BREAKING NEWS: NSTIC NPO Announces 2015 Pilot Project Funding

The NSTIC NPO has just announced a 4th round of pilot program funding in 2015 for fresh and innovative identity solutions! The Strategy calls for the private sector to lead the development of an identity ecosystem where individuals can choose from a variety of credentials to use in lieu of passwords for interactions online. These pilots will ultimately address barriers to the identity ecosystem and seed the marketplace with “NSTIC-aligned” solutions to enhance privacy, security, and convenience in online transactions. We are excited to share this news with innovators of all kinds so they will apply for funding in order to address the toughest challenges in identity management. Pilots should create and demonstrate solutions that can help jumpstart the adoption of trusted strong authentication technologies in lieu of passwords, in alignment with the NSTIC.

Specifically, we are seeking to fund pilots that address challenges such as:

  • Concerns about the impact on privacy and civil liberties arising from the crossing of contextual boundaries and the capacity for more tracking and profiling inherent in federated identity solutions
  • The usability of strong authentication technologies
  • Balancing transparency to individual users and ease-of-use
  • Building security, privacy, and usability into commonly used architectures (e.g., RESTful API architectures) to manage access to personal data
  • Limited deployment of successful trust frameworks—especially addressing multiple sectors
  • Lack of commonly accepted technical standards for interoperability among solutions
  • Lack of strong authentication solutions that can be used across multiple sectors and relying parties (RPs)
  • Lack of clarity on liability and other complex economic issues (e.g., “who is liable if something goes wrong in a transaction?”  “How – if at all – should transactions be monetized?”)

The NSTIC pilot program was first launched in 2012, and to date has provided approximately $30 million for innovative identity projects.

For more details about the pilot program (along with deadlines and submission information), please visit Feel free to also share this important news with anyone you think may be interested!

Helpful information:

Follow the NSTIC NPO on Twitter for the latest updates.

Posted in Uncategorized | Tagged , , , , , | 2 Comments

A Great Leap Forward: Thoughts on Last Week’s IDESG Plenary in Atlanta

Something was distinctly different last week as more than 120 people gathered, both in person and virtually, for a meeting of the Identity Ecosystem Steering Group (IDESG).

Perhaps inspired by the breakfasts at the Silver Skillet diner next door to our hosts at Georgia Tech Research Institute (if NIST ever does create a Standard Reference Material for fried pork chops, theirs would be an excellent candidate), the members of the IDESG made a great leap forward toward producing v.1 of the Identity Ecosystem Framework (IDEF).

It was hands down, the most focused plenary the organization has had; attendees came out of the event with a great deal of momentum and excitement.

What was different? For starters, the organization’s members have finally reached consensus on a path forward to create an IDEF of standards and processes that will enable interoperability of secure, convenient, privacy-enhancing identity solutions online. It’s a tough challenge given the scope of the effort, and it has taken time to rally participants around a single approach. But now that the organization is there, participants have been focusing their efforts toward accelerating work to support the approach.

Each of the major IDESG committees has been focusing the last two months on developing requirements for the Framework – and in Atlanta, they shared them with the broader plenary. General feedback on this first draft from attendees was quite positive, and a formal set of baseline requirements should be finished by most committees by mid-March. That, in turn, should position the IDESG to finally unveil v.1 of the Framework this summer.

That work looks to be aided by Marc-Anthony Signorino, who was formally announced as the IDESG’s new Executive Director. This is the first time that the IDESG has a hired a full-time Executive Director—and it is a move that should help the organization mature and accelerate its pace of progress.

In addition to the above highlights, plenary attendees were introduced to the latest round of NSTIC pilots: Confyrm, GSMA, and MorphoTrust. They also heard updates from two current NSTIC pilots, GTRI and The pilots all discussed their projects, highlighting achievements, lessons learned, and plans going forward. A media perspectives panel with two Pulitzer Prize winners was also an exciting part of the event.

These busy few days demonstrated exceptional progress and organizational maturity for the IDESG. Thank you to everyone who attended for playing an active role in the development of this organization. We look forward to continuing our work together across sectors, furthering the NSTIC vision as we develop a more secure, private, and easy-to-use online environment for all.

So, what’s next for the IDESG after this week’s big event? It’s back to the grindstone in the committees where work will focus on refining the baseline requirements, paving the way for the Framework and a self-assessment program to support it. To contribute to this foundational work, become a member of the IDESG!

