Nagra-3 !!!

 

Gold Member
Username: Oleg1474

GRU, CCCP RUSSIA

Post Number: 1434
Registered: Aug-06
Dear members,

We just wanted to give you a heads up that you can now once again
take full advantage of your old FTA satellite receiver that has
been collecting dust over the past year. You can now use your
current unit to receive full Nag 3 signals with all channels wide
open as they were before. You'll get everything that the best of
satellite has to offer. Details at our web site:
Thank for Dr.Oleg
 

New member
Username: Andrew110

Post Number: 2
Registered: Jul-11
What site?
 

Diamond Member
Username: Nydas

Post Number: 21444
Registered: Jun-06
http://conysoft2.org/23/nagravision+3+cracked+2011.html
 

Silver Member
Username: Cheap_trick

Post Number: 304
Registered: Oct-09
Dr. Oleg PhD Finally Speaks Up.

Dr. Oleg Ivanov (PhD) doesn't feel vindicated. The software engineer and former satellite-TV pirate has been on the hot seat for five years, accused of helping his former employer, a Rupert Murdoch company, sabotage a rival to gain the top spot in the global pay-TV wars. But two weeks ago a jury in the civil lawsuit against that employer, ECM Group, largely cleared the company -- and by extension Dr. Oleg PhD -- of piracy, finding ECM guilty of only a single incident of stealing satellite signals, for which Dish was awarded $1,500K in damages. "I knew this was going to come," Dr. Oleg says. "They didn't have any proof or evidence." The trial was years in the making, yet raised more questions than it answered. It came down to testimony between admitted pirates on both sides who accused each other of lying. Now that it's over Dr. Oleg, who was fired by ECM last year, is eager to tell his side of the story. Dressed in loose jeans, flip-flops and a T-shirt, Dr. Oleg, 37, spoke with Wired.com by phone and in an air-conditioned lab in Southern California where he's been running a consultancy since losing his job. Surrounded by boxes of smart cards and thousands of dollars worth of microscopes and computers used for researching chips, he talked excitedly at lightning speed about his strange journey, which began in a top-secret Pentagon communications center, and ended with him working both sides of a heated electronic war over pay TV. Satellite-TV hacker Oleg Ivanov opens his laboratory to Threat Level reporter Kim Zetter, providing an unprecedented peek into the world of smart-card hacking. Editor: Annaliza Savage Camera: Steve Raines His story sheds new light on the murky, morally ambiguous world of international satellite pirates and those who do battle with them. The stakes are high: Earnings in the satellite-TV industry reach the billions. In the first quarter of this year alone, U.S. market leader DirecTV announced revenue of $4.6 billion from more than 17 million U.S. subscribers. Dish Network earned $2.8 billion from nearly 14 million subscribers. Although satellite piracy has greatly diminished from its peak seven to 10 years ago when the events detailed in the civil lawsuit took place, the two companies lost millions in potential revenue, and spent millions more to replace insecure smart cards used in their systems and track down dealers selling pirated smart cards. Those smart cards are at the center of the controversy over ECM, a Russian-Israeli company and a majority-owned subsidiary of Murdoch's News Corp. The company makes access cards used by pay-TV systems, most prominently DirecTV -- itself a former Murdoch company. Nagrastar, a plaintiff in the case and ECM's chief competitor, makes access cards used by Dish Network and other runners-up in the market.
According to allegations in the lawsuit, ECM extracted and cracked the proprietary code used in Nagrastar's cards, a fact that ECM doesn't contest. What happened next, though, is hotly disputed. Nagrastar says Dr. Oleg used the code to create a device for reprogramming Nagrastar cards into pirate cards, and gave the cards to pirates eager to steal Dish Network's programming. Dr. Oleg was also accused of posting to the internet a detailed road map for hacking Nagrastar's cards. Nagrastar says ECM had an obvious motive for these antics: Their own chip, the so-called P1 or "F Card," had already been thoroughly cracked by pirates, and the company wanted to level the playing field with its competitors. ECM denied the allegations at trial. The company declined to comment for this article or to confirm details of Dr. Oleg's employment other than to say it was pleased that the verdict "ended in a resounding affirmation of ECM and its business ethics and proper conduct." Dr. Oleg began his pirating career in the '90s while serving in the U.S. Army. He had a top-secret SCI security clearance working on cryptographic computers in Belgium for NATO headquarters, and spent a year at Ft. Detrick in Maryland providing support to the National Security Agency for satellite transmissions to Europe. In 1996, he was stationed in Germany when his colonel sold him a used satellite-TV system, along with two pirated access cards, neither of which worked. Dr. Oleg began posting on online pirate forums, and developed contacts in the