vi{ zQlWkP*{Rwd%Lc?X__;UUt9+zZNH33N7mB))>b<&3YH7)`yX=Ceuf%)r@XJgp)2*6B zO%|Y=bm5G5v0m>F7baP{)zs{0lU1CyHiK!pUjyh&_rFk=*_xY@<_>&yBsS|Uo(k# zVW(3U5{A+;&r6J}e3T>xH)Qou&6kl@n%=G#esg9dw99&XUl}SJdaV4PJr-EF6*V*V z21OS#6BXL?FHA~Wu9&3djQLQ97p0%PmN5aoL%w6@%oD=M0l0+KOZla*IH;nos(CY2 zNuHFZ?&Vl~`l`J5#wU{MB@D7ns59c&H(IKR%(eRjay`0bfI4t}$EsKCB2kz9yjQ45F-foNWfwnv`Ih(c-BJuCE8ZP+AI&yVyo18^2fO#D z3-$H0VupNGZEeCs3UX%p)tVSvnh8NSu_Fq@WzRd8h)C_0Ud_Y4HOi&Ndui1{QEA$Z z>|0K|y!NJgaxh)FEuUZRxHc;?AKN;d?dCZOuFyd@BCGh$8Y5G5Vc6PSAgH)s%`Xt+ z4WCe@(l{C}V!-9v;k`)Z;C5*mBlaCpu4CSmyAN`etUAHYdwS*8H~mj6#&d_vbP?0p zW=0S4B^s|`TD?P_tVA2wm-0I*&8UryjK9;}>4oCKnd9tM#+U~|7j~L{y-{!@ryHI3 zI+X*)(u<8aSfbokd9U4l;B3jF6C7IGj=_avi*T*uW$lv&juwP>x_4QtR4=tU$Sb|O zhA{%)^@+yocI)i}=V2eZ+gL4KLO6bOH48Ynn3hxY#9;W~y@?CHAqU~Fc+kMU-^60u z8k73fY8Wp~&cr(BJ0JMj!KxX;d-k_081EnyWx#vEMWSOIXVR34oTexGMd`<{b>f^K z-xuJ+?DGB5X`1vu*@7I$`Ztszh6hm!mZfvo8dSA_=i{;!4?F2OAj7x!tZa1n@!ofe zPM;J`a(2v>N$5nr4;FgG)8T&)Ys{D*gX2D8=aj|>EmG;qvKgG(0bR|OpL|Q+tXzb6 zQcXTCPG^$U%t!T7Gg$9woX(6|NFXqwp*KeghMZx?y}@Dy{dm914i2I1!AoW$#vAkb z(Z`C!ufr=fELUh0*NotK6K`v`V33DC^sX&)c>U8a*9m<&h9S6xoxFlmp|Fy#>QtYR zu^oX1E#5hTUs~o+vfT3e4=sdKbikzfxPL1S(bK@JZ|qy-SJml;@s4ellUiigntR)RhchwVaa0-w%K&klULl9k}q ze)Ld>?3$fV*%5FXv|7+pTNqhYRNc&5G_cyvc1Wp=)bg=oPz7U|?txj_)pG{F$MFK3si53)iJd z;qciO_c1^8#?Y`4B+a1eF}Q7HAuy#YbD+%xuW$bGW*Xv6%R#g^<4pB=5w1tYIb$Ru zk~*@$C2`soaA(Ym1zf2gmowA&A|KcFK0`4oW>%>&Hnxxv?hFo#ZsvacR9<9mat<1J zifhf{XMbq>a$Ar&NClHl^VON6TrnT|{6h+AcUhoup0I82ZE5`wETl_=!SA%M%4wyuH4R_)a&?kbzMzoMss`z0G$SFH;C#vefXRg4KynepB zvCl#$17q@LbcBU7oH2(iOT+1h!R279p-pM?aW6H3T?vCD+0RM;&?RdaI}osJZu}K~ zQo1(I{fF#J3H$uQMlvQL8;8t8{_^>KVFwwN4*!M>bn7uRWOqYGw77?$Bj?-?c6aIA zInn*uIeGK(oah+aVQBqqLD({B3_>bgLri4;?13e~8UN~fH)#N)h=pZZ1)j`A&y4Vj zcOsZ&m8Ma~ld<~*2qy;@;t0}m5$zH3HnG=c@(>Ao#m@w$7I*l;^xp%|i^UG0nTak6 zvU5E@vvV(q#y8gy^1V0*DVtax#JX3&bcS;erz#cMO%DOD*?DbdXi}BR?q@-Pg>GQc z_)OTewVk1$gqZWoK3lDN2|3)=KeH=8i_oS~ zJm!b!-zDCOW@?CO%b(RsL&YX1;hu#H{E9I*8-hDcXYXIZrco?_Ply-;@mW||((Rcn z5M=k+LSDGd8CF{nDDabzz1#m}6GAL^;zhwsO&hCMh_vE#At!6KD&8i-2}GXZ2QTD8 z+uefbt~`G1uE2I@m`p-k%vIXah%3X>_VU1+Vq#`72cdIA(CL9bVi5>^*ai50vQ*vv z+D%Aj3;Dr8Bo=)Q1hUR34f|3I7Hs(3+1^FORiBuEa){)N9~+nu4P$e{bYonFR-V$1 zA!KW~n}XuB4!qY2{4t}}6lk6g5*)Z@6DDQ_wxI2&c8?e#GECxU-P}M-j0K4j+w}=6 z5ZJL@U&wVZ@FsMO`Uo1VO)n22N7=ZqE}Z{Es?s&!@JEm$F48GO1POYfgH6B zuTMie7qsz;bb1NOg!XswN{H%Kj1QtXZ=)7J@JWtBSFrkB-TLDvi}aC*F;5~4`sA~n zV#aC_6bVxHrEVj_8YOa9c4E$i9TLp;j_63EE#7ON2&PE%rb_K-KH&>QTfe=Vr z^W~32pxeA@w~$E0pptv|`tuWw%*eHy#XG~7f(J7qKA4g#^k95*54Q1V57x2%LVj-c zEwEls(b&Z-V7+Xa!}kXwmK(w}n!sP+2##MnGfT`q+J79sfWZ7E8^6*P!Z-Cb{6rF{ zs!eq&A*RYO_~BwW9%rTRC(G{unPjqDQKF|&JbjL|V@$BO4dL7cdTALGP_8QN7N1*|_g@VXeJE8fbu*ty&0 z0EjA+YI=E)EA_)~>gEm2^51}Lf50fw3WfaG3i+V|J1p_Fp{PkIM{z_qnjoVz&A12b zX17rZ`tDAfeejrq+=;~qvjL8u)mXayoyW?}k)v3j1{8Wa1L32J#}R-lL8Eh(s1P$* zDr)P%Gg-jkkA4#7XsZ~DAneY*GS71(_?#?9&)9=#pg&>EFDYXpw&zS=3rY)YJ^uJE za3(DDgnqL15^Id{RkIbO9t#U=w#w!g)c?WB0?H z=Y`!?j33g@+5uaHdPnPhv}Aq9GP~=!l8W9x4shRaOdq-@Z24huw2(1y0l$?u9OCmH@ew+^Rv^IXv>m&sO-vMn9UEwApE(q;eYr}I83z}8ao zobky5ZzekBxykVg_CrzU+L0w92g5i7ei{&4PTkW+=Z6(e8l)m|-D z=#uBc!L)Flg)9k8xp~KXhnH?i{9fMNC2L1k*9u4^e*N=)xRTJJ zVX~Fu*I)nt;6)CJILp#N-(QVCJJ=__lY!lSsoNM`Q;|H~h)^Y$OPa;B?w zefnKa|2EZ+|JX4!BueGOHA^4aVV+;TnBV1iKiUBi+VJEa&RDwek9U3_+{)?ig1Nq+ zCtGql+VK>X{nS;KZ8FhQesixurF3d*EZu%r|1WR+mv8jV54W=Ob}nwLEaZ+qDzm*P z=Hr^!25gs!esA>nt2h4nno*wMVbcs@mC&=2RpF6{o?GDOR>x$vQz;z*Pxk4JiQnRz zhnW8XmY2v*KT{n4uw3r=mjzzIY6-4u`gA)hf>q+HSN{Gf=5Mrh%G#x^Tf`bL)J0+^ z-?mf!@}A}w6CqIVMBDBxZGE4UNBw1S=HKD#<=ycg77SXOGu)FyDvlX3zj_+JzV6rO z2CNOgSe8v-TaNgz9*6&Q3c-Q1eD^9ZhYmfsu#@`zvq2}WOmV0=ddf`c2S@z-U;K+_ z14mB#k|l<}$j0I87ym^o^35%vGxx;T!GBe6kk!-ww6tvCX=w#!)0E-S8ZyOSf_ZzbD z{)J%UFTHIq#L-fJg8d!S;TW|?+XdsaE0+mLOYd3K1@pFX>3)GsqR(__{_ti+d)zOx zv-~GMn19-g>Hi-^VIuo-u}sD%g)O71_9#d}lgKH0rt0Gazi4kUq@ej(VXKU+X+)BO z3Rz(bQrN=dzp&^DyS6A0hg^aoeXUPI2{AHWV8X>IjHqH1DD#o?wm*u^*ZC`<1oMo% zeqq<`MRDKCi2sU(_%{rnlWZ9Nezw`a|2zQpjoOrF zbBI(X7X^FUfdHY6?+~}RJdo_L05e+^zG2*X^4Q(I{ZZz=`AYVoV+K_fGDv>np~l9{ zqR6hA?5auAyn|fzB=;w>os5r)!frCczCh7vjs~hQN(rz(i7R0D_u5sJMG5%kD`NNd z&P1W+LE}<1Z0Tl8qx|9Jh7$!4b)oc*187oJS>EdSUW;q)W__lYoCiE(q8pG`<9m4njT6 zQIo!qP%vP@8~i8~47ft~^+NQu6~4M$PIt$wt1@KJ+?+Z~el{!^Y@h5Gs<>at=s*4&vZws7(BlMY_2gfQ8ZA7nCd&TF0)Jc_5f8vKE{F&W2NVbh+ z+eor)MEoJ!NcPlZ+eo@?B;fy2w|c?Ii6pXaHMt%0N82%9=~gcoIe{RnVUnzdIf)3V zFIQ)fPCs0!Q7Rv=bzDdCIb2!UZxZ31Q_%N9Sc!MwjYVX}kv$U@JZAsP5;RcXCJ9z= zNSN%=e-H|K*_VhaM$HP@;bY&Z7(qfZL~uoQR5z$h;)2F@LzPKiT>)Z|dMZX62NE7} zNI!7_6~T{!Ztuv2?tep}n`F>a&)50RMJpj7uLWspEqFHqhy^*{AxD^`N0?vo9ny9q zIo~1gM$&g<9PAS(eX}-Ab|_Kc4Z@v$EAR$sY!N}ZdjRZb5@3A*5)D8hqfjd$L}w_T zN8=w9VA|iC--u-X!U*4cR^>Mu^Pl^eNh-gBaQgn={2Krgq~c@%{H$g6bN1b3{B|%Z z!?#5tJNP237Z*hfKxhC8ISMdmkWd0vw6_rqFjN32BYHX?9;WH(L+l50WaS`g{AAk62v1z`=KgGm&>Y>t|lCw>V@S3}cW;tBu~=>%|) z0?-VNQ1AF>Xl~Y^4xHvOUD7WhQNNW(C%Y-~+yW@YKywS|&j5?;EG95I11T5{aWyM_ zt6<~?2D^w5aU(EHg8>sX_IH6QYm!V7;~}2&zG664JUOW*yK2&1HQ~<$j?-RbS50=+ zq`T^w&r>wPaR)#WqX@TAI4TetTDUi6 ze*j9Qs$reTe^6HaU5TEI%>C~`=E~ZQqS#DQ2@V%iDiyQu{;sQ@Rc)CicVozSACmDt zU(jb4N6-F#jc2-%Jn%|()ug-XFEd@`!6dk9HZnH_$q0-8b;WCbxh(AG2}6>0V=37- zl5Hc&w(;w3O!@sr8FTKu;ETe&&Q&uqY+OzuW6*3NoJ(BZK7=@1s00`)oWcPuMH$2) zrC^`OE_))l>Epa>`F+{p#|v+c{S%W2aiwpHtKYuDMX?3LnMi=~Q~{nfjHccD2ByO~ z7g@X1j^FegW?uaA6c+8B(-GVgF6L7$lKw=9&T(!E`Kvx??83j*;m0IA>D(kV>BIJ* ziJ15mpuGIPjjtJ3UO32l=IN?u2ZQQ3E($78f~w>_P?a17`S({%#4O9k9B08tWboO- zv3F!DzPW11I{-c-d}$&M1_RQ7W_eH{zf|Q0=+D4_wq4a6+ZiycGoY0NAtC_`au0w( zc0-MuuZ$>+9AJ_I%m&hW1z<|M|8o;@j{NK_aON3+IpA|uk_fEG0dQQ<%7F@$#QLE4|z%(H1PO~On)2l1e%DL&*-x}Cqckr5e%By&5D4lv>otF zNhp0}I~(G13I`Y)(VzDcZ&K#UaSM#f6O@APb@c?PeI5qPi0hV2FIEVEq2kk>MZl@qX@dGh8e`NHr z0SHJiSOdX+yZ{rLvm%iR?GrSY1weBNAdv~14|)AH<|#6+^*HI@atl-j`Df3BT|80x zrEN1uVIl0>q6F~bdR4`MFBdR3&vA%1L+pFbRS;er1|VnvBo5I;eje!pLo`s^hD?5z zuCZ|LHzFzFzo0}z@_7K{XM`_pn?{I=?{~9msBIH>z`yPILW%e`lMMsd!DRmcwn1R@ z?BtiMI%z2=k_&=?g~qRofg1bbz}0G$XUz+GEybqucT7u zPi{2Jf77J=cFg1Z`NSyMe*>Qau#Lzs6~{cLF|(@QNvgrTE5WKUhrAvC#sbN|AXWfL zHT?4sjXjaW`FHEzpu$7mjpW^^eX~(_;fd@V6F1n6Uq-q}+l`p!o^%x*p6T3tY5v}o`Ia9a(IR7$tnDip29)wiOic)tmFM7-FeXR*= zUnYKwO!_Z~P>IxM8lQ%3z|faHfL93rMb`#mJ0n6V3+J$sApr9ORm#zGbFs6kiFnIK zhlOJWi7WD7un^=H-nXz%wS|}aNtb#7=rcs#*$22$BJuc;@!N5zgUIzgz=Fu30?jA7 z%?%(zvLQq?k|Npz z*+$$w&xwi$WuBMb=ENO9LFfu-R(sym0+A*lM`jXmpaB@hzgR(q`Q+y+zcth z65(f)pK#)!PVV3!L>{7v`!-dD24sHaC;tTlRSQnv=cPJ-B#nvtGrN(OY#aaYXJ~+r z`ZW6a7df%;*GO zVp2WxXVMrr*;W7FyXvooLjDaUPkxB{jCXGXL7X^46MRt|z;c8CV%!x2C;+k{nsGfM zkGQxZ-~-qXNX0QkdV4TKV@~eIkT!WtGLVo|a{2#?H0JAWOgRblZ$K#CC`_*LkZU{^ zjlW%305zT&A?CsGqk+tW_ifCV>OjoRXR8Lk7Fr-OH_w2fYa+385Rtjri%3@rXq;z0 z5sIVD8~~TV0^y_|^Sk-5)On4!pATG;=b`*budw|6V-J7}ApA>>CvW3#x@riSn>h%$ z1jrS~-!=?nR}InjAdp{bJfyhl46>{KAIW0~74A+3s4M5S=mx8-j_XJJMcg@LS2>2{ zKpcQQ59MA|EwcKF(3*k&(3koHl}#{*IQ}{L2JvBw0#SdZq%DWY8Pq{;B#(am!pay{JA2Ebl6>kN$%>L1GMGJp-I7m#QFC z_($H{LLdbDxjyL(DI87$(kY08JWrd56aS!;g@u$iKci264RZAnmh~47*a@U3^w(w=# zb;9^<4pAC=!GYtL(sVdk2A0g=OtO9w-v0A|As7&}0V7?2*&c#eKm%M7ir789qhR71 z&P61LghpwIBV8DvNCPRt+Gl+l>4LHt^6>TV3l01WN;IUx-@YBbCTTZ?B+t-%HD9Pp1894Gvs0}>uJHVifPKEN1<$dq{)h4L=8wI{ z`BjAPOVaa*DM<3vUSv;A&SHL)#q<*PrC4=}dh>cjhDU9u+4}s>0hcY(7naDp^^LeO zp+#WJ^EKXr&aRNj+BNF$UC>7>EO?&>n~gU^XAh33MxZn z!h|4hWX#OJL)!riIpBDh2a||H4&B18X54u}W0qBMGD+NdcgLW9B9xV9Lk*p;WNbh) zXAS`bL~K4Ypbe!@4xCkvwmtrLFuDEx0DW=}O?t&2=++>dOOMR-6B*E^AxUikuDp;j zxQHRy5$^h!HK&5zJZ}+EWA~JJO zJckU?{rmI+|Nik-l3f%;hadi=5^sMot8%ryvtZAqDi0X}?!0?r_Eo_$=G@H+#KatG zFn$DG5G&_9dmDkQ5|D5Y85{jPztB7p)=ZvAB=@#SDAR(8M02Hgh6r(}w=Is`_`8`* zHLTOz%%Q@JJWk^!Xn*SeUBppD~fpMB*)x8aH;y6u(`O;=Z`(3@AQ5wFw zO7?=iP)iZRl?SP0e?u4vhP{HvoPaQ_m#?$#C-&SzQ_Q<^GMDpj>z0#KA!3md@8>yz zBJ!1v1|P`q)s?pw>8*_d#HI4~V!dWn5cmQN9eyL_?k0lx8HoLIkN z32Y+^!t$8?wu68KVQv3RVokU}POQldMUoqe!7(PONFsf17wetquCH}_v0`_pbQ-7!eaOKLS!qf+_>D2&>zcoa@CP+9DiFq9->}-m&h+WjmtoX z?X1ER;ynB(Zi*xIGc*Q@=pF2ebahft8Uy9@4h}^_iS;?W6Zo6W@Dy5&fp+?ti$xOf z6akHaetL&YeRN{|B=1D~O>y0n@W2W54g46AFp5DCx+ma-X%vh=OF=;(P(XjE-P*Of zVCSmCN$c!Raq6sDY{bC1my=WR6rHg9eTxnz3ny9GYahn&8R0rb(&zkw%1*QHF{Ew2 zM0>*u(S(*erXp7^Tc9|Z4p)hsJ7N_wUU)+N`JMAy)IvGd z9ohC?NHyz`%|Cn__JfBQPfhep}t@YaFzayJ*fQm@E4X_TFCe@O6zGDC=vqyE&JJoy~w z2b@&ZrH=}(Kf9F^VqT_Xag&ER$gDs7kQ9UF=z|M1xynW6a_&tu+QZjO@JF7UX178` zYf#@g*P~Pe6TI<)rjqYoPHW$^$KHNzNjIJ2SGo>gm+-C?SaftvOT5-f+?v_biCtHC zYI}Vdrac~sOsx$uIX+sja;7A%bnTi)uijmXt7(Y{=LlWqw<>9$)zTH)u5Q6p6dH}@ zRNoHW&U!kjTjE+wT@U=C_oxf&_L)bI!#8Ja%~j*%G-C4Y#IcOzz-xO28FQ)%_QpSP zO_5#AtLPcK;*s8}s0-#?8+^h9mk8VS8Tsy1^bJULb;x3EZevYM2N||pj-r+vpe!?zofKcwMiHXSJS&v8{NRAzu02ki&r_)-$0#xb*HTdCs~0FN z^^Ci8ThFO%nfxpj|HHA@)2XV~*9Ws%id%Q<@OQnDGKhTdwc37H>Hg5A~tX{@uiWKqEf52u=&1TU-e^dR@jq=6ILo_AD0OX89T96$D&G-!(Eu^ z@woP={g9f9tM8HRGLC~Ovc|*r4*GNAxz_u0o)kVV(?%;?Ep0k{bUJ2>j`LJ4)f;hk zE6L50`jYD;RU~&yT1u{9o38C?+jg5*XA{HTww(mbw%h&b%bq4~(Gm1n_B2d(-L5g2 zt?nE8#8leZYvVlR)^5x&-n#jvL>%X_>SuTE#p`W;dHr^cD83Ryv5|83QqKK*JzUO3 z=0CWlyKQfK(S+7$Xg(|6vBJZ2dWxey0FEH+%)y#ovTNRnXz9eT@k`7O5BH%N1d<5T z98+7TE=*~lW+{;kZ!XyC;W1V3n`_%z8=a?}vKlciNgi$^WoJis*fyB8=w|ID^tL>! zru^=0^h9?ah^JY{u$1M7L}b6TJT*(@(J?h2(>SgH; zl-csTG#u}y68iqu2Tac-zINo}bIsloBXRq5U*eI=w|llZFvac=vq|Hs44z<#O}Ekr z=X5=}_0^l^JGRPYcfGdQ9iS;$=Dmx(HRVL{eRcG)r9#l1V_dNfmzp{&%CQlvbTfj% z0#G*=8K?2tY|hsy*L7UHo0@YG=Tc5ePAbmDoYYYt)-s^G%pVnHT;s?;6Ei5ymv4SL zCgBcye(k+O6)iSV296$6$m8Lh?OIMgAtznYQ(2bxIFW47&!6NA;P!McCJ}?_yuh&cnWuU4;FbS8|Y9?=Dlljn%^X+lEBf zc^R!eB<@*rXZ>36roPadR@803;(i0m8FBl{mb+f+G)IJ=R9xZ|cu4tipY(62HkLXq zFO{-U;F9RW;Pi@?00jT!bDL@dkDyCwcDrawHhC}e-r&8&o6dWc_a^Uxqnh#=<3Z^= zU!)Giu)Ol>eR*vlhQ3N@tlC)NN%*CxhF57=&UZ?2oFcRqoUn(?jFEzDqCSk(mv2#Q zT)d7o*!q^yILnz&_tWBf=n!1nSQgl+&oUMU{wmbp+RdJ*E|5-nckw#Pb&Gu{d=~jo z`YcwNTIMl$o3)XFA*DHU&4UZ5JGLesig_{KJJZ49YC>;{R1fDg(AxT{{t_o^qsyL) zoZup#U$U`JthD~RzM$^FMUxB#6Iv8)*`V?Cj{3mH!L#Qlr4JzojmPzwzhB<^{7Qqy zf;El$CD7`c4h#42aNaUKYP?Cf0ekdCVr#kL{Sf)M+EPh%xbiKD#Ygq8IPx3`2jBF{ zD&l^Mm^c!sfBD`cQ{NPtaFdrFp|=NbhkE4Vk~&>)oYnAREWiAk(w)McQiei?@)gA^ zN*>3nhexAR?A5lEwCxTPD3Wdx_uI?I@HQ~=D8`8ImSG-$7Fr>`LFfT~=f-Yq;ga)` ze5}1s%D4g;`<8jGVcJ61hoMruJ=2~nq`(}%srWJW#@$Ewi!abYH^RjQG|Et@&g`af zg5!=1hqXAhSj<@FQH{5oPOLq+>)`T(JO?)(6gf!cnz=fDW7NjTH=Mg2I*O00x2rhz z4MiJRu-tHd8k0iDVrZ@7K9r_p&0@{2+pF#r&Aaokzne}*=j&^I`l6XW)t36xq8Dm4 z-Yz>~aP=T=@Nn_&$`g@gLF(Z*yABE-`w+F7Um$)pL!)_I5q8)1vb2y22g$u z#pnxFE%wuwsSfX_uU54XKW|zgcYcWx(}ksLtDn(FQC)}|JSDw1v7>9Mb))_Z6sOIS!*IrvC z+L0XF`EUH7#a{MgjaZWVQSsOPEFLz)JCigtWoyI&&_!$qn-Gq&ix(0eRVhkSG z>rLrd7x`d)luR7wZz)T!nX#wIvU!l=$IqJIB2TxUWxS3Rm#ghR)7;!KaSC-^|~t?((;qZSiPH1##daIm{w zma%nI!J@a1!!k73mWnE$NDi{*OI&;m<*nO5XUK)FUvZZ=vnngT$^XZ~xTbD&IJF~2F8U3oZ zUFPN6c65cx6dC9)IXtOifoGyAF-FZEkY0a3d-gWIXJhtl-G|)970BzU6u2El_jj=~ z&|cVONaNl~o#`M4dj>tj8m;}u;Pi`U!2?iqqo*!j))KVNZGs_p)V)*~Ov;zq&6wwb zj&Z#!a#a1Q@-1Z-<(taam2WFQXJdbXq7Nr_&&-MSwBxzP3N@Oy^Qz-sgk4G2PR+@0P$mIUwL6^*L(`@n>hF z&+_iod#ZBA{a9=D)(sxG6_&WX{Q(D-AdKV3CQC>C-@A3w4*L(SVdB_xWLu4HTIJPH znepQsQ?;}!o>!cRaYbXFgmdNHcRazT@%*v2?bAnUbOJR^j&pg{jPGGcG#bx7jopx9EZ+E-sZSmjSK%hKBSjO5_Gt`w zF@klvdSsdB+7;srWu|htei@-h)5E!ngK9?tkO!=KydS!iC2o9$-F zZ3nj<*>+&t;cZgejy^iIhVg)>ohZ z+BYh;xqj)3w$0v+cVCPgzC6VD)v@(?BvrDU`O;lxb0op8=BX@J6CMj9ba8(mhjH2F|dly z=6uZ5n2YmUS4Oe#w$)gjLA6VZojG66FnhW_%ie|y>$HS6bnfl)KN)yx-2FJZKaSQ_ z7jDp6Q=F2yx?iukq)bOWhQgc4dv1gLI+j-we zj;g<1M`#a6OT})}UcLP-t$4~krm^?gFwdB_07Dg~J=F)N<-DJI?C#WsI-}*9Y?J0* zWudRqgwMkrhLjY?D+{9;Ct|QYt($qj`Gi-}>QXJ9oiKCUyKD~&Zu$bXTbzgc{l)z{#Uo-)z&;)lu%aZsU@tGt!9sQ1Kz;9Mw&Ky* z)*Jmp-Iua#TlnyPl|#m(IgY?ooplbRjo)zMi*vM1MFnMa1#rDC3G{f*pJJO@)~?DV z=YFX?*WYIISZrd0{Arxt&J~Yn7gHK`nNlC2Og@9@**bfSqFn1V*gV@QA4v#aoIdHQ zOo6DZ$a~^!21{Q_Vbop~jIE>%8=UWoZO2gcnHu*z8}CeuzG$ly7_|oe2lrk9ykJ61 zG-_2u;@$F*d)Fvyi?CScU1qD?J155t+cyJ)tSOYV!n%C;y5FAhrv{G*htExxistxQ z612@s8*p!0YSqlj#@id^l21?%XC$O&EPpv9o)-#hrBuHfzaip_W!7FIq>J(I8ZY(N z3)GZfGV;VD?4`<~_hCJliA@prw3p_cU2~<&wX}?RsTw2W75O@j0D(n&F5MA2vW>Gu zuC9`K2@ZGSW#Xg$v8%;QIkb%#Zk?zz(^F>_hf3IIjV*(S)+s<+|ULosNTUiyyn+ zWGR0x$9c0H8|@|qX!$ZnO3?j(zjC$U-9@A3Uxj}>PqP%tw2rf zWmR=s0|b_&T0;x_f4BQ?GyONS6_4Q3(yWU;n(>K_+NGLqRtb}8d2Id9ZhF&y zeXC-7&sc|qpzQLMMt$o%inI4vTL)}Vl~`NmWo^`V^PYLyyi@g9D} z538%Jf$RYAYTz5DI0wY?_KC9e*VX6*rIuroV`YxpHHt1PUpp^ok!lt-FJ-`|S#`|r zn0=Vr5-rEa&^NN%2ke<_>!MpGrMz-jHI2cC5Ai#Ddi~w>7ID`WJ%FFgdNJ|4{lz4D!6!WCxE>?EGlt6jF2P+aan3^VY7eBPoPu5h^w_y7@8U<- zUyMYzKAv=2dika1PR^1>0*KaD(VTpGj5@^nBz4^fTU#VGI=j{+_A$yw3qX_x> z)%d-qI%B8cRECS@zp};w&*hE@LC+NI+7*FOpt3Zss@5#^zRb0gKAzUDNbvYU{HD6g ztS=9;4s~(_u#JE#d^AYYPvuVyx^CwnFe!|T_)`@BP(@Hl$0h6SXZ@( zJlXt>R~ZgU8g@*gugI|5(Y0Jhe>f=62nI}o-I!zSDO||WT`>P3n48djH}HRi38c&h z9j#ylc}D>-2d{aP9>2y_j5rpZgNb*igkf-&s*S}Dy5+n+2*WBzzcmD`7@;ssTHEyA zr08xrK2}WCXsxDfF8Ifg?@E#Ox1GC*ty`x+W|ocG+wk@W-5&A4P10k|+2uD-AIDB1 zd!}{ShK@^&4VML?EQddstj;L$%>lu#FLkiZ?f7L8U)xo_9%i987|Os#NmSMJR)&@K zcCM;Q26}J%t!26cHPc>|pA@p~1;@m02Xji$>W(}qDSbPf#KA3Bi6O{s(YL^D_CGGa zo|bqjbZC-xuXz?uJ<%|Ycj92|5v3*HpUlI`2E%*zcw}(w(ABqCEA63Sz_a<8Zw|)>hf}F%qC3J{Q__JlJzBfl+B_Z+y|r6FcqP zpfZQ9&eD#|S2vD62-GbK?w@bojyif)Hom>3YuB$9s0prF8JFUB1D2gVHi=Pvj+M~0 z+TW^w2Dc-^3w5jIdQ(9}_AI#4r*HRym!=>quZ}&We_7otiF`fJmYI?MM%5Gda^G~y zZOrBCPatYfxZ`)d2sj)4f=`=A{)y=Hg z8UWj_o!+@Z(|~8u^QU=g$+|QR?&_Q9Yt}y-QDYRp6-Rl5YJZ~~m6Oo>ce9EvdT-PFR}U zGIXys%81x^TfuGy>?@vi%KbjV`;~RZ;}%CV$=|GoFIQ{r(|_zOypblBA93pfmD6#G zJuh7#V~`l-%(zQgp%%GB_A<)aUNX4_)7+M_$uBPO{_N8x2|k--$qW8iQ3^vvfu48y z%f3mZL?5L%G2a_(^a+l5p}%s8-Ew7cZ_&524FNqP!2X)rhv0YKWsP}acBn#xodHF8 zYxVo#mSYFt)KDa-278oiU>N!I5Vuf*1ig_l*NU*ZD``&M==3sFku1O0^TxcG2Auz* z`Po|~++cF=o*a#q_tje&Je;S+GQ>Tj55XG1I!n|Xx1l?z^VFd+nePJRirCA&bzfmd zDuBQ;=NZ=@Qp82PLIpDOSz3Pri8>PeZHM+Px)BDc+tQ1b_5~eEVo5X$`h}3#WsqERKTa z)M=2e#C08C&sH865O_-=<-NS)+iDK;<`%oGWqaYSUW5k6z}DMm1;n4z+U#+-^Nj;{ zbMSoE`1ZA~U8`-NCSOx$g0Q&fH6zm(BZ}E--eR>>TKLDpD^e0tcBZp<6sPCLhUmWX zGQDu==*R4#kGiOSDcljP=xx*ffrk}kP8;h*a;H1#H#VPYZK)QV?O8f6?&Hf27D^nV z3`{gT%5)M$o;zrEcwQT2%;Vp6Z_@pEPR0Y6{L=JF%tj)(vFjv*Kbj2x zC8-#fbreS(x$t5Gm~*8FXbF|{JctH86wZ0SHvUcB<>M)+;^sUf8Tk>=7(MV z1>)i_^pDX_jv4Z8?W31_%7anwQPoL%YKzlbGkys2Xy$r&uvP%EgY)+ZxvRV+Vz@%xtB-XJWifj!z_ z%Ec7t&O{*wy=|SOwWH04^r>U~t}TN#n_7jAYM#~?JU$pl>8U;c=ElhZ!TKG0L+QJj zvl3Psom%S=cc5!GNY!YD+?^*8SB(<~D~;8&5k)KVUcLndJnZh^a8TgL=k3Wl4(;GR zxDxAGQ2OdALC25$O{En@OAa!spETy6Z4+)Fj|i(67OpOuxJxIT6W_WrpC3$do< zZF5NHy!X2153y$>-}m;U>&BmGn=np1eIGmf{^e*!$-L;-HRq+b>Gta;axJ02649F3 zF&s1Cd7iMrYlj_7HoQ;tjp-q??gYH7{swG3a@}hTy;u5H0p*PGv~uAazNdJ22ejMiq|!E;__JH#t61C%GQZ&yYwhr>@Pe1pn zBi1#ROo!r5)bW8+yEp9i#q;IYJHyM|6yDk}@|UFXH9Q@ogXLF-eS1Gvw9tf!YRWmS zk%_w?6LxgH5`FK{Zssd}BkePWQgua>Cnn-20&F*XXztJNbm!Bb9`>9d-mAXN9s4*_ z_OOFGs1u^=!qO)E-rbuGTxD|cY^*&jx$^F}_hG0{U^+K(dF452MvKI&kt-;x@X82lJ*|jIRvC8 zE#C12?(8LQ)>1UAo=sXH16@XoSXEAYeJ?Gy8G^q~pexf|BrwfRH!<9qe^CULeSmQ6 z_vM_#YfK*L(VD3{?26<;1iW&D2}*HNDYy*6SJVwDJ{BsZZ^w>yt_suCUOAGlpg(<5 z62?F*hxfbBzH$fu^fE)jHrpp?^AjEu;&QE4SuOQ&*}%14#b&)6x)`td)uUms&~jj* zQThc{TN%7;?Rp=+RN2hh^g@C@UZLRF`Ik2|a_j5TU}iD^eOB{wIW$QVL+9_`9_61G?Nt!ulzQpK?AcmDN$(k?x%d&^g9 zxUcb`&eP5`=G)pMv_73fP#`w(!RjTg>P{OjVM`0&x<_Vbu0GwhHN}zT{&MI9fdJ-l zwFc5-|3MF`b8T`VtL^(U6*a&k2GTx{DUWlXI)y*=eW zg$l5$3ToXhP~Wqz%tVewz{d2I*arI-BjZ=Je3;_4nj815k8{p`kQMjDoDiSC?l#3e z>PA19ublNphnF+UB2oF(C-hTxR-K6C-MHR^=Lrw?axzxU|E8Z;wNLl?7|jb@`6wg$ z6Qg@iCbE^8ChJOwW6BFMn{W(4Y)K)7s$S3Acf>R$8u2 zvoSF$MmT3e->hR|>g9`wNWtss53FP<8@j88*ko647wIfO z$7Wv^`QB*wg!wckJX|;jN9()$q#0pI#3Zk%tY3dR6~E&K3SHNgG3??+J5zp%@s^zL z=?vTL<-;xlVh&XgGwdu>npslqbEcjMt!NJP>Vn<9s5Yv#XhvbDL!&sgZ&6*tr7qzj z7cXAbtcWN%tBDc3X@(Y)tGTX3ZdS+fQBf|N<#e~Zy<%(eeCsOMwtQ0p)UfqzZmt>_ z3P_#2QAEd2>oIx5TA#0Wz$|MN9h2QxTxB4%$HlQO4DC0WL35+1XUuV?$U&`LqnjZmaq2KEkbA zaq0Us=YMort=Ze?M@}>xgBdhb3|`t&Ix>#GW(9q5-(0*q#3an~h8lnFHZ5r4gDq{; zkKSG1Jm&BD?mBDLoJ1tMN1K1+zVb;`C|?YGPlQyNv68=Vk}A1rRLEVsIs*y2o@oVm z_x7-hdpgZ^s61Iw9BB>hSlRql4>EBn1k0KCr)9qnrlEz&oG%N#mw>k-Re5HB7uT%( zq&$^pvo~e&GUUY%SkPBGO!RMDqu*1(cF_KbZ)0wUyTgN(89-{%i-4hY-!;$|kg6TJ z!7Ac%-{RR3vzzIS-Y!!wpgps7p(+wpYqxme-P@vT7nY|6Bf_7YxXGQnY(9E>w1daQ ztCx4Yv?x^sbQ!Mo-Zmk3{@vYpiSMjv0f8(tdGuCZ1qY|Tl*>FEWKIDovdLWPpc{U4 zu!SPEXw@iscxuy*-8=O4{Yo!Le^5K??;w78huO=F;SnVReQSXos}B)KiX7|5$>A%n z6UaADC00$r#@?agT(i6m2+>N0ANOaV^xn1Tkoi6=-0ad64cWxKKFJ+1r_TP6@Z5I0 z2$eIKojYOjrecBpeMo8OA^l8FMCI`e;{#Jg^Up1Mm+`k5yhD@Pnx5yXn}?3-PigV@ z5SpMkG;dg#nLns_qHL02V6J7f?o(jk*rj3udof}t2 z2#l$qV$dc)!>VFo(_YZhIll=1@^FGel}N zbfw!q{iK6OihE?|m|(71gqQNx*yK)QqmZNe6KBAKW?QMXe+(sc$UK?tzv)Uq#YsBJ z^2G0U3X75D(K(dr3>#J? za7j3U8JPDKiiGN?H(?PQZ;wo^8nTtuu%GMwK^V^9Rx7^~sxXGeA^(d|KRzsD2bt>*jQ4JXf7gV|upQm{Mn{G@xXyDyKBN3d8PZBpi z)IHaIvtqE;FN7uC)##X_lg4QN@~h`*luMQAz?zq55IkdZR}G8EJUaT~GMnGX{hXxwlF-$wP1BZ{BFB#zS51OOjrZEr zADmK4m}|y|LP5qEVgbVSu)^sVCpAoGg`YmeVyBneG^s6FjM0J9mk9h+$McVWpog~I z_Ywcme{^aSo3wa$6Mm*6i^jwzSS}5G{ zD%?vLx=Xq%Pt-{RGtydET%s9~eQBv2KMSX3l@YAW>2_Gn=MSj*MPsP%4gQ4(7ci;g?W>mk_sGRs83>eJBsZ6-JOE@S;IG;a!u_V z9(+A!SN8gXQQ7Nv>3N#EZG) z$Rtz-fj+(s0-y6?OAq5eT;;DC#m`ke^^7%!`0n#YR7Sb_So|`tu5F0sn?xQ2?g%Z7 zNBwO|U`3k`?N<|;zoGPW!NRPzd-`JwPmd^ALLyWAXaYSLA0a;xS6giLXHSB8MwrZ1 zR_J4Q%K=teY6mA4)^w~@2jxnR?S;hWEHk&>7%XqS@0fR4<-Adi?K?m}Ywace(@(bw zrF-{f_fvZ(4rUxz-3pn@f%Js5A0*sX8B6oxbfHaF4=Rc#i!a(Q6zy#5RN(#&-9ovY z1B~W33oDYwtXFiwYLT7{UiD(#AwPT+Z|cIUh?KMTVU+ z*N43MP+tutD}1L!Z#Fk91*CsQe@yACC_UNQ-^}Q^a$u9b!19~4O?&E8d`I7u2NSNp zSD_Z4BQAz`=DZRe6VLf2Mc|JuU`RBn`gp!;W9wl2Y)Al8`6_D7?4fvj2#EJQN2TUV zyK1Ak`DVtBuJ9oKOj>IyoSPG(C4g<07!ti?QzCNr0PA-qDX^nW^fk+)4>@H$RxJ?` z7u3oi?r4uE`urJ!fT=Uvs^E|e`FPmg63({B0|SP3MK=C&-vp1UJ)`fiOHG3f8(7|M zwQF4Sk=y-mbc_!VEE=A3+}pqA%Bpew`OK~zmJMlTMVumvwJZ`5_2U65#-n#*YHp~_ zDg?~2lJAq*wbV8d?0R7n_u21k!qi6xb&6wGCYkb%N2+S>g$r&T!q6O8a!3>xypf^A zqqBEBNyV-?zU}T|<|(+KwVgnSd}5LERDhE|TjX|b8ua=29Zm+;fKJvu1njt;Y0fsR zed#4@E@v;oq1{g}dxikzbk?R+?qSN;M3kH5GwaVB2PwRJcC_cI!tp&@=||B^A|>=c zP8yy2vPkfBm(QXk4*1(+1UUJgXEVLnCyY&1dhb?(83sL6dpL^%>Yo=< zg->;jc9Hpi9A`Z3&|b@7$o52kVszz(7NX@?lR?{DT9%r3+Rmkee>m;incohegl>OjHxh3clw!;0;tFL!N2{<`!Fu1@# zSZwT6M)%BOd}Z8l1+M&;L-Pg5YOZC8ey|AD=`()~zgmZJ>RW)HnQQJlwztPJhkCZW z9)gKyy7`iBiQU~t@<-dH=7ZRR=wr5ie~Q<@WY$!hR{=Ib%`qQWS&q|0lYqf?c-`z0 z6jZQDOz&dy^LBZm6MBTH4@);e9@l@g-oVQOmb!1YXC*0mCp`HB>kL^Ixvyi12pH@4|V4`b>@ zrCRCLXUjfC&oVFb#CzpnpD60D7QBCE*BJv$PTDTpcH-nn4vx&GP4GC?0qZu`e6N?R zr2OlkAtY0{GQ$^918gO&>mWWzq3ZOdI}Ps>Y%FH!_i4PbHG>!4Yn*u)PNU*gh2Fo~ z+1}%)e>78s?$w)#^Uj<)?7As`8dOrnT6ArD`;)~Bo$Vn-$;5#L_^3t$3OcFcMpI6X z;aPJ)uW+5Bm9(_bTi!}OkEIC@J@xXw{AEGDMMaaE#lwJ_A!ns+4S1ISjn$&e-flsl z59=P&)@~>=&Ci)&zjw-iisM>vgq+G5ti9FE67#5fxeSrc<7K{RiEM|m(6(-r)g;cU zkgpeM7IJtNJpj$-3M!`*U;3~G45p9yKFO|mx?QYo+c4z~-oxQ_5Q?P_jJ|$;Jcd+UOB_DJN)UX4{8fNj~W9gG{rA7yK>Uf_!SunRv0VI(R{M= zcUFrpiTE}%nmat*TXQ^%b~T-UpOcQSx9F6t!AVGV6|HZ6Y4?I2#yA7ku(J4Z<~isk zgMs$0;#d$e5A;0k;E$Q=r1;9B(&l=X)kSu#stl0116J*R;}gmKN_MNSoznX7a$zc0 z9%TTodfRg+VBwAzyI$?9wykG9u#|1bc83p8F_Qb!GKXUvamB+@h(9bCW#RTB&~WxP zjXM^#joOMPC}-+JZ_D3cA3P52WrtB_^-WAb=3VAA09p>fiZFt4hBN z%C>me<$5R!_VF@=4ZIncEYM1`GqAxeX&di!{m}kI{yF2dGtAht_Xxh(E*h5H`BeN^ zuH>2v0k7rNKGr*WD5oozyE{rhGMV%VIp)uN@rr+dQSa)RfY8OjVeoUbF?x;ealzb; z0I zl#Yptc&}b*Bp;oV#7H???re7H0B&)BFQ?3f&?6fe-l#wqf4Mby!bsL_&d5yA<;nG2 zo^Gg*3dj8Ql;G8?Zgcbd+p?WMC|S%6ML8%NN?x=vSSb^6v`Mie2}v76)|*ClUomuk&lKhZzEwZG~di`|mr2T?K|RFi00f0Lq+Ufkp`_iS8$ zQ@@-!7Dv+&5}_3rq@3HQFe|-VHVS^Bar*Wny-U(rdtt1Z>x81ci<2`15;IXH9Z3Z8=HZlp|`iU zzv&6@`ulF^noPqXw+sC#QjG1s@;zWZ2~R+-tnk^KeVUB1{yPLdF=Pxe6Jn z^7kCm6%?!?!(Ngc3h=*3?Zwh^i5hdNWU1#6SVOdNp0W-%JR>Anfbo{ku7Y{`Pp}Lm zL>t#iV^Q7IBNx;=eLznk`S@CmNa_x7C-;Ct)3j~vp^#2f^%3(`QOR_xhE+ByE|&hm zNp*QDusLMF<(_oC&)QZUMl39@ZDP4N+GX;|6xqefDPacpqXvG4lmXsn0tDm)fkTJ0 zX~|5>WN^c38Oo*mO2r~N%ofYn&OFvJZa8cTjXZNnWJ+Z)JW~?=p}gSCg1y@UC;dz3 zsWsK1?b%f<)7ok80>v0!uBl+k2aOG#!uO?#pQ~@MFyNn_K$i6J{OVZffTgkM2^`4kZ*LUlb9r_e9S)hu92YoZ1DHp1MJDthWnD?ON?y z8CXfDo1zz;{Lw2%WE145V9UxhX@%u9-Z{j#Xx-V;mI~od7RJL^yXBc>0WW2?#Ie+9}5t)_xcli;sssh>m)iVWblp zTNiqgvaWgLRD!GO!&de&!ZM~`n-I(=q30Vl>&4f^n@lywHCH~X~Pcv_b-40u2x`OH+Gz}`+`Z_lyBFWL7`A%G6Q>Oon^qsh&uq6Cmh;wRf zJl;_ekJ{QToS6o86^#t(xRp8fvH^2kXByLuLPv97&!_6i|(hL_H&qH@wF4zJQsUMse9OSX=-#Wq{|4Zh=bQVX?MtMa-z!z;#P8O)n! zVV!m|A43^1BkleY=6PlkSkC0Ho*ljt^#oNrQM;@zmmoTVxt0U6=2$!=m9(<|-n_4U zTDxn&X&c7!=R@>l4CRLn=nW~|z4dOLpe(;1xSgXZBXj#;egNe;`-0PwLIHa3nL*`# zk^Fm_oDJzG^?LbNg6<6~@l!6h+m-K0Gp@)q@2*}Ta%|=Y&UW4E?Rz7 z*u+0RBSb0gqc;u=3KsKB@=A%?_|(!OvZV(M1~uT(ur*=M5q8EY)7ewSjwtB_#wxng zbKd0_jlg*o)=vA@Y&4{;ntZJ?%FNZuG@dWp+bJCrjJjed8B-m`${=*qz{9ZK&zm7Y z;9SbG&`CAhwKqsmMJxGWcwkbXvnt`izBK845ytkYJFSSJDOUS|sAa-!3-7Azb0>QW zs!p^u41>*|h^8?e!OJ*?W=P@9B`z@1@oD=rkF_?ml;0ezsdDkMjLfn1aOp0YnrE{L zle{K7e-+~FQ+s^dbceVkgb|8b^YXgZQ;g&9N4qwDfXCYl96DH{c#HmNr^Bg|5+5Z{ zxq_u^mAzo!aMh3^jl^Z7WV%-cFHPYkq!C!pwwA**N0t9oVZyZjW`T#nM~qD%nxYbn zboi^rj#)#+eX63813I@oWF>~00{g4x#=-oO%czF~o+|x^peRpKk@DzU)OE%QeF1n1 z1*J2)EH#Uqtrs>i9(4%mY~K0~=}ldmYXMUL77XHay9g?+TY3rD}1nhIXQEi{?!U=c#R=Mlm3-sJRh5|r7g8rt@riPRa|d0 z0Rx5_!z3UVh8;E0t}pwmh}Sw}*8CrHW-Pc~hvq<~A17qY@QCw542_$u=g$dESU+vX z4YTSd+Bz`2zCG<>>KGR7diH63qd=ZSsM4u0Xbf>#qPBMAxd z&y20ECwL^G6;`(yue?#~L^`=bp6VR+5bEr^GrE*eNUl8)Jo^ai=r%U-DmTuh#ee=K z+t5YX%BAWsW`1Gt&>zN?w|BU|fRG^3;>w~mjz`AC3n`1Ll-I93RPSXU%hp}2->-Cc^x@N- z3a6NMFtj7w(?n#kPgY~B2;Dq8^zf;7_^VuB*z;mHy)$>|ZZDf)s)y_honk^*#^`RZ zT0>$&`b+qeimtU9yx|t^)$ss!y_2{h?9%(7R?57OBVEF2O~wiF)ACO9!WhG{v_+*c zZ!e0{I|_H>raIXL!A|8B`8&`ZX`LUOL<^01X1#5L@$;j$N)pQ)_IzE2-hSSD0|d?r z%E(pjsG(ACsZ=)aOdC?6mB$s3Q#vW!SvAESe^m@q@`(GZ19%mR8^VV#83A zy^_S58}a(rxoOZYPm_y6XMw@*eHne84fd5 zZF*AWHneu;)X?)}Jzs+bD;J!7;!~Fzk1dY#D z%2$U`FbFlPhk0f!hBuz?-8XG=BnsOo|6zItZ^|BZtwH`4I3gh!!cr)mQn8rqq~6Rd zro_GGM!ZF0E?@omBCghzOg)Z4yKq`2y0rSN@jOS1_@z7~u9SI8)D2*@?PRLDvP8Yu z+QcPZjuLgM8sCiRUN1M!zgv_=L?ON!Y4~f%^CR{6j zQEad6UPDjIP=3Tf)sWK5ThCvBN6_O!B|MAPBM#{uUw$oD9;4@(P%Ok_S6Ivv;@EYv z`~}X;Bd$LwwR~SwoUv+FQv-Y)O}r|uuLPnxc(FtB-iPRE7`rwugwt<0FBou}6zo+O zI`3DNdpPJ6b+r^5@!B?p?P99ZT=E@ny(56cgX>eB>PP(QILT{Yt2!Cz^koHQw&w95 zv6rWvnrxi!K-1EOnF*HY{VkRSrRoKQRtNcq-mm-w4hY7dt-M|xwv$1b)qqQVm-1DV zc#yHpi+D9IngV;ZgJ3RnU^#Eb2$*obSJYGGbd#`GxDXHV)&}^;e^h}{)epcj845m(VyhMOb+$VpWr8Qyf#j_o63jG$G zGFvr7t{St%s|}hCm^pQQ^t$e3tMs*n3W-h~cGIoPbbY2$ajLjZ`?AmOKU|h(U3COJ0?Kj zx}e9U$}2VWTny*h)Irzlyc+j~;b2xFn>g=R?z$sCX|0zyIO5mgF;u{wF#ujFt1@E( zdxN^E+J>5>dHp+cD!b|M9*RSNo)=`=<%2l`MzauRhOX>xFA#tw|daE5;DwL4~5y&bT+2t>lnx zQ~|PgSzFoO`Q1o@4%L{Xj@YcdIV6J7>Fq08!VPKXwJU#+8F>id%?*k#nM_Xdw6_C&;4BrCA}|`*@&$kzl-hWl&9+ zAcHc8L9L;@nweg0t@LeiBRltC77G!1EX4!j1Jz>pK5*6q87+gCXg)R_1|CSEb0xC@ zxG;nGJagP-Yniy9RplM!78F&h!Mb?N(y0gAbCp=m&l$W4n!pPhwG|wnVi`+_&hwb1 z4TB~>@sjHe&P;QX){j^^(Eo0~%Ag0RYxf0Q?DS0^UxQ<|jOSPlju}!u^p5cp*e~eu zBAb7|QS3>k#|7?P)DJk2dw{w}jSAeBJyeKg@jb$g4 zUT@`)8xnu=?fs!8>j&68M+RH%hPLjG+4jlXP36`gJ8-xyl;QF1-YZMKi>>DbG^0R>Z z6qNPyDNeOC0QjJSyf=NJ#KOi!P(>*vd{h z;;f5GYkU_m5x}rm$1ddZY1cYo3w!0p1$2+Twqt7sH7fa5V8yq&nljJ{k8Keff!fdF zOhQ%7+Pj!bZ{8gXFmAAryt>vA*9jD1;GaPuCMeeEjuDBd)Y&?R?w}i`rSb^{mStAp z0@GH!R4a!;m!W)ww`rh&go74R| zSgO{DMu+~}TMgWxzNb}9^F$HeJb@-&ozhprZ=t@#3=xr!peg9I}{z>PT`v z<9xn^dbe1BuIlelh?wDPy_ph`gSUn_chz=o8ySiz4W8ZcVLR9Z)coW$j;7a)pMmYL z!8SwhyWV^K1hxpuoUYuFMJw~%JSd*+io+Gm-bV>7LR$diX-9?EX`wA$W7^$aLL#^jG}i7QIBTgsX4ez9tGJGcuhguWCevJlS5kd|*K@8ezLFK|kbL$-3bI*gGauvI_9Q7#@B01an=W&i*aijJZ0gs%Thuhz5|5#Gm>Vq>#gLeM-bxo>`RW5dGj>HfMT0qv4t>T{)B{S)(7 z6gvk-dXiS-c1ZX3_4n|&73Uk%z*?Q9`}(Eim&>vTqO!nF=A1)Prb?`H)+RO9W1d<^ z?ZXi_^!Z$NDQA!Gzt2*syu;&m`19M`{kto(ybpcwjlQ1)_`P<4G10y95SGBJzL=pE zhg_QOi{1sxnL#|UUAMKe3*4?J4JF!3&eYrv#pCh4X_6zQ1*@$Nnp5|i60y^xg&-Ph zY=_HAq?SonL%dL@slILe(73#eiJ*93bGUb-`mV^}={LyWMrylgD<>@BMC6Sr@uc?D zgS)Gw4o0>O6*Mko+H%BZ-q!kZg`sVHw}W2~t$3@otw`S}RL^AD!9KF)n|m4p7YH## zX48suOPHIQ*iEHOC98L+Wv2oMfx83O{pp6XCIu&m12dPL(Lt!;fYE*)-{*U+-#+DG zV{OijF16mKNnnU}@h8fcYp4aqTSW#JhsDHOn_517#pj{4PR9!Mei|h+nh%+bZzO*I zkK@d2KWk!C&M_@tC?N^1b#z-F`InRC*Z!EOF9Xp&YX6Kra@=I%ybPzHxPP;!x1yo# zk=VfYvz$gMY}4m84g>$AVTi0A|Neyk}^a_W{0aTB%w12Zzgd=Q_F3h7AMk|D@69W zL?MjzH9Rdia{>{T`YxW+oc4YQJ$+fvVmYK(dSJzmAs1jQ55jOR3$g8oewg*27}Cq^ z_ZQW+$V)Ukv;NX=vp&yRwBpAvJDPH;&;II9{8>^cc&E=#*=K9ht z=T-DFyCg80Hl?Z&e@@jmJ4L~K%G2T~N;18nB4=N>qB&=JZv|>!w-WMjdU=J;C;|#z4En)#OdJfcu_d@Zu?1~4O5bRjzhYK^rE~u> zuymLnLY+r|gh3$)> zUs^%yTi_?fmJ|r8{iS;V!o99zNrLi?1@U_X3)xn9X3hnNKrKZ4H8S*ia)Ja z)4z|H{B1U!HARS87PAC~T2HDyMAq|ZN_VfIqLH|S zyr5s@8F|$HDMC&ETNf`fh&>P4AE=Y1ohzQ+?CJAsn;_A)Cs}OY+EnXiJ;^rt*4tE{ zl2H3y@_K-zU%yW6KW!WS+vwK<#gOO|s=ko~7(_}WJ-ecvrdtl_q#xmF!JZR|P}DE< zoMz97Mx4=yc`~u1j-(G&DDIO`K=Pz7R`BjClt*%#Is|C(P+ z+Wx+Z`?rBDQn=#VFdGoqGR(LoWshQc>zr(1(U}v4kkN0V>6SO=PM@x@-`A~R&X zpxP%Pk35!6=gGurAAm5`H}Q<*wD(6C>8p4aBiGHW45$)^dYXn-4#^-`7rWmR!ui|i zwe>*I-yzNi7zEm14cHuW4JC87^f6Bhj+|hGy}pF!G)GP-0-{gu$;4qFgz&2Hp^>0rSIRC6xi#d*uG8F{;jsk zuY5l+>O!W-WC}~s)5p|%Ghe9M^0To{q2@Ub#&GR!H&lx`{S^thpdRV&n{K^r}KDT!w0 z=YEGzMJfSR#+=T%-rkm!DE65_QYz0D%4$=;snk7E)3#)^q9RQtbPg<3ehPic$czi1} z1~Y&#$d2Hiwub}SkqTuAN4vYxBZqXO$uN?L(6SOLlm&d&y_Xtg0Ed+^le-*5I>AHB zAXF%EMB3%`iCl`tl2jx~Mg9&I34(SRKtYTy$@X{Rda3M15#42dyHOB0wYwW5vQ;;l z93zP6C@a~Ga)V>aAe1P6#E`C%yA(A_5YbeoO^&fMCE6|#_&@@@qd321@*}>5bq{QOx@Vqnc#H{XLwDzrm`^2qfT5eQ`J|WO`Ra zu)PGLR~Jm~B8tG2NmHV%;Y#jq%*Z-j9de8a0$nykjuAkV>-xG&?M6u=>U2TmE=Si}}Nl%-%>iasiAg5baQpwEBhMDk+xt zTY}5~gf(Hrsq)9Row6Zco0}w%e{r_spCOPPze^y^{)+?>#jpBQ^a2rpC{u9&#DGAA0sAa!^jz%H+sjHZi zdNs{*-FtVV?BNdX#Vp8jT^4f8NyJ!L2_?!74t95AK|JGf4 z45HOVoXB{>Fv*Jit4kFA39HhGld$?VhiJC393l*Gw6kw=_WWG63aLusbBzrt+5k)h z(!R6in;hcC{2C}?s!!956#Dt;(ANUg7IDg+No?PRvJ-8m?NsvjUA*|xnCc*^)UV`< z#LA8U?u!hVCH_7AWPh?&MXDHOUqz3Mg?-=6v@Zkg*|d+Jrh64pcpNiIccLQa-KbBH{t)T>JDt(DXYf~-jwaHi@`UzABF(;GiF@B*Q zg;i&!3-mg`?v+g*0pwj#+@L_?@rFV){vi4t%gZUc-nKA-Pf18TTB&kSJfzXBv zge3BvzvOiQ;Da+fqRf)~Gdc_?ImhX;kYU6S31!mMC?j~9yW1h89=xh7ip+%>i2-mq z06Od|@Ie!(So^=UXG>9i7ohzi<~UXM(?JJP^oM9l^GY}^w|s`;h^llg>x#PfQhiD7 zSOQRoKNa_Wt?ES+VGwuVI-%=8!3mJlJ8kqD39U$i&u$bx3*!5XR&==&r$ucqgqZ$P zX+A?%_~(S<*Gwajd8`5|&A*4@{9n?MKjg2zE$8?J1o3aFWcX(U$Y(Eq26Xpnns&JN zQUVnjpW$JJM5qHlqN+@KH_8dl=kCUY?AE1rm!d+QL@es|6JZcd-{iiD;m9-+e)iYV z^?w7e;;%0X2Jo{^zsZcmmXkJZ5)|h*Kyms*KbHpq;MWc15J@U>g9Icb6$v1Cy%e=^ z^KY3k1X!JvJzUiN*X_td_&`#|W}|_Rzn+%oZ?G!9%h&|lOCcI`fiepwWUuZlk(1?L za1DGV8E^wCDshb8AZQKKTyP{`o8)V6)Yne?x@|jc%-1eOOlg;ra)|$XIm8;mINTvw z+|S(Wh1ToW^3_~)6x-y^>by@N>~`W_dX^_ZJ>zYVy0^0O2iN}}K|urnB#LvY@J?bV z)#-*{AYQqSYa~X{*M0BLs?_ucR)TdxtMw3(Fk<#AgU~x|hdXg3fCP!9Z6maSM1X{u z3o@F>`UeDwz~n&c+Y$gs0Oga!O?>uKkSL1m2c*P0q1Ad6-5po*g=DQCX(y^eg4zCs z9FBhjV{yY#CIDueHk}S-23Y@qI67cvu9FcEOVx-OoX@}=fK%;zZmV??%JrD#ZWQKI z#Tt%Ng(Q$a3$vA?{w7`dC-8gs&!#K?A)9u`?~=$4l0^QjM1GeXA|X3Rmz6T#5Ww}0<6gX4io}JgxLad^ggO}==Ur!>rE^K`b;4WaH@UJ*}JIA z_ql+Q4CD5dhcct1SJRY)A^T|z*=N#nQuh3QTa6_^A2gdSg=$(yhoxra0@Xo4p&Bvk zy$*2rT+|DY|9wYm{)zK%ybq)mIne$55W4uZ3hFYZfbX9J!M7Pysu zS|I}oi}T;yaN%#@tY-v5OTQYD*&7Q-MikGCs{aD_4vAfUy<^AUfxLOccHnOzH2=fb zPT7Et#Bmbz(hBoQpzi;@%+BZbCtsWA{3(3&v&`~;hc!V&hy7tlW^c%lJvi_gCkw^w;K3VAWF z|L-Vn|1A1H+1>Ovq~AMhBEB|Z#LEJGa~g-Nwbv^~w6Ns(GB!Nyk0LE4j z=n48QtWgwb!boWTX}~jyJBQSm^lMvRBJz86_6w!279kdJe2jqxi~#ui8@j*ss`Ruk zT)zEZcnE;DpmyK!{y{sZ`tY$|x0;`7{rh)VoTN^-KkzC1Y=r5zuySeH+AOcP&ymuc zNe2)+fa?zuq!lQH#$h9DPc zb5P1L2go5Zq4Vp-c*=oUzR6TYw!Y*a-WlT;+Bic)cd{V@O)8U5AQ zE@|o84NwSS0HU>Td0N&vdpkY_)=hz~B|sFNh_MBlm56^w*a8B4Z4zP20}^3NrQ!y_ z#sFc~n&O`B1&AmCjG{f9+TD%u3r2CB zM4IU{Co0fq{xiW^oo?E9nv+iWxwufdk}^j zbO2wQoP>Os`hl~IZ=hO@*gWTl+&2(L zk09l~NxAQh=DthuSygz*CmzamwiYlsU~}TWF#dgR3jy>fu_I;~KedGb+C&grm3$wy z#1kPqq%b-ujK0Az`YPs2rV-$wTt|@Ef8wG1o?p6LSBD%3p%3XQ5p&;ypDNA2&wYbQ zD)PSrAVI9`|61Ao?VI0#Ti9@EG*BM&+f*cxiGZXcNh)%KD)Ns^Bhd109raBl;YWWV zMg79j%a7jgsJ6=ST!Y)Jz7e^VdJRiS~#DV7Z7?8UVJ1_#&7{8<>2SE9FpqqEY`dZQb zBP07YF7W?-^BbP!e+#Ahw>H8yoay`P`#1tjl;3zZW*hQshz$E3B!+!b4dq5_D8Cj6 ziFRzrkX)q(RAlxyl=1&xt@wSg_1_pE|Joz`SIJ~jC+yz>U)^x(dgDZvoi$Lx*KlO^ z#=?!RA2S(79FbebOb#?{BK8d{ zp+*^eM|y$dgl3XdWDkPkzYzKGMW6jmROI6CQjsLTW`q0HKUGC8Ky4APGWKiiztF6- zh0$nFPsywX?C{`f6@gr6vwyIGjs(hI$Vc^mEOh(o3)gg^Bv#j&nK5JVPJ?XsNP96v zvu>4pB&EGLqEmOwU5nEG6rxSH1Hj&{J4Wa)v{p@@P~Y9UvzVL-!|;zlnI*SNFFNuj zXVHJ|Lw}9_sddK(8f_?ToNXblwjs0(X$VAmzrV#SKsXD1fqqV~2IeFtWL9~Z519lr z(h%NS)<`D7g4BoCm8FsuG6T$OL_73zm!~Kq%^H!;s*lX2KUaaXZks5MQvy{mE0Ln; zsKWW5uZYh}BO_=19vg7u%(`teG1ipoOCA zq@d=Id^UIM?GS|$hh*fO`P)SbK8~VibGP44QGhv$BIhjMVklTRT%XOEz8#~`;c$(d zvv`Z%jaL|NB@l4f)v39vG?sqI)=irTgiXXh-VxoF-7@qKbS}KVFni6qW`y}#=V|91 z>Oq@#E>T>U%XxS-is!ooG)rZ#t<5>`=Khmde zFBtofbdPyUmDLG2$GsEVd12x#tFI?8{Rcvj9){xif^vVCE!R+JrE z*eGld9QBz{*Vp$PvWW^s(WhN7rd4}?WN5+X!Vx}2vQZaW&k8Yya2D00fO zPXg0dJue&)RU{je@;Yzx>~Z7E%&DA2>o|!6%vJl<=q_u;RS8^d&-;*)ao*S9X|h+! z8Q{Rx^#knzuQDp*EQ7P-H!}zvtF#`tjq$!dF<&1VlgF9ZGUUluD0nTd zN=V0JP$u@0FXxxDI=2UD0H;-iYMsx&K)kH;!si2#OjA=Qnvb=fbM5R*Z}bma&4CEE8_w#3b-V-D zl(?i$EE>Iyi@NTtJ_?+{l6Og|&Q(nYII%v|KKah&;HZ#QK~|}YaS28x@_FZsKmFfN zEgrVo;9;5Y1J_~;7cz{w4b`R{(+rO(1cz|{SL#B3Dy#+ZOfaHFle^JSOsV{LU-7wVH;nw{2g$%h)!+ zbs*-=%kVn+;Fve5wHC{7nv@?NOIrkiqn9}rkEqTE{5^}~( z``W_(vxY~sJYJu_V0=wwfOl~C;)Ckz1(Y{DAJ@mFa*6D7I>;&*&U^00izAVzUO%3` z7$x^eKEZM?7tK32b#sn|>t~0hPn3Sqn-q#MEU*8rUDhC!xInW+zNKw z@O&CFq2fCESn5*L6}b-yz<3hRyWK8qK`I|g_Oo2&K)tN)yw3RG^?CNeR!fH0Q48#- ztnrMtGs?k<6{%yPF_RZ{UTl3PQckXLy$ialYrr5tKju0!|D$S?;H~XO&A21Cyre2 zjTHnQPIz+I$wQv_aOlMPguz|QHA1_?dpYgiJxB^nI7mEWXmU8;qkbk>yK&L@VqM_w za7>n8mSneIzLM7!rvg^xXj+o*oEeDyeqD!o8pMDIZCT<<(ikFWkuOZiRq~vBv0CY;V?U-ZW^p zuEPQ^xy%yHOa&W2f!24At(&e~-nwo7CbCUCfd8{@a#^y69NM;d)5N(Qo9KZfj^=z0 zU>mbLw~UNz@9?d^2=h8xm_G~b_j<;^r>cJ!j^*gAnYVLlZGo(5KI%Dj+!FcHi9;^ zt3IdrK$O(}?E%5QE^)hi?flT;FN3z5Y;~Yivauc-Gl_bsE2Ghyx2M|C+bIfiZ7B}3G{>6GE7)u@kjr? zV=ipwFhBj);~wX>7oTtHi;^*a3hO)|v4xk46PNhlpd<>C8oYs0336^oDept^UJ zDZV|bHYykyq|0gatQT3vEzNplmInD!Q`YN#0|zVOVi;`o{?U%m-uwfpUiEZl%*Rkh ztJGhOjc2{xmW(P-;|DYZY&Y|=U+}+PF7m$KyB;x%HhFkf?>1F@;Z@X958n0oHDT@& zQ6&9pz2ls+ahtP0C7xRuKhXij;$};=@N3;V(A9}(!YUN9GSxSafR%Qu{P}g_VrP!rhj0zTmy9~k4y`*TsbKz%o z6cego(fEaa;KR_;Vx{64CATicNOS^ou5u{uRa5t?ThK{U2|Kq4XY5=k8oV^RN8%{e zt8=4%68ov*&W&7=I7yXqZtT4TB~@(sFuw#3mDwifRTaYHDLu|qSOUm<3eOILu9#a( zX=u(WPcG|FNV}nO>|v5Ay{vp@gb3&KjK28$8I1a{3Rb&nMjP1M7~4d~+px+QyKzQm zSec$}7^5-lo!)L;<@SWg3~4tkt|J*EnYpH~R;*-^;hdr0Sa|Mcy^%w;_Tv}5;K@bV zx=9PJ>RMKNImT4)lyNuo^vkRmS#BB5G0)!mf7QQ|e>~=GUY8^PL^f+d(n_I-rTAN2q`(Phf?^HAGgtf%jBr+X@wa45U zXCi|&>)C`c(ZYo9DyXg9^B7A8IhPeQ32}3eF1y_hZ1c)?=wr&Dupf1baHWZQ-6$&VDk)Nz@0drQ?7%}{mv)-CqEr^C$Kbuwj~k43ZM(kLNuE9Pmp zJ91wg=7Awtt>u^mVLdTc$C$WaT`|_Tn8aaydRFvI9I#G3Yt^lY2g_KTUT%{ zWEwCiM<_77^L#Gnl<<$1r498~XCHu-&!|$RpBwZOH>AoxH*iJ#I#u?$q4(mpRK?{V z`Nid_GRp_yWN?ZpqgnES(0-^*X_Ll{CKlY-#~D9R-YnIsJ7&gD1-RJ_wRga{o^$;N zf}(puNX`rn!(ygHX*mx2|JeH$aH!Mv|4wQn*^ZKP2P&Zw(l{h3Hkpk| zBwU;Jy{ zzH?n&-_>mHdA`qc-=F*V+_&s1CSG(D$Jf&tJu&($Dlw^XvyYQnAN<7nsK(?-Vk|PI ze&KMtXzFnKwq1zrq}%#Zn>So;N6$0byG2jXR!SawnU0>jW3No{k`q$rHc{U8o~!QT z@3mLN3-(5ev#GWozsF~nvy2(VZgrT97xx^ESI6d?Su~TLzx5pyvy!=lMK8Io!>_kE zSxOmuDHFYvth2EAyJ#sT>q`$4&R@nW{-lw8Ilr*m-WG2kRuhId&USBzd;YYocV()0 zbJ9aKL>2+XvUDNb3fmsJ$4GDCOKCprl_Ti2Hqsfz| zhOQt%IGOJZE~KOCKO>pFV{8vE>f?HA|S_rCNi&yQy$O1x_5#RMef zG;UTe%ZHzE@oT0}ga(w2-hmYv%+r?^*$}i6z1&FKPH(=gv^X|s33}NMZJXkGCv@sm zJer6699MuOAA;Fo~AS)SB&MC<=clpQtRnpBw9RvXi4ds6(EWiRE1a**n4=FtM$xWHwE zl+@(JC=I|K3?zdwLk zS({_-Ir?)aBhheT=kQ}#2i%2a41Tiz{mvll=i&6nY7N>yO(6*}tQ8*L3&B+9Da!ip zKJD?lG zGxp(Nr{^9J>NBp6P3vkRJ?|VNOHYHzaHy^a?GvMLlt)8}EQ-=Gaf8_BjQYLVGe@hV zFKvY%hj=~7y3 zGdTv)%yq=Zm!`WYerT1nMKc7JzWU`1meB%lZP4%LQ zIjjRWiNhX0ry;CVmnk0S?=u_?WaMdeq`CMQSA;h;;F4+7*yaxagZw+Cwr`jmYhzeV z;o83SIV(K981TDb*AM(SoHVBNYjfh(jcm`szH6hVR{)r`eo*_abPBe2@~Qbg9FC%| zZh<=<^uaT|`wzWj)iT~w3$^&u!NJB;FaxY=N8?+GjvQ9IAb4p?Wd%3W@vX=IG}6lX zZPf}IeAJCPvC=Q2*Kg%>B_e@sY3Y(3@Y__di1QF|Vve;{5+}llaKbOBfLLi^y#+aY z9nfp8Pp&_Lh#umPHGG?I68)UjbQI9vIR`XMxv4@ZM@6EBFXAMZzobn7-z351FB#{9 zZ>lG7x4hGN;G2>NP3-4a%MeVbKr^Xj?ff~~r}QS*FJcpIO}*|eBM8~&#O97w&eQ!p ziHWA=ZayOfD_^85H@k?*0q@4h*UaVOyl}@GBnXa;7Lw-WXn_s>X40y9OQtYi3bYzN zXq+loH2tNqFBA;_EGXH&BxldM;#JOdMWl}6SmFi@C z5K{FGul=C?AM_GxV--Q7gtQeg+`jmk^CMDciusmnr=mrt(w?*yNrw?lD{c=%L{zg_ z#QD-bv|Rg?){V~yc#R5f_qLHOkQ+l`nQ-?tEYgym5B(CFrPGu!iHVlLJ|%7$1(V)# zdHN!P%5Gs@f7&U_7d2ZJR=XRqtEV(`WD_pz`M-o@?USbMNj442A zHhe(F)p9Gk@!YbaPf?%{7m5Uk2iLOBHU9LnUl!6R+1!EFKmE5v5D@smf${n>nCmNhphKud>X2cQ<+XiP!bQw7XWk+Z(KBLJnOSx!mZ7-}TgzrEX$_k3_CD zI{02s!&WL3dv#~zYI3eLwUyA%Y^w=@6J&ifE>#7uw8W!*pIMw~L*`-8s7X4zHP>qjE&jCAbu#gk

js9K=Ly!+qzWYnzCGatDz3rk{NhC;7s+GPb_c;b{s&HoAgAJK|O zYMSm20EBP%s*t_$g~j!hJ=f)f4U>O7YIDqONP8^e${znwp?2C^w^jw!^|>W^Ic1^; z9tb2WU~|#$_fG$Z+MgAwTixD0k9)}NZ+`k3m0v=hdWz>>kWJzK%OMgWp$hmBYM#f0 zW=;caQDdHnE3DgrOwk{XY&ztv)m?xMkJLQGRPQdqrbSA~Xc&6mq1%%Ov3-$#2Hw&1 z-Q8VSgz!G$bN$Rg;z&tc53}rU?uQ55zssrhxyM6l5(GRlxZA(aoBbcKk?&5)TLdXI zyyWKmKd&GCp0@?>Pu(j~n9%HtBf=Gi%e7S<7d9H^#?al#<5-W#COC6jcN-QSsR?K9 z=%!+W^ur_LWsos+^==kcGSWgO-;k-+UBmaf@MPY^nBs)HEZ$G)SB1Rk%i`y=;PFx} zZwqp3-(`fL%6+=}B1`gJUX{gY<05-y^5a~!x*M^>k(vg~UEP(~ib#S1b9c8Txec47 z-z=j6XKHqnuu=MHk$#3uH*MGS)oEJn5LCm<)aE4*1kz>z4YLP$9xjFc^S2-$s%vloybZ07+GXA-Hlv;CF#Q>35UGn=}2<8zG9?>?077l>JM!K zYE0OK?JSFrKO$`LCg6y$k-46m^z?r?4>>`*U0V!~ar>K}zD5)>T$h?>M^67czgb}6 ze#qF+5$?6-X4zknNMC0Du#oyH0Cs}AH~&n6w*}_sUF!;C2Af7%?aqB-t}e>&+{ukt zU^mL<$I$)ALHd%i$UAf|a+E$oR>QzMmcFx_g6-08mL0!M-_h+xuFxkcKmmcFE>wRJ zaHj2kH1|BpJwNeI(v7zTZt1U23!8k=(sr+CSiHWYY$M!TwR;>Z6sc**+}S;dRg5GU zdf%q+>b520^np7AXKwF4O{QWok$&diLx@npZvFlL6E6a@^)Jz*FJTdCiX7MRwT~gL zf4-8Nb(HVlz6FpsjTtU)mW}f1x*L-+8*dsPX^s%&dDGlSSvi4eUO+)X1$fh1e-AWj z^;*}MTz>yNh5NX5$bUgt;-8O8|6vIjGr`DG`U7! zC{jXJ;}BD&+lxG`uO*Xj;2lSIA*TsIr!YQ>80#=}M=JAT-rS2KCwIn+d2?dk#EQ=` z?>DmuGdA;paaL*Bf4jl<9|4SApEJ|50>(BTF!FNivnnqD?h8BqZ*gDPxjgrUmw%a6 z)E~GnU*%tB6WKxWwDdn%OHYJ<@1y@)Ax<6V_NAqAAi2GQ}q_&J0_ppXJeV@rZG zcD?~r*@Lb5=;!n!%*Hzm8SX~B*f41IN1rii{uf&i|vF0{A(OX$#*3n9LyU#>@E$^R_@()ZD$l!mDo#>73)S zG?%b;roadSKy8K$1}|yI%Ye_k2;iHfA=BBe*RisnHjf``pMh*5AbCF?Ui-_7};@u zL?dVAzOZ@B$g6prUD+pK#xFU;p*MG9K;{~{xCL&?{I$-^9%Qbei(8=LQ61Eofr>|& ze2YKo%y_;uuY`D(Rn)+j#(XZoosG#j5)P}Qq-f8;^p}3atHtJR0mKDS=3~QuB(Oor zVs13Jtp!!#g3Hx^xy{-v18!?URk-1x3fDpg+)Fq|rhdN7O8w_J(|^4k2zg?Cyws(7B-IaZz3-%U{EgJCn0CS3pS=M;Esi8A;{g*56vyYs7o4_u+3)0u%9t|f` z^UeKhPQGv)w2{(+eC=JJzATC3cz=mTf?KcuOHBKx`X!#z{x>-7AOO_&IRHcy0pXuA zkS&DjDZXuH<_PXxg9?jnpm!7ol$wET;Z9De*{706P}x(#V@6(cjM?=E0nGTdX$jf@ z*nnb3sGj26E-6s*8dO-^2EC&yK&}Q9JKo{sYQ97xon?JkHoV>xe?rW^20s7wC;w1w z{#CK@-=d|zs=rme461LVL4g?*9RIeN8I&&^2AxMizR(4f_aH#(kW=3Cxtf9(0GeI) zme;okYTENn0BGhWBQF5NOJL77f$i!vl-AZX%9a)O>B3T>S_%VD?FcoJ`le?Or}&ly zS_1e%w_}_@wIiH!Rp!&p1W9(`8zKk+8S?t1@cN|8xVbpEXxRL@PYS38$AkWQP4HZ( zL&Z0p!8zBp{6K#_NznHe^ffyNZfbZHl$m#F=d}ZX8r6S&O=cF( zGzmDffWKp*#%_7EJSr z2}*ppoE>M@6Bn5(+i1Xvi9-=^Xu=HCvh1%@7C^?v4P>)9^=4mY&Y-{r>^R>21>XII z+1y_se(iF{{Lv%j<5UmGcKmBA@n&dVCN!(?>p33?UN1A=2&dU)@WK7-;ct7HL78hP zPYrd@}Abs7;p2oZK%A4jjtFA>*%bwV8x}<#SWcG1FCX}H5>yT?O z9WIVD9q#LynOZzxP5_^Vszc3C@P8Rthy#O!3D88Yug9$8c#SD| zrQowJ1^+x*fzz1cQzx^JL)AG2wtt-~Y!9Zw^?fWi`!Z&o*H~{>DvH+&;M*~UoQ|U( zn}UBDkO_5M2BWV3)Gx&mjBW+}QlJ|OpGRi?lRA$6^=81I^L76s?C@0u{$B^w&b}sp zM!X0x;g8m-|DrAk|8++4ukZY)PyS7>@YO25o!`o7AN8?c57%0n*Ku@q?KWq`j9;JR zKmT3>N%R%$5uM1;{VLn}KLj^{;ehs+cKQm;U2vOywUuM-J zLJm(<4w}&;L;Ws6WMi{-L3v|157DbU$Hz z)rtpP*P3Z!n!;m7UjAiv*bbQSOa6r@@~@bYy*S;aT^(%|`irTZhW?>Ufu(Z}7;Kn( ziY?%U+mtjBxoqq3zB{Vq5rQG8D{~-2oy?%Q3ZH`FoEG9=&76UT4ikB8a(SlZ%&qHh zOiQ4RKh>0#flIHFvdBAhFLIPVLKYbVdIS7X2l**=4Ha7aX=G*%&$Q&3mMt^i0$^Hp z{-MqDkxK7A)|BN&gFJQ{79ObyXYS~xVjV$mGfpQnXs*Ji%3G+=;@in^?&G{(X8*X6 znczy)$GqdW%~e0OG>G9M?>PH*YycVG{897h&9VVqQu<_(w>e6kq>qt7#?w!eL4l(T zXNu;>c=@L~3Mje#?aWLbGYa!2E6idGzNvWx0h~`6LMSMSjHTO>yYvw<$T+(FS4Fv> z%D_2u)|J0%Op(nq8E2C*n|1i)pC3U2d73u}QvM){)5{F^N3|^!l+-k2?(81KDn?Gn zf0+nL0kQE^S*{yrb1G(d;gi3ilktB=H1hNPYdQn!Wi~@C-LL480cLLUCd2);2yHr_ z{0CHd{rjOA1b~`9n~XlnGxuLcw0O+Oi$=~m8u>Xi4(h}}V?7q=!VKMMr8|+6^f9u? zXu2C22YQ=9oyWV@MMX|`)PI>v1QQ#l9e9Q=vwmqgF)L<7fq*y9Vw}0T^v}

cz$P@|J$^d@VExRTQdVG7SnU|~Kk)6VQu_3byq;=m<^7*2=1iby|;@6Ewo@L_hVVz0HL11~_%3y{y;;{!%x&EI1* z5_v`=uPeapx^zIdW&S3kv6E*s@*3gJDq{s1jaq+?(TL|6jsL4L@{dux*}Fi%Xl(m? zj7CYG(a3AdJlnR+PA*`MYn)kc++~ZVC7dxHZ?H9yO$OeuZs=Cwr;^8SMs&d=IRmdr zV8*r9#|hUgloRNL%Zu&s?rzQO?iO^Nu{Kp9cce{n;)0kuo85V;Kkt-cS}koA9)Bt= zwU#Q!=nT%!Kh>97%aU_P6-uPmwyk1aDAcq_hnw^au3|YC5-ie_x4HJV}?6E#J-<&yY_8jPOEvnJs-nQ@eBlw(N;}tyh*cls)vhI^D z9%dS0F7nH2+gr6~+oe3{BdADw{`llxxWK99PCJwaMwkCiJCH;7&$qzJ z{jdV&7^7>4Qr&W>i8iKehU_eG>P4Jsxq<0=a^V!omWqk+u_v zWuy7*g!H}Cbbn!>(NQVe2(`OD|NTZ(VSD&aJE8u((vir0CXRGWy+eJYrdRbjoZg_M zB^4J#bD|m45UELHXJeHVNhyy~MeWCr-gy}66m%bT`@7ObGz+3tO1{Ro>%m6bUx>D_Vj627e&s0R1`ez&&Nhm zf+^d+59|{_F1p7$u2~qW6MH|i(LF)Dy5yT72W9?2KvDcAm)9fl45HR~`uPpiWxTpGM!xtT zUs8>NyH?1lJtLbuA6VQOc2IFRZ_DfEvz|8JTdD4Qa<(_{Ntfiwv@J_jdmixbOgTu` zw3tu`UeYr3yT>bd`O?nw61Vq@Yo4<}c3jtn?Oku0G5YM}e);*$Yxq)6tNuWXrO&;! z?!xv7q4L5p5u|3Bao=UxdqeMcN*?M%orA z5K{_-i*TU<_Q&u0SlzsR%)?)MB!XIrrhZ=mYmQ{&wQ%1M7X;%DZ3*(zS%gr?XG@ z)ihr|z2E!MkkBzXUs>PVA`b)ow!KsqDaD}1qljZ2j);jdoEE#ki#woElCA% zB5O!%Vyut&9yQ+9-<{MvUeY}Ap|ZbHOH2~QY*b_qQJW{2j(w=n8Wf?mB?LT5C82kR^?oA{I( z{_E4IyUNPf$Fx|TNfwb!rB&T(BFs~YL(I*Dsv1fa^#Gu&|Gn^36tA}Kj?P}1#{O`* zE1e3z`=~}|z@RfJOyATd*nae2-1RI6V{KE_#r6JqI_2mk*LC=d`Hc2%(G#?llE+@A zqv!6}D^tAWgw(lBhfRg>l-!906mPxy0ppi_4@drs;t>Xx2weZ>GRlCh`y$6vDO3j&0H((-G9==@-@EPpgPQ(mbstMpaB z^!QCrQGRl+K6>?(uS6!x(c^5*QU12~6>(!nn9d~z+vPoy+mbRLQI5Q-KIESz)rVHv zaJd~l&-u~~G{2F~T0MboDGlq3*U*c1=&UYY`$JXrU~g8cRz#ND*bPF%fN^&Tw2ra+ zK5w)1Ds13R^lGxUckvt%=@r(2ThYolewELsP)76I z#usPZ(72!?ZvsQnFt&BWY`IlXI zs&-F#kHZ<9zWYnZEZk+ugBGSpcPkl~Pda_P!~N0Y-C`OLrT0@&%Fd-Oqm{pRNXpfB z>-M<}2sMjkZ#Rz1sqL5cDo&$3eg6K!rg8fi{*;2MXk(Ghva7HH$s3Mh?^K~r8Xb7A zKi_u4A#8Ley87qV_o+cRSPDLFSmw?BzO_sJmc%$Kfp-)3F*KP&(FuIhlFg*3tU4By ztdz9F$Z(6Eu#x@)J>_KSr`WKn$c1FRJ9+G^El=K<2QUzKv}F6h+AP( zdZbIi-BZ^c2ewG;GzxaHN&k$|6dM%L2R10_g_HY%Jj`ROMb>AE4BTyk4<;AbZ+W;h zsG&J4`NPYl#%ByqV`Gn?6|mQjMA#YW*y)QW%L-y6c1GBc_nurIoPw8F*!Qs4-7oe? zl)}oTep?$iLAygd?%j(w-&(q~s~OPQ1~Z6LyBXnZq@9cY!ASRkzF_i3H*EY)^nUWb zJNg2)p_|Hky$$n}@RZli*TtLQBir*Z+rU|&wvUD7hX&NOoE@Xgr5o;!oOE02%q!3y zHXbl{!;FJkLrx#8ip#G>_ly-@IN~cR@T4Gp6h}j>)}&azFHN3|9}l~e#sz}=wEX!B zw|kW_+|O(+D-YccL#40KyzE2KSWsuLC31d~ULRIz^ZE{~zpM03Z19oDwMGZu>uK0Z zg<`Mnj9g7#dpNdnLa^|)!zRP-b1*IUeeRuhGBEb-?p8OS(rqw@O%v@RCf(a7 zPel2}w>99?I?j6VCAAlh$4FYa0y?_^ox}Z%+m^0oKb|*+o)@-EwiL0(2|lnC3Bzvj zqwYN)f@91|-x#8dd(4Od;L1uY66DXYJ924r*@Uqqlo?2~A$5?TcA(%JJLl zZi)28PQg2ydz&4_XsIpI8vS^sTVsafJw=AyDI`V4DY$+$qECH;pO#BU`ndIoQG}e( ze)au(`s$ZA@PG1{+v)eYX*O zt=@Xub!FIq%>65Gde#%yj83dSeoZ}5ab@4N`-&?Y*Pvjmko!InFrjFIVMCFB*FG|= z+h9^MQQ0UH=M0|^65XveE}ic7i>T5@CdnXvH_<^@pj=3m|49L}J#MPwg5l(H2!VMx zIkmd{LSyFj59P<1A+@0zzCZY-pwflgWDf!O+THsDkPV!|6e~K=<-So%GgA|y4eQ(DeVtRt27dfpL}a4|Hp$7+ug5qy!3D_0;O()2OSF@gZh6sG)6xzM z$32Gb^9OG928`Dx(c8Xr0HE&B`J2h|^ELb_ZDnGVBge%Zr&vjL?s!R9q`A9#%b|yo z1u@5!7#H*`Hu~iZ-u7JKgFk*-Tve1(2!y?E$`^_Wjch!x-ewQTuof%XWVi?`Ia+xs zkr-)$6^7YGZ>yqjObX}@?6qyy!z(I0MX4looQP6gj`Bi6p$jW20Pb#f;=FN7q`1lI z$(i@)@MF~J{_z8kGdvBOi<(3ZHW%e?Kh~vqOCtWfv9_BiUxgdigFN{jo$Wg=lu-@Lj28g;JfH(byVfI@*Q`g7oPp-%r zsG6$Fjc_a?aG;ZP!M(Lef*eoC-W(qX;MmO!4n6a3UY^1lU^M^U|5MG1if;UIt-vQM zATx)$I5v)R+TN!C%d~m>PeG!=yOo6K8u`hDuc8|_QMD$}^~ze1 zO$z|hAXsg{pa5D%;TA&Wskx@Fa7oPeU2c=Byc7x%5;MyrDI`3;a7F=l;b1hFo9s2bU~E+RBHD|V;j)B!;;VZTQ`np zY}UFpvH4Pk!?n865RF91d9_9UJu3Y1wCNZUqMIaWf%8z`F#uqOJrC7T$6_?ng%1k< zhQK91-pw&4UQT69fSpb7%oGi-p^F!Sce)=Zs`Ms@WbO8e!ht0zZGls<8^aM=NUJhZ z2Lem#C0y#`OJt|pmSD`X$!|xv`?6phW?X#WmxJ_^+WvD>d{rG`A zm-myaqcb@6!r%jVdCx<_Rvtwk?oX|@e1Y~ocEs|=)K$kwEFe6OcQ+iF*QxHP zO%7I;?hTM@0iKh)791}pvhhbTa-S_xDX^zOd}V2QllCR8pYR$sz}i?zIRZT=7oamZ zlup03>dHm2^`pR!D=Jkyflv4?X-*dEB(S|cZtJ4Sw^g^!oG7pewQ*u(;GQA{GI$S* zk*)ABD_eJfxOE}o@NUfGMh@h~TP-PW(PX1nnbvYXg z!-*s9bqbrw_iMmv;y;`p_K@G)Yqq4q9TyT%=X5X~_}O8mQy|?F7t`S8;&O-0Vcj09 zv{>o%C+-fV>Xe+2`>6IFDijY<*bL#6!sf}1g;WRj_14de(Y%{Wq)G(Cgb%V+hE=Bj zQZ$5-I%T77t^^VQLk+Z+o))#MgCY5A92)CDP$v5xkOJ_WoP&X}3j-T`Z&zYap?lBI zrXCHqlgk_TUDClr=xuhGV~ic1oPhzptSWqBepsyX$thUTM-u8Xj*WE?bPIwb0?#Rq z=nbv;M|H{@9VX2g$l?cuYWqziqKv-Wpi@4@U_*hc4?QQ})(5?(*%~XGQ40iu>6fJ( z-LDZX8*6pElW4-Kg?*=+6aC+-@H19S$++Nj{8|fpWy89KL+Z9q1abgZb<>BdNt_)4 zhUqgG@hLnjldkF&TAGi2(t$Z>B?aDyd=Iis2g9Q!;?8pixfVU%tvCGAYk|G-?nP*H zPlMG!bsVJ4I3_Z9PJT83T!vnRG{R!Z9_fF8oPoF#wVZ+e!^)nD1UOzm!Wit-CoZh3l5F`xVLZTW)h$g$sgnJy*Ud(*CcrToUodg26%s+n&W4_o^GYhv<`xqz zx%uNAM89zgf=wG&WHT$+zc?(_8t?By_zhz~!T@8@p1HG&ned7&JqS(q8-sBG2ThK%`u5I zZJ4U^1cz`D8{iQ@>XvVEEZ40Q*92%jR#EYjZvXB0Rn5^lUhZMtqb1_~`Rh*5Z?DUu2XSHRyR?0fdEz1+9^UygM+<+P^Y=I&( ziDybZIt?N^y;JpA<3En55#PCvLh2)Jbo~|Ko&pb zX`q$g)it8*ei7BgQSjM*5wF~-VOShPtN=b)O&EU@+yw`mBD0L->HH zZoTgB#@<-uNP8E#Vt#!N$rV3V7$&ZDKcp=@eUqMpv1aElQaSMLF8s^EpF}CksUJEA z{Tqm<)O<5wx02`wAM}=O4BCgG#R`y{7F{=^QAuwA!82eZ{M!=?OE>F*Kezp_O#N6Q zznCnK@bfh$gN-1l_xF%0?jtr@r*--7jDjViG7o7t6#>eZIFy$baY^~nX+JqV{Ccle zQG2Z@UnzqMw7XKI`cSt?7QW#eQ~0?SL_3B<+nqbwO9$REl!^Uo2Urz9AqKB`DEsv; z*3MNMTw<#@d`G?6Pvg9mB|0X6y0)H0s+j0&s5@@6RrS~!{2IB?qeXUBq3PAf&pcFB zStA;HsK~}DBwaacLoqdH6lBAjQE%j9*q&AA%KB6t2@~%sUWhHlJ#p9Q^J|dy-F3gY zW*D%_cw~}$IbXNLtu9RpQGtKC=w(OA@U@yc4qBpoS20J?+xQk6Pv?=aQQIQCtWpZq zX2NK3uZmv~?dRWh;f%sKa}8|xwqHFvgc!ScfRPsB|Kj-`?dS9*iz}5j7-&CVIlV{V ztp#2h%J9o$j}UdZNX7;|-xsZKyRNHhVT2sY`D_)=gdww1bhS?*?oNjVzvj{%nP9&X zMw_G@7t!?5wPz&9%)BeBo|WZDm35e*ae&Dm3QTj6UtWf@T%~5#+5z`+uoX>)Zo6u8 zqUbDZIfi8fHn)xo&A(c9R?r)rbl`5AwYXge)dW9h)g{Em(b7hLiJ zn#!Tod#)IVgehJA$LSp4*9R?fa(Vkusjnj%=K{9+;Zh;Lr71e9UH-07KFXA=D!l@4R62(P;8c4<1G_cbmS zzq-CIEvVBcBu_k(`rw&%yMTMpBGoRxGch@&B)TF}yrH9^uZIF{gu)CqLae=?ec@c$ zFy`32Ta-M!U%JlJhVUY!u>QAc6?#ey5yY z^?C#d$kG7(9U5l&DjQ!YUNBy7~RfR_!g_JY~MgI_$WcwLsWt}IrLe663daVh2A z{*Th(9egD&lq*;r@U|nU7E|(ZaCjilMh-iZ^V6un_ z=WZNUEDLDvQ>X7v&j$Enen8d$_1S3CI>#WIe#A&|#n5_t=6QMYULh&FIqie_Tb$5voQzZB3hCS;N&!V`fpEYBtr(rDchMX z`z5sOBxut9#27@viQASwlj=Gr|@)9>5-%G4g_@qE0_p|@Xc z^hZjRPt-y7LmFgq+*&wIBkqf_rxOyQo)b{!=<7TN6r$x|@L)g8B^y^%7QJq~W2DTO zVs^aUrlly5;deJK^mLK4RX}=3I{EnNhbq-;&V{-ad0Smhe_d;RUL|Xdsnx;YJc+oZ ziiq%Vt-PF0SC~V1{CY{U#~Q~Vn2To^bad>;o?#8ZM!Ndw87>@Uk)2-Wr_xaS>d1yv zE-XcA-Do+kK8fN5c&^EgqBgi$K(#A)r_edg)9L2&{L4+}^DVA4-e3Ta_!?v<*Q*=| zeg{Et8-U=vO3j>)WPvrKgvqE)UCnp({-x>IMPHjv04t@^WV?JW=f!2oYPW_mUY5m4 zd^l_lpq(C70He{Ifhez?nJ7C$QfCWxKvTra*`?PbE854vqZzTZ*SXh&L9;uIt`*rd zJxlJ(ih)fx;C%rCA4{L*8yxni=coAday#Vd4 zB|eo&WZem(Q)q6hy8))z07)(?J>!Nu5IVDsa6${QgVOf0CX~8!JEg}<+9A0Z>D;V( z#y=BqS$b{f^L45MHIQ;cIeYFZ&nYdP%E9x}P;DM1bhfxx$E)kMUT7$fu1LsHGr{^C zA5_cau$PE0?7T}$ZlJr0%a-LeQ+rJuu!LNvp||St1FFaBg>VH7tX^zbb7%a}&awWI z@$T*8m)Bv0dV$wB_?R?b^8p?bI=N3m#|3|ISmW~G&SI+gDdJd78j3|F=CeBx>`|7m z-h?Y_OB`yqdP7)!q?nV6Lzkh@$S;zrUCypTB}6K-zaqr@MbRFO=T++sK0PM1&J1U@ z?aydBF?RIY_`KC8bdRliyZxu9Rl6}2xsBV@UAC|JE#8ZLLVEv=b%dcb!!CmPcQ!`v z5VCT_w{yeoJdYIITPyMA!>@q{l+_=!92Wf3N9B(^&sz=VE7l>aEcV%{_{CLkjIcCc z9=%l9CZa7fM31&c%1AK6?&l*q*tP54e4iYsr@Zfh^#A=)dqZ%sifXf5Mn!#yo**f$ zGWW4*WOdwoM|TZ1EGYf3*=oASjx+~tck#%4>{_WebCMV8DerkO*GO=ZkGhWS$;uhE zKqIRy_So$LYYb?-lc{iNNzg%)V#4{k$>Q^;qVVna#G1~nE9&&oW*qjJn_M^Ic2Za- z!q$8q^wMo@7iRdad2^ z(5kD#6E!toxLK;iSMx>mU$9istS(!3AjacdLwvJVhZnAhY7yv`w%13zKITFH5XG>J=f7A)ncoF#a8_s~#M=O0!p}`p{vYoc(rSZExzbHG6M{MePf$ z46Ga3RX@*2bYaC(tH!(&ZH#pf=VQYbO=mOIaPu-k%ZB}X?lI;WRrVX71U&iim=Zr9 zQ|Q4zz2ju8s)k#aAz1FwWQ$=w&i}c}RXz3Kx`O`e#jf?+SRzU0`|K*_aKY-}i@T2P z%X&6y5rM1)!n51&2WprH)1Q#p>uS=AiWh5baiH&SOa}}qKLZ9`*aaBW5-@1@$mT}^ z6lL({B1?s{&K130jjrD@XWGI8F;#KSDzyCtg0Qt@mN5EG7>1nt*gO(&Qp<(zjd(>M zktH*hNP>SJ8NM1&{IId&OL0E~ zveQAeFK<$AzshT3QPw#>jr|m56XqrzGhu?e`XhmLgDqpaBUX)Doin}gMYPdpG~Kg` zIzFrFsjr%@FjO)<67q#;I%g$ySS#zhUJqRUQjPTw%&EnZ(Z6>Hv9KrovT&AOX{Q4#bH_ z8HJwv@?Mi+I_F<~l%3(=o&v@?BbIVkUaG-s_Aabj*8!&Bi_EPJwbxDy=-G?RnH0#s z1~^Cqv^VeTZqI5U0agdMxEX7Rt2(QUeMIPBDoXx)%^G)Rkw5 zNR9zm+;V|*4hd_9;K*koH~Qzz90-aIl>;cM1k2P)axJIQkq{P%EcNikhMx_;ColE% z%nT6zErjsr6{V2(;%Y>!k4NnZJl)M-7X_%Do((ljTupbnc=HqxdCVn&*Ko@+*7V6u|f`cVJ5i(tVf3@@T`DeGE6CGyz9(cTmS7Xpswj zWVMJA_r~v>%cshw3OMQBr6;#P-*rF;3zuB^lW|VbA}~Ev>6Y?YHS|JZENUO61ww+KCE-btN7)_@ya%nWlt)n#frh!EwbmKL^0?C_p zJcQNY47UX@DIssl0P3?GKOeV0g|i0tLtJl&0J!t1AxxsXj9RjAzZcR8vB6BysMdYhGXrl-QQ$UZ9maqhNx-E zA7!2CR%hy$JU4kCHgkIzGHEGb$mUpXPSfaj%bPJ^ocw5JNgMJORm1b2*FH%UWBH zdqoIhtk1-plN+h0`*hv!ONEz~+=usV6s4~AZAo8@IO%TgsiiTpwkAG3C(>bInYn#%wBBS!~5M2u@+VNFsSA0{x!1KH@WsLo*SM+hiO?8dZi zd0Q#+TauUNq%{8WO=XYXp3|Y_k1(b3-d4tbNKG^S5J0kcBgyb|UL#}KeI-2 zLoh+*QBz79JX=68)U=nGtBdeF@9Dz$L~rfyGoTj@(R(5whmtViO_V*c2Z&adS#H55pq@`?fLUf5EwI{k?yrs-|HkeycU-5L2i1o zw%2QL^Y42id@R7Ztj%(vO(BTi(pJUkN;*EJJn9=*WAEBf?bJM;tB>&Q8FI_-LcUvh z6tSxiGi;yB2wDJ^yOcDMY(;c&3i3%FrSM+aSm=)S%; zH9<8%=9w~kG?!GQ=j>MiCj}q6cMskxdGewu#_-uw_#op}!0y8C!*MFjX{Nni z%8m!P=l_rAqsTNIN)nYE41u@AtEw}O5Oc(lmUTzX89QSy9Ymns?YMAwDlGmQM^$nD zX=Mq+t<)#y!k9iOZAXabzV}5oI(G|%ADSQaxaUDR_F0nBMR=uq>U3cK3+c|RR@m5l zm^e|w*kiY0xGM=(T{c3tg5x?2885fX!{Xm}UG0r3Q^dC=4Bo7ujgDI-Av6}#PM@7# zY>%Iy642z;0i(Zk%Ncm1nk`1kK6X}d?|e+y zqW?=ZeOYtWZ_suKLfdhf>JP8HrGvn|6$sBKq)6UZ4-2|we73&Tc+87k+d)nmg+*~8 z5FF9n3q*HOO+a9xe9%Yq+AVz4j5)CRAv|dhSgje0YlA`u5{9?A?0nILb}aS2tc|GgtL+)CIT80>^&Wd!xJN3nqqyUPbG>(V#*-z*6ZF;SwZ!?{ z2VbI^7H5QK09Ur_?S&KIE6y)Gfui=-);wx1aDULJC0=r?K-_Ss(&=Ik+;ML5Rdw!z zaQEKx4|x7`ZScdY3^)#WWv3OWTZ);XT_l}dO`|=Oo4zOWl`X{_<|a#Pa8JCA8Yjhi zfxk%4A2{7Ou(o95qlrZIW)-ix1JU6ggw3j2dDg=P{iME~B3kc|{%scoiv5B+CQeM2 zZ20W#f9;)!}ZHWJbg6)`~NSFuV&1&b9fsV~p^a6P)<7+A0 ze}l7wT(MQX-ssT9MTiWP#y-}jp{Ni^Nmj16uo24J>7gk*aA&bo_7J~U)uA#^ZzvWb zhoua%l6E+zdN!6k?wy{JoLjfQnU#trY04wg&?IKzViLhY)Owdi_TEHrxFjZ@LtAEL z(xQnxM-ahVFvkdlE-zN?o=!@I6IWiFitjl$@y>UIzi!bxKCB8WEXpkgB$OIES7k_s zp-SjcdyyWsm2JBkoCB&fe|y4m8(jLAKIm&T++~`+Q&af_){cDo43dqzd|% z7yIs_Rf(}$R-*^Yf9n`-A5D%cS@_yH>d`b(fuCqY(S4;sAp5uDE*lO;$pLzb09Kp_ z2T4v3+k_ffZH-kz{Z3JhLL|hBO53y{OCrHxTojxlV2bR$Q{)>zzW`tx7gKEuT66N~ z(D$?|GiqXD8fAf6wf#l05`MkLs%uHA2M*u?3=`f-91U>6MQf0LdbncSy)$Nf2pVB7`i66q&LZ2+YWb8j{9`iUugDkNWz~d zS`VM*!!`-k%~${j<5ZQAr3C+n%^rgzo^B^hwBMJlLN?|aw+VUO2Y4!*FX=4iFbeV7 zj1dEXP*5JU6Cz>4nr5Y9}xEAA4( z*yaB8W$(eG%|G$oA_-kAZYTIav zFn-O!Wz*kQO##H;>Vx(MzynT6or>BM-aotB88X9e5FA#tAIHsg-fDGf8yj_3^;zFs2hJTAl%U0HAXRg6COz1aX()1tqo831SZ#l@UIOI&0LMUMKvLyUkOkCUxbnjSaFacmJgsYR6vwW>y>@GsZC^nt2G!CvZ6FWb_ z>JEu=$;bg0^1}T_54wOwR-g+ zS0Byzft_1X%j!#BSp+b4XR0RT3)0Nb_UW*`uP43I3}C2bDkdNWX{KkJby&;lE1rTX z1sj56QX-P@%%xbARz-K?Yq!rC9c|lHEiVOUCf`dxFV1Rsp9sDJvPR-VD-~eMZRvxC zq1;I%p>HFriqu0r$av&n#{|2gs%+J`y12yFF}wNBgwe0W*F*GOAGPqsBW*JfN!eme z8%3!h)%Na;RR5}GG(_DGGUVw8-BI2kv9)>zi7lmO;H%XEUyah`3aK6184lT96Y{7W z2+JF)u4Ro0CW|lNh5>SOsd9 zHp9(Ss;#Bh*SHeHF>_|3B>4tzY3-J5NLCvHrfPT0os!&n8Gb7^djO|n-hkQC;dZ|| z?|_F|k6#=*G>hH#3gGwyFy$o3c1MCEBwR}wN3aF!X1;RB$8cY|`(^f^IfJv;4g%Kd zX18@1Nw|yLqo_TfR};~AkSblDoKwk?X5}6NoVKty{b57ZJHgzx?lP$ZF?|`0@sf=e zR~S1oO{SYVkM6_ojc47?HX?3=n+CLd< z8#YlkdM0gjubgYmsnp56XU2uf4Ab|V6LaEolaD_DNW||h^MBI0DX_5Le=tTa$V2=F zt2j_5UcrtHc!&xR^!pEG0D4LF(s)S-AgS%)w+)Tz>etCLLG@XENWF>qxN3h!DXgbr z(>%Vr{YdkxeYicIXI$$G5#Vc9oD)ln*b8zp4?SqvEN;5j&2lNsf1@0eP}oh6viI;* zd;4D_oPROZIs8X04d)8im{7UQN4~_=xnUY$`8T(5)BPS$di>28Wr3%9_XR;%x@H8G zohGR4UNG%IWoJhm4iJxtdq|JNmO4XW=Q$FPGXWrH13=COI|LT&=3eF_j%Z?E&YatZ z+*Rzuc}Zb)^1vsQVZU#Ouj4F+D~Yha$8hncf}ic1RkdSbJpHUB$~b^?_SX1<`$WH- zg!02?N!a6j}jx;&J{yr1O_P^h)y9 zd2`flym7@kp1JFvTEb{==d=+eeJI@i)hKxa6qr71{hEV(>oVTW>-5}*+0L-zmo2M3 zPi5aopMJ@!H^LH1Ue~21WcCj&a+Z)qK_DHtpirrutQQuDbk>oofX*(7ou8}O#bw1~H*#+&A2$g$8*7NIx_OP3iF-U@ z>|WAC`ztFO8G9`^1+D)1;GEX+JCrWBZ@UX9t)(nXt|&!6+|zY=IHP49UKD$hqdyK| z-q5=o-afNP=)$o{5;RP=CE40JG7E?VpyH3aR|zRUgdbZ}WGw~MRe&%uC3hxzvH1yuRo6(`~U@%!8a#t9&Ha&*7 zE;r4;D&VkCYi-f|6}uZ;&sQ=)iRBcOYiWa;VBO| zJ6PALEOzaO{TvY@8kO3&Jd51D&!TZg=lp)79qkhOX34aNjsTsB;Z>C6zSMW)}IHA8Oscy)p^yQE$C~ zP~jz$6W0|qOm#k=*i`vP{wv)RyPs*xr?NrEX9A8dojxTVH;r?USfbnKkc{=3XtKNz zUy>Zs>$>!v&q{0Uk+{Xsy3|U#@6mAM!plJxzb|%7y9!aszJE9Sx_y_#5zWcld0|;*qKibKbF~{Qe55-{(Td?q>qIc*#wnO@ILacV>>X6 z0vF=n$tPf!2UoHD`!eSg_4w5AJvQ$1!WCB^96@9Q*U)t;K?G;NSqJ&X+NKXT?~)VO zMn%Ih%77jMcTASEeFI_VZxD96&~D|g+b+I6#pWT5let<7pGGv+wR40RR=D{xIg@?L zcHNBo`AVw=$nte%o(MC#FR=0jY~a=FYun+}N2Gl_Hq}KZm^SDcdDdE~FQFr?l^L8 zlC{V|maGUM{8JEZPvX=)956_uo|8wD)rZif{QQeXb;k?DOiWLevatTeO|W#VcQq1=;P&+1g~#uh_QXmqRdC=MN-SwM zWbfhlJsu466Ped3!e|vi{wsxmdS#KYntrT$fNCAg zZ<3TI$j+0GoE$Vu9YUv<8%>v5C4Ua(4dmZ#tZPq8x9hTD=Ueo%a&J(p{-^{gT>g9j zBL9`}tu{zBQ=AbcO@jw|>cR4aq}Md?ZswdRz|wN|C_l~LM~PB(SA6bcm2l?C5^K~ zyZr-aft35RJcJB#ZqG>p<~Un6jrczPTl}&2mkryabOjCLoC7l7?FSm;f}*AZ%XmtO zII<9FXO~v95o4E@u@PgR#@#5`nHIKD@M9Wzqrf&TX`^6Q8f&BAhcx0w!B1&aU#X32 zwR>hCvB8G3|4cWT5(FsjOrZEa}!KYRk`PdCXz20)p;eIGh6#1P$r`1 zBwbs#X!j$sE{mOjO|L}M_6nsNf)9y69O>`7fK#Zq22-o(zEfJQ#B)LnADZG{_#Y!YFrt~RhGJ!8q!bh{ zZnPxVx&#O{aCVOXmh%7b-{(CgHTMRB0ZQNrwh8iT0_hV{8Ko0bMe3JG!RJ@Q=W17* zsq#-U-2uBfVOvSN8%-A)OecD_wR!cnxnjM<>La*>dh3Y*TXvYPL^vy^%Ayq&+<3@q zN-Eh9r1GV>5KwGoTXELJRz1m~+XR^3>u%^g#N1xqq{i4^-ZYnCRgO?&*p(yZGPaiI zsxchObLTQPmE+VH_T@OTv}ADtO?*(aFaa^01$<7>*B3KN!k_BM(sgf@a&@wj)gKKSt+*WhqIoSOm;TLq z#P=3dzVsTvwHss}qyYlKK$Rh_6(`ujUgtE?4u_-d`6s=Iny6Hf>yh*xA5-4Knc*Y% z7HJ6sMPhCfty$=riK^%-m=Vjn`K;ZY*O^pu4@l?<%#W-CZoph_N@ zXRH2lel=!X$7Awfsr9DqKhgAoR3eWy`ls8kK?oW&oIyPZxM-VE4)tLRAkKxCPxZ%K zLzpIFSIJv+Pwyd{P7`7ovyS>L=Rd(`mY}RS&RI<~rhh2@YRk0mPee7+z70orSk5%6 zI|dT0U5+zQW`JiywwA99Us=THXH^M#2E6$8<#-i(v6}DJaIDwZ)UXuedB~Fw(RHGZ z3%VFhs!P^L!_lbD;Xz%cHaNvAQl=`|ae);s@>yA=lv4sawLn?NuGbdUnBHU&y3%2ci>%TuR0f`f;>L(a_OekjDwlq#!upD)%0f(}8EJ z)!biOt$Ll*ivyX911eCXI&=AYA;W75CP$bq<*}+fD3GGUrb3w-X@ywmM&{QZUtrm| zFM(@KHu41qOPDARg#3xR^Yt;HFgR}(+uE{u``A?fTDxv{qG9_;bIl-nh^m_*b3m1I zcXC43^)zv-in=ev#1sf0d`QCpB0=TLF_F9CAScqG4{h^&H`U~1_8Q0&irgx%Ykc*! z8J{wokJQVzynDj;u62|li6(08hxaRV{BY5UmE)Llz$QSs!ZpDbFsVLMv00gwdLl}D zDCD;5dJA3bK)|5^4TS?5TE_UP+;J{LuIz^{@_kT8gU6FRmJE?lTy&$6X>ciZTz^pK zV8BIZcE{h9Pzpy_7=Eyy_e!vDTtE`);CtT|?Vjc(IqvxMzLegGL`&yV5FI(&L7}A! z=(+6Ac77Vt0O7>7WfCzB|6o9-(GTahpYyMUXx+$a!gU4LEKgM(5@rv&?|HD|(&^pF zD;4uywH6wd>2(9%*oORBbi5N#(UL6A2mLJn+RDZFJKrF!3L1J>D#S%?L%Z37UiTvZ zodc2ct5lR2xr{l>+OU8u*auXYLNdQ$f(gDU+I01?OmK9n?+bwHtx#sQY#oY_0(^pP3`mAXb>(-_b#lGE=A$#f^B5lj(*!$9e2VJ;%v$L!RS2awDDNV7#Qtc9vDsAJ;4!^&S(> z13gI;Sh=~(3dl2u!>_;kl!ac_$gqE*C0EO05Q!Oj-owJovQt%?w_DJq{R5SIvnI#` zNT2aIPPpkHlPTCe?%w5ViU*ud&tXUyZA4(bCfy^oz9|GHyql1x=Br@bAyfk%4KdF6 z_Ie;a@a}#a+oWi$VT!H~YZ=l7M_NKb>_IT0ryA7}^oU%h>z&jKnP6OIN9Z^{FfHlC zJYV+KbVXzrTT(PuY63{b?xyzm+xlK6ZHgf3fp|j~bvx_kiXH$p09Gcu8ue+qE4+M- zvXrIA9Z*Bhr%Y*$K^iyZCKJOBN;R~RC@&acd^;IgY_K}Rz8(PMOlP9QNxBmd)hfhL zVuH#(re33?qnOdZbb2gie`(I*ddjVwrS*ba*hTe)x3EjuYXdm)3J{i5At9 zZ;6)FvofJp9*(XOpea>fbWGY!ihA>#D-%Ibllfa{2#~Gw=ZGLRdvDh*B>m@Ylda2g zmT2h8)(-oO4~7vNnFC6Ox)UgT_RUa*=Qwkva;WTL%cnvYXM!zg2@ZSRq>dN<7IX-O z6(D~{R0Fbx^4uMGJc2O`NH|(HlYquWgsA*jTZydG@gIGHtjo?IBkR1RF43|X5nDAI zq_^4$J?T%Z3M#MTLIyOV5rYrTNZr8+6;Tm@SRn3z1LRg(dpEoaxclYV~~1^0>^{t7n$02QVR}>`a@>l z+)EChDDBYbq)QoG_LAPL2E6wGt5-+&uda< zMkIK|X`TNyI0-9XY1iB8L1D;Sjy~1EM8Wp+Y%{Zq!iDZ8u~n=e`?>CLR1pfwy9%>Iw#g1n2|S z>>3-!N}U#N3{u|Gm{0W1$6=bfec)kKnVw|$h@pb%CU~Q!%M2WGtF9^bhqXk9Q|C)S z>9mFR1Qa&T-aw`>m@H4G`b^)$>h$1-Ab+ba;L6grfFg<^Lyt8~S=60zMtwn0tKp)- z_+wJ_+G9j)$RNDls)+@WkqLedXH?V_n$i_-BE$LB>4$(-^@ZyzUMfHWo; zCIGw$ZIDImZbS1%Bh5~|^{#+*=Wu?_1hg$T^Btm~0+7ukhrDvF6zaO(2NSuI>jqL29pf?{=^M3-~ViT84vqySd=wh6WohBcy^%79YK9Z7^?4H@%#6b z8m{AHPAo!1F#!U3;R9Q=Q!|dKc5r-rF+Yuy9fTj~^-?)2J z^MM&LsghZP@H$yVl6AWKQyrZXt~!9aOfa<+oLvsv0VWU}Q!!ws%Y2<&miUNgv1^a0 zf^ir9a94(&04n!g$&V7l^uq(AwWURvTpA5{r{A!Ui5Yj#vNeAg(%16!;h+EmL$uTX z$O4*rWm4YL5%EkY+7QEYFZUKhwm6mD4f{E4*dq$$nbr9$YqDIB(xo%Tse{79fm9;( zUxgCe-t%C|DbBdLJwX4NRV1Wk@YGF~M?0qWZFMv@RVc*)%8e#k)aeX1BhMR)9mL%f z^1FksBWxK;#RDkdd|N&$HBoE%+qaLfsWPRN_n~WZnHZWiyUYchgNZ#RT(Yi_6R7W9 zP_a#8dMZLJoy#57sP8z!;ZX4`wAPz1=qwqQRV5kBDxPo()xsO;ztl-ufr5Yid`0A3Jzxr_QGU$%iG? z0?Wa4=WrD$3(xsmS$`Zg56K8+LLU}1~ki{Vn0j(FC(9NZ*hI+EqMi$bI@4l z5n~-`-@Ib;g{G=r!1j1G2grl!$vYF%*s5MU{M5)2oLbA^UJWi_MRs~eaao7-H5`= zT00=_0P3}?TsoPo;J}J{Ys{w>$Z?idSBec#A2G(&50SkJ?FyqhPywNVj;}zFJ)Vag zoB~pJ5@uM$RyDl0DFF@ux>eG)jtF{dKjr&+{lopce#tzkUJ|uTv!6Y_BN0P7!P=p; zE+SZW?YG5!w8XpDg#U?knfxZfC~CJ!*G;#FVe`jtp0?01JZ){oxUYRU3P0K4*KV*5 zkywX$-4@^8f6xNfNZsEatHfKy)hbFz(Jm^i$zI3pNX3NTP@52;X1!O}{Z#zKuYcG_ z(P=GVL(PTB2CKuC6%gBFC-Q05Iy7MBC7H?k6(a3d)*xN)KsZ>4ZB#@C?T(^h#+^fSTP zSiFjBQB=}miMD0e%JBrd;=i4ya|kVtbnsezRJu)b#Q8gG@Y ztT6F4OjB!Hx1SBAWq*%J2G*dt=WbEWvIX8GD#=pxifBk;qY|?g7EZnz?-CKUdGELG zU;9w}SbLjSD7*68Bnl^HGpEJK$d`OQ=vrq@_MYppnMS@!msPVnX&p~X3K=dDcEQ^! zOg5J+G`yT9!-u2rD-C|Mgzb)VnefXGiooH-ngU0CP+Zc`)H)t^+D~%4F=w-iitH<< zZF|T#;Nw6ft_f(&WNk~;#|K;m2B~a#^sSL^Az} zNY9?9e$=b2+O2~Yz*M)oFx?_D!jb#Y-VrTw-+9z~aOb8h_+{qH0h10aSRt|T+51{z z@YRF)^zdrZO?gMma{`zrxI|6=^U6r}8yUryhJ`l7=F1D6es_dYHg( zMP_0}rVS#SR|AH+m7>=rJ)G9By=7NB?240%collzByF`=Vgs_wlWIp=9_+u8$9Otz zi^|OPo2Tg;MyBnokm18a#z`N_UE-#I#yr-})YbUaG?MJUG4p=Ya7NOgC`B;0W*U~=r zqNGq@Q8ijpLFU*t7iK_YbY@GX>9jcL#3WtYg}W#@7nA)=9YKY*D`7WRwXnJ0UgD{8j9@9{5`*!dLrXEA??Sb0V! z{~0`?qwt#z)gNd-I7WBFBbke7W&3B25> zstiJ$=({vx2#5W;NtF>DCo)f?hHwP0#kCp0vPn4pjsSdP0gD;Aj9i#mI5&v%qOxIZ zTS>lT4ll=ZevE)j`c$3l1LyIgVdmUh1JR#>k7IY~ZrSloApfomi2TV`b=vZ&=H)zg!bJn~Ff<(sQ$(3%s81l+ zD16uYj7&;p27`^E$e*boyV_6}!yZ!l8)LwESpcZAXadL8$yraZr%J(Z#8G5b9NTj+ z7XIKOA{T!ReydfrFt%L<^D^23OI6VKm&OqWeIIgFe{zq|uW_P&!c>`3-JoGVb1GgI z>*I z3T79he6z?arrt@)HCs1XKM^kDvJeycG@z_HVts}o`GV2$@4#ZR@}&X%o3vGc6mcjjvK%uDUT zF2j6{HV*oJCDBUJSn}>^OmC1hf3TM3WR76ox>Pb?{xrg9dMOKfL4T4*`` zl#!sNV-y**zQEIKUGY7+sWS$m&J;kM#mp>Lm^L#qX@gnmg+&ROn~;wD5$rX66R$sG z$8oW6acoqW;CUDmxkBlsyVrWNSC+X4Z33=m#ie0$g}97a+O*tx?YUa@_Ev&GH|lf- zB@Szv#v*X?U*ojuZL9m8P%5F;yL7Y4k7 zx2-U}b)#K}h2^&of~i9+WqmO@L^gIJt#F2qDT+q9SO{;kgi%b&8gu;12zM{~h840- z3wyC1|f4s+bV9?IiyzB5FE)&K>r-(-jI+X_014( z!Z5mxd^y0t5bPF#JCpgMJ9I53&Nm>NAt|a!+JzJKKQrJp>3A!WK2+@2vu{Z6-^Gja zZ9^^#69~{QZmzj(;?-cT{=}c)kq=L|51>a$19L|m>|#Jd>jc^BE-45erQ8k@3}mAn z$94RXZ5G^XZM;=z?mJ~xf)*{rXnIarV{EQM$^(z{^a6?%nY3pL_P~zF{1zy87G`Ag zK@F;iLAUH$@BI-yFJ?S!RIvP58kaG6LMymEv5h=NYUpN_IdTic_le-2z$*X(@r*z? z+1=-g=Jp)`n|M`GQlU+LHDnj0hMcFywK5_<-mf8k`mrqfAs}7JpoI_X<&Y?z{(-jL z5#0^H95g$R60qZPeuEo`@u1E}rZgpDBNZ1-p%{Y#-qlLBBqVNO_AGAOa2U z@m$X(v|VlttzRw19i&MMN7!;kOawbv9tALM=R;3IPxA|^897rpn`RbPXxK(*zqqIn z;E@F_#^-8Q?rZgWnia-0%_xM^_BvOizQ#&$*o~^f0CEE|4Hm*_d5zPkCtG2VX{ZoR z=WCp1JVl+d%&0hS1Grh7o_d;GcLZg{_DM(;g*23X#*Dg7AzQ3+!6&Xh_2PbTD-dO zEum0TyfxFJX(XB|aLgYd$BZnz@H#&fRBY1hb6vc(n3v~T!t&W~r(zf>^pH{cmWowF zp<|JI^^@C%3!@{v{q{;T+K+ORK?jHog81I4QxmCbRFG*}I6meW$mVdC0lT4v(qeFT zxi9EU%#n#;55^cI`46s}v?z?&Ei4BHU?!V=kN_j>C$!97lc?{0yXmqxWY66`Z~hxndx$DjQm~jgCkqhLc^q zU|(5@9l!vnofHRE2HC(FsOG$%P07Ckxc>pbeNvcr%swa`$(4_#SgH+SX_-JpKeQ(+ zfZ4zNF#!+~CbJ7)Wz%kkYzVsQu+!%kx%FigNMCNp5+Y(+8;7wp8-a6X&&a~(83ixVTFL*b@`)JjYLTOgo#AMn%$1?SIm{!1*9=+1*N+HYMce` z!?XNG&<7f*wp#ML?UbUV62>=jOBjCd0knX2Xk<2#>jj!sgB2H}+bUQ`di3%ebhxT% z<9*y@XA5B(mjAPYRorKrEH~{PiL44#JMpk;2lqt;_CM3|w!7ZWWIF1I!}!Jh{^&68 zFqlSKY2(hOhsQ8+P8d@meT1?d)czTg?LY6}98jgc~%eaA)L8`0cf}cMrCB%6fSyDbz`4{E*9cFfhl9tB$>4 zw@<{p98@2`NRIvbLK{>36U!#X4tGJ&l@W2j9DWD9?LO!Oq7z!T=YCZ0x-U5u42ci2 zXVg#nb*LYjQY^qELC!aW2Opb@z08s#zuZKHGVGbqiUTFR3$soFX#@&tfna>%B$PoN z+c}HOnuNX0Bal}I`<~8LlJfke^@UafXE(ifu1L+jXRl0~VYngfoAUJ=zWO1Nang+v zOx*Ox_m(pL#-CR`3fHaYRMTdpj8&ESs-LYQSVS7yN^r;xrNX!$ zhqX-e4&g9f=W5n-tpo?%kSdIXIFUsf_{PPJq{7IE6Cu)&9LTU)vAMGvALS`4VwetK zn0<;ECMf_IredUqfo{Vp7Wl_XMf@Wi_(%D4Ma<9&%&adiQo zOf>g+;0Z(4BGl^>tOOozL{$bD4V_mXZ6!G3hEio*kHf;#SRowIYuvp0Fe`z(8&Z`4 zzEQ7FvJ!Z@kyIIBSSV=26IdHmJyszDlh2&Zl;1D|ar^(vb7@jF+)#SvtlIp&XWjJn zQpT326D-2cUN{WCyLIL)r{nedKlTlL9{3UPhhO?|>#_DXo|q!`*;==dFaDtPdVjT; zo2SwSicXKk{59909enX(5^^1OLEU2~huI9<#qF3jTW8y&-)=O;NfwAFl$gzRg5QLX z>pJ{ww@UK-=jSFbo&VtMXCK}laoBJay4{VBKL3mV{?WhrlZSqq<&7}IYLd5S=wlB3 zS58p!+~7u4&WhTSJV#|tV6tg&jyApV082@*qP8#(q09+LHVVdS(Q^c%dW}(JD*+P_+!Ick0E%x zwMV`y53e%11?bfN4OYmy@IDE-_W_<-uXdDCH;chLU^FQUMn9Mw9h{>pc<2?MXq z%4<^P983m&s6l5RKur>u*JkADCz6Tn~cgx-ycg5e+dY)BTXO`3H=YFso}j^O~k}{F2eZIWT(u0hp3tRV^(qcRJ@pvUjkh3J04E z3l?e7YZ9eE)vwPt3T>}6*gNCcL-{$yKR`&N;lVz;dsXPyq4EC`CmP)X$aN1Dw}R=6 zMp286TBoG(>HY^wm^HNu_+_vDQ-Kn2%)C){IZAL9r1=0Yi34zHSY7`Jt{}U-ypi1z zGs-SU39h0v-*bb6fBOZWo9LNR9oy)x5W9SjT6WEbl{Wv~K6z^Jfl9dijkIvmnGt$e z{$G}s{rf#b-58M0=%yyG3^2Ndk8J*5aS&b$_}q^I(GCovHZ+f^gqcTgJCHO9V_ADW zuStdDmCOys&ZD;+AWjlk)JEs!s&G7$3-fYSIZnyMV9`^lG^0b>AURwf6qqn)2JJ7z ztgq3%e}IrEtd=RxiAJ~Z{M>qHFLp~2V~;vKcwBVe1bX+na&ryYQB)KLyN1e_%z?y_X))Mj%DjfG@axhk% z-g$sJ38O_996(MInAIjZNVn0wwfFQWu~d{&jf%IBa_YGO{g0J9jVW%3oXXK6{Qr3o z9u_=IoBo0cF_o6ifAx_$evNhi8wfgM%`MVDm%>9w!EzKV|A}VXXFVQ8Q@H6Uu^esc z{}UZ`%2}~sQ)nN{fpRF(GOIFHm2)Urkf$>VV^(`V&ry|gI5{IYN0Tl(0GlNEt~MbL zp~`VdP720q(vKyxf<^P_v;!nBsVY-wRF2=XirD17@sCXTJJSC|gpHE2e@Q!A;e%-0 z&|8BPJEw@LiIf+C$*#ecF#3xF++fS;9G_(S;2a%#*#U1QjA^YP4>6r{EZHU)t3xk2 zfKn2yscktxRT3E2lJjtl(isaI6rclnw|K{sM@7p~-SkW9ajnGnkkQg#Jol)7kJ|WQ zZ2YTxzDrWqPGqZH;tC!+oUQ+6T?v=#;O_cDW0tckdIg&0lqddbGubZ-R&IoRyj#-$ zVfTZ_n@sCl@?xiRjwe&{n3D!OmtXg3uE1{t815)BDmPkoP1PI7?<44;yJai@b8Lm?7fZh4zIdU3{?@bNsfY4!!t*jZ&62-D?PLzdGZA zC3$ZGW1`t$67JsKl^3fl9c};mq^2lW8yeW{+1jfa z+MchOc=pK%#)e0o3Yys+wZecEa2rUHszaid`%Wp zS0A>ZvM4jaAi5E01L@HySTe##@fymV3RwYwC5;H4u?RY`th)ZTCZqd+%_NL@E#m+> z*iw@YJ#q1MaY=xcmKtr*@5!SD&uGo{Ptaq*j7H%<29~CyUim-PD+MOIXB>kjau`xk zrStP?LO=N6-^%ic;a{#G&-01pUfczNUH@1eZh4?Q$p7}78R!u_>X;>^r-37XPBKl( zB$5<(PI7b$P^bOhV1>r8_y3@1iQ2si*5tPFkNxtG{g!)4B_;)ChW~*W9o@p|Isb}- z;LZ>1DkScCAYt7Xg!UZ>n}o5by_^@T;s>v7JV2f#ogx0}NSpvim1;YE`hi`W)XE58 z{$&&|NBU^{zX7cN1&IsbW%S3IN9iAE^1w#%@^fM)AFUdNYzVTs3;2BrYMn5YHh2lg z`%?<)mP>(dsRW+i9lNTL=Pj+c)V<)b7_lDJz{B7AE)sZ8Vfk;(V<9)u*z_o1HQ=2jLSt$B$2 zK>lBbE*aN&F{FBGK&D=MseD%+-Y>L;3(ywI6xqTgu!RCewy+)ALdl4?z%=a@Jo!n2 zl(--f=68=U%EymXd)L@IzV!|IJvyqCpqi%f?xDO#`uvDn#_hPrNJp=;dXMD)WvLhW z!8P`>TiQZujgOARs|L2P8rp*P=obE;S|Lu-_Q$K=g7>AaI)|{Wsp8I0P!3;Px^i;1 z$&y>5hupBH&1U!Z74nYR-{|#=?>@Nt^qX&XS?yLH{E%ho^*)SRcMorA?so)wN0+qA zJ}{U3_1Yc*UQPoZcjMIpND%t>!T7=2?2cK9Ax}mMOkp4-3r8H1(p_Zg`6+@5Wusew zGQ|JaRybyb7r)ve>MT#OgWl049Z4E|so_^=lDS}_9-2um^jnqIUU*;fnn=H5Lv&mH z$NnL&A9nw*et7M*$?7OByWt!7VflYq8fXmZE=rVBoT@(!ysut)_=iWg0Aba?!U|!U zfjw||U(%++9f_8hTa7AyrbBN-`ugk#^tJ`?qD>g3{Pi_hlGw_o))>5I^T^pO`Dv7t zg9-gdp$7<$qZ>1qgHUsC{z|P(0(6KVHace zV*G9^#x3zqg+YP0-+Y7qQ@Jk-TxMx2C-S;|tms!p@XOEz(xeR6$n=kkdp-&cvRrxi zXGXUGCAoit6@Wa%B0aK`1RkeX)j!fyP#%KA+bcCk<)Kl9O3||In3beICWc>g+bIFO zWK%(T2nmQ~)2KW&s!%Ch@o4f{AGP!g19Nf%|GL1}AMb_!T@3IF_aG0c;K)}MnT~>` zqA>9<5VHRTTL4)Y~I!ISG5^QT)({>5ged$rnryVSEu-VCinJE#%^-nMidaujyk z<-oVPhO0WY7hOawTNZgVYvPFoGc=-Szcz1;SgX9jfE9HU3eeUj>g(7JB^o6+}@^zS8-j=9~~sb?#4#zH$9KW69F z@e^i`nKWiH*rDE-$MrW8#;c4S(|Tv}n0eq&{5_1&-abct-CSIb`x;6AXS&?q)8j^@ zgZK3nvkR#P47e^y$;sM!t=^lodk%Ljx4l_zOVx7vWsb)JO5~4~xdN4pg)?n`Q#++v zE5y^@ji+Q?evs|z_2Bgqt3Oo33+Gg3?j%eX@dHS;x@7bJ`0RCmv9kBM;Zq7$nC$u3 ztUkh*Hg;Xz^xs~+SzHkH+dkXQ&TC6|FHXBum3Q0hfP>}^w&TL3T9ekD*Pk<0`E*so z^Vb{o=1FetS&->7{*SJ6=4YuGfw zruHB%>AN%)KU04`XS)}lchz9=mGWJ4Un!aB9EwdKzMWv__iY)QG{q{aw#&8L^X(gqRmoFuE&9@?2 z^EbSma~e&_J%gLpRDT~sj(RFOvO&Cmk&0+?Ohey$$4)2ihw=T)7yfs1S(sizw~yoN zyFSDdeVbYzo@SluU$}XF>Yk+6Y5dsS1zB{*RZ0!%<=$p2s>zwJr1UUQ8jBB+j%w-l~h&C9L9fW%dhN{tXZDz zTznPtDAedp84M?)pd{d*#Fg}rNy6TIq*#onidqU)6I7`pJ{8YPLiI`b(OHGyTLuw{ zdxGKPiHIO>iA2aJlO!~vgb$P8(klr>Tz{MJB;FGFu29v63(K7)St6zqW09gRkwn~^ z&n2C{8oh%34LN9sYwl_Fm|g+f;?7DWL0zz4DD5Wgsf3C+pWn4L2-R`E@3kip$`ATn(N-h8IT-pDr95g6S?uQ7T!#v_5b4Zp z^^9J$kbovUk30Um))7KM+==&EfrPw+$FFD|CcHR!qISOZ`ii5fj%ngW@oZrjEEak9 z*IEe`UzZTOY$0YdKh>sDBqr69d9K{>9x_u8tcy0=sJE`k@7MJ{{^&(oTL>@X{M@wm z5?;lj=V^UUC_d=7TWc4=@Rx-PMPpBZMJ=oX)9vH2FV~x6)4>0is4SMyb!<6x$Utj< zPR;&z;kw>g8}!Vw;j>llShekhuTn|0qP>PsSGk?vx&ppT<$k`}x|tE;+3?vF0Xljy z^h4}an*eLS6ke*$3q2R2=r$n|>v#IJE51=*WlB%_*4YvHSys(E&3{yRY}NAG{J2U^ z{@WGi+f*Lqze_gvn6Xf=<3AYbwtC?~SgWv9&RBKqG^EK}9h=|&rJjDz^8VF6CKtw@H`W~aLGwP3~Ei_Ir% zem-1Li}-C-`}Ma;&BwYsuaIY7S*$lFK4ew6TE)7+qA}`vvz$Ygh0jTS5wXV45vy~= zgZf*b6Alm70egEpxVI?FlNT6H)_i$2mMvs9RF3gqE_NTMH}1lzrsqF4Tw%pgjqTQMv7UHOPdWa~@o*iJ zwci&_xT-hJ`HV+O{DqjB2LufYH??UVQz*D%8UmLfqEbeV@e<=;0n7TfFcSXS~&04DqjHM3J8!Oe!kHG`; zK(_|0WvtcpALPRFdG8Iky|}>R@U>S?j6eNjxJJd=z1B({dgGl>ZwpsXUAwDDZEJmP zfEniZ6zuiR3(c=cVSAiZpRifO4zVU=yrT`gL$Z)0@mVym+9AOgR;#FOEVq4L1NUD&DS$9Le5UQXBi7^H^|a#&)5B+&tUFvZ zZjYYBGIys7o$n7E(Eh*!)p z4Y5QXo@)KKQF0q2&Z29GXEBAqMg|SMOd1*X3@-7+h`T)aEK>HbLCTS7AA|$IT$<{DKZBby4hrwm(7C#*z!ERhabbaB-VcYC{)NVL==34mgl*FRP6Pt} zAUW(yIR)4lkrl$l_kYj_d+D$7P7aZPJCZ!eW^jRlUT{;^Zid_%Qd&(tV}PqRa-z_Lq0M6~=>L`(<4 zK3f{>f153!xN_wRiN~P00?|d2Vg*1jSgfHGEPh)RVu_zO5a)lBDk2JW01T2W$6&+; z5DsEcJP3KzNJ*uzlLb9WZ?XCiE|ZcLLVhg#njcHTfgkf?Bqnz|-V<-(dxkI-rV{}C zC*avp*`XN*pjo=5FF|uMt#I2H14|O#$OaqwB(OvX2z?5ua>axm!1w1QJd^^-{YqUa z(x6~L#0cP5^GTWW4J;KSc5UE2I@%AuN}(A_6$IB%s{N!b8Z9i@0t@NP6_TH@L3n|$ zzEHw~B3+dnH2@Uoxu@P0bP2we`@mjsL3VrRv5`xU{jKkCoW6p{dRa7lK@1Yu=L^v= z9fSK~G~kPvJjjg`n~BJGBZ`KF7qI3}X%fyDDjO-_2IZbk=_S9Uh4mvIh^X0N=(%;{ zV_)y)oHWQzn(lPW>C`(ovcquaaaeG+)t7UrP3CGLdlM8H-lZThFLQ?=jB|3ElMpNJ zDw6r!k!{soWU&c*WNFh5g>DEf9>~XV zq&&!M=S7wTJ&!?Vgy0cUegIkcvy2Sf`QW1Z{cFE=T9y)aF+RiKJdgOBG&C%AD+hAL zK-P)}Su1~M!#o@jw(@Tfv7!I~BC-wK8emVpNBe1jN;R-uRg0u#Y?!gghR^ty3?9)2 zgeq6qpWE2wQ5=I5tQ&_;2KNSmVe6|fDHCG>;)4GIlC9$SA16x~V{6$h82|h$qCEjL z2&7FxX^;d!s6RJCDSOg6%>@9XHNNW7h4fe$HD6OPPjvDlep!+$c232-Qk}<RRHR=4=l-vlN~Wn=4Zy|UmVX~N<3|o-H7k>&8hG9yVQs2M1wCi&WuL5B zTa1;~C6YbAeyK2tPazNTWn?bF^n4wb4%Io!ygX!e z`_M?9WIWF-ZD+p-_6o;g9T7pQTVz8aR6ceSfBRzY)W8f-3_4FV%@6hbis@leY_~p8 zFkDnYMdCu=;slj^4f6oAsG8TRZTt5+4`A*{7p^eO?<#%@(8WZ71Wc)zMFM~V&#WEMp5L@;F zL2b2Gxa?YpogbNnN)|vAPRiXux?2VrCm+a|paOUxra}szxA=<+-{8rMCuSLal4}Z{ zL&nkS(onJ1$p0Xb3Uj+8Uy#!3YXLH6UPGk>_ZihdHxQMijoFEGez z_^8>kam$KYHdrnL=naB9G0`jh5T^X!3rSo0w$2NM^w64=lG@)2`~hEiVhrTa-;Iml zUoMd$6d4SWVVXJ;&j$3sfchErmbB5HR6`}#C7D$SB!B>$T%bZUT>(PPh<$PRmR7f; z?(p@`k2E-FL%|W?1Z`@wQ|2IPmJ0P!HB5%&MXs|X;q#bV|BGnIrGA1G2vwuLBrgda zx+x2X9`h);lriIUx-=HatT+ze6t5E~*PpWG9&@PDw)?@)8`Pv<=W;jp1i$Zu+o! zy!*oK@mJHrcU44%x1oDio~$e^z39l}AyfUYvV}r#lw*5^&`Y58HiOu91Seehwx@O# z5~ud_)vZ1G31e^A;t+R)HzJ9bdwgwiJ6@7E^UM|_4cch&pa0=TXP&mm|81}Fqg;EO zm}TVHZh@49UX9LNMWP_)_cL5GufdQDpIEFZ3xmzt*B&A4S~oT!l4$c+YyJ5GGxp#% zAo7$}i^!qT0UtZgJV0xz1^aiSO znSRl`USsy2(>*N?Vc1vf76() z9gC5~FFDH4;m%JLUc{X|#=pXwV6~?^u@K>!gzM+ml(6rhNeu}LGjmYwcIUy?JEunb zRto#)sx9~3jO$+%Z1<8Z%ZZZCE+gG0dfq@BMm9W~n-95TZr?MiNxvDe_!}ePGJ9%Z zm$%8jSJvznSFPyGg~*_nd5ha&~-^2@G(H zkS)@7yfm6$!paUuL{W2}bA(;hEotNcoPXyG01+nO$fx<*vnjL+q2E?^a8Ar~a&$JI zcLzD(gO#Us>)C~ANnb{PqK#*^19aJNYSv5@Z&wj#Pc+6)B4m8@%2M075n5jC*3 zy{sDt&<8+>cBVH)$eEK)BiLBJnrq#-$P)NeEilKBY4X(r`zVHGs&|D!p-G?P<7amG zGm?T>cr~rViN{##K~^OO-r$&#L9}rIc9yEw37u#rQpzV@Vu%dd&g_7EFsL(ye23@qs;GT#`@?p^%1Ejg zA6dpdn82f*UyP)_TlyC{>2GXKI$I%Rs^C9#GiLNxji=tkOdSZJ%!Q-|^-SS%-MB z-rc0w=T?`6L0kShmHv6#pLt$}4q7mXHf2V>->)I9K(8iYmzPNm?I`jCY3W9j*&W#y z|HRTzJU*e&mLY=-Sc^-CEZs}w5{Q9a(?!i$$Tfq0Z7+|drNFiuCzwj<$q{}hZ| z!3`3>IdRjKq4ax)XIXFAYhw@_C*%~~1ujSRDjsnLn|96yT%e8My(ssSker+IoIkg2 z35a^^$80mgsARV^dIK)%&xNx3KbgkD&?G4L*7I=0A=B(HQ*~WLYOD|*cuCIamw{&u zMe1jq1lp9KH{zshNA4W+3G%Ux*5b?>Ss=?) zzdHDFY3KkuQxru$Y9Jjf41IOSU4;NI^FFV6dd|o=4)9(raa9XtLD#*)S%6iVkyRnE zjzBTb@54oB9_4kPudz#Bh^(i$EN>E=N$Iy!{dy>>4u;}TV1INp3M~Q|lrK$-&X7<1 zANIZiE~>QqUqvuLQ5q3223V#N_rdTOaB}KR z)HHxR2H=eSrc3rkpKjf^eRFI|(vrF$i^IFrlj7O4{7@>611HX{lp>OxAH_es@i-Z} zxx(1%&X=2e7K2uJzks3Z!w--A7u5W?91@p8hx9z6>3;JA(;NwS+@wQS@iBX19Ta$YpOLLAkZxyWRFm-|ic|JkQI~oC=-K z@2&m1gfZVR4Q#ScYS~+_64BPQChQr_;IJk>%Td)#Ab9KdJ_PNDX+7y5whGM{;Zoyg zw)z~NP7z$h0V8Y9uSGx?Z#fK;&KBixz*>jKJSczvR$rEbQAaMX=dR!KrHlp)=lVNt z*m|1PXR>sP&LVu6QgeP4qPZw~HoV!|4ACvQrfa(})>pWy()=zO>V-6O_|zeut_S64 z?+NX1L^>qma@a?}+r^{xR@mD+LrWWx>j59EaN3jx9AGLmhOqVOl$v=-hvAN4sMV;| zFe%rv3c{fdVPm6uum>4_uCsNRwSk?e=poHLB6B_l!t7%ykT#?GP&yzO#S(gTotuvCq-a zwWZ3X7d2}ZZJoT!-g3T^eeMG<^?HXE$NHL=8uj=Jtc++KviVo%jQiHp^d_bFg`pP( zm+mHZa+HL^r^OMvP{DTBP=O}ooy2Ai`%w6#_<-(;gD5DcFHK+rEcm$ts53s9_jHW-tP#q4&U>G67q3TaO3%A^X8)C24Zsqk+eAp z+ZYyH^|VE(rNNeF2N3Hs8RVR|(!_D~pyzKnrXU|Hu<=LI(Wz2b1rXel7KgC?-Ul7X z^^3W~Ms&t4zyEvx@m>me(mtV9N*?!3|7fZIaEllOjjr${sr54zFyex7|8d5uj#4sw7n?eN zPsxKpdl#EJ-V-#W9`eV}|698TZfe)Z+=Tq;-xHqS`j=nV1Lcad0FW!&U2K7bv64rR z>MpjxAJ~H2;D7BFv?`&_7M1JW!}j-wqneSLiNPEtVeolz6J028dr@eAGg2ebm%}~`J}0iGyTa3+7g`#P(oc)L zBcL0J5Jvlv->dK6#UpoUYqXL^`H^c2KhJEhjpkZy8pr?2qW+mzvTb$IUfBOQCW(M$ zfk3%U967wKZ|5vg0 zZ={RSKG;7YP~NqU1>%~;pBUGmjrN~SgN|(8*W^-CIQ5?Bni?HPrm>90UQ9u+j-kxFZ3V(gzRQr_eUQw)1H*Sy7ZSX9N>LU$H=S(;1T@d(f;F#J02hW zojPIS1m*Sl17y>i6e@-}{>C(Yl2BfFUwjc{(Z646g%v&=FXb;FwZab9Xd8}C_b-)z zh9UXjtMQcnsx<2nNQ1UXOz@B?xH zz6_nSq6*=?rT`=32Ob}MD_O@AQYB{c3GzyQNEYKo-@8e_qp?y3C>_5c>wo+Tq!a!D z=RpO~q|t^sFiI8UoX5s#SU)I@lA8grzJ;`OEVMMDrSZqLGa!x4KSvrJ0o90>Mzn6+ zjjx~*WHwJrHjNMoCYyd1o+6az-!BQ}f*ZH3$1nN|h_7(N+vA)4OU0ofNN)IKyorAl z4ZqZi0K6tX7$Qi!9)^Spfi|vPaHP%%v2yoDg0;+FcU%6?t(25MeO1a%i@4L!_K7DG zr2kce{S%xfw69=ju22^)2;_1E3w!ks^eG=Hj6__0S@%vA5fxoBd8lU*K37WS6fGfdB;cZwoJzZ##*8<+*}a89*^rUAh~iL zJ{Qm8PeH>kxxxeQiBEz6mRo9t4X)GH41v*V(m+ z0(~L@h$lEf1d%%~Ot6PXm?y)g#NhH#^tuKBRf}phzL7KKDL858xLy@d-)3#2? z01dwcGzw|o<_lr*caU7U0H1#Z!c0kyb?BfP4e{(2@&rtE^iML?rf5^WE9@6-A3#&> zxTzhtzCLaiM{a)q!nkEy4+KHeCs7!UbZB#hP}16mA#K`%A-Mh&wDyrmqqg?=F~|Vz zdI*voJ{GU$ugZdgU00IUI{!sc^{-Gtw4nqH<==iDTCdTWY^*%?UU2kf=In-W`TwA) zc6F=^M`vTuQT6Vl>K)mbew-i2cpQtSRbZs(sQL#$g)eE^zg;!`{n<&tR0}!+)JO;O zg4UyjHXOS!)x)_~>$?9E032#Di5TNvhNCBuM08p~;Od`q|+jg3u={{)k*)GVK05S>NMkY(_ImY|q!vTc6 zPjV*>5+qj4(AY-+Jg2W1QE`W}^iUKGBRPsE4N{)ev8wqI1DUgy1kNzCo(?1`MP9pw`d9i)92$Yt0>JWU|0r63 z@v|d|IDj_QXk>Et$mBO>?yeli&Hu4@XD5~NS~8jo`7`P!%x~6pz&6z5);C3n$-Z)Z zLV@(*^iHl1D(W@{7?6u!Xg_Q~2;L0Pet|K>vaf4{E)=*E<9_;<;P-DP9s z9{-|n4;{t)PJ0RX9qDiNn7?8ohJT-={NrN&|AKxBfNtDa{DwHnJq8MBek7;{>Rlay zm>MmP|I>{nb`78dLG|Qz5sgXuF7R&<;Xz9yS{irL_6Ly0ZzWy3l14BagO*0LH11Lw z$9|4(6huqoKePo@z~*pee`d<1EG7?2I)?11=Vn6J*M#uKuWXWimc1d_Ym@qfx8{(E zH*4;9J=XrCtNIV{P*JVVJhqB$5HuVe#WV5z*%Xtcx8;f3LsE2e$VqDLP@!50HJre!AQEi_P_EBGZ*{ULSQ5L@kifE*%P8h6v76D^IPGz$J4X$0s#XlX=CC+XMjYTnC^BS~N(=jX?E4tB)VpDz@2}&Rtyi zw{+q|7b5;s3lTRL!@L)o^ z;Xfy+=0fX6bk)M{s}`bvjx?gfm|c#&KnK;R)@MH{jG086>i>IF{f!0v-@xoewLXJZ z39rIXH8fWKX+R%wpv3T3<*um4q+pwI{x5yRYk+*%W)V3Om_ZT67UIO3sy!nqg`d^G3S0kkXYwC_uIR2Y?hb2XGd{A}~$~74Rr;S@e3K z?|37+4)K3^i0f|sGO*Uhp;35s3^lL@)oThh#0#XKfuZ)-4nMfSbU9Sx0Fd;98saqo zbj3%}&&;-F%b5TJYq-#*U;oQPTz4I?F^k!J^Dle2fXXja6H}0W2GVf9PCBHZ0Y=tr z(JWBJTo~Rmy5?)e<8NA8W12r7G5o5Q^7{rzfABScUj~b` z(|(SrE&yiBIdGsGSp0p{&Ub4l|NbH0faB=+bEI*(2JJZVGFKU)9mgLZdLQR0owhL# z)X;2Fsu<>c8AuFHI5ei|lSHw?hvTLE1;7?lI;hEVD0~u}aJU`?G@Sx_kO!l9;^Z52 za^U36sBQMip94Tp6*T{d$@RN-dj9<=_1_Q9e$UKB^_l`lW24xR;GFEQZSXaKd0t@W zTvRF%H5%I%Xypvf;8bPan&t)IYNJ}b^*P_4cZXEkOpvgJG5YnnG4|L=rOP!J?IY3 z`9EIO24rm(FOW?~iv*KRKg$FAsr+bE?bx@FhUST*dE&d{iGPND%i5rtl>Uh07`Z{W zc^^Fn7Ck>{*YlIqz7-gvTAu+q7+~N+VI-=6s|FHHV;=>~pQ(=rn?s^XX~2@M6@FkM z4LA{&WxJ#ch+<07#n(S>rvCj9&90jfd|!OMD`~VuOCwr0?pinQsG-@7r8enB`;De_ zXuolHexup^HutP21(=HTqnYYDG{W;=M)rC7d-D=^wx9jlZS_C2Uh4VN-By3mm||C! z+7xZ6(Uuyp)ODMtnqzeqr{svP2|{E}h(0>|c)!S#4+s68(Ox+|owp$frR@+dwTSk= zC)bO#j5pm?^2XS~wp@6109A4`26V6}2|=2*r9jeYOG1&B0FfL-EP=V3-?7XA7SNXf zs0Jd)g7S5jl6u!ha~BQ&Qg!gx)Xnw4-%RoU*^>-{*SnuX`uCGq(dnZs04|3K>cp+j zqlz5XbX%t5iTzb2p}^?4crGBd2ux%!1{$q^37xMDAQT%-<7=Z8AfGt4)d6jwZy~A= z2R*muubiSC#&h?nkH0?^xa%Vg%&lpbdav)u4|YJ~hk+xttKx(GRVASO@WyzMiB=L0 zbm#*?%dd$Xkg5x0x{ZJtUxGCJk}Eb_oXBQl+h${Ql>>S>@$QBb2PYZkz)O0QY0#`l>0JcYKsk+do$%@; zs+?xI@mUXqg{C9|dADs6VnR~_rWE_)7s0xk5Tt2a5+s@yRmo5hZ{lAnwZaCZ6q~oZ z=jKoI7m=b_kutw*F18IH{O*U{v;Y5o#`jN2Cq`$rZa`7}N*y@HE!#XHEVL!S*x|Nt zhzV_<1TZ0X9V|NhZj?JKyayQN4h%nxK+bK|)1U)u&Vu1xXomj+Y5Ey~HRVqVtSQlf zHM-N!t~>ph%>{TbbfVhl&V>u*`KyXUFTy+GJN^5`p}cV8Hn21ss5)eYe<@~IVTVrw zb78+WTN#dz-lF~(_o7ipv~u+S(V8N#^=ePYH9FYlLJz)h_okyoW}9l}nB3HYM@haW zOL|ud!@`P3Nr9$GdRHHztyNXOTIMRl!k~wJv1W8y*BHaXh=+ZNCa&C658a+=!}1g0zD>E zL?e}b&ue1Eh#q(t-`$f<3O#8A5fXpySV6^;g88+*0=5r7KGUr@Iw=mNq8a9P zU=ZcH8EBBR@bK*Y&-E6>oS!9A#!_Va>Qs{)o*tFJe7#H#J`%>B8)6vy3HD&^IS4%B z={*I-U0urEd-n`!;p`y+{>0jl#mdCY;J&_&j`@8S)DLcEYa_!5|9YQrRsxsBz?GwK zR@KGX4_!SScQfUV$V6;1RDrj8KLg3xo>1-E^L@5BAy?}T#ytCgVYz`&e$N-BLs)EP zDwfrDvu`WIFyucNhgFrJL0g2dTglzICDRdZ%-&oM0D zt6Wj>>WZW?UB}+!doFXX6C{OXJv0yBq{2~9Z&Y(O_<%_`K#XTYB0r1C3B%7lsh*|` zwI{G~*$`g8fFah4*BBe9l$PeGUsQ`}-lapRuc|%no*Er>oq*+7zi~I|3e!@pGXH_Z z+es{n9|x{BYMjyt=zB5~z>^OveK7aNeb#%WfV>UC^TtNVH*h^ZS@29AwcRl)syiqA zwdWtK!Er5C>Z(d}?%@8JWt_{_b&jrp+b#Pz{adJ-C_@$`$D%Z8Cnt8ksjJ$DBV zzg~FM!KZxG)azVK%S*get5*ld?qr1&?H7GIR*bFhlsQhSZYz93jpXd*Pc1wLCL?Rw z%T*UdGZ0SvLuMmllVN?GoCSB^y9MAFJ#;Pdyk?jFW|f)}`!#Wxa+_p%C6|FXyxoTd z-%mWne2SI|t2$nB*fIgM|A#Q}!~hqceXn{&aN>$uAUn<0X0OCzw2dUI7E{OSutto&}PP40Bb^rU_d%G>uN- zoD%mf7!8c33t03|DKF^HpP*xzjZ6-*D!5xOldb$}IN2tx`+mn6IT__w4KkF35KZtBhx~Yl+li}8vCOACyB^qKz#sAn+6G+Uw9&6<-;mZKL&DbOMQtscAIMlw z6i3Kp7xm_+eCkq&){%;NXp~Pp zz=0YD#2l~&pJNa~xDsLE*EsW;hJq*3yUvWZ*R^JbfdwhRXXQww9TQmm!q9LL;g;)W z>9*jOTu$!6q{!08e{24Fr=1M7qt4>ru)6}fsL7VD^oljt5nt z9hX%m$L8~WU&3zmwb+ypYnM4IrPhG&HQ^kkC%;p-!}#6b&mUxyTy07ocd6kA2gZ0?XY?d*`gOJrkcCKpSoNGDY7S1ZZ zek`l=KJ_?7PO=%3BI14Jc{j3Oq46#s6eX&o?WG zB@dZ+VES225GAxfIQy`o!}z662u;1ihR`YjMGqN&xNQr)8Lr}06Sw~3M#ra*O&^zW z6F_?OK9-e9Q#iA7+5E=GFtQ-)?fp@{kMa3P{DIGFQ#arBx-54{NOiaGZTS#&Ie6Vq zJF}`PFyYliIUjU}c!HDqGE zWR#~fR)hasvnyviuK`&TMtUbxJasy` z@urvP3e~=g!y|`2FjDi!IJ>~Q#QYv|oH7xA(I8$tIr=~Kcj+#!FO|ufF zKby)^em>)do;jA_00#FJ3oRAPcz~CZEUhvm?bb((z+vj-y@I%ZPgs9e&9bz<@Nq{o zFGl*}^|Y5Xsi#w^Q*Vt%KJ}Py+Vgh!;Sdf>eI%RHg;vr%{rr2rko+# zWu$XO+~l|W)CV%Fnh`^GE#{#dqgF8{Hm}S|IL;#uUpYO_k$*JuX3IkkR=u95E7ONk zme#{HqGNQHXt7-cEO|_V%*PGu7(3xdWnH+i`yZVx=nczo$q34j4CTUh34T6t++D$A zdE{QWF_}u_t)%gQPmIuuk#dE_YX$r;?3ec=&23yR!X5|9O1}%VIz3m^LS3Sm*?$h+ zRmVn(oaCBCDYj59twow>9!tQi29HTV2j3e3iBa#^JoCD9Ulu;BI`dT7SVI1a zyqJ7a0~s~pq%Gkkeu{I#vsuM*q?*sWQj|qk^u~JWPf+7PRs9%G=nxe~y_&cj%#N+n zTy1WH`k4|q85zsge>=F`Vm#o{(TGR0gFbIfq~vAt9j!hPFlm+3(a%Xj4E0Y2$I2JY z2a{W5(Ay?`VB+?xe|gB@puwTZ0GlLr8c*Pjb0?70A5F|>3+5-sOPcyTqiJ_Y+CMkd zzK+*?_S&2H@Ue1$)5bz?XY9wJwpTGy(j22l*%ogfQ>$E@z7bi zUFQmuJl%!R#cPF){-x)})vMDSRT0=Ya=stU49ZWGE0*)<^b?bG#wLqUm7b%?%|2aN zXi@FpQ*@b@-7|eOLee|#rGg!oh{asX#meCOw~4*jd`-sW3rg`@kt|$rzK{{`P8%!) z(-Zbwr|E+|__Bd@-Zx*uX}n^BC%tdFX$%+fT86V&F&;?q;KDj&SUd9WtB4n~vF2Wr z@xAVKQ{322*bNnG8j;%BMVZG<0vc-)Lgm^=;?BOQ zeY4zu(3aLvtP4C(gc_7}+WVd(j2y$7^5pS8;`NnJkt!5LvbH}#M;y24!Eg8ktANwNDOM-2*w zqbJAUCt}h=20fA~!nv$Yek3+$eIpkcee`Tk@C5P99hsIvMd`u*ijxWmxIAp&l~(~@ z5wp+Qd>440-uE0pl(m{`sodS#XMq>;f+ASJiPEHGsULfD#f?~mJ9yyD$t;ZPu4DH@ zs11-I7pj-{>DEGm$13J98~pr@moC+l>hI0gX6nSfr?2AnFn{Ls+Y$c0eb&QA1sv#m zAGbtLFD;LHsy{1%R~w{=T0AU!`c6mlUOf9i$9S~nsw7 zEQD?mnyb@GSLd3Sv|gfCIe&~Uj=qCM*U>V4%~ghOs^q>gTc4AXXyG_fO7wl~0-v)Q z7c`D&Flj`xj}cuRaD!g`d_k6tkdh{stBN!ULw)4V@zrQ5Pg!@$=V>xrZ(HUW>bo|d zGmB>gXKrSimB^%dRoX@O!=mP5G2loKzg^ru&{ zB&oerHX(|-TVd!5h;w$N-_eH4(q_^yevLpj!Thjhb@;m(&uEKd+4?fY3WwoV$}w4I z5*uQ5th2vcGyLnCj8y@4A-)4Smo0eqMB;TC`7kduyxg;fQu5cjT-gMVwXG}@c}~^)kXszkDy8-#345EcrI3}*RJQ;M5hBJ| z-EyDkidvLr^wEd8Ze%B0GAw&QH>$ME_*Pq9=jfv3wqaNAF|t?Zmy{U@4Jhd2syx3%wHng&q&9`ZOe7eU={ z<&&&pB0u>9BDeY+2+;xNlzj1&!kFt^_uR#N$#|n3DYTv~`v;5Bz|L>dJO;EM7M*-> zWQR^pb5ut14Lx~>3o4u;q3M_9mhSLuHo(}`b73`CeROrKm7Y8ZRW{kuygmCcbisE< zRQ13{KB3eo;Bxzjj6MxZ(wt^tvB$vZb7rrx;i#j4Nb+C7X;XcvENC7BXU{w=6@#e2 zUx^IJWKuTig=)yPmGK-Genm*PSkX0dO~xP4tB2RGnIF*V-%ACd=}6g9w+Gbyyg+sP zEQAWTewhpFSkjee1`qg8`!QM`$)IzZaB~ji@2)o9FdEAN?Y!-BOaO;m>we(^v_TdypYtlh#i z8wziBoW)Bg$evj~He8i4)5a{6gwaBmaa(lmgN>E8qz*i|rJfW>8!DRb{G@7C*qEAfHje%bLqe) zl5J*j41n@rHR1(}`r|as=v@C3)v4@E3fz8NB(}$O^M>A~3z8XAveAl{y zGRQRmKjpH@sY@BQ78i}O+b?Q$O^3fp5G&NjVW=Q|tla%HV@paouwqTF@}GJCBr`;e zMV{H-=KX^C!KE`Zd`Lg-R$|l1m{${6bA|4;TD{emELw>NaTfsJOwy@S$A#jjb@Y;4rChilqxnA5u{a<)NSD&G?W20%Fm|`vZndUz?iXjAn4e_s2vPeWODr$& z;VD&dJoA=t3>;${1dZYeO}0Um45!65!zJ@QoR#^OVcMUpeGHP4v9;{Fy55*ClL*cj z&)pqa8GXT~FF@vEb=o?TP4^sph$Q;0jz|}H=CCSplF4*U(`+m3V<9<)i{^J3{e2=s zI4M(``st}2(R3=|zdQC0?;YKoY}vsRGW=&UMcE#yW*meLdB1IE`w*1x+9u}L=<+aN zlcAc+^)~Uod~T(_5axX9CO4U}P9HCc0_V}ur7)F2JJS*av572DgXtLFeGpfGtlZ;z zwZl>@sUh~7_>p_pZ%Z&wUzguH;^CNacfljhSoIuQ7CZ5RboSyPHYFi{nO8_+@m&6T z+sbWBcSL#56{*?j)9pIC3Y8M~RAsp4FPKA!)w)btwMF25In6XEB>9B*@cgemKp&2T60;MORds`T(mGmBfQC;@%D3U zpGIV)|^&dvvoAveo*YOd7o93r;f5JaL%P zDxcj~&&qxr_Pa}mKLU~Zm)Md z8zn%Fq3X_ix`avrDcU=)|FW>Wu^XRB1w{-OvEkmz` zU!7rl?>&hnj~)&$((LhOp|n*7yE5+Oogzz$(aIG|@pSEpB3l#%mO!4dge4D__i@;Z z>+Gz;Yl)XFT1iYN$=WfsDqosd7jWy+!#^Zpu$kNEY4wG;Z)r32Kv4_)l-oeWGI1-z9L+Tj=whZ>q%vry&V^cUlB<@Y8#X-;<0zG3ADbXfO^%6|*GW8rD8zY@aQw z!YbUmqN`O{+?ziSK9#K(1I%yKqFOs6-m~`9wv)7UBnob4lI@lPkEWT^E%?lEr)d6` z?rAlMzZfr`?AF=WEyE!P&OVzM+ZDAe9DB`KxH%5;j45SeFqLP?b>$}I6y`8$q$u!k z*-onPj=Fi>K{lRZ`ua)nhVteE(P~e=8loA>wev6EQL80;E3MmgFBdDNdDg(D`lSl4 zO%4?i=?o7HU;lO<`use|Te-j!LFA~taki0BINGfKq8^TlSg$%<2XYpEt+zw>Wg(!0 zQW~qx3zUY^IKh|}J6+6fb>-y^y^sR`?Pz0$ko!uyRvjr7N8T#2qMdRn6MU#XOI8mR z-(o08%m{sn>3A_X?t^NFw5q|bmVGX!hi=2+B6b6D21_Hnn0rXEI#292vC;9x1U8k7 zYj#DIb@RE;2Khtd?vppQVizvWHN`W3ITowLi=L}DROH*LB(F|R@jhj^WnQ#+EAk+u zwe}VHp>5Y9Mcu;(u)6XIA+an99vjGeaIO|9*Vk?aqyx;5EO0>t)9ql`-J%C2cWx8Q zIu3JE0nfR7rXUjBx@pUtlsF$)+XB$$|D0%Z+}p3{SEXGQ0QP zSs)I13?9SMbE6-`f*z}h?g5NE!_X)f3xtzQmCDk8HGjFW+x&gB#&Is#`w-))S~YL? z$@Rnv(<>2v%p2WK@EIfAPgdoqATGG>NS{6s+T4|`Go@~R#a}ls4dLbv2_Le*q zN6@3K&}(tx`iziKjgQoeFTr}=9+wZGyNKy=ddbiA1F<6(!W^e?&pY#51Q)OR^9)Z+{(ovg$(i;cdnhAv`_16srU zOZard*X4nA?61Tb8s1=vJ=z+5-2N=!1ZOk2w2Bc4Hxm(yP>sE2Zn!%fzK^!glm+{P_EsPmd;KO)`>P`bPWUC;&hf{i5hP)GGkmp^G_P1)@2IbxUGWObxk zx${z&(EF~L4X1Ip=fZDK-92vMw&68ScGGu!`J&eQyJH?S4ZgvJ&h4kWT85LNAe>6I z*WYjBkZ2EQZ4G5g%#CY_IAJ5a;qC$c^ufWM5ow ziyEhQNWWKu10@d$Rme1sO*Xt6;E*t*u9HvkKzZhy+cmlO82A$0Sv>a6d0;jKzvDrP z8}x&iU)4xB_cQqv=2VO7zCb|vDjD{+k9O2q)N@sT9yxB!BxA9-9DlL&Y9O9Djq557koO&{Y_aBz3w6b9hFOLoT^8Tzh@$Q z8hP{*cBR5yzlWGZj4~Fj`(_)@wqs&fa`~nzo9qpnWj=)|RwFQi9r=my7@g)3{@oal^`IuoDN^HBi?}NTxYDT- zR?8Ap{x);*N*7*fMXz5>Y>3P2_f5Y3NZeR#+c`Rb59Gq!D*3AR+f?Cw6szA%!gwa; z9)1omYHtdMC`2cz!ux!!tl}CFr?ncwFJsg{EjixDyM_21T)i>s$p6;7)I#&gDj4sS zb_~u_K(+yh(hdz05MRnE)Fdg=)R?N0wQ5Q)FCROLqurF%HKBgezbzxR<4(hvdU*G?&`Y2l$rrN7)yu}{C z{}>O--+ZfRQO0CS8}AJ_%i}9E<8`P8oI4$tNhYXah>^>oY1=`&Pmi+T!ecXE5G*&7 zxgPsj1J)(dPl&{#-XR#M_Z<33KjLfd@U(E&oIr6j6=r*-lKIxMj`V!4ck{>K_7|q* z%ljwi#@d|^>8(j>#U)|mH|0;ZGO!TAHtFF*i)x8vWQ*JH3_$6)bj5=us3^7m)Z~v2Rt%xbsWS^csltGt)7`uZ@9oKz2h_+Sh|%S zpLdIj<_JniSUk^EQtZ0|59#_GlyOnkPpBTdx#-oz=ZAH8oHgt!oHrEus~&m;PAchp zR1Ha*&6ey@)jRnv*xXcJ>PrwHQ|PF{xuH=wMM@5XES(SK5-Mc6C!$vIlK;w|WF$+N$BAFmd*0`l;bS3=?1SZh!QN6^G0Idwfo zRp!~ljcT*OhoV$!7~N zw;giA1~u@x(h26|NKFU0KkF?|vd?HOnDMZPy9S%iy#)4lU{b!iF^|(yK#=U*{*+m4 zJXK=lbL^2;n2F9xv0shjmG_2*n$d}K7>Nw+H+j`EM8}x{$lRoxik#XaZ42v6^oE}U zvCbS%`1txu_&9ve)czsb#}KT@OKaM!@Xvu!I$m>JmOKMlY)or+c!ERl79_uJ9=(pS zuzznVtf7{swK4f4OrC!`7WMI-K3# z0cvARtvA~w(tL24%h&d87kq6Fw;~_dhGxMNAVek}SOa^H~Jw;@E>=2p@dD zlB7_!Q`MR6Hd^B`!6I2|3u7UQXWr_5IC6DJVuyo&%8Lt>1q{OBMq45i)$Y^F=6mvK zX9^bmv}fHZ7kiaxRjh|&@G z=R~l2$i62_cw$w4c+jF?yexUj`|@YW9m^3k@Pf<55zI9m2(pq~qpydPAVuvw*=k=i z%w7=gaE_vxVb5Vxq2Q}haRJaYJt9?NySd_Lj}dIwNtGNJ7tT|wOx?Lo8kl(q<9$h? z;VIrojwj?it?dEkrU-Tbi*fr7i#Y~jF|lJ~UOKhY7-GgOB^Y)*d;0JlMc8Z0y@)K4 zVp;F|mLg}XL&8N!0Pyqrr|(S*+hSNS+W^n2CgVq!P`2yo!S5tQ_!%gBDGb8Ta2fZN zbWJpo-rN{nW;b42GUGv*2wqO{Top+3Z-Ct_WgAr@uhtc;&HRN5++ZSXUzSbk98@CD zdQ3j4MDC9NopFqC`(nHzmR=84dcK^A$gPwm?z|~ERwYa9VhGsY+Kd5NM8I+fuhxcw zt5647>vtMfA*Fp~S=M!`zKLrB2$WOKmYsaDZQApAa7J%*ob{8H!x^QJXSKS+Y{jz& z+Lb>!1_=2q9Ira*1gDNIA7k+BeGPuKkcKL6A~l-=5{+Qcm|9X zy)>UKz1~;#LMHouH-2?FgZzbIq5i|d)DYsRzD$w+h-98M66<@yy_Huj1fto3c+WZ< zUy*Go!{g{I^PM;P>Q@}LD0}MBKQ>i$`yk!4xx=T}< zhk)KpNCJtjKnCmFQ0nZ-$*W1PKRDBdn({W!zpyjCWSz-uY*KJjg)_G7`cx7;QCVox zRq0{(a_?l~mvk86gzM3k6$$Q3I{ka)5}zstx|a-s80{WE;Tx}8FH4IC&-UG@8l z`rQs@#ay|evVc##WSkq>6h2aSwas|_t+JenCl@w^YDe}>f%WNC0BCHG7N??AI8&gg z(#?%DKPb*KGh7`5A)+N;oUPFAxR&m8y1m-GjKOsH21BO=kG0CDRi{Tsi>2GDkWrJY z@r-cI>yWgU?3~A?yVr|ON_WE}lBQbRPs>AyUDah><_HRMcI1EPQ2C$cX43l0bs|L4 zs@+O6fQhGf=!np6y_snN+CiylmUUIQ@dk zo0#O>hi}!@O|XwVH=i;rzey6iVVvhscT=(QDvOTHg3p<~jLWySbBuAU4?sBeqzsNa zrNSQGOilo}5ht{IYY$)7@mtj`?8R)?g~ge-aX#;dq-=nkYIh)+*zLoQY&=5jHYG7cV`2 zTdY&TTlcZ+YaEU*OIokQ+b|^)oM$QDlhwZbkgztweMY?@Pt)(BfBo|_Fh_~uKi3N9c;SU3lL^>6^fLq$wfhy!i=eBn_P#EQPHRO z`n^6CK9SJExw$gm?yqnT;lv|~>lO-2tB+v%>Pd4H`Roz7N`mv1ojpS(m&+?1u6M3|$LyIO@Y6&6CN(WrhrNu`h{gS!ndnhd@lOke+CnGQKv-oD! z5Ck}HL93QTfH5yZ^jz&EStS0O@qiGgh$b<>RUEzntki2`4rEX0OmQ3J7&>`J>dr@Y zlC~rLm=odKFpd>*o;ACQ0EefogF{%85_Mnj3;rkou~N8($j&8hRImLeHe4G}6>DG7pPmEabON)WaL}gMgok7Ojk|CGP^bLNF6ML&i5gT9m0B8sy2+y{1MH zGPnn4GAo;1m;(VOoqmd5F# zbp0?JG|+yLd=Ez;x1b#)E5DG;N>zncWvOfSkZ$jZ6MDi5RZOgEFXabP^hx+GYz*-% zId}$Sjs%MlncX3s!({xJY+UT)5iC@#4V|hC5!dPGgN7%)OF7KrCY*ya(E1^Pyq0O3 zeJ~fVDS~30gw#-mik!W2%*NlQsa8jTMyV_}+&AovE|aANabDkTmHx(5^&W|K%*9G0 zu9wOP3Ps|zm8YGd<{WEwU5(F;Q|rI*9-d=cawrOO(kNAB_9R6%D^Zj4UbLqhe@(AQ zY(iLkK*X$M%Sko~yq%hN_!$K*L5j74ZlH$y!nS6E)eQV9 zOuFq_wmfMQjuzdDwFpeLy-m@AX0n@Nz*`%k5^( zJO@oIEg(nyJ;@_GUQ?y{5olPdC_}@Y6X5u!_3alQdFi^d*i(~+P?sWs_``msgAx4D z@~UA-ObtK=v88HHi+!}9(WQ%@Q77^Ww%TIzVEZM`>6Q^wNsKm1UvC<&c>tW6hRb-C z-@${7AsHY%s7psPCB>)_J)zJ9(K|0@7d>fySDs9%YMQ7sxxS)Srq{$20G9PaT_G*N zlQx>^d}^A+p$shE##?92OzBMu4{51?+5q(6i_>yEmYPP(>N2w>Zb7{LD?8acF24QE zFzg4wbCOh0hAy7Tb2ztQ-gN#k!_a~^;3*V6$#)!9w9qIfTvYD`@=9mYNR$ft3FU+r zikmX<)>Pa2)>m8|*JnEg*XDg;Q5)P!X%$tOe$321fQtk09MXglWlnLoM~lK3;_QKQ zWO0G2n>N^zDs?MZA$M*S0KJCinmL=5vFk6=ToP7O@?jr=j8A-uyR8U-Y}2PPhck1@ z^p+t2WIM5ty>HBdW|-Y8H7~vwB}mc*>NreRO9Z|?_F@Lwo8B1I{OQ6*g^1AJ3wV%TP1EK z_gb#ub+6muYg2392I29XO3m8>=O26vJ_K=Fa1MU* zm|bFedzW;qX_&OH!q%zjq;nPEZ?9$aCE<>~RdcoJHG72Il zVujSLF5l5$yEYbuMijQAsml8H|P=vUr{CA)OhEa zIwY$bJxt2c86TIl@^m&z%4@SmlfCl;wTHp69T#4MGKM(nGQ8*QT6Tev7Pcn4Hsv$= z(NwU2xZ~j+%^Sw$tOu2>*JUsjd%kl4;yht znR1o9y=9HryqH1Z*x3w0j~9g#v9E@Xnj7G|1m74+QzOH7$-6O>tCp_S8u}{D>m4?s z-uiLDv&F|7CeC8;Hatu4y?ic+E&#vNPDJCK2-9$j+{!tAE#0{NNvqEvu}WH2Yi0=? zX1QtTbmQ9|=bEclePX+|H9(kjVc(xZAHC7(Z%8}e9HLGHf2 zR4=}GM0|O%zeo5ZcmJI628dkstg{CP?JNf#t%iLijV9!+Q}Pa#`Eg=d=P}(PdK{)m(0@n6DR2Sp(baO4Nl_ zV@-1Mz5%0P5wC0LAYn%SV1zl}c^tK>#-jM))^prFj{1aF2)vr-tlTtLqlZXv+^X2* zT;`}Xdez`1=e#JpiJc5BuTHvAie@nov0bsjy`AJtB6C4kXPxllaUpc3Oa~ZCAOf*hpiA`09b6rm7 zUD)xuH-}?V&oeYA(giWw@4I{_;b21GnE+Xj8;W-xDKKEtyd((8kygLLFwdGJ9TY9q zB+_(Re~RdyZaUm}BhaK5DW-TAuPHt@Euq>77N3yJiXa*)Rcm8viJjGp_bAV=mxEj{ zJgjP-6Pdra!o(EgGI(8yITG1MKLxN*kt+7x_23?yLNb%>7;Bl`D0tG z6lv#{YqBwih(nu--fZC9GT2XjI`z0bTmLnzzDe$>ECVbuEF~=7$Nkq7^KI!|$D!qw z*WQDLLI z&kcl{)j!L*=ark_d^Ui{=TpTqM}M>1x)O4@l!L^#D1<{UKp5BGBvVP?1-4Ng7xlk- zPJ+EG6|!%YhUbpoGqSLF*BHnKS!QYPop1)e72v?%ol+U0f+ z2!grPYGSji>#vxcJT>bvjP=x+A!5+5vWfeh$O(b!rnXPVMJvWG_!>BCViD^4T1I$> zFwePekTUz)R&sP6suEF*Y!CtV`>fNqD{emr%n=#J40 z81aA5_xQf&f6nim>$>H7+@1}tJ@@^+KlOdq{AJWEmjg@_(6?^$R_~g6wud!q-+D2% z&B680qu?0J2=#=jN9RQ;Q&Vrl^}c+n?%p2~0i$J?CP)M}Lh+ zuj46S1^paEI$Jz?CasqoO6o;LLv;|0wB2yR%hz_WPQzlwkH{w@hB>*C1Xaavxs;C!r!Y=8zrbUTu`^~M(+&uhM5#vnlB}tY!SSM*2n;$fRmeH?p z$Ui;_yrf)AdN`4%%6jRWHMv$yzzhV!dtDk_koX~>=%sD_bJJJbxzsmOse^Q^Z;ZD@ z2tS}@Ug?dG+&h5#UNZdnwWeW#SO%`}6l%#*Nykh6=&zyqIzIAM(9c06x5Gni(~9S? zM%BGyvP?DW8*B>h;@f4?oKV+z9ux2e-C}<#g~`4r)W>h>gD;oar~Bh;Tc9q7i%--Z zqr1|IG^x_Lzj}gC>J|@_jMI_n$(gpvP|ugG{72$umLyd*(FaJ?dj~&`%@1n5m<}G^ z`)erhlw9K}z8FPy3=CJj2zk-@r=6l>Ay@1Cqpyb5-Ps~)d&fu!{&FHbx@l6@)Zb%7 zRDU9i^%}A74LDND8Dg`u=oCb%)EjIn z=~kW4Xk)rWlN3!-Q|nj4b8744O#<#{Q<{K3N5U2U{(n&X9JJ6m6P~Vj?P%Ks=O`+b z%bV|jXo0dNZPCgs^zBigF1BcG_Fm^TtD=px8_xYdj(PeM-!{N6nXv`Za(~rq0^psXqqrMY?oodb%uEyvmn$!~z`YFW;!-V@A^UxQMCfZ>Vsj$c)tFN)_H&SDZIrq4jV|~nH z4fscRM)*cRdt80>J_2E1*jj=^_)HvoNy#P!oIyjzPM7{6^epi%J@R^KD9_ADv(Q|x z?}tY*((<1pGJ|%K*vkkp)IceW&;RBazzE)pw%4*$5vG?a_xvoc_HDaC&uz%1_(Puy znNq*(Jr$}{0fT@(7oS=0vF81r03Qlg6{>Lhgo41-72=$U7b@7qxwkXDbZ~iR70MEm zW}k@>XGwmOA(#E-FDs_%>?%|>kKJQfvnE7meh7FF&a zB(PASvirC5)^lz`6S#P6P_^*PH4|$TWbF1w%zzHduCol)Q||R8QDxNO^jjiHmAING zFcNXk@OtmVopVv~GWs^Bh4tzX##&7KDkc|Ch|s-zNwQ=~qKp>4akGJ{^nB@@N*r_x ztYdD|S9X&rQqz}_(p0_k7;BcoppvzBmmsc9Mdjrbta9|R2|h#DG`uu^kv0|3WB*9C zxjMY3JGYW~9qMptZFxS!qkZ>eLGIIT?6Ubw%~~HD1LrW2wn&jSQZ~?R#*OIcM#m^> zRdQO@F%zf0dqe1>6k(EBySIg6iq6XXs;YexnpZvy&&zM9eZ>oj{wA$B<)YPqBsL_>qT*vF;_N^F4qTkd`IZf&vmjZC5Srbiu*^2 zcGaHHx8qQh_qg%+i#nT!x*mEQAQP0}g9lk&2YdcwqGfhhTaYj4%n)XTPS7d$U1+?2 z1a514xv+BhMzqTR$!pBs8dt3{?J+RXc{NHb{*^(-~y;svbGaIywoQxUo6B9?(o zyy*w9sfyeU-VjW_^~sB{agUNu`3fT+7q~#4amqYQk_V>`s(q z+gBxgn3DZBm01nkNMz>iuSU``zl6xxBU*8WsEO}*SVK2wtW*8`TV!;WVq4h58k`(| z8-Mj92{VKh;dUrfGH)Y41#1st2E;1?7Lq7wn2pz&V5yW7!*S2 zr18+Vc|-8K;>O(7&k29fCEcfp%=%DHX5Asf-^N!>ci#+QL0BBh^ntgLkAk%WVFKd4 z4;H##((pXKr2?jK?idi5Lk+Ya^01~(jZyy z%cMbv4ZWS1v_+KPdI2tr_-vxiNbGR!HSqLymG$!jdFT6FO8!l<>Gxp6YYlNlj=e~G zzL1c#>^OJ_cE5sOU*K{_h#Y#JjH(HQg$3hBn~jxzEKhrubboG@N`BlcDa{6#$3^Zn zvHb2s?d0`6z7Wc|`@8DSV)rRj*gBx@PqPr|Y9WJp@#gW?UWHl$Frp3-@(yZK5ad3; z$=A@4O%=Ki8WTmG#32@PyjxNo`W=CHb@M9POyloa-tNd&AoE|?$Sm+{=F=EmczNLe zST=aj<*UYcO1GTPC+Xbf!lI)w)C$Sa%VH`!(9XP#_<*DbbCHBcdo+kv*7&Q&#AHcO z-oAKZS3`kiRG4>=ga=`9B$E(dqa1w1y51bj`d+kdEzZ^imyDSv2Fd!+{QQP96GFPb!cNQ}72Q?p{`=$CU_mwo*bol~3* z0@-9yuD{oqfJ`I>>%|)5y~QqctGpqtRbvwc+i0BouAn2Eqhf5S@5AWZ$K^q$HwjGj zyBT*iYC3HcyQtI)^WJ6)8z&>S#e!)44P|^d)kCsBo_+F$kuT7uoxHkhGyEZD?W)G1 z#|z0OF%v$82{hlgJh95B9;cvMoa3H2s7)6UNyr<;B*)jN0H?O$UhICKZAq=@M6LLo z+9t3`A-&J7EV5vs+?M4rH$%E!+%E3;rMxNMj9)X62gFV+CD<4CP^G89mkoSG@cZ|+k%Cp? zk`+v;6$!yXMBt4gYMWcvH#;H=?l#S)pt>?^;zlGCr zy`tD74?}j+MnIQWcu>2e?B^*^rM84U-S+E;$@}%zaf=^5zE*>o7N$Qrc-3~(5LCrw z1)Q^mn+wIw{|KH)VYrE*ahO&!81}cgYivlJ zAPPdKN8`Jh#^3Q^up+aJ(vfHWZ44#x{iw}j`tD4)4u6|mbt7ZNTC-gEMV)9RrQNU? z6BRT+@S+F|b6GFyB@PLbd$2Z{le!%k5*95WC@?qAavJ#PiY1%mApH{$9hnz=qANL= z*7lP6_q9F5?jHj8={FN^bOOeT1EB1}Upo!>HL4R3k1{7EN&VTvFsQzmVKZKb~Lf zRTyLLVHsT{YwXD)DHxG)9jY2Ujzj&?I(w!+O(O3X7404L3zo3}pb8Pq3RNXWX{nYmnVq=pnH1Q&VG{YBV-rL@ zkp_~9Kv<@WA~QahGCqbjaP#dlE4i$kxn{;Q`CoINCJjIhq9&Rd)WNqPk*1JH@%zDa zpTFa7c|2&QlpT_M0~$#eh`V-xvf{by6(ilRyrYGFM;R|??3+12^aM0w@LmQ5bfeCW zhCS@jMicB+z;SQZi6X0*zB+hKS}2fRyp-$#yXF;Euf`2Y`jK<}J3_%fH;0QW4Kf8o zo|_}WSfN7X4RWR<3eQKZ1DoX1i`-Je3O*xk!7l=~g$Uj>$vrhg;bEJcZe~WJzss$g zw6@y+8i+=sNF)=vu(^2(PsBP|e1@IEnF)gBGOHrWmBj|ZLKK<76eS=NMZu~V%%sT6 z!Y;&8-oV_Z!Be3YHBA2Oy?K0&v3bO6qsWZX*k}HVQBE#Vz!sv=N2*A}tO)s+cd%5H zGmkQtNe<5x#(Vt3fL^K3mHVPN3Cf`07u%0&Tm~oHrRiP4$U6*ih>N^Mz7qC%)cMn} zyxBn^c87GKxTdvJ7`O;J;eL*$jO!=gtf@#)-TVlAdJ#>>;jqn*r=XA6uIm#wtyS1~ z5nx`0sqmUYePL@O{Nixc%=jz`1N>suBUAMD%m&3?;ZCZ3dPQ;cz}8GUmD71ZBM$&G(&~v zuk)O$)Zw$1K_=gwVI4>z60NXibx*Eu74gjfX=8c9XxO)DLs9!_HFVWs`I{P-tzmo^ zSXSI?VPrjGQ7<$GFC61^xZCP70n1Wb)jsF2 z^>bqnaa^)eQpD^s-N@mx+$W#;vuQBI+Z+*L|1JHo9OqW2JOFdkkri1|C^BnCS^hTp z>UzeCj%NArMtS&QD=DK&oHxrwrHZ&E?ES4_HeG|TVpx6{@9DM%x;J*ISFoUSV3^29 zIvhzN-s$g{yA5E9!sS^Zs1-$0JU%tg_8Bia<5sGyb=- zK%)Zeia=$c4W2O3n7=2D&T6%*%jM`3RgCG``Iv*P^r4ciC)Z=xAj||-y4I!#t-lA) z3tayKi;r=1H1gq}%d@7JDc{@B-z(Rt_kcx@$)1$Ir*QG0_vK4@x=_7?_dTD*rx^1q z84w|9@$<}61p4L(0Ovl2N4zSPPKr3LZI-vc$_SdhxS*}+%*NZHyN5`SRdNtO zO&aT(2z(i<$(ALg5)_lSDQ7{D-{d8p$3u?rg1i*Z#M9sI3Edg-QA@V_BVVk!Ts;OG zY?esaRhxBMRwFS;ukNwa2-12z&%unb9=F%wo4EdbV#d-jkO{*BKpkZI=I4&fWQQ_; zEW4*2;{09f=fg+aSMXLuj$O>Y3_@Q97LvlKXNe&bCJ1ptrrJPrDaCvs#=zbtV;!fc({Q3l`KP|H(t%h$1#$*}7n~WUcT1GO4$HptG&nDKprv^;jYnZ_yfaOBD6ICYPCe~f0e>b-%f5V6 zV(A8k@)MEwx#6?d1^f*4^4<2dqO{CQwDdc9E{x0Q@nHkyuMz3d>ueG|FVFPv93U*C zB)!oi4WwSwrX-Mc6NDry^nkR1!E^-je8enplwoso5_a4`mV3XZf4x5x2&tg29L)uS zVwWIP6G=a0e23`IJg(I&Psh@q z)}2n)xiT^K$L9h}swPC+7NJC>k;BB1#FHn$9R2H^na}X-0n+!XaoQXg z4pHrI#WO5XsgjwQ8PPkdXzH=~z=0Z6WX?}xkrm55fnw{e-A)k38GE=|K%O%pN?ZQ(Wvvw5RDT^qA&@7@L;#QK>B?`)pq zrp|Yb&X1aE&RS|t#RRL8IJ zNWzC;;`%^nyV%?|c}H~Jd!^rNbH!`^xi>mglGaF`?Mb~F89tdUMti2Icf zv4gqS8Q7hgW75jHw(fL=JWw2WxH3jiaNiUk^2HcINm%@vNoUz>9&|*BlqULkE@t4= zM&H|Bjh7b05*yr_;fbaDQ~p7$5^0Srb)LkR8#$*le&o^UCuQ{vfy#PEy)se7#VeAP_5jf z%kcp*+ZCv)Ba14Jd2sVPC-iUK3TfZku^Di*APlfwB99|MnaE4g%xJOS1c@fC^+xms zLHcVe_y_uQ$19)av4(A7I98*9!>sfmJh(P0$NkwhKnZ-S@(*o23$O2=+DQFTNw%Cs zW{+=c6_6=?Z%R-q#sRT2F0R-m&Sr*W!s{P7(-zLNd>&Cd|L%sGw6cCpgH1hS7Yo}F zxlZ65Ajg$?V#SRrpe-MP%hgQ4_$n-O0B@Zn4N{A{c7lMu6f&|>oyXv&8`!`evBLp{-Q{Ru($HI7EdRgE zfRy&` zows71QN6Qv>@wwaHRD9?1mDQ5t1N48Z)LS#g(VaCc{4eIRjJb|Ge{@O#(p5{bnnRd z?Q`fajr#w*7{H!rfhj24&a!*JE$x|H6|o!28SZf))y?T>R9!iJCRAL;7Mya8OO-GeIvwVEhb3SL?%k4enGRVL2 z)W1b9*k!5L{7H-S06uhW?l$zuV^>$EtG9I&U+!PTZA(#k^Qe*;Y>Oz?wJk4|MXM|v zO7weO3HVN*4r&v|2Qz6EGxgKojt}?Ld%tpMg!rgD+$^83l$A0il2qMX#j-Eq1v~br z=DT#PFH9w0Ug8p~TOc{y)dcKXSrng~nrX77zgCbfGmqpyq^#4Ko>57hCcmf3(|F_3 zZbeCmF{h(nca=|`wE7dLHXf%IwU%>fDup5XQ`KgG=HG{eS|ExEc|R~UC-8)wn^G$i zngtP=0rHhyObdqgyb%9;6l&nXwzMgBxZvu6ep#bceT(Zu{aZYrxx!god4Xa6MHm<| zGw`1p7T=IsT+1;6+85TUwK93#Wfg!`|3i{AcLO9z*-{PzE40Q=2g%!OR%o&~&Dd9p zsPI48c%<+wOpd5Y?VMiqGd{XAGb z%f&na=q=m@7WY})HXd6bcjyRx@I^}c9#x8yYZ~Sct#PtAU9iM((vGx;p1+4}1t#Wv zg+M~387H+fqmtZob|NxY{neemO6`U4Rvu=nQ2ekfzd*drP}nSmP(N(*>XXPqwHR-| ziK*eFy@uX4^qsD^=OYGlzpD{G?2XLaHC$B?F5QHhg8~P72-5suD(x~PnW-liu4$7s8`0n#T#VB@y;2UHS^aOXyS;B~}izN`5 z76>79LNF1pRA5N*hq@GqgVLiRv!zLrkA~RQ=z%L4c=*y0c%HYB2` zUi-+T)%1JGyzWU_<7)W|?h!NmCfyS19xg>jW*FWrb$kzGCQ?B zem8GLvSv+QfD%0%=4=r%4*-joUT|+G~C?SwEXe)m@>{zZSs@v)t%834U6D6j7GN`@00|T z{vij0kW)i|U#7h6 zdYjZS@J9)gXLtk2aO%&q&b#s`S=DOc$HB z&vXTL;e#J6ahnwMwMM8R^occSFofxNH0i!4jINiK`B+3E$hV%wlUIftzT8AwMV&@P zn>J-acA9+~eTwJxfS0m&7>)7pPx_o48)Gd|^Wcb(yJ)z!<6~v_CyZOfGWZ=;co)4Z zo0FljRsV^G!O4%%HHz>Tf<~}MjLT!IVf@F^#2?Ri&MKmj4WzI=dfQAN%juDWHDu%B z+_s3BDtxgwYps5EdDq-JnU@VxEpwq<%x=XHf_CC_zY39h`|6UVZGuJ6?*QThw_ju-PkGEARc**oW=SeR-@fSVKj#yNS$i$Xo0m(~U0nN$>%pUT*&czG*dTGmVN>)rs=mXe6%OnY7&0RNtPW~FVDnVO~@V6A1vxu zKD?E5UE5R}0(BhEp|HZLFX^{RXirxX2iy|(J@@UZ&j_B-KR(Apt@P*`usKC}g-4GO z8>|LzIsiC41M6znyBQ7~jCQU7hSSo7V(<1mixKm0H2!C3z}I2cF=`eb?WUI~5c~qR zpvgVFqu=(qvf?n5bJWKmW_PE*sKjgJw-Mg~ogmyv~}RG?XA z$S=XGH=s?{6sbT+6+}d}QG~RPDZ?aqFuwQbsT|HArRu7G;-rCY!lUY{1>Ch2VXolX z^)!?i8I^2*o9qieF{*ukmHNr6hPHf74GpJtvT$T8DHVG8oskcir+hgl^cnKrY*ffB z=C-r7knbsB78jtxhj_oeIP0H(0xOh@yy4n5pxvf0V5DfjE?2eCN#N&!% zSs|yrknrLEs>;s?h=xS8va}&2y0n1uW0yOa%3^>e|Lp=3MPdRJFI-^2I3!xZ6e+-N zC1do>BuY6PGc}|2`QG14qTB{vcHO(xf3m|1e-YZ`<$+ZZK9}jcCiD^ZrM8NA@L}h4 zFq0)uBOyF4waN}1;C&_8;x1XN1pmwm`J8KqT1k{Ot4Fi$U!e!MyJh|SMd$%;)d;t8 zyI@O(*oA{(nkOL48u6M4D~Fpv^<7$5KZln%kY4Ff9?mOzT;A9zw7TG_O4da6hFa`6 z)_>pNO^f^$jFGM&X^RN?MI9~O&O(7nBVv#s_6`7`NHXsT*wm0^-xbJ<29yB03t5Y> zIFRXpr;&kz)eB)l!n@8Sv|ij`9zk-Gb+a8_AfLUO*HsTL(DC{H}8UbuyUV1)BaD$+|05fRei9T5Gy>4(pFUdHs#&;UNZ`4)Iw@cNEr7Otl3)+ zlm1;FXBrcfsi3gjkTdTqxF94Et&GHR0xLtk8B7TRGSP7BK2jCcI01GzYtxU6kspBb z%PRkVrFv%XX>4xrm-9&PnVbHL=P#1i&MCbs@j6)C(F|wNVA7BmIWXX;KYb;J_uHw7 zZOQZY;_z-<4l2fFj-bl+^BT$5h%>sR3z4CEv;0E_qrbWD+SRJOlm>5D<6T&%PWSD6 zI_ZYCwZ;Eg0JP&VAJfXWY?Pxv4Ak%(-kY_3s(D`j4@TJs?{YHG46Ze=!9|DJXQ$o0 zE;||n8*Y&XC-vpw41QS^K3dux77`r#FXuI8cJ5rnap3N(#-1uzwyBn`5knC`A^l_a z>^6Fsqt~fj>&;>P`H%te)onpjQV5|b;txPRGo-1)ME~F+OcNnw79#xGVERtuA<9Z> zv7Ujdv_<*U3~!wbzi1CqGa$`c%b+o@eBhq*tZp|hsMZ{~FAt?e1Za4&^&MXFnAz3j zad5XgVfskJ3$tGW>{!KOk0q|ddy0}+;r$8#OJz4vwhSb3>KYrWo@ladICe^y z0Y^KTzEti4NeuU1_@S<~3pzq^_I3u}L}r@t-8|y+qT*UfDL|%arE|#x5_tV_TR-zZ%9|9iI2oG`7(-&yB#g;EWMdWeiR_y9e z>d)=m#44j#KemK-1X2T^^$c;`z5x~AE@GSANf7iSIgq$H# zu?rr04$l@a)&z>eBeX*e&}?rEj*1h zw&fT_Azw=%IC`RAIsyDD6)7KP-NESb-giHVebAmD`}X~H=-}hN`N-f z_MuH8G57e;Y-qbDxk_bR=cvjcW>6So1THoZb+UFH+P@9>qQDCKd&=gwh#*C`!z7Go zWkDk(-UGsuvT%ape{)7lT;xs8s$qR3@&nAv%IKZb^o~$YEg^0aSISd@${!sDb9bH2 z%<(@ER@g_Jtb}D&6aN;+(z>C4<89oK_{0%9Ir)wZLkgss>(EZR==n@0g|9ubplabgnrVu9i-^+a(vf=h=S=Ez^H^ zvi|BxnCpk#T}pScsgi`zC9j0inpLp?s|jU^{>kr_)ogf-*tWu!V~2q$dNycskhq5s z1Z97eW0f}bzd~~9dC8(j(jzy^UzjDJ`h_#go8QL{hG^!1u4e1^3YeTV!6i3TCn74eB7D~YF+<3k$OPwabc9pe*PDy*60*T(8sRf;dW6Cp-Y{Cs)7$sqUiUfX zmG|L5< z5HxuSd>;jQgMn#-f%tt4&0uZCVjn}neuHiP@so3l=J($)y}M)up0jDMaN1+9SI8C` zJT`ex(%xiGMzUDJfss9W5zM40zDOFKoQW(|i#ZC${Ew`W#fFrup`Fv?$nJtPzBr>f z#w3HTTFn68FSH*^@N5?C6f?OV@)glC_m@Jta%-OXyB6jafacdrFVdv;;*I*=qx&1z zJEIY-eGG;&xhH8&x!Mo$lOm9FN57`=cw+qIQ_DvLr37i_$gcfSv5lzrN;6o3e0#o>>b&7qynFD6c8){kQyJcG=tkOyw-Ljnx*Mo26fae+NcSW$oYGN zPofIX%Gxcw2iD4mQTRl;iLSN9g1rSwJz&{8ZQTsZ9vODiXAZaW-k(n0yDfne4#rqF zisMR>$hYO#JkDOMS=i|WeDV=^EhO_}gS|p{L}=@?eR=qn)%5sWP0X2R?Z)OkF~ru~ z)`prMssQY5L{cBo5W#k}K4t42KZ*)+U<&x=qnyN}Aw;8_MXkOuM;O|m!nbu|Ct^B;5NBOQ0aD>4Rai&_-R6>RLTNh5=bVa-5@_DWvf^B94fxfT>^+(r zmVd|37tu(O%ti(zL*Ry88D!&Cz?0X7J>%t`Lt=hL62Yav1-i~YdTxs-%)-h(8Lr`v zT$$mdRcTZwQY`3+FwMC;{s$!&wDn0er5-Eqn%o?a^xkwp_y8FZNBb+D#Y_1QKhJSG z7K#aPtraXyO(3IH#2B(Fd7kFCwBw$toM1#|lEYf+vgD4V{iW%;*5z!u0RH&(Z~T## zon|Vp`zL?QxTO~=5NrqYG2@wJPr_Pr?skMmhs0oIjB`Y5v?fdNb~`gl`J@w6xq?j> zxOf>N7H0O3!ou^o4w||izQ-HNSKxZNeG8xuX|F;9aWoiI$~Xa?gHd5VT8|CNm5`rU znd|HKP1BN7@J4xpBG(S(Z>j@$`G<(&1|xX4R^C402;FC)T2)t^3ON`De}o`_VH-Zd-Z8ruf1Elz5gDxV-M` z-n03eMUPI;BCaVV@;s>nsMyY@>v1fYWbj3L^v^g#3XkNy#&<|+aw=N#DU-;*Bjx723E-kv(}!% z@b`W<)K$sg9^lfD>}2iZ8i>7qKZ1GVk`psd0gx(@60O(`%z^umL<_{P zlw$&qs50S2%CUIn3;k`YuzCa6p_Rt5?_;{1pSyCnW3wf1J9{YISRszoiDEtDrygeymVA@`j5L>z~otiR{_-HQWb-g1haj;P<+g`cLAu z*Ni*WDvH|kG-`d?43vFZQrsYjXf;!aDYPYI@?8phlP63N{j zZ!LIG98sGnWTU(ec&SojX96ASxNsQQ%TMkUUv-$#oKc>!kmW*Xz-|ce>pQVw?=r3} zo4-X!_!!iXEytsm&A*0nU;Cxn{fxtR2DI^+>d6syAc#8Fi}Wl9?rhRG7rJ(s(rg6# zfGir0)hr#>FtvKkO*(ShuWW9?SkjS9zsE(}0=#wforZV4L@?m*6#RV3y_Q9>Ec|!E z4zBRBp5-E82WM%5v%uo+9v%AS`1pw^eBVS}!pX;iV)KZ&UEfqi=<3tAbf|B)k?A#W zqcm{6J5oUdZh?bu7v65~R!?;{#nf`6EUVY2b?Hw~Z>A=!E8}^CI~41UhLJb@WRpKn z`tfZArbk!&p)-!VWp~+cmFr}Q_^hwah-!j}d}CekMTvBR8LtAt{i~q2sEQ%MFp$LX zw<-->C}&U^)+WWtqhT5!%Ty6`LO9y}eD(0LI+Dp&NT%yz^A@B{vutpn>TC}K)W(L* z2xo@Kdwk4*6Mh_F5UZX6{xdUt5&AxzY)n;XB9g@v-FrDOh|!w=POj^G{qCe${;onL z<1VzVdCU;JC&JCU4Af3W~ z^ZqZi{ckwk0$m|=y#4f?V|D-PI*?ADDz$fbGwJVxuSqd-xkDb7K|B1Rr8Ku?tXD+r zLAd>$;N-Uz56ER{)2t!4ULewlG`=wfCvO=DIipW;6>}UB*BXsT-1TDog)uFcK<-xJ z4p{tdl?e6CFoyR6B(g2+SlOOSz(31n4~E3O`|#wZA0;C{0EInS{_#q;D`CX2lJ@%& zjv{_c>U}T!uS;t;q)#kbxU6272=pAzkdPldd~ck-@`6e5&B2#X3ui8)&Wy{2Qy(ph z>LonwXgR4bVirGyF`x)n{)5khPA&{vOYCaHUz>W_)UMv=??Hxf`mJ$Y>o}w-mZz)c z&bPmFxf%@6Q-Y)l)sH5mO(vwpChzEPzX_fF;ZxrJJyCljb!@d&W7WH5?juTEaPtG# zYu=)3(9sewz`QP3T#UaiH(!xjT*(pwc$Vo6k|~%lPLuS{h!Q*EXFQxDlj+&t+h{mC zsvrm7`Jx4ahQ9gLn+*iT;YkeLsLr8H1h?OF+MpOtEY5&m7sT_RAL+^dY?ZenFw?t# zt>S~swLi-IRbHIye9~bTKKQFAL#ZcBW;;7{Bbhed--Zvjt%8nCESALE9Wg9>cjkhhnPyIBK;`bi z=OyHf@>&k#_vFu|L~;i`ztawDB3gjKq9l3RMPAX)Ufqywb9Djwiju?Ugz+T9<=LX` zyhV}Cq{Gy+G!T6=gdHoifUH5#6e;%{33O%&ri-{tiTFNXqwE-%cn6Rbw0hZm?r6*3uCx3Yz$p6qf16klQHAu!_?1 zA%SrX;Lm{LMjB7U45*T}2EF+K2h29z`dRbmwYfd!r;FW9qGEqwR}K+^zD=Tc3wyRLm$4r zy_1i$^1^07)EhTaty=!kL^e5W1Bl6&3JWhg$oF7pEu6!oT_dGoTd~AvsA;Lv!YL=v z3YHZU0XIo-apdjFW=4M`3v;R(;^uv02{f0uhGG4~YiDUTFIVA}*j1A3*@~635;)`L zGQGx=ElLA4TG1Dz`sbD?cO;-cT9bDux4 zYP}$QQ!V9Z-x4kOh}h&;7+zZ#P~ZRFSd!_w)c$~gIV_@5a4$4E;@dkPe1_cf`LEN- z9NmA+JUxd>B&zpFLu(JlYaHf%DzE;M5mXWt-Rv?EaSZgCB%0Eg;)J%8Yq z+?OM(yu#OU#77n|{N(Trr)KjAWL1_T(BZQkzv! z3z5^B;VwE6j#j&aYsc-{@@U$C2AAm_PDixk$y|rT41`w`ogTj}l^Z##;0l;Oy2c5D z!RcyNVE}H&rT|@;r&jo^;PQt-7wt7Lwu&d|u5bE2%F-o4Dav*R1cdQkBv`Y?H^;sK z+9Lm%$h53CzX)~zwpcly!@6jys)pu+Emm(X1DmRDe=5pC&x}|G{)JvBS zays8XM&r}biulx|dtqO|YV4^?83`{}`_x?X;=Lyqs-F8Hg`E0&P|QofM*5MKM)w47 z|H)yg&7?WETIO}s8rVPgABDAME^_k)ynl8Z0BRZtfF_M~#oR$mdY3wS|jH?{IZ+@<`&Edu@ziAaX`(fMln6Km;5Ri$uMZObNo~#wk3~I5~52 zXPMi)RAGE0DOXm*<_1$UEdRU7P@U^iSbAp~-C()UT*2FeOvtTtU$FczrIfoft9=)5 zmr&g=OvR1SqT$=fXxBg3{F5&+^K|_Kj;tdUrk=eDnfQUt_FxIG6}ap^{@u0SJOLRU z%U`Sb$?DazDqmRPpMl>0+&eqNV6agci&;e!Zd^6QI4vwNI4nxc?Q}@q%)BJ66s`Zm z@PRYmJPm8~D<)w4GYB_I%Xb4B$L5cKdj8D9T@o1*G#6`@cFNa!; z5|U*K$rA4r^BEruXlc<_rFwWS_K4DCb4+4xwH0IV5xkW?=PB)FD8I>P;Ak}Rd^)ye z2B$Cqq|ao1`|BLU4-Kx>NZ-Mpw%SUr77%Z6yqJz?0b#9vP?qO?D{oDyFuXu<;)lYHSQm-6PI3r%pvnTzt>7cCwSK4pj* zNv7c2+ElKPTwPJhBWk?k)3cWODvlMe{|Bb0xDYv??yBoB`w;T&~2iYI4?2Tt9Q&QPLHYwe`i{b2d z!d0~%*3J_{$SE&ck8c?Rc4|BxA&@n*P3BR%1hm4?Miz2LK^IumZ{Ev;T&TZVuYhh9 za{?Y9It0CR5&q)EM*ux_y!h*YJ2vo&AsSO0i0AKXXIq8znAaK1E?>?$2K2)+_&0Va~oO$%^*6o1-x7)fq80U>ArQr`_bO!NXdt z;YYg|a6o?b(fsG+lO~GI|AYO1??(XwbEci?9Yb>+-o8#{zCEv6nhUN3dM0_uJB9A= zKS=dm>J-OwUOX)rfJy_ZM!D>83dT(AMay_+g>*VrSKn&FNXh07u@f0_;I|C{@uh-V z$z5MxUBCXr2B+rv3}jWT>T%IS&CO-^mr>kgKKO=_65=afl9x7@CN_)g^)XNvKcVr3YuKVFZgJywhs^Zgm~!J?s-~J$qyp~N z7r%xzH#0mSJ^w#EV&6SS4p(k5O7Ic*ibMJpIovb&UZhqINH1(&n*(UXNmMF7Zr1PJ z&l;cIV<~#lxZX38p@|{c4gJ}?>Lc#UX$2D08Q#?Uw*;_C zTp|nn;zk7{j(x->(UYg=>y#(Mf8-){j=UdndHZE>jm8N3MAXi*I2>2wl|)yrcwNb4 zx2Z#qCPk~_ZDf=@R8ds%tA2vDTAMGUKf%1pS>kqRSKmD)i%ZhR-aenXK9Tgze)F*< z*56;6zH438*1ow1?Rx%KQG#g-RL2H%ojnh4Qe+1%bIb%oQuHKx&Ba1>r(m2PlOwWX z)}_eFQ&V$Xya;smF*cW1H&dA;@8OEJ-$;+ zY%oq9HAPnvqr_WQP}PL3F-6APtucU5^#7%=|K+m}iI%&umFoHxhD|exkC=>QGkPu% z60*?J=n9?%P*2e1-SL2FdmpoalzQD})5UKm5R6vWBZ1to6)&Uge-6@Mbws4K~eR05*o8u9lvuQD# zc74KVPtVclg&|LQ!{c#o0OD*O3kLe3W%)D?6Mx1ucM|zbp1v@=XdQ3!v-YFZuZek* zb>AO&=-<3&?Cilr?kM332k}3%1KMClU)J(io;=U*Ub7YVvTyI(VjHh_*2H+^;>4nr zWP9W0xAZ)`azE}wDV2Xv<`~@1O1gYpyBI&u@*^h(_vTl~&}MvP@zwRpgv%GI6bAD- zQtJLY(K`wM-hJA2>0i34!Hg$e+ZA4y_;JfQ_H-&-gOrI5YOZtEmj2mSv<$~KX7quj z7LlmzssgJKwa1NADbV^qGuX?UBZ$a>KWTbw{>%1(PVFylgYlxRPR0X)UZi*cS|lG8 zJ(Qq8|F0G(j^&2vo+_88Dsuzu1m!k69y{>9&9tiqcpcQ;^A!F~0>`PoR~GS$mwO7n zy6wdKgJ&fA;-8%w(`N?pGd!vjC@?bnb;l1tk$Hjqir2s3J#Zh~0*bbq)u~PnI(47e z9o~3r=gogMX~0~t?K=01{}DO?_XoM)e}uybqG6yX%2HdB(Q6DjtQcakIyunEUy_`V zGMe)9kpEpH-+^o`18|FuvFmZkLWCY;$Oe>jx^5v#wKPxH9-obR_6j8NM_E6Vkqjw5 zv!DW^)T<0eng`tA_A?@rH@adPV9lz+Sp6u}7(qtJ`#brLQ1o+ThKxX3zB^sY!zFHC;8e?s8@xHAYu6(`19RmHGGr=^i!T zCzkYGVdKg0k5;i~prj@yLZ0#r(SR~s_0tUjOS1iC|Fy#bF`QvhK6 zoc|}|@02^v=G?A1ZXY$0A2>eKLW|)5Fr@37*X|2DKPWuMO8-B`&H}9Iz5V|x7D#s^ zErP^o5KtN^0VSlQL8KWSqDVIgj69MeFj`=AgOuc`(I^ZVQjX^T9e6zFiQjYn*R@M_ z!DPDadw=eDzhC#sbknH|O5|vKChw|DbM_>oMmg zK(T(!e!d!zqOEV5CnXnap|}?fC!Kr!MFwi7tr4?@?ccc`JA5uWJy)T915{{h^Cfi0 z#c!H;&Q)mZN0$CVf2z0>C$P5(dZXhdinKU zu7Eq@zi4oODv$)rkP6e5w=KqKg!-%wtz>&|luu-&=SnClPAp2}*Yx~c_N?Ziw-oNi%^(EOTK+*If9kCQL%%k8 z2POX~new({J7?=VtyIXBxwr$Ij|$Ukb2C@mWLPtg_-ymZbHia`@^&%Bjj z;*ItOV3!>4lX8&)`}}?u!m-i&*rOYjkgHjy23Pj({UE~}Wjt&O&Wz~rMycX> z7+@<-tJK+_5$!oK$>PI!X$m$UFJWBgULTKy&hLbswdKYGp_d&9y-JO;X@Kb*_m}gA zgbkw}@g6h{{S3M%af#C;5)ej`6kyfLJfzu`=9xyZg!_&U^;i{^G z3xr1^$-k&5R{Vq*fA;?<&cx3s#~~!~?y8D9EB6#=2rz${0+<7(I@-`*rtswg^VZ`h z#OJUO4n+KehQ=zfg#Tq|1`m)O`XW1N`TIRoGg84MZ zb}$|?{(v===!dpQh(Tx+uIp&;jDP{D=&e++{F)O8s6g}XbT2ZQd<1@%an+IjyYh4HMggLO1$A57 z?Sxh;+Q~o4jp!AOc}#%!7N=46x1SAg8I!PahL~LAE4nRI1VpyC8kc?gaL_3xWzq-& z$bI&^$pVe4m%y9PEOC;=AY@nACdK3KcLC$HxNnr_AeM_!n&&{E=wK*D`%&NLqIM5L;@4tWtGZ0_YpRD4cZluV-Dnb@ zM-4(f>JJB+7OU)?@RdDvZ8ogw_dTkuO9L1?wm1CO=QnSmS|dBrDW#K{ z{be_WuaPfAnNDP5A9kT}p3%8I-A!>4d|2Ym!aS=N=dE_8?Q6SVL8kkn)j?Tp2YCNV zYM`gI1vpIZLqxxgTUeG7@P_Y%ehjOdYQ@d2!SzbpValzU#RhDwPP-PGA=+UpuKynsRAp?uHAkVRkgCK&dD@Z^$BXV2}!%K%Kvq7TM- z?|LZlU7bn`vAq`3H?l3|icjX)MQ@ENlK}RW*LJt%oy$nir&KB$90G4DodR07h3#tn=ii!D3UUds7=7MO+cJ0kLuc|V9-JICTs0t^0R=G zWzWv1U85Va5Y4Q(ni5^^Gf=@nvvb-&0ji@GHgSmD!(*q`@*qrSkbJ4%tCg&C;RG=R0 zyhuF`HaaQZ6|=w|m03kT{$Iuu-5l{piqT4FBiE0^W15Ry8do@huclYG3qzKIh1XYE z40Xn0{zhc@vyx=*1FSii&u9Wl>HkM+82BXDdrK)Zdeb8Rt`YmB##PQma2(xUUFFV% z7Q#QVOa!pp8KN^;d)!X&V%<;HX30dbi%wc_PpEADc|(rg0Q$KQ#_Ma-PHWcJ^4jY> z{q2Afr(?s{*V=01E6d}}{SwR+GW2&#A0Y1h`xJ6`cY@ZjM3szYO!!MreI0CJqW~qT zd`LXjT%WAvp4lPq)G5GIb351q_Nk6xGxMrYq7(mbKj;v;+><-9x$xU?h%zc<+IuaE z;Fft6e~J?72ib48Ip9%G=B>rJ%@^>?7NY3L-6Ix9+6vRrVNV4^W|fZi>2%?@Y z$z-MFiCV^&+Zc#+^Qao)$OAmfTCC2NcH&*~CA8 zWUV&%X#3_2Uh<*sxIZ!Qnum(iqS+_!kPRN+RYMkV+xaRI6@T2$Jb-%F|z_+A&qiF+(zsG(pyX}pzO27y% zMgMK)Rx78oj=2j&%H8k~km|ersK!5S1gzoKK0G&5PbO)@nY5k*5QVp6?@z|&rka{4 z20zyrq1R7=3v(>@2xg4V=PYGW1amGAMm2+=oDW~5qWl!kD^?JV8>gv|A?T>Afm~bG}-FA z(<~v>JEQE@!3VChw}j|TaW-i~r@>3fRJxWBmYr2v|k-sJtFWv>akaL$dxG{C#CeBZ>+?_BiAH9XciyPi;Dn??mx za{RCUZ{HjczQO`9;Y+e;7(77Q(O2oWYaqNX57P*?XxZ15@`9#<`LWum;?oTI86LhdJu;3C0jbm$TcBun0|s0Q!o#R1a)@~%MmU_X0+no${B zbf)_=bpvD-5#LF^F0-E79)ayO*rV%@F1nci;}p6RDFIt{;mLoxg#_o8wd_um2un3f z!cS6^j4hu-u#nwv|6t}FybPXx`SlWWB4QHFZb=i8%^6n@FON%f z-QE~NV7+t?buj*%#iRA0ot2>j(ct4JfxSyQ@7=jmSn^j0!`;$2rh$Xn0WE1XX>fFV zP_&z_kHB5CXw}Q;XV095;{AjUPU(|+jR)1I=)5~uGF7>gEib`w_<|YvA2ct;CeO^q z_FW3PxZRwIp?cnWA4}F;6UtcIz*y_sEKpweugJN)Si|2VX*Rjp+551u-II`KF}~30 zLVsc>ut5p%6?SF4#%MV0Jd(f}Waw2LZp8y4vYAsLQVXVCABR)JPJPas@(4Zg&l}MX zPUlLFpY4ZC&p6E>!jD&Fu>8eRCJjan7cP89zk=Dcx0i|P|^35 zOj0S}E~XL79fo9%pE>n@H=N0H6eS$~fIXlZ7H|wV^mmLce2;OcR7v>zY1tp373NV{ z)z1)8=S~(QbA_&^1#sO$)~fqISZPKF>GiB&4YfKmVd2PeWS^YI+4NIyW-Ol6s*+{{ z7H>c3x{AW>q>AEPNjSkLI#qTG@QKa0EGiL6@~x>ZnM2M>gk!Ao`9B4iEq(fy9?rzO zcWh`_cC-Lo2}Ab}U!5(7G{2p~^A;gw_hr>P^*~L+D4uZ#hM4^7o)Uv;SEmFTA143n5R>iHst$vc z0a8<%yh#&al1(XDo(x_>i8(JXXE@vR%&KVZS%J?IWwkW9r6Rdy2njCaE?b|LoGjazf;r?a(wnx6!#GpR zLow7+({07*oXPr2a-Yd-q4Rex2kAb2`dyS<%g3Wb;^7U|ggY*N;6ffo;EgEt=d>Xq zIMN8}*OEg}r3U-zC^W4ejnuDsT}|vtIPC1g>6;t&)e)xcyv=>fjL@AJ$opeZYC;aN zCC%Sld#eT~080Zvj7s8w15-N!W1)&JxYe9JN~4PE6OTeegbFk*_7zfO|H)EohI9A%EI-*9j%j& z8zkxsAJ8gHyn~O`58YOsTFnO9bWqHVpmv?h;X~^s{82}3O-H&6Ha=wRDvc>W#5l#V zD@(E<0#X3IF_w`H)Gix@F+iv$tFQ!xw)4hL@B)y%Q2D*Bp@TJ}vLd1F9sg1F@W|t1 zDXhXsB>r@@#_rj=Swn}s-)VH77Ib_szeloZ z$!@^co4>GZHXK*N=t&4$eNj2?5(od^rEV*3=8M2d?`({S{L5Vsh1W%vxkMXOk& zS(%~(59X|q##?&_ztMF_=?_DojZJZY^NS;OZiiD%KKE}p#!fg6;a7xrUcF5r;lEqG zwU;?EwQ79B1~Olqh;34KQlTz+U zCxH22W8Q)8*tZ3tIJDn#YQ1>+l2ZQB4GQMSa+~xh?nu{?s&OhM9;yh>Y|m>u#YUiz z<~X>G{?}=oKKbEKeVn{B1?%cM^mgJ=v0+k;Vktf2MOtt;dqBUY+uW|p$rq-e@bF1L zTaV^Kh%KT!9AaA)hbx@g=o9sad#xrp&E)%^fr8W(+BpH02YYsw_QSD^LxyJKi7EPnN)|C2yXYRHi8je0v3w?20DTl}<^j%#&zY^=Lj~bF!q46R_(%ziV3)k0~?LT@@WBOPUj^;Nog15_T1!%slb} z4J_}N1gQK&r3qki6Yv?hZD-aa#}w7#vksMxrnhZ;dvTZn$hoMtP#`=)0ILhOBBLhikROtUs63`>CsZ1PZ!^90?LoMgp0FB%c z0E8{jDE)upAz!9!u^d{Hqv3oX3*c4t>J#3D_f$uH!2n#v!t(>F@CXQb5?bz{lVfYI zOdr5n6F;c*M@3D=gRxPadC3ETAJc&IV9&k$pc74$?9*=a+H>~+7@kIw(!mU@ByK&S zuI6?EA|67@9sX|-&*+KpQH3Zub8fR~j>f6?4=3y6(e^@lFoj_R>9xN52lYG^r1B|1 zX;%=H4b=RJJ>Ps0CnwfoR6x|T&5`_~XW;$Tki7azd~6n^!DvX}ur-+|r_5C$SEW1&GrD4fLCr9p2!m-Pa-1z>U%_nwoY}@N7$EzrpbHd>M$?Jmh z+6z4QsYlw*D=E5vM?*YmIcC6?iU$ClD}bEjP>q zihfw9OM;XO{aFrNiiwxvWLaoII+Kt4b+K>2Q4<>eR zOxE3x0I<0yO5%43q0NOV%xcL1E&vT05y5uNBl_QoOnA8b#t%LUL}6ry9GKxrM$o2{ z1yBV3Q7*Yo&9UUwEC3acQ)$ES-iByE(BFJUDmXxU^^yhnjKDWR&>JfMMqXf7IVS@D z1~2fUlbJSi>pynGf{*MHGCA%&krP9MFB8jM2mU6@-&k>fG8q2h)%zR$F`3NMdpCQk z=z)M77yUjmY$2jB>2+b6%hA zzKsliBGM4Z;L=#&$x;@hSUX(!!v5F4oa zD`-tytg_d(LAs2$-}E;kDnGeD6OR0r2?xHis{qSO490`CIa!^wCF@iEoAc#+G#kDZ zhrNhxFyKIS-F@!6>c%7d?zl~SY@lY_<&hV&gB&8N-ghU_{bRb75B<^8jR4l%16r&( z+xqFQR}gYkOn(Q@&k<|!SqYttYsiifvSgp-#oL&p@3PAvU@jvQIb8}~Ffs~T@DmwG zjvze?F1*pZst!&ALbba5HtXMs*Hi0RJ808?fylG$KBo4sqlo<&nI?c(dNl0nGQ2zt zx2m30G-@^ap_|-ECz+Ph6EoQs1N@oO^NZ%5hpk23bbeX-VgoLVHS0V70c^qBFujA> zPVvh=p`X+J4UT>ULxc-FO&CZ;Ir(VwM7Iy58t6;EyR3D0Q}KyS$Xz^*T*i+AvhRXE z3==-R-nRr@-{9nB6+6X20u;qrYqkP7;ofx>Bp9wy!iW@uz=29+qcz;yv&V4hbgY_s_4y)k^!uHrI z;IQKm=RWbRqIo2h_63)hkaO42K{Mv23iF$AjJFBfiJfZP=%nKiw!->_O3{^F^ecXE z!ZY+ihioIsg~uH5S^<*%SV}hHHd)g)S#d5l>Xn?XxH#|2A0y7dW@aitByumEIaOzd z7A?!(yN7qiUCMV%13La!IVuYWgqNL_2-5zt`%x5Qn^!Z7=KrLrKH|rOy1s%it~H*p zh+$3oapT?BK3DS?%1W~1SqzJ%0hi{#Q?Ao^l>xiUg`)=-;BJinJ zs00=TyRUpovxTBh;|@<-@4Zl#1HMXM9aoW=GuE{NH1*iGAZ~Wvr-6p= zHB9buLP-bz8G*{P|B67c9+{=Dl)Q#+yV^_q&_wzAF^{W_;?RwXX)!US;anCL8-T|V zo5TFCFFz|lv56x(IOLZENnmqbKU-V3j^d6#jsA znBr%BbNv;Fl=1W({|;7WUu#1LK%k~Q25|co4Gl|bUq+0M?NNus!eBwQc=V(qnCEt^!k&xb_2Lo?h3>{j`@!{{2uiyg8 zRp16xEr3S#im*9O^0|aH!M5Acq5BIx=3wWqqygwYL2dxx2V-72x2Kp{Q((x{R6vVi z87NzNxt_*)ne496>yWM8pX^|ai+jbv;l!d8`q!!l>R*H)_P(%)?wpI03XAO@wt577 z2s=*RA5q_~pRpweo&pW*UQk&|2i77sZ#`R=L?YS066wAGgQML+coYsX_RaNT3k3Hv zt_nedQXekb@%In*3|{GtY{#*`&IxQ~N|}Y#9a+p7jObsS5{((vr-Bi_N5j!Cyb2-9 zT*l|?AA&@B39YCWxyTkyhj`O+MK1P0EEZ`f6%2Tt4b6!x&gi3&%6o}^DyPI%f9$G{ zDPSo+uzcRLSeOX8!o-^|36{~SUjdQMA`eG=g;6Y}TiX8e4y99>Wjp%bot8&IUvakd zX&VSM5d=f<$mLgXqhLdJ6~FK^>9SZiU*lqf!+VG6$6wDF{rKA*g7*6fo2VA6u}4(c zg67(Pq)z;p#t)y9hpe{1O^i{wxr^0@hFIGtcU&!+#x|+vtEqHPv^yUjlLvG-Oa+4l z)9GrMO{Cjbix{6mA)}02oBineNgF0zeo1K`+~JrF{W+1<+(4`| zqwU^rH5CTC9qFL14Tk&V6;th_5I>zlz^>2891DmjsLJm?@Ba9T5y0&};sb5~FR}>d z>P(YP`SUnbME(B5tDM)^1Gt~cPXA9dMjj1hO4mtU^vHtKSTE0 zIfR~5UHCYnA?4D*6~W6zmTnY+NhdDulNgXb{^@wj9L0evw+mHSMc;*v|o$WUD2wKjjo=ddWVA zTtfQ&1TCNf|>QONcv5d53Wpf}oQwr)+0FcHp z2LMoph3_l#FL@P+A@b3;HZ@q1g0j$4sliwAS-SdZ%P(JC*Jiib0-ifPr=xJpH6;#q zdS7ac;BidoUcl_jO|Hj<&8q&%aRz;z7;V?a7iGj!3YY!$DAk%zszk^;=yT=zzEr(^ z39DV3=xiv1t7y%swy&Y!2f1qEo7!?J3w*B*Wf>M?Xn4I1B2f z;sDI>fDim)&jRjNETd!!?*XP6yue(x0CWNwBEweN_=g+%^dfWIU(OCVTc2)0IyIc@ zZUXd1soki494`4`D_W*fRChMRQQ9>m`UlVfrdMj1h1F-+NBKo>|GNKkZtL?os+ti*E-#(k_FY|NvLkNJr zz-Lzsi@!(d-7t^W0Wnntm1@6n)j%}L+HBH1- zz&QHbLK4}Q$YD8C<9~pTK7Krj1_q?OIfZ7yuI{=y(@)zob=^dLS&@c1ME;)R>c^G_ zz*cyn!!^6km116UmCxXXop6+6!g_a!Scr3-DHuxw%B%tG`HP%#)&z*WE7X|QM#%Bn zE2UUNaP1m#*!PdUc(TBK(dX1EsmSuB$L2bQYJdqnp_iUUW%Jr6vE;iD`pm#lokx`? zq+w~->M9k9dGEz>C3kA-kZJr{01}aVzV`})b=O*~2YSMQH8VCRR2I|hSR1Ee#seN` zhIy=c1ZI(71Rthai{v}!FMi+s!qije{T|o?66&I(YaV^+o%J{D%twpg9i)qz(?pI^ z35h&vZ~GCi%Egf-4_~9We(pcSa1!p%TS(u>%7hXxikLV{(?;+bA#MXZ8HrZ|0aQ&C zu!Q4cA0w_)1Y;D0S5*G**sm)iW@h^hEKg~dcqHn>uS_=jw9sGw*a2-$ARNp-i175G z`L;71rt+rdmJ{w`5O6!!`~&O70I&0Hdfr?z0Da6}uNIyr9snGJzR-! zJc-THRZmiXdYZ7!l`Jt*anIVWcQ@)&T_`AObyIHcTQY>wg(~6^6)-Xh%H{-xj1tCD zGil1mikW;Ag?8t3i`?e`xS7{gn2Y}BZl|{iU8J5o4Nv4g;tXKv@4Wgpcn@$iUn59n z_+ju&`fp32{^V$;@p57y2zYwVy#E}{?xft$>-L7^-YNGhc|#=?CMnR^(EX$d-jdRW z%f;_^^7ty2)zz<5O@6`wRC9Z5In#Uj-Z#)Jr3J5dt#+qXRsCZc#6y8bnD4Zj*0t#7 zU3_l!n+IBsQnc(UsF1p&!wT9cz_DOJdZPAkIGGgQS`0aJfvIdEi_Vh5cXW)x7?HYO z!u-V8XQ&ksQTQ~5;#~`KDNJz_58AxQ)BtdU5MvbTR~l5DiLI^DuYGK+xq?14#cFC0 z{85LsU2@`|kUj}r7AZCK@Az?J;;9vPGyIiz24W-QXz#S;ps;4{(;6n9cq!H zn29Hg+}x9^@J|_xD`Mg5q25ca>&%DicjQN@r|_v7LfYUAPRGYi$nAkYZlUB-uA#>g zuKW4Yx)}4kOqg@~yeSsaVyNCWA0$QZXsoLDd3k1kUozMsp^3IjCCYVOWSCHadQnk^ z)+U7c>EThKiN7$e0B(I z8X$tXPpIH#(RO{Y8~U;)p$GGAjm7TAY?yE6DgX6=S8LRh33$bAzyo+&7P~c?YIm;v z0oU)(H()&}#Mjc1D6pt2@HU=x_>j8ozf}|Hd8i@0a^{T9Qz+ones^?9RXG_7<1Slp zl7Yg4JZ54F?VC@=^Sz_JvC#(#J7TTFxp(@sx#uJejSrr_vlIlP75_4my`nj8Z3qo9 zl??YHNnUq|6A=Y7$aIORv5gp_(Om2B%!%`0wAtF`hak@5gHLEZ+c%6VO);M&)1iw{ z8{fT}gkVT*nErw44X2uSA~S@+G>eWh(8bH~sSU3hTzmSr76it4ms{z1Ye(r?bAxI| z36rQ7HDwIMOq>fSxyjmcP1^u6A2(f9%8`LrA?itz*EUU6-lFEl=Ca8O*ZAA?In1BX0#0X`xl|W%1(e@x=w9sC{tt` z0>&#t1@^#9b#-vp!|>KorMm737ARlH_MUbx2Wl@`OvTWUbgM)xu#_vTezka+wXY(M zqTzW(iW=HOW9{=&gL|5d`0R$rh=2^W!DD8;pq!Q%f!&7PwozpdLC#RDye}#q5}cw$ zUS-TFO7FL*h^b|y%@nP1u_GDZLwMiHM|=q(qAnv!p-cP{@p;HlUB6-Wg{mN*k$l8w zoyJ-3@H5Zm!^*MnB%*IbJ3*A{vx~rjs|J;}nlHfR9DOFc3Li|dRE)Ug$I=p?oZSBzf&2v6Oto%tFK! zZE?vOlQ8r+S{ttrvPH}B!iAMTgBcOXFf4V}BaY@DVGx``vw~)8r2<7khVE0{yRB>> zc4<4`q1|B0j{NA@7)mPQ>_)oH&dNX?VM3>7((HXV9y3=a*N7|#DRU+xABaUhsJ;9A zVc1#`7tc(?H)Rq!bjJ=sldUgW)ZQ(=-6Zc6^|e~8)P0%21X9$1>?vXGi?7nzc=0Jk zExrmWWf$dT5}&QT|JVwGtH7u-c2~yPTruhpUr-ch;c1j~lC!|V-c^+BDy{98AU-X3M6^7p|Q+-&MZRCm2GL+)lmH7s5b$t6zZ6uYW;!2l4 z6doF#ly~Us@9!BMY3aOKZulvq`}#@sgR?~^?44JbJI>f6?a&Q%;oIpqQ*YPGAKJl% z-j{73;S;AkMzwk9jOezKQlCXk4(EOWF54TKd+&_L1hn}%1SIW#f5!M&1ia}Eq|T=O zPrCfiFrg{p%W4HPpjv;whBKn`MqNJzs=v*@FB{3PzKBdb#+4K{sip85*?ve{8X>U< zVPqP4S2~TVj9oiK+^b2a9cnTi2j2GD`1TK+{^*VS^_*{ZqPz0ZloIgjSxRpM!n3AZ zMqSo^htA^tV=7@9I;sw8sg&Tc-Rs2J&=h*!NC{OzgqZ2*(-9IbKI*4!b>s`P_TWxu z_T|Xod^N0Sa#CsC>+}u@je(x?Tk>lF*X2$4-It9y-jlEm5steg6%O>NmXsb-mMNL) zVkC*7ggwp&$(KJ$(eRAlTNt}Uc0&bgG!Wh+M&zYU(Vt^}fJ^lUu2Lc+Rsv%W$oy3b zFROCI;<^c~<1(gEG4>3V@ z>3p^nrGhPvIBFS9GsPFUN|B5O5Z+w*h|!Q(>atkiavzOgTK8QVD(2E>&Q^Fjo28h> z4&DpEV*_j4wDL65Z#|kPdrO$u?IHKx7Uun_e#49=`!vMw)A4eMpRE}-dJJ}*_@2&m z=(tkwXXIu62127qg{>9mwEevkk)Pj-N9VF&X~UR1GRc{>K0mdQjD6_GgR_r(1=Fv8 z0It7sFBAR;={Fnv;5cJe1OM9BL-#%- zk0s=*zquP#+%%y^WX!Gg7mT@n)*t;mg3zuun#HNByQeb;A^enyDhD&Uewx9ZM2b(U z(8?sUMU{Yw-i4ao)T&wJ}(6NOB4Hiw60Ik0oIFWa$0Zi@;xa8( z>*u!&(1BJyw-y#?hshoN1M4*W#(dM-_mhiGsp786kl(?r4F|O^1kLcNCetq%eKtot z_Vdx5*It$Vpira3-vdAh#s%A9LAr24;HU%8R^X0ODCIaA%{ap36Dk;G5)_S!KHOwS zX5$WS3JRve!~}O{QOY&??kxyd5kvOk>XA+synRJ7oJ~Hv$T@da~G`8 zuRe(K+kl+{Ac@U+2D)Px;O`FYpB}%Ol4Hh{G)4nv=xZQXjQ1NHYa&hyTc@U!mS8wAJi4JPq6 z%vMRJbC(*@`Ej6=2(j$D+T%_|5(V1h4DU4r=ng;Pq9WVyb$OGkl6YJ>B`hRCba;h^ z?$J1yrwq#Y`z2IMF5(Qryo3{_z{*ju!n@5`?_PrH;perT<9H`d4y1P>+77os;7st0 z_}kiq{LGVsMMC1vlMoBb?Uf-{*bjOCWX_FSo3QAJ)6zvU9_7X3{aq8Bw7K*}85e&K zw$YOXViY==(dvGdBGg{$E0 z+?Og3vP^ZaXjuqjrkn#HA$N(IOs(EQQt4gfqT;2Ug z>0{wvwkK3-e1ZbkbELfFZLvqXQAy7dxmWI;-b(TmClYfQ+Ds76Wc1``aR^%OkEy4M ztH#!vZSPK{^dzD2oHps1zEg~-j`QXOK)Pdg`AXBOI@-?b>*0a-9)%p06mTUcb{o88 zkqs)Eq6T?UUffI_WpM4g4L=8ZjtM37)CQ@f;6iR+`}g7on4*xj#hQv}z7%l|?ugAc zb<1RS5d4JfF82vxc7P$fRqWzW6w?5yg|-)cdFsnRBz zpXzO=gJ(UZHLj$ss9Jl;hPrnHNN|N@I63T4B;eDwQETvhI;c3G*~lF{dx{Y(wp3V1 zh$d17wGMBliab0{yoz$_NeD{^k#eA7011bGlFH;lW zLu6M-w56t)Pf$)RMxm`AxV=3TQmRqX61g z2|5A-u!Hd;k%G!r@((e3_SR<(z{b_B9~{3wsKJa|$-Ety4=NEs8BsJ{qDKVIv&b$F z8`Sq|SmrF^g}osCo?hjbv6gI!`%*sjIL)+NDN20X z9K_6jMU52R4#fye)F>m$rc0!Z#F>%^KT_Yc7p$gc9&E|FqAL$Mlzc$@GUWk53cT@B3SQ&QEd^GIi7DOK!0Ha#ljx(iBYXq;}$32hKJ7nCMmg7LH1+wnt7?wOoAHGG5dgR-@0 z`8w{M;w3qW6OB_h1HmJ;x2wHBriO}GSZ2{uapot^ww+mF5Rvd&Na{q$G`{kTyeMiQ z7!UJ)cnCUGt&+pU&b$lcs#%Ld3+1Y1l1X%oiOuH2Of4bEccD~oCPPcLa|Z*xo*og> zo3J}^LqU#Iz%33~{D)d?5SkZlye;`7mSIF3Kl!zQer?8S`c1l=Rd<}Y!Cz;Hxnc}1 z_Hdxh4CWZQs`T=zO)#rs_JG?rElqWgV2r#n zIten$F-WaCg%O)oVEBh`*iZ_&oN-eE%XKW_;&=j}D|kv;`?`&PfIjiFbP#F9Ev}#J zw@1BQS0{01ChN~(IUrSvWBeV+Rg>dbb^FEp$|gi5T=deL zX41sTCy3&thqnU{sCC@eEriAd5%-te@9w_58&xB*$(Y&`I=$yNDU5i_7A3;XbtL{6r=J-0-e$g9VLEub z4&QICg<$}O`cl-1{<5zi6pe*~=*=xZwHyfi+=m><7{<4^A-vc z+DY)!J^Lu%#GK8y#@sSNd^3e5G7dXF6Vx|~$W~HGu-)O+a*t-?(-N8ei0I6Q32#z# z5urmzURXAjSWo+Tlo;1-icgYR1O10!&f$yj7KNfgzDQ9{9)8cTaUVZXPp$T%flQihhzp(*lyN|?y*5Y$PWVkNIi2S7 zvO!yBv>E*)?!5Q^bS~<;1LxvO1G4+@@z0SXz3V=Gn^U9iUS&Cjak`-AiP;@e=R zZNUD)ak{r9bzwbbpmn|N;KS3ik?onqMS0~%@O&ni^&*X8GDbYPYt z9axFp-G@=zkS`WR@ytjaeb^}>fqNW~%S1PR^J4?b%E?_9--6ZrrB@tsTN{a_Yq1e~ z4*MQ6l$WyRIOHT{G|d&m0MH>L2Z%+EB#$&SmWfZ3MM$%Ny~NKV5ER%M^Mw-AMB_KXiKKi_#4KQX z-pru720gM=t&Y=G>r+NJWqA6Ku0AqF*1c3t4$eq|DGP^&GUq`O)?eZB2leIPIyEpt zh1>UnYGw)HG@$qt-oYGc$oH4sMLmS6*HwhT>l34dsnn)gGB00*sIsdFk+tQSPCR)z z;TqhLmz@mGRCQP>c`*V@T^jMYIo2_r1j`nu_{p&>oM2|f!$p;;mWZ1?j*C}j4);LQ zw?iHe(s7wQ({P{06k|W>URa7U&hSh;QQsCv8p+*sRM@jYpPEroc;jl;dGGWJ4SjiW4ovIrV?mLNRO{%V@310=9tO|!VT zQWl$pdQ?hrr=Y zl+^$S!?9C~D^^)T4{T=%On4_L2IvL*`OpV}vt|ChQf_!HW-P#aR5xT|=4kFuy8HYHy3VxWpQj^jZb32sl8vO@L~uA&I#;A3IdT^?pZp{$Hh3P`fqo zppd^;Q~7l~^3|V>LWkajIS~jWD1ASz4ZYERmxuDbOTd$S{gs|pef@zozLMDD$Wfa; zp84ZaVmQsBmyCf!_aD3_^rX^|nU~#{o`)!7u_eL4fA5o%uqA~pX!04{6*{k?HR9?9 zbE}z*zy(Nq0%1evwKslS-*@s0yfZWA3A%f4lnu8F&d5E=;{dYx7@M%a5_{^!ZtMzX z8OTLGZ{EBNY@q+0*awL?w=QE6`yl3yAZB-6TG7w?=xeZpPtdmycAdE0`D5DgOv@y0^&XSrP;zLo0zh2*`}Z4|+PaQi`!NRvZ8Bp{Ht z{{ga1MT+i*%H>dpB+dy1h63HQpy*rJny&2EdaN*+O&sGx5Q}2aRhw2)7QWXk@-gl5 zF>boA1s)l>-&oUT=Y04vwcdq-`f1($cO|LyBsm;h74Kj@;t#_`m{m^(u5_TCjwTnQt zc!=t&)qplldfjw~O9}9J7c;X>4_b1EU*1}~#rP>YiX8y8mo+ec5^e_oNV9~~>d7y8 zf;Kuz8zxFm@WVG0uA!iy=?T(y<>croJ5wZ*>-&&$a>Y&E@c{a&X<6E`Cs!&vjz(UH z6=TWC?KqQ<-%4#+l3i_K4)iXAt+DWx$5HNW2vn338uhnICux$N1%W(1=r#b!ZAB^2 z@awkv>u?Clv2IPk91ikf?ebx6x|#wX?a+Ai)rSUD_bb6iBWomyl5b|ZX41JtDUrR;se6Yo_91edQ*$E?1ex};- zcN-)!_e3c?o{^RgVJQGcZ}5y0t>-qJ*7pzX`q?-fjUb)}|FGCpuWt8umgU*vSpdE{ zk2W0iUv27vcGuxU8kOdr^C0MBUM0OPS0_Dn-t{KXbeU>$%Rl+6BH950((OBu&nFdHRZuFBsqj%-4~3J+Bb8o>C19H*dLw%eW6Dh zyX?Vj(`EAfJT_N;=)Rq!?Wg5F_+)!jhaX2tp`@gOF0Kl-QUA8^-lsu|PC+F$v}F5* zP-Wvz;p7*jM_7bnW^|!_fgB)He_=5uW<*FIzOuP|!}rGSnY%A7gqHCd z8S27Tm%@ej@l8VeDunipq}8l$EmR220?Y8aT~F4?bH3(xITXL-O!Mo_mw32&Pbq9F zG4&qvVBi#}T=e1axNx@dm_*>(;+AF!cFw)11$*9gM*pUy7o_yYV#2q6)JjNADs0pBT`y> zo%bM*OR(-O7`58pUJLs)QZx|5_c>;C*AO1PO5b|FkkghUkPSasnq+Qyg%Hd%%3oRt zA*IedZ^r*h4pOj32wCN=+iylr-0a6!wwAZqhSL1((&wvSljr%OYN)D$*iCKkLt5+o z{Fv$&pL}N=<-T<*Z=u@)Q4$@^4%ZJ|$AdtqF!7Utm%!O5?^!D+yz6rOI?#(ukxZD$ z4g}RsN_728uhO}K(w@An-?Xh?oXehmujOdQr||zV_7-4KZ*BMR5d}f%P#Osd$swgZ z(o)hO-GWHNC@G3VD6Moz_fR4*q%=}Wh_tjr4BhqZ0guP$Isf-O-*t_bLk=_Z+xNcj zwbovX^_q}p6sj!&ZZK&4UT$|_ZY~=$%E=INyqLRxyR|%0|BBS>M}baw5IB7+-V>WK zLL&+x*N#dU`4Hg@mQt%*FZv4t&F7y`iG9rub86v%f8zlFq?4RDs!sH!K4uZ6j!Z=x z{QJS)Mp~La_L8M87!tPWgf1MsYL+A5x;ol!&c`Uoy zcY1$PHOFpck}4K~;GdbK(rrA>{DcWz5d2h>Ou6TFxgPl)n5M#COhVTJ@J}jDJYvnZ zT`DXZIu&-~?jMd8TDdO?PJSse975Z0(Hy0}@a3x17owbe)M9nYpVER*&@B+PHG>+u zwhewQpFW8FXsxQjvSiyw)9CueFh%97Tih8V@C;W-KcwK~*#-BV?2J2zd2T3bJ5Z9^2(JYU)v{+woY3j!15~b&xCJf-9_1Yq}aVb zM%pu|`qu@Ckt}9EOgITA&>`yxpx^&d*C9wpKeoBP_MmoaZK za(ry^5;D)vV2ksOIIr|%kmorQ&7Z_ne~y^q^yNs6>!*4n$ck(uHB*xiBD@21#5WYm zD7B+Bzj7<6zqzUysFiA{oXsR-<3PuOkYfN|{k_vkIOWv+TLDZ}1M-o$3hJYqRwQjV zl@vTSnw}`eMv@vk=!JcOlP#UDIngTwhi3l+x_~i3&d>|lNU%`&ZB3voNbTGC3hHw^ zx%tK$nxoYI@n?t!YLiBDutuiv2wYEBv~84QiPL zU>U991Fn;lkgo}k6=UbEeaapq)&CxcwnSgHTK|+002&hJZw07e$X!NI_GBNr>)z#C zblB~gu@|V0j3XGyoMyWfc=L(}v6%myUk&1F=XF&@UEXw-k2?J}TL4B2m8kv9z5m|& z+vAV9B(K}S*_YLItgDnyO`JlR6oIE?%iLfZ0jorFBcIQLEy!-AANA>}&T@Mj5 z%cf}~)oj2R>h3Pq&ZcDXaKEap+jPx)ggD%Od3$=U*Bs_Jx*5bT&DT~C!cQKFCDmsl zPk8_rs<=U4gTTZwyrS$C6_X0aKfY|h7XJG?`^g&`Ft5#6khG+*D^pTEc9&;@7YX5pSrcYYFEw#q!G z3njcn&0bklqpohK=Z#`J&f};Q1gFrDq0XQ6BHtz47Oy=8wWI~XmwN4K{0Si;H1Zia zarm>Uh2%UAdh^9~%ze4~7_K?i6FeQhx4^a{KDWS1J=6;}+a69$5y^O_S<$RI$v2&q z7daQJM5e2?Rtw2h^ci=kjf*5#ec~XRx4v(@^mTpq;gz;tHv9D){Wd;d9Mc}P@t6c^ znSPt%9|!&OIoH4H(2#3Bn3Ce$f_$!&Jb!@nIw|GQyOj$+QioN{X&{(vbrX>U%KJm7 zso3SZh7iCKK zzH?V>`s4#2GiYx@FVudOIHTEC331n{7r zY$xQq^bZIy5BtXx#Y8_#BBm0e44UX0ArD5p!C!EoZKhd)vbsf9-aws>a1+vCyN*Y3 z5hDxIaBteQo!sR72A<~`!qD79G7q_NRzj#Rs`%fEEyTb1KT1fnJHQnND{Kw5I+N3{ z=@#VM>S1rH-}e&H8=8~(9j*Sw;+MHe#T8I}Qd~;Lemwq=`G0_eWQCrc+PxLLx^6|Z zW621_HBG4JLZj%CZKj-5n4gtNgif#zOynz5M6P_*@&WuQT9u{nP7( zEyJ`0eX;^9h2F=ihIs1Z*OG5^mp;(L%}cOHPewNe4J&XWJN+)P-I#3qFlFC)^5O0DxspE1M4LZW(W73f{R(`zk&jdFOiOe_wxV#Bj#_^jv1aD?~>d)^-x{S z?G*K{^-w(fpR=+zlX6Z+6%QSK<_eBj`3!wr72T7%>}von8f{6?kF71t#0G4{TttQ1 z^&Ahu6@TLpX(&Qg-x{Iyq|@z89HG>2-&beta#xJ#SHXwGr_j}Kv7PsUFD+uaos|*r zoFD#XInQ{|GqtF&sk;Sh)HzCm8%vG+`kzcGH5U)@3oev>x-Bs;8@0J3~81bNnhu&4R$ zJN{ezsOg7FVhNMOEDvaYG`^LxgyewCU4Lf0#I;n#Z5xa?A; zBX4m;`4~tX>iQ>(rr-!bjT(=KJFp^Q4-fB0!lLkz;_Ww;T&(LaSGltBm%Z&As+jJN zDVi#>Qb!ZqXEZ;T6k3|YtTaW;Xkg~AXy^YZ;HE*kirZwRW4_&6r_>X{KRSX%Mt$0L z_YMj~Y_a?A&K|f@UNk_=csR%t<5o>jIoAr!dN>3&;W<^(4;|ucZcCt-;jHA=7vraf z0UUQZrQ!c`E%LhVRywk?Xzk{O9}u?`P8*58xz<=pxLJR#K^d zC!0MZ89M>;PP7R{Gm$09)Z8LTY$kvAz`e$&)ZYg8iI)z?NxxI`n~dSExr6}FFs`>l zn*P}_uDJD{9yy$D)14j{!6KNDzgVx-#U2)7Bm0&@;*5hvfu=ieMx4VJYm#uZHE}lk zleVY0n04v9{>(cp;`_K5k1~=LCb7L3baPB7{NatJVD{JN2zh+nlJdjp&TlF0#wjWn zaOT?N2+LLFsC!1MRULAbPe>74nTaW)L~PcZdUJc z=p!fg=)vZP6>ccf)^2Z3`==G#g!B5Z_FNI=jsoHOSEcMZajVLC&Un7_oyMM%xvS#Z z*(Nhr*b?-);u?sS`scn5s6L?Ifw@7!bQG*Sh%o1??nf-|t!owu4bl+C;RBMfwW9jj zL4jz0DjUZx+4k|{EGhafokN6;NI(4$viJ#b$Ei!ZF1Sm^a<_=HO7bsIH_0lP6b9RfE;lZ6sOVQZ$6Eei)eBdTo|H114KI=WdJpThFV(g#<;l<*UL z{d-C{v3I=$av{#PS?6&>m%|}_zoIO80yw~B)W&s^NXPN_)=u_Ht3Jq;@EVR9emt^e ztGLQGw3Bm}b_Nq37Dk8X^mrEnRyumhC$TSdd7Kjd7C~NEZ0{weHx&M;dWzd{;naBO zCI`~z7sF=Zm9pf2VoM(V24684PZ6lRok^=u2F+fzWUaw$lkfQs2RhzZ`VngM+|y@c z@wDC{jJ{O@wK7)DRy?$uH>@-B6laz=j>e@)QGwyd%D$SH+Zb7$o|-D@`oiNw?No%# zt=mc|9u1towC6rh-30gWV>ciPbp{{w3Jr`#j*}vQ3>qy&{@LlJiFfpTQe8$v0}BJ|}JY#C!dgg0=2# zqC8Tbm-}r?bW7JrUej_#ovV0=8Kh*x>Y|K}aHq^qe5liIn_K~+t(#OH;@-#ATvDXn z8T%2v;e-_6`|euE2jb#<@n@4Z^Ot{37!*RdQtbbbbQG09H~z^*KsuSuZEm1V$Dv)q zh>`qN#!cyoaBrM4g&KNK>`ifJ%H{?uS|&hm~&|J%FUmygFr2Iimy*OZ|1a5Y{`K8r2v z%2m&Ata1ALGvs6EU^S|Xr7ItP23Gfsg^O-JL*7FDV^0SZh-1b#M_}y0D3`h-AvbZ) zWjMmYEy^d_ApL$Ue9FP?vMYQF&RVKV%A*IwiD-hjYW_dC;zS;O-ZveQsX#$Uosf*J zg>Cdd<%&*AfcE}mI*6D%AzA`5`_{1Skcxx%j9=Zz2$ryvzLx)f9^&tD=gB=yVg~-(+?PQ?pAEujPhDC@(z!CaS+6^up3-8Mm;nOoQsX^Q`xA?&ki}<}Y z%ZDod_-DlU>htq!{_J2$w?7-dnLqkqNyz8rVt*^mO_Ybh_KNmte$bakjvCp`KLjcX z=dI%>YJ?7nqtPFIK%!QXNK6Z_`5e14*uir2XvSsl{-XM?Jc&zV^YVQQs>wYyuRUHF zAZ}-kS76&X!)pH$1jO@X%D+Yn0!kv%Xrf6&oF@!-57KYJ1L`JgKy{sa*)QbKCE>O@ zxguF#@!coC-h`I0hN_jAHtN#z?;EU}yi!UIfk-?^Eq#{I(fYGP_D70wW7Kq#-+SBI zcI9-3+M*Q4MSeTkqplTjYD>=b7C$B!F9rp4e43po7i3|bHhg>A)W%9q$k5G3@2)8j zy51m3eb$kw&5MNm6e0d~R142(*58KHjV+3CW~L(oR!@z0^S>2|SxZ^uXOhRWvs~2W zIfv9w^NqCRJW`Qa`Jn^&#A4&_o^;EV?NjalOY#T@3P@fP=M4R}b1CG{5x_a)|NQ_G z)aCDMY*&xBCkVUENqU1>6SjKIjl|POEvmv8~+huPlc9t*Gc(2x5C-&SatC( zTmZ_Ajw#S*2V6*ddliTYe6pGLa21}@EATMkoQVpQVk2+J5;w~~|0dsvuShIwvsA}4 z7HlejW0X^a>?_|tu4cyOnj-Rl#)hp;d`arLNqadsVO2(tCDi;KMm`q)Xw!dxgc^up zq~P8EKb{a-KKd1N(vn;3Xs^hr{Id7qnvQSa3!G)r=u*vN3T!({IUu(%CHN(_z$?k6 z7ZhmDf_>xf;T^Yn$vb?e#OQz40Wvgy`!1w^2U?PWn-GkbfZ`e5Y8o$sgLXOM?e#IvVb*$)k>S;&pQ?c0Mmmdaanvj_RgfL4rS!10b9iq{`^*$>N+t3RkyGCUOYgJ}R*9 zxVu+}z5RKacz*l)ffT+mt@3K-DJXBEaF)9c#-FbyOp+TkrUQUtn-2|8ARIQPY8QGG z+gldNzfKG$pSn^*Fl_`~XfjkuPMrCpp3iFhH-!x3?x8mngq{O|b%vT#RmHXaDebIW zg}$Swi~P7bpXnOa^>XWH*IN3C=a~kLoo^_p6^)b)YialRdr;Wo?1~dnwii!7pvVRC zGgtwuH~?R7!ky;*Z)M%x7`8m19{{eglLU zwwi%Q!9O%x@ZI0f<7pbAl5UUR5*Vy`@acrmE#1sWH8HE$2qo@x#k6W{DXs&UHQaVP zM$(FdlX&7ogZxtD;CRpi0z7Ycz76d2mUTbwRr;|2%*WKt2De<<^w&d9eLwYBv_&Qg zm#wBnr*^?ZPrMcsL zPiA9#;p|0Df=q^s+BI{jnzQ>GAK(XCf56mE?2$_sZDuSL)AY(~*8S|rsZ+(!PKYM`6Mw1-dAC!e1GbAlpbXMF$UaY z9*;;@1*?ebSx|M_$<`-4W}n!xIHsYh5dP9}zc)NJnVw68O-}S!=lh@qvwf@qsl#rc z42z$;8Yyr*VEH%4gShfTX1)po1Gfm`4(^J|(()<2!&@MRhWLX?eCJk&t^sxV?^$G+ntd2thhLzj1-!a(LrZq@2ylS6(D^B|U> zq`XZ^xKC;#p8tj+-5ZC%4Lmg;<5a5_A&lMm3B{%^bp{?`CZknLPha96I}*VPDjSTy zLMbEZRpNPs(V>)6OeIqpG}l-{{J(pz9CNfjszf#m@EW>|`yC z9+i%D=blM~);;IfF1ZEP6nzs^X&xY5^xQ;y<=7uN){}i8hAqaWf+3V~l_%pWcC7!> z75a0lEj%JPePa?2jt=frFug$u{TL1Nltg{iZd+Xi`y05A&UH8g9DjHFX)u{C?C?OW zg(x=QaCNb9P;Dz~zD`296_}YsEx}`dMeDt`8Ir@%)80^rm}nwJ#=(37*w)y+11&LW3z&{ z${2YPvhdX4h&Gv6=@&Iow>R*)6A!GeD1h@-X8K=-iolTpZO8D-{U4Ya zx=wftS1$-vkeUo;1V}`LcbV^aY)Gah`jwLv30E@`zIt5t3=tEcEf%aYy|UQ4hIfHqVuX(TocfE%@VLhrrq+9$}oYG9&$A3u|dWtxV zU)Q%PdeC|?Mc=@-b+W!t0kt5+r&hW8S(m3`TE)P}N!p%0mL`L2ckcZ(EO3|*Ld9Su z^AG7{?{8etw~tYwT9j!Ry72` zdkq`d8lQeDXIJMkK=0rD*c}`eTtud{H&Bc_d%TZseY@i zjFGp`7Pit#ZPbhRyD)IenIIfQub+`aoLxTLuy&?}O0n`?SUbN-WUiuI7VKB*yohOJ zE;%omRF;`kmM8}=O-I44{-GXbFRS~X3u?S_CSwCD5gQw+KIUeaUt8;Z%%`zALcEV# zo7G$?%jBGSifVp1#@9`Eqx|9IOcU2;yd|?i2B@kIu6Cdqm(D}0?{im_$9ROn1x!7H zj?SiQVX_u>cvXh$6#dg_?2+pDgv8v$?>1u*V+eJW*`pu50`r|68zqfgg?pW%-Z~_@UC{wY)!jC(V-js zYr%`En4VSyJJg82n$kve3L$X*;*_ef46MLi|LUJRMBJor_C(R{3Gl+yXFPSE{Jt1n z!Vb#h6d{&Qgk;9rW5XPu_s>7RB?(cI!^ryhmJxV_bf&;?foS$Q{Y5q@EOlV`5$>ni z@P3*Eq@je*se(^k07i!*k^ItsSsixZL@~95XOKsdQbmrLM$eMhjjS>NSkKP~>CybZleWYBxLm zZnbLybjw9&+xYJ&vc8Z;0^m2iYuyxXkEoP~X2hXvmD^Z9&b&c9x`dRCFL`{qtc{P~%v{UXhaS202l3JqkkcZ7Mps^fGq^A0(6 zAeI7h^~I8S1GbhLbhy*68L=SEH!dJ0jK^P;84+H+R*7zm0g7 z1Ko&7`440N7V+CN#v#F6UYW1P`_=Khmq$NRrwfJ zVQ@y4kIs{5Z9#6-jFy!AOrZ|-zziq;JET3XNi^!5~3ax;N<~c{8XD1 zzkMM#?(I<){*{P(UCN%v{+ErLyK@YyfE`U-Ul6Q$)8wRf~72AS}% zDCakGhJJ^C2*0>k@?LvQixT z$l@#N5z3*ea=PGPiX{H99e4gujpH?(9_K4W*D;ketmVM|{_A#Tl>;)wZB|*jR=j`Z zP%lxi%e{2(nr5mFpw*r8 zVJuckqI+{_=$EN~A63DLSOG_dK9oI^C`MjW!4OY!wO>ve?71CUD2pJe0H;3!j z!V`hRUUX3qcn(jf9i;kx3!Uq!6NAeKc1Eb`^Gu*lq9b z&8dklfp`QZF)-_ZKS??W_4SuZBt*T4asdSEq}x4-6u0GOlq}FI99xnZYYp4U-6zeC4>X0QptXWXge}`(7JjGfYN> z=CUSw5D$)-)ZVW&a`BFjI+lj8BvxOcvalZ0R4a{M5yOR1B$Bq^!eT!X@{yato_RXR zFyCeWlRX?}<4Z9IwUDHSDrLpBX!etGA3dqr91?}4gqlU#90kU<{@qA1D`gR(qssV$ zsm_98+Tr5@non!yW|{A-oWiE-WNub^y4o3z)zkub}kEzC*T1WBu! z(%K_%tD!cV>(PJarwycaz0Qw%QSsnSP{Y8GMD4(21>ZnWqNUAfxke5rB8ghMr^I!0 z1U59ej!fN>WS!JgI-gJK=s&GKLMGj1=TRo#dKx+d>$tJ*uGo*-Z&Y~a(^Q%V(vAPC zSo5MQb(6f=S*$r_Zq;G@jy`V@qMb2Ao^zh4Pd_Z2fjwTu)c5HUk@_X8>w_~R6!dN~ z6=(S`2MtyOuEamoqWFr={Zb1+we;5a)9DGOVzzFfs;A}$%h*tpG%9h9rCIMUQ&p)% z0aNE_@*d(QJ+me~QH~zUpsMQX9DTu}*nA)BXHFWk*UG9Ek;}M=48HeBio08vkjt)W zM7mvCBeGqCWaIHmOrPhS)83%k!%^)&uiyTm9KHJB2KIhw1778t4#j>igBw{v=xf~n zzprtS&>1Uh7i$&J!q12UHHNw>j%u~tHgtN$&KKe_O$v*%X@IuPn1$l>w+>?Vi-|Gp zrnAM%Uqbzs?O~Axp|9o(3(03c+m(dif)T7}n=ZruO!tUlXt|$39!!e1$yJ+eFC0&J zSvfb8$1E-#ynLf&HKZ&+p0AjLVNhy_$oA5_b`2MAU$7{ogTE?Yb@$>y)Sc63b!=D> z)ppYMf$ex8Fzr45)@P+#)0UqV>UTtw-I``!R_-~gI}!g-kQoqt+Nv68jl2H(X9A#A z<17V4j1gwt46}BR72h1VnUs=Zd|27PX*|TbVjzjJrT|8cr^m;`*+jSTJ0@zhu6If5 z3vmQhBbt^s(`RdIQwDnmkvpqNmprh5qbWu6m9Yvp-~$MspWNmy)rW@Y&l|7*aNL=J zRfkMZcV60)!#Z&#EgQ{wx|~wocJg>;30qx_^$FERUgkTZ>x#ic*Fmy#sY;$}4R%AqC zM+>?k@r<%)5g;@6%T?H57zzeilNFwWbcMc6OZ^1@$54Uxd}m~{C$|Y`k!O^8GE^{) zjMm^_tb~qWiq3p0NDFmbYCs)aeH@I+Z=GzaMomN38grRo^DST^*{RU_d`jq(o`!n z^~j0>1|ljuSKwjRDMDVXBpP(Rbr_pJTH4CwzRz74VDXb^0o(l5Om?1-(WIv4^UUB& zW0!BPG`nJjP9p0*+(+2QdXZi?4mAP|l1GpS3mw4NfIaG8SvJbCUQ94_md&>{kk=I^ z%e-92^*vgYooi!#Sv8`AovV*Fi!9bE%gJpKBau4e>W@!Ibu4zr(}=qlk=G3H^Ms_g zVL1}tGZ(GFzZsaqw$r-hDp)6Rd1N0CM z)fvk(ho_s#rYH4BtG=hbzQ+qXrw4SWJF5>@r&do^C6CHa_A3_Zxzx44reMT65v;QM zY7|Lg68c$wMyXyXXb^k2oBam^52r9!Wp%E;vlz}+sb2fND5rvWd@?B(##Rn^S|sV zK}ly(Vz>?(E~(jIDuzi@qJ4Rzae+RH$wwPKFJk)cq^;?XDboI^`Jw-f4@Ga8JyDm- zV(fcO$V*=I2{uQ);Hej;m7g5fT50}|iwW>)rq6~i`@>_K2wlj{LO&$7d5|ydvOC(j z7}WA{=Pai;&^WcthT?E9TwS8u@kn|8DlK-FL6U)s_ZLc=2JD)f9nrqDR9qtw3uECeaY*kU(P9Y5o>tc?BO!^w(SaDYkwr7;Qea$Dx)RuS4c(@!b?Oal?-#U$z( zmSza-b}L~UIogAi&(!%fc_>j6#HUo6(Jv|hOylNZ&}<*L@?C4Aq5k$>g3H6c~%Qq$ojG>u&GDOj5;|B zsF)eM)wxuk>z%?B8D(mtB98oj&948lAezM46T6;ctl_o=Hm3<8w^(Z6w2&8n!VSk@!UY?F%U>{PB+%}W+4=nwYr;+aWp*NM&=pP|nt zvKgs9aFxWpjboQZc1+_vafq0yLl*k6P728Fdkc48(X4qVK35D^0oPdP1rWyP+?*df zODTyDhcpYoDq9JM$fx6Rq8>FnhLFRFsNlnJEdvw0JTM#k#HOsqLm4 z(1g1Kd`!hkV-NvUkB}LG6eaZU8D~7Xd;Zvdr2wapQvV;!wryu1wviC?sdMw#5U2aH~qtb2Wu{`0zJ{#C;gmhTccV z{K)+b2|(N6{>rsci4CCoJqsu%l;Q8MJ2(E8W}{0g>}>e~$>%eRGLbtD>nscecfV@KJMucfn`+L$z03c_>gc?G0@gHT7rpF&j{I@oU& zZ3MVAL03O)hRjUkrOoSYVX2j|@2k>CcZW)M!*YfR1*p=jntV|=JlvU{3sMKGyqEXL zxQB|`;;d3f{go}lUrI7BE6AY1 z_$ZJAFT%26pdI0AVS~P(Nngq@9ZixYtBtD`oO&L3Cli|3M^0OgWMu5-{8*(O_K&I-(YSK}?cj|V^5cwfXbfWX9PWw_Zd$?ZfgwR_* z2~LMGh=NyRC$+wTH&Gy2TC4@8B*U+08gjFjI8kKH#m~vL38}QdnU*xlyN@M&c~WO7 zpGPHz9qOe_;rxV@S})g|<;DlKQjcf@p?mv*``9%{^kaJOR2~ZBxJJ)#d`3BoT!m6h zb4iU2){dj}nb{qoI-6RfWHDW2rO!G964v5cPYV$zzGv{bXGvwYb#F!A2@7uC=x51DFVH9_nY+sK4oE!Ru zU@4ig_RV2hg^^;S-&2cgI@u9%eA=(Oa4F&_c=dQJN=<$NG^ISI$sE!ak#PDbOexCs zX9|&AGzydqe+3%?nT9_T3=Js%OvLe-uaiBB{*oKHwZ^&u0&!?*yBkVldKWq+3W-@2B!PGMm&DNg&i_!5Q&9*?l(`7UY;#z-z*D#7l$ zn9<(1F7moLkGKib5iw6e}8Mu!1a`QVs`G$^b7_v1nkii zlK*$2`%YIi*RY3M+M@Aww#kD6NZ;%HvMY2DI=@UQ4=%$o>t6O^S9uXNH?mp>vWH9k zZW1hhg320QL-~Lw1EjMf(GG<4Cr+Z%Zi0=WlUyI&0 zsZ*kWOJJsGUUr~w9fk&U;A^&uJa4Yj$(QLA9vTEKv3ak%58Sv*=^mY5n!EBvdrssAC99v3m#X?$yZc@8IAe?8UY#ijjS-S9Zk|do_;EW(if-N z)4HxOit_CHKy@||$d5{ximbVv&8oSNg^rM{AQJ3fS8mET=^S(#5Kw$y1ki(0BIU<=ZO8D*OIxtSV9{*jQ8yl;#O+!!3C z;t!u4hA9Jg|B&_p^ykpgdjHyVsX=$|pG1%6r)l0r8O~Dfrt)>y5<3&=!Zx;FC@6_6 z&~)Cfqs8pG71E!GtBp8twf;laM5Lye=F=|JPTR)dmoh+w?@d@kEx{9g$&zk)P)Gip zUNH)tmEyUproKpOXnzXp0h+;*u;D%fg6^kSRALVKI|;GKh)l{2Z> z2beJ-qPR{0^eAlIYg%qwN{6?*duqvI#)yh4Dy0s?zn)HQ-x-^NuB(odOyf%mqIjBV zV3kdTP^H*0dYEXlW574ZHvCtjvREhy=$NxR(zUC?LE>S+-ov!EZ#Qwm?yL}|_=RPL z?Z4}X%!ICnQ9zD^NZwX9g@3uoZr;w+v|2FYpH93co8-Y1A*19 z=N;jB^FYEJ7fi1KvA88@foS6BcXD3z#>oe4;H^q~sXZ`rWioQ9<;vdWL!~Bm>-6fJ zaDd}?_CuR*C5`=T)cAsP58vKeIwH(b|Si10BU)zuNk^Ot;JFnD{O?&C$6BASU#>%#`QI&~oqm1A{jh z=(3V8xO1J(Gppor>BVh32QSj$O2aUR$(kP-FR?kgy~T|v7-d=^1VxMMpU69c8n_P* zTmwYP$*k|K&(ocpoE}g5?j8EZT`n-sK;htUC@LF6xA(JNkaq~Q$zQO+ub|O9kzeun zvx~u4pYy>_Qt#n|OoPH}g=UdqNB(>5f3tebN)p6qP+l(hJU_R+VO-#$hi~WbTecQO z8!9I?3&K~g?&Y5#uW)Dtd-(Hl1&g9If-!e*W?=Po-_8so!BwlJM`I7;QfA$}{>?ab z@hHacbp`KDBKKa`7!Zc!bNg~t1S=3jIU_3RiG`#=Qp6ZxkZLRw7p%D@yz*Q49{#Il zIooB4pvg!Zt?5s`wP6EBk$Y0&?9@TM4T-i-a;#r6u2-5z0wsZy)Y(k%*Dq=xCKPVd zU>26Mh%B25YZKqaBglWpq!AMe=7PUkNY_Rt^i=>;YJn+1buC0TEO$G$qD?z_y>k}w z`-vx~`w+*BOG-~QpWREkewKhh)4|j7_XPFV6hM*{w-~Gx{JL}3?T|SV;x7Haz;+9S zYDC3*O|6VjWg6qteRc{>N);N$dW^6v0)^H=g~*<2`oDUO4EkR*wo2@I5S&87`eMfOl*A3Df=hFk`<%tPU(QOctV&=k(}C(>o+S$m9}=uhnYXYaD0_jP{pg zO>&%wb7&gCfJZJ#9}3#9pObVfPLz4GBYKji3IzjRm%Qls(6>oqtw9LwO}P;cs#KqX zKiZ^QxszBwE}9Es(A>FX)izM}-RU)-du4jQYIS1Y<%5L?7N{%iLoNZA^G$S;`y%@+ z?#dMx;&_ZoEDCS(9hkZ#f@ICUu~zu&Bm zJ`2*!589)CX_E&9vp15*j!fdQm9m0#o(}IOUP7#%f&Bj=EcYzBKE-+~kqna?p@<2wL(7UE8UL z5cGzO%%Fbkr|YNlq7neEef~pwC1F=HcEN-H8-6e>PluBDx(`@G`~6gVl@n0dw62Rs zv$bT)eU~sd)>-A-!Q8b3RqOvDbD%gprw;qXuMWKS{y(Y1AMwAa!*;cCVaEf<&PQ*# zzN=l#reImO{Z8ul)Vf(peD0`h0lUEP8J0@^52lUwgE_8uSucoAaH&TXc8+r0W#6mH z-_g9L*llT>31541d^Ku(A}V}v z*|*Dgj*sq-sXuK2j+X~gOxJc>PgY*2)`T|LhW9C&hCglV+aI|23L;OMgxfcmolxGJ z-|yat+QnJ9_`y3YUux1E&8a9g^ikLzluQuhClx(r1|?fCIL6ZkWaV|w=s-GTeeT*> z1cu<2M9>TJHp`M^h021f-juP#6vSy!g&3HXe;HgAksKoqACwzW<)2x+fl{zp#x9V! zWq4g8c-ay8F!CTbw`xxRvh(o+eh$>n+XHRrwOH~c}<-I$?=Jr=*^nwMLF;(*gC6eoI72v1q^JK zQ3T6;71-t9W-^=q5uw);6zxF_!4GO!4oClw49?PE%cU}KAopWmdOtNX_2_erS`pFzWn0On1 zvvD$5`kHJ+rnI#jjXG9(B<7_5y3RM6tfL`K(-x*|>tVp=6o zv9n`j{esIqH4Oi?J;{qDi{aUTM;s#*reYWeDj+VJU)VKX#DCKnvr8!2ys=0xt=bWi z4SMy^r#b2bwN^R27dHu_=oW`R=0LHc6`aJyVpH#tCNZ}ddLzonW)=|)`6=JttA0Cf z&dMeD1ih&S7+S#MTquIwB8urEbl7mtaVGu&ek4k1Civ$&j*AvR#_`0-;`RrcQkIy; z(_HI+JvN3`k0$6)YlM|rInq_hT#>vcuo%sP%Qur}S`$nvq}1)*U=jK(Mlp|X%|k%| z6&tN-C@9O*j6Gic!^h2q_}lB11)9x=ticMXz;;C_sM?0X#;uZWy&X6?RWc^%p0#3uzWx^_|P5* z>lz2-*v})=*OmGVGgtfYp2TU3Ue)yQAS)AE?v6Sg(>jj9KNSBl zwF_sTvLARGYu$C4PMj6n2VsVXQC5i=`Ns-Gy87#=%pPuqEVpO~Rt$|BtU4ODH1OUp>(o+mer=5T`?e^q zASRh%g-)V3cU^Jp!hdBhi&%lDnAD6ByS6~KYqnLBtqt6i4DF6wF{4vV1~$J+iehYv zSc`WbY^MM4_5vfU=msF5MGtx~%9G47Q8quYrVF_6ywyX?E)vD!Bc6EW8c!cgu`&<; zFxTi;>yjbZ?pISPRf~zYPo|=B%SB?DrE>|;@VJTH6E;t07I-XZ=b9YvLxKF@DdceE z76DV<)_hEIvVvK4FWCZmdWB2vP=QbAe8B8Q0@I-gg`TTkj zxJ1FTMVg>RytDSwVuQ%h*vycp%yJ0M z)-*9JL{L?$_EgwCh;R|d4#fX{P3Oa%uP)CXo+e$i7$D`z9gfHu4&NF1iDW(sbjDKy z!E8x9stG{*HMG_?lPt%S9{E23^*Of`1_y=Gy!Oalxrm6;PN_(bTcVM!_5=!8N|CNi zzxul0fhA-*20O0;FN5*wMg&sf9aVo0i28jLn=o5#iWfeBV5* z1Yxhz`XAiap=(_knfw4(>9O-687Gz6ohe27oYfnfM;+H)H^T&fL|WYlh&(+O6OR-~ zt`q?R_t8u#6^xZ|R%YSm|JZ9S8fOV1)C@4GW|)+_E;X;Z)h_4TiAcK^+U-hrS&fK| z^tH#Es^ajZF9Wy*JNHMPU|#biMVf@cf4KWCFnx|jUQCc!Wcuu_c`0iSxT=CJ6vJpo zeBHh1Ai2`iS=+!1SparA_F$0SPBP6Qm1r4wE}8|pdPQ98pec@$sR9~i>srr#%S2;I z<~{e2YpP2Ws1#`f+9mM;b45u*C(B5~-qjO3%;;1j@rFa7YA9Sl=J#9B_h7tzc^j`l zFAy$qUbUd=p`Phvdv8XQ`?ii8#~jPPth;m1E74JbiLuKn9fjkI`u_L8C`2W&459{y zi|da$o6OQ9=Bup{r>JgDh^}Z3f{15&(La|K686d}tHh#yNo}c;l{jUTxZy&SIfL^m zb%Maxy2x(TDV2*WcIie|WY7af)^sf|e@orP&!EAvZzW<%aL-E=!+*v*;$YiEmP=1tn;!HCw%-DSm zt?K=g3FQfPWe?1z)$3!M)L>3T)f^$pC2q` zbXNzlV-mD`kABykYKksb&asw-&@Kg#{kXtj9`Eu0F?JSUQLWwEKLBw0NOup?4c{~1Imb8t=l!m0u01d_7tGAwd+qhC zb>F}BN2{xfpg=uV7pJScJSmqeC>L-(ybv^>H(=siT^;BdKB+gl>wv%P{ci2eRl>O1 zX<~lcyDB7E>-kN;Aeu)N_a`4&Ak6$ys4jfr*W&WQ+Yt49rh!zYAy;6aT}wcR9JI%x zLCdKDB)+K;r+JSm)pjfIL36`ax0W_1MUFW+E)+vXmhW&yFYXIwW^%#Lw&US*36!~J`x&}+qhE$myb z55wvr*Mu(B7%`L?o^K8gxilOFWH;v_LVwFK!0c*_D5M;NSP=iJG$LU;$@NE7hGZTe=y=WvS&h+Yom0f8J7JOK zZ4u?4n3f7Xt=?w5A&Kp03frXWNJ!@kMkCw zOfFxn2CNnOpEp^gB2}cDVA1EZKeU4bq`pgEWGU_mTb+Y*7R=gKbIX0V3Z0 z04~ZA)ss!CY7XL_>Rc*Ieoi8nds`J9)mr;WN)xHz_X?{!P!7e*aVl z^bNf@u^<^iK!n@z1NMIQqpo1Iay;Hzz;g=8j4!<3DzM?EJtSjjn8H5P{Q*9W`e3 zAZF)yZ?iH!EN_*zthtf4jAWKmc-+W;49jNhZM%hD`3tPF0PM1j&*c^dWVvH4M~PXg z&c5hLW9;GaHl@8eS*>$l+HPbua#B&P*_4Ri4J$q=qZF?~F*{HIP%`Yis*7F}0dbR* zN}jc&`Ou_mkhSVEwft*I$t~U+LpUMVAU`_1x29YtgfE;=%V3#YYZqQC9iQ}UGg9IO zzu_vA&OR5`F!5)2pLen3JM+AG=6T^v2gM!bP?1#+k7=eowd4BZjo*&z<5FJ?JD;f3 zQT)MRtg~`$ZEGW#7Q$RrL^;(XQN&QGZpL?WP)!}xG6Am^SgSn0k3AI&k^KmXluZL= zmt2HHDWNlmX)sx)CnM+%ecGb^mev9;$UyS+NJIZ5i$3aI< zIBaXNUly;^-XrNZq(v|;6H$mngo^y@R9E`0z~Hv@D^uCE|5cy z_sW=2h%`^9CT8Y;Cz&2P>{W)c6MmQ<<5-zGCOI$p!LQw8`eJFl%h7@>di|I|%;Sk> z(!}a-aI|;FlXBS%E2TOkp3GR~>&Kp9gB=n^O*br)7qYOiP~#*KJaI3=3*+;XqMl@= z%;`B_W8(KCoLw#%VFxuwzV7H3;}iK`25sz%#6_Y_Y+Z(R;&5&@iS@M`K(ucmOCCSt zAqdDJO`nnRkc{)YZed^Bks_Hu_4yoweDuzXe)Uwad{Npo#>6*~0x2lF*`8-6kZ)f; zmPzhCDp{(<`{oJUel1<_rBI7&;#N5K8&UEkqft=f2>;rE>$fY=AC^by?UKJv#6C~8AzL0CN)JE8w+W$!{i$z(#%e%(k@}Vq>+V~{W-aCmwO^MCAn%&phV5Uq z3{^j4ayeg-LRIQ~C1iwl2f5{_>75@tw^yx>dg8U&$G)>y8PEQSJz~l+Vv54r>l^z$ zp0N4})@~^AWX^4J40IDz$fHoe@-h+u zLu)!T9~xun{T>=;V;lTMpT>IEmMmn|Ng$;rj}4I0Z6O!Vr* zfsblor%^E^%J0>JgtyF7DvJC1G_#LyJV5Du^df)v^r+8X&MHMcMWT9aLq>_nWG^dXAq!BNcoHdLxE{?12nc9V4*)1& zzgm`(0pGnWh^6JorSZw6fr6~R&1hmHT^%!zS2BfKK;+q@$Bd=|wu$W5sP-=|1{$T} zPJeWzcn?X6R&ayi59%t3Xr=+RC^AfT!-Q+m+VNnTV&)bh(!>I)WIt;r*g`9Wc_u4?y@pl-rhu^la;Kib6S3;XvA~3t6?9RAlUaCR@4rkyuWF=rgyfl86kOQ`yju|kPKr}R&unp7CZ&NF_R zC|hhV{+^0DqC(Q=f%a?vq*L2bCUlW)nx2Vf%8TFCxNjSC)UIXrbjKjY+c2zj`1N8t zI87fZXz$FnPjXDaD39yaIBrKAcz4(4vVFNRg*!t=<1YNxtG~RKOU>Ja;#`641LK3) z;P$&VZjY%p=)FBl#M#;kACoHd8uJC;RIshD7 zA~sHsU)bZnA`oS37pZ*)HSiC>Vu_%pV{H;4pd$#-rD1{6aza7!pBjN#-78Wyugej! zBp%U`zGabHcE`hrG2YvOQO=``Ft#;SO^%2NuvYbf{0_e0@j;uD$K<>Ac7A<{40-qZ z;{^5y?zMDb$`qO(re~Bk?W$V^E^d$@o(Vs+q8H@dw8lq8fB8c@agBi#;GS=BlXdin z_3*9YV#-Z`QI4q#eMwhy=k+=5>|}^j8>jJ5!6P97l$}txo1wZ<=VrgH!PklUq@W&@ zJ&sAt@q;&HhkL6o9r0XOL5WE4-Og`h^L zD1Oq|(88-ybyV_0YiRM41>%Hr_hOh)F&4u5JBbr2BjSGAItAqT+IVH&QsDqUuw{G<7NZ&$C3Z*HFrp9fOS$0SM zVZBP={)!5sG|TAk4a^KZ8vnl?dKojGVo;Ajdm8H3m_{}U>2$TJ<5K9_ZKz(zb~}gzE7M`4$UzQDG%jN zWRWN<-3%+eL%SN1Xrcxc8m9TuWkijVI*zNzhwc3)5HqhRaS)95asymY@F& zZsANg#T~z3##s-X1NF(mk+fkMBWVKFZ>QD;LneiO0~spRI`ISC+d&9x%I~4`A1(Y7 zu_KD9Z9%osm%oI*3uoifv>>&TjJoQiujChLKk<)F%Cah%$}*_-d&>$x39ju>(aPsN zqB@@N)2*Z;yR~4+9`Jour{mZQ^2NJInl(E0^yHtfZ=P`AGH{~@5n>fSo9aYHK9k;7 zAE?@70babhXwEdN7e`uC!Bdj(OlsVzQOvYFO-x3@e;;*57S*sbi| zYe6?vYh?q1qh`DcD`CzEZHEYLrymKoJTJk}XRjqAa;2(h$PVXhdIauO(Kv~6#vIwf zGk%Fufx#^Y@A8mQ>OLzPKr`?UX!f>kSt~r>FO2RxpEqn#6wPVq3uXumrd5|qXS2HB z|D*F(>c5JO6PX#1CN3Z;n2|xMhW_Ich!pEb1YWthB<9ACFn0%-_Skw{t9P~!Kg1z| zbIH6OX;XL~(GyW>*1DoaXDZIU0*R$PNGuC55>Z`UobP;!;Yv8a>rTIlTT9)5)3$4N zA~qt`a)Z2pgi@&D1L`PFD@oK-Beoc`7J%ITepiD+Mr<`Qx!XZM{n5(kli@SSsk4a=u&T6|=KTMXXdY@FqV>e0kpzEdo(M8GyIkG5mcr&8xwpJ!J z3@R)j^Vm>=DLwMIeI_lqO~`teWELWPomSZ0pzRNK-R%hCYmvwb%rziU3loc8t$onX zRG|1GeWD{vT_cWWC}pNzBqC(YE86rcyQuBtEjwaXQC5RMgSOl4;Smj2F7Hf<-w$s0 zy_T%Nb9s^};R}sGIwc+c$tg)#=@e++NvrrGr=>|gX2DG^1W$zLTIVg-e3phNfk=0k zKm`Wqj)Bv2>@CN$8F)#@BJFF$wS)(e2~X!Y`nn%GC89-paCS`_F*i!m?-`u~A)=2s zJXOV}oz14TQ&?lOE6=NYVL{JuKPOjM5)5blrx;8%v8VTAfN4%4eJypB4F*flR1iSvtgIN85$}nZ>wME7?-I;< zpL@@@>6(`G0Vp$8PF)uqq%j<6Jo`%NJJN{jwo73;+>IAIj1~s7t?Y?4zg>3FFGh8z zZT;afsA@_5wTgoXoBu~uD+5{8da6j~Vo69+$cpmLHGkZkq&z4{P;^cJm+vAJ;3xr>BXFhJnhCSud(rb!!nj`EXK@i!!i;#8i0|B zo-kUssSPj8T9c_V9z*BU@0I*e7C%mPl|0Ig^~igeB&?{RBE(!>^A=i0i$m(?)5~jO z^n3l#SocNP+9hj65)J-d$PmyWnLR9tw48}0jqB-4RRm356dzFw8O(dji{SGpV{C|t z&d&X$=k>d`=dazw(!8~6*)Pl4U#)l#Ezs-MrVnmrHn*QpSST0M64mv=3*_rp!#DSxK%r> zep^SG6=qTC=CuPvrRjv_bv{#1Xc4FkSDG#UX+d&Fjw$8ob6hLOa3u}f2J;2h%`cWm zL$?5B^S`WDkZKL`wDOr)iaV{RUbLT6#!wye`$CN?OV$STnI0YkL0Rt!Z|MbSo>Y%X zjfx*tTUG8sQ%Lu7^faN{!2_AjEx5h*?W@;k<7&mVp61mv^fqBc84I#2Q{-z5!p~Qh zowlJdxt5Q}dhIKauX?0R!R(URuE=)_`2cE=vDonjOcTDO-T(_`Ek)%I4cOJy60BYp zNGEjugy+=McLFoJydcz(z(rWM0_+fG^Vd_Y#aSOBt!{LJ1d9POm!O29cOD>-P-N{7 zF+yJ8!MP>@N1ki_9P>6pNE3gU8xod4dBDfmPvKJea3ah*s}8c~-np*0vTBh*qD(JQ z8pwxp68DfC&F{;-?I3#K$`xD}cxoF+5P;q#kCQbkjZ&jof)Ygt7-9+(06|dMN zbT%yK293m1qDRjiwt<{GNBnOyX}X8otnV zERqZ?mTt*8PM{fzqnnL1nU&Ux2Q|XX0Ha6~cc0jQ0}cGD&x&%M>R$lD=FmQwYJsWQ z9Gs3i%Em4YqlYw9%vPhkWgTt$ZPEGE3`BpeSW&nP7FcJhgaw4ikqYj^bJuBJrpC{H!Q-Pt{zx4+z@3ZQDy313xzf1E_lyw}bA4Bj>k9r9k&yc~oaMO(oOC;-x(o1(4pj)UZ!ogK)P&EA9a@UQlyYsn zJlSj9ayMj_@}r)(0lm@5tFyk4vL2L${LHw`P^s!|CGs;wgL>|JpvRhKuu4MfP|uB< zQ12!@A3r1b#ku6hKsqIV2%Jl;v-!7GsyS@mJB6q{E?YMuDK*7*NhGWo<~JPz?*mpZ z$CG(yyG3;;cu4i0=9}Wg#k15+nYBFF+(cM&sj|d}+ANFXofq(SD?b0ARN$cRKA#&?byMU{qgJ+hr8BHCNAU2>5|N!VJU{oRVFLg=c_ zk{ab$qJGD_ATM=F?P)$}zco+P*n?%gCdi2X%R&_k*`6z$Nu{_$6atz6`h84$@vW&@ zYNnJ#qBPtgqB5m}{EyI~8xB>abIJLEmbBWiA7i;%}{> z_;i0dBM5M-NbgGnq#wHW|7YQ8O;vOEe2?nu(oUIrX34RHOMFb**c~btFKW4-Q-MrF znbPOn5E)b>sv)`VV18*5HZL&g{`eD)xjR5e9I2CyZ18{-x%aEG{}hVWF_Y!|&?iEA zsAtfd$7e|3A&6a8wa-qC{HL(C5~w`^+>n5-E?|a><&=)|^h@JxSp;(p149QoJ&fT% zAt;osx2kzTpfbxT$DVu6RdBmVDI%;)>Iw9s6d0>@Y@$zfKML95Sw2I=lQH(urj6z|7+yHKsK zBpJ)$sfhj7o1SQK4i4#q5WTT2N2uHxbkOM&i!3UF&NZiMJNEu; zWWX%q4gsOnsq-n>8pm_n$AEZ zPyo3$&*}JP3g|mE|3KgIs5v3ns|)?)a-4OLSMP}mI87Gc@UqRj!mn?-N}j$=bC#IYiXKOZ@RgUgsHm3 zbzlv9^Q%J)%mu8Jy83W=(QG2;}g03JP z7|ttk`?gwZe7Qp8#sJPEuAQ(*`%)@!(dbmlDIm559&%OF2J3YKx&i;Qz9wDL=AUKl zo11EK)sw8j&8&~)1?F-LO^-}`-$@K*7E~vj91KwcZb{NXdfd*1eX_i=paJ2V!xW|5I75VU?9+|TM@!?$ze*mprwsM{%b&IC!Q;o4GOj%6^#-)`K1dS|W~^9Bj|85xVY)v+ zhg1b=eaX_uDd8sb3qz$p8`4vNi&>8MKyvF1L zqy-FUUfZm5^Qqf|ddqR6ZKsa&15r+BG@9xf3fI{*ZmSORuVfEJ*K%X;-tKWxRTA*U zy1XG5KP8%*pvhp8_2Hb1*p=oH4;^AYLtl^)w-qc-SZe>pTS<`lQT*2+udo1u{5`H* z{oS4Yf(X-Y^?I3w>|lMPyPMso7I&m{g9FkAlH-cYKGm8n&6Ii;w;WH2r~L^P^%y&> zT78i?omM9_J#?-@o~U5e7OUeQe~pf#O8BQ)S9s9eKb{_HdPlfh?~|(eCl^1_Ziue) z6#jX%UY_YbV@~Id9fikauunX;r7jqo$8`+MLKm7BTqrw?IbcC1KaPI9kuwCPG}00X zvPBR%Ay>nR*8S8q6jXr5Hg-A(S$o?~v1N5%|Fx&P!5P^jV_A?w(P&>vT`mthP^kZR zG6C^q4S7WdNl=7op%I-N8-?odk5UC@v3PGoY;7|%HifSGBHscR@Ra7j2I)ENH<0T< z&76gOZ~tr+y{M1eEHs%l`VsEF78U8xU=RsQ;0yD!Y`KSYq^;lJ;g8 z(Uhc(>f79olxlJzZ2%h`ee*_*eZS;~q}$!J^hfxAHP!yz2Ur{>Sj$&>0mpm3 z0hc_af6Ru^?1&c<7>ch?fjv3(WR#p;R_J{7Rp8!e{bM)}7sO-e>t9G$3UH+xKhW3s zMCEjD-Lzq<1uw2^8>>$VZFG9iSvI!>i>b5!0l$R==M#-9l7?(Pa4Z%|(3dsAWPC^w z&{TD&hiXbLY;&jKLv*=VMp?O^-`S}5^U@(85cS!4>rPgie&Uj7>vi)i=vJznvF=~S z`9V+{OzrrI~q&o=?IU28Wu*W^AtDA{}SV5x5)s#CNTqjNE!Q?wvDswL@%@SN|f zaoiBHR2yM-OaB(^zQebwb9iy=mTmfQ+>Ptd?+$CPzz?LUn!+V!{*Ls}?}Wltdasnt zUpe`SRzc+Lr}Ph^)gOjUD0?hkY%#&s7b_6k!JT!dgv`CziG2E&I{v@V6fW@;U~=~* zWD#k!Y6D87e@urA+z|5fOhO8T*+g+dq2`LoHwJ4SI9@Z-dB88r27&5A!ZD8am5k0< z(1-P<-%(G%geDU7>AfcvfaWDrZGg&PQyQuFm^v62(knz6IPL+`6ku9(IPXC?MZ3M-_K={3iz?VrB1S9gwZS`i`^+ zsmEUY*E*rA`X1F(-Y)&~{3MVtpsqLQH)u<5zkSfmzBaT^!MqcHt2IMP}9cu)Q-lcZ|MN z56rpx{Hbi1@_hY9m;8G*x5J&Z6_1?${iT_SlkK7(F&?eiqc2a7hD<(Wp60HcX&wSU z=H6*lu_M2tYSz4V?LEr1GAoepj8ou?YxgJu8LqhY*=W+B#zF6d!!H(dCpq?7=c5T0z_kbGg9xc2Nz?QtJ zHHDKi2`raHDntJ@C5{F-kDqWXMFwMs`~Q?PgId>7vYYk`4=*Wv!#%;O>7!r<`Bh^g z{;>M$lY{lwOAO&Q^D27CCro*}Noah&^l}|>7}Zo!h-*h*Q|%^y_7%HlaOS%3xQ;&= z3L<&)`Ep*pJ`smnRhn^Yer71E&$JR7XYa)3-xnw)p?>T<+PMjX|%72*0n zqO&{7VY%X9_{MhP+P#SFy60Qb#2hoi48IjrA(oR9zt){n=;9@1sc7uNIkZ4?B;8w_ z-G*N@R>#w6_|3R;bDM#+_t6_l?-ls~w4H0?qn~b6Q-&p$Hi`By|5RI4Rt=vm8@us@ zg#^vMHQ^3a*UHNX+a6}}8hgXtaxkl1$Nd>SQi;0-ejr0#t8N2~e<7JX>bjVqVC9;&c!X!!>Z zaW7FipVk?ZfmYmw>(E};vd}Ao1P7A;;?$6?!Sas5*S6W$)=A|Z-?qZRgM;YNoQ}QB zUMAQ>xSL>4>&N~-OlH<4er>W`a_d02$JlA$LAJqw7{o;+wGHX9_>WGQaD?7{IrIDA zoQZ&(*#nOSMsAKouON+w*xX5aLov?MXt+T=Z9C%KhWkX;Ujn;7bxSL6RWpBoOg}<( z$3GDWxRwZ#p!iO`f7*us!+#vrq%Bl=0O=URY&rqH$OGyzZBsSwt_TeSqMCrLQNM^l?*rbV#%_#gqd>yq5TfDzcgw7#@4A;UV+g11u#nN)8c3~ z5B>>^Hy?%sXy3k9AkM_5iU^P>#NbAKDuwsuxxy zskK7gQp(2Ot}CnTpKI-h_R!t9g)Y_cPZm8+3IqoqK550)6IuxY_aGBDVo;V$OM4%r zS(z61zY=x&i8yvw@O8d@C?-d8$bQKXJkhk)eCxvXrLvRqkMbW zrt{AJtjULv`SrV30K@E!irnAw>lM(JS5zJ5!$6YUZ3JT#X}y@~m+ae`r`4vB{*#qK zGE1BB@}g9iThfMG(wrLr9wi|z_Al<7)r*a{i%1qjm7Cb@0fQt!#U_mSmi1LIFKl?R0k!Kx0RZmC=s;-C8kC6uY=} z)ZDm}TD~`im-?2j8|Jn`B91RClQE(1kahoJR z0&bHOgiv%i<*p7reWaSp3)!h{J$mEo2&)fN;`EZdGQPCf5x>~jFYQhw%mUhq?Hm45 z4@2IRof;4w4gCJ!a`KNz=oP0zWn*f8#QjREOdBaC#rMN0`0f-Omf5Rv#-uW(kz<%$ zLZmr5=zPpee0%d;_xwhS zP~EvhxLna*7OG%CId9Kk3jU!z+MR*HhZ`vr-X|@%gp!?NT}$EvCxMRpdD@ujbN_qwn8 zk3*{Se^s3}iq4?}eZonxF7YD@4J@uA`vXK%D9ba$!{jw90-bUR_C?v8bI#v=6TFA4 z_x8>p%$rSuaQMMVW|eHthJMT%u9OKKXVg~DzFQ?0gzq7=!eTmJjs_JGq6Q8z( z`L(Jwo%=zUD;UnXtgNWdoKLM_`|(PxQC02%<(;@rm(VIh|0+5t0>4pHuUyK!9Ly8Y zghV*QQNtw_c>M=5LB;*qczY-Mi67c*?5qFmqweYu{YtumI31L%M7QK- z$}Wa*Ijara-?`&$_&q&!s{qVBX<56y#8#&w9_BEnE~HqlIq|(TxlCc3mic%LKkog6kAq{COIBky;h-SIQ7dwlW?jjh3FzSdGo&mU z5Kavs`HzoyUuAaF#l3g!z1Z2q@b_XdjvlTs1_LG1vihy(hn%j14bxa`5xU)>*g}{<_30SP)JuU`30KV6X0FE@Rgx(Kk(U#UhaGt!6JkYiEI`I}U7a z@xue>x#@r+`kkFgf+fYkUf~3l-SvaqIm{@1@_?%*#){h@vWY}HA zZT34*ov;S5{yF%is63hZF%0P{4fmiHrW5!*ie};;G0r%X2UvB6w{vOsYWq|exPsQy zT*)PS>Wid5Wwie6AokBmz_S(8$M&*3w1DhYX%$EkFITkoADv!o)teQbove3=hGq}D-qI{d&W%M*>(_YTdmnwJ6wg9;t1mG# zZF@5jj$TEL1LoIQUcuCG_Az$e2wbKP8_kS3Cs9v4SWEtSg<`Z4O48_YtzKLF{zpx- zaj$LOIaB-(!{rzDXv4ohDR|XN(upw5S4Rd}t^li(kyDLMn-&4@&!Lm_TiBY)RTy`Hf8`FuY$krNQR;>a|V5El&HqNB7iRNdOK?Wi=w3oacAE#_T!dQjPn0{pqe2t z&#@P;m|Blhr0a4h&t|~l5la|}o)Wp<9WuR1UA!HMz6k-j@oiVd-eVfK(<0~MTG+)S zu|N`)Oy$ka0m7%^clXDKNjE!rqdumZRZ=_zc54L@9o9G0M$AoDBLH>bOoeihouG_YD+Wl z;+Uu>Oqt4T|3ld%5j{aaq3)Xhyo~>DT#ZQ4<8Cc2QvrwM{T|G11Dx3OHHlwmUtF?_ zNogi9itQmtRK%2LERfi2Z?v-6y?^zOJtVLmR?S6b#CD1+Ijeob1`~nyihHlnD8pW) zlZn%>@J9Ik;_&{nYQm@c%bNRa@JeCw>l^y_VH}f{KtlRfS3cxfMy;Q7pMZ2K3)e{BxUTB$F zmgGt4WXu~D#Q*U>oEjJ>{u05eRrWz6!5r*gKIp$&*=?VLDHqW`V6jj)RIkBhtHy_Z|TFS|mvP?a_ ziz124*`5t+gp-mV6sfvthfXkm!l*8%Gs(m%Joa5}epxf}^6XaeDpi&J%Fd1uYoXv7 z%3*=NX~S;DIcFn%0UL}Ks=XRLki}qK4KH5PQXjNwNj!CN$tt5%9ym#>*^oI1IFPU&!4;{xtlmC6 z)PX2-_%W8-O%-;rHrCjOYy#GCCw&*0hck z*8IntyDjsTmYLq&9!*XrWCzEh64-hA69*DUMa z+SaF!bGyr|=Gjr=ii#P?rK^ko;t#8!zilknimXV9u8w?cqX0ry_g*Bu)PJ>F+zKk_ z7*LrNqgF#D$y?|{dyP(#7ylO|=AZe!Z3DX@02@Z)xo{Y2XH|cnQ||_3?wG$Sfnbyj zJrqa&SAap}qk}~Vl~r7P>g2H$UYC}Un6U!+ce;C}e+aE6c^mG_-8@WNzR?tXLee>c z4Eix)<|iXH2r&J`-Qb#yu*UxR^XJ!W-au@Go#2(M7!1}aIqVz~N?;VjIC2z&%H7_R zWdNTj_DDjC5u^dP4v-B%AgL_UC`Ljj`d)G<6Yb`sI;Y&5t zy>8&T*0wW=>?Qv|JgkDt&{(hYklUHpc@{~>-loh?2VA)h?AUi}$!P$A`!_h^fil)Y z;75(ZkK+_~7DCN?C&EtD13v}A2bLsM2)A6%$t5fBRWgP65fEk}gc*hdTQ@% zw~SZ{S}nubS1ilxV7AJ2;VvD25)`dR+;c`6Ox)lKj%8!*GQP&}!=ZDEl8711-i3l> z<)0?EWtzr^v5X$=_b{<3lFQ#bW_udQugdw1X}K2_;3J8?Xss@yhX&No63c`qrZ%!@ zda1RRcyGpUBys-8P!jqoiom(*;38!jv)45%{+4OH+_cX3q$fJU{HL~UM{eb^X~J$a zU9RAE$%9D8X7OZBfJ$xN`Ly|*5(uH_96mPP822JScKBK&lpj_Z$_Brm)n1oY6*fH#jR?C@Xxw>~KyQVH|76Sk_#3Zzc^gsuG9 zxTpH_lqT+Dp|;eAH@Z6axOti2Nj(NyMs2np4GI(a0U|Sku>edPrEZ* z$P)+6C2~5$6~zD++UdqGT_8ZX&d~d$fb~8Q^sSh4cUKVF`)6x6?nSJH-E_Z9oGQ-C z>p|hXntv;Ow2yZVHjZ{+eE3@9FhbfR4^khKyU{6Uz8369Q!Dt$X3Exrch`dGNYl%& z5<7d}ma>K#5Lt)NtMi)ny#d4iY;vMcW50L8@Yia&ID0L<$7Qvg;=$)~eS;~4t8bWJ zSyb&FI=Z#E0Zu2IhE=nuj;n7$S`3-G@X|ty6XqZUJFs>g5E) zgkpI+hIDI9sFMYiNFS(Jn2}4he&$Pb3(4Gn!u|nnT)c*aqcBf?@vN{ zTNm7XWttTcMgp~gg;e$7?2$@0KXZM)7t%v2Q72tzU!^-z%ZzpS<2+POxd?Rff`qj( zZqTZ(XB@Wa8FB?=^xf}@9(KBJeJjOhfm~~f-&SQrT#iauhpS`_34mP2aO(w$5b?=e}M7pTPi@5FBgfU*X#&2u6qD+F@U9 zxTYg2WMjHGnlyyFuw%RSe%FOjgGuj~8w40I#?nRDs8OhkzznKL^HJ;;a3$)SGn>lo z$fXMFs&pkdY8sedX3tzI5ZpT<(+e}S`79W9(OYG)Y_CtE`IQ4QQGD|K+Gg~~0p{L| z`9rwC{Tj}^D~?#gHuo`mLU|Ivrml%8amr<#sZPc9fxgH50{egnKb;$Ko7U^u zYXgaJER0C%r>wLRrr*ztbx|c9P$kV#O?>W2qy;&c2Apk`ZYs(tOp$(N7p$~C>e52~ zE?t1IK@xFZxCylaN~bEhHyNU>H5xPI7B2oJJTqU;Ox*soZTJ z@dtsG?@|xfqOF(B2*$h`bp!Qc-_dyeJ%OB+R+J#KGlKX5K15UxBFez{fK(vQjv(6% zo|`FA_tnEaKX>$-jJ5GZV+NO$PO5jzA{4QTcT0E?>f05Eg*T4-75j1%$Mzz&_I8aT zot^&9-k8;kdrNztpkl7}!R$>EV3r+nlL*G$`9|mwKi~}3&}FgR_3t5Z*?6c35#S4? zROTsgb7a5SxeXNvOEp<%F(GB{ep^{MW>;P&rYStgAp$lNB-K#1ZxxSsqn6W{87S51 zo9X$rf{xsLM5uiwWq&NuVfu=E4Zlx}k0zYTtQ+{6SQZz8sRzMiV3Z{e`D7AzTPB ziwN+Fk?N&WUu~pggKsxVums;G6N5369nITc>>S)#^*SD+E{2h2H-A-)$+}6V5n}#O zdxGPK13G}?SfEci{O~{*vi~u6Jt|_%1}4V&W56QCjLSF|yiV{W1`%HC_(L7N&gn<% zb!CYDkJ6=A`?;fcAoAe5Vt18Jf~07u3-6I_vC78VXy`7lW7|W2vnd4l0DR}oOmR*&42KLdB z5tdxKe}3R!KYB=Thr#9J24L2lc$BfJ96-p5_Jq`+J*tSrpV>BAm?=K_Cf{jF(~L-*4T|UQ0tB zY?ntIhY0ZSRqB0W@CC!`CJ661h;PoCXKl8Z&d6>IHS!p1ZtM<~Rp?li#0D-JlAdfU zwRIT@ypK_BOHtQ7W_jVpKhgW!al>LOyPMDIu7%GU{5hG#vr6fy9&UuJ$V}g6Vi`r| z-3|NW!L*U{I)n^4{14aw-2K_>L5E{fiSSBk?Q0lv11oG0i5FSDAUf0y92k^5mUcMy zwE8IOcU(&i`(4v(b!*_*l}PS3Q|9>Nf&wRMQQ25|g{jSFf#XLrYJC(k2lKF`XHLiQ zy5*V9=CB98v@PLg&z}qjAUuwT_gi(|oFvzlZZO}YJC8ijmW`#}xV_rSKE}M#KPMxh zhgGpl97!zvNWhoYsKI^(55l6S;o2mor=;>oAg#vMa@gLY?cJKR#~5xv!2ZkH#6kF% z@L01MNb&{QCfz-XLWg*cia8N{tT+x5Rx{QnYhf&|%Z`wYd!sTDnCEGm1=oe zgNhHj;va(3yT|7v2ybP6AbS2by)FDUN#s@Bq=R0D!gLAq^jALjMAOvm5E@<^n}fHr zwa@3(l%vVk%zU_q#Fb4w);g{aWKW(kH0ZWvPln6aP-nRcOYiyKu=JnyOq8|C8^?rQ%*dpY5ZLQgK z!mZkk>8e|`o6~-`Jgc9cBM!O+zocm}Sxje*QNmkhlq%G|yKg_9koDY{F1zKqIUR-# zi*A`VoBOt|T+9@m*`T+wJe|mEC0MiXzU{Ju@SZ$kTLVAz6r9F6;KWS%)>Yp;yemm6 z!1Ux!_nqnA~?@W-9;6J{0@Ld0P z=KB`!Xp(C+HvNp{Al6IXT6yZr){;`}@Y>ki z3PQpOGohqHu?;QbWMtyxw|&ecMjYWH6j&6*Q&8c&QX_aa%+Wfg5}ZQ}oPw276Jk72 zC32_d(L&U47U4+4Hixco0}@+`1m=5E!E3R^?f7KyLc(Z+5W&$315G}&d#X4BV}XKz zjN|OCtUa(bi&!aTuA@4J)n>fW5$$EuZdsL5yAjP7+*M!MX!2%=i1X|B2aH5w4U2QS z`$lc+-Ql=s{8+N5-l5NK^FgTtLvVyk3XY?tLu9X2;8u;h;c1|sahmLeSen;mCR5DuinHb`-#!bJ^ z__W_GyX@nDJF{zq-_F^I880Eu3cA18a^w^o-W7#c z+HPu3RX*`I+Oc%W#PtrS)vY|hadzI^gh9BZd{MuK=lW6ilhFWQ5*h0RW;ra)l6jQ; z{mSGNuGBR;DFNO;^GJ|PO2;DeNRUjDMZ-R;@TwUP^}A7-ob7%$&y9BNxt(9fZ=6%G z{bWE@1tCWHK8Sf$Oji&t)c-g!jd?1>z7^?OX)x-aU!)5pOD(4co5P;z+Rj*?ql9Np zhF{;F9E|8be|CBghhBouC;4tO^8=Riw;;YYA%iBqzJwkfGyoYhX~oQGjePF0q`h$5 zXK-SyJ0`KOF5?!Oh?94-KYspdH)!#G-p2#Ecf30Zr35_eTvSb^qrKikbtg`8SP@7vuCk*UYu z(Gc(n;swtdzGO~O58bHLq-T%$PMjqos2_k_k#FwMmi^`cQ4FPkrv_#PWizFG@NBOe zaaz)|*89GaEZgF=V!lmn;lw2P5Me!b-M|Q97JP`99z=|xi>319!g+0d(_--Eh45K| zs`4iM;^hS$=8lY&^G%W3`kLx7%pG!AtQyT zTJuJTv)qW`y7tL|QC+-6yV66(QPLL!@&`Yh;GAYPBH7ApYpXuu`SGeTUPcvP_b6+# z-5ucda0>T^YN`l@dP z1EZK@&GDO9Kk$-1%p zsR!mg`;^z)$8_U+PPIPv?o;|QgNxT#E7iubIk=`CEg|aC4GK zCgCDOi7#}}QGAHHo`ICPftk-e^|VswRo{8U_h3fjljC8WNW%O+cVW4yZ%>MhbUmjT zaFhr5A7V-s?Fz(NEbo1(6-aiZ9HMYO=;}%mI5zR>-m;bq(6vNwzt$J`#Um$I>T3RGFW zgdHKOu$L2CB|NJ)6Byq4&0rcz7-6*sQ^#RA$HpD%lN-`G#gKIHr-PB+1AiAfS># zVyhrQ$&G-L1QaD_K|;5IjAW5aOOPfAh-45LGDwmjAW?G885;W4ZqRY&-g|J~nRnM& z_sv?a&FUUw-Cyp@W&qE;cgz`UUZ2KmDL{MpV@2;LBd9byvk#+j|o^c zX<~zCAQd+clK@Xvc~E%Ev}j(f9hkMU{rGlp7?>2gvFRZ-Gu+iCfipxl*jkGn*3_(8N_dbEGqXd++SNRV>WHwrRCv*DXe zs~R7ROtkq`{EtT4y%sr1S9dp|=LMyaXQ2BZFQkS{@jO&U8(EzF{Cs%;kAi`TYJ2`pZJ`&;Kqd!L2thj|H7v z7nYT|e97rf&3!ac>U*gK@aRp@GluE!@b}F`^#ZM~ zY%=<=Na3dmg?m2WSZDIBy3uYD4z{J?<@?bpstOhfwb7y^q+HsEwd(kP3ov=i*!h!0 z`XP6%!vwf;P3EI=XF|^p3FfLV;YAsTMBE%BCLdmw)n;IxqK->v+`A}*wUbL|bGMVz zOr^g~5-Ges-d?;Gn^G8|q#MVP8e_T>is?^OiSITOhq>50v_heO18H3n4Bw@CHIUm+R36)TBw`-;@ zO0`GMLInlsv;U%?FdGgE3IevEpm2B>HJ}|={32e7VWIg}ugkfnp+muI>5@(o*@7eI z%{_Kz$daC2!h*JmA}DA9S6QD9fDCpJ2MtkrV8V4SS$3I z=)O)#Wx+5PieA&^AIvMyMv!Q-+Vx$!`g@Z4^)8w#l_o^CFG*C@9(^!?!mQ|$_YMVX zw^ItYPSw6i&2vEzUM72473@>;KA(K7DtL?VB!yzH?bXG{Mkj^_+jyFP& z6OkfBKQ#F4EWLYWJnRfC%7jBMIJD+oP(?2@6ps%s_TED)6)%|mH>D;rufSiqRn7{i zWP@O%Wmc#d?~&Q5PiH23d_o^+gqS=oDW(KPFa+suYGKbt1P^6P*mDYYbDTfTS3WvN z(@7=)GFaE@fRB_U5px-9Nt#yA%gG{GS8FtYR=|x}L=_qpV&S9}3GEw9LDUi|1~SG3 zvc8PT;asn!p0|4jQfCH6kiTqy?)L&MkL<;Md{v+0e^Y@X?xc!= z?+@mrIT?9QE;D?=;WYyN5uQuQQdP~c-_bzEl)$Uel}$juQtEk^r*GFAu9~sWljgJY z7uwU(EJz#>g41MFE;qUH>eUgb$y9Gmy@J+>RPUaTCU?7sAFaGSHfM+Y(%0SEL_bd! zKjzTi=Y9)m(W;8*5_&Z@m1S03J>kD~Bd^q4L<^q1W9M(~ylXf(-os_$9ih1KdRx=^ z_l%IuyR5T1^K*uwrpgPv8{SeJGwovAStiTpbsa7uNHA|W*a|mf7nH+FGi;Jgd^zXi zxWEJOk_pn>E!m`(Ua^zEpKS$iRwoudlFq`$<2-Ohg)C%qYQm>QEkALhPP^b~a2yDX zTUiBfy>HRx%TGr9OguSt6?x4{x9)xo3GXhRFrUI3Q75+30V^a5cI-!c)wECsI zCqaSqbYGntaC5A3Qr>zAlv3V%B{kn1P*T&h`XqA!CgxLpN9dHvCL7-JQd^b3$G}<` zpB?s;d{Jgk@(tYy{vI>`X^RkQ&nEFRwgQsl(Pi~%T;9@p5i`0Uyj~bxZ)cun6&2T= zC);wSt4OfjAcczXdNRTUvL1|+VO*~zp4)l`5@iPZk-xNk-rrYXt5xK}Ot(sStd~c6 zo*Nx6jvr%mJzM_PwGx-iMHST1W?9j-u+~8e*2#%#^R|}L0;Jo~R~7F&i$ZD34DH?U zg}}Jnw?+5-%K5MPbFLa~R-VHH5kB^b&E%FDbMdUhHgQpDz-I(Ou>MHtQEr}Z(SH01 z`149nDB7ptzOCogGQreANhcaV_&H}?<5@yRcVnT)rio1G7MH_QGWlMT1fFZZ$|%>) z)<@+3%4^?fUQUw!c(cE4wmiCgthH^v1tw_W=V7^d=0qstm8lw|xrlg6!q#|cJGSUE z*Fb`ac?6|BNli7h?iTk(v2S_WHl)`xPlRGATpt% zq@JzH605x58FN=Q6tyEhJr(hSVVB;G+1>wxmb>k>)0fbx;^;`*Yc{z@WH~*1I8>h@ z&~FQ(RwV>ei_OmjUy>lXFEg}d6;XLjFXAV04)n#JPusCsE}rIm(xzUShmF|AFR-rS zn*1=TD3ebBxE|y=tL5%$QciY}yPR1nzfvk+O{1K@FkqbJac9Xr`Inu^aXt}>w^t{Z zwDRJ((%?tsg2mLW#dt>i`T|5AO3ZbElajsTlAiDr%XCgSx1rP*eRZIy@&L~$`~;nW z-?^rj(^)Uy(r_1Z&u^u6T0ZM-Z!gTch7+&eu8gjfQrHetIBX<>aM80N>|$HF;Op<< zN*Q!gf~3{2t*=BP=65phIce6b^Vni$8TyHb5~Z?9;dx^ z=Dccgbi%{Dqy~Jo=KK{4x4h5zK}DQiBknThp5Q`n867L;nB-KisTZLxnyMaKYVO8H zU=tQUpV_}Vc3dztPfz6m=F|ya##rvNd^qQo6u;fM)cx|Wg}7c-~#uk zYC<93zH%V zOpcu)#os@y`Tp33hAN~ESLBDndw;+0qHpl?d*4rx-ul_ADu?uD^vYeqE&WHQ;`>!f zztkI)Dx!&(J703HmTh}dyEVLcc`tD5%MJ_#-T0w`VVs|h>1N4O?6NgAkVYMJ#6v|E zo*V9-13Sz;b=BwPG6J1fk}e+S{_H81__z`k%G>24*42ZRV0)7m-vcFNp8qN#duA&j z)0qw@RM94UFFGOY;m_$mZTv+|3G2Huek^iA zBuvu!BQmBVpmr=Bf6G=ty7L&kPT57Iav6U)aynRL>1c8Z-BbM59Lw{!FNTJ1od+*0 zwrq(!52P`ZO9TZzgZ9$`olrHUwnpMPfma|SH=YA!{KjFrs&fy+^vP%#bo?IT(Zz$% zq87DZWw|Q@Is%6(rC%xYoYKpeGVN{U1HSa8>WS`|6z&vajgsf{PcVotN?yt?mc5{M zFRl0?^m%PdufZ*@lnk1CI^*dKLQ{U|MrGZukq79HLQ9JQd+Yg`e(c=tWoaRAxBOfFT6Mr+=JdSffM`Q}36l9~Eu`m=eFjo4=lf?;X} zxh?88G*AMmIXVs<+=;jRmjgK(P}SKnrj$zb^$Cp6dT88d*C5&ZG0lSO5hC0!=h2!f zUEjF|#jO1HPL=n)YZ_x$6{p+In@h0T#ls79;DrTBPG9=cHg#ghu4)c0otv6F)6zey znmzCTUi@j~IZ4L*uSVZ(W^3tU3&|558q$d88x6vq4XmDwzZ65pgp}0BZ8MMu;B!e6 zDfbGC0{YqIB=IdKsoaiRGyUV`T9*v$WK)Qxe1(~l<*Y%G>7IaUsFkeBio&L(&pEq7 z?6}#)i-eN0=}$wHEG}Xt@+zg$J0D+(&|f@bjt)925tPlVu+!I*w!kHuS@R-cW0_t) zFc<3)|7mFUH+T@{lxz^AEYDe4_p@~YXVaobkXT~uGz?o0qmc?yl@6+u3R2Su;&XK6 zmmOw&gWW}9*Rh)@>~JG;a~``|8aq>g-0Z}zY|C_g&PmlUXHOB)3W%!-w_u+#dO_J( z-pcc)*^5;w%QA|xgEEBbBDZ%e{5fz^oH8!4B|_cEt4nI7Lfv%4+)JS7BB7scbJ)S)q4rQ|O;@2H!30ln~5-uc{PHbE9Y=g>{L>ZUW?Ek3y9Gi`4A>o5y{Aop1w zk!K=2$_|v_=i~ytV553>fl7u`vRnhvek~;lmBgDG!_TvtCK|ekP%XBfS7F$0bgN0b-FnJ$M@1FBnbH##X*0hpf4o4*o_YT; z+FF{25xJ&e{$-8{GWEStG}h{;xTq#u{!n1K3x%J030+*)ZdJ7{1fnkLR-a7ekp>K@LA2Y{1>z1J7qAxkMAhO6iQ64doe zE8dL&DUpR<(~0iOZ`hVh&vl10Ut4t%3FXG8PAjvv&|x^L;2p;`psFQGW6c^uW>?de zn8azS0_ur3FES8AHD>pOb6@nl!C}G+D2-4ybq)hHXf&uUvn{bgPrn}4@#$Uv!+Q&j zzeU776FjX$uOs5gFB8M0J^ew<-i73ndi>|WH*VLYLE*aoQ<6Bx)5ztCgqLoETQ=Cf z@~zqhO+91JO0LQD@_+_P$i9#+aPcnIT>2n4!*!2EK>SCn&&!7AhF=OIy-l{?9!V5G z61Azx#|!G~&MCx)Sh+#u<O3RZAw8Skipd>s!%v? zx?AkF)#(_pey`&bz4T70V*i?xpa0+Mr7lFUC6%4tBu>3 zrGG^8;3m%(jrF4WVmDCLLRRnYRkb7#lSDfv$4l)NoQ@++EpG}Q)1~QyO6SUg&>{G; z0_#xy4qf4*lfru8w8St<*D!kKQ*%Gq)}x}S{v(KjS?*??m`~Ey*he(Nx9E42;@*45 z&9hW3ips}flr_e8W_wnO?B#&DXtE+>;Vk!SLn1gF zjzZaQM-DJ>stm)bVTJxO#+U*qo##Hw@19^-{(?FaB~O>E+$YnBcf(jJey-hjIo`yC zQ&BhO6Kf@Dcslv^#x0ktqO6!(VXT;D`WLdyfnMnx4C4Zfj%uh<`MZU&MQn{au`HM@ zOHtBsiahix&H04dzMIhdGX%2W!~-uZYtCZF42gQ?^w`XUO>(hDtnhf3ln{Y3t$pFj z1}Vv}5?AlacoLid$7~T?ZZgkLdY$?;^AyNvPx=bK#z;urgrrtK*JVLAH4YLcrJ`Gj~OZ(TbDQZMte=F>9+~0t#@Y7RRezZqHkQ%z)c__+Os; zoad%CtF+-(0WS-G4iQ5X_IU>pP~c`SMr!yejwc!S37WD+x$z|Ejk}nYCqz)Dc*RC^DVe!l z%W1hIgpSzaOBypg3D$G_w}c3e?>c`S#?p{-?Vbwm6EtOf{O^EtyUOx&tCC9aXU2Bp zWf>!*%)55_pU$)O`OOJ66PF6N98 z*Uv1Uw7kAT_7w&9Bmq6O3+%yA`^M(6U}Ji^uPA^aEOHPE01CoSY8t9ECbQ$JZ9!u9 z`PYyB5J6AlL;so}ekUNfC7ALk5SsPh->J-eCk6hrQ}Gd}!t~K=a0RU zA(TJFqVPi=opWc|IvwU?nLmwOikU}tO2==Cc`oUFPt&Y#rfr7l7D{Y&ms!wZ`pX!= z*k$BGbK;zOh0+BxEmfM-B6O4S@N`U$=E?J^W1~i2ja$jwnUn&O?-k>lvcm@cm9qO7 z8`!N!8Q(sOKu|R|ZS6c*@1dHwc3c_KxPIF22!69XZ-DjPYX{ORD*T;Il@EhV2(TkG zDQRz$1k~)ClM}D$t1e&X`x~s%H%6uSGbAC?1#I>oR{Rfxdj{%%wCn%z2xb{8D%j&A zER+k6mbH?YAJ)|o$WQ4|Eh)SSlp}FTUVSt7*}U*Z$ukDw4XbCeIkN$3pQxb(JxBBH z&GZz0hUFXfGP)ugY0m~kHVmGn8t)SC;_~y9*S@&Lx8IueqVPiLKE3zpy{Io_`_m=) zD>~^U`PILR4t@^|pf_dzWnl1TE(R{|Q<*dt0{tKr6iz&{`L`kijXp7S1cjG!BS#Aq z5$tieAC!C_o}^NQ$l`*PoX4{K{(j#%O;Q#p&H%xNyD`W46yHyMHYrAdl%L*{_<~OV ze(3TKga2;u_xB>$kRm45cVVOW+9bu18#nR^ogaPvl5!iqIi*(c5I^FBp!VqZ)peFn zxe~W;nt*ph#XHT*)Cy8MoEtd%7+rop2~639ZQO^ir|KoW6u1b95Bz=(8uAV&Ufx_@ z;`?fKb?s07F;@HCKcX!Db+DTGdxW8DdlCw9#~S~QX!Sqds{O;@znhT!-3W4}KC~~? zTyXMfz3|J+mzFdeOYcBlleqLL&3cxC@9&Ax?EjDGOgA=uL`P+`H`fGTy(<6bwM83z z(~3aX{+~}22fRyvGL6bl%Mg)%^BF6^i_GP|%DdL$!6o*a&8>FY*s))7yskB7NHm@@ z_EWNPjbLh5J8x{P1b-HBJ85?D>V@e!F=J}4*fC~m@H|qZ-T4H+bdu23-@DVs=IX;E z>*L0L0T1NQ8zbnx5`vy6147j8?N`nGPaEH|pI2^^A>ik10TXps#*N+h6CuD0d1SX1 z1#Sj2edXopJ&tf(lKVh}UL{f(JH1z`FLd&ckkU_jj64KgaGk04T#V&{v4&AVYk~IeNOFsBod7`_`q|4%%n|{-xq-EE_BtbDp4Tx z8g9)10*vriLeP^qK!`sn*{z$Nv;Ey%e|%yfrLj)jKCYp^FW@U|90EB7=W#PY5OnTw zgaed=0wQ!p{zChjL+netb$Wi^N~L8I!aZC|puO2&z&`$(naPd!lyRE|ASfmJI)$H- zW+p_4(AYROwOW5+hu$YQ_WOG3%CDvzl&wJ_caJbB{+VLm`>8YzG7*4 zChqq4l90OWtr3!^@6|!g)c7C0`rpy3;Uc&zBxZYC@MAg}+3nL)N+Iepv}9729brkl zxT@=)4;RrYc~sJiyl_dYL`1s;Rz-~7SR{i*4~yKF!fGY$Dk=fOY909?sG%J3iTWHj1!Fw1?q z_`6uvtTO=N(!>V|2YB8kp{Z=%H;m#?qTXaj}gJfvAk`ULKX2B`b{@>KxBk z7Af8Z_oyL%IOdUeDZN$v!w03rv(2$PJM(lnN4TjzTLm)#TJS)=ahdP$^3f})a91co zK+^u-a?=0!DV$gSUyuI`;M+alq9bao^dM}f8M!kL!wev?!>Ol1up~6sP84dPz<_k} zo>y4hVMAQ1@<(q>lEGm5%1+Lk(cO%QN4vZzP7u;WcMl>1EYKM%J7mbHp=LN{)l-BY zdlW0)yCcMx^vMIK7hCGH7Svw4C1D-yqKXoKS3t6y@lPBK1<3y*4*o~Q{(_2`8e^@u zJD;KzwGbD=)JW$TOAw2mA~_YKk>mBVSke}@5|OHP^u{0=EM^D|$6!3K%`T4G8+&Yw zZZ?BJ%0UZg4fdJy!C3<~E^uSi$LKpBu{g_iweh>e>35reaPj-0RCVhU+f^vhfPI${ z;j*NEa@GIvT=hRwM>CUmroTCfy%f5N3Fj7KIM;RYi9+WULgy71E7%aCRf_11%~L+z z!yL2iM2q#yr~>Tmg?x~1@A8&Lm$a_KF;?C%#l=oA9CI48ZMi=F@s%1w2~^OS*3ChF zlEExh{gXoflS2RJmZrMecW2i!jw+(^F}JzWSb8O#cZN;@%U>_p9J-xx)T7=WUH@m# z5c2R(o*{fdL3eVSZTC_Y3cWE6hVSC5Gqju zkKpX&t@M5Q=J%9e7iI86)k1`ww-QvV^#88j`L!tcPq`3RF8t3l!T+I^Xb>hL{--c$ zr}JsWXi?kfACl;}wTCiNvSh;TJob9_x;LwiP*J2 zl&Zf~;cGIQK@s~0ikPLs*OEZ}c)8|l3GMfy{y&AA|G%6L{Eg}^kb}+NF)3?fy;w>i zmwICTq;9DLs2U9}H7<{W+Uej@-{jJt^XJ$5`7;Qk=tDt%fgH)W( zqa(0SkqmRYwAAfW70?lq#ZKxP!+*)22V#Ex!^zaQlab-h@gF;|(T)BUIxgBA{tq~@ z`5X7-pF@j1w)6HmU|{STwqlU=#6DEq}Y%`BeJZN*d9ql zXuLWI2}$1W&22^BN={ul6XO{4*TYK-#Z$)LpB8>w`{K0CkDbqED4c>qaE#R-j<)uW zVgEUx{kson|L?22{A|XbPThR|zdM5dCuR8Ge#7AZz5xG?FRz#ybDD#i(27@m#?dz8 zaDgO9RE$N>V=>N>uoN@*{M3N>iwy$Zl z@2)jto!7^ot_JQFe-WDFn9D5bpBe+-S2CtCKtEk%;DUU^;I}%Qi4g8+ZnpEt>oZ^S zTdmJT^i8?XZ_t&{O|Kj5SiOPyuXft>{Sq@Y569SeBeC1Bb*K!tikB7Xkx?uoq0Nis zAD8VY70ldA2qikXZ2x%CS}nIUkBl{;EOZ}iH=LM1>7K4PLA`fL6_BXnQYDb6Vs&>a z=4m+Z92`3~%C+LTGo?`h4Z^zqnVKzO#Z69v@m#7xcR&(Mxl8noTDo4oF)u`oOVwFF zzmuavu3C`F*pWzrxEJaJkBqgb_{dM7{l|-XF;`TNA&#RIW{~6?ylFtcs8EkM^PN`S-wU2jEQs@TUGA@N@xqRH6i8 zxqlCM*)9OQC9ai|41WW7&@(wKL}?7JP^-`l~I)9yAsd%}PgkU)BTw~<;oRP64t`jqVA z+`ZEwdWo}<1UZ2ov7H+jlfOmA&A>MKiV_r8|9#se0Je$x@7SgfTy1Oe?%lN&A5EP9 z9vSZeGR{OSk+Jyq$oPK*c)PFB!~WizUCeQ@6=+y(TKd<2Jzn zKP6FKm1WX@^Y5(*_`>Q)qZ~vc{oWVI7TmIG}I2QZe zn!dqwyrM)NhnQaH-3h_p_S?a<_VN&XuCYV<4r#0sdm0HuR21OS#ZR?GfgAKadzPKg z^afY}l7;19;VU$Ea9HBl1Be6o%9X6R-**Hv?uonJ1V8W)TwoC{__#s8Ppz$&KV1fK z3~dfH86nuw{i!OngJXXsAlFOEr_`B-Rrn8}=I1**msc^E!$19m#r_0co=5lj(bSxB z)4kT^(<`KpCAdE!b8G{Diz==XYAVCV#a)ZUn&xY*q+|# zLke{24pa_oZ`6-PHj3^BA$Hd1RDaKA*_OI@Z7eWu*Lk8xaN50zITuuIIpRMpkgtSK@QKGGz6 zJ?D${XOTKB&ZDOr%4Em9+4ArDDe!d4m0h#34k|FlyBL`j+|cv>OL;->OHuN`gx5AX zSu`SIolPI5x8Ggzc~jtkmliW5_ik*8YRfdFiNz#6Cbs!(w6fY}cI+p3)XfepF$q*! zYxup!PrNJP30d_KsrM&%WyeGLky8XNERz`ANV(R{{SM3ZFZVlKP;dTtKd6aQbC05K zE<{O|x>Qs^D6M6xfV!m~@!5Knz$N>`6z1J1m>wchkDKMc5^>rmvW6ofTsl+W=q?^? zi}-87h=gW6q$0Nac86))EB)qEPps4!ctUMh{co7y&2P*`1$ z5E@MrfBC$>ehg#%LDS`YxNLXi!uwA(LE#C@^=z688a!YUp?ml-4_5icL*e~Xq-imr zYouU{WGY&ywD$u`+^4oEUGsaSEmKBKoO$oOECKmm!_wZNDJw)l$U~xZ`ti`7_nb93 z`kH;woOzFQ{Y{ zHlJh3RS;SHJn}R3r%Jxr+WWyA4_=VAW%HusFUBe>%C!->2o$(WUE!7&S^YfnD>Zo) zU$ogv`Sdtt6`AGRl6fpq1LPFYd6OUA+5%moY zqv_tP=dyQ6Ucb(^+r3r&h0Ck;cDL~H3(WIq9(Et?b0R#QgCplIuuP%H9!ZBNYs$4Z zH`?78bbKeyUQzn4?C3pT)oP^4qs&l?Xw_qnO5Ef+Iyrpd|&)^%}IyZaS-Qp`l0N zvSkV7Ge!x{?3`gYAu7EIcWwhJ!iLA1Jx(-mG;}D|w4d>6g%8+8_Aj(?3p!9#HI(av z>3NRA@qJd|;jhRVE}RFXzbGH0dh)?G6ENWa^s`&lRx*JYUgBvAz~S1tFkOu|s1IM_ z?>yB59c;XxQn`Z;a_o4Cl%PZWtsO1pFayxV@1Y&ZYjg>C_WUxQAr*xnl9Na0T$mv= z`f)6Q&eM?ORq(Bn^7CxP{)KZ%GzfMH_ow0R(Et}-GCBSk(Ct<1bNEk=iuQn|cBNwj zWs<%qdT#=nr$Y&G9g3wSugP<=5bV6qpKjtt36aTNf<}Fey;H4se@C^N=qQ{>WE$Pt z${A+Ubqf}fh@cuL&s9uAUDqrn@O1U+UY?ww6fbJObc7p#-|E2`X5S?QOKW|8@tMLE zj$$25=uY-^!NNOZdh?j<>mr4Brf@f~!aH-|hR?FYd6j$ft^IhLaD-H|CSDe?(>VI3 zNbxX1ZFx4m_GYQmm$Y5MJ^)+kwC15<6a|1x%Ftw}Le zR8WQMM5aCB_Gn$;(_5a!%WdHIq2(lIqETvQ3>(9*$o~K0XG{}O-AD9ju4c>cBZ~xPqH6Ta^hmL09T7s+JLL&gh z3sx>SEH;wY6uB>2@gW?Ox?xrCD_gdbFV7x5OezhCzo@FLZ0Vctw1O=;PgT@{XOrr2 zEA94B=ciw4iikO;CQyqFHOs(>#=dST?#JSGBv@x28Qm%a~nXj;O8^!{ZhPu!0C)vFg4nr0{Xq@)(AXhaGaaCIonz`QW<}{Wb7}wXyO8eXWYJJ1E5C|5fLXW_H?P&Zakx>Pdeo@p zI|TcMP2qs^YcaQBA!}Au4V85;L6lXdceq#ZD*VZp&LZU65|AZD$Kvh#5Zf;A`*(PO zAeEyT!(pN?LhC?$LzL?pU zA+0(CpecCp3Ru9OZzhS=8)=fy@`xsdh38*_nLYIa#I%42EW82)^mlBdWMc$j3QzJi zU?EC3>gNXhrJ)8AuU)jbc~1o?sLsW6@n(7%_B1AZ zU=f?lk*?E0L|w7)!DB7XB@KU&7e__$CM>*5PED1X7yLC%doTuJ`)g1~F}gLZtfA7d z;DY0W)^Pw~*UZfI*BoBqUXA_UA2w|z-QQlYvy8)`+eMp}q~+2eXR4s4+7FMS%@op9 z7FxSwsBdEx2Sm6*a>hApGY1Kl;2_-SHRW_&_Orv~8ZU2I1H(A5==8IOEZ(c|D-mGk zr>gv%x&dRL>*Lj^r00HIyvjf^v0!(rHYPJqw1Q=U2E0H01)2*wY$boJA; zK8^b*a1VeX*pe9MDh`C=7t1!U4=0ZDlD53JkJE1r3-{c8O-deI-5{B5Y3?J%c}DOQ zm^B(zja8DIyst_-(szCItZ%s26eimQBKT?3s8fN{kVRj*C^TdHg@Qxsa@)n|{+wz5 zCNy{!sxaTZdOxm7v54*^@k_}omg3f z`T%+0D0sL7loNnR1GX=(-4ubli&%vdM%Oe*W+Aq2&WPS)fj-CJKBu%ShlM}rP~>N$ zAD82sMn{nQ+prAf-_3nt>qyfS?&;6S8sX$ZI4Nx_o3s>7RB&~GbtilhufsgverfbQM%K;0LP06H<_AP|Gq`+nz zavOg9%Qgnw;Rdk)7J>l_VL&R{dboJGZ^6hRviiXC$XQf0RNmcD?XCesPdOQ{C4b4= zBVxpm0avvZMZG~?-_GCbtYqRGc{uHylX!^Q{k>tYI^4s(fJw_12HgA{#;tiB*WwAY zi?hBAx^w_Toi_dc^lV!#thl&!<4xWAHh^hKG5UeIoj`+}KE(0bg;A(Fz%ldC`? zz?zdN@c>G}596#&{PqU5zQoN+t!!4m-{lhQkAqvD^MAz&-whhXA6I^TzlB_)Y;S^O zmwlFV$@WHH57*zD(VXr22PpvZrweZIh%^))d*KrAL_ZX96_JDfQj1u>+qOYO<= zq5=vqaW~)@9>A`i z9AnOG^y=%_##_Kq^>0q9T|Fd>1161cK*n~j+iRCz92xW1o98~`?xa+eTE5(Qpp>@U zmi8)+4%*-;wFnW?y*tU#cJLc04i~$;K8)e`6>f2^Z^I2#P|YO+_5cHCjhI*1o5&Nd zy?g%|23Tf5N%9_Qe@|xiMKHt#*lPB_ajp0gz#j#EBjlvut2E^u-~W5<6CL z1h;}WD;&yEtw3-u4+0tTl(ggs@!l7+&zS#aG*0eJ5jdegMXr>;hgOmX!ydyar}0?t z+=kJ)ZI0@_1O($Dn*lZmggMfB;u(N-5HZEO2c2tr0cA=nSDpAAt|3ole_>21S){npQ!__+Nm-}S!Xm)^0_y{Q6$$tGXWg1- z4B2sjymKEw^oqvZRQOJ4eVqrk+!mkL~SI6|gEe-KX~4 zVLzuo-nZw(01)_Tl&{Ijx+2}_O&x)-90gFJ#kqhazO4RkG&%O zgnvy0Cl9MvTfDs?nc*-#y4d22(?2cc!TSr(IF}TClU6oa_bgSTy>nX^{>-QdEc)mJ zl+@TSz+VdEe-y_VjK2EjZCmPaCeznViuYqjI>%3jB`vqzBH`}XzdN^i0x2jBv};{; z3$s|sP$TGx3r3@TF z^TW3x)$2d^J!g+TN{WKQr7yHh5z$DOJFaPbwLDA_u(;0SQeh7?GEOxzw2s4UiZ4iaOoD&7ngb++S`w8$`o_Rc+x-^iWyE3q{cL3`)hOuqYfn<2REKQXF z#D9&^il@!a;Oti4^?d{8n^QJqL?h7qi@gQMfdrvHFTK5~6`mm6Wf zKDF)PfgV6Q?-Y%}=1_X`>#;}%RTk5yapb)yS zyR%vYE8gB*)=k%~&)LPS3ud6Ovyq)!<2u;s!NnR~@!kQL%Q_5Kg+2U}(v8DM$bLHZ z(=XsN<4-gjF<0pL4*f)P{KQX`pvA$I)84|`#OA@hd$u;5xIaP{9n4Ilg0)S0xX9e+ zk8cxSUC%tvDz8t9e(r1Trv3aKaaZ)O^_iZ`RI=tO)w|n%BbO$BaaA&y?g|M4rfT*t7A>5#tVBbYp^?LPQv^>l`Mh$|h@Ek=$h66C8Y3%t@h?{umtw%Drr ziyfuYxwo6u)O24{eDwcV7b`7TJyV|H|3$>R&TWfvZ9>q8T{){{l|g>{hFZy!<;$cI z<5b!g=N9s}?yl*&_6pFy)O)$!L}M3mV$iDX>K(3MnJZ$S>gansSeKqTAC7u^_>QeZ zJMs0dXGuq#)M5@7#<@O~X6{lh$Zs5<0Zpn3gR9;gNmp$7VMW)2@0CQ!OSGi_a@yb_ zmhJSWsM@xQjJ`JZ(6>7Mi@qMe;jTySgPPo9$9h%F3PmW11Ewy@2M)yytu=5xzjWN| zaC2qBj`P&7MV(vy0TD)D@iPCONOKE?XeCr*)Cot?>aYroI`wv5mzHg0lVO zN*e=WI|GItx7bp|S|fHRiILmd*vUyW3^Q7a+}@eTF0OSVv3V9tZJaRdsQ7Ni`X+2= zB?fote_`5wS{{$y!6~InFNi`UWOLJqnqTFMDTlYh{pfPxGk=KyF^<5R^FmOV3SGy?(DmfE zM710v@1l3&iGE-$Nkqj2LMz=P;?2V1JvmI=cH&|^(|(-ua6P&J_1b$P+tPGI7DV9^ zbC!1JXs>&Gh<*5g_O?e;tbM)^0a1L#2$#rtB9ot#=^Qg1ll-==!KRkh+9OqBP)S&oC`V%Wqp&SeaYdt^B_$n;$7ek& zjl-Van+|Wowncq}dRET@Zd{hsQ|94=t4Egb3QX@~lPU%q8EtCm(uv$8CY6NRiF_rd zKMJi733`<2*@n>?dQ|BVo=F*QD-)huep8W7#_7fOX|OZ+uY%&&e0(~;Ig6<0$@{a3 zsvgBLJ4@o^9fuydY2{`i+XolM0)$40)IG{$ZIft?J*s2vCTJZ!A}hXd3Cj^>RSdm7 zcJhTDw#}vO;RDv9w6PWc`5T{Wn(yl-N0S(M z*HxD!RNGSPJHjq_pRoN*jIX~`HAG{`BSTbh6;I|w@)`bwC)oi+trF$|hj^~C)Dqk} zV{*<)ZoR5EHY`^@rfP&HAFe;+y!(aI32u-a*01QJ|Fia5#nUin;>{o6$>085qS@ko z?#=SK7nE?h4PWIgKCSTnnz*pbp*#1Fac_1n5%N-<_0VEGn&7G$K;3%zw#@NKM#0*j zs2EA_x}Oi=e{m^syL(C6q|^LF>XThfK`A6U|bL9nD8ecHBX z8HeXf@oMlFmg@#eEer-V`C2(9-=P>>hw(oOHrx%MwRR&5AW^wuEOXe1kuJfb_srqD zu5tlX?=E*J4O!0BmrD$q_FTiSiE-6Y@XE{*s6&ueZflScP1uQ?4=bD*KR&oYzjENR zqPFQ5l`i!RwUjT~EwOPw?7%*{G;g4M=~d_K+jF$Kp1XzE$}h9U&3D7<7}aGCu`!Y- zxbp>2v|e$nCFHp*ReL0y5&teBGtqd7z9?B!Zg94xbK4tiAgSWb`|mv!Vyg4j=M7q> z=|A4XhL_!}6-==Rt2-k!g2#4-IpJx0z_He=!ZO4KSB};G5`KpF?vppMmE3)TK_2?u zYGD+?oQaBF+}f@SzY4ohn-4iLv>|AOBj~}u9j5ItM%z0;kEBK0aExF3&>oP}^ z83_~IYy;@6pAiI{;<;j2`|~XcFMVN#K7FLqPq|&h`JtRSRpPLX3#YL)M)Yk06xEW2 zGafshCzg&K#1dVfJ}Ovq=D4nCVs+E_@lqZ$gDcFsvKa~W2*gPufsTXLG)UX0feNOX zKCa6H5s*f5pu`C?{BtuW*eiWk5gI2+52nFQ2hk8QEPekzp_(kXw0NL8F7;$yTNG}q z?}+#wq?%1FvnxUc(TEi{ed8JDvEwvv4R#B~cnXIsNsEEhJ(K4*VEMvhUPVY>UY zA>imccaj=gTM-xRFAVb{PAkj?#&X=7zW3`gn;&*{nz0+75Sgh*sC^`%I1tYZblLz5 zd=q3DCWu-DwfMw)#ppekl~=JCj~4l?$5HOh4_gOHeq#KM85`?a%!E@-dzgNC(KdE~ z#7X2rArGK~Z8*bnK9lG-F)?FV) zVjKyB4iHhtONEuYYd@XOWN`6{riRPy`XOoX2Nr{MWJ7l_4C;)vG-v-csvb7BdOHDH z8rwt@%={0aRPcUpo6s98nCmcJN!%DD)_R|VskzVP`Fj}Bn#Pn zZYC}-v!*`CI!49UPkM}4Z?()nmInlo_K<)(0rzo@4{{%su5SDXNtc}T=?>yLw;YQ& zT@{1EQ%44J%H3AiYR}PLe6zm%%<}EqYPn+v*r18>EyjYkh$S~WW4XaEM|nG%bn~R8 z1}%kf0zUc!0v_5%TsOKB%!!5@jC&9}ltq=C>ajT8t>B|S^w1F-{-ZL!6VR)$ZU49! z(p2Px9gUBUqz&o*ZV0sefVq%_owcvo^=S`n@7f$3VX*A0jlwGk`e=9MUvfewBk!0Q@GZSuHdBzJdq&86 zkWfG*{Obs_1_qXcsNt7N&dH(NuMG-Nh`R*tnVbWm048S|6Sfb_=XQ9A;Ykg*8y(j1=+Y`N*FIlhBALwhiR3ZcS10xr{0 z)FQAiaPc0EmD`?qlKV)c{QweqP5yOai&+-Ya09&K1Juo&GhOsl+E)2`{g95jQyr|M zG-EX*?wg-W?HTzKi3PVaIDiN8t{~*y7b~tG5UUD+B^PYFxCw0Mv%FaiR%9QTa1J$i##rzhWGYhN*+KTsqzg$r#F*DnH*$Q^@}G#;xjCRF{> z0lmETo27g{iagsj`oK-SA#LBJSQnjzBwAqRPkf1Cw%y{x{+yE0qhYHzbXs~IxH7%* z=LdQAwwCB+xb^sqdK7?Ee<^xdfTCEq{OM*095|3Ov@=l$i8qi=8^rawDA-n$5dTBO z#z^UAH!wK)He>DgV6b0~i`+jj9`&1xLIsJ8`jv19jbrCrs1cndzSp?*_+6lcp`89eCzKfPG=UzW@7AR&O{iXRi`d0~zGC#;%N}Oo z|GYnNlVz)OXJh_R@j+%wPTIarv951Lx^x>D&#<>_Lw(J_cBY=3M*vMrzuF~#ke;|L zJKGBG%pU5JN3QhQLdy}vni>rHJitZxSSH#Zap{6PQN8lpg6SaKYx3X7zq7?B>SAUv zc+(S?Kb0TslM{hY9v`vp4iy2mw`zp*O&%0)%71ktk_W8gH`BsTeqfv;M+=$>ufJrDY-Yx^O~4nA!spoV>rx zz)Y!!gRE~f!=g}|*?GL<9AoMVI5+s#?gwIuj!mHgyWJ6cVRSW_A2!D14;WPZ00x8r zgNm8b-yCHD2JcgcqMLv;NY-fgTL(LnJ1umu1^t6J*gVtdSUnsV(y0V3}ymJI#UnDnPxou4v6IkL^2Y?T_C?Z z(lY{i5Bu9VfvDS;$jBeq4YQ@15rNGti(tr$W;ksWQ-R&+yoBk0j`QTfKVU260SYYJ zecDh+^Q`ld1|8%B-Jb0Q+qrc=-~w5Ya^}H1q#B&bnafPOuZ*_%dJ&nx)-9Hd;R2Gd zgShy*7u&k0fMm0=h`Q)SW9*#nk`c}Sm2d!rR?GLX7kvSiWo@Sg8vqoRe<_~8#b%yR z76u#QI0eFqXbQoG{oOcFH^`dM@ib!=#J{<3W({OSf%py)zb!!FF5$=w)D!7?_|db2 z${>E`!7%2$y4~XzIw}TuH5RrYE4JJ)Yy3+BfrbPEX(a_@(i3*S$oJZyWn{x&+Rf`= zH+gw+A+9~1ITYfu>>D{Vo`XZ&ygC#~&j^~B!8sBN4!15e=;lKC+h1kEG??5E$pnQo z8}#=fGgbW86a!r;a0|F9eUP>I&0DD$_@grA`>V_Qi1t#rgO?&Fja$mys*!aLG~~6~ zazG?QKD6`Uuk8np4*^`}@>HlGvbyhCj}ZvAX~v*po!)_RMcdXwxQwoJzs0=?Ev89v z!+A@9Lfb80Z$F-)F+3oiiL(@E=;K0ypX3W8_k*HLyc!sPrmx#zz+O^5c)9<~0rkQt zAll7dgjwZ_+abVvqJxpKpyuTESEFsAOg*(rC3?85Ji6omEdfNSH6#`D*^peBhwZ2J zKbA5ygY*l@@By;ewz>98AUStrvN)XxV$=-;aLT zI-_~?J|_ngh}t8tT$k4bY-ZbG9j;}kFp%7<)Anb)|M6TBRN=;O`7GXX&ahy6*z%+g z$mEV6anW8wQB}GgoQ44rZvwTz`&jP`C^tWWq5!Emn)6Mt?q3GAlmUs02t2EWH>W|# zXcB)fUN=3^`j-p2Tq@K@Adft3U>)FQ9dGw5H3YxSo2pQ*L;7%Ymlv@j;mC9^AnLP$dH|NHG7F7326 z8(gcaE6e5j+vds1E|uMvBLCd|J|z3rY*A)E2>R>K^(T zVozJ~XL$d0T6q6Fx$yP3cfL3x4wpDA*__kGcXPWw2=pIbm*D?i)#e>L&1ci{kO(%5uOIf2Pd(+=ZuM7r$AS<*{cN>06r$oW_42AGTLMpoIbO z`M%5~-#@i#N7jJkbkS|rwtqfzUt<+sH&uLe_DuDKcXxgI@>@IOUSD7Fg5iSakzeOt z_+ZnS<+nUO@lR7$J7gTEzMgD9ZYkhLm)SK8`N+bJ-$L)Vhj&1qf?%1#! z9Xr^8Ye{Pkja=v`ImQDhjp;vZ_rCR^=UGU&xY{MMn4O91_Ql^wI!G>sPyS)}Cm%H2 zt5xUtXrJPWvnww?%>2!J+!;d&x7PIHc#XKOwkmDJ)Wiw=EoeCX zjIz_bd+(1}YImOa=jyE2K0Oio&6@o1>kZ$uTTMfE-&{dqo8Q_?XbbVp{>fJzT5C@X zJJEAr`%`i&^iAI-laziJmf9{Khk+MWQyf5opqyYS(zGahff zIre(U=r)hnUpVrc&I|8d+V-cN1E#7|)l^mDtMRh6&Yu)e&L^1{D-sQHI}fa5g>{s2Ca##NaXyBMj}m>f<97Pb;HX6|^r*cy21l(s zzMsvyw^vsE4P1`K6nSF0(kpwb^HOIkEG%l>mrc z4iJbbi_l@?@1yqCbHHY*)@0?`Qr-|x$hOM&l=NBi|5xc{iQTi1tNbA;YfIC+;43fQ zu^-V6pDm)sp4dw1{6d@EJMy{saDk2-u%}%|{>`5DlN&=ftclw3SjB(7eW9r9<9%;! zAKMXd>$e^|o<8!@`V0QQQIEIm4>=x~)!S2(9(Z+Ms6T_*=Dj2|G4&?(KQ;b-<=pH@ z+q%)*3tZbf1ik{cSNqXk<#m5@WuJl;HhLRHVtW$5z|NQcZu|;Lsrm7}1OkMaSQUAU z_HOVP>OJbGDlMnJ={K9t+pmj!%M&3WZ63-80rjwALK)PBU*MsQdsn6x{(>( zzY=b5lye>GH-*NneeqTCC8otdtyF!3Zpt@a;$K zuWa7OY2DU-HZ_?`VQ)Ni90cRjMzMAcd!%+lF@QDvuw10%`6?QXEQmY z`D{nYDDTAsagh;8A?1qIS+7VcYPxB#aFe$eqq4$|{ve}Zt?I6XZaK)Mn7?-G_>}&N zTlb=&tRf~$^JZCkhI67Zyi5_*9}*gz&)PC^ITBPWqju(=TU$Qp)^e^BTmF}dME_>` zSnpmx|IO2k6%4iqYk9DCH`N*+K|O!y#>y>j9O{{a-?bKAdZ&)PHNB_%EQ|iRs;f1M zJCdbj))#qHNfx%;>#*GBw<)>J_JP)cp{usq=S2f?aV(9c#A7`*ti|n%2hSMxBvtjN-KGhO;9bQ6qVMW~-jxGH zzx&v`GJoNiJ0+?CLZ{?XQ6?*EyVLq?%yyIae>v}sj`>iBBsrpigK>4?G@)Wt%V)KS zM(Ll>gqkDUy+_;4U-M!uncSpUOFCB=hWg`&xlA_hA}VbA9J#@;yV+u@ES!_MKWaBz&$ zmU~CGn{@uBlE%yJUDFLil>$1e*d(NZs7iu!x%zy2Yd|cw5PB;=WUqbrkG{265CCDuCcN4J{3IY}6~Gq=b4vF+_= zPZPZ`o6&`#z=e@otfvK(Twz;U8pH5Hn`po?4qI($7>FtR zkezJkZX$4FHo=Xt9P79UH>RJN20mI?g!$-@a}ugv%P*Jdk~a@;C|N5l03%fC#$`vI z;CbW;c3D3yZ?GS-ZDlV*?tmko=ldt&9#S$sbMvEq+u(ZpXuW*(5u#Od$MGJ~!@V9I z?&7hy8*TuK)boanxJ#5kGgt^WAC1D^`XVK9$!G{w#Qm_MriyhL*@sk@ zy$xNgKR5-)yHi44!H5XDKVjHSx5mrJOSb-0^#f7nzs5O~z@QgP(DTvZ`S>;U@O)WK z!MWaN=0cqi0dWWO9&#{LW&9)fdbW>hl~vqr?I_}$>~w!4Hm1E% zSy3RDTa>)#I?@DP3l@`fgKLRokiZuXBQx8qn{%#fly2O&**;q9J(LUv() zh8h#eYJgMSwAz^<>mKN?WA;~xjk@Hxz|_f3ckI9G@1(!6MZWx2mN;+cvvh39_P*ZV zA+G`_Pbb?y5S4>+7CJx2C^3cD`zO@(TQnMicjZ`J6}P@D$~(XG zGrFu-&eNuBc4VJOV~i#^TPpcCQ${w~%oG|}Fk0b{=ghb@!_v|VC@tmXTz4is2zQjc zE#X6)+-`gJHPOJNS0LsG&H6#LX$x7f|FrwTGP*H4kgJMDNlQL>sUqDcR!9pjQF41y zZydR-B4m9EZ=dUeP12=T!qPIWIP!Ompquf%m} zhBAIkersRvFgdz^IKk$;S}AywZk0ur=AI+1x#xC}0}Gb_g`XJJtQzl)N#0y%f!ED1 zFlU|46Bt5LSQ_-wfh*_)9iMs(9G}sMA8}r6Zp^Yyuz4n3`Owj{I#zz#sbjwv6S5Ge`J!S$q}}mhO}CZt zQfNa{J6m^($57E_uUV%)N4I8LQs*ySLCOh~Mv!tsqyeOyASr{CLzXTh*|$i;N%ml= zFUh`DnnbdPO1(+;Kq>7_fO0MJ`8iafMRA&XJUDaIWR4`0FrSDY)yol znHvf~*H=J@iuj$w3cv+5CJK|$exnGzlFl8!yVp)Kv%KKJxkH@2K8xxTPSBRwsUM9W8I(vGQC3QaskBr40Tgs3cBw5mPz22E-lih7~7gB|$r#2icBOMlf-*KF|O$NUWtvU8cN_-kwO z%faD@L??op8U>c2!Q}d_a-nFfH*XkA#!7{C0Pre$U$+ zA8pEr(vh)>p^m(VA*0Q&ZH2w+;1DN^G#OBusy2sP3H~cDeH-%!S5sQI0_-m zITn_3k((|HZ2b`IOR6C%*jM6CG~oI><7bc6*)%Q*<6CFb$wf5MK*ccytx(JSXF%=9)aV$+=h1hbYXg6SCn7jk3|C3ml56hZ+60jS9n zEQiTy0Tp|e)8srX2Rx4W(p6lqdb$~)=GY8!P|hSe^@V@nX{%AHvnGqv!px^y$2q#J z+kc=5TaU;+2%=~xNHC0Nt^#M55y^Qa)dH;=I zzVjA*kUAOUI|VE+vc`r|(%2Y8a-_I;RX2Wyh3;qU@Zq zQ^*}tLlko7l%68&m{L=Ool{l{t7A$Hb)zxGj zpRk08xkP;CTy6p|+ERtnw--++NIi29lW&Bm`__gUx0a4xzns-$gO z=c+VEh}t;3O0$~+=f?~-F6Jb8Zm|WHd|Nhd7M)4!kVuCUr@d8cO zOo4_@CTE~JrmX=mDN3htR4oe{KsnBq#4?1U@rk2oReytcEh*oAR@K#elLxQv=x5*{ zT5$PD6t{#y=8T?ZZya9YmLEVRW*h{%*4F zIFIEETDuZBp|RHS+EUgRR&{+yqM9It=7O7bc{@LYi_*i>mMNP&u`Nb;Gk#UF311a_ zTWaB|^w_OhPB2vcfuvB@*eJMt5pdW(N65L(F@w6)A-wZ?AOzO4$-s~QK(LZOf|d40 z(7oFf4((kZ`Vewc*y-k?^4U}U?q@UKsi@Qo1#li+H32oLXOY+`12+$q_<3B&rq7nQ z5Xz2-4n>?AAFU5L22LeHH=iOJB35xBL=1uu5&v|0QV$ccchvS{fXMxnXx3hdN>O4c zMa_J;v}6>6VYSS_R1bGI6@`%q5C=q4oTmXm{3HwibUwB7@JH2MLippQty!#@5R7pF z%Ut@V1%VNa2yvdEwJ(8V*XM+1$pCatG!VQo$LiKs*O$?OM|@7z*E@!8Oo#G+j?Y7# zFA_(caWYiSbt%(%z?NWxT60OR#1_FQ5Cg$#VVt9%X94F(UM-GpV>%ruE)h+bmhrSc zr5ajN+GYTVi-@{{Lq>1~?cfTglr#houNq6PPk0VkM}-i=cM=WZH)cTyKMWzfMTa62 zvYytD_+(H8@rQ@wEcoHf@NgmIW;Vjt5rhDhb#_V|Q3T;!A0PqBE;TXXbd+8cez^;?QH zz?RV+QL*gH%S%}od{s+?MWbqV3wu<~ZYdtMvYCaWA~v&VRK;epM`dhg@u-RIC>)ir z9s8iPaLCxBAHP~NJQ?g6kx8?1g!@p6~M_Zl?3_|g>l!71B`q0G#`K8zG-{ZJOdHdNoco$ln58FuV(me zLV^W&4rLr${Y~pDb;>GWh^qDWh1{9ly>Mp+fP*P@9)mkm^A29XRi~nY&pM*+<+K{y z%Qh(ZDADeA*|J&SUYM7afT_2$`3t6-TJ6AeP_1#6ex+Du!i)`uxjjkjuvBrQk0u#_ zDwAOF7U^y@05FE|C5(evh?W1N0wHm^)Sf>zoIOaWK2xp83~NS^7?ipY1v3G##<)1A zS9_MS38=dhDpHOgm79HFwi^FqKM>jo*hW{4$oOKopvk#=U`;+&ujjllk22XnI2p&2 z`_`_Z&gljVET}3s%@D1!lyG)D+_AS7=h=bwPoJfqJ9;x>ZRLvp`t>h=!oL{z@dwqv z{-D_BxO(ZA$z{%`L?LfEB*Uw9VUa=CHhGR@>Hp)yKYsZ^#Y^0x!mVEv-rg;RGgs=* z1=MTuZeE31f#tU`ahteXe@g29X4liyofLn+hyN&jYld6nL5)dbWh9HbdRMrZk78YzzXO>|+7(agx zYH2n*?x5?FJp4!4+8NSjE|7?XO_yWhY>|2wnL&5T%1MqZNt+zL_yPYVanY9eyAS^n z^u-LD!Cwq?3)lw!1pgeMg?OalK`(tL(4BQ$eZxD%3b!^p?G3+L2&pNn zgDQQ^CWT}C`gG`Y#0mx_*K~Cz3x(}@hv@d;*lW~IgOHYEAMb93_m3E&Phd=JM6oO! zd#c0jgYEA(_n7er@ak?|O&y{in!fb^9oO=LRbrV|TTKeKzx^ zS-x~`h4>#tuSy&;cYL@ia#~cspT8sO!3@o*Z5REIU^X6pM_hl03I_(~7skYmYj{4| zLJz0Ui5Z$x%$H|;-83%fB6qEA?W%hpwNaF#bPkTmGRcUfG;jvR^y|(jz^s~kk2iL9 zIdxgMR(s#N4#1vEL6+gwRC{P;yWlj7m(dgyBsi?JTh(?uDK^$}fa^`S9N}{4nL$#) zYB zJVW-N4#@4d|40kum?487_SM>69U(i^PP+vD&vL4~omOwBN$E86M85SK<+RMW!nBob z7oX(6)KRn{{_BVT2>N1!94ek2d87UvTd!C1P@jiH1wDD=Q$$_itEeJB z1)F`xZfsmf9THs+R=DVWF<-WCAb9RKUqCEso?rKqilko(Hu;n5bO=|Y{NlV{_n|^U zr~Y7^CyG6|vcj>S=>oL-*&gJrBNG?`3lK}&u7U%EZuq{PAx~M zO#68=V{Sxb0hJTj4LPRXFy)QVd7K(IJq=%m@RbH+UMqdZ=%*y1jpA@fD{1 z)wsnom+x~`DfwnE&n+h#e|P-s-5KsUZF18Uvggw_;4?fS>`xu|m1DI0I4xMP4aGf; zKOwr==Mj+8(O5Kg&wM-lw=GaHWKymU4+MmZcuTUHB10LgS#4j%gg6??S)Y1+z}Jf0 zyr$`IB-brPRY_@l34Gkq)`63>e{3v^g1o#TeiM}9g9VLGWu?zXO%MNpLZKP^4m%bN z_Wh;lS%7UJ_8qUmBKsch3-&!|w&t}s*MmKp6J;yhZF)t(!lM8P(&}GLnUF|)Rm#VF zwbd=F)h-0W($Fj=Y%+0nWAf(B)8*iRn17H>_qQm`oN1cVQTF~&ZTU!_zcyH~bt$1E z1dN+L%~FSY9R%SUHcwXyo*@6_0vB+$u7o68LFj;>B`ZO-)G?87w~DTJR1$GUD8Pa` zjs!w{$cL`b2K>6c*9-~nsH`L1Rv^a&3u1>ZN*|a=_6<+dbDn>=;{fMU{tO*zsF3?M zTcF~(3qe?XmECG9MdD~vq zL85Eo#LOY6b;Emm+0-M)P}Z;8uJ;Orb9$O+w2D(H;heUU1&~a%Y}X>&UI=N9xRq$^ zhNr3!yA5+t>{eG*DQK4<&Vh2-_MwYUZ**&a@hAd|5UNpxP=h$AbU5z2Kb=4~5;Hv8 zV!llEBk0ClU9f)s>1J3Cx+V4?2Ja>=@wI?gb5u7;qxq$qRWSv^#+aE7&gO}T_J(${ zV`aI{>N$E!6ybpJur4yEn~rA(ay(n=WIzw_VWo+>ra!{y+vFH?u)nTF|4E`!A|~V` zAqvLnm;g^d?#xbjunfNCag)9al17yg@mrlM+w%<52C=yD*QxHsZ{NCx)nbeC*_Lf% zaRnUm-NDO13&EI)8R=;r4(3bT%vLv(o%!AYcq=|y+cMzHVtd4?flVSU@J{>r8;z$< z2XWhkYP=H&5Uqva3p3#$;0u>8pA-m<-<+vriLA2M02E*>AY8?(Y=C_z9LE5!nD(lI zzP>Q%>jU`HulqW&bmCxKB;F)~nnSOm98m=%FIQ7v;n=-)H#Y&nEhyu}`<~(`xe)N* z6&F9~UxD?lDy*;(1QVw!ZkbZiBWyXCpjLjAh^6g1e~e8Nu#67@npmlKOpD4|R5=&C zRZCb1gjR^Bj?T1gW|F0+*rDR7BV5TG6PlE>7ejoiR9*TQYA4=mL&;_Fu!M|L(_}(; zfSE}c55Ow$6{zwlTq(Ec(Xk12^-mx}q4yzbbnu+9vSNj~Wa@U@vD)({Ehm3&W15I= z49*caLdjiiH@BAlPmBvm0_yvu@wqZb@!=fOYvDh@lmkVL7Se<&eUx#%`SgW6;ci zWx7RNj+?ZPR@;lwn!EcBm!x@&JRGu}g<}zRix=JjyM5f**}9sp*V{2x0RPpG+IE!_OQ&Z; zg&1IF!o!(g`a4##0n3LxCb6^v?DLxlhA;vmf6_UE(0x3iTEJS6qO{JWD4O0oJV^Ce zWW=zC;AlOk1~BEp33Vyc@%8IuVhKtz#HjUUQNDR0n`Y^xG$B$ z2bRHBgLm76_9U7Su}J4F-A(o%_h?#kFzg?Y$8v+z6M&7UM{^JinVI>%i&$rC7m!9+n;<}9+fl$@+0?=Rt$12c&6PgJR1 zNWn#;X|_ZDu5hG`Ya$pWxjBQgg@3^*5sz_OzTI*ldZw++txN<_wG6>lWA9#luqRY; zR?~+gfNVZXV?HEC$R#-mI9D^sux=m3CUnF?@FRz;*9poE|%}K z`V=f#=uv!ihW5NT2ng7XUizqT9x zt%-?5NxBWS%mY2SEj-|Jr_iZCZW@RQat5=Z7CEK=)3$}gSIxmjDJ~(Sdg55F7voReVen61X%S#&FC2$^f=N5joY zaAg{%3168glqSaHTo*FTr`E(2u+ox6yR@jFVp2ZlOuGsH(CP)CqBGrM231fC^F&&* z>IpGD;t<$xEP=n zX}jFr`uPa+_#_Wd@L~+G#?Me0z4Ua5#61qkEMPqcF2i!RuRiL}DAO?1S@#YrUf8}6 z$Q4x%6L<)6g^D@lQ1Kt(r6JeBP~0u*{T=QUi(P*Qm7^dMh9)^EM@2chTT7uDMONw< zKGI2B~ zzaMqjLV|LQXoBJ@BNzzY6FW^h!FmN;Y%jfcs8YGcV8UI)@7;gAqAeJ^ zO9rkXceA*$+nU=F!D(%ioI24o1JgrQpY2wBf+%}&2gl9=(u@;r3&(alZP!~%=`ve3 zG^=vA@hkJ%cCGmnA)pUc@SD4#g5NvF$*ppXiG5djafY$Zm?T@zC{NNnoN687BtsL= zt!4Q z1#NXqtm`Dx!L!Mnwjq{t$my^G&3v0aSp5_+*I3D?*PDzy-g8-5PS3x~Bs{HG^hcbG z;~9+M@#)Od{Js{eNfwm&Am2%KIN1LBF&Eq4Ek9HOKwg!qj~|oOsfSWF0vL3_d<$bb z4B2%7D-Z&OiK0;q@402@5xo|N2FIWQVEUA!qevw|^gI?FFum+_=y1X6?F+4qN6_uf zCIxs4ujpV;R(|lTRxc&ZhnQQ3uF-BFD2Ht3LRdWxIeg9E=FvDG2IM(8Uj^;R8ydg0 zsqwQ*w}1QTQ-99gyZaYYYq}Y`e0Qck@pf#jBXhs@4;Dssc($c?>2FWQcwH&@<>7BB zE1~XgJj6voQ~=UPlz-DbFl-%kfXW|q@;^zqjb%Tyv25N~0@k(@1T3pq96PUkUaJ;; zm{6-0^z^-l&UGRH4*-C2D6+*mJ3tLB=G5gzL1sE= z2lD$uS()a{@+u}Y*mQqi(*RU&eyGK!)zHINCnsD2vjASIfDg>(G*cVv7djC5<$u=a z;H1R)rM~Sr$SurxmPGBK_>o#Wp84?~VNb@&?_}op`Q3!(0li&Xs6$#1_4)|;Dn@(c zy##MgZ2Q?IDL>YK@SUwg8pN9~BQoHn$_l!}+$bsYLMM_Bon%Ng7*nxa=!%6NRQnK8 zLgTHRMLgIkzjLP(Vdlo5Ht#lcVFRIyUY2;>30N=7%M?{*SkCrYp%&I z(&!7)9ktKUvDq zZr*+#)Jmm9PdZ5GAyA^w!_y{3!aez);yxX3bX!XF9^#P<^if}dodD4R@93OnS<>_> z6D{0@T{=7N?!v}s4XQUz0)``tX|KJ2KDppitUz3 zj`LGib<6j(b3y~n4{6k5MNf&ytDPS|J{bWPoW;T#BQVK;0aduKawy>j0bw~zUjvJj z>QLQNna4>2jSInfwdfa1@7ZOPkqQOf-Qw; z`T{W9jUeMyg-P6C&AiYXjOipTBu>NLc@K)yK$m7h>*wsi*^im&NUi1WcYO1YnzwI9 zkt(FQwA3)K*Oqt(;mo^6VedMmItmSAvlBML+*fw|j(`)s6P{$oe1q{9qL(Kr$<^Gc zYm@vFc>9V@6a}o;eZtRid7zb+f~2h5f^C+#mIwdR2mK=#2WbaHC4qJT2-bpjz(#+? z3v=R4?Ps5!Tmgcf3v2I;w8P=XG*zYr>Y213gi8pEqt0O0&EEL9mmn6sQwSymlYK+? z@D+irT^3{y83OT+UGC~U%-4iXH`gPxF0jp)?$}RQx?|RIwqvi2>I}F<8B(kzs2DL% zu@-x}e1^k$xEaXI5b9rYWN%r>hn!QHRbp~7-WWA{BNAj=;HDtOT5K&F%jzN!C<0)) zMd-W1a$pYiQO%~P{wPdd9c6_C_1&t(iUGwPC$qKpjxv8Kq&4&*JM`U^Ma^6o#T{CU z=EzC!(Mp)JLAS(mljxSCTt~} zU`|$(b%QheL^5MS60(|h^iZ8}s_Wp$zEwY-S$-?~96$R!tt!P*=aaFm)k5RixVK<$11xs1B9MiTR?1l5jL3S zT_ol7t|{XGF^$KOgx`OtF=7D<%sAyJG7~wrVUd}XcX4F|O;Y)tu{7Z%`zEP`WZx*| zk?fmiiJP_miPAdYG+Se0hXbKE3gu1`Dn=^sYEO+*9a6%U}m&`spjnvfMb~9;2qbyu)XN8%Qe1{%40-vfX9&x{tnQPJ&G&9;K~AOXmVz!Oe|PBZy&yx3S*`0L+`0S z>gG2?;*0b0OK4WZX42q8J6P*aWH%e^$5@(1-z|$s28BY<4n!bd4osa3QIOkE--(~UTvWiTZ!$G!=SzRF^;Q9>X_nL( zk`0C?0{-P=sP5!!+5C1H%sW8-1z0FB;b$e>N94TVxukYwVHu6(5ivlH z8*cLXe8Ok(TY7BE5VVX_)h?AGxuNSs=V;;mHZUkI5#LU^OT1(u<7iG-s3I8k20PLR z)bR3PTEJPBHmf11xbd*J?`@ScJKxzCOt++PdEYbR>_?nQ{C&h9sEi>G2M*UUVFVzM z>vbOF6TWs{fk02ccp4@{C_$T<9pP5|MH)ue130=RtBd2H_E{xNk7O~^AYgKeO;-!R z=*&!XSfF$x$TRD|;e-G~1_mw7za0x)uk|eS@KnOV0Vya?Yc%h}Lg@CZ~ikE$iW+SxeF+nLo6IWwJ+pi<@BB^j=B*wAE> z8DSvR0>;N6c}j@oieKjT_i#YZBSgU}bX_{if>bnfFlPd{gj8oh!I7y2cO)vPy&Ng0 zwTHs=u^fM?jFdx?){}Aqq^Px6nor6p`r)COufovGXm9IU=uoZ##ikpqwn;OxGD@uF z5{Ho4lP|kDWnoSh7ER4O?xbCml+ln7Fw)OdKk?T-fkQovT3Z$~cPK5*_&^0;6rixs zCJ#={tXdDqoV`O-<_xDvg3Os5)*DVh9l(h3m7|4hMf?w6SRs-d=C#uzsHwP4oioM^k54d9I(CIy?SL zJYy-xrWpRkMz{ilk1K`>%x>p%WW8eq(v<@?pNlHMk|ldY*qDm)h0ipKpohblVVFz9 zH;*^YG=?p11adJXET`6Jfe+DN1t>B;$#yXSG8&`O##uJ65b8rT0m7LJPzWtR?}{Wa z=Lzr;pZAQ@2Df-dLf;>}tO{%9f(*k#8iI_9@YCS~upm9dpROShYi7VAPQqXq4tSzr z2g>h8!o=2s%4KraNtD~4H1VZ$Nd&rrqAVqJ%F|)!s`(>-ImBX0sjfW3yu3V$d4V^w zMEEb$nW5^Bs>K@>jQrRTMnmxbA@*vySt?PzS2@*?scM6+0?XL!xm&s>B&GxnygZl6pf zK2EEnSqe@0p6|=!G!Hf*(nga?s0*d8!0b5drN+6-(P%PFg0Z5m*1-~B( z$K?93EbHsE&K1mmnQZnWB$)0gAi<3G?#1Q(v=f6@r%P{OP_br6pTJIe9QZH3P@g3* zlo=lmjy0WmWm&O$uWnb%9LsDWCwfN1JW2F88Ynas=MaN7d`>#Fsi1l2i`gESo&<>B zB=C}jNq{$$YLr7=Fb9!X0Sr>KxnVNs0mlqbh@JO@#3#1T4L`)5&{=g7^Pwu-54l~D_=`RaIpy=CgTdcgr`S_<-mjdq@~E$_Ae96 zeR9=J9Ru}c6Y;v5grE0)ogjc7{fX;H5$ zHeGRnb_{T@0HYBK&*c$%ljp23$;RQQh&rg5gc6!v@u!o(Whw5)2d#mu_e#Q(jnF{v zbQtK}jE2e3K~=wd;4{8UGa8UXw$@4h(E5i|$miK|N$PBwXyIo7B`^ zgc#;zhql0&(EEfx9`4=2;o%<-VnP5*U7|_=6)&QeM21wfxkyNw50Vlb5>&-iC|pHI zyYnq_R?9q9=4^9jyLGVLw8g&4_Bzd>r%g(TF)X=tFB*DM$29Y9OEgxka8X_)80Ce) z=r%-o!Gl;dC*zKtRhorHXEtXBF}>g;%)l?@gJ|>_@p+sOf!QIR#mAU{f6YEhZh`TU zEDdZsK{C-ici;n!$Z*6_Fo%YB!4&SYC^xE`QfK*i*r(&0>o=Vad-0VuzkJ1~^updh zZMv}LOP~LH_vJ>vlNA0c*3o}I7GhKX^`y2gb)b9C`)XU$ALc3}NXU8y8Gy;W5FoA4 zC&fl7npvGBEiDN~%Yrk>GxQBF&ecIm=hc8UmjOwphu=={1OkT#@9RJvVQ3UzjBj(3 zz|t7+Jb@QmS1h>L+KyaPbd#rWMS7ZPEF`I+`8BQg(LkxdW{pz-WFxoZ8IVR!NtEe?Fn?z$7QI z5s3s?Ylm*2NoV-<#oq2Ns~=9kDf|PTb{m?LU>fRjqI^KtG}H<|#A?ZE%JyS^;i6ih z;7~@GxAi*E;R~bv{9_U6hV7x`0&A4&f*2Mfe%s>%_F2Ajwau(jEFu5)LM6Zpa=C`0h04oRWF7HKY`wWJ*L~ ziKk?rZonimqjY&QL(n0s%{c-0Z+t5T4ZtWK2deuJqDx}K8fBsPj+|sXVIS`lpm{W8 zPga^~b&f~nSd)OL1ivKSwp{_x6Z$60I&GmZnD<_GvfONZ?u*PSfhQg!bP^V2y4Kyu4iWu%?rF)S#d*KI^l}`8Fl**g4jabNx6! zAcEoNN&ZE0|N4Az04E$LpzbM2w)jEnV^In3O|6J;>kiP5eP<>O%+i$1%m#qofE+G4 z){@E&=GynJfw~xUuaOY?kKwRxAU`Lm5zLQ-)&|otg*JKXXE;+@_f>5!d{_ z?<;Jepl%x)Nx`mNX4XCF$R%%;!Zc0o#4V?OL?vUaklvqwQ*Kr5;Y9gdg*bF=nDVV` z2QP>$$UflKO+qz|!@!RBr)L@!V-nu$PyB%$Adh(foVq;0qi=cSgT-s`E=giAv3zFmI&gK-@i9V!Vi z-&5i7F=#0qy74UGE*b>s#KQ2;20MH_?uZQQ9L0$zpo{R2Iwh>sEnXzc0nNgpb+(rh_;bhm_|;??-vKE(=E2@O0HB8V&=SlJvf?WGy{<*gYOS<`Hlm z|D0=}F8eF!UWH~PUlAvuu|<$l$7%vGlLZfxgDU3@h{IdqirC7g^aJMjn$yPC*A~(8 zk#Z6mwUZ0h3fI`P=Q`FF+(CjbXF6f{ns%hQMUYAECqs?~q)ftj0?ukZO=6hKS75CO zr)1vwRR-Ks3ypvQ5+uPx(pL>M4bS!B{DGq73F4Nd_P-T>C!r_d}KuWp8&; zi}lTeH=+!%Ap=9*Z!)^of=Z~y4lQt^)7MDcxo(SIayqyfO}y^khtG3z#;$_8^9@4J z2P2y&jZD;+$<%RDr}0KG`-4gC-98Wqglr?!rq2ks+V$nrCP|67@?R;;N4WWD4vjC# zzEzrp=mPWSpJC0J!!=*O zQ!PHxM$fvhp-pPMuFxY=-40I0ocfpW2!>vEfFtSIE_19s_vE^R6Sat0&aN)=uOYiBPZ zItdN>Z&TALm$rCP?b!PUIKKEt`B1g<8>da@v~Zl$WT%y7SAT98zfD$*`cQp{-E_D~ zW5!+RChgM6h7e!#P+Sv)6EIF=E?}#_^E%BA7@Us$n4gqLs*dCgzsX=z{B>S_3L#UDg==F+Y?0{p z$3xW?WjX*XZL|%OoomaJ)`qfr^!)Y}ZZ%vYy4zB01O`l9{h1T!Q1qegk3)LmBDzU@ z5PLi`9sTFlaCLNK@tJ2(`hFM0ssLY)kDZsDED&GE#<(^@(4MKL1?J2f)V>(Rxf>w_ zJj=Y!*Tn$N^SNZg$F{ehC0KfdbZ3qXT8XYY!$nQQXeRfF4%?nBB-Fv+DnxVBjcMa( zz0g>CmH2Sp-E>}(P6GhJxF&yM&35S5$P=3oKA_mfA#0BCJx0~$ufNj{ z09nnJdF=pDA?1wbvmGU)ycYqI+?f<2i1rRz2LiP)ga(LY%T#lY4T^)dVG6DDEQwa= zb`C!mvFS{ok+U*$kn_nYomU}TObt^8!LQ7>jn@G4p+W@4d~BNOBAH()o00qxBDK>P z5SuTifC-Ps_Hf4H^AlyNE_cTr&ZLiXz&~8!ldK$IzuHqAR)ExZ=JsH-G8e&Wz*uR$ zZ@K_TjEF#t!U71x932MZ9ojlz1YaxfSugrJzMWdK5Wx9)1UP3Rz!@2B5eMF0YJLcOTdY@fTgGNc%CjkQf~I zoR`6FfstGweKA`etBrwIU5p{bxHi^7V2>gB8Ys9eq%X7IRTAa2<-`1>kZ1`x$W=f& zQG_BU=W{lFd5HZvD2qx~Fu%=uh9)!6c`6$%U^7cc>(N9_D}~iDrJ}IbLq_*0BBPD; zMg!XhwR}Rc3lld{?J1+en2WHhH1Sk7g+2M6TagVqGB|#C`&4k^gCr4+3A97g3C(V& zS-O~3%DJjx5_an%T#PSN>mnXO-~ZTA2+&XS9yB!AU%JHo2h_Sid6r$mSj@4{WzzT`C?zm}?0|0ZwkSZLT zppn_~pqSlKIx1kda7ItDnMg?xM$70a!j365Mc4^LX8uKPrW|$8V2UjwwQ0!o0@jom zc+S)U?KG+ZEbph7zjh;6;Zo-H2D}Qr0m87cK$HR0gwG?yEKpo#EgDCH)KQwAqn)2; zTo<<-WGDWXx!X%{bHK*n!h8oo%o=L`>>}EEY;vT_`0xup2};4+zz>YPW# zbT40(>^>3=yoAtN)xbk{U{ng$3~%E=F&sX|BTL8#k=*4-)ZbbtT8};A?}hq?d_dp_W-%E#=U`N9y_(me&Dz37<#ZzvP0_rvq zXY0E(8>R!nfgr4mQEYk;8LelagPhff8YWkdU@bIoU6L}wLRfjyy3kt@s29@_)^XVq z8=Vs*Wsq{vASG;mz>gF%*I$6_J}G}EWcR&2D7#PpXQkjYxj4N9)q6sNLs*wdq*H^1 z?3S{%vC$9JFQfPcy;z9ajAKO|;8Z#_I#GTVs;N(vA91S5P9@7JV>u)ftjCco+%53mRbNYAB1T?jW`Ub|brG8ff={mRqbXm;giJ*4X&KOxof+ zbB7LSXue1~T_?uISX%Fzht@lnXFFDvCmz4RbC`VtcRm;zE6y-zD9X+$JB8da1x1<8 zDac-CrOm?U2AaJI@J5jWX=SAEhVFoOQ7<#<4gjhL7LaMLN+ByMMyb}Q+Pzc*vq^Zs zlXH!w(}X+zH(3IDX3()ZHAhgR-$9IOA_TQ6Y-Tz}A_TDq>d9mh1Z! zQRBdLA4_nqQVSm|T|}=PRR2S~^pfmVvtpEGQH$xe!?i(hp^?PhP*^37{LQ>=vmJX| z1qPr?T7VsL{OTnCeAW_xgtBv?B;z8MC7wsbvUPtX zOf0J$1!9>sh7QCsBPa}(HM&wx&UV`hHXvvk0+Sg0q? zANbE%tW#^~RygLD%0QzhL_&}wgpVoS0s>J$M=0quU8~Gz7=j_bLefMH?mu4ajlQ*m z3Ap$h2%$v*TVmjRz<;x7fJF$G%aOV~WDLOX_;JH9KgdL-Ok7Od;$cpkgv(Hwkx=y# z;elcxKA(=s0ucZhO#s#Jvdk7BD07BvhAuE`C8*?2jdt@JVpbN{OF|`ooxWU!7U^GA z2H~@dmbhTrZNn8|4pyJvCTuBIo?*5?2MlMZslcJ15bI9)xGyV*!8)#Em|DQH-o0B* z`=E>#15D~b>>L_`Q+>1<1R08etbz!3D;spxpi1xL@U!}AhW>GjWO+H4`Tq)De~G>0 zul;|1yH)Vt6U^e}Psx9J_0Mvn-nwMlg_jR%{`}5^sjGRErOU-T>=dt&4j=-v7}@#z zIU&R)rqZ9Jw#Q|5cGd9@0ztx9a0be=E1x$pwo}#o?TA!E%=Y^nh}*l9$G)Auo6=CP zbfly(^wVuZI*Y~FR2!PL3F(~?>W0(&ihHhms;DB7-g-96s_|XJU{C7$l*-jRt0Z2; zJER1EsW{}{92+O!>o=@mTHCKjacv>fR>AoSL*IEMNMw zgI7;y1mt_?n_4v5KgQM3O*Gx#efwGY11%eFwUeE1I?O9cq~@~GPJ|CwDM?6Or1!aHiqi2V@`1tH_&Qa+ ziI$}6KsGvpG~7|?2FNS;3;)oL=8*(>wDnWLQbo>}vg$K}60=HTVu)nbu5Yl(cF;XN zC@i0ycYr`vY+0E0s8_yZzhFR{$L*o#6NlEKzV7L9NS9dMn_D7xOXJ0LrQn&8SjSQd_%*plXJ0r|1IxLUnd8R4_RYe5 zupAebL!j8P6xsHHyw&l7prU>F1tb=F&HsMm8u)&Y>t57o569&g4+9<%NT`Z?`$fw7 z%29u+T#Tx?Pu!(BN}JcAdgQn^A$5-~PrR+2EhU6$M}6J*)rIKPxtlNQ#^=$#qHE(zDWKzrBKUMbWSn3%SZqoNGXv2Y?R8_EuB+2T<=rZ<(}GV zI40klQ3`!*eGq3`2S*34TVdT38W0H#yGlf%CZXV1-76Kcl0f^*9-Uc{PRs7HNVb&Rt6e1*sXJXoetianSWK?1!7Tp?P+#2++^<# zcWh!8a`>;pS2Rjn?j7CE3QnKe4nEq070n-*_0etss`KJ%-xkL@9>{QIL@t%w|61*hh`0n-Ci5GjZtSJLxOa3yvOJ3bE4(!HD6x=39f_)Sz^ zS=?%%)S;+XtcEZN9cM!DJvz=8{|3j|id6&dgBj2}tvz5=Zeqe33?jV>D2Ve%K^&^n z-1IK(9|&f1LN4K3z}f~xaAMVf^wGm(Ba?X!{RcJYtt)>nRFolRnJJO+1eG5maApbw zDi$+;K*i{1$p`X6Z&jM_sM(5+DLLwuNe9kHqg>C+(*`8D{2g_v{2kW({jTQzX4??;(&(aVohs-@8Du*ab0AFwf*P>(7BS8s3 z1|c=OS$jZ*xXnI-&W)6trX(W@a!jyOVUuZ5`)@yM2gSA8n)5w6x-UN;x}E#gEw zrtfJ-u1j4mr03iQ$lVuX_Blvd)P%W8sEiV<*?!wdVOzQgKe?S6?xVX8sYj4SGrhln zFDRDN+USqD97w6goFivdw=eu^^vzw32|WaDSac=14^$Yjz&AD%srqklO9OB&7J__z zwf!j6zEOh6EW16IUK3LdM(OqYkX~!b3qdvb3`(y#kLtkOyQk%{-ZAl5X0p>L6WU^| z0UtTi1&=1wT7$w$p(-PjF`4vFFgJ9ysh8-q8~KYR>z9oB)8$;yEUzL5HV8&(Q69V~ zHOl2KIcUe=SQ3lU!MnqPR9FzAX;=_xjqaZf-w3f|P%yas76gMk0au7*r67O8ygVDe z5vrPeCmTT<6aJc)E(gn%5THzKt`7>hjFWXJ;Ht6){W~6TCG3_DTefEnB7a>=wz?(8nlk zDu^yWTEFwNnT!Oj43SaDFPzE%U71qB%5NsZ6U1^7EVJu|oFtO9way@i*dg@#HH6E} z0xRYgnB(L&R6QS-l3O&8$U+G?lL3e(7Kae42cjTpCiP6T8&QzdoYWk&p#Hx30T)_J z%N2H$6ptoUPYMTPGvn%}^@|NuL*TyE3)<9O*mvW(9bAs8U2L1VPyrE_`zOn&U z^VK}2GbFuO^}4Uq=G&*aKQv}&B9^u@`bR0S(1EaswU(M6$O47fr1U+20{BGkYHgDmWP$#=VyBBVrm_r#IC~}JglED5Me+gFtpM%>V#P zKG;RH9AN3JdnoR7)!Ycp82Z*~!?4;wf5>yrZL-mUKI@>xfE5vliN2yD!evxMfL_B$ zyA(=Jxnu!=DiC?$MMh%!w#en}N676yG$3vC`atJ^t^aeWfDa`s^=iC{_6Iiedp8_a z#oj|zF>LT``5Ktt=9EC>MH6hxN*Clb55RtWMilUZ?X7_A?dsKG`{8g7_6_vK%Q6|+ z8l(?>gNS-{`skgDrTWkLh7W3#9NcAT<|_ z8Ys{cmI&ZskwO6PJvdJEmGhoOQsHSd8C};Q7eV~3#j}yW)9b?wFQa!!?o>I zjwv6iL(yr+VlN|)3bs4Nhw0~@+yz$hM^<77f^JcHF-pO?$!fL^gVA<;ls2ybOo+&b z4&#gepS>#&gmP{Bol2XeMJckCh>BJ_({jWR4$&UUQVNqT8Os!vlM)$GjioY38%cI1 zZHgo_$}*T_oh%c^GW++;Si)Q980LLXr|GNdP&tMk`Frs zpnDu+J97`BOSo=LWV@L+*x}jzYtAr|(G4Su_$uLcAfNzhsT_xi`*Qq%qY0Gb89+JS zrMDdO+-2BqaD}*M@5VWHCU++=4grqIInkrmU5=6Up2+nEGQ+@l1@`Xd7y_LXoP42A z6dU-$6^5T3r{pz=F`5z;xd%z55c|PR9|k7u4BM^KLMx2C+a!p>`gc$4Ai9EUEEtp zf7V3S6cNnQG3sjjG5HT0-o8;j@*^wvpNf%V_jCcfr(_lZ3?|6~OdegVB&)5xuX50= zj8}F5Ot%D(XD%qFwJ2Xfw9jQ%Ph4n#`!$h(ne)=h1i`YQBE5enAMkvz@XObY$?M7V<)(Dvc(KE zv$G$tybjy9FqzefjKBwv%Mv=4Z0H3FD)`4)J+1ZalxTugulko>LQizG?1n^hu8Q(f z?BjC+ZweeAJaBvxchirdAh>-Hfq_;;7zeq@C{*Dqs)<2Sf0_VHkSU{a=QuIrMw zjl1^uG=^DIAKPrqd1a5<3z(dYYKyMc*cKpfNmQ&0I+2=Hr(eb?u;jRAOvZ2-?yqN~ zPz(SRiVN*IJ56R`F;IA5@8CtQ(8RzF4qXjLsYr1;1RTq=ft|xysgWN)e9M%hv zlZ!)N8`Fnmecior?+Z;LOp#pu-Ow+yFEH(0p~+Ic30%Oo5O@N}1TOIEHSh$R#(e=D zxuAFXL{_g+3Pj>qG}Gli?TO&_z46Tu9FX0j?I^Z|YvI`81o>E8*@m3!KyM__ao@)7 zjdYCb-Qax<;7^LSrE1{9ujjraJH(NI))#5?>Q%KL%0hJ>213`Zco{0R(_{yCA1YR$ zSK|pba*ls;_jf~gV_)E6jg6dw-vlmzssf(C6THAbxCXH?p(s{#U{BMw{J@iFOgH7? z+f+m}v0_K@5jeX{&5fcCwLxZ4Z#dVb_O?{(LObNgtSCktc%_U&ld7IEDVU+Z8~VW3 z82^7SKx8?eBputkrdmWBMua?gBF#5XL$GXqJj{IeiM)5?~S@X5e7R`=>M zvx4oR$x0b@z;erL-xW$QLF--N?t{&8y}hU^C*TkRR|_zeGvQp8ix0{3V(%NYrwgU! zaC_^42d-#N4#hC7V;GE*hVAOjajdDA0#Ckg%Z4ix9kC2_FH&mIyF%61m?9&T1t?@QEc|ooZtgdN^9-WK1(o%e^_}qd#v=^c zcS8eL+Bi7p$ELT9OBj9~fn*I6$cn%T2qX*?NKhart|1ZMG-PAZ%`~K=Y!1p*ndpP1 zK_z6oBgl5xCa54XcL!CC=!C_gVaO<1?`X0Wwh&zgg~&28CE048i0TZ&*L0({T>Wgu zy^8x4Yz?U4d7$CLW3ws9z@A>6aM8A#C}qDI!^}vsBeoh%gOX&uuaTXw@z7{l%^lSB z#1?cu)Ciet0FNSjV}qcINOM_61i8hRZDrzN1)_t>kvl`p_HlUd9{+yV>EA5Qi5v&* z2R>J|(Osd$F?q5!F@+`%d7~Vi8&cgFwtvK)GUML+nz$SMZ{ExP*a37tuO^ph%k5@S z{Q`Sfkj(Oco@SET}uOT{b70dRfIYB@!a2;oSR+Oon`8Zs0FcSGCLgNYR1lPRN=tgwgnxH^f@?}9p94;C~1J__~E8r z$6fAY+n*rGFyWO1L;H#Q|A47xcFBsik%APIE4L``o`C0wsOou`IL$0z_c+p4pq;u3 zx+|t~q6fn|36P4T2!v}!$(+m#5%NiF8yYawGSxFIR5LfM9iQC zv{zdepZ1l6OMjZYu|C3&ctEnGj&||U%_M(^o8D9m>X_Wi-{oZV))@y}Fxe4`mAq;K zbB2U}b_fFgclfr@g4k;-hyTJ@z9oV-`C`!CWRl(1f6=l0&G4JWeMYT}b^0J5Th_*0 zhxN(bx5^=DOVXhv<0PjfXp&vh-XxDC?IfEdvn019gCvKfgGt^=+mfu3b|$$b=_ege zT2}tRf%KvXAXgtM**Y-?ZY{=Jm2` zr#x0TnnR;!hiKh9^u|s`_qBwU? z`_5%1tZD3rnKJ1Q{V7w0CQX|(19&c}NyOJ;r2AsOO)AxzIcW*-om2LT?l9-$E=O%_ zTwN47U)HTvIOSj;5o!!Wt(}`sknL8N#7wu6l)D*x7hn1SD}L8*f3%pD??U_Kc)5f) z?_RNKSUry|+MlN2S%m6}BdP93DyAt`?YU)kL3i=3)2rfE-I}w4%4j)s_106hyYiLC zUh0zz)@0(Vy()VumpVMp;6HuS{(?wT=47iv5rqT+xBP{dN-K50e8MeFYMUK@Rrt-K zeB+e7kXh%pZ#@*Y*7YF&E6lNzAqO(%9X_Qm_5vnaQgL0TVtxd=@zj@HI|}E_^(>jy z`{mZk;QOaERys82p35$lj$N%Hnr?L}q#}@n>6GT%Q2C|u+~!wSZ_9{HD*2%Yb;~G< z&w_Ft53(8BfnQtbYkLT|pH!D4Vr<$&I568@6?|Q~gik z^`6cV+{<^qY(=K*OU9AOE^})fyagEZveQU4Q}E49)VvRZw^W3rLp%RKdp-zyUaE7V z{bipXUS-y3UXp-N-sq&{tVYM6O;_55efo>Jw|bi-%X zXYyU=`$nFXJ}7#xEWBK?9q~;@BdYPvb-ThI)b4ib`>j$< zzoORptaQ}OuctSh*j;<4`OC%jFDrNV`Y<%F`Ci*o7wsH(s;Mt~v;2i#Uq&cyXllP3j{>0!%MAR5kk_blOgUlR##}=l1&VvfU>N<^Fo#QSYsb8qXrPb@z-bG(twKVm-z2tt~X>X*| zUyD1RUMj_hK5H5*g5A7NcREpONkv|FALm~!U=?R`v zKSNG(1=_bXcp7%Any%my$>L&kxZDbXFP&YF1)}CqeEjn6qVhdy)2P(c0@0L<@7OO& zcleO9<@Nkz-}_RcuNQ@Eaeh4~*?*~|j_z-AQVY@NHwG`lZh^m^x_gfSu67 ze;RnI4DXbSg=J}GH8&3)c<0kB-UPcBC$M$QZx|E}`|A3-S9JESYK@u-R0!uv7;P5U z?{{o>^W#Ln_-(la%cL(om5S2|i#&XL1U!4TxvL=dZ!(yheD=QN@z>Lm&shgAP4;V* zn*Ms8$!0xWz62=&^f}jH@%5XdqM?dA_2$z%DN~L7y&!ofKIF8024tdhTAOH3tAD!_ zGxb=dr1i|bTRsL0So6P;RJER7v29N9a`frY;8`ZyM0ELylA6}1H6TdyxX_KK9uz$_ zf?bWiOz}Bq0jmtF*3{@*SeyP<&FgFAi{_6hTVQEQ65$5=(rcirus2eq9H2|&WZQH- zv1eSR7otN`_;G}jJ40Qxx-2gl<$oL> z>LC{HaWl10<)Y)7S>!fD*;it?Ca@=EA+zEr zA+;Ez9GNjEtoopLM^2Q}b)6PeP00i8lEZ0;b>gaG`N6x;o9wn#hO9R+th~~Lo z*IkjY>;w9IX^5JMk%;cBjf-DPhfRZ5%ChWl!aQ3D0vq?7?CLv;zm!-8E7bUdFi#@f zyUDPrF1g-pA@0nI-4Aq+W6!6out7(pEN_EO$6hfF)-%z*3l&IM;f9Xd7%X&j?E~m) z0dmR(X2s@5!YpUT_ORk9hrRYUuA`>bpE`~#XhiebLHAwxh!(KZFVI!B)2T$xK`&2` zyowGmMT(f{f6>*nla$N0{2jSRq{gl(qL%SSaL%D#MuP}h@5Yre{dGc|WqHV+eKcvolf) zzKr%Y4Uso7IHtQMVR<+D47%WiWA{m`V|F(22iuEx^`vg_afx|w%g&}}`{xF#!$FfJ zM_-w_V0}}h|88+iml&euQTz5)*e$0$zMA9UQ}^U;&ut4=s9UAU4*4lX>BkKB1&5&* z+8I>-g?bE;e}2K#W~crtbq6y0FO^u(YZx74)8_!ld! z>;k^O2-hCt|I!hLFn4$H+3#+-O2=f2Jal1#%qDbL=@mG3Gq!8h;&|yWEsVnA_$o^X z-3CpjxVaPtrCwSdhR1iwU5gB2*mgZ#bY{(z{d}o&>=%?PC9O`R zDZDllCCkcvG%GjE%@XxA^^DD#hK@34Zy4eE$-GCjl8}At_NjDQ3yo9~A4F#B&)2t* zP+S~Vbz;wYY}?hV^%5sE6LGtmQ&d)^>3BOFfHFWMvSvqm{@!QrK*z>oIz)IEB$V6trQ z>#l<%&nWrqjPoiNVvYVh^=DVS#3W4Z(j#d6y%yO1)-y$uQPWdr*e@xUPja&q^?8H0 z+zVW_Tp@{Z6nfy)&CB$yBTaS4=UKLD7h;_buEnV`%+KIp%da^~WE+bJJ1B{(9aI*y zpI5#<$;`6lsZvbsigz_h_I_56pLRYyd8SQAKj3+cd;OGsBcILmz*nd1FR-5#u92FR zr`=3f*1H%}^lBUKbGqZa`}?P*&axLPKX1{gv?q)&Yz=@j|0*Jl0^?np=gzg7>R zPOA8pN8zqjUi6GfQK_`o*tq6$%c8tY8_Ro7Kb~>uTLJU4*=y-xnf0_MW`$Gj8MRJ+ zxskdyU{#-n{$c2W_$8l?H2GTuK@;C?&&;8w3eZH#S0{N`UVIvM=E3Cs(^HoSC>}{| zc`R_bXma5cJYTAW!@i{wIipo1u{U5UE}FAc%m}5aZ4LI)_(-43?wn^%)sa04vM9wq z0jnky%CWJkx+1QCp52O9s9Tm~bIK*J{m_Y4wIl;e{L|$A%^*l5z#x+DpXz)@o3ke( zJ51*5@6WLeaV~@w=pOw5Ijr`uYnOM-S1%XbF4$M6c#22$#$9uchjp|$-BUMrZ-Xc& z&uMq>KWlV9+RGmI6Rk{!ROI%+1+Mj~t46Jf+TxGWVcWg)lC~okWlzd~ena;6BB{6b z*%`!1N5sp4$L(L<$@pnQ8{WAldWx{t%~9IyCEt{A_F^nfkJ!$~T!Wyy77)AP)SN2F zGEMOtm!?laMX&J?dnt5i-qNhu_6y5LyuXgVe0`{&pz}!mVsb7oborx{XZ&$X(;}QN zSrgu3s%oEgwf#Y}Wxj;mLF8sgKT~v9(vFBOGr(NORKMIvw(;`JQ|{`u!u3&#B6=Uq z%nfs}1f+uA?c^%FG)rR5g&VkqQIAK->K#9#-eJ2^;T^jjRSzzC6T|c+2&nnoS>~g$X6PD+!4DqX(KAtd<|5ryFA%9zcQ`n>-mcZqBYQdLL@$DLlt#Azm0Q^*({g z{+;s4hoKWyoYwn*!Cp3spw_gkPvs0+#WgJn72Ic{!bstPYfato;03nnIp2l{``@K( zPi}gSyULnX=yZ_kbtu)ufK&0wZuP&iZdDHxTdlM&I;YI!r&w_AW{B7BM{fk+axhL}}mAWh6A*%5n z)hX#6$}bJ%Bc``}*LH<`{@N@?IX!CO7Ygrq!?~2+N$M_peAeR@*i} zifUXn4^m!L3O?K)QD%^vH=UzOWs*4Z$<|sV!4LJK>m~X|>lwL^mei|zL|XW8iRy-! z?OX3NFY@KP#V0o5)mibYJoPuK6AmO#uO+!QLQ?JLDP$osJA-^8%DnaAqYfECBHJ!^ zX>3R9C}Y?ldI>vUzbnTw^klwqrEV1I3C2mJY;SHE^A*v{g(xbEuv*W`bGz7;Nj%<$ z#~fB`-NV-csN8QlfyMm8z^dUzVAJhUUgSs1&tdFGUy!D5SOq-#sjdYERZ(f7g8luH4{<0UZ25f>`5E6&I8WInYPLJ zpfI8QEy5D-M_uN#@0Q(%?VN;XXSS;}i_CmUxq19RQ(3%Lvl^kQ_o31AGv!w;@)h2t zDd%VfUKa4FS64YHRz4sReIx;;4nM12k|2?+7KW4mj?%I-<0!3r?J5sMW*XCs-d=9e zIL6uu$QsSOw4}6I=})z5mXRbY_=f_w7R&09qPB6DVZiz{?r-a)sX6P(f9_BYH0%7_zstZPX?V02`V9@ zuFR}Dwl-I9by2Tx#|O>)-OHscBrF13G%V;>36{6raxYpxeQNPyL85172SKGfudO!! zuvVsKmeM{%$~(lqPuY&0R_oZFU9I<2VG+Qs>-F~$fymlvq>a)L9n+C1FR*=z*U;52 zAxiT<_woliMdp))MS$}sYnRsZz*0PsKWZ*1ddp*cmqj2YudQQdM_wC6sZxhE$J3x3 zIGNFN=~V|7-7kDj`!i~8b`FC^yrw19w|7$%Y1Hn@{=W8s{%Y^72i88wYD#gGMr{4` z{8^ov=hiCfQHqz#o0peZy6yD*ur==rWnePTxA`d}YcoCRXDigwg9fC#uca7AgLspY1Oxn7A8?h_%jn+ZSA2`)-kA2p`uBj_us$xICl43W_(L{-Xo4L^=&%=?@ng=5wEII z&-HBfv?CW{51Fr3$!hv!FD=;h4)R{<;bT&tJJTNm*fp>GUWq%`S>?&v>8(uSJB8l? zFTGj*lQ%Zpu;}ZS3qkE=5Pes3<(x^48`trF1pM`-2bO&8=^@El!EK(-6fZtG(htDm zq^^Bh5vC=kaP3pIi?8zhs5x4B>VQRA@_V#-9chJ@1U08ExEF;hd{(dXnLeesP|z`m z#8k07ke{zreW+zhP^r?Xser5XRpGWWoZiWH%nP-e&T9mY5}(NFF3(?J-zi=bt#NTw znXi`L{ThFZnHkpuXT?$GWi=X z_C_dPuJ0gN71P@OxX2Rstf{S<3z2otEwi3YEL>EZoP}3pZg|t=hPz@w&q$N?RJE9% z@7TX%{uVA@U7R^l&s){&^?O&3G}i?h*LKK+Su;=MS$DRqBU(EH0#&xYPOZ3#^%X~H zWO{8-JaCfb3KLLx*CLbU(ea4>v}<~=QynrgD0dMpHHC6CQnM*FuPlNu%s)*yyLEbg zJE8bhePvWr&*-#9aq*cPATX3rSnQ^CqEs~mA|dW&0(tnj$&a;`)CwF9)EiOyuG10+ z(o_;rT2eLn32(f=`jzB80s@tOx2g^?oscvQxPt`Nu5{_4&WKTI9&NEpYZvIp2ArR@O82YJ+aylKLq+$mLRItWB@#)UsxMg>2MR2aHxt;<;^GvlI76z+mu&bHzoo zE$aS&iB;7M*cLiTpeB)T%Bx;~SE^X_lioNz z%Zsf>ZC!KTS>Pa%`DHE%My$Pj_B{i60T2QHz^`@ZvfuaJvbp$4d?3o3Y0q{#eNrJg zN|k*6?K=7j8&w4Budf_=X!JH+n=TU;2hY>^dZz2?m09uQ0_~sot{HCk6!#A(C%nF-VtIPEIT1F@X^u2y>MToEp-Kpo(d+k%r07c}c z^x2mW4oj%eslIyvS0M)Q!KNTa1(4{brl;of^{sL&@Akej>(tr(( zHp)QQSA5R4?-XCBv2iitY>RKu{i#6Q#9140gtr%A@zN{=B3L#Yr(yFS*_y_@2*pPm zyZ9Tuf+D&C&%R}dGyqQAjkmQQe&i=*Cppi^pPn+(O-x9)oDt5B@3*Dv%&FbJ)hTzU zm$~v9g^2T%c)rG_ZI}%w_}dRt@*XWtf7uch)q2c}k*CH|H${CqUcnAa{d?yf+%k1r zdPljm>zvwC;-jq9R>AWpF2vrlSbNs9ey*dmpcn#Yci;$M@w&8tP4sSRBY0G&H5CD| zu9v6RejrR_HXrXubIW_g3D3W3-M&K*rw|iM@fZji*TNTZbNP1^274jCuot2(ep)f2 z@DpF>tm|7EgZchG1-?=gl2H6+uR%#J0C1yJ6_qxu2O&eY>O+LL^YSn9z>7~|ye^2QSDIeY)U zSoG)Zj-7q<^|8P!r#45|q*}+9q-P&4n!VnCwWR**S;>D{vHHEFPtJ7X0zF`(!Wl#d zPnYqn^~w9djRnVfW1YU4>d%6AzaHxopU^p_XSY$fbq3^+&f>9)q)7V=BRN2(#A;<* zXKWkm#>~}zE>Vw6s1ywg+4xVhX zRbE%XPI3*}j~x8l?W5_-HQ0M{@@#a{^4T8e#wx!8?q}mefA4Alo-;9Dnu~?$FFtba zh_M{s!YG!{JDG?Fl^n6Y&`AB_yQVhHFGTYYcC0lhGJR>e{^4Dve6*KkyUW+gB&@WEy&Yj1iVScz zF*cMhfNHBItdw2YfF9d7<98abUASr8sxQ7p^)0JfWss(!iQ~D>;2m)ZE3XCIxVF$O z&#7Y>pCCn<78v#UFN^!8MNz@J+aL zVXv`ptD}X*Ax{+gw%671?QH+W4Yl)3OJCf-!=IX)n3&XSU}BuB$DM?Xe8~9Qmh#6q z;`bR4zs0gV5x++%cUts&-eSZ<+pqhXCvMq*jYyIF`vUvIa|HulQhg3~`-}LP4o>{? zAMGk|dXmUq`;Fssij9ODPO$H zL}F!xZrgREq5!ovf1jRBUtTF2y9sh{NJa`ipeBfv)Z2!%ThR&y;04EMjKMYhuZWG| z#mpS*VtUIKVw7rgx5&ojMNochNXoJYP*H4H=oM$|OFfW3P z*5joQ#%wP}ZsQ0W0GMNJmxFd>&o;=x(0}m-nGo5Nm#6M_wl;RvKWMq|q7d|Lmqt56 z%3JJ#zLgMb&H08)0 z>v`XDd#SPKmLLA!UtXPei$YudrI=9h7QrM|y%pA^Tb0BZ1SxA)kX><)4T_a>%E`{S zdj^ThIThrSxGV#bvUfSz2^Vh=t?XSvcEhC^5R@6^rp7J74viQQ?ILkFEs%->S9n0c zK(YJI0q5PKkRIQ`_#D~5qQtvwupoa8(hgG6tRY+Da0bOnngsG;T%kdtQcexo7Kb+= zDdiBzhj94@(MsMmWE&h%bXW2wkgaxVKiHOfopnrTlV@|A@)yNl=3s-`Zlqn|o!Ifl z1Qg$9Qq)nDVn`&4a@!xV8lFPzh?7M{Il@zklsI9Oxg-1uu{%x~RpSUxBQoLyQCg1F z6k=DLA}ZIBno6X_NucD9i6s}&cgFzM5r#2lxq|j_z&+rdeFTruca9O@G>~}gG~hv} z0dyLE91QSIdjn1bg7MCl*=5vZo7-F~aZ%g>o=toc7mtc^faell#)YHI9pE{{qPR3v zjRPD*d>$8s(sH0?6AR-2l#By4mzWUYlN-;l!BM&O7?(63WN^?j5(+N&u*k9St+KGeE^VsC9U!V|e2s{ya$no*W}m%$@11E>RSP z#UPfyRo1K`AH~%f7%6F1lkIU`28v2KRpev176X`4PBqyPM>CL6@~$G=;hGFAl)S6S z4!B+eh!Ud-!U|&au4QLoIz_ubAwbnTm^}N*5=%UhnV;w&0jjsoU8yS?p{CrWEhsVG zc&!t{(!4aFdTalz@?(m+y6rL)JX=$kNwSs8^A^3`J(jh zE%o~ruX!a++-=Z2@xRM803LWi=k8G=&OQMce`8SYM(B@U@-QATX7xoD(VL>*6?v6B zpU#7T4FY-%px5vh1vcKfQh?Xc#RIQlSe6%|23pwxC*zmYc0Z3l=Dn!9>|3%yYtMM% zHM3GRYZN7MJK);Y_{1>53jSb06s%ATTA*Qin0Jc;R4Ae`kFT@nxQy$H@IFf(z#8Jg zKx-gW1*6aJMC&|Ulq1Fn*0&0U9}i#+Fc8)-SRME`fVi093)FRPuTo8x%v_QDhkeN5 zd0iSoGz(qN)3Z9KUOfwMh3HFF<(`QB8|d6HY}wD2+Xm1N-E8zj5GSUCEYhqbpTZ#x zjFdI;WG~!B14ZSWN-`XWGJq-P;K@EXe*+0+?@F=PAKh!S@k5A2LdZ9$YH=CEOBimVuMdJ%}-0kJ!SRrJw%_wGvG9RW7rm*W}7Z~(t~ zw{=kBFnBVN7HFjOv#`Y7S{ zM=2Jy_z(y1izp?C{RANVU#(UOwrh;E5FFoQuz)PV0sIQ`z~x1#fT>_G75roD0PphS zKq~kXyNtm**%ka3mf(U=@&y(nP!gk)K7z_-p_so2LVoZg(B~bgFFDJ^yF~$#4Rm$^ zS%-u8op?SCQ5p^6Wd=b@Ac*KY050AwO0+hE13TlL=4Jg4p*#N>3;^HZ-NF9F5VAiJ z+L0$7JWzyVar!e$cvOUw=th8w7gW5XpnwB#NlqldQ^m_c?(k6Yg8i9bh2jSh06YE7 z(+Y*fw+aOh@V-IRa1i|fq8~e7#Ps+f)i0#tJU*)lymPx`$e98}+fsr6y2!&#JQZB06| zh+f9&K#l=Akhuk&5t{}mqpAleqqcz!8ULn+jPJy5!;asu4mMt*9eGm@Wb;hQ0xg&j zHtbA?Cmt`@fjo%00#)XZR3=XtVE~Ue5dx4?GdSeb@T6w08B%>5`{~XIgLG$wAXa@q zneh&m%^O9E9@NAw*)*D-93x{X21VEi}ORG+H86c;293ZDAfZ&Hgb;G+l zKTj0Zua>U>P-jg>07)c=>?}xpHTMju(F5ev?t|piPX9Z?sL`=KkKv@hn4w zf24QCncwnc&v}q1y9EYo6AaeKHX|y`-vMs|6LYw&F#n1+fbH?JcR{qvfap$N=x z{T-O!y2VxB8hLKn%Vmuo;=P#Qo=FSqXUfm)E@y>pP1mfA0_U=hV!in#QAC67^Zoqm z6X)t9+<|}%8DK-k2-L*Lls)gdQ~*f(Fb->;49o&6$b(7`tRN5evkvR( zfO#^h5LCRN;{D$!-T?U5G(!1X7A>APop6Ehugd?tXB-K-yo1_*z-0fbE-&-jaPDz) z^-;?DSyF-F+z59N|L`kI%+CV~8Dibx6yd&(nYqySf-{E(J0pggg3Us~;jaIJMFD0GaoXoOX!Y8ObEGPN z0g*dH<)8V;$h`I%aA1!c*yA=TO*a$-@UlahU7=v` zR`Y_GNify$9jN4gVNrlo1C6(%xmhQ{950yT{Z37o=ZgaLxD{gEO5B0_ z7EKJ3D$x`DoXtp52rG?7xPa2jqm7~>3|p7Zd|3bbc5~S4yN6>|hFoj%sA6rUs_omd z6t?1~cwx$1dZlm_k5S;iS}QZa1k9P+(hocXXm`dTBR`a!7gNwf_+dufyv-O zB*;*Pg~t@^K?H!hgvp^U;QSy& zhBI@BcjyOj^u-|Y!RT>^Ls2Fz0Vriu8xoInV?QF6Xd?<17l$X%Wq1hc^hU!u=#wxL;rK3i8-#cna3w zeytiDH8bHh-Hh!C{mAtoyN+m@9uYeHr)}Y#B>@1xBpz$tHZauyrW*c7sRj(<$OaaL zci|cg>=FW*Oa4On@(zp_beqY{huJr>dMD817R{nVdI*D6I06V)A2OA^vyeQ=Eb#`b z_|wAGdvA|}DV0su$Li{rUOcQ6;*Efm3cZO~NmE;RXh+|2R#-gj6HFLJLm@4LJ@ z!0>{7fZ#Rhl#kBLDa6R5)1M?q`euF3S-IT(K%MS?B`pmO9UA7b4f(UY#72!rBt~d8 z@SJ>SART*Az@bCK`i_USpn<@J?<8}7wnYINGP-#?sSrdz4C!y)h2Fnf_b^XfC9R9_ zue_Dr>EQ4HaCpEl2Y1M@c@s>HnRjoaf9wRoa|cV+Lx1$c4;(Pw5o5t&B-VL67~Aq5 zgg^XR@Q0yn!cSI}A;sMBN6`F==q#qIedDe`54Ub46SQG2xn0MZgu7`zd@MmWE!s6VBwQFlxUXtU>yUT_BI&n@UA0< zH}GzD!qd(8m+|X>HX#qbl1^O7HaVZhXHuJ!?V2O^>{06nOVlAt+&z$ zcMz(#dwl=m;Qhsqcy}g24{cHTTI>6JLJK|(fQI7Cb zA|*~3W$p-nLhO!HM%6gN(};{XL6nvwHHFv}r-;gRq^1&SaS|vW$GdmjUMqDG0&m+2 z<}kK1@L-}0Oq30Rmqr@^UL$vSJewPAj0YRzM|-)$j4cmM08pUdvFw8VnS)9PL`;sr z7WHRndABG4B*!0-e4RzbWn5Q;lTVb?85k*PR+H^>5>U54io-Kkjvp(!%Xm7TWMF(;Q1f8u_<05H-SKM!Mu0u>k5VWYzvpIF zn%CpGv$S%Xk#NIU_VPRP15Ayv@?R`zIdaF^ZpB}89)It`LboJFjnI>x_c-nG#Zk&S zcUNLKJKejhwC>_X*5V=-_YKTXlrV@XYZIg48xEEA`BYL=t&YUcDfCiVJxFK&e= z1^Ic4w02oqOrxolr{(1e_E;rF`&G~GIi6HlI5WDvPdQBoLn5_{KXjCEjHdrKX%dSy ziT%%|YcSZ2KZN`-vua<~xSe2~ey|N0P+9pg?v2)OsNE~fq;|heT}^9O7k(t3oP~VO z&mYy7asq*wZkMWj(#rWUUd)g5f%yK?R;lMsJsl@4i{L_9x|&{pI4x#u@HqP>#(n*n zH!sxR918K2-FaVOX1ZJ7 zY4^?NPETt3?dA0^e8;9vRS{e{)6$pyjfKDMm^b&6#!Z>iQ`q0WHuvd%&e!=*)!AQF zBu_8f{`<|YKhuQfefA1e`sATIBLkmpJavVXbe2M|(EQ$)9Uh2=vs*vEnsL&mleL`0 zcRAfM+*VJ@Nro>=X~X9iHl!C7FRw4q{lGsjO)c^rUCJb9u2bRimD=+6H|9A6-IPxF z8ldm!IW-n~?ukrB+q|u zg_|!3rL51(Fs>H#%+UxqK18TUA;8Nj2bU5&E z(hY?v17C%jOkD8G+}itSHNNQZg80xt$8!fSB@32EE-QTWr`9FuGC3=jx6a9sMb9Kn z%XL!Gy{b*RIxTp=UCmGx#Rm!N3`{PatxdgRySq+;KoVYc$;&eCP=SbX-I3akwnj!) z_tEMa_pMW>POUp$b?*J{v!`li7I_`^JY*U7#PIPXjH8YhY3gyAE4!riaVtu8h-fU3 zcNch``k?+ZvcYeW%-gxLLi}?vBx{n<#-hYLyT+bvm`}TUPnYYhc-}SjrEb@kLr3mg z?dS85IGU%TrgCcisV*eSj{Xc8R<##~51w@W?K+D%i;$4DJ~9Uz5ev^RdT~K^iQreh zt2t|=;V!l|ib?dqq=qGn(hAM|?2pl9HB8*jK?snPDb%Xo=$TV8wCYS-%vsju8q zs0N2-%AmSUw?bkUGw#9a)zy7YCR5}CPs7jZUEY-W-wY$>vx^2zT*)0M^IX|pCzxtMY(eAclG zVsSnZk36p2FEG2J^W{E-qF!)BYH6PI+pyq*bvKv2VI@irkW8x8%G(=8aTTwBD>5Tbo(H`FXUOh65CC?&7Lm;facovhA4`Fn6zb}N$(Uh2@ zSzY6;A;HgdYQ@!-`!_Y=DSP@N_dh0Vq`rG()U^L1#-+83vZu4nibRMCiY2JpBF?s| z=SRIu3qv%OXLUXLte#&J9dwnT+EeRwpPK)uIDUFdj^>_j_sbPA@4cF?Y0hdZWB)B; zr>9URVrfyE`oCyc_21p^8=K!V}|b?lluE!hQPaAI%f_67w(HY+0r|8!9O$?N=W>*<`D{ zE+bI!jdB6CM^3S&yY$g&-5}4ko43E7dL2{KDPf~}e-7%o&*`0e;oCZo?(NmjzF!P$ zdqOL0N$A@7u_>(wt9eS(Z8rb>Er)d{L#38T`wJ2J9&1)dwPnT8UnRH~_mp{^6HUZ; z)SX(>)3&pQ0IUIG#2Qdt2G)Q{Ht!W>c(Ve@jO>~{td7q_zWJNC>Q22NHBp4$o(eU+Q@gcYJr9D$3zpv~6?Uzh3V(*x2aC%3!-?Q0q$Z(?vvcTK|bZuFUrAu?F{ z)yrL<81op!B8lYBZ>LoRInSxj6{9kltX5@Z2}z5;d)Ot(n|Hlt|Jl1*tuD zn(;f;D)%HEm#^#E8XEs@%cS_N&)EkvRyHkde_R@)+Lzkx>@rhQYP6sSPs46i(-mAI zx!l_KZ7^T*R;AZIp)PZJy}y(!^{R(wWK0d7J51(+=bLOfraQ$>N(}8kJ9ysuEw-;G z@0Aj@h7_p!)Bfl_Iw$vJ&e3~X7@EM?Z}pOWs~#?HCFf5QoT7Q-dHC_m`sMt8Cr{rN z@4%iF(Mft+C+p6*Ah}NZ3_5sr$hKL!GZQ2?q0giQ&%th+_Ik#3$qm+L?gtAbOEg40 zKWElC^Pcp-{02zO{>WU?~98@TO=P>$DAZ#>CWxW_i`(a;#`Vjcfti`INvU4#F#Bml3s2;mxt=V`4)z% zUg=5W+3_h{?zqoWF5g;^+r9gZ%e{kGa(Vcsb9wmar@7Q265N_fZZ^TW@6@5Ibmt;F zF5g;*+qeFc+qZtirLtMht?0erQuKnj6}@@fir(S>;wChF^%~bkZ{TuSwXC>&3GfE~ zLVxAW1NNPpC35a_9oIf{>uA!?a(SS+_V^cYDS1BJy1qu-9%yc35D2%995@HG^p%ZQY_VJSK}GE#SFSoAdX$~>(i&=VT&hDE|^Vwr@^PHc_~AJuPj|2B`c?qj6uxP`+XFu7Y!sT|JAo z$wFiM3GQbYav5q}ZZVH2~yBlH}5Y5d_jkrvNX~CKMq5Li_ zZEJdVh3Iwc9P@^cx(pyMs=JeJKuDXGuo|GsVE$&yzh?_Q_i9P6hh87(JRnZO_02b4lqTEnCO4e)wGigL|@p5 zT!huD)TLeEY!uidUBC&>h==3g?9_y z%J1H|Rbc-7z|$1L`p8eJ9i-!Y?dHnakDv9)Yu^=0FhT2G8Pf-wm_idK6&cvm8&eo~ z@;zSJuf_llAwEZ=pc1mxhM6c=2=Nd$9vXy+^h&q$1 zo-w`luv-r-md$d#y{IZDIY&=!Z$0q9$@60G8?>hjrR8w{`kZH|_|xR0jQfEAygB!; z&v^#>-{p=Y)fHYkB#wFeN3Mg??a(K0#KJ$P?jFw;0M8(5Tu@nmS>FkNj|&kT_6(tc z3i=e9ky0fgNI|)B3yd%uu1sX01(A+2-Vv_qL`N(G?GKHX(KLkLAbViD(10w;ct?^Q zu)WYkq|XkjDzS`@{S1bzP)v2tL&EI4LW$!Lh@W5~!1M4EoQKTS4bhN_qXBF5`WJtU|QIHbIM#<}%*b$!^#*C_y&Ikh+f8gtido zoJqz`rV~EPXTu$nY;KhEz{&Ut7UG{*4B&aFXig4gG2d*b(MlS&t2eiywvc3UqREG_ zMd%=;qinT7W;A&%5r@u)8X>ie;8EoD#6ol;GS`5rMRdakK_Rk?Oi8wpBSv>xfTkKW z)e|?>glPK|jKo356u+9>C1gh|4Jsj1y@RSkJc+GF)1ZP#EdzK2c_Xn4-2_!c=I)@X z5%Fje(p;8tjqHL=KD+O!UD%M;jrqh&Cp%r_4sCA--i;TJEhHdx~pBeqq8( z38tAQexiV|nt(_yVfwgcl+1y9Zkj+?-InU^y$KAf$DMBj&jTl{rt?HQQiAX`-5+l1 zb=>7X0So4z6HLIgtNiGC%)JRDdBQ`jcK4Xg3>s#5-nRA zDZG(J&{F@~E5$#BZluYIwvlwgMcZzs?VbQ~0^{gewi`rFfXIo7At#2FW6TA{kDOp- zv>mh%0Fe{p0FJO>S70OuL~@xc8wjlY3prN1&sgslYBRA7fSWZeJF|JRcW_@1MheE) z@FFsQR+XyZspDrKv8aB5JqS+SrVN1kaB}5s0O|**+_3RyICL?9v*2KUG=P$JH~{q- zsN4+0pFM{(d;tJxX-E)%2I9|ngg*mp@;IdtKtsX+VFYbDh=!aX8nS7qiZ~%@lmMj> z1pG`G@RRWkDGubhQBXDj4S?l72LNd7Dk7DQ^zr9l#Wjtn>jA8I%OC)4bQRIl^WRdn z35SlVy?-l1>RlNZOav^;^P(&d6cLMt;AamLr&aIZL_Bx^f(Bs4*?1pLHG2mKfaU>o zEhqxGvjMF5FuYGc!UD9^VBf-o5O_e}LK$zQ5dfdnn1j(b*vB)0J{~|fvY6H}3`Vna zjF_wUre<4g7L)|^a{-{AI!@n$78?b5hy(d427tK$@aA zxuxo-NR%^%66FAxQ5nf;GCT>ubAcv9cHaWKe@2i4&IS4wYyfa>*t`q&0bMl8oGu!Sj<9GOx&>&T8JDT9jqYp& zt1)24al#qLVQc_punFXN2#%frn*dnT25Z{m59I(;{f!OaAZEz~Om%u2z$O5;Er4wc zmGM z&1C?Jlzut@pAo!0%KyKl5h#(4=ocCp2Ptz8XZjVor+GmmHLM)Nl{m7B0o2-ue$?8> zRaeZ2%cM3-khLdM3BhSwhoja2CIKK>={(4OR^ULQ7J}R>QF^n#DO`F_P z1dvz&;9NHRjO|^r!Qun(GmAk+NDj(Jg;<6r0OX|rtwjdNe#T~29gbfcS2_svFz<4R zN}D!`wng_hf58BPA0QpXK;xnA$oBr)O+Wk$fI$w!Rpdi4GK?sI5e*=q8YC(Os)!&_ zDM;Kqq2^$q-R4W;Zu=CLr|Y8IX#`z&@H(P)5%j}7_(NOL^^KE5Fe zK6WD)0MtE>B?086QL;G)2Kc5ZAcqCmr#(SpcQ$JP>6@u$_h|#!NuL1%XHI^yzr%2d zyqSZms6$&IeT)E}aSdVvhZzz;ii4f86C-f==c9;!o?{=VA`%iSjkmK%Tsa z1Nh+pArAqRd;@@=A@XK+?~J%C;|AH20|8PT;uHtT&%mg9f-@%oQ?1M!X{<>HSp&fN zBNOvh0Nwb7H?M7fvasSvjHZkOQOVuFx8Q9asgPyKo z)tHH-cpxAZAK11q(Y6IW3XM0_7&?QU03V4E{QhXq2A1k0_g48}`-`^^-o5{JzL~;g zDE-PL1{=2K+cb=9Ef#FO8a5FEoc=i^PD()Zo%jt=Zqd&miQ?dWIL(Ocg7#33oHH|o zjrYL}GV=j!KZ7N0ki!DZlTUOOEjv#>yfK!8Cs*bSIvm2D4S_2-qYpV8Q~d+y*z>*0 zhR|mx!N%AL0Rh31HoK&aVGUuqR{#6F3KIHiI}w&dh8MaYg@ZSoWOa#G$GU zD2-q)XyUmb#0Y+$@k^rX#w_{iq5|DWSa0l3dY-sr}MAid8&&=(st)bbb_ z_#cjE^$xBm9DaiHprG&3HJtm5Lz%mQ)6zB6voHjMWRJ}5?}p_}aR-2qJK#BkT??;3 z-3aQ&iRBg8P{?m1YXBy`@k^rxNGJ~G$tRj8*Qb0NSp!fwa|VADae8QmV7a-2t*-5| znmhWrNe6i%*Au&kfVrTl{s&C;HwSYxUWn`I%s)X-8PG#hgkf67FjxcJXX8|kZ0<7) zfW$)9EMWJy75YoG6lXrRZvQWfPMG}QKfEUHhIRi6(5-(S<~?DI$icAA5fm02cKdNx zV{(@aL-&nY7J0$bKjDP{&%;lkU0wGU49kBrY$uT8!2@v&YRjmh8ek7}fMfy# z9vfh)hcSv1W{=-gvl+!fQ=Q(%oyR)lK7;lFun&N#9#$Njkf~;uWB#kAx`Czg$fZ@| z#PPt}JLMtx6}$8{q01A5p+yKu(q_Z2B+)HIbK#1;GqipjP<|&%%$@XrLi1BN6@U`$ z9U993C_xV1M*={VXGRVX;r9;+;jsJ+Wz5-?M1X~FJ<$!DIEeQ_WVHc&s9?Oq-7x@_ zDBGVIh(p*)6g7l}1h|_2kG<~>qKK)I>^Qc=?|qI)x0{N7-+OPL^T(}o-RpJU@8|3JdhXZb(T|$25CUfh z19(%*3`(CFiBZfotC1!eaY_Kqd#JuL?}NG*i_ymapi38&UhXyit%I@P_yvfZ&9@;{ z1I#8@yNE!(g07Ui0;nngPslRaVKKU6h(`HY9koCWM523$;fTSNN;&Fc?EhDn{_Sw} z>Q6At=m0bNA5aeivhOcF?M-PT>b4Cg`!=#$@jI&y=;uEC3kriGo1OFC^m$PAH=Asx z{0jSQL#}#3E^*NemJ@*q95I0-Ozlf7_;W{bP2iZnI(~+jS{{b94+6j;t$;Cc6gZ^d zG9@tzb85A@jUM_zUs?d=FC*~*!;qB#qPYHr=o|8kYa-L1dm4;kxX6fUq&`fo(_&nj z{t`H%F2(|Q;>7?sB*4r7++9H5ROkW_AkmmpEB6-=sC!)iCM1fY!E&Wgz68LOCSeNY z7+3urpu@eWPH+hl%ADk0cqel%Ley32E9saYaEqWGm zO*dvUo|+QlsjXGqF`hbl6Ww|upf~t?x-pBhKmpwL7jcI_PqBRGSbcR_eiiuY?>?-1 zA8A3D!75P&+eB3c;rIOVnUA-26yUrUa0=cg&zQNGpBrlR#<)H3WW9W5n(ATl?@z9+ zGR*w#gu%sMD6(Nj*nY1bL4_j==%9* zKBccGE$F{w;9{9jB5vnnCGp>Y?fspy`K+a3!zcsf{JN*_XF6a8e?Zd2EHT?)&h@Sn zO~1)vyc2~r1@vngA-~U&57Hb>e@*G@t(_`PDF_Ub1ND+}{*BDquoK46w@PfmL9? zDRivHgpL^0sm-HKE&is^(HavvV&F1 zzfmHjno_GUR7o&zTau@mGO93CN-%Fz5|P-FBr%_VZ*kCZ5t-zO?3;>Qn(cF3V%f4~ z%hD41j|blE`o*k!@2Ho|T(u5wh)j6H>tx8Zw%Ot;8EDp#+ON)S1p_(P(Vt4&otFt)Oo;5A@|Z zZ@Eu}wxCt}<9U%0troq~g&jgSoVp)r6yt`f*wWH>@gxdnI5ILe>bo-VI65Dqi+Ol)YF5us(xAa|k zT|~5N>y}4$yS9)3Ke=JRVr^`8-CS2o%fg%m{TCZM^9@6TFh5n}P}W0tM;V5NsXDPW z&otaR^UVIKa(|G`2(Cw$sPuBvXb+o{9M!?hdABc3$P73`fkqLu*?iJM7;7K zP#6Idydz>QUJXy9L^{8O^(fd<7M-D~IcGFiy z+W6ikF|-`MO4Y^IJAp6{)2#4>Oe`c7dG94#q+QsV_ozPej);-xa|9NbBaMNn%dA;& z6p_5!BE9SNodGk{!E}^J6Eo!5L3z3>uJ)IFK3KX5d4I%nQs1wZbY>5d@Mbc@sE;9H ztmNK6=mqk*1AML1{i1{6OOsn~VzUX!b-Gd@jiTI}(~a91+J)RJI87+T!Q%pSl`yiC z35#!v6__(ToV9|qpq5G$IyY~CGxrle@Hw=2;WSH~eRA==aE4Fp>e}YghbR5=oo^m0 zBHTgU;_TgR8p3ksB$361;YZu;-b9y!D2V)9Pvcn0ZtK3i<>0Qw0;#O_*Y`EcnU505 znT@e)1(r-SSKdB*d1?FVkqB#td6JiFBz#af(7QFGr8TI!eW-;G<{EXw$%xqU}{!%CKpXP;KIn*h_Y?fxLVTiXqb#Y#lkqvT}c_v3x z5m=MS*6@@;Q*i$HXntZ}Y$j#BraI-}`2|Kngc-T}(&0{rWXJLahkG34)Hqr$yX)hei{Mv122I zZzdNpPs>S1<}FESdqo;Csd~v#=BY1`QcTWvS=$yiOyr1s_`%BFE)!EXc`}dhEmbcV ziH)LV_C6s1Z!b+hZO4{HQ7RN&Dg@ipU^*nmGvhw18f8MRc6hgI{bRGIhe=(V9-H?c z-sxJWVHR|l(6v#+yoE-*s4ld;bs7pIaG5~7Rx=%m{b)kfTFe0bWKr2xc z5iK32GoP)hp+0rFrxI8$dq+8iaJlmC*jze0Y@~Z>{wZLY_8*DP;z=!)PEHm|JIasO z%-2d!F(Y~$Dui@|TU`Uu%OYkXG7mZIvweYF)Zv2mx7rOT2p~~!f4=+&Z%<1H#R`{% zTVb)BuAKs*AMzmjAv<;^0kU8syFYk5VsTsf=s~Tnv4IOb{bP0bpiTvBt-+7B zHr1wHtiEAS_b_hpCoh3ciUi(?(nND=EvKQwBdsuAPiXU9f_#P9QVNGVM6wh|J8(yr zq=dT(basp5#8GiVoYK8<>(A~i+Z9a3an0$u_rBCpUwX?>l3LGq(|YyC$E43nPiul? zADsxBTcRh(>-Fn!>w?@Q`AB3>-Q)BTa?{biBzT+bnPcMn^r)C1&Is?V>}Tl9_Fkqs ze$9C(1p;c{S(XNB7n6v8pMWPS{h?*PZ?v+LPI19zjz{}Cje4wSsot!6lx1p~k;<_k=e=>gg%P`lm)+-K|eYoMXg# zuGcpp703CoDvB7FypAqL@_K5HHq^q5krQ0`{d*Yk4l(q^4t(SN1b}kvKuABS3eS=b`>DPSZV3qk#9yzeIch>8;V`o;^x_u_jY{T&X-ppF|!RM zBh{(LrJ#Z?)YquVFVmXKr{VjUCK8hMc&tpl^!$M-ic4=-T5Hb%H9%dmWX%ynwHa;2`W_ zf$U+VQQa<>KcB+v(365XJT=?w*w<5~>W`5vevzY<*B9u|WP7vMKSVr4oT=DeB7bH7 z>-A2F`~tr77>9QI>Q^p(VniJGf_jgiG9@IoG>y6S{T(Ir5^Hx{;I@cJ@phnA6~Fwb z+x#4{zF#dt=?yX@9kyrc2MtqvVy$)8!1oes?bO{C-xsKpm;?x{UPMvJkKS{VQ-51+ zZE^8O`s8Qpo=19$q-XhcJFF^MGV_~su4AF(M(229S!hN@3U3s`7^&zWx8Hj2tUtpi zjz>a8bM1DOH&*Hyt}+UVcdxos5!@jKV>9QL8pQC)PZh^?TYehns5fWtyp29A{sxx>rci1pd8OjjdTJ*r5W(*F z1ZO13cvkW`uUtX<;C#LKb;KZNq0PhRA{^(ld zd-O>$+Qv`6-bpe1IOI7Sz)uf9Q?ZRM2_Mg@s!MT!ukbKO81TBD>%T5fj%HquCkS=G zI4{hR_;q%chuS=Pi8B@qDOXKfV9tm1L)zJIe;0Rmlp3)LZ;Ul=?yVp_AkXNlF z6H`x^7rJ)nfFmlzn@_~Hiu3thDH+zceV{N^wn?TJi>9}ix04n}VDS#oMAudS9ir=M0wAOV6NkmX^>_Sz z5}kZ$$7YDss=V&Y9Bg4-S3U=IxT|1ZOqs$KfTacuy+5r}Y5v$%2bBlD1upA~#*c?z zBd^Qlvl{sBpjaxpKWoZ%e%qdP6;JZx(CxTR;oS3M{A@PIP<9GrQqWzp@RFF$X)FG^ zQIV-tK`wF!fn(Qu?yKV$f!(NQ8JXFclO!;CrULb>c1&5IbY!T`+ylS)Szci~ zqyg{J_0fy=hYG=BES%n?Mkl_kfW8G?>NnVgnMFbG?S8bi%@W9$GPH%Gg`Xd~aME{K zmzpHjvnqftO^ypTORVV9OSR8ZvR(I8{djWJIvl#=^G$CtugLdTe$yIt8`5K%jp=dsiWq%&{KC=p+L#{uY)p@T zdDCd!q;;Arfw*{O19(;<643flG0LbreB6*oq&FrKw~dL!bVGW~urWP;wIW7ZoL@NF zksGte_#4yXU*0s(!N}Ugz)oh!$_AJoT#l@SeQ)KSS+87WY6V@W+L%Z-cC2dAG^f-7$jKAih%r~URIvdmDU*0rd+K7&@aF$W-dgQp1Duv=yL85Dkh5*m>c)|Fn zwPX5eTRH-W??oSd*|Ykf!*LAzAU-F3wCm3(fynfv%k+7341}N`(q{`U?x~3*4ARF5 zy@qf+F!Mf4zfiUDqg^ixZR5w-i}(HXO=X#+o|S-J@Wc@^G=79Ah5g+RkEANqct%JY zzqA!%ZM<#%3@b*dNG14f5qtu*np~`Y;T%Yo$>IF^tE?=2;4+iW^qW|2auLcP{X*Wx zZE{Q+VG1*_~HsNT^yls^xr?r$||3qI^f>(fHXOH1DR1Y9{2_Deok=# ztY-8tOjzwr6kg1ndZv^d?0fNkqzlkj~yZ?R*POr%~ET$E@L_EUNp zE%Y*8=_bECQ;;0!S&8&|!us-nbVuTQh6?5oclQi#mt*3IRl4$w4*Uef6n2@iO`b_8 z{u$wkgrDDsgFcOBR(AHb#h)gf;t0d!m{=PRUTT04GAHAWJR?+Bk>4Y#=&S!p?uWaH zen2-sNBAoN9bukd)e&cX**&GL*w*s*y;7cG&7T0hm|^^`PJDSyKzl^4y$Dk^i0m*) zwZHNVtMB3-@C%m&&bT`{!_GO+O01O{Z^Hv1N(=r!scz@5+wehq9C9?2nTN+kDk)kf zldo0wvn zNAoGwDOUB8_kp_d4XGC>#iSl5`Wx}eiG4@$QJbFu3y<%~Lqr2=1V{wXB}H7nWv#l8 z=ks&>v~oTH3Ab70n7?QX%u5H(GoS&$p{~@BT|VBQsAYfd?5#O9FeB^4fcg5sCgA+B zq7NZ2`15fT5_z_cHTY`h(RKr+ny}%TMl4~|C|=B*dV~% z80EBQDUC>|E1~6vQl}o)xMjtf*&p{)mSN=$P-ogOlV73I9xibmEjPeKB$LxG8w*0p zBl16M23HPF*05Edein@5YQeyIzxycHCl6R4Q=vR?8~q3k^F2{lgVEvF$u&fq3r7Z**)-wz=@9f zxwrk_+)KVq2Y}||hZp7|)90NP`Ip1c&kd;{F zYoAbm9B`B8e$K#QjQF2!#Q%*)9`FVuh=BRwyM|fmmH13{SDK4`nF6iVDcY*@J3TVm zOgKBtPGhkItQSo2Pre%;$wSa3F`ZmV0L+N1-5CtGOy8m-A4G??&|8b%J zM(JbXwtq?7b~K>}31^yy?Sq-=1u`h15^8w$_zVuEI%Sxh&6U~doVozAJcHbx+q>0H zfC%E~k-{}2*Ge)B`D^>*gXXtP37T4RB=2}<6VWHHVL;$g7|_{iIKo+5N34#wW8$Ll z+&x)MLI=WEu;7krghLD-hkY2l0UW6_$KKE!oL7yokD*j{575laK^V?X7{XzBOlfuO zBf2CW0p`4I=@0moM4v>T?Vbo$s}hl*tgjc5z-N+7KUw#k4-)95VtO(V!@w_Uodo{q zQNiVA>hcVz(}nK`t^eDr3uBh~UlZ}W7YjY(0rL~*GTK@x7TIA>?A~>$!!mkmGNngt z=7%yfD+BC=R5ROr)M{Llv~2|&LW4VM5JoZ69QHx*E^wswoIpcha9$0@x zp3@#}T&Zp((K%%p>=9rpR;imFR{3GhFxWc%L1wzey_-S}_k(reXO%*9^`fHP0_eZ< zK?_u8He}VD-WHIj3as%!ba|l|t+qOLQl`U4^w$0D)rB$3{LhIvCm>&~!^|swQczu za)LW*5gIXG9QGmb39!2M9A86ba9%A!QvzjL1M`?1bC~R5nOa;*uMaalsWW4C9n93~ zsAKP_ucscL1+!>JMdSU@%+j5!Oo6F3m?_U$0c!xJ8NE>GvgNn92U)em>wmy3^Bq43 zi0#jm&9Ks5ohTuR^Wg} zz^lQ=I=0*m^T9$@2-6s84*LjrC0Jc&j;moh*uem8TI(}=Ml++0=QFBAD_^4G;F=y2 zWJVRg(raZUJ`tfvcnLTiLH#2$n+nn8waU4!1OzdO=vaDrp@!x79M|XjLE;)CeXCe^8t3!b~mJ#V-MxbHoK9Cj)n;2)Rb^W8<5i>%wm34r7JRf zM!W!>MrO1%=#l_Iv}k1(Idf-#9gr*<>%sTW-lSKuJ@=!?1EY=K4;e7BSzk7)l`Mgo zZILXgJvCEfMj2w$>81G@hLz#QksT9Lt;WWIOw%{B7nrTppkeS|h^K*Kg<)qv>#9yC zb_UppRo;-0a4qZOfCjk*2>md22sp%4YGf^02}I^E&kK*Qnf;8C49)`rqxp=yLp3=4;SI2;D<)R{|(MuiWvhOt^I=A^0W2J%C;@B%;dYe3H1HEvh&o4nHd! zBCdBN+RdN-J0G+_K4u11fzcN8H0%6dEB|SZ6`v9Mm*oNuF_x-XUp{Z0k8N!&2|4Lg zFLEBA@s~bGxch6y=bVTRrTn$uTm2H$07j zSIqVXcm0!Kidw|Am{<rUIZfplnksG9cKl}hHJ&ER3h9BMFjMe5 zap!mK<7cyhS%6;lPmn>n#O&ZGK)WIIj{BVtMTZAMH>Q+BFc=O8*J`746txwtPguV0Tu(Q9KCaP$8YWH2ndxcK`L9LLd& z>GwvovbN`bJ@G!lh|=p+ee%u${9=NG zbd(w*kH@_Ri_#5LqwhYha*FQh4$!G3vT=oee$&2`Gb7{-xtv8UwSH>!P__Livd1y$ zthqo~M>XX9r)RROG#o$sK?}oGA&a3bIff=Pnp@=)9&UV;vx2oe52B>E4+ChnH0onP zkqq|12+R6RP$vVx`xb)Gtgi*-(+f)51|w`wqi9nagnL*rp`jRdYYb=RW;ipy;#!Br zpSE5hc$@YU0t0MX4gdtWw4adl96NjvV(gbEZ5xI-2``02`Z-A2Mj+VXledp*8Jfj9 zR&*NKaVubW2cf@CyNKrE!tf40^Y>tu$ofsTvBGe)SN}rv4f$W7GW|axaQzz!NiV;@ zuywAD722gXKo5rDY5N^So)(uYCL;~f^C?x0(w&WxcD74?=3@O!d^ryS7~Ul31mLS& ztfuu15ERGT94FkSz7o>BC(8dtdH5n@GsZSzh_yCPtkoyI!pWMc;5v4Gay3{0&uPRK`fbycimD;{*G-^Mu|I76!1sn zKij;Y{y>IW149F}IU1mQvQ6~=akh8Wfbmh`6~gLvwSC#42<>_pXp|lriO{Go1^6&2 z=Ncduj>)z@1N3t)4oCsyv)Ly9f@H5ni!aZK~NISRjuw9!2ku@LaEMQ4sC-+ zj#FZi>i@WD`sY0qkW^3q9#_4TJ>0IcZvz^FOI*uqY*->5zmWXu2!ML5*Ef+!imnom-1*X=vS$pDlkZKHlGlPIhU4KLB`e)RFzO-$ib{ze-_0^DR zAPct-LYRI%c7_ZBav{|C54sv8g&y{?tWR2LX*=c&L+v>*=?*5{*;Kl-#)!6uo^JLt z0vd=G{OG#m*P|7skQ{VV5j_oQzT86eb5KQ3<^t&sU_@cunCY|saG4r4DswpSV}`=7 zPi&!sxXni;%o4MstMfh`P!bD4xOV+KD06udvH?=-mj|BXgTo-BKy^Gj6g{bn?rJlj z=W_Yr%_|cYK-&gm93@O)7~{AphXNRNbE54re(X4NWpr+B# zU2Wdw*)vc+^Ge&MD`R@9`llkyXMY_+z@(m-MkylD)mgs8>#lk%Uz`cdczmB}F);iYxfSGIk z9doUJKpzxv)y-dAwd%g?2n!B45&}bCq4~N(E==DpiJt#K4d+HKPy2);23M{vl8jR8-Mxzn}r82+Ch{`xm$)ix8qM;l*bY$HErd@ZX>wr#`F z%9BbUjro#PZ^Bb2V&cYM-HBMxnx5-l%XLQdzjz_(Pnh5X(wOWS( z2bj!V+l|>o;J9dt(MHS#^36pn{ZYW2`0we)jG_wQ8^IX)=^KXiOXgQcTjZ%)3D4zR zyc|sTOl61f49(WL$$V;KtXemIFM^lmVPj3ZG!?#`g8ruVa7Hsf7h&p;6@@te*Ol5L&K@+AjiLOiztafcSWg7vM zQp~i^|1}^Bf+tQkcX@j1ThLwLI@GTWU;PWlqk+mK_iCLyJC77$1l(ERMgyySJAQ^9 zg#3)&i~@503Z>K-)3w=DLW!}Bf9cw6N*gg<8w}9uX2I7`xRA(IT*x{7Hz>5+c5rq$ zaJ3Z$efISgL)2wg%4PIs)U5b7&}SG|{eSJMFMhcT_}6)%U!7O~7hD|y?$C5B4B~OU zTXM8Wsguf%*r2NhpwEmKdorf2ejU2uPr)?&=Z9tf@n*`VqYVJU!f}mptlnfdCiH&? zQROdJFTTwpmce4a+s^ze=nSU02mtE(~$g}z-10J=xv+kbWc8jS?-nP~xa=k;rR zdn=gTyfy}j@1MhU_#<5P8laT9&A94PpyY^g)fm#a&CCG-u6j*#a5JtN)sFdhy6XBR z)2n?gHt(BA&&6JJ$dGvMuP>e=$Ko5ZbgIKC?0qNq?RqG4YTEvr-;9cV3o3|-@BR(I ziKu*MX|)&x7{SkEHK;x!0ImB4BtUvC-yxbL1YHVRb1ya%)-j1Oq8KB(IU|}oyUGI# zV3(oieTo6#003_ah%#5vrM`+Z(LAu|NyrsI72xid2SywJlaw_;p0M0&{M!No_b))? zY(C@q3hUW+UK?F0w+}*(Lzb=u3HS>P8bA_)?je3bn*y+&Rr4{~_wWWtDgLVn!@s>A z24vsDtJ(Lav~i&;!y1XnzW+f~#XlhXJ_q37BMU|6^TmkBh9Q}L8+6s5vCjtAUW3P! z<$fZ6TFt01iPUnTd~kLA%=q&#q$_&l$3AQgX7kt0ZPd^Y`qIMJ*k`~nhpzn2|Nr}J4KAZcmaJGMA zwJ@gXUsB^)TKtk#FW>0`8a5lK@c_4IfIDGp5Nj~5`WvNRbz?_F=SN)|>zA0A? z6v{EKn$gJaS5$C~QvL}%uD`=ocdl}_L!rx);*|8Lc}Rf#V-14%S7flLiO9c_e*m+& zIeDa*2@6b(XX8D9uO=*PHx)QqVYKld#dY`t5-C6%Lw}EL1a8q_JT=BsZ;HxBHNb3g z6*CvOJ-xw#BhVWJZWv;6>VJ|{=$|Wp!?n=&1HMzJgZ*?B8pV;lrW>;0v)EG}q zzo~A$g$$sLzo#1$31FWkGW<#P?>R@QA(brL_t{bX442bfUTwv>g9*2O)R>TBUE%(9lJpkS{Dsk!@3IZF?~U@4tF0^)ubx=I6KmfL0{H zqEuVks_Q76-KL8T%_Tv@LLwmwernRT9PnX?HGp{ru)hlb&CP9ebDRDPZ;ehSlnBEH zi{Y)=3I>$4yxVOz4OT9gQN= z>J}X=vg&YcZ8-W-0Qd8tBzkBBLc1OYaJdVD0sdEqzoB42VOj`Eex_~*x`_Y-Cnk}> zfS_%ZffFErOjT9&A1@VN_&`E4yp*4|#LFw{UWf3qY{B_&B=2u3jPP~xDH5~(l*cSmNYFWv9YU+n8#nrn76 zTAGb?T%2Cowq?uG(iYSo58jsR7qjl)`CfsI4-xS0eAtVO#}c~*5AC+!MpT(0eii5P zW2WfQ4xhklXPk)-hsoR)+UMy&HIR7>+IOE*DYMC% z_Tga-3nMOzB2&OGHoeBf%i$$-(DkmL+(b8xsewvmdcMy6vi+R~d`Yja8y#y+FI4mA z(yB{;eQ#y+vmi(RM4Ity^qMakh{EKe=JRVr^`8-CS2o%fg%m{TCYt^9@6Tu#2k3 zp{$4OBh!~|El?EPeY5}0Mb%iNhf^0M=WkdQ>^M$L1Jje0oFC2MqI5gt_BiSlcZz)t zG_NnH8hQC`$8oukO8T=ccs`{eDulVMI{kfKu_e20-o1%=^uj>#Zby*lG|Y>Viy;m- z`)bvVf;atp^WXX2-vj0m3G+3v0$OD9OlvE89&$KT&^ z&rPDuCC@6mbHbM4GP`f9RotWx5y>3>RPDAS8E0Saq8v7vTsQ}lEIh4YcT75k{Vd)M zc*N^TMl{T@9F90Kk zKE^$fM9OEo(@4B4bhQx7E_T|1i=9&H({q9<9k!Kvs(@$w2?0~M~I(^ZBodU&^Zwv;{J%{CM3S4|q%;Ng9o zA52^Fq?>4%^(h+`iAdV~oCVL6U!A>N%W3Yx(yjB67S3C`qbBv$xY+MWF&{YOuAohxtytw7jFPHQ;zlG4_&mthP#Y1B)9(++C-)rpK%#OFV3xr+iSyZ^zLq zNm$nAM%umcShr+ZPEiqM%?^$_A}iGwO&1%47ZIiEON*IH^F5>aNX4a@p6R8<21g|G z(qvMo7iIp!BxOFbWyoP+yl-h1N$EIW3sYb0>cmc6`~>`-KpCF%VkRXej52@MqUzYv z;-`t>X5ocVN=IaIq(?809+z=sVt+ePcu@ba`HM*{9U53tSRU8la7Uo(4dWaSmU$BI zxYJ2nTWdy#3BBWzx}@?w@$!@Ixn(2CwnMm zC7(p9MBmMQN3HINBr|^6N5J)9f62Xr9ncUFyhK^^qdmts@30HpyLl!Dd7X3%<1PPF z$EY~HcZ&1-Ob!@Q)(zf5<+?rU$^Bd$DvCSmp^jWzcOs32t=NZq)yYhsDA{=W z=|g=ZS;R6FCb|!K$GMqtrM?gzoU+|L*3p3=Pfl$nvOj0Bhdg9p$didige_`E-F6xG zqi6j?^W8L6sIa^bieo``)^E}Kbc;^}dfL;}i5&OdbHCSC5vE#V>18jSDIVk~NOYRY zI+-?}vA&u*tRG7loaUp~HIQ(S^3a3pTAro{+ViGyMq1d<9HKeDUvPi)J$8|-*-)O> zSh8Cfoi3izr`qRDhzH1(tecpq?8B`xJ{*tZIrq=KK8(;+nT)p%yLd&VrwrfEF!MUJ zl$+g9}NKX76p{IFN0!+x2dx z-#B$Rs)MTZ|B;IQJ@+E+?G~Yn+AZVp^z_>!1N$d;@-AYT z@lf$)m%-S|rcCRK`1|YfD`-kV(L^2AFH(5yrLDNwdF3p*Yew~#Og})K922TOu|z4q zfAf~P=WCJE*dF;>)5yAK&=Mit-K_rU)sZD!TSQU^5BQmf9p~uqgz6~Sg8|EP?+wbN zc;$@`JTPEUwwrd5NlNckR2P1#K*enfp&Xd*#vMLF^+_Zn^}4wy{47$O)*_eNUS^xE zv<<)g*4vJxlTUo4k4---z?X4)Dsqwf*#XXbN+M{HjiN**Mr1SiLgkZE_w;Ezhov`z zlaTQR=H`+~tKz3t?7}+t9}O8?GtSGI6E=)tk(l-+Pz%UfQkWTYR^b z-|9XUacVaeo%e3>eUPp7Qm=A!?>^-&Go|+~-db08E`p;uRf##Zw`B_yhpqZe5=2lf zJyrSi1&;Et;}3N>3bd1&PKs-l?J|y})OU%@$nnUoiA_4B9KJO8>2XtbC~}5Hr}MzM zdsjt3SHvfCCJF)=qxQ;p_Paejb@9lv{f+lXMG{U&q~HuPnQ!-jvkbka#P$c#ejK=I zjTh`LMYYt*`C;-<(bM}yk#peMGXI=rK0=Mu_C-0QQ>|!>!zcNvJS=G(bf8CxpxICyQ zwj;gg;W?I!Oco|%T%)CjJqa~01a>G|b3C7jKSb?*fNrRvaxa!$u{Wbt0CmLy!2<;M z&WjL4k;*tfMX=(T7UyLDi1Uf5UYnU+gGw)$qVgb3DeXBj%ytGS18(u=)V;)KIaZOGoN)K6^tx zh+HMIbs#B&6!km{!AckMRhjIB`+N4wREBn)3z*l5jsiNSQ zykG01zCvG)?XIhYS+?hmavQ`=kDqAeIzApa#Cf8%vmv}$G*%^{R)XbHtPcK5(zNG; zZB3S(1Alo5?ke--**#FH9lI~CI1UNi=QPhVt1MaF_Q=rV;_kfbOcTI+!`)t(L5R|5aJIJ1<@> zUN%a;+Xr_6%6=HU?X16>vub$$PP`8lQJgo zA18!oI&IQ!H~N~X{&3iIt42OM>uWg$j=Of-9KKb7+JauZZc^e4Zu^d-J>usV<79np zkL~Z~sy73F@KKisuzY6^(*)^u?#X5hEuj4xS8s4DM^! zv)fY3-fC_qpmfhc$BK?qPOL+3V_Me=F##c;?RZzgT%F$L|PnM^b7yHZnJvR%d}Q5kKEd}8eXU+$$qX7;8gv>28k`#YG?+9FYe2OU zvq1FsQj6;}^Rfc9Zy`>VybmAL&?>-Er z^O@?~01 z(>QfG(~-^J7k6aSz|p`fk}YB{GAoL3A#i!uCw^Bv&h=f_anQ%BTGC9!-!03T_oKF+ClA*a^T7}nG1Pu~ZH-t~6mFH# zF5V*{q22c;QeO7?I$`N_dMQV zU!u9S=WyTIPor!tg9P?XQE zZq_Nlb#V~w2c2d+sAF4|bSLv<4f)9RA|5$~P+rpDj@ZH7Y_Y}zHKLg|)7A5dP3`v^ z?Rkk}yi#mBs|P16jRr|O``;3fsSb7vIeIp0a@SRbCG7p8;`0n<%3ds&Q1+`ZfQJQX&R%0J7eZ z_P#E=gxTp}XjA`M^O=P-e>uo?H~1Sfapja-C)W&=E4;9+~lY| zJz;0~R3E+T=NesvCQ)W<2RGWo-@`R$at;&=V3WmI(NJa^wJz|gC}`j$$++zD+i66qP~D_%7g9x~54Swc?sKKprP5J_+*S!-UQqmgDo+x?tG##(kCnrgaNjD$eN1}>OYuD zPZU3I#u#}dr8>tk<>2&t(LSb8u1^-+M}q=HCv?oEPsjxBZ~q)fExNVs+bu-l_UxP2 zNu*(+=6z8n`~d7Pz?G4g|a5-DjX#=_$(A7}a4OdkE#ltHCsrTyKe zo#Xnf^agmjPK^$R7JC>>d{FIGJ1cnbiQMrerDhUd*y2LP9fyKMF3lConOmw2pB!g;wFF+c6E#N3WxnM7ujh=RvW^j)Zk&+;3 zu(f`cU4xfMSRMnva|74xc zidONuX*hZ<-(mIvB z?;#iAZ04iqmf;TpgA3OKGbNcTH#c006-XF;@UuNi|V;br>6DKVKuIi9P zwNZ685T_7|D17ZmZ9`C}RvI|9?Wj|GE21gzl?T|k!19AXexu=(t)&29^v(*oncEv} zH>U5&qHB}npYBuPOR0jM&<&1kP2x_LD7?lTA{?5-D5kouLIc4IaBSNO56O++)8d9a z*!QMwjzp4XVj|*2VyIav`;uspwS9i6O_R;zE~U=hCMkT51nS0(eusqPJO!xP2HPIC z?+jh6NW7lbHq70VIJBSs_0#h$)?yvufA748B9c4Un=wQNzz zZ!F330B5NYUF2=;2ot+yP>IK@t@Ej4fGqL(h=emtq#@r8OPZf;Hn&>ysPkZG@|dOw zkT~N+VMm=D(|Q*9aIbRjR|O8zZZdL8tKoziP98UQ8Ty@gqQS*R*1?6X+rzFS5u>I< z3eYNp{Eh*J(O`r5JXeXk^w$uSohpN}OhgUsCd$$L+*f3{XCaQ#1WFwbj_LGH$Qdt~ z!J%;P`)<DFV=8qa#Va@a~AC{8f20QtBagd39}a zL?B*L5+2orGqIPa&DvVoUrabOfTVTzns5qjyFu60u?-2Y*z!36!|`}5MMMEHL?>ZO zB8l-I+}>=HUnzWj&M{Rb>m~f%;+^3=W44HMIzgJ-74s+M`v9RS49?NSUhd0&*DYJo zI5!2CxUyH3vWJ1B>wF87MOE@8O?9vnA*Fni_M+mF~4O{2XUHv02=kr!tg7 zB^^LSrn+yduG6-9*Ohp=wkVv1;?uxx-jLpr^ti*VZZ?tYlb;#qTdrW( z9J7dm=9y(doi@Z@PE>IYa|}KH6eL%#4kW86ImM2I-50=mwo;J!ycgLaul$eVD`0C@ zWJa^~v}{pL7`#jp++ldC(C>2J2p2dPqMC3&bjRyc3SHYh71&1rAQ8s3G+9bZrPWxzDEIe| ze{2Q1ve$xBRBicN226WD=TSRezp*5w{Ji5qX{^HEYE*W}H80d#q?Kkyw|2E`Y0_8C z>DIkwo3QxCI4{C7Fqen+4g}P54w=i~R=-VEVDe4+UXU z@lY;L({Qg*&SE1c&88lvzm$3YHdXck?RH~lGh@Be#v(}#9J_0(Pk=XgR~9)ShCDeK zMh9cpy7pB0Ao2D91NPSsla>2}8f&Y<(>-?G$C22kSs?0?F8RI8Er_h{!>JYn&MNgO z3BT8gJsTjCfY>W_;BkJfR-DkYLl!fcPxns>G zI^eVwX+9-Eoi^V$#QFzpyfeO60BHlAN)`7nr`@IPQ_LiOKNS$X)VA<$ViNE+d!j~E z6|ceXR4jk4Fgp&bbZ(8IYO!)S_hqi*;UnG|2Y`?X)E_iSaJHW7yLG%92UVlMdnq3< zPfI)jA~Iq%qN6|-!j;Q>!E7#O#K5v*ESs?8&a~KG>5o-Fnty}T%gDm;{%8Gk@g&*n zRT}2I_?-&EU4}To36B+CG{4cN)w*+Q7Qf`%$-c?%$sx&ilLL}HQSP>lwoN2Bh@aSK zB=Byi=603pNsb`Vo$*-?N`0Z(X^nA>D#G_}en1{5_A4+q8cgiH)Mu=2;d5)v(@SrY z{_g5yw9_KN#6m%KBZ0jUn%h}(6F-=oWH+4gaJZ$@loiigEyzu#n&<9yx=PYantfzA zwDjiZ6ZMA8IqS0l`p$DNqMzFlx2Gr2P#%1y*I3?yYiS`X$r zlMkBv%{2{B2JTGh-axXH{CfzZA5>IZFM79` zuZpj^jJ`-#dB1AshoVv{QF{2Y$nC9n|3vBL%hIwA_a6vw-5TC`(TcQPSXU=kC)ZFCgQqXL(I!YqjtWY76=PPo2Eli^}SAG_CXbz z23qqc5@%Fqh+ma)l`kA=p)NJsa}!rp`lHnHL3OI#YJJJ)yC+Dc*v|rA%k@d=&0-cw z?#|XHeq^epUAos6IiO^!cpqO~gFSROxM*;#cs@l9ugch>_1>Pt{@^Wgh(<>S_KR#9 zP>|12PA%i9J*LNmsoa59pl?BDjQXVqOmYs%7nrzMZ_Pd2UpO6~=d5 zcOHJ$pnKuF>L;3GB?;Zv z@MwVhy(Dr>1#JARh^*#L9CvFRuld$i4=V=YUC)g2d~EW!jHzfD@K0n~+fMk7v6)i5 z{}6M7oMhg%_2jK$`>Q%%DiHg|W4G=shBjt3+;WLM>ZiAVuXIm%%br*#o7ZoaWZpcK z_SDR0-DmOG7vC>Mk98kkZe-=GT z4;fm;9^|g|8XKD z38fHCAqi=tRBDirmMJ0Hsn9ywQ_ai?6>U?ZMaw8Hwl>1sL^l$7_xmRC*s7Q~wkYb~)LCAVRsXnv!eWpAbpP2vQ9nByc zPzCm)$|hDL?^4r2bt06F)5gTY#a0{XnXzpAOi=B}^>#C_=u@d31-ITeJr%nG_~eC@Bwypm zFuzEsZlgE4vtM^3uiUO7^y5`e4K{@5c@o;nbLkmptH7pU#3NMRcJYM5=C#XDtTlTk zWw*}4lu9o0wquX|NsaDVe%ngRDb+^EG0NL{tylzT-*Za!)J{Lj6GB>Z-|n5lyT>iY zp})MN5Y?%Y}4DaZT!-TTK|HFyS^sr2hL6L89d%r0_X*W zm7^k!*L#0Vmgt8DFXA!l95Y@dpD$=1UTMCFomHv~-l4Oo&ul}uTWM+L>D`KVD_8hE zV3(8HIR1ig?tPtt_;1Ocz97M`*8m0r{FEoX7P^|AsP$KqJahMU(2elEk>^Eb#}dN( z5(|Tk2YCIT4R24Cgyw|ApZM6PSS5$ZsS_lW_SM=^*e0c8p15`2Xl!;rSKk&FzbD!l zdSzp{iM`Uf4sUEp04Ie#?n5Geu|BtKD8Jbc_GiDL`s& z5kQDte{6Et;inW(xeAMq#Lo1A!jwJ@G^K}1G4;kXd3JVU=ZI~Lpq{H_f^nGo*9R6!B{^24qDvmn-ieggpis(8`ni^XQEFD?G;6p!i!k%U&)LGTD|=S(?p0=6$#JX90W zZoFzL*

