This document hosted at http://sco.iwethey.org/, comprehensive information on the Caldera/SCO vs. IBM case


Brent O. Hatch (5715)
Mark F. James (5295)
HATCH, JAMES & DODGE, P.C.
10 West Broadway, Suite 400
Salt Lake City
, Utah  84101
Telephone:  (801) 363-6363

Facsimile:  (801) 363-6666

David Boies
BOIES, SCHILLER & FLEXNER LLP
333 Main Street
Armonk, New York 10504
Telephone:  (914) 749-8200
Facsimile:  (914) 749-8300

Stephen N. Zack
Mark J. Heise
BOIES, SCHILLER & FLEXNER LLP
100 Southeast Second Street
Suite 2800
Miami, Florida  33131
Telephone:  (305) 539-8400
Facsimile:  (305) 539-1307

 Attorneys for Plaintiff The SCO Group, Inc.

______________________________________________________________________________

IN THE UNITED STATES DISTRICT COURT

DISTRICT OF UTAH

______________________________________________________________________________

THE SCO GROUP, INC.,

a Delaware corporation,

Plaintiff,

vs.

INTERNATIONAL BUSINESS MACHINES CORPORATION, a New York corporation,

Defendant.

AMENDED COMPLAINT

(Jury Trial Demanded)

Case No. 03-CV-0294

Hon: Dale A. Kimball

_______________________________________________________________________________

Plaintiff, The SCO Group, Inc., a Delaware corporation, f/k/a Caldera Systems, Inc. (“SCO”), sues Defendant International Business Machines Corporation (“IBM”) and alleges as follows:

Nature of This Action

1.      UNIX is a computer operating system program and related software originally developed by AT&T Bell Laboratories (“AT&T”). UNIX is widely used in the corporate, or “enterprise,” computing environment.

2.      Through a series of corporate acquisitions, SCO presently owns all right, title and interest in and to UNIX and UnixWare operating system source code, software and sublicensing agreements, together with copyrights, additional licensing rights in and to UNIX and UnixWare, and claims against all parties breaching such agreements.  Through agreements with UNIX vendors, SCO controls the right of all UNIX vendors to use and distribute UNIX.  These restrictions on the use and distribution of UNIX are designed to protect the economic value of UNIX.

3.      A variant or clone of UNIX currently exists in the computer marketplace called “Linux.”  Linux is, in material part, based upon UNIX source code and methods, particularly as related to enterprise computing methods found in Linux 2.4.x releases and the current development kernel, Linux 2.5.x.  Significantly, Linux is distributed without a licensing fee and without proprietary rights of ownership or confidentiality.

4.      The UNIX software distribution vendors, such as IBM, are contractually and legally prohibited from giving away or disclosing proprietary UNIX source code and methods for external business purposes, such as contributions to the Linux community or otherwise using UNIX for the benefit of others.  This prohibition extends to derivative work products that are modifications of, or based on, UNIX System V source code or technology.    IBM and certain other UNIX software distributors are violating this prohibition, en masse, as though no prohibition or proprietary restrictions exist at all with respect to the UNIX technology.  As a result of IBM’s wholesale disregard of its contractual and legal obligations to SCO, Linux 2.4.x and the development Linux kernel, 2.5.x, are filled with UNIX source code, derivative works and methods.  As such, Linux 2.4.x and Linux 2.5.x are unauthorized derivatives of UNIX System V.  

5.      As set forth in more detail below, IBM has breached its obligations to SCO, induced and encouraged others to breach their obligations to SCO, interfered with SCO’s business, and engaged in unfair competition with SCO, including by:

a)       misusing UNIX software licensed by SCO to IBM and Sequent;

b)      inducing, encouraging, and enabling others to misuse and misappropriate SCO’s proprietary software; and

c)       incorporating (and inducing, encouraging, and enabling others to incorporate) SCO’s proprietary software into Linux open source software offerings.

6.      As a result of these breaches, SCO sent a notice of termination to Mr. Sam Palmisano, the Chief Executive Officer of IBM on March 6, 2003. The termination notice specified that, pursuant to SCO’s contractual rights under controlling agreements, IBM’s right to use or distribute any software product based on UNIX System V technology, including its own version of UNIX known as “AIX,” would be terminated on June 13, 2003, unless such breaches were reasonably cured prior to that time.

7.      The termination notice was based, in part, on IBM’s self-proclaimed contributions of AIX source code to Linux, and use of UNIX/AIX methods for accelerating the development of Linux in contravention of IBM’s contractual obligations to SCO. 

8.      Pursuant to its rights under the controlling agreements, IBM was entitled to 100 days to cure its underlying contractual breaches, provided it was willing and able to do so.  Both parties were contractually required to “exert their mutual good faith best efforts to resolve any alleged breach short of termination.” 

9.      To that end, SCO did everything reasonably in its power to exert a good faith effort to resolve the termination of IBM’s UNIX contract rights.  Conversely, during the 100-day period, IBM did not set forth a single proposal or idea for cure.

10.  SCO has therefore terminated IBM’s right to use any part of the UNIX System V source code, including its derivative AIX, effective as of June 13, 2003 (the “AIX Termination Date”). 

11.  As of the AIX Termination Date, IBM is contractually obligated to discontinue use of and return or destroy any and all copies of the Software Products defined in the controlling agreements, which include UNIX System V source code and all its derivatives, including AIX. 

Parties, Jurisdiction and Venue

12.  Plaintiff SCO is a Delaware corporation with its principal place of business in Utah County, State of Utah.

13.  Defendant IBM is a New York corporation with its principal place of business in the State of New York.

14.  Sequent Computer Systems, Inc. (“Sequent”) was formerly an Oregon corporation that contracted with SCO’s predecessor in interest, AT&T.  Sequent was subsequently merged into IBM in a stock transaction.

15.  This Court has subject matter jurisdiction pursuant to 28 U.S.C. §1332 in that diversity of citizenship exists between the parties and the amount in controversy exceeds $75,000, exclusive of interest and costs.

16.  This Court has in personam jurisdiction over IBM pursuant to Utah Code Ann. §78-27-24 on the bases that IBM is (a) transacting business within this State, (b) contracting to provide goods and services within this State and (c) causing tortious injury and breach of contract within this State.

17.  Venue is properly situated in this District pursuant to 28 U.S.C. §1391 in that IBM maintains a general business office in this District and a substantial part of the events giving rise to the claims alleged herein occurred in this District.

Background Facts

The UNIX Operating System

18.  UNIX is a computer software operating system.  Operating systems serve as the link between computer hardware and the various software programs (“applications”) that run on the computer.  Operating systems allow multiple software programs to run at the same time and generally function as a “traffic control” system for the different software programs that run on a computer. 

19.  By way of example, in the personal computing market, Microsoft Windows is the best-known operating system.  The Windows operating system was designed to operate on computer processors (“chips”) built by Intel.  Thus, Windows serves as the link between Intel-based processors and the various software applications that run on personal computers.

20.  In the business computing environment for the Fortune 1000 and other large corporations (often called the “enterprise” environment), UNIX is widely used. 

21.  The UNIX operating system was originally built by Dennis Ritchie, Ken Thompson and other software engineers at AT&T Bell Laboratories.  After successful in-house use of the UNIX software, AT&T began to license UNIX as a commercial product for use in enterprise applications by other large companies.

22.  Over the years, AT&T Technologies, Inc., a wholly owned subsidiary of AT&T, and its related companies licensed UNIX for widespread enterprise use.  IBM, Hewlett-Packard, Inc. (“HP”), Sun Microsystems, Inc. (“Sun”), Silicon Graphics, Inc. (“SGI”) and Sequent became some of the principal United States-based UNIX licensees, among many others.

23.  IBM, HP, Sun, SGI and the other major UNIX vendors each modified UNIX to operate on their own processors.  Thus, for example, the operating system known as “HP-UX” is HP’s version of UNIX.  HP-UX is a modification of and derivative work based on UNIX System V source code. 

24.  Similarly, the operating system known as Solaris is Sun’s version of UNIX.  Solaris is a modification of, and derivative work based on, UNIX System V source code.  

25.  SGI’s UNIX-based operating system is known as “IRIX.”  IRIX is a modification of, and derivative work based on, UNIX System V source code.

26.  IBM’s UNIX-based operating system is known as “AIX.”  AIX is a modification of, and derivative work based on, UNIX System V source code.  

