Your opponent chose a very poor wireless encryption key which allowed an attacker to crack or break it, thus gaining the ability to monitor their wireless traffic.
Effects
Select an Encryption card that your opponent has in play. Both this card and the target Encryption card are discarded.