bHuVr9_x)E6y~1rx$hwfVfVP~o>3aPi;ynZPQ)={xQsi^0g288t$wR$o zb!f5yl-Q?^8PS*-3YuJp99vG*^LYANDHhO%K0eChGWd@fvLKb6GqnFMS%1^X01o{5 zj#NXsT4b2zX@+Re(UPbe6r8vHtKakg&gxa_7zU0LnpyM&+WISylosc5aG?P z^;4OaSN9*Ypod`9sN|*gKP8+dfoQnFv|Q};gC}2yWPCHf6Ocw65bkV`Z|o4RT%DDB zsR~dHa-XR_i@X%oZydbXe5yY<9|*vV{VJ19TY&gwLTc5I`N!1rE@!ngA;2kBF^1jG zV|Cdy?qpekXTbR$!C%#!=T|lV>`kxvI7$CL!Jni0rCg1)6hs?X}hw#|8fTq zdEJoc%>^`q7!xlk*`HEzgQyZm@udNO2;Akuw!7}+TE3jCpep`$Tf?Hw&-&YdxJ&+A z=yBP1a`i8FBx|j%+poRXL!$a+n3cin?5t{ur#;ofzpA*?xnG$4=1j$lN&1^QW-4AR z1ymf~X$F`iVZC8i?us`;;>+a1PS4Wv%XSS$M~Of%`n4f7gT4EWxt{0NZ(Ve+A@$36 zliBeM%Y#>Nnsv4t-<-L*@A#zfN%B>4;iv$ToWdZ{;3F|kp=a*M?Czcwy4erH@_Txncx3|1=dyt!rd zDt=gRseAv&nnB>9PF9$lV zAD}tc&E`Rmo$(ENUUD!$$F*A_>Fev28iXU( z8$b71!sWJv%XtZx{Sq$d5-!Ve=$WVuzRfX7VOzpnwuGJA5_Vuq*oG}()0@K@+%Mjc zv3_lzCVM0;$0Pck2Z!|W1M&f<)6S=aEDO_SKlj$LRA{4vPh_pqjoe#74V#Pi+oqe7 zb_iqMn~icFB*fhaycgN~sPggZHtBW5t1j19f;28I5fA4mGL=rP%B=GUeY@t$ZmFeV zZ`V+le;76rur~8LgpgGF?e(g~J7#`1p7|0Uc3*IXnb(HicWaDGRvkVNaqoSgpeb<} zObN9zuA}7!(Fjiu*omTdAgCxTZ8VFPPw56zVcWsf>3$S~K!Sozmj-8ujQ2IIJezpw zRx)I})Y9kj;euS_syD42qqa2mAJRKNCY_yIUvpvd(4qF^=_wH+(OXTGSZsjs;y zd3Y6m$BNVo*99UA-oRPwe7Du7u?_?~2qktk_2QR)n0l?bB|;z*432I(928YuB(Bu3 z`1!_*;8g9SZvr~r-Y31yN0mqIty~wB2_z*co1rM8nIUJ5G)KB8Z)Q;DPXn1M$r~?H z1@;bHj+a+@Hd1QpwdTt+n$}H+=t8u@jU=2BrvxQ?}+Ub+MS&cx4n(tmNsU8=)J#`;k{C%o5p0Dzby$V=uWEM?AO`Wq9}Fhc}`c|(Pbfsc%$ zJ)&tI9Mt0nNP$GeiDw~6wL4CZ^J*0cha9%P^BF48-Yu)2-Po51enm+r&(K$}D~LaJ z%ognB^8DSgox2YlIbXc?%_g9c`f2L>X!;b`r#axK zN%qrR<*&KfKh;EYv-RCCk9%5@H^&~cc!%LIjE0omMDF{rt@}$$L;X*h&+E{!CHipUYd-!t&F&YjQFVZMjg0E zZKGeqmL{KOkK2tNx9dG_fAqMG@wolL<93zD?RUZnJT^Bk+AmRvSi)x&plJm_ODTV6 zoEdu-8~X0M(bIM{gziuEa+FYZ_^}@JnF|k}qF(1(d-jDMvgS8!l|F(ceY!gNmh`#n zS{_fGQ=;X%*Y3Y%cEXH**zAovf4Pm{7C~*}M)CC$HaE1}-|V#K-G$=R`XGslSXDWd zvv-BijXQg6&=?`lS3O6wuGOamtc&1ljflK{pqb0S?S$28!H5BkhL_@@N_yuz2+Ot5 zMxAz7cJD=nfo=|E?y6qjqoil6DE=Qd>Z`lsYkkH!@R6KWR~3sJZ%Quy#J>+qC}GKe zOE6*I;`*k)^0X&0;{#zg`52gZ^}geKRo+Vp(vo`Fwbsi=dF-Vn2nDN6+>Yx_P8-uSV^48=uYD{V-6F0ydk<{8SdidKRyvm`p?T0~FXbCOmp!lB=+>vQR{puBK!&EjA{#fjwMm0EU5Ry;f{q3iiV~IF zUzBrEGPE6Vv9z&<;wCX-kK1a;nncG$LI;6*>_mM6oeBlgPMlI z2P#dlRpo^T5s>bZkvQ%5pig-*@sWbm?UrXrg1E?u7Eg3 zMkaZZ4?qz`-n_h72V4!OvgP+hnYbI3zzs&q!OOD_Y2blyj@8n63i%*0z^jOU53zH5XGNGR5$^3s1D6y`MOg zJ#S)SP}Qt}Kj2|K->V+phUu=3bJN7(s^e2W#y#ScbUda8q6$uuIh>wMNkw!p1$-)m{<*8InloKz3l_aW%qe3b)Q|!KZm)f?z>;KE*-JYwu~6 zD1aF@7q>1M4PCdysz6iPozRsm;XG-@cKljf}imLX`GRh1|4fD?t!fwSIX80E01 zrAP9hah&<>=;-#5C~c(rK4hq&uB$mNK0Y+0ZIr+PRXHI2A^j+3ox18i(U}6JRwLH` zwqoaw`Uc55w|ICSEfg zYN4FVhRSk4F1ruE+iN`8170crv^Dm`wZ z1qGrl$t_*CDKawNCRonFlIp@OP0mUr_!aP~!SWc&J}PS=HPOgxQfwr&V^neVV0{cl zIvwjhSzfK!+O(JGa-H;&YTWro zq3b9rNtJ-P25CNqxO~OV4UUB7B-*QmS|d4RNwDu>1Hg}_s;tRgp$`ytkV%|>xU^SO zn1#tR{~T$mY$-ar>of6yYxC*?g-@AVa!V;&Uh`UB#@+8XseJkZoG&&KZG-|5@Go13 z>N@YaHcZ+ZBm<__M-2IA>)RlpU+z9MRuFfD!uKU%r(qzZ4bXs9Tq4zv_i8 z@*Nl%iqNGZ6<&F(C{g_hGM}+w2$SCn$ZSGlQh#n*KhfkM!N^Ueo(z&V5~d|imCm%` zThp+jhGg{k5WYf>oGy~8f2jj<^~Ps zFB4cJcm_=5uXSTtpIz)A#MFqT9Jv4XNox61yy) zvq6PuWNfDH73p zKUq5W-k&mQ?)%g#(_1pBmvwRU2>e;|vE6(9NY)*Sx&&|N2c)OGvr}{KT@0|rs{2Zd zHl<&o7bZvQ_rv@uO&-FmMh8RfOw#>7NFQt7VEwf)xXmWr+&5FA2|0SyZE%?Zupf9Z zy(;VcKwK6q!Jv~6?PKtU_O2L1ae6^Xze-Wn;DnxfKUL9xa;Q)Tit%rh_99^qg1l~) zdDKTG0M8PFfutjhUXAgq=7lT2bl@PQ zSvnqh-(!b%(ai#A*++vLQ({+40T?nupAQ>tF2+3dO1am@GgJ?iZkE*WogPU?yH7xd zvij2&_l%BFYU_~Ix-hN{^-&Va5~>_Sj~-SP=*7ubGG~{?+EO%|>i-lPlW> zH@1Ui7*%8I%?564o166$Ll`K1!qC;QoPJaN&pVIe!N?(JKRPz-VeVM)p zGe)Y_kg_v@10EeOiY_B7mIY%oR2|+8r@=A^Fj(Qc3&Jp6=gCTrTQ>a~p(EomcgEZf zwp00fETP^mdf6nidQo&bxn@kYQtXFz%580U2cIA?@3IKY~VAo z@=KE_D+3DdulyyFo~E&r^80zFWY(wDwY}S4R{mM%G9ue08f{oj2mR!-o;;A#e*U@w z(;JGV<+)Th(whEey%uScgyoS=+W=fBYU1ha;v~C3H1uwr=e?+V%Um$QGmPh=^DsR8 z;w^)X7fo*Y3j(IyFjG+M^a{&d!-rDvukXybX3sI2_QCPU+sm0o3Q6+Y6gdtbaX;AB z)e~b=uIN50l)A@VCLQWkw?4$AM3#0~h`Ch@9l4WE+LmjcLENlg!^0NgKe_h^%Qj@Pt#-X()pP|B-;)O=UnEOd;^ zgpbj%P5&fk3Y>69Oh-{{AoOFo6sd6fz&OzJxHL8Mt<-JtPNa1Aj~mFiv0b%lF}F>0 zghjs}9V55;XWP$wFQqh`Y0ly6vhmB47%I#DRsh*{Y3Q~1+ammghb)yoZ<;cZvFaI8 zmosX0LOMmY#o6mmmtx7h*KOD#;AQWfJ^TBH%FcvN;Rt@v69;p3JS4`--ts9y)e0m! z%l!D1s8H(l9GN#)9fr@kSA60NhN=}x5X!z5j<G^d`@K15?Rvar4Tk4p*Nena(W$1(fKeN&d;xs`a85Aid*`=mlWA8GS#}2p2U}N)HkDwgV-tkQqXxOM(zAdIH2f0#aK&w% zX|`bL>PhF_-&u0jq{mybF+9#DEub#k{en!hWMIc2r=cEsTPJ!jVmV1z7GaAX+;8n; z6is_Qo(Lyyn#fI9v37JEq zd!w>4srxw5j;^8a0dg+)ewhJO>xu|}^o4p`Z0uDlA9Im}co(_y5!h0s`sCFC7wevU zbLWRCS(0Vxd>9+GJc+??h2t&hm=NIlpf0$z5v_ue8Pk%v&3k&lJl8Y@QBU34nK<|mBX+ON zU~+uhc*l<6z4A%@*jr{UE_%*HWsLlLe)g;>VT?+`lrTSuT8bvz7zsa%ouI`b<%AxzmVujY3OQh^XDAxN|zkq=XWw`@V_AA)w%&FAhRzdI+i+JhzQX;XpmM< zt&X1(PC*u=zo(AWb*u+nQm7kzIEIJ>H@2=P;YKGBb|dTA^Zc+pLr~rPcLUZPlL=<7 za@(9US9WRi%W3#ZC-oor+KU5DRlWnO@m;??+kumA@mV*;TKi3!9Qi>g|- zmYg@wBv4t?ouk%XyRqut2&vLf*Ie*^jZ$7!VTvYXKZ4Y<>aasyV%lmCc5_`(dm!Oa zwsg~%!ts`+H6e$(wp8>ygs{{{zuWI&MR8z}30?>6Haf`7)%)h_p5G4nvqJk?8IN?K zYM14bZ2E4(^-G_#V%S=0RldL4pB?(+KK!;^C-hkSodtr6GWhJ&1xUhCMO(t>T#s)j z`=LT>feOWcU~Ad_H!Ea*Rb8NYRaB9`@87GC6v>ihBgL6ThKp|M@1Dq9Z1nA^35--$ z>M5a+y+aC9iDREjlN8i)3-5Q{mv?F zvY8Jkak`%y5z#rUO*ZjCB~15l(_90PEb)Owf^8mZEcN;1n*AfHI|ibPM%`Kb+4k)K zT*ze3g^^nkhnm)1$zKw_H2K2Bevh~L@*djwzh^S80ZW$fYtAf*z4NV2by(3h8y0ib z2cxS^*JbZ$s9!2MKD1Qh!%vN2UZ&rERXsI@&Gd6CTV$;8ylgYGGcubkPSm4JK2W9o zzOfNk#oIit1Im#3Izrjf?;6YgmxVh5!<~h%`b5v;NzGRMVCRm&%%z)#5AE=e)H_BbqJOl0-m+O9F@Jafd)6}q zAO5xez$irdr*$yPJZSm(!efM6n4`qHOobppIOXCkXyUYu4_0lI!VOj%Z5Dyclmg79 zgc}jr3DG8B^FgbP0?Z|<6Z(_xp!I-z-GNs!ZY{z!H2so3)%v2Ux>kfJw zTI%XDkG|(m@w{RGw~lFUh2QxGQ6!&9IDSFc{;`CEQGgO#6pF~p6&`bVr5FUaLAq_# zCcFA9(9aLIS5qfaL;&U@9Rw$2?SEEi$Kfv5xu;r$s8hubnmU@mMD(vQ)c0W@Gi3Nh z$i?uGVVQ^6-r?KsikQ2mI@iU2=u{wQG=1<7*Rd6w)uj>vadCX@We<%HXxD3c*?_Dg;lV#2*=kk~_#>V>aV%J>gs%iNp?{;a z@Ne}`MroC+Sd0u9?&n-Mogbx_e5UmBgIdHS>R&^aKau_a3q(Cd>>E+HhM3+mLT~PD z7AcJAl+ktvmvU;8oqPbjkt9MDF9q^L7;Z##rPaFE?!oqwQ>Pcdxcu>m-d+5_+Tq(x>)BiHnXpXi3cl6fYd zzR}MFRPjG6mBA=w0Z6biCW84X7uHVe9xyy>tx`YmrqJisa?O)NF$dNPuoVwaktR+n z-wF3T`rvdS`o1-4$iA@`e0}4`GRea0j-Q>p*5^Meie>R#xo21E+zQLvR{9yR@}N8- zSLX8!)USN|dGL^q11rz^bEl29Je22LXkP+lElXzctvaN^YREom$$Dwr>A~*Y`Bddg zy+=HfkuEN{T`>eQ-N*(8ckl|6$8H)$ zjr4QD?Tew1=~gy0xPw!eJbDuxHPXXHwJSD)OgFP3XzW;?25xSbBF-Tfqc|FF(^DfN zhx^nko`&_5k|`>=q**3t$*xr7?m1eGURC$@q@sp1fRUiKKbnrRY@XJeF4FTzds@^f z6^KC>*I%dTdNk&5>GesT-;?~VPNN$u9v4}@geMhQwXJqg)|uCnoY`4%%HDlL>N$yxmGkY%RRKdF0{L>giE7uxv-7 zFnQo63N_-(1;19DqA@+ehL-Kf5+)Db#G*#Lxu`D1D2?fHHiT?PiZFTbCYt66Ww%IQuM5x9df+q_C1QSYBL{ zuU>E9p^TmfQ2gXx_>>W*fBmvK{1*^4@yEwDXKEhkUkL`9BZxZqC3RgmdYHuS*`9bq!@CN^@UnG5b*JPesGVM843fC!Tb zH_?$J^;}e^Vl1sVi&dJHm4D=hd>bzgQONZ8|ImZ~UqIAV?UlZ(^fI z^0?rLVvxpk7aKyZqe__EeG?r$lEp=(@)nAW7}JOV$7v79QYKPpSN%Vxke5+MzfgHJ zb!1Q`h>OYOfA89vO#VLxvHu081;nmhmDrm z3}OEZ!1~W?f-yx?M${c+L$}Yz(bDNUA{EQ%iHmx*7zCNduptyX#DvKcH_=feQ|J+E5B0+y%K>sT1&|xdXK^wr7a5gFZ~m{M{-m8UrTIU>ivNzs zW4;l3C(;hPB4iu5eW5|DXsXE0k>5ZqqlG7EiT`MrcVZ_`Azt*6vuHFL2}PsOC<8Py zf|^1jA&4JH-sQBE${_HiVFbA!(b4_t4ofILE3QyzP*en};;i~aucqZrX9zwsE>kE; zRK!~4vg$6qnua^YA^42AWFc!&5la;v)hD_{H=Kn9ZNO-F*bRrV#CrQ8!`36Cru5^w>G~P% z?L&qW&d$3w-)^Jk%xN_(sFhDHPkX2@(L}m%{d{if+i7O3;jn(ab}e5-Y_jqc-CQ0F zF;@(XZm!n9Z!R}2nnT+NZL0reo;S4;oG-cy-$9B&o&<#|iokS<&+yl9zBQroDJP9W z3q@dh#AG}S=Us!0N1X(R!bK>$#3Z~MZdgdUTUnR0t%=*wKR$(ejDi8N_b1KW3w|_M z+@tuXkHTWx8n_)rW5swU%Kcn-FVw$8EO5JaB|MUmRyJ_!tyCVo)mJ=U7yVW_z$pf( zg^7oyo-5bKrxiQJ?P!e>ck-F$L0t3rL7)_(MyGZy@OMZgOh zC@_dt{UpIoOFlL?bso6##A(?XE4tUeF(=R!ZnaAG-Or-|8k6&$AKa(tDl z(cQv5urtJ5ygIJA#yNgi6?_-IhjN;jgIC4X*FfX3st7TWU1BwtsC58Zk=!R_`k)M` zlSp5aqS0Q91-LRtZ!HB0j>~;(}`uh|uu@71c9%cw!GQH`qNYPig{Kt6{08L8&FlZW9 zrc|QMq!3fpFey&hG`#m=O?f=zBq~I4H_VV2i#NkPt*MWPp2UU}?uHo=WAG-p#G0yj zqm$?m_-=|J(M?6`T9EX3)(jhXiq@h%XGrJE#HPQZ{$D!Zf1o!3OpZ~|G=V;lX1_i6 z&NlW~y{+dT?GWLSs2b0vd8RLaBmmJ=c~nl#;w~O!bDpg3kKL^0cKFH8$FXrfcXpke zSK)qaNYs>~kLySlw&5*}lxQM_#b3odR7c7vG~yjFFVw4K3L5Zsn5XI~G6juzCrqCD zunepLZ;MG(N6Ek%@s5}*bzoJg27J8{t%Pd7LHQlOE5YA&MCN#{Vck04Zmqap~g-kdxNO?VefusTFWp&9Rv@l_X-DQLpGVj|R`G6l_e zIL2EYBm-;0U&Dl|8_B?$@h}WheSOAiLOo*jL%?64Xf1>@(_>~E%nUv-o6(OgpK(SZ z?db!dUxd@hn4EAi*J$V>7kdT+B3JF#Bq%-z#kr<7IZRnV?| zKHkQ?->uhCE8tOqz(P*3UPxW5^1YjO?LbVuvTW?+_4(I=UgdqtqVmJ)S}(i}dAn~l zvCsELzT9;Ucg8@z4BadScbP_+bp-|*<+2un{QeSk9MW^Cu(#ueGE!Qh4R4CUs8>lV zVDT3*mFg+d1#S3Cm}d21=>jbN0;XIYB@JuCn_=qJvC=Rs-b7nDNhvd&Wxd-+Bo%@H9<-YvZuKBpv35gNW z)~$`q2b^f(G3Co`_h3EJbDjvGx7j)=B# z&BPHBcq0sLTr+SJ2{I9FHm+GXN&;tuq75+}H=ZCCQD{TV#E}v}5xXq5Jby>lnbmk{ zPE3uLsqy}K&WwQ?@6Ns|G^Okk6${=HK}hh9SP0`qQ;DESR0*B&Rzho02z#dYGQIbI z;=OzNhQHGqdSZ`9@Izgn<8TR=Bch?MX}InLod`py>kHgqf^$S0l$eU^N`OQtLW$3D z{Rz;BLMSoqacrF+jaYSIR^=UL(gr4N_>068Luo_T@3euYkH3QHQin(@wBoHWn3Gq=pxeUYnprHps5iuMARtDH^2Cg5p+rJAQBoAqZnh5>U`pd1P}Y zjzis@oqA#(ZvA&C7CXl~|GK|ZWGDmOzm=T$Y z3<2Ct0RstS%1i>;HMMu%Sq!+%mjp8QYXZ5FnLuVHkiSx%A4fXU1Djuwpznt2{qcZb z{xZvW5wzErsQokJeLn!>edj$#$bNRbug$CyjAbgpOeOe#q6CAK70AsXtIxElnJI1y z(19r}codBcp2U7l!j+(zw1G(*zSDkxp6bFlE(Oqrsqbh*_Cjd`jXWhjs|7nVr&=(l zTKvUyVaBPU!2Haf@8Y$+e_v~$bupE)zp0e{09*e`iHjleCy;~#Q%$946Elg7-j3LL z5BDYJ&__Q2NjRBV;APHn`-VD761S*K^PdiFf%d!I4AGCXJ=xn=o8}` zFH!Tffcd;x*hdIC=8WE1md7}9#}J_Uw@q^f7;igcNdxEKTqK2=pkO8_{#<7JelV({ zuj@2pao3xvll?<H8RlQ7=v;H>mtkhyh%v_W0l=ybl;2g}5(cQeVoa%lDK&f} z{eLVlE(`z|?*wC!_y2TixQ1qTvFC(?&~culS+BM>9@W}&F}lZ=#%|83c{uvP9Ze(! zDsr=#%jSpSG)!XrwX6CrvB5Z_0K|Cs_bJHa`i0KN_-2Tr z-5HdT9;Z=p4R2)>S{5=NgECQ1OQmh5&&M!?KjbIBV~&4dj(_;`z>J~eAHd%YYJa&< z(0hG}j99DhlMzkUZ+2~U=30GUW1TTu7WyE@C%tcbak-YzBRbC2Mc+&r9y`8C+!%0)b%A)Nt86o4K z6T?U4AKe?|ZdpHkY-3K>#>8LCVT?mohRj?5-c&fVatUlk3syKc|95PHWxi;^!!t{% zQjb%ZZ}$6&Cro($MIM=PM)@|2^8@`Yn+#a14>Z9Xx$`ZAVchUQ=E$92kKCD=#fhZ9 zFY6)jzO4DKzK-jeeP34V%=@xv%vqej%SenHq{5uV`4`KbF_1Jcmpl7P7a6D6GiJK^ zzYM+U@5`E5?(89b4eQ>Qe|zZ%a36EIv;X&Fx<3wd{3oVm=n3TDcjWrx^jC8;V5vSt zEi-}4B)mT^05H3XWFd6s)y{t*4k}=OpELcRmY$>s69Dph&n&IpOMlBI0~Sd|y7n>` zjG7g885dPEX1X~;#>@P3MsH4O)s~&i`uUPC3fzGg^`Ua&9F5-(KLC#(c}>@99uxy!N{-z74x!oKfhh zVH$mbU&fIJ2y?2%*I};A)bKAPGsYR^>vCs|BMtwjmpl7WD`2LEzf%8iNt^XTj57*- z9W(kXEoM{0`hPN>j8=KOp#PlXQ7vxD_O6P+bH)3hSBR_*!D|I%WoTkm#j78sLF`U= z51nCk>s#7ySL3as6PzsEs+Jq&AcO0Qg9Ix=a#473TxFckCT}Y#TH{WO!I;ZvEyRHZ zuU?YwvndlB5nIRan!9u1P=8jdWYSH$wn+)X`!~kH?XqZqLw$7JdU3G}r~A6f9L>Y( zT9%v&26q>(G(LTFfm9#@SU1tvZsC&8`u$dD8RaAeyo1)lWACI`ufeH=M;YGHd*3X4 zzWJHjR7x9n#$+`{dEqbmnQ<03vA)q1U>-d+9s2o3w8BOQ2^=AgH`q|abw6$*PA0fb z!&L@HiK|or?J!W!jdqa2In}hrA%hjwi3f4;nvyuN;9VA*pT8qten`J5$}t5eriH(b zon$u0AN#FYjhJ!GamuhZ*a$#svN`tcas@ZZ-itNkDq=edBJmbA{VLEM1yOjL8j?zA zu%cS-eFp{HrJBLGJQa{I>^}Zl4JFQ7#c0Qw+5@H$gsNk7j3N2Eb}l>{#{|6ZdgE{D zfPWg`{r}%PDyRWj=?r>L?Y6sb>Npa9VIPfV)NBDau3A0NSriRw@Ll3|%{XQCz=TJE zY--l>$)Tb)P(!x|>_F<%C3%Xe5liwEQuCIOT#Qkx2gW^GK@BAyFxk{Z2y!H43$1c6 z3qhq$4w6dihmB}t-bIUOv_t6VN+{&w`iZtI69?-AKg ztrci8Shq2y=}8|V1u8yTU~cE&VhlTPyP=by7&-l^k1$M0AmzdcW3Kj&2csP$%KHg0 z1(YKwi?e=wX#B?8%Lqphx*reO4|m@{WUr~%QYL++t<8jl@>_d@1b;ncf%oL$(hf?#?ti92E*0*jYS<{>}tlIrO&P&_{<`; z;_jQFfeYO%OpWS{s{ z*;Mmz3GZ$9#&a`g6XW}GHZzl%vlUwHQIOLNdU)$S>A7t^VvoZ9v6=tq34QtWJvy@o z{q+8`r%(HG`en1{N&U;OSF2E0Tm!{!0LR+gs|bDhr7jzRi_%X?|GHjQw<}-l;g^$3 z>e4IOVSiN>Vu~{locWo4+z0w`Z08B4v9pgAb0nKGI_;*?{f%5}12DKxCVa9_+m^^uSq8#S&so%@E! z>@x2hFW=V;Nn8qz&{=&d_hw+=2~K&;v%5mO1cOg@i^uz}V0+}?xarNhdx5In(bwg* z_GqzH;5A;QLF(78dyX^Tse1Z){5IPoF}vB=>H{{DnlvBWyz>A8OY}|_+TN>ecBP5z zAR)LI1rG_+p}Sn;$WceE`YWW_sj&Y?-y|%fv#-qdMG@BRDa; zb-?vvAO>72z4woJDLNW#kMUi((cr$1<+j_CJUi8-@Q?equ^F7LC`wed_1_-TzjEU= zerO+1X(d!Nz3xh=+{wGu@t&(-eMIde^*oaJ$CjFG2Kp7fuM4tQ->d#e|BvqJBcZ&& zfBLo942&wO6O&bhnl3#M-{M@$ipt%4uX?=~OA5pw;$-hSB@abM*sd7MRjkC?{ZDT0 zmE`W#u7A8P_l@QQh{4m7y^>0c6%Agi>?9q0Qq-@lQ@1X+n*JXH)!vizLp?=fR5^e{ z&tx8DXWN`ml=$>UXo96k()Oz{z*S9z95P}Kp>jj+Rd;)_!1`RzDqRkzOaQl!IhlU{ zkU~P&Yc$?#iSq|loy|7DugxdZql=QbiM970-b|KlIfAm-X3> zq|wQFiG!8>1O1=V(9t^JzTkUzb(}pHoY+;BxNu?>-K7TsTO+K(VG_R($N3 z&U#vkN9*`zfe2KXFW9*?w7%zE0-C@{?`)PV(o|itlzY*#MJs^LM{rRY=g#N7yB9Bt ze8RS9Bk+rhm6$Ws&eHyhnVEyV*vyB-zP&EiR*}J2XoUEha;)$m;t-s(Z2KU~%EwQX zTXzj!crw}5n5Le3-P$zb$o@eDcH^e|w|P&qubOrTA%?S?TPL0bM0+~c^s)pUI2=^{ z_UdB@E0NH3AwxN6{ItC;pXf^b*3G%i2y$w_pF-Zr6`;k3^H|Qb$;g%koH?S!8*%JP z>fN$keI1zSRLf@%+^?S6uMzx-XZNoCo7i#;ip9-D!Vhey+Z97ukrtc4kIy?PJ#?g> zu$4b6{l+;l*W~T|$0}cKiwIW~3g7?!uHvO*9a>EX->kY!D}CH>=g|6$p3L)$vpw1a zo`+D)R`4qObR&hW_bAkj9Cv*lv!_o~U!T%b0@Ls4`rZ>7r$-E$@ zX38w6MeP}$BNHw>;B?*7p)vnn{vpJj`n2o9Y}(IHuD+1F3Go45E>vrHYuEGGJ=F@Y zhdGx{3glxsK2lVD-WwDgPnK-u-A#~r%$mM(-}x)3hY~%h6Khw4B1hknE?hwkOLxY` zSr39Eh*_Tsub&l?c>VmY6}a_*@5E~dBhQ0p_}`|!(e3fSfA;#pOBQRE*~gjoI`7=k z#Cv56cY$57ON6yd|8H9shc3AR=3n%MYRvGB$ks+1gT`wa9eN_QtPQc-pRidisqG^b zDoCx`_Wp2Z(V5o>67AewEBgRvsby2=J6`IKJulP=uE{#{3`-dc1=9%i(?~RRloL&A zHlkr62oj}=6HLQbB50#%_y;hh+1nZT8fr8F0l~+o#~}zJ$_P&BM|?(5kqAU4iZ+r5 zHsCyH03lO*rciLI%5lV6+Av5_0Zu08VX4C)_*65Pa$sVx>~V_Ij$GT%qy2fD9Y}8M z!ETz{>p^X!V$kjaSf9kfd##ES`w!lu9heyH@yms2G$)C8dQb5l3FbsS%*WHUyQB1um<*BX

BKhkt?%MI)9*;v zXvm!q#^Hvw(9@4yh;GGVgTt>2)6vU`t?;KtI<)E132L2KGOa7L&e0H^j;|c)78CWI zZl2Nx72ZtTQ`P$!IWhenZrgfbVtT@ta_;q%Hm4EwgUZU+0aVOuhC5u77^msbaCLAOsQzjRSRYO2V$~syHpxIc!Wts!qz$Qltv5^?fMJKAr_3 z2$3kYm1=?_+i!dd?96jdRU4d=5{iB*us_ZtJ#cl6(z1#b;Q~^o9?t?fo-3`cV7unJ z6}FAC0TGC+)IOZBYfL@du!rWDfQ1mOEzp+qx@N1RQLf=4+dWNX-~;6;$Vs=5%~k8c zZTes%F?h=O6|}PGs6OjsL5?_2hd_SGL&qwXh6}QrdRhf;u{)$uf#JgO;f}96oGS)l z#q~kfLQhV~rGS;G<5|8~fwkMcwg+pTBi=?7-mh+J2=z$#zvpo^!DoK)E;BD_BC&gmeF zQ%V*pTOJE@#0BjOx>R#SSB1}9cuQPxTq*wJad8{b1ap~XRBnxf&xV>jx=c{zSob>A zVna$x52=mZ1r8~~^6PIsu}Vc?=7F=EIgI6kPu4=1x&iSPhHqvy=U$kHwQLQ;2oxg~Jz(61vwZ zWWNerdgqAbiPa(kLUGq?1DDktkvqY;QDB?t^|yhn&yPq~tdzu6980W!bR+7c%!#FQ0+d@dozl^-()#LLt@%Uz$ytUB*6&)U3WxU5TUZotQrH5zw|`|WT zj=gR2F=?Vnnp(1@dAjFvu^xM~OXS@BggfYZj#pM4a4cs-nbKUl2*6U?1I}dCSptVS z1I~qFgNl+{7k1tLJapr5M(Vsn?B`fVuD;`3vxl8N8<5S^!>8Mp-1&mbK~8SjNYtI+8qxPv4lQwcG1lzxY=m&s=*8 zn$S+5quJcAEnY89hXLfY#{T(%z!}{X77P-cL83-uV~KFqUc7wF{(o|9exl=o$e*9uPdl&0j{DiSiIH=gX63qP)+jJY|9dP7l0EU|X-F{((IWvyoVoBH~Q#_BLmaa@#^U=CzuCSK=IH!*%9miJa={HB2<_@;9`I80!*gV^(a|TcCw}KvM)QtHXDl`GH&I<@ z-tB%Sp!{;PHy0dG&i`&_;%}qjnWnpNZ=NU}oWEc(YCIFwrOX@FXS#dWFER`J*7?WY zHc8&j&d<8gVD4ASJ|`qZ1molU?gpOqDaRIf#%W6*CKOtoIwS8nmrK$*qQu}6JI?h4LoO1e7)q$H)Kk(BNZ5fJHCT0oEn=>{nQ0TGa%p}QFxX1>vVUtiXJ z*VPri%kSIyL$7CN*zw`adCu=X_qoqGqE6_1FaMqme*0jvcLx=l7PN6?P%DrlqOY#W zo)M#)NCy%AkUf8AhaLsOyVLb%7Y{2oHR1|4R(6TU#|diM(N64hseUs<7cL=S+zTm8 zqfvUE=Wn^e=i5%t;(iAG+OF;@0Q{|?UmB4hcU8kI25I$^#1GEw-|0}lGr({DsN_f= ziCoFBmQ{r_n_b1l`_jQ-7SFUAg*Tmep64*)hkf?n|Aft_PhDM1#dSm{awz<#1-h#WRP^@`FG7Px{F~prhvWxEj0Vt<@o} z+H!79#qYJjpZ_w@P-LeIP;!KRn5RL6bL&% zo0i~{X%S2QkC>L>lWD)(y}sA9+nrF;M)#elY0=xA-Mb8~cAvX$z|97guxuBzxQBa-D*FPkuVLZpl?dP6p(+%9^Jgu;#7BhdZT zs-2qNkFo6Y!f`(tdY783Y-iU`(??Ikkf-uIE=R($&?LSIzpq z>7wWFMxY?OnHmuhY9%K?C5Dwj#*!M<8|w6d|C-okBQl!Q$f8iY4+5NGROnv423L#l z5c&Alyg<`bznmS16+14!H; z2O5D&5Pvs~LMG!w`a)O@w<=t{KNmK+v00K*tD_A)<6i z2Y58QY(LvfX};1~+Pxv`gl(Rs%r# zJ;Rc#tkpn}c2A3BBC9I^q}S6g31oEzf^_dq=Lm13>JB%(Iq+Fuj<{E)-baej9g?Dx4!A zABy}bRmhOtK=Z2*NXjH$bDD1~p{Y~Vd}~^IY=Ws%&3sc@bgYJ{Q}ujDT4^l6)Tws9 zAuTwT*L1&XzCA53w#Ib7X1*n@7E+TBQ6Fe}1L0+pa2K^9jM4fMTE2O4%vy)ktHHoMpY=_V zS+)RSbRue}qWSeS^4J73r;_=-G@MusGpFMDtu(e+fSFV2{81WuEU(#q(fno_U2Kin ze#!hn8c{5jInBoEXZNoph3wyNi^bc7@;!Vo;PZ`d0T%mz3E+cVyNNnE8{BDr)t``8 z8D!WqDJjj$GYT^4*_5PXtsVgx_bf`9vsRCS%z6$aiCA4nKt?^YlA5fpqaf3s9Z5b` z1%T=UAbp8Cb(Q(m+M1NAa%tdEm-CoxrC2IbXpG{5n6>P*NFo^P4lMs4@)3RWr2tGPZMnD#a52`vj`q1S|r(SG2V{Fials`PLU z5;kDB^<6OIn6(TXA&1Av{`#NeJ4ZL&Ttz;CpM%65>ENNCswj=R1Kd7Wr@`YL$#X#Rga`2W|K`S~D8 zui9D}VLzG3-**28&m`Dw{m2Razi6$*>7y+!AiW!S?$D=TZrlr2<^3Z&{N)u`IrXp7 z@8hzOU*1|@S9!I%QzV1gcm_c>J%y58Y}ErGtDY>$JhtjVkX=uuHE5Fkn}(1{DhJ2W`yoy6*6;YW^hSQwga$f<^1^Vas4=+jn98 zf2C#rvDU5%pw@jBuepmT9!QUUL}XwWB-mniOU6cgJN(Gh_w{~_`7B>ZEhRape`Lf5 zZ|gJgBV}h6yEXsTQm3~2{!4hxCH~$!sFOSP5o|m2l@LeB222C@RhE8?COSsV!K8U# zPT)VgI3;UAHE>7dP;_+k86BOd^KZkPALjhOG$8?X{>@Wz{&kr1!<_$@cK+ZE!oy{B zD5PH%X<-YH{2SWmo-RprB8>rex+R@)^sY|~e!4k$mS;CsWcjD)Z8wL4HOkdepxh6X z1pXHZgKY1^MrSewSU~g-T_I=qaGPgrl|Y zr+R?>PjdKQ>H)BBm2U~DrATVt|cF+ZHP8tZ1VU;ewsm!p3-z99S`5Bwj} zB_n6Ee&@c&PD~iS_z`^Zi&_f`dnQi;_WT#Fa}Ad9!ZO}pI^%`XJ$uLK9%v=_M@wNK z>)-YJ9{juC*WIc2=fq*)&25;_?5`0)Tlg_W7fhD-moocf)`IHac239nA)Bzs4~zW2 zdgR|a9p`s8$Hg$^^Pk)1kBs#xSqmEZ!Kah(*1}pIkLekXE5klj@nLN*zeL*$ z^ zKbq~7to4Z#J)Q0t7$^EI1aL~Z9*h(HmeD__+`r>Q-H#6gI>GLk6YB|vX@FoFpi>z; z4AlVDuevns?xk$vH7EO`pWNhULI)TndW`myj-~2SI@ZqgDDOpRz(fw$W4chMr2@W#98cS&QcV^#$!3S@^ zpK4r?gHL1DT=!?(0h*AXt#P?)QoFPrOqar_>mQ-6Vb=N)YZ*AYA76RV|96LfLcpIU z%vMQk76qJ(eLo5#xGP_%eD)`F(Iv&T|icbdNw`;T|~ z{%87U56t;t&i_mAUHxjoY3<3CxnK)Uzr|C+Qr=%e+(URGu;-6E9{;k{9RRV^2eR9k zw7?6elZuF+Pn@eR-6VPoY)V|qUPygT8+YM~3?AF7sAD47W3`=s^MyaY8sLxl=f6J- zHXZuE+UAcL=|768g-wI_27vkMtzRdmyAH}b)_jQI+BvuZw?F zVGSyS@O9rno$UW@DGZPDkMDlxWBc7wnA(3Yg_(mD!~Pgqzr6B~3bDU#G3?-!Mxnqa z-+modkMSJ8&MERcvg)68TVGASJ;6~Z5SaS&8#w!v$~&-Xz>ie}AV;Uu5bq9ah(8wT zzdi*1QP}z;PUf|H+2fRA81 zfWOMSzkZHjlW%_{qyL??pj|Jk$1`5FznSq)X+kRV{k`qQz(-Kw0^1C9*^B!QYz)?) zbKd_fc>Rki^Ps4I{n!|+h7%ls2t)la)c* zep>Qn{*wa`VN1TgJ=f<;-2SG={v}cROs+jWhRm!bMkHUhgZ_J9c1%y~bY{u1+Jch~yiocQZ9DD13`|f|-s9)^@16QBiGXfih@-4u6Yz`T$eETEi+Y_`F zbQDVBvDDxsou3GHKzt*S`JPDpyTo#9ta-8YlgVlxHJra414~@ zY;@4txcAY{8(M7e+LxYSuiBqois6fMA#ua)fM&X5bkEL_Fe_Hb7$but^^1P;doN)0 z%U=f8W1#*YWi4oK06d->6hnB{sD`LVM|btF%*9c(7%5LhSa|^5BY9}={rB~l+Hs%nAV);Aco zf4%jekwVaBUw6o{Qt%0`!UO)K^1l*Nb+qz{K7z45f5F$l(uZ%ARE}|3pUl0a5hAV{~T zOER()dvERY0&LpWS_rf`z1d}lZ*}#TOL-xD26kbBB6cJ)HWDRFrnh{Jwp@WL?$>QI zV&({%Ntt;Zh=}X_`LtwU58Ph~N&ZoB;FC!Dly>3K!8CAR^2I-1z|!pRNVC6~?R2aK zRX+!x(k{Glm=5BPVC~B*Fx2+W3DixhzXW=ip z>Jr-UICeT4fYD*aFjz6{XNO>YD3y$y&H9e%83z9uY4Llx`WL?F%f+!X7pi^Uk2k-{ z=WgTHpbT28|GR4-|F{ncHU;ZjksF5jzoioSdT`|FSZh}nx~q3L@XO$5-`Kyi{Jj=Z z^RL0ryk7=C_w)T^=-&Z;Zui}Twfn-V-Bi-2lgD!2lUxA|oB#QZ?CX>oSWl1&{09)H(3JP^Sjw9x9L)N|BDj0gIl|kh zy2DLx4t&-Zx!Ph6K%Y1l3SN2krB!fyL&Nhz0qpl;+iyW{0YP#NQGG^`9>Y zD?0$`-CX}YE7ahpWN>H)pUMK2W+xG>PQh-l+xiCl`|Yhy2jRcG>=(5b)cG}kD+r&s z^W(sr|7)0g%wbL^mi?k$_KV)uC+9z<$gc!*ewg$BhA)0y=LeorixWy8 zKJ0wbRzUkMw1M{kPWGd_FRLKnoCI<2 z&ZiCTha7DZL3aC7Y9WiOkWF(qI5-I8^IriUx{bZ)uON*np_C7(r<_aG4GQhA88_EA6bB(b2&k&o2xuA$K}&VV9|Mk{1o4s~w{2(_YtbN7t@674F`m(Fop@ZJiMS1_pVjsrdzFCazU}nf&E&W& zLEDJXN;MO>B+r0X5zY(cNth@}tV)kxa)lc6J`iYq!REQ-hQJ-SrqTwq$syy;9x=Ig zFQgoI7hBkff4x_jQuqGWyEz;`u@DZ42GonmoDPQzmla9Z3L{$Tn;wnfOHVB*WrmsF zJ}){3r}RV*morKuRD%5#dw`q3j!w!&^uc~^W&d6-81GfC$*iMmzPg}@q&TN{X$N$-;yK3WXV1H6&{+Sc|&+5UymyieDDa~ zi7ID`NgS7)A2(T)o{OMI2D5a^oy+(rL`F7l$k~kgT3&X%fcgHu(}67ueGuWJ5hOwS z$MzCtXeAqfx1MvkZ<(JOCYcQ8U@rNegY#w6=-$IluO-Yjm_aArVMR%-B5=k4qC^Zl zV118r@m@w!-!l`RjQoJ?jN0mE`608GW!XGo<?3+JB)WzFRdnx>iePthn!Uba=nU2Lw5HmNexa3r{5Y!J=< z!B+D<2DNdA4jM~GnQ6mNVY_Vf5DMK{MY1&H4aJ=&op-BBHXEvrGW$@IE0iV}>LA|R zL}f1a$TI~#iy(x1AJkIZZwZWjFrb|(HXZA2=ldMszJ8pu6P@34V8Fovk1N%sIOJ&e67xG-3a?X`yeN z6vX-FWgXmu!ka2#!ght|c*LU6O+*ScNAnm+UgjEM`nXG4>v?%u zSs4tXOl;6~HTaI!lYJ6_i7Vj4^kHUa)G9i&DFQH(eM7-K*NX z0cvHHy3Hm?7jD2bdNZL?Y(4r-9lq+v#*6BFj6t_X9zTo`zRk9`<7QtR)DR!LC+#+7 zkhiDWOsobxJj8GEJGeqDgT6hWj*hlXii?KUY7~Ar+Q$2$R%(J7pr81@LceNs|6$(w zm3MK^S1OcIa^97OEkFC1Z?i4vj005sRfYKLilY@BBO zddoR@`}K>K?fCgVwhuj1)U@6?&CS^ET&3war=G+Ac)N6)>m4>0@5*H$>Y662;GvL? z;9Oh48kouLX<^x$gqy~F4fawrZQ-Ta0aIO$F4UWz&ms#Nt=^1y^t6an(c)C0W)Wfq zT%@+CGxsx?m%o8N{VbBk%M7Ef6`%2tjc#{F4?INRvb~*fF5{s}fiPZNJHoQDO^IjN zet>=yb~6=GU{n+fXCVXimH9*_+sQ=hj`Yhe_`STA69H|#?f?2G8D8g0G&F{0zG{zj3`2cT!>Z@a~No3U6P+Ecf%<_yHKzCuT>-*?bsh_SIowRv>t zC~&JstX>mb7+hEzMQQ62Tqh2Qh)QOq;5+wprsDcaj^OIZXfkW#JBeg0CkBUuqs2uu z7UDavbT`VR!1grmM{#9&+w|x(9g~SAF4qGQ+`V2nxRK`cQ$gwvcm;@_oqb#OJQ#^v zi_L%|o_Fdk?{Lm8|Cm|(v~f{ekC{Ow7SXwpW$krCo+(M}Pyh9Vd)T5}ZKVIb=^og# zZWOz4`sl_Ec~_^R3$aaUlSydl4S72*S7Hk`YPgmFo4~X9d>G}!4_G*;`Zq@bpRR4Z z!F^&o2gt>h)3<{n2JXd~$dvA6h&XWHIX|@v7&RR;WlCke1ldD`BsOtn3r$c9(sbLG z;sITQNZ9I@Ytzj`fI_AduSi_X9?-o?Imm9=<%P7`UI(NWAy4mMFkh^T2)=H6p{>a} zdqy-89+hreh2mWoUb;Esq&SVk(%n1_H2}kHzxI^F5`T01ODITB;#06hCw46E5amM-Sjlpn#M#U1cByp-sT(1P3}CGfrQqxC@k0A z=HL(!=8;)mw7v37>%qMpqKZx!7LOE1brwCzk;z5Xk_vu{R5M0UG9UgD31^b?Z13xJ zVG)@Jmrd7w2q|}*q965qD4p{KUbf%qik|B=lpmLUa!H(RyrcQ4=)DgLItro9`B!i} z%CEjKE)c6s3Vd8)7Ra0qynC(rMXINotHupZOr_$o)YozJH$*Q@T=56>&!aR(C!U?K z@{XVocwZ|bwK{%|pPgq`421Ap?V^o2Uye@%X>RhQ`0^+&>psQx;AULE+@#1}%yFC> zHRMkPMI|CO@42=axMD~s1&4a)zCI)CM+>UE>axX^$)A)ka2P=bf_tU8{%Y-heRa$_S>!Ip#X{Z> z*X!BGNeC`o#G<=1Rz!R`YiOmbjvm+Ch7ScJM(v`rM?psuyNogSOmoq-bMX6P$#Hg- z@D_s)Z&h>(IjsxQBP3sPC$PEFaK>rpk+0133vp*ZOnn?aw{!dJRD;4L=owAdxkAM* zWJKL1qh{Wk#*0_LQP1D-OhpOcr1KUhxv@d_a&Wh(1fL6l6QY1?urVQ`YJn^vO@NTB zw`VT&80j`bi9Bm>gMg0AwgKz@ym#&$ZRv(F@9YUSOq1)A%5X`qk^RM(BjE0;pxp|+ zdn*9*HJndR9F6O3|C=FMa+oxThnkrmDIQ`Yu(-aAmc~B+o~hwV(JqVMm8qy5V1e&# zLd(HRgjWV`U&jD2iBjN9m1;!oQ79QGbgKGMwopA3J4^FK=A5cSA^uK(kV6F0nHM(@ zXqBlXJmlacbu(@`tlZQ~zmRG=$wOQzx4$TICpAc<+(=FCnN=Kvz+pOzMV#P$oj%k! zGbLQ?b2m!Q2fQvOHDZvhH}vFx=FPeND2J?9Eh)CI*K8zBFe4~Imh{TXQK^;?r1f=X2j3QW(EWqy@Jmu#KQILGYv$v zzGw&3NE&YCSm{bl931InNZs{`JYWQc))a)<K)E?zgE3Ow!=e1Z<&?^S4dx1JfM*9yE!I%7enS149n`N%tz<#`vn)a4MNnoY=1(r@5 z(E!hACfV)D=Dbd9M@vy$FRH?~%yM-|Szx5-1%0%Xc&RNb>w+;EU; z;#h98z6@tJ)}N84YSqNAm(B40+MAJ;!k&SJC~d;SCo2^fUiPtHid2kE*j#>zgf;RZ zGbcbmrR|0I<+r^GOi1aZ@=~}Pb~W4f1!wWXipv1}jeYrL$ZC!1Rr0nHFYw>$b}hTj zPK!M%(6ogcl8TIv2&jffi)d-7F0U|l&7Vb-7F=M`y-Q+664+yPmXD+go2G=MV_%eF zq*m5E@B!TA2#ic~5if+at2Ty4sVit9*45xaVUDWN7gZ{7H(#L4R(FbPO;)F=%M$SG zcC2_rGaAigg4iTK>J0(Uh`=%D0=Q%_bNLn9SBW!}pq)W+_qWc!evQNjC$a(0;g!h-mtwa`xQKB|HP893u1n``Yf zTBS9wp9aTN=5h=vtnGSd`l@F>d{e)P`=;H8nB<|_SPXv#?aSgD0+*|J-cYAq5D`xC z#}Li3`N@0DebM)CpX#$T%Vl>%bl1qnwh*ov zETLGB42xcEu}w*Rl#(d6dUH!G@p&J`j@Sea{=^JOsL3Zni#!#(2kU9thij9p`GK;A zmd~>`H4IUoWGTtas<9gZbL;2s7ph%R2!18sNn+E_q77KveC~IP(0P%ED$pK-w!z!R zTHUL_!d%QHGpnxzEv)yy*0j3G*}qO(hMV zzf#h!@Zo7r3?j(Z`{_-kgxiCg%(*XYLK*Sz_N8*hyroCvLY2RUYloEZhzU3IaGTPV zz^BWcTwz(hwM>8{#jqRDSx=!AkU_=5_R`HnYIZjWoE={pbEz44M?6)Oy$zRe`N5>q zh5OHPwTX9y2fIMaGNF-I;|0Kl;ve<< zRhaUvtS!54g~!*nO~iN8UeLl72Xd0l>1P=Zn6^-yOVGbp&D>`akH>K4R!a7usDE$Z zt8`PN5su7e#i!K>&kzWa-T@ocJhig}q{#yj!D_3shB@*6xYJzCc<)C{j5)oHC!;hYErIcB; z*qYUsRR?>G**l1&beCxKj?y_{pE-rz^Qz6`{=QsnsW~r-?>}OwD87ywK*T}jfOd@& z*-b{dM=?I+aiT|KDZ5cdonkFj%!8NVb*$pH#A<>=BJAg8hAun;mduaRfTtz4uQ|+X z5v-1h*w(rXlFt zetc};N|&+(ny9StzFwzi8i67S)-2Y9*h-zd>)Hj%9oa9ocKK}5=%0Lu_2Nmuqf;rV zWazLtn(#K;rv&wj#WfEv^>CtfI8<)+Cp=%d)HRw4&7r+LIf}BMb1(_^2V)GqzrkkY z0j6@~TEbh?e7ZA(v_5gpEr{)Ucwj%^DDTt4df zNWr?5wR*GrX{I=JTx`#YoIHu*4Q-P#_GoWhavHQaw<(0e)a0^-sJpQ88;SZg$53Zx zGClGb0j^)?0^F55pEZAnTk9~CcXc9 zDbp&Ly0s+JMP^Zkg$EB0E#xevGHE@MXlu5nD|#hg1&N(mZr+1LwoL?4Os&9D=V6x1 zJbJOD9;+dmga8+&_0d(nK%Z{YFdQRRu$!*ILuV54=F#lvAY`DqntF{1fr(HPGvUsJ zHmg((@ELhi^J=2|QJ=jqLtvSmnoF%EPrOt@@v!g?CvH=dBCA-lOHbE^EcbNcUXuFV z4bl~?elbP@)ZxnE;e%z_xFEJ#8%k-wl5e+q7dm;M3bd1HQ6)pC2F+vh_=(?HOsOQ+U;4lapH7SB#2ZO0cQ)0 zuJ(SkU!LDw9g4}7E_VTYE7CaO1c%wymKDvj9=%CFu;yrPu8d2>C#>aBsV)Ut8*EKZ z-Q$kA7_PImX)_|}Y$CbrufnT#FlqFmx`ZI_NC$s5+sx^{yUd1B%+#a<``g07RJ+k? zbIB5nr+o$3h4sXgA%5t!ZiU>qdZm#0yaC|gtL*@zsJ>ZsK>m8We-ox(MI3gki9wJ< zY7a9Z+AMygtgm|@a<^;(DCjj1YdbnI9PLq{iza!uY+P`-K#UOiq=ub=h~6{ouzB7I z#Z+Cs@F!Yjc{G+b(NcLSDgGoY4hg7*8XHDToZE>aA`K=V{cUiZ#h2XmsKagMNDe(K ztCiI!qYFpSB7;PjrNT7WJ%vMq!=^XQQwq6Pq9%c*qg)j(Iv53vO_F3n>WXO;^S!?>5z!Rw{nUH$VBn{tNv zSs!rTg%PYaEwl&oU)SAx3KTlm@O0?a(m+eR39D(xqx&8d)Cac8f{rP|oFTY&i~iyG zftKsZQ5P+30=@i8uh~l$LKbceNT;ZTf(#m*H=eZ2>#we=UwQ5kO$RY6RJ?zMi|?hAVG(92Z?&^#^%S6W-aJ|@^3&T0Qh~=dg6S5s9nmgkm z^ZBS74)R6m{YHR?m^gQ5X;7>55Ja8~@0-L;(dhTte2{XtkA1ANo!sEoDK-#58RWnX&SOLi6-PxLUdHA<-H`D)#Q4;*5*?GmDp7_S-h zV8w6iDMk?I4qSUMsP$~%QIvpsWk2Bg3!a1#4T7brm8vr0II7Rf%FJFm4qZQd*DO$Vw}4G@b8SF>Zw8dSf<{DCUCm!S_I44Y zRVBD(?oNaR=1zFjL@ou*Qx!Rrjlz}uD^G!MJQg3Lz8=mQl#JzjvOIOA#8TC_p7_eL zMvSfpeNRp{FlMxf8Kv`CTDQ*gkVSE>5vAgm!dOyH>5CL^{pTb{x}B09q;+@mCCh^a zeEH}^m;<;uT%*fGYB*ObuF<^|Og+b5Ll*b}Yt zau_DY#cR5Z^&s!By>Q5muFM3@Xwh)jLpDq!E*!3{>mIgqm`(?<;gA1grc+HO2n{d!eA0HG6E|qVIfx)Yu$mh9D zY29hX(;e!+Z|CHSEKti8Vac>{-_zA+=8g5~tK(po>3ndJA|Jc}>Qr`bb2C z3$jYl0MCgjZ=$P;Vw{>F=W5%21<{LHe06$nempDuRku$K5BC8LbBO6>s~G)usSnxJ z{!}0A+TsJy3He3`2i-@8f+xK`PF4f#vI=XDiuzn%AI)|59C@X4RZ6dMAd7KHZfL@@ z?r0+I>^1bYHcihT*t6I#B{%AE@Rw892uur!-ll=nl&uhm_uAdb&V!xJ^qj102j_K=l|6WK+y*q4 zpYvX%)aZ4T$ZD|kf>h?2I<#I5;;YsK{7ERt`^h_4?+xl5L67E)6xyrqhL4}W%IfMC zcV(12-Y`_j9r)~_j0IIHLV%s8hN%sInAwK!gC?gI>Q<}}8A~=H}3nBE|9?Uc0sT9gr z-z3eO#AH9~nBUxK*R6E?zny7plU1oO;e_mG zrGQuoE@jx>JM8vZguhM5)Mw)&sA}v|C^p7oM#HUsyJEU;BX6ByKO-vi6@8~?Nl6WO zL17wS1aceg&e|1!ht)eI3V3!# zeqwZd`ap8HBFny_r4>upS%Us!ky+oQ$Tq@_A#KK^{Va(lqOE$xEQS1}Y=2FmPSZ?; z6knA$qWr;ng6E89vXY%uBmW5{pOA=X{+RmI*z(Ir%N-WiIQpA zqK@yepKxC0C1dFoj+xb_Q^NpYRJ?d`RAR~bIu^Uo4^%>fyYaHU4ws~)?3Sm(QxU(y zB6DP}1gY@u$0RpA3_r@Q$Tg^3B*8^$Dl-}rMPU%Kx?N7!j>Oo)6XD-eZe(rCNZ5!F zf2~uCt?OyBf-?8C=79NDRVOvUc8Iy~y|&#L>lJc0r<{N*m-{KR6XvbTY@`P7-B5z# zO{n%Tvq?neoQRbpuE~mI=vj(s23y=yF_IBbymv-pCSRBHO*UpRCz+V|uAAb+P&Ty+ zH7W^13lBe*bC-}1iAmTd*0p_~8hS1Zr34(Bl6Or2EWpeCn(<-6cM2}v-nVm1PVG33n_s(q=v&GwoCP#AGkNKU=m~hJbQ)98L z116rBi|V51rlg*2Vr$qNqYtlJ>@dQ3`8 z*G9v<@bT31xf}pi?u|hH-hG@}WqfBQt||VFi_G2qo0p}0=py8r3`2(knoErmaBT`R zL+Qe_Yq5@=mKJ~_=aIwUMG@XS=Dqj&#S@49r@-}6K1gJ+WJu`dE-P7j_Lg#+MPAUP zI`_`EENAi>OE^|5Jwo^QBS)=ldzEI*jW09f zkQ7Fq-_Kde&(R>os^7B}U`T6UpbNlX<2vGJG*lj5rOM}2%Uu$lY+4y|095Py7e6ww z8NHLJST|LE>)hUQ6msA+-o4p0n@_1|HhsMJB`?%;5~zo6AW_t2tc$QQ?!qts=Qb&Y+)!yhhK87kLgpv8^CNpRnW*K6t0Ef@Mx zs#}t~lXr1I0-pB@^=*nh4Q+yz>?f8N!N$@Q^6%B97uXQC1TuCj4RNBFr&$os&HZZ6~=CioO1ojv1(u%QMcYL#V?w+2Q z-j1^90gl!6^#0AZ=Ocz6(LAw=o_)M+QfygD8TD)+OWMXmf)au-`HDDXbATQ&TSHZh zSXRN_tA)&Tw$9P?JSM3~#q?SEg4m}@ugC=$Z!B5jFylVy5x5w@Kn-vBx&l#J(IAcH zm8%2x@Z9CldCMHMJdy|wI>w7#182>+IXF{iX!ahReP zE^>oTjbCu{YU5OyO$<0JY3OR?U3>=ToAGm3LVS(iuSB5Kcf1u6Nu%obo2_3M!Ur_3 z(@l|I34eV#*We~3@Nt{|I#>BqDaCZN9n@XE9TpsvQHG%Hl2X6?^EzQyij|#{X6_pu zabvQ)KRZ};DY-M1<&7k}hq%?%W24XB^FFf`q-1na z38#Blg%RJ%$+cUN)>z}kLG&|+CBA^vSg9`bz-J~aRMsumlC$(L=QMP#xSdt9cy(9Y z?;$QxxoXmVN8iJl@T+2XLf%fQn6qAlzrl>(K6!usjLyhqpAhVzbL>`^Uo#7HlM`1p zT8Xnok`u!_Q0=8lIo*-laG*WRdT((H?G1ZHht}Qa+?D5s`g6^m-Tp-(8XMNG$9H7QTZZdTTxTRAfo7V?oCaFi&Ok zQOjO~pZ)Bf>G@f!j*?XqwhaFv4h|_H{9ujwMl0TjEpOo&FJL_3TbBy(r|@Jz_8aK1 zQz3FuF7NaG04JsI$nFiVX)}T4aj~P|dEYyv+b<^DNaMtp4|6(jx&sTng!i zVer;Wd;Yi9H#xvQQ3Zr&B#EEd3Rh>9NBgL zheDBu*IK4>%G_ge*JM(~(6lcRB;%qKq}aU_7K69SRR*M#lDi*lx(_%RJI5WGm)^Ld z#xIL=j^~h)Bu){dpLxvHx6xXq(^U2SLqC@h=RVeVe#N>n+Jc$@jIf*4J+}AXPkDdb zX_~X>ekkx>6{4Lc7dV8i_D+vPo$j*VlZUcESad;&KHOjr$WXq)`>W zY#AgNM0kYsAUXY&s^P}5s)SW7qM#cph4U1D+u4}Vn-eDx{iF(!wi%FBeR zqX=WS8nm1VsT^J0bNz-7&ntMdD_2fUhG|-f#u%t;rOQ1CTS7BoEzEXU37EZYVav}X z?awXc^RVPqYY!m9b@y^ZG4v15+x>wsr?TuLCv4Zk!ycva^b7Q|NVs$zcH?s8G})=b zC@Z!y9anf91U;T4+^jJW2jdY0C0@5$C$H!?XrW~sj}rrz#&?iQZ=;%YMNr&pJ)?6= zVv~7kD<;G?edg8V^hdr%H5n9dGU9uzmoDDjc-nn;Qi0605V#@Pu%(KOK&1EL-TATv zYh6L@dk&XAik%g**^4znq9zKSv?VLUCN!iiM(+|W4@sWWlezYEE{rj@E+HGK~bl&>v2MrCTw_mL};chjHYs@<$qH-sXAti^Gi>PLqjZ-@7{aAloN=#P6#Og=+Q6imqKIZH;LUDBAl*n|OfKHsc~AAr)Z=V!RG#%DvDFdJ)70)OsOP z#E-&(J_>>;!Crov*Zc%ouv3VK2&|=ICnw`$L{j@Qjp8qyzZs?>(ZL z!Z65Flaz}Xc)M+30~jN$U)riPl0%v5Kjkx(SgCU~mFA~HjJHM2>E=jFrBA53&yo}v-wx6Kdr4~&zn<(9yiR60Pt&!@k%f_!gx-r~$-bAiMd|2mqR0v}3Mra`r zr}u+v)7C%&O6+4(qZBKQQS7SKU8N5=|6E`b5ngG9x8=#4k1lbHD3+0TUBjKUrrvUf zk-8&f++Wi@9Qik74&13%J&#oNT8|(I0PScs*{Bw5EStzb0T;hLGR665u-D>)LRuaE$@Ixq~<6(ln^6! zsRM^sJw$@T$8C*mrKc4#30NGAaIg2OP^Tm{nWl^)JVTpu5nt1W2L#!l4d86a_L+Ml z>*LDRc*)upa}KVYVuNKX59sTW)yKGfwm#N?i?lwQQYZVad=e?5fc>opn3*ry+o&I( z6K@#Jmltf!93mEhU-CjzA<2+j8JryQon^nM6_$82-U(PPeGldwt)$cx{n_ z7|uUJazRfS>k_4Lg2(Nv`4zDihbvE2sGi6!!HvB<a<2pi z9i@<&tXZ035Vmh*lMzA2p5O5#F&FDNkS}@KfcYW(T*%8e;z0veAxn0enb>QIByer7 z4BbDD-}Ow7d1~QfLis$js+I6b(AoO{kW8qzl;7<-6M9h^ZjX!1)f!9?G7h(3u}q|sdp)RZ)9GNZ+Nz9YDq#P`dmsY zF=UVNCg2jwhgTLiuTf*bE%QWFBbIloFvx3O_3ZEpj|!-_z+b-Jy+UZpQE%+_u=7I- z*^`HPCF7iTx=hA9c9_Lp6Gte}OUs84Ob(Cc$YIrMM9^k7UJmhtB;qC_X5CIj5FB`a z$C^q)G=t-VWA9_o5{rlB6w4LUtKsI7E(_0f_4qS2sba3mos%P*dvP(#!=y*6MR%hn zdriyptobxk5!oy~fAZB^5di1)7i&B3Q*~^ty}ND1hlUi{pxAgp_VQ3vGEv#ZmU%c* z=c~A}+lAG^k}qEcjVsqlFR8AKsn{^wVV`R8Q&2wl*x0F&Y|YTV-KqOY^6d!;wKx3y zo5=zpV$XRVJve79UMi1rK2`SP=z|cth-Y$)rAbJt$UaZZ)EIXWi4~UQ4eYQ|Y~@s~ zd(Uc|A1qNvb0&}OZ7tcHyJ=`Y5X-WXS4Kv@dFd`|L|K)Q7y-yg@j3~m(0IS^)JxyC zyZFi%J?2Rj3Ml*=|{G0ku8|VJG$+6h0$@=+a`+{I>oYqP>7T?H4 zmq&RUf2wHAW?ghBLL#tP_dIU2?lrMchC1-}bW0>_ae70(wsz1?91VO}=E?~v9Nk$W zF3W2S3GhIVLr>IhU3&0WTNhi{UYpc%Oo8>ZA}IY%IYT>{&c&Q@KRHSj1+7dkFV&lP zb~ca~nzyQEXeyAy^XiKSXmG*!S<9Ox+Un}9SMFieSt5>>Y`M09kv&MSI^=DZMedRw z5FV;X0^J!%vBotwXWPl#_V_is-e~u02f=+Z_e=Fy!GT7-vju()QyUDV-jBmC6JSfl zz%=-86=KkI2jhK}fxeQvc8fJ*uY*6LG}aV}+q=&)nZYy)OvhrjZpK1SN(yNRs;kBg zZgkd|s>e0Gam3i_Nkg+AP-X&~zA1ToYO;Lb2V|wBwlqp=7h+9PSZ48wmTp&us>EcL z5nb^}-J&-Odrbwsf=niBdoPX;#_U&S5H2$g?lW=eJWFPHkex~^lBNzL+=?iGV6u5k zHH~EJS`&pAvtNGctCx!BTN;Xvr_UF^5#_`fBx2lJI^kC?GgP%6biX`#d-!Wl^Y8zT zC)H1*=%_WDQPw9_DOT{3aZmkHK1=jphaZbhQ`QWt`$Agu+ zIy^m=^J@KBR&V9ss(p@;6$B-Ft0$>1K#uA{85O$K88nKgM?y~Ntuh`A#WU7yk4JeA zNoi}T=jD!jivlwDu9gbJ@P=(P3$mb-PXxCLCQ0D{$ykP&xRrzJMdGL&MpZ$AyO?~U zY*6fo>H-^&D$2YTtxvwl^m<=xo28PnxfLpiWC4V$DXG$`s#$ZCm2@glkWprJ8v}Kg z#~%o!!iqpegHTAapVA*K_qwKovdO2Z5(CoA;KueOC~Uc9a7Jw}6TWRi^cp~!c! zd|}Q8TPp<_g;E>iI{<%b_nfm3YJ$8}&X7B=mHPo56bQD|z3q>Fyg6-etPq@h2Aevs8m!DH9%W zD{TzTF=<$-#*e}I4J3QOoO(sx8XH-UFEsKeHO*!=^7#1ug{9bpEh-sTZ>vd+BerwP ze!rmK+LaaGeEsF7*XtpNjj84)y#eTe%9g3yK^KPqXDy_tOB<_KZg>C}Q|Ko`isMOA z4`r%psS=lrw#U?l+?7mY3nPD+33rjt%b==Ybl>?>LG0CN&A8yO=~(HgA{ZMq{ zMWPK8Su{PR2Sh!v+FZGC5G=e|Th*6!lb`dyrLdcfSZb+B)PjDDx~Wor{4t<4KOMjo;JTPGG;nWnO4D2lSiQ=$k?Sa52u(}^pdUeX~?u5ZLR-HZs< z$aMR6UM#wvyipJLUc^H|C+e_;LX{%$dS+{$3$?aeZ@l~JJ(RcVD&W1Qt3q*nq57Bm zmDQ30M$f=K5si)yz3{ZPRZ$-{D3B@rVXn56EVl|<-?*|;aB+)pjVoYixS+*luT}1@ zQb4WT@>6V6QOsy%eMKI9HWn>d|DbvC6ly-5Bn(SKA&?w230Ts6$jN`0!Mj)aZ@rNn zHB?6u)f0;CtUKKsqb6+?ikyj&o=(F;in)Shx{{?OgqVM*)UtrsdmU|V8LhUx z*=49HOC9=yTCBJ1nuOF33kyr`b2VwWfm|Ew4eb_y4ItWM;jEO~8e>~mL}5qx%0aWP zFxk^FUEZ2!)94}})bWHw8?Pn;pm6|!CHKRC+>c`0tlr-GY;$nOj5kU0p@^)83mSrZ z9_|DbrTvirTHt8Eq>I_$VURyD{ z!+y=8>2XhMHU%KB1x`gh1HHm~gPLNgDw^;_H~>62oc2aB*slRPJawmm*)3DUo~iRV zBan;w*~V<;I^Uuf>J)G_S!49~Yo|)Xs-s;XOD`*)&6^l(qn6Y|clj4s&Sj3dp+gj; z^-L|9Z&{YKSf^~$kciHhe(|ctqg+6pI;;^w=#5}!Kt|XxZBJ2ILd{gBkcj{bY!VHJ zCn+}#=`Oib!J~>WDVe~-B4%YSYc9s3{ zyt_9)dnirb%V8$k@8oCSi9)MmT@p|(e=5TgchSeu`K3h@0r{lf`n@q{@GL46ot3tV z-;lZyaz=TE(Q6d%$Z!)SS^fFFyFYLr(va{^7V_e>C=Tkem`K zqp&=2borARH|53FP;>X2P^z7}ZFxZka01gb`&h3h5mRRmrj8ZvDO9Q|v@8J=N6Q!E zaSiPS12-slXWI`*Ct{D4a*@q8YbY+I3L80Nj>xIu0P$Cz-JwizX|-eyap5|Fs?vhj zTg@xNaSj-MNuQ4`1V&>UI|o%5Dkqz@QWGw=b5IjRX8gEXaNr@M4jWsy-kN7NARQpz z_iadX-wBjzC3jB#)VLq+`j=;xO zfshx1n{!`wHL#*Yud55?`tFP-9E8Q&1)P8?IU(sqF?pz92}8Dg7ca}OzD<-i(J{xt zN-K9Z`kdNQAb!TB?S)LHsp+Mnu;{1kllruqt7xNEzoWaQl~QbPjHXZJYMprr*adoo zxz3}DfMICmYy}R7)Z(a#hG_`z{b9I??#%AO|Am8u1~K5l((F*3P%&;(XwHNt{M(=Z zH*HoXR3xYj3pW!&p>3k+E-msBsUKzm`nZZgWJHW9$4%6H#XV@-Sr=zH$L6NKvbMLJ z?Ey2ZR!@Tpfrm1`p4tr7x zR&}GcL8A3XwjZTE5-0C-Yqc-kBcKkG^DDkcAQ3P1vg#y+7riJ*$6=56we&1o27U!| z_ZnX#gwXQ1Cpg#^BKw#aT`o=*;_tm=oN5_v=0Q@h1m1GU$e3mcyvV&5{V|(e&Peoz zK1&P9wn>KvlqN(?gupGtSZBlR%!M&7*-uPFu%GKfnEfUPofiYGniOLQewMdtzcef8 zt?>fN7lV^(*#dZO=J8(BsC8a!6DZG1IaUYwHm0Q(DWs57l=f;gVrvS8SFRRVs!k@V zrRwR0M<#_RCZlFtn|VQ0h$L^;jJpo5;Ro*4>*1YihK({mmLjaG^r_LRKWU0JcI&Z5 zfJIK=o_!wOeE9;pGnI)6+UVRs{E*$fo?1^85igX5*nUDo=;e3WkdKh%ZXx)sVwl~= zH$|&@*+Dwy^#?|CR`X~zd7x`*^9<_@BTs-{L&Szd}txlE)H9c?P?gX}K%hYzuGYPz`G*@4*LqJI*q;&2d>dRuRpdS>YLqhiKCTY^5bGf-jmmRZ zzZ;`nYcam6h(3Vf)aT>FZHQde+pMWomFwXS$YFlBVSf9;6I)BJezLZ|n81k^Q;$4#|3^5XFRN3|CZ)!(J0 z<*B`Nf&%ngy4-YQh;p-}=^aX78_9gDJNDzFV6DCVw7q*kk8&~0mnO)mQC}XZ0?Sdi z!sKWdOuziKZ$pvxX>ISe>P0HHqcz>JTwS`lE+y;iv$jxW-w=uk8wk5RI1#~|h>VsR z%Y+MXucIr_7M3$V zE!jd}c2{s0tfz+BVXW@WKX)5eZO*JP>*0IA3kusi+hG$HX9YF@EdyIs=1nVa%tT+b zl_vK(%QbA|8+VxKTv5~EWf8eKJ}$I9a#AQnf7cwZG16&p_sUrAz{yaF@RWqbrPEq4 z)Z~f%b5@o2xJkBo%?3z$`CbPX=cn!K?5@STr1WC84(xkg2-dyP%i79B0566KRde!V zWRZ1+)%xPSc&k}_*w#qS5LKq`>QDoNbD{!Jv=* zkI~s%EG;ns?!Hh|B2)VJdZQ^tyhbq~v0rxaGH6NewHJPc3=hO7PvBV0fAym=0|hPt zwUEyXRStAnB*qrR590r<%2$EyrQkRq8J3p}p&p@;VGWK|Y3HlvNyJv-M)6R8H-$ID z0*j&+uucTQ+oG?_x8AqO z*dKnR$WtN#^hLYBpq^^AP7@lUAs_^$dO^|26~h!+k-DIsw*)OiUe*KmDqtKNB!bvE z(ZzE$)y~EnTdzG)YANzcoVYoH;X)N?&&%CJXoAB%Lk~Iw^}VBu7T?2kcVQ4}@UA{< z?dnSq1J58cMz%|ZI*L!W?RAq}s1<06^nIN#I{)l=B|1?1VBwblrL z@{t>ApN{!X?_)7sh#AnHoHIrdo!yeYy3}(?TTYFtq-{F_g+kaw+E)K=J>bInt46o_jVWk&%7@@k+8bfEHunFekpvC$>$7LnmQyq`%S(NBvcbI7Lu?gb9P{3yub7KF}tVO8CqD{DlGX#^&|bULw*4 z_t`i`a^9q80uj=Bq$PCKW#fJlV+isHp$WTVf7v>@f(Wr7`!8g)3fCE{?Y2P5P*P8J zG;}EU1FyMVBI8l$ImWnDw>oX4nIFK9En!i+zUH~KH z$TKipkC2uu1QU7PC)hXM;R?E`BI;6ImlTJqAJvLO$59)^d36F>V6Jh2-TvwZTWE&T zki2Bfc@@UE8NH*UmEIAg=0$qFDM?Kh;G^;(eR=vpo}>uCvC#&q%Q2!IGxZKUbbl*1 zN7PS5oNsC+c=z$X`r7{$}UV{?oYM z+27ymhoHB?>#wtI%DzN;@tQX#`m8wX#EK0|QF%aZ%0r!CgDr%0DJN1Ey@=yLQMC1_ z?Z=cE>jjv-Z}lDliUdK2AXyS+!MK4~^QCqt8E@UC9Bx@y=U4MDnAD+7(}!v~KAcfe zI^~t*p~KsU>n#4XHms^w?a(3x4}_PDBzdlPT{mQryN9l>G`#++&n zSkA;w#h+#h^aB7i4sfTME;PR#%20z^n&QRmW7=IsbS{#dqw^(CJo`A&DKMEz#%xpi6H9Z*}Ia#VoQx<-rWdQ^1Efj*y73Sc8 z6NbUUY>YX50Su!GzEbs~(aMnHmHbqWGHP5#Tk(3$|Du0^`jY3LM_xLsniGaVY0(CO zM3)lUz36QQ$?VRwK7ykbLY6ABIIIfJ7yNYG6CsPCv8r<6YIJQJ^QyVw3Tj?WUN!j` zZcq9y4ds5TJ+t`{h4?FI?`1j+t%>PRtDLhJi0P$|t(y=7 zpk>rrloeuglUCfK?QH0;Az%{uwCoI}`q$IOv$8Z_dv_FpoCRRdDwhbx`EpqS2geK^ zhR+|+z;e~mskgQzD!sw1^e)M?)Up~X^mKHUMp)jy(W_R7+9L0RwWtS-t?9c(`rcq; zOQ**&|4=@Z2$qvw-R7QHix{GoP)2!GJ-Lxdt30^6URUiZj40=xD=#PvZQf+%ao1s` zz~wU;6Nk~xlE}Y8qZD}N-ilu2(9mE%TwlJW%)MoCr7$wyno=(i=+UU~y+vSQ0%hz{ zMWy9yeQ2VFk7{lf>dgjdJzMh-rMJ3jNQ-c2`7w4`!$!ulhoVLrL zw=HkRt4dp#W=avmn?A!EG+X|@c)jG)Mvd=6Hj@}yscmppQ!(h6LZC5{PdbELcS+-F zauVMjzB;5I40z2^dDB{E)RwN!)zzCiE=E}`YueB}<)7;ac0cC+@>w7{@8?+PmBV;& z;=tMKu3C%A5SEvLqm|Q-EaKMWdeXEmUawp*z374BXhqQ0FUb2@h&Tve#L1xdO?mV3 z)sjk{aahjhekt*jw*YhrZqe@bbNn^@VAcsxmJU~Wi>@`JNnuixVYIN=a1mQoQCh42 zSYP5zT}ji5w5kBg1^ z(9M{#V8U_%W@8n8!rT_8YlZXBXuT`H${cGIpM0}4!{~v$FswB3RjBZAINIq9z)8(= zROif+nuG?X+B2bmFLwV^!{Lbm3fw%X9(+HLmd;0QLVbb?3I* zR+gvt`v7?dLXAw@K#>#=I=CuT66R(#SC^s4Cu-$v5J*SxZ- zs&+@TX*o47<;$NDyH*Bn{~@HYoATQQEg;`%-c>+5eNXj`t&MJLz280B>?Sp?YWcmY z*Nw&^pn=}C8`U@I1HWFZsshI(&|P|B>$38CmGRV30?^&pyWL*5zr8g$=yy|tVa2mo zk$ABnv`17*AW6|gi%W4vxzwTiQ!S)t&Xppwl6{A?mYko&KCn9iM>DQYl85Zbe5jji( zaAFj8;OUZ2V_Wmo5Bj}Md#l&$wt6YZUVPkn)0I`{P8IO^JBx9b?U~Y#&T7=Z-qfNoa?nbM%ec0-!gKNb^s3aydyrtN>JXHIn zne@s{Y9ngqjK^XnyJwlu@VeC>uZ#-RW;MO_P46{rE{$;#zn*l8w~we;AApXTXrO z)qpF>*a=ZM6_*4566i)!;I;z`*L4R2aks{n2pAr^+ z^jf2qWVsaV^pR{Q0@y(p=&VPUAm2;f9Evdd}|zLL>J|^xBYgSM%XJ68NZ+ z_};nIP%Sq}D{d;wx~+LLO>#=kMYGhr^KVpjR101+Dnes|$>f(N4)GyJFOYnlQj2rT|uKbrETxMh)#25`K6z`W$l)?kpB-nB?$+ zc(X^4a^<>AzqFC&1l3|bqRe5)e6z!nM@Vk)`jzroN>O^oN5)q~j@&X(mQ+qEpNBdy z8*tbOG2`5m46|7B;+4F$SHIpylByvftO3N3g(D(S@3gkod)>_r6{3_6t=KIpeg9|B z*N~B5?4<~q@pbAaC25=GePr$zZZaxefk_8nFI3_rAtqdV4Q82Ql4Sc^LZOpNT37J( zgKm3kbG=QKt$)-~wz*N?-rhW__traGhX=jRc4xf>Lq`3llj(UftzI#lmBbUOU*FU) zlqi-*ZsmY}zNiDi7WyXqmsZv3uyHhOHV@c@(2VMxrvefP@>WM+{!VAB+eC$&-vFlH zd%;4T4&}Bf-D4@oeLHdgus`@ZmGV~%MkW6{KLPb9%bjIf&gU&DE_dE#U`akAgW8k& z5#&_P+fwU`_POeDW9p5g^ZMy<@HPRzf!##ae`YsXm|t}rh+Hf8!ZgheMzXjOZkX=$ zRrBAq*AuZT+Oc84=_ejRMh&_ceD(HGE;Y8x diff --git a/generated_pages/disarm_red_framework.md b/generated_pages/disarm_red_framework.md index 5a550b3..1866503 100644 --- a/generated_pages/disarm_red_framework.md +++ b/generated_pages/disarm_red_framework.md @@ -529,7 +529,7 @@ T0137.006 Manipulate Stocks T0088.001 Develop AI-Generated Audio (Deepfakes) -T0152.002 Blog +T0152.002 Blog Asset @@ -565,7 +565,7 @@ T0138.001 Encourage T0089 Obtain Private Documents -T0152.004 Website +T0152.004 Website Asset @@ -618,7 +618,7 @@ T0139 Dissuade from Acting -T0146 Account +T0146 Account Asset T0152.007 Audio Platform @@ -636,7 +636,7 @@ T0139.001 Discourage -T0146.001 Free Account +T0146.001 Free Account Asset T0152.008 Live Streaming Platform @@ -654,7 +654,7 @@ T0139.002 Silence -T0146.002 Paid Account +T0146.002 Paid Account Asset T0152.009 Software Delivery Platform @@ -672,7 +672,7 @@ T0139.003 Deter -T0146.003 Verified Account +T0146.003 Verified Account Asset T0152.010 File Hosting Platform @@ -690,7 +690,7 @@ T0140 Cause Harm -T0146.004 Administrator Account +T0146.004 Administrator Account Asset T0152.011 Wiki Platform @@ -744,7 +744,7 @@ T0140.003 Spread Hate -T0146.007 Automated Account +T0146.007 Automated Account Asset T0153.001 Email Platform @@ -762,7 +762,7 @@ -T0147 Software +T0147 Software Asset T0153.002 Link Shortening Platform @@ -780,8 +780,8 @@ -T0147.001 Game -T0153.003 Shortened Link +T0147.001 Game Asset +T0153.003 Shortened Link Asset @@ -798,8 +798,8 @@ -T0147.002 Game Mod -T0153.004 QR Code +T0147.002 Game Mod Asset +T0153.004 QR Code Asset @@ -816,7 +816,7 @@ -T0147.003 Malware +T0147.003 Malware Asset T0153.005 Online Advertising Platform @@ -834,7 +834,7 @@ -T0147.004 Mobile App +T0147.004 Mobile App Asset T0153.006 Content Recommendation Algorithm @@ -888,7 +888,7 @@ -T0148.002 Bank Account +T0148.002 Bank Account Asset T0154.001 AI LLM Platform @@ -943,7 +943,7 @@ T0148.005 Subscription Processing Capability -T0155.001 Password Gated +T0155.001 Password Gated Asset @@ -961,7 +961,7 @@ T0148.006 Crowdfunding Platform -T0155.002 Invite Gated +T0155.002 Invite Gated Asset @@ -979,7 +979,7 @@ T0148.007 eCommerce Platform -T0155.003 Approval Gated +T0155.003 Approval Gated Asset @@ -997,7 +997,7 @@ T0148.008 Cryptocurrency Exchange Platform -T0155.004 Geoblocked +T0155.004 Geoblocked Asset @@ -1015,7 +1015,7 @@ T0148.009 Cryptocurrency Wallet -T0155.005 Paid Access +T0155.005 Paid Access Asset @@ -1033,7 +1033,7 @@ T0149 Online Infrastructure -T0155.006 Subscription Access +T0155.006 Subscription Access Asset @@ -1050,7 +1050,7 @@ -T0149.001 Domain +T0149.001 Domain Asset T0155.007 Encrypted Communication Channel @@ -1068,7 +1068,7 @@ -T0149.002 Email Domain +T0149.002 Email Domain Asset @@ -1104,7 +1104,7 @@ -T0149.004 Redirecting Domain +T0149.004 Redirecting Domain Asset @@ -1122,7 +1122,7 @@ -T0149.005 Server +T0149.005 Server Asset @@ -1140,7 +1140,7 @@ -T0149.006 IP Address +T0149.006 IP Address Asset @@ -1158,7 +1158,7 @@ -T0149.007 VPN +T0149.007 VPN Asset @@ -1176,7 +1176,7 @@ -T0149.008 Proxy IP Address +T0149.008 Proxy IP Address Asset @@ -1230,7 +1230,7 @@ -T0150.001 Newly Created +T0150.001 Newly Created Asset @@ -1248,7 +1248,7 @@ -T0150.002 Dormant +T0150.002 Dormant Asset @@ -1266,7 +1266,7 @@ -T0150.003 Pre-Existing +T0150.003 Pre-Existing Asset @@ -1284,7 +1284,7 @@ -T0150.004 Repurposed +T0150.004 Repurposed Asset @@ -1302,7 +1302,7 @@ -T0150.005 Compromised +T0150.005 Compromised Asset @@ -1320,7 +1320,7 @@ -T0150.006 Purchased +T0150.006 Purchased Asset @@ -1338,7 +1338,7 @@ -T0150.007 Rented +T0150.007 Rented Asset @@ -1356,7 +1356,7 @@ -T0150.008 Bulk Created +T0150.008 Bulk Created Asset diff --git a/generated_pages/incidents/I00002.md b/generated_pages/incidents/I00002.md index b5e2b64..4a55b43 100644 --- a/generated_pages/incidents/I00002.md +++ b/generated_pages/incidents/I00002.md @@ -20,9 +20,6 @@ | Technique | Description given for this incident | | --------- | ------------------------- | -| [T0017 Conduct Fundraising](../../generated_pages/techniques/T0017.md) | IT00000002 Promote "funding" campaign | -| [T0018 Purchase Targeted Advertisements](../../generated_pages/techniques/T0018.md) | IT00000001 buy FB targeted ads | -| [T0046 Use Search Engine Optimisation](../../generated_pages/techniques/T0046.md) | IT00000005 SEO optimisation/manipulation ("key words") | DO NOT EDIT ABOVE THIS LINE - PLEASE ADD NOTES BELOW \ No newline at end of file diff --git a/generated_pages/incidents/I00005.md b/generated_pages/incidents/I00005.md index 08ce95b..4032cab 100644 --- a/generated_pages/incidents/I00005.md +++ b/generated_pages/incidents/I00005.md @@ -29,11 +29,6 @@ The report adds that although officially the Russian government asserted its neu | Technique | Description given for this incident | | --------- | ------------------------- | -| [T0010 Cultivate Ignorant Agents](../../generated_pages/techniques/T0010.md) | IT00000016 cultivate, manipulate, exploit useful idiots | -| [T0018 Purchase Targeted Advertisements](../../generated_pages/techniques/T0018.md) | IT00000010 Targeted FB paid ads | -| [T0029 Online Polls](../../generated_pages/techniques/T0029.md) | IT00000013 manipulate social media "online polls"? | -| [T0046 Use Search Engine Optimisation](../../generated_pages/techniques/T0046.md) | IT00000022 SEO optimisation/manipulation ("key words") | -| [T0057 Organise Events](../../generated_pages/techniques/T0057.md) | IT00000012 Digital to physical "organize+promote" rallies & events? | DO NOT EDIT ABOVE THIS LINE - PLEASE ADD NOTES BELOW \ No newline at end of file diff --git a/generated_pages/incidents/I00006.md b/generated_pages/incidents/I00006.md index 5c5bbe8..0afef53 100644 --- a/generated_pages/incidents/I00006.md +++ b/generated_pages/incidents/I00006.md @@ -20,9 +20,6 @@ | Technique | Description given for this incident | | --------- | ------------------------- | -| [T0015 Create Hashtags and Search Artefacts](../../generated_pages/techniques/T0015.md) | IT00000027 Create and use hashtag | -| [T0039 Bait Influencer](../../generated_pages/techniques/T0039.md) | IT00000030 bait journalists/media/politicians | -| [T0151.004 Chat Platform](../../generated_pages/techniques/T0151.004.md) | IT00000025 Use SMS/text messages | DO NOT EDIT ABOVE THIS LINE - PLEASE ADD NOTES BELOW \ No newline at end of file diff --git a/generated_pages/incidents/I00007.md b/generated_pages/incidents/I00007.md index 10bf62c..d3ddc71 100644 --- a/generated_pages/incidents/I00007.md +++ b/generated_pages/incidents/I00007.md @@ -20,7 +20,6 @@ | Technique | Description given for this incident | | --------- | ------------------------- | -| [T0010 Cultivate Ignorant Agents](../../generated_pages/techniques/T0010.md) | IT00000033 cultivate, manipulate, exploit useful idiots (in the case Paul Manafort) | DO NOT EDIT ABOVE THIS LINE - PLEASE ADD NOTES BELOW \ No newline at end of file diff --git a/generated_pages/incidents/I00009.md b/generated_pages/incidents/I00009.md index 421bb04..472b340 100644 --- a/generated_pages/incidents/I00009.md +++ b/generated_pages/incidents/I00009.md @@ -20,7 +20,6 @@ | Technique | Description given for this incident | | --------- | ------------------------- | -| [T0045 Use Fake Experts](../../generated_pages/techniques/T0045.md) | IT00000036 Using "expert" | DO NOT EDIT ABOVE THIS LINE - PLEASE ADD NOTES BELOW \ No newline at end of file diff --git a/generated_pages/incidents/I00010.md b/generated_pages/incidents/I00010.md index cdeb5c1..17f3727 100644 --- a/generated_pages/incidents/I00010.md +++ b/generated_pages/incidents/I00010.md @@ -20,10 +20,6 @@ | Technique | Description given for this incident | | --------- | ------------------------- | -| [T0010 Cultivate Ignorant Agents](../../generated_pages/techniques/T0010.md) | IT00000044 cultivate, manipulate, exploit useful idiots (Alex Jones... drives conspiracy theories; false flags, crisis actors) | -| [T0020 Trial Content](../../generated_pages/techniques/T0020.md) | IT00000048 4Chan/8Chan - trial content | -| [T0039 Bait Influencer](../../generated_pages/techniques/T0039.md) | IT00000049 journalist/media baiting | -| [T0046 Use Search Engine Optimisation](../../generated_pages/techniques/T0046.md) | IT00000043 SEO optimisation/manipulation ("key words") | DO NOT EDIT ABOVE THIS LINE - PLEASE ADD NOTES BELOW \ No newline at end of file diff --git a/generated_pages/incidents/I00015.md b/generated_pages/incidents/I00015.md index ad6561d..588edca 100644 --- a/generated_pages/incidents/I00015.md +++ b/generated_pages/incidents/I00015.md @@ -20,8 +20,6 @@ | Technique | Description given for this incident | | --------- | ------------------------- | -| [T0039 Bait Influencer](../../generated_pages/techniques/T0039.md) | IT00000053 journalist/media baiting | -| [T0044 Seed Distortions](../../generated_pages/techniques/T0044.md) | IT00000052 Circulate to media via DM, then release publicly | DO NOT EDIT ABOVE THIS LINE - PLEASE ADD NOTES BELOW \ No newline at end of file diff --git a/generated_pages/incidents/I00017.md b/generated_pages/incidents/I00017.md index 09e1ae5..0e10503 100644 --- a/generated_pages/incidents/I00017.md +++ b/generated_pages/incidents/I00017.md @@ -20,13 +20,6 @@ | Technique | Description given for this incident | | --------- | ------------------------- | -| [T0010 Cultivate Ignorant Agents](../../generated_pages/techniques/T0010.md) | IT00000063 cultivate, manipulate, exploit useful idiots | -| [T0016 Create Clickbait](../../generated_pages/techniques/T0016.md) | IT00000073 Click-bait (economic actors) fake news sites (ie: Denver Guardian; Macedonian teens) | -| [T0018 Purchase Targeted Advertisements](../../generated_pages/techniques/T0018.md) | IT00000057 Targeted FB paid ads | -| [T0020 Trial Content](../../generated_pages/techniques/T0020.md) | IT00000070 4Chan/8Chan - trial content | -| [T0029 Online Polls](../../generated_pages/techniques/T0029.md) | IT00000060 manipulate social media "online polls"? | -| [T0046 Use Search Engine Optimisation](../../generated_pages/techniques/T0046.md) | IT00000071 SEO optimisation/manipulation ("key words") | -| [T0057 Organise Events](../../generated_pages/techniques/T0057.md) | IT00000059 Digital to physical "organize+promote" rallies & events | DO NOT EDIT ABOVE THIS LINE - PLEASE ADD NOTES BELOW \ No newline at end of file diff --git a/generated_pages/incidents/I00029.md b/generated_pages/incidents/I00029.md index f519da6..640ce0f 100644 --- a/generated_pages/incidents/I00029.md +++ b/generated_pages/incidents/I00029.md @@ -20,9 +20,6 @@ | Technique | Description given for this incident | | --------- | ------------------------- | -| [T0010 Cultivate Ignorant Agents](../../generated_pages/techniques/T0010.md) | IT00000084 cultivate, manipulate, exploit useful idiots | -| [T0040 Demand Insurmountable Proof](../../generated_pages/techniques/T0040.md) | IT00000089 Demand insurmountable proof | -| [T0046 Use Search Engine Optimisation](../../generated_pages/techniques/T0046.md) | IT00000085 SEO optimisation/manipulation ("key words") | DO NOT EDIT ABOVE THIS LINE - PLEASE ADD NOTES BELOW \ No newline at end of file diff --git a/generated_pages/incidents/I00032.md b/generated_pages/incidents/I00032.md index 0348fcb..ade83de 100644 --- a/generated_pages/incidents/I00032.md +++ b/generated_pages/incidents/I00032.md @@ -20,10 +20,6 @@ | Technique | Description given for this incident | | --------- | ------------------------- | -| [T0010 Cultivate Ignorant Agents](../../generated_pages/techniques/T0010.md) | IT00000104 cultivate, manipulate, exploit useful idiots (Alex Jones... drives conspiracy theories) | -| [T0020 Trial Content](../../generated_pages/techniques/T0020.md) | IT00000102 4Chan/8Chan - trial content | -| [T0046 Use Search Engine Optimisation](../../generated_pages/techniques/T0046.md) | IT00000103 SEO optimisation/manipulation ("key words") | -| [T0057 Organise Events](../../generated_pages/techniques/T0057.md) | IT00000093 Digital to physical "organize+promote" rallies & events? | DO NOT EDIT ABOVE THIS LINE - PLEASE ADD NOTES BELOW \ No newline at end of file diff --git a/generated_pages/incidents/I00033.md b/generated_pages/incidents/I00033.md index ffbfcaf..f8a1a4a 100644 --- a/generated_pages/incidents/I00033.md +++ b/generated_pages/incidents/I00033.md @@ -20,10 +20,6 @@ | Technique | Description given for this incident | | --------- | ------------------------- | -| [T0002 Facilitate State Propaganda](../../generated_pages/techniques/T0002.md) | IT00000110 facilitate state propaganda and defuse crises | -| [T0047 Censor Social Media as a Political Force](../../generated_pages/techniques/T0047.md) | IT00000108 cow online opinion leaders into submission, muzzling social media as a political force | -| [T0048 Harass](../../generated_pages/techniques/T0048.md) | IT00000109 cow online opinion leaders into submission, muzzling social media as a political force | -| [T0049 Flood Information Space](../../generated_pages/techniques/T0049.md) | IT00000105 2,000,000 people (est.) part of state run/sponsored astroturfing | DO NOT EDIT ABOVE THIS LINE - PLEASE ADD NOTES BELOW \ No newline at end of file diff --git a/generated_pages/incidents/I00034.md b/generated_pages/incidents/I00034.md index 48b10ef..85fc964 100644 --- a/generated_pages/incidents/I00034.md +++ b/generated_pages/incidents/I00034.md @@ -22,9 +22,6 @@ Unique for taking place outside of the Chinese Internet system, both transgressi | Technique | Description given for this incident | | --------- | ------------------------- | -| [T0002 Facilitate State Propaganda](../../generated_pages/techniques/T0002.md) | IT00000111 Netizens from one of the largest discussion forums in China, known as Diba, coordinated to overcome China’s Great Firewall | -| [T0049 Flood Information Space](../../generated_pages/techniques/T0049.md) | IT00000112 flood the Facebook pages of Taiwanese politicians and news agencies with a pro-PRC message | -| [T0049 Flood Information Space](../../generated_pages/techniques/T0049.md) | IT00000113 Democratic Progressive Party (DPP), attracted nearly 40,000 Facebook comments in just eight hours. | DO NOT EDIT ABOVE THIS LINE - PLEASE ADD NOTES BELOW \ No newline at end of file diff --git a/generated_pages/incidents/I00044.md b/generated_pages/incidents/I00044.md index 2355ec9..0ae2de6 100644 --- a/generated_pages/incidents/I00044.md +++ b/generated_pages/incidents/I00044.md @@ -20,9 +20,6 @@ | Technique | Description given for this incident | | --------- | ------------------------- | -| [T0010 Cultivate Ignorant Agents](../../generated_pages/techniques/T0010.md) | IT00000126 cultivate, manipulate, exploit useful idiots (Alex Jones... drives conspiracy theories) | -| [T0020 Trial Content](../../generated_pages/techniques/T0020.md) | IT00000124 4Chan/8Chan - trial content | -| [T0046 Use Search Engine Optimisation](../../generated_pages/techniques/T0046.md) | IT00000125 SEO optimisation/manipulation ("key words") | DO NOT EDIT ABOVE THIS LINE - PLEASE ADD NOTES BELOW \ No newline at end of file diff --git a/generated_pages/incidents/I00047.md b/generated_pages/incidents/I00047.md index 846b75f..5776246 100644 --- a/generated_pages/incidents/I00047.md +++ b/generated_pages/incidents/I00047.md @@ -21,8 +21,6 @@ The Russian Federal Security Service (FSB), which is also responsible for border | Technique | Description given for this incident | | --------- | ------------------------- | -| [T0023 Distort Facts](../../generated_pages/techniques/T0023.md) | IT00000130 (Distort) Kremlin-controlled RT cited Russian Minister of Foreign Affairs Sergei Lavrov suggesting that Ukraine deliberately provoked Russia in hopes of gaining additional support from the United States and Europe. | -| [T0040 Demand Insurmountable Proof](../../generated_pages/techniques/T0040.md) | IT00000133 Demand insurmountable proof | DO NOT EDIT ABOVE THIS LINE - PLEASE ADD NOTES BELOW \ No newline at end of file diff --git a/generated_pages/incidents/I00049.md b/generated_pages/incidents/I00049.md index 90d0ed7..cc299ef 100644 --- a/generated_pages/incidents/I00049.md +++ b/generated_pages/incidents/I00049.md @@ -20,8 +20,6 @@ | Technique | Description given for this incident | | --------- | ------------------------- | -| [T0010 Cultivate Ignorant Agents](../../generated_pages/techniques/T0010.md) | IT00000139 cultivate, manipulate, exploit useful idiots (Roger Waters; Venessa Beeley...) | -| [T0046 Use Search Engine Optimisation](../../generated_pages/techniques/T0046.md) | IT00000140 SEO optimisation/manipulation ("key words") | DO NOT EDIT ABOVE THIS LINE - PLEASE ADD NOTES BELOW \ No newline at end of file diff --git a/generated_pages/incidents/I00050.md b/generated_pages/incidents/I00050.md index 3854b69..cce31d1 100644 --- a/generated_pages/incidents/I00050.md +++ b/generated_pages/incidents/I00050.md @@ -23,8 +23,6 @@ Maduro has remained defiant in the face of domestic and international pressure, | Technique | Description given for this incident | | --------- | ------------------------- | -| [T0010 Cultivate Ignorant Agents](../../generated_pages/techniques/T0010.md) | IT00000148 cultivate, manipulate, exploit useful idiots (Roger Waters) | -| [T0046 Use Search Engine Optimisation](../../generated_pages/techniques/T0046.md) | IT00000149 SEO optimisation/manipulation ("key words") | DO NOT EDIT ABOVE THIS LINE - PLEASE ADD NOTES BELOW \ No newline at end of file diff --git a/generated_pages/incidents/I00051.md b/generated_pages/incidents/I00051.md index 8532ac6..c2df8d1 100644 --- a/generated_pages/incidents/I00051.md +++ b/generated_pages/incidents/I00051.md @@ -21,8 +21,6 @@ The FCO comments on the IfS were issued after a news report said the group had r | Technique | Description given for this incident | | --------- | ------------------------- | -| [T0010 Cultivate Ignorant Agents](../../generated_pages/techniques/T0010.md) | IT00000158 cultivate, manipulate, exploit useful idiots | -| [T0046 Use Search Engine Optimisation](../../generated_pages/techniques/T0046.md) | IT00000161 SEO optimisation/manipulation ("key words") | DO NOT EDIT ABOVE THIS LINE - PLEASE ADD NOTES BELOW \ No newline at end of file diff --git a/generated_pages/incidents/I00053.md b/generated_pages/incidents/I00053.md index 074136f..e0b4f05 100644 --- a/generated_pages/incidents/I00053.md +++ b/generated_pages/incidents/I00053.md @@ -21,9 +21,6 @@ Geopolitically complex issue combines US/China trade; Security concerns/issues r | Technique | Description given for this incident | | --------- | ------------------------- | -| [T0023 Distort Facts](../../generated_pages/techniques/T0023.md) | IT00000163 Distorted, saccharine “news” about the Chinese State and Party | -| [T0057 Organise Events](../../generated_pages/techniques/T0057.md) | IT00000164 Events coordinated and promoted across media platforms | -| [T0057 Organise Events](../../generated_pages/techniques/T0057.md) | IT00000166 Extend digital the physical space… gatherings ie: support for Meng outside courthouse | DO NOT EDIT ABOVE THIS LINE - PLEASE ADD NOTES BELOW \ No newline at end of file diff --git a/generated_pages/incidents/I00056.md b/generated_pages/incidents/I00056.md index 718ee62..19a40fa 100644 --- a/generated_pages/incidents/I00056.md +++ b/generated_pages/incidents/I00056.md @@ -21,8 +21,6 @@ While there is history to Iran’s information/influence operations, starting wi | Technique | Description given for this incident | | --------- | ------------------------- | -| [T0022 Leverage Conspiracy Theory Narratives](../../generated_pages/techniques/T0022.md) | IT00000174 Memes... anti-Isreal/USA/West, conspiracy narratives | -| [T0046 Use Search Engine Optimisation](../../generated_pages/techniques/T0046.md) | IT00000172 SEO optimisation/manipulation ("key words") | DO NOT EDIT ABOVE THIS LINE - PLEASE ADD NOTES BELOW \ No newline at end of file diff --git a/generated_pages/incidents/I00063.md b/generated_pages/incidents/I00063.md index 2d56fd0..b876196 100644 --- a/generated_pages/incidents/I00063.md +++ b/generated_pages/incidents/I00063.md @@ -20,8 +20,6 @@ | Technique | Description given for this incident | | --------- | ------------------------- | -| [T0010 Cultivate Ignorant Agents](../../generated_pages/techniques/T0010.md) | IT00000182 cultivate, manipulate, exploit useful idiots | -| [T0046 Use Search Engine Optimisation](../../generated_pages/techniques/T0046.md) | IT00000183 SEO optimisation/manipulation ("key words") | DO NOT EDIT ABOVE THIS LINE - PLEASE ADD NOTES BELOW \ No newline at end of file diff --git a/generated_pages/incidents/I00064.md b/generated_pages/incidents/I00064.md index 72d189b..c1febc4 100644 --- a/generated_pages/incidents/I00064.md +++ b/generated_pages/incidents/I00064.md @@ -21,8 +21,9 @@ | Technique | Description given for this incident | | --------- | ------------------------- | -| [T0143.003 Impersonated Persona](../../generated_pages/techniques/T0143.003.md) | IT00000242 “In the days leading up to the UK’s [2019] general election, youths looking for love online encountered a whole new kind of Tinder nightmare. A group of young activists built a Tinder chatbot to co-opt profiles and persuade swing voters to support Labour. The bot accounts sent 30,000-40,000 messages to targeted 18-25 year olds in battleground constituencies like Dudley North, which Labour ended up winning by only 22 votes. [...]

