This 28 March 2012 post from the NSA internal newsletter SSO Weekly describes the agency’s relationship with AT&T (FAIRVIEW) as “highly collaborative”: see the New York Times article AT&T Helped U.S. Spy on Internet on a Vast Scale, 15 August 2015.
This NSA TURBULENCE presentation dated August 2009 explains the APEX method of combining passive with active methods to exfiltrate data from networks attacked: see the Der Spiegel article The Digital Arms Race: NSA Preps America for Future Battle, 17 January 2015.
This 13 September 2010 presentation from the NSA’s OTP VPN Exploitation Team explains the work of the division: see the Der Spiegel story Prying Eyes: Inside the NSA’s War on Internet Security, 28 December 2014.
This NSA presentation from 2011 gives an overview of anonymising technologies, including Tor: see the Der Spiegel story Prying Eyes: Inside the NSA’s War on Internet Security, 28 December 2014.
This September 2008 newsletter from the National Information Assurance Research Laboratory (NIARL), an unit within the NSA’s Research Directorate gives an indication of the agency’s progress with cryptanalysis – which, with “only a handful of in-house techniques” – appears to be modest: see the Der Spiegel story Prying Eyes: Inside the NSA’s War on Internet Security, 28 December 2014.
This extract is taken from an undated dictionary produced by NSA Special Source Operations, providing glosses for several terms associated with MYSTIC operations. The name of one country has been redacted: see the Intercept article Data Pirates of the Caribbean: The NSA Is Recording Every Cell Phone Call in the Bahamas, 19 May 2014.
This undated NSA Special Source Operations memo explains MYSTIC a collaboration between various US agencies that collects signals from telecoms networks by means of devices have been installed for ostenisbly “legitimate commercial services”: see the Intercept article Data Pirates of the Caribbean: The NSA Is Recording Every Cell Phone Call in the Bahamas, 19 May 2014.
This undated presentation from the NSA’s Special Source Operations division shows that the agency’s ability to intercept key communications infrastructure is dependent on corporate relationships, several of which can be identified using information given in this document: see the Guardian article Snowden document reveals key role of companies in NSA data collection, 1 November 2013.