27.  Sequent’s UNIX-based operating system is known as “DYNIX/ptx.”  DYNIX/ptx is a modification of, and derivative work based on, UNIX System V source code.    

28.  The various identified versions of UNIX are sometimes referred to as UNIX “flavors.”  All commercial UNIX “flavors” in use today are modifications of and derivative works based on the UNIX System V Technology (“System V Technology”).  Were it not for UNIX System V, there would be no UNIX technology or derivative works available for IBM and others to copy into Linux.

29.  SCO is the sole and exclusive owner of all Software and Sublicensing Agreements that control use, distribution and sublicensing of UNIX System V and all modifications thereof and derivative works based thereon.  SCO is also the sole and exclusive owner of copyrights related to UNIX System V source code and documentation and peripheral code and systems related thereto. 

30.  During the 1990s the enterprise computing market for high-performance workstation computers came to be dominated by UNIX and the primary UNIX vendors identified above, each supplying its own version of the UNIX operating system based on UNIX System V Technology.  UNIX became synonymous with “workstation” computers that typically operated on a RISC processing platform.  

31.  The RISC processing platform provides high-power computing capabilities at a relatively higher price for “workstation” computing.  The alternative to “workstation” computing is commonly known as “desktop” computing on personal computers.  The operating system market for “desktop” personal computers is dominated by Microsoft Corporation and its various Windows-based operating system products.  The reason for this distinction is that most desktop computers (PC’s) are designed to operate on Intel and Intel-compatible computing platforms.  Most workstations are designed to operate on variants of RISC processing platforms and RISC-compatible computing platforms.  PC systems and RISC systems are not compatible with each other.  Thus, most versions of UNIX will not operate on Intel-based PC’s for desktop computing; and Windows will not operate on RISC-based workstations for enterprise computing.

32.   Most of the primary UNIX vendors identified above did not attempt to develop a UNIX “flavor” to operate on an Intel-based processor chip set.  This is because the earlier Intel processors were considered to have inadequate processing power for use in the more demanding enterprise market applications.

SCO’s Creation of a Market for Intel – The Genesis of SCO OpenServer

33.  As computers grew in popularity to perform business functions, the processing power of Intel-based processor chips also began to increase dramatically.  Consistent with Intel founder Gordon Moore’s prediction, computer chips remained inexpensive while exponentially increasing in power and performance. 

34.  Seeing this emerging trend, it became evident to SCO that Intel chips would gradually gain widespread acceptance for use in the enterprise marketplace.

35.  Therefore, while other major UNIX vendors modified UNIX for their own respective RISC-based computing platforms, SCO developed and licensed the UNIX-based operating system for Intel-based processors for enterprise use that is now known as “SCO OpenServer.”

36.  SCO’s early engineers faced difficult design challenges in modifying UNIX for effective use on an Intel processing platform.  The principal design constraint centered around the limited processing power the Intel chip possessed in the early 1980’s.  The Intel chip (designed as it was for personal computers) was not nearly as powerful as the enterprise chips used by IBM, Sun, SGI and others in their respective UNIX offerings. 

37.  Based on the early design constraint of Intel’s limited processing power, SCO found an appropriate enterprise market niche for the early versions of SCO OpenServer—single-purpose applications such as point-of-sale control, inventory control and transactions processing, with the highest possible reliability.  Intel processors were fully capable of performing these relatively simple, repetitive tasks, and could do so at a lower cost and as reliably as the more powerful enterprise processing platforms sold by the other UNIX vendors, such as Sun and IBM.

38.  One example of a customer well suited to the earlier version of SCO OpenServer software is McDonald’s Corp.  McDonald’s has thousands of stores worldwide and needs all stores to operate on an integrated computing platform for ease of use, immediate access to information and uniformity.  However, the actual computing requirements for each individual McDonald’s location are functionally simple—sales need to be tracked and recorded, and inventory functions need to be linked to sales.  SCO OpenServer reliably fulfills McDonald’s computing requirements at reduced cost.

39.  SCO’s business model for SCO OpenServer provides enterprise customers the reliability, extensibility (ease of adding or changing functionality), scalability (ease of adding processors or servers to increase processing power) and security of UNIX—but on inexpensive Intel processor chips.  This combination allowed customers to perform an extremely high number of transactions and, at the same time, gather and present the information from those transactions in an economical and useful way for enterprise decision makers.

40.  The simplicity and power of this “UNIX on Intel” business model helped SCO grow rapidly.  SCO gained other large enterprise customers such as CitiGroup, K-Mart, Cendant, Target Stores, Texas Instruments, Walgreens, Merck, Sherwin Williams, Radio Shack, Auto Zone, British Petroleum, Papa John’s Pizza, Costco and many others. 

41.  As Intel’s prominence grew in the enterprise computing market, SCO’s early version of OpenServer also grew into the operating system of choice for enterprise customers who wanted an Intel-based computing solution for a high volume of repetitive, simple computing transactions.

42.  SCO OpenServer is based on the original UNIX Software Code developed by AT&T, but was modified by SCO for the functionality described above.  Thus, while performing single-function applications, SCO OpenServer did so, and continues to do so, with the 99.999% reliability of UNIX.

43.  Over 4,000 separate applications have been written by developers around the world specifically for SCO OpenServer.  Most of these applications are vertical applications for targeted functions, such as point-of-sale control for specific industries, inventory control for specific industries, and related functions.

The SCO OpenServer Libraries

44.  Much of the functionality of an operating system is made available to application developers by means of “libraries” of code that are supplied by the operating system vendor. These libraries contain many “functions” or “routines” which can be used by application developers to perform various common tasks such as reading or writing a file or opening a new window on the screen.

45.  SCO OpenServer, as with many other operating systems such as Microsoft Windows, makes use of a special kind of library called a “shared library.”  The code for all of the routines in a particular shared library is stored in a separate file, and this code is loaded into memory “on demand” when an application needs to make use of it.  There are several benefits that come from using “shared libraries” - applications can be smaller and use less memory because a single copy of the library code is “shared” by all of the applications that make use of it, and system vendors can easily update the library code in order to fix problems or provide enhanced functionality.  A side effect of this is that it is also very easy to make a copy of a shared library.

46.  In creating the thousands of SCO OpenServer Applications, each designed for a specialized function in a vertical industry, software developers wrote software code which specifically made use of the SCO OpenServer shared libraries (hereinafter the “SCO OpenServer Shared Libraries”), and thus the presence of the SCO OpenServer Shared Libraries on a particular system is required in order for these applications to be able to run and function correctly.

47.  Linux offers a “SCO emulation module,” originally called “iBCS” and now known as “linux-abi” which enables applications which were originally developed to run on SCO OpenServer to be run on Linux.  However, in order for these applications to function, the SCO OpenServer Shared Libraries must also be copied onto the Linux system.  The SCO OpenServer Shared Libraries are the proprietary and confidential property of SCO.  SCO OpenServer has been licensed to numerous customers subject to restrictions on use that prohibit unauthorized use of any of its software code, including without limitation, the SCO OpenServer Shared Libraries.  SCO does not give permission for copying of the Shared Libraries for use outside OpenServer without payment of separate licensing fees.

SCO’s Development of UnixWare on Intel

48.  While the original SCO OpenServer operating system performs with all the reliability and dependability of other UNIX systems, it was originally designed for the initially low processing power of Intel chips.  Therefore, SCO OpenServer does not offer the same level of multiprocessor capabilities that other versions of UNIX offer.

49.  During or about 1992, SCO’s predecessor in interest, Novell, Inc. (“Novell”), acquired from AT&T all right, title and interest in and to the UNIX software code, the AT&T Software and Sublicensing Agreements, the copyrights and related and ancillary products for $750 million in Novell stock.  For branding purposes, Novell renamed UNIX as “UnixWare.”

50.  On or about September 19, 1995 the Santa Cruz Operation acquired all right, title and interest in and to UNIX and UnixWare source code, the AT&T Software and Sublicensing Agreements, the copyrights, claims arising after the closing date against any party and all related and ancillary products and rights from Novell, excepting only the right to certain existing ongoing royalty payments which was retained by Novell.

51.  From and after September 1995, SCO dedicated significant amounts of funding and a large number of UNIX software engineers, many of whom were original AT&T UNIX software engineers, to upgrade UnixWare for high-performance computing on Intel processors. 