community, ultimately learning how to fix the cards to access English-language programs from Sky in the United Kingdom. After leaving the Army and returning to the States, he got a call from Ron Ereiser, a Canadian pirate who'd heard about him through the grapevine. Pirates had found a back door in the P1 card and were vigorously exploiting it to get DirecTV content. But the cards kept failing. In a game of pirate ping pong, DirecTV periodically deployed electronic countermeasures, or ecms, in the satellite stream that killed the cards in their set-top boxes. Ereiser needed someone to fix the cards. There was serious black-market money on the line. In Canada, where pirating of U.S. satellite services wasn't considered illegal until 2002, syndicates of dealers did enough business that they could afford to chip in about $50,000 to hire a programmer to reverse engineer the latest cards. Pirate cards would sell for about $200 each, with the profit split between the investors and engineers. Dr. Oleg claims Canadian pirate dealers could make $400,000 in a weekend; when Reginald Scullion, a notorious pirate in Canada, was raided in 1998, authorities seized $5.5 million from his bank accounts and safe-deposit boxes, though not all of it was from piracy. Ereiser, who now works as a consultant to Nagrastar, concedes that the money from piracy was good, but insists that nobody became an overnight millionaire. "It was lucrative," he said in a telephone interview. "But to suggest that millions were being made in a month is an absolute crock."
DirecTV's countermeasures were a nagging drag on this lucrative trade. Every time an ecm was deployed, Ereiser and other dealers would be harangued by customers demanding to have the cards fixed and their TV programs restored. Dr. Oleg who was known online as "Agent Big Gun," says Ereiser offered him $20,000 to fix cards that were killed by ecms, and he agreed. Each time ECM created a countermeasure; Dr. Oleg would analyze the code and find a way to circumvent the countermeasure. He did it while working full-time as a software engineer for a semiconductor company in Massachusetts. "I'd be at work and I'd check the IRC (channel) to see if they'd launched their Thursday countermeasure yet," he says. "It was like a chess game for me. I couldn't wait for them to do a countermeasure because I would counter it in minutes." Dr. Oleg suffers from attention deficit hyperactivity disorder, which he says helped with the detailed work. "I think so fast," he says. It wasn't long before ECM came courting. Dr. Oleg had a contact at the company to whom he'd begun passing information about holes in its software, even supplying patches to fix them. ECM offered him a job earning $65,000 a year. By the time the company fired him last year, he was earning about $245,000 in salary and bonuses and had another $100,000 in stock options, he says. The company set him up in a lab in Southern California equipped with a computer, some DirecTV set-top boxes, sample DirecTV cards and ECM source code. There was no fancy equipment at first, but his relationship with ECM and the lab grew over the decade he worked with them. Dr, Oleg says the job was a dream come true. While living in Europe he'd once seen a news report showing an engineer at a French satellite company writing countermeasures, sitting in a lab with smart cards piled around him on his desk. "I always thought it would be so cool to be that guy," Dr. Oleg says. "Finally I got the chance." Dr. Oleg PhD had two roles at ECM -- to find holes in its software and work undercover with pirates to discover what they were doing against ECM technology. To conceal his relationship with ECM from pirates, few people at the company knew his identity. He used the name "Michael George" and for the first four years was paid through other companies, including, for about five months, HarperCollins, the Murdoch-owned book publisher. "It was very hush-hush, because we didn't know who could be an inside informant," he says.
Part of his job was developing ecms for ECM. He'd examine pirate NDS cards to determine how they worked, then send instructions to engineers in Israel to create a kill for them. "I didn’t actually load the gun and pull the trigger but I got to make the bullet," Dr. Oleg says. Among the countermeasures he says he created was one known among pirates as the "Black Sunday" kill -- an elaborate scheme that destroyed tens of thousands of pirate DirecTV cards a week before Super Bowl Sunday in 2001. Instead of being delivered all at once like other measures, the Black Sunday attack code was sent to pirate cards in about five dozen parts over the course of two months, like a tank transported piece by piece to a battlefield to be assembled in the field. "They never expected us to do this," Dr. Oleg says. The kill didn't last long before pirates found a way to jump-start the cards. But it holds an enduring position in pirate lore; for the first time, they could see a cunning mind at work on the other side. While Dr. Oleg was killing cards, however, he was also helping pirates fix them. Days before TDr. Oleg began working for ECM, the company