If, as many people have insinuated (probably incorrectly, might I add), the hardware is in place to permit the decoding and intercepting of TLS and SSL encrypted traffic through MITM attacks via the backbone to obtain the keys, this could be done silently and without any cost other than the hardware and it is associated running costs.