SATELLITE PIRATES To the American heartland, they're information-age Robin Hoods, dispensing cheap cable access. To the cable industry, they're organized crime, pulling in half a billion dollars a year.Their story has never been told. Until now. A Wired Exclusive by Charles Platt. _________________________________________________________________ The Hacker Connection Paradise Island, Bahamas: In a Holiday Inn, I sit watching the ocean, listening to the air conditioning, waiting for the phone to ring. I'm here to make a connection, to meet a figure from the information underground. He's been described by one law-enforcement expert as "one of the kingpins" in video piracy. For the past eight years, he's been supplying black-market hardware to hundreds of thousands of families scattered across rural America. The hardware has one simple purpose: to descramble TV transmissions so that people who own satellite dishes can watch superstations and sports events without paying the usual fees. This so-called kingpin has a sense of humor. His alias is "Ron MacDonald" (the misspelling is deliberate). But his business is no joke. Consumers may be spending as much as half a billion US dollars every year to receive pirated satellite TV. The numbers are hard to believe, but they can be extrapolated. In the United States, according to the Satellite Broadcasting and Communications Association (SBCA), there are about 3.7 million home satellite TV dishes. Most are owned by farmers, country folk, the last types you'd expect to be law breakers; yet according to General Instrument, designer of the decoder hardware, only 1.8 million dishes are equipped with legitimate descrambling modules. This means that nearly 2 million dishes are unaccounted for. If they have no descrambling equipment, they can only receive a few stations: the Home Shopping Network, the Weather Channel, and various religious networks that are broadcast "in the clear." How many people do you think spend thousands of dollars on a dish for home shopping networks? Let's be conservative and assume that fully half of the 2 million "mystery users" are depriving themselves in this way. That still leaves at least a million who do want to watch movies, superstations, and the other scrambled goodies. Those viewers must use illegal equipment to achieve that goal. Usually, a TV dealer is the intermediary who buys parts and software from a pirate such as "Ron" and then discreetly offers to modify a dish owner's decoder so that it will receive many stations for free. The federal penalties for this back-room electronics handiwork are mind-boggling: a US$500,000 fine or five years in jail, or both. Some dealers have been imprisoned, yet my sources indicate that there are still at least a thousand operating outside the law, because the money is good, or because they are ornery individuals who feel there's a principle involved. As a dealer in Arkansas told me, "The airwaves should belong to the people. If a TV signal comes trespassing onto my property, I should be free to do any damn thing I want with it, and it's none of the government's business." In Canada, the story has a different twist. In order to protect Canadian culture, the government limits the amount of US programming that local cable networks can carry. As a result, consumers buy dishes so that they can watch American TV. This, however, creates a problem: most American programmers don't own the right to sell their wares outside the United States. Consequently, they can't accept subscriptions from Canadian viewers, which means that of approximately 500,000 dishes in Canada, almost all are violating US copyright law, quite apart from regulations on the export of decoder equipment. In Mexico and in the Bahamas, the situation is the same: you can't legally subscribe to US programming, which means that every single viewer, by definition, is violating US law. The capital of the Bahamas is Nassau, located just the other side of a bridge from my hotel room on Paradise Island. The town is an uneasy mix of ultrarich and ultrapoor and has been scarred by two waves of imperialism. The British installed a government, laws, some funky little roads, and the metric system. The Americans added an airport, dollar-denominated currency, and a bunch of modern tourist resorts. Colonel Sanders and Tony Roma are doing business overlooking the marina -- but that's just a facade, a clumsy imitation of Mall Town USA, catering to visitors for whom familiarity breeds contentment. Two blocks back from the water, Mall Town gives way to Shanty Town, where local families live in colorfully painted tumbledown huts. Dogs lie around in the dirt, and skinny kids haul water from a communal faucet. Still, even here among thickets of date palms and cypresses, you find 8-foot dishes aimed at the sky. The only local channel is a graveyard of old movies and threadbare sitcoms, and the craving for ESPN, CNN, and HBO is universal. Even some of the humblest homes on the island have dishes outside. Put together Canada, the United States, the Bahamas, and Mexico, and you find that at least 1.5 million people are using illegal hardware and illicit authorization codes to descramble satellite TV. Typically, a user pays $15 a month for code updates and maybe $100 a year for hardware upgrades that are necessitated by ECMs (electronic countermeasures) that General Instrument uses in its ongoing war against piracy. This means that the average illegal user may be paying $300 a year for television access. Multiply that by 1.5 million, and you see how satellite video piracy is a business worth half a billion dollars annually. Truly, it's a multinational, information-age version of organized crime. But