Wireless Smartwi with a Black Plastic Cover

Total Page:16

File Type:pdf, Size:1020Kb

Wireless Smartwi with a Black Plastic Cover TEST REPORT Card Sharing Wireless SmartWi with a black plastic cover. Thanks to the new antenna, interference A close-up with the cover Pay TV reception removed shows the antenna: is now almost a thing of the past because no more radiation can the U-shaped conductor on enter the receiver. the right side which uses the all over the house whole length of the card in The outward appearance of the new version 8 Picture this: you have one pay TV subscription but several TV sets the control unit has remained spread all across the house. In the past there were three ways to dis- unchanged. On the inside, how- tribute pay TV to more then one TV: you either had to lay a dedicated ever, a lot has been amended. SmartWi box can be installed and cable to each TV set and this way set up your own private cable network, Firstly, the unit is now USB 2.0 configured in the usual Plug&Play or you had to use small radio transmitters which distribute the channel compatible, and secondly, the way, which makes it rather easy to all rooms, or you simply added any number of subscriptions to make transmission and reception to install the required driver and sure everybody in your family can watch the pay channel they want. capabilities have been vastly to open the programming tool. However, options 1 and 2 mean that the same channel has to be watched improved. Like for the previous by everyone in the house, and option 3 is only available for those willing model the power supply comes The software update only to spend money on several subscriptions month by month. from the PC's USB interface, yet takes some seconds and the an additional external power pack next step is the personalisation is also included. of the individual reception cards, which is one of the most crucial In direct comparison, the new The old SmartWi steps in the process because and improved model features very card had an antenna otherwise everybody within the sturdy reception cards which have which partially range of the control unit would lost their delicate touch that gave radiated into the have access to pay TV channels rise to some concern in the first receiver and thus – at least in theory, assuming all version, and the overall workman- could cause inter- those unauthorised users have ship gives a very positive impres- ference with some the same technical equipment. sion. The manufacturer offers a receiver models. SmartWi without personalised whole range of software on its cards is much the same as an website at www.smartwi.net, unprotected WLAN network. To Danish company SmartWi has a total of seven different recep- ranging from a firmware update for personalise the system, each looked at this dilemma and has tion cards, four of which can be the control unit or the appropriate card is briefly inserted so that come up with a simple yet ingen- active at the same time. Compli- PC applications to the download both ends can exchange a unique ious solution to this problem. The ance with the ISO 7816 standard of the instruction manual. There identification code. The other pay TV smartcard is inserted into is guaranteed and the manufac- is even a dedicated support forum benefit of this process is that two an external card reader which at turer says an indoor distribution for users and a support technician different SmartWi systems do the same time is a radio transmit- range of at least 15 m can be of SmartWi is available for expert not interfere with each other. ter. Special cards with a recep- achieved. There is no indication advice. tion antenna are then inserted regarding outdoor range, but In case the encryption system and/or the individual receivers into the slots of all receivers in we assume 150 m or even more require the correct ATR code to the house. If somebody selects should be possible. Everyday use Before the SmartWi box is be available directly on the card, an encrypted pay TV channel ready to use it has to be equipped this code can be read out from on their individual receiver the TELE-satellite presented this with the necessary firmware. On the original card by the control required key is requested by the clever solution some time ago, its website the manufacturer unit and then transmitted to all receiver from the original smart- but SmartWi has not rested on its offers two different types which active reception cards. In order card in the external reader. The laurels in the meantime and has support the Irdeto, Viaccess, to set this up the original card reader then transmits the valid been working to further improve Conax, Cryptoworks, Nagravision has to be briefly inserted into key back to the reception card in the system. Even back then both and Seca Mediaguard encryption the control unit, followed by all the receiver and the requested the manufacturer and TELE-sat- systems. The control unit is the reception cards. The box takes channel is shown on the TV. ellite received overwhelmingly size of a pack of cigarettes and care of the rest. For our practi- Sounds complicated? Maybe, but positive feedback from our read- features the USB interface for cal test we used the smartcard it works perfectly in a matter of ers, and the new version 8 offers establishing a connection with of a German pay TV provider in milliseconds. an improved