SlideShare a Scribd company logo
The enterprise of
subscription TV piracy
A mid level overview of (DVB) Digital Video Broadcasting content theft
Presented at Sectalks (Perth)
November 7 2017
By Sabastion F
Introduction
The purpose of this presentation is to provide an end to end awareness
of encrypted satellite and cable tv piracy. Also includes bit of technical
history and where it is heading with the current advancement of
technology.
We will be touching on common InfoSec elements including
• Reverse & social engineering
• Criminal organizations
• Investigations
• Operational security, from both vendor and content providers
Disclaimer
• I am NOT
• A lawyer
• A criminal profiler, investigator or any member of law enforcement
• An employee or advocate for any content protection service
• Commissioned to conduct research on any content protection
systems
• IMPORTANT
This presentation is not an endorsement or meant to encourage the attempted
circumvention of encrypted DVBS content. It is designed to explain piracy and
anti piracy techniques used in the realm of piracy and cybersecurity as well as
social drivers that support this industry.
Your Presenter
Who Am I
• A telecommunications and IT technician
• Work in the telecommunications industry for a large part of my
career and specializing in satellite communications and network
infrastructure.
• According to my partner - On the spectrum and have a overactive
tendency for reverse engineering. Which includes the kids toys.
• Currently working towards a career in information security
Summary of what were going to cover
• Basics of satellite broadcasting
• General overview of DVB content encryption and decryption
• Introduce the players
• The common criminal enterprise
• Counter measures
• The effects of DVB content piracy
Public acceptance of content theft
Homer: [reading the "So You've Decided to Steal Cable"
pamphlet] So you've decided to steal cable. Myth: Cable piracy
is wrong. Fact: Cable companies are big faceless corporations,
which makes it okay.
Captain Midnight Vs HBO - 1986
The HBO uplink hijack on Galaxy 1 was to protest against charges for access to
scrambled satellite channels by HBO
Satellite Broadcasting structure
Receiving Equipment
• Satellite Antenna / Dish
• Satellite receiver with a (CAM) conditional access module or
embedded decryption module
• Subscription smartcard
• Television
Encrypting the content
• DVB or Digital Video Broadcasting uses Common Scrambling
Algorithm (CSA) to encrypt or scramble the channels.
Decrypting the content
• The CSA algorithm uses 64 bit decryption. Different proprietary
decryption systems also implement additional encryption such as
RSA, AES and 3DES during the key exchange.
The players
Team 1
1) Pay TV Provider
2) Content protection service
3) Subscriber ( you)
4) Installation technician
The players
Team 2
1) Hobbyists, Hackers & Opportunists.
2) Criminal organizations
The players
Team 3
1) Law Enforcement
2) Internal and external investigators
3) Content protection services – OPSEC
4) Security research teams
5) Anti Piracy organizations such as CASBAA & ASTRA
The Criminal Enterprise
• Criminal enterprises heavily invest in stealing research or
purchasing solutions for which they can easily implement.
• The target service is usually one that has the largest exploitable
audience with the highest quality content including first release
movies, sports and ppv. Bundling stolen content from multiple pay
tv services from different satellites is also common.
• They sell the equipment to access to the stolen content for a
fraction of the cost, planning for fast and high number of sales,
basic ROI.
• Generally these criminal groups will be run by a single figure,
sometimes a larger syndicate will fund the activity provided there is
a guarantee of isolation from prosecution when they are caught.
The Criminal Enterprise
• Depending on the legal penalties in the country for piracy, the
business model could be to make 3Mil$ over the life of the
activity and then take a 1Mil$ fine and minor or suspended jail
time when convicted.
• The money from piracy in larger syndicates go into supporting
other illegal activities such as drugs, prostitution etc..
• The whole activity will be structured in some form of a
legitimate business, with multiple supporting companies both
with legal and illegal intent.
• Some organizations would make 15-25k a weekend selling new
or reprogramming smart cards after counter measures were
initiated by content providers.
Exploit the technology
Intercepting data between the conditional access module and card
Exploit the technology
• Card Cloning
Ongoing cost to replace card or reprogram after key updates or
implementation of anti piracy counter measures. Pirates often omit
details from the card to ensure it does not update during a counter
measure from the content provider.
Exploiting the technology
• IKS (Internet Key sharing) – Ongoing subscription by sharing the
control word and IPTV streaming.
IKS CW
Server
INTERNET
DVB
Descrambler
Tuner
Satellite
Input
MPEG-2
Decoder
DVB
Descrambler
Tuner
Satellite
Input
MPEG-2
Decoder
IPTV
Server
INTERNET
Streaming client
Streaming client
Streaming client
Streaming client
Streaming client
Streaming client
Exploiting the technology
• Streaming technology with ongoing subscription fee
• Live stream via social media
• Embedded STB with 3rd party plugins
Developing counter measures
For effective counter measures to be developed requires the
collaboration of several groups
• Pay TV Content provider engineering and anti fraud departments
• Content encryption provider engineering group
• State & international Law enforcement
• Private investigation of key criminal individuals and groups
• Infiltration of online forums
• Examples of the cards, devices and IP addresses of IKS servers and
clients
Counter Measures
• By purchasing a cloned pirate smartcard during investigations and
extracting the details, content providers can turn off large quantities
of cloned pirate cards by simply turning off the original card
• Other counter measures can be targeted at specific emulated chip
sets and not effect the paying subscriber base
Counter Measures
• To assist identifying Illegal streaming sources, counter measures like
this one identifies the user of the box by displaying the serial number
of the smartcard, decoder or UID which can then be immediately de
activated
Counter Measures
• Streaming by social media can be a little simpler such as this recent
case where the user streamed it under his own social media account.
Where is this all going
• The subscription TV industry has made some fundamental mistakes
since the 80s which can be used as lessons as new IOT technology
evolves.
• Cyber security professionals are now becoming an integral part of the
analysis, investigation and forensic aspects of the subscription
industry to improve encryptions systems, protecting the client
contents and battle the ongoing illegal content redistribution.
• Satellite subscription TV piracy is a cat and mouse game.