amazingly, this has barely been reported by the national media. In fact, it seems that none of the big-time video pirates has ever been approached by a journalist. Ron MacDonald will be the first to go public -- assuming he follows through and calls me on the phone. His activities appear to be legal in the Bahamas, which is why he recently moved to Nassau from his home town of Burlington, Ontario. Even so, he's extremely cautious. Bounty hunters have occasionally seized video pirates, slapped handcuffs on them, dragged them onto US soil, and turned them in for reward money. Mindful of this, Ron never tells outsiders where he plans to be at any particular time, and he has communicated with me via a private computer bulletin board that he maintains in Nassau to serve his network of dealerships. He offered me a simple deal: if I was willing to fly to Nassau, rent a car, drive to the hotel on Paradise Island, and wait in my room, he would call me at 5:00 p.m. with further instructions. I was willing. So now I wait. Marooned at Pirates Cove The phone rings at 5:02. He sounds relaxed, amiable, like the manager of an auto dealership, or maybe the owner of an appliance store -- a straight-shooting businessman in his 40s, offering the customer a fair deal. "I'll see you at Tony Roma's at eight," he tells me. Tony Roma's? This doesn't sound like the glitzy subculture of data theft romanticized by such writers as William Gibson. I guess that's the difference between fact and fiction: I'm stuck here in a middle-American tourist trap. When I venture down to the hotel lobby, I see a van in the parking lot with "Cruising and Boozing" hand-lettered on its side, releasing a mob of lobster-red ocean enthusiasts. They've had a heavy afternoon of drinking and swimming and fishing and drinking and will soon be ready for a night of serious action at the local casino. Here they come, stumbling up the steps, dizzy from rum and sunstroke. This Holiday Inn happens to be located on a bay named Pirates Cove, so the doorman wears a full pirate costume, including eye patch andtricorner hat. He ushers the sun worshippers into the lobby, where an amplified Caribbean steel band is playing loud enough to drown the screaming of caged parrots, and teenagers in swimsuits are wandering around looking hot, wet, and horny. Meanwhile, out at the back, free plastic cups of nonalcoholic Caribbean punch are being served beside the swimming pool, and a calypso band has set up on a life-sized fake galleon on the beach. The pirate motif is everywhere; teenagers are wearing skull-and-crossbones T-shirts, and little kids brandish cardboard pirate masks. To the vacationers, piracy is a Disneyland concept, a laugh from the past. They'd be surprised to learn that it still flourishes here in the Bahamas and is now lucrative beyond Captain Hook's wildest fantasies. Ribs, with a Modem on the Side When I get to Tony Roma's shortly after eight, I see them right away: two guys sitting side by side at a table where they can watch the door. One of them has graying hair brushed straight back, a neat mustache, and a rounded, sunburned, prosperous-looking face. He's a large man, resting his arms calmly on the table. His companion is younger, taller, thinner, paler, with a few days' worth of a beard. He's wearing glasses, and he looks nervous. He has "hacker" written all over him. I go over to them, and we shake hands. The big man is Ron; the skinny guy is Fred Martin (he refuses to say whether this is his real name) -- he's the one who writes most of the counter-encryption code. The mood is very uptight, and neither of them makes much eye contact. Vacationers close by are talking about moisturizer and sunblock. Reggae-Muzak is playing in the background. The waitress wants to know what we want to eat. Ron orders ribs; I go for marinated chicken. I figure the best way to get acquainted with a hacker is to show some hardware, so I pull out my laptop computer, which uses a 14.4 PCMCIA modem the size of a credit card. Yes, this breaks the ice. Fred eyes the modem covetously. "Have you opened it up, yet?" he asks me in a soft, shy Canadian accent. "He always opens things up," says Ron. He chuckles. "And sometimes he even puts them back together again." Ron sounds like somebody's uncle, indulgent, fond of the slightly younger fellow sitting next to him. I imagine them doing a comedy routine, with Fred the Hacker saying something like, "Hey, Ron! I just got a great new idea for disassembling the code in a U-11 chip. It'll make us 10 million bucks. Can I use the electron microscope? Can I?" And Ron the Businessman says, "Not till you eat your greens, Fred." The three of us make small talk, since this obviously isn't the place for an interview. After we finish eating, Ron pulls out his Motorola cellular phone. He murmurs something into it, then nods. "All right," he says to me, "I think you should see an actual setup. A dealer who fixes boards. Are you ready?" The Code Distribution Network They tell me to leave my car and travel with them. We follow a maze of back1980s. For its audio portion and key management system, VC uses the Data Encryption Standard (DES) controlled by the federal government. GI also has the exclusive license to use VideoCipher technology, which means it has total control of both the hardware and the software. This is the kind of market dominance that even Microsoft would envy. I inspect the board and see that a wire has been added and a chip has been soldered off, allowing a socket to be put in its place. In the socket sits an EPROM -- Erasable, Programmable Read-Only Memory. This is where Fred stores his program code, which takes control of the board and overrides its usual instructions. "How