A scenario where a (not necessarily malicious) service intercepts conversations between two parties without them knowing it.
Malicious use of this scheme (man in the middle attack) may be used for example to get access to confidential information (such as credit card data in a man-in-the-middle attack against a web commerce site).
Non-malicious examples is a web proxy or reverse proxy.