satellite business news
Transcription
satellite business news
ww w. sa tb izn ew s.c om SATELLITE BUSINESS NEWS , THE SATELLITE TV INDUSTRY S LEADING NEWS PUBLICATION Vol. 14 No. 16 August 14, 2002 $2.95 SBCA Focuses Show on Retailers The stage will be smaller than last year and there will not be as many performers, but the Satellite Broadcasting and Communications Association (SBCA) is optimistically predicting that there will be just as many people in the audience at its annual trade show in Las Vegas Aug. 6-9. While last year’s show was dominated by the talk about who would wind up with DirecTv and the departure of Chuck Hewitt as SBCA president, most industry hands expect talk to turn this year to the chance the pending DBS merger will go through. One of the association’s most visible members, Pegasus Communications Corp., is letting its feet do its talking regarding the merger and the SBCA. A few days before satellite retailers were scheduled to head to Las Vegas, Pegasus, DirecTv Inc.’s largest rural distributor, told the SBCA it would not renew its membership next year as a result of the continuing controversy over the association’s endorsement of EchoStar Communications Corp.’s pending acquisition of its former DBS rival. As reported, a deeply divided SBCA Executive Committee voted to support the merger late last year. Pegasus has been among the deal’s loudest opponents (Satellite Business News, Dec. 31, 2001). In a letter to SBCA President Andy Wright, Pe- gasus President Ted Lodge specifically said that vote was behind the resignation. The SBCA, Lodge wrote, had “abdicated its true charter” and is “now a captive organization” that “represents the interests of only two organizations, DirecTv and EchoStar.” The SBCA’s decision to endorse the DBS deal, Lodge wrote, “and the process of achieving the result, were not authorized by the organizational documents of the SBCA.” Pegasus, he added, feels it has “no alternative but to resign and seek alternative means to promote the interests of our industry.” Lodge also said a claim by the two DBS services CONTINUED ON PAGE 22 DirecTv Slumps at Chains Satellite TV Piracy Goes Mainstream EchoStar Links with Wal-Mart DirecTv, EchoStar Lose Billions The sluggish sales DirecTv Inc. reported for the second quarter took their toll on at least two of the largest retail chains that distribute its systems, RadioShack Corp. and Blockbuster Inc. As those chains were rethinking their strategies to boost sales, EchoStar Communications Corp., as expected, added another link to its growing distribution chain—Wal-Mart Stores Inc. Wal-Mart, the nation’s largest retailer, started selling RCAbranded EchoStar DBS systems Aug. 1 at its 1,900 stores. EchoStar spokesman Marc Lumpkin only confirmed as much after Satellite Business News informed him that field reports indicated EchoStar units were actually seen on Wal-Mart’ sales floors prior to the company putting out a long-anticipated announcement about it (Satellite Business News, July 31, 2002). EchoStar’s installation network will handle all installations for systems sold at Wal-Mart, Lumpkin said. Wal-Mart stores are participating in EchoStar’s newest promotion that pays new customers back for purchasing equipment. The program awards 12 monthly credits of $12.50 to new subscribers who pay $149 for a model 301 system. Customers who buy two systems for $199 will receive $17 credits for 12 months, though they must pay a monthly $5 second-set fee. The CONTINUED ON PAGE 22 Periodical-Do Not Delay 89875p001_4_21_24r1.pm6 1 On the night of Jan. 21, 2001, hundreds of thousands of DBS system owners in North America sat down in front of their TV sets for yet another Sunday evening of stealing DirecTv through the use of modified security cards like they had for so many months before. Beginning at about 5:30 p.m. EST, and much to their amazement, waves of modified DirecTv cards began being deactivated as a result of an electronic signal transmitted by DirecTv Inc. and NDS Group P.L.C., its security vendor. By the end of the night, virtually every modified DirecTv access card in North America had been turned off. Those with the now dead cards immediately deluged the Internet sites of the hackers they had sent their cards to for modification, or tried to reach those who had telephone numbers. The rush of activity overloaded hacker web sites and many crashed. Their phone numbers buzzed busy for days. Their customers had lost their “free” DirecTv and were outraged. Their DirecTv access cards were rendered useless. Over the course of the following week, the DirecTv/NDS electronic coutermeasure (ECM) received widespread media attention across the U.S., Canada, and Mexico. David Letterman even joked about it a few nights later. Hackers and their cust o m e r s dubbed that night “Black Sunday.” Two days later, DirecTv and NDS transmitted an- Stacks of access cards in workshop ready to be other ECM modified. It should be noted that Satellite Business a i m e d a t News has intentionally obscured numbers on the DirecTv carton and other objects in this picture. those few cards that may not have been they had delivered a blow from hit. That night, EchoStar Com- which hackers would never m u n i c a t i o n s C o r p . , t h e n recover. According to comDirecTv’s arch competitor, pletely unsubstantiated hacker launched its biggest ECM to lore, DirecTv and NDS were so date against users of modified confident about their action that DISH Network they actually access cards. transmitted a At DirecTv’s two-word mesheadquarters in sage that DirecTv ..................p. 6 El Segundo, Cawound up beEchoStar................p. 8 lif., and at NDS ing written to Internet ..................p. 10 offices in Israel the modified and California., cards that there was widespread jubila- hackers were able to read. The tion over what to this day re- message simply read: “GAME mains the single most effective OVER.” one day anti-piracy action in Even though no such bits of history. After months of seeing data were ever transmitted, in DirecTv piracy skyrocket, reality, the game had just beDirecTv and NDS finally struck gun. back and some inside the comDirecTv and NDS had no panies even started to believe CONTINUED ON PAGE 3 Special Report 8/15/02, 5:22 AM 3 AUGUST 14, 2002 Piracy CONTINUED FROM PAGE 1 way of knowing about the unintended and seminal consequence the Black Sunday ECM would lead to. That night, and in the days that followed, many satellite TV hackers came to realize they would have to radically change the way they conducted their illicit business. That not only sparked a fierce debate within hacker circles, but forced many hackers to come up with new methods to make money. As a result, and only 19 months later, far more Americans are watching DirecTv and EchoStar without paying the DBS services—both in total number and in proportion to the overall size of the satellite market—than were stealing DirecTv that Sunday night in Jan. 2001. And that change has spawned not only stunning technical advances by hackers, but what has become a surprisingly large wave of crime— ranging from armed robbery, breaking and entering, shipping theft, and simple robbery. And all of it is aimed at acquiring DirecTv and EchoStar access cards and equipment that are the tools of the trade of satellite TV piracy. Perhaps even more surprising, however, is how little is truly known about the current state of satellite TV piracy, how little programmers and Hollywood studios know about the theft, and how little DirecTv and EchoStar are willing to discuss the matter. Over the past four months, Satellite Business News has conducted an intensive investigation into the current state of satellite TV piracy. This investigation has included interviews and communication (often via non-traceable electronic means) with dozens of satellite TV hackers, knowledgable industry hands, and investigative sources. In addition, some 200 hacker web sites and other Internet-based communication channels used by hackers and their customers were either visited or their use was demonstrated. Moreover, Satellite Business News has independently verified virtually all of the hacking methods that will be examined in this story, and will note those it has not. But in almost all cases, Satellite Business News will not specifically identify the names of hacker web sites or other hacker 89875p001_4_21_24r1.pm6 3 communication avenues in order not to provide any publicity for those involved. This story is not designed to provide a “how-to” on hacking or to glorify what clearly is a criminal act that poses a long-term threat to the viability of the satellite TV business. This investigation has pro- duced some general conclusions about the current state of satellite TV piracy. The details that lead to these conclusions will be outlined and explored throughout this story. But in sum, the most overriding conclusions are: ●Theft of DirecTv and EchoStar DBS service is at an all-time high in the United States. It is now clear that the nation’s two DBS services combined are losing no less than $125 million in gross revenue per month, or $1.5 billion per year, to piracy. And those are conservative estimates. Based on the evidence to date, it would appear that for every one person stealing EchoStar’s service in the U.S., there are as many as four or five people stealing DirecTv. The best available evidence suggests there are more than 1 million people stealing DirecTv in the U.S., with some saying that figure is no less than 1.5 million and as CONTINUED ON PAGE 6 RCA #89828 JPI-4C Pickup 7/31/02 page 3 8/15/02, 5:22 AM 6 SATELLITE BUSINESS NEWS Piracy CONTINUED FROM PAGE 3 much as 2 million. The number of people stealing EchoStar is estimated at 500,000, though some put the number lower and some higher. It should also be noted that those figures do not include those consumers who continue to subscribe to the lowest-cost programming they can from both DBS services and then attempt to steal premium channels, pay-perview, and sports packages. They believe this prevents them from being detected and affords them some legal and technical protection. ●Hackers appear to have as much knowledge of the DirecTv and EchoStar security systems as the companies themselves. Virtually no aspect of how the systems work seem beyond hackers. Indeed, were they not using their expertise in an illegal way, many of the software and hardware products sold by hackers would likely win awards for their design, ease-of-use, and innovation. ●DirecTv and EchoStar have ended what is referred to as the “plug-and-play” days of piracy, during which a consumer could send an access card to a hacker and get back a modified card that could be inserted into a satellite receiver and work for six months to a year without any interruptions. But in response to that, the entire nature and scope of satellite piracy has evolved in the past two years. This development has spawned what can only be described as an enormous subculture of American consumers who view stealing of DirecTv and EchoStar as both a hobby and a path to obtaining “free TV.” ●The supply of security cards and receivers, particularly for DirecTv, available for hackers and their customers is far larger than most industry executives have been told. In addition, this investigation has uncovered evidence that raises serious questions about whether DirecTv, and its vendors and customers, have taken the necessary steps to secure access cards from winding up in hacker hands. The Early Days Any real understanding of satellite TV piracy today has to begin with a brief look at the history of satellite TV subscription services and provide 89875p5-20r1.pm6 6 some basic information on how such services work. On Jan. 15, 1986, Home Box Office became the first cable programmer to scramble, or encrypt, its C-band programming signal and offer subscriptions directly to consumers. An analog DBS service called USCI had failed prior to that. HBO’s scrambling was the culmination a long and nasty battle within cable over satellite that took place as sales of C-band dishes were skyrocketing. A year earlier, more people had attended the satellite TV industry’s national convention than cable’s