easy was it to hack?" I ask him. "Such as this," says Joe. He holds up the heat gun, which is one of the items I didn't recognize before. "If you use it right," says Fred, "you make the epoxy pliable without frying the components underneath, and then you just carve it away with an X-Acto knife." He sounds as if he wants to do a demo, but Irecalls. "We let it sit on the board overnight -- and the next morning, half of the board was missing. But then someone came up with the b00,000 fine. When you log off, though, your screen displays a little reminder: BANG... BANG... BANG... Did you hear that! Was that a knock on your door? By sifting data and asking a lot of questions, I mapped the structure and history of satellite TV. It runs like this: A programming company like HBO uplinks its signal to a satellite so the satellite can rebroadcast its signal across all of North America. Originally, this setup was purely intended to serve local cable TV companies, which would receive the signal, pay for it, and distribute it to their cable subscribers. But in the early 1980s, home users started buying their own dishes, paying up to $10,000 for a complete installation, and tapping into the free stream of data. Ever since the earliest days of television, these heartlanders had been poorly served with a handful of channels and unreliable, snowy reception. Now, suddenly, they had access to literally hundreds of options, from news to movies to international sports events. Of course, it was too good to last. In January 1986, Time Inc.'s subsidiary, HBO, started scrambling its signal, and one by one, the other satellite programmers followedsuit, using technology provided by General Instrument. At first, only cable TV companies were given descramblers. Home users weren't given the option to buy them -- at any price. Six months later, after their howls of fury had finally penetrated the executive suites at HBO, VC IIs were offered for up to $700 apiece. If you opened up the box and did a chip count, you found fewer components than in a home computer akin to the Commodore 64, yet the price was twice as high. But there was worse to come. The descrambler would do nothing unless it was given a wake-up call -- a special authorization code that the programmer could send along with the regular TV signal. It could be addressed to a authorization signal. This "all for one, one for all" system was nicknamed a "Three Musketeers" fix. Subsequently, as GI retaliated with electronic countermeasures and hardware revisions, the hackers had to resort to increasingly complicated workarounds. After three years of this struggle, GI basically admitted defeat and introduced a totally new encryption system: the VC II Plus. They warned consumers to send back their old boards for a free Plus replacement right away, because the old VC II system would be phased out completely. According to Jim Shelton, former vice president of North American consumer products at GI, 300,000 of the 1.9 million VC II owners took advantage of this offer. Unfortunately, though, it didn't apply to people whose decoders had been illegally modified. As a result, 1.6 million of these "chipped boards" remained in private hands. How could they be saved from extinction when the old VC II signal was discontinued? Well, it turned out that the signal wasn't going to disappear after all -- at least, not for a year or two. For reasons that still remain a mystery, GI continued broadcasting VC II authorizations to cable compas wasn't going to work. The pirates were undaunted. In 1992, an enterprising pair of guys named Jeff Carr and Jeff Mayes came up with a radical concept which they named VMS. This was a subassembly which could be mounted on the old VC II boards and could enable a board to receive its "wizard codes" automatically from a local dealership, by phone, as often as necessary. In this way, the data that people needed to descramble TV transmissions could be distributed over regular telephone lines, and no one would need to key in code numbers anymore. According to industry sources, Jeff and Jeff (as they were known in the trade) used their VMS modification to set up an automated code-distribution system that would pass the "magic numbers" through a chain of dealers across the entire continent. This was such a big hit that Ron MacDonald commissioned Fred Martin to reverse-engineer the product so they could market their own version of it. Today, a lot of Ron's business depends on "wizard codes" being distributed via modem. In 1993, Jeff and Jeff were raided by US Customs agents who hauled away many VMS business records. In response, the two Jeffs published a disclaimer in a trade magazine calmly stating that it was all an unfortunate mistake. Their VMS system had never been intended for signal theft (although, of course, it could potentially be used that way). VMS, they claimed, was not an acronym for Video Modem Service, as many people believed; it meant Video Marketing Service, and its original purpose was to distribute advertising messages to TV screens. As a cover story, this might have seemed a bit hard to swallow. Still, charges against Jeff Carr were eventually dropped, and no further charges nths," it reads. "Make checks payable to Ron or Joe." I look at him in surprise. "People pay you by check?" Joe smiles. "You're in the Bahamas, now." "And all boards in Nassau use this system?" "Not all," says Joe. "You can buy a legal, unmodified VC II Plus decoder through an American dealer, who will subscribe on your behalf to the channels that you want, using a fake American name and address. Naturally, you have to reimburse him for the subscription fees, plus his service fee. But this is a violation of US law, and