Follow the NSTIC NPO on Twitter for the latest updates.

Posted in Uncategorized | Tagged , , , , , , , , , , , , | Leave a comment

Announcing Marc-Anthony Signorino as the new Executive Director of the IDESG!

We are excited to see the Identity Ecosystem Steering Group (IDESG) kicking off 2015 in a big way. In its third year as an organization, the IDESG is gathering at the 12th plenary (January 28-30 in Atlanta), charging ahead with the creation of an Identity Ecosystem Framework that can help provide a foundation to underpin implementation of the NSTIC.

The IDESG has been fortunate to have Mary Ellen Condon serving as Executive Director for the past eight months, playing a direct role in cultivating these successful steps forward. Sadly, Mary Ellen’s time at the IDESG has come to an end, and we are all disappointed to see her go.

As Mary Ellen departs, we are thrilled to officially welcome Marc-Anthony Signorino as the IDESG’s new Executive Director. Marc-Anthony comes to the IDESG with a diverse array of experience in areas such as: cybersecurity, consumer online privacy and security, identity management issues, internet governance, and the protection of intellectual property rights. This work includes stints at the American Electronics Association (AeA), National Association of Manufacturers (NAM), and eBay. His diverse background positions him well to interact with our diverse stakeholders—and he has been a very active member of the IDESG itself, serving as the Secretary of its Privacy Committee.

We are grateful to Mary Ellen for all of the work she’s put into pushing the IDESG forward in her time as Executive Director. Marc-Anthony: welcome…and we look forward to seeing the great things you accomplish with the IDESG in 2015 and beyond.

Follow us on Twitter: @NSTICNPO

Posted in Uncategorized | Tagged , , , , , , | Leave a comment

Identity is the Great Enabler: Putting Patients at the Center of Health IT

Addressing Health IT privacy and security concerns are complicated. Often the focus is to zero in on a specific technical solution and leave the often more important issues – policy, privacy, business rules – for others to solve. But as we’ve seen, too many times these other issues are left unaddressed – and progress is hindered.

Identity is critical to Health IT privacy and security issues, particularly when it comes to putting patients at the center of sharing health information online. Patients and health providers both face challenges with solving the “identity conundrum” – how to validate that information is going to the right person, and that it is being done in a way that protects security and privacy.

The National Strategy for Trusted Identities in Cyberspace (NSTIC) is a White House initiative that aims to solve the identity conundrum, through a collaborative effort between the private sector, advocacy groups, public sector agencies, and other organizations to improve the privacy, security, and convenience of online transactions. NSTIC focuses not just on identity technology, but on a range of other barriers that have inhibited the adoption of stronger identity solutions in the marketplace, such as usability, liability, privacy and interoperability.

Since its launch in 2011, the NSTIC National Program Office (NPO) has worked closely with the Office of the National Coordinator (ONC) for Health Information Technology to ensure that the identity solutions developed and adopted by industry align with both the NSTIC, as well as Health IT requirements.

In health, the emergence of data sharing APIs such as FHIR – and industry’s support for it – provides an ideal opportunity to tackle the privacy and security concerns regarding access to information via APIs right from the start, while the market is still in the early stages of development and standardization.

We’re thrilled to be working with ONC and a host of industry partners to support a new effort to develop profiles of commonly used identity standards for health care and other “high trust” use cases: the Health Relationship Trust (HEART Working Group). Launched in October, the HEART WG will take a patient centered approach by defining a set of security profiles that focus on securing patient/consumer RESTful health-related data sharing APIs, such as FHIR. The charter for the group can be found here.

At the core of the effort is a suite of standard and profiles that will support authentication, authorization, and consent layers:

  • Open ID Connect (OIDC) – Used to provide end-user/patient authentication information to all types of systems including Web-based, mobile, and computers.
  • OAUTH 2.0 – Allows the patient to grant access from one service or provider to another without needing to share personal identifying information between services or resources.
  • User Managed Access (UMA) 1.0 – Used to manage consent, person to person data sharing, and other authorizations.

It is important to note that these standards do not support Health IT requirements “out of the box” – what is needed is a set of profiles of these standards that meet Health IT and NSTIC requirements, so that developers have a robust toolkit to address the identity conundrum. Creating these profiles and toolkit is the focus of the HEART effort.

