Search This Blog

Wednesday, June 29, 2022

Pirate decryption

From Wikipedia, the free encyclopedia

Pirate decryption is the decryption, or decoding, of pay TV or pay radio signals without permission from the original broadcaster. The term "pirate" is used in the sense of copyright infringement. The MPAA and other groups which lobby in favour of intellectual property (specifically copyright and trademark) regulations have labelled such decryption as "signal theft" even though there is no direct tangible loss on the part of the original broadcaster, arguing that losing out on a potential chance to profit from a consumer's subscription fees counts as a loss of actual profit.

History

The concept of pay TV or pay television involves a broadcaster deliberately transmitting signals in a non-standard, scrambled or encrypted format in order to charge viewers a subscription fee for the use of a special decoder needed to receive the scrambled broadcast signal.

Early pay TV broadcasts in countries such as the United States used standard over-the-air transmitters; many restrictions applied as anti-siphoning laws were enacted to prevent broadcasters of scrambled signals from engaging in activities to harm the development of standard free-to-air commercial broadcasting. Scrambled signals were limited to large communities which already had a certain minimum number of unencrypted broadcast stations, relegated to certain frequencies. Restrictions were placed on access of pay TV broadcasters to content such as recent feature films in order to give free TV broadcasters a chance to air these programs before they were siphoned away by pay channels.

Under these conditions, the pay TV concept was very slow to become commercially viable; most television and radio broadcasts remained in-the-clear and were funded by commercial advertising, individual and corporate donations to educational broadcasters, direct funding by governments or license fees charged to the owners of receiving apparatus (the BBC in the UK, for example).

Pay TV only began to become common after the widespread installation of cable television systems in the 1970s and 1980s; early premium channels were most often movie broadcasters such as the US-based Home Box Office and Cinemax, both currently owned by Time Warner. Signals were obtained for distribution by cable companies using C-band satellite dish antennae of up to ten feet in diameter; the first satellite signals were originally unencrypted as extremely few individual end-users could afford the large and expensive satellite receiving apparatus.

As satellite dishes became smaller and more affordable, most satellite signal providers adopted various forms of encryption in order to limit reception to certain groups (such as hotels, cable companies, or paid subscribers) or to specific political regions. Early encryption attempts such as Videocipher II were common targets for pirate decryption as dismayed viewers saw large amounts of formerly-unencrypted programming vanishing. Nowadays some free-to-air satellite content in the USA still remains, but many of the channels still in the clear are ethnic channels, local over-the-air TV stations, international broadcasters, religious programming, backfeeds of network programming destined to local TV stations or signals uplinked from mobile satellite trucks to provide live news and sports coverage.

Specialty channels and premium movie channels are most often encrypted; in most countries, broadcasts containing explicit pornography must always be encrypted to prevent reception by those who wish children not to be exposed to this sort of content.

Technical issues

Initial attempts to encrypt broadcast signals were based on analogue techniques of questionable security, the most common being one or a combination of techniques such as:

  • Weakening or attenuating specific portions of the video signal, typically those required to maintain synchronization.
  • Inverting video signals so that white becomes black (and vice versa).
  • Adding an interfering signal at one specific frequency which could be simply filtered out at a suitably equipped receiver.
  • Moving the audio portion of the signal to some other frequency or sending it in a non-standard format.

These systems were designed to provide decoders to cable operators at low cost; a serious tradeoff was made in security. Some analogue decoders were addressable so that cable companies could turn channels on or off remotely, but this only gave the cable companies control of their own descramblers — valuable if needed to deactivate a stolen cable company decoder but useless against hardware designed by signal pirates.

The first encryption methods used for big-dish satellite systems used a hybrid approach; analogue video and digital encrypted audio. This approach was somewhat more secure, but not completely free of problems due to piracy of video signals.

Direct broadcast satellites and digital cable services, because of their digital format, are free to use more robust security measures such as the Data Encryption Standard (DES) or the RSA and IDEA digital encryption standards. When first introduced, digital DBS broadcasts were touted as being secure enough to put an end to piracy once and for all. Often these claims would be made in press releases.

The enthusiasm was short-lived. In theory the system was an ideal solution, but some corners had been cut in the initial implementations in the rush to launch the service. The first US DirecTV smart cards were based on the BSkyB VideoCrypt card known as the Sky 09 card. The Sky 09 card had been introduced in 1994 as a replacement for the compromised Sky 07 card. The former had been totally compromised in Europe at the time (1995). The countermeasure employed by NDS Group, the designers of the VideoCrypt system was to issue a new smartcard (known as the Sky 10 card) that included an ASIC in addition to the card's microcontroller. This innovation made it harder for pirates to manufacture pirate VideoCrypt cards. Previously, the program in the Sky card's microcontroller could be rewritten for other microcontrollers without too much difficulty. The addition of an ASIC took the battle between the system designers and pirates to another level and it bought BSkyB at least six months of almost piracy-free broadcasting before the pirate Sky 10 cards appeared on the market in 1996. Initial pirate Sky 10 cards had an implementation of this ASIC but once supplies ran out, pirates resorted to extracting the ASICs from deactivated Sky cards and reusing them.

The first US DirecTV "F" card did not contain an ASIC and it was quickly compromised. Pirate DirecTV cards based on microcontrollers that were often ironically more secure than that used in the official card became a major problem for DirecTV. Similar errors had been made by the developers of the UK's terrestrial digital Xtraview Encryption System, which provided no encryption and relied on hiding channels from listings.

The DirecTV "F" card was replaced with the "H" card, which contained an ASIC to handle decryption. However, due to similarities between the "H" and other existing cards, it became apparent that while the signal could not be received without the card and its ASIC, the card itself was vulnerable to tampering by reprogramming it to add channel tiers or additional programming, opening TV channels to the prying eyes of the pirates.

Two more card swaps would be necessary before the piracy headaches at DirecTV would finally go away; a number of other providers are also in the middle of swapping out all of their subscribers' smartcards due to compromised encryption methods or technology.

A number of vulnerabilities exist even with digital encryption:

  • The same algorithm is used, potentially, for millions of subscribed receivers and or smartcards. The designers have the choice of using their own custom, secret algorithm or using a publicly tested one. The first approach is often referred to as security by obscurity. It can work well if the technology and the algorithm are robust. This approach also has a hidden catch for any potential pirate in that he would have to understand and emulate the custom algorithm in order to implement a pirate device.
  • With many digital TV encryption systems relying on smartcards for their security, any compromise of the smartcard would require a complete replacement of all smartcards being used. That could potentially involve the replacement of millions of smartcards. On a system with a low number of subscribers, the smartcards can be replaced periodically. However, as the number of subscribers grows, the cost of replacing the smartcards and the logistics of the replacement encourages the system users to try to get the longest use out of the smartcards before replacement. The chances of a fatal compromise on the smartcard increases as the time between replacement increases.
  • Any compromise of the smartcard or algorithm will become public quickly. Computers and Internet can be used to make crucial design details publicly available. Internet sites may be located offshore in countries where local laws permit the information and software to be distributed openly; some of the more notorious software distributed to pirates ranges from NagraEdit (a program intended to edit the information stored on Swiss-designed Kudelski NagraVision 1 smartcards) to firmware which may be used to reprogram some free-to-air set-top boxes or desktop PCs equipped with Digital Video Broadcasting (DVB) tuner cards to permit them to decode encrypted broadcasts.
  • The secrecy of any algorithm is only as trustworthy as the people with access to the algorithm; if any of them were to divulge any of the design secrets, every card with the compromised algorithm may need to be replaced for security to be restored. In some cases, outside personnel (such as those employed by lawyers in the NDS vs. DirecTV intellectual property lawsuit over the P4 card design) may obtain access to key and very sensitive information, increasing the risk of the information being leaked for potential use by pirates.
  • If less secure encryption is used due to processor limitations on the smartcards, the system is vulnerable to cryptographic attack using distributed processing. While most secure Internet and online banking transactions require 128-bit encryption, 56-bit codes are not uncommon in video encryption. A cryptographic attack against a 56-bit DES code would still be prohibitively time-consuming on a single processor. A distributed approach in which many users each run software to scan just a portion of the possible combinations, then upload results to one or more central points on a network such as the Internet, may provide information of value to pirates who wish to break security. Distributed processing attacks were used, successfully in some cases, against the D2-MAC/EuroCrypt system used in Europe during the 1990s.
  • The resources available for reverse engineering increase significantly if a direct competitor with smartcard manufacturing knowledge were to attempt to maliciously compromise the system. Integrated circuits may be vulnerable to microprobing or analysis under an electron microscope once acid or chemical means have been used to expose the bare silicon circuitry. One lawsuit has already been launched by Canal+, dropped as the result of the one billion Euro deal to sell TelePiu (Italy), then continued by Echostar (USA). The suit alleged that competitor NDS Group had maliciously used reverse engineering to obtain the computer programs contained within various pay-TV smartcards (including SECA and Nagra cards) and allowed the results to be posted to Internet sites such as the notorious DR7.com.