show. The scrambling debate caused a vast rift between cable operators—fearful about losing subscribers to satellite since the programming was “free”—and programmers who, while they had concerns about the cost and technology to encrypt their signals, also liked the idea of selling their channels to consumers without cable operators in the middle. HBO chose the VideoCipher II CONTINUED ON PAGE 8 Hackers Focus on DirecTv Card Programs At the end of June, DirecTv said it had 10.74 million authorized subscribers. Though the number of homes with more than one DirecTv receiver has significantly increased in the past few years. As a total of the overall base of DirecTv homes, those with more than one unit is at 25 percent to 30 percent. That puts the number of DirecTv authorized receivers at 14 million to 15 million homes. In the little more than eight years since DirecTv launched, more than 30 million receivers have been shipped in the U.S. The two largest receiver manufacturers, Thomson and DirecTv sister company Hughes Network Systems Inc. (HNS), account for some 25 million of those units. Thomson holds the biggest chunk of the market. Sony Electronics and the handful of other manufacturer who are now making DirecTv boxes, or have at points in the past (such as Uniden, Philips, Toshiba, and Panasonic) account for at least 5 million boxes. In addition, sources said, millions more access cards have been produced as replacement cards for those lost, stolen, damaged, or otherwise inoperable. While it is difficult to estimate how many additional cards have been made, most put it at no less than 3 million. Some argue it could be as many as 10 million. There are numerous methods to steal DirecTv. But the most common involve either sending a card to a hacker for modification, buying a reprogrammed card from a hacker, purchasing an external device to insert into a receiver, or acquiring a card programmer that enables users to reprogram their own cards. The first heavy sales of programming and external devices directly to consumers began the summer before the Black Sunday ECM. In the months after, those sales took off. Many hackers now sell far more of these units than they ever did cards, though they say sales of cards remain strong. A card programmer can be bought from some web sites for as little as $25 for the simplest units to around $175 for units with more capabilities. Prices have fallen steadily as more and more hacker web sites selling the devices pop up and as the price of other consumer electronic devices have dropped. A handful of programmers can modify both DirecTv and EchoStar cards. The first step usually requires visiting the web site of the hacker they bought the programming from to download a program to initialize the unit, a process known as “flashing” the main processor in the programmer, and program the cards. (See separate story on the Internet for more details on page 10.) There are many programs that can do this, but most hackers say the two most popular are ExtremeHu and WinExplorer. The programs are free and take only a few minutes to download even with a dial up modem. The start-up screen for the most widely used program to modify DirecTv access cards. The programming device received from a consumer has no software installed in it. Hackers believe this protects them legally because the programmers mostly use off-the-shelf computer technology and an easily obtained card reader/ programmer. As such, many hackers easily ship the devices into the U.S. and many have U.S. locations to ship from. At most, some hackers say, it costs them $50 to $75 to manufacturer the most sophisticated of the devices and far less for others. Consumers must then connect the device to a computer through the serial port. They then head to the Internet. It should be noted, however, that a cardinal rule of satellite piracy is never connect a telephone line to the back of a receiver used to steal satellite TV. Many hackers prefer WinExplorer to unloop DirecTv cards that have been hit by an ECM or software update, and ExtremeHu for programming cards. Users then download small files, known as scripts, to put on their cards to steal. Again, there are many ways to do this, but the three most common are: ●Cloning: Using the same method invented in VideoCipher days, the unique 8/15/02, 5:24 AM information in a card that has been used to legitimately buy programming can be duplicated into an unlimited number of other access cards. But only those channels that have been bought on the “master clone” are authorized in the clones. Pay-per-view, sports packages, adult programming, local channels, or special events that are not activated on the “master clone” cannot be viewed. But most pay-per-view movies, sports packages, adult channels, and special events than can be ordered through the onscreen ordering process can also be activated in the very same way a legitimate user can purchase them. Once $300 worth of programming is “purchased” with the card, it must be put back in the card programmer to have its “balance” set back to zero. That process takes about two minutes. ●Activation scripts: These scripts enable the user to steal all subscription channels, but not the pay-per-view, adult, sports packages, special events, and local channels. Again, any of those available via remote control ordering can be added, and the card then has to be cleaned when it hits $300. In addition, there is a more complicated process which users can add a specific bit of information to the card, known as a tier, to steal such things as sports packages and adult channels. Each channel or package has its own tier number and updated tier lists are widely available on web sites. Though activation scripts do not “light up” every channel instantly, many hackers believe they are less likely to be turned off. ●Three Musketeers (3Ms): This may be the most popular of all scripts, but many think it is the easiest for DirecTv to ECM. When a 3M script is programmed on a DirecTv card, every single channel— including pay-per-view and CONTINUED ON PAGE 16 8 SATELLITE BUSINESS NEWS Piracy CONTINUED FROM PAGE 6 system—then owned by M/ACom Inc., to scramble its signals, though there was by no means agreement that it was the best system. HBO had decided that the VideoCipher I encryption system was too expensive as a consumer product. Other programmers were unhappy with what they perceived as HBO dictating the choice. A group of programmers—Showtime, MTV (at the time, owned by different companies), ESPN, and Ted Turner’s CNN—even announced the formation of their own group to sell a package directly to C-band dish owners and were unlikely to use the VideoCipher II system. Cable operators quickly forced them to abandon the idea and use the VideoCipher II. The heart of the VideoCipher II (or VC II) system was a module component that could be inserted into standalone decoders and later integrated C-band receivers. The module contained a circuit board and other components, including key chips that contained the VideoCipher II software. In simple terms, there are two elements to any system to encrypt programming and sell it to consumers: the first is the encryption system itself. The other is what is known as “conditional access,” or the method by which individual decoders are electronically instructed to turn on certain channels and to turn off others. The conditional access part of the software has proven to be the door through which hackers can enter. In the strictest sense, hackers do not “break” the encryption system but electronically fool the conditional access system into activating some or all channels in a particular decoder even though they have not been legitimately subscribed to. Throughout 1986, other programmers threw the scrambling switch and sales of C-band dishes plunged. In June of that year, M/A-Com’s talks to sell certain assets, including the VideoCipher product line, to long-time cable equipment manufacturer General Instrument Corp. (GI) were reported. That agreement was signed on Aug. 5, 1986. Interestingly enough, GI had quietly contacted several satellite TV hands that summer to ask if the 89875p5-20r1.pm6 8 VideoCipher II system had been compromised. GI was told that hackers had been successful in cracking the VC II in labs and that a method to steal programming inexpensive enough for consumers was right around the corner. By some accounts, the first modification of a VC II took place in July 1986. Nevertheless, GI moved ahead with its acquisition. By November 1986, less than a year after HBO scrambled, GI engineers in San Diego, then home to the VideoCipher, had confirmed a consumer-level method for cloning the electronic identification (or unit address) of one VideoCipher into limitless other VideoCipher modules existed. By gaining physical access to the key chips in the VC II mod- ule, hackers were able to essentially duplicate the unit address of a VC II module that had been used to legitimately buy programming subscriptions into any number of other modules which had not been yet used to CONTINUED ON PAGE 10 Hackers Debate EchoStar Methods In some ways, the techniques and technologies used to steal EchoStar are very similar to those applied to DirecTv’s NDS system. In some ways, they are very different. But many hackers agree that EchoStar is more complicated and harder to hack than DirecTv, though some hackers would dispute that. In 1995, EchoStar turned to the Nagra system for its conditional access. That system was developed by Kudelski Group, based in Switzerland. The version of the system EchoStar uses is owned by NagraStar, a U.S. joint venture owned equally by EchoStar and Kudelski. NagraStar’s offices are housed in EchoStar’s former headquarters in Denver, which still remains home to many of EchoStar’s engineering and technical operations. Unlike DirecTv, which has worked with almost a dozen different hardware manufacturers over its eight years, almost all of EchoStar’s receivers have been produced by a component manufacturer formerly known as SCI Systems and now, as a result of merger, is called Sanmina-SCI. The company is based in Huntsville, Ala. Because its has kept a tighter rein on the manufacturing of receivers, and has ownership in the company that provides access cards, some argue EchoStar has more control over its technology than DirecTv has. Only two other hardware manufacturers, JVC and Philips, have made receivers for EchoStar. Philips is now back in the DirecTv camp. As such, piecing together a snap shot of EchoStar as it pertains to hardware and card production is a bit more difficult. But not impossible. EchoStar was slated to release its second quarter results after this publication was printed. At the end of the first quarter, it had about 7.16 million homes subscribing. If EchoStar nets a modest 200,000 additions in the second quarter, that would give it a total of about 7.4 million subscribers. EchoStar’s take rate on homes with more than one receiver has traditionally been higher than DirecTv’s, especially in the past few years as EchoStar has offered lease programs. Some put that figure at 40 percent, some as high as 60 percent. Thus, the best estimate then for the total number ference between EchoStar’s security system and receivers and DirecTv’s: EchoStar can download software into the unit that changes the basic software in the box as well as the card itself. This is known as “flash upgradable” technology. Only the latest versions of DirecTv’s receivers are flash upgradable. Those units, believed to total 4 million to 5 The start-up screen of a widely used program to program EchoStar conditional access cards. of activated EchoStar cards in the U.S. is 11 million to 12 million. Because of its corporate structure and relationships, fewer EchoStar receivers have been produced. Most put that number at 18 million to 20 million with about another 1 million to 2 million cards on top of that. EchoStar has never swapped out its access cards. But that does not mean there has only been one version of EchoStar’s card on the market. Much as GI did with the VideoCipher, EchoStar has distributed newer and different software on its cards. Four versions of the EchoStar Nagra card—known as “Rom 