From James Bamford's article referenced in OP:
EXCERPT...
In fact, recruiting a foreign telecom employee as an inside person for a major bugging operation was standard operating procedure for both the NSA and the CIA, according to the senior intelligence official involved with the Athens operation. What the NSA really doesnt like to admit, about 70 percent of NSAs exploitation is human enabled, the former official said. For example, at a foreign Ministry of Post and Telecommunications, if NSA determines it needs to get access to that system, NSA and/or the CIA in coordination would come up with a mechanism that would allow them to replicate the existing switch to be swapped out. The CIA would then go and seek out the person who had access to that switch like a Nortel switch or a router go in there, and then it would be the CIA that would effect the operation. And then the take from it would be exploited by the NSA.
And according to a highly classified NSA document provided by Snowden and previously published by The Intercept, covertly recruiting employees in foreign telecom companies has long been one of the NSAs deepest secrets. A program code-named Sentry Owl, for example, deals with foreign commercial platform[s] and human asset[s] cooperating with the NSA/CSS [Central Security Service]. The document warns that information related to Sentry Owl must be classified at an unusually high level, known as ECI, or Exceptionally Controlled Information, well above top secret.
Human intelligence guys can provide sometimes the needed physical access without which you just cant do the signals intelligence activity, Gen. Hayden, the NSA head at the time of the Athens bugging, who later ran the CIA, told me.
Basils ties to Greece made him very good at developing local agents. He was the best recruiter the station had, the best, said the former CIA associate in Athens. [Basil] may have been in charge of recruiting the guy on the inside. He may have made the initial recruitment.
With an agent in place inside the network, the next step would be to implant spyware capable of secretly transmitting the conversations of the NSAs targets to the shadow phones where they could be resent to NSA computers. Developing such complex malware is the job of the NSAs Tailored Access Operations (TAO) organization. And, according to the previously undisclosed Snowden documents, members of the group performed CNE [Computer Network Exploitation] operations against Greek communications providers as part of the preparations for the Olympics. In lay terms, this means they developed malware to secretly extract communications data. Also involved were members of the Special Source Operations (SSO) group, the specialists who work covertly with telecom companies, such as AT&T or in this case Vodafone to get secret access to their networks.
CONTINUED...
https://theintercept.com/2015/09/28/death-athens-rogue-nsa-operation/
Gosh. Even if done in the name of national security, murder is still murder. Plausible deniability or not, secret government is un-democratic.