This extract from a 2008 NSA list of major terrorism figures includes the only reference by name to the courier who eventually led the CIA to Bin Ladem: see the Intercept article What the Snowden Files Say About the Osama Bin Laden Raid, 18 May 2015.
This extract from the US Intelligence Community’s Congressional Budget Justification for the Fiscal Year 2013 (the “Black Budget”) provides the budget for GENIE the project “which underpins NSA/CSS’ Computer Network Operations (CNO) Endpoint capabilities conducted by the Tailored Access Operations (TAO) Group: see the Der Spiegel article The Digital Arms Race: NSA Preps America for Future Battle, 17 January 2015.
An NSA presentation on the FOXACID system used to redirect web traffic in order to deliver malware to a target machine. The image on the first slide plays on the original delivery method used to compromise targets: spam emails. Those conventional phishing attacks (such as WILLOWVIXEN) have become deprecated in the agency’s offensive arsenal in favour of more sophisticated techniques: see the Der Spiegel article, NSA’s Secret Toolbox: Unit Offers Spy Gadgets for Every Need, 30 December 2013.