Kenneth Cullen and Bruce Zak were indicted on April 2001 for trying to purchase a printed or text version of the source code of a computer application for the processing of health care benefit claim forms developed by ZirMed.

The legal status of printed source code is unclear. It is undoubtedly intellectual property - but of which kind? Is it software or printed matter? Peter Morch, a senior R&D team leader for CISCO was accused on March 2001 for simply burning onto compact discs all the intellectual property he could lay his hands on with the intent of using it in his new workplace, Calix Networks, a competitor of CISCO.

Perhaps the most bizarre case involves Fausto Estrada. He was employed by a catering company that served the private lunches to Mastercard's board of directors. He offered to sell Visa proprietary information that he claimed to have stolen from Mastercard. In a letter signed "Cagliostro", Fausto demanded $1 million. He was caught red-handed in an FBI sting operation on February 2001.

Multinationals are rarely persecuted even when known to have colluded with offenders. Steven Louis Davis pleaded guilty on January 1998 to stealing trade secrets and designs from Gillette and selling them to its competitors, such as Bic Corporation, American Safety Razor, and Warner Lambert. Yet, it seems that only he paid the price for his misdeeds - 27 months in prison. Bic claims to have immediately informed Gillette of the theft and to have collaborated with Gillette's Legal Department and the FBI.

Nor are industrial espionage or the theft of intellectual property limited to industry. Mayra Justine Trujillo-Cohen was sentenced on October 1998 to 48 months in prison for stealing proprietary software from Deloitte-Touche, where she worked as a consultant, and passing it for its own.

Caroll Lee Campbell, the circulation manager of Gwinette Daily Post (GDP), offered to sell proprietary business and financial information of his employer to lawyers representing a rival paper locked in bitter dispute with GDP.

Nor does industrial espionage necessarily involve clandestine, cloak and dagger, operations. The Internet and information technology are playing an increasing role.

In a bizarre case, Caryn Camp developed in 1999 an Internet-relationship with a self-proclaimed entrepreneur, Stephen Martin. She stole he employer's trade secrets for Martin in the hope of attaining a senior position in Martin's outfit - or, at least, of being richly rewarded.

Camp was exposed when she mis-addressed an e-mail expressing her fears - to a co-worker.

Steven Hallstead and Brian Pringle simply advertised their wares - designs of five advanced Intel chips - on the Web.