On May 15, 2008, a jury in the Echostar vs NDS civil lawsuit (8:2003cv00950) awarded Echostar just over US$1,500 in damages; Echostar originally sought $1 billion in damages from NDS. However, a jury was not convinced of the allegations Echostar had made against NDS and awarded damages only for the factual claims that were proven and for which the jury believed an award should be given in accordance with the laws of the United States.

  • The signals moving between the smartcard and the receiver can be easily intercepted and analyzed. They can be vulnerable to a "glitch" by which the incoming power and clock signals are disrupted for a short and carefully timed length of time (such as a millionth of a second) in order to cause the processor to skip an instruction. In many cases, off-the-shelf hardware with modified firmware designed to exploit this weakness was sold to pirates for use in tampering with cards for the US-based DirecTV system.
  • In some cases, buffer overflow exploits have been used to gain access to otherwise locked cards in order to reprogram them.
  • A scheme to monitor the exact instantaneous power consumption of smartcards as they make their computations also provides clues as to what type of computations are being performed.

In some cases, fraudulent cloning has been used to assign identical serial numbers to multiple receivers or cards; subscribe (or unsubscribe) one receiver and the same programming changes appear on all of the others. Various techniques have also been used to provide write protection for memory on the smartcards or receivers to make deactivation or sabotage of tampered cards by signal providers more difficult.

Systems based on removable smartcards do facilitate the implementation of renewable security, where compromised systems can be repaired by sending new and redesigned cards to legitimate subscribers, but they also make the task of replacing smartcards with tampered cards or inserting devices between card and receiver easier for pirates. In some European systems, the conditional-access module (CAM) which serves as a standardized interface between smartcard and DVB receiver has also been targeted for tampering or replaced by third-party hardware.

Improvements in hardware and system design can be used to significantly reduce the risks of any encryption system being compromised, but many systems once thought secure have been proven vulnerable to sufficiently sophisticated and malicious attackers.

Two-way communication has also been used by designers of proprietary digital cable TV equipment in order to make tampering more difficult or easier to detect. A scheme involving the use of a high-pass filter on the line to prevent two-way communication has been widely promoted by some unscrupulous businesses as a means of disabling communication of billing information for pay-per-view programming but this device is effectively worthless as a cable operator remains free to unsubscribe a digital set-top box if two-way communication has been lost. As a device intended to pass signals in one direction only, the line filters offer nothing that couldn't be done (with the same results) by an inexpensive signal booster - a simple one-way RF amplifier already widely available cheaply and readily for other purposes. Also, many such boxes will disallow access to pay-per-view content after a set number of programs are watched before the box can transmit this data to the headend, further reducing the usefulness of such a filter.

Terminology and Definitions

Some of the terminology used to describe various devices, programs and techniques dealing with Pay-TV piracy is named for the particular hacks. The "Season" interface for example is named after the Season7 hack on Sky TV which allowed a PC to emulate a legitimate Sky-TV smartcard. The Season7 referred to the seventh and final season of Star Trek: The Next Generation which was then showing on Sky One. The "Phoenix" hack was named after the mythical bird which can reanimate itself. The hack itself reactivated smartcards that had been switched off by the providers.

Some of the terminology used on Internet discussion sites to describe the various devices, programs and techniques used in dealing with video piracy is strange, non-standard, or specific to one system. The terms are often no different from the brand names used by legitimate products and serve the same function.

ISO/IEC 7816 smartcard terminology

  • ATR is the answer-to-reset data from an ISO/IEC 7816-compliant smartcard. A card reader would provide power, clock and reset signals to a smartcard, along with a bidirectional serial data interface to permit communication. On reset, the card would send a standard block of serial data (nominally at 9600 bit/s) to identify the card type and indicate the desired bitrate for further communication. The frequency of clock to be supplied may vary from one system or card type to another as it appears not to have been specified in the ISO standard.
  • A smart card reader is a device that allows a computer to communicate with a smartcard. Technically, these are simple devices consisting of a smartcard socket, some voltage level conversion circuitry and a crystal oscillator to supply the card with its clock signal. Early models were connected to the serial port on computers so the interface circuitry had to convert between the ISO/IEC 7816 card voltage levels and the RS-232 voltage levels used by the computer's serial port. More recent models use a USB connection to the computer. The simplest of earlier devices was the Phoenix interface. More sophisticated readers are often used in systems where the personal computer itself is to be secured using smartcard systems.
  • AVR and ATmega are trade names for a series of general-purpose 8-bit microcontroller chips manufactured by Atmel Corporation. The terms have been misused widely to refer to blank smartcards or various other hardware devices which were built around these processors. The widely available European funcard series of blank generic ISO/IEC 7816 smartcards were based upon the Atmel processor series; there was also a PIC card based on the Microchip Corporation PIC series of processors.
  • Emulation refers to the use of a personal computer in place of a smartcard using an ISO/IEC 7816-compatible "Season" interface. The PC, as far as the decoder is concerned, becomes a legitimate smartcard due to the program running on it. The program responds like a legitimate smartcard. Sometimes, for development purposes, the PC is programmed to simulate the entire instruction set of the smartcard's microcontroller to allow smartcard code to be developed more readily. As some encryption systems require an application-specific IC (ASIC) on the card to perform decryption, a pirate would also use a card which had been "auxed" (reprogrammed to pass received computer data directly to the application-specific decryption chip) in order to employ such an emulation system. Alternatively, pirates can sometimes emulate the functionality of the ASIC itself to gain access to the encrypted data.
  • A looped smartcard is one where defective or malicious program code written to non-volatile memory causes the smartcard's microcontroller to enter an endless loop on power-up or reset, rendering the card unusable. This is typically a countermeasure used by encryption system owners to permanently deactivate smartcards. In many cases, not even the ISO/IEC 7816 ATR message would be sent. Unloopers were smartcard repair stations intended to cause the card to skip one or more instructions by applying a "glitch" in some form to the power or clock signal in the hope of allowing the smartcard's microcontroller to exit from the endless loop.
  • Bootloaders were hardware which used a similar "glitch" to break a card out of an endless loop on power-up each time the card was used; these did not provide any smartcard reprogramming ability. These could permit DirecTV "H" cards (now no longer in use) to operate despite the permanent damage done by malicious code during the "Black Sunday" attack of 2001. These devices are currently believed to be obsolete.

Receiver (IRD) and microprocessor terminology

  • DVB is an international standard for digital video broadcasting used by virtually all European broadcasters; some North American providers use incompatible proprietary standards such as DSS (DirecTV) or DigiCipher (Motorola) which predate the DVB standardisation effort. The packet size, tables and control information transmitted by proprietary systems require proprietary non-DVB receivers, even though the video itself nominally in some form will often still adhere to the MPEG-2 image compression standard defined by the Moving Picture Experts Group.
  • An IRD is an integrated receiver-decoder, in other words a complete digital satellite TV or radio receiver; "decoder" in this context refers not to decryption but to the decompression and conversion of MPEG video into displayable format.
  • FTA is often used to refer to receivers and equipment which contain no decryption hardware, built with the intention of being able to receive unencrypted free-to-air broadcasts; more properly FTA refers to the unencrypted broadcasts themselves.
  • A CAM or conditional-access module is defined by the DVB standard as an interface between a standardised DVB Common Interface receiver and one or more proprietary smartcards for signal decryption. It is not the smartcard itself. The standard format of this module follows PCMCIA specifications; some receivers bypass the requirement for a separate module by providing embedded CAM functionality in the receiver to communicate with specific proprietary smartcards such as Nagravision, Conax, Irdeto, Viaccess, Betacrypt. In the North American market, most "package receivers" sold by signal providers provide embedded CAM operation; terminology is therefore often misused to misidentify the smartcard as a CAM.
  • JTAG is a standard test interface defined by the Joint Test Action Group and supported on many late-model digital receivers for factory test purposes. Operating using a six-wire interface and a personal computer, the JTAG interface was originally intended to provide a means to test and debug embedded hardware and software. In the satellite TV world, JTAG is most often used to obtain read-write access to nonvolatile memory within a digital receiver; initially programs such as Wall and JKeys were used to read box keys from receivers with embedded CAMs but JTAG has since proven its legitimate worth to satellite TV fans as a repair tool to fix receivers where the firmware (in flash memory) has been corrupted.
  • The Sombrero de Patel is another device used to obtain direct memory access to a receiver without physically removing memory chips from the board to place them in sockets or read them with a specialized device programmer. The device consists of a standard PLCC integrated circuit socket which has been turned upside-down in order to be placed directly over a microprocessor already permanently soldered to a printed circuit board in a receiver; the socket makes electrical contact with all pins of the microprocessor and is interfaced to one or more microcontrollers which use direct memory access to pause the receiver's microprocessor and read or write directly to the memory. The term sombrero is used for this hack as the novel use of an inverted IC socket somewhat resembles a hat being placed upon the main processor.

