This SIDToday post from 23 May 2006 describes an episode where the NSA Special Collection Service in Baghdad worked with GCHQ on a mission to rescue a group of hostages. Voice recognition was used to narrow down the search: see the Intercept article 328 NSA Documents Reveal “Vast Network” of Iranian Agents, Details of a Key Intelligence Coup, and a Fervor for Voice-Matching Technology, 15 August 2015.
This 19 November 2011 post from the NSA’s internal SIDToday newsletter describes the agency’s Arctic operations, its two facilities in Alaska and its priorities in monitoring Russian and Chinese activities in the region: see the Intercept article The NSA’s Role in a Climate-Changed World: spying on nonprofits, fishing boats, and the North Pole, 15 August 2018.
This CSEC presentation from 2011 describes how poor operational security led to the successful attribution of a group of Russian-state associated hackers codenamed MAKERSMARK: see the Intercept article White House Says Russia’s Hackers Are Too Good To Be Caught But Nsa Partner Called Them “Morons”, 2 August 2017.
This GCHQ report dated 3 February 2011 and written by a seconded NSA staff member, alludes to the agencies’ capabilities against 13 models of firewalls produced by Juniper Networks, Inc: see the Intercept article NSA Helped British Spies Find Security Holes In Juniper Firewalls, 23 December 2015.
USA Today has revealed that a huge DEA phone records programme – which tracked and stored data relating to international phone calls placed by US persons – was halted as a result of Edward Snowden’s revelations. The DEA database predated 9/11 by almost ten years and “provided a blueprint for the far broader National Security Agency surveillance that followed.”
This CSE presentation from 2011 describes some of the cyber warfare tools at the agency’s disposal: see the article Communication Security Establishment’s cyberwarfare toolbox revealed, 23 March 2015.
This CSEC presentation from 2011 communicates Canada’s current and future cyberwar plans to their Five Eyes partners: see the article Communication Security Establishment’s cyberwarfare toolbox revealed, 23 March 2015.