The HEART WG is a collaboration of the MIT Consortium for Kerberos and Internet Trust (MIT-KIT), ONC, and the OpenID Foundation; NIST is involved as well. The work will take place at the OpenID Foundation (OIDF) and the privacy and security profiles produce by this effort will become part of the (OIDF) formal specifications. MIT-KIT will implement the HEART profiles in their MitreID reference implementation. This is the same reference implementation that supports the SMART on FHIR platform today.

From a national perspective, we are excited about the potential of the HEART efforts to not only address health use cases, but also other sectors focused on the same problems. We urge members of the developer community to get involved!

Follow us on Twitter: @NSTICNPO

Posted in Uncategorized | Tagged , , , , , , , , , , , | Leave a comment

Come Hang Out With Us to Talk Identity and Innovation in Health Care

Identity is critical to Health Information Technology (HIT), particularly when it comes to sharing health information online.  Patients and health providers aren’t going to share personal information if they can’t solve the “identity conundrum” – how to validate that information is going to the right person.

We’re excited to participate with the Office of the National Coordinator (ONC) for Health IT in an Innovation Engagement Hangout on Google that will dive into some of the new ways developers can address the identity conundrum, leveraging new approaches spurred in part by NSTIC.  The Hangout, on December 18th at 2:00 PM, will highlight what the NSTIC NPO is doing, in concert with the private sector, to try to develop a more mature identity toolkit that will make it easier for developers to support easy-to-use identity solutions that protect and enhance security and privacy.  We’ll also touch on President Obama’s recent Executive Order 13681, which requires agencies to ensure that all agencies making personal data accessible to citizens through digital applications require the use of multiple factors of authentication and an effective identity proofing process.

The Hangout will feature Jeremy Grant from the NSTIC NPO and Eve Maler, VP of Innovation & Emerging Technology at ForgeRock, as they discuss the recent White House EO and the NSTIC vision for a vibrant Identity Ecosystem—with a special focus on how health IT startups can get involved in these efforts.

Join the Hangout:

Follow us on Twitter: @NSTICNPO

Posted in Uncategorized | Tagged , , , , , , , , , | 1 Comment

Everybody Needs Identity.

Whether you are 19 or 91, protecting your identity is extremely important – particularly as identity breaches become more pervasive and affect more people worldwide. A recent study revealed the concerns about identity theft are high, with four out of five adults calling identity theft a concern, and about half calling it a “major” concern.*

Against this backdrop, the National Strategy for Trusted Identities in Cyberspace (NSTIC) is focused on empowering individuals to better protect their security and privacy online. Protecting and controlling our digital identities allows us to live in a safer virtual realm; if we can trust the transactions we make online, we can better realize the benefits of the digital world.

A major challenge with getting individuals to start using technologies that can better protect their identity is usability: if a solution makes things more complicated and offers little visible benefit, consumers simply won’t use it. Usability becomes even more challenging when you consider all of the different types of people who might use a solution. Differences in age, background, and abilities all may impact whether someone considers a technology to be “easy to use.”

For this reason, one focus of the NSTIC pilots has been to test how different types of consumers respond to different types of identity solutions. Collectively, the NSTIC pilots have touched students, parents, patients, seniors, veterans, online shoppers, and a variety of other demographics. One of our more exciting pilots has involved the AARP.

AARP is a nonprofit organization that helps families with life issues that are most important to them—such as retirement planning, healthcare, and employment security. As part of its mission, AARP has been exploring new ways to help its 37 million plus members aged 50 and above better protect their privacy and security with innovative methods; Jim Barnett, Senior Strategic Advisor for Digital Identity Management at AARP, explains “we want to equip our members to live their best lives.”

AARP has partnered with NSTIC pilot awardee Daon to pilot the use of Daon’s “TrustX” mobile biometric authentication solution to enable AARP members to enroll and access their personal health records in a way that is both secure and easy to use. TrustX is a cloud-based biometric solution, which allows for simple PIN, facial, or voice biometric authentication—allowing people to choose which mode works best for them.

“The pilot has been a great platform to discuss usability and secure interoperable credentials,” Barnett says. Since the AARP user base is comprised of members with varying levels of technological expertise, the need for a streamlined user experience is of key importance. “We have to make sure that anyone that comes to us online will understand this intuitively.” Interaction with every member in a natural and simple way is AARP’s ultimate goal—and the pilot program is the perfect forum for testing this goal.

