<html xmlns:v="urn:schemas-microsoft-com:vml" xmlns:o="urn:schemas-microsoft-com:office:office" xmlns:w="urn:schemas-microsoft-com:office:word" xmlns:m="http://schemas.microsoft.com/office/2004/12/omml" xmlns="http://www.w3.org/TR/REC-html40"><head><meta http-equiv=Content-Type content="text/html; charset=us-ascii"><meta name=Generator content="Microsoft Word 15 (filtered medium)"><!--[if !mso]><style>v\:* {behavior:url(#default#VML);}
o\:* {behavior:url(#default#VML);}
w\:* {behavior:url(#default#VML);}
.shape {behavior:url(#default#VML);}
</style><![endif]--><style><!--
/* Font Definitions */
@font-face
        {font-family:Helvetica;
        panose-1:2 11 6 4 2 2 2 2 2 4;}
@font-face
        {font-family:"Cambria Math";
        panose-1:2 4 5 3 5 4 6 3 2 4;}
@font-face
        {font-family:Calibri;
        panose-1:2 15 5 2 2 2 4 3 2 4;}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
        {margin:0in;
        margin-bottom:.0001pt;
        font-size:11.0pt;
        font-family:"Calibri",sans-serif;}
h1
        {mso-style-priority:9;
        mso-style-link:"Heading 1 Char";
        margin-top:15.0pt;
        margin-right:0in;
        margin-bottom:7.5pt;
        margin-left:0in;
        font-size:27.0pt;
        font-family:"Helvetica",sans-serif;
        font-weight:normal;}
a:link, span.MsoHyperlink
        {mso-style-priority:99;
        color:#0563C1;
        text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
        {mso-style-priority:99;
        color:#954F72;
        text-decoration:underline;}
p
        {mso-style-priority:99;
        margin-top:0in;
        margin-right:0in;
        margin-bottom:7.5pt;
        margin-left:0in;
        font-size:12.0pt;
        font-family:"Times New Roman",serif;}
span.EmailStyle17
        {mso-style-type:personal-compose;
        font-family:"Calibri",sans-serif;
        color:black;
        font-weight:normal;
        font-style:normal;
        text-decoration:none none;}
span.Heading1Char
        {mso-style-name:"Heading 1 Char";
        mso-style-priority:9;
        mso-style-link:"Heading 1";
        font-family:"Helvetica",sans-serif;}
.MsoChpDefault
        {mso-style-type:export-only;
        font-family:"Calibri",sans-serif;}
@page WordSection1
        {size:8.5in 11.0in;
        margin:1.0in 1.0in 1.0in 1.0in;}
div.WordSection1
        {page:WordSection1;}
/* List Definitions */
@list l0
        {mso-list-id:208666;
        mso-list-template-ids:1215091538;}
ol
        {margin-bottom:0in;}
ul
        {margin-bottom:0in;}
--></style><!--[if gte mso 9]><xml>
<o:shapedefaults v:ext="edit" spidmax="1026" />
</xml><![endif]--><!--[if gte mso 9]><xml>
<o:shapelayout v:ext="edit">
<o:idmap v:ext="edit" data="1" />
</o:shapelayout></xml><![endif]--></head><body lang=EN-US link="#0563C1" vlink="#954F72"><div class=WordSection1><div style='mso-element:para-border-div;border:none;border-bottom:solid #EEEEEE 1.5pt;padding:0in 0in 7.0pt 0in'><h1 style='mso-margin-top-alt:0in;margin-right:0in;margin-bottom:15.0pt;margin-left:0in;border:none;padding:0in'><span style='font-size:12.0pt;color:#001937'>Your thoughts on <a href="https://www.usvotefoundation.org/news/E2E-VIV-press">this</a>? /Larry<o:p></o:p></span></h1><h1 style='mso-margin-top-alt:0in;margin-right:0in;margin-bottom:15.0pt;margin-left:0in;border:none;padding:0in'><span style='font-size:12.0pt;color:#001937'>****************************<o:p></o:p></span></h1><h1 style='mso-margin-top-alt:0in;margin-right:0in;margin-bottom:15.0pt;margin-left:0in;border:none;padding:0in'><span style='font-size:19.5pt;color:#001937'>Consensus Reached on Recommendations Toward the Future of Internet Voting<o:p></o:p></span></h1></div><p class=MsoNormal><span style='font-size:10.5pt;font-family:"Helvetica",sans-serif;color:#333333'><img border=0 width=275 height=275 id="Picture_x0020_1" src="cid:image003.jpg@01D16278.7D4693F0" alt="https://www.usvotefoundation.org/sites/default/files/styles/medium/public/verification%20of%20tally.jpg?itok=7eMKVqv2"></span><span style='font-size:10.5pt;font-family:"Helvetica",sans-serif;color:#333333'><o:p></o:p></span></p><p