“The activists maintain that the project was meant to foster democratic engagement. But screenshots of the bots’ activity expose a harsher reality. Images of conversations between real users and these bots, posted on i-D, Mashable, as well as on Fowler and Goodman’s public Twitter accounts, show that the bots did not identify themselves as automated accounts, instead posing as the user whose profile they had taken over. While conducting research for this story, it turned out that a number of [the reporters’ friends] living in Oxford had interacted with the bot in the lead up to the election and had no idea that it was not a real person.”


In this example people offered up their real accounts for the automation of political messaging; the actors convinced the users to give up access to their accounts to use in the operation. The actors maintained the accounts’ existing persona, and presented themselves as potential romantic suitors for legitimate platform users (T0097:109 Romantic Suitor Persona, T0143.003: Impersonated Persona, T0146: Account, T0150.007: Rented, T0151.017: Dating Platform). | -| [T0150.007 Rented](../../generated_pages/techniques/T0150.007.md) | IT00000240 “In the days leading up to the UK’s [2019] general election, youths looking for love online encountered a whole new kind of Tinder nightmare. A group of young activists built a Tinder chatbot to co-opt profiles and persuade swing voters to support Labour. The bot accounts sent 30,000-40,000 messages to targeted 18-25 year olds in battleground constituencies like Dudley North, which Labour ended up winning by only 22 votes. [...]

“The activists maintain that the project was meant to foster democratic engagement. But screenshots of the bots’ activity expose a harsher reality. Images of conversations between real users and these bots, posted on i-D, Mashable, as well as on Fowler and Goodman’s public Twitter accounts, show that the bots did not identify themselves as automated accounts, instead posing as the user whose profile they had taken over. While conducting research for this story, it turned out that a number of [the reporters’ friends] living in Oxford had interacted with the bot in the lead up to the election and had no idea that it was not a real person.”


In this example people offered up their real accounts for the automation of political messaging; the actors convinced the users to give up access to their accounts to use in the operation. The actors maintained the accounts’ existing persona, and presented themselves as potential romantic suitors for legitimate platform users (T0097:109 Romantic Suitor Persona, T0143.003: Impersonated Persona, T0146: Account, T0150.007: Rented, T0151.017: Dating Platform). | +| [T0097.109 Romantic Suitor Persona](../../generated_pages/techniques/T0097.109.md) | IT00000241 “In the days leading up to the UK’s [2019] general election, youths looking for love online encountered a whole new kind of Tinder nightmare. A group of young activists built a Tinder chatbot to co-opt profiles and persuade swing voters to support Labour. The bot accounts sent 30,000-40,000 messages to targeted 18-25 year olds in battleground constituencies like Dudley North, which Labour ended up winning by only 22 votes. [...]

“The activists maintain that the project was meant to foster democratic engagement. But screenshots of the bots’ activity expose a harsher reality. Images of conversations between real users and these bots, posted on i-D, Mashable, as well as on Fowler and Goodman’s public Twitter accounts, show that the bots did not identify themselves as automated accounts, instead posing as the user whose profile they had taken over. While conducting research for this story, it turned out that a number of [the reporters’ friends] living in Oxford had interacted with the bot in the lead up to the election and had no idea that it was not a real person.”


In this example people offered up their real accounts for the automation of political messaging; the actors convinced the users to give up access to their accounts to use in the operation. The actors maintained the accounts’ existing persona, and presented themselves as potential romantic suitors for legitimate platform users (T0097:109 Romantic Suitor Persona, T0143.003: Impersonated Persona, T0146: Account Asset, T0150.007: Rented Asset, T0151.017: Dating Platform). | +| [T0143.003 Impersonated Persona](../../generated_pages/techniques/T0143.003.md) | IT00000242 “In the days leading up to the UK’s [2019] general election, youths looking for love online encountered a whole new kind of Tinder nightmare. A group of young activists built a Tinder chatbot to co-opt profiles and persuade swing voters to support Labour. The bot accounts sent 30,000-40,000 messages to targeted 18-25 year olds in battleground constituencies like Dudley North, which Labour ended up winning by only 22 votes. [...]

“The activists maintain that the project was meant to foster democratic engagement. But screenshots of the bots’ activity expose a harsher reality. Images of conversations between real users and these bots, posted on i-D, Mashable, as well as on Fowler and Goodman’s public Twitter accounts, show that the bots did not identify themselves as automated accounts, instead posing as the user whose profile they had taken over. While conducting research for this story, it turned out that a number of [the reporters’ friends] living in Oxford had interacted with the bot in the lead up to the election and had no idea that it was not a real person.”


In this example people offered up their real accounts for the automation of political messaging; the actors convinced the users to give up access to their accounts to use in the operation. The actors maintained the accounts’ existing persona, and presented themselves as potential romantic suitors for legitimate platform users (T0097:109 Romantic Suitor Persona, T0143.003: Impersonated Persona, T0146: Account Asset, T0150.007: Rented Asset, T0151.017: Dating Platform). | +| [T0150.007 Rented Asset](../../generated_pages/techniques/T0150.007.md) | IT00000240 “In the days leading up to the UK’s [2019] general election, youths looking for love online encountered a whole new kind of Tinder nightmare. A group of young activists built a Tinder chatbot to co-opt profiles and persuade swing voters to support Labour. The bot accounts sent 30,000-40,000 messages to targeted 18-25 year olds in battleground constituencies like Dudley North, which Labour ended up winning by only 22 votes. [...]

“The activists maintain that the project was meant to foster democratic engagement. But screenshots of the bots’ activity expose a harsher reality. Images of conversations between real users and these bots, posted on i-D, Mashable, as well as on Fowler and Goodman’s public Twitter accounts, show that the bots did not identify themselves as automated accounts, instead posing as the user whose profile they had taken over. While conducting research for this story, it turned out that a number of [the reporters’ friends] living in Oxford had interacted with the bot in the lead up to the election and had no idea that it was not a real person.”


In this example people offered up their real accounts for the automation of political messaging; the actors convinced the users to give up access to their accounts to use in the operation. The actors maintained the accounts’ existing persona, and presented themselves as potential romantic suitors for legitimate platform users (T0097:109 Romantic Suitor Persona, T0143.003: Impersonated Persona, T0146: Account Asset, T0150.007: Rented Asset, T0151.017: Dating Platform). | | [T0151.017 Dating Platform](../../generated_pages/techniques/T0151.017.md) | IT00000214 _"In the days leading up to the UK’s [2017] general election, youths looking for love online encountered a whole new kind of Tinder nightmare. A group of young activists built a Tinder chatbot to co-opt profiles and persuade swing voters to support Labour. The bot accounts sent 30,000-40,000 messages to targeted 18-25 year olds in battleground constituencies like Dudley North, which Labour ended up winning by only 22 votes._

_"Tinder is a dating app where users swipe right to indicate attraction and interest in a potential partner. If both people swipe right on each other’s profile, a dialogue box becomes available for them to privately chat. After meeting their crowdfunding goal of only £500, the team built a tool which took over and operated the accounts of recruited Tinder-users. By upgrading the profiles to Tinder Premium, the team was able to place bots in any contested constituency across the UK. Once planted, the bots swiped right on all users in the attempt to get the largest number of matches and inquire into their voting intentions."_

This incident matches T0151.017: Dating Platform, as users of Tinder were targeted in an attempt to persuade users to vote for a particular party in the upcoming election, rather than for the purpose of connecting those who were authentically interested in dating each other. | diff --git a/generated_pages/incidents/I00065.md b/generated_pages/incidents/I00065.md index b3a1fc4..e903849 100644 --- a/generated_pages/incidents/I00065.md +++ b/generated_pages/incidents/I00065.md @@ -21,7 +21,7 @@ | Technique | Description given for this incident | | --------- | ------------------------- | -| [T0097.110 Party Official Persona](../../generated_pages/techniques/T0097.110.md) | IT00000215 _”Overall, narratives promoted in the five operations appear to represent a concerted effort to discredit the ruling political coalition, widen existing domestic political divisions and project an image of coalition disunity in Poland. In each incident, content was primarily disseminated via Twitter, Facebook, and/ or Instagram accounts belonging to Polish politicians, all of whom have publicly claimed their accounts were compromised at the times the posts were made."_

This example demonstrates how threat actors can use compromised accounts to distribute inauthentic content while exploiting the legitimate account holder’s persona (T0097.110: Party Official Persona, T0143.003: Impersonated Persona, T0146: Account, T0150.005: Compromised). | +| [T0097.110 Party Official Persona](../../generated_pages/techniques/T0097.110.md) | IT00000215 _”Overall, narratives promoted in the five operations appear to represent a concerted effort to discredit the ruling political coalition, widen existing domestic political divisions and project an image of coalition disunity in Poland. In each incident, content was primarily disseminated via Twitter, Facebook, and/ or Instagram accounts belonging to Polish politicians, all of whom have publicly claimed their accounts were compromised at the times the posts were made."_

This example demonstrates how threat actors can use compromised accounts to distribute inauthentic content while exploiting the legitimate account holder’s persona (T0097.110: Party Official Persona, T0143.003: Impersonated Persona, T0146: Account Asset, T0150.005: Compromised Asset). | DO NOT EDIT ABOVE THIS LINE - PLEASE ADD NOTES BELOW \ No newline at end of file diff --git a/generated_pages/incidents/I00066.md b/generated_pages/incidents/I00066.md index 5c24329..e8b16f9 100644 --- a/generated_pages/incidents/I00066.md +++ b/generated_pages/incidents/I00066.md @@ -21,7 +21,7 @@ | Technique | Description given for this incident | | --------- | ------------------------- | -| [T0150.005 Compromised](../../generated_pages/techniques/T0150.005.md) | IT00000216 _"In the early hours of 24 May 2017, a news story appeared on the website of Qatar's official news agency, QNA, reporting that the country's emir, Sheikh Tamim bin Hamad al-Thani, had made an astonishing speech."_

_"[…]_

_"Qatar claimed that the QNA had been hacked. And they said the hack was designed to deliberately spread fake news about the country's leader and its foreign policies. The Qataris specifically blamed UAE, an allegation later repeated by a Washington Post report which cited US intelligence sources. The UAE categorically denied those reports._

_"But the story of the emir's speech unleashed a media free-for-all. Within minutes, Saudi and UAE-owned TV networks - Al Arabiya and Sky News Arabia - picked up on the comments attributed to al-Thani. Both networks accused Qatar of funding extremist groups and of destabilising the region."_

This incident demonstrates how threat actors used a compromised website to allow for an inauthentic narrative to be given a level of credibility which caused significant political fallout (T0097.202: News Outlet Persona, T0143.003: Impersonated Persona, T0152.004: Website, T0150.005: Compromised). | +| [T0150.005 Compromised Asset](../../generated_pages/techniques/T0150.005.md) | IT00000216 _"In the early hours of 24 May 2017, a news story appeared on the website of Qatar's official news agency, QNA, reporting that the country's emir, Sheikh Tamim bin Hamad al-Thani, had made an astonishing speech."_

_"[…]_

_"Qatar claimed that the QNA had been hacked. And they said the hack was designed to deliberately spread fake news about the country's leader and its foreign policies. The Qataris specifically blamed UAE, an allegation later repeated by a Washington Post report which cited US intelligence sources. The UAE categorically denied those reports._

_"But the story of the emir's speech unleashed a media free-for-all. Within minutes, Saudi and UAE-owned TV networks - Al Arabiya and Sky News Arabia - picked up on the comments attributed to al-Thani. Both networks accused Qatar of funding extremist groups and of destabilising the region."_

This incident demonstrates how threat actors used a compromised website to allow for an inauthentic narrative to be given a level of credibility which caused significant political fallout (T0097.202: News Outlet Persona, T0143.003: Impersonated Persona, T0152.004: Website Asset, T0150.005: Compromised Asset). | DO NOT EDIT ABOVE THIS LINE - PLEASE ADD NOTES BELOW \ No newline at end of file diff --git a/generated_pages/incidents/I00068.md b/generated_pages/incidents/I00068.md index 2d3519e..468bdc2 100644 --- a/generated_pages/incidents/I00068.md +++ b/generated_pages/incidents/I00068.md @@ -23,8 +23,9 @@ | --------- | ------------------------- | | [T0088.001 Develop AI-Generated Audio (Deepfakes)](../../generated_pages/techniques/T0088.001.md) | IT00000220 “While reports of [...] deepfake calls targeting private companies are luckily still rare, LastPass itself experienced a deepfake attempt earlier today that we are sharing with the larger community to help raise awareness that this tactic is spreading and all companies should be on the alert. In our case, an employee received a series of calls, texts, and at least one voicemail featuring an audio deepfake from a threat actor impersonating our CEO via WhatsApp. As the attempted communication was outside of normal business communication channels and due to the employee’s suspicion regarding the presence of many of the hallmarks of a social engineering attempt (such as forced urgency), our employee rightly ignored the messages and reported the incident to our internal security team so that we could take steps to both mitigate the threat and raise awareness of the tactic both internally and externally.”

In this example attackers impersonated the CEO of LastPass (T0097.100: Individual Persona, T0143.003: Impersonated Persona), targeting one of its employees over WhatsApp (T0151.004: Chat Platform,T0155.007: Encrypted Communication Channel) using deepfaked audio (T0088.001: Develop AI-Generated Audio (Deepfakes)). | | [T0097.100 Individual Persona](../../generated_pages/techniques/T0097.100.md) | IT00000221 “While reports of [...] deepfake calls targeting private companies are luckily still rare, LastPass itself experienced a deepfake attempt earlier today that we are sharing with the larger community to help raise awareness that this tactic is spreading and all companies should be on the alert. In our case, an employee received a series of calls, texts, and at least one voicemail featuring an audio deepfake from a threat actor impersonating our CEO via WhatsApp. As the attempted communication was outside of normal business communication channels and due to the employee’s suspicion regarding the presence of many of the hallmarks of a social engineering attempt (such as forced urgency), our employee rightly ignored the messages and reported the incident to our internal security team so that we could take steps to both mitigate the threat and raise awareness of the tactic both internally and externally.”

In this example attackers impersonated the CEO of LastPass (T0097.100: Individual Persona, T0143.003: Impersonated Persona), targeting one of its employees over WhatsApp (T0151.004: Chat Platform,T0155.007: Encrypted Communication Channel) using deepfaked audio (T0088.001: Develop AI-Generated Audio (Deepfakes)). | -| [T0143.003 Impersonated Persona](../../generated_pages/techniques/T0143.003.md) | IT00000222 “While reports of [...] deepfake calls targeting private companies are luckily still rare, LastPass itself experienced a deepfake attempt earlier today that we are sharing with the larger community to help raise awareness that this tactic is spreading and all companies should be on the alert. In our case, an employee received a series of calls, texts, and at least one voicemail featuring an audio deepfake from a threat actor impersonating our CEO via WhatsApp. As the attempted communication was outside of normal business communication channels and due to the employee’s suspicion regarding the presence of many of the hallmarks of a social engineering attempt (such as forced urgency), our employee rightly ignored the messages and reported the incident to our internal security team so that we could take steps to both mitigate the threat and raise awareness of the tactic both internally and externally.”

In this example attackers created an account on WhatsApp which impersonated the CEO of lastpass (T0097.100: Individual Persona, T0143.003: Impersonated Persona, T0146: Account, T0151.004: Chat Platform, T0155.007: Encrypted Communication Channel). They used this asset to target an employee using deepfaked audio (T0088.001: Develop AI-Generated Audio (Deepfakes)). | -| [T0151.004 Chat Platform](../../generated_pages/techniques/T0151.004.md) | IT00000219 “While reports of [...] deepfake calls targeting private companies are luckily still rare, LastPass itself experienced a deepfake attempt earlier today that we are sharing with the larger community to help raise awareness that this tactic is spreading and all companies should be on the alert. In our case, an employee received a series of calls, texts, and at least one voicemail featuring an audio deepfake from a threat actor impersonating our CEO via WhatsApp. As the attempted communication was outside of normal business communication channels and due to the employee’s suspicion regarding the presence of many of the hallmarks of a social engineering attempt (such as forced urgency), our employee rightly ignored the messages and reported the incident to our internal security team so that we could take steps to both mitigate the threat and raise awareness of the tactic both internally and externally.”

In this example attackers created an account on WhatsApp which impersonated the CEO of lastpass (T0097.100: Individual Persona, T0143.003: Impersonated Persona, T0146: Account, T0151.004: Chat Platform, T0155.007: Encrypted Communication Channel). They used this asset to target an employee using deepfaked audio (T0088.001: Develop AI-Generated Audio (Deepfakes)). | +| [T0143.003 Impersonated Persona](../../generated_pages/techniques/T0143.003.md) | IT00000222 “While reports of [...] deepfake calls targeting private companies are luckily still rare, LastPass itself experienced a deepfake attempt earlier today that we are sharing with the larger community to help raise awareness that this tactic is spreading and all companies should be on the alert. In our case, an employee received a series of calls, texts, and at least one voicemail featuring an audio deepfake from a threat actor impersonating our CEO via WhatsApp. As the attempted communication was outside of normal business communication channels and due to the employee’s suspicion regarding the presence of many of the hallmarks of a social engineering attempt (such as forced urgency), our employee rightly ignored the messages and reported the incident to our internal security team so that we could take steps to both mitigate the threat and raise awareness of the tactic both internally and externally.”

In this example attackers created an account on WhatsApp which impersonated the CEO of lastpass (T0097.100: Individual Persona, T0143.003: Impersonated Persona, T0146: Account Asset, T0151.004: Chat Platform, T0155.007: Encrypted Communication Channel). They used this asset to target an employee using deepfaked audio (T0088.001: Develop AI-Generated Audio (Deepfakes)). | +| [T0151.004 Chat Platform](../../generated_pages/techniques/T0151.004.md) | IT00000219 “While reports of [...] deepfake calls targeting private companies are luckily still rare, LastPass itself experienced a deepfake attempt earlier today that we are sharing with the larger community to help raise awareness that this tactic is spreading and all companies should be on the alert. In our case, an employee received a series of calls, texts, and at least one voicemail featuring an audio deepfake from a threat actor impersonating our CEO via WhatsApp. As the attempted communication was outside of normal business communication channels and due to the employee’s suspicion regarding the presence of many of the hallmarks of a social engineering attempt (such as forced urgency), our employee rightly ignored the messages and reported the incident to our internal security team so that we could take steps to both mitigate the threat and raise awareness of the tactic both internally and externally.”

In this example attackers created an account on WhatsApp which impersonated the CEO of lastpass (T0097.100: Individual Persona, T0143.003: Impersonated Persona, T0146: Account Asset, T0151.004: Chat Platform, T0155.007: Encrypted Communication Channel). They used this asset to target an employee using deepfaked audio (T0088.001: Develop AI-Generated Audio (Deepfakes)). | +| [T0155.007 Encrypted Communication Channel](../../generated_pages/techniques/T0155.007.md) |  IT00000547 “While reports of [...] deepfake calls targeting private companies are luckily still rare, LastPass itself experienced a deepfake attempt earlier today that we are sharing with the larger community to help raise awareness that this tactic is spreading and all companies should be on the alert. In our case, an employee received a series of calls, texts, and at least one voicemail featuring an audio deepfake from a threat actor impersonating our CEO via WhatsApp. As the attempted communication was outside of normal business communication channels and due to the employee’s suspicion regarding the presence of many of the hallmarks of a social engineering attempt (such as forced urgency), our employee rightly ignored the messages and reported the incident to our internal security team so that we could take steps to both mitigate the threat and raise awareness of the tactic both internally and externally.”

In this example attackers created an account on WhatsApp which impersonated the CEO of lastpass (T0097.100: Individual Persona, T0143.003: Impersonated Persona, T0146: Account Asset, T0151.004: Chat Platform, T0155.007: Encrypted Communication Channel). They used this asset to target an employee using deepfaked audio (T0088.001: Develop AI-Generated Audio (Deepfakes)). | DO NOT EDIT ABOVE THIS LINE - PLEASE ADD NOTES BELOW \ No newline at end of file diff --git a/generated_pages/incidents/I00071.md b/generated_pages/incidents/I00071.md index 5724d6e..bacc43e 100644 --- a/generated_pages/incidents/I00071.md +++ b/generated_pages/incidents/I00071.md @@ -22,12 +22,12 @@ | Technique | Description given for this incident | | --------- | ------------------------- | | [T0085.004 Develop Document](../../generated_pages/techniques/T0085.004.md) | IT00000324 “On August 16, 2022, pro-Kremlin Telegram channel Joker DPR (Джокер ДНР) published a forged letter allegedly written by Ukrainian Foreign Minister Dmytro Kuleba. In the letter, Kuleba supposedly asked relevant Polish authorities to rename Belwederska Street in Warsaw — the location of the Russian embassy building — as Stepan Bandera Street, in honor of the far-right nationalist who led the Ukrainian Insurgent Army during WWII.

[...]

The letter is not dated, and Dmytro Kuleba’s signature seems to be copied from a publicly available letter signed by him in 2021.”


In this example the Telegram channel Joker DPR published a forged letter (T0085.004: Develop Document) in which they impersonated the Ukrainian Minister of Foreign Affairs (T0097.111: Government Official Persona, T0143.003: Impersonated Persona), using Ministry letterhead (T0097.206: Government Institution Persona, T0143.003: Impersonated Persona). | -| [T0097.101 Local Persona](../../generated_pages/techniques/T0097.101.md) | IT00000238 “The August 17 [2022] Telegram post [which contained a falsified letter from the Ukrainian Minister of Foreign Affairs asking Poland to rename Belwederska Street in Warsaw — the location of the Russian embassy building — as Stepan Bandera Street, in honor of the far-right nationalist who led the Ukrainian Insurgent Army during WWII] also contained screenshots of Facebook posts that appeared on two Facebook accounts belonging to Polish nationals Piotr Górka, an expert in the history of the Polish Air Force, and Dariusz Walusiak, a Polish historian and documentary maker. The Górka post suggested that he fully supported the Polish government’s decision to change Belwederska Street to Stepan Bandera Street.

“In a statement to the DFRLab, Górka said his account was accessed without his consent. “This is not my post loaded to my Facebook page,” he explained. “My site was hacked, some days ago.” At the time of publishing, Piotr Górka’s post and his Facebook account were no longer accessible.

“The post on Górka’s Facebook page was shared by Dariusz Walusiak’s Facebook account; the account also reposted it on the Facebook walls of more than twenty other Facebook users, including Adam Kalita, currently working at Krakow branch of the Institute of National Remembrance; Jan Kasprzyk, head of the Office for War Veterans and Victims of Oppression; and Alicja Kondraciuk, a Polish public figure living in Krakow.

“Walusiak’s Facebook account is also no longer accessible. Given his work on Polish history and identity, it seems highly unlikely he would support the Bandera measure; the DFRLab has also reached out to him for comment.

“The fact that Joker DPR’s Telegram post included screenshots of their Facebook posts raises the strong possibility that both Facebook accounts were compromised, and that hackers planted false statements on their pages that would seem out of character for them in order to gain further attention to the forged documents.”


In this example, threat actors used compromised accounts of Polish historians who have enough relevant knowledge to plausibly weigh in on the forged letter’s narrative (T0143.003: Impersonated Persona, T0097.101: Local Persona, T0097.108: Expert Persona, T0146: Account, T0150.005: Compromised, T0151.001: Social Media Platform).

This matches T0097.108: Expert Persona because the impersonation exploited Górka and Walusiak’s existing personas as experts in Polish history. | -| [T0097.108 Expert Persona](../../generated_pages/techniques/T0097.108.md) | IT00000239 “The August 17 [2022] Telegram post [which contained a falsified letter from the Ukrainian Minister of Foreign Affairs asking Poland to rename Belwederska Street in Warsaw — the location of the Russian embassy building — as Stepan Bandera Street, in honor of the far-right nationalist who led the Ukrainian Insurgent Army during WWII] also contained screenshots of Facebook posts that appeared on two Facebook accounts belonging to Polish nationals Piotr Górka, an expert in the history of the Polish Air Force, and Dariusz Walusiak, a Polish historian and documentary maker. The Górka post suggested that he fully supported the Polish government’s decision to change Belwederska Street to Stepan Bandera Street.

“In a statement to the DFRLab, Górka said his account was accessed without his consent. “This is not my post loaded to my Facebook page,” he explained. “My site was hacked, some days ago.” At the time of publishing, Piotr Górka’s post and his Facebook account were no longer accessible.

“The post on Górka’s Facebook page was shared by Dariusz Walusiak’s Facebook account; the account also reposted it on the Facebook walls of more than twenty other Facebook users, including Adam Kalita, currently working at Krakow branch of the Institute of National Remembrance; Jan Kasprzyk, head of the Office for War Veterans and Victims of Oppression; and Alicja Kondraciuk, a Polish public figure living in Krakow.

“Walusiak’s Facebook account is also no longer accessible. Given his work on Polish history and identity, it seems highly unlikely he would support the Bandera measure; the DFRLab has also reached out to him for comment.

“The fact that Joker DPR’s Telegram post included screenshots of their Facebook posts raises the strong possibility that both Facebook accounts were compromised, and that hackers planted false statements on their pages that would seem out of character for them in order to gain further attention to the forged documents.”


In this example, threat actors used compromised accounts of Polish historians who have enough relevant knowledge to plausibly weigh in on the forged letter’s narrative (T0143.003: Impersonated Persona, T0097.101: Local Persona, T0097.108: Expert Persona, T0146: Account, T0150.005: Compromised, T0151.001: Social Media Platform).

This matches T0097.108: Expert Persona because the impersonation exploited Górka and Walusiak’s existing personas as experts in Polish history. | +| [T0097.101 Local Persona](../../generated_pages/techniques/T0097.101.md) | IT00000238 “The August 17 [2022] Telegram post [which contained a falsified letter from the Ukrainian Minister of Foreign Affairs asking Poland to rename Belwederska Street in Warsaw — the location of the Russian embassy building — as Stepan Bandera Street, in honor of the far-right nationalist who led the Ukrainian Insurgent Army during WWII] also contained screenshots of Facebook posts that appeared on two Facebook accounts belonging to Polish nationals Piotr Górka, an expert in the history of the Polish Air Force, and Dariusz Walusiak, a Polish historian and documentary maker. The Górka post suggested that he fully supported the Polish government’s decision to change Belwederska Street to Stepan Bandera Street.

“In a statement to the DFRLab, Górka said his account was accessed without his consent. “This is not my post loaded to my Facebook page,” he explained. “My site was hacked, some days ago.” At the time of publishing, Piotr Górka’s post and his Facebook account were no longer accessible.

“The post on Górka’s Facebook page was shared by Dariusz Walusiak’s Facebook account; the account also reposted it on the Facebook walls of more than twenty other Facebook users, including Adam Kalita, currently working at Krakow branch of the Institute of National Remembrance; Jan Kasprzyk, head of the Office for War Veterans and Victims of Oppression; and Alicja Kondraciuk, a Polish public figure living in Krakow.

“Walusiak’s Facebook account is also no longer accessible. Given his work on Polish history and identity, it seems highly unlikely he would support the Bandera measure; the DFRLab has also reached out to him for comment.

“The fact that Joker DPR’s Telegram post included screenshots of their Facebook posts raises the strong possibility that both Facebook accounts were compromised, and that hackers planted false statements on their pages that would seem out of character for them in order to gain further attention to the forged documents.”


In this example, threat actors used compromised accounts of Polish historians who have enough relevant knowledge to plausibly weigh in on the forged letter’s narrative (T0143.003: Impersonated Persona, T0097.101: Local Persona, T0097.108: Expert Persona, T0146: Account Asset, T0150.005: Compromised Asset, T0151.001: Social Media Platform).

This matches T0097.108: Expert Persona because the impersonation exploited Górka and Walusiak’s existing personas as experts in Polish history. | +| [T0097.108 Expert Persona](../../generated_pages/techniques/T0097.108.md) | IT00000239 “The August 17 [2022] Telegram post [which contained a falsified letter from the Ukrainian Minister of Foreign Affairs asking Poland to rename Belwederska Street in Warsaw — the location of the Russian embassy building — as Stepan Bandera Street, in honor of the far-right nationalist who led the Ukrainian Insurgent Army during WWII] also contained screenshots of Facebook posts that appeared on two Facebook accounts belonging to Polish nationals Piotr Górka, an expert in the history of the Polish Air Force, and Dariusz Walusiak, a Polish historian and documentary maker. The Górka post suggested that he fully supported the Polish government’s decision to change Belwederska Street to Stepan Bandera Street.

“In a statement to the DFRLab, Górka said his account was accessed without his consent. “This is not my post loaded to my Facebook page,” he explained. “My site was hacked, some days ago.” At the time of publishing, Piotr Górka’s post and his Facebook account were no longer accessible.

“The post on Górka’s Facebook page was shared by Dariusz Walusiak’s Facebook account; the account also reposted it on the Facebook walls of more than twenty other Facebook users, including Adam Kalita, currently working at Krakow branch of the Institute of National Remembrance; Jan Kasprzyk, head of the Office for War Veterans and Victims of Oppression; and Alicja Kondraciuk, a Polish public figure living in Krakow.

“Walusiak’s Facebook account is also no longer accessible. Given his work on Polish history and identity, it seems highly unlikely he would support the Bandera measure; the DFRLab has also reached out to him for comment.

“The fact that Joker DPR’s Telegram post included screenshots of their Facebook posts raises the strong possibility that both Facebook accounts were compromised, and that hackers planted false statements on their pages that would seem out of character for them in order to gain further attention to the forged documents.”


In this example, threat actors used compromised accounts of Polish historians who have enough relevant knowledge to plausibly weigh in on the forged letter’s narrative (T0143.003: Impersonated Persona, T0097.101: Local Persona, T0097.108: Expert Persona, T0146: Account Asset, T0150.005: Compromised Asset, T0151.001: Social Media Platform).

This matches T0097.108: Expert Persona because the impersonation exploited Górka and Walusiak’s existing personas as experts in Polish history. | | [T0097.111 Government Official Persona](../../generated_pages/techniques/T0097.111.md) | IT00000327 “On August 16, 2022, pro-Kremlin Telegram channel Joker DPR (Джокер ДНР) published a forged letter allegedly written by Ukrainian Foreign Minister Dmytro Kuleba. In the letter, Kuleba supposedly asked relevant Polish authorities to rename Belwederska Street in Warsaw — the location of the Russian embassy building — as Stepan Bandera Street, in honor of the far-right nationalist who led the Ukrainian Insurgent Army during WWII.

[...]

The letter is not dated, and Dmytro Kuleba’s signature seems to be copied from a publicly available letter signed by him in 2021.”


In this example the Telegram channel Joker DPR published a forged letter (T0085.004: Develop Document) in which they impersonated the Ukrainian Minister of Foreign Affairs (T0097.111: Government Official Persona, T0143.003: Impersonated Persona), using Ministry letterhead (T0097.206: Government Institution Persona, T0143.003: Impersonated Persona). | | [T0097.206 Government Institution Persona](../../generated_pages/techniques/T0097.206.md) | IT00000326 “On August 16, 2022, pro-Kremlin Telegram channel Joker DPR (Джокер ДНР) published a forged letter allegedly written by Ukrainian Foreign Minister Dmytro Kuleba. In the letter, Kuleba supposedly asked relevant Polish authorities to rename Belwederska Street in Warsaw — the location of the Russian embassy building — as Stepan Bandera Street, in honor of the far-right nationalist who led the Ukrainian Insurgent Army during WWII.

[...]

The letter is not dated, and Dmytro Kuleba’s signature seems to be copied from a publicly available letter signed by him in 2021.”


In this example the Telegram channel Joker DPR published a forged letter (T0085.004: Develop Document) in which they impersonated the Ukrainian Minister of Foreign Affairs (T0097.111: Government Official Persona, T0143.003: Impersonated Persona), using Ministry letterhead (T0097.206: Government Institution Persona, T0143.003: Impersonated Persona). | -| [T0143.003 Impersonated Persona](../../generated_pages/techniques/T0143.003.md) | IT00000237 “The August 17 [2022] Telegram post [which contained a falsified letter from the Ukrainian Minister of Foreign Affairs asking Poland to rename Belwederska Street in Warsaw — the location of the Russian embassy building — as Stepan Bandera Street, in honor of the far-right nationalist who led the Ukrainian Insurgent Army during WWII] also contained screenshots of Facebook posts that appeared on two Facebook accounts belonging to Polish nationals Piotr Górka, an expert in the history of the Polish Air Force, and Dariusz Walusiak, a Polish historian and documentary maker. The Górka post suggested that he fully supported the Polish government’s decision to change Belwederska Street to Stepan Bandera Street.

“In a statement to the DFRLab, Górka said his account was accessed without his consent. “This is not my post loaded to my Facebook page,” he explained. “My site was hacked, some days ago.” At the time of publishing, Piotr Górka’s post and his Facebook account were no longer accessible.

“The post on Górka’s Facebook page was shared by Dariusz Walusiak’s Facebook account; the account also reposted it on the Facebook walls of more than twenty other Facebook users, including Adam Kalita, currently working at Krakow branch of the Institute of National Remembrance; Jan Kasprzyk, head of the Office for War Veterans and Victims of Oppression; and Alicja Kondraciuk, a Polish public figure living in Krakow.

“Walusiak’s Facebook account is also no longer accessible. Given his work on Polish history and identity, it seems highly unlikely he would support the Bandera measure; the DFRLab has also reached out to him for comment.

“The fact that Joker DPR’s Telegram post included screenshots of their Facebook posts raises the strong possibility that both Facebook accounts were compromised, and that hackers planted false statements on their pages that would seem out of character for them in order to gain further attention to the forged documents.”


In this example, threat actors used compromised accounts of Polish historians who have enough relevant knowledge to plausibly weigh in on the forged letter’s narrative (T0143.003: Impersonated Persona, T0097.101: Local Persona, T0097.108: Expert Persona, T0146: Account, T0150.005: Compromised, T0151.001: Social Media Platform).

This matches T0097.108: Expert Persona because the impersonation exploited Górka and Walusiak’s existing personas as experts in Polish history. | -| [T0150.005 Compromised](../../generated_pages/techniques/T0150.005.md) | IT00000236 “The August 17 [2022] Telegram post [which contained a falsified letter from the Ukrainian Minister of Foreign Affairs asking Poland to rename Belwederska Street in Warsaw — the location of the Russian embassy building — as Stepan Bandera Street, in honor of the far-right nationalist who led the Ukrainian Insurgent Army during WWII] also contained screenshots of Facebook posts that appeared on two Facebook accounts belonging to Polish nationals Piotr Górka, an expert in the history of the Polish Air Force, and Dariusz Walusiak, a Polish historian and documentary maker. The Górka post suggested that he fully supported the Polish government’s decision to change Belwederska Street to Stepan Bandera Street.

“In a statement to the DFRLab, Górka said his account was accessed without his consent. “This is not my post loaded to my Facebook page,” he explained. “My site was hacked, some days ago.” At the time of publishing, Piotr Górka’s post and his Facebook account were no longer accessible.

“The post on Górka’s Facebook page was shared by Dariusz Walusiak’s Facebook account; the account also reposted it on the Facebook walls of more than twenty other Facebook users, including Adam Kalita, currently working at Krakow branch of the Institute of National Remembrance; Jan Kasprzyk, head of the Office for War Veterans and Victims of Oppression; and Alicja Kondraciuk, a Polish public figure living in Krakow.

“Walusiak’s Facebook account is also no longer accessible. Given his work on Polish history and identity, it seems highly unlikely he would support the Bandera measure; the DFRLab has also reached out to him for comment.

“The fact that Joker DPR’s Telegram post included screenshots of their Facebook posts raises the strong possibility that both Facebook accounts were compromised, and that hackers planted false statements on their pages that would seem out of character for them in order to gain further attention to the forged documents.”


In this example, threat actors used compromised accounts of Polish historians who have enough relevant knowledge to plausibly weigh in on the forged letter’s narrative (T0143.003: Impersonated Persona, T0097.101: Local Persona, T0097.108: Expert Persona, T0146: Account, T0150.005: Compromised, T0151.001: Social Media Platform).

This matches T0097.108: Expert Persona because the impersonation exploited Górka and Walusiak’s existing personas as experts in Polish history. | +| [T0143.003 Impersonated Persona](../../generated_pages/techniques/T0143.003.md) | IT00000237 “The August 17 [2022] Telegram post [which contained a falsified letter from the Ukrainian Minister of Foreign Affairs asking Poland to rename Belwederska Street in Warsaw — the location of the Russian embassy building — as Stepan Bandera Street, in honor of the far-right nationalist who led the Ukrainian Insurgent Army during WWII] also contained screenshots of Facebook posts that appeared on two Facebook accounts belonging to Polish nationals Piotr Górka, an expert in the history of the Polish Air Force, and Dariusz Walusiak, a Polish historian and documentary maker. The Górka post suggested that he fully supported the Polish government’s decision to change Belwederska Street to Stepan Bandera Street.

“In a statement to the DFRLab, Górka said his account was accessed without his consent. “This is not my post loaded to my Facebook page,” he explained. “My site was hacked, some days ago.” At the time of publishing, Piotr Górka’s post and his Facebook account were no longer accessible.

“The post on Górka’s Facebook page was shared by Dariusz Walusiak’s Facebook account; the account also reposted it on the Facebook walls of more than twenty other Facebook users, including Adam Kalita, currently working at Krakow branch of the Institute of National Remembrance; Jan Kasprzyk, head of the Office for War Veterans and Victims of Oppression; and Alicja Kondraciuk, a Polish public figure living in Krakow.

“Walusiak’s Facebook account is also no longer accessible. Given his work on Polish history and identity, it seems highly unlikely he would support the Bandera measure; the DFRLab has also reached out to him for comment.

“The fact that Joker DPR’s Telegram post included screenshots of their Facebook posts raises the strong possibility that both Facebook accounts were compromised, and that hackers planted false statements on their pages that would seem out of character for them in order to gain further attention to the forged documents.”


In this example, threat actors used compromised accounts of Polish historians who have enough relevant knowledge to plausibly weigh in on the forged letter’s narrative (T0143.003: Impersonated Persona, T0097.101: Local Persona, T0097.108: Expert Persona, T0146: Account Asset, T0150.005: Compromised Asset, T0151.001: Social Media Platform).

This matches T0097.108: Expert Persona because the impersonation exploited Górka and Walusiak’s existing personas as experts in Polish history. | +| [T0150.005 Compromised Asset](../../generated_pages/techniques/T0150.005.md) | IT00000236 “The August 17 [2022] Telegram post [which contained a falsified letter from the Ukrainian Minister of Foreign Affairs asking Poland to rename Belwederska Street in Warsaw — the location of the Russian embassy building — as Stepan Bandera Street, in honor of the far-right nationalist who led the Ukrainian Insurgent Army during WWII] also contained screenshots of Facebook posts that appeared on two Facebook accounts belonging to Polish nationals Piotr Górka, an expert in the history of the Polish Air Force, and Dariusz Walusiak, a Polish historian and documentary maker. The Górka post suggested that he fully supported the Polish government’s decision to change Belwederska Street to Stepan Bandera Street.

“In a statement to the DFRLab, Górka said his account was accessed without his consent. “This is not my post loaded to my Facebook page,” he explained. “My site was hacked, some days ago.” At the time of publishing, Piotr Górka’s post and his Facebook account were no longer accessible.

“The post on Górka’s Facebook page was shared by Dariusz Walusiak’s Facebook account; the account also reposted it on the Facebook walls of more than twenty other Facebook users, including Adam Kalita, currently working at Krakow branch of the Institute of National Remembrance; Jan Kasprzyk, head of the Office for War Veterans and Victims of Oppression; and Alicja Kondraciuk, a Polish public figure living in Krakow.

“Walusiak’s Facebook account is also no longer accessible. Given his work on Polish history and identity, it seems highly unlikely he would support the Bandera measure; the DFRLab has also reached out to him for comment.

“The fact that Joker DPR’s Telegram post included screenshots of their Facebook posts raises the strong possibility that both Facebook accounts were compromised, and that hackers planted false statements on their pages that would seem out of character for them in order to gain further attention to the forged documents.”


In this example, threat actors used compromised accounts of Polish historians who have enough relevant knowledge to plausibly weigh in on the forged letter’s narrative (T0143.003: Impersonated Persona, T0097.101: Local Persona, T0097.108: Expert Persona, T0146: Account Asset, T0150.005: Compromised Asset, T0151.001: Social Media Platform).

This matches T0097.108: Expert Persona because the impersonation exploited Górka and Walusiak’s existing personas as experts in Polish history. | DO NOT EDIT ABOVE THIS LINE - PLEASE ADD NOTES BELOW \ No newline at end of file diff --git a/generated_pages/incidents/I00072.md b/generated_pages/incidents/I00072.md index 8fb9b28..148899e 100644 --- a/generated_pages/incidents/I00072.md +++ b/generated_pages/incidents/I00072.md @@ -21,10 +21,10 @@ | Technique | Description given for this incident | | --------- | ------------------------- | -| [T0097.204 Think Tank Persona](../../generated_pages/techniques/T0097.204.md) | IT00000244 “The creator of Geopolitika[.]ru is Aleksandr Dugin, who was sanctioned by the United States Department of Treasury in 2015 for his role in the Eurasian Youth Union “for being responsible for or complicit in actions or policies that threaten the peace, security, stability, or sovereignty or territorial integrity of Ukraine.”

[...]

“Currently, the website geopolika[.]ru redirects directly to another partner website, Katehon.

“Katehon poses itself as a think tank focused on geopolitics in an English edition of its website. In contrast, in Russian, it states its aim to develop “ideological, political, diplomatic, economic and military strategy for Russia of the future” with a special role of religion. The president of Katehon’s supervisory board is Konstantin Malofeev, a Russian millionaire with connections to the Russian orthodox church and presidential administration, who founded Tsargrad TV, a known source of disinformation. Malofeev was sanctioned by the U.S. Department of Treasury and the European Union in 2014 for material support and financial backing of Russian-backed separatists in eastern Ukraine. Another known figure from the board is Sergei Glaziev, former advisor to Putin in 2012–2019. Dugin is also on the board in the Russian edition of the website, whereas he is omitted in English.”
In this example a domain managed by an actor previously sanctioned by the US department of treasury has been reconfigured to redirect to another website; Katehon (T0149.004: Redirecting Domain, T0150.004: Repurposed).

Katehon presents itself as a geopolitical think tank in English, but does not maintain this persona when presenting itself to a Russian speaking audience (T0097.204: Think Tank Persona, T0152.004: Website, T0155.004: Geoblocked). | -| [T0149.004 Redirecting Domain](../../generated_pages/techniques/T0149.004.md) | IT00000243 “The creator of Geopolitika[.]ru is Aleksandr Dugin, who was sanctioned by the United States Department of Treasury in 2015 for his role in the Eurasian Youth Union “for being responsible for or complicit in actions or policies that threaten the peace, security, stability, or sovereignty or territorial integrity of Ukraine.”

[...]

“Currently, the website geopolika[.]ru redirects directly to another partner website, Katehon.

“Katehon poses itself as a think tank focused on geopolitics in an English edition of its website. In contrast, in Russian, it states its aim to develop “ideological, political, diplomatic, economic and military strategy for Russia of the future” with a special role of religion. The president of Katehon’s supervisory board is Konstantin Malofeev, a Russian millionaire with connections to the Russian orthodox church and presidential administration, who founded Tsargrad TV, a known source of disinformation. Malofeev was sanctioned by the U.S. Department of Treasury and the European Union in 2014 for material support and financial backing of Russian-backed separatists in eastern Ukraine. Another known figure from the board is Sergei Glaziev, former advisor to Putin in 2012–2019. Dugin is also on the board in the Russian edition of the website, whereas he is omitted in English.”
In this example a domain managed by an actor previously sanctioned by the US department of treasury has been reconfigured to redirect to another website; Katehon (T0149.004: Redirecting Domain, T0150.004: Repurposed).

Katehon presents itself as a geopolitical think tank in English, but does not maintain this persona when presenting itself to a Russian speaking audience (T0097.204: Think Tank Persona, T0152.004: Website, T0155.004: Geoblocked). | -| [T0150.004 Repurposed](../../generated_pages/techniques/T0150.004.md) | IT00000345 “The creator of Geopolitika[.]ru is Aleksandr Dugin, who was sanctioned by the United States Department of Treasury in 2015 for his role in the Eurasian Youth Union “for being responsible for or complicit in actions or policies that threaten the peace, security, stability, or sovereignty or territorial integrity of Ukraine.”

[...]

“Currently, the website geopolika[.]ru redirects directly to another partner website, Katehon.

“Katehon poses itself as a think tank focused on geopolitics in an English edition of its website. In contrast, in Russian, it states its aim to develop “ideological, political, diplomatic, economic and military strategy for Russia of the future” with a special role of religion. The president of Katehon’s supervisory board is Konstantin Malofeev, a Russian millionaire with connections to the Russian orthodox church and presidential administration, who founded Tsargrad TV, a known source of disinformation. Malofeev was sanctioned by the U.S. Department of Treasury and the European Union in 2014 for material support and financial backing of Russian-backed separatists in eastern Ukraine. Another known figure from the board is Sergei Glaziev, former advisor to Putin in 2012–2019. Dugin is also on the board in the Russian edition of the website, whereas he is omitted in English.”
In this example a domain managed by an actor previously sanctioned by the US department of treasury has been reconfigured to redirect to another website; Katehon (T0149.004: Redirecting Domain, T0150.004: Repurposed).

Katehon presents itself as a geopolitical think tank in English, but does not maintain this persona when presenting itself to a Russian speaking audience (T0097.204: Think Tank Persona, T0152.004: Website, T0155.004: Geoblocked). | -| [T0155.004 Geoblocked](../../generated_pages/techniques/T0155.004.md) | IT00000346 “The creator of Geopolitika[.]ru is Aleksandr Dugin, who was sanctioned by the United States Department of Treasury in 2015 for his role in the Eurasian Youth Union “for being responsible for or complicit in actions or policies that threaten the peace, security, stability, or sovereignty or territorial integrity of Ukraine.”

[...]

“Currently, the website geopolika[.]ru redirects directly to another partner website, Katehon.

“Katehon poses itself as a think tank focused on geopolitics in an English edition of its website. In contrast, in Russian, it states its aim to develop “ideological, political, diplomatic, economic and military strategy for Russia of the future” with a special role of religion. The president of Katehon’s supervisory board is Konstantin Malofeev, a Russian millionaire with connections to the Russian orthodox church and presidential administration, who founded Tsargrad TV, a known source of disinformation. Malofeev was sanctioned by the U.S. Department of Treasury and the European Union in 2014 for material support and financial backing of Russian-backed separatists in eastern Ukraine. Another known figure from the board is Sergei Glaziev, former advisor to Putin in 2012–2019. Dugin is also on the board in the Russian edition of the website, whereas he is omitted in English.”
In this example a domain managed by an actor previously sanctioned by the US department of treasury has been reconfigured to redirect to another website; Katehon (T0149.004: Redirecting Domain, T0150.004: Repurposed).

Katehon presents itself as a geopolitical think tank in English, but does not maintain this persona when presenting itself to a Russian speaking audience (T0097.204: Think Tank Persona, T0152.004: Website, T0155.004: Geoblocked). | +| [T0097.204 Think Tank Persona](../../generated_pages/techniques/T0097.204.md) | IT00000244 “The creator of Geopolitika[.]ru is Aleksandr Dugin, who was sanctioned by the United States Department of Treasury in 2015 for his role in the Eurasian Youth Union “for being responsible for or complicit in actions or policies that threaten the peace, security, stability, or sovereignty or territorial integrity of Ukraine.”

[...]

“Currently, the website geopolika[.]ru redirects directly to another partner website, Katehon.

“Katehon poses itself as a think tank focused on geopolitics in an English edition of its website. In contrast, in Russian, it states its aim to develop “ideological, political, diplomatic, economic and military strategy for Russia of the future” with a special role of religion. The president of Katehon’s supervisory board is Konstantin Malofeev, a Russian millionaire with connections to the Russian orthodox church and presidential administration, who founded Tsargrad TV, a known source of disinformation. Malofeev was sanctioned by the U.S. Department of Treasury and the European Union in 2014 for material support and financial backing of Russian-backed separatists in eastern Ukraine. Another known figure from the board is Sergei Glaziev, former advisor to Putin in 2012–2019. Dugin is also on the board in the Russian edition of the website, whereas he is omitted in English.”


In this example a domain managed by an actor previously sanctioned by the US department of treasury has been reconfigured to redirect to another website; Katehon (T0149.004: Redirecting Domain Asset, T0150.004: Repurposed Asset).

Katehon presents itself as a geopolitical think tank in English, but does not maintain this persona when presenting itself to a Russian speaking audience (T0097.204: Think Tank Persona, T0152.004: Website Asset, T0155.004: Geoblocked Asset). | +| [T0149.004 Redirecting Domain Asset](../../generated_pages/techniques/T0149.004.md) | IT00000243 “The creator of Geopolitika[.]ru is Aleksandr Dugin, who was sanctioned by the United States Department of Treasury in 2015 for his role in the Eurasian Youth Union “for being responsible for or complicit in actions or policies that threaten the peace, security, stability, or sovereignty or territorial integrity of Ukraine.”

[...]

“Currently, the website geopolika[.]ru redirects directly to another partner website, Katehon.

“Katehon poses itself as a think tank focused on geopolitics in an English edition of its website. In contrast, in Russian, it states its aim to develop “ideological, political, diplomatic, economic and military strategy for Russia of the future” with a special role of religion. The president of Katehon’s supervisory board is Konstantin Malofeev, a Russian millionaire with connections to the Russian orthodox church and presidential administration, who founded Tsargrad TV, a known source of disinformation. Malofeev was sanctioned by the U.S. Department of Treasury and the European Union in 2014 for material support and financial backing of Russian-backed separatists in eastern Ukraine. Another known figure from the board is Sergei Glaziev, former advisor to Putin in 2012–2019. Dugin is also on the board in the Russian edition of the website, whereas he is omitted in English.”


In this example a domain managed by an actor previously sanctioned by the US department of treasury has been reconfigured to redirect to another website; Katehon (T0149.004: Redirecting Domain Asset, T0150.004: Repurposed Asset).

Katehon presents itself as a geopolitical think tank in English, but does not maintain this persona when presenting itself to a Russian speaking audience (T0097.204: Think Tank Persona, T0152.004: Website Asset, T0155.004: Geoblocked Asset). | +| [T0150.004 Repurposed Asset](../../generated_pages/techniques/T0150.004.md) | IT00000345 “The creator of Geopolitika[.]ru is Aleksandr Dugin, who was sanctioned by the United States Department of Treasury in 2015 for his role in the Eurasian Youth Union “for being responsible for or complicit in actions or policies that threaten the peace, security, stability, or sovereignty or territorial integrity of Ukraine.”

[...]

“Currently, the website geopolika[.]ru redirects directly to another partner website, Katehon.

“Katehon poses itself as a think tank focused on geopolitics in an English edition of its website. In contrast, in Russian, it states its aim to develop “ideological, political, diplomatic, economic and military strategy for Russia of the future” with a special role of religion. The president of Katehon’s supervisory board is Konstantin Malofeev, a Russian millionaire with connections to the Russian orthodox church and presidential administration, who founded Tsargrad TV, a known source of disinformation. Malofeev was sanctioned by the U.S. Department of Treasury and the European Union in 2014 for material support and financial backing of Russian-backed separatists in eastern Ukraine. Another known figure from the board is Sergei Glaziev, former advisor to Putin in 2012–2019. Dugin is also on the board in the Russian edition of the website, whereas he is omitted in English.”


In this example a domain managed by an actor previously sanctioned by the US department of treasury has been reconfigured to redirect to another website; Katehon (T0149.004: Redirecting Domain Asset, T0150.004: Repurposed Asset).

Katehon presents itself as a geopolitical think tank in English, but does not maintain this persona when presenting itself to a Russian speaking audience (T0097.204: Think Tank Persona, T0152.004: Website Asset, T0155.004: Geoblocked Asset). | +| [T0155.004 Geoblocked Asset](../../generated_pages/techniques/T0155.004.md) | IT00000346 “The creator of Geopolitika[.]ru is Aleksandr Dugin, who was sanctioned by the United States Department of Treasury in 2015 for his role in the Eurasian Youth Union “for being responsible for or complicit in actions or policies that threaten the peace, security, stability, or sovereignty or territorial integrity of Ukraine.”

[...]

“Currently, the website geopolika[.]ru redirects directly to another partner website, Katehon.

“Katehon poses itself as a think tank focused on geopolitics in an English edition of its website. In contrast, in Russian, it states its aim to develop “ideological, political, diplomatic, economic and military strategy for Russia of the future” with a special role of religion. The president of Katehon’s supervisory board is Konstantin Malofeev, a Russian millionaire with connections to the Russian orthodox church and presidential administration, who founded Tsargrad TV, a known source of disinformation. Malofeev was sanctioned by the U.S. Department of Treasury and the European Union in 2014 for material support and financial backing of Russian-backed separatists in eastern Ukraine. Another known figure from the board is Sergei Glaziev, former advisor to Putin in 2012–2019. Dugin is also on the board in the Russian edition of the website, whereas he is omitted in English.”


In this example a domain managed by an actor previously sanctioned by the US department of treasury has been reconfigured to redirect to another website; Katehon (T0149.004: Redirecting Domain Asset, T0150.004: Repurposed Asset).

Katehon presents itself as a geopolitical think tank in English, but does not maintain this persona when presenting itself to a Russian speaking audience (T0097.204: Think Tank Persona, T0152.004: Website Asset, T0155.004: Geoblocked Asset). | DO NOT EDIT ABOVE THIS LINE - PLEASE ADD NOTES BELOW \ No newline at end of file diff --git a/generated_pages/incidents/I00074.md b/generated_pages/incidents/I00074.md index 168031b..ac55031 100644 --- a/generated_pages/incidents/I00074.md +++ b/generated_pages/incidents/I00074.md @@ -24,7 +24,7 @@ | [T0097.106 Recruiter Persona](../../generated_pages/techniques/T0097.106.md) | IT00000248 “A few press investigations have alluded to the [Russia’s Internet Research Agency]’s job ads. The extent of the human asset recruitment strategy is revealed in the organic data set. It is expansive, and was clearly a priority. Posts encouraging Americans to perform various types of tasks for IRA handlers appeared in Black, Left, and Right-targeted groups, though they were most numerous in the Black community. They included:

- Requests for contact with preachers from Black churches (Black_Baptist_Church)
- Offers of free counsellingcounseling to people with sexual addiction (Army of Jesus)
- Soliciting volunteers to hand out fliers
- Soliciting volunteers to teach self-defense classes
- Offering free self-defense classes (Black Fist/Fit Black)
- Requests for followers to attend political rallies
- Requests for photographers to document protests
- Requests for speakers at protests
- Requests to protest the Westborough Baptist Church (LGBT United)
- Job offers for designers to help design fliers, sites, Facebook sticker packs
- Requests for female followers to send photos for a calendar
- Requests for followers to send photos to be shared to the Page (Back the Badge)
- Soliciting videos for a YouTube contest called “Pee on Hillary”
- Encouraging people to apply to be part of a Black reality TV show
- Posting a wide variety of job ads (write for BlackMattersUS and others)
- Requests for lawyers to volunteer to assist with immigration cases”


This behaviour matches T0097.106: Recruiter Persona because the threat actors are presenting tasks for their target audience to complete in the style of a job posting (even though some of the tasks were presented as voluntary / unpaid efforts), including calls for people to attend political rallies (T0126.001: Call to Action to Attend). | | [T0097.202 News Outlet Persona](../../generated_pages/techniques/T0097.202.md) | IT00000250 “The Black Matters Facebook Page [operated by Russia’s Internet Research Agency] explored several visual brand identities, moving from a plain logo to a gothic typeface on Jan 19th, 2016. On February 4th, 2016, the person who ran the Facebook Page announced the launch of the website, blackmattersus[.]com, emphasizing media distrust and a desire to build Black independent media; [“I DIDN’T BELIEVE THE MEDIA / SO I BECAME ONE”]”

In this example an asset controlled by Russia’s Internet Research Agency began to present itself as a source of “Black independent media”, claiming that the media could not be trusted (T0097.208: Social Cause Persona, T0097.202: News Outlet Persona, T0143.002: Fabricated Persona). | | [T0097.204 Think Tank Persona](../../generated_pages/techniques/T0097.204.md) | IT00000245 “[Russia’s Internet Research Agency, the IRA] pushed narratives with longform blog content. They created media properties, websites designed to produce stories that would resonate with those targeted. It appears, based on the data set provided by Alphabet, that the IRA may have also expanded into think tank-style communiques. One such page, previously unattributed to the IRA but included in the Alphabet data, was GI Analytics, a geopolitics blog with an international masthead that included American authors. This page was promoted via AdWords and YouTube videos; it has strong ties to more traditional Russian propaganda networks, which will be discussed later in this analysis. GI Analytics wrote articles articulating nuanced academic positions on a variety of sophisticated topics. From the site’s About page:

““Our purpose and mission are to provide high-quality analysis at a time when we are faced with a multitude of crises, a collapsing global economy, imperialist wars, environmental disasters, corporate greed, terrorism, deceit, GMO food, a migration crisis and a crackdown on small farmers and ranchers.””


In this example Alphabet’s technical indicators allowed them to assert that GI Analytics, which presented itself as a think tank, was a fabricated institution associated with Russia’s Internet Research Agency (T0097.204: Think Tank Persona, T0143.002: Fabricated Persona). | -| [T0097.208 Social Cause Persona](../../generated_pages/techniques/T0097.208.md) | IT00000251 “The Black Matters Facebook Page [operated by Russia’s Internet Research Agency] explored several visual brand identities, moving from a plain logo to a gothic typeface on Jan 19th, 2016. On February 4th, 2016, the person who ran the Facebook Page announced the launch of the website, blackmattersus[.]com, emphasizing media distrust and a desire to build Black independent media; [“I DIDN’T BELIEVE THE MEDIA / SO I BECAME ONE”]”

In this example an asset controlled by Russia’s Internet Research Agency began to present itself as a source of “Black independent media”, claiming that the media could not be trusted (T0097.208: Social Cause Persona, T0097.202: News Outlet Persona, T0143.002: Fabricated Persona). | +| [T0097.208 Social Cause Persona](../../generated_pages/techniques/T0097.208.md) | IT00000251 “The Black Matters Facebook Page [operated by Russia’s Internet Research Agency] explored several visual brand identities, moving from a plain logo to a gothic typeface on Jan 19th, 2016. On February 4th, 2016, the person who ran the Facebook Page announced the launch of the website, blackmattersus[.]com, emphasizing media distrust and a desire to build Black independent media; [“I DIDN’T BELIEVE THE MEDIA / SO I BECAME ONE”]”

In this example an asset controlled by Russia’s Internet Research Agency began to present itself as a source of “Black independent media”, claiming that the media could not be trusted (T0097.208: Social Cause Persona, T0097.202: News Outlet Persona, T0143.002: Fabricated Persona). | | [T0126.001 Call to Action to Attend](../../generated_pages/techniques/T0126.001.md) | IT00000247 “A few press investigations have alluded to the [Russia’s Internet Research Agency]’s job ads. The extent of the human asset recruitment strategy is revealed in the organic data set. It is expansive, and was clearly a priority. Posts encouraging Americans to perform various types of tasks for IRA handlers appeared in Black, Left, and Right-targeted groups, though they were most numerous in the Black community. They included:

- Requests for contact with preachers from Black churches (Black_Baptist_Church)
- Offers of free counsellingcounseling to people with sexual addiction (Army of Jesus)
- Soliciting volunteers to hand out fliers
- Soliciting volunteers to teach self-defense classes
- Offering free self-defense classes (Black Fist/Fit Black)
- Requests for followers to attend political rallies
- Requests for photographers to document protests
- Requests for speakers at protests
- Requests to protest the Westborough Baptist Church (LGBT United)
- Job offers for designers to help design fliers, sites, Facebook sticker packs
- Requests for female followers to send photos for a calendar
- Requests for followers to send photos to be shared to the Page (Back the Badge)
- Soliciting videos for a YouTube contest called “Pee on Hillary”
- Encouraging people to apply to be part of a Black reality TV show
- Posting a wide variety of job ads (write for BlackMattersUS and others)
- Requests for lawyers to volunteer to assist with immigration cases”


This behaviour matches T0097.106: Recruiter Persona because the threat actors are presenting tasks for their target audience to complete in the style of a job posting (even though some of the tasks were presented as voluntary / unpaid efforts), including calls for people to attend political rallies (T0126.001: Call to Action to Attend). | | [T0143.002 Fabricated Persona](../../generated_pages/techniques/T0143.002.md) | IT00000249 “The Black Matters Facebook Page [operated by Russia’s Internet Research Agency] explored several visual brand identities, moving from a plain logo to a gothic typeface on Jan 19th, 2016. On February 4th, 2016, the person who ran the Facebook Page announced the launch of the website, blackmattersus[.]com, emphasizing media distrust and a desire to build Black independent media; [“I DIDN’T BELIEVE THE MEDIA / SO I BECAME ONE”]”

In this example an asset controlled by Russia’s Internet Research Agency began to present itself as a source of “Black independent media”, claiming that the media could not be trusted (T0097.208: Social Cause Persona, T0097.202: News Outlet Persona, T0143.002: Fabricated Persona). | diff --git a/generated_pages/incidents/I00084.md b/generated_pages/incidents/I00084.md index 516bd39..34f65d3 100644 --- a/generated_pages/incidents/I00084.md +++ b/generated_pages/incidents/I00084.md @@ -26,6 +26,7 @@ | [T0131 Exploit TOS/Content Moderation](../../generated_pages/techniques/T0131.md) | IT00000338 “After the European Union banned Kremlin-backed media outlets and social media giants demoted their posts for peddling falsehoods about the war in Ukraine, Moscow has turned to its cadre of diplomats, government spokespeople and ministers — many of whom have extensive followings on social media — to promote disinformation about the conflict in Eastern Europe, according to four EU and United States officials.”

In this example authentic Russian government officials used their own accounts to promote false narratives (T0143.001: Authentic Persona, T0097.111: Government Official Persona).

The use of accounts managed by authentic Government / Diplomats to spread false narratives makes it harder for platforms to enforce content moderation, because of the political ramifications they may face for censoring elected officials (T0131: Exploit TOS/Content Moderation). For example, Twitter previously argued that official channels of world leaders are not removed due to the high public interest associated with their activities. | | [T0143.001 Authentic Persona](../../generated_pages/techniques/T0143.001.md) | IT00000336 “After the European Union banned Kremlin-backed media outlets and social media giants demoted their posts for peddling falsehoods about the war in Ukraine, Moscow has turned to its cadre of diplomats, government spokespeople and ministers — many of whom have extensive followings on social media — to promote disinformation about the conflict in Eastern Europe, according to four EU and United States officials.”

In this example authentic Russian government officials used their own accounts to promote false narratives (T0143.001: Authentic Persona, T0097.111: Government Official Persona).

The use of accounts managed by authentic Government / Diplomats to spread false narratives makes it harder for platforms to enforce content moderation, because of the political ramifications they may face for censoring elected officials (T0131: Exploit TOS/Content Moderation). For example, Twitter previously argued that official channels of world leaders are not removed due to the high public interest associated with their activities. | | [T0151.004 Chat Platform](../../generated_pages/techniques/T0151.004.md) | IT00000294 “[Russia’s social media] reach isn't the same as Russian state media, but they are trying to recreate what RT and Sputnik had done," said one EU official involved in tracking Russian disinformation. "It's a coordinated effort that goes beyond social media and involves specific websites."

“Central to that wider online playbook is a Telegram channel called Warfakes and an affiliated website. Since the beginning of the conflict, that social media channel has garnered more than 725,000 members and repeatedly shares alleged fact-checks aimed at debunking Ukrainian narratives, using language similar to Western-style fact-checking outlets.”


In this example a Telegram channel (T0151.004: Chat Platform, T0155.007: Encrypted Communication Channel) was established which presented itself as a source of fact checks (T0097.203: Fact Checking Organisation Persona). | +| [T0151.004 Chat Platform](../../generated_pages/techniques/T0151.004.md) |  IT00000548 “[Russia’s social media] reach isn't the same as Russian state media, but they are trying to recreate what RT and Sputnik had done," said one EU official involved in tracking Russian disinformation. "It's a coordinated effort that goes beyond social media and involves specific websites."

“Central to that wider online playbook is a Telegram channel called Warfakes and an affiliated website. Since the beginning of the conflict, that social media channel has garnered more than 725,000 members and repeatedly shares alleged fact-checks aimed at debunking Ukrainian narratives, using language similar to Western-style fact-checking outlets.”


In this example a Telegram channel (T0151.004: Chat Platform, T0155.007: Encrypted Communication Channel) was established which presented itself as a source of fact checks (T0097.203: Fact Checking Organisation Persona). | DO NOT EDIT ABOVE THIS LINE - PLEASE ADD NOTES BELOW \ No newline at end of file diff --git a/generated_pages/incidents/I00089.md b/generated_pages/incidents/I00089.md index 40772df..24affe2 100644 --- a/generated_pages/incidents/I00089.md +++ b/generated_pages/incidents/I00089.md @@ -21,6 +21,7 @@ | Technique | Description given for this incident | | --------- | ------------------------- | +| [T0097.109 Romantic Suitor Persona](../../generated_pages/techniques/T0097.109.md) | IT00000313 “On Facebook, Rita, Alona and Christina appeared to be just like the millions of other U.S citizens sharing their lives with the world. They discussed family outings, shared emojis and commented on each other's photographs.

“In reality, the three accounts were part of a highly-targeted cybercrime operation, used to spread malware that was able to steal passwords and spy on victims.

“Hackers with links to Lebanon likely ran the covert scheme using a strain of malware dubbed "Tempting Cedar Spyware," according to researchers from Prague-based anti-virus company Avast, which detailed its findings in a report released on Wednesday.

“In a honey trap tactic as old as time, the culprits' targets were mostly male, and lured by fake attractive women. 

“In the attack, hackers would send flirtatious messages using Facebook to the chosen victims, encouraging them to download a second , booby-trapped, chat application known as Kik Messenger to have "more secure" conversations. Upon analysis, Avast experts found that "many fell for the trap.””


In this example threat actors took on the persona of a romantic suitor on Facebook, directing their targets to another platform (T0097:109 Romantic Suitor Persona, T0145.006: Attractive Person Account Imagery, T0143.002: Fabricated Persona). | | [T0143.002 Fabricated Persona](../../generated_pages/techniques/T0143.002.md) | IT00000314 “On Facebook, Rita, Alona and Christina appeared to be just like the millions of other U.S citizens sharing their lives with the world. They discussed family outings, shared emojis and commented on each other's photographs.

“In reality, the three accounts were part of a highly-targeted cybercrime operation, used to spread malware that was able to steal passwords and spy on victims.

“Hackers with links to Lebanon likely ran the covert scheme using a strain of malware dubbed "Tempting Cedar Spyware," according to researchers from Prague-based anti-virus company Avast, which detailed its findings in a report released on Wednesday.

“In a honey trap tactic as old as time, the culprits' targets were mostly male, and lured by fake attractive women. 

“In the attack, hackers would send flirtatious messages using Facebook to the chosen victims, encouraging them to download a second , booby-trapped, chat application known as Kik Messenger to have "more secure" conversations. Upon analysis, Avast experts found that "many fell for the trap.””


In this example threat actors took on the persona of a romantic suitor on Facebook, directing their targets to another platform (T0097:109 Romantic Suitor Persona, T0145.006: Attractive Person Account Imagery, T0143.002: Fabricated Persona). | | [T0145.006 Attractive Person Account Imagery](../../generated_pages/techniques/T0145.006.md) | IT00000312 “On Facebook, Rita, Alona and Christina appeared to be just like the millions of other U.S citizens sharing their lives with the world. They discussed family outings, shared emojis and commented on each other's photographs.

“In reality, the three accounts were part of a highly-targeted cybercrime operation, used to spread malware that was able to steal passwords and spy on victims.

“Hackers with links to Lebanon likely ran the covert scheme using a strain of malware dubbed "Tempting Cedar Spyware," according to researchers from Prague-based anti-virus company Avast, which detailed its findings in a report released on Wednesday.

“In a honey trap tactic as old as time, the culprits' targets were mostly male, and lured by fake attractive women. 

“In the attack, hackers would send flirtatious messages using Facebook to the chosen victims, encouraging them to download a second , booby-trapped, chat application known as Kik Messenger to have "more secure" conversations. Upon analysis, Avast experts found that "many fell for the trap.””


In this example threat actors took on the persona of a romantic suitor on Facebook, directing their targets to another platform (T0097:109 Romantic Suitor Persona, T0145.006: Attractive Person Account Imagery, T0143.002: Fabricated Persona). | diff --git a/generated_pages/incidents/I00093.md b/generated_pages/incidents/I00093.md index cc11936..2db8f70 100644 --- a/generated_pages/incidents/I00093.md +++ b/generated_pages/incidents/I00093.md @@ -21,9 +21,9 @@ | Technique | Description given for this incident | | --------- | ------------------------- | -| [T0097.111 Government Official Persona](../../generated_pages/techniques/T0097.111.md) | IT00000343 “On October 23, Canada’s Foreign Ministry said it had discovered a disinformation campaign, likely tied to China, aimed at discrediting dozens of Canadian politicians, including Prime Minister Justin Trudeau.

“The ministry said the campaign took place in August and September. It used new and hijacked social media accounts to bulk-post messages targeting Canadian politicians (T0146: Account, T0150.001: Newly Created, T0150.005: Compromised).

“A Chinese Embassy in Canada spokesperson dismissed Canada’s accusation as baseless.

““Canada was a downright liar and disseminator of false information… Beijing has never meddled in another nation’s domestic affairs.”

“A Chinese Embassy in Canada spokesperson dismissed Canada’s accusation as baseless.

“That is false.

“The Canadian government's report is based on an investigation conducted by its Rapid Response Mechanism cyber intelligence unit in cooperation with the social media platforms.

“The investigation exposed China’s disinformation campaign dubbed “Spamouflage” -- for its tactic of using “a network of new or hijacked social media accounts that posts and increases the number of propaganda messages across multiple social media platforms – including Facebook, X/Twitter, Instagram, YouTube, Medium, Reddit, TikTok, and LinkedIn.””


In this case a network of accounts attributed to China were identified operating on multiple platforms. The report was dismissed as false information by an official in the Chinese Embassy in Canada (T0143.001: Authentic Persona, T0097.111: Government Official Persona, T0129.006: Deny Involvement). | -| [T0129.006 Deny Involvement](../../generated_pages/techniques/T0129.006.md) | IT00000344 “On October 23, Canada’s Foreign Ministry said it had discovered a disinformation campaign, likely tied to China, aimed at discrediting dozens of Canadian politicians, including Prime Minister Justin Trudeau.

“The ministry said the campaign took place in August and September. It used new and hijacked social media accounts to bulk-post messages targeting Canadian politicians (T0146: Account, T0150.001: Newly Created, T0150.005: Compromised).

“A Chinese Embassy in Canada spokesperson dismissed Canada’s accusation as baseless.

““Canada was a downright liar and disseminator of false information… Beijing has never meddled in another nation’s domestic affairs.”

“A Chinese Embassy in Canada spokesperson dismissed Canada’s accusation as baseless.

“That is false.

“The Canadian government's report is based on an investigation conducted by its Rapid Response Mechanism cyber intelligence unit in cooperation with the social media platforms.

“The investigation exposed China’s disinformation campaign dubbed “Spamouflage” -- for its tactic of using “a network of new or hijacked social media accounts that posts and increases the number of propaganda messages across multiple social media platforms – including Facebook, X/Twitter, Instagram, YouTube, Medium, Reddit, TikTok, and LinkedIn.””


In this case a network of accounts attributed to China were identified operating on multiple platforms. The report was dismissed as false information by an official in the Chinese Embassy in Canada (T0143.001: Authentic Persona, T0097.111: Government Official Persona, T0129.006: Deny Involvement). | -| [T0143.001 Authentic Persona](../../generated_pages/techniques/T0143.001.md) | IT00000342 “On October 23, Canada’s Foreign Ministry said it had discovered a disinformation campaign, likely tied to China, aimed at discrediting dozens of Canadian politicians, including Prime Minister Justin Trudeau.

“The ministry said the campaign took place in August and September. It used new and hijacked social media accounts to bulk-post messages targeting Canadian politicians (T0146: Account, T0150.001: Newly Created, T0150.005: Compromised).

“A Chinese Embassy in Canada spokesperson dismissed Canada’s accusation as baseless.

““Canada was a downright liar and disseminator of false information… Beijing has never meddled in another nation’s domestic affairs.”

“A Chinese Embassy in Canada spokesperson dismissed Canada’s accusation as baseless.

“That is false.

“The Canadian government's report is based on an investigation conducted by its Rapid Response Mechanism cyber intelligence unit in cooperation with the social media platforms.

“The investigation exposed China’s disinformation campaign dubbed “Spamouflage” -- for its tactic of using “a network of new or hijacked social media accounts that posts and increases the number of propaganda messages across multiple social media platforms – including Facebook, X/Twitter, Instagram, YouTube, Medium, Reddit, TikTok, and LinkedIn.””


In this case a network of accounts attributed to China were identified operating on multiple platforms. The report was dismissed as false information by an official in the Chinese Embassy in Canada (T0143.001: Authentic Persona, T0097.111: Government Official Persona, T0129.006: Deny Involvement). | +| [T0097.111 Government Official Persona](../../generated_pages/techniques/T0097.111.md) | IT00000343 “On October 23, Canada’s Foreign Ministry said it had discovered a disinformation campaign, likely tied to China, aimed at discrediting dozens of Canadian politicians, including Prime Minister Justin Trudeau.

“The ministry said the campaign took place in August and September. It used new and hijacked social media accounts to bulk-post messages targeting Canadian politicians (T0146: Account Asset, T0150.001: Newly Created Asset, T0150.005: Compromised Asset).

“A Chinese Embassy in Canada spokesperson dismissed Canada’s accusation as baseless.

““Canada was a downright liar and disseminator of false information… Beijing has never meddled in another nation’s domestic affairs.”

“A Chinese Embassy in Canada spokesperson dismissed Canada’s accusation as baseless.

“That is false.

“The Canadian government's report is based on an investigation conducted by its Rapid Response Mechanism cyber intelligence unit in cooperation with the social media platforms.

“The investigation exposed China’s disinformation campaign dubbed “Spamouflage” -- for its tactic of using “a network of new or hijacked social media accounts that posts and increases the number of propaganda messages across multiple social media platforms – including Facebook, X/Twitter, Instagram, YouTube, Medium, Reddit, TikTok, and LinkedIn.””


In this case a network of accounts attributed to China were identified operating on multiple platforms. The report was dismissed as false information by an official in the Chinese Embassy in Canada (T0143.001: Authentic Persona, T0097.111: Government Official Persona, T0129.006: Deny Involvement). | +| [T0129.006 Deny Involvement](../../generated_pages/techniques/T0129.006.md) | IT00000344 “On October 23, Canada’s Foreign Ministry said it had discovered a disinformation campaign, likely tied to China, aimed at discrediting dozens of Canadian politicians, including Prime Minister Justin Trudeau.

“The ministry said the campaign took place in August and September. It used new and hijacked social media accounts to bulk-post messages targeting Canadian politicians (T0146: Account Asset, T0150.001: Newly Created Asset, T0150.005: Compromised Asset).

“A Chinese Embassy in Canada spokesperson dismissed Canada’s accusation as baseless.

““Canada was a downright liar and disseminator of false information… Beijing has never meddled in another nation’s domestic affairs.”

“A Chinese Embassy in Canada spokesperson dismissed Canada’s accusation as baseless.

“That is false.

“The Canadian government's report is based on an investigation conducted by its Rapid Response Mechanism cyber intelligence unit in cooperation with the social media platforms.

“The investigation exposed China’s disinformation campaign dubbed “Spamouflage” -- for its tactic of using “a network of new or hijacked social media accounts that posts and increases the number of propaganda messages across multiple social media platforms – including Facebook, X/Twitter, Instagram, YouTube, Medium, Reddit, TikTok, and LinkedIn.””


In this case a network of accounts attributed to China were identified operating on multiple platforms. The report was dismissed as false information by an official in the Chinese Embassy in Canada (T0143.001: Authentic Persona, T0097.111: Government Official Persona, T0129.006: Deny Involvement). | +| [T0143.001 Authentic Persona](../../generated_pages/techniques/T0143.001.md) | IT00000342 “On October 23, Canada’s Foreign Ministry said it had discovered a disinformation campaign, likely tied to China, aimed at discrediting dozens of Canadian politicians, including Prime Minister Justin Trudeau.

“The ministry said the campaign took place in August and September. It used new and hijacked social media accounts to bulk-post messages targeting Canadian politicians (T0146: Account Asset, T0150.001: Newly Created Asset, T0150.005: Compromised Asset).

“A Chinese Embassy in Canada spokesperson dismissed Canada’s accusation as baseless.

““Canada was a downright liar and disseminator of false information… Beijing has never meddled in another nation’s domestic affairs.”

“A Chinese Embassy in Canada spokesperson dismissed Canada’s accusation as baseless.

“That is false.

“The Canadian government's report is based on an investigation conducted by its Rapid Response Mechanism cyber intelligence unit in cooperation with the social media platforms.

“The investigation exposed China’s disinformation campaign dubbed “Spamouflage” -- for its tactic of using “a network of new or hijacked social media accounts that posts and increases the number of propaganda messages across multiple social media platforms – including Facebook, X/Twitter, Instagram, YouTube, Medium, Reddit, TikTok, and LinkedIn.””


In this case a network of accounts attributed to China were identified operating on multiple platforms. The report was dismissed as false information by an official in the Chinese Embassy in Canada (T0143.001: Authentic Persona, T0097.111: Government Official Persona, T0129.006: Deny Involvement). | DO NOT EDIT ABOVE THIS LINE - PLEASE ADD NOTES BELOW \ No newline at end of file diff --git a/generated_pages/incidents/I00096.md b/generated_pages/incidents/I00096.md index 771a66e..f2ca9b5 100644 --- a/generated_pages/incidents/I00096.md +++ b/generated_pages/incidents/I00096.md @@ -15,19 +15,21 @@ | Reference | Pub Date | Authors | Org | Archive | | --------- | -------- | ------- | --- | ------- | +| [https://www.computerweekly.com/news/366579820/China-ramps-up-use-of-AI-misinformation](https://www.computerweekly.com/news/366579820/China-ramps-up-use-of-AI-misinformation) | 2024/04/05 | +Alex Scroxton | ComputerWeekly | [https://web.archive.org/web/20240405154259/https://www.computerweekly.com/news/366579820/China-ramps-up-use-of-AI-misinformation](https://web.archive.org/web/20240405154259/https://www.computerweekly.com/news/366579820/China-ramps-up-use-of-AI-misinformation) | | Technique | Description given for this incident | | --------- | ------------------------- | -| [T0087.001 Develop AI-Generated Videos (Deepfakes)](../../generated_pages/techniques/T0087.001.md) |  IT00000352 The Microsoft Threat Analysis Centre (MTAC) published a report documenting the use of AI by pro-Chinese threat actors:

On 13 January, Spamouflage [(a Pro-Chinese Communist Party actor)] posted audio clips to YouTube of independent candidate [for Taiwan’s Jan 2024 presidential election] Terry Gou – who also founded electronics giant Foxconn – in which Gou endorsed another candidate in the race. This clip was almost certainly AI-generated, and it was swiftly removed by YouTube. A fake letter purporting to be from Gou, endorsing the same candidate, had already circulated – Gou had of course made no such endorsement.

Here Spamoflage used an account on YouTube to post AI Generated audio impersonating an electoral candidate (T0146: Account, T0152.006: Video Platform, T0115: Post Content, T0088.001: Develop AI-Generated Audio (Deepfakes), T0143.003: Impersonated Persona, T0097.110: Party Official Persona).

Spamouflage also exploited AI-powered video platform CapCut – which is owned by TikTok backers ByteDance – to generate fake news anchors which were used in a variety of campaigns targeting the various presidential candidates in Taiwan.

Spamoflage created accounts on CapCut, which it used to create AI-generated videos of fabricated news anchors (T0146: Account, T0154.002: AI Media Platform, T0087.001: Develop AI-Generated Video (Deepfakes), T0143.002: Fabricated Persona, T0097.102: Journalist Persona). | -| [T0088.001 Develop AI-Generated Audio (Deepfakes)](../../generated_pages/techniques/T0088.001.md) |  IT00000347 The Microsoft Threat Analysis Centre (MTAC) published a report documenting the use of AI by pro-Chinese threat actors:

On 13 January, Spamouflage [(a Pro-Chinese Communist Party actor)] posted audio clips to YouTube of independent candidate [for Taiwan’s Jan 2024 presidential election] Terry Gou – who also founded electronics giant Foxconn – in which Gou endorsed another candidate in the race. This clip was almost certainly AI-generated, and it was swiftly removed by YouTube. A fake letter purporting to be from Gou, endorsing the same candidate, had already circulated – Gou had of course made no such endorsement.

Here Spamoflage used an account on YouTube to post AI Generated audio impersonating an electoral candidate (T0146: Account, T0152.006: Video Platform, T0115: Post Content, T0088.001: Develop AI-Generated Audio (Deepfakes), T0143.003: Impersonated Persona, T0097.110: Party Official Persona).

Spamouflage also exploited AI-powered video platform CapCut – which is owned by TikTok backers ByteDance – to generate fake news anchors which were used in a variety of campaigns targeting the various presidential candidates in Taiwan.

Spamoflage created accounts on CapCut, which it used to create AI-generated videos of fabricated news anchors (T0146: Account, T0154.002: AI Media Platform, T0087.001: Develop AI-Generated Video (Deepfakes), T0143.002: Fabricated Persona, T0097.102: Journalist Persona). | -| [T0097.102 Journalist Persona](../../generated_pages/techniques/T0097.102.md) |  IT00000354 The Microsoft Threat Analysis Centre (MTAC) published a report documenting the use of AI by pro-Chinese threat actors:

On 13 January, Spamouflage [(a Pro-Chinese Communist Party actor)] posted audio clips to YouTube of independent candidate [for Taiwan’s Jan 2024 presidential election] Terry Gou – who also founded electronics giant Foxconn – in which Gou endorsed another candidate in the race. This clip was almost certainly AI-generated, and it was swiftly removed by YouTube. A fake letter purporting to be from Gou, endorsing the same candidate, had already circulated – Gou had of course made no such endorsement.

Here Spamoflage used an account on YouTube to post AI Generated audio impersonating an electoral candidate (T0146: Account, T0152.006: Video Platform, T0115: Post Content, T0088.001: Develop AI-Generated Audio (Deepfakes), T0143.003: Impersonated Persona, T0097.110: Party Official Persona).

Spamouflage also exploited AI-powered video platform CapCut – which is owned by TikTok backers ByteDance – to generate fake news anchors which were used in a variety of campaigns targeting the various presidential candidates in Taiwan.

Spamoflage created accounts on CapCut, which it used to create AI-generated videos of fabricated news anchors (T0146: Account, T0154.002: AI Media Platform, T0087.001: Develop AI-Generated Video (Deepfakes), T0143.002: Fabricated Persona, T0097.102: Journalist Persona). | -| [T0097.110 Party Official Persona](../../generated_pages/techniques/T0097.110.md) |  IT00000348 The Microsoft Threat Analysis Centre (MTAC) published a report documenting the use of AI by pro-Chinese threat actors:

On 13 January, Spamouflage [(a Pro-Chinese Communist Party actor)] posted audio clips to YouTube of independent candidate [for Taiwan’s Jan 2024 presidential election] Terry Gou – who also founded electronics giant Foxconn – in which Gou endorsed another candidate in the race. This clip was almost certainly AI-generated, and it was swiftly removed by YouTube. A fake letter purporting to be from Gou, endorsing the same candidate, had already circulated – Gou had of course made no such endorsement.

Here Spamoflage used an account on YouTube to post AI Generated audio impersonating an electoral candidate (T0146: Account, T0152.006: Video Platform, T0115: Post Content, T0088.001: Develop AI-Generated Audio (Deepfakes), T0143.003: Impersonated Persona, T0097.110: Party Official Persona).

Spamouflage also exploited AI-powered video platform CapCut – which is owned by TikTok backers ByteDance – to generate fake news anchors which were used in a variety of campaigns targeting the various presidential candidates in Taiwan.

Spamoflage created accounts on CapCut, which it used to create AI-generated videos of fabricated news anchors (T0146: Account, T0154.002: AI Media Platform, T0087.001: Develop AI-Generated Video (Deepfakes), T0143.002: Fabricated Persona, T0097.102: Journalist Persona). | -| [T0115 Post Content](../../generated_pages/techniques/T0115.md) |  IT00000350 The Microsoft Threat Analysis Centre (MTAC) published a report documenting the use of AI by pro-Chinese threat actors:

On 13 January, Spamouflage [(a Pro-Chinese Communist Party actor)] posted audio clips to YouTube of independent candidate [for Taiwan’s Jan 2024 presidential election] Terry Gou – who also founded electronics giant Foxconn – in which Gou endorsed another candidate in the race. This clip was almost certainly AI-generated, and it was swiftly removed by YouTube. A fake letter purporting to be from Gou, endorsing the same candidate, had already circulated – Gou had of course made no such endorsement.

Here Spamoflage used an account on YouTube to post AI Generated audio impersonating an electoral candidate (T0146: Account, T0152.006: Video Platform, T0115: Post Content, T0088.001: Develop AI-Generated Audio (Deepfakes), T0143.003: Impersonated Persona, T0097.110: Party Official Persona).

Spamouflage also exploited AI-powered video platform CapCut – which is owned by TikTok backers ByteDance – to generate fake news anchors which were used in a variety of campaigns targeting the various presidential candidates in Taiwan.

Spamoflage created accounts on CapCut, which it used to create AI-generated videos of fabricated news anchors (T0146: Account, T0154.002: AI Media Platform, T0087.001: Develop AI-Generated Video (Deepfakes), T0143.002: Fabricated Persona, T0097.102: Journalist Persona). | -| [T0143.002 Fabricated Persona](../../generated_pages/techniques/T0143.002.md) |  IT00000353 The Microsoft Threat Analysis Centre (MTAC) published a report documenting the use of AI by pro-Chinese threat actors:

On 13 January, Spamouflage [(a Pro-Chinese Communist Party actor)] posted audio clips to YouTube of independent candidate [for Taiwan’s Jan 2024 presidential election] Terry Gou – who also founded electronics giant Foxconn – in which Gou endorsed another candidate in the race. This clip was almost certainly AI-generated, and it was swiftly removed by YouTube. A fake letter purporting to be from Gou, endorsing the same candidate, had already circulated – Gou had of course made no such endorsement.

Here Spamoflage used an account on YouTube to post AI Generated audio impersonating an electoral candidate (T0146: Account, T0152.006: Video Platform, T0115: Post Content, T0088.001: Develop AI-Generated Audio (Deepfakes), T0143.003: Impersonated Persona, T0097.110: Party Official Persona).

Spamouflage also exploited AI-powered video platform CapCut – which is owned by TikTok backers ByteDance – to generate fake news anchors which were used in a variety of campaigns targeting the various presidential candidates in Taiwan.

Spamoflage created accounts on CapCut, which it used to create AI-generated videos of fabricated news anchors (T0146: Account, T0154.002: AI Media Platform, T0087.001: Develop AI-Generated Video (Deepfakes), T0143.002: Fabricated Persona, T0097.102: Journalist Persona). | -| [T0152.006 Video Platform](../../generated_pages/techniques/T0152.006.md) |  IT00000349 The Microsoft Threat Analysis Centre (MTAC) published a report documenting the use of AI by pro-Chinese threat actors:

On 13 January, Spamouflage [(a Pro-Chinese Communist Party actor)] posted audio clips to YouTube of independent candidate [for Taiwan’s Jan 2024 presidential election] Terry Gou – who also founded electronics giant Foxconn – in which Gou endorsed another candidate in the race. This clip was almost certainly AI-generated, and it was swiftly removed by YouTube. A fake letter purporting to be from Gou, endorsing the same candidate, had already circulated – Gou had of course made no such endorsement.

Here Spamoflage used an account on YouTube to post AI Generated audio impersonating an electoral candidate (T0146: Account, T0152.006: Video Platform, T0115: Post Content, T0088.001: Develop AI-Generated Audio (Deepfakes), T0143.003: Impersonated Persona, T0097.110: Party Official Persona).

Spamouflage also exploited AI-powered video platform CapCut – which is owned by TikTok backers ByteDance – to generate fake news anchors which were used in a variety of campaigns targeting the various presidential candidates in Taiwan.

Spamoflage created accounts on CapCut, which it used to create AI-generated videos of fabricated news anchors (T0146: Account, T0154.002: AI Media Platform, T0087.001: Develop AI-Generated Video (Deepfakes), T0143.002: Fabricated Persona, T0097.102: Journalist Persona). | -| [T0154.002 AI Media Platform](../../generated_pages/techniques/T0154.002.md) |  IT00000351 The Microsoft Threat Analysis Centre (MTAC) published a report documenting the use of AI by pro-Chinese threat actors:

On 13 January, Spamouflage [(a Pro-Chinese Communist Party actor)] posted audio clips to YouTube of independent candidate [for Taiwan’s Jan 2024 presidential election] Terry Gou – who also founded electronics giant Foxconn – in which Gou endorsed another candidate in the race. This clip was almost certainly AI-generated, and it was swiftly removed by YouTube. A fake letter purporting to be from Gou, endorsing the same candidate, had already circulated – Gou had of course made no such endorsement.

Here Spamoflage used an account on YouTube to post AI Generated audio impersonating an electoral candidate (T0146: Account, T0152.006: Video Platform, T0115: Post Content, T0088.001: Develop AI-Generated Audio (Deepfakes), T0143.003: Impersonated Persona, T0097.110: Party Official Persona).

Spamouflage also exploited AI-powered video platform CapCut – which is owned by TikTok backers ByteDance – to generate fake news anchors which were used in a variety of campaigns targeting the various presidential candidates in Taiwan.

Spamoflage created accounts on CapCut, which it used to create AI-generated videos of fabricated news anchors (T0146: Account, T0154.002: AI Media Platform, T0087.001: Develop AI-Generated Video (Deepfakes), T0143.002: Fabricated Persona, T0097.102: Journalist Persona). | +| [T0087.001 Develop AI-Generated Videos (Deepfakes)](../../generated_pages/techniques/T0087.001.md) |  IT00000352 The Microsoft Threat Analysis Centre (MTAC) published a report documenting the use of AI by pro-Chinese threat actors:

On 13 January, Spamouflage [(a Pro-Chinese Communist Party actor)] posted audio clips to YouTube of independent candidate [for Taiwan’s Jan 2024 presidential election] Terry Gou – who also founded electronics giant Foxconn – in which Gou endorsed another candidate in the race. This clip was almost certainly AI-generated, and it was swiftly removed by YouTube. A fake letter purporting to be from Gou, endorsing the same candidate, had already circulated – Gou had of course made no such endorsement.

Here Spamoflage used an account on YouTube to post AI Generated audio impersonating an electoral candidate (T0146: Account Asset, T0152.006: Video Platform, T0115: Post Content, T0088.001: Develop AI-Generated Audio (Deepfakes), T0143.003: Impersonated Persona, T0097.110: Party Official Persona).

Spamouflage also exploited AI-powered video platform CapCut – which is owned by TikTok backers ByteDance – to generate fake news anchors which were used in a variety of campaigns targeting the various presidential candidates in Taiwan.

Spamoflage created accounts on CapCut, which it used to create AI-generated videos of fabricated news anchors (T0146: Account Asset, T0154.002: AI Media Platform, T0087.001: Develop AI-Generated Video (Deepfakes), T0143.002: Fabricated Persona, T0097.102: Journalist Persona). | +| [T0088.001 Develop AI-Generated Audio (Deepfakes)](../../generated_pages/techniques/T0088.001.md) |  IT00000347 The Microsoft Threat Analysis Centre (MTAC) published a report documenting the use of AI by pro-Chinese threat actors:

On 13 January, Spamouflage [(a Pro-Chinese Communist Party actor)] posted audio clips to YouTube of independent candidate [for Taiwan’s Jan 2024 presidential election] Terry Gou – who also founded electronics giant Foxconn – in which Gou endorsed another candidate in the race. This clip was almost certainly AI-generated, and it was swiftly removed by YouTube. A fake letter purporting to be from Gou, endorsing the same candidate, had already circulated – Gou had of course made no such endorsement.

Here Spamoflage used an account on YouTube to post AI Generated audio impersonating an electoral candidate (T0146: Account Asset, T0152.006: Video Platform, T0115: Post Content, T0088.001: Develop AI-Generated Audio (Deepfakes), T0143.003: Impersonated Persona, T0097.110: Party Official Persona).

Spamouflage also exploited AI-powered video platform CapCut – which is owned by TikTok backers ByteDance – to generate fake news anchors which were used in a variety of campaigns targeting the various presidential candidates in Taiwan.

Spamoflage created accounts on CapCut, which it used to create AI-generated videos of fabricated news anchors (T0146: Account Asset, T0154.002: AI Media Platform, T0087.001: Develop AI-Generated Video (Deepfakes), T0143.002: Fabricated Persona, T0097.102: Journalist Persona). | +| [T0097.102 Journalist Persona](../../generated_pages/techniques/T0097.102.md) |  IT00000354 The Microsoft Threat Analysis Centre (MTAC) published a report documenting the use of AI by pro-Chinese threat actors:

On 13 January, Spamouflage [(a Pro-Chinese Communist Party actor)] posted audio clips to YouTube of independent candidate [for Taiwan’s Jan 2024 presidential election] Terry Gou – who also founded electronics giant Foxconn – in which Gou endorsed another candidate in the race. This clip was almost certainly AI-generated, and it was swiftly removed by YouTube. A fake letter purporting to be from Gou, endorsing the same candidate, had already circulated – Gou had of course made no such endorsement.

Here Spamoflage used an account on YouTube to post AI Generated audio impersonating an electoral candidate (T0146: Account Asset, T0152.006: Video Platform, T0115: Post Content, T0088.001: Develop AI-Generated Audio (Deepfakes), T0143.003: Impersonated Persona, T0097.110: Party Official Persona).

Spamouflage also exploited AI-powered video platform CapCut – which is owned by TikTok backers ByteDance – to generate fake news anchors which were used in a variety of campaigns targeting the various presidential candidates in Taiwan.

Spamoflage created accounts on CapCut, which it used to create AI-generated videos of fabricated news anchors (T0146: Account Asset, T0154.002: AI Media Platform, T0087.001: Develop AI-Generated Video (Deepfakes), T0143.002: Fabricated Persona, T0097.102: Journalist Persona). | +| [T0097.110 Party Official Persona](../../generated_pages/techniques/T0097.110.md) |  IT00000348 The Microsoft Threat Analysis Centre (MTAC) published a report documenting the use of AI by pro-Chinese threat actors:

On 13 January, Spamouflage [(a Pro-Chinese Communist Party actor)] posted audio clips to YouTube of independent candidate [for Taiwan’s Jan 2024 presidential election] Terry Gou – who also founded electronics giant Foxconn – in which Gou endorsed another candidate in the race. This clip was almost certainly AI-generated, and it was swiftly removed by YouTube. A fake letter purporting to be from Gou, endorsing the same candidate, had already circulated – Gou had of course made no such endorsement.

Here Spamoflage used an account on YouTube to post AI Generated audio impersonating an electoral candidate (T0146: Account Asset, T0152.006: Video Platform, T0115: Post Content, T0088.001: Develop AI-Generated Audio (Deepfakes), T0143.003: Impersonated Persona, T0097.110: Party Official Persona).

Spamouflage also exploited AI-powered video platform CapCut – which is owned by TikTok backers ByteDance – to generate fake news anchors which were used in a variety of campaigns targeting the various presidential candidates in Taiwan.

Spamoflage created accounts on CapCut, which it used to create AI-generated videos of fabricated news anchors (T0146: Account Asset, T0154.002: AI Media Platform, T0087.001: Develop AI-Generated Video (Deepfakes), T0143.002: Fabricated Persona, T0097.102: Journalist Persona). | +| [T0115 Post Content](../../generated_pages/techniques/T0115.md) |  IT00000350 The Microsoft Threat Analysis Centre (MTAC) published a report documenting the use of AI by pro-Chinese threat actors:

On 13 January, Spamouflage [(a Pro-Chinese Communist Party actor)] posted audio clips to YouTube of independent candidate [for Taiwan’s Jan 2024 presidential election] Terry Gou – who also founded electronics giant Foxconn – in which Gou endorsed another candidate in the race. This clip was almost certainly AI-generated, and it was swiftly removed by YouTube. A fake letter purporting to be from Gou, endorsing the same candidate, had already circulated – Gou had of course made no such endorsement.

Here Spamoflage used an account on YouTube to post AI Generated audio impersonating an electoral candidate (T0146: Account Asset, T0152.006: Video Platform, T0115: Post Content, T0088.001: Develop AI-Generated Audio (Deepfakes), T0143.003: Impersonated Persona, T0097.110: Party Official Persona).

Spamouflage also exploited AI-powered video platform CapCut – which is owned by TikTok backers ByteDance – to generate fake news anchors which were used in a variety of campaigns targeting the various presidential candidates in Taiwan.

Spamoflage created accounts on CapCut, which it used to create AI-generated videos of fabricated news anchors (T0146: Account Asset, T0154.002: AI Media Platform, T0087.001: Develop AI-Generated Video (Deepfakes), T0143.002: Fabricated Persona, T0097.102: Journalist Persona). | +| [T0143.002 Fabricated Persona](../../generated_pages/techniques/T0143.002.md) |  IT00000353 The Microsoft Threat Analysis Centre (MTAC) published a report documenting the use of AI by pro-Chinese threat actors:

On 13 January, Spamouflage [(a Pro-Chinese Communist Party actor)] posted audio clips to YouTube of independent candidate [for Taiwan’s Jan 2024 presidential election] Terry Gou – who also founded electronics giant Foxconn – in which Gou endorsed another candidate in the race. This clip was almost certainly AI-generated, and it was swiftly removed by YouTube. A fake letter purporting to be from Gou, endorsing the same candidate, had already circulated – Gou had of course made no such endorsement.

Here Spamoflage used an account on YouTube to post AI Generated audio impersonating an electoral candidate (T0146: Account Asset, T0152.006: Video Platform, T0115: Post Content, T0088.001: Develop AI-Generated Audio (Deepfakes), T0143.003: Impersonated Persona, T0097.110: Party Official Persona).

Spamouflage also exploited AI-powered video platform CapCut – which is owned by TikTok backers ByteDance – to generate fake news anchors which were used in a variety of campaigns targeting the various presidential candidates in Taiwan.

Spamoflage created accounts on CapCut, which it used to create AI-generated videos of fabricated news anchors (T0146: Account Asset, T0154.002: AI Media Platform, T0087.001: Develop AI-Generated Video (Deepfakes), T0143.002: Fabricated Persona, T0097.102: Journalist Persona). | +| [T0152.006 Video Platform](../../generated_pages/techniques/T0152.006.md) |  IT00000349 The Microsoft Threat Analysis Centre (MTAC) published a report documenting the use of AI by pro-Chinese threat actors:

On 13 January, Spamouflage [(a Pro-Chinese Communist Party actor)] posted audio clips to YouTube of independent candidate [for Taiwan’s Jan 2024 presidential election] Terry Gou – who also founded electronics giant Foxconn – in which Gou endorsed another candidate in the race. This clip was almost certainly AI-generated, and it was swiftly removed by YouTube. A fake letter purporting to be from Gou, endorsing the same candidate, had already circulated – Gou had of course made no such endorsement.

Here Spamoflage used an account on YouTube to post AI Generated audio impersonating an electoral candidate (T0146: Account Asset, T0152.006: Video Platform, T0115: Post Content, T0088.001: Develop AI-Generated Audio (Deepfakes), T0143.003: Impersonated Persona, T0097.110: Party Official Persona).

Spamouflage also exploited AI-powered video platform CapCut – which is owned by TikTok backers ByteDance – to generate fake news anchors which were used in a variety of campaigns targeting the various presidential candidates in Taiwan.

Spamoflage created accounts on CapCut, which it used to create AI-generated videos of fabricated news anchors (T0146: Account Asset, T0154.002: AI Media Platform, T0087.001: Develop AI-Generated Video (Deepfakes), T0143.002: Fabricated Persona, T0097.102: Journalist Persona). | +| [T0154.002 AI Media Platform](../../generated_pages/techniques/T0154.002.md) |  IT00000351 The Microsoft Threat Analysis Centre (MTAC) published a report documenting the use of AI by pro-Chinese threat actors:

On 13 January, Spamouflage [(a Pro-Chinese Communist Party actor)] posted audio clips to YouTube of independent candidate [for Taiwan’s Jan 2024 presidential election] Terry Gou – who also founded electronics giant Foxconn – in which Gou endorsed another candidate in the race. This clip was almost certainly AI-generated, and it was swiftly removed by YouTube. A fake letter purporting to be from Gou, endorsing the same candidate, had already circulated – Gou had of course made no such endorsement.

Here Spamoflage used an account on YouTube to post AI Generated audio impersonating an electoral candidate (T0146: Account Asset, T0152.006: Video Platform, T0115: Post Content, T0088.001: Develop AI-Generated Audio (Deepfakes), T0143.003: Impersonated Persona, T0097.110: Party Official Persona).

Spamouflage also exploited AI-powered video platform CapCut – which is owned by TikTok backers ByteDance – to generate fake news anchors which were used in a variety of campaigns targeting the various presidential candidates in Taiwan.

Spamoflage created accounts on CapCut, which it used to create AI-generated videos of fabricated news anchors (T0146: Account Asset, T0154.002: AI Media Platform, T0087.001: Develop AI-Generated Video (Deepfakes), T0143.002: Fabricated Persona, T0097.102: Journalist Persona). | DO NOT EDIT ABOVE THIS LINE - PLEASE ADD NOTES BELOW \ No newline at end of file diff --git a/generated_pages/incidents/I00097.md b/generated_pages/incidents/I00097.md index 53cc671..59eb14e 100644 --- a/generated_pages/incidents/I00097.md +++ b/generated_pages/incidents/I00097.md @@ -15,6 +15,7 @@ | Reference | Pub Date | Authors | Org | Archive | | --------- | -------- | ------- | --- | ------- | +| [https://au.reset.tech/news/report-not-just-algorithms/](https://au.reset.tech/news/report-not-just-algorithms/) | 2024/03/24 | - | Reset Australia | [https://web.archive.org/web/20240527135516/https://au.reset.tech/news/report-not-just-algorithms/](https://web.archive.org/web/20240527135516/https://au.reset.tech/news/report-not-just-algorithms/) | diff --git a/generated_pages/incidents/I00098.md b/generated_pages/incidents/I00098.md index edbd5bb..664de10 100644 --- a/generated_pages/incidents/I00098.md +++ b/generated_pages/incidents/I00098.md @@ -15,14 +15,15 @@ | Reference | Pub Date | Authors | Org | Archive | | --------- | -------- | ------- | --- | ------- | +| [https://bhr.stern.nyu.edu/wp-content/uploads/2024/01/NYUCBHRGaming_ONLINEUPDATEDMay16.pdf](https://bhr.stern.nyu.edu/wp-content/uploads/2024/01/NYUCBHRGaming_ONLINEUPDATEDMay16.pdf) | 2023/05/01 | Mariana Olaizola Rosenblat, Paul M. Barrett | NYU Stern | [https://web.archive.org/web/20240912223613/https://bhr.stern.nyu.edu/wp-content/uploads/2024/01/NYUCBHRGaming_ONLINEUPDATEDMay16.pdf](https://web.archive.org/web/20240912223613/https://bhr.stern.nyu.edu/wp-content/uploads/2024/01/NYUCBHRGaming_ONLINEUPDATEDMay16.pdf) | | Technique | Description given for this incident | | --------- | ------------------------- | -| [T0147.001 Game](../../generated_pages/techniques/T0147.001.md) |  IT00000360 This report looks at how extremists exploit games and gaming adjacent platforms:

Ethnic Cleansing, a first-person shooter game created by the U.S. white supremacist organization National Alliance in 2002, was advertised as follows: “[T]he Race War has already begun. Your character, Will, runs through a ghetto blasting away at various blacks and spics to attempt to gain entrance to the subway system...where the jews have hidden to avoid the carnage. Then you get to blow away jews as they scream ‘Oy Vey!’ on your way to the command center.”

While games like Ethnic Cleansing —and others of a similar genocidal variety, including titles like Shoot the Blacks, Hatred, and Muslim Massacre —generate some press attention and controversy, they tend to be ignored by the large majority of gamers, who consider them “crude” and “badly designed.” Nevertheless, these games are still available in some corners of the Internet and have been downloaded by hundreds of thousands of users.

A second strategy involves the modification (“modding”) of existing video games to twist the narrative into an extremist message or fantasy. One example is the Islamic State terrorist group’s modding of the first-person shooter video game, ARMA III, to make Islamic fighters the heroic protagonists rather than the villains. With their powerful immersive quality, these video games have, in some instances, been effective at inspiring and allegedly training extremists to perpetrate realworld attacks.

Third, extremist actors have used in-game chat functions to open lines of communication with ideological sympathizers and potential recruits. Although the lack of in-game communication data has made it impossible for academic researchers to track the presence of extremists in a systematic way, there is enough anecdotal evidence—including evidence obtained from police investigation files—to infer that in-game chatrooms can and do function as “radicalization funnels” in at least some cases.


White supremacists created a game aligned with their ideology (T0147.001: Game). The Islamic State terrorist group created a mod of the game ARMA 3 (T0151.015: Online Game Platform, T0147.002: Game Mod). Extremists also use communication features available in online games to recruit new members. | -| [T0147.002 Game Mod](../../generated_pages/techniques/T0147.002.md) |  IT00000362 This report looks at how extremists exploit games and gaming adjacent platforms:

Ethnic Cleansing, a first-person shooter game created by the U.S. white supremacist organization National Alliance in 2002, was advertised as follows: “[T]he Race War has already begun. Your character, Will, runs through a ghetto blasting away at various blacks and spics to attempt to gain entrance to the subway system...where the jews have hidden to avoid the carnage. Then you get to blow away jews as they scream ‘Oy Vey!’ on your way to the command center.”

While games like Ethnic Cleansing —and others of a similar genocidal variety, including titles like Shoot the Blacks, Hatred, and Muslim Massacre —generate some press attention and controversy, they tend to be ignored by the large majority of gamers, who consider them “crude” and “badly designed.” Nevertheless, these games are still available in some corners of the Internet and have been downloaded by hundreds of thousands of users.

A second strategy involves the modification (“modding”) of existing video games to twist the narrative into an extremist message or fantasy. One example is the Islamic State terrorist group’s modding of the first-person shooter video game, ARMA III, to make Islamic fighters the heroic protagonists rather than the villains. With their powerful immersive quality, these video games have, in some instances, been effective at inspiring and allegedly training extremists to perpetrate realworld attacks.

Third, extremist actors have used in-game chat functions to open lines of communication with ideological sympathizers and potential recruits. Although the lack of in-game communication data has made it impossible for academic researchers to track the presence of extremists in a systematic way, there is enough anecdotal evidence—including evidence obtained from police investigation files—to infer that in-game chatrooms can and do function as “radicalization funnels” in at least some cases.


White supremacists created a game aligned with their ideology (T0147.001: Game). The Islamic State terrorist group created a mod of the game ARMA 3 (T0151.015: Online Game Platform, T0147.002: Game Mod). Extremists also use communication features available in online games to recruit new members. | -| [T0151.015 Online Game Platform](../../generated_pages/techniques/T0151.015.md) |  IT00000361 This report looks at how extremists exploit games and gaming adjacent platforms:

Ethnic Cleansing, a first-person shooter game created by the U.S. white supremacist organization National Alliance in 2002, was advertised as follows: “[T]he Race War has already begun. Your character, Will, runs through a ghetto blasting away at various blacks and spics to attempt to gain entrance to the subway system...where the jews have hidden to avoid the carnage. Then you get to blow away jews as they scream ‘Oy Vey!’ on your way to the command center.”

While games like Ethnic Cleansing —and others of a similar genocidal variety, including titles like Shoot the Blacks, Hatred, and Muslim Massacre —generate some press attention and controversy, they tend to be ignored by the large majority of gamers, who consider them “crude” and “badly designed.” Nevertheless, these games are still available in some corners of the Internet and have been downloaded by hundreds of thousands of users.

A second strategy involves the modification (“modding”) of existing video games to twist the narrative into an extremist message or fantasy. One example is the Islamic State terrorist group’s modding of the first-person shooter video game, ARMA III, to make Islamic fighters the heroic protagonists rather than the villains. With their powerful immersive quality, these video games have, in some instances, been effective at inspiring and allegedly training extremists to perpetrate realworld attacks.

Third, extremist actors have used in-game chat functions to open lines of communication with ideological sympathizers and potential recruits. Although the lack of in-game communication data has made it impossible for academic researchers to track the presence of extremists in a systematic way, there is enough anecdotal evidence—including evidence obtained from police investigation files—to infer that in-game chatrooms can and do function as “radicalization funnels” in at least some cases.


White supremacists created a game aligned with their ideology (T0147.001: Game). The Islamic State terrorist group created a mod of the game ARMA 3 (T0151.015: Online Game Platform, T0147.002: Game Mod). Extremists also use communication features available in online games to recruit new members. | +| [T0147.001 Game Asset](../../generated_pages/techniques/T0147.001.md) |  IT00000360 This report looks at how extremists exploit games and gaming adjacent platforms:

Ethnic Cleansing, a first-person shooter game created by the U.S. white supremacist organization National Alliance in 2002, was advertised as follows: “[T]he Race War has already begun. Your character, Will, runs through a ghetto blasting away at various blacks and spics to attempt to gain entrance to the subway system...where the jews have hidden to avoid the carnage. Then you get to blow away jews as they scream ‘Oy Vey!’ on your way to the command center.”

While games like Ethnic Cleansing —and others of a similar genocidal variety, including titles like Shoot the Blacks, Hatred, and Muslim Massacre —generate some press attention and controversy, they tend to be ignored by the large majority of gamers, who consider them “crude” and “badly designed.” Nevertheless, these games are still available in some corners of the Internet and have been downloaded by hundreds of thousands of users.

A second strategy involves the modification (“modding”) of existing video games to twist the narrative into an extremist message or fantasy. One example is the Islamic State terrorist group’s modding of the first-person shooter video game, ARMA III, to make Islamic fighters the heroic protagonists rather than the villains. With their powerful immersive quality, these video games have, in some instances, been effective at inspiring and allegedly training extremists to perpetrate realworld attacks.

Third, extremist actors have used in-game chat functions to open lines of communication with ideological sympathizers and potential recruits. Although the lack of in-game communication data has made it impossible for academic researchers to track the presence of extremists in a systematic way, there is enough anecdotal evidence—including evidence obtained from police investigation files—to infer that in-game chatrooms can and do function as “radicalization funnels” in at least some cases.


White supremacists created a game aligned with their ideology (T0147.001: Game Asset). The Islamic State terrorist group created a mod of the game ARMA 3 (T0151.015: Online Game Platform, T0147.002: Game Mod Asset). Extremists also use communication features available in online games to recruit new members. | +| [T0147.002 Game Mod Asset](../../generated_pages/techniques/T0147.002.md) |  IT00000362 This report looks at how extremists exploit games and gaming adjacent platforms:

Ethnic Cleansing, a first-person shooter game created by the U.S. white supremacist organization National Alliance in 2002, was advertised as follows: “[T]he Race War has already begun. Your character, Will, runs through a ghetto blasting away at various blacks and spics to attempt to gain entrance to the subway system...where the jews have hidden to avoid the carnage. Then you get to blow away jews as they scream ‘Oy Vey!’ on your way to the command center.”

While games like Ethnic Cleansing —and others of a similar genocidal variety, including titles like Shoot the Blacks, Hatred, and Muslim Massacre —generate some press attention and controversy, they tend to be ignored by the large majority of gamers, who consider them “crude” and “badly designed.” Nevertheless, these games are still available in some corners of the Internet and have been downloaded by hundreds of thousands of users.

A second strategy involves the modification (“modding”) of existing video games to twist the narrative into an extremist message or fantasy. One example is the Islamic State terrorist group’s modding of the first-person shooter video game, ARMA III, to make Islamic fighters the heroic protagonists rather than the villains. With their powerful immersive quality, these video games have, in some instances, been effective at inspiring and allegedly training extremists to perpetrate realworld attacks.

Third, extremist actors have used in-game chat functions to open lines of communication with ideological sympathizers and potential recruits. Although the lack of in-game communication data has made it impossible for academic researchers to track the presence of extremists in a systematic way, there is enough anecdotal evidence—including evidence obtained from police investigation files—to infer that in-game chatrooms can and do function as “radicalization funnels” in at least some cases.


White supremacists created a game aligned with their ideology (T0147.001: Game Asset). The Islamic State terrorist group created a mod of the game ARMA 3 (T0151.015: Online Game Platform, T0147.002: Game Mod Asset). Extremists also use communication features available in online games to recruit new members. | +| [T0151.015 Online Game Platform](../../generated_pages/techniques/T0151.015.md) |  IT00000361 This report looks at how extremists exploit games and gaming adjacent platforms:

Ethnic Cleansing, a first-person shooter game created by the U.S. white supremacist organization National Alliance in 2002, was advertised as follows: “[T]he Race War has already begun. Your character, Will, runs through a ghetto blasting away at various blacks and spics to attempt to gain entrance to the subway system...where the jews have hidden to avoid the carnage. Then you get to blow away jews as they scream ‘Oy Vey!’ on your way to the command center.”

While games like Ethnic Cleansing —and others of a similar genocidal variety, including titles like Shoot the Blacks, Hatred, and Muslim Massacre —generate some press attention and controversy, they tend to be ignored by the large majority of gamers, who consider them “crude” and “badly designed.” Nevertheless, these games are still available in some corners of the Internet and have been downloaded by hundreds of thousands of users.

A second strategy involves the modification (“modding”) of existing video games to twist the narrative into an extremist message or fantasy. One example is the Islamic State terrorist group’s modding of the first-person shooter video game, ARMA III, to make Islamic fighters the heroic protagonists rather than the villains. With their powerful immersive quality, these video games have, in some instances, been effective at inspiring and allegedly training extremists to perpetrate realworld attacks.

Third, extremist actors have used in-game chat functions to open lines of communication with ideological sympathizers and potential recruits. Although the lack of in-game communication data has made it impossible for academic researchers to track the presence of extremists in a systematic way, there is enough anecdotal evidence—including evidence obtained from police investigation files—to infer that in-game chatrooms can and do function as “radicalization funnels” in at least some cases.


White supremacists created a game aligned with their ideology (T0147.001: Game Asset). The Islamic State terrorist group created a mod of the game ARMA 3 (T0151.015: Online Game Platform, T0147.002: Game Mod Asset). Extremists also use communication features available in online games to recruit new members. | DO NOT EDIT ABOVE THIS LINE - PLEASE ADD NOTES BELOW \ No newline at end of file diff --git a/generated_pages/incidents/I00099.md b/generated_pages/incidents/I00099.md index 115dabd..3bf560a 100644 --- a/generated_pages/incidents/I00099.md +++ b/generated_pages/incidents/I00099.md @@ -15,15 +15,16 @@ | Reference | Pub Date | Authors | Org | Archive | | --------- | -------- | ------- | --- | ------- | +| [https://www.vogue.co.uk/news/article/stop-deepfakes-campaign](https://www.vogue.co.uk/news/article/stop-deepfakes-campaign) | 2021/03/15 | Sophie Compton | Vogue | [https://web.archive.org/web/20230515171651/https://www.vogue.co.uk/news/article/stop-deepfakes-campaign](https://web.archive.org/web/20230515171651/https://www.vogue.co.uk/news/article/stop-deepfakes-campaign) | | Technique | Description given for this incident | | --------- | ------------------------- | -| [T0086.002 Develop AI-Generated Images (Deepfakes)](../../generated_pages/techniques/T0086.002.md) |  IT00000364 Last October, British writer Helen was alerted to a series of deepfakes on a porn site that appear to show her engaging in extreme acts of sexual violence. That night, the images replayed themselves over and over in horrific nightmares and she was gripped by an all-consuming feeling of dread. “It’s like you’re in a tunnel, going further and further into this enclosed space, where there’s no light,” she tells Vogue. This feeling pervaded Helen’s life. Whenever she left the house, she felt exposed. On runs, she experienced panic attacks. Helen still has no idea who did this to her.

[...]

Amnesty International has been investigating the effects of abuse against women on Twitter, specifically in relation to how they act online thereafter. According to the charity, abuse creates what they’ve called “the silencing effect” whereby women feel discouraged from participating online. The same can be said for victims of deepfakes.

Helen has never been afraid to use her voice, writing deeply personal accounts of postnatal depression. But the deepfakes created a feeling of shame so strong she thought she’d be carrying this “dirty secret” forever, and so she stopped writing.

[...]

Meanwhile, deepfake ‘communities’ are thriving. There are now dedicated sites, user-friendly apps and organised ‘request’ procedures. Some sites allow you to commission custom deepfakes for £25, while on others you can upload a woman’s image and a bot will strip her naked.

“This violation is not something that should be normalised,” says Gibi, an ASMR artist with 3.13 million YouTube subscribers. Gibi has given up trying to keep tabs on the deepfakes of her. For Gibi, the most egregious part of all of this is the fact that people are “profiting off my face, doing something that I didn’t consent to, like my suffering is your livelihood.” She’s even been approached by a company offering to remove the deepfakes — for £500 a video. This has to end. But how?


A website hosting pornographic content provided users the ability to create deepfake content (T0154.002: AI Media Platform, T0086.002: Develop AI-Generated Images (Deepfakes)).

Another website enabled users to commission custom deepfakes (T0152.004: Website, T0148.004: Payment Processing Capability, T0086.002: Develop AI-Generated Images (Deepfakes), T0155.005: Paid Access). | -| [T0152.004 Website](../../generated_pages/techniques/T0152.004.md) |  IT00000365 Last October, British writer Helen was alerted to a series of deepfakes on a porn site that appear to show her engaging in extreme acts of sexual violence. That night, the images replayed themselves over and over in horrific nightmares and she was gripped by an all-consuming feeling of dread. “It’s like you’re in a tunnel, going further and further into this enclosed space, where there’s no light,” she tells Vogue. This feeling pervaded Helen’s life. Whenever she left the house, she felt exposed. On runs, she experienced panic attacks. Helen still has no idea who did this to her.

[...]

Amnesty International has been investigating the effects of abuse against women on Twitter, specifically in relation to how they act online thereafter. According to the charity, abuse creates what they’ve called “the silencing effect” whereby women feel discouraged from participating online. The same can be said for victims of deepfakes.

Helen has never been afraid to use her voice, writing deeply personal accounts of postnatal depression. But the deepfakes created a feeling of shame so strong she thought she’d be carrying this “dirty secret” forever, and so she stopped writing.

[...]

Meanwhile, deepfake ‘communities’ are thriving. There are now dedicated sites, user-friendly apps and organised ‘request’ procedures. Some sites allow you to commission custom deepfakes for £25, while on others you can upload a woman’s image and a bot will strip her naked.

“This violation is not something that should be normalised,” says Gibi, an ASMR artist with 3.13 million YouTube subscribers. Gibi has given up trying to keep tabs on the deepfakes of her. For Gibi, the most egregious part of all of this is the fact that people are “profiting off my face, doing something that I didn’t consent to, like my suffering is your livelihood.” She’s even been approached by a company offering to remove the deepfakes — for £500 a video. This has to end. But how?


A website hosting pornographic content provided users the ability to create deepfake content (T0154.002: AI Media Platform, T0086.002: Develop AI-Generated Images (Deepfakes)).

Another website enabled users to commission custom deepfakes (T0152.004: Website, T0148.004: Payment Processing Capability, T0086.002: Develop AI-Generated Images (Deepfakes), T0155.005: Paid Access). | -| [T0154.002 AI Media Platform](../../generated_pages/techniques/T0154.002.md) |  IT00000363 Last October, British writer Helen was alerted to a series of deepfakes on a porn site that appear to show her engaging in extreme acts of sexual violence. That night, the images replayed themselves over and over in horrific nightmares and she was gripped by an all-consuming feeling of dread. “It’s like you’re in a tunnel, going further and further into this enclosed space, where there’s no light,” she tells Vogue. This feeling pervaded Helen’s life. Whenever she left the house, she felt exposed. On runs, she experienced panic attacks. Helen still has no idea who did this to her.

[...]

Amnesty International has been investigating the effects of abuse against women on Twitter, specifically in relation to how they act online thereafter. According to the charity, abuse creates what they’ve called “the silencing effect” whereby women feel discouraged from participating online. The same can be said for victims of deepfakes.

Helen has never been afraid to use her voice, writing deeply personal accounts of postnatal depression. But the deepfakes created a feeling of shame so strong she thought she’d be carrying this “dirty secret” forever, and so she stopped writing.

[...]

Meanwhile, deepfake ‘communities’ are thriving. There are now dedicated sites, user-friendly apps and organised ‘request’ procedures. Some sites allow you to commission custom deepfakes for £25, while on others you can upload a woman’s image and a bot will strip her naked.

“This violation is not something that should be normalised,” says Gibi, an ASMR artist with 3.13 million YouTube subscribers. Gibi has given up trying to keep tabs on the deepfakes of her. For Gibi, the most egregious part of all of this is the fact that people are “profiting off my face, doing something that I didn’t consent to, like my suffering is your livelihood.” She’s even been approached by a company offering to remove the deepfakes — for £500 a video. This has to end. But how?


A website hosting pornographic content provided users the ability to create deepfake content (T0154.002: AI Media Platform, T0086.002: Develop AI-Generated Images (Deepfakes)).

Another website enabled users to commission custom deepfakes (T0152.004: Website, T0148.004: Payment Processing Capability, T0086.002: Develop AI-Generated Images (Deepfakes), T0155.005: Paid Access). | -| [T0155.005 Paid Access](../../generated_pages/techniques/T0155.005.md) |  IT00000366 Last October, British writer Helen was alerted to a series of deepfakes on a porn site that appear to show her engaging in extreme acts of sexual violence. That night, the images replayed themselves over and over in horrific nightmares and she was gripped by an all-consuming feeling of dread. “It’s like you’re in a tunnel, going further and further into this enclosed space, where there’s no light,” she tells Vogue. This feeling pervaded Helen’s life. Whenever she left the house, she felt exposed. On runs, she experienced panic attacks. Helen still has no idea who did this to her.

[...]

Amnesty International has been investigating the effects of abuse against women on Twitter, specifically in relation to how they act online thereafter. According to the charity, abuse creates what they’ve called “the silencing effect” whereby women feel discouraged from participating online. The same can be said for victims of deepfakes.

Helen has never been afraid to use her voice, writing deeply personal accounts of postnatal depression. But the deepfakes created a feeling of shame so strong she thought she’d be carrying this “dirty secret” forever, and so she stopped writing.

[...]

Meanwhile, deepfake ‘communities’ are thriving. There are now dedicated sites, user-friendly apps and organised ‘request’ procedures. Some sites allow you to commission custom deepfakes for £25, while on others you can upload a woman’s image and a bot will strip her naked.

“This violation is not something that should be normalised,” says Gibi, an ASMR artist with 3.13 million YouTube subscribers. Gibi has given up trying to keep tabs on the deepfakes of her. For Gibi, the most egregious part of all of this is the fact that people are “profiting off my face, doing something that I didn’t consent to, like my suffering is your livelihood.” She’s even been approached by a company offering to remove the deepfakes — for £500 a video. This has to end. But how?


A website hosting pornographic content provided users the ability to create deepfake content (T0154.002: AI Media Platform, T0086.002: Develop AI-Generated Images (Deepfakes)).

Another website enabled users to commission custom deepfakes (T0152.004: Website, T0148.004: Payment Processing Capability, T0086.002: Develop AI-Generated Images (Deepfakes), T0155.005: Paid Access). | +| [T0086.002 Develop AI-Generated Images (Deepfakes)](../../generated_pages/techniques/T0086.002.md) |  IT00000364 Last October, British writer Helen was alerted to a series of deepfakes on a porn site that appear to show her engaging in extreme acts of sexual violence. That night, the images replayed themselves over and over in horrific nightmares and she was gripped by an all-consuming feeling of dread. “It’s like you’re in a tunnel, going further and further into this enclosed space, where there’s no light,” she tells Vogue. This feeling pervaded Helen’s life. Whenever she left the house, she felt exposed. On runs, she experienced panic attacks. Helen still has no idea who did this to her.

[...]

Amnesty International has been investigating the effects of abuse against women on Twitter, specifically in relation to how they act online thereafter. According to the charity, abuse creates what they’ve called “the silencing effect” whereby women feel discouraged from participating online. The same can be said for victims of deepfakes.

Helen has never been afraid to use her voice, writing deeply personal accounts of postnatal depression. But the deepfakes created a feeling of shame so strong she thought she’d be carrying this “dirty secret” forever, and so she stopped writing.

[...]

Meanwhile, deepfake ‘communities’ are thriving. There are now dedicated sites, user-friendly apps and organised ‘request’ procedures. Some sites allow you to commission custom deepfakes for £25, while on others you can upload a woman’s image and a bot will strip her naked.

“This violation is not something that should be normalised,” says Gibi, an ASMR artist with 3.13 million YouTube subscribers. Gibi has given up trying to keep tabs on the deepfakes of her. For Gibi, the most egregious part of all of this is the fact that people are “profiting off my face, doing something that I didn’t consent to, like my suffering is your livelihood.” She’s even been approached by a company offering to remove the deepfakes — for £500 a video. This has to end. But how?


A website hosting pornographic content provided users the ability to create deepfake content (T0154.002: AI Media Platform, T0086.002: Develop AI-Generated Images (Deepfakes)).

Another website enabled users to commission custom deepfakes (T0152.004: Website Asset, T0148.004: Payment Processing Capability, T0086.002: Develop AI-Generated Images (Deepfakes), T0155.005: Paid Access Asset). | +| [T0152.004 Website Asset](../../generated_pages/techniques/T0152.004.md) |  IT00000365 Last October, British writer Helen was alerted to a series of deepfakes on a porn site that appear to show her engaging in extreme acts of sexual violence. That night, the images replayed themselves over and over in horrific nightmares and she was gripped by an all-consuming feeling of dread. “It’s like you’re in a tunnel, going further and further into this enclosed space, where there’s no light,” she tells Vogue. This feeling pervaded Helen’s life. Whenever she left the house, she felt exposed. On runs, she experienced panic attacks. Helen still has no idea who did this to her.

[...]

Amnesty International has been investigating the effects of abuse against women on Twitter, specifically in relation to how they act online thereafter. According to the charity, abuse creates what they’ve called “the silencing effect” whereby women feel discouraged from participating online. The same can be said for victims of deepfakes.

Helen has never been afraid to use her voice, writing deeply personal accounts of postnatal depression. But the deepfakes created a feeling of shame so strong she thought she’d be carrying this “dirty secret” forever, and so she stopped writing.

[...]

Meanwhile, deepfake ‘communities’ are thriving. There are now dedicated sites, user-friendly apps and organised ‘request’ procedures. Some sites allow you to commission custom deepfakes for £25, while on others you can upload a woman’s image and a bot will strip her naked.

“This violation is not something that should be normalised,” says Gibi, an ASMR artist with 3.13 million YouTube subscribers. Gibi has given up trying to keep tabs on the deepfakes of her. For Gibi, the most egregious part of all of this is the fact that people are “profiting off my face, doing something that I didn’t consent to, like my suffering is your livelihood.” She’s even been approached by a company offering to remove the deepfakes — for £500 a video. This has to end. But how?


A website hosting pornographic content provided users the ability to create deepfake content (T0154.002: AI Media Platform, T0086.002: Develop AI-Generated Images (Deepfakes)).

Another website enabled users to commission custom deepfakes (T0152.004: Website Asset, T0148.004: Payment Processing Capability, T0086.002: Develop AI-Generated Images (Deepfakes), T0155.005: Paid Access Asset). | +| [T0154.002 AI Media Platform](../../generated_pages/techniques/T0154.002.md) |  IT00000363 Last October, British writer Helen was alerted to a series of deepfakes on a porn site that appear to show her engaging in extreme acts of sexual violence. That night, the images replayed themselves over and over in horrific nightmares and she was gripped by an all-consuming feeling of dread. “It’s like you’re in a tunnel, going further and further into this enclosed space, where there’s no light,” she tells Vogue. This feeling pervaded Helen’s life. Whenever she left the house, she felt exposed. On runs, she experienced panic attacks. Helen still has no idea who did this to her.

[...]

Amnesty International has been investigating the effects of abuse against women on Twitter, specifically in relation to how they act online thereafter. According to the charity, abuse creates what they’ve called “the silencing effect” whereby women feel discouraged from participating online. The same can be said for victims of deepfakes.

Helen has never been afraid to use her voice, writing deeply personal accounts of postnatal depression. But the deepfakes created a feeling of shame so strong she thought she’d be carrying this “dirty secret” forever, and so she stopped writing.

[...]

Meanwhile, deepfake ‘communities’ are thriving. There are now dedicated sites, user-friendly apps and organised ‘request’ procedures. Some sites allow you to commission custom deepfakes for £25, while on others you can upload a woman’s image and a bot will strip her naked.

“This violation is not something that should be normalised,” says Gibi, an ASMR artist with 3.13 million YouTube subscribers. Gibi has given up trying to keep tabs on the deepfakes of her. For Gibi, the most egregious part of all of this is the fact that people are “profiting off my face, doing something that I didn’t consent to, like my suffering is your livelihood.” She’s even been approached by a company offering to remove the deepfakes — for £500 a video. This has to end. But how?


A website hosting pornographic content provided users the ability to create deepfake content (T0154.002: AI Media Platform, T0086.002: Develop AI-Generated Images (Deepfakes)).

Another website enabled users to commission custom deepfakes (T0152.004: Website Asset, T0148.004: Payment Processing Capability, T0086.002: Develop AI-Generated Images (Deepfakes), T0155.005: Paid Access Asset). | +| [T0155.005 Paid Access Asset](../../generated_pages/techniques/T0155.005.md) |  IT00000366 Last October, British writer Helen was alerted to a series of deepfakes on a porn site that appear to show her engaging in extreme acts of sexual violence. That night, the images replayed themselves over and over in horrific nightmares and she was gripped by an all-consuming feeling of dread. “It’s like you’re in a tunnel, going further and further into this enclosed space, where there’s no light,” she tells Vogue. This feeling pervaded Helen’s life. Whenever she left the house, she felt exposed. On runs, she experienced panic attacks. Helen still has no idea who did this to her.

[...]

Amnesty International has been investigating the effects of abuse against women on Twitter, specifically in relation to how they act online thereafter. According to the charity, abuse creates what they’ve called “the silencing effect” whereby women feel discouraged from participating online. The same can be said for victims of deepfakes.

Helen has never been afraid to use her voice, writing deeply personal accounts of postnatal depression. But the deepfakes created a feeling of shame so strong she thought she’d be carrying this “dirty secret” forever, and so she stopped writing.

[...]

Meanwhile, deepfake ‘communities’ are thriving. There are now dedicated sites, user-friendly apps and organised ‘request’ procedures. Some sites allow you to commission custom deepfakes for £25, while on others you can upload a woman’s image and a bot will strip her naked.

“This violation is not something that should be normalised,” says Gibi, an ASMR artist with 3.13 million YouTube subscribers. Gibi has given up trying to keep tabs on the deepfakes of her. For Gibi, the most egregious part of all of this is the fact that people are “profiting off my face, doing something that I didn’t consent to, like my suffering is your livelihood.” She’s even been approached by a company offering to remove the deepfakes — for £500 a video. This has to end. But how?


A website hosting pornographic content provided users the ability to create deepfake content (T0154.002: AI Media Platform, T0086.002: Develop AI-Generated Images (Deepfakes)).

Another website enabled users to commission custom deepfakes (T0152.004: Website Asset, T0148.004: Payment Processing Capability, T0086.002: Develop AI-Generated Images (Deepfakes), T0155.005: Paid Access Asset). | DO NOT EDIT ABOVE THIS LINE - PLEASE ADD NOTES BELOW \ No newline at end of file diff --git a/generated_pages/incidents/I00100.md b/generated_pages/incidents/I00100.md index d9e33ac..874341a 100644 --- a/generated_pages/incidents/I00100.md +++ b/generated_pages/incidents/I00100.md @@ -15,6 +15,7 @@ | Reference | Pub Date | Authors | Org | Archive | | --------- | -------- | ------- | --- | ------- | +| [https://venturebeat.com/media/why-thispersondoesnotexist-and-its-copycats-need-to-be-restricted/](https://venturebeat.com/media/why-thispersondoesnotexist-and-its-copycats-need-to-be-restricted/) | 2019/03/03 | Adam Ghahramani | VentureBeat | [https://web.archive.org/web/20240822125555/https://venturebeat.com/media/why-thispersondoesnotexist-and-its-copycats-need-to-be-restricted/](https://web.archive.org/web/20240822125555/https://venturebeat.com/media/why-thispersondoesnotexist-and-its-copycats-need-to-be-restricted/) | diff --git a/generated_pages/incidents/I00101.md b/generated_pages/incidents/I00101.md index f3e4a7a..af73bfe 100644 --- a/generated_pages/incidents/I00101.md +++ b/generated_pages/incidents/I00101.md @@ -15,15 +15,16 @@ | Reference | Pub Date | Authors | Org | Archive | | --------- | -------- | ------- | --- | ------- | +| [https://cepa.org/article/pro-putin-disinformation-warriors-take-war-of-aggression-to-reddit/](https://cepa.org/article/pro-putin-disinformation-warriors-take-war-of-aggression-to-reddit/) | 2023/12/12 | Aliide Naylor | CEPA | [https://web.archive.org/web/20240813063338/https://cepa.org/web/20240813063338/https://cepa.org/article/pro-putin-disinformation-warriors-take-war-of-aggression-to-reddit/](https://web.archive.org/web/20240813063338/https://cepa.org/web/20240813063338/https://cepa.org/article/pro-putin-disinformation-warriors-take-war-of-aggression-to-reddit/) | | Technique | Description given for this incident | | --------- | ------------------------- | -| [T0124 Suppress Opposition](../../generated_pages/techniques/T0124.md) |  IT00000373 This report looks at changes content posted to communities on Reddit (called Subreddits) after teams of voluntary moderators are replaced with what appear to be pro-Russian voices:

The r/antiwar subreddit appears to be a very recent takeover target. With 12,900 members it is not the largest community on Reddit, but this does place it squarely within the top 5% of all communities in terms of membership.

Three months ago a new moderator team was instated by subreddit head u/democracy101. Any posts documenting Russian aggression in Ukraine are now swiftly removed, while the board has been flooded with posts about how Ukraine is losing, or how American “neocons wrecked” the country.

The pinned post from moderator u/n0ahbody proclaims: “People who call for an end to Russian aggressions but not the Western aggressions Russia is reacting to don’t really want peace.” This user takes the view that any negative opinion about Russia is “shaped by what the fanatically Russophobic MSM wants you to think,” and that the United States is not threatened by its neighbors. Russia is.”

When u/n0ahbody took over the sub, the user posted a triumphant and vitriolic diatribe in another pro-Russia subreddit with some 33,500 members, r/EndlessWar. “We are making progress. We are purging the sub of all NAFO and NAFO-adjacent elements. Hundreds of them have been banned over the last 24 hours for various rule infractions, for being NAFO or NAFO-adjacent,” the user said, referencing the grassroots, pro-Ukrainian North Atlantic Fella Organization (NAFO) meme movement.

Several former users have reported they have indeed been banned from r/antiwar since the change in moderators. “If this subreddit cannot be explicitly against the invasion of Ukraine it will never truly be anti-war,” wrote one user Halcyon_Rein, in the antiwar subreddit on September 6. They then edited the post to say, “Edit: btw, I got f**king banned for this 💀💀💀”


A community hosted on Reddit was taken over by new moderators (T0151.011: Community Sub-Forum, T0150.005: Compromised). These moderators removed content posted to the community which favoured Ukraine over Russia (T0146.004: Administrator Account, T0151.011: Community Sub-Forum, T0124: Suppress Opposition). | -| [T0146.004 Administrator Account](../../generated_pages/techniques/T0146.004.md) |  IT00000372 This report looks at changes content posted to communities on Reddit (called Subreddits) after teams of voluntary moderators are replaced with what appear to be pro-Russian voices:

The r/antiwar subreddit appears to be a very recent takeover target. With 12,900 members it is not the largest community on Reddit, but this does place it squarely within the top 5% of all communities in terms of membership.

Three months ago a new moderator team was instated by subreddit head u/democracy101. Any posts documenting Russian aggression in Ukraine are now swiftly removed, while the board has been flooded with posts about how Ukraine is losing, or how American “neocons wrecked” the country.

The pinned post from moderator u/n0ahbody proclaims: “People who call for an end to Russian aggressions but not the Western aggressions Russia is reacting to don’t really want peace.” This user takes the view that any negative opinion about Russia is “shaped by what the fanatically Russophobic MSM wants you to think,” and that the United States is not threatened by its neighbors. Russia is.”

When u/n0ahbody took over the sub, the user posted a triumphant and vitriolic diatribe in another pro-Russia subreddit with some 33,500 members, r/EndlessWar. “We are making progress. We are purging the sub of all NAFO and NAFO-adjacent elements. Hundreds of them have been banned over the last 24 hours for various rule infractions, for being NAFO or NAFO-adjacent,” the user said, referencing the grassroots, pro-Ukrainian North Atlantic Fella Organization (NAFO) meme movement.

Several former users have reported they have indeed been banned from r/antiwar since the change in moderators. “If this subreddit cannot be explicitly against the invasion of Ukraine it will never truly be anti-war,” wrote one user Halcyon_Rein, in the antiwar subreddit on September 6. They then edited the post to say, “Edit: btw, I got f**king banned for this 💀💀💀”


A community hosted on Reddit was taken over by new moderators (T0151.011: Community Sub-Forum, T0150.005: Compromised). These moderators removed content posted to the community which favoured Ukraine over Russia (T0146.004: Administrator Account, T0151.011: Community Sub-Forum, T0124: Suppress Opposition). | -| [T0150.005 Compromised](../../generated_pages/techniques/T0150.005.md) |  IT00000371 This report looks at changes content posted to communities on Reddit (called Subreddits) after teams of voluntary moderators are replaced with what appear to be pro-Russian voices:

The r/antiwar subreddit appears to be a very recent takeover target. With 12,900 members it is not the largest community on Reddit, but this does place it squarely within the top 5% of all communities in terms of membership.

Three months ago a new moderator team was instated by subreddit head u/democracy101. Any posts documenting Russian aggression in Ukraine are now swiftly removed, while the board has been flooded with posts about how Ukraine is losing, or how American “neocons wrecked” the country.

The pinned post from moderator u/n0ahbody proclaims: “People who call for an end to Russian aggressions but not the Western aggressions Russia is reacting to don’t really want peace.” This user takes the view that any negative opinion about Russia is “shaped by what the fanatically Russophobic MSM wants you to think,” and that the United States is not threatened by its neighbors. Russia is.”

When u/n0ahbody took over the sub, the user posted a triumphant and vitriolic diatribe in another pro-Russia subreddit with some 33,500 members, r/EndlessWar. “We are making progress. We are purging the sub of all NAFO and NAFO-adjacent elements. Hundreds of them have been banned over the last 24 hours for various rule infractions, for being NAFO or NAFO-adjacent,” the user said, referencing the grassroots, pro-Ukrainian North Atlantic Fella Organization (NAFO) meme movement.

Several former users have reported they have indeed been banned from r/antiwar since the change in moderators. “If this subreddit cannot be explicitly against the invasion of Ukraine it will never truly be anti-war,” wrote one user Halcyon_Rein, in the antiwar subreddit on September 6. They then edited the post to say, “Edit: btw, I got f**king banned for this 💀💀💀”


A community hosted on Reddit was taken over by new moderators (T0151.011: Community Sub-Forum, T0150.005: Compromised). These moderators removed content posted to the community which favoured Ukraine over Russia (T0146.004: Administrator Account, T0151.011: Community Sub-Forum, T0124: Suppress Opposition). | -| [T0151.011 Community Sub-Forum](../../generated_pages/techniques/T0151.011.md) |  IT00000370 This report looks at changes content posted to communities on Reddit (called Subreddits) after teams of voluntary moderators are replaced with what appear to be pro-Russian voices:

The r/antiwar subreddit appears to be a very recent takeover target. With 12,900 members it is not the largest community on Reddit, but this does place it squarely within the top 5% of all communities in terms of membership.

Three months ago a new moderator team was instated by subreddit head u/democracy101. Any posts documenting Russian aggression in Ukraine are now swiftly removed, while the board has been flooded with posts about how Ukraine is losing, or how American “neocons wrecked” the country.

The pinned post from moderator u/n0ahbody proclaims: “People who call for an end to Russian aggressions but not the Western aggressions Russia is reacting to don’t really want peace.” This user takes the view that any negative opinion about Russia is “shaped by what the fanatically Russophobic MSM wants you to think,” and that the United States is not threatened by its neighbors. Russia is.”

When u/n0ahbody took over the sub, the user posted a triumphant and vitriolic diatribe in another pro-Russia subreddit with some 33,500 members, r/EndlessWar. “We are making progress. We are purging the sub of all NAFO and NAFO-adjacent elements. Hundreds of them have been banned over the last 24 hours for various rule infractions, for being NAFO or NAFO-adjacent,” the user said, referencing the grassroots, pro-Ukrainian North Atlantic Fella Organization (NAFO) meme movement.

Several former users have reported they have indeed been banned from r/antiwar since the change in moderators. “If this subreddit cannot be explicitly against the invasion of Ukraine it will never truly be anti-war,” wrote one user Halcyon_Rein, in the antiwar subreddit on September 6. They then edited the post to say, “Edit: btw, I got f**king banned for this 💀💀💀”


A community hosted on Reddit was taken over by new moderators (T0151.011: Community Sub-Forum, T0150.005: Compromised). These moderators removed content posted to the community which favoured Ukraine over Russia (T0146.004: Administrator Account, T0151.011: Community Sub-Forum, T0124: Suppress Opposition). | +| [T0124 Suppress Opposition](../../generated_pages/techniques/T0124.md) |  IT00000373 This report looks at changes content posted to communities on Reddit (called Subreddits) after teams of voluntary moderators are replaced with what appear to be pro-Russian voices:

The r/antiwar subreddit appears to be a very recent takeover target. With 12,900 members it is not the largest community on Reddit, but this does place it squarely within the top 5% of all communities in terms of membership.

Three months ago a new moderator team was instated by subreddit head u/democracy101. Any posts documenting Russian aggression in Ukraine are now swiftly removed, while the board has been flooded with posts about how Ukraine is losing, or how American “neocons wrecked” the country.

The pinned post from moderator u/n0ahbody proclaims: “People who call for an end to Russian aggressions but not the Western aggressions Russia is reacting to don’t really want peace.” This user takes the view that any negative opinion about Russia is “shaped by what the fanatically Russophobic MSM wants you to think,” and that the United States is not threatened by its neighbors. Russia is.”

When u/n0ahbody took over the sub, the user posted a triumphant and vitriolic diatribe in another pro-Russia subreddit with some 33,500 members, r/EndlessWar. “We are making progress. We are purging the sub of all NAFO and NAFO-adjacent elements. Hundreds of them have been banned over the last 24 hours for various rule infractions, for being NAFO or NAFO-adjacent,” the user said, referencing the grassroots, pro-Ukrainian North Atlantic Fella Organization (NAFO) meme movement.

Several former users have reported they have indeed been banned from r/antiwar since the change in moderators. “If this subreddit cannot be explicitly against the invasion of Ukraine it will never truly be anti-war,” wrote one user Halcyon_Rein, in the antiwar subreddit on September 6. They then edited the post to say, “Edit: btw, I got f**king banned for this 💀💀💀”


A community hosted on Reddit was taken over by new moderators (T0151.011: Community Sub-Forum, T0150.005: Compromised Asset). These moderators removed content posted to the community which favoured Ukraine over Russia (T0146.004: Administrator Account Asset, T0151.011: Community Sub-Forum, T0124: Suppress Opposition). | +| [T0146.004 Administrator Account Asset](../../generated_pages/techniques/T0146.004.md) |  IT00000372 This report looks at changes content posted to communities on Reddit (called Subreddits) after teams of voluntary moderators are replaced with what appear to be pro-Russian voices:

The r/antiwar subreddit appears to be a very recent takeover target. With 12,900 members it is not the largest community on Reddit, but this does place it squarely within the top 5% of all communities in terms of membership.

Three months ago a new moderator team was instated by subreddit head u/democracy101. Any posts documenting Russian aggression in Ukraine are now swiftly removed, while the board has been flooded with posts about how Ukraine is losing, or how American “neocons wrecked” the country.

The pinned post from moderator u/n0ahbody proclaims: “People who call for an end to Russian aggressions but not the Western aggressions Russia is reacting to don’t really want peace.” This user takes the view that any negative opinion about Russia is “shaped by what the fanatically Russophobic MSM wants you to think,” and that the United States is not threatened by its neighbors. Russia is.”

When u/n0ahbody took over the sub, the user posted a triumphant and vitriolic diatribe in another pro-Russia subreddit with some 33,500 members, r/EndlessWar. “We are making progress. We are purging the sub of all NAFO and NAFO-adjacent elements. Hundreds of them have been banned over the last 24 hours for various rule infractions, for being NAFO or NAFO-adjacent,” the user said, referencing the grassroots, pro-Ukrainian North Atlantic Fella Organization (NAFO) meme movement.

Several former users have reported they have indeed been banned from r/antiwar since the change in moderators. “If this subreddit cannot be explicitly against the invasion of Ukraine it will never truly be anti-war,” wrote one user Halcyon_Rein, in the antiwar subreddit on September 6. They then edited the post to say, “Edit: btw, I got f**king banned for this 💀💀💀”


A community hosted on Reddit was taken over by new moderators (T0151.011: Community Sub-Forum, T0150.005: Compromised Asset). These moderators removed content posted to the community which favoured Ukraine over Russia (T0146.004: Administrator Account Asset, T0151.011: Community Sub-Forum, T0124: Suppress Opposition). | +| [T0150.005 Compromised Asset](../../generated_pages/techniques/T0150.005.md) |  IT00000371 This report looks at changes content posted to communities on Reddit (called Subreddits) after teams of voluntary moderators are replaced with what appear to be pro-Russian voices:

The r/antiwar subreddit appears to be a very recent takeover target. With 12,900 members it is not the largest community on Reddit, but this does place it squarely within the top 5% of all communities in terms of membership.

Three months ago a new moderator team was instated by subreddit head u/democracy101. Any posts documenting Russian aggression in Ukraine are now swiftly removed, while the board has been flooded with posts about how Ukraine is losing, or how American “neocons wrecked” the country.

The pinned post from moderator u/n0ahbody proclaims: “People who call for an end to Russian aggressions but not the Western aggressions Russia is reacting to don’t really want peace.” This user takes the view that any negative opinion about Russia is “shaped by what the fanatically Russophobic MSM wants you to think,” and that the United States is not threatened by its neighbors. Russia is.”

When u/n0ahbody took over the sub, the user posted a triumphant and vitriolic diatribe in another pro-Russia subreddit with some 33,500 members, r/EndlessWar. “We are making progress. We are purging the sub of all NAFO and NAFO-adjacent elements. Hundreds of them have been banned over the last 24 hours for various rule infractions, for being NAFO or NAFO-adjacent,” the user said, referencing the grassroots, pro-Ukrainian North Atlantic Fella Organization (NAFO) meme movement.

Several former users have reported they have indeed been banned from r/antiwar since the change in moderators. “If this subreddit cannot be explicitly against the invasion of Ukraine it will never truly be anti-war,” wrote one user Halcyon_Rein, in the antiwar subreddit on September 6. They then edited the post to say, “Edit: btw, I got f**king banned for this 💀💀💀”


A community hosted on Reddit was taken over by new moderators (T0151.011: Community Sub-Forum, T0150.005: Compromised Asset). These moderators removed content posted to the community which favoured Ukraine over Russia (T0146.004: Administrator Account Asset, T0151.011: Community Sub-Forum, T0124: Suppress Opposition). | +| [T0151.011 Community Sub-Forum](../../generated_pages/techniques/T0151.011.md) |  IT00000370 This report looks at changes content posted to communities on Reddit (called Subreddits) after teams of voluntary moderators are replaced with what appear to be pro-Russian voices:

The r/antiwar subreddit appears to be a very recent takeover target. With 12,900 members it is not the largest community on Reddit, but this does place it squarely within the top 5% of all communities in terms of membership.

Three months ago a new moderator team was instated by subreddit head u/democracy101. Any posts documenting Russian aggression in Ukraine are now swiftly removed, while the board has been flooded with posts about how Ukraine is losing, or how American “neocons wrecked” the country.

The pinned post from moderator u/n0ahbody proclaims: “People who call for an end to Russian aggressions but not the Western aggressions Russia is reacting to don’t really want peace.” This user takes the view that any negative opinion about Russia is “shaped by what the fanatically Russophobic MSM wants you to think,” and that the United States is not threatened by its neighbors. Russia is.”

When u/n0ahbody took over the sub, the user posted a triumphant and vitriolic diatribe in another pro-Russia subreddit with some 33,500 members, r/EndlessWar. “We are making progress. We are purging the sub of all NAFO and NAFO-adjacent elements. Hundreds of them have been banned over the last 24 hours for various rule infractions, for being NAFO or NAFO-adjacent,” the user said, referencing the grassroots, pro-Ukrainian North Atlantic Fella Organization (NAFO) meme movement.

Several former users have reported they have indeed been banned from r/antiwar since the change in moderators. “If this subreddit cannot be explicitly against the invasion of Ukraine it will never truly be anti-war,” wrote one user Halcyon_Rein, in the antiwar subreddit on September 6. They then edited the post to say, “Edit: btw, I got f**king banned for this 💀💀💀”


A community hosted on Reddit was taken over by new moderators (T0151.011: Community Sub-Forum, T0150.005: Compromised Asset). These moderators removed content posted to the community which favoured Ukraine over Russia (T0146.004: Administrator Account Asset, T0151.011: Community Sub-Forum, T0124: Suppress Opposition). | DO NOT EDIT ABOVE THIS LINE - PLEASE ADD NOTES BELOW \ No newline at end of file diff --git a/generated_pages/incidents/I00102.md b/generated_pages/incidents/I00102.md index 1cd87cb..ac142a4 100644 --- a/generated_pages/incidents/I00102.md +++ b/generated_pages/incidents/I00102.md @@ -15,21 +15,22 @@ | Reference | Pub Date | Authors | Org | Archive | | --------- | -------- | ------- | --- | ------- | +| [https://www.bellingcat.com/news/americas/2019/04/28/ignore-the-poway-synagogue-shooters-manifesto-pay-attention-to-8chans-pol-board/](https://www.bellingcat.com/news/americas/2019/04/28/ignore-the-poway-synagogue-shooters-manifesto-pay-attention-to-8chans-pol-board/) | 2019/04/28 | Robert Evans | bellingcat | [https://web.archive.org/web/20240929180218/https://www.bellingcat.com/news/americas/2019/04/28/ignore-the-poway-synagogue-shooters-manifesto-pay-attention-to-8chans-pol-board/](https://web.archive.org/web/20240929180218/https://www.bellingcat.com/news/americas/2019/04/28/ignore-the-poway-synagogue-shooters-manifesto-pay-attention-to-8chans-pol-board/) | | Technique | Description given for this incident | | --------- | ------------------------- | -| [T0084.004 Appropriate Content](../../generated_pages/techniques/T0084.004.md) |  IT00000377 On April 27, 2019, at around 11:30 a.m. local time, a young man with a semi-automatic rifle walked into the Chabad of Poway Synagogue in Poway, California. He opened fire, killing one worshipper and wounding three others. In the hours since the shooting, a manifesto, believed to be written by the shooter, began circulating online. Evidence has also surfaced that, like the Christchurch Mosque shooter, this killer began his rampage with a post on 8chan’s /pol/ board.

Although both of these attacks may seem different, since they targeted worshippers of different faiths, both shooters were united by the same fascist ideology. They were also both radicalized in the same place: 8chan’s /pol/ board.

This has been corroborated by posts on the board itself, where “anons,” as the posters call themselves, recirculated the shooter’s since-deleted post. In it, the alleged shooter claims to have been “lurking” on the site for a year and a half. He includes a link to a livestream of his rampage — which thankfully does not appear to have worked — and he also includes a pastebin link to his manifesto.

The very first response to his announcement was another anon cheering him on and telling him to “get the high score,” AKA, kill a huge number of people.


Before carrying out a mass shooting, the shooter posted a thread to 8chan’s /pol/ board. The post directed users to a variety of different platforms (T0146.006: Open Access Platform, T0151.012: Image Board Platform, T0115: Post Content, T0122: Direct Users to Alternative Platforms); a Facebook account on which the shooter attempted to livestream the shooting (T0146: Account, T0151.001: Social Media Platform); and a manifesto they had written hosted on pastebin (T0146.006: Open Access Platform, T0152.005: Paste Platform, T0115: Post Content) and uploaded to the file sharing platform Mediafire (T0152.010: File Hosting Platform, T0085.004: Develop Document).

The report looks deeper into 8chan’s /pol/ board:

8chan is a large website, which includes a number of different discussion groups about everything from anime to left-wing politics. /pol/ is one particularly active board on the website, and it is best described as a gathering place for extremely online neo-Nazis.

[...]

I’ve browsed /pol/ on an almost daily basis since the Christchurch shooting. It has not been difficult to find calls for violence. On Monday, March 25 of this year, I ran across evidence of anons translating the Christchurch shooter’s manifesto into other languages in an attempt to inspire more shootings across the globe.

This tactic can work, and today’s shooting is proof. The Poway Synagogue shooter directly cited the Christchurch shooter as his inspiration, saying he decided to carry out his attack roughly two weeks after that shooting. On /pol/, many anons refer to the Christchurch shooter, Brenton Tarrant, as “Saint Tarrant,” complete with medieval-inspired iconography.


Manifestos posted to 8chan are translated and reshared by other platform users (T0101: Create Localised Content, T0146.006: Open Access Platform, T0151.012: Image Board Platform, T0115: Post Content, T0084.004: Appropriate Content).

When I began looking through /pol/ right after the Poway Synagogue shooting, I came across several claims that the shootings had been a “false flag” aimed at making the message board look bad.

When Bellingcat tweeted out a warning about shitposting and the shooter’s manifesto, in the immediate wake of the attack, probable anons even commented on the Tweet in an attempt to deny that a channer had been behind the attack.

This is a recognizable pattern that occurs in the wake of any crimes committed by members of the board. While the initial response to the Christchurch shooter’s massacre thread was riotous glee, in the days after the shooting many anons began to claim the attack had been a false flag. This actually sparked significant division and debate between the members of /pol/. In the below image, a user mocks other anons for being unable to “believe something in your favor is real.” Another anon responds, “As the evidence comes out, its [sic] quite clear that this was a false flag.”

In his manifesto, the Poway Synagogue shooter even weighed in on this debate, accusing other anons who called the Christchurch and Tree of Life Synagogue shootings “false flags” to merely have been scared: “They can’t fathom that there are brave White men alive who have the willpower and courage it takes to say, ‘Fuck my life—I’m willing to sacrifice everything for the benefit of my race.’”


Platform users deny that their platform has been used by mass shooters to publish their manifestos (T0129.006: Deny Involvement). | -| [T0085.004 Develop Document](../../generated_pages/techniques/T0085.004.md) |  IT00000378 On April 27, 2019, at around 11:30 a.m. local time, a young man with a semi-automatic rifle walked into the Chabad of Poway Synagogue in Poway, California. He opened fire, killing one worshipper and wounding three others. In the hours since the shooting, a manifesto, believed to be written by the shooter, began circulating online. Evidence has also surfaced that, like the Christchurch Mosque shooter, this killer began his rampage with a post on 8chan’s /pol/ board.

Although both of these attacks may seem different, since they targeted worshippers of different faiths, both shooters were united by the same fascist ideology. They were also both radicalized in the same place: 8chan’s /pol/ board.

This has been corroborated by posts on the board itself, where “anons,” as the posters call themselves, recirculated the shooter’s since-deleted post. In it, the alleged shooter claims to have been “lurking” on the site for a year and a half. He includes a link to a livestream of his rampage — which thankfully does not appear to have worked — and he also includes a pastebin link to his manifesto.

The very first response to his announcement was another anon cheering him on and telling him to “get the high score,” AKA, kill a huge number of people.


Before carrying out a mass shooting, the shooter posted a thread to 8chan’s /pol/ board. The post directed users to a variety of different platforms (T0146.006: Open Access Platform, T0151.012: Image Board Platform, T0115: Post Content, T0122: Direct Users to Alternative Platforms); a Facebook account on which the shooter attempted to livestream the shooting (T0146: Account, T0151.001: Social Media Platform); and a manifesto they had written hosted on pastebin (T0146.006: Open Access Platform, T0152.005: Paste Platform, T0115: Post Content) and uploaded to the file sharing platform Mediafire (T0152.010: File Hosting Platform, T0085.004: Develop Document).

The report looks deeper into 8chan’s /pol/ board:

8chan is a large website, which includes a number of different discussion groups about everything from anime to left-wing politics. /pol/ is one particularly active board on the website, and it is best described as a gathering place for extremely online neo-Nazis.

[...]

I’ve browsed /pol/ on an almost daily basis since the Christchurch shooting. It has not been difficult to find calls for violence. On Monday, March 25 of this year, I ran across evidence of anons translating the Christchurch shooter’s manifesto into other languages in an attempt to inspire more shootings across the globe.

This tactic can work, and today’s shooting is proof. The Poway Synagogue shooter directly cited the Christchurch shooter as his inspiration, saying he decided to carry out his attack roughly two weeks after that shooting. On /pol/, many anons refer to the Christchurch shooter, Brenton Tarrant, as “Saint Tarrant,” complete with medieval-inspired iconography.


Manifestos posted to 8chan are translated and reshared by other platform users (T0101: Create Localised Content, T0146.006: Open Access Platform, T0151.012: Image Board Platform, T0115: Post Content, T0084.004: Appropriate Content).

When I began looking through /pol/ right after the Poway Synagogue shooting, I came across several claims that the shootings had been a “false flag” aimed at making the message board look bad.

When Bellingcat tweeted out a warning about shitposting and the shooter’s manifesto, in the immediate wake of the attack, probable anons even commented on the Tweet in an attempt to deny that a channer had been behind the attack.

This is a recognizable pattern that occurs in the wake of any crimes committed by members of the board. While the initial response to the Christchurch shooter’s massacre thread was riotous glee, in the days after the shooting many anons began to claim the attack had been a false flag. This actually sparked significant division and debate between the members of /pol/. In the below image, a user mocks other anons for being unable to “believe something in your favor is real.” Another anon responds, “As the evidence comes out, its [sic] quite clear that this was a false flag.”

In his manifesto, the Poway Synagogue shooter even weighed in on this debate, accusing other anons who called the Christchurch and Tree of Life Synagogue shootings “false flags” to merely have been scared: “They can’t fathom that there are brave White men alive who have the willpower and courage it takes to say, ‘Fuck my life—I’m willing to sacrifice everything for the benefit of my race.’”


Platform users deny that their platform has been used by mass shooters to publish their manifestos (T0129.006: Deny Involvement). | -| [T0101 Create Localised Content](../../generated_pages/techniques/T0101.md) |  IT00000375 On April 27, 2019, at around 11:30 a.m. local time, a young man with a semi-automatic rifle walked into the Chabad of Poway Synagogue in Poway, California. He opened fire, killing one worshipper and wounding three others. In the hours since the shooting, a manifesto, believed to be written by the shooter, began circulating online. Evidence has also surfaced that, like the Christchurch Mosque shooter, this killer began his rampage with a post on 8chan’s /pol/ board.

Although both of these attacks may seem different, since they targeted worshippers of different faiths, both shooters were united by the same fascist ideology. They were also both radicalized in the same place: 8chan’s /pol/ board.

This has been corroborated by posts on the board itself, where “anons,” as the posters call themselves, recirculated the shooter’s since-deleted post. In it, the alleged shooter claims to have been “lurking” on the site for a year and a half. He includes a link to a livestream of his rampage — which thankfully does not appear to have worked — and he also includes a pastebin link to his manifesto.

The very first response to his announcement was another anon cheering him on and telling him to “get the high score,” AKA, kill a huge number of people.


Before carrying out a mass shooting, the shooter posted a thread to 8chan’s /pol/ board. The post directed users to a variety of different platforms (T0146.006: Open Access Platform, T0151.012: Image Board Platform, T0115: Post Content, T0122: Direct Users to Alternative Platforms); a Facebook account on which the shooter attempted to livestream the shooting (T0146: Account, T0151.001: Social Media Platform); and a manifesto they had written hosted on pastebin (T0146.006: Open Access Platform, T0152.005: Paste Platform, T0115: Post Content) and uploaded to the file sharing platform Mediafire (T0152.010: File Hosting Platform, T0085.004: Develop Document).

The report looks deeper into 8chan’s /pol/ board:

8chan is a large website, which includes a number of different discussion groups about everything from anime to left-wing politics. /pol/ is one particularly active board on the website, and it is best described as a gathering place for extremely online neo-Nazis.

[...]

I’ve browsed /pol/ on an almost daily basis since the Christchurch shooting. It has not been difficult to find calls for violence. On Monday, March 25 of this year, I ran across evidence of anons translating the Christchurch shooter’s manifesto into other languages in an attempt to inspire more shootings across the globe.

This tactic can work, and today’s shooting is proof. The Poway Synagogue shooter directly cited the Christchurch shooter as his inspiration, saying he decided to carry out his attack roughly two weeks after that shooting. On /pol/, many anons refer to the Christchurch shooter, Brenton Tarrant, as “Saint Tarrant,” complete with medieval-inspired iconography.


Manifestos posted to 8chan are translated and reshared by other platform users (T0101: Create Localised Content, T0146.006: Open Access Platform, T0151.012: Image Board Platform, T0115: Post Content, T0084.004: Appropriate Content).

When I began looking through /pol/ right after the Poway Synagogue shooting, I came across several claims that the shootings had been a “false flag” aimed at making the message board look bad.

When Bellingcat tweeted out a warning about shitposting and the shooter’s manifesto, in the immediate wake of the attack, probable anons even commented on the Tweet in an attempt to deny that a channer had been behind the attack.

This is a recognizable pattern that occurs in the wake of any crimes committed by members of the board. While the initial response to the Christchurch shooter’s massacre thread was riotous glee, in the days after the shooting many anons began to claim the attack had been a false flag. This actually sparked significant division and debate between the members of /pol/. In the below image, a user mocks other anons for being unable to “believe something in your favor is real.” Another anon responds, “As the evidence comes out, its [sic] quite clear that this was a false flag.”

In his manifesto, the Poway Synagogue shooter even weighed in on this debate, accusing other anons who called the Christchurch and Tree of Life Synagogue shootings “false flags” to merely have been scared: “They can’t fathom that there are brave White men alive who have the willpower and courage it takes to say, ‘Fuck my life—I’m willing to sacrifice everything for the benefit of my race.’”


Platform users deny that their platform has been used by mass shooters to publish their manifestos (T0129.006: Deny Involvement). | -| [T0122 Direct Users to Alternative Platforms](../../generated_pages/techniques/T0122.md) |  IT00000382 On April 27, 2019, at around 11:30 a.m. local time, a young man with a semi-automatic rifle walked into the Chabad of Poway Synagogue in Poway, California. He opened fire, killing one worshipper and wounding three others. In the hours since the shooting, a manifesto, believed to be written by the shooter, began circulating online. Evidence has also surfaced that, like the Christchurch Mosque shooter, this killer began his rampage with a post on 8chan’s /pol/ board.

Although both of these attacks may seem different, since they targeted worshippers of different faiths, both shooters were united by the same fascist ideology. They were also both radicalized in the same place: 8chan’s /pol/ board.

This has been corroborated by posts on the board itself, where “anons,” as the posters call themselves, recirculated the shooter’s since-deleted post. In it, the alleged shooter claims to have been “lurking” on the site for a year and a half. He includes a link to a livestream of his rampage — which thankfully does not appear to have worked — and he also includes a pastebin link to his manifesto.

The very first response to his announcement was another anon cheering him on and telling him to “get the high score,” AKA, kill a huge number of people.


Before carrying out a mass shooting, the shooter posted a thread to 8chan’s /pol/ board. The post directed users to a variety of different platforms (T0146.006: Open Access Platform, T0151.012: Image Board Platform, T0115: Post Content, T0122: Direct Users to Alternative Platforms); a Facebook account on which the shooter attempted to livestream the shooting (T0146: Account, T0151.001: Social Media Platform); and a manifesto they had written hosted on pastebin (T0146.006: Open Access Platform, T0152.005: Paste Platform, T0115: Post Content) and uploaded to the file sharing platform Mediafire (T0152.010: File Hosting Platform, T0085.004: Develop Document).

The report looks deeper into 8chan’s /pol/ board:

8chan is a large website, which includes a number of different discussion groups about everything from anime to left-wing politics. /pol/ is one particularly active board on the website, and it is best described as a gathering place for extremely online neo-Nazis.

[...]

I’ve browsed /pol/ on an almost daily basis since the Christchurch shooting. It has not been difficult to find calls for violence. On Monday, March 25 of this year, I ran across evidence of anons translating the Christchurch shooter’s manifesto into other languages in an attempt to inspire more shootings across the globe.

This tactic can work, and today’s shooting is proof. The Poway Synagogue shooter directly cited the Christchurch shooter as his inspiration, saying he decided to carry out his attack roughly two weeks after that shooting. On /pol/, many anons refer to the Christchurch shooter, Brenton Tarrant, as “Saint Tarrant,” complete with medieval-inspired iconography.


Manifestos posted to 8chan are translated and reshared by other platform users (T0101: Create Localised Content, T0146.006: Open Access Platform, T0151.012: Image Board Platform, T0115: Post Content, T0084.004: Appropriate Content).

When I began looking through /pol/ right after the Poway Synagogue shooting, I came across several claims that the shootings had been a “false flag” aimed at making the message board look bad.

When Bellingcat tweeted out a warning about shitposting and the shooter’s manifesto, in the immediate wake of the attack, probable anons even commented on the Tweet in an attempt to deny that a channer had been behind the attack.

This is a recognizable pattern that occurs in the wake of any crimes committed by members of the board. While the initial response to the Christchurch shooter’s massacre thread was riotous glee, in the days after the shooting many anons began to claim the attack had been a false flag. This actually sparked significant division and debate between the members of /pol/. In the below image, a user mocks other anons for being unable to “believe something in your favor is real.” Another anon responds, “As the evidence comes out, its [sic] quite clear that this was a false flag.”

In his manifesto, the Poway Synagogue shooter even weighed in on this debate, accusing other anons who called the Christchurch and Tree of Life Synagogue shootings “false flags” to merely have been scared: “They can’t fathom that there are brave White men alive who have the willpower and courage it takes to say, ‘Fuck my life—I’m willing to sacrifice everything for the benefit of my race.’”


Platform users deny that their platform has been used by mass shooters to publish their manifestos (T0129.006: Deny Involvement). | -| [T0129.006 Deny Involvement](../../generated_pages/techniques/T0129.006.md) |  IT00000383 On April 27, 2019, at around 11:30 a.m. local time, a young man with a semi-automatic rifle walked into the Chabad of Poway Synagogue in Poway, California. He opened fire, killing one worshipper and wounding three others. In the hours since the shooting, a manifesto, believed to be written by the shooter, began circulating online. Evidence has also surfaced that, like the Christchurch Mosque shooter, this killer began his rampage with a post on 8chan’s /pol/ board.

Although both of these attacks may seem different, since they targeted worshippers of different faiths, both shooters were united by the same fascist ideology. They were also both radicalized in the same place: 8chan’s /pol/ board.

This has been corroborated by posts on the board itself, where “anons,” as the posters call themselves, recirculated the shooter’s since-deleted post. In it, the alleged shooter claims to have been “lurking” on the site for a year and a half. He includes a link to a livestream of his rampage — which thankfully does not appear to have worked — and he also includes a pastebin link to his manifesto.

The very first response to his announcement was another anon cheering him on and telling him to “get the high score,” AKA, kill a huge number of people.


Before carrying out a mass shooting, the shooter posted a thread to 8chan’s /pol/ board. The post directed users to a variety of different platforms (T0146.006: Open Access Platform, T0151.012: Image Board Platform, T0115: Post Content, T0122: Direct Users to Alternative Platforms); a Facebook account on which the shooter attempted to livestream the shooting (T0146: Account, T0151.001: Social Media Platform); and a manifesto they had written hosted on pastebin (T0146.006: Open Access Platform, T0152.005: Paste Platform, T0115: Post Content) and uploaded to the file sharing platform Mediafire (T0152.010: File Hosting Platform, T0085.004: Develop Document).

The report looks deeper into 8chan’s /pol/ board:

8chan is a large website, which includes a number of different discussion groups about everything from anime to left-wing politics. /pol/ is one particularly active board on the website, and it is best described as a gathering place for extremely online neo-Nazis.

[...]

I’ve browsed /pol/ on an almost daily basis since the Christchurch shooting. It has not been difficult to find calls for violence. On Monday, March 25 of this year, I ran across evidence of anons translating the Christchurch shooter’s manifesto into other languages in an attempt to inspire more shootings across the globe.

This tactic can work, and today’s shooting is proof. The Poway Synagogue shooter directly cited the Christchurch shooter as his inspiration, saying he decided to carry out his attack roughly two weeks after that shooting. On /pol/, many anons refer to the Christchurch shooter, Brenton Tarrant, as “Saint Tarrant,” complete with medieval-inspired iconography.


Manifestos posted to 8chan are translated and reshared by other platform users (T0101: Create Localised Content, T0146.006: Open Access Platform, T0151.012: Image Board Platform, T0115: Post Content, T0084.004: Appropriate Content).

When I began looking through /pol/ right after the Poway Synagogue shooting, I came across several claims that the shootings had been a “false flag” aimed at making the message board look bad.

When Bellingcat tweeted out a warning about shitposting and the shooter’s manifesto, in the immediate wake of the attack, probable anons even commented on the Tweet in an attempt to deny that a channer had been behind the attack.

This is a recognizable pattern that occurs in the wake of any crimes committed by members of the board. While the initial response to the Christchurch shooter’s massacre thread was riotous glee, in the days after the shooting many anons began to claim the attack had been a false flag. This actually sparked significant division and debate between the members of /pol/. In the below image, a user mocks other anons for being unable to “believe something in your favor is real.” Another anon responds, “As the evidence comes out, its [sic] quite clear that this was a false flag.”

In his manifesto, the Poway Synagogue shooter even weighed in on this debate, accusing other anons who called the Christchurch and Tree of Life Synagogue shootings “false flags” to merely have been scared: “They can’t fathom that there are brave White men alive who have the willpower and courage it takes to say, ‘Fuck my life—I’m willing to sacrifice everything for the benefit of my race.’”


Platform users deny that their platform has been used by mass shooters to publish their manifestos (T0129.006: Deny Involvement). | -| [T0146.006 Open Access Platform](../../generated_pages/techniques/T0146.006.md) |  IT00000376 On April 27, 2019, at around 11:30 a.m. local time, a young man with a semi-automatic rifle walked into the Chabad of Poway Synagogue in Poway, California. He opened fire, killing one worshipper and wounding three others. In the hours since the shooting, a manifesto, believed to be written by the shooter, began circulating online. Evidence has also surfaced that, like the Christchurch Mosque shooter, this killer began his rampage with a post on 8chan’s /pol/ board.

Although both of these attacks may seem different, since they targeted worshippers of different faiths, both shooters were united by the same fascist ideology. They were also both radicalized in the same place: 8chan’s /pol/ board.

This has been corroborated by posts on the board itself, where “anons,” as the posters call themselves, recirculated the shooter’s since-deleted post. In it, the alleged shooter claims to have been “lurking” on the site for a year and a half. He includes a link to a livestream of his rampage — which thankfully does not appear to have worked — and he also includes a pastebin link to his manifesto.

The very first response to his announcement was another anon cheering him on and telling him to “get the high score,” AKA, kill a huge number of people.


Before carrying out a mass shooting, the shooter posted a thread to 8chan’s /pol/ board. The post directed users to a variety of different platforms (T0146.006: Open Access Platform, T0151.012: Image Board Platform, T0115: Post Content, T0122: Direct Users to Alternative Platforms); a Facebook account on which the shooter attempted to livestream the shooting (T0146: Account, T0151.001: Social Media Platform); and a manifesto they had written hosted on pastebin (T0146.006: Open Access Platform, T0152.005: Paste Platform, T0115: Post Content) and uploaded to the file sharing platform Mediafire (T0152.010: File Hosting Platform, T0085.004: Develop Document).

The report looks deeper into 8chan’s /pol/ board:

8chan is a large website, which includes a number of different discussion groups about everything from anime to left-wing politics. /pol/ is one particularly active board on the website, and it is best described as a gathering place for extremely online neo-Nazis.

[...]

I’ve browsed /pol/ on an almost daily basis since the Christchurch shooting. It has not been difficult to find calls for violence. On Monday, March 25 of this year, I ran across evidence of anons translating the Christchurch shooter’s manifesto into other languages in an attempt to inspire more shootings across the globe.

This tactic can work, and today’s shooting is proof. The Poway Synagogue shooter directly cited the Christchurch shooter as his inspiration, saying he decided to carry out his attack roughly two weeks after that shooting. On /pol/, many anons refer to the Christchurch shooter, Brenton Tarrant, as “Saint Tarrant,” complete with medieval-inspired iconography.


Manifestos posted to 8chan are translated and reshared by other platform users (T0101: Create Localised Content, T0146.006: Open Access Platform, T0151.012: Image Board Platform, T0115: Post Content, T0084.004: Appropriate Content).

When I began looking through /pol/ right after the Poway Synagogue shooting, I came across several claims that the shootings had been a “false flag” aimed at making the message board look bad.

When Bellingcat tweeted out a warning about shitposting and the shooter’s manifesto, in the immediate wake of the attack, probable anons even commented on the Tweet in an attempt to deny that a channer had been behind the attack.

This is a recognizable pattern that occurs in the wake of any crimes committed by members of the board. While the initial response to the Christchurch shooter’s massacre thread was riotous glee, in the days after the shooting many anons began to claim the attack had been a false flag. This actually sparked significant division and debate between the members of /pol/. In the below image, a user mocks other anons for being unable to “believe something in your favor is real.” Another anon responds, “As the evidence comes out, its [sic] quite clear that this was a false flag.”

In his manifesto, the Poway Synagogue shooter even weighed in on this debate, accusing other anons who called the Christchurch and Tree of Life Synagogue shootings “false flags” to merely have been scared: “They can’t fathom that there are brave White men alive who have the willpower and courage it takes to say, ‘Fuck my life—I’m willing to sacrifice everything for the benefit of my race.’”


Platform users deny that their platform has been used by mass shooters to publish their manifestos (T0129.006: Deny Involvement). | -| [T0151.001 Social Media Platform](../../generated_pages/techniques/T0151.001.md) |  IT00000381 On April 27, 2019, at around 11:30 a.m. local time, a young man with a semi-automatic rifle walked into the Chabad of Poway Synagogue in Poway, California. He opened fire, killing one worshipper and wounding three others. In the hours since the shooting, a manifesto, believed to be written by the shooter, began circulating online. Evidence has also surfaced that, like the Christchurch Mosque shooter, this killer began his rampage with a post on 8chan’s /pol/ board.

Although both of these attacks may seem different, since they targeted worshippers of different faiths, both shooters were united by the same fascist ideology. They were also both radicalized in the same place: 8chan’s /pol/ board.

This has been corroborated by posts on the board itself, where “anons,” as the posters call themselves, recirculated the shooter’s since-deleted post. In it, the alleged shooter claims to have been “lurking” on the site for a year and a half. He includes a link to a livestream of his rampage — which thankfully does not appear to have worked — and he also includes a pastebin link to his manifesto.

The very first response to his announcement was another anon cheering him on and telling him to “get the high score,” AKA, kill a huge number of people.


Before carrying out a mass shooting, the shooter posted a thread to 8chan’s /pol/ board. The post directed users to a variety of different platforms (T0146.006: Open Access Platform, T0151.012: Image Board Platform, T0115: Post Content, T0122: Direct Users to Alternative Platforms); a Facebook account on which the shooter attempted to livestream the shooting (T0146: Account, T0151.001: Social Media Platform); and a manifesto they had written hosted on pastebin (T0146.006: Open Access Platform, T0152.005: Paste Platform, T0115: Post Content) and uploaded to the file sharing platform Mediafire (T0152.010: File Hosting Platform, T0085.004: Develop Document).

The report looks deeper into 8chan’s /pol/ board:

8chan is a large website, which includes a number of different discussion groups about everything from anime to left-wing politics. /pol/ is one particularly active board on the website, and it is best described as a gathering place for extremely online neo-Nazis.

[...]

I’ve browsed /pol/ on an almost daily basis since the Christchurch shooting. It has not been difficult to find calls for violence. On Monday, March 25 of this year, I ran across evidence of anons translating the Christchurch shooter’s manifesto into other languages in an attempt to inspire more shootings across the globe.

This tactic can work, and today’s shooting is proof. The Poway Synagogue shooter directly cited the Christchurch shooter as his inspiration, saying he decided to carry out his attack roughly two weeks after that shooting. On /pol/, many anons refer to the Christchurch shooter, Brenton Tarrant, as “Saint Tarrant,” complete with medieval-inspired iconography.


Manifestos posted to 8chan are translated and reshared by other platform users (T0101: Create Localised Content, T0146.006: Open Access Platform, T0151.012: Image Board Platform, T0115: Post Content, T0084.004: Appropriate Content).

When I began looking through /pol/ right after the Poway Synagogue shooting, I came across several claims that the shootings had been a “false flag” aimed at making the message board look bad.

When Bellingcat tweeted out a warning about shitposting and the shooter’s manifesto, in the immediate wake of the attack, probable anons even commented on the Tweet in an attempt to deny that a channer had been behind the attack.

This is a recognizable pattern that occurs in the wake of any crimes committed by members of the board. While the initial response to the Christchurch shooter’s massacre thread was riotous glee, in the days after the shooting many anons began to claim the attack had been a false flag. This actually sparked significant division and debate between the members of /pol/. In the below image, a user mocks other anons for being unable to “believe something in your favor is real.” Another anon responds, “As the evidence comes out, its [sic] quite clear that this was a false flag.”

In his manifesto, the Poway Synagogue shooter even weighed in on this debate, accusing other anons who called the Christchurch and Tree of Life Synagogue shootings “false flags” to merely have been scared: “They can’t fathom that there are brave White men alive who have the willpower and courage it takes to say, ‘Fuck my life—I’m willing to sacrifice everything for the benefit of my race.’”


Platform users deny that their platform has been used by mass shooters to publish their manifestos (T0129.006: Deny Involvement). | -| [T0151.012 Image Board Platform](../../generated_pages/techniques/T0151.012.md) |  IT00000374 On April 27, 2019, at around 11:30 a.m. local time, a young man with a semi-automatic rifle walked into the Chabad of Poway Synagogue in Poway, California. He opened fire, killing one worshipper and wounding three others. In the hours since the shooting, a manifesto, believed to be written by the shooter, began circulating online. Evidence has also surfaced that, like the Christchurch Mosque shooter, this killer began his rampage with a post on 8chan’s /pol/ board.

Although both of these attacks may seem different, since they targeted worshippers of different faiths, both shooters were united by the same fascist ideology. They were also both radicalized in the same place: 8chan’s /pol/ board.

This has been corroborated by posts on the board itself, where “anons,” as the posters call themselves, recirculated the shooter’s since-deleted post. In it, the alleged shooter claims to have been “lurking” on the site for a year and a half. He includes a link to a livestream of his rampage — which thankfully does not appear to have worked — and he also includes a pastebin link to his manifesto.

The very first response to his announcement was another anon cheering him on and telling him to “get the high score,” AKA, kill a huge number of people.


Before carrying out a mass shooting, the shooter posted a thread to 8chan’s /pol/ board. The post directed users to a variety of different platforms (T0146.006: Open Access Platform, T0151.012: Image Board Platform, T0115: Post Content, T0122: Direct Users to Alternative Platforms); a Facebook account on which the shooter attempted to livestream the shooting (T0146: Account, T0151.001: Social Media Platform); and a manifesto they had written hosted on pastebin (T0146.006: Open Access Platform, T0152.005: Paste Platform, T0115: Post Content) and uploaded to the file sharing platform Mediafire (T0152.010: File Hosting Platform, T0085.004: Develop Document).

The report looks deeper into 8chan’s /pol/ board:

8chan is a large website, which includes a number of different discussion groups about everything from anime to left-wing politics. /pol/ is one particularly active board on the website, and it is best described as a gathering place for extremely online neo-Nazis.

[...]

I’ve browsed /pol/ on an almost daily basis since the Christchurch shooting. It has not been difficult to find calls for violence. On Monday, March 25 of this year, I ran across evidence of anons translating the Christchurch shooter’s manifesto into other languages in an attempt to inspire more shootings across the globe.

This tactic can work, and today’s shooting is proof. The Poway Synagogue shooter directly cited the Christchurch shooter as his inspiration, saying he decided to carry out his attack roughly two weeks after that shooting. On /pol/, many anons refer to the Christchurch shooter, Brenton Tarrant, as “Saint Tarrant,” complete with medieval-inspired iconography.


Manifestos posted to 8chan are translated and reshared by other platform users (T0101: Create Localised Content, T0146.006: Open Access Platform, T0151.012: Image Board Platform, T0115: Post Content, T0084.004: Appropriate Content).

When I began looking through /pol/ right after the Poway Synagogue shooting, I came across several claims that the shootings had been a “false flag” aimed at making the message board look bad.

When Bellingcat tweeted out a warning about shitposting and the shooter’s manifesto, in the immediate wake of the attack, probable anons even commented on the Tweet in an attempt to deny that a channer had been behind the attack.

This is a recognizable pattern that occurs in the wake of any crimes committed by members of the board. While the initial response to the Christchurch shooter’s massacre thread was riotous glee, in the days after the shooting many anons began to claim the attack had been a false flag. This actually sparked significant division and debate between the members of /pol/. In the below image, a user mocks other anons for being unable to “believe something in your favor is real.” Another anon responds, “As the evidence comes out, its [sic] quite clear that this was a false flag.”

In his manifesto, the Poway Synagogue shooter even weighed in on this debate, accusing other anons who called the Christchurch and Tree of Life Synagogue shootings “false flags” to merely have been scared: “They can’t fathom that there are brave White men alive who have the willpower and courage it takes to say, ‘Fuck my life—I’m willing to sacrifice everything for the benefit of my race.’”


Platform users deny that their platform has been used by mass shooters to publish their manifestos (T0129.006: Deny Involvement). | -| [T0152.005 Paste Platform](../../generated_pages/techniques/T0152.005.md) |  IT00000380 On April 27, 2019, at around 11:30 a.m. local time, a young man with a semi-automatic rifle walked into the Chabad of Poway Synagogue in Poway, California. He opened fire, killing one worshipper and wounding three others. In the hours since the shooting, a manifesto, believed to be written by the shooter, began circulating online. Evidence has also surfaced that, like the Christchurch Mosque shooter, this killer began his rampage with a post on 8chan’s /pol/ board.

Although both of these attacks may seem different, since they targeted worshippers of different faiths, both shooters were united by the same fascist ideology. They were also both radicalized in the same place: 8chan’s /pol/ board.

This has been corroborated by posts on the board itself, where “anons,” as the posters call themselves, recirculated the shooter’s since-deleted post. In it, the alleged shooter claims to have been “lurking” on the site for a year and a half. He includes a link to a livestream of his rampage — which thankfully does not appear to have worked — and he also includes a pastebin link to his manifesto.

The very first response to his announcement was another anon cheering him on and telling him to “get the high score,” AKA, kill a huge number of people.


Before carrying out a mass shooting, the shooter posted a thread to 8chan’s /pol/ board. The post directed users to a variety of different platforms (T0146.006: Open Access Platform, T0151.012: Image Board Platform, T0115: Post Content, T0122: Direct Users to Alternative Platforms); a Facebook account on which the shooter attempted to livestream the shooting (T0146: Account, T0151.001: Social Media Platform); and a manifesto they had written hosted on pastebin (T0146.006: Open Access Platform, T0152.005: Paste Platform, T0115: Post Content) and uploaded to the file sharing platform Mediafire (T0152.010: File Hosting Platform, T0085.004: Develop Document).

The report looks deeper into 8chan’s /pol/ board:

8chan is a large website, which includes a number of different discussion groups about everything from anime to left-wing politics. /pol/ is one particularly active board on the website, and it is best described as a gathering place for extremely online neo-Nazis.

[...]

I’ve browsed /pol/ on an almost daily basis since the Christchurch shooting. It has not been difficult to find calls for violence. On Monday, March 25 of this year, I ran across evidence of anons translating the Christchurch shooter’s manifesto into other languages in an attempt to inspire more shootings across the globe.

This tactic can work, and today’s shooting is proof. The Poway Synagogue shooter directly cited the Christchurch shooter as his inspiration, saying he decided to carry out his attack roughly two weeks after that shooting. On /pol/, many anons refer to the Christchurch shooter, Brenton Tarrant, as “Saint Tarrant,” complete with medieval-inspired iconography.


Manifestos posted to 8chan are translated and reshared by other platform users (T0101: Create Localised Content, T0146.006: Open Access Platform, T0151.012: Image Board Platform, T0115: Post Content, T0084.004: Appropriate Content).

When I began looking through /pol/ right after the Poway Synagogue shooting, I came across several claims that the shootings had been a “false flag” aimed at making the message board look bad.

When Bellingcat tweeted out a warning about shitposting and the shooter’s manifesto, in the immediate wake of the attack, probable anons even commented on the Tweet in an attempt to deny that a channer had been behind the attack.

This is a recognizable pattern that occurs in the wake of any crimes committed by members of the board. While the initial response to the Christchurch shooter’s massacre thread was riotous glee, in the days after the shooting many anons began to claim the attack had been a false flag. This actually sparked significant division and debate between the members of /pol/. In the below image, a user mocks other anons for being unable to “believe something in your favor is real.” Another anon responds, “As the evidence comes out, its [sic] quite clear that this was a false flag.”

In his manifesto, the Poway Synagogue shooter even weighed in on this debate, accusing other anons who called the Christchurch and Tree of Life Synagogue shootings “false flags” to merely have been scared: “They can’t fathom that there are brave White men alive who have the willpower and courage it takes to say, ‘Fuck my life—I’m willing to sacrifice everything for the benefit of my race.’”


Platform users deny that their platform has been used by mass shooters to publish their manifestos (T0129.006: Deny Involvement). | -| [T0152.010 File Hosting Platform](../../generated_pages/techniques/T0152.010.md) |  IT00000379 On April 27, 2019, at around 11:30 a.m. local time, a young man with a semi-automatic rifle walked into the Chabad of Poway Synagogue in Poway, California. He opened fire, killing one worshipper and wounding three others. In the hours since the shooting, a manifesto, believed to be written by the shooter, began circulating online. Evidence has also surfaced that, like the Christchurch Mosque shooter, this killer began his rampage with a post on 8chan’s /pol/ board.

Although both of these attacks may seem different, since they targeted worshippers of different faiths, both shooters were united by the same fascist ideology. They were also both radicalized in the same place: 8chan’s /pol/ board.

This has been corroborated by posts on the board itself, where “anons,” as the posters call themselves, recirculated the shooter’s since-deleted post. In it, the alleged shooter claims to have been “lurking” on the site for a year and a half. He includes a link to a livestream of his rampage — which thankfully does not appear to have worked — and he also includes a pastebin link to his manifesto.

The very first response to his announcement was another anon cheering him on and telling him to “get the high score,” AKA, kill a huge number of people.


Before carrying out a mass shooting, the shooter posted a thread to 8chan’s /pol/ board. The post directed users to a variety of different platforms (T0146.006: Open Access Platform, T0151.012: Image Board Platform, T0115: Post Content, T0122: Direct Users to Alternative Platforms); a Facebook account on which the shooter attempted to livestream the shooting (T0146: Account, T0151.001: Social Media Platform); and a manifesto they had written hosted on pastebin (T0146.006: Open Access Platform, T0152.005: Paste Platform, T0115: Post Content) and uploaded to the file sharing platform Mediafire (T0152.010: File Hosting Platform, T0085.004: Develop Document).

The report looks deeper into 8chan’s /pol/ board:

8chan is a large website, which includes a number of different discussion groups about everything from anime to left-wing politics. /pol/ is one particularly active board on the website, and it is best described as a gathering place for extremely online neo-Nazis.

[...]

I’ve browsed /pol/ on an almost daily basis since the Christchurch shooting. It has not been difficult to find calls for violence. On Monday, March 25 of this year, I ran across evidence of anons translating the Christchurch shooter’s manifesto into other languages in an attempt to inspire more shootings across the globe.

This tactic can work, and today’s shooting is proof. The Poway Synagogue shooter directly cited the Christchurch shooter as his inspiration, saying he decided to carry out his attack roughly two weeks after that shooting. On /pol/, many anons refer to the Christchurch shooter, Brenton Tarrant, as “Saint Tarrant,” complete with medieval-inspired iconography.


Manifestos posted to 8chan are translated and reshared by other platform users (T0101: Create Localised Content, T0146.006: Open Access Platform, T0151.012: Image Board Platform, T0115: Post Content, T0084.004: Appropriate Content).

When I began looking through /pol/ right after the Poway Synagogue shooting, I came across several claims that the shootings had been a “false flag” aimed at making the message board look bad.

When Bellingcat tweeted out a warning about shitposting and the shooter’s manifesto, in the immediate wake of the attack, probable anons even commented on the Tweet in an attempt to deny that a channer had been behind the attack.

This is a recognizable pattern that occurs in the wake of any crimes committed by members of the board. While the initial response to the Christchurch shooter’s massacre thread was riotous glee, in the days after the shooting many anons began to claim the attack had been a false flag. This actually sparked significant division and debate between the members of /pol/. In the below image, a user mocks other anons for being unable to “believe something in your favor is real.” Another anon responds, “As the evidence comes out, its [sic] quite clear that this was a false flag.”

In his manifesto, the Poway Synagogue shooter even weighed in on this debate, accusing other anons who called the Christchurch and Tree of Life Synagogue shootings “false flags” to merely have been scared: “They can’t fathom that there are brave White men alive who have the willpower and courage it takes to say, ‘Fuck my life—I’m willing to sacrifice everything for the benefit of my race.’”


Platform users deny that their platform has been used by mass shooters to publish their manifestos (T0129.006: Deny Involvement). | +| [T0084.004 Appropriate Content](../../generated_pages/techniques/T0084.004.md) |  IT00000377 On April 27, 2019, at around 11:30 a.m. local time, a young man with a semi-automatic rifle walked into the Chabad of Poway Synagogue in Poway, California. He opened fire, killing one worshipper and wounding three others. In the hours since the shooting, a manifesto, believed to be written by the shooter, began circulating online. Evidence has also surfaced that, like the Christchurch Mosque shooter, this killer began his rampage with a post on 8chan’s /pol/ board.

Although both of these attacks may seem different, since they targeted worshippers of different faiths, both shooters were united by the same fascist ideology. They were also both radicalized in the same place: 8chan’s /pol/ board.

This has been corroborated by posts on the board itself, where “anons,” as the posters call themselves, recirculated the shooter’s since-deleted post. In it, the alleged shooter claims to have been “lurking” on the site for a year and a half. He includes a link to a livestream of his rampage — which thankfully does not appear to have worked — and he also includes a pastebin link to his manifesto.

The very first response to his announcement was another anon cheering him on and telling him to “get the high score,” AKA, kill a huge number of people.


Before carrying out a mass shooting, the shooter posted a thread to 8chan’s /pol/ board. The post directed users to a variety of different platforms (T0146.006: Open Access Platform, T0151.012: Image Board Platform, T0115: Post Content, T0122: Direct Users to Alternative Platforms); a Facebook account on which the shooter attempted to livestream the shooting (T0146: Account Asset, T0151.001: Social Media Platform); and a manifesto they had written hosted on pastebin (T0146.006: Open Access Platform, T0152.005: Paste Platform, T0115: Post Content) and uploaded to the file sharing platform Mediafire (T0152.010: File Hosting Platform, T0085.004: Develop Document).

The report looks deeper into 8chan’s /pol/ board:

8chan is a large website, which includes a number of different discussion groups about everything from anime to left-wing politics. /pol/ is one particularly active board on the website, and it is best described as a gathering place for extremely online neo-Nazis.

[...]

I’ve browsed /pol/ on an almost daily basis since the Christchurch shooting. It has not been difficult to find calls for violence. On Monday, March 25 of this year, I ran across evidence of anons translating the Christchurch shooter’s manifesto into other languages in an attempt to inspire more shootings across the globe.

This tactic can work, and today’s shooting is proof. The Poway Synagogue shooter directly cited the Christchurch shooter as his inspiration, saying he decided to carry out his attack roughly two weeks after that shooting. On /pol/, many anons refer to the Christchurch shooter, Brenton Tarrant, as “Saint Tarrant,” complete with medieval-inspired iconography.


Manifestos posted to 8chan are translated and reshared by other platform users (T0101: Create Localised Content, T0146.006: Open Access Platform, T0151.012: Image Board Platform, T0115: Post Content, T0084.004: Appropriate Content).

When I began looking through /pol/ right after the Poway Synagogue shooting, I came across several claims that the shootings had been a “false flag” aimed at making the message board look bad.

When Bellingcat tweeted out a warning about shitposting and the shooter’s manifesto, in the immediate wake of the attack, probable anons even commented on the Tweet in an attempt to deny that a channer had been behind the attack.

This is a recognizable pattern that occurs in the wake of any crimes committed by members of the board. While the initial response to the Christchurch shooter’s massacre thread was riotous glee, in the days after the shooting many anons began to claim the attack had been a false flag. This actually sparked significant division and debate between the members of /pol/. In the below image, a user mocks other anons for being unable to “believe something in your favor is real.” Another anon responds, “As the evidence comes out, its [sic] quite clear that this was a false flag.”

In his manifesto, the Poway Synagogue shooter even weighed in on this debate, accusing other anons who called the Christchurch and Tree of Life Synagogue shootings “false flags” to merely have been scared: “They can’t fathom that there are brave White men alive who have the willpower and courage it takes to say, ‘Fuck my life—I’m willing to sacrifice everything for the benefit of my race.’”


Platform users deny that their platform has been used by mass shooters to publish their manifestos (T0129.006: Deny Involvement). | +| [T0085.004 Develop Document](../../generated_pages/techniques/T0085.004.md) |  IT00000378 On April 27, 2019, at around 11:30 a.m. local time, a young man with a semi-automatic rifle walked into the Chabad of Poway Synagogue in Poway, California. He opened fire, killing one worshipper and wounding three others. In the hours since the shooting, a manifesto, believed to be written by the shooter, began circulating online. Evidence has also surfaced that, like the Christchurch Mosque shooter, this killer began his rampage with a post on 8chan’s /pol/ board.

Although both of these attacks may seem different, since they targeted worshippers of different faiths, both shooters were united by the same fascist ideology. They were also both radicalized in the same place: 8chan’s /pol/ board.

This has been corroborated by posts on the board itself, where “anons,” as the posters call themselves, recirculated the shooter’s since-deleted post. In it, the alleged shooter claims to have been “lurking” on the site for a year and a half. He includes a link to a livestream of his rampage — which thankfully does not appear to have worked — and he also includes a pastebin link to his manifesto.

The very first response to his announcement was another anon cheering him on and telling him to “get the high score,” AKA, kill a huge number of people.


Before carrying out a mass shooting, the shooter posted a thread to 8chan’s /pol/ board. The post directed users to a variety of different platforms (T0146.006: Open Access Platform, T0151.012: Image Board Platform, T0115: Post Content, T0122: Direct Users to Alternative Platforms); a Facebook account on which the shooter attempted to livestream the shooting (T0146: Account Asset, T0151.001: Social Media Platform); and a manifesto they had written hosted on pastebin (T0146.006: Open Access Platform, T0152.005: Paste Platform, T0115: Post Content) and uploaded to the file sharing platform Mediafire (T0152.010: File Hosting Platform, T0085.004: Develop Document).

The report looks deeper into 8chan’s /pol/ board:

8chan is a large website, which includes a number of different discussion groups about everything from anime to left-wing politics. /pol/ is one particularly active board on the website, and it is best described as a gathering place for extremely online neo-Nazis.

[...]

I’ve browsed /pol/ on an almost daily basis since the Christchurch shooting. It has not been difficult to find calls for violence. On Monday, March 25 of this year, I ran across evidence of anons translating the Christchurch shooter’s manifesto into other languages in an attempt to inspire more shootings across the globe.

This tactic can work, and today’s shooting is proof. The Poway Synagogue shooter directly cited the Christchurch shooter as his inspiration, saying he decided to carry out his attack roughly two weeks after that shooting. On /pol/, many anons refer to the Christchurch shooter, Brenton Tarrant, as “Saint Tarrant,” complete with medieval-inspired iconography.


Manifestos posted to 8chan are translated and reshared by other platform users (T0101: Create Localised Content, T0146.006: Open Access Platform, T0151.012: Image Board Platform, T0115: Post Content, T0084.004: Appropriate Content).

When I began looking through /pol/ right after the Poway Synagogue shooting, I came across several claims that the shootings had been a “false flag” aimed at making the message board look bad.

When Bellingcat tweeted out a warning about shitposting and the shooter’s manifesto, in the immediate wake of the attack, probable anons even commented on the Tweet in an attempt to deny that a channer had been behind the attack.

This is a recognizable pattern that occurs in the wake of any crimes committed by members of the board. While the initial response to the Christchurch shooter’s massacre thread was riotous glee, in the days after the shooting many anons began to claim the attack had been a false flag. This actually sparked significant division and debate between the members of /pol/. In the below image, a user mocks other anons for being unable to “believe something in your favor is real.” Another anon responds, “As the evidence comes out, its [sic] quite clear that this was a false flag.”

In his manifesto, the Poway Synagogue shooter even weighed in on this debate, accusing other anons who called the Christchurch and Tree of Life Synagogue shootings “false flags” to merely have been scared: “They can’t fathom that there are brave White men alive who have the willpower and courage it takes to say, ‘Fuck my life—I’m willing to sacrifice everything for the benefit of my race.’”


Platform users deny that their platform has been used by mass shooters to publish their manifestos (T0129.006: Deny Involvement). | +| [T0101 Create Localised Content](../../generated_pages/techniques/T0101.md) |  IT00000375 On April 27, 2019, at around 11:30 a.m. local time, a young man with a semi-automatic rifle walked into the Chabad of Poway Synagogue in Poway, California. He opened fire, killing one worshipper and wounding three others. In the hours since the shooting, a manifesto, believed to be written by the shooter, began circulating online. Evidence has also surfaced that, like the Christchurch Mosque shooter, this killer began his rampage with a post on 8chan’s /pol/ board.

Although both of these attacks may seem different, since they targeted worshippers of different faiths, both shooters were united by the same fascist ideology. They were also both radicalized in the same place: 8chan’s /pol/ board.

This has been corroborated by posts on the board itself, where “anons,” as the posters call themselves, recirculated the shooter’s since-deleted post. In it, the alleged shooter claims to have been “lurking” on the site for a year and a half. He includes a link to a livestream of his rampage — which thankfully does not appear to have worked — and he also includes a pastebin link to his manifesto.

The very first response to his announcement was another anon cheering him on and telling him to “get the high score,” AKA, kill a huge number of people.


Before carrying out a mass shooting, the shooter posted a thread to 8chan’s /pol/ board. The post directed users to a variety of different platforms (T0146.006: Open Access Platform, T0151.012: Image Board Platform, T0115: Post Content, T0122: Direct Users to Alternative Platforms); a Facebook account on which the shooter attempted to livestream the shooting (T0146: Account Asset, T0151.001: Social Media Platform); and a manifesto they had written hosted on pastebin (T0146.006: Open Access Platform, T0152.005: Paste Platform, T0115: Post Content) and uploaded to the file sharing platform Mediafire (T0152.010: File Hosting Platform, T0085.004: Develop Document).

The report looks deeper into 8chan’s /pol/ board:

8chan is a large website, which includes a number of different discussion groups about everything from anime to left-wing politics. /pol/ is one particularly active board on the website, and it is best described as a gathering place for extremely online neo-Nazis.

[...]

I’ve browsed /pol/ on an almost daily basis since the Christchurch shooting. It has not been difficult to find calls for violence. On Monday, March 25 of this year, I ran across evidence of anons translating the Christchurch shooter’s manifesto into other languages in an attempt to inspire more shootings across the globe.

This tactic can work, and today’s shooting is proof. The Poway Synagogue shooter directly cited the Christchurch shooter as his inspiration, saying he decided to carry out his attack roughly two weeks after that shooting. On /pol/, many anons refer to the Christchurch shooter, Brenton Tarrant, as “Saint Tarrant,” complete with medieval-inspired iconography.


Manifestos posted to 8chan are translated and reshared by other platform users (T0101: Create Localised Content, T0146.006: Open Access Platform, T0151.012: Image Board Platform, T0115: Post Content, T0084.004: Appropriate Content).

When I began looking through /pol/ right after the Poway Synagogue shooting, I came across several claims that the shootings had been a “false flag” aimed at making the message board look bad.

When Bellingcat tweeted out a warning about shitposting and the shooter’s manifesto, in the immediate wake of the attack, probable anons even commented on the Tweet in an attempt to deny that a channer had been behind the attack.

This is a recognizable pattern that occurs in the wake of any crimes committed by members of the board. While the initial response to the Christchurch shooter’s massacre thread was riotous glee, in the days after the shooting many anons began to claim the attack had been a false flag. This actually sparked significant division and debate between the members of /pol/. In the below image, a user mocks other anons for being unable to “believe something in your favor is real.” Another anon responds, “As the evidence comes out, its [sic] quite clear that this was a false flag.”

In his manifesto, the Poway Synagogue shooter even weighed in on this debate, accusing other anons who called the Christchurch and Tree of Life Synagogue shootings “false flags” to merely have been scared: “They can’t fathom that there are brave White men alive who have the willpower and courage it takes to say, ‘Fuck my life—I’m willing to sacrifice everything for the benefit of my race.’”


Platform users deny that their platform has been used by mass shooters to publish their manifestos (T0129.006: Deny Involvement). | +| [T0122 Direct Users to Alternative Platforms](../../generated_pages/techniques/T0122.md) |  IT00000382 On April 27, 2019, at around 11:30 a.m. local time, a young man with a semi-automatic rifle walked into the Chabad of Poway Synagogue in Poway, California. He opened fire, killing one worshipper and wounding three others. In the hours since the shooting, a manifesto, believed to be written by the shooter, began circulating online. Evidence has also surfaced that, like the Christchurch Mosque shooter, this killer began his rampage with a post on 8chan’s /pol/ board.

Although both of these attacks may seem different, since they targeted worshippers of different faiths, both shooters were united by the same fascist ideology. They were also both radicalized in the same place: 8chan’s /pol/ board.

This has been corroborated by posts on the board itself, where “anons,” as the posters call themselves, recirculated the shooter’s since-deleted post. In it, the alleged shooter claims to have been “lurking” on the site for a year and a half. He includes a link to a livestream of his rampage — which thankfully does not appear to have worked — and he also includes a pastebin link to his manifesto.

The very first response to his announcement was another anon cheering him on and telling him to “get the high score,” AKA, kill a huge number of people.


Before carrying out a mass shooting, the shooter posted a thread to 8chan’s /pol/ board. The post directed users to a variety of different platforms (T0146.006: Open Access Platform, T0151.012: Image Board Platform, T0115: Post Content, T0122: Direct Users to Alternative Platforms); a Facebook account on which the shooter attempted to livestream the shooting (T0146: Account Asset, T0151.001: Social Media Platform); and a manifesto they had written hosted on pastebin (T0146.006: Open Access Platform, T0152.005: Paste Platform, T0115: Post Content) and uploaded to the file sharing platform Mediafire (T0152.010: File Hosting Platform, T0085.004: Develop Document).

The report looks deeper into 8chan’s /pol/ board:

8chan is a large website, which includes a number of different discussion groups about everything from anime to left-wing politics. /pol/ is one particularly active board on the website, and it is best described as a gathering place for extremely online neo-Nazis.

[...]

I’ve browsed /pol/ on an almost daily basis since the Christchurch shooting. It has not been difficult to find calls for violence. On Monday, March 25 of this year, I ran across evidence of anons translating the Christchurch shooter’s manifesto into other languages in an attempt to inspire more shootings across the globe.

This tactic can work, and today’s shooting is proof. The Poway Synagogue shooter directly cited the Christchurch shooter as his inspiration, saying he decided to carry out his attack roughly two weeks after that shooting. On /pol/, many anons refer to the Christchurch shooter, Brenton Tarrant, as “Saint Tarrant,” complete with medieval-inspired iconography.


Manifestos posted to 8chan are translated and reshared by other platform users (T0101: Create Localised Content, T0146.006: Open Access Platform, T0151.012: Image Board Platform, T0115: Post Content, T0084.004: Appropriate Content).

When I began looking through /pol/ right after the Poway Synagogue shooting, I came across several claims that the shootings had been a “false flag” aimed at making the message board look bad.

When Bellingcat tweeted out a warning about shitposting and the shooter’s manifesto, in the immediate wake of the attack, probable anons even commented on the Tweet in an attempt to deny that a channer had been behind the attack.

This is a recognizable pattern that occurs in the wake of any crimes committed by members of the board. While the initial response to the Christchurch shooter’s massacre thread was riotous glee, in the days after the shooting many anons began to claim the attack had been a false flag. This actually sparked significant division and debate between the members of /pol/. In the below image, a user mocks other anons for being unable to “believe something in your favor is real.” Another anon responds, “As the evidence comes out, its [sic] quite clear that this was a false flag.”

In his manifesto, the Poway Synagogue shooter even weighed in on this debate, accusing other anons who called the Christchurch and Tree of Life Synagogue shootings “false flags” to merely have been scared: “They can’t fathom that there are brave White men alive who have the willpower and courage it takes to say, ‘Fuck my life—I’m willing to sacrifice everything for the benefit of my race.’”


Platform users deny that their platform has been used by mass shooters to publish their manifestos (T0129.006: Deny Involvement). | +| [T0129.006 Deny Involvement](../../generated_pages/techniques/T0129.006.md) |  IT00000383 On April 27, 2019, at around 11:30 a.m. local time, a young man with a semi-automatic rifle walked into the Chabad of Poway Synagogue in Poway, California. He opened fire, killing one worshipper and wounding three others. In the hours since the shooting, a manifesto, believed to be written by the shooter, began circulating online. Evidence has also surfaced that, like the Christchurch Mosque shooter, this killer began his rampage with a post on 8chan’s /pol/ board.

Although both of these attacks may seem different, since they targeted worshippers of different faiths, both shooters were united by the same fascist ideology. They were also both radicalized in the same place: 8chan’s /pol/ board.

This has been corroborated by posts on the board itself, where “anons,” as the posters call themselves, recirculated the shooter’s since-deleted post. In it, the alleged shooter claims to have been “lurking” on the site for a year and a half. He includes a link to a livestream of his rampage — which thankfully does not appear to have worked — and he also includes a pastebin link to his manifesto.

The very first response to his announcement was another anon cheering him on and telling him to “get the high score,” AKA, kill a huge number of people.


Before carrying out a mass shooting, the shooter posted a thread to 8chan’s /pol/ board. The post directed users to a variety of different platforms (T0146.006: Open Access Platform, T0151.012: Image Board Platform, T0115: Post Content, T0122: Direct Users to Alternative Platforms); a Facebook account on which the shooter attempted to livestream the shooting (T0146: Account Asset, T0151.001: Social Media Platform); and a manifesto they had written hosted on pastebin (T0146.006: Open Access Platform, T0152.005: Paste Platform, T0115: Post Content) and uploaded to the file sharing platform Mediafire (T0152.010: File Hosting Platform, T0085.004: Develop Document).

The report looks deeper into 8chan’s /pol/ board:

8chan is a large website, which includes a number of different discussion groups about everything from anime to left-wing politics. /pol/ is one particularly active board on the website, and it is best described as a gathering place for extremely online neo-Nazis.

[...]

I’ve browsed /pol/ on an almost daily basis since the Christchurch shooting. It has not been difficult to find calls for violence. On Monday, March 25 of this year, I ran across evidence of anons translating the Christchurch shooter’s manifesto into other languages in an attempt to inspire more shootings across the globe.

This tactic can work, and today’s shooting is proof. The Poway Synagogue shooter directly cited the Christchurch shooter as his inspiration, saying he decided to carry out his attack roughly two weeks after that shooting. On /pol/, many anons refer to the Christchurch shooter, Brenton Tarrant, as “Saint Tarrant,” complete with medieval-inspired iconography.


Manifestos posted to 8chan are translated and reshared by other platform users (T0101: Create Localised Content, T0146.006: Open Access Platform, T0151.012: Image Board Platform, T0115: Post Content, T0084.004: Appropriate Content).

When I began looking through /pol/ right after the Poway Synagogue shooting, I came across several claims that the shootings had been a “false flag” aimed at making the message board look bad.

When Bellingcat tweeted out a warning about shitposting and the shooter’s manifesto, in the immediate wake of the attack, probable anons even commented on the Tweet in an attempt to deny that a channer had been behind the attack.

This is a recognizable pattern that occurs in the wake of any crimes committed by members of the board. While the initial response to the Christchurch shooter’s massacre thread was riotous glee, in the days after the shooting many anons began to claim the attack had been a false flag. This actually sparked significant division and debate between the members of /pol/. In the below image, a user mocks other anons for being unable to “believe something in your favor is real.” Another anon responds, “As the evidence comes out, its [sic] quite clear that this was a false flag.”

In his manifesto, the Poway Synagogue shooter even weighed in on this debate, accusing other anons who called the Christchurch and Tree of Life Synagogue shootings “false flags” to merely have been scared: “They can’t fathom that there are brave White men alive who have the willpower and courage it takes to say, ‘Fuck my life—I’m willing to sacrifice everything for the benefit of my race.’”


Platform users deny that their platform has been used by mass shooters to publish their manifestos (T0129.006: Deny Involvement). | +| [T0146.006 Open Access Platform](../../generated_pages/techniques/T0146.006.md) |  IT00000376 On April 27, 2019, at around 11:30 a.m. local time, a young man with a semi-automatic rifle walked into the Chabad of Poway Synagogue in Poway, California. He opened fire, killing one worshipper and wounding three others. In the hours since the shooting, a manifesto, believed to be written by the shooter, began circulating online. Evidence has also surfaced that, like the Christchurch Mosque shooter, this killer began his rampage with a post on 8chan’s /pol/ board.

Although both of these attacks may seem different, since they targeted worshippers of different faiths, both shooters were united by the same fascist ideology. They were also both radicalized in the same place: 8chan’s /pol/ board.

This has been corroborated by posts on the board itself, where “anons,” as the posters call themselves, recirculated the shooter’s since-deleted post. In it, the alleged shooter claims to have been “lurking” on the site for a year and a half. He includes a link to a livestream of his rampage — which thankfully does not appear to have worked — and he also includes a pastebin link to his manifesto.

The very first response to his announcement was another anon cheering him on and telling him to “get the high score,” AKA, kill a huge number of people.


Before carrying out a mass shooting, the shooter posted a thread to 8chan’s /pol/ board. The post directed users to a variety of different platforms (T0146.006: Open Access Platform, T0151.012: Image Board Platform, T0115: Post Content, T0122: Direct Users to Alternative Platforms); a Facebook account on which the shooter attempted to livestream the shooting (T0146: Account Asset, T0151.001: Social Media Platform); and a manifesto they had written hosted on pastebin (T0146.006: Open Access Platform, T0152.005: Paste Platform, T0115: Post Content) and uploaded to the file sharing platform Mediafire (T0152.010: File Hosting Platform, T0085.004: Develop Document).

The report looks deeper into 8chan’s /pol/ board:

8chan is a large website, which includes a number of different discussion groups about everything from anime to left-wing politics. /pol/ is one particularly active board on the website, and it is best described as a gathering place for extremely online neo-Nazis.

[...]

I’ve browsed /pol/ on an almost daily basis since the Christchurch shooting. It has not been difficult to find calls for violence. On Monday, March 25 of this year, I ran across evidence of anons translating the Christchurch shooter’s manifesto into other languages in an attempt to inspire more shootings across the globe.

This tactic can work, and today’s shooting is proof. The Poway Synagogue shooter directly cited the Christchurch shooter as his inspiration, saying he decided to carry out his attack roughly two weeks after that shooting. On /pol/, many anons refer to the Christchurch shooter, Brenton Tarrant, as “Saint Tarrant,” complete with medieval-inspired iconography.


Manifestos posted to 8chan are translated and reshared by other platform users (T0101: Create Localised Content, T0146.006: Open Access Platform, T0151.012: Image Board Platform, T0115: Post Content, T0084.004: Appropriate Content).

When I began looking through /pol/ right after the Poway Synagogue shooting, I came across several claims that the shootings had been a “false flag” aimed at making the message board look bad.

When Bellingcat tweeted out a warning about shitposting and the shooter’s manifesto, in the immediate wake of the attack, probable anons even commented on the Tweet in an attempt to deny that a channer had been behind the attack.

This is a recognizable pattern that occurs in the wake of any crimes committed by members of the board. While the initial response to the Christchurch shooter’s massacre thread was riotous glee, in the days after the shooting many anons began to claim the attack had been a false flag. This actually sparked significant division and debate between the members of /pol/. In the below image, a user mocks other anons for being unable to “believe something in your favor is real.” Another anon responds, “As the evidence comes out, its [sic] quite clear that this was a false flag.”

In his manifesto, the Poway Synagogue shooter even weighed in on this debate, accusing other anons who called the Christchurch and Tree of Life Synagogue shootings “false flags” to merely have been scared: “They can’t fathom that there are brave White men alive who have the willpower and courage it takes to say, ‘Fuck my life—I’m willing to sacrifice everything for the benefit of my race.’”


Platform users deny that their platform has been used by mass shooters to publish their manifestos (T0129.006: Deny Involvement). | +| [T0151.001 Social Media Platform](../../generated_pages/techniques/T0151.001.md) |  IT00000381 On April 27, 2019, at around 11:30 a.m. local time, a young man with a semi-automatic rifle walked into the Chabad of Poway Synagogue in Poway, California. He opened fire, killing one worshipper and wounding three others. In the hours since the shooting, a manifesto, believed to be written by the shooter, began circulating online. Evidence has also surfaced that, like the Christchurch Mosque shooter, this killer began his rampage with a post on 8chan’s /pol/ board.

Although both of these attacks may seem different, since they targeted worshippers of different faiths, both shooters were united by the same fascist ideology. They were also both radicalized in the same place: 8chan’s /pol/ board.

This has been corroborated by posts on the board itself, where “anons,” as the posters call themselves, recirculated the shooter’s since-deleted post. In it, the alleged shooter claims to have been “lurking” on the site for a year and a half. He includes a link to a livestream of his rampage — which thankfully does not appear to have worked — and he also includes a pastebin link to his manifesto.

The very first response to his announcement was another anon cheering him on and telling him to “get the high score,” AKA, kill a huge number of people.


Before carrying out a mass shooting, the shooter posted a thread to 8chan’s /pol/ board. The post directed users to a variety of different platforms (T0146.006: Open Access Platform, T0151.012: Image Board Platform, T0115: Post Content, T0122: Direct Users to Alternative Platforms); a Facebook account on which the shooter attempted to livestream the shooting (T0146: Account Asset, T0151.001: Social Media Platform); and a manifesto they had written hosted on pastebin (T0146.006: Open Access Platform, T0152.005: Paste Platform, T0115: Post Content) and uploaded to the file sharing platform Mediafire (T0152.010: File Hosting Platform, T0085.004: Develop Document).

The report looks deeper into 8chan’s /pol/ board:

8chan is a large website, which includes a number of different discussion groups about everything from anime to left-wing politics. /pol/ is one particularly active board on the website, and it is best described as a gathering place for extremely online neo-Nazis.

[...]

I’ve browsed /pol/ on an almost daily basis since the Christchurch shooting. It has not been difficult to find calls for violence. On Monday, March 25 of this year, I ran across evidence of anons translating the Christchurch shooter’s manifesto into other languages in an attempt to inspire more shootings across the globe.

This tactic can work, and today’s shooting is proof. The Poway Synagogue shooter directly cited the Christchurch shooter as his inspiration, saying he decided to carry out his attack roughly two weeks after that shooting. On /pol/, many anons refer to the Christchurch shooter, Brenton Tarrant, as “Saint Tarrant,” complete with medieval-inspired iconography.


Manifestos posted to 8chan are translated and reshared by other platform users (T0101: Create Localised Content, T0146.006: Open Access Platform, T0151.012: Image Board Platform, T0115: Post Content, T0084.004: Appropriate Content).

When I began looking through /pol/ right after the Poway Synagogue shooting, I came across several claims that the shootings had been a “false flag” aimed at making the message board look bad.

When Bellingcat tweeted out a warning about shitposting and the shooter’s manifesto, in the immediate wake of the attack, probable anons even commented on the Tweet in an attempt to deny that a channer had been behind the attack.

This is a recognizable pattern that occurs in the wake of any crimes committed by members of the board. While the initial response to the Christchurch shooter’s massacre thread was riotous glee, in the days after the shooting many anons began to claim the attack had been a false flag. This actually sparked significant division and debate between the members of /pol/. In the below image, a user mocks other anons for being unable to “believe something in your favor is real.” Another anon responds, “As the evidence comes out, its [sic] quite clear that this was a false flag.”

In his manifesto, the Poway Synagogue shooter even weighed in on this debate, accusing other anons who called the Christchurch and Tree of Life Synagogue shootings “false flags” to merely have been scared: “They can’t fathom that there are brave White men alive who have the willpower and courage it takes to say, ‘Fuck my life—I’m willing to sacrifice everything for the benefit of my race.’”


Platform users deny that their platform has been used by mass shooters to publish their manifestos (T0129.006: Deny Involvement). | +| [T0151.012 Image Board Platform](../../generated_pages/techniques/T0151.012.md) |  IT00000374 On April 27, 2019, at around 11:30 a.m. local time, a young man with a semi-automatic rifle walked into the Chabad of Poway Synagogue in Poway, California. He opened fire, killing one worshipper and wounding three others. In the hours since the shooting, a manifesto, believed to be written by the shooter, began circulating online. Evidence has also surfaced that, like the Christchurch Mosque shooter, this killer began his rampage with a post on 8chan’s /pol/ board.

Although both of these attacks may seem different, since they targeted worshippers of different faiths, both shooters were united by the same fascist ideology. They were also both radicalized in the same place: 8chan’s /pol/ board.

This has been corroborated by posts on the board itself, where “anons,” as the posters call themselves, recirculated the shooter’s since-deleted post. In it, the alleged shooter claims to have been “lurking” on the site for a year and a half. He includes a link to a livestream of his rampage — which thankfully does not appear to have worked — and he also includes a pastebin link to his manifesto.

The very first response to his announcement was another anon cheering him on and telling him to “get the high score,” AKA, kill a huge number of people.


Before carrying out a mass shooting, the shooter posted a thread to 8chan’s /pol/ board. The post directed users to a variety of different platforms (T0146.006: Open Access Platform, T0151.012: Image Board Platform, T0115: Post Content, T0122: Direct Users to Alternative Platforms); a Facebook account on which the shooter attempted to livestream the shooting (T0146: Account Asset, T0151.001: Social Media Platform); and a manifesto they had written hosted on pastebin (T0146.006: Open Access Platform, T0152.005: Paste Platform, T0115: Post Content) and uploaded to the file sharing platform Mediafire (T0152.010: File Hosting Platform, T0085.004: Develop Document).

The report looks deeper into 8chan’s /pol/ board:

8chan is a large website, which includes a number of different discussion groups about everything from anime to left-wing politics. /pol/ is one particularly active board on the website, and it is best described as a gathering place for extremely online neo-Nazis.

[...]

I’ve browsed /pol/ on an almost daily basis since the Christchurch shooting. It has not been difficult to find calls for violence. On Monday, March 25 of this year, I ran across evidence of anons translating the Christchurch shooter’s manifesto into other languages in an attempt to inspire more shootings across the globe.

This tactic can work, and today’s shooting is proof. The Poway Synagogue shooter directly cited the Christchurch shooter as his inspiration, saying he decided to carry out his attack roughly two weeks after that shooting. On /pol/, many anons refer to the Christchurch shooter, Brenton Tarrant, as “Saint Tarrant,” complete with medieval-inspired iconography.


Manifestos posted to 8chan are translated and reshared by other platform users (T0101: Create Localised Content, T0146.006: Open Access Platform, T0151.012: Image Board Platform, T0115: Post Content, T0084.004: Appropriate Content).

When I began looking through /pol/ right after the Poway Synagogue shooting, I came across several claims that the shootings had been a “false flag” aimed at making the message board look bad.

When Bellingcat tweeted out a warning about shitposting and the shooter’s manifesto, in the immediate wake of the attack, probable anons even commented on the Tweet in an attempt to deny that a channer had been behind the attack.

This is a recognizable pattern that occurs in the wake of any crimes committed by members of the board. While the initial response to the Christchurch shooter’s massacre thread was riotous glee, in the days after the shooting many anons began to claim the attack had been a false flag. This actually sparked significant division and debate between the members of /pol/. In the below image, a user mocks other anons for being unable to “believe something in your favor is real.” Another anon responds, “As the evidence comes out, its [sic] quite clear that this was a false flag.”

In his manifesto, the Poway Synagogue shooter even weighed in on this debate, accusing other anons who called the Christchurch and Tree of Life Synagogue shootings “false flags” to merely have been scared: “They can’t fathom that there are brave White men alive who have the willpower and courage it takes to say, ‘Fuck my life—I’m willing to sacrifice everything for the benefit of my race.’”


Platform users deny that their platform has been used by mass shooters to publish their manifestos (T0129.006: Deny Involvement). | +| [T0152.005 Paste Platform](../../generated_pages/techniques/T0152.005.md) |  IT00000380 On April 27, 2019, at around 11:30 a.m. local time, a young man with a semi-automatic rifle walked into the Chabad of Poway Synagogue in Poway, California. He opened fire, killing one worshipper and wounding three others. In the hours since the shooting, a manifesto, believed to be written by the shooter, began circulating online. Evidence has also surfaced that, like the Christchurch Mosque shooter, this killer began his rampage with a post on 8chan’s /pol/ board.

Although both of these attacks may seem different, since they targeted worshippers of different faiths, both shooters were united by the same fascist ideology. They were also both radicalized in the same place: 8chan’s /pol/ board.

This has been corroborated by posts on the board itself, where “anons,” as the posters call themselves, recirculated the shooter’s since-deleted post. In it, the alleged shooter claims to have been “lurking” on the site for a year and a half. He includes a link to a livestream of his rampage — which thankfully does not appear to have worked — and he also includes a pastebin link to his manifesto.

The very first response to his announcement was another anon cheering him on and telling him to “get the high score,” AKA, kill a huge number of people.


Before carrying out a mass shooting, the shooter posted a thread to 8chan’s /pol/ board. The post directed users to a variety of different platforms (T0146.006: Open Access Platform, T0151.012: Image Board Platform, T0115: Post Content, T0122: Direct Users to Alternative Platforms); a Facebook account on which the shooter attempted to livestream the shooting (T0146: Account Asset, T0151.001: Social Media Platform); and a manifesto they had written hosted on pastebin (T0146.006: Open Access Platform, T0152.005: Paste Platform, T0115: Post Content) and uploaded to the file sharing platform Mediafire (T0152.010: File Hosting Platform, T0085.004: Develop Document).

The report looks deeper into 8chan’s /pol/ board:

8chan is a large website, which includes a number of different discussion groups about everything from anime to left-wing politics. /pol/ is one particularly active board on the website, and it is best described as a gathering place for extremely online neo-Nazis.

[...]

I’ve browsed /pol/ on an almost daily basis since the Christchurch shooting. It has not been difficult to find calls for violence. On Monday, March 25 of this year, I ran across evidence of anons translating the Christchurch shooter’s manifesto into other languages in an attempt to inspire more shootings across the globe.

This tactic can work, and today’s shooting is proof. The Poway Synagogue shooter directly cited the Christchurch shooter as his inspiration, saying he decided to carry out his attack roughly two weeks after that shooting. On /pol/, many anons refer to the Christchurch shooter, Brenton Tarrant, as “Saint Tarrant,” complete with medieval-inspired iconography.


Manifestos posted to 8chan are translated and reshared by other platform users (T0101: Create Localised Content, T0146.006: Open Access Platform, T0151.012: Image Board Platform, T0115: Post Content, T0084.004: Appropriate Content).

When I began looking through /pol/ right after the Poway Synagogue shooting, I came across several claims that the shootings had been a “false flag” aimed at making the message board look bad.

When Bellingcat tweeted out a warning about shitposting and the shooter’s manifesto, in the immediate wake of the attack, probable anons even commented on the Tweet in an attempt to deny that a channer had been behind the attack.

This is a recognizable pattern that occurs in the wake of any crimes committed by members of the board. While the initial response to the Christchurch shooter’s massacre thread was riotous glee, in the days after the shooting many anons began to claim the attack had been a false flag. This actually sparked significant division and debate between the members of /pol/. In the below image, a user mocks other anons for being unable to “believe something in your favor is real.” Another anon responds, “As the evidence comes out, its [sic] quite clear that this was a false flag.”

In his manifesto, the Poway Synagogue shooter even weighed in on this debate, accusing other anons who called the Christchurch and Tree of Life Synagogue shootings “false flags” to merely have been scared: “They can’t fathom that there are brave White men alive who have the willpower and courage it takes to say, ‘Fuck my life—I’m willing to sacrifice everything for the benefit of my race.’”


Platform users deny that their platform has been used by mass shooters to publish their manifestos (T0129.006: Deny Involvement). | +| [T0152.010 File Hosting Platform](../../generated_pages/techniques/T0152.010.md) |  IT00000379 On April 27, 2019, at around 11:30 a.m. local time, a young man with a semi-automatic rifle walked into the Chabad of Poway Synagogue in Poway, California. He opened fire, killing one worshipper and wounding three others. In the hours since the shooting, a manifesto, believed to be written by the shooter, began circulating online. Evidence has also surfaced that, like the Christchurch Mosque shooter, this killer began his rampage with a post on 8chan’s /pol/ board.

Although both of these attacks may seem different, since they targeted worshippers of different faiths, both shooters were united by the same fascist ideology. They were also both radicalized in the same place: 8chan’s /pol/ board.

This has been corroborated by posts on the board itself, where “anons,” as the posters call themselves, recirculated the shooter’s since-deleted post. In it, the alleged shooter claims to have been “lurking” on the site for a year and a half. He includes a link to a livestream of his rampage — which thankfully does not appear to have worked — and he also includes a pastebin link to his manifesto.

The very first response to his announcement was another anon cheering him on and telling him to “get the high score,” AKA, kill a huge number of people.


Before carrying out a mass shooting, the shooter posted a thread to 8chan’s /pol/ board. The post directed users to a variety of different platforms (T0146.006: Open Access Platform, T0151.012: Image Board Platform, T0115: Post Content, T0122: Direct Users to Alternative Platforms); a Facebook account on which the shooter attempted to livestream the shooting (T0146: Account Asset, T0151.001: Social Media Platform); and a manifesto they had written hosted on pastebin (T0146.006: Open Access Platform, T0152.005: Paste Platform, T0115: Post Content) and uploaded to the file sharing platform Mediafire (T0152.010: File Hosting Platform, T0085.004: Develop Document).

The report looks deeper into 8chan’s /pol/ board:

8chan is a large website, which includes a number of different discussion groups about everything from anime to left-wing politics. /pol/ is one particularly active board on the website, and it is best described as a gathering place for extremely online neo-Nazis.

[...]

I’ve browsed /pol/ on an almost daily basis since the Christchurch shooting. It has not been difficult to find calls for violence. On Monday, March 25 of this year, I ran across evidence of anons translating the Christchurch shooter’s manifesto into other languages in an attempt to inspire more shootings across the globe.

This tactic can work, and today’s shooting is proof. The Poway Synagogue shooter directly cited the Christchurch shooter as his inspiration, saying he decided to carry out his attack roughly two weeks after that shooting. On /pol/, many anons refer to the Christchurch shooter, Brenton Tarrant, as “Saint Tarrant,” complete with medieval-inspired iconography.


Manifestos posted to 8chan are translated and reshared by other platform users (T0101: Create Localised Content, T0146.006: Open Access Platform, T0151.012: Image Board Platform, T0115: Post Content, T0084.004: Appropriate Content).

When I began looking through /pol/ right after the Poway Synagogue shooting, I came across several claims that the shootings had been a “false flag” aimed at making the message board look bad.

When Bellingcat tweeted out a warning about shitposting and the shooter’s manifesto, in the immediate wake of the attack, probable anons even commented on the Tweet in an attempt to deny that a channer had been behind the attack.

This is a recognizable pattern that occurs in the wake of any crimes committed by members of the board. While the initial response to the Christchurch shooter’s massacre thread was riotous glee, in the days after the shooting many anons began to claim the attack had been a false flag. This actually sparked significant division and debate between the members of /pol/. In the below image, a user mocks other anons for being unable to “believe something in your favor is real.” Another anon responds, “As the evidence comes out, its [sic] quite clear that this was a false flag.”

In his manifesto, the Poway Synagogue shooter even weighed in on this debate, accusing other anons who called the Christchurch and Tree of Life Synagogue shootings “false flags” to merely have been scared: “They can’t fathom that there are brave White men alive who have the willpower and courage it takes to say, ‘Fuck my life—I’m willing to sacrifice everything for the benefit of my race.’”


Platform users deny that their platform has been used by mass shooters to publish their manifestos (T0129.006: Deny Involvement). | DO NOT EDIT ABOVE THIS LINE - PLEASE ADD NOTES BELOW \ No newline at end of file diff --git a/generated_pages/incidents/I00103.md b/generated_pages/incidents/I00103.md index efeeaa6..15bca28 100644 --- a/generated_pages/incidents/I00103.md +++ b/generated_pages/incidents/I00103.md @@ -15,15 +15,16 @@ | Reference | Pub Date | Authors | Org | Archive | | --------- | -------- | ------- | --- | ------- | +| [https://www.bbc.co.uk/news/articles/ckg9k5dv1zdo](https://www.bbc.co.uk/news/articles/ckg9k5dv1zdo) | 2024/10/05 | Marianna Spring | BBC News | [https://web.archive.org/web/20241009114904/https://www.bbc.com/news/articles/ckg9k5dv1zdo](https://web.archive.org/web/20241009114904/https://www.bbc.com/news/articles/ckg9k5dv1zdo) | | Technique | Description given for this incident | | --------- | ------------------------- | -| [T0088.001 Develop AI-Generated Audio (Deepfakes)](../../generated_pages/techniques/T0088.001.md) |  IT00000385 “I seriously don't understand why I have to constantly put up with these dumbasses here every day.”

So began what appeared to be a long tirade from the principal of Pikesville High School, punctuated with racist, antisemitic and offensive tropes. It sounded like it had been secretly recorded.

The speaker went on to bemoan “ungrateful black kids” and Jewish people in the community.

The clip, first posted in [January 2024], went viral nationally. But it really struck a nerve in the peaceful, leafy suburb of Pikesville, which has large black and Jewish populations, and in the nearby city of Baltimore, Maryland. Principal Eric Eiswert was put on paid administrative leave pending an investigation.

[...]

But what those sharing the clip didn’t realise at the time was that another bombshell was about to drop: the clip was an AI-generated fake.

[...]

[In April 2024], Baltimore Police Chief Robert McCullough confirmed they now had “conclusive evidence that the recording was not authentic”.

And they believed they knew who made the fake.

Police charged 31-year-old Dazhon Darien, the school’s athletics director, with several counts related to the fake video. Charges included theft, retaliating against a witness and stalking.

He was arrested at the airport, where police say he was planning to fly to Houston, Texas.

Police say that Mr Darien had been under investigation by Principal Eiswert over an alleged theft of $1,916 (£1,460) from the school. They also allege there had been “work performance challenges” and his contract was likely not to be renewed.

Their theory was that by creating the deepfake recording, he hoped to discredit the principal before he could be fired.

Investigators say they traced an email used to send the original video to a server connected to Mr Darien, and allege that he used Baltimore County Public Schools' computer network to access AI tools. He is due to stand trial in December 2024.


By associating Mr Darien to the server used to email the original AI generated audio, investigators link Darien to the fabricated content (T0149.005: Server, T0088.001: AI Generated Audio (Deepfakes)). They also assert that Darien used computers owned by the school to access platforms used to generate the audio (T0146: Account, T0154.002: AI Media Platform). | -| [T0146 Account](../../generated_pages/techniques/T0146.md) |  IT00000387 “I seriously don't understand why I have to constantly put up with these dumbasses here every day.”

So began what appeared to be a long tirade from the principal of Pikesville High School, punctuated with racist, antisemitic and offensive tropes. It sounded like it had been secretly recorded.

The speaker went on to bemoan “ungrateful black kids” and Jewish people in the community.

The clip, first posted in [January 2024], went viral nationally. But it really struck a nerve in the peaceful, leafy suburb of Pikesville, which has large black and Jewish populations, and in the nearby city of Baltimore, Maryland. Principal Eric Eiswert was put on paid administrative leave pending an investigation.

[...]

But what those sharing the clip didn’t realise at the time was that another bombshell was about to drop: the clip was an AI-generated fake.

[...]

[In April 2024], Baltimore Police Chief Robert McCullough confirmed they now had “conclusive evidence that the recording was not authentic”.

And they believed they knew who made the fake.

Police charged 31-year-old Dazhon Darien, the school’s athletics director, with several counts related to the fake video. Charges included theft, retaliating against a witness and stalking.

He was arrested at the airport, where police say he was planning to fly to Houston, Texas.

Police say that Mr Darien had been under investigation by Principal Eiswert over an alleged theft of $1,916 (£1,460) from the school. They also allege there had been “work performance challenges” and his contract was likely not to be renewed.

Their theory was that by creating the deepfake recording, he hoped to discredit the principal before he could be fired.

Investigators say they traced an email used to send the original video to a server connected to Mr Darien, and allege that he used Baltimore County Public Schools' computer network to access AI tools. He is due to stand trial in December 2024.


By associating Mr Darien to the server used to email the original AI generated audio, investigators link Darien to the fabricated content (T0149.005: Server, T0088.001: AI Generated Audio (Deepfakes)). They also assert that Darien used computers owned by the school to access platforms used to generate the audio (T0146: Account, T0154.002: AI Media Platform). | -| [T0149.005 Server](../../generated_pages/techniques/T0149.005.md) |  IT00000384 “I seriously don't understand why I have to constantly put up with these dumbasses here every day.”

So began what appeared to be a long tirade from the principal of Pikesville High School, punctuated with racist, antisemitic and offensive tropes. It sounded like it had been secretly recorded.

The speaker went on to bemoan “ungrateful black kids” and Jewish people in the community.

The clip, first posted in [January 2024], went viral nationally. But it really struck a nerve in the peaceful, leafy suburb of Pikesville, which has large black and Jewish populations, and in the nearby city of Baltimore, Maryland. Principal Eric Eiswert was put on paid administrative leave pending an investigation.

[...]

But what those sharing the clip didn’t realise at the time was that another bombshell was about to drop: the clip was an AI-generated fake.

[...]

[In April 2024], Baltimore Police Chief Robert McCullough confirmed they now had “conclusive evidence that the recording was not authentic”.

And they believed they knew who made the fake.

Police charged 31-year-old Dazhon Darien, the school’s athletics director, with several counts related to the fake video. Charges included theft, retaliating against a witness and stalking.

He was arrested at the airport, where police say he was planning to fly to Houston, Texas.

Police say that Mr Darien had been under investigation by Principal Eiswert over an alleged theft of $1,916 (£1,460) from the school. They also allege there had been “work performance challenges” and his contract was likely not to be renewed.

Their theory was that by creating the deepfake recording, he hoped to discredit the principal before he could be fired.

Investigators say they traced an email used to send the original video to a server connected to Mr Darien, and allege that he used Baltimore County Public Schools' computer network to access AI tools. He is due to stand trial in December 2024.


By associating Mr Darien to the server used to email the original AI generated audio, investigators link Darien to the fabricated content (T0149.005: Server, T0088.001: AI Generated Audio (Deepfakes)). They also assert that Darien used computers owned by the school to access platforms used to generate the audio (T0146: Account, T0154.002: AI Media Platform). | -| [T0154.002 AI Media Platform](../../generated_pages/techniques/T0154.002.md) |  IT00000386 “I seriously don't understand why I have to constantly put up with these dumbasses here every day.”

So began what appeared to be a long tirade from the principal of Pikesville High School, punctuated with racist, antisemitic and offensive tropes. It sounded like it had been secretly recorded.

The speaker went on to bemoan “ungrateful black kids” and Jewish people in the community.

The clip, first posted in [January 2024], went viral nationally. But it really struck a nerve in the peaceful, leafy suburb of Pikesville, which has large black and Jewish populations, and in the nearby city of Baltimore, Maryland. Principal Eric Eiswert was put on paid administrative leave pending an investigation.

[...]

But what those sharing the clip didn’t realise at the time was that another bombshell was about to drop: the clip was an AI-generated fake.

[...]

[In April 2024], Baltimore Police Chief Robert McCullough confirmed they now had “conclusive evidence that the recording was not authentic”.

And they believed they knew who made the fake.

Police charged 31-year-old Dazhon Darien, the school’s athletics director, with several counts related to the fake video. Charges included theft, retaliating against a witness and stalking.

He was arrested at the airport, where police say he was planning to fly to Houston, Texas.

Police say that Mr Darien had been under investigation by Principal Eiswert over an alleged theft of $1,916 (£1,460) from the school. They also allege there had been “work performance challenges” and his contract was likely not to be renewed.

Their theory was that by creating the deepfake recording, he hoped to discredit the principal before he could be fired.

Investigators say they traced an email used to send the original video to a server connected to Mr Darien, and allege that he used Baltimore County Public Schools' computer network to access AI tools. He is due to stand trial in December 2024.


By associating Mr Darien to the server used to email the original AI generated audio, investigators link Darien to the fabricated content (T0149.005: Server, T0088.001: AI Generated Audio (Deepfakes)). They also assert that Darien used computers owned by the school to access platforms used to generate the audio (T0146: Account, T0154.002: AI Media Platform). | +| [T0088.001 Develop AI-Generated Audio (Deepfakes)](../../generated_pages/techniques/T0088.001.md) |  IT00000385 “I seriously don't understand why I have to constantly put up with these dumbasses here every day.”

So began what appeared to be a long tirade from the principal of Pikesville High School, punctuated with racist, antisemitic and offensive tropes. It sounded like it had been secretly recorded.

The speaker went on to bemoan “ungrateful black kids” and Jewish people in the community.

The clip, first posted in [January 2024], went viral nationally. But it really struck a nerve in the peaceful, leafy suburb of Pikesville, which has large black and Jewish populations, and in the nearby city of Baltimore, Maryland. Principal Eric Eiswert was put on paid administrative leave pending an investigation.

[...]

But what those sharing the clip didn’t realise at the time was that another bombshell was about to drop: the clip was an AI-generated fake.

[...]

[In April 2024], Baltimore Police Chief Robert McCullough confirmed they now had “conclusive evidence that the recording was not authentic”.

And they believed they knew who made the fake.

Police charged 31-year-old Dazhon Darien, the school’s athletics director, with several counts related to the fake video. Charges included theft, retaliating against a witness and stalking.

He was arrested at the airport, where police say he was planning to fly to Houston, Texas.

Police say that Mr Darien had been under investigation by Principal Eiswert over an alleged theft of $1,916 (£1,460) from the school. They also allege there had been “work performance challenges” and his contract was likely not to be renewed.

Their theory was that by creating the deepfake recording, he hoped to discredit the principal before he could be fired.

Investigators say they traced an email used to send the original video to a server connected to Mr Darien, and allege that he used Baltimore County Public Schools' computer network to access AI tools. He is due to stand trial in December 2024.


By associating Mr Darien to the server used to email the original AI generated audio, investigators link Darien to the fabricated content (T0149.005: Server Asset, T0088.001: AI Generated Audio (Deepfakes)). They also assert that Darien used computers owned by the school to access platforms used to generate the audio (T0146: Account Asset, T0154.002: AI Media Platform). | +| [T0146 Account Asset](../../generated_pages/techniques/T0146.md) |  IT00000387 “I seriously don't understand why I have to constantly put up with these dumbasses here every day.”

So began what appeared to be a long tirade from the principal of Pikesville High School, punctuated with racist, antisemitic and offensive tropes. It sounded like it had been secretly recorded.

The speaker went on to bemoan “ungrateful black kids” and Jewish people in the community.

The clip, first posted in [January 2024], went viral nationally. But it really struck a nerve in the peaceful, leafy suburb of Pikesville, which has large black and Jewish populations, and in the nearby city of Baltimore, Maryland. Principal Eric Eiswert was put on paid administrative leave pending an investigation.

[...]

But what those sharing the clip didn’t realise at the time was that another bombshell was about to drop: the clip was an AI-generated fake.

[...]

[In April 2024], Baltimore Police Chief Robert McCullough confirmed they now had “conclusive evidence that the recording was not authentic”.

And they believed they knew who made the fake.

Police charged 31-year-old Dazhon Darien, the school’s athletics director, with several counts related to the fake video. Charges included theft, retaliating against a witness and stalking.

He was arrested at the airport, where police say he was planning to fly to Houston, Texas.

Police say that Mr Darien had been under investigation by Principal Eiswert over an alleged theft of $1,916 (£1,460) from the school. They also allege there had been “work performance challenges” and his contract was likely not to be renewed.

Their theory was that by creating the deepfake recording, he hoped to discredit the principal before he could be fired.

Investigators say they traced an email used to send the original video to a server connected to Mr Darien, and allege that he used Baltimore County Public Schools' computer network to access AI tools. He is due to stand trial in December 2024.


By associating Mr Darien to the server used to email the original AI generated audio, investigators link Darien to the fabricated content (T0149.005: Server Asset, T0088.001: AI Generated Audio (Deepfakes)). They also assert that Darien used computers owned by the school to access platforms used to generate the audio (T0146: Account Asset, T0154.002: AI Media Platform). | +| [T0149.005 Server Asset](../../generated_pages/techniques/T0149.005.md) |  IT00000384 “I seriously don't understand why I have to constantly put up with these dumbasses here every day.”

So began what appeared to be a long tirade from the principal of Pikesville High School, punctuated with racist, antisemitic and offensive tropes. It sounded like it had been secretly recorded.

The speaker went on to bemoan “ungrateful black kids” and Jewish people in the community.

The clip, first posted in [January 2024], went viral nationally. But it really struck a nerve in the peaceful, leafy suburb of Pikesville, which has large black and Jewish populations, and in the nearby city of Baltimore, Maryland. Principal Eric Eiswert was put on paid administrative leave pending an investigation.

[...]

But what those sharing the clip didn’t realise at the time was that another bombshell was about to drop: the clip was an AI-generated fake.

[...]

[In April 2024], Baltimore Police Chief Robert McCullough confirmed they now had “conclusive evidence that the recording was not authentic”.

And they believed they knew who made the fake.

Police charged 31-year-old Dazhon Darien, the school’s athletics director, with several counts related to the fake video. Charges included theft, retaliating against a witness and stalking.

He was arrested at the airport, where police say he was planning to fly to Houston, Texas.

Police say that Mr Darien had been under investigation by Principal Eiswert over an alleged theft of $1,916 (£1,460) from the school. They also allege there had been “work performance challenges” and his contract was likely not to be renewed.

Their theory was that by creating the deepfake recording, he hoped to discredit the principal before he could be fired.

Investigators say they traced an email used to send the original video to a server connected to Mr Darien, and allege that he used Baltimore County Public Schools' computer network to access AI tools. He is due to stand trial in December 2024.


By associating Mr Darien to the server used to email the original AI generated audio, investigators link Darien to the fabricated content (T0149.005: Server Asset, T0088.001: AI Generated Audio (Deepfakes)). They also assert that Darien used computers owned by the school to access platforms used to generate the audio (T0146: Account Asset, T0154.002: AI Media Platform). | +| [T0154.002 AI Media Platform](../../generated_pages/techniques/T0154.002.md) |  IT00000386 “I seriously don't understand why I have to constantly put up with these dumbasses here every day.”

So began what appeared to be a long tirade from the principal of Pikesville High School, punctuated with racist, antisemitic and offensive tropes. It sounded like it had been secretly recorded.

The speaker went on to bemoan “ungrateful black kids” and Jewish people in the community.

The clip, first posted in [January 2024], went viral nationally. But it really struck a nerve in the peaceful, leafy suburb of Pikesville, which has large black and Jewish populations, and in the nearby city of Baltimore, Maryland. Principal Eric Eiswert was put on paid administrative leave pending an investigation.

[...]

But what those sharing the clip didn’t realise at the time was that another bombshell was about to drop: the clip was an AI-generated fake.

[...]

[In April 2024], Baltimore Police Chief Robert McCullough confirmed they now had “conclusive evidence that the recording was not authentic”.

And they believed they knew who made the fake.

Police charged 31-year-old Dazhon Darien, the school’s athletics director, with several counts related to the fake video. Charges included theft, retaliating against a witness and stalking.

He was arrested at the airport, where police say he was planning to fly to Houston, Texas.

Police say that Mr Darien had been under investigation by Principal Eiswert over an alleged theft of $1,916 (£1,460) from the school. They also allege there had been “work performance challenges” and his contract was likely not to be renewed.

Their theory was that by creating the deepfake recording, he hoped to discredit the principal before he could be fired.

Investigators say they traced an email used to send the original video to a server connected to Mr Darien, and allege that he used Baltimore County Public Schools' computer network to access AI tools. He is due to stand trial in December 2024.


By associating Mr Darien to the server used to email the original AI generated audio, investigators link Darien to the fabricated content (T0149.005: Server Asset, T0088.001: AI Generated Audio (Deepfakes)). They also assert that Darien used computers owned by the school to access platforms used to generate the audio (T0146: Account Asset, T0154.002: AI Media Platform). | DO NOT EDIT ABOVE THIS LINE - PLEASE ADD NOTES BELOW \ No newline at end of file diff --git a/generated_pages/incidents/I00104.md b/generated_pages/incidents/I00104.md index 6a6ee82..e35c139 100644 --- a/generated_pages/incidents/I00104.md +++ b/generated_pages/incidents/I00104.md @@ -15,6 +15,7 @@ | Reference | Pub Date | Authors | Org | Archive | | --------- | -------- | ------- | --- | ------- | +| [https://www.motherjones.com/politics/2017/05/emmanuel-macron-hacking-email-leak-france/](https://www.motherjones.com/politics/2017/05/emmanuel-macron-hacking-email-leak-france/) | 2017/05/05 | AJ Vicens, Pema Levy, Laura Smith | Mother Jones | [https://web.archive.org/web/20240628030952/https://www.motherjones.com/politics/2017/05/emmanuel-macron-hacking-email-leak-france/](https://web.archive.org/web/20240628030952/https://www.motherjones.com/politics/2017/05/emmanuel-macron-hacking-email-leak-france/) | @@ -22,7 +23,7 @@ | --------- | ------------------------- | | [T0115 Post Content](../../generated_pages/techniques/T0115.md) |  IT00000391 A massive trove of documents purporting to contain thousands of emails and other files from the [2017 presidential] campaign of Emmanuel Macron—the French centrist candidate squaring off against right-wing nationalist Marine Le Pen—was posted on the internet Friday afternoon. The Macron campaign says that at least some of the documents are fake. The document dump came just over a day before voting is set to begin in the final round of the election and mere hours before candidates are legally required to stop campaigning.

At about 2:35 p.m. ET, a post appeared on the 4chan online message board announcing the leak. The documents appear to include emails, internal memos, and screenshots of purported banking records.

“In this pastebin are links to torrents of emails between Macron, his team and other officials, politicians as well as original documents and photos,” the anonymous 4chan poster wrote. “This was passed on to me today so now I am giving it to you, the people. The leak is massvie and released in the hopes that the human search engine here will be able to start sifting through the contents and figure out exactly what we have here.”

The Macron campaign issued a statement Friday night saying it was the victim of a “massive and coordinated” hacking attack. That campaign said the leak included some fake documents that were intended “to sow doubt and misinformation.”


Actors posted a to 4chan a link (T0151.012: Image Board Platform, T0146.006: Open Access Platform, T0115: Post Content, T0122: Direct Users to Alternative Platforms) to text content hosted on pastebin (T0152.005: Paste Platform, T0146.006: Open Access Platform, T0115: Post Content), which contained links to download stolen and fabricated documents. | | [T0122 Direct Users to Alternative Platforms](../../generated_pages/techniques/T0122.md) |  IT00000392 A massive trove of documents purporting to contain thousands of emails and other files from the [2017 presidential] campaign of Emmanuel Macron—the French centrist candidate squaring off against right-wing nationalist Marine Le Pen—was posted on the internet Friday afternoon. The Macron campaign says that at least some of the documents are fake. The document dump came just over a day before voting is set to begin in the final round of the election and mere hours before candidates are legally required to stop campaigning.

At about 2:35 p.m. ET, a post appeared on the 4chan online message board announcing the leak. The documents appear to include emails, internal memos, and screenshots of purported banking records.

“In this pastebin are links to torrents of emails between Macron, his team and other officials, politicians as well as original documents and photos,” the anonymous 4chan poster wrote. “This was passed on to me today so now I am giving it to you, the people. The leak is massvie and released in the hopes that the human search engine here will be able to start sifting through the contents and figure out exactly what we have here.”

The Macron campaign issued a statement Friday night saying it was the victim of a “massive and coordinated” hacking attack. That campaign said the leak included some fake documents that were intended “to sow doubt and misinformation.”


Actors posted a to 4chan a link (T0151.012: Image Board Platform, T0146.006: Open Access Platform, T0115: Post Content, T0122: Direct Users to Alternative Platforms) to text content hosted on pastebin (T0152.005: Paste Platform, T0146.006: Open Access Platform, T0115: Post Content), which contained links to download stolen and fabricated documents. | -| [T0146.007 Automated Account](../../generated_pages/techniques/T0146.007.md) |  IT00000389 A massive trove of documents purporting to contain thousands of emails and other files from the [2017 presidential] campaign of Emmanuel Macron—the French centrist candidate squaring off against right-wing nationalist Marine Le Pen—was posted on the internet Friday afternoon. The Macron campaign says that at least some of the documents are fake. The document dump came just over a day before voting is set to begin in the final round of the election and mere hours before candidates are legally required to stop campaigning.

At about 2:35 p.m. ET, a post appeared on the 4chan online message board announcing the leak. The documents appear to include emails, internal memos, and screenshots of purported banking records.

“In this pastebin are links to torrents of emails between Macron, his team and other officials, politicians as well as original documents and photos,” the anonymous 4chan poster wrote. “This was passed on to me today so now I am giving it to you, the people. The leak is massvie and released in the hopes that the human search engine here will be able to start sifting through the contents and figure out exactly what we have here.”

The Macron campaign issued a statement Friday night saying it was the victim of a “massive and coordinated” hacking attack. That campaign said the leak included some fake documents that were intended “to sow doubt and misinformation.”


Actors posted a to 4chan a link (T0151.012: Image Board Platform, T0146.006: Open Access Platform, T0115: Post Content, T0122: Direct Users to Alternative Platforms) to text content hosted on pastebin (T0152.005: Paste Platform, T0146.006: Open Access Platform, T0115: Post Content), which contained links to download stolen and fabricated documents. | +| [T0146.007 Automated Account Asset](../../generated_pages/techniques/T0146.007.md) |  IT00000389 A massive trove of documents purporting to contain thousands of emails and other files from the [2017 presidential] campaign of Emmanuel Macron—the French centrist candidate squaring off against right-wing nationalist Marine Le Pen—was posted on the internet Friday afternoon. The Macron campaign says that at least some of the documents are fake. The document dump came just over a day before voting is set to begin in the final round of the election and mere hours before candidates are legally required to stop campaigning.

At about 2:35 p.m. ET, a post appeared on the 4chan online message board announcing the leak. The documents appear to include emails, internal memos, and screenshots of purported banking records.

“In this pastebin are links to torrents of emails between Macron, his team and other officials, politicians as well as original documents and photos,” the anonymous 4chan poster wrote. “This was passed on to me today so now I am giving it to you, the people. The leak is massvie and released in the hopes that the human search engine here will be able to start sifting through the contents and figure out exactly what we have here.”

The Macron campaign issued a statement Friday night saying it was the victim of a “massive and coordinated” hacking attack. That campaign said the leak included some fake documents that were intended “to sow doubt and misinformation.”


Actors posted a to 4chan a link (T0151.012: Image Board Platform, T0146.006: Open Access Platform, T0115: Post Content, T0122: Direct Users to Alternative Platforms) to text content hosted on pastebin (T0152.005: Paste Platform, T0146.006: Open Access Platform, T0115: Post Content), which contained links to download stolen and fabricated documents. | | [T0151.012 Image Board Platform](../../generated_pages/techniques/T0151.012.md) |  IT00000388 A massive trove of documents purporting to contain thousands of emails and other files from the [2017 presidential] campaign of Emmanuel Macron—the French centrist candidate squaring off against right-wing nationalist Marine Le Pen—was posted on the internet Friday afternoon. The Macron campaign says that at least some of the documents are fake. The document dump came just over a day before voting is set to begin in the final round of the election and mere hours before candidates are legally required to stop campaigning.

At about 2:35 p.m. ET, a post appeared on the 4chan online message board announcing the leak. The documents appear to include emails, internal memos, and screenshots of purported banking records.

“In this pastebin are links to torrents of emails between Macron, his team and other officials, politicians as well as original documents and photos,” the anonymous 4chan poster wrote. “This was passed on to me today so now I am giving it to you, the people. The leak is massvie and released in the hopes that the human search engine here will be able to start sifting through the contents and figure out exactly what we have here.”

The Macron campaign issued a statement Friday night saying it was the victim of a “massive and coordinated” hacking attack. That campaign said the leak included some fake documents that were intended “to sow doubt and misinformation.”


Actors posted a to 4chan a link (T0151.012: Image Board Platform, T0146.006: Open Access Platform, T0115: Post Content, T0122: Direct Users to Alternative Platforms) to text content hosted on pastebin (T0152.005: Paste Platform, T0146.006: Open Access Platform, T0115: Post Content), which contained links to download stolen and fabricated documents. | | [T0152.005 Paste Platform](../../generated_pages/techniques/T0152.005.md) |  IT00000390 A massive trove of documents purporting to contain thousands of emails and other files from the [2017 presidential] campaign of Emmanuel Macron—the French centrist candidate squaring off against right-wing nationalist Marine Le Pen—was posted on the internet Friday afternoon. The Macron campaign says that at least some of the documents are fake. The document dump came just over a day before voting is set to begin in the final round of the election and mere hours before candidates are legally required to stop campaigning.

At about 2:35 p.m. ET, a post appeared on the 4chan online message board announcing the leak. The documents appear to include emails, internal memos, and screenshots of purported banking records.

“In this pastebin are links to torrents of emails between Macron, his team and other officials, politicians as well as original documents and photos,” the anonymous 4chan poster wrote. “This was passed on to me today so now I am giving it to you, the people. The leak is massvie and released in the hopes that the human search engine here will be able to start sifting through the contents and figure out exactly what we have here.”

The Macron campaign issued a statement Friday night saying it was the victim of a “massive and coordinated” hacking attack. That campaign said the leak included some fake documents that were intended “to sow doubt and misinformation.”


Actors posted a to 4chan a link (T0151.012: Image Board Platform, T0146.006: Open Access Platform, T0115: Post Content, T0122: Direct Users to Alternative Platforms) to text content hosted on pastebin (T0152.005: Paste Platform, T0146.006: Open Access Platform, T0115: Post Content), which contained links to download stolen and fabricated documents. | diff --git a/generated_pages/incidents/I00105.md b/generated_pages/incidents/I00105.md index ac9e2f0..db6bb1d 100644 --- a/generated_pages/incidents/I00105.md +++ b/generated_pages/incidents/I00105.md @@ -15,18 +15,19 @@ | Reference | Pub Date | Authors | Org | Archive | | --------- | -------- | ------- | --- | ------- | +| [https://gnet-research.org/2024/06/10/gaming-the-system-the-use-of-gaming-adjacent-communication-game-and-mod-platforms-by-extremist-actors/](https://gnet-research.org/2024/06/10/gaming-the-system-the-use-of-gaming-adjacent-communication-game-and-mod-platforms-by-extremist-actors/) | 2024/06/10 | Constantin Winkler, Lars Wiegold | Global Network on Extremism & Technology | [https://web.archive.org/web/20241009034732/https://gnet-research.org/2024/06/10/gaming-the-system-the-use-of-gaming-adjacent-communication-game-and-mod-platforms-by-extremist-actors/](https://web.archive.org/web/20241009034732/https://gnet-research.org/2024/06/10/gaming-the-system-the-use-of-gaming-adjacent-communication-game-and-mod-platforms-by-extremist-actors/) | | Technique | Description given for this incident | | --------- | ------------------------- | -| [T0147.001 Game](../../generated_pages/techniques/T0147.001.md) |  IT00000397 In this report, researchers look at online platforms commonly used by people who play videogames, looking at how these platforms can contribute to radicalisation of gamers:

Indie DB [is a platform that serves] to present indie games, which are titles from independent, small developer teams, which can be discussed and downloaded [Indie DB].

[...]

[On Indie DB we] found antisemitic, Islamist, sexist and other discriminatory content during the exploration. Both games and comments were located that made positive references to National Socialism. Radicalised users seem to use the opportunities to network, create groups, and communicate in forums. In addition, a number of member profiles with graphic propaganda content could be located. We found several games with propagandistic content advertised on the platform, which caused apparently radicalised users to form a fan community around those games. For example, there are titles such as the antisemitic Fursan Al-Aqsa: The Knights of the Al-Aqsa Mosque, which has won the Best Hardcore Game award at the Game Connection America 2024 Game Development Awards and which has received antisemitic praise on its review page. In the game, players need to target members of the Israeli Defence Forces, and attacks by Palestinian terrorist groups such as Hamas or Lions’ Den can be re-enacted. These include bomb attacks, beheadings and the re-enactment of the terrorist attack in Israel on 7 October 2023. We, therefore, deem Indie DB to be relevant for further analyses of extremist activities in digital gaming spaces.


Indie DB is an online software delivery platform on which users can create groups, and participate in discussion forums (T0152.009: Software Delivery Platform, T0151.002: Online Community Group, T0151.009: Legacy Online Forum Platform). The platform hosted games which allowed players to reenact terrorist attacks (T0147.001: Game). | -| [T0147.002 Game Mod](../../generated_pages/techniques/T0147.002.md) |  IT00000398 In this report, researchers look at online platforms commonly used by people who play videogames, looking at how these platforms can contribute to radicalisation of gamers:

Gamebanana and Mod DB are so-called modding platforms that allow users to post their modifications of existing (popular) games. In the process of modding, highly radicalised content can be inserted into games that did not originally contain it. All of these platforms also have communication functions and customisable profiles.

[...]

During the explorations, several modifications with hateful themes were located, including right-wing extremist, racist, antisemitic and Islamist content. This includes mods that make it possible to play as terrorists or National Socialists. So-called “skins” (textures that change the appearance of models in the game) for characters from first-person shooters are particularly popular and contain references to National Socialism or Islamist terrorist organisations. Although some of this content could be justified with reference to historical accuracy and realism, the user profiles of the creators and commentators often reveal political motivations. Names with neo-Nazi codes or the use of avatars showing members of the Wehrmacht or the Waffen SS, for example, indicate a certain degree of positive appreciation or fascination with right-wing ideology, as do affirmations in the comment columns.

Mod DB in particular has attracted public attention in the past. For example, a mod for the game Half-Life 2 made it possible to play a school shooting with the weapons used during the attacks at Columbine High School (1999) and Virginia Polytechnic Institute and State University (2007). Antisemitic memes and jokes are shared in several groups on the platform. It seems as if users partially connect with each other because of shared political views. There were also indications that Islamist and right-wing extremist users network on the basis of shared views on women, Jews or homosexuals. In addition to relevant usernames and avatars, we found profiles featuring picture galleries, backgrounds and banners dedicated to the SS. Extremist propaganda and radicalisation processes on modding platforms have not been explored yet, but our exploration suggests these digital spaces to be highly relevant for our field.


Mod DB is a platform which allows users to upload mods for games, which other users can download (T0152.009: Software Delivery Platform, T0147.002: Game Mod). | -| [T0151.002 Online Community Group](../../generated_pages/techniques/T0151.002.md) |  IT00000395 In this report, researchers look at online platforms commonly used by people who play videogames, looking at how these platforms can contribute to radicalisation of gamers:

Indie DB [is a platform that serves] to present indie games, which are titles from independent, small developer teams, which can be discussed and downloaded [Indie DB].

[...]

[On Indie DB we] found antisemitic, Islamist, sexist and other discriminatory content during the exploration. Both games and comments were located that made positive references to National Socialism. Radicalised users seem to use the opportunities to network, create groups, and communicate in forums. In addition, a number of member profiles with graphic propaganda content could be located. We found several games with propagandistic content advertised on the platform, which caused apparently radicalised users to form a fan community around those games. For example, there are titles such as the antisemitic Fursan Al-Aqsa: The Knights of the Al-Aqsa Mosque, which has won the Best Hardcore Game award at the Game Connection America 2024 Game Development Awards and which has received antisemitic praise on its review page. In the game, players need to target members of the Israeli Defence Forces, and attacks by Palestinian terrorist groups such as Hamas or Lions’ Den can be re-enacted. These include bomb attacks, beheadings and the re-enactment of the terrorist attack in Israel on 7 October 2023. We, therefore, deem Indie DB to be relevant for further analyses of extremist activities in digital gaming spaces.


Indie DB is an online software delivery platform on which users can create groups, and participate in discussion forums (T0152.009: Software Delivery Platform, T0151.002: Online Community Group, T0151.009: Legacy Online Forum Platform). The platform hosted games which allowed players to reenact terrorist attacks (T0147.001: Game). | -| [T0151.009 Legacy Online Forum Platform](../../generated_pages/techniques/T0151.009.md) |  IT00000394 In this report, researchers look at online platforms commonly used by people who play videogames, looking at how these platforms can contribute to radicalisation of gamers:

Gamer Uprising Forums (GUF) [is an online discussion platform using the classic forum structure] aimed directly at gamers. It is run by US Neo-Nazi Andrew Anglin and explicitly targets politically right-wing gamers. This forum mainly includes antisemitic, sexist, and racist topics, but also posts on related issues such as esotericism, conspiracy narratives, pro-Russian propaganda, alternative medicine, Christian religion, content related to the incel- and manosphere, lists of criminal offences committed by non-white people, links to right-wing news sites, homophobia and trans-hostility, troll guides, anti-leftism, ableism and much more. Most noticeable were the high number of antisemitic references. For example, there is a thread with hundreds of machine-generated images, most of which feature openly antisemitic content and popular antisemitic references. Many users chose explicitly antisemitic avatars. Some of the usernames also provide clues to the users’ ideologies and profiles feature swastikas as a type of progress bar and indicator of the user’s activity in the forum.

The GUF’s front page contains an overview of the forum, user statistics, and so-called “announcements”. In addition to advice-like references, these feature various expressions of hateful ideologies. At the time of the exploration, the following could be read there: “Jews are the problem!”, “Women should be raped”, “The Jews are going to be required to return stolen property”, “Immigrants will have to be physically removed”, “Console gaming is for n******” and “Anger is a womanly emotion”. New users have to prove themselves in an area for newcomers referred to in imageboard slang as the “Newfag Barn”. Only when the newcomers’ posts have received a substantial number of likes from established users, are they allowed to post in other parts of the forum. It can be assumed that this will also lead to competitions to outdo each other in posting extreme content. However, it is always possible to view all posts and content on the site. In any case, it can be assumed that the platform hardly addresses milieus that are not already radicalised or at risk of radicalisation and is therefore deemed relevant for radicalisation research. However, the number of registered users is low (typical for radicalised milieus) and, hence, the platform may only be of interest when studying a small group of highly radicalised individuals.


Gamer Uprising Forum is a legacy online forum, with access gated behind approval of existing platform users (T0155.003: Approval Gated, T0151.009: Legacy Online Forum Platform). | -| [T0152.009 Software Delivery Platform](../../generated_pages/techniques/T0152.009.md) |  IT00000396 In this report, researchers look at online platforms commonly used by people who play videogames, looking at how these platforms can contribute to radicalisation of gamers:

Indie DB [is a platform that serves] to present indie games, which are titles from independent, small developer teams, which can be discussed and downloaded [Indie DB].

[...]

[On Indie DB we] found antisemitic, Islamist, sexist and other discriminatory content during the exploration. Both games and comments were located that made positive references to National Socialism. Radicalised users seem to use the opportunities to network, create groups, and communicate in forums. In addition, a number of member profiles with graphic propaganda content could be located. We found several games with propagandistic content advertised on the platform, which caused apparently radicalised users to form a fan community around those games. For example, there are titles such as the antisemitic Fursan Al-Aqsa: The Knights of the Al-Aqsa Mosque, which has won the Best Hardcore Game award at the Game Connection America 2024 Game Development Awards and which has received antisemitic praise on its review page. In the game, players need to target members of the Israeli Defence Forces, and attacks by Palestinian terrorist groups such as Hamas or Lions’ Den can be re-enacted. These include bomb attacks, beheadings and the re-enactment of the terrorist attack in Israel on 7 October 2023. We, therefore, deem Indie DB to be relevant for further analyses of extremist activities in digital gaming spaces.


Indie DB is an online software delivery platform on which users can create groups, and participate in discussion forums (T0152.009: Software Delivery Platform, T0151.002: Online Community Group, T0151.009: Legacy Online Forum Platform). The platform hosted games which allowed players to reenact terrorist attacks (T0147.001: Game). | -| [T0152.009 Software Delivery Platform](../../generated_pages/techniques/T0152.009.md) |  IT00000399 In this report, researchers look at online platforms commonly used by people who play videogames, looking at how these platforms can contribute to radicalisation of gamers:

Gamebanana and Mod DB are so-called modding platforms that allow users to post their modifications of existing (popular) games. In the process of modding, highly radicalised content can be inserted into games that did not originally contain it. All of these platforms also have communication functions and customisable profiles.

[...]

During the explorations, several modifications with hateful themes were located, including right-wing extremist, racist, antisemitic and Islamist content. This includes mods that make it possible to play as terrorists or National Socialists. So-called “skins” (textures that change the appearance of models in the game) for characters from first-person shooters are particularly popular and contain references to National Socialism or Islamist terrorist organisations. Although some of this content could be justified with reference to historical accuracy and realism, the user profiles of the creators and commentators often reveal political motivations. Names with neo-Nazi codes or the use of avatars showing members of the Wehrmacht or the Waffen SS, for example, indicate a certain degree of positive appreciation or fascination with right-wing ideology, as do affirmations in the comment columns.

Mod DB in particular has attracted public attention in the past. For example, a mod for the game Half-Life 2 made it possible to play a school shooting with the weapons used during the attacks at Columbine High School (1999) and Virginia Polytechnic Institute and State University (2007). Antisemitic memes and jokes are shared in several groups on the platform. It seems as if users partially connect with each other because of shared political views. There were also indications that Islamist and right-wing extremist users network on the basis of shared views on women, Jews or homosexuals. In addition to relevant usernames and avatars, we found profiles featuring picture galleries, backgrounds and banners dedicated to the SS. Extremist propaganda and radicalisation processes on modding platforms have not been explored yet, but our exploration suggests these digital spaces to be highly relevant for our field.


Mod DB is a platform which allows users to upload mods for games, which other users can download (T0152.009: Software Delivery Platform, T0147.002: Game Mod). | -| [T0155.003 Approval Gated](../../generated_pages/techniques/T0155.003.md) |  IT00000393 In this report, researchers look at online platforms commonly used by people who play videogames, looking at how these platforms can contribute to radicalisation of gamers:

Gamer Uprising Forums (GUF) [is an online discussion platform using the classic forum structure] aimed directly at gamers. It is run by US Neo-Nazi Andrew Anglin and explicitly targets politically right-wing gamers. This forum mainly includes antisemitic, sexist, and racist topics, but also posts on related issues such as esotericism, conspiracy narratives, pro-Russian propaganda, alternative medicine, Christian religion, content related to the incel- and manosphere, lists of criminal offences committed by non-white people, links to right-wing news sites, homophobia and trans-hostility, troll guides, anti-leftism, ableism and much more. Most noticeable were the high number of antisemitic references. For example, there is a thread with hundreds of machine-generated images, most of which feature openly antisemitic content and popular antisemitic references. Many users chose explicitly antisemitic avatars. Some of the usernames also provide clues to the users’ ideologies and profiles feature swastikas as a type of progress bar and indicator of the user’s activity in the forum.

The GUF’s front page contains an overview of the forum, user statistics, and so-called “announcements”. In addition to advice-like references, these feature various expressions of hateful ideologies. At the time of the exploration, the following could be read there: “Jews are the problem!”, “Women should be raped”, “The Jews are going to be required to return stolen property”, “Immigrants will have to be physically removed”, “Console gaming is for n******” and “Anger is a womanly emotion”. New users have to prove themselves in an area for newcomers referred to in imageboard slang as the “Newfag Barn”. Only when the newcomers’ posts have received a substantial number of likes from established users, are they allowed to post in other parts of the forum. It can be assumed that this will also lead to competitions to outdo each other in posting extreme content. However, it is always possible to view all posts and content on the site. In any case, it can be assumed that the platform hardly addresses milieus that are not already radicalised or at risk of radicalisation and is therefore deemed relevant for radicalisation research. However, the number of registered users is low (typical for radicalised milieus) and, hence, the platform may only be of interest when studying a small group of highly radicalised individuals.


Gamer Uprising Forum is a legacy online forum, with access gated behind approval of existing platform users (T0155.003: Approval Gated, T0151.009: Legacy Online Forum Platform). | +| [T0147.001 Game Asset](../../generated_pages/techniques/T0147.001.md) |  IT00000397 In this report, researchers look at online platforms commonly used by people who play videogames, looking at how these platforms can contribute to radicalisation of gamers:

Indie DB [is a platform that serves] to present indie games, which are titles from independent, small developer teams, which can be discussed and downloaded [Indie DB].

[...]

[On Indie DB we] found antisemitic, Islamist, sexist and other discriminatory content during the exploration. Both games and comments were located that made positive references to National Socialism. Radicalised users seem to use the opportunities to network, create groups, and communicate in forums. In addition, a number of member profiles with graphic propaganda content could be located. We found several games with propagandistic content advertised on the platform, which caused apparently radicalised users to form a fan community around those games. For example, there are titles such as the antisemitic Fursan Al-Aqsa: The Knights of the Al-Aqsa Mosque, which has won the Best Hardcore Game award at the Game Connection America 2024 Game Development Awards and which has received antisemitic praise on its review page. In the game, players need to target members of the Israeli Defence Forces, and attacks by Palestinian terrorist groups such as Hamas or Lions’ Den can be re-enacted. These include bomb attacks, beheadings and the re-enactment of the terrorist attack in Israel on 7 October 2023. We, therefore, deem Indie DB to be relevant for further analyses of extremist activities in digital gaming spaces.


Indie DB is an online software delivery platform on which users can create groups, and participate in discussion forums (T0152.009: Software Delivery Platform, T0151.002: Online Community Group, T0151.009: Legacy Online Forum Platform). The platform hosted games which allowed players to reenact terrorist attacks (T0147.001: Game Asset). | +| [T0147.002 Game Mod Asset](../../generated_pages/techniques/T0147.002.md) |  IT00000398 In this report, researchers look at online platforms commonly used by people who play videogames, looking at how these platforms can contribute to radicalisation of gamers:

Gamebanana and Mod DB are so-called modding platforms that allow users to post their modifications of existing (popular) games. In the process of modding, highly radicalised content can be inserted into games that did not originally contain it. All of these platforms also have communication functions and customisable profiles.

[...]

During the explorations, several modifications with hateful themes were located, including right-wing extremist, racist, antisemitic and Islamist content. This includes mods that make it possible to play as terrorists or National Socialists. So-called “skins” (textures that change the appearance of models in the game) for characters from first-person shooters are particularly popular and contain references to National Socialism or Islamist terrorist organisations. Although some of this content could be justified with reference to historical accuracy and realism, the user profiles of the creators and commentators often reveal political motivations. Names with neo-Nazi codes or the use of avatars showing members of the Wehrmacht or the Waffen SS, for example, indicate a certain degree of positive appreciation or fascination with right-wing ideology, as do affirmations in the comment columns.

Mod DB in particular has attracted public attention in the past. For example, a mod for the game Half-Life 2 made it possible to play a school shooting with the weapons used during the attacks at Columbine High School (1999) and Virginia Polytechnic Institute and State University (2007). Antisemitic memes and jokes are shared in several groups on the platform. It seems as if users partially connect with each other because of shared political views. There were also indications that Islamist and right-wing extremist users network on the basis of shared views on women, Jews or homosexuals. In addition to relevant usernames and avatars, we found profiles featuring picture galleries, backgrounds and banners dedicated to the SS. Extremist propaganda and radicalisation processes on modding platforms have not been explored yet, but our exploration suggests these digital spaces to be highly relevant for our field.


Mod DB is a platform which allows users to upload mods for games, which other users can download (T0152.009: Software Delivery Platform, T0147.002: Game Mod Asset). | +| [T0151.002 Online Community Group](../../generated_pages/techniques/T0151.002.md) |  IT00000395 In this report, researchers look at online platforms commonly used by people who play videogames, looking at how these platforms can contribute to radicalisation of gamers:

Indie DB [is a platform that serves] to present indie games, which are titles from independent, small developer teams, which can be discussed and downloaded [Indie DB].

[...]

[On Indie DB we] found antisemitic, Islamist, sexist and other discriminatory content during the exploration. Both games and comments were located that made positive references to National Socialism. Radicalised users seem to use the opportunities to network, create groups, and communicate in forums. In addition, a number of member profiles with graphic propaganda content could be located. We found several games with propagandistic content advertised on the platform, which caused apparently radicalised users to form a fan community around those games. For example, there are titles such as the antisemitic Fursan Al-Aqsa: The Knights of the Al-Aqsa Mosque, which has won the Best Hardcore Game award at the Game Connection America 2024 Game Development Awards and which has received antisemitic praise on its review page. In the game, players need to target members of the Israeli Defence Forces, and attacks by Palestinian terrorist groups such as Hamas or Lions’ Den can be re-enacted. These include bomb attacks, beheadings and the re-enactment of the terrorist attack in Israel on 7 October 2023. We, therefore, deem Indie DB to be relevant for further analyses of extremist activities in digital gaming spaces.


Indie DB is an online software delivery platform on which users can create groups, and participate in discussion forums (T0152.009: Software Delivery Platform, T0151.002: Online Community Group, T0151.009: Legacy Online Forum Platform). The platform hosted games which allowed players to reenact terrorist attacks (T0147.001: Game Asset). | +| [T0151.009 Legacy Online Forum Platform](../../generated_pages/techniques/T0151.009.md) |  IT00000394 In this report, researchers look at online platforms commonly used by people who play videogames, looking at how these platforms can contribute to radicalisation of gamers:

Gamer Uprising Forums (GUF) [is an online discussion platform using the classic forum structure] aimed directly at gamers. It is run by US Neo-Nazi Andrew Anglin and explicitly targets politically right-wing gamers. This forum mainly includes antisemitic, sexist, and racist topics, but also posts on related issues such as esotericism, conspiracy narratives, pro-Russian propaganda, alternative medicine, Christian religion, content related to the incel- and manosphere, lists of criminal offences committed by non-white people, links to right-wing news sites, homophobia and trans-hostility, troll guides, anti-leftism, ableism and much more. Most noticeable were the high number of antisemitic references. For example, there is a thread with hundreds of machine-generated images, most of which feature openly antisemitic content and popular antisemitic references. Many users chose explicitly antisemitic avatars. Some of the usernames also provide clues to the users’ ideologies and profiles feature swastikas as a type of progress bar and indicator of the user’s activity in the forum.

