ࡱ> q Kbjbjt+t+ {fAA{%]2"2"2",####D$$$$$T$$Ll% &R^&&&'"' '$7#'''''7G4##&&%&G4G4G4'(#&#&$$####'G4, G4s= 0##ݰ4&%<`v`$$+. ߯EN (version of 5.10.01) COMMISSION OF THE EUROPEAN COMMUNITIESBrussels, COM(2001)  DOCPROPERTY "Classification"   Proposal for a COUNCIL FRAMEWORK DECISION on combating serious attacks against information systems (presented by the Commission)   EXPLANATORY MEMORANDUM INTRODUCTION Electronic communication networks and information systems are now an essential part of the daily lives of EU citizens and are fundamental to the success of the EU economy. Networks and information systems are converging and becoming increasingly interconnected. Despite the many and obvious benefits of this development, it has also brought with it the worrying threat of intentional attacks against information systems. These attacks can take a wide variety of forms including illegal access, spread of malicious code and denial of service attacks. It is possible to launch an attack from anywhere in the world, to anywhere in the world, at any time. New, unexpected forms of attacks could occur in the future. Attacks against information systems constitute a threat to the achievement of a safer Information Society and an Area of Freedom, Security and Justice, and therefore require a response at the level of the European Union. Part of the Commissions contribution to this response is this proposal for a Framework Decision on approximation of criminal law in the area of serious attacks against information systems. Types of attacks against information systems The phrase information system is deliberately used here in its broadest sense in recognition of the convergence between electronic communication networks and the various systems they connect. For the purpose of this proposal, information systems therefore include stand-alone personal computers, personal digital organisers, mobile telephones, intranets, extranets and, of course, the networks, servers and other infrastructure of the Internet. In its Communication "Network and Information security - A European Policy Approach", the Commission has proposed the following description of threats against computer systems: (a) Unauthorised access to information systems. This includes the notion of hacking. Hacking is gaining unauthorised access to a computer or network of computers. It can be undertaken in a variety of ways from simply exploiting inside information to brute force attacks and password interception. It is often though not always - with malicious intent to either copy, modify or destroy data. Intentional corruption of websites can be one of the aims of unauthorised access. (b) Disruption of information systems. Different ways exist to disrupt information systems through malicious attacks. One of the best known ways to deny or degrade the services offered by the Internet is a denial of service attack (DoS). In a way this attack is similar to fax machines being flooded with long and repeated messages. Denial of service attacks attempt to overload web servers or Internet Service Providers (ISPs) with automatically generated messages. Other types of attacks can include disrupting servers operating the domain name system (DNS) and attacks directed at routers. Attacks aimed at disrupting systems have been damaging for certain high profile websites like portals. Some studies have calculated that a recent attack caused damage worth several hundred million Euros, in addition to the intangible damage to reputation. Increasingly, companies rely on the availability of their websites for their business and those companies which depend on it for just in time supply are particularly vulnerable. (c) Execution of malicious software that modifies or destroys data. The most well known type of malicious software is the virus. Infamous examples include the I Love You, Melissa and Kournikova viruses. About 11 % of European users have caught a virus on their home personal computer (PC). There are other types of malicious software. Some damage the PC itself, whereas others use the PC to attack other networked components. Some programs (often called logic bombs) can lie dormant until triggered by some event such as a specific date, at which point they can cause major damage by altering or deleting data. Other programs appear to be benign, but when opened release a malicious attack (often called Trojan Horses). Another variant is a program (often called a worm) that does not infect other programs as a virus, but instead creates copies of itself, which in turn create even more copies and eventually swamp the system. (d) Interception of communications. Malicious interception of communications compromises the confidentiality and integrity requirements of users. It is often called sniffing. (e) Malicious misrepresentation. Information systems offer new opportunities for misrepresentation and fraud. The taking of someone elses identity on the Internet, and using this for malicious purposes, is often called spoofing. The nature of the threat There is a clear need to gather reliable information on the scale and nature of attacks against information systems. Some of the most serious incidents of attacks against information systems are directed against electronic communications network operators and service providers or against electronic commerce companies. More traditional areas can also be severely affected given the ever-increasing amount of inter-connectivity in the modern communications environment: manufacturing industries; service industries; hospitals; other public sector organisations and governments themselves. But victims of attacks are not only organisations; there can be very direct, serious and damaging effects on individuals as well. The type of attacks described above are often carried out by individuals acting on their own, sometimes by minors who perhaps do not fully appreciate the seriousness of their actions. However, the level of sophistication and ambition of the attack could grow. There is growing and worrying concern of organised criminals using communication networks to launch attacks against information systems for their own purposes. Organised hacking groups specialised in hacking and defacement of websites are more and more active at worldwide level. Examples include the Brazilian Silver Lords and the Pakistan Gforce, which try to extort money from their victims by offering them specialised assistance after hacking into their information systems. The arrest of large groups of hackers suggest that hacking could increasingly be an organised crime phenomenon. There have recently been sophisticated, organised attacks against intellectual property as well as attempts to steal substantial funds from banking services. Most seriously, there is a threat of a terrorist attack against vital information systems within the European Union. This threat must be taken very seriously following the unprecedented, tragic and murderous terrorist attacks against the people of the United States of America on 11 September 2001, in which hundreds of citizens of the European Union also died. These cowardly attacks highlight the need for an effective response to terrorism at the level of the European Union. This proposal forms part of the Commissions contribution to the response. It supplements the Commissions proposals to replace extradition within the European Union with a European Arrest Warrant and to approximate laws on terrorism. The proposal for a Framework Decision on combating terrorism creates the terrorist offence of an attack against information system, but this need to be supplemented by greater approximation of the constituent elements of offences against information systems. This Framework Decision will provide a much greater level of approximation of the constituent elements of offences against information systems. Taken together, these instruments will ensure that Member States of the European Union have effective criminal laws in place to tackle cyberterrorism, and will enhance international co-operation against terrorism. This proposal does not relate only to acts of terrorism directed at Member States. It also applies to conduct on the territory of the European Union which are directed against information systems on the territory of third countries. This reflects the Commissions commitment to tackle terrorism at a global as well as European Union level. Indeed, the Commission is working closely with Member States and third countries to combat international terrorism within the framework of international organisations and existing international co-operation mechanisms, particularly the United Nations and the G8. In fact, there have already been several recent occasions where tensions in international relations have led to a spate of attacks against information systems, often involving attacks against websites. More serious attacks could not only lead to serious financial damage but, in some cases, could even lead to loss of life (e.g. hospital systems, air traffic control systems etc). The importance attached to it by Member States is demonstrated in the priority attached to various Critical Infrastructure Protection initiatives. For example, the EU Information Society Technologies (IST) Programme has established, in collaboration with the US Department of State, a Joint EC/US Task Force on Critical Infrastructure Protection. The need for accurate information and statistics There are few reliable statistics available on the full scale of the computer-related crime phenomenon. The number of intrusions detected and reported up to now probably under-represent the scope of the problem. According to a US survey , in 1999 only 32% of respondents who have suffered a computer intrusion in the previous year reported it to law enforcement. And this was an improvement on previous years when only 17% had reported. Numerous reasons have been given for non-reporting. Because of limited awareness and experience of system administrators and users, many intrusions are not detected. In addition, many companies are not willing to report cases of computer abuse, to avoid bad publicity and exposure to future attacks. Many police forces do not yet keep statistics on the use of computers and communication systems involved in these and other crimes. Law enforcement authorities lack adequate training to detect, identify and investigate computer related offences. However, the European Union has started to address this issue by collecting some figures on attacks against information systems. In one Member State, it was estimated that there were between 30000 and 40000 attacks in 1999 on information systems, whereas no more than 105 official complaints were recorded in this field. Indeed, in 1999, seven Member States recorded a total of only 1844 official reports of crimes against information systems and computer data. Nevertheless, this is twice the figure reported in 1998, when only 972 cases were officially recorded in the seven Member States. In addition, a recent survey reported that 13 per cent of companies that had been victim to economic crime stated one of the crimes was cybercrime. The survey also reported increasing concern about cybercrime, with 43 per cent of respondents believing cybercrime would be a future risk. Another study concluded that hackers and viruses now pose the main cybercrime threat to organisations, with the main perpetrators being hackers (45 per cent), former employees (13 per cent), organised crime (13 per cent) and current employees (11 per cent). Such figures can be expected to continue to grow as the use of information systems and interconnectivity increases, and the willingness to report attacks improves. But it is clear that urgent measures are needed to produce a statistical tool for use by all Member States so that computer-related crime within the European Union can be measured both quantitatively and qualitatively. The starting point for such an analysis is a common definition at the level of the European Union of the offences involved in attacks against information systems. European Union policy background Against this background, at the Lisbon Summit of March 2000, the European Council stressed the importance of the transition to a competitive, dynamic and knowledge-based economy, and invited the Council and the Commission to draw up an eEurope Action plan to make the most of this opportunity. This Action Plan, prepared by the Commission and the Council, adopted by the Feira Summit of the European Council in June 2000, includes actions to enhance network security and the establishment of a co-ordinated and coherent approach to cybercrime by the end of 2002. As part of the Commissions contribution to this mandate on cybercrime, the Commission published a Communication entitled Creating a Safer Information Society by Improving the Security of Information Infrastructures and Combating Computer-related Crime. This proposed a balanced approach to tackling the problems of cybercrime, by taking full account of the views of all the interested parties including law enforcement agencies, service providers, network operators, other industry groups, consumer groups, data protection authorities and privacy groups. The Communication proposed a number of legislative and non-legislative initiatives. One of the key issues addressed by the Communication was the need for effective action to deal with threats to the integrity, availability and dependability of information systems and networks. Much has already been achieved in the field of Community law. There are already several legal measures in place at Community level with specific implications for network and information security. In particular, the European telecommunication and data protection framework (Directives 95/46/EC and 97/66/EC) contains provisions to ensure that providers of publicly available telecommunications services must take appropriate technical and organisational measures to safeguard the security and confidentiality of their services, and that these measures must ensure a level of security appropriate to the risk presented. One of the most important and effective ways to address these problems is through prevention and education. The Communication underlined the importance of the availability, development, deployment and effective use of preventive technologies. It highlighted that there was a need to raise public awareness on the risks posed by computer-related crime, promote best practices for IT security, develop effective tools and procedures to combat computer-related crime as well as encourage further development of early warning and crisis management mechanisms. The EU Information Society Technologies (IST) Programme provides a framework to develop capability and technologies to understand and tackle emerging challenges related to computer crime. More recently, the Stockholm European Council on 23-24 March recognised the need for further action in the area of network security and concluded "the Council together with the Commission will develop a comprehensive strategy on security of electronic networks including practical implementing action. This should be presented in time for the Gteborg European Council." The Commission responded to this call with its Communication on Network and Information Security: A European Policy approach (COM(2001, adopted 6 June 2001). This analysed the current problems in network security, and provided a strategic outline for action in this area. It is not yet a definitive action plan for network security in the European Union, since it will be thoroughly discussed with Member States and other interested actors prior to implementation in order to confirm both feasibility and added value. The Commission proposes to have a concrete implementing action plan before the end of 2001. These initiatives are not in themselves sufficient to provide all the necessary responses to serious attacks against information systems. Both Commission Communications also recognised that there was an urgent need for approximation of substantive criminal law within the European Union in the area of attacks against information systems. This reflected the conclusions of the Tampere Summit of the European Council in October 1999 which include high-tech crime in a limited list of areas where efforts should be made to agree on common definitions, incriminations and sanctions, and was included in Recommendation 7 of the European Union strategy for the new Millennium on the prevention and control of organised crime adopted by the JHA Council in March 2000. This proposal for a Framework Decision is also part of the Commission Work Programme for the Year 2001 and the Scoreboard for the establishment of an area of Freedom, Security and Justice, produced by the Commission and noted by the Justice and Home Affairs Council on 28/29 May 2001. The need for approximation of criminal law Member States laws in this area contain some significant gaps and differences which could hamper the