52.  By approximately 1998, SCO had completed the majority of this task.  That is to say, UnixWare had largely been modified, tested and “enterprise hardened” to use Intel-based processors in direct competition against IBM and Power PC chips, the Sun SPARC chip and all other high-performance computing UNIX platforms for all complex computing demands.  The term “enterprise hardened” means to assure that a software product is fully capable of performing under the rigorous demands of enterprise use.

53.  SCO was ready to offer large enterprise customers a high-end UNIX computing platform based on inexpensive Intel processors.  Given the rapid growth of Intel’s performance capabilities and Intel’s popularity in the marketplace, SCO found itself in a highly desirable market position.  In addition, SCO still had its SCO OpenServer business for retail and inventory-targeted functions, with its 4,000 applications in support. 

54.  Prior to the events complained of in this action, SCO was the undisputed global leader in the design and distribution of UNIX-based operating systems on Intel-based processing platforms. 

Project Monterey

55.  As SCO was poised and ready to expand its market and market share for UnixWare targeted to high-performance enterprise customers, IBM approached SCO to jointly develop a 64-bit UNIX-based operating system for a new 64-bit Intel platform.  This joint development effort was widely known as Project Monterey. 

56.  Prior to this time, IBM had not developed any expertise to run UNIX on an Intel processor and instead was confined to its Power PC processor.

57.  SCO, on the other hand, had over 15 years of expertise in adapting UNIX to Intel based systems.  Moreover, SCO had spent the previous 18 months working closely with Intel to adapt its existing UnixWare product to work on the new 64-bit Intel processor. That project, known as "Gemini-64," was well underway when work on Project Monterey was started.  In furtherance of, and in reliance on, IBM’s commitment to Project Monterey, SCO ceased work on the Gemini-64 Project and expended substantial amounts of money and dedicated a significant portion of SCO's development team to Project Monterey.  Specifically, plaintiff and plaintiff’s predecessor provided IBM engineers with valuable information and trade secrets with respect to architecture, schematics, and design of UnixWare and the UNIX source code for both 32- and 64-bit Intel-based processors.

58.  By about May 2001, all technical aspects of Project Monterey had been substantially completed.  The only remaining tasks of Project Monterey involved marketing and branding tasks to be performed substantially by IBM.

59.  On or about May 2001, IBM notified plaintiff that it refused to proceed with Project Monterey, and that IBM considered Project Monterey to be “dead.” 

The AT&T UNIX Agreements

60.  AT&T Technologies originally licensed the UNIX operating system software code to hundreds of software licensees, including defendant IBM, for the UNIX operating system software source code, object code and related schematics, documentation and derivative works (collectively, the “UNIX Source Code”).  To protect the confidential and proprietary source code information, these license agreements, as detailed below, contained strict limitations on use and distribution of UNIX source and binary code.

61.  When SCO acquired the UNIX assets from Novell in 1995, it acquired all right, title and interest in and to the UNIX operating system technology, including all claims against any parties relating to any right, property or asset used in the business of developing UNIX and UnixWare.  As a result of this acquisition, SCO became the authorized successor in interest to the original position of AT&T Technologies with respect to all licensed UNIX software products.

62.  There are two primary types of software licensing agreements between AT&T Technologies and its various licensees:

a)      The AT&T-related software agreements are collectively referred to hereinafter as the “AT&T UNIX Software Agreements.” 

b)            The AT&T-related sublicensing agreements are collectively referred to hereinafter as the “AT&T UNIX Sublicensing Agreements.” 

The AT&T UNIX Software Agreements and the AT&T UNIX Sublicensing Agreements are sometimes collectively referred to hereinafter as the “AT&T UNIX Agreements.”

63.  Plaintiff is successor in interest to, and owner of, all contractual rights arising from and related to the AT&T UNIX Agreements.

The IBM Related Agreements

64.  On February 1, 1985, AT&T and IBM entered into certain AT&T UNIX Agreements:

a)  Software Agreement Number Soft-00015 (“AT&T / IBM Software Agreement” attached hereto and incorporated herein as Exhibit A);

b) Sublicensing Agreement Number Sub-00015A (“AT&T / IBM Sublicensing Agreement” attached hereto and incorporated herein as Exhibit B).

65.  AT&T and IBM have entered into a side letter on that date  (“AT&T / IBM Side Letter” attached hereto and incorporated herein as Exhibit C).

66.  In addition, AT&T and IBM have entered into nearly 400 supplemental agreements over the years, including Supplement No. 170  (Supplement No. 170 is attached hereto and incorporated herein as Exhibit D).  Supplement No. 170 is the document that specifies the royalty amounts and computer CPUs upon which royalty amounts were due to be paid by IBM. 

67.  Thereafter, Amendment X to Software Agreement SOFT-00015, as amended, was executed on or about October 16, 1996 by and among IBM, The Santa Cruz Operation, Inc. (“SCO”) and Novell, Inc. (“IBM Amendment X” attached hereto and incorporated herein as Exhibit E).  Among other things, Amendment X effectuated a royalty buy-out by IBM pursuant to the royalty terms and amounts specified in Supplement No. 170. 

68.  Collectively these agreements, side letter and amendment are referred to hereinafter as the “IBM Related Agreements.”

The Sequent Agreements

69.  On January 28, 1986, AT&T and Sequent (now an operating division of IBM) entered into certain AT&T UNIX Agreements:

a)  Software Agreement Number SOFT-000321 (“Sequent Software Agreement” attached hereto and incorporated herein as Exhibit F);

b) Sublicensing Agreement Number SUB-000321A (“Sequent Sublicensing Agreement” attached hereto and incorporated herein as Exhibit G).

70.  The Sequent Software Agreement and the Sequent Sublicensing Agreement are sometimes collectively referred to hereinafter as the “Sequent Agreements.”

Marketplace Value of UNIX

71.  UNIX’s value in the enterprise marketplace is largely a function of its reliability, extensibility, and robust performance capability.  That is to say, it virtually never needs repair, it performs well under a wide variety of adverse circumstances, and it can be extended throughout an enterprise and across multiple processors to perform unified or disparate tasks in a seamless computing environment.  Because of these features, UNIX-based equipment has replaced mainframe computers for all but the most demanding computing tasks.  And, because UNIX-based equipment is far cheaper than mainframe computing equipment, a customer who cannot otherwise justify the cost of mainframe computers can otherwise gain the advantages of “supercomputing” operations through use of UNIX-based equipment.

72.  One or more of the different versions of UNIX-based operating systems sold by Sun, IBM, SCO, SGI, and others, is the operating system of choice for large enterprise computing operations in virtually 100% of the Fortune 1000 companies. 

73.  UNIX gained this prominence in the computing marketplace because of twenty years of development and over one billion dollars invested by plaintiff and its predecessors to create a stable, reliable operating system to perform the mission critical work required by large enterprises.

74.  The recent rise of the global technology economy has been powered in large part by UNIX.  Virtually every mission critical financial application in the world is powered by UNIX, including electronic transfers of funds.  Real time stock trades are powered by UNIX.  Inventory controls and distributions are powered by UNIX.  All major power grids and all major telecommunications systems are powered by UNIX.  Many satellite control and defense control systems are powered by UNIX.  Virtually every large corporation in the world currently operates part or all of its information technology systems on a UNIX operating system. 

75.  Based on its value in the marketplace, UNIX has become the most widely used and widely accepted operating system for enterprise, institutional and manufacturing applications throughout the world.

Linux

76.  Linux, or “GNU/Linux,” is an operating system variant or clone of UNIX System V Technology.  According to leaders within the Linux community, Linux is not just a “clone,” but is intended to be a successor to UNIX System V.  Linux, unlike UNIX, is distributed without a fee to its users.

77.  As long as the Linux development process lacked central coordination, its direction was primarily aimed at meeting the computing needs of the Linux programmers themselves.  As such, it posed little or no practical threat to SCO or to other UNIX vendors since the Linux developers did not have access to sophisticated high-end enterprise class multiprocessor systems, nor did they have any particular interest in supporting such systems.

78.  The entire direction of Linux development changed with IBM’s entry into the open source community and its concerted efforts to control the community for its own economic benefit.

79.  In furtherance of its plan to destroy its UNIX competitors, IBM has announced its intention to make Linux, distributed to end users without a fee, the successor to all existing UNIX operating systems used by Fortune 1000 companies and other large companies in the enterprise computing market.

