Lawsuit: GlobeRanger Corp. v. Software AG, Software AG USA, Inc., Software AG, Inc., NANIQ Systems, LLC and Main Sail LLC
Lawsuit: GlobeRanger Corp. v. Software AG, Software AG USA, Inc., Software AG, Inc., NANIQ Systems, LLC and Main Sail LLC
Lawsuit: GlobeRanger Corp. v. Software AG, Software AG USA, Inc., Software AG, Inc., NANIQ Systems, LLC and Main Sail LLC
___________
ORIGINAL PETITION
AG - USA”), Software AG, Inc. (Software AG – USA and Software AG, Inc., collectively, the
“U.S. Subs”)(Software AG Germany and the U.S. Subs are collectively referred to herein as,
“Software AG”), Naniq Systems, LLC (“Naniq”) and Main Sail LLC (“Main Sail”) (collectively,
“Defendants”) and, in support thereof, would respectfully show the Court the matters set forth
below.
I. PRELIMINARY STATEMENT
GlobeRanger, a small start-up company, poured a decade of work and tens of millions of
dollars into developing technology that is truly transformative and promised to exponentially
facilitate the flow of goods and information throughout the world. Software AG, the second
largest software vendor in Germany with over $1 billion in yearly revenues, stood to make
hundreds of millions of dollars in profit if it could develop this technology. But despite all of
Software AG’s resources, Software AG had failed where GlobeRanger had succeeded.
Naniq and Main Sail offered Software AG access to GlobeRanger’s technology, motivated by
the prospect of making tens of millions in support contracts once Software AG succeeded.
What happened next makes this case far more interesting than your run-of-the-mill theft
of trade secrets. There is sex. There are lies. There is even an audiotape. But the heart of this
case is not the salacious acts of the Defendants, it is their malevolent intent.
GlobeRanger achieved the American dream – after ten years of hard work, it had
developed technology that promises to cause a quantum leap in how our world functions. Main
Sail and Naniq had the means – they learned of the GlobeRanger technology when they supplied
product already deployed in tens of thousands of companies worldwide. The acts were brazen.
The Defendants obtained a copy of the software and installed an image of the program and the
data at one live site onto a laptop. Under false pretenses, Defendants obtained license keys to
unlock the software and the data dictionary to enable them to look at the data files and
workflows and how they were interrelated. From this information Defendants were then able to
discover GlobeRanger’s trade secrets and falsely claim that they were developing the technology
on their own.
The Defendants attitude towards stealing a decade of GlobeRanger’s work was not just
malicious, it was cavalier: their co-conspirator, on tape, not only admits that they
II. PARTIES
1. Plaintiff GlobeRanger is a corporation organized under the laws of the State of
Delaware with its principal place of business in Richardson, Dallas County, Texas.
may be served pursuant to the Hague Convention by forwarding a copy of this Complaint and
Delaware with its principal place of business at 11700 Plaza America Drive, Suite 700, Reston,
Virginia 20191-4751. Software AG - USA receives mail at 11700 Plaza America Drive, Suite
700, Reston, Virginia 20191-4751, is not registered to conduct business in the State of Texas and
has not designated an agent for service of process, but maintains offices and regularly conducts
business within the State of Texas. Software AG - USA can be served by certified mail, return
receipt requested directed to Software AG – USA at its principal place of business through the
Texas Secretary of State as its agent for service of process at Citations Division, 1019 Brazos,
Austin, Texas 78701: 11700 Plaza America Drive, Suite 700, Reston, Virginia 20191-4751.
Virginia with its principal place of business at 11700 Plaza America Drive, Suite 700, Reston,
Virginia 20191-4751. Software AG, Inc. receives mail at 11700 Plaza America Drive, Suite 700,
Reston, Virginia 20191-4751, is not registered to conduct business in the State of Texas and has
not designated an agent for service of process, but maintains offices and regularly conducts
business within the State of Texas. Software AG, Inc. can be served by certified mail, return
receipt requested directed to Software AG, Inc. at its principal place of business through the
Texas Secretary of State as its agent for service of process at Citations Division, 1019 Brazos,
Austin, Texas 78701: 11700 Plaza America Drive, Suite 700, Reston, Virginia 20191-4751.
