Feeds

DISH Network awarded $1,050 in NDS card crack case

Uh, is that it your honour?

Boost IT visibility and business value

NDS Group is going to have to tighten its belt. After a mere day's deliberation, a US jury has cleared the company of deliberately cracking the competition's smart cards and circulating the cracks online. It has been found guilty of cracking just the one card, and is thus liable for a hefty $49.69, plus a grand in damages.

NDS makes security systems for pay-TV, Conditional Access (CA), systems based around smart cards. The CA business is fiercely competitive, with only a few players chasing a small number of customers.

All CA companies spend time looking at the competition's systems, which involves trying to break them. Old CA systems relied on a single secret, so if that secret were lifted from a competitor's card and shared on the internet then competitor's customers would lose money, and the competitor would lose business.

UK-based NDS had been accused of paying hackers to break the security on the DISH Network pay-TV system, and continuing to pay those hackers even when their history of illegal hacking had become known.

The hackers admitted examining the CA system used by DISH and being paid by NDS to do so, but the jury cleared the company of sharing that information.

This decision has enabled both sides to claim victory, with DISH Networks pointing out that "the jury concluded that NDS violated the Federal Communications Act and the California Penal Code", while NDS defends itself by claiming "the jury... overwhelmingly exonerated NDS Group".

But DISH Networks was the company asking for millions in damages, and had to admit it was "disappointed in the jury's damages award".

Meanwhile, NDS accused the media of being obsessed with the possible involvement of their majority shareholder News Corporation, to which we can only plead guilty as charged. ®

Seven Steps to Software Security

More from The Register

next story
Major problems beset UK ISP filth filters: But it's OK, nobody uses them
It's almost as though pr0n was actually rather popular
Google Nest, ARM, Samsung pull out Thread to strangle ZigBee
But there's a flaw in Google's IP-based IoT system
Orange spent weekend spamming customers with TXTs
Zero, not infinity, is the Magic Number customers want
US freemium mobile network eyes up Europe
FreedomPop touts 'free' calls, texts and data
Apple orders huge MOUNTAIN of 80 MILLION 'Air' iPhone 6s
Bigger, harder trouser bulges foretold for fanbois
'Two-speed internet' storm turns FCC.gov into zero-speed website
Deadline for comments on net neutrality shake-up extended to Friday
NBN Co execs: No FTTN product until 2015
Faster? Not yet. Cheaper? No data
Oh girl, you jus' didn't: Level 3 slaps Verizon in Netflix throttle blowup
Just hook us up to more 10Gbps ports, backbone biz yells in tit-for-tat spat
prev story

Whitepapers

Seven Steps to Software Security
Seven practical steps you can begin to take today to secure your applications and prevent the damages a successful cyber-attack can cause.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.
Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Build a business case: developing custom apps
Learn how to maximize the value of custom applications by accelerating and simplifying their development.
Consolidation: the foundation for IT and business transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.