SmartCard piracy

Smart card piracy involves the unauthorised use of conditional-access smart cards, in order to gain, and potentially provide to others, unauthorised access to pay-TV or even private media broadcasts. Smart card piracy generally occurs after a breach of security in the smart card, exploited by computer hackers in order to gain complete access to the card's encryption system.

Once access has been gained to the smart card's encryption system, the hacker can perform changes to the card's internal information, which in turn tricks the conditional-access system into believing that it has been allowed access, by the legitimate card provider, to other television channels using the same encryption system. In some cases, the channels do not even have to be from the same television provider, since many providers use similar encryption systems, or use cards which have the capacity to store information for decoding those channels also. The information on how to hack the card is normally held within small, underground groups, to which public access is not possible. Instead, the hacking groups may release their hack in several forms. One such way is simply to release the encryption algorithm and key. Another common release method is by releasing a computer program which can be used by the smart card user to reprogram their card. Once complete, the now illegally modified smart card is known as a "MOSC." (Modified Original Smart Card). A third such method, more common in recent times, is to sell the information gained on the encryption to a third party, who will then release their own smart card, such as the K3 card. This third party, for legal reasons, will then use a fourth party to release encrypted files, which then allow the card to decode encrypted content.

Along with modifying original cards, it is possible to use the information provided by the smart card to create an encryption emulator. This, in turn, can be programmed into a cable or satellite receiver's internal software, and offered for download on the internet as a firmware upgrade. This allows access to the encrypted channels by those who do not even own a smart card. In recent times, many underground forum websites dedicated to the hobby of satellite piracy and encryption emulated Free To Air (FTA) receivers have been set up, giving up-to-date information on satellite and cable piracy, including making available firmware downloads for receivers, and very detailed encryption system information available to the public.

Upon gaining the knowledge that their system has been compromised, the smart card providers often have several counter measure systems against unauthorised viewing, which can be put in place over the air, in most cases causing virtually no disruption to legitimate viewers. One such measure is CI revocation. The simplest form of counter measure is a key change. This simply halts viewing for those viewing without authorisation temporarily, since the new key can easily be accessed in the hacked card, and implemented. There are often other more complicated procedures which update a part of the smart card in order to make it inaccessible. These procedures can also, however, be hacked, once again allowing access. This leads to a game of "cat and mouse" between the smart card provider, and the hackers. This, after several stages of progression, can leave the smart card provider in a situation where they no longer have any further counter measures to implement. This leaves them in a situation where they must perform a card and encryption change with all legitimate viewers, in order to eliminate the viewing of the service without permission, at least for the foreseeable future.

Such has been the success of implementing new smart card systems, that another form of smart card piracy has grown in popularity. This method is called card sharing, which works by making available the smart card decoding information in real time to other users, via a computer network. Police monitoring of unsecured card sharing networks has led to prosecutions.

Virtually every common encryption system is publicly known to have been compromised. These include Viaccess, Nagravision, SECA Mediaguard and Conax. The MediaCipher system, owned by Motorola, along with Scientific Atlanta's PowerKEY system, are the only digital TV encryption systems which have not publicly been compromised. This is largely thanks to there being no PC card conditional-access modules (CAMs) available for either encryption system.

Despite the unauthorised decryption of media being illegal in many countries, smart card piracy is a crime which is very rarely punished, due to it being virtually undetectable, particularly in the case of satellite viewing. Laws in many countries do not clearly specify whether the decryption of foreign media services is illegal or not. This has caused much confusion in places such as Europe, where the proximity of many countries, coupled with the large land mass covered by satellite beams, allows signal access to many different providers. These providers are reluctant to pursue criminal charges against many viewers as they live in different countries. There have, however, been several high-profile prosecution cases in the USA, where satellite dealers have been taken to court resulting in large fines or jail time.

Internet key sharing

An Internet key sharing scheme consists of one smart card with a valid, paid subscription which is located on an Internet server. It generates a stream of real-time decryption keys which are broadcast over the Internet to remotely located satellite receivers. Limiting factors in the number of remotely located satellite receivers are the network latency and the period between the updated keys and the ability of the card client's receiver to use the decrypted key stream.

Each receiver is configured in an identical manner, a clone receiving the same television signal from a satellite and, from the internet server, the same decryption keys to unlock that signal. As the server must have individually subscribed smart cards for each channel to be viewed, its continued operation tends to be costly and may require multiple subscriptions under different names and addresses. There is also a risk that as the number of card clients on the card sharing network grows, it will attract the attention of the satellite TV service provider and law enforcement agencies and the monitoring of IP addresses associated with this card sharing network may identify individual users and server operators who then become targets for legal action by the satellite TV service provider or by legal authorities.

Key sharing schemes are typically used where replacement of compromised smart card systems (such as the deprecation of Nagra 1/2 in favour of Nagra 3) has made other pirate decryption methods non-functional.

In February 2014, an episode of BBC's "Inside Out" disclosed that the complete Sky TV package could be obtained from black-market sources for as little as £10 per month through Internet key sharing, Swansea and Cardiff were highlighted with significant activity in pubs using cracked boxes to show Premier League football.

Political issues

In some countries such as Canada and many Caribbean nations (except for the Dominican Republic), the black market in satellite TV piracy is closely tied to the gray market activity of using direct broadcast satellite signals to watch broadcasts intended for one country in some other, adjacent country. Many smaller countries have no domestic DBS operations and therefore few or no legal restrictions on the use of decoders which capture foreign signals.

The refusal of most providers to knowingly issue subscriptions outside their home country leads to a situation where pirate decryption is perceived as being one of the few ways to obtain certain programming. If there is no domestic provider for a channel, a grey market (subscribed using another address) or black market (pirate) system is prerequisite to receive many specific ethnic, sport or premium movie services.

Pirate or grey-market reception also provides viewers a means to bypass local blackout restrictions on sporting events and to access hard-core pornography where some content is not otherwise available.

The grey market for US satellite receivers in Canada at one point was estimated to serve as many as several hundred thousand English-speaking Canadian households. Canadian authorities, acting under pressure from cable companies and domestic broadcasters, have made many attempts to prevent Canadians from subscribing to US direct-broadcast services such as AT&T's DirecTV and Echostar's Dish Network.

While litigation has gone as far as the Supreme Court of Canada, no judicial ruling has yet been made on whether such restrictions violate the safeguards of the Canadian Charter of Rights and Freedoms which are intended to protect freedom of expression and prevent linguistic or ethnic discrimination. Domestic satellite and cable providers have adopted a strategy of judicial delay in which their legal counsel will file an endless series of otherwise-useless motions before the courts to ensure that the proponents of the grey-market systems run out of money before the "Charter Challenge" issue is decided.

According to K. William McKenzie, the Orillia Ontario lawyer who won the case in the Supreme Court of Canada, a consortium headed by David Fuss and supported by Dawn Branton and others later launched a constitutional challenge to defeat section 9(1)(c) of the Radiocommunication Act on the basis that it breached the guarantee of Freedom of Expression enshrined in section 2 (c) of the Canadian Charter of Rights.

The evidence compiled by Mr. McKenzie from his broadcasting clients in opposition to this challenge was so overwhelming that it was abandoned and the Court ordered that substantial costs be paid by the applicants.

In most cases, broadcast distributors will require a domestic billing address before issuing a subscription; post boxes and commercial mail receiving agencies are often used by grey-market subscribers to foreign providers to circumvent this restriction.

The situation in the US itself differs as it is complicated by the legal question of subscriber access to distant local TV stations. Satellite providers are severely limited in their ability to offer subscriptions to distant locals due to the risk of further lawsuits by local affiliates of the same network in the subscribers home designated market area. California stations have sued satellite providers who distributed New York signals nationally, as the distant stations would have an unfair advantage by broadcasting the same programming three hours earlier.

There is also a small "reverse gray market" for Canadian signals, transmitted with a footprint which sends full-strength DBS signals to many if not all of the contiguous 48 US states. This is desirable not only to receive Canadian-only content, but because some US-produced programs air in Canada in advance of their US broadcast. The question of signal substitution, by which Canadian cable and satellite providers substitute the signal of a local or domestic channel over a foreign or distant channel carrying the same program, is rendered more complex by the existence of a reverse grey market. Signal substitution had already been the cause of strong diplomatic protests by the United States, which considers the practice to constitute theft of advertising revenue.

The lack of domestic competition for premium movie channels in Canada is one factor encouraging grey-market reception; language is another key issue as most Spanish-language programming in North America is on the US system and most French-language programming is on the Canadian system. A larger selection of sports and ethnic programming is also available to grey-market subscribers.

It could be said that the 1000-channel universe is a "reality" in North America, but only for the signal pirates as many legal and geographic restrictions are placed on the ability to subscribe to many if not most of the physically available channels.

Other countries such as Nicaragua during Sandinista rule, Cuba, Iran (Islamic Republic of Iran) and Afghanistan during Taliban rule and Iraq during the Saddam Hussein regime, have attempted to prohibit their citizens from receiving any satellite broadcasts from foreign sources.

