Re: TRAITORS — @ I ain't Spartacus
"And I'm perfectly happy for that to include allies like Angela Merkel."
Perhaps you're right. Irrespective, I reckon these Snowden (and associated ) revelations are of such an extent that they've the power to shock even the complacent into action in ways that The Secret State and similar revelations were never able to do.
Furthermore, with the enormous proliferation of smartphones worldwide, millions are now aware they're being snooped upon by their governments—and even if they're as innocent and white as newly-fallen snow, they're left with nasty feelings of their privacy having been violated.
This could change the ballgame altogether. In the past, people never responded to the The Secret State and such revelations so emphatically as they have now done here; back then these matters were more abstract, now they're immediate, up-close and personal. The CERN scientists' newly and promptly developed encrypted email based in Switzerland is likely only the beginning of considerable research and development in obfuscating communications.
Currently, the 'weakness' in mail is that interception is easy, as the source and destination addresses are known or can be readily determined—certainly so with IP addresses (with snail-mail knowing the source may be more problematic but the destination is usually clear). Even if mail is encrypted, its metadata is abundantly clear (and thus useful to interceptors).
As I've mentioned in previous posts on similar matters, it seems to me there'll not only be considerable research into encrypted email that's easily used but also in ways of bringing stenography back into the main stream. However, stenography isn't as easy as it seems. Data that's obfuscating messages can be statistically analysed which reveals the presence of messages even if they're not able to be decrypted and the metadata (sender/receiver's ID etc.) may indicate reasons for intent to obfuscate.
To get around the metadata problem, any modern form of stenography would have to obfuscate both source and destination addresses. I've little idea how this would be achieved except to say that it would perhaps have to involve the 'smearing' of addresses over multitudes of servers combined with say breaks in the communications chain—by say inserting wireless links into cable/fibre paths to disrupt directly-traceable routes. (Radio circuits would enable source and destination to appear at different virtual locations other than actual real ones. If a fuzzy distributed system that used smartphone wireless connections were ever conceived then tracing source and destination would be a nightmare if nigh on impossible.)
If heavy-duty research into such methods hasn't already begun then I'd be mightily surprised.