15
ELECTION TECHNOLOGY & SECURITY RON BANDES NCSL FUTURE OF ELECTIONS CONFERENCE JUNE 15, 2017

Pennsylvania Voting Technology & SecurityINVOLVEMENT IN ELECTIONS •CyberSecurity member of PA Legislature’s SR394 Committee on Voting System Technology •VVSG CyberSecurity Public

  • Upload
    others

  • View
    1

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Pennsylvania Voting Technology & SecurityINVOLVEMENT IN ELECTIONS •CyberSecurity member of PA Legislature’s SR394 Committee on Voting System Technology •VVSG CyberSecurity Public

ELECTION TECHNOLOGY amp SECURITYRON BANDES

NCSL FUTURE OF ELECTIONS CONFERENCE

JUNE 15 2017

INVOLVEMENT IN ELECTIONS

bull CyberSecurity member of PA Legislaturersquos SR394 Committee on

Voting System Technology

bull VVSG CyberSecurity Public Working Group

bull Election Verification Network by invitation

bull Election laws review committee League of Women Voters PA

bull Task force to design Remote Ballot Marking System for the National Federation of the Blind

bull Judge of Election in Mr Rogersrsquo Neighborhood (WQED polling place)

bull President VoteAllegheny (a non-partisan election integrity organization)

bull Presenter on Election Security to FBI Infragard PA Dept of State B-PEP and others2

HOW DO YOU KNOWhttpswwwarbornetworkscombloginsightcloud-ddos-mitigation-how-do-you-know-its-right

3

HOW DO YOU KNOWhellip

bull that yoursquove been hacked

bull that you havenrsquot been hacked

bull who hacked you

bull that increasing voter convenience improves turnout

bull that modernization is a good thing

httpgapcommunitycommonday-matters-crisis-of-faith-or-crisis-of-convenience

4

HOW DO YOU KNOW RESEARCH AND EVIDENCE

httpwwwtoysruscombuycrib-bumpers-liners

levtex-baby-fiona-4-piece-bumper-set-lb165b-90486096

httpwwwcnncom20111018healthno-bumpers-cribs-sids-parenting

5

TO PERFORM RESEARCH AND ANALYSISYOU NEED DATA

bull Computer operating systems offer logging It must be configured to log the

events that are meaningful

bull Computer applications may also log important events Buy only applications

that do

bull Computer logs are like hearsay evidence For strong evidence we want

source documents that are prepared by hand or verified by a person

bull Voter-marked paper ballots provide strong evidence in elections

httpwwwflaticoncom

6

TWO THIRDS OF PENNSYLVANIArsquoS 67 COUNTIES USE DRE SYSTEMS IN ALL OR SOME PRECINCTS

bull DREs without a voter-verifiable paper record do not provide strong evidence

for audits and recounts

bull Even with a voter-verifiable paper record most voters donrsquot examine it

bull Some vendors think that Pennsylvania likes DREs and wants new ones

bull We donrsquot

httpwwwluzernecountyorgcountydepartments

_agenciesbureau_of_electionsusing_the_ivotronic

_voting_system

7

NEW VOTING SYSTEMS MUSTBE VERIFIABLY SECURE

bull Provide security features

bull Strong evidence of voter choices like paper ballots

bull Logging of other important events

bull Provide features to verify security

bull Logging the right events

bull Secure ballot storage

bull Chain-of-custody

bull Proper use of cryptography

httpwwwhittmarkingcomproducts4-inchx6-

inch-chain-of-custody-tags-100-tags-pkg

8

YOU CANrsquoT JUST BUY SECURITY

bull Itrsquos not enough that your voting system has the right security features

bull You must use those features correctly

bull It does no good to log events if nobody examines the logs

bull You must have secure procedures (operational security)

httpwwwspokcomblog10-policies-and-procedures-secure-text-messaging

httpswwwrealherbalussecurity-policy

9

BUT YOU DO NEED MONEYSPEND IT WISELY

bull Money from county state and federal governments

bull to buy voting systems with good security features

bull to hire or contract with security experts to help you establish secure procedures

bull to continually perform procedures in a secure manner

bull to update your procedures in consideration of the developing threat landscape

bull Donrsquot rush the purchasing process like we did with HAVA funds

bull Make vendors understand your needs and make them improve their products to fulfill

those needs

httpwwwwifrcomhomeheadlinesTask-Force-Looks-to-Shrink-Illinois-Government-

by-Shrinking--358771091html

10

ARE MY SYSTEMS SECURE

bull Wrong question

bull There is no 100 security

bull Ask ldquohow secure are my systemsrdquo

ldquoWhich threats are my systems protected against and which notrdquo

ldquoAre my system and procedures resilient in the face of software flaws or

malicious attacksrdquo

httpbdutilmftcomsecurePayhtml

11

httpscienceblogscominsolence20161223does-

combatting-quackery-and-pseudoscience-through-rational-

argument-and-ridicule-work

WHY IS THIS IMPORTANT

bull Secure verifiable systems can provide voters with evidence and ASSURANCE

bull In the absence of assurance yoursquoll have conjecture rumors and distrust

bull Some races are worth a lot of [campaign] money

bull Russia matters

bull Experts agree that Russia will interfere more deeply in the future

bull They have no allegiance to any one American political party

httpwwwnetworkworldcomarticle3186913iosiphone-8-rumor-rollup-button-in-the-

rear-true-tone-in-front-inside-jony-ives-headhtml

httpwwwcriticatacrolefteastputin-first-as-farce12

WHAT PENNSYLVANIA IS DOING

bull The PA Department of State is seeking collaboration with nationally

recognized security experts to establish new standards for PA certification of

voting systems

bull Closely following developments in Colorado regarding Risk-Limiting Audits

which provide more efficient more meaningful ballot audits

httpswwwgemkonnectcomblogcase-global-lab-grown-diamond-audit-system-kp

13

WHAT YOU SHOULD BE DOING

bull Hire or contract with recognized security experts

bull Develop security standards for voting systems

bull Develop secure procedures

bull Follow secure procedures

bull Monitor (audit) that secure procedures are being followed

bull Revise standards and procedures as conditions change

bull Start saving for new voting systems

bull Buy voting systems that support meaningful auditsmdashInternet voting is not ready