State of Alaska with its principal place of business at 2121 Abbott Road
Anchorage, Alaska 99507-4453. Naniq can be served with process through its registered agent
CT Corporation Systems, 350 N. St. Paul St., Ste. 2900, Dallas, Texas 75201-4234.
6. Defendant Main Sail is a limited liability company organized under the laws of
the State of Ohio with its principal place of business at 20820 Chagrin Blvd, Suite 201,
Cleveland, Ohio 44122. Main Sail receives mail at 20820 Chagrin Blvd., Suite 201, Cleveland,
Ohio 44122, is not registered to conduct business in the State of Texas and has not designated an
agent for service of process, but maintains employees and regularly conducts business within the
State of Texas. Main Sail can be served by certified mail, return receipt requested directed to
Main Sail at its principal place of business through the Texas Secretary of State as its agent for
service of process at Citations Division, 1019 Brazos, Austin, Texas 78701: 20820 Chagrin
7. This Court has jurisdiction as the amount in controversy is above the minimum
8. The Court has personal jurisdiction over the U.S. Subs and Naniq because each of
them maintains an office in and regularly conducts business within the State of Texas and has
committed acts within the State of Texas giving rise to this action. The Court has personal
jurisdiction over Main Sail because it regularly conducts business within the State of Texas.
Software AG – Germany and/or one of its co-conspirators has engaged in tortious conduct
against GlobeRanger in the State of Texas. Further, the Court has personal jurisdiction over
business operation. Further, the Court has personal jurisdiction over Software AG – Germany
because the U.S. Subs are wholly owned by Software AG – Germany, are financially dependent
on Software AG – Germany and Software AG – Germany consolidates the U.S. Subs’ financials.
Software AG – Germany selects and assigns the U.S. Subs’ key personnel and controls the
operations of the U.S. Subs, including the U.S. Subs sales & marketing and product
development, which are the core issues of this lawsuit. Further, the Court has personal
jurisdiction over Software AG – Germany because the U.S. Subs engage in purposeful activities
in Texas including maintaining several offices, a large workforce, providing products and
services to Texas residents, and entering into contracts with Texas residents. The U.S. Subs
continuous and systematic contacts with the forum exist for the benefit of Software AG –
Germany, Software AG – Germany exercises control over the U.S. Subs’ purposeful activities,
and these activities are sufficiently important to Software AG – Germany that if it did not have
the U.S. Subs to perform them, Software AG’s own officials would undertake to perform
substantially similar activities. Further, the Court has personal jurisdiction over Software AG –
misappropriate trade secrets, engage in unfair competition, commit conversion, and tortiously
Germany and/or its co-conspirators committed one or more overt acts in furtherance of the
conspiracy in Texas.
10. Each of the Defendants has established minimum contacts with the forum such
that the exercise of jurisdiction over each of the Defendants would not offend traditional notions
Remedies Code § 15.001, et seq., because, among other reasons, Software AG’s principal office
in the state is located in Dallas County, Texas, all or a substantial part of the events and/or
omissions giving rise to Plaintiff’s claims occurred in Dallas County, Texas, and the Plaintiff’s
principal place of business was in Dallas County, Texas at the time of accrual of the cause of
action.
IV. BACKGROUND
A. RFID Technology.
12. Imagine pushing your fully loaded grocery cart through a doorway and walking
straight to your car; no waiting in line; no pulling out every last product and placing it on the
conveyor belt; no standing there listening to the repetitive beep of each item being passed over
the scanner; no struggling to get the bar code positioned over the red light on the scanner “just
so;” and no feeling of despair when the register comes up with “SKU not found.” And because
of a special card or the mobile phone in your pocket, you do not even have to pull out your credit
card to pay. Just pick up your groceries and take them straight home.
13. Now imagine you are the owner of the grocery store. As customers pick products
off the shelves, the information is sent directly to store’s inventory system. The store’s inventory
system automatically notifies the distribution center. The data is automatically adjusted for
recent trends and seasonality and orders are instantly placed with the vendor as inventory is sold.
