DECE Platform Security Analysis & Recommendations

Total Page:16

File Type:pdf, Size:1020Kb

DECE Platform Security Analysis & Recommendations NDS VideoGuard Connect™ DECE Platform Security Analysis & Recommendations White Paper 19 March 2012 Confidential VGDRM-WHT-514 1.0 NDS and Approved Recipients Total pages: 19 Doc. Title: NDS VideoGuard Connect™ DECE Platform Security Analysis & Recommendations White Paper Doc. No.: VGDRM-WHT-514 Classification: Confidential Revision: 1.0 Restriction: NDS and Approved Recipients Date: 19 March 2012 Customer: Owner: Leonid Sandler Reviewers/ Nick Thexton Approvers: Peter Lynskey Yossi Tsuria Author: Leonid Sandler NDS Limited 2012. All rights reserved. PROPRIETARY AND CONFIDENTIAL. This document may include reference to technologies that use patents (pending or granted) which are owned by NDS Limited or third parties. The use of such patents shall be subject to express written license terms. You shall not copy, disclose, reproduce, store in a retrieval system or transmit in any form or by any means whether in whole or in part this document. NDS Limited accepts no liability and offers no warranty in relation to the use of this document or any technology referenced herein as well as associated intellectual property rights except as it has otherwise agreed in writing. All trademarks and brands are the property of their respective owners, and their use is subject to license terms. Contents Contents 1 Preface ..............................................................................................................4 1.1 Purpose of This Document .............................................................................. 4 1.2 Terminology ..................................................................................................... 4 2 Security Perspective of the OTT Systems....................................................6 2.1 Content Distribution in the Open Internet ..................................................... 6 2.2 Role of the CDNs.............................................................................................. 7 2.3 What are Hackers looking for?........................................................................ 8 2.4 Anti-sharing Regulations................................................................................. 9 2.5 Lessons from the Conditional Access World................................................ 10 2.5.1 Motivation (and potentially expected investment)...................... 10 2.5.2 How Extraction/Stealing of the Keys Works................................ 10 2.5.3 How Distribution of These Keys Works....................................... 11 2.5.4 Conclusions .................................................................................... 11 3 Security Aspects of DECE System ..............................................................13 3.1 DECE Infrastructure Observations ............................................................... 13 3.2 Potential Attacks in DECE Environment...................................................... 13 3.2.1 Attack Scenarios............................................................................. 14 3.3 DECE Software vs. Hardware Security......................................................... 14 4 Introduction of Service Protection..............................................................16 4.1 What is Service Protection?............................................................................ 16 4.2 Service Protection in DECE ........................................................................... 17 5 Service Protection in NDS Implementation..............................................18 5.1 Videoguard Connect Service Protection Features........................................ 18 6 Conclusions ...................................................................................................19 List of Tables Table 1 Terminology ..................................................................................................... 4 VGDRM-WHT-514 1.0 NDS VideoGuard Connect™ Confidential DECE Platform Security Analysis & Recommendations: White Paper Page 3 Preface 1 Preface 1.1 Purpose of This Document This document presents a security analysis and the potential threats on Over the Top (OTT) content distribution systems in general and the Digital Entertainment Content Ecosystem (DECE) environment in particular. It also describes NDS’s proposal to DECE to provide an elevated robustness level solution suitable for HD content distribution on all the current and future client platforms on which DECE operates. The document includes: 1. Generic OTT platform security perspectives outlining the protection system priorities in this arena. 2. DECE specific issues driven by both the technology and the business model of the ecosystem. 3. An extended conceptual proposal for the new security paradigm called the service protection. 4. It also contains a feature set that NDS would provide to fulfill this paradigm. 