Introducing a new way to navigate by topics. Access the latest news, data, publications and more around topics of interest.
Our population statistics cover age, sex, race, Hispanic origin, migration, ancestry, language use, veterans, as well as population estimates and projections.
This section provides information on a range of educational topics, from educational attainment and school enrollment to school districts, costs and financing.
We measure the state of the nations workforce, including employment and unemployment levels, weeks and hours worked, occupations, and commuting.
Our statistics highlight trends in household and family composition, describe characteristics of the residents of housing units, and show how they are related.
Health statistics on insurance coverage, disability, fertility and other health issues are increasingly important in measuring the nation's overall well-being.
We measure the housing and construction industry, track homeownership rates, and produce statistics on the physical and financial characteristics of our homes.
The U.S. Census Bureau is the official source for U.S. export and import statistics and regulations governing the reporting of exports from the U.S.
The U.S. Census Bureau provides data for the Federal, state and local governments as well as voting, redistricting, apportionment and congressional affairs.
Search an alphabetical index of keywords and phrases to access Census Bureau statistics, publications, products, services, data, and data tools.
Geography provides the framework for Census Bureau survey design, sample selection, data collection, tabulation, and dissemination.
Geography is central to the work of the Bureau, providing the framework for survey design, sample selection, data collection, tabulation, and dissemination.
Find resources on how to use geographic data and products with statistical data, educational blog postings, and presentations.
The Geographic Support System Initiative will integrate improved address coverage, spatial feature updates, and enhanced quality assessment and measurement.
Work with interactive mapping tools from across the Census Bureau.
Find geographic data and products such as Shapefiles, KMLs, TIGERweb, boundary files, geographic relationship files, and reference and thematic maps.
Metropolitan and micropolitan areas are geographic entities used by Federal statistical agencies in collecting, tabulating, and publishing Federal statistics.
Find information about specific partnership programs and learn more about our partnerships with other organizations.
Definitions of geographic terms, why geographic areas are defined, and how the Census Bureau defines geographic areas.
We conduct research on geographic topics such as how to define geographic areas and how geography changes over time.
Visit our library of Census Bureau multimedia files. Collection formats include audio, video, mobile apps, images, and publications.
Official audio files from the Census Bureau, including "Profile America," a daily series of bite-sized statistics, placing current data in a historical context.
Infographics include information on the Census Bureau's history of data collection, our nation's veterans and the American Community Survey.
Read briefs and reports from Census Bureau experts.
Watch Census Bureau vignettes, testimonials, and video files.
Read research analyses from Census Bureau experts.
Access data through products and tools including data visualizations, mobile apps, interactive web apps and other software.
Developer portal to access services and documentation for the Census Bureau's APIs.
Explore Census Bureau data on your mobile device with interactive tools.
Find a multitude of DVDs, CDs and publications in print by topic.
These external sites provide more data.
Download extraction tools to help you get the in-depth data you need.
Learn more about our data from this collection of e-tutorials, presentations, webinars and other training materials. Sign up for training sessions.
Explore Census data with interactive visualizations covering a broad range of topics.
Learn how we serve the public as the most reliable source of data about the nation's people and economy.
Information about the U.S. Census Bureau.
Information about what we do at the U.S. Census Bureau.
Our researchers explore innovative ways to conduct surveys, increase respondent participation, reduce costs, and improve accuracy.
Our surveys provide periodic and comprehensive statistics about the nation, critical for government programs, policies, and decisionmaking.
Learn about other opportunities to collaborate with us.
Explore the rich historical background of an organization with roots almost as old as the nation.
Explore prospective positions available at the U.S. Census Bureau.
Information about the current field vacancies available at the U.S. Census Bureau Regional Offices.
Discover the latest in Census Bureau data releases, reports, and events.
The Census Bureau's Director writes on how we measure America's people, places and economy.
Find interesting and quirky statistics regarding national celebrations and major events.
Profile America is a daily, 60-second feature that uses interesting vignettes for that day to highlight information collected by the Census Bureau.
Find media toolkits, advisories, and all the latest Census news.
See what's coming up in releases and reports.
The statements on this page apply to our Online Services (Electronic Reporting and Online Requests) only; not to sending e-mail. Go to our contact us page for further explanation about sending e-mail.
The information that is sent between your computer and our server is encrypted. We are using Hardware: IBM compatible PC, Operating System: Windows XP, Vista, or Windows 7, Disk Space: at least 30 megabytes free disk space, Disk Drive: high density CD-ROM drive, 256 Megabytes installed RAM, 733 MHz or faster CPU, 32-bit CD-ROM driver.
Information going from one computer to another passes through numerous other computers before it reaches its destination. This information is not normally monitored, but someone can intercept and eavesdrop on your private conversations or credit card exchanges. Worse still, eavesdroppers might replace your information with their own and send it back on its way. Because of the architecture of the Internet and Intranets, there will always be ways for unscrupulous people to intercept and replace data in transit.
Fortunately there are ways to safeguard privacy over the Internet. You encrypt, or disguise, your information before you send it over the Internet. That way, if someone intercepts it, the data is meaningless. And, if the intercepted data is changed, the intended recipient will know it was altered.
We use the Secure Sockets Layer (SSL) protocol to safeguard against the threats listed previously.
Confidentiality is ensured through encryption, the process of disguising information so that it can't be deciphered (or decrypted) by anyone but the intended recipient. If the information is intercepted, it will be unreadable by a third party. The only information that can be discovered is that the two parties are communicating. Integrity is also ensured through encryption. If someone attempts to alter an encrypted message, it will not decrypt correctly, alerting the recipient to the fact that someone has tampered with the message.
Encryption is the process of transforming information so it can't be decrypted or read by anyone but the intended recipient. This disguised information is called ciphertext. It is the ciphertext that you send across the Internet. For example, suppose you have a financial report stored at your web site. If SSL is enabled on your web server, your server encrypts the report and sends the ciphertext to a client, who turns the ciphertext back into the financial report.
Decryption reverses the process, turning the ciphertext back into the original message. Only the recipient can decrypt the text because only the recipient has a key. Only someone with the correct key can "unlock" a message.
Public-key encryption takes longer than symmetric encryption. However, client-server communication with SSL uses both types of encryption together to maximize their strengths. Here's how these processes are leveraged: A client and server exchange public keys (public-key encryption), and then the client generates a symmetric encryption key that is used only for a single transaction (symmetric encryption). This key is called a session key. The client encrypts the session key with the server's public key and sends it to the server. When the server receives the session key, it uses its private key to decrypt it. For the rest of that transaction, the client and the server can use the quicker symmetric encryption.
During an SSL connection, the client and the server agree to use the strongest cipher with which they both can communicate.
Technically, it's not impossible to "crack" ciphertext and determine the content of the original message--it just takes a lot of time and money. For example, it would take a single Pentium-based computer more than a billion years to crack the 128-bit encryption.
Of course, you could use several computers in conjunction. For example, if you dedicated ten computers to cracking that same encryption, it would take you one-tenth the time. Even then, only the single message in question would be deciphered because SSL generates a new encryption key for every exchange. However, it is conceivable that someone could use 100 dedicated computers working together to crack it more quickly. Of course, the cost of making such powerful machines unavailable for other tasks for that amount of time would be very high indeed--probably millions of dollars.
The precise level of security a key offers is measured by the size of certain numbers used in creating the key. These numbers are measured in bits. The greater the number of bits, the more secure the key. The key used in the previous example is a 128-bit key, which is so strong that the United States government doesn't allow products containing it to be exported. International versions of Netscape products are limited to 40-bit encryption keys. This is still strong enough to stop most hackers.