if General Instrument finds out, they stop sending your Plus board authorization codes, and it's permanently dead." "Permanently?" I ask. Up till now, the mood in the garage has been upbeat. Now, there's a silence. Everyone is uncomfortably aware that the VC II Plus has not yet been successfully hacked, while more and more TV channels are using its new encryption standard. Fifty stations still use the old VC II standard, including the superstations and the sports networks. But the numbers are slowly dwindling, and some dish owners are finally deciding that the party's over. They're biting the bullet, going legal, paying $400 or more for a VC II Plus and subscribing to a package of channels for an additional $300 a year. After all, it doesn't cost much more than paying the pirates, and it buys a better choice of stations. Joe drags another board out of the stack. "This is a VC II Plus," he says. Fred points to the largest component. "They put together five separate chips in that VLSI chip." "That's the bugger that nobody can crack," says Ron. There's another thoughtful pause. "Actually," he sae, and he wanted to market it through my BBS. I agreed to this. The first software disks we sold for $5,000 each, and each decoder required a VMS modem attachment, which sold to dealers for $100. I was buying the software from Jeff for $2,500 and the VMS modems for $65. That represented a reasonable, healthy profit." So what went wrong? "They agreed not to sell to anybody else in Canada. I had the exclusive rights, and all orders would go through me. Three months later, I found they were selling to somebody in Ontario. I complained about this, so Jeff said he would give me $7 commission on each Canadian sale. When he owed me $20,000 in commissions, and I hadn't seen a nickel, we reverse-engineered the board inside of six weeks." He shrugs. "I did what you'd expect a pirate to do." (Attempts to reach Carr for comment have been unsuccessful, but his business partner, Jerry McCarter, still maintains that the VMS system was never intended for video piracy. He insists that VMS is a legitimate, tax-paying US corporation.) "Basically," says Fred, "there are three kinds of people in this business. There are people who do no R&D at all and rip other pe big windows, palm trees and white hotels stand against a brilliant blue sky. Fred Martin comes wandering in, even more unshaven than the day before, with his computer in a case hanging from his shoulder. He dons a dowdy black cotton jacket to ward off the air conditioning. He orders tea; I have an individual pizza. A large, deeply tanned, disapproving couple is sitting at the next table, wearing sunglasses. They stare in our direction as we drag out our two computers. I start typing notes on mine; Fred doesn't use his, but he seems to feel better having it open beside him. I ask him how he got into the piracy business. "I've known Ron for about ten years. He called me in to take a look at the very first VC II. Somebody had already done a lot of work on it. I did some debugging on a chip, fixed it up." He shrugs. I ask him how the VC II was cracked so quickly. "It's no secret that information has been leaked from General Instrument. I have some myself, papers that say, 'General Instrument, Sensitive Materials, Do Not Release.' Now, how they came out of a high security factory, I don't know." It sounds as if he does know. "Well," he says, "it would have been in the interests of GI to see that the VC II was hacked as quickly as possible. They sold a lot more units once people could use them to get free programming." Is he saying that the corporation knowingly released its own secrets, after taking devel sort of militant rider who kicks cars if they cut in on him. I ask if he ever gets scared, as a lawbreaker. He starts telling me about the big bust of 1993, in which General Instrument supported a sting operation through US Customs, luring a number of hackers (including Jeff Carr) to New Orleans, where, they thought, they were going to purchase the elusive fix for the VC2 Plus. The customs agent, who called himself Richard Collins (his real name was Richard Coleman), almost persuaded Fred to join the party. "Originally," Fred recalls, "he got in touch with us by ordering our products, as if he was a dealer. Then one day he left a message on the BBS saying he had a friend in Arkansas who had developed a Plus fix and would only sell it through Collins. "It seemed odd to me that he'd been an amateur, and suddenly he was a kingpin. There's a lot of scams that go around, and I've seen people who take a board, solder some wires, and say look at my fix, for only $100,000 you can have this. So I figured this guy was bullshit. But, I try to keep my mind open, so I went and met him in a shopping mall in Buffalo. "He wore cowboy boots, blue jeans, a white shirt. He was in his mid-30s, clean-shaven, average weight. What sticks in my mind, though, is that he was really paranoid. He kept asking where we were going and exactly what would happen. Well, we went and talked in a restaurant in the shopping mall. I seem to recall I had a fruit cup. They didn't sell fruit cups, but I got them to make me one. Anyway, Richard said he had the modules in a briefcase in his car trunk, so we went and visited a dealer I knew nearby and borrowed his shop for a couple of minutes. "The boas of modified units unable to steal programming. The operation sent shock waves through the hacker underground." But according to Fred, this wasn't the most interesting aspect of the story. Two of the people arrested were Jeff Carr and Jeff Mayes, originators of the VMS modem system. In the course of reverse-engineering the VMS system to develop his own version of it