More Related Content

Similar to The enterprise of subscription tv piracy

Keeping your business safe online cosy club
Keeping your business safe online cosy clubKeeping your business safe online cosy club
Keeping your business safe online cosy club
Get up to Speed
 
Fintech & blockchain technology 06.12.2021
Fintech & blockchain technology 06.12.2021Fintech & blockchain technology 06.12.2021
Fintech & blockchain technology 06.12.2021
Oluwaseyi Adeniyan
 
Cyber security general perspective a
Cyber security general perspective aCyber security general perspective a
Cyber security general perspective a
marukanda
 
Security For Business: Are You And Your Customers Safe
Security For Business:  Are You And Your Customers SafeSecurity For Business:  Are You And Your Customers Safe
Security For Business: Are You And Your Customers Safe
woodsy01
 
Cloud security From Infrastructure to People-ware
Cloud security From Infrastructure to People-wareCloud security From Infrastructure to People-ware
Cloud security From Infrastructure to People-ware
Tzar Umang
 
SecureWeb3 - Developing a Comprehensive Cybersecurity Strategy for the Decent...
SecureWeb3 - Developing a Comprehensive Cybersecurity Strategy for the Decent...SecureWeb3 - Developing a Comprehensive Cybersecurity Strategy for the Decent...
SecureWeb3 - Developing a Comprehensive Cybersecurity Strategy for the Decent...
Prasanna Hegde
 
Implementing an improved security for collin’s database and telecommuters
Implementing an improved security for collin’s database and telecommutersImplementing an improved security for collin’s database and telecommuters
Implementing an improved security for collin’s database and telecommuters
Rishabh Gupta
 
Cyber Threat Overview for Euro IT counsel
Cyber Threat Overview for Euro IT counselCyber Threat Overview for Euro IT counsel
Cyber Threat Overview for Euro IT counsel
OCTF Industry Engagement
 
CYBERFORENSICS
CYBERFORENSICSCYBERFORENSICS
CYBERFORENSICS
Dr. Prashant Vats
 
CyberSecurityPPT_V3_1CyberSecurityPPT_V3_1
CyberSecurityPPT_V3_1CyberSecurityPPT_V3_1CyberSecurityPPT_V3_1CyberSecurityPPT_V3_1
CyberSecurityPPT_V3_1CyberSecurityPPT_V3_1
NilKhunt
 