14

CONTACT ME

Ron Bandes

President VoteAllegheny

RBandesc9ncom

(203) 524-3989

15

Page 2: Pennsylvania Voting Technology & SecurityINVOLVEMENT IN ELECTIONS •CyberSecurity member of PA Legislature’s SR394 Committee on Voting System Technology •VVSG CyberSecurity Public

INVOLVEMENT IN ELECTIONS

bull CyberSecurity member of PA Legislaturersquos SR394 Committee on

Voting System Technology

bull VVSG CyberSecurity Public Working Group

bull Election Verification Network by invitation

bull Election laws review committee League of Women Voters PA

bull Task force to design Remote Ballot Marking System for the National Federation of the Blind

bull Judge of Election in Mr Rogersrsquo Neighborhood (WQED polling place)

bull President VoteAllegheny (a non-partisan election integrity organization)

bull Presenter on Election Security to FBI Infragard PA Dept of State B-PEP and others2

HOW DO YOU KNOWhttpswwwarbornetworkscombloginsightcloud-ddos-mitigation-how-do-you-know-its-right

3

HOW DO YOU KNOWhellip

bull that yoursquove been hacked

bull that you havenrsquot been hacked

bull who hacked you

bull that increasing voter convenience improves turnout

bull that modernization is a good thing

httpgapcommunitycommonday-matters-crisis-of-faith-or-crisis-of-convenience

4

HOW DO YOU KNOW RESEARCH AND EVIDENCE

httpwwwtoysruscombuycrib-bumpers-liners

levtex-baby-fiona-4-piece-bumper-set-lb165b-90486096

httpwwwcnncom20111018healthno-bumpers-cribs-sids-parenting

5

TO PERFORM RESEARCH AND ANALYSISYOU NEED DATA

bull Computer operating systems offer logging It must be configured to log the

events that are meaningful

bull Computer applications may also log important events Buy only applications

that do

bull Computer logs are like hearsay evidence For strong evidence we want

source documents that are prepared by hand or verified by a person

bull Voter-marked paper ballots provide strong evidence in elections

httpwwwflaticoncom

6

TWO THIRDS OF PENNSYLVANIArsquoS 67 COUNTIES USE DRE SYSTEMS IN ALL OR SOME PRECINCTS

bull DREs without a voter-verifiable paper record do not provide strong evidence

for audits and recounts

bull Even with a voter-verifiable paper record most voters donrsquot examine it

bull Some vendors think that Pennsylvania likes DREs and wants new ones

bull We donrsquot

httpwwwluzernecountyorgcountydepartments

_agenciesbureau_of_electionsusing_the_ivotronic

_voting_system

7

NEW VOTING SYSTEMS MUSTBE VERIFIABLY SECURE

bull Provide security features

bull Strong evidence of voter choices like paper ballots

bull Logging of other important events

bull Provide features to verify security

bull Logging the right events

bull Secure ballot storage

bull Chain-of-custody

bull Proper use of cryptography

httpwwwhittmarkingcomproducts4-inchx6-

inch-chain-of-custody-tags-100-tags-pkg

8

YOU CANrsquoT JUST BUY SECURITY

bull Itrsquos not enough that your voting system has the right security features

bull You must use those features correctly

bull It does no good to log events if nobody examines the logs

bull You must have secure procedures (operational security)

httpwwwspokcomblog10-policies-and-procedures-secure-text-messaging

httpswwwrealherbalussecurity-policy

9

BUT YOU DO NEED MONEYSPEND IT WISELY

bull Money from county state and federal governments

bull to buy voting systems with good security features

bull to hire or contract with security experts to help you establish secure procedures

bull to continually perform procedures in a secure manner

bull to update your procedures in consideration of the developing threat landscape

bull Donrsquot rush the purchasing process like we did with HAVA funds

bull Make vendors understand your needs and make them improve their products to fulfill

those needs

httpwwwwifrcomhomeheadlinesTask-Force-Looks-to-Shrink-Illinois-Government-

by-Shrinking--358771091html

10

ARE MY SYSTEMS SECURE

bull Wrong question

bull There is no 100 security

bull Ask ldquohow secure are my systemsrdquo

ldquoWhich threats are my systems protected against and which notrdquo

ldquoAre my system and procedures resilient in the face of software flaws or

malicious attacksrdquo

httpbdutilmftcomsecurePayhtml

11

httpscienceblogscominsolence20161223does-

combatting-quackery-and-pseudoscience-through-rational-

argument-and-ridicule-work

WHY IS THIS IMPORTANT

bull Secure verifiable systems can provide voters with evidence and ASSURANCE

bull In the absence of assurance yoursquoll have conjecture rumors and distrust

bull Some races are worth a lot of [campaign] money

bull Russia matters

bull Experts agree that Russia will interfere more deeply in the future

bull They have no allegiance to any one American political party

httpwwwnetworkworldcomarticle3186913iosiphone-8-rumor-rollup-button-in-the-

rear-true-tone-in-front-inside-jony-ives-headhtml

httpwwwcriticatacrolefteastputin-first-as-farce12

WHAT PENNSYLVANIA IS DOING

bull The PA Department of State is seeking collaboration with nationally

recognized security experts to establish new standards for PA certification of

voting systems

bull Closely following developments in Colorado regarding Risk-Limiting Audits

which provide more efficient more meaningful ballot audits

httpswwwgemkonnectcomblogcase-global-lab-grown-diamond-audit-system-kp

13

WHAT YOU SHOULD BE DOING

bull Hire or contract with recognized security experts

bull Develop security standards for voting systems

bull Develop secure procedures

bull Follow secure procedures

bull Monitor (audit) that secure procedures are being followed

bull Revise standards and procedures as conditions change

bull Start saving for new voting systems

bull Buy voting systems that support meaningful auditsmdashInternet voting is not ready

14

CONTACT ME

Ron Bandes

President VoteAllegheny

RBandesc9ncom

(203) 524-3989

15

Page 3: Pennsylvania Voting Technology & SecurityINVOLVEMENT IN ELECTIONS •CyberSecurity member of PA Legislature’s SR394 Committee on Voting System Technology •VVSG CyberSecurity Public

HOW DO YOU KNOWhttpswwwarbornetworkscombloginsightcloud-ddos-mitigation-how-do-you-know-its-right