The situation in Europe differs somewhat, due to the much greater linguistic diversity in that region and due to the use of standardized DVB receivers capable of receiving multiple providers and free-to-air signals. North American providers normally lock their subscribers into "package receivers" unable to tune outside their one package; often the receivers are sold at artificially low prices and the subscription cost for programming is increased in order to favour new subscribers over existing ones. Providers are also notorious for using sales tactics such as bundling, in which to obtain one desired channel a subscriber must purchase a block of anywhere from several to more than a hundred other channels at substantial cost.

Many European companies such as British Sky Broadcasting prohibit subscriptions outside the UK and Ireland. But other satellite providers such as Sky Deutschland do sell yearly subscription cards legally to customers in other European countries without the need for an address or other personal information. The latter also applies to virtually all the Adult channel cards sold in Europe.

The Middle East emerged in the picture with the Kingdom of Saudi Arabia. In July 2019, global football authorities of various competitions collectively condemned a pirate broadcasting channel of Saudi Arabia, BeoutQ. The right holders running Premier League, FIFA World Cup and UEFA Champions League called on the authorities of the Arab nation to halt the operations of its homegrown pirate TV and broadcasting service, which is involved in illegal streaming of matches internationally.

BeoutQ emerged in 2017, and since has been widely available across Saudi Arabia. However, the country denied that it is based in Riyadh, stating that the authorities are committed to fighting piracy. In February 2015, several sports bodies and broadcasters, including the U.S. National Basketball Association, U.S. Tennis Association and Sky demanded the United States to add Saudi Arabia its “Priority Watch List” over TV piracy. It was in April 2019, when Office of the United States Trade Representative (USTR) released a report placing Saudi Arabia on the Watch List.

Counter-piracy techniques

A number of strategies have been used by providers to control or prevent the widespread pirate decryption of their signals.

One approach has been to take legal action against dealers who sell equipment which may be of use to satellite pirates; in some cases the objective has been to obtain lists of clients in order to take or threaten to take costly legal action against end-users. Providers have created departments with names like the "office of signal integrity" or the "end-users group" to pursue alleged pirate viewers.

As some equipment (such as a computer interface to communicate with standard ISO/IEC 7816 smartcards) is useful for other purposes, this approach has drawn strong opposition from groups such as the Electronic Frontier Foundation. There have also been US counter-suits alleging that the legal tactics used by some DBS providers to demand large amounts of money from end-users may themselves appear unlawful or border on extortion.

Much of the equipment is perfectly lawful to own; in these cases, only the misuse of the equipment to pirate signals is prohibited. This makes provider attempts at legal harassment of would-be pirates awkward at best, a serious problem for providers which is growing due to the Internet distribution of third-party software to reprogram some otherwise legitimate free-to-air DVB receivers to decrypt pay TV broadcasts with no extra hardware.

US-based Internet sites containing information about the compromised encryption schemes have also been targeted by lawyers, often with the objective of costing the defendants enough in legal fees that they have to shut down or move their sites to offshore or foreign Internet hosts.

In some cases, the serial numbers of unsubscribed smartcards have been blacklisted by providers, causing receivers to display error messages. A "hashing" approach of writing arbitrary data to every available location on the card and requiring that this data be present as part of the decryption algorithm has also been tried as a way of leaving less available free space for third-party code supplied by pirates.

Another approach has been to load malicious code onto smartcards or receivers; these programs are intended to detect tampered cards and maliciously damage the cards or corrupt the contents of non-volatile memories within the receiver. This particular Trojan horse attack is often used as an ECM (electronic countermeasure) by providers, especially in North America where cards and receivers are sold by the providers themselves and are easy targets for insertion of backdoors in their computer firmware. The most famous ECM incident was the Black Sunday attack launched against tampered DirecTV "H" on 3 January 21, 2001 and intended to destroy the cards by overwriting a non-erasable part of the cards internal memory in order to lock the processor into an endless loop.

The results of a provider resorting to the use of malicious code are usually temporary at best, as knowledge of how to repair most damage tends to be distributed rapidly by hobbyists through various Internet forums. There is also a potential legal question involved (which has yet to be addressed) as the equipment is normally the property not of the provider but of the end user. Providers will often print on the smartcard itself that the card is the property of the signal provider, but at least one legal precedent indicates that marking "this is mine" on a card, putting it in a box with a receiver and then selling it can legally mean "this is not mine anymore". Malicious damage to receiver firmware puts providers on even shakier legal ground in the unlikely event that the matter were ever to be heard by the judiciary.

The only solution which has shown any degree of long-term success against tampered smartcards has been the use of digital renewable security; if the code has been broken and the contents of the smartcard's programming widely posted across the Internet, replacing every smartcard in every subscriber's receiver with one of different, uncompromised design will effectively put an end to a piracy problem. Providers tend to be slow to go this route due to cost (as many have millions of legitimate subscribers, each of which must be sent a new card) and due to concern that someone may eventually crack the code used in whatever new replacement card is used, causing the process to begin anew.

Premiere in Germany has replaced all of its smartcards with the Nagravision Aladin card; the US DirecTV system has replaced its three compromised card types ("F" had no encryption chip, "H" was vulnerable to being reprogrammed by pirates and "HU" were vulnerable to a "glitch" which could be used to make them skip an instruction). Both providers have been able to eliminate their problems with signal piracy by replacing the compromised smartcards after all other approaches had proved to provide at best limited results.

Dish Network and Bell Satellite TV had released new and more tamper-resistant smart cards over the years, known as the ROM2, ROM3, ROM10, ROM11 series. All these cards used the Nagravision 1 access system. Despite introducing newer and newer security measures, older cards were typically still able to decrypt the satellite signal after new cards were released (A lack of EEPROM space on the ROM2 cards eventually led to them being unable to receive updates necessary to view programming). In an effort to stop piracy, as by this point the Nagravision 1 system had been thoroughly reverse-engineered by resourceful hobbyists, an incompatible Nagravision 2 encryption system was introduced along with a smart card swap-out for existing customers. As more cards were swapped, channel groups were slowly converted to the new encryption system, starting with pay-per-view and HDTV channels, followed by the premium movie channels. This effort culminated in a complete shutdown of the Nagravision 1 datastream for all major channels in September, 2005. Despite these efforts to secure their programming, a software hack was released in late August, 2005, allowing for the decryption of the new Nagravision 2 channels with a DVB-S card and a PC. Just a few months later, early revisions of the Nagravision 2 cards had been themselves compromised. Broadcast programming currently[when?] uses a simulcrypt of Nagravision 2 and Nagravision 3, a first step toward a possible future shutdown of Nagravision 2 systems.

Litigation

Various groups have been targeted for lawsuits in connection with pirate decryption issues:

  • In 2006, a decision in Snow v. DirecTV preserved the right of a private website owner to prohibit DirecTV from accessing an otherwise-public website run by plaintiff Michael Snow to serve anti-DirecTV activists.
  • DirecTV (as the euphemistically-named "End Users Group") had engaged in widespread litigation against its own subscribers on the pretext that users who owned both a smartcard programmer and a DirecTV subscription were presumed to be using the equipment to unlock extra channels on the system. A hundred thousand users were harassed with repeated and legally-questionable demands seeking thousands of dollars per user.
  • In 2004's DirecTV v. Treworgy, the Electronic Frontier Foundation helped establish that DirecTV cannot sue individuals for "mere possession" of smart-card technology, forcing the company to drop its "guilt-by-purchase" litigation strategy.
  • "NagraStar" (a joint venture of Nagravision/Kudelski and DishNetwork/Echostar) has also targeted US end users with legal threats and demands for money.
  • EchoStar, as parent of Dish Network, has sued manufacturers of FTA receivers, claiming that the manufacturers were aware of or complicit in the distribution of aftermarket software which unlocks channels transmitted with compromised encryption schemes. The company has also sued operators of websites which published information about the security issues.
  • DirecTV has used the Digital Millennium Copyright Act and the Federal Communications Act to target developers and distributors of software that allowed users to hack DirecTV's older generation access cards. One 2006 settlement in US federal case DirecTV and NDS vs. Robert Lazarra ended in a one million dollar out-of-court settlement.
  • In 2009, the US Ninth Circuit court ruled in DirecTV, Inc v. Hoa Huynh, Cody Oliver against DirecTV's claim that inserting a smart card into preexisting television equipment constitutes "assembling" a pirate device. DirecTV cannot sue on this theory, dismissing DirecTV's attempt to punish individuals twice for a single offense and upholding a lower court decision that 47 U.S.C., section 605(e)(4) does not apply to individuals owning interception devices solely for personal use. This decision protects legitimate security researchers.
  • DirecTV sued its smartcard vendor NDS, accusing News Data Systems of “breach of contract, fraud, breach of warranty and misappropriation of trade secrets” for its role in designing the now compromised H- and HU- series cards.
  • Canal Plus and EchoStar have also sued NDS, alleging that the company reverse-engineered and leaked information about their providers' rival encryption schemes.
  • Québécor-owned cable television operator Videotron sued Bell Satellite TV on the grounds that free signals from compromised satellite TV encryption unfairly cost the cable company paid subscribers. After multiple appeals and rulings against Bell, Québécor and TVA Group were ultimately awarded $141 million in 2015.