fight against organised crime and terrorism, as well as serious attacks against information systems by individuals. Approximation of substantive law in the area of high tech crime will ensure that national legislation is sufficiently comprehensive so that all forms of serious attacks against information systems can be investigated using the techniques and methods available under the criminal law. Perpetrators of these offences need to be identified, brought to justice, and the courts need to have appropriate and proportionate penalties at their disposal. This will send a strong deterrent message to those contemplating attacks against information systems. In addition, these gaps and differences could act as a barrier to effective police and judicial co-operation in the area of serious attacks against information systems. Serious attacks against information systems could often be trans-national in nature, and would require international police and judicial co-operation. Approximation of laws will therefore improve this co-operation by ensuring that the dual criminality requirement is fulfilled (in which an activity must be an offence in both countries before mutual legal assistance can usually be provided to assist a criminal investigation). This will benefit EU Member States in co-operation between themselves, as well as improving co-operation between EU Member States and third countries (provided that an appropriate mutual legal assistance agreement exists). Scope and purpose of the proposed Framework Decision The objectives of this Council Framework Decision are therefore to approximate criminal law in the area of serious attacks against information systems, in particular to contribute to the fight against organised crime and terrorism, and to ensure the greatest possible police and judicial co-operation in the area of criminal offences related to attacks against information systems. It is not intended to require Member States to criminalise minor or trivial conduct. It is clear from Article 47 of the Treaty on European Union that this Framework Decision is without prejudice to Community law. In particular, it does not affect privacy or data protection rights and obligations provided for under Community law such as in Directives 95/46 and 97/66. It is not intended to require Member States to criminalise breaches of rules on access to / disclosure of personal data, secrecy of communications, security of processing of personal data, electronic signatures or intellectual property violations and it does not prejudice the Directive 2000/31 on certain legal aspects of information society services, in particular electronic commerce, in the internal market. These are important issues, but they are already covered by existing Community legislation. Any approximation of criminal law in these areas to meet Community law objectives, such as the protection of personal data or intellectual property, therefore needs to be considered using the framework of Community law rather than Title VI of the TEU. For these reasons, this Framework Decision limits itself to addressing the conduct described in points (a)-(c) in section 1.1. Legislative action at the level of the European Union also needs to take into account developments in other international fora. In the context of approximation of substantive criminal law on attacks against information systems, the Council of Europe (C.o.E.) is currently the most far-advanced. The Council of Europe started preparing an international Convention on cyber-crime in February 1997, and is expected to complete this task by the end of 2001. The draft Convention seeks to approximate a range of criminal offences including offences against the confidentiality, integrity and availability of computer systems and data. This Framework Decision is intended to be consistent with the approach adopted in the draft Council of Europe Convention for these offences. In G8 discussions on high tech crime, two major categories of threats have been identified. First, threats to computer infrastructures, which concern operations to disrupt, deny, degrade or destroy information resident in computers and computer networks, or the computer and networks themselves. Secondly, computer-assisted threats, which concern malicious activities, such as fraud, money laundering, child pornography, infringement to intellectual property rights and drug trafficking, which are facilitated by the use of a computer. This proposal deals with the first category of threats. Approximation at the level of the EU should take into account developments in international fora and should be consistent with current Community policies. This proposal also seeks to provide greater approximation within the EU than has been possible in other international fora. LEGAL BASIS The objective of the establishment of an area of freedom, security and justice must be achieved by preventing and combating crime, organised or otherwise, including terrorism, through closer co-operation between law enforcement and judicial authorities in the Member States and approximation of rules in criminal matters of the Member States. This proposal for a Framework Decision is therefore aimed at approximating laws and regulations of the Member States in the area of police and judicial co-operation in criminal matters. It concerns minimum rules relating to the constituent elements of criminal acts, in particular, to a substantial degree, in the fields of organised crime and terrorism. It also involves "ensuring compatibility in rules applicable in the Member States" in order to facilitate and accelerate co-operation between judicial authorities. The legal basis indicated in the preamble of the proposal is therefore Articles 29, 30(a), 31 and 34(2)(b) of the Treaty on European Union. The proposal will not entail financial implications for the budget of the European Communities. THE FRAMEWORK DECISION: ARTICLES Article 1 - Scope and purpose of the Framework Decision This Article explicitly states that the objectives of this Framework Decision are to approximate criminal law in the area of serious attacks against information systems, in particular to contribute to the fight against organised crime and terrorism, and by doing so to ensure the greatest possible judicial co-operation in the area of criminal offences related to attacks against information systems. It further states that, in accordance with Article 47 of the Treaty on European Union, this Framework Decision is without prejudice to Community law. In particular this includes privacy or data protection rights and obligations provided for under the Directives 95/46 and 97/66. It is not intended to require Member States to criminalise breaches of rules on access to / disclosure of personal data, secrecy of communications, security of processing of personal data, electronic signatures or intellectual property violations and it does not prejudice the Directive 2000/31 on certain legal aspects of information society services, in particular electronic commerce, in the internal market This Article explicitly refers to serious attacks against information systems, which makes clear that the proposed Framework Decision is not intended to require Member States to criminalise minor or trivial conduct. Articles 3 and 4 define what is meant by a serious attack in the context of those particular offences. Any one of these criteria is sufficient to make the attack serious for the purposes of this Framework Decision, and thus should be covered by national law. These criteria are also consistent with the reservation possibilities in the draft Council of Europe Cybercrime Convention. All the criminal offences covered in the framework decision need to be committed with intent. The term intentional is used explicitly in Articles 3, 4 and 5. This should be interpreted in accordance with the normal criminal law principles in Member States governing intent. Thus, this Framework Decision does not require criminalisation of actions where there is gross negligence or other recklessness, but no intent as such. An intent to unlawfully access or interfere with information systems in general should also be sufficient, rather than it being necessary to prove that the intent was directed at a specific information system. Moreover, the definition of serious attacks provides further qualifications to the nature of the intent of the perpetrator. Article 2 - Definitions The proposed Council Framework Decision contains the following definitions: (a) Electronic communications network. This definition is based on the definition in the proposal for a Directive on a common regulatory framework for electronic communications networks and services (COM 2000 393). (b) Computer. This definition is based on Article 1 of the draft Council of Europe Convention on Cybercrime. The definition also includes stand-alone personal computers, personal digital organisers and mobile telephones (provided they have some data processing functions, eg WAP and third generation), which would not be covered solely by the definition of electronic communication networks. (c) Computer data. This definition is built upon the ISO definition of data. It is not intended to include physical items such as books. However, it does include a book stored in the form of computer data (e.g. saved in electronic form as a word processing file) or turned into computer data by means of scanning. For this reason, the definition makes clear that computer data needs to have been created or put into a form suitable for processing in an information system or suitable for causing a function of an information system. (d) Information System. The definition of information systems is originally drawn from that adopted by the OECD in 1992 in its Guidelines for the Security of Information Systems and the previous definitions by referring to electronic communications networks, computers and computer data. The term has also been used in previous community law instruments, such as the Council Decision of 31 March 1992 in the field of security of information systems and the Council Recommendation of 7 April 1995 on common information technology security evaluation criteria. It is intended to be technology neutral, and to reflect accurately the concept of interconnected networks and systems containing data. It covers both the hardware and the software of the system, though not the content of the information itself. It also covers stand-alone systems. In the Commissions view, it is desirable to extend the protection afforded by the criminal law to stand-alone computers as well and not to limit it only to systems that are inter-connected. (e) Legal person. This is a standard definition from previous Council Framework Decisions. (f) Authorised person. This means any person who has the right, by contract or by law, or the lawful permission, to use, manage, control, test, conduct legitimate scientific research or otherwise operate an information system and who is acting in accordance with that right or permission. This includes persons acting in accordance with the lawful consent of someone given such an explicit authorisation. It is particularly important that the following categories of persons and legitimate activities (within the limits of the persons rights, permissions and responsibilities, and in accordance with Community laws on data protection and secrecy of communications) should not be criminalised when this Framework Decision is transposed into domestic law: actions of ordinary users, whether private or business users, including their use of encryption to protect their own communications and data; reverse engineering, within the limits provided by Directive 91/250 of 14 May 1991 on the legal protection of computer programs actions of managers, controllers and operators of networks and systems; actions of authorised persons testing a system, whether within the company or person appointed externally and given permission to test the security of a system; legitimate scientific research. (g) Without right. This is a broad notion, and leaves some flexibility to Member States to decide the precise scope of the offence. Nevertheless, to assist in the implementation of the Council Framework Decision in domestic laws, the Commission believes that it is necessary to indicate that certain activities should not fall within the scope of the offence. It is not possible, and probably not desirable, to draw up a comprehensive, exclusive list of exemptions at the level of the European Union. But the phrase without right builds on the previous definitions so as to exclude conduct by authorised persons. It also excludes any other conduct recognised as lawful under domestic law, including standard legal defences and other types of authority recognised in domestic law. (h) Protected system. This means the whole or any part of an information system which is subject to specific protection measures. The specific protection measures could include conditional access mechanisms, suitable virus protection software and firewalls and may be necessary in the light of the services that it provides, the value of information that is stored therein and relevant Community law provisions. (i) Serious attack. In accordance with the objective set out in Article 1, this definition defines a minimum set of criteria to be applied when determining whether an attack against an information system is serious. Any one of these criteria is sufficient to make the attack serious for the purposes of this Framework Decision, and thus should be covered by national law. The criteria for a serious attack are that the offences of illegal access or illegal interference are: (i) against a protected system; or (ii) committed by a person with the intent to cause damage to a natural or legal person; or (iii) committed by a person with the intent to result in an economic benefit for the person committing the offence or for a third party. This phrase is taken from the Council Framework Decision of 28 May 2001 on combating fraud and counterfeiting of non-cash means of payment. Article 3 - Illegal Access to Information Systems This offence is intended to cover the offence of illegal access to information systems. This includes the notion of hacking an information system. As recognised in Article 1, Member States are free to exclude minor or trivial cases from the scope of the offence when transposing the Framework Decision into domestic law. The offence is required to be established in Member States laws only to the extent that the offence has been committed in the context of a serious attack as defined in Article 2. The Commission does not wish to undermine in any way the importance it attached to the use of effective technical measures to protect information systems. Nevertheless, it is an unfortunate fact that a high proportion of users leave themselves exposed to attacks by not having adequate (or even any) technical protection. To deter attacks against these users, it is necessary that criminal law covers unauthorised access to their systems even though there may not be adequate technical protection for their systems. For this reason, there is no qualification to the offence that requires that security measures must have been overcome for the offence to have been committed. Article 4 - Interference with Information Systems This offence covers: (a) the hindering or interruption, without right, of the functioning of an information system by inputting or transmitting computer data. This specifically addresses the problem of so-called denial of service attacks where there is a deliberate attempt to overwhelm an information system. The offence also covers the interruption of the functioning of an information system, which could be inferred from the phrase hindering but is included here explicitly for the sake of clarity. (b) the hindering or interruption, without right, of the functioning of an information system by damaging, deleting, deteriorating, altering or suppressing computer data. This specifically addresses the problem of viruses, and other types of attacks, which are directed at hindering or interrupting the functions of the information system itself. (c) the damaging, deletion, deterioration, alteration, suppression or rendering inaccessible of computer data on an information system without right. This covers virus attacks aimed at the content (or computer data) on the information system, as well as corruption of websites. Subparagraphs (a), (b) and (c) are intended to address the issue of denial of service attacks and attacks using malicious code often described as virus attacks. Subparagraphs (a) (b) use the word hindering or interruption as a constituent element of the offence in order to describe the effects of such an attack. The meaning of the word hindering is not defined, as hindering could take different forms and its level could vary depending upon the type of the attack and the technical capacities of the information system being