Petraeus and the metadata problem
Two careful people, both of whom should have understood the threat model, used a shared-draft-folder scheme that should have been operationally adequate. They were exposed within months by an investigation that did not need access to the content of any message.