One of the most severe sentences handed out for satellite TV piracy in the United States was to a Canadian businessman, Martin Clement Mullen, widely known for over a decade in the satellite industry as "Marty" Mullen.

Mullen was sentenced to seven years in prison with no parole and ordered to pay DirecTV and smart card provider NDS Ltd. US$24 million in restitution. He pleaded guilty in a Tampa, Florida court in September 2003 after being arrested when he entered the United States using a British passport in the name "Martin Paul Stewart".

Mr. Mullen had operated his satellite piracy business from Florida, the Cayman Islands and from his home in London, Ontario, Canada. Testimony in the Florida court showed that he had a network of over 100 sub-dealers working for him and that during one six-week period, he cleared US$4.4 million in cash from re-programming DirecTV smartcards that had been damaged in an electronic counter measure.

NDS Inc. Chief of Security John Norris pursued Mullen for a decade in three different countries. When Mullen originally fled the United States to Canada in the mid-1990s, Norris launched an investigation that saw an undercover operator (a former Canadian police officer named Don Best) become one of Mullen's sub-dealers and his closest personal friend for over a year. In summer of 2003 when Mullen travelled under another identity to visit his operations in Florida, US federal authorities were waiting for him at the airport after being tipped off by Canadian investigators working for NDS Inc.

Ironically, the NDS Group were accused (in several lawsuits) by Canal+ (dismissed as part of an otherwise-unrelated corporate takeover deal) and Echostar (now Dish Network) of hacking the Nagra encryption and releasing the information on the internet. The jury awarded EchoStar $45.69 actual damages (one month's average subscription fee) in Claim 3.

Bell Satellite TV (as Bell ExpressVu) was sued by Vidéotron, a Québécor-owned rival which operates cable television systems in major Québec markets. Québécor also owns TVA, a broadcaster. Bell's inferior security and failure to replace compromised smartcards in a timely fashion cost Vidéotron cable subscribers, as viewers could obtain the same content for free from satellite under the compromised Nagra1 system from 1999 to 2005; pirate decryption also deprived TVA's French language news channel LCN of a monthly 48¢/subscriber fee. The Superior Court of Quebec awarded $339,000 and $262,000 in damages/interest to Vidéotron and TVA Group in 2012. Québec's Appeal Court ruled these dollar amounts "erroneus" and increased them in 2015; despite an attempt to appeal to the Supreme Court of Canada, a final award of $141 million in damages and interest was upheld.

Seabed

From Wikipedia, the free encyclopedia
 

The seabed (also known as the seafloor, sea floor, ocean floor, and ocean bottom) is the bottom of the ocean. All floors of the ocean are known as 'seabeds'.

The structure of the seabed of the global ocean is governed by plate tectonics. Most of the ocean is very deep, where the seabed is known as the abyssal plain. Seafloor spreading creates mid-ocean ridges along the center line of major ocean basins, where the seabed is slightly shallower than the surrounding abyssal plain. From the abyssal plain, the seabed slopes upward toward the continents and becomes, in order from deep to shallow, the continental rise, slope, and shelf. The depth within the seabed itself, such as the depth down through a sediment core, is known as the “depth below seafloor.” The ecological environment of the seabed and the deepest waters are collectively known, as a habitat for creatures, as the “benthos.”

Most of the seabed throughout the world's oceans is covered in layers of marine sediments. Categorized by where the materials come from or composition, these sediments are classified as either: from land (terrigenous), from biological organisms (biogenous), from chemical reactions (hydrogenous), and from space (cosmogenous). Categorized by size, these sediments range from very small particles called clays and silts, known as mud, to larger particles from sand to boulders.

Features of the seabed are governed by the physics of sediment transport and by the biology of the creatures living in the seabed and in the ocean waters above. Physically, seabed sediments often come from the erosion of material on land and from other rarer sources, such as volcanic ash. Sea currents transport sediments, especially in shallow waters where tidal energy and wave energy cause resuspension of seabed sediments. Biologically, microorganisms living within the seabed sediments change seabed chemistry. Marine organisms create sediments, both within the seabed and in the water above. For example, phytoplankton with silicate or calcium carbonate shells grow in abundance in the upper ocean, and when they die, their shells sink to the seafloor to become seabed sediments.

Human impacts on the seabed are diverse. Examples of human effects on the seabed include exploration, plastic pollution, and exploitation by mining and dredging operations. To map the seabed, ships use acoustic technology to map water depths throughout the world. Submersible vehicles help researchers study unique seabed ecosystems such as hydrothermal vents. Plastic pollution is a global phenomenon, and because the ocean is the ultimate destination for global waterways, much of the world's plastic ends up in the ocean and some sinks to the seabed. Exploitation of the seabed involves extracting valuable minerals from sulfide deposits via deep sea mining, as well as dredging sand from shallow environments for construction and beach nourishment.

Structure

Map showing the underwater topography (bathymetry) of the ocean floor. Like land terrain, the ocean floor has mountains including volcanoes, ridges, valleys, and plains.
 
Drawing showing divisions according to depth and distance from shore
The major oceanic divisions

Most of the oceans have a common structure, created by common physical phenomena, mainly from tectonic movement, and sediment from various sources. The structure of the oceans, starting with the continents, begins usually with a continental shelf, continues to the continental slope – which is a steep descent into the ocean, until reaching the abyssal plain – a topographic plain, the beginning of the seabed, and its main area. The border between the continental slope and the abyssal plain usually has a more gradual descent, and is called the continental rise, which is caused by sediment cascading down the continental slope.

The mid-ocean ridge, as its name implies, is a mountainous rise through the middle of all the oceans, between the continents. Typically a rift runs along the edge of this ridge. Along tectonic plate edges there are typically oceanic trenches – deep valleys, created by the mantle circulation movement from the mid-ocean mountain ridge to the oceanic trench.

Hotspot volcanic island ridges are created by volcanic activity, erupting periodically, as the tectonic plates pass over a hotspot. In areas with volcanic activity and in the oceanic trenches there are hydrothermal vents – releasing high pressure and extremely hot water and chemicals into the typically freezing water around it.

Deep ocean water is divided into layers or zones, each with typical features of salinity, pressure, temperature and marine life, according to their depth. Lying along the top of the abyssal plain is the abyssal zone, whose lower boundary lies at about 6,000 m (20,000 ft). The hadal zone – which includes the oceanic trenches, lies between 6,000 and 11,000 metres (20,000–36,000 ft) and is the deepest oceanic zone.

Depth below seafloor

Depth below seafloor is a vertical coordinate used in geology, paleontology, oceanography, and petrology (see ocean drilling). The acronym "mbsf" (meaning "meters below the seafloor") is a common convention used for depths below the seafloor.

Total sediment thickness of the world's oceans and continental margins in meters.

Sediments in the seabed vary in origin, from eroded land materials carried into the ocean by rivers or wind flow, waste and decompositions of sea creatures, and precipitation of chemicals within the sea water itself, including some from outer space. There are four basic types of sediment of the sea floor:

  1. Terrigenous (also lithogenous) describes the sediment from continents eroded by rain, rivers, and glaciers, as well as sediment blown into the ocean by the wind, such as dust and volcanic ash.
  2. Biogenous material is the sediment made up of the hard parts of sea creatures, mainly phytoplankton, that accumulate on the bottom of the ocean.
  3. Hydrogenous sediment is material that precipitates in the ocean when oceanic conditions change, or material created in hydrothermal vent systems.
  4. Cosmogenous sediment comes from extraterrestrial sources.

Terrigenous and biogenous

Satellite image of wind-blown mineral dust over the Atlantic. Dust may become terrigenous sediment on the seabed.
 
Phytoplankton grow shells which later sink to the seabed to become biogenous sediments. For example, diatoms make silicate shells, which become siliceous ooze.

Terrigenous sediment is the most abundant sediment found on the seafloor. Terrigenous sediments come from the continents. These materials are eroded from continents and transported by wind and water to the ocean. Fluvial sediments are transported from land by rivers and glaciers, such as clay, silt, mud, and glacial flour. Aeolian sediments are transported by wind, such as dust and volcanic ash.

Biogenous sediment is the next most abundant material on the seafloor. Biogenous sediments are biologically produced by living creatures. Sediments made up of at least 30% biogenous material are called "oozes." There are two types of oozes: Calcareous oozes and Siliceous oozes. Plankton grow in ocean waters and create the materials that become oozes on the seabed. Calcareous oozes are predominantly composed of calcium shells found in phytoplankton such as coccolithophores and zooplankton like the foraminiferans. These calcareous oozes are never found deeper than about 4,000 to 5,000 meters because at further depths the calcium dissolves. Similarly, Siliceous oozes are dominated by the siliceous shells of phytoplankton like diatoms and zooplankton such as radiolarians. Depending on the productivity of these planktonic organisms, the shell material that collects when these organisms die may build up at a rate anywhere from 1 mm to 1 cm every 1000 years.