attacked. Each Member State shall determine for itself what criteria must be fulfilled in order for an information system to be considered as hindered. However, minor nuisances or disruptions in the functioning of the services should not be considered as fulfilling the threshold of seriousness. As above, Member States are free to exclude minor or trivial cases from the scope of the offence when transposing the Framework Decision into domestic law. The offences are required to be established in Member States laws only to the extent that they have been committed in the context of a serious attack as defined in Article 2. Article 5 - Instigation, aiding, abetting and attempt Article 5(1) puts an obligation on Member States to ensure that the intentional instigation of, aiding or abetting offences against information systems as described in Articles 3 and 4 are punishable. Article 5(2) specifically concerns attempt. It puts an obligation on Member States to ensure that attempt to commit any of the offences against information systems described in Articles 3 and 4 is punishable. Article 6 Penalties Paragraph 1 requires MemberStates to take the necessary measures to ensure that the offences defined in Articles 3-5 are punishable by effective, proportionate and dissuasive penalties. By virtue of this paragraph, MemberStates are required to lay down penalties commensurate with the gravity of the offence, which includes custodial sentences with a maximum term of imprisonment of no less than one year in serious cases. The maximum penalty of at least one year imprisonment brings these offences under Article 2 and 3 within the scope of the Council Framework Decision of 26 June 2001 on money laundering, the identification, tracing, freezing, seizing and confiscation of the instrumentalities and the proceeds from crime. In keeping with the nature of all framework decisions, which are binding on the MemberStates as regards the result to be achieved, but leave the choice of form and means to their discretion, the MemberStates retain some degree of flexibility to adapt their legislation to these rules and to determine the severity of the penalties that apply, within the limits imposed by the Framework Decision, particularly the aggravating circumstances in Article 7. The Commission would stress that it is for the MemberStates to decide the criteria for determining the gravity of an offence, on the basis of their respective legal systems. Punishment need not always take the form of imprisonment. Paragraph 2 provides the possibility for MemberStates to impose fines in addition to or as an alternative to custodial sentences, in line with their respective traditions and legal systems. Article 7 - Aggravating circumstances This Article provides for MemberStates to increase the penalties defined in Article 6 under certain circumstances. The Commission would stress that the list of aggravating circumstances provided in this Article is without prejudice to any other circumstances regarded as aggravating in MemberStates' legislation. This list takes into account the aggravating circumstances described in the national provisions in MemberStates and as laid down in previous Commission proposals for Framework Decisions. If one of the following conditions listed in paragraph 1 is fulfilled then the maximum term of imprisonment may not be less than four years: (a) a person participating in a criminal organisation as defined by Joint Action 98/733 JHA, and acting for the benefit of that organisation; (b) the offence was intended to cause, or result in, substantial direct or indirect economic loss, physical harm to a natural person or substantial damage to part of the critical infrastructure of the Member State; (c) the offence was intended to cause, or result in, substantial proceeds; or (d) the offender has been convicted of one or more similar offences by a final judgement in a Member State of the Union. This is the principle of recidivism, which takes account of any convictions obtained in other Member States. Article 8 - Mitigating circumstances This article provides for mitigating circumstances in which a Member State may decide to reduce the penalties referred to in Articles 6 and 7 where, in the opinion of the competent judicial authority, the offender caused only minor damage. Article 9 - Liability of legal persons In line with the approach taken in a number of legal instruments adopted at EU level to combat different types of criminality, it is necessary also to cover the situation in which legal persons are involved in attacks against information systems. Article 9 therefore contains provisions for holding a legal person liable for the offences envisaged by Articles 3, 4 and 5, committed for their benefit by any person with certain leading positions, acting either individually or as a part of the organ of the legal person. The term liability should be construed so as to include either criminal or civil liability. In addition, according to standard practice, paragraph 2 provides that a legal person can also be held liable when the lack of supervision or control by a person in a position to exercise control, has rendered possible the commission of the offences for its benefit. Paragraph 3 indicates that legal proceedings against a legal person do not preclude parallel legal proceedings against a natural person. Article 10 - Sanctions on legal persons Article 10 sets out a requirement for sanctions for legal persons held liable for the offences referred to in Articles 3, 4 and 5. It requires effective, proportionate and dissuasive sanctions, where the minimum obligation is to impose criminal or non-criminal fines. Other sanctions that could typically apply to legal persons are also indicated. Article 11 - Jurisdiction The international nature of offences involving attacks against information systems means that an effective legal response requires procedural provisions on jurisdiction and extradition which should be clear and farreaching at the European Union level, to ensure that offenders cannot escape prosecution. Paragraph 1 sets out a series of criteria for conferring jurisdiction on national judicial authorities to prosecute and investigate cases involving the offences referred to in this framework decision. A MemberState will establish its jurisdiction in three situations: (a) where the offence is committed in whole or in part on its territory, irrespective of the status of the legal person or the nationality of the natural person involved (territoriality principle); (b) where the offender is a national of that MemberState (active personality principle) and the act affects individuals or groups of that State. MemberStates that make no provision for extradition are responsible for prosecuting their own nationals who have committed offences abroad; (c) where the offence is committed for the benefit of a legal person established in the territory of that MemberState. Paragraph 2 is intended to ensure that when establishing its jurisdiction over the offences based on the territoriality principle in paragraph 1(a), each Member State ensures that its jurisdiction includes cases where: (a) the offender commits the offence when physically present on its territory, whether or not the offence is against an information system on its territory. For example, a person obtaining illegal access to (hacking) an information system in a third country from the territory of the Member State; or (b) the offence is against an information system on its territory, whether or not the offender commits the offence when physically present on its territory. For example, a person obtaining illegal access to (hacking) an information system on the territory of the Member State from the territory of a third country. Given that not all MemberStates' legal traditions recognise extraterritorial jurisdiction for all types of criminal offence, the first subparagraph of paragraph 3 allows them not to apply the rules on jurisdiction set out in paragraph 1 as regards the situations covered by paragraph 1(b) and (c). Paragraph 4 states that the Member States shall inform the General Secretariat of the Council and the Commission where they decide to apply paragraph 3. Article 12 - Extradition and prosecution This article shall no longer be applicable as soon as the Commission's proposal for a European arrest warrant is adopted, which will replace extradition within the EU. In particular, the European arrest warrant proposal does not foresee that nationality be a ground for refusal. Article 12 takes account of the fact that some Member States do not extradite theirown nationals and seeks to ensure that persons suspected of having committed serious attacks against information systems do not evade prosecution because extradition is refused on the grounds that they are nationals of that State. A Member State which does not extradite its own nationals must take the necessary measures to establish its jurisdiction over and, where appropriate, prosecute the offences concerned when committed by its own nationals on the territory of another Member State. Article 13 Exchange of InformationCo-operation between MemberStates The purpose of Article 13 is to take advantage of the international instruments on judicial co-operation to which MemberStates are parties and which should apply to the matters covered in this Framework Decision. For instance, arrangements on mutual legal assistance and extradition are contained in a number of bilateral and multilateral agreements as well as conventions of the European Union. This Article also seeks to facilitate the exchange of information by ensuring that there are . Paragraph 1 calls on the MemberStates to lend each other every possible assistance in matters of judicial and police procedure relating to offences against information systems. Paragraph 2 states that if several MemberStates have jurisdiction, they will consult one another with a view to co-ordinating action and, where appropriate, to bringing effective prosecutions. The paragraph also points out that full use should be made of existing co-operation mechanisms, judicial or otherwise, such as Europol, the exchange of liaison magistrates, the European Judicial Network and the Provisional Judicial Co-operation Unit. Paragraphs 3 and 4 cover operational points of contact. This is important for effective police co-operation. In particular, the need for all Member States to join the G8 network of points of contact was recognised by the Justice and Home Affairs Council on 19 March 1998 and more recently when it adopted a Council Recommendation on contact points maintaining a 24-hour service for combating high-tech crime. Article 14 - Implementation Article 14 concerns the implementation and follow-up of this Framework Decision. Paragraph1 requires the MemberStates to take the necessary measures to comply with this Framework Decision not later than 30 June 2003. Paragraph 2 states that the MemberStates shall transmit by that date to the General Secretariat of the Council and to the Commission the provisions transposing the obligations imposed on them under this Framework Decision into national law. The Council shall assess within one year, on the basis of that information and a Commissions written report, the extent to which Member States have complied with the obligations imposed by the Framework Decision. Article 15 Entry into force Article 15 states that the Framework Decision will enter into force on the twentieth day following that of its publication in the Official Journal of the European Communities. 2001/ (CNS) Proposal for a COUNCIL FRAMEWORK DECISION on combating serious attacks against information systems THE COUNCIL OF THE EUROPEAN UNION, Having regard to the Treaty on European Union, and in particular Articles 29, 30(a), 31 and 34(2)(b) thereof; Having regard to the proposal of the Commission; Having regard to the opinion of the European Parliament; Whereas: (1) There is evidence of serious attacks against information systems, in particular as a result of the threat from organised crime, and increasing concern at the potential of terrorist attacks against information systems which form part of the critical infrastructure of the Member States. This constitutes a threat to the achievement of a safer Information Society and an Area of Freedom, Security and Justice, and therefore requires a response at the level of the European Union. (2) An effective response to such threats requires a comprehensive approach to network and information security, as underlined in the eEurope Action Plan and in the Communication by the Commission Network and Information Security: Proposal for a European Policy Approach (3) Significant gaps and differences in Member States laws in this area hamper the fight against organised crime and terrorism, and act as a barrier to effective police and judicial co-operation in the area of serious attacks against information systems. The trans-national and borderless character of modern electronic communication networks means that attacks against information systems are often international in nature, thus underlining the urgent need for further action to approximate criminal laws in this area. (4) The Action Plan of the Council and the Commission on how to best implement the provisions of the Treaty of Amsterdam on an area of freedom, security and justice, the Tampere European Council on 15-16 October 1999, the Santa Maria da Feira European Council on 19-20 June 2000, the Commission in the Scoreboard and the European Parliament in its Resolution of 19 May 2000 indicate or call for legislative action against high technology crime, including common definitions, incriminations and sanctions. (5) It is necessary to complement the work performed by international organisations, in particular the Council of Europes work on approximating criminal law and the G8s work on transnational co-operation in the area of high tech crime, by providing a common approach in the European Union in this area. This call was further elaborated by the Communication from the Commission to the Council, the European Parliament, the Economic and Social Committee and the Committee of the Regions on Creating a Safer Information Society by Improving the Security of Information Infrastructures and Combating Computer-related Crime (6) The objectives of this Framework Decision are to approximate criminal law in the area of serious attacks against information systems, in particular to contribute to the fight against organised crime and terrorism, and to ensure the greatest possible police and judicial co-operation in the area of criminal offences related to serious attacks against information systems. (7) Article 29 of the Treaty of the European Union specifically refers to terrorism and organised crime as forms of crime which must be prevented and combated at European level through closer co-operation between police forces and judicial authorities and approximation of the criminal law provisions of Member States. (8) The Framework Decision on combating terrorism creates the terrorist offence of an attack against information system, but this need to be supplemented by greater approximation of the constituent elements of offences against information systems. This Framework Decision provides that greater level of approximation and will thus improve police and judicial co-operation in the area of terrorist offences against information systems. (9) In accordance with Article 47 of the Treaty on European Union, this Framework Decision is without prejudice to Community law, and in particular to privacy or data protection rights and obligations provided for under Community law in accordance to the Directives 95/46/EC and 97/66/EC. Much has already been achieved in the field of Community law to protect information systems, such as under Directives 95/46/EC and Directive 97/66/EC, and in particular that providers of publicly available telecommunications services must take appropriate technical and organisational measures to safeguard the security or confidentiality of their services, and that these measures must ensure a level of security appropriate to the risk presented. (10) Common definitions in this area, particularly of information systems and computer data, are important to ensure a consistent approach in Member States in the application of this Framework Decision. (11) There is a need to achieve a common approach to the constituent elements of criminal offences by providing for a common offence of illegal access to an information system, and illegal interference with an information system. (12) There is a need to avoid over-criminalisation, particularly of trivial or minor conduct, as well as the need to avoid criminalising right-holders and authorised persons such as legitimate private or business users, managers, controllers and operators of networks and systems, legitimate scientific researchers, and authorised persons testing a system, whether a person within the company