80.  However, as IBM executives know, a significant flaw of Linux is the inability and/or unwillingness of the Linux process manager, Linus Torvalds, to identify the intellectual property origins of contributed source code that comes in from those many different software developers.  If source code is code copied from protected UNIX code, there is no way for Linus Torvalds to identify that fact.

81.  As a result, a very significant amount of UNIX protected code is currently found in Linux 2.4.x and Linux 2.5.x releases in violation of SCO’s contractual rights and copyrights.

The Functional Limitations of Linux Before IBM’s Involvement

82.  The first versions of Linux evolved through bits and pieces of various contributions by numerous software developers using single processor computers.  Virtually none of these software developers and hobbyists had access to enterprise-scale equipment and testing facilities for Linux development.  Without access to such equipment, facilities and knowledge of sophisticated development methods learned in many years of UNIX development it would be difficult, if not impossible, for the Linux development community to create a grade of Linux adequate for enterprise use.

83.  As long as the Linux development process remained uncoordinated and random, it posed little or no practical threat to SCO or to other UNIX vendors since the original Linux developers did not have access to multiprocessor code or multi-processor development methods needed to achieve high-end enterprise functionality.

84.  To make Linux of necessary quality for use by enterprise customers, it needed to be re-designed and upgraded to accommodate complex multi-processor functionality that has taken UNIX nearly 20 years to achieve.  This re-design is not technologically feasible or even possible at the enterprise level without (a) a high degree of design coordination, (b) access to expensive and sophisticated design and testing equipment; (c) access to UNIX code and development methods; (d) UNIX architectural experience; and (e) a very significant financial investment.

IBM’s Scheme

85.  As market awareness of Linux evolved, IBM initiated a course of conduct with the purpose and effect of using Linux to unfairly compete in the enterprise market.  At that point in time, four important events were occurring simultaneously in the enterprise software computing marketplace: 

a)Intel chips were becoming widely demanded by enterprise customers since Intel’s processing power had increased and its cost had remained low;

b)      SCO’s market power in the enterprise marketplace was increasing based on the combined capabilities of SCO OpenServer, SCO UnixWare and SCO’s unique position as UNIX on Intel;

a)      Free Linux had carved a niche in not-for-profit and non-business uses; and

b)      IBM was in the process of evolving its business model from products to services.

86.  In the process of moving from product offerings to services offerings, IBM dramatically increased its staff of systems integrators to 120,000 strong under the marketing brand “IBM Global Services.”  By contrast, IBM’s largest historic competitor as a seller of UNIX software, Sun Microsystems, has a staff of approximately 12,000 systems integrators.  With ten times more services-related personnel than its largest competitor, IBM sought to move the corporate enterprise computing market to a services model based on free software on Intel processors. 

87.  By making the Linux operating system free to end users, IBM could undermine and destroy the ability of any of its competitors to charge a fee for distribution of UNIX software in the enterprise market.  Thus, IBM, with its army of Global Services integrators who earn money by selling services, would gain a tremendous advantage over all its competitors who earn money by selling UNIX licenses.

88.  To accomplish the end of transforming the enterprise software market to a services-driven market, IBM set about to deliberately and improperly destroy the economic value of UNIX and particularly the economic value of UNIX on Intel-based processors. 

89.  Among other actions, IBM misappropriated the confidential and proprietary information from SCO in Project Monterey.  IBM thereafter misused its access to the UNIX source code.

90.  On or about August 17, 2000, IBM and Red Hat Inc. issued a joint press release through M2 Presswire announcing, inter alia, as follows:

IBM today announced a global agreement that enables Red Hat, Inc. to bundle IBM’s Linux-based software. 

IBM said it would contribute more than 100 printer drivers to the open source community.  With these announcements, IBM is making it easier for customers to deploy e-business applications on Linux using a growing selection of hardware and software to meet their needs.  The announcements are the latest initiative in IBM’s continuing strategy to embrace Linux across its entire product and services portfolio.

Helping build the open standard, IBM has been working closely with the open source community, contributing technologies and resources.

91.  Thereafter, on December 20, 2000, IBM Vice President Robert LeBlanc disclosed IBM’s improper use of confidential and proprietary information learned from Project Monterey to bolster Linux as part of IBM’s long term vision, stating:

Project Monterey was actually started before Linux did.  When we started the push to Monterey, the notion was to have one common OS for several architectures.  The notion actually came through with Linux, which was open source and supported all hardware.  We continued with Monterey as an extension of AIX [IBM UNIX] to support high-end hardware.  AIX 5 has the best of Monterey.  Linux cannot fill that need today, but over time we believe it will.  To help out we’re making contributions to the open source movement like the journal file system.  We can’t tell our customers to wait for Linux to grow up. 

If Linux had all of the capabilities of AIX, where we could put the AIX code at runtime on top of Linux, then we would.

Right now the Linux kernel does not support all the capabilities of AIX.  We’ve been working on AIX for 20 years.  Linux is still young. We’re helping Linux kernel up to that level.  We understand where the kernel is.  We have a lot of people working now as part of the kernel team.  At the end of the day, the customer makes the choice, whether we write for AIX or for Linux.

We’re willing to open source any part of AIX that the Linux community considers valuable.  We have open-sourced the journal file system, print driver for the Omniprint.  AIX is 1.5 million lines of code.  If we dump that on the open source community then are people going to understand it?  You’re better off taking bits and pieces and the expertise that we bring along with it.  We have made a conscious decision to keep contributing. 

92.  IBM, however, was not and is not in a position legally to “open source any part of AIX that the Linux community considers valuable.”  Rather, IBM is obligated not to open source AIX because it contains SCO’s confidential and proprietary UNIX source code, derivative works and methods.  

93.  Over time, IBM made a very substantial financial commitment to improperly put SCO’s confidential and proprietary information into Linux, the free operating system.  On or about May 21, 2001 IBM Vice President Richard Michos, stated in an interview to Independent Newspapers, New Zealand, inter alia:

IBM will put US $1 billion this year into Linux, the free operating system.

IBM wants to be part of the community that makes Linux successful.  It has a development team that works on improvements to the Linux kernel, or source code.  This includes programmers who work in the company’s Linux technology center, working on making the company’s technology Linux-compatible.

That team of IBM programmers is improperly extracting and using SCO’s UNIX technology from the same building that was previously the UNIX Technology Center.  

94.  In a news article issued by e-Business Developer on or about August 10, 2001, the following conduct was attributed to IBM regarding participation in the open source software movement:

Another example is when IBM realized that the open-source operating system (OS) Linux provided an economical and reliable OS for its various hardware platforms. However, IBM needed to make changes to the source to use it on its full range of product offerings.

IBM received help from the open-source community with these changes and in return, released parts of its AIX OS to open source.  IBM then sold its mainframes running Linux to Banco Mercantile and Telia Telecommunications, replacing 30 Windows NT boxes and 70 Sun boxes respectively - obviously a win for IBM, which reduced its cost of maintaining a proprietary OS while increasing its developer base.  IBM's AIX contributions were integrated into the standard Linux source tree, a win for open source.

95.  Again, “IBM’s AIX contributions” consisted of the improper extraction, use, and dissemination of SCO’S UNIX source code, derivative works and methods.

96.  In a news article issued by IDC on or about August 14, 2001, the following was reported:

IBM continued its vocal support of the Linux operating system Tuesday, saying the company will gladly drop its own version of UNIX from servers and replace it with Linux if the software matures so that it can handle the most demanding tasks.

IBM executives speaking here at the company's solutions developer conference outlined reasons for the company's Linux support, pointing to features in the operating system that could push it past UNIX for back-end computing. While they admit that Linux still has a way to go before it can compete with the functions available on many flavors of UNIX, IBM officials said that Linux could prove more cost-effective and be a more user-friendly way to manage servers.

We are happy and comfortable with the idea that Linux can become the successor, not just for AIX, but for all UNIX operating systems, said Steve Mills, senior vice president and group executive of the IBM Software Group, during a news conference.

97.  Continuing with its “happy and comfortable” idea that Linux succeeds at the expense of UNIX, on or about January 23, 2003, IBM executive Steve Mills gave a keynote speech at LinuxWorld, a trade show, which was reported by Computer Reseller News, IBM’s Mills: Linux Will be on Par with UNIX in No Time, January 23, 2003, inter alia, as follows:

IBM will exploit its expertise in AIX to bring Linux up to par with UNIX, an IBM executive said Thursday.