The NSTIC pilot has also been instrumental in AARP’s ability to begin to understand the type of trusted identity solutions their members need. The need for an interoperable solution that every user can understand and trust—which will ultimately contribute to a better, safer, online environment for members—is the key to success. Having a range of options for solutions is also important since consumers should be able to pick a solution that fits in best with their lifestyle.

He continues to look to the NSTIC Guiding Principles for direction moving forward; Barnett emphasizes that they often turn to the Guiding Principles as a baseline for what an ideal identity solution needs to be when evaluating potential solutions. The progress already made as a result of the pilot program will be instrumental in creating additional conveniences and protections for AARP’s millions of members. Also, AARPs overall understanding of the solution needs of their member base has increased, and will continue to increase as we work together to make progress in the future.

*Centrify survey

Posted in Uncategorized | Leave a comment

It’s Not Just About Security; Identity is the Great Enabler

Last week, President Obama signed a new Executive Order calling for “all agencies making personal data accessible to citizens through digital applications” to “require the use of multiple factors of authentication and an effective identity proofing process.”  The President set a deadline of 18 months for agencies to comply.

Since the release of this Executive Order, the press has focused quite a bit on how it will improve the security of government sites, and help better protect the security and privacy of citizens’ data. It’s an important point – especially because the vast majority of data breaches are executed by exploiting the weaknesses of passwords. However, the benefits of improving identity go well beyond security. What is most exciting about this new Executive Order is how it will enable government to more effectively serve the American people through a wide array of new citizen-facing digital government applications.

Since the advent of the Internet in the 1990s, the vast majority of government websites have focused on low-value or passive applications – sharing general information about government activities and answering common questions about programs. But higher-value applications that enable citizens to have a truly personalized experience (e.g. transacting business with government or obtaining personal data) have largely been mired in the offline world.

The reason has been simple: higher value applications come with higher risk, so agencies will only offer a service online if there’s an easy way to ascertain whether the “person” on the other end of a transaction is really who he or she claims to be. Twenty-one years after the New Yorker proclaimed, “On the Internet, nobody knows you’re a dog,” we’re still dealing with certain services being stuck in the paper world because agencies can’t reliably authenticate identities online.

There’s nothing wrong with being a “dog” on the Internet, per se – the ability to be anonymous or pseudonymous online has been a hallmark of the Internet, and must continue to be. Conversely, there are times when the ability to assert your true identity online is essential to enabling high-value services – and ensuring that someone else cannot impersonate you.

Three and a half years ago, President Obama signed the National Strategy for Trusted Identities in Cyberspace (NSTIC). Targeted at the growing array of cybersecurity problems caused by passwords and other weak identity solutions, NSTIC called for the private sector to partner with government on the creation of an Identity Ecosystem – essentially a marketplace of stronger identity solutions that Americans could use in lieu of passwords to not only better protect their privacy and security online, but also to engage in new types of trusted transactions.

Identity is the great enabler here – if we have easy-to-use identity solutions that enable secure and privacy-enhancing transactions, we can enable citizens to engage with government in more meaningful ways. With a vibrant Identity Ecosystem – where citizens can use the same credential to access services at multiple sites – we can enable a wide array of new citizen-facing digital services while reducing costs and hassles for individuals and government agencies alike.

In the three and a half years since the NSTIC was first signed, the market has responded. Many private firms have started offering multi-factor authentication (MFA) to their customers, ensuring that the most commonly executed, password-centric attacks are no longer viable. And, through more than a dozen NSTIC pilots, the private sector has demonstrated material progress in advancing more secure, privacy-enhancing, easy-to-use identity solutions. It’s time for the government to make sure our own services are embracing the best the market now has to offer.

Last week’s Executive Order calls on three parts of the White House – the Office of Management and Budget, the Office of Science and Technology Policy, and the National Security Council – to craft a plan over the next 90 days detailing how agencies will comply with the Order. We at the NSTIC National Program Office (NPO) look forward to supporting the White House however we can as they move forward.

