This 1 May 2006 SIDToday post describes the analysis of an Osama bin Laden audio broadcast, allowing for identification with 99% confidence using the Speaker Watchlist Tool (SWT): see the Intercept article 328 NSA Documents Reveal “Vast Network” of Iranian Agents, Details of a Key Intelligence Coup, and a Fervor for Voice-Matching Technology, 15 August 2015.
This 13 September 2011 post from the NSA internal newsletter SIDToday, written by the agency’s Deputy Director of SIGINT discusses how the NSA responded to the Japanese earthquake and tsunami of that year: see the Intercept article The NSA’s Role in a Climate-Changed World: spying non nonprofits, fishing boats, and the North Pole, 15 August 2018.
This 5 December 2006 post from the NSA internal newsletter SIDToday announces a new query tool called VIVIDDREAM, that enables analysts to discover whether a particular VPN can be exploited by the agency. The tool collects metadata about a VPN and consults a database, also called VIVIDDREAM. The author of the article says VIVIDDREAM “treads the delicate line between protecting VPN epxloitation capabilities and enabling VPN SIGDEV to proceed”: see the Intercept article NSA cracked open encrypted networks of Russian airlines, Al Jazeera, and other “high potential” targets, 15 August 2018.
This article from NSA’s internal SIDToday newsletter, dated 23 March 2006, discusses progress in the agency’s attempts to exploit corporate VPNs, including a number of named “interesting targets,” including Al Jazeera and a number of airline reservation systems: see the Intercept article NSA cracked open encrypted networks of Russian airlines, Al Jazeera, and other “high potential” targets, 15 August 2018.
This post from internal NSA newsletter SIDToday dated 13 November 2003 discusses the results of a conference organised by the agency in order to tackle the problems it had monitoring High Powered Cordless Phones – standalone devices unconnected to the cellphone network – that year. In all 500 personnel participated in the conference, drawn from NSA, its Five Eyes partners, contractors and the US military: see the Intercept article Iraqi Insurgents Stymied the NSA and Other Highlights from 263 Internal Agency Reports, 10 August 2016.
This post from the NSA’s internal SIDToday newsletter, dated 6 October 2004, reviews the agency’s operations for the recently-concluded Athens Olympics: see the Intercept article A Death in Athens: Did a Rogue NSA Operation Cause the Death of a Greek Telecom Employee?, 29 September 2015.
This post from the NSA’s internal SIDToday newsletter, dated 6 May 2010 and attributed to the Menwith Hill station describes NSA, CSEC and GCHQ’s acquisition of emails already exfiltrated by another actor: see the Intercept article Western Spy Agencies Secretly Rely on Hackers for Intel and Expertise, 4 February 2015.
This NSA memo, dated 3 January 2011, draws analysts’ attention to a rule change, allowing “contact chaining, and other analysis, from and through any selector, irrespective of nationality and location, in order to follow or discover valid foreign intelligence targets”: see the New York Times article N.S.A. Gathers Data on Social Connections of U.S. Citizens, 28 September 2013.
This NSA TURBULENCE presentation dated August 2009 explains the APEX method of combining passive with active methods to exfiltrate data from networks attacked: see the Der Spiegel article The Digital Arms Race: NSA Preps America for Future Battle, 17 January 2015.