This automatic system even determines how ever-changing freight charges and weather impact
14. This transformative technology starts with tags and readers known as radio
frequency identification (“RFID”), but requires the perfect combination of software, business
15. To work seamlessly throughout an enterprise and at all points of the intake and
distribution channels, an RFID System requires the design of business processes (the “Business
Processes”). The Business Processes are the “secret sauce” necessary to make the software and
hardware components of RFID work in harmony. RFID tags and readers provide automatic
acknowledgement that “something” has crossed the reader, but the Business Processes and
software associated with those Business Processes tell the RFID System how to recognize what
the “something” is, where it came from, where it is going, how long it took to get there, and most
16. Once you have an RFID reader, RFID tags, and Business Processes in place, you
have an RFID System. But an RFID System in a vacuum ignores the true power of RFID – tying
an enterprise’s inventory, ordering, shipping, and other existing IT such that you have automatic,
blueprint for how the RFID System will be implemented and maintained in the context of the
larger enterprise. Finally, industry and company-specific issues must be considered and
17. RFID itself is not new technology. Retailers have used large, bulky, and
expensive RFID tags for theft detection for years. If a tag crosses through a detector at the front
of a store, an alarm sounds. To take RFID to the next level, the tag needed to be smaller and
cheaper. The most expensive and bulky part of these historical tags was a battery inside the tag
that powered the communications. These battery-powered tags are called “active” RFID tags.
“passive” RFID tags, which use radio frequency energy transferred from the reader to the tag to
power the tag. Even then more development was needed. A dolly full of products tagged with
passive RFID tags could be passed through a reader and broadcast, but an RFID System was
extraordinarily difficult. In the past, only companies such as Walmart have had the resources to
develop true passive RFID Systems. It took it years. In fact, it was only very recently – August
2010 – that Walmart moved from merely tagging pallets of product and shipping containers to a
20. Walmart has RFID Systems made by and for Walmart. Like a bespoke suit, it is
not going to fit other enterprises or industries. But what would happen if someone developed
passive RFID Systems that could be dropped in and customized to any enterprise, in any
industry? The engineers who formed GlobeRanger set out to do just that.
21. In 1999, GlobeRanger was formed with the singular purpose of advancing RFID
technology. It would be risky, expensive, and difficult, but the employees and investors in
GlobeRanger took the gamble, made the sacrifices, and did the work – a decade of work.
22. First, GlobeRanger developed its own RFID software platform – iMotion.
iMotion was deployed across multiple industries, including retail, government, healthcare, and
perishables supply chains. If you open up the box of iMotion software, load it a computer, and
run the program, you will not have an RFID System. You need hardware – passive RFID tags, a
reader, and a server. You need Business Processes to translate what is happening in the real
Adopting each component piecemeal flies in the face of the holistic purpose of an RFID System.
23. Every industry, indeed every organization’s, optimal RFID System is different.
How many readers? Where should they be installed? What products should be tagged? Where
are the bottlenecks? Drawing on years of experience seeing the different ways in which the
iMotion platform was incorporated into an RFID System and deployed in a wide variety of
contexts, GlobeRanger sought to develop a true end-to-end solution that could be adapted to
different business processes, depending on the customer (the “GlobeRanger’s RFID Solution”).
24. In the end, this initial piecemeal approach was a good thing. Since GlobeRanger
developed iMotion with the knowledge that it would have to be adapted to hardware, technology,
and legacy IT systems developed by multiple parties, GlobeRanger engineers were adept at
25. The GlobeRanger RFID Solution is a true chameleon, and can be quickly adapted
to suit any customer’s needs. The GlobeRanger RFID Solution is used to track crime scene
evidence in Holland. The GlobeRanger RFID Solution monitors the removal of hazardous
materials from a nuclear site in Tennessee. The GlobeRanger RFID Solution knows just where
“your dollop of Daisy” sour cream is between farm and market. The GlobeRanger RFID
Solution at a Walmart vendor even works in concert with Walmart’s bespoke internal RFID
Systems.
