Also, everyone read the book "Blind Man's Bluff"
http://en.wikipedia.org/wiki/Operation_Ivy_Bells is An example. It is rumored they can do that on fiber, too (http://cryptome.org/nsa-fibertap.htm)