or a person appointed externally and given permission to test the security of a system. (13) There is a need for Member States to provide penalties for attacks against information systems which are effective, proportionate and dissuasive, including custodial sentences in serious cases; (14) It is necessary to provide for more severe penalties when certain circumstances accompanying a serious attack against an information system make it an even greater threat to society. In such cases, sanctions on perpetrators should be sufficient to allow for serious attacks against information systems to be included within the scope of instruments already adopted for the purpose of combating organised crime such as the 98/733/JHA Joint Action on making it a criminal offence to participate in a criminal organisation. (15) Measures should be taken to enable legal persons to be held liable for the criminal offences referred to by this act which are committed for their benefit, and to ensure that each Member State has jurisdiction over offences committed against information systems in situations where the offender is physically present on its territory or where the information system is on its territory. (16) Measures should also be foreseen for the purposes of cooperation between MemberStates with a view to ensuring effective action against attacks against information systems. (17) In accordance with the principles of subsidiarity and proportionality this Council Framework Decision confines itself to the minimum required in order to achieve those objectives at European level and does not go beyond what is necessary for that purpose. (18) This Framework Decision respects the fundamental rights and observes the principles recognised in particular by the Charter of Fundamental Rights of the European Union, and specifically Chapter XI on Justice thereof HAS ADOPTED THIS FRAMEWORK DECISION: Article 1 Scope and objective of the Framework Decision The objective of this Framework Decision is to improve co-operation between judicial and other competent authorities, including the police and other specialised law enforcement services of the Member States, through approximating rules on criminal law in the Member States in the area of serious attacks against information systems with special regard to organised crime and terrorism. This Framework Decision is without prejudice to Community law. Article 2 Definitions 1. For the purposes of this Framework Decision, the following definitions shall apply: (a) Electronic communications network means transmission systems and, where applicable, switching or routing equipment and other resources which permit the conveyance of signals by wire, by radio, by optical or by other electromagnetic means, irrespective of the type of information conveyed or technology employed. (b) Computer means any device or group of inter-connected or related devices, one or more of which, pursuant to a program, performs automatic processing of computer data. (c) Computer data means any representation of facts, information or concepts which has been created or put into a form suitable for processing in an information system, including a program suitable for causing an information system to perform a function. (d) Information System means computers and electronic communication networks, as well as computer data stored, processed, retrieved or transmitted by them for the purposes of their operation, use, protection and maintenance. (e) Legal person means any entity having such status under the applicable law, except for States or other public bodies in the exercise of State authority and for public international organisations. (f) Authorised person means any person who has the right, by contract or by law, or the lawful permission, to use, manage, control, test, conduct legitimate scientific research or otherwise operate an information system and who is acting in accordance with that right or permission. (g) Without right shall exclude conduct by authorised persons or other conduct recognised as lawful under domestic law. (h) Protected system means the whole or any part of an information system which is subject to specific protection measures. (i) Serious attack means illegal access or illegal interference : (i) against a protected system; or (ii) committed by a person with the intent to cause damage to a natural or legal person; or (iii) committed by a person with the intent to result in an economic benefit for the person committing the offence or for a third party. Article 3 Serious attacks through illegal access to Information Systems Each Member State shall take the necessary measures to ensure that the intentional access, without right, to the whole or any part of an information system is punishable as a criminal offence where the conduct constitutes a serious attack. Article 4 Serious attacks through interference with Information Systems Each Member State shall take the necessary measures to ensure that the following intentional conduct, without right, is punishable as a criminal offence where it constitutes a serious attack: (a) the serious hindering or interruption of the functioning of an information system by inputting or transmitting computer data. (b) the serious hindering or interruption of the functioning of an information system by damaging, deleting, deteriorating, altering or suppressing computer data. (c) the damaging, deletion, deterioration, alteration, suppression or rendering inaccessible of computer data on an information system. Article 5 Instigation, aiding, abetting and attempt 1. Each Member State shall take the necessary measures to ensure that the intentional instigation of, aiding or abetting an offence referred to in Articles 3 and 4 is punishable. Each Member State shall take the necessary measures to ensure that attempt to commit the offences referred to in Articles 3 and 4 is punishable. Article 6 Penalties 1. Each Member State shall take the necessary measures to ensure that an offence referred to in Articles 3-5 is punishable by effective, proportionate and dissuasive penalties including a custodial sentence with a maximum term of imprisonment of no less than one year. 2. MemberStates shall provide for the possibility of imposing fines in addition to or as an alternative to custodial sentences. Article 7 Aggravating circumstances Without prejudice to any other aggravating circumstances defined in their national legislation, MemberStates shall provide for a maximum term of imprisonment of no less than four years when one of the following aggravating circumstances in respect of the offences referred to in Articles 3, 4 and 5 are fulfilled: (a) a person is participating in a criminal organisation as defined by Joint Action 98/733 JHA, and is acting for the benefit of that organisation; (b) the offence was intended to cause, or result in, substantial direct or indirect economic loss, physical harm to a natural person or substantial damage to part of the critical infrastructure of the Member State; (c) the offence was intended to cause, or result in, substantial proceeds; or (d) the offender has been convicted of one or more similar offences by a final judgement in a Member State of the Union. Article 8 Mitigating circumstances Without prejudice to any other mitigating circumstances defined in their national legislation, MemberStates shall take the necessary measures to ensure the penalties referred to in Articles 6 and 7 can be reduced, where, in the opinion of the competent judicial authority, the offender caused only minor damage. Article 9 Liability of legal persons 1. Each Member State shall take the necessary measures to ensure that legal persons can be held liable for conducts referred to in Articles 3, 4 and 5, committed for their benefit by any person, acting either individually or as part of an organ of the legal person, who has a leading position within the legal person, based on: (a) a power of representation of the legal person, or (b) an authority to take decisions on behalf of the legal person, or (c) an authority to exercise control within the legal person.; as well as for involvement as accessories or instigators in the commission of such offences. 2. Apart from the cases already provided for in paragraph 1, each Member States shall take the necessary measures to ensure that a legal person can be held liable where the lack of supervision or control by a person referred to in paragraph 1 has made possible the commission of the offences referred to in Articles 3, 4 and 5 for the benefit of that legal person by a person under its authority. 3. Liability of a legal person under paragraphs 1 and 2 shall not exclude criminal proceedings against natural persons who are perpetrators, instigators or accessories commit offences or engage in the conducts referred to in Articles 3, 4 and 5. Article 10 Sanctions for legal persons 1. Each Member States shall take the necessary measures to ensure that a legal person held liable pursuant to Article 9(1) is punishable by effective, proportionate and dissuasive sanctions, which shall include criminal or non-criminal fines and may include other sanctions, such as: a) exclusion from entitlement to public benefits or aid; b) temporary or permanent disqualification from the practice of commercial activities; c) placing under judicial supervision; or d) a judicial winding-up order. 2. Each Member State shall take the necessary measures to ensure that a legal person held liable pursuant to Article 9(2) is punishable by effective, proportionate and dissuasive sanctions or measures. Article 11 Jurisdiction 1. Each Member State shall take the necessary measures to establish its jurisdiction with regard to the offences referred to in Articles 3, 4 and 5 where the offence has been committed: (a) in whole or in part within its territory; or (b) by one of its nationals and the act affects individuals or groups of that State, provided that the law of that Member State may require the conduct to be punishable also in the country where it occurred; or (c) for the benefit of a legal person that has its head office in the territory of that Member State. 2. When establishing jurisdiction in accordance with paragraph (1)(a), each Member State shall ensure that it includes cases where: (a) the offender commits the offence when physically present on its territory, whether or not the offence is against an information system on its territory; or (b) the offence is against an information system on its territory, whether or not the offender commits the offence when physically present on its territory. 3. Without prejudice to Article 12, anyA Member State may decide that it will not to apply, or to that it will apply only in specific cases or circumstances, the jurisdiction rule set out in: - paragraphs 1(b); - and paragraph 1(c). 4. Member States shall inform the General Secretariat of the Council and the Commission accordingly where they decide to apply paragraph 3, where appropriate with an indication of the specific cases or circumstances in which the decision applies. Article 12 Extradition and prosecution 1. (a) Any Member State which, under its law, does not extradite its own nationals shall take the necessary measures to establish its jurisdiction over the offences referred to provided for in Articles 3, 4 and 5 when committed by its own nationals on the territory of another Member State. 2. (b) Each Member State shall, when one of its nationals is alleged to have committed, in another Member State, an offence referred to involving the conduct described in Articles 3, 4 and 5, and it does not extradite that person to that other Member State solely on the ground of his nationality, submit the case to its competent authorities for the purpose of prosecution if appropriate. In order to enable prosecution to take place, the Member State in which the offence was committed shall forward to the competent authorities of the other State all the relevant the files, information and exhibits relating to the offence shall be forwarded in accordance with the procedures laid down in Article 6(2) of the European Convention on Extradition of 13 December 1957. The requesting Member State shall be informed of the initiation and outcome of any prosecution initiated and of its outcome.. 32. For the purpose of this Article, a "national" of a Member State shall be constructed in accordance with any declaration made by that State under Article 6(1)(b) and (c) of the European Convention on Extradition. Article 13 Exchange of informationCo-operation between MemberStates 1. In accordance with the applicable conventions, multilateral or bilateral agreements or arrangements, MemberStates shall afford each other the widest measure of mutual assistance in respect of proceedings relating to the offences provided for in this Framework Decision. 2. Where several MemberStates have jurisdiction in respect of offences envisaged by this Framework Decision, they shall consult one another with a view to co-ordinating their action in order to prosecute effectively. They shall make full use of judicial co-operation and other mechanisms. 13. For the purpose of exchange of information relating to the offences referred to in Articles 3-5, and in accordance with data protection rules, Member States shall ensure that they establish operational points of contact available twenty four hours a day and seven days a week. 24. Each Member State shall inform the General Secretariat of the Council and the Commission of its appointed point of contact for the purpose of exchanging information on offences relating to attacks against information systems. The General Secretariat shall notify that information to the other Member States of these appointed points of contact. Article 14 Implementation 1. Member States shall bring into force the measures necessary to comply with this Framework Decision by 30 June 2003. 2. By 30 June 2003, Member States shall forward to the General Secretariat of the Council and to the Commission the text of the provisions transposing into their national law the obligations imposed upon them under this Framework Decision. The Council shall, by 30 June 2004, on the basis of a report established on the basis of this information and a written report by the Commission, assess the extent to which Member States have taken the necessary measures in order to comply with this Framework Decision. Article 15 Entry into force This Framework Decision shall enter into force on the twentieth day following that of its publication in the Official Journal of the European Communities. Done at Brussels, For the Council The President  Communication from the Commission to the Council, the European Parliament, the European Economic and Social Committee and the Committee of the Regions Network and Information Security: Proposal for a European Policy Approach of 6.6.2001. COM (2001) 298 final.  According to a survey published by the Communications Management Association (CMA), there have been hacking attacks against a third of UK's big companies and public sector organisations, including government offices, causing damage ranging from infiltrating corporate bank accounts to information theft. See the survey at http:/www.cma.org.  Proposal for a Council Framework Decision on the European arrest warrant and the surrender procedures between the Member States. COM(2001) 522 final. Adopted by the Commission on 19.9.2001.  Proposal for a Council Framework Decision on combating terrorism. COM(2001) 521 final. Adopted by the Commission on 19.9.2001  The IST Programme is managed by the European Commission. It is part of the 5th Framework Programme, which runs from 1998 to 2002. More information is available at  HYPERLINK http://www.cordis.lu/ist http://www.cordis.lu/ist.  Under the auspices of the Joint Consultative Group of the EC/US Science and Technology Co-operation Agreement.  The Computer Security Institute (CSI) and the Federal Bureau of Investigation (FBI) produce an annual "Computer Crime and Security Survey" published early in each year. CSI's website and further details about the survey may be found at www. gocsi.com  The Italian Ministry of Interior recently published statistics on its operational activities against computer-related crime in 1999 and 2000 (see at  HYPERLINK http://www.mininterno.it/dip_ps/dcpsffp/index.htm) http://www.mininterno.it/dip_ps/dcpsffp/index.htm). Official reports of hacking cases in 2000 are 98, four times the figure reported in 1999, when only 21 cases were officially recorded.  Council doc. 8123/01 ENFOPOL 38. Available from the Council website http://db.consilium.eu.int/jai  European Economic Crime Survey 2001, PricewaterhouseCoopers 2001 ( http://www.pwcglobal.com )  The Cybercrime Survey 2001, Confederation of British Industry (see  HYPERLINK http://www.cbi.org.uk http://www.cbi.org.uk )  Presidency Conclusions of the Lisbon European Council of 23 and 24 March 2000, available at http://ue.eu.int/en/Info/eurocouncil/index.htm.  