for Ron, Fred had found a "back door" in its program code. In other words, if someone knew a secret password, that person could dial into any dealer's VMS system without being detected. Moreover, because all the dealers' systems were linked together so that codes could be passed along automatically, the intruder would be able to step through the entire dealer chain from top to bottom, gathering every dealer's name and every customer's phone number along the way. To Fred, it looked as if "Jeff and Jeff" had written themselves an insurance policy. If they were ever arrested, they could plea-bargain by offering to hand over the back-door password that would unlock their entire system. When all charges against Jeff Carr were dropped after the New Orleans event, Fred felt that his suspicions were confirmed -- although, of course, he couldn't prove anything. But there was another implication have." He points at names scrolling up the screen. The display stops, seemingly at random, at a man named Ford. His title is US Deputy Chief of Mission to the Bahamas. "It's fairly common knowledge where his house is," says Joe. "I can tell you how to find it. You might want to stop by and look at his dish. You see, everyone in Nassau is breaking US law. I even know some DEA agents down here who have chipped boards. It's accepted. There's nothing to it." Perhaps this seems like a long chain of suppositions, but consider the facts. If a dish has been installed, we can assume that someone wants to use it. If it's being used to receive American programming, copyright violations are almost certainly involved, because American programmers don't generally own the right to distribute their fare in foreign countries. Moreover, if a dish is receiving scrambled channels, there are only two ways this can be done: by using a "chipped board" (which is itself illegal) or a VC II Plus, which cannot be exported legally from the United States. Thus, anyone who uses a satellite TV dish in the Bahamas almost inevitably violates at least one US law. Ron closes his computer. "Now," he says, "were there some other questions that you wanted to ask me?" I tell him I want to know how he got started in the business. "I was renting out videos back in the early 1980s, when I realized that I could tape HBO from s a fix for it, and nobody could pull seed keys and write software for it. Through the efforts of my new team, we extracted seed keys and started selling them through the United States and the Caribbean, and eventually sold seed-key pullers. We accidentally released the first set of seed keys to one Canadian and one US guy; within 24 hours, they were sold throughout North America and the Caribbean, and we lost $500,000 on that. That was the famous set of seed keys, 97FA, and after that we realized that pirates will pirate pirated software from other pirates, any time of the day or night. It's the nature of the industry." But he seems to set himself apart from that dog-eat-dog mentality. "It's ultimately self-defeating," says Fred. "People trust us today, more than anyone else in the business, because they know we don't bullshit." Is there a truly positive aspect of video piracy? "Absolutely," says Ron. "If it wasn't for piracy, the price of programming whey having fun doing ECMs or what? They've had the Plus out for three years, and every legitimate consumer has one now. GI could upgrade their last commercial customers real cheap and shut down the VC II system completely. I don't understand why they don't do that." I turn to Ron. Does he have any questions? He smiles. "I'd like to know about the rumor that GI paid John Grayson $3 million for his version of a Plus fix. You know, Grayson definitely owns the capability. He did all the necessary background work." "I saw it," Fred agrees. "There was a strong indication he was planning to release it in March, 1994 -- and then it just didn't happen." Who is this man Grayson? "He built his own proprietary implementation of the VC II several years ago to compete with GI. It was a completely different, legal board. He was in the midst of negotiating to set up his own authorization network and uplinks when GI organized a raid on his business. They went after him for copyright and patent infringements, although I'm not even sure the product is patented in Canada." "After two years of trying to follow the case through the courts," says Ron, "I lost track. The point is, Grayson has marketed no product for the last two years -- yet an engineer who works for him just bought a new helicopter." (Subsequently, my attempts to verify this story with Grayson are unsuccessful. He seems to have left the United States, and pirate sources claim to have no idea where he's gone. The story remains just another unconfirmed rumor, in a field where rumors are common currency.) I ask Ron whether, if he had a Plus fix himself, he would be tempted to sell it to GI, assuming Gg them carries that same maximum penalty of $500,000, a five-year jail term, or both. In some cases, products have been smuggled in via Native American reservations. For obvious reasons, no one wants to discuss the details. The publisher of Satellite Watch News is Dan Morgan, a former subscriber who purchased the magazine in January 1994. Unfortunately for Morgan, after the New Orleans sting, advertisers have backed off. He seems unconcerned, however. "The advertising has dropped," he says, "but I foresee, in the near future, a revolution in the pirate industry. You would be amazed if you could see the work that's going on in laboratories right now." Morgan is a Vietnam veteran, a gun-owning, liberty-loving, heartland American who is deeply disturbed by trends toward greater government control