1.2 Terminology Table 1 lists acronyms and abbreviations used in the document. (Many of the definitions are taken from Wikipedia, http://www.wikipedia.com/.) Table 1 Terminology Term Definition CDN Content Distribution Network CFF Common File Format DECE Digital Entertainment Content Ecosystem DRM Digital Rights Management DVB Digital Video Broadcasting. A suite of internationally accepted open standards for digital television developed by the DVB Project, an international industry consortium. E2E End-to-end HD High Definition. HD+ High Definition profile of DECE VGDRM-WHT-514 1.0 NDS VideoGuard Connect™ Page 4 Confidential DECE Platform Security Analysis & Recommendations: White Paper Preface Term Definition HLS HTTP Live Streaming HN Home Network HTTP Hypertext Transfer Protocol. An application-level protocol for distributed, collaborative, hypermedia information systems. ISP Internet Service Provider MPEG2 TS MPEG Transport Stream NAS Network Attached Storage NAT Network Address Translation OTT Over the Top – content distribution via open Internet utilizing existing general-purpose Internet infrastructure and cloud services. P2P Peer-to-peer distribution model PIFF Protected Interoperable File Format PIPA Protect IP Act QoS Quality of Service SOPA Stop Online Piracy Act UPnP Universal Plug and Play UV Ultra Violet – commercial name for DECE VLC VLC media player, a free software cross-platform multimedia player and framework VOD Video on Demand VPN Virtual Private Network VGDRM-WHT-514 1.0 NDS VideoGuard Connect™ Page 5 Confidential DECE Platform Security Analysis & Recommendations: White Paper Security Perspective of the OTT Systems 2 Security Perspective of the OTT Systems This section provides a generic security-related analysis of the content distribution systems operating in the open Internet. This analysis describes potential problems and attacks that may appear in this environment and presents an analogy to the existing attacks in the Conditional Access (CA) world. 2.1 Content Distribution in the Open Internet DECE operates in the open Internet environment where each client device has the potential of accessing any content asset at any point in time. DECE uses HTTP- based distribution methods involving CDN technologies, but its content is also suitable for peer-to-peer redistribution, ISP caching, private super-distribution, file sharing, etc. It can be considered as a global file system. For as long as content remains encrypted, all these additional distribution methods can’t be considered illegal, , as they just help legitimate clients to gain better access to the data that they are entitled to. However, the security analysis of this situation takes a completely opposite perspective. Practically speaking, this means that encrypted content is available to anybody at any time, which is worse security-wise than traditional broadcast systems, whereby content appears only once at certain times and is protected by hundreds of different keys (key periods). In addition, most of these traditional broadcast systems require special equipment in order to gain access to the signals, unlike the IP networks, where everything attackers and/or consumers need is already available to them. Even though some protection means (aka URL tokenization) is put in place against unauthorized CDN access, they would be absolutely ineffective against P2P, ISP caching and other forms of file sharing. The following section describes the pros and cons of CDN usage in DECE in general, but it is mainly intended to shows that CDNs are not to be used for any role in the protection chain given the amount of effort that would be required to circumvent this kind of protection. Since protection is not only about implementing steps to prevent abuse, but also about taking responsibility that the steps being taken are appropriate, CDNs cannot be held responsible for attacks that bypass them or misuse them. The only technology in place which actually prevents unauthorized access to content in this environment is the security (DRM) technology. VGDRM-WHT-514 1.0 NDS VideoGuard Connect™ Page 6 Confidential DECE Platform Security Analysis & Recommendations: White Paper Security Perspective of the OTT Systems 2.2 Role of the CDNs This section explains the traditional form of usage of the CDN technologies in the OTT ecosystem and their role in the protection chain and shows the weaknesses of this protection scheme at present and going forward. Based in these weaknesses, it is suggested to stop relying on CDNs as part of a content protection mechanism. Later in this document, a separate mechanism will also be suggested to prevent denial of service and
Recommended publications
  • Fausto Emulator Options
    Fausto Emulator Options CS cards Client supported: CCCam (TCP) Gbox (UDP) Newcamd (TCP) RadeGast (TCP) Camd35 (UDP cs357x) Camd35 (TCP cs378x) Camd33 (TCP) Gbox Listener (localhost only, default ports) Twin Protocol (Serial) CS Cards server supported: Newcamd (TCP) & EMM Support RadeGast (TCP) Camd35 (UDP cs357x) Camd35 (TCP cs378x) Camd33 (TCP) Support: - Ethernet (linux box, diablo wifi,...) - SSSP/HSIC/TM Share/CSC (Serial) - Season Interface (Cams/box Readers) - Diablo Wireless (base unit) Main Functions: - Emulator - Logger - Net client - Card server - Cards support - DVB Plugins (without pctv card) Monitor: Datas Showed: *Ch.Infos : Package name or extra infos *Ecm *Caid *Provider ID *Key Index *Key Value *Control Word decoded With Fausto internal emulator keys.bin file is required or Fausto will work like logger show Datas but decoded nothing. To load keys.bin clic on icon Folder or drag file Keys.bin on window. When ecm receive, FE (Fausto emulator) try to decode, if success Datas color will be repaint in blue in others case stay red For ECM not decoded : *keys.bin not loaded *caid/provider/valid key not on file (provider not managed or keys expired) Fixed CW Checked: use Direct Control Word from keys.bin Tracker checked: log all datas receive under tab Tracker Monitor checked: Show all datas under Emulator window Clear Datas: clean all datas showed under monitor & wait next incoming ecm for refresh Exit: Close emulator window For Local menu: Press Mouse right clic Options under local popup menu (mouse right clic) FeKid: Load