3

HOW DO YOU KNOWhellip

bull that yoursquove been hacked

bull that you havenrsquot been hacked

bull who hacked you

bull that increasing voter convenience improves turnout

bull that modernization is a good thing

httpgapcommunitycommonday-matters-crisis-of-faith-or-crisis-of-convenience

4

HOW DO YOU KNOW RESEARCH AND EVIDENCE

httpwwwtoysruscombuycrib-bumpers-liners

levtex-baby-fiona-4-piece-bumper-set-lb165b-90486096

httpwwwcnncom20111018healthno-bumpers-cribs-sids-parenting

5

TO PERFORM RESEARCH AND ANALYSISYOU NEED DATA

bull Computer operating systems offer logging It must be configured to log the

events that are meaningful

bull Computer applications may also log important events Buy only applications

that do

bull Computer logs are like hearsay evidence For strong evidence we want

source documents that are prepared by hand or verified by a person

bull Voter-marked paper ballots provide strong evidence in elections

httpwwwflaticoncom

6

TWO THIRDS OF PENNSYLVANIArsquoS 67 COUNTIES USE DRE SYSTEMS IN ALL OR SOME PRECINCTS

bull DREs without a voter-verifiable paper record do not provide strong evidence

for audits and recounts

bull Even with a voter-verifiable paper record most voters donrsquot examine it

bull Some vendors think that Pennsylvania likes DREs and wants new ones

bull We donrsquot

httpwwwluzernecountyorgcountydepartments

_agenciesbureau_of_electionsusing_the_ivotronic

_voting_system

7

NEW VOTING SYSTEMS MUSTBE VERIFIABLY SECURE

bull Provide security features

bull Strong evidence of voter choices like paper ballots

bull Logging of other important events

bull Provide features to verify security

bull Logging the right events

bull Secure ballot storage

bull Chain-of-custody

bull Proper use of cryptography

httpwwwhittmarkingcomproducts4-inchx6-

inch-chain-of-custody-tags-100-tags-pkg

8

YOU CANrsquoT JUST BUY SECURITY

bull Itrsquos not enough that your voting system has the right security features

bull You must use those features correctly

bull It does no good to log events if nobody examines the logs

bull You must have secure procedures (operational security)

httpwwwspokcomblog10-policies-and-procedures-secure-text-messaging

httpswwwrealherbalussecurity-policy

9

BUT YOU DO NEED MONEYSPEND IT WISELY

bull Money from county state and federal governments

bull to buy voting systems with good security features

bull to hire or contract with security experts to help you establish secure procedures

bull to continually perform procedures in a secure manner

bull to update your procedures in consideration of the developing threat landscape

bull Donrsquot rush the purchasing process like we did with HAVA funds

bull Make vendors understand your needs and make them improve their products to fulfill

those needs

httpwwwwifrcomhomeheadlinesTask-Force-Looks-to-Shrink-Illinois-Government-

by-Shrinking--358771091html

10

ARE MY SYSTEMS SECURE

bull Wrong question

bull There is no 100 security

bull Ask ldquohow secure are my systemsrdquo

ldquoWhich threats are my systems protected against and which notrdquo

ldquoAre my system and procedures resilient in the face of software flaws or

malicious attacksrdquo

httpbdutilmftcomsecurePayhtml

11

httpscienceblogscominsolence20161223does-

combatting-quackery-and-pseudoscience-through-rational-

argument-and-ridicule-work

WHY IS THIS IMPORTANT

bull Secure verifiable systems can provide voters with evidence and ASSURANCE

bull In the absence of assurance yoursquoll have conjecture rumors and distrust

bull Some races are worth a lot of [campaign] money

bull Russia matters

bull Experts agree that Russia will interfere more deeply in the future

bull They have no allegiance to any one American political party

httpwwwnetworkworldcomarticle3186913iosiphone-8-rumor-rollup-button-in-the-

rear-true-tone-in-front-inside-jony-ives-headhtml

httpwwwcriticatacrolefteastputin-first-as-farce12

WHAT PENNSYLVANIA IS DOING

bull The PA Department of State is seeking collaboration with nationally

recognized security experts to establish new standards for PA certification of

voting systems

bull Closely following developments in Colorado regarding Risk-Limiting Audits

which provide more efficient more meaningful ballot audits

httpswwwgemkonnectcomblogcase-global-lab-grown-diamond-audit-system-kp

13

WHAT YOU SHOULD BE DOING

bull Hire or contract with recognized security experts

bull Develop security standards for voting systems

bull Develop secure procedures

bull Follow secure procedures

bull Monitor (audit) that secure procedures are being followed

bull Revise standards and procedures as conditions change

bull Start saving for new voting systems

bull Buy voting systems that support meaningful auditsmdashInternet voting is not ready

14

CONTACT ME

Ron Bandes

President VoteAllegheny

RBandesc9ncom

(203) 524-3989

15

Page 4: Pennsylvania Voting Technology & SecurityINVOLVEMENT IN ELECTIONS •CyberSecurity member of PA Legislature’s SR394 Committee on Voting System Technology •VVSG CyberSecurity Public

HOW DO YOU KNOWhellip

bull that yoursquove been hacked

bull that you havenrsquot been hacked

bull who hacked you

bull that increasing voter convenience improves turnout

bull that modernization is a good thing

httpgapcommunitycommonday-matters-crisis-of-faith-or-crisis-of-convenience

4

HOW DO YOU KNOW RESEARCH AND EVIDENCE

httpwwwtoysruscombuycrib-bumpers-liners

levtex-baby-fiona-4-piece-bumper-set-lb165b-90486096

httpwwwcnncom20111018healthno-bumpers-cribs-sids-parenting

5

TO PERFORM RESEARCH AND ANALYSISYOU NEED DATA

bull Computer operating systems offer logging It must be configured to log the

events that are meaningful

bull Computer applications may also log important events Buy only applications

that do

bull Computer logs are like hearsay evidence For strong evidence we want

source documents that are prepared by hand or verified by a person

bull Voter-marked paper ballots provide strong evidence in elections

httpwwwflaticoncom

6

TWO THIRDS OF PENNSYLVANIArsquoS 67 COUNTIES USE DRE SYSTEMS IN ALL OR SOME PRECINCTS

bull DREs without a voter-verifiable paper record do not provide strong evidence

for audits and recounts

bull Even with a voter-verifiable paper record most voters donrsquot examine it

bull Some vendors think that Pennsylvania likes DREs and wants new ones

bull We donrsquot

httpwwwluzernecountyorgcountydepartments

_agenciesbureau_of_electionsusing_the_ivotronic

_voting_system

7

NEW VOTING SYSTEMS MUSTBE VERIFIABLY SECURE

bull Provide security features

bull Strong evidence of voter choices like paper ballots

bull Logging of other important events

bull Provide features to verify security

bull Logging the right events

bull Secure ballot storage

bull Chain-of-custody

bull Proper use of cryptography

httpwwwhittmarkingcomproducts4-inchx6-

inch-chain-of-custody-tags-100-tags-pkg

8

YOU CANrsquoT JUST BUY SECURITY

bull Itrsquos not enough that your voting system has the right security features

bull You must use those features correctly

bull It does no good to log events if nobody examines the logs

bull You must have secure procedures (operational security)

