Of course, there are two flavors of WPA, and I'm still investigating which flavor Jason Crawford was able to crack. More than likely, Jason Crawford broke WPA-PSK. WPA-PSK relies on a passphrase for access to the secured network, and assuming that your passphrase is sufficiently long enough and uses random characters, it would be nearly impossible to brute force crack a WPA preshared key. But if you Wiki the PlayStation 3, you'll discover that the PS3 hardware has been used to build supercomputing environments, and that's exactly what you'd need to break WPA-PSK by brute force. Of course, the weakness of WPA-PSK lies not in the strength of its encryption capabilities, but in its reliance on a passphrase. You break the passphrase, you break the network, and that has disastrous implications for some of the military-based projects that Lockheed is working on. According to Crawford, "The military has a vision of having an IP address for every soldier and weapon," Morrison says. "They're not going to be trailing wires around on the battlefield, but that can lead to some vulnerabilities."
For a military application, however, I'm going to assume that the more secure, RADIUS-based version of WPA will be used, WPA-802.1x (AKA WPA-Enterprise). In fact, don't you think it makes more sense to develop a proprietary encryption algorithm? Ideally, it would be something without an IEEE designation that's stamped "Top-Secret." I'd hate for the Iranians to crack the network and start remote controlling some of our military Humvees.