The GUF’s front page contains an overview of the forum, user statistics, and so-called “announcements”. In addition to advice-like references, these feature various expressions of hateful ideologies. At the time of the exploration, the following could be read there: “Jews are the problem!”, “Women should be raped”, “The Jews are going to be required to return stolen property”, “Immigrants will have to be physically removed”, “Console gaming is for n******” and “Anger is a womanly emotion”. New users have to prove themselves in an area for newcomers referred to in imageboard slang as the “Newfag Barn”. Only when the newcomers’ posts have received a substantial number of likes from established users, are they allowed to post in other parts of the forum. It can be assumed that this will also lead to competitions to outdo each other in posting extreme content. However, it is always possible to view all posts and content on the site. In any case, it can be assumed that the platform hardly addresses milieus that are not already radicalised or at risk of radicalisation and is therefore deemed relevant for radicalisation research. However, the number of registered users is low (typical for radicalised milieus) and, hence, the platform may only be of interest when studying a small group of highly radicalised individuals.


Gamer Uprising Forum is a legacy online forum, with access gated behind approval of existing platform users (T0155.003: Approval Gated Asset, T0151.009: Legacy Online Forum Platform). | +| [T0152.009 Software Delivery Platform](../../generated_pages/techniques/T0152.009.md) |  IT00000396 In this report, researchers look at online platforms commonly used by people who play videogames, looking at how these platforms can contribute to radicalisation of gamers:

Indie DB [is a platform that serves] to present indie games, which are titles from independent, small developer teams, which can be discussed and downloaded [Indie DB].

[...]

[On Indie DB we] found antisemitic, Islamist, sexist and other discriminatory content during the exploration. Both games and comments were located that made positive references to National Socialism. Radicalised users seem to use the opportunities to network, create groups, and communicate in forums. In addition, a number of member profiles with graphic propaganda content could be located. We found several games with propagandistic content advertised on the platform, which caused apparently radicalised users to form a fan community around those games. For example, there are titles such as the antisemitic Fursan Al-Aqsa: The Knights of the Al-Aqsa Mosque, which has won the Best Hardcore Game award at the Game Connection America 2024 Game Development Awards and which has received antisemitic praise on its review page. In the game, players need to target members of the Israeli Defence Forces, and attacks by Palestinian terrorist groups such as Hamas or Lions’ Den can be re-enacted. These include bomb attacks, beheadings and the re-enactment of the terrorist attack in Israel on 7 October 2023. We, therefore, deem Indie DB to be relevant for further analyses of extremist activities in digital gaming spaces.


Indie DB is an online software delivery platform on which users can create groups, and participate in discussion forums (T0152.009: Software Delivery Platform, T0151.002: Online Community Group, T0151.009: Legacy Online Forum Platform). The platform hosted games which allowed players to reenact terrorist attacks (T0147.001: Game Asset). | +| [T0152.009 Software Delivery Platform](../../generated_pages/techniques/T0152.009.md) |  IT00000399 In this report, researchers look at online platforms commonly used by people who play videogames, looking at how these platforms can contribute to radicalisation of gamers:

Gamebanana and Mod DB are so-called modding platforms that allow users to post their modifications of existing (popular) games. In the process of modding, highly radicalised content can be inserted into games that did not originally contain it. All of these platforms also have communication functions and customisable profiles.

[...]

During the explorations, several modifications with hateful themes were located, including right-wing extremist, racist, antisemitic and Islamist content. This includes mods that make it possible to play as terrorists or National Socialists. So-called “skins” (textures that change the appearance of models in the game) for characters from first-person shooters are particularly popular and contain references to National Socialism or Islamist terrorist organisations. Although some of this content could be justified with reference to historical accuracy and realism, the user profiles of the creators and commentators often reveal political motivations. Names with neo-Nazi codes or the use of avatars showing members of the Wehrmacht or the Waffen SS, for example, indicate a certain degree of positive appreciation or fascination with right-wing ideology, as do affirmations in the comment columns.

Mod DB in particular has attracted public attention in the past. For example, a mod for the game Half-Life 2 made it possible to play a school shooting with the weapons used during the attacks at Columbine High School (1999) and Virginia Polytechnic Institute and State University (2007). Antisemitic memes and jokes are shared in several groups on the platform. It seems as if users partially connect with each other because of shared political views. There were also indications that Islamist and right-wing extremist users network on the basis of shared views on women, Jews or homosexuals. In addition to relevant usernames and avatars, we found profiles featuring picture galleries, backgrounds and banners dedicated to the SS. Extremist propaganda and radicalisation processes on modding platforms have not been explored yet, but our exploration suggests these digital spaces to be highly relevant for our field.


Mod DB is a platform which allows users to upload mods for games, which other users can download (T0152.009: Software Delivery Platform, T0147.002: Game Mod Asset). | +| [T0155.003 Approval Gated Asset](../../generated_pages/techniques/T0155.003.md) |  IT00000393 In this report, researchers look at online platforms commonly used by people who play videogames, looking at how these platforms can contribute to radicalisation of gamers:

Gamer Uprising Forums (GUF) [is an online discussion platform using the classic forum structure] aimed directly at gamers. It is run by US Neo-Nazi Andrew Anglin and explicitly targets politically right-wing gamers. This forum mainly includes antisemitic, sexist, and racist topics, but also posts on related issues such as esotericism, conspiracy narratives, pro-Russian propaganda, alternative medicine, Christian religion, content related to the incel- and manosphere, lists of criminal offences committed by non-white people, links to right-wing news sites, homophobia and trans-hostility, troll guides, anti-leftism, ableism and much more. Most noticeable were the high number of antisemitic references. For example, there is a thread with hundreds of machine-generated images, most of which feature openly antisemitic content and popular antisemitic references. Many users chose explicitly antisemitic avatars. Some of the usernames also provide clues to the users’ ideologies and profiles feature swastikas as a type of progress bar and indicator of the user’s activity in the forum.

The GUF’s front page contains an overview of the forum, user statistics, and so-called “announcements”. In addition to advice-like references, these feature various expressions of hateful ideologies. At the time of the exploration, the following could be read there: “Jews are the problem!”, “Women should be raped”, “The Jews are going to be required to return stolen property”, “Immigrants will have to be physically removed”, “Console gaming is for n******” and “Anger is a womanly emotion”. New users have to prove themselves in an area for newcomers referred to in imageboard slang as the “Newfag Barn”. Only when the newcomers’ posts have received a substantial number of likes from established users, are they allowed to post in other parts of the forum. It can be assumed that this will also lead to competitions to outdo each other in posting extreme content. However, it is always possible to view all posts and content on the site. In any case, it can be assumed that the platform hardly addresses milieus that are not already radicalised or at risk of radicalisation and is therefore deemed relevant for radicalisation research. However, the number of registered users is low (typical for radicalised milieus) and, hence, the platform may only be of interest when studying a small group of highly radicalised individuals.


Gamer Uprising Forum is a legacy online forum, with access gated behind approval of existing platform users (T0155.003: Approval Gated Asset, T0151.009: Legacy Online Forum Platform). | DO NOT EDIT ABOVE THIS LINE - PLEASE ADD NOTES BELOW \ No newline at end of file diff --git a/generated_pages/incidents/I00106.md b/generated_pages/incidents/I00106.md index 8642261..22390a9 100644 --- a/generated_pages/incidents/I00106.md +++ b/generated_pages/incidents/I00106.md @@ -15,17 +15,18 @@ | Reference | Pub Date | Authors | Org | Archive | | --------- | -------- | ------- | --- | ------- | +| [https://futurism.com/hurricane-scam-ai-slop](https://futurism.com/hurricane-scam-ai-slop) | 2024/10/01 | Maggie Harrison Dupré | Futurism | [https://web.archive.org/web/20241007213926/https://futurism.com/hurricane-scam-ai-slop](https://web.archive.org/web/20241007213926/https://futurism.com/hurricane-scam-ai-slop) | | Technique | Description given for this incident | | --------- | ------------------------- | -| [T0068 Respond to Breaking News Event or Active Crisis](../../generated_pages/techniques/T0068.md) |  IT00000403 As families desperately seek to find missing loved ones and communities grapple with immeasurable losses of both life and property in the wake of [2024’s] Hurricane Helene, AI slop scammers appear to be capitalizing on the moment for personal gain.

A Facebook account called "Coastal Views" usually shares calmer AI imagery of nature-filled beachside scenes. The account's banner image showcases a signpost reading "OBX Live," OBX being shorthand for North Carolina's Outer Banks islands.

But starting this weekend, the account shifted its approach dramatically, as first flagged by a social media user on X.

Instead of posting "photos" of leaping dolphins and sandy beaches, the account suddenly started publishing images of flooded mountain neighborhoods, submerged houses, and dogs sitting on top of roofs.

But instead of spreading vital information to those affected by the natural disaster, or at the very least sharing real photos of the destruction, the account is seemingly trying to use AI to cash in on all the attention the hurricane has been getting.

The account links to an Etsy page for a business called" OuterBanks2023," where somebody who goes by "Alexandr" sells AI-generated prints of horses touching snouts with sea turtles, Santa running down the shoreline with a reindeer, and sunsets over ocean waves.


A Facebook page which presented itself as being associated with North Carolina which posted AI generated images changed to posting AI generated images of hurricane damage after Hurricane Helene hit North Carolina (T0151.003: Online Community Page, T0151.001: Social Media Platform, T0115: Post Content, T0086.002: Develop AI-Generated Images (Deepfakes), T0068: Respond to Breaking News Event or Active Crisis).

The account included links (T0122: Direct Users to Alternative Platforms) to an account on Etsy, which sold prints of AI generated images (T0146: Account, T0148.007: eCommerce Platform). | -| [T0086.002 Develop AI-Generated Images (Deepfakes)](../../generated_pages/techniques/T0086.002.md) |  IT00000402 As families desperately seek to find missing loved ones and communities grapple with immeasurable losses of both life and property in the wake of [2024’s] Hurricane Helene, AI slop scammers appear to be capitalizing on the moment for personal gain.

A Facebook account called "Coastal Views" usually shares calmer AI imagery of nature-filled beachside scenes. The account's banner image showcases a signpost reading "OBX Live," OBX being shorthand for North Carolina's Outer Banks islands.

But starting this weekend, the account shifted its approach dramatically, as first flagged by a social media user on X.

Instead of posting "photos" of leaping dolphins and sandy beaches, the account suddenly started publishing images of flooded mountain neighborhoods, submerged houses, and dogs sitting on top of roofs.

But instead of spreading vital information to those affected by the natural disaster, or at the very least sharing real photos of the destruction, the account is seemingly trying to use AI to cash in on all the attention the hurricane has been getting.

The account links to an Etsy page for a business called" OuterBanks2023," where somebody who goes by "Alexandr" sells AI-generated prints of horses touching snouts with sea turtles, Santa running down the shoreline with a reindeer, and sunsets over ocean waves.


A Facebook page which presented itself as being associated with North Carolina which posted AI generated images changed to posting AI generated images of hurricane damage after Hurricane Helene hit North Carolina (T0151.003: Online Community Page, T0151.001: Social Media Platform, T0115: Post Content, T0086.002: Develop AI-Generated Images (Deepfakes), T0068: Respond to Breaking News Event or Active Crisis).

The account included links (T0122: Direct Users to Alternative Platforms) to an account on Etsy, which sold prints of AI generated images (T0146: Account, T0148.007: eCommerce Platform). | -| [T0122 Direct Users to Alternative Platforms](../../generated_pages/techniques/T0122.md) |  IT00000404 As families desperately seek to find missing loved ones and communities grapple with immeasurable losses of both life and property in the wake of [2024’s] Hurricane Helene, AI slop scammers appear to be capitalizing on the moment for personal gain.

A Facebook account called "Coastal Views" usually shares calmer AI imagery of nature-filled beachside scenes. The account's banner image showcases a signpost reading "OBX Live," OBX being shorthand for North Carolina's Outer Banks islands.

But starting this weekend, the account shifted its approach dramatically, as first flagged by a social media user on X.

Instead of posting "photos" of leaping dolphins and sandy beaches, the account suddenly started publishing images of flooded mountain neighborhoods, submerged houses, and dogs sitting on top of roofs.

But instead of spreading vital information to those affected by the natural disaster, or at the very least sharing real photos of the destruction, the account is seemingly trying to use AI to cash in on all the attention the hurricane has been getting.

The account links to an Etsy page for a business called" OuterBanks2023," where somebody who goes by "Alexandr" sells AI-generated prints of horses touching snouts with sea turtles, Santa running down the shoreline with a reindeer, and sunsets over ocean waves.


A Facebook page which presented itself as being associated with North Carolina which posted AI generated images changed to posting AI generated images of hurricane damage after Hurricane Helene hit North Carolina (T0151.003: Online Community Page, T0151.001: Social Media Platform, T0115: Post Content, T0086.002: Develop AI-Generated Images (Deepfakes), T0068: Respond to Breaking News Event or Active Crisis).

The account included links (T0122: Direct Users to Alternative Platforms) to an account on Etsy, which sold prints of AI generated images (T0146: Account, T0148.007: eCommerce Platform). | -| [T0148.007 eCommerce Platform](../../generated_pages/techniques/T0148.007.md) |  IT00000405 As families desperately seek to find missing loved ones and communities grapple with immeasurable losses of both life and property in the wake of [2024’s] Hurricane Helene, AI slop scammers appear to be capitalizing on the moment for personal gain.

A Facebook account called "Coastal Views" usually shares calmer AI imagery of nature-filled beachside scenes. The account's banner image showcases a signpost reading "OBX Live," OBX being shorthand for North Carolina's Outer Banks islands.

But starting this weekend, the account shifted its approach dramatically, as first flagged by a social media user on X.

Instead of posting "photos" of leaping dolphins and sandy beaches, the account suddenly started publishing images of flooded mountain neighborhoods, submerged houses, and dogs sitting on top of roofs.

But instead of spreading vital information to those affected by the natural disaster, or at the very least sharing real photos of the destruction, the account is seemingly trying to use AI to cash in on all the attention the hurricane has been getting.

The account links to an Etsy page for a business called" OuterBanks2023," where somebody who goes by "Alexandr" sells AI-generated prints of horses touching snouts with sea turtles, Santa running down the shoreline with a reindeer, and sunsets over ocean waves.


A Facebook page which presented itself as being associated with North Carolina which posted AI generated images changed to posting AI generated images of hurricane damage after Hurricane Helene hit North Carolina (T0151.003: Online Community Page, T0151.001: Social Media Platform, T0115: Post Content, T0086.002: Develop AI-Generated Images (Deepfakes), T0068: Respond to Breaking News Event or Active Crisis).

The account included links (T0122: Direct Users to Alternative Platforms) to an account on Etsy, which sold prints of AI generated images (T0146: Account, T0148.007: eCommerce Platform). | -| [T0151.001 Social Media Platform](../../generated_pages/techniques/T0151.001.md) |  IT00000400 As families desperately seek to find missing loved ones and communities grapple with immeasurable losses of both life and property in the wake of [2024’s] Hurricane Helene, AI slop scammers appear to be capitalizing on the moment for personal gain.

A Facebook account called "Coastal Views" usually shares calmer AI imagery of nature-filled beachside scenes. The account's banner image showcases a signpost reading "OBX Live," OBX being shorthand for North Carolina's Outer Banks islands.

But starting this weekend, the account shifted its approach dramatically, as first flagged by a social media user on X.

Instead of posting "photos" of leaping dolphins and sandy beaches, the account suddenly started publishing images of flooded mountain neighborhoods, submerged houses, and dogs sitting on top of roofs.

But instead of spreading vital information to those affected by the natural disaster, or at the very least sharing real photos of the destruction, the account is seemingly trying to use AI to cash in on all the attention the hurricane has been getting.

The account links to an Etsy page for a business called" OuterBanks2023," where somebody who goes by "Alexandr" sells AI-generated prints of horses touching snouts with sea turtles, Santa running down the shoreline with a reindeer, and sunsets over ocean waves.


A Facebook page which presented itself as being associated with North Carolina which posted AI generated images changed to posting AI generated images of hurricane damage after Hurricane Helene hit North Carolina (T0151.003: Online Community Page, T0151.001: Social Media Platform, T0115: Post Content, T0086.002: Develop AI-Generated Images (Deepfakes), T0068: Respond to Breaking News Event or Active Crisis).

The account included links (T0122: Direct Users to Alternative Platforms) to an account on Etsy, which sold prints of AI generated images (T0146: Account, T0148.007: eCommerce Platform). | -| [T0151.003 Online Community Page](../../generated_pages/techniques/T0151.003.md) |  IT00000401 As families desperately seek to find missing loved ones and communities grapple with immeasurable losses of both life and property in the wake of [2024’s] Hurricane Helene, AI slop scammers appear to be capitalizing on the moment for personal gain.

A Facebook account called "Coastal Views" usually shares calmer AI imagery of nature-filled beachside scenes. The account's banner image showcases a signpost reading "OBX Live," OBX being shorthand for North Carolina's Outer Banks islands.

But starting this weekend, the account shifted its approach dramatically, as first flagged by a social media user on X.

Instead of posting "photos" of leaping dolphins and sandy beaches, the account suddenly started publishing images of flooded mountain neighborhoods, submerged houses, and dogs sitting on top of roofs.

But instead of spreading vital information to those affected by the natural disaster, or at the very least sharing real photos of the destruction, the account is seemingly trying to use AI to cash in on all the attention the hurricane has been getting.

The account links to an Etsy page for a business called" OuterBanks2023," where somebody who goes by "Alexandr" sells AI-generated prints of horses touching snouts with sea turtles, Santa running down the shoreline with a reindeer, and sunsets over ocean waves.


A Facebook page which presented itself as being associated with North Carolina which posted AI generated images changed to posting AI generated images of hurricane damage after Hurricane Helene hit North Carolina (T0151.003: Online Community Page, T0151.001: Social Media Platform, T0115: Post Content, T0086.002: Develop AI-Generated Images (Deepfakes), T0068: Respond to Breaking News Event or Active Crisis).

The account included links (T0122: Direct Users to Alternative Platforms) to an account on Etsy, which sold prints of AI generated images (T0146: Account, T0148.007: eCommerce Platform). | +| [T0068 Respond to Breaking News Event or Active Crisis](../../generated_pages/techniques/T0068.md) |  IT00000403 As families desperately seek to find missing loved ones and communities grapple with immeasurable losses of both life and property in the wake of [2024’s] Hurricane Helene, AI slop scammers appear to be capitalizing on the moment for personal gain.

A Facebook account called "Coastal Views" usually shares calmer AI imagery of nature-filled beachside scenes. The account's banner image showcases a signpost reading "OBX Live," OBX being shorthand for North Carolina's Outer Banks islands.

But starting this weekend, the account shifted its approach dramatically, as first flagged by a social media user on X.

Instead of posting "photos" of leaping dolphins and sandy beaches, the account suddenly started publishing images of flooded mountain neighborhoods, submerged houses, and dogs sitting on top of roofs.

But instead of spreading vital information to those affected by the natural disaster, or at the very least sharing real photos of the destruction, the account is seemingly trying to use AI to cash in on all the attention the hurricane has been getting.

The account links to an Etsy page for a business called" OuterBanks2023," where somebody who goes by "Alexandr" sells AI-generated prints of horses touching snouts with sea turtles, Santa running down the shoreline with a reindeer, and sunsets over ocean waves.


A Facebook page which presented itself as being associated with North Carolina which posted AI generated images changed to posting AI generated images of hurricane damage after Hurricane Helene hit North Carolina (T0151.003: Online Community Page, T0151.001: Social Media Platform, T0115: Post Content, T0086.002: Develop AI-Generated Images (Deepfakes), T0068: Respond to Breaking News Event or Active Crisis).

The account included links (T0122: Direct Users to Alternative Platforms) to an account on Etsy, which sold prints of AI generated images (T0146: Account Asset, T0148.007: eCommerce Platform). | +| [T0086.002 Develop AI-Generated Images (Deepfakes)](../../generated_pages/techniques/T0086.002.md) |  IT00000402 As families desperately seek to find missing loved ones and communities grapple with immeasurable losses of both life and property in the wake of [2024’s] Hurricane Helene, AI slop scammers appear to be capitalizing on the moment for personal gain.

A Facebook account called "Coastal Views" usually shares calmer AI imagery of nature-filled beachside scenes. The account's banner image showcases a signpost reading "OBX Live," OBX being shorthand for North Carolina's Outer Banks islands.

But starting this weekend, the account shifted its approach dramatically, as first flagged by a social media user on X.

Instead of posting "photos" of leaping dolphins and sandy beaches, the account suddenly started publishing images of flooded mountain neighborhoods, submerged houses, and dogs sitting on top of roofs.

But instead of spreading vital information to those affected by the natural disaster, or at the very least sharing real photos of the destruction, the account is seemingly trying to use AI to cash in on all the attention the hurricane has been getting.

The account links to an Etsy page for a business called" OuterBanks2023," where somebody who goes by "Alexandr" sells AI-generated prints of horses touching snouts with sea turtles, Santa running down the shoreline with a reindeer, and sunsets over ocean waves.


A Facebook page which presented itself as being associated with North Carolina which posted AI generated images changed to posting AI generated images of hurricane damage after Hurricane Helene hit North Carolina (T0151.003: Online Community Page, T0151.001: Social Media Platform, T0115: Post Content, T0086.002: Develop AI-Generated Images (Deepfakes), T0068: Respond to Breaking News Event or Active Crisis).

The account included links (T0122: Direct Users to Alternative Platforms) to an account on Etsy, which sold prints of AI generated images (T0146: Account Asset, T0148.007: eCommerce Platform). | +| [T0122 Direct Users to Alternative Platforms](../../generated_pages/techniques/T0122.md) |  IT00000404 As families desperately seek to find missing loved ones and communities grapple with immeasurable losses of both life and property in the wake of [2024’s] Hurricane Helene, AI slop scammers appear to be capitalizing on the moment for personal gain.

A Facebook account called "Coastal Views" usually shares calmer AI imagery of nature-filled beachside scenes. The account's banner image showcases a signpost reading "OBX Live," OBX being shorthand for North Carolina's Outer Banks islands.

But starting this weekend, the account shifted its approach dramatically, as first flagged by a social media user on X.

Instead of posting "photos" of leaping dolphins and sandy beaches, the account suddenly started publishing images of flooded mountain neighborhoods, submerged houses, and dogs sitting on top of roofs.

But instead of spreading vital information to those affected by the natural disaster, or at the very least sharing real photos of the destruction, the account is seemingly trying to use AI to cash in on all the attention the hurricane has been getting.

The account links to an Etsy page for a business called" OuterBanks2023," where somebody who goes by "Alexandr" sells AI-generated prints of horses touching snouts with sea turtles, Santa running down the shoreline with a reindeer, and sunsets over ocean waves.


A Facebook page which presented itself as being associated with North Carolina which posted AI generated images changed to posting AI generated images of hurricane damage after Hurricane Helene hit North Carolina (T0151.003: Online Community Page, T0151.001: Social Media Platform, T0115: Post Content, T0086.002: Develop AI-Generated Images (Deepfakes), T0068: Respond to Breaking News Event or Active Crisis).

The account included links (T0122: Direct Users to Alternative Platforms) to an account on Etsy, which sold prints of AI generated images (T0146: Account Asset, T0148.007: eCommerce Platform). | +| [T0148.007 eCommerce Platform](../../generated_pages/techniques/T0148.007.md) |  IT00000405 As families desperately seek to find missing loved ones and communities grapple with immeasurable losses of both life and property in the wake of [2024’s] Hurricane Helene, AI slop scammers appear to be capitalizing on the moment for personal gain.

A Facebook account called "Coastal Views" usually shares calmer AI imagery of nature-filled beachside scenes. The account's banner image showcases a signpost reading "OBX Live," OBX being shorthand for North Carolina's Outer Banks islands.

But starting this weekend, the account shifted its approach dramatically, as first flagged by a social media user on X.

Instead of posting "photos" of leaping dolphins and sandy beaches, the account suddenly started publishing images of flooded mountain neighborhoods, submerged houses, and dogs sitting on top of roofs.

But instead of spreading vital information to those affected by the natural disaster, or at the very least sharing real photos of the destruction, the account is seemingly trying to use AI to cash in on all the attention the hurricane has been getting.

The account links to an Etsy page for a business called" OuterBanks2023," where somebody who goes by "Alexandr" sells AI-generated prints of horses touching snouts with sea turtles, Santa running down the shoreline with a reindeer, and sunsets over ocean waves.


A Facebook page which presented itself as being associated with North Carolina which posted AI generated images changed to posting AI generated images of hurricane damage after Hurricane Helene hit North Carolina (T0151.003: Online Community Page, T0151.001: Social Media Platform, T0115: Post Content, T0086.002: Develop AI-Generated Images (Deepfakes), T0068: Respond to Breaking News Event or Active Crisis).

The account included links (T0122: Direct Users to Alternative Platforms) to an account on Etsy, which sold prints of AI generated images (T0146: Account Asset, T0148.007: eCommerce Platform). | +| [T0151.001 Social Media Platform](../../generated_pages/techniques/T0151.001.md) |  IT00000400 As families desperately seek to find missing loved ones and communities grapple with immeasurable losses of both life and property in the wake of [2024’s] Hurricane Helene, AI slop scammers appear to be capitalizing on the moment for personal gain.

A Facebook account called "Coastal Views" usually shares calmer AI imagery of nature-filled beachside scenes. The account's banner image showcases a signpost reading "OBX Live," OBX being shorthand for North Carolina's Outer Banks islands.

But starting this weekend, the account shifted its approach dramatically, as first flagged by a social media user on X.

Instead of posting "photos" of leaping dolphins and sandy beaches, the account suddenly started publishing images of flooded mountain neighborhoods, submerged houses, and dogs sitting on top of roofs.

But instead of spreading vital information to those affected by the natural disaster, or at the very least sharing real photos of the destruction, the account is seemingly trying to use AI to cash in on all the attention the hurricane has been getting.

The account links to an Etsy page for a business called" OuterBanks2023," where somebody who goes by "Alexandr" sells AI-generated prints of horses touching snouts with sea turtles, Santa running down the shoreline with a reindeer, and sunsets over ocean waves.


A Facebook page which presented itself as being associated with North Carolina which posted AI generated images changed to posting AI generated images of hurricane damage after Hurricane Helene hit North Carolina (T0151.003: Online Community Page, T0151.001: Social Media Platform, T0115: Post Content, T0086.002: Develop AI-Generated Images (Deepfakes), T0068: Respond to Breaking News Event or Active Crisis).

The account included links (T0122: Direct Users to Alternative Platforms) to an account on Etsy, which sold prints of AI generated images (T0146: Account Asset, T0148.007: eCommerce Platform). | +| [T0151.003 Online Community Page](../../generated_pages/techniques/T0151.003.md) |  IT00000401 As families desperately seek to find missing loved ones and communities grapple with immeasurable losses of both life and property in the wake of [2024’s] Hurricane Helene, AI slop scammers appear to be capitalizing on the moment for personal gain.

A Facebook account called "Coastal Views" usually shares calmer AI imagery of nature-filled beachside scenes. The account's banner image showcases a signpost reading "OBX Live," OBX being shorthand for North Carolina's Outer Banks islands.

But starting this weekend, the account shifted its approach dramatically, as first flagged by a social media user on X.

Instead of posting "photos" of leaping dolphins and sandy beaches, the account suddenly started publishing images of flooded mountain neighborhoods, submerged houses, and dogs sitting on top of roofs.

But instead of spreading vital information to those affected by the natural disaster, or at the very least sharing real photos of the destruction, the account is seemingly trying to use AI to cash in on all the attention the hurricane has been getting.

The account links to an Etsy page for a business called" OuterBanks2023," where somebody who goes by "Alexandr" sells AI-generated prints of horses touching snouts with sea turtles, Santa running down the shoreline with a reindeer, and sunsets over ocean waves.


A Facebook page which presented itself as being associated with North Carolina which posted AI generated images changed to posting AI generated images of hurricane damage after Hurricane Helene hit North Carolina (T0151.003: Online Community Page, T0151.001: Social Media Platform, T0115: Post Content, T0086.002: Develop AI-Generated Images (Deepfakes), T0068: Respond to Breaking News Event or Active Crisis).

The account included links (T0122: Direct Users to Alternative Platforms) to an account on Etsy, which sold prints of AI generated images (T0146: Account Asset, T0148.007: eCommerce Platform). | DO NOT EDIT ABOVE THIS LINE - PLEASE ADD NOTES BELOW \ No newline at end of file diff --git a/generated_pages/incidents/I00107.md b/generated_pages/incidents/I00107.md index a682902..ce9f99e 100644 --- a/generated_pages/incidents/I00107.md +++ b/generated_pages/incidents/I00107.md @@ -15,6 +15,7 @@ | Reference | Pub Date | Authors | Org | Archive | | --------- | -------- | ------- | --- | ------- | +| [https://www.foreignaffairs.com/russia/lies-russia-tells-itself](https://www.foreignaffairs.com/russia/lies-russia-tells-itself) | 2024/09/30 | Thomas Rid | Forreign Affairs | [https://web.archive.org/web/20241009145602/https://www.foreignaffairs.com/russia/lies-russia-tells-itself](https://web.archive.org/web/20241009145602/https://www.foreignaffairs.com/russia/lies-russia-tells-itself) | diff --git a/generated_pages/incidents/I00108.md b/generated_pages/incidents/I00108.md index fd5cd8c..90a5a97 100644 --- a/generated_pages/incidents/I00108.md +++ b/generated_pages/incidents/I00108.md @@ -15,19 +15,20 @@ | Reference | Pub Date | Authors | Org | Archive | | --------- | -------- | ------- | --- | ------- | +| [https://www.disinfo.eu/publications/suavelos-white-supremacists-funded-through-facebook](https://www.disinfo.eu/publications/suavelos-white-supremacists-funded-through-facebook) | 2020/09/11 | Alexandre Alaphilippe, Roman Adamczyk, Gary Machado | EU Disinfo Lab | [https://web.archive.org/web/20240525113912/https://www.disinfo.eu/publications/suavelos-white-supremacists-funded-through-facebook/](https://web.archive.org/web/20240525113912/https://www.disinfo.eu/publications/suavelos-white-supremacists-funded-through-facebook/) | | Technique | Description given for this incident | | --------- | ------------------------- | -| [T0092 Build Network](../../generated_pages/techniques/T0092.md) |  IT00000410 This article examines the white nationalist group Suavelos’ use of Facebook to draw visitors to its website without overtly revealing their racist ideology:

Suavelos uses Facebook and other platforms to amplify its message. In order to bypass the platforms’ community standards and keep their public pages active, Facebook pages such as “I support the police” are a good vehicle to spread a specific agenda without claiming to be racist. In looking back at this Facebook page, we followed Facebook’s algorithm for related pages and found suggested Facebook pages

[...]

This amplification strategy on Facebook is successful, as according to SimilarWeb figures, it attracts around 111,000 visits every month on the Suavelos.eu website.

[...]

Revenue through online advertisements can be achieved by different platforms through targeted advertisements, like Google Adsense or Doubleclick, or related and similar sponsored content, such as Taboola. Accordingly, Suavelos.eu uses both of these websites to display advertisements and consequently receives funding from such advertisements.

Once visitors are on the website supporting its advertisement revenue, Suavelos’ goal is to then turn these visitors into regular members of Suavelos network through donations or fees, or have them continue to support Suavelos.


Suevelos created a variety of pages on Facebook which presented as centring on prosocial causes. Facebook’s algorithm helped direct users to these pages (T0092: Build Network, T0151.001: Social Media Platform, T0153.006: Content Recommendation Algorithm, T0151.003: Online Community Page, T0143.208: Social Cause Persona).

Suevelos used these pages to generate traffic for their WordPress site (T0122: Direct Users to Alternative Platforms, T0152.003: Website Hosting Platform, T0152.004: Website), which used accounts on a variety of online advertising platforms to host adverts (T0146: Account, T0153.005: Online Advertising Platform). | -| [T0122 Direct Users to Alternative Platforms](../../generated_pages/techniques/T0122.md) |  IT00000415 This article examines the white nationalist group Suavelos’ use of Facebook to draw visitors to its website without overtly revealing their racist ideology:

Suavelos uses Facebook and other platforms to amplify its message. In order to bypass the platforms’ community standards and keep their public pages active, Facebook pages such as “I support the police” are a good vehicle to spread a specific agenda without claiming to be racist. In looking back at this Facebook page, we followed Facebook’s algorithm for related pages and found suggested Facebook pages

[...]

This amplification strategy on Facebook is successful, as according to SimilarWeb figures, it attracts around 111,000 visits every month on the Suavelos.eu website.

[...]

Revenue through online advertisements can be achieved by different platforms through targeted advertisements, like Google Adsense or Doubleclick, or related and similar sponsored content, such as Taboola. Accordingly, Suavelos.eu uses both of these websites to display advertisements and consequently receives funding from such advertisements.

Once visitors are on the website supporting its advertisement revenue, Suavelos’ goal is to then turn these visitors into regular members of Suavelos network through donations or fees, or have them continue to support Suavelos.


Suevelos created a variety of pages on Facebook which presented as centring on prosocial causes. Facebook’s algorithm helped direct users to these pages (T0092: Build Network, T0151.001: Social Media Platform, T0153.006: Content Recommendation Algorithm, T0151.003: Online Community Page, T0143.208: Social Cause Persona).

Suevelos used these pages to generate traffic for their WordPress site (T0122: Direct Users to Alternative Platforms, T0152.003: Website Hosting Platform, T0152.004: Website), which used accounts on a variety of online advertising platforms to host adverts (T0146: Account, T0153.005: Online Advertising Platform). | -| [T0151.001 Social Media Platform](../../generated_pages/techniques/T0151.001.md) |  IT00000411 This article examines the white nationalist group Suavelos’ use of Facebook to draw visitors to its website without overtly revealing their racist ideology:

Suavelos uses Facebook and other platforms to amplify its message. In order to bypass the platforms’ community standards and keep their public pages active, Facebook pages such as “I support the police” are a good vehicle to spread a specific agenda without claiming to be racist. In looking back at this Facebook page, we followed Facebook’s algorithm for related pages and found suggested Facebook pages

[...]

This amplification strategy on Facebook is successful, as according to SimilarWeb figures, it attracts around 111,000 visits every month on the Suavelos.eu website.

[...]

Revenue through online advertisements can be achieved by different platforms through targeted advertisements, like Google Adsense or Doubleclick, or related and similar sponsored content, such as Taboola. Accordingly, Suavelos.eu uses both of these websites to display advertisements and consequently receives funding from such advertisements.

Once visitors are on the website supporting its advertisement revenue, Suavelos’ goal is to then turn these visitors into regular members of Suavelos network through donations or fees, or have them continue to support Suavelos.


Suevelos created a variety of pages on Facebook which presented as centring on prosocial causes. Facebook’s algorithm helped direct users to these pages (T0092: Build Network, T0151.001: Social Media Platform, T0153.006: Content Recommendation Algorithm, T0151.003: Online Community Page, T0143.208: Social Cause Persona).

Suevelos used these pages to generate traffic for their WordPress site (T0122: Direct Users to Alternative Platforms, T0152.003: Website Hosting Platform, T0152.004: Website), which used accounts on a variety of online advertising platforms to host adverts (T0146: Account, T0153.005: Online Advertising Platform). | -| [T0151.003 Online Community Page](../../generated_pages/techniques/T0151.003.md) |  IT00000413 This article examines the white nationalist group Suavelos’ use of Facebook to draw visitors to its website without overtly revealing their racist ideology:

Suavelos uses Facebook and other platforms to amplify its message. In order to bypass the platforms’ community standards and keep their public pages active, Facebook pages such as “I support the police” are a good vehicle to spread a specific agenda without claiming to be racist. In looking back at this Facebook page, we followed Facebook’s algorithm for related pages and found suggested Facebook pages

[...]

This amplification strategy on Facebook is successful, as according to SimilarWeb figures, it attracts around 111,000 visits every month on the Suavelos.eu website.

[...]

Revenue through online advertisements can be achieved by different platforms through targeted advertisements, like Google Adsense or Doubleclick, or related and similar sponsored content, such as Taboola. Accordingly, Suavelos.eu uses both of these websites to display advertisements and consequently receives funding from such advertisements.

Once visitors are on the website supporting its advertisement revenue, Suavelos’ goal is to then turn these visitors into regular members of Suavelos network through donations or fees, or have them continue to support Suavelos.


Suevelos created a variety of pages on Facebook which presented as centring on prosocial causes. Facebook’s algorithm helped direct users to these pages (T0092: Build Network, T0151.001: Social Media Platform, T0153.006: Content Recommendation Algorithm, T0151.003: Online Community Page, T0143.208: Social Cause Persona).

Suevelos used these pages to generate traffic for their WordPress site (T0122: Direct Users to Alternative Platforms, T0152.003: Website Hosting Platform, T0152.004: Website), which used accounts on a variety of online advertising platforms to host adverts (T0146: Account, T0153.005: Online Advertising Platform). | -| [T0152.003 Website Hosting Platform](../../generated_pages/techniques/T0152.003.md) |  IT00000416 This article examines the white nationalist group Suavelos’ use of Facebook to draw visitors to its website without overtly revealing their racist ideology:

Suavelos uses Facebook and other platforms to amplify its message. In order to bypass the platforms’ community standards and keep their public pages active, Facebook pages such as “I support the police” are a good vehicle to spread a specific agenda without claiming to be racist. In looking back at this Facebook page, we followed Facebook’s algorithm for related pages and found suggested Facebook pages

[...]

This amplification strategy on Facebook is successful, as according to SimilarWeb figures, it attracts around 111,000 visits every month on the Suavelos.eu website.

[...]

Revenue through online advertisements can be achieved by different platforms through targeted advertisements, like Google Adsense or Doubleclick, or related and similar sponsored content, such as Taboola. Accordingly, Suavelos.eu uses both of these websites to display advertisements and consequently receives funding from such advertisements.

Once visitors are on the website supporting its advertisement revenue, Suavelos’ goal is to then turn these visitors into regular members of Suavelos network through donations or fees, or have them continue to support Suavelos.


Suevelos created a variety of pages on Facebook which presented as centring on prosocial causes. Facebook’s algorithm helped direct users to these pages (T0092: Build Network, T0151.001: Social Media Platform, T0153.006: Content Recommendation Algorithm, T0151.003: Online Community Page, T0143.208: Social Cause Persona).

Suevelos used these pages to generate traffic for their WordPress site (T0122: Direct Users to Alternative Platforms, T0152.003: Website Hosting Platform, T0152.004: Website), which used accounts on a variety of online advertising platforms to host adverts (T0146: Account, T0153.005: Online Advertising Platform). | -| [T0152.004 Website](../../generated_pages/techniques/T0152.004.md) |  IT00000417 This article examines the white nationalist group Suavelos’ use of Facebook to draw visitors to its website without overtly revealing their racist ideology:

Suavelos uses Facebook and other platforms to amplify its message. In order to bypass the platforms’ community standards and keep their public pages active, Facebook pages such as “I support the police” are a good vehicle to spread a specific agenda without claiming to be racist. In looking back at this Facebook page, we followed Facebook’s algorithm for related pages and found suggested Facebook pages

[...]

This amplification strategy on Facebook is successful, as according to SimilarWeb figures, it attracts around 111,000 visits every month on the Suavelos.eu website.

[...]

Revenue through online advertisements can be achieved by different platforms through targeted advertisements, like Google Adsense or Doubleclick, or related and similar sponsored content, such as Taboola. Accordingly, Suavelos.eu uses both of these websites to display advertisements and consequently receives funding from such advertisements.

Once visitors are on the website supporting its advertisement revenue, Suavelos’ goal is to then turn these visitors into regular members of Suavelos network through donations or fees, or have them continue to support Suavelos.


Suevelos created a variety of pages on Facebook which presented as centring on prosocial causes. Facebook’s algorithm helped direct users to these pages (T0092: Build Network, T0151.001: Social Media Platform, T0153.006: Content Recommendation Algorithm, T0151.003: Online Community Page, T0143.208: Social Cause Persona).

Suevelos used these pages to generate traffic for their WordPress site (T0122: Direct Users to Alternative Platforms, T0152.003: Website Hosting Platform, T0152.004: Website), which used accounts on a variety of online advertising platforms to host adverts (T0146: Account, T0153.005: Online Advertising Platform). | -| [T0153.005 Online Advertising Platform](../../generated_pages/techniques/T0153.005.md) |  IT00000418 This article examines the white nationalist group Suavelos’ use of Facebook to draw visitors to its website without overtly revealing their racist ideology:

Suavelos uses Facebook and other platforms to amplify its message. In order to bypass the platforms’ community standards and keep their public pages active, Facebook pages such as “I support the police” are a good vehicle to spread a specific agenda without claiming to be racist. In looking back at this Facebook page, we followed Facebook’s algorithm for related pages and found suggested Facebook pages

[...]

This amplification strategy on Facebook is successful, as according to SimilarWeb figures, it attracts around 111,000 visits every month on the Suavelos.eu website.

[...]

Revenue through online advertisements can be achieved by different platforms through targeted advertisements, like Google Adsense or Doubleclick, or related and similar sponsored content, such as Taboola. Accordingly, Suavelos.eu uses both of these websites to display advertisements and consequently receives funding from such advertisements.

Once visitors are on the website supporting its advertisement revenue, Suavelos’ goal is to then turn these visitors into regular members of Suavelos network through donations or fees, or have them continue to support Suavelos.


Suevelos created a variety of pages on Facebook which presented as centring on prosocial causes. Facebook’s algorithm helped direct users to these pages (T0092: Build Network, T0151.001: Social Media Platform, T0153.006: Content Recommendation Algorithm, T0151.003: Online Community Page, T0143.208: Social Cause Persona).

Suevelos used these pages to generate traffic for their WordPress site (T0122: Direct Users to Alternative Platforms, T0152.003: Website Hosting Platform, T0152.004: Website), which used accounts on a variety of online advertising platforms to host adverts (T0146: Account, T0153.005: Online Advertising Platform). | -| [T0153.006 Content Recommendation Algorithm](../../generated_pages/techniques/T0153.006.md) |  IT00000412 This article examines the white nationalist group Suavelos’ use of Facebook to draw visitors to its website without overtly revealing their racist ideology:

Suavelos uses Facebook and other platforms to amplify its message. In order to bypass the platforms’ community standards and keep their public pages active, Facebook pages such as “I support the police” are a good vehicle to spread a specific agenda without claiming to be racist. In looking back at this Facebook page, we followed Facebook’s algorithm for related pages and found suggested Facebook pages

[...]

This amplification strategy on Facebook is successful, as according to SimilarWeb figures, it attracts around 111,000 visits every month on the Suavelos.eu website.

[...]

Revenue through online advertisements can be achieved by different platforms through targeted advertisements, like Google Adsense or Doubleclick, or related and similar sponsored content, such as Taboola. Accordingly, Suavelos.eu uses both of these websites to display advertisements and consequently receives funding from such advertisements.

Once visitors are on the website supporting its advertisement revenue, Suavelos’ goal is to then turn these visitors into regular members of Suavelos network through donations or fees, or have them continue to support Suavelos.


Suevelos created a variety of pages on Facebook which presented as centring on prosocial causes. Facebook’s algorithm helped direct users to these pages (T0092: Build Network, T0151.001: Social Media Platform, T0153.006: Content Recommendation Algorithm, T0151.003: Online Community Page, T0143.208: Social Cause Persona).

Suevelos used these pages to generate traffic for their WordPress site (T0122: Direct Users to Alternative Platforms, T0152.003: Website Hosting Platform, T0152.004: Website), which used accounts on a variety of online advertising platforms to host adverts (T0146: Account, T0153.005: Online Advertising Platform). | +| [T0092 Build Network](../../generated_pages/techniques/T0092.md) |  IT00000410 This article examines the white nationalist group Suavelos’ use of Facebook to draw visitors to its website without overtly revealing their racist ideology:

Suavelos uses Facebook and other platforms to amplify its message. In order to bypass the platforms’ community standards and keep their public pages active, Facebook pages such as “I support the police” are a good vehicle to spread a specific agenda without claiming to be racist. In looking back at this Facebook page, we followed Facebook’s algorithm for related pages and found suggested Facebook pages

[...]

This amplification strategy on Facebook is successful, as according to SimilarWeb figures, it attracts around 111,000 visits every month on the Suavelos.eu website.

[...]

Revenue through online advertisements can be achieved by different platforms through targeted advertisements, like Google Adsense or Doubleclick, or related and similar sponsored content, such as Taboola. Accordingly, Suavelos.eu uses both of these websites to display advertisements and consequently receives funding from such advertisements.

Once visitors are on the website supporting its advertisement revenue, Suavelos’ goal is to then turn these visitors into regular members of Suavelos network through donations or fees, or have them continue to support Suavelos.


Suevelos created a variety of pages on Facebook which presented as centring on prosocial causes. Facebook’s algorithm helped direct users to these pages (T0092: Build Network, T0151.001: Social Media Platform, T0153.006: Content Recommendation Algorithm, T0151.003: Online Community Page, T0143.208: Social Cause Persona).

Suevelos used these pages to generate traffic for their WordPress site (T0122: Direct Users to Alternative Platforms, T0152.003: Website Hosting Platform, T0152.004: Website Asset), which used accounts on a variety of online advertising platforms to host adverts (T0146: Account Asset, T0153.005: Online Advertising Platform). | +| [T0122 Direct Users to Alternative Platforms](../../generated_pages/techniques/T0122.md) |  IT00000415 This article examines the white nationalist group Suavelos’ use of Facebook to draw visitors to its website without overtly revealing their racist ideology:

Suavelos uses Facebook and other platforms to amplify its message. In order to bypass the platforms’ community standards and keep their public pages active, Facebook pages such as “I support the police” are a good vehicle to spread a specific agenda without claiming to be racist. In looking back at this Facebook page, we followed Facebook’s algorithm for related pages and found suggested Facebook pages

[...]

This amplification strategy on Facebook is successful, as according to SimilarWeb figures, it attracts around 111,000 visits every month on the Suavelos.eu website.

[...]

Revenue through online advertisements can be achieved by different platforms through targeted advertisements, like Google Adsense or Doubleclick, or related and similar sponsored content, such as Taboola. Accordingly, Suavelos.eu uses both of these websites to display advertisements and consequently receives funding from such advertisements.

Once visitors are on the website supporting its advertisement revenue, Suavelos’ goal is to then turn these visitors into regular members of Suavelos network through donations or fees, or have them continue to support Suavelos.


Suevelos created a variety of pages on Facebook which presented as centring on prosocial causes. Facebook’s algorithm helped direct users to these pages (T0092: Build Network, T0151.001: Social Media Platform, T0153.006: Content Recommendation Algorithm, T0151.003: Online Community Page, T0143.208: Social Cause Persona).

Suevelos used these pages to generate traffic for their WordPress site (T0122: Direct Users to Alternative Platforms, T0152.003: Website Hosting Platform, T0152.004: Website Asset), which used accounts on a variety of online advertising platforms to host adverts (T0146: Account Asset, T0153.005: Online Advertising Platform). | +| [T0151.001 Social Media Platform](../../generated_pages/techniques/T0151.001.md) |  IT00000411 This article examines the white nationalist group Suavelos’ use of Facebook to draw visitors to its website without overtly revealing their racist ideology:

Suavelos uses Facebook and other platforms to amplify its message. In order to bypass the platforms’ community standards and keep their public pages active, Facebook pages such as “I support the police” are a good vehicle to spread a specific agenda without claiming to be racist. In looking back at this Facebook page, we followed Facebook’s algorithm for related pages and found suggested Facebook pages

[...]

This amplification strategy on Facebook is successful, as according to SimilarWeb figures, it attracts around 111,000 visits every month on the Suavelos.eu website.

[...]

Revenue through online advertisements can be achieved by different platforms through targeted advertisements, like Google Adsense or Doubleclick, or related and similar sponsored content, such as Taboola. Accordingly, Suavelos.eu uses both of these websites to display advertisements and consequently receives funding from such advertisements.

Once visitors are on the website supporting its advertisement revenue, Suavelos’ goal is to then turn these visitors into regular members of Suavelos network through donations or fees, or have them continue to support Suavelos.


Suevelos created a variety of pages on Facebook which presented as centring on prosocial causes. Facebook’s algorithm helped direct users to these pages (T0092: Build Network, T0151.001: Social Media Platform, T0153.006: Content Recommendation Algorithm, T0151.003: Online Community Page, T0143.208: Social Cause Persona).

Suevelos used these pages to generate traffic for their WordPress site (T0122: Direct Users to Alternative Platforms, T0152.003: Website Hosting Platform, T0152.004: Website Asset), which used accounts on a variety of online advertising platforms to host adverts (T0146: Account Asset, T0153.005: Online Advertising Platform). | +| [T0151.003 Online Community Page](../../generated_pages/techniques/T0151.003.md) |  IT00000413 This article examines the white nationalist group Suavelos’ use of Facebook to draw visitors to its website without overtly revealing their racist ideology:

Suavelos uses Facebook and other platforms to amplify its message. In order to bypass the platforms’ community standards and keep their public pages active, Facebook pages such as “I support the police” are a good vehicle to spread a specific agenda without claiming to be racist. In looking back at this Facebook page, we followed Facebook’s algorithm for related pages and found suggested Facebook pages

[...]

This amplification strategy on Facebook is successful, as according to SimilarWeb figures, it attracts around 111,000 visits every month on the Suavelos.eu website.

[...]

Revenue through online advertisements can be achieved by different platforms through targeted advertisements, like Google Adsense or Doubleclick, or related and similar sponsored content, such as Taboola. Accordingly, Suavelos.eu uses both of these websites to display advertisements and consequently receives funding from such advertisements.

Once visitors are on the website supporting its advertisement revenue, Suavelos’ goal is to then turn these visitors into regular members of Suavelos network through donations or fees, or have them continue to support Suavelos.


Suevelos created a variety of pages on Facebook which presented as centring on prosocial causes. Facebook’s algorithm helped direct users to these pages (T0092: Build Network, T0151.001: Social Media Platform, T0153.006: Content Recommendation Algorithm, T0151.003: Online Community Page, T0143.208: Social Cause Persona).

Suevelos used these pages to generate traffic for their WordPress site (T0122: Direct Users to Alternative Platforms, T0152.003: Website Hosting Platform, T0152.004: Website Asset), which used accounts on a variety of online advertising platforms to host adverts (T0146: Account Asset, T0153.005: Online Advertising Platform). | +| [T0152.003 Website Hosting Platform](../../generated_pages/techniques/T0152.003.md) |  IT00000416 This article examines the white nationalist group Suavelos’ use of Facebook to draw visitors to its website without overtly revealing their racist ideology:

Suavelos uses Facebook and other platforms to amplify its message. In order to bypass the platforms’ community standards and keep their public pages active, Facebook pages such as “I support the police” are a good vehicle to spread a specific agenda without claiming to be racist. In looking back at this Facebook page, we followed Facebook’s algorithm for related pages and found suggested Facebook pages

[...]

This amplification strategy on Facebook is successful, as according to SimilarWeb figures, it attracts around 111,000 visits every month on the Suavelos.eu website.

[...]

Revenue through online advertisements can be achieved by different platforms through targeted advertisements, like Google Adsense or Doubleclick, or related and similar sponsored content, such as Taboola. Accordingly, Suavelos.eu uses both of these websites to display advertisements and consequently receives funding from such advertisements.

Once visitors are on the website supporting its advertisement revenue, Suavelos’ goal is to then turn these visitors into regular members of Suavelos network through donations or fees, or have them continue to support Suavelos.


Suevelos created a variety of pages on Facebook which presented as centring on prosocial causes. Facebook’s algorithm helped direct users to these pages (T0092: Build Network, T0151.001: Social Media Platform, T0153.006: Content Recommendation Algorithm, T0151.003: Online Community Page, T0143.208: Social Cause Persona).

Suevelos used these pages to generate traffic for their WordPress site (T0122: Direct Users to Alternative Platforms, T0152.003: Website Hosting Platform, T0152.004: Website Asset), which used accounts on a variety of online advertising platforms to host adverts (T0146: Account Asset, T0153.005: Online Advertising Platform). | +| [T0152.004 Website Asset](../../generated_pages/techniques/T0152.004.md) |  IT00000417 This article examines the white nationalist group Suavelos’ use of Facebook to draw visitors to its website without overtly revealing their racist ideology:

Suavelos uses Facebook and other platforms to amplify its message. In order to bypass the platforms’ community standards and keep their public pages active, Facebook pages such as “I support the police” are a good vehicle to spread a specific agenda without claiming to be racist. In looking back at this Facebook page, we followed Facebook’s algorithm for related pages and found suggested Facebook pages

[...]

This amplification strategy on Facebook is successful, as according to SimilarWeb figures, it attracts around 111,000 visits every month on the Suavelos.eu website.

[...]

Revenue through online advertisements can be achieved by different platforms through targeted advertisements, like Google Adsense or Doubleclick, or related and similar sponsored content, such as Taboola. Accordingly, Suavelos.eu uses both of these websites to display advertisements and consequently receives funding from such advertisements.

Once visitors are on the website supporting its advertisement revenue, Suavelos’ goal is to then turn these visitors into regular members of Suavelos network through donations or fees, or have them continue to support Suavelos.


Suevelos created a variety of pages on Facebook which presented as centring on prosocial causes. Facebook’s algorithm helped direct users to these pages (T0092: Build Network, T0151.001: Social Media Platform, T0153.006: Content Recommendation Algorithm, T0151.003: Online Community Page, T0143.208: Social Cause Persona).

Suevelos used these pages to generate traffic for their WordPress site (T0122: Direct Users to Alternative Platforms, T0152.003: Website Hosting Platform, T0152.004: Website Asset), which used accounts on a variety of online advertising platforms to host adverts (T0146: Account Asset, T0153.005: Online Advertising Platform). | +| [T0153.005 Online Advertising Platform](../../generated_pages/techniques/T0153.005.md) |  IT00000418 This article examines the white nationalist group Suavelos’ use of Facebook to draw visitors to its website without overtly revealing their racist ideology:

Suavelos uses Facebook and other platforms to amplify its message. In order to bypass the platforms’ community standards and keep their public pages active, Facebook pages such as “I support the police” are a good vehicle to spread a specific agenda without claiming to be racist. In looking back at this Facebook page, we followed Facebook’s algorithm for related pages and found suggested Facebook pages

[...]

This amplification strategy on Facebook is successful, as according to SimilarWeb figures, it attracts around 111,000 visits every month on the Suavelos.eu website.

[...]

Revenue through online advertisements can be achieved by different platforms through targeted advertisements, like Google Adsense or Doubleclick, or related and similar sponsored content, such as Taboola. Accordingly, Suavelos.eu uses both of these websites to display advertisements and consequently receives funding from such advertisements.

Once visitors are on the website supporting its advertisement revenue, Suavelos’ goal is to then turn these visitors into regular members of Suavelos network through donations or fees, or have them continue to support Suavelos.


Suevelos created a variety of pages on Facebook which presented as centring on prosocial causes. Facebook’s algorithm helped direct users to these pages (T0092: Build Network, T0151.001: Social Media Platform, T0153.006: Content Recommendation Algorithm, T0151.003: Online Community Page, T0143.208: Social Cause Persona).

Suevelos used these pages to generate traffic for their WordPress site (T0122: Direct Users to Alternative Platforms, T0152.003: Website Hosting Platform, T0152.004: Website Asset), which used accounts on a variety of online advertising platforms to host adverts (T0146: Account Asset, T0153.005: Online Advertising Platform). | +| [T0153.006 Content Recommendation Algorithm](../../generated_pages/techniques/T0153.006.md) |  IT00000412 This article examines the white nationalist group Suavelos’ use of Facebook to draw visitors to its website without overtly revealing their racist ideology:

Suavelos uses Facebook and other platforms to amplify its message. In order to bypass the platforms’ community standards and keep their public pages active, Facebook pages such as “I support the police” are a good vehicle to spread a specific agenda without claiming to be racist. In looking back at this Facebook page, we followed Facebook’s algorithm for related pages and found suggested Facebook pages

[...]

This amplification strategy on Facebook is successful, as according to SimilarWeb figures, it attracts around 111,000 visits every month on the Suavelos.eu website.

[...]

Revenue through online advertisements can be achieved by different platforms through targeted advertisements, like Google Adsense or Doubleclick, or related and similar sponsored content, such as Taboola. Accordingly, Suavelos.eu uses both of these websites to display advertisements and consequently receives funding from such advertisements.

Once visitors are on the website supporting its advertisement revenue, Suavelos’ goal is to then turn these visitors into regular members of Suavelos network through donations or fees, or have them continue to support Suavelos.


Suevelos created a variety of pages on Facebook which presented as centring on prosocial causes. Facebook’s algorithm helped direct users to these pages (T0092: Build Network, T0151.001: Social Media Platform, T0153.006: Content Recommendation Algorithm, T0151.003: Online Community Page, T0143.208: Social Cause Persona).

Suevelos used these pages to generate traffic for their WordPress site (T0122: Direct Users to Alternative Platforms, T0152.003: Website Hosting Platform, T0152.004: Website Asset), which used accounts on a variety of online advertising platforms to host adverts (T0146: Account Asset, T0153.005: Online Advertising Platform). | DO NOT EDIT ABOVE THIS LINE - PLEASE ADD NOTES BELOW \ No newline at end of file diff --git a/generated_pages/incidents/I00109.md b/generated_pages/incidents/I00109.md index f808b1f..c99825e 100644 --- a/generated_pages/incidents/I00109.md +++ b/generated_pages/incidents/I00109.md @@ -15,27 +15,28 @@ | Reference | Pub Date | Authors | Org | Archive | | --------- | -------- | ------- | --- | ------- | +| [https://www.disinfo.eu/wp-content/uploads/2019/09/20190911_Disinformation_HateSpeechFunding.pdf](https://www.disinfo.eu/wp-content/uploads/2019/09/20190911_Disinformation_HateSpeechFunding.pdf) | 2019/09/11 | - | EU Disinfo Lab | [https://web.archive.org/web/20221214105547/https://www.disinfo.eu/wp-content/uploads/2019/09/20190911_Disinformation_HateSpeechFunding.pdf](https://web.archive.org/web/20221214105547/https://www.disinfo.eu/wp-content/uploads/2019/09/20190911_Disinformation_HateSpeechFunding.pdf) | | Technique | Description given for this incident | | --------- | ------------------------- | -| [T0061 Sell Merchandise](../../generated_pages/techniques/T0061.md) |  IT00000430 This report examines the white nationalist group Suavelos’ use of Facebook to draw visitors to its website without overtly revealing their racist ideology. This section of the report looks at technical indicators associated with the Suavelos website, and attributions which can be made as a consequence:

[The Google AdSense tag set up on Suavelos.eu was also found on the following domains, indicating that they are controlled by the same actor;] Alabastro.eu: an online shop to buy “white nationalists” t-shirts [and] ARPAC.eu: the website of a registered non-profit organisation advocating to lift regulation on gun control in France.

Other domains attributed to Suavelos (T0149.001: Domain) reveal a website set up to sell merchandise (T0152.004: Website, T0148.004: Payment Processing Capability, T0061: Sell Merchandise), and a website hosting a registered French non-profit (T0152.004: Website, T0097.207: NGO Persona).

To learn more about the suavelos.eu domain, we collected the following data: The domain is hosted on OVH; The owner’s identity is protected; The IP Address of the server is 94.23.253.173, which is shared with 20 other domains.

The relative low number of websites hosted on this IP address could indicate that they all belong to the same people, and are hosted on the same private server.<.i>

Suavelos registered a domain using the web hosting provider OVH (T0149.001: Domain, T0152.003: Website Hosting Platform, T0150.006: Purchased). The site’s IP address reveals a server hosting other domains potentially owned by the actors (T0149.005: Server, T0149.006: IP Address). | -| [T0097.207 NGO Persona](../../generated_pages/techniques/T0097.207.md) |  IT00000431 This report examines the white nationalist group Suavelos’ use of Facebook to draw visitors to its website without overtly revealing their racist ideology. This section of the report looks at technical indicators associated with the Suavelos website, and attributions which can be made as a consequence:

[The Google AdSense tag set up on Suavelos.eu was also found on the following domains, indicating that they are controlled by the same actor;] Alabastro.eu: an online shop to buy “white nationalists” t-shirts [and] ARPAC.eu: the website of a registered non-profit organisation advocating to lift regulation on gun control in France.

Other domains attributed to Suavelos (T0149.001: Domain) reveal a website set up to sell merchandise (T0152.004: Website, T0148.004: Payment Processing Capability, T0061: Sell Merchandise), and a website hosting a registered French non-profit (T0152.004: Website, T0097.207: NGO Persona).

To learn more about the suavelos.eu domain, we collected the following data: The domain is hosted on OVH; The owner’s identity is protected; The IP Address of the server is 94.23.253.173, which is shared with 20 other domains.

The relative low number of websites hosted on this IP address could indicate that they all belong to the same people, and are hosted on the same private server.<.i>

Suavelos registered a domain using the web hosting provider OVH (T0149.001: Domain, T0152.003: Website Hosting Platform, T0150.006: Purchased). The site’s IP address reveals a server hosting other domains potentially owned by the actors (T0149.005: Server, T0149.006: IP Address). | -| [T0146 Account](../../generated_pages/techniques/T0146.md) |  IT00000424 This report examines the white nationalist group Suavelos’ use of Facebook to draw visitors to its website without overtly revealing their racist ideology. This section of the report looks at the Suavelos website, and the content it links out to.

In going back to Suavelos’ main page, we also found: A link to a page on a web shop: alabastro.eu; A link to a page to donate money to the founders through Tipee and to the website through PayPal; [and] a link to a private forum that gathers 3.000 members: oppidum.suavelos.eu;

Suavelos linked out to an online store which it controlled (T0152.004: Website, T0148.004: Payment Processing Capability), and to accounts on payment processing platforms PayPal and Tipee (T0146: Account, T0148.003: Payment Processing Platform).

The Suavelos website also hosted a private forum (T0151.009: Legacy Online Forum Platform, T0155: Gated Asset), and linked out to a variety of assets it controlled on other online platforms: accounts on Twitter (T0146: Account, T0151.008: Microblogging Platform), YouTube (T0146: Account, T0152.006: Video Platform), Instagram and VKontakte (T0146: Account, T0151.001: Social Media Platform). | -| [T0148.003 Payment Processing Platform](../../generated_pages/techniques/T0148.003.md) |  IT00000421 This report examines the white nationalist group Suavelos’ use of Facebook to draw visitors to its website without overtly revealing their racist ideology. This section of the report looks at the Suavelos website, and the content it links out to.

In going back to Suavelos’ main page, we also found: A link to a page on a web shop: alabastro.eu; A link to a page to donate money to the founders through Tipee and to the website through PayPal; [and] a link to a private forum that gathers 3.000 members: oppidum.suavelos.eu;

Suavelos linked out to an online store which it controlled (T0152.004: Website, T0148.004: Payment Processing Capability), and to accounts on payment processing platforms PayPal and Tipee (T0146: Account, T0148.003: Payment Processing Platform).

The Suavelos website also hosted a private forum (T0151.009: Legacy Online Forum Platform, T0155: Gated Asset), and linked out to a variety of assets it controlled on other online platforms: accounts on Twitter (T0146: Account, T0151.008: Microblogging Platform), YouTube (T0146: Account, T0152.006: Video Platform), Instagram and VKontakte (T0146: Account, T0151.001: Social Media Platform). | -| [T0148.004 Payment Processing Capability](../../generated_pages/techniques/T0148.004.md) |  IT00000420 This report examines the white nationalist group Suavelos’ use of Facebook to draw visitors to its website without overtly revealing their racist ideology. This section of the report looks at the Suavelos website, and the content it links out to.

In going back to Suavelos’ main page, we also found: A link to a page on a web shop: alabastro.eu; A link to a page to donate money to the founders through Tipee and to the website through PayPal; [and] a link to a private forum that gathers 3.000 members: oppidum.suavelos.eu;

Suavelos linked out to an online store which it controlled (T0152.004: Website, T0148.004: Payment Processing Capability), and to accounts on payment processing platforms PayPal and Tipee (T0146: Account, T0148.003: Payment Processing Platform).

The Suavelos website also hosted a private forum (T0151.009: Legacy Online Forum Platform, T0155: Gated Asset), and linked out to a variety of assets it controlled on other online platforms: accounts on Twitter (T0146: Account, T0151.008: Microblogging Platform), YouTube (T0146: Account, T0152.006: Video Platform), Instagram and VKontakte (T0146: Account, T0151.001: Social Media Platform). | -| [T0148.004 Payment Processing Capability](../../generated_pages/techniques/T0148.004.md) |  IT00000429 This report examines the white nationalist group Suavelos’ use of Facebook to draw visitors to its website without overtly revealing their racist ideology. This section of the report looks at technical indicators associated with the Suavelos website, and attributions which can be made as a consequence:

[The Google AdSense tag set up on Suavelos.eu was also found on the following domains, indicating that they are controlled by the same actor;] Alabastro.eu: an online shop to buy “white nationalists” t-shirts [and] ARPAC.eu: the website of a registered non-profit organisation advocating to lift regulation on gun control in France.

Other domains attributed to Suavelos (T0149.001: Domain) reveal a website set up to sell merchandise (T0152.004: Website, T0148.004: Payment Processing Capability, T0061: Sell Merchandise), and a website hosting a registered French non-profit (T0152.004: Website, T0097.207: NGO Persona).

To learn more about the suavelos.eu domain, we collected the following data: The domain is hosted on OVH; The owner’s identity is protected; The IP Address of the server is 94.23.253.173, which is shared with 20 other domains.

The relative low number of websites hosted on this IP address could indicate that they all belong to the same people, and are hosted on the same private server.<.i>

Suavelos registered a domain using the web hosting provider OVH (T0149.001: Domain, T0152.003: Website Hosting Platform, T0150.006: Purchased). The site’s IP address reveals a server hosting other domains potentially owned by the actors (T0149.005: Server, T0149.006: IP Address). | -| [T0149.001 Domain](../../generated_pages/techniques/T0149.001.md) |  IT00000428 This report examines the white nationalist group Suavelos’ use of Facebook to draw visitors to its website without overtly revealing their racist ideology. This section of the report looks at technical indicators associated with the Suavelos website, and attributions which can be made as a consequence:

[The Google AdSense tag set up on Suavelos.eu was also found on the following domains, indicating that they are controlled by the same actor;] Alabastro.eu: an online shop to buy “white nationalists” t-shirts [and] ARPAC.eu: the website of a registered non-profit organisation advocating to lift regulation on gun control in France.

Other domains attributed to Suavelos (T0149.001: Domain) reveal a website set up to sell merchandise (T0152.004: Website, T0148.004: Payment Processing Capability, T0061: Sell Merchandise), and a website hosting a registered French non-profit (T0152.004: Website, T0097.207: NGO Persona).

To learn more about the suavelos.eu domain, we collected the following data: The domain is hosted on OVH; The owner’s identity is protected; The IP Address of the server is 94.23.253.173, which is shared with 20 other domains.

The relative low number of websites hosted on this IP address could indicate that they all belong to the same people, and are hosted on the same private server.<.i>

Suavelos registered a domain using the web hosting provider OVH (T0149.001: Domain, T0152.003: Website Hosting Platform, T0150.006: Purchased). The site’s IP address reveals a server hosting other domains potentially owned by the actors (T0149.005: Server, T0149.006: IP Address). | -| [T0149.005 Server](../../generated_pages/techniques/T0149.005.md) |  IT00000433 This report examines the white nationalist group Suavelos’ use of Facebook to draw visitors to its website without overtly revealing their racist ideology. This section of the report looks at technical indicators associated with the Suavelos website, and attributions which can be made as a consequence:

[The Google AdSense tag set up on Suavelos.eu was also found on the following domains, indicating that they are controlled by the same actor;] Alabastro.eu: an online shop to buy “white nationalists” t-shirts [and] ARPAC.eu: the website of a registered non-profit organisation advocating to lift regulation on gun control in France.

Other domains attributed to Suavelos (T0149.001: Domain) reveal a website set up to sell merchandise (T0152.004: Website, T0148.004: Payment Processing Capability, T0061: Sell Merchandise), and a website hosting a registered French non-profit (T0152.004: Website, T0097.207: NGO Persona).

To learn more about the suavelos.eu domain, we collected the following data: The domain is hosted on OVH; The owner’s identity is protected; The IP Address of the server is 94.23.253.173, which is shared with 20 other domains.

The relative low number of websites hosted on this IP address could indicate that they all belong to the same people, and are hosted on the same private server.<.i>

Suavelos registered a domain using the web hosting provider OVH (T0149.001: Domain, T0152.003: Website Hosting Platform, T0150.006: Purchased). The site’s IP address reveals a server hosting other domains potentially owned by the actors (T0149.005: Server, T0149.006: IP Address). | -| [T0149.006 IP Address](../../generated_pages/techniques/T0149.006.md) |  IT00000434 This report examines the white nationalist group Suavelos’ use of Facebook to draw visitors to its website without overtly revealing their racist ideology. This section of the report looks at technical indicators associated with the Suavelos website, and attributions which can be made as a consequence:

[The Google AdSense tag set up on Suavelos.eu was also found on the following domains, indicating that they are controlled by the same actor;] Alabastro.eu: an online shop to buy “white nationalists” t-shirts [and] ARPAC.eu: the website of a registered non-profit organisation advocating to lift regulation on gun control in France.

Other domains attributed to Suavelos (T0149.001: Domain) reveal a website set up to sell merchandise (T0152.004: Website, T0148.004: Payment Processing Capability, T0061: Sell Merchandise), and a website hosting a registered French non-profit (T0152.004: Website, T0097.207: NGO Persona).

To learn more about the suavelos.eu domain, we collected the following data: The domain is hosted on OVH; The owner’s identity is protected; The IP Address of the server is 94.23.253.173, which is shared with 20 other domains.

The relative low number of websites hosted on this IP address could indicate that they all belong to the same people, and are hosted on the same private server.<.i>

Suavelos registered a domain using the web hosting provider OVH (T0149.001: Domain, T0152.003: Website Hosting Platform, T0150.006: Purchased). The site’s IP address reveals a server hosting other domains potentially owned by the actors (T0149.005: Server, T0149.006: IP Address). | -| [T0150.006 Purchased](../../generated_pages/techniques/T0150.006.md) |  IT00000432 This report examines the white nationalist group Suavelos’ use of Facebook to draw visitors to its website without overtly revealing their racist ideology. This section of the report looks at technical indicators associated with the Suavelos website, and attributions which can be made as a consequence:

[The Google AdSense tag set up on Suavelos.eu was also found on the following domains, indicating that they are controlled by the same actor;] Alabastro.eu: an online shop to buy “white nationalists” t-shirts [and] ARPAC.eu: the website of a registered non-profit organisation advocating to lift regulation on gun control in France.

Other domains attributed to Suavelos (T0149.001: Domain) reveal a website set up to sell merchandise (T0152.004: Website, T0148.004: Payment Processing Capability, T0061: Sell Merchandise), and a website hosting a registered French non-profit (T0152.004: Website, T0097.207: NGO Persona).

To learn more about the suavelos.eu domain, we collected the following data: The domain is hosted on OVH; The owner’s identity is protected; The IP Address of the server is 94.23.253.173, which is shared with 20 other domains.

The relative low number of websites hosted on this IP address could indicate that they all belong to the same people, and are hosted on the same private server.<.i>

Suavelos registered a domain using the web hosting provider OVH (T0149.001: Domain, T0152.003: Website Hosting Platform, T0150.006: Purchased). The site’s IP address reveals a server hosting other domains potentially owned by the actors (T0149.005: Server, T0149.006: IP Address). | -| [T0151.001 Social Media Platform](../../generated_pages/techniques/T0151.001.md) |  IT00000427 This report examines the white nationalist group Suavelos’ use of Facebook to draw visitors to its website without overtly revealing their racist ideology. This section of the report looks at the Suavelos website, and the content it links out to.

In going back to Suavelos’ main page, we also found: A link to a page on a web shop: alabastro.eu; A link to a page to donate money to the founders through Tipee and to the website through PayPal; [and] a link to a private forum that gathers 3.000 members: oppidum.suavelos.eu;

Suavelos linked out to an online store which it controlled (T0152.004: Website, T0148.004: Payment Processing Capability), and to accounts on payment processing platforms PayPal and Tipee (T0146: Account, T0148.003: Payment Processing Platform).

The Suavelos website also hosted a private forum (T0151.009: Legacy Online Forum Platform, T0155: Gated Asset), and linked out to a variety of assets it controlled on other online platforms: accounts on Twitter (T0146: Account, T0151.008: Microblogging Platform), YouTube (T0146: Account, T0152.006: Video Platform), Instagram and VKontakte (T0146: Account, T0151.001: Social Media Platform). | -| [T0151.008 Microblogging Platform](../../generated_pages/techniques/T0151.008.md) |  IT00000425 This report examines the white nationalist group Suavelos’ use of Facebook to draw visitors to its website without overtly revealing their racist ideology. This section of the report looks at the Suavelos website, and the content it links out to.

In going back to Suavelos’ main page, we also found: A link to a page on a web shop: alabastro.eu; A link to a page to donate money to the founders through Tipee and to the website through PayPal; [and] a link to a private forum that gathers 3.000 members: oppidum.suavelos.eu;

Suavelos linked out to an online store which it controlled (T0152.004: Website, T0148.004: Payment Processing Capability), and to accounts on payment processing platforms PayPal and Tipee (T0146: Account, T0148.003: Payment Processing Platform).

The Suavelos website also hosted a private forum (T0151.009: Legacy Online Forum Platform, T0155: Gated Asset), and linked out to a variety of assets it controlled on other online platforms: accounts on Twitter (T0146: Account, T0151.008: Microblogging Platform), YouTube (T0146: Account, T0152.006: Video Platform), Instagram and VKontakte (T0146: Account, T0151.001: Social Media Platform). | -| [T0151.009 Legacy Online Forum Platform](../../generated_pages/techniques/T0151.009.md) |  IT00000422 This report examines the white nationalist group Suavelos’ use of Facebook to draw visitors to its website without overtly revealing their racist ideology. This section of the report looks at the Suavelos website, and the content it links out to.

In going back to Suavelos’ main page, we also found: A link to a page on a web shop: alabastro.eu; A link to a page to donate money to the founders through Tipee and to the website through PayPal; [and] a link to a private forum that gathers 3.000 members: oppidum.suavelos.eu;

Suavelos linked out to an online store which it controlled (T0152.004: Website, T0148.004: Payment Processing Capability), and to accounts on payment processing platforms PayPal and Tipee (T0146: Account, T0148.003: Payment Processing Platform).

The Suavelos website also hosted a private forum (T0151.009: Legacy Online Forum Platform, T0155: Gated Asset), and linked out to a variety of assets it controlled on other online platforms: accounts on Twitter (T0146: Account, T0151.008: Microblogging Platform), YouTube (T0146: Account, T0152.006: Video Platform), Instagram and VKontakte (T0146: Account, T0151.001: Social Media Platform). | -| [T0152.004 Website](../../generated_pages/techniques/T0152.004.md) |  IT00000419 This report examines the white nationalist group Suavelos’ use of Facebook to draw visitors to its website without overtly revealing their racist ideology. This section of the report looks at the Suavelos website, and the content it links out to.

In going back to Suavelos’ main page, we also found: A link to a page on a web shop: alabastro.eu; A link to a page to donate money to the founders through Tipee and to the website through PayPal; [and] a link to a private forum that gathers 3.000 members: oppidum.suavelos.eu;

Suavelos linked out to an online store which it controlled (T0152.004: Website, T0148.004: Payment Processing Capability), and to accounts on payment processing platforms PayPal and Tipee (T0146: Account, T0148.003: Payment Processing Platform).

The Suavelos website also hosted a private forum (T0151.009: Legacy Online Forum Platform, T0155: Gated Asset), and linked out to a variety of assets it controlled on other online platforms: accounts on Twitter (T0146: Account, T0151.008: Microblogging Platform), YouTube (T0146: Account, T0152.006: Video Platform), Instagram and VKontakte (T0146: Account, T0151.001: Social Media Platform). | -| [T0152.006 Video Platform](../../generated_pages/techniques/T0152.006.md) |  IT00000426 This report examines the white nationalist group Suavelos’ use of Facebook to draw visitors to its website without overtly revealing their racist ideology. This section of the report looks at the Suavelos website, and the content it links out to.

In going back to Suavelos’ main page, we also found: A link to a page on a web shop: alabastro.eu; A link to a page to donate money to the founders through Tipee and to the website through PayPal; [and] a link to a private forum that gathers 3.000 members: oppidum.suavelos.eu;

Suavelos linked out to an online store which it controlled (T0152.004: Website, T0148.004: Payment Processing Capability), and to accounts on payment processing platforms PayPal and Tipee (T0146: Account, T0148.003: Payment Processing Platform).

The Suavelos website also hosted a private forum (T0151.009: Legacy Online Forum Platform, T0155: Gated Asset), and linked out to a variety of assets it controlled on other online platforms: accounts on Twitter (T0146: Account, T0151.008: Microblogging Platform), YouTube (T0146: Account, T0152.006: Video Platform), Instagram and VKontakte (T0146: Account, T0151.001: Social Media Platform). | -| [T0155 Gated Asset](../../generated_pages/techniques/T0155.md) |  IT00000423 This report examines the white nationalist group Suavelos’ use of Facebook to draw visitors to its website without overtly revealing their racist ideology. This section of the report looks at the Suavelos website, and the content it links out to.

In going back to Suavelos’ main page, we also found: A link to a page on a web shop: alabastro.eu; A link to a page to donate money to the founders through Tipee and to the website through PayPal; [and] a link to a private forum that gathers 3.000 members: oppidum.suavelos.eu;

Suavelos linked out to an online store which it controlled (T0152.004: Website, T0148.004: Payment Processing Capability), and to accounts on payment processing platforms PayPal and Tipee (T0146: Account, T0148.003: Payment Processing Platform).

The Suavelos website also hosted a private forum (T0151.009: Legacy Online Forum Platform, T0155: Gated Asset), and linked out to a variety of assets it controlled on other online platforms: accounts on Twitter (T0146: Account, T0151.008: Microblogging Platform), YouTube (T0146: Account, T0152.006: Video Platform), Instagram and VKontakte (T0146: Account, T0151.001: Social Media Platform). | +| [T0061 Sell Merchandise](../../generated_pages/techniques/T0061.md) |  IT00000430 This report examines the white nationalist group Suavelos’ use of Facebook to draw visitors to its website without overtly revealing their racist ideology. This section of the report looks at technical indicators associated with the Suavelos website, and attributions which can be made as a consequence:

[The Google AdSense tag set up on Suavelos.eu was also found on the following domains, indicating that they are controlled by the same actor;] Alabastro.eu: an online shop to buy “white nationalists” t-shirts [and] ARPAC.eu: the website of a registered non-profit organisation advocating to lift regulation on gun control in France.

Other domains attributed to Suavelos (T0149.001: Domain Asset) reveal a website set up to sell merchandise (T0152.004: Website Asset, T0148.004: Payment Processing Capability, T0061: Sell Merchandise), and a website hosting a registered French non-profit (T0152.004: Website Asset, T0097.207: NGO Persona).

To learn more about the suavelos.eu domain, we collected the following data: The domain is hosted on OVH; The owner’s identity is protected; The IP Address of the server is 94.23.253.173, which is shared with 20 other domains.

The relative low number of websites hosted on this IP address could indicate that they all belong to the same people, and are hosted on the same private server.


Suavelos registered a domain using the web hosting provider OVH (T0149.001: Domain Asset, T0152.003: Website Hosting Platform, T0150.006: Purchased). The site’s IP address reveals a server hosting other domains potentially owned by the actors (T0149.005: Server Asset, T0149.006: IP Address Asset). | +| [T0097.207 NGO Persona](../../generated_pages/techniques/T0097.207.md) |  IT00000431 This report examines the white nationalist group Suavelos’ use of Facebook to draw visitors to its website without overtly revealing their racist ideology. This section of the report looks at technical indicators associated with the Suavelos website, and attributions which can be made as a consequence:

[The Google AdSense tag set up on Suavelos.eu was also found on the following domains, indicating that they are controlled by the same actor;] Alabastro.eu: an online shop to buy “white nationalists” t-shirts [and] ARPAC.eu: the website of a registered non-profit organisation advocating to lift regulation on gun control in France.

Other domains attributed to Suavelos (T0149.001: Domain Asset) reveal a website set up to sell merchandise (T0152.004: Website Asset, T0148.004: Payment Processing Capability, T0061: Sell Merchandise), and a website hosting a registered French non-profit (T0152.004: Website Asset, T0097.207: NGO Persona).

To learn more about the suavelos.eu domain, we collected the following data: The domain is hosted on OVH; The owner’s identity is protected; The IP Address of the server is 94.23.253.173, which is shared with 20 other domains.

The relative low number of websites hosted on this IP address could indicate that they all belong to the same people, and are hosted on the same private server.


Suavelos registered a domain using the web hosting provider OVH (T0149.001: Domain Asset, T0152.003: Website Hosting Platform, T0150.006: Purchased). The site’s IP address reveals a server hosting other domains potentially owned by the actors (T0149.005: Server Asset, T0149.006: IP Address Asset). | +| [T0146 Account Asset](../../generated_pages/techniques/T0146.md) |  IT00000424 This report examines the white nationalist group Suavelos’ use of Facebook to draw visitors to its website without overtly revealing their racist ideology. This section of the report looks at the Suavelos website, and the content it links out to.

In going back to Suavelos’ main page, we also found: A link to a page on a web shop: alabastro.eu; A link to a page to donate money to the founders through Tipee and to the website through PayPal; [and] a link to a private forum that gathers 3.000 members: oppidum.suavelos.eu;

Suavelos linked out to an online store which it controlled (T0152.004: Website Asset, T0148.004: Payment Processing Capability), and to accounts on payment processing platforms PayPal and Tipee (T0146: Account Asset, T0148.003: Payment Processing Platform).

The Suavelos website also hosted a private forum (T0151.009: Legacy Online Forum Platform, T0155: Gated Asset), and linked out to a variety of assets it controlled on other online platforms: accounts on Twitter (T0146: Account Asset, T0151.008: Microblogging Platform), YouTube (T0146: Account Asset, T0152.006: Video Platform), Instagram and VKontakte (T0146: Account Asset, T0151.001: Social Media Platform). | +| [T0148.003 Payment Processing Platform](../../generated_pages/techniques/T0148.003.md) |  IT00000421 This report examines the white nationalist group Suavelos’ use of Facebook to draw visitors to its website without overtly revealing their racist ideology. This section of the report looks at the Suavelos website, and the content it links out to.

In going back to Suavelos’ main page, we also found: A link to a page on a web shop: alabastro.eu; A link to a page to donate money to the founders through Tipee and to the website through PayPal; [and] a link to a private forum that gathers 3.000 members: oppidum.suavelos.eu;

Suavelos linked out to an online store which it controlled (T0152.004: Website Asset, T0148.004: Payment Processing Capability), and to accounts on payment processing platforms PayPal and Tipee (T0146: Account Asset, T0148.003: Payment Processing Platform).

The Suavelos website also hosted a private forum (T0151.009: Legacy Online Forum Platform, T0155: Gated Asset), and linked out to a variety of assets it controlled on other online platforms: accounts on Twitter (T0146: Account Asset, T0151.008: Microblogging Platform), YouTube (T0146: Account Asset, T0152.006: Video Platform), Instagram and VKontakte (T0146: Account Asset, T0151.001: Social Media Platform). | +| [T0148.004 Payment Processing Capability](../../generated_pages/techniques/T0148.004.md) |  IT00000420 This report examines the white nationalist group Suavelos’ use of Facebook to draw visitors to its website without overtly revealing their racist ideology. This section of the report looks at the Suavelos website, and the content it links out to.

In going back to Suavelos’ main page, we also found: A link to a page on a web shop: alabastro.eu; A link to a page to donate money to the founders through Tipee and to the website through PayPal; [and] a link to a private forum that gathers 3.000 members: oppidum.suavelos.eu;

Suavelos linked out to an online store which it controlled (T0152.004: Website Asset, T0148.004: Payment Processing Capability), and to accounts on payment processing platforms PayPal and Tipee (T0146: Account Asset, T0148.003: Payment Processing Platform).

The Suavelos website also hosted a private forum (T0151.009: Legacy Online Forum Platform, T0155: Gated Asset), and linked out to a variety of assets it controlled on other online platforms: accounts on Twitter (T0146: Account Asset, T0151.008: Microblogging Platform), YouTube (T0146: Account Asset, T0152.006: Video Platform), Instagram and VKontakte (T0146: Account Asset, T0151.001: Social Media Platform). | +| [T0148.004 Payment Processing Capability](../../generated_pages/techniques/T0148.004.md) |  IT00000429 This report examines the white nationalist group Suavelos’ use of Facebook to draw visitors to its website without overtly revealing their racist ideology. This section of the report looks at technical indicators associated with the Suavelos website, and attributions which can be made as a consequence:

[The Google AdSense tag set up on Suavelos.eu was also found on the following domains, indicating that they are controlled by the same actor;] Alabastro.eu: an online shop to buy “white nationalists” t-shirts [and] ARPAC.eu: the website of a registered non-profit organisation advocating to lift regulation on gun control in France.

Other domains attributed to Suavelos (T0149.001: Domain Asset) reveal a website set up to sell merchandise (T0152.004: Website Asset, T0148.004: Payment Processing Capability, T0061: Sell Merchandise), and a website hosting a registered French non-profit (T0152.004: Website Asset, T0097.207: NGO Persona).

To learn more about the suavelos.eu domain, we collected the following data: The domain is hosted on OVH; The owner’s identity is protected; The IP Address of the server is 94.23.253.173, which is shared with 20 other domains.

The relative low number of websites hosted on this IP address could indicate that they all belong to the same people, and are hosted on the same private server.


Suavelos registered a domain using the web hosting provider OVH (T0149.001: Domain Asset, T0152.003: Website Hosting Platform, T0150.006: Purchased). The site’s IP address reveals a server hosting other domains potentially owned by the actors (T0149.005: Server Asset, T0149.006: IP Address Asset). | +| [T0149.001 Domain Asset](../../generated_pages/techniques/T0149.001.md) |  IT00000428 This report examines the white nationalist group Suavelos’ use of Facebook to draw visitors to its website without overtly revealing their racist ideology. This section of the report looks at technical indicators associated with the Suavelos website, and attributions which can be made as a consequence:

[The Google AdSense tag set up on Suavelos.eu was also found on the following domains, indicating that they are controlled by the same actor;] Alabastro.eu: an online shop to buy “white nationalists” t-shirts [and] ARPAC.eu: the website of a registered non-profit organisation advocating to lift regulation on gun control in France.

Other domains attributed to Suavelos (T0149.001: Domain Asset) reveal a website set up to sell merchandise (T0152.004: Website Asset, T0148.004: Payment Processing Capability, T0061: Sell Merchandise), and a website hosting a registered French non-profit (T0152.004: Website Asset, T0097.207: NGO Persona).

To learn more about the suavelos.eu domain, we collected the following data: The domain is hosted on OVH; The owner’s identity is protected; The IP Address of the server is 94.23.253.173, which is shared with 20 other domains.

The relative low number of websites hosted on this IP address could indicate that they all belong to the same people, and are hosted on the same private server.


Suavelos registered a domain using the web hosting provider OVH (T0149.001: Domain Asset, T0152.003: Website Hosting Platform, T0150.006: Purchased). The site’s IP address reveals a server hosting other domains potentially owned by the actors (T0149.005: Server Asset, T0149.006: IP Address Asset). | +| [T0149.005 Server Asset](../../generated_pages/techniques/T0149.005.md) |  IT00000433 This report examines the white nationalist group Suavelos’ use of Facebook to draw visitors to its website without overtly revealing their racist ideology. This section of the report looks at technical indicators associated with the Suavelos website, and attributions which can be made as a consequence:

[The Google AdSense tag set up on Suavelos.eu was also found on the following domains, indicating that they are controlled by the same actor;] Alabastro.eu: an online shop to buy “white nationalists” t-shirts [and] ARPAC.eu: the website of a registered non-profit organisation advocating to lift regulation on gun control in France.

Other domains attributed to Suavelos (T0149.001: Domain Asset) reveal a website set up to sell merchandise (T0152.004: Website Asset, T0148.004: Payment Processing Capability, T0061: Sell Merchandise), and a website hosting a registered French non-profit (T0152.004: Website Asset, T0097.207: NGO Persona).

To learn more about the suavelos.eu domain, we collected the following data: The domain is hosted on OVH; The owner’s identity is protected; The IP Address of the server is 94.23.253.173, which is shared with 20 other domains.

The relative low number of websites hosted on this IP address could indicate that they all belong to the same people, and are hosted on the same private server.


Suavelos registered a domain using the web hosting provider OVH (T0149.001: Domain Asset, T0152.003: Website Hosting Platform, T0150.006: Purchased). The site’s IP address reveals a server hosting other domains potentially owned by the actors (T0149.005: Server Asset, T0149.006: IP Address Asset). | +| [T0149.006 IP Address Asset](../../generated_pages/techniques/T0149.006.md) |  IT00000434 This report examines the white nationalist group Suavelos’ use of Facebook to draw visitors to its website without overtly revealing their racist ideology. This section of the report looks at technical indicators associated with the Suavelos website, and attributions which can be made as a consequence:

[The Google AdSense tag set up on Suavelos.eu was also found on the following domains, indicating that they are controlled by the same actor;] Alabastro.eu: an online shop to buy “white nationalists” t-shirts [and] ARPAC.eu: the website of a registered non-profit organisation advocating to lift regulation on gun control in France.

Other domains attributed to Suavelos (T0149.001: Domain Asset) reveal a website set up to sell merchandise (T0152.004: Website Asset, T0148.004: Payment Processing Capability, T0061: Sell Merchandise), and a website hosting a registered French non-profit (T0152.004: Website Asset, T0097.207: NGO Persona).

To learn more about the suavelos.eu domain, we collected the following data: The domain is hosted on OVH; The owner’s identity is protected; The IP Address of the server is 94.23.253.173, which is shared with 20 other domains.

The relative low number of websites hosted on this IP address could indicate that they all belong to the same people, and are hosted on the same private server.


Suavelos registered a domain using the web hosting provider OVH (T0149.001: Domain Asset, T0152.003: Website Hosting Platform, T0150.006: Purchased). The site’s IP address reveals a server hosting other domains potentially owned by the actors (T0149.005: Server Asset, T0149.006: IP Address Asset). | +| [T0150.006 Purchased Asset](../../generated_pages/techniques/T0150.006.md) |  IT00000432 This report examines the white nationalist group Suavelos’ use of Facebook to draw visitors to its website without overtly revealing their racist ideology. This section of the report looks at technical indicators associated with the Suavelos website, and attributions which can be made as a consequence:

[The Google AdSense tag set up on Suavelos.eu was also found on the following domains, indicating that they are controlled by the same actor;] Alabastro.eu: an online shop to buy “white nationalists” t-shirts [and] ARPAC.eu: the website of a registered non-profit organisation advocating to lift regulation on gun control in France.

Other domains attributed to Suavelos (T0149.001: Domain Asset) reveal a website set up to sell merchandise (T0152.004: Website Asset, T0148.004: Payment Processing Capability, T0061: Sell Merchandise), and a website hosting a registered French non-profit (T0152.004: Website Asset, T0097.207: NGO Persona).

To learn more about the suavelos.eu domain, we collected the following data: The domain is hosted on OVH; The owner’s identity is protected; The IP Address of the server is 94.23.253.173, which is shared with 20 other domains.

The relative low number of websites hosted on this IP address could indicate that they all belong to the same people, and are hosted on the same private server.


Suavelos registered a domain using the web hosting provider OVH (T0149.001: Domain Asset, T0152.003: Website Hosting Platform, T0150.006: Purchased). The site’s IP address reveals a server hosting other domains potentially owned by the actors (T0149.005: Server Asset, T0149.006: IP Address Asset). | +| [T0151.001 Social Media Platform](../../generated_pages/techniques/T0151.001.md) |  IT00000427 This report examines the white nationalist group Suavelos’ use of Facebook to draw visitors to its website without overtly revealing their racist ideology. This section of the report looks at the Suavelos website, and the content it links out to.

In going back to Suavelos’ main page, we also found: A link to a page on a web shop: alabastro.eu; A link to a page to donate money to the founders through Tipee and to the website through PayPal; [and] a link to a private forum that gathers 3.000 members: oppidum.suavelos.eu;

Suavelos linked out to an online store which it controlled (T0152.004: Website Asset, T0148.004: Payment Processing Capability), and to accounts on payment processing platforms PayPal and Tipee (T0146: Account Asset, T0148.003: Payment Processing Platform).

The Suavelos website also hosted a private forum (T0151.009: Legacy Online Forum Platform, T0155: Gated Asset), and linked out to a variety of assets it controlled on other online platforms: accounts on Twitter (T0146: Account Asset, T0151.008: Microblogging Platform), YouTube (T0146: Account Asset, T0152.006: Video Platform), Instagram and VKontakte (T0146: Account Asset, T0151.001: Social Media Platform). | +| [T0151.008 Microblogging Platform](../../generated_pages/techniques/T0151.008.md) |  IT00000425 This report examines the white nationalist group Suavelos’ use of Facebook to draw visitors to its website without overtly revealing their racist ideology. This section of the report looks at the Suavelos website, and the content it links out to.

In going back to Suavelos’ main page, we also found: A link to a page on a web shop: alabastro.eu; A link to a page to donate money to the founders through Tipee and to the website through PayPal; [and] a link to a private forum that gathers 3.000 members: oppidum.suavelos.eu;

Suavelos linked out to an online store which it controlled (T0152.004: Website Asset, T0148.004: Payment Processing Capability), and to accounts on payment processing platforms PayPal and Tipee (T0146: Account Asset, T0148.003: Payment Processing Platform).

The Suavelos website also hosted a private forum (T0151.009: Legacy Online Forum Platform, T0155: Gated Asset), and linked out to a variety of assets it controlled on other online platforms: accounts on Twitter (T0146: Account Asset, T0151.008: Microblogging Platform), YouTube (T0146: Account Asset, T0152.006: Video Platform), Instagram and VKontakte (T0146: Account Asset, T0151.001: Social Media Platform). | +| [T0151.009 Legacy Online Forum Platform](../../generated_pages/techniques/T0151.009.md) |  IT00000422 This report examines the white nationalist group Suavelos’ use of Facebook to draw visitors to its website without overtly revealing their racist ideology. This section of the report looks at the Suavelos website, and the content it links out to.

In going back to Suavelos’ main page, we also found: A link to a page on a web shop: alabastro.eu; A link to a page to donate money to the founders through Tipee and to the website through PayPal; [and] a link to a private forum that gathers 3.000 members: oppidum.suavelos.eu;

Suavelos linked out to an online store which it controlled (T0152.004: Website Asset, T0148.004: Payment Processing Capability), and to accounts on payment processing platforms PayPal and Tipee (T0146: Account Asset, T0148.003: Payment Processing Platform).

The Suavelos website also hosted a private forum (T0151.009: Legacy Online Forum Platform, T0155: Gated Asset), and linked out to a variety of assets it controlled on other online platforms: accounts on Twitter (T0146: Account Asset, T0151.008: Microblogging Platform), YouTube (T0146: Account Asset, T0152.006: Video Platform), Instagram and VKontakte (T0146: Account Asset, T0151.001: Social Media Platform). | +| [T0152.004 Website Asset](../../generated_pages/techniques/T0152.004.md) |  IT00000419 This report examines the white nationalist group Suavelos’ use of Facebook to draw visitors to its website without overtly revealing their racist ideology. This section of the report looks at the Suavelos website, and the content it links out to.

In going back to Suavelos’ main page, we also found: A link to a page on a web shop: alabastro.eu; A link to a page to donate money to the founders through Tipee and to the website through PayPal; [and] a link to a private forum that gathers 3.000 members: oppidum.suavelos.eu;

Suavelos linked out to an online store which it controlled (T0152.004: Website Asset, T0148.004: Payment Processing Capability), and to accounts on payment processing platforms PayPal and Tipee (T0146: Account Asset, T0148.003: Payment Processing Platform).

The Suavelos website also hosted a private forum (T0151.009: Legacy Online Forum Platform, T0155: Gated Asset), and linked out to a variety of assets it controlled on other online platforms: accounts on Twitter (T0146: Account Asset, T0151.008: Microblogging Platform), YouTube (T0146: Account Asset, T0152.006: Video Platform), Instagram and VKontakte (T0146: Account Asset, T0151.001: Social Media Platform). | +| [T0152.006 Video Platform](../../generated_pages/techniques/T0152.006.md) |  IT00000426 This report examines the white nationalist group Suavelos’ use of Facebook to draw visitors to its website without overtly revealing their racist ideology. This section of the report looks at the Suavelos website, and the content it links out to.

In going back to Suavelos’ main page, we also found: A link to a page on a web shop: alabastro.eu; A link to a page to donate money to the founders through Tipee and to the website through PayPal; [and] a link to a private forum that gathers 3.000 members: oppidum.suavelos.eu;

Suavelos linked out to an online store which it controlled (T0152.004: Website Asset, T0148.004: Payment Processing Capability), and to accounts on payment processing platforms PayPal and Tipee (T0146: Account Asset, T0148.003: Payment Processing Platform).

The Suavelos website also hosted a private forum (T0151.009: Legacy Online Forum Platform, T0155: Gated Asset), and linked out to a variety of assets it controlled on other online platforms: accounts on Twitter (T0146: Account Asset, T0151.008: Microblogging Platform), YouTube (T0146: Account Asset, T0152.006: Video Platform), Instagram and VKontakte (T0146: Account Asset, T0151.001: Social Media Platform). | +| [T0155 Gated Asset](../../generated_pages/techniques/T0155.md) |  IT00000423 This report examines the white nationalist group Suavelos’ use of Facebook to draw visitors to its website without overtly revealing their racist ideology. This section of the report looks at the Suavelos website, and the content it links out to.

In going back to Suavelos’ main page, we also found: A link to a page on a web shop: alabastro.eu; A link to a page to donate money to the founders through Tipee and to the website through PayPal; [and] a link to a private forum that gathers 3.000 members: oppidum.suavelos.eu;

Suavelos linked out to an online store which it controlled (T0152.004: Website Asset, T0148.004: Payment Processing Capability), and to accounts on payment processing platforms PayPal and Tipee (T0146: Account Asset, T0148.003: Payment Processing Platform).

The Suavelos website also hosted a private forum (T0151.009: Legacy Online Forum Platform, T0155: Gated Asset), and linked out to a variety of assets it controlled on other online platforms: accounts on Twitter (T0146: Account Asset, T0151.008: Microblogging Platform), YouTube (T0146: Account Asset, T0152.006: Video Platform), Instagram and VKontakte (T0146: Account Asset, T0151.001: Social Media Platform). | DO NOT EDIT ABOVE THIS LINE - PLEASE ADD NOTES BELOW \ No newline at end of file diff --git a/generated_pages/incidents/I00110.md b/generated_pages/incidents/I00110.md index 768d655..8c313a4 100644 --- a/generated_pages/incidents/I00110.md +++ b/generated_pages/incidents/I00110.md @@ -15,20 +15,21 @@ | Reference | Pub Date | Authors | Org | Archive | | --------- | -------- | ------- | --- | ------- | +| [https://www.disinfo.eu/publications/how-covid-19-conspiracists-and-extremists-use-crowdfunding-platforms-to-fund-their-activities/](https://www.disinfo.eu/publications/how-covid-19-conspiracists-and-extremists-use-crowdfunding-platforms-to-fund-their-activities/) | 2024/10/01 | - | EU Disinfo Lab | [https://web.archive.org/web/20240910182937/https://www.disinfo.eu/publications/how-covid-19-conspiracists-and-extremists-use-crowdfunding-platforms-to-fund-their-activities](https://web.archive.org/web/20240910182937/https://www.disinfo.eu/publications/how-covid-19-conspiracists-and-extremists-use-crowdfunding-platforms-to-fund-their-activities) | | Technique | Description given for this incident | | --------- | ------------------------- | -| [T0017 Conduct Fundraising](../../generated_pages/techniques/T0017.md) |  IT00000435 The EU Disinfo Lab produced a report into disinformation published on crowdfunding platforms:



More worrisome is the direct monetisation of disinformation happening on crowdfunding platforms: on Kickstarter, we found a user openly raising money for a documentary project suggesting that COVID-19 is a conspiracy.

A Kickstarter user attempted to use the platform to fund production of a documentary (T0017: Conduct Fundraising, T0087: Develop Video-Based Content, T0146: Account, T0148.006: Crowdfunding Platform).

On Patreon, we found several instances of direct monetisation of COVID-19 disinformation, including posts promoting a device allegedly protecting against COVID-19 and 5G, as well as posts related to the “Plandemic” conspiracy video, which gained attention on YouTube before being removed by the platform.

We also found an account called “Stranger than fiction” entirely dedicated to disinformation, which openly states that their content was “Banned by screwtube and fakebook, our videos have been viewed over a billion times.”


The “Stranger than fiction” user presented itself as an alternative news source which had been banned from other platforms (T0146: Account, T0097.202: News Outlet Persona, T0121.001: Bypass Content Bocking, T0152.012: Subscription Service Platform).

On the US-based crowdfunding platform IndieGogo, EU DisinfoLab found a successful crowdfunding campaign of €133.903 for a book called Revolution Q. This book, now also available on Amazon, claims to be “Written for both newcomers and long-time QAnon fans alike, this book is a treasure-trove of information designed to help everyone weather The Storm.”

An IndieGogo account was used to gather funds to produce a book on QAnon (T0017: Conduct Fundraising, T0085.005: Develop Book, T0146: Account, T0148.006: Crowdfunding Platform), with the book later sold on Amazon marketplace (T0148.007: eCommerce Platform). | -| [T0085.005 Develop Book](../../generated_pages/techniques/T0085.005.md) | IT00000442 The EU Disinfo Lab produced a report into disinformation published on crowdfunding platforms:



More worrisome is the direct monetisation of disinformation happening on crowdfunding platforms: on Kickstarter, we found a user openly raising money for a documentary project suggesting that COVID-19 is a conspiracy.

A Kickstarter user attempted to use the platform to fund production of a documentary (T0017: Conduct Fundraising, T0087: Develop Video-Based Content, T0146: Account, T0148.006: Crowdfunding Platform).

On Patreon, we found several instances of direct monetisation of COVID-19 disinformation, including posts promoting a device allegedly protecting against COVID-19 and 5G, as well as posts related to the “Plandemic” conspiracy video, which gained attention on YouTube before being removed by the platform.

We also found an account called “Stranger than fiction” entirely dedicated to disinformation, which openly states that their content was “Banned by screwtube and fakebook, our videos have been viewed over a billion times.”


The “Stranger than fiction” user presented itself as an alternative news source which had been banned from other platforms (T0146: Account, T0097.202: News Outlet Persona, T0121.001: Bypass Content Bocking, T0152.012: Subscription Service Platform).

On the US-based crowdfunding platform IndieGogo, EU DisinfoLab found a successful crowdfunding campaign of €133.903 for a book called Revolution Q. This book, now also available on Amazon, claims to be “Written for both newcomers and long-time QAnon fans alike, this book is a treasure-trove of information designed to help everyone weather The Storm.”

An IndieGogo account was used to gather funds to produce a book on QAnon (T0017: Conduct Fundraising, T0085.005: Develop Book, T0146: Account, T0148.006: Crowdfunding Platform), with the book later sold on Amazon marketplace (T0148.007: eCommerce Platform). | -| [T0087 Develop Video-Based Content](../../generated_pages/techniques/T0087.md) |  IT00000436 The EU Disinfo Lab produced a report into disinformation published on crowdfunding platforms:



More worrisome is the direct monetisation of disinformation happening on crowdfunding platforms: on Kickstarter, we found a user openly raising money for a documentary project suggesting that COVID-19 is a conspiracy.

A Kickstarter user attempted to use the platform to fund production of a documentary (T0017: Conduct Fundraising, T0087: Develop Video-Based Content, T0146: Account, T0148.006: Crowdfunding Platform).

On Patreon, we found several instances of direct monetisation of COVID-19 disinformation, including posts promoting a device allegedly protecting against COVID-19 and 5G, as well as posts related to the “Plandemic” conspiracy video, which gained attention on YouTube before being removed by the platform.

We also found an account called “Stranger than fiction” entirely dedicated to disinformation, which openly states that their content was “Banned by screwtube and fakebook, our videos have been viewed over a billion times.”


The “Stranger than fiction” user presented itself as an alternative news source which had been banned from other platforms (T0146: Account, T0097.202: News Outlet Persona, T0121.001: Bypass Content Bocking, T0152.012: Subscription Service Platform).

On the US-based crowdfunding platform IndieGogo, EU DisinfoLab found a successful crowdfunding campaign of €133.903 for a book called Revolution Q. This book, now also available on Amazon, claims to be “Written for both newcomers and long-time QAnon fans alike, this book is a treasure-trove of information designed to help everyone weather The Storm.”

An IndieGogo account was used to gather funds to produce a book on QAnon (T0017: Conduct Fundraising, T0085.005: Develop Book, T0146: Account, T0148.006: Crowdfunding Platform), with the book later sold on Amazon marketplace (T0148.007: eCommerce Platform). | -| [T0097.202 News Outlet Persona](../../generated_pages/techniques/T0097.202.md) | IT00000439 The EU Disinfo Lab produced a report into disinformation published on crowdfunding platforms:



More worrisome is the direct monetisation of disinformation happening on crowdfunding platforms: on Kickstarter, we found a user openly raising money for a documentary project suggesting that COVID-19 is a conspiracy.

A Kickstarter user attempted to use the platform to fund production of a documentary (T0017: Conduct Fundraising, T0087: Develop Video-Based Content, T0146: Account, T0148.006: Crowdfunding Platform).

On Patreon, we found several instances of direct monetisation of COVID-19 disinformation, including posts promoting a device allegedly protecting against COVID-19 and 5G, as well as posts related to the “Plandemic” conspiracy video, which gained attention on YouTube before being removed by the platform.

We also found an account called “Stranger than fiction” entirely dedicated to disinformation, which openly states that their content was “Banned by screwtube and fakebook, our videos have been viewed over a billion times.”


The “Stranger than fiction” user presented itself as an alternative news source which had been banned from other platforms (T0146: Account, T0097.202: News Outlet Persona, T0121.001: Bypass Content Bocking, T0152.012: Subscription Service Platform).

On the US-based crowdfunding platform IndieGogo, EU DisinfoLab found a successful crowdfunding campaign of €133.903 for a book called Revolution Q. This book, now also available on Amazon, claims to be “Written for both newcomers and long-time QAnon fans alike, this book is a treasure-trove of information designed to help everyone weather The Storm.”

An IndieGogo account was used to gather funds to produce a book on QAnon (T0017: Conduct Fundraising, T0085.005: Develop Book, T0146: Account, T0148.006: Crowdfunding Platform), with the book later sold on Amazon marketplace (T0148.007: eCommerce Platform). | -| [T0121.001 Bypass Content Blocking](../../generated_pages/techniques/T0121.001.md) |  IT00000440 The EU Disinfo Lab produced a report into disinformation published on crowdfunding platforms:



More worrisome is the direct monetisation of disinformation happening on crowdfunding platforms: on Kickstarter, we found a user openly raising money for a documentary project suggesting that COVID-19 is a conspiracy.

A Kickstarter user attempted to use the platform to fund production of a documentary (T0017: Conduct Fundraising, T0087: Develop Video-Based Content, T0146: Account, T0148.006: Crowdfunding Platform).

On Patreon, we found several instances of direct monetisation of COVID-19 disinformation, including posts promoting a device allegedly protecting against COVID-19 and 5G, as well as posts related to the “Plandemic” conspiracy video, which gained attention on YouTube before being removed by the platform.

We also found an account called “Stranger than fiction” entirely dedicated to disinformation, which openly states that their content was “Banned by screwtube and fakebook, our videos have been viewed over a billion times.”


The “Stranger than fiction” user presented itself as an alternative news source which had been banned from other platforms (T0146: Account, T0097.202: News Outlet Persona, T0121.001: Bypass Content Bocking, T0152.012: Subscription Service Platform).

On the US-based crowdfunding platform IndieGogo, EU DisinfoLab found a successful crowdfunding campaign of €133.903 for a book called Revolution Q. This book, now also available on Amazon, claims to be “Written for both newcomers and long-time QAnon fans alike, this book is a treasure-trove of information designed to help everyone weather The Storm.”

An IndieGogo account was used to gather funds to produce a book on QAnon (T0017: Conduct Fundraising, T0085.005: Develop Book, T0146: Account, T0148.006: Crowdfunding Platform), with the book later sold on Amazon marketplace (T0148.007: eCommerce Platform). | -| [T0146 Account](../../generated_pages/techniques/T0146.md) | IT00000438 The EU Disinfo Lab produced a report into disinformation published on crowdfunding platforms:



More worrisome is the direct monetisation of disinformation happening on crowdfunding platforms: on Kickstarter, we found a user openly raising money for a documentary project suggesting that COVID-19 is a conspiracy.

A Kickstarter user attempted to use the platform to fund production of a documentary (T0017: Conduct Fundraising, T0087: Develop Video-Based Content, T0146: Account, T0148.006: Crowdfunding Platform).

On Patreon, we found several instances of direct monetisation of COVID-19 disinformation, including posts promoting a device allegedly protecting against COVID-19 and 5G, as well as posts related to the “Plandemic” conspiracy video, which gained attention on YouTube before being removed by the platform.

We also found an account called “Stranger than fiction” entirely dedicated to disinformation, which openly states that their content was “Banned by screwtube and fakebook, our videos have been viewed over a billion times.”


The “Stranger than fiction” user presented itself as an alternative news source which had been banned from other platforms (T0146: Account, T0097.202: News Outlet Persona, T0121.001: Bypass Content Bocking, T0152.012: Subscription Service Platform).

On the US-based crowdfunding platform IndieGogo, EU DisinfoLab found a successful crowdfunding campaign of €133.903 for a book called Revolution Q. This book, now also available on Amazon, claims to be “Written for both newcomers and long-time QAnon fans alike, this book is a treasure-trove of information designed to help everyone weather The Storm.”

An IndieGogo account was used to gather funds to produce a book on QAnon (T0017: Conduct Fundraising, T0085.005: Develop Book, T0146: Account, T0148.006: Crowdfunding Platform), with the book later sold on Amazon marketplace (T0148.007: eCommerce Platform). | -| [T0148.006 Crowdfunding Platform](../../generated_pages/techniques/T0148.006.md) |  IT00000437 The EU Disinfo Lab produced a report into disinformation published on crowdfunding platforms:



More worrisome is the direct monetisation of disinformation happening on crowdfunding platforms: on Kickstarter, we found a user openly raising money for a documentary project suggesting that COVID-19 is a conspiracy.

A Kickstarter user attempted to use the platform to fund production of a documentary (T0017: Conduct Fundraising, T0087: Develop Video-Based Content, T0146: Account, T0148.006: Crowdfunding Platform).

On Patreon, we found several instances of direct monetisation of COVID-19 disinformation, including posts promoting a device allegedly protecting against COVID-19 and 5G, as well as posts related to the “Plandemic” conspiracy video, which gained attention on YouTube before being removed by the platform.

We also found an account called “Stranger than fiction” entirely dedicated to disinformation, which openly states that their content was “Banned by screwtube and fakebook, our videos have been viewed over a billion times.”


The “Stranger than fiction” user presented itself as an alternative news source which had been banned from other platforms (T0146: Account, T0097.202: News Outlet Persona, T0121.001: Bypass Content Bocking, T0152.012: Subscription Service Platform).

On the US-based crowdfunding platform IndieGogo, EU DisinfoLab found a successful crowdfunding campaign of €133.903 for a book called Revolution Q. This book, now also available on Amazon, claims to be “Written for both newcomers and long-time QAnon fans alike, this book is a treasure-trove of information designed to help everyone weather The Storm.”

An IndieGogo account was used to gather funds to produce a book on QAnon (T0017: Conduct Fundraising, T0085.005: Develop Book, T0146: Account, T0148.006: Crowdfunding Platform), with the book later sold on Amazon marketplace (T0148.007: eCommerce Platform). | -| [T0148.007 eCommerce Platform](../../generated_pages/techniques/T0148.007.md) |  IT00000443 The EU Disinfo Lab produced a report into disinformation published on crowdfunding platforms:



More worrisome is the direct monetisation of disinformation happening on crowdfunding platforms: on Kickstarter, we found a user openly raising money for a documentary project suggesting that COVID-19 is a conspiracy.

A Kickstarter user attempted to use the platform to fund production of a documentary (T0017: Conduct Fundraising, T0087: Develop Video-Based Content, T0146: Account, T0148.006: Crowdfunding Platform).

On Patreon, we found several instances of direct monetisation of COVID-19 disinformation, including posts promoting a device allegedly protecting against COVID-19 and 5G, as well as posts related to the “Plandemic” conspiracy video, which gained attention on YouTube before being removed by the platform.

We also found an account called “Stranger than fiction” entirely dedicated to disinformation, which openly states that their content was “Banned by screwtube and fakebook, our videos have been viewed over a billion times.”


The “Stranger than fiction” user presented itself as an alternative news source which had been banned from other platforms (T0146: Account, T0097.202: News Outlet Persona, T0121.001: Bypass Content Bocking, T0152.012: Subscription Service Platform).

On the US-based crowdfunding platform IndieGogo, EU DisinfoLab found a successful crowdfunding campaign of €133.903 for a book called Revolution Q. This book, now also available on Amazon, claims to be “Written for both newcomers and long-time QAnon fans alike, this book is a treasure-trove of information designed to help everyone weather The Storm.”

An IndieGogo account was used to gather funds to produce a book on QAnon (T0017: Conduct Fundraising, T0085.005: Develop Book, T0146: Account, T0148.006: Crowdfunding Platform), with the book later sold on Amazon marketplace (T0148.007: eCommerce Platform). | -| [T0152.012 Subscription Service Platform](../../generated_pages/techniques/T0152.012.md) | IT00000441 The EU Disinfo Lab produced a report into disinformation published on crowdfunding platforms:



More worrisome is the direct monetisation of disinformation happening on crowdfunding platforms: on Kickstarter, we found a user openly raising money for a documentary project suggesting that COVID-19 is a conspiracy.

A Kickstarter user attempted to use the platform to fund production of a documentary (T0017: Conduct Fundraising, T0087: Develop Video-Based Content, T0146: Account, T0148.006: Crowdfunding Platform).

On Patreon, we found several instances of direct monetisation of COVID-19 disinformation, including posts promoting a device allegedly protecting against COVID-19 and 5G, as well as posts related to the “Plandemic” conspiracy video, which gained attention on YouTube before being removed by the platform.

We also found an account called “Stranger than fiction” entirely dedicated to disinformation, which openly states that their content was “Banned by screwtube and fakebook, our videos have been viewed over a billion times.”


The “Stranger than fiction” user presented itself as an alternative news source which had been banned from other platforms (T0146: Account, T0097.202: News Outlet Persona, T0121.001: Bypass Content Bocking, T0152.012: Subscription Service Platform).

On the US-based crowdfunding platform IndieGogo, EU DisinfoLab found a successful crowdfunding campaign of €133.903 for a book called Revolution Q. This book, now also available on Amazon, claims to be “Written for both newcomers and long-time QAnon fans alike, this book is a treasure-trove of information designed to help everyone weather The Storm.”

An IndieGogo account was used to gather funds to produce a book on QAnon (T0017: Conduct Fundraising, T0085.005: Develop Book, T0146: Account, T0148.006: Crowdfunding Platform), with the book later sold on Amazon marketplace (T0148.007: eCommerce Platform). | +| [T0017 Conduct Fundraising](../../generated_pages/techniques/T0017.md) |  IT00000435 The EU Disinfo Lab produced a report into disinformation published on crowdfunding platforms:

More worrisome is the direct monetisation of disinformation happening on crowdfunding platforms: on Kickstarter, we found a user openly raising money for a documentary project suggesting that COVID-19 is a conspiracy.

A Kickstarter user attempted to use the platform to fund production of a documentary (T0017: Conduct Fundraising, T0087: Develop Video-Based Content, T0146: Account Asset, T0148.006: Crowdfunding Platform).

On Patreon, we found several instances of direct monetisation of COVID-19 disinformation, including posts promoting a device allegedly protecting against COVID-19 and 5G, as well as posts related to the “Plandemic” conspiracy video, which gained attention on YouTube before being removed by the platform.

We also found an account called “Stranger than fiction” entirely dedicated to disinformation, which openly states that their content was “Banned by screwtube and fakebook, our videos have been viewed over a billion times.”


The “Stranger than fiction” user presented itself as an alternative news source which had been banned from other platforms (T0146: Account Asset, T0097.202: News Outlet Persona, T0121.001: Bypass Content Bocking, T0152.012: Subscription Service Platform).

On the US-based crowdfunding platform IndieGogo, EU DisinfoLab found a successful crowdfunding campaign of €133.903 for a book called Revolution Q. This book, now also available on Amazon, claims to be “Written for both newcomers and long-time QAnon fans alike, this book is a treasure-trove of information designed to help everyone weather The Storm.”

An IndieGogo account was used to gather funds to produce a book on QAnon (T0017: Conduct Fundraising, T0085.005: Develop Book, T0146: Account Asset, T0148.006: Crowdfunding Platform), with the book later sold on Amazon marketplace (T0148.007: eCommerce Platform). | +| [T0085.005 Develop Book](../../generated_pages/techniques/T0085.005.md) | IT00000442 The EU Disinfo Lab produced a report into disinformation published on crowdfunding platforms:

More worrisome is the direct monetisation of disinformation happening on crowdfunding platforms: on Kickstarter, we found a user openly raising money for a documentary project suggesting that COVID-19 is a conspiracy.

A Kickstarter user attempted to use the platform to fund production of a documentary (T0017: Conduct Fundraising, T0087: Develop Video-Based Content, T0146: Account Asset, T0148.006: Crowdfunding Platform).

On Patreon, we found several instances of direct monetisation of COVID-19 disinformation, including posts promoting a device allegedly protecting against COVID-19 and 5G, as well as posts related to the “Plandemic” conspiracy video, which gained attention on YouTube before being removed by the platform.

We also found an account called “Stranger than fiction” entirely dedicated to disinformation, which openly states that their content was “Banned by screwtube and fakebook, our videos have been viewed over a billion times.”


The “Stranger than fiction” user presented itself as an alternative news source which had been banned from other platforms (T0146: Account Asset, T0097.202: News Outlet Persona, T0121.001: Bypass Content Bocking, T0152.012: Subscription Service Platform).

On the US-based crowdfunding platform IndieGogo, EU DisinfoLab found a successful crowdfunding campaign of €133.903 for a book called Revolution Q. This book, now also available on Amazon, claims to be “Written for both newcomers and long-time QAnon fans alike, this book is a treasure-trove of information designed to help everyone weather The Storm.”

An IndieGogo account was used to gather funds to produce a book on QAnon (T0017: Conduct Fundraising, T0085.005: Develop Book, T0146: Account Asset, T0148.006: Crowdfunding Platform), with the book later sold on Amazon marketplace (T0148.007: eCommerce Platform). | +| [T0087 Develop Video-Based Content](../../generated_pages/techniques/T0087.md) |  IT00000436 The EU Disinfo Lab produced a report into disinformation published on crowdfunding platforms:

More worrisome is the direct monetisation of disinformation happening on crowdfunding platforms: on Kickstarter, we found a user openly raising money for a documentary project suggesting that COVID-19 is a conspiracy.

A Kickstarter user attempted to use the platform to fund production of a documentary (T0017: Conduct Fundraising, T0087: Develop Video-Based Content, T0146: Account Asset, T0148.006: Crowdfunding Platform).

On Patreon, we found several instances of direct monetisation of COVID-19 disinformation, including posts promoting a device allegedly protecting against COVID-19 and 5G, as well as posts related to the “Plandemic” conspiracy video, which gained attention on YouTube before being removed by the platform.

We also found an account called “Stranger than fiction” entirely dedicated to disinformation, which openly states that their content was “Banned by screwtube and fakebook, our videos have been viewed over a billion times.”


The “Stranger than fiction” user presented itself as an alternative news source which had been banned from other platforms (T0146: Account Asset, T0097.202: News Outlet Persona, T0121.001: Bypass Content Bocking, T0152.012: Subscription Service Platform).

On the US-based crowdfunding platform IndieGogo, EU DisinfoLab found a successful crowdfunding campaign of €133.903 for a book called Revolution Q. This book, now also available on Amazon, claims to be “Written for both newcomers and long-time QAnon fans alike, this book is a treasure-trove of information designed to help everyone weather The Storm.”

An IndieGogo account was used to gather funds to produce a book on QAnon (T0017: Conduct Fundraising, T0085.005: Develop Book, T0146: Account Asset, T0148.006: Crowdfunding Platform), with the book later sold on Amazon marketplace (T0148.007: eCommerce Platform). | +| [T0097.202 News Outlet Persona](../../generated_pages/techniques/T0097.202.md) | IT00000439 The EU Disinfo Lab produced a report into disinformation published on crowdfunding platforms:

More worrisome is the direct monetisation of disinformation happening on crowdfunding platforms: on Kickstarter, we found a user openly raising money for a documentary project suggesting that COVID-19 is a conspiracy.

A Kickstarter user attempted to use the platform to fund production of a documentary (T0017: Conduct Fundraising, T0087: Develop Video-Based Content, T0146: Account Asset, T0148.006: Crowdfunding Platform).

On Patreon, we found several instances of direct monetisation of COVID-19 disinformation, including posts promoting a device allegedly protecting against COVID-19 and 5G, as well as posts related to the “Plandemic” conspiracy video, which gained attention on YouTube before being removed by the platform.

We also found an account called “Stranger than fiction” entirely dedicated to disinformation, which openly states that their content was “Banned by screwtube and fakebook, our videos have been viewed over a billion times.”


The “Stranger than fiction” user presented itself as an alternative news source which had been banned from other platforms (T0146: Account Asset, T0097.202: News Outlet Persona, T0121.001: Bypass Content Bocking, T0152.012: Subscription Service Platform).

On the US-based crowdfunding platform IndieGogo, EU DisinfoLab found a successful crowdfunding campaign of €133.903 for a book called Revolution Q. This book, now also available on Amazon, claims to be “Written for both newcomers and long-time QAnon fans alike, this book is a treasure-trove of information designed to help everyone weather The Storm.”

An IndieGogo account was used to gather funds to produce a book on QAnon (T0017: Conduct Fundraising, T0085.005: Develop Book, T0146: Account Asset, T0148.006: Crowdfunding Platform), with the book later sold on Amazon marketplace (T0148.007: eCommerce Platform). | +| [T0121.001 Bypass Content Blocking](../../generated_pages/techniques/T0121.001.md) |  IT00000440 The EU Disinfo Lab produced a report into disinformation published on crowdfunding platforms:

More worrisome is the direct monetisation of disinformation happening on crowdfunding platforms: on Kickstarter, we found a user openly raising money for a documentary project suggesting that COVID-19 is a conspiracy.

A Kickstarter user attempted to use the platform to fund production of a documentary (T0017: Conduct Fundraising, T0087: Develop Video-Based Content, T0146: Account Asset, T0148.006: Crowdfunding Platform).

On Patreon, we found several instances of direct monetisation of COVID-19 disinformation, including posts promoting a device allegedly protecting against COVID-19 and 5G, as well as posts related to the “Plandemic” conspiracy video, which gained attention on YouTube before being removed by the platform.

We also found an account called “Stranger than fiction” entirely dedicated to disinformation, which openly states that their content was “Banned by screwtube and fakebook, our videos have been viewed over a billion times.”


The “Stranger than fiction” user presented itself as an alternative news source which had been banned from other platforms (T0146: Account Asset, T0097.202: News Outlet Persona, T0121.001: Bypass Content Bocking, T0152.012: Subscription Service Platform).

On the US-based crowdfunding platform IndieGogo, EU DisinfoLab found a successful crowdfunding campaign of €133.903 for a book called Revolution Q. This book, now also available on Amazon, claims to be “Written for both newcomers and long-time QAnon fans alike, this book is a treasure-trove of information designed to help everyone weather The Storm.”

An IndieGogo account was used to gather funds to produce a book on QAnon (T0017: Conduct Fundraising, T0085.005: Develop Book, T0146: Account Asset, T0148.006: Crowdfunding Platform), with the book later sold on Amazon marketplace (T0148.007: eCommerce Platform). | +| [T0146 Account Asset](../../generated_pages/techniques/T0146.md) | IT00000438 The EU Disinfo Lab produced a report into disinformation published on crowdfunding platforms:

More worrisome is the direct monetisation of disinformation happening on crowdfunding platforms: on Kickstarter, we found a user openly raising money for a documentary project suggesting that COVID-19 is a conspiracy.

A Kickstarter user attempted to use the platform to fund production of a documentary (T0017: Conduct Fundraising, T0087: Develop Video-Based Content, T0146: Account Asset, T0148.006: Crowdfunding Platform).

On Patreon, we found several instances of direct monetisation of COVID-19 disinformation, including posts promoting a device allegedly protecting against COVID-19 and 5G, as well as posts related to the “Plandemic” conspiracy video, which gained attention on YouTube before being removed by the platform.

We also found an account called “Stranger than fiction” entirely dedicated to disinformation, which openly states that their content was “Banned by screwtube and fakebook, our videos have been viewed over a billion times.”


The “Stranger than fiction” user presented itself as an alternative news source which had been banned from other platforms (T0146: Account Asset, T0097.202: News Outlet Persona, T0121.001: Bypass Content Bocking, T0152.012: Subscription Service Platform).

On the US-based crowdfunding platform IndieGogo, EU DisinfoLab found a successful crowdfunding campaign of €133.903 for a book called Revolution Q. This book, now also available on Amazon, claims to be “Written for both newcomers and long-time QAnon fans alike, this book is a treasure-trove of information designed to help everyone weather The Storm.”

An IndieGogo account was used to gather funds to produce a book on QAnon (T0017: Conduct Fundraising, T0085.005: Develop Book, T0146: Account Asset, T0148.006: Crowdfunding Platform), with the book later sold on Amazon marketplace (T0148.007: eCommerce Platform). | +| [T0148.006 Crowdfunding Platform](../../generated_pages/techniques/T0148.006.md) |  IT00000437 The EU Disinfo Lab produced a report into disinformation published on crowdfunding platforms:

More worrisome is the direct monetisation of disinformation happening on crowdfunding platforms: on Kickstarter, we found a user openly raising money for a documentary project suggesting that COVID-19 is a conspiracy.

A Kickstarter user attempted to use the platform to fund production of a documentary (T0017: Conduct Fundraising, T0087: Develop Video-Based Content, T0146: Account Asset, T0148.006: Crowdfunding Platform).

On Patreon, we found several instances of direct monetisation of COVID-19 disinformation, including posts promoting a device allegedly protecting against COVID-19 and 5G, as well as posts related to the “Plandemic” conspiracy video, which gained attention on YouTube before being removed by the platform.

We also found an account called “Stranger than fiction” entirely dedicated to disinformation, which openly states that their content was “Banned by screwtube and fakebook, our videos have been viewed over a billion times.”


The “Stranger than fiction” user presented itself as an alternative news source which had been banned from other platforms (T0146: Account Asset, T0097.202: News Outlet Persona, T0121.001: Bypass Content Bocking, T0152.012: Subscription Service Platform).

On the US-based crowdfunding platform IndieGogo, EU DisinfoLab found a successful crowdfunding campaign of €133.903 for a book called Revolution Q. This book, now also available on Amazon, claims to be “Written for both newcomers and long-time QAnon fans alike, this book is a treasure-trove of information designed to help everyone weather The Storm.”

An IndieGogo account was used to gather funds to produce a book on QAnon (T0017: Conduct Fundraising, T0085.005: Develop Book, T0146: Account Asset, T0148.006: Crowdfunding Platform), with the book later sold on Amazon marketplace (T0148.007: eCommerce Platform). | +| [T0148.007 eCommerce Platform](../../generated_pages/techniques/T0148.007.md) |  IT00000443 The EU Disinfo Lab produced a report into disinformation published on crowdfunding platforms:

More worrisome is the direct monetisation of disinformation happening on crowdfunding platforms: on Kickstarter, we found a user openly raising money for a documentary project suggesting that COVID-19 is a conspiracy.

A Kickstarter user attempted to use the platform to fund production of a documentary (T0017: Conduct Fundraising, T0087: Develop Video-Based Content, T0146: Account Asset, T0148.006: Crowdfunding Platform).

On Patreon, we found several instances of direct monetisation of COVID-19 disinformation, including posts promoting a device allegedly protecting against COVID-19 and 5G, as well as posts related to the “Plandemic” conspiracy video, which gained attention on YouTube before being removed by the platform.

We also found an account called “Stranger than fiction” entirely dedicated to disinformation, which openly states that their content was “Banned by screwtube and fakebook, our videos have been viewed over a billion times.”


The “Stranger than fiction” user presented itself as an alternative news source which had been banned from other platforms (T0146: Account Asset, T0097.202: News Outlet Persona, T0121.001: Bypass Content Bocking, T0152.012: Subscription Service Platform).

On the US-based crowdfunding platform IndieGogo, EU DisinfoLab found a successful crowdfunding campaign of €133.903 for a book called Revolution Q. This book, now also available on Amazon, claims to be “Written for both newcomers and long-time QAnon fans alike, this book is a treasure-trove of information designed to help everyone weather The Storm.”

An IndieGogo account was used to gather funds to produce a book on QAnon (T0017: Conduct Fundraising, T0085.005: Develop Book, T0146: Account Asset, T0148.006: Crowdfunding Platform), with the book later sold on Amazon marketplace (T0148.007: eCommerce Platform). | +| [T0152.012 Subscription Service Platform](../../generated_pages/techniques/T0152.012.md) | IT00000441 The EU Disinfo Lab produced a report into disinformation published on crowdfunding platforms:

More worrisome is the direct monetisation of disinformation happening on crowdfunding platforms: on Kickstarter, we found a user openly raising money for a documentary project suggesting that COVID-19 is a conspiracy.

A Kickstarter user attempted to use the platform to fund production of a documentary (T0017: Conduct Fundraising, T0087: Develop Video-Based Content, T0146: Account Asset, T0148.006: Crowdfunding Platform).

On Patreon, we found several instances of direct monetisation of COVID-19 disinformation, including posts promoting a device allegedly protecting against COVID-19 and 5G, as well as posts related to the “Plandemic” conspiracy video, which gained attention on YouTube before being removed by the platform.

We also found an account called “Stranger than fiction” entirely dedicated to disinformation, which openly states that their content was “Banned by screwtube and fakebook, our videos have been viewed over a billion times.”


The “Stranger than fiction” user presented itself as an alternative news source which had been banned from other platforms (T0146: Account Asset, T0097.202: News Outlet Persona, T0121.001: Bypass Content Bocking, T0152.012: Subscription Service Platform).

On the US-based crowdfunding platform IndieGogo, EU DisinfoLab found a successful crowdfunding campaign of €133.903 for a book called Revolution Q. This book, now also available on Amazon, claims to be “Written for both newcomers and long-time QAnon fans alike, this book is a treasure-trove of information designed to help everyone weather The Storm.”

An IndieGogo account was used to gather funds to produce a book on QAnon (T0017: Conduct Fundraising, T0085.005: Develop Book, T0146: Account Asset, T0148.006: Crowdfunding Platform), with the book later sold on Amazon marketplace (T0148.007: eCommerce Platform). | DO NOT EDIT ABOVE THIS LINE - PLEASE ADD NOTES BELOW \ No newline at end of file diff --git a/generated_pages/incidents/I00111.md b/generated_pages/incidents/I00111.md index 7880082..52766bd 100644 --- a/generated_pages/incidents/I00111.md +++ b/generated_pages/incidents/I00111.md @@ -15,18 +15,19 @@ | Reference | Pub Date | Authors | Org | Archive | | --------- | -------- | ------- | --- | ------- | +| [https://www.vice.com/en/article/patreon-is-bankrolling-climate-change-deniers-while-we-all-burn/](https://www.vice.com/en/article/patreon-is-bankrolling-climate-change-deniers-while-we-all-burn/) | 2021/06/30 | David Gilbert | Vice | [-](-) | | Technique | Description given for this incident | | --------- | ------------------------- | -| [T0085 Develop Text-Based Content](../../generated_pages/techniques/T0085.md) |  IT00000444 In this article VICE News discusses a report produced by Advance Democracy on people who use Patreon to spread the false claim that an impending ice age will reverse the harms of the ongoing climate crisis:

“The spread of climate misinformation is prolific on social media, as well as on sites like Patreon, where users are actually financially compensated through the platform for spreading falsehoods,” Daniel Jones, president of Advance Democracy, told VICE News.

“Companies hosting and promoting climate misinformation have a responsibility to take action to reduce dangerous misinformation, as falsehoods about climate science are every bit as dangerous as lies about vaccinations and disinformation about our elections.”

Patreon did not respond to VICE News’ request for comment on the report’s findings.

One of the biggest accounts spreading climate conspiracies is ADAPT 2030, which is run by David DuByne, who has 1,100 followers on Patreon. He is currently making over $3,500 every month from his subscribers.

[The science DuByne relies on does not support his hypothesis. However,] this has not prevented DuByne and many others from preying on people’s fears about climate change to spread conspiracies about an impending ice age, which they say will miraculously fix all of earth’s climate problems.

DuByne offers seven different membership levels for supporters, beginning at just $1 per month.

The most expensive costs $100 a month, and gives patrons “a private 20-minute call with David DuByne once per month, to discuss your particular preparedness issues or concerns.” So far just two people are paying this amount.

The researchers also found at least eight other accounts on Patreon that have spread climate change conspiracy theories as part of wider conspiracy sharing, including baseless claims about COVID-19 and the legitimacy of Joe Biden’s presidency. Some of these accounts are earning over $600 per month.


David DuByne created an account on Patreon, which he uses to post text, videos, and podcasts for his subscribers to discuss (T0085: Develop Text-Based Content, T0087: Develop Video-Based Content, T0088: Develop Audio-Based Content, T0146: Account, T0115: Post Content, T0152.012: Subscription Service Platform, T0151.014: Comments Section, T0155.006: Subscription Access). | -| [T0087 Develop Video-Based Content](../../generated_pages/techniques/T0087.md) |  IT00000445 In this article VICE News discusses a report produced by Advance Democracy on people who use Patreon to spread the false claim that an impending ice age will reverse the harms of the ongoing climate crisis:

“The spread of climate misinformation is prolific on social media, as well as on sites like Patreon, where users are actually financially compensated through the platform for spreading falsehoods,” Daniel Jones, president of Advance Democracy, told VICE News.

“Companies hosting and promoting climate misinformation have a responsibility to take action to reduce dangerous misinformation, as falsehoods about climate science are every bit as dangerous as lies about vaccinations and disinformation about our elections.”

Patreon did not respond to VICE News’ request for comment on the report’s findings.

One of the biggest accounts spreading climate conspiracies is ADAPT 2030, which is run by David DuByne, who has 1,100 followers on Patreon. He is currently making over $3,500 every month from his subscribers.

[The science DuByne relies on does not support his hypothesis. However,] this has not prevented DuByne and many others from preying on people’s fears about climate change to spread conspiracies about an impending ice age, which they say will miraculously fix all of earth’s climate problems.

DuByne offers seven different membership levels for supporters, beginning at just $1 per month.

The most expensive costs $100 a month, and gives patrons “a private 20-minute call with David DuByne once per month, to discuss your particular preparedness issues or concerns.” So far just two people are paying this amount.

The researchers also found at least eight other accounts on Patreon that have spread climate change conspiracy theories as part of wider conspiracy sharing, including baseless claims about COVID-19 and the legitimacy of Joe Biden’s presidency. Some of these accounts are earning over $600 per month.


David DuByne created an account on Patreon, which he uses to post text, videos, and podcasts for his subscribers to discuss (T0085: Develop Text-Based Content, T0087: Develop Video-Based Content, T0088: Develop Audio-Based Content, T0146: Account, T0115: Post Content, T0152.012: Subscription Service Platform, T0151.014: Comments Section, T0155.006: Subscription Access). | -| [T0088 Develop Audio-Based Content](../../generated_pages/techniques/T0088.md) |  IT00000446 In this article VICE News discusses a report produced by Advance Democracy on people who use Patreon to spread the false claim that an impending ice age will reverse the harms of the ongoing climate crisis:

“The spread of climate misinformation is prolific on social media, as well as on sites like Patreon, where users are actually financially compensated through the platform for spreading falsehoods,” Daniel Jones, president of Advance Democracy, told VICE News.

“Companies hosting and promoting climate misinformation have a responsibility to take action to reduce dangerous misinformation, as falsehoods about climate science are every bit as dangerous as lies about vaccinations and disinformation about our elections.”

Patreon did not respond to VICE News’ request for comment on the report’s findings.

One of the biggest accounts spreading climate conspiracies is ADAPT 2030, which is run by David DuByne, who has 1,100 followers on Patreon. He is currently making over $3,500 every month from his subscribers.

[The science DuByne relies on does not support his hypothesis. However,] this has not prevented DuByne and many others from preying on people’s fears about climate change to spread conspiracies about an impending ice age, which they say will miraculously fix all of earth’s climate problems.

DuByne offers seven different membership levels for supporters, beginning at just $1 per month.

The most expensive costs $100 a month, and gives patrons “a private 20-minute call with David DuByne once per month, to discuss your particular preparedness issues or concerns.” So far just two people are paying this amount.

The researchers also found at least eight other accounts on Patreon that have spread climate change conspiracy theories as part of wider conspiracy sharing, including baseless claims about COVID-19 and the legitimacy of Joe Biden’s presidency. Some of these accounts are earning over $600 per month.


David DuByne created an account on Patreon, which he uses to post text, videos, and podcasts for his subscribers to discuss (T0085: Develop Text-Based Content, T0087: Develop Video-Based Content, T0088: Develop Audio-Based Content, T0146: Account, T0115: Post Content, T0152.012: Subscription Service Platform, T0151.014: Comments Section, T0155.006: Subscription Access). | -| [T0146 Account](../../generated_pages/techniques/T0146.md) |  IT00000447 In this article VICE News discusses a report produced by Advance Democracy on people who use Patreon to spread the false claim that an impending ice age will reverse the harms of the ongoing climate crisis:

“The spread of climate misinformation is prolific on social media, as well as on sites like Patreon, where users are actually financially compensated through the platform for spreading falsehoods,” Daniel Jones, president of Advance Democracy, told VICE News.

“Companies hosting and promoting climate misinformation have a responsibility to take action to reduce dangerous misinformation, as falsehoods about climate science are every bit as dangerous as lies about vaccinations and disinformation about our elections.”

Patreon did not respond to VICE News’ request for comment on the report’s findings.

One of the biggest accounts spreading climate conspiracies is ADAPT 2030, which is run by David DuByne, who has 1,100 followers on Patreon. He is currently making over $3,500 every month from his subscribers.

[The science DuByne relies on does not support his hypothesis. However,] this has not prevented DuByne and many others from preying on people’s fears about climate change to spread conspiracies about an impending ice age, which they say will miraculously fix all of earth’s climate problems.

DuByne offers seven different membership levels for supporters, beginning at just $1 per month.

The most expensive costs $100 a month, and gives patrons “a private 20-minute call with David DuByne once per month, to discuss your particular preparedness issues or concerns.” So far just two people are paying this amount.

The researchers also found at least eight other accounts on Patreon that have spread climate change conspiracy theories as part of wider conspiracy sharing, including baseless claims about COVID-19 and the legitimacy of Joe Biden’s presidency. Some of these accounts are earning over $600 per month.


David DuByne created an account on Patreon, which he uses to post text, videos, and podcasts for his subscribers to discuss (T0085: Develop Text-Based Content, T0087: Develop Video-Based Content, T0088: Develop Audio-Based Content, T0146: Account, T0115: Post Content, T0152.012: Subscription Service Platform, T0151.014: Comments Section, T0155.006: Subscription Access). | -| [T0151.014 Comments Section](../../generated_pages/techniques/T0151.014.md) |  IT00000449 In this article VICE News discusses a report produced by Advance Democracy on people who use Patreon to spread the false claim that an impending ice age will reverse the harms of the ongoing climate crisis:

“The spread of climate misinformation is prolific on social media, as well as on sites like Patreon, where users are actually financially compensated through the platform for spreading falsehoods,” Daniel Jones, president of Advance Democracy, told VICE News.

“Companies hosting and promoting climate misinformation have a responsibility to take action to reduce dangerous misinformation, as falsehoods about climate science are every bit as dangerous as lies about vaccinations and disinformation about our elections.”

Patreon did not respond to VICE News’ request for comment on the report’s findings.

One of the biggest accounts spreading climate conspiracies is ADAPT 2030, which is run by David DuByne, who has 1,100 followers on Patreon. He is currently making over $3,500 every month from his subscribers.

[The science DuByne relies on does not support his hypothesis. However,] this has not prevented DuByne and many others from preying on people’s fears about climate change to spread conspiracies about an impending ice age, which they say will miraculously fix all of earth’s climate problems.

DuByne offers seven different membership levels for supporters, beginning at just $1 per month.

The most expensive costs $100 a month, and gives patrons “a private 20-minute call with David DuByne once per month, to discuss your particular preparedness issues or concerns.” So far just two people are paying this amount.

The researchers also found at least eight other accounts on Patreon that have spread climate change conspiracy theories as part of wider conspiracy sharing, including baseless claims about COVID-19 and the legitimacy of Joe Biden’s presidency. Some of these accounts are earning over $600 per month.


David DuByne created an account on Patreon, which he uses to post text, videos, and podcasts for his subscribers to discuss (T0085: Develop Text-Based Content, T0087: Develop Video-Based Content, T0088: Develop Audio-Based Content, T0146: Account, T0115: Post Content, T0152.012: Subscription Service Platform, T0151.014: Comments Section, T0155.006: Subscription Access). | -| [T0152.012 Subscription Service Platform](../../generated_pages/techniques/T0152.012.md) |  IT00000448 In this article VICE News discusses a report produced by Advance Democracy on people who use Patreon to spread the false claim that an impending ice age will reverse the harms of the ongoing climate crisis:

“The spread of climate misinformation is prolific on social media, as well as on sites like Patreon, where users are actually financially compensated through the platform for spreading falsehoods,” Daniel Jones, president of Advance Democracy, told VICE News.

“Companies hosting and promoting climate misinformation have a responsibility to take action to reduce dangerous misinformation, as falsehoods about climate science are every bit as dangerous as lies about vaccinations and disinformation about our elections.”

Patreon did not respond to VICE News’ request for comment on the report’s findings.

One of the biggest accounts spreading climate conspiracies is ADAPT 2030, which is run by David DuByne, who has 1,100 followers on Patreon. He is currently making over $3,500 every month from his subscribers.

[The science DuByne relies on does not support his hypothesis. However,] this has not prevented DuByne and many others from preying on people’s fears about climate change to spread conspiracies about an impending ice age, which they say will miraculously fix all of earth’s climate problems.

DuByne offers seven different membership levels for supporters, beginning at just $1 per month.

The most expensive costs $100 a month, and gives patrons “a private 20-minute call with David DuByne once per month, to discuss your particular preparedness issues or concerns.” So far just two people are paying this amount.

The researchers also found at least eight other accounts on Patreon that have spread climate change conspiracy theories as part of wider conspiracy sharing, including baseless claims about COVID-19 and the legitimacy of Joe Biden’s presidency. Some of these accounts are earning over $600 per month.


David DuByne created an account on Patreon, which he uses to post text, videos, and podcasts for his subscribers to discuss (T0085: Develop Text-Based Content, T0087: Develop Video-Based Content, T0088: Develop Audio-Based Content, T0146: Account, T0115: Post Content, T0152.012: Subscription Service Platform, T0151.014: Comments Section, T0155.006: Subscription Access). | -| [T0155.006 Subscription Access](../../generated_pages/techniques/T0155.006.md) |  IT00000450 In this article VICE News discusses a report produced by Advance Democracy on people who use Patreon to spread the false claim that an impending ice age will reverse the harms of the ongoing climate crisis:

“The spread of climate misinformation is prolific on social media, as well as on sites like Patreon, where users are actually financially compensated through the platform for spreading falsehoods,” Daniel Jones, president of Advance Democracy, told VICE News.

“Companies hosting and promoting climate misinformation have a responsibility to take action to reduce dangerous misinformation, as falsehoods about climate science are every bit as dangerous as lies about vaccinations and disinformation about our elections.”

Patreon did not respond to VICE News’ request for comment on the report’s findings.

One of the biggest accounts spreading climate conspiracies is ADAPT 2030, which is run by David DuByne, who has 1,100 followers on Patreon. He is currently making over $3,500 every month from his subscribers.

[The science DuByne relies on does not support his hypothesis. However,] this has not prevented DuByne and many others from preying on people’s fears about climate change to spread conspiracies about an impending ice age, which they say will miraculously fix all of earth’s climate problems.

DuByne offers seven different membership levels for supporters, beginning at just $1 per month.

The most expensive costs $100 a month, and gives patrons “a private 20-minute call with David DuByne once per month, to discuss your particular preparedness issues or concerns.” So far just two people are paying this amount.

The researchers also found at least eight other accounts on Patreon that have spread climate change conspiracy theories as part of wider conspiracy sharing, including baseless claims about COVID-19 and the legitimacy of Joe Biden’s presidency. Some of these accounts are earning over $600 per month.


David DuByne created an account on Patreon, which he uses to post text, videos, and podcasts for his subscribers to discuss (T0085: Develop Text-Based Content, T0087: Develop Video-Based Content, T0088: Develop Audio-Based Content, T0146: Account, T0115: Post Content, T0152.012: Subscription Service Platform, T0151.014: Comments Section, T0155.006: Subscription Access). | +| [T0085 Develop Text-Based Content](../../generated_pages/techniques/T0085.md) |  IT00000444 In this article VICE News discusses a report produced by Advance Democracy on people who use Patreon to spread the false claim that an impending ice age will reverse the harms of the ongoing climate crisis:

“The spread of climate misinformation is prolific on social media, as well as on sites like Patreon, where users are actually financially compensated through the platform for spreading falsehoods,” Daniel Jones, president of Advance Democracy, told VICE News.

“Companies hosting and promoting climate misinformation have a responsibility to take action to reduce dangerous misinformation, as falsehoods about climate science are every bit as dangerous as lies about vaccinations and disinformation about our elections.”

Patreon did not respond to VICE News’ request for comment on the report’s findings.

One of the biggest accounts spreading climate conspiracies is ADAPT 2030, which is run by David DuByne, who has 1,100 followers on Patreon. He is currently making over $3,500 every month from his subscribers.

[The science DuByne relies on does not support his hypothesis. However,] this has not prevented DuByne and many others from preying on people’s fears about climate change to spread conspiracies about an impending ice age, which they say will miraculously fix all of earth’s climate problems.

DuByne offers seven different membership levels for supporters, beginning at just $1 per month.

The most expensive costs $100 a month, and gives patrons “a private 20-minute call with David DuByne once per month, to discuss your particular preparedness issues or concerns.” So far just two people are paying this amount.

The researchers also found at least eight other accounts on Patreon that have spread climate change conspiracy theories as part of wider conspiracy sharing, including baseless claims about COVID-19 and the legitimacy of Joe Biden’s presidency. Some of these accounts are earning over $600 per month.


David DuByne created an account on Patreon, which he uses to post text, videos, and podcasts for his subscribers to discuss (T0085: Develop Text-Based Content, T0087: Develop Video-Based Content, T0088: Develop Audio-Based Content, T0146: Account Asset, T0115: Post Content, T0152.012: Subscription Service Platform, T0151.014: Comments Section, T0155.006: Subscription Access Asset). | +| [T0087 Develop Video-Based Content](../../generated_pages/techniques/T0087.md) |  IT00000445 In this article VICE News discusses a report produced by Advance Democracy on people who use Patreon to spread the false claim that an impending ice age will reverse the harms of the ongoing climate crisis:

“The spread of climate misinformation is prolific on social media, as well as on sites like Patreon, where users are actually financially compensated through the platform for spreading falsehoods,” Daniel Jones, president of Advance Democracy, told VICE News.

“Companies hosting and promoting climate misinformation have a responsibility to take action to reduce dangerous misinformation, as falsehoods about climate science are every bit as dangerous as lies about vaccinations and disinformation about our elections.”

Patreon did not respond to VICE News’ request for comment on the report’s findings.

One of the biggest accounts spreading climate conspiracies is ADAPT 2030, which is run by David DuByne, who has 1,100 followers on Patreon. He is currently making over $3,500 every month from his subscribers.

[The science DuByne relies on does not support his hypothesis. However,] this has not prevented DuByne and many others from preying on people’s fears about climate change to spread conspiracies about an impending ice age, which they say will miraculously fix all of earth’s climate problems.

DuByne offers seven different membership levels for supporters, beginning at just $1 per month.

The most expensive costs $100 a month, and gives patrons “a private 20-minute call with David DuByne once per month, to discuss your particular preparedness issues or concerns.” So far just two people are paying this amount.

The researchers also found at least eight other accounts on Patreon that have spread climate change conspiracy theories as part of wider conspiracy sharing, including baseless claims about COVID-19 and the legitimacy of Joe Biden’s presidency. Some of these accounts are earning over $600 per month.


David DuByne created an account on Patreon, which he uses to post text, videos, and podcasts for his subscribers to discuss (T0085: Develop Text-Based Content, T0087: Develop Video-Based Content, T0088: Develop Audio-Based Content, T0146: Account Asset, T0115: Post Content, T0152.012: Subscription Service Platform, T0151.014: Comments Section, T0155.006: Subscription Access Asset). | +| [T0088 Develop Audio-Based Content](../../generated_pages/techniques/T0088.md) |  IT00000446 In this article VICE News discusses a report produced by Advance Democracy on people who use Patreon to spread the false claim that an impending ice age will reverse the harms of the ongoing climate crisis:

“The spread of climate misinformation is prolific on social media, as well as on sites like Patreon, where users are actually financially compensated through the platform for spreading falsehoods,” Daniel Jones, president of Advance Democracy, told VICE News.

“Companies hosting and promoting climate misinformation have a responsibility to take action to reduce dangerous misinformation, as falsehoods about climate science are every bit as dangerous as lies about vaccinations and disinformation about our elections.”

Patreon did not respond to VICE News’ request for comment on the report’s findings.

One of the biggest accounts spreading climate conspiracies is ADAPT 2030, which is run by David DuByne, who has 1,100 followers on Patreon. He is currently making over $3,500 every month from his subscribers.

[The science DuByne relies on does not support his hypothesis. However,] this has not prevented DuByne and many others from preying on people’s fears about climate change to spread conspiracies about an impending ice age, which they say will miraculously fix all of earth’s climate problems.

DuByne offers seven different membership levels for supporters, beginning at just $1 per month.

The most expensive costs $100 a month, and gives patrons “a private 20-minute call with David DuByne once per month, to discuss your particular preparedness issues or concerns.” So far just two people are paying this amount.

The researchers also found at least eight other accounts on Patreon that have spread climate change conspiracy theories as part of wider conspiracy sharing, including baseless claims about COVID-19 and the legitimacy of Joe Biden’s presidency. Some of these accounts are earning over $600 per month.


David DuByne created an account on Patreon, which he uses to post text, videos, and podcasts for his subscribers to discuss (T0085: Develop Text-Based Content, T0087: Develop Video-Based Content, T0088: Develop Audio-Based Content, T0146: Account Asset, T0115: Post Content, T0152.012: Subscription Service Platform, T0151.014: Comments Section, T0155.006: Subscription Access Asset). | +| [T0146 Account Asset](../../generated_pages/techniques/T0146.md) |  IT00000447 In this article VICE News discusses a report produced by Advance Democracy on people who use Patreon to spread the false claim that an impending ice age will reverse the harms of the ongoing climate crisis:

“The spread of climate misinformation is prolific on social media, as well as on sites like Patreon, where users are actually financially compensated through the platform for spreading falsehoods,” Daniel Jones, president of Advance Democracy, told VICE News.

“Companies hosting and promoting climate misinformation have a responsibility to take action to reduce dangerous misinformation, as falsehoods about climate science are every bit as dangerous as lies about vaccinations and disinformation about our elections.”

Patreon did not respond to VICE News’ request for comment on the report’s findings.

One of the biggest accounts spreading climate conspiracies is ADAPT 2030, which is run by David DuByne, who has 1,100 followers on Patreon. He is currently making over $3,500 every month from his subscribers.

[The science DuByne relies on does not support his hypothesis. However,] this has not prevented DuByne and many others from preying on people’s fears about climate change to spread conspiracies about an impending ice age, which they say will miraculously fix all of earth’s climate problems.

DuByne offers seven different membership levels for supporters, beginning at just $1 per month.

The most expensive costs $100 a month, and gives patrons “a private 20-minute call with David DuByne once per month, to discuss your particular preparedness issues or concerns.” So far just two people are paying this amount.

The researchers also found at least eight other accounts on Patreon that have spread climate change conspiracy theories as part of wider conspiracy sharing, including baseless claims about COVID-19 and the legitimacy of Joe Biden’s presidency. Some of these accounts are earning over $600 per month.


David DuByne created an account on Patreon, which he uses to post text, videos, and podcasts for his subscribers to discuss (T0085: Develop Text-Based Content, T0087: Develop Video-Based Content, T0088: Develop Audio-Based Content, T0146: Account Asset, T0115: Post Content, T0152.012: Subscription Service Platform, T0151.014: Comments Section, T0155.006: Subscription Access Asset). | +| [T0151.014 Comments Section](../../generated_pages/techniques/T0151.014.md) |  IT00000449 In this article VICE News discusses a report produced by Advance Democracy on people who use Patreon to spread the false claim that an impending ice age will reverse the harms of the ongoing climate crisis:

“The spread of climate misinformation is prolific on social media, as well as on sites like Patreon, where users are actually financially compensated through the platform for spreading falsehoods,” Daniel Jones, president of Advance Democracy, told VICE News.

“Companies hosting and promoting climate misinformation have a responsibility to take action to reduce dangerous misinformation, as falsehoods about climate science are every bit as dangerous as lies about vaccinations and disinformation about our elections.”

Patreon did not respond to VICE News’ request for comment on the report’s findings.

One of the biggest accounts spreading climate conspiracies is ADAPT 2030, which is run by David DuByne, who has 1,100 followers on Patreon. He is currently making over $3,500 every month from his subscribers.

[The science DuByne relies on does not support his hypothesis. However,] this has not prevented DuByne and many others from preying on people’s fears about climate change to spread conspiracies about an impending ice age, which they say will miraculously fix all of earth’s climate problems.

DuByne offers seven different membership levels for supporters, beginning at just $1 per month.

The most expensive costs $100 a month, and gives patrons “a private 20-minute call with David DuByne once per month, to discuss your particular preparedness issues or concerns.” So far just two people are paying this amount.

The researchers also found at least eight other accounts on Patreon that have spread climate change conspiracy theories as part of wider conspiracy sharing, including baseless claims about COVID-19 and the legitimacy of Joe Biden’s presidency. Some of these accounts are earning over $600 per month.


David DuByne created an account on Patreon, which he uses to post text, videos, and podcasts for his subscribers to discuss (T0085: Develop Text-Based Content, T0087: Develop Video-Based Content, T0088: Develop Audio-Based Content, T0146: Account Asset, T0115: Post Content, T0152.012: Subscription Service Platform, T0151.014: Comments Section, T0155.006: Subscription Access Asset). | +| [T0152.012 Subscription Service Platform](../../generated_pages/techniques/T0152.012.md) |  IT00000448 In this article VICE News discusses a report produced by Advance Democracy on people who use Patreon to spread the false claim that an impending ice age will reverse the harms of the ongoing climate crisis:

“The spread of climate misinformation is prolific on social media, as well as on sites like Patreon, where users are actually financially compensated through the platform for spreading falsehoods,” Daniel Jones, president of Advance Democracy, told VICE News.

“Companies hosting and promoting climate misinformation have a responsibility to take action to reduce dangerous misinformation, as falsehoods about climate science are every bit as dangerous as lies about vaccinations and disinformation about our elections.”

Patreon did not respond to VICE News’ request for comment on the report’s findings.

One of the biggest accounts spreading climate conspiracies is ADAPT 2030, which is run by David DuByne, who has 1,100 followers on Patreon. He is currently making over $3,500 every month from his subscribers.

[The science DuByne relies on does not support his hypothesis. However,] this has not prevented DuByne and many others from preying on people’s fears about climate change to spread conspiracies about an impending ice age, which they say will miraculously fix all of earth’s climate problems.

DuByne offers seven different membership levels for supporters, beginning at just $1 per month.

The most expensive costs $100 a month, and gives patrons “a private 20-minute call with David DuByne once per month, to discuss your particular preparedness issues or concerns.” So far just two people are paying this amount.

The researchers also found at least eight other accounts on Patreon that have spread climate change conspiracy theories as part of wider conspiracy sharing, including baseless claims about COVID-19 and the legitimacy of Joe Biden’s presidency. Some of these accounts are earning over $600 per month.


David DuByne created an account on Patreon, which he uses to post text, videos, and podcasts for his subscribers to discuss (T0085: Develop Text-Based Content, T0087: Develop Video-Based Content, T0088: Develop Audio-Based Content, T0146: Account Asset, T0115: Post Content, T0152.012: Subscription Service Platform, T0151.014: Comments Section, T0155.006: Subscription Access Asset). | +| [T0155.006 Subscription Access Asset](../../generated_pages/techniques/T0155.006.md) |  IT00000450 In this article VICE News discusses a report produced by Advance Democracy on people who use Patreon to spread the false claim that an impending ice age will reverse the harms of the ongoing climate crisis:

“The spread of climate misinformation is prolific on social media, as well as on sites like Patreon, where users are actually financially compensated through the platform for spreading falsehoods,” Daniel Jones, president of Advance Democracy, told VICE News.

“Companies hosting and promoting climate misinformation have a responsibility to take action to reduce dangerous misinformation, as falsehoods about climate science are every bit as dangerous as lies about vaccinations and disinformation about our elections.”

Patreon did not respond to VICE News’ request for comment on the report’s findings.

One of the biggest accounts spreading climate conspiracies is ADAPT 2030, which is run by David DuByne, who has 1,100 followers on Patreon. He is currently making over $3,500 every month from his subscribers.

[The science DuByne relies on does not support his hypothesis. However,] this has not prevented DuByne and many others from preying on people’s fears about climate change to spread conspiracies about an impending ice age, which they say will miraculously fix all of earth’s climate problems.

DuByne offers seven different membership levels for supporters, beginning at just $1 per month.

The most expensive costs $100 a month, and gives patrons “a private 20-minute call with David DuByne once per month, to discuss your particular preparedness issues or concerns.” So far just two people are paying this amount.

The researchers also found at least eight other accounts on Patreon that have spread climate change conspiracy theories as part of wider conspiracy sharing, including baseless claims about COVID-19 and the legitimacy of Joe Biden’s presidency. Some of these accounts are earning over $600 per month.


David DuByne created an account on Patreon, which he uses to post text, videos, and podcasts for his subscribers to discuss (T0085: Develop Text-Based Content, T0087: Develop Video-Based Content, T0088: Develop Audio-Based Content, T0146: Account Asset, T0115: Post Content, T0152.012: Subscription Service Platform, T0151.014: Comments Section, T0155.006: Subscription Access Asset). | DO NOT EDIT ABOVE THIS LINE - PLEASE ADD NOTES BELOW \ No newline at end of file diff --git a/generated_pages/incidents/I00112.md b/generated_pages/incidents/I00112.md index ed385cd..7a1df02 100644 --- a/generated_pages/incidents/I00112.md +++ b/generated_pages/incidents/I00112.md @@ -15,14 +15,15 @@ | Reference | Pub Date | Authors | Org | Archive | | --------- | -------- | ------- | --- | ------- | +| [https://www.disinfo.eu/publications/patreon-allows-disinformation-and-conspiracies-to-be-monetised-in-spain/](https://www.disinfo.eu/publications/patreon-allows-disinformation-and-conspiracies-to-be-monetised-in-spain/) | 2020/12/18 | - | EU Disinfo Lab | [https://web.archive.org/web/20201218092320/https://www.disinfo.eu/publications/patreon-allows-disinformation-and-conspiracies-to-be-monetised-in-spain/](https://web.archive.org/web/20201218092320/https://www.disinfo.eu/publications/patreon-allows-disinformation-and-conspiracies-to-be-monetised-in-spain/) | | Technique | Description given for this incident | | --------- | ------------------------- | -| [T0121.001 Bypass Content Blocking](../../generated_pages/techniques/T0121.001.md) |  IT00000452 In this report EU DisinfoLab identified 17 Spanish accounts that monetise and/or spread QAnon content or other conspiracy theories on Patreon. Content produced by these accounts go against Patreon’s stated policy of removing creators that “advance disinformation promoting the QAnon conspiracy theory”. EU DisinfoLab found:

In most cases, the creators monetise the content directly on Patreon (posts are only accessible for people sponsoring the creators) but there are also cases of indirect monetization (monetization through links leading to other platforms), an aspect that was flagged and analysed by Eu DisinfoLab in the mentioned previous report.

Some creators display links that redirects users to other platforms such as YouTube or LBRY where they can monetise their content. Some even offer almost all of their videos for free by redirecting to their YouTube channel.

Another modus operandi is for the creators to advertise on Patreon that they are looking for financing through PayPal or provide the author’s email to explore other financing alternatives.

[...]

Sometimes the content offered for a fee on Patreon is freely accessible on other platforms. Creators openly explain that they seek voluntary donation on Patreon, but that their creations will be public on YouTube. This means that the model of these platforms does not always involve a direct monetisation of the content. Creators who have built a strong reputation previously on other platforms can use Patreon as a platform to get some sponsorship which is not related to the content and give them more freedom to create.

Some users explicitly claim to use Patreon as a secondary channel to evade “censorship” by other platforms such as YouTube. Patreon seems to be perceived as a safe haven for disinformation and fringe content that has been suppressed for violating the policies of other platforms. For example, Jorge Guerra points out how Patreon acts as a back-up channel to go to in case of censorship by YouTube. Meanwhile, Alfa Mind openly claims to use Patreon to publish content that is not allowed on YouTube. “Exclusive access to videos that are prohibited on YouTube. These videos are only accessible on Patreon, as their content is very explicit and shocking”, are offered to the patrons who pay €3 per month.


In spite of Patreon’s stated policy, actors use accounts on their platform to generate revenue or donations for their content, and to provide a space to host content which was removed from other platforms (T0146: Account, T0152.012: Subscription Service Platform, T0121.001: Bypass Content Bocking).

Some actors were observed accepting donations via PayPal (T0146: Account, T0148.003: Payment Processing Platform). | -| [T0148.003 Payment Processing Platform](../../generated_pages/techniques/T0148.003.md) |  IT00000451 In this report EU DisinfoLab identified 17 Spanish accounts that monetise and/or spread QAnon content or other conspiracy theories on Patreon. Content produced by these accounts go against Patreon’s stated policy of removing creators that “advance disinformation promoting the QAnon conspiracy theory”. EU DisinfoLab found:

In most cases, the creators monetise the content directly on Patreon (posts are only accessible for people sponsoring the creators) but there are also cases of indirect monetization (monetization through links leading to other platforms), an aspect that was flagged and analysed by Eu DisinfoLab in the mentioned previous report.

Some creators display links that redirects users to other platforms such as YouTube or LBRY where they can monetise their content. Some even offer almost all of their videos for free by redirecting to their YouTube channel.

Another modus operandi is for the creators to advertise on Patreon that they are looking for financing through PayPal or provide the author’s email to explore other financing alternatives.

[...]

Sometimes the content offered for a fee on Patreon is freely accessible on other platforms. Creators openly explain that they seek voluntary donation on Patreon, but that their creations will be public on YouTube. This means that the model of these platforms does not always involve a direct monetisation of the content. Creators who have built a strong reputation previously on other platforms can use Patreon as a platform to get some sponsorship which is not related to the content and give them more freedom to create.

Some users explicitly claim to use Patreon as a secondary channel to evade “censorship” by other platforms such as YouTube. Patreon seems to be perceived as a safe haven for disinformation and fringe content that has been suppressed for violating the policies of other platforms. For example, Jorge Guerra points out how Patreon acts as a back-up channel to go to in case of censorship by YouTube. Meanwhile, Alfa Mind openly claims to use Patreon to publish content that is not allowed on YouTube. “Exclusive access to videos that are prohibited on YouTube. These videos are only accessible on Patreon, as their content is very explicit and shocking”, are offered to the patrons who pay €3 per month.


In spite of Patreon’s stated policy, actors use accounts on their platform to generate revenue or donations for their content, and to provide a space to host content which was removed from other platforms (T0146: Account, T0152.012: Subscription Service Platform, T0121.001: Bypass Content Bocking).

Some actors were observed accepting donations via PayPal (T0146: Account, T0148.003: Payment Processing Platform). | -| [T0152.012 Subscription Service Platform](../../generated_pages/techniques/T0152.012.md) |  IT00000453 In this report EU DisinfoLab identified 17 Spanish accounts that monetise and/or spread QAnon content or other conspiracy theories on Patreon. Content produced by these accounts go against Patreon’s stated policy of removing creators that “advance disinformation promoting the QAnon conspiracy theory”. EU DisinfoLab found:

In most cases, the creators monetise the content directly on Patreon (posts are only accessible for people sponsoring the creators) but there are also cases of indirect monetization (monetization through links leading to other platforms), an aspect that was flagged and analysed by Eu DisinfoLab in the mentioned previous report.

Some creators display links that redirects users to other platforms such as YouTube or LBRY where they can monetise their content. Some even offer almost all of their videos for free by redirecting to their YouTube channel.

Another modus operandi is for the creators to advertise on Patreon that they are looking for financing through PayPal or provide the author’s email to explore other financing alternatives.

[...]

Sometimes the content offered for a fee on Patreon is freely accessible on other platforms. Creators openly explain that they seek voluntary donation on Patreon, but that their creations will be public on YouTube. This means that the model of these platforms does not always involve a direct monetisation of the content. Creators who have built a strong reputation previously on other platforms can use Patreon as a platform to get some sponsorship which is not related to the content and give them more freedom to create.

Some users explicitly claim to use Patreon as a secondary channel to evade “censorship” by other platforms such as YouTube. Patreon seems to be perceived as a safe haven for disinformation and fringe content that has been suppressed for violating the policies of other platforms. For example, Jorge Guerra points out how Patreon acts as a back-up channel to go to in case of censorship by YouTube. Meanwhile, Alfa Mind openly claims to use Patreon to publish content that is not allowed on YouTube. “Exclusive access to videos that are prohibited on YouTube. These videos are only accessible on Patreon, as their content is very explicit and shocking”, are offered to the patrons who pay €3 per month.


In spite of Patreon’s stated policy, actors use accounts on their platform to generate revenue or donations for their content, and to provide a space to host content which was removed from other platforms (T0146: Account, T0152.012: Subscription Service Platform, T0121.001: Bypass Content Bocking).

Some actors were observed accepting donations via PayPal (T0146: Account, T0148.003: Payment Processing Platform). | +| [T0121.001 Bypass Content Blocking](../../generated_pages/techniques/T0121.001.md) |  IT00000452 In this report EU DisinfoLab identified 17 Spanish accounts that monetise and/or spread QAnon content or other conspiracy theories on Patreon. Content produced by these accounts go against Patreon’s stated policy of removing creators that “advance disinformation promoting the QAnon conspiracy theory”. EU DisinfoLab found:

In most cases, the creators monetise the content directly on Patreon (posts are only accessible for people sponsoring the creators) but there are also cases of indirect monetization (monetization through links leading to other platforms), an aspect that was flagged and analysed by Eu DisinfoLab in the mentioned previous report.

Some creators display links that redirects users to other platforms such as YouTube or LBRY where they can monetise their content. Some even offer almost all of their videos for free by redirecting to their YouTube channel.

Another modus operandi is for the creators to advertise on Patreon that they are looking for financing through PayPal or provide the author’s email to explore other financing alternatives.

[...]

Sometimes the content offered for a fee on Patreon is freely accessible on other platforms. Creators openly explain that they seek voluntary donation on Patreon, but that their creations will be public on YouTube. This means that the model of these platforms does not always involve a direct monetisation of the content. Creators who have built a strong reputation previously on other platforms can use Patreon as a platform to get some sponsorship which is not related to the content and give them more freedom to create.

Some users explicitly claim to use Patreon as a secondary channel to evade “censorship” by other platforms such as YouTube. Patreon seems to be perceived as a safe haven for disinformation and fringe content that has been suppressed for violating the policies of other platforms. For example, Jorge Guerra points out how Patreon acts as a back-up channel to go to in case of censorship by YouTube. Meanwhile, Alfa Mind openly claims to use Patreon to publish content that is not allowed on YouTube. “Exclusive access to videos that are prohibited on YouTube. These videos are only accessible on Patreon, as their content is very explicit and shocking”, are offered to the patrons who pay €3 per month.


In spite of Patreon’s stated policy, actors use accounts on their platform to generate revenue or donations for their content, and to provide a space to host content which was removed from other platforms (T0146: Account Asset, T0152.012: Subscription Service Platform, T0121.001: Bypass Content Bocking).

Some actors were observed accepting donations via PayPal (T0146: Account Asset, T0148.003: Payment Processing Platform). | +| [T0148.003 Payment Processing Platform](../../generated_pages/techniques/T0148.003.md) |  IT00000451 In this report EU DisinfoLab identified 17 Spanish accounts that monetise and/or spread QAnon content or other conspiracy theories on Patreon. Content produced by these accounts go against Patreon’s stated policy of removing creators that “advance disinformation promoting the QAnon conspiracy theory”. EU DisinfoLab found:

In most cases, the creators monetise the content directly on Patreon (posts are only accessible for people sponsoring the creators) but there are also cases of indirect monetization (monetization through links leading to other platforms), an aspect that was flagged and analysed by Eu DisinfoLab in the mentioned previous report.

Some creators display links that redirects users to other platforms such as YouTube or LBRY where they can monetise their content. Some even offer almost all of their videos for free by redirecting to their YouTube channel.

Another modus operandi is for the creators to advertise on Patreon that they are looking for financing through PayPal or provide the author’s email to explore other financing alternatives.

[...]

Sometimes the content offered for a fee on Patreon is freely accessible on other platforms. Creators openly explain that they seek voluntary donation on Patreon, but that their creations will be public on YouTube. This means that the model of these platforms does not always involve a direct monetisation of the content. Creators who have built a strong reputation previously on other platforms can use Patreon as a platform to get some sponsorship which is not related to the content and give them more freedom to create.

Some users explicitly claim to use Patreon as a secondary channel to evade “censorship” by other platforms such as YouTube. Patreon seems to be perceived as a safe haven for disinformation and fringe content that has been suppressed for violating the policies of other platforms. For example, Jorge Guerra points out how Patreon acts as a back-up channel to go to in case of censorship by YouTube. Meanwhile, Alfa Mind openly claims to use Patreon to publish content that is not allowed on YouTube. “Exclusive access to videos that are prohibited on YouTube. These videos are only accessible on Patreon, as their content is very explicit and shocking”, are offered to the patrons who pay €3 per month.


In spite of Patreon’s stated policy, actors use accounts on their platform to generate revenue or donations for their content, and to provide a space to host content which was removed from other platforms (T0146: Account Asset, T0152.012: Subscription Service Platform, T0121.001: Bypass Content Bocking).

Some actors were observed accepting donations via PayPal (T0146: Account Asset, T0148.003: Payment Processing Platform). | +| [T0152.012 Subscription Service Platform](../../generated_pages/techniques/T0152.012.md) |  IT00000453 In this report EU DisinfoLab identified 17 Spanish accounts that monetise and/or spread QAnon content or other conspiracy theories on Patreon. Content produced by these accounts go against Patreon’s stated policy of removing creators that “advance disinformation promoting the QAnon conspiracy theory”. EU DisinfoLab found:

In most cases, the creators monetise the content directly on Patreon (posts are only accessible for people sponsoring the creators) but there are also cases of indirect monetization (monetization through links leading to other platforms), an aspect that was flagged and analysed by Eu DisinfoLab in the mentioned previous report.

Some creators display links that redirects users to other platforms such as YouTube or LBRY where they can monetise their content. Some even offer almost all of their videos for free by redirecting to their YouTube channel.

Another modus operandi is for the creators to advertise on Patreon that they are looking for financing through PayPal or provide the author’s email to explore other financing alternatives.

[...]

Sometimes the content offered for a fee on Patreon is freely accessible on other platforms. Creators openly explain that they seek voluntary donation on Patreon, but that their creations will be public on YouTube. This means that the model of these platforms does not always involve a direct monetisation of the content. Creators who have built a strong reputation previously on other platforms can use Patreon as a platform to get some sponsorship which is not related to the content and give them more freedom to create.

Some users explicitly claim to use Patreon as a secondary channel to evade “censorship” by other platforms such as YouTube. Patreon seems to be perceived as a safe haven for disinformation and fringe content that has been suppressed for violating the policies of other platforms. For example, Jorge Guerra points out how Patreon acts as a back-up channel to go to in case of censorship by YouTube. Meanwhile, Alfa Mind openly claims to use Patreon to publish content that is not allowed on YouTube. “Exclusive access to videos that are prohibited on YouTube. These videos are only accessible on Patreon, as their content is very explicit and shocking”, are offered to the patrons who pay €3 per month.


In spite of Patreon’s stated policy, actors use accounts on their platform to generate revenue or donations for their content, and to provide a space to host content which was removed from other platforms (T0146: Account Asset, T0152.012: Subscription Service Platform, T0121.001: Bypass Content Bocking).

Some actors were observed accepting donations via PayPal (T0146: Account Asset, T0148.003: Payment Processing Platform). | DO NOT EDIT ABOVE THIS LINE - PLEASE ADD NOTES BELOW \ No newline at end of file diff --git a/generated_pages/incidents/I00113.md b/generated_pages/incidents/I00113.md index c5d0991..6626ab0 100644 --- a/generated_pages/incidents/I00113.md +++ b/generated_pages/incidents/I00113.md @@ -15,21 +15,22 @@ | Reference | Pub Date | Authors | Org | Archive | | --------- | -------- | ------- | --- | ------- | +| [https://assets.mofoprod.net/network/documents/Report_Inside_the_shadowy_world_of_disinformation_for_hire_in_Kenya_5._hcc.pdf](https://assets.mofoprod.net/network/documents/Report_Inside_the_shadowy_world_of_disinformation_for_hire_in_Kenya_5._hcc.pdf) | 2021/09/03 | - | Mozilla | [https://web.archive.org/web/20240927031830/https://assets.mofoprod.net/network/documents/Report_Inside_the_shadowy_world_of_disinformation_for_hire_in_Kenya_5._hcc.pdf](https://web.archive.org/web/20240927031830/https://assets.mofoprod.net/network/documents/Report_Inside_the_shadowy_world_of_disinformation_for_hire_in_Kenya_5._hcc.pdf) | | Technique | Description given for this incident | | --------- | ------------------------- | -| [T0121 Manipulate Platform Algorithm](../../generated_pages/techniques/T0121.md) |  IT00000459 Researchers at Mozilla examined influence operations targeting Kenyan citizens on Twitter in 2021, providing “a grim window into the booming and shadowy industry of Twitter influencers for political hire here in Kenya”, and giving insight into operations’ operationalisation:

In our interviews with one of the influencers, they informed us of the agile tactics they use to organize and avoid detection. For example, when it’s time to carry out the campaign the influencers would be added to a Whatsapp group. Here, they received direction about what to post, the hashtags to use, which tweets to engage with and who to target. Synchronizing the tweets was also incredibly important for them. It’s what enables them to achieve their goal of trending on Twitter and gain amplification.

[...]

They revealed to us that those participating in the exercise are paid roughly between $10 and $15 to participate in three campaigns per day. Each campaign execution involves tweeting about the hashtags of the day until it appears on the trending section of Twitter. Additionally, some individuals have managed to reach retainer level and get paid about $250 per month. Their job is to make sure the campaigns are executed on a day-by-day basis with different hashtags.


An M-PESA account (T0148.002: Bank Account, T0148.001: Online Banking Platform) was used to pay campaign participants.

Participants were organised in WhatsApp groups (T0129.005: Coordinate on Encrypted/Closed Networks T0151.007: Chat Broadcast Group, T0151.004: Chat Platform), in which they planned how to get campaign content trending on Twitter (T0121: Manipulate Platform Algorithm, T0151.008: Microblogging Platform). | -| [T0129.005 Coordinate on Encrypted/Closed Networks](../../generated_pages/techniques/T0129.005.md) |  IT00000456 Researchers at Mozilla examined influence operations targeting Kenyan citizens on Twitter in 2021, providing “a grim window into the booming and shadowy industry of Twitter influencers for political hire here in Kenya”, and giving insight into operations’ operationalisation:

In our interviews with one of the influencers, they informed us of the agile tactics they use to organize and avoid detection. For example, when it’s time to carry out the campaign the influencers would be added to a Whatsapp group. Here, they received direction about what to post, the hashtags to use, which tweets to engage with and who to target. Synchronizing the tweets was also incredibly important for them. It’s what enables them to achieve their goal of trending on Twitter and gain amplification.

[...]

They revealed to us that those participating in the exercise are paid roughly between $10 and $15 to participate in three campaigns per day. Each campaign execution involves tweeting about the hashtags of the day until it appears on the trending section of Twitter. Additionally, some individuals have managed to reach retainer level and get paid about $250 per month. Their job is to make sure the campaigns are executed on a day-by-day basis with different hashtags.


An M-PESA account (T0148.002: Bank Account, T0148.001: Online Banking Platform) was used to pay campaign participants.

Participants were organised in WhatsApp groups (T0129.005: Coordinate on Encrypted/Closed Networks, T0151.007: Chat Broadcast Group, T0151.004: Chat Platform), in which they planned how to get campaign content trending on Twitter (T0121: Manipulate Platform Algorithm, T0151.008: Microblogging Platform). | -| [T0146.003 Verified Account](../../generated_pages/techniques/T0146.003.md) |  IT00000461 Researchers at Mozilla examined influence operations targeting Kenyan citizens on Twitter in 2021, providing “a grim window into the booming and shadowy industry of Twitter influencers for political hire here in Kenya”. The report touches upon how actors gained access to twitter accounts, and what personas they presented:

Verified accounts are complicit. One influencer we spoke to mentioned that the people who own coveted “blue check” accounts will often rent them out for disinformation campaigns. These verified accounts can improve the campaign’s chances of trending. Says one interviewee: “The owner of the account usually receives a cut of the campaign loot”.

[...]

Many of the accounts we examined appear to give an aura of authenticity, but in reality they are not authentic. Simply looking at their date of creation won’t give you a hint as to their purpose. We had to dig deeper. The profile pictures and content of some of the accounts gave us the answers we were looking for. A common tactic these accounts utilize is using suggestive pictures of women to bait men into following them, or at least pay attention. In terms of content, many of these accounts tweeted off the same hashtags for days on end and will constantly retweet a specific set of accounts.


Actors participating in this operation rented out verified Twitter accounts (in 2021 a checkmark on Twitter verified a user’s identity), which were repurposed and used updated account imagery (T0146.003: Verified Account, T0150.007: Rented, T0150.004: Repurposed, T00145.006: Attractive Person Account Imagery). | -| [T0148.001 Online Banking Platform](../../generated_pages/techniques/T0148.001.md) |  IT00000455 Researchers at Mozilla examined influence operations targeting Kenyan citizens on Twitter in 2021, providing “a grim window into the booming and shadowy industry of Twitter influencers for political hire here in Kenya”, and giving insight into operations’ operationalisation:

In our interviews with one of the influencers, they informed us of the agile tactics they use to organize and avoid detection. For example, when it’s time to carry out the campaign the influencers would be added to a Whatsapp group. Here, they received direction about what to post, the hashtags to use, which tweets to engage with and who to target. Synchronizing the tweets was also incredibly important for them. It’s what enables them to achieve their goal of trending on Twitter and gain amplification.

[...]

They revealed to us that those participating in the exercise are paid roughly between $10 and $15 to participate in three campaigns per day. Each campaign execution involves tweeting about the hashtags of the day until it appears on the trending section of Twitter. Additionally, some individuals have managed to reach retainer level and get paid about $250 per month. Their job is to make sure the campaigns are executed on a day-by-day basis with different hashtags.


An M-PESA account (T0148.002: Bank Account, T0148.001: Online Banking Platform) was used to pay campaign participants.

Participants were organised in WhatsApp groups (T0129.005: Coordinate on Encrypted/Closed Networks, T0151.007: Chat Broadcast Group, T0151.004: Chat Platform), in which they planned how to get campaign content trending on Twitter (T0121: Manipulate Platform Algorithm, T0151.008: Microblogging Platform). | -| [T0148.002 Bank Account](../../generated_pages/techniques/T0148.002.md) |  IT00000454 Researchers at Mozilla examined influence operations targeting Kenyan citizens on Twitter in 2021, providing “a grim window into the booming and shadowy industry of Twitter influencers for political hire here in Kenya”, and giving insight into operations’ operationalisation:

In our interviews with one of the influencers, they informed us of the agile tactics they use to organize and avoid detection. For example, when it’s time to carry out the campaign the influencers would be added to a Whatsapp group. Here, they received direction about what to post, the hashtags to use, which tweets to engage with and who to target. Synchronizing the tweets was also incredibly important for them. It’s what enables them to achieve their goal of trending on Twitter and gain amplification.

[...]

They revealed to us that those participating in the exercise are paid roughly between $10 and $15 to participate in three campaigns per day. Each campaign execution involves tweeting about the hashtags of the day until it appears on the trending section of Twitter. Additionally, some individuals have managed to reach retainer level and get paid about $250 per month. Their job is to make sure the campaigns are executed on a day-by-day basis with different hashtags.


An M-PESA account (T0148.002: Bank Account, T0148.001: Online Banking Platform) was used to pay campaign participants.

Participants were organised in WhatsApp groups (T0129.005: Coordinate on Encrypted/Closed Networks, T0151.007: Chat Broadcast Group, T0151.004: Chat Platform), in which they planned how to get campaign content trending on Twitter (T0121: Manipulate Platform Algorithm, T0151.008: Microblogging Platform). | -| [T0150.004 Repurposed](../../generated_pages/techniques/T0150.004.md) |  IT00000463 Researchers at Mozilla examined influence operations targeting Kenyan citizens on Twitter in 2021, providing “a grim window into the booming and shadowy industry of Twitter influencers for political hire here in Kenya”. The report touches upon how actors gained access to twitter accounts, and what personas they presented:

Verified accounts are complicit. One influencer we spoke to mentioned that the people who own coveted “blue check” accounts will often rent them out for disinformation campaigns. These verified accounts can improve the campaign’s chances of trending. Says one interviewee: “The owner of the account usually receives a cut of the campaign loot”.

[...]

Many of the accounts we examined appear to give an aura of authenticity, but in reality they are not authentic. Simply looking at their date of creation won’t give you a hint as to their purpose. We had to dig deeper. The profile pictures and content of some of the accounts gave us the answers we were looking for. A common tactic these accounts utilize is using suggestive pictures of women to bait men into following them, or at least pay attention. In terms of content, many of these accounts tweeted off the same hashtags for days on end and will constantly retweet a specific set of accounts.


Actors participating in this operation rented out verified Twitter accounts (in 2021 a checkmark on Twitter verified a user’s identity), which were repurposed and used updated account imagery (T0146.003: Verified Account, T0150.007: Rented, T0150.004: Repurposed, T00145.006: Attractive Person Account Imagery). | -| [T0150.007 Rented](../../generated_pages/techniques/T0150.007.md) |  IT00000462 Researchers at Mozilla examined influence operations targeting Kenyan citizens on Twitter in 2021, providing “a grim window into the booming and shadowy industry of Twitter influencers for political hire here in Kenya”. The report touches upon how actors gained access to twitter accounts, and what personas they presented:

Verified accounts are complicit. One influencer we spoke to mentioned that the people who own coveted “blue check” accounts will often rent them out for disinformation campaigns. These verified accounts can improve the campaign’s chances of trending. Says one interviewee: “The owner of the account usually receives a cut of the campaign loot”.

[...]

Many of the accounts we examined appear to give an aura of authenticity, but in reality they are not authentic. Simply looking at their date of creation won’t give you a hint as to their purpose. We had to dig deeper. The profile pictures and content of some of the accounts gave us the answers we were looking for. A common tactic these accounts utilize is using suggestive pictures of women to bait men into following them, or at least pay attention. In terms of content, many of these accounts tweeted off the same hashtags for days on end and will constantly retweet a specific set of accounts.


Actors participating in this operation rented out verified Twitter accounts (in 2021 a checkmark on Twitter verified a user’s identity), which were repurposed and used updated account imagery (T0146.003: Verified Account, T0150.007: Rented, T0150.004: Repurposed, T00145.006: Attractive Person Account Imagery). | -| [T0151.004 Chat Platform](../../generated_pages/techniques/T0151.004.md) |  IT00000458 Researchers at Mozilla examined influence operations targeting Kenyan citizens on Twitter in 2021, providing “a grim window into the booming and shadowy industry of Twitter influencers for political hire here in Kenya”, and giving insight into operations’ operationalisation:

In our interviews with one of the influencers, they informed us of the agile tactics they use to organize and avoid detection. For example, when it’s time to carry out the campaign the influencers would be added to a Whatsapp group. Here, they received direction about what to post, the hashtags to use, which tweets to engage with and who to target. Synchronizing the tweets was also incredibly important for them. It’s what enables them to achieve their goal of trending on Twitter and gain amplification.

[...]

They revealed to us that those participating in the exercise are paid roughly between $10 and $15 to participate in three campaigns per day. Each campaign execution involves tweeting about the hashtags of the day until it appears on the trending section of Twitter. Additionally, some individuals have managed to reach retainer level and get paid about $250 per month. Their job is to make sure the campaigns are executed on a day-by-day basis with different hashtags.


An M-PESA account (T0148.002: Bank Account, T0148.001: Online Banking Platform) was used to pay campaign participants.

Participants were organised in WhatsApp groups (T0129.005: Coordinate on Encrypted/Closed Networks, T0151.007: Chat Broadcast Group, T0151.004: Chat Platform), in which they planned how to get campaign content trending on Twitter (T0121: Manipulate Platform Algorithm, T0151.008: Microblogging Platform). | -| [T0151.007 Chat Broadcast Group](../../generated_pages/techniques/T0151.007.md) |  IT00000457 Researchers at Mozilla examined influence operations targeting Kenyan citizens on Twitter in 2021, providing “a grim window into the booming and shadowy industry of Twitter influencers for political hire here in Kenya”, and giving insight into operations’ operationalisation:

In our interviews with one of the influencers, they informed us of the agile tactics they use to organize and avoid detection. For example, when it’s time to carry out the campaign the influencers would be added to a Whatsapp group. Here, they received direction about what to post, the hashtags to use, which tweets to engage with and who to target. Synchronizing the tweets was also incredibly important for them. It’s what enables them to achieve their goal of trending on Twitter and gain amplification.

[...]

They revealed to us that those participating in the exercise are paid roughly between $10 and $15 to participate in three campaigns per day. Each campaign execution involves tweeting about the hashtags of the day until it appears on the trending section of Twitter. Additionally, some individuals have managed to reach retainer level and get paid about $250 per month. Their job is to make sure the campaigns are executed on a day-by-day basis with different hashtags.


An M-PESA account (T0148.002: Bank Account, T0148.001: Online Banking Platform) was used to pay campaign participants.

Participants were organised in WhatsApp groups (T0129.005: Coordinate on Encrypted/Closed Networks, T0151.007: Chat Broadcast Group, T0151.004: Chat Platform), in which they planned how to get campaign content trending on Twitter (T0121: Manipulate Platform Algorithm, T0151.008: Microblogging Platform). | -| [T0151.008 Microblogging Platform](../../generated_pages/techniques/T0151.008.md) |  IT00000460 Researchers at Mozilla examined influence operations targeting Kenyan citizens on Twitter in 2021, providing “a grim window into the booming and shadowy industry of Twitter influencers for political hire here in Kenya”, and giving insight into operations’ operationalisation:

In our interviews with one of the influencers, they informed us of the agile tactics they use to organize and avoid detection. For example, when it’s time to carry out the campaign the influencers would be added to a Whatsapp group. Here, they received direction about what to post, the hashtags to use, which tweets to engage with and who to target. Synchronizing the tweets was also incredibly important for them. It’s what enables them to achieve their goal of trending on Twitter and gain amplification.

[...]

They revealed to us that those participating in the exercise are paid roughly between $10 and $15 to participate in three campaigns per day. Each campaign execution involves tweeting about the hashtags of the day until it appears on the trending section of Twitter. Additionally, some individuals have managed to reach retainer level and get paid about $250 per month. Their job is to make sure the campaigns are executed on a day-by-day basis with different hashtags.


An M-PESA account (T0148.002: Bank Account, T0148.001: Online Banking Platform) was used to pay campaign participants.

Participants were organised in WhatsApp groups (T0129.005: Coordinate on Encrypted/Closed Networks, T0151.007: Chat Broadcast Group, T0151.004: Chat Platform), in which they planned how to get campaign content trending on Twitter (T0121: Manipulate Platform Algorithm, T0151.008: Microblogging Platform). | +| [T0121 Manipulate Platform Algorithm](../../generated_pages/techniques/T0121.md) |  IT00000459 Researchers at Mozilla examined influence operations targeting Kenyan citizens on Twitter in 2021, providing “a grim window into the booming and shadowy industry of Twitter influencers for political hire here in Kenya”, and giving insight into operations’ operationalisation:

In our interviews with one of the influencers, they informed us of the agile tactics they use to organize and avoid detection. For example, when it’s time to carry out the campaign the influencers would be added to a Whatsapp group. Here, they received direction about what to post, the hashtags to use, which tweets to engage with and who to target. Synchronizing the tweets was also incredibly important for them. It’s what enables them to achieve their goal of trending on Twitter and gain amplification.

[...]

They revealed to us that those participating in the exercise are paid roughly between $10 and $15 to participate in three campaigns per day. Each campaign execution involves tweeting about the hashtags of the day until it appears on the trending section of Twitter. Additionally, some individuals have managed to reach retainer level and get paid about $250 per month. Their job is to make sure the campaigns are executed on a day-by-day basis with different hashtags.


An M-PESA account (T0148.002: Bank Account Asset, T0148.001: Online Banking Platform) was used to pay campaign participants.

Participants were organised in WhatsApp groups (T0129.005: Coordinate on Encrypted/Closed Networks T0151.007: Chat Broadcast Group, T0151.004: Chat Platform), in which they planned how to get campaign content trending on Twitter (T0121: Manipulate Platform Algorithm, T0151.008: Microblogging Platform). | +| [T0129.005 Coordinate on Encrypted/Closed Networks](../../generated_pages/techniques/T0129.005.md) |  IT00000456 Researchers at Mozilla examined influence operations targeting Kenyan citizens on Twitter in 2021, providing “a grim window into the booming and shadowy industry of Twitter influencers for political hire here in Kenya”, and giving insight into operations’ operationalisation:

In our interviews with one of the influencers, they informed us of the agile tactics they use to organize and avoid detection. For example, when it’s time to carry out the campaign the influencers would be added to a Whatsapp group. Here, they received direction about what to post, the hashtags to use, which tweets to engage with and who to target. Synchronizing the tweets was also incredibly important for them. It’s what enables them to achieve their goal of trending on Twitter and gain amplification.

[...]

They revealed to us that those participating in the exercise are paid roughly between $10 and $15 to participate in three campaigns per day. Each campaign execution involves tweeting about the hashtags of the day until it appears on the trending section of Twitter. Additionally, some individuals have managed to reach retainer level and get paid about $250 per month. Their job is to make sure the campaigns are executed on a day-by-day basis with different hashtags.


An M-PESA account (T0148.002: Bank Account Asset, T0148.001: Online Banking Platform) was used to pay campaign participants.

Participants were organised in WhatsApp groups (T0129.005: Coordinate on Encrypted/Closed Networks, T0151.007: Chat Broadcast Group, T0151.004: Chat Platform), in which they planned how to get campaign content trending on Twitter (T0121: Manipulate Platform Algorithm, T0151.008: Microblogging Platform). | +| [T0146.003 Verified Account Asset](../../generated_pages/techniques/T0146.003.md) |  IT00000461 Researchers at Mozilla examined influence operations targeting Kenyan citizens on Twitter in 2021, providing “a grim window into the booming and shadowy industry of Twitter influencers for political hire here in Kenya”. The report touches upon how actors gained access to twitter accounts, and what personas they presented:

Verified accounts are complicit. One influencer we spoke to mentioned that the people who own coveted “blue check” accounts will often rent them out for disinformation campaigns. These verified accounts can improve the campaign’s chances of trending. Says one interviewee: “The owner of the account usually receives a cut of the campaign loot”.

[...]

Many of the accounts we examined appear to give an aura of authenticity, but in reality they are not authentic. Simply looking at their date of creation won’t give you a hint as to their purpose. We had to dig deeper. The profile pictures and content of some of the accounts gave us the answers we were looking for. A common tactic these accounts utilize is using suggestive pictures of women to bait men into following them, or at least pay attention. In terms of content, many of these accounts tweeted off the same hashtags for days on end and will constantly retweet a specific set of accounts.


Actors participating in this operation rented out verified Twitter accounts (in 2021 a checkmark on Twitter verified a user’s identity), which were repurposed and used updated account imagery (T0146.003: Verified Account Asset, T0150.007: Rented Asset, T0150.004: Repurposed Asset, T00145.006: Attractive Person Account Imagery). | +| [T0148.001 Online Banking Platform](../../generated_pages/techniques/T0148.001.md) |  IT00000455 Researchers at Mozilla examined influence operations targeting Kenyan citizens on Twitter in 2021, providing “a grim window into the booming and shadowy industry of Twitter influencers for political hire here in Kenya”, and giving insight into operations’ operationalisation:

In our interviews with one of the influencers, they informed us of the agile tactics they use to organize and avoid detection. For example, when it’s time to carry out the campaign the influencers would be added to a Whatsapp group. Here, they received direction about what to post, the hashtags to use, which tweets to engage with and who to target. Synchronizing the tweets was also incredibly important for them. It’s what enables them to achieve their goal of trending on Twitter and gain amplification.

[...]

They revealed to us that those participating in the exercise are paid roughly between $10 and $15 to participate in three campaigns per day. Each campaign execution involves tweeting about the hashtags of the day until it appears on the trending section of Twitter. Additionally, some individuals have managed to reach retainer level and get paid about $250 per month. Their job is to make sure the campaigns are executed on a day-by-day basis with different hashtags.


An M-PESA account (T0148.002: Bank Account Asset, T0148.001: Online Banking Platform) was used to pay campaign participants.

Participants were organised in WhatsApp groups (T0129.005: Coordinate on Encrypted/Closed Networks, T0151.007: Chat Broadcast Group, T0151.004: Chat Platform), in which they planned how to get campaign content trending on Twitter (T0121: Manipulate Platform Algorithm, T0151.008: Microblogging Platform). | +| [T0148.002 Bank Account Asset](../../generated_pages/techniques/T0148.002.md) |  IT00000454 Researchers at Mozilla examined influence operations targeting Kenyan citizens on Twitter in 2021, providing “a grim window into the booming and shadowy industry of Twitter influencers for political hire here in Kenya”, and giving insight into operations’ operationalisation:

In our interviews with one of the influencers, they informed us of the agile tactics they use to organize and avoid detection. For example, when it’s time to carry out the campaign the influencers would be added to a Whatsapp group. Here, they received direction about what to post, the hashtags to use, which tweets to engage with and who to target. Synchronizing the tweets was also incredibly important for them. It’s what enables them to achieve their goal of trending on Twitter and gain amplification.

[...]

They revealed to us that those participating in the exercise are paid roughly between $10 and $15 to participate in three campaigns per day. Each campaign execution involves tweeting about the hashtags of the day until it appears on the trending section of Twitter. Additionally, some individuals have managed to reach retainer level and get paid about $250 per month. Their job is to make sure the campaigns are executed on a day-by-day basis with different hashtags.


An M-PESA account (T0148.002: Bank Account Asset, T0148.001: Online Banking Platform) was used to pay campaign participants.

Participants were organised in WhatsApp groups (T0129.005: Coordinate on Encrypted/Closed Networks, T0151.007: Chat Broadcast Group, T0151.004: Chat Platform), in which they planned how to get campaign content trending on Twitter (T0121: Manipulate Platform Algorithm, T0151.008: Microblogging Platform). | +| [T0150.004 Repurposed Asset](../../generated_pages/techniques/T0150.004.md) |  IT00000463 Researchers at Mozilla examined influence operations targeting Kenyan citizens on Twitter in 2021, providing “a grim window into the booming and shadowy industry of Twitter influencers for political hire here in Kenya”. The report touches upon how actors gained access to twitter accounts, and what personas they presented:

Verified accounts are complicit. One influencer we spoke to mentioned that the people who own coveted “blue check” accounts will often rent them out for disinformation campaigns. These verified accounts can improve the campaign’s chances of trending. Says one interviewee: “The owner of the account usually receives a cut of the campaign loot”.

[...]

Many of the accounts we examined appear to give an aura of authenticity, but in reality they are not authentic. Simply looking at their date of creation won’t give you a hint as to their purpose. We had to dig deeper. The profile pictures and content of some of the accounts gave us the answers we were looking for. A common tactic these accounts utilize is using suggestive pictures of women to bait men into following them, or at least pay attention. In terms of content, many of these accounts tweeted off the same hashtags for days on end and will constantly retweet a specific set of accounts.


Actors participating in this operation rented out verified Twitter accounts (in 2021 a checkmark on Twitter verified a user’s identity), which were repurposed and used updated account imagery (T0146.003: Verified Account Asset, T0150.007: Rented Asset, T0150.004: Repurposed Asset, T00145.006: Attractive Person Account Imagery). | +| [T0150.007 Rented Asset](../../generated_pages/techniques/T0150.007.md) |  IT00000462 Researchers at Mozilla examined influence operations targeting Kenyan citizens on Twitter in 2021, providing “a grim window into the booming and shadowy industry of Twitter influencers for political hire here in Kenya”. The report touches upon how actors gained access to twitter accounts, and what personas they presented:

Verified accounts are complicit. One influencer we spoke to mentioned that the people who own coveted “blue check” accounts will often rent them out for disinformation campaigns. These verified accounts can improve the campaign’s chances of trending. Says one interviewee: “The owner of the account usually receives a cut of the campaign loot”.

[...]

Many of the accounts we examined appear to give an aura of authenticity, but in reality they are not authentic. Simply looking at their date of creation won’t give you a hint as to their purpose. We had to dig deeper. The profile pictures and content of some of the accounts gave us the answers we were looking for. A common tactic these accounts utilize is using suggestive pictures of women to bait men into following them, or at least pay attention. In terms of content, many of these accounts tweeted off the same hashtags for days on end and will constantly retweet a specific set of accounts.


Actors participating in this operation rented out verified Twitter accounts (in 2021 a checkmark on Twitter verified a user’s identity), which were repurposed and used updated account imagery (T0146.003: Verified Account Asset, T0150.007: Rented Asset, T0150.004: Repurposed Asset, T00145.006: Attractive Person Account Imagery). | +| [T0151.004 Chat Platform](../../generated_pages/techniques/T0151.004.md) |  IT00000458 Researchers at Mozilla examined influence operations targeting Kenyan citizens on Twitter in 2021, providing “a grim window into the booming and shadowy industry of Twitter influencers for political hire here in Kenya”, and giving insight into operations’ operationalisation:

In our interviews with one of the influencers, they informed us of the agile tactics they use to organize and avoid detection. For example, when it’s time to carry out the campaign the influencers would be added to a Whatsapp group. Here, they received direction about what to post, the hashtags to use, which tweets to engage with and who to target. Synchronizing the tweets was also incredibly important for them. It’s what enables them to achieve their goal of trending on Twitter and gain amplification.

[...]

They revealed to us that those participating in the exercise are paid roughly between $10 and $15 to participate in three campaigns per day. Each campaign execution involves tweeting about the hashtags of the day until it appears on the trending section of Twitter. Additionally, some individuals have managed to reach retainer level and get paid about $250 per month. Their job is to make sure the campaigns are executed on a day-by-day basis with different hashtags.


An M-PESA account (T0148.002: Bank Account Asset, T0148.001: Online Banking Platform) was used to pay campaign participants.

Participants were organised in WhatsApp groups (T0129.005: Coordinate on Encrypted/Closed Networks, T0151.007: Chat Broadcast Group, T0151.004: Chat Platform), in which they planned how to get campaign content trending on Twitter (T0121: Manipulate Platform Algorithm, T0151.008: Microblogging Platform). | +| [T0151.007 Chat Broadcast Group](../../generated_pages/techniques/T0151.007.md) |  IT00000457 Researchers at Mozilla examined influence operations targeting Kenyan citizens on Twitter in 2021, providing “a grim window into the booming and shadowy industry of Twitter influencers for political hire here in Kenya”, and giving insight into operations’ operationalisation:

In our interviews with one of the influencers, they informed us of the agile tactics they use to organize and avoid detection. For example, when it’s time to carry out the campaign the influencers would be added to a Whatsapp group. Here, they received direction about what to post, the hashtags to use, which tweets to engage with and who to target. Synchronizing the tweets was also incredibly important for them. It’s what enables them to achieve their goal of trending on Twitter and gain amplification.

[...]

They revealed to us that those participating in the exercise are paid roughly between $10 and $15 to participate in three campaigns per day. Each campaign execution involves tweeting about the hashtags of the day until it appears on the trending section of Twitter. Additionally, some individuals have managed to reach retainer level and get paid about $250 per month. Their job is to make sure the campaigns are executed on a day-by-day basis with different hashtags.


An M-PESA account (T0148.002: Bank Account Asset, T0148.001: Online Banking Platform) was used to pay campaign participants.

Participants were organised in WhatsApp groups (T0129.005: Coordinate on Encrypted/Closed Networks, T0151.007: Chat Broadcast Group, T0151.004: Chat Platform), in which they planned how to get campaign content trending on Twitter (T0121: Manipulate Platform Algorithm, T0151.008: Microblogging Platform). | +| [T0151.008 Microblogging Platform](../../generated_pages/techniques/T0151.008.md) |  IT00000460 Researchers at Mozilla examined influence operations targeting Kenyan citizens on Twitter in 2021, providing “a grim window into the booming and shadowy industry of Twitter influencers for political hire here in Kenya”, and giving insight into operations’ operationalisation:

In our interviews with one of the influencers, they informed us of the agile tactics they use to organize and avoid detection. For example, when it’s time to carry out the campaign the influencers would be added to a Whatsapp group. Here, they received direction about what to post, the hashtags to use, which tweets to engage with and who to target. Synchronizing the tweets was also incredibly important for them. It’s what enables them to achieve their goal of trending on Twitter and gain amplification.

[...]

They revealed to us that those participating in the exercise are paid roughly between $10 and $15 to participate in three campaigns per day. Each campaign execution involves tweeting about the hashtags of the day until it appears on the trending section of Twitter. Additionally, some individuals have managed to reach retainer level and get paid about $250 per month. Their job is to make sure the campaigns are executed on a day-by-day basis with different hashtags.


An M-PESA account (T0148.002: Bank Account Asset, T0148.001: Online Banking Platform) was used to pay campaign participants.

Participants were organised in WhatsApp groups (T0129.005: Coordinate on Encrypted/Closed Networks, T0151.007: Chat Broadcast Group, T0151.004: Chat Platform), in which they planned how to get campaign content trending on Twitter (T0121: Manipulate Platform Algorithm, T0151.008: Microblogging Platform). | DO NOT EDIT ABOVE THIS LINE - PLEASE ADD NOTES BELOW \ No newline at end of file diff --git a/generated_pages/incidents/I00114.md b/generated_pages/incidents/I00114.md index 3ccc6a2..91deea6 100644 --- a/generated_pages/incidents/I00114.md +++ b/generated_pages/incidents/I00114.md @@ -15,17 +15,18 @@ | Reference | Pub Date | Authors | Org | Archive | | --------- | -------- | ------- | --- | ------- | +| [https://www.nbcnews.com/tech/tech-news/facebook-knew-radicalized-users-rcna3581](https://www.nbcnews.com/tech/tech-news/facebook-knew-radicalized-users-rcna3581) | 2021/10/22 | Brandy Zadrozny | NBC News | [https://web.archive.org/web/20211022224129/https://www.nbcnews.com/tech/tech-news/facebook-knew-radicalized-users-rcna3581](https://web.archive.org/web/20211022224129/https://www.nbcnews.com/tech/tech-news/facebook-knew-radicalized-users-rcna3581) | | Technique | Description given for this incident | | --------- | ------------------------- | -| [T0097.208 Social Cause Persona](../../generated_pages/techniques/T0097.208.md) |  IT00000468 This report examines internal Facebook communications which reveal employees’ concerns about how the platform’s algorithm was recommending users join extremist conspiracy groups.

In summer 2019, a new Facebook user named Carol Smith signed up for the platform, describing herself as a politically conservative mother from Wilmington, North Carolina. Smith’s account indicated an interest in politics, parenting and Christianity and followed a few of her favorite brands, including Fox News and then-President Donald Trump.

Though Smith had never expressed interest in conspiracy theories, in just two days Facebook was recommending she join groups dedicated to QAnon, a sprawling and baseless conspiracy theory and movement that claimed Trump was secretly saving the world from a cabal of pedophiles and Satanists.

Smith didn’t follow the recommended QAnon groups, but whatever algorithm Facebook was using to determine how she should engage with the platform pushed ahead just the same. Within one week, Smith’s feed was full of groups and pages that had violated Facebook’s own rules, including those against hate speech and disinformation.

Smith wasn’t a real person. A researcher employed by Facebook invented the account, along with those of other fictitious “test users” in 2019 and 2020, as part of an experiment in studying the platform’s role in misinforming and polarizing users through its recommendations systems.

That researcher said Smith’s Facebook experience was “a barrage of extreme, conspiratorial, and graphic content.”


Facebook’s Algorithm suggested users join groups which supported the QAnon movement (T0151.001: Social Media Platform, T0151.002: Online Community Group, T0153.006: Content Recommendation Algorithm, T0097.208: Social Cause Persona).

Further investigation by Facebook uncovered that its advertising platform had been used to promote QAnon narratives (T0146: Account, T0114: Deliver Ads, T0153.005: Online Advertising Platform):

For years, company researchers had been running experiments like Carol Smith’s to gauge the platform’s hand in radicalizing users, according to the documents seen by NBC News.

This internal work repeatedly found that recommendation tools pushed users into extremist groups, findings that helped inform policy changes and tweaks to recommendations and news feed rankings. Those rankings are a tentacled, ever-evolving system widely known as “the algorithm” that pushes content to users. But the research at that time stopped well short of inspiring any movement to change the groups and pages themselves.

That reluctance was indicative of “a pattern at Facebook,” Haugen told reporters this month. “They want the shortest path between their current policies and any action.”

[...]

By summer 2020, Facebook was hosting thousands of private QAnon groups and pages, with millions of members and followers, according to an unreleased internal investigation.

A year after the FBI designated QAnon as a potential domestic terrorist threat in the wake of standoffs, alleged planned kidnappings, harassment campaigns and shootings, Facebook labeled QAnon a “Violence Inciting Conspiracy Network” and banned it from the platform, along with militias and other violent social movements. A small team working across several of Facebook’s departments found its platforms had hosted hundreds of ads on Facebook and Instagram worth thousands of dollars and millions of views, “praising, supporting, or representing” the conspiracy theory.

[...]

For many employees inside Facebook, the enforcement came too late, according to posts left on Workplace, the company’s internal message board.

“We’ve known for over a year now that our recommendation systems can very quickly lead users down the path to conspiracy theories and groups,” one integrity researcher, whose name had been redacted, wrote in a post announcing she was leaving the company. “This fringe group has grown to national prominence, with QAnon congressional candidates and QAnon hashtags and groups trending in the mainstream. We were willing to act only * after * things had spiraled into a dire state.”

While Facebook’s ban initially appeared effective, a problem remained: The removal of groups and pages didn’t wipe out QAnon’s most extreme followers, who continued to organize on the platform.

“There was enough evidence to raise red flags in the expert community that Facebook and other platforms failed to address QAnon’s violent extremist dimension,” said Marc-André Argentino, a research fellow at King’s College London’s International Centre for the Study of Radicalisation, who has extensively studied QAnon.

Believers simply rebranded as anti-child-trafficking groups or migrated to other communities, including those around the anti-vaccine movement.

[...]

These conspiracy groups had become the fastest-growing groups on Facebook, according to the report, but Facebook wasn’t able to control their “meteoric growth,” the researchers wrote, “because we were looking at each entity individually, rather than as a cohesive movement.” A Facebook spokesperson told BuzzFeed News it took many steps to limit election misinformation but that it was unable to catch everything.
| -| [T0114 Deliver Ads](../../generated_pages/techniques/T0114.md) |  IT00000469 This report examines internal Facebook communications which reveal employees’ concerns about how the platform’s algorithm was recommending users join extremist conspiracy groups.

In summer 2019, a new Facebook user named Carol Smith signed up for the platform, describing herself as a politically conservative mother from Wilmington, North Carolina. Smith’s account indicated an interest in politics, parenting and Christianity and followed a few of her favorite brands, including Fox News and then-President Donald Trump.

Though Smith had never expressed interest in conspiracy theories, in just two days Facebook was recommending she join groups dedicated to QAnon, a sprawling and baseless conspiracy theory and movement that claimed Trump was secretly saving the world from a cabal of pedophiles and Satanists.

Smith didn’t follow the recommended QAnon groups, but whatever algorithm Facebook was using to determine how she should engage with the platform pushed ahead just the same. Within one week, Smith’s feed was full of groups and pages that had violated Facebook’s own rules, including those against hate speech and disinformation.

Smith wasn’t a real person. A researcher employed by Facebook invented the account, along with those of other fictitious “test users” in 2019 and 2020, as part of an experiment in studying the platform’s role in misinforming and polarizing users through its recommendations systems.

That researcher said Smith’s Facebook experience was “a barrage of extreme, conspiratorial, and graphic content.”


Facebook’s Algorithm suggested users join groups which supported the QAnon movement (T0151.001: Social Media Platform, T0151.002: Online Community Group, T0153.006: Content Recommendation Algorithm, T0097.208: Social Cause Persona).

Further investigation by Facebook uncovered that its advertising platform had been used to promote QAnon narratives (T0146: Account, T0114: Deliver Ads, T0153.005: Online Advertising Platform):

For years, company researchers had been running experiments like Carol Smith’s to gauge the platform’s hand in radicalizing users, according to the documents seen by NBC News.

This internal work repeatedly found that recommendation tools pushed users into extremist groups, findings that helped inform policy changes and tweaks to recommendations and news feed rankings. Those rankings are a tentacled, ever-evolving system widely known as “the algorithm” that pushes content to users. But the research at that time stopped well short of inspiring any movement to change the groups and pages themselves.

That reluctance was indicative of “a pattern at Facebook,” Haugen told reporters this month. “They want the shortest path between their current policies and any action.”

[...]

By summer 2020, Facebook was hosting thousands of private QAnon groups and pages, with millions of members and followers, according to an unreleased internal investigation.

A year after the FBI designated QAnon as a potential domestic terrorist threat in the wake of standoffs, alleged planned kidnappings, harassment campaigns and shootings, Facebook labeled QAnon a “Violence Inciting Conspiracy Network” and banned it from the platform, along with militias and other violent social movements. A small team working across several of Facebook’s departments found its platforms had hosted hundreds of ads on Facebook and Instagram worth thousands of dollars and millions of views, “praising, supporting, or representing” the conspiracy theory.

[...]

For many employees inside Facebook, the enforcement came too late, according to posts left on Workplace, the company’s internal message board.

“We’ve known for over a year now that our recommendation systems can very quickly lead users down the path to conspiracy theories and groups,” one integrity researcher, whose name had been redacted, wrote in a post announcing she was leaving the company. “This fringe group has grown to national prominence, with QAnon congressional candidates and QAnon hashtags and groups trending in the mainstream. We were willing to act only * after * things had spiraled into a dire state.”

While Facebook’s ban initially appeared effective, a problem remained: The removal of groups and pages didn’t wipe out QAnon’s most extreme followers, who continued to organize on the platform.

“There was enough evidence to raise red flags in the expert community that Facebook and other platforms failed to address QAnon’s violent extremist dimension,” said Marc-André Argentino, a research fellow at King’s College London’s International Centre for the Study of Radicalisation, who has extensively studied QAnon.

Believers simply rebranded as anti-child-trafficking groups or migrated to other communities, including those around the anti-vaccine movement.

[...]

These conspiracy groups had become the fastest-growing groups on Facebook, according to the report, but Facebook wasn’t able to control their “meteoric growth,” the researchers wrote, “because we were looking at each entity individually, rather than as a cohesive movement.” A Facebook spokesperson told BuzzFeed News it took many steps to limit election misinformation but that it was unable to catch everything.
| -| [T0151.001 Social Media Platform](../../generated_pages/techniques/T0151.001.md) |  IT00000465 This report examines internal Facebook communications which reveal employees’ concerns about how the platform’s algorithm was recommending users join extremist conspiracy groups.

In summer 2019, a new Facebook user named Carol Smith signed up for the platform, describing herself as a politically conservative mother from Wilmington, North Carolina. Smith’s account indicated an interest in politics, parenting and Christianity and followed a few of her favorite brands, including Fox News and then-President Donald Trump.

Though Smith had never expressed interest in conspiracy theories, in just two days Facebook was recommending she join groups dedicated to QAnon, a sprawling and baseless conspiracy theory and movement that claimed Trump was secretly saving the world from a cabal of pedophiles and Satanists.

Smith didn’t follow the recommended QAnon groups, but whatever algorithm Facebook was using to determine how she should engage with the platform pushed ahead just the same. Within one week, Smith’s feed was full of groups and pages that had violated Facebook’s own rules, including those against hate speech and disinformation.

Smith wasn’t a real person. A researcher employed by Facebook invented the account, along with those of other fictitious “test users” in 2019 and 2020, as part of an experiment in studying the platform’s role in misinforming and polarizing users through its recommendations systems.

That researcher said Smith’s Facebook experience was “a barrage of extreme, conspiratorial, and graphic content.”


Facebook’s Algorithm suggested users join groups which supported the QAnon movement (T0151.001: Social Media Platform, T0151.002: Online Community Group, T0153.006: Content Recommendation Algorithm, T0097.208: Social Cause Persona).

Further investigation by Facebook uncovered that its advertising platform had been used to promote QAnon narratives (T0146: Account, T0114: Deliver Ads, T0153.005: Online Advertising Platform):

For years, company researchers had been running experiments like Carol Smith’s to gauge the platform’s hand in radicalizing users, according to the documents seen by NBC News.

This internal work repeatedly found that recommendation tools pushed users into extremist groups, findings that helped inform policy changes and tweaks to recommendations and news feed rankings. Those rankings are a tentacled, ever-evolving system widely known as “the algorithm” that pushes content to users. But the research at that time stopped well short of inspiring any movement to change the groups and pages themselves.

That reluctance was indicative of “a pattern at Facebook,” Haugen told reporters this month. “They want the shortest path between their current policies and any action.”

[...]

By summer 2020, Facebook was hosting thousands of private QAnon groups and pages, with millions of members and followers, according to an unreleased internal investigation.

A year after the FBI designated QAnon as a potential domestic terrorist threat in the wake of standoffs, alleged planned kidnappings, harassment campaigns and shootings, Facebook labeled QAnon a “Violence Inciting Conspiracy Network” and banned it from the platform, along with militias and other violent social movements. A small team working across several of Facebook’s departments found its platforms had hosted hundreds of ads on Facebook and Instagram worth thousands of dollars and millions of views, “praising, supporting, or representing” the conspiracy theory.

[...]

For many employees inside Facebook, the enforcement came too late, according to posts left on Workplace, the company’s internal message board.

“We’ve known for over a year now that our recommendation systems can very quickly lead users down the path to conspiracy theories and groups,” one integrity researcher, whose name had been redacted, wrote in a post announcing she was leaving the company. “This fringe group has grown to national prominence, with QAnon congressional candidates and QAnon hashtags and groups trending in the mainstream. We were willing to act only * after * things had spiraled into a dire state.”

While Facebook’s ban initially appeared effective, a problem remained: The removal of groups and pages didn’t wipe out QAnon’s most extreme followers, who continued to organize on the platform.

“There was enough evidence to raise red flags in the expert community that Facebook and other platforms failed to address QAnon’s violent extremist dimension,” said Marc-André Argentino, a research fellow at King’s College London’s International Centre for the Study of Radicalisation, who has extensively studied QAnon.

Believers simply rebranded as anti-child-trafficking groups or migrated to other communities, including those around the anti-vaccine movement.

[...]

These conspiracy groups had become the fastest-growing groups on Facebook, according to the report, but Facebook wasn’t able to control their “meteoric growth,” the researchers wrote, “because we were looking at each entity individually, rather than as a cohesive movement.” A Facebook spokesperson told BuzzFeed News it took many steps to limit election misinformation but that it was unable to catch everything.
| -| [T0151.002 Online Community Group](../../generated_pages/techniques/T0151.002.md) |  IT00000466 This report examines internal Facebook communications which reveal employees’ concerns about how the platform’s algorithm was recommending users join extremist conspiracy groups.

In summer 2019, a new Facebook user named Carol Smith signed up for the platform, describing herself as a politically conservative mother from Wilmington, North Carolina. Smith’s account indicated an interest in politics, parenting and Christianity and followed a few of her favorite brands, including Fox News and then-President Donald Trump.

Though Smith had never expressed interest in conspiracy theories, in just two days Facebook was recommending she join groups dedicated to QAnon, a sprawling and baseless conspiracy theory and movement that claimed Trump was secretly saving the world from a cabal of pedophiles and Satanists.

Smith didn’t follow the recommended QAnon groups, but whatever algorithm Facebook was using to determine how she should engage with the platform pushed ahead just the same. Within one week, Smith’s feed was full of groups and pages that had violated Facebook’s own rules, including those against hate speech and disinformation.

Smith wasn’t a real person. A researcher employed by Facebook invented the account, along with those of other fictitious “test users” in 2019 and 2020, as part of an experiment in studying the platform’s role in misinforming and polarizing users through its recommendations systems.

That researcher said Smith’s Facebook experience was “a barrage of extreme, conspiratorial, and graphic content.”


Facebook’s Algorithm suggested users join groups which supported the QAnon movement (T0151.001: Social Media Platform, T0151.002: Online Community Group, T0153.006: Content Recommendation Algorithm, T0097.208: Social Cause Persona).

Further investigation by Facebook uncovered that its advertising platform had been used to promote QAnon narratives (T0146: Account, T0114: Deliver Ads, T0153.005: Online Advertising Platform):

For years, company researchers had been running experiments like Carol Smith’s to gauge the platform’s hand in radicalizing users, according to the documents seen by NBC News.

This internal work repeatedly found that recommendation tools pushed users into extremist groups, findings that helped inform policy changes and tweaks to recommendations and news feed rankings. Those rankings are a tentacled, ever-evolving system widely known as “the algorithm” that pushes content to users. But the research at that time stopped well short of inspiring any movement to change the groups and pages themselves.

That reluctance was indicative of “a pattern at Facebook,” Haugen told reporters this month. “They want the shortest path between their current policies and any action.”

[...]

By summer 2020, Facebook was hosting thousands of private QAnon groups and pages, with millions of members and followers, according to an unreleased internal investigation.

A year after the FBI designated QAnon as a potential domestic terrorist threat in the wake of standoffs, alleged planned kidnappings, harassment campaigns and shootings, Facebook labeled QAnon a “Violence Inciting Conspiracy Network” and banned it from the platform, along with militias and other violent social movements. A small team working across several of Facebook’s departments found its platforms had hosted hundreds of ads on Facebook and Instagram worth thousands of dollars and millions of views, “praising, supporting, or representing” the conspiracy theory.

[...]

For many employees inside Facebook, the enforcement came too late, according to posts left on Workplace, the company’s internal message board.

“We’ve known for over a year now that our recommendation systems can very quickly lead users down the path to conspiracy theories and groups,” one integrity researcher, whose name had been redacted, wrote in a post announcing she was leaving the company. “This fringe group has grown to national prominence, with QAnon congressional candidates and QAnon hashtags and groups trending in the mainstream. We were willing to act only * after * things had spiraled into a dire state.”

While Facebook’s ban initially appeared effective, a problem remained: The removal of groups and pages didn’t wipe out QAnon’s most extreme followers, who continued to organize on the platform.

“There was enough evidence to raise red flags in the expert community that Facebook and other platforms failed to address QAnon’s violent extremist dimension,” said Marc-André Argentino, a research fellow at King’s College London’s International Centre for the Study of Radicalisation, who has extensively studied QAnon.

Believers simply rebranded as anti-child-trafficking groups or migrated to other communities, including those around the anti-vaccine movement.

[...]

These conspiracy groups had become the fastest-growing groups on Facebook, according to the report, but Facebook wasn’t able to control their “meteoric growth,” the researchers wrote, “because we were looking at each entity individually, rather than as a cohesive movement.” A Facebook spokesperson told BuzzFeed News it took many steps to limit election misinformation but that it was unable to catch everything.
| -| [T0153.005 Online Advertising Platform](../../generated_pages/techniques/T0153.005.md) |  IT00000470 This report examines internal Facebook communications which reveal employees’ concerns about how the platform’s algorithm was recommending users join extremist conspiracy groups.

In summer 2019, a new Facebook user named Carol Smith signed up for the platform, describing herself as a politically conservative mother from Wilmington, North Carolina. Smith’s account indicated an interest in politics, parenting and Christianity and followed a few of her favorite brands, including Fox News and then-President Donald Trump.

Though Smith had never expressed interest in conspiracy theories, in just two days Facebook was recommending she join groups dedicated to QAnon, a sprawling and baseless conspiracy theory and movement that claimed Trump was secretly saving the world from a cabal of pedophiles and Satanists.

Smith didn’t follow the recommended QAnon groups, but whatever algorithm Facebook was using to determine how she should engage with the platform pushed ahead just the same. Within one week, Smith’s feed was full of groups and pages that had violated Facebook’s own rules, including those against hate speech and disinformation.

Smith wasn’t a real person. A researcher employed by Facebook invented the account, along with those of other fictitious “test users” in 2019 and 2020, as part of an experiment in studying the platform’s role in misinforming and polarizing users through its recommendations systems.

That researcher said Smith’s Facebook experience was “a barrage of extreme, conspiratorial, and graphic content.”


Facebook’s Algorithm suggested users join groups which supported the QAnon movement (T0151.001: Social Media Platform, T0151.002: Online Community Group, T0153.006: Content Recommendation Algorithm, T0097.208: Social Cause Persona).

Further investigation by Facebook uncovered that its advertising platform had been used to promote QAnon narratives (T0146: Account, T0114: Deliver Ads, T0153.005: Online Advertising Platform):

For years, company researchers had been running experiments like Carol Smith’s to gauge the platform’s hand in radicalizing users, according to the documents seen by NBC News.

This internal work repeatedly found that recommendation tools pushed users into extremist groups, findings that helped inform policy changes and tweaks to recommendations and news feed rankings. Those rankings are a tentacled, ever-evolving system widely known as “the algorithm” that pushes content to users. But the research at that time stopped well short of inspiring any movement to change the groups and pages themselves.

That reluctance was indicative of “a pattern at Facebook,” Haugen told reporters this month. “They want the shortest path between their current policies and any action.”

[...]

By summer 2020, Facebook was hosting thousands of private QAnon groups and pages, with millions of members and followers, according to an unreleased internal investigation.

A year after the FBI designated QAnon as a potential domestic terrorist threat in the wake of standoffs, alleged planned kidnappings, harassment campaigns and shootings, Facebook labeled QAnon a “Violence Inciting Conspiracy Network” and banned it from the platform, along with militias and other violent social movements. A small team working across several of Facebook’s departments found its platforms had hosted hundreds of ads on Facebook and Instagram worth thousands of dollars and millions of views, “praising, supporting, or representing” the conspiracy theory.

[...]

For many employees inside Facebook, the enforcement came too late, according to posts left on Workplace, the company’s internal message board.

“We’ve known for over a year now that our recommendation systems can very quickly lead users down the path to conspiracy theories and groups,” one integrity researcher, whose name had been redacted, wrote in a post announcing she was leaving the company. “This fringe group has grown to national prominence, with QAnon congressional candidates and QAnon hashtags and groups trending in the mainstream. We were willing to act only * after * things had spiraled into a dire state.”

While Facebook’s ban initially appeared effective, a problem remained: The removal of groups and pages didn’t wipe out QAnon’s most extreme followers, who continued to organize on the platform.

“There was enough evidence to raise red flags in the expert community that Facebook and other platforms failed to address QAnon’s violent extremist dimension,” said Marc-André Argentino, a research fellow at King’s College London’s International Centre for the Study of Radicalisation, who has extensively studied QAnon.

Believers simply rebranded as anti-child-trafficking groups or migrated to other communities, including those around the anti-vaccine movement.

[...]

These conspiracy groups had become the fastest-growing groups on Facebook, according to the report, but Facebook wasn’t able to control their “meteoric growth,” the researchers wrote, “because we were looking at each entity individually, rather than as a cohesive movement.” A Facebook spokesperson told BuzzFeed News it took many steps to limit election misinformation but that it was unable to catch everything.
| -| [T0153.006 Content Recommendation Algorithm](../../generated_pages/techniques/T0153.006.md) |  IT00000467 This report examines internal Facebook communications which reveal employees’ concerns about how the platform’s algorithm was recommending users join extremist conspiracy groups.

In summer 2019, a new Facebook user named Carol Smith signed up for the platform, describing herself as a politically conservative mother from Wilmington, North Carolina. Smith’s account indicated an interest in politics, parenting and Christianity and followed a few of her favorite brands, including Fox News and then-President Donald Trump.

Though Smith had never expressed interest in conspiracy theories, in just two days Facebook was recommending she join groups dedicated to QAnon, a sprawling and baseless conspiracy theory and movement that claimed Trump was secretly saving the world from a cabal of pedophiles and Satanists.

Smith didn’t follow the recommended QAnon groups, but whatever algorithm Facebook was using to determine how she should engage with the platform pushed ahead just the same. Within one week, Smith’s feed was full of groups and pages that had violated Facebook’s own rules, including those against hate speech and disinformation.

Smith wasn’t a real person. A researcher employed by Facebook invented the account, along with those of other fictitious “test users” in 2019 and 2020, as part of an experiment in studying the platform’s role in misinforming and polarizing users through its recommendations systems.

That researcher said Smith’s Facebook experience was “a barrage of extreme, conspiratorial, and graphic content.”


Facebook’s Algorithm suggested users join groups which supported the QAnon movement (T0151.001: Social Media Platform, T0151.002: Online Community Group, T0153.006: Content Recommendation Algorithm, T0097.208: Social Cause Persona).

Further investigation by Facebook uncovered that its advertising platform had been used to promote QAnon narratives (T0146: Account, T0114: Deliver Ads, T0153.005: Online Advertising Platform):

For years, company researchers had been running experiments like Carol Smith’s to gauge the platform’s hand in radicalizing users, according to the documents seen by NBC News.

This internal work repeatedly found that recommendation tools pushed users into extremist groups, findings that helped inform policy changes and tweaks to recommendations and news feed rankings. Those rankings are a tentacled, ever-evolving system widely known as “the algorithm” that pushes content to users. But the research at that time stopped well short of inspiring any movement to change the groups and pages themselves.

That reluctance was indicative of “a pattern at Facebook,” Haugen told reporters this month. “They want the shortest path between their current policies and any action.”

[...]

By summer 2020, Facebook was hosting thousands of private QAnon groups and pages, with millions of members and followers, according to an unreleased internal investigation.

A year after the FBI designated QAnon as a potential domestic terrorist threat in the wake of standoffs, alleged planned kidnappings, harassment campaigns and shootings, Facebook labeled QAnon a “Violence Inciting Conspiracy Network” and banned it from the platform, along with militias and other violent social movements. A small team working across several of Facebook’s departments found its platforms had hosted hundreds of ads on Facebook and Instagram worth thousands of dollars and millions of views, “praising, supporting, or representing” the conspiracy theory.

[...]

For many employees inside Facebook, the enforcement came too late, according to posts left on Workplace, the company’s internal message board.

“We’ve known for over a year now that our recommendation systems can very quickly lead users down the path to conspiracy theories and groups,” one integrity researcher, whose name had been redacted, wrote in a post announcing she was leaving the company. “This fringe group has grown to national prominence, with QAnon congressional candidates and QAnon hashtags and groups trending in the mainstream. We were willing to act only * after * things had spiraled into a dire state.”

While Facebook’s ban initially appeared effective, a problem remained: The removal of groups and pages didn’t wipe out QAnon’s most extreme followers, who continued to organize on the platform.

“There was enough evidence to raise red flags in the expert community that Facebook and other platforms failed to address QAnon’s violent extremist dimension,” said Marc-André Argentino, a research fellow at King’s College London’s International Centre for the Study of Radicalisation, who has extensively studied QAnon.

Believers simply rebranded as anti-child-trafficking groups or migrated to other communities, including those around the anti-vaccine movement.

[...]

These conspiracy groups had become the fastest-growing groups on Facebook, according to the report, but Facebook wasn’t able to control their “meteoric growth,” the researchers wrote, “because we were looking at each entity individually, rather than as a cohesive movement.” A Facebook spokesperson told BuzzFeed News it took many steps to limit election misinformation but that it was unable to catch everything.
| +| [T0097.208 Social Cause Persona](../../generated_pages/techniques/T0097.208.md) |  IT00000468 This report examines internal Facebook communications which reveal employees’ concerns about how the platform’s algorithm was recommending users join extremist conspiracy groups.

In summer 2019, a new Facebook user named Carol Smith signed up for the platform, describing herself as a politically conservative mother from Wilmington, North Carolina. Smith’s account indicated an interest in politics, parenting and Christianity and followed a few of her favorite brands, including Fox News and then-President Donald Trump.

Though Smith had never expressed interest in conspiracy theories, in just two days Facebook was recommending she join groups dedicated to QAnon, a sprawling and baseless conspiracy theory and movement that claimed Trump was secretly saving the world from a cabal of pedophiles and Satanists.

Smith didn’t follow the recommended QAnon groups, but whatever algorithm Facebook was using to determine how she should engage with the platform pushed ahead just the same. Within one week, Smith’s feed was full of groups and pages that had violated Facebook’s own rules, including those against hate speech and disinformation.

Smith wasn’t a real person. A researcher employed by Facebook invented the account, along with those of other fictitious “test users” in 2019 and 2020, as part of an experiment in studying the platform’s role in misinforming and polarizing users through its recommendations systems.

That researcher said Smith’s Facebook experience was “a barrage of extreme, conspiratorial, and graphic content.”


Facebook’s Algorithm suggested users join groups which supported the QAnon movement (T0151.001: Social Media Platform, T0151.002: Online Community Group, T0153.006: Content Recommendation Algorithm, T0097.208: Social Cause Persona).

Further investigation by Facebook uncovered that its advertising platform had been used to promote QAnon narratives (T0146: Account Asset, T0114: Deliver Ads, T0153.005: Online Advertising Platform):

For years, company researchers had been running experiments like Carol Smith’s to gauge the platform’s hand in radicalizing users, according to the documents seen by NBC News.

This internal work repeatedly found that recommendation tools pushed users into extremist groups, findings that helped inform policy changes and tweaks to recommendations and news feed rankings. Those rankings are a tentacled, ever-evolving system widely known as “the algorithm” that pushes content to users. But the research at that time stopped well short of inspiring any movement to change the groups and pages themselves.

That reluctance was indicative of “a pattern at Facebook,” Haugen told reporters this month. “They want the shortest path between their current policies and any action.”

[...]

By summer 2020, Facebook was hosting thousands of private QAnon groups and pages, with millions of members and followers, according to an unreleased internal investigation.

A year after the FBI designated QAnon as a potential domestic terrorist threat in the wake of standoffs, alleged planned kidnappings, harassment campaigns and shootings, Facebook labeled QAnon a “Violence Inciting Conspiracy Network” and banned it from the platform, along with militias and other violent social movements. A small team working across several of Facebook’s departments found its platforms had hosted hundreds of ads on Facebook and Instagram worth thousands of dollars and millions of views, “praising, supporting, or representing” the conspiracy theory.

[...]

For many employees inside Facebook, the enforcement came too late, according to posts left on Workplace, the company’s internal message board.

“We’ve known for over a year now that our recommendation systems can very quickly lead users down the path to conspiracy theories and groups,” one integrity researcher, whose name had been redacted, wrote in a post announcing she was leaving the company. “This fringe group has grown to national prominence, with QAnon congressional candidates and QAnon hashtags and groups trending in the mainstream. We were willing to act only * after * things had spiraled into a dire state.”

While Facebook’s ban initially appeared effective, a problem remained: The removal of groups and pages didn’t wipe out QAnon’s most extreme followers, who continued to organize on the platform.

“There was enough evidence to raise red flags in the expert community that Facebook and other platforms failed to address QAnon’s violent extremist dimension,” said Marc-André Argentino, a research fellow at King’s College London’s International Centre for the Study of Radicalisation, who has extensively studied QAnon.

Believers simply rebranded as anti-child-trafficking groups or migrated to other communities, including those around the anti-vaccine movement.

[...]

These conspiracy groups had become the fastest-growing groups on Facebook, according to the report, but Facebook wasn’t able to control their “meteoric growth,” the researchers wrote, “because we were looking at each entity individually, rather than as a cohesive movement.” A Facebook spokesperson told BuzzFeed News it took many steps to limit election misinformation but that it was unable to catch everything.
| +| [T0114 Deliver Ads](../../generated_pages/techniques/T0114.md) |  IT00000469 This report examines internal Facebook communications which reveal employees’ concerns about how the platform’s algorithm was recommending users join extremist conspiracy groups.

In summer 2019, a new Facebook user named Carol Smith signed up for the platform, describing herself as a politically conservative mother from Wilmington, North Carolina. Smith’s account indicated an interest in politics, parenting and Christianity and followed a few of her favorite brands, including Fox News and then-President Donald Trump.

Though Smith had never expressed interest in conspiracy theories, in just two days Facebook was recommending she join groups dedicated to QAnon, a sprawling and baseless conspiracy theory and movement that claimed Trump was secretly saving the world from a cabal of pedophiles and Satanists.

Smith didn’t follow the recommended QAnon groups, but whatever algorithm Facebook was using to determine how she should engage with the platform pushed ahead just the same. Within one week, Smith’s feed was full of groups and pages that had violated Facebook’s own rules, including those against hate speech and disinformation.

Smith wasn’t a real person. A researcher employed by Facebook invented the account, along with those of other fictitious “test users” in 2019 and 2020, as part of an experiment in studying the platform’s role in misinforming and polarizing users through its recommendations systems.

That researcher said Smith’s Facebook experience was “a barrage of extreme, conspiratorial, and graphic content.”


Facebook’s Algorithm suggested users join groups which supported the QAnon movement (T0151.001: Social Media Platform, T0151.002: Online Community Group, T0153.006: Content Recommendation Algorithm, T0097.208: Social Cause Persona).

Further investigation by Facebook uncovered that its advertising platform had been used to promote QAnon narratives (T0146: Account Asset, T0114: Deliver Ads, T0153.005: Online Advertising Platform):

For years, company researchers had been running experiments like Carol Smith’s to gauge the platform’s hand in radicalizing users, according to the documents seen by NBC News.

This internal work repeatedly found that recommendation tools pushed users into extremist groups, findings that helped inform policy changes and tweaks to recommendations and news feed rankings. Those rankings are a tentacled, ever-evolving system widely known as “the algorithm” that pushes content to users. But the research at that time stopped well short of inspiring any movement to change the groups and pages themselves.

That reluctance was indicative of “a pattern at Facebook,” Haugen told reporters this month. “They want the shortest path between their current policies and any action.”

[...]

By summer 2020, Facebook was hosting thousands of private QAnon groups and pages, with millions of members and followers, according to an unreleased internal investigation.

A year after the FBI designated QAnon as a potential domestic terrorist threat in the wake of standoffs, alleged planned kidnappings, harassment campaigns and shootings, Facebook labeled QAnon a “Violence Inciting Conspiracy Network” and banned it from the platform, along with militias and other violent social movements. A small team working across several of Facebook’s departments found its platforms had hosted hundreds of ads on Facebook and Instagram worth thousands of dollars and millions of views, “praising, supporting, or representing” the conspiracy theory.

[...]

For many employees inside Facebook, the enforcement came too late, according to posts left on Workplace, the company’s internal message board.

“We’ve known for over a year now that our recommendation systems can very quickly lead users down the path to conspiracy theories and groups,” one integrity researcher, whose name had been redacted, wrote in a post announcing she was leaving the company. “This fringe group has grown to national prominence, with QAnon congressional candidates and QAnon hashtags and groups trending in the mainstream. We were willing to act only * after * things had spiraled into a dire state.”

While Facebook’s ban initially appeared effective, a problem remained: The removal of groups and pages didn’t wipe out QAnon’s most extreme followers, who continued to organize on the platform.

“There was enough evidence to raise red flags in the expert community that Facebook and other platforms failed to address QAnon’s violent extremist dimension,” said Marc-André Argentino, a research fellow at King’s College London’s International Centre for the Study of Radicalisation, who has extensively studied QAnon.

Believers simply rebranded as anti-child-trafficking groups or migrated to other communities, including those around the anti-vaccine movement.

[...]

These conspiracy groups had become the fastest-growing groups on Facebook, according to the report, but Facebook wasn’t able to control their “meteoric growth,” the researchers wrote, “because we were looking at each entity individually, rather than as a cohesive movement.” A Facebook spokesperson told BuzzFeed News it took many steps to limit election misinformation but that it was unable to catch everything.
| +| [T0151.001 Social Media Platform](../../generated_pages/techniques/T0151.001.md) |  IT00000465 This report examines internal Facebook communications which reveal employees’ concerns about how the platform’s algorithm was recommending users join extremist conspiracy groups.

In summer 2019, a new Facebook user named Carol Smith signed up for the platform, describing herself as a politically conservative mother from Wilmington, North Carolina. Smith’s account indicated an interest in politics, parenting and Christianity and followed a few of her favorite brands, including Fox News and then-President Donald Trump.

Though Smith had never expressed interest in conspiracy theories, in just two days Facebook was recommending she join groups dedicated to QAnon, a sprawling and baseless conspiracy theory and movement that claimed Trump was secretly saving the world from a cabal of pedophiles and Satanists.

Smith didn’t follow the recommended QAnon groups, but whatever algorithm Facebook was using to determine how she should engage with the platform pushed ahead just the same. Within one week, Smith’s feed was full of groups and pages that had violated Facebook’s own rules, including those against hate speech and disinformation.

Smith wasn’t a real person. A researcher employed by Facebook invented the account, along with those of other fictitious “test users” in 2019 and 2020, as part of an experiment in studying the platform’s role in misinforming and polarizing users through its recommendations systems.

That researcher said Smith’s Facebook experience was “a barrage of extreme, conspiratorial, and graphic content.”


Facebook’s Algorithm suggested users join groups which supported the QAnon movement (T0151.001: Social Media Platform, T0151.002: Online Community Group, T0153.006: Content Recommendation Algorithm, T0097.208: Social Cause Persona).

Further investigation by Facebook uncovered that its advertising platform had been used to promote QAnon narratives (T0146: Account Asset, T0114: Deliver Ads, T0153.005: Online Advertising Platform):

For years, company researchers had been running experiments like Carol Smith’s to gauge the platform’s hand in radicalizing users, according to the documents seen by NBC News.

This internal work repeatedly found that recommendation tools pushed users into extremist groups, findings that helped inform policy changes and tweaks to recommendations and news feed rankings. Those rankings are a tentacled, ever-evolving system widely known as “the algorithm” that pushes content to users. But the research at that time stopped well short of inspiring any movement to change the groups and pages themselves.

That reluctance was indicative of “a pattern at Facebook,” Haugen told reporters this month. “They want the shortest path between their current policies and any action.”

[...]

By summer 2020, Facebook was hosting thousands of private QAnon groups and pages, with millions of members and followers, according to an unreleased internal investigation.

A year after the FBI designated QAnon as a potential domestic terrorist threat in the wake of standoffs, alleged planned kidnappings, harassment campaigns and shootings, Facebook labeled QAnon a “Violence Inciting Conspiracy Network” and banned it from the platform, along with militias and other violent social movements. A small team working across several of Facebook’s departments found its platforms had hosted hundreds of ads on Facebook and Instagram worth thousands of dollars and millions of views, “praising, supporting, or representing” the conspiracy theory.

[...]

For many employees inside Facebook, the enforcement came too late, according to posts left on Workplace, the company’s internal message board.

“We’ve known for over a year now that our recommendation systems can very quickly lead users down the path to conspiracy theories and groups,” one integrity researcher, whose name had been redacted, wrote in a post announcing she was leaving the company. “This fringe group has grown to national prominence, with QAnon congressional candidates and QAnon hashtags and groups trending in the mainstream. We were willing to act only * after * things had spiraled into a dire state.”

While Facebook’s ban initially appeared effective, a problem remained: The removal of groups and pages didn’t wipe out QAnon’s most extreme followers, who continued to organize on the platform.

“There was enough evidence to raise red flags in the expert community that Facebook and other platforms failed to address QAnon’s violent extremist dimension,” said Marc-André Argentino, a research fellow at King’s College London’s International Centre for the Study of Radicalisation, who has extensively studied QAnon.

Believers simply rebranded as anti-child-trafficking groups or migrated to other communities, including those around the anti-vaccine movement.

[...]

These conspiracy groups had become the fastest-growing groups on Facebook, according to the report, but Facebook wasn’t able to control their “meteoric growth,” the researchers wrote, “because we were looking at each entity individually, rather than as a cohesive movement.” A Facebook spokesperson told BuzzFeed News it took many steps to limit election misinformation but that it was unable to catch everything.
| +| [T0151.002 Online Community Group](../../generated_pages/techniques/T0151.002.md) |  IT00000466 This report examines internal Facebook communications which reveal employees’ concerns about how the platform’s algorithm was recommending users join extremist conspiracy groups.

In summer 2019, a new Facebook user named Carol Smith signed up for the platform, describing herself as a politically conservative mother from Wilmington, North Carolina. Smith’s account indicated an interest in politics, parenting and Christianity and followed a few of her favorite brands, including Fox News and then-President Donald Trump.

Though Smith had never expressed interest in conspiracy theories, in just two days Facebook was recommending she join groups dedicated to QAnon, a sprawling and baseless conspiracy theory and movement that claimed Trump was secretly saving the world from a cabal of pedophiles and Satanists.

Smith didn’t follow the recommended QAnon groups, but whatever algorithm Facebook was using to determine how she should engage with the platform pushed ahead just the same. Within one week, Smith’s feed was full of groups and pages that had violated Facebook’s own rules, including those against hate speech and disinformation.

Smith wasn’t a real person. A researcher employed by Facebook invented the account, along with those of other fictitious “test users” in 2019 and 2020, as part of an experiment in studying the platform’s role in misinforming and polarizing users through its recommendations systems.

That researcher said Smith’s Facebook experience was “a barrage of extreme, conspiratorial, and graphic content.”


Facebook’s Algorithm suggested users join groups which supported the QAnon movement (T0151.001: Social Media Platform, T0151.002: Online Community Group, T0153.006: Content Recommendation Algorithm, T0097.208: Social Cause Persona).

Further investigation by Facebook uncovered that its advertising platform had been used to promote QAnon narratives (T0146: Account Asset, T0114: Deliver Ads, T0153.005: Online Advertising Platform):

For years, company researchers had been running experiments like Carol Smith’s to gauge the platform’s hand in radicalizing users, according to the documents seen by NBC News.

This internal work repeatedly found that recommendation tools pushed users into extremist groups, findings that helped inform policy changes and tweaks to recommendations and news feed rankings. Those rankings are a tentacled, ever-evolving system widely known as “the algorithm” that pushes content to users. But the research at that time stopped well short of inspiring any movement to change the groups and pages themselves.

That reluctance was indicative of “a pattern at Facebook,” Haugen told reporters this month. “They want the shortest path between their current policies and any action.”

[...]

By summer 2020, Facebook was hosting thousands of private QAnon groups and pages, with millions of members and followers, according to an unreleased internal investigation.

A year after the FBI designated QAnon as a potential domestic terrorist threat in the wake of standoffs, alleged planned kidnappings, harassment campaigns and shootings, Facebook labeled QAnon a “Violence Inciting Conspiracy Network” and banned it from the platform, along with militias and other violent social movements. A small team working across several of Facebook’s departments found its platforms had hosted hundreds of ads on Facebook and Instagram worth thousands of dollars and millions of views, “praising, supporting, or representing” the conspiracy theory.

[...]

For many employees inside Facebook, the enforcement came too late, according to posts left on Workplace, the company’s internal message board.

“We’ve known for over a year now that our recommendation systems can very quickly lead users down the path to conspiracy theories and groups,” one integrity researcher, whose name had been redacted, wrote in a post announcing she was leaving the company. “This fringe group has grown to national prominence, with QAnon congressional candidates and QAnon hashtags and groups trending in the mainstream. We were willing to act only * after * things had spiraled into a dire state.”

While Facebook’s ban initially appeared effective, a problem remained: The removal of groups and pages didn’t wipe out QAnon’s most extreme followers, who continued to organize on the platform.

“There was enough evidence to raise red flags in the expert community that Facebook and other platforms failed to address QAnon’s violent extremist dimension,” said Marc-André Argentino, a research fellow at King’s College London’s International Centre for the Study of Radicalisation, who has extensively studied QAnon.

Believers simply rebranded as anti-child-trafficking groups or migrated to other communities, including those around the anti-vaccine movement.

[...]

These conspiracy groups had become the fastest-growing groups on Facebook, according to the report, but Facebook wasn’t able to control their “meteoric growth,” the researchers wrote, “because we were looking at each entity individually, rather than as a cohesive movement.” A Facebook spokesperson told BuzzFeed News it took many steps to limit election misinformation but that it was unable to catch everything.
| +| [T0153.005 Online Advertising Platform](../../generated_pages/techniques/T0153.005.md) |  IT00000470 This report examines internal Facebook communications which reveal employees’ concerns about how the platform’s algorithm was recommending users join extremist conspiracy groups.

In summer 2019, a new Facebook user named Carol Smith signed up for the platform, describing herself as a politically conservative mother from Wilmington, North Carolina. Smith’s account indicated an interest in politics, parenting and Christianity and followed a few of her favorite brands, including Fox News and then-President Donald Trump.

Though Smith had never expressed interest in conspiracy theories, in just two days Facebook was recommending she join groups dedicated to QAnon, a sprawling and baseless conspiracy theory and movement that claimed Trump was secretly saving the world from a cabal of pedophiles and Satanists.

Smith didn’t follow the recommended QAnon groups, but whatever algorithm Facebook was using to determine how she should engage with the platform pushed ahead just the same. Within one week, Smith’s feed was full of groups and pages that had violated Facebook’s own rules, including those against hate speech and disinformation.

Smith wasn’t a real person. A researcher employed by Facebook invented the account, along with those of other fictitious “test users” in 2019 and 2020, as part of an experiment in studying the platform’s role in misinforming and polarizing users through its recommendations systems.

That researcher said Smith’s Facebook experience was “a barrage of extreme, conspiratorial, and graphic content.”


Facebook’s Algorithm suggested users join groups which supported the QAnon movement (T0151.001: Social Media Platform, T0151.002: Online Community Group, T0153.006: Content Recommendation Algorithm, T0097.208: Social Cause Persona).

Further investigation by Facebook uncovered that its advertising platform had been used to promote QAnon narratives (T0146: Account Asset, T0114: Deliver Ads, T0153.005: Online Advertising Platform):

For years, company researchers had been running experiments like Carol Smith’s to gauge the platform’s hand in radicalizing users, according to the documents seen by NBC News.

This internal work repeatedly found that recommendation tools pushed users into extremist groups, findings that helped inform policy changes and tweaks to recommendations and news feed rankings. Those rankings are a tentacled, ever-evolving system widely known as “the algorithm” that pushes content to users. But the research at that time stopped well short of inspiring any movement to change the groups and pages themselves.

That reluctance was indicative of “a pattern at Facebook,” Haugen told reporters this month. “They want the shortest path between their current policies and any action.”

[...]

By summer 2020, Facebook was hosting thousands of private QAnon groups and pages, with millions of members and followers, according to an unreleased internal investigation.

A year after the FBI designated QAnon as a potential domestic terrorist threat in the wake of standoffs, alleged planned kidnappings, harassment campaigns and shootings, Facebook labeled QAnon a “Violence Inciting Conspiracy Network” and banned it from the platform, along with militias and other violent social movements. A small team working across several of Facebook’s departments found its platforms had hosted hundreds of ads on Facebook and Instagram worth thousands of dollars and millions of views, “praising, supporting, or representing” the conspiracy theory.

[...]

For many employees inside Facebook, the enforcement came too late, according to posts left on Workplace, the company’s internal message board.

“We’ve known for over a year now that our recommendation systems can very quickly lead users down the path to conspiracy theories and groups,” one integrity researcher, whose name had been redacted, wrote in a post announcing she was leaving the company. “This fringe group has grown to national prominence, with QAnon congressional candidates and QAnon hashtags and groups trending in the mainstream. We were willing to act only * after * things had spiraled into a dire state.”

While Facebook’s ban initially appeared effective, a problem remained: The removal of groups and pages didn’t wipe out QAnon’s most extreme followers, who continued to organize on the platform.

“There was enough evidence to raise red flags in the expert community that Facebook and other platforms failed to address QAnon’s violent extremist dimension,” said Marc-André Argentino, a research fellow at King’s College London’s International Centre for the Study of Radicalisation, who has extensively studied QAnon.

Believers simply rebranded as anti-child-trafficking groups or migrated to other communities, including those around the anti-vaccine movement.

[...]

These conspiracy groups had become the fastest-growing groups on Facebook, according to the report, but Facebook wasn’t able to control their “meteoric growth,” the researchers wrote, “because we were looking at each entity individually, rather than as a cohesive movement.” A Facebook spokesperson told BuzzFeed News it took many steps to limit election misinformation but that it was unable to catch everything.
| +| [T0153.006 Content Recommendation Algorithm](../../generated_pages/techniques/T0153.006.md) |  IT00000467 This report examines internal Facebook communications which reveal employees’ concerns about how the platform’s algorithm was recommending users join extremist conspiracy groups.

In summer 2019, a new Facebook user named Carol Smith signed up for the platform, describing herself as a politically conservative mother from Wilmington, North Carolina. Smith’s account indicated an interest in politics, parenting and Christianity and followed a few of her favorite brands, including Fox News and then-President Donald Trump.

Though Smith had never expressed interest in conspiracy theories, in just two days Facebook was recommending she join groups dedicated to QAnon, a sprawling and baseless conspiracy theory and movement that claimed Trump was secretly saving the world from a cabal of pedophiles and Satanists.

Smith didn’t follow the recommended QAnon groups, but whatever algorithm Facebook was using to determine how she should engage with the platform pushed ahead just the same. Within one week, Smith’s feed was full of groups and pages that had violated Facebook’s own rules, including those against hate speech and disinformation.

Smith wasn’t a real person. A researcher employed by Facebook invented the account, along with those of other fictitious “test users” in 2019 and 2020, as part of an experiment in studying the platform’s role in misinforming and polarizing users through its recommendations systems.

That researcher said Smith’s Facebook experience was “a barrage of extreme, conspiratorial, and graphic content.”


Facebook’s Algorithm suggested users join groups which supported the QAnon movement (T0151.001: Social Media Platform, T0151.002: Online Community Group, T0153.006: Content Recommendation Algorithm, T0097.208: Social Cause Persona).

Further investigation by Facebook uncovered that its advertising platform had been used to promote QAnon narratives (T0146: Account Asset, T0114: Deliver Ads, T0153.005: Online Advertising Platform):

For years, company researchers had been running experiments like Carol Smith’s to gauge the platform’s hand in radicalizing users, according to the documents seen by NBC News.

This internal work repeatedly found that recommendation tools pushed users into extremist groups, findings that helped inform policy changes and tweaks to recommendations and news feed rankings. Those rankings are a tentacled, ever-evolving system widely known as “the algorithm” that pushes content to users. But the research at that time stopped well short of inspiring any movement to change the groups and pages themselves.

That reluctance was indicative of “a pattern at Facebook,” Haugen told reporters this month. “They want the shortest path between their current policies and any action.”

[...]

By summer 2020, Facebook was hosting thousands of private QAnon groups and pages, with millions of members and followers, according to an unreleased internal investigation.

A year after the FBI designated QAnon as a potential domestic terrorist threat in the wake of standoffs, alleged planned kidnappings, harassment campaigns and shootings, Facebook labeled QAnon a “Violence Inciting Conspiracy Network” and banned it from the platform, along with militias and other violent social movements. A small team working across several of Facebook’s departments found its platforms had hosted hundreds of ads on Facebook and Instagram worth thousands of dollars and millions of views, “praising, supporting, or representing” the conspiracy theory.

[...]

For many employees inside Facebook, the enforcement came too late, according to posts left on Workplace, the company’s internal message board.

“We’ve known for over a year now that our recommendation systems can very quickly lead users down the path to conspiracy theories and groups,” one integrity researcher, whose name had been redacted, wrote in a post announcing she was leaving the company. “This fringe group has grown to national prominence, with QAnon congressional candidates and QAnon hashtags and groups trending in the mainstream. We were willing to act only * after * things had spiraled into a dire state.”

While Facebook’s ban initially appeared effective, a problem remained: The removal of groups and pages didn’t wipe out QAnon’s most extreme followers, who continued to organize on the platform.

“There was enough evidence to raise red flags in the expert community that Facebook and other platforms failed to address QAnon’s violent extremist dimension,” said Marc-André Argentino, a research fellow at King’s College London’s International Centre for the Study of Radicalisation, who has extensively studied QAnon.

Believers simply rebranded as anti-child-trafficking groups or migrated to other communities, including those around the anti-vaccine movement.

[...]

These conspiracy groups had become the fastest-growing groups on Facebook, according to the report, but Facebook wasn’t able to control their “meteoric growth,” the researchers wrote, “because we were looking at each entity individually, rather than as a cohesive movement.” A Facebook spokesperson told BuzzFeed News it took many steps to limit election misinformation but that it was unable to catch everything.
| DO NOT EDIT ABOVE THIS LINE - PLEASE ADD NOTES BELOW \ No newline at end of file diff --git a/generated_pages/incidents/I00115.md b/generated_pages/incidents/I00115.md index d16d52c..9c0f9fd 100644 --- a/generated_pages/incidents/I00115.md +++ b/generated_pages/incidents/I00115.md @@ -15,13 +15,14 @@ | Reference | Pub Date | Authors | Org | Archive | | --------- | -------- | ------- | --- | ------- | +| [https://www.washingtonpost.com/technology/interactive/2021/how-facebook-algorithm-works/](https://www.washingtonpost.com/technology/interactive/2021/how-facebook-algorithm-works/) | 2021/10/26 | Will Oremus, Chris Alcantara, Jeremy B. Merrill, Artur Galocha | The Washington Post | [https://web.archive.org/web/20211026142012/https://www.washingtonpost.com/technology/interactive/2021/how-facebook-algorithm-works/](https://web.archive.org/web/20211026142012/https://www.washingtonpost.com/technology/interactive/2021/how-facebook-algorithm-works/) | | Technique | Description given for this incident | | --------- | ------------------------- | -| [T0151.001 Social Media Platform](../../generated_pages/techniques/T0151.001.md) |  IT00000471 This 2021 report by The Washington Post explains the mechanics of Facebook’s algorithm (T0151.001: Social Media Platform, T0153.006: Content Recommendation Algorithm):

In its early years, Facebook’s algorithm prioritized signals such as likes, clicks and comments to decide which posts to amplify. Publishers, brands and individual users soon learned how to craft posts and headlines designed to induce likes and clicks, giving rise to what came to be known as “clickbait.” By 2013, upstart publishers such as Upworthy and ViralNova were amassing tens of millions of readers with articles designed specifically to game Facebook’s news feed algorithm.

Facebook realized that users were growing wary of misleading teaser headlines, and the company recalibrated its algorithm in 2014 and 2015 to downgrade clickbait and focus on new metrics, such as the amount of time a user spent reading a story or watching a video, and incorporating surveys on what content users found most valuable. Around the same time, its executives identified video as a business priority, and used the algorithm to boost “native” videos shared directly to Facebook. By the mid-2010s, the news feed had tilted toward slick, professionally produced content, especially videos that would hold people’s attention.

In 2016, however, Facebook executives grew worried about a decline in “original sharing.” Users were spending so much time passively watching and reading that they weren’t interacting with each other as much. Young people in particular shifted their personal conversations to rivals such as Snapchat that offered more intimacy.

Once again, Facebook found its answer in the algorithm: It developed a new set of goal metrics that it called “meaningful social interactions,” designed to show users more posts from friends and family, and fewer from big publishers and brands. In particular, the algorithm began to give outsize weight to posts that sparked lots of comments and replies.

The downside of this approach was that the posts that sparked the most comments tended to be the ones that made people angry or offended them, the documents show. Facebook became an angrier, more polarizing place. It didn’t help that, starting in 2017, the algorithm had assigned reaction emoji — including the angry emoji — five times the weight of a simple “like,” according to company documents.

[...]

Internal documents show Facebook researchers found that, for the most politically oriented 1 million American users, nearly 90 percent of the content that Facebook shows them is about politics and social issues. Those groups also received the most misinformation, especially a set of users associated with mostly right-leaning content, who were shown one misinformation post out of every 40, according to a document from June 2020.

One takeaway is that Facebook’s algorithm isn’t a runaway train. The company may not directly control what any given user posts, but by choosing which types of posts will be seen, it sculpts the information landscape according to its business priorities. Some within the company would like to see Facebook use the algorithm to explicitly promote certain values, such as democracy and civil discourse. Others have suggested that it develop and prioritize new metrics that align with users’ values, as with a 2020 experiment in which the algorithm was trained to predict what posts they would find “good for the world” and “bad for the world,” and optimize for the former.
| -| [T0153.006 Content Recommendation Algorithm](../../generated_pages/techniques/T0153.006.md) |  IT00000472 This 2021 report by The Washington Post explains the mechanics of Facebook’s algorithm (T0151.001: Social Media Platform, T0153.006: Content Recommendation Algorithm):

In its early years, Facebook’s algorithm prioritized signals such as likes, clicks and comments to decide which posts to amplify. Publishers, brands and individual users soon learned how to craft posts and headlines designed to induce likes and clicks, giving rise to what came to be known as “clickbait.” By 2013, upstart publishers such as Upworthy and ViralNova were amassing tens of millions of readers with articles designed specifically to game Facebook’s news feed algorithm.

Facebook realized that users were growing wary of misleading teaser headlines, and the company recalibrated its algorithm in 2014 and 2015 to downgrade clickbait and focus on new metrics, such as the amount of time a user spent reading a story or watching a video, and incorporating surveys on what content users found most valuable. Around the same time, its executives identified video as a business priority, and used the algorithm to boost “native” videos shared directly to Facebook. By the mid-2010s, the news feed had tilted toward slick, professionally produced content, especially videos that would hold people’s attention.

In 2016, however, Facebook executives grew worried about a decline in “original sharing.” Users were spending so much time passively watching and reading that they weren’t interacting with each other as much. Young people in particular shifted their personal conversations to rivals such as Snapchat that offered more intimacy.

Once again, Facebook found its answer in the algorithm: It developed a new set of goal metrics that it called “meaningful social interactions,” designed to show users more posts from friends and family, and fewer from big publishers and brands. In particular, the algorithm began to give outsize weight to posts that sparked lots of comments and replies.

The downside of this approach was that the posts that sparked the most comments tended to be the ones that made people angry or offended them, the documents show. Facebook became an angrier, more polarizing place. It didn’t help that, starting in 2017, the algorithm had assigned reaction emoji — including the angry emoji — five times the weight of a simple “like,” according to company documents.

[...]

Internal documents show Facebook researchers found that, for the most politically oriented 1 million American users, nearly 90 percent of the content that Facebook shows them is about politics and social issues. Those groups also received the most misinformation, especially a set of users associated with mostly right-leaning content, who were shown one misinformation post out of every 40, according to a document from June 2020.

One takeaway is that Facebook’s algorithm isn’t a runaway train. The company may not directly control what any given user posts, but by choosing which types of posts will be seen, it sculpts the information landscape according to its business priorities. Some within the company would like to see Facebook use the algorithm to explicitly promote certain values, such as democracy and civil discourse. Others have suggested that it develop and prioritize new metrics that align with users’ values, as with a 2020 experiment in which the algorithm was trained to predict what posts they would find “good for the world” and “bad for the world,” and optimize for the former.
| +| [T0151.001 Social Media Platform](../../generated_pages/techniques/T0151.001.md) |  IT00000471 This 2021 report by The Washington Post explains the mechanics of Facebook’s algorithm (T0151.001: Social Media Platform, T0153.006: Content Recommendation Algorithm):

In its early years, Facebook’s algorithm prioritized signals such as likes, clicks and comments to decide which posts to amplify. Publishers, brands and individual users soon learned how to craft posts and headlines designed to induce likes and clicks, giving rise to what came to be known as “clickbait.” By 2013, upstart publishers such as Upworthy and ViralNova were amassing tens of millions of readers with articles designed specifically to game Facebook’s news feed algorithm.

Facebook realized that users were growing wary of misleading teaser headlines, and the company recalibrated its algorithm in 2014 and 2015 to downgrade clickbait and focus on new metrics, such as the amount of time a user spent reading a story or watching a video, and incorporating surveys on what content users found most valuable. Around the same time, its executives identified video as a business priority, and used the algorithm to boost “native” videos shared directly to Facebook. By the mid-2010s, the news feed had tilted toward slick, professionally produced content, especially videos that would hold people’s attention.

In 2016, however, Facebook executives grew worried about a decline in “original sharing.” Users were spending so much time passively watching and reading that they weren’t interacting with each other as much. Young people in particular shifted their personal conversations to rivals such as Snapchat that offered more intimacy.

Once again, Facebook found its answer in the algorithm: It developed a new set of goal metrics that it called “meaningful social interactions,” designed to show users more posts from friends and family, and fewer from big publishers and brands. In particular, the algorithm began to give outsize weight to posts that sparked lots of comments and replies.

The downside of this approach was that the posts that sparked the most comments tended to be the ones that made people angry or offended them, the documents show. Facebook became an angrier, more polarizing place. It didn’t help that, starting in 2017, the algorithm had assigned reaction emoji — including the angry emoji — five times the weight of a simple “like,” according to company documents.

[...]

Internal documents show Facebook researchers found that, for the most politically oriented 1 million American users, nearly 90 percent of the content that Facebook shows them is about politics and social issues. Those groups also received the most misinformation, especially a set of users associated with mostly right-leaning content, who were shown one misinformation post out of every 40, according to a document from June 2020.

One takeaway is that Facebook’s algorithm isn’t a runaway train. The company may not directly control what any given user posts, but by choosing which types of posts will be seen, it sculpts the information landscape according to its business priorities. Some within the company would like to see Facebook use the algorithm to explicitly promote certain values, such as democracy and civil discourse. Others have suggested that it develop and prioritize new metrics that align with users’ values, as with a 2020 experiment in which the algorithm was trained to predict what posts they would find “good for the world” and “bad for the world,” and optimize for the former.
| +| [T0153.006 Content Recommendation Algorithm](../../generated_pages/techniques/T0153.006.md) |  IT00000472 This 2021 report by The Washington Post explains the mechanics of Facebook’s algorithm (T0151.001: Social Media Platform, T0153.006: Content Recommendation Algorithm):

In its early years, Facebook’s algorithm prioritized signals such as likes, clicks and comments to decide which posts to amplify. Publishers, brands and individual users soon learned how to craft posts and headlines designed to induce likes and clicks, giving rise to what came to be known as “clickbait.” By 2013, upstart publishers such as Upworthy and ViralNova were amassing tens of millions of readers with articles designed specifically to game Facebook’s news feed algorithm.

Facebook realized that users were growing wary of misleading teaser headlines, and the company recalibrated its algorithm in 2014 and 2015 to downgrade clickbait and focus on new metrics, such as the amount of time a user spent reading a story or watching a video, and incorporating surveys on what content users found most valuable. Around the same time, its executives identified video as a business priority, and used the algorithm to boost “native” videos shared directly to Facebook. By the mid-2010s, the news feed had tilted toward slick, professionally produced content, especially videos that would hold people’s attention.

In 2016, however, Facebook executives grew worried about a decline in “original sharing.” Users were spending so much time passively watching and reading that they weren’t interacting with each other as much. Young people in particular shifted their personal conversations to rivals such as Snapchat that offered more intimacy.

Once again, Facebook found its answer in the algorithm: It developed a new set of goal metrics that it called “meaningful social interactions,” designed to show users more posts from friends and family, and fewer from big publishers and brands. In particular, the algorithm began to give outsize weight to posts that sparked lots of comments and replies.

The downside of this approach was that the posts that sparked the most comments tended to be the ones that made people angry or offended them, the documents show. Facebook became an angrier, more polarizing place. It didn’t help that, starting in 2017, the algorithm had assigned reaction emoji — including the angry emoji — five times the weight of a simple “like,” according to company documents.

[...]

Internal documents show Facebook researchers found that, for the most politically oriented 1 million American users, nearly 90 percent of the content that Facebook shows them is about politics and social issues. Those groups also received the most misinformation, especially a set of users associated with mostly right-leaning content, who were shown one misinformation post out of every 40, according to a document from June 2020.

One takeaway is that Facebook’s algorithm isn’t a runaway train. The company may not directly control what any given user posts, but by choosing which types of posts will be seen, it sculpts the information landscape according to its business priorities. Some within the company would like to see Facebook use the algorithm to explicitly promote certain values, such as democracy and civil discourse. Others have suggested that it develop and prioritize new metrics that align with users’ values, as with a 2020 experiment in which the algorithm was trained to predict what posts they would find “good for the world” and “bad for the world,” and optimize for the former.
| DO NOT EDIT ABOVE THIS LINE - PLEASE ADD NOTES BELOW \ No newline at end of file diff --git a/generated_pages/incidents/I00116.md b/generated_pages/incidents/I00116.md index 0f644fe..67b9717 100644 --- a/generated_pages/incidents/I00116.md +++ b/generated_pages/incidents/I00116.md @@ -15,19 +15,20 @@ | Reference | Pub Date | Authors | Org | Archive | | --------- | -------- | ------- | --- | ------- | +| [https://www.theguardian.com/technology/2023/aug/27/consumers-complaining-x-targeted-scammers-verification-changes-twitter](https://www.theguardian.com/technology/2023/aug/27/consumers-complaining-x-targeted-scammers-verification-changes-twitter) | 2023/08/27 | Anna Tims | The Guardian | [https://web.archive.org/web/20230827142858/https://www.theguardian.com/technology/2023/aug/27/consumers-complaining-x-targeted-scammers-verification-changes-twitter](https://web.archive.org/web/20230827142858/https://www.theguardian.com/technology/2023/aug/27/consumers-complaining-x-targeted-scammers-verification-changes-twitter) | | Technique | Description given for this incident | | --------- | ------------------------- | -| [T0097.205 Business Persona](../../generated_pages/techniques/T0097.205.md) |  IT00000476 Consumers who complain of poor customer service on X are being targeted by scammers after the social media platform formerly known as Twitter changed its account verification process.

Bank customers and airline passengers are among those at risk of phishing scams when they complain to companies via X. Fraudsters, masquerading as customer service agents, respond under fake X handles and trick victims into disclosing their bank details to get a promised refund.

They typically win the trust of victims by displaying the blue checkmark icon, which until this year denoted accounts that had been officially verified by X.

Changes introduced this year allow the icon to be bought by anyone who pays an £11 monthly fee for the site’s subscription service, renamed this month from Twitter Blue to X Premium. Businesses that pay £950 a month receive a gold tick. X’s terms and conditions do not state whether subscriber accounts are pre-vetted.

Andrew Thomas was contacted by a scam account after posting a complaint to the travel platform Booking.com. “I’d been trying since April to get a refund after our holiday flights were cancelled and finally resorted to X,” he said.

“I received a response asking me to follow them, and DM [direct message] them with a contact number. They then called me via WhatsApp asking for my reference number so they could investigate. Later they called back to say that I would be refunded via their payment partner for which I’d need to download an app.”

Thomas became suspicious and checked the X profile. “It looked like the real thing, but I noticed that there was an unexpected hyphen in the Twitter handle and that it had only joined X in July 2023,” he said.


In this example a newly created paid account was created on X, used to direct users to other platforms (T0146.002: Paid Account, T0146.003: Verified Account, T0146.005: Lookalike Account ID, T0097.205: Business Persona, T0122: Direct Users to Alternative Platforms, T0143.003: Impersonated Persona, T0151.008: Microblogging Platform, T0150.001: Newly Created). | -| [T0122 Direct Users to Alternative Platforms](../../generated_pages/techniques/T0122.md) |  IT00000477 Consumers who complain of poor customer service on X are being targeted by scammers after the social media platform formerly known as Twitter changed its account verification process.

Bank customers and airline passengers are among those at risk of phishing scams when they complain to companies via X. Fraudsters, masquerading as customer service agents, respond under fake X handles and trick victims into disclosing their bank details to get a promised refund.

They typically win the trust of victims by displaying the blue checkmark icon, which until this year denoted accounts that had been officially verified by X.

Changes introduced this year allow the icon to be bought by anyone who pays an £11 monthly fee for the site’s subscription service, renamed this month from Twitter Blue to X Premium. Businesses that pay £950 a month receive a gold tick. X’s terms and conditions do not state whether subscriber accounts are pre-vetted.

Andrew Thomas was contacted by a scam account after posting a complaint to the travel platform Booking.com. “I’d been trying since April to get a refund after our holiday flights were cancelled and finally resorted to X,” he said.

“I received a response asking me to follow them, and DM [direct message] them with a contact number. They then called me via WhatsApp asking for my reference number so they could investigate. Later they called back to say that I would be refunded via their payment partner for which I’d need to download an app.”

Thomas became suspicious and checked the X profile. “It looked like the real thing, but I noticed that there was an unexpected hyphen in the Twitter handle and that it had only joined X in July 2023,” he said.


In this example a newly created paid account was created on X, used to direct users to other platforms (T0146.002: Paid Account, T0146.003: Verified Account, T0146.005: Lookalike Account ID, T0097.205: Business Persona, T0122: Direct Users to Alternative Platforms, T0143.003: Impersonated Persona, T0151.008: Microblogging Platform, T0150.001: Newly Created). | -| [T0143.003 Impersonated Persona](../../generated_pages/techniques/T0143.003.md) |  IT00000478 Consumers who complain of poor customer service on X are being targeted by scammers after the social media platform formerly known as Twitter changed its account verification process.

Bank customers and airline passengers are among those at risk of phishing scams when they complain to companies via X. Fraudsters, masquerading as customer service agents, respond under fake X handles and trick victims into disclosing their bank details to get a promised refund.

They typically win the trust of victims by displaying the blue checkmark icon, which until this year denoted accounts that had been officially verified by X.

Changes introduced this year allow the icon to be bought by anyone who pays an £11 monthly fee for the site’s subscription service, renamed this month from Twitter Blue to X Premium. Businesses that pay £950 a month receive a gold tick. X’s terms and conditions do not state whether subscriber accounts are pre-vetted.

Andrew Thomas was contacted by a scam account after posting a complaint to the travel platform Booking.com. “I’d been trying since April to get a refund after our holiday flights were cancelled and finally resorted to X,” he said.

“I received a response asking me to follow them, and DM [direct message] them with a contact number. They then called me via WhatsApp asking for my reference number so they could investigate. Later they called back to say that I would be refunded via their payment partner for which I’d need to download an app.”

Thomas became suspicious and checked the X profile. “It looked like the real thing, but I noticed that there was an unexpected hyphen in the Twitter handle and that it had only joined X in July 2023,” he said.


In this example a newly created paid account was created on X, used to direct users to other platforms (T0146.002: Paid Account, T0146.003: Verified Account, T0146.005: Lookalike Account ID, T0097.205: Business Persona, T0122: Direct Users to Alternative Platforms, T0143.003: Impersonated Persona, T0151.008: Microblogging Platform, T0150.001: Newly Created). | -| [T0146.002 Paid Account](../../generated_pages/techniques/T0146.002.md) |  IT00000473 Consumers who complain of poor customer service on X are being targeted by scammers after the social media platform formerly known as Twitter changed its account verification process.

Bank customers and airline passengers are among those at risk of phishing scams when they complain to companies via X. Fraudsters, masquerading as customer service agents, respond under fake X handles and trick victims into disclosing their bank details to get a promised refund.

They typically win the trust of victims by displaying the blue checkmark icon, which until this year denoted accounts that had been officially verified by X.

Changes introduced this year allow the icon to be bought by anyone who pays an £11 monthly fee for the site’s subscription service, renamed this month from Twitter Blue to X Premium. Businesses that pay £950 a month receive a gold tick. X’s terms and conditions do not state whether subscriber accounts are pre-vetted.

Andrew Thomas was contacted by a scam account after posting a complaint to the travel platform Booking.com. “I’d been trying since April to get a refund after our holiday flights were cancelled and finally resorted to X,” he said.

“I received a response asking me to follow them, and DM [direct message] them with a contact number. They then called me via WhatsApp asking for my reference number so they could investigate. Later they called back to say that I would be refunded via their payment partner for which I’d need to download an app.”

Thomas became suspicious and checked the X profile. “It looked like the real thing, but I noticed that there was an unexpected hyphen in the Twitter handle and that it had only joined X in July 2023,” he said.


In this example a newly created paid account was created on X, used to direct users to other platforms (T0146.002: Paid Account, T0146.003: Verified Account, T0146.005: Lookalike Account ID, T0097.205: Business Persona, T0122: Direct Users to Alternative Platforms, T0143.003: Impersonated Persona, T0151.008: Microblogging Platform, T0150.001: Newly Created). | -| [T0146.003 Verified Account](../../generated_pages/techniques/T0146.003.md) |  IT00000474 Consumers who complain of poor customer service on X are being targeted by scammers after the social media platform formerly known as Twitter changed its account verification process.

Bank customers and airline passengers are among those at risk of phishing scams when they complain to companies via X. Fraudsters, masquerading as customer service agents, respond under fake X handles and trick victims into disclosing their bank details to get a promised refund.

They typically win the trust of victims by displaying the blue checkmark icon, which until this year denoted accounts that had been officially verified by X.

Changes introduced this year allow the icon to be bought by anyone who pays an £11 monthly fee for the site’s subscription service, renamed this month from Twitter Blue to X Premium. Businesses that pay £950 a month receive a gold tick. X’s terms and conditions do not state whether subscriber accounts are pre-vetted.

Andrew Thomas was contacted by a scam account after posting a complaint to the travel platform Booking.com. “I’d been trying since April to get a refund after our holiday flights were cancelled and finally resorted to X,” he said.

“I received a response asking me to follow them, and DM [direct message] them with a contact number. They then called me via WhatsApp asking for my reference number so they could investigate. Later they called back to say that I would be refunded via their payment partner for which I’d need to download an app.”

Thomas became suspicious and checked the X profile. “It looked like the real thing, but I noticed that there was an unexpected hyphen in the Twitter handle and that it had only joined X in July 2023,” he said.


In this example a newly created paid account was created on X, used to direct users to other platforms (T0146.002: Paid Account, T0146.003: Verified Account, T0146.005: Lookalike Account ID, T0097.205: Business Persona, T0122: Direct Users to Alternative Platforms, T0143.003: Impersonated Persona, T0151.008: Microblogging Platform, T0150.001: Newly Created). | -| [T0146.005 Lookalike Account ID](../../generated_pages/techniques/T0146.005.md) |  IT00000475 Consumers who complain of poor customer service on X are being targeted by scammers after the social media platform formerly known as Twitter changed its account verification process.

Bank customers and airline passengers are among those at risk of phishing scams when they complain to companies via X. Fraudsters, masquerading as customer service agents, respond under fake X handles and trick victims into disclosing their bank details to get a promised refund.

They typically win the trust of victims by displaying the blue checkmark icon, which until this year denoted accounts that had been officially verified by X.

Changes introduced this year allow the icon to be bought by anyone who pays an £11 monthly fee for the site’s subscription service, renamed this month from Twitter Blue to X Premium. Businesses that pay £950 a month receive a gold tick. X’s terms and conditions do not state whether subscriber accounts are pre-vetted.

Andrew Thomas was contacted by a scam account after posting a complaint to the travel platform Booking.com. “I’d been trying since April to get a refund after our holiday flights were cancelled and finally resorted to X,” he said.

“I received a response asking me to follow them, and DM [direct message] them with a contact number. They then called me via WhatsApp asking for my reference number so they could investigate. Later they called back to say that I would be refunded via their payment partner for which I’d need to download an app.”

Thomas became suspicious and checked the X profile. “It looked like the real thing, but I noticed that there was an unexpected hyphen in the Twitter handle and that it had only joined X in July 2023,” he said.


In this example a newly created paid account was created on X, used to direct users to other platforms (T0146.002: Paid Account, T0146.003: Verified Account, T0146.005: Lookalike Account ID, T0097.205: Business Persona, T0122: Direct Users to Alternative Platforms, T0143.003: Impersonated Persona, T0151.008: Microblogging Platform, T0150.001: Newly Created). | -| [T0150.001 Newly Created](../../generated_pages/techniques/T0150.001.md) |  IT00000480 Consumers who complain of poor customer service on X are being targeted by scammers after the social media platform formerly known as Twitter changed its account verification process.

Bank customers and airline passengers are among those at risk of phishing scams when they complain to companies via X. Fraudsters, masquerading as customer service agents, respond under fake X handles and trick victims into disclosing their bank details to get a promised refund.

They typically win the trust of victims by displaying the blue checkmark icon, which until this year denoted accounts that had been officially verified by X.

Changes introduced this year allow the icon to be bought by anyone who pays an £11 monthly fee for the site’s subscription service, renamed this month from Twitter Blue to X Premium. Businesses that pay £950 a month receive a gold tick. X’s terms and conditions do not state whether subscriber accounts are pre-vetted.

Andrew Thomas was contacted by a scam account after posting a complaint to the travel platform Booking.com. “I’d been trying since April to get a refund after our holiday flights were cancelled and finally resorted to X,” he said.

“I received a response asking me to follow them, and DM [direct message] them with a contact number. They then called me via WhatsApp asking for my reference number so they could investigate. Later they called back to say that I would be refunded via their payment partner for which I’d need to download an app.”

Thomas became suspicious and checked the X profile. “It looked like the real thing, but I noticed that there was an unexpected hyphen in the Twitter handle and that it had only joined X in July 2023,” he said.


In this example a newly created paid account was created on X, used to direct users to other platforms (T0146.002: Paid Account, T0146.003: Verified Account, T0146.005: Lookalike Account ID, T0097.205: Business Persona, T0122: Direct Users to Alternative Platforms, T0143.003: Impersonated Persona, T0151.008: Microblogging Platform, T0150.001: Newly Created). | -| [T0151.008 Microblogging Platform](../../generated_pages/techniques/T0151.008.md) |  IT00000479 Consumers who complain of poor customer service on X are being targeted by scammers after the social media platform formerly known as Twitter changed its account verification process.

Bank customers and airline passengers are among those at risk of phishing scams when they complain to companies via X. Fraudsters, masquerading as customer service agents, respond under fake X handles and trick victims into disclosing their bank details to get a promised refund.

They typically win the trust of victims by displaying the blue checkmark icon, which until this year denoted accounts that had been officially verified by X.

Changes introduced this year allow the icon to be bought by anyone who pays an £11 monthly fee for the site’s subscription service, renamed this month from Twitter Blue to X Premium. Businesses that pay £950 a month receive a gold tick. X’s terms and conditions do not state whether subscriber accounts are pre-vetted.

Andrew Thomas was contacted by a scam account after posting a complaint to the travel platform Booking.com. “I’d been trying since April to get a refund after our holiday flights were cancelled and finally resorted to X,” he said.

“I received a response asking me to follow them, and DM [direct message] them with a contact number. They then called me via WhatsApp asking for my reference number so they could investigate. Later they called back to say that I would be refunded via their payment partner for which I’d need to download an app.”

Thomas became suspicious and checked the X profile. “It looked like the real thing, but I noticed that there was an unexpected hyphen in the Twitter handle and that it had only joined X in July 2023,” he said.


In this example a newly created paid account was created on X, used to direct users to other platforms (T0146.002: Paid Account, T0146.003: Verified Account, T0146.005: Lookalike Account ID, T0097.205: Business Persona, T0122: Direct Users to Alternative Platforms, T0143.003: Impersonated Persona, T0151.008: Microblogging Platform, T0150.001: Newly Created). | +| [T0097.205 Business Persona](../../generated_pages/techniques/T0097.205.md) |  IT00000476 Consumers who complain of poor customer service on X are being targeted by scammers after the social media platform formerly known as Twitter changed its account verification process.