    [Show full text]
  • DVB-T (La "T" Sta Per "Terrestrial"-"Terrestre")
    Facoltà di Scienze Matematiche Fisiche e Naturali Anno Accademico 2008/2009 Tesina di Sicurezza su Reti 2 Prof. Alfredo De Santis Studente: Umberto Palo •Introduzione •I vantaggi dello standard digitale •Standard trasmissivi e Standard interattivi •Codifiche video •MPEG2 •Sicurezza nel sistema DVB •Il sistema per l’accesso condizionato (CAS) •Tecniche di scrambling •Cut and rotate •Line shuffle •Sicurezza e Gerarchia a livelli •Rimappatura •Il sistema Seca •La pirateria della televisione a pagamento •Le tecniche per la visione abusiva •I successi della pirateria •Proposte per combattere la pirateria. •Curiosità e info Università degli studi di Salerno Umberto Palo •Introduzione •I vantaggi dello standard digitale •Standard trasmissivi e Standard interattivi •Codifiche video •MPEG2 •Sicurezza nel sistema DVB •Il sistema per l’accesso condizionato (CAS) •Tecniche di scrambling •Cut and rotate •Line shuffle •Sicurezza e Gerarchia a livelli •Rimappatura •Il sistema Seca •La pirateria della televisione a pagamento •Le tecniche per la visione abusiva •I successi della pirateria •Proposte per combattere la pirateria. •Curiosità e info Università degli studi di Salerno Umberto Palo Il Digital Video Broadcasting (DVB) •rappresenta un insieme di standard aperti ed accettati a livello internazionale •concepiti per lo sviluppo e la diffusione della televisione digitale •ha prodotto degli standard per ciascun mezzo trasmissivo (terrestre, satellite, via cavo): •DVB-S (la "S" sta per "Satellite") •DVB-C (la "C" per "Cable"-"Cavo") •DVB-T (la "T" sta
    [Show full text]
  • Alexander Installation and Configuration Guide
    Alexander installation and configuration guide. Contents 1. First time installation ................................................................................................... 2 2. Configuration ............................................................................................................... 5 2.1. Client Configuration ................................................................................................ 5 2.2. Server Settings ......................................................................................................... 6 2.3. System Settings ........................................................................................................ 8 2.4. Status Page ............................................................................................................. 10 2.5. Reboot .................................................................................................................... 11 2.6. Enter first time installation ..................................................................................... 11 2.7. Software download ................................................................................................ 12 3. LED information........................................................................................................ 14 4. Factory reset .............................................................................................................. 15 5. Trouble shooting .......................................................................................................
    [Show full text]
  • CSCIP Module 6 - Mobile-NFC-Pay TV Final - Version 2 - October 8, 2010 1 for CSCIP Applicant Use Only
    Module 6: Smart Card Usage Models – Mobile, NFC and Pay TV Smart Card Alliance Certified Smart Card Industry Professional Accreditation Program Smart Card Alliance © 2010 CSCIP Module 6 - Mobile-NFC-Pay TV Final - Version 2 - October 8, 2010 1 For CSCIP Applicant Use Only About the Smart Card Alliance The Smart Card Alliance is a not-for-profit, multi-industry association working to stimulate the understanding, adoption, use and widespread application of smart card technology. Through specific projects such as education programs, market research, advocacy, industry relations and open forums, the Alliance keeps its members connected to industry leaders and innovative thought. The Alliance is the single industry voice for smart cards, leading industry discussion on the impact and value of smart cards in the U.S. and Latin America. For more information please visit http://www.smartcardalliance.org . Important note: The CSCIP training modules are only available to LEAP members who have applied and paid for CSCIP certification. The modules are for CSCIP applicants ONLY for use in preparing for the CSCIP exam. These documents may be downloaded and printed by the CSCIP applicant. Further reproduction or distribution of these modules in any form is forbidden. Copyright © 2010 Smart Card Alliance, Inc. All rights reserved. Reproduction or distribution of this publication in any form is forbidden without prior permission from the Smart Card Alliance. The Smart Card Alliance has used best efforts to ensure, but cannot guarantee, that the information described in this report is accurate as of the publication date. The Smart Card Alliance disclaims all warranties as to the accuracy, completeness or adequacy of information in this report.