2,” “Rom 3,” “Rom 10,” and “Rom 11” have been released. But there is one critical dif- million, are identifiable because they are also the receivers that can accept a software download via satellite to activate the Wink interactive service. EchoStar’s ability to download software to its box, in addition to an arsenal of ECMs and hashing, has proved more of a challenge to many hackers. For example, at least one, if not two, iterations of EchoStar cards have been modified via satellite so that, in the case of the Rom 3, hackers now refer to two versions of that card, the “Rom 3, Revision A” and the “Rom3, Revision B”. As with DirecTv, there are many programs and devices used to modify EchoStar cards. As noted, a handful of the more expensive devices can program DirecTv and EchoStar cards. The cost of those, such as 8/15/02, 5:24 AM the Omega II, is now down to $150. According to hackers, the most popular and easy to use program for EchoStar cards is called NagraEdit. There have been several upgrades to that program. There are many similarities to programming cards, though it clearly takes longer to master NagraEdit than most of the DirecTv programming packages. It requires more steps and many, though not all, fixes for EchoStar require the extraction of keys from an EchoStar box by attaching a device and dumping the information into a software program. NagraEdit’s ability to repair cards hit by ECMs, which it calls “BugBusting,” also appears not to be as effective as WinExplorer is at unlooping. Many of the same programming techniques, such as cloning and 3Ms, are also used for EchoStar cards, though many use a different set of names. They often produce similiar results, such as with local channels, though EchoStar is using less spotbeam transponders than DirecTv. Another EchoStar spot-beam satellite should be launched soon. But many prefer to use external devices to steal EchoStar. The two most common are emulators and devices known as AVRs. An EchoStar emulator works on the same basic principal as a DirecTv emulator: attaching a small computer board to a computer via the serial port and then inserting another board into the EchoStar receiver’s card slot. For those who do not wish to devote a computer, there is the AVR, a self-contained unit that only has to be connected to PC for file updates via the Internet. Ask 50 hackers which way they prefer to steal EchoStar and each will offer a different view. It appears they agree CONTINUED ON PAGE 14 10 SATELLITE BUSINESS NEWS Piracy CONTINUED FROM PAGE 8 buy programming. Any channel bought with the first module could be viewed without a paid subscription on the cloned units. Those first cloning methods were expensive and cumbersome. Months after denying what it knew—that the VC II had been hacked—GI acknowledged the problem and said it was working on electronic and physical methods, such as putting epoxy cement over the critical chips in the module so they could not be tampered with, to thwart hackers. But by then, a satellite hacker underground had developed. Almost a year to the day after HBO scrambled, U.S. Customs detained some 120 people returning from a hacker summit in the British West Indies. Many of the hackers at that meeting were Canadian. Since the Canadian government barred most U.S. services from being legally sold in Canada, many Canadians turned to piracy, or in some cases using fake U.S. addresses to buy programming (the so-called gray market). The same held true in Mexico and the Caribbean. To this day, Canada, Mexico, and the Caribbean (places such as the Caymen Islands, the Bahamas, and the Turks and Caicos Islands) remain hotbeds of satellite piracy. Other first generation satellite encryption systems, such as Scientific-Atlanta Inc.’s B-MAC, used mostly in commercial markets, and the Oak-Orion system, used in Canada, suffered similar fates as the VideoCipher. GI employed various methods to crack down on satellite piracy. In March 1987, it spearheaded the first civil lawsuit filed against alleged satellite hackers. It developed different versions of the VC II software that were released in new modules as they were manufactured. In August 1987, it launched the first widespread ECM against modified modules. An ECM involves the transmission in regular programming signals of specific software, commands, and other information intended to identify hacked decoders, deactivate them, and, in many cases, render them useless to hackers for future use. In 1987, GI began an amnesty program under which 89875p5-20r1.pm6 10 consumers could turn in their “chipped” modules, no questions asked. GI had fired two employees at its Hickory, N.C., plant, where the modules were being sent, after it was discovered they were selling the modified modules. The “cat and mouse” game was in full swing. But the hackers had the upper hand. In November 1987, it was first reported that GI was developing a successor to the VideoCipher II system, dubbed the VC II Plus, in an effort to stop piracy. At various points, GI discussed how the VC II Plus system would employ new anti- piracy technology and software. They included a credit card-sized “smart card” that would contain many of the crucial encryption and conditional access software in chips and be inserted into the module. Later, GI said it would use a cartridge and not a card to house those chips and software. Like many, GI had come to believe that a relatively inexpensive method for changing out the decoders software had to be devised that would not entail a massive and expensive change out of modules. This idea became known as “renewable security” and was based on the premise that hackers could compromise any system given enough time and the only way to stay ahead of them was to upgrade the core security system used to protect programming quickly and inexpensively. The rollout of the VC II Plus system was delayed several times, mostly by technological setbacks. There was also a realization that the VC II modules in the field, some 1.9 million by then, would have to be replaced. How that would be done, and who would pay for it, became topics of much heated discussion. GI finally manufactured the first VC II Plus modules for consumers in January 1990. The first VC II modules were selfcontained, because GI had abandoned the idea of a card or cartridge for renewal security. The company had decided that such a card or cartridge would provide hackers too easy an access point to the software and chips that made up the heart of the security system. But by then, the satellite world was on the verge of major changes. Six months earlier, the first digital video compression systems were CONTINUED ON PAGE 11 Internet Plays Key Role in Piracy It is virtually impossible to understate the Internet’s impact on satellite TV piracy in the U.S. It would be equally difficult to estimate the number of hacker web sites in operation today. Entering the words “satellite” into any search engine often returns more hacker web sites than legitimate Internet retailers. Some hacker web sites seem to be sponsored site listings on search engines. Saying there are at least 500 hacker web sites is a guess. There may be far, far more. There are so many hacker web sites that there are hacker web sites that list and rate other hacker web sites, often a hundred at a time. Some of the sites have a basic design, intended to sell their wares and little else. Some begin with multimedia audio and video introductions that could easily stack up to the site of any major corporation. Many of the better known sites try to become one-stop shops for their customers. They not only sell a variety of hardware devices, such as card programmers and emulators, but also have file sections for customers to download the programs to modify cards, operate emulators and the like, and various unlooping and utility programs. Perhaps taking a cue from Ebay, some hacker sites have even begun auction sections. Many of the sites also have news sections, some centered on hacking information and some on general industry news. Not surprisingly, much of the “news” stories on these sites are stories that have appeared in trade publications and on other legitimate sites, often times barely rewritten to conceal their source. A number of hacker web sites also have what is called an “ECM watch” icon on their home page to alert users to any ECM that may be in progress using a classification system based on the Pentagon’s famous five level “def con” (meaning defense condition) system. A handful of hacker sites have even popped up that try to present real-time information on what specific hacking scripts for EchoStar and DirecTv are up and running at the moment as opposed to those that have been discovered and ECMed. A file to program onto a DirecTv or EchoStar card can take about two or three minutes to download since they are zipped. The names of the files also reflect the tone of the hacker world. In hacker circles, DirecTv is widely called “DAVE.” There are many explanations as to why and what the acronym may stand for. EchoStar is often referred to as “E*” and often as “Charlie,” in reference to its chairman and co-founder, Charlie Ergen. Numerous file names contain profanity. Most do not, such as “BYG HU3M 3.2.” Some come close, like “Dave Likes Sheep HU3M.” In both of these, the HU stands for the DirecTv P3 card, the 3M denotes a “Three Musketeer” file. Many EchoStar files have similar type names, though they often have a variation on “Sorry Charlie” theme, including those with profanity. Almost all of the larger hacker sites have forum sections that enable users to ask questions of each other or the web site operator, share information, and download “howto” step-by-step instructions on using various programs and hacking hardware. One of the most popular stops on many of these forums is the area for new users, often called “newbies.” The number of individuals visiting that part of many sites is a very real indicator of how fast piracy continues to spread. To participate in the forums, users must register and provide an e-mail address to receive confirmation. Nicknames and alias are almost always used. Many sites are completely free. Some are not, however, highlighting the rift that still remains in the hacker underground about what should be paid for and what should be free. There are dozens of free hacker web sites that each boast 20,000 to 30,000 members. A handful claim more. And there are some paid sites that say they have paid membership rosters that are almost hard to comprehend. The owner of one such well-known site has told colleagues that his site recently surpassed 150,000 paid members. At $70 per year. For that money, users gain access to private forums and what are known as private hacking scripts. Private scripts, which can cost $25 to $300, based on how long the hacker site “guarantees” it will work or be revised, are often sold as separate options on many sites. Many consumers opt for free scripts (called “freeware”) and many hackers are content to sell hardware to program cards and the free scripts to program them. Of course, many wonder why if any consumer can down- 8/15/02, 5:24 AM load a 3M script for free from an easily located web site, why DirecTv and EchoStar cannot do the same. Each script has unique identification embedded that is tied to a card number or subscription that can be read after the file is downloaded (Note:Satellite Business News is deliberately not providing extensive information on this subject). At that point, the DBS services can alter their data authorization stream to turn off that script or card. But many hackers say that some publicly available scripts can often run for a month or more before DirecTv hits them. Once that happens, after a day, a week, or more, the hacker site notes the script is “dead” and lists new ones to be downloaded. Most DirecTv cards have to be unlooped at the beginning of each cycle. Why it sometimes takes DirecTv so long to turn off freeware scripts, often far longer than EchoStar, is the subject of much debate in hacker circles. There are two other main Internet-based communications vehicles for the hacker underground. One is the various and well-known “newsgroups” that seem to have