I see no particular reason why existing diplomatic courier services, chain of trust, and verification procedures can't be used for key exchange. What are the failure modes you are sceptical about?
>Will any of this work under wartime conditions when people are moving around, using random webcams and mobile devices?
Just follow the procedure to establish trust cryptographically, then arrange the meeting by any channel you like.
>Will any of this work under wartime conditions when people are moving around, using random webcams and mobile devices?
Just follow the procedure to establish trust cryptographically, then arrange the meeting by any channel you like.