During his keynote at LinuxWorld here, IBM Senior Vice President and group executive Steve Mills acknowledged that Linux lags behind UNIX in scalability, SMP support, fail-over capabilities and reliability--but not for long.

‘The pathway to get there is an eight-lane highway,’ Mills said, noting that IBM's deep experience with AIX and its 250-member open-source development team will be applied to make the Linux kernel as strong as that of UNIX. ‘The road to get there is well understood.’

*  *  *

Mills hinted that the company's full development capabilities will be brought to bear in engineering the Linux kernel to offer vastly improved scalability, reliability and support for mixed workloads--and to obliterate UNIX.

98.  The only way that the pathway is an “eight-lane highway” for Linux to achieve the scalability, SMP support, fail-over capabilities and reliability of UNIX is by the improper extraction, use, and dissemination of the proprietary and confidential UNIX source code, derivative works and methods.  Indeed, UNIX was able to achieve its status as the premiere operating system only after decades of hard work, beginning with the finest computer scientists at AT&T Bell Laboratories, plaintiff’s predecessor in interest.

99.  Based on other published statements, IBM currently has over 7,000 employees involved in the transfer of UNIX knowledge into the Linux business of IBM, Red Hat, Inc. and SuSE Linux AG (the largest European Linux distributor). On information and belief, a large number of the said IBM employees currently working in the transfer of UNIX to Linux have, or have had, access to the UNIX Software Code.

IBM’s Coordination of Linux Development Efforts

100.          On information and belief, IBM has knowingly induced, encouraged, and enabled others to distribute proprietary information in an attempt to conceal its own legal liability for such distributions:

What is wrong about this [Linux] distribution, is basically the millions of lines of code that we never have seen.  We don’t know if there are any patent infringements [in this code] with somebody we don’t know.  We don’t want to take the risk of being sued for a patent infringement.  That is why we don’t do distributions, and that’s why we have distributors.  Because distributors are not so much exposed as we are.  So that’s the basic deal as I understand it.

Karl-Heinz Strassemeyer, IBM The Register, 11/19/2002, www.theregister.co.uk/content/4/28183.html

101.          IBM is affirmatively taking steps to destroy all value of UNIX by improperly extracting and using the confidential and proprietary information it acquired from UNIX and dumping that information into the open source community.  As part of this effort, IBM has heavily invested in the following projects to further eliminate the viability of UNIX:

a)The Linux Technology Center was launched in 2001 with the advertised intent and foreseeable purpose of transferring and otherwise disposing of all or part of UNIX, including its derivative works, modifications and methods, into an open source Linux environment; 

b)      The IBM Linux Center of Competency was launched to assist and train financial services companies in an accelerated transfer of UNIX to Linux with the advertised intent and foreseeable purpose of transferring and otherwise disposing of all or part of UNIX, including its derivative works, modifications and methods into open source.

c)A carrier-grade Linux project has been undertaken to use UNIX source code, derivative works, modifications and methods for the unlawful purpose of transforming Linux into an enterprise-hardened operating system;

d)      A data center Linux project has been undertaken to use UNIX source code, derivative works, modifications and methods for the unlawful purpose of transforming Linux into an enterprise-hardened operating system; and

e)Other projects and initiatives have been undertaken or supported that further evidence the improper motive and means exercised by IBM in its efforts to eliminate UNIX and replace it with free Linux.

102.          But for IBM’s coordination of the development of enterprise Linux, and the misappropriation of UNIX to accomplish that objective, the Linux development community would not have timely developed enterprise quality software or customer support necessary for widespread use in the enterprise market. 

FIRST CAUSE OF ACTION

(Breach of IBM Software Agreement)

103.          Plaintiff incorporates and re-alleges paragraphs No. 1-102, above.

104.          As set forth above, SCO is the successor to AT&T under that certain Software Agreement originally executed by and between AT&T and IBM designated as SOFT-00015.  The Software Agreement specifies the terms and conditions for use of UNIX System V source code by IBM.

105.          With respect to the scope of rights granted for use of the System V source code under Section 2.01 of the Software Agreement, IBM received the following:

[A] personal, nontransferable and nonexclusive right to use in the United States each Software Product identified in the one or more Supplements hereto, solely for Licensee’s own internal business purposes and solely on or in conjunction with Designated CPUs for such Software Product.  Such right to use includes the right to modify such Software Product and to prepare derivative works based on such Software product, provided the resulting materials are treated hereunder as part of the original Software Product. [Emphasis added.]

106.          IBM has violated its grant of rights under §2.01 of the Software Agreement by, inter alia, modifying and assisting others to modify the Software Products (including System V source code, derivative works and methods based thereon) for purposes other than IBM’s own internal business purposes.  By actively supporting, assisting and promoting the transfer from UNIX to Linux, and using its access to UNIX technology to accomplish this objective, IBM is  (a) using the Software Product for external business purposes, which include use for the benefit of Linus Torvalds, the general Linux community and IBM’s Linux distribution partners, Red Hat, Inc. and SuSE Linux AG and its subsidiaries; and is (b) directly and indirectly preparing unauthorized derivative works based on the Software Product and unauthorized modifications thereto in violation of §2.01 of the Software Agreement.   

107.          IBM agreed in §2.05 of the Software Agreement to the following restrictions on use of the Software Product (including System V source code, derivative works and methods based thereon):

No right is granted by this Agreement for the use of Software Products directly for others, or for any use of Software Products by others.

108.          IBM has breached §2.05 of the Software Agreement by, inter alia, actively promoting and allowing use of the Software Products and development methods related thereto in an open and hostile attempt to destroy the entire economic value of the Software Products and plaintiff’s rights to protect the proprietary nature of the Software Products.  By way of example and not limitation, IBM has used protected UNIX methods for others in accelerating development of the 2.4.x kernel and 2.5.x Linux kernel in, among others, the following areas: (a) scalability improvements, (b) performance measurement and improvements, (c) serviceability and error logging improvements, (d) NUMA scheduler and other scheduler improvements, (e) Linux PPC 32- and 64-bit support, (f) AIX Journaling File System, (g) enterprise volume management system to other Linux components, (h) clusters and cluster installation, including distributed lock manager and other lock management technologies, (i) threading, (j) general systems management functions, and (k) other areas.  But for the use by IBM of these protected UNIX methods in Linux development, the Linux 2.4.x kernel and 2.5.x kernel capacity to perform high-end enterprise computing functions would be severely limited.

109.          IBM agreed in §7.10 of the Software Agreement to the following restrictions on transfer of the Software Product, including AIX as a derivative work of UNIX System V:

[N]othing in this Agreement grants to Licensee the right to sell, lease or otherwise transfer or dispose of a Software Product in whole or in part.

110.          IBM has breached §7.10 of the Software Agreement by, inter alia, transferring portions of the Software Product (including System V source code, derivative works and methods based thereon), including but not limited to the AIX Journaling File System and all other UNIX-based source code publicly announced by IBM, to Linus Torvalds for open distribution to the general public under a software license that destroys the proprietary and confidential nature of the Software Products. 

111.          IBM has further stated its intention to transfer the entirety of AIX into open source in anticipatory violation of its obligations under §7.10 of the Software Agreement.

112.          IBM agreed in Side Letter ¶9, a substitute provision to §7.06(a) of the Software Agreement, to the following restrictions on confidentiality of the Software Product, including AIX as a derivative work of UNIX System V:

Licensee agrees that it shall hold Software Products subject to this Agreement in confidence for AT&T.  Licensee further agrees that it shall not make any disclosure of such Software Products to anyone, except to employees of Licensee to whom such disclosure is necessary to the use for which rights are granted hereunder. Licensee shall appropriately notify each employee to whom any such disclosure is made that such disclosure is made in confidence and shall be kept in confidence by such employee.

113.          In recognition of SCO’s right of confidentiality of the Software Products, IBM directs all customers who need to view AIX source code to first obtain a “read only” source code license from SCO as a condition to viewing any part of the AIX source code.  For example, SCO received a letter on or about March 4, 2003 from Lockheed Martin Corporation requesting verification of the existence of a Software Agreement by and between Lockheed and SCO as a condition to Lockheed obtaining access to view AIX source code.  The letter stated, in part, as follows:

LMATM is in the process of licensing [AIX] from IBM to be used for integration purposes only.  Per the attached supplement to the subject document, contained within the AIX source code is third party IP which must be licensed from the owner prior to IBM providing the AIX source code to any licensee (see Prerequisite Source Licenses, Para.2.2). 

