Feeds

Open Source thieves stealing my American code – SCO boss

National security threat

  • alert
  • submit to reddit

The Power of One eBook: Top reasons to choose HP BladeSystem

SCO Group chief executive Darl McBride has attempted to nudge the Homeland Security Advisory alert back up towards Red, by accusing foreign interests of undermining US national security in a draft letter to Congressmen.

How are they doing this?

"Instead of UNIX from any number of US companies or Windows from Microsoft, governments throughout Europe and Asia are using Linux… I find this particularly galling because that Linux software contains thousands of lines of my company's proprietary UNIX code - for which we receive no revenue."

Novell, from whom The SCO Group, in a previous incarnation, licensed this UNIX code, contends that SCO has no ownership rights. Challenged to prove the accusation, SCO has failed to indicate the lines of code that has been 'stolen'.

Giant penguins have captured McBride, and marched him into hostile foreign environments against his will, he writes:

"SCO has a strong, involuntary presence in certain non-US government markets - but this is only through unauthorized use of occur code in Linux software."

"Open Source software - available widely through the Internet - has the potential to provide our nation's enemies or potential enemies with computing capabilities that are restricted by US law. A computer expert in North Korea who has a number of personal computers and an Internet connection can download the latest version of Linux, complete with multi-processing capabilities misappropriated from UNIX, and, in short order, build a virtual supercomputer."

He fails to note that he himself had been offering such nefarious code to the United States' enemies for several years, from sites such as this.

McBride concludes that US prosperity depends on halting the menace. "The unchecked spread of Open Source software, under the GPL, is a much more serious threat to our capitalist system than US corporations realize," he writes.

In the context of dumping, McBride writes: "I contend that the ultimate predatory price is 'free'."

It isn't clear how the draft, dated January 7, found its way into the public domain or whether any Congresscritter has actually received a copy. But you can find it here [PDF, 370kb]. ®

Related Stories

SCO sues Novell - retaliation expected
SCO surrenders claims to System V?
The SCO IP license: now it's Europe's turn
SCO sort of thinks there are Linux IP violations, but isn't quite sure
SCO targets Novell, steps into new legal trouble
SCO pesters Fortune 1000 for money (again)

IBM draws first blood in SCO Linux battle
Don't say nothing to the SCO cops, Gartner advises Linux users
We reveal major UNIX™ IP violations
SCO admits: Linux jihad is destroying our business

SCO says GPL unenforceable, unconstitutional and void
Against SCO’s GPL jihad: one size doesn't fit all
The GPL will win, claims law prof.

SCO blinks - bill us when you can
SCO: irrevocable doesn't mean forever
SCO set to take SGI's Unix licence away
HP hides its secret SCO shame
SCO still offers 'infringing' Linux source code

IBM sues SCO for selling Linux
SCO ready to clean out Linux users for $1399 per CPU
SCO and Linux: this one will run and run
SCO not playing by Aussie Rules
SCO says it's time for Linux users to pay up

SCO pulls AIX licence, calls for permanent ban
SCO's Second Amendment rebuffs Novell Unix claim
Novell torpedoes SCO's Unix IP claim
Come and get your Linux: SCO opens door to suing self?
MS blesses SCO, licenses Unix
SCO invokes RIAA in Linux jihad
SCO sues IBM for $1 billion for 'devaluing Unix'

Reducing security risks from open source software

More from The Register

next story
NO MORE ALL CAPS and other pleasures of Visual Studio 14
Unpicking a packed preview that breaks down ASP.NET
Cheer up, Nokia fans. It can start making mobes again in 18 months
The real winner of the Nokia sale is *drumroll* ... Nokia
Mozilla fixes CRITICAL security holes in Firefox, urges v31 upgrade
Misc memory hazards 'could be exploited' - and guess what, one's a Javascript vuln
Put down that Oracle database patch: It could cost $23,000 per CPU
On-by-default INMEMORY tech a boon for developers ... as long as they can afford it
Google shows off new Chrome OS look
Athena springs full-grown from Chromium project's head
Apple: We'll unleash OS X Yosemite beta on the MASSES on 24 July
Starting today, regular fanbois will be guinea pigs, it tells Reg
HIDDEN packet sniffer spy tech in MILLIONS of iPhones, iPads – expert
Don't panic though – Apple's backdoor is not wide open to all, guru tells us
prev story

Whitepapers

Top three mobile application threats
Prevent sensitive data leakage over insecure channels or stolen mobile devices.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.
Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Build a business case: developing custom apps
Learn how to maximize the value of custom applications by accelerating and simplifying their development.