httpwwwspokcomblog10-policies-and-procedures-secure-text-messaging

httpswwwrealherbalussecurity-policy

9

BUT YOU DO NEED MONEYSPEND IT WISELY

bull Money from county state and federal governments

bull to buy voting systems with good security features

bull to hire or contract with security experts to help you establish secure procedures

bull to continually perform procedures in a secure manner

bull to update your procedures in consideration of the developing threat landscape

bull Donrsquot rush the purchasing process like we did with HAVA funds

bull Make vendors understand your needs and make them improve their products to fulfill

those needs

httpwwwwifrcomhomeheadlinesTask-Force-Looks-to-Shrink-Illinois-Government-

by-Shrinking--358771091html

10

ARE MY SYSTEMS SECURE

bull Wrong question

bull There is no 100 security

bull Ask ldquohow secure are my systemsrdquo

ldquoWhich threats are my systems protected against and which notrdquo

ldquoAre my system and procedures resilient in the face of software flaws or

malicious attacksrdquo

httpbdutilmftcomsecurePayhtml

11

httpscienceblogscominsolence20161223does-

combatting-quackery-and-pseudoscience-through-rational-

argument-and-ridicule-work

WHY IS THIS IMPORTANT

bull Secure verifiable systems can provide voters with evidence and ASSURANCE

bull In the absence of assurance yoursquoll have conjecture rumors and distrust

bull Some races are worth a lot of [campaign] money

bull Russia matters

bull Experts agree that Russia will interfere more deeply in the future

bull They have no allegiance to any one American political party

httpwwwnetworkworldcomarticle3186913iosiphone-8-rumor-rollup-button-in-the-

rear-true-tone-in-front-inside-jony-ives-headhtml

httpwwwcriticatacrolefteastputin-first-as-farce12

WHAT PENNSYLVANIA IS DOING

bull The PA Department of State is seeking collaboration with nationally

recognized security experts to establish new standards for PA certification of

voting systems

bull Closely following developments in Colorado regarding Risk-Limiting Audits

which provide more efficient more meaningful ballot audits

httpswwwgemkonnectcomblogcase-global-lab-grown-diamond-audit-system-kp

13

WHAT YOU SHOULD BE DOING

bull Hire or contract with recognized security experts

bull Develop security standards for voting systems

bull Develop secure procedures

bull Follow secure procedures

bull Monitor (audit) that secure procedures are being followed

bull Revise standards and procedures as conditions change

bull Start saving for new voting systems

bull Buy voting systems that support meaningful auditsmdashInternet voting is not ready

14

CONTACT ME

Ron Bandes

President VoteAllegheny

RBandesc9ncom

(203) 524-3989

15

Page 5: Pennsylvania Voting Technology & SecurityINVOLVEMENT IN ELECTIONS •CyberSecurity member of PA Legislature’s SR394 Committee on Voting System Technology •VVSG CyberSecurity Public

HOW DO YOU KNOW RESEARCH AND EVIDENCE

httpwwwtoysruscombuycrib-bumpers-liners

levtex-baby-fiona-4-piece-bumper-set-lb165b-90486096

httpwwwcnncom20111018healthno-bumpers-cribs-sids-parenting

5

TO PERFORM RESEARCH AND ANALYSISYOU NEED DATA

bull Computer operating systems offer logging It must be configured to log the

events that are meaningful

bull Computer applications may also log important events Buy only applications

that do

bull Computer logs are like hearsay evidence For strong evidence we want

source documents that are prepared by hand or verified by a person

bull Voter-marked paper ballots provide strong evidence in elections

httpwwwflaticoncom

6

TWO THIRDS OF PENNSYLVANIArsquoS 67 COUNTIES USE DRE SYSTEMS IN ALL OR SOME PRECINCTS

bull DREs without a voter-verifiable paper record do not provide strong evidence

for audits and recounts

bull Even with a voter-verifiable paper record most voters donrsquot examine it

bull Some vendors think that Pennsylvania likes DREs and wants new ones

bull We donrsquot

httpwwwluzernecountyorgcountydepartments

_agenciesbureau_of_electionsusing_the_ivotronic

_voting_system

7

NEW VOTING SYSTEMS MUSTBE VERIFIABLY SECURE

bull Provide security features

bull Strong evidence of voter choices like paper ballots

bull Logging of other important events

bull Provide features to verify security

bull Logging the right events

bull Secure ballot storage

bull Chain-of-custody

bull Proper use of cryptography

httpwwwhittmarkingcomproducts4-inchx6-

inch-chain-of-custody-tags-100-tags-pkg

8

YOU CANrsquoT JUST BUY SECURITY

bull Itrsquos not enough that your voting system has the right security features

bull You must use those features correctly

bull It does no good to log events if nobody examines the logs

bull You must have secure procedures (operational security)

httpwwwspokcomblog10-policies-and-procedures-secure-text-messaging

httpswwwrealherbalussecurity-policy

9

BUT YOU DO NEED MONEYSPEND IT WISELY

bull Money from county state and federal governments

bull to buy voting systems with good security features

bull to hire or contract with security experts to help you establish secure procedures

bull to continually perform procedures in a secure manner

bull to update your procedures in consideration of the developing threat landscape

bull Donrsquot rush the purchasing process like we did with HAVA funds

bull Make vendors understand your needs and make them improve their products to fulfill