transmitter/recep- the PC, as well as the plug for connection with an Alphacrypt tion unit on the cards, a PCB the external power pack, a status CI, a Cryptoworks card of Aus- This system does not only work antenna and an additional protec- LED and of course the core of trian public broadcaster ORF and with one or two cards, but with tion of the sensitive electronics the system, the card reader. The a Viaccess erotics smartcard with The power pack, the control unit and three SmartWi cards (only one shown) are included in the package TELE-satellite International — www.TELE-satellite.com a Viaccess CI.. The control unit current CI modules. While inter- detected all three original cards nal card readers are also sup- flawlessly and within moments ported in general, there is slightly all available pay TV channels less perfection with these when could be individually selected and compared to CI modules. watched on all receivers within the SmartWi system, all this with The SmartWi website offers a only one smartcard for each pay small tool for ambitious users and TV provider. experts, which shows information regarding the currently used pay In our test setup, all receivers TV smartcard and the complete were located in the same room, transmission/reception system. which is a rather unrealistic sce- This way possible problems can nario in the real world. So we went be detected and solved at an out and set up the whole system early stage. In addition there is in the house of one of our edito- another free application available rial staff. We tested the SmartWi which can be used to perform a system in different spots in the timing test. Generally, the inter- house from the basement hobby nal card reader of a receiver or room to the children's room in the CI module needs to access the loft and were impressed with the smartcard every ten seconds the results. Thanks to the control in order to be able to present a unit which was placed in the living selected pay TV channel error- room we were able to supply pay free. Calculating the keys in the TV all over the house. The 15 m CI module according to the infor- range given by the manufacturer mation received via satellite may is a safe estimate on the lower take up to two seconds. If several side of the maximum distance reception cards are in use at the between control unit and recep- same time it becomes obvious tion cards, and even reinforced that the system may sooner or concrete walls could not stop the later reach its limits. This is all radio waves. the more risky if a digital receiver requests the keys every four sec- According to the manufacturer onds, for example, instead of the up to four reception cards can be usual ten seconds. The timing tool used simultaneously. While we is used to exactly measure these cannot confirm this claim as only request times and depending three cards came with our test on the receivers' requirements, unit, we can nonetheless tes- it can be established whether tify that these three cards work indeed up to four reception cards perfectly when used at the same can be used simultaneously or time. Our test also confirmed that whether two cards are the maxi- the system is compatible with all mum. If you still use the maxi- mum number of cards in such a scenario, all four receivers may TECHNIC show decoding errors. DATA Manufacturer SmartWi, Denmark Fax +45 86406622 E-mail http://www.smartwi.net/contactus.html Model Wireless SmartWi, version 8 Function Card splitter with wireless radio transmission Radio frequency ISO 7816 Standard Range Inside >15m, outside n.a. Maximum number of reception cards 7 (4 of which active) Simultaneously available channels 4 Power supply Master max. 100mA, clients max. 50mA Firmware upgrade possible yes Dimension 90x57x23mm Expert conclusion + The radio connection between the card reader and the reception cards works flawlessly even over larger distances. This means that a connection between the control unit and several receives can easily be estab- lished in single-family house.
Recommended publications
  • Fausto Emulator Options
    Fausto Emulator Options CS cards Client supported: CCCam (TCP) Gbox (UDP) Newcamd (TCP) RadeGast (TCP) Camd35 (UDP cs357x) Camd35 (TCP cs378x) Camd33 (TCP) Gbox Listener (localhost only, default ports) Twin Protocol (Serial) CS Cards server supported: Newcamd (TCP) & EMM Support RadeGast (TCP) Camd35 (UDP cs357x) Camd35 (TCP cs378x) Camd33 (TCP) Support: - Ethernet (linux box, diablo wifi,...) - SSSP/HSIC/TM Share/CSC (Serial) - Season Interface (Cams/box Readers) - Diablo Wireless (base unit) Main Functions: - Emulator - Logger - Net client - Card server - Cards support - DVB Plugins (without pctv card) Monitor: Datas Showed: *Ch.Infos : Package name or extra infos *Ecm *Caid *Provider ID *Key Index *Key Value *Control Word decoded With Fausto internal emulator keys.bin file is required or Fausto will work like logger show Datas but decoded nothing. To load keys.bin clic on icon Folder or drag file Keys.bin on window. When ecm receive, FE (Fausto emulator) try to decode, if success Datas color will be repaint in blue in others case stay red For ECM not decoded : *keys.bin not loaded *caid/provider/valid key not on file (provider not managed or keys expired) Fixed CW Checked: use Direct Control Word from keys.bin Tracker checked: log all datas receive under tab Tracker Monitor checked: Show all datas under Emulator window Clear Datas: clean all datas showed under monitor & wait next incoming ecm for refresh Exit: Close emulator window For Local menu: Press Mouse right clic Options under local popup menu (mouse right clic) FeKid: Load
