Feeds

eBay wanted to buy Craigslist, Whitman tells judge

Court showdown over board seat

High performance access to file storage

eBay wanted to buy Craigslist whole hog when it scooped up a minority stake in the classifieds website in 2004, former eBay chief executive Meg Whitman told a judge on Monday.

Whitman said the online tat house was looking to expand into new markets when it purchased a 28 per cent stake in the company from an early Craigslist executive. The deal made eBay the sole outside shareholder in Craigslist.

Whitman affirmed her former company's considerations of a takeover while on the witness stand in Delaware state court today according to Bloomberg, while making the case that Craigslist unfairly stripped eBay of a seat on its board.

"We were very interested in making an acquisition of Craigslist," Whitman is reported telling the judge. "We would have loved to buy the whole thing."

Whitman's testimony marked the beginning of a trial where the auction website alleges Craigslist's execs had conducted a series of secret deals to dilute eBay's shareholding from 28 per cent to 25 per cent, which was below the threshold to control a seat on the company board.

eBay's allegations caused Craigslist to file a counter lawsuit alleging that eBay used its board seat to take confidential information in order to launch its own classifieds website, Kijiji.

When eBay launched its Kijiji service in the US, Craigslist founder Craig Newmark and CEO Jim Buckmaster told the online auctioneer that it had effectively become a competitor and that they were no longer comfortable having eBay as a shareholder. It said the dilution was part of the company's anti-takeover defenses.

Whitman — who stepped down as eBay's CEO last year to run for governor of California under a Republican ticket — told the court that her former company made it clear from the start of talks that it was interested in owning the entire company.

eBay is suing to get its shareholder rights back. A victory in court could allow eBay to have a larger say in how Craigslist conducts its business. ®

High performance access to file storage

More from The Register

next story
Audio fans, prepare yourself for the Second Coming ... of Blu-ray
High Fidelity Pure Audio – is this what your ears have been waiting for?
Dropbox defends fantastically badly timed Condoleezza Rice appointment
'Nothing is going to change with Dr. Rice's appointment,' file sharer promises
Nokia offers 'voluntary retirement' to 6,000+ Indian employees
India's 'predictability and stability' cited as mobe-maker's tax payment deadline nears
Apple DOMINATES the Valley, rakes in more profit than Google, HP, Intel, Cisco COMBINED
Cook & Co. also pay more taxes than those four worthies PLUS eBay and Oracle
It may be ILLEGAL to run Heartbleed health checks – IT lawyer
Do the right thing, earn up to 10 years in clink
France bans managers from contacting workers outside business hours
«Email? Mais non ... il est plus tard que six heures du soir!»
Adrian Mole author Sue Townsend dies at 68
RIP Blighty's best-selling author of the 1980s
Zucker punched: Google gobbles Facebook-wooed Titan Aerospace
Up, up and away in my beautiful balloon flying broadband-bot
Analysts: Bright future for smartphones, tablets, wearables
There's plenty of good money to be made if you stay out of the PC market
prev story

Whitepapers

Mainstay ROI - Does application security pay?
In this whitepaper learn how you and your enterprise might benefit from better software security.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.