Bank customers and airline passengers are among those at risk of phishing scams when they complain to companies via X. Fraudsters, masquerading as customer service agents, respond under fake X handles and trick victims into disclosing their bank details to get a promised refund.

They typically win the trust of victims by displaying the blue checkmark icon, which until this year denoted accounts that had been officially verified by X.

Changes introduced this year allow the icon to be bought by anyone who pays an £11 monthly fee for the site’s subscription service, renamed this month from Twitter Blue to X Premium. Businesses that pay £950 a month receive a gold tick. X’s terms and conditions do not state whether subscriber accounts are pre-vetted.

Andrew Thomas was contacted by a scam account after posting a complaint to the travel platform Booking.com. “I’d been trying since April to get a refund after our holiday flights were cancelled and finally resorted to X,” he said.

“I received a response asking me to follow them, and DM [direct message] them with a contact number. They then called me via WhatsApp asking for my reference number so they could investigate. Later they called back to say that I would be refunded via their payment partner for which I’d need to download an app.”

Thomas became suspicious and checked the X profile. “It looked like the real thing, but I noticed that there was an unexpected hyphen in the Twitter handle and that it had only joined X in July 2023,” he said.


In this example a newly created paid account was created on X, used to direct users to other platforms (T0146.002: Paid Account Asset, T0146.003: Verified Account Asset, T0146.005: Lookalike Account ID, T0097.205: Business Persona, T0122: Direct Users to Alternative Platforms, T0143.003: Impersonated Persona, T0151.008: Microblogging Platform, T0150.001: Newly Created Asset). | +| [T0122 Direct Users to Alternative Platforms](../../generated_pages/techniques/T0122.md) |  IT00000477 Consumers who complain of poor customer service on X are being targeted by scammers after the social media platform formerly known as Twitter changed its account verification process.

Bank customers and airline passengers are among those at risk of phishing scams when they complain to companies via X. Fraudsters, masquerading as customer service agents, respond under fake X handles and trick victims into disclosing their bank details to get a promised refund.

They typically win the trust of victims by displaying the blue checkmark icon, which until this year denoted accounts that had been officially verified by X.

Changes introduced this year allow the icon to be bought by anyone who pays an £11 monthly fee for the site’s subscription service, renamed this month from Twitter Blue to X Premium. Businesses that pay £950 a month receive a gold tick. X’s terms and conditions do not state whether subscriber accounts are pre-vetted.

Andrew Thomas was contacted by a scam account after posting a complaint to the travel platform Booking.com. “I’d been trying since April to get a refund after our holiday flights were cancelled and finally resorted to X,” he said.

“I received a response asking me to follow them, and DM [direct message] them with a contact number. They then called me via WhatsApp asking for my reference number so they could investigate. Later they called back to say that I would be refunded via their payment partner for which I’d need to download an app.”

Thomas became suspicious and checked the X profile. “It looked like the real thing, but I noticed that there was an unexpected hyphen in the Twitter handle and that it had only joined X in July 2023,” he said.


In this example a newly created paid account was created on X, used to direct users to other platforms (T0146.002: Paid Account Asset, T0146.003: Verified Account Asset, T0146.005: Lookalike Account ID, T0097.205: Business Persona, T0122: Direct Users to Alternative Platforms, T0143.003: Impersonated Persona, T0151.008: Microblogging Platform, T0150.001: Newly Created Asset). | +| [T0143.003 Impersonated Persona](../../generated_pages/techniques/T0143.003.md) |  IT00000478 Consumers who complain of poor customer service on X are being targeted by scammers after the social media platform formerly known as Twitter changed its account verification process.

Bank customers and airline passengers are among those at risk of phishing scams when they complain to companies via X. Fraudsters, masquerading as customer service agents, respond under fake X handles and trick victims into disclosing their bank details to get a promised refund.

They typically win the trust of victims by displaying the blue checkmark icon, which until this year denoted accounts that had been officially verified by X.

Changes introduced this year allow the icon to be bought by anyone who pays an £11 monthly fee for the site’s subscription service, renamed this month from Twitter Blue to X Premium. Businesses that pay £950 a month receive a gold tick. X’s terms and conditions do not state whether subscriber accounts are pre-vetted.

Andrew Thomas was contacted by a scam account after posting a complaint to the travel platform Booking.com. “I’d been trying since April to get a refund after our holiday flights were cancelled and finally resorted to X,” he said.

“I received a response asking me to follow them, and DM [direct message] them with a contact number. They then called me via WhatsApp asking for my reference number so they could investigate. Later they called back to say that I would be refunded via their payment partner for which I’d need to download an app.”

Thomas became suspicious and checked the X profile. “It looked like the real thing, but I noticed that there was an unexpected hyphen in the Twitter handle and that it had only joined X in July 2023,” he said.


In this example a newly created paid account was created on X, used to direct users to other platforms (T0146.002: Paid Account Asset, T0146.003: Verified Account Asset, T0146.005: Lookalike Account ID, T0097.205: Business Persona, T0122: Direct Users to Alternative Platforms, T0143.003: Impersonated Persona, T0151.008: Microblogging Platform, T0150.001: Newly Created Asset). | +| [T0146.002 Paid Account Asset](../../generated_pages/techniques/T0146.002.md) |  IT00000473 Consumers who complain of poor customer service on X are being targeted by scammers after the social media platform formerly known as Twitter changed its account verification process.

Bank customers and airline passengers are among those at risk of phishing scams when they complain to companies via X. Fraudsters, masquerading as customer service agents, respond under fake X handles and trick victims into disclosing their bank details to get a promised refund.

They typically win the trust of victims by displaying the blue checkmark icon, which until this year denoted accounts that had been officially verified by X.

Changes introduced this year allow the icon to be bought by anyone who pays an £11 monthly fee for the site’s subscription service, renamed this month from Twitter Blue to X Premium. Businesses that pay £950 a month receive a gold tick. X’s terms and conditions do not state whether subscriber accounts are pre-vetted.

Andrew Thomas was contacted by a scam account after posting a complaint to the travel platform Booking.com. “I’d been trying since April to get a refund after our holiday flights were cancelled and finally resorted to X,” he said.

“I received a response asking me to follow them, and DM [direct message] them with a contact number. They then called me via WhatsApp asking for my reference number so they could investigate. Later they called back to say that I would be refunded via their payment partner for which I’d need to download an app.”

Thomas became suspicious and checked the X profile. “It looked like the real thing, but I noticed that there was an unexpected hyphen in the Twitter handle and that it had only joined X in July 2023,” he said.


In this example a newly created paid account was created on X, used to direct users to other platforms (T0146.002: Paid Account Asset, T0146.003: Verified Account Asset, T0146.005: Lookalike Account ID, T0097.205: Business Persona, T0122: Direct Users to Alternative Platforms, T0143.003: Impersonated Persona, T0151.008: Microblogging Platform, T0150.001: Newly Created Asset). | +| [T0146.003 Verified Account Asset](../../generated_pages/techniques/T0146.003.md) |  IT00000474 Consumers who complain of poor customer service on X are being targeted by scammers after the social media platform formerly known as Twitter changed its account verification process.

Bank customers and airline passengers are among those at risk of phishing scams when they complain to companies via X. Fraudsters, masquerading as customer service agents, respond under fake X handles and trick victims into disclosing their bank details to get a promised refund.

They typically win the trust of victims by displaying the blue checkmark icon, which until this year denoted accounts that had been officially verified by X.

Changes introduced this year allow the icon to be bought by anyone who pays an £11 monthly fee for the site’s subscription service, renamed this month from Twitter Blue to X Premium. Businesses that pay £950 a month receive a gold tick. X’s terms and conditions do not state whether subscriber accounts are pre-vetted.

Andrew Thomas was contacted by a scam account after posting a complaint to the travel platform Booking.com. “I’d been trying since April to get a refund after our holiday flights were cancelled and finally resorted to X,” he said.

“I received a response asking me to follow them, and DM [direct message] them with a contact number. They then called me via WhatsApp asking for my reference number so they could investigate. Later they called back to say that I would be refunded via their payment partner for which I’d need to download an app.”

Thomas became suspicious and checked the X profile. “It looked like the real thing, but I noticed that there was an unexpected hyphen in the Twitter handle and that it had only joined X in July 2023,” he said.


In this example a newly created paid account was created on X, used to direct users to other platforms (T0146.002: Paid Account Asset, T0146.003: Verified Account Asset, T0146.005: Lookalike Account ID, T0097.205: Business Persona, T0122: Direct Users to Alternative Platforms, T0143.003: Impersonated Persona, T0151.008: Microblogging Platform, T0150.001: Newly Created Asset). | +| [T0146.005 Lookalike Account ID](../../generated_pages/techniques/T0146.005.md) |  IT00000475 Consumers who complain of poor customer service on X are being targeted by scammers after the social media platform formerly known as Twitter changed its account verification process.

Bank customers and airline passengers are among those at risk of phishing scams when they complain to companies via X. Fraudsters, masquerading as customer service agents, respond under fake X handles and trick victims into disclosing their bank details to get a promised refund.

They typically win the trust of victims by displaying the blue checkmark icon, which until this year denoted accounts that had been officially verified by X.

Changes introduced this year allow the icon to be bought by anyone who pays an £11 monthly fee for the site’s subscription service, renamed this month from Twitter Blue to X Premium. Businesses that pay £950 a month receive a gold tick. X’s terms and conditions do not state whether subscriber accounts are pre-vetted.

Andrew Thomas was contacted by a scam account after posting a complaint to the travel platform Booking.com. “I’d been trying since April to get a refund after our holiday flights were cancelled and finally resorted to X,” he said.

“I received a response asking me to follow them, and DM [direct message] them with a contact number. They then called me via WhatsApp asking for my reference number so they could investigate. Later they called back to say that I would be refunded via their payment partner for which I’d need to download an app.”

Thomas became suspicious and checked the X profile. “It looked like the real thing, but I noticed that there was an unexpected hyphen in the Twitter handle and that it had only joined X in July 2023,” he said.


In this example a newly created paid account was created on X, used to direct users to other platforms (T0146.002: Paid Account Asset, T0146.003: Verified Account Asset, T0146.005: Lookalike Account ID, T0097.205: Business Persona, T0122: Direct Users to Alternative Platforms, T0143.003: Impersonated Persona, T0151.008: Microblogging Platform, T0150.001: Newly Created Asset). | +| [T0150.001 Newly Created Asset](../../generated_pages/techniques/T0150.001.md) |  IT00000480 Consumers who complain of poor customer service on X are being targeted by scammers after the social media platform formerly known as Twitter changed its account verification process.

Bank customers and airline passengers are among those at risk of phishing scams when they complain to companies via X. Fraudsters, masquerading as customer service agents, respond under fake X handles and trick victims into disclosing their bank details to get a promised refund.

They typically win the trust of victims by displaying the blue checkmark icon, which until this year denoted accounts that had been officially verified by X.

Changes introduced this year allow the icon to be bought by anyone who pays an £11 monthly fee for the site’s subscription service, renamed this month from Twitter Blue to X Premium. Businesses that pay £950 a month receive a gold tick. X’s terms and conditions do not state whether subscriber accounts are pre-vetted.

Andrew Thomas was contacted by a scam account after posting a complaint to the travel platform Booking.com. “I’d been trying since April to get a refund after our holiday flights were cancelled and finally resorted to X,” he said.

“I received a response asking me to follow them, and DM [direct message] them with a contact number. They then called me via WhatsApp asking for my reference number so they could investigate. Later they called back to say that I would be refunded via their payment partner for which I’d need to download an app.”

Thomas became suspicious and checked the X profile. “It looked like the real thing, but I noticed that there was an unexpected hyphen in the Twitter handle and that it had only joined X in July 2023,” he said.


In this example a newly created paid account was created on X, used to direct users to other platforms (T0146.002: Paid Account Asset, T0146.003: Verified Account Asset, T0146.005: Lookalike Account ID, T0097.205: Business Persona, T0122: Direct Users to Alternative Platforms, T0143.003: Impersonated Persona, T0151.008: Microblogging Platform, T0150.001: Newly Created Asset). | +| [T0151.008 Microblogging Platform](../../generated_pages/techniques/T0151.008.md) |  IT00000479 Consumers who complain of poor customer service on X are being targeted by scammers after the social media platform formerly known as Twitter changed its account verification process.

Bank customers and airline passengers are among those at risk of phishing scams when they complain to companies via X. Fraudsters, masquerading as customer service agents, respond under fake X handles and trick victims into disclosing their bank details to get a promised refund.

They typically win the trust of victims by displaying the blue checkmark icon, which until this year denoted accounts that had been officially verified by X.

Changes introduced this year allow the icon to be bought by anyone who pays an £11 monthly fee for the site’s subscription service, renamed this month from Twitter Blue to X Premium. Businesses that pay £950 a month receive a gold tick. X’s terms and conditions do not state whether subscriber accounts are pre-vetted.

Andrew Thomas was contacted by a scam account after posting a complaint to the travel platform Booking.com. “I’d been trying since April to get a refund after our holiday flights were cancelled and finally resorted to X,” he said.

“I received a response asking me to follow them, and DM [direct message] them with a contact number. They then called me via WhatsApp asking for my reference number so they could investigate. Later they called back to say that I would be refunded via their payment partner for which I’d need to download an app.”

Thomas became suspicious and checked the X profile. “It looked like the real thing, but I noticed that there was an unexpected hyphen in the Twitter handle and that it had only joined X in July 2023,” he said.


In this example a newly created paid account was created on X, used to direct users to other platforms (T0146.002: Paid Account Asset, T0146.003: Verified Account Asset, T0146.005: Lookalike Account ID, T0097.205: Business Persona, T0122: Direct Users to Alternative Platforms, T0143.003: Impersonated Persona, T0151.008: Microblogging Platform, T0150.001: Newly Created Asset). | DO NOT EDIT ABOVE THIS LINE - PLEASE ADD NOTES BELOW \ No newline at end of file diff --git a/generated_pages/incidents/I00117.md b/generated_pages/incidents/I00117.md index 30b7e6d..3f8bd1f 100644 --- a/generated_pages/incidents/I00117.md +++ b/generated_pages/incidents/I00117.md @@ -15,6 +15,7 @@ | Reference | Pub Date | Authors | Org | Archive | | --------- | -------- | ------- | --- | ------- | +| [https://www.bellingcat.com/news/americas/2019/08/04/the-el-paso-shooting-and-the-gamification-of-terror/](https://www.bellingcat.com/news/americas/2019/08/04/the-el-paso-shooting-and-the-gamification-of-terror/) | 2019/08/04 | Robert Evans | bellingcat | [https://web.archive.org/web/20190804002224/https://www.bellingcat.com/news/americas/2019/08/04/the-el-paso-shooting-and-the-gamification-of-terror/](https://web.archive.org/web/20190804002224/https://www.bellingcat.com/news/americas/2019/08/04/the-el-paso-shooting-and-the-gamification-of-terror/) | diff --git a/generated_pages/incidents/I00118.md b/generated_pages/incidents/I00118.md index 60b3d63..8d13a3c 100644 --- a/generated_pages/incidents/I00118.md +++ b/generated_pages/incidents/I00118.md @@ -15,17 +15,18 @@ | Reference | Pub Date | Authors | Org | Archive | | --------- | -------- | ------- | --- | ------- | +| [https://taskandpurpose.com/news/war-thunder-forum-military-technology-leaks/](https://taskandpurpose.com/news/war-thunder-forum-military-technology-leaks/) | 2023/01/20 | Max Hauptman | Task & Purpose | [https://web.archive.org/web/20241116165206/https://taskandpurpose.com/news/war-thunder-forum-military-technology-leaks/](https://web.archive.org/web/20241116165206/https://taskandpurpose.com/news/war-thunder-forum-military-technology-leaks/) | | Technique | Description given for this incident | | --------- | ------------------------- | -| [T0089.001 Obtain Authentic Documents](../../generated_pages/techniques/T0089.001.md) |  IT00000481 In an effort to prove that the developers behind a popular multiplayer vehicle combat game had made a mistake, a player went ahead and published classified British military documents about one of the real-life tanks featured in the game.

This truly bizarre turn of events recently occurred in the public forum for War Thunder, a free-to-player multiplayer combat sim featuring modern land, air, and sea craft. Getting a small detail wrong on a piece of equipment might not be a big deal for the average gamer, but for the War Thunder crowd it sure as hell is. With 25,000 devoted players, the game very much bills itself as the military vehicle combat simulator.

A player, who identified himself as a British tank commander, claimed that the game’s developers at Gaijin Entertainment had inaccurately represented the Challenger 2 main battle tank used by the British military.

The self-described tank commander’s bio listed his location as Tidworth Camp in Wiltshire, England, according to the UK Defense Journal, which reported that the base is home to the Royal Tank Regiment, which fields Challenger 2 tanks.

The player, who went by the handle Pyrophoric, reportedly shared an image on the War Thunder forum of the tank’s specs that were pulled from the Challenger 2’s Army Equipment Support Publication, which is essentially a technical manual.

[...]

A moderator for the forum, who’s handle is “Templar_”, explained that the developer had removed the material after they received confirmation from the Ministry of Defense that the document is still in fact classified.


A user of War Thunder’s forums posted confidential documents to win an argument (T0089.001: Obtain Authentic Documents, T0146: Account, T0097.105: Military Personnel Persona, T0115: Post Content, T0143.001: Authentic Persona, T0151.009: Legacy Online Forum Platform). | -| [T0097.105 Military Personnel Persona](../../generated_pages/techniques/T0097.105.md) |  IT00000483 In an effort to prove that the developers behind a popular multiplayer vehicle combat game had made a mistake, a player went ahead and published classified British military documents about one of the real-life tanks featured in the game.

This truly bizarre turn of events recently occurred in the public forum for War Thunder, a free-to-player multiplayer combat sim featuring modern land, air, and sea craft. Getting a small detail wrong on a piece of equipment might not be a big deal for the average gamer, but for the War Thunder crowd it sure as hell is. With 25,000 devoted players, the game very much bills itself as the military vehicle combat simulator.

A player, who identified himself as a British tank commander, claimed that the game’s developers at Gaijin Entertainment had inaccurately represented the Challenger 2 main battle tank used by the British military.

The self-described tank commander’s bio listed his location as Tidworth Camp in Wiltshire, England, according to the UK Defense Journal, which reported that the base is home to the Royal Tank Regiment, which fields Challenger 2 tanks.

The player, who went by the handle Pyrophoric, reportedly shared an image on the War Thunder forum of the tank’s specs that were pulled from the Challenger 2’s Army Equipment Support Publication, which is essentially a technical manual.

[...]

A moderator for the forum, who’s handle is “Templar_”, explained that the developer had removed the material after they received confirmation from the Ministry of Defense that the document is still in fact classified.


A user of War Thunder’s forums posted confidential documents to win an argument (T0089.001: Obtain Authentic Documents, T0146: Account, T0097.105: Military Personnel Persona, T0115: Post Content, T0143.001: Authentic Persona, T0151.009: Legacy Online Forum Platform). | -| [T0115 Post Content](../../generated_pages/techniques/T0115.md) |  IT00000484 In an effort to prove that the developers behind a popular multiplayer vehicle combat game had made a mistake, a player went ahead and published classified British military documents about one of the real-life tanks featured in the game.

This truly bizarre turn of events recently occurred in the public forum for War Thunder, a free-to-player multiplayer combat sim featuring modern land, air, and sea craft. Getting a small detail wrong on a piece of equipment might not be a big deal for the average gamer, but for the War Thunder crowd it sure as hell is. With 25,000 devoted players, the game very much bills itself as the military vehicle combat simulator.

A player, who identified himself as a British tank commander, claimed that the game’s developers at Gaijin Entertainment had inaccurately represented the Challenger 2 main battle tank used by the British military.

The self-described tank commander’s bio listed his location as Tidworth Camp in Wiltshire, England, according to the UK Defense Journal, which reported that the base is home to the Royal Tank Regiment, which fields Challenger 2 tanks.

The player, who went by the handle Pyrophoric, reportedly shared an image on the War Thunder forum of the tank’s specs that were pulled from the Challenger 2’s Army Equipment Support Publication, which is essentially a technical manual.

[...]

A moderator for the forum, who’s handle is “Templar_”, explained that the developer had removed the material after they received confirmation from the Ministry of Defense that the document is still in fact classified.


A user of War Thunder’s forums posted confidential documents to win an argument (T0089.001: Obtain Authentic Documents, T0146: Account, T0097.105: Military Personnel Persona, T0115: Post Content, T0143.001: Authentic Persona, T0151.009: Legacy Online Forum Platform). | -| [T0143.001 Authentic Persona](../../generated_pages/techniques/T0143.001.md) |  IT00000485 In an effort to prove that the developers behind a popular multiplayer vehicle combat game had made a mistake, a player went ahead and published classified British military documents about one of the real-life tanks featured in the game.

This truly bizarre turn of events recently occurred in the public forum for War Thunder, a free-to-player multiplayer combat sim featuring modern land, air, and sea craft. Getting a small detail wrong on a piece of equipment might not be a big deal for the average gamer, but for the War Thunder crowd it sure as hell is. With 25,000 devoted players, the game very much bills itself as the military vehicle combat simulator.

A player, who identified himself as a British tank commander, claimed that the game’s developers at Gaijin Entertainment had inaccurately represented the Challenger 2 main battle tank used by the British military.

The self-described tank commander’s bio listed his location as Tidworth Camp in Wiltshire, England, according to the UK Defense Journal, which reported that the base is home to the Royal Tank Regiment, which fields Challenger 2 tanks.

The player, who went by the handle Pyrophoric, reportedly shared an image on the War Thunder forum of the tank’s specs that were pulled from the Challenger 2’s Army Equipment Support Publication, which is essentially a technical manual.

[...]

A moderator for the forum, who’s handle is “Templar_”, explained that the developer had removed the material after they received confirmation from the Ministry of Defense that the document is still in fact classified.


A user of War Thunder’s forums posted confidential documents to win an argument (T0089.001: Obtain Authentic Documents, T0146: Account, T0097.105: Military Personnel Persona, T0115: Post Content, T0143.001: Authentic Persona, T0151.009: Legacy Online Forum Platform). | -| [T0146 Account](../../generated_pages/techniques/T0146.md) |  IT00000482 In an effort to prove that the developers behind a popular multiplayer vehicle combat game had made a mistake, a player went ahead and published classified British military documents about one of the real-life tanks featured in the game.

This truly bizarre turn of events recently occurred in the public forum for War Thunder, a free-to-player multiplayer combat sim featuring modern land, air, and sea craft. Getting a small detail wrong on a piece of equipment might not be a big deal for the average gamer, but for the War Thunder crowd it sure as hell is. With 25,000 devoted players, the game very much bills itself as the military vehicle combat simulator.

A player, who identified himself as a British tank commander, claimed that the game’s developers at Gaijin Entertainment had inaccurately represented the Challenger 2 main battle tank used by the British military.

The self-described tank commander’s bio listed his location as Tidworth Camp in Wiltshire, England, according to the UK Defense Journal, which reported that the base is home to the Royal Tank Regiment, which fields Challenger 2 tanks.

The player, who went by the handle Pyrophoric, reportedly shared an image on the War Thunder forum of the tank’s specs that were pulled from the Challenger 2’s Army Equipment Support Publication, which is essentially a technical manual.

[...]

A moderator for the forum, who’s handle is “Templar_”, explained that the developer had removed the material after they received confirmation from the Ministry of Defense that the document is still in fact classified.


A user of War Thunder’s forums posted confidential documents to win an argument (T0089.001: Obtain Authentic Documents, T0146: Account, T0097.105: Military Personnel Persona, T0115: Post Content, T0143.001: Authentic Persona, T0151.009: Legacy Online Forum Platform). | -| [T0151.009 Legacy Online Forum Platform](../../generated_pages/techniques/T0151.009.md) |  IT00000486 In an effort to prove that the developers behind a popular multiplayer vehicle combat game had made a mistake, a player went ahead and published classified British military documents about one of the real-life tanks featured in the game.

This truly bizarre turn of events recently occurred in the public forum for War Thunder, a free-to-player multiplayer combat sim featuring modern land, air, and sea craft. Getting a small detail wrong on a piece of equipment might not be a big deal for the average gamer, but for the War Thunder crowd it sure as hell is. With 25,000 devoted players, the game very much bills itself as the military vehicle combat simulator.

A player, who identified himself as a British tank commander, claimed that the game’s developers at Gaijin Entertainment had inaccurately represented the Challenger 2 main battle tank used by the British military.

The self-described tank commander’s bio listed his location as Tidworth Camp in Wiltshire, England, according to the UK Defense Journal, which reported that the base is home to the Royal Tank Regiment, which fields Challenger 2 tanks.

The player, who went by the handle Pyrophoric, reportedly shared an image on the War Thunder forum of the tank’s specs that were pulled from the Challenger 2’s Army Equipment Support Publication, which is essentially a technical manual.

[...]

A moderator for the forum, who’s handle is “Templar_”, explained that the developer had removed the material after they received confirmation from the Ministry of Defense that the document is still in fact classified.


A user of War Thunder’s forums posted confidential documents to win an argument (T0089.001: Obtain Authentic Documents, T0146: Account, T0097.105: Military Personnel Persona, T0115: Post Content, T0143.001: Authentic Persona, T0151.009: Legacy Online Forum Platform). | +| [T0089.001 Obtain Authentic Documents](../../generated_pages/techniques/T0089.001.md) |  IT00000481 In an effort to prove that the developers behind a popular multiplayer vehicle combat game had made a mistake, a player went ahead and published classified British military documents about one of the real-life tanks featured in the game.

This truly bizarre turn of events recently occurred in the public forum for War Thunder, a free-to-player multiplayer combat sim featuring modern land, air, and sea craft. Getting a small detail wrong on a piece of equipment might not be a big deal for the average gamer, but for the War Thunder crowd it sure as hell is. With 25,000 devoted players, the game very much bills itself as the military vehicle combat simulator.

A player, who identified himself as a British tank commander, claimed that the game’s developers at Gaijin Entertainment had inaccurately represented the Challenger 2 main battle tank used by the British military.

The self-described tank commander’s bio listed his location as Tidworth Camp in Wiltshire, England, according to the UK Defense Journal, which reported that the base is home to the Royal Tank Regiment, which fields Challenger 2 tanks.

The player, who went by the handle Pyrophoric, reportedly shared an image on the War Thunder forum of the tank’s specs that were pulled from the Challenger 2’s Army Equipment Support Publication, which is essentially a technical manual.

[...]

A moderator for the forum, who’s handle is “Templar_”, explained that the developer had removed the material after they received confirmation from the Ministry of Defense that the document is still in fact classified.


A user of War Thunder’s forums posted confidential documents to win an argument (T0089.001: Obtain Authentic Documents, T0146: Account Asset, T0097.105: Military Personnel Persona, T0115: Post Content, T0143.001: Authentic Persona, T0151.009: Legacy Online Forum Platform). | +| [T0097.105 Military Personnel Persona](../../generated_pages/techniques/T0097.105.md) |  IT00000483 In an effort to prove that the developers behind a popular multiplayer vehicle combat game had made a mistake, a player went ahead and published classified British military documents about one of the real-life tanks featured in the game.

This truly bizarre turn of events recently occurred in the public forum for War Thunder, a free-to-player multiplayer combat sim featuring modern land, air, and sea craft. Getting a small detail wrong on a piece of equipment might not be a big deal for the average gamer, but for the War Thunder crowd it sure as hell is. With 25,000 devoted players, the game very much bills itself as the military vehicle combat simulator.

A player, who identified himself as a British tank commander, claimed that the game’s developers at Gaijin Entertainment had inaccurately represented the Challenger 2 main battle tank used by the British military.

The self-described tank commander’s bio listed his location as Tidworth Camp in Wiltshire, England, according to the UK Defense Journal, which reported that the base is home to the Royal Tank Regiment, which fields Challenger 2 tanks.

The player, who went by the handle Pyrophoric, reportedly shared an image on the War Thunder forum of the tank’s specs that were pulled from the Challenger 2’s Army Equipment Support Publication, which is essentially a technical manual.

[...]

A moderator for the forum, who’s handle is “Templar_”, explained that the developer had removed the material after they received confirmation from the Ministry of Defense that the document is still in fact classified.


A user of War Thunder’s forums posted confidential documents to win an argument (T0089.001: Obtain Authentic Documents, T0146: Account Asset, T0097.105: Military Personnel Persona, T0115: Post Content, T0143.001: Authentic Persona, T0151.009: Legacy Online Forum Platform). | +| [T0115 Post Content](../../generated_pages/techniques/T0115.md) |  IT00000484 In an effort to prove that the developers behind a popular multiplayer vehicle combat game had made a mistake, a player went ahead and published classified British military documents about one of the real-life tanks featured in the game.

This truly bizarre turn of events recently occurred in the public forum for War Thunder, a free-to-player multiplayer combat sim featuring modern land, air, and sea craft. Getting a small detail wrong on a piece of equipment might not be a big deal for the average gamer, but for the War Thunder crowd it sure as hell is. With 25,000 devoted players, the game very much bills itself as the military vehicle combat simulator.

A player, who identified himself as a British tank commander, claimed that the game’s developers at Gaijin Entertainment had inaccurately represented the Challenger 2 main battle tank used by the British military.

The self-described tank commander’s bio listed his location as Tidworth Camp in Wiltshire, England, according to the UK Defense Journal, which reported that the base is home to the Royal Tank Regiment, which fields Challenger 2 tanks.

The player, who went by the handle Pyrophoric, reportedly shared an image on the War Thunder forum of the tank’s specs that were pulled from the Challenger 2’s Army Equipment Support Publication, which is essentially a technical manual.

[...]

A moderator for the forum, who’s handle is “Templar_”, explained that the developer had removed the material after they received confirmation from the Ministry of Defense that the document is still in fact classified.


A user of War Thunder’s forums posted confidential documents to win an argument (T0089.001: Obtain Authentic Documents, T0146: Account Asset, T0097.105: Military Personnel Persona, T0115: Post Content, T0143.001: Authentic Persona, T0151.009: Legacy Online Forum Platform). | +| [T0143.001 Authentic Persona](../../generated_pages/techniques/T0143.001.md) |  IT00000485 In an effort to prove that the developers behind a popular multiplayer vehicle combat game had made a mistake, a player went ahead and published classified British military documents about one of the real-life tanks featured in the game.

This truly bizarre turn of events recently occurred in the public forum for War Thunder, a free-to-player multiplayer combat sim featuring modern land, air, and sea craft. Getting a small detail wrong on a piece of equipment might not be a big deal for the average gamer, but for the War Thunder crowd it sure as hell is. With 25,000 devoted players, the game very much bills itself as the military vehicle combat simulator.

A player, who identified himself as a British tank commander, claimed that the game’s developers at Gaijin Entertainment had inaccurately represented the Challenger 2 main battle tank used by the British military.

The self-described tank commander’s bio listed his location as Tidworth Camp in Wiltshire, England, according to the UK Defense Journal, which reported that the base is home to the Royal Tank Regiment, which fields Challenger 2 tanks.

The player, who went by the handle Pyrophoric, reportedly shared an image on the War Thunder forum of the tank’s specs that were pulled from the Challenger 2’s Army Equipment Support Publication, which is essentially a technical manual.

[...]

A moderator for the forum, who’s handle is “Templar_”, explained that the developer had removed the material after they received confirmation from the Ministry of Defense that the document is still in fact classified.


A user of War Thunder’s forums posted confidential documents to win an argument (T0089.001: Obtain Authentic Documents, T0146: Account Asset, T0097.105: Military Personnel Persona, T0115: Post Content, T0143.001: Authentic Persona, T0151.009: Legacy Online Forum Platform). | +| [T0146 Account Asset](../../generated_pages/techniques/T0146.md) |  IT00000482 In an effort to prove that the developers behind a popular multiplayer vehicle combat game had made a mistake, a player went ahead and published classified British military documents about one of the real-life tanks featured in the game.

This truly bizarre turn of events recently occurred in the public forum for War Thunder, a free-to-player multiplayer combat sim featuring modern land, air, and sea craft. Getting a small detail wrong on a piece of equipment might not be a big deal for the average gamer, but for the War Thunder crowd it sure as hell is. With 25,000 devoted players, the game very much bills itself as the military vehicle combat simulator.

A player, who identified himself as a British tank commander, claimed that the game’s developers at Gaijin Entertainment had inaccurately represented the Challenger 2 main battle tank used by the British military.

The self-described tank commander’s bio listed his location as Tidworth Camp in Wiltshire, England, according to the UK Defense Journal, which reported that the base is home to the Royal Tank Regiment, which fields Challenger 2 tanks.

The player, who went by the handle Pyrophoric, reportedly shared an image on the War Thunder forum of the tank’s specs that were pulled from the Challenger 2’s Army Equipment Support Publication, which is essentially a technical manual.

[...]

A moderator for the forum, who’s handle is “Templar_”, explained that the developer had removed the material after they received confirmation from the Ministry of Defense that the document is still in fact classified.


A user of War Thunder’s forums posted confidential documents to win an argument (T0089.001: Obtain Authentic Documents, T0146: Account Asset, T0097.105: Military Personnel Persona, T0115: Post Content, T0143.001: Authentic Persona, T0151.009: Legacy Online Forum Platform). | +| [T0151.009 Legacy Online Forum Platform](../../generated_pages/techniques/T0151.009.md) |  IT00000486 In an effort to prove that the developers behind a popular multiplayer vehicle combat game had made a mistake, a player went ahead and published classified British military documents about one of the real-life tanks featured in the game.

This truly bizarre turn of events recently occurred in the public forum for War Thunder, a free-to-player multiplayer combat sim featuring modern land, air, and sea craft. Getting a small detail wrong on a piece of equipment might not be a big deal for the average gamer, but for the War Thunder crowd it sure as hell is. With 25,000 devoted players, the game very much bills itself as the military vehicle combat simulator.

A player, who identified himself as a British tank commander, claimed that the game’s developers at Gaijin Entertainment had inaccurately represented the Challenger 2 main battle tank used by the British military.

The self-described tank commander’s bio listed his location as Tidworth Camp in Wiltshire, England, according to the UK Defense Journal, which reported that the base is home to the Royal Tank Regiment, which fields Challenger 2 tanks.

The player, who went by the handle Pyrophoric, reportedly shared an image on the War Thunder forum of the tank’s specs that were pulled from the Challenger 2’s Army Equipment Support Publication, which is essentially a technical manual.

[...]

A moderator for the forum, who’s handle is “Templar_”, explained that the developer had removed the material after they received confirmation from the Ministry of Defense that the document is still in fact classified.


A user of War Thunder’s forums posted confidential documents to win an argument (T0089.001: Obtain Authentic Documents, T0146: Account Asset, T0097.105: Military Personnel Persona, T0115: Post Content, T0143.001: Authentic Persona, T0151.009: Legacy Online Forum Platform). | DO NOT EDIT ABOVE THIS LINE - PLEASE ADD NOTES BELOW \ No newline at end of file diff --git a/generated_pages/incidents/I00119.md b/generated_pages/incidents/I00119.md index ea88b84..8278bd7 100644 --- a/generated_pages/incidents/I00119.md +++ b/generated_pages/incidents/I00119.md @@ -15,19 +15,20 @@ | Reference | Pub Date | Authors | Org | Archive | | --------- | -------- | ------- | --- | ------- | +| [https://www.nbcnews.com/tech/security/ken-klippenstein-publishes-irans-hacked-trump-campaign-document-substa-rcna172902](https://www.nbcnews.com/tech/security/ken-klippenstein-publishes-irans-hacked-trump-campaign-document-substa-rcna172902) | 2024/09/26 | Kevin Collier | NBC News | [https://web.archive.org/web/20240927013805/https://www.nbcnews.com/tech/security/ken-klippenstein-publishes-irans-hacked-trump-campaign-document-substa-rcna172902](https://web.archive.org/web/20240927013805/https://www.nbcnews.com/tech/security/ken-klippenstein-publishes-irans-hacked-trump-campaign-document-substa-rcna172902) | | Technique | Description given for this incident | | --------- | ------------------------- | -| [T0089 Obtain Private Documents](../../generated_pages/techniques/T0089.md) |  IT00000489 An American journalist who runs an independent newsletter published a document [on 26 Sep 2024] that appears to have been stolen from Donald Trump’s presidential campaign — the first public posting of a file that is believed to be part of a dossier that federal officials say is part of an Iranian effort to manipulate the [2024] U.S. election.

The PDF document is a 271-page opposition research file on former President Donald Trump’s running mate, Sen. JD Vance, R-Ohio.

For more than two months, hackers who the U.S. says are tied to Iran have tried to persuade the American media to cover files they stole. No outlets took the bait.

But on Thursday, reporter Ken Klippenstein, who self-publishes on Substack after he left The Intercept this year, published one of the files.

[...]

Reporters who have received the documents describe the same pattern: An AOL account emails them files, signed by a person using the name “Robert,” who is reluctant to speak to their identity or reasons for wanting the documents to receive coverage.

NBC News was not part of the Robert persona’s direct outreach, but it has viewed its correspondence with a reporter at another publication.

One of the emails from the Robert persona previously viewed by NBC News included three large PDF files, each corresponding to Trump’s three reported finalists for vice president. The Vance file appears to be the one Klippenstein hosts on his site.


In this example hackers attributed to Iran used the Robert persona to email journalists hacked documents (T0146: Account, T0097.100: Individual Persona, T0153.001: Email Platform).

The journalist Ken Kippenstien used his existing blog on substack to host a link to download the document (T0089: Obtain Private Documents, T0097.102: Journalist Persona, T0115: Post Content, T0143.001: Authentic Persona, T0152.001: Blogging Platform, T0152.002: Blog, T0150.003: Pre-Existing). | -| [T0097.100 Individual Persona](../../generated_pages/techniques/T0097.100.md) |  IT00000488 An American journalist who runs an independent newsletter published a document [on 26 Sep 2024] that appears to have been stolen from Donald Trump’s presidential campaign — the first public posting of a file that is believed to be part of a dossier that federal officials say is part of an Iranian effort to manipulate the [2024] U.S. election.

The PDF document is a 271-page opposition research file on former President Donald Trump’s running mate, Sen. JD Vance, R-Ohio.

For more than two months, hackers who the U.S. says are tied to Iran have tried to persuade the American media to cover files they stole. No outlets took the bait.

But on Thursday, reporter Ken Klippenstein, who self-publishes on Substack after he left The Intercept this year, published one of the files.

[...]

Reporters who have received the documents describe the same pattern: An AOL account emails them files, signed by a person using the name “Robert,” who is reluctant to speak to their identity or reasons for wanting the documents to receive coverage.

NBC News was not part of the Robert persona’s direct outreach, but it has viewed its correspondence with a reporter at another publication.

One of the emails from the Robert persona previously viewed by NBC News included three large PDF files, each corresponding to Trump’s three reported finalists for vice president. The Vance file appears to be the one Klippenstein hosts on his site.


In this example hackers attributed to Iran used the Robert persona to email journalists hacked documents (T0146: Account, T0097.100: Individual Persona, T0153.001: Email Platform).

The journalist Ken Kippenstien used his existing blog on substack to host a link to download the document (T0089: Obtain Private Documents, T0097.102: Journalist Persona, T0115: Post Content, T0143.001: Authentic Persona, T0152.001: Blogging Platform, T0152.002: Blog, T0150.003: Pre-Existing). | -| [T0097.102 Journalist Persona](../../generated_pages/techniques/T0097.102.md) |  IT00000490 An American journalist who runs an independent newsletter published a document [on 26 Sep 2024] that appears to have been stolen from Donald Trump’s presidential campaign — the first public posting of a file that is believed to be part of a dossier that federal officials say is part of an Iranian effort to manipulate the [2024] U.S. election.

The PDF document is a 271-page opposition research file on former President Donald Trump’s running mate, Sen. JD Vance, R-Ohio.

For more than two months, hackers who the U.S. says are tied to Iran have tried to persuade the American media to cover files they stole. No outlets took the bait.

But on Thursday, reporter Ken Klippenstein, who self-publishes on Substack after he left The Intercept this year, published one of the files.

[...]

Reporters who have received the documents describe the same pattern: An AOL account emails them files, signed by a person using the name “Robert,” who is reluctant to speak to their identity or reasons for wanting the documents to receive coverage.

NBC News was not part of the Robert persona’s direct outreach, but it has viewed its correspondence with a reporter at another publication.

One of the emails from the Robert persona previously viewed by NBC News included three large PDF files, each corresponding to Trump’s three reported finalists for vice president. The Vance file appears to be the one Klippenstein hosts on his site.


In this example hackers attributed to Iran used the Robert persona to email journalists hacked documents (T0146: Account, T0097.100: Individual Persona, T0153.001: Email Platform).

The journalist Ken Kippenstien used his existing blog on substack to host a link to download the document (T0089: Obtain Private Documents, T0097.102: Journalist Persona, T0115: Post Content, T0143.001: Authentic Persona, T0152.001: Blogging Platform, T0152.002: Blog, T0150.003: Pre-Existing). | -| [T0143.001 Authentic Persona](../../generated_pages/techniques/T0143.001.md) |  IT00000491 An American journalist who runs an independent newsletter published a document [on 26 Sep 2024] that appears to have been stolen from Donald Trump’s presidential campaign — the first public posting of a file that is believed to be part of a dossier that federal officials say is part of an Iranian effort to manipulate the [2024] U.S. election.

The PDF document is a 271-page opposition research file on former President Donald Trump’s running mate, Sen. JD Vance, R-Ohio.

For more than two months, hackers who the U.S. says are tied to Iran have tried to persuade the American media to cover files they stole. No outlets took the bait.

But on Thursday, reporter Ken Klippenstein, who self-publishes on Substack after he left The Intercept this year, published one of the files.

[...]

Reporters who have received the documents describe the same pattern: An AOL account emails them files, signed by a person using the name “Robert,” who is reluctant to speak to their identity or reasons for wanting the documents to receive coverage.

NBC News was not part of the Robert persona’s direct outreach, but it has viewed its correspondence with a reporter at another publication.

One of the emails from the Robert persona previously viewed by NBC News included three large PDF files, each corresponding to Trump’s three reported finalists for vice president. The Vance file appears to be the one Klippenstein hosts on his site.


In this example hackers attributed to Iran used the Robert persona to email journalists hacked documents (T0146: Account, T0097.100: Individual Persona, T0153.001: Email Platform).

The journalist Ken Kippenstien used his existing blog on substack to host a link to download the document (T0089: Obtain Private Documents, T0097.102: Journalist Persona, T0115: Post Content, T0143.001: Authentic Persona, T0152.001: Blogging Platform, T0152.002: Blog, T0150.003: Pre-Existing). | -| [T0150.003 Pre-Existing](../../generated_pages/techniques/T0150.003.md) |  IT00000494 An American journalist who runs an independent newsletter published a document [on 26 Sep 2024] that appears to have been stolen from Donald Trump’s presidential campaign — the first public posting of a file that is believed to be part of a dossier that federal officials say is part of an Iranian effort to manipulate the [2024] U.S. election.

The PDF document is a 271-page opposition research file on former President Donald Trump’s running mate, Sen. JD Vance, R-Ohio.

For more than two months, hackers who the U.S. says are tied to Iran have tried to persuade the American media to cover files they stole. No outlets took the bait.

But on Thursday, reporter Ken Klippenstein, who self-publishes on Substack after he left The Intercept this year, published one of the files.

[...]

Reporters who have received the documents describe the same pattern: An AOL account emails them files, signed by a person using the name “Robert,” who is reluctant to speak to their identity or reasons for wanting the documents to receive coverage.

NBC News was not part of the Robert persona’s direct outreach, but it has viewed its correspondence with a reporter at another publication.

One of the emails from the Robert persona previously viewed by NBC News included three large PDF files, each corresponding to Trump’s three reported finalists for vice president. The Vance file appears to be the one Klippenstein hosts on his site.


In this example hackers attributed to Iran used the Robert persona to email journalists hacked documents (T0146: Account, T0097.100: Individual Persona, T0153.001: Email Platform).

The journalist Ken Kippenstien used his existing blog on substack to host a link to download the document (T0089: Obtain Private Documents, T0097.102: Journalist Persona, T0115: Post Content, T0143.001: Authentic Persona, T0152.001: Blogging Platform, T0152.002: Blog, T0150.003: Pre-Existing). | -| [T0152.001 Blogging Platform](../../generated_pages/techniques/T0152.001.md) |  IT00000492 An American journalist who runs an independent newsletter published a document [on 26 Sep 2024] that appears to have been stolen from Donald Trump’s presidential campaign — the first public posting of a file that is believed to be part of a dossier that federal officials say is part of an Iranian effort to manipulate the [2024] U.S. election.

The PDF document is a 271-page opposition research file on former President Donald Trump’s running mate, Sen. JD Vance, R-Ohio.

For more than two months, hackers who the U.S. says are tied to Iran have tried to persuade the American media to cover files they stole. No outlets took the bait.

But on Thursday, reporter Ken Klippenstein, who self-publishes on Substack after he left The Intercept this year, published one of the files.

[...]

Reporters who have received the documents describe the same pattern: An AOL account emails them files, signed by a person using the name “Robert,” who is reluctant to speak to their identity or reasons for wanting the documents to receive coverage.

NBC News was not part of the Robert persona’s direct outreach, but it has viewed its correspondence with a reporter at another publication.

One of the emails from the Robert persona previously viewed by NBC News included three large PDF files, each corresponding to Trump’s three reported finalists for vice president. The Vance file appears to be the one Klippenstein hosts on his site.


In this example hackers attributed to Iran used the Robert persona to email journalists hacked documents (T0146: Account, T0097.100: Individual Persona, T0153.001: Email Platform).

The journalist Ken Kippenstien used his existing blog on substack to host a link to download the document (T0089: Obtain Private Documents, T0097.102: Journalist Persona, T0115: Post Content, T0143.001: Authentic Persona, T0152.001: Blogging Platform, T0152.002: Blog, T0150.003: Pre-Existing). | -| [T0152.002 Blog](../../generated_pages/techniques/T0152.002.md) |  IT00000493 An American journalist who runs an independent newsletter published a document [on 26 Sep 2024] that appears to have been stolen from Donald Trump’s presidential campaign — the first public posting of a file that is believed to be part of a dossier that federal officials say is part of an Iranian effort to manipulate the [2024] U.S. election.

The PDF document is a 271-page opposition research file on former President Donald Trump’s running mate, Sen. JD Vance, R-Ohio.

For more than two months, hackers who the U.S. says are tied to Iran have tried to persuade the American media to cover files they stole. No outlets took the bait.

But on Thursday, reporter Ken Klippenstein, who self-publishes on Substack after he left The Intercept this year, published one of the files.

[...]

Reporters who have received the documents describe the same pattern: An AOL account emails them files, signed by a person using the name “Robert,” who is reluctant to speak to their identity or reasons for wanting the documents to receive coverage.

NBC News was not part of the Robert persona’s direct outreach, but it has viewed its correspondence with a reporter at another publication.

One of the emails from the Robert persona previously viewed by NBC News included three large PDF files, each corresponding to Trump’s three reported finalists for vice president. The Vance file appears to be the one Klippenstein hosts on his site.


In this example hackers attributed to Iran used the Robert persona to email journalists hacked documents (T0146: Account, T0097.100: Individual Persona, T0153.001: Email Platform).

The journalist Ken Kippenstien used his existing blog on substack to host a link to download the document (T0089: Obtain Private Documents, T0097.102: Journalist Persona, T0115: Post Content, T0143.001: Authentic Persona, T0152.001: Blogging Platform, T0152.002: Blog, T0150.003: Pre-Existing). | -| [T0153.001 Email Platform](../../generated_pages/techniques/T0153.001.md) |  IT00000487 An American journalist who runs an independent newsletter published a document [on 26 Sep 2024] that appears to have been stolen from Donald Trump’s presidential campaign — the first public posting of a file that is believed to be part of a dossier that federal officials say is part of an Iranian effort to manipulate the [2024] U.S. election.

The PDF document is a 271-page opposition research file on former President Donald Trump’s running mate, Sen. JD Vance, R-Ohio.

For more than two months, hackers who the U.S. says are tied to Iran have tried to persuade the American media to cover files they stole. No outlets took the bait.

But on Thursday, reporter Ken Klippenstein, who self-publishes on Substack after he left The Intercept this year, published one of the files.

[...]

Reporters who have received the documents describe the same pattern: An AOL account emails them files, signed by a person using the name “Robert,” who is reluctant to speak to their identity or reasons for wanting the documents to receive coverage.

NBC News was not part of the Robert persona’s direct outreach, but it has viewed its correspondence with a reporter at another publication.

One of the emails from the Robert persona previously viewed by NBC News included three large PDF files, each corresponding to Trump’s three reported finalists for vice president. The Vance file appears to be the one Klippenstein hosts on his site.


In this example hackers attributed to Iran used the Robert persona to email journalists hacked documents (T0146: Account, T0097.100: Individual Persona, T0153.001: Email Platform).

The journalist Ken Kippenstien used his existing blog on substack to host a link to download the document (T0089: Obtain Private Documents, T0097.102: Journalist Persona, T0115: Post Content, T0143.001: Authentic Persona, T0152.001: Blogging Platform, T0152.002: Blog, T0150.003: Pre-Existing). | +| [T0089 Obtain Private Documents](../../generated_pages/techniques/T0089.md) |  IT00000489 An American journalist who runs an independent newsletter published a document [on 26 Sep 2024] that appears to have been stolen from Donald Trump’s presidential campaign — the first public posting of a file that is believed to be part of a dossier that federal officials say is part of an Iranian effort to manipulate the [2024] U.S. election.

The PDF document is a 271-page opposition research file on former President Donald Trump’s running mate, Sen. JD Vance, R-Ohio.

For more than two months, hackers who the U.S. says are tied to Iran have tried to persuade the American media to cover files they stole. No outlets took the bait.

But on Thursday, reporter Ken Klippenstein, who self-publishes on Substack after he left The Intercept this year, published one of the files.

[...]

Reporters who have received the documents describe the same pattern: An AOL account emails them files, signed by a person using the name “Robert,” who is reluctant to speak to their identity or reasons for wanting the documents to receive coverage.

NBC News was not part of the Robert persona’s direct outreach, but it has viewed its correspondence with a reporter at another publication.

One of the emails from the Robert persona previously viewed by NBC News included three large PDF files, each corresponding to Trump’s three reported finalists for vice president. The Vance file appears to be the one Klippenstein hosts on his site.


In this example hackers attributed to Iran used the Robert persona to email journalists hacked documents (T0146: Account Asset, T0097.100: Individual Persona, T0153.001: Email Platform).

The journalist Ken Kippenstien used his existing blog on substack to host a link to download the document (T0089: Obtain Private Documents, T0097.102: Journalist Persona, T0115: Post Content, T0143.001: Authentic Persona, T0152.001: Blogging Platform, T0152.002: Blog Asset, T0150.003: Pre-Existing Asset). | +| [T0097.100 Individual Persona](../../generated_pages/techniques/T0097.100.md) |  IT00000488 An American journalist who runs an independent newsletter published a document [on 26 Sep 2024] that appears to have been stolen from Donald Trump’s presidential campaign — the first public posting of a file that is believed to be part of a dossier that federal officials say is part of an Iranian effort to manipulate the [2024] U.S. election.

The PDF document is a 271-page opposition research file on former President Donald Trump’s running mate, Sen. JD Vance, R-Ohio.

For more than two months, hackers who the U.S. says are tied to Iran have tried to persuade the American media to cover files they stole. No outlets took the bait.

But on Thursday, reporter Ken Klippenstein, who self-publishes on Substack after he left The Intercept this year, published one of the files.

[...]

Reporters who have received the documents describe the same pattern: An AOL account emails them files, signed by a person using the name “Robert,” who is reluctant to speak to their identity or reasons for wanting the documents to receive coverage.

NBC News was not part of the Robert persona’s direct outreach, but it has viewed its correspondence with a reporter at another publication.

One of the emails from the Robert persona previously viewed by NBC News included three large PDF files, each corresponding to Trump’s three reported finalists for vice president. The Vance file appears to be the one Klippenstein hosts on his site.


In this example hackers attributed to Iran used the Robert persona to email journalists hacked documents (T0146: Account Asset, T0097.100: Individual Persona, T0153.001: Email Platform).

The journalist Ken Kippenstien used his existing blog on substack to host a link to download the document (T0089: Obtain Private Documents, T0097.102: Journalist Persona, T0115: Post Content, T0143.001: Authentic Persona, T0152.001: Blogging Platform, T0152.002: Blog Asset, T0150.003: Pre-Existing Asset). | +| [T0097.102 Journalist Persona](../../generated_pages/techniques/T0097.102.md) |  IT00000490 An American journalist who runs an independent newsletter published a document [on 26 Sep 2024] that appears to have been stolen from Donald Trump’s presidential campaign — the first public posting of a file that is believed to be part of a dossier that federal officials say is part of an Iranian effort to manipulate the [2024] U.S. election.

The PDF document is a 271-page opposition research file on former President Donald Trump’s running mate, Sen. JD Vance, R-Ohio.

For more than two months, hackers who the U.S. says are tied to Iran have tried to persuade the American media to cover files they stole. No outlets took the bait.

But on Thursday, reporter Ken Klippenstein, who self-publishes on Substack after he left The Intercept this year, published one of the files.

[...]

Reporters who have received the documents describe the same pattern: An AOL account emails them files, signed by a person using the name “Robert,” who is reluctant to speak to their identity or reasons for wanting the documents to receive coverage.

NBC News was not part of the Robert persona’s direct outreach, but it has viewed its correspondence with a reporter at another publication.

One of the emails from the Robert persona previously viewed by NBC News included three large PDF files, each corresponding to Trump’s three reported finalists for vice president. The Vance file appears to be the one Klippenstein hosts on his site.


In this example hackers attributed to Iran used the Robert persona to email journalists hacked documents (T0146: Account Asset, T0097.100: Individual Persona, T0153.001: Email Platform).

The journalist Ken Kippenstien used his existing blog on substack to host a link to download the document (T0089: Obtain Private Documents, T0097.102: Journalist Persona, T0115: Post Content, T0143.001: Authentic Persona, T0152.001: Blogging Platform, T0152.002: Blog Asset, T0150.003: Pre-Existing Asset). | +| [T0143.001 Authentic Persona](../../generated_pages/techniques/T0143.001.md) |  IT00000491 An American journalist who runs an independent newsletter published a document [on 26 Sep 2024] that appears to have been stolen from Donald Trump’s presidential campaign — the first public posting of a file that is believed to be part of a dossier that federal officials say is part of an Iranian effort to manipulate the [2024] U.S. election.

The PDF document is a 271-page opposition research file on former President Donald Trump’s running mate, Sen. JD Vance, R-Ohio.

For more than two months, hackers who the U.S. says are tied to Iran have tried to persuade the American media to cover files they stole. No outlets took the bait.

But on Thursday, reporter Ken Klippenstein, who self-publishes on Substack after he left The Intercept this year, published one of the files.

[...]

Reporters who have received the documents describe the same pattern: An AOL account emails them files, signed by a person using the name “Robert,” who is reluctant to speak to their identity or reasons for wanting the documents to receive coverage.

NBC News was not part of the Robert persona’s direct outreach, but it has viewed its correspondence with a reporter at another publication.

One of the emails from the Robert persona previously viewed by NBC News included three large PDF files, each corresponding to Trump’s three reported finalists for vice president. The Vance file appears to be the one Klippenstein hosts on his site.


In this example hackers attributed to Iran used the Robert persona to email journalists hacked documents (T0146: Account Asset, T0097.100: Individual Persona, T0153.001: Email Platform).

The journalist Ken Kippenstien used his existing blog on substack to host a link to download the document (T0089: Obtain Private Documents, T0097.102: Journalist Persona, T0115: Post Content, T0143.001: Authentic Persona, T0152.001: Blogging Platform, T0152.002: Blog Asset, T0150.003: Pre-Existing Asset). | +| [T0150.003 Pre-Existing Asset](../../generated_pages/techniques/T0150.003.md) |  IT00000494 An American journalist who runs an independent newsletter published a document [on 26 Sep 2024] that appears to have been stolen from Donald Trump’s presidential campaign — the first public posting of a file that is believed to be part of a dossier that federal officials say is part of an Iranian effort to manipulate the [2024] U.S. election.

The PDF document is a 271-page opposition research file on former President Donald Trump’s running mate, Sen. JD Vance, R-Ohio.

For more than two months, hackers who the U.S. says are tied to Iran have tried to persuade the American media to cover files they stole. No outlets took the bait.

But on Thursday, reporter Ken Klippenstein, who self-publishes on Substack after he left The Intercept this year, published one of the files.

[...]

Reporters who have received the documents describe the same pattern: An AOL account emails them files, signed by a person using the name “Robert,” who is reluctant to speak to their identity or reasons for wanting the documents to receive coverage.

NBC News was not part of the Robert persona’s direct outreach, but it has viewed its correspondence with a reporter at another publication.

One of the emails from the Robert persona previously viewed by NBC News included three large PDF files, each corresponding to Trump’s three reported finalists for vice president. The Vance file appears to be the one Klippenstein hosts on his site.


In this example hackers attributed to Iran used the Robert persona to email journalists hacked documents (T0146: Account Asset, T0097.100: Individual Persona, T0153.001: Email Platform).

The journalist Ken Kippenstien used his existing blog on substack to host a link to download the document (T0089: Obtain Private Documents, T0097.102: Journalist Persona, T0115: Post Content, T0143.001: Authentic Persona, T0152.001: Blogging Platform, T0152.002: Blog Asset, T0150.003: Pre-Existing Asset). | +| [T0152.001 Blogging Platform](../../generated_pages/techniques/T0152.001.md) |  IT00000492 An American journalist who runs an independent newsletter published a document [on 26 Sep 2024] that appears to have been stolen from Donald Trump’s presidential campaign — the first public posting of a file that is believed to be part of a dossier that federal officials say is part of an Iranian effort to manipulate the [2024] U.S. election.

The PDF document is a 271-page opposition research file on former President Donald Trump’s running mate, Sen. JD Vance, R-Ohio.

For more than two months, hackers who the U.S. says are tied to Iran have tried to persuade the American media to cover files they stole. No outlets took the bait.

But on Thursday, reporter Ken Klippenstein, who self-publishes on Substack after he left The Intercept this year, published one of the files.

[...]

Reporters who have received the documents describe the same pattern: An AOL account emails them files, signed by a person using the name “Robert,” who is reluctant to speak to their identity or reasons for wanting the documents to receive coverage.

NBC News was not part of the Robert persona’s direct outreach, but it has viewed its correspondence with a reporter at another publication.

One of the emails from the Robert persona previously viewed by NBC News included three large PDF files, each corresponding to Trump’s three reported finalists for vice president. The Vance file appears to be the one Klippenstein hosts on his site.


In this example hackers attributed to Iran used the Robert persona to email journalists hacked documents (T0146: Account Asset, T0097.100: Individual Persona, T0153.001: Email Platform).

The journalist Ken Kippenstien used his existing blog on substack to host a link to download the document (T0089: Obtain Private Documents, T0097.102: Journalist Persona, T0115: Post Content, T0143.001: Authentic Persona, T0152.001: Blogging Platform, T0152.002: Blog Asset, T0150.003: Pre-Existing Asset). | +| [T0152.002 Blog Asset](../../generated_pages/techniques/T0152.002.md) |  IT00000493 An American journalist who runs an independent newsletter published a document [on 26 Sep 2024] that appears to have been stolen from Donald Trump’s presidential campaign — the first public posting of a file that is believed to be part of a dossier that federal officials say is part of an Iranian effort to manipulate the [2024] U.S. election.

The PDF document is a 271-page opposition research file on former President Donald Trump’s running mate, Sen. JD Vance, R-Ohio.

For more than two months, hackers who the U.S. says are tied to Iran have tried to persuade the American media to cover files they stole. No outlets took the bait.

But on Thursday, reporter Ken Klippenstein, who self-publishes on Substack after he left The Intercept this year, published one of the files.

[...]

Reporters who have received the documents describe the same pattern: An AOL account emails them files, signed by a person using the name “Robert,” who is reluctant to speak to their identity or reasons for wanting the documents to receive coverage.

NBC News was not part of the Robert persona’s direct outreach, but it has viewed its correspondence with a reporter at another publication.

One of the emails from the Robert persona previously viewed by NBC News included three large PDF files, each corresponding to Trump’s three reported finalists for vice president. The Vance file appears to be the one Klippenstein hosts on his site.


In this example hackers attributed to Iran used the Robert persona to email journalists hacked documents (T0146: Account Asset, T0097.100: Individual Persona, T0153.001: Email Platform).

The journalist Ken Kippenstien used his existing blog on substack to host a link to download the document (T0089: Obtain Private Documents, T0097.102: Journalist Persona, T0115: Post Content, T0143.001: Authentic Persona, T0152.001: Blogging Platform, T0152.002: Blog Asset, T0150.003: Pre-Existing Asset). | +| [T0153.001 Email Platform](../../generated_pages/techniques/T0153.001.md) |  IT00000487 An American journalist who runs an independent newsletter published a document [on 26 Sep 2024] that appears to have been stolen from Donald Trump’s presidential campaign — the first public posting of a file that is believed to be part of a dossier that federal officials say is part of an Iranian effort to manipulate the [2024] U.S. election.

The PDF document is a 271-page opposition research file on former President Donald Trump’s running mate, Sen. JD Vance, R-Ohio.

For more than two months, hackers who the U.S. says are tied to Iran have tried to persuade the American media to cover files they stole. No outlets took the bait.

But on Thursday, reporter Ken Klippenstein, who self-publishes on Substack after he left The Intercept this year, published one of the files.

[...]

Reporters who have received the documents describe the same pattern: An AOL account emails them files, signed by a person using the name “Robert,” who is reluctant to speak to their identity or reasons for wanting the documents to receive coverage.

NBC News was not part of the Robert persona’s direct outreach, but it has viewed its correspondence with a reporter at another publication.

One of the emails from the Robert persona previously viewed by NBC News included three large PDF files, each corresponding to Trump’s three reported finalists for vice president. The Vance file appears to be the one Klippenstein hosts on his site.


In this example hackers attributed to Iran used the Robert persona to email journalists hacked documents (T0146: Account Asset, T0097.100: Individual Persona, T0153.001: Email Platform).

The journalist Ken Kippenstien used his existing blog on substack to host a link to download the document (T0089: Obtain Private Documents, T0097.102: Journalist Persona, T0115: Post Content, T0143.001: Authentic Persona, T0152.001: Blogging Platform, T0152.002: Blog Asset, T0150.003: Pre-Existing Asset). | DO NOT EDIT ABOVE THIS LINE - PLEASE ADD NOTES BELOW \ No newline at end of file diff --git a/generated_pages/incidents/I00120.md b/generated_pages/incidents/I00120.md index 9313338..d99d934 100644 --- a/generated_pages/incidents/I00120.md +++ b/generated_pages/incidents/I00120.md @@ -15,16 +15,17 @@ | Reference | Pub Date | Authors | Org | Archive | | --------- | -------- | ------- | --- | ------- | +| [-](-) | 2019/11/21 | Dr Claire Hardaker | - | [https://web.archive.org/web/20220208165928/https://wp.lancs.ac.uk/drclaireh/2019/11/21/factcheckuk-or-fakecheckuk-reinventing-the-political-faction-as-the-impartial-factchecker/](https://web.archive.org/web/20220208165928/https://wp.lancs.ac.uk/drclaireh/2019/11/21/factcheckuk-or-fakecheckuk-reinventing-the-political-faction-as-the-impartial-factchecker/) | | Technique | Description given for this incident | | --------- | ------------------------- | -| [T0097.203 Fact Checking Organisation Persona](../../generated_pages/techniques/T0097.203.md) |  IT00000497 Ahead of the 2019 UK Election during a leader’s debate, the Conservative party rebranded their “Conservative Campaign Headquarters Press” account to “FactCheckUK”:


That is, until a few minutes into the debate.

All at once, like a person throwing off their street clothes to reveal some sinister new identity underneath, @CCHQPress abruptly shed its name, blue Conservative logo, Boris Johnson banner, and bio description. Moments later, it had entirely reinvented itself.

The purple banner was emblazoned with white font that read “✓ factcheckUK [with a “FROM CCQH” subheading]”.

The matching profile picture was a white tick in a purple circle. The bio was updated to: “Fact checking Labour from CCHQ”. And the name now read factcheckUK, with the customary Twitter blue (or white depending on your phone settings!) validation tick still after it


In this example an existing verified social media account on Twitter was repurposed to inauthentically present itself as a Fact Checking service (T0151.008: Microblogging Platform, T0150.003: Pre-Existing, T0146.003: Verified Account, T0097.203: Fact Checking Organisation Persona, T0143.002: Fabricated Persona). | -| [T0143.002 Fabricated Persona](../../generated_pages/techniques/T0143.002.md) |  IT00000498 Ahead of the 2019 UK Election during a leader’s debate, the Conservative party rebranded their “Conservative Campaign Headquarters Press” account to “FactCheckUK”:


That is, until a few minutes into the debate.

All at once, like a person throwing off their street clothes to reveal some sinister new identity underneath, @CCHQPress abruptly shed its name, blue Conservative logo, Boris Johnson banner, and bio description. Moments later, it had entirely reinvented itself.

The purple banner was emblazoned with white font that read “✓ factcheckUK [with a “FROM CCQH” subheading]”.

The matching profile picture was a white tick in a purple circle. The bio was updated to: “Fact checking Labour from CCHQ”. And the name now read factcheckUK, with the customary Twitter blue (or white depending on your phone settings!) validation tick still after it


In this example an existing verified social media account on Twitter was repurposed to inauthentically present itself as a Fact Checking service (T0151.008: Microblogging Platform, T0150.003: Pre-Existing, T0146.003: Verified Account, T0097.203: Fact Checking Organisation Persona, T0143.002: Fabricated Persona). | -| [T0146.003 Verified Account](../../generated_pages/techniques/T0146.003.md) |  IT00000499 Ahead of the 2019 UK Election during a leader’s debate, the Conservative party rebranded their “Conservative Campaign Headquarters Press” account to “FactCheckUK”:


That is, until a few minutes into the debate.

All at once, like a person throwing off their street clothes to reveal some sinister new identity underneath, @CCHQPress abruptly shed its name, blue Conservative logo, Boris Johnson banner, and bio description. Moments later, it had entirely reinvented itself.

The purple banner was emblazoned with white font that read “✓ factcheckUK [with a “FROM CCQH” subheading]”.

The matching profile picture was a white tick in a purple circle. The bio was updated to: “Fact checking Labour from CCHQ”. And the name now read factcheckUK, with the customary Twitter blue (or white depending on your phone settings!) validation tick still after it

In this example an existing verified social media account on Twitter was repurposed to inauthentically present itself as a Fact Checking service (T0151.008: Microblogging Platform, T0150.003: Pre-Existing, T0146.003: Verified Account, T0097.203: Fact Checking Organisation Persona, T0143.002: Fabricated Persona). | -| [T0150.003 Pre-Existing](../../generated_pages/techniques/T0150.003.md) |  IT00000496 Ahead of the 2019 UK Election during a leader’s debate, the Conservative party rebranded their “Conservative Campaign Headquarters Press” account to “FactCheckUK”:


That is, until a few minutes into the debate.

All at once, like a person throwing off their street clothes to reveal some sinister new identity underneath, @CCHQPress abruptly shed its name, blue Conservative logo, Boris Johnson banner, and bio description. Moments later, it had entirely reinvented itself.

The purple banner was emblazoned with white font that read “✓ factcheckUK [with a “FROM CCQH” subheading]”.

The matching profile picture was a white tick in a purple circle. The bio was updated to: “Fact checking Labour from CCHQ”. And the name now read factcheckUK, with the customary Twitter blue (or white depending on your phone settings!) validation tick still after it

In this example an existing verified social media account on Twitter was repurposed to inauthentically present itself as a Fact Checking service (T0151.008: Microblogging Platform, T0150.003: Pre-Existing, T0146.003: Verified Account, T0097.203: Fact Checking Organisation Persona, T0143.002: Fabricated Persona). | -| [T0151.008 Microblogging Platform](../../generated_pages/techniques/T0151.008.md) |  IT00000495 Ahead of the 2019 UK Election during a leader’s debate, the Conservative party rebranded their “Conservative Campaign Headquarters Press” account to “FactCheckUK”:


That is, until a few minutes into the debate.

All at once, like a person throwing off their street clothes to reveal some sinister new identity underneath, @CCHQPress abruptly shed its name, blue Conservative logo, Boris Johnson banner, and bio description. Moments later, it had entirely reinvented itself.

The purple banner was emblazoned with white font that read “✓ factcheckUK [with a “FROM CCQH” subheading]”.

The matching profile picture was a white tick in a purple circle. The bio was updated to: “Fact checking Labour from CCHQ”. And the name now read factcheckUK, with the customary Twitter blue (or white depending on your phone settings!) validation tick still after it

In this example an existing verified social media account on Twitter was repurposed to inauthentically present itself as a Fact Checking service (T0151.008: Microblogging Platform, T0150.003: Pre-Existing, T0146.003: Verified Account, T0097.203: Fact Checking Organisation Persona, T0143.002: Fabricated Persona). | +| [T0097.203 Fact Checking Organisation Persona](../../generated_pages/techniques/T0097.203.md) |  IT00000497 Ahead of the 2019 UK Election during a leader’s debate, the Conservative party rebranded their “Conservative Campaign Headquarters Press” account to “FactCheckUK”:

The evening of the 19th November 2019 saw the first of three Leaders’ Debates on ITV, starting at 8pm and lasting for an hour. Current Prime Minister and leader of the Conservatives, Boris Johnson faced off against Labour party leader, Jeremy Corbyn. Plenty of people will have been watching the debate live, but a good proportion were “watching” (er, “twitching”?) via Twitter. This is something I’ve done in the past for certain shows. In some cases I just can’t watch or listen, but I can read, and in other cases, the commentary is far more interesting and entertaining than the show itself will ever be. This, for me, is just such a case. But very quickly, all eyes turned upon a modestly sized account with the handle @CCHQPress. That’s short for Conservative Campaign Headquarters Press. According to their (current!) Twitter bio, they are based in Westminster and they provide “snippets of news and commentary from CCHQ” to their 75k followers.

That is, until a few minutes into the debate.

All at once, like a person throwing off their street clothes to reveal some sinister new identity underneath, @CCHQPress abruptly shed its name, blue Conservative logo, Boris Johnson banner, and bio description. Moments later, it had entirely reinvented itself.

The purple banner was emblazoned with white font that read “✓ factcheckUK [with a “FROM CCQH” subheading]”.

The matching profile picture was a white tick in a purple circle. The bio was updated to: “Fact checking Labour from CCHQ”. And the name now read factcheckUK, with the customary Twitter blue (or white depending on your phone settings!) validation tick still after it


In this example an existing verified social media account on Twitter was repurposed to inauthentically present itself as a Fact Checking service (T0151.008: Microblogging Platform, T0150.003: Pre-Existing Asset, T0146.003: Verified Account Asset, T0097.203: Fact Checking Organisation Persona, T0143.002: Fabricated Persona). | +| [T0143.002 Fabricated Persona](../../generated_pages/techniques/T0143.002.md) |  IT00000498 Ahead of the 2019 UK Election during a leader’s debate, the Conservative party rebranded their “Conservative Campaign Headquarters Press” account to “FactCheckUK”:

The evening of the 19th November 2019 saw the first of three Leaders’ Debates on ITV, starting at 8pm and lasting for an hour. Current Prime Minister and leader of the Conservatives, Boris Johnson faced off against Labour party leader, Jeremy Corbyn. Plenty of people will have been watching the debate live, but a good proportion were “watching” (er, “twitching”?) via Twitter. This is something I’ve done in the past for certain shows. In some cases I just can’t watch or listen, but I can read, and in other cases, the commentary is far more interesting and entertaining than the show itself will ever be. This, for me, is just such a case. But very quickly, all eyes turned upon a modestly sized account with the handle @CCHQPress. That’s short for Conservative Campaign Headquarters Press. According to their (current!) Twitter bio, they are based in Westminster and they provide “snippets of news and commentary from CCHQ” to their 75k followers.

That is, until a few minutes into the debate.

All at once, like a person throwing off their street clothes to reveal some sinister new identity underneath, @CCHQPress abruptly shed its name, blue Conservative logo, Boris Johnson banner, and bio description. Moments later, it had entirely reinvented itself.

The purple banner was emblazoned with white font that read “✓ factcheckUK [with a “FROM CCQH” subheading]”.

The matching profile picture was a white tick in a purple circle. The bio was updated to: “Fact checking Labour from CCHQ”. And the name now read factcheckUK, with the customary Twitter blue (or white depending on your phone settings!) validation tick still after it


In this example an existing verified social media account on Twitter was repurposed to inauthentically present itself as a Fact Checking service (T0151.008: Microblogging Platform, T0150.003: Pre-Existing Asset, T0146.003: Verified Account Asset, T0097.203: Fact Checking Organisation Persona, T0143.002: Fabricated Persona). | +| [T0146.003 Verified Account Asset](../../generated_pages/techniques/T0146.003.md) |  IT00000499 Ahead of the 2019 UK Election during a leader’s debate, the Conservative party rebranded their “Conservative Campaign Headquarters Press” account to “FactCheckUK”:

The evening of the 19th November 2019 saw the first of three Leaders’ Debates on ITV, starting at 8pm and lasting for an hour. Current Prime Minister and leader of the Conservatives, Boris Johnson faced off against Labour party leader, Jeremy Corbyn. Plenty of people will have been watching the debate live, but a good proportion were “watching” (er, “twitching”?) via Twitter. This is something I’ve done in the past for certain shows. In some cases I just can’t watch or listen, but I can read, and in other cases, the commentary is far more interesting and entertaining than the show itself will ever be. This, for me, is just such a case. But very quickly, all eyes turned upon a modestly sized account with the handle @CCHQPress. That’s short for Conservative Campaign Headquarters Press. According to their (current!) Twitter bio, they are based in Westminster and they provide “snippets of news and commentary from CCHQ” to their 75k followers.

That is, until a few minutes into the debate.

All at once, like a person throwing off their street clothes to reveal some sinister new identity underneath, @CCHQPress abruptly shed its name, blue Conservative logo, Boris Johnson banner, and bio description. Moments later, it had entirely reinvented itself.

The purple banner was emblazoned with white font that read “✓ factcheckUK [with a “FROM CCQH” subheading]”.

The matching profile picture was a white tick in a purple circle. The bio was updated to: “Fact checking Labour from CCHQ”. And the name now read factcheckUK, with the customary Twitter blue (or white depending on your phone settings!) validation tick still after it


In this example an existing verified social media account on Twitter was repurposed to inauthentically present itself as a Fact Checking service (T0151.008: Microblogging Platform, T0150.003: Pre-Existing Asset, T0146.003: Verified Account Asset, T0097.203: Fact Checking Organisation Persona, T0143.002: Fabricated Persona). | +| [T0150.003 Pre-Existing Asset](../../generated_pages/techniques/T0150.003.md) |  IT00000496 Ahead of the 2019 UK Election during a leader’s debate, the Conservative party rebranded their “Conservative Campaign Headquarters Press” account to “FactCheckUK”:

The evening of the 19th November 2019 saw the first of three Leaders’ Debates on ITV, starting at 8pm and lasting for an hour. Current Prime Minister and leader of the Conservatives, Boris Johnson faced off against Labour party leader, Jeremy Corbyn. Plenty of people will have been watching the debate live, but a good proportion were “watching” (er, “twitching”?) via Twitter. This is something I’ve done in the past for certain shows. In some cases I just can’t watch or listen, but I can read, and in other cases, the commentary is far more interesting and entertaining than the show itself will ever be. This, for me, is just such a case. But very quickly, all eyes turned upon a modestly sized account with the handle @CCHQPress. That’s short for Conservative Campaign Headquarters Press. According to their (current!) Twitter bio, they are based in Westminster and they provide “snippets of news and commentary from CCHQ” to their 75k followers.

That is, until a few minutes into the debate.

All at once, like a person throwing off their street clothes to reveal some sinister new identity underneath, @CCHQPress abruptly shed its name, blue Conservative logo, Boris Johnson banner, and bio description. Moments later, it had entirely reinvented itself.

The purple banner was emblazoned with white font that read “✓ factcheckUK [with a “FROM CCQH” subheading]”.

The matching profile picture was a white tick in a purple circle. The bio was updated to: “Fact checking Labour from CCHQ”. And the name now read factcheckUK, with the customary Twitter blue (or white depending on your phone settings!) validation tick still after it


In this example an existing verified social media account on Twitter was repurposed to inauthentically present itself as a Fact Checking service (T0151.008: Microblogging Platform, T0150.003: Pre-Existing Asset, T0146.003: Verified Account Asset, T0097.203: Fact Checking Organisation Persona, T0143.002: Fabricated Persona). | +| [T0151.008 Microblogging Platform](../../generated_pages/techniques/T0151.008.md) |  IT00000495 Ahead of the 2019 UK Election during a leader’s debate, the Conservative party rebranded their “Conservative Campaign Headquarters Press” account to “FactCheckUK”:

The evening of the 19th November 2019 saw the first of three Leaders’ Debates on ITV, starting at 8pm and lasting for an hour. Current Prime Minister and leader of the Conservatives, Boris Johnson faced off against Labour party leader, Jeremy Corbyn. Plenty of people will have been watching the debate live, but a good proportion were “watching” (er, “twitching”?) via Twitter. This is something I’ve done in the past for certain shows. In some cases I just can’t watch or listen, but I can read, and in other cases, the commentary is far more interesting and entertaining than the show itself will ever be. This, for me, is just such a case. But very quickly, all eyes turned upon a modestly sized account with the handle @CCHQPress. That’s short for Conservative Campaign Headquarters Press. According to their (current!) Twitter bio, they are based in Westminster and they provide “snippets of news and commentary from CCHQ” to their 75k followers.

That is, until a few minutes into the debate.

All at once, like a person throwing off their street clothes to reveal some sinister new identity underneath, @CCHQPress abruptly shed its name, blue Conservative logo, Boris Johnson banner, and bio description. Moments later, it had entirely reinvented itself.

The purple banner was emblazoned with white font that read “✓ factcheckUK [with a “FROM CCQH” subheading]”.

The matching profile picture was a white tick in a purple circle. The bio was updated to: “Fact checking Labour from CCHQ”. And the name now read factcheckUK, with the customary Twitter blue (or white depending on your phone settings!) validation tick still after it


In this example an existing verified social media account on Twitter was repurposed to inauthentically present itself as a Fact Checking service (T0151.008: Microblogging Platform, T0150.003: Pre-Existing Asset, T0146.003: Verified Account Asset, T0097.203: Fact Checking Organisation Persona, T0143.002: Fabricated Persona). | DO NOT EDIT ABOVE THIS LINE - PLEASE ADD NOTES BELOW \ No newline at end of file diff --git a/generated_pages/incidents/I00121.md b/generated_pages/incidents/I00121.md index 89ea431..e633a42 100644 --- a/generated_pages/incidents/I00121.md +++ b/generated_pages/incidents/I00121.md @@ -15,14 +15,15 @@ | Reference | Pub Date | Authors | Org | Archive | | --------- | -------- | ------- | --- | ------- | +| [https://checkfirst.network/wp-content/uploads/2024/06/Operation_Overload_WEB.pdf](https://checkfirst.network/wp-content/uploads/2024/06/Operation_Overload_WEB.pdf) | 2024/06/01 | Aleksandra Atanasova, Amaury Lesplingart, Francesco Poldi, Guillaume Kuster | CheckFirst | [https://web.archive.org/web/20240928205427/https://checkfirst.network/wp-content/uploads/2024/06/Operation_Overload_WEB.pdf](https://web.archive.org/web/20240928205427/https://checkfirst.network/wp-content/uploads/2024/06/Operation_Overload_WEB.pdf) | | Technique | Description given for this incident | | --------- | ------------------------- | -| [T0143.002 Fabricated Persona](../../generated_pages/techniques/T0143.002.md) |  IT00000501 The unique aspect of Operation Overload is a barrage of emails sent to newsrooms and fact-checkers across Europe. The authors of these messages urge recipients to verify content allegedly found online. The email subject lines often include an incitement to verify the claims briefly described in the message body. This is followed by a short list of links directing recipients to posts on Telegram, X, or known pro-Russian websites, including Pravda and Sputnik.

We have collected 221 emails sent to 20 organisations. The organisations mostly received identical emails urging them to fact-check specific false stories, which demonstrates that the emails were sent as part of a larger coordinated campaign.

[...]

The authors of the emails do not hide their intention to see the fake content widely spread. In February 2024, a journalist at the German outlet CORRECTIV engaged with the sender of one of the emails, providing feedback on the narratives which were originally sent. CORRECTIV received a response from the same Gmail address, initially expressing respect and trust in CORRECTIV’s assessment, while asking: “is it possible for your work to be seen by as many people as possible?”, thereby clearly stating the goal of the operation.

[...]

All the emails come from authors posing as concerned citizens. All emails are sent with Gmail accounts, which is typical for personal use. This makes it challenging to identify the individuals behind these emails, as anyone can open a Gmail account for free. The email headers indicate that the messages were sent from the Gmail interface, not from a personal client which would disclose the sender’s IP address.


In this example, threat actors used gmail accounts (T0146.001: Free Account, T0097.100: Individual Persona, T0143.002: Fabricated Persona, T0153.001: Email Platform) to target journalists and fact-checkers, with the apparent goal of having them amplify operation narratives through fact checks. | -| [T0146.001 Free Account](../../generated_pages/techniques/T0146.001.md) |  IT00000500 The unique aspect of Operation Overload is a barrage of emails sent to newsrooms and fact-checkers across Europe. The authors of these messages urge recipients to verify content allegedly found online. The email subject lines often include an incitement to verify the claims briefly described in the message body. This is followed by a short list of links directing recipients to posts on Telegram, X, or known pro-Russian websites, including Pravda and Sputnik.

We have collected 221 emails sent to 20 organisations. The organisations mostly received identical emails urging them to fact-check specific false stories, which demonstrates that the emails were sent as part of a larger coordinated campaign.

[...]

The authors of the emails do not hide their intention to see the fake content widely spread. In February 2024, a journalist at the German outlet CORRECTIV engaged with the sender of one of the emails, providing feedback on the narratives which were originally sent. CORRECTIV received a response from the same Gmail address, initially expressing respect and trust in CORRECTIV’s assessment, while asking: “is it possible for your work to be seen by as many people as possible?”, thereby clearly stating the goal of the operation.

[...]

All the emails come from authors posing as concerned citizens. All emails are sent with Gmail accounts, which is typical for personal use. This makes it challenging to identify the individuals behind these emails, as anyone can open a Gmail account for free. The email headers indicate that the messages were sent from the Gmail interface, not from a personal client which would disclose the sender’s IP address.


In this example, threat actors used gmail accounts (T0146.001: Free Account, T0097.100: Individual Persona, T0143.002: Fabricated Persona, T0153.001: Email Platform) to target journalists and fact-checkers, with the apparent goal of having them amplify operation narratives through fact checks. | -| [T0153.001 Email Platform](../../generated_pages/techniques/T0153.001.md) |  IT00000502 The unique aspect of Operation Overload is a barrage of emails sent to newsrooms and fact-checkers across Europe. The authors of these messages urge recipients to verify content allegedly found online. The email subject lines often include an incitement to verify the claims briefly described in the message body. This is followed by a short list of links directing recipients to posts on Telegram, X, or known pro-Russian websites, including Pravda and Sputnik.

We have collected 221 emails sent to 20 organisations. The organisations mostly received identical emails urging them to fact-check specific false stories, which demonstrates that the emails were sent as part of a larger coordinated campaign.

[...]

The authors of the emails do not hide their intention to see the fake content widely spread. In February 2024, a journalist at the German outlet CORRECTIV engaged with the sender of one of the emails, providing feedback on the narratives which were originally sent. CORRECTIV received a response from the same Gmail address, initially expressing respect and trust in CORRECTIV’s assessment, while asking: “is it possible for your work to be seen by as many people as possible?”, thereby clearly stating the goal of the operation.

[...]

All the emails come from authors posing as concerned citizens. All emails are sent with Gmail accounts, which is typical for personal use. This makes it challenging to identify the individuals behind these emails, as anyone can open a Gmail account for free. The email headers indicate that the messages were sent from the Gmail interface, not from a personal client which would disclose the sender’s IP address.


In this example, threat actors used gmail accounts (T0146.001: Free Account, T0097.100: Individual Persona, T0143.002: Fabricated Persona, T0153.001: Email Platform) to target journalists and fact-checkers, with the apparent goal of having them amplify operation narratives through fact checks. | +| [T0143.002 Fabricated Persona](../../generated_pages/techniques/T0143.002.md) |  IT00000501 The unique aspect of Operation Overload is a barrage of emails sent to newsrooms and fact-checkers across Europe. The authors of these messages urge recipients to verify content allegedly found online. The email subject lines often include an incitement to verify the claims briefly described in the message body. This is followed by a short list of links directing recipients to posts on Telegram, X, or known pro-Russian websites, including Pravda and Sputnik.

We have collected 221 emails sent to 20 organisations. The organisations mostly received identical emails urging them to fact-check specific false stories, which demonstrates that the emails were sent as part of a larger coordinated campaign.

[...]

The authors of the emails do not hide their intention to see the fake content widely spread. In February 2024, a journalist at the German outlet CORRECTIV engaged with the sender of one of the emails, providing feedback on the narratives which were originally sent. CORRECTIV received a response from the same Gmail address, initially expressing respect and trust in CORRECTIV’s assessment, while asking: “is it possible for your work to be seen by as many people as possible?”, thereby clearly stating the goal of the operation.

[...]

All the emails come from authors posing as concerned citizens. All emails are sent with Gmail accounts, which is typical for personal use. This makes it challenging to identify the individuals behind these emails, as anyone can open a Gmail account for free. The email headers indicate that the messages were sent from the Gmail interface, not from a personal client which would disclose the sender’s IP address.


In this example, threat actors used gmail accounts (T0146.001: Free Account Asset, T0097.100: Individual Persona, T0143.002: Fabricated Persona, T0153.001: Email Platform) to target journalists and fact-checkers, with the apparent goal of having them amplify operation narratives through fact checks. | +| [T0146.001 Free Account Asset](../../generated_pages/techniques/T0146.001.md) |  IT00000500 The unique aspect of Operation Overload is a barrage of emails sent to newsrooms and fact-checkers across Europe. The authors of these messages urge recipients to verify content allegedly found online. The email subject lines often include an incitement to verify the claims briefly described in the message body. This is followed by a short list of links directing recipients to posts on Telegram, X, or known pro-Russian websites, including Pravda and Sputnik.

We have collected 221 emails sent to 20 organisations. The organisations mostly received identical emails urging them to fact-check specific false stories, which demonstrates that the emails were sent as part of a larger coordinated campaign.

[...]

The authors of the emails do not hide their intention to see the fake content widely spread. In February 2024, a journalist at the German outlet CORRECTIV engaged with the sender of one of the emails, providing feedback on the narratives which were originally sent. CORRECTIV received a response from the same Gmail address, initially expressing respect and trust in CORRECTIV’s assessment, while asking: “is it possible for your work to be seen by as many people as possible?”, thereby clearly stating the goal of the operation.

[...]

All the emails come from authors posing as concerned citizens. All emails are sent with Gmail accounts, which is typical for personal use. This makes it challenging to identify the individuals behind these emails, as anyone can open a Gmail account for free. The email headers indicate that the messages were sent from the Gmail interface, not from a personal client which would disclose the sender’s IP address.


In this example, threat actors used gmail accounts (T0146.001: Free Account Asset, T0097.100: Individual Persona, T0143.002: Fabricated Persona, T0153.001: Email Platform) to target journalists and fact-checkers, with the apparent goal of having them amplify operation narratives through fact checks. | +| [T0153.001 Email Platform](../../generated_pages/techniques/T0153.001.md) |  IT00000502 The unique aspect of Operation Overload is a barrage of emails sent to newsrooms and fact-checkers across Europe. The authors of these messages urge recipients to verify content allegedly found online. The email subject lines often include an incitement to verify the claims briefly described in the message body. This is followed by a short list of links directing recipients to posts on Telegram, X, or known pro-Russian websites, including Pravda and Sputnik.

We have collected 221 emails sent to 20 organisations. The organisations mostly received identical emails urging them to fact-check specific false stories, which demonstrates that the emails were sent as part of a larger coordinated campaign.

[...]

The authors of the emails do not hide their intention to see the fake content widely spread. In February 2024, a journalist at the German outlet CORRECTIV engaged with the sender of one of the emails, providing feedback on the narratives which were originally sent. CORRECTIV received a response from the same Gmail address, initially expressing respect and trust in CORRECTIV’s assessment, while asking: “is it possible for your work to be seen by as many people as possible?”, thereby clearly stating the goal of the operation.

[...]

All the emails come from authors posing as concerned citizens. All emails are sent with Gmail accounts, which is typical for personal use. This makes it challenging to identify the individuals behind these emails, as anyone can open a Gmail account for free. The email headers indicate that the messages were sent from the Gmail interface, not from a personal client which would disclose the sender’s IP address.


In this example, threat actors used gmail accounts (T0146.001: Free Account Asset, T0097.100: Individual Persona, T0143.002: Fabricated Persona, T0153.001: Email Platform) to target journalists and fact-checkers, with the apparent goal of having them amplify operation narratives through fact checks. | DO NOT EDIT ABOVE THIS LINE - PLEASE ADD NOTES BELOW \ No newline at end of file diff --git a/generated_pages/incidents/I00122.md b/generated_pages/incidents/I00122.md index 420a15e..62fa80f 100644 --- a/generated_pages/incidents/I00122.md +++ b/generated_pages/incidents/I00122.md @@ -15,6 +15,7 @@ | Reference | Pub Date | Authors | Org | Archive | | --------- | -------- | ------- | --- | ------- | +| [https://www.isdglobal.org/wp-content/uploads/2021/08/04-gaming-report-discord.pdf](https://www.isdglobal.org/wp-content/uploads/2021/08/04-gaming-report-discord.pdf) | 2021/08/04 | Aoife Gallagher, Ciaran O’Connor, Pierre Vaux, Elise Thomas, Jacob Davey | ISD | [https://web.archive.org/web/20240528231254/https://www.isdglobal.org/wp-content/uploads/2021/08/04-gaming-report-discord.pdf](https://web.archive.org/web/20240528231254/https://www.isdglobal.org/wp-content/uploads/2021/08/04-gaming-report-discord.pdf) | diff --git a/generated_pages/incidents/I00123.md b/generated_pages/incidents/I00123.md index bca9b88..462c7e8 100644 --- a/generated_pages/incidents/I00123.md +++ b/generated_pages/incidents/I00123.md @@ -15,6 +15,7 @@ | Reference | Pub Date | Authors | Org | Archive | | --------- | -------- | ------- | --- | ------- | +| [https://www.isdglobal.org/wp-content/uploads/2021/08/02-revised-gaming-report-steam.pdf](https://www.isdglobal.org/wp-content/uploads/2021/08/02-revised-gaming-report-steam.pdf) | 2021/08/02 | Pierre Vaux, Aoife Gallagher, Jacob Davey | ISD | [https://web.archive.org/web/20240912223614/https://www.isdglobal.org/wp-content/uploads/2021/08/02-revised-gaming-report-steam.pdf](https://web.archive.org/web/20240912223614/https://www.isdglobal.org/wp-content/uploads/2021/08/02-revised-gaming-report-steam.pdf) | diff --git a/generated_pages/incidents/I00124.md b/generated_pages/incidents/I00124.md index 5b8c982..f382952 100644 --- a/generated_pages/incidents/I00124.md +++ b/generated_pages/incidents/I00124.md @@ -15,6 +15,7 @@ | Reference | Pub Date | Authors | Org | Archive | | --------- | -------- | ------- | --- | ------- | +| [https://www.mpf.se/publikationer/publikationer/2023-12-01-malign-foreign-interference-and-information-influence-on-video-game-platforms-understanding-the-adversarial-playbook](https://www.mpf.se/publikationer/publikationer/2023-12-01-malign-foreign-interference-and-information-influence-on-video-game-platforms-understanding-the-adversarial-playbook) | 2023/03/01 | Jesper Falkheimer, Elsa Isaksson, James Pamment | Myndigheten för psykologiskt försvar | [https://web.archive.org/web/20240520215840/https://www.mpf.se/publikationer/publikationer/2023-12-01-malign-foreign-interference-and-information-influence-on-video-game-platforms-understanding-the-adversarial-playbook](https://web.archive.org/web/20240520215840/https://www.mpf.se/publikationer/publikationer/2023-12-01-malign-foreign-interference-and-information-influence-on-video-game-platforms-understanding-the-adversarial-playbook) | diff --git a/generated_pages/incidents/I00125.md b/generated_pages/incidents/I00125.md index 8a1f123..1645c98 100644 --- a/generated_pages/incidents/I00125.md +++ b/generated_pages/incidents/I00125.md @@ -15,17 +15,17 @@ | Reference | Pub Date | Authors | Org | Archive | | --------- | -------- | ------- | --- | ------- | +| [https://www.nytimes.com/2015/06/07/magazine/the-agency.html?](https://www.nytimes.com/2015/06/07/magazine/the-agency.html?) | 2015/06/07 | Adrian Chen | The New York Times | [https://web.archive.org/web/20241007172237/https://www.nytimes.com/2015/06/07/magazine/the-agency.html](https://web.archive.org/web/20241007172237/https://www.nytimes.com/2015/06/07/magazine/the-agency.html) | | Technique | Description given for this incident | | --------- | ------------------------- | -| [T0087 Develop Video-Based Content](../../generated_pages/techniques/T0087.md) |  IT00000524 In 2014 threat actors attributed to Russia spread the false narrative that a local chemical plant had leaked toxic fumes. This report discusses aspects of the operation:

[The chemical plant leak] hoax was just one in a wave of similar attacks during the second half of last year. On Dec. 13, two months after a handful of Ebola cases in the United States touched off a minor media panic, many of the same Twitter accounts used to spread the Columbian Chemicals hoax began to post about an outbreak of Ebola in Atlanta. [...] Again, the attention to detail was remarkable, suggesting a tremendous amount of effort. A YouTube video showed a team of hazmat-suited medical workers transporting a victim from the airport. Beyoncé’s recent single “7/11” played in the background, an apparent attempt to establish the video’s contemporaneity. A truck in the parking lot sported the logo of the Hartsfield-Jackson Atlanta International Airport.

Accounts which previously presented as Louisiana locals were repurposed for use in a different campaign, this time presenting as locals to Atlanta, a place over 500 miles away from Louisiana and in a different timezone (T0146: Account, T0097.101: Local Persona, T0143.002: Fabricated Persona, T0151.008: Microblogging Platform, T0150.004: Repurposed).

A video was created which appeared to support the campaign’s narrative (T0087: Develop Video-Based Content), with great attention given to small details which made the video appear more legitimate. | -| [T0097.101 Local Persona](../../generated_pages/techniques/T0097.101.md) | In 2014 threat actors attributed to Russia spread the false narrative that a local chemical plant had leaked toxic fumes. This report discusses aspects of the operation:

[The chemical plant leak] hoax was just one in a wave of similar attacks during the second half of last year. On Dec. 13, two months after a handful of Ebola cases in the United States touched off a minor media panic, many of the same Twitter accounts used to spread the Columbian Chemicals hoax began to post about an outbreak of Ebola in Atlanta. [...] Again, the attention to detail was remarkable, suggesting a tremendous amount of effort. A YouTube video showed a team of hazmat-suited medical workers transporting a victim from the airport. Beyoncé’s recent single “7/11” played in the background, an apparent attempt to establish the video’s contemporaneity. A truck in the parking lot sported the logo of the Hartsfield-Jackson Atlanta International Airport.

Accounts which previously presented as Louisiana locals were repurposed for use in a different campaign, this time presenting as locals to Atlanta, a place over 500 miles away from Louisiana and in a different timezone (T0146: Account, T0097.101: Local Persona, T0143.002: Fabricated Persona, T0151.008: Microblogging Platform, T0150.004: Repurposed).

A video was created which appeared to support the campaign’s narrative (T0087: Develop Video-Based Content), with great attention given to small details which made the video appear more legitimate. | -| [T0143.002 Fabricated Persona](../../generated_pages/techniques/T0143.002.md) |  IT00000521 In 2014 threat actors attributed to Russia spread the false narrative that a local chemical plant had leaked toxic fumes. This report discusses aspects of the operation:

[The chemical plant leak] hoax was just one in a wave of similar attacks during the second half of last year. On Dec. 13, two months after a handful of Ebola cases in the United States touched off a minor media panic, many of the same Twitter accounts used to spread the Columbian Chemicals hoax began to post about an outbreak of Ebola in Atlanta. [...] Again, the attention to detail was remarkable, suggesting a tremendous amount of effort. A YouTube video showed a team of hazmat-suited medical workers transporting a victim from the airport. Beyoncé’s recent single “7/11” played in the background, an apparent attempt to establish the video’s contemporaneity. A truck in the parking lot sported the logo of the Hartsfield-Jackson Atlanta International Airport.

Accounts which previously presented as Louisiana locals were repurposed for use in a different campaign, this time presenting as locals to Atlanta, a place over 500 miles away from Louisiana and in a different timezone (T0146: Account, T0097.101: Local Persona, T0143.002: Fabricated Persona, T0151.008: Microblogging Platform, T0150.004: Repurposed).

A video was created which appeared to support the campaign’s narrative (T0087: Develop Video-Based Content), with great attention given to small details which made the video appear more legitimate. | -| [T0146 Account](../../generated_pages/techniques/T0146.md) |  IT00000520 In 2014 threat actors attributed to Russia spread the false narrative that a local chemical plant had leaked toxic fumes. This report discusses aspects of the operation:

[The chemical plant leak] hoax was just one in a wave of similar attacks during the second half of last year. On Dec. 13, two months after a handful of Ebola cases in the United States touched off a minor media panic, many of the same Twitter accounts used to spread the Columbian Chemicals hoax began to post about an outbreak of Ebola in Atlanta. [...] Again, the attention to detail was remarkable, suggesting a tremendous amount of effort. A YouTube video showed a team of hazmat-suited medical workers transporting a victim from the airport. Beyoncé’s recent single “7/11” played in the background, an apparent attempt to establish the video’s contemporaneity. A truck in the parking lot sported the logo of the Hartsfield-Jackson Atlanta International Airport.

Accounts which previously presented as Louisiana locals were repurposed for use in a different campaign, this time presenting as locals to Atlanta, a place over 500 miles away from Louisiana and in a different timezone (T0146: Account, T0097.101: Local Persona, T0143.002: Fabricated Persona, T0151.008: Microblogging Platform, T0150.004: Repurposed).

A video was created which appeared to support the campaign’s narrative (T0087: Develop Video-Based Content), with great attention given to small details which made the video appear more legitimate. | -| [T0150.004 Repurposed](../../generated_pages/techniques/T0150.004.md) |  IT00000523 In 2014 threat actors attributed to Russia spread the false narrative that a local chemical plant had leaked toxic fumes. This report discusses aspects of the operation:

[The chemical plant leak] hoax was just one in a wave of similar attacks during the second half of last year. On Dec. 13, two months after a handful of Ebola cases in the United States touched off a minor media panic, many of the same Twitter accounts used to spread the Columbian Chemicals hoax began to post about an outbreak of Ebola in Atlanta. [...] Again, the attention to detail was remarkable, suggesting a tremendous amount of effort. A YouTube video showed a team of hazmat-suited medical workers transporting a victim from the airport. Beyoncé’s recent single “7/11” played in the background, an apparent attempt to establish the video’s contemporaneity. A truck in the parking lot sported the logo of the Hartsfield-Jackson Atlanta International Airport.

Accounts which previously presented as Louisiana locals were repurposed for use in a different campaign, this time presenting as locals to Atlanta, a place over 500 miles away from Louisiana and in a different timezone (T0146: Account, T0097.101: Local Persona, T0143.002: Fabricated Persona, T0151.008: Microblogging Platform, T0150.004: Repurposed).

A video was created which appeared to support the campaign’s narrative (T0087: Develop Video-Based Content), with great attention given to small details which made the video appear more legitimate. | -| [T0151.008 Microblogging Platform](../../generated_pages/techniques/T0151.008.md) |  IT00000522 In 2014 threat actors attributed to Russia spread the false narrative that a local chemical plant had leaked toxic fumes. This report discusses aspects of the operation:

[The chemical plant leak] hoax was just one in a wave of similar attacks during the second half of last year. On Dec. 13, two months after a handful of Ebola cases in the United States touched off a minor media panic, many of the same Twitter accounts used to spread the Columbian Chemicals hoax began to post about an outbreak of Ebola in Atlanta. [...] Again, the attention to detail was remarkable, suggesting a tremendous amount of effort. A YouTube video showed a team of hazmat-suited medical workers transporting a victim from the airport. Beyoncé’s recent single “7/11” played in the background, an apparent attempt to establish the video’s contemporaneity. A truck in the parking lot sported the logo of the Hartsfield-Jackson Atlanta International Airport.

Accounts which previously presented as Louisiana locals were repurposed for use in a different campaign, this time presenting as locals to Atlanta, a place over 500 miles away from Louisiana and in a different timezone (T0146: Account, T0097.101: Local Persona, T0143.002: Fabricated Persona, T0151.008: Microblogging Platform, T0150.004: Repurposed).

A video was created which appeared to support the campaign’s narrative (T0087: Develop Video-Based Content), with great attention given to small details which made the video appear more legitimate. | +| [T0087 Develop Video-Based Content](../../generated_pages/techniques/T0087.md) |  IT00000524 In 2014 threat actors attributed to Russia spread the false narrative that a local chemical plant had leaked toxic fumes. This report discusses aspects of the operation:

[The chemical plant leak] hoax was just one in a wave of similar attacks during the second half of last year. On Dec. 13, two months after a handful of Ebola cases in the United States touched off a minor media panic, many of the same Twitter accounts used to spread the Columbian Chemicals hoax began to post about an outbreak of Ebola in Atlanta. [...] Again, the attention to detail was remarkable, suggesting a tremendous amount of effort. A YouTube video showed a team of hazmat-suited medical workers transporting a victim from the airport. Beyoncé’s recent single “7/11” played in the background, an apparent attempt to establish the video’s contemporaneity. A truck in the parking lot sported the logo of the Hartsfield-Jackson Atlanta International Airport.

Accounts which previously presented as Louisiana locals were repurposed for use in a different campaign, this time presenting as locals to Atlanta, a place over 500 miles away from Louisiana and in a different timezone (T0146: Account Asset, T0097.101: Local Persona, T0143.002: Fabricated Persona, T0151.008: Microblogging Platform, T0150.004: Repurposed Asset).

A video was created which appeared to support the campaign’s narrative (T0087: Develop Video-Based Content), with great attention given to small details which made the video appear more legitimate. | +| [T0143.002 Fabricated Persona](../../generated_pages/techniques/T0143.002.md) |  IT00000521 In 2014 threat actors attributed to Russia spread the false narrative that a local chemical plant had leaked toxic fumes. This report discusses aspects of the operation:

[The chemical plant leak] hoax was just one in a wave of similar attacks during the second half of last year. On Dec. 13, two months after a handful of Ebola cases in the United States touched off a minor media panic, many of the same Twitter accounts used to spread the Columbian Chemicals hoax began to post about an outbreak of Ebola in Atlanta. [...] Again, the attention to detail was remarkable, suggesting a tremendous amount of effort. A YouTube video showed a team of hazmat-suited medical workers transporting a victim from the airport. Beyoncé’s recent single “7/11” played in the background, an apparent attempt to establish the video’s contemporaneity. A truck in the parking lot sported the logo of the Hartsfield-Jackson Atlanta International Airport.

Accounts which previously presented as Louisiana locals were repurposed for use in a different campaign, this time presenting as locals to Atlanta, a place over 500 miles away from Louisiana and in a different timezone (T0146: Account Asset, T0097.101: Local Persona, T0143.002: Fabricated Persona, T0151.008: Microblogging Platform, T0150.004: Repurposed Asset).

A video was created which appeared to support the campaign’s narrative (T0087: Develop Video-Based Content), with great attention given to small details which made the video appear more legitimate. | +| [T0146 Account Asset](../../generated_pages/techniques/T0146.md) |  IT00000520 In 2014 threat actors attributed to Russia spread the false narrative that a local chemical plant had leaked toxic fumes. This report discusses aspects of the operation:

[The chemical plant leak] hoax was just one in a wave of similar attacks during the second half of last year. On Dec. 13, two months after a handful of Ebola cases in the United States touched off a minor media panic, many of the same Twitter accounts used to spread the Columbian Chemicals hoax began to post about an outbreak of Ebola in Atlanta. [...] Again, the attention to detail was remarkable, suggesting a tremendous amount of effort. A YouTube video showed a team of hazmat-suited medical workers transporting a victim from the airport. Beyoncé’s recent single “7/11” played in the background, an apparent attempt to establish the video’s contemporaneity. A truck in the parking lot sported the logo of the Hartsfield-Jackson Atlanta International Airport.

Accounts which previously presented as Louisiana locals were repurposed for use in a different campaign, this time presenting as locals to Atlanta, a place over 500 miles away from Louisiana and in a different timezone (T0146: Account Asset, T0097.101: Local Persona, T0143.002: Fabricated Persona, T0151.008: Microblogging Platform, T0150.004: Repurposed Asset).

A video was created which appeared to support the campaign’s narrative (T0087: Develop Video-Based Content), with great attention given to small details which made the video appear more legitimate. | +| [T0150.004 Repurposed Asset](../../generated_pages/techniques/T0150.004.md) |  IT00000523 In 2014 threat actors attributed to Russia spread the false narrative that a local chemical plant had leaked toxic fumes. This report discusses aspects of the operation:

[The chemical plant leak] hoax was just one in a wave of similar attacks during the second half of last year. On Dec. 13, two months after a handful of Ebola cases in the United States touched off a minor media panic, many of the same Twitter accounts used to spread the Columbian Chemicals hoax began to post about an outbreak of Ebola in Atlanta. [...] Again, the attention to detail was remarkable, suggesting a tremendous amount of effort. A YouTube video showed a team of hazmat-suited medical workers transporting a victim from the airport. Beyoncé’s recent single “7/11” played in the background, an apparent attempt to establish the video’s contemporaneity. A truck in the parking lot sported the logo of the Hartsfield-Jackson Atlanta International Airport.

Accounts which previously presented as Louisiana locals were repurposed for use in a different campaign, this time presenting as locals to Atlanta, a place over 500 miles away from Louisiana and in a different timezone (T0146: Account Asset, T0097.101: Local Persona, T0143.002: Fabricated Persona, T0151.008: Microblogging Platform, T0150.004: Repurposed Asset).

A video was created which appeared to support the campaign’s narrative (T0087: Develop Video-Based Content), with great attention given to small details which made the video appear more legitimate. | +| [T0151.008 Microblogging Platform](../../generated_pages/techniques/T0151.008.md) |  IT00000522 In 2014 threat actors attributed to Russia spread the false narrative that a local chemical plant had leaked toxic fumes. This report discusses aspects of the operation:

[The chemical plant leak] hoax was just one in a wave of similar attacks during the second half of last year. On Dec. 13, two months after a handful of Ebola cases in the United States touched off a minor media panic, many of the same Twitter accounts used to spread the Columbian Chemicals hoax began to post about an outbreak of Ebola in Atlanta. [...] Again, the attention to detail was remarkable, suggesting a tremendous amount of effort. A YouTube video showed a team of hazmat-suited medical workers transporting a victim from the airport. Beyoncé’s recent single “7/11” played in the background, an apparent attempt to establish the video’s contemporaneity. A truck in the parking lot sported the logo of the Hartsfield-Jackson Atlanta International Airport.

Accounts which previously presented as Louisiana locals were repurposed for use in a different campaign, this time presenting as locals to Atlanta, a place over 500 miles away from Louisiana and in a different timezone (T0146: Account Asset, T0097.101: Local Persona, T0143.002: Fabricated Persona, T0151.008: Microblogging Platform, T0150.004: Repurposed Asset).

A video was created which appeared to support the campaign’s narrative (T0087: Develop Video-Based Content), with great attention given to small details which made the video appear more legitimate. | DO NOT EDIT ABOVE THIS LINE - PLEASE ADD NOTES BELOW \ No newline at end of file diff --git a/generated_pages/incidents/I00126.md b/generated_pages/incidents/I00126.md index cbee212..3f1c746 100644 --- a/generated_pages/incidents/I00126.md +++ b/generated_pages/incidents/I00126.md @@ -15,18 +15,19 @@ | Reference | Pub Date | Authors | Org | Archive | | --------- | -------- | ------- | --- | ------- | +| [https://www.volexity.com/blog/2023/06/28/charming-kitten-updates-powerstar-with-an-interplanetary-twist/](https://www.volexity.com/blog/2023/06/28/charming-kitten-updates-powerstar-with-an-interplanetary-twist/) | 2023/06/28 | Ankur Saini, Charlie Gardner | Volexity | [https://web.archive.org/web/20241009175500/https://www.volexity.com/blog/2023/06/28/charming-kitten-updates-powerstar-with-an-interplanetary-twist/](https://web.archive.org/web/20241009175500/https://www.volexity.com/blog/2023/06/28/charming-kitten-updates-powerstar-with-an-interplanetary-twist/) | | Technique | Description given for this incident | | --------- | ------------------------- | -| [T0085.004 Develop Document](../../generated_pages/techniques/T0085.004.md) |  IT00000530 The target of the recently observed [highly targeted spearphishing attack by “Charming Kitten”, a hacker group attributed to Iran] had published an article related to Iran. The publicity appears to have garnered the attention of Charming Kitten, who subsequently created an email address to impersonate a reporter of an Israeli media organization in order to send the target an email. Prior to sending malware to the target, the attacker simply asked if the target would be open to reviewing a document they had written related to US foreign policy. The target agreed to do so, since this was not an unusual request; they are frequently asked by journalists to review opinion pieces relating to their field of work.

In an effort to further gain the target’s confidence, Charming Kitten continued the interaction with another benign email containing a list of questions, to which the target then responded with answers. After multiple days of benign and seemingly legitimate interaction, Charming Kitten finally sent a “draft report”; this was the first time anything opaquely malicious occurred. The “draft report” was, in fact, a password-protected RAR file containing a malicious LNK file. The password for the RAR file was provided in a subsequent email.


In this example, threat actors created an email address on a domain which impersonated an existing Israeli news organisation impersonating a reporter who worked there (T0097.102: Journalist Persona, T0097.202: News Outlet Persona, T0143.003: Impersonated Persona, T0149.003: Lookalike Domain, T0149.002: Email Domain) in order to convince the target to download a document containing malware (T0085.004: Develop Document, T0147.003: Malware). | -| [T0097.102 Journalist Persona](../../generated_pages/techniques/T0097.102.md) |  IT00000525 The target of the recently observed [highly targeted spearphishing attack by “Charming Kitten”, a hacker group attributed to Iran] had published an article related to Iran. The publicity appears to have garnered the attention of Charming Kitten, who subsequently created an email address to impersonate a reporter of an Israeli media organization in order to send the target an email. Prior to sending malware to the target, the attacker simply asked if the target would be open to reviewing a document they had written related to US foreign policy. The target agreed to do so, since this was not an unusual request; they are frequently asked by journalists to review opinion pieces relating to their field of work.

In an effort to further gain the target’s confidence, Charming Kitten continued the interaction with another benign email containing a list of questions, to which the target then responded with answers. After multiple days of benign and seemingly legitimate interaction, Charming Kitten finally sent a “draft report”; this was the first time anything opaquely malicious occurred. The “draft report” was, in fact, a password-protected RAR file containing a malicious LNK file. The password for the RAR file was provided in a subsequent email.


In this example, threat actors created an email address on a domain which impersonated an existing Israeli news organisation impersonating a reporter who worked there (T0097.102: Journalist Persona, T0097.202: News Outlet Persona, T0143.003: Impersonated Persona, T0149.003: Lookalike Domain, T0149.002: Email Domain) in order to convince the target to download a document containing malware (T0085.004: Develop Document, T0147.003: Malware). | -| [T0097.202 News Outlet Persona](../../generated_pages/techniques/T0097.202.md) |  IT00000526 The target of the recently observed [highly targeted spearphishing attack by “Charming Kitten”, a hacker group attributed to Iran] had published an article related to Iran. The publicity appears to have garnered the attention of Charming Kitten, who subsequently created an email address to impersonate a reporter of an Israeli media organization in order to send the target an email. Prior to sending malware to the target, the attacker simply asked if the target would be open to reviewing a document they had written related to US foreign policy. The target agreed to do so, since this was not an unusual request; they are frequently asked by journalists to review opinion pieces relating to their field of work.

In an effort to further gain the target’s confidence, Charming Kitten continued the interaction with another benign email containing a list of questions, to which the target then responded with answers. After multiple days of benign and seemingly legitimate interaction, Charming Kitten finally sent a “draft report”; this was the first time anything opaquely malicious occurred. The “draft report” was, in fact, a password-protected RAR file containing a malicious LNK file. The password for the RAR file was provided in a subsequent email.


In this example, threat actors created an email address on a domain which impersonated an existing Israeli news organisation impersonating a reporter who worked there (T0097.102: Journalist Persona, T0097.202: News Outlet Persona, T0143.003: Impersonated Persona, T0149.003: Lookalike Domain, T0149.002: Email Domain) in order to convince the target to download a document containing malware (T0085.004: Develop Document, T0147.003: Malware). | -| [T0143.003 Impersonated Persona](../../generated_pages/techniques/T0143.003.md) |  IT00000527 The target of the recently observed [highly targeted spearphishing attack by “Charming Kitten”, a hacker group attributed to Iran] had published an article related to Iran. The publicity appears to have garnered the attention of Charming Kitten, who subsequently created an email address to impersonate a reporter of an Israeli media organization in order to send the target an email. Prior to sending malware to the target, the attacker simply asked if the target would be open to reviewing a document they had written related to US foreign policy. The target agreed to do so, since this was not an unusual request; they are frequently asked by journalists to review opinion pieces relating to their field of work.

In an effort to further gain the target’s confidence, Charming Kitten continued the interaction with another benign email containing a list of questions, to which the target then responded with answers. After multiple days of benign and seemingly legitimate interaction, Charming Kitten finally sent a “draft report”; this was the first time anything opaquely malicious occurred. The “draft report” was, in fact, a password-protected RAR file containing a malicious LNK file. The password for the RAR file was provided in a subsequent email.


In this example, threat actors created an email address on a domain which impersonated an existing Israeli news organisation impersonating a reporter who worked there (T0097.102: Journalist Persona, T0097.202: News Outlet Persona, T0143.003: Impersonated Persona, T0149.003: Lookalike Domain, T0149.002: Email Domain) in order to convince the target to download a document containing malware (T0085.004: Develop Document, T0147.003: Malware). | -| [T0147.003 Malware](../../generated_pages/techniques/T0147.003.md) |  IT00000531 The target of the recently observed [highly targeted spearphishing attack by “Charming Kitten”, a hacker group attributed to Iran] had published an article related to Iran. The publicity appears to have garnered the attention of Charming Kitten, who subsequently created an email address to impersonate a reporter of an Israeli media organization in order to send the target an email. Prior to sending malware to the target, the attacker simply asked if the target would be open to reviewing a document they had written related to US foreign policy. The target agreed to do so, since this was not an unusual request; they are frequently asked by journalists to review opinion pieces relating to their field of work.

In an effort to further gain the target’s confidence, Charming Kitten continued the interaction with another benign email containing a list of questions, to which the target then responded with answers. After multiple days of benign and seemingly legitimate interaction, Charming Kitten finally sent a “draft report”; this was the first time anything opaquely malicious occurred. The “draft report” was, in fact, a password-protected RAR file containing a malicious LNK file. The password for the RAR file was provided in a subsequent email.


In this example, threat actors created an email address on a domain which impersonated an existing Israeli news organisation impersonating a reporter who worked there (T0097.102: Journalist Persona, T0097.202: News Outlet Persona, T0143.003: Impersonated Persona, T0149.003: Lookalike Domain, T0149.002: Email Domain) in order to convince the target to download a document containing malware (T0085.004: Develop Document, T0147.003: Malware). | -| [T0149.002 Email Domain](../../generated_pages/techniques/T0149.002.md) |  IT00000529 The target of the recently observed [highly targeted spearphishing attack by “Charming Kitten”, a hacker group attributed to Iran] had published an article related to Iran. The publicity appears to have garnered the attention of Charming Kitten, who subsequently created an email address to impersonate a reporter of an Israeli media organization in order to send the target an email. Prior to sending malware to the target, the attacker simply asked if the target would be open to reviewing a document they had written related to US foreign policy. The target agreed to do so, since this was not an unusual request; they are frequently asked by journalists to review opinion pieces relating to their field of work.

In an effort to further gain the target’s confidence, Charming Kitten continued the interaction with another benign email containing a list of questions, to which the target then responded with answers. After multiple days of benign and seemingly legitimate interaction, Charming Kitten finally sent a “draft report”; this was the first time anything opaquely malicious occurred. The “draft report” was, in fact, a password-protected RAR file containing a malicious LNK file. The password for the RAR file was provided in a subsequent email.


In this example, threat actors created an email address on a domain which impersonated an existing Israeli news organisation impersonating a reporter who worked there (T0097.102: Journalist Persona, T0097.202: News Outlet Persona, T0143.003: Impersonated Persona, T0149.003: Lookalike Domain, T0149.002: Email Domain) in order to convince the target to download a document containing malware (T0085.004: Develop Document, T0147.003: Malware). | -| [T0149.003 Lookalike Domain](../../generated_pages/techniques/T0149.003.md) |  IT00000528 The target of the recently observed [highly targeted spearphishing attack by “Charming Kitten”, a hacker group attributed to Iran] had published an article related to Iran. The publicity appears to have garnered the attention of Charming Kitten, who subsequently created an email address to impersonate a reporter of an Israeli media organization in order to send the target an email. Prior to sending malware to the target, the attacker simply asked if the target would be open to reviewing a document they had written related to US foreign policy. The target agreed to do so, since this was not an unusual request; they are frequently asked by journalists to review opinion pieces relating to their field of work.

In an effort to further gain the target’s confidence, Charming Kitten continued the interaction with another benign email containing a list of questions, to which the target then responded with answers. After multiple days of benign and seemingly legitimate interaction, Charming Kitten finally sent a “draft report”; this was the first time anything opaquely malicious occurred. The “draft report” was, in fact, a password-protected RAR file containing a malicious LNK file. The password for the RAR file was provided in a subsequent email.


In this example, threat actors created an email address on a domain which impersonated an existing Israeli news organisation impersonating a reporter who worked there (T0097.102: Journalist Persona, T0097.202: News Outlet Persona, T0143.003: Impersonated Persona, T0149.003: Lookalike Domain, T0149.002: Email Domain) in order to convince the target to download a document containing malware (T0085.004: Develop Document, T0147.003: Malware). | +| [T0085.004 Develop Document](../../generated_pages/techniques/T0085.004.md) |  IT00000530 The target of the recently observed [highly targeted spearphishing attack by “Charming Kitten”, a hacker group attributed to Iran] had published an article related to Iran. The publicity appears to have garnered the attention of Charming Kitten, who subsequently created an email address to impersonate a reporter of an Israeli media organization in order to send the target an email. Prior to sending malware to the target, the attacker simply asked if the target would be open to reviewing a document they had written related to US foreign policy. The target agreed to do so, since this was not an unusual request; they are frequently asked by journalists to review opinion pieces relating to their field of work.

In an effort to further gain the target’s confidence, Charming Kitten continued the interaction with another benign email containing a list of questions, to which the target then responded with answers. After multiple days of benign and seemingly legitimate interaction, Charming Kitten finally sent a “draft report”; this was the first time anything opaquely malicious occurred. The “draft report” was, in fact, a password-protected RAR file containing a malicious LNK file. The password for the RAR file was provided in a subsequent email.


In this example, threat actors created an email address on a domain which impersonated an existing Israeli news organisation impersonating a reporter who worked there (T0097.102: Journalist Persona, T0097.202: News Outlet Persona, T0143.003: Impersonated Persona, T0149.003: Lookalike Domain, T0149.002: Email Domain Asset) in order to convince the target to download a document containing malware (T0085.004: Develop Document, T0147.003: Malware Asset). | +| [T0097.102 Journalist Persona](../../generated_pages/techniques/T0097.102.md) |  IT00000525 The target of the recently observed [highly targeted spearphishing attack by “Charming Kitten”, a hacker group attributed to Iran] had published an article related to Iran. The publicity appears to have garnered the attention of Charming Kitten, who subsequently created an email address to impersonate a reporter of an Israeli media organization in order to send the target an email. Prior to sending malware to the target, the attacker simply asked if the target would be open to reviewing a document they had written related to US foreign policy. The target agreed to do so, since this was not an unusual request; they are frequently asked by journalists to review opinion pieces relating to their field of work.

In an effort to further gain the target’s confidence, Charming Kitten continued the interaction with another benign email containing a list of questions, to which the target then responded with answers. After multiple days of benign and seemingly legitimate interaction, Charming Kitten finally sent a “draft report”; this was the first time anything opaquely malicious occurred. The “draft report” was, in fact, a password-protected RAR file containing a malicious LNK file. The password for the RAR file was provided in a subsequent email.


In this example, threat actors created an email address on a domain which impersonated an existing Israeli news organisation impersonating a reporter who worked there (T0097.102: Journalist Persona, T0097.202: News Outlet Persona, T0143.003: Impersonated Persona, T0149.003: Lookalike Domain, T0149.002: Email Domain Asset) in order to convince the target to download a document containing malware (T0085.004: Develop Document, T0147.003: Malware Asset). | +| [T0097.202 News Outlet Persona](../../generated_pages/techniques/T0097.202.md) |  IT00000526 The target of the recently observed [highly targeted spearphishing attack by “Charming Kitten”, a hacker group attributed to Iran] had published an article related to Iran. The publicity appears to have garnered the attention of Charming Kitten, who subsequently created an email address to impersonate a reporter of an Israeli media organization in order to send the target an email. Prior to sending malware to the target, the attacker simply asked if the target would be open to reviewing a document they had written related to US foreign policy. The target agreed to do so, since this was not an unusual request; they are frequently asked by journalists to review opinion pieces relating to their field of work.

In an effort to further gain the target’s confidence, Charming Kitten continued the interaction with another benign email containing a list of questions, to which the target then responded with answers. After multiple days of benign and seemingly legitimate interaction, Charming Kitten finally sent a “draft report”; this was the first time anything opaquely malicious occurred. The “draft report” was, in fact, a password-protected RAR file containing a malicious LNK file. The password for the RAR file was provided in a subsequent email.


In this example, threat actors created an email address on a domain which impersonated an existing Israeli news organisation impersonating a reporter who worked there (T0097.102: Journalist Persona, T0097.202: News Outlet Persona, T0143.003: Impersonated Persona, T0149.003: Lookalike Domain, T0149.002: Email Domain Asset) in order to convince the target to download a document containing malware (T0085.004: Develop Document, T0147.003: Malware Asset). | +| [T0143.003 Impersonated Persona](../../generated_pages/techniques/T0143.003.md) |  IT00000527 The target of the recently observed [highly targeted spearphishing attack by “Charming Kitten”, a hacker group attributed to Iran] had published an article related to Iran. The publicity appears to have garnered the attention of Charming Kitten, who subsequently created an email address to impersonate a reporter of an Israeli media organization in order to send the target an email. Prior to sending malware to the target, the attacker simply asked if the target would be open to reviewing a document they had written related to US foreign policy. The target agreed to do so, since this was not an unusual request; they are frequently asked by journalists to review opinion pieces relating to their field of work.

In an effort to further gain the target’s confidence, Charming Kitten continued the interaction with another benign email containing a list of questions, to which the target then responded with answers. After multiple days of benign and seemingly legitimate interaction, Charming Kitten finally sent a “draft report”; this was the first time anything opaquely malicious occurred. The “draft report” was, in fact, a password-protected RAR file containing a malicious LNK file. The password for the RAR file was provided in a subsequent email.


In this example, threat actors created an email address on a domain which impersonated an existing Israeli news organisation impersonating a reporter who worked there (T0097.102: Journalist Persona, T0097.202: News Outlet Persona, T0143.003: Impersonated Persona, T0149.003: Lookalike Domain, T0149.002: Email Domain Asset) in order to convince the target to download a document containing malware (T0085.004: Develop Document, T0147.003: Malware Asset). | +| [T0147.003 Malware Asset](../../generated_pages/techniques/T0147.003.md) |  IT00000531 The target of the recently observed [highly targeted spearphishing attack by “Charming Kitten”, a hacker group attributed to Iran] had published an article related to Iran. The publicity appears to have garnered the attention of Charming Kitten, who subsequently created an email address to impersonate a reporter of an Israeli media organization in order to send the target an email. Prior to sending malware to the target, the attacker simply asked if the target would be open to reviewing a document they had written related to US foreign policy. The target agreed to do so, since this was not an unusual request; they are frequently asked by journalists to review opinion pieces relating to their field of work.

In an effort to further gain the target’s confidence, Charming Kitten continued the interaction with another benign email containing a list of questions, to which the target then responded with answers. After multiple days of benign and seemingly legitimate interaction, Charming Kitten finally sent a “draft report”; this was the first time anything opaquely malicious occurred. The “draft report” was, in fact, a password-protected RAR file containing a malicious LNK file. The password for the RAR file was provided in a subsequent email.


In this example, threat actors created an email address on a domain which impersonated an existing Israeli news organisation impersonating a reporter who worked there (T0097.102: Journalist Persona, T0097.202: News Outlet Persona, T0143.003: Impersonated Persona, T0149.003: Lookalike Domain, T0149.002: Email Domain Asset) in order to convince the target to download a document containing malware (T0085.004: Develop Document, T0147.003: Malware Asset). | +| [T0149.002 Email Domain Asset](../../generated_pages/techniques/T0149.002.md) |  IT00000529 The target of the recently observed [highly targeted spearphishing attack by “Charming Kitten”, a hacker group attributed to Iran] had published an article related to Iran. The publicity appears to have garnered the attention of Charming Kitten, who subsequently created an email address to impersonate a reporter of an Israeli media organization in order to send the target an email. Prior to sending malware to the target, the attacker simply asked if the target would be open to reviewing a document they had written related to US foreign policy. The target agreed to do so, since this was not an unusual request; they are frequently asked by journalists to review opinion pieces relating to their field of work.

In an effort to further gain the target’s confidence, Charming Kitten continued the interaction with another benign email containing a list of questions, to which the target then responded with answers. After multiple days of benign and seemingly legitimate interaction, Charming Kitten finally sent a “draft report”; this was the first time anything opaquely malicious occurred. The “draft report” was, in fact, a password-protected RAR file containing a malicious LNK file. The password for the RAR file was provided in a subsequent email.


In this example, threat actors created an email address on a domain which impersonated an existing Israeli news organisation impersonating a reporter who worked there (T0097.102: Journalist Persona, T0097.202: News Outlet Persona, T0143.003: Impersonated Persona, T0149.003: Lookalike Domain, T0149.002: Email Domain Asset) in order to convince the target to download a document containing malware (T0085.004: Develop Document, T0147.003: Malware Asset). | +| [T0149.003 Lookalike Domain](../../generated_pages/techniques/T0149.003.md) |  IT00000528 The target of the recently observed [highly targeted spearphishing attack by “Charming Kitten”, a hacker group attributed to Iran] had published an article related to Iran. The publicity appears to have garnered the attention of Charming Kitten, who subsequently created an email address to impersonate a reporter of an Israeli media organization in order to send the target an email. Prior to sending malware to the target, the attacker simply asked if the target would be open to reviewing a document they had written related to US foreign policy. The target agreed to do so, since this was not an unusual request; they are frequently asked by journalists to review opinion pieces relating to their field of work.

In an effort to further gain the target’s confidence, Charming Kitten continued the interaction with another benign email containing a list of questions, to which the target then responded with answers. After multiple days of benign and seemingly legitimate interaction, Charming Kitten finally sent a “draft report”; this was the first time anything opaquely malicious occurred. The “draft report” was, in fact, a password-protected RAR file containing a malicious LNK file. The password for the RAR file was provided in a subsequent email.


In this example, threat actors created an email address on a domain which impersonated an existing Israeli news organisation impersonating a reporter who worked there (T0097.102: Journalist Persona, T0097.202: News Outlet Persona, T0143.003: Impersonated Persona, T0149.003: Lookalike Domain, T0149.002: Email Domain Asset) in order to convince the target to download a document containing malware (T0085.004: Develop Document, T0147.003: Malware Asset). | DO NOT EDIT ABOVE THIS LINE - PLEASE ADD NOTES BELOW \ No newline at end of file diff --git a/generated_pages/incidents/I00127.md b/generated_pages/incidents/I00127.md index c53e7f9..4e48e2f 100644 --- a/generated_pages/incidents/I00127.md +++ b/generated_pages/incidents/I00127.md @@ -15,6 +15,7 @@ | Reference | Pub Date | Authors | Org | Archive | | --------- | -------- | ------- | --- | ------- | +| [https://www.darkreading.com/threat-intelligence/iranian-apts-dress-up-as-hacktivists-for-disruption-influence-ops](https://www.darkreading.com/threat-intelligence/iranian-apts-dress-up-as-hacktivists-for-disruption-influence-ops) | 2024/02/21 | Nate Nelson | DarkReading | [https://web.archive.org/web/20240221113558/https://www.darkreading.com/threat-intelligence/iranian-apts-dress-up-as-hacktivists-for-disruption-influence-ops](https://web.archive.org/web/20240221113558/https://www.darkreading.com/threat-intelligence/iranian-apts-dress-up-as-hacktivists-for-disruption-influence-ops) | diff --git a/generated_pages/incidents/I00128.md b/generated_pages/incidents/I00128.md index ab6abc5..4163e10 100644 --- a/generated_pages/incidents/I00128.md +++ b/generated_pages/incidents/I00128.md @@ -15,17 +15,18 @@ | Reference | Pub Date | Authors | Org | Archive | | --------- | -------- | ------- | --- | ------- | +| [https://medium.com/dfrlab/trolltracker-outward-influence-operation-from-iran-cc4539684c8d](https://medium.com/dfrlab/trolltracker-outward-influence-operation-from-iran-cc4539684c8d) | 2019/01/31 | Kanishk Karan, Donara Barojan, Melissa Hall, Graham Brookie | DFRLab | [https://web.archive.org/web/20240618014243/https://medium.com/dfrlab/trolltracker-outward-influence-operation-from-iran-cc4539684c8d](https://web.archive.org/web/20240618014243/https://medium.com/dfrlab/trolltracker-outward-influence-operation-from-iran-cc4539684c8d) | | Technique | Description given for this incident | | --------- | ------------------------- | -| [T0097.208 Social Cause Persona](../../generated_pages/techniques/T0097.208.md) |  IT00000534 [Meta removed a network of assets for coordinated inauthentic behaviour. One page] in the network, @StopMEK, was promoting views against the People’s Mujahedin of Iran (MEK), the largest and most active political opposition group against the Islamic Republic of Iran Leadership.

The content on the page drew narratives showing parallels between the Islamic State of Iraq and Syria (ISIS) and the MEK.

Apart from images and memes, the @StopMEK page shared a link to an archived report on how the United States was monitoring the MEK’s movement in Iran in the mid-1990’s. The file was embedded as a QR code on one of the page’s images.


In this example a Facebook page presented itself as focusing on a political cause (T0097.208: Social Cause Persona, T0151.001: Social Media Platform, T0151.002: Online Community Group). Within the page it embedded a QR code (T0122: Direct Users to Alternative Platforms, T0153.004: QR Code), which took users to a document hosted on another website (T0152.004: Website). | -| [T0122 Direct Users to Alternative Platforms](../../generated_pages/techniques/T0122.md) |  IT00000537 [Meta removed a network of assets for coordinated inauthentic behaviour. One page] in the network, @StopMEK, was promoting views against the People’s Mujahedin of Iran (MEK), the largest and most active political opposition group against the Islamic Republic of Iran Leadership.

The content on the page drew narratives showing parallels between the Islamic State of Iraq and Syria (ISIS) and the MEK.

Apart from images and memes, the @StopMEK page shared a link to an archived report on how the United States was monitoring the MEK’s movement in Iran in the mid-1990’s. The file was embedded as a QR code on one of the page’s images.


In this example a Facebook page presented itself as focusing on a political cause (T0097.208: Social Cause Persona, T0151.001: Social Media Platform, T0151.002: Online Community Group). Within the page it embedded a QR code (T0122: Direct Users to Alternative Platforms, T0153.004: QR Code), which took users to a document hosted on another website (T0152.004: Website). | -| [T0151.001 Social Media Platform](../../generated_pages/techniques/T0151.001.md) |  IT00000535 [Meta removed a network of assets for coordinated inauthentic behaviour. One page] in the network, @StopMEK, was promoting views against the People’s Mujahedin of Iran (MEK), the largest and most active political opposition group against the Islamic Republic of Iran Leadership.

The content on the page drew narratives showing parallels between the Islamic State of Iraq and Syria (ISIS) and the MEK.

Apart from images and memes, the @StopMEK page shared a link to an archived report on how the United States was monitoring the MEK’s movement in Iran in the mid-1990’s. The file was embedded as a QR code on one of the page’s images.


In this example a Facebook page presented itself as focusing on a political cause (T0097.208: Social Cause Persona, T0151.001: Social Media Platform, T0151.002: Online Community Group). Within the page it embedded a QR code (T0122: Direct Users to Alternative Platforms, T0153.004: QR Code), which took users to a document hosted on another website (T0152.004: Website). | -| [T0151.002 Online Community Group](../../generated_pages/techniques/T0151.002.md) |  IT00000536 [Meta removed a network of assets for coordinated inauthentic behaviour. One page] in the network, @StopMEK, was promoting views against the People’s Mujahedin of Iran (MEK), the largest and most active political opposition group against the Islamic Republic of Iran Leadership.

The content on the page drew narratives showing parallels between the Islamic State of Iraq and Syria (ISIS) and the MEK.

Apart from images and memes, the @StopMEK page shared a link to an archived report on how the United States was monitoring the MEK’s movement in Iran in the mid-1990’s. The file was embedded as a QR code on one of the page’s images.


In this example a Facebook page presented itself as focusing on a political cause (T0097.208: Social Cause Persona, T0151.001: Social Media Platform, T0151.002: Online Community Group). Within the page it embedded a QR code (T0122: Direct Users to Alternative Platforms, T0153.004: QR Code), which took users to a document hosted on another website (T0152.004: Website). | -| [T0152.004 Website](../../generated_pages/techniques/T0152.004.md) |  IT00000539 [Meta removed a network of assets for coordinated inauthentic behaviour. One page] in the network, @StopMEK, was promoting views against the People’s Mujahedin of Iran (MEK), the largest and most active political opposition group against the Islamic Republic of Iran Leadership.

The content on the page drew narratives showing parallels between the Islamic State of Iraq and Syria (ISIS) and the MEK.

Apart from images and memes, the @StopMEK page shared a link to an archived report on how the United States was monitoring the MEK’s movement in Iran in the mid-1990’s. The file was embedded as a QR code on one of the page’s images.


In this example a Facebook page presented itself as focusing on a political cause (T0097.208: Social Cause Persona, T0151.001: Social Media Platform, T0151.002: Online Community Group). Within the page it embedded a QR code (T0122: Direct Users to Alternative Platforms, T0153.004: QR Code), which took users to a document hosted on another website (T0152.004: Website). | -| [T0153.004 QR Code](../../generated_pages/techniques/T0153.004.md) |  IT00000538 [Meta removed a network of assets for coordinated inauthentic behaviour. One page] in the network, @StopMEK, was promoting views against the People’s Mujahedin of Iran (MEK), the largest and most active political opposition group against the Islamic Republic of Iran Leadership.

The content on the page drew narratives showing parallels between the Islamic State of Iraq and Syria (ISIS) and the MEK.

Apart from images and memes, the @StopMEK page shared a link to an archived report on how the United States was monitoring the MEK’s movement in Iran in the mid-1990’s. The file was embedded as a QR code on one of the page’s images.


In this example a Facebook page presented itself as focusing on a political cause (T0097.208: Social Cause Persona, T0151.001: Social Media Platform, T0151.002: Online Community Group). Within the page it embedded a QR code (T0122: Direct Users to Alternative Platforms, T0153.004: QR Code), which took users to a document hosted on another website (T0152.004: Website). | +| [T0097.208 Social Cause Persona](../../generated_pages/techniques/T0097.208.md) |  IT00000534 [Meta removed a network of assets for coordinated inauthentic behaviour. One page] in the network, @StopMEK, was promoting views against the People’s Mujahedin of Iran (MEK), the largest and most active political opposition group against the Islamic Republic of Iran Leadership.

The content on the page drew narratives showing parallels between the Islamic State of Iraq and Syria (ISIS) and the MEK.

Apart from images and memes, the @StopMEK page shared a link to an archived report on how the United States was monitoring the MEK’s movement in Iran in the mid-1990’s. The file was embedded as a QR code on one of the page’s images.


In this example a Facebook page presented itself as focusing on a political cause (T0097.208: Social Cause Persona, T0151.001: Social Media Platform, T0151.002: Online Community Group). Within the page it embedded a QR code (T0122: Direct Users to Alternative Platforms, T0153.004: QR Code Asset), which took users to a document hosted on another website (T0152.004: Website Asset). | +| [T0122 Direct Users to Alternative Platforms](../../generated_pages/techniques/T0122.md) |  IT00000537 [Meta removed a network of assets for coordinated inauthentic behaviour. One page] in the network, @StopMEK, was promoting views against the People’s Mujahedin of Iran (MEK), the largest and most active political opposition group against the Islamic Republic of Iran Leadership.

The content on the page drew narratives showing parallels between the Islamic State of Iraq and Syria (ISIS) and the MEK.

Apart from images and memes, the @StopMEK page shared a link to an archived report on how the United States was monitoring the MEK’s movement in Iran in the mid-1990’s. The file was embedded as a QR code on one of the page’s images.


In this example a Facebook page presented itself as focusing on a political cause (T0097.208: Social Cause Persona, T0151.001: Social Media Platform, T0151.002: Online Community Group). Within the page it embedded a QR code (T0122: Direct Users to Alternative Platforms, T0153.004: QR Code Asset), which took users to a document hosted on another website (T0152.004: Website Asset). | +| [T0151.001 Social Media Platform](../../generated_pages/techniques/T0151.001.md) |  IT00000535 [Meta removed a network of assets for coordinated inauthentic behaviour. One page] in the network, @StopMEK, was promoting views against the People’s Mujahedin of Iran (MEK), the largest and most active political opposition group against the Islamic Republic of Iran Leadership.

The content on the page drew narratives showing parallels between the Islamic State of Iraq and Syria (ISIS) and the MEK.

Apart from images and memes, the @StopMEK page shared a link to an archived report on how the United States was monitoring the MEK’s movement in Iran in the mid-1990’s. The file was embedded as a QR code on one of the page’s images.


In this example a Facebook page presented itself as focusing on a political cause (T0097.208: Social Cause Persona, T0151.001: Social Media Platform, T0151.002: Online Community Group). Within the page it embedded a QR code (T0122: Direct Users to Alternative Platforms, T0153.004: QR Code Asset), which took users to a document hosted on another website (T0152.004: Website Asset). | +| [T0151.002 Online Community Group](../../generated_pages/techniques/T0151.002.md) |  IT00000536 [Meta removed a network of assets for coordinated inauthentic behaviour. One page] in the network, @StopMEK, was promoting views against the People’s Mujahedin of Iran (MEK), the largest and most active political opposition group against the Islamic Republic of Iran Leadership.

The content on the page drew narratives showing parallels between the Islamic State of Iraq and Syria (ISIS) and the MEK.

Apart from images and memes, the @StopMEK page shared a link to an archived report on how the United States was monitoring the MEK’s movement in Iran in the mid-1990’s. The file was embedded as a QR code on one of the page’s images.


In this example a Facebook page presented itself as focusing on a political cause (T0097.208: Social Cause Persona, T0151.001: Social Media Platform, T0151.002: Online Community Group). Within the page it embedded a QR code (T0122: Direct Users to Alternative Platforms, T0153.004: QR Code Asset), which took users to a document hosted on another website (T0152.004: Website Asset). | +| [T0152.004 Website Asset](../../generated_pages/techniques/T0152.004.md) |  IT00000539 [Meta removed a network of assets for coordinated inauthentic behaviour. One page] in the network, @StopMEK, was promoting views against the People’s Mujahedin of Iran (MEK), the largest and most active political opposition group against the Islamic Republic of Iran Leadership.

The content on the page drew narratives showing parallels between the Islamic State of Iraq and Syria (ISIS) and the MEK.

Apart from images and memes, the @StopMEK page shared a link to an archived report on how the United States was monitoring the MEK’s movement in Iran in the mid-1990’s. The file was embedded as a QR code on one of the page’s images.


In this example a Facebook page presented itself as focusing on a political cause (T0097.208: Social Cause Persona, T0151.001: Social Media Platform, T0151.002: Online Community Group). Within the page it embedded a QR code (T0122: Direct Users to Alternative Platforms, T0153.004: QR Code Asset), which took users to a document hosted on another website (T0152.004: Website Asset). | +| [T0153.004 QR Code Asset](../../generated_pages/techniques/T0153.004.md) |  IT00000538 [Meta removed a network of assets for coordinated inauthentic behaviour. One page] in the network, @StopMEK, was promoting views against the People’s Mujahedin of Iran (MEK), the largest and most active political opposition group against the Islamic Republic of Iran Leadership.

The content on the page drew narratives showing parallels between the Islamic State of Iraq and Syria (ISIS) and the MEK.

Apart from images and memes, the @StopMEK page shared a link to an archived report on how the United States was monitoring the MEK’s movement in Iran in the mid-1990’s. The file was embedded as a QR code on one of the page’s images.


In this example a Facebook page presented itself as focusing on a political cause (T0097.208: Social Cause Persona, T0151.001: Social Media Platform, T0151.002: Online Community Group). Within the page it embedded a QR code (T0122: Direct Users to Alternative Platforms, T0153.004: QR Code Asset), which took users to a document hosted on another website (T0152.004: Website Asset). | DO NOT EDIT ABOVE THIS LINE - PLEASE ADD NOTES BELOW \ No newline at end of file diff --git a/generated_pages/incidents/I00129.md b/generated_pages/incidents/I00129.md index 2e1d3d6..bf3399f 100644 --- a/generated_pages/incidents/I00129.md +++ b/generated_pages/incidents/I00129.md @@ -15,18 +15,18 @@ | Reference | Pub Date | Authors | Org | Archive | | --------- | -------- | ------- | --- | ------- | +| [https://www.theguardian.com/technology/2021/mar/16/florida-teen-sentenced-twitter-bitcoin-hack](https://www.theguardian.com/technology/2021/mar/16/florida-teen-sentenced-twitter-bitcoin-hack) | 2021/03/16 | Kari Paul | The Guardian | [https://web.archive.org/web/20240920230915/https://www.theguardian.com/technology/2021/mar/16/florida-teen-sentenced-twitter-bitcoin-hack](https://web.archive.org/web/20240920230915/https://www.theguardian.com/technology/2021/mar/16/florida-teen-sentenced-twitter-bitcoin-hack) | | Technique | Description given for this incident | | --------- | ------------------------- | -| [T0143.003 Impersonated Persona](../../generated_pages/techniques/T0143.003.md) |  IT00000544 An 18-year-old hacker who pulled off a huge breach in 2020, infiltrating several high profile Twitter accounts to solicit bitcoin transactions, has agreed to serve three years in prison for his actions.

Graham Ivan Clark, of Florida, was 17 years old at the time of the hack in July, during which he took over a number of major accounts including those of Joe Biden, Bill Gates and Kim Kardashian West.

Once he accessed them, Clark tweeted a link to a bitcoin address and wrote “all bitcoin sent to our address below will be sent back to you doubled!” According to court documents, Clark made more than $100,000 from the scheme, which his lawyers say he has since returned.

Clark was able to access the accounts after convincing an employee at Twitter he worked in the company’s information technology department, according to the Tampa Bay Times.


In this example a threat actor gained access to Twitter’s customer service portal through social engineering (T0146.004: Administrator Account, T0150.005: Compromised, T0151.008: Microblogging Platform), which they used to take over accounts of public figures (T0146.003: Verified Account, T0143.003: Impersonated Persona, T0150.005: Compromised, T0151.008: Microblogging Platform).

The threat actor used these compromised accounts to trick their followers into sending bitcoin to their wallet (T0148.009: Cryptocurrency Wallet). | -| [T0146.004 Administrator Account](../../generated_pages/techniques/T0146.004.md) |  IT00000543 An 18-year-old hacker who pulled off a huge breach in 2020, infiltrating several high profile Twitter accounts to solicit bitcoin transactions, has agreed to serve three years in prison for his actions.

Graham Ivan Clark, of Florida, was 17 years old at the time of the hack in July, during which he took over a number of major accounts including those of Joe Biden, Bill Gates and Kim Kardashian West.

Once he accessed them, Clark tweeted a link to a bitcoin address and wrote “all bitcoin sent to our address below will be sent back to you doubled!” According to court documents, Clark made more than $100,000 from the scheme, which his lawyers say he has since returned.

Clark was able to access the accounts after convincing an employee at Twitter he worked in the company’s information technology department, according to the Tampa Bay Times.


In this example a threat actor gained access to Twitter’s customer service portal through social engineering (T0146.004: Administrator Account, T0150.005: Compromised, T0151.008: Microblogging Platform), which they used to take over accounts of public figures (T0146.003: Verified Account, T0143.003: Impersonated Persona, T0150.005: Compromised, T0151.008: Microblogging Platform).

The threat actor used these compromised accounts to trick their followers into sending bitcoin to their wallet (T0148.009: Cryptocurrency Wallet). | -| [T0146.005 Lookalike Account ID](../../generated_pages/techniques/T0146.005.md) |  IT00000540 An 18-year-old hacker who pulled off a huge breach in 2020, infiltrating several high profile Twitter accounts to solicit bitcoin transactions, has agreed to serve three years in prison for his actions.

Graham Ivan Clark, of Florida, was 17 years old at the time of the hack in July, during which he took over a number of major accounts including those of Joe Biden, Bill Gates and Kim Kardashian West.

Once he accessed them, Clark tweeted a link to a bitcoin address and wrote “all bitcoin sent to our address below will be sent back to you doubled!” According to court documents, Clark made more than $100,000 from the scheme, which his lawyers say he has since returned.

Clark was able to access the accounts after convincing an employee at Twitter he worked in the company’s information technology department, according to the Tampa Bay Times.


In this example a threat actor gained access to Twitter’s customer service portal through social engineering (T0146.004: Administrator Account, T0150.005: Compromised, T0151.008: Microblogging Platform), which they used to take over accounts of public figures (T0146.003: Verified Account, T0143.003: Impersonated Persona, T0150.005: Compromised, T0151.008: Microblogging Platform).

The threat actor used these compromised accounts to trick their followers into sending bitcoin to their wallet (T0148.009: Cryptocurrency Wallet). | -| [T0148.009 Cryptocurrency Wallet](../../generated_pages/techniques/T0148.009.md) |  IT00000546 An 18-year-old hacker who pulled off a huge breach in 2020, infiltrating several high profile Twitter accounts to solicit bitcoin transactions, has agreed to serve three years in prison for his actions.

Graham Ivan Clark, of Florida, was 17 years old at the time of the hack in July, during which he took over a number of major accounts including those of Joe Biden, Bill Gates and Kim Kardashian West.

Once he accessed them, Clark tweeted a link to a bitcoin address and wrote “all bitcoin sent to our address below will be sent back to you doubled!” According to court documents, Clark made more than $100,000 from the scheme, which his lawyers say he has since returned.

Clark was able to access the accounts after convincing an employee at Twitter he worked in the company’s information technology department, according to the Tampa Bay Times.


In this example a threat actor gained access to Twitter’s customer service portal through social engineering (T0146.004: Administrator Account, T0150.005: Compromised, T0151.008: Microblogging Platform), which they used to take over accounts of public figures (T0146.003: Verified Account, T0143.003: Impersonated Persona, T0150.005: Compromised, T0151.008: Microblogging Platform).

The threat actor used these compromised accounts to trick their followers into sending bitcoin to their wallet (T0148.009: Cryptocurrency Wallet). | -| [T0150.005 Compromised](../../generated_pages/techniques/T0150.005.md) |  IT00000541 An 18-year-old hacker who pulled off a huge breach in 2020, infiltrating several high profile Twitter accounts to solicit bitcoin transactions, has agreed to serve three years in prison for his actions.

Graham Ivan Clark, of Florida, was 17 years old at the time of the hack in July, during which he took over a number of major accounts including those of Joe Biden, Bill Gates and Kim Kardashian West.

Once he accessed them, Clark tweeted a link to a bitcoin address and wrote “all bitcoin sent to our address below will be sent back to you doubled!” According to court documents, Clark made more than $100,000 from the scheme, which his lawyers say he has since returned.

Clark was able to access the accounts after convincing an employee at Twitter he worked in the company’s information technology department, according to the Tampa Bay Times.


In this example a threat actor gained access to Twitter’s customer service portal through social engineering (T0146.004: Administrator Account, T0150.005: Compromised, T0151.008: Microblogging Platform), which they used to take over accounts of public figures (T0146.003: Verified Account, T0143.003: Impersonated Persona, T0150.005: Compromised, T0151.008: Microblogging Platform).

The threat actor used these compromised accounts to trick their followers into sending bitcoin to their wallet (T0148.009: Cryptocurrency Wallet). | -| [T0150.005 Compromised](../../generated_pages/techniques/T0150.005.md) |  IT00000545 An 18-year-old hacker who pulled off a huge breach in 2020, infiltrating several high profile Twitter accounts to solicit bitcoin transactions, has agreed to serve three years in prison for his actions.

Graham Ivan Clark, of Florida, was 17 years old at the time of the hack in July, during which he took over a number of major accounts including those of Joe Biden, Bill Gates and Kim Kardashian West.

Once he accessed them, Clark tweeted a link to a bitcoin address and wrote “all bitcoin sent to our address below will be sent back to you doubled!” According to court documents, Clark made more than $100,000 from the scheme, which his lawyers say he has since returned.

Clark was able to access the accounts after convincing an employee at Twitter he worked in the company’s information technology department, according to the Tampa Bay Times.


In this example a threat actor gained access to Twitter’s customer service portal through social engineering (T0146.004: Administrator Account, T0150.005: Compromised, T0151.008: Microblogging Platform), which they used to take over accounts of public figures (T0146.003: Verified Account, T0143.003: Impersonated Persona, T0150.005: Compromised, T0151.008: Microblogging Platform).

The threat actor used these compromised accounts to trick their followers into sending bitcoin to their wallet (T0148.009: Cryptocurrency Wallet). | -| [T0151.008 Microblogging Platform](../../generated_pages/techniques/T0151.008.md) |  IT00000542 An 18-year-old hacker who pulled off a huge breach in 2020, infiltrating several high profile Twitter accounts to solicit bitcoin transactions, has agreed to serve three years in prison for his actions.

Graham Ivan Clark, of Florida, was 17 years old at the time of the hack in July, during which he took over a number of major accounts including those of Joe Biden, Bill Gates and Kim Kardashian West.

Once he accessed them, Clark tweeted a link to a bitcoin address and wrote “all bitcoin sent to our address below will be sent back to you doubled!” According to court documents, Clark made more than $100,000 from the scheme, which his lawyers say he has since returned.

Clark was able to access the accounts after convincing an employee at Twitter he worked in the company’s information technology department, according to the Tampa Bay Times.


In this example a threat actor gained access to Twitter’s customer service portal through social engineering (T0146.004: Administrator Account, T0150.005: Compromised, T0151.008: Microblogging Platform), which they used to take over accounts of public figures (T0146.003: Verified Account, T0143.003: Impersonated Persona, T0150.005: Compromised, T0151.008: Microblogging Platform).

The threat actor used these compromised accounts to trick their followers into sending bitcoin to their wallet (T0148.009: Cryptocurrency Wallet). | +| [T0143.003 Impersonated Persona](../../generated_pages/techniques/T0143.003.md) |  IT00000544 An 18-year-old hacker who pulled off a huge breach in 2020, infiltrating several high profile Twitter accounts to solicit bitcoin transactions, has agreed to serve three years in prison for his actions.

Graham Ivan Clark, of Florida, was 17 years old at the time of the hack in July, during which he took over a number of major accounts including those of Joe Biden, Bill Gates and Kim Kardashian West.

Once he accessed them, Clark tweeted a link to a bitcoin address and wrote “all bitcoin sent to our address below will be sent back to you doubled!” According to court documents, Clark made more than $100,000 from the scheme, which his lawyers say he has since returned.

Clark was able to access the accounts after convincing an employee at Twitter he worked in the company’s information technology department, according to the Tampa Bay Times.


In this example a threat actor gained access to Twitter’s customer service portal through social engineering (T0146.004: Administrator Account Asset, T0150.005: Compromised Asset, T0151.008: Microblogging Platform), which they used to take over accounts of public figures (T0146.003: Verified Account Asset, T0143.003: Impersonated Persona, T0150.005: Compromised Asset, T0151.008: Microblogging Platform).

The threat actor used these compromised accounts to trick their followers into sending bitcoin to their wallet (T0148.009: Cryptocurrency Wallet). | +| [T0146.004 Administrator Account Asset](../../generated_pages/techniques/T0146.004.md) |  IT00000543 An 18-year-old hacker who pulled off a huge breach in 2020, infiltrating several high profile Twitter accounts to solicit bitcoin transactions, has agreed to serve three years in prison for his actions.

Graham Ivan Clark, of Florida, was 17 years old at the time of the hack in July, during which he took over a number of major accounts including those of Joe Biden, Bill Gates and Kim Kardashian West.

Once he accessed them, Clark tweeted a link to a bitcoin address and wrote “all bitcoin sent to our address below will be sent back to you doubled!” According to court documents, Clark made more than $100,000 from the scheme, which his lawyers say he has since returned.

Clark was able to access the accounts after convincing an employee at Twitter he worked in the company’s information technology department, according to the Tampa Bay Times.


In this example a threat actor gained access to Twitter’s customer service portal through social engineering (T0146.004: Administrator Account Asset, T0150.005: Compromised Asset, T0151.008: Microblogging Platform), which they used to take over accounts of public figures (T0146.003: Verified Account Asset, T0143.003: Impersonated Persona, T0150.005: Compromised Asset, T0151.008: Microblogging Platform).

The threat actor used these compromised accounts to trick their followers into sending bitcoin to their wallet (T0148.009: Cryptocurrency Wallet). | +| [T0148.009 Cryptocurrency Wallet](../../generated_pages/techniques/T0148.009.md) |  IT00000546 An 18-year-old hacker who pulled off a huge breach in 2020, infiltrating several high profile Twitter accounts to solicit bitcoin transactions, has agreed to serve three years in prison for his actions.

Graham Ivan Clark, of Florida, was 17 years old at the time of the hack in July, during which he took over a number of major accounts including those of Joe Biden, Bill Gates and Kim Kardashian West.

Once he accessed them, Clark tweeted a link to a bitcoin address and wrote “all bitcoin sent to our address below will be sent back to you doubled!” According to court documents, Clark made more than $100,000 from the scheme, which his lawyers say he has since returned.

Clark was able to access the accounts after convincing an employee at Twitter he worked in the company’s information technology department, according to the Tampa Bay Times.


In this example a threat actor gained access to Twitter’s customer service portal through social engineering (T0146.004: Administrator Account Asset, T0150.005: Compromised Asset, T0151.008: Microblogging Platform), which they used to take over accounts of public figures (T0146.003: Verified Account Asset, T0143.003: Impersonated Persona, T0150.005: Compromised Asset, T0151.008: Microblogging Platform).

The threat actor used these compromised accounts to trick their followers into sending bitcoin to their wallet (T0148.009: Cryptocurrency Wallet). | +| [T0150.005 Compromised Asset](../../generated_pages/techniques/T0150.005.md) |  IT00000541 An 18-year-old hacker who pulled off a huge breach in 2020, infiltrating several high profile Twitter accounts to solicit bitcoin transactions, has agreed to serve three years in prison for his actions.

Graham Ivan Clark, of Florida, was 17 years old at the time of the hack in July, during which he took over a number of major accounts including those of Joe Biden, Bill Gates and Kim Kardashian West.

Once he accessed them, Clark tweeted a link to a bitcoin address and wrote “all bitcoin sent to our address below will be sent back to you doubled!” According to court documents, Clark made more than $100,000 from the scheme, which his lawyers say he has since returned.

Clark was able to access the accounts after convincing an employee at Twitter he worked in the company’s information technology department, according to the Tampa Bay Times.


In this example a threat actor gained access to Twitter’s customer service portal through social engineering (T0146.004: Administrator Account Asset, T0150.005: Compromised Asset, T0151.008: Microblogging Platform), which they used to take over accounts of public figures (T0146.003: Verified Account Asset, T0143.003: Impersonated Persona, T0150.005: Compromised Asset, T0151.008: Microblogging Platform).

The threat actor used these compromised accounts to trick their followers into sending bitcoin to their wallet (T0148.009: Cryptocurrency Wallet). | +| [T0150.005 Compromised Asset](../../generated_pages/techniques/T0150.005.md) |  IT00000545 An 18-year-old hacker who pulled off a huge breach in 2020, infiltrating several high profile Twitter accounts to solicit bitcoin transactions, has agreed to serve three years in prison for his actions.

Graham Ivan Clark, of Florida, was 17 years old at the time of the hack in July, during which he took over a number of major accounts including those of Joe Biden, Bill Gates and Kim Kardashian West.

Once he accessed them, Clark tweeted a link to a bitcoin address and wrote “all bitcoin sent to our address below will be sent back to you doubled!” According to court documents, Clark made more than $100,000 from the scheme, which his lawyers say he has since returned.

Clark was able to access the accounts after convincing an employee at Twitter he worked in the company’s information technology department, according to the Tampa Bay Times.


In this example a threat actor gained access to Twitter’s customer service portal through social engineering (T0146.004: Administrator Account Asset, T0150.005: Compromised Asset, T0151.008: Microblogging Platform), which they used to take over accounts of public figures (T0146.003: Verified Account Asset, T0143.003: Impersonated Persona, T0150.005: Compromised Asset, T0151.008: Microblogging Platform).

The threat actor used these compromised accounts to trick their followers into sending bitcoin to their wallet (T0148.009: Cryptocurrency Wallet). | +| [T0151.008 Microblogging Platform](../../generated_pages/techniques/T0151.008.md) |  IT00000542 An 18-year-old hacker who pulled off a huge breach in 2020, infiltrating several high profile Twitter accounts to solicit bitcoin transactions, has agreed to serve three years in prison for his actions.

Graham Ivan Clark, of Florida, was 17 years old at the time of the hack in July, during which he took over a number of major accounts including those of Joe Biden, Bill Gates and Kim Kardashian West.

Once he accessed them, Clark tweeted a link to a bitcoin address and wrote “all bitcoin sent to our address below will be sent back to you doubled!” According to court documents, Clark made more than $100,000 from the scheme, which his lawyers say he has since returned.

Clark was able to access the accounts after convincing an employee at Twitter he worked in the company’s information technology department, according to the Tampa Bay Times.


In this example a threat actor gained access to Twitter’s customer service portal through social engineering (T0146.004: Administrator Account Asset, T0150.005: Compromised Asset, T0151.008: Microblogging Platform), which they used to take over accounts of public figures (T0146.003: Verified Account Asset, T0143.003: Impersonated Persona, T0150.005: Compromised Asset, T0151.008: Microblogging Platform).

The threat actor used these compromised accounts to trick their followers into sending bitcoin to their wallet (T0148.009: Cryptocurrency Wallet). | DO NOT EDIT ABOVE THIS LINE - PLEASE ADD NOTES BELOW \ No newline at end of file diff --git a/generated_pages/tactics/TA06.md b/generated_pages/tactics/TA06.md index 06fa0ed..a9f7417 100644 --- a/generated_pages/tactics/TA06.md +++ b/generated_pages/tactics/TA06.md @@ -49,22 +49,22 @@ | [T0089 Obtain Private Documents](../../generated_pages/techniques/T0089.md) | | [T0089.001 Obtain Authentic Documents](../../generated_pages/techniques/T0089.001.md) | | [T0089.003 Alter Authentic Documents](../../generated_pages/techniques/T0089.003.md) | -| [T0146 Account](../../generated_pages/techniques/T0146.md) | -| [T0146.001 Free Account](../../generated_pages/techniques/T0146.001.md) | -| [T0146.002 Paid Account](../../generated_pages/techniques/T0146.002.md) | -| [T0146.003 Verified Account](../../generated_pages/techniques/T0146.003.md) | -| [T0146.004 Administrator Account](../../generated_pages/techniques/T0146.004.md) | +| [T0146 Account Asset](../../generated_pages/techniques/T0146.md) | +| [T0146.001 Free Account Asset](../../generated_pages/techniques/T0146.001.md) | +| [T0146.002 Paid Account Asset](../../generated_pages/techniques/T0146.002.md) | +| [T0146.003 Verified Account Asset](../../generated_pages/techniques/T0146.003.md) | +| [T0146.004 Administrator Account Asset](../../generated_pages/techniques/T0146.004.md) | | [T0146.005 Lookalike Account ID](../../generated_pages/techniques/T0146.005.md) | | [T0146.006 Open Access Platform](../../generated_pages/techniques/T0146.006.md) | -| [T0146.007 Automated Account](../../generated_pages/techniques/T0146.007.md) | -| [T0147 Software](../../generated_pages/techniques/T0147.md) | -| [T0147.001 Game](../../generated_pages/techniques/T0147.001.md) | -| [T0147.002 Game Mod](../../generated_pages/techniques/T0147.002.md) | -| [T0147.003 Malware](../../generated_pages/techniques/T0147.003.md) | -| [T0147.004 Mobile App](../../generated_pages/techniques/T0147.004.md) | +| [T0146.007 Automated Account Asset](../../generated_pages/techniques/T0146.007.md) | +| [T0147 Software Asset](../../generated_pages/techniques/T0147.md) | +| [T0147.001 Game Asset](../../generated_pages/techniques/T0147.001.md) | +| [T0147.002 Game Mod Asset](../../generated_pages/techniques/T0147.002.md) | +| [T0147.003 Malware Asset](../../generated_pages/techniques/T0147.003.md) | +| [T0147.004 Mobile App Asset](../../generated_pages/techniques/T0147.004.md) | | [T0148 Financial Instrument](../../generated_pages/techniques/T0148.md) | | [T0148.001 Online Banking Platform](../../generated_pages/techniques/T0148.001.md) | -| [T0148.002 Bank Account](../../generated_pages/techniques/T0148.002.md) | +| [T0148.002 Bank Account Asset](../../generated_pages/techniques/T0148.002.md) | | [T0148.003 Payment Processing Platform](../../generated_pages/techniques/T0148.003.md) | | [T0148.004 Payment Processing Capability](../../generated_pages/techniques/T0148.004.md) | | [T0148.005 Subscription Processing Capability](../../generated_pages/techniques/T0148.005.md) | @@ -73,24 +73,24 @@ | [T0148.008 Cryptocurrency Exchange Platform](../../generated_pages/techniques/T0148.008.md) | | [T0148.009 Cryptocurrency Wallet](../../generated_pages/techniques/T0148.009.md) | | [T0149 Online Infrastructure](../../generated_pages/techniques/T0149.md) | -| [T0149.001 Domain](../../generated_pages/techniques/T0149.001.md) | -| [T0149.002 Email Domain](../../generated_pages/techniques/T0149.002.md) | +| [T0149.001 Domain Asset](../../generated_pages/techniques/T0149.001.md) | +| [T0149.002 Email Domain Asset](../../generated_pages/techniques/T0149.002.md) | | [T0149.003 Lookalike Domain](../../generated_pages/techniques/T0149.003.md) | -| [T0149.004 Redirecting Domain](../../generated_pages/techniques/T0149.004.md) | -| [T0149.005 Server](../../generated_pages/techniques/T0149.005.md) | -| [T0149.006 IP Address](../../generated_pages/techniques/T0149.006.md) | -| [T0149.007 VPN](../../generated_pages/techniques/T0149.007.md) | -| [T0149.008 Proxy IP Address](../../generated_pages/techniques/T0149.008.md) | +| [T0149.004 Redirecting Domain Asset](../../generated_pages/techniques/T0149.004.md) | +| [T0149.005 Server Asset](../../generated_pages/techniques/T0149.005.md) | +| [T0149.006 IP Address Asset](../../generated_pages/techniques/T0149.006.md) | +| [T0149.007 VPN Asset](../../generated_pages/techniques/T0149.007.md) | +| [T0149.008 Proxy IP Address Asset](../../generated_pages/techniques/T0149.008.md) | | [T0149.009 Internet Connected Physical Asset](../../generated_pages/techniques/T0149.009.md) | | [T0150 Asset Origin](../../generated_pages/techniques/T0150.md) | -| [T0150.001 Newly Created](../../generated_pages/techniques/T0150.001.md) | -| [T0150.002 Dormant](../../generated_pages/techniques/T0150.002.md) | -| [T0150.003 Pre-Existing](../../generated_pages/techniques/T0150.003.md) | -| [T0150.004 Repurposed](../../generated_pages/techniques/T0150.004.md) | -| [T0150.005 Compromised](../../generated_pages/techniques/T0150.005.md) | -| [T0150.006 Purchased](../../generated_pages/techniques/T0150.006.md) | -| [T0150.007 Rented](../../generated_pages/techniques/T0150.007.md) | -| [T0150.008 Bulk Created](../../generated_pages/techniques/T0150.008.md) | +| [T0150.001 Newly Created Asset](../../generated_pages/techniques/T0150.001.md) | +| [T0150.002 Dormant Asset](../../generated_pages/techniques/T0150.002.md) | +| [T0150.003 Pre-Existing Asset](../../generated_pages/techniques/T0150.003.md) | +| [T0150.004 Repurposed Asset](../../generated_pages/techniques/T0150.004.md) | +| [T0150.005 Compromised Asset](../../generated_pages/techniques/T0150.005.md) | +| [T0150.006 Purchased Asset](../../generated_pages/techniques/T0150.006.md) | +| [T0150.007 Rented Asset](../../generated_pages/techniques/T0150.007.md) | +| [T0150.008 Bulk Created Asset](../../generated_pages/techniques/T0150.008.md) | diff --git a/generated_pages/tactics/TA07.md b/generated_pages/tactics/TA07.md index a1d7eb7..88b4a19 100644 --- a/generated_pages/tactics/TA07.md +++ b/generated_pages/tactics/TA07.md @@ -42,9 +42,9 @@ | [T0151.017 Dating Platform](../../generated_pages/techniques/T0151.017.md) | | [T0152 Digital Content Hosting Asset](../../generated_pages/techniques/T0152.md) | | [T0152.001 Blogging Platform](../../generated_pages/techniques/T0152.001.md) | -| [T0152.002 Blog](../../generated_pages/techniques/T0152.002.md) | +| [T0152.002 Blog Asset](../../generated_pages/techniques/T0152.002.md) | | [T0152.003 Website Hosting Platform](../../generated_pages/techniques/T0152.003.md) | -| [T0152.004 Website](../../generated_pages/techniques/T0152.004.md) | +| [T0152.004 Website Asset](../../generated_pages/techniques/T0152.004.md) | | [T0152.005 Paste Platform](../../generated_pages/techniques/T0152.005.md) | | [T0152.006 Video Platform](../../generated_pages/techniques/T0152.006.md) | | [T0152.007 Audio Platform](../../generated_pages/techniques/T0152.007.md) | @@ -56,8 +56,8 @@ | [T0153 Digital Content Delivery Asset](../../generated_pages/techniques/T0153.md) | | [T0153.001 Email Platform](../../generated_pages/techniques/T0153.001.md) | | [T0153.002 Link Shortening Platform](../../generated_pages/techniques/T0153.002.md) | -| [T0153.003 Shortened Link](../../generated_pages/techniques/T0153.003.md) | -| [T0153.004 QR Code](../../generated_pages/techniques/T0153.004.md) | +| [T0153.003 Shortened Link Asset](../../generated_pages/techniques/T0153.003.md) | +| [T0153.004 QR Code Asset](../../generated_pages/techniques/T0153.004.md) | | [T0153.005 Online Advertising Platform](../../generated_pages/techniques/T0153.005.md) | | [T0153.006 Content Recommendation Algorithm](../../generated_pages/techniques/T0153.006.md) | | [T0153.007 Direct Messaging](../../generated_pages/techniques/T0153.007.md) | @@ -65,12 +65,12 @@ | [T0154.001 AI LLM Platform](../../generated_pages/techniques/T0154.001.md) | | [T0154.002 AI Media Platform](../../generated_pages/techniques/T0154.002.md) | | [T0155 Gated Asset](../../generated_pages/techniques/T0155.md) | -| [T0155.001 Password Gated](../../generated_pages/techniques/T0155.001.md) | -| [T0155.002 Invite Gated](../../generated_pages/techniques/T0155.002.md) | -| [T0155.003 Approval Gated](../../generated_pages/techniques/T0155.003.md) | -| [T0155.004 Geoblocked](../../generated_pages/techniques/T0155.004.md) | -| [T0155.005 Paid Access](../../generated_pages/techniques/T0155.005.md) | -| [T0155.006 Subscription Access](../../generated_pages/techniques/T0155.006.md) | +| [T0155.001 Password Gated Asset](../../generated_pages/techniques/T0155.001.md) | +| [T0155.002 Invite Gated Asset](../../generated_pages/techniques/T0155.002.md) | +| [T0155.003 Approval Gated Asset](../../generated_pages/techniques/T0155.003.md) | +| [T0155.004 Geoblocked Asset](../../generated_pages/techniques/T0155.004.md) | +| [T0155.005 Paid Access Asset](../../generated_pages/techniques/T0155.005.md) | +| [T0155.006 Subscription Access Asset](../../generated_pages/techniques/T0155.006.md) | | [T0155.007 Encrypted Communication Channel](../../generated_pages/techniques/T0155.007.md) | diff --git a/generated_pages/techniques/T0002.md b/generated_pages/techniques/T0002.md index ba0220c..4a323c9 100644 --- a/generated_pages/techniques/T0002.md +++ b/generated_pages/techniques/T0002.md @@ -7,8 +7,6 @@ | Incident | Descriptions given for this incident | | -------- | -------------------- | -| [I00033 China 50cent Army](../../generated_pages/incidents/I00033.md) | facilitate state propaganda and defuse crises | -| [I00034 DibaFacebookExpedition](../../generated_pages/incidents/I00034.md) | Netizens from one of the largest discussion forums in China, known as Diba, coordinated to overcome China’s Great Firewall | diff --git a/generated_pages/techniques/T0010.md b/generated_pages/techniques/T0010.md index 9dd47de..6aef7db 100644 --- a/generated_pages/techniques/T0010.md +++ b/generated_pages/techniques/T0010.md @@ -7,17 +7,6 @@ | Incident | Descriptions given for this incident | | -------- | -------------------- | -| [I00005 Brexit vote](../../generated_pages/incidents/I00005.md) | cultivate, manipulate, exploit useful idiots | -| [I00007 Incirlik terrorists](../../generated_pages/incidents/I00007.md) | cultivate, manipulate, exploit useful idiots (in the case Paul Manafort) | -| [I00010 ParklandTeens](../../generated_pages/incidents/I00010.md) | cultivate, manipulate, exploit useful idiots (Alex Jones... drives conspiracy theories; false flags, crisis actors) | -| [I00017 US presidential elections](../../generated_pages/incidents/I00017.md) | cultivate, manipulate, exploit useful idiots | -| [I00029 MH17 investigation](../../generated_pages/incidents/I00029.md) | cultivate, manipulate, exploit useful idiots | -| [I00032 Kavanaugh](../../generated_pages/incidents/I00032.md) | cultivate, manipulate, exploit useful idiots (Alex Jones... drives conspiracy theories) | -| [I00044 JadeHelm exercise](../../generated_pages/incidents/I00044.md) | cultivate, manipulate, exploit useful idiots (Alex Jones... drives conspiracy theories) | -| [I00049 White Helmets: Chemical Weapons](../../generated_pages/incidents/I00049.md) | cultivate, manipulate, exploit useful idiots (Roger Waters; Venessa Beeley...) | -| [I00050 #HandsOffVenezuela](../../generated_pages/incidents/I00050.md) | cultivate, manipulate, exploit useful idiots (Roger Waters) | -| [I00051 Integrity Initiative](../../generated_pages/incidents/I00051.md) | cultivate, manipulate, exploit useful idiots | -| [I00063 Olympic Doping Scandal](../../generated_pages/incidents/I00063.md) | cultivate, manipulate, exploit useful idiots | diff --git a/generated_pages/techniques/T0015.md b/generated_pages/techniques/T0015.md index 3a9322e..e1ff536 100644 --- a/generated_pages/techniques/T0015.md +++ b/generated_pages/techniques/T0015.md @@ -7,7 +7,6 @@ | Incident | Descriptions given for this incident | | -------- | -------------------- | -| [I00006 Columbian Chemicals](../../generated_pages/incidents/I00006.md) | Create and use hashtag | | [I00086 #WeAreNotSafe – Exposing How a Post-October 7th Disinformation Network Operates on Israeli Social Media](../../generated_pages/incidents/I00086.md) | In this report accounts were identified as part of “a sophisticated and extensive coordinated network orchestrating a disinformation campaign targeting Israeli digital spaces since October 7th, 2023”, which posted hashtags alongside campaign content (T0015: Create Hashtags and Search Artefacts):

“The accounts post generic images to fill their account feed to make the account seem real. They then employ a hidden hashtag in their posts, consisting of a seemingly random string of numbers and letters.

“The hypothesis regarding this tactic is that the group orchestrating these accounts utilizes these hashtags as a means of indexing them. This system likely serves a dual purpose: firstly, to keep track of the network’s expansive network of accounts and unique posts, and secondly, to streamline the process of boosting engagement among these accounts. By searching for these specific, unique hashtags, the group can quickly locate posts from their network and engage with them using other fake accounts, thereby artificially inflating the visibility and perceived authenticity of the fake account.”
| diff --git a/generated_pages/techniques/T0016.md b/generated_pages/techniques/T0016.md index 0d62716..39a54fa 100644 --- a/generated_pages/techniques/T0016.md +++ b/generated_pages/techniques/T0016.md @@ -7,7 +7,6 @@ | Incident | Descriptions given for this incident | | -------- | -------------------- | -| [I00017 US presidential elections](../../generated_pages/incidents/I00017.md) | Click-bait (economic actors) fake news sites (ie: Denver Guardian; Macedonian teens) | | [I00079 Three thousand fake tanks](../../generated_pages/incidents/I00079.md) | “On January 4 [2017], however, the Donbas News International (DNI) agency, based in Donetsk, Ukraine, and (since September 2016) an official state media outlet of the unrecognized separatist Donetsk People’s Republic, ran an article under the sensational headline, “US sends 3,600 tanks against Russia — massive NATO deployment under way.” DNI is run by Finnish exile Janus Putkonen, described by the Finnish national broadcaster, YLE, as a “Finnish info warrior”, and the first foreigner to be granted a Donetsk passport.

“The equally sensational opening paragraph ran, “The NATO war preparation against Russia, ‘Operation Atlantic Resolve’, is in full swing. 2,000 US tanks will be sent in coming days from Germany to Eastern Europe, and 1,600 US tanks is deployed to storage facilities in the Netherlands. At the same time, NATO countries are sending thousands of soldiers in to Russian borders.”

“The report is based around an obvious factual error, conflating the total number of vehicles with the actual number of tanks, and therefore multiplying the actual tank force 20 times over. For context, military website globalfirepower.com puts the total US tank force at 8,848. If the DNI story had been true, it would have meant sending 40% of all the US’ main battle tanks to Europe in one go.

“Could this have been an innocent mistake? The simple answer is “no”. The journalist who penned the story had a sufficient command of the details to be able to write, later in the same article, “In January, 26 tanks, 100 other vehicles and 120 containers will be transported by train to Lithuania. Germany will send the 122nd Infantry Battalion.” Yet the same author apparently believed, in the headline and first paragraph, that every single vehicle in Atlantic Resolve is a tank. To call this an innocent mistake is simply not plausible.

“The DNI story can only realistically be considered a deliberate fake designed to caricaturize and demonize NATO, the United States and Germany (tactfully referred to in the report as having “rolled over Eastern Europe in its war of extermination 75 years ago”) by grossly overstating the number of MBTs involved.”


This behaviour matches T0016: Create Clickbait because the person who wrote the story is shown to be aware of the fact that there were non-tank vehicles later in their story, but still chose to give the article a sensationalist headline claiming that all vehicles being sent were tanks. | diff --git a/generated_pages/techniques/T0017.md b/generated_pages/techniques/T0017.md index aeb0ec9..dc9c87b 100644 --- a/generated_pages/techniques/T0017.md +++ b/generated_pages/techniques/T0017.md @@ -7,8 +7,7 @@ | Incident | Descriptions given for this incident | | -------- | -------------------- | -| [I00002 #VaccinateUS](../../generated_pages/incidents/I00002.md) | Promote "funding" campaign | -| [I00110 How COVID-19 conspiracists and extremists use crowdfunding platforms to fund their activities](../../generated_pages/incidents/I00110.md) | The EU Disinfo Lab produced a report into disinformation published on crowdfunding platforms:



More worrisome is the direct monetisation of disinformation happening on crowdfunding platforms: on Kickstarter, we found a user openly raising money for a documentary project suggesting that COVID-19 is a conspiracy.

A Kickstarter user attempted to use the platform to fund production of a documentary (T0017: Conduct Fundraising, T0087: Develop Video-Based Content, T0146: Account, T0148.006: Crowdfunding Platform).

On Patreon, we found several instances of direct monetisation of COVID-19 disinformation, including posts promoting a device allegedly protecting against COVID-19 and 5G, as well as posts related to the “Plandemic” conspiracy video, which gained attention on YouTube before being removed by the platform.

We also found an account called “Stranger than fiction” entirely dedicated to disinformation, which openly states that their content was “Banned by screwtube and fakebook, our videos have been viewed over a billion times.”


The “Stranger than fiction” user presented itself as an alternative news source which had been banned from other platforms (T0146: Account, T0097.202: News Outlet Persona, T0121.001: Bypass Content Bocking, T0152.012: Subscription Service Platform).

On the US-based crowdfunding platform IndieGogo, EU DisinfoLab found a successful crowdfunding campaign of €133.903 for a book called Revolution Q. This book, now also available on Amazon, claims to be “Written for both newcomers and long-time QAnon fans alike, this book is a treasure-trove of information designed to help everyone weather The Storm.”

An IndieGogo account was used to gather funds to produce a book on QAnon (T0017: Conduct Fundraising, T0085.005: Develop Book, T0146: Account, T0148.006: Crowdfunding Platform), with the book later sold on Amazon marketplace (T0148.007: eCommerce Platform). | +| [I00110 How COVID-19 conspiracists and extremists use crowdfunding platforms to fund their activities](../../generated_pages/incidents/I00110.md) | The EU Disinfo Lab produced a report into disinformation published on crowdfunding platforms:

More worrisome is the direct monetisation of disinformation happening on crowdfunding platforms: on Kickstarter, we found a user openly raising money for a documentary project suggesting that COVID-19 is a conspiracy.

A Kickstarter user attempted to use the platform to fund production of a documentary (T0017: Conduct Fundraising, T0087: Develop Video-Based Content, T0146: Account Asset, T0148.006: Crowdfunding Platform).

On Patreon, we found several instances of direct monetisation of COVID-19 disinformation, including posts promoting a device allegedly protecting against COVID-19 and 5G, as well as posts related to the “Plandemic” conspiracy video, which gained attention on YouTube before being removed by the platform.

We also found an account called “Stranger than fiction” entirely dedicated to disinformation, which openly states that their content was “Banned by screwtube and fakebook, our videos have been viewed over a billion times.”


The “Stranger than fiction” user presented itself as an alternative news source which had been banned from other platforms (T0146: Account Asset, T0097.202: News Outlet Persona, T0121.001: Bypass Content Bocking, T0152.012: Subscription Service Platform).

On the US-based crowdfunding platform IndieGogo, EU DisinfoLab found a successful crowdfunding campaign of €133.903 for a book called Revolution Q. This book, now also available on Amazon, claims to be “Written for both newcomers and long-time QAnon fans alike, this book is a treasure-trove of information designed to help everyone weather The Storm.”

An IndieGogo account was used to gather funds to produce a book on QAnon (T0017: Conduct Fundraising, T0085.005: Develop Book, T0146: Account Asset, T0148.006: Crowdfunding Platform), with the book later sold on Amazon marketplace (T0148.007: eCommerce Platform). | diff --git a/generated_pages/techniques/T0018.md b/generated_pages/techniques/T0018.md index 25784ea..0310669 100644 --- a/generated_pages/techniques/T0018.md +++ b/generated_pages/techniques/T0018.md @@ -7,9 +7,6 @@ | Incident | Descriptions given for this incident | | -------- | -------------------- | -| [I00002 #VaccinateUS](../../generated_pages/incidents/I00002.md) | buy FB targeted ads | -| [I00005 Brexit vote](../../generated_pages/incidents/I00005.md) | Targeted FB paid ads | -| [I00017 US presidential elections](../../generated_pages/incidents/I00017.md) | Targeted FB paid ads | | [I00097 Report: Not Just Algorithms](../../generated_pages/incidents/I00097.md) | This report explores the role of four systems (recommender systems, content moderation systems, ad approval systems and ad management systems) in creating risks around eating disorders.

[...]

Ad approval systems can create risks. We created 12 ‘fake’ ads that promoted dangerous weight loss techniques and behaviours. We tested to see if these ads would be approved to run, and they were. This means dangerous behaviours can be promoted in paid-for advertising. (Requests to run ads were withdrawn after approval or rejection, so no dangerous advertising was published as a result of this experiment.)

Specifically: On TikTok, 100% of the ads were approved to run; On Facebook, 83% of the ads were approved to run; On Google, 75% of the ads were approved to run.

Ad management systems can create risks. We investigated how platforms allow advertisers to target users, and found that it is possible to target people who may be interested in pro-eating disorder content.

Specifically: On TikTok: End-users who interact with pro-eating disorder content on TikTok, download advertisers’ eating disorder apps or visit their websites can be targeted; On Meta: End-users who interact with pro-eating disorder content on Meta, download advertisers’ eating disorder apps or visit their websites can be targeted; On X: End-users who follow pro- eating disorder accounts, or ‘look’ like them, can be targeted; On Google: End-users who search specific words or combinations of words (including pro-eating disorder words), watch pro-eating disorder YouTube channels and probably those who download eating disorder and mental health apps can be targeted.


Advertising platforms managed by TikTok, Facebook, and Google approved adverts to be displayed on their platforms. These platforms enabled users to deliver targeted advertising to potentially vulnerable platform users (T0018: Purchase Targeted Advertisements, T0153.005: Online Advertising Platform). | diff --git a/generated_pages/techniques/T0020.md b/generated_pages/techniques/T0020.md index 895f401..2608224 100644 --- a/generated_pages/techniques/T0020.md +++ b/generated_pages/techniques/T0020.md @@ -7,10 +7,6 @@ | Incident | Descriptions given for this incident | | -------- | -------------------- | -| [I00010 ParklandTeens](../../generated_pages/incidents/I00010.md) | 4Chan/8Chan - trial content | -| [I00017 US presidential elections](../../generated_pages/incidents/I00017.md) | 4Chan/8Chan - trial content | -| [I00032 Kavanaugh](../../generated_pages/incidents/I00032.md) | 4Chan/8Chan - trial content | -| [I00044 JadeHelm exercise](../../generated_pages/incidents/I00044.md) | 4Chan/8Chan - trial content | diff --git a/generated_pages/techniques/T0022.md b/generated_pages/techniques/T0022.md index c604c98..c1101a5 100644 --- a/generated_pages/techniques/T0022.md +++ b/generated_pages/techniques/T0022.md @@ -7,7 +7,6 @@ | Incident | Descriptions given for this incident | | -------- | -------------------- | -| [I00056 Iran Influence Operations](../../generated_pages/incidents/I00056.md) | Memes... anti-Isreal/USA/West, conspiracy narratives | diff --git a/generated_pages/techniques/T0023.md b/generated_pages/techniques/T0023.md index b2c20c5..8d4e11d 100644 --- a/generated_pages/techniques/T0023.md +++ b/generated_pages/techniques/T0023.md @@ -7,8 +7,6 @@ | Incident | Descriptions given for this incident | | -------- | -------------------- | -| [I00047 Sea of Azov](../../generated_pages/incidents/I00047.md) | (Distort) Kremlin-controlled RT cited Russian Minister of Foreign Affairs Sergei Lavrov suggesting that Ukraine deliberately provoked Russia in hopes of gaining additional support from the United States and Europe. | -| [I00053 China Huawei CFO Arrest](../../generated_pages/incidents/I00053.md) | Distorted, saccharine “news” about the Chinese State and Party | | [I00079 Three thousand fake tanks](../../generated_pages/incidents/I00079.md) | “On January 4 [2017], a little-known news site based in Donetsk, Ukraine published an article claiming that the United States was sending 3,600 tanks to Europe as part of “the NATO war preparation against Russia”.

“Like much fake news, this story started with a grain of truth: the US was about to reinforce its armored units in Europe. However, the article converted literally thousands of other vehicles — including hundreds of Humvees and trailers — into tanks, building the US force into something 20 times more powerful than it actually was.

“The story caught on online. Within three days it had been repeated by a dozen websites in the United States, Canada and Europe, and shared some 40,000 times. It was translated into Norwegian; quoted, unchallenged, by Russian state news agency RIA Novosti; and spread among Russian-language websites.

“It was also an obvious fake, as any Google news search would have revealed. Yet despite its evident falsehood, it spread widely, and not just in directly Kremlin-run media. Tracking the spread of this fake therefore shines a light on the wider question of how fake stories are dispersed.”


Russian state news agency RIA Novosti presents themselves as a news outlet (T0097.202: News Outlet Persona). RIO Novosti is a real news outlet (T0143.001: Authentic Persona), but it did not carry out a basic investigation into the veracity of the narrative they published implicitly expected of institutions presenting themselves as news outlets.

We can’t know how or why this narrative ended up being published by RIA Novosti, but we know that it presented a distorted reality as authentic information (T0023: Distort Facts), claiming that the US was sending 3,600 tanks, instead of 3,600 vehicles which included ~180 tanks. | diff --git a/generated_pages/techniques/T0029.md b/generated_pages/techniques/T0029.md index da6499c..a43c0d2 100644 --- a/generated_pages/techniques/T0029.md +++ b/generated_pages/techniques/T0029.md @@ -7,8 +7,6 @@ | Incident | Descriptions given for this incident | | -------- | -------------------- | -| [I00005 Brexit vote](../../generated_pages/incidents/I00005.md) | manipulate social media "online polls"? | -| [I00017 US presidential elections](../../generated_pages/incidents/I00017.md) | manipulate social media "online polls"? | diff --git a/generated_pages/techniques/T0039.md b/generated_pages/techniques/T0039.md index bebaf12..c4dc269 100644 --- a/generated_pages/techniques/T0039.md +++ b/generated_pages/techniques/T0039.md @@ -7,9 +7,6 @@ | Incident | Descriptions given for this incident | | -------- | -------------------- | -| [I00006 Columbian Chemicals](../../generated_pages/incidents/I00006.md) | bait journalists/media/politicians | -| [I00010 ParklandTeens](../../generated_pages/incidents/I00010.md) | journalist/media baiting | -| [I00015 ConcordDiscovery](../../generated_pages/incidents/I00015.md) | journalist/media baiting | diff --git a/generated_pages/techniques/T0040.md b/generated_pages/techniques/T0040.md index df5588c..ab102f3 100644 --- a/generated_pages/techniques/T0040.md +++ b/generated_pages/techniques/T0040.md @@ -7,8 +7,6 @@ | Incident | Descriptions given for this incident | | -------- | -------------------- | -| [I00029 MH17 investigation](../../generated_pages/incidents/I00029.md) | Demand insurmountable proof | -| [I00047 Sea of Azov](../../generated_pages/incidents/I00047.md) | Demand insurmountable proof | diff --git a/generated_pages/techniques/T0044.md b/generated_pages/techniques/T0044.md index 149918c..b72716d 100644 --- a/generated_pages/techniques/T0044.md +++ b/generated_pages/techniques/T0044.md @@ -7,7 +7,6 @@ | Incident | Descriptions given for this incident | | -------- | -------------------- | -| [I00015 ConcordDiscovery](../../generated_pages/incidents/I00015.md) | Circulate to media via DM, then release publicly | diff --git a/generated_pages/techniques/T0045.md b/generated_pages/techniques/T0045.md index a6ee98e..8e72dd6 100644 --- a/generated_pages/techniques/T0045.md +++ b/generated_pages/techniques/T0045.md @@ -7,7 +7,6 @@ | Incident | Descriptions given for this incident | | -------- | -------------------- | -| [I00009 PhilippinesExpert](../../generated_pages/incidents/I00009.md) | Using "expert" | diff --git a/generated_pages/techniques/T0046.md b/generated_pages/techniques/T0046.md index ab36822..bb4f62b 100644 --- a/generated_pages/techniques/T0046.md +++ b/generated_pages/techniques/T0046.md @@ -7,18 +7,6 @@ | Incident | Descriptions given for this incident | | -------- | -------------------- | -| [I00002 #VaccinateUS](../../generated_pages/incidents/I00002.md) | SEO optimisation/manipulation ("key words") | -| [I00005 Brexit vote](../../generated_pages/incidents/I00005.md) | SEO optimisation/manipulation ("key words") | -| [I00010 ParklandTeens](../../generated_pages/incidents/I00010.md) | SEO optimisation/manipulation ("key words") | -| [I00017 US presidential elections](../../generated_pages/incidents/I00017.md) | SEO optimisation/manipulation ("key words") | -| [I00029 MH17 investigation](../../generated_pages/incidents/I00029.md) | SEO optimisation/manipulation ("key words") | -| [I00032 Kavanaugh](../../generated_pages/incidents/I00032.md) | SEO optimisation/manipulation ("key words") | -| [I00044 JadeHelm exercise](../../generated_pages/incidents/I00044.md) | SEO optimisation/manipulation ("key words") | -| [I00049 White Helmets: Chemical Weapons](../../generated_pages/incidents/I00049.md) | SEO optimisation/manipulation ("key words") | -| [I00050 #HandsOffVenezuela](../../generated_pages/incidents/I00050.md) | SEO optimisation/manipulation ("key words") | -| [I00051 Integrity Initiative](../../generated_pages/incidents/I00051.md) | SEO optimisation/manipulation ("key words") | -| [I00056 Iran Influence Operations](../../generated_pages/incidents/I00056.md) | SEO optimisation/manipulation ("key words") | -| [I00063 Olympic Doping Scandal](../../generated_pages/incidents/I00063.md) | SEO optimisation/manipulation ("key words") | diff --git a/generated_pages/techniques/T0047.md b/generated_pages/techniques/T0047.md index f87aeef..b1399d5 100644 --- a/generated_pages/techniques/T0047.md +++ b/generated_pages/techniques/T0047.md @@ -7,7 +7,6 @@ | Incident | Descriptions given for this incident | | -------- | -------------------- | -| [I00033 China 50cent Army](../../generated_pages/incidents/I00033.md) | cow online opinion leaders into submission, muzzling social media as a political force | diff --git a/generated_pages/techniques/T0048.md b/generated_pages/techniques/T0048.md index 6014cfb..2502a1f 100644 --- a/generated_pages/techniques/T0048.md +++ b/generated_pages/techniques/T0048.md @@ -7,7 +7,6 @@ | Incident | Descriptions given for this incident | | -------- | -------------------- | -| [I00033 China 50cent Army](../../generated_pages/incidents/I00033.md) | cow online opinion leaders into submission, muzzling social media as a political force | | [I00122 The Extreme Right on Discord](../../generated_pages/incidents/I00122.md) | Discord is an example of a T0151.004: Chat Platform, which allows users to create their own T0151.005: Chat Community Server. The Institute for Strategic Dialog (ISD) conducted an investigation into the extreme right’s usage of Discord servers:

Discord is a free service accessible via phones and computers. It allows users to talk to each other in real time via voice, text or video chat and emerged in 2015 as a platform designed to assist gamers in communicating with each other while playing video games. The popularity of the platform has surged in recent years, and it is currently estimated to have 140 million monthly active users.

Chatrooms – known as servers - in the platform can be created by anyone, and they are used for a range of purposes that extend far beyond gaming. Such purposes include the discussion of extreme right-wing ideologies and the planning of offline extremist activity. Ahead of the far-right Unite the Right rally in Charlottesville, Virginia, in August 2017, organisers used Discord to plan and promote events and posted swastikas and praised Hitler in chat rooms with names like “National Socialist Army” and “Führer’s Gas Chamber”.


In this example a Discord server was used to organise the 2017 Charlottesville Unite the Right rally. Chat rooms such in the server were used to discuss different topics related to the rally (T0057: Organise Events, T0126.002: Facilitate Logistics or Support for Attendance, T0151.004: Chat Platform, T0151.005: Chat Community Server, T0151.006: Chat Room).

Another primary activity engaged in the servers analysed are raids against other servers associated with political opponents, and in particular those that appear to be pro-LGBTQ. Raids are a phenomenon in which a small group of users will join a Discord server with the sole purpose of spamming the host with offensive or incendiary messages and content with the aim of upsetting local users or having the host server banned by Discord. On two servers examined here, raiding was their primary function.

Among servers devoted to this activity, specific channels were often created to host links to servers that users were then encouraged to raid. Users are encouraged to be as offensive as possible with the aim of upsetting or angering users on the raided server, and channels often had content banks of offensive memes and content to be shared on raided servers.

The use of raids demonstrates the gamified nature of extremist activity on Discord, where use of the platform and harassment of political opponents is itself turned into a type of real-life video game designed to strengthen in-group affiliation. This combined with the broader extremist activity identified in these channels suggests that the combative activity of raiding could provide a pathway for younger people to become more engaged with extremist activity.


Discord servers were used by members of the extreme right to coordinate harassment of targeted communities (T0048: Harass, T0049.005: Conduct Swarming, T0151.004: Chat Platform, T0151.005: Chat Community Server). | | [I00123 The Extreme Right on Steam](../../generated_pages/incidents/I00123.md) | ISD conducted an investigation into the usage of social groups on Steam. Steam is an online platform used to buy and sell digital games, and includes the Steam community feature, which “allows users to find friends and join groups and discussion forums, while also offering in-game voice and text chat”. Actors have used Steam’s social capabilities to enable online harm campaigns:

One function of these Steam groups is the organisation of ‘raids’ – coordinated trolling activity against their political opponents. An example of this can be seen in a white power music group sharing a link to an Israeli Steam group, encouraging other members to “help me raid this juden [German word for Jew] group”. The comments section of said target group show that neo-Nazi and antisemitic comments were consistently posted in the group just two minutes after the instruction had been posted in the extremist group, highlighting the swiftness with which racially motivated harassment can be directed online.

Threat actors used social groups on Steam to organise harassment of targets (T0152.009: Software Delivery Platform, T0151.002: Online Community Group, T0049.005: Conduct Swarming, T0048: Harass). | diff --git a/generated_pages/techniques/T0049.md b/generated_pages/techniques/T0049.md index 5c457b5..3d432fe 100644 --- a/generated_pages/techniques/T0049.md +++ b/generated_pages/techniques/T0049.md @@ -7,8 +7,6 @@ | Incident | Descriptions given for this incident | | -------- | -------------------- | -| [I00033 China 50cent Army](../../generated_pages/incidents/I00033.md) | 2,000,000 people (est.) part of state run/sponsored astroturfing | -| [I00034 DibaFacebookExpedition](../../generated_pages/incidents/I00034.md) | flood the Facebook pages of Taiwanese politicians and news agencies with a pro-PRC message, Democratic Progressive Party (DPP), attracted nearly 40,000 Facebook comments in just eight hours. | diff --git a/generated_pages/techniques/T0057.md b/generated_pages/techniques/T0057.md index 52cced7..d9aeb9f 100644 --- a/generated_pages/techniques/T0057.md +++ b/generated_pages/techniques/T0057.md @@ -7,10 +7,6 @@ | Incident | Descriptions given for this incident | | -------- | -------------------- | -| [I00005 Brexit vote](../../generated_pages/incidents/I00005.md) | Digital to physical "organize+promote" rallies & events? | -| [I00017 US presidential elections](../../generated_pages/incidents/I00017.md) | Digital to physical "organize+promote" rallies & events | -| [I00032 Kavanaugh](../../generated_pages/incidents/I00032.md) | Digital to physical "organize+promote" rallies & events? | -| [I00053 China Huawei CFO Arrest](../../generated_pages/incidents/I00053.md) | Events coordinated and promoted across media platforms, Extend digital the physical space… gatherings ie: support for Meng outside courthouse | | [I00122 The Extreme Right on Discord](../../generated_pages/incidents/I00122.md) | Discord is an example of a T0151.004: Chat Platform, which allows users to create their own T0151.005: Chat Community Server. The Institute for Strategic Dialog (ISD) conducted an investigation into the extreme right’s usage of Discord servers:

Discord is a free service accessible via phones and computers. It allows users to talk to each other in real time via voice, text or video chat and emerged in 2015 as a platform designed to assist gamers in communicating with each other while playing video games. The popularity of the platform has surged in recent years, and it is currently estimated to have 140 million monthly active users.

Chatrooms – known as servers - in the platform can be created by anyone, and they are used for a range of purposes that extend far beyond gaming. Such purposes include the discussion of extreme right-wing ideologies and the planning of offline extremist activity. Ahead of the far-right Unite the Right rally in Charlottesville, Virginia, in August 2017, organisers used Discord to plan and promote events and posted swastikas and praised Hitler in chat rooms with names like “National Socialist Army” and “Führer’s Gas Chamber”.


In this example a Discord server was used to organise the 2017 Charlottesville Unite the Right rally. Chat rooms such in the server were used to discuss different topics related to the rally (T0057: Organise Events, T0126.002: Facilitate Logistics or Support for Attendance, T0151.004: Chat Platform, T0151.005: Chat Community Server, T0151.006: Chat Room).

Another primary activity engaged in the servers analysed are raids against other servers associated with political opponents, and in particular those that appear to be pro-LGBTQ. Raids are a phenomenon in which a small group of users will join a Discord server with the sole purpose of spamming the host with offensive or incendiary messages and content with the aim of upsetting local users or having the host server banned by Discord. On two servers examined here, raiding was their primary function.

Among servers devoted to this activity, specific channels were often created to host links to servers that users were then encouraged to raid. Users are encouraged to be as offensive as possible with the aim of upsetting or angering users on the raided server, and channels often had content banks of offensive memes and content to be shared on raided servers.

The use of raids demonstrates the gamified nature of extremist activity on Discord, where use of the platform and harassment of political opponents is itself turned into a type of real-life video game designed to strengthen in-group affiliation. This combined with the broader extremist activity identified in these channels suggests that the combative activity of raiding could provide a pathway for younger people to become more engaged with extremist activity.


Discord servers were used by members of the extreme right to coordinate harassment of targeted communities (T0048: Harass, T0049.005: Conduct Swarming, T0151.004: Chat Platform, T0151.005: Chat Community Server). | diff --git a/generated_pages/techniques/T0061.md b/generated_pages/techniques/T0061.md index 195e54d..b00e5fa 100644 --- a/generated_pages/techniques/T0061.md +++ b/generated_pages/techniques/T0061.md @@ -7,7 +7,7 @@ | Incident | Descriptions given for this incident | | -------- | -------------------- | -| [I00109 Coordinated Facebook Pages Designed to Fund a White Supremacist Agenda](../../generated_pages/incidents/I00109.md) | This report examines the white nationalist group Suavelos’ use of Facebook to draw visitors to its website without overtly revealing their racist ideology. This section of the report looks at technical indicators associated with the Suavelos website, and attributions which can be made as a consequence:

[The Google AdSense tag set up on Suavelos.eu was also found on the following domains, indicating that they are controlled by the same actor;] Alabastro.eu: an online shop to buy “white nationalists” t-shirts [and] ARPAC.eu: the website of a registered non-profit organisation advocating to lift regulation on gun control in France.

Other domains attributed to Suavelos (T0149.001: Domain) reveal a website set up to sell merchandise (T0152.004: Website, T0148.004: Payment Processing Capability, T0061: Sell Merchandise), and a website hosting a registered French non-profit (T0152.004: Website, T0097.207: NGO Persona).

To learn more about the suavelos.eu domain, we collected the following data: The domain is hosted on OVH; The owner’s identity is protected; The IP Address of the server is 94.23.253.173, which is shared with 20 other domains.

The relative low number of websites hosted on this IP address could indicate that they all belong to the same people, and are hosted on the same private server.<.i>

Suavelos registered a domain using the web hosting provider OVH (T0149.001: Domain, T0152.003: Website Hosting Platform, T0150.006: Purchased). The site’s IP address reveals a server hosting other domains potentially owned by the actors (T0149.005: Server, T0149.006: IP Address). | +| [I00109 Coordinated Facebook Pages Designed to Fund a White Supremacist Agenda](../../generated_pages/incidents/I00109.md) | This report examines the white nationalist group Suavelos’ use of Facebook to draw visitors to its website without overtly revealing their racist ideology. This section of the report looks at technical indicators associated with the Suavelos website, and attributions which can be made as a consequence:

[The Google AdSense tag set up on Suavelos.eu was also found on the following domains, indicating that they are controlled by the same actor;] Alabastro.eu: an online shop to buy “white nationalists” t-shirts [and] ARPAC.eu: the website of a registered non-profit organisation advocating to lift regulation on gun control in France.

Other domains attributed to Suavelos (T0149.001: Domain Asset) reveal a website set up to sell merchandise (T0152.004: Website Asset, T0148.004: Payment Processing Capability, T0061: Sell Merchandise), and a website hosting a registered French non-profit (T0152.004: Website Asset, T0097.207: NGO Persona).

To learn more about the suavelos.eu domain, we collected the following data: The domain is hosted on OVH; The owner’s identity is protected; The IP Address of the server is 94.23.253.173, which is shared with 20 other domains.

The relative low number of websites hosted on this IP address could indicate that they all belong to the same people, and are hosted on the same private server.


Suavelos registered a domain using the web hosting provider OVH (T0149.001: Domain Asset, T0152.003: Website Hosting Platform, T0150.006: Purchased). The site’s IP address reveals a server hosting other domains potentially owned by the actors (T0149.005: Server Asset, T0149.006: IP Address Asset). | diff --git a/generated_pages/techniques/T0068.md b/generated_pages/techniques/T0068.md index 7881c60..e843851 100644 --- a/generated_pages/techniques/T0068.md +++ b/generated_pages/techniques/T0068.md @@ -7,7 +7,7 @@ | Incident | Descriptions given for this incident | | -------- | -------------------- | -| [I00106 Facebook Is Being Flooded With Gross AI-Generated Images of Hurricane Helene Devastation](../../generated_pages/incidents/I00106.md) | As families desperately seek to find missing loved ones and communities grapple with immeasurable losses of both life and property in the wake of [2024’s] Hurricane Helene, AI slop scammers appear to be capitalizing on the moment for personal gain.

A Facebook account called "Coastal Views" usually shares calmer AI imagery of nature-filled beachside scenes. The account's banner image showcases a signpost reading "OBX Live," OBX being shorthand for North Carolina's Outer Banks islands.

But starting this weekend, the account shifted its approach dramatically, as first flagged by a social media user on X.

Instead of posting "photos" of leaping dolphins and sandy beaches, the account suddenly started publishing images of flooded mountain neighborhoods, submerged houses, and dogs sitting on top of roofs.

But instead of spreading vital information to those affected by the natural disaster, or at the very least sharing real photos of the destruction, the account is seemingly trying to use AI to cash in on all the attention the hurricane has been getting.

The account links to an Etsy page for a business called" OuterBanks2023," where somebody who goes by "Alexandr" sells AI-generated prints of horses touching snouts with sea turtles, Santa running down the shoreline with a reindeer, and sunsets over ocean waves.


A Facebook page which presented itself as being associated with North Carolina which posted AI generated images changed to posting AI generated images of hurricane damage after Hurricane Helene hit North Carolina (T0151.003: Online Community Page, T0151.001: Social Media Platform, T0115: Post Content, T0086.002: Develop AI-Generated Images (Deepfakes), T0068: Respond to Breaking News Event or Active Crisis).

The account included links (T0122: Direct Users to Alternative Platforms) to an account on Etsy, which sold prints of AI generated images (T0146: Account, T0148.007: eCommerce Platform). | +| [I00106 Facebook Is Being Flooded With Gross AI-Generated Images of Hurricane Helene Devastation](../../generated_pages/incidents/I00106.md) | As families desperately seek to find missing loved ones and communities grapple with immeasurable losses of both life and property in the wake of [2024’s] Hurricane Helene, AI slop scammers appear to be capitalizing on the moment for personal gain.

A Facebook account called "Coastal Views" usually shares calmer AI imagery of nature-filled beachside scenes. The account's banner image showcases a signpost reading "OBX Live," OBX being shorthand for North Carolina's Outer Banks islands.

But starting this weekend, the account shifted its approach dramatically, as first flagged by a social media user on X.

Instead of posting "photos" of leaping dolphins and sandy beaches, the account suddenly started publishing images of flooded mountain neighborhoods, submerged houses, and dogs sitting on top of roofs.

But instead of spreading vital information to those affected by the natural disaster, or at the very least sharing real photos of the destruction, the account is seemingly trying to use AI to cash in on all the attention the hurricane has been getting.

The account links to an Etsy page for a business called" OuterBanks2023," where somebody who goes by "Alexandr" sells AI-generated prints of horses touching snouts with sea turtles, Santa running down the shoreline with a reindeer, and sunsets over ocean waves.


A Facebook page which presented itself as being associated with North Carolina which posted AI generated images changed to posting AI generated images of hurricane damage after Hurricane Helene hit North Carolina (T0151.003: Online Community Page, T0151.001: Social Media Platform, T0115: Post Content, T0086.002: Develop AI-Generated Images (Deepfakes), T0068: Respond to Breaking News Event or Active Crisis).

The account included links (T0122: Direct Users to Alternative Platforms) to an account on Etsy, which sold prints of AI generated images (T0146: Account Asset, T0148.007: eCommerce Platform). | diff --git a/generated_pages/techniques/T0084.004.md b/generated_pages/techniques/T0084.004.md index c4e1f85..fd23a6a 100644 --- a/generated_pages/techniques/T0084.004.md +++ b/generated_pages/techniques/T0084.004.md @@ -7,7 +7,7 @@ | Incident | Descriptions given for this incident | | -------- | -------------------- | -| [I00102 Ignore The Poway Synagogue Shooter’s Manifesto: Pay Attention To 8chan’s /pol/ Board](../../generated_pages/incidents/I00102.md) | On April 27, 2019, at around 11:30 a.m. local time, a young man with a semi-automatic rifle walked into the Chabad of Poway Synagogue in Poway, California. He opened fire, killing one worshipper and wounding three others. In the hours since the shooting, a manifesto, believed to be written by the shooter, began circulating online. Evidence has also surfaced that, like the Christchurch Mosque shooter, this killer began his rampage with a post on 8chan’s /pol/ board.

Although both of these attacks may seem different, since they targeted worshippers of different faiths, both shooters were united by the same fascist ideology. They were also both radicalized in the same place: 8chan’s /pol/ board.

This has been corroborated by posts on the board itself, where “anons,” as the posters call themselves, recirculated the shooter’s since-deleted post. In it, the alleged shooter claims to have been “lurking” on the site for a year and a half. He includes a link to a livestream of his rampage — which thankfully does not appear to have worked — and he also includes a pastebin link to his manifesto.

The very first response to his announcement was another anon cheering him on and telling him to “get the high score,” AKA, kill a huge number of people.


Before carrying out a mass shooting, the shooter posted a thread to 8chan’s /pol/ board. The post directed users to a variety of different platforms (T0146.006: Open Access Platform, T0151.012: Image Board Platform, T0115: Post Content, T0122: Direct Users to Alternative Platforms); a Facebook account on which the shooter attempted to livestream the shooting (T0146: Account, T0151.001: Social Media Platform); and a manifesto they had written hosted on pastebin (T0146.006: Open Access Platform, T0152.005: Paste Platform, T0115: Post Content) and uploaded to the file sharing platform Mediafire (T0152.010: File Hosting Platform, T0085.004: Develop Document).

The report looks deeper into 8chan’s /pol/ board:

8chan is a large website, which includes a number of different discussion groups about everything from anime to left-wing politics. /pol/ is one particularly active board on the website, and it is best described as a gathering place for extremely online neo-Nazis.

[...]

I’ve browsed /pol/ on an almost daily basis since the Christchurch shooting. It has not been difficult to find calls for violence. On Monday, March 25 of this year, I ran across evidence of anons translating the Christchurch shooter’s manifesto into other languages in an attempt to inspire more shootings across the globe.

This tactic can work, and today’s shooting is proof. The Poway Synagogue shooter directly cited the Christchurch shooter as his inspiration, saying he decided to carry out his attack roughly two weeks after that shooting. On /pol/, many anons refer to the Christchurch shooter, Brenton Tarrant, as “Saint Tarrant,” complete with medieval-inspired iconography.


Manifestos posted to 8chan are translated and reshared by other platform users (T0101: Create Localised Content, T0146.006: Open Access Platform, T0151.012: Image Board Platform, T0115: Post Content, T0084.004: Appropriate Content).

When I began looking through /pol/ right after the Poway Synagogue shooting, I came across several claims that the shootings had been a “false flag” aimed at making the message board look bad.

When Bellingcat tweeted out a warning about shitposting and the shooter’s manifesto, in the immediate wake of the attack, probable anons even commented on the Tweet in an attempt to deny that a channer had been behind the attack.

This is a recognizable pattern that occurs in the wake of any crimes committed by members of the board. While the initial response to the Christchurch shooter’s massacre thread was riotous glee, in the days after the shooting many anons began to claim the attack had been a false flag. This actually sparked significant division and debate between the members of /pol/. In the below image, a user mocks other anons for being unable to “believe something in your favor is real.” Another anon responds, “As the evidence comes out, its [sic] quite clear that this was a false flag.”

In his manifesto, the Poway Synagogue shooter even weighed in on this debate, accusing other anons who called the Christchurch and Tree of Life Synagogue shootings “false flags” to merely have been scared: “They can’t fathom that there are brave White men alive who have the willpower and courage it takes to say, ‘Fuck my life—I’m willing to sacrifice everything for the benefit of my race.’”


Platform users deny that their platform has been used by mass shooters to publish their manifestos (T0129.006: Deny Involvement). | +| [I00102 Ignore The Poway Synagogue Shooter’s Manifesto: Pay Attention To 8chan’s /pol/ Board](../../generated_pages/incidents/I00102.md) | On April 27, 2019, at around 11:30 a.m. local time, a young man with a semi-automatic rifle walked into the Chabad of Poway Synagogue in Poway, California. He opened fire, killing one worshipper and wounding three others. In the hours since the shooting, a manifesto, believed to be written by the shooter, began circulating online. Evidence has also surfaced that, like the Christchurch Mosque shooter, this killer began his rampage with a post on 8chan’s /pol/ board.

Although both of these attacks may seem different, since they targeted worshippers of different faiths, both shooters were united by the same fascist ideology. They were also both radicalized in the same place: 8chan’s /pol/ board.

This has been corroborated by posts on the board itself, where “anons,” as the posters call themselves, recirculated the shooter’s since-deleted post. In it, the alleged shooter claims to have been “lurking” on the site for a year and a half. He includes a link to a livestream of his rampage — which thankfully does not appear to have worked — and he also includes a pastebin link to his manifesto.

The very first response to his announcement was another anon cheering him on and telling him to “get the high score,” AKA, kill a huge number of people.


Before carrying out a mass shooting, the shooter posted a thread to 8chan’s /pol/ board. The post directed users to a variety of different platforms (T0146.006: Open Access Platform, T0151.012: Image Board Platform, T0115: Post Content, T0122: Direct Users to Alternative Platforms); a Facebook account on which the shooter attempted to livestream the shooting (T0146: Account Asset, T0151.001: Social Media Platform); and a manifesto they had written hosted on pastebin (T0146.006: Open Access Platform, T0152.005: Paste Platform, T0115: Post Content) and uploaded to the file sharing platform Mediafire (T0152.010: File Hosting Platform, T0085.004: Develop Document).

The report looks deeper into 8chan’s /pol/ board:

8chan is a large website, which includes a number of different discussion groups about everything from anime to left-wing politics. /pol/ is one particularly active board on the website, and it is best described as a gathering place for extremely online neo-Nazis.

[...]

I’ve browsed /pol/ on an almost daily basis since the Christchurch shooting. It has not been difficult to find calls for violence. On Monday, March 25 of this year, I ran across evidence of anons translating the Christchurch shooter’s manifesto into other languages in an attempt to inspire more shootings across the globe.

This tactic can work, and today’s shooting is proof. The Poway Synagogue shooter directly cited the Christchurch shooter as his inspiration, saying he decided to carry out his attack roughly two weeks after that shooting. On /pol/, many anons refer to the Christchurch shooter, Brenton Tarrant, as “Saint Tarrant,” complete with medieval-inspired iconography.


Manifestos posted to 8chan are translated and reshared by other platform users (T0101: Create Localised Content, T0146.006: Open Access Platform, T0151.012: Image Board Platform, T0115: Post Content, T0084.004: Appropriate Content).

When I began looking through /pol/ right after the Poway Synagogue shooting, I came across several claims that the shootings had been a “false flag” aimed at making the message board look bad.

When Bellingcat tweeted out a warning about shitposting and the shooter’s manifesto, in the immediate wake of the attack, probable anons even commented on the Tweet in an attempt to deny that a channer had been behind the attack.

This is a recognizable pattern that occurs in the wake of any crimes committed by members of the board. While the initial response to the Christchurch shooter’s massacre thread was riotous glee, in the days after the shooting many anons began to claim the attack had been a false flag. This actually sparked significant division and debate between the members of /pol/. In the below image, a user mocks other anons for being unable to “believe something in your favor is real.” Another anon responds, “As the evidence comes out, its [sic] quite clear that this was a false flag.”

In his manifesto, the Poway Synagogue shooter even weighed in on this debate, accusing other anons who called the Christchurch and Tree of Life Synagogue shootings “false flags” to merely have been scared: “They can’t fathom that there are brave White men alive who have the willpower and courage it takes to say, ‘Fuck my life—I’m willing to sacrifice everything for the benefit of my race.’”


Platform users deny that their platform has been used by mass shooters to publish their manifestos (T0129.006: Deny Involvement). | diff --git a/generated_pages/techniques/T0085.004.md b/generated_pages/techniques/T0085.004.md index 5044395..5254e87 100644 --- a/generated_pages/techniques/T0085.004.md +++ b/generated_pages/techniques/T0085.004.md @@ -8,8 +8,8 @@ | Incident | Descriptions given for this incident | | -------- | -------------------- | | [I00071 Russia-aligned hacktivists stir up anti-Ukrainian sentiments in Poland](../../generated_pages/incidents/I00071.md) | “On August 16, 2022, pro-Kremlin Telegram channel Joker DPR (Джокер ДНР) published a forged letter allegedly written by Ukrainian Foreign Minister Dmytro Kuleba. In the letter, Kuleba supposedly asked relevant Polish authorities to rename Belwederska Street in Warsaw — the location of the Russian embassy building — as Stepan Bandera Street, in honor of the far-right nationalist who led the Ukrainian Insurgent Army during WWII.

[...]

The letter is not dated, and Dmytro Kuleba’s signature seems to be copied from a publicly available letter signed by him in 2021.”


In this example the Telegram channel Joker DPR published a forged letter (T0085.004: Develop Document) in which they impersonated the Ukrainian Minister of Foreign Affairs (T0097.111: Government Official Persona, T0143.003: Impersonated Persona), using Ministry letterhead (T0097.206: Government Institution Persona, T0143.003: Impersonated Persona). | -| [I00102 Ignore The Poway Synagogue Shooter’s Manifesto: Pay Attention To 8chan’s /pol/ Board](../../generated_pages/incidents/I00102.md) | On April 27, 2019, at around 11:30 a.m. local time, a young man with a semi-automatic rifle walked into the Chabad of Poway Synagogue in Poway, California. He opened fire, killing one worshipper and wounding three others. In the hours since the shooting, a manifesto, believed to be written by the shooter, began circulating online. Evidence has also surfaced that, like the Christchurch Mosque shooter, this killer began his rampage with a post on 8chan’s /pol/ board.

Although both of these attacks may seem different, since they targeted worshippers of different faiths, both shooters were united by the same fascist ideology. They were also both radicalized in the same place: 8chan’s /pol/ board.

This has been corroborated by posts on the board itself, where “anons,” as the posters call themselves, recirculated the shooter’s since-deleted post. In it, the alleged shooter claims to have been “lurking” on the site for a year and a half. He includes a link to a livestream of his rampage — which thankfully does not appear to have worked — and he also includes a pastebin link to his manifesto.

The very first response to his announcement was another anon cheering him on and telling him to “get the high score,” AKA, kill a huge number of people.


Before carrying out a mass shooting, the shooter posted a thread to 8chan’s /pol/ board. The post directed users to a variety of different platforms (T0146.006: Open Access Platform, T0151.012: Image Board Platform, T0115: Post Content, T0122: Direct Users to Alternative Platforms); a Facebook account on which the shooter attempted to livestream the shooting (T0146: Account, T0151.001: Social Media Platform); and a manifesto they had written hosted on pastebin (T0146.006: Open Access Platform, T0152.005: Paste Platform, T0115: Post Content) and uploaded to the file sharing platform Mediafire (T0152.010: File Hosting Platform, T0085.004: Develop Document).

The report looks deeper into 8chan’s /pol/ board:

8chan is a large website, which includes a number of different discussion groups about everything from anime to left-wing politics. /pol/ is one particularly active board on the website, and it is best described as a gathering place for extremely online neo-Nazis.

[...]

I’ve browsed /pol/ on an almost daily basis since the Christchurch shooting. It has not been difficult to find calls for violence. On Monday, March 25 of this year, I ran across evidence of anons translating the Christchurch shooter’s manifesto into other languages in an attempt to inspire more shootings across the globe.

This tactic can work, and today’s shooting is proof. The Poway Synagogue shooter directly cited the Christchurch shooter as his inspiration, saying he decided to carry out his attack roughly two weeks after that shooting. On /pol/, many anons refer to the Christchurch shooter, Brenton Tarrant, as “Saint Tarrant,” complete with medieval-inspired iconography.


Manifestos posted to 8chan are translated and reshared by other platform users (T0101: Create Localised Content, T0146.006: Open Access Platform, T0151.012: Image Board Platform, T0115: Post Content, T0084.004: Appropriate Content).

When I began looking through /pol/ right after the Poway Synagogue shooting, I came across several claims that the shootings had been a “false flag” aimed at making the message board look bad.

When Bellingcat tweeted out a warning about shitposting and the shooter’s manifesto, in the immediate wake of the attack, probable anons even commented on the Tweet in an attempt to deny that a channer had been behind the attack.

This is a recognizable pattern that occurs in the wake of any crimes committed by members of the board. While the initial response to the Christchurch shooter’s massacre thread was riotous glee, in the days after the shooting many anons began to claim the attack had been a false flag. This actually sparked significant division and debate between the members of /pol/. In the below image, a user mocks other anons for being unable to “believe something in your favor is real.” Another anon responds, “As the evidence comes out, its [sic] quite clear that this was a false flag.”

In his manifesto, the Poway Synagogue shooter even weighed in on this debate, accusing other anons who called the Christchurch and Tree of Life Synagogue shootings “false flags” to merely have been scared: “They can’t fathom that there are brave White men alive who have the willpower and courage it takes to say, ‘Fuck my life—I’m willing to sacrifice everything for the benefit of my race.’”


Platform users deny that their platform has been used by mass shooters to publish their manifestos (T0129.006: Deny Involvement). | -| [I00126 Charming Kitten Updates POWERSTAR with an InterPlanetary Twist](../../generated_pages/incidents/I00126.md) | The target of the recently observed [highly targeted spearphishing attack by “Charming Kitten”, a hacker group attributed to Iran] had published an article related to Iran. The publicity appears to have garnered the attention of Charming Kitten, who subsequently created an email address to impersonate a reporter of an Israeli media organization in order to send the target an email. Prior to sending malware to the target, the attacker simply asked if the target would be open to reviewing a document they had written related to US foreign policy. The target agreed to do so, since this was not an unusual request; they are frequently asked by journalists to review opinion pieces relating to their field of work.

In an effort to further gain the target’s confidence, Charming Kitten continued the interaction with another benign email containing a list of questions, to which the target then responded with answers. After multiple days of benign and seemingly legitimate interaction, Charming Kitten finally sent a “draft report”; this was the first time anything opaquely malicious occurred. The “draft report” was, in fact, a password-protected RAR file containing a malicious LNK file. The password for the RAR file was provided in a subsequent email.


In this example, threat actors created an email address on a domain which impersonated an existing Israeli news organisation impersonating a reporter who worked there (T0097.102: Journalist Persona, T0097.202: News Outlet Persona, T0143.003: Impersonated Persona, T0149.003: Lookalike Domain, T0149.002: Email Domain) in order to convince the target to download a document containing malware (T0085.004: Develop Document, T0147.003: Malware). | +| [I00102 Ignore The Poway Synagogue Shooter’s Manifesto: Pay Attention To 8chan’s /pol/ Board](../../generated_pages/incidents/I00102.md) | On April 27, 2019, at around 11:30 a.m. local time, a young man with a semi-automatic rifle walked into the Chabad of Poway Synagogue in Poway, California. He opened fire, killing one worshipper and wounding three others. In the hours since the shooting, a manifesto, believed to be written by the shooter, began circulating online. Evidence has also surfaced that, like the Christchurch Mosque shooter, this killer began his rampage with a post on 8chan’s /pol/ board.

Although both of these attacks may seem different, since they targeted worshippers of different faiths, both shooters were united by the same fascist ideology. They were also both radicalized in the same place: 8chan’s /pol/ board.

This has been corroborated by posts on the board itself, where “anons,” as the posters call themselves, recirculated the shooter’s since-deleted post. In it, the alleged shooter claims to have been “lurking” on the site for a year and a half. He includes a link to a livestream of his rampage — which thankfully does not appear to have worked — and he also includes a pastebin link to his manifesto.

The very first response to his announcement was another anon cheering him on and telling him to “get the high score,” AKA, kill a huge number of people.


Before carrying out a mass shooting, the shooter posted a thread to 8chan’s /pol/ board. The post directed users to a variety of different platforms (T0146.006: Open Access Platform, T0151.012: Image Board Platform, T0115: Post Content, T0122: Direct Users to Alternative Platforms); a Facebook account on which the shooter attempted to livestream the shooting (T0146: Account Asset, T0151.001: Social Media Platform); and a manifesto they had written hosted on pastebin (T0146.006: Open Access Platform, T0152.005: Paste Platform, T0115: Post Content) and uploaded to the file sharing platform Mediafire (T0152.010: File Hosting Platform, T0085.004: Develop Document).

The report looks deeper into 8chan’s /pol/ board:

8chan is a large website, which includes a number of different discussion groups about everything from anime to left-wing politics. /pol/ is one particularly active board on the website, and it is best described as a gathering place for extremely online neo-Nazis.

[...]

I’ve browsed /pol/ on an almost daily basis since the Christchurch shooting. It has not been difficult to find calls for violence. On Monday, March 25 of this year, I ran across evidence of anons translating the Christchurch shooter’s manifesto into other languages in an attempt to inspire more shootings across the globe.

This tactic can work, and today’s shooting is proof. The Poway Synagogue shooter directly cited the Christchurch shooter as his inspiration, saying he decided to carry out his attack roughly two weeks after that shooting. On /pol/, many anons refer to the Christchurch shooter, Brenton Tarrant, as “Saint Tarrant,” complete with medieval-inspired iconography.


Manifestos posted to 8chan are translated and reshared by other platform users (T0101: Create Localised Content, T0146.006: Open Access Platform, T0151.012: Image Board Platform, T0115: Post Content, T0084.004: Appropriate Content).

When I began looking through /pol/ right after the Poway Synagogue shooting, I came across several claims that the shootings had been a “false flag” aimed at making the message board look bad.

When Bellingcat tweeted out a warning about shitposting and the shooter’s manifesto, in the immediate wake of the attack, probable anons even commented on the Tweet in an attempt to deny that a channer had been behind the attack.

This is a recognizable pattern that occurs in the wake of any crimes committed by members of the board. While the initial response to the Christchurch shooter’s massacre thread was riotous glee, in the days after the shooting many anons began to claim the attack had been a false flag. This actually sparked significant division and debate between the members of /pol/. In the below image, a user mocks other anons for being unable to “believe something in your favor is real.” Another anon responds, “As the evidence comes out, its [sic] quite clear that this was a false flag.”

In his manifesto, the Poway Synagogue shooter even weighed in on this debate, accusing other anons who called the Christchurch and Tree of Life Synagogue shootings “false flags” to merely have been scared: “They can’t fathom that there are brave White men alive who have the willpower and courage it takes to say, ‘Fuck my life—I’m willing to sacrifice everything for the benefit of my race.’”


Platform users deny that their platform has been used by mass shooters to publish their manifestos (T0129.006: Deny Involvement). | +| [I00126 Charming Kitten Updates POWERSTAR with an InterPlanetary Twist](../../generated_pages/incidents/I00126.md) | The target of the recently observed [highly targeted spearphishing attack by “Charming Kitten”, a hacker group attributed to Iran] had published an article related to Iran. The publicity appears to have garnered the attention of Charming Kitten, who subsequently created an email address to impersonate a reporter of an Israeli media organization in order to send the target an email. Prior to sending malware to the target, the attacker simply asked if the target would be open to reviewing a document they had written related to US foreign policy. The target agreed to do so, since this was not an unusual request; they are frequently asked by journalists to review opinion pieces relating to their field of work.

In an effort to further gain the target’s confidence, Charming Kitten continued the interaction with another benign email containing a list of questions, to which the target then responded with answers. After multiple days of benign and seemingly legitimate interaction, Charming Kitten finally sent a “draft report”; this was the first time anything opaquely malicious occurred. The “draft report” was, in fact, a password-protected RAR file containing a malicious LNK file. The password for the RAR file was provided in a subsequent email.


In this example, threat actors created an email address on a domain which impersonated an existing Israeli news organisation impersonating a reporter who worked there (T0097.102: Journalist Persona, T0097.202: News Outlet Persona, T0143.003: Impersonated Persona, T0149.003: Lookalike Domain, T0149.002: Email Domain Asset) in order to convince the target to download a document containing malware (T0085.004: Develop Document, T0147.003: Malware Asset). | diff --git a/generated_pages/techniques/T0085.005.md b/generated_pages/techniques/T0085.005.md index 0eac38b..f135efd 100644 --- a/generated_pages/techniques/T0085.005.md +++ b/generated_pages/techniques/T0085.005.md @@ -7,7 +7,7 @@ | Incident | Descriptions given for this incident | | -------- | -------------------- | -| [I00110 How COVID-19 conspiracists and extremists use crowdfunding platforms to fund their activities](../../generated_pages/incidents/I00110.md) | The EU Disinfo Lab produced a report into disinformation published on crowdfunding platforms:



More worrisome is the direct monetisation of disinformation happening on crowdfunding platforms: on Kickstarter, we found a user openly raising money for a documentary project suggesting that COVID-19 is a conspiracy.

A Kickstarter user attempted to use the platform to fund production of a documentary (T0017: Conduct Fundraising, T0087: Develop Video-Based Content, T0146: Account, T0148.006: Crowdfunding Platform).

On Patreon, we found several instances of direct monetisation of COVID-19 disinformation, including posts promoting a device allegedly protecting against COVID-19 and 5G, as well as posts related to the “Plandemic” conspiracy video, which gained attention on YouTube before being removed by the platform.

We also found an account called “Stranger than fiction” entirely dedicated to disinformation, which openly states that their content was “Banned by screwtube and fakebook, our videos have been viewed over a billion times.”


The “Stranger than fiction” user presented itself as an alternative news source which had been banned from other platforms (T0146: Account, T0097.202: News Outlet Persona, T0121.001: Bypass Content Bocking, T0152.012: Subscription Service Platform).

On the US-based crowdfunding platform IndieGogo, EU DisinfoLab found a successful crowdfunding campaign of €133.903 for a book called Revolution Q. This book, now also available on Amazon, claims to be “Written for both newcomers and long-time QAnon fans alike, this book is a treasure-trove of information designed to help everyone weather The Storm.”

An IndieGogo account was used to gather funds to produce a book on QAnon (T0017: Conduct Fundraising, T0085.005: Develop Book, T0146: Account, T0148.006: Crowdfunding Platform), with the book later sold on Amazon marketplace (T0148.007: eCommerce Platform). | +| [I00110 How COVID-19 conspiracists and extremists use crowdfunding platforms to fund their activities](../../generated_pages/incidents/I00110.md) | The EU Disinfo Lab produced a report into disinformation published on crowdfunding platforms:

More worrisome is the direct monetisation of disinformation happening on crowdfunding platforms: on Kickstarter, we found a user openly raising money for a documentary project suggesting that COVID-19 is a conspiracy.

A Kickstarter user attempted to use the platform to fund production of a documentary (T0017: Conduct Fundraising, T0087: Develop Video-Based Content, T0146: Account Asset, T0148.006: Crowdfunding Platform).

On Patreon, we found several instances of direct monetisation of COVID-19 disinformation, including posts promoting a device allegedly protecting against COVID-19 and 5G, as well as posts related to the “Plandemic” conspiracy video, which gained attention on YouTube before being removed by the platform.

We also found an account called “Stranger than fiction” entirely dedicated to disinformation, which openly states that their content was “Banned by screwtube and fakebook, our videos have been viewed over a billion times.”


The “Stranger than fiction” user presented itself as an alternative news source which had been banned from other platforms (T0146: Account Asset, T0097.202: News Outlet Persona, T0121.001: Bypass Content Bocking, T0152.012: Subscription Service Platform).

On the US-based crowdfunding platform IndieGogo, EU DisinfoLab found a successful crowdfunding campaign of €133.903 for a book called Revolution Q. This book, now also available on Amazon, claims to be “Written for both newcomers and long-time QAnon fans alike, this book is a treasure-trove of information designed to help everyone weather The Storm.”

An IndieGogo account was used to gather funds to produce a book on QAnon (T0017: Conduct Fundraising, T0085.005: Develop Book, T0146: Account Asset, T0148.006: Crowdfunding Platform), with the book later sold on Amazon marketplace (T0148.007: eCommerce Platform). | diff --git a/generated_pages/techniques/T0085.md b/generated_pages/techniques/T0085.md index b6823b5..bef3480 100644 --- a/generated_pages/techniques/T0085.md +++ b/generated_pages/techniques/T0085.md @@ -7,7 +7,7 @@ | Incident | Descriptions given for this incident | | -------- | -------------------- | -| [I00111 Patreon Is Bankrolling Climate Change Deniers While We All Burn](../../generated_pages/incidents/I00111.md) | In this article VICE News discusses a report produced by Advance Democracy on people who use Patreon to spread the false claim that an impending ice age will reverse the harms of the ongoing climate crisis:

“The spread of climate misinformation is prolific on social media, as well as on sites like Patreon, where users are actually financially compensated through the platform for spreading falsehoods,” Daniel Jones, president of Advance Democracy, told VICE News.

“Companies hosting and promoting climate misinformation have a responsibility to take action to reduce dangerous misinformation, as falsehoods about climate science are every bit as dangerous as lies about vaccinations and disinformation about our elections.”

Patreon did not respond to VICE News’ request for comment on the report’s findings.

One of the biggest accounts spreading climate conspiracies is ADAPT 2030, which is run by David DuByne, who has 1,100 followers on Patreon. He is currently making over $3,500 every month from his subscribers.

[The science DuByne relies on does not support his hypothesis. However,] this has not prevented DuByne and many others from preying on people’s fears about climate change to spread conspiracies about an impending ice age, which they say will miraculously fix all of earth’s climate problems.

DuByne offers seven different membership levels for supporters, beginning at just $1 per month.

The most expensive costs $100 a month, and gives patrons “a private 20-minute call with David DuByne once per month, to discuss your particular preparedness issues or concerns.” So far just two people are paying this amount.

The researchers also found at least eight other accounts on Patreon that have spread climate change conspiracy theories as part of wider conspiracy sharing, including baseless claims about COVID-19 and the legitimacy of Joe Biden’s presidency. Some of these accounts are earning over $600 per month.


David DuByne created an account on Patreon, which he uses to post text, videos, and podcasts for his subscribers to discuss (T0085: Develop Text-Based Content, T0087: Develop Video-Based Content, T0088: Develop Audio-Based Content, T0146: Account, T0115: Post Content, T0152.012: Subscription Service Platform, T0151.014: Comments Section, T0155.006: Subscription Access). | +| [I00111 Patreon Is Bankrolling Climate Change Deniers While We All Burn](../../generated_pages/incidents/I00111.md) | In this article VICE News discusses a report produced by Advance Democracy on people who use Patreon to spread the false claim that an impending ice age will reverse the harms of the ongoing climate crisis:

“The spread of climate misinformation is prolific on social media, as well as on sites like Patreon, where users are actually financially compensated through the platform for spreading falsehoods,” Daniel Jones, president of Advance Democracy, told VICE News.

“Companies hosting and promoting climate misinformation have a responsibility to take action to reduce dangerous misinformation, as falsehoods about climate science are every bit as dangerous as lies about vaccinations and disinformation about our elections.”

Patreon did not respond to VICE News’ request for comment on the report’s findings.

One of the biggest accounts spreading climate conspiracies is ADAPT 2030, which is run by David DuByne, who has 1,100 followers on Patreon. He is currently making over $3,500 every month from his subscribers.

[The science DuByne relies on does not support his hypothesis. However,] this has not prevented DuByne and many others from preying on people’s fears about climate change to spread conspiracies about an impending ice age, which they say will miraculously fix all of earth’s climate problems.

DuByne offers seven different membership levels for supporters, beginning at just $1 per month.

The most expensive costs $100 a month, and gives patrons “a private 20-minute call with David DuByne once per month, to discuss your particular preparedness issues or concerns.” So far just two people are paying this amount.

The researchers also found at least eight other accounts on Patreon that have spread climate change conspiracy theories as part of wider conspiracy sharing, including baseless claims about COVID-19 and the legitimacy of Joe Biden’s presidency. Some of these accounts are earning over $600 per month.


David DuByne created an account on Patreon, which he uses to post text, videos, and podcasts for his subscribers to discuss (T0085: Develop Text-Based Content, T0087: Develop Video-Based Content, T0088: Develop Audio-Based Content, T0146: Account Asset, T0115: Post Content, T0152.012: Subscription Service Platform, T0151.014: Comments Section, T0155.006: Subscription Access Asset). | diff --git a/generated_pages/techniques/T0086.002.md b/generated_pages/techniques/T0086.002.md index d0cac75..e10ef90 100644 --- a/generated_pages/techniques/T0086.002.md +++ b/generated_pages/techniques/T0086.002.md @@ -7,9 +7,9 @@ | Incident | Descriptions given for this incident | | -------- | -------------------- | -| [I00099 More Women Are Facing The Reality Of Deepfakes, And They’re Ruining Lives](../../generated_pages/incidents/I00099.md) | Last October, British writer Helen was alerted to a series of deepfakes on a porn site that appear to show her engaging in extreme acts of sexual violence. That night, the images replayed themselves over and over in horrific nightmares and she was gripped by an all-consuming feeling of dread. “It’s like you’re in a tunnel, going further and further into this enclosed space, where there’s no light,” she tells Vogue. This feeling pervaded Helen’s life. Whenever she left the house, she felt exposed. On runs, she experienced panic attacks. Helen still has no idea who did this to her.

[...]

Amnesty International has been investigating the effects of abuse against women on Twitter, specifically in relation to how they act online thereafter. According to the charity, abuse creates what they’ve called “the silencing effect” whereby women feel discouraged from participating online. The same can be said for victims of deepfakes.

Helen has never been afraid to use her voice, writing deeply personal accounts of postnatal depression. But the deepfakes created a feeling of shame so strong she thought she’d be carrying this “dirty secret” forever, and so she stopped writing.

[...]

Meanwhile, deepfake ‘communities’ are thriving. There are now dedicated sites, user-friendly apps and organised ‘request’ procedures. Some sites allow you to commission custom deepfakes for £25, while on others you can upload a woman’s image and a bot will strip her naked.

“This violation is not something that should be normalised,” says Gibi, an ASMR artist with 3.13 million YouTube subscribers. Gibi has given up trying to keep tabs on the deepfakes of her. For Gibi, the most egregious part of all of this is the fact that people are “profiting off my face, doing something that I didn’t consent to, like my suffering is your livelihood.” She’s even been approached by a company offering to remove the deepfakes — for £500 a video. This has to end. But how?


A website hosting pornographic content provided users the ability to create deepfake content (T0154.002: AI Media Platform, T0086.002: Develop AI-Generated Images (Deepfakes)).

Another website enabled users to commission custom deepfakes (T0152.004: Website, T0148.004: Payment Processing Capability, T0086.002: Develop AI-Generated Images (Deepfakes), T0155.005: Paid Access). | +| [I00099 More Women Are Facing The Reality Of Deepfakes, And They’re Ruining Lives](../../generated_pages/incidents/I00099.md) | Last October, British writer Helen was alerted to a series of deepfakes on a porn site that appear to show her engaging in extreme acts of sexual violence. That night, the images replayed themselves over and over in horrific nightmares and she was gripped by an all-consuming feeling of dread. “It’s like you’re in a tunnel, going further and further into this enclosed space, where there’s no light,” she tells Vogue. This feeling pervaded Helen’s life. Whenever she left the house, she felt exposed. On runs, she experienced panic attacks. Helen still has no idea who did this to her.

[...]

Amnesty International has been investigating the effects of abuse against women on Twitter, specifically in relation to how they act online thereafter. According to the charity, abuse creates what they’ve called “the silencing effect” whereby women feel discouraged from participating online. The same can be said for victims of deepfakes.

Helen has never been afraid to use her voice, writing deeply personal accounts of postnatal depression. But the deepfakes created a feeling of shame so strong she thought she’d be carrying this “dirty secret” forever, and so she stopped writing.

[...]

Meanwhile, deepfake ‘communities’ are thriving. There are now dedicated sites, user-friendly apps and organised ‘request’ procedures. Some sites allow you to commission custom deepfakes for £25, while on others you can upload a woman’s image and a bot will strip her naked.

“This violation is not something that should be normalised,” says Gibi, an ASMR artist with 3.13 million YouTube subscribers. Gibi has given up trying to keep tabs on the deepfakes of her. For Gibi, the most egregious part of all of this is the fact that people are “profiting off my face, doing something that I didn’t consent to, like my suffering is your livelihood.” She’s even been approached by a company offering to remove the deepfakes — for £500 a video. This has to end. But how?


A website hosting pornographic content provided users the ability to create deepfake content (T0154.002: AI Media Platform, T0086.002: Develop AI-Generated Images (Deepfakes)).

Another website enabled users to commission custom deepfakes (T0152.004: Website Asset, T0148.004: Payment Processing Capability, T0086.002: Develop AI-Generated Images (Deepfakes), T0155.005: Paid Access Asset). | | [I00100 Why ThisPersonDoesNotExist (and its copycats) need to be restricted](../../generated_pages/incidents/I00100.md) | You might have heard about the recent viral sensation, ThisPersonDoesNotExist.com, a website, launched two weeks ago, that uses Nvidia’s publicly available artificial intelligence technology to draw an invented, photo-realistic human being with each refresh. The tech is impressive and artistically evocative. It’s also irresponsible and needs to be restricted immediately.

[...]

Prior to this technology, scammers faced three major risks when using fake photos. Each of these risks had the potential to put them out business, or in jail.

Risk #1: Someone recognizes the photo. While the odds of this are long-shot, it does happen.

Risk #2: Someone reverse image searches the photo with a service like TinEye or Google Image Search and finds that it’s been posted elsewhere. Reverse image search is one of the top anti-fraud measures recommended by consumer protection advocates.

Risk #3: If the crime is successful, law enforcement uses the fake photo to figure out the scammer’s identity after the fact. Perhaps the scammer used an old classmate’s photo. Perhaps their personal account follows the Instagram member they pilfered. And so on: people make mistakes.

The problem with AI-generated photos is that they carry none of these risks. No one will recognize a human who’s never existed before. Google Image Search will return 0 results, possibly instilling a false sense of security in the searcher. And AI-generated photos don’t give law enforcement much to work with.


ThisPersonDoesNotExist is an online platform which, when visited, produces AI generated images of peoples’ faces (T0146.006: Open Access Platform, T0154.002: AI Media Platform, T0086.002: Develop AI-Generated Images (Deepfakes)). | -| [I00106 Facebook Is Being Flooded With Gross AI-Generated Images of Hurricane Helene Devastation](../../generated_pages/incidents/I00106.md) | As families desperately seek to find missing loved ones and communities grapple with immeasurable losses of both life and property in the wake of [2024’s] Hurricane Helene, AI slop scammers appear to be capitalizing on the moment for personal gain.

A Facebook account called "Coastal Views" usually shares calmer AI imagery of nature-filled beachside scenes. The account's banner image showcases a signpost reading "OBX Live," OBX being shorthand for North Carolina's Outer Banks islands.

But starting this weekend, the account shifted its approach dramatically, as first flagged by a social media user on X.

Instead of posting "photos" of leaping dolphins and sandy beaches, the account suddenly started publishing images of flooded mountain neighborhoods, submerged houses, and dogs sitting on top of roofs.

But instead of spreading vital information to those affected by the natural disaster, or at the very least sharing real photos of the destruction, the account is seemingly trying to use AI to cash in on all the attention the hurricane has been getting.

The account links to an Etsy page for a business called" OuterBanks2023," where somebody who goes by "Alexandr" sells AI-generated prints of horses touching snouts with sea turtles, Santa running down the shoreline with a reindeer, and sunsets over ocean waves.


A Facebook page which presented itself as being associated with North Carolina which posted AI generated images changed to posting AI generated images of hurricane damage after Hurricane Helene hit North Carolina (T0151.003: Online Community Page, T0151.001: Social Media Platform, T0115: Post Content, T0086.002: Develop AI-Generated Images (Deepfakes), T0068: Respond to Breaking News Event or Active Crisis).

The account included links (T0122: Direct Users to Alternative Platforms) to an account on Etsy, which sold prints of AI generated images (T0146: Account, T0148.007: eCommerce Platform). | +| [I00106 Facebook Is Being Flooded With Gross AI-Generated Images of Hurricane Helene Devastation](../../generated_pages/incidents/I00106.md) | As families desperately seek to find missing loved ones and communities grapple with immeasurable losses of both life and property in the wake of [2024’s] Hurricane Helene, AI slop scammers appear to be capitalizing on the moment for personal gain.

A Facebook account called "Coastal Views" usually shares calmer AI imagery of nature-filled beachside scenes. The account's banner image showcases a signpost reading "OBX Live," OBX being shorthand for North Carolina's Outer Banks islands.

But starting this weekend, the account shifted its approach dramatically, as first flagged by a social media user on X.

Instead of posting "photos" of leaping dolphins and sandy beaches, the account suddenly started publishing images of flooded mountain neighborhoods, submerged houses, and dogs sitting on top of roofs.

But instead of spreading vital information to those affected by the natural disaster, or at the very least sharing real photos of the destruction, the account is seemingly trying to use AI to cash in on all the attention the hurricane has been getting.

The account links to an Etsy page for a business called" OuterBanks2023," where somebody who goes by "Alexandr" sells AI-generated prints of horses touching snouts with sea turtles, Santa running down the shoreline with a reindeer, and sunsets over ocean waves.


A Facebook page which presented itself as being associated with North Carolina which posted AI generated images changed to posting AI generated images of hurricane damage after Hurricane Helene hit North Carolina (T0151.003: Online Community Page, T0151.001: Social Media Platform, T0115: Post Content, T0086.002: Develop AI-Generated Images (Deepfakes), T0068: Respond to Breaking News Event or Active Crisis).

The account included links (T0122: Direct Users to Alternative Platforms) to an account on Etsy, which sold prints of AI generated images (T0146: Account Asset, T0148.007: eCommerce Platform). | diff --git a/generated_pages/techniques/T0087.001.md b/generated_pages/techniques/T0087.001.md index 5840254..d775f9a 100644 --- a/generated_pages/techniques/T0087.001.md +++ b/generated_pages/techniques/T0087.001.md @@ -7,7 +7,7 @@ | Incident | Descriptions given for this incident | | -------- | -------------------- | -| [I00096 China ramps up use of AI misinformation](../../generated_pages/incidents/I00096.md) | The Microsoft Threat Analysis Centre (MTAC) published a report documenting the use of AI by pro-Chinese threat actors:

On 13 January, Spamouflage [(a Pro-Chinese Communist Party actor)] posted audio clips to YouTube of independent candidate [for Taiwan’s Jan 2024 presidential election] Terry Gou – who also founded electronics giant Foxconn – in which Gou endorsed another candidate in the race. This clip was almost certainly AI-generated, and it was swiftly removed by YouTube. A fake letter purporting to be from Gou, endorsing the same candidate, had already circulated – Gou had of course made no such endorsement.

Here Spamoflage used an account on YouTube to post AI Generated audio impersonating an electoral candidate (T0146: Account, T0152.006: Video Platform, T0115: Post Content, T0088.001: Develop AI-Generated Audio (Deepfakes), T0143.003: Impersonated Persona, T0097.110: Party Official Persona).

Spamouflage also exploited AI-powered video platform CapCut – which is owned by TikTok backers ByteDance – to generate fake news anchors which were used in a variety of campaigns targeting the various presidential candidates in Taiwan.

Spamoflage created accounts on CapCut, which it used to create AI-generated videos of fabricated news anchors (T0146: Account, T0154.002: AI Media Platform, T0087.001: Develop AI-Generated Video (Deepfakes), T0143.002: Fabricated Persona, T0097.102: Journalist Persona). | +| [I00096 China ramps up use of AI misinformation](../../generated_pages/incidents/I00096.md) | The Microsoft Threat Analysis Centre (MTAC) published a report documenting the use of AI by pro-Chinese threat actors:

On 13 January, Spamouflage [(a Pro-Chinese Communist Party actor)] posted audio clips to YouTube of independent candidate [for Taiwan’s Jan 2024 presidential election] Terry Gou – who also founded electronics giant Foxconn – in which Gou endorsed another candidate in the race. This clip was almost certainly AI-generated, and it was swiftly removed by YouTube. A fake letter purporting to be from Gou, endorsing the same candidate, had already circulated – Gou had of course made no such endorsement.

Here Spamoflage used an account on YouTube to post AI Generated audio impersonating an electoral candidate (T0146: Account Asset, T0152.006: Video Platform, T0115: Post Content, T0088.001: Develop AI-Generated Audio (Deepfakes), T0143.003: Impersonated Persona, T0097.110: Party Official Persona).

Spamouflage also exploited AI-powered video platform CapCut – which is owned by TikTok backers ByteDance – to generate fake news anchors which were used in a variety of campaigns targeting the various presidential candidates in Taiwan.

Spamoflage created accounts on CapCut, which it used to create AI-generated videos of fabricated news anchors (T0146: Account Asset, T0154.002: AI Media Platform, T0087.001: Develop AI-Generated Video (Deepfakes), T0143.002: Fabricated Persona, T0097.102: Journalist Persona). | diff --git a/generated_pages/techniques/T0087.md b/generated_pages/techniques/T0087.md index 0a52269..8a3e45b 100644 --- a/generated_pages/techniques/T0087.md +++ b/generated_pages/techniques/T0087.md @@ -7,9 +7,9 @@ | Incident | Descriptions given for this incident | | -------- | -------------------- | -| [I00110 How COVID-19 conspiracists and extremists use crowdfunding platforms to fund their activities](../../generated_pages/incidents/I00110.md) | The EU Disinfo Lab produced a report into disinformation published on crowdfunding platforms:



More worrisome is the direct monetisation of disinformation happening on crowdfunding platforms: on Kickstarter, we found a user openly raising money for a documentary project suggesting that COVID-19 is a conspiracy.

A Kickstarter user attempted to use the platform to fund production of a documentary (T0017: Conduct Fundraising, T0087: Develop Video-Based Content, T0146: Account, T0148.006: Crowdfunding Platform).

On Patreon, we found several instances of direct monetisation of COVID-19 disinformation, including posts promoting a device allegedly protecting against COVID-19 and 5G, as well as posts related to the “Plandemic” conspiracy video, which gained attention on YouTube before being removed by the platform.

We also found an account called “Stranger than fiction” entirely dedicated to disinformation, which openly states that their content was “Banned by screwtube and fakebook, our videos have been viewed over a billion times.”


The “Stranger than fiction” user presented itself as an alternative news source which had been banned from other platforms (T0146: Account, T0097.202: News Outlet Persona, T0121.001: Bypass Content Bocking, T0152.012: Subscription Service Platform).

On the US-based crowdfunding platform IndieGogo, EU DisinfoLab found a successful crowdfunding campaign of €133.903 for a book called Revolution Q. This book, now also available on Amazon, claims to be “Written for both newcomers and long-time QAnon fans alike, this book is a treasure-trove of information designed to help everyone weather The Storm.”

An IndieGogo account was used to gather funds to produce a book on QAnon (T0017: Conduct Fundraising, T0085.005: Develop Book, T0146: Account, T0148.006: Crowdfunding Platform), with the book later sold on Amazon marketplace (T0148.007: eCommerce Platform). | -| [I00111 Patreon Is Bankrolling Climate Change Deniers While We All Burn](../../generated_pages/incidents/I00111.md) | In this article VICE News discusses a report produced by Advance Democracy on people who use Patreon to spread the false claim that an impending ice age will reverse the harms of the ongoing climate crisis:

“The spread of climate misinformation is prolific on social media, as well as on sites like Patreon, where users are actually financially compensated through the platform for spreading falsehoods,” Daniel Jones, president of Advance Democracy, told VICE News.

“Companies hosting and promoting climate misinformation have a responsibility to take action to reduce dangerous misinformation, as falsehoods about climate science are every bit as dangerous as lies about vaccinations and disinformation about our elections.”

Patreon did not respond to VICE News’ request for comment on the report’s findings.

One of the biggest accounts spreading climate conspiracies is ADAPT 2030, which is run by David DuByne, who has 1,100 followers on Patreon. He is currently making over $3,500 every month from his subscribers.

[The science DuByne relies on does not support his hypothesis. However,] this has not prevented DuByne and many others from preying on people’s fears about climate change to spread conspiracies about an impending ice age, which they say will miraculously fix all of earth’s climate problems.

DuByne offers seven different membership levels for supporters, beginning at just $1 per month.

The most expensive costs $100 a month, and gives patrons “a private 20-minute call with David DuByne once per month, to discuss your particular preparedness issues or concerns.” So far just two people are paying this amount.

The researchers also found at least eight other accounts on Patreon that have spread climate change conspiracy theories as part of wider conspiracy sharing, including baseless claims about COVID-19 and the legitimacy of Joe Biden’s presidency. Some of these accounts are earning over $600 per month.


David DuByne created an account on Patreon, which he uses to post text, videos, and podcasts for his subscribers to discuss (T0085: Develop Text-Based Content, T0087: Develop Video-Based Content, T0088: Develop Audio-Based Content, T0146: Account, T0115: Post Content, T0152.012: Subscription Service Platform, T0151.014: Comments Section, T0155.006: Subscription Access). | -| [I00125 The Agency](../../generated_pages/incidents/I00125.md) | In 2014 threat actors attributed to Russia spread the false narrative that a local chemical plant had leaked toxic fumes. This report discusses aspects of the operation:

[The chemical plant leak] hoax was just one in a wave of similar attacks during the second half of last year. On Dec. 13, two months after a handful of Ebola cases in the United States touched off a minor media panic, many of the same Twitter accounts used to spread the Columbian Chemicals hoax began to post about an outbreak of Ebola in Atlanta. [...] Again, the attention to detail was remarkable, suggesting a tremendous amount of effort. A YouTube video showed a team of hazmat-suited medical workers transporting a victim from the airport. Beyoncé’s recent single “7/11” played in the background, an apparent attempt to establish the video’s contemporaneity. A truck in the parking lot sported the logo of the Hartsfield-Jackson Atlanta International Airport.

Accounts which previously presented as Louisiana locals were repurposed for use in a different campaign, this time presenting as locals to Atlanta, a place over 500 miles away from Louisiana and in a different timezone (T0146: Account, T0097.101: Local Persona, T0143.002: Fabricated Persona, T0151.008: Microblogging Platform, T0150.004: Repurposed).

A video was created which appeared to support the campaign’s narrative (T0087: Develop Video-Based Content), with great attention given to small details which made the video appear more legitimate. | +| [I00110 How COVID-19 conspiracists and extremists use crowdfunding platforms to fund their activities](../../generated_pages/incidents/I00110.md) | The EU Disinfo Lab produced a report into disinformation published on crowdfunding platforms:

More worrisome is the direct monetisation of disinformation happening on crowdfunding platforms: on Kickstarter, we found a user openly raising money for a documentary project suggesting that COVID-19 is a conspiracy.

A Kickstarter user attempted to use the platform to fund production of a documentary (T0017: Conduct Fundraising, T0087: Develop Video-Based Content, T0146: Account Asset, T0148.006: Crowdfunding Platform).

On Patreon, we found several instances of direct monetisation of COVID-19 disinformation, including posts promoting a device allegedly protecting against COVID-19 and 5G, as well as posts related to the “Plandemic” conspiracy video, which gained attention on YouTube before being removed by the platform.

We also found an account called “Stranger than fiction” entirely dedicated to disinformation, which openly states that their content was “Banned by screwtube and fakebook, our videos have been viewed over a billion times.”


The “Stranger than fiction” user presented itself as an alternative news source which had been banned from other platforms (T0146: Account Asset, T0097.202: News Outlet Persona, T0121.001: Bypass Content Bocking, T0152.012: Subscription Service Platform).

On the US-based crowdfunding platform IndieGogo, EU DisinfoLab found a successful crowdfunding campaign of €133.903 for a book called Revolution Q. This book, now also available on Amazon, claims to be “Written for both newcomers and long-time QAnon fans alike, this book is a treasure-trove of information designed to help everyone weather The Storm.”

An IndieGogo account was used to gather funds to produce a book on QAnon (T0017: Conduct Fundraising, T0085.005: Develop Book, T0146: Account Asset, T0148.006: Crowdfunding Platform), with the book later sold on Amazon marketplace (T0148.007: eCommerce Platform). | +| [I00111 Patreon Is Bankrolling Climate Change Deniers While We All Burn](../../generated_pages/incidents/I00111.md) | In this article VICE News discusses a report produced by Advance Democracy on people who use Patreon to spread the false claim that an impending ice age will reverse the harms of the ongoing climate crisis:

“The spread of climate misinformation is prolific on social media, as well as on sites like Patreon, where users are actually financially compensated through the platform for spreading falsehoods,” Daniel Jones, president of Advance Democracy, told VICE News.

“Companies hosting and promoting climate misinformation have a responsibility to take action to reduce dangerous misinformation, as falsehoods about climate science are every bit as dangerous as lies about vaccinations and disinformation about our elections.”

Patreon did not respond to VICE News’ request for comment on the report’s findings.

One of the biggest accounts spreading climate conspiracies is ADAPT 2030, which is run by David DuByne, who has 1,100 followers on Patreon. He is currently making over $3,500 every month from his subscribers.

[The science DuByne relies on does not support his hypothesis. However,] this has not prevented DuByne and many others from preying on people’s fears about climate change to spread conspiracies about an impending ice age, which they say will miraculously fix all of earth’s climate problems.

DuByne offers seven different membership levels for supporters, beginning at just $1 per month.

The most expensive costs $100 a month, and gives patrons “a private 20-minute call with David DuByne once per month, to discuss your particular preparedness issues or concerns.” So far just two people are paying this amount.

The researchers also found at least eight other accounts on Patreon that have spread climate change conspiracy theories as part of wider conspiracy sharing, including baseless claims about COVID-19 and the legitimacy of Joe Biden’s presidency. Some of these accounts are earning over $600 per month.


David DuByne created an account on Patreon, which he uses to post text, videos, and podcasts for his subscribers to discuss (T0085: Develop Text-Based Content, T0087: Develop Video-Based Content, T0088: Develop Audio-Based Content, T0146: Account Asset, T0115: Post Content, T0152.012: Subscription Service Platform, T0151.014: Comments Section, T0155.006: Subscription Access Asset). | +| [I00125 The Agency](../../generated_pages/incidents/I00125.md) | In 2014 threat actors attributed to Russia spread the false narrative that a local chemical plant had leaked toxic fumes. This report discusses aspects of the operation:

[The chemical plant leak] hoax was just one in a wave of similar attacks during the second half of last year. On Dec. 13, two months after a handful of Ebola cases in the United States touched off a minor media panic, many of the same Twitter accounts used to spread the Columbian Chemicals hoax began to post about an outbreak of Ebola in Atlanta. [...] Again, the attention to detail was remarkable, suggesting a tremendous amount of effort. A YouTube video showed a team of hazmat-suited medical workers transporting a victim from the airport. Beyoncé’s recent single “7/11” played in the background, an apparent attempt to establish the video’s contemporaneity. A truck in the parking lot sported the logo of the Hartsfield-Jackson Atlanta International Airport.

Accounts which previously presented as Louisiana locals were repurposed for use in a different campaign, this time presenting as locals to Atlanta, a place over 500 miles away from Louisiana and in a different timezone (T0146: Account Asset, T0097.101: Local Persona, T0143.002: Fabricated Persona, T0151.008: Microblogging Platform, T0150.004: Repurposed Asset).

A video was created which appeared to support the campaign’s narrative (T0087: Develop Video-Based Content), with great attention given to small details which made the video appear more legitimate. | diff --git a/generated_pages/techniques/T0088.001.md b/generated_pages/techniques/T0088.001.md index 0598dc5..61d9d13 100644 --- a/generated_pages/techniques/T0088.001.md +++ b/generated_pages/techniques/T0088.001.md @@ -8,8 +8,8 @@ | Incident | Descriptions given for this incident | | -------- | -------------------- | | [I00068 Attempted Audio Deepfake Call Targets LastPass Employee](../../generated_pages/incidents/I00068.md) | “While reports of [...] deepfake calls targeting private companies are luckily still rare, LastPass itself experienced a deepfake attempt earlier today that we are sharing with the larger community to help raise awareness that this tactic is spreading and all companies should be on the alert. In our case, an employee received a series of calls, texts, and at least one voicemail featuring an audio deepfake from a threat actor impersonating our CEO via WhatsApp. As the attempted communication was outside of normal business communication channels and due to the employee’s suspicion regarding the presence of many of the hallmarks of a social engineering attempt (such as forced urgency), our employee rightly ignored the messages and reported the incident to our internal security team so that we could take steps to both mitigate the threat and raise awareness of the tactic both internally and externally.”

In this example attackers impersonated the CEO of LastPass (T0097.100: Individual Persona, T0143.003: Impersonated Persona), targeting one of its employees over WhatsApp (T0151.004: Chat Platform,T0155.007: Encrypted Communication Channel) using deepfaked audio (T0088.001: Develop AI-Generated Audio (Deepfakes)). | -| [I00096 China ramps up use of AI misinformation](../../generated_pages/incidents/I00096.md) | The Microsoft Threat Analysis Centre (MTAC) published a report documenting the use of AI by pro-Chinese threat actors:

On 13 January, Spamouflage [(a Pro-Chinese Communist Party actor)] posted audio clips to YouTube of independent candidate [for Taiwan’s Jan 2024 presidential election] Terry Gou – who also founded electronics giant Foxconn – in which Gou endorsed another candidate in the race. This clip was almost certainly AI-generated, and it was swiftly removed by YouTube. A fake letter purporting to be from Gou, endorsing the same candidate, had already circulated – Gou had of course made no such endorsement.

Here Spamoflage used an account on YouTube to post AI Generated audio impersonating an electoral candidate (T0146: Account, T0152.006: Video Platform, T0115: Post Content, T0088.001: Develop AI-Generated Audio (Deepfakes), T0143.003: Impersonated Persona, T0097.110: Party Official Persona).

Spamouflage also exploited AI-powered video platform CapCut – which is owned by TikTok backers ByteDance – to generate fake news anchors which were used in a variety of campaigns targeting the various presidential candidates in Taiwan.

Spamoflage created accounts on CapCut, which it used to create AI-generated videos of fabricated news anchors (T0146: Account, T0154.002: AI Media Platform, T0087.001: Develop AI-Generated Video (Deepfakes), T0143.002: Fabricated Persona, T0097.102: Journalist Persona). | -| [I00103 The racist AI deepfake that fooled and divided a community](../../generated_pages/incidents/I00103.md) | “I seriously don't understand why I have to constantly put up with these dumbasses here every day.”

So began what appeared to be a long tirade from the principal of Pikesville High School, punctuated with racist, antisemitic and offensive tropes. It sounded like it had been secretly recorded.

The speaker went on to bemoan “ungrateful black kids” and Jewish people in the community.

The clip, first posted in [January 2024], went viral nationally. But it really struck a nerve in the peaceful, leafy suburb of Pikesville, which has large black and Jewish populations, and in the nearby city of Baltimore, Maryland. Principal Eric Eiswert was put on paid administrative leave pending an investigation.

[...]

But what those sharing the clip didn’t realise at the time was that another bombshell was about to drop: the clip was an AI-generated fake.

[...]

[In April 2024], Baltimore Police Chief Robert McCullough confirmed they now had “conclusive evidence that the recording was not authentic”.

And they believed they knew who made the fake.

Police charged 31-year-old Dazhon Darien, the school’s athletics director, with several counts related to the fake video. Charges included theft, retaliating against a witness and stalking.

He was arrested at the airport, where police say he was planning to fly to Houston, Texas.

Police say that Mr Darien had been under investigation by Principal Eiswert over an alleged theft of $1,916 (£1,460) from the school. They also allege there had been “work performance challenges” and his contract was likely not to be renewed.

Their theory was that by creating the deepfake recording, he hoped to discredit the principal before he could be fired.

Investigators say they traced an email used to send the original video to a server connected to Mr Darien, and allege that he used Baltimore County Public Schools' computer network to access AI tools. He is due to stand trial in December 2024.


By associating Mr Darien to the server used to email the original AI generated audio, investigators link Darien to the fabricated content (T0149.005: Server, T0088.001: AI Generated Audio (Deepfakes)). They also assert that Darien used computers owned by the school to access platforms used to generate the audio (T0146: Account, T0154.002: AI Media Platform). | +| [I00096 China ramps up use of AI misinformation](../../generated_pages/incidents/I00096.md) | The Microsoft Threat Analysis Centre (MTAC) published a report documenting the use of AI by pro-Chinese threat actors:

On 13 January, Spamouflage [(a Pro-Chinese Communist Party actor)] posted audio clips to YouTube of independent candidate [for Taiwan’s Jan 2024 presidential election] Terry Gou – who also founded electronics giant Foxconn – in which Gou endorsed another candidate in the race. This clip was almost certainly AI-generated, and it was swiftly removed by YouTube. A fake letter purporting to be from Gou, endorsing the same candidate, had already circulated – Gou had of course made no such endorsement.

Here Spamoflage used an account on YouTube to post AI Generated audio impersonating an electoral candidate (T0146: Account Asset, T0152.006: Video Platform, T0115: Post Content, T0088.001: Develop AI-Generated Audio (Deepfakes), T0143.003: Impersonated Persona, T0097.110: Party Official Persona).

Spamouflage also exploited AI-powered video platform CapCut – which is owned by TikTok backers ByteDance – to generate fake news anchors which were used in a variety of campaigns targeting the various presidential candidates in Taiwan.

Spamoflage created accounts on CapCut, which it used to create AI-generated videos of fabricated news anchors (T0146: Account Asset, T0154.002: AI Media Platform, T0087.001: Develop AI-Generated Video (Deepfakes), T0143.002: Fabricated Persona, T0097.102: Journalist Persona). | +| [I00103 The racist AI deepfake that fooled and divided a community](../../generated_pages/incidents/I00103.md) | “I seriously don't understand why I have to constantly put up with these dumbasses here every day.”

So began what appeared to be a long tirade from the principal of Pikesville High School, punctuated with racist, antisemitic and offensive tropes. It sounded like it had been secretly recorded.

The speaker went on to bemoan “ungrateful black kids” and Jewish people in the community.

The clip, first posted in [January 2024], went viral nationally. But it really struck a nerve in the peaceful, leafy suburb of Pikesville, which has large black and Jewish populations, and in the nearby city of Baltimore, Maryland. Principal Eric Eiswert was put on paid administrative leave pending an investigation.

[...]

But what those sharing the clip didn’t realise at the time was that another bombshell was about to drop: the clip was an AI-generated fake.

[...]

[In April 2024], Baltimore Police Chief Robert McCullough confirmed they now had “conclusive evidence that the recording was not authentic”.

And they believed they knew who made the fake.

Police charged 31-year-old Dazhon Darien, the school’s athletics director, with several counts related to the fake video. Charges included theft, retaliating against a witness and stalking.

He was arrested at the airport, where police say he was planning to fly to Houston, Texas.

Police say that Mr Darien had been under investigation by Principal Eiswert over an alleged theft of $1,916 (£1,460) from the school. They also allege there had been “work performance challenges” and his contract was likely not to be renewed.

Their theory was that by creating the deepfake recording, he hoped to discredit the principal before he could be fired.

Investigators say they traced an email used to send the original video to a server connected to Mr Darien, and allege that he used Baltimore County Public Schools' computer network to access AI tools. He is due to stand trial in December 2024.


By associating Mr Darien to the server used to email the original AI generated audio, investigators link Darien to the fabricated content (T0149.005: Server Asset, T0088.001: AI Generated Audio (Deepfakes)). They also assert that Darien used computers owned by the school to access platforms used to generate the audio (T0146: Account Asset, T0154.002: AI Media Platform). | diff --git a/generated_pages/techniques/T0088.md b/generated_pages/techniques/T0088.md index 962e313..f2b93a6 100644 --- a/generated_pages/techniques/T0088.md +++ b/generated_pages/techniques/T0088.md @@ -7,7 +7,7 @@ | Incident | Descriptions given for this incident | | -------- | -------------------- | -| [I00111 Patreon Is Bankrolling Climate Change Deniers While We All Burn](../../generated_pages/incidents/I00111.md) | In this article VICE News discusses a report produced by Advance Democracy on people who use Patreon to spread the false claim that an impending ice age will reverse the harms of the ongoing climate crisis:

“The spread of climate misinformation is prolific on social media, as well as on sites like Patreon, where users are actually financially compensated through the platform for spreading falsehoods,” Daniel Jones, president of Advance Democracy, told VICE News.

“Companies hosting and promoting climate misinformation have a responsibility to take action to reduce dangerous misinformation, as falsehoods about climate science are every bit as dangerous as lies about vaccinations and disinformation about our elections.”

Patreon did not respond to VICE News’ request for comment on the report’s findings.

One of the biggest accounts spreading climate conspiracies is ADAPT 2030, which is run by David DuByne, who has 1,100 followers on Patreon. He is currently making over $3,500 every month from his subscribers.

[The science DuByne relies on does not support his hypothesis. However,] this has not prevented DuByne and many others from preying on people’s fears about climate change to spread conspiracies about an impending ice age, which they say will miraculously fix all of earth’s climate problems.

DuByne offers seven different membership levels for supporters, beginning at just $1 per month.

The most expensive costs $100 a month, and gives patrons “a private 20-minute call with David DuByne once per month, to discuss your particular preparedness issues or concerns.” So far just two people are paying this amount.

The researchers also found at least eight other accounts on Patreon that have spread climate change conspiracy theories as part of wider conspiracy sharing, including baseless claims about COVID-19 and the legitimacy of Joe Biden’s presidency. Some of these accounts are earning over $600 per month.


David DuByne created an account on Patreon, which he uses to post text, videos, and podcasts for his subscribers to discuss (T0085: Develop Text-Based Content, T0087: Develop Video-Based Content, T0088: Develop Audio-Based Content, T0146: Account, T0115: Post Content, T0152.012: Subscription Service Platform, T0151.014: Comments Section, T0155.006: Subscription Access). | +| [I00111 Patreon Is Bankrolling Climate Change Deniers While We All Burn](../../generated_pages/incidents/I00111.md) | In this article VICE News discusses a report produced by Advance Democracy on people who use Patreon to spread the false claim that an impending ice age will reverse the harms of the ongoing climate crisis:

“The spread of climate misinformation is prolific on social media, as well as on sites like Patreon, where users are actually financially compensated through the platform for spreading falsehoods,” Daniel Jones, president of Advance Democracy, told VICE News.

“Companies hosting and promoting climate misinformation have a responsibility to take action to reduce dangerous misinformation, as falsehoods about climate science are every bit as dangerous as lies about vaccinations and disinformation about our elections.”

Patreon did not respond to VICE News’ request for comment on the report’s findings.

One of the biggest accounts spreading climate conspiracies is ADAPT 2030, which is run by David DuByne, who has 1,100 followers on Patreon. He is currently making over $3,500 every month from his subscribers.

[The science DuByne relies on does not support his hypothesis. However,] this has not prevented DuByne and many others from preying on people’s fears about climate change to spread conspiracies about an impending ice age, which they say will miraculously fix all of earth’s climate problems.

DuByne offers seven different membership levels for supporters, beginning at just $1 per month.

The most expensive costs $100 a month, and gives patrons “a private 20-minute call with David DuByne once per month, to discuss your particular preparedness issues or concerns.” So far just two people are paying this amount.

The researchers also found at least eight other accounts on Patreon that have spread climate change conspiracy theories as part of wider conspiracy sharing, including baseless claims about COVID-19 and the legitimacy of Joe Biden’s presidency. Some of these accounts are earning over $600 per month.


David DuByne created an account on Patreon, which he uses to post text, videos, and podcasts for his subscribers to discuss (T0085: Develop Text-Based Content, T0087: Develop Video-Based Content, T0088: Develop Audio-Based Content, T0146: Account Asset, T0115: Post Content, T0152.012: Subscription Service Platform, T0151.014: Comments Section, T0155.006: Subscription Access Asset). | diff --git a/generated_pages/techniques/T0089.001.md b/generated_pages/techniques/T0089.001.md index a958d45..7663820 100644 --- a/generated_pages/techniques/T0089.001.md +++ b/generated_pages/techniques/T0089.001.md @@ -7,7 +7,7 @@ | Incident | Descriptions given for this incident | | -------- | -------------------- | -| [I00118 ‘War Thunder’ players are once again leaking sensitive military technology information on a video game forum](../../generated_pages/incidents/I00118.md) | In an effort to prove that the developers behind a popular multiplayer vehicle combat game had made a mistake, a player went ahead and published classified British military documents about one of the real-life tanks featured in the game.

This truly bizarre turn of events recently occurred in the public forum for War Thunder, a free-to-player multiplayer combat sim featuring modern land, air, and sea craft. Getting a small detail wrong on a piece of equipment might not be a big deal for the average gamer, but for the War Thunder crowd it sure as hell is. With 25,000 devoted players, the game very much bills itself as the military vehicle combat simulator.

A player, who identified himself as a British tank commander, claimed that the game’s developers at Gaijin Entertainment had inaccurately represented the Challenger 2 main battle tank used by the British military.

The self-described tank commander’s bio listed his location as Tidworth Camp in Wiltshire, England, according to the UK Defense Journal, which reported that the base is home to the Royal Tank Regiment, which fields Challenger 2 tanks.

The player, who went by the handle Pyrophoric, reportedly shared an image on the War Thunder forum of the tank’s specs that were pulled from the Challenger 2’s Army Equipment Support Publication, which is essentially a technical manual.

[...]

A moderator for the forum, who’s handle is “Templar_”, explained that the developer had removed the material after they received confirmation from the Ministry of Defense that the document is still in fact classified.


A user of War Thunder’s forums posted confidential documents to win an argument (T0089.001: Obtain Authentic Documents, T0146: Account, T0097.105: Military Personnel Persona, T0115: Post Content, T0143.001: Authentic Persona, T0151.009: Legacy Online Forum Platform). | +| [I00118 ‘War Thunder’ players are once again leaking sensitive military technology information on a video game forum](../../generated_pages/incidents/I00118.md) | In an effort to prove that the developers behind a popular multiplayer vehicle combat game had made a mistake, a player went ahead and published classified British military documents about one of the real-life tanks featured in the game.

This truly bizarre turn of events recently occurred in the public forum for War Thunder, a free-to-player multiplayer combat sim featuring modern land, air, and sea craft. Getting a small detail wrong on a piece of equipment might not be a big deal for the average gamer, but for the War Thunder crowd it sure as hell is. With 25,000 devoted players, the game very much bills itself as the military vehicle combat simulator.

A player, who identified himself as a British tank commander, claimed that the game’s developers at Gaijin Entertainment had inaccurately represented the Challenger 2 main battle tank used by the British military.

The self-described tank commander’s bio listed his location as Tidworth Camp in Wiltshire, England, according to the UK Defense Journal, which reported that the base is home to the Royal Tank Regiment, which fields Challenger 2 tanks.

The player, who went by the handle Pyrophoric, reportedly shared an image on the War Thunder forum of the tank’s specs that were pulled from the Challenger 2’s Army Equipment Support Publication, which is essentially a technical manual.

[...]

A moderator for the forum, who’s handle is “Templar_”, explained that the developer had removed the material after they received confirmation from the Ministry of Defense that the document is still in fact classified.


A user of War Thunder’s forums posted confidential documents to win an argument (T0089.001: Obtain Authentic Documents, T0146: Account Asset, T0097.105: Military Personnel Persona, T0115: Post Content, T0143.001: Authentic Persona, T0151.009: Legacy Online Forum Platform). | diff --git a/generated_pages/techniques/T0089.md b/generated_pages/techniques/T0089.md index cb2d836..d2ff5f2 100644 --- a/generated_pages/techniques/T0089.md +++ b/generated_pages/techniques/T0089.md @@ -7,7 +7,7 @@ | Incident | Descriptions given for this incident | | -------- | -------------------- | -| [I00119 Independent journalist publishes Trump campaign document hacked by Iran despite election interference concerns](../../generated_pages/incidents/I00119.md) | An American journalist who runs an independent newsletter published a document [on 26 Sep 2024] that appears to have been stolen from Donald Trump’s presidential campaign — the first public posting of a file that is believed to be part of a dossier that federal officials say is part of an Iranian effort to manipulate the [2024] U.S. election.

The PDF document is a 271-page opposition research file on former President Donald Trump’s running mate, Sen. JD Vance, R-Ohio.

For more than two months, hackers who the U.S. says are tied to Iran have tried to persuade the American media to cover files they stole. No outlets took the bait.

But on Thursday, reporter Ken Klippenstein, who self-publishes on Substack after he left The Intercept this year, published one of the files.

[...]

Reporters who have received the documents describe the same pattern: An AOL account emails them files, signed by a person using the name “Robert,” who is reluctant to speak to their identity or reasons for wanting the documents to receive coverage.

NBC News was not part of the Robert persona’s direct outreach, but it has viewed its correspondence with a reporter at another publication.

One of the emails from the Robert persona previously viewed by NBC News included three large PDF files, each corresponding to Trump’s three reported finalists for vice president. The Vance file appears to be the one Klippenstein hosts on his site.


In this example hackers attributed to Iran used the Robert persona to email journalists hacked documents (T0146: Account, T0097.100: Individual Persona, T0153.001: Email Platform).

The journalist Ken Kippenstien used his existing blog on substack to host a link to download the document (T0089: Obtain Private Documents, T0097.102: Journalist Persona, T0115: Post Content, T0143.001: Authentic Persona, T0152.001: Blogging Platform, T0152.002: Blog, T0150.003: Pre-Existing). | +| [I00119 Independent journalist publishes Trump campaign document hacked by Iran despite election interference concerns](../../generated_pages/incidents/I00119.md) | An American journalist who runs an independent newsletter published a document [on 26 Sep 2024] that appears to have been stolen from Donald Trump’s presidential campaign — the first public posting of a file that is believed to be part of a dossier that federal officials say is part of an Iranian effort to manipulate the [2024] U.S. election.

The PDF document is a 271-page opposition research file on former President Donald Trump’s running mate, Sen. JD Vance, R-Ohio.

For more than two months, hackers who the U.S. says are tied to Iran have tried to persuade the American media to cover files they stole. No outlets took the bait.

But on Thursday, reporter Ken Klippenstein, who self-publishes on Substack after he left The Intercept this year, published one of the files.

[...]

Reporters who have received the documents describe the same pattern: An AOL account emails them files, signed by a person using the name “Robert,” who is reluctant to speak to their identity or reasons for wanting the documents to receive coverage.

NBC News was not part of the Robert persona’s direct outreach, but it has viewed its correspondence with a reporter at another publication.

One of the emails from the Robert persona previously viewed by NBC News included three large PDF files, each corresponding to Trump’s three reported finalists for vice president. The Vance file appears to be the one Klippenstein hosts on his site.


In this example hackers attributed to Iran used the Robert persona to email journalists hacked documents (T0146: Account Asset, T0097.100: Individual Persona, T0153.001: Email Platform).

The journalist Ken Kippenstien used his existing blog on substack to host a link to download the document (T0089: Obtain Private Documents, T0097.102: Journalist Persona, T0115: Post Content, T0143.001: Authentic Persona, T0152.001: Blogging Platform, T0152.002: Blog Asset, T0150.003: Pre-Existing Asset). | diff --git a/generated_pages/techniques/T0092.md b/generated_pages/techniques/T0092.md index b68d8a0..b5d875d 100644 --- a/generated_pages/techniques/T0092.md +++ b/generated_pages/techniques/T0092.md @@ -7,7 +7,7 @@ | Incident | Descriptions given for this incident | | -------- | -------------------- | -| [I00108 How you thought you support the animals and you ended up funding white supremacists](../../generated_pages/incidents/I00108.md) | This article examines the white nationalist group Suavelos’ use of Facebook to draw visitors to its website without overtly revealing their racist ideology:

Suavelos uses Facebook and other platforms to amplify its message. In order to bypass the platforms’ community standards and keep their public pages active, Facebook pages such as “I support the police” are a good vehicle to spread a specific agenda without claiming to be racist. In looking back at this Facebook page, we followed Facebook’s algorithm for related pages and found suggested Facebook pages

[...]

This amplification strategy on Facebook is successful, as according to SimilarWeb figures, it attracts around 111,000 visits every month on the Suavelos.eu website.

[...]

Revenue through online advertisements can be achieved by different platforms through targeted advertisements, like Google Adsense or Doubleclick, or related and similar sponsored content, such as Taboola. Accordingly, Suavelos.eu uses both of these websites to display advertisements and consequently receives funding from such advertisements.

Once visitors are on the website supporting its advertisement revenue, Suavelos’ goal is to then turn these visitors into regular members of Suavelos network through donations or fees, or have them continue to support Suavelos.


Suevelos created a variety of pages on Facebook which presented as centring on prosocial causes. Facebook’s algorithm helped direct users to these pages (T0092: Build Network, T0151.001: Social Media Platform, T0153.006: Content Recommendation Algorithm, T0151.003: Online Community Page, T0143.208: Social Cause Persona).

Suevelos used these pages to generate traffic for their WordPress site (T0122: Direct Users to Alternative Platforms, T0152.003: Website Hosting Platform, T0152.004: Website), which used accounts on a variety of online advertising platforms to host adverts (T0146: Account, T0153.005: Online Advertising Platform). | +| [I00108 How you thought you support the animals and you ended up funding white supremacists](../../generated_pages/incidents/I00108.md) | This article examines the white nationalist group Suavelos’ use of Facebook to draw visitors to its website without overtly revealing their racist ideology:

Suavelos uses Facebook and other platforms to amplify its message. In order to bypass the platforms’ community standards and keep their public pages active, Facebook pages such as “I support the police” are a good vehicle to spread a specific agenda without claiming to be racist. In looking back at this Facebook page, we followed Facebook’s algorithm for related pages and found suggested Facebook pages

[...]

This amplification strategy on Facebook is successful, as according to SimilarWeb figures, it attracts around 111,000 visits every month on the Suavelos.eu website.

[...]

Revenue through online advertisements can be achieved by different platforms through targeted advertisements, like Google Adsense or Doubleclick, or related and similar sponsored content, such as Taboola. Accordingly, Suavelos.eu uses both of these websites to display advertisements and consequently receives funding from such advertisements.