    [Show full text]
  • DVB-T (La "T" Sta Per "Terrestrial"-"Terrestre")
    Facoltà di Scienze Matematiche Fisiche e Naturali Anno Accademico 2008/2009 Tesina di Sicurezza su Reti 2 Prof. Alfredo De Santis Studente: Umberto Palo •Introduzione •I vantaggi dello standard digitale •Standard trasmissivi e Standard interattivi •Codifiche video •MPEG2 •Sicurezza nel sistema DVB •Il sistema per l’accesso condizionato (CAS) •Tecniche di scrambling •Cut and rotate •Line shuffle •Sicurezza e Gerarchia a livelli •Rimappatura •Il sistema Seca •La pirateria della televisione a pagamento •Le tecniche per la visione abusiva •I successi della pirateria •Proposte per combattere la pirateria. •Curiosità e info Università degli studi di Salerno Umberto Palo •Introduzione •I vantaggi dello standard digitale •Standard trasmissivi e Standard interattivi •Codifiche video •MPEG2 •Sicurezza nel sistema DVB •Il sistema per l’accesso condizionato (CAS) •Tecniche di scrambling •Cut and rotate •Line shuffle •Sicurezza e Gerarchia a livelli •Rimappatura •Il sistema Seca •La pirateria della televisione a pagamento •Le tecniche per la visione abusiva •I successi della pirateria •Proposte per combattere la pirateria. •Curiosità e info Università degli studi di Salerno Umberto Palo Il Digital Video Broadcasting (DVB) •rappresenta un insieme di standard aperti ed accettati a livello internazionale •concepiti per lo sviluppo e la diffusione della televisione digitale •ha prodotto degli standard per ciascun mezzo trasmissivo (terrestre, satellite, via cavo): •DVB-S (la "S" sta per "Satellite") •DVB-C (la "C" per "Cable"-"Cavo") •DVB-T (la "T" sta
    [Show full text]
  • Alexander Installation and Configuration Guide
    Alexander installation and configuration guide. Contents 1. First time installation ................................................................................................... 2 2. Configuration ............................................................................................................... 5 2.1. Client Configuration ................................................................................................ 5 2.2. Server Settings ......................................................................................................... 6 2.3. System Settings ........................................................................................................ 8 2.4. Status Page ............................................................................................................. 10 2.5. Reboot .................................................................................................................... 11 2.6. Enter first time installation ..................................................................................... 11 2.7. Software download ................................................................................................ 12 3. LED information........................................................................................................ 14 4. Factory reset .............................................................................................................. 15 5. Trouble shooting .......................................................................................................
    [Show full text]
  • CSCIP Module 6 - Mobile-NFC-Pay TV Final - Version 2 - October 8, 2010 1 for CSCIP Applicant Use Only
    Module 6: Smart Card Usage Models – Mobile, NFC and Pay TV Smart Card Alliance Certified Smart Card Industry Professional Accreditation Program Smart Card Alliance © 2010 CSCIP Module 6 - Mobile-NFC-Pay TV Final - Version 2 - October 8, 2010 1 For CSCIP Applicant Use Only About the Smart Card Alliance The Smart Card Alliance is a not-for-profit, multi-industry association working to stimulate the understanding, adoption, use and widespread application of smart card technology. Through specific projects such as education programs, market research, advocacy, industry relations and open forums, the Alliance keeps its members connected to industry leaders and innovative thought. The Alliance is the single industry voice for smart cards, leading industry discussion on the impact and value of smart cards in the U.S. and Latin America. For more information please visit http://www.smartcardalliance.org . Important note: The CSCIP training modules are only available to LEAP members who have applied and paid for CSCIP certification. The modules are for CSCIP applicants ONLY for use in preparing for the CSCIP exam. These documents may be downloaded and printed by the CSCIP applicant. Further reproduction or distribution of these modules in any form is forbidden. Copyright © 2010 Smart Card Alliance, Inc. All rights reserved. Reproduction or distribution of this publication in any form is forbidden without prior permission from the Smart Card Alliance. The Smart Card Alliance has used best efforts to ensure, but cannot guarantee, that the information described in this report is accurate as of the publication date. The Smart Card Alliance disclaims all warranties as to the accuracy, completeness or adequacy of information in this report.
