More on the NDS Hacking lawsuit.....

pinkhelmets

Inactive User
Joined
Aug 10, 2001
Messages
5,187
Reaction score
174
Location
essex colchester-ipswich
Source= http://www.wired.com/politics/law/news/2008/04/murdoch
Did a Rupert Murdoch company go too far and hire hackers to sabotage rivals and gain the top spot in the global pay-TV war?

This is the question a jury will be facing in a spectacular five-year-old civil lawsuit that is finally being tried this month in California but which has, oddly, received little notice from media.

The case involves a colorful cast of characters that includes former intelligence agents, Canadian TV pirates, Bulgarian and German hackers, stolen e-mails and the mysterious suicide of a Berlin hacker who had been courted by the Murdoch company not long before his death.

On the hot spot is NDS Group, a UK-Israeli firm that makes smartcards for pay-TV systems like DirecTV. The company is a majority-owned subsidiary of Murdoch's News Corporation. The charges stem from 1997 when NDS is accused of cracking the encryption of rival NagraStar, which makes access cards and systems for EchoStar's Dish Network and other pay-TV services. Further, it’s alleged NDS then hired hackers to manufacture and distribute counterfeit NagraStar cards to pirates to steal Dish Network's programming for free.

NagraStar and one of its parent companies, EchoStar, are seeking about $101 million for damages for piracy, copyright infringement, misconduct and unfair competition. The list of witnesses in the case includes EchoStar's founder and CEO Charlie Ergen; several hackers and pirates; and Reuven Hazak, an Israeli who heads security for NDS and is a former deputy head of Shabak, or Shin Bet, Israel's domestic security agency (the equivalent of Britain's MI5).

The case, which began April 9 in the U.S. District Court's Central Division in Santa Ana, California, could conceivably result in an award of hundreds of millions of dollars, although neither side is expected to emerge unscathed from testimony that threatens to expose the messy underbelly of the high-stakes pay-TV industry.

As if to emphasize this point, U.S. District Judge David O. Carter said after the proceedings began that he was concerned that the case would hinge on testimony from known lawbreakers like hackers and pirates, who have been employed by the companies on both sides of the lawsuit. The judge urged the plaintiffs and defendant to settle rather than face potentially devastating harm to their reputations.

EchoStar wouldn't comment on the case while it's ongoing, but Jim Davis, a senior analyst with the 451 Group, a market research firm, said the company isn't likely to settle.

"It gets taken very personal when your security product has been hacked," he said. "And to have a competitor do that through, allegedly, the services of a known hacker, has got to be particularly galling to NagraStar."

As for NDS, which currently has more than 75 million access cards on the market, Davis says the company probably sees the trial as an opportunity to defend against the image that it is "simultaneously promoting a product that secures networks while working with folks that work outside the law [to break networks]."

The company said in a statement to Wired.com: "We are confident our position will be upheld at a trial."

According to court documents, the scheme began to unravel in 2000 when law-enforcement agents in Texas seized suspicious packages containing CD and DVD players stuffed with more than $40,000 in cash. Parcels similar to this were being sent almost daily from Canada, via Texas, to a hacker in California named Christopher Tarnovsky, who was working for NDS as an engineer. The money was allegedly part of the conspiracy between Tarnovsky and NDS Group to sabotage NagraStar's cards.

As laid out in the allegations, NDS' hacking is said to have begun in 1997 after its own access cards were cracked and it was at risk of losing clients like DirecTV, which was being hit hard from pirates who were selling unfettered access to its system.

But rather than deal with its security breach, NDS hired Tarnovsky and other pirates who had compromised its system to help the company hack and pirate its competitors' cards and even out the playing field, it is alleged.

In addition to Tarnovsky, the company also hired Oliver Kommerling, a hacker known for writing the primer on cracking smartcards. Kommerling has acknowledged in an affidavit that he helped NDS set up a research lab in Haifa, Israel, where NagraStar's smartcard was allegedly cracked by NDS engineers.

NDS didn't hire only hackers, however. According to EchoStar/NagraStar, it also hired a handful of other people with colorful pasts who they say had a role in hacking and pirating EchoStar/NagraStar. There was Reuven Hazak, who had been deputy head of Israel's Shin Bet during the notorious Bus 300 incident (when two Palestinian terrorists who hijacked an Israeli bus were killed in custody by a Shin Bet agent. Hazak eventually blew the whistle on the subsequent cover-up).