and regulation. He believes in free access to the airwaves and is outraged that in 30 states, local laws make it a crime to own descrambling equipment even if you never actually use it. "I think you should be able to possess any damn thing you want, so long as you don't hurt people," he says. He describes himself as an R&D engineer, and he says that his company, Morgan Engineering, designs electronic devices. Does that include VC II modifications? "I just report on the industry," he says carefully. "It would be foolish for me to get involved in any way. But I will say that it's people like them [video pirates] who make the world a great place." Does this mean he endorses piracy? "I'm in a position where I cannot say that piracy is OK. However, I believe in the Constitution of the United States very cabin fever?" He chuckles happily. "You get to know your family real well." When I speak with him, Shelton seems to get active enjoyment out of his cat-and-mouse game; but when I suggest there's a humorous side to it, he quickly reverts to a more corporate tone. "It's no more amusing," he says, "than people who don't pay their bills." I ask if the name Ron MacDonald means anything to him. "Oh, yes. He's a big-time pirate. He's made a lot of money. I met him at a trade show one time. When I started doing some background checks, I found out he was one of the kingpins involved in piracy.... I was very disappointed he didn't come to Louisiana [for the New Orleans sting operation]." Is Shelton aware of the rumor that General Instrument released its own encryption secrets to boost the demand for decoders? "I can find no evidence of that activity," he says. "And once security was broken, aggressive countermeasures were taken, followed by realization that a complete rework was needed, with the focus on the consumer market." He adds: "Our initial purpose for encryption was not for the home market, but to secure the cable market using commercial decoders." He was launched thanks to the direct-to-home market, because there are now 1.7 million authorized decoders receiving satellite TV. So the market base is there, and we are going to have better quality programming." This sounds reasonable. Yet Shelton's smooth, amiable manner distracts from the darker implications of his work. GI has been accused by many satellite TV dealers of hiring ex-FBI agents who are paid on a commission basis to entrap dealers, subjecting them to penalties that seem cruelly severe compared with their crime. John Norris, whose title is manager of special projects at GI's Access Control Center, has a direct, hands-on involvement in this legal process. He describes himself as "Jim Shelton's trigger man." "I've testified recently at trials where guys got ten months in prison," he says, calmly, unemotionally. "In Great Falls, Montana, a guy got 37 months in prison. All these guys were thumbing their noses at the system, and now the system is coming back and whacking them." He's helped to achieve more than 100 convictions. Does this give him any mixed feelings? "I don't feel good or bad about it," he says. "It's up to the justinquiry and promises to send me the arrest records and court transcripts (which are, of course, public property). But when I call him the next day, he claims he can't find any record of the case. He believes I must have made an error. Satellite Watch News has already published a copy of the criminal complaint against Jeff Carr, sworn by customs agent Richard Coleman in US District Court, Eastern Louisiana, on September 8, 1993. So I am able to tell Mr. Boitmann the case number. This does not please him. He sounds considerably less friendly as he tells me that he'll check again and get back to me. But he never does call back, and when I make further attempts to contact him, my calls are not returned. Maybe I'm picking up the low-key paranoia that pervades the pirate community, but it seems to me that someone, somewhere, doesn't want us to know exactly what has happened to the people who were arrested in Louisiana. It's Only Television, Right? When I try to contact Carr at his home number, I reach an elderly woman who tells me, with elaborate caution, that he's out of town and that she doesn't know when he'll be back. In the meantime, however, I've made contact with one of John Norris's victims, who was caught in a previous sweep. He currently participates on Ron MacDonald's bulletin board under a fake identity, but he's so nervous, he refuses to use even this name during our telephone conversation. He refers to himself simply as "Dave." "There was a knock on my door," he recalls, "and I looked out and saw all these guys with bright orange letters on their dark blue windbreakers. FBI, Customs, police. There were guys at the front door, the back door, the sides of the house. They were in the car port -- it was like I was Charlie Manson. They scared the shit out of my wife and kids. They searched every room, and they took photographs when they came in and when they left, so I coule first three years. I've been to Okinawa, to Le Havre, to London -- we took trips you wouldn't believe, based on the money from this. It was big money, and it was easy money." He's now partway through five years of probation. If he gets caught again during that period, he'll serve jail time not just for the new charges but for the old ones as well. Even so, he says, "I'm still involved with the business, because it's the only way I know how to make a living." Like many others, Dave was invited to New Orleans. Fortunately for him, he didn't believe that the Plus fix was real, so he chose not to go. "If I had," he says, "I'd be in prison right now." Dave was personally acquainted with the man in