Since I had a hand in the design of the security protocols of 802.11, 802.16 and Bluetooth
No, you didn't.
Fuck off, now.
Read the 802.11 spec and the 802.16 spec and you will see my name there in the list of contributors. It was several years of my career working on wireless communication protocols followed by several years solving the problems with randomness in those protocols.
The verbiage was on a slide presentation where the 'security' company were claiming they found a back door with remote access. They did not. I saw the headline, read the slides, then it took a couple of days for to dig in and work out it was just normal vendor HCI commands.
So their verbiage wasted a lot of people's time.