COM (2000) 890 final  OJ L. 281, 23-11-1995, p. 0031-0050, OJ L. 024, 30-01-1998, p. 0001-0008  The IST Programme is managed by the European Commission. It is part of the 5th Framework Programme, which runs from 1998 to 2002. More information is available at  HYPERLINK http://www.cordis.lu/ist http://www.cordis.lu/ist.   HYPERLINK http://db.consilium.eu.int/en/Info/eurocouncil/index.htm http://db.consilium.eu.int/en/Info/eurocouncil/index.htm.  The Prevention and control of organised crime: A European Union strategy for the beginning of the new Millennium (OJ 2000 C124, 3.5.2000).  http://europa.eu.int/comm/off/work_programme/index_en.htm  http://europa.eu.int/comm/dgs/justice_home/pdf/com2001-278-en.pdf  Directive 1999/93/EC of the European Parliament and of the Council of 13 December 1999 on a Community framework for electronic signatures, OJ L. 13 of 19/01/2000  OJ L. 178, 17-7-200, p. 0001-0016  The Draft text is available on the web, in two languages, in French :  HYPERLINK http://conventions.coe.int/treaty/fr/projets/cybercrime.htm http://conventions.coe.int/treaty/fr/projets/cybercrime.htm. and in English:  HYPERLINK http://conventions.coe.int/treaty/en/projets/cybercrime.htm http://conventions.coe.int/treaty/en/projets/cybercrime.htm.  Directive 1999/93/EC of the European Parliament and of the Council of 13 December 1999 on a Community framework for electronic signatures, OJ L. 13 of 19/01/2000  OJ L. 178, 17-7-200, p. 0001-0016  The International Organization for Standardization (ISO) is a worldwide federation of national standards bodies from some 100 countries.  OJ L 122 , 17/05/1991 P. 0042 - 0046  OJ L 182/1, 5.7.2001 The phrase is taken from the Judgment given by the Court of Justice on 21 September 1989 in Case 68/88 [1989] ECR 2965.  OJ L 182, 5-7-2001, p.1  OJ C 316, 27.11.1995.  OJ L 105, 27.4.1996.  OJ L 191, 7.7.1998.  OJ L 324, 21.12.2000.  OJ C 187/5, 3.7.2001  COM (2001) 298  OJ C 19, 23.1.1999  COM (2001) 278 final  A5-0127/2000  COM (2000) 890  Proposal for a Council Framework Decision on combating terrorism. COM(2001) 521 final. Adopted by the Commission on 19.9.2001  OJ L 351/1, 29.12.1998 PAGE   DOCPROPERTY "Classification" \* MERGEFORMAT   PAGE   PAGE \* MERGEFORMAT 25  DOCPROPERTY "Classification" \* MERGEFORMAT   BCYZxyz{   = k D-o{~[\!!+!,!(L(M(((())i,j,b.2/3/4/Q/R/W1X1^144446689N:O:;;===>??6hB*6j0J3UhhOJQJ j0J3U j;U5 jx5U5CJ OJQJ jUMBCNY|    $=(&%x$# $$`0$;$9BCNY|    &3 = -~ i`#%()5/3½}zR   Rr   Q QQoQQ_  '  *=(&%x$#;  9/ &3 = -ussssQCEƀ*Z..CEƀ*Z.* ~ i`#%()5/3uCEƀ*Z..CEƀ*Z..Q 335X8;t>MBkFFILMNkSrVXYY7^X^^b5e4hLhhsikm/qqtuu˽{vqle[h%   h QQQQ6QQ _     ZaZ   Z   2 '   !335X8;t>MBkFFILwCEƀ*Z..CEƀ*Z.. ?@BBCCHEIEEEgFhF!H,H~NNPPQQ:TET1U2UX^^ b bbb4e5e3h4hKhhhviikk=k>km"m9mAnooToHppp2qDqqqqqdueuuuvvvvyyyyX{f{~~~~؃hmH j0J3UhmH nH  hmH nH H*mH mH 6mHmH65B* j0J3UhPLMNkSrVXYY7^wCEƀ*Z.CEƀ*Z..7^X^^b5e4hLhhsikm/qqtQ & F0dCEƀ*Z. tuuuiJh & FEƀ*Z Jh & FEƀ*Z Jh & FEƀ*Z uu~vvyS{8}\}}~؃օ4Mˎ A8ŗS*x^t|yvspmjf 7 rlV VaJ_85gV~VVQQQh  hZ  h  (u~vvyS{8}\}}~؃օ4M0VQ h & FJh & FEƀ*Z ˎA^t6ʤѥAڪ\jĮLrвѲs!j0J3B*UcHdh+ZgHB*cHdh+ZgHHh+ZHB*B*cHdh+ZgH5cHdh+ZgHHh+ZH5Hh+ZHB*hmH Hh+ZHB*5B*B* j0J3U58ˎ A8ŗS*x^t6gt:0 & F%0$6gt:YѥڧAڪV\ `/0>NiƸ6g~ytowwwwwФq8(Υ&%d צ*|4ۯ4]!]f޸úлy):YѥڧAڪV\ `/0>Ni(&%d$C$$$0_`-/MN !#Q*opShmn$&7>ACP78;IPQTUcHdh+ZgHmH 6cHdh+ZgHcHdh+ZgHHh+ZH cHgH j0J3U6B*B*5B*5JƸ6gi5\5C$ w$ & F; w & F;8i5\#Q+opU>6zĿ}zupkfa\VVQQQQQǃQȄQvQ 6#$c666 !5Fw#w(wۋwdwsw:wwwΓwwgww!$#Q+opU>0Q 7 7*$ $6DC$Eƀ+Z>6zHu] J & F0$6VQHu]^%'1J*piS[GFpht6VhVQ6J Jy Jzz6zQK{Q{Qr|2}p}6z}j~~6~V<H]^%&0Q$$ J & F0$6OJ & F; hEƀ*Z.$%&'1J &.KP\]dE_mn¹¹5cHdh+ZgHHh*ZHcHdh*ZgHHh*ZHcHdh*ZgHcHdh*ZgHcHdh*ZgHHh*ZHcHdh+ZgHHh'+ZHW(+ZcHdh#+ZgH5Hh+ZHcHdh+ZgH2&'1J*pmkiiiVQDC$Eƀ+ZC$$6DC$Eƀ'+Z iS[GFYph0Q$Q$C$VQ$6Q0VSVDGWZ^_jt 7CP3?_k*=ècHdh*ZgHHh*ZHHh*ZHcHdh*ZgHHh*ZHcHdh*ZgHcHdh*ZgHHh*ZHHh*ZHcHdh*ZgHhmH Hh*ZHcHdh*ZgH54ht6Vh H[l{  4@&Q00QC$Q$6 456783UV F{|     % & ' e     Ǽ}jIU jUh hmH nH  j0J3U6B*Hh*ZH6cHdh*ZgHcHdh*ZgH55cHdh*ZgHHh*ZH5cHdh+ZgHcHdh*ZgHHh*ZHcHdh*ZgHHh*ZH1 H[lz{  &    z^Q9LsiX,D[q<JK2 4 6Q> &    z^Q9LsiX,44$4           o }   VWXz{!"CDEZ[^_QR6789:<=LMst)*+jdUj Uj2UjcU0Jj"U5 j0J3Uh jUM+fgyzUXY ,-.BCDEFKMYZ[\]opqrswx j0JOU hmH nH mH 0J3H*mHmH0J3H*hmH  j0J3UjU jUO,D[q<=>?722&`#$4   89:;KmH jU j0JOU0JO?@ABCDEFGHIJK72 0. A!"#n$n%. A!"#n$n%. A!"#n$n%. A!"#n$n%xDd3"<  C A2R;SC !S8w&%D`!R;SC !S8w&%'o`xA x1HQƿw9GNbqV)R!$VM$`B,JAD P%utS ..T1PPA) Vʽw__)Xx=*xw#j^ycګ/]yJ~bB%/=L=8@2C X$5Z;KB!GEj#1zؠn}npkᾲb\ ֺ{/Ja]TaVN7)mֺmveL`@2e2Y^$)ֺm7 %4?|R {JN)OtW.d^dI"W/iֺmOeO/ pMJsñoFWB#WFq RZ IP`DdQFsa"$]*k0Nf'fUScyjC/SAQ}e[[WrvҐ.imzȍҘzhhO3v#S~:oD0LFBDiY3P"L}pwpW({Pсԛətݷ5j k3mO3n6V re2˂7Ddf^ <  C Ab7EWTsvyf6n6EWTsvyfPNG  IHDRfz{ugAMA pHYs**6- IDATx{XWH@vl+0C[SOڋvvZuuZ;^TmǢVFc)XPti,1! obs{K}a}c=s$N({Ozo {}Hb'N+ c;Lֆ\[$ -EiqitTH JAӌƔ 4W:/npK*t1gٻ.\0s+ $vL+;Ǻ*Ml v}.'Yk|M&S&qEVmnh,7LxrjtXu]E=5ay~Qb)TX2V 8'7[:ߧgTBd8'3Zn9K~P@0bLf]nU$tC MD[]WGPӖns4 t:m[o:n ݐ  $tq.~M $#YMGcB7pG5t|]3ܳ^&pGȴ.XZNM "4D&k0zATPow=[%E~w&o|G&6@:A>wpKk_52̥Z$S%I J$g{+&c([oq$DUj/e7Qv.24|Di5'/%R\<0aX;eP^<2"R"kɕAyގ5tn_@"8s=(_B#?1Gb]AYZDs:Ud::-,^P"*: mMe*&7z^NTM^չd862]z=G&yPk]N b+ܨ՛Ͷ.^Ah3v ?F)3=!=%bH[)-6~lXl_]o.OV1w`RvΓOB(6f:BЩSYLvx01g4@^aQ.C&O?vZvҼ>gElEuu_?7Y $ϊLNs-jѷ?ƯQmh,ϒF%Orwlfq dZ_@̤ɯДR. jC!lLPub&kCuϏ=2s_?4/ۆiBgD*&G>/1b3 K8.=N?LRT}y`&i^E]R]diuMW&vQɗ͝4'=}>XLv_M4ζ4mPj7ʃ&;"Rg~N`#.~50W~szxws EGO!TU6_WCjOe^D+vfKzRAYtc|T@lM8TcTU6w+Gsh}SBDo-{UvZنY31wo;y1gb&="bMҼ Y' z^BHf!T y w-rCUZS cƢ;/IY+Xد9ДP"@"^~)Ix}ۛ?~Ap-ïNrG$EnIE}776 wV~4/)¼DR6d0YNDfWrЮrݢ;jB7? y(|-W|s:L'3vPTmh_ǓGfAyi8J3$/OTj2 D>PUZz!5;"OTZS!?l|`V1X,|~RVҭU6QZ_|jmO$LfXsc+/VħKIYFLn})& ΣM++mѷ=O2QwgSU Ve. [ .totVyr 2/b / VXxK9!"}E͈ WUjCk^ fHIW{pW)pF*s6UYOYE'}7n2bgOn^YV{pF%=q?ؽ^Sg&ch@V /6k̈ ~ņonE߶#pȰSm"-x(5VYfS.de9)s l+l0zA (.\Vh#+o?ռF0vdR.:_@b/iko6%[ -"7T>WWoj쯩V"x[1֭[W F%߲!.cݺE Wl:@Vvvd ?ep*.> wejv>ևd1"r-Cg *~4*?SGڪF5B5*yE~6=9l/DPkd=*J,GyE+w U3-}5W3R5,(fHr-GBb&M~E䓗?c|+g z+{?#_ 2bgo+ 1k}arT|>Nw?[lDCi38/eAi"KEje|UF|>YIpўB5{)!/3"*I9Zz;u5IKFNβpϏ/|EztXWxko͓d-HJF6}oӨۗ^< .fFl:[`M<ܳpᤋ'?AZO<9P9ӄ}E-Zu?f~1jdvuSN b̥mkɊ}a{ahfͬ9)1P Qɋv?Q{{ukFT딫FSUe#GAiT?nYOqFN2!TR'pm S`=s#aձW "b I ҄mXۘoSmaoOL*5kKO_19Ϸq#TZ$GSZz}IO <>]f6 .7>O6/OLyWN'8/<۷B٨PP3UpK7Ve. h?eg=2B5/].\>v1剞Υ}'`D%' 2)WZzޒCúDZ*++Y 7ڢozhG{nٞ\{*12YbR<9uKoxs9Q ?KB57\SSÛӨv1q;U]7ëz7u_J$AIuXUhxdD(RcM64\M;>=@4ܥduGoѷas4?F8֍"n_v"x@fpXNp dY@FMBDx8ngvdN=56P?"QYrھ 2 z1Y k5bULؘXzƈA΍ݞ+WF ѬW݃b>2"h.a `Spo6G&B(mLۈ7OXu˼{>2m+8p 0vuax6:Uux])Q^볱\\Gb}dMvHZjq*zP!V'&3= ;O GfO`wUqB<Pluq3 zY"[akP0Nh&.ϜR@/ K"{Ƣ~y G_ }`gHBx;`'Rk vPE^_6=eQF$Eq4(S Jy,7 cecO y[`G ""oTK(0"@8}"uDΛ *PoTs20VT>B= jaf@ @)h:C?EbPolf04`|Єc4 }fXcs9k%ODgdLa1K^=w ᇝg-nc!+:q=+V75޽]U**HOհ79:t&KFU,i-:=Dݻ#ФƆ}5SO.!?LMҭ&Ә.8uMMD[łѨ%Wْ[-gX2mLƫن4Xj@vS@@sR!sC@Zp;"oHҩSQ.ٸظ,mn˯]ҐGw-LAZ3ro?9KtA,,8It\&[oI'}Jg+./Lز2o f9dj6\I&J9M^!Y 폤CRgMu$}J_k[isPũsXO%%n 2Yj8>3dh,D hO=Pk,B(XInTF{n6te*ܻSx5zM2iu؂) @4-ʣ^o tM{+.̰>6_Kzzim#?%Anhկ\b:c` #(9Lp6yy9mtˍ }7vLta1id2qҬv9$КJB~ :>!$2_;(Bd4KWwܠaV6߸4z.]\wIN+ H<, jj1vħ?O-!53"֙ML2cE-[YB@rQ~ƫDyva_ :bKH'~NSJNټ3$*u5\2qbc,wHM9[ɳ"PIlTU/\9YB~̮ØҐҐ'mkޮVRotxEꈁ^rOP?"b+2EPFd搎NLԻNY~~FzʋAP7WkHJOi1sR8B}޳Tq'rLn7qRݗLWvý-v{Vz h)HL7-}DZ2c;# ,ڞ1VFsFWfb1B@5ߤ !Ag<#FH 5aa}SD9rF#η|?AqK^kcqiFc!+k{애Vxɥ4Bc}slJ-;Ykd&lgz1S_ʞ|ldv Sø8/hB-(BKw HK@ѩ\{^ԢBǺuX_nbbIz$TլW¼Ƙ@/y4*RWidZҺ@ߜX>}q՜jitbRdSnNa5.y}2!+,zub;ۜx%b6k ^ !l $DP!-e WAIU5Y7LWeӫ>s M\&&QъcbiZ3]ũC <(/RiKd:os%35ZK}*ƉX5 fZ0&ULMx eq3Wӛeb􅉤,9zJ1~榶LPJ&ql6<ɼ_ ?z ?GFzbIUl0M*,8S]#O_xl4za3X2D0zJK oN~K.ݰxs1Fj]Wq}gD^ÄhIDATPj,feb[Aϯ v{[:?9묤:zGMj yyE?gf6,12m-I7'sv5뿶ǩa zmJKWkDTJ]ͶfwОY`BHмyvN#FXHoLޙyik>S&$<8v.&kjvvOws ‚tBMHas21XS9x,7JI!*9[AVv;CNK@[8Xn?vʞwiwW@\Ȱء-u{aDS617l`LL=Ӭ‚?9{);BhS\~1xKG74E]CX${}qcqR|fCꃗ~+ddLgAN?yjQ6_Ñ34^2KS9GO!nPBHTwͷUū].x rxv*SۙI'gTeEӧOwOOwM0={oY9fB..bϩmhBpo =?3f9dTUw#n<{HBh'@r2r)f2c-%~q3W3kKh;sZ2BcZ KR$[\*Qxɥ_zutj6#2GC,Ĵz^^YRMK}SŵrK`*^,$EٳϬ#؟Jc&'ur z)/rsrH)3Ias_1SCZĭT :yIN\%ޖN#i`-!+@ds8~Iw+lm~P\&.XCT̆% Bޭ"nJOŵ{7 R$qDS#}#;2kG VM{2 ^tD4er0K?;uh?gwd6%!ԩsTYSHq{kgc€MfJy]۝hő\J yfBFT=Y+&v8sS#_879/!7irNZEkh7 9j<ȎL0A/\UM!cѻ>dB.UMiddL),QV7.XڹM&VIcZX&{0.ŞS%a* > !Aﯘ d޼qOG_eB>Y m'?4ǒTB; TmXjn#!$hCl{d?UӠ_oV Knπe$&>6h?g,Xl۽-}h{JOCNO*H#9fa."!$_/ UN;2Et|T; JrvwxIq9M9QlbBSc*n*cXZ3M7aWPI 9u,oZ2(uZ12bGnX$R[{|S(V2K,E]?S>pIң09*)2,!~g{.IӲO_[ۡ)Z{$Lp_* ؞7?4$:!LmcyHNwHHMhi#aBLj#N.U* dDaJ2*/K#E@ӼHيKWPկ? Km#Cͦ[ML&$Kpf%*p =ZhLwEbBHW^e1iLwFOG_: xauOW566#kk[ B'/C7^u 6s~]B@)*>6,mzm 9@ JwV˙;/ݽuΝRPQPWׇDE]Թ$@J¯#̩;RDiFK?`@2 @ LH&P$( Jd%@2 @ LH&P$( J0Vb=vj839 `Iqсkz=Wcㆳqe ϝ=ƕg_pGؾ =8Lਿ?qˆƊJaǏ=6d ߞ B#2* ֌j UV;W$we~[&mѺgB}г(*2޲OjU/<<.cvK\L&#¶ ˗kj =t0kTx8 RM艇_+* MMWwT"Ta#=&Z7$<"<.6V8{T=vX>i$˞R2O JVZKfqсu:{X"b^L_ #ŸIY,_c6޽{r\8nx+S;' ߞǎ;{qz gџK퀗7Hc=ˁdb&?_dxz2}ա6;>>չslZ2I{ᆍ1x jE!t2K$S{ne gywW|~;K1*+W#.1 rE(/?飍{yq gYĽO@]ZƂI\{k27+A+a3V\aL&SO-Y{϶tj3=}w <~f1ͥ#Z ii,>r59[s~R4.>oow}+-3GR,;j ?СCr V,\hGG'cSyk'_Fvk$]L|}Tؕ|-ޅso38$~m^C?2uA(A˖سBx'\8}MZƚE ޿l;ئ(q$lj6-eW 0`h (!*JP_i"`ܪA.Akc%&d&pͥsn<+g;s>wUӰ{YU6oݭk(Jٞώmۏ|bޅgnp5^fv@H$卌B2c)-!t8}}y5ՑKjʲ'k5I/+/]P5dsg+j+V=fMF9HfӪt~^ʲ^ͧD"Cuuu&ڊmLkC o{{~BmBR)D2 -0Md͐FK2ޡh4'Զ-%%eeKlEl;# Iab,gRZ?G"&$6Vl>mxȆ#MX(%3 KP 9sfYnV+\ֻ[fmm$387fqjeC 3R*)yvjy=f XQ ¤,N-Ej=f-砚v澷I`=f A ɔdHmRUn/z$|]\pDɏaRijYyg$Z ,ۥ|1?9>D araH2W"- gOe/ lxyަqa& }u/THR޺k:g?<p:^ܵ˄BznJ*If$mDߪTU-(Uj]:ȗWl-l|Z\Q_^p>LΜnmk˄gY+`H*wMLL<~On| [*Bc'N׿*@:!/dApjF{<;3LEM[Z7miz/?3ceSvͭ0Wy³S{V@Lm45?_&bJؙ2}uOw.{\ov=Glv6LT Fbw\pkvƆEXfQu1E2j5Y,7b 2 S!HLIi zAAёQ( eFӃ1 X+9@,zPG} lFU*Xމ4gKJKDOP( lY0IENDB`2Dd6#   c A\\Jai-3\02$\_Common_02\Matriels prsentation JAI\graphisme\Bandeaunodg.tifbِ_]L<ڸ[;nҸِ_]LIW(Q /1B$J,X ql.ʝGg2$]LoPsjqÙL^AP]]u Ibs@'1+ @͛7eʔH :( (--]bE˖T*U1SUU5qĖ-QCB-z27Ќ3O޲4bЊT*U^^uIU\\"@%̍-"$8Bw%JB+ZRuuuY-Yc+t:ݲ%ګͦ\xĉ1!g8AԲ4J-Y$6՘$/^jU\\\\RR2ylv&NR3ǔN3ow9EEEYӦMΌ 6dVTT4o޼qLqoŊ555YEEE+VԘ[hQYMMΝ;oΝYeeeq6vܙi-ZuoRSSuG&df<[nkobKC\ɉ|˨=J75KD{֋K"΃nV;k5EB%b̈Y"JmLzŧx6,~Dԑ۰aC' ry")5qoC1o޼܂z表=[XYY?vlŰ+Ϗ"kY*,&f$Ԟ&ǦCĴ>@[.ݬh7ySEn{z{\QQmq%nqCqu4iQD\ja>'LV=P1 ̚gٲehժU]\LKMMMsmGmDm˖-J"Nr-|ٲe̙%mYMlΜ9Y[rOъ%HV[ڌo֮'lC"NŋgϞ}̗͞={]PO;RjCCC}}}?:X΃YΝh=oU1Tjr @dk&oUYgvmccc[=@I%OR{ Q 7ҲW.( ]+L{`l-^8#5s܇?ޮ*kKXQQPTccc."hn՚ڬ#ߪ #qӦM}hٲeN݆EEE3gΜ9sf !],# Zkkks}eKJ.[I9v;%irgV|LP.eԬKoȑoT*In9|r]"{UQQQ[[;e##A}{&Q`رY--U:tzM L<%TSfUŶ&ג%KZfΜ9cƌ f766mЪKZUWWZp3r{;Fyݪf͚>}7GUszEE~bAf[g̘1cƌ"܆'N̽n$%Y6Wl;9O1ӧO.Rs=C+V['AVߏ-[e>w_֋Ogտ^SS)5w~"'jV[[aG.wc)YIhfj -ZhѢEqi[ʽzGO#])gJP0A=힩 ڟ$x2C3A;뮋$T}7eʔ zꩶ&}ABu1ILJ5 ӓ%( .|܀h9 %ĉZZ}|8sf*?Q WNloʽ+߼z3 5Ē( ɐo%YtiM4j 9JKKZt%!rl766l7C.E7Νu 9h:PPssdƍY(qct ҕ X=Ē%K..$IГ-^8B}}$[n|([b~8艒 sdzcvQMI{oUE̙u D{W^^O|"wce=lٲYO-VTTt]M݂ Hꬖ;eKqq7ޘ@ii+ZRyQDW8qb˖oyX={v˖k{ﭭmoĉY[5 =q>rή$ _@SUU;W_|IO["JB2տ]7@7uX?W_-G-Rf$RqqqDl]]ݍ7(GtcSN͊Alٲ9sԍ: @O-644fFi ~&O\VVV__߲O>y <ADd d#ɝ) {~niҥ_}b=1 ta0T*pJKKgΜL<ՌeˤIJzڱup***. ^{(=ŋ:1= -\,}wuWEEE-]renMvniƌӦMmϤI r$$ȑ#[~@7G􊊊-Zd*//rMhѢ/.N[͑v}=]#J=cYu3w}I@7iҤc&wuj֬Y>׽lٲoeep$j Šʕ+Z֬YJ~HJܹjkkOY2rcǎV|ͭ(R[}WXQ^^>gΜ8aUUUY⨊iUj *x;JKK/_~>~-@Z]]LVQҧ-|Z-1|*J-\kmuɓ'GR=vЭO wIVlsŠc^slƍZjjj̸I4eʔK8x[RoG}4R^^E>mɊ455544l%iGڒJV3'28FR=vX͚egp9 ]p>@2eʔV";w܁URRۆ]vl[b<<Уkjjjq8Ntz-[ƎBG]?+$T8,r%Ks5I'NTc>R{Ginj]%Z *%!1ytJn Ng]WWW=J`lT*p͘1#7J;1mL\2Q[[ ]ΐ Ѝz5u|ee˺.:^ * ȑ#.WZZ:mڴ9S*u@DIHf-pcK3 pL'O J!IYKdw?K.mjjJRY5]G]L^tiuy9qW=( IZ(Occ%\RVVL2i9G&MrbG$4hP;?5+IT_____u@1vؖnݺkO$$K֬$Y  X&]yyyQQQC uuuYXf n"˖-kG=(IZm/..g͒5H(,[o;mۺcj~)J ̞=eC=U1 ͇ЖC-8{SCIIIWVj>*av'MMMT{brfG$z_|qӧObbyG,`=L>=N?-EEEwNtw}+W;wnԵйΝ[YYY\\|=D] KJJk=˖-]ZZMt:Ŕ$I*{STCCC!̙SUUU^^m7ZH2|މ'f:̜9s*++,Xu!ǖKL,0m-"j=RK, `ر'ONRmM=Ӳeڊ!|ӟd͡Ν;xΜ9|q⊨Hg|L>xCwUQQuOt^مu"A);Ztio+** Y*wk'>FJ5w\KtKùgϞ={ѣG*Yn#ϾPVe\bUUU8\ &ԞI4iRWeRtT*5mڴ]Apu׵⪪.)2yфVފ< Nq 7d 5|y 7tUQKPI<q:Jb; c$T#?=Ǎ7ޘW|L0!7Jb!uWkL8WvUQm%&'LP=S^[VdDrGaӴiӺnfƌ38sh3ֶptˠ{馛PQQqM7uA=HJmYb=KyhhhjDH>FRJmg(++9Bd3aat3]R2|f 80mEI,` tWUUUEEE=؄ ")3sƚӧw}1FqqۿJ9s3Vz>o޼vR&d}zqqԩS݆~q3ckƌTL)YQQ}nʔ)A63Hiis=7%Kd g/ mXYf\xƍY+IhCˬY&N//˖-+**kO^ZZZWWR9N?|1,MʵXF,-$OR{^G /eKmmm&ɞG}Kv͙3nkvѢE! ͛D&@ _͋L6 qSWWuQQ @9r+ IDATKn,pEuSO=bժU|1Dk֭_xV@[2{'YK WWWNo喨 nDI(...++k^9s=wȑ5$qu+@<.jӬ,Jue1և+f,pW򕬖IYY%Kiխn8W^ye%$M)SԴ{k2J2m4ϵ$NUUU%Bm%e֬Y-QQQQMM͚5k,Y @ܴX qjkk-CEEŽuѣQЊt:аjժ  TZZZJiRӜ9sZJJJ!>'Nt+C !QB$DI% $J@H( !QB$DI% $J@H( !QB$DI% $J@H( !QB$DI% $J@H( !QB$DI% $J@H( !QBu >u t7yϼk}G_/*hϪ7E]2yv=zo*u8sKOp}8=#wޓ޺k깍5ut{'mUq!u%t7/Sw4*:EхyGN6W}nF%Ap z(<@9XpuQWN>G]Ak_I"*V+/#DR3FnMO}mZ[ /7  `O ?Zv`Ǿd%CygAGڳq}zN$Tҁ MM~tdQu":벼>#iٿ;ꢠs ASk_yyǎ.=d„g5/U%A3s5/u떨N8敗׼F2: gJ `^x~?|ʩ'|jAAC7o:Os2Nz Ɲ|ʸqd#7uݺ#G?ѣ>|xֿz}ڤ1E;_XyEEEc@ GSwߞWnBEuV>h 75ֿ|ϛ]G]ts-YSnfhj'_8,U^|Hv~}y%cF W ^|II.}Ё6y\pvfZڎ ks|A3"A?zݼc ~' ;U[wubcᗕ1pB[ܙw~ssk^~}[EA fv-;v kcRXԷp]0bDQvzņ^OG]9ǝһk֬~ ?3=zL;vl_ҋ[o_qg~ڄ:|dʋˈ!'sޠA رcoͮ%hy7ob}6o zEIzYZ䬵IU]`+l<>̏rTuc*/8Y,o.tK[*Ƥ9Tl, [5yK*,Mg~~v-/j?ߕQJ]]ml㯿x'gd޿~ԗc;S[6ww]u_ƴl< wJMc_=ݫ}=N3?x _/<6nW:}.ֿOgƞվq~W_Wz^yV7w:f|\ Ӳ2N}oX:tn9wټakIUcԨQW&l`VGҊ˯h^^~#G'?]СoOR?5Gew[K.Y\O=]z٤V|8e#>*q ;'Y5ۏaeH'__K*سmYHzN}>rGC~=@IYK~ǖ|=@ɩc.5q?ߝ[jϼAп]tg>|c˲ڟ[~e]Sƀ~EIY[ɮ)+{ܐCt KU>r`VC^o0@I٘Q\[6n6W|Ֆ%27OI/nj7wg?졪wo Iu#j_Y~~لqgo?b7>}5͗uw-xF>]Zbu'qa]yo;24+6政N+o؀?YWwL֢|oGJ >Oo+9Y۷no;]#| ࢥ_>tPgnY3}K~`]t!ów??DxYӿ8i\y-XoNek:]Z=sjOy_"߼?x 7gοorMoټ^{Rk)A=rpW{^ =71:?r0FcSy'}O:=zqŁz+/c'psn}OpɃs^̷{nֵ}W0`H%W/mI4q=^yAߺnAP0`H^Aa:%]Sɰ?~%A=t`o]{^yCNSѦؽ3}OG+C/}[cԤ 9GAphώ/7 Sqy~Оc)'λ~2_=|0UҋGW\eu F3W8/tRGؗ~=!^󹥉dpٔSoV~aA״o3G0">'9 vP[:C\~Z1|OEc 8r77T^y{ū9r糷ո|ckol{O~wӎ- * ,0۷x)}E{viƮ)&VN>O}C#_ߒ޵s{f4x;.aoh?dO}fw?w\W^K+?ҫW^{vܶ%߻w^Ɲzf>/^6ĨQnܗR7Gٯ[pEٺ}y*//oҫ2ٽq {#F4䤩*&]yiG2{n^_P|YWvzG[} əo7o߰u {yw;w\Gw} {ڻ2nܶnW3o)X%u{;DI'kGFApȡ75;w@߁yF UvEϬ^og=ٵ_g`oڟ?$cJ:]Oov_?S\O42G߲zݙS4xti媟贰uqeg͆lxzպ'<_w!vdo~<&|ޑCڻ}P!yN2v9Z:}q񁒓|5[oH W?zI9}kzAiˆ/[/?`bi}_g:}Sx/xA<|競hA\xڈ W4?٬Yz ̺̔v927?)E?b՞*o+Sgꎵ[w[?bP+}f5[;lOA:哗MM 7 ӷ0k&rzyO.ߧ w+A|k{0wtބsnwo7];t@/;gs_~kg4r?9kt*ӯl[߸gԐ~y p{K>;ܒE{]˭}QCAPR<#% zq׾Ȓ[y7]V7¦kP?tպU#vI# :,Am5 +6E_᳏F_j/~KޑvˆWo 8}Ӫoܶn{A0li7L=/Aku/>yMӮ`  M?}*3It?x_[َ﷣¼y]ԛ%߰\[vi&5{ؙC WW}mуαOo*whז39қ*>MyXuS@;5; ?RG^{z={/v)SiηccO9+W|*M}&L8㊫37|[]0H^^ާn5j_,_"//og]u3A-|_uv1ҿ[koz MM; H>~UлO7С>}˗ _Pݏ?ix>|uWAyÚpW_5jԨ}:{˿Çy ݻ7}SAٽoڶğ; ּOhG=f`ُ˚ɕf]ͯ>fInjCS?{Ն Badp q*ZV:j]l@*(*nŅl2D@ !#lbK^+Wrx=O{<3ųv) _:57-:ovyfBQAXeLI Y$do#XF$pʊ3O'|Е\ڔUПVnݧJaSw~{PSet:grue{ίƠ>vPI*EܐJʓ  Kihߑd&Y]YY;GU 'l /#aOM7c)ʺ]羨kx+YG4Tn q54լH$Mn!V afo>r5$%Je]s9M"+7/:mʲ#MLm*YÜhZ]A! &k/C9թQ.'n׿L=ݛ.N 7ӻh~~[;N\Tմ"Ab3}YN"s*Fof֝ KyMjRwEUM>;C*{n Φ8%Ay <ēN %BR^wO2s=;|IvyEgX냮GYy"p/&%og}uVc?A@%)ryNE]{#5>1@JQr˻;4Ձ17SëB&9ZI\Y<c (8{˃Kըo낺2V?*IMM(YQϱnQ)[؏B2 " s,+;oU6V6 >REU;&8UI7EN 6d1fHONv1Z ^;U5>©SRFL(ϱg/9lԢ_+(*T%@6:,M wǎT&xMh9̤FQI4'ێ@CUzu_~K @h5V3Q0xV x7ULaK[EiwVy5jԔD$+*8%6N$2uYjrFg7d䨻m Evgee`ۭNxxwr#\ i~J55osӭmQFRw<)sG2oq STX̴;Nhϵt ܸt*%9Q\,.{a2B&)mC1j~sxSo#)Y C]K`@5Uuuc>g9}$YlΊD2nm#Daӟ&u C#KT>y%fT*mlh(ϵS1Lp~LZ$mjlL342djjf6NRIM>p'[eֺ)/ M0ϊ Mhm\;OvRqeM~jS*dU}M4}S+k ]fܕ?Bn֞T^vMj8o8]IyFܒx:DROè7+ei-ϯ)''r^%V:[yR4Zڋnxۏ$V羬{yGgz.r5tlI0 l>ӻ_Tusj8|eKf-x/{-FRdn,v,[X«-xY^2j$قmvY*χ6@j~L  T-I̾h5´2vɼ/r.QRI4hgiH\gǥؗ2>DMss"eE DG+M.셰ckI;\OϑQ7%F4; 5Obʁ;1D H]VS eE;in#÷VQ..-Tb Fܺnwf^4@z߽G7kIGX],t Z5DGS%$:PnsQvLu49YA+c]rlxEɳRçzتQ5/1\ i2H#_,Ul7 Ďogk|tb޻O-.>T;fyi Zƶe׏H"y^^y7xG=Ic&Mq60wxPT A$r2 jgPS!9Y|ݡnU_L©o Qĭe%٩.n)T[!Q=}O~9fmғx+]ԃef̝o8 @hЯ1ͼ6ȍP/㼩~S<“B351:Ij2=gkIKɻX=>+;bTqzzXjːk9̜?|aKn~vCe`T]˙OŤk۲GIĭ رkxBHzviA>ρ͌-@yIџ<@l4sWT(J _!qMj#h^z}}Napiy=k/@ޥŗZ/UE0Yk{E4}ejnXwJtm>=zN꬀Z'i?T\[{ a:MP ܍/3=/d.7@bR, 05O- hLrr' 5o$flO,i$&寜خ k49O-~ݐjui8-PfxPN`M(^k Jt,^"ͼa?A~Q%t5L ^d'E}x~<MזB3]=&x!P__~SSud9!4in\niCޭKjLߑ`O"@PSSD0Ʈՙ#Ռt9—q vatSHĢ cBAȹt 6{ݐ2 _e?}tQz8e 玵ϔjii`ěv4pk.;ѾX,uP0ݟKQAy5Jߎk(qP')Q<Y>e'bEkm]՘LX֮fʜ=h0'/G]ldumݖRn e֦ 4\Ω߳݇r1;Z~P#QZ~f&/{}?AvnLeWX89WӲ~`Sok={Z>׬ v3Qh|Um ;݇0!UVlؽr[ʹ47Mw_t9ENNVQ'#]Pt 3)Qԝ ^sagrvP)=q쐰]vCk)3>l1rwAmCBB@ܷcqNgdff;4vLvv2{nfk;unױccb`lBqB H:Ћ ѫ4՝}RW"y~O%\^r?9)xԛ>ǂHswsϝ;Ѵ]nq@AnTqz:x$_\NOK%^ Y+eRybE:253^b:M|hUEwm;6 w%>"Gi1~I~|*oy4onСܗEsoj3l5pa/ :J _sMP?٠4':~:cU[JtdO_k ^T1*KsӀ0^0|J/ @8.1wd 4Nq͢}?%j G `a0p@dFR,wm%N[^ZYl* p0"eLPGDz榆!@AOIGzuv(BR]X]rмz94eFٞGA[˂5KEeވ_%"h᪹jPR"UHnKŪKvZ(/`EJP[sUsmELUb@ (}@ Zd+ҳr/ :3i׼m:j0hoP$]4xfo@d'Z |!,Z'ip`8[lg| >seKuD%#g=/ I..@͆{9N/~jj/H ?q/Ә[mԏhǽ-ٝLz+*iԉ]&xOy<_LK?eOfʰ%/֑61ki gO{)~yJTf[QZ L5w<^YbE12?wzqj|@>Ng|2iX[c; ެ ' 2=Qs_ܥ/> ŔK5*v[Z'?;8x@[`CJ"KC.W{F'ĥ`0ҫjU%sfAQ8پN#>A79>`1²4ce4g/Jr0xɉ ur(MyQT0}k9 " ƃf~6@Rp<$B #CtK p.y9W%b˖ -3/~W|?NR2,9]Zo$$qCitu1uh0ZCБSP ^gZ 家zBaY7g2h'']v 2sgd榯šjW{ɭa=R3rxjU@פfB<o)E,L-dɊ2Y_ KX3N;h>VňR87rYmwyck! ŗ-;w3ij̓FY{ݡ,ddӽ,oKKI.SsU̟{Y$LPUϴҸY!m}nu0M-VSmړp;[m-dP5cSLnP2<C 嶄D q8h' Zup<72M2m vo^jP._kejӶ LӺw,&4ǬLmZ:™Vrp[_ML8wy{5=NJGxV|x8@nluiM-dH/kb20NM_lq=|0Sa4IM!R 7YmV wtjGAp .M(9n  vtڌixb *$" ij_XkyGG4^_B7c+5NB8Nxz+2#o) ab:mX#O$#ˏV6;7b2 -!<"Jei48siرHg).nUq%~) v;Bcڨ{Q&F%LU[gsXLWs Ur!|+ͣv2fzXzjg]f|@Zteq@s2Sԝj`l- !gޜ+f#! y|9l- ~$!Iw^dLAbdtV+Ck4۷kIR']/M:7 !)N I~7B$A@%6C*!SU#Q":O=wG0l1+j4*U91L6 URp|$E @kw PR" ^5dZr *nWOம9 =:5+3m5vJzQi0G6 -n6~IN $%Y˷L$ޡno1w0?B`awf`ZfQǥrUPJA;1kpȿ*JԉQp_#? .IQXl a:jҷ+ŧQIZ<[fi]Դ./ɧET!+&U']q@X'}@;,k-ݛوxbڪD֛#֔tJ >Uk,ʢCޓ @;c1 rQs7NѤ۬&3GGђ=!U Z02xKL~\G=,`@ێGhocik;"w_9]}?s$9 9c23)?o݊IJ>*ԟ4,Ǩ>L {6~'K`3ot" DEB`vMxu~K8zO4 )<dun0N-N ol&1{0͹KMel2]OS?z%ÿvw*c#y^pKclRH@N@?9H~ʄ֊@[x|'DDP 0*NJ&#̴24tVtnH[Mcr38$n>s:~gD SцC\I6 V_n5q@v C^Uxӡk{N-ȰY.A&u$<ܣxMbҷFZ3H7225@!t 3,/%8ZE08弁i >$Bf\prè/ַON;Wl61le}Oheg:yJ1uiwa <>)卸'zZV2㒞 |u;Q'Sڦ1)^ 3?\I\9$ex?DƓ jyTk1DLB0II"we鍬Y/FkȁXcɗhlWbL9{k#Ry8cΠSr9LF=>q6M$!S,= O<`XMBťsWI#ЌŃt'NK* IDATu?h;~/0! ΑGH~/@7˄4tم$ubho @ \$ ʗPE^ ښnpّp@ _^rK;{'hO p/ay dotEgɖ+(R37$%8 ~ !@HiV ~D=@(] /e)|`yڡEna Ʀ Dl@(2/@i5콽WKp!ؾn!df%&' HPѲ!/<)vr Q-}uxl{rp!!p;a;I4d[C$]%/v(d!TZR@^:߿a"p69%הuL^ }b}d˺pp]o\MwWۈE $B2Kc3Ŷ,VTe: q -T`h|TE% |4*ߍFUA]X:]pe!3Jtʋy(lph~;En6o ƚr~!VTWhx, eW_<[PϛY 0T@pDϖ3^zdGG16G^0kzF@7!F6ZPCb./1g˃nxã-v0}xf7DyhB'Yi !)mf̆ͲW<{P0t#MVYם,y3.+@e{5f 2N_=k>63\-$I%_A>{ ޼(P,F1n07>W ?W L]$dY: p Z{"qGl{S23e4Sgn~*<3BYyM~ o&8ǂf `|mJ<D" Lk\5k{'BMe1 .`N&ncI|XY#zZϙz`!Gg} Ykc-oI_+ 0@yn.kaF tho_A-͍Kd\ Y`h$ٙT_S>X,!