You should know, if you read the article, that this isn't "decrypting", but a memory dump. A memory dump usually requires physical access to the PC while the secure key is in use, or later if the PC went into hibernation while the secret key was being used.
Schneier didn't crack truecrypt. He simply pointed out that truecrypted data's existence can be identified therefore it loses it's plausible deniability.
Even if the feds had a multi-billion dollar machine that could decrypt 256-bit AES, why would they waste a vast amount of resources to decrypt your truecrypt container of a bitcoin wallet?
The funny thing is that this has happened before.
Increased Power Usage Leads to Mistaken Pot Busts for Bitcoin Miners - Slashdot