recommended reading

Census Bureau meets deadline to build address file for 2010 Census

The Census Bureau has made progress on building an accurate database of addresses, but must resolve some remaining software issues and thoroughly test its systems before next years decennial count, according to the Government Accountability Office.

The Census Bureau is working to ensure its master address file, which is used to mail census forms to the nation's 140 million households, is complete and accurate, according to testimony filed by Robert Goldenkoff, director of strategic issues at GAO, with the House Subcommittee on Information Policy, Census and National Archives. But he acknowledged that despite the bureau's efforts, the recession and its impact on the housing market would make the task more difficult.

"On its face, it would appear that building an accurate address list would be a relatively straightforward task, given the obvious nature of many dwellings and the availability of postal addresses," Goldenkoff said. "Although these types of dwellings have always existed, the large number of foreclosures the nation has recently experienced, as well as the natural disasters that have hit the Gulf Coast and other regions, have likely increased the number of people doubling up, living in motels, tent cities, and other types of less conventional housing."

The address file and its digital mapping component called TIGER are considered crucial to the accuracy of the count. Shortly after the 2000 count, the bureau awarded Harris Corp. a $200 million contract to upgrade both the address file and TIGER. According to Goldenkoff, the bureau has made significant strides in updating the systems, but has not yet finalized a testing plan ahead of next year's count, jeopardizing the accuracy of the database.

"Given the importance of MAF/TIGER to establishing where to count U.S. residents, it is critical that the bureau ensure this system is thoroughly tested. Bureau officials have repeatedly stated that the limited amount of time remaining will make completing all testing activities challenging," he said in filed testimony.

Harris also was awarded a $595 million contract to develop handheld computers for census workers who go door to door to count households. In March 2008, the bureau announced it would use the handhelds only for address canvassing, which took place from March to July. About 135,000 Census employees used the devices to compare the addresses from the address file with what they saw on the ground.

According to the bureau, the exercises generally were completed ahead of schedule because of lower-than-expected employee turnover. The handheld computers experienced glitches during the first month of use, including problems with transmissions, freeze-ups and issues with the GPS function, but Goldenkoff said the bureau quickly fixed the problems using software patches.

According to the bureau's preliminary analysis, address canvassing field operations cost $444 million, 25 percent more than the initial budget of $356 million. The bureau attributed the additional cost to a greater-than-expected workload and additional staff needed to complete the exercise on time.

Threatwatch Alert

Network intrusion / Stolen credentials

85M User Accounts Compromised from Video-sharing Site Dailymotion

See threatwatch report

JOIN THE DISCUSSION

Close [ x ] More from Nextgov
 
 

Thank you for subscribing to newsletters from Nextgov.com.
We think these reports might interest you:

  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.

    Download
  • Featured Content from RSA Conference: Dissed by NIST

    Learn more about the latest draft of the U.S. National Institute of Standards and Technology guidance document on authentication and lifecycle management.

    Download
  • PIV- I And Multifactor Authentication: The Best Defense for Federal Government Contractors

    This white paper explores NIST SP 800-171 and why compliance is critical to federal government contractors, especially those that work with the Department of Defense, as well as how leveraging PIV-I credentialing with multifactor authentication can be used as a defense against cyberattacks

    Download
  • Toward A More Innovative Government

    This research study aims to understand how state and local leaders regard their agency’s innovation efforts and what they are doing to overcome the challenges they face in successfully implementing these efforts.

    Download
  • From Volume to Value: UK’s NHS Digital Provides U.S. Healthcare Agencies A Roadmap For Value-Based Payment Models

    The U.S. healthcare industry is rapidly moving away from traditional fee-for-service models and towards value-based purchasing that reimburses physicians for quality of care in place of frequency of care.

    Download
  • GBC Flash Poll: Is Your Agency Safe?

    Federal leaders weigh in on the state of information security

    Download

When you download a report, your information may be shared with the underwriters of that document.