Yeah I read through those documents last night and Im pretty sure its just FUD. No where do they even hint that they can break any connection. In fact in many places they talk about alternative methods of exploitation in the event they can't decrypt. In one slide they even outright say they steal IPSEC private keys by breaking into routers. Later on they also say for VPN they use a metadata database to fingerprint potentially exploitable vpns and to remember 'just because its not exploitable now, doesn't mean it won't be exploitable in the future!'
They even seem to have different teams to attack the protocol in different ways, ergo not putting their eggs all in one basket. In all likelihood its simply a matter of them employing attacks weve already seen and heard except on a much larger scale. If that counts as being insecure or broken I guess, but its broken in the same way that 'no computer cannot be hacked' phrase is true.
What I find MUCH more interesting, is how they follow trends to identify new technologies to look at to potentially attack. Things like following technological 'thought' leaders and even using forums. Yup, theres a distinct chance that one or two NSA agents is getting paid to browse Evilzone, perhaps even an active member, in case someone cooks up something really interesting
Now that I think is food for thought.