This NSA Special Source Operations presentation from 22 March 2013 supplies a detail about the Breckenridge access point that supports the identification of the corporate partner codenamed STORMBREW as US telecommunications company Verizon: see the New York Times article AT&T Helped U.S. Spy on Internet on a Vast Scale, 15 August 2015.
This NSA Special Source Operations slide from 25 April 2013 shows that GCHQ’s INCENSER access continued after Vodafone acquired corporate partner Cable & Wireless the previous year: see the Süddeutsche Zeitung article Snowden-Leaks: How Vodafone-Subsidiary Cable & Wireless Aided GCHQ’s Spying Efforts, 25 November 2014.
This 4-page excerpt from the 2013 Black Budget describes the two elements of NSA’s Foreign Partner Access operations – RAMPART-A and WINSTSTOP – together with their funding: see the Intercept article How Secret Partners Expand NSA’s Surveillance Dragnet, 18 June 2014.
This Boundless Informant slide shows the number of WINDSTOP records collected day-by-day between 10 December 2012 and 8 January 2013. WINDSTOP covers at least four NSA collection systems that depend on Five Eyes partners; the MUSCULAR project to intercept traffic from Google and Yahoo data centres is representated by the code DS-200B. In the given time period DS-200B accounted for 181 million records; DS-300 is INCENSER, another GCHQ cable-tapping operation: see the Washington Post article How we know the NSA had access to internal Google and Yahoo cloud data, 4 November 2013.
Slides from an undated Special Source Operations presentation include references to data structures and formats that could only have been obtained from the internal systems of Yahoo and Google: see the Washington Post article How we know the NSA had access to internal Google and Yahoo cloud data, 4 November 2013.
This presentation gives an overview of the NSA’s programmes targeting the fibre optic cables that carry much of the world’s internet traffic. One slide gives a breakdown of which data sources form the basis of Presidential daily briefings. Another shows that the access point used to collect Yahoo and Google cloud data (MUSCULAR) is operated by GCHQ on UK territory. Slides detailing RAMPART cable accesses were published by the Intercept on 18 June 2014: see the Washington Post article How we know the NSA had access to internal Google and Yahoo cloud data, 4 November 2013.