NDS also hired a former U.S. Navy intelligence officer named John Norris and a former Scotland Yard commander named Ray Adams. Finally, it hired a former would-be terrorist, Yossi Tsuria, who became chief technical officer of its lab in Israel. Tsuria was part of a radical group of Jewish Israelis in the 1980s that plotted to bomb the Dome of the Rock -- a shrine that sits on the Temple Mount in Jerusalem, a holy site for both Jews and Muslims.

NDS has maintained in public statements that Hazak, Norris and its other security officers were hired to help it track down hackers and pirates and get them arrested. But EchoStar and NagraStar allege that Hazak and Norris played central roles in committing hacking and piracy as well.

In late 1997, NDS researchers in Israel reportedly cracked the NagraStar card after about six months of effort, using an electron microscope.

NagraStar became aware its card was hacked in late 1998 when meeting with DirecTV to discuss the pay-TV company's desire to switch from the hacked NDS cards to NagraStar's cards. But DirecTV employees surprised NagraStar at the meeting when they informed NagraStar that its cards had also been hacked.

EchoStar/NagraStar claim that NDS, aware that DirecTV was about to abandon its cards in favor of NagraStar cards, cracked NagraStar's card to discourage DirecTV from making the switch.

After NDS cracked its rival's card, Tarnovsky and his associates allegedly created and sold counterfeit NagraStar cards through a piracy site based in Canada, among others, that allowed pirates to access Dish Network programs for free. Tarnovsky is also accused of later posting on the Canadian site the code, secret keys and instructions for hacking the microprocessor on EchoStar's access cards, allowing pirates to flood the market with even more cards. He has denied the allegations. Hazak and Norris are accused of providing Tarnovsky with the code so he could post it online, but NDS maintains this didn't happen.

According to court documents, the sabotage scheme worked remarkably well throughout 1998 and 1999 as counterfeit NagraStar cards flooded the market.

It was around this time, however, that a German hacker in Berlin known as Boris Floricic, aka Tron, disappeared while walking home from his parents' home one day. He was found several days later hanging from a belt in a park.

Among his possessions, authorities found correspondence from NDS. NDS later said it had offered Boris a job, which he had rejected. Prior to his death, Boris had obtained source code and information about hacking access cards that were being used in a German satellite TV system. His friends in the German hacker group, Chaos Computer Club, were convinced that he'd met with foul play.

Although his death was officially ruled a suicide, there were enough details around it to create suspicion. Floricic's feet were on the ground when he was found hanging, for example, and other evidence suggested that his body might have been placed in the park after he died.

During this time, NagraStar wasn't the only alleged victim of NDS hacking and piracy. In 2002, the French pay-TV service Canal Plus filed a damages suit against NDS, from which the EchoStar/NagraStar case emerged. In an affidavit from that case, Kommerling disclosed that NDS had cracked the Canal Plus cards using a method he had taught its engineers in Israel. Then, he revealed, the company instructed Tarnovsky to post the Canal Plus code on the internet.

The Canal Plus suit fizzled after its parent company, Vivendi Universal, struck a business deal with News Corporation that included a condition that Canal Plus would drop its suit against NDS. This is when EchoStar joined the litigation.

Before Canal Plus's case against NDS died, Tarnovsky indicated to the company that Reuven Hazak had given him the Canal Plus code to post it on the internet. He reportedly told the French firm he would testify in the case, but later backed out, citing fear for his life and his family.

In May 2002, two months after Canal Plus filed its suit, someone broke into the car of one of NDS' British employees and stole the hard drive from his laptop, making off with thousands of NDS documents and e-mails. EchoStar/NagraStar say the e-mails provide proof of NDS' hacking and piracy activities. NDS has suggested that the e-mails might be fabricated and has battled to keep them out of the court proceedings.

NDS has denied the lawsuit allegations. The company maintains that it was simply engaging in reverse-engineering, as any company would do to understand rivals and compete in the marketplace, but that it did not distribute cards or information about hacking NagraStar's encryption to pirates.

In an e-mail statement to Wired.com, the company took a dig at its competitor's competence and touted its superior skills.

"The hacking of EchoStar was the result of inferior technology arising from inadequate investment in research and development by [NagraStar]," said the statement. "NDS, on the other hand, invests heavily in research and development ... we reinvested over 30 percent of our revenues into R&D -- and the result is that we have zero piracy and the platforms of our customers are completely secure."