Hydrogenous and cosmogenous

Hydrothermal vent fluids cause chemical reactions that precipitate out minerals that form sediments on the surrounding seafloor.

Hydrogenous sediments are uncommon. They only occur with changes in oceanic conditions such as temperature and pressure. Rarer still are cosmogenous sediments. Hydrogenous sediments are formed from dissolved chemicals that precipitate from the ocean water, or along the mid-ocean ridges, they can form by metallic elements binding onto rocks that have water of more than 300 °C circulating around them. When these elements mix with the cold sea water they precipitate from the cooling water. Known as manganese nodules, they are composed of layers of different metals like manganese, iron, nickel, cobalt, and copper, and they are always found on the surface of the ocean floor.

Cosmogenous sediments are the remains of space debris such as comets and asteroids, made up of silicates and various metals that have impacted the Earth.

Size classification

Sediment types from the Southern Ocean showing many different grain sizes: A) gravel and sand, B) gravel, C) bioturbated mud and sand, and D) laminated clays and silts.

Another way that sediments are described is through their descriptive classification. These sediments vary in size, anywhere from 1/4096 of a mm to greater than 256 mm. The different types are: boulder, cobble, pebble, granule, sand, silt, and clay, each type becoming finer in grain. The grain size indicates the type of sediment and the environment in which it was created. Larger grains sink faster and can only be pushed by rapid flowing water (high energy environment) whereas small grains sink very slowly and can be suspended by slight water movement, accumulating in conditions where water is not moving so quickly. This means that larger grains of sediment may come together in higher energy conditions and smaller grains in lower energy conditions.

Benthos

Benthos (from Ancient Greek βένθος (bénthos) 'the depths (of the sea)'), also known as benthon, is the community of organisms that live on, in, or near the bottom of a sea, river, lake, or stream, also known as the benthic zone. This community lives in or near marine or freshwater sedimentary environments, from tidal pools along the foreshore, out to the continental shelf, and then down to the abyssal depths.

Many organisms adapted to deep-water pressure cannot survive in the upper parts of the water column. The pressure difference can be very significant (approximately one atmosphere for every 10 metres of water depth).

Because light is absorbed before it can reach deep ocean water, the energy source for deep benthic ecosystems is often organic matter from higher up in the water column that drifts down to the depths. This dead and decaying matter sustains the benthic food chain; most organisms in the benthic zone are scavengers or detritivores.

The term benthos, coined by Haeckel in 1891, comes from the Greek noun βένθος 'depth of the sea'. Benthos is used in freshwater biology to refer to organisms at the bottom of freshwater bodies of water, such as lakes, rivers, and streams. There is also a redundant synonym, Benton.

Topography

Map of underwater topography (1995 NOAA)

Seabed topography (ocean topography or marine topography) refers to the shape of the land (topography) when it interfaces with the ocean. These shapes are obvious along coastlines, but they occur also in significant ways underwater. The effectiveness of marine habitats is partially defined by these shapes, including the way they interact with and shape ocean currents, and the way sunlight diminishes when these landforms occupy increasing depths. Tidal networks depend on the balance between sedimentary processes and hydrodynamics however, anthropogenic influences can impact the natural system more than any physical driver.

Marine topographies include coastal and oceanic landforms ranging from coastal estuaries and shorelines to continental shelves and coral reefs. Further out in the open ocean, they include underwater and deep sea features such as ocean rises and seamounts. The submerged surface has mountainous features, including a globe-spanning mid-ocean ridge system, as well as undersea volcanoes, oceanic trenches, submarine canyons, oceanic plateaus and abyssal plains.

The mass of the oceans is approximately 1.35×1018 metric tons, or about 1/4400 of the total mass of the Earth. The oceans cover an area of 3.618×108 km2 with a mean depth of 3,682 m, resulting in an estimated volume of 1.332×109 km3.

Features

Layers of the pelagic zone

Each region of the seabed has typical features such as common sediment composition, typical topography, salinity of water layers above it, marine life, magnetic direction of rocks, and sedimentation. Some features of the seabed include flat abyssal plains, mid-ocean ridges, deep trenches, and hydrothermal vents.

Seabed topography is flat where layers of sediments cover the tectonic features. For example, the abyssal plain regions of the ocean are relatively flat and covered in many layers of sediments. Sediments in these flat areas come from various sources, including but not limited to: land erosion sediments from rivers, chemically precipitated sediments from hydrothermal vents, Microorganism activity, sea currents eroding the seabed and transporting sediments to the deeper ocean, and phytoplankton shell materials.

Where the seafloor is actively spreading and sedimentation is relatively light, such as in the northern and eastern Atlantic Ocean, the original tectonic activity can be clearly seen as straight line "cracks" or "vents" thousands of kilometers long. These underwater mountain ranges are known as mid-ocean ridges.

Other seabed environments include hydrothermal vents, cold seeps, and shallow areas. Marine life is abundant in the deep sea around hydrothermal vents. Large deep sea communities of marine life have been discovered around black and white smokers — vents emitting chemicals toxic to humans and most vertebrates. This marine life receives its energy both from the extreme temperature difference (typically a drop of 150 degrees) and from chemosynthesis by bacteria. Brine pools are another seabed feature, usually connected to cold seeps. In shallow areas, the seabed can host sediments created by marine life such as corals, fish, algae, crabs, marine plants and other organisms.

Human impact

Exploration

The seabed has been explored by submersibles such as Alvin and, to some extent, scuba divers with special equipment. Hydrothermal vents were discovered by an underwater camera platform by researchers in 1977. In recent years satellite measurements of ocean surface topography show very clear maps of the seabed, and these satellite-derived maps are used extensively in the study and exploration of the ocean floor.

Plastic pollution

In 2020 scientists created what may be the first scientific estimate of how much microplastic currently resides in Earth's seafloor, after investigating six areas of ~3 km depth ~300 km off the Australian coast. They found the highly variable microplastic counts to be proportionate to plastic on the surface and the angle of the seafloor slope. By averaging the microplastic mass per cm3, they estimated that Earth's seafloor contains ~14 million tons of microplastic – about double the amount they estimated based on data from earlier studies – despite calling both estimates "conservative" as coastal areas are known to contain much more microplastic pollution. These estimates are about one to two times the amount of plastic thought – per Jambeck et al., 2015 – to currently enter the oceans annually.

Exploitation

Deep sea mining
Deep sea mining

Deep sea mining is a growing subfield of experimental seabed mining that involves the retrieval of minerals and deposits from the ocean floor found at depths of 200 meters or greater. As of 2021, the majority of marine mining efforts are limited to shallow coastal waters only, where sand, tin and diamonds are more readily accessible. There are three types of deep sea mining that have generated great interest: polymetallic nodule mining, polymetallic sulphide mining, and the mining of cobalt-rich ferromanganese crusts. The majority of proposed deep sea mining sites are near of polymetallic nodules or active and extinct hydrothermal vents at 1,400 to 3,700 metres (4,600 to 12,100 ft) below the ocean’s surface. The vents create globular or massive sulfide deposits, which contain valuable metals such as silver, gold, copper, manganese, cobalt, and zinc. The deposits are mined using either hydraulic pumps or bucket systems that take ore to the surface to be processed.

Marine minerals include sea-dredged and seabed minerals. Sea-dredged minerals are normally extracted by dredging operations within coastal zones, to maximum sea depths of about 200 m. Minerals normally extracted from these depths include sand, silt and mud for construction purposes, mineral rich sands such as ilmenite and diamonds.

As with all mining operations, deep sea mining raises questions about its potential environmental impact. There is a growing debate about whether deep sea mining should be allowed or not. Environmental advocacy groups such as Greenpeace and the Deep Sea Mining Campaign have argued that seabed mining should not be permitted in most of the world's oceans because of the potential for damage to deep sea ecosystems and pollution by heavy metal-laden plumes. Prominent environmental activists and state leaders have also called for moratoriums or total bans due to the potential of devastating environmental impacts. Some argue that there should be a total ban on seabed mining. Some anti-seabed mining campaigns have won the support of large industry such as some of the technology giants, and large car companies. However, these same companies will be increasingly reliant on the metals seabed minerals can provide. Some scientists argue that seabed mining should not go ahead, as we know such a relatively small amount about the biodiversity of the deep ocean environment. Individual countries with significant deposits of seabed minerals within their large EEZ’s are making their own decisions pertaining to seabed mining, exploring ways of undertaking seabed mining without causing too much damage to the deep ocean environment, or deciding not to develop seabed mines.