Once visitors are on the website supporting its advertisement revenue, Suavelos’ goal is to then turn these visitors into regular members of Suavelos network through donations or fees, or have them continue to support Suavelos.


Suevelos created a variety of pages on Facebook which presented as centring on prosocial causes. Facebook’s algorithm helped direct users to these pages (T0092: Build Network, T0151.001: Social Media Platform, T0153.006: Content Recommendation Algorithm, T0151.003: Online Community Page, T0143.208: Social Cause Persona).

Suevelos used these pages to generate traffic for their WordPress site (T0122: Direct Users to Alternative Platforms, T0152.003: Website Hosting Platform, T0152.004: Website Asset), which used accounts on a variety of online advertising platforms to host adverts (T0146: Account Asset, T0153.005: Online Advertising Platform). | diff --git a/generated_pages/techniques/T0097.100.md b/generated_pages/techniques/T0097.100.md index db21916..d8153fd 100644 --- a/generated_pages/techniques/T0097.100.md +++ b/generated_pages/techniques/T0097.100.md @@ -9,7 +9,7 @@ | -------- | -------------------- | | [I00068 Attempted Audio Deepfake Call Targets LastPass Employee](../../generated_pages/incidents/I00068.md) | “While reports of [...] deepfake calls targeting private companies are luckily still rare, LastPass itself experienced a deepfake attempt earlier today that we are sharing with the larger community to help raise awareness that this tactic is spreading and all companies should be on the alert. In our case, an employee received a series of calls, texts, and at least one voicemail featuring an audio deepfake from a threat actor impersonating our CEO via WhatsApp. As the attempted communication was outside of normal business communication channels and due to the employee’s suspicion regarding the presence of many of the hallmarks of a social engineering attempt (such as forced urgency), our employee rightly ignored the messages and reported the incident to our internal security team so that we could take steps to both mitigate the threat and raise awareness of the tactic both internally and externally.”

In this example attackers impersonated the CEO of LastPass (T0097.100: Individual Persona, T0143.003: Impersonated Persona), targeting one of its employees over WhatsApp (T0151.004: Chat Platform,T0155.007: Encrypted Communication Channel) using deepfaked audio (T0088.001: Develop AI-Generated Audio (Deepfakes)). | | [I00069 Uncharmed: Untangling Iran's APT42 Operations](../../generated_pages/incidents/I00069.md) | “[Iranian state-sponsored cyber espionage actor] APT42 cloud operations attack lifecycle can be described in details as follows:

- “Social engineering schemes involving decoys and trust building, which includes masquerading as legitimate NGOs and conducting ongoing correspondence with the target, sometimes lasting several weeks.
- The threat actor masqueraded as well-known international organizations in the legal and NGO fields and sent emails from domains typosquatting the original NGO domains, for example aspenlnstitute[.]org.
- The Aspen Institute became aware of this spoofed domain and collaborated with industry partners, including blocking it in SafeBrowsing, thus protecting users of Google Chrome and additional browsers.
- To increase their credibility, APT42 impersonated high-ranking personnel working at the aforementioned organizations when creating the email personas.
- APT42 enhanced their campaign credibility by using decoy material inviting targets to legitimate and relevant events and conferences. In one instance, the decoy material was hosted on an attacker-controlled SharePoint folder, accessible only after the victim entered their credentials. Mandiant did not identify malicious elements in the files, suggesting they were used solely to gain the victim’s trust.”


In this example APT42, an Iranian state-sponsored cyber espionage actor, created a domain impersonating the existing NGO The Aspen Institute (T0143.003: Impersonated Persona, T0097.207: NGO Persona). They increased the perceived legitimacy of the impersonation by also impersonating high-ranking employees of the NGO (T0097.100: Individual Persona, T0143.003: Impersonated Persona). | -| [I00119 Independent journalist publishes Trump campaign document hacked by Iran despite election interference concerns](../../generated_pages/incidents/I00119.md) | An American journalist who runs an independent newsletter published a document [on 26 Sep 2024] that appears to have been stolen from Donald Trump’s presidential campaign — the first public posting of a file that is believed to be part of a dossier that federal officials say is part of an Iranian effort to manipulate the [2024] U.S. election.

The PDF document is a 271-page opposition research file on former President Donald Trump’s running mate, Sen. JD Vance, R-Ohio.

For more than two months, hackers who the U.S. says are tied to Iran have tried to persuade the American media to cover files they stole. No outlets took the bait.

But on Thursday, reporter Ken Klippenstein, who self-publishes on Substack after he left The Intercept this year, published one of the files.

[...]

Reporters who have received the documents describe the same pattern: An AOL account emails them files, signed by a person using the name “Robert,” who is reluctant to speak to their identity or reasons for wanting the documents to receive coverage.

NBC News was not part of the Robert persona’s direct outreach, but it has viewed its correspondence with a reporter at another publication.

One of the emails from the Robert persona previously viewed by NBC News included three large PDF files, each corresponding to Trump’s three reported finalists for vice president. The Vance file appears to be the one Klippenstein hosts on his site.


In this example hackers attributed to Iran used the Robert persona to email journalists hacked documents (T0146: Account, T0097.100: Individual Persona, T0153.001: Email Platform).

The journalist Ken Kippenstien used his existing blog on substack to host a link to download the document (T0089: Obtain Private Documents, T0097.102: Journalist Persona, T0115: Post Content, T0143.001: Authentic Persona, T0152.001: Blogging Platform, T0152.002: Blog, T0150.003: Pre-Existing). | +| [I00119 Independent journalist publishes Trump campaign document hacked by Iran despite election interference concerns](../../generated_pages/incidents/I00119.md) | An American journalist who runs an independent newsletter published a document [on 26 Sep 2024] that appears to have been stolen from Donald Trump’s presidential campaign — the first public posting of a file that is believed to be part of a dossier that federal officials say is part of an Iranian effort to manipulate the [2024] U.S. election.

The PDF document is a 271-page opposition research file on former President Donald Trump’s running mate, Sen. JD Vance, R-Ohio.

For more than two months, hackers who the U.S. says are tied to Iran have tried to persuade the American media to cover files they stole. No outlets took the bait.

But on Thursday, reporter Ken Klippenstein, who self-publishes on Substack after he left The Intercept this year, published one of the files.

[...]

Reporters who have received the documents describe the same pattern: An AOL account emails them files, signed by a person using the name “Robert,” who is reluctant to speak to their identity or reasons for wanting the documents to receive coverage.

NBC News was not part of the Robert persona’s direct outreach, but it has viewed its correspondence with a reporter at another publication.

One of the emails from the Robert persona previously viewed by NBC News included three large PDF files, each corresponding to Trump’s three reported finalists for vice president. The Vance file appears to be the one Klippenstein hosts on his site.


In this example hackers attributed to Iran used the Robert persona to email journalists hacked documents (T0146: Account Asset, T0097.100: Individual Persona, T0153.001: Email Platform).

The journalist Ken Kippenstien used his existing blog on substack to host a link to download the document (T0089: Obtain Private Documents, T0097.102: Journalist Persona, T0115: Post Content, T0143.001: Authentic Persona, T0152.001: Blogging Platform, T0152.002: Blog Asset, T0150.003: Pre-Existing Asset). | diff --git a/generated_pages/techniques/T0097.101.md b/generated_pages/techniques/T0097.101.md index 7ac78be..876176b 100644 --- a/generated_pages/techniques/T0097.101.md +++ b/generated_pages/techniques/T0097.101.md @@ -7,13 +7,12 @@ | Incident | Descriptions given for this incident | | -------- | -------------------- | -| [I00071 Russia-aligned hacktivists stir up anti-Ukrainian sentiments in Poland](../../generated_pages/incidents/I00071.md) | “The August 17 [2022] Telegram post [which contained a falsified letter from the Ukrainian Minister of Foreign Affairs asking Poland to rename Belwederska Street in Warsaw — the location of the Russian embassy building — as Stepan Bandera Street, in honor of the far-right nationalist who led the Ukrainian Insurgent Army during WWII] also contained screenshots of Facebook posts that appeared on two Facebook accounts belonging to Polish nationals Piotr Górka, an expert in the history of the Polish Air Force, and Dariusz Walusiak, a Polish historian and documentary maker. The Górka post suggested that he fully supported the Polish government’s decision to change Belwederska Street to Stepan Bandera Street.

“In a statement to the DFRLab, Górka said his account was accessed without his consent. “This is not my post loaded to my Facebook page,” he explained. “My site was hacked, some days ago.” At the time of publishing, Piotr Górka’s post and his Facebook account were no longer accessible.

“The post on Górka’s Facebook page was shared by Dariusz Walusiak’s Facebook account; the account also reposted it on the Facebook walls of more than twenty other Facebook users, including Adam Kalita, currently working at Krakow branch of the Institute of National Remembrance; Jan Kasprzyk, head of the Office for War Veterans and Victims of Oppression; and Alicja Kondraciuk, a Polish public figure living in Krakow.

“Walusiak’s Facebook account is also no longer accessible. Given his work on Polish history and identity, it seems highly unlikely he would support the Bandera measure; the DFRLab has also reached out to him for comment.

“The fact that Joker DPR’s Telegram post included screenshots of their Facebook posts raises the strong possibility that both Facebook accounts were compromised, and that hackers planted false statements on their pages that would seem out of character for them in order to gain further attention to the forged documents.”


In this example, threat actors used compromised accounts of Polish historians who have enough relevant knowledge to plausibly weigh in on the forged letter’s narrative (T0143.003: Impersonated Persona, T0097.101: Local Persona, T0097.108: Expert Persona, T0146: Account, T0150.005: Compromised, T0151.001: Social Media Platform).

This matches T0097.108: Expert Persona because the impersonation exploited Górka and Walusiak’s existing personas as experts in Polish history. | +| [I00071 Russia-aligned hacktivists stir up anti-Ukrainian sentiments in Poland](../../generated_pages/incidents/I00071.md) | “The August 17 [2022] Telegram post [which contained a falsified letter from the Ukrainian Minister of Foreign Affairs asking Poland to rename Belwederska Street in Warsaw — the location of the Russian embassy building — as Stepan Bandera Street, in honor of the far-right nationalist who led the Ukrainian Insurgent Army during WWII] also contained screenshots of Facebook posts that appeared on two Facebook accounts belonging to Polish nationals Piotr Górka, an expert in the history of the Polish Air Force, and Dariusz Walusiak, a Polish historian and documentary maker. The Górka post suggested that he fully supported the Polish government’s decision to change Belwederska Street to Stepan Bandera Street.

“In a statement to the DFRLab, Górka said his account was accessed without his consent. “This is not my post loaded to my Facebook page,” he explained. “My site was hacked, some days ago.” At the time of publishing, Piotr Górka’s post and his Facebook account were no longer accessible.

“The post on Górka’s Facebook page was shared by Dariusz Walusiak’s Facebook account; the account also reposted it on the Facebook walls of more than twenty other Facebook users, including Adam Kalita, currently working at Krakow branch of the Institute of National Remembrance; Jan Kasprzyk, head of the Office for War Veterans and Victims of Oppression; and Alicja Kondraciuk, a Polish public figure living in Krakow.

“Walusiak’s Facebook account is also no longer accessible. Given his work on Polish history and identity, it seems highly unlikely he would support the Bandera measure; the DFRLab has also reached out to him for comment.

“The fact that Joker DPR’s Telegram post included screenshots of their Facebook posts raises the strong possibility that both Facebook accounts were compromised, and that hackers planted false statements on their pages that would seem out of character for them in order to gain further attention to the forged documents.”


In this example, threat actors used compromised accounts of Polish historians who have enough relevant knowledge to plausibly weigh in on the forged letter’s narrative (T0143.003: Impersonated Persona, T0097.101: Local Persona, T0097.108: Expert Persona, T0146: Account Asset, T0150.005: Compromised Asset, T0151.001: Social Media Platform).

This matches T0097.108: Expert Persona because the impersonation exploited Górka and Walusiak’s existing personas as experts in Polish history. | | [I00076 Network of Social Media Accounts Impersonates U.S. Political Candidates, Leverages U.S. and Israeli Media in Support of Iranian Interests](../../generated_pages/incidents/I00076.md) | “In addition to directly posting material on social media, we observed some personas in the network [of inauthentic accounts attributed to Iran] leverage legitimate print and online media outlets in the U.S. and Israel to promote Iranian interests via the submission of letters, guest columns, and blog posts that were then published. We also identified personas that we suspect were fabricated for the sole purpose of submitting such letters, but that do not appear to maintain accounts on social media. The personas claimed to be based in varying locations depending on the news outlets they were targeting for submission; for example, a persona that listed their location as Seattle, WA in a letter submitted to the Seattle Times subsequently claimed to be located in Baytown, TX in a letter submitted to The Baytown Sun. Other accounts in the network then posted links to some of these letters on social media.”

In this example actors fabricated individuals who lived in areas which were being targeted for influence through the use of letters to local papers (T0097.101: Local Persona, T0143.002: Fabricated Persona). | | [I00078 Meta’s September 2020 Removal of Coordinated Inauthentic Behavior](../../generated_pages/incidents/I00078.md) | “[Meta has] removed one Page, five Facebook accounts, one Group and three Instagram accounts for foreign or government interference which is coordinated inauthentic behavior on behalf of a foreign or government entity. This small network originated in Russia and focused primarily on Turkey and Europe, and also on the United States.

“This operation relied on fake accounts — some of which had been already detected and removed by our automated systems — to manage their Page and their Group, and to drive people to their site purporting to be an independent think-tank based primarily in Turkey. These accounts posed as locals based in Turkey, Canada and the US. They also recruited people to write for their website. This network had almost no following on our platforms when we removed it.”


Meta identified that a network of accounts originating in Russia were driving people off platform to a site which presented itself as a think-tank (T0097.204: Think Tank Persona). Meta did not make an attribution about the authenticity of this off-site think tank, so neither T0143.001: Authentic Persona or T0143.002: Fabricated Persona are used here.

Meta had access to technical data for accounts on its platform, and asserted that they were fabricated individuals posing as locals who recruited targets to write content for their website (T0097.101: Local Persona, T0097.106: Recruiter Persona, T0143.002: Fabricated Persona). | | [I00081 Belarus KGB created fake accounts to criticize Poland during border crisis, Facebook parent company says](../../generated_pages/incidents/I00081.md) | “Meta said it also removed 31 Facebook accounts, four groups, two events and four Instagram accounts that it believes originated in Poland and targeted Belarus and Iraq. Those allegedly fake accounts posed as Middle Eastern migrants posting about the border crisis. Meta did not link the accounts to a specific group.

““These fake personas claimed to be sharing their own negative experiences of trying to get from Belarus to Poland and posted about migrants’ difficult lives in Europe,” Meta said. “They also posted about Poland’s strict anti-migrant policies and anti-migrant neo-Nazi activity in Poland. They also shared links to news articles criticizing the Belarusian government’s handling of the border crisis and off-platform videos alleging migrant abuse in Europe.””


In this example accounts falsely presented themselves as having local insight into the border crisis narrative (T0097.101: Local Persona, T0143.002: Fabricated Persona). | | [I00086 #WeAreNotSafe – Exposing How a Post-October 7th Disinformation Network Operates on Israeli Social Media](../../generated_pages/incidents/I00086.md) | Accounts which were identified as part of “a sophisticated and extensive coordinated network orchestrating a disinformation campaign targeting Israeli digital spaces since October 7th, 2023” were presenting themselves as locals to Israel (T0097.101: Local Persona):

“Unlike usual low-effort fake accounts, these accounts meticulously mimic young Israelis. They stand out due to the extraordinary lengths taken to ensure their authenticity, from unique narratives to the content they produce to their seemingly authentic interactions.” | | [I00087 Challenging Truth and Trust: A Global Inventory of Organized Social Media Manipulation](../../generated_pages/incidents/I00087.md) | “Another actor operating in China is the American-based company Devumi. Most of the Twitter accounts managed by Devumi resemble real people, and some are even associated with a kind of large-scale social identity theft. At least 55,000 of the accounts use the names, profile pictures, hometowns and other personal details of real Twitter users, including minors, according to The New York Times (Confessore et al., 2018)).”

In this example accounts impersonated real locals while spreading operation narratives (T0143.003: Impersonated Persona, T0097.101: Local Persona). The impersonation included stealing the legitimate accounts’ profile pictures (T0145.001: Copy Account Imagery). | -| [I00125 The Agency](../../generated_pages/incidents/I00125.md) | In 2014 threat actors attributed to Russia spread the false narrative that a local chemical plant had leaked toxic fumes. This report discusses aspects of the operation:

[The chemical plant leak] hoax was just one in a wave of similar attacks during the second half of last year. On Dec. 13, two months after a handful of Ebola cases in the United States touched off a minor media panic, many of the same Twitter accounts used to spread the Columbian Chemicals hoax began to post about an outbreak of Ebola in Atlanta. [...] Again, the attention to detail was remarkable, suggesting a tremendous amount of effort. A YouTube video showed a team of hazmat-suited medical workers transporting a victim from the airport. Beyoncé’s recent single “7/11” played in the background, an apparent attempt to establish the video’s contemporaneity. A truck in the parking lot sported the logo of the Hartsfield-Jackson Atlanta International Airport.

Accounts which previously presented as Louisiana locals were repurposed for use in a different campaign, this time presenting as locals to Atlanta, a place over 500 miles away from Louisiana and in a different timezone (T0146: Account, T0097.101: Local Persona, T0143.002: Fabricated Persona, T0151.008: Microblogging Platform, T0150.004: Repurposed).

A video was created which appeared to support the campaign’s narrative (T0087: Develop Video-Based Content), with great attention given to small details which made the video appear more legitimate. | diff --git a/generated_pages/techniques/T0097.102.md b/generated_pages/techniques/T0097.102.md index b451a9a..9813b0c 100644 --- a/generated_pages/techniques/T0097.102.md +++ b/generated_pages/techniques/T0097.102.md @@ -10,9 +10,9 @@ | [I00076 Network of Social Media Accounts Impersonates U.S. Political Candidates, Leverages U.S. and Israeli Media in Support of Iranian Interests](../../generated_pages/incidents/I00076.md) | “Accounts in the network [of inauthentic accounts attributed to Iran], under the guise of journalist personas, also solicited various individuals over Twitter for interviews and chats, including real journalists and politicians. The personas appear to have successfully conducted remote video and audio interviews with U.S. and UK-based individuals, including a prominent activist, a radio talk show host, and a former U.S. Government official, and subsequently posted the interviews on social media, showing only the individual being interviewed and not the interviewer. The interviewees expressed views that Iran would likely find favorable, discussing topics such as the February 2019 Warsaw summit, an attack on a military parade in the Iranian city of Ahvaz, and the killing of Jamal Khashoggi.

“The provenance of these interviews appear to have been misrepresented on at least one occasion, with one persona appearing to have falsely claimed to be operating on behalf of a mainstream news outlet; a remote video interview with a US-based activist about the Jamal Khashoggi killing was posted by an account adopting the persona of a journalist from the outlet Newsday, with the Newsday logo also appearing in the video. We did not identify any Newsday interview with the activist in question on this topic. In another instance, a persona posing as a journalist directed tweets containing audio of an interview conducted with a former U.S. Government official at real media personalities, calling on them to post about the interview.”


In this example actors fabricated journalists (T0097.102: Journalist Persona, T0143.002: Fabricated Persona) who worked at existing news outlets (T0097.202: News Outlet Persona, T0143.003: Impersonated Persona) in order to conduct interviews with targeted individuals. | | [I00080 Hundreds Of Propaganda Accounts Targeting Iran And Qatar Have Been Removed From Facebook](../../generated_pages/incidents/I00080.md) | “One example of a fake reporter account targeting Americans is “Jenny Powell,” a self-described Washington-based journalist, volunteer, and environmental activist. At first glance, Powell’s Twitter timeline looks like it belongs to a young and eager reporter amplifying her interests. But her profile photo is a stock image, and many of her links go to the propaganda sites.

“Powell, who joined the platform just last month, shares links to stories from major US news media outlets, retweets local news about Washington, DC, and regularly promotes content from The Foreign Code and The Economy Club. Other fake journalist accounts behaved similarly to Powell and had generic descriptions. One of the accounts, for a fake Bruce Lopez in Louisiana, has a bio that describes him as a “Correspondent Traveler (noun) (linking verb) (noun/verb/adjective),” which appears to reveal the formula used to write Twitter bios for the accounts.”


The Jenny Powel account used in this influence operation presents as both a journalist and an activist (T0097.102: Journalist Persona, T0097.103: Activist Persona, T0143.002: Fabricated Persona). This example shows how threat actors can easily follow a template to present a fabricated persona to their target audience (T0144.002: Persona Template). | | [I00082 Meta’s November 2021 Adversarial Threat Report ](../../generated_pages/incidents/I00082.md) | “[Meta] removed 41 Facebook accounts, five Groups, and four Instagram accounts for violating our policy against coordinated inauthentic behavior. This activity originated in Belarus and primarily targeted audiences in the Middle East and Europe.

“The core of this activity began in October 2021, with some accounts created as recently as mid-November. The people behind it used newly-created fake accounts — many of which were detected and disabled by our automated systems soon after creation — to pose as journalists and activists from the European Union, particularly Poland and Lithuania. Some of the accounts used profile photos likely generated using artificial intelligence techniques like generative adversarial networks (GAN). These fictitious personas posted criticism of Poland in English, Polish, and Kurdish, including pictures and videos about Polish border guards allegedly violating migrants’ rights, and compared Poland’s treatment of migrants against other countries’. They also posted to Groups focused on the welfare of migrants in Europe. A few accounts posted in Russian about relations between Belarus and the Baltic States.”


This example shows how accounts identified as participating in coordinated inauthentic behaviour were presenting themselves as journalists and activists while spreading operation narratives (T0097.102: Journalist Persona, T0097.103: Activist Persona).

Additionally, analysts at Meta identified accounts which were participating in coordinated inauthentic behaviour that had likely used AI-Generated images as their profile pictures (T0145.002: AI-Generated Account Imagery). | -| [I00096 China ramps up use of AI misinformation](../../generated_pages/incidents/I00096.md) | The Microsoft Threat Analysis Centre (MTAC) published a report documenting the use of AI by pro-Chinese threat actors:

On 13 January, Spamouflage [(a Pro-Chinese Communist Party actor)] posted audio clips to YouTube of independent candidate [for Taiwan’s Jan 2024 presidential election] Terry Gou – who also founded electronics giant Foxconn – in which Gou endorsed another candidate in the race. This clip was almost certainly AI-generated, and it was swiftly removed by YouTube. A fake letter purporting to be from Gou, endorsing the same candidate, had already circulated – Gou had of course made no such endorsement.

Here Spamoflage used an account on YouTube to post AI Generated audio impersonating an electoral candidate (T0146: Account, T0152.006: Video Platform, T0115: Post Content, T0088.001: Develop AI-Generated Audio (Deepfakes), T0143.003: Impersonated Persona, T0097.110: Party Official Persona).

Spamouflage also exploited AI-powered video platform CapCut – which is owned by TikTok backers ByteDance – to generate fake news anchors which were used in a variety of campaigns targeting the various presidential candidates in Taiwan.

Spamoflage created accounts on CapCut, which it used to create AI-generated videos of fabricated news anchors (T0146: Account, T0154.002: AI Media Platform, T0087.001: Develop AI-Generated Video (Deepfakes), T0143.002: Fabricated Persona, T0097.102: Journalist Persona). | -| [I00119 Independent journalist publishes Trump campaign document hacked by Iran despite election interference concerns](../../generated_pages/incidents/I00119.md) | An American journalist who runs an independent newsletter published a document [on 26 Sep 2024] that appears to have been stolen from Donald Trump’s presidential campaign — the first public posting of a file that is believed to be part of a dossier that federal officials say is part of an Iranian effort to manipulate the [2024] U.S. election.

The PDF document is a 271-page opposition research file on former President Donald Trump’s running mate, Sen. JD Vance, R-Ohio.

For more than two months, hackers who the U.S. says are tied to Iran have tried to persuade the American media to cover files they stole. No outlets took the bait.

But on Thursday, reporter Ken Klippenstein, who self-publishes on Substack after he left The Intercept this year, published one of the files.

[...]

Reporters who have received the documents describe the same pattern: An AOL account emails them files, signed by a person using the name “Robert,” who is reluctant to speak to their identity or reasons for wanting the documents to receive coverage.

NBC News was not part of the Robert persona’s direct outreach, but it has viewed its correspondence with a reporter at another publication.

One of the emails from the Robert persona previously viewed by NBC News included three large PDF files, each corresponding to Trump’s three reported finalists for vice president. The Vance file appears to be the one Klippenstein hosts on his site.


In this example hackers attributed to Iran used the Robert persona to email journalists hacked documents (T0146: Account, T0097.100: Individual Persona, T0153.001: Email Platform).

The journalist Ken Kippenstien used his existing blog on substack to host a link to download the document (T0089: Obtain Private Documents, T0097.102: Journalist Persona, T0115: Post Content, T0143.001: Authentic Persona, T0152.001: Blogging Platform, T0152.002: Blog, T0150.003: Pre-Existing). | -| [I00126 Charming Kitten Updates POWERSTAR with an InterPlanetary Twist](../../generated_pages/incidents/I00126.md) | The target of the recently observed [highly targeted spearphishing attack by “Charming Kitten”, a hacker group attributed to Iran] had published an article related to Iran. The publicity appears to have garnered the attention of Charming Kitten, who subsequently created an email address to impersonate a reporter of an Israeli media organization in order to send the target an email. Prior to sending malware to the target, the attacker simply asked if the target would be open to reviewing a document they had written related to US foreign policy. The target agreed to do so, since this was not an unusual request; they are frequently asked by journalists to review opinion pieces relating to their field of work.

In an effort to further gain the target’s confidence, Charming Kitten continued the interaction with another benign email containing a list of questions, to which the target then responded with answers. After multiple days of benign and seemingly legitimate interaction, Charming Kitten finally sent a “draft report”; this was the first time anything opaquely malicious occurred. The “draft report” was, in fact, a password-protected RAR file containing a malicious LNK file. The password for the RAR file was provided in a subsequent email.


In this example, threat actors created an email address on a domain which impersonated an existing Israeli news organisation impersonating a reporter who worked there (T0097.102: Journalist Persona, T0097.202: News Outlet Persona, T0143.003: Impersonated Persona, T0149.003: Lookalike Domain, T0149.002: Email Domain) in order to convince the target to download a document containing malware (T0085.004: Develop Document, T0147.003: Malware). | +| [I00096 China ramps up use of AI misinformation](../../generated_pages/incidents/I00096.md) | The Microsoft Threat Analysis Centre (MTAC) published a report documenting the use of AI by pro-Chinese threat actors:

On 13 January, Spamouflage [(a Pro-Chinese Communist Party actor)] posted audio clips to YouTube of independent candidate [for Taiwan’s Jan 2024 presidential election] Terry Gou – who also founded electronics giant Foxconn – in which Gou endorsed another candidate in the race. This clip was almost certainly AI-generated, and it was swiftly removed by YouTube. A fake letter purporting to be from Gou, endorsing the same candidate, had already circulated – Gou had of course made no such endorsement.

Here Spamoflage used an account on YouTube to post AI Generated audio impersonating an electoral candidate (T0146: Account Asset, T0152.006: Video Platform, T0115: Post Content, T0088.001: Develop AI-Generated Audio (Deepfakes), T0143.003: Impersonated Persona, T0097.110: Party Official Persona).

Spamouflage also exploited AI-powered video platform CapCut – which is owned by TikTok backers ByteDance – to generate fake news anchors which were used in a variety of campaigns targeting the various presidential candidates in Taiwan.

Spamoflage created accounts on CapCut, which it used to create AI-generated videos of fabricated news anchors (T0146: Account Asset, T0154.002: AI Media Platform, T0087.001: Develop AI-Generated Video (Deepfakes), T0143.002: Fabricated Persona, T0097.102: Journalist Persona). | +| [I00119 Independent journalist publishes Trump campaign document hacked by Iran despite election interference concerns](../../generated_pages/incidents/I00119.md) | An American journalist who runs an independent newsletter published a document [on 26 Sep 2024] that appears to have been stolen from Donald Trump’s presidential campaign — the first public posting of a file that is believed to be part of a dossier that federal officials say is part of an Iranian effort to manipulate the [2024] U.S. election.

The PDF document is a 271-page opposition research file on former President Donald Trump’s running mate, Sen. JD Vance, R-Ohio.

For more than two months, hackers who the U.S. says are tied to Iran have tried to persuade the American media to cover files they stole. No outlets took the bait.

But on Thursday, reporter Ken Klippenstein, who self-publishes on Substack after he left The Intercept this year, published one of the files.

[...]

Reporters who have received the documents describe the same pattern: An AOL account emails them files, signed by a person using the name “Robert,” who is reluctant to speak to their identity or reasons for wanting the documents to receive coverage.

NBC News was not part of the Robert persona’s direct outreach, but it has viewed its correspondence with a reporter at another publication.

One of the emails from the Robert persona previously viewed by NBC News included three large PDF files, each corresponding to Trump’s three reported finalists for vice president. The Vance file appears to be the one Klippenstein hosts on his site.


In this example hackers attributed to Iran used the Robert persona to email journalists hacked documents (T0146: Account Asset, T0097.100: Individual Persona, T0153.001: Email Platform).

The journalist Ken Kippenstien used his existing blog on substack to host a link to download the document (T0089: Obtain Private Documents, T0097.102: Journalist Persona, T0115: Post Content, T0143.001: Authentic Persona, T0152.001: Blogging Platform, T0152.002: Blog Asset, T0150.003: Pre-Existing Asset). | +| [I00126 Charming Kitten Updates POWERSTAR with an InterPlanetary Twist](../../generated_pages/incidents/I00126.md) | The target of the recently observed [highly targeted spearphishing attack by “Charming Kitten”, a hacker group attributed to Iran] had published an article related to Iran. The publicity appears to have garnered the attention of Charming Kitten, who subsequently created an email address to impersonate a reporter of an Israeli media organization in order to send the target an email. Prior to sending malware to the target, the attacker simply asked if the target would be open to reviewing a document they had written related to US foreign policy. The target agreed to do so, since this was not an unusual request; they are frequently asked by journalists to review opinion pieces relating to their field of work.

In an effort to further gain the target’s confidence, Charming Kitten continued the interaction with another benign email containing a list of questions, to which the target then responded with answers. After multiple days of benign and seemingly legitimate interaction, Charming Kitten finally sent a “draft report”; this was the first time anything opaquely malicious occurred. The “draft report” was, in fact, a password-protected RAR file containing a malicious LNK file. The password for the RAR file was provided in a subsequent email.


In this example, threat actors created an email address on a domain which impersonated an existing Israeli news organisation impersonating a reporter who worked there (T0097.102: Journalist Persona, T0097.202: News Outlet Persona, T0143.003: Impersonated Persona, T0149.003: Lookalike Domain, T0149.002: Email Domain Asset) in order to convince the target to download a document containing malware (T0085.004: Develop Document, T0147.003: Malware Asset). | diff --git a/generated_pages/techniques/T0097.105.md b/generated_pages/techniques/T0097.105.md index 030edc5..652869a 100644 --- a/generated_pages/techniques/T0097.105.md +++ b/generated_pages/techniques/T0097.105.md @@ -7,7 +7,7 @@ | Incident | Descriptions given for this incident | | -------- | -------------------- | -| [I00118 ‘War Thunder’ players are once again leaking sensitive military technology information on a video game forum](../../generated_pages/incidents/I00118.md) | In an effort to prove that the developers behind a popular multiplayer vehicle combat game had made a mistake, a player went ahead and published classified British military documents about one of the real-life tanks featured in the game.

This truly bizarre turn of events recently occurred in the public forum for War Thunder, a free-to-player multiplayer combat sim featuring modern land, air, and sea craft. Getting a small detail wrong on a piece of equipment might not be a big deal for the average gamer, but for the War Thunder crowd it sure as hell is. With 25,000 devoted players, the game very much bills itself as the military vehicle combat simulator.

A player, who identified himself as a British tank commander, claimed that the game’s developers at Gaijin Entertainment had inaccurately represented the Challenger 2 main battle tank used by the British military.

The self-described tank commander’s bio listed his location as Tidworth Camp in Wiltshire, England, according to the UK Defense Journal, which reported that the base is home to the Royal Tank Regiment, which fields Challenger 2 tanks.

The player, who went by the handle Pyrophoric, reportedly shared an image on the War Thunder forum of the tank’s specs that were pulled from the Challenger 2’s Army Equipment Support Publication, which is essentially a technical manual.

[...]

A moderator for the forum, who’s handle is “Templar_”, explained that the developer had removed the material after they received confirmation from the Ministry of Defense that the document is still in fact classified.


A user of War Thunder’s forums posted confidential documents to win an argument (T0089.001: Obtain Authentic Documents, T0146: Account, T0097.105: Military Personnel Persona, T0115: Post Content, T0143.001: Authentic Persona, T0151.009: Legacy Online Forum Platform). | +| [I00118 ‘War Thunder’ players are once again leaking sensitive military technology information on a video game forum](../../generated_pages/incidents/I00118.md) | In an effort to prove that the developers behind a popular multiplayer vehicle combat game had made a mistake, a player went ahead and published classified British military documents about one of the real-life tanks featured in the game.

This truly bizarre turn of events recently occurred in the public forum for War Thunder, a free-to-player multiplayer combat sim featuring modern land, air, and sea craft. Getting a small detail wrong on a piece of equipment might not be a big deal for the average gamer, but for the War Thunder crowd it sure as hell is. With 25,000 devoted players, the game very much bills itself as the military vehicle combat simulator.

A player, who identified himself as a British tank commander, claimed that the game’s developers at Gaijin Entertainment had inaccurately represented the Challenger 2 main battle tank used by the British military.

The self-described tank commander’s bio listed his location as Tidworth Camp in Wiltshire, England, according to the UK Defense Journal, which reported that the base is home to the Royal Tank Regiment, which fields Challenger 2 tanks.

The player, who went by the handle Pyrophoric, reportedly shared an image on the War Thunder forum of the tank’s specs that were pulled from the Challenger 2’s Army Equipment Support Publication, which is essentially a technical manual.

[...]

A moderator for the forum, who’s handle is “Templar_”, explained that the developer had removed the material after they received confirmation from the Ministry of Defense that the document is still in fact classified.


A user of War Thunder’s forums posted confidential documents to win an argument (T0089.001: Obtain Authentic Documents, T0146: Account Asset, T0097.105: Military Personnel Persona, T0115: Post Content, T0143.001: Authentic Persona, T0151.009: Legacy Online Forum Platform). | diff --git a/generated_pages/techniques/T0097.108.md b/generated_pages/techniques/T0097.108.md index 5cff332..d7f4075 100644 --- a/generated_pages/techniques/T0097.108.md +++ b/generated_pages/techniques/T0097.108.md @@ -7,7 +7,7 @@ | Incident | Descriptions given for this incident | | -------- | -------------------- | -| [I00071 Russia-aligned hacktivists stir up anti-Ukrainian sentiments in Poland](../../generated_pages/incidents/I00071.md) | “The August 17 [2022] Telegram post [which contained a falsified letter from the Ukrainian Minister of Foreign Affairs asking Poland to rename Belwederska Street in Warsaw — the location of the Russian embassy building — as Stepan Bandera Street, in honor of the far-right nationalist who led the Ukrainian Insurgent Army during WWII] also contained screenshots of Facebook posts that appeared on two Facebook accounts belonging to Polish nationals Piotr Górka, an expert in the history of the Polish Air Force, and Dariusz Walusiak, a Polish historian and documentary maker. The Górka post suggested that he fully supported the Polish government’s decision to change Belwederska Street to Stepan Bandera Street.

“In a statement to the DFRLab, Górka said his account was accessed without his consent. “This is not my post loaded to my Facebook page,” he explained. “My site was hacked, some days ago.” At the time of publishing, Piotr Górka’s post and his Facebook account were no longer accessible.

“The post on Górka’s Facebook page was shared by Dariusz Walusiak’s Facebook account; the account also reposted it on the Facebook walls of more than twenty other Facebook users, including Adam Kalita, currently working at Krakow branch of the Institute of National Remembrance; Jan Kasprzyk, head of the Office for War Veterans and Victims of Oppression; and Alicja Kondraciuk, a Polish public figure living in Krakow.

“Walusiak’s Facebook account is also no longer accessible. Given his work on Polish history and identity, it seems highly unlikely he would support the Bandera measure; the DFRLab has also reached out to him for comment.

“The fact that Joker DPR’s Telegram post included screenshots of their Facebook posts raises the strong possibility that both Facebook accounts were compromised, and that hackers planted false statements on their pages that would seem out of character for them in order to gain further attention to the forged documents.”


In this example, threat actors used compromised accounts of Polish historians who have enough relevant knowledge to plausibly weigh in on the forged letter’s narrative (T0143.003: Impersonated Persona, T0097.101: Local Persona, T0097.108: Expert Persona, T0146: Account, T0150.005: Compromised, T0151.001: Social Media Platform).

This matches T0097.108: Expert Persona because the impersonation exploited Górka and Walusiak’s existing personas as experts in Polish history. | +| [I00071 Russia-aligned hacktivists stir up anti-Ukrainian sentiments in Poland](../../generated_pages/incidents/I00071.md) | “The August 17 [2022] Telegram post [which contained a falsified letter from the Ukrainian Minister of Foreign Affairs asking Poland to rename Belwederska Street in Warsaw — the location of the Russian embassy building — as Stepan Bandera Street, in honor of the far-right nationalist who led the Ukrainian Insurgent Army during WWII] also contained screenshots of Facebook posts that appeared on two Facebook accounts belonging to Polish nationals Piotr Górka, an expert in the history of the Polish Air Force, and Dariusz Walusiak, a Polish historian and documentary maker. The Górka post suggested that he fully supported the Polish government’s decision to change Belwederska Street to Stepan Bandera Street.

“In a statement to the DFRLab, Górka said his account was accessed without his consent. “This is not my post loaded to my Facebook page,” he explained. “My site was hacked, some days ago.” At the time of publishing, Piotr Górka’s post and his Facebook account were no longer accessible.

“The post on Górka’s Facebook page was shared by Dariusz Walusiak’s Facebook account; the account also reposted it on the Facebook walls of more than twenty other Facebook users, including Adam Kalita, currently working at Krakow branch of the Institute of National Remembrance; Jan Kasprzyk, head of the Office for War Veterans and Victims of Oppression; and Alicja Kondraciuk, a Polish public figure living in Krakow.

“Walusiak’s Facebook account is also no longer accessible. Given his work on Polish history and identity, it seems highly unlikely he would support the Bandera measure; the DFRLab has also reached out to him for comment.

“The fact that Joker DPR’s Telegram post included screenshots of their Facebook posts raises the strong possibility that both Facebook accounts were compromised, and that hackers planted false statements on their pages that would seem out of character for them in order to gain further attention to the forged documents.”


In this example, threat actors used compromised accounts of Polish historians who have enough relevant knowledge to plausibly weigh in on the forged letter’s narrative (T0143.003: Impersonated Persona, T0097.101: Local Persona, T0097.108: Expert Persona, T0146: Account Asset, T0150.005: Compromised Asset, T0151.001: Social Media Platform).

This matches T0097.108: Expert Persona because the impersonation exploited Górka and Walusiak’s existing personas as experts in Polish history. | | [I00079 Three thousand fake tanks](../../generated_pages/incidents/I00079.md) | “The sixth [website to repost a confirmed false narrative investigated in this report] is an apparent think tank, the Center for Global Strategic Monitoring. This website describes itself, in English apparently written by a non-native speaker, as a “nonprofit and nonpartisan research and analysis institution dedicated to providing insights of the think tank community publications”. It does, indeed, publish think-tank reports on issues such as Turkey and US-China relations; however, the reports are the work of other think tanks, often unattributed (the two mentioned in this sentence were actually produced by the Brookings Institution, although the website makes no mention of the fact). It also fails to provide an address, or any other contact details other than an email, and its (long) list of experts includes entries apparently copied and pasted from other institutions. Thus, the “think tank” website which shared the fake story appears to be a fake itself.” In this example a website which amplified a false narrative presented itself as a think tank (T0097.204: Think Tank Persona).

This is an entirely fabricated persona (T0143.002: Fabricated Persona); it republished content from other think tanks without attribution (T0084.002: Plagiarise Content) and fabricated experts (T0097.108: Expert Persona, T0143.002: Fabricated Persona) to make it more believable that they were a real think tank. | diff --git a/generated_pages/techniques/T0097.109.md b/generated_pages/techniques/T0097.109.md index 76cc841..68ce922 100644 --- a/generated_pages/techniques/T0097.109.md +++ b/generated_pages/techniques/T0097.109.md @@ -7,6 +7,8 @@ | Incident | Descriptions given for this incident | | -------- | -------------------- | +| [I00064 Tinder nightmares: the promise and peril of political bots](../../generated_pages/incidents/I00064.md) | “In the days leading up to the UK’s [2019] general election, youths looking for love online encountered a whole new kind of Tinder nightmare. A group of young activists built a Tinder chatbot to co-opt profiles and persuade swing voters to support Labour. The bot accounts sent 30,000-40,000 messages to targeted 18-25 year olds in battleground constituencies like Dudley North, which Labour ended up winning by only 22 votes. [...]

“The activists maintain that the project was meant to foster democratic engagement. But screenshots of the bots’ activity expose a harsher reality. Images of conversations between real users and these bots, posted on i-D, Mashable, as well as on Fowler and Goodman’s public Twitter accounts, show that the bots did not identify themselves as automated accounts, instead posing as the user whose profile they had taken over. While conducting research for this story, it turned out that a number of [the reporters’ friends] living in Oxford had interacted with the bot in the lead up to the election and had no idea that it was not a real person.”


In this example people offered up their real accounts for the automation of political messaging; the actors convinced the users to give up access to their accounts to use in the operation. The actors maintained the accounts’ existing persona, and presented themselves as potential romantic suitors for legitimate platform users (T0097:109 Romantic Suitor Persona, T0143.003: Impersonated Persona, T0146: Account Asset, T0150.007: Rented Asset, T0151.017: Dating Platform). | +| [I00089 Hackers Use Fake Facebook Profiles of Attractive Women to Spread Viruses, Steal Passwords](../../generated_pages/incidents/I00089.md) | “On Facebook, Rita, Alona and Christina appeared to be just like the millions of other U.S citizens sharing their lives with the world. They discussed family outings, shared emojis and commented on each other's photographs.

“In reality, the three accounts were part of a highly-targeted cybercrime operation, used to spread malware that was able to steal passwords and spy on victims.

“Hackers with links to Lebanon likely ran the covert scheme using a strain of malware dubbed "Tempting Cedar Spyware," according to researchers from Prague-based anti-virus company Avast, which detailed its findings in a report released on Wednesday.

“In a honey trap tactic as old as time, the culprits' targets were mostly male, and lured by fake attractive women. 

“In the attack, hackers would send flirtatious messages using Facebook to the chosen victims, encouraging them to download a second , booby-trapped, chat application known as Kik Messenger to have "more secure" conversations. Upon analysis, Avast experts found that "many fell for the trap.””


In this example threat actors took on the persona of a romantic suitor on Facebook, directing their targets to another platform (T0097:109 Romantic Suitor Persona, T0145.006: Attractive Person Account Imagery, T0143.002: Fabricated Persona). | diff --git a/generated_pages/techniques/T0097.110.md b/generated_pages/techniques/T0097.110.md index ef605b9..79825a4 100644 --- a/generated_pages/techniques/T0097.110.md +++ b/generated_pages/techniques/T0097.110.md @@ -7,10 +7,10 @@ | Incident | Descriptions given for this incident | | -------- | -------------------- | -| [I00065 'Ghostwriter' Influence Campaign: Unknown Actors Leverage Website Compromises and Fabricated Content to Push Narratives Aligned With Russian Security Interests](../../generated_pages/incidents/I00065.md) | _”Overall, narratives promoted in the five operations appear to represent a concerted effort to discredit the ruling political coalition, widen existing domestic political divisions and project an image of coalition disunity in Poland. In each incident, content was primarily disseminated via Twitter, Facebook, and/ or Instagram accounts belonging to Polish politicians, all of whom have publicly claimed their accounts were compromised at the times the posts were made."_

This example demonstrates how threat actors can use compromised accounts to distribute inauthentic content while exploiting the legitimate account holder’s persona (T0097.110: Party Official Persona, T0143.003: Impersonated Persona, T0146: Account, T0150.005: Compromised). | +| [I00065 'Ghostwriter' Influence Campaign: Unknown Actors Leverage Website Compromises and Fabricated Content to Push Narratives Aligned With Russian Security Interests](../../generated_pages/incidents/I00065.md) | _”Overall, narratives promoted in the five operations appear to represent a concerted effort to discredit the ruling political coalition, widen existing domestic political divisions and project an image of coalition disunity in Poland. In each incident, content was primarily disseminated via Twitter, Facebook, and/ or Instagram accounts belonging to Polish politicians, all of whom have publicly claimed their accounts were compromised at the times the posts were made."_

This example demonstrates how threat actors can use compromised accounts to distribute inauthentic content while exploiting the legitimate account holder’s persona (T0097.110: Party Official Persona, T0143.003: Impersonated Persona, T0146: Account Asset, T0150.005: Compromised Asset). | | [I00075 How Russia Meddles Abroad for Profit: Cash, Trolls and a Cult Leader](../../generated_pages/incidents/I00075.md) | “In the campaign’s final weeks, Pastor Mailhol said, the team of Russians made a request: Drop out of the race and support Mr. Rajoelina. He refused.

“The Russians made the same proposal to the history professor running for president, saying, “If you accept this deal you will have money” according to Ms. Rasamimanana, the professor’s campaign manager.

When the professor refused, she said, the Russians created a fake Facebook page that mimicked his official page and posted an announcement on it that he was supporting Mr. Rajoelina.”


In this example actors created online accounts styled to look like official pages to trick targets into thinking that the presidential candidate announced that they had dropped out of the election (T0097.110: Party Official Persona, T0143.003: Impersonated Persona) | | [I00076 Network of Social Media Accounts Impersonates U.S. Political Candidates, Leverages U.S. and Israeli Media in Support of Iranian Interests](../../generated_pages/incidents/I00076.md) | “Some Twitter accounts in the network [of inauthentic accounts attributed to Iran] impersonated Republican political candidates that ran for House of Representatives seats in the 2018 U.S. congressional midterms. These accounts appropriated the candidates’ photographs and, in some cases, plagiarized tweets from the real individuals’ accounts. Aside from impersonating real U.S. political candidates, the behavior and activity of these accounts resembled that of the others in the network.

“For example, the account @livengood_marla impersonated Marla Livengood, a 2018 candidate for California’s 9th Congressional District, using a photograph of Livengood and a campaign banner for its profile and background pictures. The account began tweeting on Sept. 24, 2018, with its first tweet plagiarizing one from Livengood’s official account earlier that month”

[...]

“In another example, the account @ButlerJineea impersonated Jineea Butler, a 2018 candidate for New York’s 13th Congressional District, using a photograph of Butler for its profile picture and incorporating her campaign slogans into its background picture, as well as claiming in its Twitter bio to be a “US House candidate, NY-13” and linking to Butler’s website, jineeabutlerforcongress[.]com.”


In this example actors impersonated existing political candidates (T0097.110: Member of Political Party Persona, T0143.003: Impersonated Persona), strengthening the impersonation by copying legitimate accounts’ imagery (T0145.001: Copy Account Imagery), and copying its previous posts (T0084.002: Plagiarise Content). | -| [I00096 China ramps up use of AI misinformation](../../generated_pages/incidents/I00096.md) | The Microsoft Threat Analysis Centre (MTAC) published a report documenting the use of AI by pro-Chinese threat actors:

On 13 January, Spamouflage [(a Pro-Chinese Communist Party actor)] posted audio clips to YouTube of independent candidate [for Taiwan’s Jan 2024 presidential election] Terry Gou – who also founded electronics giant Foxconn – in which Gou endorsed another candidate in the race. This clip was almost certainly AI-generated, and it was swiftly removed by YouTube. A fake letter purporting to be from Gou, endorsing the same candidate, had already circulated – Gou had of course made no such endorsement.

Here Spamoflage used an account on YouTube to post AI Generated audio impersonating an electoral candidate (T0146: Account, T0152.006: Video Platform, T0115: Post Content, T0088.001: Develop AI-Generated Audio (Deepfakes), T0143.003: Impersonated Persona, T0097.110: Party Official Persona).

Spamouflage also exploited AI-powered video platform CapCut – which is owned by TikTok backers ByteDance – to generate fake news anchors which were used in a variety of campaigns targeting the various presidential candidates in Taiwan.

Spamoflage created accounts on CapCut, which it used to create AI-generated videos of fabricated news anchors (T0146: Account, T0154.002: AI Media Platform, T0087.001: Develop AI-Generated Video (Deepfakes), T0143.002: Fabricated Persona, T0097.102: Journalist Persona). | +| [I00096 China ramps up use of AI misinformation](../../generated_pages/incidents/I00096.md) | The Microsoft Threat Analysis Centre (MTAC) published a report documenting the use of AI by pro-Chinese threat actors:

On 13 January, Spamouflage [(a Pro-Chinese Communist Party actor)] posted audio clips to YouTube of independent candidate [for Taiwan’s Jan 2024 presidential election] Terry Gou – who also founded electronics giant Foxconn – in which Gou endorsed another candidate in the race. This clip was almost certainly AI-generated, and it was swiftly removed by YouTube. A fake letter purporting to be from Gou, endorsing the same candidate, had already circulated – Gou had of course made no such endorsement.

Here Spamoflage used an account on YouTube to post AI Generated audio impersonating an electoral candidate (T0146: Account Asset, T0152.006: Video Platform, T0115: Post Content, T0088.001: Develop AI-Generated Audio (Deepfakes), T0143.003: Impersonated Persona, T0097.110: Party Official Persona).

Spamouflage also exploited AI-powered video platform CapCut – which is owned by TikTok backers ByteDance – to generate fake news anchors which were used in a variety of campaigns targeting the various presidential candidates in Taiwan.

Spamoflage created accounts on CapCut, which it used to create AI-generated videos of fabricated news anchors (T0146: Account Asset, T0154.002: AI Media Platform, T0087.001: Develop AI-Generated Video (Deepfakes), T0143.002: Fabricated Persona, T0097.102: Journalist Persona). | diff --git a/generated_pages/techniques/T0097.111.md b/generated_pages/techniques/T0097.111.md index 67e1c09..57b9b6a 100644 --- a/generated_pages/techniques/T0097.111.md +++ b/generated_pages/techniques/T0097.111.md @@ -10,7 +10,7 @@ | [I00071 Russia-aligned hacktivists stir up anti-Ukrainian sentiments in Poland](../../generated_pages/incidents/I00071.md) | “On August 16, 2022, pro-Kremlin Telegram channel Joker DPR (Джокер ДНР) published a forged letter allegedly written by Ukrainian Foreign Minister Dmytro Kuleba. In the letter, Kuleba supposedly asked relevant Polish authorities to rename Belwederska Street in Warsaw — the location of the Russian embassy building — as Stepan Bandera Street, in honor of the far-right nationalist who led the Ukrainian Insurgent Army during WWII.

[...]

The letter is not dated, and Dmytro Kuleba’s signature seems to be copied from a publicly available letter signed by him in 2021.”


In this example the Telegram channel Joker DPR published a forged letter (T0085.004: Develop Document) in which they impersonated the Ukrainian Minister of Foreign Affairs (T0097.111: Government Official Persona, T0143.003: Impersonated Persona), using Ministry letterhead (T0097.206: Government Institution Persona, T0143.003: Impersonated Persona). | | [I00084 Russia turns its diplomats into disinformation warriors](../../generated_pages/incidents/I00084.md) | “After the European Union banned Kremlin-backed media outlets and social media giants demoted their posts for peddling falsehoods about the war in Ukraine, Moscow has turned to its cadre of diplomats, government spokespeople and ministers — many of whom have extensive followings on social media — to promote disinformation about the conflict in Eastern Europe, according to four EU and United States officials.”

In this example authentic Russian government officials used their own accounts to promote false narratives (T0143.001: Authentic Persona, T0097.111: Government Official Persona).

The use of accounts managed by authentic Government / Diplomats to spread false narratives makes it harder for platforms to enforce content moderation, because of the political ramifications they may face for censoring elected officials (T0131: Exploit TOS/Content Moderation). For example, Twitter previously argued that official channels of world leaders are not removed due to the high public interest associated with their activities. | | [I00085 China’s large-scale media push: Attempts to influence Swedish media](../../generated_pages/incidents/I00085.md) | “Four media companies – Svenska Dagbladet, Expressen, Sveriges Radio, and Sveriges Television – stated that they had been contacted by the Chinese embassy on several occasions, and that they, for instance, had been criticized on their publications, both by letters and e-mails.

The media company Svenska Dagbladet, had been contacted on several occasions in the past two years, including via e-mails directly from the Chinese ambassador to Sweden. Several times, China and the Chinese ambassador had criticized the media company’s publications regarding the conditions in China. Individual reporters also reported having been subjected to criticism.

The tabloid Expressen had received several letters and e-mails from the embassy, e-mails containing criticism and threatening formulations regarding the coverage of the Swedish book publisher Gui Minhai, who has been imprisoned in China since 2015. Formulations such as “media tyranny” could be found in the e-mails.”


In this case, the Chinese ambassador is using their official role (T0143.001: Authentic Persona, T0097.111: Government Official Persona) to try to influence Swedish press. A government official trying to interfere in other countries' media activities could be a violation of press freedom. In this specific case, the Chinese diplomats are trying to silence criticism against China (T0139.002: Silence).” | -| [I00093 China Falsely Denies Disinformation Campaign Targeting Canada’s Prime Minister](../../generated_pages/incidents/I00093.md) | “On October 23, Canada’s Foreign Ministry said it had discovered a disinformation campaign, likely tied to China, aimed at discrediting dozens of Canadian politicians, including Prime Minister Justin Trudeau.

“The ministry said the campaign took place in August and September. It used new and hijacked social media accounts to bulk-post messages targeting Canadian politicians (T0146: Account, T0150.001: Newly Created, T0150.005: Compromised).

“A Chinese Embassy in Canada spokesperson dismissed Canada’s accusation as baseless.

““Canada was a downright liar and disseminator of false information… Beijing has never meddled in another nation’s domestic affairs.”

“A Chinese Embassy in Canada spokesperson dismissed Canada’s accusation as baseless.

“That is false.

“The Canadian government's report is based on an investigation conducted by its Rapid Response Mechanism cyber intelligence unit in cooperation with the social media platforms.

“The investigation exposed China’s disinformation campaign dubbed “Spamouflage” -- for its tactic of using “a network of new or hijacked social media accounts that posts and increases the number of propaganda messages across multiple social media platforms – including Facebook, X/Twitter, Instagram, YouTube, Medium, Reddit, TikTok, and LinkedIn.””


In this case a network of accounts attributed to China were identified operating on multiple platforms. The report was dismissed as false information by an official in the Chinese Embassy in Canada (T0143.001: Authentic Persona, T0097.111: Government Official Persona, T0129.006: Deny Involvement). | +| [I00093 China Falsely Denies Disinformation Campaign Targeting Canada’s Prime Minister](../../generated_pages/incidents/I00093.md) | “On October 23, Canada’s Foreign Ministry said it had discovered a disinformation campaign, likely tied to China, aimed at discrediting dozens of Canadian politicians, including Prime Minister Justin Trudeau.

“The ministry said the campaign took place in August and September. It used new and hijacked social media accounts to bulk-post messages targeting Canadian politicians (T0146: Account Asset, T0150.001: Newly Created Asset, T0150.005: Compromised Asset).

“A Chinese Embassy in Canada spokesperson dismissed Canada’s accusation as baseless.

““Canada was a downright liar and disseminator of false information… Beijing has never meddled in another nation’s domestic affairs.”

“A Chinese Embassy in Canada spokesperson dismissed Canada’s accusation as baseless.

“That is false.

“The Canadian government's report is based on an investigation conducted by its Rapid Response Mechanism cyber intelligence unit in cooperation with the social media platforms.

“The investigation exposed China’s disinformation campaign dubbed “Spamouflage” -- for its tactic of using “a network of new or hijacked social media accounts that posts and increases the number of propaganda messages across multiple social media platforms – including Facebook, X/Twitter, Instagram, YouTube, Medium, Reddit, TikTok, and LinkedIn.””


In this case a network of accounts attributed to China were identified operating on multiple platforms. The report was dismissed as false information by an official in the Chinese Embassy in Canada (T0143.001: Authentic Persona, T0097.111: Government Official Persona, T0129.006: Deny Involvement). | diff --git a/generated_pages/techniques/T0097.202.md b/generated_pages/techniques/T0097.202.md index e839d26..ba71199 100644 --- a/generated_pages/techniques/T0097.202.md +++ b/generated_pages/techniques/T0097.202.md @@ -13,8 +13,8 @@ | [I00079 Three thousand fake tanks](../../generated_pages/incidents/I00079.md) | “On January 4 [2017], a little-known news site based in Donetsk, Ukraine published an article claiming that the United States was sending 3,600 tanks to Europe as part of “the NATO war preparation against Russia”.

“Like much fake news, this story started with a grain of truth: the US was about to reinforce its armored units in Europe. However, the article converted literally thousands of other vehicles — including hundreds of Humvees and trailers — into tanks, building the US force into something 20 times more powerful than it actually was.

“The story caught on online. Within three days it had been repeated by a dozen websites in the United States, Canada and Europe, and shared some 40,000 times. It was translated into Norwegian; quoted, unchallenged, by Russian state news agency RIA Novosti; and spread among Russian-language websites.

“It was also an obvious fake, as any Google news search would have revealed. Yet despite its evident falsehood, it spread widely, and not just in directly Kremlin-run media. Tracking the spread of this fake therefore shines a light on the wider question of how fake stories are dispersed.”


Russian state news agency RIA Novosti presents themselves as a news outlet (T0097.202: News Outlet Persona). RIO Novosti is a real news outlet (T0143.001: Authentic Persona), but it did not carry out a basic investigation into the veracity of the narrative they published implicitly expected of institutions presenting themselves as news outlets.

We can’t know how or why this narrative ended up being published by RIA Novosti, but we know that it presented a distorted reality as authentic information (T0023: Distort Facts), claiming that the US was sending 3,600 tanks, instead of 3,600 vehicles which included ~180 tanks. | | [I00094 A glimpse inside a Chinese influence campaign: How bogus news websites blur the line between true and false](../../generated_pages/incidents/I00094.md) | Researchers identified websites managed by a Chinese marketing firm which presented themselves as news organisations.

“On its official website, the Chinese marketing firm boasted that they were in contact with news organizations across the globe, including one in South Korea called the “Chungcheng Times.” According to the joint team, this outlet is a fictional news organization created by the offending company. The Chinese company sought to disguise the site’s true identity and purpose by altering the name attached to it by one character—making it very closely resemble the name of a legitimate outlet operating out of Chungchengbuk-do.

“The marketing firm also established a news organization under the Korean name “Gyeonggido Daily,” which closely resembles legitimate news outlets operating out of Gyeonggi province such as “Gyeonggi Daily,” “Daily Gyeonggi Newspaper,” and “Gyeonggi N Daily.” One of the fake news sites was named “Incheon Focus,” a title that could be easily mistaken for the legitimate local news outlet, “Focus Incheon.” Furthermore, the Chinese marketing company operated two fake news sites with names identical to two separate local news organizations, one of which ceased operations in December 2022.

“In total, fifteen out of eighteen Chinese fake news sites incorporated the correct names of real regions in their fake company names. “If the operators had created fake news sites similar to major news organizations based in Seoul, however, the intended deception would have easily been uncovered,” explained Song Tae-eun, an assistant professor in the Department of National Security & Unification Studies at the Korea National Diplomatic Academy, to The Readable. “There is also the possibility that they are using the regional areas as an attempt to form ties with the local community; that being the government, the private sector, and religious communities.””


The firm styled their news site to resemble existing local news outlets in their target region (T0097.201: Local Institution Persona, T0097.202: News Outlet Persona, T0143.003: Impersonated Persona). | | [I00107 The Lies Russia Tells Itself](../../generated_pages/incidents/I00107.md) | The Moscow firm Social Design Agency (SDA) has been attributed as being behind a Russian disinformation project known as Doppelganger:

The SDA’s deception work first surfaced in 2022, likely almost immediately after Doppelganger got off the ground. In April of that year, Meta, the parent company of Facebook and Instagram, disclosed in a quarterly report that it had removed from its platforms “a network of about 200 accounts operated from Russia.” By August 2022, German investigative journalists revealed that they had discovered forgeries of about 30 news sites, including many of the country’s biggest media outlets—Frankfurter Allgemeine, Der Spiegel, and Bild—but also Britain’s Daily Mail and France’s 20 Minutes. The sites had deceptive URLs such as www-dailymail-co-uk.dailymail.top.


As part of the SDA’s work, they created many websites which impersonated existing media outlets. Sites used domain impersonation tactics to increase perceived legitimacy of their impersonations (T0097.202: News Outlet Persona, T0143.003: Impersonated Persona, T0152.003: Website Hosting Platform, T0149.003: Lookalike Domain). | -| [I00110 How COVID-19 conspiracists and extremists use crowdfunding platforms to fund their activities](../../generated_pages/incidents/I00110.md) | The EU Disinfo Lab produced a report into disinformation published on crowdfunding platforms:



More worrisome is the direct monetisation of disinformation happening on crowdfunding platforms: on Kickstarter, we found a user openly raising money for a documentary project suggesting that COVID-19 is a conspiracy.

A Kickstarter user attempted to use the platform to fund production of a documentary (T0017: Conduct Fundraising, T0087: Develop Video-Based Content, T0146: Account, T0148.006: Crowdfunding Platform).

On Patreon, we found several instances of direct monetisation of COVID-19 disinformation, including posts promoting a device allegedly protecting against COVID-19 and 5G, as well as posts related to the “Plandemic” conspiracy video, which gained attention on YouTube before being removed by the platform.

We also found an account called “Stranger than fiction” entirely dedicated to disinformation, which openly states that their content was “Banned by screwtube and fakebook, our videos have been viewed over a billion times.”


The “Stranger than fiction” user presented itself as an alternative news source which had been banned from other platforms (T0146: Account, T0097.202: News Outlet Persona, T0121.001: Bypass Content Bocking, T0152.012: Subscription Service Platform).

On the US-based crowdfunding platform IndieGogo, EU DisinfoLab found a successful crowdfunding campaign of €133.903 for a book called Revolution Q. This book, now also available on Amazon, claims to be “Written for both newcomers and long-time QAnon fans alike, this book is a treasure-trove of information designed to help everyone weather The Storm.”

An IndieGogo account was used to gather funds to produce a book on QAnon (T0017: Conduct Fundraising, T0085.005: Develop Book, T0146: Account, T0148.006: Crowdfunding Platform), with the book later sold on Amazon marketplace (T0148.007: eCommerce Platform). | -| [I00126 Charming Kitten Updates POWERSTAR with an InterPlanetary Twist](../../generated_pages/incidents/I00126.md) | The target of the recently observed [highly targeted spearphishing attack by “Charming Kitten”, a hacker group attributed to Iran] had published an article related to Iran. The publicity appears to have garnered the attention of Charming Kitten, who subsequently created an email address to impersonate a reporter of an Israeli media organization in order to send the target an email. Prior to sending malware to the target, the attacker simply asked if the target would be open to reviewing a document they had written related to US foreign policy. The target agreed to do so, since this was not an unusual request; they are frequently asked by journalists to review opinion pieces relating to their field of work.

In an effort to further gain the target’s confidence, Charming Kitten continued the interaction with another benign email containing a list of questions, to which the target then responded with answers. After multiple days of benign and seemingly legitimate interaction, Charming Kitten finally sent a “draft report”; this was the first time anything opaquely malicious occurred. The “draft report” was, in fact, a password-protected RAR file containing a malicious LNK file. The password for the RAR file was provided in a subsequent email.


In this example, threat actors created an email address on a domain which impersonated an existing Israeli news organisation impersonating a reporter who worked there (T0097.102: Journalist Persona, T0097.202: News Outlet Persona, T0143.003: Impersonated Persona, T0149.003: Lookalike Domain, T0149.002: Email Domain) in order to convince the target to download a document containing malware (T0085.004: Develop Document, T0147.003: Malware). | +| [I00110 How COVID-19 conspiracists and extremists use crowdfunding platforms to fund their activities](../../generated_pages/incidents/I00110.md) | The EU Disinfo Lab produced a report into disinformation published on crowdfunding platforms:

More worrisome is the direct monetisation of disinformation happening on crowdfunding platforms: on Kickstarter, we found a user openly raising money for a documentary project suggesting that COVID-19 is a conspiracy.

A Kickstarter user attempted to use the platform to fund production of a documentary (T0017: Conduct Fundraising, T0087: Develop Video-Based Content, T0146: Account Asset, T0148.006: Crowdfunding Platform).

On Patreon, we found several instances of direct monetisation of COVID-19 disinformation, including posts promoting a device allegedly protecting against COVID-19 and 5G, as well as posts related to the “Plandemic” conspiracy video, which gained attention on YouTube before being removed by the platform.

We also found an account called “Stranger than fiction” entirely dedicated to disinformation, which openly states that their content was “Banned by screwtube and fakebook, our videos have been viewed over a billion times.”


The “Stranger than fiction” user presented itself as an alternative news source which had been banned from other platforms (T0146: Account Asset, T0097.202: News Outlet Persona, T0121.001: Bypass Content Bocking, T0152.012: Subscription Service Platform).

On the US-based crowdfunding platform IndieGogo, EU DisinfoLab found a successful crowdfunding campaign of €133.903 for a book called Revolution Q. This book, now also available on Amazon, claims to be “Written for both newcomers and long-time QAnon fans alike, this book is a treasure-trove of information designed to help everyone weather The Storm.”

An IndieGogo account was used to gather funds to produce a book on QAnon (T0017: Conduct Fundraising, T0085.005: Develop Book, T0146: Account Asset, T0148.006: Crowdfunding Platform), with the book later sold on Amazon marketplace (T0148.007: eCommerce Platform). | +| [I00126 Charming Kitten Updates POWERSTAR with an InterPlanetary Twist](../../generated_pages/incidents/I00126.md) | The target of the recently observed [highly targeted spearphishing attack by “Charming Kitten”, a hacker group attributed to Iran] had published an article related to Iran. The publicity appears to have garnered the attention of Charming Kitten, who subsequently created an email address to impersonate a reporter of an Israeli media organization in order to send the target an email. Prior to sending malware to the target, the attacker simply asked if the target would be open to reviewing a document they had written related to US foreign policy. The target agreed to do so, since this was not an unusual request; they are frequently asked by journalists to review opinion pieces relating to their field of work.

In an effort to further gain the target’s confidence, Charming Kitten continued the interaction with another benign email containing a list of questions, to which the target then responded with answers. After multiple days of benign and seemingly legitimate interaction, Charming Kitten finally sent a “draft report”; this was the first time anything opaquely malicious occurred. The “draft report” was, in fact, a password-protected RAR file containing a malicious LNK file. The password for the RAR file was provided in a subsequent email.


In this example, threat actors created an email address on a domain which impersonated an existing Israeli news organisation impersonating a reporter who worked there (T0097.102: Journalist Persona, T0097.202: News Outlet Persona, T0143.003: Impersonated Persona, T0149.003: Lookalike Domain, T0149.002: Email Domain Asset) in order to convince the target to download a document containing malware (T0085.004: Develop Document, T0147.003: Malware Asset). | diff --git a/generated_pages/techniques/T0097.203.md b/generated_pages/techniques/T0097.203.md index 24b0559..047bae2 100644 --- a/generated_pages/techniques/T0097.203.md +++ b/generated_pages/techniques/T0097.203.md @@ -8,7 +8,7 @@ | Incident | Descriptions given for this incident | | -------- | -------------------- | | [I00084 Russia turns its diplomats into disinformation warriors](../../generated_pages/incidents/I00084.md) | “[Russia’s social media] reach isn't the same as Russian state media, but they are trying to recreate what RT and Sputnik had done," said one EU official involved in tracking Russian disinformation. "It's a coordinated effort that goes beyond social media and involves specific websites."

“Central to that wider online playbook is a Telegram channel called Warfakes and an affiliated website. Since the beginning of the conflict, that social media channel has garnered more than 725,000 members and repeatedly shares alleged fact-checks aimed at debunking Ukrainian narratives, using language similar to Western-style fact-checking outlets.”


In this example a Telegram channel (T0151.004: Chat Platform, T0155.007: Encrypted Communication Channel) was established which presented itself as a source of fact checks (T0097.203: Fact Checking Organisation Persona). | -| [I00120 factcheckUK or fakecheckUK? Reinventing the political faction as the impartial factchecker](../../generated_pages/incidents/I00120.md) | Ahead of the 2019 UK Election during a leader’s debate, the Conservative party rebranded their “Conservative Campaign Headquarters Press” account to “FactCheckUK”:


That is, until a few minutes into the debate.

All at once, like a person throwing off their street clothes to reveal some sinister new identity underneath, @CCHQPress abruptly shed its name, blue Conservative logo, Boris Johnson banner, and bio description. Moments later, it had entirely reinvented itself.

The purple banner was emblazoned with white font that read “✓ factcheckUK [with a “FROM CCQH” subheading]”.

The matching profile picture was a white tick in a purple circle. The bio was updated to: “Fact checking Labour from CCHQ”. And the name now read factcheckUK, with the customary Twitter blue (or white depending on your phone settings!) validation tick still after it


In this example an existing verified social media account on Twitter was repurposed to inauthentically present itself as a Fact Checking service (T0151.008: Microblogging Platform, T0150.003: Pre-Existing, T0146.003: Verified Account, T0097.203: Fact Checking Organisation Persona, T0143.002: Fabricated Persona). | +| [I00120 factcheckUK or fakecheckUK? Reinventing the political faction as the impartial factchecker](../../generated_pages/incidents/I00120.md) | Ahead of the 2019 UK Election during a leader’s debate, the Conservative party rebranded their “Conservative Campaign Headquarters Press” account to “FactCheckUK”:

The evening of the 19th November 2019 saw the first of three Leaders’ Debates on ITV, starting at 8pm and lasting for an hour. Current Prime Minister and leader of the Conservatives, Boris Johnson faced off against Labour party leader, Jeremy Corbyn. Plenty of people will have been watching the debate live, but a good proportion were “watching” (er, “twitching”?) via Twitter. This is something I’ve done in the past for certain shows. In some cases I just can’t watch or listen, but I can read, and in other cases, the commentary is far more interesting and entertaining than the show itself will ever be. This, for me, is just such a case. But very quickly, all eyes turned upon a modestly sized account with the handle @CCHQPress. That’s short for Conservative Campaign Headquarters Press. According to their (current!) Twitter bio, they are based in Westminster and they provide “snippets of news and commentary from CCHQ” to their 75k followers.

That is, until a few minutes into the debate.

All at once, like a person throwing off their street clothes to reveal some sinister new identity underneath, @CCHQPress abruptly shed its name, blue Conservative logo, Boris Johnson banner, and bio description. Moments later, it had entirely reinvented itself.

The purple banner was emblazoned with white font that read “✓ factcheckUK [with a “FROM CCQH” subheading]”.

The matching profile picture was a white tick in a purple circle. The bio was updated to: “Fact checking Labour from CCHQ”. And the name now read factcheckUK, with the customary Twitter blue (or white depending on your phone settings!) validation tick still after it


In this example an existing verified social media account on Twitter was repurposed to inauthentically present itself as a Fact Checking service (T0151.008: Microblogging Platform, T0150.003: Pre-Existing Asset, T0146.003: Verified Account Asset, T0097.203: Fact Checking Organisation Persona, T0143.002: Fabricated Persona). | diff --git a/generated_pages/techniques/T0097.204.md b/generated_pages/techniques/T0097.204.md index 268e730..a2135e5 100644 --- a/generated_pages/techniques/T0097.204.md +++ b/generated_pages/techniques/T0097.204.md @@ -7,7 +7,7 @@ | Incident | Descriptions given for this incident | | -------- | -------------------- | -| [I00072 Behind the Dutch Terror Threat Video: The St. Petersburg "Troll Factory" Connection](../../generated_pages/incidents/I00072.md) | “The creator of Geopolitika[.]ru is Aleksandr Dugin, who was sanctioned by the United States Department of Treasury in 2015 for his role in the Eurasian Youth Union “for being responsible for or complicit in actions or policies that threaten the peace, security, stability, or sovereignty or territorial integrity of Ukraine.”

[...]

“Currently, the website geopolika[.]ru redirects directly to another partner website, Katehon.

“Katehon poses itself as a think tank focused on geopolitics in an English edition of its website. In contrast, in Russian, it states its aim to develop “ideological, political, diplomatic, economic and military strategy for Russia of the future” with a special role of religion. The president of Katehon’s supervisory board is Konstantin Malofeev, a Russian millionaire with connections to the Russian orthodox church and presidential administration, who founded Tsargrad TV, a known source of disinformation. Malofeev was sanctioned by the U.S. Department of Treasury and the European Union in 2014 for material support and financial backing of Russian-backed separatists in eastern Ukraine. Another known figure from the board is Sergei Glaziev, former advisor to Putin in 2012–2019. Dugin is also on the board in the Russian edition of the website, whereas he is omitted in English.”
In this example a domain managed by an actor previously sanctioned by the US department of treasury has been reconfigured to redirect to another website; Katehon (T0149.004: Redirecting Domain, T0150.004: Repurposed).

Katehon presents itself as a geopolitical think tank in English, but does not maintain this persona when presenting itself to a Russian speaking audience (T0097.204: Think Tank Persona, T0152.004: Website, T0155.004: Geoblocked). | +| [I00072 Behind the Dutch Terror Threat Video: The St. Petersburg "Troll Factory" Connection](../../generated_pages/incidents/I00072.md) | “The creator of Geopolitika[.]ru is Aleksandr Dugin, who was sanctioned by the United States Department of Treasury in 2015 for his role in the Eurasian Youth Union “for being responsible for or complicit in actions or policies that threaten the peace, security, stability, or sovereignty or territorial integrity of Ukraine.”

[...]

“Currently, the website geopolika[.]ru redirects directly to another partner website, Katehon.

“Katehon poses itself as a think tank focused on geopolitics in an English edition of its website. In contrast, in Russian, it states its aim to develop “ideological, political, diplomatic, economic and military strategy for Russia of the future” with a special role of religion. The president of Katehon’s supervisory board is Konstantin Malofeev, a Russian millionaire with connections to the Russian orthodox church and presidential administration, who founded Tsargrad TV, a known source of disinformation. Malofeev was sanctioned by the U.S. Department of Treasury and the European Union in 2014 for material support and financial backing of Russian-backed separatists in eastern Ukraine. Another known figure from the board is Sergei Glaziev, former advisor to Putin in 2012–2019. Dugin is also on the board in the Russian edition of the website, whereas he is omitted in English.”


In this example a domain managed by an actor previously sanctioned by the US department of treasury has been reconfigured to redirect to another website; Katehon (T0149.004: Redirecting Domain Asset, T0150.004: Repurposed Asset).

Katehon presents itself as a geopolitical think tank in English, but does not maintain this persona when presenting itself to a Russian speaking audience (T0097.204: Think Tank Persona, T0152.004: Website Asset, T0155.004: Geoblocked Asset). | | [I00074 The Tactics & Tropes of the Internet Research Agency](../../generated_pages/incidents/I00074.md) | “[Russia’s Internet Research Agency, the IRA] pushed narratives with longform blog content. They created media properties, websites designed to produce stories that would resonate with those targeted. It appears, based on the data set provided by Alphabet, that the IRA may have also expanded into think tank-style communiques. One such page, previously unattributed to the IRA but included in the Alphabet data, was GI Analytics, a geopolitics blog with an international masthead that included American authors. This page was promoted via AdWords and YouTube videos; it has strong ties to more traditional Russian propaganda networks, which will be discussed later in this analysis. GI Analytics wrote articles articulating nuanced academic positions on a variety of sophisticated topics. From the site’s About page:

““Our purpose and mission are to provide high-quality analysis at a time when we are faced with a multitude of crises, a collapsing global economy, imperialist wars, environmental disasters, corporate greed, terrorism, deceit, GMO food, a migration crisis and a crackdown on small farmers and ranchers.””


In this example Alphabet’s technical indicators allowed them to assert that GI Analytics, which presented itself as a think tank, was a fabricated institution associated with Russia’s Internet Research Agency (T0097.204: Think Tank Persona, T0143.002: Fabricated Persona). | | [I00078 Meta’s September 2020 Removal of Coordinated Inauthentic Behavior](../../generated_pages/incidents/I00078.md) | “[Meta has] removed one Page, five Facebook accounts, one Group and three Instagram accounts for foreign or government interference which is coordinated inauthentic behavior on behalf of a foreign or government entity. This small network originated in Russia and focused primarily on Turkey and Europe, and also on the United States.

“This operation relied on fake accounts — some of which had been already detected and removed by our automated systems — to manage their Page and their Group, and to drive people to their site purporting to be an independent think-tank based primarily in Turkey. These accounts posed as locals based in Turkey, Canada and the US. They also recruited people to write for their website. This network had almost no following on our platforms when we removed it.”


Meta identified that a network of accounts originating in Russia were driving people off platform to a site which presented itself as a think-tank (T0097.204: Think Tank Persona). Meta did not make an attribution about the authenticity of this off-site think tank, so neither T0143.001: Authentic Persona or T0143.002: Fabricated Persona are used here.

Meta had access to technical data for accounts on its platform, and asserted that they were fabricated individuals posing as locals who recruited targets to write content for their website (T0097.101: Local Persona, T0097.106: Recruiter Persona, T0143.002: Fabricated Persona). | | [I00079 Three thousand fake tanks](../../generated_pages/incidents/I00079.md) | “The sixth [website to repost a confirmed false narrative investigated in this report] is an apparent think tank, the Center for Global Strategic Monitoring. This website describes itself, in English apparently written by a non-native speaker, as a “nonprofit and nonpartisan research and analysis institution dedicated to providing insights of the think tank community publications”. It does, indeed, publish think-tank reports on issues such as Turkey and US-China relations; however, the reports are the work of other think tanks, often unattributed (the two mentioned in this sentence were actually produced by the Brookings Institution, although the website makes no mention of the fact). It also fails to provide an address, or any other contact details other than an email, and its (long) list of experts includes entries apparently copied and pasted from other institutions. Thus, the “think tank” website which shared the fake story appears to be a fake itself.” In this example a website which amplified a false narrative presented itself as a think tank (T0097.204: Think Tank Persona).

This is an entirely fabricated persona (T0143.002: Fabricated Persona); it republished content from other think tanks without attribution (T0084.002: Plagiarise Content) and fabricated experts (T0097.108: Expert Persona, T0143.002: Fabricated Persona) to make it more believable that they were a real think tank. | diff --git a/generated_pages/techniques/T0097.205.md b/generated_pages/techniques/T0097.205.md index 9530f2b..7985623 100644 --- a/generated_pages/techniques/T0097.205.md +++ b/generated_pages/techniques/T0097.205.md @@ -9,7 +9,7 @@ | -------- | -------------------- | | [I00070 Eli Lilly Clarifies It’s Not Offering Free Insulin After Tweet From Fake Verified Account—As Chaos Unfolds On Twitter](../../generated_pages/incidents/I00070.md) | “Twitter Blue launched [November 2022], giving any users who pay $8 a month the ability to be verified on the site, a feature previously only available to public figures, government officials and journalists as a way to show they are who they claim to be.

“[A day after the launch], an account with the handle @EliLillyandCo labeled itself with the name “Eli Lilly and Company,” and by using the same logo as the company in its profile picture and with the verification checkmark, was indistinguishable from the real company (the picture has since been removed and the account has labeled itself as a parody profile).

The parody account tweeted “we are excited to announce insulin is free now.””


In this example an account impersonated the pharmaceutical company Eli Lilly (T0097.205: Business Persona, T0143.003: Impersonated Persona) by copying its name, profile picture (T0145.001: Copy Account Imagery), and paying for verification. | | [I00095 Meta: Chinese disinformation network was behind London front company recruiting content creators](../../generated_pages/incidents/I00095.md) | “A Chinese disinformation network operating fictitious employee personas across the internet used a front company in London to recruit content creators and translators around the world, according to Meta.

“The operation used a company called London New Europe Media, registered to an address on the upmarket Kensington High Street, that attempted to recruit real people to help it produce content. It is not clear how many people it ultimately recruited.

“London New Europe Media also “tried to engage individuals to record English-language videos scripted by the network,” in one case leading to a recording criticizing the United States being posted on YouTube, said Meta”.


In this example a front company was used (T0097.205: Business Persona) to enable actors to recruit targets for producing content (T0097.106: Recruiter Persona, T0143.002: Fabricated Persona). | -| [I00116 Blue-tick scammers target consumers who complain on X](../../generated_pages/incidents/I00116.md) | Consumers who complain of poor customer service on X are being targeted by scammers after the social media platform formerly known as Twitter changed its account verification process.

Bank customers and airline passengers are among those at risk of phishing scams when they complain to companies via X. Fraudsters, masquerading as customer service agents, respond under fake X handles and trick victims into disclosing their bank details to get a promised refund.

They typically win the trust of victims by displaying the blue checkmark icon, which until this year denoted accounts that had been officially verified by X.

Changes introduced this year allow the icon to be bought by anyone who pays an £11 monthly fee for the site’s subscription service, renamed this month from Twitter Blue to X Premium. Businesses that pay £950 a month receive a gold tick. X’s terms and conditions do not state whether subscriber accounts are pre-vetted.

Andrew Thomas was contacted by a scam account after posting a complaint to the travel platform Booking.com. “I’d been trying since April to get a refund after our holiday flights were cancelled and finally resorted to X,” he said.

“I received a response asking me to follow them, and DM [direct message] them with a contact number. They then called me via WhatsApp asking for my reference number so they could investigate. Later they called back to say that I would be refunded via their payment partner for which I’d need to download an app.”

Thomas became suspicious and checked the X profile. “It looked like the real thing, but I noticed that there was an unexpected hyphen in the Twitter handle and that it had only joined X in July 2023,” he said.


In this example a newly created paid account was created on X, used to direct users to other platforms (T0146.002: Paid Account, T0146.003: Verified Account, T0146.005: Lookalike Account ID, T0097.205: Business Persona, T0122: Direct Users to Alternative Platforms, T0143.003: Impersonated Persona, T0151.008: Microblogging Platform, T0150.001: Newly Created). | +| [I00116 Blue-tick scammers target consumers who complain on X](../../generated_pages/incidents/I00116.md) | Consumers who complain of poor customer service on X are being targeted by scammers after the social media platform formerly known as Twitter changed its account verification process.

Bank customers and airline passengers are among those at risk of phishing scams when they complain to companies via X. Fraudsters, masquerading as customer service agents, respond under fake X handles and trick victims into disclosing their bank details to get a promised refund.

They typically win the trust of victims by displaying the blue checkmark icon, which until this year denoted accounts that had been officially verified by X.

Changes introduced this year allow the icon to be bought by anyone who pays an £11 monthly fee for the site’s subscription service, renamed this month from Twitter Blue to X Premium. Businesses that pay £950 a month receive a gold tick. X’s terms and conditions do not state whether subscriber accounts are pre-vetted.

Andrew Thomas was contacted by a scam account after posting a complaint to the travel platform Booking.com. “I’d been trying since April to get a refund after our holiday flights were cancelled and finally resorted to X,” he said.

“I received a response asking me to follow them, and DM [direct message] them with a contact number. They then called me via WhatsApp asking for my reference number so they could investigate. Later they called back to say that I would be refunded via their payment partner for which I’d need to download an app.”

Thomas became suspicious and checked the X profile. “It looked like the real thing, but I noticed that there was an unexpected hyphen in the Twitter handle and that it had only joined X in July 2023,” he said.


In this example a newly created paid account was created on X, used to direct users to other platforms (T0146.002: Paid Account Asset, T0146.003: Verified Account Asset, T0146.005: Lookalike Account ID, T0097.205: Business Persona, T0122: Direct Users to Alternative Platforms, T0143.003: Impersonated Persona, T0151.008: Microblogging Platform, T0150.001: Newly Created Asset). | diff --git a/generated_pages/techniques/T0097.207.md b/generated_pages/techniques/T0097.207.md index e6f140a..63f5d43 100644 --- a/generated_pages/techniques/T0097.207.md +++ b/generated_pages/techniques/T0097.207.md @@ -8,7 +8,7 @@ | Incident | Descriptions given for this incident | | -------- | -------------------- | | [I00069 Uncharmed: Untangling Iran's APT42 Operations](../../generated_pages/incidents/I00069.md) | “[Iranian state-sponsored cyber espionage actor] APT42 cloud operations attack lifecycle can be described in details as follows:

- “Social engineering schemes involving decoys and trust building, which includes masquerading as legitimate NGOs and conducting ongoing correspondence with the target, sometimes lasting several weeks.
- The threat actor masqueraded as well-known international organizations in the legal and NGO fields and sent emails from domains typosquatting the original NGO domains, for example aspenlnstitute[.]org.
- The Aspen Institute became aware of this spoofed domain and collaborated with industry partners, including blocking it in SafeBrowsing, thus protecting users of Google Chrome and additional browsers.
- To increase their credibility, APT42 impersonated high-ranking personnel working at the aforementioned organizations when creating the email personas.
- APT42 enhanced their campaign credibility by using decoy material inviting targets to legitimate and relevant events and conferences. In one instance, the decoy material was hosted on an attacker-controlled SharePoint folder, accessible only after the victim entered their credentials. Mandiant did not identify malicious elements in the files, suggesting they were used solely to gain the victim’s trust.”


In this example APT42, an Iranian state-sponsored cyber espionage actor, created a domain impersonating the existing NGO The Aspen Institute (T0143.003: Impersonated Persona, T0097.207: NGO Persona). They increased the perceived legitimacy of the impersonation by also impersonating high-ranking employees of the NGO (T0097.100: Individual Persona, T0143.003: Impersonated Persona). | -| [I00109 Coordinated Facebook Pages Designed to Fund a White Supremacist Agenda](../../generated_pages/incidents/I00109.md) | This report examines the white nationalist group Suavelos’ use of Facebook to draw visitors to its website without overtly revealing their racist ideology. This section of the report looks at technical indicators associated with the Suavelos website, and attributions which can be made as a consequence:

[The Google AdSense tag set up on Suavelos.eu was also found on the following domains, indicating that they are controlled by the same actor;] Alabastro.eu: an online shop to buy “white nationalists” t-shirts [and] ARPAC.eu: the website of a registered non-profit organisation advocating to lift regulation on gun control in France.

Other domains attributed to Suavelos (T0149.001: Domain) reveal a website set up to sell merchandise (T0152.004: Website, T0148.004: Payment Processing Capability, T0061: Sell Merchandise), and a website hosting a registered French non-profit (T0152.004: Website, T0097.207: NGO Persona).

To learn more about the suavelos.eu domain, we collected the following data: The domain is hosted on OVH; The owner’s identity is protected; The IP Address of the server is 94.23.253.173, which is shared with 20 other domains.

The relative low number of websites hosted on this IP address could indicate that they all belong to the same people, and are hosted on the same private server.<.i>

Suavelos registered a domain using the web hosting provider OVH (T0149.001: Domain, T0152.003: Website Hosting Platform, T0150.006: Purchased). The site’s IP address reveals a server hosting other domains potentially owned by the actors (T0149.005: Server, T0149.006: IP Address). | +| [I00109 Coordinated Facebook Pages Designed to Fund a White Supremacist Agenda](../../generated_pages/incidents/I00109.md) | This report examines the white nationalist group Suavelos’ use of Facebook to draw visitors to its website without overtly revealing their racist ideology. This section of the report looks at technical indicators associated with the Suavelos website, and attributions which can be made as a consequence:

[The Google AdSense tag set up on Suavelos.eu was also found on the following domains, indicating that they are controlled by the same actor;] Alabastro.eu: an online shop to buy “white nationalists” t-shirts [and] ARPAC.eu: the website of a registered non-profit organisation advocating to lift regulation on gun control in France.

Other domains attributed to Suavelos (T0149.001: Domain Asset) reveal a website set up to sell merchandise (T0152.004: Website Asset, T0148.004: Payment Processing Capability, T0061: Sell Merchandise), and a website hosting a registered French non-profit (T0152.004: Website Asset, T0097.207: NGO Persona).

To learn more about the suavelos.eu domain, we collected the following data: The domain is hosted on OVH; The owner’s identity is protected; The IP Address of the server is 94.23.253.173, which is shared with 20 other domains.

The relative low number of websites hosted on this IP address could indicate that they all belong to the same people, and are hosted on the same private server.


Suavelos registered a domain using the web hosting provider OVH (T0149.001: Domain Asset, T0152.003: Website Hosting Platform, T0150.006: Purchased). The site’s IP address reveals a server hosting other domains potentially owned by the actors (T0149.005: Server Asset, T0149.006: IP Address Asset). | diff --git a/generated_pages/techniques/T0097.208.md b/generated_pages/techniques/T0097.208.md index 743aab1..93b5f0c 100644 --- a/generated_pages/techniques/T0097.208.md +++ b/generated_pages/techniques/T0097.208.md @@ -7,9 +7,9 @@ | Incident | Descriptions given for this incident | | -------- | -------------------- | -| [I00074 The Tactics & Tropes of the Internet Research Agency](../../generated_pages/incidents/I00074.md) | “The Black Matters Facebook Page [operated by Russia’s Internet Research Agency] explored several visual brand identities, moving from a plain logo to a gothic typeface on Jan 19th, 2016. On February 4th, 2016, the person who ran the Facebook Page announced the launch of the website, blackmattersus[.]com, emphasizing media distrust and a desire to build Black independent media; [“I DIDN’T BELIEVE THE MEDIA / SO I BECAME ONE”]”

In this example an asset controlled by Russia’s Internet Research Agency began to present itself as a source of “Black independent media”, claiming that the media could not be trusted (T0097.208: Social Cause Persona, T0097.202: News Outlet Persona, T0143.002: Fabricated Persona). | -| [I00114 ‘Carol’s Journey’: What Facebook knew about how it radicalized users](../../generated_pages/incidents/I00114.md) | This report examines internal Facebook communications which reveal employees’ concerns about how the platform’s algorithm was recommending users join extremist conspiracy groups.

In summer 2019, a new Facebook user named Carol Smith signed up for the platform, describing herself as a politically conservative mother from Wilmington, North Carolina. Smith’s account indicated an interest in politics, parenting and Christianity and followed a few of her favorite brands, including Fox News and then-President Donald Trump.

Though Smith had never expressed interest in conspiracy theories, in just two days Facebook was recommending she join groups dedicated to QAnon, a sprawling and baseless conspiracy theory and movement that claimed Trump was secretly saving the world from a cabal of pedophiles and Satanists.

Smith didn’t follow the recommended QAnon groups, but whatever algorithm Facebook was using to determine how she should engage with the platform pushed ahead just the same. Within one week, Smith’s feed was full of groups and pages that had violated Facebook’s own rules, including those against hate speech and disinformation.

Smith wasn’t a real person. A researcher employed by Facebook invented the account, along with those of other fictitious “test users” in 2019 and 2020, as part of an experiment in studying the platform’s role in misinforming and polarizing users through its recommendations systems.

That researcher said Smith’s Facebook experience was “a barrage of extreme, conspiratorial, and graphic content.”


Facebook’s Algorithm suggested users join groups which supported the QAnon movement (T0151.001: Social Media Platform, T0151.002: Online Community Group, T0153.006: Content Recommendation Algorithm, T0097.208: Social Cause Persona).

Further investigation by Facebook uncovered that its advertising platform had been used to promote QAnon narratives (T0146: Account, T0114: Deliver Ads, T0153.005: Online Advertising Platform):

For years, company researchers had been running experiments like Carol Smith’s to gauge the platform’s hand in radicalizing users, according to the documents seen by NBC News.

This internal work repeatedly found that recommendation tools pushed users into extremist groups, findings that helped inform policy changes and tweaks to recommendations and news feed rankings. Those rankings are a tentacled, ever-evolving system widely known as “the algorithm” that pushes content to users. But the research at that time stopped well short of inspiring any movement to change the groups and pages themselves.

That reluctance was indicative of “a pattern at Facebook,” Haugen told reporters this month. “They want the shortest path between their current policies and any action.”

[...]

By summer 2020, Facebook was hosting thousands of private QAnon groups and pages, with millions of members and followers, according to an unreleased internal investigation.

A year after the FBI designated QAnon as a potential domestic terrorist threat in the wake of standoffs, alleged planned kidnappings, harassment campaigns and shootings, Facebook labeled QAnon a “Violence Inciting Conspiracy Network” and banned it from the platform, along with militias and other violent social movements. A small team working across several of Facebook’s departments found its platforms had hosted hundreds of ads on Facebook and Instagram worth thousands of dollars and millions of views, “praising, supporting, or representing” the conspiracy theory.

[...]

For many employees inside Facebook, the enforcement came too late, according to posts left on Workplace, the company’s internal message board.

“We’ve known for over a year now that our recommendation systems can very quickly lead users down the path to conspiracy theories and groups,” one integrity researcher, whose name had been redacted, wrote in a post announcing she was leaving the company. “This fringe group has grown to national prominence, with QAnon congressional candidates and QAnon hashtags and groups trending in the mainstream. We were willing to act only * after * things had spiraled into a dire state.”

While Facebook’s ban initially appeared effective, a problem remained: The removal of groups and pages didn’t wipe out QAnon’s most extreme followers, who continued to organize on the platform.

“There was enough evidence to raise red flags in the expert community that Facebook and other platforms failed to address QAnon’s violent extremist dimension,” said Marc-André Argentino, a research fellow at King’s College London’s International Centre for the Study of Radicalisation, who has extensively studied QAnon.

Believers simply rebranded as anti-child-trafficking groups or migrated to other communities, including those around the anti-vaccine movement.

[...]

These conspiracy groups had become the fastest-growing groups on Facebook, according to the report, but Facebook wasn’t able to control their “meteoric growth,” the researchers wrote, “because we were looking at each entity individually, rather than as a cohesive movement.” A Facebook spokesperson told BuzzFeed News it took many steps to limit election misinformation but that it was unable to catch everything.
| -| [I00128 #TrollTracker: Outward Influence Operation From Iran](../../generated_pages/incidents/I00128.md) | [Meta removed a network of assets for coordinated inauthentic behaviour. One page] in the network, @StopMEK, was promoting views against the People’s Mujahedin of Iran (MEK), the largest and most active political opposition group against the Islamic Republic of Iran Leadership.

The content on the page drew narratives showing parallels between the Islamic State of Iraq and Syria (ISIS) and the MEK.

Apart from images and memes, the @StopMEK page shared a link to an archived report on how the United States was monitoring the MEK’s movement in Iran in the mid-1990’s. The file was embedded as a QR code on one of the page’s images.


In this example a Facebook page presented itself as focusing on a political cause (T0097.208: Social Cause Persona, T0151.001: Social Media Platform, T0151.002: Online Community Group). Within the page it embedded a QR code (T0122: Direct Users to Alternative Platforms, T0153.004: QR Code), which took users to a document hosted on another website (T0152.004: Website). | +| [I00074 The Tactics & Tropes of the Internet Research Agency](../../generated_pages/incidents/I00074.md) | “The Black Matters Facebook Page [operated by Russia’s Internet Research Agency] explored several visual brand identities, moving from a plain logo to a gothic typeface on Jan 19th, 2016. On February 4th, 2016, the person who ran the Facebook Page announced the launch of the website, blackmattersus[.]com, emphasizing media distrust and a desire to build Black independent media; [“I DIDN’T BELIEVE THE MEDIA / SO I BECAME ONE”]”

In this example an asset controlled by Russia’s Internet Research Agency began to present itself as a source of “Black independent media”, claiming that the media could not be trusted (T0097.208: Social Cause Persona, T0097.202: News Outlet Persona, T0143.002: Fabricated Persona). | +| [I00114 ‘Carol’s Journey’: What Facebook knew about how it radicalized users](../../generated_pages/incidents/I00114.md) | This report examines internal Facebook communications which reveal employees’ concerns about how the platform’s algorithm was recommending users join extremist conspiracy groups.

In summer 2019, a new Facebook user named Carol Smith signed up for the platform, describing herself as a politically conservative mother from Wilmington, North Carolina. Smith’s account indicated an interest in politics, parenting and Christianity and followed a few of her favorite brands, including Fox News and then-President Donald Trump.

Though Smith had never expressed interest in conspiracy theories, in just two days Facebook was recommending she join groups dedicated to QAnon, a sprawling and baseless conspiracy theory and movement that claimed Trump was secretly saving the world from a cabal of pedophiles and Satanists.

Smith didn’t follow the recommended QAnon groups, but whatever algorithm Facebook was using to determine how she should engage with the platform pushed ahead just the same. Within one week, Smith’s feed was full of groups and pages that had violated Facebook’s own rules, including those against hate speech and disinformation.

Smith wasn’t a real person. A researcher employed by Facebook invented the account, along with those of other fictitious “test users” in 2019 and 2020, as part of an experiment in studying the platform’s role in misinforming and polarizing users through its recommendations systems.

That researcher said Smith’s Facebook experience was “a barrage of extreme, conspiratorial, and graphic content.”


Facebook’s Algorithm suggested users join groups which supported the QAnon movement (T0151.001: Social Media Platform, T0151.002: Online Community Group, T0153.006: Content Recommendation Algorithm, T0097.208: Social Cause Persona).

Further investigation by Facebook uncovered that its advertising platform had been used to promote QAnon narratives (T0146: Account Asset, T0114: Deliver Ads, T0153.005: Online Advertising Platform):

For years, company researchers had been running experiments like Carol Smith’s to gauge the platform’s hand in radicalizing users, according to the documents seen by NBC News.

This internal work repeatedly found that recommendation tools pushed users into extremist groups, findings that helped inform policy changes and tweaks to recommendations and news feed rankings. Those rankings are a tentacled, ever-evolving system widely known as “the algorithm” that pushes content to users. But the research at that time stopped well short of inspiring any movement to change the groups and pages themselves.

That reluctance was indicative of “a pattern at Facebook,” Haugen told reporters this month. “They want the shortest path between their current policies and any action.”

[...]

By summer 2020, Facebook was hosting thousands of private QAnon groups and pages, with millions of members and followers, according to an unreleased internal investigation.

A year after the FBI designated QAnon as a potential domestic terrorist threat in the wake of standoffs, alleged planned kidnappings, harassment campaigns and shootings, Facebook labeled QAnon a “Violence Inciting Conspiracy Network” and banned it from the platform, along with militias and other violent social movements. A small team working across several of Facebook’s departments found its platforms had hosted hundreds of ads on Facebook and Instagram worth thousands of dollars and millions of views, “praising, supporting, or representing” the conspiracy theory.

[...]

For many employees inside Facebook, the enforcement came too late, according to posts left on Workplace, the company’s internal message board.

“We’ve known for over a year now that our recommendation systems can very quickly lead users down the path to conspiracy theories and groups,” one integrity researcher, whose name had been redacted, wrote in a post announcing she was leaving the company. “This fringe group has grown to national prominence, with QAnon congressional candidates and QAnon hashtags and groups trending in the mainstream. We were willing to act only * after * things had spiraled into a dire state.”

While Facebook’s ban initially appeared effective, a problem remained: The removal of groups and pages didn’t wipe out QAnon’s most extreme followers, who continued to organize on the platform.

“There was enough evidence to raise red flags in the expert community that Facebook and other platforms failed to address QAnon’s violent extremist dimension,” said Marc-André Argentino, a research fellow at King’s College London’s International Centre for the Study of Radicalisation, who has extensively studied QAnon.

Believers simply rebranded as anti-child-trafficking groups or migrated to other communities, including those around the anti-vaccine movement.

[...]

These conspiracy groups had become the fastest-growing groups on Facebook, according to the report, but Facebook wasn’t able to control their “meteoric growth,” the researchers wrote, “because we were looking at each entity individually, rather than as a cohesive movement.” A Facebook spokesperson told BuzzFeed News it took many steps to limit election misinformation but that it was unable to catch everything.
| +| [I00128 #TrollTracker: Outward Influence Operation From Iran](../../generated_pages/incidents/I00128.md) | [Meta removed a network of assets for coordinated inauthentic behaviour. One page] in the network, @StopMEK, was promoting views against the People’s Mujahedin of Iran (MEK), the largest and most active political opposition group against the Islamic Republic of Iran Leadership.

The content on the page drew narratives showing parallels between the Islamic State of Iraq and Syria (ISIS) and the MEK.

Apart from images and memes, the @StopMEK page shared a link to an archived report on how the United States was monitoring the MEK’s movement in Iran in the mid-1990’s. The file was embedded as a QR code on one of the page’s images.


In this example a Facebook page presented itself as focusing on a political cause (T0097.208: Social Cause Persona, T0151.001: Social Media Platform, T0151.002: Online Community Group). Within the page it embedded a QR code (T0122: Direct Users to Alternative Platforms, T0153.004: QR Code Asset), which took users to a document hosted on another website (T0152.004: Website Asset). | diff --git a/generated_pages/techniques/T0101.md b/generated_pages/techniques/T0101.md index dffd11f..462163b 100644 --- a/generated_pages/techniques/T0101.md +++ b/generated_pages/techniques/T0101.md @@ -7,7 +7,7 @@ | Incident | Descriptions given for this incident | | -------- | -------------------- | -| [I00102 Ignore The Poway Synagogue Shooter’s Manifesto: Pay Attention To 8chan’s /pol/ Board](../../generated_pages/incidents/I00102.md) | On April 27, 2019, at around 11:30 a.m. local time, a young man with a semi-automatic rifle walked into the Chabad of Poway Synagogue in Poway, California. He opened fire, killing one worshipper and wounding three others. In the hours since the shooting, a manifesto, believed to be written by the shooter, began circulating online. Evidence has also surfaced that, like the Christchurch Mosque shooter, this killer began his rampage with a post on 8chan’s /pol/ board.

Although both of these attacks may seem different, since they targeted worshippers of different faiths, both shooters were united by the same fascist ideology. They were also both radicalized in the same place: 8chan’s /pol/ board.

This has been corroborated by posts on the board itself, where “anons,” as the posters call themselves, recirculated the shooter’s since-deleted post. In it, the alleged shooter claims to have been “lurking” on the site for a year and a half. He includes a link to a livestream of his rampage — which thankfully does not appear to have worked — and he also includes a pastebin link to his manifesto.

The very first response to his announcement was another anon cheering him on and telling him to “get the high score,” AKA, kill a huge number of people.


Before carrying out a mass shooting, the shooter posted a thread to 8chan’s /pol/ board. The post directed users to a variety of different platforms (T0146.006: Open Access Platform, T0151.012: Image Board Platform, T0115: Post Content, T0122: Direct Users to Alternative Platforms); a Facebook account on which the shooter attempted to livestream the shooting (T0146: Account, T0151.001: Social Media Platform); and a manifesto they had written hosted on pastebin (T0146.006: Open Access Platform, T0152.005: Paste Platform, T0115: Post Content) and uploaded to the file sharing platform Mediafire (T0152.010: File Hosting Platform, T0085.004: Develop Document).

The report looks deeper into 8chan’s /pol/ board:

8chan is a large website, which includes a number of different discussion groups about everything from anime to left-wing politics. /pol/ is one particularly active board on the website, and it is best described as a gathering place for extremely online neo-Nazis.

[...]

I’ve browsed /pol/ on an almost daily basis since the Christchurch shooting. It has not been difficult to find calls for violence. On Monday, March 25 of this year, I ran across evidence of anons translating the Christchurch shooter’s manifesto into other languages in an attempt to inspire more shootings across the globe.

This tactic can work, and today’s shooting is proof. The Poway Synagogue shooter directly cited the Christchurch shooter as his inspiration, saying he decided to carry out his attack roughly two weeks after that shooting. On /pol/, many anons refer to the Christchurch shooter, Brenton Tarrant, as “Saint Tarrant,” complete with medieval-inspired iconography.


Manifestos posted to 8chan are translated and reshared by other platform users (T0101: Create Localised Content, T0146.006: Open Access Platform, T0151.012: Image Board Platform, T0115: Post Content, T0084.004: Appropriate Content).

When I began looking through /pol/ right after the Poway Synagogue shooting, I came across several claims that the shootings had been a “false flag” aimed at making the message board look bad.

When Bellingcat tweeted out a warning about shitposting and the shooter’s manifesto, in the immediate wake of the attack, probable anons even commented on the Tweet in an attempt to deny that a channer had been behind the attack.

This is a recognizable pattern that occurs in the wake of any crimes committed by members of the board. While the initial response to the Christchurch shooter’s massacre thread was riotous glee, in the days after the shooting many anons began to claim the attack had been a false flag. This actually sparked significant division and debate between the members of /pol/. In the below image, a user mocks other anons for being unable to “believe something in your favor is real.” Another anon responds, “As the evidence comes out, its [sic] quite clear that this was a false flag.”

In his manifesto, the Poway Synagogue shooter even weighed in on this debate, accusing other anons who called the Christchurch and Tree of Life Synagogue shootings “false flags” to merely have been scared: “They can’t fathom that there are brave White men alive who have the willpower and courage it takes to say, ‘Fuck my life—I’m willing to sacrifice everything for the benefit of my race.’”


Platform users deny that their platform has been used by mass shooters to publish their manifestos (T0129.006: Deny Involvement). | +| [I00102 Ignore The Poway Synagogue Shooter’s Manifesto: Pay Attention To 8chan’s /pol/ Board](../../generated_pages/incidents/I00102.md) | On April 27, 2019, at around 11:30 a.m. local time, a young man with a semi-automatic rifle walked into the Chabad of Poway Synagogue in Poway, California. He opened fire, killing one worshipper and wounding three others. In the hours since the shooting, a manifesto, believed to be written by the shooter, began circulating online. Evidence has also surfaced that, like the Christchurch Mosque shooter, this killer began his rampage with a post on 8chan’s /pol/ board.

Although both of these attacks may seem different, since they targeted worshippers of different faiths, both shooters were united by the same fascist ideology. They were also both radicalized in the same place: 8chan’s /pol/ board.

This has been corroborated by posts on the board itself, where “anons,” as the posters call themselves, recirculated the shooter’s since-deleted post. In it, the alleged shooter claims to have been “lurking” on the site for a year and a half. He includes a link to a livestream of his rampage — which thankfully does not appear to have worked — and he also includes a pastebin link to his manifesto.

The very first response to his announcement was another anon cheering him on and telling him to “get the high score,” AKA, kill a huge number of people.


Before carrying out a mass shooting, the shooter posted a thread to 8chan’s /pol/ board. The post directed users to a variety of different platforms (T0146.006: Open Access Platform, T0151.012: Image Board Platform, T0115: Post Content, T0122: Direct Users to Alternative Platforms); a Facebook account on which the shooter attempted to livestream the shooting (T0146: Account Asset, T0151.001: Social Media Platform); and a manifesto they had written hosted on pastebin (T0146.006: Open Access Platform, T0152.005: Paste Platform, T0115: Post Content) and uploaded to the file sharing platform Mediafire (T0152.010: File Hosting Platform, T0085.004: Develop Document).

The report looks deeper into 8chan’s /pol/ board:

8chan is a large website, which includes a number of different discussion groups about everything from anime to left-wing politics. /pol/ is one particularly active board on the website, and it is best described as a gathering place for extremely online neo-Nazis.

[...]

I’ve browsed /pol/ on an almost daily basis since the Christchurch shooting. It has not been difficult to find calls for violence. On Monday, March 25 of this year, I ran across evidence of anons translating the Christchurch shooter’s manifesto into other languages in an attempt to inspire more shootings across the globe.

This tactic can work, and today’s shooting is proof. The Poway Synagogue shooter directly cited the Christchurch shooter as his inspiration, saying he decided to carry out his attack roughly two weeks after that shooting. On /pol/, many anons refer to the Christchurch shooter, Brenton Tarrant, as “Saint Tarrant,” complete with medieval-inspired iconography.


Manifestos posted to 8chan are translated and reshared by other platform users (T0101: Create Localised Content, T0146.006: Open Access Platform, T0151.012: Image Board Platform, T0115: Post Content, T0084.004: Appropriate Content).

When I began looking through /pol/ right after the Poway Synagogue shooting, I came across several claims that the shootings had been a “false flag” aimed at making the message board look bad.

When Bellingcat tweeted out a warning about shitposting and the shooter’s manifesto, in the immediate wake of the attack, probable anons even commented on the Tweet in an attempt to deny that a channer had been behind the attack.

This is a recognizable pattern that occurs in the wake of any crimes committed by members of the board. While the initial response to the Christchurch shooter’s massacre thread was riotous glee, in the days after the shooting many anons began to claim the attack had been a false flag. This actually sparked significant division and debate between the members of /pol/. In the below image, a user mocks other anons for being unable to “believe something in your favor is real.” Another anon responds, “As the evidence comes out, its [sic] quite clear that this was a false flag.”

In his manifesto, the Poway Synagogue shooter even weighed in on this debate, accusing other anons who called the Christchurch and Tree of Life Synagogue shootings “false flags” to merely have been scared: “They can’t fathom that there are brave White men alive who have the willpower and courage it takes to say, ‘Fuck my life—I’m willing to sacrifice everything for the benefit of my race.’”


Platform users deny that their platform has been used by mass shooters to publish their manifestos (T0129.006: Deny Involvement). | diff --git a/generated_pages/techniques/T0114.md b/generated_pages/techniques/T0114.md index 4a881d3..b8d7d99 100644 --- a/generated_pages/techniques/T0114.md +++ b/generated_pages/techniques/T0114.md @@ -7,7 +7,7 @@ | Incident | Descriptions given for this incident | | -------- | -------------------- | -| [I00114 ‘Carol’s Journey’: What Facebook knew about how it radicalized users](../../generated_pages/incidents/I00114.md) | This report examines internal Facebook communications which reveal employees’ concerns about how the platform’s algorithm was recommending users join extremist conspiracy groups.

In summer 2019, a new Facebook user named Carol Smith signed up for the platform, describing herself as a politically conservative mother from Wilmington, North Carolina. Smith’s account indicated an interest in politics, parenting and Christianity and followed a few of her favorite brands, including Fox News and then-President Donald Trump.

Though Smith had never expressed interest in conspiracy theories, in just two days Facebook was recommending she join groups dedicated to QAnon, a sprawling and baseless conspiracy theory and movement that claimed Trump was secretly saving the world from a cabal of pedophiles and Satanists.

Smith didn’t follow the recommended QAnon groups, but whatever algorithm Facebook was using to determine how she should engage with the platform pushed ahead just the same. Within one week, Smith’s feed was full of groups and pages that had violated Facebook’s own rules, including those against hate speech and disinformation.

Smith wasn’t a real person. A researcher employed by Facebook invented the account, along with those of other fictitious “test users” in 2019 and 2020, as part of an experiment in studying the platform’s role in misinforming and polarizing users through its recommendations systems.

That researcher said Smith’s Facebook experience was “a barrage of extreme, conspiratorial, and graphic content.”


Facebook’s Algorithm suggested users join groups which supported the QAnon movement (T0151.001: Social Media Platform, T0151.002: Online Community Group, T0153.006: Content Recommendation Algorithm, T0097.208: Social Cause Persona).

Further investigation by Facebook uncovered that its advertising platform had been used to promote QAnon narratives (T0146: Account, T0114: Deliver Ads, T0153.005: Online Advertising Platform):

For years, company researchers had been running experiments like Carol Smith’s to gauge the platform’s hand in radicalizing users, according to the documents seen by NBC News.

This internal work repeatedly found that recommendation tools pushed users into extremist groups, findings that helped inform policy changes and tweaks to recommendations and news feed rankings. Those rankings are a tentacled, ever-evolving system widely known as “the algorithm” that pushes content to users. But the research at that time stopped well short of inspiring any movement to change the groups and pages themselves.

That reluctance was indicative of “a pattern at Facebook,” Haugen told reporters this month. “They want the shortest path between their current policies and any action.”

[...]

By summer 2020, Facebook was hosting thousands of private QAnon groups and pages, with millions of members and followers, according to an unreleased internal investigation.

A year after the FBI designated QAnon as a potential domestic terrorist threat in the wake of standoffs, alleged planned kidnappings, harassment campaigns and shootings, Facebook labeled QAnon a “Violence Inciting Conspiracy Network” and banned it from the platform, along with militias and other violent social movements. A small team working across several of Facebook’s departments found its platforms had hosted hundreds of ads on Facebook and Instagram worth thousands of dollars and millions of views, “praising, supporting, or representing” the conspiracy theory.

[...]

For many employees inside Facebook, the enforcement came too late, according to posts left on Workplace, the company’s internal message board.

“We’ve known for over a year now that our recommendation systems can very quickly lead users down the path to conspiracy theories and groups,” one integrity researcher, whose name had been redacted, wrote in a post announcing she was leaving the company. “This fringe group has grown to national prominence, with QAnon congressional candidates and QAnon hashtags and groups trending in the mainstream. We were willing to act only * after * things had spiraled into a dire state.”

While Facebook’s ban initially appeared effective, a problem remained: The removal of groups and pages didn’t wipe out QAnon’s most extreme followers, who continued to organize on the platform.

“There was enough evidence to raise red flags in the expert community that Facebook and other platforms failed to address QAnon’s violent extremist dimension,” said Marc-André Argentino, a research fellow at King’s College London’s International Centre for the Study of Radicalisation, who has extensively studied QAnon.

Believers simply rebranded as anti-child-trafficking groups or migrated to other communities, including those around the anti-vaccine movement.

[...]

These conspiracy groups had become the fastest-growing groups on Facebook, according to the report, but Facebook wasn’t able to control their “meteoric growth,” the researchers wrote, “because we were looking at each entity individually, rather than as a cohesive movement.” A Facebook spokesperson told BuzzFeed News it took many steps to limit election misinformation but that it was unable to catch everything.
| +| [I00114 ‘Carol’s Journey’: What Facebook knew about how it radicalized users](../../generated_pages/incidents/I00114.md) | This report examines internal Facebook communications which reveal employees’ concerns about how the platform’s algorithm was recommending users join extremist conspiracy groups.

In summer 2019, a new Facebook user named Carol Smith signed up for the platform, describing herself as a politically conservative mother from Wilmington, North Carolina. Smith’s account indicated an interest in politics, parenting and Christianity and followed a few of her favorite brands, including Fox News and then-President Donald Trump.

Though Smith had never expressed interest in conspiracy theories, in just two days Facebook was recommending she join groups dedicated to QAnon, a sprawling and baseless conspiracy theory and movement that claimed Trump was secretly saving the world from a cabal of pedophiles and Satanists.

Smith didn’t follow the recommended QAnon groups, but whatever algorithm Facebook was using to determine how she should engage with the platform pushed ahead just the same. Within one week, Smith’s feed was full of groups and pages that had violated Facebook’s own rules, including those against hate speech and disinformation.

Smith wasn’t a real person. A researcher employed by Facebook invented the account, along with those of other fictitious “test users” in 2019 and 2020, as part of an experiment in studying the platform’s role in misinforming and polarizing users through its recommendations systems.

That researcher said Smith’s Facebook experience was “a barrage of extreme, conspiratorial, and graphic content.”


Facebook’s Algorithm suggested users join groups which supported the QAnon movement (T0151.001: Social Media Platform, T0151.002: Online Community Group, T0153.006: Content Recommendation Algorithm, T0097.208: Social Cause Persona).

Further investigation by Facebook uncovered that its advertising platform had been used to promote QAnon narratives (T0146: Account Asset, T0114: Deliver Ads, T0153.005: Online Advertising Platform):

For years, company researchers had been running experiments like Carol Smith’s to gauge the platform’s hand in radicalizing users, according to the documents seen by NBC News.

This internal work repeatedly found that recommendation tools pushed users into extremist groups, findings that helped inform policy changes and tweaks to recommendations and news feed rankings. Those rankings are a tentacled, ever-evolving system widely known as “the algorithm” that pushes content to users. But the research at that time stopped well short of inspiring any movement to change the groups and pages themselves.

That reluctance was indicative of “a pattern at Facebook,” Haugen told reporters this month. “They want the shortest path between their current policies and any action.”

[...]

By summer 2020, Facebook was hosting thousands of private QAnon groups and pages, with millions of members and followers, according to an unreleased internal investigation.

A year after the FBI designated QAnon as a potential domestic terrorist threat in the wake of standoffs, alleged planned kidnappings, harassment campaigns and shootings, Facebook labeled QAnon a “Violence Inciting Conspiracy Network” and banned it from the platform, along with militias and other violent social movements. A small team working across several of Facebook’s departments found its platforms had hosted hundreds of ads on Facebook and Instagram worth thousands of dollars and millions of views, “praising, supporting, or representing” the conspiracy theory.

[...]

For many employees inside Facebook, the enforcement came too late, according to posts left on Workplace, the company’s internal message board.

“We’ve known for over a year now that our recommendation systems can very quickly lead users down the path to conspiracy theories and groups,” one integrity researcher, whose name had been redacted, wrote in a post announcing she was leaving the company. “This fringe group has grown to national prominence, with QAnon congressional candidates and QAnon hashtags and groups trending in the mainstream. We were willing to act only * after * things had spiraled into a dire state.”

While Facebook’s ban initially appeared effective, a problem remained: The removal of groups and pages didn’t wipe out QAnon’s most extreme followers, who continued to organize on the platform.

“There was enough evidence to raise red flags in the expert community that Facebook and other platforms failed to address QAnon’s violent extremist dimension,” said Marc-André Argentino, a research fellow at King’s College London’s International Centre for the Study of Radicalisation, who has extensively studied QAnon.

Believers simply rebranded as anti-child-trafficking groups or migrated to other communities, including those around the anti-vaccine movement.

[...]

These conspiracy groups had become the fastest-growing groups on Facebook, according to the report, but Facebook wasn’t able to control their “meteoric growth,” the researchers wrote, “because we were looking at each entity individually, rather than as a cohesive movement.” A Facebook spokesperson told BuzzFeed News it took many steps to limit election misinformation but that it was unable to catch everything.
| diff --git a/generated_pages/techniques/T0115.md b/generated_pages/techniques/T0115.md index db13b81..51405d2 100644 --- a/generated_pages/techniques/T0115.md +++ b/generated_pages/techniques/T0115.md @@ -7,9 +7,9 @@ | Incident | Descriptions given for this incident | | -------- | -------------------- | -| [I00096 China ramps up use of AI misinformation](../../generated_pages/incidents/I00096.md) | The Microsoft Threat Analysis Centre (MTAC) published a report documenting the use of AI by pro-Chinese threat actors:

On 13 January, Spamouflage [(a Pro-Chinese Communist Party actor)] posted audio clips to YouTube of independent candidate [for Taiwan’s Jan 2024 presidential election] Terry Gou – who also founded electronics giant Foxconn – in which Gou endorsed another candidate in the race. This clip was almost certainly AI-generated, and it was swiftly removed by YouTube. A fake letter purporting to be from Gou, endorsing the same candidate, had already circulated – Gou had of course made no such endorsement.

Here Spamoflage used an account on YouTube to post AI Generated audio impersonating an electoral candidate (T0146: Account, T0152.006: Video Platform, T0115: Post Content, T0088.001: Develop AI-Generated Audio (Deepfakes), T0143.003: Impersonated Persona, T0097.110: Party Official Persona).

Spamouflage also exploited AI-powered video platform CapCut – which is owned by TikTok backers ByteDance – to generate fake news anchors which were used in a variety of campaigns targeting the various presidential candidates in Taiwan.

Spamoflage created accounts on CapCut, which it used to create AI-generated videos of fabricated news anchors (T0146: Account, T0154.002: AI Media Platform, T0087.001: Develop AI-Generated Video (Deepfakes), T0143.002: Fabricated Persona, T0097.102: Journalist Persona). | +| [I00096 China ramps up use of AI misinformation](../../generated_pages/incidents/I00096.md) | The Microsoft Threat Analysis Centre (MTAC) published a report documenting the use of AI by pro-Chinese threat actors:

On 13 January, Spamouflage [(a Pro-Chinese Communist Party actor)] posted audio clips to YouTube of independent candidate [for Taiwan’s Jan 2024 presidential election] Terry Gou – who also founded electronics giant Foxconn – in which Gou endorsed another candidate in the race. This clip was almost certainly AI-generated, and it was swiftly removed by YouTube. A fake letter purporting to be from Gou, endorsing the same candidate, had already circulated – Gou had of course made no such endorsement.

Here Spamoflage used an account on YouTube to post AI Generated audio impersonating an electoral candidate (T0146: Account Asset, T0152.006: Video Platform, T0115: Post Content, T0088.001: Develop AI-Generated Audio (Deepfakes), T0143.003: Impersonated Persona, T0097.110: Party Official Persona).

Spamouflage also exploited AI-powered video platform CapCut – which is owned by TikTok backers ByteDance – to generate fake news anchors which were used in a variety of campaigns targeting the various presidential candidates in Taiwan.

Spamoflage created accounts on CapCut, which it used to create AI-generated videos of fabricated news anchors (T0146: Account Asset, T0154.002: AI Media Platform, T0087.001: Develop AI-Generated Video (Deepfakes), T0143.002: Fabricated Persona, T0097.102: Journalist Persona). | | [I00104 Macron Campaign Hit With “Massive and Coordinated” Hacking Attack](../../generated_pages/incidents/I00104.md) | A massive trove of documents purporting to contain thousands of emails and other files from the [2017 presidential] campaign of Emmanuel Macron—the French centrist candidate squaring off against right-wing nationalist Marine Le Pen—was posted on the internet Friday afternoon. The Macron campaign says that at least some of the documents are fake. The document dump came just over a day before voting is set to begin in the final round of the election and mere hours before candidates are legally required to stop campaigning.

At about 2:35 p.m. ET, a post appeared on the 4chan online message board announcing the leak. The documents appear to include emails, internal memos, and screenshots of purported banking records.

“In this pastebin are links to torrents of emails between Macron, his team and other officials, politicians as well as original documents and photos,” the anonymous 4chan poster wrote. “This was passed on to me today so now I am giving it to you, the people. The leak is massvie and released in the hopes that the human search engine here will be able to start sifting through the contents and figure out exactly what we have here.”

The Macron campaign issued a statement Friday night saying it was the victim of a “massive and coordinated” hacking attack. That campaign said the leak included some fake documents that were intended “to sow doubt and misinformation.”


Actors posted a to 4chan a link (T0151.012: Image Board Platform, T0146.006: Open Access Platform, T0115: Post Content, T0122: Direct Users to Alternative Platforms) to text content hosted on pastebin (T0152.005: Paste Platform, T0146.006: Open Access Platform, T0115: Post Content), which contained links to download stolen and fabricated documents. | -| [I00118 ‘War Thunder’ players are once again leaking sensitive military technology information on a video game forum](../../generated_pages/incidents/I00118.md) | In an effort to prove that the developers behind a popular multiplayer vehicle combat game had made a mistake, a player went ahead and published classified British military documents about one of the real-life tanks featured in the game.

This truly bizarre turn of events recently occurred in the public forum for War Thunder, a free-to-player multiplayer combat sim featuring modern land, air, and sea craft. Getting a small detail wrong on a piece of equipment might not be a big deal for the average gamer, but for the War Thunder crowd it sure as hell is. With 25,000 devoted players, the game very much bills itself as the military vehicle combat simulator.

A player, who identified himself as a British tank commander, claimed that the game’s developers at Gaijin Entertainment had inaccurately represented the Challenger 2 main battle tank used by the British military.

The self-described tank commander’s bio listed his location as Tidworth Camp in Wiltshire, England, according to the UK Defense Journal, which reported that the base is home to the Royal Tank Regiment, which fields Challenger 2 tanks.

The player, who went by the handle Pyrophoric, reportedly shared an image on the War Thunder forum of the tank’s specs that were pulled from the Challenger 2’s Army Equipment Support Publication, which is essentially a technical manual.

[...]

A moderator for the forum, who’s handle is “Templar_”, explained that the developer had removed the material after they received confirmation from the Ministry of Defense that the document is still in fact classified.


A user of War Thunder’s forums posted confidential documents to win an argument (T0089.001: Obtain Authentic Documents, T0146: Account, T0097.105: Military Personnel Persona, T0115: Post Content, T0143.001: Authentic Persona, T0151.009: Legacy Online Forum Platform). | +| [I00118 ‘War Thunder’ players are once again leaking sensitive military technology information on a video game forum](../../generated_pages/incidents/I00118.md) | In an effort to prove that the developers behind a popular multiplayer vehicle combat game had made a mistake, a player went ahead and published classified British military documents about one of the real-life tanks featured in the game.

This truly bizarre turn of events recently occurred in the public forum for War Thunder, a free-to-player multiplayer combat sim featuring modern land, air, and sea craft. Getting a small detail wrong on a piece of equipment might not be a big deal for the average gamer, but for the War Thunder crowd it sure as hell is. With 25,000 devoted players, the game very much bills itself as the military vehicle combat simulator.

A player, who identified himself as a British tank commander, claimed that the game’s developers at Gaijin Entertainment had inaccurately represented the Challenger 2 main battle tank used by the British military.

The self-described tank commander’s bio listed his location as Tidworth Camp in Wiltshire, England, according to the UK Defense Journal, which reported that the base is home to the Royal Tank Regiment, which fields Challenger 2 tanks.

The player, who went by the handle Pyrophoric, reportedly shared an image on the War Thunder forum of the tank’s specs that were pulled from the Challenger 2’s Army Equipment Support Publication, which is essentially a technical manual.

[...]

A moderator for the forum, who’s handle is “Templar_”, explained that the developer had removed the material after they received confirmation from the Ministry of Defense that the document is still in fact classified.


A user of War Thunder’s forums posted confidential documents to win an argument (T0089.001: Obtain Authentic Documents, T0146: Account Asset, T0097.105: Military Personnel Persona, T0115: Post Content, T0143.001: Authentic Persona, T0151.009: Legacy Online Forum Platform). | diff --git a/generated_pages/techniques/T0121.001.md b/generated_pages/techniques/T0121.001.md index 8abdf49..19d956d 100644 --- a/generated_pages/techniques/T0121.001.md +++ b/generated_pages/techniques/T0121.001.md @@ -7,8 +7,8 @@ | Incident | Descriptions given for this incident | | -------- | -------------------- | -| [I00110 How COVID-19 conspiracists and extremists use crowdfunding platforms to fund their activities](../../generated_pages/incidents/I00110.md) | The EU Disinfo Lab produced a report into disinformation published on crowdfunding platforms:



More worrisome is the direct monetisation of disinformation happening on crowdfunding platforms: on Kickstarter, we found a user openly raising money for a documentary project suggesting that COVID-19 is a conspiracy.

A Kickstarter user attempted to use the platform to fund production of a documentary (T0017: Conduct Fundraising, T0087: Develop Video-Based Content, T0146: Account, T0148.006: Crowdfunding Platform).

On Patreon, we found several instances of direct monetisation of COVID-19 disinformation, including posts promoting a device allegedly protecting against COVID-19 and 5G, as well as posts related to the “Plandemic” conspiracy video, which gained attention on YouTube before being removed by the platform.

We also found an account called “Stranger than fiction” entirely dedicated to disinformation, which openly states that their content was “Banned by screwtube and fakebook, our videos have been viewed over a billion times.”


The “Stranger than fiction” user presented itself as an alternative news source which had been banned from other platforms (T0146: Account, T0097.202: News Outlet Persona, T0121.001: Bypass Content Bocking, T0152.012: Subscription Service Platform).

On the US-based crowdfunding platform IndieGogo, EU DisinfoLab found a successful crowdfunding campaign of €133.903 for a book called Revolution Q. This book, now also available on Amazon, claims to be “Written for both newcomers and long-time QAnon fans alike, this book is a treasure-trove of information designed to help everyone weather The Storm.”

An IndieGogo account was used to gather funds to produce a book on QAnon (T0017: Conduct Fundraising, T0085.005: Develop Book, T0146: Account, T0148.006: Crowdfunding Platform), with the book later sold on Amazon marketplace (T0148.007: eCommerce Platform). | -| [I00112 Patreon allows disinformation and conspiracies to be monetised in Spain](../../generated_pages/incidents/I00112.md) | In this report EU DisinfoLab identified 17 Spanish accounts that monetise and/or spread QAnon content or other conspiracy theories on Patreon. Content produced by these accounts go against Patreon’s stated policy of removing creators that “advance disinformation promoting the QAnon conspiracy theory”. EU DisinfoLab found:

In most cases, the creators monetise the content directly on Patreon (posts are only accessible for people sponsoring the creators) but there are also cases of indirect monetization (monetization through links leading to other platforms), an aspect that was flagged and analysed by Eu DisinfoLab in the mentioned previous report.

Some creators display links that redirects users to other platforms such as YouTube or LBRY where they can monetise their content. Some even offer almost all of their videos for free by redirecting to their YouTube channel.

Another modus operandi is for the creators to advertise on Patreon that they are looking for financing through PayPal or provide the author’s email to explore other financing alternatives.

[...]

Sometimes the content offered for a fee on Patreon is freely accessible on other platforms. Creators openly explain that they seek voluntary donation on Patreon, but that their creations will be public on YouTube. This means that the model of these platforms does not always involve a direct monetisation of the content. Creators who have built a strong reputation previously on other platforms can use Patreon as a platform to get some sponsorship which is not related to the content and give them more freedom to create.

Some users explicitly claim to use Patreon as a secondary channel to evade “censorship” by other platforms such as YouTube. Patreon seems to be perceived as a safe haven for disinformation and fringe content that has been suppressed for violating the policies of other platforms. For example, Jorge Guerra points out how Patreon acts as a back-up channel to go to in case of censorship by YouTube. Meanwhile, Alfa Mind openly claims to use Patreon to publish content that is not allowed on YouTube. “Exclusive access to videos that are prohibited on YouTube. These videos are only accessible on Patreon, as their content is very explicit and shocking”, are offered to the patrons who pay €3 per month.


In spite of Patreon’s stated policy, actors use accounts on their platform to generate revenue or donations for their content, and to provide a space to host content which was removed from other platforms (T0146: Account, T0152.012: Subscription Service Platform, T0121.001: Bypass Content Bocking).

Some actors were observed accepting donations via PayPal (T0146: Account, T0148.003: Payment Processing Platform). | +| [I00110 How COVID-19 conspiracists and extremists use crowdfunding platforms to fund their activities](../../generated_pages/incidents/I00110.md) | The EU Disinfo Lab produced a report into disinformation published on crowdfunding platforms:

More worrisome is the direct monetisation of disinformation happening on crowdfunding platforms: on Kickstarter, we found a user openly raising money for a documentary project suggesting that COVID-19 is a conspiracy.

A Kickstarter user attempted to use the platform to fund production of a documentary (T0017: Conduct Fundraising, T0087: Develop Video-Based Content, T0146: Account Asset, T0148.006: Crowdfunding Platform).

On Patreon, we found several instances of direct monetisation of COVID-19 disinformation, including posts promoting a device allegedly protecting against COVID-19 and 5G, as well as posts related to the “Plandemic” conspiracy video, which gained attention on YouTube before being removed by the platform.

We also found an account called “Stranger than fiction” entirely dedicated to disinformation, which openly states that their content was “Banned by screwtube and fakebook, our videos have been viewed over a billion times.”


The “Stranger than fiction” user presented itself as an alternative news source which had been banned from other platforms (T0146: Account Asset, T0097.202: News Outlet Persona, T0121.001: Bypass Content Bocking, T0152.012: Subscription Service Platform).

On the US-based crowdfunding platform IndieGogo, EU DisinfoLab found a successful crowdfunding campaign of €133.903 for a book called Revolution Q. This book, now also available on Amazon, claims to be “Written for both newcomers and long-time QAnon fans alike, this book is a treasure-trove of information designed to help everyone weather The Storm.”

An IndieGogo account was used to gather funds to produce a book on QAnon (T0017: Conduct Fundraising, T0085.005: Develop Book, T0146: Account Asset, T0148.006: Crowdfunding Platform), with the book later sold on Amazon marketplace (T0148.007: eCommerce Platform). | +| [I00112 Patreon allows disinformation and conspiracies to be monetised in Spain](../../generated_pages/incidents/I00112.md) | In this report EU DisinfoLab identified 17 Spanish accounts that monetise and/or spread QAnon content or other conspiracy theories on Patreon. Content produced by these accounts go against Patreon’s stated policy of removing creators that “advance disinformation promoting the QAnon conspiracy theory”. EU DisinfoLab found:

In most cases, the creators monetise the content directly on Patreon (posts are only accessible for people sponsoring the creators) but there are also cases of indirect monetization (monetization through links leading to other platforms), an aspect that was flagged and analysed by Eu DisinfoLab in the mentioned previous report.

Some creators display links that redirects users to other platforms such as YouTube or LBRY where they can monetise their content. Some even offer almost all of their videos for free by redirecting to their YouTube channel.

Another modus operandi is for the creators to advertise on Patreon that they are looking for financing through PayPal or provide the author’s email to explore other financing alternatives.

[...]

Sometimes the content offered for a fee on Patreon is freely accessible on other platforms. Creators openly explain that they seek voluntary donation on Patreon, but that their creations will be public on YouTube. This means that the model of these platforms does not always involve a direct monetisation of the content. Creators who have built a strong reputation previously on other platforms can use Patreon as a platform to get some sponsorship which is not related to the content and give them more freedom to create.

Some users explicitly claim to use Patreon as a secondary channel to evade “censorship” by other platforms such as YouTube. Patreon seems to be perceived as a safe haven for disinformation and fringe content that has been suppressed for violating the policies of other platforms. For example, Jorge Guerra points out how Patreon acts as a back-up channel to go to in case of censorship by YouTube. Meanwhile, Alfa Mind openly claims to use Patreon to publish content that is not allowed on YouTube. “Exclusive access to videos that are prohibited on YouTube. These videos are only accessible on Patreon, as their content is very explicit and shocking”, are offered to the patrons who pay €3 per month.


In spite of Patreon’s stated policy, actors use accounts on their platform to generate revenue or donations for their content, and to provide a space to host content which was removed from other platforms (T0146: Account Asset, T0152.012: Subscription Service Platform, T0121.001: Bypass Content Bocking).

Some actors were observed accepting donations via PayPal (T0146: Account Asset, T0148.003: Payment Processing Platform). | diff --git a/generated_pages/techniques/T0121.md b/generated_pages/techniques/T0121.md index e6fae26..ec1c67f 100644 --- a/generated_pages/techniques/T0121.md +++ b/generated_pages/techniques/T0121.md @@ -7,7 +7,7 @@ | Incident | Descriptions given for this incident | | -------- | -------------------- | -| [I00113 Inside the Shadowy World of Disinformation for Hire in Kenya](../../generated_pages/incidents/I00113.md) | Researchers at Mozilla examined influence operations targeting Kenyan citizens on Twitter in 2021, providing “a grim window into the booming and shadowy industry of Twitter influencers for political hire here in Kenya”, and giving insight into operations’ operationalisation:

In our interviews with one of the influencers, they informed us of the agile tactics they use to organize and avoid detection. For example, when it’s time to carry out the campaign the influencers would be added to a Whatsapp group. Here, they received direction about what to post, the hashtags to use, which tweets to engage with and who to target. Synchronizing the tweets was also incredibly important for them. It’s what enables them to achieve their goal of trending on Twitter and gain amplification.

[...]

They revealed to us that those participating in the exercise are paid roughly between $10 and $15 to participate in three campaigns per day. Each campaign execution involves tweeting about the hashtags of the day until it appears on the trending section of Twitter. Additionally, some individuals have managed to reach retainer level and get paid about $250 per month. Their job is to make sure the campaigns are executed on a day-by-day basis with different hashtags.


An M-PESA account (T0148.002: Bank Account, T0148.001: Online Banking Platform) was used to pay campaign participants.

Participants were organised in WhatsApp groups (T0129.005: Coordinate on Encrypted/Closed Networks T0151.007: Chat Broadcast Group, T0151.004: Chat Platform), in which they planned how to get campaign content trending on Twitter (T0121: Manipulate Platform Algorithm, T0151.008: Microblogging Platform). | +| [I00113 Inside the Shadowy World of Disinformation for Hire in Kenya](../../generated_pages/incidents/I00113.md) | Researchers at Mozilla examined influence operations targeting Kenyan citizens on Twitter in 2021, providing “a grim window into the booming and shadowy industry of Twitter influencers for political hire here in Kenya”, and giving insight into operations’ operationalisation:

In our interviews with one of the influencers, they informed us of the agile tactics they use to organize and avoid detection. For example, when it’s time to carry out the campaign the influencers would be added to a Whatsapp group. Here, they received direction about what to post, the hashtags to use, which tweets to engage with and who to target. Synchronizing the tweets was also incredibly important for them. It’s what enables them to achieve their goal of trending on Twitter and gain amplification.

[...]

They revealed to us that those participating in the exercise are paid roughly between $10 and $15 to participate in three campaigns per day. Each campaign execution involves tweeting about the hashtags of the day until it appears on the trending section of Twitter. Additionally, some individuals have managed to reach retainer level and get paid about $250 per month. Their job is to make sure the campaigns are executed on a day-by-day basis with different hashtags.


An M-PESA account (T0148.002: Bank Account Asset, T0148.001: Online Banking Platform) was used to pay campaign participants.

Participants were organised in WhatsApp groups (T0129.005: Coordinate on Encrypted/Closed Networks T0151.007: Chat Broadcast Group, T0151.004: Chat Platform), in which they planned how to get campaign content trending on Twitter (T0121: Manipulate Platform Algorithm, T0151.008: Microblogging Platform). | diff --git a/generated_pages/techniques/T0122.md b/generated_pages/techniques/T0122.md index 4596f0a..202df46 100644 --- a/generated_pages/techniques/T0122.md +++ b/generated_pages/techniques/T0122.md @@ -7,13 +7,13 @@ | Incident | Descriptions given for this incident | | -------- | -------------------- | -| [I00102 Ignore The Poway Synagogue Shooter’s Manifesto: Pay Attention To 8chan’s /pol/ Board](../../generated_pages/incidents/I00102.md) | On April 27, 2019, at around 11:30 a.m. local time, a young man with a semi-automatic rifle walked into the Chabad of Poway Synagogue in Poway, California. He opened fire, killing one worshipper and wounding three others. In the hours since the shooting, a manifesto, believed to be written by the shooter, began circulating online. Evidence has also surfaced that, like the Christchurch Mosque shooter, this killer began his rampage with a post on 8chan’s /pol/ board.

Although both of these attacks may seem different, since they targeted worshippers of different faiths, both shooters were united by the same fascist ideology. They were also both radicalized in the same place: 8chan’s /pol/ board.

This has been corroborated by posts on the board itself, where “anons,” as the posters call themselves, recirculated the shooter’s since-deleted post. In it, the alleged shooter claims to have been “lurking” on the site for a year and a half. He includes a link to a livestream of his rampage — which thankfully does not appear to have worked — and he also includes a pastebin link to his manifesto.

The very first response to his announcement was another anon cheering him on and telling him to “get the high score,” AKA, kill a huge number of people.


Before carrying out a mass shooting, the shooter posted a thread to 8chan’s /pol/ board. The post directed users to a variety of different platforms (T0146.006: Open Access Platform, T0151.012: Image Board Platform, T0115: Post Content, T0122: Direct Users to Alternative Platforms); a Facebook account on which the shooter attempted to livestream the shooting (T0146: Account, T0151.001: Social Media Platform); and a manifesto they had written hosted on pastebin (T0146.006: Open Access Platform, T0152.005: Paste Platform, T0115: Post Content) and uploaded to the file sharing platform Mediafire (T0152.010: File Hosting Platform, T0085.004: Develop Document).

The report looks deeper into 8chan’s /pol/ board:

8chan is a large website, which includes a number of different discussion groups about everything from anime to left-wing politics. /pol/ is one particularly active board on the website, and it is best described as a gathering place for extremely online neo-Nazis.

[...]

I’ve browsed /pol/ on an almost daily basis since the Christchurch shooting. It has not been difficult to find calls for violence. On Monday, March 25 of this year, I ran across evidence of anons translating the Christchurch shooter’s manifesto into other languages in an attempt to inspire more shootings across the globe.

This tactic can work, and today’s shooting is proof. The Poway Synagogue shooter directly cited the Christchurch shooter as his inspiration, saying he decided to carry out his attack roughly two weeks after that shooting. On /pol/, many anons refer to the Christchurch shooter, Brenton Tarrant, as “Saint Tarrant,” complete with medieval-inspired iconography.


Manifestos posted to 8chan are translated and reshared by other platform users (T0101: Create Localised Content, T0146.006: Open Access Platform, T0151.012: Image Board Platform, T0115: Post Content, T0084.004: Appropriate Content).

When I began looking through /pol/ right after the Poway Synagogue shooting, I came across several claims that the shootings had been a “false flag” aimed at making the message board look bad.

When Bellingcat tweeted out a warning about shitposting and the shooter’s manifesto, in the immediate wake of the attack, probable anons even commented on the Tweet in an attempt to deny that a channer had been behind the attack.

This is a recognizable pattern that occurs in the wake of any crimes committed by members of the board. While the initial response to the Christchurch shooter’s massacre thread was riotous glee, in the days after the shooting many anons began to claim the attack had been a false flag. This actually sparked significant division and debate between the members of /pol/. In the below image, a user mocks other anons for being unable to “believe something in your favor is real.” Another anon responds, “As the evidence comes out, its [sic] quite clear that this was a false flag.”

In his manifesto, the Poway Synagogue shooter even weighed in on this debate, accusing other anons who called the Christchurch and Tree of Life Synagogue shootings “false flags” to merely have been scared: “They can’t fathom that there are brave White men alive who have the willpower and courage it takes to say, ‘Fuck my life—I’m willing to sacrifice everything for the benefit of my race.’”


Platform users deny that their platform has been used by mass shooters to publish their manifestos (T0129.006: Deny Involvement). | +| [I00102 Ignore The Poway Synagogue Shooter’s Manifesto: Pay Attention To 8chan’s /pol/ Board](../../generated_pages/incidents/I00102.md) | On April 27, 2019, at around 11:30 a.m. local time, a young man with a semi-automatic rifle walked into the Chabad of Poway Synagogue in Poway, California. He opened fire, killing one worshipper and wounding three others. In the hours since the shooting, a manifesto, believed to be written by the shooter, began circulating online. Evidence has also surfaced that, like the Christchurch Mosque shooter, this killer began his rampage with a post on 8chan’s /pol/ board.

Although both of these attacks may seem different, since they targeted worshippers of different faiths, both shooters were united by the same fascist ideology. They were also both radicalized in the same place: 8chan’s /pol/ board.

This has been corroborated by posts on the board itself, where “anons,” as the posters call themselves, recirculated the shooter’s since-deleted post. In it, the alleged shooter claims to have been “lurking” on the site for a year and a half. He includes a link to a livestream of his rampage — which thankfully does not appear to have worked — and he also includes a pastebin link to his manifesto.

The very first response to his announcement was another anon cheering him on and telling him to “get the high score,” AKA, kill a huge number of people.


Before carrying out a mass shooting, the shooter posted a thread to 8chan’s /pol/ board. The post directed users to a variety of different platforms (T0146.006: Open Access Platform, T0151.012: Image Board Platform, T0115: Post Content, T0122: Direct Users to Alternative Platforms); a Facebook account on which the shooter attempted to livestream the shooting (T0146: Account Asset, T0151.001: Social Media Platform); and a manifesto they had written hosted on pastebin (T0146.006: Open Access Platform, T0152.005: Paste Platform, T0115: Post Content) and uploaded to the file sharing platform Mediafire (T0152.010: File Hosting Platform, T0085.004: Develop Document).

The report looks deeper into 8chan’s /pol/ board:

8chan is a large website, which includes a number of different discussion groups about everything from anime to left-wing politics. /pol/ is one particularly active board on the website, and it is best described as a gathering place for extremely online neo-Nazis.

[...]

I’ve browsed /pol/ on an almost daily basis since the Christchurch shooting. It has not been difficult to find calls for violence. On Monday, March 25 of this year, I ran across evidence of anons translating the Christchurch shooter’s manifesto into other languages in an attempt to inspire more shootings across the globe.

This tactic can work, and today’s shooting is proof. The Poway Synagogue shooter directly cited the Christchurch shooter as his inspiration, saying he decided to carry out his attack roughly two weeks after that shooting. On /pol/, many anons refer to the Christchurch shooter, Brenton Tarrant, as “Saint Tarrant,” complete with medieval-inspired iconography.


Manifestos posted to 8chan are translated and reshared by other platform users (T0101: Create Localised Content, T0146.006: Open Access Platform, T0151.012: Image Board Platform, T0115: Post Content, T0084.004: Appropriate Content).

When I began looking through /pol/ right after the Poway Synagogue shooting, I came across several claims that the shootings had been a “false flag” aimed at making the message board look bad.

When Bellingcat tweeted out a warning about shitposting and the shooter’s manifesto, in the immediate wake of the attack, probable anons even commented on the Tweet in an attempt to deny that a channer had been behind the attack.

This is a recognizable pattern that occurs in the wake of any crimes committed by members of the board. While the initial response to the Christchurch shooter’s massacre thread was riotous glee, in the days after the shooting many anons began to claim the attack had been a false flag. This actually sparked significant division and debate between the members of /pol/. In the below image, a user mocks other anons for being unable to “believe something in your favor is real.” Another anon responds, “As the evidence comes out, its [sic] quite clear that this was a false flag.”

In his manifesto, the Poway Synagogue shooter even weighed in on this debate, accusing other anons who called the Christchurch and Tree of Life Synagogue shootings “false flags” to merely have been scared: “They can’t fathom that there are brave White men alive who have the willpower and courage it takes to say, ‘Fuck my life—I’m willing to sacrifice everything for the benefit of my race.’”


Platform users deny that their platform has been used by mass shooters to publish their manifestos (T0129.006: Deny Involvement). | | [I00104 Macron Campaign Hit With “Massive and Coordinated” Hacking Attack](../../generated_pages/incidents/I00104.md) | A massive trove of documents purporting to contain thousands of emails and other files from the [2017 presidential] campaign of Emmanuel Macron—the French centrist candidate squaring off against right-wing nationalist Marine Le Pen—was posted on the internet Friday afternoon. The Macron campaign says that at least some of the documents are fake. The document dump came just over a day before voting is set to begin in the final round of the election and mere hours before candidates are legally required to stop campaigning.

At about 2:35 p.m. ET, a post appeared on the 4chan online message board announcing the leak. The documents appear to include emails, internal memos, and screenshots of purported banking records.

“In this pastebin are links to torrents of emails between Macron, his team and other officials, politicians as well as original documents and photos,” the anonymous 4chan poster wrote. “This was passed on to me today so now I am giving it to you, the people. The leak is massvie and released in the hopes that the human search engine here will be able to start sifting through the contents and figure out exactly what we have here.”

The Macron campaign issued a statement Friday night saying it was the victim of a “massive and coordinated” hacking attack. That campaign said the leak included some fake documents that were intended “to sow doubt and misinformation.”


Actors posted a to 4chan a link (T0151.012: Image Board Platform, T0146.006: Open Access Platform, T0115: Post Content, T0122: Direct Users to Alternative Platforms) to text content hosted on pastebin (T0152.005: Paste Platform, T0146.006: Open Access Platform, T0115: Post Content), which contained links to download stolen and fabricated documents. | -| [I00106 Facebook Is Being Flooded With Gross AI-Generated Images of Hurricane Helene Devastation](../../generated_pages/incidents/I00106.md) | As families desperately seek to find missing loved ones and communities grapple with immeasurable losses of both life and property in the wake of [2024’s] Hurricane Helene, AI slop scammers appear to be capitalizing on the moment for personal gain.

A Facebook account called "Coastal Views" usually shares calmer AI imagery of nature-filled beachside scenes. The account's banner image showcases a signpost reading "OBX Live," OBX being shorthand for North Carolina's Outer Banks islands.

But starting this weekend, the account shifted its approach dramatically, as first flagged by a social media user on X.

Instead of posting "photos" of leaping dolphins and sandy beaches, the account suddenly started publishing images of flooded mountain neighborhoods, submerged houses, and dogs sitting on top of roofs.

But instead of spreading vital information to those affected by the natural disaster, or at the very least sharing real photos of the destruction, the account is seemingly trying to use AI to cash in on all the attention the hurricane has been getting.

The account links to an Etsy page for a business called" OuterBanks2023," where somebody who goes by "Alexandr" sells AI-generated prints of horses touching snouts with sea turtles, Santa running down the shoreline with a reindeer, and sunsets over ocean waves.


A Facebook page which presented itself as being associated with North Carolina which posted AI generated images changed to posting AI generated images of hurricane damage after Hurricane Helene hit North Carolina (T0151.003: Online Community Page, T0151.001: Social Media Platform, T0115: Post Content, T0086.002: Develop AI-Generated Images (Deepfakes), T0068: Respond to Breaking News Event or Active Crisis).

The account included links (T0122: Direct Users to Alternative Platforms) to an account on Etsy, which sold prints of AI generated images (T0146: Account, T0148.007: eCommerce Platform). | -| [I00108 How you thought you support the animals and you ended up funding white supremacists](../../generated_pages/incidents/I00108.md) | This article examines the white nationalist group Suavelos’ use of Facebook to draw visitors to its website without overtly revealing their racist ideology:

Suavelos uses Facebook and other platforms to amplify its message. In order to bypass the platforms’ community standards and keep their public pages active, Facebook pages such as “I support the police” are a good vehicle to spread a specific agenda without claiming to be racist. In looking back at this Facebook page, we followed Facebook’s algorithm for related pages and found suggested Facebook pages

[...]

This amplification strategy on Facebook is successful, as according to SimilarWeb figures, it attracts around 111,000 visits every month on the Suavelos.eu website.

[...]

Revenue through online advertisements can be achieved by different platforms through targeted advertisements, like Google Adsense or Doubleclick, or related and similar sponsored content, such as Taboola. Accordingly, Suavelos.eu uses both of these websites to display advertisements and consequently receives funding from such advertisements.

Once visitors are on the website supporting its advertisement revenue, Suavelos’ goal is to then turn these visitors into regular members of Suavelos network through donations or fees, or have them continue to support Suavelos.


Suevelos created a variety of pages on Facebook which presented as centring on prosocial causes. Facebook’s algorithm helped direct users to these pages (T0092: Build Network, T0151.001: Social Media Platform, T0153.006: Content Recommendation Algorithm, T0151.003: Online Community Page, T0143.208: Social Cause Persona).

Suevelos used these pages to generate traffic for their WordPress site (T0122: Direct Users to Alternative Platforms, T0152.003: Website Hosting Platform, T0152.004: Website), which used accounts on a variety of online advertising platforms to host adverts (T0146: Account, T0153.005: Online Advertising Platform). | -| [I00116 Blue-tick scammers target consumers who complain on X](../../generated_pages/incidents/I00116.md) | Consumers who complain of poor customer service on X are being targeted by scammers after the social media platform formerly known as Twitter changed its account verification process.

Bank customers and airline passengers are among those at risk of phishing scams when they complain to companies via X. Fraudsters, masquerading as customer service agents, respond under fake X handles and trick victims into disclosing their bank details to get a promised refund.

They typically win the trust of victims by displaying the blue checkmark icon, which until this year denoted accounts that had been officially verified by X.

Changes introduced this year allow the icon to be bought by anyone who pays an £11 monthly fee for the site’s subscription service, renamed this month from Twitter Blue to X Premium. Businesses that pay £950 a month receive a gold tick. X’s terms and conditions do not state whether subscriber accounts are pre-vetted.

Andrew Thomas was contacted by a scam account after posting a complaint to the travel platform Booking.com. “I’d been trying since April to get a refund after our holiday flights were cancelled and finally resorted to X,” he said.

“I received a response asking me to follow them, and DM [direct message] them with a contact number. They then called me via WhatsApp asking for my reference number so they could investigate. Later they called back to say that I would be refunded via their payment partner for which I’d need to download an app.”

Thomas became suspicious and checked the X profile. “It looked like the real thing, but I noticed that there was an unexpected hyphen in the Twitter handle and that it had only joined X in July 2023,” he said.


In this example a newly created paid account was created on X, used to direct users to other platforms (T0146.002: Paid Account, T0146.003: Verified Account, T0146.005: Lookalike Account ID, T0097.205: Business Persona, T0122: Direct Users to Alternative Platforms, T0143.003: Impersonated Persona, T0151.008: Microblogging Platform, T0150.001: Newly Created). | +| [I00106 Facebook Is Being Flooded With Gross AI-Generated Images of Hurricane Helene Devastation](../../generated_pages/incidents/I00106.md) | As families desperately seek to find missing loved ones and communities grapple with immeasurable losses of both life and property in the wake of [2024’s] Hurricane Helene, AI slop scammers appear to be capitalizing on the moment for personal gain.

A Facebook account called "Coastal Views" usually shares calmer AI imagery of nature-filled beachside scenes. The account's banner image showcases a signpost reading "OBX Live," OBX being shorthand for North Carolina's Outer Banks islands.

But starting this weekend, the account shifted its approach dramatically, as first flagged by a social media user on X.

Instead of posting "photos" of leaping dolphins and sandy beaches, the account suddenly started publishing images of flooded mountain neighborhoods, submerged houses, and dogs sitting on top of roofs.

But instead of spreading vital information to those affected by the natural disaster, or at the very least sharing real photos of the destruction, the account is seemingly trying to use AI to cash in on all the attention the hurricane has been getting.

The account links to an Etsy page for a business called" OuterBanks2023," where somebody who goes by "Alexandr" sells AI-generated prints of horses touching snouts with sea turtles, Santa running down the shoreline with a reindeer, and sunsets over ocean waves.


A Facebook page which presented itself as being associated with North Carolina which posted AI generated images changed to posting AI generated images of hurricane damage after Hurricane Helene hit North Carolina (T0151.003: Online Community Page, T0151.001: Social Media Platform, T0115: Post Content, T0086.002: Develop AI-Generated Images (Deepfakes), T0068: Respond to Breaking News Event or Active Crisis).

The account included links (T0122: Direct Users to Alternative Platforms) to an account on Etsy, which sold prints of AI generated images (T0146: Account Asset, T0148.007: eCommerce Platform). | +| [I00108 How you thought you support the animals and you ended up funding white supremacists](../../generated_pages/incidents/I00108.md) | This article examines the white nationalist group Suavelos’ use of Facebook to draw visitors to its website without overtly revealing their racist ideology:

Suavelos uses Facebook and other platforms to amplify its message. In order to bypass the platforms’ community standards and keep their public pages active, Facebook pages such as “I support the police” are a good vehicle to spread a specific agenda without claiming to be racist. In looking back at this Facebook page, we followed Facebook’s algorithm for related pages and found suggested Facebook pages

[...]

This amplification strategy on Facebook is successful, as according to SimilarWeb figures, it attracts around 111,000 visits every month on the Suavelos.eu website.

[...]

Revenue through online advertisements can be achieved by different platforms through targeted advertisements, like Google Adsense or Doubleclick, or related and similar sponsored content, such as Taboola. Accordingly, Suavelos.eu uses both of these websites to display advertisements and consequently receives funding from such advertisements.

Once visitors are on the website supporting its advertisement revenue, Suavelos’ goal is to then turn these visitors into regular members of Suavelos network through donations or fees, or have them continue to support Suavelos.


Suevelos created a variety of pages on Facebook which presented as centring on prosocial causes. Facebook’s algorithm helped direct users to these pages (T0092: Build Network, T0151.001: Social Media Platform, T0153.006: Content Recommendation Algorithm, T0151.003: Online Community Page, T0143.208: Social Cause Persona).

Suevelos used these pages to generate traffic for their WordPress site (T0122: Direct Users to Alternative Platforms, T0152.003: Website Hosting Platform, T0152.004: Website Asset), which used accounts on a variety of online advertising platforms to host adverts (T0146: Account Asset, T0153.005: Online Advertising Platform). | +| [I00116 Blue-tick scammers target consumers who complain on X](../../generated_pages/incidents/I00116.md) | Consumers who complain of poor customer service on X are being targeted by scammers after the social media platform formerly known as Twitter changed its account verification process.

Bank customers and airline passengers are among those at risk of phishing scams when they complain to companies via X. Fraudsters, masquerading as customer service agents, respond under fake X handles and trick victims into disclosing their bank details to get a promised refund.

They typically win the trust of victims by displaying the blue checkmark icon, which until this year denoted accounts that had been officially verified by X.

Changes introduced this year allow the icon to be bought by anyone who pays an £11 monthly fee for the site’s subscription service, renamed this month from Twitter Blue to X Premium. Businesses that pay £950 a month receive a gold tick. X’s terms and conditions do not state whether subscriber accounts are pre-vetted.

Andrew Thomas was contacted by a scam account after posting a complaint to the travel platform Booking.com. “I’d been trying since April to get a refund after our holiday flights were cancelled and finally resorted to X,” he said.

“I received a response asking me to follow them, and DM [direct message] them with a contact number. They then called me via WhatsApp asking for my reference number so they could investigate. Later they called back to say that I would be refunded via their payment partner for which I’d need to download an app.”

Thomas became suspicious and checked the X profile. “It looked like the real thing, but I noticed that there was an unexpected hyphen in the Twitter handle and that it had only joined X in July 2023,” he said.


In this example a newly created paid account was created on X, used to direct users to other platforms (T0146.002: Paid Account Asset, T0146.003: Verified Account Asset, T0146.005: Lookalike Account ID, T0097.205: Business Persona, T0122: Direct Users to Alternative Platforms, T0143.003: Impersonated Persona, T0151.008: Microblogging Platform, T0150.001: Newly Created Asset). | | [I00123 The Extreme Right on Steam](../../generated_pages/incidents/I00123.md) | ISD conducted an investigation into the usage of social groups on Steam. Steam is an online platform used to buy and sell digital games, and includes the Steam community feature, which “allows users to find friends and join groups and discussion forums, while also offering in-game voice and text chat”. Actors have used Steam’s social capabilities to enable online harm campaigns:

A number of groups were observed encouraging members to join conversations on outside platforms. These include links to Telegram channels connected to white supremacist marches, and media outlets, forums and Discord servers run by neo-Nazis.

[...]

This off-ramping activity demonstrates how rather than sitting in isolation, Steam fits into the wider extreme right wing online ecosystem, with Steam groups acting as hubs for communities and organizations which span multiple platforms. Accordingly, although the platform appears to fill a specific role in the building and strengthening of communities with similar hobbies and interests, it is suggested that analysis seeking to determine the risk of these communities should focus on their activity across platforms


Social Groups on Steam were used to drive new people to other neo-Nazi controlled community assets (T0122: Direct Users to Alternative Platforms, T0152.009: Software Delivery Platform, T0151.002: Online Community Group). | -| [I00128 #TrollTracker: Outward Influence Operation From Iran](../../generated_pages/incidents/I00128.md) | [Meta removed a network of assets for coordinated inauthentic behaviour. One page] in the network, @StopMEK, was promoting views against the People’s Mujahedin of Iran (MEK), the largest and most active political opposition group against the Islamic Republic of Iran Leadership.

The content on the page drew narratives showing parallels between the Islamic State of Iraq and Syria (ISIS) and the MEK.

Apart from images and memes, the @StopMEK page shared a link to an archived report on how the United States was monitoring the MEK’s movement in Iran in the mid-1990’s. The file was embedded as a QR code on one of the page’s images.


In this example a Facebook page presented itself as focusing on a political cause (T0097.208: Social Cause Persona, T0151.001: Social Media Platform, T0151.002: Online Community Group). Within the page it embedded a QR code (T0122: Direct Users to Alternative Platforms, T0153.004: QR Code), which took users to a document hosted on another website (T0152.004: Website). | +| [I00128 #TrollTracker: Outward Influence Operation From Iran](../../generated_pages/incidents/I00128.md) | [Meta removed a network of assets for coordinated inauthentic behaviour. One page] in the network, @StopMEK, was promoting views against the People’s Mujahedin of Iran (MEK), the largest and most active political opposition group against the Islamic Republic of Iran Leadership.

The content on the page drew narratives showing parallels between the Islamic State of Iraq and Syria (ISIS) and the MEK.

Apart from images and memes, the @StopMEK page shared a link to an archived report on how the United States was monitoring the MEK’s movement in Iran in the mid-1990’s. The file was embedded as a QR code on one of the page’s images.


In this example a Facebook page presented itself as focusing on a political cause (T0097.208: Social Cause Persona, T0151.001: Social Media Platform, T0151.002: Online Community Group). Within the page it embedded a QR code (T0122: Direct Users to Alternative Platforms, T0153.004: QR Code Asset), which took users to a document hosted on another website (T0152.004: Website Asset). | diff --git a/generated_pages/techniques/T0124.md b/generated_pages/techniques/T0124.md index 2ce65ee..a6d1f8b 100644 --- a/generated_pages/techniques/T0124.md +++ b/generated_pages/techniques/T0124.md @@ -7,7 +7,7 @@ | Incident | Descriptions given for this incident | | -------- | -------------------- | -| [I00101 Pro-Putin Disinformation Warriors Take War of Aggression to Reddit](../../generated_pages/incidents/I00101.md) | This report looks at changes content posted to communities on Reddit (called Subreddits) after teams of voluntary moderators are replaced with what appear to be pro-Russian voices:

The r/antiwar subreddit appears to be a very recent takeover target. With 12,900 members it is not the largest community on Reddit, but this does place it squarely within the top 5% of all communities in terms of membership.

Three months ago a new moderator team was instated by subreddit head u/democracy101. Any posts documenting Russian aggression in Ukraine are now swiftly removed, while the board has been flooded with posts about how Ukraine is losing, or how American “neocons wrecked” the country.

The pinned post from moderator u/n0ahbody proclaims: “People who call for an end to Russian aggressions but not the Western aggressions Russia is reacting to don’t really want peace.” This user takes the view that any negative opinion about Russia is “shaped by what the fanatically Russophobic MSM wants you to think,” and that the United States is not threatened by its neighbors. Russia is.”

When u/n0ahbody took over the sub, the user posted a triumphant and vitriolic diatribe in another pro-Russia subreddit with some 33,500 members, r/EndlessWar. “We are making progress. We are purging the sub of all NAFO and NAFO-adjacent elements. Hundreds of them have been banned over the last 24 hours for various rule infractions, for being NAFO or NAFO-adjacent,” the user said, referencing the grassroots, pro-Ukrainian North Atlantic Fella Organization (NAFO) meme movement.

Several former users have reported they have indeed been banned from r/antiwar since the change in moderators. “If this subreddit cannot be explicitly against the invasion of Ukraine it will never truly be anti-war,” wrote one user Halcyon_Rein, in the antiwar subreddit on September 6. They then edited the post to say, “Edit: btw, I got f**king banned for this 💀💀💀”


A community hosted on Reddit was taken over by new moderators (T0151.011: Community Sub-Forum, T0150.005: Compromised). These moderators removed content posted to the community which favoured Ukraine over Russia (T0146.004: Administrator Account, T0151.011: Community Sub-Forum, T0124: Suppress Opposition). | +| [I00101 Pro-Putin Disinformation Warriors Take War of Aggression to Reddit](../../generated_pages/incidents/I00101.md) | This report looks at changes content posted to communities on Reddit (called Subreddits) after teams of voluntary moderators are replaced with what appear to be pro-Russian voices:

The r/antiwar subreddit appears to be a very recent takeover target. With 12,900 members it is not the largest community on Reddit, but this does place it squarely within the top 5% of all communities in terms of membership.

Three months ago a new moderator team was instated by subreddit head u/democracy101. Any posts documenting Russian aggression in Ukraine are now swiftly removed, while the board has been flooded with posts about how Ukraine is losing, or how American “neocons wrecked” the country.

The pinned post from moderator u/n0ahbody proclaims: “People who call for an end to Russian aggressions but not the Western aggressions Russia is reacting to don’t really want peace.” This user takes the view that any negative opinion about Russia is “shaped by what the fanatically Russophobic MSM wants you to think,” and that the United States is not threatened by its neighbors. Russia is.”

When u/n0ahbody took over the sub, the user posted a triumphant and vitriolic diatribe in another pro-Russia subreddit with some 33,500 members, r/EndlessWar. “We are making progress. We are purging the sub of all NAFO and NAFO-adjacent elements. Hundreds of them have been banned over the last 24 hours for various rule infractions, for being NAFO or NAFO-adjacent,” the user said, referencing the grassroots, pro-Ukrainian North Atlantic Fella Organization (NAFO) meme movement.

Several former users have reported they have indeed been banned from r/antiwar since the change in moderators. “If this subreddit cannot be explicitly against the invasion of Ukraine it will never truly be anti-war,” wrote one user Halcyon_Rein, in the antiwar subreddit on September 6. They then edited the post to say, “Edit: btw, I got f**king banned for this 💀💀💀”


A community hosted on Reddit was taken over by new moderators (T0151.011: Community Sub-Forum, T0150.005: Compromised Asset). These moderators removed content posted to the community which favoured Ukraine over Russia (T0146.004: Administrator Account Asset, T0151.011: Community Sub-Forum, T0124: Suppress Opposition). | diff --git a/generated_pages/techniques/T0129.005.md b/generated_pages/techniques/T0129.005.md index 6bf8c5f..697de8b 100644 --- a/generated_pages/techniques/T0129.005.md +++ b/generated_pages/techniques/T0129.005.md @@ -7,7 +7,7 @@ | Incident | Descriptions given for this incident | | -------- | -------------------- | -| [I00113 Inside the Shadowy World of Disinformation for Hire in Kenya](../../generated_pages/incidents/I00113.md) | Researchers at Mozilla examined influence operations targeting Kenyan citizens on Twitter in 2021, providing “a grim window into the booming and shadowy industry of Twitter influencers for political hire here in Kenya”, and giving insight into operations’ operationalisation:

In our interviews with one of the influencers, they informed us of the agile tactics they use to organize and avoid detection. For example, when it’s time to carry out the campaign the influencers would be added to a Whatsapp group. Here, they received direction about what to post, the hashtags to use, which tweets to engage with and who to target. Synchronizing the tweets was also incredibly important for them. It’s what enables them to achieve their goal of trending on Twitter and gain amplification.

[...]

They revealed to us that those participating in the exercise are paid roughly between $10 and $15 to participate in three campaigns per day. Each campaign execution involves tweeting about the hashtags of the day until it appears on the trending section of Twitter. Additionally, some individuals have managed to reach retainer level and get paid about $250 per month. Their job is to make sure the campaigns are executed on a day-by-day basis with different hashtags.


An M-PESA account (T0148.002: Bank Account, T0148.001: Online Banking Platform) was used to pay campaign participants.

Participants were organised in WhatsApp groups (T0129.005: Coordinate on Encrypted/Closed Networks, T0151.007: Chat Broadcast Group, T0151.004: Chat Platform), in which they planned how to get campaign content trending on Twitter (T0121: Manipulate Platform Algorithm, T0151.008: Microblogging Platform). | +| [I00113 Inside the Shadowy World of Disinformation for Hire in Kenya](../../generated_pages/incidents/I00113.md) | Researchers at Mozilla examined influence operations targeting Kenyan citizens on Twitter in 2021, providing “a grim window into the booming and shadowy industry of Twitter influencers for political hire here in Kenya”, and giving insight into operations’ operationalisation:

In our interviews with one of the influencers, they informed us of the agile tactics they use to organize and avoid detection. For example, when it’s time to carry out the campaign the influencers would be added to a Whatsapp group. Here, they received direction about what to post, the hashtags to use, which tweets to engage with and who to target. Synchronizing the tweets was also incredibly important for them. It’s what enables them to achieve their goal of trending on Twitter and gain amplification.

[...]

They revealed to us that those participating in the exercise are paid roughly between $10 and $15 to participate in three campaigns per day. Each campaign execution involves tweeting about the hashtags of the day until it appears on the trending section of Twitter. Additionally, some individuals have managed to reach retainer level and get paid about $250 per month. Their job is to make sure the campaigns are executed on a day-by-day basis with different hashtags.


An M-PESA account (T0148.002: Bank Account Asset, T0148.001: Online Banking Platform) was used to pay campaign participants.

Participants were organised in WhatsApp groups (T0129.005: Coordinate on Encrypted/Closed Networks, T0151.007: Chat Broadcast Group, T0151.004: Chat Platform), in which they planned how to get campaign content trending on Twitter (T0121: Manipulate Platform Algorithm, T0151.008: Microblogging Platform). | diff --git a/generated_pages/techniques/T0129.006.md b/generated_pages/techniques/T0129.006.md index 72ee752..3e05e66 100644 --- a/generated_pages/techniques/T0129.006.md +++ b/generated_pages/techniques/T0129.006.md @@ -8,8 +8,8 @@ | Incident | Descriptions given for this incident | | -------- | -------------------- | | [I00075 How Russia Meddles Abroad for Profit: Cash, Trolls and a Cult Leader](../../generated_pages/incidents/I00075.md) | “Only three of the Russian operatives identified by local hires of the campaign responded to requests for comment. All acknowledged visiting Madagascar last year, but only one admitted working as a pollster on behalf of the president.

“The others said they were simply tourists. Pyotr Korolyov, described as a sociologist on one spreadsheet, spent much of the summer of 2018 and fall hunched over a computer, deep in polling data at La Résidence Ankerana, a hotel the Russians used as their headquarters, until he was hospitalized with the measles, according to one person who worked with him.

“In an email exchange, Mr. Korolyov confirmed that he had come down with the measles, but rejected playing a role in a Russian operation. He did defend the idea of one, though.

““Russia should influence elections around the world, the same way the United States influences elections,” he wrote. “Sooner or later Russia will return to global politics as a global player,” he added. “And the American establishment will just have to accept that.””


This behaviour matches T0129.006: Deny Involvement because the actors contacted by journalists denied that they had participated in election interference (in spite of the evidence to the contrary). | -| [I00093 China Falsely Denies Disinformation Campaign Targeting Canada’s Prime Minister](../../generated_pages/incidents/I00093.md) | “On October 23, Canada’s Foreign Ministry said it had discovered a disinformation campaign, likely tied to China, aimed at discrediting dozens of Canadian politicians, including Prime Minister Justin Trudeau.

“The ministry said the campaign took place in August and September. It used new and hijacked social media accounts to bulk-post messages targeting Canadian politicians (T0146: Account, T0150.001: Newly Created, T0150.005: Compromised).

“A Chinese Embassy in Canada spokesperson dismissed Canada’s accusation as baseless.

““Canada was a downright liar and disseminator of false information… Beijing has never meddled in another nation’s domestic affairs.”

“A Chinese Embassy in Canada spokesperson dismissed Canada’s accusation as baseless.

“That is false.

“The Canadian government's report is based on an investigation conducted by its Rapid Response Mechanism cyber intelligence unit in cooperation with the social media platforms.

“The investigation exposed China’s disinformation campaign dubbed “Spamouflage” -- for its tactic of using “a network of new or hijacked social media accounts that posts and increases the number of propaganda messages across multiple social media platforms – including Facebook, X/Twitter, Instagram, YouTube, Medium, Reddit, TikTok, and LinkedIn.””


In this case a network of accounts attributed to China were identified operating on multiple platforms. The report was dismissed as false information by an official in the Chinese Embassy in Canada (T0143.001: Authentic Persona, T0097.111: Government Official Persona, T0129.006: Deny Involvement). | -| [I00102 Ignore The Poway Synagogue Shooter’s Manifesto: Pay Attention To 8chan’s /pol/ Board](../../generated_pages/incidents/I00102.md) | On April 27, 2019, at around 11:30 a.m. local time, a young man with a semi-automatic rifle walked into the Chabad of Poway Synagogue in Poway, California. He opened fire, killing one worshipper and wounding three others. In the hours since the shooting, a manifesto, believed to be written by the shooter, began circulating online. Evidence has also surfaced that, like the Christchurch Mosque shooter, this killer began his rampage with a post on 8chan’s /pol/ board.

Although both of these attacks may seem different, since they targeted worshippers of different faiths, both shooters were united by the same fascist ideology. They were also both radicalized in the same place: 8chan’s /pol/ board.

This has been corroborated by posts on the board itself, where “anons,” as the posters call themselves, recirculated the shooter’s since-deleted post. In it, the alleged shooter claims to have been “lurking” on the site for a year and a half. He includes a link to a livestream of his rampage — which thankfully does not appear to have worked — and he also includes a pastebin link to his manifesto.

The very first response to his announcement was another anon cheering him on and telling him to “get the high score,” AKA, kill a huge number of people.


Before carrying out a mass shooting, the shooter posted a thread to 8chan’s /pol/ board. The post directed users to a variety of different platforms (T0146.006: Open Access Platform, T0151.012: Image Board Platform, T0115: Post Content, T0122: Direct Users to Alternative Platforms); a Facebook account on which the shooter attempted to livestream the shooting (T0146: Account, T0151.001: Social Media Platform); and a manifesto they had written hosted on pastebin (T0146.006: Open Access Platform, T0152.005: Paste Platform, T0115: Post Content) and uploaded to the file sharing platform Mediafire (T0152.010: File Hosting Platform, T0085.004: Develop Document).

The report looks deeper into 8chan’s /pol/ board:

8chan is a large website, which includes a number of different discussion groups about everything from anime to left-wing politics. /pol/ is one particularly active board on the website, and it is best described as a gathering place for extremely online neo-Nazis.

[...]

I’ve browsed /pol/ on an almost daily basis since the Christchurch shooting. It has not been difficult to find calls for violence. On Monday, March 25 of this year, I ran across evidence of anons translating the Christchurch shooter’s manifesto into other languages in an attempt to inspire more shootings across the globe.

This tactic can work, and today’s shooting is proof. The Poway Synagogue shooter directly cited the Christchurch shooter as his inspiration, saying he decided to carry out his attack roughly two weeks after that shooting. On /pol/, many anons refer to the Christchurch shooter, Brenton Tarrant, as “Saint Tarrant,” complete with medieval-inspired iconography.


Manifestos posted to 8chan are translated and reshared by other platform users (T0101: Create Localised Content, T0146.006: Open Access Platform, T0151.012: Image Board Platform, T0115: Post Content, T0084.004: Appropriate Content).

When I began looking through /pol/ right after the Poway Synagogue shooting, I came across several claims that the shootings had been a “false flag” aimed at making the message board look bad.

When Bellingcat tweeted out a warning about shitposting and the shooter’s manifesto, in the immediate wake of the attack, probable anons even commented on the Tweet in an attempt to deny that a channer had been behind the attack.

This is a recognizable pattern that occurs in the wake of any crimes committed by members of the board. While the initial response to the Christchurch shooter’s massacre thread was riotous glee, in the days after the shooting many anons began to claim the attack had been a false flag. This actually sparked significant division and debate between the members of /pol/. In the below image, a user mocks other anons for being unable to “believe something in your favor is real.” Another anon responds, “As the evidence comes out, its [sic] quite clear that this was a false flag.”

In his manifesto, the Poway Synagogue shooter even weighed in on this debate, accusing other anons who called the Christchurch and Tree of Life Synagogue shootings “false flags” to merely have been scared: “They can’t fathom that there are brave White men alive who have the willpower and courage it takes to say, ‘Fuck my life—I’m willing to sacrifice everything for the benefit of my race.’”


Platform users deny that their platform has been used by mass shooters to publish their manifestos (T0129.006: Deny Involvement). | +| [I00093 China Falsely Denies Disinformation Campaign Targeting Canada’s Prime Minister](../../generated_pages/incidents/I00093.md) | “On October 23, Canada’s Foreign Ministry said it had discovered a disinformation campaign, likely tied to China, aimed at discrediting dozens of Canadian politicians, including Prime Minister Justin Trudeau.

“The ministry said the campaign took place in August and September. It used new and hijacked social media accounts to bulk-post messages targeting Canadian politicians (T0146: Account Asset, T0150.001: Newly Created Asset, T0150.005: Compromised Asset).

“A Chinese Embassy in Canada spokesperson dismissed Canada’s accusation as baseless.

““Canada was a downright liar and disseminator of false information… Beijing has never meddled in another nation’s domestic affairs.”

“A Chinese Embassy in Canada spokesperson dismissed Canada’s accusation as baseless.

“That is false.

“The Canadian government's report is based on an investigation conducted by its Rapid Response Mechanism cyber intelligence unit in cooperation with the social media platforms.

“The investigation exposed China’s disinformation campaign dubbed “Spamouflage” -- for its tactic of using “a network of new or hijacked social media accounts that posts and increases the number of propaganda messages across multiple social media platforms – including Facebook, X/Twitter, Instagram, YouTube, Medium, Reddit, TikTok, and LinkedIn.””


In this case a network of accounts attributed to China were identified operating on multiple platforms. The report was dismissed as false information by an official in the Chinese Embassy in Canada (T0143.001: Authentic Persona, T0097.111: Government Official Persona, T0129.006: Deny Involvement). | +| [I00102 Ignore The Poway Synagogue Shooter’s Manifesto: Pay Attention To 8chan’s /pol/ Board](../../generated_pages/incidents/I00102.md) | On April 27, 2019, at around 11:30 a.m. local time, a young man with a semi-automatic rifle walked into the Chabad of Poway Synagogue in Poway, California. He opened fire, killing one worshipper and wounding three others. In the hours since the shooting, a manifesto, believed to be written by the shooter, began circulating online. Evidence has also surfaced that, like the Christchurch Mosque shooter, this killer began his rampage with a post on 8chan’s /pol/ board.

Although both of these attacks may seem different, since they targeted worshippers of different faiths, both shooters were united by the same fascist ideology. They were also both radicalized in the same place: 8chan’s /pol/ board.

This has been corroborated by posts on the board itself, where “anons,” as the posters call themselves, recirculated the shooter’s since-deleted post. In it, the alleged shooter claims to have been “lurking” on the site for a year and a half. He includes a link to a livestream of his rampage — which thankfully does not appear to have worked — and he also includes a pastebin link to his manifesto.

The very first response to his announcement was another anon cheering him on and telling him to “get the high score,” AKA, kill a huge number of people.


Before carrying out a mass shooting, the shooter posted a thread to 8chan’s /pol/ board. The post directed users to a variety of different platforms (T0146.006: Open Access Platform, T0151.012: Image Board Platform, T0115: Post Content, T0122: Direct Users to Alternative Platforms); a Facebook account on which the shooter attempted to livestream the shooting (T0146: Account Asset, T0151.001: Social Media Platform); and a manifesto they had written hosted on pastebin (T0146.006: Open Access Platform, T0152.005: Paste Platform, T0115: Post Content) and uploaded to the file sharing platform Mediafire (T0152.010: File Hosting Platform, T0085.004: Develop Document).

The report looks deeper into 8chan’s /pol/ board:

8chan is a large website, which includes a number of different discussion groups about everything from anime to left-wing politics. /pol/ is one particularly active board on the website, and it is best described as a gathering place for extremely online neo-Nazis.

[...]

I’ve browsed /pol/ on an almost daily basis since the Christchurch shooting. It has not been difficult to find calls for violence. On Monday, March 25 of this year, I ran across evidence of anons translating the Christchurch shooter’s manifesto into other languages in an attempt to inspire more shootings across the globe.

This tactic can work, and today’s shooting is proof. The Poway Synagogue shooter directly cited the Christchurch shooter as his inspiration, saying he decided to carry out his attack roughly two weeks after that shooting. On /pol/, many anons refer to the Christchurch shooter, Brenton Tarrant, as “Saint Tarrant,” complete with medieval-inspired iconography.


Manifestos posted to 8chan are translated and reshared by other platform users (T0101: Create Localised Content, T0146.006: Open Access Platform, T0151.012: Image Board Platform, T0115: Post Content, T0084.004: Appropriate Content).

When I began looking through /pol/ right after the Poway Synagogue shooting, I came across several claims that the shootings had been a “false flag” aimed at making the message board look bad.

When Bellingcat tweeted out a warning about shitposting and the shooter’s manifesto, in the immediate wake of the attack, probable anons even commented on the Tweet in an attempt to deny that a channer had been behind the attack.

This is a recognizable pattern that occurs in the wake of any crimes committed by members of the board. While the initial response to the Christchurch shooter’s massacre thread was riotous glee, in the days after the shooting many anons began to claim the attack had been a false flag. This actually sparked significant division and debate between the members of /pol/. In the below image, a user mocks other anons for being unable to “believe something in your favor is real.” Another anon responds, “As the evidence comes out, its [sic] quite clear that this was a false flag.”

In his manifesto, the Poway Synagogue shooter even weighed in on this debate, accusing other anons who called the Christchurch and Tree of Life Synagogue shootings “false flags” to merely have been scared: “They can’t fathom that there are brave White men alive who have the willpower and courage it takes to say, ‘Fuck my life—I’m willing to sacrifice everything for the benefit of my race.’”


Platform users deny that their platform has been used by mass shooters to publish their manifestos (T0129.006: Deny Involvement). | diff --git a/generated_pages/techniques/T0143.001.md b/generated_pages/techniques/T0143.001.md index 0aab81f..f2a1fe2 100644 --- a/generated_pages/techniques/T0143.001.md +++ b/generated_pages/techniques/T0143.001.md @@ -12,9 +12,9 @@ | [I00079 Three thousand fake tanks](../../generated_pages/incidents/I00079.md) | “On January 4 [2017], a little-known news site based in Donetsk, Ukraine published an article claiming that the United States was sending 3,600 tanks to Europe as part of “the NATO war preparation against Russia”.

“Like much fake news, this story started with a grain of truth: the US was about to reinforce its armored units in Europe. However, the article converted literally thousands of other vehicles — including hundreds of Humvees and trailers — into tanks, building the US force into something 20 times more powerful than it actually was.

“The story caught on online. Within three days it had been repeated by a dozen websites in the United States, Canada and Europe, and shared some 40,000 times. It was translated into Norwegian; quoted, unchallenged, by Russian state news agency RIA Novosti; and spread among Russian-language websites.

“It was also an obvious fake, as any Google news search would have revealed. Yet despite its evident falsehood, it spread widely, and not just in directly Kremlin-run media. Tracking the spread of this fake therefore shines a light on the wider question of how fake stories are dispersed.”


Russian state news agency RIA Novosti presents themselves as a news outlet (T0097.202: News Outlet Persona). RIO Novosti is a real news outlet (T0143.001: Authentic Persona), but it did not carry out a basic investigation into the veracity of the narrative they published implicitly expected of institutions presenting themselves as news outlets.

We can’t know how or why this narrative ended up being published by RIA Novosti, but we know that it presented a distorted reality as authentic information (T0023: Distort Facts), claiming that the US was sending 3,600 tanks, instead of 3,600 vehicles which included ~180 tanks. | | [I00084 Russia turns its diplomats into disinformation warriors](../../generated_pages/incidents/I00084.md) | “After the European Union banned Kremlin-backed media outlets and social media giants demoted their posts for peddling falsehoods about the war in Ukraine, Moscow has turned to its cadre of diplomats, government spokespeople and ministers — many of whom have extensive followings on social media — to promote disinformation about the conflict in Eastern Europe, according to four EU and United States officials.”

In this example authentic Russian government officials used their own accounts to promote false narratives (T0143.001: Authentic Persona, T0097.111: Government Official Persona).

The use of accounts managed by authentic Government / Diplomats to spread false narratives makes it harder for platforms to enforce content moderation, because of the political ramifications they may face for censoring elected officials (T0131: Exploit TOS/Content Moderation). For example, Twitter previously argued that official channels of world leaders are not removed due to the high public interest associated with their activities. | | [I00085 China’s large-scale media push: Attempts to influence Swedish media](../../generated_pages/incidents/I00085.md) | “Four media companies – Svenska Dagbladet, Expressen, Sveriges Radio, and Sveriges Television – stated that they had been contacted by the Chinese embassy on several occasions, and that they, for instance, had been criticized on their publications, both by letters and e-mails.

The media company Svenska Dagbladet, had been contacted on several occasions in the past two years, including via e-mails directly from the Chinese ambassador to Sweden. Several times, China and the Chinese ambassador had criticized the media company’s publications regarding the conditions in China. Individual reporters also reported having been subjected to criticism.

The tabloid Expressen had received several letters and e-mails from the embassy, e-mails containing criticism and threatening formulations regarding the coverage of the Swedish book publisher Gui Minhai, who has been imprisoned in China since 2015. Formulations such as “media tyranny” could be found in the e-mails.”


In this case, the Chinese ambassador is using their official role (T0143.001: Authentic Persona, T0097.111: Government Official Persona) to try to influence Swedish press. A government official trying to interfere in other countries' media activities could be a violation of press freedom. In this specific case, the Chinese diplomats are trying to silence criticism against China (T0139.002: Silence).” | -| [I00093 China Falsely Denies Disinformation Campaign Targeting Canada’s Prime Minister](../../generated_pages/incidents/I00093.md) | “On October 23, Canada’s Foreign Ministry said it had discovered a disinformation campaign, likely tied to China, aimed at discrediting dozens of Canadian politicians, including Prime Minister Justin Trudeau.

“The ministry said the campaign took place in August and September. It used new and hijacked social media accounts to bulk-post messages targeting Canadian politicians (T0146: Account, T0150.001: Newly Created, T0150.005: Compromised).

“A Chinese Embassy in Canada spokesperson dismissed Canada’s accusation as baseless.

““Canada was a downright liar and disseminator of false information… Beijing has never meddled in another nation’s domestic affairs.”

“A Chinese Embassy in Canada spokesperson dismissed Canada’s accusation as baseless.

“That is false.

“The Canadian government's report is based on an investigation conducted by its Rapid Response Mechanism cyber intelligence unit in cooperation with the social media platforms.

“The investigation exposed China’s disinformation campaign dubbed “Spamouflage” -- for its tactic of using “a network of new or hijacked social media accounts that posts and increases the number of propaganda messages across multiple social media platforms – including Facebook, X/Twitter, Instagram, YouTube, Medium, Reddit, TikTok, and LinkedIn.””


In this case a network of accounts attributed to China were identified operating on multiple platforms. The report was dismissed as false information by an official in the Chinese Embassy in Canada (T0143.001: Authentic Persona, T0097.111: Government Official Persona, T0129.006: Deny Involvement). | -| [I00118 ‘War Thunder’ players are once again leaking sensitive military technology information on a video game forum](../../generated_pages/incidents/I00118.md) | In an effort to prove that the developers behind a popular multiplayer vehicle combat game had made a mistake, a player went ahead and published classified British military documents about one of the real-life tanks featured in the game.

This truly bizarre turn of events recently occurred in the public forum for War Thunder, a free-to-player multiplayer combat sim featuring modern land, air, and sea craft. Getting a small detail wrong on a piece of equipment might not be a big deal for the average gamer, but for the War Thunder crowd it sure as hell is. With 25,000 devoted players, the game very much bills itself as the military vehicle combat simulator.

A player, who identified himself as a British tank commander, claimed that the game’s developers at Gaijin Entertainment had inaccurately represented the Challenger 2 main battle tank used by the British military.

The self-described tank commander’s bio listed his location as Tidworth Camp in Wiltshire, England, according to the UK Defense Journal, which reported that the base is home to the Royal Tank Regiment, which fields Challenger 2 tanks.

The player, who went by the handle Pyrophoric, reportedly shared an image on the War Thunder forum of the tank’s specs that were pulled from the Challenger 2’s Army Equipment Support Publication, which is essentially a technical manual.

[...]

A moderator for the forum, who’s handle is “Templar_”, explained that the developer had removed the material after they received confirmation from the Ministry of Defense that the document is still in fact classified.


A user of War Thunder’s forums posted confidential documents to win an argument (T0089.001: Obtain Authentic Documents, T0146: Account, T0097.105: Military Personnel Persona, T0115: Post Content, T0143.001: Authentic Persona, T0151.009: Legacy Online Forum Platform). | -| [I00119 Independent journalist publishes Trump campaign document hacked by Iran despite election interference concerns](../../generated_pages/incidents/I00119.md) | An American journalist who runs an independent newsletter published a document [on 26 Sep 2024] that appears to have been stolen from Donald Trump’s presidential campaign — the first public posting of a file that is believed to be part of a dossier that federal officials say is part of an Iranian effort to manipulate the [2024] U.S. election.

The PDF document is a 271-page opposition research file on former President Donald Trump’s running mate, Sen. JD Vance, R-Ohio.

For more than two months, hackers who the U.S. says are tied to Iran have tried to persuade the American media to cover files they stole. No outlets took the bait.

But on Thursday, reporter Ken Klippenstein, who self-publishes on Substack after he left The Intercept this year, published one of the files.

[...]

Reporters who have received the documents describe the same pattern: An AOL account emails them files, signed by a person using the name “Robert,” who is reluctant to speak to their identity or reasons for wanting the documents to receive coverage.

NBC News was not part of the Robert persona’s direct outreach, but it has viewed its correspondence with a reporter at another publication.

One of the emails from the Robert persona previously viewed by NBC News included three large PDF files, each corresponding to Trump’s three reported finalists for vice president. The Vance file appears to be the one Klippenstein hosts on his site.


In this example hackers attributed to Iran used the Robert persona to email journalists hacked documents (T0146: Account, T0097.100: Individual Persona, T0153.001: Email Platform).

The journalist Ken Kippenstien used his existing blog on substack to host a link to download the document (T0089: Obtain Private Documents, T0097.102: Journalist Persona, T0115: Post Content, T0143.001: Authentic Persona, T0152.001: Blogging Platform, T0152.002: Blog, T0150.003: Pre-Existing). | +| [I00093 China Falsely Denies Disinformation Campaign Targeting Canada’s Prime Minister](../../generated_pages/incidents/I00093.md) | “On October 23, Canada’s Foreign Ministry said it had discovered a disinformation campaign, likely tied to China, aimed at discrediting dozens of Canadian politicians, including Prime Minister Justin Trudeau.

“The ministry said the campaign took place in August and September. It used new and hijacked social media accounts to bulk-post messages targeting Canadian politicians (T0146: Account Asset, T0150.001: Newly Created Asset, T0150.005: Compromised Asset).

“A Chinese Embassy in Canada spokesperson dismissed Canada’s accusation as baseless.

““Canada was a downright liar and disseminator of false information… Beijing has never meddled in another nation’s domestic affairs.”

“A Chinese Embassy in Canada spokesperson dismissed Canada’s accusation as baseless.

“That is false.

“The Canadian government's report is based on an investigation conducted by its Rapid Response Mechanism cyber intelligence unit in cooperation with the social media platforms.

“The investigation exposed China’s disinformation campaign dubbed “Spamouflage” -- for its tactic of using “a network of new or hijacked social media accounts that posts and increases the number of propaganda messages across multiple social media platforms – including Facebook, X/Twitter, Instagram, YouTube, Medium, Reddit, TikTok, and LinkedIn.””


In this case a network of accounts attributed to China were identified operating on multiple platforms. The report was dismissed as false information by an official in the Chinese Embassy in Canada (T0143.001: Authentic Persona, T0097.111: Government Official Persona, T0129.006: Deny Involvement). | +| [I00118 ‘War Thunder’ players are once again leaking sensitive military technology information on a video game forum](../../generated_pages/incidents/I00118.md) | In an effort to prove that the developers behind a popular multiplayer vehicle combat game had made a mistake, a player went ahead and published classified British military documents about one of the real-life tanks featured in the game.

This truly bizarre turn of events recently occurred in the public forum for War Thunder, a free-to-player multiplayer combat sim featuring modern land, air, and sea craft. Getting a small detail wrong on a piece of equipment might not be a big deal for the average gamer, but for the War Thunder crowd it sure as hell is. With 25,000 devoted players, the game very much bills itself as the military vehicle combat simulator.

A player, who identified himself as a British tank commander, claimed that the game’s developers at Gaijin Entertainment had inaccurately represented the Challenger 2 main battle tank used by the British military.

The self-described tank commander’s bio listed his location as Tidworth Camp in Wiltshire, England, according to the UK Defense Journal, which reported that the base is home to the Royal Tank Regiment, which fields Challenger 2 tanks.

The player, who went by the handle Pyrophoric, reportedly shared an image on the War Thunder forum of the tank’s specs that were pulled from the Challenger 2’s Army Equipment Support Publication, which is essentially a technical manual.

[...]

A moderator for the forum, who’s handle is “Templar_”, explained that the developer had removed the material after they received confirmation from the Ministry of Defense that the document is still in fact classified.


A user of War Thunder’s forums posted confidential documents to win an argument (T0089.001: Obtain Authentic Documents, T0146: Account Asset, T0097.105: Military Personnel Persona, T0115: Post Content, T0143.001: Authentic Persona, T0151.009: Legacy Online Forum Platform). | +| [I00119 Independent journalist publishes Trump campaign document hacked by Iran despite election interference concerns](../../generated_pages/incidents/I00119.md) | An American journalist who runs an independent newsletter published a document [on 26 Sep 2024] that appears to have been stolen from Donald Trump’s presidential campaign — the first public posting of a file that is believed to be part of a dossier that federal officials say is part of an Iranian effort to manipulate the [2024] U.S. election.

The PDF document is a 271-page opposition research file on former President Donald Trump’s running mate, Sen. JD Vance, R-Ohio.

For more than two months, hackers who the U.S. says are tied to Iran have tried to persuade the American media to cover files they stole. No outlets took the bait.

But on Thursday, reporter Ken Klippenstein, who self-publishes on Substack after he left The Intercept this year, published one of the files.

[...]

Reporters who have received the documents describe the same pattern: An AOL account emails them files, signed by a person using the name “Robert,” who is reluctant to speak to their identity or reasons for wanting the documents to receive coverage.

NBC News was not part of the Robert persona’s direct outreach, but it has viewed its correspondence with a reporter at another publication.

One of the emails from the Robert persona previously viewed by NBC News included three large PDF files, each corresponding to Trump’s three reported finalists for vice president. The Vance file appears to be the one Klippenstein hosts on his site.


In this example hackers attributed to Iran used the Robert persona to email journalists hacked documents (T0146: Account Asset, T0097.100: Individual Persona, T0153.001: Email Platform).

The journalist Ken Kippenstien used his existing blog on substack to host a link to download the document (T0089: Obtain Private Documents, T0097.102: Journalist Persona, T0115: Post Content, T0143.001: Authentic Persona, T0152.001: Blogging Platform, T0152.002: Blog Asset, T0150.003: Pre-Existing Asset). | diff --git a/generated_pages/techniques/T0143.002.md b/generated_pages/techniques/T0143.002.md index d433755..35b1c27 100644 --- a/generated_pages/techniques/T0143.002.md +++ b/generated_pages/techniques/T0143.002.md @@ -19,10 +19,10 @@ | [I00089 Hackers Use Fake Facebook Profiles of Attractive Women to Spread Viruses, Steal Passwords](../../generated_pages/incidents/I00089.md) | “On Facebook, Rita, Alona and Christina appeared to be just like the millions of other U.S citizens sharing their lives with the world. They discussed family outings, shared emojis and commented on each other's photographs.

“In reality, the three accounts were part of a highly-targeted cybercrime operation, used to spread malware that was able to steal passwords and spy on victims.

“Hackers with links to Lebanon likely ran the covert scheme using a strain of malware dubbed "Tempting Cedar Spyware," according to researchers from Prague-based anti-virus company Avast, which detailed its findings in a report released on Wednesday.

“In a honey trap tactic as old as time, the culprits' targets were mostly male, and lured by fake attractive women. 

“In the attack, hackers would send flirtatious messages using Facebook to the chosen victims, encouraging them to download a second , booby-trapped, chat application known as Kik Messenger to have "more secure" conversations. Upon analysis, Avast experts found that "many fell for the trap.””


In this example threat actors took on the persona of a romantic suitor on Facebook, directing their targets to another platform (T0097:109 Romantic Suitor Persona, T0145.006: Attractive Person Account Imagery, T0143.002: Fabricated Persona). | | [I00091 Facebook uncovers Chinese network behind fake expert](../../generated_pages/incidents/I00091.md) | “Earlier in July [2021], an account posing as a Swiss biologist called Wilson Edwards had made statements on Facebook and Twitter that the United States was applying pressure on the World Health Organization scientists who were studying the origins of Covid-19 in an attempt to blame the virus on China.

“State media outlets, including CGTN, Shanghai Daily and Global Times, had cited the so-called biologist based on his Facebook profile.

“However, the Swiss embassy said in August that the person likely did not exist, as the Facebook account was opened only two weeks prior to its first post and only had three friends.

“It added "there was no registry of a Swiss citizen with the name "Wilson Edwards" and no academic articles under the name", and urged Chinese media outlets to take down any mention of him.

[...]

“It also said that his profile photo also appeared to have been generated using machine-learning capabilities.”


In this example an account created on Facebook presented itself as a Swiss biologist to present a narrative related to COVID-19 (T0143.002: Fabricated Persona, T0097.106: Researcher Persona). It used an AI-Generated profile picture to disguise itself (T0145.002: AI-Generated Account Imagery). | | [I00095 Meta: Chinese disinformation network was behind London front company recruiting content creators](../../generated_pages/incidents/I00095.md) | “A Chinese disinformation network operating fictitious employee personas across the internet used a front company in London to recruit content creators and translators around the world, according to Meta.

“The operation used a company called London New Europe Media, registered to an address on the upmarket Kensington High Street, that attempted to recruit real people to help it produce content. It is not clear how many people it ultimately recruited.

“London New Europe Media also “tried to engage individuals to record English-language videos scripted by the network,” in one case leading to a recording criticizing the United States being posted on YouTube, said Meta”.


In this example a front company was used (T0097.205: Business Persona) to enable actors to recruit targets for producing content (T0097.106: Recruiter Persona, T0143.002: Fabricated Persona). | -| [I00096 China ramps up use of AI misinformation](../../generated_pages/incidents/I00096.md) | The Microsoft Threat Analysis Centre (MTAC) published a report documenting the use of AI by pro-Chinese threat actors:

On 13 January, Spamouflage [(a Pro-Chinese Communist Party actor)] posted audio clips to YouTube of independent candidate [for Taiwan’s Jan 2024 presidential election] Terry Gou – who also founded electronics giant Foxconn – in which Gou endorsed another candidate in the race. This clip was almost certainly AI-generated, and it was swiftly removed by YouTube. A fake letter purporting to be from Gou, endorsing the same candidate, had already circulated – Gou had of course made no such endorsement.

Here Spamoflage used an account on YouTube to post AI Generated audio impersonating an electoral candidate (T0146: Account, T0152.006: Video Platform, T0115: Post Content, T0088.001: Develop AI-Generated Audio (Deepfakes), T0143.003: Impersonated Persona, T0097.110: Party Official Persona).

Spamouflage also exploited AI-powered video platform CapCut – which is owned by TikTok backers ByteDance – to generate fake news anchors which were used in a variety of campaigns targeting the various presidential candidates in Taiwan.

Spamoflage created accounts on CapCut, which it used to create AI-generated videos of fabricated news anchors (T0146: Account, T0154.002: AI Media Platform, T0087.001: Develop AI-Generated Video (Deepfakes), T0143.002: Fabricated Persona, T0097.102: Journalist Persona). | -| [I00120 factcheckUK or fakecheckUK? Reinventing the political faction as the impartial factchecker](../../generated_pages/incidents/I00120.md) | Ahead of the 2019 UK Election during a leader’s debate, the Conservative party rebranded their “Conservative Campaign Headquarters Press” account to “FactCheckUK”:


That is, until a few minutes into the debate.

All at once, like a person throwing off their street clothes to reveal some sinister new identity underneath, @CCHQPress abruptly shed its name, blue Conservative logo, Boris Johnson banner, and bio description. Moments later, it had entirely reinvented itself.

The purple banner was emblazoned with white font that read “✓ factcheckUK [with a “FROM CCQH” subheading]”.

The matching profile picture was a white tick in a purple circle. The bio was updated to: “Fact checking Labour from CCHQ”. And the name now read factcheckUK, with the customary Twitter blue (or white depending on your phone settings!) validation tick still after it


In this example an existing verified social media account on Twitter was repurposed to inauthentically present itself as a Fact Checking service (T0151.008: Microblogging Platform, T0150.003: Pre-Existing, T0146.003: Verified Account, T0097.203: Fact Checking Organisation Persona, T0143.002: Fabricated Persona). | -| [I00121 Operation Overload: how pro-Russian actors flood newsrooms with fake content and seek to divert their efforts](../../generated_pages/incidents/I00121.md) | The unique aspect of Operation Overload is a barrage of emails sent to newsrooms and fact-checkers across Europe. The authors of these messages urge recipients to verify content allegedly found online. The email subject lines often include an incitement to verify the claims briefly described in the message body. This is followed by a short list of links directing recipients to posts on Telegram, X, or known pro-Russian websites, including Pravda and Sputnik.

We have collected 221 emails sent to 20 organisations. The organisations mostly received identical emails urging them to fact-check specific false stories, which demonstrates that the emails were sent as part of a larger coordinated campaign.

[...]

The authors of the emails do not hide their intention to see the fake content widely spread. In February 2024, a journalist at the German outlet CORRECTIV engaged with the sender of one of the emails, providing feedback on the narratives which were originally sent. CORRECTIV received a response from the same Gmail address, initially expressing respect and trust in CORRECTIV’s assessment, while asking: “is it possible for your work to be seen by as many people as possible?”, thereby clearly stating the goal of the operation.

[...]

All the emails come from authors posing as concerned citizens. All emails are sent with Gmail accounts, which is typical for personal use. This makes it challenging to identify the individuals behind these emails, as anyone can open a Gmail account for free. The email headers indicate that the messages were sent from the Gmail interface, not from a personal client which would disclose the sender’s IP address.


In this example, threat actors used gmail accounts (T0146.001: Free Account, T0097.100: Individual Persona, T0143.002: Fabricated Persona, T0153.001: Email Platform) to target journalists and fact-checkers, with the apparent goal of having them amplify operation narratives through fact checks. | -| [I00125 The Agency](../../generated_pages/incidents/I00125.md) | In 2014 threat actors attributed to Russia spread the false narrative that a local chemical plant had leaked toxic fumes. This report discusses aspects of the operation:

[The chemical plant leak] hoax was just one in a wave of similar attacks during the second half of last year. On Dec. 13, two months after a handful of Ebola cases in the United States touched off a minor media panic, many of the same Twitter accounts used to spread the Columbian Chemicals hoax began to post about an outbreak of Ebola in Atlanta. [...] Again, the attention to detail was remarkable, suggesting a tremendous amount of effort. A YouTube video showed a team of hazmat-suited medical workers transporting a victim from the airport. Beyoncé’s recent single “7/11” played in the background, an apparent attempt to establish the video’s contemporaneity. A truck in the parking lot sported the logo of the Hartsfield-Jackson Atlanta International Airport.

Accounts which previously presented as Louisiana locals were repurposed for use in a different campaign, this time presenting as locals to Atlanta, a place over 500 miles away from Louisiana and in a different timezone (T0146: Account, T0097.101: Local Persona, T0143.002: Fabricated Persona, T0151.008: Microblogging Platform, T0150.004: Repurposed).

A video was created which appeared to support the campaign’s narrative (T0087: Develop Video-Based Content), with great attention given to small details which made the video appear more legitimate. | +| [I00096 China ramps up use of AI misinformation](../../generated_pages/incidents/I00096.md) | The Microsoft Threat Analysis Centre (MTAC) published a report documenting the use of AI by pro-Chinese threat actors:

On 13 January, Spamouflage [(a Pro-Chinese Communist Party actor)] posted audio clips to YouTube of independent candidate [for Taiwan’s Jan 2024 presidential election] Terry Gou – who also founded electronics giant Foxconn – in which Gou endorsed another candidate in the race. This clip was almost certainly AI-generated, and it was swiftly removed by YouTube. A fake letter purporting to be from Gou, endorsing the same candidate, had already circulated – Gou had of course made no such endorsement.

Here Spamoflage used an account on YouTube to post AI Generated audio impersonating an electoral candidate (T0146: Account Asset, T0152.006: Video Platform, T0115: Post Content, T0088.001: Develop AI-Generated Audio (Deepfakes), T0143.003: Impersonated Persona, T0097.110: Party Official Persona).

Spamouflage also exploited AI-powered video platform CapCut – which is owned by TikTok backers ByteDance – to generate fake news anchors which were used in a variety of campaigns targeting the various presidential candidates in Taiwan.

Spamoflage created accounts on CapCut, which it used to create AI-generated videos of fabricated news anchors (T0146: Account Asset, T0154.002: AI Media Platform, T0087.001: Develop AI-Generated Video (Deepfakes), T0143.002: Fabricated Persona, T0097.102: Journalist Persona). | +| [I00120 factcheckUK or fakecheckUK? Reinventing the political faction as the impartial factchecker](../../generated_pages/incidents/I00120.md) | Ahead of the 2019 UK Election during a leader’s debate, the Conservative party rebranded their “Conservative Campaign Headquarters Press” account to “FactCheckUK”:

The evening of the 19th November 2019 saw the first of three Leaders’ Debates on ITV, starting at 8pm and lasting for an hour. Current Prime Minister and leader of the Conservatives, Boris Johnson faced off against Labour party leader, Jeremy Corbyn. Plenty of people will have been watching the debate live, but a good proportion were “watching” (er, “twitching”?) via Twitter. This is something I’ve done in the past for certain shows. In some cases I just can’t watch or listen, but I can read, and in other cases, the commentary is far more interesting and entertaining than the show itself will ever be. This, for me, is just such a case. But very quickly, all eyes turned upon a modestly sized account with the handle @CCHQPress. That’s short for Conservative Campaign Headquarters Press. According to their (current!) Twitter bio, they are based in Westminster and they provide “snippets of news and commentary from CCHQ” to their 75k followers.

That is, until a few minutes into the debate.

All at once, like a person throwing off their street clothes to reveal some sinister new identity underneath, @CCHQPress abruptly shed its name, blue Conservative logo, Boris Johnson banner, and bio description. Moments later, it had entirely reinvented itself.

The purple banner was emblazoned with white font that read “✓ factcheckUK [with a “FROM CCQH” subheading]”.

The matching profile picture was a white tick in a purple circle. The bio was updated to: “Fact checking Labour from CCHQ”. And the name now read factcheckUK, with the customary Twitter blue (or white depending on your phone settings!) validation tick still after it


In this example an existing verified social media account on Twitter was repurposed to inauthentically present itself as a Fact Checking service (T0151.008: Microblogging Platform, T0150.003: Pre-Existing Asset, T0146.003: Verified Account Asset, T0097.203: Fact Checking Organisation Persona, T0143.002: Fabricated Persona). | +| [I00121 Operation Overload: how pro-Russian actors flood newsrooms with fake content and seek to divert their efforts](../../generated_pages/incidents/I00121.md) | The unique aspect of Operation Overload is a barrage of emails sent to newsrooms and fact-checkers across Europe. The authors of these messages urge recipients to verify content allegedly found online. The email subject lines often include an incitement to verify the claims briefly described in the message body. This is followed by a short list of links directing recipients to posts on Telegram, X, or known pro-Russian websites, including Pravda and Sputnik.

We have collected 221 emails sent to 20 organisations. The organisations mostly received identical emails urging them to fact-check specific false stories, which demonstrates that the emails were sent as part of a larger coordinated campaign.

[...]

The authors of the emails do not hide their intention to see the fake content widely spread. In February 2024, a journalist at the German outlet CORRECTIV engaged with the sender of one of the emails, providing feedback on the narratives which were originally sent. CORRECTIV received a response from the same Gmail address, initially expressing respect and trust in CORRECTIV’s assessment, while asking: “is it possible for your work to be seen by as many people as possible?”, thereby clearly stating the goal of the operation.

[...]

All the emails come from authors posing as concerned citizens. All emails are sent with Gmail accounts, which is typical for personal use. This makes it challenging to identify the individuals behind these emails, as anyone can open a Gmail account for free. The email headers indicate that the messages were sent from the Gmail interface, not from a personal client which would disclose the sender’s IP address.


In this example, threat actors used gmail accounts (T0146.001: Free Account Asset, T0097.100: Individual Persona, T0143.002: Fabricated Persona, T0153.001: Email Platform) to target journalists and fact-checkers, with the apparent goal of having them amplify operation narratives through fact checks. | +| [I00125 The Agency](../../generated_pages/incidents/I00125.md) | In 2014 threat actors attributed to Russia spread the false narrative that a local chemical plant had leaked toxic fumes. This report discusses aspects of the operation:

[The chemical plant leak] hoax was just one in a wave of similar attacks during the second half of last year. On Dec. 13, two months after a handful of Ebola cases in the United States touched off a minor media panic, many of the same Twitter accounts used to spread the Columbian Chemicals hoax began to post about an outbreak of Ebola in Atlanta. [...] Again, the attention to detail was remarkable, suggesting a tremendous amount of effort. A YouTube video showed a team of hazmat-suited medical workers transporting a victim from the airport. Beyoncé’s recent single “7/11” played in the background, an apparent attempt to establish the video’s contemporaneity. A truck in the parking lot sported the logo of the Hartsfield-Jackson Atlanta International Airport.

Accounts which previously presented as Louisiana locals were repurposed for use in a different campaign, this time presenting as locals to Atlanta, a place over 500 miles away from Louisiana and in a different timezone (T0146: Account Asset, T0097.101: Local Persona, T0143.002: Fabricated Persona, T0151.008: Microblogging Platform, T0150.004: Repurposed Asset).

A video was created which appeared to support the campaign’s narrative (T0087: Develop Video-Based Content), with great attention given to small details which made the video appear more legitimate. | diff --git a/generated_pages/techniques/T0143.003.md b/generated_pages/techniques/T0143.003.md index 645007a..49cce8d 100644 --- a/generated_pages/techniques/T0143.003.md +++ b/generated_pages/techniques/T0143.003.md @@ -7,21 +7,21 @@ | Incident | Descriptions given for this incident | | -------- | -------------------- | -| [I00064 Tinder nightmares: the promise and peril of political bots](../../generated_pages/incidents/I00064.md) | “In the days leading up to the UK’s [2019] general election, youths looking for love online encountered a whole new kind of Tinder nightmare. A group of young activists built a Tinder chatbot to co-opt profiles and persuade swing voters to support Labour. The bot accounts sent 30,000-40,000 messages to targeted 18-25 year olds in battleground constituencies like Dudley North, which Labour ended up winning by only 22 votes. [...]

“The activists maintain that the project was meant to foster democratic engagement. But screenshots of the bots’ activity expose a harsher reality. Images of conversations between real users and these bots, posted on i-D, Mashable, as well as on Fowler and Goodman’s public Twitter accounts, show that the bots did not identify themselves as automated accounts, instead posing as the user whose profile they had taken over. While conducting research for this story, it turned out that a number of [the reporters’ friends] living in Oxford had interacted with the bot in the lead up to the election and had no idea that it was not a real person.”


In this example people offered up their real accounts for the automation of political messaging; the actors convinced the users to give up access to their accounts to use in the operation. The actors maintained the accounts’ existing persona, and presented themselves as potential romantic suitors for legitimate platform users (T0097:109 Romantic Suitor Persona, T0143.003: Impersonated Persona, T0146: Account, T0150.007: Rented, T0151.017: Dating Platform). | -| [I00068 Attempted Audio Deepfake Call Targets LastPass Employee](../../generated_pages/incidents/I00068.md) | “While reports of [...] deepfake calls targeting private companies are luckily still rare, LastPass itself experienced a deepfake attempt earlier today that we are sharing with the larger community to help raise awareness that this tactic is spreading and all companies should be on the alert. In our case, an employee received a series of calls, texts, and at least one voicemail featuring an audio deepfake from a threat actor impersonating our CEO via WhatsApp. As the attempted communication was outside of normal business communication channels and due to the employee’s suspicion regarding the presence of many of the hallmarks of a social engineering attempt (such as forced urgency), our employee rightly ignored the messages and reported the incident to our internal security team so that we could take steps to both mitigate the threat and raise awareness of the tactic both internally and externally.”

In this example attackers created an account on WhatsApp which impersonated the CEO of lastpass (T0097.100: Individual Persona, T0143.003: Impersonated Persona, T0146: Account, T0151.004: Chat Platform, T0155.007: Encrypted Communication Channel). They used this asset to target an employee using deepfaked audio (T0088.001: Develop AI-Generated Audio (Deepfakes)). | +| [I00064 Tinder nightmares: the promise and peril of political bots](../../generated_pages/incidents/I00064.md) | “In the days leading up to the UK’s [2019] general election, youths looking for love online encountered a whole new kind of Tinder nightmare. A group of young activists built a Tinder chatbot to co-opt profiles and persuade swing voters to support Labour. The bot accounts sent 30,000-40,000 messages to targeted 18-25 year olds in battleground constituencies like Dudley North, which Labour ended up winning by only 22 votes. [...]

“The activists maintain that the project was meant to foster democratic engagement. But screenshots of the bots’ activity expose a harsher reality. Images of conversations between real users and these bots, posted on i-D, Mashable, as well as on Fowler and Goodman’s public Twitter accounts, show that the bots did not identify themselves as automated accounts, instead posing as the user whose profile they had taken over. While conducting research for this story, it turned out that a number of [the reporters’ friends] living in Oxford had interacted with the bot in the lead up to the election and had no idea that it was not a real person.”


In this example people offered up their real accounts for the automation of political messaging; the actors convinced the users to give up access to their accounts to use in the operation. The actors maintained the accounts’ existing persona, and presented themselves as potential romantic suitors for legitimate platform users (T0097:109 Romantic Suitor Persona, T0143.003: Impersonated Persona, T0146: Account Asset, T0150.007: Rented Asset, T0151.017: Dating Platform). | +| [I00068 Attempted Audio Deepfake Call Targets LastPass Employee](../../generated_pages/incidents/I00068.md) | “While reports of [...] deepfake calls targeting private companies are luckily still rare, LastPass itself experienced a deepfake attempt earlier today that we are sharing with the larger community to help raise awareness that this tactic is spreading and all companies should be on the alert. In our case, an employee received a series of calls, texts, and at least one voicemail featuring an audio deepfake from a threat actor impersonating our CEO via WhatsApp. As the attempted communication was outside of normal business communication channels and due to the employee’s suspicion regarding the presence of many of the hallmarks of a social engineering attempt (such as forced urgency), our employee rightly ignored the messages and reported the incident to our internal security team so that we could take steps to both mitigate the threat and raise awareness of the tactic both internally and externally.”

In this example attackers created an account on WhatsApp which impersonated the CEO of lastpass (T0097.100: Individual Persona, T0143.003: Impersonated Persona, T0146: Account Asset, T0151.004: Chat Platform, T0155.007: Encrypted Communication Channel). They used this asset to target an employee using deepfaked audio (T0088.001: Develop AI-Generated Audio (Deepfakes)). | | [I00069 Uncharmed: Untangling Iran's APT42 Operations](../../generated_pages/incidents/I00069.md) | “[Iranian state-sponsored cyber espionage actor] APT42 cloud operations attack lifecycle can be described in details as follows:

- “Social engineering schemes involving decoys and trust building, which includes masquerading as legitimate NGOs and conducting ongoing correspondence with the target, sometimes lasting several weeks.
- The threat actor masqueraded as well-known international organizations in the legal and NGO fields and sent emails from domains typosquatting the original NGO domains, for example aspenlnstitute[.]org.
- The Aspen Institute became aware of this spoofed domain and collaborated with industry partners, including blocking it in SafeBrowsing, thus protecting users of Google Chrome and additional browsers.
- To increase their credibility, APT42 impersonated high-ranking personnel working at the aforementioned organizations when creating the email personas.
- APT42 enhanced their campaign credibility by using decoy material inviting targets to legitimate and relevant events and conferences. In one instance, the decoy material was hosted on an attacker-controlled SharePoint folder, accessible only after the victim entered their credentials. Mandiant did not identify malicious elements in the files, suggesting they were used solely to gain the victim’s trust.”


In this example APT42, an Iranian state-sponsored cyber espionage actor, created a domain impersonating the existing NGO The Aspen Institute (T0143.003: Impersonated Persona, T0097.207: NGO Persona). They increased the perceived legitimacy of the impersonation by also impersonating high-ranking employees of the NGO (T0097.100: Individual Persona, T0143.003: Impersonated Persona). | | [I00070 Eli Lilly Clarifies It’s Not Offering Free Insulin After Tweet From Fake Verified Account—As Chaos Unfolds On Twitter](../../generated_pages/incidents/I00070.md) | “Twitter Blue launched [November 2022], giving any users who pay $8 a month the ability to be verified on the site, a feature previously only available to public figures, government officials and journalists as a way to show they are who they claim to be.

“[A day after the launch], an account with the handle @EliLillyandCo labeled itself with the name “Eli Lilly and Company,” and by using the same logo as the company in its profile picture and with the verification checkmark, was indistinguishable from the real company (the picture has since been removed and the account has labeled itself as a parody profile).

The parody account tweeted “we are excited to announce insulin is free now.””


In this example an account impersonated the pharmaceutical company Eli Lilly (T0097.205: Business Persona, T0143.003: Impersonated Persona) by copying its name, profile picture (T0145.001: Copy Account Imagery), and paying for verification. | -| [I00071 Russia-aligned hacktivists stir up anti-Ukrainian sentiments in Poland](../../generated_pages/incidents/I00071.md) | “The August 17 [2022] Telegram post [which contained a falsified letter from the Ukrainian Minister of Foreign Affairs asking Poland to rename Belwederska Street in Warsaw — the location of the Russian embassy building — as Stepan Bandera Street, in honor of the far-right nationalist who led the Ukrainian Insurgent Army during WWII] also contained screenshots of Facebook posts that appeared on two Facebook accounts belonging to Polish nationals Piotr Górka, an expert in the history of the Polish Air Force, and Dariusz Walusiak, a Polish historian and documentary maker. The Górka post suggested that he fully supported the Polish government’s decision to change Belwederska Street to Stepan Bandera Street.

“In a statement to the DFRLab, Górka said his account was accessed without his consent. “This is not my post loaded to my Facebook page,” he explained. “My site was hacked, some days ago.” At the time of publishing, Piotr Górka’s post and his Facebook account were no longer accessible.

“The post on Górka’s Facebook page was shared by Dariusz Walusiak’s Facebook account; the account also reposted it on the Facebook walls of more than twenty other Facebook users, including Adam Kalita, currently working at Krakow branch of the Institute of National Remembrance; Jan Kasprzyk, head of the Office for War Veterans and Victims of Oppression; and Alicja Kondraciuk, a Polish public figure living in Krakow.

“Walusiak’s Facebook account is also no longer accessible. Given his work on Polish history and identity, it seems highly unlikely he would support the Bandera measure; the DFRLab has also reached out to him for comment.

“The fact that Joker DPR’s Telegram post included screenshots of their Facebook posts raises the strong possibility that both Facebook accounts were compromised, and that hackers planted false statements on their pages that would seem out of character for them in order to gain further attention to the forged documents.”


In this example, threat actors used compromised accounts of Polish historians who have enough relevant knowledge to plausibly weigh in on the forged letter’s narrative (T0143.003: Impersonated Persona, T0097.101: Local Persona, T0097.108: Expert Persona, T0146: Account, T0150.005: Compromised, T0151.001: Social Media Platform).

This matches T0097.108: Expert Persona because the impersonation exploited Górka and Walusiak’s existing personas as experts in Polish history. | +| [I00071 Russia-aligned hacktivists stir up anti-Ukrainian sentiments in Poland](../../generated_pages/incidents/I00071.md) | “The August 17 [2022] Telegram post [which contained a falsified letter from the Ukrainian Minister of Foreign Affairs asking Poland to rename Belwederska Street in Warsaw — the location of the Russian embassy building — as Stepan Bandera Street, in honor of the far-right nationalist who led the Ukrainian Insurgent Army during WWII] also contained screenshots of Facebook posts that appeared on two Facebook accounts belonging to Polish nationals Piotr Górka, an expert in the history of the Polish Air Force, and Dariusz Walusiak, a Polish historian and documentary maker. The Górka post suggested that he fully supported the Polish government’s decision to change Belwederska Street to Stepan Bandera Street.

“In a statement to the DFRLab, Górka said his account was accessed without his consent. “This is not my post loaded to my Facebook page,” he explained. “My site was hacked, some days ago.” At the time of publishing, Piotr Górka’s post and his Facebook account were no longer accessible.

“The post on Górka’s Facebook page was shared by Dariusz Walusiak’s Facebook account; the account also reposted it on the Facebook walls of more than twenty other Facebook users, including Adam Kalita, currently working at Krakow branch of the Institute of National Remembrance; Jan Kasprzyk, head of the Office for War Veterans and Victims of Oppression; and Alicja Kondraciuk, a Polish public figure living in Krakow.

“Walusiak’s Facebook account is also no longer accessible. Given his work on Polish history and identity, it seems highly unlikely he would support the Bandera measure; the DFRLab has also reached out to him for comment.

“The fact that Joker DPR’s Telegram post included screenshots of their Facebook posts raises the strong possibility that both Facebook accounts were compromised, and that hackers planted false statements on their pages that would seem out of character for them in order to gain further attention to the forged documents.”


In this example, threat actors used compromised accounts of Polish historians who have enough relevant knowledge to plausibly weigh in on the forged letter’s narrative (T0143.003: Impersonated Persona, T0097.101: Local Persona, T0097.108: Expert Persona, T0146: Account Asset, T0150.005: Compromised Asset, T0151.001: Social Media Platform).

This matches T0097.108: Expert Persona because the impersonation exploited Górka and Walusiak’s existing personas as experts in Polish history. | | [I00075 How Russia Meddles Abroad for Profit: Cash, Trolls and a Cult Leader](../../generated_pages/incidents/I00075.md) | “In the campaign’s final weeks, Pastor Mailhol said, the team of Russians made a request: Drop out of the race and support Mr. Rajoelina. He refused.

“The Russians made the same proposal to the history professor running for president, saying, “If you accept this deal you will have money” according to Ms. Rasamimanana, the professor’s campaign manager.

When the professor refused, she said, the Russians created a fake Facebook page that mimicked his official page and posted an announcement on it that he was supporting Mr. Rajoelina.”


In this example actors created online accounts styled to look like official pages to trick targets into thinking that the presidential candidate announced that they had dropped out of the election (T0097.110: Party Official Persona, T0143.003: Impersonated Persona) | | [I00076 Network of Social Media Accounts Impersonates U.S. Political Candidates, Leverages U.S. and Israeli Media in Support of Iranian Interests](../../generated_pages/incidents/I00076.md) | “Some Twitter accounts in the network [of inauthentic accounts attributed to Iran] impersonated Republican political candidates that ran for House of Representatives seats in the 2018 U.S. congressional midterms. These accounts appropriated the candidates’ photographs and, in some cases, plagiarized tweets from the real individuals’ accounts. Aside from impersonating real U.S. political candidates, the behavior and activity of these accounts resembled that of the others in the network.

“For example, the account @livengood_marla impersonated Marla Livengood, a 2018 candidate for California’s 9th Congressional District, using a photograph of Livengood and a campaign banner for its profile and background pictures. The account began tweeting on Sept. 24, 2018, with its first tweet plagiarizing one from Livengood’s official account earlier that month”

[...]

“In another example, the account @ButlerJineea impersonated Jineea Butler, a 2018 candidate for New York’s 13th Congressional District, using a photograph of Butler for its profile picture and incorporating her campaign slogans into its background picture, as well as claiming in its Twitter bio to be a “US House candidate, NY-13” and linking to Butler’s website, jineeabutlerforcongress[.]com.”


In this example actors impersonated existing political candidates (T0097.110: Member of Political Party Persona, T0143.003: Impersonated Persona), strengthening the impersonation by copying legitimate accounts’ imagery (T0145.001: Copy Account Imagery), and copying its previous posts (T0084.002: Plagiarise Content). | | [I00082 Meta’s November 2021 Adversarial Threat Report ](../../generated_pages/incidents/I00082.md) | “[Meta] removed a network of accounts in Vietnam for violating our Inauthentic Behavior policy against mass reporting. They coordinated the targeting of activists and other people who publicly criticized the Vietnamese government and used false reports of various violations in an attempt to have these users removed from our platform. The people behind this activity relied primarily on authentic and duplicate accounts to submit hundreds — in some cases, thousands — of complaints against their targets through our abuse reporting flows.

“Many operators also maintained fake accounts — some of which were detected and disabled by our automated systems — to pose as their targets so they could then report the legitimate accounts as fake. They would frequently change the gender and name of their fake accounts to resemble the target individual. Among the most common claims in this misleading reporting activity were complaints of impersonation, and to a much lesser extent inauthenticity. The network also advertised abusive services in their bios and constantly evolved their tactics in an attempt to evade detection.“


In this example actors repurposed their accounts to impersonate targeted activists (T0097.103: Activist Persona, T0143.003: Impersonated Persona) in order to falsely report the activists’ legitimate accounts as impersonations (T0124.001: Report Non-Violative Opposing Content). | | [I00087 Challenging Truth and Trust: A Global Inventory of Organized Social Media Manipulation](../../generated_pages/incidents/I00087.md) | “Another actor operating in China is the American-based company Devumi. Most of the Twitter accounts managed by Devumi resemble real people, and some are even associated with a kind of large-scale social identity theft. At least 55,000 of the accounts use the names, profile pictures, hometowns and other personal details of real Twitter users, including minors, according to The New York Times (Confessore et al., 2018)).”

In this example accounts impersonated real locals while spreading operation narratives (T0143.003: Impersonated Persona, T0097.101: Local Persona). The impersonation included stealing the legitimate accounts’ profile pictures (T0145.001: Copy Account Imagery). | | [I00094 A glimpse inside a Chinese influence campaign: How bogus news websites blur the line between true and false](../../generated_pages/incidents/I00094.md) | Researchers identified websites managed by a Chinese marketing firm which presented themselves as news organisations.

“On its official website, the Chinese marketing firm boasted that they were in contact with news organizations across the globe, including one in South Korea called the “Chungcheng Times.” According to the joint team, this outlet is a fictional news organization created by the offending company. The Chinese company sought to disguise the site’s true identity and purpose by altering the name attached to it by one character—making it very closely resemble the name of a legitimate outlet operating out of Chungchengbuk-do.

“The marketing firm also established a news organization under the Korean name “Gyeonggido Daily,” which closely resembles legitimate news outlets operating out of Gyeonggi province such as “Gyeonggi Daily,” “Daily Gyeonggi Newspaper,” and “Gyeonggi N Daily.” One of the fake news sites was named “Incheon Focus,” a title that could be easily mistaken for the legitimate local news outlet, “Focus Incheon.” Furthermore, the Chinese marketing company operated two fake news sites with names identical to two separate local news organizations, one of which ceased operations in December 2022.

“In total, fifteen out of eighteen Chinese fake news sites incorporated the correct names of real regions in their fake company names. “If the operators had created fake news sites similar to major news organizations based in Seoul, however, the intended deception would have easily been uncovered,” explained Song Tae-eun, an assistant professor in the Department of National Security & Unification Studies at the Korea National Diplomatic Academy, to The Readable. “There is also the possibility that they are using the regional areas as an attempt to form ties with the local community; that being the government, the private sector, and religious communities.””


The firm styled their news site to resemble existing local news outlets in their target region (T0097.201: Local Institution Persona, T0097.202: News Outlet Persona, T0143.003: Impersonated Persona). | | [I00107 The Lies Russia Tells Itself](../../generated_pages/incidents/I00107.md) | The Moscow firm Social Design Agency (SDA) has been attributed as being behind a Russian disinformation project known as Doppelganger:

The SDA’s deception work first surfaced in 2022, likely almost immediately after Doppelganger got off the ground. In April of that year, Meta, the parent company of Facebook and Instagram, disclosed in a quarterly report that it had removed from its platforms “a network of about 200 accounts operated from Russia.” By August 2022, German investigative journalists revealed that they had discovered forgeries of about 30 news sites, including many of the country’s biggest media outlets—Frankfurter Allgemeine, Der Spiegel, and Bild—but also Britain’s Daily Mail and France’s 20 Minutes. The sites had deceptive URLs such as www-dailymail-co-uk.dailymail.top.


As part of the SDA’s work, they created many websites which impersonated existing media outlets. Sites used domain impersonation tactics to increase perceived legitimacy of their impersonations (T0097.202: News Outlet Persona, T0143.003: Impersonated Persona, T0152.003: Website Hosting Platform, T0149.003: Lookalike Domain). | -| [I00116 Blue-tick scammers target consumers who complain on X](../../generated_pages/incidents/I00116.md) | Consumers who complain of poor customer service on X are being targeted by scammers after the social media platform formerly known as Twitter changed its account verification process.

Bank customers and airline passengers are among those at risk of phishing scams when they complain to companies via X. Fraudsters, masquerading as customer service agents, respond under fake X handles and trick victims into disclosing their bank details to get a promised refund.

They typically win the trust of victims by displaying the blue checkmark icon, which until this year denoted accounts that had been officially verified by X.

Changes introduced this year allow the icon to be bought by anyone who pays an £11 monthly fee for the site’s subscription service, renamed this month from Twitter Blue to X Premium. Businesses that pay £950 a month receive a gold tick. X’s terms and conditions do not state whether subscriber accounts are pre-vetted.

Andrew Thomas was contacted by a scam account after posting a complaint to the travel platform Booking.com. “I’d been trying since April to get a refund after our holiday flights were cancelled and finally resorted to X,” he said.

“I received a response asking me to follow them, and DM [direct message] them with a contact number. They then called me via WhatsApp asking for my reference number so they could investigate. Later they called back to say that I would be refunded via their payment partner for which I’d need to download an app.”

Thomas became suspicious and checked the X profile. “It looked like the real thing, but I noticed that there was an unexpected hyphen in the Twitter handle and that it had only joined X in July 2023,” he said.


In this example a newly created paid account was created on X, used to direct users to other platforms (T0146.002: Paid Account, T0146.003: Verified Account, T0146.005: Lookalike Account ID, T0097.205: Business Persona, T0122: Direct Users to Alternative Platforms, T0143.003: Impersonated Persona, T0151.008: Microblogging Platform, T0150.001: Newly Created). | -| [I00126 Charming Kitten Updates POWERSTAR with an InterPlanetary Twist](../../generated_pages/incidents/I00126.md) | The target of the recently observed [highly targeted spearphishing attack by “Charming Kitten”, a hacker group attributed to Iran] had published an article related to Iran. The publicity appears to have garnered the attention of Charming Kitten, who subsequently created an email address to impersonate a reporter of an Israeli media organization in order to send the target an email. Prior to sending malware to the target, the attacker simply asked if the target would be open to reviewing a document they had written related to US foreign policy. The target agreed to do so, since this was not an unusual request; they are frequently asked by journalists to review opinion pieces relating to their field of work.

In an effort to further gain the target’s confidence, Charming Kitten continued the interaction with another benign email containing a list of questions, to which the target then responded with answers. After multiple days of benign and seemingly legitimate interaction, Charming Kitten finally sent a “draft report”; this was the first time anything opaquely malicious occurred. The “draft report” was, in fact, a password-protected RAR file containing a malicious LNK file. The password for the RAR file was provided in a subsequent email.


In this example, threat actors created an email address on a domain which impersonated an existing Israeli news organisation impersonating a reporter who worked there (T0097.102: Journalist Persona, T0097.202: News Outlet Persona, T0143.003: Impersonated Persona, T0149.003: Lookalike Domain, T0149.002: Email Domain) in order to convince the target to download a document containing malware (T0085.004: Develop Document, T0147.003: Malware). | +| [I00116 Blue-tick scammers target consumers who complain on X](../../generated_pages/incidents/I00116.md) | Consumers who complain of poor customer service on X are being targeted by scammers after the social media platform formerly known as Twitter changed its account verification process.

Bank customers and airline passengers are among those at risk of phishing scams when they complain to companies via X. Fraudsters, masquerading as customer service agents, respond under fake X handles and trick victims into disclosing their bank details to get a promised refund.

They typically win the trust of victims by displaying the blue checkmark icon, which until this year denoted accounts that had been officially verified by X.

Changes introduced this year allow the icon to be bought by anyone who pays an £11 monthly fee for the site’s subscription service, renamed this month from Twitter Blue to X Premium. Businesses that pay £950 a month receive a gold tick. X’s terms and conditions do not state whether subscriber accounts are pre-vetted.

Andrew Thomas was contacted by a scam account after posting a complaint to the travel platform Booking.com. “I’d been trying since April to get a refund after our holiday flights were cancelled and finally resorted to X,” he said.

“I received a response asking me to follow them, and DM [direct message] them with a contact number. They then called me via WhatsApp asking for my reference number so they could investigate. Later they called back to say that I would be refunded via their payment partner for which I’d need to download an app.”

Thomas became suspicious and checked the X profile. “It looked like the real thing, but I noticed that there was an unexpected hyphen in the Twitter handle and that it had only joined X in July 2023,” he said.


In this example a newly created paid account was created on X, used to direct users to other platforms (T0146.002: Paid Account Asset, T0146.003: Verified Account Asset, T0146.005: Lookalike Account ID, T0097.205: Business Persona, T0122: Direct Users to Alternative Platforms, T0143.003: Impersonated Persona, T0151.008: Microblogging Platform, T0150.001: Newly Created Asset). | +| [I00126 Charming Kitten Updates POWERSTAR with an InterPlanetary Twist](../../generated_pages/incidents/I00126.md) | The target of the recently observed [highly targeted spearphishing attack by “Charming Kitten”, a hacker group attributed to Iran] had published an article related to Iran. The publicity appears to have garnered the attention of Charming Kitten, who subsequently created an email address to impersonate a reporter of an Israeli media organization in order to send the target an email. Prior to sending malware to the target, the attacker simply asked if the target would be open to reviewing a document they had written related to US foreign policy. The target agreed to do so, since this was not an unusual request; they are frequently asked by journalists to review opinion pieces relating to their field of work.

In an effort to further gain the target’s confidence, Charming Kitten continued the interaction with another benign email containing a list of questions, to which the target then responded with answers. After multiple days of benign and seemingly legitimate interaction, Charming Kitten finally sent a “draft report”; this was the first time anything opaquely malicious occurred. The “draft report” was, in fact, a password-protected RAR file containing a malicious LNK file. The password for the RAR file was provided in a subsequent email.


In this example, threat actors created an email address on a domain which impersonated an existing Israeli news organisation impersonating a reporter who worked there (T0097.102: Journalist Persona, T0097.202: News Outlet Persona, T0143.003: Impersonated Persona, T0149.003: Lookalike Domain, T0149.002: Email Domain Asset) in order to convince the target to download a document containing malware (T0085.004: Develop Document, T0147.003: Malware Asset). | | [I00127 Iranian APTs Dress Up as Hacktivists for Disruption, Influence Ops](../../generated_pages/incidents/I00127.md) | Iranian state-backed advanced persistent threat (APT) groups have been masquerading as hacktivists, claiming attacks against Israeli critical infrastructure and air defense systems.

[...]

What's clearer are the benefits of the model itself: creating a layer of plausible deniability for the state, and the impression among the public that their attacks are grassroots-inspired. While this deniability has always been a key driver with state-sponsored cyberattacks, researchers characterized this instance as noteworthy for the effort behind the charade.

"We've seen a lot of hacktivist activity that seems to be nation-states trying to have that 'deniable' capability," Adam Meyers, CrowdStrike senior vice president for counter adversary operations said in a press conference this week. "And so these groups continue to maintain activity, moving from what was traditionally website defacements and DDoS attacks, into a lot of hack and leak operations."

To sell the persona, faketivists like to adopt the aesthetic, rhetoric, tactics, techniques, and procedures (TTPs), and sometimes the actual names and iconography associated with legitimate hacktivist outfits. Keen eyes will spot that they typically arise just after major geopolitical events, without an established history of activity, in alignment with the interests of their government sponsors.

Oftentimes, it's difficult to separate the faketivists from the hacktivists, as each might promote and support the activities of the other.


In this example analysts from CrowdStrike assert that hacker groups took on the persona of hacktivists to disguise the state-backed nature of their cyber attack campaign (T0097.104: Hacktivist Persona). At times state-backed hacktivists will impersonate existing hacktivist organisations (T0097.104: Hacktivist Persona, T0143.003: Impersonated Persona). | -| [I00129 Teen who hacked Joe Biden and Bill Gates' Twitter accounts sentenced to three years in prison](../../generated_pages/incidents/I00129.md) | An 18-year-old hacker who pulled off a huge breach in 2020, infiltrating several high profile Twitter accounts to solicit bitcoin transactions, has agreed to serve three years in prison for his actions.

Graham Ivan Clark, of Florida, was 17 years old at the time of the hack in July, during which he took over a number of major accounts including those of Joe Biden, Bill Gates and Kim Kardashian West.

Once he accessed them, Clark tweeted a link to a bitcoin address and wrote “all bitcoin sent to our address below will be sent back to you doubled!” According to court documents, Clark made more than $100,000 from the scheme, which his lawyers say he has since returned.

Clark was able to access the accounts after convincing an employee at Twitter he worked in the company’s information technology department, according to the Tampa Bay Times.


In this example a threat actor gained access to Twitter’s customer service portal through social engineering (T0146.004: Administrator Account, T0150.005: Compromised, T0151.008: Microblogging Platform), which they used to take over accounts of public figures (T0146.003: Verified Account, T0143.003: Impersonated Persona, T0150.005: Compromised, T0151.008: Microblogging Platform).

The threat actor used these compromised accounts to trick their followers into sending bitcoin to their wallet (T0148.009: Cryptocurrency Wallet). | +| [I00129 Teen who hacked Joe Biden and Bill Gates' Twitter accounts sentenced to three years in prison](../../generated_pages/incidents/I00129.md) | An 18-year-old hacker who pulled off a huge breach in 2020, infiltrating several high profile Twitter accounts to solicit bitcoin transactions, has agreed to serve three years in prison for his actions.

Graham Ivan Clark, of Florida, was 17 years old at the time of the hack in July, during which he took over a number of major accounts including those of Joe Biden, Bill Gates and Kim Kardashian West.

Once he accessed them, Clark tweeted a link to a bitcoin address and wrote “all bitcoin sent to our address below will be sent back to you doubled!” According to court documents, Clark made more than $100,000 from the scheme, which his lawyers say he has since returned.

Clark was able to access the accounts after convincing an employee at Twitter he worked in the company’s information technology department, according to the Tampa Bay Times.


In this example a threat actor gained access to Twitter’s customer service portal through social engineering (T0146.004: Administrator Account Asset, T0150.005: Compromised Asset, T0151.008: Microblogging Platform), which they used to take over accounts of public figures (T0146.003: Verified Account Asset, T0143.003: Impersonated Persona, T0150.005: Compromised Asset, T0151.008: Microblogging Platform).

The threat actor used these compromised accounts to trick their followers into sending bitcoin to their wallet (T0148.009: Cryptocurrency Wallet). | diff --git a/generated_pages/techniques/T0146.001.md b/generated_pages/techniques/T0146.001.md index 9ac7799..371023c 100644 --- a/generated_pages/techniques/T0146.001.md +++ b/generated_pages/techniques/T0146.001.md @@ -1,4 +1,4 @@ -# Technique T0146.001: Free Account +# Technique T0146.001: Free Account Asset * **Summary**: Many online platforms allow users to create free accounts on their platform. A Free Account is an Account which does not require payment at account creation and is not subscribed to paid platform features. @@ -7,7 +7,7 @@ | Incident | Descriptions given for this incident | | -------- | -------------------- | -| [I00121 Operation Overload: how pro-Russian actors flood newsrooms with fake content and seek to divert their efforts](../../generated_pages/incidents/I00121.md) | The unique aspect of Operation Overload is a barrage of emails sent to newsrooms and fact-checkers across Europe. The authors of these messages urge recipients to verify content allegedly found online. The email subject lines often include an incitement to verify the claims briefly described in the message body. This is followed by a short list of links directing recipients to posts on Telegram, X, or known pro-Russian websites, including Pravda and Sputnik.

We have collected 221 emails sent to 20 organisations. The organisations mostly received identical emails urging them to fact-check specific false stories, which demonstrates that the emails were sent as part of a larger coordinated campaign.

[...]

The authors of the emails do not hide their intention to see the fake content widely spread. In February 2024, a journalist at the German outlet CORRECTIV engaged with the sender of one of the emails, providing feedback on the narratives which were originally sent. CORRECTIV received a response from the same Gmail address, initially expressing respect and trust in CORRECTIV’s assessment, while asking: “is it possible for your work to be seen by as many people as possible?”, thereby clearly stating the goal of the operation.

[...]

All the emails come from authors posing as concerned citizens. All emails are sent with Gmail accounts, which is typical for personal use. This makes it challenging to identify the individuals behind these emails, as anyone can open a Gmail account for free. The email headers indicate that the messages were sent from the Gmail interface, not from a personal client which would disclose the sender’s IP address.


In this example, threat actors used gmail accounts (T0146.001: Free Account, T0097.100: Individual Persona, T0143.002: Fabricated Persona, T0153.001: Email Platform) to target journalists and fact-checkers, with the apparent goal of having them amplify operation narratives through fact checks. | +| [I00121 Operation Overload: how pro-Russian actors flood newsrooms with fake content and seek to divert their efforts](../../generated_pages/incidents/I00121.md) | The unique aspect of Operation Overload is a barrage of emails sent to newsrooms and fact-checkers across Europe. The authors of these messages urge recipients to verify content allegedly found online. The email subject lines often include an incitement to verify the claims briefly described in the message body. This is followed by a short list of links directing recipients to posts on Telegram, X, or known pro-Russian websites, including Pravda and Sputnik.

We have collected 221 emails sent to 20 organisations. The organisations mostly received identical emails urging them to fact-check specific false stories, which demonstrates that the emails were sent as part of a larger coordinated campaign.

[...]

The authors of the emails do not hide their intention to see the fake content widely spread. In February 2024, a journalist at the German outlet CORRECTIV engaged with the sender of one of the emails, providing feedback on the narratives which were originally sent. CORRECTIV received a response from the same Gmail address, initially expressing respect and trust in CORRECTIV’s assessment, while asking: “is it possible for your work to be seen by as many people as possible?”, thereby clearly stating the goal of the operation.

[...]

All the emails come from authors posing as concerned citizens. All emails are sent with Gmail accounts, which is typical for personal use. This makes it challenging to identify the individuals behind these emails, as anyone can open a Gmail account for free. The email headers indicate that the messages were sent from the Gmail interface, not from a personal client which would disclose the sender’s IP address.


In this example, threat actors used gmail accounts (T0146.001: Free Account Asset, T0097.100: Individual Persona, T0143.002: Fabricated Persona, T0153.001: Email Platform) to target journalists and fact-checkers, with the apparent goal of having them amplify operation narratives through fact checks. | diff --git a/generated_pages/techniques/T0146.002.md b/generated_pages/techniques/T0146.002.md index 76b756b..20e6dcb 100644 --- a/generated_pages/techniques/T0146.002.md +++ b/generated_pages/techniques/T0146.002.md @@ -1,4 +1,4 @@ -# Technique T0146.002: Paid Account +# Technique T0146.002: Paid Account Asset * **Summary**: Some online platforms afford accounts extra features, or other benefits, if the user pays a fee. For example, as of September 2024, content posted by a Paid Account on X (previously Twitter) is prioritised in the platform’s algorithm. @@ -7,7 +7,7 @@ | Incident | Descriptions given for this incident | | -------- | -------------------- | -| [I00116 Blue-tick scammers target consumers who complain on X](../../generated_pages/incidents/I00116.md) | Consumers who complain of poor customer service on X are being targeted by scammers after the social media platform formerly known as Twitter changed its account verification process.

Bank customers and airline passengers are among those at risk of phishing scams when they complain to companies via X. Fraudsters, masquerading as customer service agents, respond under fake X handles and trick victims into disclosing their bank details to get a promised refund.

They typically win the trust of victims by displaying the blue checkmark icon, which until this year denoted accounts that had been officially verified by X.

Changes introduced this year allow the icon to be bought by anyone who pays an £11 monthly fee for the site’s subscription service, renamed this month from Twitter Blue to X Premium. Businesses that pay £950 a month receive a gold tick. X’s terms and conditions do not state whether subscriber accounts are pre-vetted.

Andrew Thomas was contacted by a scam account after posting a complaint to the travel platform Booking.com. “I’d been trying since April to get a refund after our holiday flights were cancelled and finally resorted to X,” he said.

“I received a response asking me to follow them, and DM [direct message] them with a contact number. They then called me via WhatsApp asking for my reference number so they could investigate. Later they called back to say that I would be refunded via their payment partner for which I’d need to download an app.”

Thomas became suspicious and checked the X profile. “It looked like the real thing, but I noticed that there was an unexpected hyphen in the Twitter handle and that it had only joined X in July 2023,” he said.


In this example a newly created paid account was created on X, used to direct users to other platforms (T0146.002: Paid Account, T0146.003: Verified Account, T0146.005: Lookalike Account ID, T0097.205: Business Persona, T0122: Direct Users to Alternative Platforms, T0143.003: Impersonated Persona, T0151.008: Microblogging Platform, T0150.001: Newly Created). | +| [I00116 Blue-tick scammers target consumers who complain on X](../../generated_pages/incidents/I00116.md) | Consumers who complain of poor customer service on X are being targeted by scammers after the social media platform formerly known as Twitter changed its account verification process.

Bank customers and airline passengers are among those at risk of phishing scams when they complain to companies via X. Fraudsters, masquerading as customer service agents, respond under fake X handles and trick victims into disclosing their bank details to get a promised refund.

They typically win the trust of victims by displaying the blue checkmark icon, which until this year denoted accounts that had been officially verified by X.

Changes introduced this year allow the icon to be bought by anyone who pays an £11 monthly fee for the site’s subscription service, renamed this month from Twitter Blue to X Premium. Businesses that pay £950 a month receive a gold tick. X’s terms and conditions do not state whether subscriber accounts are pre-vetted.

Andrew Thomas was contacted by a scam account after posting a complaint to the travel platform Booking.com. “I’d been trying since April to get a refund after our holiday flights were cancelled and finally resorted to X,” he said.

“I received a response asking me to follow them, and DM [direct message] them with a contact number. They then called me via WhatsApp asking for my reference number so they could investigate. Later they called back to say that I would be refunded via their payment partner for which I’d need to download an app.”

Thomas became suspicious and checked the X profile. “It looked like the real thing, but I noticed that there was an unexpected hyphen in the Twitter handle and that it had only joined X in July 2023,” he said.


In this example a newly created paid account was created on X, used to direct users to other platforms (T0146.002: Paid Account Asset, T0146.003: Verified Account Asset, T0146.005: Lookalike Account ID, T0097.205: Business Persona, T0122: Direct Users to Alternative Platforms, T0143.003: Impersonated Persona, T0151.008: Microblogging Platform, T0150.001: Newly Created Asset). | diff --git a/generated_pages/techniques/T0146.003.md b/generated_pages/techniques/T0146.003.md index c417290..d7927e7 100644 --- a/generated_pages/techniques/T0146.003.md +++ b/generated_pages/techniques/T0146.003.md @@ -1,4 +1,4 @@ -# Technique T0146.003: Verified Account +# Technique T0146.003: Verified Account Asset * **Summary**: Some online platforms apply badges of verification to accounts which meet certain criteria.

On some platforms (such as dating apps) a verification badge signifies that the account has passed the platform’s identity verification checks. On some platforms (such as X (previously Twitter)) a verification badge signifies that an account has paid for the platform’s service. @@ -7,9 +7,9 @@ | Incident | Descriptions given for this incident | | -------- | -------------------- | -| [I00113 Inside the Shadowy World of Disinformation for Hire in Kenya](../../generated_pages/incidents/I00113.md) | Researchers at Mozilla examined influence operations targeting Kenyan citizens on Twitter in 2021, providing “a grim window into the booming and shadowy industry of Twitter influencers for political hire here in Kenya”. The report touches upon how actors gained access to twitter accounts, and what personas they presented:

Verified accounts are complicit. One influencer we spoke to mentioned that the people who own coveted “blue check” accounts will often rent them out for disinformation campaigns. These verified accounts can improve the campaign’s chances of trending. Says one interviewee: “The owner of the account usually receives a cut of the campaign loot”.

[...]

Many of the accounts we examined appear to give an aura of authenticity, but in reality they are not authentic. Simply looking at their date of creation won’t give you a hint as to their purpose. We had to dig deeper. The profile pictures and content of some of the accounts gave us the answers we were looking for. A common tactic these accounts utilize is using suggestive pictures of women to bait men into following them, or at least pay attention. In terms of content, many of these accounts tweeted off the same hashtags for days on end and will constantly retweet a specific set of accounts.


Actors participating in this operation rented out verified Twitter accounts (in 2021 a checkmark on Twitter verified a user’s identity), which were repurposed and used updated account imagery (T0146.003: Verified Account, T0150.007: Rented, T0150.004: Repurposed, T00145.006: Attractive Person Account Imagery). | -| [I00116 Blue-tick scammers target consumers who complain on X](../../generated_pages/incidents/I00116.md) | Consumers who complain of poor customer service on X are being targeted by scammers after the social media platform formerly known as Twitter changed its account verification process.

Bank customers and airline passengers are among those at risk of phishing scams when they complain to companies via X. Fraudsters, masquerading as customer service agents, respond under fake X handles and trick victims into disclosing their bank details to get a promised refund.

They typically win the trust of victims by displaying the blue checkmark icon, which until this year denoted accounts that had been officially verified by X.

Changes introduced this year allow the icon to be bought by anyone who pays an £11 monthly fee for the site’s subscription service, renamed this month from Twitter Blue to X Premium. Businesses that pay £950 a month receive a gold tick. X’s terms and conditions do not state whether subscriber accounts are pre-vetted.

Andrew Thomas was contacted by a scam account after posting a complaint to the travel platform Booking.com. “I’d been trying since April to get a refund after our holiday flights were cancelled and finally resorted to X,” he said.

“I received a response asking me to follow them, and DM [direct message] them with a contact number. They then called me via WhatsApp asking for my reference number so they could investigate. Later they called back to say that I would be refunded via their payment partner for which I’d need to download an app.”

Thomas became suspicious and checked the X profile. “It looked like the real thing, but I noticed that there was an unexpected hyphen in the Twitter handle and that it had only joined X in July 2023,” he said.


In this example a newly created paid account was created on X, used to direct users to other platforms (T0146.002: Paid Account, T0146.003: Verified Account, T0146.005: Lookalike Account ID, T0097.205: Business Persona, T0122: Direct Users to Alternative Platforms, T0143.003: Impersonated Persona, T0151.008: Microblogging Platform, T0150.001: Newly Created). | -| [I00120 factcheckUK or fakecheckUK? Reinventing the political faction as the impartial factchecker](../../generated_pages/incidents/I00120.md) | Ahead of the 2019 UK Election during a leader’s debate, the Conservative party rebranded their “Conservative Campaign Headquarters Press” account to “FactCheckUK”:


That is, until a few minutes into the debate.

All at once, like a person throwing off their street clothes to reveal some sinister new identity underneath, @CCHQPress abruptly shed its name, blue Conservative logo, Boris Johnson banner, and bio description. Moments later, it had entirely reinvented itself.

The purple banner was emblazoned with white font that read “✓ factcheckUK [with a “FROM CCQH” subheading]”.

The matching profile picture was a white tick in a purple circle. The bio was updated to: “Fact checking Labour from CCHQ”. And the name now read factcheckUK, with the customary Twitter blue (or white depending on your phone settings!) validation tick still after it

In this example an existing verified social media account on Twitter was repurposed to inauthentically present itself as a Fact Checking service (T0151.008: Microblogging Platform, T0150.003: Pre-Existing, T0146.003: Verified Account, T0097.203: Fact Checking Organisation Persona, T0143.002: Fabricated Persona). | +| [I00113 Inside the Shadowy World of Disinformation for Hire in Kenya](../../generated_pages/incidents/I00113.md) | Researchers at Mozilla examined influence operations targeting Kenyan citizens on Twitter in 2021, providing “a grim window into the booming and shadowy industry of Twitter influencers for political hire here in Kenya”. The report touches upon how actors gained access to twitter accounts, and what personas they presented:

Verified accounts are complicit. One influencer we spoke to mentioned that the people who own coveted “blue check” accounts will often rent them out for disinformation campaigns. These verified accounts can improve the campaign’s chances of trending. Says one interviewee: “The owner of the account usually receives a cut of the campaign loot”.

[...]

Many of the accounts we examined appear to give an aura of authenticity, but in reality they are not authentic. Simply looking at their date of creation won’t give you a hint as to their purpose. We had to dig deeper. The profile pictures and content of some of the accounts gave us the answers we were looking for. A common tactic these accounts utilize is using suggestive pictures of women to bait men into following them, or at least pay attention. In terms of content, many of these accounts tweeted off the same hashtags for days on end and will constantly retweet a specific set of accounts.


Actors participating in this operation rented out verified Twitter accounts (in 2021 a checkmark on Twitter verified a user’s identity), which were repurposed and used updated account imagery (T0146.003: Verified Account Asset, T0150.007: Rented Asset, T0150.004: Repurposed Asset, T00145.006: Attractive Person Account Imagery). | +| [I00116 Blue-tick scammers target consumers who complain on X](../../generated_pages/incidents/I00116.md) | Consumers who complain of poor customer service on X are being targeted by scammers after the social media platform formerly known as Twitter changed its account verification process.

Bank customers and airline passengers are among those at risk of phishing scams when they complain to companies via X. Fraudsters, masquerading as customer service agents, respond under fake X handles and trick victims into disclosing their bank details to get a promised refund.

They typically win the trust of victims by displaying the blue checkmark icon, which until this year denoted accounts that had been officially verified by X.

Changes introduced this year allow the icon to be bought by anyone who pays an £11 monthly fee for the site’s subscription service, renamed this month from Twitter Blue to X Premium. Businesses that pay £950 a month receive a gold tick. X’s terms and conditions do not state whether subscriber accounts are pre-vetted.

Andrew Thomas was contacted by a scam account after posting a complaint to the travel platform Booking.com. “I’d been trying since April to get a refund after our holiday flights were cancelled and finally resorted to X,” he said.

“I received a response asking me to follow them, and DM [direct message] them with a contact number. They then called me via WhatsApp asking for my reference number so they could investigate. Later they called back to say that I would be refunded via their payment partner for which I’d need to download an app.”

Thomas became suspicious and checked the X profile. “It looked like the real thing, but I noticed that there was an unexpected hyphen in the Twitter handle and that it had only joined X in July 2023,” he said.


In this example a newly created paid account was created on X, used to direct users to other platforms (T0146.002: Paid Account Asset, T0146.003: Verified Account Asset, T0146.005: Lookalike Account ID, T0097.205: Business Persona, T0122: Direct Users to Alternative Platforms, T0143.003: Impersonated Persona, T0151.008: Microblogging Platform, T0150.001: Newly Created Asset). | +| [I00120 factcheckUK or fakecheckUK? Reinventing the political faction as the impartial factchecker](../../generated_pages/incidents/I00120.md) | Ahead of the 2019 UK Election during a leader’s debate, the Conservative party rebranded their “Conservative Campaign Headquarters Press” account to “FactCheckUK”:

The evening of the 19th November 2019 saw the first of three Leaders’ Debates on ITV, starting at 8pm and lasting for an hour. Current Prime Minister and leader of the Conservatives, Boris Johnson faced off against Labour party leader, Jeremy Corbyn. Plenty of people will have been watching the debate live, but a good proportion were “watching” (er, “twitching”?) via Twitter. This is something I’ve done in the past for certain shows. In some cases I just can’t watch or listen, but I can read, and in other cases, the commentary is far more interesting and entertaining than the show itself will ever be. This, for me, is just such a case. But very quickly, all eyes turned upon a modestly sized account with the handle @CCHQPress. That’s short for Conservative Campaign Headquarters Press. According to their (current!) Twitter bio, they are based in Westminster and they provide “snippets of news and commentary from CCHQ” to their 75k followers.

That is, until a few minutes into the debate.

All at once, like a person throwing off their street clothes to reveal some sinister new identity underneath, @CCHQPress abruptly shed its name, blue Conservative logo, Boris Johnson banner, and bio description. Moments later, it had entirely reinvented itself.

The purple banner was emblazoned with white font that read “✓ factcheckUK [with a “FROM CCQH” subheading]”.

The matching profile picture was a white tick in a purple circle. The bio was updated to: “Fact checking Labour from CCHQ”. And the name now read factcheckUK, with the customary Twitter blue (or white depending on your phone settings!) validation tick still after it


In this example an existing verified social media account on Twitter was repurposed to inauthentically present itself as a Fact Checking service (T0151.008: Microblogging Platform, T0150.003: Pre-Existing Asset, T0146.003: Verified Account Asset, T0097.203: Fact Checking Organisation Persona, T0143.002: Fabricated Persona). | diff --git a/generated_pages/techniques/T0146.004.md b/generated_pages/techniques/T0146.004.md index 3f7b8ff..bf3628a 100644 --- a/generated_pages/techniques/T0146.004.md +++ b/generated_pages/techniques/T0146.004.md @@ -1,4 +1,4 @@ -# Technique T0146.004: Administrator Account +# Technique T0146.004: Administrator Account Asset * **Summary**: Some accounts will have special privileges / will be in control of the Digital Community Hosting Asset; for example, the Admin of a Facebook Page, a Moderator of a Subreddit, etc. etc. @@ -7,8 +7,8 @@ | Incident | Descriptions given for this incident | | -------- | -------------------- | -| [I00101 Pro-Putin Disinformation Warriors Take War of Aggression to Reddit](../../generated_pages/incidents/I00101.md) | This report looks at changes content posted to communities on Reddit (called Subreddits) after teams of voluntary moderators are replaced with what appear to be pro-Russian voices:

The r/antiwar subreddit appears to be a very recent takeover target. With 12,900 members it is not the largest community on Reddit, but this does place it squarely within the top 5% of all communities in terms of membership.

Three months ago a new moderator team was instated by subreddit head u/democracy101. Any posts documenting Russian aggression in Ukraine are now swiftly removed, while the board has been flooded with posts about how Ukraine is losing, or how American “neocons wrecked” the country.

The pinned post from moderator u/n0ahbody proclaims: “People who call for an end to Russian aggressions but not the Western aggressions Russia is reacting to don’t really want peace.” This user takes the view that any negative opinion about Russia is “shaped by what the fanatically Russophobic MSM wants you to think,” and that the United States is not threatened by its neighbors. Russia is.”

When u/n0ahbody took over the sub, the user posted a triumphant and vitriolic diatribe in another pro-Russia subreddit with some 33,500 members, r/EndlessWar. “We are making progress. We are purging the sub of all NAFO and NAFO-adjacent elements. Hundreds of them have been banned over the last 24 hours for various rule infractions, for being NAFO or NAFO-adjacent,” the user said, referencing the grassroots, pro-Ukrainian North Atlantic Fella Organization (NAFO) meme movement.

Several former users have reported they have indeed been banned from r/antiwar since the change in moderators. “If this subreddit cannot be explicitly against the invasion of Ukraine it will never truly be anti-war,” wrote one user Halcyon_Rein, in the antiwar subreddit on September 6. They then edited the post to say, “Edit: btw, I got f**king banned for this 💀💀💀”


A community hosted on Reddit was taken over by new moderators (T0151.011: Community Sub-Forum, T0150.005: Compromised). These moderators removed content posted to the community which favoured Ukraine over Russia (T0146.004: Administrator Account, T0151.011: Community Sub-Forum, T0124: Suppress Opposition). | -| [I00129 Teen who hacked Joe Biden and Bill Gates' Twitter accounts sentenced to three years in prison](../../generated_pages/incidents/I00129.md) | An 18-year-old hacker who pulled off a huge breach in 2020, infiltrating several high profile Twitter accounts to solicit bitcoin transactions, has agreed to serve three years in prison for his actions.

Graham Ivan Clark, of Florida, was 17 years old at the time of the hack in July, during which he took over a number of major accounts including those of Joe Biden, Bill Gates and Kim Kardashian West.

Once he accessed them, Clark tweeted a link to a bitcoin address and wrote “all bitcoin sent to our address below will be sent back to you doubled!” According to court documents, Clark made more than $100,000 from the scheme, which his lawyers say he has since returned.

Clark was able to access the accounts after convincing an employee at Twitter he worked in the company’s information technology department, according to the Tampa Bay Times.


In this example a threat actor gained access to Twitter’s customer service portal through social engineering (T0146.004: Administrator Account, T0150.005: Compromised, T0151.008: Microblogging Platform), which they used to take over accounts of public figures (T0146.003: Verified Account, T0143.003: Impersonated Persona, T0150.005: Compromised, T0151.008: Microblogging Platform).

The threat actor used these compromised accounts to trick their followers into sending bitcoin to their wallet (T0148.009: Cryptocurrency Wallet). | +| [I00101 Pro-Putin Disinformation Warriors Take War of Aggression to Reddit](../../generated_pages/incidents/I00101.md) | This report looks at changes content posted to communities on Reddit (called Subreddits) after teams of voluntary moderators are replaced with what appear to be pro-Russian voices:

The r/antiwar subreddit appears to be a very recent takeover target. With 12,900 members it is not the largest community on Reddit, but this does place it squarely within the top 5% of all communities in terms of membership.

Three months ago a new moderator team was instated by subreddit head u/democracy101. Any posts documenting Russian aggression in Ukraine are now swiftly removed, while the board has been flooded with posts about how Ukraine is losing, or how American “neocons wrecked” the country.

The pinned post from moderator u/n0ahbody proclaims: “People who call for an end to Russian aggressions but not the Western aggressions Russia is reacting to don’t really want peace.” This user takes the view that any negative opinion about Russia is “shaped by what the fanatically Russophobic MSM wants you to think,” and that the United States is not threatened by its neighbors. Russia is.”

When u/n0ahbody took over the sub, the user posted a triumphant and vitriolic diatribe in another pro-Russia subreddit with some 33,500 members, r/EndlessWar. “We are making progress. We are purging the sub of all NAFO and NAFO-adjacent elements. Hundreds of them have been banned over the last 24 hours for various rule infractions, for being NAFO or NAFO-adjacent,” the user said, referencing the grassroots, pro-Ukrainian North Atlantic Fella Organization (NAFO) meme movement.

Several former users have reported they have indeed been banned from r/antiwar since the change in moderators. “If this subreddit cannot be explicitly against the invasion of Ukraine it will never truly be anti-war,” wrote one user Halcyon_Rein, in the antiwar subreddit on September 6. They then edited the post to say, “Edit: btw, I got f**king banned for this 💀💀💀”


A community hosted on Reddit was taken over by new moderators (T0151.011: Community Sub-Forum, T0150.005: Compromised Asset). These moderators removed content posted to the community which favoured Ukraine over Russia (T0146.004: Administrator Account Asset, T0151.011: Community Sub-Forum, T0124: Suppress Opposition). | +| [I00129 Teen who hacked Joe Biden and Bill Gates' Twitter accounts sentenced to three years in prison](../../generated_pages/incidents/I00129.md) | An 18-year-old hacker who pulled off a huge breach in 2020, infiltrating several high profile Twitter accounts to solicit bitcoin transactions, has agreed to serve three years in prison for his actions.

Graham Ivan Clark, of Florida, was 17 years old at the time of the hack in July, during which he took over a number of major accounts including those of Joe Biden, Bill Gates and Kim Kardashian West.

Once he accessed them, Clark tweeted a link to a bitcoin address and wrote “all bitcoin sent to our address below will be sent back to you doubled!” According to court documents, Clark made more than $100,000 from the scheme, which his lawyers say he has since returned.

Clark was able to access the accounts after convincing an employee at Twitter he worked in the company’s information technology department, according to the Tampa Bay Times.


In this example a threat actor gained access to Twitter’s customer service portal through social engineering (T0146.004: Administrator Account Asset, T0150.005: Compromised Asset, T0151.008: Microblogging Platform), which they used to take over accounts of public figures (T0146.003: Verified Account Asset, T0143.003: Impersonated Persona, T0150.005: Compromised Asset, T0151.008: Microblogging Platform).

The threat actor used these compromised accounts to trick their followers into sending bitcoin to their wallet (T0148.009: Cryptocurrency Wallet). | diff --git a/generated_pages/techniques/T0146.005.md b/generated_pages/techniques/T0146.005.md index 1572d0c..f0e90e3 100644 --- a/generated_pages/techniques/T0146.005.md +++ b/generated_pages/techniques/T0146.005.md @@ -7,8 +7,7 @@ | Incident | Descriptions given for this incident | | -------- | -------------------- | -| [I00116 Blue-tick scammers target consumers who complain on X](../../generated_pages/incidents/I00116.md) | Consumers who complain of poor customer service on X are being targeted by scammers after the social media platform formerly known as Twitter changed its account verification process.

Bank customers and airline passengers are among those at risk of phishing scams when they complain to companies via X. Fraudsters, masquerading as customer service agents, respond under fake X handles and trick victims into disclosing their bank details to get a promised refund.

They typically win the trust of victims by displaying the blue checkmark icon, which until this year denoted accounts that had been officially verified by X.

Changes introduced this year allow the icon to be bought by anyone who pays an £11 monthly fee for the site’s subscription service, renamed this month from Twitter Blue to X Premium. Businesses that pay £950 a month receive a gold tick. X’s terms and conditions do not state whether subscriber accounts are pre-vetted.

Andrew Thomas was contacted by a scam account after posting a complaint to the travel platform Booking.com. “I’d been trying since April to get a refund after our holiday flights were cancelled and finally resorted to X,” he said.

“I received a response asking me to follow them, and DM [direct message] them with a contact number. They then called me via WhatsApp asking for my reference number so they could investigate. Later they called back to say that I would be refunded via their payment partner for which I’d need to download an app.”

Thomas became suspicious and checked the X profile. “It looked like the real thing, but I noticed that there was an unexpected hyphen in the Twitter handle and that it had only joined X in July 2023,” he said.


In this example a newly created paid account was created on X, used to direct users to other platforms (T0146.002: Paid Account, T0146.003: Verified Account, T0146.005: Lookalike Account ID, T0097.205: Business Persona, T0122: Direct Users to Alternative Platforms, T0143.003: Impersonated Persona, T0151.008: Microblogging Platform, T0150.001: Newly Created). | -| [I00129 Teen who hacked Joe Biden and Bill Gates' Twitter accounts sentenced to three years in prison](../../generated_pages/incidents/I00129.md) | An 18-year-old hacker who pulled off a huge breach in 2020, infiltrating several high profile Twitter accounts to solicit bitcoin transactions, has agreed to serve three years in prison for his actions.

Graham Ivan Clark, of Florida, was 17 years old at the time of the hack in July, during which he took over a number of major accounts including those of Joe Biden, Bill Gates and Kim Kardashian West.

Once he accessed them, Clark tweeted a link to a bitcoin address and wrote “all bitcoin sent to our address below will be sent back to you doubled!” According to court documents, Clark made more than $100,000 from the scheme, which his lawyers say he has since returned.

Clark was able to access the accounts after convincing an employee at Twitter he worked in the company’s information technology department, according to the Tampa Bay Times.


In this example a threat actor gained access to Twitter’s customer service portal through social engineering (T0146.004: Administrator Account, T0150.005: Compromised, T0151.008: Microblogging Platform), which they used to take over accounts of public figures (T0146.003: Verified Account, T0143.003: Impersonated Persona, T0150.005: Compromised, T0151.008: Microblogging Platform).

The threat actor used these compromised accounts to trick their followers into sending bitcoin to their wallet (T0148.009: Cryptocurrency Wallet). | +| [I00116 Blue-tick scammers target consumers who complain on X](../../generated_pages/incidents/I00116.md) | Consumers who complain of poor customer service on X are being targeted by scammers after the social media platform formerly known as Twitter changed its account verification process.

Bank customers and airline passengers are among those at risk of phishing scams when they complain to companies via X. Fraudsters, masquerading as customer service agents, respond under fake X handles and trick victims into disclosing their bank details to get a promised refund.

They typically win the trust of victims by displaying the blue checkmark icon, which until this year denoted accounts that had been officially verified by X.

Changes introduced this year allow the icon to be bought by anyone who pays an £11 monthly fee for the site’s subscription service, renamed this month from Twitter Blue to X Premium. Businesses that pay £950 a month receive a gold tick. X’s terms and conditions do not state whether subscriber accounts are pre-vetted.

Andrew Thomas was contacted by a scam account after posting a complaint to the travel platform Booking.com. “I’d been trying since April to get a refund after our holiday flights were cancelled and finally resorted to X,” he said.

“I received a response asking me to follow them, and DM [direct message] them with a contact number. They then called me via WhatsApp asking for my reference number so they could investigate. Later they called back to say that I would be refunded via their payment partner for which I’d need to download an app.”

Thomas became suspicious and checked the X profile. “It looked like the real thing, but I noticed that there was an unexpected hyphen in the Twitter handle and that it had only joined X in July 2023,” he said.


In this example a newly created paid account was created on X, used to direct users to other platforms (T0146.002: Paid Account Asset, T0146.003: Verified Account Asset, T0146.005: Lookalike Account ID, T0097.205: Business Persona, T0122: Direct Users to Alternative Platforms, T0143.003: Impersonated Persona, T0151.008: Microblogging Platform, T0150.001: Newly Created Asset). | diff --git a/generated_pages/techniques/T0146.006.md b/generated_pages/techniques/T0146.006.md index 693cfea..d8303cc 100644 --- a/generated_pages/techniques/T0146.006.md +++ b/generated_pages/techniques/T0146.006.md @@ -8,7 +8,7 @@ | Incident | Descriptions given for this incident | | -------- | -------------------- | | [I00100 Why ThisPersonDoesNotExist (and its copycats) need to be restricted](../../generated_pages/incidents/I00100.md) | You might have heard about the recent viral sensation, ThisPersonDoesNotExist.com, a website, launched two weeks ago, that uses Nvidia’s publicly available artificial intelligence technology to draw an invented, photo-realistic human being with each refresh. The tech is impressive and artistically evocative. It’s also irresponsible and needs to be restricted immediately.

[...]

Prior to this technology, scammers faced three major risks when using fake photos. Each of these risks had the potential to put them out business, or in jail.

Risk #1: Someone recognizes the photo. While the odds of this are long-shot, it does happen.

Risk #2: Someone reverse image searches the photo with a service like TinEye or Google Image Search and finds that it’s been posted elsewhere. Reverse image search is one of the top anti-fraud measures recommended by consumer protection advocates.

Risk #3: If the crime is successful, law enforcement uses the fake photo to figure out the scammer’s identity after the fact. Perhaps the scammer used an old classmate’s photo. Perhaps their personal account follows the Instagram member they pilfered. And so on: people make mistakes.

The problem with AI-generated photos is that they carry none of these risks. No one will recognize a human who’s never existed before. Google Image Search will return 0 results, possibly instilling a false sense of security in the searcher. And AI-generated photos don’t give law enforcement much to work with.


ThisPersonDoesNotExist is an online platform which, when visited, produces AI generated images of peoples’ faces (T0146.006: Open Access Platform, T0154.002: AI Media Platform, T0086.002: Develop AI-Generated Images (Deepfakes)). | -| [I00102 Ignore The Poway Synagogue Shooter’s Manifesto: Pay Attention To 8chan’s /pol/ Board](../../generated_pages/incidents/I00102.md) | On April 27, 2019, at around 11:30 a.m. local time, a young man with a semi-automatic rifle walked into the Chabad of Poway Synagogue in Poway, California. He opened fire, killing one worshipper and wounding three others. In the hours since the shooting, a manifesto, believed to be written by the shooter, began circulating online. Evidence has also surfaced that, like the Christchurch Mosque shooter, this killer began his rampage with a post on 8chan’s /pol/ board.

Although both of these attacks may seem different, since they targeted worshippers of different faiths, both shooters were united by the same fascist ideology. They were also both radicalized in the same place: 8chan’s /pol/ board.

This has been corroborated by posts on the board itself, where “anons,” as the posters call themselves, recirculated the shooter’s since-deleted post. In it, the alleged shooter claims to have been “lurking” on the site for a year and a half. He includes a link to a livestream of his rampage — which thankfully does not appear to have worked — and he also includes a pastebin link to his manifesto.

The very first response to his announcement was another anon cheering him on and telling him to “get the high score,” AKA, kill a huge number of people.


Before carrying out a mass shooting, the shooter posted a thread to 8chan’s /pol/ board. The post directed users to a variety of different platforms (T0146.006: Open Access Platform, T0151.012: Image Board Platform, T0115: Post Content, T0122: Direct Users to Alternative Platforms); a Facebook account on which the shooter attempted to livestream the shooting (T0146: Account, T0151.001: Social Media Platform); and a manifesto they had written hosted on pastebin (T0146.006: Open Access Platform, T0152.005: Paste Platform, T0115: Post Content) and uploaded to the file sharing platform Mediafire (T0152.010: File Hosting Platform, T0085.004: Develop Document).

The report looks deeper into 8chan’s /pol/ board:

8chan is a large website, which includes a number of different discussion groups about everything from anime to left-wing politics. /pol/ is one particularly active board on the website, and it is best described as a gathering place for extremely online neo-Nazis.

[...]

I’ve browsed /pol/ on an almost daily basis since the Christchurch shooting. It has not been difficult to find calls for violence. On Monday, March 25 of this year, I ran across evidence of anons translating the Christchurch shooter’s manifesto into other languages in an attempt to inspire more shootings across the globe.

This tactic can work, and today’s shooting is proof. The Poway Synagogue shooter directly cited the Christchurch shooter as his inspiration, saying he decided to carry out his attack roughly two weeks after that shooting. On /pol/, many anons refer to the Christchurch shooter, Brenton Tarrant, as “Saint Tarrant,” complete with medieval-inspired iconography.


Manifestos posted to 8chan are translated and reshared by other platform users (T0101: Create Localised Content, T0146.006: Open Access Platform, T0151.012: Image Board Platform, T0115: Post Content, T0084.004: Appropriate Content).

When I began looking through /pol/ right after the Poway Synagogue shooting, I came across several claims that the shootings had been a “false flag” aimed at making the message board look bad.

When Bellingcat tweeted out a warning about shitposting and the shooter’s manifesto, in the immediate wake of the attack, probable anons even commented on the Tweet in an attempt to deny that a channer had been behind the attack.

This is a recognizable pattern that occurs in the wake of any crimes committed by members of the board. While the initial response to the Christchurch shooter’s massacre thread was riotous glee, in the days after the shooting many anons began to claim the attack had been a false flag. This actually sparked significant division and debate between the members of /pol/. In the below image, a user mocks other anons for being unable to “believe something in your favor is real.” Another anon responds, “As the evidence comes out, its [sic] quite clear that this was a false flag.”

In his manifesto, the Poway Synagogue shooter even weighed in on this debate, accusing other anons who called the Christchurch and Tree of Life Synagogue shootings “false flags” to merely have been scared: “They can’t fathom that there are brave White men alive who have the willpower and courage it takes to say, ‘Fuck my life—I’m willing to sacrifice everything for the benefit of my race.’”


Platform users deny that their platform has been used by mass shooters to publish their manifestos (T0129.006: Deny Involvement). | +| [I00102 Ignore The Poway Synagogue Shooter’s Manifesto: Pay Attention To 8chan’s /pol/ Board](../../generated_pages/incidents/I00102.md) | On April 27, 2019, at around 11:30 a.m. local time, a young man with a semi-automatic rifle walked into the Chabad of Poway Synagogue in Poway, California. He opened fire, killing one worshipper and wounding three others. In the hours since the shooting, a manifesto, believed to be written by the shooter, began circulating online. Evidence has also surfaced that, like the Christchurch Mosque shooter, this killer began his rampage with a post on 8chan’s /pol/ board.

Although both of these attacks may seem different, since they targeted worshippers of different faiths, both shooters were united by the same fascist ideology. They were also both radicalized in the same place: 8chan’s /pol/ board.

This has been corroborated by posts on the board itself, where “anons,” as the posters call themselves, recirculated the shooter’s since-deleted post. In it, the alleged shooter claims to have been “lurking” on the site for a year and a half. He includes a link to a livestream of his rampage — which thankfully does not appear to have worked — and he also includes a pastebin link to his manifesto.

The very first response to his announcement was another anon cheering him on and telling him to “get the high score,” AKA, kill a huge number of people.


Before carrying out a mass shooting, the shooter posted a thread to 8chan’s /pol/ board. The post directed users to a variety of different platforms (T0146.006: Open Access Platform, T0151.012: Image Board Platform, T0115: Post Content, T0122: Direct Users to Alternative Platforms); a Facebook account on which the shooter attempted to livestream the shooting (T0146: Account Asset, T0151.001: Social Media Platform); and a manifesto they had written hosted on pastebin (T0146.006: Open Access Platform, T0152.005: Paste Platform, T0115: Post Content) and uploaded to the file sharing platform Mediafire (T0152.010: File Hosting Platform, T0085.004: Develop Document).

The report looks deeper into 8chan’s /pol/ board:

8chan is a large website, which includes a number of different discussion groups about everything from anime to left-wing politics. /pol/ is one particularly active board on the website, and it is best described as a gathering place for extremely online neo-Nazis.

[...]

I’ve browsed /pol/ on an almost daily basis since the Christchurch shooting. It has not been difficult to find calls for violence. On Monday, March 25 of this year, I ran across evidence of anons translating the Christchurch shooter’s manifesto into other languages in an attempt to inspire more shootings across the globe.

This tactic can work, and today’s shooting is proof. The Poway Synagogue shooter directly cited the Christchurch shooter as his inspiration, saying he decided to carry out his attack roughly two weeks after that shooting. On /pol/, many anons refer to the Christchurch shooter, Brenton Tarrant, as “Saint Tarrant,” complete with medieval-inspired iconography.


Manifestos posted to 8chan are translated and reshared by other platform users (T0101: Create Localised Content, T0146.006: Open Access Platform, T0151.012: Image Board Platform, T0115: Post Content, T0084.004: Appropriate Content).

When I began looking through /pol/ right after the Poway Synagogue shooting, I came across several claims that the shootings had been a “false flag” aimed at making the message board look bad.

When Bellingcat tweeted out a warning about shitposting and the shooter’s manifesto, in the immediate wake of the attack, probable anons even commented on the Tweet in an attempt to deny that a channer had been behind the attack.

This is a recognizable pattern that occurs in the wake of any crimes committed by members of the board. While the initial response to the Christchurch shooter’s massacre thread was riotous glee, in the days after the shooting many anons began to claim the attack had been a false flag. This actually sparked significant division and debate between the members of /pol/. In the below image, a user mocks other anons for being unable to “believe something in your favor is real.” Another anon responds, “As the evidence comes out, its [sic] quite clear that this was a false flag.”

In his manifesto, the Poway Synagogue shooter even weighed in on this debate, accusing other anons who called the Christchurch and Tree of Life Synagogue shootings “false flags” to merely have been scared: “They can’t fathom that there are brave White men alive who have the willpower and courage it takes to say, ‘Fuck my life—I’m willing to sacrifice everything for the benefit of my race.’”


Platform users deny that their platform has been used by mass shooters to publish their manifestos (T0129.006: Deny Involvement). | diff --git a/generated_pages/techniques/T0146.007.md b/generated_pages/techniques/T0146.007.md index 6ed03c7..06a983c 100644 --- a/generated_pages/techniques/T0146.007.md +++ b/generated_pages/techniques/T0146.007.md @@ -1,4 +1,4 @@ -# Technique T0146.007: Automated Account +# Technique T0146.007: Automated Account Asset * **Summary**: An Automated Account is an account which is displaying automated behaviour, such as republishing or liking other accounts’ content, or publishing their own content. diff --git a/generated_pages/techniques/T0146.md b/generated_pages/techniques/T0146.md index 2ab56ca..bde9c45 100644 --- a/generated_pages/techniques/T0146.md +++ b/generated_pages/techniques/T0146.md @@ -1,4 +1,4 @@ -# Technique T0146: Account +# Technique T0146: Account Asset * **Summary**: An Account is a user-specific profile that allows access to the features and services of an online platform, typically requiring a username and password for authentication. @@ -7,12 +7,12 @@ | Incident | Descriptions given for this incident | | -------- | -------------------- | -| [I00103 The racist AI deepfake that fooled and divided a community](../../generated_pages/incidents/I00103.md) | “I seriously don't understand why I have to constantly put up with these dumbasses here every day.”

So began what appeared to be a long tirade from the principal of Pikesville High School, punctuated with racist, antisemitic and offensive tropes. It sounded like it had been secretly recorded.

The speaker went on to bemoan “ungrateful black kids” and Jewish people in the community.

The clip, first posted in [January 2024], went viral nationally. But it really struck a nerve in the peaceful, leafy suburb of Pikesville, which has large black and Jewish populations, and in the nearby city of Baltimore, Maryland. Principal Eric Eiswert was put on paid administrative leave pending an investigation.

[...]

But what those sharing the clip didn’t realise at the time was that another bombshell was about to drop: the clip was an AI-generated fake.

[...]

[In April 2024], Baltimore Police Chief Robert McCullough confirmed they now had “conclusive evidence that the recording was not authentic”.

And they believed they knew who made the fake.

Police charged 31-year-old Dazhon Darien, the school’s athletics director, with several counts related to the fake video. Charges included theft, retaliating against a witness and stalking.