The trial is expected to last at least two more weeks.
 
Sorry for the long post but its got some good names in there and goes back a long way. Lots happened after all this and for a decade underhand illegal tactics has been destroying rivals (allegedly), but the list of affected countries, providers, and other hacker names are far too many to list here :).
 
thanks for the info lee m8 makes and intresting read..................i persnally hope NDS get strung up lol
 
thank m8

a very nice read , was there also not a site on the uk secne that was pasting stuff on to nds , about how far the hackers had got on cracking there code . it's a wonder that the rest have not tryed to crack nds and post that some where .....lol

now that would be good .:Clap:

michael
 
some very interesting reading must have cost a fortune hiring all those people to hack another companies encyrption
 
some very interesting reading must have cost a fortune hiring all those people to hack another companies encyrption

shrewd people....worked out well for nds though, they now have 70million cards out....nice profit..
 
There was Reuven Hazak, who had been deputy head of Israel's Shin Bet during the notorious Bus 300 incident (when two Palestinian terrorists who hijacked an Israeli bus were killed in custody by a Shin Bet agent. Hazak eventually blew the whistle on the subsequent cover-up).

NDS also hired a former U.S. Navy intelligence officer named John Norris and a former Scotland Yard commander named Ray Adams. Finally, it hired a former would-be terrorist, Yossi Tsuria, who became chief technical officer of its lab in Israel. Tsuria was part of a radical group of Jewish Israelis in the 1980s that plotted to bomb the Dome of the Rock

....and people wonder why nobody is willing to talk about the NDS encryption system. These people weren't hired for their public relations skills !
 
....and people wonder why nobody is willing to talk about the NDS encryption system. These people weren't hired for their public relations skills !

trained killers thats probably how boris met his end no doubt
 
Good Post makes for very interesting reading, just shows the depths large companies will go to when money is involved.

It makes me think that the rumours around ITV Digital were true. How easily available were their cards keys etc
 
Hacker testifies

Hacker testifies News Corp unit hired him.

Reported by Reuters Wed 23rd April 20.00 ET.


SANTA ANA, Calif., April 23 (Reuters) - A computer hacker testified on Wednesday that a News Corp unit hired him to develop pirating software, but denied using it to penetrate the security system of a rival satellite television service.

Christopher Tarnovsky -- who said his first payment was $20,000 in cash hidden in electronic devices mailed from Canada -- testified in a corporate-spying lawsuit brought against News Corp's NDS Group by DISH Network Corp .

The trial could result in hundreds of millions of dollars in damage awards.


NDS, which provides security technology to a global satellite network that includes satellite TV service DirecTV, denies the claims, saying it was only engaged in reverse engineering -- looking at a technology product to determine how it works, a standard in the electronics industry.

After an introduction by plaintiff's attorney Chad Hagan as one of the "two best hackers in the world," Tarnovsky told the court that he was paid on a regular basis by Harper Collins, a publishing arm of News Corp, for 10 years.

Tarnovsky said one of his first projects was to develop a pirating program to make DirectTV more secure.

But lawyers for DISH Network claim Tarnovsky's mission was to hack into DISH's satellite network, steal the security code, then flood the market with pirated smart cards costing DISH $900 million in lost revenue and system-repair costs.

Smart cards enable satellite TV converter boxes to bring in premium channels.



The suit was brought by EchoStar Communications, which later split into two companies, DISH and EchoStar Corp, with DISH being the primary plaintiff.

"I never got money for reprogramming Echostar cards," Tarnovsky said. "Someone is trying to set me up."

DISH attorney Chad Hagan asked, "This is all a big conspiracy?"

"Yes," Tarnovsky answered. He conceded that he constructed a device called "the stinger" that could communicate with any smart card in the world.

Another hacker, Tony Dionisi, testified on Tuesday that Tarnovsky bragged about creating "the stinger" and that he knew of another hacker and NDS employee who reprogrammed 50 EchoStar smart cards with the device.

The trial is expected to last another two to three weeks. It is being heard in southern California because both Tarnovsky and NDS are located there.

Comment:

As a matter of interest, the encryption being broken was Nagravision!
 
Interview with Chris Tarnovsky,the Hacker...

Interview with Chris Tarnovsky, the Hacker
Echo star is suing NDS (maker of video guard, DTV's encryption system, and also CEO'ed by Rupert Murdoch) for $1 Billion for damages for piracy and copyright infringement of the Echo star Viewing card codes and for aiding the distribution and supply of pirate Echo star viewing cards for the Echo star owned Dish TV.


