Yes, of course they will have the meta data.
It’s the actual voice data they crave though. It’s the voice data that they did all in their power to keep weakly encrypted.
They don’t need the big data warehouse in Utah to store the metadata. That’s a small amount of data... plus the fact the phone carriers already store all that. They could just get a warrant to get the meta data and not store any of it themselves.
They want to hear your voice... if you encrypt it they won’t have access to anything but the meta data and that’s not the data they crave.
It’s EASY to write very, very strong public key software for the new powerful 32bit controllers (Like ARM Cortex) Not some weak crap like the encryption that protects your credit card data when you buy something at Amazon. Use the right algorithm and make no flaw in its implementation and all the super computers on the planet can’t decrypt it before the end of the universe comes along.
If NSA could decrypt all the powerful codes they would not have opposed strong crypto in cell phones. Really strong crypto scares the $hit out of them.
They want every one to think they could possibly be decrypting strong crypto. They have a huge problem though. It’s just so easy to test for exactly what crypto they can and cannot break. Nation states do this all the time to be certain of what their enemies can decrypt. Just run a false operation and encrypt all the data using strong crypto... if the data is acted upon by the adversary then they can decode it, if not then that is a type of encryption it is safe to use.