It would be logical for NSA to use US embassies abroad as a family of outposts for X-Keyscore harvesting local communications.
Embassies have always been used for full-spectrum espionage in all its guises and disguises, military, political, economic, social, so adding cyber was inevitable. The embassies have multiple networks for communications from minimal to highest levels of security. To conduct cyber-espionage would be a seamless extension of existing technology.
Further revelations of Snowden's documents could describe how this is done with personnel, networks and data-server architecture, not only by PRISM and X-Keyscore. Staff of these spy systems may be seen as HUMINT androids safely bunkered for intimately wielding their remote-spying apparatus in concert with remote-commanding officials and killing-machine operators with whom they work to surveil, analyze, target and execute.
LinkedIn and other social media, job recruiters, conference sponsors, have since 9/11 rushed to fill burgeoning "intel analyst" positions, many military and official spy-trained, now seeking greater pay and perks on the cyberespionage market. These "intel analyst" job seekers and holders (happily "endorsing" each other) parade the codenames of espionage tools and programs they have mastered, XKeyscore only one among these compiled by A's quick overnight search of LinkedIn1:
AGILEVIEW, AGILITY, AIRGAP/COZEN, AIGHANDLER, ANCHORY/MAUI, ARCANAPUP, ARTEMIS, ASSOCIATION, AUTOSOURCE, BEAMER, BELLVIEW, BLACKPEARL, CADENCE/GAMUT, CHALKFUN, CINEPLEX, CLOUD, COASTLINE, COMMONVIEW, CONTRAOCTAVE, CONVERGENCE, COURIERSKILL, CREEK, CREST, CROSSBONES, CPE, CULTWEAVE, CYBERTRANS, DISHFIRE, DOUBLEARROW, DRAGONFLY, Enhanced WEALTHYCLUSTER (EWC), ETHEREAL (maybe opensource network analysis?), FASCIA, FASTSCOPE, FOREMAN, GAMUT/UTT, GISTQUEUE, GJALLER, GLAVE, GLOBALREACH, GOLDMINER, GOLDPOINT, GOSSAMER, GROWLER, HERCULES (CIA terror database) HIGHTIDE/SKYWRITER, HOMEBASE, INFOSHARE, JOLLYROGER, KINGFISH, LIQUIDFIRE, MAINWAY, MARINA, MASTERLINK, MASTERSHAKE, MAUI/ANCHORY, MESSIAH, METTLESOME, NEWHORIZONS, NIGHTSURF, NORMALRUN/CHEWSTICK/FALLENORACLE, NUCLEON, OCTAVE, PATHMASTER/MAILORDER, PINWALE, PANOPTICON, PRESENTER, PROTON, RAVENWING, RENOIR, ROADBED, SCORPIOFORE/CPE, SHARKFINN, SKOPE, SKYWRITER, SNAPE, SPOTBEAM, STINGRAY; SURREY, TAPERLAY, TAROTCARD, TEMPTRESS, TRACFIN, TRAILMAPPER, TREASUREMAP, TRICKLER, TUNINGFORK/SEEKER, TURMOIL, TUSKATTIRE, TWISTEDPATH, UIS/PINWALE, UTT, WEALTHYCLUSTER, WIRESHARK (opensource network analysis?) WITCHHUNT, XKEYSCORE, YELLOWSTONE/SPLITGLASS
These manifold programs imply that US embassies operating X-Keystone networks and data-servers to tap into global nations' telecommunications hubs for cyber spying would require no more than doing what US spy agencies do inside the USA: overtly and covertly arranging access through domestic official and commercial spying and law enforcement agencies, corporations, telecommunications networks, financial institutions, consultants, cyber mercenaries, organized criminal organizations, opportunistic patriots, informants, educational institutions, all the ancient cooperators, and now variable-hatted hackers, cryptographers, anonymizers, freedom of information fighters, civil liberties fronts, political organizations, lobbyists, press officers, governmental office-holders, donors and funding organizations.
Note: 3 August 2013
A clarifies source of codenames:
The list of codenames aren’t siphoned off Linkedin but compiled over time to help look for interesting intelligence professionals and connections –- a lot from William Arkin's excellent work:
After the X-Keyscore article in Guardian I began looking for CV’s on LinkedIn referring X-Keyscore and the other systems from the list. As you must have found out by now there are lots of references to these systems. [Cryptome: Search also for "intel analyst."]
Notably, as you can see, ECHELON, ECHELON II, MAGISTRAND etc are missing. I believe these are the “Windows 3.1” of SIGINT software. Obsolete. Evolved.