A key witness was in Amsterdam on the weekend attending a conference, and spoke to reporters and other interested parties:


Quote:
François Pilet, Amsterdam
Saturday, March 29 2008

The audience is glued to the lips of Christopher Tarnovsky. In front of a podium of hackers and security specialists - with an average age of 25 - the self-taught electronics specialist revealed the techniques that allow him to break open chip cards that block access to pay TV chains in the whole world.

The scene takes place in the Mövenpick hotel in Amsterdam, where the European edition of the Black Hat conference was held Thursday and Friday last week. This is one of the prime professional meetings dedicated to computer piracy. Among the twenty or so speakers invited to this big get-together, Christoper Tarnovsky talked for more than one and a half hour in the "Lausanne" room - a sign of destiny (Tr. note: Lausanne is a Swiss city close to the headquarters of the Kudelski Group).

Employed by NDS

The 39 year old American is accused of having been recruited in 1999 by the Israeli company NDS, a competitor of Kudelski, to break the security codes of Canal+ (French Pay TV) and publish them on the Internet, and to have repeated the operation, to the detriment of the Swiss group and its clients. The publication of these codes allowed hundreds of thousands of savvy users to access encrypted TV channels without paying the subscription fees.

The American satellite TV company Echo star also uses Kudelski cards to protect their content. They confirmed having lost hundreds of millions of US dollars due to these pirate activities and demand one billion US$ of damages from NDS, a subsidiary of the media group News Crop.

This April, Christopher Tarnovsky will take the witness stand in a California court in defence of NDS, his employer for ten years following 1997. According to him, Kudelski and Echo star have wholly invented the conspiracy they claim having been victim of in order to mask the weakness of their encryption.

In his eyes, the case against NDS is nothing short of an extortion attempt. "Sure, I've broken the cards of Kudelski", he annoyedly states. "I was paid by NDS to do it. This is an activity that all companies in the trade do. But why would I have published these codes on the Net for free? I am not stupid, and I never had the intention of taking that risk."

Having become an awkward asset, Tarnowsky is no longer employed by the group since a year. He started his own company, Flylogic, through which he offers his know-how to electronics manufacturers, to test the resistance of new products to pirate attacks before they are launched.

Christoper Tarnovsky details the general weakness of systems based on certain chips designed by a handful of companies like Motorola and Infinenon (sic), systems used in products as divers as garage door remotes, car alarm systems and TV decoders.

"Unbreakable? That's wrong!"

"The manufacturers of semiconductors claim that their chips are unbreakable. The companies integrating them into their products trust the specifications they obtain. They believe that their secrets will be well kept. That is wrong, of course."
He showed pictures of his laboratory, set up with second-hand equipment worth a couple of thousand dollars. The centerpiece is a powerful Zeiss microscope to access the heart of the chip, where the precious codes are hidden. Successive layers of silicone are peeled away, using acids and lasers.

The engineer then explains how he takes over control of the card by short-circuiting one by one its protections with long microscopic needles. It takes a few minutes for the weakest of them, a few hours for better designed chips, but the content of the card gives in to these attempts 9 out of 10 times. For such an operation, Fly logic bills "about 30'000 dollars".

When questions were taken, a voice is heard from the end of the room. A Microsoft engineer is wondering: "Did you take an interest in the processor of our Xbox360 game console?" - "I was offered 100'000 dollars to break it", says Tarnovsky. "But I replied that that wasn't enough."

"They didn't invest enough"

The next question comes from an Estonian journalist. His country, forerunner of cyberdemocracy, has introduced a chip-containing identity card, which can be used for e-banking, as well as on-line voting. "It's a Motorola", sneers Tarnovsky. "An old model, badly protected."



What about the Kudelski cards? A short embarrassed silence before his reservations disappear: "Sorry: The last two generations were broken. The next one will be, as well. They did not invest enough into research in the last ten years. Today, Kudelski is running out of money, look at their stocks. They hope to re-establish themselves with this lawsuit, but they will lose."


I've held on to this report for a couple of weeks now, but in view of yesterday's evidence being reported by Reuters
I think I can release it to the general forum!


The last paragraph is the most interesting!
 
