DirecTV mole to plead guilty
Young kid, big mistake
A 19-year-old University of Chicago student accused of leaking the secrets of DirectTV's most advanced anti-piracy technology to hacker websites has agreed to plead guilty to violating the rarely used 1996 Economic Espionage Act.
Igor Serebryany is scheduled to appear Monday in federal court in Los Angeles to enter a guilty plea, as part of a plea agreement reached between defense attorneys and prosecutors last week, lawyers for both sides confirmed Wednesday. The plea deal does not stipulate a sentence, which will be governed by federal guidelines, according to the prosecutor in the case.
Passed to meet the perceived threat of foreign espionage against American companies, the Economic Espionage Act carries harsh penalties for stealing trade secrets for personal financial gain, or for a third party's economic benefit. For the first five years of its existence the law could only be used with approval from the Justice Department in Washington -- a limitation that was lifted in March, 2002.
Unlike most defendants charged under the act, Serebryany is not accused of having a personal financial motive -- the student was not himself a satellite TV pirate, and he gave the secrets away for free. Even with a plea agreement in place, that the powerful law was leveled against the teen doesn't sit well with Serebryany's defense lawyers. "We have some problems with the fact that this was filed," says Kiana Sloan-Hillier, one of Serebryany's attorneys. "Clearly, it was not [meant] to be used carelessly."
"It's the crime of stealing trade secrets, so it's properly used when trade secrets are stolen," counters prosecutor James Spertus. "I imagine most people who steal get paid for it, or somehow profit by it... but it's the theft that's the crime. There's no more appropriate statute to use in this case."
Smart Card Hacks
According to an FBI affidavit, Serebryany's adventures began when he found himself with access to some of DirecTV's most coveted technological secrets while working for his uncle at a document imaging company at the office of a Los Angeles law firm, Jones, Day, Reavis and Pogue. The firm was representing the satellite TV company in a lawsuit against NDS, the makers of the smart cards DirecTV uses to control access to its signal.
For years, those smart cards have been at the center of an electronic arms race between satellite TV pirates and the company's own technologists. Each plastic card resembles a credit card, but is a completely self contained microcomputer with its own embedded software and memory. In normal operation, a subscriber inserts the card into a slot in the DirecTV receiver, and a satellite signal from the company tells the receiver which channels, if any, the subscriber is allowed to watch, based on the unique identification number coded into each card.
Each successive generation of DirecTV cards has become more technically advanced, but each has eventually been cracked by sophisticated hackers, largely based in Canada where the company is not licensed to provide service, and where until recently selling hacked access cards and equipment was not a crime.
Serebryany's job gave him access to the internal technical secrets of the newest version of the smart card, the so-called "P4" card, that DirecTV had begun distributing to subscribers, and which satellite hackers were nowhere near conquering. As described by the FBI, the company closely guards those details with security procedures that rival a defense contractor -- confidentiality agreements, high-power encryption, "need to know" access, and an air-gapped computer network. "Whenever a writing references DirecTV's P4 technology, it must be printed on specific colored paper so it can be easily identified on sight, thereby decreasing possible theft of that writing," wrote the FBI of one of the company's precautions.
According to court records, the student began smuggling digitized copies of the papers out of the law firm on CD ROMs, and e-mailing them pseudonymously to the underground. Only a small percentage of the stolen data made its way to public websites, and none of it has yet inspired a successful hack against the cards.
"My personal feeling was he was just kind of a young kid, impressionable, that made a mistake," says "Risestar," a British Columbia man who runs the satellite hacking site PirateDen.com, which received, but apparently did not publish, some of the documents. "He thought he was helping people out and he didn't weigh into account the results of his actions."
Lawsuit Over Hacking Advice
Serebryany's plea agreement comes at a time when DirecTV's lawyers are targeting other sources of hacking information.
Last week the company filed a federal lawsuit against an alleged Illinois satellite TV pirate who uses the online handle "Ump25" to post message to PiratesDen.com and other satellite hacking sites. In addition to allegedly stealing DirecTV service, the complaint charges that Ump25 -- who claims in online forums to be a major league baseball umpire -- posted detailed information on how to hack earlier versions of the DirecTV smart cards, thereby "assisting the unauthorized decryption of satellite programming."
Unlike Serebryany, Ump25 isn't accused of stealing trade secrets -- an important distinction to Risestar, who says the lawsuit is an unprecedented attack on his users' freedom of speech. "It pretty much boils down to a Constitutional issue," says Risestar. "This guy didn't release any specific tools that aided and abetted anyone. All he did was share his knowledge and experiences publicly, and post."
But Marc Zwillinger, the chief litigator in DirecTV's war on piracy, says Ump25's posts aren't much different from posting a DVD descrambling program to the Internet, which has been ruled illegal in the past. "These weren't just instructions like, 'do this and do that.' He was putting up the actual changes to make to the card -- specific code bytes that needed to be changed," says Zwillinger. "People say you should be able to log onto the Internet and say anything. But if you go on the Internet and admit to misconduct, that's called a confession."
Sponsored: 2016 Cyberthreat defense report