As of 2021 there was no commercial mining of seabed minerals. However, the International Seabed Authority has granted numerous exploration licenses for mining companies who operate, for example, within the Clarion Clipperton Zone. There is the potential for mining at a range of scales within the oceans from small to very large. Technologies involved in the mining of seabed minerals would be highly technological, and involve a range of robotic mining machines, as well as surface ships, and metal refineries at onshore locations. One vision for the post-fossil fuel world will rely on wind farms, solar energy, electric cars, and improved battery technologies: these use a high volume and wide range of metallic commodities including ‘green’ or ‘critical’ metals many of which are in relatively short supply. Seabed mining could provide a near-term solution to the provision of many of these metals, though only serves to worsen the fundamental problems posed by extraction.

In art and culture

Some children's play songs include elements such as "There's a hole at the bottom of the sea", or "A sailor went to sea... but all that he could see was the bottom of the deep blue sea".

On and under the seabed are archaeological sites of historic interest, such as shipwrecks and sunken towns. This underwater cultural heritage is protected by the UNESCO Convention on the Protection of the Underwater Cultural Heritage. The convention aims at preventing looting and the destruction or loss of historic and cultural information by providing an international legal framework.

Ocean colonization

From Wikipedia, the free encyclopedia
https://en.wikipedia.org/wiki/Ocean_colonization

Ocean colonization is the theory of extending society territorially to the ocean by permanent settlements floating on the ocean surface and submerged below, employing offshore construction. In a broader sense the ocean being subject of colonization and colonialism has been critically identified with exploitive ocean development, such as deep sea mining. In this regard blue justice groups have also used the term blue colonization.

Ocean Colonization
AndrasGyorfi.jpg
The theory of developing permanent dwellings in the ocean, both floating and sunken, to allow permanent human settlement. This idea was first suggested by Friedman and Gramlich, and has been researched since the early 1990s.

The process of extending space available for humans to inhabit involves developing seasteads such as artificial islands, floating rigid structures, extreme-sized cruise ships or even submerged structures, to provide permanent living quarters for sections of the world's population. Specifically catering for the growing issue of overpopulation, and need for extra housing as a result, the urban theorists that have pursued this idea also suggesting it as a sustainable form of living to help assist climate change  Colonies may form their own sovereign state of independence, with these structures also being generally less impacted by natural disasters.

However this theory for future urban planning has been critiqued by other scientists, suggesting that developing artificial structures in an aquatic environment will disrupt the natural marine ecosystem and may instead be impacted by aquatic natural disasters such as tsunamis. The debate against this theory further notes the threat of security of these colonies and the potential lack of protection without an overseeing government or body.

The utopian theory of ocean colonisation has been explored and visually explained in many forms of entertainment such as in gaming, virtual realities and science-fiction movies, to show the potentially positive and negative changes on societies daily living.

Lessons learned from ocean colonization may prove applicable to space colonization. The ocean may prove simpler to colonize than space and thus occur first, providing a proving ground for the latter. In particular, the issue of sovereignty may bear many similarities between ocean and space colonization; adjustments to social life under harsher circumstances would apply similarly to the ocean and to space; and many technologies may have uses in both environments. 

Technologies

Underwater construction

Underwater habitats are examples of underwater structures.

Submerged Structures

Submerged structures are sunken, air-tight vessels that either sit at an intermediate position or attached to the ocean floor that create an underwater metropolis for residences and businesses.

Proposed Designs

H2ome is a project for building sea floor homes, along with high-end resorts and hotels.

Ocean Spiral City is a $26 billion Japanese project, with research and designing being underway to potentially house 5000 people and may be a reality by 2030.

Offshore construction

Offshore construction is one of the main forms of ocean colonization.

Land Reclamation

Land reclamation, or artificial islands, are the man-made process of relocating rock or placing cement in a sea, ocean or river bed, to extend or create a new area of liveable land in the ocean. This process involves creating a solid base on the sea floor and further building upon it with materials such as clay, sand and soil to form a new island-like structure above the water surface. It therefore expands the area for potential development space, supporting the erection of buildings or other necessary urban developments in response to support human activities, by utilising this otherwise untouched space for more ‘productive’ uses. This ocean colonisation technique is the most developed in terms of planning and implementation in the present day.

Present-day Examples

Palm Jumeriah
Palm Island, Dubai

The Palm Jumeriah is the main of the three artificial islands in Dubai, United Arab Emirates, to be developed. The name ‘Palm’ resembles its palm-tree like design when viewed aerially, and is both culturally and symbolically relevant to the coastal city. This land reclamation project began in 2001 and involved the movement of 94 million cubic metres of sand and 5.5 million cubic metres of rock off-shore in the Persian Gulf, to allow the development of luxury beachfront villas for both residential and commercial purposes.

Kansai Airport located off the coast of Osaka Bay
Kansai International Airport

Kansai International Airport located in Osaka Bay, Japan was created in 1987, due to overcrowding at the nearby Osaka Airport. Developers suggested Japan's mountain terrain  is not conducive to the development of necessary flat space required for an airport and thus developed an artificial island in the bay, with a connecting bridge to support both travel and freight arrivals and departures.

Portier Cove

Portier Cove is a new eco-district extended off the coast of Monaco designed to reduce greenhouse emissions in the area. The 125m long extension project re-began in 2011 and plans to provide a hectare of space for retail, parks, offices, apartments and private villas, to support their national issue of a growing population.

Floating Structures

Artist impression of a floating residence

Very Large Floating Structures (VLFS)  or Seasteads are artificially man-made pontoons, designed to float on the surface of the ocean or sea to house permanent residents. They have a large surface area and are designed to not be bound to a certain government but instead form their own community through clusters of floating structures. This type of technology has only be theorised and is yet to be developed, however a variety of companies have investment project plans underway.

Proposed Designs

The Seasteading Institute

Seasteading refers to building buoyant, permanent structures to float on the surface of the ocean to support human settlements and colonies.

The idea constructed by Friedman and Gramlich, who founded the Seasteading Institute, is now defined in the Oxford English Dictionary. The pair received $500k funding from PayPal Peter Thiel, to begin designing and constructing their idea in 2008. 

Oceanix City

Architectural company BIG proposed their design of the Oceanix City, involving a series of inhabitable floating villages, clustered together to form an archipelago that could house 10,000 residents. The proposed design was developed in response to the effects of climate change such as rising sea levels and an increase in hurricanes in the Polynesian region, that threaten many tropical island nations from being eradicated. The design also outlines its intentions to incorporate predominantly renewable energy sources such as wind and water.

Cruise Ships

The idea of cruise ships as part of the theory of ocean colonisation, surpass the typical modern-day commercial cruise ships. This technology imagines a large scale vessel, supporting permanent residence on board that can freely move about the world's oceans and seas. These ships include residential, retail, sport, commercial and entertainment quarters on board.

Proposed Designs

The Freedom Ship

The ideal size and style is outlined in the concept of the ‘Freedom Ship’ design by US engineer Norman Nixon, proposing a 4000 ft length vessel that has the capability to house 60,000 residents and 15,000 personnel   - with an estimated cost of $10 billion (USD).

Present Day Example

'The World' Ship - the largest commercial floating vessel
The World Ship

‘The World’ ship debuted in 2015, sitting at 644 ft long and is the largest, residential cruise ship presently in the world. This vessel is the closest, existent ship to the idealised ‘Freedom Ship’ design that hopes to support permanent life on board a ship. Permanent residency on the ship costs between $3million (USD) to $15million (USD) per room.

Examples in Media

  • Seaquest, a 1990s science-fiction TV series about a spacious high-tech submarine by a future global government, patrolling the oceans which have been settled.
  • THE MEG, 2018 science-fiction movie, based in living in an underwater research facility.

Impacts of theory

Environmental

Climate change

Gradual rise of sea levels since 1992

It is predicted by 2100, sea levels will have risen by 1–3 meters as a result of global warming, to which by 2050 are estimated to impact 90% of the world's coastal cities. Theorists who support ocean colonization theories hope to face the issue and provide a solution for groups and nations worldwide that are most at risk.

Island in Tuvalu

For example, Polynesian island nations such as Tuvalu with a population of 10,000 are expected to be fully submerged by water in approximately 30–50 years 

Entrepreneurs who have devised these technologies to support the colonization of the seas suggest their design will have an overall minimal carbon footprint.

Plastic bottles utilized as building material

Recycled and environmentally-friendly materials such as recycled plastics and locally sourced coconut fibres will constitute a large proportion of building materials required for construction.

To minimise the use of pollutant energy output in the environment contributing to this rapid global warming, designers suggest using predominantly renewable energy from sources such as water, wind  and solar power.

Floating wind turbine power station

Designers also intend to utilize bicycles, electric and hydrogen vehicles as the primary transport system on board to prevent extra CO2 emissions.

Ultimately, project designers, entrepreneurs and scientists are aiming to collaborate to create a structure allowing “the formation of an eco-sustainable production and consumption cycle in the future human habitat”.

