Feeds

Microsoft's dirty tricks archive vanishes

What don't they want us to see?

Designing a Defense for Mobile Applications

Last week Microsoft settled its only outstanding anti-trust case, a class action lawsuit brought in Iowa.

Comes vs Microsoft was resolved seven weeks into trial, and the terms of the settlement will not be revealed until April.

However, the settlement has already had one fortunate outcome for Redmond. The plaintiffs' evidence, which constitutes the largest and most comprehensive archive of Microsoft's dirty tricks ever amassed, has disappeared from the web.

Plaintiffs maintained a website at iowaconsumercase.org, which included daily media updates, full transcripts of the previous day's proceedings, and an archive of some 2,000 exhibits of alleged misdeeds going back to the 1980s.

The website is now password-protected. Microsoft's own archive of exhibits and transcripts has similarly disappeared. Microsoft maintains a comprehensive record of its antitrust proceedings, making Comes a notable absence.

One of the centerpieces of the Iowa class action lawsuit is Microsoft's anti-competitive tactics against DR-DOS and Novell. Caldera, which acquired the rights to DR-DOS in lawsuit in 1996 and filed suit against Microsoft the same year, and settled in early 2000 before trial began.

Readers will recall how 937 boxes of material from the Caldera lawsuit were destroyed in 2003 - apparently at the request of SCO.

Neither of the press contacts for the Iowa Case had returned our calls at time of writing; the office number for media enquiries in the case has been delisted.

Parts of the evidence are still available via Google's cache, however the crawler reached only a small fraction, around 10 per cent, of the exhibits in the Iowa archive, and Google's notoriously sloppy OCR software is so poor that the HTML version is barely comprehensible, as this sample illustrates:

From bmdsl Fd Jul 26 17:03:21 1991

To: Subj.:

Re: : rller rs n d tinbg

Dam: Ffi, 26 Jul 91 17::18 PDT

¯ e d 5 upgde at for 34 of the yo le 11 ugh d you ’t d ti on e agen for it? weird. we’w alry pruc dumenat discuo compitive sidoa th ibm d dfi. d your ple have alrody n v iL eye.one ows tt fa fa wor ber th -

> From OUO Fd lul 15:49:26 1991

To: b Da: Ffi lul 26 15:49:24

ID1 o ag1 jam pack.

I have Mth or wiout sion. at w n is a wMte paper at expls gong agait th M DOS d DR DOS.

If w, fred time at e NSM, I would happy m get you the agent.

Not very useful to scholars, lawyers or anyone else. ®

Bootnote:  Microsoft's eagerness to destroy evidence in the Burst case, suggests Mark ("Robert X Cringely") Stephens, [pt1 - pt2] could lead to perjury prosecutions. As he recounts here, while Redmond lawyers were protesting that they couldn't find deleted emails requested by the court, the emails were sitting in boxes on campus. Oops. ®

Securing Web Applications Made Simple and Scalable

More from The Register

next story
You! Pirate! Stop pirating, or we shall admonish you politely. Repeatedly, if necessary
And we shall go about telling people you smell. No, not really
Major problems beset UK ISP filth filters: But it's OK, nobody uses them
It's almost as though pr0n was actually rather popular
UK Parliament rubber-stamps EMERGENCY data grab 'n' keep bill
Just 49 MPs oppose Drip's rushed timetable
MPs wave through Blighty's 'EMERGENCY' surveillance laws
Only 49 politcos voted against DRIP bill
EU's top data cops to meet Google, Microsoft et al over 'right to be forgotten'
Plan to hammer out 'coherent' guidelines. Good luck chaps!
US judge: YES, cops or feds so can slurp an ENTIRE Gmail account
Crooks don't have folders labelled 'drug records', opines NY beak
Delaware pair nabbed for getting saucy atop Mexican eatery
Burrito meets soft taco in alleged rooftop romp outrage
prev story

Whitepapers

Reducing security risks from open source software
Follow a few strategies and your organization can gain the full benefits of open source and the cloud without compromising the security of your applications.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.
Application security programs and practises
Follow a few strategies and your organization can gain the full benefits of open source and the cloud without compromising the security of your applications.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.
Consolidation: the foundation for IT and business transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.