Montana whom John Norris helped to put in jail. "His name was Jack Lande: he's an Indian, he was operating out of a reservation, so he figured he was safe. But he had the FBI there, and Customs, and the Bureau of Indian Affairs, and now he's doioard profit, not very much. They'll use that for their Playboy channel or HBO, and then they'll still use their old modified VC II board for the other channels it can get, so they don't have to pay $200 a year for that programming." And so, cautiously, Dave continues to eke out a living, aided by Ron MacDonald's code distribution system. "Ron has promised me that he's got my name, and all the subscribers to his bulletin board, locked in a bank vault in the Bahamas. I've got a lot of faith in this guy, but if he ever sells off that list, you can probably say goodbye to piracy -- unless somebody comes up with a crack on the Plus." Would that really make a difference? "Oh, yeah. If you pop the Plus, it'll start all over again. I would be willing to move anywhere and start a new business under a different name, change my fingerprints, whatever it takes. I would make a million dollars in 30 days, then relocate to Australia or somewhere." Surely, it wouldn't be that easy. "Yes, it would. Here's how it goes. I walk into a customer's house and I've got me a busted Plus. I plug it in and tell them, you watch it for a week, and I'll come back, and if it's still working, you buy it from me for $700. Believe me, they'll buy. I could drive across this country with a van full of boards, and I could stop at every satellite dish, and every place I stop, I could make a sale. I guarantee it." But General Instrument claims there are ECMs inside the Plus just waiting to be set off. "I don't know that I believe that. See, they can't change the access keys so often, because there are so damned many boards out there. Only 300,000 VC II boards were ever authorized, so they can change the code every three days. But they got dnufacture or license the manufacture of DigiCipher decoders for sale to every satellite TV subscriber and every cable TV viewer in every city in America. As a result, more than 30 million consumers would be forced to buy the GI product. Tele-Communications Inc. (TCI) ofDenver has greeted this possibility by already ordering 100,000 decoders. But other GI competitors are less eager to embrace the monopoly. In March 1994, The New York Times reported that in response to complaints, GI has been the target of a six-month investigation by the Justice Department's antitrust division, which is also scrutinizing the incestuous relationship between GI and TCI. The results of this inquiry are not yet known. Most recently, in April 1994, Satellite Business News reported that the FBI's office in Hickory, North Carolina, "has opened an investigation in an effort to determine how the technology used to compromise the VideoCipher system was distributed into the hacker underground.... General Instrument maintained a major distribution and repair facility in Hickory until last year and still has a small office there." Of all the people I spoke to while researching this article, no one had a kind word to say about General Instrument Corporation -- not even the TV programmers. When I asked the publisher of a conservative trade journal if he thought it was conceivable that GI could have paid John Grayson $3 million not to release his fix for the VC II Plus, the publisher questioned whether Grayson would have accepted such a deal, but he didn't doubt that the corporation might have made the offer. Rightly or wrongly, GI is perceived as a company that has cut more than a few corners to achieve total market dominance. In the meantime, while the investigations run their course, and while DigiCipher is nothing more than a promise or a threat, GI is test-marketing a decoder able, since it, too, resembles schemes that have been hacked in Europe. Moreover, if GI's dream comes true and DigiCipher is used in every cable network in America, video pirates will be motivated to spend almost any amount of time and money to crack it. Thirty million viewers feeling mad as hell about being overcharged and exploited is a lure that few pirates could resist. In the same way that a monoculture is more vulnerable to pests than a diverse ecology, a single encryption standard would be far more vulnerable to piracy than the mosaic of different schemes used by cable networks today. "In a way, we're hoping that GI goes with DigiCipher," Ron MacDonald says cheerfully. "It will renew the pirate underground." Legalized Signal Theft In Europe, TV programmers can't use the law as a weapon against piracy. Most countries have no laws against descrambling TV signals that originate outside the national border. In the United States, of ch is transmitted via satellite and which is primarily intended for the direct receipt by cable operators for their retransmission to cable subscribers." So, the intent is now clear. Satellite TV is considered a private communication because it is "primarily intended" for cable companies, not for broadcast to the general public. Unfortunately, in the ten years since this Act became law, the situation has changed radically. Can HBO still claim that its signal is a form of private communication (please, don't call it broadcasting!) when there are hundreds of thousands of dish owners now paying to watch it legitimately? Can Turner Classic Movies be considered "satellite cable programming" when it is being sent only to home dish owners, and not to cable networks at all? A new development promises to test the law even more severely. The first Direct Broadcast System is being marketed in the United States by DirecTV. This form of satellite