The primary group impacted by the effects of climate change, the Pacific Island Nations, are the target demographic identified for the ocean colony projects to which they are still able to remain in their familiar and culturally significant island environment. In 2017, French Polynesia signed an agreement with the Seasteading Institute to utilise their land for testing of the world's first floating town.

Green Float is another example of a project hoping to develop a carbon negative city within the Equatorial Pacific Ocean, with it set to house 100,000 locals by joining multiple floating modules. They hypothesise a 40% reduction in CO2 emissions through more environmentally friendly and energy efficient modes of transport and power. 

Areas of the world susceptible to natural disasters

Protection From Natural Disasters

The number of natural disasters occurring in the world has grown by 357 from 1919 to 2019, according to Our World in Data, with 90,000 people killed annually as a result of this extreme weather. According to this data, the main economic impacts have primarily come from extreme weather events, wildfires and flooding. Due to these economic effects, cities such as Boston, Miami and San Francisco are exploring this idea of ocean colonization as they try to protect their coastlines from an increase in flooding, rising sea levels and earthquakes respectively. Ocean colony technologies are said to be less impacted by common territorial natural disasters and even extreme aquatic weather such as damaging waves as they occupy more shallow waters. For example, the world's first floating hotel, the Barrier Reef Floating Resort, sat 70 km off the coast of Townsville, Australia and in 1988 withheld against a cyclone.

Aquatic Natural Disasters

According to theorists and scientists at the Seasteading Institute who have begun conducting research into aquatic environments as liveable spaces, many of the technologies supporting ocean colonization are set to mainly be impacted by rogue waves and storms. However, other aquatic natural disasters such as Tsunamis, Friedman says would have little impact on the structures yet only raise water levels.

Research in the 1990s emerged regarding the hydro-elasticity of rigid structures at the face of relentless and on-going wave movement  to which lead to modern scientists such as Suzuki (2006), voicing their concern of the potentially poor integrity of aquatic structures impacting by constant motion and vibration.

Breakwaters used to minimize wave destruction

Further modern research and design has also been situated around testing the computation fluid dynamics of resistance against vortex formations of water, such as cyclones that form and therefore threaten ocean environments.

Cyclone formation over ocean

Spar platforms, artificial and natural breakwaters and active repositioning, if applicable, of ocean structures to avoid storms are some suggestions and technologies suggested by ocean colonization supporters and scientists to combat extreme aquatic weather events. Entrepreneurs such as Friedman, have acknowledged and are aware of the care that must be taken in the engineering process of these designs.

Disruption to Marine Ecosystem

Biologists have identified the individualised negative impacts of the technologies that support the implementation of colonization, by their effect on the disruption to the local marine ecosystem.

According to scientists, the process of land reclamation can lead to the erosion of natural soil and land, through this human-made and unnatural movement of sediment that consequently disrupts the natural geological cycle.

Scientists at Marine Insight, have conducted studies of the environmental impacts of commercial cruise ships, with these impacts predicted to be similar to the technologies allowing ocean colonization. Currently, these vessels cause air pollution through the emission of toxic gases that increase in the acidification of the ocean.

Their research also showed the noise pollution from these ships can disturb the hearing of marine animals and mammals.

Furthermore, the leaking of chemicals, grey water and blackwater into the ocean can lead to the accumulation of harmful chemicals, increasing the water concentration, that local flora and fauna are accustomed to. These studies of cruise ships and their impact of the marine environment have been incorporated by ocean colonization scientists and designers, as they are the closest, existent technology to their proposed projects.

Social

World population growth from 1700 to 2100
 
Ocean surface coverage

Overpopulation/Housing Shortage Crisis

Ocean colonization is said by theorists to be a potential solution to the world's growing population, with 7.78 billion people currently inhabiting Earth as of May 2020. The BBC claim that 11 billion people is Earth's carrying capacity even after adjusting consumption behaviours, with the UN predicting this number to be reached by 2100. With the world's oceans covering 70% of the planet's surface, this space has been therefore seen as a viable, long-term solution to allow an expansion and extension of inhabitable space by 50%. Pioneers of this colonization theory suggest the new spaces to also cater for new and more jobs, and may be a particular solution to the moral and political dilemma of housing as well as the consequential increased number of climate refugees.

Political Economic

Sovereign Independence

Central entrepreneurs to this theory have suggested that it hosts the potential for a degree of autonomy of residences, currently operating in more strict political systems. As a result, ocean colonisation has been posed as a potential solution to poor governance, in which sovereign states may begin formation of greater personal freedoms, little state regulation and clearly defined state intentions. Despite critical theorists at the Seasteading Institute suggesting their design to allow people to “experiment with new forms of government”, however socialists critique this idea, seeing it as a possibility bypass tax laws  in international waters. Projects such as the Freedom Ship and those by the Seasteading Institute, have proposed the idea for the installation of their designs in Polynesian water however are exempt by unique governing framework permitting significant autonomy from Polynesian laws.

Countries and their exclusive economic zones

Under Article 60 of the United Nations Convention on Law of the Seas (UNCLOS), “artificial islands, installations and structures” have the right to build in exclusive economic zones to coastal nations, however these coastal nations still hold sovereignty of the 12 nautical miles adjacent to that coast.

Little has been vocalised on the development of essential services i.e. schools, hospitals etc., within these ocean colony structures yet theorists say it is likely host or closest nations will be relied upon until the initial population grows. With intentions to build beyond territorial seas in exclusive economic zones, the likelihood of the idea for pure sovereignty has been questioned by critics.

Expense

According entrepreneurs at the Seasteading Institute, their particular technology of floating modules is said to be high, with a predicted cost of  $10,000 - $100,000 per 1 acre of a seastead, comprised purely by volunteers. Similarly, Friedman, co-founder of the Seasteading Institute, has estimated the entire project to cost a few hundred million. As mentioned earlier, other projects such as the Ocean Spiral City, are set to cost $26 billion 

Critics have responded to these future plans; labelling them as “elitist, impractical and delusional”, with “the number of people accommodated limited”.

These projects will therefore rely on investors, which is acknowledged by ocean colonization theorists who state the “first people to benefit will be the privileged who can afford to invest in the project”. However skeptics criticize the idea suggesting it is ultimately designed for capitalist gain, rather than a potential solution for the future society.

Lack of Security

Without an overseeing government and lack of taxes, critics of ocean colonisation suggest there would be little security provided in the open waters, in terms of economically and regarding human rights laws. Theorists are considered by threat of being prey to pirates, with colonies on board therefore having minimal personal protection.

There has been resistance to this seemingly capital-intensive project, as critics of the idea suggest private law cannot be embraced if it challenges that of the public laws. Ocean colonization theorists have acknowledged the necessary assignment of responsibility of land and resources into private hands, to ensure that a party is liable. This assigned responsibility is suggested to rely upon existing legal frameworks regarding property, contract and commercial laws to protect colonies. Ocean colonisation theorists are currently working to balance the idea of freedom with security 

Adaptations to Living

Developing these technologies and strategies will ultimately require changes to daily living.

Hydroponic farms

Positive

Many current day activities will remain relatively unchanged and un-impacted, such as many of the ‘modern necessities’ i.e. heating, lighting, kitchen appliances, hot water systems. ‘They would require specially consideration and design, however most technologies would still be available’ says Friedman.

With such proximity to water resources, there would be a reliance on hydroponics to account for the limited space on the surface, that would generate energy and support the growth of crops. Similarly, to conserve space, vertical gardens have been suggested by designers for growing and composting.

Humans are more likely to accustom to this environment, as psychologically they are more comfortable with water, with humanity gradually moving to reside to coast and have historically always operated close to water ways.

Negative

On the other hand, humans are less likely to adapt to this possible solution as the ocean is an unfamiliar territory and they are familiar with their ways on land. Life on the water would also be incredibly different, with limited personal living space and many more shared spaced instead. There is also the threat of possible overfishing of nearby and local species to the colony, and also the raised question of waste disposal. With limited ability of fresh water availability, due to the inability to drill or stream it, critics and theorists of the idea themselves suggest and acknowledge that ocean colonies are unable to ever be purely self-sufficient.

Progress

Land reclamation, followed by Seasteading, are the two technologies leading the way in terms of development plans.

In 2017, the Seasteading Institute proposed to begin building the first project village by 2020 in a lagoon in Tahiti. Investor in the project, John Quirk, stated in 2018, that “we could conceivably see our first modest seastead for 300 people by 2022”.

In terms of law, in 2019, plans were passed allowing a nation to host the first seastead, to which it must adhere to the regulations of that host country but is also liable for its own tailored ‘Special Economic Zone’. Economic freedom is likely to be sought after and granted, but more gradually through a staged approach called ‘strategic incrementalism’.

As of May 2020, both the Seastead Institute and Blue Frontiers have completed their impact assessments and are waiting for updates on their proposal.

Bayesian inference

From Wikipedia, the free encyclopedia https://en.wikipedia.org/wiki/Bayesian_inference Bayesian inference ( / ...