Beware Beware
PreferredByPete.com Enthusiast
IKS lawsuit starts // 2009-12-14
This explains why Nfusion and few others are not saying anything.
"UNITED STATES DISTRICT COURT FOR THE NORTHERN DISTRICT OF ILLINOIS
PLAINTIFFS’ ORIGINAL COMPLAINT
Plaintiffs DISH Network L.L.C., EchoStar Technologies L.L.C., and NagraStar LLC, by and through their undersigned counsel, allege as follows:
INTRODUCTION
1. Plaintiffs bring this action against Defendants Nathan Green and Does 1-10 (“Defendants”) for unlawfully using DISH Network satellite receivers and access cards to obtain decryption keys or control words for unscrambling encrypted DISH Network satellite television programming, and for distributing those keys or control words over the internet in order to allow others to view DISH Network satellite television programming without authorization from or payment to Plaintiffs.
2. Defendants’ actions violate the Communications Act, 47 U.S.C. § 605, the Digital Millennium Copyright Act, 17 U.S.C. § 1201, the Electronic Communications Privacy Act, 18 U.S.C. §§ 2510-21, and state law.
3. Plaintiffs bring this action to restrain these illegal activities and for other relief described in this Complaint."
Detail here
"1 Plaintiffs’ allegations related to Defendants’ wrongful conduct are based upon the investigation Plaintiffs have completed to date, upon information and belief, and with the reasonable belief that further investigation and discovery in this action will lead to additional factual support.
19. Beginning at a time unknown and continuing to the present, Defendants have engaged in illegal and improper acts for the purposes of obtaining DISH Network satellite television programming and the encrypted control words that protect access to the copyrighted satellite television programming and distributing those control words over the internet.
20. Upon information and belief, Defendants or others working in conjunction with Defendants operate an IKS server.
21. This IKS server has multiple DISH Network satellite receivers and/or access cards attached to it that are used to decrypt DISH Network satellite television programming and obtain the control words for decrypting that programming. The server gathers these now-unencrypted control words and sends them over the internet to end-users who use the control words to decrypt DISH Network satellite television programming without paying a subscription fee.
22. There are numerous black and gray market satellite receivers imported from Korea that are designed and programmed to use these stolen and decrypted control words to intercept and decrypt DISH Network satellite television programming by interacting with an IKS server.
23. On or about April 2, 2009, Defendant Nathan Green created a residential account for DISH Network satellite television service, using a purported residential service address at 8208 S Charles St., Savanna, Illinois 61074. Defendant Nathan Green activated four DISH Network satellite receivers and access cards associated with this account. Plaintiffs’ investigation confirmed that at least three of the satellite receivers and access cards activated by Defendant Nathan Green are being used to supply Plaintiffs’ control words to others in violation of federal and state law and the customer agreement.
24. Upon information and belief, Defendant Nathan Green created this residential account for the purpose of obtaining DISH Network television programming and control words and distributing those control words over an IKS server operated by Defendants and/or those acting in conjunction with Defendants.
25. At the time Defendant Nathan Green created this residential account, Defendant misrepresented to DISH Network that the intended purpose and use of DISH Network programming was private viewing. That is, Defendant Nathan Green contracted for residential television service when in truth and fact Defendant knew and intended to use DISH Network programming and access cards to supply the control words for television content to others over the internet and without Plaintiffs’ authorization or consent and in violation of federal and state law, including DISH Network’s rights under the customer agreement.
26. At the time Defendant Nathan Green created the residential account, Defendant misrepresented to DISH Network the intended location where DISH Network programming would be viewed. That is, Defendant Nathan Green supplied a purported residential service address when in truth and fact Defendant knew and intended that DISH Network programming would be viewed at multiple other locations that obtained the control words from the IKS server.
27. Defendants’ wrongful conduct has caused and continues to cause significant and irreparable harm to Plaintiffs by depriving Plaintiffs of subscriber and pay-per-view revenues and other valuable consideration, compromising Plaintiffs’ security and accounting systems, and interfering with Plaintiffs’ prospective business relations.
28. Plaintiffs repeat and reallege the allegations in all preceding paragraphs as if fully set forth herein.
29. By distributing, retransmitting and re-broadcasting Plaintiffs’ control words over the internet to others for their use in receiving and decrypting Plaintiffs’ encrypted satellite signals, Defendants have received and assisted others in receiving Plaintiffs’ encrypted satellite transmissions of television programming and control words without authorization by Plaintiffs, in violation of 47 U.S.C. § 605(a).
30. Defendants’ violations have injured Plaintiffs, including, by way of example, depriving Plaintiffs of subscription revenues and other valuable consideration, compromising Plaintiffs’ security and accounting systems, and interfering with Plaintiffs’ prospective business relations.
31. Defendants have violated 47 U.S.C. § 605(a) willfully and for purposes of direct or indirect commercial advantage or private financial gain.