sections devoted to virtually every subject, group, and topic in life. There are about a dozen newsgroups devoted to satellite TV in the U.S., not all to hacking. One, “rec.video.satellite.tvro,” is for C-band system owners. But there are several centered on hacking. The most well known, the name of which will not be printed, can have CONTINUED ON PAGE 20 11 AUGUST 14, 2002 Piracy CONTINUED FROM PAGE 10 shown and GI finally acknowledged it was working on its own digital compression system, called DigiCipher in December 1989. In England, the Sky TV DBS service—the predecessor to today’s BSkyB— launched in February 1989 and included a smart card element in its units. That same month, NBC, Rupert Murdoch’s News Corp., Hughes, and Cablevision Corp. announced their ill-fated SkyCable venture. Like Sky and the short lived BSB service in Britain (which merged with Sky in November 1990), Sky Cable service planned to be the first true U.S. DBS service and would employ digital compression and high-power Kuband satellites to deliver hundreds to channels to cheap, small dishes. And on Nov. 12, 1990, a group of cable companies launched the medium power Primestar DBS service using a Scientific-Atlanta B-MAC analog receiver/decoder to deliver seven superstations and three pay-per-view channels. Yet C-band continued to flourish. Along with piracy. While C-band system sales were strong, and large numbers of new decoders were activated each month, hackers were claiming their share of the market. By Feb. 1991, the number of people turning off VideoCipher decoders was for the first time larger than the number activating modules for programming. And almost all the deactivations were the result of piracy. The number of modified VideoCiphers topped 1 million and some say approached 1.5 million. During those years, C-band’s efforts to combat piracy and the growing hostility toward GI, became something of a soap opera. There were task forces, promotions, and other attempts to stop hackers. But it was not until January 1992 that real progress was made, when major programmers agreed to help fund the swap out of all legitimate VC II modules to a new module called the VCRS. Some 250,000 VC IIs were eventually changed out with a VC II Plus module that included a smart card slot in the back. Most major programmers stopped authorizing any more VC II decoder modules on March 31, 1992, more than five years after the VC II was 89875p5-20r1.pm6 11 first compromised. Though the VC RS module has a card slot similar to those on DBS receivers, GI never developed plans to a distribute a card. That period also saw the real emergence of what is now called the hacker underground. Hackers quickly figured out other more sophisticated w a y s to compromise the VideoCipher. They developed the “Three Musketeer” software, also known as a “3M,” that stole all other channels after one inexpensive channel was legally subscribed to (hence the “one for all, all for one”). Later, they released socalled “Wizard” breaks, which repeatedly crunched their own authorization. There multiple variations and names for each hack that appeared. When GI 8/15/02, 5:24 AM tried to switch the codes it used to activate programming on a more regular basis, the hackers began releasing new codes that users could enter into their modified VideoCiphers via the remote control. CONTINUED ON PAGE 14 14 SATELLITE BUSINESS NEWS Piracy CONTINUED FROM PAGE 11 Though the Internet was in its infancy, personal computers were becoming commonplace. Many hackers set up their own bulletin boards (known as a BBS) where their customers could log on to get updates and hackers could share information. Hackers also figured out a way to connect a small modem (at 300 baud) to VideoCipher circuit boards so they would automatically dial into hacker bulletin boards for software updates. Some hackers used fax machines to disseminate information. Ways to modify VideoCiphers to steal C-band programming were openly advertised in magazines and in hacker newsletters. Numerous “how to” videotapes were produced, albeit not with Hollywood productions standards, to show people how to remove the epoxy from their VideoCiphers and modify them to steal. As they are today, Canada, Mexico, and the Caribbean were hotbeds of hacking, because the laws in those countries were ambiguous and there was no legal way to subscribe to U.S. services. But the U.S. had its share of hackers, mostly in the South and Midwest. Every module had to be physically modified. Thus, there were widespread reports at the time regarding allegations that some satellite retailers and distributors were involved in piracy. GI even cut off and sued its largest Canadian satellite equipment distributor, TeeComm Electronics, over allegations one of its branches was “chipping modules.” But some also pointed the finger at GI itself, claiming it leaked certain information to hackers to stoke the sales of VideoCipher modules. Unlike DirecTv and EchoStar, GI solely derived its satellite revenue from hardware sales. GI labeled such charges preposterous, though there is some evidence to support them. In 1989, the names of two GI employees appeared on an investigative report detailing a meeting of hackers and how they obtained technical information on the VideoCipher. One of the names was a well-known GI executive. Several GI hands believed those two individuals were not operating on their own. Why the FBI never acted on the information remains unclear. By the end of 1992, VC II Plus/RS authorizations were up sharply. A year later, the FBI and other law enforcement agencies lured hackers to a meeting in New Orleans to show a purported break of the new VideoCipher system. Though publicity about the looming launch of highpower DBS increased, so, too, did C-band sales. On March 22, 1994, Primestar began its transition to digital signals, using a GI DigiCipher receiver. And on June 17, 1994, DirecTv and U.S. Satellite Broadcasting Inc. (USSB) launched their services. EchoStar launched it service on March 4, 1996. C-band sales continued to be strong for a while, largely because there were limited supplies of DBS systems. But all that came to an end, and hackers began losing interest in trying to hack the VC II Plus/RS. GI was also bought and sold several times, including to buyout specialist Forstmann Little and Co., and later to its current owner Motorola Corp. EchoStar CONTINUED FROM PAGE 8 far more on how to hack DirecTv. That may, in part, be attributed to how EchoStar and DirecTv combat piracy. EchoStar relies almost entirely on technical measures and control over its boxes and cards. It is not believed that EchoStar and Nagra have ever filed a civil lawsuit against an alleged hacker. That surprises many considering EchoStar’s reputation for being a rather litigious outfit. In contrast, DirecTv and NDS, sometimes working together (though more often not in recent history) have filed dozens and dozens of civil lawsuits 89875p5-20r1.pm6 14 At the end of last month, DirecTv and USSB were taking there were 685,795 remaining place in Canada, Mexico, and VideoCipher decoders autho- the Caribbean, hackers in Eastrized. At its high ern Europe and point Video Ciwhat are now pher authorizaformer Soviet tions were about states were also 2.4 million. involved. To date, no Though opinion compromise of differs on this the VC II Plus/ point, some VCRS system has hackers say the ever been pubfirst real progress licly demonto break the Sky strated or conand DirecTv/ firmed. USSB security Ironically, systems took General Instruplace in those ment was the runregions. ner up in the But security sweepstakes to cards were in provide the conshort supply, esditional access pecially in the system to DirecTv U.S. The initial and USSB. But in price for a early 1992, DirecTv/USSB DirecTv chose Battery Card, the first system was Thomson Con- known hack of DirecTv. $699. (It was not sumer Electronics lowered until Inc., the U.S. unit of the giant June 1996 when EchoStar French conglomerate, as its lead dropped its system price to hardware vendor. Among other $199.) And Thomson was sellthings, Thomson owned the ing every DirecTv it could build, well-known RCA brand. For its taking only 10 months to ship conditional access, DirecTv its 1 millionth unit. DirecTv turned to what is now known as would authorize its 1 millionth NDS, a company founded in unit in April 1995. 1987 by Israeli engineers and By the summer of 1995, talk cryptologists in which News about a possible break of the Corp. later bought a control- DirecTv/USSB security system ling interest. That same com- intensified, fueled in hacker pany was also the principal circles by the appearance of security vendor for the Sky DBS devices to steal the Sky DBS service in England, which service. DirecTv, which made Murdoch also controls. all of its own security deciShortly after DirecTv and sions, denied the system has USSB launched, many of the compromised and said it was same hackers who had made not using the same technology millions in VideoCipher piracy as its British counterpart. By targeted the start-up DBS firms. the fall and early winter, the By now, the Internet and glo- rumblings about a compromise bal communications were com- were loud and persistent, and ing into their own. So while some hackers began selling much of the efforts to steal devices they said could steal against alleged hackers in the U.S. and Canada. DirecTv, as reported, is also in the process of sending out threatening letters to thousands of consumers whose names appeared on customer lists of hackers who have been raided by authorities or been exposed through civil suits. EchoStar also works with law enforcement. But EchoStar and Nagra do not appear to have as many people interacting with authorities as DirecTv and NDS do. Many hackers also say that EchoStar has been far, far more aggressive over the years in transmitting ECMs and other software updates to foil piracy than DirecTv and NDS have. Some argue that EchoStar’s system has more extensive ECM capabilities. The theft of DirecTv’s service has gotten immeasurably more publicity in North America than has EchoStar piracy. Many hackers say they have not focused as much on EchoStar because it is less popular in the U.S. among their customers. They say DirecTv is perceived to have “more to steal,” such as sports and pay-per-view. In contrast, some argue that EchoStar is more popular among hackers and their customers in Canada because of the much larger roster of foreign programming it offers and the big immigrant population north of the border. Moreover, since the Canadian ExpressVu DBS service uses EchoStar reception and Nagra security technology, many hackers say they can use the 8/15/02, 5:24 AM DirecTv and USSB. DirecTv continued to refute any and all such claims. But all that changed around Thanksgiving, when U.S. Customs detained a main trying to enter the U.S. from Canada in Blaine, Washington. Among other things, Customs confiscated DirecTv/USSB security cards and about 100 other small devices that looked like small computer cards. The individual detained was Troy Stewart, whose father was a well-known VideoCipher hacker who had been convicted of piracy. Customs had confirmed the existence of the first products to steal DirecTv and USSB, devices which were soon dubbed “battery cards.” Those devices were computer boards designed to fit exactly into the card reader of a DirecTv/USSB receiver like a legitimate card. They had a chip on the end, in the exact same place a security card did. At the end of the computer boards was a small battery to power the chip. Those battery cards, much as with early VideoCipher breaks, could be used to clone the information from a legitimately subscribed card into an unlimited number of battery cards. The battery cards were expensive, selling for as much as $800. And only a few hackers had the knowledge to build and program them. DirecTv continued to deny that it and USSB could be stolen. It did announce it had reached the 1 million home mark, some 16 months after launching. Though the battery cards paved the way for many of the hacking devices used today, they were problematic for CONTINUED ON PAGE 16 same technology to steal both. Many