This GCHQ experiment profile from March 2010 proposes a test of the effectiveness of GCHQ and NSA voice recognition systems: see the Intercept article Finding Your Voice, 19 January 2018.
This February 2013 slide deck from Japan’s DFS (Directorate for Signals Intelligence), accompanied by speaking notes, outlines MALLARD, a DFS programme for using sigint to detect cyber-threats and includes a detailed history of US-Japanese cooperation on the project. This is the first document from DFS ever to have been published: see the Intercept article The Untold Story of Japan’s Secret Spy Agency, 19 May 2018.
This page from GCHQ’s internal GCWiki, dated 24 April 2012 describes procedures for searching through financial data retained by the agency, and cites examples of some of its sources: see the Intercept article Airport Police Demanded An Activist’s Passwords. He Refused. Now He Faces Prison In The UK, 23 September 2017.
These extracts from the 2013 Congressional Budget Justification (the “Black Budget”) describe US intelligence activity around the raid on Osama bin Laden’s Abbotabat compound: see the Intercept article What the Snowden Files Say About the Osama Bin Laden Raid, 18 May 2015.
On Monday 15 August, a previously unknown group of hackers called The Shadow Brokers launched an auction for what they claimed was source code from the NSA-associated Equation Group. A sample of what was claimed to be Equation Group hacking tools was also released on github and a manifesto delivered on Pastebin.
This GCHQ report dated 3 February 2011 and written by a seconded NSA staff member, alludes to the agencies’ capabilities against 13 models of firewalls produced by Juniper Networks, Inc: see the Intercept article NSA Helped British Spies Find Security Holes In Juniper Firewalls, 23 December 2015.
This GCHQ report summary from 12 March 2012 discusses the impact of the move to a “end-end big data strategy” on the agency’s infrastructure: see the Intercept article Profiled: From Radio to Porn, British Spies Track Web Users’ Online Identities, 25 September 2015.
This GCHQ research paper from 6 November 2009 outlines what kinds of data the agency can extract from internet radio stations and their listenership, grouped by country: see the Intercept article Profiled: From Radio to Porn, British Spies Track Web Users’ Online Identities, 25 September 2015.
This GCHQ spreadsheet from October 2007 provides a guide to the permissibility of using named GCHQ and NSA databases and shows the absence of safeguards against exploiting the metadata of persons located in the UK: see the Intercept article Profiled: From Radio to Porn, British Spies Track Web Users’ Online Identities, 25 September 2015.
This undated GCHQ presentation describes SOCIAL ANTHROPOID, a “converged comms database” that analyses metadata from emails, instant messenger chats, social media connections and conversations, together with “telephony” metadata from phone calls, mobile phone locations, text and multimedia messages: see the Intercept article Profiled: From Radio to Porn, British Spies Track Web Users’ Online Identities, 25 September 2015.