32. Defendants knew or should have known that receiving or assisting other persons in receiving Plaintiffs’ encrypted satellite transmissions of television programming and control words without authorization by or proper payment to Plaintiffs was and is illegal and prohibited. Such violations have caused and will continue to cause Plaintiffs irreparable harm, and Plaintiffs have no adequate remedy at law to redress any such continued violations. Unless restrained by this Court, Defendants will continue to violate"
It goes on and on for 16 pages.
More dish dockets can be seen here
Docket Search: "dish network" between December 1st, 2009 and December 14th, 2009 - Justia Federal District Court Filings and Dockets
Thank you my friend for sending it to me.... you know who you are
IKS FTAs receivers under attack again // 2009-12-10
On December 3rd five of the major players in IKS systems went down, most of them were back within 3-4 days except Nfusion (they claim that they want to fix the root of the problem instead of a quick fix).
There was an other hit today, 4 of the working one went down again this morning..... (cat and the mouse game starts again)
Explanation on the ECM (copied it from an other site)
What happened is DN slipped a hidden code into their encryption data....(that data is what makes the picture come alive in both subscribed and illegal fta boxes).....and that hidden code, which is not needed to get a picture, got sent into to all the boxes INCLUDING every subscribed box and most importantly the IKS one that Dn uses to spy on us with.
Then.....using THAT box (enabled with the same illegal third party software as some FTA'ers may do)........they were able to identify the NFUSION server, b/c the hidden code got sent back to them using IKS over the internet as OUR IKS boxes requested encryption data when users change channels.
There is an electronic identification number that's imbedded in the subscribed Nag3 card that Nfusion uses to extract the encryption data from their subscribed box that gets used as a host........this id number was included in the data that gets sent back to the illegal IKS box that DN has. (same Nfusion box end users use)
Using that ID number, (cam id I think), they were able to identify exactly who from the Nfusion team owns the subscribed host box that sends encryption data (info packets) to us by IKS using the internet so our receivers can work. Perhaps they know the location of it, perhaps they don't.
They then shut down Nfusions LEGAL nag3 host cards (looped them) thereby disabling their host boxes.
5 major IKS systems down // 2009-12-03
Reports are coming in that Nfusion, SonicView, CNX, NewSat and IKslinger went down roughly around same time.
Makes you wonder what is going on behind the scene? are these boxes hosted by the same company? they all got raided same time?
Let us wait and see what happens.
This explains why Nfusion and few others are not saying anything.
"UNITED STATES DISTRICT COURT FOR THE NORTHERN DISTRICT OF ILLINOIS
PLAINTIFFS’ ORIGINAL COMPLAINT
Plaintiffs DISH Network L.L.C., EchoStar Technologies L.L.C., and NagraStar LLC, by and through their undersigned counsel, allege as follows:
INTRODUCTION
1. Plaintiffs bring this action against Defendants Nathan Green and Does 1-10 (“Defendants”) for unlawfully using DISH Network satellite receivers and access cards to obtain decryption keys or control words for unscrambling encrypted DISH Network satellite television programming, and for distributing those keys or control words over the internet in order to allow others to view DISH Network satellite television programming without authorization from or payment to Plaintiffs.
2. Defendants’ actions violate the Communications Act, 47 U.S.C. § 605, the Digital Millennium Copyright Act, 17 U.S.C. § 1201, the Electronic Communications Privacy Act, 18 U.S.C. §§ 2510-21, and state law.
3. Plaintiffs bring this action to restrain these illegal activities and for other relief described in this Complaint."
Detail here
"1 Plaintiffs’ allegations related to Defendants’ wrongful conduct are based upon the investigation Plaintiffs have completed to date, upon information and belief, and with the reasonable belief that further investigation and discovery in this action will lead to additional factual support.
19. Beginning at a time unknown and continuing to the present, Defendants have engaged in illegal and improper acts for the purposes of obtaining DISH Network satellite television programming and the encrypted control words that protect access to the copyrighted satellite television programming and distributing those control words over the internet.
20. Upon information and belief, Defendants or others working in conjunction with Defendants operate an IKS server.
21. This IKS server has multiple DISH Network satellite receivers and/or access cards attached to it that are used to decrypt DISH Network satellite television programming and obtain the control words for decrypting that programming. The server gathers these now-unencrypted control words and sends them over the internet to end-users who use the control words to decrypt DISH Network satellite television programming without paying a subscription fee.
22. There are numerous black and gray market satellite receivers imported from Korea that are designed and programmed to use these stolen and decrypted control words to intercept and decrypt DISH Network satellite television programming by interacting with an IKS server.