CyberSecurityPPdddsdsddssdsdssaT_V3_1.pptx
CyberSecurityPPdddsdsddssdsdssaT_V3_1.pptxCyberSecurityPPdddsdsddssdsdssaT_V3_1.pptx
CyberSecurityPPdddsdsddssdsdssaT_V3_1.pptx
prtabal_25
 
Cybersecurity about Phishing and Secutity awareness
Cybersecurity about Phishing and Secutity awarenessCybersecurity about Phishing and Secutity awareness
Cybersecurity about Phishing and Secutity awareness
Imran Khan
 
nerfslides.pptx
nerfslides.pptxnerfslides.pptx
nerfslides.pptx
ssusera5ade5
 
GDPR Part 1: Quick Facts
GDPR Part 1: Quick FactsGDPR Part 1: Quick Facts
GDPR Part 1: Quick Facts
Adrian Dumitrescu
 
The Cloud Computing Contract Playbook - Contracting for Cloud Services, Sept. 30
The Cloud Computing Contract Playbook - Contracting for Cloud Services, Sept. 30The Cloud Computing Contract Playbook - Contracting for Cloud Services, Sept. 30
The Cloud Computing Contract Playbook - Contracting for Cloud Services, Sept. 30
This account is closed
 
Law Firm Cybersecurity: Practical Tips for Protecting Your Data
Law Firm Cybersecurity: Practical Tips for Protecting Your DataLaw Firm Cybersecurity: Practical Tips for Protecting Your Data
Law Firm Cybersecurity: Practical Tips for Protecting Your Data
Accellis Technology Group
 
Cyber Security and the Impact on your Business
Cyber Security and the Impact on your BusinessCyber Security and the Impact on your Business
Cyber Security and the Impact on your Business
Lucy Denver
 
IRSF Protection with PRISM
IRSF Protection with PRISMIRSF Protection with PRISM
IRSF Protection with PRISM
XINTEC
 
Online Intellectual Property Crime Current View
Online Intellectual Property Crime Current ViewOnline Intellectual Property Crime Current View
Online Intellectual Property Crime Current View
Nusaike Mufthie
 
ISSA Atlanta - Emerging application and data protection for multi cloud
ISSA Atlanta - Emerging application and data protection for multi cloudISSA Atlanta - Emerging application and data protection for multi cloud
ISSA Atlanta - Emerging application and data protection for multi cloud
Ulf Mattsson
 

Similar to The enterprise of subscription tv piracy (20)

Keeping your business safe online cosy club
Keeping your business safe online cosy clubKeeping your business safe online cosy club
Keeping your business safe online cosy club
 
Fintech & blockchain technology 06.12.2021
Fintech & blockchain technology 06.12.2021Fintech & blockchain technology 06.12.2021
Fintech & blockchain technology 06.12.2021
 
Cyber security general perspective a
Cyber security general perspective aCyber security general perspective a
Cyber security general perspective a
 
Security For Business: Are You And Your Customers Safe
Security For Business:  Are You And Your Customers SafeSecurity For Business:  Are You And Your Customers Safe
Security For Business: Are You And Your Customers Safe
 
Cloud security From Infrastructure to People-ware
Cloud security From Infrastructure to People-wareCloud security From Infrastructure to People-ware
Cloud security From Infrastructure to People-ware
 
SecureWeb3 - Developing a Comprehensive Cybersecurity Strategy for the Decent...
SecureWeb3 - Developing a Comprehensive Cybersecurity Strategy for the Decent...SecureWeb3 - Developing a Comprehensive Cybersecurity Strategy for the Decent...
SecureWeb3 - Developing a Comprehensive Cybersecurity Strategy for the Decent...
 
Implementing an improved security for collin’s database and telecommuters
Implementing an improved security for collin’s database and telecommutersImplementing an improved security for collin’s database and telecommuters
Implementing an improved security for collin’s database and telecommuters
 
Cyber Threat Overview for Euro IT counsel
Cyber Threat Overview for Euro IT counselCyber Threat Overview for Euro IT counsel
Cyber Threat Overview for Euro IT counsel
 
CYBERFORENSICS
CYBERFORENSICSCYBERFORENSICS
CYBERFORENSICS
 
CyberSecurityPPT_V3_1CyberSecurityPPT_V3_1
CyberSecurityPPT_V3_1CyberSecurityPPT_V3_1CyberSecurityPPT_V3_1CyberSecurityPPT_V3_1
CyberSecurityPPT_V3_1CyberSecurityPPT_V3_1
 