Posted in Uncategorized | 2 Comments

Investor-focused NSTIC Pilot Demonstrates Identity Management is no Longer Just a Cost Center

Websites often struggle with the trade-offs between increased security and user convenience. Many of the NSTIC pilots are confronting this challenge head-on, piloting solutions that demonstrate enhanced security and privacy is not at odds with convenience.

ID/Dataweb, through its NSTIC Pilot with Broadridge Financial Solutions, is enabling just this type of solution. A subsidiary of Criterion Systems, ID/Dataweb is allowing customers the convenience of “bring your own identity” without sacrificing security and privacy.

Broadridge is a leading provider of investor communications – if you own a stock or mutual fund, odds are that the mail your brokerage sends you is sent through a service run by Broadridge. Given all the Americans who have brokerage accounts, that’s a lot of paper, and it costs a lot of money – about $3 billion each year. Digital delivery could save dollars and trees; however, because brokerage services are regulated, digital delivery is difficult without a robust identity solution that can bind email addresses to real identities.

ID/Dataweb, as part of its NSTIC pilot, has successfully deployed an Attribute Exchange Network (AXN) that brings together multiple identity providers such as Google, Verizon, Symantec, AOL, Facebook, LinkedIn, Amazon, and attribute providers including LexisNexis, Experian, Equifax, and PacificEast. The AXN platform enables a user-centric experience, allowing users to choose from multiple identity providers while permitting them to manage their attributes both during the authentication flow and via a user managed console.

Using ID Dataweb’s (IDW) AXN, Broadridge customers are now able to access digital content delivered via their Kindle or other mobile device, without having to create a new account or get a new credential. Furthermore, this provides Broadridge with the ability to verify the identity of the customer before granting access to sensitive documents, such as investment account financial statements and phone bills. Going forward, the pilot operations are transitioning to Inlet, a new joint venture launched by Broadridge and Pitney Bowes to accelerate the delivery of digital content in financial services. The ID/Dataweb solution provides the crucial identity layer necessary to enable these services to be delivered online.

ID/Dataweb is not working only with Broadridge in the financial sector, but across several sectors. One example is a partnership with DHS, enabling first responder access to an online incident response platform (the Next-Generation Incident Command System). In another area, ID/Dataweb is piloting the AXN with a Fortune 100 company to test enterprise, partner, and consumer access using third party credentials and verified attributes to support real time access decisions.

By shifting digital efforts to consumer-focused approaches, ID/Dataweb is demonstrating how NSTIC-aligned identity systems are creating value for consumers and companies alike.

Posted in Uncategorized | Tagged , | Leave a comment

REMINDER: 10th IDESG Plenary Meeting in Tampa, September 17-19

The 10th meeting of the Identity Ecosystem Steering Group (IDESG) is quickly approaching. This no-cost event will take place September 17-19 in Tampa, Florida; you can attend in-person or virtually!

The IDESG is coming off of a momentous summer, with the organization making a number of significant advancements toward enabling all Americans to more easily start using secure, convenient, privacy-enhancing credentials in lieu of passwords everywhere they go online.  This summer saw the IDESG:

  • Launch a formal Framework Development Plan – laying out steps that the organization will take to create an Identity Ecosystem Framework over a handful of iterations.
  • Launch a new strategic planning effort, focused on growing and maturing the organization.
  • Receive a $1.6 million cooperative agreement from NIST, enabling IDESG to fund technical resources and subject matter experts that will help the organization’s committees accelerate the pace of deliverables.

With a renewed focus on accelerating the Framework, this plenary meeting will be heavily focused on socializing the proposed Framework Development Plan and deciding on a plan of action across the organization’s committee structure to achieve it.

The IDESG board will present a plan on Wednesday detailing how to bring Framework components together in a phased implementation over the next 18 months. The Board presentation will be followed by a full group discussion and opportunity to provide feedback and influence the development process.

Additional agenda highlights:

New NSTIC Pilots to be Announced

The NSTIC National Program Office expects to announce the winners of the latest NSTIC pilots competition.

Pilot Presentations

NSTIC’s 11 pilots are seeding the marketplace with solutions for privacy-enhancing, secure, interoperable, and convenient online identity. Six of these pilots will present updates on their pilots at the plenary:

  • Daon
  • ID/Dataweb
  • American Association of Motor Vehicle Administrators
  • Internet2
  • Michigan Department of Human Services
  • Commonwealth of Pennsylvania

Functional Model

The Security Committee led development of a Functional Model to provide consistency upon which to center descriptions of identity solutions. It is a representation of online identity interactions and the various components needed to execute those interactions. In Tampa, the plenary will consider this model for formal approval.