* * *

2.2 Prerequisite Source LicenseIBM cannot disclose (includes viewing) certain Third-Party Source Code to any party who does not have a license that permits access to the Code.  Prior to receiving or accessing the Source Code described above in this Supplement, LMATM must obtain the following Source Code Licenses:

a)  AT&T Technologies, Inc., AT&T Information Systems, Inc., or UNIX ™ Systems Laboratory Software Agreement No. SOFT---and AT&T Information Systems, Inc. Software Agreement Supplement for Software Product AT&T UNIX System V Release 4.0, or AT&T Information Systems, Inc. Schedule for Upgrades (from UNIX System V Release 3.1 to UNIX System V Release 3.2 or from UNIX System V Release 3.1 International Edition to UNIX System V Release 3.2 International Edition) or equivalent SCO Group License.

114.          IBM has breached its obligation of confidentiality by contributing portions of the Software Product (including System V source code, derivative works and methods based thereon) to open source development of Linux and by using UNIX development methods in making modifications to Linux 2.4.x and 2.5.x, which are in material part, unauthorized derivative works of the Software Product.  These include, among others, (a) scalability improvements, (b) performance measurement and improvements, (c) serviceability and error logging improvements, (d) NUMA scheduler and other scheduler improvements, (e) Linux PPC 32- and 64-bit support, (f) AIX Journaling File System, (g) enterprise volume management system to other Linux components, (h) clusters and cluster installation, including distributed lock manager and other lock management technologies, (i) threading, (j) general systems management functions, and (k) others. 

115.          IBM has further stated its intention to transfer the entirety of AIX into open source in anticipatory violation of its obligations under §7.06 (a) of the Software Agreement.

116.          Export of UNIX technology is controlled by the United States government.  Thus, SCO, IBM and all other UNIX vendors are subject to strict export control regulations with respect to any UNIX-based customer distribution.  To this end, IBM agreed in §4.01 of the Software Agreement to restrictions on export of the Software Product (including System V source code, derivative works and methods based thereon), as follows:

Licensee agrees that it will not, without the prior written consent of AT&T, export, directly or indirectly, Software Products covered by this Agreement to any country outside of the United States.

This provision was later modified to allow export rights to several countries outside the United States.  However, no permission has ever been granted by SCO or its predecessors to IBM to allow it to indirectly make available all or portions of the Software Product to countries outside the United States that are subject to strict technology export control by the United States government: viz., Cuba, Iran, Syria, North Korea and Libya.  IBM is ignoring and attempting to circumvent the export control restrictions that apply to UNIX as it accelerates development of Linux for enterprise use.

117.          Thus, IBM has breached §4.01 of the Software Agreement by, inter alia, making extensive, advanced multiprocessor scaling functions of the Software Product, including derivative works and methods based thereon, available for free distribution to anyone in the world with a computer.  As it relates to Linux 2.4.x and 2.5.x releases, IBM is indirectly making the Software Product and operating system modifications available to countries and organizations in those countries for scaling single processor computers into multi-processor supercomputers that can be used for encryption, scientific research and weapons research.

118.          SCO has the self-executing contractual right to terminate IBM’s right to use and distribute the Software Product, including derivative works and methods based thereon, if IBM fails to fulfill one or more of its obligations under the Software Agreement.  This authority is contractually granted under the following provisions of the IBM Related Agreements:

If Licensee fails to fulfill one or more of its obligations under this Agreement, AT&T may, upon its election and in addition to any other remedies that it may have, at any time terminate all the rights granted by it hereunder by not less than two (2) months’ written notice to Licensee specifying any such breach, unless within the period of such notice all breaches specified therein shall have been remedied; upon such termination Licensee shall immediately discontinue use of and return or destroy all copies of Software Products subject to this Agreement.  [Software Agreement, §6.03]

Regarding Section 6.03 of the Software Agreement and Sections 2.07 and 3.03 of the Sublicensing Agreement, we will not terminate your rights for breach, nor will we give notice of termination under such Sections, for breaches we consider to be immaterial.  We agree to lengthen the notice period referenced in such Sections from two (2) months to one hundred (100) days.  If a breach occurs that causes us to give notice of termination, you may remedy the breach to avoid termination if you are willing and able to do so.  In the event that a notice of termination is given to you under either of such Sections and you are making reasonable efforts to remedy the breach but you are unable to complete the remedy in the specified notice period, we will not unreasonably withhold our approval of a request by you for reasonable extension of such period.  We will also consider a reasonable extension under Section 2.07 of the Sublicensing Agreement in the case of a Distributor who is making reasonable efforts to remedy a breach.

In any event our respective representatives will exert their mutual good faith best efforts to resolve any alleged breach short of termination.  [Side Letter, ¶ 5]

119.          Consistent with these rights, on March 6, 2003, plaintiff delivered a notice of termination to Sam Palmisano, Chief Executive Officer of IBM (the “AIX Termination Notice”) for IBM’s breaches of the Software (and Sublicensing) Agreement by IBM.

120.          Following delivery of the AIX Termination Notice, plaintiff took every reasonable step to meet and confer with IBM regarding IBM’s breach of the Software Agreement and Related Agreements.

121.          IBM has disregarded SCO's rights under the AT&T / IBM Agreement by failing to undertake any efforts to cure its numerous and flagrant violations thereunder.  As a result, effective June 13, 2003, the AT&T / IBM UNIX Agreement is terminated and IBM has no further rights thereunder.

122.     IBM nonetheless continues to operate under the AT&T / IBM Agreement, and use the Software Products and Source Code thereunder as though its rights under the Agreement have not been terminated.

123.     IBM no longer has any right to use the UNIX Software Code or make modifications or derivative works thereunder.   In fact, IBM is contractually obligated to “immediately discontinue use of and return or destroy all copies of Software Products subject to this Agreement.”

124.          As a result of IBM’s breaches before termination, SCO has been damaged in the marketplace for violations by IBM in an amount to be proven at trial, but not less than $1 billion. 

125.          In addition, and to the extent that IBM continues to completely repudiate its obligations regarding the Software Product, plaintiff will sustain substantial continuing and ongoing damages. SCO is entitled to damages in an amount measured by the benefits conferred upon IBM by its ongoing, improper use of the Software Products.  These damages include the full amount IBM receives as a result of its ongoing sales of AIX, including software, services and hardware. 

126.          Moreover, if IBM does not return or destroy all source and binary copies of the Software Products and/or continues to contribute some or all of these protected materials to open source, SCO will be irreparably harmed.  As a result, SCO is entitled to a permanent injunction requiring IBM to return or destroy all source code and binary copies of the Software Products and/or prohibiting IBM from further contributions of the protected Software Products into open source.

SECOND CAUSE OF ACTION

(Breach of IBM Sublicensing Agreement)

127.          Plaintiff incorporates and re-alleges paragraphs No. 1-126, above.

128.          As set forth above, SCO is the successor to AT&T under that certain Sublicensing Agreement originally executed by and between AT&T and IBM designated as SUB-00015A.  The Sublicensing Agreement grants the right to distribute object-based code of UNIX System V and modifications thereto and derivative works based thereon.

129.          SCO has terminated IBM’s right to use and distribute the Software Product, including derivative works and methods based thereon as of the AIX Termination Date, June 13, 2003. 

130.          From and after the AIX Termination Date, any and all distributions of AIX by IBM is in violation of the Sublicensing Agreement.

131.          To the extent that IBM continues to completely repudiate its obligations under the Sublicensing Agreement, plaintiff will sustain substantial continuing and ongoing damages. SCO is entitled to damages in an amount measured by the benefits conferred upon IBM by its ongoing, improper use of the Software Products.  These damages include the full amount IBM receives as a result of its ongoing sales of AIX, including software, services and hardware. 

132.          Moreover, if IBM does not return or destroy all source and binary copies of the Software Products and/or continues to contribute some or all of these protected materials to open source, SCO will be irreparably harmed.  As a result, SCO is entitled to a permanent injunction requiring IBM to return or destroy all source code and binary copies of the Software Products and/or prohibiting IBM from further contributions of the protected Software Products into open source.

THIRD CAUSE OF ACTION

(Breach of Sequent Software Agreement)

133.          Plaintiff incorporates and re-alleges paragraphs No. 1-132, above.

134.          As set forth above, SCO is the successor to AT&T under that certain Software Agreement originally executed by and between AT&T and Sequent designated as SOFT-000321.  The Software Agreement specifies the terms and conditions for use of UNIX System V source code by Sequent.