23. On or about April 2, 2009, Defendant Nathan Green created a residential account for DISH Network satellite television service, using a purported residential service address at 8208 S Charles St., Savanna, Illinois 61074. Defendant Nathan Green activated four DISH Network satellite receivers and access cards associated with this account. Plaintiffs’ investigation confirmed that at least three of the satellite receivers and access cards activated by Defendant Nathan Green are being used to supply Plaintiffs’ control words to others in violation of federal and state law and the customer agreement.
24. Upon information and belief, Defendant Nathan Green created this residential account for the purpose of obtaining DISH Network television programming and control words and distributing those control words over an IKS server operated by Defendants and/or those acting in conjunction with Defendants.
25. At the time Defendant Nathan Green created this residential account, Defendant misrepresented to DISH Network that the intended purpose and use of DISH Network programming was private viewing. That is, Defendant Nathan Green contracted for residential television service when in truth and fact Defendant knew and intended to use DISH Network programming and access cards to supply the control words for television content to others over the internet and without Plaintiffs’ authorization or consent and in violation of federal and state law, including DISH Network’s rights under the customer agreement.
26. At the time Defendant Nathan Green created the residential account, Defendant misrepresented to DISH Network the intended location where DISH Network programming would be viewed. That is, Defendant Nathan Green supplied a purported residential service address when in truth and fact Defendant knew and intended that DISH Network programming would be viewed at multiple other locations that obtained the control words from the IKS server.
27. Defendants’ wrongful conduct has caused and continues to cause significant and irreparable harm to Plaintiffs by depriving Plaintiffs of subscriber and pay-per-view revenues and other valuable consideration, compromising Plaintiffs’ security and accounting systems, and interfering with Plaintiffs’ prospective business relations.
28. Plaintiffs repeat and reallege the allegations in all preceding paragraphs as if fully set forth herein.
29. By distributing, retransmitting and re-broadcasting Plaintiffs’ control words over the internet to others for their use in receiving and decrypting Plaintiffs’ encrypted satellite signals, Defendants have received and assisted others in receiving Plaintiffs’ encrypted satellite transmissions of television programming and control words without authorization by Plaintiffs, in violation of 47 U.S.C. § 605(a).
30. Defendants’ violations have injured Plaintiffs, including, by way of example, depriving Plaintiffs of subscription revenues and other valuable consideration, compromising Plaintiffs’ security and accounting systems, and interfering with Plaintiffs’ prospective business relations.
31. Defendants have violated 47 U.S.C. § 605(a) willfully and for purposes of direct or indirect commercial advantage or private financial gain.
32. Defendants knew or should have known that receiving or assisting other persons in receiving Plaintiffs’ encrypted satellite transmissions of television programming and control words without authorization by or proper payment to Plaintiffs was and is illegal and prohibited. Such violations have caused and will continue to cause Plaintiffs irreparable harm, and Plaintiffs have no adequate remedy at law to redress any such continued violations. Unless restrained by this Court, Defendants will continue to violate"
It goes on and on for 16 pages.
More dish dockets can be seen here
Docket Search: "dish network" between December 1st, 2009 and December 14th, 2009 - Justia Federal District Court Filings and Dockets
Thank you my friend for sending it to me.... you know who you are

IKS FTAs receivers under attack again // 2009-12-10
On December 3rd five of the major players in IKS systems went down, most of them were back within 3-4 days except Nfusion (they claim that they want to fix the root of the problem instead of a quick fix).
There was an other hit today, 4 of the working one went down again this morning..... (cat and the mouse game starts again)
Explanation on the ECM (copied it from an other site)
What happened is DN slipped a hidden code into their encryption data....(that data is what makes the picture come alive in both subscribed and illegal fta boxes).....and that hidden code, which is not needed to get a picture, got sent into to all the boxes INCLUDING every subscribed box and most importantly the IKS one that Dn uses to spy on us with.
Then.....using THAT box (enabled with the same illegal third party software as some FTA'ers may do)........they were able to identify the NFUSION server, b/c the hidden code got sent back to them using IKS over the internet as OUR IKS boxes requested encryption data when users change channels.
There is an electronic identification number that's imbedded in the subscribed Nag3 card that Nfusion uses to extract the encryption data from their subscribed box that gets used as a host........this id number was included in the data that gets sent back to the illegal IKS box that DN has. (same Nfusion box end users use)
Using that ID number, (cam id I think), they were able to identify exactly who from the Nfusion team owns the subscribed host box that sends encryption data (info packets) to us by IKS using the internet so our receivers can work. Perhaps they know the location of it, perhaps they don't.
They then shut down Nfusions LEGAL nag3 host cards (looped them) thereby disabling their host boxes.
5 major IKS systems down // 2009-12-03
Reports are coming in that Nfusion, SonicView, CNX, NewSat and IKslinger went down roughly around same time.
Makes you wonder what is going on behind the scene? are these boxes hosted by the same company? they all got raided same time?
Let us wait and see what happens.