This 2010 presentation and speaking notes from the NSA’s Office of Legal Counsel explains the legal authorities governing the agency’s computer network operations (CNO) activities: see the New York Times article Hunting for Hackers, N.S.A. Secretly Expands Internet Spying at U.S. Border, 4 June 2015.
This 25 May 2011 post from the NSA internal newsletter SIDToday describes the agency’s development of speech to text technology: see the Intercept article The Computers are Listening: How the NSA Converts Spoken Words Into Searchable Text, 5 May 2015.
This NSA Point Paper dated 22 February 2006 provides a history of the CRISSCROSS and PROTON information sharing systems that preceded ICREACH: see the Intercept article The Surveillance Engine: How the NSA Built Its Own Secret Google, 25 August 2014.
Extracts from an NSA document dated 3 October 2012 show that the agency proposed using records of online activity to discredit six individuals. Also included is the document’s distribution list and the targeting rationale for the six individuals involved (all identifying information has been redacted): see the Huffington Post article Top-Secret Document Reveals NSA Spied On Porn Habits As Part Of Plan To Discredit ‘Radicalizers’, 26 November 2013.
This background document for a visit to NSA by offcials from France’s Directorate for External Security and National Systems Security shows that US involvement in a May 2012 cyber-attack on the French Presidency was one of the issues up for discussion: see Le Monde article The NSA’s intern inquiry about the Elysée hacking revealed, 25 October 2013.