135.          With respect to the scope of rights granted for use of the System V source code under Section 2.01 of the Software Agreement, Sequent received the following:

[A] personal, nontransferable and nonexclusive right to use in the United States each Software Product identified in the one or more Supplements hereto, solely for Licensee’s own internal business purposes and solely on or in conjunction with Designated CPUs for such Software Product.  Such right to use includes the right to modify such Software Product and to prepare derivative works based on such Software product, provided the resulting materials are treated hereunder as part of the original Software Product. [Emphasis added.]

136.          IBM has violated the grant of rights to Sequent under §2.01 of the Sequent Software Agreement by, inter alia, modifying and assisting others to modify the Software Products (including System V source code, derivative works and methods based thereon) for purposes other than Sequent and/or IBM’s own internal business purposes.  By actively supporting, assisting and promoting the transfer from UNIX to Linux, and using its access to UNIX technology to accomplish this objective, IBM is  (a) using the Software Product for external business purposes, which include use for the benefit of Linus Torvalds, the general Linux community and IBM’s Linux distribution partners, Red Hat, Inc. and SuSE Linux AG and its subsidiaries; and is (b) directly and indirectly preparing unauthorized derivative works based on the Software Product and unauthorized modifications thereto in violation of §2.01 of the Sequent Software Agreement.

137.          Sequent agreed in §2.05 of the Software Agreement to the following restrictions on use of the Software Product (including System V source code, derivative works and methods based thereon):

No right is granted by this Agreement for the use of Software Products directly for others, or for any use of Software Products by others.

138.          IBM has breached Sequent’s obligations under §2.05 of the Sequent Software Agreement by, inter alia, actively promoting and allowing use of the Software Products and development methods related thereto in an open and hostile attempt to destroy the entire economic value of the Software Products and plaintiff’s rights to protect the proprietary nature of the Software Products.  Particularly, IBM has caused all or materially all of DYNIX/ptx-based NUMA source code and methods, and RCU source code and methods, to be used for the benefit of Linux.  But for the use by IBM of these protected UNIX methods in Linux development, the Linux 2.4.x kernel and 2.5.x kernel capacity to perform high-end enterprise computing functions would be severely limited.

139.          IBM has even gone so far as to publish the DYNIX/ptx copyright as part of the source code and documentation contribution of UNIX-derived RCU technology it has improperly made available to the open source community.  The following copyright attribution is found in Linux kernel 2.4.x:

Copyright (c) International Business Machines Corp., 2001  This program is free software; you can redistribute it and/or modify  it under the terms of the GNU General Public License as published by  the Free Software Foundation; either version 2 of the License, or (at your option) any later version. This program is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the  GNU General Public License for more details. You should have received a copy of the GNU General Public License  along with this program; if not, write to the Free Software Foundation, Inc., 59 Temple Place - Suite 330, Boston, MA 02111-1307, USA.  Author: Dipankar Sarma (Based on a Dynix/ptx implementation by  Paul Mckenney.

140.          This publication of the RCU copyright is an example of IBM’s blatant disregard of SCO’s rights to control the use of the Software Product, including derivative works and modifications thereof, pursuant to §2.05 of the Sequent Software Agreement.

141.          Sequent agreed in §7.10 of the Sequent Software Agreement to the following restrictions on transfer of the Software Product, including DYNIX/ptx as a derivative work of UNIX System V:

[N]othing in this Agreement grants to Licensee the right to sell, lease or otherwise transfer or dispose of a Software Product in whole or in part.

142.          IBM has breached Sequent’s obligations under §7.10 of the Sequent Software Agreement by, inter alia, transferring portions of the Software Product (including System V source code, derivative works and methods based thereon), including DYNIX/ptx source code, documentation and methods for NUMA, RCU and SMP technologies, to Linus Torvalds for open distribution to the general public under a software license that destroys the proprietary and confidential nature of the Software Products.

143.          Sequent agreed under §7.06(a) of the Sequent Software Agreement, to the following restrictions on confidentiality of the Software Product, including DYNIX/ptx as a derivative work of UNIX System V:

Licensee agrees that it shall hold all parts of the Software Products subject to this Agreement in confidence for AT&T.  Licensee further agrees that it shall not make any disclosure of any or all of such Software Products (including methods or concepts utilized therein) to anyone, except to employees of Licensee to whom such disclosure is necessary to the use for which rights are granted hereunder. Licensee shall appropriately notify each employee to whom any such disclosure is made that such disclosure is made in confidence and shall be kept in confidence by such employee.

144.          IBM has breached Sequent’s obligation of confidentiality by contributing portions of the Software Product (including System V source code, derivative works and methods based thereon) to open source development of Linux and by using UNIX development methods in making modifications to Linux 2.4.x and 2.5.x, which are in material part, unauthorized derivative works of the Software Product, including but not limited to DYNIX/ptx-based NUMA technology, source code and methods, RCU source code and methods, and SMP source code and methods.

145.          Export of UNIX technology is controlled by the United States government.  Thus, SCO, Sequent, IBM and all other UNIX vendors are subject to strict export control regulations with respect to any UNIX-based customer distribution.  To this end, Sequent agreed in §4.01 of the Software Agreement to restrictions on export of the Software Product (including System V source code, derivative works and methods based thereon), as follows:

Licensee agrees that it will not, without the prior written consent of AT&T, export, directly or indirectly, Software Products covered by this Agreement to any country outside of the United States.

This provision was later modified to allow export rights to several countries outside the United States.  However, no permission has ever been granted by SCO or its predecessors to Sequent or IBM to allow either company to directly or indirectly make available all or portions of the Software Product to countries outside the United States that are subject to strict technology export control by the United States government: viz., Cuba, Iran, Syria, North Korea and Libya.  IBM is ignoring and attempting to circumvent the export control restrictions that apply to UNIX as it accelerates development of Linux for enterprise use.

146.          Thus, IBM has breached §4.01 of the Sequent Software Agreement by, inter alia, making extensive, advanced multiprocessor scaling functions of the Software Product, including NUMA technology, RCU technology, SMP technology and other derivative works and methods based thereon, available for free distribution to anyone in the world with a computer.  As it relates to Linux 2.4.x and 2.5.x releases, IBM is indirectly making the Software Product and operating system modifications, particularly NUMA technology, RCU technology and SMP technology, available to countries and organizations in those countries for scaling single processor computers into multi-processor supercomputers that can be used for encryption, scientific research and weapons research.

 

FOURTH CAUSE OF ACTION

(Unfair Competition)

147.          Plaintiff incorporates and re-alleges paragraphs No. 1-146, above.

148.          Plaintiff and its predecessors have built the UNIX System V Technology, the Unix Software Code, SCO OpenServer, UnixWare and their derivatives through very substantial efforts over a time span in excess of 20 years and expenditure of money in excess of $1 billion.

149.          IBM has engaged in a course of conduct that is intentionally and foreseeably calculated to undermine and/or destroy the economic value of UNIX anywhere and everywhere in the world, and to undermine and/or destroy plaintiff’s rights to fully exploit and benefit from its ownership rights in and to UNIX System V Technology, the Unix Software Code, SCO OpenServer, UnixWare and their derivatives, and thereby seize the value of UNIX System V Technology, the Unix Software Code, SCO OpenServer, UnixWare and their derivatives directly for its own benefit and indirectly for the benefit of its Linux distribution partners.

150.          In furtherance of its scheme of unfair competition, IBM has engaged in the following conduct:

a)      Misappropriation of source code, methods, trade secrets and confidential information of plaintiff;

b)      Breach of contract;

c)Violation of confidentiality provisions running to the benefit of plaintiff;

d)      Inducing and encouraging others to violate confidentiality provisions and to misappropriate trade secrets and confidential information of plaintiff;

e)Contribution of protected source code and methods for incorporation into one or more Linux software releases, intended for transfer of ownership to the general public;

f)    Use of deceptive means and practices in dealing with plaintiff with respect to its software development efforts; and

g)      Other methods of unlawful and/or unfair competition.

