So you're encrypting your network traffic, but is that enough to stop the snoops? Maybe not.
If you're using document encryption tools such as PGP, or encrypted mail services such as Hushmail, then those might be easily defeated using keystroke loggers. And if you're moving your data through various switches -- any of which that might support mirrored ports -- then how do you know someone isn't capturing every bit of your network traffic?
Check out this story over at CNet and when they talk about catching criminals swap the roles in your mind -- consider that criminals might be doing this to catch YOU !