    [Show full text]
  • Índice General
    AUTOR Javier Ferrer Aguilar DIRECTOR DE PROYECTO Carles Padró UPC Abril 2009 Índice general 1 Introducción.................................................................................................. 1 1.1 Contexto................................................................................................... 1 1.2 Propósitos y objetivos.............................................................................. 2 1.3 Limitaciones ............................................................................................ 3 1.4 Estructura de la memoria......................................................................... 4 2 Sistemas de Acceso Condicional (CAS)...................................................... 6 2.1 Arquitectura común de los CAS.............................................................. 7 2.1.1 Jerarquía de claves............................................................................................. 9 2.1.2 Distribución de claves ...................................................................................... 10 2.1.3 Interoperabilidad CA........................................................................................ 11 2.1.3.1 SimulCrypt.............................................................................................................. 11 2.1.3.2 MultiCrypt .............................................................................................................. 12 2.1.3.3 Comparación..........................................................................................................
    [Show full text]
  • Building a Launchpad for Impactful Satellite Cyber-Security Research
    SOK: Building a Launchpad for Impactful Satellite Cyber-Security Research James Pavur Ivan Martinovic Oxford University Oxford University [email protected] [email protected] Abstract—As the space industry approaches a period of rapid astrophysics. Academics in each domain have made valuable change, securing both emerging and legacy satellite missions will discoveries, but contributions in one field are easily overlooked become vital. However, space technology has been largely over- by researchers with a narrow focus on their own. looked by the systems security community. This systematization of knowledge paper seeks to understand why this is the case and This paper offers a cross-disciplinary synthesis of progress to offer a starting point for technical security researchers seeking to date on space systems security. The paper begins by impactful contributions beyond the Earth’s mesosphere. presenting a unified matrix of existing threat models - linking The paper begins with a cross-disciplinary synthesis of relevant attackers, vulnerabilities and motivations drawn from dozens threat models from a diverse array of fields, ranging from legal of prior studies. Underpinning this effort is an exhaustive and policy studies to aerospace engineering. This is presented as a “threat matrix toolbox” which security researchers may historical timeline of satellite hacking incidents, where our leverage to motivate technical research into given attack vectors own archival research is added to prior contributions from Fritz and defenses. We subsequently apply this model to an original and Manulis et al. [1], [2]. The combination of this historical chronology of more than 100 significant satellite hacking incidents analysis and threat modeling framework offers a useful aid spanning the previous 60 years.
    [Show full text]
  • DVB TELE-Satellite Receiver Guide
    € 7,80 ENG-CD The World’s Largest Satellite Magazine £ 4.95 04-05 TELE SATELLITE 2007 AU: AU$11.90 incl GST NG: Naira 500 B 9318 E EE: EEK 99,- ZA: R 44-95 INTERNATIONAL Country Company Report Company Report Report Dish Manufacturer Satellite Canada INFOSAT Wholesaler max communication Jiraporn Tangpiroontham Dirk Wittenborg President Managing Director Bangkok, Thailand Hamburg, Germany Company Report Receiver Manufacturer Fortec Star David McGrath General Manager Satellite Business in Winnipeg, Manitoba Toronto, Canada Company Report HDTV Broadcaster EURO1080 Yves Panneels Media Relations Manager Brussels, Belgium AF-8000HDCI Test Report HDTV CI Receiver with built-in scaler Exclusively for TELE-satellite Readers SatcoDX “World of Satellites” SatcoDX’s “World of Satellites” Software contains the technical data from every satellite transmission worldwide SatcoDX Software SatcoDX Software Activation Code Version 3.11: 5C4226C119615G77CGC8E43A54ED6GEA Activation Valid until the publication of the next issue of TELE-satellite magazine Code Download SatcoDX Software here: www.TELE-satellite.com/cd/0706/eng Step by Step Guide to Get SatcoDX Soft- the Internet and is allowed to access FTP. ware Running on Your Computer: Note: SatcoDX Software also runs without 1. Download SatcoDX Software Version 3.10 Activation Code, or with an outdated Activi- from the above URL, or install from CD-ROM ation Code. However, the satellite data on TELE SATELLITE INTERNATIONAL Note: if you have already installed Version Main Address: 3.10, you do not need to do it again. Check TELE-satellite International your currently PO Box 1234 installed ver- 85766 Munich-Ufg sion by click- GERMANY/EUROPA UNION ing the HELP Editor-in-Chief: button, then Alexander Wiese ABOUT.