151.          IBM’s unfair competition has directly and/or proximately caused significant foreseeable and consequential harm to plaintiff in the following particulars:

a)Plaintiff’s revenue stream from UNIX licenses for Intel-based processing platforms has decreased substantially;

b)      As Intel-based processors have now become the processing platform of choice for a rapidly-increasing customer base of enterprise software users, plaintiff has been deprived of the opportunity to fairly exploit its market-leading position for UNIX on Intel-based processors, which revenue opportunity would have been very substantial on a recurring, annual basis but for IBM’s unfairly competitive practices;

c)Plaintiff stands at imminent risk of being deprived of its entire stream of all UNIX licensing revenue in the foreseeably near future;

d)      Plaintiff has been deprived of the effective ability to market and sell its new UNIX-related improvements, including a 32-bit version of UNIX for Intel processors developed prior to Project Monterey, a 64-bit version of UNIX for Intel processors based on Project Monterey, and its new web-based UNIX-related products, including UNIX System VI;

e)Plaintiff has been deprived of the effective revenue licensing opportunity to transfer its existing UNIX System V customer base to UNIX System VI; and

f)        Plaintiff has been deprived of the effective ability to otherwise fully and fairly exploit UNIX’s market-leading position in enterprise software market, which deprivation is highly significant given the inability of Microsoft Windows NT to properly support large-scale enterprise applications.

152.          As a result of IBM’s unfair competition and the marketplace injury sustained by plaintiff as set forth above, plaintiff has suffered damages in an amount to be proven at trial, but no less than $1 billion, together with additional damages through and after the time of trial foreseeably and consequentially resulting from IBM’s unfair competition in an amount to be proven at the time of trial.

153.          IBM’s unfairly competitive conduct was also intentionally and maliciously designed to destroy plaintiff’s business livelihood and all opportunities of plaintiff to derive value from its UNIX-based assets in the marketplace.  As such, IBM’s wrongful acts and course of conduct has created a profoundly adverse effect on UNIX business worldwide.  As such, this Court should impose an award of punitive damages against IBM in an amount to be proven and supported at trial.

FIFTH CAUSE OF ACTION

(Interference with Contract)

154.          Plaintiff incorporates and re-alleges by reference paragraphs 1-153, above.

155.          SCO has contracts with customers around the world for licensing of SCO OpenServer and UnixWare.

156.          IBM knew and should have known of these corporate software licensing agreements between SCO and its customers, including the fact that such agreements contain confidentiality provisions and provisions limiting use of the licensed object-based code.

157.          IBM, directly and through its Linux distribution partners, has intentionally and without justification induced SCO’s customers and licensees to breach their corporate licensing agreements, including but not limited to, inducing the customers to reverse engineer, decompile, translate, create derivative works, modify or otherwise use the UNIX software in ways in violation of the license agreements.  These customers include Sherwin Williams, Papa John’s Pizza, and Auto Zone, among others.

158.          IBM’s tortious interference has directly and/or proximately caused significant foreseeable damages to SCO, including a substantial loss of revenues.

159.          IBM’s tortious conduct was also intentionally and maliciously designed to destroy plaintiff’s business livelihood and all opportunities of plaintiff to derive value from its UNIX-based assets in the marketplace.  As such, this Court should impose an award of punitive damages against IBM in an amount to be proven and supported at trial.

SIXTH CAUSE OF ACTION

(Misappropriation of Trade Secrets—Utah Code Ann. §13-24-1 et seq.)

160.          Plaintiff incorporates and re-alleges paragraphs No. 1-159, above.

161.          Plaintiff is the owner of unique know how, concepts, ideas, methodologies, standards, specifications, programming, techniques, UNIX Software Code, object code, architecture, design and schematics that allow UNIX to operate with unmatched extensibility, scalability, reliability and security (hereinafter defined as “SCO’s Trade Secrets”).  SCO’s Trade Secrets provide SCO with an advantage over its competitors.

162.          SCO’s Trade Secrets are embodied within SCO’s proprietary SCO OpenServer and its related shared libraries and SCO’s UnixWare and its related shared libraries.

163.          SCO and its predecessors in interest have expended over one billion dollars to develop SCO’s Trade Secrets.

164.          IBM, through improper means acquired and misappropriated SCO’s Trade Secrets for its own use and benefit, for use in competition with SCO and in an effort to destroy SCO.

165.          At the time that IBM acquired access to SCO’s Trade Secrets, IBM knew that it had a duty to maintain the secrecy of SCO’s Trade Secrets or limit their use.

166.          SCO’s Trade Secrets derive independent economic value, are not generally known to third persons, are not readily ascertainable by proper means by other persons who can obtain economic value from their disclosure and use, and are subject to reasonable efforts by SCO and its predecessors to maintain secrecy.

167.          The acts and conduct of IBM in misappropriating and encouraging, inducing and causing others to commit material misappropriation of SCO’s Trade Secrets are the direct and proximate cause of a near-complete devaluation and destruction of the market value of SCO OpenServer and SCO UnixWare that would not have otherwise occurred but for the conduct of IBM.

168.          Pursuant to Utah Code Ann. §13-24-4, plaintiff is entitled to an award of damages against IBM in the following amounts:

a)Actual damages as a result of the theft of trade secrets; together with

b)      Profits from IBM’s Linux-related business on account of its misappropriation through the time of trial; together with

c)Additional foreseeable profits for future years from IBM’s Linux-related business on account of its misappropriation in an amount to be proven at the time of trial.

169.          Because IBM’s misappropriation was willful, malicious, and in reckless disregard of plaintiff’s rights, SCO is entitled to an award of exemplary damages against IBM in an amount equal to two times the amount of damages, pursuant to Utah Code Ann. §13-24-4(2).

170.          Plaintiff is also entitled to an award of attorneys’ fees and costs in an amount to be proven at the time of trial pursuant to Utah Code Ann. §13-24-5.

Prayer for Relief

WHEREFORE, having fully set forth its complaint, plaintiff prays for relief from this Court as follows:

1.      For damages under the First Cause of Action for breach of the IBM Software Agreement in an amount not less than $1 billion, together with additional damages through and after the time of trial foreseeably and consequentially resulting from IBM’s breach, in an amount to be proven at the time of trial;

2.      For a permanent injunction under the First and Second Causes of Action requiring IBM to return or destroy all source code and binary copies of the Software Products and/or prohibiting IBM from further contributions of the protected Software Products into open source;

3.      For restitution under the First and Second Causes of Action in an amount measured by the benefits conferred upon IBM by its ongoing, improper use of the Software Products, including the full amount IBM receives as a result of its ongoing sales of AIX, including software, services and hardware; 

4.      For damages under the Third Cause of Action for breach of the Sequent Software Agreement in an amount not less than $1 billion, together with additional damages through and after the time of trial foreseeably and consequentially resulting from IBM’s breach, in an amount to be proven at the time of trial;

5.      For relief under the Fourth Cause of Action in an amount not less than $1 billion, for unfair competition arising from common law, and damages for violations thereof, together with additional damages through and after the time of trial;

6.      For relief under the Fifth Cause of Action in an amount to be proven at trial for tortious interference, together with additional damages through and after the time of trial;

7.      For relief under the Sixth Cause of Action in an amount to be proven at trial for misappropriation of trade secrets arising from Utah Code Ann. §13-24-1 et seq., together with additional damages through and after the time of trial;

8.      For a permanent injunction under the Third Cause of Action to prohibit IBM from further contributions of the protected Software Products into open source;

9.      For punitive damages under the Fourth and Fifth Causes of Action for IBM’s malicious and willful conduct, in an amount to be proven at trial;

10.  For exemplary damages pursuant to Utah Code Ann. § 13-24-1 under the Sixth Cause of Action in an amount equal to twice the award under the Sixth Cause of Action for misappropriation of trade secrets;

11.  For attorneys’ fees and costs as provided by Utah Code Ann. §13-24-5 and/or by contract in an amount to be proven at trial; and

12.  For attorneys’ fees, costs, pre- and post-judgment interest, and all other legal and equitable relief deemed just and proper by this Court.

Jury Trial Demand

SCO demands trial by jury on all issues so triable.

DATED this ___ day of June, 2003.

                                                                 By:  ________________________________________

                                                                        HATCH, JAMES & DODGE

Brent O. Hatch

Mark F. James

BOIES, SCHILLER & FLEXNER

                                                                        David Boies

                                                                        Stephen N. Zack

                                                                        Mark J. Heise

                                                                        Attorneys for The SCO Group, Inc.

 

Plaintiff’s address:

355 South 520 West

Lindon, Utah 84042