    [Show full text]
  • Índice General
    AUTOR Javier Ferrer Aguilar DIRECTOR DE PROYECTO Carles Padró UPC Abril 2009 Índice general 1 Introducción.................................................................................................. 1 1.1 Contexto................................................................................................... 1 1.2 Propósitos y objetivos.............................................................................. 2 1.3 Limitaciones ............................................................................................ 3 1.4 Estructura de la memoria......................................................................... 4 2 Sistemas de Acceso Condicional (CAS)...................................................... 6 2.1 Arquitectura común de los CAS.............................................................. 7 2.1.1 Jerarquía de claves............................................................................................. 9 2.1.2 Distribución de claves ...................................................................................... 10 2.1.3 Interoperabilidad CA........................................................................................ 11 2.1.3.1 SimulCrypt.............................................................................................................. 11 2.1.3.2 MultiCrypt .............................................................................................................. 12 2.1.3.3 Comparación..........................................................................................................
    [Show full text]
  • Building a Launchpad for Impactful Satellite Cyber-Security Research
    SOK: Building a Launchpad for Impactful Satellite Cyber-Security Research James Pavur Ivan Martinovic Oxford University Oxford University [email protected] [email protected] Abstract—As the space industry approaches a period of rapid astrophysics. Academics in each domain have made valuable change, securing both emerging and legacy satellite missions will discoveries, but contributions in one field are easily overlooked become vital. However, space technology has been largely over- by researchers with a narrow focus on their own. looked by the systems security community. This systematization of knowledge paper seeks to understand why this is the case and This paper offers a cross-disciplinary synthesis of progress to offer a starting point for technical security researchers seeking to date on space systems security. The paper begins by impactful contributions beyond the Earth’s mesosphere. presenting a unified matrix of existing threat models - linking The paper begins with a cross-disciplinary synthesis of relevant attackers, vulnerabilities and motivations drawn from dozens threat models from a diverse array of fields, ranging from legal of prior studies. Underpinning this effort is an exhaustive and policy studies to aerospace engineering. This is presented as a “threat matrix toolbox” which security researchers may historical timeline of satellite hacking incidents, where our leverage to motivate technical research into given attack vectors own archival research is added to prior contributions from Fritz and defenses. We subsequently apply this model to an original and Manulis et al. [1], [2]. The combination of this historical chronology of more than 100 significant satellite hacking incidents analysis and threat modeling framework offers a useful aid spanning the previous 60 years.
    [Show full text]
  • DVB TELE-Satellite Receiver Guide
    € 7,80 ENG-CD The World’s Largest Satellite Magazine £ 4.95 04-05 TELE SATELLITE 2007 AU: AU$11.90 incl GST NG: Naira 500 B 9318 E EE: EEK 99,- ZA: R 44-95 INTERNATIONAL Country Company Report Company Report Report Dish Manufacturer Satellite Canada INFOSAT Wholesaler max communication Jiraporn Tangpiroontham Dirk Wittenborg President Managing Director Bangkok, Thailand Hamburg, Germany Company Report Receiver Manufacturer Fortec Star David McGrath General Manager Satellite Business in Winnipeg, Manitoba Toronto, Canada Company Report HDTV Broadcaster EURO1080 Yves Panneels Media Relations Manager Brussels, Belgium AF-8000HDCI Test Report HDTV CI Receiver with built-in scaler Exclusively for TELE-satellite Readers SatcoDX “World of Satellites” SatcoDX’s “World of Satellites” Software contains the technical data from every satellite transmission worldwide SatcoDX Software SatcoDX Software Activation Code Version 3.11: 5C4226C119615G77CGC8E43A54ED6GEA Activation Valid until the publication of the next issue of TELE-satellite magazine Code Download SatcoDX Software here: www.TELE-satellite.com/cd/0706/eng Step by Step Guide to Get SatcoDX Soft- the Internet and is allowed to access FTP. ware Running on Your Computer: Note: SatcoDX Software also runs without 1. Download SatcoDX Software Version 3.10 Activation Code, or with an outdated Activi- from the above URL, or install from CD-ROM ation Code. However, the satellite data on TELE SATELLITE INTERNATIONAL Note: if you have already installed Version Main Address: 3.10, you do not need to do it again. Check TELE-satellite International your currently PO Box 1234 installed ver- 85766 Munich-Ufg sion by click- GERMANY/EUROPA UNION ing the HELP Editor-in-Chief: button, then Alexander Wiese ABOUT.
