Feeds

Qualcomm fires DMCA shotgun at alleged code thieves on GitHub – including itself

Takedown notices issued to dozens of accounts

Boost IT visibility and business value

A company claiming to represent Qualcomm has shut down a number of repositories on source-code sharing site GitHub under provisions of the US Digital Millennium Copyright Act (DMCA) – including at least one repository belonging to Qualcomm itself.

In a letter published by GitHub this week, web intelligence outfit Cyveillance claims to have been authorized by Qualcomm to issue takedown notices to sites that unlawfully publish its copyrighted works – in this case, its source code.

"Cyveillance has recently discovered the unauthorized publication, disclosure, and copying of highly sensitive, confidential, trade secret, and copyright-protected documents on the below web site," the letter reads, referring to GitHub. "Specifically, we have confirmed that the documents whose locations and filenames identified below are confidential and proprietary to Qualcomm and were posted without Qualcomm's permission."

The letter goes on to list links to 116 files that Cyveillance claims are infringing, scattered across some 45 different GitHub accounts.

Judging by the filenames, however, it's hard to see how all of them could infringe Qualcomm IP, because they're all over the map. Some of them are C source code files, while others are written in C++, C#, Java, Objective-C, and even XML. One even appears to be a config file.

Even stranger, one of the repositories that has been flagged is "qcamain_open_hal_public," a source code tree belonging to GitHub user "qca" – otherwise known as Qualcomm Atheros, a division of the very company whose IP its source code is alleged to infringe.

Of course, it's possible that someone managed to sneak Qualcomm trade secrets into all of these documents, regardless of what language they were written in or who purports to own them. But there's no way to determine that now, because in keeping with its policy, GitHub has already taken down the repositories in question. Even if just one file was named in Cyveillance's letter, the whole repo has been made inaccessible.

Under the provisions of the DMCA, developers who feel their files have been wrongfully taken down can file a counter-notice with GitHub, asserting under penalty of perjury that their code is legit and non-infringing. At that point, if Qualcomm doesn't file a lawsuit within 14 business days or so, GitHub is free to reinstate the files.

Qualcomm has yet to respond to The Reg's request for clarification on the matter. ®

The essential guide to IT transformation

More from The Register

next story
Munich considers dumping Linux for ... GULP ... Windows!
Give a penguinista a hug, the Outlook's not good for open source's poster child
The Return of BSOD: Does ANYONE trust Microsoft patches?
Sysadmins, you're either fighting fires or seen as incompetents now
Intel's Raspberry Pi rival Galileo can now run Windows
Behold the Internet of Things. Wintel Things
Microsoft cries UNINSTALL in the wake of Blue Screens of Death™
Cache crash causes contained choloric calamity
Eat up Martha! Microsoft slings handwriting recog into OneNote on Android
Freehand input on non-Windows kit for the first time
Time to move away from Windows 7 ... whoa, whoa, who said anything about Windows 8?
Start migrating now to avoid another XPocalypse – Gartner
You'll find Yoda at the back of every IT conference
The piss always taking is he. Bastard the.
prev story

Whitepapers

5 things you didn’t know about cloud backup
IT departments are embracing cloud backup, but there’s a lot you need to know before choosing a service provider. Learn all the critical things you need to know.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Build a business case: developing custom apps
Learn how to maximize the value of custom applications by accelerating and simplifying their development.
Rethinking backup and recovery in the modern data center
Combining intelligence, operational analytics, and automation to enable efficient, data-driven IT organizations using the HP ABR approach.
Next gen security for virtualised datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.