|jN 1FGGF;''%h[[Vئ{=$fDбdzf*wT4XRFFtۤ,W6PHd'Q.;#% MȊObOQnn-ƫbx/c6{ 1a@lipC6#K9!2!XӍn;x㉑)m\KB6p$F5b4vZx6΍*XNHJFNݖo6a$2^qDRI|zђOio5R5 F&yze$xU9 s7ܲ)dsg6 ȍ7/:Dv,qrWPNN_kp"͗kmto-ڊz1䛪|6:l=LBQ:MPNʱ hIyU ?MbõfKkq$BNuȤS\(}H\+0pc"ΑI]1W I$fY{L(GZM!U_ \%W;RJw%'Ӭj+VP]| @hl<^dxs @uƚNIƒ-)TFBc !-0%U9$ gd${tU534aVzmWȏ XS31RS ʶ7X-}E3Ξ !) jx1T+g۬mZwt} '2h'u ߸;7 7(L~ `nrw܁x=kAac6:}G>;*{='Lut7kA SɗLgm>LWܝwdЀqf ١6efu ^= 8ܠ'0+ooݠ*#z,j -#xWEȿJ+vs UA~֢.tuvg-:3AmM%ܵ҈rm:RIcayHݴL{z-qƄIhՙ k DNa}ߡ4oqiޤTK#fgo\v]h4k<}$~m]\ JMyF_z(-.RMO5@?F1eU!QVDU%WW7xEOyz(~I2}l@v;ؠbg)5_9󢳿H19 `_ʏ d'=E ./WRGzu5ejT²bt((,`zyKgf^.9-,,uSTHi:/ PtB]_S]ܽyv|;^sc"&ǎ1Jo|}nϋ閖$~B?Q t>rgtk~NG7=J;7óS[[=TڣF z;B#biVt߀ڪbJUSɱ3"nAx*O٬TNC?_WT@c9|ӘsbI4Ϊ.H</kfWFƐr,?Ƕ5^U)KEK;~ /}dfFDN7/KʖN$ '/9[Qwɪ}E\T?2'דS>|A9a]!G;?پc 1׸G䕑Yyfetieye)j)YSIMO@n91vc=J<6|>Қ.Ux:wg"8zaOim=jߣF@.E7[`֘w.JS='RUB/?zqopz\N`0Бt*Ӌ#,]b\:u_ϕ9#V^n2ћpJomnP*cBU5A~=p-\O$P-V-BG mNE3JږwKu3#h$tꐀ’[_3ɸFv\KNt!ز.tdr LXtqDVmZ46K  r JhYeEᢜiVu:tDg R`(ԑ/${ N aLNDIAQ7t 9rh,z@^*3LNI ]F=2boo>igӃh 89݅wc]-W`6`T0*n8x2S%yh4(!%#I(ymvh7|QܡoWqI4Iw~-L6'qoOd{aQ434*NrZSI ɸUV4Z5zr}˨6oIpd,<Ϫ? FG%P]aƦ.NET7W0z>*TVT$%?#c/_J1dTeaL2N(w1bbp%oud?9x ǙAs i J!zhWLHPԟ/9t ) H rOųh>4 #T6sPdGkYfk+>JEv6-A!r=ǧee$3EaD '/9[D`nNIC.ܱ1NR+%]#=ƇfnA Jz$&#rMO`n\!+?⎟7?]e%-4r0YI0x406D (xnBȊ0ΨQgm+k׵a% G fxg/ ہwE]5[P]g] NI#23hNb;,sP2Bu'aqN#Q5s=%YP9.91<5 gDgQ2ì8!x<#!x;'dIN~+R8~{Bh3Ub, \æ#.D1 i16="%⅔JC;tW+ё'ץ$ ɼit76OjEQD"aD qM}Ʈ=#Tl'}||ժVGIXt$uC{UmvgPNfohi"xb%Ni)pnvkcscT)4.ߗQ)Q%),6{Ĩ )=|0\7ǽ*'`3y6ſ`8*y`0Ha8 gk;2ܘ!!S^Hfi߮M Eu:YãխRY_Dd4~hO]y{B$:K \Ȯ d*5 X3(*p k| E[ " a8^1-mj<3iCN{fHM}]l7(- ѩ@ ęFỻ _M[=В{%Icp>Zdv" X,tD.zn ?|o$eECIꄕpT5v(R0BEeE[흚AA)(TC^i (~K$PY_$g8!4*Wb)4 =tNh$|7`^*6r<5Ƥy d*  fIIPR2ɎSzzIT8roBE„i+(Qoq|Dnm{0@E) yf\Ѝs$"f ˕>DgɄ8?7;]yё.`H/i tZ8cݜip%Ǭd5֏ '} =A$R4b:T55DSLu mҺ$NШ\{9uFcql ?l$cNp p[\W]ŇH*IJB:76ӍQpàG[珵('\g;̫Λ %mm5Pp8(y|4sESжp1Ut^ \y.~6#IX痳G.-bR&=78FBx{fӢx?$ ~^\w)o]<RipB4Τ!̌fk[ncB*eSEPiKsE<{%gK$co\J5Ul:'scsbj8@=SSGM Wwh\[Zhl D '?\[K$Q,ޝʼnIh@жE߼{\; !j'+m´6{6e wSP!<:I7X' 8͝ ޸7ҨȈ % T෶QJc8^s.?Jp0ͨ,Ml:0X rs^wN/(bm7tUT$p`⒆!( N66"xϊxs ֆɠے\WeoXbljg;ξotB?zDa4 Ad$z,M+!q? }DX֏ƍѤ]9?cOK}i~=CkKXzyõw6|U/ȃT̺哔6n;&r[fѧd=3 w\<h?%*= fkuuOD?U-l:kQȡȟ&w1Q~(oÚY?3"pZGz=Y2o blmWoe\ꔘ|9{)>cpbm6)dMoT(z_3^ھIޫg[M0>iǃݹ7:ԼZ IDAT="&o*+zj hH]a`pyX[&!wX-̚vm`iD_ fb16r֔٧7ـ`پo.!۶dLg{0cޚMmS/lˣΩkv f _h.f/=|#XE$ q-Dd"v}\SjǼzRHӾ=șeLvbYcGN*ڸfk#%*ql6)5{߭mt4z{s2Ac;z82l.>t7]HxקLٚWմ9.~Â/ uvD6_y99vm6j KwTD!KXbzM/o8ңYTZT#Ցw?&3vO7eH}{pۑ/x]k .wv4.]Q6Ĺ#mǛI'~ӻ`htւ2U}{zW~QJS2FMaIܸjGeCtXwmѫ[?[ԩ%81?~hwomXM;wW_/˲(4&/;LJ}ci0vͅ۾sK6ݕ?۾YWgEƕĂZ^,: &PYJzYn-!PB&Kl9np%09K2֦b,t<^X)75X$?{gGu񧾦{[l]edx+ ԆڪMآ.5,lcƶlٖ%Y}K-FwOwkYKBnF3#ϟ]ŜGk_RO%?ULwW;K"T1s_(/pz{:'b81wؖ;gN}a *Ȑf_ I79l9`:)XmmF&˸o^)tgU #b1lV]r_!W$:N}ʳ8!#TMtXop_ΘꦧZcbb.( tMFcW{XL==6͉φ֓xնuD$jӯ+U^G+WYpsڝhϰ]Y栘D j c'JtH@cCXW0$." GԿV})JZ_J>TuJؒg_g0YG˛\ŕ+>TEG,Y* v[*[.:Lo<9W@h,ffk-֦meOcW|9`_46u=eGN:1"&̖/o0?I C.\f7^atC Eˈʱߟ*z$sw{غ3+<;{W5;84Vץ)rz׳<3_vW;cÔjNO>}!6.!Jb(w_uDKF~|z.Ucoi>;8AX/Ze"ژ~~zJ1hKen;z3dffn\ ^;^kAC{gQ3 $wF>{GLV+CC]嘆*v29}]N~GNLʲ[XFvd;407Afu\GÃ~RS| ^z$Xlʲ[$&y_׎ ;wkGk܎VGR% NFxQ8 D 㰙ع]nDŽӱ,qq<*AP-u9amuJB!q ,ԲYݩ0h׎6 L D! sYu3vt k>bAP":% MgY0I,,Tz 33ve1pkd 0NA6,2 h;N=2$nE}^ /Iؕ^pwo#EuDTI0L A輿0 YAH$&HB _ (%ff\NjZ*H#S&Z,9Ƭ5pD! B:hpf'Fa6b ɤs]]"xw0AAb0\q0 7;\Nd}.wP*EMxIOAhڥG|wv{D"XI"H RD.ADz0."H!B(I(&lE8I >{,e$@!JY8Ti2+`IB`B)SyE;P"Rj# "bXr̄~M]ۄծaUT㹁amlyKåV3Y.PlϞa+/$BB*P&$J4g*gVLe&5-^2B% @I iwty|j 9\UI$)BH($,ǍNH737L--I&ƧN=glVmЯ7 EnB|X(bR䤖? p8iyr!II,HR힚r,礝h֯$md N7]h1Aq} \*@$"ervtSI; &4f\DBZCJE&ԅbe撡mitC[OnڼbU3 U2fJ,6m6@'HD}pUSS,-U_,(>*c ;WM&LeW7Qȹn3= *(em59wr?zT粀tUjn>{/.?( ݺ-t^QBm휪0~xI#N&>3E6i6#mwF/?qiDu`hn 3 B qtAqj ?<3nxtsm!0EDɤOeO(J 8q췍g*Nնz#~9k{V̾MpVNuUs7zhcڮSU|}:W,k.eؓt uGfTv[b6 }ZR6>}VLQaRaRO0|nv汜9񛓔|Cˈ>˳z,4d(.9Q%%ؠNgteE*Z@^NnڧD2SvnbStJ³w홺Xٿєt$ۤi8rml}oC{$fz+.jmoiom ~||trNv~Ʀ47ꦚTTܾ7/ 2j>OX*P'gx2>X[S| ddfg-f1n5Yq|_<)T99sR7"^/ZSQWSR>119936&/kW$ 1e?G*-?h$TAR1#qz !oqUYϼ؏x: ,Ʃ꽎?a@$Y^[q80l|#HOR'uuoOE* ,η'06oaQOr%}zKQ ȇ߽^e΄g_Ȳ۽O?qշ%$dܮ=ϓa_O1?j7A-&?~KFY:K'J0f_4%Uٯo}sO#[:&D[7^>J)~Q%!I )u: շK^\% {Op;<}ٱQ?('$YMu7J.NfI(zSqH𻗂en,Y;"}016pO$x*!%b6sme AP^[w*#b|74#}ߜNFJnxBc`9wzjF*}{1N-8|Y2PM釾m-'{虬8߃ M,OXuxL(b>7V'*W%gE{I`S`|OBh$B ! {ܨXE+V[Qk9uT{/"Wِ@ !Bb~{=;˹|?ShllA? q`Gu^i4 t%pY;-a?m\+֙PͰLp'j(pny<xKBp"FDKGׅ՛/i"ǁ`_Ϝm{ Akk>399\CJ #Wth ~T*=b uS*%#S)kz:;!Q&8?e>./4!DؔT.nkvuIXU,A MP&FXx]V礏'zEA~D5M)SYnAiqcIgWQg4!#v(=oҼ/Ac'ĒvLm$B+|u lbo3ns: սHK;KV`RkOW(E$MڪR.lށ G${G7gwx ufB$~ *MUXH&hbdk{g;GO P(nz3!N*/b2"dx {gw[{w˧we @p0/E)"ai 4&h;TICH}c<s2*i*P71 lfU*dţ/XO <|B2qmUIC]Ukk&''i@U] lD"U]``B-In.xp ږJDejnG* X 6u\e)rṞ}zVV6^aD,3hw5E,`w ,%)Eu9/ I> &*\31meIe<5Ma&qw;Hx(~2kFZ̊8#<(SX5%^b!`!\ }VmC׿a5k|Qt_Sʟsh:/5+> x[s$c\~VW <\KcӲYvzXS#K 18ĵO||!qOROW7XgFQ]NEcAcSmK;SꎃjDP;^Ս׋~Ơ59 j^WԘB]B\'@7Efөu1x H ;E/4phN3p͆< %F?#%Y| v\񰐕Y̨fX"W|3GmpXG ~P=o qeqHfyw 4&vgBQ0=sA. Wdev+9Ut#}}k3,g(էR_`l|a]BWGKfګj6NUGѮd`JbdY[Ln'-_ʮͭbW3yvQ 8 7B;pTAʾjtQ0&>QvuBDQ IDAT+T6o%!QӼ$cg2!؍p#U[- ܰ~ƁnӍ uzh,N\8yHm'i~.dt6 ДG k^b]ktm: i%ُiUvb=wEO&i{&&) 60j޾1pS$NI36|䝢o|$aMνh(s0AI6zRkHJ,jU4u`E`-%"!e\S gx>2eV8BOۓQZRD:cp淽 FLHWnȝ2kghUږFNid@-+ѺKvr wҤ9pB-z[fryQ+m{/Ug At*q`9P {i[nepd5qKhJIڃW6)+3uqtۚ/)u|*ʔ6kͬFJJ%W3Ufi{E*1tUvUs{b)G5w@S2^9jdHrnIS1h~ oro>6ӖS䃽Y熅pBg)ɪ#Z:v^ɽݮuo+cp4e:P8gCŗ_Ӛ6@;PfRl 7_zUZQͰGOG+yv6{ dFrU ;(bVMr|}1;*W,a_N[ ȫo=f^Vy>tj=\57MWt2M%lA9?jn l?Rĸ:]0X-<Ҫph/]鬚L:sm*r(H;1֙D 'xzPHW6̄t$dV_,ABƘ~4qq:e?V˩︐+{s܂ ~($GXt0Jn FXJbv!#S3>uRXc|PP9B?!fl]vV;%eڦ 140;-i) KWb(d5wbpgn!9b-TGWwU Ȱ_|x+4O15 PYR&uʤ2?oAx%~dc' wm]p8+9vf@㦥^}Z KZԌQSsa90c))#E_ۿS:z4 Xn+kx%b0~S (rp8Y{k>ROwݙEU0 ۰0 ll^2jbV[YY,̒Vb /2 6 0* sH53}G+EzOZ5:?rKȡ }%%5LWt #uLhzl71-G{_u"&'l޳_ެdE@GNsr2ؒij9v˽8?z/?J Dׅ"O>#73>2+~gpFK_ -dNaq'@s%OyvY@rxWK+oP v glS]<7_!yO໵XDɶtrZt\ElEɶ<}l>0X˸J-kTm1ت+-*i~ qOr>[U. Vev,^I7-$iGTuE}.{'~u>ĸޖF=s\)C))*1j*"L.נLZ`PpP '!әhZ% PW>A@8Y'R/_y,XkkKYI/E#n$sm\8p8mOd5֎iRx&Q*ƚQqtACCeC$SF<3PʾŅJBSCE1Y@Q%!wĮ .J=Mgg Vb,rt[ULd؏= m0>ˮhn l]X{3)]oqtLKV*jb٣Fs96!It<͑qv>ō@Ԍ)J9ޮ&{&&a6+73?"#/$E?B1ơ-y˃68 v|oLe簢ZW)3`Y8m-ɿ@ޏOKFd|G4pK۪Ank`9,Ci_Δ KO6(kmZ` 6\yaț"{Ż>B8F>qg#]mVl#=ó0q]P\PuwaaBҞo8W/|7 >_* vK120K%R\E4[>w:}WVF^x)>^&fqJBUܦW|_1%5io;v\ZʔkbǟQKq\WǾq(Av&{X,x`ڍpN0jm?/zV j;Zä]-6y6&3^qˣWNswutC/Q36ZXc5vv655yV>}I &dM?%?vr m {;ήҲBC:Koicojd4Ӿtghk8w_@^vv{ژ$&3,nhå`.>2ƺyUX&!mS-K.GIbvڍq6#Ov$±w?HSm`+%gj),1- cgyddܯ)$\'qqF٫[g()ruV'p\MH}$N4ҧUh:N'5 N1Ăe$6w۴ٵ-R3MׅƁS,tw[@gח_ݥ ǣJ?ջ6nq<Xͧt蘼Y`8IxJ3 w2^@ajsgW2w01t$s~-|vD2vD\xs(=̣7+B.+K@12TYIEPT:\SSs*pi)Y+z"uTB-""0i)"j/p OrdƷp6gT+<|~pbW/rk |20g7<"kd$W[Q0|*ҶRf#!h1#CK*Ē4 x1tS>M&fwXx.=oh?0;E!z)v~?us"|e]C4U)Gɗuhn[A*/sr'I [``Da3PA8S D8GQJDSRZ G~~F=L:灵o{W^dV:qL?ͬ ћY R˭RJ^1X] 2}T*i({ΔIP EyG4bṴu#'O^H$Le٢A@~'D>9EBd*՝W^la7IcR9hOɭ!mu^+@NeyTv@v9 )fp75`ѕji2D>{sߞ~IKuM蘆B]~͂m_6EKbINe'5.3 XAfV ј/k+B 4-wF`r Mȭ$a[޹uo&D2?xP)J])_!PO̐c-ښ*FrM ̭ll]ĮH$,c~a а8/@PsS%?S#i)gDĮvuhC\Jp}:+MU*n)`fnª5wP){>IQ|,50`@,#WJ-1g?GsRR@5[s: "J/T2IsH28߷#RA_XDE=,8& `LS{hc h/3xj͍HTMܽHlrv:Qj&L0c ;\͉J_?o˼ؕ7kk(c˦<7*q˘ Uetk횖BݘCc @ޠދNhG[Db"ÖbYzU2ױ4:#9kl"Ҥ igGɥ3<#&tREx6fNDM}&|.K=D.O0Eh*}gә h׌'F,_ET[^Ǝ61C-Yl;4GwOoR';uzs\kk'{lm$!lU+%]jEibC& r0VPTESF{ny}ml&/s9#H(Gj%e\m=)Jr2C֌;Rj)",NbJ N#j{9l r PVAF jN t)z9O8ꭄkxdQ l@ؑSh&/.Az|i}0FQ*bmeMZ{0zs-,xl/මP&`맿RT8Q~}]%Hԑsy"&]kë(S)RGQCPB!&A7r\8b7bmY૬i]@=ɹoPLpL Ipw7%>bJMgkxv]hI] /nkt7u঄. #J h ..y'9L{xx 5z8ȩ)1~w JTP*w&hv3eq.:Iw_3kpu8~{5b\)0"ק?Nƾq~0:$]P9"`nM36pЕo@?E S-Q0[R:r䃣CRyi0ҙSqu1]#Ú<˛d!d'!l YEck]Zv_yfs;ui;mjsVkVQّ H’lk#9~19}HO?bn|2L#8v `o#D A/MGsRzm l!4tq2#{$ "ձ"g+ $*GX($GlΖ3;Y,Rq6ΔtM=BEa3tA47[NHv-ľ *)/4)ӣq$.hn*]f2qxP+"(~2_j#qWhfW`;~Gs[` It Uh(wF2PK5]t#FLjF9OaY<t\ryf\4z27 vG@fEYHP>&nsPb J$f3hLA!&HVJEuq1`dm (@9^ `G^G)fi@0q-Q$Z^HK_ͦ`1Z ?Kcpi~4?s~ ΎJNj.ZCS'- #f}sEKX^&G *K.3M730̬Fnң 4Ne.\Zu4?f\}20fXsCC轎T.LU7on7Z_Uz"BwYigZ]V9`.p~co4"uWJ.? UZ7vMY gp%}cu LEuu5ڙS4A%?[ݒlcwշ%{[A&y@v~EKmv'+ZΝ8@4@ԵIhBȢ7Bi0O7r.ˈfWmnOVCVu px#7(WR}usum?@*7Xyq(>>wG0'sU&=%A4^߱uU9~@}p#TSq*A "BsdM N^>T-sثL) E?aiU5/?s*M}hxy籲ɅlXIljf׏UC\Xs!~ 6S{w[f.>^9{="0n9H"8*׋'^d::;2O|iKgP'|٥ฝv&(Uo&[xaӣP|7|.}[b T94 q`AȲZ#S^}{]狂3 $n8B9WRSFR 2#򃅌;tC0Z#iW䈙HLcKc HcTPDp*lj@+: [;'&_EA45--:N"ad*O,yrt\Ŧyh|Xv؍dXl.0l T *Ѐ1&嗊\@b \ #K䑩Pmց*4ҁj ",6W0_I"a#p p&+D$̅y;3Nf}S޻f$`Y0LƱZtHA"a,67.!%95`//H/y]nAz &)F@8Wjv52hՏϙ]QY+#͆v_*J0Z:VغhWhT ZشO.JNX;(Ee3"yC8PU8* aϋ\ikNO ?TٚcHLV[d3Bdjj FvLZw@YœCUVRwv )d 3"So(¦qy+6EӛH< pOel3`E,򾅅I&RQ$ VV9Svb~fb8:tAUλ0U[/E`emKөdL'jeX3> %WECNjAZrBiI칵iRbf-ZCi>3 ;jڬ* cuSR2bVؼNTu#y;Pg ah\2FR[hts4xl2'yiS:O) c$~OzG^*ªj}K6n,N.2t*yeפq.}(Rިw)xL+BsM~q$)JgѨd,3FʔDc:s2Ʊ)e: kEܰk}@zc2hU4L2F)sѣI ,|mSg 'H!0;ymIY|N6i?}5?}uSu\f.y~SXY&i(-?F8Vyo~ܲsQf4o잧Hj˪/۪p\nu}\__"{Vs΃hFM&FGK̛U)R~odMnW[_I5[5+zχrg>s!~_`\;&{Zֶ-y$!军( mJu[FZU ׭[)eA!'?;(!4S *TbgaI㺣Ͽ2~&.n`yRaYOck}Tb< >=C|~}5~zco',AsNֽu9G۶FXA  ?PmٚΉwk[dm_<~_k߭m) $C!v%϶rcipTw,2+~OE2^+嬕rK'zqxX2!['QSC*^tV6 9}b}0^TEZi KżXί7J/|VwwHɺ|{P,,ˈWBTNio=ع0hxGo,|a)xgOѮ2I-!"wM4w Nckhk^g Qc^`c+̎]F@Hz"iC۾o_J lrvi UڿiE8k]5g(՞wiC..*I2Gگ[6NL*I5 Q5hUƩ_/l'Wa>wt}%!_&*^ Vm,817 ]\B93\FWcp[*7u\mll5;[BߊTNm P~nuN\AGRl1 K SU;xʀ:RB^ ;}O.!)CXԜ hgr٪p-Sgk _FXa"CǟBSCΩ\|*5^Әm׃$@88 w Lv2k?2>ngӫ0<nxK&K=#*|k HnO])Ɓ¢ ;ۺopC/V_9>KD%LOj[YDg[ͬdPh csEYVħɴj?Ύ6 ꁂ [w%怍 拧jki2 a'JVR(4#r9y%4*b6:At-ͨPj(WlY0G6WAtح4Ku]c= F@%H2%Ј^]>nMu˚N 8C@!6œ*"N L<V;ѪT `0(2G\ˮonA)kbQ4z И L8hdTGQڠUԇ쎹i@C#1HQ(8V W]~y"ZY_?/ǜfbBe]@RW"$w`;%wUH@Ѧ捏Ͼ24yPyd :N(7u]h3P8s W>v@k*&j;NXӈ$AƚX,`;swRIN4 a|"{3dtLV%&sB+$^QI@BAU٫sGө2w͸<_^';GUL.siƦ/ʎhz:% XeYibSI@<P]Ǒ1y$ Ea8P3*I$ ?٬|߯0O~TBfxKT,s|Ƶ'?<  * 5RxE$O}rc8⵰ގJ*sQb \TP`wמsDNc J*HXQo;Ðv* (ߣ7j[. P_G i $#hM9V*'IuYI|*'$=9lzksa1h$G1]@iwCɼD3rf6|S[DUPianE)izXJ G&(>pIh%!03u3*lfcoNlCл>}:&AXB|`~rZZ$m֛Ԑ^-& #G>5MQ X~|3?-CVng%l,.& Lv/2sq0AaX`'PzC-/?!¹0 +[vSX~<HIc:=\%,3_ڔwώ,`BQ0U{I*>$I-=g:DBP YYy3 0ww;)Y5QGeXa %q7b4š蹫ԛJ' 㞿H[3=ۻ|sECn26#q0A߉ s6oqK])o?_{t2V He"6xIeXQn^pZI@GWg)xw?4lR/ǦУ=7? c[0-Jvz~^n ,5wN(N*(kYo^CC}]n}n EՏ쌎Kl3v/D"ٺၞ4'YIv>lqY5$䟙,T*e{Kͬ 69<>n5t-ҪM!gzzj@ L0h_ LNzf>͢GFx9.ը36nz68c%陫uE`AJS|>JF 0xHi-;v3̛=a4$ɩO?_('jtu-z 'R(L\bzpVO<vce IDAT{owOǗ`p2 3sPptREZIyL P+Ώ0C@BAiJ)x֢fQ$.z ~~hTVIhY3պvBӷP(5uUZzT~\SCպ?Ʈ{d3?+!D@\޹ڎ'?Ulr"xq֮xOđ#3o& vu;Jb ms8i3j&99$$FFe Pkj[;U_o^W_:]{}Zu2 $$L EĄgs;{uN}瞲t]v{]\a\v;eG}|2G74U\=7<>)QD~ʌ`==p{@IBe.-_5 ڽ]:5@shh9'&n6F%I^E)ha~ZPyudiDedy4.M`qP%qDţ7cWz atn`0m=P^bԌ8CudBQ3eKk}Bkuߺ" P888{VH־ȓY:U}~h,bxxmf Lg|eSY_㫆mse`=21.b-bhs>;Bwl`"B@)BcR*L{\+E7'մ_}|fЩB.OOǙFҨ޹kuU%_vOEathsgJ"ܺx&[gߒږd#ͪ=SSP49 v?hKs'ICNoxpRS=i)yUnsQ}_5ŴM!a[V ל9]ozst\LAe!`,9%w 紦' -c'O d ƒd[j* Sx|PɌ@v9  ИnX4io **.-]DcpmMO_ & Чn*/Ͼ'#QP pȗ ꢹG((,Y2 96JR~+O$r8^U4.`dt\8,.1T:[F{=; #IL%',0S S.;'`4ɋbb4GDfNL&SlKd*)<7!B>x Mcp$S$I2$)Jggy=OUN^mi24؇Ţi  %rEʒU+$ǭi u$* 8L"IPu/VS/rȴ(I4qLID =u)EgM,1^* ەe31@ n{@dLZ흎˴oJohl\[UIQ,'jۢA=R(+d̼"2[;*hu Սup0ƣ X\fwDk%Y}\/tT 2jEĠ)4+ۈFG(Nca`@Òx.,?{PnJ26"1hOM`8fm s;- A"-&sah;%arNͩ#ǡB,?IPV2mіR9CpJ "]٭o14,O |9ÔMc3qdk@0t|o^,St7IPLShv&zHlY,&U0!:d,>NQ>w2T=T_sYXÕJ.G=IH39("Y4L$#l I ccw.q}]9DbSx.ccbk:7`Yt W'QźxWod9KeD|=AQ `,xvi*vt₹k+ "?_p/:Js[%L΁+3, 7$/NP3 /!Q]:¿?OjÑ?<lh_1=!`o;f95whY ת͠$6ֳsݹ c%9$SGDd η&N,`P-^sn -##_33/ՋU z1f`MlgSlYI&el2ld&Ndfsf3rɜLSƓ%q#l  ф$TB PG}?sX,[jx@<ݫ{?7=3 /Uk|oz " nzPvNA`0|`Qٖet5CT.rtpu509ce RTRd3ϣm z`_dxI"1'֓R]cY 3rlAS4}c0z;ۼ_Edyvf}Ev24Fgo!JXZild" b#t)^4byx /DI&u %1:'ҳ6I՘H$٬ ـN3LL. 鴉16᡾Y7åYd*==#kL1$(Qq]&3d~=A0m@rV9sL&L bGXc]4 SJa]FHhi\?gr($8KXH$nPmcOËw>e}3O? YRB{v5%N2)OR&(֙M+ =#S|"P*P ZVW!bh](ʬ՘wqՋ}~MV+57I ?!e|J!JK&#`5.Hf/: }~~j)}Xna QB7.ȡ`>SRsq !u-']" X](rSE!֡o RbD/cu::MOAe@(.m$)i剘Cͨ7 ,`qmlY{֊S)¢tTX40SI−̘u9"lΖjv4]?3d4%OH!܃cGPgvNviV3PHZOri bC5*zw粯m|AS!`wUHrT|6ϑrl*|կ4[QV}e6r!Ma\&;Z kx6Y1_ g 0Y fŊ90`d5NtD2m7(el>6Uָ|ZG4G0Nʣ@tyhzx0GQ:tK a&&oPYl(+``c  #(IftztWN|]))S4u9^v%~"=uO@*x6WL/;GDėdo(!*LLpbTRYx9NJ21ͥU5ufs,ToiGeݓ'NC7W,kfqFcDgǞ!Tڛ9zHT%Y=uFl 뼼+%4LtE;*l[]qzv[VU-oiga/!4;_ z-unPw[sL $2F׳ȱPz2e%aqG $ Z槺8"-e벙ҙR_0W>>b$0IR"N)YԌyEK8ⷙUْmX̕6DJq qC$Kg'J2 g[ڭWsw& gV3܆yn ȩo[F#[s( ԟUZ@Lɀ kګٚH(be;oDr}{S3c8 쁋H\ X@fbS3;52Kaqe,O@rt(j%B8pJZ45$ ^Wm荲d/?R_86Gd}ٹDRrV:bFkߓd*02y4$+?{Y:+%?zjo30P+e~;gd:._󸳄$̴v2j].WoGHsxb^a9MЗA(,.9=f+_"!6 E)hvgdAd  `0ӏh:qe$.`e[Ya&GT3#}sXy8R(Giha萟Zr6ifof,(( @n0:!f򄰔C>X`Gz5q8{uI2 IDAT3wWeSIX" :sNf):Ȩ4B|>}!OdjQv Na,XacU眮] T :`lʘekGӅ @pydo̴{sXtkĴv*9oJTv;3Ohi7JBT*eɛ;5kdCdjy:M%<%C8֩.敖"ˡ5;w ;= VelʔP{߬PN_I%bnsgպ?Q$L"/OK9d drQ-~be5ǯ*aYCg{g>l,J8XMNPGd5F{nՈ̋5PD%awUHReZ^;_K#N͹_>ʢEpE&Ë 4aICOSB8tF/sg_ߞߏ%(ɫ "{\zם=PڐO=`&0LF_6ϟBbWeb`wCQ "go(RmR1|[( %bGGsR _#K*k%({|Y㭷^1ϛ&`?StlȔꎖQaS/ZIu}07oi;r (ɢ݆,0mvnR OMjaYM }Jը K/5]~7oEkKS:Uw{[$I % s[mZ}-I@ "^'**kʡJpowZ-LkvՎ-.qEצǮγ4x׿|t3e| wK3g@K%'rK}! b󜚌_5~IKu9qHs=O9'̊#%{ٿAd5hٹqyڣxO8zJ'6x!5@^A~dt6>v|&n:]{dCmحo% t? $>JN#ys67Ts^$⡬}#{9)o}VQ2|>?]{ Ťr7DrP*["]ݔ6;fQ[IElbS[]RjsK)2BXuf;y{yaO&K+@IQ^eHCE,Xt#̍SPpn\/>O0r SG@D1nZ[^hYԳyiI;6VwT,+;3 9h{Oj>1{ڕgO8jq:SW orOCo\9WSb%.slX,.L@mr\ݛ^k=w>h;<)IFCTέjPV9(4uM; OQ{"Hcwڂ1(J*7&.{Pcu"a'}"T1C YL 9Hau(kN@ÛiWKQ[j(@ \4ӳ:q''j)I+,k5kel0ӗy)"DpWo'"gÙ?ūI(n~k%@֋N>XNfI߸S!oY# g,g?9heTȽ{D_}{~skS;D(S?߸afAz88#KMi@cw:MI;QD 2?FAH겒G MpM0r 76ytAqez)6#m g@.]xycX>C;5$ٚ}yI=zi1\nlI –:,hjᆷ]hH{\S] u03wwZS矚 j2ˍpRs5(g2 I} FǮ7t=}>9>)׺z@_01qqlŏ[brMx BOdOZ\\~uE&CJLB54(vڇ߸[jtBU ~oXb5\qÑ\^o/Կy޵Ϟ7>ۺ~/\I*G)iLI@Ʀ߸&cBAJokmx-' }Hyq"$ d% @FIno7:F&&Gcs]&Z< [7\"I16 pB8?{FM7C8GN{]ہ$]KZb ` z[V'UCk}Ffʁۺ:zƭ2t?DM $9::[wt-]I(%յ9:,m?߻qQI޿Cdn8jM ex6N=Nsit(TXw ݠ(e&,cV,% c|U8^nv)aW+-+h a4ItHb}Y[g_ǴqٵāUaU={ 2*19Y0ʰxaj7mFM7"IC#j^h:Լ1tu @c~6U}M#:;_sD١PU2w0v,➢#?}YpTiF nd]cF>&[HQ5oīFUfce j,ߩ$^.G綽) rFVQk`Tb~u w蠸'y V݇h+˪2  !k$$2Dd'E5hUZdpq,Q9tas apv:1٨mpde5UVÉ˾~3=$? =f,wOއ^ {S5oʅq3/;;!ϟVm̠gb#7,)i9WM\x= D%j'*MHdӧ(xRhj@&K6 QUCmneX]D y!(EUϷD1a9AEmo&=+`.j}6~wu=}tڇ<]fS& g[X(lrDй g73CI"RҗhHk<Ɂ=s`)Tb<69J/5|*csdH.L\QNZ[x1lke/ռj9I.{C2KB2KM]{Wۣ2<ƌf3S#[RG7>R`o0ݱTiHopPSs5^o zooQ1*g.Ԯ"(' ra.{Eu=d<+rsP[OOI ;v( "5lw'&s'VX TLӷ(z(u@3I]!hUѪVZ3?Tw=mD'i36՗Lx˪Y9(b#HffzS̫ 6~h//$J$ IOb<݅%:o60ᲰZnpqVGhTxe7 I=rxrq:~V07فլ)0]aĎfFv|s6h`r.x¤'{IO5)C'ϟd;ӡ {LgQs-QQF1RFy_>6: WJGq:0~ٴ`bhY˄gr~ymOB$(u9 9 ֦ fNKk& Sf^^uWW ZK:mD %LZ&c}b[^`^yZz #Ú<ɗ=d_IHvPQQZmZ;vjnyzNotu3]l+n],uAb%`,?>S=ysYvqbg{WsgO47XKgpꍛN9 AMSǦMƎyq64d ԯyJ Tp؋/?dP(Aaq2?*Ț<*t*R~,pm_Sp:qy$25Hd}|`hh hmРZE[߫f;{iMX>B*P{ ){7 Bvq۷k&Ci,4tGOw׾7v.]O =tхcΟUT#U.vu7 pSRs~330?6:k~ j9Ulm^ .4?S!&@fe/ꊛ;MvWł؈tu5iPIĂ-Qh,$ FSzҶi"Hm1m".GZ[%UtDp\yt, 8LWyX&|ŢN3.L%oÓzL=+{p4Ӡiy)jn*:1`Eߖ?>^*ΐ~cs/aze|jLovbiN0H3]E3"~hzr+JI҆ߥj/㩤˲ڦs4OqFJo gi?+:7*K6~uyJ B*߳nӾۖ+Zq4볫j/5ΔWEĦ@ewy4wMI.|:Y쬹n6GGܐzfݑo,6km\g}2}iu\RAz?F҈/{iu\i>U29yguY>}BG>Gt|4OQ8Gl`?49Xwą dvvh8Zx9J['mхF'8e[l ߬썧9d}HRPļXSZպO+k}>G.>N. :%'lKNX'WO_9 :$. %(FʈtC!^%aظW0^D@'`6w.SVkȃTrX)d4 kӓ;P |x?;߿S(sOz)!NPE'8쓾i󿱶#6merx z]S|JbLR \r BKJ]ħ?{:T薝L{t03D02fE+ м% ˧P*c񪵋WnmϵpzfGS䵭L&ݚIH꟞/_ߒU$2e;BT^,N,|`C5eK]E`Wgx, !mH`; 9(!Pd}geUdla`HȍBa2 8r_ٞxmx6`n 5Mb0ìT퓕cj)1v0F`6Ax!'+;-e7wu\ _, 'FZ?: '&!yRlm5@d2VhbZrكd.% $%P4{R1Z ')~;);IںcKoNIzi{ݻ¹BѮ )K)Qz[퇧udžтҹ h~ X -Lɧ$@בi8]X <4oF/EW]]911RR<-#3GVhb} `jwa$%̬܂h&v{TA6D9R~Z|,6*ʊC87i8>PI`ۅdJpi DEK)Id*X}OhKEGfj[Eb_2Pz S@۬ XOӦkdYFMC 3ݼ6O_[UF&!STܰX\l HE L q.pup.:?,KuEـS@By57V>l`dn|J20yEr8 ? MwS+)T:KW}cixp v#vns1@;[g߼}g/TM&P~})SbY0:>X(8MK Ed9W6,0}4섇eq"^3lpSW?)H_xyѩ;t~]QMW8t~_ ȢKAaӋ?nUU-礄^?&i"$`;O@ȶ$G%1Ga]ޱ,)\6Z|pvsI0Xkg Sۭ?uG$ڐ"1^ v<3H9Y cCo+{e[,ۊmۊKbIBBHYH,eiR]`a$I2^؎-ǽ;r5)_v={9{oc`z2j|{M iIm=׻gh\^tAf9˳c:zBg!^& ٌt},՜Wsx4Q#, L+Rmͬ-on=3~v,"ZʉQp̌u!&4DRFQ R⢓JzcWNݒ=7QhAoQffvfGb$Z ْ$ l}X}a_.NTS}DxmTH'{m%ől8\]Rl6P:~ 3D?-X 2> !}lYÅEeKWON oL)G™?_@ʼn#j/\NmWG7 "5; voer (&M I22DyAOH0$mB\l.okמΝ,~"Y; hfG+3t"((SB^̼B6APe8cbZN؁]5OAQפs?c|Mp&YTP W]x#7|foL,cgwœaFlt;5R yb^6ZP0cNz`jȋKJ;2##Ô87k&fb>jjVW\P*TqAXLf)o2ƩZsq;aA|J\~Ntϔ^Wg{uojdVe-L#Ff+{nSXj{=SN$({tE# sEfd"AD>+̳d ?;PF 4"rkl|1 wQ" 8|]gC!V~N4ed,QfpY O /=P_-'JBa-{`0;2083ڹ0[ӵn* %ZdΦ0= Gr)ҹcG`#= .칱a|o 1aZtJ*}L"_ cajn֍oMo{ZZ PnYZBt? P?qv/-L>N!9Sxhπ 4uJǔHsHpj/>;؂rX c,T\N^AH```ſ2?ѫW.$za}y:MCgq|--M[> Pϕt L ")X[HE`WDVJԺPTo]9&\P}|#' WT.\`TGhr?e(Gcl\ef̋\4!؏2QLE Pƚ{QGz}ux&bRVi=DqtB5g){RzB%ExƔhh)qeT/,aEraNB%euosB-Si.aAQ-&a|HڦJrEd[- 2DZLGyJ>;q hЮӟm>ۑ>GH& Ԣё?\/ߗ4s#!S̊JX8us9z;9OpJ[噣w|988O&P[ⴕ*I7@xAX/$޳_N|(L]ѠHK`4rO.|=+P!RIrG>nS6䗫7Hx UOݞr%,M~: DDJ$殖;2=}mJ"R:8hZvo:P.J)"uM.pPcWw4ƼL:%9 ZEȄkWt*iI=K9lPi(?=W{ \hj$lB4ܬh(v}qL'\HSaAG笰@5=v=;)+sU VlPq3\r_t,aS+C[iu7h4H—"$%:YLV\-q-wy`)RזA_IǭF[V>oi"~j16D㗧^`B^M eK̓RCBM='a󍏕 {|jX`r:2& 5>H&n5mOX+ec$`IJ>=~K>%7pazKPX_d5]e}cߜ.u"E0YN%BmwkG0&PEӢ#VŮK$'@J-L=&wCY B6CŖfFY7081*H OŦBoqiSaSEVPq`qm8tBB3( -JׯYz3.^K(G-wO}~NM8RY4EgHV8b (d`}{k*Z2 dUxm80/$Ϸ<ގABl&j?$[ Dpx^\84.-CkJ];^ouSJ* Q) P:|;-])ux",eS g 92k:x5R6S=Y168u7w+xEzk;7> (3%Q?[E|HTmM.1< hucԪ!q4ݤWw|}5yX4eO'S)óc(c䥭>m9*ʙy過L 2g뭎@"V^ͅ5u3HJҠ(߹ccgs=@2Xp8Š88ˢpH  +ͨ@&Qe[X6g蜜2Ak| n,`H{|::2[~/ZBuU7כ4|P96ˊHgh2;:fOk_?"S:p-93񲆒 */@7,Lv^{V.X@x O8s_s_ǜ.Qs Ӿ8M}s^$U_;(h8iLӌMi;/ð98{)@%lwxj;}2gdAN|b'鴝A_t$ʶ[ېj@xVw\)Rpݜ`-=bd'7'}h Jv=uɣwAWl6+U$Ş$pWΑ]B."=/Ҍc3n /޸qsn,Opƃ8{)7fiW /BQrcvX$n.]A|!ȕ9gn\aie!Ø@ SHO vg9铻2gUѺY 1%NCÀ/xqc}L L'O:C1QQXzN"ڹ 3LpO݁&!T^"}"c##~VE ~oȠܠ M&ƣ$(Kk8ȈXψ|4= 稹L\swL_mkiɂ6qm IDATڎ9\o6,$)ދi~KQ Gsxf/[7Q3u;iA\!_ 9KDryYIC}mfFX2@Yb ZMsJHe{w볯]1ǁ`..n"w7_ (4,&A4:2X[U]W[̊tkM=b 44@tb){F?۪ʊRsK-v%/Z֖FTZX,3.^teqv'3jgrht+_hQy<DG/x..J˭VmnjlnjH؋%P >(i4ɕftpt/2ZVZdóBX rU颉Cͻo䥃6\,-oNZa ⸤M)Moqpݼ0ΫB3-څ<_y<\9ږkߞ[V~G%y&*yJ~6K>'Hđ8p]=pG#g|m>G|s6k*wJ5UͷTMGb܉bp8bYc?%Xah6,|g(LMc E6. 6v?>/:%:E2*5r921kBm] :K#ި@U{Hq~L7Tׂטs9 'k;o)\;ClvRq-CGc-Y4S58\[:o 5z$FG-_^wbJƎ;$~2 6OG*k'z+z+aH'H0{SCk?@Y.FC=ٸ|fy"ҴxV!:>cIL\F W$xIbdVsNJOR N'V}"fFd59U^9cϛ2s?tP,N*鬝bטN4:nV.J_BvE}u_{4"Sđ4o(3 Ros$ vy9CG"<zq_sB~ݥjIIqH7>&'OW*dR'[&yyҰyҎKSd~FI-Ȯl;YXa`7y\+;q ~ʺy88x?{w[o͝~{S `lQvZuҜOqGGZ,],gFzum2,ỴGx؆90(8T}Ai5|pbvg[~L ]yi7BEw!ρ*20Й78:~t_*j#)b7aPpE.-G&#V*Z_Id=6HgKSn3!S-8\ѡoÆz}g^۶*DrΉ}w0ƛ[ ~|=ԑMQM]ZmCnm"/g @#0H`feI qKyoŸtTO뮵8O AZ&5gfٓK&-{w׫UP֭mV/]a"p]VҶ8L(l<ݷiMƤl#CKZ2J[;ΗWMd?[+dfM—:h8CgMe&Pƛk ڿNY,md(ŇzC$reDoz[GD\< ,QS(LM-d( LbQs3K K62&'ٔK|ta5UE#aemHxOGPR&@pn۵_VAj 4&X,_ 6 Z SUXNͮ(Aun@4 ZD%e2aQM'0`ii][[([X(*#.^$Wo61&,ȾF;[9RG$t%'VWV>djb:??Ʀ#Y1(ؘUK ff_Zz¡A>uyvKP|7PCe‰:&&'a7h/jON&'`OnĢ9%e 488888@2cd @-EPI K(* A$*=RJ :riwN2)rpkALj-{ebnySO1iQ$K rn9 }=l=%x~u*]onbkm5`bYWam|Nˆ謦]y$K ŝ9h,\ɤ3ttN<{eUcMP6yÝMy EFV9iWi;o~wi/DC—BOMnP""Ȥy+R+#DkJYscp?R$ ,-ֵo_%LM=5嬼C'mNέSJ%j+QfFPJOmȾz^7c E.;-˒:jWb{dan ©eg%)#ת\,-4ud7uzGnuGimݝ @Vy 6,>Mz R5qKQKޠԚ+Q0hL<(;gmഁŜ>VZe.