    [Show full text]
  • Subverting Satellite Receivers for Botnet and Profit
    SUBVERTING SATELLITE RECEIVERS FOR BOTNET AND PROFIT Sofiane Mohamed Talmat [email protected] Abstract—New generation Set Top Boxes (STBs) are only by legitimate satellite receivers using official smart cards embedded Linux satellite TV receivers offering all the features of hold by the subscriber any Linux based machine, including wireless and network The encryption is provided by different CAS (Conditional connectivity, this allowed hackers to crack most satellite DVB- Access System) providers that are identified by a unique CA CA encryption schemes using card sharing and promoting the ID (table 1) however the main concept remains the same and apparition of a parallel black market for pay TV subscription at very low cost. is based on the encryption of the stream with a CW (Crypto word) that should be only decrypted by the related smart card This attack could be exploited to build a massive botnet of Linux with a valid subscription. based satellite receivers or even computers used for satellite decryption and accessing end users local area networks that will be used as an edge for any other kind of attacks. There are CA ID Company Developed by millions of unaware end users downloading and installing any 0x09XX Cisco NDS (CISCO) kind of plugins seeking cheap or even free satellite television, Videoguard then the attack could be difficult to mitigate, and could easily lead to a hacker controlling millions of devices on the internet. 0x17XX/0x18XX Nagravision Nagravision 0x06XX Irdeto Irdeto Index Terms—IoT, Card sharing, Satellite TV, attack, botnet. 0x0BXX Conax Conax AS 0x05XX Viaccess France Telecom INTRODUCTION 0x26XX Biss European During the last years, TV encryption scheme has evolved Broadcasting Union and adopted more complex cryptography designs and became Table 1: Some CAS providers almost impossible to crack using old techniques based on smart card cloning and emulation on open satellite receivers.
    [Show full text]
  • System Nagravision3 Key System Nagravision 3
    SYSTEM NAGRAVISION3 KEY SYSTEM NAGRAVISION 3 KEY PROJECTS FAQ ANNOUNCEMENTS JUNE 08, 2016, 16:00 JUNE 11, 2016, 11:10 JUNE 15, 2016, 01:48 June 09, 2016, 07:47 June 13, 2016, 01:07 June 17, 2016, 02:56 SYSTEM THOR VIACCESS MUSALMAN NAGRAVISION 3 NAGRA NAGRA 2 AURAT CHUDAI KEYPINK SPOTS UPCOMINGONEVENTS SCALPNECK PAIN + System nagravision 3 key JuneHEADACHE 18, 2016, 01:56 + Conditional access (abbreviated CA) or conditional access system (abbreviated CAS) is the protection of content by requiring certain criteria to be met before. MUTV Eutelsat BissRINGING 07/10/2016 Bulsatcom HellasEARS Sat Irdeto 05/10/2+ 016 AlmaSport TV Biss 25/09/2016 ESPN Caribbean & ESPN Syndication Biss Key 23/09/2016. Uydu Key ,Uydu Haber,UyduEYE Frekans,Uydu FLOATERS Şifreleri,Güncel Keyler,Güncel Turksat 1C Frekans Listesi ve Kanal Listesi,Hotbird Frekans Listesi Kanal Listesi. Sky wurde nun endlich geknackt. Zumindest titeln ettliche Internetforen im Moment ihre Beiträge, welche sich fast ausschliesslich mit dem neuen Sender Sky befassen. Przy okazji bieżących wymian kanałów między transponderami Cyfrowego Polsatu oraz nc+ także klienci usług pre-paid uzyskali kilka drobnych bonusów. Key 00 in DEC: 107 144 063 033 100 152 195 093 167 140 246 030 128 238 146 187 =====. System nagravision 3 key June 19, 2016, 00:49 Conditional access (abbreviated CA) or conditional access system (abbreviated CAS) is the protection of content by requiring certain criteria to be met before. Key 00 in DEC: 107 144 063 033 100 152 195 093 167 140 246 030 128 238 146 187 =====. Nagravision (or Nagra Kudelski or simply Nagra) is a company of the Kudelski Group that develops conditional access systems for digital cable and satellite television.
