This SIDToday post from 23 May 2006 describes an episode where the NSA Special Collection Service in Baghdad worked with GCHQ on a mission to rescue a group of hostages. Voice recognition was used to narrow down the search: see the Intercept article 328 NSA Documents Reveal “Vast Network” of Iranian Agents, Details of a Key Intelligence Coup, and a Fervor for Voice-Matching Technology, 15 August 2015.
This 14 September 2004 post from the internal NSA newsletter SIDToday reviews the agency’s operations at the Athens Olympics, which had just concluded: see the Intercept article A Death in Athens: Did a Rogue NSA Operation Cause the Death of a Greek Telecom Employee?, 29 September 2015.
This internal GCHQ form, which is undated, shows the procedure UK analysts follow for surveilling, or searching through already-acquired data for information from a person or organisation in a “sensitive” location – including the British Isles: see the Intercept article Profiled: From Radio to Porn, British Spies Track Web Users’ Online Identities, 25 September 2015.
This GCHQ document from November 2008 provides a guide to the legal authorisations required for different forms of agency activity: see the Intercept article Spies Hacked Computers Thanks to Sweeping Secret Warrants, Aggressively Stretching U.K. Law, 22 June 2015.
This 2010 NSA presentation describes Project Camberdada, an attempt to subvert popular antivirus software by means of surveilling email traffic: see the Intercept article Popular Security Software Came Under Relentless NSA and GCHQ Attacks, 22 June 2015.
This 6 September 2011 post from the NSA’s internal SIDToday newsletter describes progress in the agency’s speech-to-text capability over the course of the year: see the Intercept article The Computers are Listening: How the NSA Converts Spoken Words Into Searchable Text, 5 May 2015.
This 25 May 2011 post from the NSA internal newsletter SIDToday describes the agency’s development of speech to text technology: see the Intercept article The Computers are Listening: How the NSA Converts Spoken Words Into Searchable Text, 5 May 2015.
This NSA presentation from June 2006 describes advances in voice recognition technology, particularly in the context of operations in Iraq: see the Intercept article The Computers are Listening: How the NSA Converts Spoken Words Into Searchable Text, 5 May 2015.
This undated image, taken from NSA training materials, shows the role played by Executive Order 12333 in authorising the agency’s activities: see the Washington Post article Privacy watchdog’s next target: the least-known but biggest aspect of NSA surveillance, 23 July 2014.
This undated NSA slide provides the locations of FORNSAT sites run by the agency and its Five Eyes partners worldwide: see the Der Spiegel article The NSA in Germany: Snowden’s Documents Available for Download, 18 June 2014.