Background data on the Hacker

From The Wall Street Journal, Oct. 9, 2002

A hacker creates headaches for security-card company
By Bruce Orwall


Technology companies often co-opt troublesome computer hackers by hiring them. But as NDS Group PLC has learned over the past six months, such arrangements can be risky. NDS, one of the satellite-TV industry’s top providers of antipiracy technology, is under legal attack by rivals who make the stunning accusation that the company has in some cases helped pirates steal TV signals. Last week, U.S. prosecutors in San Diego hit the company, a unit of media company News Corp., with grand-jury subpoenas related to a continuing federal probe.

AT THE CENTER of the allegations is 31-year-old Christopher Tarnovsky. In the mid-1990s, Mr. Tarnovsky was a notorious hacker who, under the alias “Big Gun,” helped pirates decode the satellite signal of DirecTV, which used antitheft technology supplied by NDS. Looking to contain him, NDS hired Mr. Tarnovsky in 1997.

That solved a problem for NDS. But last March, Vivendi Universal SA’s Canal Plus, a big satellite-TV operator in Europe, filed a lawsuit claiming that Mr. Tarnovsky continued to help pirates hack Canal Plus signals even after joining NDS. EchoStar Communications Corp., which runs the Dish Network satellite-TV service in the U.S., recently moved to join the suit, which was filed in U.S. District Court in San Francisco. The suit’s status is uncertain as Vivendi recently agreed to withdraw it as part of another deal with News Corp.

Meanwhile, Hughes Electronics Corp., the General Motors Corp. unit that is the operator of the DirecTV network in the U.S., plans to drop NDS as a supplier and filed a sealed suit in U.S. District Court in Los Angeles against the company that alleges breach of contract, fraud and misappropriation of trade secrets.

The controversy has been a major headache for NDS, which makes “smart cards” that are designed to ensure the secure delivery of digital-TV programming. The London-based company has seen its American depositary receipts fall nearly 80% since the allegations first became public last March.

NDS, which has denied the allegations, has stood steadfastly by Mr. Tarnovsky, and a high-powered legal team at News Corp., which owns 80% of NDS, is keeping a close eye on the situation. An attorney for Mr. Tarnovsky, Pamela J. Naughton, denies that he has been involved in any piracy-related activities since joining NDS.

Mr. Tarnovsky, who declined to be interviewed for this article, started his career as a satellite-communications specialist for the U.S. Army based in Germany. Ms. Naughton, whose fees are paid by NDS, says he was a “gifted” computer hobbyist who, in his spare time, fiddled with satellite TV smart cards to learn how they worked. He also joined an Internet discussion group where he met elite hackers who discussed their efforts to defeat satellite-TV security systems.

After leaving the Army in 1996, Mr. Tarnovsky moved to New Hampshire and worked for a semiconductor company in Massachusetts. On the side, however, he worked as a programmer for a Canadian man named Ron Ereiser, who operated a business selling counterfeit smart cards that allowed people to receive DirecTV for free. According to people familiar with the situation, when DirecTV and NDS deployed electronic countermeasures to disable counterfeit smart cards, Mr. Tarnovsky would program a fix that kept the bootleg cards functioning. These people say that Mr. Ereiser paid Mr. Tarnovsky more than $40,000 in cash and equipment in exchange for the work.

Ms. Naughton says Mr. Tarnovsky was “never involved in manufacturing or helping someone manufacture” smart cards, but won’t comment on whether he played the role of programmer for Mr. Ereiser. But she acknowledges that Mr. Tarnovsky was indeed the “Big Gun” who had become famous among satellite hackers.

In 1997, however, Mr. Tarnovsky became embroiled in a feud with a Quebec pirate who he thought was stealing his decoding work. “I give you the TV, I can take away the TV,” Mr. Tarnovsky boasted in an e-mail signed “biggun.” He threatened to switch sides to work at NDS, which was then called News Datacom. Ms. Naughton confirms that the e-mail came from Mr. Tarnovsky.

Later that year, Mr. Tarnovsky made good on the threat. After he “looked at his life and future” and decided that he wanted “a real job with a real company,” Ms. Naughton says, he joined NDS. Though she says that Mr. Tarnovsky approached the company, others familiar with his employment say that NDS had identified him as a “problem” and persuaded him to go legit.

According to his attorney and others familiar with his employment, Mr. Tarnovsky was hired to play two roles. One was to act as in-house hacker, attacking NDS-made smart cards to figure out their weaknesses before others did. But he also was assigned to circulate in the pirate world under aliases, surreptitiously collecting information for NDS. Because of the sensitive nature of his work, Mr. Tarnovsky’s true identity was kept a secret even within NDS, where he was known as “Mike George.”