hackers say they have concentrated less on EchoStar than on DirecTv for a variety of reasons, though they have intensified their EchoStar activities during those periods in which DirecTv and NDS were aggressive on the ECM front. They also say that EchoStar’s pending purchase of DirecTv has caused them to spend far more time in recent months working on refining hacks for EchoStar. There is widespread agreement among hackers that there has been a spurt of activity on the EchoStar piracy front since the planned DBS merger was announced last fall, something that EchoStar and Nagra may not be entirely aware of.n 16 SATELLITE BUSINESS NEWS Piracy CONTINUED FROM PAGE 14 hackers. For several reasons, they often needed to be brought back in for re-programming. By then, hackers had begun getting their hands on more actual DirecTv/USSB security cards. Those cards were dubbed “F cards,” because of the printed letter that appeared before the card’s number. They were also known as “P1” cards, for period or phase one. Depending on which hacker takes credit, the first widespread re-programming of F cards began in the winter or spring of 1996. Again, however, few had the equipment and software to program the cards. Those who wish to buy the hacking software and hardware had to spend tens of thousand of dollars. Some hackers also began selling devices to steal the DBS services that, like the first battery cards, did not need a real security card to work. At the same time, the Internet began to flourish. And with it, various other methods, such as chat rooms, for people to communicate with computers also emerged. The foundation of what is today’s hacker underground and infrastructure was being built, and hackers could not keep up with demand. In order to steal programming, consumers generally had to take or send the DirecTv/USSB security card that came with their system to someone for reprogramming. Hackers also set up mail order businesses in Canada and the Caribbean and enticed thousands of people to send in their cards for reprogramming. Prices ranged from $300 to $500. For the first time, hackers also has a small supply of access cards to sell. In May 1996, with piracy in full swing, DirecTv announced it would swap out the P1/F card. There were 1.6 million authorized DirecTv/USSB receivers in use. A month later, DirecTv for the first time publicly acknowledged piracy when it filed a civil lawsuit against 11 alleged hackers. In June 1997, DirecTv and NDS deactivated the data authorization stream that was being used to activate the first generation of cards. A few weeks later, DirecTv proudly announced it had completed the swap out of all P1/F cards. There were 2.7 million receivers activated at that point. The new cards were called “P2s” or “H” cards. But because it had taken DirecTv more than a year to complete the switch, hackers had more than enough time to work on a P2/H card modification. Some argue the P2/H card hacks appeared immediately after the P1/F card data stream was turned off. Others say that it was a month or two after that. The evidence suggests that piracy never stopped between the first two generations of cards. In late 1998 and early 1999, the first hacks of DirecTv CONTINUED FROM PAGE 6 special events—can be viewed. Indeed, until last year when DirecTv launched its first spot-beam satellite for local channels, a 3M script allowed the user to watch every local channel DirecTv was uplinking from around the nation. For the most part, 3Ms can now only decode those broadcast channels in the spot-beam aimed at a particular area, as well as the national distant stations from New York and Los Angeles DirecTv sells to dish owners in socalled white areas. Most newer DirecTv receivers, including those that place local channels on the same number as their broadcast counterpart, can only receive one set of local channels at a time regardless of how cards are hacked. There are now versions of those scripts available that also enable the use of the recording function of the Ultimate TV and TiVo digital VCRs with- 89875p5-20r1.pm6 16 EchoStar’s DBS service were introduced. Theft of DirecTv and USSB was sprouting like fungus. By March 1999, Satellite Business News confirmed that DirecTv and NDS were preparing to unveil a third access card. The card, the “P3” or “Hu” card, also had a new graphic design. While DirecTv declined public comment, it also put out word that it intended to swap out all second generation cards for the new one. At that point, 6 million P2 cards were authorized in 4.7 million homes. But DirecTv never completed that card swap. In March 2002, when the first of DirecTv’s fourth generation access cards began to be distributed, 2.5 million to 3 million P2 cards—which had been introduced some six years earlier—were still authorized for use. Hackers successfully compromised the P3/Hu card in late fall 2000. Hackers now had a menu of products to offer. They could modify P2 and P3 cards. They also began to sell a variety of other devices to steal DirecTv and EchoStar, many of which did not involve insertion of a modified genuine access card. Totally bootlegged cards, dubbed “plastic cards,” were being sold by hackers. Theft of DirecTv with cards was reaching immense proportion. At various points, DirecTv and NDS transmitted ECMs and software updates, the most well out paying the monthly $10 recording charge. A 3M script, for example, inserted into a digital VCR can record all pay-per-view movies DirecTv is selling. The best analogy to how programmers are employed to modify cards is to compare the devices to floppy disk drives and the cards to floppy disks. In essence, programs such as ExtremeHu have become so sophisticated and easy to use that individuals can master the programs much as they learn how to navigate a new word processing, spreadsheet, or other software program. In some ways, the hacking programs are even easier. And upgrades are free. There have been several versions of ExtremeHu released that can be downloaded. One of the recent versions added audio effects to sound when certain functions were completed. Hackers also scored a major victory last spring when a new file was released that unlooped many cards that had been ECMed and can continually unloop cards even if DirecTv does manage to known of which is called “hashing,” to deactivate modified access cards. The most successful ECMs also destroy enough of the chip in the access card so that it cannot be again modified. In hacker circles, this is known as “99ing” the card, or more widely, “looping” the card. The Internet had afforded hackers a ubiquitous method to hawk their wares and communicate with customers. The number of hacker web sites seemed to double each month. Still, however, few had the hardware and software required to modify cards. Most consumers sent their access cards to hackers to be re-programmed or found someone in their communities who had programming equipment. Hackers offered numerous deals. For example, some hackers asked consumers to send them two access cards and in return they sent one modified back for no charge. Others sold modified cards. For a brief period, one hacker offered to program P3 cards sent to him for $20. These offers also signaled a change in the way many hackers conducted their business, and set the stage for how they steal DirecTv and EchoStar today. Many hackers also turned on each other, charging that some were selling programs and modification services too cheaply. Many hackers wanted to keep the software and hardware to modify cards in the hands of a select few. Not surprisingly, since they were en- temporarily render them useless. The first four letters of that file are U-L-F-S, which stand for “unloop for sure.” The unlooping procedure—(being described here in intentionally vague terms) which repairs the most basic information on a card’s chip and enables a file to be added in preparation for re-hacking—can often be the most time consuming part of the process for end users. It can take 10 minutes, a hour, or even longer for a card to be unlooped depending on how badly it was electronically damaged. But once that operation is successful, it can literally take a dish owner a few minutes to log onto a hacker web site, download a new script, write it to a card, and resume the theft of programming. The other principal way to steal DirecTv is through an external device. Again, there are far more types and names of these devices than can be listed. The generic name for them is an “emulator,” because the small computer board that either is the device or 8/15/02, 5:24 AM gaging in an illegal practice to begin with, some of the hackers tried to make quick money by “stealing” software from other hackers and selling it. Hackers also offered various “guarantees” and “customer service” plans to their customers. Since DirecTv and NDS had stepped up their ECM campaign, some hackers said that for a fee they would continually re-program ECMed cards for a year. Some hackers lived up to their offers. Many did not. In fall and winter of 2000, hackers, their customers, and DirecTv/NDS settled into a pattern. The hacking business was surging beyond any hacker expectations. And there were long periods during which DirecTv only transmitted software updates and not fullblown ECMS. The stage was set for Black Sunday. Hundreds of thousands of DirecTv access cards, if not more, had been turned off and looped that Sunday in January. Two days later, perhaps not coincidentally, EchoStar launched its most effective ECM ever. Theft of EchoStar’s system had been growing, too, but was in aggregate terms not as big as DirecTv piracy. For the next few weeks, there were few people in North America stealing DirecTv and EchoStar. Those who were had invested in external devices, mostly connecting to computers, that did not require the insertion of a modified access CONTINUED ON PAGE 18 is attached to the device and in inserted into the DirecTv receiver’s card slot to “emulate” or replace the card. The first emulators were released during DirecTv’s P2 card phase and many continue to operate today. The cost of emulators can vary, but has come down as much as the price of card programmers have and often can be bought for no more than $100. Some offshoots of emulators often work in conjunction with cards. In most cases, the emulators must be connected to a computer to work, as the PC becomes the processor feeding into the emulator with the use of yet another downloadable program. They can also be more complicated for those only with the most basic computer skills to use. Many hackers believe emulators are more reliable, can be continually updated, and are more advanced technically. Most interested in stealing DirecTv opt for card programmers. The opposite, detailed in a story on page 8, is true for EchoStar.n 18 SATELLITE BUSINESS NEWS Piracy CONTINUED FROM PAGE 16 card into a DirecTv or EchoStar receiver. A few weeks later, hackers began selling devices that were inserted into a DirecTv unit with its card placed on the device. But in the broadest terms, DirecTv and EchoStar had turned back the clock. Their battle with hackers was largely starting from scratch. The 19 months that have passed since Black Sunday have seen the hacking underground virtually re-invent itself. Average consumers can now log onto hacker web sites and for as little as $75 or $100 order a device to program their own satellite access cards in much the same way that hackers using devices that cost them tens of thousand of dollars did just a few years ago. In the wake of Black Sunday, many hackers decided that it was no longer practical, logistically or legally, to keep up with ECMs and the growing attention of law enforcement and use of civil law suits by having their customers send in cards for programming or reprogramming. Moreover, many of the cards looped during the ECMs could not be modified again and could only be used to steal DirecTv and EchoStar in conjunction with another device. Card Supply Satellite Business News’ estimates presented for the number of Americans stealing DirecTv and EchoStar were based on a variety of elements. No doubt the companies involved will loudly protest the projections as being too high, while hackers will claim the numbers are too low. And it is always difficult ascribing a specific quantity to a behavior that because of its illegality attempts to operate underground. The key ingredients in determining these estimates are: The number of people on the Internet involved in the pursuit of piracy; the number of devices, both cards and otherwise, hackers have sold to dish owners; the number of DirecTv and EchoStar subscribers who deactivate service each month (known as churn); and the number of DirecTv boxes and security cards available for nefarious use. One of the most important 89875p5-20r1.pm6 18 but least publicized aspects of piracy in the U.S. is the almost staggering volume of security cards, more DirecTv than EchoStar, that wind up in hackers’ hands. When it comes to explaining why, the finger pointing among the companies begins in earnest. But based on this investigation, there are four main avenues for cards to travel from legitimacy to piracy: Outright theft of cards by criminals, and in some cases, individuals working for the companies; Loss of cards through the transportation and shipping process; actual purchase of low-cost receivers simply to acquire cards; and churn, after which individuals sell or hack their cards. A closer look at each follows. ●Theft of satellite security cards has reached almost epidemic proportion in the U.S., even though it has received very little attention (See Satellite Business News, F e b . 