TV is aimed at city dwudged the stubborn anger of everyday people in the American heartland who are hypersensitive about their liberties and unimpressed by laws that serve special interests alone. If more than a million plain folks were once willing to endure the risk, inconvenience, and anxiety of committing a felony on a continuing basis, despite coordinated attempts to scare them into compliance, they could do it again. Lesson Number Three: There ain't no such thing as secure data. The DES algorithm is mathematically impregnable and has never been broken, even now, by any of the pirates. That doesn't mean, however, that if you use it to scramble a signal, the signal is safe. Sooner or later, if it's going to be of any use to anybody, the signal has to be descrambled. At that precise moment, it becomes vulnerable. The decoding device can be cloned, or its decryption keys can be copied, or the signal can be tapped and retransmitted. All these techniques have been used by hackers. This point is relevant in the current debate over encryption standards: you don't necessarily need to break an encryption code in order to break into the system. Lesson Number Four: Encryption protects little guys better than big guys. When a scrambled TV signal is sent to millions of decoder modules, that signal becomes easy pickings. When two individuals exchange a brief encrypted message, that message is relatively secure. Video pirates have started test-running PGP (Pretty Good Privacy, the "people's encryption software") to protect private messages that they exchange via their bulletin boards. This doesn't just put the pirates on equal terms with the programmers, it gives them an edge. Cypherpunks have promoted PGP as protection from a potential police state, while the Clinton administration sees it more as a threat to law and order. Evidently, both sides are correct, but there's no point in arguing about it anymore. The genie is out of the bottle. Lesson Number Five: Computers really do empower the individual. We've heard this so many times, but now we're starting to see the results. For eight years, a handful of hackers have battled some huge, cash-rich corporations, and the corporations of them has gone out of business as a result. As Fred Martin points out, many consumers are willing to pay for the legitimate product when the price is reasonable, especially if they reap extra benefits such as proper documentation and technical support. But this compliance cannot be achieved by moral or legal pressure. For most people, theft of data is in no way a moral issue; it doesn't create even a twinge of guilt. Consumers today are unimpressed by the legalities of copyright or the potential penalties involved. Bearing this in mind, which is the better policy: to make concessions to consumers or to clamp down and try to force them to obey? The history of copy protection proves that concessions can be workable. The history of satellite video piracy indicates that clamping down leads to draconian law enforcement, huge unforeseen expenditures, and a flourishing black market patronized by everyday, law-abiding Americans. Our system tends to function best when consumers are given a fair shake and freedom to choose. Trying to limit their options and beat money out of them with a bigger and bigger stick has never been a viable long-term policy. _________________________________________________________________f redundant data from a digitized video signal, so that it takes up less "room" when it is transmitted. ECM: Electronic countermeasure. A signal or set of codes designed to defeat a successful hack. EPROM: Erasable, Programmable Read-Only Memory, a chip that can store a computer program. The computer code is easily and cheaply installed by a desktop gadget known as an EPROM burner, usually driven from the serial port of a PC. Hack: (n) Hardware and/or software that is designed to defeat a data protection scheme. (v) To create such hardware/software. Head-end: See cable head-end. Hit: See authorization code. Identification number: The unique number assigned to a decoder module so that it can be addressed individually by an authorization code. MPEG: A standard for digital compression of video. Plus break: A way to fix the VC II Plus so that it will descramble satellite TV without requiring the usual authorization code. This has not yet been achieved. Plus fix: See Plus break. Seed keys: Unique numbers stored in a chip on each VC II or VC II Plus decoder. These numbers are necessary (in conjunction with the identification number of the board) for descrambling a satellite TV signal. Transponder: A device, usually on a satellite, that receives an uplinked signal and retransmits it, usually with greater power. Uplink: The TV signal that originates on the ground and is sent up to a satellite. VideoCipher: An encryption standard invented and owned by Glisher: Dan Morgan. Morgan Engineering Co., P.O. Box 475, Rose City, Michigan 48654. +1 (517) 685 3410. Scrambling News Irregular, slim publication offering down-and-dirty investigative pieces with no advertising, for dealers interested in piracy. Editor/Publisher: Dave Lawson. 1552 Hertel Avenue #123, Buffalo, New York 14207. +1 (716) 874 2088. The Transponder Controlled circulation, conservative trade publication for the satellite TV industry. Editor: Tim Jackson. 4250 North State Street, Salamanca, New York 14779. +1 (716) 945 5091. _________________________________________________________________ Charles Platt (charles@mindvox.phantom.com) is a science fiction writer and a science writer. His most recent work is The Silicon Man. He writes frequently for Wired. _________________________________________________________________