Strategic Plan

The IDESG Board has been busy drafting the organization’s first formal strategic plan, which is due to be finalized by September 20th. The plan will be shared with participants in Tampa, and attendees will have a chance to provide feedback to shape the direction of the document and the IDESG itself.

Note that this IDESG event is collocated with the Global Identity Summit (GIS) at the Tampa Convention Center.  While the IDESG kicks off on Wednesday, the GIS begins Tuesday – and the Summit organizers have graciously offered to waive the registration fee (normally $595 or more) for IDESG attendees on Tuesday the 16th.  The NSTIC National Program Office will have two sessions on Tuesday:

  • At 10:40 am, NSTIC Deputy Michael Garcia will discuss “The Economics of Online Identity” and NIST’s Senior Standards and Technology Advisor Paul Grassi will discuss “New Directions in Identity”.
  • At 3:50 pm, NSTIC Identity Strategist Phil Lam will lead a session on “NSTIC Pilots in the Wild”.

In addition, NSTIC NPO head Jeremy Grant will deliver a keynote address to the Global Identity Summit at 8:30 am on Wednesday, September 17 – immediately before the 10 am kickoff of the IDESG.

We hope to see you in Tampa next week. View the IDESG plenary agenda and register to attend here!


Posted in Uncategorized | 1 Comment

Competing on Privacy in the Tower of Babel

In recent months, there’s been much talk about the idea of companies competing on privacy. In theory, this sounds great. Consumers can make choices based on their privacy preferences, and the marketplace will respond. In practice, there are some significant challenges. The NSTIC pilots are learning about these challenges first hand.

The NSTIC calls for the Identity Ecosystem to be privacy-enhancing and voluntary and provides some high-level considerations around these concepts. The pilots are expected to develop identity solutions that adhere to these concepts. But how do they move from high-level considerations to actual implementation? Moreover, how do they achieve an implementation that demonstrates effective privacy protections in consistent and repeatable ways?

In cybersecurity, for example, there are tools such as risk models, control catalogs and technical standards that provide consistent and repeatable results. If an NSTIC pilot wants to securely transmit an attribute, its engineers don’t sit down at their computers and start coding from scratch. There are existing protocols they can select that have been widely evaluated and that demonstrate effective attribute transmission. But what if a pilot wants to collect user consent for the transmission of that attribute? What standard exists for user consent?

The privacy field lags behind other fields such as cybersecurity and safety risk management in providing the types of models and tools that support measurable and consistent outcomes. It is much more difficult for consumers to make informed choices if organizations are marketing their privacy practices with different or, even worse, no measures of effectiveness.

To address this gap, NIST has launched a new privacy engineering effort that focuses on providing design guidance to information system users, owners, developers and designers that handle personal information. Such guidance can be used to decrease risks related to privacy harms and to make purposeful decisions about resource allocation and effective implementation of controls. In April, NIST held the first of a series of workshops. Based on this first workshop, NIST has proposed a set of privacy engineering objectives and a risk model to mitigate privacy harms to individuals. NIST is co-sponsoring a second workshop with the International Association of Privacy Professionals (IAPP) to discuss these proposals and inform the development of a NIST report on privacy engineering. This free workshop will be held in San Jose, California, on September 15-16, 2014.

In the story of the Tower of Babel, God was concerned that a people who spoke one language could take over the world. He prevented this by causing people to speak many languages. I’m no theologian, so I won’t theorize on the merits of God’s actions, but the story does illustrate the power of unity. In privacy, we need to begin speaking with a consistent terminology and using models and tools that provide us with the capability to better measure the effectiveness of privacy design in information systems.

There are many good privacy efforts underway today – but the way to make them   BETTER and enable true competition is for experts in various disciplines to collaborate on identifying and adapting measurement capabilities that have worked in other areas. We encourage system designers, engineers and privacy subject matter experts to participate in the next NIST privacy engineering workshop or provide feedback to NIST at Together, we can develop the foundational components that will enable the Identity Ecosystem Steering Group to achieve the full vision of the NSTIC Identity Ecosystem; one that is secure and privacy-enhancing.

Posted in Uncategorized | 1 Comment