    [Show full text]
  • Analyzing the Modern OTT Piracy Video Ecosystem
    Analyzing the Modern OTT Piracy Video Ecosystem A Technical Paper Prepared for SCTE•ISBE by Don Jones Senior Manager Comcast Cable Communications Management, LLC 4100 East Dry Creek Rd, Centennial CO 80122 303-712-3588 [email protected] Kei Foo Senior Manager Charter Communications 8560 Upland Drive, Suite B, Englewood, CO 80112 720-518-2343 [email protected] © 2018 SCTE•ISBE and NCTA. All rights reserved. Table of Contents Title Page Number Table of Contents .......................................................................................................................................... 2 Introduction.................................................................................................................................................... 3 A Brief History of the Pirated-Content Ecosystem ........................................................................................ 3 The Financial Impact of Piracy ...................................................................................................................... 5 Business Models of the Pirate Offerings to Consumers ............................................................................... 6 Two Types of Content Delivery ..................................................................................................................... 7 Live Streaming Content Acquisition .............................................................................................................. 7 Live Streaming Content Distribution ............................................................................................................
    [Show full text]
  • Attacks on Pay-TV Access Control Systems
    Attacks on Pay-TV Access Control Systems Markus G. Kuhn Computer Laboratory Generations of Pay-TV Access Control Systems Analog Systems remove sync information, try to confuse gain-control in receiver, etc. cryptography is not essential part of decoding process still dominant type for most cable-TV premium channels Hybrid Systems broadcasted signal conforms to analog TV standard (PAL, D2MAC, NTSC, SECAM) analog signal scrambled with digital framebuffer using a cryptographically transmitted control word fully cryptographic subscription management using smartcards examples: VideoCrypt, EuroCrypt (EN 50094), Syster Nagravision Digital Systems broadcasted signal is digitally modulated, encrypted, and multiplexed MPEG-2 audio and video data stream cryptographic subscription management using smartcards as with hybrid systems examples: DVB, DSS/VideoGuard Example of a Hybrid System: VideoCrypt CPU1 CPU2 ADC SAT- FIFO-1 FIFO-2 Scrambler Smartcard receiver DAC TV OSD EPA 0428252 A2 Features: scrambling by active-line rotation, requires only memory for one single image line vertical-blank-interval data contains 32-byte messages with blacklist/whitelist data smartcard calculates 60-bit MAC as control word from 32-byte messages every 2.5 s CPU1 salts control word with frame counter to generate 60-bit PRNG seed per frame Scrambler uses 60-bit seed to generate cut-point sequence per frame An Image Processing Attack on VideoCrypt unscrambled source signal broadcasted scrambled signal result of cross-correlation with edge detector avoids horizontal final b/w descrambling result obtained cutpoints marked penalty zones around cut points without knowledge of card secret The VideoCrypt Smartcard Protocol Flow control ISO 7816 T=0 protocol: sent by decoder /smartcard CLA INS P1 P2 P3 INSDATA[1] .
    [Show full text]
  • SCCR/20/2 Rev E
    E SCCR/20/2 REV ORIGINAL: ENGLISH DATE : MAY 10, 2010 Standing Committee on Copyright and Related Rights Twentieth Session Geneva, June 21 to 24, 2010 Study on the Socioeconomic Dimension of the Unauthorized Use of Signals – Part II: Unauthorized Access To Broadcast Content – Cause And Effects: A Global Overview prepared by Screen Digest, London* * The views and opinions expressed in this Study are the sole responsibility of the author. The Study is not intended to reflect the views of the Member States or the Secretariat of WIPO. SCCR/20/2 Rev 2 TABLE OF CONTENTS TYPES OF UNAUTHORIZED ACCESS............................................................................... 5 PHYSICAL PIRACY ................................................................................................................ 5 HARDWARE BASED UNAUTHORIZED ACCESS .......................................................................... 5 UNAUTHORIZED RE-BROADCASTING OF SIGNALS.................................................................... 5 EXTRA-TERRITORIAL TV ACCESS (GREY MARKET).................................................................. 5 UNAUTHORIZED ACCESS – A REGIONAL VIEW ............................................................. 6 NORTH AMERICA ................................................................................................................. 6 LATIN AMERICA.................................................................................................................... 6 ASIA...................................................................................................................................
    [Show full text]