Strengthen America Strengthen America A 21st-Century Compact

§ Legislative Act Digital Access

Digital Identity Modernization and Citizen Data Sovereignty

Current Status

Existing Law: E-Government Act of 2002 (44 U.S.C. � 3501 et seq.)��. REAL ID Act of 2005 (49 U.S.C. � 30301 note)��. Paperwork Reduction Act (44 U.S.C. � 3501-3521)�5. Privacy Act of 1974 (5 U.S.C. � 552a)�4.

Current Authority: GSA operates Login.gov under FedRAMP authorization�7. OMB sets identity policy via M-19-17�6. Individual agencies maintain separate identity verification contracts with commercial vendors (ID.me, LexisNexis, Experian).

Existing Limitations: No unified federal identity standard. Agencies prohibited from sharing verification status across programs. Login.gov lacks statutory authority for cross-agency credential acceptance. No legal framework for citizen-controlled data portability. Privacy Act predates modern federated identity architecture.

Problem

Specific Harm: $140 billion in authorized federal benefits go unclaimed annually due to identity verification friction and administrative burden�. Federal government spends $210M annually on fragmented commercial identity vendors versus $32.5M on Login.gov�a 6.5:1 cost disparity�. Average citizen completes 23 separate identity verifications with federal agencies over lifetime. Identity fraud costs federal programs $87B annually�.

Who is Affected: 45 million Americans eligible for SNAP, Medicaid, EITC, or housing assistance who fail to complete enrollment due to documentation requirements. 22 million veterans navigating separate VA, DoD, and SSA identity systems. 100 million Login.gov users locked into single-agency credentials�.

Gaps in Current Law: No statutory basis for federated identity acceptance across agencies. No citizen right to data portability between government systems. No prohibition on agencies requiring re-verification of already-verified attributes. No standards for private sector identity provider integration with federal systems.

Accountability Failures: When identity verification fails or data is breached, citizens have no independent appeals body�complaints route back to the same agency or vendor that caused the problem. No mandatory breach disclosure timeline. No independent audit requirement for algorithmic identity matching systems.

Proposed Reform

Primary Policy Change: Establish Login.gov as the Federal Identity Trust Framework with mandatory cross-agency credential acceptance, voluntary citizen data vaults with constitutional data sovereignty protections, and federated architecture (Estonia/Singapore model) explicitly rejecting centralized databases45.

New Requirements:

(1) All federal agencies must accept Login.gov credentials as sufficient identity verification for any transaction requiring identity assurance level 2 (IAL2) or below under NIST SP 800-63-36.

(2) Agencies must query the Federal Data Bridge API prior to requesting documentation from citizens�where verified data exists in federal systems or citizen vaults with valid consent, agencies shall accept such data without requiring citizen resubmission.

(3) Private sector identity providers may achieve federal certification under open standards including open standards compliance, annual third-party security audits, acceptance of GAO binding orders (after agency exhaustion), and 72-hour breach notification.

(4) Citizen data vaults enable one-time submission with granular consent controls, 24-hour access notification, machine-readable export, and 30-day verified deletion upon request.

(5) GAO Information Access Docket for appeals and breach response.

(6) GAO security audits no less than biennially, published publicly within 90 days, with schedules published 2 years in advance.

(7) Identity verification services at no fewer than 15,000 USPS locations with telephone alternatives, 15+ language support, WCAG 2.1 AA accessibility, and alternatives for unbanked individuals.

(8) Framework Director serves 7-year term, removable only for cause, with non-binding mid-term performance review by GAO.

(9) Any automated system used in identity verification, fraud detection, or benefit eligibility determination shall undergo independent algorithmic audit prior to deployment and biennially thereafter, provide human review upon citizen request for any automated denial, and maintain 7-year audit logs sufficient to explain individual decisions.

(10) Bias testing results showing greater than 20% variance across protected classes in verification denial rates trigger mandatory GAO review (legitimate security factors supported by documented analysis are permissible).

New Prohibitions:

(1) Central biometric database prohibited�zero-knowledge architecture required for all biometric verification7.

(2) Agencies may not deny services based on refusal to use digital identity (in-person alternatives mandatory).

(3) Sale, licensing, or commercial use of vault data prohibited.

(4) Vendor lock-in through proprietary standards prohibited�use of proprietary protocols that prevent interoperability with certified identity providers prohibited.

