Feeds

Small software firm wins $28.4m after lobbing sueball at LOCKHEED MARTIN

Unfair competition: Jury rules firm was shut out of F-16 fighter jet manual market

Reducing the cost and complexity of web vulnerability management

Titchy software company Command Technology has managed to win $24.8m in a settlement from the mighty Lockheed Martin for unfair competition.

In a David-and-Goliath story, Command sued Lockheed after being kept out of work making software for the 4,500 F-16 fighter jets that have been sold to US military and other countries.

A jury in the Circuit Court of Maryland for Montgomery County decided that Lockheed had competed unfairly and had injured Command, according to a verdict sheet seen by Reuters.

Lockheed said it was disappointed with the result.

"We believe that it will not stand after post-trial review by the circuit court or on appeal," spokesman Gordon Johndroe said.

Command developed electronic maintenance manuals for the F-16 jets, which Lockheed then said didn't pass tests for the US Air Force, the company said in its complaint. The jury also found Lockheed to have "tortiously interfered" with Command's "economic relationships".

Lockheed then went on to work with another software firm, InfoTrust Group, to develop its own rival product. InfoTrust is also being sued by Command and has launched its own suit against Lockheed.

Command said that Lockheed was trying to block its product from the F-16 market because Command threatens to topple the giant from its spot as the primary provider of maintenance for the the weapons it builds - a spot that brings in billions of dollars in associated sales.

The small software firm claimed that Lockheed and other weapons-makers were trying to restrict access to technical data for warplanes and other combat systems so they can charge the US Air Force and other military bodies for electronic access to the information.

It accused Lockheed of using its proprietary information, which it handed over to allow testing of its C2Web platform, to build its own platform. Command claimed that in its software, mechanics could choose any parts for a fix, while in the Lockheed system, people could only choose the aerospace giant's spare parts.

The company also claimed that Lockheed, BAE Systems and other suppliers had interfered with its platform and led other potential users to believe that the C2Web system couldn't be used for F-16s. ®

Security and trust: The backbone of doing business over the internet

More from The Register

next story
Phones 4u slips into administration after EE cuts ties with Brit mobe retailer
More than 5,500 jobs could be axed if rescue mission fails
JINGS! Microsoft Bing called Scots indyref RIGHT!
Redmond sporran metrics get one in the ten ring
Driving with an Apple Watch could land you with a £100 FINE
Bad news for tech-addicted fanbois behind the wheel
Murdoch to Europe: Inflict MORE PAIN on Google, please
'Platform for piracy' must be punished, or it'll kill us in FIVE YEARS
Phones 4u website DIES as wounded mobe retailer struggles to stay above water
Founder blames 'ruthless network partners' for implosion
Found inside ISIS terror chap's laptop: CELINE DION tunes
REPORT: Stash of terrorist material found in Syria Dell box
Sony says year's losses will be FOUR TIMES DEEPER than thought
Losses of more than $2 BILLION loom over troubled Japanese corp
prev story

Whitepapers

Providing a secure and efficient Helpdesk
A single remote control platform for user support is be key to providing an efficient helpdesk. Retain full control over the way in which screen and keystroke data is transmitted.
WIN a very cool portable ZX Spectrum
Win a one-off portable Spectrum built by legendary hardware hacker Ben Heck
Saudi Petroleum chooses Tegile storage solution
A storage solution that addresses company growth and performance for business-critical applications of caseware archive and search along with other key operational systems.
Protecting users from Firesheep and other Sidejacking attacks with SSL
Discussing the vulnerabilities inherent in Wi-Fi networks, and how using TLS/SSL for your entire site will assure security.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.