U.S. Attorney David W. Shapiro said: "People and companies who steal intellectual property are thieves just as bank robbers are thieves. In this case, the Itanium microprocessor is an extremely valuable product that took Intel and HP years to develop. These cases should send the message throughout Silicon Valley and the Northern District that the U.S. Attorney's Office takes seriously the theft of intellectual property and will prosecute these cases to the full extent of the law".

Yet, such cases are vastly more common than publicly acknowledged. "People have struck up online friendships with employers and then lured them into conspiracy to commit espionage.

People have put bounties on laptops of executives. People have disguised themselves as janitors to gain physical access," Richard Power, editorial director of the Computer Security Institute told MSNBC.

Marshall Phelps, IBM Vice President for Commercial and Industry Relations admitted to the Senate Judiciary Committee as early as April 1992: "Among the most blatant actions are outright theft of corporate proprietary assets. Such theft has occurred from many quarters: competitors, governments seeking to bolster national industrial champions, even employees.

Unfortunately, IBM has been the victim of such acts".

Raytheon, a once thriving defense contractor, released "SilentRunner", a $25,000-65,000 software package designed to counter the "insider threat". Its brochure, quoted by "Wired", says: "We know that 84 percent of your network threats can be expected to come from inside your organization.... This least intrusive of all detection systems will guard the integrity of your network against abuses from unauthorized employees, former employees, hackers or terrorists and competitors".

This reminds many of the FBI's Carnivore massive network sniffer software. It also revives the old dilemma between privacy and security. An Omni Consulting survey of 3200 companies worldwide pegged damage caused by insecure networks at $12 billion.

There is no end to the twists and turns of espionage cases and to the creativity shown by the perpetrators.

On June 2001 an indictment was handed down against Nicholas Daddona. He stands accused of a unique variation on the old theme of industrial espionage: he was employed by two firms - transferring trade secrets from one (Fabricated Metal Products) to the other (Eyelet).

Jungsheng Wang was indicted last year for copying the architecture of the Sequoia ultrasound machine developed by Acuson Corporation. He sold it to Bell Imaging, a Californian company which, together with a Chinese firm, owns a mainland China corporation, also charged in the case. The web of collaboration between foreign - or foreign born - scientists with access to trade and technology secrets, domestic corporations and foreign firms, often a cover for government interests - is clearly exposed here.