I keep seeing the same refrain whenever the topic of an API comes up: “PII concerns,” “risk management,” or “contacting youth.” While security is obviously important, these answers miss the point.
Modern systems across industries—from banking to healthcare—expose APIs safely every day using hardened, audited, and highly secure architectures. The technology to protect sensitive data at “bank-level security” is not speculative—it’s routine. Today, with AI-driven monitoring, anomaly detection, and automated policy enforcement, making a system secure is easier than ever. There really isn’t an excuse anymore for saying APIs can’t be safely opened.
If the hesitation here is that an open API would automatically be insecure, that’s a red flag. It suggests the current architecture may be legacy or mainframe-based, relying on “security through obscurity” rather than true modern protections. If you think the old legacy and mainframe systems are secure, think again. For every student we have in America, China has that many honors students. There are countless highly skilled actors itching for opportunities to exploit weaknesses, and Scouting America is a prime target. To be clear, I have nothing against China—it’s simply where I found compelling data that highlights the scale and sophistication of global cyber threats.
If that’s the case, families’ data is already at risk. Sensitive information sitting in systems that can’t be safely integrated is far more concerning than an API that can be safely secured. And let’s be blunt—if these legacy systems are compromised, it won’t just be an internal problem. Don’t be surprised when it becomes the next big scandal for Scouting.
Another point that needs to be said: the dismissive attitude of moderators toward these requests is discouraging. Scouters who raise these questions aren’t being reckless; they’re trying to push for tools that could strengthen the program. Shutting down those conversations with a wave of the hand doesn’t just stifle innovation—it hurts the community. People leave those exchanges feeling dismissed instead of heard. That weakens trust and engagement at a time when Scouting America needs both.
Even the so-called “new” systems currently being rolled out show us that we are still a long way from having a strong, modern digital platform. That doesn’t mean progress is impossible—quite the opposite. But it does mean that real modernization, including secure APIs, is not optional if Scouting America wants to meet families’ expectations in the 21st century.
With the increasing complexity of daily life—and with the chaos our government has thrown us into—we need tools that make Scouting simpler, not harder. A properly designed API could help families automatically sync calendars, track rank advancement in real time, integrate medical or consent forms securely, streamline communication between leaders and parents, and enable councils to see accurate participation data instantly. These aren’t “nice to haves”; they are basic capabilities expected in modern organizations.
Scouting America needs to ask itself: does it want to keep operating like it’s 1999, or does it want to remain relevant in a modern digital environment where secure integration is expected? APIs aren’t just a convenience—they’re the standard for secure, auditable, and efficient data exchange.
If we want tools that help families, leaders, and councils succeed, the organization needs to open its APIs and do so with the same rigor and seriousness that financial institutions apply. Anything less is kicking the can down the road while putting trust in outdated systems.
I made an account here specifically to post this because I believe the issue is that important. I’ve tried to write this as objectively as possible without regard to emotion—because the issues here aren’t about personal preference, they’re about fundamental technology realities that can’t be ignored. I also say this from experience: before my academic and government work, I spent years in customer-facing roles at Best Buy and Geek Squad, which gave me a deep appreciation for user needs and perspectives. Academically, I hold both my B.S. in Computer Science and my Ph.D. (ABD) in Cyberspace Engineering from Louisiana Tech University. Professionally, I’ve worked with the government and currently serve as an Adversarial Cloud Developer with Cloud Range. My perspective comes directly from designing, testing, and securing systems in some of the most demanding environments, while never losing sight of what end-users actually need. The patterns I see in Scouting America’s approach are the same ones that put critical organizations at risk when they resist modernization.
Finally, since moderator tone and approach directly impact whether people feel heard, what is the official procedure for requesting a new moderator when the current ones are not constructively engaging with the community?
I also want to acknowledge that AI assisted me in structuring this post. I agree with everything written here, and I have personally vetted the following sources that support the claims I’ve made.
Best,
Christopher M. Smith
Cubmaster, Pack 1703
Houston, TX
Sources
-
Legacy and Mainframe Risks
-
Financial Times – “Legacy IT systems: the hidden threat to financial stability” (ft.com)
-
The Financial Brand – “Banking Legacy Systems are Under Siege” (thefinancialbrand.com)
-
Quinnox – “Legacy Mainframe Modernization” (quinnox.com)
-
Info-Tech Research Group – “Legacy Systems in Financial Services” (infotech.com)
-
AI-Driven Security & Modernization
-
TechRadar – “Generative AI: A Game Changer for Mainframe Modernization” (techradar.com)
-
TechRadar – “Harnessing AI’s Potential on the Mainframe” (techradar.com)
-
Adaptigent – “Mainframe Automation in 2025” (adaptigent.com)
-
StackSync – “The Hidden Risk: How Unmodernized Legacy Systems Threaten AI Security” (stacksync.com)
-
APIs & Security Consolidation
- TechRadar – “Security Tool Bloat is the New Breach Vector” (techradar.com)
-
China’s Cyber Threat Landscape
-
Cyber Magazine – “China’s Cyber Espionage Surges 150%” (cybermagazine.com)
-
Wikipedia – “Chinese Espionage in the United States” (en.wikipedia.org)
-
Wired – “How China’s Hackers Became Elite Cyber Spies” (wired.com)