27, 2002, for one of the few, if not the only, reports in the legitimate press.) Satellite TV access cards have become o n e o f t h e An emulator used most widely stolen contraband in the U.S. in the last few years, according to a number of sources. Though they would probably not admit it, virtually every major satellite distributor and large retailer has had an office, warehouse, or similar facility burglarized in an attempt to steal cards. Ironically, at least some of the theft, sources said, may been orchestrated by the surprising number of prison guards, sheriffs deputies, and other law enforcement officers in at least four states who have been charged in conjunction with satellite piracy. In addition, there appear to be several organized rings of professional burglaries who have traveled from state to state breaking into places where they could find satellite access cards. These thieves very often show no interest in satellite receivers, just the access cards in them. They know exactly where to cut a slit in cartons so the access cards can be quickly removed without opening the cardboard box. According to several sources, law enforcement authorities have apprehended or identified at least two small groups of professional thieves who were driving from state to state to steal cards. But there are far more people trying to steal cards. Satellite TV cards are extremely attractive targets for thieves, several sources said, because they can be sold for a very high return, can be easily transported in large numbers without drawing much attention, and involve far less danger than, of course, drug trafficking does. As several investigative sources noted, law enforcement does not train dogs to sniff out DirecTv and EchoStar access cards. ●The transportation and shipping of cards and satellite receivers has also produced a major rash of card theft. Where for the EchoStar system. this type of theft occurs is hotly debated. Every company who handles cards vehemently maintains it has had few, if any, security lapses. What is clear is that a massive amount of cards has been lost when satellite receivers and complete systems are shipped to satellite distributors and large consumer electronics chains, and from satellite distributors to independent satellite retailers. Several sources said that entire truckloads of satellite receivers, perhaps 500 to 700 at a time, have disappeared in recent years. In several instances, distributors have opened the back of trucks expecting to find full loads of satellite systems and found none. The trucking business, which has always had its share of security concerns, is also a major thoroughfare for card theft. According to numerous sources, most manufacturers and distributors use what are known as shipping aggregators to reduce their costs when they are transporting loads that fill up less than a full truck. These aggregators move freight much like an airline uses a hub to move people. Smaller shipments are sent to a central location and then combined with other shipments destined for the same area. One of the chief focal points for shipping aggregators is Chicago. That is why, several sources said, thousands, if not more, sat- A widely used emulator for DirecTv. ellite TV access cards have en- as any trucking company. Even when the correct numtered the Chicago area never to reach their intended desti- ber of satellite systems and renation and customer. Interest- ceivers wind up at, for exingly enough, several of the ample, a satellite distributor, it biggest hacker web sites ship does not mean there will be an their products from the Chi- access card in each box. Numerous sources said thieves can cago area. Several sources open a carton, remove the sea l s o d e s c r i b e d curity card, and then so exFederal Express, pertly reseal the carton that it is and its main hub difficult to tell the box has been in M e m p h i s , opened without close inspecTenn., in similar tion. In other cases, distribut e r m s . O t h e r s tors and large retailers have strongly defended received pallets of satellite sysFedex and said it tems and receivers to find that had some of the only those units on the outside best physical se- of the pallets have not been curity of any ship- opened and had their security cards removed. In other words, ping company. Likewise, it is every box on the inside that is difficult to gauge obscured had its access card how much of a role stolen. ●Almost every company acUnited Parcel Service (UPS) shipments play in tive in the satellite TV business satellite cards being stolen. has had its own security probMany distributors use UPS to lems. Just a few weeks ago, a ship smaller numbers of satel- security manager for Thomson lite reception systems to inde- Consumer Electronics in Texas pendent satellite dealers. Sev- and Mexico was arrested by eral industry hands described the FBI in conjunction with the the same scenario: In order to theft of 52,000 DirecTv P3 cards save the dealer money, they (See “DBS Notebook,” p. 1). About three or four years put a number of satellite receiver cartons into one larger ago, a Thomson employee in Indianapolis was arrested for carton. When UPS drivers deliver selling security cards. At the the carton, they require the time, Thomson was providing recipient to sign for the ship- logistical services for DirecTv. HNS’ manufacturing plant in ment before it is opened. But is it not until after the driver is Shady Grove, Md., where the long gone that the retailer ex- company often produces initial amines the packing slip, opens runs of its receivers, had a sethe larger carton, and realizes curity problem and was forced that he or she has a signed for to restructure how it processed a shipment that does not con- cards. An HNS security mantain the same number of satel- ager, sources said, actually relite receivers listed on the pack- signed in a dispute over how to secure cards. A similar probing slip. Opinion varied on how lem happened to Philips, when widespread this problem is, and it manufactured receivers for whether UPS employees are EchoStar in 1999 and 2000, directly involved. Some argued with some sources saying they CONTINUED ON PAGE 20 UPS is as much a victim of theft 8/15/02, 5:24 AM 20 SATELLITE BUSINESS NEWS Piracy CONTINUED FROM PAGE 18 believed that may have been one the largest supplies of EchoStar cards to wind up in hacker hands. EchoStar also lost major quantities of cards through Sears retail outlets. A large number of EchoStar access cards were stolen right out of display units at Sears, though some apparently from stock as well. Then there is Mexico. Many consumer electronics companies, including HNS, Thomson, and Sanimina-SCI, have manufacturing plants in Mexico. The companies often try to locate the plants as close to the U.S. border as possible, and thus such places as Juarez, Mexico, right over the border from El Paso, Texas, are home to several plants—including Thomson and Sanmina-SCI facilities. HNS has plants in Tiajuana and Chihuahua, Mexico. GI made VideoCiphers at a plant in Juarez. Several hackers claim that they have made repeated trips over the years to Mexico and bought volumes of both EchoStar and DirecTv security cards. The hackers refused to identity which plants were involved or how many cards they bought. Several also said they had visited the region in the VideoCipher days as well. Several investigative sources confirmed that security of many high-tech products made in Mexico for U.S. companies has been a problem, as evidenced by the recent arrest. But the hackers’ specific claims could not be independently verified. ●In many cases, hackers do not have to venture to Mexico to illegally purchase satellite access cards. They have been legally able to cheaply purchase them in bulk by walking right into the front door of some the best known retailers in America. Strictly in terms of security, DirecTv’s campaign to maintain distribution exclusively at major consumer electronics stores has actually helped EchoStar. For years, hackers could walk into numerous retail chains— such as Best Buy, Circuit City, Radio Shack, and Wal-Mart— and buy all the inexpensive DirecTv systems they wanted. In reality, even if they removed the access cards and threw the antenna and receiver in a dumpster, hackers could sell the cards and still make a tidy profit. In June 2000, DirecTv implemented new procedures that required even those buying systems with cash at the chains to put down a credit card. If the system was not authorized for service within nine days, the credit card was charged $200. DirecTv had years earlier established a program, tied to commissions and charge backs, for independent satellite dealers that made if very costly for a dealer, and the distributor who provided the unit, to sell a system that was not authorized. Even after DirecTv’s new security measures went into effect, there were many local chain outlets lax on adhearing to the rules. Even today, field reports indicate there are some Best Buy and Circuit City stores that occasionally sell DirecTv systems for cash, no questions asked. Wal-Mart continued to sell DirecTv systems for cash. Often for as little as $49. Inasmuch, hackers say, for about two years, ending last fall, WalMart, became one of the largest suppliers of DirecTv security cards ever. Many Canadian hackers or their associates drove Internet CONTINUED FROM PAGE 10 more than 350,000 messages posted spanning a few months—and growing daily. Each message can contain only specific message (known as a “thread”) or many. Another less widely known method of communication is the “Internet Relay Chat,” or simply the “IRC.” To use the IRC, consumers must download a small “client” program, have any type of Internet connection, and know which “chat room” to enter. Registration is not required, and nicknames and 89875p5-20r1.pm6 20 from Wal-Mart to Wal-Mart buying up entire stocks of DirecTv systems and paying cash. Though they were required to provide a name to complete the sale many used false ones and fake driver’s licenses. They immediately removed the cards from the systems. Sometimes they shipped the units back to Canada using such places as “Mail Boxes Etc.” But there are also numerous first-hand reports of garbage bins full of DirecTv systems behind or near Wal-Marts. A year ago, DirecTv publicly proclaimed it was going to remove the security cards from systems shipped to major chains, including Wal-Mart, and began sending the cards directly to consumers once a credit card was verified and a subscription ordered. However, DirecTv scrapped the program, or by some accounts, never really implemented it, at Best Buy and Circuit City. This past May, Wal-Mart decided to stop maintaining inventory of DirecTv systems, instead