no, I'm pretty sure the CIA doesn't have some magical computational powers unknown to the rest of mankind, you're not going to just brute force encryption... unless you want to wait a very very long time
I'm surprised people even on this forum as evidenced in this thread, fail to grasp basic concepts like end to end encryption.
Let's put it into perspective, to brute force WhatsApp's encryption (AES-256 for messages, ignoring the additional encryption for the initial install, then authentication parts themselves), it would take approximately the
age of our universe if all the supercomputers on the planet were sat there crunching away. And that's just to check the keys of a message...
On the flipside, this does pose a risk to the system. What if both end to end devices are destroyed once messages have been sent? All efforts are completely wasted in trying to get to those messages.
I see where both sides of this debate are coming from, but it's a pointless exercise. Intelligence monitoring and information gathering is the key to catching terrorism. SIS and the like have already stopped many potential attacks from happening over the years, so they are doing their part, but you simply can't stop them all.