ƣԍmPWNĿn yak2`ej)sz#J"L v,-ttJiW`+O PS׼o8ƒU%N]L[L@.oKٛpH-Nۛ9{XB$Ku*GE B#nemCT&P3rges;L`)<ixjrq5h-2j_̦Nk_9/sNL$&%s;Zi- *FGioBqbn&p8aj?CN%$|D@;=~o3M]ַq]$YZʬkuk &{; sd|?ݯg~j]* c,mY'PHZ#͒n|fEC\thd̾@ !bSZpZ4oAZ#?ϒ}![/4}UrozR*;*٫Ѐ-Z\2JL$/gĒUG: a%J50޲ %e$"0HiXx'x J@@g OMAq.Ӕ=yym }JW)括?ou3&%Bnˉ@LO MIB-"lC`jN9d|RnsA}_:=uCbHp#z'Oc&ma%}'vu[b$zZQ^N.Y!I*i{f7ԳO=ggh|}#7iJm'Sj>hkСe| kUqn^6詗^UǕ%tCCâ7dWU\JD&.妅'9DVO>y H$-X Xގ6*%(/=ʲs="[>ON rw^r&{FΪg޺~yl5pklbBCM[CMƭ+EIf&Zֻ4Lụṭ;(=wǞ?/lF`GVѢdqq] ̎h~h6oV3 :j⸭ho =E9ZvD<93<O J8-ΥԎ6']#Ѻfht;(!DFEEl}@pSj+5333Jav]<(4&*nGPD|Qn&]-{BT GSS ^{y8VDr 62R`"=E8VˆerB걶}/ㆮW IvsMm5#pղ:4>&HuME%z!4j+HZSUE A$h'^˓wMxMU7kybtBP,@Zs3 H+] 1eW{؅aPq;MCrFPeU$Z*K)KQదOJFͰJ3?i9}{IHgKJ ؜ʦKLr%-16U\U\{MkU~tL oT4.}mW;3x.P-YZlVtK̊s*/f;BζV~Թs   1*޾#))uruV~H=~ym4}kְ2heNL6A" gNsVG_)ʤL plicIg}S+X~.bŢ9][_ɗ0y}̔7Pc_- $Ykh'%ƍCCl.4.c)j̋ڀ 2ׇ+Z^C+5 fg'`a_!G 2e0yXS׺ƿ!@0aa 9hmc{ZkSlUTEe!s!  ! w`+~`{6dHe?r?}:FA.G2G<>e@r AffqAvz=Dخ??|fxBTVDF[vQCYI &OS`*Jk+<|hTopl7H >N<Db(>b_]~ wn]Kd̯ IDATC nI'G) پvk6(a`\++L@%S JeC[9-w占u WgEj WZ;Z;n޼g2.Gp|NŸcjƃ𵑈|XSq?b sr= S2%kk|匾fxtdD0cdfeF8y;R?xWfgŞ_) QPQ%:dOMn1^ScɾxDPm -D::sy(`A6)bף:%X5 5'dRQwc|d)g"h@\7db.{@ݠa8?7|--6=EOϐeW)kYa񠲦_pRvƟG{h'kbbݍxU//탌0j--Lw0|f*"!MLB@ 3Dlaogۆ; ᰘ}tGri6;6<S+z<(ֲ&رrۛZfч̢6Wyi_e F@IYxDuz;7!&:ǯIƆ:oKc>]NͦW~zRIֻ~~с7 1 Z^3's:L$YNlL_ӰS5$YzjR8}?t\ԫCG?cI2!&d0-@c-d]-&-&̀,䟒y8)_:M@dC=g2 Ak]<}Vf˟R!2 p8"++CX,' d#jiJD񧉙p8c&NTV@X,UO q9\_`g/2؟ Yٙ)hURҬ`T  r]]1N8 ;CKk+ 2P픻ܧg]u~dKX6:΁@e%T#,K9=E#UHAXu\䦗(#/'͗ld;잤U%{xYӶ%QlI>7gllJJJkbq:]9dݯ,G]UU8=^n tDZ.z $^y@{l nGaVHIK1g, bKeY/dcs jLbnEGc &fϳ(pw#r:f;3' %-{>ż Rcn{kN?KDEW3n<΃3d1{~t t,iȺ ߀X;%=MAO.怸^^@WU[rA*,%+SX^ ̈́@qd73*odBA %" <<LjJjJv9}(l-C'D|s)^F2Y ožn*XcS_b7!y/ s{GY '$,sw޾H}o7QO#jCzLv r8 2ֆ+ qIwJ`o#RgGG'&jٜ/P,ͩz=⥯Sݭw4>Cԫm KXREsGt$NLNb/K[>[}W4>)]c*;Eh)y*dV cM~}?wp45o /LCDz_8ݢբŌ7ܭaޭahGDۥϯ!FU¶=h\d4&wL>zSm ]*c2P ]&D$Z>.%A%@K}tm @\a}I+O\! i9jꯎ%0X")L)L2پ/+)FD˽;)ȸ{##>*#s΅dJ2CH[)ކ0.'\Oi>#%ك1.$\MMOA#{EH̪X"b--g/cwh_3P[W]g)({t5  GrE~PdOsexb0GIuSCt~q3S9#&Tᩢ?- vb/~5MC  uVۏsvgX ĘjFy%ovKM7$d7wwJ"u$wjόxT۳t|[/zX`fhE9qnIp G~{ؗܗWcIW?$P7ju4"H*h-Qoh恖}wT č&w)tAciEJ0u˽TԵi6~}iψy#_?%ydbZ79ESV¼ Dd7OW{CsCHIYBJ7m76#ZVzL0ӫ*fԳ-ms\1zfĵ73n4ՇnjJj;Ah/9_YCmIx)ֺZee ښk.]/c;!1+윕0.d7/y}O- H&++j=(j˾b`!-fK=Np^*?Wq_AUU7:Z/b]]B瓦Q≢¼TP:sZxxhݳ!?LVR\GľTW1prvGN`N|[Fj2Dto FQ@*U;lO0)l4=.5=ўCZc'K EEKI]|I]ƾk+ a=(MJ+btnqy E}#ơ#)cS:n&ER=o.HQ*^x:q0-^ZjD=ռnZHHP]ǀ-0?iYd֨`PEM4@#f_=0O.}nQB^jvZe'YH|Gήm'm޶HKJ;v$ zAWېREY=БҮN}r_Vx3/n|<-<-r}U,HFLJe }P`g3Ye7ifoO F7*u4_fH ><+G ;aIX 움Zjgm3o[˴ZuZ "(kXeGHBX/xEv!!y#K{|72Gph@g/Gq?R}C|C|.fMBd|,z둕 ड़U('SfB[;;v#TdNVk[6:/^ ::`ѮE_L ge0zV=+|  5%hPDُOO200[Vo@ ^&䶴7;3}}6NnH*J6A6eYrw;EK{&-{۲8TOw\ʓI75EĜе쀕[sCJ!/>bnR@/xPlfJރ3EH(j6Qns\ZfXϯ6}|)V^[M+0aL*Č\]J.Jw:~zk97@bNOoY]p[*0$ 6?Rigq*ZqW!ķ?0ی2"w;zcb:2k:2wka|H& @B6q]ob1$mKgW}>f9w ԘTjL${Z@6RySXDDcN+櫝m,h7k8|;5OnݟU66Bbt@xo \ڦ%;*տMM /Q:fs>ۏij7?/᱙qGE79s+#'Pd~{āzxwôul D,y|H$fǩ/).Ʀ>RiAnc΄̌T%2f*ʢ$WizƣZ[.beW-YCs%ٹBB/-yqP͂ 6HGGGt--+Vk"P+gs3(J$ل :bzKV;=Mk 2{wa(7"bn]10xB!"̌̌TG'( T ,/[gFj|ئw-l􍇿ǰaˈ80봷sDdK}*HOSԣ'|rA1FVdP??"Hg V~'͸W`D)),X-D.ʖ(2-w!znje!-?|.M * ewG U}T ,MjRiں7SW7% r˔$3^ jxWbJcT95ޛQ-_վNVVOf?>^zf9*'2fO~ua)w %od p-w )|hfzxG6r_þ ֧Q _2Wm9ښ@kh K(vB @ss.o;{Yztѫ wO( >fx؅~4+@;KnG'Г*Zb=Lv y82XH>+ oFwÕHJƥczKR(gI7ÊCqsgWuHǢWC<3Guh}mE~S98d}gD*[v8#Ԁ_͝?ݛ^q=w^u_mh8y8E zyO$s>ȄSjµkqfx'ID8ax7\~_ܓ{qO:xfVDp33U3<*Bq̵5B6Nn6N"Pp%?~[:ziC`[co?˛^&ћl.j+RO8|CDp6 M.&/PKK>75"r˂dOݽ"aEB1?>)6>)Npzeƶqlz;w:w vF~X\vpc uΚCMg-1 ҷJ tS3>Sؓ?vm$Ktz2NaCݬ!.ݣd!l={E`sekUFjو|V eWJs Ha)te*F_ˢ'^y{Dު"#͆>~2ró8Y?qsiz"rp bw# uɞ9|˃=vfeN 8%u[=M2ݑYӑ #Uh!=qYVxx@ϯ8|+MʉndR Ok'H"M.*Elq _L!55j)8Yq!xFcGҳ[UEg{dw}4.VyIAQQ.PdLß Mu}o8ڸ._hrғT'ŦRR.^jI4V=NcI2-tVA$4֔=+sfHd͌xo%>pfRQ#9 IDAT \$eoJ'qFnp"$/qL]]`QII<] BKg݌nF+R-Njyjye2o0OGeFrDÇr@]|C,]*icʮ}ֶcJI ,Nݥ{uEˢō,}2#Mrv]U}z߬BjWƚ$#wR9gm9-+\٠\vv,U< J6 ߒPJKno2Nmnn>/}V\x MMNHMN=ZYd \̜@&.LL31p5Sˡ>iڢC(n@"0;Œ4r%X,ügmtV:F K$"oH//'$%=! Jt>ʮUxte^*>A83Rp玟yBʤ̮vg3-y̗ꡰX"h&1^P.S6} ~FN HE3Ei{;SFci1} і`F 23G ]ZrLJh+0{K 1MbZ[qW(E@4c8޹қS7{e\:%k?%Gh잳I9gURZ A~E.DCeWPܸuq/3>FqQG8: h ;?-;?M-UhNxANd'NG(9 SE' 6L}1OrTO3?ƝWF"4<͵ CQ4ed>"A@Y*K1<Õ>A+;dDeJ]9Z ^hom[4^˄hcdB-({[ckVf.pt֭6 ϝ4g{z<^ ESDl=ըt$S:sVYèܴܘմܙz7@%٘*k>q\6kԨY^ZbvJCzQTzD0f@]tmɦyJ]XO2Y 9.% B;2;/.h%DV` * L.n>@խQ-[ оdIY2nioڲ(!O6lvy_wۋ}y&/!Ўhzp;~4Z\lV6A,$+%UtKIF b1( X$LM۟74t$WXb/x3sXJɥ|dEg<#a87 F4![vdQ ɓL^D 3L,p3 XC44rXJ>&}nIy3I2 R&'WFplQx5vwyρfٹkcS;s*% rdr-M ownQJ|pe_8P\_uL%B֒` !Y}?AbFiV5f{?rg1k\h D )A&!$mcKGchcWD\m25&b4V WVv@d;1wη1ja=Y5@EY-3QJ< *]Ў Dz8. ShrL3/=)gl˶ؔ_?P 29rEF0CJْhh_<αa(5 XX<փsj3e!vٺ"BA1D@XOܹiC!7`RkM)M#T"13:NX ~_ʟ4(%A EBğCllI|j r>u{bo'ܲ1 1R u@az_ Ӑ3dRMrNB;Yt 6@奔nxnP0A Ҏ/e&d j\"YîV-cPgV>T2h"}ߒ:Tf@ DHJ)l 5F ҋyB@dk+`+ r|ަF"MGv!UqC[\Or ,0zdeÎksjN@`_7 NTIC9_R<]7p. l:74)58tiIWLCalq-O}+F)Gk`!D)8kc48P8oeMBݜT(qC. 6a2>xZ),*UhG2hԉf"15_cH^^>[UAdYXqگq O&'@SB;;@@iv! BJ,3ʖTGsF[kիs?EK{StoE8s%})yp ֓v1 %6M:`٘Fq1o\/b0 ʼD/WjĢ@G7XQ*a{04N ku5U f]@̛sgzi#cLòlMhGrha&>oHJjDX<=LCN1)K-:gUFhGr Ow3Pv$Q<]`0S.d4F߲鉖&Y0kVsӏ=%eBh=$u6vtzp84R q;@E Q^aBa= RRhD-✙!H'9L2XFX2ք'<5hyuLMemO[3V&g΅i8\l@֓ʼnZ5L '2Qz]1܃L=. 9SteJw; eTN&Whȓ~ևDBlWB 3!Ү.neMu pS;wmdd9^-Yٰ[l1 \y0糏K&! 6ũ)%ڣ`9@`./:FW(PIub&%b4 ʘM21iWqhA?44he&>ی|LDd 42Aj6b{y1EIE?v$i4̥iY. @&Ol#h28TԖ vlVL ykfPXTcj9?=44#r$'2&O$S$1AFVUFJj>'VFYh^xcRHHl{>܉f Z$Қ+d35FM&ڸγՎvu*؛lje*\d ;8dўGɪ_'d"HEII\_8g'l:x=v+n0V+RTxw6 'K|LMsǙ:aR\/!unyqj2o=z1KNK`5ĹUB;îH`Dkn+GMC;}^)Zy[8-qc zpL&qq%I[[k45B,αa(-4^a"S CaF&ynz4}Vai`))% xnK HId\gY;*K*ƫޮs%I00:IRAp3K+a҇dD"  ёhX\N|G%mm&'9;jL+ 0 ') p;\5(2{b}l|l:ёaN,"5JU*V`JPR_9]fNh(h|oG*Vxp%I(}]Da~r)i"\.op"Us+:c1Lf+ HD`* CmCT;P@.% Is]{#SS]GVJPZّKЄ'zXTȥ$EZp"EyqqlЦܳTS)/e'B,b4 "^λ.RSܣ=Mړ Ze) B( P5P $aRQjm]βЅ"L*I|OsG4D,/*VUϔg`(D\"EVJ5[{O#6NV_SlJ1Bq#M2Lj8~Ū]g[>^@&p05J]mLoџW+IL#@eIzӪ.Ggu1XL.7Bש)(S+>r"$HsV* )5Ģ4c~ n[S6f7N,rk#17tqA9RV6bŒFDq. Np\∖Y$y U$L~{O3EJ?LD48Uj\q?qMREb\Y Ғ2n똼qs )I$I4En>d5+J3$I$D(:s2'gDd㙃Ao/ė!}~g*]uHI^W6X/Mq[(rc{ӧ~DK_9F캅r-)KucSpP2DpR+~ LzF>^Zh9U-0BʸvSlO~ë}"y0Y^є'T?poWbf#!GST(A6CE$bL?%VƎ'i)EDJcIt>m/=|O[Q57CU# 5Oi?ЌA_AI^@XD d`rD՚؞O|u|8ɬ9C$we*yu߹o|yx߮O>H]q-(D⦹P7 cѽq/Ҫi/,,\8gz>9oZ{GJ(\[гkI<Ϝ8h9>rT<9:~[cϑĶL0hfr]kcz=>Ο|$2穩g6OM=/Q,ۘziɼqIg_oe2x~/} M~w̠^T_m=8X\bl}aZh7tޠ1_eNK&̷;gױ?c: >3@91]I qkԇ9ZZ/)9ufյUf?qGao?hyup]Bk7|O[D˳=#H%l H%\J],o-Rtc$Z~>RHij߮ꏏJ+=.}f[|ncI>*Kp:8$zFTjZR鶇nھ|k;?~}]ƚ&{d=%aVrz͒+?1s[Ա?mxo9]}ܶ,oC_-;P#T4d^4d7Wj=NZo}tRQsnq7؞g20jrK?&yDu+ o:/dKVKŖe9;@3ML% aֶ 0it(y`f0eZ(H I,ɖdɶl-0?}}8r,/lfI%V0LmPj9BY,u p?^^ػtܑ6O8WN߯nV{9r쒈~a/6OetG3})A Ee̋XF$3yI 6L"HB %%[jNr/,y1HOqx$Tu=#ĪKSv.IdESiRg%qߩCDK3gwVKU6ls%om2sn^= E#Y?G -Gix qi 껳DKɳ!VEԖ&yDڌi6U3R"vgF8aIΘU k8<+89[Dho#(?x[-B`Wz65ȶ'T4dyI)*>)R|ٷgȚ+"#CcQ:#0--\otu-U0Xt*밣Z\ 6L[8TH(moO@AG_IreΩ1l\#P?.>;Zr/ ~()7pvp~{ct>A# ϡ(4u fnãty@p霕6?9i AtJYSٞ2켞ª'{ \M?Alٔ ZFg۟twpnz/?WذQ7:vՎj"8 #`TOm~qun*,nH(3tRԖAbfgZS[ĒJĜ;GFGQgg!G`Msy2[ٓzq*'eFb) `9<\W J>mLx|j'}0(3ɒ^*XUoM5m4^j>W -}ez%ZŝbTg|,F9Q_ *vr"Q3D3ܠXV:erIfYL9("& _r0SXH_f#ɰ~?Ѕ0S2G %5ahx\}b E9<t/Yw0TpTY;Evc)ʠ =v_5X"DY|P7[{(3 -t%Zr? IDAT,1#=Ln̋lVbU )M%Qѹ&3`]u:co7c<>}u5 y,ʛ*LOQsN\ c{vծ+Ȋ _.*J-nL#н/WzbFK˩N6{}2U Pݟ> @+/+ x jq5;~t.cZN|,,nX{1gZ.{ z&(v\ݞK )5Ch)X5,Yg4JO. [OEWnL_ShX΄,9{)rld#sVoddN'Aܗ+Xh1']/uo)x6ͽ7y>ȫ`ɧdrr(`ND V[1N_sO<Q6:`pp(|&DR|7۞/ @ggЪt N dh43/X &!:|sǶX`3~Pә`!xY޶F,AA'Ny: 54D!)bpB'^޺gτ3;}i usO<ө~/9WY8ܼ2ye]Œ?f( Ha:nz썻%evF. a#˾Օ ?v>uﶛ^, YKϋw%Ѩ,(4pi63D}Eͧ JRd$v.n{a~+Q+ 8V7bI!oa6Ͽ_]t?yxs9=IAY :_0(|Q,w6ҽx| df kX;AʇR|k9YFXN*`1d_l~3=,_IOv4fKrSb8ʳMU0d5֜`{9K 7"|^:"guvEC}t:L $d <bK򮥬il~۹:rJfLPd]=󧬔J ~w7`\MgJCϪcm256EŤQtY_w&=99 R:$JLX3$&'dž#5WS]"Bpw#@E~XӮh{MX-۞\A$$Yct VHĹ>?l{"?+#ChkiPӌi#͌BLHHGt(d)))J%HBA fzW"VKv/ӛ>=VSSFc0R\!hR͉zVHM#fc^H7.P_F\̟"lza`$hc|\ F`La٩'ёG}Wx&' Md`b5tѥ4pq,wY_v^L[E-C#/@'vm<~?;=R>2MG d_;}@ȕj0+$6=I;G"qoL'S[dڍ@XM{" S̟VŊ+ΪISWMz" ,ٞa/s\N/:zxZV4\x3:#6TЩUmr2*r'_jU w6%n:*%|%hȂ2e;|}CuݳSsd`'POua (#tMk i@]{c0t X^Dw3r#3$nXH o 'i J G04"GQ4uI/$%ltW'3νܕMOAC{ zo({ ;-%opq:g `K{jcc.!̔hV5'`vЛf@c`مp7Gx";,tTXMU1"fЭиϤKNJn.qoH# ǣz'[(C#]R1*O[C?%zۚ ȩ&tk./pM$r  lGȰ~`j=SI@ "~V{~QuG]$yf T,]؇c#{y^;q94h )G5SEVҡ>bjcCLa᝘.t-v>bF9Ev(+0 FH0`6Tb;5$]ݕkZS~^z;ǎI 4&ABܣ]8^Iw8so{7iCWՂW5L̗oG^&Kz{|/EY8EB|UrTy"zG;UXƇZ}%ģbâ؝_Nu9->yRbEeC 5ͅYmmk~]uL[P(G 1 r{ڌh5@*:i. 8t&NϓWEG ͅجԁP;;LKڦ{?5jw *o"ݬ,zՈ4U>QbZZ`m< 0 ^ӰZ S^񼺺5rDũ$ $m=K$i$p-["*5ub`$|\[>A馊 cje"w9?R2 ݫݝldN'J}3ds>YX甊%U%D„&J<T."~IQF" Gc~`N~]f1gDwn^V8Nqޔ<(L#^pgҭ~W5(̦TU. `ie2p'sH́E4o.w[t`G5Uu,W#{^D! ry}[i;u8LcbAQ)dH7ڟ~}tSxgQY^ T9qf"B/`xZ H88)z76OV.v ohbu *ɜkgo=]$3zu=~&<7+d_ _^vS17`ЕK54Et5?4o?E1y$d}89-^kqiQ]Ѱ?ԟ<\;1[gWd^|X̀:mV m3ՕZ/b%20%r7\JKJ 7IFE29(/u'-b b-))W/ntK-`x69M9~5GO5&š}M|gP,4>cIL ){\7c^gD\1?y26λmb "8C*}\Fb1=eW* l#&{O^8P7: lq&2YI2Z]HYIFh3mQ_@COw^2+/Ŗ(Sf,"R+|,='fԥw"K%ŐRW˖gDS3W 5ȘPX8̚dCҲ>ttMHoTQg}8boC&8T/y4)αyѾ% OޏPVgwl|dymq @M}{5s4ixXպ@-fjuJ*`=p {r )mT6oOmBg7'D}g[f, ۧZ[qÊz Mj SmqCXNC,Ps`[]^VD/l2!:¼XE@d67x~z-uF[eMͭBܔ54qxL~ :J3\gWuX化\ܰڝOGЪaDlJ^L("A[$~I.+R=ƲB$*Gr^Pxva&f*m >PZRvru2K6m pOj;% A~Z.t[;Y"A6K%e|A, FE( wt9,Wbak#B립T3fD|ߠ=Kz]W*+cK Mۮ f1!5*CiEzH)<-4XG i#~ 9[Q`${zF9Vs4[&]E)рޟ,F#ϗ" *&x!SF<%;۔?ʯh漏áhOH\CmD: IS4ijpϤmR@-E b3W\nxfEC{[RDJ_ v&Օ)Illh RGqeө ,>;/OYd,m fO;'Qgy76)Z;ԺO%v2?H@CmϴvCEHå&쟮.WP G{w/߫M2YdM{T骵K`y֤Y~^ݖσd7jƕYpG½CN-&X`R]e05_z;&džv<L PQY`%ū4mtld(lB^w'9ttMxV%/bPS3L;XLŷ64>SU4u|$˱;v H- }Iohc[d|횥K#-T⾯4;#uRS@lgȄXN&~X?#G@˨i? `m'vomk}QN&Cgeb.VK okzyRҎ}L. B!W @j4&#^x5/*LLdeb@d8:XmѤֳ:z,<Ŏ7K&(.?PQR>*/P֮l/3Ҽ$>6_PnυH6&!MF@&+~@Mp=b$VG`_(N.-AԨS~Nn\<PsroZH>ˋB%%|*WJ~zF9GKwe[z)1gp1Sdr9^FYIAmsJ;2(bX%8"|㴟0* q#v4FiI9IV7u6YXv%JKtQX.<`ԛً0>;TuNXpݔӰ>7k0T J/_-">= K]++IѴkW8eF89E"c,P^3N"U*-vQ035\t&)]e RPeþ|uh'hy:bV$~nEZW'^ζ25r7"*(9MPR셸)`w=⭽x*D 1ݹ&C~( Pf?xvt8m>f(W6>a?{૧3zƞ&f6;(3h0+E⯃srK8! /0i~}fJo\\6Gt ϻ *,65<ܛ 3?X g5{Fws>ahPdponjГ͕ܒjpzy>)$*.#wnhhV֮uFsT{s5 -m%%ԉ R="ǂ~qSi}ág|/psxڤW,4$\{2As%(P=HBbUvSJ(") ;6 wOWZ)F"22Sj~_rJՐzb<7o'esw 6JBR<9r#:͌pwEkF;*Ic*Tl@nN?`nfk/_:'$g Vȍ*Muf*0|X˱:ɳt: (?cJ1RKQQW`;/`T㾹iC`XXb8϶#@m%kr7 =iF4ȟIxrg>*ڈ IDATh!ϥDEk^q,>VnY| YkMD3ARR]gUWGw$Ll,Hݽg]^;r=+U٘e6Xd.o$c͎qn!S?Mt ?X[+ ZvQee(hƹ xXs7B*4Q#R`%#YZ:Wrrk;dĈ>l6K1\ uz ZAePJ:o)_V҇"=ioxqq#'Qg5Ϙ֧~ɢ Y(bs=XM2:v\Pcd /b\{Ru(Mhi5f2yz]WK5U3T^2/: ݽ5݁zv6N<5Uu M$0  $-38HVPy| -"h9u:{6,M?{Wƕ^ܱ$VDQEclOeL<$UoOT'LFVlKw  @;H9Ewk F۷o=@KC Tx.aD/TB1~ ^ <`[*Ԝ;\Tvu!wØjfC) q +1_PYM_gX 'RPWs@f30LGP*vH27֑L1kt]qLEW^%=AL  F}VA1ʓe"nJ,D|U;eo蜃lM`ȹ $9@hnh1dƟI,Qz_w#Ͷ4|{Kԝ/.G\eb@ߝ$gÈoD9vRN9qW@7ם!X|C H^0_DQ\i3q.< vS=8?&'-h:e0wmMcӋLmmְKS|OJ zUNyġ a4j,LP,IDЮC !U #"`02u #P //Y!I6Ir5VyC"`0Hh6z,N۶|:iIO]j2`¡vQ΢9.JO  n!IxV=r{C@%jnxs'A )C&'0l]YQڋ'8u:'Q =tt~ :=Pn T=TheRgB*`h6ל9L@k3'm=`""Vw[tu4-u8=;h7XL-?oX3'**0Ԃ '3OaϧL{C |%@86gDr.\;cݲ,E/ux Pշ>o>qʊ}o++K th*E+0%XR1fANץ0vJpz$1BSK wr xO@#Z.B  w,G/,ne5Z4zA X|PZY%ڿ`,^;*vS~ȭ+%Q>5#z9C}  }mTpaȌ`ȣ&^;GJ+obqLL>Rm: ZUxډonymQÎmf?kiޖo/'g #njjOi2(in;9͹[R0r:Vf|޽+lK(`4GH(9~{{{u%BFb@-I@> 慼"M Lv5b55ѵ:%NrCFD"K8Fm{$LTC. BLs LMڤ饆 V;;;,^FIi!ZvQ==NFgK sSjjH d-ⶩArz؉\..J0-XL RL.6I?F>nt._Q"w Z(IVX,Rt;{>J٣s=dWs$_+tk3Ɉٓ6&t4+\_t tw^X`.p$dLգ: cg[ȑIk21L0;H@,3iY+(Y8/Hs$ u~s㻯]%+$#e0?{D5*{\wM?tv߼\lUdvַ sAM~ݎ639 <(,rw* &>+ƈ\v,=/ISӨP\%VoZRkZ4$ůnSzmnroJEZ`9`uxIDj#r9aR*}XE%۫>d DžbFc씶DQX7mB /U12ُ)s,Eh(0KI*l=ri:(uTbJn8}~²a-!$CD"Gmm"a"A81m,=:z*[2rrrI2[ 8)Xz5/ZGn;*:<sި>URkԚ(M[d`,9<';l)( pfxA-XNk-Z E^lhr4)<ݫcTJq_*ldjkTݛQgr[LsbN:f<>;Xq^L?dCY֎LH`1oȣ靜vL-W{̭hn V&"[;VQ]|RO9F0Fq A)T1 /[|֬,~g # g"!] 嫙򢺎 kWM+D=> wLM-w[0F/AosL?Py=_ =2E$[db6`{Gvx·/ŗb|=ikG%a! :"o@6^RHp K+$ՏF M[gi+Kmmƀ?0`!$d$쪳mU͎JmF]m?*UVff;3N6$I !|c cs<!xP`s{>H/ȚB{JJt}ʱX@Ch UGK{=wZ'&}c7д Kd\~ZZsE2 +1湋e?E_6sPI  LdEY2-{a5*{_TI|}m O^6cEpG~S# HmlfR ]וQK4GJѹJѷ0' $]6i\e֋^ Nq$zfzQ>76:Yb@Pg[؜|xS1,3 ڠW, J&\$f(s,ؾ.δ|՗FfV(yWta@4t,ε}Bvz'JF<FHG" p/-Ț| qx>ޛ D <V% &*sDʰ޸uOk9O1%vfp3d"46}-eS.t3٪+J|6,4q-ecQ"+X83d(E/&GXra4A[0FS`\A:<(leRs<@IiY%X;ѤU nyS <0x.^ZQk:zM2mN^i3>: `4[Dfn;KeBJ͒vos({ ?_geH7ND].CEI***@teTٺ@B&fT*P ӱ%N#&hXق(!H"A.,^4^% M#O]?܇r556-cˠi1|Aᇿ`eN*ˈ&j0lR<A~vwT^e$%mtێP\TdEd&+oT&>"&K*l8.6/~$TuÆg qU<6>?ݖ5myBXV\m'ĤQ[R=qnZ|OIA,RKM_8u_;oϚyI_bkx?}mJ.y0( ,nF`6B,VW(b뀤u)uo(zmog 1QiI1jXGɫ"F IDAT0VٝȰD*bAEDbg/K]6k=v54`&/JR@>~Ujmn+,d(@ 憗KKMv'͈DRdg /F]ۻ;Vuf&%,םh&}]I1pϴQyw A`A/SBLO<Q"dMB) t4Z,AS@fSKK^^-ER uGky#D9acf'"hGD,RGf |ImKQ ߧ82E5JE)Bzbx,18|Yi`tt+d"'x8X]'3RzL:*^KmXN3s~ubpk b=@lB Tkm:.3ӊ7/sڲr @2(`8ߐ³#R\$I RuR q%M.3D8)tsjk<´@80 dSAP^% w$Xs ջ{z3tbv/ʏ{}gg+ 5HK}Ta,x#PMt#-݇j^,4op@) X;J[u"M*;|r#:ʦ SNXע*Jd'կ/m͊x3ɯ+"yjK?m&fӿѿ/*jܭm]R8%hhll,-+/([;$Qib373i%_k>M"fIlwyseeD{(R0XIӲh4pv kcF^sm]v^k&L~Զ&&FZ &z%:y^/|$`t2dT'g7KR-Ivv'nZrPUɕL% Ŷ/s1Ih,y~N9jbtMs|o+Ʌ}߰2(MOb nl7tʘP:Z^c>ꂲu; L%Vx14YKYHgG>i;8#u AZ ?kш_3b xH,%y0rO3ƢrP"LvHג/yXTWBo ߭q^ o8ؾGUYzo#BG{I'{透'Yk&,rH0 $C K\!="cü9DEEw]n?`3 ?[|"ʵ¿%Vz@QIi{Q(@ ?Fҷ6=!B"o0#Xb6+ m"Og7!#74GOp*@>ؚxyaHRhr@w+%*1FDM\~ڸvl!R)4]zX-+kj#KX h n\*UDlㆺX&jKhOB0.DdNG5:eڹA:7 9 }BR/v~AG8:+y~ Wn>~YAjZ u9z+x01ug:ג\10]z)Ou%%R=O@,Ε I vۄ,c3TB.svTtH&T8 jyeLLBa\@uHK$R+ @h`NOY+y&auX1 NP\ͦj&wshXOG0;5id)M!tLS3H9Cs{;=DTL/${ DY'j'JRF& o//KY?ί?1 +DGgȈ&)j]HF8gn0 DzoY?;N};j _VĶ 75y#J tCWd~G)7ReF!k;H}3C"XۥD}LxCmZ7ؐV;ZIs }&]Lo6;׺?V503KR"}&+`#%r/[V';h| vf9?-{_䔺G_*soM\V9JlK1@kVsF^+_Sy4{.(zn{Q >noht96CO#po;n/\gutv>'A??R~Afq(Jhb!9ĈeuQ$Kqy̪Ȥ pO6,Jf"Bhpt8dFcC,d. F*愣 r-B>*$qᣄ7Dm07Bӳ+<2՟?ܢ6.;;L bghFTR1/L[d`.3%hhljo!"@(@dR,F-Z?ŧxG(lֲl@!D4ORb`EҴRW6܋RY:>ǐTA+KD?B3fie.~5b\cFPd`݁2RGǩd(s4*sduĬ#Vv[ #QЂp)Scma*k=n%Y'_^ -e"{(PSAɁ([~U}u@`rp>lnNI.nRsJ |6CRWc!7FA(^wkLj]C|.3C;P_[ӨPXT+)Ao&hJY9"=pan\t!ͷ _QgċKWosyZWc)ՅeJ2yAyN?s/տt@}m q )0fw4fh/;LG#DL'YHV!Al}(}SBF_ d?b8Gaw'>b={H2fǽ  RE5Q8;LXd$F1 L6Ϧx14@F,?: 6A*1|"@N0E3?zCTgEDRl@:>m@QIAͪPa&xC c!H\%=YTC$3%amgcXD}Mݑso ETJ!MWݏFq_zB XTCwu~.l6 Vz,pb]@a'. N=vlDZx<|[*tZȟnebl64%m#J{0 XDŨ2)l93QtSwi5 bni:L9'3 mV&" vMv;~94 @8Vmߨ038>r*9^}+͈27LAgGNhR!dߴZѮ2QA2H\(UX}\O7hAx-ȣ1'="h % Tdl~(Yqeȥ<:6uQ^/ߝ9J2D3x욌'EJf};&^>tP8g^"m[G)(<+rE^`F`O?O, Rs_pHe{}n !B \-  'B`!$:w}'+ckYH%XRh::WO%sM2;O_Xl@}C%Wl,~(tM7r1O5=`nF9#V[lcUiruL;dQI:TިXSyY~ཚzMnPZ#Ҥm?=.hL}@9.3vN|O.=ر_qD6w)1D -Ci%sD0S:&me˿U-IOߝh(G%il$"j>WR57VtgI Ho._'Lh0MCi3NLQ0_p2G, $YPnA1.>rj_w0|`g}e+ku-@?#-WIE4YOnݱN#iff0Lhg'^loП%HT@S1(lNqb{ 0_j_&7ʣºEȓ7O/,ƺϯ+{OU@tg)*JfJ0-gfA"]i-N#, !ZYrٔOGH$8 " O24Z~ګDAt3s$aJ2@p9v ywxNmrkl +K-+H -^(IΞfpB,i.GD`.6^Jtj4:EJY c/a#---Le14+ldԮH@CcCISmHI%NNf 9(>i;Mʝ9nϾ %L `2|N~c(?ud6/F0&Šh5OG{/Q`sY|NN̖pжb0EtpSay3?p#4_3Yu_ȣ Apegf̩$W O)BJ$ @rGv !f屽^S+.}fn8&vBb)7NP| IDATu|y<SI\AE$tqMƎu^^:0&9Pu) DӍXH̳S=W 3&qSa}rj7HdaA̕ByRTKnS m3b _<Бl~B7.n /7B7ua44\47 j`> EjPכ8gQ']QSi+jvMJAy]ozbLgr]mT!_fV5Hj9d?xF1D9 yBQḞ':S)2̩0]LHIdbwyr.CJz B֞ىXPϗuuB )OF yx ?_I&X)]iʟ _ޕ6vZH$"EHQQ33=q!K'/ZAm֗)@%@(ؙ8h6͌F+Mh!)6J9 ^5-:]:s=P&\6ڸjsO$#Oȇ1*oAː%㋉iP}/ ňƥQJ+w[ O˟pe&`HbDu t*1zԙN}@i?bwO,AGu&RahWEŦa%tLT[})$kw~5úƏ/(l˟?p:}u7X`l5Ae` CęG<Y 8#ث(2T$ +0gSȤ[J,ݮblu6ړNҗ0ZFǐ0[tTr$٢E$sy#Sc,</0 ߱V3*$,˪>Eln(Ts!jDŽnL*\pkJux6Bjb갷Zy"B!_0mWW-D"!F, ݝlnXDl=`Um%Er MLZ&Ha8 Lɮ<;Erh;Q/:F٥٥'x~rO}scQ?nT(ß,m }6OkMsc]<'׉x M gS|6gCI0B:~ Z4T10̌ʐY"CyL 5D}x2o0`tDx|׋)h{>, [ΩfX4ޑTͥ_qA *9mM>+$# Սĸ6>;q(cV;8?[:"]mN 1,ҹ4/9,$V1s!L=1L8ATSO׉'j߰~瓟rYޯ)h6($jn4˃|2OnQW"1M=+TJYz9dIQ]Zqo|Eose2n~*~Xu-}pu0BRVm:'Hʋ$omyXGh6.ۮ,K.S멖Vzy,O2lƦzGܝ筵vHO߻o*/1͕WZ:ШoCl;t եԺԧZ&|H%=Ϛ>ZTKٽ|r< p#N(h2k%A7X8h ~ߟ`~_ǧMx w_x7-oPpIKIlDgoX@CC'/]Z@xSF @6C,0K--@ jZt:Dy{fR c,P_>Ǡ#->U>}C(`i;rC tZ֊|4RYThnS lU*j+w`~CtNB| G|:Dg/y7`\F |4 `:w x'T (YƬ*gSoewX߁A=U?J(  fd(Vyy]QCN `Fca٦J37yb!Uiԯ4dTLkĩ\8@b@ʰUe)|6>(d*LRhIᴼ߂6ˀ:\ݢ`2qJsrQ3YQ1!r,Cw2$]s;5HʆFR^0 XbTfT~c[{9_ l8He-D%nnEB ;\ANތ$?pp8U7_fiF~u!T\D~,Gu#ok!xHē 47vx2 H!uJ~.8NKe&!kZlGI-mOGTzn Z&هANzj.>"ޚݗ`3CK2dOR"jI__K"n} Zz}Q^b ˍ #[TEE;sXybUvӟi7@#v'Lݬ^ )xgh|J⩇"#$?"^y0Ń8KzMt/$iX Js6Rs> .؈: $?ɏJ%tJƔ"G0ϖW`s ej qUZQl* }O݁0>PdPAdxOb8!7<ѨVuN(f]| D Iq} Sj̐"jqZа7,kNk CCC#"E& hniemf|~"{uu ?X+Q|1|FF K xRWAdFs),,'WcjCA KH-Dnu&7ln.ac60 "x"P,(¿:i lS>x%D`6eD"v.Kg|׏ӦE?19-LҫZO $/.~`DB((tQD_Mfp0)FcvG(bXkYǞ_p?|@(fl]T[5Ov}3tH xx֮q64B7"l"oF7Wg!OJ!G/sVAmIqp΄ƨ d- Ng"T aD'Ia`v<r;uiPFάoup-gO5FBJ܈7w|c}\ ‡m# 6^L}Ig+ZwRTa? C%,3w紎~凉<eHd @˕27͝=1S<;Zo[| yZ5oIآsJxuܛzYdSLsKy3JbmGwn8|mnxud\nHjx"xZXQa#AcA/?ђ\˰p{} @Re>,i-~"ܽt#H{Hni=A}vJD9t@VM# b 3<9x`;jmU?/;EԢZAVV2Lg}J̘@94Ĺki@'ZA2/_TyBz#rw'O2'\e,%4d`^tym=j)[vle"W"D- WrVjo4{];~ugyG6c{o5X2)b8ТMlmmebPQX[h óD qos[e>P/$4:%n5 ^iIδ%aXqظ7,]*e"%ʰL=)r0pa$/4Ze륌V|xZIVVlU%@軐X[[(pYmsԍ8dBJDfX:m&Y@%y/dQ:*?MmDtx?*?77Xq*M00yY6H&[ mnk 9']|SR`cs Jŕ(&rзj퇙N5Qj́y㪂7 ҫ7V4 >M5:"Ė ¨/cB CwfOy$B Љ!M{Ʊ31kv;>Ms5IH C8c2+YYUwIDRTo~ Sn6;~=񤚷@jvׁ!=\ tQ^V'єZ^eY_\`1[rUo= 0 25E~"rz" b~@f!ޗl^bdgCHabP.|$ؑo'jHiSة*$饫(lv+ ܔksg Gp|s~?N'ǴOqB+ reZ l/=vʵ"Z8xu2+V˹4.zDd#2wښO 2b%>嫒"䗦e Na*ztx]0KΠ̻USkdHɌ -,xCT;Ë95`vĒsg%9]?6txEY]7.k79%tpϗJBPȬntBODw~/DnLcY$DxBwWˆr@7>>-Be-* G;>x l!PQ7 Y vɃf@{|s`ҭ^]kWd.򬙖+  Qȋ죿)(Ãu Cp&wI֞e"dj(50҂JS8]v_5$T* u 4-[QՆVS95t|W{|Ǿrfy|mVdZtZbVm :5 $rY\`'TH6 `}u)UDMu Fl@C#fh͔Jt@[g (V8NђS) /!&'`:6V5gڻ''57 |qi C"y*W,2 )Sfd2\\2O,w.YI@@q>xIyO9wWUģ'A RLO4kiz?2 ^.*,<I&/""kFj2SX"EӗqGId r 7oN:9Zz<?k7W8bpM  `lVc %2wx5䬗"ơj${C沱/o*qA>KE[V9&QqN8ٕxNwO2ƭN5 Ilz}v(, '\DI}6/n'tl<\^](x<ٻ/n%*!b^G{UϢK>։;&BO7v 图HAQwTS[ >-vFɉS yv=QK uP1Ss0R-qZ*{w!wt}K$$p  $8Jg1)֎3AuXHΒ޾?aa~' IDAT& 7?_#"Dt P}'lݣؗn-dӖ t>tsg%), :-Tn4j}RX7ר dU 1USK{"xu<wXlK( 8%[Dܕ#6fFخ \&gV]{I+6s,[GISP[9#h3Aȫ/R( (-oP6`?T"{J)?@WHڎVJ!Szџ詔g*kui&#r"_+ߴ`΃jw˼A7ʀ%VK'6)OѶ(j_ċ:|k" UW[Lt ? =+G4xv<DGg8FET;ɁvIJJ*i8}7F[0]fLfK\䅣A{M\-^ky6>,5kB:6q_-S,H.0p L!xq~5 3H=E8T11yy1v1X]cЛ]V)/PpDMg6|qtsg%QQ!;j@SsD%1ݾ7FdXIi 9zc;6 Kީ՟66BvRfkg>ˣ0Ma )Ue35AݮH&1: ̗ˠ nN]vn6)ȕ?د \ l<T6E+Kd]R%h,.N tBDk.<<؇Ȩ2b^EXw}}X -z~bv>%}Po(\ UgqF&.f[~oouj`s(޹2D)U.C, Eʹ(!y+EgkoWfx,oml6;a#V'>`v`}u q}Ng&_@2K7& $K' "Æ~.~} t@43?h&Nwf&ΕHK(W_pRfڮsRKtxD" J"%yS(ӹ$yl|9z㺳0} 1'hltlVkB '"? ̩2.R?B!Kh,NP7*"s[T.Ke֥ '_ڮ`"$an]U>x} >Mn꓅/u), )OSwU;{EM{Vqv!Hb%xd0s|, 0׼#r2]gUίa {1KW.vpHa%58(i 2kv~达4P-YR ,:g]x+"/.~N &[jT^`~F[#/,h|[{MP񦛔s>2=NÒ>fHd*Cvy,a6X4{X{@gn_BB?LQEnSC&YTC`36 kÊ|cՈŁ59̭< @]3jXtA(umjU4ʹaĤ,ךtGغyLsհ;ࢥD..nWZM_u048, |'6x@1ਤVNrtT"10%ԍ{"T5q3nX,M YQj. QGTʯ-Tz; dT a򶊲ehi bט*dQ߰!Kk}} ZDl RG7^T#ly Q 0ʈb9l@[d,QZJ%~% vjx-;_+_I , @Ȼ4@@BBI 2pt;q:IwMujIb6^zjtUwUfy'nOeIHBB^${ q/6N J7:s}9UXmz=o\?