I can speak again from a long-standing history in the Special “I” program, and as we follow through the evolution of the use of this technology, as encryption started to be used by targets that we had judicial authorization to intercept, and we were unable to hear the audio, hear the phone calls or see the messages they were sending, that is when we developed the tool and technique to make it possible to intercept those communications.
But it's important to note the privacy invasion isn't coming from the tool utilized. The privacy invasion is coming from capturing that audio or capturing that text message or capturing that communication that is occurring between two individuals, and we have evolved in the use of the tools as individuals evolve in the way they communicate.