This article from the NSA internal newsletter SIDToday discusses the progress of the agency’s voice recognition efforts, particularly in Spanish and the languages spoken in Afghanistan: see the Intercept article Finding Your Voice, 19 January 2018.
This 2005 post from the NSA’s internal newsletter SIDToday features an interview with the deputy chief of the Middle East and North Africa product line. In light of a personnel shortage, he believes that new communications technology presents an advantage to the NSA, as the agency can spy on more intimate, firsthand communications from targets: see the Intercept article NSA Used Porn to “Break Down Detainees” in Iraq — and Other Revelations From 297 Snowden Documents, 1 March 2018.
This section of a 17 May 2006 article from an internal NSA newsletter makes it clear that Japanese foreign policy and trade activities are surveillance targets for the agency: see the Intercept article Japan Made Secret Deals With The NSA That Expanded Global Surveillance, 24 April 2017.
This 6 September 2011 post from the NSA’s internal SIDToday newsletter describes progress in the agency’s speech-to-text capability over the course of the year: see the Intercept article The Computers are Listening: How the NSA Converts Spoken Words Into Searchable Text, 5 May 2015.
This 25 May 2011 post from the NSA internal newsletter SIDToday describes the agency’s development of speech to text technology: see the Intercept article The Computers are Listening: How the NSA Converts Spoken Words Into Searchable Text, 5 May 2015.
This extract from a July 2008 NSA document describes Argentina as GCHQ’s “primary interest” in Latin America: see the Intercept article Britain Used Spy Team to Shape Latin American Public Opinion on Falklands, 2 April 2015.
This US National Intelligence Council memo dated 14 September 2011 provides US talking points for a forthcoming NATO meeting and includes the assessment that the threat presented by Anonymous and hacktivist activity is “minimal”: see the Intercept article Western Spy Agencies Secretly Rely on Hackers for Intel and Expertise, 4 February 2015.
This undated NSA presentation describes the process of Fourth Party collection – “I drink your milkshake”: see the Der Spiegel article The Digital Arms Race: NSA Preps America for Future Battle, 17 January 2015.
This 7 January 2008 post from NSA Menwith Hill Station’s internal Horizon newsletter describes the practice of piggybacking on other states’ computer network exploitation operations: see the Der Spiegel article The Digital Arms Race: NSA Preps America for Future Battle, 17 January 2015.