This post from internal NSA newsletter SIDToday dated 13 November 2003 discusses the results of a conference organised by the agency in order to tackle the problems it had monitoring High Powered Cordless Phones – standalone devices unconnected to the cellphone network – that year. In all 500 personnel participated in the conference, drawn from NSA, its Five Eyes partners, contractors and the US military: see the Intercept article Iraqi Insurgents Stymied the NSA and Other Highlights from 263 Internal Agency Reports, 10 August 2016.
This GCHQ document from November 2008 provides a guide to the legal authorisations required for different forms of agency activity: see the Intercept article Spies Hacked Computers Thanks to Sweeping Secret Warrants, Aggressively Stretching U.K. Law, 22 June 2015.
These undated slides from GCHQ’s National Defence Intelligence and Security Team claim that the agency collects “around 100,000,000 malware events per day”: see the Intercept article Popular Security Software Came Under Relentless NSA and GCHQ Attacks, 22 June 2015.
This GCSB report from July 2009 describes the move towards “full collection” at the agency’s Waihopai, progress against several named targets and “2nd party sharing” arrangements via XKeyScore: see the New Zealand Herald article The price of the Five Eyes club: Mass spying on friendly nations, 5 March 2015.
This NSA memo, dated 3 January 2011, draws analysts’ attention to a rule change, allowing “contact chaining, and other analysis, from and through any selector, irrespective of nationality and location, in order to follow or discover valid foreign intelligence targets”: see the New York Times article N.S.A. Gathers Data on Social Connections of U.S. Citizens, 28 September 2013.
This CSE (then CSEC) presentation from 2012 describes the Canadian agency’s file download monitoring operation: see the Intercept article Canada Casts Global Surveillance Dragnet Over File Downloads, 28 January 2015.
This undated GCHQ document provides a classification guide for BULLRUN – NSA and GCHQ’s attempts to weaken or defeat cryptographic protocols – and specifies some of its achievements: see the ProPublica article Revealed: The NSA’s Secret Campaign to Crack, Undermine Internet Security, 5 September 2013.