those needs

httpwwwwifrcomhomeheadlinesTask-Force-Looks-to-Shrink-Illinois-Government-

by-Shrinking--358771091html

10

ARE MY SYSTEMS SECURE

bull Wrong question

bull There is no 100 security

bull Ask ldquohow secure are my systemsrdquo

ldquoWhich threats are my systems protected against and which notrdquo

ldquoAre my system and procedures resilient in the face of software flaws or

malicious attacksrdquo

httpbdutilmftcomsecurePayhtml

11

httpscienceblogscominsolence20161223does-

combatting-quackery-and-pseudoscience-through-rational-

argument-and-ridicule-work

WHY IS THIS IMPORTANT

bull Secure verifiable systems can provide voters with evidence and ASSURANCE

bull In the absence of assurance yoursquoll have conjecture rumors and distrust

bull Some races are worth a lot of [campaign] money

bull Russia matters

bull Experts agree that Russia will interfere more deeply in the future

bull They have no allegiance to any one American political party

httpwwwnetworkworldcomarticle3186913iosiphone-8-rumor-rollup-button-in-the-

rear-true-tone-in-front-inside-jony-ives-headhtml

httpwwwcriticatacrolefteastputin-first-as-farce12

WHAT PENNSYLVANIA IS DOING

bull The PA Department of State is seeking collaboration with nationally

recognized security experts to establish new standards for PA certification of

voting systems

bull Closely following developments in Colorado regarding Risk-Limiting Audits

which provide more efficient more meaningful ballot audits

httpswwwgemkonnectcomblogcase-global-lab-grown-diamond-audit-system-kp

13

WHAT YOU SHOULD BE DOING

bull Hire or contract with recognized security experts

bull Develop security standards for voting systems

bull Develop secure procedures

bull Follow secure procedures

bull Monitor (audit) that secure procedures are being followed

bull Revise standards and procedures as conditions change

bull Start saving for new voting systems

bull Buy voting systems that support meaningful auditsmdashInternet voting is not ready

14

CONTACT ME

Ron Bandes

President VoteAllegheny

RBandesc9ncom

(203) 524-3989

15

Page 6: Pennsylvania Voting Technology & SecurityINVOLVEMENT IN ELECTIONS •CyberSecurity member of PA Legislature’s SR394 Committee on Voting System Technology •VVSG CyberSecurity Public

TO PERFORM RESEARCH AND ANALYSISYOU NEED DATA

bull Computer operating systems offer logging It must be configured to log the

events that are meaningful

bull Computer applications may also log important events Buy only applications

that do

bull Computer logs are like hearsay evidence For strong evidence we want

source documents that are prepared by hand or verified by a person

bull Voter-marked paper ballots provide strong evidence in elections

httpwwwflaticoncom

6

TWO THIRDS OF PENNSYLVANIArsquoS 67 COUNTIES USE DRE SYSTEMS IN ALL OR SOME PRECINCTS

bull DREs without a voter-verifiable paper record do not provide strong evidence

for audits and recounts

bull Even with a voter-verifiable paper record most voters donrsquot examine it

bull Some vendors think that Pennsylvania likes DREs and wants new ones

bull We donrsquot

httpwwwluzernecountyorgcountydepartments

_agenciesbureau_of_electionsusing_the_ivotronic

_voting_system

7

NEW VOTING SYSTEMS MUSTBE VERIFIABLY SECURE

bull Provide security features

bull Strong evidence of voter choices like paper ballots

bull Logging of other important events

bull Provide features to verify security

bull Logging the right events

bull Secure ballot storage

bull Chain-of-custody

bull Proper use of cryptography

httpwwwhittmarkingcomproducts4-inchx6-

inch-chain-of-custody-tags-100-tags-pkg

8

YOU CANrsquoT JUST BUY SECURITY

bull Itrsquos not enough that your voting system has the right security features

bull You must use those features correctly

bull It does no good to log events if nobody examines the logs

bull You must have secure procedures (operational security)

httpwwwspokcomblog10-policies-and-procedures-secure-text-messaging

httpswwwrealherbalussecurity-policy

9

BUT YOU DO NEED MONEYSPEND IT WISELY

bull Money from county state and federal governments

bull to buy voting systems with good security features

bull to hire or contract with security experts to help you establish secure procedures

bull to continually perform procedures in a secure manner

bull to update your procedures in consideration of the developing threat landscape

bull Donrsquot rush the purchasing process like we did with HAVA funds

bull Make vendors understand your needs and make them improve their products to fulfill

those needs

httpwwwwifrcomhomeheadlinesTask-Force-Looks-to-Shrink-Illinois-Government-

by-Shrinking--358771091html

10

ARE MY SYSTEMS SECURE

bull Wrong question

bull There is no 100 security

bull Ask ldquohow secure are my systemsrdquo

ldquoWhich threats are my systems protected against and which notrdquo

ldquoAre my system and procedures resilient in the face of software flaws or

malicious attacksrdquo

httpbdutilmftcomsecurePayhtml

11

httpscienceblogscominsolence20161223does-

combatting-quackery-and-pseudoscience-through-rational-

argument-and-ridicule-work

WHY IS THIS IMPORTANT

bull Secure verifiable systems can provide voters with evidence and ASSURANCE

bull In the absence of assurance yoursquoll have conjecture rumors and distrust

bull Some races are worth a lot of [campaign] money

bull Russia matters

bull Experts agree that Russia will interfere more deeply in the future

bull They have no allegiance to any one American political party

httpwwwnetworkworldcomarticle3186913iosiphone-8-rumor-rollup-button-in-the-

rear-true-tone-in-front-inside-jony-ives-headhtml

httpwwwcriticatacrolefteastputin-first-as-farce12

WHAT PENNSYLVANIA IS DOING

bull The PA Department of State is seeking collaboration with nationally

recognized security experts to establish new standards for PA certification of

voting systems

bull Closely following developments in Colorado regarding Risk-Limiting Audits

which provide more efficient more meaningful ballot audits

httpswwwgemkonnectcomblogcase-global-lab-grown-diamond-audit-system-kp

13

WHAT YOU SHOULD BE DOING

bull Hire or contract with recognized security experts

bull Develop security standards for voting systems

bull Develop secure procedures

bull Follow secure procedures

bull Monitor (audit) that secure procedures are being followed

bull Revise standards and procedures as conditions change

bull Start saving for new voting systems

bull Buy voting systems that support meaningful auditsmdashInternet voting is not ready

14

CONTACT ME

Ron Bandes

President VoteAllegheny

RBandesc9ncom

(203) 524-3989

15

Page 7: Pennsylvania Voting Technology & SecurityINVOLVEMENT IN ELECTIONS •CyberSecurity member of PA Legislature’s SR394 Committee on Voting System Technology •VVSG CyberSecurity Public