    [Show full text]
  • Subverting Satellite Receivers for Botnet and Profit
    SUBVERTING SATELLITE RECEIVERS FOR BOTNET AND PROFIT Sofiane Mohamed Talmat [email protected] Abstract—New generation Set Top Boxes (STBs) are only by legitimate satellite receivers using official smart cards embedded Linux satellite TV receivers offering all the features of hold by the subscriber any Linux based machine, including wireless and network The encryption is provided by different CAS (Conditional connectivity, this allowed hackers to crack most satellite DVB- Access System) providers that are identified by a unique CA CA encryption schemes using card sharing and promoting the ID (table 1) however the main concept remains the same and apparition of a parallel black market for pay TV subscription at very low cost. is based on the encryption of the stream with a CW (Crypto word) that should be only decrypted by the related smart card This attack could be exploited to build a massive botnet of Linux with a valid subscription. based satellite receivers or even computers used for satellite decryption and accessing end users local area networks that will be used as an edge for any other kind of attacks. There are CA ID Company Developed by millions of unaware end users downloading and installing any 0x09XX Cisco NDS (CISCO) kind of plugins seeking cheap or even free satellite television, Videoguard then the attack could be difficult to mitigate, and could easily lead to a hacker controlling millions of devices on the internet. 0x17XX/0x18XX Nagravision Nagravision 0x06XX Irdeto Irdeto Index Terms—IoT, Card sharing, Satellite TV, attack, botnet. 0x0BXX Conax Conax AS 0x05XX Viaccess France Telecom INTRODUCTION 0x26XX Biss European During the last years, TV encryption scheme has evolved Broadcasting Union and adopted more complex cryptography designs and became Table 1: Some CAS providers almost impossible to crack using old techniques based on smart card cloning and emulation on open satellite receivers.
    [Show full text]
  • System Nagravision3 Key System Nagravision 3
    SYSTEM NAGRAVISION3 KEY SYSTEM NAGRAVISION 3 KEY PROJECTS FAQ ANNOUNCEMENTS JUNE 08, 2016, 16:00 JUNE 11, 2016, 11:10 JUNE 15, 2016, 01:48 June 09, 2016, 07:47 June 13, 2016, 01:07 June 17, 2016, 02:56 SYSTEM THOR VIACCESS MUSALMAN NAGRAVISION 3 NAGRA NAGRA 2 AURAT CHUDAI KEYPINK SPOTS UPCOMINGONEVENTS SCALPNECK PAIN + System nagravision 3 key JuneHEADACHE 18, 2016, 01:56 + Conditional access (abbreviated CA) or conditional access system (abbreviated CAS) is the protection of content by requiring certain criteria to be met before. MUTV Eutelsat BissRINGING 07/10/2016 Bulsatcom HellasEARS Sat Irdeto 05/10/2+ 016 AlmaSport TV Biss 25/09/2016 ESPN Caribbean & ESPN Syndication Biss Key 23/09/2016. Uydu Key ,Uydu Haber,UyduEYE Frekans,Uydu FLOATERS Şifreleri,Güncel Keyler,Güncel Turksat 1C Frekans Listesi ve Kanal Listesi,Hotbird Frekans Listesi Kanal Listesi. Sky wurde nun endlich geknackt. Zumindest titeln ettliche Internetforen im Moment ihre Beiträge, welche sich fast ausschliesslich mit dem neuen Sender Sky befassen. Przy okazji bieżących wymian kanałów między transponderami Cyfrowego Polsatu oraz nc+ także klienci usług pre-paid uzyskali kilka drobnych bonusów. Key 00 in DEC: 107 144 063 033 100 152 195 093 167 140 246 030 128 238 146 187 =====. System nagravision 3 key June 19, 2016, 00:49 Conditional access (abbreviated CA) or conditional access system (abbreviated CAS) is the protection of content by requiring certain criteria to be met before. Key 00 in DEC: 107 144 063 033 100 152 195 093 167 140 246 030 128 238 146 187 =====. Nagravision (or Nagra Kudelski or simply Nagra) is a company of the Kudelski Group that develops conditional access systems for digital cable and satellite television.