Hiding Mr. Tarnovsky’s identity outside the company was trickier. He manoeuvred in the hacker world under several nicknames. Working from his home in San Marcos, Calif., north of San Diego, Ms. Naughton says, he tried to keep the hackers he interacted with off balance by giving the impression that he was actually based in the East. So he maintained a mailing address near his father’s home in Manassas, Va., and later switched it to San Marcos, Texas, near his mother’s home after he tired of keeping East Coast hours as part of the ruse, Ms. Naughton says.

Mr. Tarnovsky navigated the hacker underground for more than three years without incident. But in August 2000, suspicious packages were intercepted at his Texas mail drop containing hollowed-out electronic devices stuffed with $40,000 in cash. The packages wound up in the hands of U.S. Customs agents, who believed they were connected to satellite-TV piracy, according to people familiar with the matter. A return address indicated the packages were sent from a Vancouver, British Columbia, business associated with Allen Menard, a friend of Mr. Tarnovsky and operator of a Canadian Web site known as DR7.com that was a hacker hotbed.

In February 2001, customs agents showed up at Mr. Tarnovsky’s home in San Marcos. But the agents were shooed away by attorneys brought in by NDS. An NDS representative says the company cooperated “fully” with the customs investigation, conducted its own internal investigation and concluded there was “no basis for taking any further action” against Mr. Tarnovsky. Ms. Naughton says that Mr. Tarnovsky doesn’t know who sent the packages and believes he was set up, perhaps by pirates with grudges against NDS.

The customs incident exposed one key fact within the pirate world, however: Chris Tarnovsky was an NDS employee.

Federal prosecutors in San Diego haven’t filed charges, but they continue to investigate Mr. Tarnovsky and NDS. The incident also put Mr. Tarnovsky under more intense scrutiny from companies like Vivendi and EchoStar — both of which not only have satellite-TV systems but interests in smart-card makers that compete against NDS.

Since his cover was blown 20 months ago, Mr. Tarnovsky now spends 100% of his time on smart-card development for NDS, his attorney says. Even colleagues now know him as Chris Tarnovsky, though, Ms. Naughton says, “Some people who knew him as Mike still call him Mike.”

Copyright © 2002 Dow Jones & Company, Inc.

No further action was taken because News Corp invested in Vivendi (Canal+) and the court action was dropped!
 
I wonder if any of the witnesses will wake up and find that their lungs have been removed in their sleep.

Tarnovsky should be working on a PS3 hack anyway :)
 
News Corp Cleared of Piracy Charge!

SANTA ANA, Calif., May 15 (Reuters) -

A federal court jury on Thursday broadly cleared News Corp's, NDS unit of satellite television piracy charges in a suit brought by DISH Network that could have been worth more than $1 billion.

The jury awarded only $1,500 in damages from NDS for a single test incident with a satellite television smart card.


DISH had alleged that NDS employed a rogue software engineer, or hacker, who systematically broke into its network, stole software code, and posted information on the Internet to let users unscramble DISH's signals and receive satellite television for free.

Jurors deliberated for a single day after a month-long trial before ruling in favor of NDS on the majority of charges in the suit.

"We've been completely vindicated on this whole lawsuit," NDS attorney Richard Stone said after the jury's decision was read in U.S. District Court for the Central District of California. He called the DISH charges a "pack of lies."

"We will not be changing our practices. We employ former pirates to make our system more secure, not to wreak havoc on the marketplace," Stone said.

DISH lawyers declined to comment.

DISH claims it lost $900 million in revenue and system-repair cost. Punitive damages could have taken the award to as much as $1.6 billion.

But NDS had argued that it used and uses former hackers to stop piracy, and that it had in fact found a piracy ring in Canada that was the culprit for DISH's hack.

The suit was originally brought by EchoStar Communications, which later split into two companies, DISH and EchoStar Corp, with DISH becoming the primary plaintiff.


News Corp shares were up about 1 percent at $19.18 on the New York Stock Exchange, while on Nasdaq, NDS rose 3.5 percent to $51.50, Dish was up 1.4 percent at $33.79 and EchoStar gained 1.75 percent to $33.71 in a broadly higher market.

Rather interesting don't you think? and it was good while it lasted....

What do you guys think of the out come?
 
Back
Top