We are a commune of inquiring, skeptical, politically centrist, capitalist, anglophile, traditionalist New England Yankee humans, humanoids, and animals with many interests beyond and above politics. Each of us has had a high-school education (or GED), but all had ADD so didn't pay attention very well, especially the dogs. Each one of us does "try my best to be just like I am," and none of us enjoys working for others, including for Maggie, from whom we receive neither a nickel nor a dime. Freedom from nags, cranks, government, do-gooders, control-freaks and idiots is all that we ask for.
bit of a naive "answer" to the NSA attack/spy operation "just use encryption".
As/If the government controls the encryption tooling as well, and has it thoroughly compromised (and I see no reason to assume they don't)...
When you are dealing with trillions of messages one of the best ways to narrow the search is to select suspicious ones for further investigation. A encrypted message is suspicious.
While I have no doubt a good encryption algorithm would create a file that would take years to decrypt the problem is are any of the commercial encryption programs untainted by a backdoor or a hack? Also sometimes what seems like a simple math problem with only one long tedious solution can be cracked by a breakthrough that no one can predict. I would be reluctant to bet that a large organization dedicated to breaking encryption and with billions available to them hasn't figured out some tricks and hacks that leapfrog them over the tedious straight mathematical or repetition methods.