This 2010 NSA presentation describes Project Camberdada, an attempt to subvert popular antivirus software by means of surveilling email traffic: see the Intercept article Popular Security Software Came Under Relentless NSA and GCHQ Attacks, 22 June 2015.
This excerpted GCHQ newsletter from March 2010 describes ongoing surveillance operations against Argentina: see the Intercept article Britain Used Spy Team to Shape Latin American Public Opinion on Falklands, 2 April 2015.
A single slide lists the sources of data that can be searched with XKeyScore – satellites (FORNSAT), mobile phones and base stations (Overhead), US-based fibre optic cables (Special Source Operations), offensive hacking (Tailored Access Operations), embassies and consulates (Special Collection Operations, F6), FISA Court authorised monitoring of US citizens and third party partners: see the SVT article FRA part of top-secret hacker project, 11 December 2013.
An undated chart showing the sources of 103 ‘accesses’ to communications or computers made in a single week in 2009 at an NSA facility in San Antonio, Texas. Twenty-four accesses were collected from the major internet companies under the authority of the FISA Amendments Act (FAA), 21 from Special Source Operations on privately owned communications infrastructure (SOO), 19 from intercept of foreign communications satellites (Fornsat), 16 from intercepted radio communications (Conventional), nine were acquired by US spy satellites (Overhead), seven from foreign intelligence services (2nd/3rd party) and one from Special Collection Service operations based at embassies and consulates (SCS): see the New York Times article No Morsel Too Minuscule for All-Consuming N.S.A., 2 November 2013.