Consulting Services
Risk Assessment/Risk Analysis
Emergency Planning/Crisis Management
Security Program Development/Management
Workplace Violence Programs
Executive Protection
Employee Education/ Awareness
Electronic Countermeasures
Information Security Protection
Investigative Services
Litigation Support
About Us Contact Us Ethical Mission Portfolio Partners Solutions Home

Information Security Protection

Proprietary trade secret information is the life blood of today’s companies. Your know how provides your company a competitive advantage.  The theft of your trade secrets can put you out of business.

Information security is the ability to develop, maintain, store and convey proprietary/trade secret information securely as to prevent its acquisition by competitors.

Our programs are designed to keep your trade secrets…….yours and secret.

Case Studies


A major Pacific Rim computer manufacturer realized it was six months behind its closest competitor regarding the development of disk drive storage technology. Looking to rapidly catch up, company representatives approached a U.S. consultant, who was a former employee of their competitor. The manufacturer approached the consultant to steal the technology it needed not realizing that the "consultant" they had hired was actually an undercover agent. The case resulted in the arrest and conviction of 19 individuals; many of which were not U.S. citizens.


A former Silicon Valley software engineer stole plans, worth tens of millions of dollars, for a major U.S. semiconductor manufacturer's most competitive product. The engineer sent videotapes detailing the manufacturing process to a rival firm, for whom he had also once worked, which immediately alerted the victim company and the competitor, who cooperated with the investigation. The ensuing investigation revealed that, in his capacity as a key employee, the engineer remotely accessed his employer's corporate databank from his home and obtained the plans for microprocessor manufacturing. He videotaped his monitor screen as opposed to electronically downloading the information. He claims to have given the stolen technology to several countries, including China, North Korea, Iraq and Cuba. He was convicted and spent three years in federal prison.


In lieu of military service in his home country, an apprentice programmer obtained employment with an U.S. software developer. Upon completing his obligation, he gave two weeks' notice to his U.S. employer and began making plans for his return home. He also began to work nights and weekends -- unusual behavior for this typical 9am to 5pm employee. The software developer became suspicious. A programming audit revealed that he was also downloading his employer's source code. As it turned out, the foreign national was packing more than clothes and souvenirs from his year in the States. He was arrested boarding an international flight home.


Four individuals stole supercomputer technology from their employer by copying sensitive documents, tapes and diskettes at night and on weekends. Traveling to the former Soviet Union, they negotiated selling the information. The suspects were identified and arrested. The duplicated proprietary documents, valued at $15 million, was recovered from a storage locker in Fremont, CA. Three of the four individuals were convicted; the fourth fled the country and subsequently died.


Two anonymous letters to the victim company precipitated an investigation into the theft of blueprints for semiconductor manufacturing equipment by individuals who, after copying the design specs, became a successful competitor. During the investigation it was determined that three (3) additional companies were being victimized. With no R&D costs, nor draftsmen or engineers to employ, they were able to undercut the victim company by 40% and made millions of dollars in a matter of months, before the scheme was discovered. Six perpetrators were arrested and convicted. Several of the thieves were employees of the victims companies. The culprit company is no longer in business.


A trusted employee of a software developer stole source code from his employer in order to start a competing company. The thief created a new name, logo and screen design for the bogus operation and sold copies throughout the world advertising in Dr. Dobbs magazine. A reference buried deep in the original program -- bearing the name of the victim company -- went unaltered, and was subsequently discovered by a customer. The customer alerted the victim company. Upon completing an investigation, the majority of the pirated software was recovered and the unscrupulous employee was arrested and convicted.


Relying on old business cards for identification, a Japanese national represented himself as a customer and obtained confidential information and prototypes. The subject was employed by a competitor who used the purloined information in presentations on its competing product. The Japanese national was arrested when he reentered the U.S. from Japan. He was subsequently convicted and deported.


An individual was selling counterfeit action figures on an internet auction site. An investigation ensued and resulted in the confiscation of piratical items from the advertiser, his supplier and in the identification of the importer. Multiple Cease and Desist orders were filed.


Phone 408 464 8204
Fax     408 997 2216
email:[email protected]

©Copyright 2002~2010 bernes Group