TWO THIRDS OF PENNSYLVANIArsquoS 67 COUNTIES USE DRE SYSTEMS IN ALL OR SOME PRECINCTS

bull DREs without a voter-verifiable paper record do not provide strong evidence

for audits and recounts

bull Even with a voter-verifiable paper record most voters donrsquot examine it

bull Some vendors think that Pennsylvania likes DREs and wants new ones

bull We donrsquot

httpwwwluzernecountyorgcountydepartments

_agenciesbureau_of_electionsusing_the_ivotronic

_voting_system

7

NEW VOTING SYSTEMS MUSTBE VERIFIABLY SECURE

bull Provide security features

bull Strong evidence of voter choices like paper ballots

bull Logging of other important events

bull Provide features to verify security

bull Logging the right events

bull Secure ballot storage

bull Chain-of-custody

bull Proper use of cryptography

httpwwwhittmarkingcomproducts4-inchx6-

inch-chain-of-custody-tags-100-tags-pkg

8

YOU CANrsquoT JUST BUY SECURITY

bull Itrsquos not enough that your voting system has the right security features

bull You must use those features correctly

bull It does no good to log events if nobody examines the logs

bull You must have secure procedures (operational security)

httpwwwspokcomblog10-policies-and-procedures-secure-text-messaging

httpswwwrealherbalussecurity-policy

9

BUT YOU DO NEED MONEYSPEND IT WISELY

bull Money from county state and federal governments

bull to buy voting systems with good security features

bull to hire or contract with security experts to help you establish secure procedures

bull to continually perform procedures in a secure manner

bull to update your procedures in consideration of the developing threat landscape

bull Donrsquot rush the purchasing process like we did with HAVA funds

bull Make vendors understand your needs and make them improve their products to fulfill

those needs

httpwwwwifrcomhomeheadlinesTask-Force-Looks-to-Shrink-Illinois-Government-

by-Shrinking--358771091html

10

ARE MY SYSTEMS SECURE

bull Wrong question

bull There is no 100 security

bull Ask ldquohow secure are my systemsrdquo

ldquoWhich threats are my systems protected against and which notrdquo

ldquoAre my system and procedures resilient in the face of software flaws or

malicious attacksrdquo

httpbdutilmftcomsecurePayhtml

11

httpscienceblogscominsolence20161223does-

combatting-quackery-and-pseudoscience-through-rational-

argument-and-ridicule-work

WHY IS THIS IMPORTANT

bull Secure verifiable systems can provide voters with evidence and ASSURANCE

bull In the absence of assurance yoursquoll have conjecture rumors and distrust

bull Some races are worth a lot of [campaign] money

bull Russia matters

bull Experts agree that Russia will interfere more deeply in the future

bull They have no allegiance to any one American political party

httpwwwnetworkworldcomarticle3186913iosiphone-8-rumor-rollup-button-in-the-

rear-true-tone-in-front-inside-jony-ives-headhtml

httpwwwcriticatacrolefteastputin-first-as-farce12

WHAT PENNSYLVANIA IS DOING

bull The PA Department of State is seeking collaboration with nationally

recognized security experts to establish new standards for PA certification of

voting systems

bull Closely following developments in Colorado regarding Risk-Limiting Audits

which provide more efficient more meaningful ballot audits

httpswwwgemkonnectcomblogcase-global-lab-grown-diamond-audit-system-kp

13

WHAT YOU SHOULD BE DOING

bull Hire or contract with recognized security experts

bull Develop security standards for voting systems

bull Develop secure procedures

bull Follow secure procedures

bull Monitor (audit) that secure procedures are being followed

bull Revise standards and procedures as conditions change

bull Start saving for new voting systems

bull Buy voting systems that support meaningful auditsmdashInternet voting is not ready

14

CONTACT ME

Ron Bandes

President VoteAllegheny

RBandesc9ncom

(203) 524-3989

15

Page 8: Pennsylvania Voting Technology & SecurityINVOLVEMENT IN ELECTIONS •CyberSecurity member of PA Legislature’s SR394 Committee on Voting System Technology •VVSG CyberSecurity Public

NEW VOTING SYSTEMS MUSTBE VERIFIABLY SECURE

bull Provide security features

bull Strong evidence of voter choices like paper ballots

bull Logging of other important events

bull Provide features to verify security

bull Logging the right events

bull Secure ballot storage

bull Chain-of-custody

bull Proper use of cryptography

httpwwwhittmarkingcomproducts4-inchx6-

inch-chain-of-custody-tags-100-tags-pkg

8

YOU CANrsquoT JUST BUY SECURITY

bull Itrsquos not enough that your voting system has the right security features

bull You must use those features correctly

bull It does no good to log events if nobody examines the logs

bull You must have secure procedures (operational security)

httpwwwspokcomblog10-policies-and-procedures-secure-text-messaging

httpswwwrealherbalussecurity-policy

9

BUT YOU DO NEED MONEYSPEND IT WISELY

bull Money from county state and federal governments

bull to buy voting systems with good security features

bull to hire or contract with security experts to help you establish secure procedures

bull to continually perform procedures in a secure manner

bull to update your procedures in consideration of the developing threat landscape

bull Donrsquot rush the purchasing process like we did with HAVA funds

bull Make vendors understand your needs and make them improve their products to fulfill

those needs

httpwwwwifrcomhomeheadlinesTask-Force-Looks-to-Shrink-Illinois-Government-

by-Shrinking--358771091html

10

ARE MY SYSTEMS SECURE

bull Wrong question

bull There is no 100 security

bull Ask ldquohow secure are my systemsrdquo

ldquoWhich threats are my systems protected against and which notrdquo

ldquoAre my system and procedures resilient in the face of software flaws or

malicious attacksrdquo

httpbdutilmftcomsecurePayhtml

11

httpscienceblogscominsolence20161223does-

combatting-quackery-and-pseudoscience-through-rational-

argument-and-ridicule-work

WHY IS THIS IMPORTANT

bull Secure verifiable systems can provide voters with evidence and ASSURANCE

bull In the absence of assurance yoursquoll have conjecture rumors and distrust

bull Some races are worth a lot of [campaign] money

bull Russia matters

bull Experts agree that Russia will interfere more deeply in the future

bull They have no allegiance to any one American political party

httpwwwnetworkworldcomarticle3186913iosiphone-8-rumor-rollup-button-in-the-

rear-true-tone-in-front-inside-jony-ives-headhtml

httpwwwcriticatacrolefteastputin-first-as-farce12

WHAT PENNSYLVANIA IS DOING

bull The PA Department of State is seeking collaboration with nationally

recognized security experts to establish new standards for PA certification of

voting systems

bull Closely following developments in Colorado regarding Risk-Limiting Audits

which provide more efficient more meaningful ballot audits

httpswwwgemkonnectcomblogcase-global-lab-grown-diamond-audit-system-kp

13

WHAT YOU SHOULD BE DOING

bull Hire or contract with recognized security experts

bull Develop security standards for voting systems

bull Develop secure procedures

bull Follow secure procedures

bull Monitor (audit) that secure procedures are being followed

bull Revise standards and procedures as conditions change

bull Start saving for new voting systems

bull Buy voting systems that support meaningful auditsmdashInternet voting is not ready