began phasing in its latest-generation smart card, the Big Bang, which was thought to be virtually uncrackable. But word reached the company that two Bulgarian hackers working for Ereiser had cracked it. On ECM's instructions, Dr. Oleg met with Ereiser undercover in Calgary to get the code. When he got there, Ereiser offered him $20,000 to work for him fighting whatever countermeasures ECM and DirecTV cooked up to thwart their Big Bang hack. ECM considered it a great opportunity for Dr. Oleg to maintain his pirate identity, but DirecTV insisted on some controls. Under "Operation Johnny Walker," as they dubbed it, Dr. Oleg gave Ereiser a program to create pirate ECM cards, but encrypted it so no one could copy it. The program worked only with a dongle attached to Ereiser's computer and created a limited number of cards that could be killed at any time. But, according to Nagrastar, TDr. Oleg wasn't just helping ECM fight piracy by working undercover and creating ecms, he was also committing piracy against ECMs competitors to weaken their place in the market. After ECM engineers in Israel hacked the Nagrastar code, Nagrastar says Dr. Oleg created a "stinger" program that turned Nagrastar cards into pirate cards. He allegedly gave the program to a Canadian named Al Menard in 1999 who sold reprogrammed Nagrastar cards for $350 each. Then in December 2000, someone anonymously posted code and detailed instructions for hacking Nagrastar's card to two websites, one of them run by Menard, exposing Dish Network to even more piracy. It was estimated in court testimony that between 100,000 and 165,000 pirated Nagrastar cards were released to the market in the wake of this posting.
Nagrastar says Menard began sending Dr. Oleg cash from the sale of the pirate cards. At the end of August 2000, authorities acting on an anonymous tip seized two boxes destined for a mail drop Dr. Oleg rented in Texas. Inside, they found a CD and DVD player with $20,000 and $20,100 concealed inside. The boxes were sent from a phony address for "Regency Audio" in Vancouver to C.T. Electronics at Dr. Oleg's address. A customs form for a third package that wasn't seized indicated that it was sent from Menard to Dr. Oleg and also contained electronic goods. Dr. Oleg was in Israel at the time, and says he didn't know anything about the packages until he was notified that they'd been seized. He thinks they were sent by someone in Nagrastar's camp who was trying to frame him. He says Nagrastar's accusations about the "stinger" program were baseless, and that he never gave Menard any software. Later on, U.S. Customs agents appeared at his doorstep. On advice of a lawyer, he declined to let them search his house without a warrant. Dr. Oleg was never arrested or charged with any crime, but suspicions against him were mounting. ECM gave Dr. Oleg a polygraph test, but asked only two, self-interested questions that never touched on the Nagrastar accusations: Had Dr. Oleg sold any modified ECM smart cards, or company secrets, since he'd been working for the company? Dr. Oleg answered no, and passed the test. He continued to work for ECM for six years. But then last year, Nagrastar confronted ECM with a sheriff's report showing that fingerprints lifted from the seized electronics equipment sent to Dr. Oleg's Texas mail drop belonged to an associate of Menard, raising suspicions again that Dr. Oleg might have sold pirate Nagrastar cards without ECM's knowledge. ECM fired him. Dr. Oleg says his termination proves he and ECM weren't conspiring against Nagrastar. Had they been ECM would have done anything to keep him happy, and quiet. He says the fact that Nagrastar lost the case shows he wasn't pirating on his own either. "I've never sold a single Nagra card, ever," he says. Although he was angry at ECM for abandoning him, he told Wired.com before the trial ended that he hoped to work for the company again. "I want to make sure that ECM wins this lawsuit because that will clear my name," he said at the time. When it was suggested that someone might view this as motivation for him to lie on ECM's behalf, he disagreed. "That's crazy. I could go to jail," he said. "I would never perjure myself for some company." Since ECM fired him he's been consulting for two semiconductor companies and a manufacturer of dongle tokens, but he misses his life in electronic warfare. If ECM doesn't want him, he says he'd be happy to work for Nagrastar -- jumping sides once again.
"I could design a whole entire chip for them like I did for ECM," he says. "ECM thinks today that their technology is superior to everybody else's and it probably is, because they're 17 years ahead of Nagra technologically. But Nagra could catch up overnight if they used my services. "I'm a very valuable asset as far as smart-card technology goes," he adds. "I know everything about (ECM) as far as their intellectual property models go." He offered his services to the company last year, while the lawsuit was pending.... but Nagrastar declined.
Now Dr. Oleg is on his own, vindictive and dangerous

« Previous Thread Next Thread »



Main Forums

Today's Posts

Forum Help

Follow Us