align=center style='text-align:center'><span style='font-size:10.5pt;font-family:"Helvetica",sans-serif;color:#333333'> <em><b><span style='font-family:"Helvetica",sans-serif'>U.S. Vote Foundation Releases New System Requirements, Specifications, Architecture and </span></b></em><b><i><br><em><span style='font-family:"Helvetica",sans-serif'>Cryptographic Foundations for End-to-End Verifiable Internet Voting </span></em></i></b><o:p></o:p></span></p><p><strong><span style='font-size:10.5pt;font-family:"Helvetica",sans-serif;color:#333333'>PORTLAND, ME</span></strong><span style='font-size:10.5pt;font-family:"Helvetica",sans-serif;color:#333333'> – July 10, 2015 – Today’s release of <a href="https://www.usvotefoundation.org/e2e-viv/summary" target="_blank">The Future of Voting: End-to-End Verifiable Internet Voting Specification and Feasibility Assessment Study</a> by U.S. Vote Foundation establishes a new reference for the security, usability and transparency requirements essential to the U.S. in any consideration of Internet voting for public elections. The announcement was made at the Annual Summer Conference of the National Association of Secretaries of State, hosted this year in Portland, Maine.<o:p></o:p></span></p><p><span style='font-size:10.5pt;font-family:"Helvetica",sans-serif;color:#333333'>Developed by a team of the nation’s leading experts in election integrity, election administration, high-assurance systems engineering, and cryptography, the report starts from the premise that public elections in the U.S. are a matter of national security. The authors assert that Internet voting systems must be transparent and designed to run in a manner that embraces the constructs of end-to-end verifiability – a property missing from existing Internet voting systems. <o:p></o:p></span></p><p><span style='font-size:10.5pt;font-family:"Helvetica",sans-serif;color:#333333'>An end-to-end verifiable (E2E-V) voting system allows voters to 1) check that the system recorded their votes correctly; 2) check that the system included their votes in the final tally; 3) count the recorded votes and double-check the announced outcome of the election.  An Internet voting system that is end-to-end verifiable is an E2E-VIV system. The new set of system specifications that could eventually lead to a model E2E-VIV system includes an ideal cryptographic foundation, security, audit, and usability considerations, as well as technical approaches to the system architecture. <o:p></o:p></span></p><p><span style='font-size:10.5pt;font-family:"Helvetica",sans-serif;color:#333333'>As election technology evolves and more states evaluate Internet voting, caution on compromises to integrity and security is warranted, and according to the report, should be particularly avoided by the premature deployment of Internet voting. The report aims to list the security challenges that exist with Internet voting and emphasizes that research should continue as the threat landscape continues to shift. Existing proprietary systems that meet only a subset of the requirements cannot be considered secure enough for use in the U.S.<o:p></o:p></span></p><p><strong><span style='font-size:10.5pt;font-family:"Helvetica",sans-serif;color:#333333'>Key recommendations in the report to make Internet voting more secure and transparent include</span></strong><span style='font-size:10.5pt;font-family:"Helvetica",sans-serif;color:#333333'>: <o:p></o:p></span></p><p style='margin-left:.5in;text-indent:-.25in;mso-list:l0 level1 lfo1'><![if !supportLists]><span style='font-size:10.5pt;font-family:"Helvetica",sans-serif;color:#333333'><span style='mso-list:Ignore'>1.<span style='font:7.0pt "Times New Roman"'>     </span></span></span><![endif]><strong><span style='font-size:10.5pt;font-family:"Helvetica",sans-serif;color:#333333'>Any public elections conducted over the Internet must be end-to-end verifiable </span></strong><span style='font-size:10.5pt;font-family:"Helvetica",sans-serif;color:#333333'>– The report asserts that the use of Internet voting systems without end-to-end verifiability is irresponsible, and E2E-V is the only publicly available technology that provides assurance an Internet voting system is secure and transparent.