(5) Retention of verification transaction data beyond 90 days prohibited except as required for fraud investigation.

Enforcement: GAO biannual compliance audits with public reporting. Agency heads personally certify annual compliance. Agencies failing to meet adoption milestones shall have 2% of IT appropriations withheld until compliance is achieved. GAO binding orders (after agency exhaustion) for private vendors, recommendations for agencies with 99%+ compliance8. Statutory damages tiered by harm: $500 for technical violations, $1,000-$5,000 for violations causing documented harm, $10,000-$25,000 for willful violations (actual harm required above $1,000 threshold). Private right of action requires GAO exhaustion AND defendant non-compliance with order. Class actions capped at $50M maximum recovery. Statute of limitations 4 years from discovery OR 7 years absolute cutoff. Federal employees knowingly accessing vault data without valid consent subject to termination and $10,000 civil penalty per incident. Private contractors violating data use restrictions debarred for 5 years and subject to $50,000 civil penalty per incident. Pattern violations (3+ adjudicated violations or settlements with factual admissions within 24 months, including affiliates) subject to enhanced penalties of 0.5% annual revenue or $1M minimum plus 36-month mandatory compliance monitoring. Breaches affecting 10,000+ citizens require 5 years of credit monitoring and identity protection services funded by breaching entity. Breach notification to GAO within 72 hours and to affected citizens within 7 days.

Definitions:

"Citizen Data Vault": An encrypted, citizen-controlled repository of verified federal records and identity attributes, accessible only through cryptographically-secured consent mechanisms, operated under federated architecture with no central government access independent of citizen authorization.

"Federal Data Bridge API": A standardized application programming interface using RESTful architecture with OAuth 2.0 authentication enabling authorized queries of verified citizen attributes across federal systems, returning only specific requested attributes rather than complete records.

"Federated Identity Architecture": A distributed system design in which identity verification and attribute storage occur across multiple independent nodes with no single point of failure or central database, as implemented in Estonia's X-Road system4, contrasted with centralized architectures in which all data resides in a single repository.

"Identity Assurance Level": The degree of confidence in an identity verification as defined in NIST Special Publication 800-63-36, with IAL1 representing self-assertion, IAL2 representing remote or in-person proofing with evidence verification, and IAL3 representing in-person proofing with physical verification.

"GAO Information Access Docket": The specialized docket within the GAO with jurisdiction over digital identity disputes, public access complaints, and data sovereignty matters.

"Pattern Violation": Three or more adjudicated violations, OR settlements with factual admissions, within any 24-month period, including violations by subsidiaries, affiliates, or entities under common control.

"Protected Classes": Race, color, religion, sex (including pregnancy, sexual orientation, and gender identity), national origin, age (40 or older), disability, and genetic information, as defined in Title VII of the Civil Rights Act and related statutes.

"Zero-Knowledge Proof": A cryptographic method by which one party can verify an attribute (e.g., age over 21, income below threshold) without transmitting the underlying data, enabling verification without disclosure7.

What Changes

Before: Citizens verify identity separately with each federal agency. 23 lifetime verifications average. No data portability. $210M spent on fragmented vendors�. $140B benefits unclaimed due to friction�. Identity disputes resolved by same agency that made the error. No independent oversight of algorithmic systems. UK-style centralized failure risk?.

After: Single federated credential accepted across all agencies. Estonia-model distributed architecture (no central database)4. Citizen-controlled data vaults with granular consent. Mandatory once-only principle eliminates re-verification. In-person alternatives at 15,000 USPS locations. GAO Information Access Docket with binding orders (after agency exhaustion) against private vendors and recommendations to agencies (99%+ compliance expected)8. Algorithmic systems subject to bias audits with 20% variance trigger. Constitutional prohibition on biometric databases and mandatory enrollment����. Private right of action after GAO exhaustion if defendant ignores order.