He was arrested at the airport, where police say he was planning to fly to Houston, Texas.

Police say that Mr Darien had been under investigation by Principal Eiswert over an alleged theft of $1,916 (£1,460) from the school. They also allege there had been “work performance challenges” and his contract was likely not to be renewed.

Their theory was that by creating the deepfake recording, he hoped to discredit the principal before he could be fired.

Investigators say they traced an email used to send the original video to a server connected to Mr Darien, and allege that he used Baltimore County Public Schools' computer network to access AI tools. He is due to stand trial in December 2024.


By associating Mr Darien to the server used to email the original AI generated audio, investigators link Darien to the fabricated content (T0149.005: Server, T0088.001: AI Generated Audio (Deepfakes)). They also assert that Darien used computers owned by the school to access platforms used to generate the audio (T0146: Account, T0154.002: AI Media Platform). | -| [I00109 Coordinated Facebook Pages Designed to Fund a White Supremacist Agenda](../../generated_pages/incidents/I00109.md) | This report examines the white nationalist group Suavelos’ use of Facebook to draw visitors to its website without overtly revealing their racist ideology. This section of the report looks at the Suavelos website, and the content it links out to.

In going back to Suavelos’ main page, we also found: A link to a page on a web shop: alabastro.eu; A link to a page to donate money to the founders through Tipee and to the website through PayPal; [and] a link to a private forum that gathers 3.000 members: oppidum.suavelos.eu;

Suavelos linked out to an online store which it controlled (T0152.004: Website, T0148.004: Payment Processing Capability), and to accounts on payment processing platforms PayPal and Tipee (T0146: Account, T0148.003: Payment Processing Platform).

The Suavelos website also hosted a private forum (T0151.009: Legacy Online Forum Platform, T0155: Gated Asset), and linked out to a variety of assets it controlled on other online platforms: accounts on Twitter (T0146: Account, T0151.008: Microblogging Platform), YouTube (T0146: Account, T0152.006: Video Platform), Instagram and VKontakte (T0146: Account, T0151.001: Social Media Platform). | -| [I00110 How COVID-19 conspiracists and extremists use crowdfunding platforms to fund their activities](../../generated_pages/incidents/I00110.md) | The EU Disinfo Lab produced a report into disinformation published on crowdfunding platforms:



More worrisome is the direct monetisation of disinformation happening on crowdfunding platforms: on Kickstarter, we found a user openly raising money for a documentary project suggesting that COVID-19 is a conspiracy.

A Kickstarter user attempted to use the platform to fund production of a documentary (T0017: Conduct Fundraising, T0087: Develop Video-Based Content, T0146: Account, T0148.006: Crowdfunding Platform).

On Patreon, we found several instances of direct monetisation of COVID-19 disinformation, including posts promoting a device allegedly protecting against COVID-19 and 5G, as well as posts related to the “Plandemic” conspiracy video, which gained attention on YouTube before being removed by the platform.

We also found an account called “Stranger than fiction” entirely dedicated to disinformation, which openly states that their content was “Banned by screwtube and fakebook, our videos have been viewed over a billion times.”


The “Stranger than fiction” user presented itself as an alternative news source which had been banned from other platforms (T0146: Account, T0097.202: News Outlet Persona, T0121.001: Bypass Content Bocking, T0152.012: Subscription Service Platform).

On the US-based crowdfunding platform IndieGogo, EU DisinfoLab found a successful crowdfunding campaign of €133.903 for a book called Revolution Q. This book, now also available on Amazon, claims to be “Written for both newcomers and long-time QAnon fans alike, this book is a treasure-trove of information designed to help everyone weather The Storm.”

An IndieGogo account was used to gather funds to produce a book on QAnon (T0017: Conduct Fundraising, T0085.005: Develop Book, T0146: Account, T0148.006: Crowdfunding Platform), with the book later sold on Amazon marketplace (T0148.007: eCommerce Platform). | -| [I00111 Patreon Is Bankrolling Climate Change Deniers While We All Burn](../../generated_pages/incidents/I00111.md) | In this article VICE News discusses a report produced by Advance Democracy on people who use Patreon to spread the false claim that an impending ice age will reverse the harms of the ongoing climate crisis:

“The spread of climate misinformation is prolific on social media, as well as on sites like Patreon, where users are actually financially compensated through the platform for spreading falsehoods,” Daniel Jones, president of Advance Democracy, told VICE News.

“Companies hosting and promoting climate misinformation have a responsibility to take action to reduce dangerous misinformation, as falsehoods about climate science are every bit as dangerous as lies about vaccinations and disinformation about our elections.”

Patreon did not respond to VICE News’ request for comment on the report’s findings.

One of the biggest accounts spreading climate conspiracies is ADAPT 2030, which is run by David DuByne, who has 1,100 followers on Patreon. He is currently making over $3,500 every month from his subscribers.

[The science DuByne relies on does not support his hypothesis. However,] this has not prevented DuByne and many others from preying on people’s fears about climate change to spread conspiracies about an impending ice age, which they say will miraculously fix all of earth’s climate problems.

DuByne offers seven different membership levels for supporters, beginning at just $1 per month.

The most expensive costs $100 a month, and gives patrons “a private 20-minute call with David DuByne once per month, to discuss your particular preparedness issues or concerns.” So far just two people are paying this amount.

The researchers also found at least eight other accounts on Patreon that have spread climate change conspiracy theories as part of wider conspiracy sharing, including baseless claims about COVID-19 and the legitimacy of Joe Biden’s presidency. Some of these accounts are earning over $600 per month.


David DuByne created an account on Patreon, which he uses to post text, videos, and podcasts for his subscribers to discuss (T0085: Develop Text-Based Content, T0087: Develop Video-Based Content, T0088: Develop Audio-Based Content, T0146: Account, T0115: Post Content, T0152.012: Subscription Service Platform, T0151.014: Comments Section, T0155.006: Subscription Access). | -| [I00118 ‘War Thunder’ players are once again leaking sensitive military technology information on a video game forum](../../generated_pages/incidents/I00118.md) | In an effort to prove that the developers behind a popular multiplayer vehicle combat game had made a mistake, a player went ahead and published classified British military documents about one of the real-life tanks featured in the game.

This truly bizarre turn of events recently occurred in the public forum for War Thunder, a free-to-player multiplayer combat sim featuring modern land, air, and sea craft. Getting a small detail wrong on a piece of equipment might not be a big deal for the average gamer, but for the War Thunder crowd it sure as hell is. With 25,000 devoted players, the game very much bills itself as the military vehicle combat simulator.

A player, who identified himself as a British tank commander, claimed that the game’s developers at Gaijin Entertainment had inaccurately represented the Challenger 2 main battle tank used by the British military.

The self-described tank commander’s bio listed his location as Tidworth Camp in Wiltshire, England, according to the UK Defense Journal, which reported that the base is home to the Royal Tank Regiment, which fields Challenger 2 tanks.

The player, who went by the handle Pyrophoric, reportedly shared an image on the War Thunder forum of the tank’s specs that were pulled from the Challenger 2’s Army Equipment Support Publication, which is essentially a technical manual.

[...]

A moderator for the forum, who’s handle is “Templar_”, explained that the developer had removed the material after they received confirmation from the Ministry of Defense that the document is still in fact classified.


A user of War Thunder’s forums posted confidential documents to win an argument (T0089.001: Obtain Authentic Documents, T0146: Account, T0097.105: Military Personnel Persona, T0115: Post Content, T0143.001: Authentic Persona, T0151.009: Legacy Online Forum Platform). | -| [I00125 The Agency](../../generated_pages/incidents/I00125.md) | In 2014 threat actors attributed to Russia spread the false narrative that a local chemical plant had leaked toxic fumes. This report discusses aspects of the operation:

[The chemical plant leak] hoax was just one in a wave of similar attacks during the second half of last year. On Dec. 13, two months after a handful of Ebola cases in the United States touched off a minor media panic, many of the same Twitter accounts used to spread the Columbian Chemicals hoax began to post about an outbreak of Ebola in Atlanta. [...] Again, the attention to detail was remarkable, suggesting a tremendous amount of effort. A YouTube video showed a team of hazmat-suited medical workers transporting a victim from the airport. Beyoncé’s recent single “7/11” played in the background, an apparent attempt to establish the video’s contemporaneity. A truck in the parking lot sported the logo of the Hartsfield-Jackson Atlanta International Airport.

Accounts which previously presented as Louisiana locals were repurposed for use in a different campaign, this time presenting as locals to Atlanta, a place over 500 miles away from Louisiana and in a different timezone (T0146: Account, T0097.101: Local Persona, T0143.002: Fabricated Persona, T0151.008: Microblogging Platform, T0150.004: Repurposed).

A video was created which appeared to support the campaign’s narrative (T0087: Develop Video-Based Content), with great attention given to small details which made the video appear more legitimate. | +| [I00103 The racist AI deepfake that fooled and divided a community](../../generated_pages/incidents/I00103.md) | “I seriously don't understand why I have to constantly put up with these dumbasses here every day.”

So began what appeared to be a long tirade from the principal of Pikesville High School, punctuated with racist, antisemitic and offensive tropes. It sounded like it had been secretly recorded.

The speaker went on to bemoan “ungrateful black kids” and Jewish people in the community.

The clip, first posted in [January 2024], went viral nationally. But it really struck a nerve in the peaceful, leafy suburb of Pikesville, which has large black and Jewish populations, and in the nearby city of Baltimore, Maryland. Principal Eric Eiswert was put on paid administrative leave pending an investigation.

[...]

But what those sharing the clip didn’t realise at the time was that another bombshell was about to drop: the clip was an AI-generated fake.

[...]

[In April 2024], Baltimore Police Chief Robert McCullough confirmed they now had “conclusive evidence that the recording was not authentic”.

And they believed they knew who made the fake.

Police charged 31-year-old Dazhon Darien, the school’s athletics director, with several counts related to the fake video. Charges included theft, retaliating against a witness and stalking.

He was arrested at the airport, where police say he was planning to fly to Houston, Texas.

Police say that Mr Darien had been under investigation by Principal Eiswert over an alleged theft of $1,916 (£1,460) from the school. They also allege there had been “work performance challenges” and his contract was likely not to be renewed.

Their theory was that by creating the deepfake recording, he hoped to discredit the principal before he could be fired.

Investigators say they traced an email used to send the original video to a server connected to Mr Darien, and allege that he used Baltimore County Public Schools' computer network to access AI tools. He is due to stand trial in December 2024.


By associating Mr Darien to the server used to email the original AI generated audio, investigators link Darien to the fabricated content (T0149.005: Server Asset, T0088.001: AI Generated Audio (Deepfakes)). They also assert that Darien used computers owned by the school to access platforms used to generate the audio (T0146: Account Asset, T0154.002: AI Media Platform). | +| [I00109 Coordinated Facebook Pages Designed to Fund a White Supremacist Agenda](../../generated_pages/incidents/I00109.md) | This report examines the white nationalist group Suavelos’ use of Facebook to draw visitors to its website without overtly revealing their racist ideology. This section of the report looks at the Suavelos website, and the content it links out to.

In going back to Suavelos’ main page, we also found: A link to a page on a web shop: alabastro.eu; A link to a page to donate money to the founders through Tipee and to the website through PayPal; [and] a link to a private forum that gathers 3.000 members: oppidum.suavelos.eu;

Suavelos linked out to an online store which it controlled (T0152.004: Website Asset, T0148.004: Payment Processing Capability), and to accounts on payment processing platforms PayPal and Tipee (T0146: Account Asset, T0148.003: Payment Processing Platform).

The Suavelos website also hosted a private forum (T0151.009: Legacy Online Forum Platform, T0155: Gated Asset), and linked out to a variety of assets it controlled on other online platforms: accounts on Twitter (T0146: Account Asset, T0151.008: Microblogging Platform), YouTube (T0146: Account Asset, T0152.006: Video Platform), Instagram and VKontakte (T0146: Account Asset, T0151.001: Social Media Platform). | +| [I00110 How COVID-19 conspiracists and extremists use crowdfunding platforms to fund their activities](../../generated_pages/incidents/I00110.md) | The EU Disinfo Lab produced a report into disinformation published on crowdfunding platforms:

More worrisome is the direct monetisation of disinformation happening on crowdfunding platforms: on Kickstarter, we found a user openly raising money for a documentary project suggesting that COVID-19 is a conspiracy.

A Kickstarter user attempted to use the platform to fund production of a documentary (T0017: Conduct Fundraising, T0087: Develop Video-Based Content, T0146: Account Asset, T0148.006: Crowdfunding Platform).

On Patreon, we found several instances of direct monetisation of COVID-19 disinformation, including posts promoting a device allegedly protecting against COVID-19 and 5G, as well as posts related to the “Plandemic” conspiracy video, which gained attention on YouTube before being removed by the platform.

We also found an account called “Stranger than fiction” entirely dedicated to disinformation, which openly states that their content was “Banned by screwtube and fakebook, our videos have been viewed over a billion times.”


The “Stranger than fiction” user presented itself as an alternative news source which had been banned from other platforms (T0146: Account Asset, T0097.202: News Outlet Persona, T0121.001: Bypass Content Bocking, T0152.012: Subscription Service Platform).

On the US-based crowdfunding platform IndieGogo, EU DisinfoLab found a successful crowdfunding campaign of €133.903 for a book called Revolution Q. This book, now also available on Amazon, claims to be “Written for both newcomers and long-time QAnon fans alike, this book is a treasure-trove of information designed to help everyone weather The Storm.”

An IndieGogo account was used to gather funds to produce a book on QAnon (T0017: Conduct Fundraising, T0085.005: Develop Book, T0146: Account Asset, T0148.006: Crowdfunding Platform), with the book later sold on Amazon marketplace (T0148.007: eCommerce Platform). | +| [I00111 Patreon Is Bankrolling Climate Change Deniers While We All Burn](../../generated_pages/incidents/I00111.md) | In this article VICE News discusses a report produced by Advance Democracy on people who use Patreon to spread the false claim that an impending ice age will reverse the harms of the ongoing climate crisis:

“The spread of climate misinformation is prolific on social media, as well as on sites like Patreon, where users are actually financially compensated through the platform for spreading falsehoods,” Daniel Jones, president of Advance Democracy, told VICE News.

“Companies hosting and promoting climate misinformation have a responsibility to take action to reduce dangerous misinformation, as falsehoods about climate science are every bit as dangerous as lies about vaccinations and disinformation about our elections.”

Patreon did not respond to VICE News’ request for comment on the report’s findings.

One of the biggest accounts spreading climate conspiracies is ADAPT 2030, which is run by David DuByne, who has 1,100 followers on Patreon. He is currently making over $3,500 every month from his subscribers.

[The science DuByne relies on does not support his hypothesis. However,] this has not prevented DuByne and many others from preying on people’s fears about climate change to spread conspiracies about an impending ice age, which they say will miraculously fix all of earth’s climate problems.

DuByne offers seven different membership levels for supporters, beginning at just $1 per month.

The most expensive costs $100 a month, and gives patrons “a private 20-minute call with David DuByne once per month, to discuss your particular preparedness issues or concerns.” So far just two people are paying this amount.

The researchers also found at least eight other accounts on Patreon that have spread climate change conspiracy theories as part of wider conspiracy sharing, including baseless claims about COVID-19 and the legitimacy of Joe Biden’s presidency. Some of these accounts are earning over $600 per month.


David DuByne created an account on Patreon, which he uses to post text, videos, and podcasts for his subscribers to discuss (T0085: Develop Text-Based Content, T0087: Develop Video-Based Content, T0088: Develop Audio-Based Content, T0146: Account Asset, T0115: Post Content, T0152.012: Subscription Service Platform, T0151.014: Comments Section, T0155.006: Subscription Access Asset). | +| [I00118 ‘War Thunder’ players are once again leaking sensitive military technology information on a video game forum](../../generated_pages/incidents/I00118.md) | In an effort to prove that the developers behind a popular multiplayer vehicle combat game had made a mistake, a player went ahead and published classified British military documents about one of the real-life tanks featured in the game.

This truly bizarre turn of events recently occurred in the public forum for War Thunder, a free-to-player multiplayer combat sim featuring modern land, air, and sea craft. Getting a small detail wrong on a piece of equipment might not be a big deal for the average gamer, but for the War Thunder crowd it sure as hell is. With 25,000 devoted players, the game very much bills itself as the military vehicle combat simulator.

A player, who identified himself as a British tank commander, claimed that the game’s developers at Gaijin Entertainment had inaccurately represented the Challenger 2 main battle tank used by the British military.

The self-described tank commander’s bio listed his location as Tidworth Camp in Wiltshire, England, according to the UK Defense Journal, which reported that the base is home to the Royal Tank Regiment, which fields Challenger 2 tanks.

The player, who went by the handle Pyrophoric, reportedly shared an image on the War Thunder forum of the tank’s specs that were pulled from the Challenger 2’s Army Equipment Support Publication, which is essentially a technical manual.

[...]

A moderator for the forum, who’s handle is “Templar_”, explained that the developer had removed the material after they received confirmation from the Ministry of Defense that the document is still in fact classified.


A user of War Thunder’s forums posted confidential documents to win an argument (T0089.001: Obtain Authentic Documents, T0146: Account Asset, T0097.105: Military Personnel Persona, T0115: Post Content, T0143.001: Authentic Persona, T0151.009: Legacy Online Forum Platform). | +| [I00125 The Agency](../../generated_pages/incidents/I00125.md) | In 2014 threat actors attributed to Russia spread the false narrative that a local chemical plant had leaked toxic fumes. This report discusses aspects of the operation:

[The chemical plant leak] hoax was just one in a wave of similar attacks during the second half of last year. On Dec. 13, two months after a handful of Ebola cases in the United States touched off a minor media panic, many of the same Twitter accounts used to spread the Columbian Chemicals hoax began to post about an outbreak of Ebola in Atlanta. [...] Again, the attention to detail was remarkable, suggesting a tremendous amount of effort. A YouTube video showed a team of hazmat-suited medical workers transporting a victim from the airport. Beyoncé’s recent single “7/11” played in the background, an apparent attempt to establish the video’s contemporaneity. A truck in the parking lot sported the logo of the Hartsfield-Jackson Atlanta International Airport.

Accounts which previously presented as Louisiana locals were repurposed for use in a different campaign, this time presenting as locals to Atlanta, a place over 500 miles away from Louisiana and in a different timezone (T0146: Account Asset, T0097.101: Local Persona, T0143.002: Fabricated Persona, T0151.008: Microblogging Platform, T0150.004: Repurposed Asset).

A video was created which appeared to support the campaign’s narrative (T0087: Develop Video-Based Content), with great attention given to small details which made the video appear more legitimate. | diff --git a/generated_pages/techniques/T0147.001.md b/generated_pages/techniques/T0147.001.md index 910b739..21a302c 100644 --- a/generated_pages/techniques/T0147.001.md +++ b/generated_pages/techniques/T0147.001.md @@ -1,4 +1,4 @@ -# Technique T0147.001: Game +# Technique T0147.001: Game Asset * **Summary**: A Game is Software which has been designed for interactive entertainment, where users take on challenges set by the game’s designers.

While Online Game Platforms allow people to play with each other, Games are designed for single player experiences. @@ -7,8 +7,8 @@ | Incident | Descriptions given for this incident | | -------- | -------------------- | -| [I00098 Gaming The System: How Extremists Exploit Gaming Sites And What Can Be Done To Counter Them](../../generated_pages/incidents/I00098.md) | This report looks at how extremists exploit games and gaming adjacent platforms:

Ethnic Cleansing, a first-person shooter game created by the U.S. white supremacist organization National Alliance in 2002, was advertised as follows: “[T]he Race War has already begun. Your character, Will, runs through a ghetto blasting away at various blacks and spics to attempt to gain entrance to the subway system...where the jews have hidden to avoid the carnage. Then you get to blow away jews as they scream ‘Oy Vey!’ on your way to the command center.”

While games like Ethnic Cleansing —and others of a similar genocidal variety, including titles like Shoot the Blacks, Hatred, and Muslim Massacre —generate some press attention and controversy, they tend to be ignored by the large majority of gamers, who consider them “crude” and “badly designed.” Nevertheless, these games are still available in some corners of the Internet and have been downloaded by hundreds of thousands of users.

A second strategy involves the modification (“modding”) of existing video games to twist the narrative into an extremist message or fantasy. One example is the Islamic State terrorist group’s modding of the first-person shooter video game, ARMA III, to make Islamic fighters the heroic protagonists rather than the villains. With their powerful immersive quality, these video games have, in some instances, been effective at inspiring and allegedly training extremists to perpetrate realworld attacks.

Third, extremist actors have used in-game chat functions to open lines of communication with ideological sympathizers and potential recruits. Although the lack of in-game communication data has made it impossible for academic researchers to track the presence of extremists in a systematic way, there is enough anecdotal evidence—including evidence obtained from police investigation files—to infer that in-game chatrooms can and do function as “radicalization funnels” in at least some cases.


White supremacists created a game aligned with their ideology (T0147.001: Game). The Islamic State terrorist group created a mod of the game ARMA 3 (T0151.015: Online Game Platform, T0147.002: Game Mod). Extremists also use communication features available in online games to recruit new members. | -| [I00105 Gaming the System: The Use of Gaming-Adjacent Communication, Game and Mod Platforms by Extremist Actors](../../generated_pages/incidents/I00105.md) | In this report, researchers look at online platforms commonly used by people who play videogames, looking at how these platforms can contribute to radicalisation of gamers:

Indie DB [is a platform that serves] to present indie games, which are titles from independent, small developer teams, which can be discussed and downloaded [Indie DB].

[...]

[On Indie DB we] found antisemitic, Islamist, sexist and other discriminatory content during the exploration. Both games and comments were located that made positive references to National Socialism. Radicalised users seem to use the opportunities to network, create groups, and communicate in forums. In addition, a number of member profiles with graphic propaganda content could be located. We found several games with propagandistic content advertised on the platform, which caused apparently radicalised users to form a fan community around those games. For example, there are titles such as the antisemitic Fursan Al-Aqsa: The Knights of the Al-Aqsa Mosque, which has won the Best Hardcore Game award at the Game Connection America 2024 Game Development Awards and which has received antisemitic praise on its review page. In the game, players need to target members of the Israeli Defence Forces, and attacks by Palestinian terrorist groups such as Hamas or Lions’ Den can be re-enacted. These include bomb attacks, beheadings and the re-enactment of the terrorist attack in Israel on 7 October 2023. We, therefore, deem Indie DB to be relevant for further analyses of extremist activities in digital gaming spaces.


Indie DB is an online software delivery platform on which users can create groups, and participate in discussion forums (T0152.009: Software Delivery Platform, T0151.002: Online Community Group, T0151.009: Legacy Online Forum Platform). The platform hosted games which allowed players to reenact terrorist attacks (T0147.001: Game). | +| [I00098 Gaming The System: How Extremists Exploit Gaming Sites And What Can Be Done To Counter Them](../../generated_pages/incidents/I00098.md) | This report looks at how extremists exploit games and gaming adjacent platforms:

Ethnic Cleansing, a first-person shooter game created by the U.S. white supremacist organization National Alliance in 2002, was advertised as follows: “[T]he Race War has already begun. Your character, Will, runs through a ghetto blasting away at various blacks and spics to attempt to gain entrance to the subway system...where the jews have hidden to avoid the carnage. Then you get to blow away jews as they scream ‘Oy Vey!’ on your way to the command center.”

While games like Ethnic Cleansing —and others of a similar genocidal variety, including titles like Shoot the Blacks, Hatred, and Muslim Massacre —generate some press attention and controversy, they tend to be ignored by the large majority of gamers, who consider them “crude” and “badly designed.” Nevertheless, these games are still available in some corners of the Internet and have been downloaded by hundreds of thousands of users.

A second strategy involves the modification (“modding”) of existing video games to twist the narrative into an extremist message or fantasy. One example is the Islamic State terrorist group’s modding of the first-person shooter video game, ARMA III, to make Islamic fighters the heroic protagonists rather than the villains. With their powerful immersive quality, these video games have, in some instances, been effective at inspiring and allegedly training extremists to perpetrate realworld attacks.

Third, extremist actors have used in-game chat functions to open lines of communication with ideological sympathizers and potential recruits. Although the lack of in-game communication data has made it impossible for academic researchers to track the presence of extremists in a systematic way, there is enough anecdotal evidence—including evidence obtained from police investigation files—to infer that in-game chatrooms can and do function as “radicalization funnels” in at least some cases.


White supremacists created a game aligned with their ideology (T0147.001: Game Asset). The Islamic State terrorist group created a mod of the game ARMA 3 (T0151.015: Online Game Platform, T0147.002: Game Mod Asset). Extremists also use communication features available in online games to recruit new members. | +| [I00105 Gaming the System: The Use of Gaming-Adjacent Communication, Game and Mod Platforms by Extremist Actors](../../generated_pages/incidents/I00105.md) | In this report, researchers look at online platforms commonly used by people who play videogames, looking at how these platforms can contribute to radicalisation of gamers:

Indie DB [is a platform that serves] to present indie games, which are titles from independent, small developer teams, which can be discussed and downloaded [Indie DB].

[...]

[On Indie DB we] found antisemitic, Islamist, sexist and other discriminatory content during the exploration. Both games and comments were located that made positive references to National Socialism. Radicalised users seem to use the opportunities to network, create groups, and communicate in forums. In addition, a number of member profiles with graphic propaganda content could be located. We found several games with propagandistic content advertised on the platform, which caused apparently radicalised users to form a fan community around those games. For example, there are titles such as the antisemitic Fursan Al-Aqsa: The Knights of the Al-Aqsa Mosque, which has won the Best Hardcore Game award at the Game Connection America 2024 Game Development Awards and which has received antisemitic praise on its review page. In the game, players need to target members of the Israeli Defence Forces, and attacks by Palestinian terrorist groups such as Hamas or Lions’ Den can be re-enacted. These include bomb attacks, beheadings and the re-enactment of the terrorist attack in Israel on 7 October 2023. We, therefore, deem Indie DB to be relevant for further analyses of extremist activities in digital gaming spaces.


Indie DB is an online software delivery platform on which users can create groups, and participate in discussion forums (T0152.009: Software Delivery Platform, T0151.002: Online Community Group, T0151.009: Legacy Online Forum Platform). The platform hosted games which allowed players to reenact terrorist attacks (T0147.001: Game Asset). | diff --git a/generated_pages/techniques/T0147.002.md b/generated_pages/techniques/T0147.002.md index b2fc42c..5780150 100644 --- a/generated_pages/techniques/T0147.002.md +++ b/generated_pages/techniques/T0147.002.md @@ -1,4 +1,4 @@ -# Technique T0147.002: Game Mod +# Technique T0147.002: Game Mod Asset * **Summary**: A Game Mod is a modification which can be applied to a Game or Multiplayer Online Game to add new content or functionality to the game.

Users can Modify Games to introduce new content to the game. Modified Games can be distributed on Software Delivery Platforms such as Steam or can be distributed within the Game or Multiplayer Online Game. @@ -7,8 +7,8 @@ | Incident | Descriptions given for this incident | | -------- | -------------------- | -| [I00098 Gaming The System: How Extremists Exploit Gaming Sites And What Can Be Done To Counter Them](../../generated_pages/incidents/I00098.md) | This report looks at how extremists exploit games and gaming adjacent platforms:

Ethnic Cleansing, a first-person shooter game created by the U.S. white supremacist organization National Alliance in 2002, was advertised as follows: “[T]he Race War has already begun. Your character, Will, runs through a ghetto blasting away at various blacks and spics to attempt to gain entrance to the subway system...where the jews have hidden to avoid the carnage. Then you get to blow away jews as they scream ‘Oy Vey!’ on your way to the command center.”

While games like Ethnic Cleansing —and others of a similar genocidal variety, including titles like Shoot the Blacks, Hatred, and Muslim Massacre —generate some press attention and controversy, they tend to be ignored by the large majority of gamers, who consider them “crude” and “badly designed.” Nevertheless, these games are still available in some corners of the Internet and have been downloaded by hundreds of thousands of users.

A second strategy involves the modification (“modding”) of existing video games to twist the narrative into an extremist message or fantasy. One example is the Islamic State terrorist group’s modding of the first-person shooter video game, ARMA III, to make Islamic fighters the heroic protagonists rather than the villains. With their powerful immersive quality, these video games have, in some instances, been effective at inspiring and allegedly training extremists to perpetrate realworld attacks.

Third, extremist actors have used in-game chat functions to open lines of communication with ideological sympathizers and potential recruits. Although the lack of in-game communication data has made it impossible for academic researchers to track the presence of extremists in a systematic way, there is enough anecdotal evidence—including evidence obtained from police investigation files—to infer that in-game chatrooms can and do function as “radicalization funnels” in at least some cases.


White supremacists created a game aligned with their ideology (T0147.001: Game). The Islamic State terrorist group created a mod of the game ARMA 3 (T0151.015: Online Game Platform, T0147.002: Game Mod). Extremists also use communication features available in online games to recruit new members. | -| [I00105 Gaming the System: The Use of Gaming-Adjacent Communication, Game and Mod Platforms by Extremist Actors](../../generated_pages/incidents/I00105.md) | In this report, researchers look at online platforms commonly used by people who play videogames, looking at how these platforms can contribute to radicalisation of gamers:

Gamebanana and Mod DB are so-called modding platforms that allow users to post their modifications of existing (popular) games. In the process of modding, highly radicalised content can be inserted into games that did not originally contain it. All of these platforms also have communication functions and customisable profiles.

[...]

During the explorations, several modifications with hateful themes were located, including right-wing extremist, racist, antisemitic and Islamist content. This includes mods that make it possible to play as terrorists or National Socialists. So-called “skins” (textures that change the appearance of models in the game) for characters from first-person shooters are particularly popular and contain references to National Socialism or Islamist terrorist organisations. Although some of this content could be justified with reference to historical accuracy and realism, the user profiles of the creators and commentators often reveal political motivations. Names with neo-Nazi codes or the use of avatars showing members of the Wehrmacht or the Waffen SS, for example, indicate a certain degree of positive appreciation or fascination with right-wing ideology, as do affirmations in the comment columns.

Mod DB in particular has attracted public attention in the past. For example, a mod for the game Half-Life 2 made it possible to play a school shooting with the weapons used during the attacks at Columbine High School (1999) and Virginia Polytechnic Institute and State University (2007). Antisemitic memes and jokes are shared in several groups on the platform. It seems as if users partially connect with each other because of shared political views. There were also indications that Islamist and right-wing extremist users network on the basis of shared views on women, Jews or homosexuals. In addition to relevant usernames and avatars, we found profiles featuring picture galleries, backgrounds and banners dedicated to the SS. Extremist propaganda and radicalisation processes on modding platforms have not been explored yet, but our exploration suggests these digital spaces to be highly relevant for our field.


Mod DB is a platform which allows users to upload mods for games, which other users can download (T0152.009: Software Delivery Platform, T0147.002: Game Mod). | +| [I00098 Gaming The System: How Extremists Exploit Gaming Sites And What Can Be Done To Counter Them](../../generated_pages/incidents/I00098.md) | This report looks at how extremists exploit games and gaming adjacent platforms:

Ethnic Cleansing, a first-person shooter game created by the U.S. white supremacist organization National Alliance in 2002, was advertised as follows: “[T]he Race War has already begun. Your character, Will, runs through a ghetto blasting away at various blacks and spics to attempt to gain entrance to the subway system...where the jews have hidden to avoid the carnage. Then you get to blow away jews as they scream ‘Oy Vey!’ on your way to the command center.”

While games like Ethnic Cleansing —and others of a similar genocidal variety, including titles like Shoot the Blacks, Hatred, and Muslim Massacre —generate some press attention and controversy, they tend to be ignored by the large majority of gamers, who consider them “crude” and “badly designed.” Nevertheless, these games are still available in some corners of the Internet and have been downloaded by hundreds of thousands of users.

A second strategy involves the modification (“modding”) of existing video games to twist the narrative into an extremist message or fantasy. One example is the Islamic State terrorist group’s modding of the first-person shooter video game, ARMA III, to make Islamic fighters the heroic protagonists rather than the villains. With their powerful immersive quality, these video games have, in some instances, been effective at inspiring and allegedly training extremists to perpetrate realworld attacks.

Third, extremist actors have used in-game chat functions to open lines of communication with ideological sympathizers and potential recruits. Although the lack of in-game communication data has made it impossible for academic researchers to track the presence of extremists in a systematic way, there is enough anecdotal evidence—including evidence obtained from police investigation files—to infer that in-game chatrooms can and do function as “radicalization funnels” in at least some cases.


White supremacists created a game aligned with their ideology (T0147.001: Game Asset). The Islamic State terrorist group created a mod of the game ARMA 3 (T0151.015: Online Game Platform, T0147.002: Game Mod Asset). Extremists also use communication features available in online games to recruit new members. | +| [I00105 Gaming the System: The Use of Gaming-Adjacent Communication, Game and Mod Platforms by Extremist Actors](../../generated_pages/incidents/I00105.md) | In this report, researchers look at online platforms commonly used by people who play videogames, looking at how these platforms can contribute to radicalisation of gamers:

Gamebanana and Mod DB are so-called modding platforms that allow users to post their modifications of existing (popular) games. In the process of modding, highly radicalised content can be inserted into games that did not originally contain it. All of these platforms also have communication functions and customisable profiles.

[...]

During the explorations, several modifications with hateful themes were located, including right-wing extremist, racist, antisemitic and Islamist content. This includes mods that make it possible to play as terrorists or National Socialists. So-called “skins” (textures that change the appearance of models in the game) for characters from first-person shooters are particularly popular and contain references to National Socialism or Islamist terrorist organisations. Although some of this content could be justified with reference to historical accuracy and realism, the user profiles of the creators and commentators often reveal political motivations. Names with neo-Nazi codes or the use of avatars showing members of the Wehrmacht or the Waffen SS, for example, indicate a certain degree of positive appreciation or fascination with right-wing ideology, as do affirmations in the comment columns.

Mod DB in particular has attracted public attention in the past. For example, a mod for the game Half-Life 2 made it possible to play a school shooting with the weapons used during the attacks at Columbine High School (1999) and Virginia Polytechnic Institute and State University (2007). Antisemitic memes and jokes are shared in several groups on the platform. It seems as if users partially connect with each other because of shared political views. There were also indications that Islamist and right-wing extremist users network on the basis of shared views on women, Jews or homosexuals. In addition to relevant usernames and avatars, we found profiles featuring picture galleries, backgrounds and banners dedicated to the SS. Extremist propaganda and radicalisation processes on modding platforms have not been explored yet, but our exploration suggests these digital spaces to be highly relevant for our field.


Mod DB is a platform which allows users to upload mods for games, which other users can download (T0152.009: Software Delivery Platform, T0147.002: Game Mod Asset). | diff --git a/generated_pages/techniques/T0147.003.md b/generated_pages/techniques/T0147.003.md index d3b732b..c02584d 100644 --- a/generated_pages/techniques/T0147.003.md +++ b/generated_pages/techniques/T0147.003.md @@ -1,4 +1,4 @@ -# Technique T0147.003: Malware +# Technique T0147.003: Malware Asset * **Summary**: Malware is Software which has been designed to cause harm or facilitate malicious behaviour on electronic devices.

DISARM recommends using the [MITRE ATT&CK Framework](https://attack.mitre.org/) to document malware types and their usage. @@ -7,7 +7,7 @@ | Incident | Descriptions given for this incident | | -------- | -------------------- | -| [I00126 Charming Kitten Updates POWERSTAR with an InterPlanetary Twist](../../generated_pages/incidents/I00126.md) | The target of the recently observed [highly targeted spearphishing attack by “Charming Kitten”, a hacker group attributed to Iran] had published an article related to Iran. The publicity appears to have garnered the attention of Charming Kitten, who subsequently created an email address to impersonate a reporter of an Israeli media organization in order to send the target an email. Prior to sending malware to the target, the attacker simply asked if the target would be open to reviewing a document they had written related to US foreign policy. The target agreed to do so, since this was not an unusual request; they are frequently asked by journalists to review opinion pieces relating to their field of work.

In an effort to further gain the target’s confidence, Charming Kitten continued the interaction with another benign email containing a list of questions, to which the target then responded with answers. After multiple days of benign and seemingly legitimate interaction, Charming Kitten finally sent a “draft report”; this was the first time anything opaquely malicious occurred. The “draft report” was, in fact, a password-protected RAR file containing a malicious LNK file. The password for the RAR file was provided in a subsequent email.


In this example, threat actors created an email address on a domain which impersonated an existing Israeli news organisation impersonating a reporter who worked there (T0097.102: Journalist Persona, T0097.202: News Outlet Persona, T0143.003: Impersonated Persona, T0149.003: Lookalike Domain, T0149.002: Email Domain) in order to convince the target to download a document containing malware (T0085.004: Develop Document, T0147.003: Malware). | +| [I00126 Charming Kitten Updates POWERSTAR with an InterPlanetary Twist](../../generated_pages/incidents/I00126.md) | The target of the recently observed [highly targeted spearphishing attack by “Charming Kitten”, a hacker group attributed to Iran] had published an article related to Iran. The publicity appears to have garnered the attention of Charming Kitten, who subsequently created an email address to impersonate a reporter of an Israeli media organization in order to send the target an email. Prior to sending malware to the target, the attacker simply asked if the target would be open to reviewing a document they had written related to US foreign policy. The target agreed to do so, since this was not an unusual request; they are frequently asked by journalists to review opinion pieces relating to their field of work.

In an effort to further gain the target’s confidence, Charming Kitten continued the interaction with another benign email containing a list of questions, to which the target then responded with answers. After multiple days of benign and seemingly legitimate interaction, Charming Kitten finally sent a “draft report”; this was the first time anything opaquely malicious occurred. The “draft report” was, in fact, a password-protected RAR file containing a malicious LNK file. The password for the RAR file was provided in a subsequent email.


In this example, threat actors created an email address on a domain which impersonated an existing Israeli news organisation impersonating a reporter who worked there (T0097.102: Journalist Persona, T0097.202: News Outlet Persona, T0143.003: Impersonated Persona, T0149.003: Lookalike Domain, T0149.002: Email Domain Asset) in order to convince the target to download a document containing malware (T0085.004: Develop Document, T0147.003: Malware Asset). | diff --git a/generated_pages/techniques/T0147.004.md b/generated_pages/techniques/T0147.004.md index 4f14a38..aa78e9a 100644 --- a/generated_pages/techniques/T0147.004.md +++ b/generated_pages/techniques/T0147.004.md @@ -1,4 +1,4 @@ -# Technique T0147.004: Mobile App +# Technique T0147.004: Mobile App Asset * **Summary**: A Mobile App is an application which has been designed to run on mobile operating systems, such as Android or iOS.

Mobile Apps can enable access to online platforms (e.g. Facebook’s mobile app) or can provide software which users can run offline on their device. diff --git a/generated_pages/techniques/T0147.md b/generated_pages/techniques/T0147.md index 087713c..a796711 100644 --- a/generated_pages/techniques/T0147.md +++ b/generated_pages/techniques/T0147.md @@ -1,4 +1,4 @@ -# Technique T0147: Software +# Technique T0147: Software Asset * **Summary**: A Software is a program developed to run on computers or devices that helps users achieve specific goals, such as improving productivity, automating tasks, or having fun. diff --git a/generated_pages/techniques/T0148.001.md b/generated_pages/techniques/T0148.001.md index 0e3856c..7f8c6f3 100644 --- a/generated_pages/techniques/T0148.001.md +++ b/generated_pages/techniques/T0148.001.md @@ -7,7 +7,7 @@ | Incident | Descriptions given for this incident | | -------- | -------------------- | -| [I00113 Inside the Shadowy World of Disinformation for Hire in Kenya](../../generated_pages/incidents/I00113.md) | Researchers at Mozilla examined influence operations targeting Kenyan citizens on Twitter in 2021, providing “a grim window into the booming and shadowy industry of Twitter influencers for political hire here in Kenya”, and giving insight into operations’ operationalisation:

In our interviews with one of the influencers, they informed us of the agile tactics they use to organize and avoid detection. For example, when it’s time to carry out the campaign the influencers would be added to a Whatsapp group. Here, they received direction about what to post, the hashtags to use, which tweets to engage with and who to target. Synchronizing the tweets was also incredibly important for them. It’s what enables them to achieve their goal of trending on Twitter and gain amplification.

[...]

They revealed to us that those participating in the exercise are paid roughly between $10 and $15 to participate in three campaigns per day. Each campaign execution involves tweeting about the hashtags of the day until it appears on the trending section of Twitter. Additionally, some individuals have managed to reach retainer level and get paid about $250 per month. Their job is to make sure the campaigns are executed on a day-by-day basis with different hashtags.


An M-PESA account (T0148.002: Bank Account, T0148.001: Online Banking Platform) was used to pay campaign participants.

Participants were organised in WhatsApp groups (T0129.005: Coordinate on Encrypted/Closed Networks, T0151.007: Chat Broadcast Group, T0151.004: Chat Platform), in which they planned how to get campaign content trending on Twitter (T0121: Manipulate Platform Algorithm, T0151.008: Microblogging Platform). | +| [I00113 Inside the Shadowy World of Disinformation for Hire in Kenya](../../generated_pages/incidents/I00113.md) | Researchers at Mozilla examined influence operations targeting Kenyan citizens on Twitter in 2021, providing “a grim window into the booming and shadowy industry of Twitter influencers for political hire here in Kenya”, and giving insight into operations’ operationalisation:

In our interviews with one of the influencers, they informed us of the agile tactics they use to organize and avoid detection. For example, when it’s time to carry out the campaign the influencers would be added to a Whatsapp group. Here, they received direction about what to post, the hashtags to use, which tweets to engage with and who to target. Synchronizing the tweets was also incredibly important for them. It’s what enables them to achieve their goal of trending on Twitter and gain amplification.

[...]

They revealed to us that those participating in the exercise are paid roughly between $10 and $15 to participate in three campaigns per day. Each campaign execution involves tweeting about the hashtags of the day until it appears on the trending section of Twitter. Additionally, some individuals have managed to reach retainer level and get paid about $250 per month. Their job is to make sure the campaigns are executed on a day-by-day basis with different hashtags.


An M-PESA account (T0148.002: Bank Account Asset, T0148.001: Online Banking Platform) was used to pay campaign participants.

Participants were organised in WhatsApp groups (T0129.005: Coordinate on Encrypted/Closed Networks, T0151.007: Chat Broadcast Group, T0151.004: Chat Platform), in which they planned how to get campaign content trending on Twitter (T0121: Manipulate Platform Algorithm, T0151.008: Microblogging Platform). | diff --git a/generated_pages/techniques/T0148.002.md b/generated_pages/techniques/T0148.002.md index 57899e9..10c21b3 100644 --- a/generated_pages/techniques/T0148.002.md +++ b/generated_pages/techniques/T0148.002.md @@ -1,4 +1,4 @@ -# Technique T0148.002: Bank Account +# Technique T0148.002: Bank Account Asset * **Summary**: A Bank Account is a financial account that allows individuals or organisations to store, manage, and access their money, typically for saving, spending, or investment purposes. @@ -7,7 +7,7 @@ | Incident | Descriptions given for this incident | | -------- | -------------------- | -| [I00113 Inside the Shadowy World of Disinformation for Hire in Kenya](../../generated_pages/incidents/I00113.md) | Researchers at Mozilla examined influence operations targeting Kenyan citizens on Twitter in 2021, providing “a grim window into the booming and shadowy industry of Twitter influencers for political hire here in Kenya”, and giving insight into operations’ operationalisation:

In our interviews with one of the influencers, they informed us of the agile tactics they use to organize and avoid detection. For example, when it’s time to carry out the campaign the influencers would be added to a Whatsapp group. Here, they received direction about what to post, the hashtags to use, which tweets to engage with and who to target. Synchronizing the tweets was also incredibly important for them. It’s what enables them to achieve their goal of trending on Twitter and gain amplification.

[...]

They revealed to us that those participating in the exercise are paid roughly between $10 and $15 to participate in three campaigns per day. Each campaign execution involves tweeting about the hashtags of the day until it appears on the trending section of Twitter. Additionally, some individuals have managed to reach retainer level and get paid about $250 per month. Their job is to make sure the campaigns are executed on a day-by-day basis with different hashtags.


An M-PESA account (T0148.002: Bank Account, T0148.001: Online Banking Platform) was used to pay campaign participants.

Participants were organised in WhatsApp groups (T0129.005: Coordinate on Encrypted/Closed Networks, T0151.007: Chat Broadcast Group, T0151.004: Chat Platform), in which they planned how to get campaign content trending on Twitter (T0121: Manipulate Platform Algorithm, T0151.008: Microblogging Platform). | +| [I00113 Inside the Shadowy World of Disinformation for Hire in Kenya](../../generated_pages/incidents/I00113.md) | Researchers at Mozilla examined influence operations targeting Kenyan citizens on Twitter in 2021, providing “a grim window into the booming and shadowy industry of Twitter influencers for political hire here in Kenya”, and giving insight into operations’ operationalisation:

In our interviews with one of the influencers, they informed us of the agile tactics they use to organize and avoid detection. For example, when it’s time to carry out the campaign the influencers would be added to a Whatsapp group. Here, they received direction about what to post, the hashtags to use, which tweets to engage with and who to target. Synchronizing the tweets was also incredibly important for them. It’s what enables them to achieve their goal of trending on Twitter and gain amplification.

[...]

They revealed to us that those participating in the exercise are paid roughly between $10 and $15 to participate in three campaigns per day. Each campaign execution involves tweeting about the hashtags of the day until it appears on the trending section of Twitter. Additionally, some individuals have managed to reach retainer level and get paid about $250 per month. Their job is to make sure the campaigns are executed on a day-by-day basis with different hashtags.


An M-PESA account (T0148.002: Bank Account Asset, T0148.001: Online Banking Platform) was used to pay campaign participants.

Participants were organised in WhatsApp groups (T0129.005: Coordinate on Encrypted/Closed Networks, T0151.007: Chat Broadcast Group, T0151.004: Chat Platform), in which they planned how to get campaign content trending on Twitter (T0121: Manipulate Platform Algorithm, T0151.008: Microblogging Platform). | diff --git a/generated_pages/techniques/T0148.003.md b/generated_pages/techniques/T0148.003.md index d492453..3798569 100644 --- a/generated_pages/techniques/T0148.003.md +++ b/generated_pages/techniques/T0148.003.md @@ -7,8 +7,8 @@ | Incident | Descriptions given for this incident | | -------- | -------------------- | -| [I00109 Coordinated Facebook Pages Designed to Fund a White Supremacist Agenda](../../generated_pages/incidents/I00109.md) | This report examines the white nationalist group Suavelos’ use of Facebook to draw visitors to its website without overtly revealing their racist ideology. This section of the report looks at the Suavelos website, and the content it links out to.

In going back to Suavelos’ main page, we also found: A link to a page on a web shop: alabastro.eu; A link to a page to donate money to the founders through Tipee and to the website through PayPal; [and] a link to a private forum that gathers 3.000 members: oppidum.suavelos.eu;

Suavelos linked out to an online store which it controlled (T0152.004: Website, T0148.004: Payment Processing Capability), and to accounts on payment processing platforms PayPal and Tipee (T0146: Account, T0148.003: Payment Processing Platform).

The Suavelos website also hosted a private forum (T0151.009: Legacy Online Forum Platform, T0155: Gated Asset), and linked out to a variety of assets it controlled on other online platforms: accounts on Twitter (T0146: Account, T0151.008: Microblogging Platform), YouTube (T0146: Account, T0152.006: Video Platform), Instagram and VKontakte (T0146: Account, T0151.001: Social Media Platform). | -| [I00112 Patreon allows disinformation and conspiracies to be monetised in Spain](../../generated_pages/incidents/I00112.md) | In this report EU DisinfoLab identified 17 Spanish accounts that monetise and/or spread QAnon content or other conspiracy theories on Patreon. Content produced by these accounts go against Patreon’s stated policy of removing creators that “advance disinformation promoting the QAnon conspiracy theory”. EU DisinfoLab found:

In most cases, the creators monetise the content directly on Patreon (posts are only accessible for people sponsoring the creators) but there are also cases of indirect monetization (monetization through links leading to other platforms), an aspect that was flagged and analysed by Eu DisinfoLab in the mentioned previous report.

Some creators display links that redirects users to other platforms such as YouTube or LBRY where they can monetise their content. Some even offer almost all of their videos for free by redirecting to their YouTube channel.

Another modus operandi is for the creators to advertise on Patreon that they are looking for financing through PayPal or provide the author’s email to explore other financing alternatives.

[...]

Sometimes the content offered for a fee on Patreon is freely accessible on other platforms. Creators openly explain that they seek voluntary donation on Patreon, but that their creations will be public on YouTube. This means that the model of these platforms does not always involve a direct monetisation of the content. Creators who have built a strong reputation previously on other platforms can use Patreon as a platform to get some sponsorship which is not related to the content and give them more freedom to create.

Some users explicitly claim to use Patreon as a secondary channel to evade “censorship” by other platforms such as YouTube. Patreon seems to be perceived as a safe haven for disinformation and fringe content that has been suppressed for violating the policies of other platforms. For example, Jorge Guerra points out how Patreon acts as a back-up channel to go to in case of censorship by YouTube. Meanwhile, Alfa Mind openly claims to use Patreon to publish content that is not allowed on YouTube. “Exclusive access to videos that are prohibited on YouTube. These videos are only accessible on Patreon, as their content is very explicit and shocking”, are offered to the patrons who pay €3 per month.

In spite of Patreon’s stated policy, actors use accounts on their platform to generate revenue or donations for their content, and to provide a space to host content which was removed from other platforms (T0146: Account, T0152.012: Subscription Service Platform, T0121.001: Bypass Content Bocking).

Some actors were observed accepting donations via PayPal (T0146: Account, T0148.003: Payment Processing Platform). | +| [I00109 Coordinated Facebook Pages Designed to Fund a White Supremacist Agenda](../../generated_pages/incidents/I00109.md) | This report examines the white nationalist group Suavelos’ use of Facebook to draw visitors to its website without overtly revealing their racist ideology. This section of the report looks at the Suavelos website, and the content it links out to.

In going back to Suavelos’ main page, we also found: A link to a page on a web shop: alabastro.eu; A link to a page to donate money to the founders through Tipee and to the website through PayPal; [and] a link to a private forum that gathers 3.000 members: oppidum.suavelos.eu;

Suavelos linked out to an online store which it controlled (T0152.004: Website Asset, T0148.004: Payment Processing Capability), and to accounts on payment processing platforms PayPal and Tipee (T0146: Account Asset, T0148.003: Payment Processing Platform).

The Suavelos website also hosted a private forum (T0151.009: Legacy Online Forum Platform, T0155: Gated Asset), and linked out to a variety of assets it controlled on other online platforms: accounts on Twitter (T0146: Account Asset, T0151.008: Microblogging Platform), YouTube (T0146: Account Asset, T0152.006: Video Platform), Instagram and VKontakte (T0146: Account Asset, T0151.001: Social Media Platform). | +| [I00112 Patreon allows disinformation and conspiracies to be monetised in Spain](../../generated_pages/incidents/I00112.md) | In this report EU DisinfoLab identified 17 Spanish accounts that monetise and/or spread QAnon content or other conspiracy theories on Patreon. Content produced by these accounts go against Patreon’s stated policy of removing creators that “advance disinformation promoting the QAnon conspiracy theory”. EU DisinfoLab found:

In most cases, the creators monetise the content directly on Patreon (posts are only accessible for people sponsoring the creators) but there are also cases of indirect monetization (monetization through links leading to other platforms), an aspect that was flagged and analysed by Eu DisinfoLab in the mentioned previous report.

Some creators display links that redirects users to other platforms such as YouTube or LBRY where they can monetise their content. Some even offer almost all of their videos for free by redirecting to their YouTube channel.

Another modus operandi is for the creators to advertise on Patreon that they are looking for financing through PayPal or provide the author’s email to explore other financing alternatives.

[...]

Sometimes the content offered for a fee on Patreon is freely accessible on other platforms. Creators openly explain that they seek voluntary donation on Patreon, but that their creations will be public on YouTube. This means that the model of these platforms does not always involve a direct monetisation of the content. Creators who have built a strong reputation previously on other platforms can use Patreon as a platform to get some sponsorship which is not related to the content and give them more freedom to create.

Some users explicitly claim to use Patreon as a secondary channel to evade “censorship” by other platforms such as YouTube. Patreon seems to be perceived as a safe haven for disinformation and fringe content that has been suppressed for violating the policies of other platforms. For example, Jorge Guerra points out how Patreon acts as a back-up channel to go to in case of censorship by YouTube. Meanwhile, Alfa Mind openly claims to use Patreon to publish content that is not allowed on YouTube. “Exclusive access to videos that are prohibited on YouTube. These videos are only accessible on Patreon, as their content is very explicit and shocking”, are offered to the patrons who pay €3 per month.


In spite of Patreon’s stated policy, actors use accounts on their platform to generate revenue or donations for their content, and to provide a space to host content which was removed from other platforms (T0146: Account Asset, T0152.012: Subscription Service Platform, T0121.001: Bypass Content Bocking).

Some actors were observed accepting donations via PayPal (T0146: Account Asset, T0148.003: Payment Processing Platform). | diff --git a/generated_pages/techniques/T0148.004.md b/generated_pages/techniques/T0148.004.md index 109f3be..34184be 100644 --- a/generated_pages/techniques/T0148.004.md +++ b/generated_pages/techniques/T0148.004.md @@ -7,7 +7,7 @@ | Incident | Descriptions given for this incident | | -------- | -------------------- | -| [I00109 Coordinated Facebook Pages Designed to Fund a White Supremacist Agenda](../../generated_pages/incidents/I00109.md) | This report examines the white nationalist group Suavelos’ use of Facebook to draw visitors to its website without overtly revealing their racist ideology. This section of the report looks at the Suavelos website, and the content it links out to.

In going back to Suavelos’ main page, we also found: A link to a page on a web shop: alabastro.eu; A link to a page to donate money to the founders through Tipee and to the website through PayPal; [and] a link to a private forum that gathers 3.000 members: oppidum.suavelos.eu;

Suavelos linked out to an online store which it controlled (T0152.004: Website, T0148.004: Payment Processing Capability), and to accounts on payment processing platforms PayPal and Tipee (T0146: Account, T0148.003: Payment Processing Platform).

The Suavelos website also hosted a private forum (T0151.009: Legacy Online Forum Platform, T0155: Gated Asset), and linked out to a variety of assets it controlled on other online platforms: accounts on Twitter (T0146: Account, T0151.008: Microblogging Platform), YouTube (T0146: Account, T0152.006: Video Platform), Instagram and VKontakte (T0146: Account, T0151.001: Social Media Platform)., This report examines the white nationalist group Suavelos’ use of Facebook to draw visitors to its website without overtly revealing their racist ideology. This section of the report looks at technical indicators associated with the Suavelos website, and attributions which can be made as a consequence:

[The Google AdSense tag set up on Suavelos.eu was also found on the following domains, indicating that they are controlled by the same actor;] Alabastro.eu: an online shop to buy “white nationalists” t-shirts [and] ARPAC.eu: the website of a registered non-profit organisation advocating to lift regulation on gun control in France.

Other domains attributed to Suavelos (T0149.001: Domain) reveal a website set up to sell merchandise (T0152.004: Website, T0148.004: Payment Processing Capability, T0061: Sell Merchandise), and a website hosting a registered French non-profit (T0152.004: Website, T0097.207: NGO Persona).

To learn more about the suavelos.eu domain, we collected the following data: The domain is hosted on OVH; The owner’s identity is protected; The IP Address of the server is 94.23.253.173, which is shared with 20 other domains.

The relative low number of websites hosted on this IP address could indicate that they all belong to the same people, and are hosted on the same private server.<.i>

Suavelos registered a domain using the web hosting provider OVH (T0149.001: Domain, T0152.003: Website Hosting Platform, T0150.006: Purchased). The site’s IP address reveals a server hosting other domains potentially owned by the actors (T0149.005: Server, T0149.006: IP Address). | +| [I00109 Coordinated Facebook Pages Designed to Fund a White Supremacist Agenda](../../generated_pages/incidents/I00109.md) | This report examines the white nationalist group Suavelos’ use of Facebook to draw visitors to its website without overtly revealing their racist ideology. This section of the report looks at the Suavelos website, and the content it links out to.

In going back to Suavelos’ main page, we also found: A link to a page on a web shop: alabastro.eu; A link to a page to donate money to the founders through Tipee and to the website through PayPal; [and] a link to a private forum that gathers 3.000 members: oppidum.suavelos.eu;

Suavelos linked out to an online store which it controlled (T0152.004: Website Asset, T0148.004: Payment Processing Capability), and to accounts on payment processing platforms PayPal and Tipee (T0146: Account Asset, T0148.003: Payment Processing Platform).

The Suavelos website also hosted a private forum (T0151.009: Legacy Online Forum Platform, T0155: Gated Asset), and linked out to a variety of assets it controlled on other online platforms: accounts on Twitter (T0146: Account Asset, T0151.008: Microblogging Platform), YouTube (T0146: Account Asset, T0152.006: Video Platform), Instagram and VKontakte (T0146: Account Asset, T0151.001: Social Media Platform)., This report examines the white nationalist group Suavelos’ use of Facebook to draw visitors to its website without overtly revealing their racist ideology. This section of the report looks at technical indicators associated with the Suavelos website, and attributions which can be made as a consequence:

[The Google AdSense tag set up on Suavelos.eu was also found on the following domains, indicating that they are controlled by the same actor;] Alabastro.eu: an online shop to buy “white nationalists” t-shirts [and] ARPAC.eu: the website of a registered non-profit organisation advocating to lift regulation on gun control in France.

Other domains attributed to Suavelos (T0149.001: Domain Asset) reveal a website set up to sell merchandise (T0152.004: Website Asset, T0148.004: Payment Processing Capability, T0061: Sell Merchandise), and a website hosting a registered French non-profit (T0152.004: Website Asset, T0097.207: NGO Persona).

To learn more about the suavelos.eu domain, we collected the following data: The domain is hosted on OVH; The owner’s identity is protected; The IP Address of the server is 94.23.253.173, which is shared with 20 other domains.

The relative low number of websites hosted on this IP address could indicate that they all belong to the same people, and are hosted on the same private server.


Suavelos registered a domain using the web hosting provider OVH (T0149.001: Domain Asset, T0152.003: Website Hosting Platform, T0150.006: Purchased). The site’s IP address reveals a server hosting other domains potentially owned by the actors (T0149.005: Server Asset, T0149.006: IP Address Asset). | diff --git a/generated_pages/techniques/T0148.006.md b/generated_pages/techniques/T0148.006.md index 4b2f558..a597e50 100644 --- a/generated_pages/techniques/T0148.006.md +++ b/generated_pages/techniques/T0148.006.md @@ -7,7 +7,7 @@ | Incident | Descriptions given for this incident | | -------- | -------------------- | -| [I00110 How COVID-19 conspiracists and extremists use crowdfunding platforms to fund their activities](../../generated_pages/incidents/I00110.md) | The EU Disinfo Lab produced a report into disinformation published on crowdfunding platforms:



More worrisome is the direct monetisation of disinformation happening on crowdfunding platforms: on Kickstarter, we found a user openly raising money for a documentary project suggesting that COVID-19 is a conspiracy.

A Kickstarter user attempted to use the platform to fund production of a documentary (T0017: Conduct Fundraising, T0087: Develop Video-Based Content, T0146: Account, T0148.006: Crowdfunding Platform).

On Patreon, we found several instances of direct monetisation of COVID-19 disinformation, including posts promoting a device allegedly protecting against COVID-19 and 5G, as well as posts related to the “Plandemic” conspiracy video, which gained attention on YouTube before being removed by the platform.

We also found an account called “Stranger than fiction” entirely dedicated to disinformation, which openly states that their content was “Banned by screwtube and fakebook, our videos have been viewed over a billion times.”


The “Stranger than fiction” user presented itself as an alternative news source which had been banned from other platforms (T0146: Account, T0097.202: News Outlet Persona, T0121.001: Bypass Content Bocking, T0152.012: Subscription Service Platform).

On the US-based crowdfunding platform IndieGogo, EU DisinfoLab found a successful crowdfunding campaign of €133.903 for a book called Revolution Q. This book, now also available on Amazon, claims to be “Written for both newcomers and long-time QAnon fans alike, this book is a treasure-trove of information designed to help everyone weather The Storm.”

An IndieGogo account was used to gather funds to produce a book on QAnon (T0017: Conduct Fundraising, T0085.005: Develop Book, T0146: Account, T0148.006: Crowdfunding Platform), with the book later sold on Amazon marketplace (T0148.007: eCommerce Platform). | +| [I00110 How COVID-19 conspiracists and extremists use crowdfunding platforms to fund their activities](../../generated_pages/incidents/I00110.md) | The EU Disinfo Lab produced a report into disinformation published on crowdfunding platforms:

More worrisome is the direct monetisation of disinformation happening on crowdfunding platforms: on Kickstarter, we found a user openly raising money for a documentary project suggesting that COVID-19 is a conspiracy.

A Kickstarter user attempted to use the platform to fund production of a documentary (T0017: Conduct Fundraising, T0087: Develop Video-Based Content, T0146: Account Asset, T0148.006: Crowdfunding Platform).

On Patreon, we found several instances of direct monetisation of COVID-19 disinformation, including posts promoting a device allegedly protecting against COVID-19 and 5G, as well as posts related to the “Plandemic” conspiracy video, which gained attention on YouTube before being removed by the platform.

We also found an account called “Stranger than fiction” entirely dedicated to disinformation, which openly states that their content was “Banned by screwtube and fakebook, our videos have been viewed over a billion times.”


The “Stranger than fiction” user presented itself as an alternative news source which had been banned from other platforms (T0146: Account Asset, T0097.202: News Outlet Persona, T0121.001: Bypass Content Bocking, T0152.012: Subscription Service Platform).

On the US-based crowdfunding platform IndieGogo, EU DisinfoLab found a successful crowdfunding campaign of €133.903 for a book called Revolution Q. This book, now also available on Amazon, claims to be “Written for both newcomers and long-time QAnon fans alike, this book is a treasure-trove of information designed to help everyone weather The Storm.”

An IndieGogo account was used to gather funds to produce a book on QAnon (T0017: Conduct Fundraising, T0085.005: Develop Book, T0146: Account Asset, T0148.006: Crowdfunding Platform), with the book later sold on Amazon marketplace (T0148.007: eCommerce Platform). | diff --git a/generated_pages/techniques/T0148.007.md b/generated_pages/techniques/T0148.007.md index 5e994df..95e978c 100644 --- a/generated_pages/techniques/T0148.007.md +++ b/generated_pages/techniques/T0148.007.md @@ -7,8 +7,8 @@ | Incident | Descriptions given for this incident | | -------- | -------------------- | -| [I00106 Facebook Is Being Flooded With Gross AI-Generated Images of Hurricane Helene Devastation](../../generated_pages/incidents/I00106.md) | As families desperately seek to find missing loved ones and communities grapple with immeasurable losses of both life and property in the wake of [2024’s] Hurricane Helene, AI slop scammers appear to be capitalizing on the moment for personal gain.

A Facebook account called "Coastal Views" usually shares calmer AI imagery of nature-filled beachside scenes. The account's banner image showcases a signpost reading "OBX Live," OBX being shorthand for North Carolina's Outer Banks islands.

But starting this weekend, the account shifted its approach dramatically, as first flagged by a social media user on X.

Instead of posting "photos" of leaping dolphins and sandy beaches, the account suddenly started publishing images of flooded mountain neighborhoods, submerged houses, and dogs sitting on top of roofs.

But instead of spreading vital information to those affected by the natural disaster, or at the very least sharing real photos of the destruction, the account is seemingly trying to use AI to cash in on all the attention the hurricane has been getting.

The account links to an Etsy page for a business called" OuterBanks2023," where somebody who goes by "Alexandr" sells AI-generated prints of horses touching snouts with sea turtles, Santa running down the shoreline with a reindeer, and sunsets over ocean waves.


A Facebook page which presented itself as being associated with North Carolina which posted AI generated images changed to posting AI generated images of hurricane damage after Hurricane Helene hit North Carolina (T0151.003: Online Community Page, T0151.001: Social Media Platform, T0115: Post Content, T0086.002: Develop AI-Generated Images (Deepfakes), T0068: Respond to Breaking News Event or Active Crisis).

The account included links (T0122: Direct Users to Alternative Platforms) to an account on Etsy, which sold prints of AI generated images (T0146: Account, T0148.007: eCommerce Platform). | -| [I00110 How COVID-19 conspiracists and extremists use crowdfunding platforms to fund their activities](../../generated_pages/incidents/I00110.md) | The EU Disinfo Lab produced a report into disinformation published on crowdfunding platforms:



More worrisome is the direct monetisation of disinformation happening on crowdfunding platforms: on Kickstarter, we found a user openly raising money for a documentary project suggesting that COVID-19 is a conspiracy.

A Kickstarter user attempted to use the platform to fund production of a documentary (T0017: Conduct Fundraising, T0087: Develop Video-Based Content, T0146: Account, T0148.006: Crowdfunding Platform).

On Patreon, we found several instances of direct monetisation of COVID-19 disinformation, including posts promoting a device allegedly protecting against COVID-19 and 5G, as well as posts related to the “Plandemic” conspiracy video, which gained attention on YouTube before being removed by the platform.

We also found an account called “Stranger than fiction” entirely dedicated to disinformation, which openly states that their content was “Banned by screwtube and fakebook, our videos have been viewed over a billion times.”


The “Stranger than fiction” user presented itself as an alternative news source which had been banned from other platforms (T0146: Account, T0097.202: News Outlet Persona, T0121.001: Bypass Content Bocking, T0152.012: Subscription Service Platform).

On the US-based crowdfunding platform IndieGogo, EU DisinfoLab found a successful crowdfunding campaign of €133.903 for a book called Revolution Q. This book, now also available on Amazon, claims to be “Written for both newcomers and long-time QAnon fans alike, this book is a treasure-trove of information designed to help everyone weather The Storm.”

An IndieGogo account was used to gather funds to produce a book on QAnon (T0017: Conduct Fundraising, T0085.005: Develop Book, T0146: Account, T0148.006: Crowdfunding Platform), with the book later sold on Amazon marketplace (T0148.007: eCommerce Platform). | +| [I00106 Facebook Is Being Flooded With Gross AI-Generated Images of Hurricane Helene Devastation](../../generated_pages/incidents/I00106.md) | As families desperately seek to find missing loved ones and communities grapple with immeasurable losses of both life and property in the wake of [2024’s] Hurricane Helene, AI slop scammers appear to be capitalizing on the moment for personal gain.

A Facebook account called "Coastal Views" usually shares calmer AI imagery of nature-filled beachside scenes. The account's banner image showcases a signpost reading "OBX Live," OBX being shorthand for North Carolina's Outer Banks islands.

But starting this weekend, the account shifted its approach dramatically, as first flagged by a social media user on X.

Instead of posting "photos" of leaping dolphins and sandy beaches, the account suddenly started publishing images of flooded mountain neighborhoods, submerged houses, and dogs sitting on top of roofs.

But instead of spreading vital information to those affected by the natural disaster, or at the very least sharing real photos of the destruction, the account is seemingly trying to use AI to cash in on all the attention the hurricane has been getting.

The account links to an Etsy page for a business called" OuterBanks2023," where somebody who goes by "Alexandr" sells AI-generated prints of horses touching snouts with sea turtles, Santa running down the shoreline with a reindeer, and sunsets over ocean waves.


A Facebook page which presented itself as being associated with North Carolina which posted AI generated images changed to posting AI generated images of hurricane damage after Hurricane Helene hit North Carolina (T0151.003: Online Community Page, T0151.001: Social Media Platform, T0115: Post Content, T0086.002: Develop AI-Generated Images (Deepfakes), T0068: Respond to Breaking News Event or Active Crisis).

The account included links (T0122: Direct Users to Alternative Platforms) to an account on Etsy, which sold prints of AI generated images (T0146: Account Asset, T0148.007: eCommerce Platform). | +| [I00110 How COVID-19 conspiracists and extremists use crowdfunding platforms to fund their activities](../../generated_pages/incidents/I00110.md) | The EU Disinfo Lab produced a report into disinformation published on crowdfunding platforms:

More worrisome is the direct monetisation of disinformation happening on crowdfunding platforms: on Kickstarter, we found a user openly raising money for a documentary project suggesting that COVID-19 is a conspiracy.

A Kickstarter user attempted to use the platform to fund production of a documentary (T0017: Conduct Fundraising, T0087: Develop Video-Based Content, T0146: Account Asset, T0148.006: Crowdfunding Platform).

On Patreon, we found several instances of direct monetisation of COVID-19 disinformation, including posts promoting a device allegedly protecting against COVID-19 and 5G, as well as posts related to the “Plandemic” conspiracy video, which gained attention on YouTube before being removed by the platform.

We also found an account called “Stranger than fiction” entirely dedicated to disinformation, which openly states that their content was “Banned by screwtube and fakebook, our videos have been viewed over a billion times.”


The “Stranger than fiction” user presented itself as an alternative news source which had been banned from other platforms (T0146: Account Asset, T0097.202: News Outlet Persona, T0121.001: Bypass Content Bocking, T0152.012: Subscription Service Platform).

On the US-based crowdfunding platform IndieGogo, EU DisinfoLab found a successful crowdfunding campaign of €133.903 for a book called Revolution Q. This book, now also available on Amazon, claims to be “Written for both newcomers and long-time QAnon fans alike, this book is a treasure-trove of information designed to help everyone weather The Storm.”

An IndieGogo account was used to gather funds to produce a book on QAnon (T0017: Conduct Fundraising, T0085.005: Develop Book, T0146: Account Asset, T0148.006: Crowdfunding Platform), with the book later sold on Amazon marketplace (T0148.007: eCommerce Platform). | diff --git a/generated_pages/techniques/T0148.009.md b/generated_pages/techniques/T0148.009.md index 9ca4da1..9c0ca6c 100644 --- a/generated_pages/techniques/T0148.009.md +++ b/generated_pages/techniques/T0148.009.md @@ -7,7 +7,7 @@ | Incident | Descriptions given for this incident | | -------- | -------------------- | -| [I00129 Teen who hacked Joe Biden and Bill Gates' Twitter accounts sentenced to three years in prison](../../generated_pages/incidents/I00129.md) | An 18-year-old hacker who pulled off a huge breach in 2020, infiltrating several high profile Twitter accounts to solicit bitcoin transactions, has agreed to serve three years in prison for his actions.

Graham Ivan Clark, of Florida, was 17 years old at the time of the hack in July, during which he took over a number of major accounts including those of Joe Biden, Bill Gates and Kim Kardashian West.

Once he accessed them, Clark tweeted a link to a bitcoin address and wrote “all bitcoin sent to our address below will be sent back to you doubled!” According to court documents, Clark made more than $100,000 from the scheme, which his lawyers say he has since returned.

Clark was able to access the accounts after convincing an employee at Twitter he worked in the company’s information technology department, according to the Tampa Bay Times.


In this example a threat actor gained access to Twitter’s customer service portal through social engineering (T0146.004: Administrator Account, T0150.005: Compromised, T0151.008: Microblogging Platform), which they used to take over accounts of public figures (T0146.003: Verified Account, T0143.003: Impersonated Persona, T0150.005: Compromised, T0151.008: Microblogging Platform).

The threat actor used these compromised accounts to trick their followers into sending bitcoin to their wallet (T0148.009: Cryptocurrency Wallet). | +| [I00129 Teen who hacked Joe Biden and Bill Gates' Twitter accounts sentenced to three years in prison](../../generated_pages/incidents/I00129.md) | An 18-year-old hacker who pulled off a huge breach in 2020, infiltrating several high profile Twitter accounts to solicit bitcoin transactions, has agreed to serve three years in prison for his actions.

Graham Ivan Clark, of Florida, was 17 years old at the time of the hack in July, during which he took over a number of major accounts including those of Joe Biden, Bill Gates and Kim Kardashian West.

Once he accessed them, Clark tweeted a link to a bitcoin address and wrote “all bitcoin sent to our address below will be sent back to you doubled!” According to court documents, Clark made more than $100,000 from the scheme, which his lawyers say he has since returned.

Clark was able to access the accounts after convincing an employee at Twitter he worked in the company’s information technology department, according to the Tampa Bay Times.


In this example a threat actor gained access to Twitter’s customer service portal through social engineering (T0146.004: Administrator Account Asset, T0150.005: Compromised Asset, T0151.008: Microblogging Platform), which they used to take over accounts of public figures (T0146.003: Verified Account Asset, T0143.003: Impersonated Persona, T0150.005: Compromised Asset, T0151.008: Microblogging Platform).

The threat actor used these compromised accounts to trick their followers into sending bitcoin to their wallet (T0148.009: Cryptocurrency Wallet). | diff --git a/generated_pages/techniques/T0149.001.md b/generated_pages/techniques/T0149.001.md index a05c93a..5e5ee9b 100644 --- a/generated_pages/techniques/T0149.001.md +++ b/generated_pages/techniques/T0149.001.md @@ -1,13 +1,13 @@ -# Technique T0149.001: Domain +# Technique T0149.001: Domain Asset -* **Summary**: A Domain is a web address (such as “www.google.com”), used to navigate to Websites on the internet.

Domains differ from Websites in that Websites are considered to be developed web pages which host content, whereas Domains do not necessarily host public-facing web content.

A threat actor may register a new domain to bypass the old domain being blocked. +* **Summary**: A Domain is a web address (such as “google[.]com”), used to navigate to Websites on the internet.

Domains differ from Websites in that Websites are considered to be developed web pages which host content, whereas Domains do not necessarily host public-facing web content.

A threat actor may register a new domain to bypass the old domain being blocked. * **Belongs to tactic stage**: TA06 | Incident | Descriptions given for this incident | | -------- | -------------------- | -| [I00109 Coordinated Facebook Pages Designed to Fund a White Supremacist Agenda](../../generated_pages/incidents/I00109.md) | This report examines the white nationalist group Suavelos’ use of Facebook to draw visitors to its website without overtly revealing their racist ideology. This section of the report looks at technical indicators associated with the Suavelos website, and attributions which can be made as a consequence:

[The Google AdSense tag set up on Suavelos.eu was also found on the following domains, indicating that they are controlled by the same actor;] Alabastro.eu: an online shop to buy “white nationalists” t-shirts [and] ARPAC.eu: the website of a registered non-profit organisation advocating to lift regulation on gun control in France.

Other domains attributed to Suavelos (T0149.001: Domain) reveal a website set up to sell merchandise (T0152.004: Website, T0148.004: Payment Processing Capability, T0061: Sell Merchandise), and a website hosting a registered French non-profit (T0152.004: Website, T0097.207: NGO Persona).

To learn more about the suavelos.eu domain, we collected the following data: The domain is hosted on OVH; The owner’s identity is protected; The IP Address of the server is 94.23.253.173, which is shared with 20 other domains.

The relative low number of websites hosted on this IP address could indicate that they all belong to the same people, and are hosted on the same private server.<.i>

Suavelos registered a domain using the web hosting provider OVH (T0149.001: Domain, T0152.003: Website Hosting Platform, T0150.006: Purchased). The site’s IP address reveals a server hosting other domains potentially owned by the actors (T0149.005: Server, T0149.006: IP Address). | +| [I00109 Coordinated Facebook Pages Designed to Fund a White Supremacist Agenda](../../generated_pages/incidents/I00109.md) | This report examines the white nationalist group Suavelos’ use of Facebook to draw visitors to its website without overtly revealing their racist ideology. This section of the report looks at technical indicators associated with the Suavelos website, and attributions which can be made as a consequence:

[The Google AdSense tag set up on Suavelos.eu was also found on the following domains, indicating that they are controlled by the same actor;] Alabastro.eu: an online shop to buy “white nationalists” t-shirts [and] ARPAC.eu: the website of a registered non-profit organisation advocating to lift regulation on gun control in France.

Other domains attributed to Suavelos (T0149.001: Domain Asset) reveal a website set up to sell merchandise (T0152.004: Website Asset, T0148.004: Payment Processing Capability, T0061: Sell Merchandise), and a website hosting a registered French non-profit (T0152.004: Website Asset, T0097.207: NGO Persona).

To learn more about the suavelos.eu domain, we collected the following data: The domain is hosted on OVH; The owner’s identity is protected; The IP Address of the server is 94.23.253.173, which is shared with 20 other domains.

The relative low number of websites hosted on this IP address could indicate that they all belong to the same people, and are hosted on the same private server.


Suavelos registered a domain using the web hosting provider OVH (T0149.001: Domain Asset, T0152.003: Website Hosting Platform, T0150.006: Purchased). The site’s IP address reveals a server hosting other domains potentially owned by the actors (T0149.005: Server Asset, T0149.006: IP Address Asset). | diff --git a/generated_pages/techniques/T0149.002.md b/generated_pages/techniques/T0149.002.md index 88b0dad..388a9a0 100644 --- a/generated_pages/techniques/T0149.002.md +++ b/generated_pages/techniques/T0149.002.md @@ -1,13 +1,13 @@ -# Technique T0149.002: Email Domain +# Technique T0149.002: Email Domain Asset -* **Summary**: An Email Domain is a Domain (such as “meta.com”) which has the ability to send emails.

Any Domain which has an MX (Mail Exchange) record and configured SMTP (Simple Mail Transfer Protocol) settings can send and receive emails, and is therefore an Email Domain. +* **Summary**: An Email Domain is a Domain (such as “meta[.]com”) which has the ability to send emails (e.g. from an @meta[.]com address).

Any Domain which has an MX (Mail Exchange) record and configured SMTP (Simple Mail Transfer Protocol) settings can send and receive emails, and is therefore an Email Domain. * **Belongs to tactic stage**: TA06 | Incident | Descriptions given for this incident | | -------- | -------------------- | -| [I00126 Charming Kitten Updates POWERSTAR with an InterPlanetary Twist](../../generated_pages/incidents/I00126.md) | The target of the recently observed [highly targeted spearphishing attack by “Charming Kitten”, a hacker group attributed to Iran] had published an article related to Iran. The publicity appears to have garnered the attention of Charming Kitten, who subsequently created an email address to impersonate a reporter of an Israeli media organization in order to send the target an email. Prior to sending malware to the target, the attacker simply asked if the target would be open to reviewing a document they had written related to US foreign policy. The target agreed to do so, since this was not an unusual request; they are frequently asked by journalists to review opinion pieces relating to their field of work.

In an effort to further gain the target’s confidence, Charming Kitten continued the interaction with another benign email containing a list of questions, to which the target then responded with answers. After multiple days of benign and seemingly legitimate interaction, Charming Kitten finally sent a “draft report”; this was the first time anything opaquely malicious occurred. The “draft report” was, in fact, a password-protected RAR file containing a malicious LNK file. The password for the RAR file was provided in a subsequent email.


In this example, threat actors created an email address on a domain which impersonated an existing Israeli news organisation impersonating a reporter who worked there (T0097.102: Journalist Persona, T0097.202: News Outlet Persona, T0143.003: Impersonated Persona, T0149.003: Lookalike Domain, T0149.002: Email Domain) in order to convince the target to download a document containing malware (T0085.004: Develop Document, T0147.003: Malware). | +| [I00126 Charming Kitten Updates POWERSTAR with an InterPlanetary Twist](../../generated_pages/incidents/I00126.md) | The target of the recently observed [highly targeted spearphishing attack by “Charming Kitten”, a hacker group attributed to Iran] had published an article related to Iran. The publicity appears to have garnered the attention of Charming Kitten, who subsequently created an email address to impersonate a reporter of an Israeli media organization in order to send the target an email. Prior to sending malware to the target, the attacker simply asked if the target would be open to reviewing a document they had written related to US foreign policy. The target agreed to do so, since this was not an unusual request; they are frequently asked by journalists to review opinion pieces relating to their field of work.

In an effort to further gain the target’s confidence, Charming Kitten continued the interaction with another benign email containing a list of questions, to which the target then responded with answers. After multiple days of benign and seemingly legitimate interaction, Charming Kitten finally sent a “draft report”; this was the first time anything opaquely malicious occurred. The “draft report” was, in fact, a password-protected RAR file containing a malicious LNK file. The password for the RAR file was provided in a subsequent email.


In this example, threat actors created an email address on a domain which impersonated an existing Israeli news organisation impersonating a reporter who worked there (T0097.102: Journalist Persona, T0097.202: News Outlet Persona, T0143.003: Impersonated Persona, T0149.003: Lookalike Domain, T0149.002: Email Domain Asset) in order to convince the target to download a document containing malware (T0085.004: Develop Document, T0147.003: Malware Asset). | diff --git a/generated_pages/techniques/T0149.003.md b/generated_pages/techniques/T0149.003.md index 756e499..13ee788 100644 --- a/generated_pages/techniques/T0149.003.md +++ b/generated_pages/techniques/T0149.003.md @@ -8,7 +8,7 @@ | Incident | Descriptions given for this incident | | -------- | -------------------- | | [I00107 The Lies Russia Tells Itself](../../generated_pages/incidents/I00107.md) | The Moscow firm Social Design Agency (SDA) has been attributed as being behind a Russian disinformation project known as Doppelganger:

The SDA’s deception work first surfaced in 2022, likely almost immediately after Doppelganger got off the ground. In April of that year, Meta, the parent company of Facebook and Instagram, disclosed in a quarterly report that it had removed from its platforms “a network of about 200 accounts operated from Russia.” By August 2022, German investigative journalists revealed that they had discovered forgeries of about 30 news sites, including many of the country’s biggest media outlets—Frankfurter Allgemeine, Der Spiegel, and Bild—but also Britain’s Daily Mail and France’s 20 Minutes. The sites had deceptive URLs such as www-dailymail-co-uk.dailymail.top.


As part of the SDA’s work, they created many websites which impersonated existing media outlets. Sites used domain impersonation tactics to increase perceived legitimacy of their impersonations (T0097.202: News Outlet Persona, T0143.003: Impersonated Persona, T0152.003: Website Hosting Platform, T0149.003: Lookalike Domain). | -| [I00126 Charming Kitten Updates POWERSTAR with an InterPlanetary Twist](../../generated_pages/incidents/I00126.md) | The target of the recently observed [highly targeted spearphishing attack by “Charming Kitten”, a hacker group attributed to Iran] had published an article related to Iran. The publicity appears to have garnered the attention of Charming Kitten, who subsequently created an email address to impersonate a reporter of an Israeli media organization in order to send the target an email. Prior to sending malware to the target, the attacker simply asked if the target would be open to reviewing a document they had written related to US foreign policy. The target agreed to do so, since this was not an unusual request; they are frequently asked by journalists to review opinion pieces relating to their field of work.

In an effort to further gain the target’s confidence, Charming Kitten continued the interaction with another benign email containing a list of questions, to which the target then responded with answers. After multiple days of benign and seemingly legitimate interaction, Charming Kitten finally sent a “draft report”; this was the first time anything opaquely malicious occurred. The “draft report” was, in fact, a password-protected RAR file containing a malicious LNK file. The password for the RAR file was provided in a subsequent email.


In this example, threat actors created an email address on a domain which impersonated an existing Israeli news organisation impersonating a reporter who worked there (T0097.102: Journalist Persona, T0097.202: News Outlet Persona, T0143.003: Impersonated Persona, T0149.003: Lookalike Domain, T0149.002: Email Domain) in order to convince the target to download a document containing malware (T0085.004: Develop Document, T0147.003: Malware). | +| [I00126 Charming Kitten Updates POWERSTAR with an InterPlanetary Twist](../../generated_pages/incidents/I00126.md) | The target of the recently observed [highly targeted spearphishing attack by “Charming Kitten”, a hacker group attributed to Iran] had published an article related to Iran. The publicity appears to have garnered the attention of Charming Kitten, who subsequently created an email address to impersonate a reporter of an Israeli media organization in order to send the target an email. Prior to sending malware to the target, the attacker simply asked if the target would be open to reviewing a document they had written related to US foreign policy. The target agreed to do so, since this was not an unusual request; they are frequently asked by journalists to review opinion pieces relating to their field of work.

In an effort to further gain the target’s confidence, Charming Kitten continued the interaction with another benign email containing a list of questions, to which the target then responded with answers. After multiple days of benign and seemingly legitimate interaction, Charming Kitten finally sent a “draft report”; this was the first time anything opaquely malicious occurred. The “draft report” was, in fact, a password-protected RAR file containing a malicious LNK file. The password for the RAR file was provided in a subsequent email.


In this example, threat actors created an email address on a domain which impersonated an existing Israeli news organisation impersonating a reporter who worked there (T0097.102: Journalist Persona, T0097.202: News Outlet Persona, T0143.003: Impersonated Persona, T0149.003: Lookalike Domain, T0149.002: Email Domain Asset) in order to convince the target to download a document containing malware (T0085.004: Develop Document, T0147.003: Malware Asset). | diff --git a/generated_pages/techniques/T0149.004.md b/generated_pages/techniques/T0149.004.md index 8485ea3..d378b7f 100644 --- a/generated_pages/techniques/T0149.004.md +++ b/generated_pages/techniques/T0149.004.md @@ -1,4 +1,4 @@ -# Technique T0149.004: Redirecting Domain +# Technique T0149.004: Redirecting Domain Asset * **Summary**: A Redirecting Domain is a Domain which has been configured to redirect users to another Domain when visited. @@ -7,7 +7,7 @@ | Incident | Descriptions given for this incident | | -------- | -------------------- | -| [I00072 Behind the Dutch Terror Threat Video: The St. Petersburg "Troll Factory" Connection](../../generated_pages/incidents/I00072.md) | “The creator of Geopolitika[.]ru is Aleksandr Dugin, who was sanctioned by the United States Department of Treasury in 2015 for his role in the Eurasian Youth Union “for being responsible for or complicit in actions or policies that threaten the peace, security, stability, or sovereignty or territorial integrity of Ukraine.”

[...]

“Currently, the website geopolika[.]ru redirects directly to another partner website, Katehon.

“Katehon poses itself as a think tank focused on geopolitics in an English edition of its website. In contrast, in Russian, it states its aim to develop “ideological, political, diplomatic, economic and military strategy for Russia of the future” with a special role of religion. The president of Katehon’s supervisory board is Konstantin Malofeev, a Russian millionaire with connections to the Russian orthodox church and presidential administration, who founded Tsargrad TV, a known source of disinformation. Malofeev was sanctioned by the U.S. Department of Treasury and the European Union in 2014 for material support and financial backing of Russian-backed separatists in eastern Ukraine. Another known figure from the board is Sergei Glaziev, former advisor to Putin in 2012–2019. Dugin is also on the board in the Russian edition of the website, whereas he is omitted in English.”
In this example a domain managed by an actor previously sanctioned by the US department of treasury has been reconfigured to redirect to another website; Katehon (T0149.004: Redirecting Domain, T0150.004: Repurposed).

Katehon presents itself as a geopolitical think tank in English, but does not maintain this persona when presenting itself to a Russian speaking audience (T0097.204: Think Tank Persona, T0152.004: Website, T0155.004: Geoblocked). | +| [I00072 Behind the Dutch Terror Threat Video: The St. Petersburg "Troll Factory" Connection](../../generated_pages/incidents/I00072.md) | “The creator of Geopolitika[.]ru is Aleksandr Dugin, who was sanctioned by the United States Department of Treasury in 2015 for his role in the Eurasian Youth Union “for being responsible for or complicit in actions or policies that threaten the peace, security, stability, or sovereignty or territorial integrity of Ukraine.”

[...]

“Currently, the website geopolika[.]ru redirects directly to another partner website, Katehon.

“Katehon poses itself as a think tank focused on geopolitics in an English edition of its website. In contrast, in Russian, it states its aim to develop “ideological, political, diplomatic, economic and military strategy for Russia of the future” with a special role of religion. The president of Katehon’s supervisory board is Konstantin Malofeev, a Russian millionaire with connections to the Russian orthodox church and presidential administration, who founded Tsargrad TV, a known source of disinformation. Malofeev was sanctioned by the U.S. Department of Treasury and the European Union in 2014 for material support and financial backing of Russian-backed separatists in eastern Ukraine. Another known figure from the board is Sergei Glaziev, former advisor to Putin in 2012–2019. Dugin is also on the board in the Russian edition of the website, whereas he is omitted in English.”


In this example a domain managed by an actor previously sanctioned by the US department of treasury has been reconfigured to redirect to another website; Katehon (T0149.004: Redirecting Domain Asset, T0150.004: Repurposed Asset).

Katehon presents itself as a geopolitical think tank in English, but does not maintain this persona when presenting itself to a Russian speaking audience (T0097.204: Think Tank Persona, T0152.004: Website Asset, T0155.004: Geoblocked Asset). | diff --git a/generated_pages/techniques/T0149.005.md b/generated_pages/techniques/T0149.005.md index 0a114d1..bd567e2 100644 --- a/generated_pages/techniques/T0149.005.md +++ b/generated_pages/techniques/T0149.005.md @@ -1,4 +1,4 @@ -# Technique T0149.005: Server +# Technique T0149.005: Server Asset * **Summary**: A Server is a computer which provides resources, services, or data to other computers over a network. There are different types of servers, such as web servers (which serve web pages and applications to users), database servers (which manage and provide access to databases), and file servers (which store and share files across a network). @@ -7,8 +7,8 @@ | Incident | Descriptions given for this incident | | -------- | -------------------- | -| [I00103 The racist AI deepfake that fooled and divided a community](../../generated_pages/incidents/I00103.md) | “I seriously don't understand why I have to constantly put up with these dumbasses here every day.”

So began what appeared to be a long tirade from the principal of Pikesville High School, punctuated with racist, antisemitic and offensive tropes. It sounded like it had been secretly recorded.

The speaker went on to bemoan “ungrateful black kids” and Jewish people in the community.

The clip, first posted in [January 2024], went viral nationally. But it really struck a nerve in the peaceful, leafy suburb of Pikesville, which has large black and Jewish populations, and in the nearby city of Baltimore, Maryland. Principal Eric Eiswert was put on paid administrative leave pending an investigation.

[...]

But what those sharing the clip didn’t realise at the time was that another bombshell was about to drop: the clip was an AI-generated fake.

[...]

[In April 2024], Baltimore Police Chief Robert McCullough confirmed they now had “conclusive evidence that the recording was not authentic”.

And they believed they knew who made the fake.

Police charged 31-year-old Dazhon Darien, the school’s athletics director, with several counts related to the fake video. Charges included theft, retaliating against a witness and stalking.

He was arrested at the airport, where police say he was planning to fly to Houston, Texas.

Police say that Mr Darien had been under investigation by Principal Eiswert over an alleged theft of $1,916 (£1,460) from the school. They also allege there had been “work performance challenges” and his contract was likely not to be renewed.

Their theory was that by creating the deepfake recording, he hoped to discredit the principal before he could be fired.

Investigators say they traced an email used to send the original video to a server connected to Mr Darien, and allege that he used Baltimore County Public Schools' computer network to access AI tools. He is due to stand trial in December 2024.


By associating Mr Darien to the server used to email the original AI generated audio, investigators link Darien to the fabricated content (T0149.005: Server, T0088.001: AI Generated Audio (Deepfakes)). They also assert that Darien used computers owned by the school to access platforms used to generate the audio (T0146: Account, T0154.002: AI Media Platform). | -| [I00109 Coordinated Facebook Pages Designed to Fund a White Supremacist Agenda](../../generated_pages/incidents/I00109.md) | This report examines the white nationalist group Suavelos’ use of Facebook to draw visitors to its website without overtly revealing their racist ideology. This section of the report looks at technical indicators associated with the Suavelos website, and attributions which can be made as a consequence:

[The Google AdSense tag set up on Suavelos.eu was also found on the following domains, indicating that they are controlled by the same actor;] Alabastro.eu: an online shop to buy “white nationalists” t-shirts [and] ARPAC.eu: the website of a registered non-profit organisation advocating to lift regulation on gun control in France.

Other domains attributed to Suavelos (T0149.001: Domain) reveal a website set up to sell merchandise (T0152.004: Website, T0148.004: Payment Processing Capability, T0061: Sell Merchandise), and a website hosting a registered French non-profit (T0152.004: Website, T0097.207: NGO Persona).

To learn more about the suavelos.eu domain, we collected the following data: The domain is hosted on OVH; The owner’s identity is protected; The IP Address of the server is 94.23.253.173, which is shared with 20 other domains.

The relative low number of websites hosted on this IP address could indicate that they all belong to the same people, and are hosted on the same private server.<.i>

Suavelos registered a domain using the web hosting provider OVH (T0149.001: Domain, T0152.003: Website Hosting Platform, T0150.006: Purchased). The site’s IP address reveals a server hosting other domains potentially owned by the actors (T0149.005: Server, T0149.006: IP Address). | +| [I00103 The racist AI deepfake that fooled and divided a community](../../generated_pages/incidents/I00103.md) | “I seriously don't understand why I have to constantly put up with these dumbasses here every day.”

So began what appeared to be a long tirade from the principal of Pikesville High School, punctuated with racist, antisemitic and offensive tropes. It sounded like it had been secretly recorded.

The speaker went on to bemoan “ungrateful black kids” and Jewish people in the community.

The clip, first posted in [January 2024], went viral nationally. But it really struck a nerve in the peaceful, leafy suburb of Pikesville, which has large black and Jewish populations, and in the nearby city of Baltimore, Maryland. Principal Eric Eiswert was put on paid administrative leave pending an investigation.

[...]

But what those sharing the clip didn’t realise at the time was that another bombshell was about to drop: the clip was an AI-generated fake.

[...]

[In April 2024], Baltimore Police Chief Robert McCullough confirmed they now had “conclusive evidence that the recording was not authentic”.

And they believed they knew who made the fake.

Police charged 31-year-old Dazhon Darien, the school’s athletics director, with several counts related to the fake video. Charges included theft, retaliating against a witness and stalking.

He was arrested at the airport, where police say he was planning to fly to Houston, Texas.

Police say that Mr Darien had been under investigation by Principal Eiswert over an alleged theft of $1,916 (£1,460) from the school. They also allege there had been “work performance challenges” and his contract was likely not to be renewed.

Their theory was that by creating the deepfake recording, he hoped to discredit the principal before he could be fired.

Investigators say they traced an email used to send the original video to a server connected to Mr Darien, and allege that he used Baltimore County Public Schools' computer network to access AI tools. He is due to stand trial in December 2024.


By associating Mr Darien to the server used to email the original AI generated audio, investigators link Darien to the fabricated content (T0149.005: Server Asset, T0088.001: AI Generated Audio (Deepfakes)). They also assert that Darien used computers owned by the school to access platforms used to generate the audio (T0146: Account Asset, T0154.002: AI Media Platform). | +| [I00109 Coordinated Facebook Pages Designed to Fund a White Supremacist Agenda](../../generated_pages/incidents/I00109.md) | This report examines the white nationalist group Suavelos’ use of Facebook to draw visitors to its website without overtly revealing their racist ideology. This section of the report looks at technical indicators associated with the Suavelos website, and attributions which can be made as a consequence:

[The Google AdSense tag set up on Suavelos.eu was also found on the following domains, indicating that they are controlled by the same actor;] Alabastro.eu: an online shop to buy “white nationalists” t-shirts [and] ARPAC.eu: the website of a registered non-profit organisation advocating to lift regulation on gun control in France.

Other domains attributed to Suavelos (T0149.001: Domain Asset) reveal a website set up to sell merchandise (T0152.004: Website Asset, T0148.004: Payment Processing Capability, T0061: Sell Merchandise), and a website hosting a registered French non-profit (T0152.004: Website Asset, T0097.207: NGO Persona).

To learn more about the suavelos.eu domain, we collected the following data: The domain is hosted on OVH; The owner’s identity is protected; The IP Address of the server is 94.23.253.173, which is shared with 20 other domains.

The relative low number of websites hosted on this IP address could indicate that they all belong to the same people, and are hosted on the same private server.


Suavelos registered a domain using the web hosting provider OVH (T0149.001: Domain Asset, T0152.003: Website Hosting Platform, T0150.006: Purchased). The site’s IP address reveals a server hosting other domains potentially owned by the actors (T0149.005: Server Asset, T0149.006: IP Address Asset). | diff --git a/generated_pages/techniques/T0149.006.md b/generated_pages/techniques/T0149.006.md index 5f0bdf0..d2b13a7 100644 --- a/generated_pages/techniques/T0149.006.md +++ b/generated_pages/techniques/T0149.006.md @@ -1,4 +1,4 @@ -# Technique T0149.006: IP Address +# Technique T0149.006: IP Address Asset * **Summary**: An IP Address is a unique numerical label assigned to each device connected to a computer network that uses the Internet Protocol for communication. IP addresses are commonly a part of any online infrastructure.

IP addresses can be in IPV4 dotted decimal (x.x.x.x) or IPV6 colon-separated hexadecimal (y:y:y:y:y:y:y:y) formats. @@ -7,7 +7,7 @@ | Incident | Descriptions given for this incident | | -------- | -------------------- | -| [I00109 Coordinated Facebook Pages Designed to Fund a White Supremacist Agenda](../../generated_pages/incidents/I00109.md) | This report examines the white nationalist group Suavelos’ use of Facebook to draw visitors to its website without overtly revealing their racist ideology. This section of the report looks at technical indicators associated with the Suavelos website, and attributions which can be made as a consequence:

[The Google AdSense tag set up on Suavelos.eu was also found on the following domains, indicating that they are controlled by the same actor;] Alabastro.eu: an online shop to buy “white nationalists” t-shirts [and] ARPAC.eu: the website of a registered non-profit organisation advocating to lift regulation on gun control in France.

Other domains attributed to Suavelos (T0149.001: Domain) reveal a website set up to sell merchandise (T0152.004: Website, T0148.004: Payment Processing Capability, T0061: Sell Merchandise), and a website hosting a registered French non-profit (T0152.004: Website, T0097.207: NGO Persona).

To learn more about the suavelos.eu domain, we collected the following data: The domain is hosted on OVH; The owner’s identity is protected; The IP Address of the server is 94.23.253.173, which is shared with 20 other domains.

The relative low number of websites hosted on this IP address could indicate that they all belong to the same people, and are hosted on the same private server.<.i>

Suavelos registered a domain using the web hosting provider OVH (T0149.001: Domain, T0152.003: Website Hosting Platform, T0150.006: Purchased). The site’s IP address reveals a server hosting other domains potentially owned by the actors (T0149.005: Server, T0149.006: IP Address). | +| [I00109 Coordinated Facebook Pages Designed to Fund a White Supremacist Agenda](../../generated_pages/incidents/I00109.md) | This report examines the white nationalist group Suavelos’ use of Facebook to draw visitors to its website without overtly revealing their racist ideology. This section of the report looks at technical indicators associated with the Suavelos website, and attributions which can be made as a consequence:

[The Google AdSense tag set up on Suavelos.eu was also found on the following domains, indicating that they are controlled by the same actor;] Alabastro.eu: an online shop to buy “white nationalists” t-shirts [and] ARPAC.eu: the website of a registered non-profit organisation advocating to lift regulation on gun control in France.

Other domains attributed to Suavelos (T0149.001: Domain Asset) reveal a website set up to sell merchandise (T0152.004: Website Asset, T0148.004: Payment Processing Capability, T0061: Sell Merchandise), and a website hosting a registered French non-profit (T0152.004: Website Asset, T0097.207: NGO Persona).

To learn more about the suavelos.eu domain, we collected the following data: The domain is hosted on OVH; The owner’s identity is protected; The IP Address of the server is 94.23.253.173, which is shared with 20 other domains.

The relative low number of websites hosted on this IP address could indicate that they all belong to the same people, and are hosted on the same private server.


Suavelos registered a domain using the web hosting provider OVH (T0149.001: Domain Asset, T0152.003: Website Hosting Platform, T0150.006: Purchased). The site’s IP address reveals a server hosting other domains potentially owned by the actors (T0149.005: Server Asset, T0149.006: IP Address Asset). | diff --git a/generated_pages/techniques/T0149.007.md b/generated_pages/techniques/T0149.007.md index 0fc0211..df549cd 100644 --- a/generated_pages/techniques/T0149.007.md +++ b/generated_pages/techniques/T0149.007.md @@ -1,4 +1,4 @@ -# Technique T0149.007: VPN +# Technique T0149.007: VPN Asset * **Summary**: A VPN (Virtual Private Network) is a service which creates secure, encrypted connections over the internet, allowing users to transmit data safely and access network resources remotely. It masks IP Addresses, enhancing privacy and security by preventing unauthorised access and tracking. VPNs are commonly used for protecting sensitive information, bypassing geographic restrictions, and maintaining online anonymity.

VPNs can also allow a threat actor to pose as if they are located in one country while in reality being based in another. By doing so, they can try to either mis-attribute their activities to another actor or better hide their own identity. diff --git a/generated_pages/techniques/T0149.008.md b/generated_pages/techniques/T0149.008.md index 7755414..3eb3261 100644 --- a/generated_pages/techniques/T0149.008.md +++ b/generated_pages/techniques/T0149.008.md @@ -1,4 +1,4 @@ -# Technique T0149.008: Proxy IP Address +# Technique T0149.008: Proxy IP Address Asset * **Summary**: A Proxy IP Address allows a threat actor to mask their real IP Address by putting a layer between them and the online content they’re connecting with.

Proxy IP Addresses can hide the connection between the threat actor and their online infrastructure. diff --git a/generated_pages/techniques/T0150.001.md b/generated_pages/techniques/T0150.001.md index c591d69..b436cc4 100644 --- a/generated_pages/techniques/T0150.001.md +++ b/generated_pages/techniques/T0150.001.md @@ -1,4 +1,4 @@ -# Technique T0150.001: Newly Created +# Technique T0150.001: Newly Created Asset * **Summary**: A Newly Created Asset is an asset which has been created and used for the first time in a documented potential incident.

For example, analysts which can identify a recent creation date of Accounts participating in the spread of a new narrative can assert these are Newly Created Assets.

Analysts should use Dormant if the asset was created and laid dormant for an extended period of time before activity. @@ -7,7 +7,7 @@ | Incident | Descriptions given for this incident | | -------- | -------------------- | -| [I00116 Blue-tick scammers target consumers who complain on X](../../generated_pages/incidents/I00116.md) | Consumers who complain of poor customer service on X are being targeted by scammers after the social media platform formerly known as Twitter changed its account verification process.

Bank customers and airline passengers are among those at risk of phishing scams when they complain to companies via X. Fraudsters, masquerading as customer service agents, respond under fake X handles and trick victims into disclosing their bank details to get a promised refund.

They typically win the trust of victims by displaying the blue checkmark icon, which until this year denoted accounts that had been officially verified by X.

Changes introduced this year allow the icon to be bought by anyone who pays an £11 monthly fee for the site’s subscription service, renamed this month from Twitter Blue to X Premium. Businesses that pay £950 a month receive a gold tick. X’s terms and conditions do not state whether subscriber accounts are pre-vetted.

Andrew Thomas was contacted by a scam account after posting a complaint to the travel platform Booking.com. “I’d been trying since April to get a refund after our holiday flights were cancelled and finally resorted to X,” he said.

“I received a response asking me to follow them, and DM [direct message] them with a contact number. They then called me via WhatsApp asking for my reference number so they could investigate. Later they called back to say that I would be refunded via their payment partner for which I’d need to download an app.”

Thomas became suspicious and checked the X profile. “It looked like the real thing, but I noticed that there was an unexpected hyphen in the Twitter handle and that it had only joined X in July 2023,” he said.


In this example a newly created paid account was created on X, used to direct users to other platforms (T0146.002: Paid Account, T0146.003: Verified Account, T0146.005: Lookalike Account ID, T0097.205: Business Persona, T0122: Direct Users to Alternative Platforms, T0143.003: Impersonated Persona, T0151.008: Microblogging Platform, T0150.001: Newly Created). | +| [I00116 Blue-tick scammers target consumers who complain on X](../../generated_pages/incidents/I00116.md) | Consumers who complain of poor customer service on X are being targeted by scammers after the social media platform formerly known as Twitter changed its account verification process.

Bank customers and airline passengers are among those at risk of phishing scams when they complain to companies via X. Fraudsters, masquerading as customer service agents, respond under fake X handles and trick victims into disclosing their bank details to get a promised refund.

They typically win the trust of victims by displaying the blue checkmark icon, which until this year denoted accounts that had been officially verified by X.

Changes introduced this year allow the icon to be bought by anyone who pays an £11 monthly fee for the site’s subscription service, renamed this month from Twitter Blue to X Premium. Businesses that pay £950 a month receive a gold tick. X’s terms and conditions do not state whether subscriber accounts are pre-vetted.

Andrew Thomas was contacted by a scam account after posting a complaint to the travel platform Booking.com. “I’d been trying since April to get a refund after our holiday flights were cancelled and finally resorted to X,” he said.

“I received a response asking me to follow them, and DM [direct message] them with a contact number. They then called me via WhatsApp asking for my reference number so they could investigate. Later they called back to say that I would be refunded via their payment partner for which I’d need to download an app.”

Thomas became suspicious and checked the X profile. “It looked like the real thing, but I noticed that there was an unexpected hyphen in the Twitter handle and that it had only joined X in July 2023,” he said.


In this example a newly created paid account was created on X, used to direct users to other platforms (T0146.002: Paid Account Asset, T0146.003: Verified Account Asset, T0146.005: Lookalike Account ID, T0097.205: Business Persona, T0122: Direct Users to Alternative Platforms, T0143.003: Impersonated Persona, T0151.008: Microblogging Platform, T0150.001: Newly Created Asset). | diff --git a/generated_pages/techniques/T0150.002.md b/generated_pages/techniques/T0150.002.md index 3b2cfa0..0be47a9 100644 --- a/generated_pages/techniques/T0150.002.md +++ b/generated_pages/techniques/T0150.002.md @@ -1,4 +1,4 @@ -# Technique T0150.002: Dormant +# Technique T0150.002: Dormant Asset * **Summary**: A Dormant Asset is an asset which was inactive for an extended period before being used in a documented potential incident. diff --git a/generated_pages/techniques/T0150.003.md b/generated_pages/techniques/T0150.003.md index 45afca8..5e3d4c7 100644 --- a/generated_pages/techniques/T0150.003.md +++ b/generated_pages/techniques/T0150.003.md @@ -1,4 +1,4 @@ -# Technique T0150.003: Pre-Existing +# Technique T0150.003: Pre-Existing Asset * **Summary**: Pre-Existing Assets are assets which existed before the observed incident which have not been Repurposed; i.e. they are still being used for their original purpose.

An example could be an Account which presented itself with a Journalist Persona prior to and during the observed potential incident. @@ -7,8 +7,8 @@ | Incident | Descriptions given for this incident | | -------- | -------------------- | -| [I00119 Independent journalist publishes Trump campaign document hacked by Iran despite election interference concerns](../../generated_pages/incidents/I00119.md) | An American journalist who runs an independent newsletter published a document [on 26 Sep 2024] that appears to have been stolen from Donald Trump’s presidential campaign — the first public posting of a file that is believed to be part of a dossier that federal officials say is part of an Iranian effort to manipulate the [2024] U.S. election.

The PDF document is a 271-page opposition research file on former President Donald Trump’s running mate, Sen. JD Vance, R-Ohio.

For more than two months, hackers who the U.S. says are tied to Iran have tried to persuade the American media to cover files they stole. No outlets took the bait.

But on Thursday, reporter Ken Klippenstein, who self-publishes on Substack after he left The Intercept this year, published one of the files.

[...]

Reporters who have received the documents describe the same pattern: An AOL account emails them files, signed by a person using the name “Robert,” who is reluctant to speak to their identity or reasons for wanting the documents to receive coverage.

NBC News was not part of the Robert persona’s direct outreach, but it has viewed its correspondence with a reporter at another publication.

One of the emails from the Robert persona previously viewed by NBC News included three large PDF files, each corresponding to Trump’s three reported finalists for vice president. The Vance file appears to be the one Klippenstein hosts on his site.


In this example hackers attributed to Iran used the Robert persona to email journalists hacked documents (T0146: Account, T0097.100: Individual Persona, T0153.001: Email Platform).

The journalist Ken Kippenstien used his existing blog on substack to host a link to download the document (T0089: Obtain Private Documents, T0097.102: Journalist Persona, T0115: Post Content, T0143.001: Authentic Persona, T0152.001: Blogging Platform, T0152.002: Blog, T0150.003: Pre-Existing). | -| [I00120 factcheckUK or fakecheckUK? Reinventing the political faction as the impartial factchecker](../../generated_pages/incidents/I00120.md) | Ahead of the 2019 UK Election during a leader’s debate, the Conservative party rebranded their “Conservative Campaign Headquarters Press” account to “FactCheckUK”:


That is, until a few minutes into the debate.

All at once, like a person throwing off their street clothes to reveal some sinister new identity underneath, @CCHQPress abruptly shed its name, blue Conservative logo, Boris Johnson banner, and bio description. Moments later, it had entirely reinvented itself.

The purple banner was emblazoned with white font that read “✓ factcheckUK [with a “FROM CCQH” subheading]”.

The matching profile picture was a white tick in a purple circle. The bio was updated to: “Fact checking Labour from CCHQ”. And the name now read factcheckUK, with the customary Twitter blue (or white depending on your phone settings!) validation tick still after it


In this example an existing verified social media account on Twitter was repurposed to inauthentically present itself as a Fact Checking service (T0151.008: Microblogging Platform, T0150.003: Pre-Existing, T0146.003: Verified Account, T0097.203: Fact Checking Organisation Persona, T0143.002: Fabricated Persona). | +| [I00119 Independent journalist publishes Trump campaign document hacked by Iran despite election interference concerns](../../generated_pages/incidents/I00119.md) | An American journalist who runs an independent newsletter published a document [on 26 Sep 2024] that appears to have been stolen from Donald Trump’s presidential campaign — the first public posting of a file that is believed to be part of a dossier that federal officials say is part of an Iranian effort to manipulate the [2024] U.S. election.

The PDF document is a 271-page opposition research file on former President Donald Trump’s running mate, Sen. JD Vance, R-Ohio.

For more than two months, hackers who the U.S. says are tied to Iran have tried to persuade the American media to cover files they stole. No outlets took the bait.

But on Thursday, reporter Ken Klippenstein, who self-publishes on Substack after he left The Intercept this year, published one of the files.

[...]

Reporters who have received the documents describe the same pattern: An AOL account emails them files, signed by a person using the name “Robert,” who is reluctant to speak to their identity or reasons for wanting the documents to receive coverage.

NBC News was not part of the Robert persona’s direct outreach, but it has viewed its correspondence with a reporter at another publication.

One of the emails from the Robert persona previously viewed by NBC News included three large PDF files, each corresponding to Trump’s three reported finalists for vice president. The Vance file appears to be the one Klippenstein hosts on his site.


In this example hackers attributed to Iran used the Robert persona to email journalists hacked documents (T0146: Account Asset, T0097.100: Individual Persona, T0153.001: Email Platform).

The journalist Ken Kippenstien used his existing blog on substack to host a link to download the document (T0089: Obtain Private Documents, T0097.102: Journalist Persona, T0115: Post Content, T0143.001: Authentic Persona, T0152.001: Blogging Platform, T0152.002: Blog Asset, T0150.003: Pre-Existing Asset). | +| [I00120 factcheckUK or fakecheckUK? Reinventing the political faction as the impartial factchecker](../../generated_pages/incidents/I00120.md) | Ahead of the 2019 UK Election during a leader’s debate, the Conservative party rebranded their “Conservative Campaign Headquarters Press” account to “FactCheckUK”:

The evening of the 19th November 2019 saw the first of three Leaders’ Debates on ITV, starting at 8pm and lasting for an hour. Current Prime Minister and leader of the Conservatives, Boris Johnson faced off against Labour party leader, Jeremy Corbyn. Plenty of people will have been watching the debate live, but a good proportion were “watching” (er, “twitching”?) via Twitter. This is something I’ve done in the past for certain shows. In some cases I just can’t watch or listen, but I can read, and in other cases, the commentary is far more interesting and entertaining than the show itself will ever be. This, for me, is just such a case. But very quickly, all eyes turned upon a modestly sized account with the handle @CCHQPress. That’s short for Conservative Campaign Headquarters Press. According to their (current!) Twitter bio, they are based in Westminster and they provide “snippets of news and commentary from CCHQ” to their 75k followers.

That is, until a few minutes into the debate.

All at once, like a person throwing off their street clothes to reveal some sinister new identity underneath, @CCHQPress abruptly shed its name, blue Conservative logo, Boris Johnson banner, and bio description. Moments later, it had entirely reinvented itself.

The purple banner was emblazoned with white font that read “✓ factcheckUK [with a “FROM CCQH” subheading]”.

The matching profile picture was a white tick in a purple circle. The bio was updated to: “Fact checking Labour from CCHQ”. And the name now read factcheckUK, with the customary Twitter blue (or white depending on your phone settings!) validation tick still after it


In this example an existing verified social media account on Twitter was repurposed to inauthentically present itself as a Fact Checking service (T0151.008: Microblogging Platform, T0150.003: Pre-Existing Asset, T0146.003: Verified Account Asset, T0097.203: Fact Checking Organisation Persona, T0143.002: Fabricated Persona). | diff --git a/generated_pages/techniques/T0150.004.md b/generated_pages/techniques/T0150.004.md index f510d09..ba7c720 100644 --- a/generated_pages/techniques/T0150.004.md +++ b/generated_pages/techniques/T0150.004.md @@ -1,4 +1,4 @@ -# Technique T0150.004: Repurposed +# Technique T0150.004: Repurposed Asset * **Summary**: Repurposed Assets are assets which have been identified as being used previously, but are now being used for different purposes, or have new Presented Personas.

Actors have been documented compromising assets, and then repurposing them to present Inauthentic Personas as part of their operations. @@ -7,9 +7,9 @@ | Incident | Descriptions given for this incident | | -------- | -------------------- | -| [I00072 Behind the Dutch Terror Threat Video: The St. Petersburg "Troll Factory" Connection](../../generated_pages/incidents/I00072.md) | “The creator of Geopolitika[.]ru is Aleksandr Dugin, who was sanctioned by the United States Department of Treasury in 2015 for his role in the Eurasian Youth Union “for being responsible for or complicit in actions or policies that threaten the peace, security, stability, or sovereignty or territorial integrity of Ukraine.”

[...]

“Currently, the website geopolika[.]ru redirects directly to another partner website, Katehon.

“Katehon poses itself as a think tank focused on geopolitics in an English edition of its website. In contrast, in Russian, it states its aim to develop “ideological, political, diplomatic, economic and military strategy for Russia of the future” with a special role of religion. The president of Katehon’s supervisory board is Konstantin Malofeev, a Russian millionaire with connections to the Russian orthodox church and presidential administration, who founded Tsargrad TV, a known source of disinformation. Malofeev was sanctioned by the U.S. Department of Treasury and the European Union in 2014 for material support and financial backing of Russian-backed separatists in eastern Ukraine. Another known figure from the board is Sergei Glaziev, former advisor to Putin in 2012–2019. Dugin is also on the board in the Russian edition of the website, whereas he is omitted in English.”
In this example a domain managed by an actor previously sanctioned by the US department of treasury has been reconfigured to redirect to another website; Katehon (T0149.004: Redirecting Domain, T0150.004: Repurposed).

Katehon presents itself as a geopolitical think tank in English, but does not maintain this persona when presenting itself to a Russian speaking audience (T0097.204: Think Tank Persona, T0152.004: Website, T0155.004: Geoblocked). | -| [I00113 Inside the Shadowy World of Disinformation for Hire in Kenya](../../generated_pages/incidents/I00113.md) | Researchers at Mozilla examined influence operations targeting Kenyan citizens on Twitter in 2021, providing “a grim window into the booming and shadowy industry of Twitter influencers for political hire here in Kenya”. The report touches upon how actors gained access to twitter accounts, and what personas they presented:

Verified accounts are complicit. One influencer we spoke to mentioned that the people who own coveted “blue check” accounts will often rent them out for disinformation campaigns. These verified accounts can improve the campaign’s chances of trending. Says one interviewee: “The owner of the account usually receives a cut of the campaign loot”.

[...]

Many of the accounts we examined appear to give an aura of authenticity, but in reality they are not authentic. Simply looking at their date of creation won’t give you a hint as to their purpose. We had to dig deeper. The profile pictures and content of some of the accounts gave us the answers we were looking for. A common tactic these accounts utilize is using suggestive pictures of women to bait men into following them, or at least pay attention. In terms of content, many of these accounts tweeted off the same hashtags for days on end and will constantly retweet a specific set of accounts.


Actors participating in this operation rented out verified Twitter accounts (in 2021 a checkmark on Twitter verified a user’s identity), which were repurposed and used updated account imagery (T0146.003: Verified Account, T0150.007: Rented, T0150.004: Repurposed, T00145.006: Attractive Person Account Imagery). | -| [I00125 The Agency](../../generated_pages/incidents/I00125.md) | In 2014 threat actors attributed to Russia spread the false narrative that a local chemical plant had leaked toxic fumes. This report discusses aspects of the operation:

[The chemical plant leak] hoax was just one in a wave of similar attacks during the second half of last year. On Dec. 13, two months after a handful of Ebola cases in the United States touched off a minor media panic, many of the same Twitter accounts used to spread the Columbian Chemicals hoax began to post about an outbreak of Ebola in Atlanta. [...] Again, the attention to detail was remarkable, suggesting a tremendous amount of effort. A YouTube video showed a team of hazmat-suited medical workers transporting a victim from the airport. Beyoncé’s recent single “7/11” played in the background, an apparent attempt to establish the video’s contemporaneity. A truck in the parking lot sported the logo of the Hartsfield-Jackson Atlanta International Airport.

Accounts which previously presented as Louisiana locals were repurposed for use in a different campaign, this time presenting as locals to Atlanta, a place over 500 miles away from Louisiana and in a different timezone (T0146: Account, T0097.101: Local Persona, T0143.002: Fabricated Persona, T0151.008: Microblogging Platform, T0150.004: Repurposed).

A video was created which appeared to support the campaign’s narrative (T0087: Develop Video-Based Content), with great attention given to small details which made the video appear more legitimate. | +| [I00072 Behind the Dutch Terror Threat Video: The St. Petersburg "Troll Factory" Connection](../../generated_pages/incidents/I00072.md) | “The creator of Geopolitika[.]ru is Aleksandr Dugin, who was sanctioned by the United States Department of Treasury in 2015 for his role in the Eurasian Youth Union “for being responsible for or complicit in actions or policies that threaten the peace, security, stability, or sovereignty or territorial integrity of Ukraine.”

[...]

“Currently, the website geopolika[.]ru redirects directly to another partner website, Katehon.

“Katehon poses itself as a think tank focused on geopolitics in an English edition of its website. In contrast, in Russian, it states its aim to develop “ideological, political, diplomatic, economic and military strategy for Russia of the future” with a special role of religion. The president of Katehon’s supervisory board is Konstantin Malofeev, a Russian millionaire with connections to the Russian orthodox church and presidential administration, who founded Tsargrad TV, a known source of disinformation. Malofeev was sanctioned by the U.S. Department of Treasury and the European Union in 2014 for material support and financial backing of Russian-backed separatists in eastern Ukraine. Another known figure from the board is Sergei Glaziev, former advisor to Putin in 2012–2019. Dugin is also on the board in the Russian edition of the website, whereas he is omitted in English.”


In this example a domain managed by an actor previously sanctioned by the US department of treasury has been reconfigured to redirect to another website; Katehon (T0149.004: Redirecting Domain Asset, T0150.004: Repurposed Asset).

Katehon presents itself as a geopolitical think tank in English, but does not maintain this persona when presenting itself to a Russian speaking audience (T0097.204: Think Tank Persona, T0152.004: Website Asset, T0155.004: Geoblocked Asset). | +| [I00113 Inside the Shadowy World of Disinformation for Hire in Kenya](../../generated_pages/incidents/I00113.md) | Researchers at Mozilla examined influence operations targeting Kenyan citizens on Twitter in 2021, providing “a grim window into the booming and shadowy industry of Twitter influencers for political hire here in Kenya”. The report touches upon how actors gained access to twitter accounts, and what personas they presented:

Verified accounts are complicit. One influencer we spoke to mentioned that the people who own coveted “blue check” accounts will often rent them out for disinformation campaigns. These verified accounts can improve the campaign’s chances of trending. Says one interviewee: “The owner of the account usually receives a cut of the campaign loot”.

[...]

Many of the accounts we examined appear to give an aura of authenticity, but in reality they are not authentic. Simply looking at their date of creation won’t give you a hint as to their purpose. We had to dig deeper. The profile pictures and content of some of the accounts gave us the answers we were looking for. A common tactic these accounts utilize is using suggestive pictures of women to bait men into following them, or at least pay attention. In terms of content, many of these accounts tweeted off the same hashtags for days on end and will constantly retweet a specific set of accounts.


Actors participating in this operation rented out verified Twitter accounts (in 2021 a checkmark on Twitter verified a user’s identity), which were repurposed and used updated account imagery (T0146.003: Verified Account Asset, T0150.007: Rented Asset, T0150.004: Repurposed Asset, T00145.006: Attractive Person Account Imagery). | +| [I00125 The Agency](../../generated_pages/incidents/I00125.md) | In 2014 threat actors attributed to Russia spread the false narrative that a local chemical plant had leaked toxic fumes. This report discusses aspects of the operation:

[The chemical plant leak] hoax was just one in a wave of similar attacks during the second half of last year. On Dec. 13, two months after a handful of Ebola cases in the United States touched off a minor media panic, many of the same Twitter accounts used to spread the Columbian Chemicals hoax began to post about an outbreak of Ebola in Atlanta. [...] Again, the attention to detail was remarkable, suggesting a tremendous amount of effort. A YouTube video showed a team of hazmat-suited medical workers transporting a victim from the airport. Beyoncé’s recent single “7/11” played in the background, an apparent attempt to establish the video’s contemporaneity. A truck in the parking lot sported the logo of the Hartsfield-Jackson Atlanta International Airport.

Accounts which previously presented as Louisiana locals were repurposed for use in a different campaign, this time presenting as locals to Atlanta, a place over 500 miles away from Louisiana and in a different timezone (T0146: Account Asset, T0097.101: Local Persona, T0143.002: Fabricated Persona, T0151.008: Microblogging Platform, T0150.004: Repurposed Asset).

A video was created which appeared to support the campaign’s narrative (T0087: Develop Video-Based Content), with great attention given to small details which made the video appear more legitimate. | diff --git a/generated_pages/techniques/T0150.005.md b/generated_pages/techniques/T0150.005.md index 1cd3374..3ad962c 100644 --- a/generated_pages/techniques/T0150.005.md +++ b/generated_pages/techniques/T0150.005.md @@ -1,4 +1,4 @@ -# Technique T0150.005: Compromised +# Technique T0150.005: Compromised Asset * **Summary**: A Compromised Asset is an asset which was originally created or belonged to another person or organisation, but which an actor has gained access to without their consent.

See also MITRE ATT&CK T1708: Valid Accounts. @@ -7,10 +7,10 @@ | Incident | Descriptions given for this incident | | -------- | -------------------- | -| [I00066 The online war between Qatar and Saudi Arabia](../../generated_pages/incidents/I00066.md) | _"In the early hours of 24 May 2017, a news story appeared on the website of Qatar's official news agency, QNA, reporting that the country's emir, Sheikh Tamim bin Hamad al-Thani, had made an astonishing speech."_

_"[…]_

_"Qatar claimed that the QNA had been hacked. And they said the hack was designed to deliberately spread fake news about the country's leader and its foreign policies. The Qataris specifically blamed UAE, an allegation later repeated by a Washington Post report which cited US intelligence sources. The UAE categorically denied those reports._

_"But the story of the emir's speech unleashed a media free-for-all. Within minutes, Saudi and UAE-owned TV networks - Al Arabiya and Sky News Arabia - picked up on the comments attributed to al-Thani. Both networks accused Qatar of funding extremist groups and of destabilising the region."_

This incident demonstrates how threat actors used a compromised website to allow for an inauthentic narrative to be given a level of credibility which caused significant political fallout (T0097.202: News Outlet Persona, T0143.003: Impersonated Persona, T0152.004: Website, T0150.005: Compromised). | -| [I00071 Russia-aligned hacktivists stir up anti-Ukrainian sentiments in Poland](../../generated_pages/incidents/I00071.md) | “The August 17 [2022] Telegram post [which contained a falsified letter from the Ukrainian Minister of Foreign Affairs asking Poland to rename Belwederska Street in Warsaw — the location of the Russian embassy building — as Stepan Bandera Street, in honor of the far-right nationalist who led the Ukrainian Insurgent Army during WWII] also contained screenshots of Facebook posts that appeared on two Facebook accounts belonging to Polish nationals Piotr Górka, an expert in the history of the Polish Air Force, and Dariusz Walusiak, a Polish historian and documentary maker. The Górka post suggested that he fully supported the Polish government’s decision to change Belwederska Street to Stepan Bandera Street.

“In a statement to the DFRLab, Górka said his account was accessed without his consent. “This is not my post loaded to my Facebook page,” he explained. “My site was hacked, some days ago.” At the time of publishing, Piotr Górka’s post and his Facebook account were no longer accessible.

“The post on Górka’s Facebook page was shared by Dariusz Walusiak’s Facebook account; the account also reposted it on the Facebook walls of more than twenty other Facebook users, including Adam Kalita, currently working at Krakow branch of the Institute of National Remembrance; Jan Kasprzyk, head of the Office for War Veterans and Victims of Oppression; and Alicja Kondraciuk, a Polish public figure living in Krakow.

“Walusiak’s Facebook account is also no longer accessible. Given his work on Polish history and identity, it seems highly unlikely he would support the Bandera measure; the DFRLab has also reached out to him for comment.

“The fact that Joker DPR’s Telegram post included screenshots of their Facebook posts raises the strong possibility that both Facebook accounts were compromised, and that hackers planted false statements on their pages that would seem out of character for them in order to gain further attention to the forged documents.”


In this example, threat actors used compromised accounts of Polish historians who have enough relevant knowledge to plausibly weigh in on the forged letter’s narrative (T0143.003: Impersonated Persona, T0097.101: Local Persona, T0097.108: Expert Persona, T0146: Account, T0150.005: Compromised, T0151.001: Social Media Platform).

This matches T0097.108: Expert Persona because the impersonation exploited Górka and Walusiak’s existing personas as experts in Polish history. | -| [I00101 Pro-Putin Disinformation Warriors Take War of Aggression to Reddit](../../generated_pages/incidents/I00101.md) | This report looks at changes content posted to communities on Reddit (called Subreddits) after teams of voluntary moderators are replaced with what appear to be pro-Russian voices:

The r/antiwar subreddit appears to be a very recent takeover target. With 12,900 members it is not the largest community on Reddit, but this does place it squarely within the top 5% of all communities in terms of membership.

Three months ago a new moderator team was instated by subreddit head u/democracy101. Any posts documenting Russian aggression in Ukraine are now swiftly removed, while the board has been flooded with posts about how Ukraine is losing, or how American “neocons wrecked” the country.

The pinned post from moderator u/n0ahbody proclaims: “People who call for an end to Russian aggressions but not the Western aggressions Russia is reacting to don’t really want peace.” This user takes the view that any negative opinion about Russia is “shaped by what the fanatically Russophobic MSM wants you to think,” and that the United States is not threatened by its neighbors. Russia is.”

When u/n0ahbody took over the sub, the user posted a triumphant and vitriolic diatribe in another pro-Russia subreddit with some 33,500 members, r/EndlessWar. “We are making progress. We are purging the sub of all NAFO and NAFO-adjacent elements. Hundreds of them have been banned over the last 24 hours for various rule infractions, for being NAFO or NAFO-adjacent,” the user said, referencing the grassroots, pro-Ukrainian North Atlantic Fella Organization (NAFO) meme movement.

Several former users have reported they have indeed been banned from r/antiwar since the change in moderators. “If this subreddit cannot be explicitly against the invasion of Ukraine it will never truly be anti-war,” wrote one user Halcyon_Rein, in the antiwar subreddit on September 6. They then edited the post to say, “Edit: btw, I got f**king banned for this 💀💀💀”


A community hosted on Reddit was taken over by new moderators (T0151.011: Community Sub-Forum, T0150.005: Compromised). These moderators removed content posted to the community which favoured Ukraine over Russia (T0146.004: Administrator Account, T0151.011: Community Sub-Forum, T0124: Suppress Opposition). | -| [I00129 Teen who hacked Joe Biden and Bill Gates' Twitter accounts sentenced to three years in prison](../../generated_pages/incidents/I00129.md) | An 18-year-old hacker who pulled off a huge breach in 2020, infiltrating several high profile Twitter accounts to solicit bitcoin transactions, has agreed to serve three years in prison for his actions.

Graham Ivan Clark, of Florida, was 17 years old at the time of the hack in July, during which he took over a number of major accounts including those of Joe Biden, Bill Gates and Kim Kardashian West.

Once he accessed them, Clark tweeted a link to a bitcoin address and wrote “all bitcoin sent to our address below will be sent back to you doubled!” According to court documents, Clark made more than $100,000 from the scheme, which his lawyers say he has since returned.

Clark was able to access the accounts after convincing an employee at Twitter he worked in the company’s information technology department, according to the Tampa Bay Times.


In this example a threat actor gained access to Twitter’s customer service portal through social engineering (T0146.004: Administrator Account, T0150.005: Compromised, T0151.008: Microblogging Platform), which they used to take over accounts of public figures (T0146.003: Verified Account, T0143.003: Impersonated Persona, T0150.005: Compromised, T0151.008: Microblogging Platform).

The threat actor used these compromised accounts to trick their followers into sending bitcoin to their wallet (T0148.009: Cryptocurrency Wallet)., An 18-year-old hacker who pulled off a huge breach in 2020, infiltrating several high profile Twitter accounts to solicit bitcoin transactions, has agreed to serve three years in prison for his actions.

Graham Ivan Clark, of Florida, was 17 years old at the time of the hack in July, during which he took over a number of major accounts including those of Joe Biden, Bill Gates and Kim Kardashian West.

Once he accessed them, Clark tweeted a link to a bitcoin address and wrote “all bitcoin sent to our address below will be sent back to you doubled!” According to court documents, Clark made more than $100,000 from the scheme, which his lawyers say he has since returned.

Clark was able to access the accounts after convincing an employee at Twitter he worked in the company’s information technology department, according to the Tampa Bay Times.


In this example a threat actor gained access to Twitter’s customer service portal through social engineering (T0146.004: Administrator Account, T0150.005: Compromised, T0151.008: Microblogging Platform), which they used to take over accounts of public figures (T0146.003: Verified Account, T0143.003: Impersonated Persona, T0150.005: Compromised, T0151.008: Microblogging Platform).

The threat actor used these compromised accounts to trick their followers into sending bitcoin to their wallet (T0148.009: Cryptocurrency Wallet). | +| [I00066 The online war between Qatar and Saudi Arabia](../../generated_pages/incidents/I00066.md) | _"In the early hours of 24 May 2017, a news story appeared on the website of Qatar's official news agency, QNA, reporting that the country's emir, Sheikh Tamim bin Hamad al-Thani, had made an astonishing speech."_

_"[…]_

_"Qatar claimed that the QNA had been hacked. And they said the hack was designed to deliberately spread fake news about the country's leader and its foreign policies. The Qataris specifically blamed UAE, an allegation later repeated by a Washington Post report which cited US intelligence sources. The UAE categorically denied those reports._

_"But the story of the emir's speech unleashed a media free-for-all. Within minutes, Saudi and UAE-owned TV networks - Al Arabiya and Sky News Arabia - picked up on the comments attributed to al-Thani. Both networks accused Qatar of funding extremist groups and of destabilising the region."_

This incident demonstrates how threat actors used a compromised website to allow for an inauthentic narrative to be given a level of credibility which caused significant political fallout (T0097.202: News Outlet Persona, T0143.003: Impersonated Persona, T0152.004: Website Asset, T0150.005: Compromised Asset). | +| [I00071 Russia-aligned hacktivists stir up anti-Ukrainian sentiments in Poland](../../generated_pages/incidents/I00071.md) | “The August 17 [2022] Telegram post [which contained a falsified letter from the Ukrainian Minister of Foreign Affairs asking Poland to rename Belwederska Street in Warsaw — the location of the Russian embassy building — as Stepan Bandera Street, in honor of the far-right nationalist who led the Ukrainian Insurgent Army during WWII] also contained screenshots of Facebook posts that appeared on two Facebook accounts belonging to Polish nationals Piotr Górka, an expert in the history of the Polish Air Force, and Dariusz Walusiak, a Polish historian and documentary maker. The Górka post suggested that he fully supported the Polish government’s decision to change Belwederska Street to Stepan Bandera Street.

“In a statement to the DFRLab, Górka said his account was accessed without his consent. “This is not my post loaded to my Facebook page,” he explained. “My site was hacked, some days ago.” At the time of publishing, Piotr Górka’s post and his Facebook account were no longer accessible.

“The post on Górka’s Facebook page was shared by Dariusz Walusiak’s Facebook account; the account also reposted it on the Facebook walls of more than twenty other Facebook users, including Adam Kalita, currently working at Krakow branch of the Institute of National Remembrance; Jan Kasprzyk, head of the Office for War Veterans and Victims of Oppression; and Alicja Kondraciuk, a Polish public figure living in Krakow.

“Walusiak’s Facebook account is also no longer accessible. Given his work on Polish history and identity, it seems highly unlikely he would support the Bandera measure; the DFRLab has also reached out to him for comment.

“The fact that Joker DPR’s Telegram post included screenshots of their Facebook posts raises the strong possibility that both Facebook accounts were compromised, and that hackers planted false statements on their pages that would seem out of character for them in order to gain further attention to the forged documents.”


In this example, threat actors used compromised accounts of Polish historians who have enough relevant knowledge to plausibly weigh in on the forged letter’s narrative (T0143.003: Impersonated Persona, T0097.101: Local Persona, T0097.108: Expert Persona, T0146: Account Asset, T0150.005: Compromised Asset, T0151.001: Social Media Platform).

This matches T0097.108: Expert Persona because the impersonation exploited Górka and Walusiak’s existing personas as experts in Polish history. | +| [I00101 Pro-Putin Disinformation Warriors Take War of Aggression to Reddit](../../generated_pages/incidents/I00101.md) | This report looks at changes content posted to communities on Reddit (called Subreddits) after teams of voluntary moderators are replaced with what appear to be pro-Russian voices:

The r/antiwar subreddit appears to be a very recent takeover target. With 12,900 members it is not the largest community on Reddit, but this does place it squarely within the top 5% of all communities in terms of membership.

Three months ago a new moderator team was instated by subreddit head u/democracy101. Any posts documenting Russian aggression in Ukraine are now swiftly removed, while the board has been flooded with posts about how Ukraine is losing, or how American “neocons wrecked” the country.

The pinned post from moderator u/n0ahbody proclaims: “People who call for an end to Russian aggressions but not the Western aggressions Russia is reacting to don’t really want peace.” This user takes the view that any negative opinion about Russia is “shaped by what the fanatically Russophobic MSM wants you to think,” and that the United States is not threatened by its neighbors. Russia is.”

When u/n0ahbody took over the sub, the user posted a triumphant and vitriolic diatribe in another pro-Russia subreddit with some 33,500 members, r/EndlessWar. “We are making progress. We are purging the sub of all NAFO and NAFO-adjacent elements. Hundreds of them have been banned over the last 24 hours for various rule infractions, for being NAFO or NAFO-adjacent,” the user said, referencing the grassroots, pro-Ukrainian North Atlantic Fella Organization (NAFO) meme movement.

Several former users have reported they have indeed been banned from r/antiwar since the change in moderators. “If this subreddit cannot be explicitly against the invasion of Ukraine it will never truly be anti-war,” wrote one user Halcyon_Rein, in the antiwar subreddit on September 6. They then edited the post to say, “Edit: btw, I got f**king banned for this 💀💀💀”


A community hosted on Reddit was taken over by new moderators (T0151.011: Community Sub-Forum, T0150.005: Compromised Asset). These moderators removed content posted to the community which favoured Ukraine over Russia (T0146.004: Administrator Account Asset, T0151.011: Community Sub-Forum, T0124: Suppress Opposition). | +| [I00129 Teen who hacked Joe Biden and Bill Gates' Twitter accounts sentenced to three years in prison](../../generated_pages/incidents/I00129.md) | An 18-year-old hacker who pulled off a huge breach in 2020, infiltrating several high profile Twitter accounts to solicit bitcoin transactions, has agreed to serve three years in prison for his actions.

Graham Ivan Clark, of Florida, was 17 years old at the time of the hack in July, during which he took over a number of major accounts including those of Joe Biden, Bill Gates and Kim Kardashian West.

Once he accessed them, Clark tweeted a link to a bitcoin address and wrote “all bitcoin sent to our address below will be sent back to you doubled!” According to court documents, Clark made more than $100,000 from the scheme, which his lawyers say he has since returned.

Clark was able to access the accounts after convincing an employee at Twitter he worked in the company’s information technology department, according to the Tampa Bay Times.


In this example a threat actor gained access to Twitter’s customer service portal through social engineering (T0146.004: Administrator Account Asset, T0150.005: Compromised Asset, T0151.008: Microblogging Platform), which they used to take over accounts of public figures (T0146.003: Verified Account Asset, T0143.003: Impersonated Persona, T0150.005: Compromised Asset, T0151.008: Microblogging Platform).

The threat actor used these compromised accounts to trick their followers into sending bitcoin to their wallet (T0148.009: Cryptocurrency Wallet)., An 18-year-old hacker who pulled off a huge breach in 2020, infiltrating several high profile Twitter accounts to solicit bitcoin transactions, has agreed to serve three years in prison for his actions.

Graham Ivan Clark, of Florida, was 17 years old at the time of the hack in July, during which he took over a number of major accounts including those of Joe Biden, Bill Gates and Kim Kardashian West.

Once he accessed them, Clark tweeted a link to a bitcoin address and wrote “all bitcoin sent to our address below will be sent back to you doubled!” According to court documents, Clark made more than $100,000 from the scheme, which his lawyers say he has since returned.

Clark was able to access the accounts after convincing an employee at Twitter he worked in the company’s information technology department, according to the Tampa Bay Times.


In this example a threat actor gained access to Twitter’s customer service portal through social engineering (T0146.004: Administrator Account Asset, T0150.005: Compromised Asset, T0151.008: Microblogging Platform), which they used to take over accounts of public figures (T0146.003: Verified Account Asset, T0143.003: Impersonated Persona, T0150.005: Compromised Asset, T0151.008: Microblogging Platform).

The threat actor used these compromised accounts to trick their followers into sending bitcoin to their wallet (T0148.009: Cryptocurrency Wallet). | diff --git a/generated_pages/techniques/T0150.006.md b/generated_pages/techniques/T0150.006.md index 1976579..bf430f7 100644 --- a/generated_pages/techniques/T0150.006.md +++ b/generated_pages/techniques/T0150.006.md @@ -1,4 +1,4 @@ -# Technique T0150.006: Purchased +# Technique T0150.006: Purchased Asset * **Summary**: A Purchased Asset is an asset which actors paid for the ownership of.

For example, threat actors have been observed selling compromised social media accounts on dark web marketplaces, which can be used to disguise operation activity. @@ -7,7 +7,7 @@ | Incident | Descriptions given for this incident | | -------- | -------------------- | -| [I00109 Coordinated Facebook Pages Designed to Fund a White Supremacist Agenda](../../generated_pages/incidents/I00109.md) | This report examines the white nationalist group Suavelos’ use of Facebook to draw visitors to its website without overtly revealing their racist ideology. This section of the report looks at technical indicators associated with the Suavelos website, and attributions which can be made as a consequence:

[The Google AdSense tag set up on Suavelos.eu was also found on the following domains, indicating that they are controlled by the same actor;] Alabastro.eu: an online shop to buy “white nationalists” t-shirts [and] ARPAC.eu: the website of a registered non-profit organisation advocating to lift regulation on gun control in France.

Other domains attributed to Suavelos (T0149.001: Domain) reveal a website set up to sell merchandise (T0152.004: Website, T0148.004: Payment Processing Capability, T0061: Sell Merchandise), and a website hosting a registered French non-profit (T0152.004: Website, T0097.207: NGO Persona).

To learn more about the suavelos.eu domain, we collected the following data: The domain is hosted on OVH; The owner’s identity is protected; The IP Address of the server is 94.23.253.173, which is shared with 20 other domains.

The relative low number of websites hosted on this IP address could indicate that they all belong to the same people, and are hosted on the same private server.<.i>

Suavelos registered a domain using the web hosting provider OVH (T0149.001: Domain, T0152.003: Website Hosting Platform, T0150.006: Purchased). The site’s IP address reveals a server hosting other domains potentially owned by the actors (T0149.005: Server, T0149.006: IP Address). | +| [I00109 Coordinated Facebook Pages Designed to Fund a White Supremacist Agenda](../../generated_pages/incidents/I00109.md) | This report examines the white nationalist group Suavelos’ use of Facebook to draw visitors to its website without overtly revealing their racist ideology. This section of the report looks at technical indicators associated with the Suavelos website, and attributions which can be made as a consequence:

[The Google AdSense tag set up on Suavelos.eu was also found on the following domains, indicating that they are controlled by the same actor;] Alabastro.eu: an online shop to buy “white nationalists” t-shirts [and] ARPAC.eu: the website of a registered non-profit organisation advocating to lift regulation on gun control in France.

Other domains attributed to Suavelos (T0149.001: Domain Asset) reveal a website set up to sell merchandise (T0152.004: Website Asset, T0148.004: Payment Processing Capability, T0061: Sell Merchandise), and a website hosting a registered French non-profit (T0152.004: Website Asset, T0097.207: NGO Persona).

To learn more about the suavelos.eu domain, we collected the following data: The domain is hosted on OVH; The owner’s identity is protected; The IP Address of the server is 94.23.253.173, which is shared with 20 other domains.

The relative low number of websites hosted on this IP address could indicate that they all belong to the same people, and are hosted on the same private server.


Suavelos registered a domain using the web hosting provider OVH (T0149.001: Domain Asset, T0152.003: Website Hosting Platform, T0150.006: Purchased). The site’s IP address reveals a server hosting other domains potentially owned by the actors (T0149.005: Server Asset, T0149.006: IP Address Asset). | diff --git a/generated_pages/techniques/T0150.007.md b/generated_pages/techniques/T0150.007.md index 6033bbb..c9988ae 100644 --- a/generated_pages/techniques/T0150.007.md +++ b/generated_pages/techniques/T0150.007.md @@ -1,4 +1,4 @@ -# Technique T0150.007: Rented +# Technique T0150.007: Rented Asset * **Summary**: A Rented Asset is an asset which actors are temporarily renting or subscribing to.

For example, threat actors have been observed renting temporary access to legitimate accounts on online platforms in order to disguise operation activity. @@ -7,8 +7,8 @@ | Incident | Descriptions given for this incident | | -------- | -------------------- | -| [I00064 Tinder nightmares: the promise and peril of political bots](../../generated_pages/incidents/I00064.md) | “In the days leading up to the UK’s [2019] general election, youths looking for love online encountered a whole new kind of Tinder nightmare. A group of young activists built a Tinder chatbot to co-opt profiles and persuade swing voters to support Labour. The bot accounts sent 30,000-40,000 messages to targeted 18-25 year olds in battleground constituencies like Dudley North, which Labour ended up winning by only 22 votes. [...]

“The activists maintain that the project was meant to foster democratic engagement. But screenshots of the bots’ activity expose a harsher reality. Images of conversations between real users and these bots, posted on i-D, Mashable, as well as on Fowler and Goodman’s public Twitter accounts, show that the bots did not identify themselves as automated accounts, instead posing as the user whose profile they had taken over. While conducting research for this story, it turned out that a number of [the reporters’ friends] living in Oxford had interacted with the bot in the lead up to the election and had no idea that it was not a real person.”


In this example people offered up their real accounts for the automation of political messaging; the actors convinced the users to give up access to their accounts to use in the operation. The actors maintained the accounts’ existing persona, and presented themselves as potential romantic suitors for legitimate platform users (T0097:109 Romantic Suitor Persona, T0143.003: Impersonated Persona, T0146: Account, T0150.007: Rented, T0151.017: Dating Platform). | -| [I00113 Inside the Shadowy World of Disinformation for Hire in Kenya](../../generated_pages/incidents/I00113.md) | Researchers at Mozilla examined influence operations targeting Kenyan citizens on Twitter in 2021, providing “a grim window into the booming and shadowy industry of Twitter influencers for political hire here in Kenya”. The report touches upon how actors gained access to twitter accounts, and what personas they presented:

Verified accounts are complicit. One influencer we spoke to mentioned that the people who own coveted “blue check” accounts will often rent them out for disinformation campaigns. These verified accounts can improve the campaign’s chances of trending. Says one interviewee: “The owner of the account usually receives a cut of the campaign loot”.

[...]

Many of the accounts we examined appear to give an aura of authenticity, but in reality they are not authentic. Simply looking at their date of creation won’t give you a hint as to their purpose. We had to dig deeper. The profile pictures and content of some of the accounts gave us the answers we were looking for. A common tactic these accounts utilize is using suggestive pictures of women to bait men into following them, or at least pay attention. In terms of content, many of these accounts tweeted off the same hashtags for days on end and will constantly retweet a specific set of accounts.


Actors participating in this operation rented out verified Twitter accounts (in 2021 a checkmark on Twitter verified a user’s identity), which were repurposed and used updated account imagery (T0146.003: Verified Account, T0150.007: Rented, T0150.004: Repurposed, T00145.006: Attractive Person Account Imagery). | +| [I00064 Tinder nightmares: the promise and peril of political bots](../../generated_pages/incidents/I00064.md) | “In the days leading up to the UK’s [2019] general election, youths looking for love online encountered a whole new kind of Tinder nightmare. A group of young activists built a Tinder chatbot to co-opt profiles and persuade swing voters to support Labour. The bot accounts sent 30,000-40,000 messages to targeted 18-25 year olds in battleground constituencies like Dudley North, which Labour ended up winning by only 22 votes. [...]

“The activists maintain that the project was meant to foster democratic engagement. But screenshots of the bots’ activity expose a harsher reality. Images of conversations between real users and these bots, posted on i-D, Mashable, as well as on Fowler and Goodman’s public Twitter accounts, show that the bots did not identify themselves as automated accounts, instead posing as the user whose profile they had taken over. While conducting research for this story, it turned out that a number of [the reporters’ friends] living in Oxford had interacted with the bot in the lead up to the election and had no idea that it was not a real person.”


In this example people offered up their real accounts for the automation of political messaging; the actors convinced the users to give up access to their accounts to use in the operation. The actors maintained the accounts’ existing persona, and presented themselves as potential romantic suitors for legitimate platform users (T0097:109 Romantic Suitor Persona, T0143.003: Impersonated Persona, T0146: Account Asset, T0150.007: Rented Asset, T0151.017: Dating Platform). | +| [I00113 Inside the Shadowy World of Disinformation for Hire in Kenya](../../generated_pages/incidents/I00113.md) | Researchers at Mozilla examined influence operations targeting Kenyan citizens on Twitter in 2021, providing “a grim window into the booming and shadowy industry of Twitter influencers for political hire here in Kenya”. The report touches upon how actors gained access to twitter accounts, and what personas they presented:

Verified accounts are complicit. One influencer we spoke to mentioned that the people who own coveted “blue check” accounts will often rent them out for disinformation campaigns. These verified accounts can improve the campaign’s chances of trending. Says one interviewee: “The owner of the account usually receives a cut of the campaign loot”.

[...]

Many of the accounts we examined appear to give an aura of authenticity, but in reality they are not authentic. Simply looking at their date of creation won’t give you a hint as to their purpose. We had to dig deeper. The profile pictures and content of some of the accounts gave us the answers we were looking for. A common tactic these accounts utilize is using suggestive pictures of women to bait men into following them, or at least pay attention. In terms of content, many of these accounts tweeted off the same hashtags for days on end and will constantly retweet a specific set of accounts.


Actors participating in this operation rented out verified Twitter accounts (in 2021 a checkmark on Twitter verified a user’s identity), which were repurposed and used updated account imagery (T0146.003: Verified Account Asset, T0150.007: Rented Asset, T0150.004: Repurposed Asset, T00145.006: Attractive Person Account Imagery). | diff --git a/generated_pages/techniques/T0150.008.md b/generated_pages/techniques/T0150.008.md index 522619a..f283df4 100644 --- a/generated_pages/techniques/T0150.008.md +++ b/generated_pages/techniques/T0150.008.md @@ -1,4 +1,4 @@ -# Technique T0150.008: Bulk Created +# Technique T0150.008: Bulk Created Asset * **Summary**: A Bulk Created Asset is an asset which was created alongside many other instances of the same asset.

Actors have been observed bulk creating Accounts on Social Media Platforms such as Facebook. Indicators of bulk asset creation include its creation date, assets’ naming conventions, their configuration (e.g. templated personas, visually similar profile pictures), or their activity (e.g. post timings, narratives posted). diff --git a/generated_pages/techniques/T0151.001.md b/generated_pages/techniques/T0151.001.md index 54bde42..7d57e57 100644 --- a/generated_pages/techniques/T0151.001.md +++ b/generated_pages/techniques/T0151.001.md @@ -8,13 +8,13 @@ | Incident | Descriptions given for this incident | | -------- | -------------------- | | [I00097 Report: Not Just Algorithms](../../generated_pages/incidents/I00097.md) | This report explores the role of four systems (recommender systems, content moderation systems, ad approval systems and ad management systems) in creating risks around eating disorders.

[...]

Content recommender systems can create risks. We created and primed ‘fake’ accounts for 16-year old Australians and found that some recommender systems will promote pro-eating disorder content to children.

Specifically: On TikTok, 0% of the content recommended was classified as pro-eating disorder content; On Instagram, 23% of the content recommended was classified as pro-eating disorder content; On X, 67% of content recommended was classified as pro-eating disorder content (and disturbingly, another 13% displayed self-harm imagery).


Content recommendation algorithms developed by Instagram (T0151.001: Social Media Platform, T0153.006: Content Recommendation Algorithm) and X (T0151.008: Microblogging Platform, T0153.006: Content Recommendation Algorithm) promoted harmful content to an account presenting as a 16 year old Australian. | -| [I00102 Ignore The Poway Synagogue Shooter’s Manifesto: Pay Attention To 8chan’s /pol/ Board](../../generated_pages/incidents/I00102.md) | On April 27, 2019, at around 11:30 a.m. local time, a young man with a semi-automatic rifle walked into the Chabad of Poway Synagogue in Poway, California. He opened fire, killing one worshipper and wounding three others. In the hours since the shooting, a manifesto, believed to be written by the shooter, began circulating online. Evidence has also surfaced that, like the Christchurch Mosque shooter, this killer began his rampage with a post on 8chan’s /pol/ board.

Although both of these attacks may seem different, since they targeted worshippers of different faiths, both shooters were united by the same fascist ideology. They were also both radicalized in the same place: 8chan’s /pol/ board.

This has been corroborated by posts on the board itself, where “anons,” as the posters call themselves, recirculated the shooter’s since-deleted post. In it, the alleged shooter claims to have been “lurking” on the site for a year and a half. He includes a link to a livestream of his rampage — which thankfully does not appear to have worked — and he also includes a pastebin link to his manifesto.

The very first response to his announcement was another anon cheering him on and telling him to “get the high score,” AKA, kill a huge number of people.


Before carrying out a mass shooting, the shooter posted a thread to 8chan’s /pol/ board. The post directed users to a variety of different platforms (T0146.006: Open Access Platform, T0151.012: Image Board Platform, T0115: Post Content, T0122: Direct Users to Alternative Platforms); a Facebook account on which the shooter attempted to livestream the shooting (T0146: Account, T0151.001: Social Media Platform); and a manifesto they had written hosted on pastebin (T0146.006: Open Access Platform, T0152.005: Paste Platform, T0115: Post Content) and uploaded to the file sharing platform Mediafire (T0152.010: File Hosting Platform, T0085.004: Develop Document).

The report looks deeper into 8chan’s /pol/ board:

8chan is a large website, which includes a number of different discussion groups about everything from anime to left-wing politics. /pol/ is one particularly active board on the website, and it is best described as a gathering place for extremely online neo-Nazis.

[...]

I’ve browsed /pol/ on an almost daily basis since the Christchurch shooting. It has not been difficult to find calls for violence. On Monday, March 25 of this year, I ran across evidence of anons translating the Christchurch shooter’s manifesto into other languages in an attempt to inspire more shootings across the globe.

This tactic can work, and today’s shooting is proof. The Poway Synagogue shooter directly cited the Christchurch shooter as his inspiration, saying he decided to carry out his attack roughly two weeks after that shooting. On /pol/, many anons refer to the Christchurch shooter, Brenton Tarrant, as “Saint Tarrant,” complete with medieval-inspired iconography.


Manifestos posted to 8chan are translated and reshared by other platform users (T0101: Create Localised Content, T0146.006: Open Access Platform, T0151.012: Image Board Platform, T0115: Post Content, T0084.004: Appropriate Content).

When I began looking through /pol/ right after the Poway Synagogue shooting, I came across several claims that the shootings had been a “false flag” aimed at making the message board look bad.

When Bellingcat tweeted out a warning about shitposting and the shooter’s manifesto, in the immediate wake of the attack, probable anons even commented on the Tweet in an attempt to deny that a channer had been behind the attack.

This is a recognizable pattern that occurs in the wake of any crimes committed by members of the board. While the initial response to the Christchurch shooter’s massacre thread was riotous glee, in the days after the shooting many anons began to claim the attack had been a false flag. This actually sparked significant division and debate between the members of /pol/. In the below image, a user mocks other anons for being unable to “believe something in your favor is real.” Another anon responds, “As the evidence comes out, its [sic] quite clear that this was a false flag.”

In his manifesto, the Poway Synagogue shooter even weighed in on this debate, accusing other anons who called the Christchurch and Tree of Life Synagogue shootings “false flags” to merely have been scared: “They can’t fathom that there are brave White men alive who have the willpower and courage it takes to say, ‘Fuck my life—I’m willing to sacrifice everything for the benefit of my race.’”


Platform users deny that their platform has been used by mass shooters to publish their manifestos (T0129.006: Deny Involvement). | -| [I00106 Facebook Is Being Flooded With Gross AI-Generated Images of Hurricane Helene Devastation](../../generated_pages/incidents/I00106.md) | As families desperately seek to find missing loved ones and communities grapple with immeasurable losses of both life and property in the wake of [2024’s] Hurricane Helene, AI slop scammers appear to be capitalizing on the moment for personal gain.

A Facebook account called "Coastal Views" usually shares calmer AI imagery of nature-filled beachside scenes. The account's banner image showcases a signpost reading "OBX Live," OBX being shorthand for North Carolina's Outer Banks islands.

But starting this weekend, the account shifted its approach dramatically, as first flagged by a social media user on X.

Instead of posting "photos" of leaping dolphins and sandy beaches, the account suddenly started publishing images of flooded mountain neighborhoods, submerged houses, and dogs sitting on top of roofs.

But instead of spreading vital information to those affected by the natural disaster, or at the very least sharing real photos of the destruction, the account is seemingly trying to use AI to cash in on all the attention the hurricane has been getting.

The account links to an Etsy page for a business called" OuterBanks2023," where somebody who goes by "Alexandr" sells AI-generated prints of horses touching snouts with sea turtles, Santa running down the shoreline with a reindeer, and sunsets over ocean waves.


A Facebook page which presented itself as being associated with North Carolina which posted AI generated images changed to posting AI generated images of hurricane damage after Hurricane Helene hit North Carolina (T0151.003: Online Community Page, T0151.001: Social Media Platform, T0115: Post Content, T0086.002: Develop AI-Generated Images (Deepfakes), T0068: Respond to Breaking News Event or Active Crisis).

The account included links (T0122: Direct Users to Alternative Platforms) to an account on Etsy, which sold prints of AI generated images (T0146: Account, T0148.007: eCommerce Platform). | -| [I00108 How you thought you support the animals and you ended up funding white supremacists](../../generated_pages/incidents/I00108.md) | This article examines the white nationalist group Suavelos’ use of Facebook to draw visitors to its website without overtly revealing their racist ideology:

Suavelos uses Facebook and other platforms to amplify its message. In order to bypass the platforms’ community standards and keep their public pages active, Facebook pages such as “I support the police” are a good vehicle to spread a specific agenda without claiming to be racist. In looking back at this Facebook page, we followed Facebook’s algorithm for related pages and found suggested Facebook pages

[...]

This amplification strategy on Facebook is successful, as according to SimilarWeb figures, it attracts around 111,000 visits every month on the Suavelos.eu website.

[...]

Revenue through online advertisements can be achieved by different platforms through targeted advertisements, like Google Adsense or Doubleclick, or related and similar sponsored content, such as Taboola. Accordingly, Suavelos.eu uses both of these websites to display advertisements and consequently receives funding from such advertisements.

Once visitors are on the website supporting its advertisement revenue, Suavelos’ goal is to then turn these visitors into regular members of Suavelos network through donations or fees, or have them continue to support Suavelos.


Suevelos created a variety of pages on Facebook which presented as centring on prosocial causes. Facebook’s algorithm helped direct users to these pages (T0092: Build Network, T0151.001: Social Media Platform, T0153.006: Content Recommendation Algorithm, T0151.003: Online Community Page, T0143.208: Social Cause Persona).

Suevelos used these pages to generate traffic for their WordPress site (T0122: Direct Users to Alternative Platforms, T0152.003: Website Hosting Platform, T0152.004: Website), which used accounts on a variety of online advertising platforms to host adverts (T0146: Account, T0153.005: Online Advertising Platform). | -| [I00109 Coordinated Facebook Pages Designed to Fund a White Supremacist Agenda](../../generated_pages/incidents/I00109.md) | This report examines the white nationalist group Suavelos’ use of Facebook to draw visitors to its website without overtly revealing their racist ideology. This section of the report looks at the Suavelos website, and the content it links out to.

In going back to Suavelos’ main page, we also found: A link to a page on a web shop: alabastro.eu; A link to a page to donate money to the founders through Tipee and to the website through PayPal; [and] a link to a private forum that gathers 3.000 members: oppidum.suavelos.eu;

Suavelos linked out to an online store which it controlled (T0152.004: Website, T0148.004: Payment Processing Capability), and to accounts on payment processing platforms PayPal and Tipee (T0146: Account, T0148.003: Payment Processing Platform).

The Suavelos website also hosted a private forum (T0151.009: Legacy Online Forum Platform, T0155: Gated Asset), and linked out to a variety of assets it controlled on other online platforms: accounts on Twitter (T0146: Account, T0151.008: Microblogging Platform), YouTube (T0146: Account, T0152.006: Video Platform), Instagram and VKontakte (T0146: Account, T0151.001: Social Media Platform). | -| [I00114 ‘Carol’s Journey’: What Facebook knew about how it radicalized users](../../generated_pages/incidents/I00114.md) | This report examines internal Facebook communications which reveal employees’ concerns about how the platform’s algorithm was recommending users join extremist conspiracy groups.

In summer 2019, a new Facebook user named Carol Smith signed up for the platform, describing herself as a politically conservative mother from Wilmington, North Carolina. Smith’s account indicated an interest in politics, parenting and Christianity and followed a few of her favorite brands, including Fox News and then-President Donald Trump.

Though Smith had never expressed interest in conspiracy theories, in just two days Facebook was recommending she join groups dedicated to QAnon, a sprawling and baseless conspiracy theory and movement that claimed Trump was secretly saving the world from a cabal of pedophiles and Satanists.

Smith didn’t follow the recommended QAnon groups, but whatever algorithm Facebook was using to determine how she should engage with the platform pushed ahead just the same. Within one week, Smith’s feed was full of groups and pages that had violated Facebook’s own rules, including those against hate speech and disinformation.

Smith wasn’t a real person. A researcher employed by Facebook invented the account, along with those of other fictitious “test users” in 2019 and 2020, as part of an experiment in studying the platform’s role in misinforming and polarizing users through its recommendations systems.

That researcher said Smith’s Facebook experience was “a barrage of extreme, conspiratorial, and graphic content.”


Facebook’s Algorithm suggested users join groups which supported the QAnon movement (T0151.001: Social Media Platform, T0151.002: Online Community Group, T0153.006: Content Recommendation Algorithm, T0097.208: Social Cause Persona).

Further investigation by Facebook uncovered that its advertising platform had been used to promote QAnon narratives (T0146: Account, T0114: Deliver Ads, T0153.005: Online Advertising Platform):

For years, company researchers had been running experiments like Carol Smith’s to gauge the platform’s hand in radicalizing users, according to the documents seen by NBC News.

This internal work repeatedly found that recommendation tools pushed users into extremist groups, findings that helped inform policy changes and tweaks to recommendations and news feed rankings. Those rankings are a tentacled, ever-evolving system widely known as “the algorithm” that pushes content to users. But the research at that time stopped well short of inspiring any movement to change the groups and pages themselves.

That reluctance was indicative of “a pattern at Facebook,” Haugen told reporters this month. “They want the shortest path between their current policies and any action.”

[...]

By summer 2020, Facebook was hosting thousands of private QAnon groups and pages, with millions of members and followers, according to an unreleased internal investigation.

A year after the FBI designated QAnon as a potential domestic terrorist threat in the wake of standoffs, alleged planned kidnappings, harassment campaigns and shootings, Facebook labeled QAnon a “Violence Inciting Conspiracy Network” and banned it from the platform, along with militias and other violent social movements. A small team working across several of Facebook’s departments found its platforms had hosted hundreds of ads on Facebook and Instagram worth thousands of dollars and millions of views, “praising, supporting, or representing” the conspiracy theory.

[...]

For many employees inside Facebook, the enforcement came too late, according to posts left on Workplace, the company’s internal message board.

“We’ve known for over a year now that our recommendation systems can very quickly lead users down the path to conspiracy theories and groups,” one integrity researcher, whose name had been redacted, wrote in a post announcing she was leaving the company. “This fringe group has grown to national prominence, with QAnon congressional candidates and QAnon hashtags and groups trending in the mainstream. We were willing to act only * after * things had spiraled into a dire state.”

While Facebook’s ban initially appeared effective, a problem remained: The removal of groups and pages didn’t wipe out QAnon’s most extreme followers, who continued to organize on the platform.

“There was enough evidence to raise red flags in the expert community that Facebook and other platforms failed to address QAnon’s violent extremist dimension,” said Marc-André Argentino, a research fellow at King’s College London’s International Centre for the Study of Radicalisation, who has extensively studied QAnon.

Believers simply rebranded as anti-child-trafficking groups or migrated to other communities, including those around the anti-vaccine movement.

[...]

These conspiracy groups had become the fastest-growing groups on Facebook, according to the report, but Facebook wasn’t able to control their “meteoric growth,” the researchers wrote, “because we were looking at each entity individually, rather than as a cohesive movement.” A Facebook spokesperson told BuzzFeed News it took many steps to limit election misinformation but that it was unable to catch everything.
| -| [I00115 How Facebook shapes your feed](../../generated_pages/incidents/I00115.md) | This 2021 report by The Washington Post explains the mechanics of Facebook’s algorithm (T0151.001: Social Media Platform, T0153.006: Content Recommendation Algorithm):

In its early years, Facebook’s algorithm prioritized signals such as likes, clicks and comments to decide which posts to amplify. Publishers, brands and individual users soon learned how to craft posts and headlines designed to induce likes and clicks, giving rise to what came to be known as “clickbait.” By 2013, upstart publishers such as Upworthy and ViralNova were amassing tens of millions of readers with articles designed specifically to game Facebook’s news feed algorithm.

Facebook realized that users were growing wary of misleading teaser headlines, and the company recalibrated its algorithm in 2014 and 2015 to downgrade clickbait and focus on new metrics, such as the amount of time a user spent reading a story or watching a video, and incorporating surveys on what content users found most valuable. Around the same time, its executives identified video as a business priority, and used the algorithm to boost “native” videos shared directly to Facebook. By the mid-2010s, the news feed had tilted toward slick, professionally produced content, especially videos that would hold people’s attention.

In 2016, however, Facebook executives grew worried about a decline in “original sharing.” Users were spending so much time passively watching and reading that they weren’t interacting with each other as much. Young people in particular shifted their personal conversations to rivals such as Snapchat that offered more intimacy.

Once again, Facebook found its answer in the algorithm: It developed a new set of goal metrics that it called “meaningful social interactions,” designed to show users more posts from friends and family, and fewer from big publishers and brands. In particular, the algorithm began to give outsize weight to posts that sparked lots of comments and replies.

The downside of this approach was that the posts that sparked the most comments tended to be the ones that made people angry or offended them, the documents show. Facebook became an angrier, more polarizing place. It didn’t help that, starting in 2017, the algorithm had assigned reaction emoji — including the angry emoji — five times the weight of a simple “like,” according to company documents.

[...]

Internal documents show Facebook researchers found that, for the most politically oriented 1 million American users, nearly 90 percent of the content that Facebook shows them is about politics and social issues. Those groups also received the most misinformation, especially a set of users associated with mostly right-leaning content, who were shown one misinformation post out of every 40, according to a document from June 2020.

One takeaway is that Facebook’s algorithm isn’t a runaway train. The company may not directly control what any given user posts, but by choosing which types of posts will be seen, it sculpts the information landscape according to its business priorities. Some within the company would like to see Facebook use the algorithm to explicitly promote certain values, such as democracy and civil discourse. Others have suggested that it develop and prioritize new metrics that align with users’ values, as with a 2020 experiment in which the algorithm was trained to predict what posts they would find “good for the world” and “bad for the world,” and optimize for the former.
| -| [I00128 #TrollTracker: Outward Influence Operation From Iran](../../generated_pages/incidents/I00128.md) | [Meta removed a network of assets for coordinated inauthentic behaviour. One page] in the network, @StopMEK, was promoting views against the People’s Mujahedin of Iran (MEK), the largest and most active political opposition group against the Islamic Republic of Iran Leadership.

The content on the page drew narratives showing parallels between the Islamic State of Iraq and Syria (ISIS) and the MEK.

Apart from images and memes, the @StopMEK page shared a link to an archived report on how the United States was monitoring the MEK’s movement in Iran in the mid-1990’s. The file was embedded as a QR code on one of the page’s images.


In this example a Facebook page presented itself as focusing on a political cause (T0097.208: Social Cause Persona, T0151.001: Social Media Platform, T0151.002: Online Community Group). Within the page it embedded a QR code (T0122: Direct Users to Alternative Platforms, T0153.004: QR Code), which took users to a document hosted on another website (T0152.004: Website). | +| [I00102 Ignore The Poway Synagogue Shooter’s Manifesto: Pay Attention To 8chan’s /pol/ Board](../../generated_pages/incidents/I00102.md) | On April 27, 2019, at around 11:30 a.m. local time, a young man with a semi-automatic rifle walked into the Chabad of Poway Synagogue in Poway, California. He opened fire, killing one worshipper and wounding three others. In the hours since the shooting, a manifesto, believed to be written by the shooter, began circulating online. Evidence has also surfaced that, like the Christchurch Mosque shooter, this killer began his rampage with a post on 8chan’s /pol/ board.

Although both of these attacks may seem different, since they targeted worshippers of different faiths, both shooters were united by the same fascist ideology. They were also both radicalized in the same place: 8chan’s /pol/ board.

This has been corroborated by posts on the board itself, where “anons,” as the posters call themselves, recirculated the shooter’s since-deleted post. In it, the alleged shooter claims to have been “lurking” on the site for a year and a half. He includes a link to a livestream of his rampage — which thankfully does not appear to have worked — and he also includes a pastebin link to his manifesto.

The very first response to his announcement was another anon cheering him on and telling him to “get the high score,” AKA, kill a huge number of people.


Before carrying out a mass shooting, the shooter posted a thread to 8chan’s /pol/ board. The post directed users to a variety of different platforms (T0146.006: Open Access Platform, T0151.012: Image Board Platform, T0115: Post Content, T0122: Direct Users to Alternative Platforms); a Facebook account on which the shooter attempted to livestream the shooting (T0146: Account Asset, T0151.001: Social Media Platform); and a manifesto they had written hosted on pastebin (T0146.006: Open Access Platform, T0152.005: Paste Platform, T0115: Post Content) and uploaded to the file sharing platform Mediafire (T0152.010: File Hosting Platform, T0085.004: Develop Document).

The report looks deeper into 8chan’s /pol/ board:

8chan is a large website, which includes a number of different discussion groups about everything from anime to left-wing politics. /pol/ is one particularly active board on the website, and it is best described as a gathering place for extremely online neo-Nazis.

[...]

I’ve browsed /pol/ on an almost daily basis since the Christchurch shooting. It has not been difficult to find calls for violence. On Monday, March 25 of this year, I ran across evidence of anons translating the Christchurch shooter’s manifesto into other languages in an attempt to inspire more shootings across the globe.

This tactic can work, and today’s shooting is proof. The Poway Synagogue shooter directly cited the Christchurch shooter as his inspiration, saying he decided to carry out his attack roughly two weeks after that shooting. On /pol/, many anons refer to the Christchurch shooter, Brenton Tarrant, as “Saint Tarrant,” complete with medieval-inspired iconography.


Manifestos posted to 8chan are translated and reshared by other platform users (T0101: Create Localised Content, T0146.006: Open Access Platform, T0151.012: Image Board Platform, T0115: Post Content, T0084.004: Appropriate Content).

When I began looking through /pol/ right after the Poway Synagogue shooting, I came across several claims that the shootings had been a “false flag” aimed at making the message board look bad.

When Bellingcat tweeted out a warning about shitposting and the shooter’s manifesto, in the immediate wake of the attack, probable anons even commented on the Tweet in an attempt to deny that a channer had been behind the attack.

This is a recognizable pattern that occurs in the wake of any crimes committed by members of the board. While the initial response to the Christchurch shooter’s massacre thread was riotous glee, in the days after the shooting many anons began to claim the attack had been a false flag. This actually sparked significant division and debate between the members of /pol/. In the below image, a user mocks other anons for being unable to “believe something in your favor is real.” Another anon responds, “As the evidence comes out, its [sic] quite clear that this was a false flag.”

In his manifesto, the Poway Synagogue shooter even weighed in on this debate, accusing other anons who called the Christchurch and Tree of Life Synagogue shootings “false flags” to merely have been scared: “They can’t fathom that there are brave White men alive who have the willpower and courage it takes to say, ‘Fuck my life—I’m willing to sacrifice everything for the benefit of my race.’”


Platform users deny that their platform has been used by mass shooters to publish their manifestos (T0129.006: Deny Involvement). | +| [I00106 Facebook Is Being Flooded With Gross AI-Generated Images of Hurricane Helene Devastation](../../generated_pages/incidents/I00106.md) | As families desperately seek to find missing loved ones and communities grapple with immeasurable losses of both life and property in the wake of [2024’s] Hurricane Helene, AI slop scammers appear to be capitalizing on the moment for personal gain.

A Facebook account called "Coastal Views" usually shares calmer AI imagery of nature-filled beachside scenes. The account's banner image showcases a signpost reading "OBX Live," OBX being shorthand for North Carolina's Outer Banks islands.

But starting this weekend, the account shifted its approach dramatically, as first flagged by a social media user on X.

Instead of posting "photos" of leaping dolphins and sandy beaches, the account suddenly started publishing images of flooded mountain neighborhoods, submerged houses, and dogs sitting on top of roofs.

But instead of spreading vital information to those affected by the natural disaster, or at the very least sharing real photos of the destruction, the account is seemingly trying to use AI to cash in on all the attention the hurricane has been getting.

The account links to an Etsy page for a business called" OuterBanks2023," where somebody who goes by "Alexandr" sells AI-generated prints of horses touching snouts with sea turtles, Santa running down the shoreline with a reindeer, and sunsets over ocean waves.


A Facebook page which presented itself as being associated with North Carolina which posted AI generated images changed to posting AI generated images of hurricane damage after Hurricane Helene hit North Carolina (T0151.003: Online Community Page, T0151.001: Social Media Platform, T0115: Post Content, T0086.002: Develop AI-Generated Images (Deepfakes), T0068: Respond to Breaking News Event or Active Crisis).

The account included links (T0122: Direct Users to Alternative Platforms) to an account on Etsy, which sold prints of AI generated images (T0146: Account Asset, T0148.007: eCommerce Platform). | +| [I00108 How you thought you support the animals and you ended up funding white supremacists](../../generated_pages/incidents/I00108.md) | This article examines the white nationalist group Suavelos’ use of Facebook to draw visitors to its website without overtly revealing their racist ideology:

Suavelos uses Facebook and other platforms to amplify its message. In order to bypass the platforms’ community standards and keep their public pages active, Facebook pages such as “I support the police” are a good vehicle to spread a specific agenda without claiming to be racist. In looking back at this Facebook page, we followed Facebook’s algorithm for related pages and found suggested Facebook pages

[...]

This amplification strategy on Facebook is successful, as according to SimilarWeb figures, it attracts around 111,000 visits every month on the Suavelos.eu website.

[...]

Revenue through online advertisements can be achieved by different platforms through targeted advertisements, like Google Adsense or Doubleclick, or related and similar sponsored content, such as Taboola. Accordingly, Suavelos.eu uses both of these websites to display advertisements and consequently receives funding from such advertisements.

Once visitors are on the website supporting its advertisement revenue, Suavelos’ goal is to then turn these visitors into regular members of Suavelos network through donations or fees, or have them continue to support Suavelos.


Suevelos created a variety of pages on Facebook which presented as centring on prosocial causes. Facebook’s algorithm helped direct users to these pages (T0092: Build Network, T0151.001: Social Media Platform, T0153.006: Content Recommendation Algorithm, T0151.003: Online Community Page, T0143.208: Social Cause Persona).

Suevelos used these pages to generate traffic for their WordPress site (T0122: Direct Users to Alternative Platforms, T0152.003: Website Hosting Platform, T0152.004: Website Asset), which used accounts on a variety of online advertising platforms to host adverts (T0146: Account Asset, T0153.005: Online Advertising Platform). | +| [I00109 Coordinated Facebook Pages Designed to Fund a White Supremacist Agenda](../../generated_pages/incidents/I00109.md) | This report examines the white nationalist group Suavelos’ use of Facebook to draw visitors to its website without overtly revealing their racist ideology. This section of the report looks at the Suavelos website, and the content it links out to.

In going back to Suavelos’ main page, we also found: A link to a page on a web shop: alabastro.eu; A link to a page to donate money to the founders through Tipee and to the website through PayPal; [and] a link to a private forum that gathers 3.000 members: oppidum.suavelos.eu;

Suavelos linked out to an online store which it controlled (T0152.004: Website Asset, T0148.004: Payment Processing Capability), and to accounts on payment processing platforms PayPal and Tipee (T0146: Account Asset, T0148.003: Payment Processing Platform).

The Suavelos website also hosted a private forum (T0151.009: Legacy Online Forum Platform, T0155: Gated Asset), and linked out to a variety of assets it controlled on other online platforms: accounts on Twitter (T0146: Account Asset, T0151.008: Microblogging Platform), YouTube (T0146: Account Asset, T0152.006: Video Platform), Instagram and VKontakte (T0146: Account Asset, T0151.001: Social Media Platform). | +| [I00114 ‘Carol’s Journey’: What Facebook knew about how it radicalized users](../../generated_pages/incidents/I00114.md) | This report examines internal Facebook communications which reveal employees’ concerns about how the platform’s algorithm was recommending users join extremist conspiracy groups.

In summer 2019, a new Facebook user named Carol Smith signed up for the platform, describing herself as a politically conservative mother from Wilmington, North Carolina. Smith’s account indicated an interest in politics, parenting and Christianity and followed a few of her favorite brands, including Fox News and then-President Donald Trump.

Though Smith had never expressed interest in conspiracy theories, in just two days Facebook was recommending she join groups dedicated to QAnon, a sprawling and baseless conspiracy theory and movement that claimed Trump was secretly saving the world from a cabal of pedophiles and Satanists.

Smith didn’t follow the recommended QAnon groups, but whatever algorithm Facebook was using to determine how she should engage with the platform pushed ahead just the same. Within one week, Smith’s feed was full of groups and pages that had violated Facebook’s own rules, including those against hate speech and disinformation.

Smith wasn’t a real person. A researcher employed by Facebook invented the account, along with those of other fictitious “test users” in 2019 and 2020, as part of an experiment in studying the platform’s role in misinforming and polarizing users through its recommendations systems.

That researcher said Smith’s Facebook experience was “a barrage of extreme, conspiratorial, and graphic content.”


Facebook’s Algorithm suggested users join groups which supported the QAnon movement (T0151.001: Social Media Platform, T0151.002: Online Community Group, T0153.006: Content Recommendation Algorithm, T0097.208: Social Cause Persona).

Further investigation by Facebook uncovered that its advertising platform had been used to promote QAnon narratives (T0146: Account Asset, T0114: Deliver Ads, T0153.005: Online Advertising Platform):

For years, company researchers had been running experiments like Carol Smith’s to gauge the platform’s hand in radicalizing users, according to the documents seen by NBC News.

This internal work repeatedly found that recommendation tools pushed users into extremist groups, findings that helped inform policy changes and tweaks to recommendations and news feed rankings. Those rankings are a tentacled, ever-evolving system widely known as “the algorithm” that pushes content to users. But the research at that time stopped well short of inspiring any movement to change the groups and pages themselves.

That reluctance was indicative of “a pattern at Facebook,” Haugen told reporters this month. “They want the shortest path between their current policies and any action.”

[...]

By summer 2020, Facebook was hosting thousands of private QAnon groups and pages, with millions of members and followers, according to an unreleased internal investigation.

A year after the FBI designated QAnon as a potential domestic terrorist threat in the wake of standoffs, alleged planned kidnappings, harassment campaigns and shootings, Facebook labeled QAnon a “Violence Inciting Conspiracy Network” and banned it from the platform, along with militias and other violent social movements. A small team working across several of Facebook’s departments found its platforms had hosted hundreds of ads on Facebook and Instagram worth thousands of dollars and millions of views, “praising, supporting, or representing” the conspiracy theory.

[...]

For many employees inside Facebook, the enforcement came too late, according to posts left on Workplace, the company’s internal message board.

“We’ve known for over a year now that our recommendation systems can very quickly lead users down the path to conspiracy theories and groups,” one integrity researcher, whose name had been redacted, wrote in a post announcing she was leaving the company. “This fringe group has grown to national prominence, with QAnon congressional candidates and QAnon hashtags and groups trending in the mainstream. We were willing to act only * after * things had spiraled into a dire state.”

While Facebook’s ban initially appeared effective, a problem remained: The removal of groups and pages didn’t wipe out QAnon’s most extreme followers, who continued to organize on the platform.

“There was enough evidence to raise red flags in the expert community that Facebook and other platforms failed to address QAnon’s violent extremist dimension,” said Marc-André Argentino, a research fellow at King’s College London’s International Centre for the Study of Radicalisation, who has extensively studied QAnon.

Believers simply rebranded as anti-child-trafficking groups or migrated to other communities, including those around the anti-vaccine movement.

[...]

These conspiracy groups had become the fastest-growing groups on Facebook, according to the report, but Facebook wasn’t able to control their “meteoric growth,” the researchers wrote, “because we were looking at each entity individually, rather than as a cohesive movement.” A Facebook spokesperson told BuzzFeed News it took many steps to limit election misinformation but that it was unable to catch everything.
| +| [I00115 How Facebook shapes your feed](../../generated_pages/incidents/I00115.md) | This 2021 report by The Washington Post explains the mechanics of Facebook’s algorithm (T0151.001: Social Media Platform, T0153.006: Content Recommendation Algorithm):

In its early years, Facebook’s algorithm prioritized signals such as likes, clicks and comments to decide which posts to amplify. Publishers, brands and individual users soon learned how to craft posts and headlines designed to induce likes and clicks, giving rise to what came to be known as “clickbait.” By 2013, upstart publishers such as Upworthy and ViralNova were amassing tens of millions of readers with articles designed specifically to game Facebook’s news feed algorithm.

Facebook realized that users were growing wary of misleading teaser headlines, and the company recalibrated its algorithm in 2014 and 2015 to downgrade clickbait and focus on new metrics, such as the amount of time a user spent reading a story or watching a video, and incorporating surveys on what content users found most valuable. Around the same time, its executives identified video as a business priority, and used the algorithm to boost “native” videos shared directly to Facebook. By the mid-2010s, the news feed had tilted toward slick, professionally produced content, especially videos that would hold people’s attention.

In 2016, however, Facebook executives grew worried about a decline in “original sharing.” Users were spending so much time passively watching and reading that they weren’t interacting with each other as much. Young people in particular shifted their personal conversations to rivals such as Snapchat that offered more intimacy.

Once again, Facebook found its answer in the algorithm: It developed a new set of goal metrics that it called “meaningful social interactions,” designed to show users more posts from friends and family, and fewer from big publishers and brands. In particular, the algorithm began to give outsize weight to posts that sparked lots of comments and replies.

The downside of this approach was that the posts that sparked the most comments tended to be the ones that made people angry or offended them, the documents show. Facebook became an angrier, more polarizing place. It didn’t help that, starting in 2017, the algorithm had assigned reaction emoji — including the angry emoji — five times the weight of a simple “like,” according to company documents.

[...]

Internal documents show Facebook researchers found that, for the most politically oriented 1 million American users, nearly 90 percent of the content that Facebook shows them is about politics and social issues. Those groups also received the most misinformation, especially a set of users associated with mostly right-leaning content, who were shown one misinformation post out of every 40, according to a document from June 2020.

One takeaway is that Facebook’s algorithm isn’t a runaway train. The company may not directly control what any given user posts, but by choosing which types of posts will be seen, it sculpts the information landscape according to its business priorities. Some within the company would like to see Facebook use the algorithm to explicitly promote certain values, such as democracy and civil discourse. Others have suggested that it develop and prioritize new metrics that align with users’ values, as with a 2020 experiment in which the algorithm was trained to predict what posts they would find “good for the world” and “bad for the world,” and optimize for the former.
| +| [I00128 #TrollTracker: Outward Influence Operation From Iran](../../generated_pages/incidents/I00128.md) | [Meta removed a network of assets for coordinated inauthentic behaviour. One page] in the network, @StopMEK, was promoting views against the People’s Mujahedin of Iran (MEK), the largest and most active political opposition group against the Islamic Republic of Iran Leadership.

The content on the page drew narratives showing parallels between the Islamic State of Iraq and Syria (ISIS) and the MEK.

Apart from images and memes, the @StopMEK page shared a link to an archived report on how the United States was monitoring the MEK’s movement in Iran in the mid-1990’s. The file was embedded as a QR code on one of the page’s images.


In this example a Facebook page presented itself as focusing on a political cause (T0097.208: Social Cause Persona, T0151.001: Social Media Platform, T0151.002: Online Community Group). Within the page it embedded a QR code (T0122: Direct Users to Alternative Platforms, T0153.004: QR Code Asset), which took users to a document hosted on another website (T0152.004: Website Asset). | diff --git a/generated_pages/techniques/T0151.002.md b/generated_pages/techniques/T0151.002.md index e8a3d9d..604e0b4 100644 --- a/generated_pages/techniques/T0151.002.md +++ b/generated_pages/techniques/T0151.002.md @@ -7,10 +7,10 @@ | Incident | Descriptions given for this incident | | -------- | -------------------- | -| [I00105 Gaming the System: The Use of Gaming-Adjacent Communication, Game and Mod Platforms by Extremist Actors](../../generated_pages/incidents/I00105.md) | In this report, researchers look at online platforms commonly used by people who play videogames, looking at how these platforms can contribute to radicalisation of gamers:

Indie DB [is a platform that serves] to present indie games, which are titles from independent, small developer teams, which can be discussed and downloaded [Indie DB].

[...]

[On Indie DB we] found antisemitic, Islamist, sexist and other discriminatory content during the exploration. Both games and comments were located that made positive references to National Socialism. Radicalised users seem to use the opportunities to network, create groups, and communicate in forums. In addition, a number of member profiles with graphic propaganda content could be located. We found several games with propagandistic content advertised on the platform, which caused apparently radicalised users to form a fan community around those games. For example, there are titles such as the antisemitic Fursan Al-Aqsa: The Knights of the Al-Aqsa Mosque, which has won the Best Hardcore Game award at the Game Connection America 2024 Game Development Awards and which has received antisemitic praise on its review page. In the game, players need to target members of the Israeli Defence Forces, and attacks by Palestinian terrorist groups such as Hamas or Lions’ Den can be re-enacted. These include bomb attacks, beheadings and the re-enactment of the terrorist attack in Israel on 7 October 2023. We, therefore, deem Indie DB to be relevant for further analyses of extremist activities in digital gaming spaces.


Indie DB is an online software delivery platform on which users can create groups, and participate in discussion forums (T0152.009: Software Delivery Platform, T0151.002: Online Community Group, T0151.009: Legacy Online Forum Platform). The platform hosted games which allowed players to reenact terrorist attacks (T0147.001: Game). | -| [I00114 ‘Carol’s Journey’: What Facebook knew about how it radicalized users](../../generated_pages/incidents/I00114.md) | This report examines internal Facebook communications which reveal employees’ concerns about how the platform’s algorithm was recommending users join extremist conspiracy groups.

In summer 2019, a new Facebook user named Carol Smith signed up for the platform, describing herself as a politically conservative mother from Wilmington, North Carolina. Smith’s account indicated an interest in politics, parenting and Christianity and followed a few of her favorite brands, including Fox News and then-President Donald Trump.

Though Smith had never expressed interest in conspiracy theories, in just two days Facebook was recommending she join groups dedicated to QAnon, a sprawling and baseless conspiracy theory and movement that claimed Trump was secretly saving the world from a cabal of pedophiles and Satanists.

Smith didn’t follow the recommended QAnon groups, but whatever algorithm Facebook was using to determine how she should engage with the platform pushed ahead just the same. Within one week, Smith’s feed was full of groups and pages that had violated Facebook’s own rules, including those against hate speech and disinformation.

Smith wasn’t a real person. A researcher employed by Facebook invented the account, along with those of other fictitious “test users” in 2019 and 2020, as part of an experiment in studying the platform’s role in misinforming and polarizing users through its recommendations systems.

That researcher said Smith’s Facebook experience was “a barrage of extreme, conspiratorial, and graphic content.”


Facebook’s Algorithm suggested users join groups which supported the QAnon movement (T0151.001: Social Media Platform, T0151.002: Online Community Group, T0153.006: Content Recommendation Algorithm, T0097.208: Social Cause Persona).

Further investigation by Facebook uncovered that its advertising platform had been used to promote QAnon narratives (T0146: Account, T0114: Deliver Ads, T0153.005: Online Advertising Platform):

For years, company researchers had been running experiments like Carol Smith’s to gauge the platform’s hand in radicalizing users, according to the documents seen by NBC News.

This internal work repeatedly found that recommendation tools pushed users into extremist groups, findings that helped inform policy changes and tweaks to recommendations and news feed rankings. Those rankings are a tentacled, ever-evolving system widely known as “the algorithm” that pushes content to users. But the research at that time stopped well short of inspiring any movement to change the groups and pages themselves.

That reluctance was indicative of “a pattern at Facebook,” Haugen told reporters this month. “They want the shortest path between their current policies and any action.”

[...]

By summer 2020, Facebook was hosting thousands of private QAnon groups and pages, with millions of members and followers, according to an unreleased internal investigation.

A year after the FBI designated QAnon as a potential domestic terrorist threat in the wake of standoffs, alleged planned kidnappings, harassment campaigns and shootings, Facebook labeled QAnon a “Violence Inciting Conspiracy Network” and banned it from the platform, along with militias and other violent social movements. A small team working across several of Facebook’s departments found its platforms had hosted hundreds of ads on Facebook and Instagram worth thousands of dollars and millions of views, “praising, supporting, or representing” the conspiracy theory.

[...]

For many employees inside Facebook, the enforcement came too late, according to posts left on Workplace, the company’s internal message board.

“We’ve known for over a year now that our recommendation systems can very quickly lead users down the path to conspiracy theories and groups,” one integrity researcher, whose name had been redacted, wrote in a post announcing she was leaving the company. “This fringe group has grown to national prominence, with QAnon congressional candidates and QAnon hashtags and groups trending in the mainstream. We were willing to act only * after * things had spiraled into a dire state.”

While Facebook’s ban initially appeared effective, a problem remained: The removal of groups and pages didn’t wipe out QAnon’s most extreme followers, who continued to organize on the platform.

“There was enough evidence to raise red flags in the expert community that Facebook and other platforms failed to address QAnon’s violent extremist dimension,” said Marc-André Argentino, a research fellow at King’s College London’s International Centre for the Study of Radicalisation, who has extensively studied QAnon.

Believers simply rebranded as anti-child-trafficking groups or migrated to other communities, including those around the anti-vaccine movement.

[...]

These conspiracy groups had become the fastest-growing groups on Facebook, according to the report, but Facebook wasn’t able to control their “meteoric growth,” the researchers wrote, “because we were looking at each entity individually, rather than as a cohesive movement.” A Facebook spokesperson told BuzzFeed News it took many steps to limit election misinformation but that it was unable to catch everything.
| +| [I00105 Gaming the System: The Use of Gaming-Adjacent Communication, Game and Mod Platforms by Extremist Actors](../../generated_pages/incidents/I00105.md) | In this report, researchers look at online platforms commonly used by people who play videogames, looking at how these platforms can contribute to radicalisation of gamers:

Indie DB [is a platform that serves] to present indie games, which are titles from independent, small developer teams, which can be discussed and downloaded [Indie DB].

[...]

[On Indie DB we] found antisemitic, Islamist, sexist and other discriminatory content during the exploration. Both games and comments were located that made positive references to National Socialism. Radicalised users seem to use the opportunities to network, create groups, and communicate in forums. In addition, a number of member profiles with graphic propaganda content could be located. We found several games with propagandistic content advertised on the platform, which caused apparently radicalised users to form a fan community around those games. For example, there are titles such as the antisemitic Fursan Al-Aqsa: The Knights of the Al-Aqsa Mosque, which has won the Best Hardcore Game award at the Game Connection America 2024 Game Development Awards and which has received antisemitic praise on its review page. In the game, players need to target members of the Israeli Defence Forces, and attacks by Palestinian terrorist groups such as Hamas or Lions’ Den can be re-enacted. These include bomb attacks, beheadings and the re-enactment of the terrorist attack in Israel on 7 October 2023. We, therefore, deem Indie DB to be relevant for further analyses of extremist activities in digital gaming spaces.


Indie DB is an online software delivery platform on which users can create groups, and participate in discussion forums (T0152.009: Software Delivery Platform, T0151.002: Online Community Group, T0151.009: Legacy Online Forum Platform). The platform hosted games which allowed players to reenact terrorist attacks (T0147.001: Game Asset). | +| [I00114 ‘Carol’s Journey’: What Facebook knew about how it radicalized users](../../generated_pages/incidents/I00114.md) | This report examines internal Facebook communications which reveal employees’ concerns about how the platform’s algorithm was recommending users join extremist conspiracy groups.

In summer 2019, a new Facebook user named Carol Smith signed up for the platform, describing herself as a politically conservative mother from Wilmington, North Carolina. Smith’s account indicated an interest in politics, parenting and Christianity and followed a few of her favorite brands, including Fox News and then-President Donald Trump.

Though Smith had never expressed interest in conspiracy theories, in just two days Facebook was recommending she join groups dedicated to QAnon, a sprawling and baseless conspiracy theory and movement that claimed Trump was secretly saving the world from a cabal of pedophiles and Satanists.

Smith didn’t follow the recommended QAnon groups, but whatever algorithm Facebook was using to determine how she should engage with the platform pushed ahead just the same. Within one week, Smith’s feed was full of groups and pages that had violated Facebook’s own rules, including those against hate speech and disinformation.

Smith wasn’t a real person. A researcher employed by Facebook invented the account, along with those of other fictitious “test users” in 2019 and 2020, as part of an experiment in studying the platform’s role in misinforming and polarizing users through its recommendations systems.

That researcher said Smith’s Facebook experience was “a barrage of extreme, conspiratorial, and graphic content.”


Facebook’s Algorithm suggested users join groups which supported the QAnon movement (T0151.001: Social Media Platform, T0151.002: Online Community Group, T0153.006: Content Recommendation Algorithm, T0097.208: Social Cause Persona).

Further investigation by Facebook uncovered that its advertising platform had been used to promote QAnon narratives (T0146: Account Asset, T0114: Deliver Ads, T0153.005: Online Advertising Platform):

For years, company researchers had been running experiments like Carol Smith’s to gauge the platform’s hand in radicalizing users, according to the documents seen by NBC News.

This internal work repeatedly found that recommendation tools pushed users into extremist groups, findings that helped inform policy changes and tweaks to recommendations and news feed rankings. Those rankings are a tentacled, ever-evolving system widely known as “the algorithm” that pushes content to users. But the research at that time stopped well short of inspiring any movement to change the groups and pages themselves.

That reluctance was indicative of “a pattern at Facebook,” Haugen told reporters this month. “They want the shortest path between their current policies and any action.”

[...]

By summer 2020, Facebook was hosting thousands of private QAnon groups and pages, with millions of members and followers, according to an unreleased internal investigation.

A year after the FBI designated QAnon as a potential domestic terrorist threat in the wake of standoffs, alleged planned kidnappings, harassment campaigns and shootings, Facebook labeled QAnon a “Violence Inciting Conspiracy Network” and banned it from the platform, along with militias and other violent social movements. A small team working across several of Facebook’s departments found its platforms had hosted hundreds of ads on Facebook and Instagram worth thousands of dollars and millions of views, “praising, supporting, or representing” the conspiracy theory.

[...]

For many employees inside Facebook, the enforcement came too late, according to posts left on Workplace, the company’s internal message board.

“We’ve known for over a year now that our recommendation systems can very quickly lead users down the path to conspiracy theories and groups,” one integrity researcher, whose name had been redacted, wrote in a post announcing she was leaving the company. “This fringe group has grown to national prominence, with QAnon congressional candidates and QAnon hashtags and groups trending in the mainstream. We were willing to act only * after * things had spiraled into a dire state.”

While Facebook’s ban initially appeared effective, a problem remained: The removal of groups and pages didn’t wipe out QAnon’s most extreme followers, who continued to organize on the platform.

“There was enough evidence to raise red flags in the expert community that Facebook and other platforms failed to address QAnon’s violent extremist dimension,” said Marc-André Argentino, a research fellow at King’s College London’s International Centre for the Study of Radicalisation, who has extensively studied QAnon.

Believers simply rebranded as anti-child-trafficking groups or migrated to other communities, including those around the anti-vaccine movement.

[...]

These conspiracy groups had become the fastest-growing groups on Facebook, according to the report, but Facebook wasn’t able to control their “meteoric growth,” the researchers wrote, “because we were looking at each entity individually, rather than as a cohesive movement.” A Facebook spokesperson told BuzzFeed News it took many steps to limit election misinformation but that it was unable to catch everything.
| | [I00123 The Extreme Right on Steam](../../generated_pages/incidents/I00123.md) | Analysis of communities on the gaming platform Steam showed that groups who are known to have engaged in acts of terrorism used Steam to host social communities (T0152.009: Software Delivery Platform, T0151.002: Online Community Group):

The first is a Finnish-language group which was set up to promote the Nordic Resistance Movement (NRM). NRM are the only group in the sample examined by ISD known to have engaged in terrorist attacks. Swedish members of the group conducted a series of bombings in Gothenburg in 2016 and 2017, and several Finnish members are under investigation in relation to both violent attacks and murder.

The NRM Steam group does not host content related to gaming, and instead seems to act as a hub for the movement. The group’s overview section contains a link to the official NRM website, and users are encouraged to find like-minded people to join the group. The group is relatively small, with 87 members, but at the time of writing, it appeared to be active and in use. Interestingly, although the group is in Finnish language, it has members in common with the English language channels identified in this analysis. This suggests that Steam may help facilitate international exchange between right-wing extremists.
, ISD conducted an investigation into the usage of social groups on Steam. Steam is an online platform used to buy and sell digital games, and includes the Steam community feature, which “allows users to find friends and join groups and discussion forums, while also offering in-game voice and text chat”. Actors have used Steam’s social capabilities to enable online harm campaigns:

One function of these Steam groups is the organisation of ‘raids’ – coordinated trolling activity against their political opponents. An example of this can be seen in a white power music group sharing a link to an Israeli Steam group, encouraging other members to “help me raid this juden [German word for Jew] group”. The comments section of said target group show that neo-Nazi and antisemitic comments were consistently posted in the group just two minutes after the instruction had been posted in the extremist group, highlighting the swiftness with which racially motivated harassment can be directed online.

Threat actors used social groups on Steam to organise harassment of targets (T0152.009: Software Delivery Platform, T0151.002: Online Community Group, T0049.005: Conduct Swarming, T0048: Harass)., ISD conducted an investigation into the usage of social groups on Steam. Steam is an online platform used to buy and sell digital games, and includes the Steam community feature, which “allows users to find friends and join groups and discussion forums, while also offering in-game voice and text chat”. Actors have used Steam’s social capabilities to enable online harm campaigns:

A number of groups were observed encouraging members to join conversations on outside platforms. These include links to Telegram channels connected to white supremacist marches, and media outlets, forums and Discord servers run by neo-Nazis.

[...]

This off-ramping activity demonstrates how rather than sitting in isolation, Steam fits into the wider extreme right wing online ecosystem, with Steam groups acting as hubs for communities and organizations which span multiple platforms. Accordingly, although the platform appears to fill a specific role in the building and strengthening of communities with similar hobbies and interests, it is suggested that analysis seeking to determine the risk of these communities should focus on their activity across platforms


Social Groups on Steam were used to drive new people to other neo-Nazi controlled community assets (T0122: Direct Users to Alternative Platforms, T0152.009: Software Delivery Platform, T0151.002: Online Community Group). | -| [I00128 #TrollTracker: Outward Influence Operation From Iran](../../generated_pages/incidents/I00128.md) | [Meta removed a network of assets for coordinated inauthentic behaviour. One page] in the network, @StopMEK, was promoting views against the People’s Mujahedin of Iran (MEK), the largest and most active political opposition group against the Islamic Republic of Iran Leadership.

The content on the page drew narratives showing parallels between the Islamic State of Iraq and Syria (ISIS) and the MEK.

Apart from images and memes, the @StopMEK page shared a link to an archived report on how the United States was monitoring the MEK’s movement in Iran in the mid-1990’s. The file was embedded as a QR code on one of the page’s images.


In this example a Facebook page presented itself as focusing on a political cause (T0097.208: Social Cause Persona, T0151.001: Social Media Platform, T0151.002: Online Community Group). Within the page it embedded a QR code (T0122: Direct Users to Alternative Platforms, T0153.004: QR Code), which took users to a document hosted on another website (T0152.004: Website). | +| [I00128 #TrollTracker: Outward Influence Operation From Iran](../../generated_pages/incidents/I00128.md) | [Meta removed a network of assets for coordinated inauthentic behaviour. One page] in the network, @StopMEK, was promoting views against the People’s Mujahedin of Iran (MEK), the largest and most active political opposition group against the Islamic Republic of Iran Leadership.

The content on the page drew narratives showing parallels between the Islamic State of Iraq and Syria (ISIS) and the MEK.

Apart from images and memes, the @StopMEK page shared a link to an archived report on how the United States was monitoring the MEK’s movement in Iran in the mid-1990’s. The file was embedded as a QR code on one of the page’s images.


In this example a Facebook page presented itself as focusing on a political cause (T0097.208: Social Cause Persona, T0151.001: Social Media Platform, T0151.002: Online Community Group). Within the page it embedded a QR code (T0122: Direct Users to Alternative Platforms, T0153.004: QR Code Asset), which took users to a document hosted on another website (T0152.004: Website Asset). | diff --git a/generated_pages/techniques/T0151.003.md b/generated_pages/techniques/T0151.003.md index 70d081f..813934a 100644 --- a/generated_pages/techniques/T0151.003.md +++ b/generated_pages/techniques/T0151.003.md @@ -7,8 +7,8 @@ | Incident | Descriptions given for this incident | | -------- | -------------------- | -| [I00106 Facebook Is Being Flooded With Gross AI-Generated Images of Hurricane Helene Devastation](../../generated_pages/incidents/I00106.md) | As families desperately seek to find missing loved ones and communities grapple with immeasurable losses of both life and property in the wake of [2024’s] Hurricane Helene, AI slop scammers appear to be capitalizing on the moment for personal gain.

A Facebook account called "Coastal Views" usually shares calmer AI imagery of nature-filled beachside scenes. The account's banner image showcases a signpost reading "OBX Live," OBX being shorthand for North Carolina's Outer Banks islands.

But starting this weekend, the account shifted its approach dramatically, as first flagged by a social media user on X.

Instead of posting "photos" of leaping dolphins and sandy beaches, the account suddenly started publishing images of flooded mountain neighborhoods, submerged houses, and dogs sitting on top of roofs.

But instead of spreading vital information to those affected by the natural disaster, or at the very least sharing real photos of the destruction, the account is seemingly trying to use AI to cash in on all the attention the hurricane has been getting.

The account links to an Etsy page for a business called" OuterBanks2023," where somebody who goes by "Alexandr" sells AI-generated prints of horses touching snouts with sea turtles, Santa running down the shoreline with a reindeer, and sunsets over ocean waves.


A Facebook page which presented itself as being associated with North Carolina which posted AI generated images changed to posting AI generated images of hurricane damage after Hurricane Helene hit North Carolina (T0151.003: Online Community Page, T0151.001: Social Media Platform, T0115: Post Content, T0086.002: Develop AI-Generated Images (Deepfakes), T0068: Respond to Breaking News Event or Active Crisis).

The account included links (T0122: Direct Users to Alternative Platforms) to an account on Etsy, which sold prints of AI generated images (T0146: Account, T0148.007: eCommerce Platform). | -| [I00108 How you thought you support the animals and you ended up funding white supremacists](../../generated_pages/incidents/I00108.md) | This article examines the white nationalist group Suavelos’ use of Facebook to draw visitors to its website without overtly revealing their racist ideology:

Suavelos uses Facebook and other platforms to amplify its message. In order to bypass the platforms’ community standards and keep their public pages active, Facebook pages such as “I support the police” are a good vehicle to spread a specific agenda without claiming to be racist. In looking back at this Facebook page, we followed Facebook’s algorithm for related pages and found suggested Facebook pages

[...]

This amplification strategy on Facebook is successful, as according to SimilarWeb figures, it attracts around 111,000 visits every month on the Suavelos.eu website.

[...]

Revenue through online advertisements can be achieved by different platforms through targeted advertisements, like Google Adsense or Doubleclick, or related and similar sponsored content, such as Taboola. Accordingly, Suavelos.eu uses both of these websites to display advertisements and consequently receives funding from such advertisements.

Once visitors are on the website supporting its advertisement revenue, Suavelos’ goal is to then turn these visitors into regular members of Suavelos network through donations or fees, or have them continue to support Suavelos.


Suevelos created a variety of pages on Facebook which presented as centring on prosocial causes. Facebook’s algorithm helped direct users to these pages (T0092: Build Network, T0151.001: Social Media Platform, T0153.006: Content Recommendation Algorithm, T0151.003: Online Community Page, T0143.208: Social Cause Persona).

Suevelos used these pages to generate traffic for their WordPress site (T0122: Direct Users to Alternative Platforms, T0152.003: Website Hosting Platform, T0152.004: Website), which used accounts on a variety of online advertising platforms to host adverts (T0146: Account, T0153.005: Online Advertising Platform). | +| [I00106 Facebook Is Being Flooded With Gross AI-Generated Images of Hurricane Helene Devastation](../../generated_pages/incidents/I00106.md) | As families desperately seek to find missing loved ones and communities grapple with immeasurable losses of both life and property in the wake of [2024’s] Hurricane Helene, AI slop scammers appear to be capitalizing on the moment for personal gain.

A Facebook account called "Coastal Views" usually shares calmer AI imagery of nature-filled beachside scenes. The account's banner image showcases a signpost reading "OBX Live," OBX being shorthand for North Carolina's Outer Banks islands.

But starting this weekend, the account shifted its approach dramatically, as first flagged by a social media user on X.

Instead of posting "photos" of leaping dolphins and sandy beaches, the account suddenly started publishing images of flooded mountain neighborhoods, submerged houses, and dogs sitting on top of roofs.

But instead of spreading vital information to those affected by the natural disaster, or at the very least sharing real photos of the destruction, the account is seemingly trying to use AI to cash in on all the attention the hurricane has been getting.

The account links to an Etsy page for a business called" OuterBanks2023," where somebody who goes by "Alexandr" sells AI-generated prints of horses touching snouts with sea turtles, Santa running down the shoreline with a reindeer, and sunsets over ocean waves.


A Facebook page which presented itself as being associated with North Carolina which posted AI generated images changed to posting AI generated images of hurricane damage after Hurricane Helene hit North Carolina (T0151.003: Online Community Page, T0151.001: Social Media Platform, T0115: Post Content, T0086.002: Develop AI-Generated Images (Deepfakes), T0068: Respond to Breaking News Event or Active Crisis).

The account included links (T0122: Direct Users to Alternative Platforms) to an account on Etsy, which sold prints of AI generated images (T0146: Account Asset, T0148.007: eCommerce Platform). | +| [I00108 How you thought you support the animals and you ended up funding white supremacists](../../generated_pages/incidents/I00108.md) | This article examines the white nationalist group Suavelos’ use of Facebook to draw visitors to its website without overtly revealing their racist ideology:

Suavelos uses Facebook and other platforms to amplify its message. In order to bypass the platforms’ community standards and keep their public pages active, Facebook pages such as “I support the police” are a good vehicle to spread a specific agenda without claiming to be racist. In looking back at this Facebook page, we followed Facebook’s algorithm for related pages and found suggested Facebook pages

[...]

This amplification strategy on Facebook is successful, as according to SimilarWeb figures, it attracts around 111,000 visits every month on the Suavelos.eu website.

[...]

Revenue through online advertisements can be achieved by different platforms through targeted advertisements, like Google Adsense or Doubleclick, or related and similar sponsored content, such as Taboola. Accordingly, Suavelos.eu uses both of these websites to display advertisements and consequently receives funding from such advertisements.

Once visitors are on the website supporting its advertisement revenue, Suavelos’ goal is to then turn these visitors into regular members of Suavelos network through donations or fees, or have them continue to support Suavelos.


Suevelos created a variety of pages on Facebook which presented as centring on prosocial causes. Facebook’s algorithm helped direct users to these pages (T0092: Build Network, T0151.001: Social Media Platform, T0153.006: Content Recommendation Algorithm, T0151.003: Online Community Page, T0143.208: Social Cause Persona).

Suevelos used these pages to generate traffic for their WordPress site (T0122: Direct Users to Alternative Platforms, T0152.003: Website Hosting Platform, T0152.004: Website Asset), which used accounts on a variety of online advertising platforms to host adverts (T0146: Account Asset, T0153.005: Online Advertising Platform). | diff --git a/generated_pages/techniques/T0151.004.md b/generated_pages/techniques/T0151.004.md index e63ed04..c76fbf2 100644 --- a/generated_pages/techniques/T0151.004.md +++ b/generated_pages/techniques/T0151.004.md @@ -7,10 +7,9 @@ | Incident | Descriptions given for this incident | | -------- | -------------------- | -| [I00006 Columbian Chemicals](../../generated_pages/incidents/I00006.md) | Use SMS/text messages | -| [I00068 Attempted Audio Deepfake Call Targets LastPass Employee](../../generated_pages/incidents/I00068.md) | “While reports of [...] deepfake calls targeting private companies are luckily still rare, LastPass itself experienced a deepfake attempt earlier today that we are sharing with the larger community to help raise awareness that this tactic is spreading and all companies should be on the alert. In our case, an employee received a series of calls, texts, and at least one voicemail featuring an audio deepfake from a threat actor impersonating our CEO via WhatsApp. As the attempted communication was outside of normal business communication channels and due to the employee’s suspicion regarding the presence of many of the hallmarks of a social engineering attempt (such as forced urgency), our employee rightly ignored the messages and reported the incident to our internal security team so that we could take steps to both mitigate the threat and raise awareness of the tactic both internally and externally.”

In this example attackers created an account on WhatsApp which impersonated the CEO of lastpass (T0097.100: Individual Persona, T0143.003: Impersonated Persona, T0146: Account, T0151.004: Chat Platform, T0155.007: Encrypted Communication Channel). They used this asset to target an employee using deepfaked audio (T0088.001: Develop AI-Generated Audio (Deepfakes)). | -| [I00084 Russia turns its diplomats into disinformation warriors](../../generated_pages/incidents/I00084.md) | “[Russia’s social media] reach isn't the same as Russian state media, but they are trying to recreate what RT and Sputnik had done," said one EU official involved in tracking Russian disinformation. "It's a coordinated effort that goes beyond social media and involves specific websites."

“Central to that wider online playbook is a Telegram channel called Warfakes and an affiliated website. Since the beginning of the conflict, that social media channel has garnered more than 725,000 members and repeatedly shares alleged fact-checks aimed at debunking Ukrainian narratives, using language similar to Western-style fact-checking outlets.”


In this example a Telegram channel (T0151.004: Chat Platform, T0155.007: Encrypted Communication Channel) was established which presented itself as a source of fact checks (T0097.203: Fact Checking Organisation Persona). | -| [I00113 Inside the Shadowy World of Disinformation for Hire in Kenya](../../generated_pages/incidents/I00113.md) | Researchers at Mozilla examined influence operations targeting Kenyan citizens on Twitter in 2021, providing “a grim window into the booming and shadowy industry of Twitter influencers for political hire here in Kenya”, and giving insight into operations’ operationalisation:

In our interviews with one of the influencers, they informed us of the agile tactics they use to organize and avoid detection. For example, when it’s time to carry out the campaign the influencers would be added to a Whatsapp group. Here, they received direction about what to post, the hashtags to use, which tweets to engage with and who to target. Synchronizing the tweets was also incredibly important for them. It’s what enables them to achieve their goal of trending on Twitter and gain amplification.

[...]

They revealed to us that those participating in the exercise are paid roughly between $10 and $15 to participate in three campaigns per day. Each campaign execution involves tweeting about the hashtags of the day until it appears on the trending section of Twitter. Additionally, some individuals have managed to reach retainer level and get paid about $250 per month. Their job is to make sure the campaigns are executed on a day-by-day basis with different hashtags.


An M-PESA account (T0148.002: Bank Account, T0148.001: Online Banking Platform) was used to pay campaign participants.

Participants were organised in WhatsApp groups (T0129.005: Coordinate on Encrypted/Closed Networks, T0151.007: Chat Broadcast Group, T0151.004: Chat Platform), in which they planned how to get campaign content trending on Twitter (T0121: Manipulate Platform Algorithm, T0151.008: Microblogging Platform). | +| [I00068 Attempted Audio Deepfake Call Targets LastPass Employee](../../generated_pages/incidents/I00068.md) | “While reports of [...] deepfake calls targeting private companies are luckily still rare, LastPass itself experienced a deepfake attempt earlier today that we are sharing with the larger community to help raise awareness that this tactic is spreading and all companies should be on the alert. In our case, an employee received a series of calls, texts, and at least one voicemail featuring an audio deepfake from a threat actor impersonating our CEO via WhatsApp. As the attempted communication was outside of normal business communication channels and due to the employee’s suspicion regarding the presence of many of the hallmarks of a social engineering attempt (such as forced urgency), our employee rightly ignored the messages and reported the incident to our internal security team so that we could take steps to both mitigate the threat and raise awareness of the tactic both internally and externally.”

In this example attackers created an account on WhatsApp which impersonated the CEO of lastpass (T0097.100: Individual Persona, T0143.003: Impersonated Persona, T0146: Account Asset, T0151.004: Chat Platform, T0155.007: Encrypted Communication Channel). They used this asset to target an employee using deepfaked audio (T0088.001: Develop AI-Generated Audio (Deepfakes)). | +| [I00084 Russia turns its diplomats into disinformation warriors](../../generated_pages/incidents/I00084.md) | “[Russia’s social media] reach isn't the same as Russian state media, but they are trying to recreate what RT and Sputnik had done," said one EU official involved in tracking Russian disinformation. "It's a coordinated effort that goes beyond social media and involves specific websites."

“Central to that wider online playbook is a Telegram channel called Warfakes and an affiliated website. Since the beginning of the conflict, that social media channel has garnered more than 725,000 members and repeatedly shares alleged fact-checks aimed at debunking Ukrainian narratives, using language similar to Western-style fact-checking outlets.”


In this example a Telegram channel (T0151.004: Chat Platform, T0155.007: Encrypted Communication Channel) was established which presented itself as a source of fact checks (T0097.203: Fact Checking Organisation Persona)., “[Russia’s social media] reach isn't the same as Russian state media, but they are trying to recreate what RT and Sputnik had done," said one EU official involved in tracking Russian disinformation. "It's a coordinated effort that goes beyond social media and involves specific websites."

“Central to that wider online playbook is a Telegram channel called Warfakes and an affiliated website. Since the beginning of the conflict, that social media channel has garnered more than 725,000 members and repeatedly shares alleged fact-checks aimed at debunking Ukrainian narratives, using language similar to Western-style fact-checking outlets.”


In this example a Telegram channel (T0151.004: Chat Platform, T0155.007: Encrypted Communication Channel) was established which presented itself as a source of fact checks (T0097.203: Fact Checking Organisation Persona). | +| [I00113 Inside the Shadowy World of Disinformation for Hire in Kenya](../../generated_pages/incidents/I00113.md) | Researchers at Mozilla examined influence operations targeting Kenyan citizens on Twitter in 2021, providing “a grim window into the booming and shadowy industry of Twitter influencers for political hire here in Kenya”, and giving insight into operations’ operationalisation:

In our interviews with one of the influencers, they informed us of the agile tactics they use to organize and avoid detection. For example, when it’s time to carry out the campaign the influencers would be added to a Whatsapp group. Here, they received direction about what to post, the hashtags to use, which tweets to engage with and who to target. Synchronizing the tweets was also incredibly important for them. It’s what enables them to achieve their goal of trending on Twitter and gain amplification.

[...]

They revealed to us that those participating in the exercise are paid roughly between $10 and $15 to participate in three campaigns per day. Each campaign execution involves tweeting about the hashtags of the day until it appears on the trending section of Twitter. Additionally, some individuals have managed to reach retainer level and get paid about $250 per month. Their job is to make sure the campaigns are executed on a day-by-day basis with different hashtags.


An M-PESA account (T0148.002: Bank Account Asset, T0148.001: Online Banking Platform) was used to pay campaign participants.

Participants were organised in WhatsApp groups (T0129.005: Coordinate on Encrypted/Closed Networks, T0151.007: Chat Broadcast Group, T0151.004: Chat Platform), in which they planned how to get campaign content trending on Twitter (T0121: Manipulate Platform Algorithm, T0151.008: Microblogging Platform). | | [I00122 The Extreme Right on Discord](../../generated_pages/incidents/I00122.md) | Discord is an example of a T0151.004: Chat Platform, which allows users to create their own T0151.005: Chat Community Server. The Institute for Strategic Dialog (ISD) conducted an investigation into the extreme right’s usage of Discord servers:

Discord is a free service accessible via phones and computers. It allows users to talk to each other in real time via voice, text or video chat and emerged in 2015 as a platform designed to assist gamers in communicating with each other while playing video games. The popularity of the platform has surged in recent years, and it is currently estimated to have 140 million monthly active users.

Chatrooms – known as servers - in the platform can be created by anyone, and they are used for a range of purposes that extend far beyond gaming. Such purposes include the discussion of extreme right-wing ideologies and the planning of offline extremist activity. Ahead of the far-right Unite the Right rally in Charlottesville, Virginia, in August 2017, organisers used Discord to plan and promote events and posted swastikas and praised Hitler in chat rooms with names like “National Socialist Army” and “Führer’s Gas Chamber”.


In this example a Discord server was used to organise the 2017 Charlottesville Unite the Right rally. Chat rooms such in the server were used to discuss different topics related to the rally (T0057: Organise Events, T0126.002: Facilitate Logistics or Support for Attendance, T0151.004: Chat Platform, T0151.005: Chat Community Server, T0151.006: Chat Room).

Another primary activity engaged in the servers analysed are raids against other servers associated with political opponents, and in particular those that appear to be pro-LGBTQ. Raids are a phenomenon in which a small group of users will join a Discord server with the sole purpose of spamming the host with offensive or incendiary messages and content with the aim of upsetting local users or having the host server banned by Discord. On two servers examined here, raiding was their primary function.

Among servers devoted to this activity, specific channels were often created to host links to servers that users were then encouraged to raid. Users are encouraged to be as offensive as possible with the aim of upsetting or angering users on the raided server, and channels often had content banks of offensive memes and content to be shared on raided servers.

The use of raids demonstrates the gamified nature of extremist activity on Discord, where use of the platform and harassment of political opponents is itself turned into a type of real-life video game designed to strengthen in-group affiliation. This combined with the broader extremist activity identified in these channels suggests that the combative activity of raiding could provide a pathway for younger people to become more engaged with extremist activity.


Discord servers were used by members of the extreme right to coordinate harassment of targeted communities (T0048: Harass, T0049.005: Conduct Swarming, T0151.004: Chat Platform, T0151.005: Chat Community Server). | diff --git a/generated_pages/techniques/T0151.007.md b/generated_pages/techniques/T0151.007.md index 7ea28af..f798f1b 100644 --- a/generated_pages/techniques/T0151.007.md +++ b/generated_pages/techniques/T0151.007.md @@ -7,7 +7,7 @@ | Incident | Descriptions given for this incident | | -------- | -------------------- | -| [I00113 Inside the Shadowy World of Disinformation for Hire in Kenya](../../generated_pages/incidents/I00113.md) | Researchers at Mozilla examined influence operations targeting Kenyan citizens on Twitter in 2021, providing “a grim window into the booming and shadowy industry of Twitter influencers for political hire here in Kenya”, and giving insight into operations’ operationalisation:

In our interviews with one of the influencers, they informed us of the agile tactics they use to organize and avoid detection. For example, when it’s time to carry out the campaign the influencers would be added to a Whatsapp group. Here, they received direction about what to post, the hashtags to use, which tweets to engage with and who to target. Synchronizing the tweets was also incredibly important for them. It’s what enables them to achieve their goal of trending on Twitter and gain amplification.

[...]

They revealed to us that those participating in the exercise are paid roughly between $10 and $15 to participate in three campaigns per day. Each campaign execution involves tweeting about the hashtags of the day until it appears on the trending section of Twitter. Additionally, some individuals have managed to reach retainer level and get paid about $250 per month. Their job is to make sure the campaigns are executed on a day-by-day basis with different hashtags.


An M-PESA account (T0148.002: Bank Account, T0148.001: Online Banking Platform) was used to pay campaign participants.

Participants were organised in WhatsApp groups (T0129.005: Coordinate on Encrypted/Closed Networks, T0151.007: Chat Broadcast Group, T0151.004: Chat Platform), in which they planned how to get campaign content trending on Twitter (T0121: Manipulate Platform Algorithm, T0151.008: Microblogging Platform). | +| [I00113 Inside the Shadowy World of Disinformation for Hire in Kenya](../../generated_pages/incidents/I00113.md) | Researchers at Mozilla examined influence operations targeting Kenyan citizens on Twitter in 2021, providing “a grim window into the booming and shadowy industry of Twitter influencers for political hire here in Kenya”, and giving insight into operations’ operationalisation:

In our interviews with one of the influencers, they informed us of the agile tactics they use to organize and avoid detection. For example, when it’s time to carry out the campaign the influencers would be added to a Whatsapp group. Here, they received direction about what to post, the hashtags to use, which tweets to engage with and who to target. Synchronizing the tweets was also incredibly important for them. It’s what enables them to achieve their goal of trending on Twitter and gain amplification.

[...]

They revealed to us that those participating in the exercise are paid roughly between $10 and $15 to participate in three campaigns per day. Each campaign execution involves tweeting about the hashtags of the day until it appears on the trending section of Twitter. Additionally, some individuals have managed to reach retainer level and get paid about $250 per month. Their job is to make sure the campaigns are executed on a day-by-day basis with different hashtags.


An M-PESA account (T0148.002: Bank Account Asset, T0148.001: Online Banking Platform) was used to pay campaign participants.

Participants were organised in WhatsApp groups (T0129.005: Coordinate on Encrypted/Closed Networks, T0151.007: Chat Broadcast Group, T0151.004: Chat Platform), in which they planned how to get campaign content trending on Twitter (T0121: Manipulate Platform Algorithm, T0151.008: Microblogging Platform). | diff --git a/generated_pages/techniques/T0151.008.md b/generated_pages/techniques/T0151.008.md index 50e25d5..c117338 100644 --- a/generated_pages/techniques/T0151.008.md +++ b/generated_pages/techniques/T0151.008.md @@ -8,12 +8,12 @@ | Incident | Descriptions given for this incident | | -------- | -------------------- | | [I00097 Report: Not Just Algorithms](../../generated_pages/incidents/I00097.md) | This report explores the role of four systems (recommender systems, content moderation systems, ad approval systems and ad management systems) in creating risks around eating disorders.

[...]

Content recommender systems can create risks. We created and primed ‘fake’ accounts for 16-year old Australians and found that some recommender systems will promote pro-eating disorder content to children.

Specifically: On TikTok, 0% of the content recommended was classified as pro-eating disorder content; On Instagram, 23% of the content recommended was classified as pro-eating disorder content; On X, 67% of content recommended was classified as pro-eating disorder content (and disturbingly, another 13% displayed self-harm imagery).


Content recommendation algorithms developed by Instagram (T0151.001: Social Media Platform, T0153.006: Content Recommendation Algorithm) and X (T0151.008: Microblogging Platform, T0153.006: Content Recommendation Algorithm) promoted harmful content to an account presenting as a 16 year old Australian. | -| [I00109 Coordinated Facebook Pages Designed to Fund a White Supremacist Agenda](../../generated_pages/incidents/I00109.md) | This report examines the white nationalist group Suavelos’ use of Facebook to draw visitors to its website without overtly revealing their racist ideology. This section of the report looks at the Suavelos website, and the content it links out to.

In going back to Suavelos’ main page, we also found: A link to a page on a web shop: alabastro.eu; A link to a page to donate money to the founders through Tipee and to the website through PayPal; [and] a link to a private forum that gathers 3.000 members: oppidum.suavelos.eu;

Suavelos linked out to an online store which it controlled (T0152.004: Website, T0148.004: Payment Processing Capability), and to accounts on payment processing platforms PayPal and Tipee (T0146: Account, T0148.003: Payment Processing Platform).

The Suavelos website also hosted a private forum (T0151.009: Legacy Online Forum Platform, T0155: Gated Asset), and linked out to a variety of assets it controlled on other online platforms: accounts on Twitter (T0146: Account, T0151.008: Microblogging Platform), YouTube (T0146: Account, T0152.006: Video Platform), Instagram and VKontakte (T0146: Account, T0151.001: Social Media Platform). | -| [I00113 Inside the Shadowy World of Disinformation for Hire in Kenya](../../generated_pages/incidents/I00113.md) | Researchers at Mozilla examined influence operations targeting Kenyan citizens on Twitter in 2021, providing “a grim window into the booming and shadowy industry of Twitter influencers for political hire here in Kenya”, and giving insight into operations’ operationalisation:

In our interviews with one of the influencers, they informed us of the agile tactics they use to organize and avoid detection. For example, when it’s time to carry out the campaign the influencers would be added to a Whatsapp group. Here, they received direction about what to post, the hashtags to use, which tweets to engage with and who to target. Synchronizing the tweets was also incredibly important for them. It’s what enables them to achieve their goal of trending on Twitter and gain amplification.

[...]

They revealed to us that those participating in the exercise are paid roughly between $10 and $15 to participate in three campaigns per day. Each campaign execution involves tweeting about the hashtags of the day until it appears on the trending section of Twitter. Additionally, some individuals have managed to reach retainer level and get paid about $250 per month. Their job is to make sure the campaigns are executed on a day-by-day basis with different hashtags.


An M-PESA account (T0148.002: Bank Account, T0148.001: Online Banking Platform) was used to pay campaign participants.

Participants were organised in WhatsApp groups (T0129.005: Coordinate on Encrypted/Closed Networks, T0151.007: Chat Broadcast Group, T0151.004: Chat Platform), in which they planned how to get campaign content trending on Twitter (T0121: Manipulate Platform Algorithm, T0151.008: Microblogging Platform). | -| [I00116 Blue-tick scammers target consumers who complain on X](../../generated_pages/incidents/I00116.md) | Consumers who complain of poor customer service on X are being targeted by scammers after the social media platform formerly known as Twitter changed its account verification process.

Bank customers and airline passengers are among those at risk of phishing scams when they complain to companies via X. Fraudsters, masquerading as customer service agents, respond under fake X handles and trick victims into disclosing their bank details to get a promised refund.

They typically win the trust of victims by displaying the blue checkmark icon, which until this year denoted accounts that had been officially verified by X.

Changes introduced this year allow the icon to be bought by anyone who pays an £11 monthly fee for the site’s subscription service, renamed this month from Twitter Blue to X Premium. Businesses that pay £950 a month receive a gold tick. X’s terms and conditions do not state whether subscriber accounts are pre-vetted.

Andrew Thomas was contacted by a scam account after posting a complaint to the travel platform Booking.com. “I’d been trying since April to get a refund after our holiday flights were cancelled and finally resorted to X,” he said.

“I received a response asking me to follow them, and DM [direct message] them with a contact number. They then called me via WhatsApp asking for my reference number so they could investigate. Later they called back to say that I would be refunded via their payment partner for which I’d need to download an app.”

Thomas became suspicious and checked the X profile. “It looked like the real thing, but I noticed that there was an unexpected hyphen in the Twitter handle and that it had only joined X in July 2023,” he said.


In this example a newly created paid account was created on X, used to direct users to other platforms (T0146.002: Paid Account, T0146.003: Verified Account, T0146.005: Lookalike Account ID, T0097.205: Business Persona, T0122: Direct Users to Alternative Platforms, T0143.003: Impersonated Persona, T0151.008: Microblogging Platform, T0150.001: Newly Created). | -| [I00120 factcheckUK or fakecheckUK? Reinventing the political faction as the impartial factchecker](../../generated_pages/incidents/I00120.md) | Ahead of the 2019 UK Election during a leader’s debate, the Conservative party rebranded their “Conservative Campaign Headquarters Press” account to “FactCheckUK”:


That is, until a few minutes into the debate.

All at once, like a person throwing off their street clothes to reveal some sinister new identity underneath, @CCHQPress abruptly shed its name, blue Conservative logo, Boris Johnson banner, and bio description. Moments later, it had entirely reinvented itself.

The purple banner was emblazoned with white font that read “✓ factcheckUK [with a “FROM CCQH” subheading]”.

The matching profile picture was a white tick in a purple circle. The bio was updated to: “Fact checking Labour from CCHQ”. And the name now read factcheckUK, with the customary Twitter blue (or white depending on your phone settings!) validation tick still after it


In this example an existing verified social media account on Twitter was repurposed to inauthentically present itself as a Fact Checking service (T0151.008: Microblogging Platform, T0150.003: Pre-Existing, T0146.003: Verified Account, T0097.203: Fact Checking Organisation Persona, T0143.002: Fabricated Persona). | -| [I00125 The Agency](../../generated_pages/incidents/I00125.md) | In 2014 threat actors attributed to Russia spread the false narrative that a local chemical plant had leaked toxic fumes. This report discusses aspects of the operation:

[The chemical plant leak] hoax was just one in a wave of similar attacks during the second half of last year. On Dec. 13, two months after a handful of Ebola cases in the United States touched off a minor media panic, many of the same Twitter accounts used to spread the Columbian Chemicals hoax began to post about an outbreak of Ebola in Atlanta. [...] Again, the attention to detail was remarkable, suggesting a tremendous amount of effort. A YouTube video showed a team of hazmat-suited medical workers transporting a victim from the airport. Beyoncé’s recent single “7/11” played in the background, an apparent attempt to establish the video’s contemporaneity. A truck in the parking lot sported the logo of the Hartsfield-Jackson Atlanta International Airport.

Accounts which previously presented as Louisiana locals were repurposed for use in a different campaign, this time presenting as locals to Atlanta, a place over 500 miles away from Louisiana and in a different timezone (T0146: Account, T0097.101: Local Persona, T0143.002: Fabricated Persona, T0151.008: Microblogging Platform, T0150.004: Repurposed).

A video was created which appeared to support the campaign’s narrative (T0087: Develop Video-Based Content), with great attention given to small details which made the video appear more legitimate. | -| [I00129 Teen who hacked Joe Biden and Bill Gates' Twitter accounts sentenced to three years in prison](../../generated_pages/incidents/I00129.md) | An 18-year-old hacker who pulled off a huge breach in 2020, infiltrating several high profile Twitter accounts to solicit bitcoin transactions, has agreed to serve three years in prison for his actions.

Graham Ivan Clark, of Florida, was 17 years old at the time of the hack in July, during which he took over a number of major accounts including those of Joe Biden, Bill Gates and Kim Kardashian West.

Once he accessed them, Clark tweeted a link to a bitcoin address and wrote “all bitcoin sent to our address below will be sent back to you doubled!” According to court documents, Clark made more than $100,000 from the scheme, which his lawyers say he has since returned.

Clark was able to access the accounts after convincing an employee at Twitter he worked in the company’s information technology department, according to the Tampa Bay Times.


In this example a threat actor gained access to Twitter’s customer service portal through social engineering (T0146.004: Administrator Account, T0150.005: Compromised, T0151.008: Microblogging Platform), which they used to take over accounts of public figures (T0146.003: Verified Account, T0143.003: Impersonated Persona, T0150.005: Compromised, T0151.008: Microblogging Platform).

The threat actor used these compromised accounts to trick their followers into sending bitcoin to their wallet (T0148.009: Cryptocurrency Wallet). | +| [I00109 Coordinated Facebook Pages Designed to Fund a White Supremacist Agenda](../../generated_pages/incidents/I00109.md) | This report examines the white nationalist group Suavelos’ use of Facebook to draw visitors to its website without overtly revealing their racist ideology. This section of the report looks at the Suavelos website, and the content it links out to.

In going back to Suavelos’ main page, we also found: A link to a page on a web shop: alabastro.eu; A link to a page to donate money to the founders through Tipee and to the website through PayPal; [and] a link to a private forum that gathers 3.000 members: oppidum.suavelos.eu;

Suavelos linked out to an online store which it controlled (T0152.004: Website Asset, T0148.004: Payment Processing Capability), and to accounts on payment processing platforms PayPal and Tipee (T0146: Account Asset, T0148.003: Payment Processing Platform).

The Suavelos website also hosted a private forum (T0151.009: Legacy Online Forum Platform, T0155: Gated Asset), and linked out to a variety of assets it controlled on other online platforms: accounts on Twitter (T0146: Account Asset, T0151.008: Microblogging Platform), YouTube (T0146: Account Asset, T0152.006: Video Platform), Instagram and VKontakte (T0146: Account Asset, T0151.001: Social Media Platform). | +| [I00113 Inside the Shadowy World of Disinformation for Hire in Kenya](../../generated_pages/incidents/I00113.md) | Researchers at Mozilla examined influence operations targeting Kenyan citizens on Twitter in 2021, providing “a grim window into the booming and shadowy industry of Twitter influencers for political hire here in Kenya”, and giving insight into operations’ operationalisation:

In our interviews with one of the influencers, they informed us of the agile tactics they use to organize and avoid detection. For example, when it’s time to carry out the campaign the influencers would be added to a Whatsapp group. Here, they received direction about what to post, the hashtags to use, which tweets to engage with and who to target. Synchronizing the tweets was also incredibly important for them. It’s what enables them to achieve their goal of trending on Twitter and gain amplification.

[...]

They revealed to us that those participating in the exercise are paid roughly between $10 and $15 to participate in three campaigns per day. Each campaign execution involves tweeting about the hashtags of the day until it appears on the trending section of Twitter. Additionally, some individuals have managed to reach retainer level and get paid about $250 per month. Their job is to make sure the campaigns are executed on a day-by-day basis with different hashtags.


An M-PESA account (T0148.002: Bank Account Asset, T0148.001: Online Banking Platform) was used to pay campaign participants.

Participants were organised in WhatsApp groups (T0129.005: Coordinate on Encrypted/Closed Networks, T0151.007: Chat Broadcast Group, T0151.004: Chat Platform), in which they planned how to get campaign content trending on Twitter (T0121: Manipulate Platform Algorithm, T0151.008: Microblogging Platform). | +| [I00116 Blue-tick scammers target consumers who complain on X](../../generated_pages/incidents/I00116.md) | Consumers who complain of poor customer service on X are being targeted by scammers after the social media platform formerly known as Twitter changed its account verification process.

Bank customers and airline passengers are among those at risk of phishing scams when they complain to companies via X. Fraudsters, masquerading as customer service agents, respond under fake X handles and trick victims into disclosing their bank details to get a promised refund.

They typically win the trust of victims by displaying the blue checkmark icon, which until this year denoted accounts that had been officially verified by X.

Changes introduced this year allow the icon to be bought by anyone who pays an £11 monthly fee for the site’s subscription service, renamed this month from Twitter Blue to X Premium. Businesses that pay £950 a month receive a gold tick. X’s terms and conditions do not state whether subscriber accounts are pre-vetted.

Andrew Thomas was contacted by a scam account after posting a complaint to the travel platform Booking.com. “I’d been trying since April to get a refund after our holiday flights were cancelled and finally resorted to X,” he said.

“I received a response asking me to follow them, and DM [direct message] them with a contact number. They then called me via WhatsApp asking for my reference number so they could investigate. Later they called back to say that I would be refunded via their payment partner for which I’d need to download an app.”

Thomas became suspicious and checked the X profile. “It looked like the real thing, but I noticed that there was an unexpected hyphen in the Twitter handle and that it had only joined X in July 2023,” he said.


In this example a newly created paid account was created on X, used to direct users to other platforms (T0146.002: Paid Account Asset, T0146.003: Verified Account Asset, T0146.005: Lookalike Account ID, T0097.205: Business Persona, T0122: Direct Users to Alternative Platforms, T0143.003: Impersonated Persona, T0151.008: Microblogging Platform, T0150.001: Newly Created Asset). | +| [I00120 factcheckUK or fakecheckUK? Reinventing the political faction as the impartial factchecker](../../generated_pages/incidents/I00120.md) | Ahead of the 2019 UK Election during a leader’s debate, the Conservative party rebranded their “Conservative Campaign Headquarters Press” account to “FactCheckUK”:

The evening of the 19th November 2019 saw the first of three Leaders’ Debates on ITV, starting at 8pm and lasting for an hour. Current Prime Minister and leader of the Conservatives, Boris Johnson faced off against Labour party leader, Jeremy Corbyn. Plenty of people will have been watching the debate live, but a good proportion were “watching” (er, “twitching”?) via Twitter. This is something I’ve done in the past for certain shows. In some cases I just can’t watch or listen, but I can read, and in other cases, the commentary is far more interesting and entertaining than the show itself will ever be. This, for me, is just such a case. But very quickly, all eyes turned upon a modestly sized account with the handle @CCHQPress. That’s short for Conservative Campaign Headquarters Press. According to their (current!) Twitter bio, they are based in Westminster and they provide “snippets of news and commentary from CCHQ” to their 75k followers.

That is, until a few minutes into the debate.

All at once, like a person throwing off their street clothes to reveal some sinister new identity underneath, @CCHQPress abruptly shed its name, blue Conservative logo, Boris Johnson banner, and bio description. Moments later, it had entirely reinvented itself.

The purple banner was emblazoned with white font that read “✓ factcheckUK [with a “FROM CCQH” subheading]”.

The matching profile picture was a white tick in a purple circle. The bio was updated to: “Fact checking Labour from CCHQ”. And the name now read factcheckUK, with the customary Twitter blue (or white depending on your phone settings!) validation tick still after it


In this example an existing verified social media account on Twitter was repurposed to inauthentically present itself as a Fact Checking service (T0151.008: Microblogging Platform, T0150.003: Pre-Existing Asset, T0146.003: Verified Account Asset, T0097.203: Fact Checking Organisation Persona, T0143.002: Fabricated Persona). | +| [I00125 The Agency](../../generated_pages/incidents/I00125.md) | In 2014 threat actors attributed to Russia spread the false narrative that a local chemical plant had leaked toxic fumes. This report discusses aspects of the operation:

[The chemical plant leak] hoax was just one in a wave of similar attacks during the second half of last year. On Dec. 13, two months after a handful of Ebola cases in the United States touched off a minor media panic, many of the same Twitter accounts used to spread the Columbian Chemicals hoax began to post about an outbreak of Ebola in Atlanta. [...] Again, the attention to detail was remarkable, suggesting a tremendous amount of effort. A YouTube video showed a team of hazmat-suited medical workers transporting a victim from the airport. Beyoncé’s recent single “7/11” played in the background, an apparent attempt to establish the video’s contemporaneity. A truck in the parking lot sported the logo of the Hartsfield-Jackson Atlanta International Airport.

Accounts which previously presented as Louisiana locals were repurposed for use in a different campaign, this time presenting as locals to Atlanta, a place over 500 miles away from Louisiana and in a different timezone (T0146: Account Asset, T0097.101: Local Persona, T0143.002: Fabricated Persona, T0151.008: Microblogging Platform, T0150.004: Repurposed Asset).

A video was created which appeared to support the campaign’s narrative (T0087: Develop Video-Based Content), with great attention given to small details which made the video appear more legitimate. | +| [I00129 Teen who hacked Joe Biden and Bill Gates' Twitter accounts sentenced to three years in prison](../../generated_pages/incidents/I00129.md) | An 18-year-old hacker who pulled off a huge breach in 2020, infiltrating several high profile Twitter accounts to solicit bitcoin transactions, has agreed to serve three years in prison for his actions.

Graham Ivan Clark, of Florida, was 17 years old at the time of the hack in July, during which he took over a number of major accounts including those of Joe Biden, Bill Gates and Kim Kardashian West.

Once he accessed them, Clark tweeted a link to a bitcoin address and wrote “all bitcoin sent to our address below will be sent back to you doubled!” According to court documents, Clark made more than $100,000 from the scheme, which his lawyers say he has since returned.

Clark was able to access the accounts after convincing an employee at Twitter he worked in the company’s information technology department, according to the Tampa Bay Times.


In this example a threat actor gained access to Twitter’s customer service portal through social engineering (T0146.004: Administrator Account Asset, T0150.005: Compromised Asset, T0151.008: Microblogging Platform), which they used to take over accounts of public figures (T0146.003: Verified Account Asset, T0143.003: Impersonated Persona, T0150.005: Compromised Asset, T0151.008: Microblogging Platform).

The threat actor used these compromised accounts to trick their followers into sending bitcoin to their wallet (T0148.009: Cryptocurrency Wallet). | diff --git a/generated_pages/techniques/T0151.009.md b/generated_pages/techniques/T0151.009.md index 64c02d3..363a2b5 100644 --- a/generated_pages/techniques/T0151.009.md +++ b/generated_pages/techniques/T0151.009.md @@ -7,9 +7,9 @@ | Incident | Descriptions given for this incident | | -------- | -------------------- | -| [I00105 Gaming the System: The Use of Gaming-Adjacent Communication, Game and Mod Platforms by Extremist Actors](../../generated_pages/incidents/I00105.md) | In this report, researchers look at online platforms commonly used by people who play videogames, looking at how these platforms can contribute to radicalisation of gamers:

Gamer Uprising Forums (GUF) [is an online discussion platform using the classic forum structure] aimed directly at gamers. It is run by US Neo-Nazi Andrew Anglin and explicitly targets politically right-wing gamers. This forum mainly includes antisemitic, sexist, and racist topics, but also posts on related issues such as esotericism, conspiracy narratives, pro-Russian propaganda, alternative medicine, Christian religion, content related to the incel- and manosphere, lists of criminal offences committed by non-white people, links to right-wing news sites, homophobia and trans-hostility, troll guides, anti-leftism, ableism and much more. Most noticeable were the high number of antisemitic references. For example, there is a thread with hundreds of machine-generated images, most of which feature openly antisemitic content and popular antisemitic references. Many users chose explicitly antisemitic avatars. Some of the usernames also provide clues to the users’ ideologies and profiles feature swastikas as a type of progress bar and indicator of the user’s activity in the forum.

The GUF’s front page contains an overview of the forum, user statistics, and so-called “announcements”. In addition to advice-like references, these feature various expressions of hateful ideologies. At the time of the exploration, the following could be read there: “Jews are the problem!”, “Women should be raped”, “The Jews are going to be required to return stolen property”, “Immigrants will have to be physically removed”, “Console gaming is for n******” and “Anger is a womanly emotion”. New users have to prove themselves in an area for newcomers referred to in imageboard slang as the “Newfag Barn”. Only when the newcomers’ posts have received a substantial number of likes from established users, are they allowed to post in other parts of the forum. It can be assumed that this will also lead to competitions to outdo each other in posting extreme content. However, it is always possible to view all posts and content on the site. In any case, it can be assumed that the platform hardly addresses milieus that are not already radicalised or at risk of radicalisation and is therefore deemed relevant for radicalisation research. However, the number of registered users is low (typical for radicalised milieus) and, hence, the platform may only be of interest when studying a small group of highly radicalised individuals.


Gamer Uprising Forum is a legacy online forum, with access gated behind approval of existing platform users (T0155.003: Approval Gated, T0151.009: Legacy Online Forum Platform). | -| [I00109 Coordinated Facebook Pages Designed to Fund a White Supremacist Agenda](../../generated_pages/incidents/I00109.md) | This report examines the white nationalist group Suavelos’ use of Facebook to draw visitors to its website without overtly revealing their racist ideology. This section of the report looks at the Suavelos website, and the content it links out to.

In going back to Suavelos’ main page, we also found: A link to a page on a web shop: alabastro.eu; A link to a page to donate money to the founders through Tipee and to the website through PayPal; [and] a link to a private forum that gathers 3.000 members: oppidum.suavelos.eu;

Suavelos linked out to an online store which it controlled (T0152.004: Website, T0148.004: Payment Processing Capability), and to accounts on payment processing platforms PayPal and Tipee (T0146: Account, T0148.003: Payment Processing Platform).

The Suavelos website also hosted a private forum (T0151.009: Legacy Online Forum Platform, T0155: Gated Asset), and linked out to a variety of assets it controlled on other online platforms: accounts on Twitter (T0146: Account, T0151.008: Microblogging Platform), YouTube (T0146: Account, T0152.006: Video Platform), Instagram and VKontakte (T0146: Account, T0151.001: Social Media Platform). | -| [I00118 ‘War Thunder’ players are once again leaking sensitive military technology information on a video game forum](../../generated_pages/incidents/I00118.md) | In an effort to prove that the developers behind a popular multiplayer vehicle combat game had made a mistake, a player went ahead and published classified British military documents about one of the real-life tanks featured in the game.

This truly bizarre turn of events recently occurred in the public forum for War Thunder, a free-to-player multiplayer combat sim featuring modern land, air, and sea craft. Getting a small detail wrong on a piece of equipment might not be a big deal for the average gamer, but for the War Thunder crowd it sure as hell is. With 25,000 devoted players, the game very much bills itself as the military vehicle combat simulator.

A player, who identified himself as a British tank commander, claimed that the game’s developers at Gaijin Entertainment had inaccurately represented the Challenger 2 main battle tank used by the British military.

The self-described tank commander’s bio listed his location as Tidworth Camp in Wiltshire, England, according to the UK Defense Journal, which reported that the base is home to the Royal Tank Regiment, which fields Challenger 2 tanks.

The player, who went by the handle Pyrophoric, reportedly shared an image on the War Thunder forum of the tank’s specs that were pulled from the Challenger 2’s Army Equipment Support Publication, which is essentially a technical manual.

[...]

A moderator for the forum, who’s handle is “Templar_”, explained that the developer had removed the material after they received confirmation from the Ministry of Defense that the document is still in fact classified.


A user of War Thunder’s forums posted confidential documents to win an argument (T0089.001: Obtain Authentic Documents, T0146: Account, T0097.105: Military Personnel Persona, T0115: Post Content, T0143.001: Authentic Persona, T0151.009: Legacy Online Forum Platform). | +| [I00105 Gaming the System: The Use of Gaming-Adjacent Communication, Game and Mod Platforms by Extremist Actors](../../generated_pages/incidents/I00105.md) | In this report, researchers look at online platforms commonly used by people who play videogames, looking at how these platforms can contribute to radicalisation of gamers:

Gamer Uprising Forums (GUF) [is an online discussion platform using the classic forum structure] aimed directly at gamers. It is run by US Neo-Nazi Andrew Anglin and explicitly targets politically right-wing gamers. This forum mainly includes antisemitic, sexist, and racist topics, but also posts on related issues such as esotericism, conspiracy narratives, pro-Russian propaganda, alternative medicine, Christian religion, content related to the incel- and manosphere, lists of criminal offences committed by non-white people, links to right-wing news sites, homophobia and trans-hostility, troll guides, anti-leftism, ableism and much more. Most noticeable were the high number of antisemitic references. For example, there is a thread with hundreds of machine-generated images, most of which feature openly antisemitic content and popular antisemitic references. Many users chose explicitly antisemitic avatars. Some of the usernames also provide clues to the users’ ideologies and profiles feature swastikas as a type of progress bar and indicator of the user’s activity in the forum.

The GUF’s front page contains an overview of the forum, user statistics, and so-called “announcements”. In addition to advice-like references, these feature various expressions of hateful ideologies. At the time of the exploration, the following could be read there: “Jews are the problem!”, “Women should be raped”, “The Jews are going to be required to return stolen property”, “Immigrants will have to be physically removed”, “Console gaming is for n******” and “Anger is a womanly emotion”. New users have to prove themselves in an area for newcomers referred to in imageboard slang as the “Newfag Barn”. Only when the newcomers’ posts have received a substantial number of likes from established users, are they allowed to post in other parts of the forum. It can be assumed that this will also lead to competitions to outdo each other in posting extreme content. However, it is always possible to view all posts and content on the site. In any case, it can be assumed that the platform hardly addresses milieus that are not already radicalised or at risk of radicalisation and is therefore deemed relevant for radicalisation research. However, the number of registered users is low (typical for radicalised milieus) and, hence, the platform may only be of interest when studying a small group of highly radicalised individuals.


Gamer Uprising Forum is a legacy online forum, with access gated behind approval of existing platform users (T0155.003: Approval Gated Asset, T0151.009: Legacy Online Forum Platform). | +| [I00109 Coordinated Facebook Pages Designed to Fund a White Supremacist Agenda](../../generated_pages/incidents/I00109.md) | This report examines the white nationalist group Suavelos’ use of Facebook to draw visitors to its website without overtly revealing their racist ideology. This section of the report looks at the Suavelos website, and the content it links out to.

In going back to Suavelos’ main page, we also found: A link to a page on a web shop: alabastro.eu; A link to a page to donate money to the founders through Tipee and to the website through PayPal; [and] a link to a private forum that gathers 3.000 members: oppidum.suavelos.eu;

Suavelos linked out to an online store which it controlled (T0152.004: Website Asset, T0148.004: Payment Processing Capability), and to accounts on payment processing platforms PayPal and Tipee (T0146: Account Asset, T0148.003: Payment Processing Platform).

The Suavelos website also hosted a private forum (T0151.009: Legacy Online Forum Platform, T0155: Gated Asset), and linked out to a variety of assets it controlled on other online platforms: accounts on Twitter (T0146: Account Asset, T0151.008: Microblogging Platform), YouTube (T0146: Account Asset, T0152.006: Video Platform), Instagram and VKontakte (T0146: Account Asset, T0151.001: Social Media Platform). | +| [I00118 ‘War Thunder’ players are once again leaking sensitive military technology information on a video game forum](../../generated_pages/incidents/I00118.md) | In an effort to prove that the developers behind a popular multiplayer vehicle combat game had made a mistake, a player went ahead and published classified British military documents about one of the real-life tanks featured in the game.

This truly bizarre turn of events recently occurred in the public forum for War Thunder, a free-to-player multiplayer combat sim featuring modern land, air, and sea craft. Getting a small detail wrong on a piece of equipment might not be a big deal for the average gamer, but for the War Thunder crowd it sure as hell is. With 25,000 devoted players, the game very much bills itself as the military vehicle combat simulator.

A player, who identified himself as a British tank commander, claimed that the game’s developers at Gaijin Entertainment had inaccurately represented the Challenger 2 main battle tank used by the British military.

The self-described tank commander’s bio listed his location as Tidworth Camp in Wiltshire, England, according to the UK Defense Journal, which reported that the base is home to the Royal Tank Regiment, which fields Challenger 2 tanks.

The player, who went by the handle Pyrophoric, reportedly shared an image on the War Thunder forum of the tank’s specs that were pulled from the Challenger 2’s Army Equipment Support Publication, which is essentially a technical manual.

[...]

A moderator for the forum, who’s handle is “Templar_”, explained that the developer had removed the material after they received confirmation from the Ministry of Defense that the document is still in fact classified.


A user of War Thunder’s forums posted confidential documents to win an argument (T0089.001: Obtain Authentic Documents, T0146: Account Asset, T0097.105: Military Personnel Persona, T0115: Post Content, T0143.001: Authentic Persona, T0151.009: Legacy Online Forum Platform). | diff --git a/generated_pages/techniques/T0151.011.md b/generated_pages/techniques/T0151.011.md index 28ec6d1..a4aa344 100644 --- a/generated_pages/techniques/T0151.011.md +++ b/generated_pages/techniques/T0151.011.md @@ -7,7 +7,7 @@ | Incident | Descriptions given for this incident | | -------- | -------------------- | -| [I00101 Pro-Putin Disinformation Warriors Take War of Aggression to Reddit](../../generated_pages/incidents/I00101.md) | This report looks at changes content posted to communities on Reddit (called Subreddits) after teams of voluntary moderators are replaced with what appear to be pro-Russian voices:

The r/antiwar subreddit appears to be a very recent takeover target. With 12,900 members it is not the largest community on Reddit, but this does place it squarely within the top 5% of all communities in terms of membership.

Three months ago a new moderator team was instated by subreddit head u/democracy101. Any posts documenting Russian aggression in Ukraine are now swiftly removed, while the board has been flooded with posts about how Ukraine is losing, or how American “neocons wrecked” the country.

The pinned post from moderator u/n0ahbody proclaims: “People who call for an end to Russian aggressions but not the Western aggressions Russia is reacting to don’t really want peace.” This user takes the view that any negative opinion about Russia is “shaped by what the fanatically Russophobic MSM wants you to think,” and that the United States is not threatened by its neighbors. Russia is.”

When u/n0ahbody took over the sub, the user posted a triumphant and vitriolic diatribe in another pro-Russia subreddit with some 33,500 members, r/EndlessWar. “We are making progress. We are purging the sub of all NAFO and NAFO-adjacent elements. Hundreds of them have been banned over the last 24 hours for various rule infractions, for being NAFO or NAFO-adjacent,” the user said, referencing the grassroots, pro-Ukrainian North Atlantic Fella Organization (NAFO) meme movement.

Several former users have reported they have indeed been banned from r/antiwar since the change in moderators. “If this subreddit cannot be explicitly against the invasion of Ukraine it will never truly be anti-war,” wrote one user Halcyon_Rein, in the antiwar subreddit on September 6. They then edited the post to say, “Edit: btw, I got f**king banned for this 💀💀💀”


A community hosted on Reddit was taken over by new moderators (T0151.011: Community Sub-Forum, T0150.005: Compromised). These moderators removed content posted to the community which favoured Ukraine over Russia (T0146.004: Administrator Account, T0151.011: Community Sub-Forum, T0124: Suppress Opposition). | +| [I00101 Pro-Putin Disinformation Warriors Take War of Aggression to Reddit](../../generated_pages/incidents/I00101.md) | This report looks at changes content posted to communities on Reddit (called Subreddits) after teams of voluntary moderators are replaced with what appear to be pro-Russian voices:

The r/antiwar subreddit appears to be a very recent takeover target. With 12,900 members it is not the largest community on Reddit, but this does place it squarely within the top 5% of all communities in terms of membership.

Three months ago a new moderator team was instated by subreddit head u/democracy101. Any posts documenting Russian aggression in Ukraine are now swiftly removed, while the board has been flooded with posts about how Ukraine is losing, or how American “neocons wrecked” the country.

The pinned post from moderator u/n0ahbody proclaims: “People who call for an end to Russian aggressions but not the Western aggressions Russia is reacting to don’t really want peace.” This user takes the view that any negative opinion about Russia is “shaped by what the fanatically Russophobic MSM wants you to think,” and that the United States is not threatened by its neighbors. Russia is.”

When u/n0ahbody took over the sub, the user posted a triumphant and vitriolic diatribe in another pro-Russia subreddit with some 33,500 members, r/EndlessWar. “We are making progress. We are purging the sub of all NAFO and NAFO-adjacent elements. Hundreds of them have been banned over the last 24 hours for various rule infractions, for being NAFO or NAFO-adjacent,” the user said, referencing the grassroots, pro-Ukrainian North Atlantic Fella Organization (NAFO) meme movement.

Several former users have reported they have indeed been banned from r/antiwar since the change in moderators. “If this subreddit cannot be explicitly against the invasion of Ukraine it will never truly be anti-war,” wrote one user Halcyon_Rein, in the antiwar subreddit on September 6. They then edited the post to say, “Edit: btw, I got f**king banned for this 💀💀💀”


A community hosted on Reddit was taken over by new moderators (T0151.011: Community Sub-Forum, T0150.005: Compromised Asset). These moderators removed content posted to the community which favoured Ukraine over Russia (T0146.004: Administrator Account Asset, T0151.011: Community Sub-Forum, T0124: Suppress Opposition). | diff --git a/generated_pages/techniques/T0151.012.md b/generated_pages/techniques/T0151.012.md index 9c4bf43..57132f2 100644 --- a/generated_pages/techniques/T0151.012.md +++ b/generated_pages/techniques/T0151.012.md @@ -7,7 +7,7 @@ | Incident | Descriptions given for this incident | | -------- | -------------------- | -| [I00102 Ignore The Poway Synagogue Shooter’s Manifesto: Pay Attention To 8chan’s /pol/ Board](../../generated_pages/incidents/I00102.md) | On April 27, 2019, at around 11:30 a.m. local time, a young man with a semi-automatic rifle walked into the Chabad of Poway Synagogue in Poway, California. He opened fire, killing one worshipper and wounding three others. In the hours since the shooting, a manifesto, believed to be written by the shooter, began circulating online. Evidence has also surfaced that, like the Christchurch Mosque shooter, this killer began his rampage with a post on 8chan’s /pol/ board.

Although both of these attacks may seem different, since they targeted worshippers of different faiths, both shooters were united by the same fascist ideology. They were also both radicalized in the same place: 8chan’s /pol/ board.

This has been corroborated by posts on the board itself, where “anons,” as the posters call themselves, recirculated the shooter’s since-deleted post. In it, the alleged shooter claims to have been “lurking” on the site for a year and a half. He includes a link to a livestream of his rampage — which thankfully does not appear to have worked — and he also includes a pastebin link to his manifesto.

The very first response to his announcement was another anon cheering him on and telling him to “get the high score,” AKA, kill a huge number of people.


Before carrying out a mass shooting, the shooter posted a thread to 8chan’s /pol/ board. The post directed users to a variety of different platforms (T0146.006: Open Access Platform, T0151.012: Image Board Platform, T0115: Post Content, T0122: Direct Users to Alternative Platforms); a Facebook account on which the shooter attempted to livestream the shooting (T0146: Account, T0151.001: Social Media Platform); and a manifesto they had written hosted on pastebin (T0146.006: Open Access Platform, T0152.005: Paste Platform, T0115: Post Content) and uploaded to the file sharing platform Mediafire (T0152.010: File Hosting Platform, T0085.004: Develop Document).

The report looks deeper into 8chan’s /pol/ board:

8chan is a large website, which includes a number of different discussion groups about everything from anime to left-wing politics. /pol/ is one particularly active board on the website, and it is best described as a gathering place for extremely online neo-Nazis.

[...]

I’ve browsed /pol/ on an almost daily basis since the Christchurch shooting. It has not been difficult to find calls for violence. On Monday, March 25 of this year, I ran across evidence of anons translating the Christchurch shooter’s manifesto into other languages in an attempt to inspire more shootings across the globe.

This tactic can work, and today’s shooting is proof. The Poway Synagogue shooter directly cited the Christchurch shooter as his inspiration, saying he decided to carry out his attack roughly two weeks after that shooting. On /pol/, many anons refer to the Christchurch shooter, Brenton Tarrant, as “Saint Tarrant,” complete with medieval-inspired iconography.


Manifestos posted to 8chan are translated and reshared by other platform users (T0101: Create Localised Content, T0146.006: Open Access Platform, T0151.012: Image Board Platform, T0115: Post Content, T0084.004: Appropriate Content).

When I began looking through /pol/ right after the Poway Synagogue shooting, I came across several claims that the shootings had been a “false flag” aimed at making the message board look bad.

When Bellingcat tweeted out a warning about shitposting and the shooter’s manifesto, in the immediate wake of the attack, probable anons even commented on the Tweet in an attempt to deny that a channer had been behind the attack.

This is a recognizable pattern that occurs in the wake of any crimes committed by members of the board. While the initial response to the Christchurch shooter’s massacre thread was riotous glee, in the days after the shooting many anons began to claim the attack had been a false flag. This actually sparked significant division and debate between the members of /pol/. In the below image, a user mocks other anons for being unable to “believe something in your favor is real.” Another anon responds, “As the evidence comes out, its [sic] quite clear that this was a false flag.”

In his manifesto, the Poway Synagogue shooter even weighed in on this debate, accusing other anons who called the Christchurch and Tree of Life Synagogue shootings “false flags” to merely have been scared: “They can’t fathom that there are brave White men alive who have the willpower and courage it takes to say, ‘Fuck my life—I’m willing to sacrifice everything for the benefit of my race.’”


Platform users deny that their platform has been used by mass shooters to publish their manifestos (T0129.006: Deny Involvement). | +| [I00102 Ignore The Poway Synagogue Shooter’s Manifesto: Pay Attention To 8chan’s /pol/ Board](../../generated_pages/incidents/I00102.md) | On April 27, 2019, at around 11:30 a.m. local time, a young man with a semi-automatic rifle walked into the Chabad of Poway Synagogue in Poway, California. He opened fire, killing one worshipper and wounding three others. In the hours since the shooting, a manifesto, believed to be written by the shooter, began circulating online. Evidence has also surfaced that, like the Christchurch Mosque shooter, this killer began his rampage with a post on 8chan’s /pol/ board.

Although both of these attacks may seem different, since they targeted worshippers of different faiths, both shooters were united by the same fascist ideology. They were also both radicalized in the same place: 8chan’s /pol/ board.

This has been corroborated by posts on the board itself, where “anons,” as the posters call themselves, recirculated the shooter’s since-deleted post. In it, the alleged shooter claims to have been “lurking” on the site for a year and a half. He includes a link to a livestream of his rampage — which thankfully does not appear to have worked — and he also includes a pastebin link to his manifesto.

The very first response to his announcement was another anon cheering him on and telling him to “get the high score,” AKA, kill a huge number of people.


Before carrying out a mass shooting, the shooter posted a thread to 8chan’s /pol/ board. The post directed users to a variety of different platforms (T0146.006: Open Access Platform, T0151.012: Image Board Platform, T0115: Post Content, T0122: Direct Users to Alternative Platforms); a Facebook account on which the shooter attempted to livestream the shooting (T0146: Account Asset, T0151.001: Social Media Platform); and a manifesto they had written hosted on pastebin (T0146.006: Open Access Platform, T0152.005: Paste Platform, T0115: Post Content) and uploaded to the file sharing platform Mediafire (T0152.010: File Hosting Platform, T0085.004: Develop Document).

The report looks deeper into 8chan’s /pol/ board:

8chan is a large website, which includes a number of different discussion groups about everything from anime to left-wing politics. /pol/ is one particularly active board on the website, and it is best described as a gathering place for extremely online neo-Nazis.

[...]

I’ve browsed /pol/ on an almost daily basis since the Christchurch shooting. It has not been difficult to find calls for violence. On Monday, March 25 of this year, I ran across evidence of anons translating the Christchurch shooter’s manifesto into other languages in an attempt to inspire more shootings across the globe.

This tactic can work, and today’s shooting is proof. The Poway Synagogue shooter directly cited the Christchurch shooter as his inspiration, saying he decided to carry out his attack roughly two weeks after that shooting. On /pol/, many anons refer to the Christchurch shooter, Brenton Tarrant, as “Saint Tarrant,” complete with medieval-inspired iconography.


Manifestos posted to 8chan are translated and reshared by other platform users (T0101: Create Localised Content, T0146.006: Open Access Platform, T0151.012: Image Board Platform, T0115: Post Content, T0084.004: Appropriate Content).

When I began looking through /pol/ right after the Poway Synagogue shooting, I came across several claims that the shootings had been a “false flag” aimed at making the message board look bad.

When Bellingcat tweeted out a warning about shitposting and the shooter’s manifesto, in the immediate wake of the attack, probable anons even commented on the Tweet in an attempt to deny that a channer had been behind the attack.

This is a recognizable pattern that occurs in the wake of any crimes committed by members of the board. While the initial response to the Christchurch shooter’s massacre thread was riotous glee, in the days after the shooting many anons began to claim the attack had been a false flag. This actually sparked significant division and debate between the members of /pol/. In the below image, a user mocks other anons for being unable to “believe something in your favor is real.” Another anon responds, “As the evidence comes out, its [sic] quite clear that this was a false flag.”

In his manifesto, the Poway Synagogue shooter even weighed in on this debate, accusing other anons who called the Christchurch and Tree of Life Synagogue shootings “false flags” to merely have been scared: “They can’t fathom that there are brave White men alive who have the willpower and courage it takes to say, ‘Fuck my life—I’m willing to sacrifice everything for the benefit of my race.’”


Platform users deny that their platform has been used by mass shooters to publish their manifestos (T0129.006: Deny Involvement). | | [I00104 Macron Campaign Hit With “Massive and Coordinated” Hacking Attack](../../generated_pages/incidents/I00104.md) | A massive trove of documents purporting to contain thousands of emails and other files from the [2017 presidential] campaign of Emmanuel Macron—the French centrist candidate squaring off against right-wing nationalist Marine Le Pen—was posted on the internet Friday afternoon. The Macron campaign says that at least some of the documents are fake. The document dump came just over a day before voting is set to begin in the final round of the election and mere hours before candidates are legally required to stop campaigning.

At about 2:35 p.m. ET, a post appeared on the 4chan online message board announcing the leak. The documents appear to include emails, internal memos, and screenshots of purported banking records.

“In this pastebin are links to torrents of emails between Macron, his team and other officials, politicians as well as original documents and photos,” the anonymous 4chan poster wrote. “This was passed on to me today so now I am giving it to you, the people. The leak is massvie and released in the hopes that the human search engine here will be able to start sifting through the contents and figure out exactly what we have here.”

The Macron campaign issued a statement Friday night saying it was the victim of a “massive and coordinated” hacking attack. That campaign said the leak included some fake documents that were intended “to sow doubt and misinformation.”


Actors posted a to 4chan a link (T0151.012: Image Board Platform, T0146.006: Open Access Platform, T0115: Post Content, T0122: Direct Users to Alternative Platforms) to text content hosted on pastebin (T0152.005: Paste Platform, T0146.006: Open Access Platform, T0115: Post Content), which contained links to download stolen and fabricated documents. | diff --git a/generated_pages/techniques/T0151.014.md b/generated_pages/techniques/T0151.014.md index b12b5bd..96d818d 100644 --- a/generated_pages/techniques/T0151.014.md +++ b/generated_pages/techniques/T0151.014.md @@ -7,7 +7,7 @@ | Incident | Descriptions given for this incident | | -------- | -------------------- | -| [I00111 Patreon Is Bankrolling Climate Change Deniers While We All Burn](../../generated_pages/incidents/I00111.md) | In this article VICE News discusses a report produced by Advance Democracy on people who use Patreon to spread the false claim that an impending ice age will reverse the harms of the ongoing climate crisis:

“The spread of climate misinformation is prolific on social media, as well as on sites like Patreon, where users are actually financially compensated through the platform for spreading falsehoods,” Daniel Jones, president of Advance Democracy, told VICE News.

“Companies hosting and promoting climate misinformation have a responsibility to take action to reduce dangerous misinformation, as falsehoods about climate science are every bit as dangerous as lies about vaccinations and disinformation about our elections.”

Patreon did not respond to VICE News’ request for comment on the report’s findings.

One of the biggest accounts spreading climate conspiracies is ADAPT 2030, which is run by David DuByne, who has 1,100 followers on Patreon. He is currently making over $3,500 every month from his subscribers.

[The science DuByne relies on does not support his hypothesis. However,] this has not prevented DuByne and many others from preying on people’s fears about climate change to spread conspiracies about an impending ice age, which they say will miraculously fix all of earth’s climate problems.

DuByne offers seven different membership levels for supporters, beginning at just $1 per month.

The most expensive costs $100 a month, and gives patrons “a private 20-minute call with David DuByne once per month, to discuss your particular preparedness issues or concerns.” So far just two people are paying this amount.

The researchers also found at least eight other accounts on Patreon that have spread climate change conspiracy theories as part of wider conspiracy sharing, including baseless claims about COVID-19 and the legitimacy of Joe Biden’s presidency. Some of these accounts are earning over $600 per month.


David DuByne created an account on Patreon, which he uses to post text, videos, and podcasts for his subscribers to discuss (T0085: Develop Text-Based Content, T0087: Develop Video-Based Content, T0088: Develop Audio-Based Content, T0146: Account, T0115: Post Content, T0152.012: Subscription Service Platform, T0151.014: Comments Section, T0155.006: Subscription Access). | +| [I00111 Patreon Is Bankrolling Climate Change Deniers While We All Burn](../../generated_pages/incidents/I00111.md) | In this article VICE News discusses a report produced by Advance Democracy on people who use Patreon to spread the false claim that an impending ice age will reverse the harms of the ongoing climate crisis:

“The spread of climate misinformation is prolific on social media, as well as on sites like Patreon, where users are actually financially compensated through the platform for spreading falsehoods,” Daniel Jones, president of Advance Democracy, told VICE News.

“Companies hosting and promoting climate misinformation have a responsibility to take action to reduce dangerous misinformation, as falsehoods about climate science are every bit as dangerous as lies about vaccinations and disinformation about our elections.”

Patreon did not respond to VICE News’ request for comment on the report’s findings.

One of the biggest accounts spreading climate conspiracies is ADAPT 2030, which is run by David DuByne, who has 1,100 followers on Patreon. He is currently making over $3,500 every month from his subscribers.

[The science DuByne relies on does not support his hypothesis. However,] this has not prevented DuByne and many others from preying on people’s fears about climate change to spread conspiracies about an impending ice age, which they say will miraculously fix all of earth’s climate problems.

DuByne offers seven different membership levels for supporters, beginning at just $1 per month.

The most expensive costs $100 a month, and gives patrons “a private 20-minute call with David DuByne once per month, to discuss your particular preparedness issues or concerns.” So far just two people are paying this amount.

The researchers also found at least eight other accounts on Patreon that have spread climate change conspiracy theories as part of wider conspiracy sharing, including baseless claims about COVID-19 and the legitimacy of Joe Biden’s presidency. Some of these accounts are earning over $600 per month.


David DuByne created an account on Patreon, which he uses to post text, videos, and podcasts for his subscribers to discuss (T0085: Develop Text-Based Content, T0087: Develop Video-Based Content, T0088: Develop Audio-Based Content, T0146: Account Asset, T0115: Post Content, T0152.012: Subscription Service Platform, T0151.014: Comments Section, T0155.006: Subscription Access Asset). | diff --git a/generated_pages/techniques/T0151.015.md b/generated_pages/techniques/T0151.015.md index 3385624..57a6b9e 100644 --- a/generated_pages/techniques/T0151.015.md +++ b/generated_pages/techniques/T0151.015.md @@ -7,7 +7,7 @@ | Incident | Descriptions given for this incident | | -------- | -------------------- | -| [I00098 Gaming The System: How Extremists Exploit Gaming Sites And What Can Be Done To Counter Them](../../generated_pages/incidents/I00098.md) | This report looks at how extremists exploit games and gaming adjacent platforms:

Ethnic Cleansing, a first-person shooter game created by the U.S. white supremacist organization National Alliance in 2002, was advertised as follows: “[T]he Race War has already begun. Your character, Will, runs through a ghetto blasting away at various blacks and spics to attempt to gain entrance to the subway system...where the jews have hidden to avoid the carnage. Then you get to blow away jews as they scream ‘Oy Vey!’ on your way to the command center.”

While games like Ethnic Cleansing —and others of a similar genocidal variety, including titles like Shoot the Blacks, Hatred, and Muslim Massacre —generate some press attention and controversy, they tend to be ignored by the large majority of gamers, who consider them “crude” and “badly designed.” Nevertheless, these games are still available in some corners of the Internet and have been downloaded by hundreds of thousands of users.

A second strategy involves the modification (“modding”) of existing video games to twist the narrative into an extremist message or fantasy. One example is the Islamic State terrorist group’s modding of the first-person shooter video game, ARMA III, to make Islamic fighters the heroic protagonists rather than the villains. With their powerful immersive quality, these video games have, in some instances, been effective at inspiring and allegedly training extremists to perpetrate realworld attacks.

Third, extremist actors have used in-game chat functions to open lines of communication with ideological sympathizers and potential recruits. Although the lack of in-game communication data has made it impossible for academic researchers to track the presence of extremists in a systematic way, there is enough anecdotal evidence—including evidence obtained from police investigation files—to infer that in-game chatrooms can and do function as “radicalization funnels” in at least some cases.


White supremacists created a game aligned with their ideology (T0147.001: Game). The Islamic State terrorist group created a mod of the game ARMA 3 (T0151.015: Online Game Platform, T0147.002: Game Mod). Extremists also use communication features available in online games to recruit new members. | +| [I00098 Gaming The System: How Extremists Exploit Gaming Sites And What Can Be Done To Counter Them](../../generated_pages/incidents/I00098.md) | This report looks at how extremists exploit games and gaming adjacent platforms:

Ethnic Cleansing, a first-person shooter game created by the U.S. white supremacist organization National Alliance in 2002, was advertised as follows: “[T]he Race War has already begun. Your character, Will, runs through a ghetto blasting away at various blacks and spics to attempt to gain entrance to the subway system...where the jews have hidden to avoid the carnage. Then you get to blow away jews as they scream ‘Oy Vey!’ on your way to the command center.”

While games like Ethnic Cleansing —and others of a similar genocidal variety, including titles like Shoot the Blacks, Hatred, and Muslim Massacre —generate some press attention and controversy, they tend to be ignored by the large majority of gamers, who consider them “crude” and “badly designed.” Nevertheless, these games are still available in some corners of the Internet and have been downloaded by hundreds of thousands of users.

A second strategy involves the modification (“modding”) of existing video games to twist the narrative into an extremist message or fantasy. One example is the Islamic State terrorist group’s modding of the first-person shooter video game, ARMA III, to make Islamic fighters the heroic protagonists rather than the villains. With their powerful immersive quality, these video games have, in some instances, been effective at inspiring and allegedly training extremists to perpetrate realworld attacks.

Third, extremist actors have used in-game chat functions to open lines of communication with ideological sympathizers and potential recruits. Although the lack of in-game communication data has made it impossible for academic researchers to track the presence of extremists in a systematic way, there is enough anecdotal evidence—including evidence obtained from police investigation files—to infer that in-game chatrooms can and do function as “radicalization funnels” in at least some cases.


White supremacists created a game aligned with their ideology (T0147.001: Game Asset). The Islamic State terrorist group created a mod of the game ARMA 3 (T0151.015: Online Game Platform, T0147.002: Game Mod Asset). Extremists also use communication features available in online games to recruit new members. | diff --git a/generated_pages/techniques/T0152.001.md b/generated_pages/techniques/T0152.001.md index 7127c69..97c3dae 100644 --- a/generated_pages/techniques/T0152.001.md +++ b/generated_pages/techniques/T0152.001.md @@ -7,7 +7,7 @@ | Incident | Descriptions given for this incident | | -------- | -------------------- | -| [I00119 Independent journalist publishes Trump campaign document hacked by Iran despite election interference concerns](../../generated_pages/incidents/I00119.md) | An American journalist who runs an independent newsletter published a document [on 26 Sep 2024] that appears to have been stolen from Donald Trump’s presidential campaign — the first public posting of a file that is believed to be part of a dossier that federal officials say is part of an Iranian effort to manipulate the [2024] U.S. election.

The PDF document is a 271-page opposition research file on former President Donald Trump’s running mate, Sen. JD Vance, R-Ohio.

For more than two months, hackers who the U.S. says are tied to Iran have tried to persuade the American media to cover files they stole. No outlets took the bait.

But on Thursday, reporter Ken Klippenstein, who self-publishes on Substack after he left The Intercept this year, published one of the files.

[...]

Reporters who have received the documents describe the same pattern: An AOL account emails them files, signed by a person using the name “Robert,” who is reluctant to speak to their identity or reasons for wanting the documents to receive coverage.

NBC News was not part of the Robert persona’s direct outreach, but it has viewed its correspondence with a reporter at another publication.

One of the emails from the Robert persona previously viewed by NBC News included three large PDF files, each corresponding to Trump’s three reported finalists for vice president. The Vance file appears to be the one Klippenstein hosts on his site.


In this example hackers attributed to Iran used the Robert persona to email journalists hacked documents (T0146: Account, T0097.100: Individual Persona, T0153.001: Email Platform).

The journalist Ken Kippenstien used his existing blog on substack to host a link to download the document (T0089: Obtain Private Documents, T0097.102: Journalist Persona, T0115: Post Content, T0143.001: Authentic Persona, T0152.001: Blogging Platform, T0152.002: Blog, T0150.003: Pre-Existing). | +| [I00119 Independent journalist publishes Trump campaign document hacked by Iran despite election interference concerns](../../generated_pages/incidents/I00119.md) | An American journalist who runs an independent newsletter published a document [on 26 Sep 2024] that appears to have been stolen from Donald Trump’s presidential campaign — the first public posting of a file that is believed to be part of a dossier that federal officials say is part of an Iranian effort to manipulate the [2024] U.S. election.

The PDF document is a 271-page opposition research file on former President Donald Trump’s running mate, Sen. JD Vance, R-Ohio.

For more than two months, hackers who the U.S. says are tied to Iran have tried to persuade the American media to cover files they stole. No outlets took the bait.

But on Thursday, reporter Ken Klippenstein, who self-publishes on Substack after he left The Intercept this year, published one of the files.

[...]

Reporters who have received the documents describe the same pattern: An AOL account emails them files, signed by a person using the name “Robert,” who is reluctant to speak to their identity or reasons for wanting the documents to receive coverage.

NBC News was not part of the Robert persona’s direct outreach, but it has viewed its correspondence with a reporter at another publication.

One of the emails from the Robert persona previously viewed by NBC News included three large PDF files, each corresponding to Trump’s three reported finalists for vice president. The Vance file appears to be the one Klippenstein hosts on his site.


In this example hackers attributed to Iran used the Robert persona to email journalists hacked documents (T0146: Account Asset, T0097.100: Individual Persona, T0153.001: Email Platform).

The journalist Ken Kippenstien used his existing blog on substack to host a link to download the document (T0089: Obtain Private Documents, T0097.102: Journalist Persona, T0115: Post Content, T0143.001: Authentic Persona, T0152.001: Blogging Platform, T0152.002: Blog Asset, T0150.003: Pre-Existing Asset). | diff --git a/generated_pages/techniques/T0152.002.md b/generated_pages/techniques/T0152.002.md index 2f2f31e..c2698a8 100644 --- a/generated_pages/techniques/T0152.002.md +++ b/generated_pages/techniques/T0152.002.md @@ -1,4 +1,4 @@ -# Technique T0152.002: Blog +# Technique T0152.002: Blog Asset * **Summary**: Blogs are a collation of posts centred on a particular topic, author, or collection of authors.

Some platforms are designed to support users in hosting content online, such as Blogging Platforms like Substack which allow users to create Blogs, but other online platforms can also be used to produce a Blog; a Paid Account on X (prev Twitter) is able to post long-form text content to their timeline in a style of a blog.

Actors may create Accounts on Blogging Platforms to create a Blog, or make their own Blog on a Website. @@ -7,7 +7,7 @@ | Incident | Descriptions given for this incident | | -------- | -------------------- | -| [I00119 Independent journalist publishes Trump campaign document hacked by Iran despite election interference concerns](../../generated_pages/incidents/I00119.md) | An American journalist who runs an independent newsletter published a document [on 26 Sep 2024] that appears to have been stolen from Donald Trump’s presidential campaign — the first public posting of a file that is believed to be part of a dossier that federal officials say is part of an Iranian effort to manipulate the [2024] U.S. election.

The PDF document is a 271-page opposition research file on former President Donald Trump’s running mate, Sen. JD Vance, R-Ohio.

For more than two months, hackers who the U.S. says are tied to Iran have tried to persuade the American media to cover files they stole. No outlets took the bait.

But on Thursday, reporter Ken Klippenstein, who self-publishes on Substack after he left The Intercept this year, published one of the files.

[...]

Reporters who have received the documents describe the same pattern: An AOL account emails them files, signed by a person using the name “Robert,” who is reluctant to speak to their identity or reasons for wanting the documents to receive coverage.

NBC News was not part of the Robert persona’s direct outreach, but it has viewed its correspondence with a reporter at another publication.

One of the emails from the Robert persona previously viewed by NBC News included three large PDF files, each corresponding to Trump’s three reported finalists for vice president. The Vance file appears to be the one Klippenstein hosts on his site.


In this example hackers attributed to Iran used the Robert persona to email journalists hacked documents (T0146: Account, T0097.100: Individual Persona, T0153.001: Email Platform).

The journalist Ken Kippenstien used his existing blog on substack to host a link to download the document (T0089: Obtain Private Documents, T0097.102: Journalist Persona, T0115: Post Content, T0143.001: Authentic Persona, T0152.001: Blogging Platform, T0152.002: Blog, T0150.003: Pre-Existing). | +| [I00119 Independent journalist publishes Trump campaign document hacked by Iran despite election interference concerns](../../generated_pages/incidents/I00119.md) | An American journalist who runs an independent newsletter published a document [on 26 Sep 2024] that appears to have been stolen from Donald Trump’s presidential campaign — the first public posting of a file that is believed to be part of a dossier that federal officials say is part of an Iranian effort to manipulate the [2024] U.S. election.

The PDF document is a 271-page opposition research file on former President Donald Trump’s running mate, Sen. JD Vance, R-Ohio.

For more than two months, hackers who the U.S. says are tied to Iran have tried to persuade the American media to cover files they stole. No outlets took the bait.

But on Thursday, reporter Ken Klippenstein, who self-publishes on Substack after he left The Intercept this year, published one of the files.

[...]

Reporters who have received the documents describe the same pattern: An AOL account emails them files, signed by a person using the name “Robert,” who is reluctant to speak to their identity or reasons for wanting the documents to receive coverage.

NBC News was not part of the Robert persona’s direct outreach, but it has viewed its correspondence with a reporter at another publication.

One of the emails from the Robert persona previously viewed by NBC News included three large PDF files, each corresponding to Trump’s three reported finalists for vice president. The Vance file appears to be the one Klippenstein hosts on his site.


In this example hackers attributed to Iran used the Robert persona to email journalists hacked documents (T0146: Account Asset, T0097.100: Individual Persona, T0153.001: Email Platform).

The journalist Ken Kippenstien used his existing blog on substack to host a link to download the document (T0089: Obtain Private Documents, T0097.102: Journalist Persona, T0115: Post Content, T0143.001: Authentic Persona, T0152.001: Blogging Platform, T0152.002: Blog Asset, T0150.003: Pre-Existing Asset). | diff --git a/generated_pages/techniques/T0152.003.md b/generated_pages/techniques/T0152.003.md index 4615e92..216ee33 100644 --- a/generated_pages/techniques/T0152.003.md +++ b/generated_pages/techniques/T0152.003.md @@ -8,7 +8,7 @@ | Incident | Descriptions given for this incident | | -------- | -------------------- | | [I00107 The Lies Russia Tells Itself](../../generated_pages/incidents/I00107.md) | The Moscow firm Social Design Agency (SDA) has been attributed as being behind a Russian disinformation project known as Doppelganger:

The SDA’s deception work first surfaced in 2022, likely almost immediately after Doppelganger got off the ground. In April of that year, Meta, the parent company of Facebook and Instagram, disclosed in a quarterly report that it had removed from its platforms “a network of about 200 accounts operated from Russia.” By August 2022, German investigative journalists revealed that they had discovered forgeries of about 30 news sites, including many of the country’s biggest media outlets—Frankfurter Allgemeine, Der Spiegel, and Bild—but also Britain’s Daily Mail and France’s 20 Minutes. The sites had deceptive URLs such as www-dailymail-co-uk.dailymail.top.


