This 2012 post from the NSA internal newsletter SSO News is one of a series collated here related to the extension of the agency’s FAIRVIEW collection to eight sites in major US cities: see the Intercept article The Wiretap Rooms: The NSA’s Hidden Spy Hubs In Eight U.S. Cities, 25 June 2018.
This internal NSA memo from SIGINT Director Teresa H Shea shows how the agency reacted to a October 2011 ruling of the FISA court, which was declassified after Edward Snowden’s revelations began. The ruling found that NSA had been intercepting the communications of non-targeted persons in the United States, violating the Fourth Amendment. The memo announces minimal changes to the Agency’s procedures, which the agency finally admitted were lacking in 2017, when it finally amended its mode of collection: see the Intercept article The Wiretap Rooms: The NSA’s Hidden Spy Hubs In Eight U.S. Cities, 25 June 2018.
This NSA Special Source Operations presentation from 22 March 2013 supplies a detail about the Breckenridge access point that supports the identification of the corporate partner codenamed STORMBREW as US telecommunications company Verizon: see the New York Times article AT&T Helped U.S. Spy on Internet on a Vast Scale, 15 August 2015.
This undated NSA document provides a decision tree for the analysis of email addresses, IP addresses, cookies and phone numbers in XKeyScore and other agency tools: see the Intercept article XKEYSCORE: NSA’s Google for the World’s Private Communications, 1 July 2015.
This NSA Staff Processing Form dated 27 March 2012 describes the type of assistance the agency will provide to the FBI on the basis of the new FAA702 “cyberwar” certification: see the New York Times article Hunting for Hackers, N.S.A. Secretly Expands Internet Spying at U.S. Border, 4 June 2015.
This NSA memo from 23 March 2012 presentation describes the agency’s proposal for a fourth FAA 702 certification that would allow it to target hackers “tied to malicious cyber activity”: see the New York Times article Hunting for Hackers, N.S.A. Secretly Expands Internet Spying at U.S. Border, 4 June 2015.
This NSA TURBULENCE presentation dated August 2009 explains the APEX method of combining passive with active methods to exfiltrate data from networks attacked: see the Der Spiegel article The Digital Arms Race: NSA Preps America for Future Battle, 17 January 2015.
This NSA presentation from 2011 gives an overview of anonymising technologies, including Tor: see the Der Spiegel story Prying Eyes: Inside the NSA’s War on Internet Security, 28 December 2014.