14

CONTACT ME

Ron Bandes

President VoteAllegheny

RBandesc9ncom

(203) 524-3989

15

Page 9: Pennsylvania Voting Technology & SecurityINVOLVEMENT IN ELECTIONS •CyberSecurity member of PA Legislature’s SR394 Committee on Voting System Technology •VVSG CyberSecurity Public

YOU CANrsquoT JUST BUY SECURITY

bull Itrsquos not enough that your voting system has the right security features

bull You must use those features correctly

bull It does no good to log events if nobody examines the logs

bull You must have secure procedures (operational security)

httpwwwspokcomblog10-policies-and-procedures-secure-text-messaging

httpswwwrealherbalussecurity-policy

9

BUT YOU DO NEED MONEYSPEND IT WISELY

bull Money from county state and federal governments

bull to buy voting systems with good security features

bull to hire or contract with security experts to help you establish secure procedures

bull to continually perform procedures in a secure manner

bull to update your procedures in consideration of the developing threat landscape

bull Donrsquot rush the purchasing process like we did with HAVA funds

bull Make vendors understand your needs and make them improve their products to fulfill

those needs

httpwwwwifrcomhomeheadlinesTask-Force-Looks-to-Shrink-Illinois-Government-

by-Shrinking--358771091html

10

ARE MY SYSTEMS SECURE

bull Wrong question

bull There is no 100 security

bull Ask ldquohow secure are my systemsrdquo

ldquoWhich threats are my systems protected against and which notrdquo

ldquoAre my system and procedures resilient in the face of software flaws or

malicious attacksrdquo

httpbdutilmftcomsecurePayhtml

11

httpscienceblogscominsolence20161223does-

combatting-quackery-and-pseudoscience-through-rational-

argument-and-ridicule-work

WHY IS THIS IMPORTANT

bull Secure verifiable systems can provide voters with evidence and ASSURANCE

bull In the absence of assurance yoursquoll have conjecture rumors and distrust

bull Some races are worth a lot of [campaign] money

bull Russia matters

bull Experts agree that Russia will interfere more deeply in the future

bull They have no allegiance to any one American political party

httpwwwnetworkworldcomarticle3186913iosiphone-8-rumor-rollup-button-in-the-

rear-true-tone-in-front-inside-jony-ives-headhtml

httpwwwcriticatacrolefteastputin-first-as-farce12

WHAT PENNSYLVANIA IS DOING

bull The PA Department of State is seeking collaboration with nationally

recognized security experts to establish new standards for PA certification of

voting systems

bull Closely following developments in Colorado regarding Risk-Limiting Audits

which provide more efficient more meaningful ballot audits

httpswwwgemkonnectcomblogcase-global-lab-grown-diamond-audit-system-kp

13

WHAT YOU SHOULD BE DOING

bull Hire or contract with recognized security experts

bull Develop security standards for voting systems

bull Develop secure procedures

bull Follow secure procedures

bull Monitor (audit) that secure procedures are being followed

bull Revise standards and procedures as conditions change

bull Start saving for new voting systems

bull Buy voting systems that support meaningful auditsmdashInternet voting is not ready

14

CONTACT ME

Ron Bandes

President VoteAllegheny

RBandesc9ncom

(203) 524-3989

15

Page 10: Pennsylvania Voting Technology & SecurityINVOLVEMENT IN ELECTIONS •CyberSecurity member of PA Legislature’s SR394 Committee on Voting System Technology •VVSG CyberSecurity Public

BUT YOU DO NEED MONEYSPEND IT WISELY

bull Money from county state and federal governments

bull to buy voting systems with good security features

bull to hire or contract with security experts to help you establish secure procedures

bull to continually perform procedures in a secure manner

bull to update your procedures in consideration of the developing threat landscape

bull Donrsquot rush the purchasing process like we did with HAVA funds

bull Make vendors understand your needs and make them improve their products to fulfill

those needs

httpwwwwifrcomhomeheadlinesTask-Force-Looks-to-Shrink-Illinois-Government-

by-Shrinking--358771091html

10

ARE MY SYSTEMS SECURE

bull Wrong question

bull There is no 100 security

bull Ask ldquohow secure are my systemsrdquo

ldquoWhich threats are my systems protected against and which notrdquo

ldquoAre my system and procedures resilient in the face of software flaws or

malicious attacksrdquo

httpbdutilmftcomsecurePayhtml

11

httpscienceblogscominsolence20161223does-

combatting-quackery-and-pseudoscience-through-rational-

argument-and-ridicule-work

WHY IS THIS IMPORTANT

bull Secure verifiable systems can provide voters with evidence and ASSURANCE

bull In the absence of assurance yoursquoll have conjecture rumors and distrust

bull Some races are worth a lot of [campaign] money

bull Russia matters

bull Experts agree that Russia will interfere more deeply in the future

bull They have no allegiance to any one American political party

httpwwwnetworkworldcomarticle3186913iosiphone-8-rumor-rollup-button-in-the-

rear-true-tone-in-front-inside-jony-ives-headhtml

httpwwwcriticatacrolefteastputin-first-as-farce12

WHAT PENNSYLVANIA IS DOING

bull The PA Department of State is seeking collaboration with nationally

recognized security experts to establish new standards for PA certification of

voting systems

bull Closely following developments in Colorado regarding Risk-Limiting Audits

which provide more efficient more meaningful ballot audits

httpswwwgemkonnectcomblogcase-global-lab-grown-diamond-audit-system-kp

13

WHAT YOU SHOULD BE DOING

bull Hire or contract with recognized security experts

bull Develop security standards for voting systems

bull Develop secure procedures

bull Follow secure procedures

bull Monitor (audit) that secure procedures are being followed

bull Revise standards and procedures as conditions change

bull Start saving for new voting systems

bull Buy voting systems that support meaningful auditsmdashInternet voting is not ready