offering certificates that could be redeemed for a system sent by DirecTv. Blockbuster, which recently said it was no longer pushing DirecTv, also operates under the certificate program. Best Buy may follow on some basis. Just this month, Wal-Mart stores started stocking Thomson built RCA brand EchoStar systems with cards. But EchoStar is going to charge no less than $149 for a single receiver system and then rebate most or all of that back via programming credits over a year. Many will be closely monitoring EchoStar’s Wal-Mart experience. ●Churn is another major source of cards and DBS equipment for hackers and their customers. Churn has been among the biggest problems both ser- aliases abound. Many of the bigger hacker web sites also sponsor their own IRC “channels.” There are also hundreds of IRC channels devoted to endless subjects and topics. Perhaps the best way to describe an IRC chat channel is to compare it to AOL or Yahoo instant messaging. Only in the case of the IRC, an unlimited number of people can instantly communicate with other users simultaneously while everyone else sees each and every message being sent back and forth. Many hackers and their customers like the IRC because messages are not archived or wind up on any server. It is not unusual to log onto a IRC vices have faced. For example, in its most recently reported quarter, DirecTv reported gross activations of 654,000 but net sales of 202,000. That means some 452,000 DirecTv homes deactivated service. EchoStar has reported similar results over the years. Churn is always a factor in any subscription service, including cable. But cable customers who turn off service cannot sell their equipment to hackers. It would be impossible to estimate the number of classified ads, in newspapers, in local weeklies, in supermarket shoppers, employed by individual trying to sell DirecTv and EchoStar systems. But the Internet auction site eBay, a national marketplace, illustrates the situation. When the names of the DBS services were entered into the site’s search engine, it returned “998 items found for DirecTv” and “957 items found for DISH Network.” Though not all of the items were satellite receivers, and it appeared that at least some of the products were being sold by retailers and not individual consumers, the vast majority items being put up for auction appeared to be satellite receivers and systems that individuals were trying to unload. Indeed, the way the items were listed for auction also served to underscore how satellite piracy has become so commonplace in the U.S. Little pretense was offered on why the systems were being sold. In the DirecTv section, the type of security card was almost always the first part of the description of the item, followed by the receiver model. Examples included, “VIRGIN HU CARD/Hughes E1 New DirecTv Receiver” and “Virgin DirecTv DSS P4 Access Card/ pirate channel and find 25 people chatting. And there can often be 50 or more. So many people are “chatting” with each other at one time that it can be difficult to follow any one ongoing exchange. The IRC is where many newcomers to hacking head for help. The channels allow hackers to provide “real-time” help to “newbies” and very often a number of experienced programmers will collectively chat with an individual to help him or her solve their piracy problem. Users can also instantly send files to each other, such as when experienced hackers send instructions or hacking utility files to others. IRC chat 8/15/02, 5:24 AM Receiver.” Separate DirecTv access cards, including the P4, were also being auctioned. In the EchoStar section, the type of security card often was not listed. The focus was far more often on the receiver. It appeared the only reason that the card type was listed was to entice those who wanted to steal EchoStar. Examples of this included: “Dish Network 3700, 288-02 card and Box Keys” and “DISH NETWORK 4000 RECEIVER W/OPEN ROM 3 CARD.” Other Issues There are a number of other issues to be briefly explored to round out the discussion of satellite TV piracy. They are: ●Every major player in the satellite TV business that impacts piracy was asked to comment for this story. EchoStar, NagraStar, Thomson, and HNS declined comment. In the three weeks before this story went to press, Satellite Business News repeatedly asked DirecTv for comments and to interview Larry Rissler, vice president in charge of its signal integrity office, and Dave Baylor, DirecTv’s executive vice president of technology and operations. No such interview or comment was forthcoming. The only company to publicly comment was NDS Americas, DirecTv’s security vendor. As reported, the relationship between NDS and DirecTv has soured, and DirecTv sued NDS in December over their contractual relationship and other issues. The lawsuit was quickly settled, but DirecTv has publicly stated it is going to sever its ties to NDS. NDS America’s Vice President and General Manager Dov Rubin disputed any suggestion that no less than 1 million are stealing DirecTv. “It’s not CONTINUED ON PAGE 21 rooms also have their own rules, etiquette, jargon, and acronyms. Indeed, the amount of time some dish owners spend communicating with each other on how to steal DirecTv and EchoStar raises one fundamental question: How much time do they have to actually watch the TV they are stealing. The web site forums and IRC channels also provide the best evidence of how piracy has developed into its own sub-culture, sometimes appearing to be a social activity as much as a hacking endeavor. Many exchanges have nothing to do with satellite or piracy.n 21 AUGUST 14, 2002 Piracy CONTINUED FROM PAGE 20 as high as people would believe,” he said. He declined to offer an alternative figure. Rubin argued the relationship between DirecTv and NDS is not having a negative impact on security. He repeatedly said that decisions regarding security were “totally their call,” in reference to DirecTv. Yet he also argued that NDS would be taking a different approach to fighting piracy than DirecTv is. Security, he said, “needs to be a multi-prong approach” using operational, legal, ECM, and technological means in addition to regular card swaps. “I don’t think they are doing all of those aspects,” Rubin said of DirecTv. “I think they could do more.” Asked how NDS would act differently, Rubin pointed to the fact that there are millions of P2 cards that have never been changed. DirecTv’s security program is “certainly different than the way we would have done it,” he said. Rubin also bristled at the suggestion, often voiced in private by DirecTv executives, that NDS’ security system was so inferior and inadequate that it does not make sense to waste money on card swaps. In the past, many DirecTv executives have, for example, also said they did not transmit more ECMs because NDS engineered ECMs were imprecise and sometimes deactivated legitimate cards. Given DirecTv’s customer service problems, it said it did not want go generate any additional calls to its telemarketing backrooms as a result of wayward ECMs. Rubin claimed that NDS access cards are being used by satellite services in more than a dozen countries and that with the exception of some older cards now being changed out in Brazil, DirecTv’s card is the only compromised NDS card in use globally. There have been 13 versions of BSkyB cards over the years, including its migration from analog to digital signals. According to Rubin, the current BSkyB card is “absolutely secure.” At various points, BSkyB’s piracy problem easily rivaled DirecTv’s and some hackers claim a hack of the current P1 digital card is imminent. Rubin also maintained that NDS has “absolutely never” lost a security card in transit and “zero information” has ever found its way into hacker hands from inside NDS. Indeed, he argued NDS has become a “very convenient whipping boy for other problems” at DirecTv. Rubin confirmed that DirecTv has a license to continue to use the NDS system once the existing contract between the two companies expires next August. NDS has no idea what will happen at that point, he said, because of EchoStar’s pending acquisition of Hughes Electronics Corp. and DirecTv. ●The proposed merger of the nation’s DBS services has been a hot topic in the hacker underground for months. Hack- Merger CONTINUED FROM PAGE 4 the lawmakers wrote. In a response, EchoStar contended there were “many factual errors” in the letter and said the merger “can provide more Hispanic programming.” Independent satellite TV dealers also spoke up against the merger. DBSinstall.com, a Washington statebased association representing DBS installers, along with more than 20 independent satellite TV dealers, registered opposition to the merger with the FCC late last month. Congressional supporters of the merger, who are far fewer in number, also continued to argue their case. Rep. Rick Boucher (D-Va.), along with Reps. William Clay (D-Mo.), Dave Hobson (R-Ohio), and Bennie Thompson (D-Miss.) signed their names to a 89875p001_4_21_24r1.pm6 21 ers make no bones about it: They never want to see the DirecTv NDS system vanish. But many hackers believe the NDS system will be scrapped one day, even though it may take as long as five years because, they argue, DirecTv would have to a change out all security cards and some 10 million older DirecTv receivers. Given that, many hope if the merger takes place, EchoStar would continue to use the Nagra system it now does. While many hackers concede the EchoStar security system is more complicated for them to compromise, they have been devoting more time and resources to it since the merger was announced. The worst-case scenario for hackers is that DirecTv and EchoStar remain apart and both upgrade to new security systems. That would require the expenditure of money to hack two new systems and that double investment would have to be recouped over two customer bases—something they do not like because progress on two systems can proceed at different rates. In that sense, many hackers say that if they are going to have to start from scratch at some juncture, they support the merger for three reasons: the aforementioned cost to hack one new system versus two; the mammoth customer base a combined DBS service would present to hackers to hawk their wares; and the fact they do not believe any U.S. DBS service with 15 million or more homes, and even more cards, could com- letter sent to Attorney General John Ashcroft and FCC Chairman Michael Powell July 25 urging that the agencies approve the combination of the nation’s two main DBS services. “We believe that this merger will improve Americans’ lives,” they wrote. “The merger will enable the combined entity to provide greater programming options, more local channels, and high-speed Internet access at a competitive price to even the remotest area of the United States. Those benefits to rural America are too great to ignore.” An EchoStar call center is one of the largest employers in Boucher’s congressional district. As the political posturing continued, one representative kept shifting his views. Rep. Sam Graves (R-Mo.) switched his position on the merger again. Graves initially voiced concerns about the merger, but in June changed his position, and said he supported the plete a total change out of it cards before hackers were able to crack the newer card. ●As for the newest DirecTv card, the P4, many hackers say its compromise is complete and should become available for sale next month. Satellite Business News is unable to verify that claim. In addition, as reported, many question how a P4 can be confirmed as long as the P2 and P3 data authorization streams are deactivated. Methods to electronically or physically “revert” new cards to older software versions have often been used to claim a hack of the newer card. When the P2 data stream, in use for some six years, will be turned off, remains unclear. There has been some indication DirecTv hoped to this month, but that has been pushed back until next month. Hackers do seem to be getting their hands on ample supplies of P4 cards, even though DirecTv began its conversion in March. By late May, hackers said they were offered the first small batches of P4 cards for