ROI

Costs:

Item 10-Year
Platform + vault + ops $3.05B
Contingency (35%) $1.07B
Total $4.12B

Savings:

Item Gross Capture Net
Vendor consolidation $1.35B 70% $945M
Fraud reduction $8.7B 50% $4.35B
IT deduplication $450M 75% $338M
Total $5.63B

Societal Benefits:

Benefit Annual NPV (3%) NPV (7%)
Time savings $2.1B $17.9B $14.7B
Identity theft $1.75B $14.9B $12.3B
Benefit uptake $8.4B $71.7B $59.0B
Total $12.25B $104.5B $86.0B

Summary:

Category 10-Year Notes
Federal Net +$1.51B 1.4:1 ROI
Societal Benefits $104.5B NPV (3%) Medium confidence
Total Impact $106B+ Identity fraud assigned here

References

  1. GAO-24-106234, "Federal Identity Fraud and Improper Payments" (2024) (benefits unclaimed due to verification friction)
  2. GSA Office of Inspector General, "Identity Verification Contract Analysis" (2023) ($210M vendor spending vs. $32.5M Login.gov)
  3. GAO-24-106234, "Federal Identity Fraud and Improper Payments" (2024) ($87B annual identity fraud)
  4. Estonia X-Road System (2001-present)�99% adoption, 1,345 working years saved annually, <$5/user, decentralized architecture
  5. Singapore Singpass (2020-present)�97% adoption, $36 savings per account, user-controlled consent
  6. NIST Special Publication 800-63-3, Digital Identity Guidelines (Identity Assurance Levels)
  7. Cryptographic zero-knowledge proof architecture standards
  8. Court of Federal Claims bid protest 99.7% Compliance Model
  9. UK Government Digital Service One Login (2024)�11% adoption, $64/user, lost ISO 27001 certification, centralized architecture failure
  10. Whalen v. Roe, 429 U.S. 589 (1977) (constitutional right to information privacy)
  11. NASA v. Nelson, 562 U.S. 134 (2011) (government information collection limits); Carpenter v. United States, 585 U.S. ___ (2018) (digital privacy expectations)
  12. E-Government Act of 2002, 44 U.S.C. � 3501 et seq.
  13. REAL ID Act of 2005, 49 U.S.C. � 30301 note
  14. Privacy Act of 1974, 5 U.S.C. � 552a
  15. Paperwork Reduction Act, 44 U.S.C. � 3501-3521
  16. OMB Memorandum M-19-17 (2019)
  17. GAO-23-105867, "Login.gov Capability Assessment" (2023)
  18. India Aadhaar (2010-present)�1.2B enrolled, $10-11B annual savings, $2?$0.27 verification cost

Change Log

[GAO Consolidation]: Replaced standalone "Office of the Digital Identity Ombudsman (ODIO)" with GAO Information Access Docket. Digital identity disputes now adjudicated by consolidated GAO oversight body serving multiple K_Public_Benefit programs (also handles research access, court records access). Reduces administrative overhead, eliminates duplicative infrastructure, maintains independence through GAO placement.

[Framework Standards Embedded]: Private right of action: Now requires GAO exhaustion AND defendant non-compliance with order (Section 3(e)). Statute of limitations: 4 years from discovery OR 7 years absolute cutoff (Section 3(f)). Pattern violation: 3+ adjudicated violations OR settlements with factual admissions within 24 months, including affiliates (Section 3(g), Section 4). Director term: 7 years, cause-only removal, mid-term review (Section 2(a)). Reporting: Real-time dashboards, biennial GAO audits minimum, schedules published 2 years advance (Sections 3(a), 3(b)). Algorithmic accountability: 20% variance triggers review not automatic violation, protected classes per Title VII (Section 3(b)). Statutory damages: Tiered by harm type, actual harm required above $1K, class action cap $50M (Section 3(e)).

[Binding Authority Clarified]: GAO issues binding orders (after agency exhaustion) against private entities (certified identity providers, contractors, vendors) and recommendations to federal agencies (GSA, SSA, IRS). 99.7% compliance rate expected per Court of Federal Claims bid protest model.

[Original Red Team Provisions Retained]: Federated architecture requirements, zero-knowledge biometric prohibition, once-only principle, private sector certification, in-person alternatives, breach notification timelines, appropriation withholding�all substantive provisions from original document preserved.

2025-12-07 - Legislative Language Removal: Merged unique provisions into Proposed Reform; deleted Legislative Language section.

2025-12-07 - Inline Citations: Added superscript citations; standardized References section.

2025-12-07 - Template Standardization: Broke long semicolon chains into separate sentences for readability. Added proper spacing between bullet points. Standardized ROI section to required table format. Removed extraneous section breaks.

  • 2025-12-11 - Zero New Bodies Architecture: Updated oversight entity references per Federal Oversight Consolidation Act. Replaced proposed GAO divisions with existing infrastructure (GAO teams, DOJ OIG). No new bureaucratic entities created.