14

CONTACT ME

Ron Bandes

President VoteAllegheny

RBandesc9ncom

(203) 524-3989

15

Page 11: Pennsylvania Voting Technology & SecurityINVOLVEMENT IN ELECTIONS •CyberSecurity member of PA Legislature’s SR394 Committee on Voting System Technology •VVSG CyberSecurity Public

ARE MY SYSTEMS SECURE

bull Wrong question

bull There is no 100 security

bull Ask ldquohow secure are my systemsrdquo

ldquoWhich threats are my systems protected against and which notrdquo

ldquoAre my system and procedures resilient in the face of software flaws or

malicious attacksrdquo

httpbdutilmftcomsecurePayhtml

11

httpscienceblogscominsolence20161223does-

combatting-quackery-and-pseudoscience-through-rational-

argument-and-ridicule-work

WHY IS THIS IMPORTANT

bull Secure verifiable systems can provide voters with evidence and ASSURANCE

bull In the absence of assurance yoursquoll have conjecture rumors and distrust

bull Some races are worth a lot of [campaign] money

bull Russia matters

bull Experts agree that Russia will interfere more deeply in the future

bull They have no allegiance to any one American political party

httpwwwnetworkworldcomarticle3186913iosiphone-8-rumor-rollup-button-in-the-

rear-true-tone-in-front-inside-jony-ives-headhtml

httpwwwcriticatacrolefteastputin-first-as-farce12

WHAT PENNSYLVANIA IS DOING

bull The PA Department of State is seeking collaboration with nationally

recognized security experts to establish new standards for PA certification of

voting systems

bull Closely following developments in Colorado regarding Risk-Limiting Audits

which provide more efficient more meaningful ballot audits

httpswwwgemkonnectcomblogcase-global-lab-grown-diamond-audit-system-kp

13

WHAT YOU SHOULD BE DOING

bull Hire or contract with recognized security experts

bull Develop security standards for voting systems

bull Develop secure procedures

bull Follow secure procedures

bull Monitor (audit) that secure procedures are being followed

bull Revise standards and procedures as conditions change

bull Start saving for new voting systems

bull Buy voting systems that support meaningful auditsmdashInternet voting is not ready

14

CONTACT ME

Ron Bandes

President VoteAllegheny

RBandesc9ncom

(203) 524-3989

15

Page 12: Pennsylvania Voting Technology & SecurityINVOLVEMENT IN ELECTIONS •CyberSecurity member of PA Legislature’s SR394 Committee on Voting System Technology •VVSG CyberSecurity Public

WHY IS THIS IMPORTANT

bull Secure verifiable systems can provide voters with evidence and ASSURANCE

bull In the absence of assurance yoursquoll have conjecture rumors and distrust

bull Some races are worth a lot of [campaign] money

bull Russia matters

bull Experts agree that Russia will interfere more deeply in the future

bull They have no allegiance to any one American political party

httpwwwnetworkworldcomarticle3186913iosiphone-8-rumor-rollup-button-in-the-

rear-true-tone-in-front-inside-jony-ives-headhtml

httpwwwcriticatacrolefteastputin-first-as-farce12

WHAT PENNSYLVANIA IS DOING

bull The PA Department of State is seeking collaboration with nationally

recognized security experts to establish new standards for PA certification of

voting systems

bull Closely following developments in Colorado regarding Risk-Limiting Audits

which provide more efficient more meaningful ballot audits

httpswwwgemkonnectcomblogcase-global-lab-grown-diamond-audit-system-kp

13

WHAT YOU SHOULD BE DOING

bull Hire or contract with recognized security experts

bull Develop security standards for voting systems

bull Develop secure procedures

bull Follow secure procedures

bull Monitor (audit) that secure procedures are being followed

bull Revise standards and procedures as conditions change

bull Start saving for new voting systems

bull Buy voting systems that support meaningful auditsmdashInternet voting is not ready

14

CONTACT ME

Ron Bandes

President VoteAllegheny

RBandesc9ncom

(203) 524-3989

15

Page 13: Pennsylvania Voting Technology & SecurityINVOLVEMENT IN ELECTIONS •CyberSecurity member of PA Legislature’s SR394 Committee on Voting System Technology •VVSG CyberSecurity Public

WHAT PENNSYLVANIA IS DOING

bull The PA Department of State is seeking collaboration with nationally

recognized security experts to establish new standards for PA certification of

voting systems

bull Closely following developments in Colorado regarding Risk-Limiting Audits

which provide more efficient more meaningful ballot audits

httpswwwgemkonnectcomblogcase-global-lab-grown-diamond-audit-system-kp

13

WHAT YOU SHOULD BE DOING

bull Hire or contract with recognized security experts

bull Develop security standards for voting systems

bull Develop secure procedures

bull Follow secure procedures

bull Monitor (audit) that secure procedures are being followed

bull Revise standards and procedures as conditions change

bull Start saving for new voting systems

bull Buy voting systems that support meaningful auditsmdashInternet voting is not ready

14

CONTACT ME

Ron Bandes

President VoteAllegheny

RBandesc9ncom

(203) 524-3989

15

Page 14: Pennsylvania Voting Technology & SecurityINVOLVEMENT IN ELECTIONS •CyberSecurity member of PA Legislature’s SR394 Committee on Voting System Technology •VVSG CyberSecurity Public

WHAT YOU SHOULD BE DOING

bull Hire or contract with recognized security experts

bull Develop security standards for voting systems

bull Develop secure procedures

bull Follow secure procedures

bull Monitor (audit) that secure procedures are being followed

bull Revise standards and procedures as conditions change

bull Start saving for new voting systems

bull Buy voting systems that support meaningful auditsmdashInternet voting is not ready

14

CONTACT ME

Ron Bandes

President VoteAllegheny

RBandesc9ncom

(203) 524-3989

15

Page 15: Pennsylvania Voting Technology & SecurityINVOLVEMENT IN ELECTIONS •CyberSecurity member of PA Legislature’s SR394 Committee on Voting System Technology •VVSG CyberSecurity Public

CONTACT ME

Ron Bandes

President VoteAllegheny

RBandesc9ncom

(203) 524-3989

15