Ӷy>9~ vww J `R:AN,F/Iʬ'V:F! /f~1!J?- d#'5Ynd-BSIo)Ja<\.GPKI;!~ͬLK&V(kj=N~GW5>#=~z逯e4DʲzZMQ)%D-xK b w l,EC#%Ox#RAC0fHj@Ba6HMi=|Lӑ4l2<U΄Tޣ퇡{^7YKvmܼJHgˏHHzZcэe|oMy=4YVj[Ɂv~2Lk݉1>VSj7a:Ocf0luƖU\䊻F?L.oPae6|2c[[}M k*xmFVMNp5sw&PI߃Bb=?4d6+g!~V}H:C'o{~~Ծ<~N k<'.N7zFA1Qxh=Y:' JYLTFKfwyÒ+FQ:Od}Ze~ k$EzUx*DWAeҋ &B;XXTW(^l] Km!ft^ZU &VG;I28f7vtQ]x|-ֲaxiQѤ2YH N?t'P1<:ç(- ck:cSY6T"*Yl;{ S9wT캤ffr\PI`"6"'JtyY&jh! 4tO9<,f#s?,t<Қ=`m\Ǜ@ӭ_qnAgK1 e jʟf\{SgSٱߐy@Ms9DLaT% -B`-&>]ēz @`dE ]O+k1t ẸHz^g_R-[3zΒ^j9] Vͻ!{Y(=.9 >`;ɜ_Nvb/1 .Y>$!QQ^)L鸼hxzE! ꢵgݿy]􂠡VWc|tUWcP-vͤ c00-XO Ihl "-|:Z].LA Z`2_0IX/b'#4 0pQ% ns,003ǿOUUͭ+e]󊲋KX#xWPh$aAIle5n CO㿝y$q;3T[X@YY \jRDׄܢRgAʖl|I3D]-%ndy`{ O0[1%[(Ζ!-GjN@d>-MœWHm(1"׶SP/$6A)7Eq2Hz~1)>xrQSfE[靻YHipY*,I&3atipG{^X_ H0H{AC>8L'3JR.| daO8%s_<9d3ދyzzl$bkOf6 *ݧ 8D6Lvb\2A-}~֒#n_Nq9R}t}̼Y\ɷUՌs*1r9;qi)ZMO`~v@Ÿt{U, _6myfR `z;*~ϯoUT B6S 1΋Ǎ -9 S6 ؈OXI`65 sÂz#?qu[| @l*5vz~fC@{ۚ_L\+jEf.OR/jdD:W lh 7Դ@A>'C('Em|ln;WiNMTi,)sL$G:LJM4#w?dg۪zʛܠ=j/PUϯzG)UV75 պ:BXHj˪ɨ~ht~"V*o=0iZ7bwo?=|#9*h7~op眀H vR L&q9"]M=m] M [A g ZU fJ >ЖU9:HgJ->$7SA<\,a2wDQLjM̰HZPo:R!N$58%HW$ SuPo>lVXkQYYY^YZb܎cl6I1 #pRL:%7GT"Rْ5Zݲb*7UqXVǘЦTmwj~.Ns\ T q>uهvsaJm>wvq2[nPƗ4qLmO3[ݧ0$3iu1Mnz|'C!\,dvhb /4E- 21W%Rwn3Q%pXLba!R/#-%SQh"2AO\ϧ=W +K6>#8\R^~ChO:d{P+wG51!TuD0?uyɤG;b^Sw~1rL@0B!7 LL^Atg$3A:dA>'-2>2OǗUNgEw[kDۈvDxh= |2OD*|`\H:hϮP*/HdL<)tt,XSz7<&V2'hl V7C턶%pGށA#d*`%@ J.e{qh PŪؚ Ozw;)IhS.̟;%&<"Z |v6J1 IDATkq 9lKqݗ^esӯDR.>Sf+ RK]&ni<&zT1ߞfU,!ѓ:XCTSdnx-4XLl'^d>BkZ/-T(-}aщǚh @n`b.WYSm!xl;દ)-Ӳ<సT}8H5KoLfO6g}BaSW Q:mPy\gM"I~#<|\GS)oCt!`[y!r\Yi~V3 dwPcp _䯤@01+rRĒ4G{D!>;LJ?nq:フ㗳C;y  J}(]Nb0I8cMXMtUS>ˮ`$"R|5G׮Û-.pQЂ痈 .{ Slȷk]v)mC(fl$V~'Q?s$fsi7n(9FluD{]O޵uO|OA$H%QO˒GuY팧.:E̴$LW]td"{Lǒ%Ѳ~ HA8^*MI 5+<*3=t['5F"hڴOym@' *>/l,T &>>݆jq6 Z!BNu;k9~@QBv%ژ+W A7Br a,vG70Ρw& Geѓ͏ m3pltQj(Eim|qo3QF.їMPEe+ ysK/Nn4OWxnP/v7}- jH|'<ȧh: #?yŸHMT29hi_2 &I*ɺ6'CtGj`{]{L.IQm#dpI,[ ,8WSgMO5ej/mʼ{OM1&yy? Z|d@MV{;<^,t) bd@}y 7i_(U: fA1f*20排,}= zsGGIUKAޒAxW+H$DTdJrZi4 %yS^[+ 0-d, HoD=2b /谕u:S豕M rr/Lw8-XQ]U붏 Vx 0(«؝"{yEėD.mR5\MEl|M?Q3RCN*y(b=MFf@,*lTIښ)Kn b Q ?~&M٤9sT{q=—Ӕ~(N @qw3!HFq'3I7#LᗔB,eA&!Lˬ* ]pmFh):[ z!gOaql+Az$ vg]@8#k)dždNIhejƍ~ՋIE8^` )6 p[[M-sq?Miȏ%"8<:R 46ʰelP"ol?f1/o_۝UR<ea~ / 44Al&޺4k4Lxr|<;矄 Ma:L3{alpwN YO6eӐzx$JӿH[9,o#w^4qHj? Cd4:6%yJ/Lq_.TioɬH%E]Ml{ -hi2 ˵t;m5+0%cu~bv9]<'i]}%p/{6ַRIHXm"AtK46~]z)ѻxf?*],\֤AXTta@WRECvGKEpLEOÄgyV52Kc,{ϟоVG `d v/Ù^*:40V^.{A ٲllB4 w1ȧQlם9ݔ' SY(FͯЩW, $qȏ:dMfhʑQV\W>?KįƬ[گ)5]IIIEtXf*ʞғʺ֛S=$wiv Qh8  >e; |jC|^x0v_nD:rċ|h(QJdUk0~ VN_saceYD\Nį?N,_7iT}# h{/sY/̹#" Z^ͧ3STfS'z܀ptth'"S&0Gw%:dR>n!ژ8|qnQ# $ZU6S"pyjTJL/$*<!` Ng>Edv9ultrB? cx c{IVrZV(qsn񭽃d!s%d 8;nq Gi.aHa>&}l1*_R)(/ q"Xb3|5LWF@4#%[4bt. OTӵ+Ws=V7Tv=] xK/r-})&qt_niW; F|I0ÎgBJF'$n[ltz_ 3ig1`#6&Jrkƶ;{J 2<00'z"F#-`\N&Pb<`OAkU4)m 'J篹RqGᲓb6 d HN& `Vu~0྿M>L-6fҳNelP ъvb4u7%݃}O< @ɣew{J f>mF!e. & 9D4Upme^_ilBSx`)xDKo2Vd.s\|~De`ImuUQIʚ\PbM,D.GZ_ѐB;+WNc b{$Ƒ9^8 coaGtYۈ:ELLVl C &UPS$r;] \%#_?Z0ؘ]]Rc x>v+w]R4@) 20—-1 LI0*h#&`m#ل0^TU0ͩdC!F߼ ?[T8m_oH`'# LYmYzqbkӔ o%i2lO \Xc?YW,b<?r߯/ḩ6R Mxf<$_=< 2!{񣽒[SO^6mE?GGoDCEן]ߦ[BˌO8Q>-f |MBͯ+-%<{]|W2Wjuʧ,;:~O%'C÷?}{g5mل!y7m~ZM_r>2;g}# x)Rb>W%@Qwd5lwRf] C J1wIQec\.yE!6k8V:AFs2oN>M-eX `3%dS%4Sh7>lw^ea -N0l:]I\]DtЭ̫5R ܕQ҉oIž7JSk( "466VUQMʦ-=t$& &ӓ$ yh:_&cwCz#'$M6Y.Cf%PUUng׻j {y3Ol@h$^0T(!xu1ec.> y '9"&f0upm$<',.ZVрBh\3t8LHm  =<ඏ2VAt/@EDVC$!M4P3e Y@f҅k牥<jfhUޛulcvrTK472& zb뚍j}s{ow?8L.Mj3 ;uxo"ꂄk<}F*FˆT<@qeق/'T@p>}}U]pW4l'Z2t{'N]z~û:Bd2TfzX Գx˽DC7Jy/v"K?rvd4pRݛ%_{cdܒVA2 $GĞ]5%ޛ\ S6+1As" %Q\7 B/rlR|4b09kj8$['/t"ȧv(9sUg%[_\~7d4d@5pwD]}km!-<::Z0#,\Ms@b-37PY<ˢVf&'Mdubޒ} 43@(Qg]UoW,e'ãvXTԣ#R+FfУvTS1U'\fz^7R&lwXP9[T^GNkAu)EJ1t|:\UmS˷y$s](lB7 ;0w°J2X3pH؜P]dO̔d.ըEBz݌w!:4nH2aD9:6'>SIrZixǯxY}Z_炳y=*=2ELTR4vY>zMh/\k|ɕ[JU=A>"To{Ųbv $ÅFʠYeG&UU""Z;ضѕ"ŋHxE~˷q6۽/%@MI_]K)Ї@_ d{7Yqݒ %JHBR$%Di0sFs)$đER̙33o~_ @W4P6:J LEq3v˃o]9|ﴯ#䂿Gv6/}W~G"/S hX%XW.L:̤(Yi!,EUvyE aiK%CXvɽ9mmRWOG(!mUB6xH7يC/@"ͯztx3(plVr#hX -VǪJ+oV j>,:](k*2쭮@f ~6*(:Jx*m|/f[4@&y4t @HmujklM.{~{/ҎkZsh{'K!Q"Q߿9Z! ź?&+e*!>ΤG <F jkVYo)Vl! g.t*MH=2>_6,\WGIcS:=2l($T-"Z: V ھEOGq$?%a(P5AG}ge;OJ2, )#Ý(DSF#[8].PɍHiHCrcg{ž!ȟN+wH)z_o,x~IWOÀ%r&E%/XC"N:*]x@'s[c$ Ɔ:W\}>_~2( %yF3p ! ֽ&Z^FW'x7$ qWɐ(:Jx).]|kEƣBs9>ʙ">`}ld; `m5=M/eX'KܢFQBG.h=Cذ>j>mGꛋV0L )`tzK:q!NMC\#rV,wFVo9Ԉ΋Eǯ k+L}Ri6c|ҘG|SW7[d"];ݔ$F0ͧC'DV/W8;wyߛ+rܠ_by?e!8W Q;߿(XV! *=lv1OHV1>&a- n/oIڝ09!F89Weaxp>F8E#WөUMhpJ1ut 鰡wmljtM8$P]Snͨ-55.o"ME2<{sKS.Ş-E[Ylf_#bBN'#snv3`,$}F.R[*!= X*PoTUEj6x3)OEnL,_Q__[eQko3͏O-cܞਟvcVAU5@E} sW IDATsx5 "cݠ2J2 }&GB F'#p*TC6G=Bn[H6\dt&= @ DsuMD)u:U-}ʧao3M8y"5~?RHc#H$"Kb7BR{_eT1%4wo3)-E9_$ b\!eO1g)z;/mm} OżE9;&&,Jnķ&9HVnMpGYMDmv2sOSmuNQߞl>ΒDt55\Lտ0iih"BvDP&3?[I Uk{g7Y<1gFb6}y_\ RFzMJU$r'WK} wUnL񫎧$եbvRҘ􈽺K=[C3(no x)`ms*@&zJĵEH/$@&DȬ/'c%[y&51F>l>=?3#K d_Kۢ±njo(-(GAUUנ>R{ںz# U(0Uv[He%#r $6Z4(gQ/z㗞u3ϞZk(Fr,d@U\1c 'jtMr>6XOa1የVnm"9,}ObMh>w|#BGNP35 z&NSZ&Fo|,nh3db|< v "]1I!QUS `, Hj #tvb.@>eSM  [WMTΉ\AGxJ]!xW5V$:tWnN`򰐎@qȵZPgioZROUSE.ƛ C`}{W\nyB'gF&_|卷Rp[/;/Dmp՟I)߯ :t?mR,g~ӿ{[[ï]|o?(2yvӉ%l-K Q?,ypnv@|wz=2xT }0.jNV@|2,fyYl!KisKB|C.|6'ӂSb1E$K4 GV}MMf "hY%&+ J.ebH r3ѦQ[mD  )4MuM-L,aϩ|KpCF+LYƯLJ{wSQ%G2Hd8? `B 0GG)ESv8TH8`Dn8s;>}/AD<=xqh8\Jd@muչN~Rv{F9Ba-Db@0} 4>͋(mhᆠ&t*ںz+0zo}tk&# Gz a:( &PMMvw <;#{@>W#fVRkzz0$a `Zb|> 5#Km"~ O՗\d}i n)qGv2*"ㆤƘ lt^HGXUW7ȏhIۨX Ȼ )y[, ꝫ'%hT"C(J{~иvč?cJZ4C"5ò`HVB@d!7CTM Rl,'ɋ]%.槚FJI<\ /Y@ؑun!Mohdxv!15-~. .[t*A+|E8I!P) 7excA؄u;A5F:Npe"+-&j]+'y_w_m|tbVCϔ?ʬ?^'H_gZ`~៛/y3 &;|hKeiBis "D"NMlAd0 F j$cfB ZP&v7_#r\bs(.HPQ1PXqa1_)"*CF[qt +y }!O;]oS{lmbvaҊ[Pd$Cg5H0,F3Ȃ+J;\m]R =)jjjY ' ;ĘWynvP:w1V:lkzmi16z[Ԕ=Wt|{d|xZ.Y qmdN$}׳zg >}JчߩN0>Ҋ +I{j&+P3/ zi" f7 `g,OG/C2Ej&hi54BCz´!㧙49%[郀^U.l?k(ws?lk6Hm$vv&2|i|_M9fOG^ (1<(y##BQz++鎼"XC.E `f70sm~>/V|w;>:G~:GZ,rӐr1WJr/\i#q$H,wq)Fi._3cl dD0ht^2|no[ uP\uw^ҊyuG7&#ݭ-\e%mkcԲ"ܞ]Egj*P_S)\Ʃ`waftQw3̅4u9ͭgdl1NOv ٥DS0Dy#@I2sCDQh]1 ;K~!U j^Tm.T!PpA}id{b% %e"*R,-Y*}>Zs\Ri` tƙmv.qk78`)@z.EE?eVәŇr}lQ*Rq;Z0<.U98(KCKQI\٬Ѡw8:(}F[ \)$ [#0*Ζ:=}* ӋߋDN<"'؉gT]HݧP'[fH!$SVoVM~Krms~Jo}'Qc9nk`fR5j).J DI%_nQ]Wq{0]qɭN" +ĞfK!.@N!R[b,Vxq\lJu[kt:\,+(IO>8XrVEpGA58l/=UwP @1@E!؎Ȳ]<&hP3A‹߫s3@>tպ8YO_k3cr0|qկS.ȯS/QhNS勛oWf@)VAebS*?rYbekli6DH*H[-YbilmTVUՕзcEtJ;8Ml-IRbf=`-, 6nGNJi8겈/v@$)\̫LX zg K]QQQžE}@}3!Tt 1Gvp."owvNunÅ8nc"%{.Q$91 $/ܩxp71cJw{P$eY%7Zr)o݈O(iH5`xTdƉ`P[;09uJ۪&]nr<"1a,ߟ?W+ݯ*]Ch{ KDxTٸj7/hvs%ZcRҶ,"j4jtDeBI:uc]snUk dw {^w mSƹ)E-7~]ϗ(%B`V.E {/9 FJ~-a,O([ 1eɤqv!9Ւ5otRKNΟP~m]-M9H*HI}]¬Zd!د 6ԱPVayvna| d*1x} Z'mN&1-.B'blە75w|M9s,Zn7VTPL/׋l귮1\J:&dWԶ3q~bv?&Q נ(x퇯Fߐj=o$7t)Ou{Yb8`Z`2z 6L|-dŴ@:>+7ҵ8D$}4\I뙃:GR9MA(Mszs_k(o/񌞱~ -ȫj<'K@j!:e>{) L;F_0"XMm.iܵZzԫ\+Uӯp؂TwV@w{Ř''Օ~=hvE!6+W|+J{ \K>~3Q>]]dP,=~`^τ_uV e#?&? rӻ(>%f#8#JzK6kKS-ݽTXF= >EL. Ga05biiGݭVRZrALTazCjA$ve%d˃}"]s}P_&> Cć> -:8k.'d%0"_yi"ВO| t 5b@uMݒ?pJz% 3{q!q'%˼~Y2XHe)Ǿ7x9ENZϧE{r^hnΠg]i6 aP[O {;\]IeEq-Tl&z ST>ſ`0 Qc(qp`M@^v7}HfovUh򎡔)asoh6y뷬96# lMa4uQ{hBm;-loT6Z?沱L 3^PX^tD~V˃ u?>[=7}NEU5"u#ۑifOS fe (7e3UFI&Ƀ,?<7|eUŘk=Ncaj}`ԙB?~ +;'<퍽@d4x qzt 1"%Lfoj;nufP(<ɧN 0X-FS2A+|CJ:7tj80"⢖xqeHJ2o `7#R&QQqAX2v죾W0B'HJh1@rQRFbK8ٍH.(Nnqh{.LO6Iƣl$ff^ P&|^S,gN )H Z[[[DocYVx'"`?L^WLV$?sƌe;9Tk-ΒeT-#Lue[`#/OFL5'x;Tڋ3Үrm+Dujv16116Hտ/JsnEZJ7=YTmC$%;40xB4.Fb(]XDNa-[Z>2l!fF`2t%b.%k\?tݷqd\rxOhgFŎ3&9J\xLB1cqeRFNe˩ze VS8%8o3q}V,]4I0j.J|E?\29-AFbB<-o赗t!. / OZ8Q@^m<@,?Z 8\ XRՋ5-k3]c\HF7_˼cIReCCqRԟ sDVD󻯞 Nр{AAUG *,[ݭ,jW;W oo hF̉M`2 :EN Džcpy, @> IDATjgWJA(Y!BL1@po6 ZGn/;p{|vwkui D,Вa/M'hH(fgqHHDZe>w(I-z274eH= !3.6:-2eC"`>l(8 SbinvZE&7bH#gp 'KQ>͋> KCvY@} ).i|^Df0BЀ<ڸY8+MCQO˙G]7THi9q  @>rUPnt>u܃~~Q˪ɾFL8:T7u _d,-<$IZA| QH[#Lu8|E2 b.nq{B!D-qVBCz?4bwcQ9(q!]J1ѤĄњIU#%QHtyvf|ӌӎn( (,zYJNNn rn;KHX[?{%瞪?M(&_Y.ԑ]KKt.9CU,*d4*517jBӓvO9\S,qu iBnH<`]Z6,~HƛeR XwqNJr_8JD1)hK4EsJ5xU{O+| /TQ݂& ЀG20} 2 ɮ ɉ1*8@45).ĨMPLzq8_Q 8\7"S40һ/²<~{2.h^EzEP k%6hbM8;E řil JփJRIS6e\ynAZΫ 5pL D"2B{Za8C3?/4$5{O %.'.J@N"oQpxf'sRՂ*Ĕ8oj૝WNp ]BArwn<6!BDѠ_ ^Հ SyqCT"_`кİfUK!]R|5 q4|RFQia[Ynͽ\yTK8h(H6[`,IK1>* T/q '.15pk  4kT(Ps ܺlT$bOr2n7CŽ̧4<=s ;H;FTqȽ42K.r[dQ1Hr?pVTI5S|ε\uLjA5(3cd\RpUǩ0>#T_7>aTG4Ӥ`_Ц<5E|뻤=ZdUجYqK5OL\w|m-_peD~ b;]'5)ҘhXawGLP1Sդ5,g"ɦܗ~?&n?0&ۆ>z&;ߣט2d|up6M?h(È5S;uT‰l⩊m [sM{[H5Dǎ:`#meaeˆ‡ȑYKp@#N_K{1 _OǨdk%54Ȯ091`*7x񅥕nu50bKGroƛ{o Ca?S fC3WTэ;w .5 61(sB$ 1A^r6Ӎ ce\Dnmm>xLX)yEt3RAx%0{N9'3r}9KJ$*zl{`Z8SYx4.5|"o_yO'ml4b!xFƜc|aKlMbD-:j_IN")efHά /=13 `$|N-Z*\ʍNsI+9DH{BTNry4Xٰ*4u*UUA:, DBd@DF8.p8ir=krRSƼ-gIɃ)>F:(H%=[~w%bg,6h_q?'Xy}#4ږ o9cf=s1*_|9'5~W@~:*T=c{]Oժ9s>F wo7B?dK F{&B!涡Yosb9ner=aO)N؟zjo!/\,e@ \yvjz;3{ekvq偣},NHwνtB*,ָ{Vɲs~|},7lM5Zrҭ0=uX%`8󏌈 b'30E8e:=$԰i Ԭ_εٺl[>w`cnMkH0c>\nv7g#s(?z<wSI}5nMT LMw_QJƶ朮RE.`D0 =gnwwJ5Z}Q‘߲j/eƷ~ v.ɴd wW'gxG<)W噞E[]7,ysnWt*bms#q_0j[` {E_DvCj~cgd>{2շZ{6sޚc))c~ U7476Mʊ8 `Ƌ+w61PGr7??֧M_M?wD]/F휼񱻯M7E|>e XOoC}?~#dGH*&HL|sgo7ATDDJ,̺?stKZMEt<ף6IMj9yG[ۛn{M"<囿u]ȕ-;=|vQ@D2$Uj$M}w߽U _B{uZyshy5u1;a% ŽKV^[Vuꯊ{hV-n,"7 #$Ǧ! M9p{=s/&>X? @V% H,w.Oi*RP(s@ dB.utb!IwnL&sѲoHdFh5*7O JjuB ՝k ;W}A̝㾦Pm5jeYIZ4vF.ٿdFbTP, ?WT9944,zƧQ+kD" Z,u0aԈMJ~T"^h%_}̑#>q̼6$;<|;~{Cᖯތ. 3 BVRKIDhGh4m$2U2B"S*E)yq|mrGRWUKP|%)Ij &E3v>g3_\SsX~ß9w_^y6T}+nAWRۤocGn{9;gHt\fȫH˪^~!HzOb1q֧bٸdknΑ@E^~/o|3,=,xl Hy5D%;Kثuv6N.Q6bmƎ6*bbFq ÿ~7t#nҁAC XVEآC3aуB# $rPR5(WTQLX%? s⍍~Z]|݉w̑m2ڇN>_49,/?E4eéOM tUue"# * `jP5(KrIP|rud{Z~C6ҝO -uq!6-%У;BKM|<n{MR^#f;y*ҷ92هd+Q7{:0Yp,i:wo>NUh K䡡>.@W @DU.u%vR`΄zӜ4sɪέ^{z%JqX9f ky;*qP0 =飾$xbE)eÃ~ kngVA,*OaqP$SwE6=RbvywTJTb𤨶Y߃D&P)Ѥk^##<rY5'*幽~ΰfKA@@#˓IkJ%h>dm'v_\|c̰ S"^(RΩRdAYx5/uNviX{> Ϯ9"O/ m|1<W'<.^4O_gÅNEgZ{͉^K߿p< Uc_zB_`^TߍMh2فJ^_k;[O˯>u>.Mvqhȩ?-kٌCݨ$? z:R&̗ZBs(^QV{rǔ8sd_aQnZbQO8lgӮC8㖭=3U *jPG7سyunW41f*_BиA*UaF]dyzҲBŕBg:o>_YD"P-^٣`Kj|:/oڢo8R]oQ9P>/mZDDjLiBiދ:[=,gx_/ 4A>6X(x{_AW)|\H8JG`ڗ81B؃ xv1֦678FZ3"7%)M)zz;rԝx5ݡ+[-."˪v$\) `%psR׎Ci]S=<wd(hY.緎{y8ؤl dW00 AjTv_Ku0L 1%)]0yEME???@hKZ9O2rsk=?G!}YoCRSMWo}YntsCY{n]{%?ɪ9ȁJn&Rr)l˻cGͮ<ɬ=uP4wɸ#=hàQaQmFB(S,Ԓء-:^ML ^Z50_Lyp׳{1vpTx䫖tЅ0yܨ1B=[+=[wDR 3^wr'i-L!-X ITa{jeGD<[7^,f4Ն%S qWR4 )`%UiZ쫽 0͆n3tb([*C8Tʼnz} +wA׬JҞ1>chX4BAŵ;M2+U9;V%%HLO+}V*yQ_dvcKM2"W=΍>Gd׌5G`M6rWB_:Eg$@P{DLgWw_' :ՏMa0Cxhhf+mW-&AA!Nί+%m]` 0ÃM rLR[VuBHH Seuzp}|\ۓDrI#yP(=;8:ZPeBqqauEFUh4Etb9:@Z+,/ʰJpӞA6hǓ4 Ep8\Li6vh+:qVtv75j쬗ry{ ήl㱧=Om}at^${p[I/i_JƸ9yd\T4z ' *ٱW׏i9/,UyqȐ nLO(ąYiyWYd:uK!QI^Pa/Yqd>ƣ gV;trbY252o,;ӁXQK/JZ#q8lļ~r{vwr墒 k}X'WIr0)\-tjIBu yh_JT"4-f;tovN(:8ޛ~xW׉,GH yUOs.YViPg<)MzEyxSH4Fƫ.L唶XRhi+˽-!:]D]߱`3Y232(R*ȵrGp^!ӵ/{۞os>^|uƅ˿VTo㴺(޶;qso|0puN^_5P^\=|k{ÿxb}۾ukh䳑OϿ:oww}o]_(3W^yo^9|r#-(?o_?z}Wͫ>:{ WtY8wC~H*~֦;[oull}wsV-lYХ7>w-no\V݇N^uN?aEeu:O{776>u`1W߿Kwl[ս=y/~<ս +yŽ#~)$5]U_{a@W{Nu25?Xumuԅ[CiLkJREmFF[(&[Y^;nCOoΜ9Ϝ?q|׮S?je}=徆ƉN8߸x [Y޿6{LOLLܵguu=ؖ%= o\1~|SZTS߸dIOǑჇTeLv굝Kz]zY1RbJ4pO0e_,IIwy?m/N)ų55 zn$0)%0) `$U8?[jS6+R\]ꎴB>W @HI) !% $~=3MS2Q<}cs[gz ox ("n__S8SSfwxb𙕽3=j+Vtjj2PtRs홞Y7RBJ@HI) !% $RBJ@HI) !% $RBJ@HI) !% $RBJ@HI) !% $RBJ@HI) !% $RBJ@HI) !% $RBJ@HI) !% $RBJ@HI) !% $RBJ@HI) !% $RBJ@HI) !% $RBJ@HI) !% $RBJ@HI) !% $RBJ@HI) !% $RBJ@HI) !% $RBJ@HI) !% $RBJ@HI) !% $RBJ@HI) !% $RBJ@HI) !% $RBJ@HI) !% $RBJ@HI) !% $RBJ@HI) !% $RBJ@HI) !% $RBJ@HI) !% $RBJ@HI) !% $RBJ@HI) !% $RBJ@HI) !% $RBJ@HI) !% $RBJ@HI) !% $F#.IENDB`DyK http://www.cordis.lu/istyK 2http://www.cordis.lu/istADyK 3http://www.mininterno.it/dip_ps/dcpsffp/index.htm)yK fhttp://www.mininterno.it/dip_ps/dcpsffp/index.htm)DyK http://www.cbi.org.ukyK .http://www.cbi.org.uk/DyK http://www.cordis.lu/istyK 2http://www.cordis.lu/istYDyK 9http://db.consilium.eu.int/en/Info/eurocouncil/index.htmyK rhttp://db.consilium.eu.int/en/Info/eurocouncil/index.htmeDyK <http://conventions.coe.int/treaty/fr/projets/cybercrime.htmyK xhttp://conventions.coe.int/treaty/fr/projets/cybercrime.htmeDyK <http://conventions.coe.int/treaty/en/projets/cybercrime.htmyK xhttp://conventions.coe.int/treaty/en/projets/cybercrime.htm [6@6 Normal$xxa$CJmH >@> Heading 1$ & F h@&5:8@8 Heading 2$ & F @&588 Heading 3$ & F @&64"4 Heading 4$ & F @&>> Heading 5 <@& CJOJQJBB Heading 6 <@&6CJOJQJ>> Heading 7 <@& CJOJQJBB Heading 8 <@&6CJOJQJB B Heading 9 <@&6CJOJQJ<A@< Default Paragraph Font(O( Text 1 S^S(( Text 2 S^S(( Text 3 S^S("( Text 4 S^SFF Annexe titre (acte)$a$5>*XX Annexe titre (expos global)$a$5>*JJ Annexe titre (expos)$a$5>*ZZ Annexe titre (fiche fin. acte)$5>*`` !Annexe titre (fiche fin. globale)$5>*LL Annexe titre (globale)$a$5>*>> Application directe(O( Fait $VOV Institution qui signe$ 6POP Personne qui signe$ 6&"& Caption5BB ChapterTitle$$ha$5CJ 6'@6 Comment ReferenceCJ00 Comment Text CJ22 Confidence !$ha$66 Corrigendum "$:OB: Emission#$^a$VORV Rfrence institutionelle$$.Ob. Statut%$ha$FOrF Type du document&$ha$5DD Date d'adoption'$ha$5<O< Titre objet($hha$5<< Sous-titre objet )NON Expos des motifs titre*$a$5>*`` Expos des motifs titre (global)+$a$5>*LL Fiche d'impact PME titre,$5bb Fiche financire texte (table)-$a$CJLL Fiche financire titre.$a$5>*ff #Fiche financire titre (acte table)/$5CJ(XX Fiche financire titre (acte)0$5>*^^ Fiche financire titre (table)1$a$5CJ(6 @"6 Footer2$h p#8&@18 Footnote ReferenceH*J@BJ Footnote Text40^`0CJ<Ob< Formule d'adoption5$<O< Titre article 6$$6(@r( Header 7 r DOD Institution qui agit 8$X4O4 Langue9$Xa$5;HH Rfrence interne:$Xa$5RO2R Nom de l'institution;$a$OJQJBB Langue originale <$ha$;:O: Phrase finale =$h Manual Heading 1r> & FS>T RS! Manual Heading 2r? & FS>T RS1 Manual Heading 3j@ & F>T RSA" Manual Heading 4jA & F>T RSBB Manual NumPar 1BS^S`BB Manual NumPar 2CS^S`BB Manual NumPar 3DS^S`B"B Manual NumPar 4ES^S`$Oa$ MarkerB*mH 8r8 Normal CenteredG$a$00 Normal LeftH$a$22 Normal RightI$a$,O, NumPar 1 J & F ,, NumPar 2 K & F ,, NumPar 3 L & F ,", NumPar 4 M & F 44 Objet externeN6;&)@& Page Number>> PartTitleP$$$ha$5CJ$2O2 Point 0QS^S`2O"2 Point 1R^`222 Point 2S^`2B2 Point 3T ^ `2R2 Point 4U/ ^/ `FObF PointDouble 0V Sv^`vFrF PointDouble 1W ^`FF PointDouble 2X  ^ `FF PointDouble 3Y  / ^/ `FF PointDouble 4Z / f^f`JJ PointTriple 0[ S?^`?JJ PointTriple 1\  [^ `[JJ PointTriple 2]  / [^/ `[JJ PointTriple 3^  / f[^f`[JJ PointTriple 4_ / f[^`[HH Prliminaire titre `$hh5FF Prliminaire type a$h5>"> Quoted NumParb^`222 Quoted Text c^`OR` Rfrence interinstitutionelled$DD SectionTitlee$$ha$ 5:CJ44 Table Titlef$a$5r Tiret 0`g & F>T O! Tiret 1`h & F>T 1 Tiret 2`i & F>T A Tiret 3`j & F>T Q Tiret 4`k & F>T 6.6 TOA Headingl 5OJQJ66 TOC 1m$S< p# 66 TOC 2n$S< p# 66 TOC 3o$S< p# 66 TOC 4p$S< p# .. TOC 5q$, p# .. TOC 6r$ p# .. TOC 7s$ p# ** TOC 8 t$ p# ** TOC 9u@ p# << TOC Heading v$a$5CJ2Or2 Considrant w & FBORB Confidentialitx>*@@ Manual Considrant y;B!B FooterLandscapez p#Z6BBB Body Text{ & F mH sH u\R\ Body Text Indent 2|7^7` mH sH uXCX Body Text Indent}7^7` mH sH uBPB Body Text 2~*$ 5 W@ Strong5(U@( Hyperlink>*B*[+L$$%i(2+Q+W-02N69?HAAgBLM1Q ^^=gqzЮM K  !" g)`s C  S  +P&8Nfv $'0Kf!f?f]f @@@@@@@@@BBM? +K 3L7^tu:>]&h ,?K3uKUnknownjonesceYxzKU ;=BINehj!U!!UQw|  @ f G'XXXXXXX8@0(  B S  ? _Hlt519941923LL09   : ? PXu~KY""0011;;??zFFJJ!L,LOOePfPkP U$UUUh]s]__xbbff9pEpSwTwUw9y:y;yzzAIyT[Xe:?N678{|}z{, 1 2 9  " S Z   2BFY]oswx  ;ILNRX ! C D v ,-1prOS|* / m((((122257t::;;;h<l<<?IAKABB CpCI~JJKLLMMMNLOROjOZ \"\9]^gg*gTgi i!i9i~rrruu v8v8y=yDy[y\ybykyyyyyCzxցځ݁48;˃ЉӉopœɓʓRSWZ)*.1wx|`kstx}9:>CWXY]bСJڣޣwȧ֧'<rikƴ235~˶ֽh[Qp5T56kyz GHLOt]]^be$J`p)*/1opuwhimtSY[Z[adGLOFHRXY[^o<=z{efj-` 7   X  ilGHL  ;ILvanovvi]C:\TEMP\AutoRecovery save of Hacking proposal - version of 5 October submitted to Cabinet.asdjonesce\\JAI-3\B3$\jonesce\Cybercrime and related issues\Framework Decision on hacking etc\Interservice consultation on FD\Hacking proposal - version of 5 October submitted to Cabinet.docjonescek\\JAI-3\B3$\_Common_B3\Communication INFSO\Hacking proposal - version of 5 October submitted to Cabinet.docjonesce\\JAI-3\B3$\_Common_B3\Communication INFSO\FD on attacks against information systems\Inter-service consultation\Hacking proposal - version with logo of 5 October.docbaressyRC:\TEMP\AutoRecovery save of Hacking proposal - version with logo of 5 October.asdbaressy=C:\TEMP\Hacking proposal - version with logo of 5 October.docbaressyg\\JAI-3\02$\_Common_02\Matriels prsentation JAI\Hacking proposal - version with logo of 5 October.docsoreclu=C:\TEMP\Hacking proposal - version with logo of 5 October.docjonesce\\JAI-3\B3$\_Common_B3\Cybercrime\FD on attacks against information systems\Inter-service consultation\Hacking proposal - version with logo of 5 October.docInformatics Directorate9D:\My Documents\Winword\PLcybercrime\Hacking proposal.docv|vc}~p\=`2TdkG@5 F+\ 0/_ svwp3wtrPI~ Hj L_ tZ$wiZʭU3C:\program files\microsoft office\templates\LegisWrite\COM.DOTENlesigclInformatics DirectorateOh+'0t  $ 0 < HT\dlENNlesigclesiCom.dotInformatics Directorate2foMicrosoft Word 8.0r@@RpP@Re`@Re`%՜.+,D՜.+,H px   DIaLOGIKaum1 EN TitleX PB&6 _PID_GUID _PID_HLINKSClassificationLast edited using CategoryVersionCreated usingAN{B0230CD0-7C24-11D5-8059-00A0C96136F3}A0/+<http://conventions.coe.int/treaty/en/projets/cybercrime.htm,7<http://conventions.coe.int/treaty/fr/projets/cybercrime.htmC 9http://db.consilium.eu.int/en/Info/eurocouncil/index.htm http://www.cordis.lu/ist+shttp://www.cbi.org.uk/H}3http://www.mininterno.it/dip_ps/dcpsffp/index.htm)http://www.cordis.lu/ist L\\Jai-3\02$\_Common_02\Matriels prsentation JAI\graphisme\Bandeaunodg.tif eaLW 4.5, Build 20010419COM/SEC4.0.30LW 4.0, Build 9907089  !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijklmnopqrstuvwxyz{|}~      !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijklmnopqrstuvwxyz{|}~      !"#$%&'()*+,-./012456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijklmnopqrstuvwxyz{|}~Root Entry F@j`v`Data .1Table3WordDocument{fSummaryInformation(DocumentSummaryInformation8CompObjjObjectPoolv`v`  FMicrosoft Word Document MSWordDocWord.Document.89q