<o:p></o:p></span></p><p style='margin-left:.5in;text-indent:-.25in;mso-list:l0 level1 lfo1'><![if !supportLists]><span style='font-size:10.5pt;font-family:"Helvetica",sans-serif;color:#333333'><span style='mso-list:Ignore'>2.<span style='font:7.0pt "Times New Roman"'>     </span></span></span><![endif]><strong><span style='font-size:10.5pt;font-family:"Helvetica",sans-serif;color:#333333'>End-to-End Verifiable systems must be in-person and supervised first </span></strong><span style='font-size:10.5pt;font-family:"Helvetica",sans-serif;color:#333333'>– It is critical to first enhance the security of in-person voting systems with E2E-V, and learn from its deployment, before assuming the more complex task of deploying E2E-VIV systems.<o:p></o:p></span></p><p style='margin-left:.5in;text-indent:-.25in;mso-list:l0 level1 lfo1'><![if !supportLists]><span style='font-size:10.5pt;font-family:"Helvetica",sans-serif;color:#333333'><span style='mso-list:Ignore'>3.<span style='font:7.0pt "Times New Roman"'>     </span></span></span><![endif]><strong><span style='font-size:10.5pt;font-family:"Helvetica",sans-serif;color:#333333'>End-to-End Verifiable Internet Voting systems must be high assurance</span></strong><span style='font-size:10.5pt;font-family:"Helvetica",sans-serif;color:#333333'> – E2E-VIV systems must be designed, constructed, verified, certified, operated and supported according to the most rigorous engineering requirements of mission- and safety-critical systems. A voting system vulnerable to privacy violations, programming errors, and security issues will undermine the trust of the electorate and validity of the results.<o:p></o:p></span></p><p style='margin-left:.5in;text-indent:-.25in;mso-list:l0 level1 lfo1'><![if !supportLists]><span style='font-size:10.5pt;font-family:"Helvetica",sans-serif;color:#333333'><span style='mso-list:Ignore'>4.<span style='font:7.0pt "Times New Roman"'>     </span></span></span><![endif]><strong><span style='font-size:10.5pt;font-family:"Helvetica",sans-serif;color:#333333'>End-to-End Verifiable Internet Voting systems must be usable and accessible to all voters</span></strong><span style='font-size:10.5pt;font-family:"Helvetica",sans-serif;color:#333333'> – E2E-VIV systems must ensure usability and accessibility for all voters including those with disabilities.<o:p></o:p></span></p><p style='margin-left:.5in;text-indent:-.25in;mso-list:l0 level1 lfo1'><![if !supportLists]><span style='font-size:10.5pt;font-family:"Helvetica",sans-serif;color:#333333'><span style='mso-list:Ignore'>5.<span style='font:7.0pt "Times New Roman"'>     </span></span></span><![endif]><strong><span style='font-size:10.5pt;font-family:"Helvetica",sans-serif;color:#333333'>Maintain aggressive election R&D efforts</span></strong><span style='font-size:10.5pt;font-family:"Helvetica",sans-serif;color:#333333'> – Formidable challenges in usability, reliability and security remain for the development of E2E-VIV systems and will require continued investment in peer-reviewed research and development to overcome. <o:p></o:p></span></p><p align=center style='text-align:center'><span style='font-size:10.5pt;font-family:"Helvetica",sans-serif;color:#333333'><a href="https://www.usvotefoundation.org/e2e-viv/summary"><strong><span style='font-family:"Helvetica",sans-serif;color:#128AC3;text-decoration:none'>See the Executive Summary</span></strong></a><o:p></o:p></span></p><p align=center style='text-align:center'><span style='font-size:10.5pt;font-family:"Helvetica",sans-serif;color:#333333'><a href="https://www.usvotefoundation.org/E2E-VIV"><strong><span style='font-family:"Helvetica",sans-serif;color:#128AC3;text-decoration:none'>Download the Full Report or Sections</span></strong></a><o:p></o:p></span></p><p class=MsoNormal><span style='font-size:12.0pt;color:black'><o:p> </o:p></span></p></div></body></html>