This undated NSA protocol note provides a short briefing for a visit to the agency’s Deputy Director of Foreign Affairs by his Japanese counterpart, due to happen sometime after January 2013: see the Intercept article The Untold Story of Japan’s Secret Spy Agency, 19 May 2018.
This February 2013 slide deck from Japan’s DFS (Directorate for Signals Intelligence), accompanied by speaking notes, outlines MALLARD, a DFS programme for using sigint to detect cyber-threats and includes a detailed history of US-Japanese cooperation on the project. This is the first document from DFS ever to have been published: see the Intercept article The Untold Story of Japan’s Secret Spy Agency, 19 May 2018.
This internal briefing dated 29 January 2013 provides talking points for the NSA Director on improving cooperation with Japan in the cyber realm : see the Intercept article Japan Made Secret Deals With The NSA That Expanded Global Surveillance, 24 April 2017.
This page taken from GCHQ’s internal GCWiki, last updated on 8 September 2011 notes that the agency’s Joint Terrorism Analysis Centre was involved in analysis of material seized in the raid on bin Laden’s Abbottabad compound: see the Intercept article What the Snowden Files Say About the Osama Bin Laden Raid, 18 May 2015.
This NSA Special Source Operations presentation from 22 March 2013 supplies a detail about the Breckenridge access point that supports the identification of the corporate partner codenamed STORMBREW as US telecommunications company Verizon: see the New York Times article AT&T Helped U.S. Spy on Internet on a Vast Scale, 15 August 2015.
These classified annexes to the Obama administration’s Cyberspace Policy Review were not published with the rest of the report in May 2009 and acknowledge that cyber defence initiatives have civil liberties implications: see the New York Times article Hunting for Hackers, N.S.A. Secretly Expands Internet Spying at U.S. Border, 4 June 2015.
This NSA Staff Processing Form dated 27 March 2012 describes the type of assistance the agency will provide to the FBI on the basis of the new FAA702 “cyberwar” certification: see the New York Times article Hunting for Hackers, N.S.A. Secretly Expands Internet Spying at U.S. Border, 4 June 2015.
This NSA memo from 23 March 2012 presentation describes the agency’s proposal for a fourth FAA 702 certification that would allow it to target hackers “tied to malicious cyber activity”: see the New York Times article Hunting for Hackers, N.S.A. Secretly Expands Internet Spying at U.S. Border, 4 June 2015.
This short extract from a GCHQ Network Analysis Centre report covering the period July-September 2011 describes “offensive cyber operations” against Iran, Argentina and Libya: see the Intercept article Britain Used Spy Team to Shape Latin American Public Opinion on Falklands, 2 April 2015.
This CSE presentation from 2011 describes some of the cyber warfare tools at the agency’s disposal: see the article Communication Security Establishment’s cyberwarfare toolbox revealed, 23 March 2015.