Ah, thanks for the information Tommy. If you want to read the article again, you can get it here:
http://www.sciam.com/article.cfm?chanID=sa006&colID=1&articleID=000479CD-F58C-11BE-AD0683414B7F0000
As with Discover, that link only lasts as long as the current issue is on the news stand but you should have no problem with it for a week or two. Of course, subscribers can read it for the next few years.
Then too, don't worry about the image search. I am reasonably sure that we all know what a shack looks like.
Then too, as both of us observed, it ain't gonna be easy by any means to hack the middle of the line. If we want to do a James Bond job, I did have a specific idea in mind:
If you do break a fiber line, you would have to do it when the line is (you would know a better term) “dark”. Any line that is used for trusted data would, once first used, be kept alive with a continuous carrier signal. At least I would do that, then the break and restoration of the signal would be a dead giveaway that the line had been tampered with. So the only time that you would ever be able to pull it off reliably would be after the line is put in place and before it is first used.
To be honest, signal matching had not occurred to me but I doubt that Mr. Bond would have to worry about that as any equipment that he had would be up to the task. What I would think to be important here would be the actual size of an optical repeater. Here too, I did some image searches and I gather that they are anywhere from the size of a modem up to a 2U case. Of course, if you had a multiple conductor cable to tap into, you might well need the whole of the shack to hold all the equipment but that much stuff would assume generous extra capacity on the lines (not that the phone company is not known for over wiring just to have that ability but even so...) figure a large suitcase if you are an international spy.
Then too, as you observed, it would probably be easier to hack an end point. That much is really nothing new as far as cryptography goes. Most existing internet traffic is cryptographically secured. Yet when we log onto our bank's web site or buy something from newegg, there is the possibility that someone at the other end can retrieve our credit card information after it has been decrypted.
Speaking of end points, that brings me to Van Eck Hacking. (free tip: use a flat panel monitor and paint your room with flat paint). If you can get to an end point, there are a number of ways to intercept information. Basically, Van Eck hacking is any of a number of techniques for monitoring the passive radiation and reconstructing a useful signal from the data so collected.
One example would be to use a high speed video camera and simply point it at a window into a room from which you want to grab data. Let's say for point of argument that there is a CRT monitor in that room that is set at 1024x768@60hz. If your camera is capable of grabbing data at a similar rate, it is possible to reconstruct the image on the monitor using the pulses of light that are reflected off of the walls. Flat paint and a TFT display will confound most of the equipment that would be used to gather such data, hence the reason for my free tip above. Yet that is not the only possible route for a successful Van Eck Hack. Given sufficiently sensitive radio receivers, it may be possible to reconstruct the image on a TFT panel by intercepting the radiation coming from the frame buffer on your graphics card.