about $200 each. That price has dropped sharply as the supply increased, with some hackers now saying the cost to buy them is down to around $100 for larger lots and a bit higher for smaller numbers. The going rate on the Internet for a unmodified P4 card varies, but is generally around $150 to $200. P3 cards go for $75 to $100. P2s and EchoStar cards run about $100 to $200. Hackers refuse to say where they are obtaining P4s, though they point to past sources of P2 merger. Now, Graves has again switched back to opposing the merger, according to a letter he sent to the FCC late last month. The FCC is wrapping up its review of the merger, Media Bureau Chief Ken Ferree said. Ferree hopes to be able to send a recommendation about the merger to the commissioners in four to six weeks, according to FCC spokeswoman Maureen Peratino’s account of remarks Ferree made at a cable conference Aug. 1. Even after Ferree submits the Media Bureau’s recommendation, it is expected the FCC commissioners could take several weeks to issue their final decision. Though letters of opposition from various lawmakers continue to come in opposing it, EchoStar continues to be optimistic that the government will approve its proposed purchase of Hughes and DirecTv. “Things are moving ahead...Every- 8/15/02, 5:22 AM The Omega II, one of the few devices that can program DirecTv and EchoStar cards. and P3 cards. DirecTv is sending cards to consumers from two main points: a mail house in San Diego which primarily using Federal Express to ship cards, and a company called Metaca Corp. Metaca provides, among other things, smart management services to various industries. CONTINUED ON PAGE 23 thing is green as far as we’re concerned,” EchoStar Executive Vice President Jim DeFranco said during a recent uplink with retailers. “We are moving forward as a very good pace. I won’t go into the details, but we’re more optimistic than we’ve ever been that this will go through.” DeFranco also again made a pitch for retailers to send letters to Congress and the FCC urging approval of the merger. Meanwhile, the National Rural Telecommunications Cooperative (NRTC) continued its lobbying effort against the planned merger. “For 25 million rural American households, the merger would replace a thriving, competitive [multichannel video] marketplace with a monopoly that would eliminate choice, reduce service quality and chill innovation,” the NRTC told FCC Commissioner Kathleen Abernathy (R) in a meeting last month.n 23 AUGUST 14, 2002 CONTINUED FROM PAGE 4 month in responses to the FCC’s annual request for comments for its assessment of the status of cable competition. In separate filings, DirecTv and EchoStar contended their proposed merger would increase the ability of DBS to compete with cable. DirecTv also asked the FCC to “proceed with care” in processing nongeostationary satellite orbit fixed satellite service applications to ensure they do not cause interference with DBS services. The DBS company also asked the FCC to expand rules on installing satellites in apartment buildings to include areas in which renters and owners do not have exclusive use of areas suitable for antenna installation. EchoStar reiterated its opposition to the terrestrial loophole in the program access rules and asked the FCC to close the loophole through regulation, or ask Congress to close the loophole through legislation. “The refusal by certain cable operators to sell their terrestrially delivered Piracy CONTINUED FROM PAGE 21 But what truly stunned hackers is where Metaca is located, and thus where DirecTv is shipping large quantities of P4 cards to: Ontario, Canada. Hackers were equally surprised and exalted as word that big shipments of P4 cards were heading into Canada. Many did say that even they had a hard time understanding why DirecTv, even under the best intentioned security, would risk sending large volumes of P4 cards to the worldwide capital of DirecTv hacking. Some hackers cracked that they had not been so amazed or happy about a DirecTv move since they learned, just a couple of months ago, that the DBS company is not requiring consumers to return P2 and P3 cards as a part of the P4 change out. Metaca is sending cards to consumers via regular U.S. mail using return addresses in Canada and Buffalo, New York. But reports are increasing that significant amounts of P4 cards are being damaged in the mail 89875p001_4_21_24r1.pm6 23 programming to DBS operators is a textbook example of a firm using its market power to diminish competition,” EchoStar said. “The terrestrial delivery of programming is bound to increase, while at the same time, local and regional programming such as home team sports and local events becomes ever more valued by consumers.” The SBCA also asked the FCC to close the loophole and said cable still has more than 75 percent of the market which gives it a “powerful advantage” over any “potential competition.” The National Cable and Telecommunications Association (NCTA) bemoaned the competition its members received from DBS, a “strong nationwide competitor whose market share continues to grow,” adding, “DBS has proven to be an enduring and inventive competitor to cable.” Meanwhile, the state of Hawaii said the most significant development for its consumers in the past year was the June order by the FCC reinforcing DBS services rules to the state. Hawaii also said it was an “encouraging development” that EchoStar offers local channels in Honolulu. Hawaii was not as happy with DirecTv’s service. “The state has yet to receive any indication that DirecTv is taking steps to come into compliance with the commission’s geographic service because they are being sent with no special packaging and in a large paper envelope. Automated post office processing machines may be damaging some cards. There also seems to be several grades of plastic being used to make P4 cards, some of that are considerably thinner than the earlier cards. That is contributing to the damage, by some accounts. DirecTv has said the failure rate of P4s is very small. ●Hackers also offered their views on whether the Canadian Supreme Court ruling in April barring the use of U.S. DBS systems in Canada was going to put them out of business. That ruling is now being appealed. Many hackers admitted that those who were openly advertising hacked U.S. DBS cards in Canada, and some with retail locations that were doing so, are taking a more low key approach. But many hackers said they expected the ruling and had been preparing for some time to move their web sites out of Canada. Many have shifted their businesses to the Caribbean, to places like the Caymen Islands, the Bahamas, and the Turks and Caicos, to name a few. But rules...and will contact DBS licensees about their efforts towards compliance. If the state’s inquiries identify a potential lack of compliance, the state will bring the situation to the attention of the commission.” Hawaii reiterated its objection to SES’ planned U.S. DBS service because SES has not committed to offering service to it or to Alaska. HSatellite TV has failed to keep cable prices or quality in check, Consumers Union contended in a report issued July 24. “Cross-technology competition from satellite is weak,” Consumers Union said in the report. “Unfortunately, because of its cost and characteristics, satellite has fallen far short of providing widespread, vigorous competition.” Consumers Union argued that the government should take more action to promote competition to cable. Among other things, Congress and the FCC should grant Northpoint a free, national exclusive license to use the DBS spectrum to offer a terrestrially delivered multichannel video service. Congress should also close the terrestrial loophole that allows cable operators who own programming to bypass the program access rules by delivering their channels terrestrially, rather than by satellite, Consumers Union said.n some say those islands have received too much publicity as hacker havens and point to the FBI’s recent move to seize funds from banks accounts in the islands of an alleged hacker as proof of that. Many hackers say they plan on moving their web site servers to Eastern Europe and Hong Kong, where they believe they will be much tougher to track down. Some also think that the enormous financial infrastructure of a place like Hong Kong is an ideal location for hackers to base their finances. ●Finally, a note on cable TV piracy in the U.S. DBS Services have often argued that their security problem is relatively small in terms of dollars lost as compared to cable theft. That may be accurate. The cable industry estimates it loses $6 billion per year to piracy, though a number of cable industry sources said that figure is inflated for political purposes. Cable conspiracy has slowed somewhat, as satellite theft grows. In the 1980s and early 1990s, cable piracy was booming. That pirate underground was in many way similar to today’s satellite underground VideoCipher Module Deauthorizations Fall Slightly The number of C-band dish owners deauthorizing VideoCipher modules dropped by more than 1,000 last month, after rising slightly in June. According to Motorola’s Access Control Center, 15,081 C-band dish owners turned off their modules, offset a bit by the 105 who authorized them. After accounting for the net loss of 14,976 deauthorizations, the total number of authorized modules now stands at 685,795. The number of authorized modules has not gone below 700,000 since the early 1990s. At its high point in the middle 1990s, there were more than 2.4 million authorized VideoCipher modules. Since February, the monthly net total of deauthorizations has stayed within the 15,000 to 18,600 range.n 2002 Net VideoCipher Deauthorizations January .......................... 56,433 February ........................ 17,376 March ............................. 16,931 April.................................18,699 May..................................15,990 June................................16,266 July..................................14,976 Total Net Deauthorizations 156,671 Remaining Authorized Modules 658,795 but smaller and somewhat less sophisticated. Interesting enough, one of the main sources for cable pirates to buy converters to be modified was what was then called the Jerrold Division of none other than General Instrument. There are key differences between cable and satellite piracy. For one thing, a very small number of people “climb the pole” to connect a cable to their home to steal it. It is also very detectable, except in multiple dwelling units, where residents sometimes “share” a cable feed. Almost all cable theft involves a legitimate subscription to a small basic package and then the use of a bootleg cable converter to steal pay channels, pay-per-view, sports packages, and big events. In that regard, cable piracy is vastly different than satellite theft, though, as noted, some consumers do steal satellite the same way. In addition, because cable is a series of local operations, cable pirates have to maintain a database of which cable boxes work for each local system. And as more cable systems switch to digital signals, they can more 8/15/02, 5:22 AM readily, because of cable’s twoway nature, use technical means to identity cable pirates. As much as cable as done to combat piracy, it, too, may face a new threat. The far reaching 1996 Telecommunications Act required cable to make its set top boxes available for sale at retail, a move cable loudly opposed. Some members of Congress, angered over high cable rates, believed forcing cable to sell set top boxes at retail would lead to more competition and lower prices. But that would also involved cable separating the security function of its set top boxes in much the same way satellite receivers now work. The FCC proceeding on the issue continues and there was some indication cable operators would have to begin implement the new regime this year. But perhaps because of satellite piracy, some now sense there is no rush to force cable boxes into Circuit City and Best Buy. If that does happen, however, digital cable boxes may soon resemble satellite receivers even more than they now do. For they would likely employ an access card.n