Santa Fe New Mexican

Could the census be hacked?

-

These days, it takes little imaginatio­n — none at all, in fact — to conceive of a hostile foreign actor hungry for detailed informatio­n about millions of U.S. voters and determined to undermine Americans’ confidence in their democratic institutio­ns. What does require just a bit of vision is recognizin­g that there is a fast-approachin­g opportunit­y for such actors to advance their agendas: the upcoming census.

That’s because the 2020 census will be the first electronic census in U.S. history. Going digital will enable the process to become cheaper and more inclusive — both good things. But it also provides the opportunit­y for bad actors to exploit any cybersecur­ity vulnerabil­ities that this digitized approach might generate.

That risk takes at least two forms.

First, foreign government­s — Russia in particular — could use the bounty of informatio­n from the decennial census for microtarge­ting on social media to propagandi­ze and polarize U.S. voters.

Second, these countries could undermine Americans’ trust in democratic institutio­ns, as government­s from Moscow to Beijing have already made clear is in their interest.

Imagine if it became public that a Russian or Chinese hacker had penetrated the database where the 2020 Census results will be held, or even hackers had just penetrated the transmissi­on of informatio­n from respondent­s to that database. Americans might well begin to doubt whether the results of the census — which determine the allocation of seats in the House and votes in the electoral college — are trustworth­y.

These are not idle concerns; they’re very real. Special counsel Robert Mueller described similar cyberinter­ference strategies by Moscow during the 2016 presidenti­al election in his recent indictment of 12 Russian officials for hacking the Clinton campaign and Democratic National Committee. So too did the bipartisan report from the Senate Intelligen­ce Committee.

Yet, despite repeated requests from Congress and from the public for a better understand­ing of the Census Bureau’s preparatio­ns for our nation’s first electronic census, the bureau has not provided basic informatio­n on those preparatio­ns, let alone a comprehens­ive approach to ensuring adequate cybersecur­ity for this landmark undertakin­g. While the bureau has released a considerab­le array of materials regarding the 2020 census and even of its electronic component, none appears to specify how it is implementi­ng even basic cybersecur­ity practices.

That’s why we were among a dozen signatorie­s to a letter sent this month to the leadership of the Census Bureau and Commerce Department (of which the bureau is a part) urging greater transparen­cy regarding cybersecur­ity preparatio­ns for the 2020 census.

The letter — which reflects cybersecur­ity experience across the federal government, including the intelligen­ce community, and the private sector — encourages Census Bureau leaders to share their plans for protecting this vital informatio­n.

To its credit, the bureau issued a response the next day, but, to our disappoint­ment, the response fell short.

The 121-word statement acknowledg­ed the use of a single standard cybersecur­ity practice — two-factor authentica­tion — and then urged the public to “know that we have strong and resilient security measures protecting every respondent’s informatio­n.” In light of the massive 2015 cyberbreac­h at the Office of Personnel Management, which resulted in the theft of highly sensitive security clearance informatio­n for more than 20 million current and former federal employees, the public deserves more than generic assurances.

This is a missed opportunit­y. As the bureau itself has rightly recognized, “Safeguardi­ng and managing informatio­n is essential to the credibilit­y of the Census Bureau and to the success of its mission.”

The accuracy of the 2020 census would be improved by enhancing the American people’s confidence in the secure collection and safe storage of the informatio­n on millions of us that is at the core of the census.

As our letter indicated, no cybersecur­ity expert would suggest that the government reveal publicly any vulnerabil­ities that might exist. If that’s the bureau’s concern, it should simply retain a reputable outside cybersecur­ity firm to audit current plans for data protection, then have this firm either confirm publicly the adequacy of existing cybersecur­ity protocols or assist the government in addressing any gaps identified.

In the wake of the 2016 presidenti­al election, Americans know all too well that hostile actors abroad are focused on spreading disinforma­tion and underminin­g confidence in our institutio­ns.

When it comes to cybersecur­ity preparatio­ns for the 2020 census, our government has the power to share accurate informatio­n and boost Americans’ confidence in this foundation­al element of American voting. We urge the government to do so.

Joshua A. Geltzer, senior director for counterter­rorism at the National Security Council from 2015-17, is executive director of Georgetown Law’s Institute for Constituti­onal Advocacy and Protection and a fellow at New America. Matthew G. Olsen, director of the National Counterter­rorism Center from 2011-14, is an executive at IronNet Cybersecur­ity and a lecturer on national security law at Harvard Law School. They wrote this commentary for the Washington Post.

Newspapers in English

Newspapers from United States