As part of the SDA’s work, they created many websites which impersonated existing media outlets. Sites used domain impersonation tactics to increase perceived legitimacy of their impersonations (T0097.202: News Outlet Persona, T0143.003: Impersonated Persona, T0152.003: Website Hosting Platform, T0149.003: Lookalike Domain). | -| [I00108 How you thought you support the animals and you ended up funding white supremacists](../../generated_pages/incidents/I00108.md) | This article examines the white nationalist group Suavelos’ use of Facebook to draw visitors to its website without overtly revealing their racist ideology:

Suavelos uses Facebook and other platforms to amplify its message. In order to bypass the platforms’ community standards and keep their public pages active, Facebook pages such as “I support the police” are a good vehicle to spread a specific agenda without claiming to be racist. In looking back at this Facebook page, we followed Facebook’s algorithm for related pages and found suggested Facebook pages

[...]

This amplification strategy on Facebook is successful, as according to SimilarWeb figures, it attracts around 111,000 visits every month on the Suavelos.eu website.

[...]

Revenue through online advertisements can be achieved by different platforms through targeted advertisements, like Google Adsense or Doubleclick, or related and similar sponsored content, such as Taboola. Accordingly, Suavelos.eu uses both of these websites to display advertisements and consequently receives funding from such advertisements.

Once visitors are on the website supporting its advertisement revenue, Suavelos’ goal is to then turn these visitors into regular members of Suavelos network through donations or fees, or have them continue to support Suavelos.


Suevelos created a variety of pages on Facebook which presented as centring on prosocial causes. Facebook’s algorithm helped direct users to these pages (T0092: Build Network, T0151.001: Social Media Platform, T0153.006: Content Recommendation Algorithm, T0151.003: Online Community Page, T0143.208: Social Cause Persona).

Suevelos used these pages to generate traffic for their WordPress site (T0122: Direct Users to Alternative Platforms, T0152.003: Website Hosting Platform, T0152.004: Website), which used accounts on a variety of online advertising platforms to host adverts (T0146: Account, T0153.005: Online Advertising Platform). | +| [I00108 How you thought you support the animals and you ended up funding white supremacists](../../generated_pages/incidents/I00108.md) | This article examines the white nationalist group Suavelos’ use of Facebook to draw visitors to its website without overtly revealing their racist ideology:

Suavelos uses Facebook and other platforms to amplify its message. In order to bypass the platforms’ community standards and keep their public pages active, Facebook pages such as “I support the police” are a good vehicle to spread a specific agenda without claiming to be racist. In looking back at this Facebook page, we followed Facebook’s algorithm for related pages and found suggested Facebook pages

[...]

This amplification strategy on Facebook is successful, as according to SimilarWeb figures, it attracts around 111,000 visits every month on the Suavelos.eu website.

[...]

Revenue through online advertisements can be achieved by different platforms through targeted advertisements, like Google Adsense or Doubleclick, or related and similar sponsored content, such as Taboola. Accordingly, Suavelos.eu uses both of these websites to display advertisements and consequently receives funding from such advertisements.

Once visitors are on the website supporting its advertisement revenue, Suavelos’ goal is to then turn these visitors into regular members of Suavelos network through donations or fees, or have them continue to support Suavelos.


Suevelos created a variety of pages on Facebook which presented as centring on prosocial causes. Facebook’s algorithm helped direct users to these pages (T0092: Build Network, T0151.001: Social Media Platform, T0153.006: Content Recommendation Algorithm, T0151.003: Online Community Page, T0143.208: Social Cause Persona).

Suevelos used these pages to generate traffic for their WordPress site (T0122: Direct Users to Alternative Platforms, T0152.003: Website Hosting Platform, T0152.004: Website Asset), which used accounts on a variety of online advertising platforms to host adverts (T0146: Account Asset, T0153.005: Online Advertising Platform). | diff --git a/generated_pages/techniques/T0152.004.md b/generated_pages/techniques/T0152.004.md index 5ddcf79..48cdb95 100644 --- a/generated_pages/techniques/T0152.004.md +++ b/generated_pages/techniques/T0152.004.md @@ -1,4 +1,4 @@ -# Technique T0152.004: Website +# Technique T0152.004: Website Asset * **Summary**: A Website is a collection of related web pages hosted on a server and accessible via a web browser. Websites have an associated Domain and can host various types of content, such as text, images, videos, and interactive features.

When a Website is fleshed out, it Presents a Persona to site visitors. For example, the Domain “bbc.co.uk/news” hosts a Website which uses the News Outlet Persona. @@ -7,10 +7,10 @@ | Incident | Descriptions given for this incident | | -------- | -------------------- | -| [I00099 More Women Are Facing The Reality Of Deepfakes, And They’re Ruining Lives](../../generated_pages/incidents/I00099.md) | Last October, British writer Helen was alerted to a series of deepfakes on a porn site that appear to show her engaging in extreme acts of sexual violence. That night, the images replayed themselves over and over in horrific nightmares and she was gripped by an all-consuming feeling of dread. “It’s like you’re in a tunnel, going further and further into this enclosed space, where there’s no light,” she tells Vogue. This feeling pervaded Helen’s life. Whenever she left the house, she felt exposed. On runs, she experienced panic attacks. Helen still has no idea who did this to her.

[...]

Amnesty International has been investigating the effects of abuse against women on Twitter, specifically in relation to how they act online thereafter. According to the charity, abuse creates what they’ve called “the silencing effect” whereby women feel discouraged from participating online. The same can be said for victims of deepfakes.

Helen has never been afraid to use her voice, writing deeply personal accounts of postnatal depression. But the deepfakes created a feeling of shame so strong she thought she’d be carrying this “dirty secret” forever, and so she stopped writing.

[...]

Meanwhile, deepfake ‘communities’ are thriving. There are now dedicated sites, user-friendly apps and organised ‘request’ procedures. Some sites allow you to commission custom deepfakes for £25, while on others you can upload a woman’s image and a bot will strip her naked.

“This violation is not something that should be normalised,” says Gibi, an ASMR artist with 3.13 million YouTube subscribers. Gibi has given up trying to keep tabs on the deepfakes of her. For Gibi, the most egregious part of all of this is the fact that people are “profiting off my face, doing something that I didn’t consent to, like my suffering is your livelihood.” She’s even been approached by a company offering to remove the deepfakes — for £500 a video. This has to end. But how?


A website hosting pornographic content provided users the ability to create deepfake content (T0154.002: AI Media Platform, T0086.002: Develop AI-Generated Images (Deepfakes)).

Another website enabled users to commission custom deepfakes (T0152.004: Website, T0148.004: Payment Processing Capability, T0086.002: Develop AI-Generated Images (Deepfakes), T0155.005: Paid Access). | -| [I00108 How you thought you support the animals and you ended up funding white supremacists](../../generated_pages/incidents/I00108.md) | This article examines the white nationalist group Suavelos’ use of Facebook to draw visitors to its website without overtly revealing their racist ideology:

Suavelos uses Facebook and other platforms to amplify its message. In order to bypass the platforms’ community standards and keep their public pages active, Facebook pages such as “I support the police” are a good vehicle to spread a specific agenda without claiming to be racist. In looking back at this Facebook page, we followed Facebook’s algorithm for related pages and found suggested Facebook pages

[...]

This amplification strategy on Facebook is successful, as according to SimilarWeb figures, it attracts around 111,000 visits every month on the Suavelos.eu website.

[...]

Revenue through online advertisements can be achieved by different platforms through targeted advertisements, like Google Adsense or Doubleclick, or related and similar sponsored content, such as Taboola. Accordingly, Suavelos.eu uses both of these websites to display advertisements and consequently receives funding from such advertisements.

Once visitors are on the website supporting its advertisement revenue, Suavelos’ goal is to then turn these visitors into regular members of Suavelos network through donations or fees, or have them continue to support Suavelos.


Suevelos created a variety of pages on Facebook which presented as centring on prosocial causes. Facebook’s algorithm helped direct users to these pages (T0092: Build Network, T0151.001: Social Media Platform, T0153.006: Content Recommendation Algorithm, T0151.003: Online Community Page, T0143.208: Social Cause Persona).

Suevelos used these pages to generate traffic for their WordPress site (T0122: Direct Users to Alternative Platforms, T0152.003: Website Hosting Platform, T0152.004: Website), which used accounts on a variety of online advertising platforms to host adverts (T0146: Account, T0153.005: Online Advertising Platform). | -| [I00109 Coordinated Facebook Pages Designed to Fund a White Supremacist Agenda](../../generated_pages/incidents/I00109.md) | This report examines the white nationalist group Suavelos’ use of Facebook to draw visitors to its website without overtly revealing their racist ideology. This section of the report looks at the Suavelos website, and the content it links out to.

In going back to Suavelos’ main page, we also found: A link to a page on a web shop: alabastro.eu; A link to a page to donate money to the founders through Tipee and to the website through PayPal; [and] a link to a private forum that gathers 3.000 members: oppidum.suavelos.eu;

Suavelos linked out to an online store which it controlled (T0152.004: Website, T0148.004: Payment Processing Capability), and to accounts on payment processing platforms PayPal and Tipee (T0146: Account, T0148.003: Payment Processing Platform).

The Suavelos website also hosted a private forum (T0151.009: Legacy Online Forum Platform, T0155: Gated Asset), and linked out to a variety of assets it controlled on other online platforms: accounts on Twitter (T0146: Account, T0151.008: Microblogging Platform), YouTube (T0146: Account, T0152.006: Video Platform), Instagram and VKontakte (T0146: Account, T0151.001: Social Media Platform). | -| [I00128 #TrollTracker: Outward Influence Operation From Iran](../../generated_pages/incidents/I00128.md) | [Meta removed a network of assets for coordinated inauthentic behaviour. One page] in the network, @StopMEK, was promoting views against the People’s Mujahedin of Iran (MEK), the largest and most active political opposition group against the Islamic Republic of Iran Leadership.

The content on the page drew narratives showing parallels between the Islamic State of Iraq and Syria (ISIS) and the MEK.

Apart from images and memes, the @StopMEK page shared a link to an archived report on how the United States was monitoring the MEK’s movement in Iran in the mid-1990’s. The file was embedded as a QR code on one of the page’s images.


In this example a Facebook page presented itself as focusing on a political cause (T0097.208: Social Cause Persona, T0151.001: Social Media Platform, T0151.002: Online Community Group). Within the page it embedded a QR code (T0122: Direct Users to Alternative Platforms, T0153.004: QR Code), which took users to a document hosted on another website (T0152.004: Website). | +| [I00099 More Women Are Facing The Reality Of Deepfakes, And They’re Ruining Lives](../../generated_pages/incidents/I00099.md) | Last October, British writer Helen was alerted to a series of deepfakes on a porn site that appear to show her engaging in extreme acts of sexual violence. That night, the images replayed themselves over and over in horrific nightmares and she was gripped by an all-consuming feeling of dread. “It’s like you’re in a tunnel, going further and further into this enclosed space, where there’s no light,” she tells Vogue. This feeling pervaded Helen’s life. Whenever she left the house, she felt exposed. On runs, she experienced panic attacks. Helen still has no idea who did this to her.

[...]

Amnesty International has been investigating the effects of abuse against women on Twitter, specifically in relation to how they act online thereafter. According to the charity, abuse creates what they’ve called “the silencing effect” whereby women feel discouraged from participating online. The same can be said for victims of deepfakes.

Helen has never been afraid to use her voice, writing deeply personal accounts of postnatal depression. But the deepfakes created a feeling of shame so strong she thought she’d be carrying this “dirty secret” forever, and so she stopped writing.

[...]

Meanwhile, deepfake ‘communities’ are thriving. There are now dedicated sites, user-friendly apps and organised ‘request’ procedures. Some sites allow you to commission custom deepfakes for £25, while on others you can upload a woman’s image and a bot will strip her naked.

“This violation is not something that should be normalised,” says Gibi, an ASMR artist with 3.13 million YouTube subscribers. Gibi has given up trying to keep tabs on the deepfakes of her. For Gibi, the most egregious part of all of this is the fact that people are “profiting off my face, doing something that I didn’t consent to, like my suffering is your livelihood.” She’s even been approached by a company offering to remove the deepfakes — for £500 a video. This has to end. But how?


A website hosting pornographic content provided users the ability to create deepfake content (T0154.002: AI Media Platform, T0086.002: Develop AI-Generated Images (Deepfakes)).

Another website enabled users to commission custom deepfakes (T0152.004: Website Asset, T0148.004: Payment Processing Capability, T0086.002: Develop AI-Generated Images (Deepfakes), T0155.005: Paid Access Asset). | +| [I00108 How you thought you support the animals and you ended up funding white supremacists](../../generated_pages/incidents/I00108.md) | This article examines the white nationalist group Suavelos’ use of Facebook to draw visitors to its website without overtly revealing their racist ideology:

Suavelos uses Facebook and other platforms to amplify its message. In order to bypass the platforms’ community standards and keep their public pages active, Facebook pages such as “I support the police” are a good vehicle to spread a specific agenda without claiming to be racist. In looking back at this Facebook page, we followed Facebook’s algorithm for related pages and found suggested Facebook pages

[...]

This amplification strategy on Facebook is successful, as according to SimilarWeb figures, it attracts around 111,000 visits every month on the Suavelos.eu website.

[...]

Revenue through online advertisements can be achieved by different platforms through targeted advertisements, like Google Adsense or Doubleclick, or related and similar sponsored content, such as Taboola. Accordingly, Suavelos.eu uses both of these websites to display advertisements and consequently receives funding from such advertisements.

Once visitors are on the website supporting its advertisement revenue, Suavelos’ goal is to then turn these visitors into regular members of Suavelos network through donations or fees, or have them continue to support Suavelos.


Suevelos created a variety of pages on Facebook which presented as centring on prosocial causes. Facebook’s algorithm helped direct users to these pages (T0092: Build Network, T0151.001: Social Media Platform, T0153.006: Content Recommendation Algorithm, T0151.003: Online Community Page, T0143.208: Social Cause Persona).

Suevelos used these pages to generate traffic for their WordPress site (T0122: Direct Users to Alternative Platforms, T0152.003: Website Hosting Platform, T0152.004: Website Asset), which used accounts on a variety of online advertising platforms to host adverts (T0146: Account Asset, T0153.005: Online Advertising Platform). | +| [I00109 Coordinated Facebook Pages Designed to Fund a White Supremacist Agenda](../../generated_pages/incidents/I00109.md) | This report examines the white nationalist group Suavelos’ use of Facebook to draw visitors to its website without overtly revealing their racist ideology. This section of the report looks at the Suavelos website, and the content it links out to.

In going back to Suavelos’ main page, we also found: A link to a page on a web shop: alabastro.eu; A link to a page to donate money to the founders through Tipee and to the website through PayPal; [and] a link to a private forum that gathers 3.000 members: oppidum.suavelos.eu;

Suavelos linked out to an online store which it controlled (T0152.004: Website Asset, T0148.004: Payment Processing Capability), and to accounts on payment processing platforms PayPal and Tipee (T0146: Account Asset, T0148.003: Payment Processing Platform).

The Suavelos website also hosted a private forum (T0151.009: Legacy Online Forum Platform, T0155: Gated Asset), and linked out to a variety of assets it controlled on other online platforms: accounts on Twitter (T0146: Account Asset, T0151.008: Microblogging Platform), YouTube (T0146: Account Asset, T0152.006: Video Platform), Instagram and VKontakte (T0146: Account Asset, T0151.001: Social Media Platform). | +| [I00128 #TrollTracker: Outward Influence Operation From Iran](../../generated_pages/incidents/I00128.md) | [Meta removed a network of assets for coordinated inauthentic behaviour. One page] in the network, @StopMEK, was promoting views against the People’s Mujahedin of Iran (MEK), the largest and most active political opposition group against the Islamic Republic of Iran Leadership.

The content on the page drew narratives showing parallels between the Islamic State of Iraq and Syria (ISIS) and the MEK.

Apart from images and memes, the @StopMEK page shared a link to an archived report on how the United States was monitoring the MEK’s movement in Iran in the mid-1990’s. The file was embedded as a QR code on one of the page’s images.


In this example a Facebook page presented itself as focusing on a political cause (T0097.208: Social Cause Persona, T0151.001: Social Media Platform, T0151.002: Online Community Group). Within the page it embedded a QR code (T0122: Direct Users to Alternative Platforms, T0153.004: QR Code Asset), which took users to a document hosted on another website (T0152.004: Website Asset). | diff --git a/generated_pages/techniques/T0152.005.md b/generated_pages/techniques/T0152.005.md index df1bf70..74a3241 100644 --- a/generated_pages/techniques/T0152.005.md +++ b/generated_pages/techniques/T0152.005.md @@ -7,7 +7,7 @@ | Incident | Descriptions given for this incident | | -------- | -------------------- | -| [I00102 Ignore The Poway Synagogue Shooter’s Manifesto: Pay Attention To 8chan’s /pol/ Board](../../generated_pages/incidents/I00102.md) | On April 27, 2019, at around 11:30 a.m. local time, a young man with a semi-automatic rifle walked into the Chabad of Poway Synagogue in Poway, California. He opened fire, killing one worshipper and wounding three others. In the hours since the shooting, a manifesto, believed to be written by the shooter, began circulating online. Evidence has also surfaced that, like the Christchurch Mosque shooter, this killer began his rampage with a post on 8chan’s /pol/ board.

Although both of these attacks may seem different, since they targeted worshippers of different faiths, both shooters were united by the same fascist ideology. They were also both radicalized in the same place: 8chan’s /pol/ board.

This has been corroborated by posts on the board itself, where “anons,” as the posters call themselves, recirculated the shooter’s since-deleted post. In it, the alleged shooter claims to have been “lurking” on the site for a year and a half. He includes a link to a livestream of his rampage — which thankfully does not appear to have worked — and he also includes a pastebin link to his manifesto.

The very first response to his announcement was another anon cheering him on and telling him to “get the high score,” AKA, kill a huge number of people.


Before carrying out a mass shooting, the shooter posted a thread to 8chan’s /pol/ board. The post directed users to a variety of different platforms (T0146.006: Open Access Platform, T0151.012: Image Board Platform, T0115: Post Content, T0122: Direct Users to Alternative Platforms); a Facebook account on which the shooter attempted to livestream the shooting (T0146: Account, T0151.001: Social Media Platform); and a manifesto they had written hosted on pastebin (T0146.006: Open Access Platform, T0152.005: Paste Platform, T0115: Post Content) and uploaded to the file sharing platform Mediafire (T0152.010: File Hosting Platform, T0085.004: Develop Document).

The report looks deeper into 8chan’s /pol/ board:

8chan is a large website, which includes a number of different discussion groups about everything from anime to left-wing politics. /pol/ is one particularly active board on the website, and it is best described as a gathering place for extremely online neo-Nazis.

[...]

I’ve browsed /pol/ on an almost daily basis since the Christchurch shooting. It has not been difficult to find calls for violence. On Monday, March 25 of this year, I ran across evidence of anons translating the Christchurch shooter’s manifesto into other languages in an attempt to inspire more shootings across the globe.

This tactic can work, and today’s shooting is proof. The Poway Synagogue shooter directly cited the Christchurch shooter as his inspiration, saying he decided to carry out his attack roughly two weeks after that shooting. On /pol/, many anons refer to the Christchurch shooter, Brenton Tarrant, as “Saint Tarrant,” complete with medieval-inspired iconography.


Manifestos posted to 8chan are translated and reshared by other platform users (T0101: Create Localised Content, T0146.006: Open Access Platform, T0151.012: Image Board Platform, T0115: Post Content, T0084.004: Appropriate Content).

When I began looking through /pol/ right after the Poway Synagogue shooting, I came across several claims that the shootings had been a “false flag” aimed at making the message board look bad.

When Bellingcat tweeted out a warning about shitposting and the shooter’s manifesto, in the immediate wake of the attack, probable anons even commented on the Tweet in an attempt to deny that a channer had been behind the attack.

This is a recognizable pattern that occurs in the wake of any crimes committed by members of the board. While the initial response to the Christchurch shooter’s massacre thread was riotous glee, in the days after the shooting many anons began to claim the attack had been a false flag. This actually sparked significant division and debate between the members of /pol/. In the below image, a user mocks other anons for being unable to “believe something in your favor is real.” Another anon responds, “As the evidence comes out, its [sic] quite clear that this was a false flag.”

In his manifesto, the Poway Synagogue shooter even weighed in on this debate, accusing other anons who called the Christchurch and Tree of Life Synagogue shootings “false flags” to merely have been scared: “They can’t fathom that there are brave White men alive who have the willpower and courage it takes to say, ‘Fuck my life—I’m willing to sacrifice everything for the benefit of my race.’”


Platform users deny that their platform has been used by mass shooters to publish their manifestos (T0129.006: Deny Involvement). | +| [I00102 Ignore The Poway Synagogue Shooter’s Manifesto: Pay Attention To 8chan’s /pol/ Board](../../generated_pages/incidents/I00102.md) | On April 27, 2019, at around 11:30 a.m. local time, a young man with a semi-automatic rifle walked into the Chabad of Poway Synagogue in Poway, California. He opened fire, killing one worshipper and wounding three others. In the hours since the shooting, a manifesto, believed to be written by the shooter, began circulating online. Evidence has also surfaced that, like the Christchurch Mosque shooter, this killer began his rampage with a post on 8chan’s /pol/ board.

Although both of these attacks may seem different, since they targeted worshippers of different faiths, both shooters were united by the same fascist ideology. They were also both radicalized in the same place: 8chan’s /pol/ board.

This has been corroborated by posts on the board itself, where “anons,” as the posters call themselves, recirculated the shooter’s since-deleted post. In it, the alleged shooter claims to have been “lurking” on the site for a year and a half. He includes a link to a livestream of his rampage — which thankfully does not appear to have worked — and he also includes a pastebin link to his manifesto.

The very first response to his announcement was another anon cheering him on and telling him to “get the high score,” AKA, kill a huge number of people.


Before carrying out a mass shooting, the shooter posted a thread to 8chan’s /pol/ board. The post directed users to a variety of different platforms (T0146.006: Open Access Platform, T0151.012: Image Board Platform, T0115: Post Content, T0122: Direct Users to Alternative Platforms); a Facebook account on which the shooter attempted to livestream the shooting (T0146: Account Asset, T0151.001: Social Media Platform); and a manifesto they had written hosted on pastebin (T0146.006: Open Access Platform, T0152.005: Paste Platform, T0115: Post Content) and uploaded to the file sharing platform Mediafire (T0152.010: File Hosting Platform, T0085.004: Develop Document).

The report looks deeper into 8chan’s /pol/ board:

8chan is a large website, which includes a number of different discussion groups about everything from anime to left-wing politics. /pol/ is one particularly active board on the website, and it is best described as a gathering place for extremely online neo-Nazis.

[...]

I’ve browsed /pol/ on an almost daily basis since the Christchurch shooting. It has not been difficult to find calls for violence. On Monday, March 25 of this year, I ran across evidence of anons translating the Christchurch shooter’s manifesto into other languages in an attempt to inspire more shootings across the globe.

This tactic can work, and today’s shooting is proof. The Poway Synagogue shooter directly cited the Christchurch shooter as his inspiration, saying he decided to carry out his attack roughly two weeks after that shooting. On /pol/, many anons refer to the Christchurch shooter, Brenton Tarrant, as “Saint Tarrant,” complete with medieval-inspired iconography.


Manifestos posted to 8chan are translated and reshared by other platform users (T0101: Create Localised Content, T0146.006: Open Access Platform, T0151.012: Image Board Platform, T0115: Post Content, T0084.004: Appropriate Content).

When I began looking through /pol/ right after the Poway Synagogue shooting, I came across several claims that the shootings had been a “false flag” aimed at making the message board look bad.

When Bellingcat tweeted out a warning about shitposting and the shooter’s manifesto, in the immediate wake of the attack, probable anons even commented on the Tweet in an attempt to deny that a channer had been behind the attack.

This is a recognizable pattern that occurs in the wake of any crimes committed by members of the board. While the initial response to the Christchurch shooter’s massacre thread was riotous glee, in the days after the shooting many anons began to claim the attack had been a false flag. This actually sparked significant division and debate between the members of /pol/. In the below image, a user mocks other anons for being unable to “believe something in your favor is real.” Another anon responds, “As the evidence comes out, its [sic] quite clear that this was a false flag.”

In his manifesto, the Poway Synagogue shooter even weighed in on this debate, accusing other anons who called the Christchurch and Tree of Life Synagogue shootings “false flags” to merely have been scared: “They can’t fathom that there are brave White men alive who have the willpower and courage it takes to say, ‘Fuck my life—I’m willing to sacrifice everything for the benefit of my race.’”


Platform users deny that their platform has been used by mass shooters to publish their manifestos (T0129.006: Deny Involvement). | | [I00104 Macron Campaign Hit With “Massive and Coordinated” Hacking Attack](../../generated_pages/incidents/I00104.md) | A massive trove of documents purporting to contain thousands of emails and other files from the [2017 presidential] campaign of Emmanuel Macron—the French centrist candidate squaring off against right-wing nationalist Marine Le Pen—was posted on the internet Friday afternoon. The Macron campaign says that at least some of the documents are fake. The document dump came just over a day before voting is set to begin in the final round of the election and mere hours before candidates are legally required to stop campaigning.

At about 2:35 p.m. ET, a post appeared on the 4chan online message board announcing the leak. The documents appear to include emails, internal memos, and screenshots of purported banking records.

“In this pastebin are links to torrents of emails between Macron, his team and other officials, politicians as well as original documents and photos,” the anonymous 4chan poster wrote. “This was passed on to me today so now I am giving it to you, the people. The leak is massvie and released in the hopes that the human search engine here will be able to start sifting through the contents and figure out exactly what we have here.”

The Macron campaign issued a statement Friday night saying it was the victim of a “massive and coordinated” hacking attack. That campaign said the leak included some fake documents that were intended “to sow doubt and misinformation.”


Actors posted a to 4chan a link (T0151.012: Image Board Platform, T0146.006: Open Access Platform, T0115: Post Content, T0122: Direct Users to Alternative Platforms) to text content hosted on pastebin (T0152.005: Paste Platform, T0146.006: Open Access Platform, T0115: Post Content), which contained links to download stolen and fabricated documents. | diff --git a/generated_pages/techniques/T0152.006.md b/generated_pages/techniques/T0152.006.md index ff8a258..a8a8e27 100644 --- a/generated_pages/techniques/T0152.006.md +++ b/generated_pages/techniques/T0152.006.md @@ -7,8 +7,8 @@ | Incident | Descriptions given for this incident | | -------- | -------------------- | -| [I00096 China ramps up use of AI misinformation](../../generated_pages/incidents/I00096.md) | The Microsoft Threat Analysis Centre (MTAC) published a report documenting the use of AI by pro-Chinese threat actors:

On 13 January, Spamouflage [(a Pro-Chinese Communist Party actor)] posted audio clips to YouTube of independent candidate [for Taiwan’s Jan 2024 presidential election] Terry Gou – who also founded electronics giant Foxconn – in which Gou endorsed another candidate in the race. This clip was almost certainly AI-generated, and it was swiftly removed by YouTube. A fake letter purporting to be from Gou, endorsing the same candidate, had already circulated – Gou had of course made no such endorsement.

Here Spamoflage used an account on YouTube to post AI Generated audio impersonating an electoral candidate (T0146: Account, T0152.006: Video Platform, T0115: Post Content, T0088.001: Develop AI-Generated Audio (Deepfakes), T0143.003: Impersonated Persona, T0097.110: Party Official Persona).

Spamouflage also exploited AI-powered video platform CapCut – which is owned by TikTok backers ByteDance – to generate fake news anchors which were used in a variety of campaigns targeting the various presidential candidates in Taiwan.

Spamoflage created accounts on CapCut, which it used to create AI-generated videos of fabricated news anchors (T0146: Account, T0154.002: AI Media Platform, T0087.001: Develop AI-Generated Video (Deepfakes), T0143.002: Fabricated Persona, T0097.102: Journalist Persona). | -| [I00109 Coordinated Facebook Pages Designed to Fund a White Supremacist Agenda](../../generated_pages/incidents/I00109.md) | This report examines the white nationalist group Suavelos’ use of Facebook to draw visitors to its website without overtly revealing their racist ideology. This section of the report looks at the Suavelos website, and the content it links out to.

In going back to Suavelos’ main page, we also found: A link to a page on a web shop: alabastro.eu; A link to a page to donate money to the founders through Tipee and to the website through PayPal; [and] a link to a private forum that gathers 3.000 members: oppidum.suavelos.eu;

Suavelos linked out to an online store which it controlled (T0152.004: Website, T0148.004: Payment Processing Capability), and to accounts on payment processing platforms PayPal and Tipee (T0146: Account, T0148.003: Payment Processing Platform).

The Suavelos website also hosted a private forum (T0151.009: Legacy Online Forum Platform, T0155: Gated Asset), and linked out to a variety of assets it controlled on other online platforms: accounts on Twitter (T0146: Account, T0151.008: Microblogging Platform), YouTube (T0146: Account, T0152.006: Video Platform), Instagram and VKontakte (T0146: Account, T0151.001: Social Media Platform). | +| [I00096 China ramps up use of AI misinformation](../../generated_pages/incidents/I00096.md) | The Microsoft Threat Analysis Centre (MTAC) published a report documenting the use of AI by pro-Chinese threat actors:

On 13 January, Spamouflage [(a Pro-Chinese Communist Party actor)] posted audio clips to YouTube of independent candidate [for Taiwan’s Jan 2024 presidential election] Terry Gou – who also founded electronics giant Foxconn – in which Gou endorsed another candidate in the race. This clip was almost certainly AI-generated, and it was swiftly removed by YouTube. A fake letter purporting to be from Gou, endorsing the same candidate, had already circulated – Gou had of course made no such endorsement.

Here Spamoflage used an account on YouTube to post AI Generated audio impersonating an electoral candidate (T0146: Account Asset, T0152.006: Video Platform, T0115: Post Content, T0088.001: Develop AI-Generated Audio (Deepfakes), T0143.003: Impersonated Persona, T0097.110: Party Official Persona).

Spamouflage also exploited AI-powered video platform CapCut – which is owned by TikTok backers ByteDance – to generate fake news anchors which were used in a variety of campaigns targeting the various presidential candidates in Taiwan.

Spamoflage created accounts on CapCut, which it used to create AI-generated videos of fabricated news anchors (T0146: Account Asset, T0154.002: AI Media Platform, T0087.001: Develop AI-Generated Video (Deepfakes), T0143.002: Fabricated Persona, T0097.102: Journalist Persona). | +| [I00109 Coordinated Facebook Pages Designed to Fund a White Supremacist Agenda](../../generated_pages/incidents/I00109.md) | This report examines the white nationalist group Suavelos’ use of Facebook to draw visitors to its website without overtly revealing their racist ideology. This section of the report looks at the Suavelos website, and the content it links out to.

In going back to Suavelos’ main page, we also found: A link to a page on a web shop: alabastro.eu; A link to a page to donate money to the founders through Tipee and to the website through PayPal; [and] a link to a private forum that gathers 3.000 members: oppidum.suavelos.eu;

Suavelos linked out to an online store which it controlled (T0152.004: Website Asset, T0148.004: Payment Processing Capability), and to accounts on payment processing platforms PayPal and Tipee (T0146: Account Asset, T0148.003: Payment Processing Platform).

The Suavelos website also hosted a private forum (T0151.009: Legacy Online Forum Platform, T0155: Gated Asset), and linked out to a variety of assets it controlled on other online platforms: accounts on Twitter (T0146: Account Asset, T0151.008: Microblogging Platform), YouTube (T0146: Account Asset, T0152.006: Video Platform), Instagram and VKontakte (T0146: Account Asset, T0151.001: Social Media Platform). | diff --git a/generated_pages/techniques/T0152.009.md b/generated_pages/techniques/T0152.009.md index e4514ba..98273a7 100644 --- a/generated_pages/techniques/T0152.009.md +++ b/generated_pages/techniques/T0152.009.md @@ -7,7 +7,7 @@ | Incident | Descriptions given for this incident | | -------- | -------------------- | -| [I00105 Gaming the System: The Use of Gaming-Adjacent Communication, Game and Mod Platforms by Extremist Actors](../../generated_pages/incidents/I00105.md) | In this report, researchers look at online platforms commonly used by people who play videogames, looking at how these platforms can contribute to radicalisation of gamers:

Indie DB [is a platform that serves] to present indie games, which are titles from independent, small developer teams, which can be discussed and downloaded [Indie DB].

[...]

[On Indie DB we] found antisemitic, Islamist, sexist and other discriminatory content during the exploration. Both games and comments were located that made positive references to National Socialism. Radicalised users seem to use the opportunities to network, create groups, and communicate in forums. In addition, a number of member profiles with graphic propaganda content could be located. We found several games with propagandistic content advertised on the platform, which caused apparently radicalised users to form a fan community around those games. For example, there are titles such as the antisemitic Fursan Al-Aqsa: The Knights of the Al-Aqsa Mosque, which has won the Best Hardcore Game award at the Game Connection America 2024 Game Development Awards and which has received antisemitic praise on its review page. In the game, players need to target members of the Israeli Defence Forces, and attacks by Palestinian terrorist groups such as Hamas or Lions’ Den can be re-enacted. These include bomb attacks, beheadings and the re-enactment of the terrorist attack in Israel on 7 October 2023. We, therefore, deem Indie DB to be relevant for further analyses of extremist activities in digital gaming spaces.


Indie DB is an online software delivery platform on which users can create groups, and participate in discussion forums (T0152.009: Software Delivery Platform, T0151.002: Online Community Group, T0151.009: Legacy Online Forum Platform). The platform hosted games which allowed players to reenact terrorist attacks (T0147.001: Game)., In this report, researchers look at online platforms commonly used by people who play videogames, looking at how these platforms can contribute to radicalisation of gamers:

Gamebanana and Mod DB are so-called modding platforms that allow users to post their modifications of existing (popular) games. In the process of modding, highly radicalised content can be inserted into games that did not originally contain it. All of these platforms also have communication functions and customisable profiles.

[...]

During the explorations, several modifications with hateful themes were located, including right-wing extremist, racist, antisemitic and Islamist content. This includes mods that make it possible to play as terrorists or National Socialists. So-called “skins” (textures that change the appearance of models in the game) for characters from first-person shooters are particularly popular and contain references to National Socialism or Islamist terrorist organisations. Although some of this content could be justified with reference to historical accuracy and realism, the user profiles of the creators and commentators often reveal political motivations. Names with neo-Nazi codes or the use of avatars showing members of the Wehrmacht or the Waffen SS, for example, indicate a certain degree of positive appreciation or fascination with right-wing ideology, as do affirmations in the comment columns.

Mod DB in particular has attracted public attention in the past. For example, a mod for the game Half-Life 2 made it possible to play a school shooting with the weapons used during the attacks at Columbine High School (1999) and Virginia Polytechnic Institute and State University (2007). Antisemitic memes and jokes are shared in several groups on the platform. It seems as if users partially connect with each other because of shared political views. There were also indications that Islamist and right-wing extremist users network on the basis of shared views on women, Jews or homosexuals. In addition to relevant usernames and avatars, we found profiles featuring picture galleries, backgrounds and banners dedicated to the SS. Extremist propaganda and radicalisation processes on modding platforms have not been explored yet, but our exploration suggests these digital spaces to be highly relevant for our field.


Mod DB is a platform which allows users to upload mods for games, which other users can download (T0152.009: Software Delivery Platform, T0147.002: Game Mod). | +| [I00105 Gaming the System: The Use of Gaming-Adjacent Communication, Game and Mod Platforms by Extremist Actors](../../generated_pages/incidents/I00105.md) | In this report, researchers look at online platforms commonly used by people who play videogames, looking at how these platforms can contribute to radicalisation of gamers:

Indie DB [is a platform that serves] to present indie games, which are titles from independent, small developer teams, which can be discussed and downloaded [Indie DB].

[...]

[On Indie DB we] found antisemitic, Islamist, sexist and other discriminatory content during the exploration. Both games and comments were located that made positive references to National Socialism. Radicalised users seem to use the opportunities to network, create groups, and communicate in forums. In addition, a number of member profiles with graphic propaganda content could be located. We found several games with propagandistic content advertised on the platform, which caused apparently radicalised users to form a fan community around those games. For example, there are titles such as the antisemitic Fursan Al-Aqsa: The Knights of the Al-Aqsa Mosque, which has won the Best Hardcore Game award at the Game Connection America 2024 Game Development Awards and which has received antisemitic praise on its review page. In the game, players need to target members of the Israeli Defence Forces, and attacks by Palestinian terrorist groups such as Hamas or Lions’ Den can be re-enacted. These include bomb attacks, beheadings and the re-enactment of the terrorist attack in Israel on 7 October 2023. We, therefore, deem Indie DB to be relevant for further analyses of extremist activities in digital gaming spaces.


Indie DB is an online software delivery platform on which users can create groups, and participate in discussion forums (T0152.009: Software Delivery Platform, T0151.002: Online Community Group, T0151.009: Legacy Online Forum Platform). The platform hosted games which allowed players to reenact terrorist attacks (T0147.001: Game Asset)., In this report, researchers look at online platforms commonly used by people who play videogames, looking at how these platforms can contribute to radicalisation of gamers:

Gamebanana and Mod DB are so-called modding platforms that allow users to post their modifications of existing (popular) games. In the process of modding, highly radicalised content can be inserted into games that did not originally contain it. All of these platforms also have communication functions and customisable profiles.

[...]

During the explorations, several modifications with hateful themes were located, including right-wing extremist, racist, antisemitic and Islamist content. This includes mods that make it possible to play as terrorists or National Socialists. So-called “skins” (textures that change the appearance of models in the game) for characters from first-person shooters are particularly popular and contain references to National Socialism or Islamist terrorist organisations. Although some of this content could be justified with reference to historical accuracy and realism, the user profiles of the creators and commentators often reveal political motivations. Names with neo-Nazi codes or the use of avatars showing members of the Wehrmacht or the Waffen SS, for example, indicate a certain degree of positive appreciation or fascination with right-wing ideology, as do affirmations in the comment columns.

Mod DB in particular has attracted public attention in the past. For example, a mod for the game Half-Life 2 made it possible to play a school shooting with the weapons used during the attacks at Columbine High School (1999) and Virginia Polytechnic Institute and State University (2007). Antisemitic memes and jokes are shared in several groups on the platform. It seems as if users partially connect with each other because of shared political views. There were also indications that Islamist and right-wing extremist users network on the basis of shared views on women, Jews or homosexuals. In addition to relevant usernames and avatars, we found profiles featuring picture galleries, backgrounds and banners dedicated to the SS. Extremist propaganda and radicalisation processes on modding platforms have not been explored yet, but our exploration suggests these digital spaces to be highly relevant for our field.


Mod DB is a platform which allows users to upload mods for games, which other users can download (T0152.009: Software Delivery Platform, T0147.002: Game Mod Asset). | | [I00123 The Extreme Right on Steam](../../generated_pages/incidents/I00123.md) | Analysis of communities on the gaming platform Steam showed that groups who are known to have engaged in acts of terrorism used Steam to host social communities (T0152.009: Software Delivery Platform, T0151.002: Online Community Group):

The first is a Finnish-language group which was set up to promote the Nordic Resistance Movement (NRM). NRM are the only group in the sample examined by ISD known to have engaged in terrorist attacks. Swedish members of the group conducted a series of bombings in Gothenburg in 2016 and 2017, and several Finnish members are under investigation in relation to both violent attacks and murder.

The NRM Steam group does not host content related to gaming, and instead seems to act as a hub for the movement. The group’s overview section contains a link to the official NRM website, and users are encouraged to find like-minded people to join the group. The group is relatively small, with 87 members, but at the time of writing, it appeared to be active and in use. Interestingly, although the group is in Finnish language, it has members in common with the English language channels identified in this analysis. This suggests that Steam may help facilitate international exchange between right-wing extremists.
, ISD conducted an investigation into the usage of social groups on Steam. Steam is an online platform used to buy and sell digital games, and includes the Steam community feature, which “allows users to find friends and join groups and discussion forums, while also offering in-game voice and text chat”. Actors have used Steam’s social capabilities to enable online harm campaigns:

One function of these Steam groups is the organisation of ‘raids’ – coordinated trolling activity against their political opponents. An example of this can be seen in a white power music group sharing a link to an Israeli Steam group, encouraging other members to “help me raid this juden [German word for Jew] group”. The comments section of said target group show that neo-Nazi and antisemitic comments were consistently posted in the group just two minutes after the instruction had been posted in the extremist group, highlighting the swiftness with which racially motivated harassment can be directed online.

Threat actors used social groups on Steam to organise harassment of targets (T0152.009: Software Delivery Platform, T0151.002: Online Community Group, T0049.005: Conduct Swarming, T0048: Harass)., ISD conducted an investigation into the usage of social groups on Steam. Steam is an online platform used to buy and sell digital games, and includes the Steam community feature, which “allows users to find friends and join groups and discussion forums, while also offering in-game voice and text chat”. Actors have used Steam’s social capabilities to enable online harm campaigns:

A number of groups were observed encouraging members to join conversations on outside platforms. These include links to Telegram channels connected to white supremacist marches, and media outlets, forums and Discord servers run by neo-Nazis.

[...]

This off-ramping activity demonstrates how rather than sitting in isolation, Steam fits into the wider extreme right wing online ecosystem, with Steam groups acting as hubs for communities and organizations which span multiple platforms. Accordingly, although the platform appears to fill a specific role in the building and strengthening of communities with similar hobbies and interests, it is suggested that analysis seeking to determine the risk of these communities should focus on their activity across platforms


Social Groups on Steam were used to drive new people to other neo-Nazi controlled community assets (T0122: Direct Users to Alternative Platforms, T0152.009: Software Delivery Platform, T0151.002: Online Community Group). | diff --git a/generated_pages/techniques/T0152.010.md b/generated_pages/techniques/T0152.010.md index 698ce9d..196ff5a 100644 --- a/generated_pages/techniques/T0152.010.md +++ b/generated_pages/techniques/T0152.010.md @@ -7,7 +7,7 @@ | Incident | Descriptions given for this incident | | -------- | -------------------- | -| [I00102 Ignore The Poway Synagogue Shooter’s Manifesto: Pay Attention To 8chan’s /pol/ Board](../../generated_pages/incidents/I00102.md) | On April 27, 2019, at around 11:30 a.m. local time, a young man with a semi-automatic rifle walked into the Chabad of Poway Synagogue in Poway, California. He opened fire, killing one worshipper and wounding three others. In the hours since the shooting, a manifesto, believed to be written by the shooter, began circulating online. Evidence has also surfaced that, like the Christchurch Mosque shooter, this killer began his rampage with a post on 8chan’s /pol/ board.

Although both of these attacks may seem different, since they targeted worshippers of different faiths, both shooters were united by the same fascist ideology. They were also both radicalized in the same place: 8chan’s /pol/ board.

This has been corroborated by posts on the board itself, where “anons,” as the posters call themselves, recirculated the shooter’s since-deleted post. In it, the alleged shooter claims to have been “lurking” on the site for a year and a half. He includes a link to a livestream of his rampage — which thankfully does not appear to have worked — and he also includes a pastebin link to his manifesto.

The very first response to his announcement was another anon cheering him on and telling him to “get the high score,” AKA, kill a huge number of people.


Before carrying out a mass shooting, the shooter posted a thread to 8chan’s /pol/ board. The post directed users to a variety of different platforms (T0146.006: Open Access Platform, T0151.012: Image Board Platform, T0115: Post Content, T0122: Direct Users to Alternative Platforms); a Facebook account on which the shooter attempted to livestream the shooting (T0146: Account, T0151.001: Social Media Platform); and a manifesto they had written hosted on pastebin (T0146.006: Open Access Platform, T0152.005: Paste Platform, T0115: Post Content) and uploaded to the file sharing platform Mediafire (T0152.010: File Hosting Platform, T0085.004: Develop Document).

The report looks deeper into 8chan’s /pol/ board:

8chan is a large website, which includes a number of different discussion groups about everything from anime to left-wing politics. /pol/ is one particularly active board on the website, and it is best described as a gathering place for extremely online neo-Nazis.

[...]

I’ve browsed /pol/ on an almost daily basis since the Christchurch shooting. It has not been difficult to find calls for violence. On Monday, March 25 of this year, I ran across evidence of anons translating the Christchurch shooter’s manifesto into other languages in an attempt to inspire more shootings across the globe.

This tactic can work, and today’s shooting is proof. The Poway Synagogue shooter directly cited the Christchurch shooter as his inspiration, saying he decided to carry out his attack roughly two weeks after that shooting. On /pol/, many anons refer to the Christchurch shooter, Brenton Tarrant, as “Saint Tarrant,” complete with medieval-inspired iconography.


Manifestos posted to 8chan are translated and reshared by other platform users (T0101: Create Localised Content, T0146.006: Open Access Platform, T0151.012: Image Board Platform, T0115: Post Content, T0084.004: Appropriate Content).

When I began looking through /pol/ right after the Poway Synagogue shooting, I came across several claims that the shootings had been a “false flag” aimed at making the message board look bad.

When Bellingcat tweeted out a warning about shitposting and the shooter’s manifesto, in the immediate wake of the attack, probable anons even commented on the Tweet in an attempt to deny that a channer had been behind the attack.

This is a recognizable pattern that occurs in the wake of any crimes committed by members of the board. While the initial response to the Christchurch shooter’s massacre thread was riotous glee, in the days after the shooting many anons began to claim the attack had been a false flag. This actually sparked significant division and debate between the members of /pol/. In the below image, a user mocks other anons for being unable to “believe something in your favor is real.” Another anon responds, “As the evidence comes out, its [sic] quite clear that this was a false flag.”

In his manifesto, the Poway Synagogue shooter even weighed in on this debate, accusing other anons who called the Christchurch and Tree of Life Synagogue shootings “false flags” to merely have been scared: “They can’t fathom that there are brave White men alive who have the willpower and courage it takes to say, ‘Fuck my life—I’m willing to sacrifice everything for the benefit of my race.’”


Platform users deny that their platform has been used by mass shooters to publish their manifestos (T0129.006: Deny Involvement). | +| [I00102 Ignore The Poway Synagogue Shooter’s Manifesto: Pay Attention To 8chan’s /pol/ Board](../../generated_pages/incidents/I00102.md) | On April 27, 2019, at around 11:30 a.m. local time, a young man with a semi-automatic rifle walked into the Chabad of Poway Synagogue in Poway, California. He opened fire, killing one worshipper and wounding three others. In the hours since the shooting, a manifesto, believed to be written by the shooter, began circulating online. Evidence has also surfaced that, like the Christchurch Mosque shooter, this killer began his rampage with a post on 8chan’s /pol/ board.

Although both of these attacks may seem different, since they targeted worshippers of different faiths, both shooters were united by the same fascist ideology. They were also both radicalized in the same place: 8chan’s /pol/ board.

This has been corroborated by posts on the board itself, where “anons,” as the posters call themselves, recirculated the shooter’s since-deleted post. In it, the alleged shooter claims to have been “lurking” on the site for a year and a half. He includes a link to a livestream of his rampage — which thankfully does not appear to have worked — and he also includes a pastebin link to his manifesto.

The very first response to his announcement was another anon cheering him on and telling him to “get the high score,” AKA, kill a huge number of people.


Before carrying out a mass shooting, the shooter posted a thread to 8chan’s /pol/ board. The post directed users to a variety of different platforms (T0146.006: Open Access Platform, T0151.012: Image Board Platform, T0115: Post Content, T0122: Direct Users to Alternative Platforms); a Facebook account on which the shooter attempted to livestream the shooting (T0146: Account Asset, T0151.001: Social Media Platform); and a manifesto they had written hosted on pastebin (T0146.006: Open Access Platform, T0152.005: Paste Platform, T0115: Post Content) and uploaded to the file sharing platform Mediafire (T0152.010: File Hosting Platform, T0085.004: Develop Document).

The report looks deeper into 8chan’s /pol/ board:

8chan is a large website, which includes a number of different discussion groups about everything from anime to left-wing politics. /pol/ is one particularly active board on the website, and it is best described as a gathering place for extremely online neo-Nazis.

[...]

I’ve browsed /pol/ on an almost daily basis since the Christchurch shooting. It has not been difficult to find calls for violence. On Monday, March 25 of this year, I ran across evidence of anons translating the Christchurch shooter’s manifesto into other languages in an attempt to inspire more shootings across the globe.

This tactic can work, and today’s shooting is proof. The Poway Synagogue shooter directly cited the Christchurch shooter as his inspiration, saying he decided to carry out his attack roughly two weeks after that shooting. On /pol/, many anons refer to the Christchurch shooter, Brenton Tarrant, as “Saint Tarrant,” complete with medieval-inspired iconography.


Manifestos posted to 8chan are translated and reshared by other platform users (T0101: Create Localised Content, T0146.006: Open Access Platform, T0151.012: Image Board Platform, T0115: Post Content, T0084.004: Appropriate Content).

When I began looking through /pol/ right after the Poway Synagogue shooting, I came across several claims that the shootings had been a “false flag” aimed at making the message board look bad.

When Bellingcat tweeted out a warning about shitposting and the shooter’s manifesto, in the immediate wake of the attack, probable anons even commented on the Tweet in an attempt to deny that a channer had been behind the attack.

This is a recognizable pattern that occurs in the wake of any crimes committed by members of the board. While the initial response to the Christchurch shooter’s massacre thread was riotous glee, in the days after the shooting many anons began to claim the attack had been a false flag. This actually sparked significant division and debate between the members of /pol/. In the below image, a user mocks other anons for being unable to “believe something in your favor is real.” Another anon responds, “As the evidence comes out, its [sic] quite clear that this was a false flag.”

In his manifesto, the Poway Synagogue shooter even weighed in on this debate, accusing other anons who called the Christchurch and Tree of Life Synagogue shootings “false flags” to merely have been scared: “They can’t fathom that there are brave White men alive who have the willpower and courage it takes to say, ‘Fuck my life—I’m willing to sacrifice everything for the benefit of my race.’”


Platform users deny that their platform has been used by mass shooters to publish their manifestos (T0129.006: Deny Involvement). | diff --git a/generated_pages/techniques/T0152.012.md b/generated_pages/techniques/T0152.012.md index 20289bc..b14bc3e 100644 --- a/generated_pages/techniques/T0152.012.md +++ b/generated_pages/techniques/T0152.012.md @@ -7,9 +7,9 @@ | Incident | Descriptions given for this incident | | -------- | -------------------- | -| [I00110 How COVID-19 conspiracists and extremists use crowdfunding platforms to fund their activities](../../generated_pages/incidents/I00110.md) | The EU Disinfo Lab produced a report into disinformation published on crowdfunding platforms:



More worrisome is the direct monetisation of disinformation happening on crowdfunding platforms: on Kickstarter, we found a user openly raising money for a documentary project suggesting that COVID-19 is a conspiracy.

A Kickstarter user attempted to use the platform to fund production of a documentary (T0017: Conduct Fundraising, T0087: Develop Video-Based Content, T0146: Account, T0148.006: Crowdfunding Platform).

On Patreon, we found several instances of direct monetisation of COVID-19 disinformation, including posts promoting a device allegedly protecting against COVID-19 and 5G, as well as posts related to the “Plandemic” conspiracy video, which gained attention on YouTube before being removed by the platform.

We also found an account called “Stranger than fiction” entirely dedicated to disinformation, which openly states that their content was “Banned by screwtube and fakebook, our videos have been viewed over a billion times.”


The “Stranger than fiction” user presented itself as an alternative news source which had been banned from other platforms (T0146: Account, T0097.202: News Outlet Persona, T0121.001: Bypass Content Bocking, T0152.012: Subscription Service Platform).

On the US-based crowdfunding platform IndieGogo, EU DisinfoLab found a successful crowdfunding campaign of €133.903 for a book called Revolution Q. This book, now also available on Amazon, claims to be “Written for both newcomers and long-time QAnon fans alike, this book is a treasure-trove of information designed to help everyone weather The Storm.”

An IndieGogo account was used to gather funds to produce a book on QAnon (T0017: Conduct Fundraising, T0085.005: Develop Book, T0146: Account, T0148.006: Crowdfunding Platform), with the book later sold on Amazon marketplace (T0148.007: eCommerce Platform). | -| [I00111 Patreon Is Bankrolling Climate Change Deniers While We All Burn](../../generated_pages/incidents/I00111.md) | In this article VICE News discusses a report produced by Advance Democracy on people who use Patreon to spread the false claim that an impending ice age will reverse the harms of the ongoing climate crisis:

“The spread of climate misinformation is prolific on social media, as well as on sites like Patreon, where users are actually financially compensated through the platform for spreading falsehoods,” Daniel Jones, president of Advance Democracy, told VICE News.

“Companies hosting and promoting climate misinformation have a responsibility to take action to reduce dangerous misinformation, as falsehoods about climate science are every bit as dangerous as lies about vaccinations and disinformation about our elections.”

Patreon did not respond to VICE News’ request for comment on the report’s findings.

One of the biggest accounts spreading climate conspiracies is ADAPT 2030, which is run by David DuByne, who has 1,100 followers on Patreon. He is currently making over $3,500 every month from his subscribers.

[The science DuByne relies on does not support his hypothesis. However,] this has not prevented DuByne and many others from preying on people’s fears about climate change to spread conspiracies about an impending ice age, which they say will miraculously fix all of earth’s climate problems.

DuByne offers seven different membership levels for supporters, beginning at just $1 per month.

The most expensive costs $100 a month, and gives patrons “a private 20-minute call with David DuByne once per month, to discuss your particular preparedness issues or concerns.” So far just two people are paying this amount.

The researchers also found at least eight other accounts on Patreon that have spread climate change conspiracy theories as part of wider conspiracy sharing, including baseless claims about COVID-19 and the legitimacy of Joe Biden’s presidency. Some of these accounts are earning over $600 per month.


David DuByne created an account on Patreon, which he uses to post text, videos, and podcasts for his subscribers to discuss (T0085: Develop Text-Based Content, T0087: Develop Video-Based Content, T0088: Develop Audio-Based Content, T0146: Account, T0115: Post Content, T0152.012: Subscription Service Platform, T0151.014: Comments Section, T0155.006: Subscription Access). | -| [I00112 Patreon allows disinformation and conspiracies to be monetised in Spain](../../generated_pages/incidents/I00112.md) | In this report EU DisinfoLab identified 17 Spanish accounts that monetise and/or spread QAnon content or other conspiracy theories on Patreon. Content produced by these accounts go against Patreon’s stated policy of removing creators that “advance disinformation promoting the QAnon conspiracy theory”. EU DisinfoLab found:

In most cases, the creators monetise the content directly on Patreon (posts are only accessible for people sponsoring the creators) but there are also cases of indirect monetization (monetization through links leading to other platforms), an aspect that was flagged and analysed by Eu DisinfoLab in the mentioned previous report.

Some creators display links that redirects users to other platforms such as YouTube or LBRY where they can monetise their content. Some even offer almost all of their videos for free by redirecting to their YouTube channel.

Another modus operandi is for the creators to advertise on Patreon that they are looking for financing through PayPal or provide the author’s email to explore other financing alternatives.

[...]

Sometimes the content offered for a fee on Patreon is freely accessible on other platforms. Creators openly explain that they seek voluntary donation on Patreon, but that their creations will be public on YouTube. This means that the model of these platforms does not always involve a direct monetisation of the content. Creators who have built a strong reputation previously on other platforms can use Patreon as a platform to get some sponsorship which is not related to the content and give them more freedom to create.

Some users explicitly claim to use Patreon as a secondary channel to evade “censorship” by other platforms such as YouTube. Patreon seems to be perceived as a safe haven for disinformation and fringe content that has been suppressed for violating the policies of other platforms. For example, Jorge Guerra points out how Patreon acts as a back-up channel to go to in case of censorship by YouTube. Meanwhile, Alfa Mind openly claims to use Patreon to publish content that is not allowed on YouTube. “Exclusive access to videos that are prohibited on YouTube. These videos are only accessible on Patreon, as their content is very explicit and shocking”, are offered to the patrons who pay €3 per month.


In spite of Patreon’s stated policy, actors use accounts on their platform to generate revenue or donations for their content, and to provide a space to host content which was removed from other platforms (T0146: Account, T0152.012: Subscription Service Platform, T0121.001: Bypass Content Bocking).

Some actors were observed accepting donations via PayPal (T0146: Account, T0148.003: Payment Processing Platform). | +| [I00110 How COVID-19 conspiracists and extremists use crowdfunding platforms to fund their activities](../../generated_pages/incidents/I00110.md) | The EU Disinfo Lab produced a report into disinformation published on crowdfunding platforms:

More worrisome is the direct monetisation of disinformation happening on crowdfunding platforms: on Kickstarter, we found a user openly raising money for a documentary project suggesting that COVID-19 is a conspiracy.

A Kickstarter user attempted to use the platform to fund production of a documentary (T0017: Conduct Fundraising, T0087: Develop Video-Based Content, T0146: Account Asset, T0148.006: Crowdfunding Platform).

On Patreon, we found several instances of direct monetisation of COVID-19 disinformation, including posts promoting a device allegedly protecting against COVID-19 and 5G, as well as posts related to the “Plandemic” conspiracy video, which gained attention on YouTube before being removed by the platform.

We also found an account called “Stranger than fiction” entirely dedicated to disinformation, which openly states that their content was “Banned by screwtube and fakebook, our videos have been viewed over a billion times.”


The “Stranger than fiction” user presented itself as an alternative news source which had been banned from other platforms (T0146: Account Asset, T0097.202: News Outlet Persona, T0121.001: Bypass Content Bocking, T0152.012: Subscription Service Platform).

On the US-based crowdfunding platform IndieGogo, EU DisinfoLab found a successful crowdfunding campaign of €133.903 for a book called Revolution Q. This book, now also available on Amazon, claims to be “Written for both newcomers and long-time QAnon fans alike, this book is a treasure-trove of information designed to help everyone weather The Storm.”

An IndieGogo account was used to gather funds to produce a book on QAnon (T0017: Conduct Fundraising, T0085.005: Develop Book, T0146: Account Asset, T0148.006: Crowdfunding Platform), with the book later sold on Amazon marketplace (T0148.007: eCommerce Platform). | +| [I00111 Patreon Is Bankrolling Climate Change Deniers While We All Burn](../../generated_pages/incidents/I00111.md) | In this article VICE News discusses a report produced by Advance Democracy on people who use Patreon to spread the false claim that an impending ice age will reverse the harms of the ongoing climate crisis:

“The spread of climate misinformation is prolific on social media, as well as on sites like Patreon, where users are actually financially compensated through the platform for spreading falsehoods,” Daniel Jones, president of Advance Democracy, told VICE News.

“Companies hosting and promoting climate misinformation have a responsibility to take action to reduce dangerous misinformation, as falsehoods about climate science are every bit as dangerous as lies about vaccinations and disinformation about our elections.”

Patreon did not respond to VICE News’ request for comment on the report’s findings.

One of the biggest accounts spreading climate conspiracies is ADAPT 2030, which is run by David DuByne, who has 1,100 followers on Patreon. He is currently making over $3,500 every month from his subscribers.

[The science DuByne relies on does not support his hypothesis. However,] this has not prevented DuByne and many others from preying on people’s fears about climate change to spread conspiracies about an impending ice age, which they say will miraculously fix all of earth’s climate problems.

DuByne offers seven different membership levels for supporters, beginning at just $1 per month.

The most expensive costs $100 a month, and gives patrons “a private 20-minute call with David DuByne once per month, to discuss your particular preparedness issues or concerns.” So far just two people are paying this amount.

The researchers also found at least eight other accounts on Patreon that have spread climate change conspiracy theories as part of wider conspiracy sharing, including baseless claims about COVID-19 and the legitimacy of Joe Biden’s presidency. Some of these accounts are earning over $600 per month.


David DuByne created an account on Patreon, which he uses to post text, videos, and podcasts for his subscribers to discuss (T0085: Develop Text-Based Content, T0087: Develop Video-Based Content, T0088: Develop Audio-Based Content, T0146: Account Asset, T0115: Post Content, T0152.012: Subscription Service Platform, T0151.014: Comments Section, T0155.006: Subscription Access Asset). | +| [I00112 Patreon allows disinformation and conspiracies to be monetised in Spain](../../generated_pages/incidents/I00112.md) | In this report EU DisinfoLab identified 17 Spanish accounts that monetise and/or spread QAnon content or other conspiracy theories on Patreon. Content produced by these accounts go against Patreon’s stated policy of removing creators that “advance disinformation promoting the QAnon conspiracy theory”. EU DisinfoLab found:

In most cases, the creators monetise the content directly on Patreon (posts are only accessible for people sponsoring the creators) but there are also cases of indirect monetization (monetization through links leading to other platforms), an aspect that was flagged and analysed by Eu DisinfoLab in the mentioned previous report.

Some creators display links that redirects users to other platforms such as YouTube or LBRY where they can monetise their content. Some even offer almost all of their videos for free by redirecting to their YouTube channel.

Another modus operandi is for the creators to advertise on Patreon that they are looking for financing through PayPal or provide the author’s email to explore other financing alternatives.

[...]

Sometimes the content offered for a fee on Patreon is freely accessible on other platforms. Creators openly explain that they seek voluntary donation on Patreon, but that their creations will be public on YouTube. This means that the model of these platforms does not always involve a direct monetisation of the content. Creators who have built a strong reputation previously on other platforms can use Patreon as a platform to get some sponsorship which is not related to the content and give them more freedom to create.

Some users explicitly claim to use Patreon as a secondary channel to evade “censorship” by other platforms such as YouTube. Patreon seems to be perceived as a safe haven for disinformation and fringe content that has been suppressed for violating the policies of other platforms. For example, Jorge Guerra points out how Patreon acts as a back-up channel to go to in case of censorship by YouTube. Meanwhile, Alfa Mind openly claims to use Patreon to publish content that is not allowed on YouTube. “Exclusive access to videos that are prohibited on YouTube. These videos are only accessible on Patreon, as their content is very explicit and shocking”, are offered to the patrons who pay €3 per month.


In spite of Patreon’s stated policy, actors use accounts on their platform to generate revenue or donations for their content, and to provide a space to host content which was removed from other platforms (T0146: Account Asset, T0152.012: Subscription Service Platform, T0121.001: Bypass Content Bocking).

Some actors were observed accepting donations via PayPal (T0146: Account Asset, T0148.003: Payment Processing Platform). | diff --git a/generated_pages/techniques/T0153.001.md b/generated_pages/techniques/T0153.001.md index 2cdbbd8..9a1ecbb 100644 --- a/generated_pages/techniques/T0153.001.md +++ b/generated_pages/techniques/T0153.001.md @@ -7,8 +7,8 @@ | Incident | Descriptions given for this incident | | -------- | -------------------- | -| [I00119 Independent journalist publishes Trump campaign document hacked by Iran despite election interference concerns](../../generated_pages/incidents/I00119.md) | An American journalist who runs an independent newsletter published a document [on 26 Sep 2024] that appears to have been stolen from Donald Trump’s presidential campaign — the first public posting of a file that is believed to be part of a dossier that federal officials say is part of an Iranian effort to manipulate the [2024] U.S. election.

The PDF document is a 271-page opposition research file on former President Donald Trump’s running mate, Sen. JD Vance, R-Ohio.

For more than two months, hackers who the U.S. says are tied to Iran have tried to persuade the American media to cover files they stole. No outlets took the bait.

But on Thursday, reporter Ken Klippenstein, who self-publishes on Substack after he left The Intercept this year, published one of the files.

[...]

Reporters who have received the documents describe the same pattern: An AOL account emails them files, signed by a person using the name “Robert,” who is reluctant to speak to their identity or reasons for wanting the documents to receive coverage.

NBC News was not part of the Robert persona’s direct outreach, but it has viewed its correspondence with a reporter at another publication.

One of the emails from the Robert persona previously viewed by NBC News included three large PDF files, each corresponding to Trump’s three reported finalists for vice president. The Vance file appears to be the one Klippenstein hosts on his site.


In this example hackers attributed to Iran used the Robert persona to email journalists hacked documents (T0146: Account, T0097.100: Individual Persona, T0153.001: Email Platform).

The journalist Ken Kippenstien used his existing blog on substack to host a link to download the document (T0089: Obtain Private Documents, T0097.102: Journalist Persona, T0115: Post Content, T0143.001: Authentic Persona, T0152.001: Blogging Platform, T0152.002: Blog, T0150.003: Pre-Existing). | -| [I00121 Operation Overload: how pro-Russian actors flood newsrooms with fake content and seek to divert their efforts](../../generated_pages/incidents/I00121.md) | The unique aspect of Operation Overload is a barrage of emails sent to newsrooms and fact-checkers across Europe. The authors of these messages urge recipients to verify content allegedly found online. The email subject lines often include an incitement to verify the claims briefly described in the message body. This is followed by a short list of links directing recipients to posts on Telegram, X, or known pro-Russian websites, including Pravda and Sputnik.

We have collected 221 emails sent to 20 organisations. The organisations mostly received identical emails urging them to fact-check specific false stories, which demonstrates that the emails were sent as part of a larger coordinated campaign.

[...]

The authors of the emails do not hide their intention to see the fake content widely spread. In February 2024, a journalist at the German outlet CORRECTIV engaged with the sender of one of the emails, providing feedback on the narratives which were originally sent. CORRECTIV received a response from the same Gmail address, initially expressing respect and trust in CORRECTIV’s assessment, while asking: “is it possible for your work to be seen by as many people as possible?”, thereby clearly stating the goal of the operation.

[...]

All the emails come from authors posing as concerned citizens. All emails are sent with Gmail accounts, which is typical for personal use. This makes it challenging to identify the individuals behind these emails, as anyone can open a Gmail account for free. The email headers indicate that the messages were sent from the Gmail interface, not from a personal client which would disclose the sender’s IP address.


In this example, threat actors used gmail accounts (T0146.001: Free Account, T0097.100: Individual Persona, T0143.002: Fabricated Persona, T0153.001: Email Platform) to target journalists and fact-checkers, with the apparent goal of having them amplify operation narratives through fact checks. | +| [I00119 Independent journalist publishes Trump campaign document hacked by Iran despite election interference concerns](../../generated_pages/incidents/I00119.md) | An American journalist who runs an independent newsletter published a document [on 26 Sep 2024] that appears to have been stolen from Donald Trump’s presidential campaign — the first public posting of a file that is believed to be part of a dossier that federal officials say is part of an Iranian effort to manipulate the [2024] U.S. election.

The PDF document is a 271-page opposition research file on former President Donald Trump’s running mate, Sen. JD Vance, R-Ohio.

For more than two months, hackers who the U.S. says are tied to Iran have tried to persuade the American media to cover files they stole. No outlets took the bait.

But on Thursday, reporter Ken Klippenstein, who self-publishes on Substack after he left The Intercept this year, published one of the files.

[...]

Reporters who have received the documents describe the same pattern: An AOL account emails them files, signed by a person using the name “Robert,” who is reluctant to speak to their identity or reasons for wanting the documents to receive coverage.

NBC News was not part of the Robert persona’s direct outreach, but it has viewed its correspondence with a reporter at another publication.

One of the emails from the Robert persona previously viewed by NBC News included three large PDF files, each corresponding to Trump’s three reported finalists for vice president. The Vance file appears to be the one Klippenstein hosts on his site.


In this example hackers attributed to Iran used the Robert persona to email journalists hacked documents (T0146: Account Asset, T0097.100: Individual Persona, T0153.001: Email Platform).

The journalist Ken Kippenstien used his existing blog on substack to host a link to download the document (T0089: Obtain Private Documents, T0097.102: Journalist Persona, T0115: Post Content, T0143.001: Authentic Persona, T0152.001: Blogging Platform, T0152.002: Blog Asset, T0150.003: Pre-Existing Asset). | +| [I00121 Operation Overload: how pro-Russian actors flood newsrooms with fake content and seek to divert their efforts](../../generated_pages/incidents/I00121.md) | The unique aspect of Operation Overload is a barrage of emails sent to newsrooms and fact-checkers across Europe. The authors of these messages urge recipients to verify content allegedly found online. The email subject lines often include an incitement to verify the claims briefly described in the message body. This is followed by a short list of links directing recipients to posts on Telegram, X, or known pro-Russian websites, including Pravda and Sputnik.

We have collected 221 emails sent to 20 organisations. The organisations mostly received identical emails urging them to fact-check specific false stories, which demonstrates that the emails were sent as part of a larger coordinated campaign.

[...]

The authors of the emails do not hide their intention to see the fake content widely spread. In February 2024, a journalist at the German outlet CORRECTIV engaged with the sender of one of the emails, providing feedback on the narratives which were originally sent. CORRECTIV received a response from the same Gmail address, initially expressing respect and trust in CORRECTIV’s assessment, while asking: “is it possible for your work to be seen by as many people as possible?”, thereby clearly stating the goal of the operation.

[...]

All the emails come from authors posing as concerned citizens. All emails are sent with Gmail accounts, which is typical for personal use. This makes it challenging to identify the individuals behind these emails, as anyone can open a Gmail account for free. The email headers indicate that the messages were sent from the Gmail interface, not from a personal client which would disclose the sender’s IP address.


In this example, threat actors used gmail accounts (T0146.001: Free Account Asset, T0097.100: Individual Persona, T0143.002: Fabricated Persona, T0153.001: Email Platform) to target journalists and fact-checkers, with the apparent goal of having them amplify operation narratives through fact checks. | diff --git a/generated_pages/techniques/T0153.003.md b/generated_pages/techniques/T0153.003.md index 32660ec..a4f94c9 100644 --- a/generated_pages/techniques/T0153.003.md +++ b/generated_pages/techniques/T0153.003.md @@ -1,4 +1,4 @@ -# Technique T0153.003: Shortened Link +# Technique T0153.003: Shortened Link Asset * **Summary**: A Shortened Link is a custom URL which is typically a shortened version of another URL. diff --git a/generated_pages/techniques/T0153.004.md b/generated_pages/techniques/T0153.004.md index ebc10d6..965fcff 100644 --- a/generated_pages/techniques/T0153.004.md +++ b/generated_pages/techniques/T0153.004.md @@ -1,4 +1,4 @@ -# Technique T0153.004: QR Code +# Technique T0153.004: QR Code Asset * **Summary**: A QR Code allows people to use cameras on their smartphones to open a URL. @@ -7,7 +7,7 @@ | Incident | Descriptions given for this incident | | -------- | -------------------- | -| [I00128 #TrollTracker: Outward Influence Operation From Iran](../../generated_pages/incidents/I00128.md) | [Meta removed a network of assets for coordinated inauthentic behaviour. One page] in the network, @StopMEK, was promoting views against the People’s Mujahedin of Iran (MEK), the largest and most active political opposition group against the Islamic Republic of Iran Leadership.

The content on the page drew narratives showing parallels between the Islamic State of Iraq and Syria (ISIS) and the MEK.

Apart from images and memes, the @StopMEK page shared a link to an archived report on how the United States was monitoring the MEK’s movement in Iran in the mid-1990’s. The file was embedded as a QR code on one of the page’s images.


In this example a Facebook page presented itself as focusing on a political cause (T0097.208: Social Cause Persona, T0151.001: Social Media Platform, T0151.002: Online Community Group). Within the page it embedded a QR code (T0122: Direct Users to Alternative Platforms, T0153.004: QR Code), which took users to a document hosted on another website (T0152.004: Website). | +| [I00128 #TrollTracker: Outward Influence Operation From Iran](../../generated_pages/incidents/I00128.md) | [Meta removed a network of assets for coordinated inauthentic behaviour. One page] in the network, @StopMEK, was promoting views against the People’s Mujahedin of Iran (MEK), the largest and most active political opposition group against the Islamic Republic of Iran Leadership.

The content on the page drew narratives showing parallels between the Islamic State of Iraq and Syria (ISIS) and the MEK.

Apart from images and memes, the @StopMEK page shared a link to an archived report on how the United States was monitoring the MEK’s movement in Iran in the mid-1990’s. The file was embedded as a QR code on one of the page’s images.


In this example a Facebook page presented itself as focusing on a political cause (T0097.208: Social Cause Persona, T0151.001: Social Media Platform, T0151.002: Online Community Group). Within the page it embedded a QR code (T0122: Direct Users to Alternative Platforms, T0153.004: QR Code Asset), which took users to a document hosted on another website (T0152.004: Website Asset). | diff --git a/generated_pages/techniques/T0153.005.md b/generated_pages/techniques/T0153.005.md index b54526f..80100ae 100644 --- a/generated_pages/techniques/T0153.005.md +++ b/generated_pages/techniques/T0153.005.md @@ -8,8 +8,8 @@ | Incident | Descriptions given for this incident | | -------- | -------------------- | | [I00097 Report: Not Just Algorithms](../../generated_pages/incidents/I00097.md) | This report explores the role of four systems (recommender systems, content moderation systems, ad approval systems and ad management systems) in creating risks around eating disorders.

[...]

Ad approval systems can create risks. We created 12 ‘fake’ ads that promoted dangerous weight loss techniques and behaviours. We tested to see if these ads would be approved to run, and they were. This means dangerous behaviours can be promoted in paid-for advertising. (Requests to run ads were withdrawn after approval or rejection, so no dangerous advertising was published as a result of this experiment.)

Specifically: On TikTok, 100% of the ads were approved to run; On Facebook, 83% of the ads were approved to run; On Google, 75% of the ads were approved to run.

Ad management systems can create risks. We investigated how platforms allow advertisers to target users, and found that it is possible to target people who may be interested in pro-eating disorder content.

Specifically: On TikTok: End-users who interact with pro-eating disorder content on TikTok, download advertisers’ eating disorder apps or visit their websites can be targeted; On Meta: End-users who interact with pro-eating disorder content on Meta, download advertisers’ eating disorder apps or visit their websites can be targeted; On X: End-users who follow pro- eating disorder accounts, or ‘look’ like them, can be targeted; On Google: End-users who search specific words or combinations of words (including pro-eating disorder words), watch pro-eating disorder YouTube channels and probably those who download eating disorder and mental health apps can be targeted.


Advertising platforms managed by TikTok, Facebook, and Google approved adverts to be displayed on their platforms. These platforms enabled users to deliver targeted advertising to potentially vulnerable platform users (T0018: Purchase Targeted Advertisements, T0153.005: Online Advertising Platform). | -| [I00108 How you thought you support the animals and you ended up funding white supremacists](../../generated_pages/incidents/I00108.md) | This article examines the white nationalist group Suavelos’ use of Facebook to draw visitors to its website without overtly revealing their racist ideology:

Suavelos uses Facebook and other platforms to amplify its message. In order to bypass the platforms’ community standards and keep their public pages active, Facebook pages such as “I support the police” are a good vehicle to spread a specific agenda without claiming to be racist. In looking back at this Facebook page, we followed Facebook’s algorithm for related pages and found suggested Facebook pages

[...]

This amplification strategy on Facebook is successful, as according to SimilarWeb figures, it attracts around 111,000 visits every month on the Suavelos.eu website.

[...]

Revenue through online advertisements can be achieved by different platforms through targeted advertisements, like Google Adsense or Doubleclick, or related and similar sponsored content, such as Taboola. Accordingly, Suavelos.eu uses both of these websites to display advertisements and consequently receives funding from such advertisements.

Once visitors are on the website supporting its advertisement revenue, Suavelos’ goal is to then turn these visitors into regular members of Suavelos network through donations or fees, or have them continue to support Suavelos.


Suevelos created a variety of pages on Facebook which presented as centring on prosocial causes. Facebook’s algorithm helped direct users to these pages (T0092: Build Network, T0151.001: Social Media Platform, T0153.006: Content Recommendation Algorithm, T0151.003: Online Community Page, T0143.208: Social Cause Persona).

Suevelos used these pages to generate traffic for their WordPress site (T0122: Direct Users to Alternative Platforms, T0152.003: Website Hosting Platform, T0152.004: Website), which used accounts on a variety of online advertising platforms to host adverts (T0146: Account, T0153.005: Online Advertising Platform). | -| [I00114 ‘Carol’s Journey’: What Facebook knew about how it radicalized users](../../generated_pages/incidents/I00114.md) | This report examines internal Facebook communications which reveal employees’ concerns about how the platform’s algorithm was recommending users join extremist conspiracy groups.

In summer 2019, a new Facebook user named Carol Smith signed up for the platform, describing herself as a politically conservative mother from Wilmington, North Carolina. Smith’s account indicated an interest in politics, parenting and Christianity and followed a few of her favorite brands, including Fox News and then-President Donald Trump.

Though Smith had never expressed interest in conspiracy theories, in just two days Facebook was recommending she join groups dedicated to QAnon, a sprawling and baseless conspiracy theory and movement that claimed Trump was secretly saving the world from a cabal of pedophiles and Satanists.

Smith didn’t follow the recommended QAnon groups, but whatever algorithm Facebook was using to determine how she should engage with the platform pushed ahead just the same. Within one week, Smith’s feed was full of groups and pages that had violated Facebook’s own rules, including those against hate speech and disinformation.

Smith wasn’t a real person. A researcher employed by Facebook invented the account, along with those of other fictitious “test users” in 2019 and 2020, as part of an experiment in studying the platform’s role in misinforming and polarizing users through its recommendations systems.

That researcher said Smith’s Facebook experience was “a barrage of extreme, conspiratorial, and graphic content.”


Facebook’s Algorithm suggested users join groups which supported the QAnon movement (T0151.001: Social Media Platform, T0151.002: Online Community Group, T0153.006: Content Recommendation Algorithm, T0097.208: Social Cause Persona).

Further investigation by Facebook uncovered that its advertising platform had been used to promote QAnon narratives (T0146: Account, T0114: Deliver Ads, T0153.005: Online Advertising Platform):

For years, company researchers had been running experiments like Carol Smith’s to gauge the platform’s hand in radicalizing users, according to the documents seen by NBC News.

This internal work repeatedly found that recommendation tools pushed users into extremist groups, findings that helped inform policy changes and tweaks to recommendations and news feed rankings. Those rankings are a tentacled, ever-evolving system widely known as “the algorithm” that pushes content to users. But the research at that time stopped well short of inspiring any movement to change the groups and pages themselves.

That reluctance was indicative of “a pattern at Facebook,” Haugen told reporters this month. “They want the shortest path between their current policies and any action.”

[...]

By summer 2020, Facebook was hosting thousands of private QAnon groups and pages, with millions of members and followers, according to an unreleased internal investigation.

A year after the FBI designated QAnon as a potential domestic terrorist threat in the wake of standoffs, alleged planned kidnappings, harassment campaigns and shootings, Facebook labeled QAnon a “Violence Inciting Conspiracy Network” and banned it from the platform, along with militias and other violent social movements. A small team working across several of Facebook’s departments found its platforms had hosted hundreds of ads on Facebook and Instagram worth thousands of dollars and millions of views, “praising, supporting, or representing” the conspiracy theory.

[...]

For many employees inside Facebook, the enforcement came too late, according to posts left on Workplace, the company’s internal message board.

“We’ve known for over a year now that our recommendation systems can very quickly lead users down the path to conspiracy theories and groups,” one integrity researcher, whose name had been redacted, wrote in a post announcing she was leaving the company. “This fringe group has grown to national prominence, with QAnon congressional candidates and QAnon hashtags and groups trending in the mainstream. We were willing to act only * after * things had spiraled into a dire state.”

While Facebook’s ban initially appeared effective, a problem remained: The removal of groups and pages didn’t wipe out QAnon’s most extreme followers, who continued to organize on the platform.

“There was enough evidence to raise red flags in the expert community that Facebook and other platforms failed to address QAnon’s violent extremist dimension,” said Marc-André Argentino, a research fellow at King’s College London’s International Centre for the Study of Radicalisation, who has extensively studied QAnon.

Believers simply rebranded as anti-child-trafficking groups or migrated to other communities, including those around the anti-vaccine movement.

[...]

These conspiracy groups had become the fastest-growing groups on Facebook, according to the report, but Facebook wasn’t able to control their “meteoric growth,” the researchers wrote, “because we were looking at each entity individually, rather than as a cohesive movement.” A Facebook spokesperson told BuzzFeed News it took many steps to limit election misinformation but that it was unable to catch everything.
| +| [I00108 How you thought you support the animals and you ended up funding white supremacists](../../generated_pages/incidents/I00108.md) | This article examines the white nationalist group Suavelos’ use of Facebook to draw visitors to its website without overtly revealing their racist ideology:

Suavelos uses Facebook and other platforms to amplify its message. In order to bypass the platforms’ community standards and keep their public pages active, Facebook pages such as “I support the police” are a good vehicle to spread a specific agenda without claiming to be racist. In looking back at this Facebook page, we followed Facebook’s algorithm for related pages and found suggested Facebook pages

[...]

This amplification strategy on Facebook is successful, as according to SimilarWeb figures, it attracts around 111,000 visits every month on the Suavelos.eu website.

[...]

Revenue through online advertisements can be achieved by different platforms through targeted advertisements, like Google Adsense or Doubleclick, or related and similar sponsored content, such as Taboola. Accordingly, Suavelos.eu uses both of these websites to display advertisements and consequently receives funding from such advertisements.

Once visitors are on the website supporting its advertisement revenue, Suavelos’ goal is to then turn these visitors into regular members of Suavelos network through donations or fees, or have them continue to support Suavelos.


Suevelos created a variety of pages on Facebook which presented as centring on prosocial causes. Facebook’s algorithm helped direct users to these pages (T0092: Build Network, T0151.001: Social Media Platform, T0153.006: Content Recommendation Algorithm, T0151.003: Online Community Page, T0143.208: Social Cause Persona).

Suevelos used these pages to generate traffic for their WordPress site (T0122: Direct Users to Alternative Platforms, T0152.003: Website Hosting Platform, T0152.004: Website Asset), which used accounts on a variety of online advertising platforms to host adverts (T0146: Account Asset, T0153.005: Online Advertising Platform). | +| [I00114 ‘Carol’s Journey’: What Facebook knew about how it radicalized users](../../generated_pages/incidents/I00114.md) | This report examines internal Facebook communications which reveal employees’ concerns about how the platform’s algorithm was recommending users join extremist conspiracy groups.

In summer 2019, a new Facebook user named Carol Smith signed up for the platform, describing herself as a politically conservative mother from Wilmington, North Carolina. Smith’s account indicated an interest in politics, parenting and Christianity and followed a few of her favorite brands, including Fox News and then-President Donald Trump.

Though Smith had never expressed interest in conspiracy theories, in just two days Facebook was recommending she join groups dedicated to QAnon, a sprawling and baseless conspiracy theory and movement that claimed Trump was secretly saving the world from a cabal of pedophiles and Satanists.

Smith didn’t follow the recommended QAnon groups, but whatever algorithm Facebook was using to determine how she should engage with the platform pushed ahead just the same. Within one week, Smith’s feed was full of groups and pages that had violated Facebook’s own rules, including those against hate speech and disinformation.

Smith wasn’t a real person. A researcher employed by Facebook invented the account, along with those of other fictitious “test users” in 2019 and 2020, as part of an experiment in studying the platform’s role in misinforming and polarizing users through its recommendations systems.

That researcher said Smith’s Facebook experience was “a barrage of extreme, conspiratorial, and graphic content.”


Facebook’s Algorithm suggested users join groups which supported the QAnon movement (T0151.001: Social Media Platform, T0151.002: Online Community Group, T0153.006: Content Recommendation Algorithm, T0097.208: Social Cause Persona).

Further investigation by Facebook uncovered that its advertising platform had been used to promote QAnon narratives (T0146: Account Asset, T0114: Deliver Ads, T0153.005: Online Advertising Platform):

For years, company researchers had been running experiments like Carol Smith’s to gauge the platform’s hand in radicalizing users, according to the documents seen by NBC News.

This internal work repeatedly found that recommendation tools pushed users into extremist groups, findings that helped inform policy changes and tweaks to recommendations and news feed rankings. Those rankings are a tentacled, ever-evolving system widely known as “the algorithm” that pushes content to users. But the research at that time stopped well short of inspiring any movement to change the groups and pages themselves.

That reluctance was indicative of “a pattern at Facebook,” Haugen told reporters this month. “They want the shortest path between their current policies and any action.”

[...]

By summer 2020, Facebook was hosting thousands of private QAnon groups and pages, with millions of members and followers, according to an unreleased internal investigation.

A year after the FBI designated QAnon as a potential domestic terrorist threat in the wake of standoffs, alleged planned kidnappings, harassment campaigns and shootings, Facebook labeled QAnon a “Violence Inciting Conspiracy Network” and banned it from the platform, along with militias and other violent social movements. A small team working across several of Facebook’s departments found its platforms had hosted hundreds of ads on Facebook and Instagram worth thousands of dollars and millions of views, “praising, supporting, or representing” the conspiracy theory.

[...]

For many employees inside Facebook, the enforcement came too late, according to posts left on Workplace, the company’s internal message board.

“We’ve known for over a year now that our recommendation systems can very quickly lead users down the path to conspiracy theories and groups,” one integrity researcher, whose name had been redacted, wrote in a post announcing she was leaving the company. “This fringe group has grown to national prominence, with QAnon congressional candidates and QAnon hashtags and groups trending in the mainstream. We were willing to act only * after * things had spiraled into a dire state.”

While Facebook’s ban initially appeared effective, a problem remained: The removal of groups and pages didn’t wipe out QAnon’s most extreme followers, who continued to organize on the platform.

“There was enough evidence to raise red flags in the expert community that Facebook and other platforms failed to address QAnon’s violent extremist dimension,” said Marc-André Argentino, a research fellow at King’s College London’s International Centre for the Study of Radicalisation, who has extensively studied QAnon.

Believers simply rebranded as anti-child-trafficking groups or migrated to other communities, including those around the anti-vaccine movement.

[...]

These conspiracy groups had become the fastest-growing groups on Facebook, according to the report, but Facebook wasn’t able to control their “meteoric growth,” the researchers wrote, “because we were looking at each entity individually, rather than as a cohesive movement.” A Facebook spokesperson told BuzzFeed News it took many steps to limit election misinformation but that it was unable to catch everything.
| diff --git a/generated_pages/techniques/T0153.006.md b/generated_pages/techniques/T0153.006.md index af1990d..612bf7a 100644 --- a/generated_pages/techniques/T0153.006.md +++ b/generated_pages/techniques/T0153.006.md @@ -8,9 +8,9 @@ | Incident | Descriptions given for this incident | | -------- | -------------------- | | [I00097 Report: Not Just Algorithms](../../generated_pages/incidents/I00097.md) | This report explores the role of four systems (recommender systems, content moderation systems, ad approval systems and ad management systems) in creating risks around eating disorders.

[...]

Content recommender systems can create risks. We created and primed ‘fake’ accounts for 16-year old Australians and found that some recommender systems will promote pro-eating disorder content to children.

Specifically: On TikTok, 0% of the content recommended was classified as pro-eating disorder content; On Instagram, 23% of the content recommended was classified as pro-eating disorder content; On X, 67% of content recommended was classified as pro-eating disorder content (and disturbingly, another 13% displayed self-harm imagery).


Content recommendation algorithms developed by Instagram (T0151.001: Social Media Platform, T0153.006: Content Recommendation Algorithm) and X (T0151.008: Microblogging Platform, T0153.006: Content Recommendation Algorithm) promoted harmful content to an account presenting as a 16 year old Australian. | -| [I00108 How you thought you support the animals and you ended up funding white supremacists](../../generated_pages/incidents/I00108.md) | This article examines the white nationalist group Suavelos’ use of Facebook to draw visitors to its website without overtly revealing their racist ideology:

Suavelos uses Facebook and other platforms to amplify its message. In order to bypass the platforms’ community standards and keep their public pages active, Facebook pages such as “I support the police” are a good vehicle to spread a specific agenda without claiming to be racist. In looking back at this Facebook page, we followed Facebook’s algorithm for related pages and found suggested Facebook pages

[...]

This amplification strategy on Facebook is successful, as according to SimilarWeb figures, it attracts around 111,000 visits every month on the Suavelos.eu website.

[...]

Revenue through online advertisements can be achieved by different platforms through targeted advertisements, like Google Adsense or Doubleclick, or related and similar sponsored content, such as Taboola. Accordingly, Suavelos.eu uses both of these websites to display advertisements and consequently receives funding from such advertisements.

Once visitors are on the website supporting its advertisement revenue, Suavelos’ goal is to then turn these visitors into regular members of Suavelos network through donations or fees, or have them continue to support Suavelos.


Suevelos created a variety of pages on Facebook which presented as centring on prosocial causes. Facebook’s algorithm helped direct users to these pages (T0092: Build Network, T0151.001: Social Media Platform, T0153.006: Content Recommendation Algorithm, T0151.003: Online Community Page, T0143.208: Social Cause Persona).

Suevelos used these pages to generate traffic for their WordPress site (T0122: Direct Users to Alternative Platforms, T0152.003: Website Hosting Platform, T0152.004: Website), which used accounts on a variety of online advertising platforms to host adverts (T0146: Account, T0153.005: Online Advertising Platform). | -| [I00114 ‘Carol’s Journey’: What Facebook knew about how it radicalized users](../../generated_pages/incidents/I00114.md) | This report examines internal Facebook communications which reveal employees’ concerns about how the platform’s algorithm was recommending users join extremist conspiracy groups.

In summer 2019, a new Facebook user named Carol Smith signed up for the platform, describing herself as a politically conservative mother from Wilmington, North Carolina. Smith’s account indicated an interest in politics, parenting and Christianity and followed a few of her favorite brands, including Fox News and then-President Donald Trump.

Though Smith had never expressed interest in conspiracy theories, in just two days Facebook was recommending she join groups dedicated to QAnon, a sprawling and baseless conspiracy theory and movement that claimed Trump was secretly saving the world from a cabal of pedophiles and Satanists.

Smith didn’t follow the recommended QAnon groups, but whatever algorithm Facebook was using to determine how she should engage with the platform pushed ahead just the same. Within one week, Smith’s feed was full of groups and pages that had violated Facebook’s own rules, including those against hate speech and disinformation.

Smith wasn’t a real person. A researcher employed by Facebook invented the account, along with those of other fictitious “test users” in 2019 and 2020, as part of an experiment in studying the platform’s role in misinforming and polarizing users through its recommendations systems.

That researcher said Smith’s Facebook experience was “a barrage of extreme, conspiratorial, and graphic content.”


Facebook’s Algorithm suggested users join groups which supported the QAnon movement (T0151.001: Social Media Platform, T0151.002: Online Community Group, T0153.006: Content Recommendation Algorithm, T0097.208: Social Cause Persona).

Further investigation by Facebook uncovered that its advertising platform had been used to promote QAnon narratives (T0146: Account, T0114: Deliver Ads, T0153.005: Online Advertising Platform):

For years, company researchers had been running experiments like Carol Smith’s to gauge the platform’s hand in radicalizing users, according to the documents seen by NBC News.

This internal work repeatedly found that recommendation tools pushed users into extremist groups, findings that helped inform policy changes and tweaks to recommendations and news feed rankings. Those rankings are a tentacled, ever-evolving system widely known as “the algorithm” that pushes content to users. But the research at that time stopped well short of inspiring any movement to change the groups and pages themselves.

That reluctance was indicative of “a pattern at Facebook,” Haugen told reporters this month. “They want the shortest path between their current policies and any action.”

[...]

By summer 2020, Facebook was hosting thousands of private QAnon groups and pages, with millions of members and followers, according to an unreleased internal investigation.

A year after the FBI designated QAnon as a potential domestic terrorist threat in the wake of standoffs, alleged planned kidnappings, harassment campaigns and shootings, Facebook labeled QAnon a “Violence Inciting Conspiracy Network” and banned it from the platform, along with militias and other violent social movements. A small team working across several of Facebook’s departments found its platforms had hosted hundreds of ads on Facebook and Instagram worth thousands of dollars and millions of views, “praising, supporting, or representing” the conspiracy theory.

[...]

For many employees inside Facebook, the enforcement came too late, according to posts left on Workplace, the company’s internal message board.

“We’ve known for over a year now that our recommendation systems can very quickly lead users down the path to conspiracy theories and groups,” one integrity researcher, whose name had been redacted, wrote in a post announcing she was leaving the company. “This fringe group has grown to national prominence, with QAnon congressional candidates and QAnon hashtags and groups trending in the mainstream. We were willing to act only * after * things had spiraled into a dire state.”

While Facebook’s ban initially appeared effective, a problem remained: The removal of groups and pages didn’t wipe out QAnon’s most extreme followers, who continued to organize on the platform.

“There was enough evidence to raise red flags in the expert community that Facebook and other platforms failed to address QAnon’s violent extremist dimension,” said Marc-André Argentino, a research fellow at King’s College London’s International Centre for the Study of Radicalisation, who has extensively studied QAnon.

Believers simply rebranded as anti-child-trafficking groups or migrated to other communities, including those around the anti-vaccine movement.

[...]

These conspiracy groups had become the fastest-growing groups on Facebook, according to the report, but Facebook wasn’t able to control their “meteoric growth,” the researchers wrote, “because we were looking at each entity individually, rather than as a cohesive movement.” A Facebook spokesperson told BuzzFeed News it took many steps to limit election misinformation but that it was unable to catch everything.
| -| [I00115 How Facebook shapes your feed](../../generated_pages/incidents/I00115.md) | This 2021 report by The Washington Post explains the mechanics of Facebook’s algorithm (T0151.001: Social Media Platform, T0153.006: Content Recommendation Algorithm):

In its early years, Facebook’s algorithm prioritized signals such as likes, clicks and comments to decide which posts to amplify. Publishers, brands and individual users soon learned how to craft posts and headlines designed to induce likes and clicks, giving rise to what came to be known as “clickbait.” By 2013, upstart publishers such as Upworthy and ViralNova were amassing tens of millions of readers with articles designed specifically to game Facebook’s news feed algorithm.

Facebook realized that users were growing wary of misleading teaser headlines, and the company recalibrated its algorithm in 2014 and 2015 to downgrade clickbait and focus on new metrics, such as the amount of time a user spent reading a story or watching a video, and incorporating surveys on what content users found most valuable. Around the same time, its executives identified video as a business priority, and used the algorithm to boost “native” videos shared directly to Facebook. By the mid-2010s, the news feed had tilted toward slick, professionally produced content, especially videos that would hold people’s attention.

In 2016, however, Facebook executives grew worried about a decline in “original sharing.” Users were spending so much time passively watching and reading that they weren’t interacting with each other as much. Young people in particular shifted their personal conversations to rivals such as Snapchat that offered more intimacy.

Once again, Facebook found its answer in the algorithm: It developed a new set of goal metrics that it called “meaningful social interactions,” designed to show users more posts from friends and family, and fewer from big publishers and brands. In particular, the algorithm began to give outsize weight to posts that sparked lots of comments and replies.

The downside of this approach was that the posts that sparked the most comments tended to be the ones that made people angry or offended them, the documents show. Facebook became an angrier, more polarizing place. It didn’t help that, starting in 2017, the algorithm had assigned reaction emoji — including the angry emoji — five times the weight of a simple “like,” according to company documents.

[...]

Internal documents show Facebook researchers found that, for the most politically oriented 1 million American users, nearly 90 percent of the content that Facebook shows them is about politics and social issues. Those groups also received the most misinformation, especially a set of users associated with mostly right-leaning content, who were shown one misinformation post out of every 40, according to a document from June 2020.

One takeaway is that Facebook’s algorithm isn’t a runaway train. The company may not directly control what any given user posts, but by choosing which types of posts will be seen, it sculpts the information landscape according to its business priorities. Some within the company would like to see Facebook use the algorithm to explicitly promote certain values, such as democracy and civil discourse. Others have suggested that it develop and prioritize new metrics that align with users’ values, as with a 2020 experiment in which the algorithm was trained to predict what posts they would find “good for the world” and “bad for the world,” and optimize for the former.
| +| [I00108 How you thought you support the animals and you ended up funding white supremacists](../../generated_pages/incidents/I00108.md) | This article examines the white nationalist group Suavelos’ use of Facebook to draw visitors to its website without overtly revealing their racist ideology:

Suavelos uses Facebook and other platforms to amplify its message. In order to bypass the platforms’ community standards and keep their public pages active, Facebook pages such as “I support the police” are a good vehicle to spread a specific agenda without claiming to be racist. In looking back at this Facebook page, we followed Facebook’s algorithm for related pages and found suggested Facebook pages

[...]

This amplification strategy on Facebook is successful, as according to SimilarWeb figures, it attracts around 111,000 visits every month on the Suavelos.eu website.

[...]

Revenue through online advertisements can be achieved by different platforms through targeted advertisements, like Google Adsense or Doubleclick, or related and similar sponsored content, such as Taboola. Accordingly, Suavelos.eu uses both of these websites to display advertisements and consequently receives funding from such advertisements.

Once visitors are on the website supporting its advertisement revenue, Suavelos’ goal is to then turn these visitors into regular members of Suavelos network through donations or fees, or have them continue to support Suavelos.


Suevelos created a variety of pages on Facebook which presented as centring on prosocial causes. Facebook’s algorithm helped direct users to these pages (T0092: Build Network, T0151.001: Social Media Platform, T0153.006: Content Recommendation Algorithm, T0151.003: Online Community Page, T0143.208: Social Cause Persona).

Suevelos used these pages to generate traffic for their WordPress site (T0122: Direct Users to Alternative Platforms, T0152.003: Website Hosting Platform, T0152.004: Website Asset), which used accounts on a variety of online advertising platforms to host adverts (T0146: Account Asset, T0153.005: Online Advertising Platform). | +| [I00114 ‘Carol’s Journey’: What Facebook knew about how it radicalized users](../../generated_pages/incidents/I00114.md) | This report examines internal Facebook communications which reveal employees’ concerns about how the platform’s algorithm was recommending users join extremist conspiracy groups.

In summer 2019, a new Facebook user named Carol Smith signed up for the platform, describing herself as a politically conservative mother from Wilmington, North Carolina. Smith’s account indicated an interest in politics, parenting and Christianity and followed a few of her favorite brands, including Fox News and then-President Donald Trump.

Though Smith had never expressed interest in conspiracy theories, in just two days Facebook was recommending she join groups dedicated to QAnon, a sprawling and baseless conspiracy theory and movement that claimed Trump was secretly saving the world from a cabal of pedophiles and Satanists.

Smith didn’t follow the recommended QAnon groups, but whatever algorithm Facebook was using to determine how she should engage with the platform pushed ahead just the same. Within one week, Smith’s feed was full of groups and pages that had violated Facebook’s own rules, including those against hate speech and disinformation.

Smith wasn’t a real person. A researcher employed by Facebook invented the account, along with those of other fictitious “test users” in 2019 and 2020, as part of an experiment in studying the platform’s role in misinforming and polarizing users through its recommendations systems.

That researcher said Smith’s Facebook experience was “a barrage of extreme, conspiratorial, and graphic content.”


Facebook’s Algorithm suggested users join groups which supported the QAnon movement (T0151.001: Social Media Platform, T0151.002: Online Community Group, T0153.006: Content Recommendation Algorithm, T0097.208: Social Cause Persona).

Further investigation by Facebook uncovered that its advertising platform had been used to promote QAnon narratives (T0146: Account Asset, T0114: Deliver Ads, T0153.005: Online Advertising Platform):

For years, company researchers had been running experiments like Carol Smith’s to gauge the platform’s hand in radicalizing users, according to the documents seen by NBC News.

This internal work repeatedly found that recommendation tools pushed users into extremist groups, findings that helped inform policy changes and tweaks to recommendations and news feed rankings. Those rankings are a tentacled, ever-evolving system widely known as “the algorithm” that pushes content to users. But the research at that time stopped well short of inspiring any movement to change the groups and pages themselves.

That reluctance was indicative of “a pattern at Facebook,” Haugen told reporters this month. “They want the shortest path between their current policies and any action.”

[...]

By summer 2020, Facebook was hosting thousands of private QAnon groups and pages, with millions of members and followers, according to an unreleased internal investigation.

A year after the FBI designated QAnon as a potential domestic terrorist threat in the wake of standoffs, alleged planned kidnappings, harassment campaigns and shootings, Facebook labeled QAnon a “Violence Inciting Conspiracy Network” and banned it from the platform, along with militias and other violent social movements. A small team working across several of Facebook’s departments found its platforms had hosted hundreds of ads on Facebook and Instagram worth thousands of dollars and millions of views, “praising, supporting, or representing” the conspiracy theory.

[...]

For many employees inside Facebook, the enforcement came too late, according to posts left on Workplace, the company’s internal message board.

“We’ve known for over a year now that our recommendation systems can very quickly lead users down the path to conspiracy theories and groups,” one integrity researcher, whose name had been redacted, wrote in a post announcing she was leaving the company. “This fringe group has grown to national prominence, with QAnon congressional candidates and QAnon hashtags and groups trending in the mainstream. We were willing to act only * after * things had spiraled into a dire state.”

While Facebook’s ban initially appeared effective, a problem remained: The removal of groups and pages didn’t wipe out QAnon’s most extreme followers, who continued to organize on the platform.

“There was enough evidence to raise red flags in the expert community that Facebook and other platforms failed to address QAnon’s violent extremist dimension,” said Marc-André Argentino, a research fellow at King’s College London’s International Centre for the Study of Radicalisation, who has extensively studied QAnon.

Believers simply rebranded as anti-child-trafficking groups or migrated to other communities, including those around the anti-vaccine movement.

[...]

These conspiracy groups had become the fastest-growing groups on Facebook, according to the report, but Facebook wasn’t able to control their “meteoric growth,” the researchers wrote, “because we were looking at each entity individually, rather than as a cohesive movement.” A Facebook spokesperson told BuzzFeed News it took many steps to limit election misinformation but that it was unable to catch everything.
| +| [I00115 How Facebook shapes your feed](../../generated_pages/incidents/I00115.md) | This 2021 report by The Washington Post explains the mechanics of Facebook’s algorithm (T0151.001: Social Media Platform, T0153.006: Content Recommendation Algorithm):

In its early years, Facebook’s algorithm prioritized signals such as likes, clicks and comments to decide which posts to amplify. Publishers, brands and individual users soon learned how to craft posts and headlines designed to induce likes and clicks, giving rise to what came to be known as “clickbait.” By 2013, upstart publishers such as Upworthy and ViralNova were amassing tens of millions of readers with articles designed specifically to game Facebook’s news feed algorithm.

Facebook realized that users were growing wary of misleading teaser headlines, and the company recalibrated its algorithm in 2014 and 2015 to downgrade clickbait and focus on new metrics, such as the amount of time a user spent reading a story or watching a video, and incorporating surveys on what content users found most valuable. Around the same time, its executives identified video as a business priority, and used the algorithm to boost “native” videos shared directly to Facebook. By the mid-2010s, the news feed had tilted toward slick, professionally produced content, especially videos that would hold people’s attention.

In 2016, however, Facebook executives grew worried about a decline in “original sharing.” Users were spending so much time passively watching and reading that they weren’t interacting with each other as much. Young people in particular shifted their personal conversations to rivals such as Snapchat that offered more intimacy.

Once again, Facebook found its answer in the algorithm: It developed a new set of goal metrics that it called “meaningful social interactions,” designed to show users more posts from friends and family, and fewer from big publishers and brands. In particular, the algorithm began to give outsize weight to posts that sparked lots of comments and replies.

The downside of this approach was that the posts that sparked the most comments tended to be the ones that made people angry or offended them, the documents show. Facebook became an angrier, more polarizing place. It didn’t help that, starting in 2017, the algorithm had assigned reaction emoji — including the angry emoji — five times the weight of a simple “like,” according to company documents.

[...]

Internal documents show Facebook researchers found that, for the most politically oriented 1 million American users, nearly 90 percent of the content that Facebook shows them is about politics and social issues. Those groups also received the most misinformation, especially a set of users associated with mostly right-leaning content, who were shown one misinformation post out of every 40, according to a document from June 2020.

One takeaway is that Facebook’s algorithm isn’t a runaway train. The company may not directly control what any given user posts, but by choosing which types of posts will be seen, it sculpts the information landscape according to its business priorities. Some within the company would like to see Facebook use the algorithm to explicitly promote certain values, such as democracy and civil discourse. Others have suggested that it develop and prioritize new metrics that align with users’ values, as with a 2020 experiment in which the algorithm was trained to predict what posts they would find “good for the world” and “bad for the world,” and optimize for the former.
| diff --git a/generated_pages/techniques/T0154.002.md b/generated_pages/techniques/T0154.002.md index 39cd744..82f6ab9 100644 --- a/generated_pages/techniques/T0154.002.md +++ b/generated_pages/techniques/T0154.002.md @@ -7,10 +7,10 @@ | Incident | Descriptions given for this incident | | -------- | -------------------- | -| [I00096 China ramps up use of AI misinformation](../../generated_pages/incidents/I00096.md) | The Microsoft Threat Analysis Centre (MTAC) published a report documenting the use of AI by pro-Chinese threat actors:

On 13 January, Spamouflage [(a Pro-Chinese Communist Party actor)] posted audio clips to YouTube of independent candidate [for Taiwan’s Jan 2024 presidential election] Terry Gou – who also founded electronics giant Foxconn – in which Gou endorsed another candidate in the race. This clip was almost certainly AI-generated, and it was swiftly removed by YouTube. A fake letter purporting to be from Gou, endorsing the same candidate, had already circulated – Gou had of course made no such endorsement.

Here Spamoflage used an account on YouTube to post AI Generated audio impersonating an electoral candidate (T0146: Account, T0152.006: Video Platform, T0115: Post Content, T0088.001: Develop AI-Generated Audio (Deepfakes), T0143.003: Impersonated Persona, T0097.110: Party Official Persona).

Spamouflage also exploited AI-powered video platform CapCut – which is owned by TikTok backers ByteDance – to generate fake news anchors which were used in a variety of campaigns targeting the various presidential candidates in Taiwan.

Spamoflage created accounts on CapCut, which it used to create AI-generated videos of fabricated news anchors (T0146: Account, T0154.002: AI Media Platform, T0087.001: Develop AI-Generated Video (Deepfakes), T0143.002: Fabricated Persona, T0097.102: Journalist Persona). | -| [I00099 More Women Are Facing The Reality Of Deepfakes, And They’re Ruining Lives](../../generated_pages/incidents/I00099.md) | Last October, British writer Helen was alerted to a series of deepfakes on a porn site that appear to show her engaging in extreme acts of sexual violence. That night, the images replayed themselves over and over in horrific nightmares and she was gripped by an all-consuming feeling of dread. “It’s like you’re in a tunnel, going further and further into this enclosed space, where there’s no light,” she tells Vogue. This feeling pervaded Helen’s life. Whenever she left the house, she felt exposed. On runs, she experienced panic attacks. Helen still has no idea who did this to her.

[...]

Amnesty International has been investigating the effects of abuse against women on Twitter, specifically in relation to how they act online thereafter. According to the charity, abuse creates what they’ve called “the silencing effect” whereby women feel discouraged from participating online. The same can be said for victims of deepfakes.

Helen has never been afraid to use her voice, writing deeply personal accounts of postnatal depression. But the deepfakes created a feeling of shame so strong she thought she’d be carrying this “dirty secret” forever, and so she stopped writing.

[...]

Meanwhile, deepfake ‘communities’ are thriving. There are now dedicated sites, user-friendly apps and organised ‘request’ procedures. Some sites allow you to commission custom deepfakes for £25, while on others you can upload a woman’s image and a bot will strip her naked.

“This violation is not something that should be normalised,” says Gibi, an ASMR artist with 3.13 million YouTube subscribers. Gibi has given up trying to keep tabs on the deepfakes of her. For Gibi, the most egregious part of all of this is the fact that people are “profiting off my face, doing something that I didn’t consent to, like my suffering is your livelihood.” She’s even been approached by a company offering to remove the deepfakes — for £500 a video. This has to end. But how?


A website hosting pornographic content provided users the ability to create deepfake content (T0154.002: AI Media Platform, T0086.002: Develop AI-Generated Images (Deepfakes)).

Another website enabled users to commission custom deepfakes (T0152.004: Website, T0148.004: Payment Processing Capability, T0086.002: Develop AI-Generated Images (Deepfakes), T0155.005: Paid Access). | +| [I00096 China ramps up use of AI misinformation](../../generated_pages/incidents/I00096.md) | The Microsoft Threat Analysis Centre (MTAC) published a report documenting the use of AI by pro-Chinese threat actors:

On 13 January, Spamouflage [(a Pro-Chinese Communist Party actor)] posted audio clips to YouTube of independent candidate [for Taiwan’s Jan 2024 presidential election] Terry Gou – who also founded electronics giant Foxconn – in which Gou endorsed another candidate in the race. This clip was almost certainly AI-generated, and it was swiftly removed by YouTube. A fake letter purporting to be from Gou, endorsing the same candidate, had already circulated – Gou had of course made no such endorsement.

Here Spamoflage used an account on YouTube to post AI Generated audio impersonating an electoral candidate (T0146: Account Asset, T0152.006: Video Platform, T0115: Post Content, T0088.001: Develop AI-Generated Audio (Deepfakes), T0143.003: Impersonated Persona, T0097.110: Party Official Persona).

Spamouflage also exploited AI-powered video platform CapCut – which is owned by TikTok backers ByteDance – to generate fake news anchors which were used in a variety of campaigns targeting the various presidential candidates in Taiwan.

Spamoflage created accounts on CapCut, which it used to create AI-generated videos of fabricated news anchors (T0146: Account Asset, T0154.002: AI Media Platform, T0087.001: Develop AI-Generated Video (Deepfakes), T0143.002: Fabricated Persona, T0097.102: Journalist Persona). | +| [I00099 More Women Are Facing The Reality Of Deepfakes, And They’re Ruining Lives](../../generated_pages/incidents/I00099.md) | Last October, British writer Helen was alerted to a series of deepfakes on a porn site that appear to show her engaging in extreme acts of sexual violence. That night, the images replayed themselves over and over in horrific nightmares and she was gripped by an all-consuming feeling of dread. “It’s like you’re in a tunnel, going further and further into this enclosed space, where there’s no light,” she tells Vogue. This feeling pervaded Helen’s life. Whenever she left the house, she felt exposed. On runs, she experienced panic attacks. Helen still has no idea who did this to her.

[...]

Amnesty International has been investigating the effects of abuse against women on Twitter, specifically in relation to how they act online thereafter. According to the charity, abuse creates what they’ve called “the silencing effect” whereby women feel discouraged from participating online. The same can be said for victims of deepfakes.

Helen has never been afraid to use her voice, writing deeply personal accounts of postnatal depression. But the deepfakes created a feeling of shame so strong she thought she’d be carrying this “dirty secret” forever, and so she stopped writing.

[...]

Meanwhile, deepfake ‘communities’ are thriving. There are now dedicated sites, user-friendly apps and organised ‘request’ procedures. Some sites allow you to commission custom deepfakes for £25, while on others you can upload a woman’s image and a bot will strip her naked.

“This violation is not something that should be normalised,” says Gibi, an ASMR artist with 3.13 million YouTube subscribers. Gibi has given up trying to keep tabs on the deepfakes of her. For Gibi, the most egregious part of all of this is the fact that people are “profiting off my face, doing something that I didn’t consent to, like my suffering is your livelihood.” She’s even been approached by a company offering to remove the deepfakes — for £500 a video. This has to end. But how?


A website hosting pornographic content provided users the ability to create deepfake content (T0154.002: AI Media Platform, T0086.002: Develop AI-Generated Images (Deepfakes)).

Another website enabled users to commission custom deepfakes (T0152.004: Website Asset, T0148.004: Payment Processing Capability, T0086.002: Develop AI-Generated Images (Deepfakes), T0155.005: Paid Access Asset). | | [I00100 Why ThisPersonDoesNotExist (and its copycats) need to be restricted](../../generated_pages/incidents/I00100.md) | You might have heard about the recent viral sensation, ThisPersonDoesNotExist.com, a website, launched two weeks ago, that uses Nvidia’s publicly available artificial intelligence technology to draw an invented, photo-realistic human being with each refresh. The tech is impressive and artistically evocative. It’s also irresponsible and needs to be restricted immediately.

[...]

Prior to this technology, scammers faced three major risks when using fake photos. Each of these risks had the potential to put them out business, or in jail.

Risk #1: Someone recognizes the photo. While the odds of this are long-shot, it does happen.

Risk #2: Someone reverse image searches the photo with a service like TinEye or Google Image Search and finds that it’s been posted elsewhere. Reverse image search is one of the top anti-fraud measures recommended by consumer protection advocates.

Risk #3: If the crime is successful, law enforcement uses the fake photo to figure out the scammer’s identity after the fact. Perhaps the scammer used an old classmate’s photo. Perhaps their personal account follows the Instagram member they pilfered. And so on: people make mistakes.

The problem with AI-generated photos is that they carry none of these risks. No one will recognize a human who’s never existed before. Google Image Search will return 0 results, possibly instilling a false sense of security in the searcher. And AI-generated photos don’t give law enforcement much to work with.


ThisPersonDoesNotExist is an online platform which, when visited, produces AI generated images of peoples’ faces (T0146.006: Open Access Platform, T0154.002: AI Media Platform, T0086.002: Develop AI-Generated Images (Deepfakes)). | -| [I00103 The racist AI deepfake that fooled and divided a community](../../generated_pages/incidents/I00103.md) | “I seriously don't understand why I have to constantly put up with these dumbasses here every day.”

So began what appeared to be a long tirade from the principal of Pikesville High School, punctuated with racist, antisemitic and offensive tropes. It sounded like it had been secretly recorded.

The speaker went on to bemoan “ungrateful black kids” and Jewish people in the community.

The clip, first posted in [January 2024], went viral nationally. But it really struck a nerve in the peaceful, leafy suburb of Pikesville, which has large black and Jewish populations, and in the nearby city of Baltimore, Maryland. Principal Eric Eiswert was put on paid administrative leave pending an investigation.

[...]

But what those sharing the clip didn’t realise at the time was that another bombshell was about to drop: the clip was an AI-generated fake.

[...]

[In April 2024], Baltimore Police Chief Robert McCullough confirmed they now had “conclusive evidence that the recording was not authentic”.

And they believed they knew who made the fake.

Police charged 31-year-old Dazhon Darien, the school’s athletics director, with several counts related to the fake video. Charges included theft, retaliating against a witness and stalking.

He was arrested at the airport, where police say he was planning to fly to Houston, Texas.

Police say that Mr Darien had been under investigation by Principal Eiswert over an alleged theft of $1,916 (£1,460) from the school. They also allege there had been “work performance challenges” and his contract was likely not to be renewed.

Their theory was that by creating the deepfake recording, he hoped to discredit the principal before he could be fired.

Investigators say they traced an email used to send the original video to a server connected to Mr Darien, and allege that he used Baltimore County Public Schools' computer network to access AI tools. He is due to stand trial in December 2024.


By associating Mr Darien to the server used to email the original AI generated audio, investigators link Darien to the fabricated content (T0149.005: Server, T0088.001: AI Generated Audio (Deepfakes)). They also assert that Darien used computers owned by the school to access platforms used to generate the audio (T0146: Account, T0154.002: AI Media Platform). | +| [I00103 The racist AI deepfake that fooled and divided a community](../../generated_pages/incidents/I00103.md) | “I seriously don't understand why I have to constantly put up with these dumbasses here every day.”

So began what appeared to be a long tirade from the principal of Pikesville High School, punctuated with racist, antisemitic and offensive tropes. It sounded like it had been secretly recorded.

The speaker went on to bemoan “ungrateful black kids” and Jewish people in the community.

The clip, first posted in [January 2024], went viral nationally. But it really struck a nerve in the peaceful, leafy suburb of Pikesville, which has large black and Jewish populations, and in the nearby city of Baltimore, Maryland. Principal Eric Eiswert was put on paid administrative leave pending an investigation.

[...]

But what those sharing the clip didn’t realise at the time was that another bombshell was about to drop: the clip was an AI-generated fake.

[...]

[In April 2024], Baltimore Police Chief Robert McCullough confirmed they now had “conclusive evidence that the recording was not authentic”.

And they believed they knew who made the fake.

Police charged 31-year-old Dazhon Darien, the school’s athletics director, with several counts related to the fake video. Charges included theft, retaliating against a witness and stalking.

He was arrested at the airport, where police say he was planning to fly to Houston, Texas.

Police say that Mr Darien had been under investigation by Principal Eiswert over an alleged theft of $1,916 (£1,460) from the school. They also allege there had been “work performance challenges” and his contract was likely not to be renewed.

Their theory was that by creating the deepfake recording, he hoped to discredit the principal before he could be fired.

Investigators say they traced an email used to send the original video to a server connected to Mr Darien, and allege that he used Baltimore County Public Schools' computer network to access AI tools. He is due to stand trial in December 2024.


By associating Mr Darien to the server used to email the original AI generated audio, investigators link Darien to the fabricated content (T0149.005: Server Asset, T0088.001: AI Generated Audio (Deepfakes)). They also assert that Darien used computers owned by the school to access platforms used to generate the audio (T0146: Account Asset, T0154.002: AI Media Platform). | diff --git a/generated_pages/techniques/T0155.001.md b/generated_pages/techniques/T0155.001.md index 29c4205..41786d0 100644 --- a/generated_pages/techniques/T0155.001.md +++ b/generated_pages/techniques/T0155.001.md @@ -1,4 +1,4 @@ -# Technique T0155.001: Password Gated +# Technique T0155.001: Password Gated Asset * **Summary**: A Password Gated Asset is an online asset which requires a password to gain access.

Examples include password protected Servers set up to be a File Hosting Platform, or password protected Community Sub-Forums. diff --git a/generated_pages/techniques/T0155.002.md b/generated_pages/techniques/T0155.002.md index 8e1fb09..f7b2cb0 100644 --- a/generated_pages/techniques/T0155.002.md +++ b/generated_pages/techniques/T0155.002.md @@ -1,4 +1,4 @@ -# Technique T0155.002: Invite Gated +# Technique T0155.002: Invite Gated Asset * **Summary**: An Invite Gated Asset is an online asset which requires an existing user to invite other users for access to the asset.

Examples include Chat Groups in which Administrator Accounts are able to add or remove users, or File Hosting Platforms which allow users to invite other users to access their files. diff --git a/generated_pages/techniques/T0155.003.md b/generated_pages/techniques/T0155.003.md index 0adab9b..ffa024c 100644 --- a/generated_pages/techniques/T0155.003.md +++ b/generated_pages/techniques/T0155.003.md @@ -1,4 +1,4 @@ -# Technique T0155.003: Approval Gated +# Technique T0155.003: Approval Gated Asset * **Summary**: An Approval Gated Asset is an online asset which requires approval from Administrator Accounts for access to the asset.

Examples include Online Community Groups on Facebook, which can be configured to require questions and approval before access, and Accounts on Social Media Platforms such as Instagram, which allow users to set their accounts as visible to approved friends only. @@ -7,7 +7,7 @@ | Incident | Descriptions given for this incident | | -------- | -------------------- | -| [I00105 Gaming the System: The Use of Gaming-Adjacent Communication, Game and Mod Platforms by Extremist Actors](../../generated_pages/incidents/I00105.md) | In this report, researchers look at online platforms commonly used by people who play videogames, looking at how these platforms can contribute to radicalisation of gamers:

Gamer Uprising Forums (GUF) [is an online discussion platform using the classic forum structure] aimed directly at gamers. It is run by US Neo-Nazi Andrew Anglin and explicitly targets politically right-wing gamers. This forum mainly includes antisemitic, sexist, and racist topics, but also posts on related issues such as esotericism, conspiracy narratives, pro-Russian propaganda, alternative medicine, Christian religion, content related to the incel- and manosphere, lists of criminal offences committed by non-white people, links to right-wing news sites, homophobia and trans-hostility, troll guides, anti-leftism, ableism and much more. Most noticeable were the high number of antisemitic references. For example, there is a thread with hundreds of machine-generated images, most of which feature openly antisemitic content and popular antisemitic references. Many users chose explicitly antisemitic avatars. Some of the usernames also provide clues to the users’ ideologies and profiles feature swastikas as a type of progress bar and indicator of the user’s activity in the forum.

The GUF’s front page contains an overview of the forum, user statistics, and so-called “announcements”. In addition to advice-like references, these feature various expressions of hateful ideologies. At the time of the exploration, the following could be read there: “Jews are the problem!”, “Women should be raped”, “The Jews are going to be required to return stolen property”, “Immigrants will have to be physically removed”, “Console gaming is for n******” and “Anger is a womanly emotion”. New users have to prove themselves in an area for newcomers referred to in imageboard slang as the “Newfag Barn”. Only when the newcomers’ posts have received a substantial number of likes from established users, are they allowed to post in other parts of the forum. It can be assumed that this will also lead to competitions to outdo each other in posting extreme content. However, it is always possible to view all posts and content on the site. In any case, it can be assumed that the platform hardly addresses milieus that are not already radicalised or at risk of radicalisation and is therefore deemed relevant for radicalisation research. However, the number of registered users is low (typical for radicalised milieus) and, hence, the platform may only be of interest when studying a small group of highly radicalised individuals.


Gamer Uprising Forum is a legacy online forum, with access gated behind approval of existing platform users (T0155.003: Approval Gated, T0151.009: Legacy Online Forum Platform). | +| [I00105 Gaming the System: The Use of Gaming-Adjacent Communication, Game and Mod Platforms by Extremist Actors](../../generated_pages/incidents/I00105.md) | In this report, researchers look at online platforms commonly used by people who play videogames, looking at how these platforms can contribute to radicalisation of gamers:

Gamer Uprising Forums (GUF) [is an online discussion platform using the classic forum structure] aimed directly at gamers. It is run by US Neo-Nazi Andrew Anglin and explicitly targets politically right-wing gamers. This forum mainly includes antisemitic, sexist, and racist topics, but also posts on related issues such as esotericism, conspiracy narratives, pro-Russian propaganda, alternative medicine, Christian religion, content related to the incel- and manosphere, lists of criminal offences committed by non-white people, links to right-wing news sites, homophobia and trans-hostility, troll guides, anti-leftism, ableism and much more. Most noticeable were the high number of antisemitic references. For example, there is a thread with hundreds of machine-generated images, most of which feature openly antisemitic content and popular antisemitic references. Many users chose explicitly antisemitic avatars. Some of the usernames also provide clues to the users’ ideologies and profiles feature swastikas as a type of progress bar and indicator of the user’s activity in the forum.

The GUF’s front page contains an overview of the forum, user statistics, and so-called “announcements”. In addition to advice-like references, these feature various expressions of hateful ideologies. At the time of the exploration, the following could be read there: “Jews are the problem!”, “Women should be raped”, “The Jews are going to be required to return stolen property”, “Immigrants will have to be physically removed”, “Console gaming is for n******” and “Anger is a womanly emotion”. New users have to prove themselves in an area for newcomers referred to in imageboard slang as the “Newfag Barn”. Only when the newcomers’ posts have received a substantial number of likes from established users, are they allowed to post in other parts of the forum. It can be assumed that this will also lead to competitions to outdo each other in posting extreme content. However, it is always possible to view all posts and content on the site. In any case, it can be assumed that the platform hardly addresses milieus that are not already radicalised or at risk of radicalisation and is therefore deemed relevant for radicalisation research. However, the number of registered users is low (typical for radicalised milieus) and, hence, the platform may only be of interest when studying a small group of highly radicalised individuals.


Gamer Uprising Forum is a legacy online forum, with access gated behind approval of existing platform users (T0155.003: Approval Gated Asset, T0151.009: Legacy Online Forum Platform). | diff --git a/generated_pages/techniques/T0155.004.md b/generated_pages/techniques/T0155.004.md index 8474ce0..ebe070f 100644 --- a/generated_pages/techniques/T0155.004.md +++ b/generated_pages/techniques/T0155.004.md @@ -1,4 +1,4 @@ -# Technique T0155.004: Geoblocked +# Technique T0155.004: Geoblocked Asset * **Summary**: A Geoblocked Asset is an online asset which cannot be accessed in specific geographical locations.

Assets can be Geoblocked by choice of the platform, or can have Geoblocking mandated by regulators, and enforced through Internet Service Providers. @@ -7,7 +7,7 @@ | Incident | Descriptions given for this incident | | -------- | -------------------- | -| [I00072 Behind the Dutch Terror Threat Video: The St. Petersburg "Troll Factory" Connection](../../generated_pages/incidents/I00072.md) | “The creator of Geopolitika[.]ru is Aleksandr Dugin, who was sanctioned by the United States Department of Treasury in 2015 for his role in the Eurasian Youth Union “for being responsible for or complicit in actions or policies that threaten the peace, security, stability, or sovereignty or territorial integrity of Ukraine.”

[...]

“Currently, the website geopolika[.]ru redirects directly to another partner website, Katehon.

“Katehon poses itself as a think tank focused on geopolitics in an English edition of its website. In contrast, in Russian, it states its aim to develop “ideological, political, diplomatic, economic and military strategy for Russia of the future” with a special role of religion. The president of Katehon’s supervisory board is Konstantin Malofeev, a Russian millionaire with connections to the Russian orthodox church and presidential administration, who founded Tsargrad TV, a known source of disinformation. Malofeev was sanctioned by the U.S. Department of Treasury and the European Union in 2014 for material support and financial backing of Russian-backed separatists in eastern Ukraine. Another known figure from the board is Sergei Glaziev, former advisor to Putin in 2012–2019. Dugin is also on the board in the Russian edition of the website, whereas he is omitted in English.”
In this example a domain managed by an actor previously sanctioned by the US department of treasury has been reconfigured to redirect to another website; Katehon (T0149.004: Redirecting Domain, T0150.004: Repurposed).

Katehon presents itself as a geopolitical think tank in English, but does not maintain this persona when presenting itself to a Russian speaking audience (T0097.204: Think Tank Persona, T0152.004: Website, T0155.004: Geoblocked). | +| [I00072 Behind the Dutch Terror Threat Video: The St. Petersburg "Troll Factory" Connection](../../generated_pages/incidents/I00072.md) | “The creator of Geopolitika[.]ru is Aleksandr Dugin, who was sanctioned by the United States Department of Treasury in 2015 for his role in the Eurasian Youth Union “for being responsible for or complicit in actions or policies that threaten the peace, security, stability, or sovereignty or territorial integrity of Ukraine.”

[...]

“Currently, the website geopolika[.]ru redirects directly to another partner website, Katehon.

“Katehon poses itself as a think tank focused on geopolitics in an English edition of its website. In contrast, in Russian, it states its aim to develop “ideological, political, diplomatic, economic and military strategy for Russia of the future” with a special role of religion. The president of Katehon’s supervisory board is Konstantin Malofeev, a Russian millionaire with connections to the Russian orthodox church and presidential administration, who founded Tsargrad TV, a known source of disinformation. Malofeev was sanctioned by the U.S. Department of Treasury and the European Union in 2014 for material support and financial backing of Russian-backed separatists in eastern Ukraine. Another known figure from the board is Sergei Glaziev, former advisor to Putin in 2012–2019. Dugin is also on the board in the Russian edition of the website, whereas he is omitted in English.”


In this example a domain managed by an actor previously sanctioned by the US department of treasury has been reconfigured to redirect to another website; Katehon (T0149.004: Redirecting Domain Asset, T0150.004: Repurposed Asset).

Katehon presents itself as a geopolitical think tank in English, but does not maintain this persona when presenting itself to a Russian speaking audience (T0097.204: Think Tank Persona, T0152.004: Website Asset, T0155.004: Geoblocked Asset). | diff --git a/generated_pages/techniques/T0155.005.md b/generated_pages/techniques/T0155.005.md index 203dfcc..17ceb89 100644 --- a/generated_pages/techniques/T0155.005.md +++ b/generated_pages/techniques/T0155.005.md @@ -1,4 +1,4 @@ -# Technique T0155.005: Paid Access +# Technique T0155.005: Paid Access Asset * **Summary**: A Paid Access Asset is an online asset which requires a single payment for permanent access to the asset. @@ -7,7 +7,7 @@ | Incident | Descriptions given for this incident | | -------- | -------------------- | -| [I00099 More Women Are Facing The Reality Of Deepfakes, And They’re Ruining Lives](../../generated_pages/incidents/I00099.md) | Last October, British writer Helen was alerted to a series of deepfakes on a porn site that appear to show her engaging in extreme acts of sexual violence. That night, the images replayed themselves over and over in horrific nightmares and she was gripped by an all-consuming feeling of dread. “It’s like you’re in a tunnel, going further and further into this enclosed space, where there’s no light,” she tells Vogue. This feeling pervaded Helen’s life. Whenever she left the house, she felt exposed. On runs, she experienced panic attacks. Helen still has no idea who did this to her.

[...]

Amnesty International has been investigating the effects of abuse against women on Twitter, specifically in relation to how they act online thereafter. According to the charity, abuse creates what they’ve called “the silencing effect” whereby women feel discouraged from participating online. The same can be said for victims of deepfakes.

Helen has never been afraid to use her voice, writing deeply personal accounts of postnatal depression. But the deepfakes created a feeling of shame so strong she thought she’d be carrying this “dirty secret” forever, and so she stopped writing.

[...]

Meanwhile, deepfake ‘communities’ are thriving. There are now dedicated sites, user-friendly apps and organised ‘request’ procedures. Some sites allow you to commission custom deepfakes for £25, while on others you can upload a woman’s image and a bot will strip her naked.

“This violation is not something that should be normalised,” says Gibi, an ASMR artist with 3.13 million YouTube subscribers. Gibi has given up trying to keep tabs on the deepfakes of her. For Gibi, the most egregious part of all of this is the fact that people are “profiting off my face, doing something that I didn’t consent to, like my suffering is your livelihood.” She’s even been approached by a company offering to remove the deepfakes — for £500 a video. This has to end. But how?


A website hosting pornographic content provided users the ability to create deepfake content (T0154.002: AI Media Platform, T0086.002: Develop AI-Generated Images (Deepfakes)).

Another website enabled users to commission custom deepfakes (T0152.004: Website, T0148.004: Payment Processing Capability, T0086.002: Develop AI-Generated Images (Deepfakes), T0155.005: Paid Access). | +| [I00099 More Women Are Facing The Reality Of Deepfakes, And They’re Ruining Lives](../../generated_pages/incidents/I00099.md) | Last October, British writer Helen was alerted to a series of deepfakes on a porn site that appear to show her engaging in extreme acts of sexual violence. That night, the images replayed themselves over and over in horrific nightmares and she was gripped by an all-consuming feeling of dread. “It’s like you’re in a tunnel, going further and further into this enclosed space, where there’s no light,” she tells Vogue. This feeling pervaded Helen’s life. Whenever she left the house, she felt exposed. On runs, she experienced panic attacks. Helen still has no idea who did this to her.

[...]

Amnesty International has been investigating the effects of abuse against women on Twitter, specifically in relation to how they act online thereafter. According to the charity, abuse creates what they’ve called “the silencing effect” whereby women feel discouraged from participating online. The same can be said for victims of deepfakes.

Helen has never been afraid to use her voice, writing deeply personal accounts of postnatal depression. But the deepfakes created a feeling of shame so strong she thought she’d be carrying this “dirty secret” forever, and so she stopped writing.

[...]

Meanwhile, deepfake ‘communities’ are thriving. There are now dedicated sites, user-friendly apps and organised ‘request’ procedures. Some sites allow you to commission custom deepfakes for £25, while on others you can upload a woman’s image and a bot will strip her naked.

“This violation is not something that should be normalised,” says Gibi, an ASMR artist with 3.13 million YouTube subscribers. Gibi has given up trying to keep tabs on the deepfakes of her. For Gibi, the most egregious part of all of this is the fact that people are “profiting off my face, doing something that I didn’t consent to, like my suffering is your livelihood.” She’s even been approached by a company offering to remove the deepfakes — for £500 a video. This has to end. But how?


A website hosting pornographic content provided users the ability to create deepfake content (T0154.002: AI Media Platform, T0086.002: Develop AI-Generated Images (Deepfakes)).

Another website enabled users to commission custom deepfakes (T0152.004: Website Asset, T0148.004: Payment Processing Capability, T0086.002: Develop AI-Generated Images (Deepfakes), T0155.005: Paid Access Asset). | diff --git a/generated_pages/techniques/T0155.006.md b/generated_pages/techniques/T0155.006.md index 6273dec..08cef6f 100644 --- a/generated_pages/techniques/T0155.006.md +++ b/generated_pages/techniques/T0155.006.md @@ -1,4 +1,4 @@ -# Technique T0155.006: Subscription Access +# Technique T0155.006: Subscription Access Asset * **Summary**: A Subscription Access Asset is an online asset which requires a continued subscription for access to the asset.

Examples include the Blogging Platform Substack, which affords Blogs hosted on their platform the ability to produce subscriber-only posts, and the Subscription Service Platform Patreon. @@ -7,7 +7,7 @@ | Incident | Descriptions given for this incident | | -------- | -------------------- | -| [I00111 Patreon Is Bankrolling Climate Change Deniers While We All Burn](../../generated_pages/incidents/I00111.md) | In this article VICE News discusses a report produced by Advance Democracy on people who use Patreon to spread the false claim that an impending ice age will reverse the harms of the ongoing climate crisis:

“The spread of climate misinformation is prolific on social media, as well as on sites like Patreon, where users are actually financially compensated through the platform for spreading falsehoods,” Daniel Jones, president of Advance Democracy, told VICE News.

“Companies hosting and promoting climate misinformation have a responsibility to take action to reduce dangerous misinformation, as falsehoods about climate science are every bit as dangerous as lies about vaccinations and disinformation about our elections.”

Patreon did not respond to VICE News’ request for comment on the report’s findings.

One of the biggest accounts spreading climate conspiracies is ADAPT 2030, which is run by David DuByne, who has 1,100 followers on Patreon. He is currently making over $3,500 every month from his subscribers.

[The science DuByne relies on does not support his hypothesis. However,] this has not prevented DuByne and many others from preying on people’s fears about climate change to spread conspiracies about an impending ice age, which they say will miraculously fix all of earth’s climate problems.

DuByne offers seven different membership levels for supporters, beginning at just $1 per month.

The most expensive costs $100 a month, and gives patrons “a private 20-minute call with David DuByne once per month, to discuss your particular preparedness issues or concerns.” So far just two people are paying this amount.

The researchers also found at least eight other accounts on Patreon that have spread climate change conspiracy theories as part of wider conspiracy sharing, including baseless claims about COVID-19 and the legitimacy of Joe Biden’s presidency. Some of these accounts are earning over $600 per month.


David DuByne created an account on Patreon, which he uses to post text, videos, and podcasts for his subscribers to discuss (T0085: Develop Text-Based Content, T0087: Develop Video-Based Content, T0088: Develop Audio-Based Content, T0146: Account, T0115: Post Content, T0152.012: Subscription Service Platform, T0151.014: Comments Section, T0155.006: Subscription Access). | +| [I00111 Patreon Is Bankrolling Climate Change Deniers While We All Burn](../../generated_pages/incidents/I00111.md) | In this article VICE News discusses a report produced by Advance Democracy on people who use Patreon to spread the false claim that an impending ice age will reverse the harms of the ongoing climate crisis:

“The spread of climate misinformation is prolific on social media, as well as on sites like Patreon, where users are actually financially compensated through the platform for spreading falsehoods,” Daniel Jones, president of Advance Democracy, told VICE News.

“Companies hosting and promoting climate misinformation have a responsibility to take action to reduce dangerous misinformation, as falsehoods about climate science are every bit as dangerous as lies about vaccinations and disinformation about our elections.”

Patreon did not respond to VICE News’ request for comment on the report’s findings.

One of the biggest accounts spreading climate conspiracies is ADAPT 2030, which is run by David DuByne, who has 1,100 followers on Patreon. He is currently making over $3,500 every month from his subscribers.

[The science DuByne relies on does not support his hypothesis. However,] this has not prevented DuByne and many others from preying on people’s fears about climate change to spread conspiracies about an impending ice age, which they say will miraculously fix all of earth’s climate problems.

DuByne offers seven different membership levels for supporters, beginning at just $1 per month.

The most expensive costs $100 a month, and gives patrons “a private 20-minute call with David DuByne once per month, to discuss your particular preparedness issues or concerns.” So far just two people are paying this amount.

The researchers also found at least eight other accounts on Patreon that have spread climate change conspiracy theories as part of wider conspiracy sharing, including baseless claims about COVID-19 and the legitimacy of Joe Biden’s presidency. Some of these accounts are earning over $600 per month.


David DuByne created an account on Patreon, which he uses to post text, videos, and podcasts for his subscribers to discuss (T0085: Develop Text-Based Content, T0087: Develop Video-Based Content, T0088: Develop Audio-Based Content, T0146: Account Asset, T0115: Post Content, T0152.012: Subscription Service Platform, T0151.014: Comments Section, T0155.006: Subscription Access Asset). | diff --git a/generated_pages/techniques/T0155.007.md b/generated_pages/techniques/T0155.007.md index 2ae84f8..a321020 100644 --- a/generated_pages/techniques/T0155.007.md +++ b/generated_pages/techniques/T0155.007.md @@ -7,6 +7,7 @@ | Incident | Descriptions given for this incident | | -------- | -------------------- | +| [I00068 Attempted Audio Deepfake Call Targets LastPass Employee](../../generated_pages/incidents/I00068.md) | “While reports of [...] deepfake calls targeting private companies are luckily still rare, LastPass itself experienced a deepfake attempt earlier today that we are sharing with the larger community to help raise awareness that this tactic is spreading and all companies should be on the alert. In our case, an employee received a series of calls, texts, and at least one voicemail featuring an audio deepfake from a threat actor impersonating our CEO via WhatsApp. As the attempted communication was outside of normal business communication channels and due to the employee’s suspicion regarding the presence of many of the hallmarks of a social engineering attempt (such as forced urgency), our employee rightly ignored the messages and reported the incident to our internal security team so that we could take steps to both mitigate the threat and raise awareness of the tactic both internally and externally.”

In this example attackers created an account on WhatsApp which impersonated the CEO of lastpass (T0097.100: Individual Persona, T0143.003: Impersonated Persona, T0146: Account Asset, T0151.004: Chat Platform, T0155.007: Encrypted Communication Channel). They used this asset to target an employee using deepfaked audio (T0088.001: Develop AI-Generated Audio (Deepfakes)). | diff --git a/generated_pages/techniques/T0155.md b/generated_pages/techniques/T0155.md index d862e38..437cd59 100644 --- a/generated_pages/techniques/T0155.md +++ b/generated_pages/techniques/T0155.md @@ -7,7 +7,7 @@ | Incident | Descriptions given for this incident | | -------- | -------------------- | -| [I00109 Coordinated Facebook Pages Designed to Fund a White Supremacist Agenda](../../generated_pages/incidents/I00109.md) | This report examines the white nationalist group Suavelos’ use of Facebook to draw visitors to its website without overtly revealing their racist ideology. This section of the report looks at the Suavelos website, and the content it links out to.

In going back to Suavelos’ main page, we also found: A link to a page on a web shop: alabastro.eu; A link to a page to donate money to the founders through Tipee and to the website through PayPal; [and] a link to a private forum that gathers 3.000 members: oppidum.suavelos.eu;

Suavelos linked out to an online store which it controlled (T0152.004: Website, T0148.004: Payment Processing Capability), and to accounts on payment processing platforms PayPal and Tipee (T0146: Account, T0148.003: Payment Processing Platform).

The Suavelos website also hosted a private forum (T0151.009: Legacy Online Forum Platform, T0155: Gated Asset), and linked out to a variety of assets it controlled on other online platforms: accounts on Twitter (T0146: Account, T0151.008: Microblogging Platform), YouTube (T0146: Account, T0152.006: Video Platform), Instagram and VKontakte (T0146: Account, T0151.001: Social Media Platform). | +| [I00109 Coordinated Facebook Pages Designed to Fund a White Supremacist Agenda](../../generated_pages/incidents/I00109.md) | This report examines the white nationalist group Suavelos’ use of Facebook to draw visitors to its website without overtly revealing their racist ideology. This section of the report looks at the Suavelos website, and the content it links out to.

In going back to Suavelos’ main page, we also found: A link to a page on a web shop: alabastro.eu; A link to a page to donate money to the founders through Tipee and to the website through PayPal; [and] a link to a private forum that gathers 3.000 members: oppidum.suavelos.eu;

Suavelos linked out to an online store which it controlled (T0152.004: Website Asset, T0148.004: Payment Processing Capability), and to accounts on payment processing platforms PayPal and Tipee (T0146: Account Asset, T0148.003: Payment Processing Platform).

The Suavelos website also hosted a private forum (T0151.009: Legacy Online Forum Platform, T0155: Gated Asset), and linked out to a variety of assets it controlled on other online platforms: accounts on Twitter (T0146: Account Asset, T0151.008: Microblogging Platform), YouTube (T0146: Account Asset, T0152.006: Video Platform), Instagram and VKontakte (T0146: Account Asset, T0151.001: Social Media Platform). | diff --git a/generated_pages/techniques_index.md b/generated_pages/techniques_index.md index bab7eab..b416265 100644 --- a/generated_pages/techniques_index.md +++ b/generated_pages/techniques_index.md @@ -1803,31 +1803,31 @@ T0146 -Account +Account Asset An Account is a user-specific profile that allows access to the features and services of an online platform, typically requiring a username and password for authentication. TA06 T0146.001 -Free Account +Free Account Asset Many online platforms allow users to create free accounts on their platform. A Free Account is an Account which does not require payment at account creation and is not subscribed to paid platform features. TA06 T0146.002 -Paid Account +Paid Account Asset Some online platforms afford accounts extra features, or other benefits, if the user pays a fee. For example, as of September 2024, content posted by a Paid Account on X (previously Twitter) is prioritised in the platform’s algorithm. TA06 T0146.003 -Verified Account +Verified Account Asset Some online platforms apply badges of verification to accounts which meet certain criteria.

On some platforms (such as dating apps) a verification badge signifies that the account has passed the platform’s identity verification checks. On some platforms (such as X (previously Twitter)) a verification badge signifies that an account has paid for the platform’s service. TA06 T0146.004 -Administrator Account +Administrator Account Asset Some accounts will have special privileges / will be in control of the Digital Community Hosting Asset; for example, the Admin of a Facebook Page, a Moderator of a Subreddit, etc. etc. TA06 @@ -1845,37 +1845,37 @@ T0146.007 -Automated Account +Automated Account Asset An Automated Account is an account which is displaying automated behaviour, such as republishing or liking other accounts’ content, or publishing their own content. TA06 T0147 -Software +Software Asset A Software is a program developed to run on computers or devices that helps users achieve specific goals, such as improving productivity, automating tasks, or having fun. TA06 T0147.001 -Game +Game Asset A Game is Software which has been designed for interactive entertainment, where users take on challenges set by the game’s designers.

While Online Game Platforms allow people to play with each other, Games are designed for single player experiences. TA06 T0147.002 -Game Mod +Game Mod Asset A Game Mod is a modification which can be applied to a Game or Multiplayer Online Game to add new content or functionality to the game.

Users can Modify Games to introduce new content to the game. Modified Games can be distributed on Software Delivery Platforms such as Steam or can be distributed within the Game or Multiplayer Online Game. TA06 T0147.003 -Malware +Malware Asset Malware is Software which has been designed to cause harm or facilitate malicious behaviour on electronic devices.

DISARM recommends using the [MITRE ATT&CK Framework](https://attack.mitre.org/) to document malware types and their usage. TA06 T0147.004 -Mobile App +Mobile App Asset A Mobile App is an application which has been designed to run on mobile operating systems, such as Android or iOS.

Mobile Apps can enable access to online platforms (e.g. Facebook’s mobile app) or can provide software which users can run offline on their device. TA06 @@ -1893,7 +1893,7 @@ T0148.002 -Bank Account +Bank Account Asset A Bank Account is a financial account that allows individuals or organisations to store, manage, and access their money, typically for saving, spending, or investment purposes. TA06 @@ -1947,14 +1947,14 @@ T0149.001 -Domain -A Domain is a web address (such as “www.google.com”), used to navigate to Websites on the internet.

Domains differ from Websites in that Websites are considered to be developed web pages which host content, whereas Domains do not necessarily host public-facing web content.

A threat actor may register a new domain to bypass the old domain being blocked. +Domain Asset +A Domain is a web address (such as “google[.]com”), used to navigate to Websites on the internet.

Domains differ from Websites in that Websites are considered to be developed web pages which host content, whereas Domains do not necessarily host public-facing web content.

A threat actor may register a new domain to bypass the old domain being blocked. TA06 T0149.002 -Email Domain -An Email Domain is a Domain (such as “meta.com”) which has the ability to send emails.

Any Domain which has an MX (Mail Exchange) record and configured SMTP (Simple Mail Transfer Protocol) settings can send and receive emails, and is therefore an Email Domain. +Email Domain Asset +An Email Domain is a Domain (such as “meta[.]com”) which has the ability to send emails (e.g. from an @meta[.]com address).

Any Domain which has an MX (Mail Exchange) record and configured SMTP (Simple Mail Transfer Protocol) settings can send and receive emails, and is therefore an Email Domain. TA06 @@ -1965,31 +1965,31 @@ T0149.004 -Redirecting Domain +Redirecting Domain Asset A Redirecting Domain is a Domain which has been configured to redirect users to another Domain when visited. TA06 T0149.005 -Server +Server Asset A Server is a computer which provides resources, services, or data to other computers over a network. There are different types of servers, such as web servers (which serve web pages and applications to users), database servers (which manage and provide access to databases), and file servers (which store and share files across a network). TA06 T0149.006 -IP Address +IP Address Asset An IP Address is a unique numerical label assigned to each device connected to a computer network that uses the Internet Protocol for communication. IP addresses are commonly a part of any online infrastructure.

IP addresses can be in IPV4 dotted decimal (x.x.x.x) or IPV6 colon-separated hexadecimal (y:y:y:y:y:y:y:y) formats. TA06 T0149.007 -VPN +VPN Asset A VPN (Virtual Private Network) is a service which creates secure, encrypted connections over the internet, allowing users to transmit data safely and access network resources remotely. It masks IP Addresses, enhancing privacy and security by preventing unauthorised access and tracking. VPNs are commonly used for protecting sensitive information, bypassing geographic restrictions, and maintaining online anonymity.

VPNs can also allow a threat actor to pose as if they are located in one country while in reality being based in another. By doing so, they can try to either mis-attribute their activities to another actor or better hide their own identity. TA06 T0149.008 -Proxy IP Address +Proxy IP Address Asset A Proxy IP Address allows a threat actor to mask their real IP Address by putting a layer between them and the online content they’re connecting with.

Proxy IP Addresses can hide the connection between the threat actor and their online infrastructure. TA06 @@ -2007,49 +2007,49 @@ T0150.001 -Newly Created +Newly Created Asset A Newly Created Asset is an asset which has been created and used for the first time in a documented potential incident.

For example, analysts which can identify a recent creation date of Accounts participating in the spread of a new narrative can assert these are Newly Created Assets.

Analysts should use Dormant if the asset was created and laid dormant for an extended period of time before activity. TA06 T0150.002 -Dormant +Dormant Asset A Dormant Asset is an asset which was inactive for an extended period before being used in a documented potential incident. TA06 T0150.003 -Pre-Existing +Pre-Existing Asset Pre-Existing Assets are assets which existed before the observed incident which have not been Repurposed; i.e. they are still being used for their original purpose.

An example could be an Account which presented itself with a Journalist Persona prior to and during the observed potential incident. TA06 T0150.004 -Repurposed +Repurposed Asset Repurposed Assets are assets which have been identified as being used previously, but are now being used for different purposes, or have new Presented Personas.

Actors have been documented compromising assets, and then repurposing them to present Inauthentic Personas as part of their operations. TA06 T0150.005 -Compromised +Compromised Asset A Compromised Asset is an asset which was originally created or belonged to another person or organisation, but which an actor has gained access to without their consent.

See also MITRE ATT&CK T1708: Valid Accounts. TA06 T0150.006 -Purchased +Purchased Asset A Purchased Asset is an asset which actors paid for the ownership of.

For example, threat actors have been observed selling compromised social media accounts on dark web marketplaces, which can be used to disguise operation activity. TA06 T0150.007 -Rented +Rented Asset A Rented Asset is an asset which actors are temporarily renting or subscribing to.

For example, threat actors have been observed renting temporary access to legitimate accounts on online platforms in order to disguise operation activity. TA06 T0150.008 -Bulk Created +Bulk Created Asset A Bulk Created Asset is an asset which was created alongside many other instances of the same asset.

Actors have been observed bulk creating Accounts on Social Media Platforms such as Facebook. Indicators of bulk asset creation include its creation date, assets’ naming conventions, their configuration (e.g. templated personas, visually similar profile pictures), or their activity (e.g. post timings, narratives posted). TA06 @@ -2175,7 +2175,7 @@ T0152.002 -Blog +Blog Asset Blogs are a collation of posts centred on a particular topic, author, or collection of authors.

Some platforms are designed to support users in hosting content online, such as Blogging Platforms like Substack which allow users to create Blogs, but other online platforms can also be used to produce a Blog; a Paid Account on X (prev Twitter) is able to post long-form text content to their timeline in a style of a blog.

Actors may create Accounts on Blogging Platforms to create a Blog, or make their own Blog on a Website. TA07 @@ -2187,7 +2187,7 @@ T0152.004 -Website +Website Asset A Website is a collection of related web pages hosted on a server and accessible via a web browser. Websites have an associated Domain and can host various types of content, such as text, images, videos, and interactive features.

When a Website is fleshed out, it Presents a Persona to site visitors. For example, the Domain “bbc.co.uk/news” hosts a Website which uses the News Outlet Persona. TA07 @@ -2259,13 +2259,13 @@ T0153.003 -Shortened Link +Shortened Link Asset A Shortened Link is a custom URL which is typically a shortened version of another URL. TA07 T0153.004 -QR Code +QR Code Asset A QR Code allows people to use cameras on their smartphones to open a URL. TA07 @@ -2313,37 +2313,37 @@ T0155.001 -Password Gated +Password Gated Asset A Password Gated Asset is an online asset which requires a password to gain access.

Examples include password protected Servers set up to be a File Hosting Platform, or password protected Community Sub-Forums. TA07 T0155.002 -Invite Gated +Invite Gated Asset An Invite Gated Asset is an online asset which requires an existing user to invite other users for access to the asset.

Examples include Chat Groups in which Administrator Accounts are able to add or remove users, or File Hosting Platforms which allow users to invite other users to access their files. TA07 T0155.003 -Approval Gated +Approval Gated Asset An Approval Gated Asset is an online asset which requires approval from Administrator Accounts for access to the asset.

Examples include Online Community Groups on Facebook, which can be configured to require questions and approval before access, and Accounts on Social Media Platforms such as Instagram, which allow users to set their accounts as visible to approved friends only. TA07 T0155.004 -Geoblocked +Geoblocked Asset A Geoblocked Asset is an online asset which cannot be accessed in specific geographical locations.

Assets can be Geoblocked by choice of the platform, or can have Geoblocking mandated by regulators, and enforced through Internet Service Providers. TA07 T0155.005 -Paid Access +Paid Access Asset A Paid Access Asset is an online asset which requires a single payment for permanent access to the asset. TA07 T0155.006 -Subscription Access +Subscription Access Asset A Subscription Access Asset is an online asset which requires a continued subscription for access to the asset.

Examples include the Blogging Platform Substack, which affords Blogs hosted on their platform the ability to produce subscriber-only posts, and the Subscription Service Platform Patreon. TA07

KPOcVK z!=2wy;oDxYvx#?w#IGLrI}sv&HJrGZE`QC;yZN3={$}jz{Fa*iK<@2d+G>=G$G)M; z>W&(S_OhZ}zvhh#>ne^0g*2Oz%j!bH59}#+bfJ;9>(q`R_lDq(p9(?E8A+{s_GBwi zdpaJR;>H{h&0+4+DhRV2u`NG0j*;seC`^Jtg}q z_@&ENj`hMd(C$s?jRiZR_n2BeFem;l1)71JNK*v#-k|xyGx8! z@8RaDA!<@Bdgff$5Q-#eoULpnk;1M@QpViB#+ZNsB>aH1|$EJtrO)0!6 zM`weHZ&(3R6R>0<-WW|#wnv>krjyzB)Cfg^yTlvoMh>kN(XW$l;O49G>(O-Vvm(TR zyGaT{fsZKnT`YW)FurwAt2}^Gzme3RM9q029-gtzUoY%0Q-*^_9N}Vu2tsBt(hy3H zaSL-9C|XIi2ZiWj=++BHRGu#oK8csPL5|)w;{AW@o$GE~SGJvBr6M4(43KJ37fZ5# zkp22SN(m zpQj>$4kM=SfsA4FPl9nDP>zg{&kXOSkqShTfzBir?XJZ_Ag=Hz%k>(*kE3gC+eLb-be@U?58FgdioAmpb-$+R4bR*;52GpP9Rt3zv;Rz ztnvt*`4d4hYc!5Ml@&up`WlvtiwHCM{>thS86sPFt**~KHqGyuDu!PfTIb|bVkFk?q5&c6eRHXF-Ruh&;WeC+`4*a^sIby z&)@u;HM_Z#tUlkinPYYD>}sByS~&(?;Eg3uSA6-BqbpeSjlnAKjg^pd;bbT?cV#JH zj)#+J?44i6RP@f~3jDW^saIl%2#x2kNux1A29tlZb`GoHfyrPyG>P(GdkRXK83w9y zcAg;d=(&n!b5I6$kH)jsnI;T;s$1$lqwoM1PMD{Pc!92mHN%eUg};~xLW!bl%<|H| zMwEXVV^+9yPDs(emrk@|?oBy}I1u)TaE&tmk^dKcO-fJr=1e9@-E2x5iHj#^%x9n^ z>e?8cWS&(-fEswuq@3=>xr^(4)6Sddlx@u!r*%}5XgI^Ig}TY;9I19u`%>{#|^G&!f=Pm>5yTT8Q^KCS5h_;TM(*!eXaMgme!cXn ztLZucrt(>s)UT!oh%fBFqIL0Apv7(L$oL@ic4Aay972!tS4Vq;GirYZbX9@%qjo&3Z^}u%aV0&F12XW!x&zk@;d?HH=1uk-MF*P$PG~o4sV? z1ZT22*rueFk>Ao`3$xw-B>F5^ax(DpKadiQ1(KQ z%W3lAns%RU|3nGc&CQLjg)OQ8VjVG>x*0p0jfpm<)XkFQ7wyo}YNqHwHxEZ81-5$K zqkI6CRWwc%8$=yThMEpwsY@`T+Wpw(H^<+ecd1wbpndbo?xW7M|1uMB(ZjJ@1t>SUi326>Dh zQhKH5tH@<`RuUq`=(21+G?_FcJEodkeBjQf?Smi4j{=A$7JEJygFqg7_LcBkmz@LJ z)C-l#2)tc9x&ndE!91~6okn-Y|4f+!q5M2{K&2NVQfD;U1&U*UU5o_Eo#pvys zlw?w&mrtdZjF~wn^PoMA_bIR_QcyM;`L#Gk?HK6URHNxtHg*@22UjtyyA&!#knrKy zw)lb8sbM8H{6u0G{`Zuwr=m+Emxs29=eBz)y=0T7T0djnn^5fp1=QzLCmR_gbiwEt z&YC*VbV*9#buez6Is=ywip!uDog;P1LzFvp!u|4i`T_$PF_Q9R^(5hQU8MwsAbcY2 z1CMrf?pUjCAIl$LGt$hZ1Lkpr>asgKBjBCU!%V?#a>QwQ_!u%FXo7zA^%3!g!#~}L z-;}Dpz$F?=|JHcx3_=yncv9R{L6;?Q-6VO&AK#2x4oGmSkX%q7lgMfZdV@*}Ef0`+ zq`g?flv?gK+ANmBjm_ zB;IdB@_B2|XNs&iY@xS7tP&PaR9F+qWubojfCu@>Z{g?Z3j!;Sr_xAu+jWz_g9IOq zWGU6 z0v0V@J2?9C@WtfWKyeuCs5E_6EI&xE(O8PM{4aqi$Tq7h9q^3ZWLc)TySvA1Y4C3RWd)m>pgZRbO3&%56(6EIXZg&S^J^HQK0gzA zzs%e=eSpH1Jpdku?s?s_Sr&PDClWm2W&igd?=qeWOYp}X|NG}XRx4#leH+7~8BW~U zoa!~n%gM|9zvet*#K=wYe*V$f2liqPsxAXV8}%T1 zQvFi2+Ad8Us!Ms+yQ{%3fijXJsrwo6(nGit+%k=p%4l1zxSvWt>4#eR@mQPD1C51$ zfM4@c^>4km?7>dYdv|$EaA)bcm-3gqVS5w3ub)Elm|B%JFHtIKat}ZzY~R7}Ix_XX zbU3r-)2e{Q*N$2$A{lDYb;1a$j zpg|ErctiUlX~3;EDbJ9yj?>d14ReP|)pY)t{47&biUm>xGC1E}O?J)%P^-MP5l!0T z(PhsQ^-cS7kF{0LW+=Y+xCuI1IH0|4dOUu6k!x8`Yx+~i5=TIDN3WY005&{8d(&aP zraYMwc8Hc13zcY#Jxfu?+Md&^RrX8A3apxJuCwBSlSg{s_GIUAEV$~-lzuDP7_q!p zT`Q;Jz1H=zIPJxhn`DzzkNAl)3*D2F-JTJPBqfmFL1s9W1WRc4&EWlYO$wp;AdITn z11hnvvLQ;euYHk>LIqOXzgnG?+3^4TwUy9vd}%O?9IUP`kpL^SyjJK!o z_?-P%1w6rsKP0dSfjeOmWy&_djXaImG-ONk+Yo^{i)03Un0Kg!1OlQ<1vA$v{YxNH z;(xh$1=2d6BI0b_Ie)bw=;sS%Zled27iV+5x*O%6QxM3Yfe8ovt_?*sZho-Bat(re zaFPq^SRo;l&h~#{pX>C^XF%#!1%kj%0(JDOZa#8jEB}dNsYjHG$4sE1jF+g2xxmsS z(hvqkS^nBrBc$T~d3SVg_udoYvFD?^_aE)v|NZ^Z^RMrZ9^b#WyUm8&dpg?X4?EkB z?~k57xz8~rcJonnc=$n`2*RAC_7})*^ksb5>*V~>p=44Z)(*|!+2 zr-o7MO$sLUMGvNi^*f>D%H*j_z3}$3oM$Hvl3JyJoel&>%u56ca6?9E7@){%59&9*#L9Tve2t2`+H>^@RG4Iz^kBH6pcI@?XwLDhBn2#Iqk0gmfhtq3 zw^iqqvAH5G)0OKkCf?PA;DCKKCjgVv zB|@e!^*RN+6iA}p3x~Hm_C_nQ5or6)qGKfaV!V8{zLDCwND*PQ6{lS1o-w-3KusAggLD;5)HIwo>v_NyIN2 zD4Gd!IDSKkz-+^;*90nvOr0!|NDIOEt0|QV>!mkqHU}{9LKR5}mt!i2L$!Zu8@Z>8 znh2ZDZAsg&-i&{Z<)9Qd_q@B2LM=J`2O;`@P)QW!H{8>(0AjVYTW)y8ai|Tn*S=yCtLY zfQ_T$y*^qZCU7vLxKw-l!cST$nZBf46umI%R;!6O`etQPy5-4N?t|+9V~KjIPUmuk zg~!#!>vM7?L*%9M}u#+E?Nmu zNpcVA0}=}18%4Wky+zP&vNg;SdBiKilZB=VFzP~)n7-n!t*XXefBA3XRa=u>`|0s& z-vD0bt6u7xUG4N@3J1+VvPOtRlsOc=XsYJvpD3>VxvWL)T*;+x&1jGXtYOi&^MiG? zn@e@H!n_>L;MeMIE37KRTuKkyj|-0b!?K6K&VDjwd24IqCR$h>Y_3SzUHiBFcZ-*8 zX-ZP}nXsN)TmC?L|4Gu`+9+@Qk`l1>H${&2MQ`2NxPA4O#6*(?k6-Ub-w2NrSfwN4 zLh@XNY2jEa?5SeKE}Ct0g1Uhrnh_Esvlhy`RGh1{ujXx7wmmqAYW3=<^q5f(YLm%( zt+`bye^u$W#G5BeT!po-lyYXSlcA2sR0#0Xu$F8fL{lE zG7eG=9irigujFvJ5K33>iNaJ!N3OP%l0;N#3Laf8#d`S~+7l6E*%5vzi+qO&pn9zc zF2c^DQO49Il{CW@*1N21eS!hWZ$YT#euyje2M_+W?H7c1M%YDPzU@ARFA z_+StSA{jY(#ED6hWjw`XwEDci&4m>8j?U&rgt&JBUC5;EN~^5wZP^M>Bia9ocSb-~ z@1HzF$CKIj|I;7`R6xQR5P_#4TJu<6{`D^nWvf?CRlBZEMq?pLPl8wEtBBaU zkC>cSa*)E53Y^Ygu=jIwvsfYvmo_nm9&?tO1>>Bx_p$?%082o$zlBWOl_43=!cy1& ze?BLiie75{C&gS=eDMbJFS=|KxxC;{*1jXXj`e|I>Hl*LxgkpxrC&uIN+x7Qd-z=-Sndn^)Dj zqB%6?VsN>3Gy;|-CVG6~663AX8D+HyQ>KVNLPkQWL+{Wa6t78;RNcR^X&)aQKtmec zSEi|(exeQm@!_}WX4@C<4;GE3@k4=)#zcJ4w|Z3$vTIJ}m+@h;J8mBys?QJ2!0A=! zONi^mI~#ZFo(5WBc++#zqyyTaoxTpM6fvZWzC4tCzlSZ##8mb$%N-RUrZ1`er6-aql z*ar8B^9Hzt2~1G^`3^O(7GP!F%?Tp&s~wpOsg-2V~_ zqTI2QI}ws@ck#%xk1am4%L|sEhNyanRV_$XDY zXgInvbvzr2e66rKZ;88ZRd+qgBA4|8GLW?b;Yrb;CzgB=EEk)|7dex~eK!p<|Z{P2j$x}sN zk|XZW2tdykP5z)bscNpSSgG3zQNZRbTm#&IX)}%Ebx*Cvd6lfjP>F;&*>E^G`_ zZ<5linX^LZZ5xF1a{Sc>%JU=C4)5P}37FV?A}oVazw8HM1vE6w`E%;23-7?htpx{) z0ziqh(4{Thbz-I#t#l&XSQU1g%&ejU?`zS&JS*4~^~JmKq46*qrl$T&Q_xONt?N8| z_WfppSA3iam}-05&mOD0?`VrXpnXBb3JW4*1}wn!GyNniIWNl`3|8 zU)NwwiBWC81$}V9?`3A+Y2IOR3=*9zOo_-|YQ{1?=72H}4?TRWxoRh@d(m{oi)gY| zDt!p>yde2TMokxF4@Zx1p3tPIdgl{D_$_Arl%{)z%_(1UGe-@)?E_59AwX8e&s-Uo zw>sXbT?2hDv_nSqyjx0^I+oH&Zx82j`>!Nu#i-Ck$f&#L=Ql<>gg6H=H8Al3A}tlf@`S^)1t_teR~)cbP07eiLx+piX{WPPtPS*`E6fV*}rO4~AX zbx&I@Emj;gOYlw?X$jf%KIuAQ4H}=&A*kBSI#65TUHSV;L+Po6MuNE1Wc4viGsb)E zQ199bXp~yksGc>>uQi!zD;2|4b(f`>I4mHyst2MQ&Hl0eWsoxY#h{SPt-*Ofw+7MeTWeGAr{>)U$6oruTel?L zjTVy_Z#mT>hPMlSthRx8K5C*UGYS7`5Asz7WM)I^|4(9+FVh5FL)klUx~n z4JZj@5RqR-ZCMzVGhxLwfW!5(XO(!T^pb+a?oABnV{3QL8~#iPsH zm~KVGhqPD6v$cetkSzu+145Cn4)$!FwH^_R6>{CPp15Fty!^rRR~!EqZec3~q~0#- zIjA;9$i6ar^BY%PZ}-d>H?HapvP>s4^|Ysu04VNTfVMF@u78>0TbB$g9kt}rnYtY3sohUw zS8Zc*W9V4xN6#995J(nczW%EAQJJ|*Rx1Pqvh(}v-F*nxYqb2TN?q9GxK={1rFFe; z(mcNV+3wTw_AOI`RRAVv!P=@|x~is3PGs4MZt}_g_)MbTz<*v9xXR$^_GQv4iN6j zw?u&a{_ys1UkQ6)8+7*-c`S)bZ~?kI)cNX8Q7j38pD!138S1X}9m>&&{=nYQ`PFJ$ zvw@9O>-8-tuHfq$0OP&*iV~`GH2^M^&{Vn`@JpSDBFh&3sv72q0W0wQpSNzOGh0!P z=0=9{#9PCE85EMawU&^)(!q1KI$wk@XM>r;mo$)~lYRN#likma`R`*72AzMHipw$S zVsCOv-lG|T>f+0!h_tx!=U{{U>Uer# zeT4W4rluG=XLWSeWd_-~4~|YwEWP#)->YUu_z;L${lXK#Kv^>RlJajrh-B2ViCk~UBy!#OGw(v z1Dt}a=or|$w`(Xc(rFMhU^mEX>Aj#Nf*%r*>9hasX-&Sj1yG7ngP;*3;q+cPTaK1Q z93Rb;2woXov(M(8MO0Xr2p*J%KcZVxH{}Sz1=WWDSMrKPGpfw09^1wPTaGa6<@mjL zv&uDyf3PHKJ*OL$s=Re`l92TTHp=8okSdjw6!G_*8ATHt@%UZA*TdU0rWHC{BRQTF zmITcTx@=cqq}+q&t76@YDuwx0LNQfq6sK?u@FNmm8yD=Ks}a}IFw%@UIV7|xF8O>a z)Vh;l?d+DA(Z&(u>)l7Z=#|x-&f7XSG{%?fVny|%DNLwfvPO>~9Q(jD5cc6a=;f79 zUgZ=mio^D0W&mO46<#Tsgo-IbM}5!vzA{uLCA__H`^IfzxR@@bGZ=wp#c2rDc`Xuq zwZ6JTp^y*O+1H)lxccwi&Tm4D5Dhk<8QrX|@}8wML^%L(8-pBHu^xCwJN_yAxsIN0 zbmn9V--4E4{0@=Zf3O(KOs-fn?Pff*UMg2OnYz5J1J$&8czD!=IpBepcTY;?ZC>ez z61BjsR>+8vGnyt z^ArJ{_BeqqLIpvjvaS*z@4sMu*01-%MYSS!zZx*f!`|5PJ8d0*&&XfYt85TQuV7G3LE=X7i*IsJldy*46 zJ+qlOc9PxJNZ{;j=xoyCyU#6>B&YEKDZp^Oc?&3K$Mu%c4za{9FUHsljlV3)`%z~N zro08sy!XtC)f*;&vK1Fmfah}oOP}cGRXE`(lUhy!0jyS6NvFvKda%3oYRVllqQ)_$kkzkml>Fyp};mvD-NX#U1yc?`ZJBeM= zMAS6(KnD}qyiB2D-D0oB%35$9tvecuYZq8kQlT4Zhox52l7a+4wFug%{x7^G0P>a|TRrD}Ca{-l8dUmQUiB6EJv7XH1P z%v8}W+HSm&<4((~0=PoVr7#L65pz*;O?4*8&{;HNDU2|q%E6v3qJPRF4#3f7dI%9Z z$~2-P<5m1=xIp7zsshsjh8D7{ry!Nf(%SqS7*EY-vUXSy1AsZnn0qSK;Nr8GT&Ehg z3-XFrIWuZ~h@WXT4`JtXrsT#^FbrBwhibZIyGI6E#FT7{fI1^$NCD1LH43j0l!HEy zvLtlRjL1*}%?e?*cGwLqp71U;ACRtoUj<|(rPOCSob4*QOCc6kcx5#VZ(&S!b7_{Z zk{^l(9>gmKOBJ`*lIo?(T4q&?mlHd( z%!Mc=qEwNUq3py0BV7K5p!fn&LCw{OQJ_U~j`1G^M;eS{M&mgKJ#wZltlsE!?&1LV zr8i5vvB=2}FeoM}YJ=tvMfKo@n^EAk(gh<<+tphoFf zRt|AgK1Jjp8MvVgCYRC?&(92W&Wxk>gBS%y$B$G-Gi=q^gB{cJ7JY$)X?>txkAKFL zlDioE7AK=-y5|9Q|%{n)JdssEfQKF8QaFF_C4Ogs?M( z^rIEgKiHC-*z^af#1Mq@K*Wn;ue(`7h%kT96em6e&Ip}78_Q?px(71r83pkrn-IdjiNnbp1 z6iLh0j&?lhvWsYx6p89E2FHpGhTU5?q`1v^jy>;SkJ?!r#=4U6DL}R<=JQ|KG$j94 z&VrWA_2hD5VhZoz{MJD`czdnv(?3j?Aa~-V|2IsR^&P_v{KIzreb}zcGF6`wF*oLm z|6F0fKL0;zz=lP@y7`Wf=lv*FkCt@Fv+IY;nV2|u*aq9|t8As|)F$0SmrhFr>AHy0`7qBO@T~(9Z zj|zUVsOITdyadXjn!r%%xazVjW?^{W9_-@3Jy;dHy<+ad)(!vkP{?|FZMn=8CiirR z>JZaQQL-d5xW2WDg~^l`NR^^tDnEmT9t~fS3+QhvD4C^{nV6-h^(`eb$7;K{Q{)jC zqC7@G(U(Pjj zVSf;G3`{sgwR3qKv#C-ONp)zZ#3Pm`7u0`nBX^jw zxLmxXW%oa&yD|s^*S1oY$fT{hUrOsT_6(Xp6nyyqua6Ek zVO*JQ;ImVBx+HVb#KMBxVRLqlFE-0XmigW#eQt#5dK_PVvJ4MNF;}x1h+McG&=h3dq<%do^l%mz1 zT47FM&3MZM3X78D3}Fu_8i~w?>o;vzdQF%}jCOucTb5Z}xO8>Mi{FIHJA<)#`Qi2x z_2pW%iwjBwS~C@@u}|ZfhHD1O=?T(CPn$teF`zik!?$zPL}nlj9pMqRD0NqbA1t=Y z$U#mvPTPRGf#>5?@7SH6)(=E?XZ)Jv#{o1Ba-pOBPw%pfNUW~29J|12YvrGBv~=%d1!BEEKkA$l`Qj4B^W7Kvk{rV^`e1s_L}IS-*1^tQ-#= zQy)LHM{_xBtas8+!()pcokp?Fq>Q!gBLqaQKn?QDhK~uS6BsPGg?4C_PSW%&|AvTq zpf74W_*+m5Ky~k%+kxT4kmIw9HL>`Lq1}Pr36Ei zK~!(q>Fu6$%)Yx5g$UB>?|VY=wh~-5g9v-XptGi|xp=>1S|QqP>H}2x`ML^n$oSt{KhP zrQsz?6irXeDraZzN%gI2Gv-!%tyJCenHDe?8&qjt*Axp2N`k}`l?$;v2;|WbrS54L zp$e%as0Z=bPPdAqKg;DYSs$m za+u}*wuBXgsHt9P&x4~!qjHoXf$01MBLUr0z0og zgu2`r_8TilU>EhRA6-l+?J{K)A(jTMb_(v=7~aH8!ueY3V z&JrS{v&sBmI@>qCQ0a~)x$wIG)^4T|zgrAQuj;Ci_0&%91C^#Ar z-U%Dz(0aihnpE{4D>+1_=YizHpz{}E3> zHW8k$kncDIA_HZE?EKDAka{4xF-Nknk~S+a$I(kdr1QGRPOL zh<+V~`K{OS&GglYM%PlUUfWZ(r^)LA^1idQ+QsP6I9?6bH&}qIjXJl2g%Z(3Oz!)& z$gT;QhVpahftN8=Qt%~?17mvuq^56c<(^T2-Pzsq%XqN8`%JdE%SrjfwmJT}0H_MO6UI{Lwi-wuyvcnljw~jMddm-Ul?#-UA<0^+9z<^_0#ZO-L0- z6#kI9w~Ixq z6fa6=zJnWeX3EqBufc1rd*U|CrvC(dQi8=$C4hU3;M4;}n4(I(f6SXuJd7rV{WQ9h zj#Cv#elgXN)pM;BxnSYCEO*#1uhht?sAMCd*v@K?E%auf*IB zf#PiL4vSaMHE4-cA<2!OJ-5}^gUo+&^ov!E58(fKf1s);GX4GUyT%~6p%K{0T9#JA zf^_t~ws$7GL?U|~)KDZ@^xH2rX#B+liAqg|@m%{Lpaj_DUxI*GY8OSX?#iVh-z%4Z z9}h+iKM=i&<;Wb5FL-(Iadc15A!k4_e+`3|5o8k_K@1`MVSJ`IJ^~1(eU1KY@avG< z0q2TH0%TOpL>+4HZVs~hB(C?Ks{E2n>C3U?9x;wF?^zwYx31lE8_jFOq;UfTl6qAt z8zqa!fWHWcid2w#)Lcl!mKC6jnDSyCM3dT zA1&tRe2O;u@-hqYxVaVM+;_AIidvxSq&Jgx!lcKu3)<5T;Ov=POa3dUmT%}~eeTA; zR+w;|vO_l>&7|*Kv`TR#vR98G*Jd&GyiZ%xQsVsKqr6n5ER&W7YoT|Rsucy%u0Xpaom^SK?f4X^iMh>VeaZUC25lWqGhE6s6_^J1wU!)vRl=2K4#L>ENw|*!L$! zy5}Be2r99eHl>$;J4S5PQwUyENyLG3nC#t??3a&f?k>jCiHh5K59Y3{%ha>HXX7wp zMAqsuKYvAlXl*i{38KHG#4`0PZLOr#89%@d2S{j+V&VK1kqf?ADb@KmB{mb3TJYr$EZcY=UX36U^>>=`tv6aR zht#m1BBO1kgqSC*9USB3qq40563_t!(3h@(EY?+zXuFa-pMVs&=nPaZezBNb$e0(% z(!GliHwLG6R2AQ*su*GX3tF79Sk42JrH?muh2}|(i%F<`6Wd8>CZ>Ryfxp^1}^ip7<1yM8Yxi9__2!??VA@4@Hl z6s)?;dwSJsmbs_q@hIBW3HBONoxX_QUBSp{pfXOV+1l(lsQ<><%3U0RaImMNDJ>m#jxf)ysVMIUtTNx)c z2dHQ}A)Qu_b2cl*JHR94Ja6G)2vVP&E3;bmI&gxF$4BF>ucSU6sg7Vh3>m|QB5H_? z5yCOlbIQcEu?2{GE~0#YuLfJ!`l2E7Ql?dXSJ?1K#t3RRLTlX?_JxWODW#K!N`HAh zj-fWDh-V*K+)V?V1!Y@__nWZ7F>Zi&lBq$&vt>~fO$Nq8P1~vVApt&{&^de*pvp|lmYI*65!-ekhL^wucYpb!u= z1h*D91)XLMuvTPZ#11qJWGoRARYuQ`etAx!60@9s1AS+4)P!&5@R*tgQC!D`vax7ozwvNuG1`)l?Y@9AUW*5q zhV^P=aooFHMy;Fc(C{e`Z%GbqHgZp2Ggo}_Hi87;1@*fWLB}p6OIQu53$CLonnNhH z?hE7#aXRqPyCJZS6$DyDRK~_a+b4cx(`}?qkT8vTZ}nDWE8}ySMJK9oKAj#%>TnjS zC$u$I85Q(L^gV$BwA#kKh_?F`JLOX&c za0a)=&(ScEyaODc0~=_1lc)6D@=pReu(m1T4+vNozKHkpX0C|Ig9mn@gk$+p(1 z-+vn>IeTy8*@UdLP1fiWU}-8&T%zFjhh9r%zRKq4i4Jx|4%y$rlr2fsf+}dUt27%c zH=7lsZp%#3^!GS6pqh7z-q>?qmNcKNwP`gcw+AZ#EbcG6c5T1PYAYv?Lh&kDq4>Rl zjP3f>>mwH&J& zAS9akBm8$hW>+)U50hzSzLo%@Bm+vu&kj7G#Td{g{}|c|ks0Pp;C1RiuP#o-k(qHM zHHR+8eM#O+!VwZFlMT*;9#A}CYjh1XiF}! z{w4I~^YSqa)QzA<@z2nGfsBOzF|@C{??&{cC}4jv==mf*^3KzzWtrmxC1;f!p%I_5 zOc4ObGD|w-PjjR!WPwrg1&Q~q)*9a-{|lTG|H|1!qem-S zlpj(1OVIxGyv+nWElpR%SXQb{(UJl;^uoJAV z&>i%^;P+>*FUcOn&y^e^Yo#Inq260B)q7zuf%o)uc(#WI@k$7@+b`|4vWp@BT3g=l}XYOeuq_9nJ0|g`R}P4Dx1Zoep!?tqoq0?tfdHV-H^?;F!M;a(|e5EW$DmAFURRFf` zzQcY;1{X)09x-l?%vC>16y-;6JHBl}8YH5vdM^-=N0;~5=ZA+e-0JgB2!{$}o5B=n z$D;kba7(q@y0mNU?MP2rA<#gA6zJ0jr*cE3lIvH8lo79AU8`i%jpYG&E9WWBMTnwg zK2azmDI;K_ICcJelQ;9%M}Q(7*P;v(=^}xUeRtQIyW^{Zdws@gazt+fT6y+ps3g1JWdxRmHd!zc1o=2cG-<(2)LAnp-M}KuIq_h)#qI%wjBH< zQt8>;qyl0Jh8%dT+O_`EO8L&7TzLvKXC3iZOpG=(Z+r<`N+5!Eu3M~l+Euex*kfHU zRFtR9CnVq7m)x`+b}*LZDEj1=(sq|}9@S;oH>gRicFlbXC8Lh}tph6}u@ym_2BhI# zRNC@<@1>q~xM)1oEV0ynU0!Mc%>^b`fTGq4@@_)%95K%jC|ADJnP2&v|s&WFp6qcn_ez0!?327P$;V5QvEloSP0QsaU$yr$t#dUy)6SOxdOfU?Ek3D^-(mmYoZK(by`%o_eCghxGzM z6>DRtR1F0s&=xUylt>~J&th@V&2wxQ_+^3fg&#zsU_tF#mG2^X_WMGQwVJRDyy>UA zNnq+9Nwl?5tEx1s;jW}*F~(A_h&sCsQPvIQPr9E>B%%E|mzK+UFW%y-9;15Dhj@Tt z`14TH4l(N!UO_ENFDz5LI!kS->lMJFk38yGiRULOR&Ox6$QEzQbETVlOt!es&!;(j z-U5#ADas7O3|m7JmacEDoUl}A*9>4Nna9TH8MMcZ(Kc0y7^t@M3JFQ@H2$l3nipt* zYv_sziP}twXf+dozQ3}^0QqyUb8_^)c1mcPxNfBHQoK73J`|(tj%GBWtMBeG`g6#D z6n~_eAE>aoT2A_FzNX~Q1aTVzsMlQ%soBpRyd z#Qp{SHMHES53;m*i)S2rFz3q<-?=Ji*Bld>)D$Txe+9!Db`XV2WAzm1c@Bba%)#(& ze+>^Qw9GL~Rea^q1Wp;>&WuWPC$zHr?!kd>0emj>&P871lw$U)@EkXoq1+`&AQ^ex znH&%S?wwxf{^7*;@R4?|s>uo8p;|tlB>Lp8l{ZJy0xCe%_8W4n5(@`5!#c^TLKhSV zC3=ku221dR;uD|Xfqs}A5K1vYVR#CW0&n_SAd+&jD4;}{hvUsS1GPoO5CkvB{202= zIURGQ@z;2>$S&f>5=%vjdWdYsQTw|u+0$_~7U7Z#br#b|Dar34lU5=qWiY14HsHIBem!rJx<7qwpA+*lGU9GQ5O>soY^J8YmY%aO&77;29KDl&N5G=$` ziE6E5O0h_Ey_}`=<<`|Zqi5xsdvVQV#eWrde^ozPp`|4v&Gi^M0;AR5(;rVL&A84_Jgs_e>Cxhhq8faD?J)`(L~5T|SNk!g7ULz;*{BKQ zP$~GkuU8f;M;Q~r6~-s5SV|pBUK7Dq%NuAJ2tob3I0}|?#Ou5q6wt581e-x5rm*2a z5l*0qxguZ-h#?qaQz@%5N)?rt9R z*I{S{6l?c+)*HsruG-mN8=|~s)okpv(TsS6_w?w?-yA;HPJJ^sJml2e^)z|D^Crtt z3PjoNDyCa&dQMDwYWA(b zA;9PnN-^j7zoboVcipOICHJo#Z+@lgGxQGZxorMsD9~zQE{@)KxDZndXHnN-M6!cZ z`o0m?7eKH$#8l>~vt+yO33F+I5iPR9<{RByeM?P-(sD^2hs#!^L@%yqvwWb;)Uhd+_JeLzm0RfevynZ#e$4ei2ZZQwBP(9zU$Q|eeTS6 z*A~B7BJSgj7xkA9Y3<6pB4|NKoGk>9t+TEU2X_>^6N#rhZZ`0`svdXq@{Nvt%&1eG zzAzY$Z{tV%WI5M4s}NvlGnX|SVXqb)=l;ff2sU%>zJb6L*YMeFo~U*N0>(BsJWWnw zgu-x7W&*kVsI&dO93|U?h3je{nRF{Gtn^;?2 z9-#vPjclbSjzCSE8Fkij!cItG*J&=7i?JvqPXrMVCn~!F_vjLm6JI=1N8sn<$RwiU_nk=up^)I$!8F^C3IPIZzGXyd!h^BWG={Ay3cBN%!sfO(1$(~Gse2(*YZ!C zEop)QM}TgwSn;V?r$U?D?MSLJJbARN(j_~6wb(Pbztruhh>2P;(#o>mk~?Fm1SsO` zKok3M;jmuZ=eWxzi?mc-FIpzmj@L4gjSb)ER;3trj6~NtxY9(LMn=V%Dr6GE#gC#7 z>z9su+P`mQqihQKm1^-}&~m7A%l_VA70TY$#s~-1Lt4{Ws*Kut%ry$3$%$)pp|c`W zbMO2CUk~UH&6+vROa;E!A-_W8L2;}m>0}OyV0T9~Z+4-r8prx5ps;_A)|tAzq0u#Z zl2jeHO7N@~IMv5V&nO>B6sK%r|5VyWYI~xn%JK|6uXcTOof4Fyr&(UdNj~}|m@fVV zT0o=Eu%u{rQqNViA96E=J5pY{;gT6?np|FsB!MxZxYo@BRlIB3N>Wp3m^&X2s*LnM&X&)Y@_rp1Y87C! z{o-$vpjlg?ayX1yS6K)O4nCH-6gRwzy|El7SMKVR!gI}fE?BDQ;4zHwhQ!+T2Rm2q@AYcW6d5-{nnXo*-xoi1Z_lj5oopq)Dd_R} z3><#+_^W55cYgT(hyVV=|NP;9{P5rY_a8?5@TVXC<=xWpj>Umhz_sNcQN9q`<<>T7 z3X3}75-Nz@D(LAHogWD{KYn!!cY5^8APTD>#CX4z{@CIrFp77vj&-;f3uL=2HOam&rSQdTExI=aRytlz=^V_0 z))!b%M>mu>Um@%(M5SEU%?-inJCP-*;5!yL?h5ZgiUj19_^lfh&LlxGyw1U#j!CDK zQggqrzdk&CTbM=1X--618d0L8iiR0p8ES`O;zOuesg85PW*IMB?&Ke5*=p5b9lr+a z^ESyl=-Xi))G>*X72f(2kQZ6s4dtG01$M0U^|e+LiudU(Pl@&A?3!lVCrd$9)^H3T zo9mOTZgn1Y$8PxRTExRE>+|4@MuoVtMbTsz2jWwClUEj`{<8E`-`MLzl9ENICvIlF z5kT6x`iFL23TC9aNw2Fi5)n#9W#~qOrD=nx`rZbZQ{0z9lxJ@P<%zHC4yS4NdKs@J zO`H3^aGAV1$)DlM8g-@h8vqNt>nUpxSwbHZncB4O#92|x60tyC$S@JoPrqShPzPT^ zBRk2Y;k_S9`Nh-u-O)2Trm2q{Cg?Ny(Puh0wmKqdC-Q!}u$ix_x}Pn?1`Lu9c#GTC zc98`Q>y1~&kz#J^748MfZS4AJ1AQhD1mz`RBnD)2s+_8R>7LC&15jE}kUA+!P?GzAU z-wNe70t;*O$buV(D!a%8C?i4HGelVo)x{DATi!*GTwFkYBUU))PIhv2`hH4beJFoq zz?vn%HCJ8&6AZWLu_gsnY%pkmnri6O^k{JbjiM3Hel}R@G7*F_0ep!(&HGMeo$ISA z`iZD9k_e|PC9<6D+U@FJ%6_{?GfWcsx1+Z=Nki3MdxNpbelHWO?BS0=&w{kmNZl2l z>ogj)m*22!c-G6pJ+E3QU?R6P9=+?Ev<6(IVyq`XcOJz)LAX5@qy zx|}V*0Y?4SI32U^K&dec6eLE+^5_Q%!~qtgzcf+(4(6!FP<{Z)Mj)S_AdB*9xWUNJ{2$Sm=eix!;zqE7E-o3d%^F-_{HXHzQ`#nyN5gh*On~#10&g22^=y z+?3b4pz*K}ZbKUvpsF&WVs6G74FQwFze7}TdR6`6qJ>zliITLtQ)`w4?%+_DMWsDf zbv(VClp2q8=M5*KNf46kDP@>>U`0m_4i*jy<+5zB%x_^|#Y$BXpx8OFHC9)hH%d~3 z8Ym%No`d6x?4I6!dCh88(F8em7LmKPf$0jn68&Dv#5(+uGhIUn8o~d%Nq9VR|CUKe zW0Kbv^pHJCGpm}~qUj|@FZptcd{y>NSdIA%Nntf%!gP%B*z{ngWzDT>c{ZEfSPN{6 zlU|YpFFM#_0rY0c9{bnLITnZu-Ybh-Y=m+=u&&MJGQr8PiF9C<MI2G&Fa=>UFHbbsQ zdZYr&^++lQZRU>E=92KVU?uu0W=A&1HlgF6Q8{ug9qojU6rdK167kLEqjgq4$6vI1 ziExM6YMY`9%;56Habu&1m-S|EVz}GtK0M2(vbayp->Rhqg+&@i%8K-bmq3>Y?JIq8 zFV+x(hPF$+iUppOIb(F==}V?OPo?!^o&aKhFiE@rhUTjlUul%Si?wOSx2X-{vEn$B zW^`2ysb@LAW336xw=J~49@a0}k1T0ORuIi74B{9N%%Dnl=Utn_+I^9u%1QFLcyN&< z9G}unLrY($jaHL$_AH7^Ll0~$k+n&PXTqwQyX^=hvm~Jq9aIi2gPD`cG@LP_?6660 zXE$@f|Fg^6*=tBzZdI z8ggc=y7W=q<6{FGp>P!iMRlOXE-%U0bN}$jX^80kW0AhP>k*MaKz`kZ>ur;kV``I} z0cJ_2Vvt(`o=K3%IjZe@NjfLGcZ5YM!z_oW2#?8^=GmN#Qf;r9ESnFe6*Hg6lj9Lo zCE|rLD&^>%msU-$6UL{v#*@Ffln zdr?dTY)N%Uykg5Q8KTSsb7k|FeC2~2i7N45li&{F9JiWQZM!E3zJ#~qn;)Ai!YX&= z6|U96s$kFdJ`6>&#}kN3han{AyB4FXu}g3_2^j%gwf(NJyN1hGVlWFKoT$T=-MRh{ zX7rBE6CX~wS4%I7f&%!I!-we06y?(oMPvKD^!9@6s)%i~?mbWKlKFYTQ?&(+9g%;f zx{J=HS43kiP*(g)wp~*`Qe2Z1n-L*fF7#()0PSA$tsp^JP0A{Txa|2*HeT@O?`p4} ziw#+{`A=P^X;KN-=^pZ0m`W-cY9gy^WPOT;4lfVQNbEwRk`0sC(&tn9<$b4PCK}&Y z`F|&FnyiS*zsr3&dt@R*z-3jT(qHo{^bJacmbp%&rBL*XQSV1fdbDp>vYQ$F=lU^e zw+>m(ga`o-_%+2KJ^B6pc^qzSpBj^C7dk8H63inocXGf z=AWhMV33V+cCve==hJQ?EGe+EyQ4jX8}$;YJlJtG{ZZNXSPb!{oZb3_QS@F=sd6t> zJBe2u(J>MCMY@H@^M5$M`9+tV8*S%5>huaWcK>97pIlDnpA&3zmaNQF{w_W+Fi%C) z!SArU|JKtK7vGqT9R7&Ps`jvkPqgyt$}J#KOD@V0uSR`y26=A8R>Yd;f87r&VHbV8 zP^cy78(E04Vy9mprB$hG^3Ldsf85!%IJp)|X=2WI;syNr$soKlq9&ffa2C9TA7?mOX#(bHGu$7_cT~N>g!c+&oX~amLSHwXYW|%?1g{+eb z_}yt^XQC#WS(L(Gc7cLrg)|F?^Ibz-wC3z>b&Ui<+nSX_G`1#NU3%|@q{Mo+uI?@5 zV$-xrD#~b;>$atD>Kanx=Irzt(LP=ERV#4w6I7CFp=}90`v9RVRx_+7O^NDEU?);D zL%|bkb+vnGq}Isw9n{-209in$zgyFU>^Ecr`z5)arkaaKqaS4Dsl$-=op|m;pQwiCv zOV)h{+CZZhBn#wVgQeRc*0L-6jNua)cQau8=U*PZmnMNFUv5sF>5AV{PJm)!l2yY?Pc0SBxf@L1Y4o*1ouKD&jAVJDXMys&LG1qB^3;Jdlj<5g4{MB%n$Z5e&NI z!|=&QlG9@`c%iMD74&*TmdEy}!(IRN5C3s=gi|L@!{hNerQqQ`42GowZq!6 zy6qdK?g4_8ANOBKoxOdH5~@(cO4bopudpQ^s$=F$Yc?Mz+iS60Ygkc+YV67+RO(zW zbR;ecQ2tTgPNkb%G{nwg+`3V2z8Y-WI$)ZMl@|@9z8O7H-KsXI>1U@-#5kUa;xB^a z(y^3JOB~RHOyyhoQGEgn$nk*(KH`@ zx}1(+X;9s!tcMx{3w4k>{41hRY6AlahBZBDGaj6f{ zH7={EU~RfJNyVS#LeKD7X{S1Ll17`wJj+q?-B>&5dEwYs>4w^GWOJyxTOYwZT zSTY}FD1;F>1~V7e(6-W2`qRbqcM$-r$#yv%8qB!m<;xwHde++Zu9tb=dq$m|8YN^= z=>Z2cXSJH8-3wt(f_BFAQBqIV{w{TFzuK{eXZ5W z+O21Ox;Mo|*|bi76KBL`btn%sj6~fZM568wB2o8ynnQ*~AO1=Y#dgsTSu9Ay&2AW{Dq|P=MtyIcS1L`16BDs}%j5yVGR76yPus3B>T2GR~Qu zGDj<-B->jz;&bfok3JvM6=Y5=TPu_H;+-*6k?yJ-W-1ONrV7y03AuN_@gBu?jA{5z zaB-V)tXBO>X^`f=*Wey}~cExzEv%KkbUjq~N>Nf)wFRCxg517?fv} zqK+Q2Otrbm4TvtkZ+yx6IR!4B&gr4)45vm$Z>T>r@Y3YrU@@Z_SqaB9`SMDyzM($n zGih3QL0H{3tH?Sr7K}}qWWjP0@@6T13dK)S^JPJ-rrwnQS9W`*fV~@bn~;7_YcEp6 zzro(kR{PSb{m56kYl2g*1AO=}JhM_yu%fMS;3fLbV~7>*Crl5SH_-7*ZQ<_jAW^s9 zrK^er?T(7#@_^Ok5gy`?%9x85qt`1Y8_(|g5xj<2=xU9|LIekmwUmv>40r>re0+N| zc`Sg&A6NE2XP~Lw<m#ZUUD=vl9#@V@ z?Bq8rsb)1*u6dEoXF0`dH)_L0vn-oquSjTSnH$UeYn?1zO*UI)O?{Y#C_nw+j5tUAQ!TGjOmsyZ5-syQ*1e89}G)Mnc9~}r>e(^ zp~HDJgrapLfHpeeP${I+M`^4JgwJ2P7m!k64d~weO(s~}258mwD)LmVICTY3WeQ7P z%JocM#xm*PP-+n#8FHKe)4RZ?lmY0E+6Gh81)1-8d>Pmj0f{@(3R1v`yO%r20}u;6 zhkuqmZ0Qqr=6Bx@bBKrTOf?i03)Aq^mWTL-u3NjCLPOa98(;gk zcSi4j;A;w;*Q)x-&pLWX3k^S>yd(XC=|(LFB;dDQo;wATF^B*GXFH^pDDYDoOi`G0 zG!0kfZmg$ZT#ql$$rs&RP-S=;rFwA~b?snfZQVp3O!6pluA8=X_kn8PIO)r6D7%ea z7q>Ymw|Uo#?6<~Xd{uRVlj{sHjlc?fXthWEkG^a!N8#i1S7%FgL5Rr^rL9q#3kH;K zWcJ+d`_3X*x3Sv_eN8H347OOh-dMuVzvW9k1$!~tTh53F!%Zsw|FDe*Jr;VaP2AnX ziRx@2+5fgp13OOL2C&*9!bqh>G=4q1)~J=$D1=t?Oy5+}n%B+)%Yb9I~BrrMX$z``xS zBf>_ThXZ)Ukwfh9ZXaQ1(9ZAP>nweJH!v#d-g_vXh- zyD}nV<@{L}C1uWCwK9ee;IroLIQUh=_HX=rzg>U0>{_pJ+kE?skr1Dn z%Rs4;RijiCt^p(a#voSq`i-)Ec}=a=_Ou+t_!60V#XXKcz>QY(B^`u)bLtPNQS_Lq zsNPQ$jGz)f^CSu7SeSXhv7SS3wcct z|FVyEO8QSObsg^Qu;-H-PVAG>BXoSM79>(Gg(r)fovdr2v_riQeW!IHMN`LtQY53b z1QJ2YR1y7(L||16qXLSUDN>nxWSzBDc(pP$E+>k;zxYUbz!%TI0dRSy7@X+y;3oI44l0C?>mrd4n8?YO6dzsybmn3zEYhPBg>} zp<07`MK?-gN|^&eO8JQg(NV-h!6MOBBBH%}_b%PAvnu*`l1MaFF?;LEnSLz>NhEdw zJ zHZP!wpUj7HiC+^~qJ!oYV}rRq_aa^DGD+H3_65a5x9t&@MksTN=}DBVO@3SNFgk^y zsLXot+kWhky+a>2mTgM6JY6m>(O7v3WsTgFkhJv zo~}s2#3`meo}U6Z0)PBae+lQB5Bmq(x4WZ0NAaLY%4c6wHPn4QyHtIs30AYyPSNij zUJ%lxjxb*NUEQW~z5{oS_tGjyQ#@v|6aS5(baq2ALnY6s!}tt3@py527lW$ysIK8C zRoaIOw7W4fp~%e&oijOH-tFU@4$r45qt$DGx+g@^{@K%m(c$5tTD>vZ)TWkuoLMtc z#|n#qZ8_tdin%OC=!$9;H@Zu3yx4%^%5D7p+c{O$(H3X;mOOoo|H!R!%|zV60_+!WbY~t zL!3p&#MR{Fltn^0rY06sk6~(h%8*6`yVdC_QGtA(wd4l1xy5t;o&kj;QmSpH zSKX-3XEVSfd2Pn7&}Ge85WvC~rP5zRJWct0{(3dJ)w!1iuu4rS8z86pHmEguNJ-Pp}t*xqGpd+mAq?pH`l`K$E9 ze2W!8>%MMI#=w7pbzL9eN#_kYounl2>Y_cvfkqRI!@V`nsf$xhT@gPN86&$x^`TjQ zj*Top=ls3jn<3b}3l_M=`RmCL?8X~!`OfD{t$6_bL3zdK!3-L3KFtWe) zqd3t5WRb`SSuYmNeo_>G{kxKRj>5w1{Dz~eLR>pYMesZ-z~zZ3D&XSe?B+Vh;`@{UYEtE~u?Y1- z=kuu*hJvvHgs`KNp1#UF8?8}G-z-koF+Ge_fgK%N?FQjZaR|vC=&f(O-BhOHFNf4} z0R8#zB8nvIVKHlYj<~6%OS;aNPzVPgVr%ij+Pr#JDVZ!rznM`EkXTlEIxPKb81U+# z!7TYuq+F3tNxjO1GJW5DYkjh*L^b5A=-=Y*F5)fe__YHZe^Q%rb(KBgy4NtOpqt&m zNqUKCj>Qn(i_9*M>e6oqpmtZWj@U5Xr56hsOv4_)V=ru!u8=Dvslg?1WZo)M!#Y#ddp}MjknyqNSsF0HfWlh>Q6!MaL+%sVmkF%(4 z9&Klwz`+N4+%;^XGQ&ywXAU^CQ;k(3q;mYtlhu>QQ)^!B{96e~kE{6%BC5Io)ssTq z?p=MY@5a*w8>#Ragxi?Qs>3eZOUY)|J=r@8F^ir*uaOW4I>VW;d#usaJ|zJ0@{~Q0 zeggZP0gM2T$*CMG?kDyF&~*SGb(LrFL`?a zH~Kdts=5ir6aq_3KZ}f^J*C|e;S_$ugnjuZ9r${kK!0^P4Lw>vk|L5Z6N2043=b~K zr$o0_^a?QvGf#-B^0<(Yv{QZ#;?UJHLd*fj&ryr>Eu#@l`Pl0iQ+zx5!);|u8j}MF4Sp6;e@KXLq$B$PU+z(^M^+S*;F+xkXUIq*Ui3tpuhZi z??DkT;xieh>C18^qJwrop^l&;=j-f2O`%}#Kr$yr+B<4G6QzQVYKEFzc-8>dPk#Ak@?mfjt-8VK648f?P_`1`*-15WjDIYogu20 zR4*;t7$bexR^wb{-BMZVsP@*|p)$jzf7+JK!F6Vf<%+DheMCXrctWXnhQ`%na>)Kal?k_sG(M?9 z{NSDIn~Nm@fkOc9=}2DS*X2}2mJT>+P;UFr77(1ve;MB&TO7p#IV=>+xuV;=5{oB_ z#nyJIN+D%X{_^Js_wI?|BEK$A9$5{(MA( zhhhS7pNj7>tkKWLcttW;%9Pb_IcvI|jq-kYg1wBULnU<~FLab9>hgL6=FAQ!Xr7A6 z4H&s?7y2Q^EkUUD>u9GE{%G*0M7iQGUyW~_0)aDlB3THQ2!x&-gCJ+U-Kzv*sg9Fk zddawRnn|cGo$)Qc;s#?x6cpcm%a?k2p?>WxUm9eFZu5UPvbmKm2DpcXP--#YG=e@L z!dil?5-c_ry}%TVQbw4CpfX!QIC?yrEWViCJo!Cg|6L|k$Y!mlzZ|F7P}dI&gg}ld zTOZTD7=6JSPN|3<1OKcUbGJF%sdcQ3K6&~FUV z4}KGN-Mho*v4;lB{{%yq(IW0kd^TEeg%*bCx9PAZnwZv9SHztiO4YtatG+TdcMQSM;rrAamq4d ziQ=2|Gj`&Bs+q~kLDKyF995^2J#C$~HcRejFVj%@F! z1Jbu6I)PlAS^8-#0UsUN`4#|SVn-EGUAb0k_cyJwYj`7BMRy3rlUyq2G*+iSB_)!h z5_o0ASooI$*o1K@Y&`W+#Lek5zA+e5e0KI88jd_4oWsn)_U8FdOOD9 z%t&~Cw1PqUB>1gfF?P*ky?OCRNq{6Ft7d`@cC^e8sve7$Er&9`P}#iVcA@66SV*zb zm&v8jd`Zw?&=srK%=vnGIRo|AH9HbeAPEtXTu(1Krxl$YC}ss|yFzI-{0oDZ*%W99 z(leg{Ana8vjTQ1|?3!?2isr8UYdo?#p=BT49etsjOUw}0r!IU6rr8b={Q1Qr;50U@ znYQRFE?LjY%L`d=>t2!^aE=qYQ;_Bm(}|a?u#mB~CPWqPOs;vs^qj+M37sDue59>jbTz*y4Hn5w;xVTc}j;Z{#>T2<(F&m&y#i zyU_e~rZTj$GXPS3m+`2ptScJ5lQH;2bSblv(4UW6A3c6Q9YhQ18LF~X zubNv*hCJ9j5?E})U7;snf-!pe3>VYuUZbt@9FA`3MX@)|)g8rHX((Xm_*arL^gL6C zfheUL8@C2nz9*>}>s#;M+tn5afMDWbQ8vXqWh%z!MVCttnmRKz7DsuuEh{M@u?CL* zg}8|oZ8{@=u1LhQpCxp5A%zx|%d+EPuVJF>JLoS}`j0sHYBJL~2ktPDu8!adqep0Z z5s?lI7z=A^Q63kAI9X5^=4koe)xGh>@r;TUp#o%|UPZ?Ht2h#zsMLHp@1g9o!JN&p zp~jM>P}a=XqSt}gc4J3jC0*K4crc$p#ph98Q_QH`P^}j?48!r9IQ(?rFLVPsh7?)! zwy&pv#38&>G=lrGG6cLS#K${PgIl zpTW^^q_im>tPT3A>in8aWB?LT;pP6eSxkB*LgFz709U8H{%}fMK4>=|(YD%D6nO~C z%f z4Djztsu|Cs%Sor4R9GzAA`B7LXyADA<^@k?5zKsvi%gPB4J<=7MSqQsNPYr-T6qA^ zsn(O1SM*&V*0FwmfrCL477J2j>eejl+_g9P0(Fmz(ZS7SG!Xv;EPcG%Y5E=A?Olzg z?A2?(Y(JAPbvt-oNzn#>$U~4KB2GuBdjXDys`lŪS^E$`^&93WK~!9tvEGFsh1 z)b$p$qg##)FgtBsmW#+dpu?(^E7-RNiKx+PG@8_Es}jTu4-L6^zQYyltaBnon@xG+ zcJn;UpN%h1Zf95j^lUPPwwedS<_X3&uBrl~_Z@nQl%@nWM{eY2qPC5L8r6O`_;|vf zJ{le0d`p2a8IzmQ+0TD&f#NbwIvqr3`al2qKm4Km{~L8d4w`dMNE0{b>EihFIU~b_ zkEVUfre8UX!pRc#T>4gzN;|+2&chDk5h_mMRPn9quf#!+9S5_f z>{9(?}IIg%@2BWlyV`rR3m+`k)xEl?Y1ur_x&QJbwGX2$GwFE6I@*AyEq`XLoftE8O=bfmNh<+!kS@#3W(w#_*` zDO85w(%_2U85 z$Pu^m!_IvutLVV;Jt!0Jg_G7#Auogx%Vq_4N*Te(TAIbJRwkUZLcVdX!I_Hf#ab1< zCm~>teB`yur-?xEjYZ61^vla6?O$<6I4mAXC9=+Fp(37AAw#55bd`YdHD9LEHN1`j zTF|%cn1A#ZFK@@Ix~{Y|gc?kFa6VOduR*U(HR};ymSh`s{o+S_I4y4?P?yVbpnM&e8A64gWWi|^lG(1@6U@NhWhq+u@t6mOs zKDEN;aB8E3$S@{n?B$s^Qt)k**|!?1E~tMgUu+sA%b{IlZtHNNnqYCcUIHD7xhFJE z$7&bl`3!fP7Ukr=_g?f{u=blG^vqWi`Vsmi%0?STXgWWc zc9A}zrV0MlB(gy2IVT@lUcMTgU?KD?F2W$1AIj5O_YZX=Y>Wo<;FkwsYYg46;~E(d z2N7?;KC+KbO~eXBlbuoTn`(HPWzjgl(rU2z>EG4n1$pC>)D12A@UA?YO@(#c!VNLJ z9*56wOOdG{obaX#EaY;su9#<2<7jLe_)A1!i&}Ke51N}f7}QvmE%kjOMbhQ zKvW+_YB^3Fy_`61i~?bRiXoEd9|hz(27}neO{5j@i9Y*T<_p_-y7y2Ct-g+jgPU!I z6t4`T*+HzV-nFa#J`7UKF&%{@8xqfNsu5A%{!TNd94T_W%=Wbca4KNZL{m$h>VS$+rV#^HR`d(GEQ=M1w^qEJEE{^IuLVJ2=^M%ifxZ{kA&o_HzBNtkzfC+t3 z_qeQC7rgXtu9-D2mpjoZI%dMbe?UI+y&H$KdYT{0&0~pC%)_MOf&@wSh}a6{p!}uI zM3Exov4r=jd?uZBFL!cI*fGR!!Bq&RhUG{uooe*NU01)k0I4gRHl|+ z8|zBUr&z=|`DBx2=R+NjUgIM7T4XE=u7f-9#7R5Ae@dmw#==snS?n)hYs zYX03_GZ9p>bFVU_3|-8Zj*TBed0mdJcO5#0Ih4S@xS`&WMK!fJjs+m>c1+c`wRnCg zb4h#0l^R8GnMW%PAq;kbz)-Bd8pfO;;zquV z(^vA(1PVq7eRrIw!$bwNtfjqk@5*5lBgeF+{-TU78vy#^NFWR5%hxF{A=KBoS~oh( zW>i2gC3}(Y>Eo)+oda;FY;VOi)6X-;u+lv(Hsm_%NrrgzKI zX^l%PU70OG?9Jd<6)Jlvc55qXQCMJj%h)qGz3%3uQXtpRU~i-~>@(lYeHwjZZjKSF z)8Q5CkfwK0_2Vs4!+YX(@(NB33Y;)7M>>SUvoIO4AUgPT8GYO%2*{wn;h8Z#W{wGL zax+9h`9|*#+884ul2Za+LWzS23F~pl!V~R#X&S>~^kOkR`DR3?OYSMV}RP9h1S$8!a~ zQD`9&F!r6FLvxvbXb_Yrx5kyv4C#>xC{Z)uNU~H+^`AdkQqTfVQ1ox&Rk>VB{6}PH z?3JB}n*?s$_?iYNwdP`deZb@J+=7~J$&-IDBulls zktFY);$fdGm9?z4aOfUxdF6+F*zMkyL4CMIed^&bM5~Gl7m{G7jlx|03>uvjq*M!s z8NZ+)Ahws&{4SAGzC#=?xV@$F2(0gvzM^xv=GS1nWpNSLbb3P&fL@X(O1Rh6~0o9D-4GXVz5C5Lzi zmTdK2)u;ePQdO#bj*BIJ_n~;wdV96?QK#aNrw##nliYc8v2Reh>UUD))l=+%X`s$m z90J)!z38hMZ^~$cZ3`JxiJ}Xb!D3Hs%rx4cPpIBRgCNq$d6ZWw!C-VPfk!$WsQA0! zJ$&~?N@7})@*BX$j&>Om2|6r;LCkw*N*TmXR!l^Jxie_CfxOU(9vP5%GCng!0M#ag z?R5@{=AA4})bhsrweK~%F2eW`AmtlgacJR_5bU___hS?iri#QICf*XZLBN8qm^1$b z>f`9ibOD+hVwGBo472+-tKnwmW=u7j$i7RtGdw}1=1LXIte^HbSc(wM#ZA?c;6p)C zv@ET#S-Imu5_Q$6{;0f0B){wf<}rVaR0Y)$pu5qv)@(Q=Bv^?bdCWW2PO>P6JEhoK zEjM5G2cm;d{(|E@6EUchvJ~nFyA2cv60)n4v(Ym`T*mb2$s-_HhYLhrwV5S{DNRuA zg0YVI3!)m{JzcB85)Z@{(U9xqjOvzdHk@ev354*1l@u+B5*^)(?M3PF?WfnFT!MMG-ApDeqK*ZfM@-UI;&t!8d zu)Aof!O|2bBrl)r6E~IjEv1ogan3L~l*LGJF5-}^j)KfQy`j`93*q>HBDCH?`79O= zv2rLd1y2yk`?(rsl>9+fv#KGx{1rx=WB)3ebAiSv!k@W`8PPZ)D>dHz;86~su46ap z={!fQbGv;qtZpJDa+}SW`!WjwYs!HkM=u!X=I?j!e25a+JAe7}?w$MZ-+Q;~wh=Ru zsTyZ#B445D;ykG#6N}GGK`=zI04(poq;m|QY*kIE+*##)MRD+$WcL7*ZjwdK+8Q?F zI6>Ta25h1c^?=AmsQ|aYPqh@Hu6H`j@TBg%&X@~obVq_PqSb;0FH;}w`fz|g^`9s- z6HSXHYFtc?gcRf=3dhK9wD#-dWSVrurK!}1VB$hf39}l-2R~O%n{lCRI^mHz%VCo1 zm`l3Ee2>${Ts#taiurc0mppJ6KQn@(j=xp^TX)MsheK{Xqh}6mmVB z{5IvbLC{4~`4wTh%8tLc-LIS*-N$lfDDrbd^k0%we?|M{0H5QTy645Tq@82yIP0ws!w5K*yZ=~|E~irbd%+52Cf^Yy?bq5go_4JJcqJA)!29}$r=c6a>v!Y zWl>IdV`MZrU55(+rGeIM${}#f~MLi+^h<( zYDJYX{sMd$JS{5AIDSiT%F|I+pwSR0L#s4t&ujfh7!@<1xzNfJ>;We>@qexIfUxv= zo!hws{G%%?Qfm(1Lc7hLh)XBL-4h_}MW(V;6nfJ!2mvcyA`gnNAWhi|F4&2JXh*)^ z%D2Hd>DohdSI&sEA>DqZ;8?v0;YZyNP`cnIH@dYNC>W6qs~KKyrZ;Eao(x{bdtcrYg zCZWXXY~5s==dx72u_cYz^#?C z18M)jiBuoDk=1|eN0g4CsWn=9p?D)-#{0d>6Jix5D55>xcr|s>Hbhh!oU0EU^FwZ& z+TE8v+yb0^xCI0Ia0}e^;bzyAv~@u>Q0Udk4LPsGskT-e6gd%oc^eKB{(Yl7iZ^u| z@tqZCz&KThQEB zP}om@{mHwd7iK4w_h_gL73i%U_o5^YsDvPC`AWhLbZ&y*`b~CBt2t&~CmzfA7dJqM zPeI+Uk49f4*+AuQa{}=Lbh@42qFG5teGc}Xc4M}b)*-9{;BZ>X#cj{yVd$c%LGPFv z9Wn_4UY)FQHS>Pk#*W9Vu`iYiIaEhK#iHG3gpQBrnf_s1sy z7)m><+%`Gtr8Gl1)@Z@ReH(I-lF^*!AW@O{QXe^PNo1u^y2Jr%z<|gTmpkFKaLO&N zW!c5gRM8BJK>0X3I|d+CUgpYm*a$}EITv?AnlTomzL`6?bp@qYn2Hu8HlieB?3+sR zaIxb`{}eu>UBKn&e2J54$KqzXBT|b8M~9dicF7pH5Kq9{UC~BepaP=eW6mbrr=pP7 zj#txSs-+-6NGhwgh{-jgT^QdXsA-jY>UrkZ=2V5Cy#F#jvz|Ys=(sVdB>)s;D4EHNYh)tQ_D~$ai`zhH3)) zZ7KI5f>09(Bp*_w*Tjz0gGr8pG7;ovEO9kja5&#gUrO6a`Q4k_Yu~5Ti{R-637IUh zB;6R+bdGh0fUm?j5_DP|Y3=txtQa%mZxO>tYgD!|gFjoPY8Pwaz~|^ZK=gjPSpg zfQWc}bCpJwKguVo-wx3!BmFA@2mm1cQWS^i#Fd!=VO0xOU;hx<7}5dq!R=Jq4~&ak zU)++{&49*Dn97$PVa~W((T&AmEBk!)bN`=t7OXR+jV1IRJUI)?uwB$Mp6T%P(D<<} zpW&{O|8UN;sCn7ctBMI_S>0mtty0hI8P8vaSc>3OI2(*N=rx>K2F#=p`bX|^Ha-VI zn#WyHi<8@%S@-|T-q|h3btT#PRbWMjElm&{f&@vi`@#lDN}_(6Y=WXR(b3^307bGy z{560Q8oKl|%uQeTYOWmNrh!Wa^=eU zi#jP`)3cT*+w|hxqAf!v%4CFQcC?E!4hI~=LXkGXdivC1!HE=EPRxS}ydx5HEXP=r z=!3_e+5qO+abT4ENkL}(;<=iNWU`nU_UicN!R2*iDNF{?xM?uXFAvdVu>^wSB%W0m zC`Dl{Efi1~qvD`hhCny^5fuxILg+q&;(llCqZoDBk#vqO^L#Sp~B1=uFu9?)q_#|g&`tOBozjZ+mdf%W}|ru>0~+UHCEO4r*}{N+c# z1v~QNQ^C=WW+fF5S0nkC*JFN<21IM3$Hz$V`J?syj|zVAx9ZcY$N6;Q$!_@Vjg8^6 zW-$KZPr4g**C{)zOFlJn!TxIXl(#oEkmuHY5qyQt* z=@yd}jM4pRSZ`^4IuS-_eX}b9ifHN3`C1eeS~*x*_i*Ps0LfVqd%$=zn65NyNURm$ zELvUp8Ye%kil3BiwiQ%|D_xkv1COMhQ!KSpgi%e$J=S~-&2SYnkG?*5yc8LCr#T3p zE>Yss{L2Uu!gb`?im(BH$o{6d{uW|Q26@CPnWxu)z%j>+ zuZ9;N2TV){DMb)Y>TtD41-KNX`bZ6^l~E`wX< zWQKbHXl5R^ zM)7y<-qT*rI8ok%#U78Fktu$4=S#e)`mU3sYmtt4>VkN-Vj{_r@YF-%bqQlK>oPIc ze7)(?t_E%aaZ%S>wt?ImH@*NcDxL-J6x$+9iP4}{BOwLD&=a+h=n$N+7qtRM_w!zP z+LQ9Mz6>WWR;r`&{%$4HU&?KXa_JAc>7(?kQUxQ4l(xiRV)3KPhGjjJn6Ttx6@@Rg zo=z|h2v0A&4W-%I7|J&&O{XHLF@ItVid@MR{;j(hmG&=tMOuje>$_Hh+c+NDs~0s+ zFKYb_v<$CbVNz@A;!ufGEgERog&>cZ?h_8trwOrq7I$;CY!XHhw}s=FPg53Y#d|Kd zewrR?Jwn*p_1v-bJTypE4oFH)2`4<^3T&%%>Qe|5|7oEW6&Rr-$#yBrz&F)=`9dMp zI=cuieF8Isz{y%y=*ghdf^jZ4^5O&r?3GvsGb|o=@5l75IXbMb+BHz^HC)ExZ?b3u~GjGIp{8KafvylN?? z;Y-~KPm^?FOCV@hkSeV+1R$=X+6yLw`k_7&0n>y5&0@O-^F?^91pZBapKiZ8TkVdD z);EFF^P05*LQ8=sp-6sub;XqFj?SFHG)+kqqyOYiac~`{iV$!7S=%n?f#A}b9@i68 z7cg&5JC_#1Y7VcUKbUc|OxQz`!G0@`J+q>H zCqNG6zVER={SGaRkAmblQo()wIYOJfU5%@L5rNMsJ6m9 z8|Mg=UTl~=t))Cb-xYd5DQz4xRWwTe)$WbDyhe~@=@XSGm3)*l66H!Rb%QY5?rtkl z^d}U@XyJjMh6PfG3xYE!jTc7{tEy7)f->X5=zT+vb;`-lmLON46EqS!&LB9 z6^G0-ee(DeyUf-1T8H%$%uH7N$xc};MX7U!mz|yXsLxD^Uv5Sr>)MMdCbVO${E^=5ljplX5=PTN>XQxquc4mCWs26BnHB8F z5I%bhEJ6x*!p}c9OLiCbmW1n7*)V)_sn&oOC04ZTkTMW#1^6>5+=m7g(0fK6)zsBfVYY6*4B;=9|Ys@y;ar7ZHD}3a}RWNBCi;u>g^T zHlVcj55{HDpf(f{rYK^&~3io1ujY~F4zIPtfM4F zURQM=@`CI-Fp*AIXn*lxLV59bNa{qQM1Ql!Oj0RRbVJ@>QsGJ_mlJPthB*cOT(Rsz zB$*m<__Omypp)!z>;jt;g>ko9QM$t4tqu6}FEpU??A8K6glRNCYZJspIHi&fz>}U{ zUVwBcS1dbAON!L&w#viwkOQE7?QM_ zb|)HG6buFhj?^3{Nk@+gVo?KtZ6H@VQ7Q!}Qj$!&VDVcUdth%=M$`T$HX;q6_3k=~ zY9Lfqttt{Ii6O#VHZ4HJhp0uj2Fv{=rZ@DlR=YpwhweO}8|+J~GWpGsl9-r}NILmq zaakdYU; zqwL+GC0b9s-&XsHhrivJ3c{O$?v7;PDy?pNwPLm)YU@iux9_Y++qUlvNdK`CYrUQA z5gozpJ3~dj@uDL?xPtdp7fI^~Dd_;9O2HsF1i|DHn@Sh+#twxJBvL=!d$RLc6A@OJ zXEGixc{z_Imzu(k0*8C*soZ6Cil^|5zS;WP6Ll{-qD~by#UOD{BjdSd)gZYtJ##L> zB}#GgR-Ha9HRh52xmk;p$~#>Thdi_WGp)`EQ!JuRM+XMmqM*-+0bydu=S0VE8NW#0 zC^d5y{bo9!ipZkM-Gj7Kq=a`U)1@wI(xS$en@6wYSHxIZ2wMa-T>v4cqXCH$v8&}j zj4B!RYF?AAzs1>#L+`H#_0G}NnN9@~;=n!Nzy96E4(rPNUzH-!FC-lkxq_Z(CC5>gsCK>P^rp)jw}@{{D9T z_idb@$nTD@sZ}8mos~2PWiyA6k!QCw4f9mhuJx(61rg@_;?&&n)|Pf*(tr)sdn<7c zbUfK=bVbRpnILBUB!_h@4CY>Vu1ukmYseOo%mIxm>!e1P{r7Fm?>u^VoAdQsXsawU zE(z`^9fF3`&$e9n#D~6x4$OX}2=s~HXqYjfWW|_0 z9;|j!Y1P=5#%%IP1iGqV(3w|7+{#T6KB^0_yUA)d1QoTfJPKCK-W+cU!=WT%LO4}? z57*Qkblh-3xF!EV=AyK2k|(5sXB}2&n0=lz{mRqEKuoMTzg{UX4PL-IMj8U5nr}%4Y?N$&pErVC?QRcwYisM) z9j+zsO-ngJLUE6Tf((|Ob$dE5JNDzULTc1Q*`LVHuA)zVSLI#=fu&IOh;A$lOlUMD ztyzAgYUD2dOzQq-iFP@@z1E|*XjQ|S$F*;6-R&wQLBYqcf1 zK%i}(vfWA7e)9-tx1SoHyG6O*dNarX%q}9Wbf`lv;SJMvoOlDfrARN?CBdKo0ZWx- zdj~O$g|7~-!E-Sps+kdHozQeKH5YN#3@->J>3`CR6c(zzmrnfKQ-%J8$xSRN0xy=3 z8>v3XX-epc%0u;hjcSw%*j!eR&JCHrQ0`-@uvOTy>c05tW2f!7^rN0E%|o4Rx5Hb1 zeeca3S@qqaJGs_4vi&)VYrBQ4taj9*5@ho^Jm7?fjLqYPtT7CzSEy4&6q2;`aZFV_ zmYC5gQ5OmZ#jCe3|J~SLRS*IAN_H(1r>-IgI z1H#G-93DIGkeB~wgL|vas|iv4Yq7msW%aqzQ!ca7QgVC!z@_rS;_lW>{-`iBUdB$t z4Q_~imE~@RwfrkMT-EcIXW#9KC4=O2MAARJ?^QdJN2T;Wf=-%|Z^t9m3bhvCJ9)PB zbA_lfkGoRM?|Hzw?_P>tsz=!?1zzotgm0+-dbOdzP+`cezLta;<#RNlOx&(sQEFM{_j>lt^3Ro zjywgaZ$y=kf86?MdDFj|ossv}9haXd*HF0!=r9UV?{^!2ZlkDQBcX0ZPe7uhk?BE!v=%CVwra^ak(@%RkV&wHcwohO!23at>=~;!Tr< zx?~_17Nt}b-^85{BaUJ0i1#@OOAF8&WmUQ3p)5|n$P%0t5b6^{*%feM%XZd18?E1@ zSK{nK-ZB=V?=Ck`|ePal=~wW#z+H|?Ym>&8@Xui zj$AZ%S1uX{S!tjDMlX}#wm2`BwUDBlgc49muNc2tI@6UZZ7|rxk%bBg*A2M(k|-zw zlY^--huMFAduh|UtX=p=*^U}>?YS`~M}WMPRS`M03qhoQT&1EBG-rg;Y7-BQA1Pdo zBF_Lq;{Ft=K1wvxAZOa~B4nAd+rRr0C}g|6FbvJCbGMn3F~3$Z-U^fxDyp=^ov9oy z?xdZUFLoYtrGyGyxxa+y5-!zxEEOr6)S^TT;5f<8zKd+)5kM|d7F3uNZUUD##pMb% zc^d)FfqM>zcD8#tHxABc)9|-(losp@^O>4J-L#Hgya9ERGWz|O&kMvk9K^g*0|TlrL)yNz z;qIIVTpKw~27{o}0UAU}O#u%i5;-}OtV*t(eEA?7MO}uc zhw-6jFE)0f{IF!eQs4)-g zK$13Ul{XcpXm4Pd90rzkk;(9^)W#wk?2=MR6k41#^~T&Y$da9DX*jU`FO!P)N79#w zm%Tycta@zSnVaN75o#w?DzC+lviB5q=;s@(#@ci75%J}nxb0u4jg(|^LaNM~14anD z*$P6cX)+;$R`&S9I)Qa&6L7Li+9@WZ$YKMU3MC%XQw!J~@1xs2jzrgslZ`}@cSlh2 zdjl@Uod+X7c5m!&Lpr|qJ+P$hmRQX_RX@KPs@>#nxP7xRO_g1-EOi>1ca`?;L3$JvB46T0k3PNf1fV60ZaC08{h)$!wa|q~DHKgattS%g4@5MVr9|1X0S6SPN6%!z zYg^m`Kx8Z(LT_pgO6?hgHI3qP{#Ixg_S!dhEqIlXS|r6dQ>)O9y<>rI{R+2uYIKF4 z({PV|s#8g%)X6UdV$rRX>U4$3npLk;ytw>*bwrfKvqqx6OK||+r1T|<;3x~6w~qgs z(yR4{6_4Kk((Je^-Pbs1@rz4RE;voRG_0ZH*+H}_sZuglel0hYejjtD6%86WoA4h_ z=db3lVN=}13}nSkGwHe0f$SC@J@GaV7aC0U>}10-M13(i69C?{gI zFbDChppHooUmh^3$QL&Yed!kG(QDr`>n8x`!IDgbO!k$gs}u5x%s=B}i;*2?MHX+6&4_Co(w?1d3AEP zmHIk;b{TvOp(FKdc<n46`~9LcE!75^03;XV2z@atUon1QP1RNMnRry_$JZ zlHs_+;1FKP@dt>}WjVYixSmm+naCTED~O+zIrqEfO{>$O@$w?^Iyahg$u9sa6_dW} zLnkcb-(bU2<667NqfmnP9AYqenz}#~wa`iB5-Y`y^jY`_rkd}j5hrJ$w)4)a_-o_4 z-5aDzXh18!^o(cof41+fmV1`Jj5vVXLl{$>=jGQa5856=nBsh|{mOu67@hS-@SyDx z&v1LiGc2{Oh1c==+2f}{j>)=XGuzYItL`6H6PX-W>^(s+=)i?*$_ut8_i|S9iq{DW z-n8A9=+IL7_NeDkFnvOR-xsvo%yQ={Xn^7CuMyp01~QAlAwSivP3{^ZJK%@;o#Uc; z*bbf890@;EzPzX`nf=$mCCJ$EPCXBP!5h%uOj$C)r@1pOMvAHu;WD-7kko5Ye$8Sh z_(dl;u_mZBHPGtX$+|VJxu-06?Yg<20H&ZA{Iv=^)OZR@1!3M2Xe-MCwO;47uInI< z!qmVkg$5`#Tm>J(vrO-4&1Crw7ffNEz>KR~#be5BNcui{$LpUE?g$*{^&wY8imr>3 z9z_UT0#mC|gk15Ic24A~cJgF=}4bNs`lF@awEj2k4SQUiIq6_$d8_>}9G z1ZC)B>tt2S9xheJ*>*|qROeKb07(i|aYlsR}Kd$f! zD}dkjLf!HutgwOs6!|ARFJ8e6ymzO=L{g{m$pn{cyYTD3XRyXazL>(&-Iqre!g z9A2IBqQp)~Y6^U0KQ?=4zqxnoK3|NL2wIE@8OlXUi;KgkMp?sz7$3o0&lr#(7_%@T z+LjK#Ny)Id@Vje30k{?Pv#hFENaE;erNJaeK!k4&Q~spZJUE-Wsk363Pg%OD8md?l zpf5ZGt2@`Z#Z|@zHM><~I1MyDJ7l%W%=1vlU=&PS6zo{Sl5@IcsC~|x*TyA*k^3|jWDV2Y{amNPA)E_;`0rSZDMZH_jBVTae@LAM9U~{d%{hKWj zD1+Iww%Ehsij?qK)UB!w z(DgeKD~oBUBay`_l0?x7tt-uC4aHkNbaRYU^u$!MJ`@(mDTcm**LNPTsK%9fE6IA0 zQH&^ER7O`0t$pua9JY_KitxFrjWD_P1p7Q&z4X-S#O5(?oTbgxU;$lk5b3nD8q4+y zlkWE_x}@1mrjKyt&r{w4Hz$1L*q93utbDgcYV6miQ&`8`7v6d0@;IQ)PbXlhBBqi% zwAIbliE;iPu=tA`XFc<1VWA60xC>M{jNR3#j^B*fyfJn`$V^bBdn;qc*lTB}hmH84GHZ4>xG)uqTI!>biPToB~LE(zwUpS1&HZw*r^&-@|eY zS%G#WZdYbo?|SPp?9Qhm$^@_SB>7|;tC7qt^iFf)jVsw{mgbNt*D_Hu)#=Nx*14qf zCo2;1=kj=^Q%a$Eg^4R-Fz$;p%f44!IvdrWRnekOpq^SLtV&V0$&tQ{j6g6tC0OZ= zKa=FX3`3gzB(RorNO{a>E?t-PW-9gn1fxYIFQI|lGxm$Rb~YOkS| zkf%LEK!MQ>c>KsV?YgCnj5;c=21Q;W`y-MRu!s9s(=;%{i${c4Us`mmO|cA#_iFSi z#A&%r%MA#}i|j(-EO$=}O^EUhZ3_KpP$~d+CH|0#Dh&WnI1n*{qS&GNWHE_yBjQ)B zPo`W3vN@nHp((fb3i~0c<1Dx**E(%61*ntCjgPEWQV`Oz)lwLsF zR-_e=oFFVA$2c(D<cH7N;wuu`Y3JcC4Y8BR-s2Dw8FBE4%v(&Z~G$ z$X}q{qUyhmFXzZvsf$lk<-&PX+lD$rGLas$n53KN{C1PXwaZj-ICN=fm$u2$Or_OA zCZA2slIxi}M{g!7+yg$11Y>EEzPK=Qd?STguRl*gZkeLA*B>9&>giufv&FavHM%sh zRks;y^$v_if%4+vi^>H!d&Adh@1!#yVVBEZWmpz5DErL`A1JfVVpx&fH*^{(K|{)6 zW}v7uNKm#x=HT83#}s%EL`B4t%=%iFhfpCX13IC7fEJ@)Jf=}=&S{LQ95za;#>g9_ zU2m1ET8zIcuLOT9Qy^M=O^W%X>$YF0iv8dW(ubvg90`o)lGYS2$WO>gvUt+zzKJI| zBzRKfnylGTV6>m5A7yIt2x&7IlQ%GJ*GC`sM_B*&M{w=?D{%qJ0N^@kiwN7H6WZx7 z+&z<0wx~kpH}qlC;9# z-qNxIyypZJA$~o#IcXE?iMpbS`rOki^A@K#hId8s_u z!-^vn7lfWpy4+BNAKKnVpk)1*ilTj^-RPDJ6t(1eh+P@1QPL}c_d0Jvl$8AOozK(7M{gG9 zP1JP72BnRj{?QF=pYVjFwZD>nTLq(`wS1B+wz?N9TrrK=pkqVJF2 zY~9zqwO{f6S8JHI?to>u{4{za098|kx*vGVK_r^fGh}31A@e*8^lIkoTIQ}*$2iAS;zx{w6yX8`1dL{1IGKz)%wW~_7edH+ zptXKyd5h7Z+GG69-TOVvCh{bA&`+mCh2Cmb=~VuD;V{Gn9y1WvJYMnSdUO980RZNC z0*)TrvsIFonYf9cbh7c?=8LC$J2it{^S!FyL-Al8O9;+uYR2eOT87G9aO>QX1(zpK zSFx@=sMp}ud{KmwtJZt+jK%Uei4#wQgH&J-EthP?`ndM8lWBj7oWS)NUeVt_4w;Lr zLd3+CGDI<`6guyoqbDcuabrnASrDB*(3MLthBOa4DmWbG#<(w-iUZY4B>R9ChhgZf zx;Bsrq#x1Dz0n)-1BWszu-ib_*Ke$pOq2?Tu}gQYM9T=F@&1q`^WE`Yu-o^CQup`8 zkQo6H?~j0p_g6r~UwwjKeFCnYUwwjKeFD&;UwwjKeS&|BPw@Y{OR!oA+4yx2*0*Wh zUM+w454~?|_4j{xFy491E^tb+oJA=mXmy5%DW@-ymcj#%EUjWgf<^Hv3q}?2k|Vs7 zzseX|u%}rr<3apuM9rL{T*%-{=8a6CIwCwLoNwW>`1iomu(cRVOEeV#zvuKx?oR4y z!Vj6|eGn87(dof^YZDc|fH^Nkg&r1^0$0cE0ydV=-r@m=jv0X=NaE7qm1ZImE{zAP z(;UPZh&ov)P<&^CY<0>LW>ImBX*6;qf^tz&ZID^m@S)z(yX*nnTjh*DGooM>gh(MEZDBm?@tKs+2sMzwfb6Z(jvA!_yH6-=_4k53cw)Tz*E7vsA}MBABl z(UK2lsqL(4GX|KISvx0d&)n#(9rn-9v@?x4OUb$Faz|Z7sPR>k2Dil@>I7y~C`WYu zGTvnA4@BiJ+cWDQA(EIFLRnL^dC(CEp`Qw2Sa$aOdboD*!MHHMgOQN>!3d81V4!lZ zjCDO~{$QYVk5yi-0G+PL&LLB*$mumIRH1Me^t!}Fv$c86$S$eD zMZzPMn6&RAANdnWwyytH$0V^@;4sG1i@MNpRod-$?`%Edj+9bodlfwb9e4E;wU+wE z-Z9E_mSh(+eO7q@CGVsDVP>jofJzgTqM(MoMMY~T_c+>Do^|gIyG>@U(p2mYz_a>qI5Bbvim0@ z`-;qvnb+DBRr$}>JDum4$f$ud{w26$Cn~tIJE#-|)#MAY4HjEjn02JphD15Jg2NK? z)0mG-4_Ci$^?Uf)T5WD}s%RKRLLMY{ zFRs_QbT{o#YT~l-bf0z*wq3KEXLA?gPSlPsS47|9pm3+NO_}y6X_``-*ETK$5-ugt zl;*)z&b84TgltR>XUeBYh7n2M(m_$mUB{lM#fDEEv6(} zRMXfr&zxFUO;X3WG$kzzFhvC8f>R6Ir2^T-fpb1lUSV$;;({uicAK?4P4&Q6{iSi; zK;g~X~C%U{3zi-nwR=A=>)8Ca^a2C)tH|Yq3R%ibjp<4A@zjIJiAD>CQ)4R zTnL*dT0mW2V=8?j7-s`XvRRq-_yFa;@jz638;OqddqrftC)L-1m$nS;#Hg5ufV8{G zeN^z@-%jQ#%;-#<|KfHk3XZa|ksHhS)QAQ`Z`Z=j)Hh3cyjy2@(tp4E*q7y+%MfR( zI!_jD$F+jfHdUAOD3A3LRU;qVu}j2JNl}IYjuY$@eQP>Z?f__k(JM8KYG`IgUcK;l zqsK!8SA+%=dJ`}ki%*Qdx{TTOTN>nS701>}$(DZy-<3{&aQKiAreTaOpG}qL`Zf$( zLQDev?z*Ym%L2-5mODyE+ynM2QiPBqoQ%tFOJC+p)R$Ek6C-d1>>?&nviV#ys;+la z99bFI42UI!4V36^xyVWWXHgDg7`Tlvep8{kYnITg*CPZFT(l_jR)mzI@;3@r6z`#f z!-vZ;yrsANN}Eo-VsH?`s}4aw_JzxzZtHdcT%g`Z*?P^A-$(ZaM5lK(yB(2uR#nB) zy6nSIpa{(7LGZ|r5=TZGzq-b{hZcN?Qq3ndZS~x709z_^dRN33neX;2`=!~G%JBV# z()dr8T`d?}I$GR$^Aoi@bCr2LFbfuLSchlFW+EFKX!gF?eJ1yu`fG=VG0b3B7JV2A z-Kd%ILD$Jx^Z?clJD?vaeX0~w9}X`k-sIUqSU443E`CQWV3gA6~RP8Mc1c@a(}8pinazPY~kWPR5{gU=q`sT zTkP2&Bb`D;@1z_ujSV!>|JUhmYj{oKk7u*#7j_)IpYUelJ^GDhmeDOupF3hRV(Cj; z``rIKR|qFAfKUEI*c?+sOI?&>j_Z%ZYWIMFicTW} zj#45+*DAo@RhUz8ww5lR^ao8*Haqjra|CaM3n~zZ+erQH;wqJm61{3QlJmyPdrFgE zU{%;|V36%PcU38Oj6!fDg?35UF7BbpU#0J*lPR*Tl!H%b)xX{tFwly zR|wM@r}w0IyJqbtug$71r!ryN4pz9v{z{1tH+wMcrA*Rw(cWJ&_n-5p8SlR_thV#|{;( zX`lGgca-!U9Ma7l?B2ipuZhp5a04mayi?CDR^{!DaP6t~ut4j=a1Z zavA&q&m}aumy|D*Vai}LXn7`>dQK*npfs-dw^{454 zi4O!FKD&{|EiVoO#o^Bge8KB$<029ef=mugEkE$L30X_+pJH&u?&=Rx(s~xQ@K&Oa znH;9<6yZutHdr>%p%5rV0IfV=blMiWZToaWE>4+K%a1aGcpV_+&oSDYjlcV2rwPy3_V*&^}1g;r)gDGtx6s`jm{mH#ext;EXO79-u z?FKrqbPJ2t0{gmrgV$@dY|a#GVST2<=d<5ZjOLZJ^F;8Y$#irh6hSX>j={o2#eYlPJ$ZB7R;Oef1%Wv`eE##)6nD=kp-kYVRFq`>KVB*ls8Q`r@^ zr2N^R-R&u>w^G-(RzR~k$`S*yM2Feq+2JNz_YPC2scT!sNqedr?FF&kobqV*qqKeT zim?*4zP#qP)nhuj5D)DJ&e5E{^Ud5ik8p zVJk`)I4Y*VOR|w|V=9N{22+J5J&tUOVffU3FGM~Lpf-p11%(vHIByW0&;uv;8CuhLCz3+IDjQE-uJJrK&h zlqRNHu4>AiQB9hGt4H!!R-d4WN~%(qxgk4LaELl%#E|xodi^{Ql&iG&ewi@s&b3kN z$(qIW;s)n=O2~4STq|Noy(QKeihQS88Ew|Hi*z+d`%_fMb+*iKQD4LI%Ud3&vl==G zp%}%dnT&{7xT*AKH*xoGScAT3*F0Ojn0~76IJHo8fpaMewuN5|FO$XN3@`K zXn%d}Y7vkzihmG>iecy(4)=<5Sy8p!S)XCSx2J>DP0v0VP`3SU?pVzMoF6plzu> zs-L_ie#)$+kLM@;0)g<1`a^m8Wh))?J7U(=Ygccljs$ib#QTy}iPa2C5^*H~!vT1) z-N3B=xjth{V;jQWnCivhMo9tg2+`OD+F)m@9^~o00I5WUFAgSvG7Iw}*P}L9FYdb< z!AcmymsKKGF4V2H$O+)lJ#UEuS z5AeI)V+R3Tm?euC;+I5oX>z-n=ag@g=ly@!)OJzS*~MCg1;B2ZDW#QcLfQ zrJQ>$zG^uuhqYeqFtQ-a^a;6)MJ@M%@;I&_RbEbRhZ}Adw8lJ&hvA=KseCd{FHCaD+kjaD_ouSyIY4ApI?W$PgXykJinb4<8wq`;uLPv}8&M z6MOyWbYMtN*9Ma8Vz!>>R@j<1Vkc{N_EMNF0UdAEX9^30ur#LEmMv7O46AM zZCMkcm__zd_3b}$Tb@tmhu|fOTM6e7byQASv?DT{%hRVmtCxJRh(eMfk<%jS%O63k zP7YO`tF55$<~>vyZbXJ+6j=JIR2w>6bY&;-?t3wOz$_hLt3uF#F1C~1dOnpn@S60d z`i)фs$Am-(|JXgPLW}-ZoRZTUZeCkG{aGTUQ!^oAIX1JJ~X3H!(+WE04E^lf{93kP4EoufkY(AwyCS$_5r5ox0Rldw zpBf+=E5??!lfq^bOZcDv=@FH>sfJjtS^oW2K@u6t_qR8G4E}-%#5R>c!y*=uT|Fd) z!9C+_fHtXtz$T;Fq$^xAjaoJQd)8raUWHT>L~-}Cb#3c(YdHnusq>+(M==hztX_o8 z z#t;`_tk#JTVwOfh%MrEAIzPlK>*Q~9D`n_#F(;FCU_P98vDo0omt^m<5FmC2Dw%8+ zMN}g4=<+aC&){)5O3$?IQF~5!O4~j%Lgo=D+2bBVsK3f^r%5X(Gi+;^R(X23QL;qN zz=<)&ul}g-d_89m;WXY`**fbLD?ux45K<~A;$nWLh*w65elmL%;gvt=G6g%7vDO5K zfLv1dN-Cx0rYgT39@+~r@>aR++oqY*O|KNitoaBMm#x!$`OLE??(gA-_k5rju7z&* zcX{@c7-yg;jC-eRiBO8!gAqnMRNCQz8lYXRw1W}AY>)c^1?ce+(e>fxk)vQrtvAMW zjdbbJ6pZ;oBZ`m@2aDJBgCioB4@Z&~4@Z&~4@XMTAC4%=e?BN%=~-HzS^0b=anbYS zMLvDQxwjoJg;NHV00$E8!FAfFgFMDh33=%XV5;Uvmoql#HD;r zgcvK@a>hBnaHR+~XvQ)PDPYCg!oCI)a6#IxG7Si3n$;rgxy9S5$lZiyWG*%lVOLmp zLi*ti%pSBZtn46jq7kj9>*4yaz4j4qM8G=QbBn<$_OA*f6mBa@KQI-m{$}dZF?I9k zY5xPW@=ClHVI?r{Q6Jg7Jl)JW>gOxx37{fJs@qTkcF@Tb$no`=euJq2O2A}r`QG06 zlB+yn>|<#ohW9731mDJ-ur@OWYxXS!jx&>!$j{;l$!8#nRJRn>V}Xelr-wV+lwHjb zk5p2x{Hc4NXyW1cQxYPWF@PR5H4k3+#@+k3)KQlGVy`b=IpJmR21o4%S=FyaO-V}$ zh4BRum$bx78;J>0r$0)&hDZ-P@-^6gk^1gX^>?_1Q+WOranm^M zcy+s;&HUwL_7iu*Q|06p)_PWTec*FwM_||Nc@P|C<TCJ}Y;mic&Ga0@-|=Rv#ZJAo6Rgk(WSBQJ|6h~OgUS^5t3k_8b_xYII&!>W{1JEdQ8qu zcO4}umul0Cs5-NR-D~6L*{QV?0w(D40F|Mq`o3tCOcYAqy z%~pG*k-ntWqo%I>07v`?Aa`M&e0JBqf4|taA31?}yT7bN z2rOh$)Px6&rCkIa0y1m`X7Re}$r2v~mY`CIovQg=$cg3uQ+jBy6)H^_fTHkh?aCzDjSA3>N zIB+B@&}mMYq%V90758hX1~K1f#77wMnm!+BPMq&J@`EF;)|jOD=OZ4~YBQhe$n2;E zR6^!Ig{flK8P}p@a;@={0hjyirIq0hrKB}Q5w-7<88mc zy?49ve%2b~7f-&Z2Pt}F-F>*VDN?vP$^%x}5L7z9-$|CixTZjoY(%p%Yo)|P&3dRa zn*z3f{bb{{LjGGDFE^jRo1G30igOS-Dl?YmK}kzZOw|1qCddR`!vfu%z+*j*=J%QZ`90e@mo9-rbbZeAa*mBj-&hh+ln(; z3_EjI9uk?v$Po(8%ksUf-`BL7LkzP1@{~3*myXg#Rn&qQ+CSjN|jS?5rg z|N4T#>$KA#kwv@-PQ465E}0n+ZQP#H)2OKpaMRk1)r&NMr%GA-FYZ@ZO=o169 zHB&s=|B*I1;3ZWIa=}@kfwiHKr+!Ae>xT@A&V6?Y+KQwRA<-PshbCtF7Y3=N**`jU z1Sufdc0@OviTA`4IPX0IsI6Sxws4iuYYaE(MRufKaFW7R06WSMLih5&*A1f4rEsBL z#tp@%2}A~Jq`yjIQg5{+@c*OiOjS3<)$@DHUVa<&PD~*I zw%*Ui>e;K;9c>1){`uLlK_EaepHm?-a#64_bS8*)YrKmHj}d0^Sb;|3XGToqNVS_a ze4$-petJJk9eY+>A_JyR;}=_I1GOH6P45(4<(?S!|FPtW(SamQY$sLX88(!^1* zTXTvlb=%9X@2TU|`4N8B+B zTA0aQ&OmA!s3J?b=#BsO`0-bN@JZ3*C!r-BrMH^R4?SkEVwZ3wj_Ida*7~15tE%Rp zS1GZr++}nh7Er}dsnk-EJu^6x$IV76Y>x{9m@_%r94<3iBV%gnxfa3xjo!r7fW`lN zc>jGXQCbt>C{x6oM`}BiRH8Fo=H%Pn9)>5?23(%~|6%Xkmg73I^!zGihV7;z8YDpy zI&{y-0fEOBDY6MliiwVnjsj2sO2Vm8C{fhayuj+mBv=LNg;T>ovgeBm!OfXofRO zwjff51WR;CMLObJ-8!j*zy9}sa)!v{QW%dvWZ6~f`_+r*qn(}KKhaU+%gEMnz5d95 zUAYiq%m9KfF_U>sAoaZpmF2S?G1k35y`&dDJX39wc~_E}>gxPA#g+sEmTq_|)xI!t zFNF0dA&mMn{f$b0<;P`fqJAgPBogRS)%0=RjDjsY70C@-qq7`@cq}CdGEcT+#!Ul| zrEW$kTz^qy+@i2Qy;@Je(bPG`S(5H!g>WoDeu`RAXq%*k!RAw0y%2Je=q0u0Txe#| zd-Z{_0BBbviZROu4I~(;_Qr0nw+#W*Z$ zaVbEM&Vj9fs!yRM;rEp4mUIu#w!jIRg%MRDF&gy+=K*Bz!aha)xSbJ`p$xv$K(*)# z3cAS*VdYTqA5k{0>~v4}t&35aoaE$?$9L72L>S~E0URALSD<(!m43?^i?En-BV?jt zuv*TJP~XwQhXtrmH-@e|8ez!b0}|klM;j74YU9CJECQj zi*H^@xxQaoOE+Lq9?Rz(1pMk)y=)P0$glIbJ;|luviA0c=_}Hi%qTI})n4Z#I&6tV zj5WEhQgJU>&&vB_z+W74BoRkDFJ8TRxbynyH#spRO{6_WWwc%X=*?Y;ed-UL5ygwK zLDKy;IhE)qHatf9WXBAmE-4_!s4uR0y&g`grjDG@d+f|awoXebOYeCS!ATC3#?n0u zl%qUYE>e9-Ag=|NGqHxtWjG0ekFrsfx9?uRSsmO67b%z}NE8zLC#1CDYc$>ncwKrR zTnO@?{TJ80lL7qU- z7)PucRZbAXHIU~X3RT{)@1z}_+~wr;>{S#K(dj^^wh)o5O0}fx19 zffITI2UZ!?q}=P8q^ONx0#b+##7?YiTt#+{S6i~4z7(CmBLDZx1}Z8sRZKS`4C057 z_CnEH@mXZ09x1|az*mt5Tb`E##{Bbe28p#Le)f|kQvANQdL-(hLo!cj8|!X*OIX^*qTgIU=DR;Do46b z=sefv{X4Z=tDwo%!)B^#?d6c;B}odW_^6mMIIO@>*CVKFNR@D=h=dlNJ`8f+|1S~`K$`dWXvc*T-QDN=cx_zc3s z^(Az}=?jd;2ITe zc3(~cgj?iB$duAHr16+^)8krB$7YY+o*&7XK)Pr%EOVVOINq0XC2-KRI*WYiRZ5Vb zL5LJQINupT>ecl7WYIFu6#x2UN;Oxr?nEp{*N6ift5oGyl7WyE#8-u1X!l(G4H9PI zf_fc5kN)z%u_j@W9`hDHOzGm1qj(>r@uFf_n2lBTz&?n!WqAXKcN&kc`#dKXGtdbM zjXZ6KS+;l}CZ5*mun)kuAd|`u`Km}H;tW+P+JbsJ1Lw);q4AYAZg-8_b%<@q3?lFh zu@Ye$5g~dtu~d?9IJhzCfdyEt;(DvIjEBVVq>#<-Qkbu3q`V zW=Xf^q;6eNng-RloU_;CLFL{rH%xW|9R;L-rAlo>R!a+gXndM-2y(g3EHpeOIya3ab?c{Yc_7f8dp4QsSOdmwWQz!>`s~O~G?UR*%~NU*;gtI?DxDb08NJskAkkdt!=-=99m&JFT{n@H zXBOD2(FID2$P9Q2Lk)7(+y?$DyH_FsQIvWqw&u+BZmr8q9BeFJ4jdJrPRn>eHMfic zjxQ-&{HY+nN~s9KDZ|8nA?yerVD(nJ$V9)KY-)%@294S*X-IEn2xR@P_#|b6OWdmt zHRp4>_d^U>U5+?#zFpm|D0fw%M9JEF#VUGE+dGLz+^MBpfzjRpA*bm;aOG;eq>k&Q z@(I;X!pAm_f~2#@^~j?JE~k8jtlDIyC8^s8%KXRD4_bTkX%v5?1Gwx9+U_+0bysFwrYP1zUGkC!)9R48b8{Z&yEXv&m3z+njRM zIPdBD8o*i%C+aApo zGlu%el!yWy3XA9y`M=qsFB8om3cA?=<}2hf(ed-bpM3MHSI<8J#rW#EH%hR*ugn#SMq9M-h0nW4$&zM-xGIy2H+J8sw@F zolX`p0-cCW7@p9&CL3tj9#am=P00#2nc@^c#dl;Jgh(lFuDW9+qxE)G8`|qQ@|DnK zOcj+$*F`HEA|a{}v*eIPE5T0EUnk+`C$ibIrKHKS3Y$Gv&5;(=xs4agAjxb_UuYBkHC95Yh`im(?#`1Lr8Xd$&F|fspSUI-f?tb_QIN+tVn%5|*T+ zicitdiSf-T&KVO+5iZPQX#CL6Y2C& zUVh%Q9 zI%8^;)E!-3b{P(ZR;)EKAty>|110Z*K)@!$r(jH4OfE>Da={YHO^o_FeslDd^kX%- z0Leq2N0jrTE-*&ftG{qo6~x+jnANrEHKvfc0sYy5T*}-o*@3+|bn0H4`ul6*$3|{3 zvb6@M34SWVh2!(Ry;5l@Xkv~$DpgB_X~hp!6k*gHV$+R-(;^D*75~``>OqsQ=jV{P zO1T?eKuwz^cB@M9`ut6lK}L_2(27>Im^YH?HrEIa=o&E#Z7-wq3IIQqp=5WYD z7Zd@Jx+_a*`4GUbh=fo+y|iOJx!(Zu6D&g$Z;JOYKCseqk2k;gc8~5w6|cn4LwF;+ zPJL>D1iDb`Xg1^KQdxYNovM~McdK>J(Z6NBbt!QpnYKpMnjSnuHh!y{bHX`tyXl{(r2O^5cyZ^R!7fpJ5XtQ#de?&Lp_!;Oyu>+KQ?o05a6pm#XY#RbE~Dd>}W z)$It>=s{4jN!Z|q#wjNoWPZG^GSGWpy&0ZbXlN-z%_be60gPM| zHbpT*RFgz&BccuGzuk4*e@Pj$2-TMyoe(G?4>}!oG{?pTD%HZohwKr{^xb3?yXx%A zNQlT|>OilVl`j%#qrty%*4@fMhhu4_94u5~3Y6ra9HR6g!O*g>e%eo53sq+g*h282 zq;MTJogibdLVUtF6fElK<_?o6u;yZ3C4uNK{*~GVz|T8t8&w}u-Gr8MDBfRO9CZv@ z<}^EKK$rS(2u5tL97(-j?)C3FkTi-?e=f*fH;reQlrqcrdGi-O;FE4Wg-Z0{ zX#R+cn6%`W@>EUEd449aVCK8jMhldgP+br$)2C9N_Fio%`I{)gAIsCuC$=J zb16OcbcswXb2vSs;*6&>b23DUmbya`z?2O-9o?Lw>iuP#pYmx+N>xclSt7^(=YMr6 zWqn?`_tb3`fbpWT^?Arw3@fPZzA+oah=wiMJHNaUC9vM{D8nQ@FM>uP+|IsZg1hA_ zUb8G!Ps%uknVTln8L{}x)1>gxj?*s37(@?#$nsou+sNr6NCtVa?%#?4H zkjN~(SMU5IvEukg1kp9Oh&ZA2aI5W@sxScnrc zdz`I3lUOo~-M-TCjc=tly)C>}PA(`@OH7Ag=4EfOvM`t5YyOKS(j385oGg6?^fJ^9 ze-YAY+DP?9A@3T$S=@~bE}~8itBmGx@{7mgp9thOW^?WeQ$55yj+CjpO-%X!GZQb0uyQao^cTGFP z-8D6ayQ|sLw(d4HhK1J6sHv38)UlVAob?}EF{0ncWiB~HI)zGqA0|O*VKHf_Iw>*! zlANuE9sP@BH^^}krO`6vV149SbhK)s)+5wJ<@6vA;@V25+Wcn%=`ZuE9gSfvP!y-r z=}r^nxU{ff09D-Ns6@T*B~O4gh!)T?(-SGc9W0c@d`{(2;<>#-WTw$wNd2i~)JWkd zB`rw;#~O%*C>NIZz>T3HdF5BMdB~iRK##ftSX0kGSlU6rAcM9}~FV2&UIDi1a z?N&TQ8f@Y`c#pA;KLA(2#tS*YS@rk&>s=*CoH4YA>sHnJ{4uvhdn}f3fD}3GjYz`CJ3C|_)n_c}@ON{0Ny1f(&YS&}^2v45`sV0I`ogH&1PWhOk4i zGt`=`_Kp9*&JE&g@Z7Z3m9hA6&h%)GM0UEjYsDHJ3Z$XdlqHF=_n!l4+3Mars-$sG zLajXrUP!ct2ql&#Om1oD^=>GB;Y3}V(IBzz^!Se@WD#h_!9Yyd!WrCl>9k9B`R*kQ0BoFju1%o_l-8L!bW!Qc=pwo{(0(! zd_cuK)jyY1X41<|MPxVX)sLh4c@2ImbqAuWD`!66uwgw_VsiY-iBRwirX=Y%P4~1< z2vXHQ9)u+S&WeRPqb#1eL|2k$1vvpf_7v9_rW|b92-dN%8-~d*bd>N9{C&ZWAp9#& z57M#tLDH|w530&gwa!!;RjpW`l&Jw7V_5I#i(a&0-{MU;6~(w02C-PiCqX4o^}~vE z1!-5$B(FiY-d$6hxx1z|b9ZQ#taopXjlZ{=*K6xuJ5QF7)StRKl)cxytQ!A9?&;Ye z8*<{6_&fMP&`zQCE)$nhg5I0kFJFID>e^ktZ+VQ3ti9S9Am>ZcY>RC{LuNlq5%+!J z_7td)6uBgJ#Q8S_U%HH-gd}0mNte|4dlj5DF@sd4JGR9J#1)YSLq|_sIL?4k2^|(- zhVkEoBakZFWcB`hrLSEm#5hnVy|CgG zINs7Pmap?PA|%?<-6M{AKRGI+ieY)e40m`N(3t5q7~C7(ftUN*qg&|R|+*(=GJ)0m$7=B6SIgbH9M_B0D6x(395 z!KI|D@!-MvZjm5aQC_gHzfL%|AI%RN+ym+5f&n29m3KHttnmDUbCbg2 zS>w(zNyx>LnnL?2bN!rJnN3KNsNiSktaosg7hypobFJN&9djNEzTYR( z3#ofm;#88ZA-pFmYM@F)(yAOq|1JuOp$Q_o$o=pz>5oeaIHIn|ZdI$|$YVOA5~`fO zQjpTW#ej8%T7JYPTlwWx=@_-Er-Tdfq#CS_c!>;>Q!`?j?>)S?lObIF$gsL{eWC2( zYNKPw{@LJL!*y9R1!s_`J)XD50a%kYxYuM2s&nv%=OiqN0iv9!;k~4A;Y?A?8!#FZ zB=)FtddyrJ{sKpYSto@-7RC1;8a!^SvRU}u{LQhNU(P0Q1tPj+E1)4;TuK@P@Z+FT&zwXcel-;+$ zYeWt4boZlLPvWbGJ55a??F;7t7QxuyM#|Wvvh6;V(n;Ahd!XS24)lPA#1RQy3?@&D zTujUB-0*Oy@)@74Utn1drAxnwPTj|pr>{}so1cAlN551`Sh!Vsl3FSb6!W?q^!r!r zDd*s6J3UAT2`4eI&cno#WCno#Us6N;(O=g(cE9M>@3 z-CsQgYx``p`RRtLTpJp~m#&CFy1cE$j@DCcAeSJMilFH2U=SR)5*lVB*(%jr^AVMIz>$(;Pt zK@IZwaty`9=qZ8VXa|-0Jvf!a(W4VC`2p-1x~kAa=<7*7@%hO>Rywhy1+*i2s|Mu# zx>O4z0isNoCLFkwfnA{j7j$IdebtZdAbr7Fz!H9U&h#VY=b#`JT=ubRgHrZiQd<6U ze0eYi#l@;c0Xz6xJ6o^NpTPpP7eNq3Tg|Cx59`s8oC=C6YF!`!7b7Tj{Qg2 z-#tXDV^vdWmq0W(nqxj0zfm0I$sRry{-g6Qmy_r_A10mAp$DI-LSCr?Qvulm)B_5i zIWswqmzDOsH~|!(V{or4yrF(^*{S(|=?qZoxBiWFknQ_xvUvB`_}ur`RO;@pv5WT` zyI5Dh+P>W%>dfC#>U51Iz28_;=dW?rr~AvVB9A`!?_V+9ucd9HK1XjXC*r6W-7=>3 zVg0BoJ2CEU4nV5)pQ6d9)c3GBLQ`E%mS4{}o#{aff`1uLGe}Gt8|M4TZ251!#O4sm zqn#OXfYJeIrWBj9YH0coT%upo$O9MEDsx|H6toWz-sUBP3vQ$*pM-yQc`oXncY91D zX!#fsyz&@y+-!Oxuz??^QyE-MBa``<=g)UXH$y*V{$9C8c@Vhr2UGA(2NP)SFx4v` z-3VylhwB`?(YeTj`(Hb_!bX-CWpGC8x2XGv4tel-jl;P3JcbJ3Ap^TvmYAW3wTu;@ z5F{2LXfaGoqu;;w12-Elwf~2!cDHTi1{M`<13;^&vnZb&_h5Xoe-129ahOPpuU}9j z>-Eu90?M=UN_k)rm+glsBjpD-s*(D-JPa!isV6z$Z^8ttQL>0exvtkgySWM>XaP`T zA2hGl$N9a^G}XfDr8ZZhE;YnV9{<}Bq=scQfS;{zAT!PP_fV=d>!BXaG(`O8-#eHN zUc}Ajw$!&Cll|-oxIaQ()aoy2uFM#=MmPMVc&ZCPB~MK-?-b+U!8O+fv2y!|S$NL? zN`)=p9!fP__q-OEIW`vBw`PxHw{h`x{$Y%>7UZ%*YM0$+maP)CiH23)MrwZLX0%wH zBoYIWbvBtR`9U$+d)(U!F&stClM(e^n|2)Z<^=H3&_1=WpZXfQr~WNo(A>(9@_q1L zW?Kl0IkN#Cyn`*mXj||%LP;#PqY`m_P_n@B;;V6LG0jZ48T{Pl&V5TXsk7_C8zp@x zEfR-#Qq1J!qBfbV72msU*R-iQVE}}pOxQ}pOFV*<6xjavWRx;Nt+@{4!Sy!R>uLK; zA;?@N+Tk(kk;Lb?8pFIs*mu+4T%D%G1b1435R zw>oEojCQwQ?QZOxf3tCS^(AkM(+oqUSE)X}(|GUm*tUHAIvpJ{h>CuxPFAJA^WvMQ z4@d?MeSBN%e&WU-Y2y$%3Xy6l5dJ&9-#I(*!IF-5*@Ct*zD<#Z;T$HBG@niX6}jvP zbOBrlF{uCY&aZ23;5Uc~##((BL3~zU=lEXuXxv^kto<~(9NeVFEIwXvu*(a2W|lj- zYR8*9=^d{NARoa!Ig>S^4luZ!=H~4l&$)H}Kk(9>(I}Nyqo9)!v{moNE0 z^V^^Q-Rvh#eEItun|E&T-v|ZNBzd&=_ctCrQaE?V|9tsK6L$Q2+v@t&uO3o1LG$|` z@9H0J`!F-M9OoDmo*w|?D*&R^ZMJfDevchuRd46)aG6z90471n7Iy= z=mmI@^ck*qYub37F^ANm=u@KDuX*M*9_bxnZEkgv&4BG6C<)GqVTMGt4gBQ^1ZKg+ zm4VM7rzG>HWbCG}+`;Q20r3#AYTqh8|8($Wt75_F9#jwK;ASwOYBw#4RyTJ>e$X=& zg5Cw)sR>cAGkR9a;AhR@0+YygWv+6t!uD4MayT=peGK)VtX_k13a^S@jxtDM7QH=?HrZFS7y|m}4Pl|Fg z#DH>9)_NuPn@b%}`fl!)TBCLpih5bAqPDFD9M(LfQ?O+F$Jacr2_2iqktFtz>}s@! zc4@0gqJXZS&5Z-k=#fBn&!rCeT9wc&TF<<3gdp{xf2?)2x)ocqP}14>20-Ex#LsO4$tP0 zqZ}P)fawI>I?rsYxnBLfF7)%>YL1X$dq7pN#LTG^pRl#;Dc!Au4$W3`-yZYTqEILI z2Y_&G#%Qa#Vh_VZgIAdUcYUttKx;>7yjesay?pJ;o!KcPhhfQ%J%NdFl$-0l5OY)LwTGSOiwxDMw z2G`Ksgl$X-t#>49_vWV?_wFF;ST)i7@{jiKm;{bxRBj-WkpsWgoP^u=h69T4^A}_Ol5)^Vxa^T|uOB16}Y@qgtX`^FS zeC&g}+SaV+^t+J?x+H8`t8_nZq+LoEJz_)lYLzx_tQqYdr1X_?DL%eb*Lyr;Aj?=tM|4I zYo|{efu~q?gn?3A&7pU!Bqf0sXAkJE7nYO)v`mmYLlKseIG&%;y>FX2a8|@tpAI-n zc>?BahDF}3<$CtygzmMIw}boKQjZTLUc7izt=o^Gzx0%k&yA68OD2q478gE6d=cg&S5*cen%C>b7Y8bRpu26 zfb5&Ext?`d=+Byqz=ta}Q=9x=r2aKdfkmEx&Y`tL!)sfS%WH?j_I-3Ye8Maq$myJ&DMc{2jr)ZQ?d7^hFkye z#!i$&t}@7TBko5e!Ai*lI8;~LY=Iw3NZM~W23b$%tn;AQ3ILhsBBfKl{rpm8 zNTn=$u1SflhYqME$KC}Z3w+=S!vfhE>5tFus4y!qwat^J7G--7A0L=NE~iC0x3T|n z2oPLgKY()LpPBh86w@0Nx3(d`dj*S~vNG3=K}I2D_XN zg*@;QFTeZY5x`XLA8ByvR1~R%kh}>vT$tkSpW#nCff{tkL*HzPW8$Hf^wf4j1Vwgi z@Z%dJ&fSujGt*R5l2nP2HBBmow7K(9>kd))w9O(BY-9h!xC{w>ILEFGZ$*2#9_)av zCyHE1E0J(u7>MdH6=DAM?%+o>cWh^&d`#GznU)m=n9Y_7pewDh8HEOd>teDv6g^*C z=D}3gX>e_gwS2fgr{k80<4m0Zy~CdMZgdmD=t8&Hjz<^|l42s&42LS^rhAm!b|U22 zXbVFlODN@O1HFAR-5aA84`rjVETY&NJs&h&%jl1P-`eu4@n8P+Wc2Esi1F}zw7qwH zF#kzT9Ni(fUzO#qfb-*PXc7V4h`0A_%v~2QKiC^1xsn{qs=@TEOHw&CRqD+ar1JF8 z1yCDM8M6p~1Qj_h)!yLCoB8(+&cj~W*scmyAHk&y7w{B^kS;7dLeloxP(36`Ev)6M zf7np~8^;IroOvhd3>n?K-73w89=$9G{Bu%xD{}0c_Zq=_afZj7dQOc{QS$}?#jVuj zdLwlxWQ7Hn7L*Fi9G^)2-O8I})`Q>Gs35=6EuYwIEMy=sdc}5{H{j-K6PDbOwgYXO z67KOFXF)DDV1@9owPGX2@a)$;Za}qk1xPkOeHJI!Pz!YU92v73D6YxmCjy?quWm~W zF(e2up=cTcOwZCq#p=drW-G{rlNMIrA^S?MidOMKqt;?wHr3FHv~mTqyJh)J+6ISX z6H*$YO%zoK`({F?!Eb0h(MR06vxD0~0WWXsiWXln?4oyKqz>i?1;oZ3(d`yEo^$2H z#r1sv{rJ#(mZ2?IpAWnTQVq7`2_}mJjVVAM@~XxeNb*nFMCz$r9n)17y1p7)Ks7G= z?Y{TCEp`cnilrSBDW+vzHv`X&R@vnQW6e$tet(-4plC^WbLNf;Shte5O0IP>cz%3m zWD==^AgTB>eIG>G2VY|$+*RX&8iiuf}r$~AahMagXPiW*z@*y!ygcZDU%34_FE zq*F!&vb-5c4m-$-A0NC0T08iejUspjX3u~03^xN2%8#L1`@@(?7@nnNc2Fp0O|ly3 zmGdf1(J;QK8Jo?NX>A*Hp2|{gkDkEEz7Ib}K_^zsJGUot8+=?~yNTh5DbO%M%6m=z zc(aAfd;z9zOy(0Z@Aw7mCEkV?a( zb|?5pqTe%cQM)Vc6=)5gKI>twB(+bcDNjLtE<}n$X2+Y`_&~5ptLSfhMwfq&hDsB$ zIxg~{0>LIkaY`4RT+2bhX*1g}Cs>~wH1 zzxsu2^uQaUedR)Iy4oRMHr7EcSw?Vu6=id)Q7Ye%ZukjKJNiJDz9vi(vRx7pl|1-e zzp2geyBcD_Heyr>h+sg{NF%WulO8)qbM!PR=XdW@U9nH@CYFf^zwtvX0nNWYFWDp> z@{;l>BcV@V^c=ecMa`e?TVH7<<9;}&gwuB$<+JSh=ljMcqwQJ6qleGQozt2-=xDU4 zA)ugg8(^?R40}Zuif6i*YIUkbg!qlmOudaB?RnKdoMx|`f&uSG^rne_9ClQL+WvLa4EPr(O zc1!N66K~N+FQvldtYzs3@n-#zSv8)9JrG6?*X1&KtVXjpDz%nY@#TGaEMsaKL3msg zMh$ITi(UGVg%IK)oom+OZ*DZj!;{Gc@gVXQ6}_a%`hf`7^emx5TQ@g@VIZgTGl&W_ z;+29rh`c6GF~4l;fn~VLpI|vSY4$|3BU|hnq0cyZNF%U{xm`yG#7 z{l_bQ;Rh(t@wx_bUZ4^N>?nZ?1&F4ahvhx^lL$_i7l6DT?4J++NMyZ7)5+iuuc8b8 zPbxpOd-B+5^v14jy%LUbY0uv=39-4kwY9S&?D~5F+>fuWE@r>EeS6EZ8fH)!o{BN= z`&*do+p!sod4pJbqhz+XcXmcMY5rGq=h}`e*!GcB7yxdKuTZ-y_z=hfKv!#?1IM$J z?)zoF_05|%x5nfOZyjC^e&TRSFFw4vquXD+9_=2h#-*~-!vh#ozIyp!QHE|W?wpbI(oGw!+j`vxZEQgpOr&n{wcV@3gIg*1AG=Wt< z{CeRR8vgTtXbr^cI$W$V9n1gl4~_M)3TRQO!Q=7O`4XP{mk}Y~46lI3yjzg?4&D!l zKvb<|jS?ORuRNT^vQnmS5l)o}*P&Qc0`qXS@#yaT+n?S?&Ac6oqwB1~lz&yC0mk#l5`Y$F^5pz4)%v`h&?trcW(FpPo|W5V=Bq|wE&|~oGlbC2wqBd z<9BoZw5yvOJnyw>h@u0W3QLf-6UVO_ z8Wz^(oi9@s?J1QPRd)MRWZXol@D?r0kAfz%5ALd`2Bd-XSQo%YeoNcOZrwh}hlS8#OX~*r}m{Qm{F?g3OWqVGg+j-BM+q>Jp9)11g-_HA*}<#k1i!fbusTXnPuc>KkNW}!{x z@(2`FW?=QFh)C>8@ppD>v|Hy5Yy#XCn_!MAq*VWLFr!)*3M?tdL_U#|>pfh-(=!+g zs`%c_%s~u(iD5v61{Njb;h6!`qpB5EyX3wV2lk=ru?~79{1G!@m{Cw99G)O(Ol&e` zB!%k|R4!}x0p)%5xrMrgqy=+y7%9sO#d^i{n*fbo43`Tv41DlsBMN2ScR~C zoIrW71TWcfe=wn_5Ydr#FHS%SZ9gD*WslBrgQJ_0vWLlwQ8?(UO9r$CaWvUfl#NS6 zedjXEMnQe3lf&_274n#~Am2l|6JdW&BM^mzM%*-Jzq{m! zy!4!9@MNfir()R%!{u*+0a~->=nwvujIoH{zX)VlD2jSpzqmXfAMAsYQ~cqp+l_$; zZ(cKiJy`dvAkZdiip@<@<6=~?ue41t{f6QU($@L!EF%8K)2y+V!t@nQB@#$;Q&fbQ z>N@mH$G12IY2bpl{pEjZity;!{NiuoOI}RJ z^XV;6pU2}{^Yar~m|J_7w@>PFmVBiCdPC5o?kA3tMIq`-o@Ow@qn&iM(mNqM>6V0O zEQqR)tR#e0pQJHSfocU}MPO~R28YE8eO)vq$qI{uKr!a5bRQ<&;Wup zG@syP#%gCZrbvXAOVlEMa6baAsTko9V?WZNU11K|B-PU%;{BJ7y+~Hu089<&vwyrQ z;rR;4z0BhS&EOIC&o*I2>@ag*Ua;GFT$^lf80M;SJSkB(An^$0Q4)FiC0122ep-!V znTsO)!25nm$%}LV>Nvvj_yYp~l6qfsDoVSW)PZIJ&AbU4(tL<7Ce=oioZneF&y(>! z){UXjG78h~-kd&CdjOhCM2mqkzWU1EiUZIV$$@Ydn(cBTqWCl`M5fL5&@u*r$>_0$ zlYdxt{NEs16N~WRgp~!3Zyn#ElgMQdzN-3G396IZmn~aNT*q~b@r5eZVVgL6%~Dm5 ztw-fmW@(M6zJgR-{e=#{Zn$8;nthi5Y>ZX66qBz1D9>ChP?-26lV`EhTuv6_&=jtPT z;EzT(A3uNeH_7HuDG-0%5f!#r;jN=n7|vEk$Of)@r$PokSq%MPnaF6k zrX!XvQ7EeTsQR0m6kTx)d}6w*i>06VQ$ck46(EEQhxF1u?Krbz?y(ODb(xZeu`izo zN+iVUx#jMhv6m_si_cq=j8B;A+H|! zVnu0GdT(RoQzmG-`8|zMsA9Ej7@}nKY)YsAuNrfo0$3iUyrw1;qTHtI%DHk!%9|RL z%`cd_%jKLO_777vPU9}eS71X)m~9xV=wN2!{A{BH@-`7i%AT$++zfxOQpDj&ITu{s zV;n?aJ%!K#>Jxx{iHP4rtg`d)X&sYLZvh?w1-%0@Kk1mHucro>ZXTP9k*1`tlaO7S z=*e_HN5Pv^G^fz2gq0^_X-I{gQ63ee^Q7or(v}Ov!PdT6GUGC%PikSRl1lbQ-AIz0 zotR&+$|^(eRyabJbW)+SOJQEG%#oF9VgY`l zo2H$JJw`OUZ5VWq+76Rd1v(O9FQ5MHQtB%UkwXcx*Xd&FNS&%FWjpWY>MCPR74WG_ za4Ko+8h8|t0};|?36!~7n2fDoD1*{9|9Y}{!OGyBwt1iX3+e%s6CQ4aLP`zmSt)O zbD*4%#$FZO6MwO=^kPq#TMGC=07^xOct}bqa&7ha;Cd?|N%(B+fBNCiYGuwZ%Y~o<7LFbF9;%w#jH93+r_qb zb^BD=+}-oTE6sNPuvqwKBE__VSuVhVu)H6ouBHD6g=t~UL{algjG;A zc0Zl)#8sys5{zsg{lGp0jNUP4@vOCVfz*4%6IO| z3C~>l&X-m{iChv&IoUBZ;i4JehfZ_Fj9fwbg3apQ!;YMDL3s zu5V}4*Ha=UifpQ7sIA;xwHgrjtmmeC$T- z2MC8Cdan^o0iyt-D=%472>^CcaW4YPbXOAQ+4BmEN&7uN8y7u=n2Ke+C^Bzxj`?vL z7>d#_zxwX+s2T^|pJSK_3!f?R?R4=L{tLc^^|E!B_$~YL2^F(#?5K+UbnV?)4-os& z;Tu?x3S^cD*%!-?H2*%DOoy(6;<<=yNcZOWA*#(9gmSZ!T8}D_+*HPF82r&(Or|A83eWYOU?(QR3#@c z;auYmbKCc?F85}xm|-=)8Bh7w;9Sj@C%S%r88(fuiATFUr>3ltS)4X+c@2`A>TFAB zn%+-Y7g3E0bk@beyij&e{BBgqYhNaI7vByIr6|klmPk^Uy`ZhaNd(U7YnZ8GzDwy! ztUIBJl=K)DyIsCN9oVbE!=L_2^Fmr10)w=EU@-?+w4ce`7nGU!p3+I8{26fZUsBGi z2U1;Z@R`MyQ4Y`Ka2}Jh_lTE2-d?;+`xAmE(cJf+DFiNv1sl~iuO)}BI>j6w(eT6og? zeYsu56W{OGc*9+^>iL7=!_hf;)kAihO@R5s<@PAAnbwf(*1MA_d`pc;_A%2s!GC{a z*m^qlfLo80)l2_&`9WIW@m@% zufa_sVz#a6(F`gL)c_(EiLhTNw2{2x0f0bPH2MMK;MoO~z*oTO%RT6G^@I}(h+lLw z64mebKO3^`C*OapHwOSo*tx>KA@|P!NpHclf#b5+rRCie9e}p;UCC5OSH=WX%Sp>^ zEx`f&!+k#*Y}zhvFtl}9Szcohaan)W-Ci>En}8IBVpT2K3o57Hvm#(!4xb{n=noy; zMN!qamR)=^cBhl|-hVosj9#rT#_PRD-@Q1v_r>njbLH)YvDfrs#KckuNfRD7q%DQIir6e&wiffo)dR{! zhZy9C*SLjP;-e{0GOxZJ!y9kMxg%{IJo2(DG;iLidhJY5k zRyrhwK5b+n2wsVgI3%t_4&Y(j0>Ha_^MstGhqvnP<)qI40L3xZ0;@?JXf`Pg)vE@0 zDrdPJ)3bqVTACaO*=!3Wh-gs;^SzgJXJ+zaKr}d5jcCW9Vbjyd5T4d7!S+c8UYgSt zs+)Fa+5}-&!Tbt^%SSJco)X>cfB)j|J{lYZ%B+>bjwARX2UZ3gh1kb8ZmqgTLUv-l zLS$hX6!2zRS!C0h&T(7S@U`m*w9hgs3`4h(a2wG@!${IKSC;f0up1**_T!Z^kq2_o zjIGKlXoli|qFI(C zsg+|p<7;YJ=_7VXSl-nDq<@%M4-u(Tqbg(MxI0c&wEM{AvV@!F=bI#kcM7okY|PE& z)Y3=cB^K6EQLjwR*6l$g=-DGpxs^amf~!!UvRz^px!omNh7G32huN5aJbSquy)LyO z>`y+N`qq~IHYBL78jZdIDT-EADr}NT zaED2aRlJE-?Qk|#WAZCRqW7KMnau%A15mzDXb3q-{l#?YPsL8H+F1*}hV^ZWLHcR! z=WO!SS(td((){#S5X#w4|1x;G`suH4&#x)~O}!HJ8Bbay%59lx!=&Bsq0v?Ygr zTJd?(vr~k+k|V|tl$=bvla~BvQl%kkf6!;9>c5i|oS{@S^Ko_$R$x>#;{!7JgV=_h zFm1w;eg^a;iZ#K=6RBjQkmRzrcHyyw`GA*ji@{%xpHso(1$f)+rQma&aG{TUF$VnvIIG)lx>1OBdub?n!hS19u+;2YPHEuosjkoATmBj+; zCsnmXC5^IlKMI4rDnR~dG?&x>6lX1f}llsA{SLb-KTt#Dh<<9=m!S-|=tMTs3#oj+))jj>a0@{B^g!sGfd328+{Qgt>kLUB(`uESi zvj6%smFM4oayRukZbNtX4IbqnU!6Vyt?f)c=2s8w-8B~64}u6;>zcCA1xb5o*tLYb z?3I<&U^s)F2M?dirgM7`XN*{rg#lZx6rk2JQy){!j*^-0twVOkevZq=Lje1F-=`oK zSW3ZZ+8Pbd3US(gkhjBylK(9(z^)P?^mOj5ox2&W&(WYtil>a3@5nAozsrVcDi>uF z$r>?sbe%XR&N(p=i54XXKE9rU`K@TDj2RJ)2ww5x9GbTs|I;t-?mc~>y^jCQ;NBD` zPk|Mc3W-fApEaCd9@_>D|5TbfC3I}3uC23JB(~F-S?T3O@l=t+=3S(xsvE%>R$IB1 zL5-vA9t$NKCfI8muhH)`r)s>2-y}lPpVZOQZk&e26d?3$)iqp(z8an`*t|6!bLP|N zb+|0$4r>OK93;YT@A32v_GyO7hw4y;gI zn@0oR=C-oK#nB*`f8^_tC}h2o7F1Neq5s7%S$*xBGT~=(ai)otel+es1s$W8FL6dP znpaCQsBsWFxHp`?>X7nq(ttNqPPJxDw$ud4jKkJ#Bs%p&scU$;PlF|xEw6|-#v9-H zfK0&{M6Zud8f5bT64gO!6RlDjL{gx<-AeR2H-%`XB7?FkaPU5h~^O~)m0 zP^a-Wg0cD-x1hH zgUa?mM!d;fBc_6Pdh=SrnM?(Au1Rm==M4#coM}3tz|e>Yy{>C?8Zq2dAr`Hwc<|Mj zx!VqUUqTU10M4l7!<9>|8wJkPtop;ODdpv^n;wl!J-<6zSNFI)%2beh$1M?gv}@hX ztKGG-vx{~OJC&%)?I&GMy^(%5T2(#yq;uVT>Uk`-BA<>iw(t7;<`321S=T+Rd1nt~ zTDda(flzZLgKj~skdG`tlfLL7x zn>sVWv_njw<^+*B1we)_4t;Bu=e4-Tc6w%Xvbo#N%*dqe`kd*4e9fEzdyvVHJoVl0 zs!81O__!$>`4+_tSqTPceP#|HOo>Q2;3FB6MTI6Ng+DS!d4{TKBr4iW?V%>n@?TsiJ4>?7&27mQ#$PxPW1#f3})o zM>2RvuJg;a^$`hkFMA~Pk6WBjjP`>+xvDl1c6LGQ38}i!xrn!Ib?sH>%|U26Tzk6kEnFGjbuFptDVo?P)ZuN=e2dpOA_^vTg(?}}(|0$0tCdzlM1ww_W-6h%r5Eb6IEVWoTiQMvH)fFRgtD4n?w*#MNhaPrS-_#{NK?-~fh?l~hCt^hmQh z)VQ#E2FZXl#HylHzyVTIL)}ceV&#eEe#1h?@`(F2YSv?+zNj`JvXtu`V-daP|FVSp zuJq|`G5hCVe0p&27mMxh-#>_I`Mzlx|M!3Qft3+mHRG(v>1!i+4>|q6PrI0c(BtDV z5ROddY$9s&oX_?EU5A=iSLh_cVPkxbo^-%sFaT9Rs=qb6*l$lUV^dSl|MQ>!(dFyOp;J9xC_j5P zLMK+IX+^&Y>$1)al;ueDg{SwQG1Lsf6GojYpQ%kwYCF`-=K!K!%R--^Bq2=EXP}_N zy*_o`o(y=^%8d?(S%E6fr7FBS=%as*tSt<(^1h?~tyA?9<2m3vlBg(peqP4f#c`u( z65>v}VgH**Lz~rN-*fC#(BtK#c*%~nzOZMxaW7nnO!*ZNlj_A+o*PJRp&mXKY^67$ z*q)xXPE?Xdig|7N7of<9fhZO?+9|)sVvsywvUA_?xZt@cqkhBbxkyOl;g|`Q1j^}2 zCia;)IO5uX)B59>iMikM*wgwt`s3hx`W`6le>jDX!?UAyPVC^y))m-k* zqY!!(doo4Dih*BlT5E;$1!+rBa4BWRnxKOH)eBwI-FQEw&PzdDOeyIFd2Kco%XU(`zKf06JV+s>_=}9JjZQY4(z18_@PpGUB8Eu6gdj)~h0?&ev