Ah, Traffic Analysis
The spooks are using one of the favorite tools; traffic analysis. It a reasonable guess that heavy users of encryption are doing it for a reason - mostly ill. Therefore map the traffic flows and once a couple of key accounts are identified sit back and 'listen'