This undated presentation from GCHQ’s Information and Communications Technology Research department discusses the agency’s efforts in finding “closed loops” of cheap burner phones, a major focus for the agency in the wake of the 7/7 London bombings: see the Intercept article How London’s 7/7 Bombings Led to “Unprecedented” Surveillance Tactics, 1 March 2018.
This 2012 presentation from the Network Tradecraft Advancement Team (NTAT), a joint Five Eyes surveillance unit, discusses options for installing malware on smartphones in light of the challenge posed by the Arab Spring: see the CBC News article Spy agencies target mobile phones, app stores to implant spyware, 21 May 2015.
This undated page from NSA’s internal WikiInfo site provides an overview of ongoing projects being developed by Tailored Access Operations (TAO): see the Der Spiegel article The Digital Arms Race: NSA Preps America for Future Battle, 17 January 2015.
This 2011 presentation, created by GCHQ’s Network Analysis Centre describes new techniques for gathering reconnaissance on the IT personnel of targeted organisations (their “Network Operations Centres”), using Belgacom as an example in several slides: see the Intercept article Operation Socialist: The Inside Story of How British Spies Hacked Belgium’s Largest Telco, 13 December 2014.
This six-slide presentation from November 2009 details mobile phone interception in Indonesia by Australia’s Defence Signals Directorate (now the Australian Signals Directorate): see the Guardian article Australia tried to monitor Indonesian president’s phone, 17 November 2013.