    [Show full text]
  • Analyzing the Modern OTT Piracy Video Ecosystem
    Analyzing the Modern OTT Piracy Video Ecosystem A Technical Paper Prepared for SCTE•ISBE by Don Jones Senior Manager Comcast Cable Communications Management, LLC 4100 East Dry Creek Rd, Centennial CO 80122 303-712-3588 [email protected] Kei Foo Senior Manager Charter Communications 8560 Upland Drive, Suite B, Englewood, CO 80112 720-518-2343 [email protected] © 2018 SCTE•ISBE and NCTA. All rights reserved. Table of Contents Title Page Number Table of Contents .......................................................................................................................................... 2 Introduction.................................................................................................................................................... 3 A Brief History of the Pirated-Content Ecosystem ........................................................................................ 3 The Financial Impact of Piracy ...................................................................................................................... 5 Business Models of the Pirate Offerings to Consumers ............................................................................... 6 Two Types of Content Delivery ..................................................................................................................... 7 Live Streaming Content Acquisition .............................................................................................................. 7 Live Streaming Content Distribution ............................................................................................................
    [Show full text]
  • Attacks on Pay-TV Access Control Systems
    Attacks on Pay-TV Access Control Systems Markus G. Kuhn Computer Laboratory Generations of Pay-TV Access Control Systems Analog Systems remove sync information, try to confuse gain-control in receiver, etc. cryptography is not essential part of decoding process still dominant type for most cable-TV premium channels Hybrid Systems broadcasted signal conforms to analog TV standard (PAL, D2MAC, NTSC, SECAM) analog signal scrambled with digital framebuffer using a cryptographically transmitted control word fully cryptographic subscription management using smartcards examples: VideoCrypt, EuroCrypt (EN 50094), Syster Nagravision Digital Systems broadcasted signal is digitally modulated, encrypted, and multiplexed MPEG-2 audio and video data stream cryptographic subscription management using smartcards as with hybrid systems examples: DVB, DSS/VideoGuard Example of a Hybrid System: VideoCrypt CPU1 CPU2 ADC SAT- FIFO-1 FIFO-2 Scrambler Smartcard receiver DAC TV OSD EPA 0428252 A2 Features: scrambling by active-line rotation, requires only memory for one single image line vertical-blank-interval data contains 32-byte messages with blacklist/whitelist data smartcard calculates 60-bit MAC as control word from 32-byte messages every 2.5 s CPU1 salts control word with frame counter to generate 60-bit PRNG seed per frame Scrambler uses 60-bit seed to generate cut-point sequence per frame An Image Processing Attack on VideoCrypt unscrambled source signal broadcasted scrambled signal result of cross-correlation with edge detector avoids horizontal final b/w descrambling result obtained cutpoints marked penalty zones around cut points without knowledge of card secret The VideoCrypt Smartcard Protocol Flow control ISO 7816 T=0 protocol: sent by decoder /smartcard CLA INS P1 P2 P3 INSDATA[1] .
    [Show full text]
  • SCCR/20/2 Rev E
    E SCCR/20/2 REV ORIGINAL: ENGLISH DATE : MAY 10, 2010 Standing Committee on Copyright and Related Rights Twentieth Session Geneva, June 21 to 24, 2010 Study on the Socioeconomic Dimension of the Unauthorized Use of Signals – Part II: Unauthorized Access To Broadcast Content – Cause And Effects: A Global Overview prepared by Screen Digest, London* * The views and opinions expressed in this Study are the sole responsibility of the author. The Study is not intended to reflect the views of the Member States or the Secretariat of WIPO. SCCR/20/2 Rev 2 TABLE OF CONTENTS TYPES OF UNAUTHORIZED ACCESS............................................................................... 5 PHYSICAL PIRACY ................................................................................................................ 5 HARDWARE BASED UNAUTHORIZED ACCESS .......................................................................... 5 UNAUTHORIZED RE-BROADCASTING OF SIGNALS.................................................................... 5 EXTRA-TERRITORIAL TV ACCESS (GREY MARKET).................................................................. 5 UNAUTHORIZED ACCESS – A REGIONAL VIEW ............................................................. 6 NORTH AMERICA ................................................................................................................. 6 LATIN AMERICA.................................................................................................................... 6 ASIA...................................................................................................................................
    [Show full text]