CyberSecurityPPdddsdsddssdsdssaT_V3_1.pptx
CyberSecurityPPdddsdsddssdsdssaT_V3_1.pptxCyberSecurityPPdddsdsddssdsdssaT_V3_1.pptx
CyberSecurityPPdddsdsddssdsdssaT_V3_1.pptx
 
Cybersecurity about Phishing and Secutity awareness
Cybersecurity about Phishing and Secutity awarenessCybersecurity about Phishing and Secutity awareness
Cybersecurity about Phishing and Secutity awareness
 
nerfslides.pptx
nerfslides.pptxnerfslides.pptx
nerfslides.pptx
 
GDPR Part 1: Quick Facts
GDPR Part 1: Quick FactsGDPR Part 1: Quick Facts
GDPR Part 1: Quick Facts
 
The Cloud Computing Contract Playbook - Contracting for Cloud Services, Sept. 30
The Cloud Computing Contract Playbook - Contracting for Cloud Services, Sept. 30The Cloud Computing Contract Playbook - Contracting for Cloud Services, Sept. 30
The Cloud Computing Contract Playbook - Contracting for Cloud Services, Sept. 30
 
Law Firm Cybersecurity: Practical Tips for Protecting Your Data
Law Firm Cybersecurity: Practical Tips for Protecting Your DataLaw Firm Cybersecurity: Practical Tips for Protecting Your Data
Law Firm Cybersecurity: Practical Tips for Protecting Your Data
 
Cyber Security and the Impact on your Business
Cyber Security and the Impact on your BusinessCyber Security and the Impact on your Business
Cyber Security and the Impact on your Business
 
IRSF Protection with PRISM
IRSF Protection with PRISMIRSF Protection with PRISM
IRSF Protection with PRISM
 
Online Intellectual Property Crime Current View
Online Intellectual Property Crime Current ViewOnline Intellectual Property Crime Current View
Online Intellectual Property Crime Current View
 
ISSA Atlanta - Emerging application and data protection for multi cloud
ISSA Atlanta - Emerging application and data protection for multi cloudISSA Atlanta - Emerging application and data protection for multi cloud
ISSA Atlanta - Emerging application and data protection for multi cloud
 

Recently uploaded

Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
Frank van Harmelen
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Alison B. Lowndes
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
Product School
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Product School
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Inflectra
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
RTTS
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Tobias Schneck
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
Product School
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
Elena Simperl
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
Product School
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
Paul Groth
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi
Fwdays
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 

Recently uploaded (20)

Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 

The enterprise of subscription tv piracy

  • 1. The enterprise of subscription TV piracy A mid level overview of (DVB) Digital Video Broadcasting content theft Presented at Sectalks (Perth) November 7 2017 By Sabastion F
  • 2. Introduction The purpose of this presentation is to provide an end to end awareness of encrypted satellite and cable tv piracy. Also includes bit of technical history and where it is heading with the current advancement of technology. We will be touching on common InfoSec elements including • Reverse & social engineering • Criminal organizations • Investigations • Operational security, from both vendor and content providers
  • 3. Disclaimer • I am NOT • A lawyer • A criminal profiler, investigator or any member of law enforcement • An employee or advocate for any content protection service • Commissioned to conduct research on any content protection systems • IMPORTANT This presentation is not an endorsement or meant to encourage the attempted circumvention of encrypted DVBS content. It is designed to explain piracy and anti piracy techniques used in the realm of piracy and cybersecurity as well as social drivers that support this industry.
  • 4. Your Presenter Who Am I • A telecommunications and IT technician • Work in the telecommunications industry for a large part of my career and specializing in satellite communications and network infrastructure. • According to my partner - On the spectrum and have a overactive tendency for reverse engineering. Which includes the kids toys. • Currently working towards a career in information security
  • 5. Summary of what were going to cover • Basics of satellite broadcasting • General overview of DVB content encryption and decryption • Introduce the players • The common criminal enterprise • Counter measures • The effects of DVB content piracy
  • 6. Public acceptance of content theft Homer: [reading the "So You've Decided to Steal Cable" pamphlet] So you've decided to steal cable. Myth: Cable piracy is wrong. Fact: Cable companies are big faceless corporations, which makes it okay.
  • 7. Captain Midnight Vs HBO - 1986 The HBO uplink hijack on Galaxy 1 was to protest against charges for access to scrambled satellite channels by HBO
  • 9. Receiving Equipment • Satellite Antenna / Dish • Satellite receiver with a (CAM) conditional access module or embedded decryption module • Subscription smartcard • Television
  • 10. Encrypting the content • DVB or Digital Video Broadcasting uses Common Scrambling Algorithm (CSA) to encrypt or scramble the channels.
  • 11. Decrypting the content • The CSA algorithm uses 64 bit decryption. Different proprietary decryption systems also implement additional encryption such as RSA, AES and 3DES during the key exchange.
  • 12. The players Team 1 1) Pay TV Provider 2) Content protection service 3) Subscriber ( you) 4) Installation technician
  • 13. The players Team 2 1) Hobbyists, Hackers & Opportunists. 2) Criminal organizations
  • 14. The players Team 3 1) Law Enforcement 2) Internal and external investigators 3) Content protection services – OPSEC 4) Security research teams 5) Anti Piracy organizations such as CASBAA & ASTRA
  • 15. The Criminal Enterprise • Criminal enterprises heavily invest in stealing research or purchasing solutions for which they can easily implement. • The target service is usually one that has the largest exploitable audience with the highest quality content including first release movies, sports and ppv. Bundling stolen content from multiple pay tv services from different satellites is also common. • They sell the equipment to access to the stolen content for a fraction of the cost, planning for fast and high number of sales, basic ROI. • Generally these criminal groups will be run by a single figure, sometimes a larger syndicate will fund the activity provided there is a guarantee of isolation from prosecution when they are caught.
  • 16. The Criminal Enterprise • Depending on the legal penalties in the country for piracy, the business model could be to make 3Mil$ over the life of the activity and then take a 1Mil$ fine and minor or suspended jail time when convicted. • The money from piracy in larger syndicates go into supporting other illegal activities such as drugs, prostitution etc.. • The whole activity will be structured in some form of a legitimate business, with multiple supporting companies both with legal and illegal intent. • Some organizations would make 15-25k a weekend selling new or reprogramming smart cards after counter measures were initiated by content providers.
  • 17. Exploit the technology Intercepting data between the conditional access module and card
  • 18. Exploit the technology • Card Cloning Ongoing cost to replace card or reprogram after key updates or implementation of anti piracy counter measures. Pirates often omit details from the card to ensure it does not update during a counter measure from the content provider.
  • 19. Exploiting the technology • IKS (Internet Key sharing) – Ongoing subscription by sharing the control word and IPTV streaming. IKS CW Server INTERNET DVB Descrambler Tuner Satellite Input MPEG-2 Decoder DVB Descrambler Tuner Satellite Input MPEG-2 Decoder IPTV Server INTERNET Streaming client Streaming client Streaming client Streaming client Streaming client Streaming client
  • 20. Exploiting the technology • Streaming technology with ongoing subscription fee • Live stream via social media • Embedded STB with 3rd party plugins
  • 21. Developing counter measures For effective counter measures to be developed requires the collaboration of several groups • Pay TV Content provider engineering and anti fraud departments • Content encryption provider engineering group • State & international Law enforcement • Private investigation of key criminal individuals and groups • Infiltration of online forums • Examples of the cards, devices and IP addresses of IKS servers and clients
  • 22. Counter Measures • By purchasing a cloned pirate smartcard during investigations and extracting the details, content providers can turn off large quantities of cloned pirate cards by simply turning off the original card • Other counter measures can be targeted at specific emulated chip sets and not effect the paying subscriber base
  • 23. Counter Measures • To assist identifying Illegal streaming sources, counter measures like this one identifies the user of the box by displaying the serial number of the smartcard, decoder or UID which can then be immediately de activated
  • 24. Counter Measures • Streaming by social media can be a little simpler such as this recent case where the user streamed it under his own social media account.
  • 25. Where is this all going • The subscription TV industry has made some fundamental mistakes since the 80s which can be used as lessons as new IOT technology evolves. • Cyber security professionals are now becoming an integral part of the analysis, investigation and forensic aspects of the subscription industry to improve encryptions systems, protecting the client contents and battle the ongoing illegal content redistribution. • Satellite subscription TV piracy is a cat and mouse game.