U.S. GAO: Figure 1: Examples of How Personal Information Is Obtained and Used to Commit Identity Theft
U.S. GAO: Figure 1: Number of Reported Hacking and Information Technology Breaches Affecting Health Care Records of 500 Individuals or More
U.S. GAO: Figure 1: Examples of Data from Data Service Providers
U.S. GAO: Figure 2: Example of a Successful Identity Theft Refund Fraud Attempt
U.S. GAO: Figure 4: Most Serious and Most Frequently Identified Cyber Attack Methods, as Reported by 18 Agencies with High-Impact Systems
U.S. GAO: Figure 1: Face Recognition Enrollment and Matching Process
U.S. GAO: Figure 2: Description of the FBI's Face Recognition System Request and Response Process for State and Local Law Enforcement
U.S. GAO: Figure 3: Key Dates in the Implementation of the FBI’s Face Recognition Capabilities and Associated Privacy Impact Assessments
U.S. GAO: Figure 4: Information Available for FBI Facial Analysis, Comparison, and Evaluation (FACE) Services' Photo Searches, by State
U.S. GAO: Figure 3: Proposed Service-Based Experiments for the Internet Protocol (IP)Transition, as of October 2015
U.S. GAO: Figure 1: Detailed Listing of 57 Data Elements to be Established under the DATA Act (as of July 2015)
U.S. GAO: Figure 2: Recovery Operations Center Assets
U.S. GAO: Figure 2: Testing Methods Used by States to Administer Commercial Driver's License Skills Tests (2015)
U.S. GAO: Figure 1: Typical Process to Receive a Commercial Driver's License (CDL), as of July 8, 2015
U.S. GAO: Figure 2: Selected Sources of Cyber Threat Information, Based on GAO Interviews
U.S. GAO: Figure 2: Types of Threats Included in the Department of Defense's Insider-Threat Program
U.S. GAO: Figure 3: GAO's Framework of Key Elements To Incorporate at Each Phase of DOD's Insider-Threat Programs
U.S. GAO: Figure 2: Information Security Incidents by Category, Fiscal Year 2014
U.S. GAO: Figure 1: National Airspace System's Transition to an IP Network
U.S. GAO: Figure 2: NextGen Foundational Programs
U.S. GAO: Figure 4: Aircraft Diagram Showing Internet Protocol Connectivity Inside and Outside of Aircraft
U.S. GAO: Figure 1: Detecting IDT After Refunds are Issued: Two Examples
U.S. GAO: Figure 2: Illustration of IRS Identity Theft Taxonomy
U.S. GAO: Figure 4: How Assumptions Affect Taxonomy Estimates Based on Data from Information Return Matching
U.S. GAO: GAO's 2015 High Risk List: Ensuring the Security of Federal Information Systems and Cyber Critical Infrastructure and Protecting the Privacy of Personally Identifiable Information
U.S. GAO: Figure 3: Example of the Connectivity of a Heating, Ventilation, and Air-Conditioning System via the Internet
U.S. GAO: Figure 2: Some Types of Building and Access Control Systems in a Federal Facility
U.S. GAO: Incidents Reported by Federal Agencies in Fiscal Years 2006-2012
U.S. GAO: Figure 1: Example of the Typical Process for Filing a Tax Return
U.S. GAO: Figure 4: IRS Preliminary Estimates of Attempted Identity Theft Refund Fraud, Filing Season 2013