GlobeRanger can take its RFID Solution and adapt and deploy it within an enterprise – any
2008, GlobeRanger had virtually no real competitors in the passive RFID market – particularly
in an industry that had the wherewithal and desire to implement RFID on a massive scale:
government.
28. In 2004, the United States Department of Defense (“DOD”) issued a mandate for
each of its agencies and military services to implement passive RFID technology. The mandate
was unfunded, which meant that contractor selections and implementation would be made at the
29. Once GlobeRanger achieved success with the GlobeRanger RFID Solution and
the branches of the military and DOD agencies began to allocate funds to comply with the
passive RFID mandate, GlobeRanger obtained several agency and military service branch
contracts. GlobeRanger is now the enterprise standard for the Defense Logistics Agency.
GlobeRanger is the enterprise standard for the entire Air Force. GlobeRanger won contracts
from the U.S. Marine Corp, the Army, and was quickly deployed to initial sites.
30. GlobeRanger was a resounding success throughout the DOD. It had an adaptable
system that could be quickly customized. GlobeRanger proved that the GlobeRanger RFID
Solution was not just a chameleon that could move from tracking a murder weapon to
monitoring fish, the GlobeRanger RFID Solution could communicate with and among the highly
specialized and varied existing IT systems used by the U.S. military and defense agencies.
32. As companies and their IT systems have become complex and multi-layered, they
that marketed a platform for enterprise consolidation by the same name, had a dominant market
or more enterprise systems that moves data back and forth. For example, if a company seeks to
more efficiently and accurately target its marketing, middleware can be used to make its
customer database exchange information with its ordering system. Middleware is a base – like a
personal computer’s operating system. Like iMotion, you cannot open a box and install
webMethods and expect seamless communication with your existing IT systems. Rather, to
make webMethods work with the existing systems, consultants provide business process
consultants learned, over time, the most optimal way to incorporate webMethods into a retailer, a
health care company, a government agency, and a wide variety of other enterprises.
33. In April of 2007, Software AG purchased webMethods for more than a half a
billion dollars. WebMethods was worth so much because it is literally everywhere – in every
industry, every sized enterprise. WebMethods consultants had a deep bench of experience
developing business processes and layering solutions on top of webMethods across these
enterprises. Given the widespread use of webMethods, if Software AG could develop additional
solutions to layer on top of the webMethods base, Software AG had an enormous built-in market
just from the existing webMethods and business process management client base.
the acquisition, webMethods solutions had been developed for virtually every type of enterprise.
If Software AG could add an RFID solution to webMethods, Software AG would hit a massive
home run – making hundreds of millions of dollars from its business process management
services. RFID was an incredible opportunity to maximize returns on its half a billion-dollar
acquisition.
35. But even with this incredible opportunity, even with Software AG’s near-limitless
resources, and even with other large enterprises, such as Walmart, achieving the holy grail, a
year after the acquisition, Software AG did not have an RFID Solution on the market.
36. GlobeRanger purposefully made the GlobeRanger RFID Solution adaptable and
customizable to suit a given enterprise’s needs. Its platform, iMotion, was developed
specifically for RFID and adapted easily to new business process, architecture, and deployments.
GlobeRanger made a chameleon, an RFID Solution that could be dropped in anywhere, anytime.
Development was difficult and costly – GlobeRanger invested over a decade of research and
development and tens of millions of dollars to develop its versatile RFID Solution.
37. Conversely, Software AG’s platform, webMethods, was not developed for RFID.
Rather, RFID was an afterthought. It did not adapt easily to RFID business processes,
architecture, and deployments. Software AG had to not only create an RFID Solution, it needed
an RFID Solution that worked with the webMethods platform if it was going to take advantage
38. Software AG’s acquisition of webMethods occurred in April of 2007. That meant
Software AG had years of research and development ahead of it before it would have a working
RFID Solution. Software AG had just spent a half a billion dollars. It had to show returns on
espionage.
E. Naniq and Main Sail Gain Access to GlobeRanger’s RFID Solution and Sign
GlobeRanger’s End User Agreement.
39. The DOD mandate for the implementation of RFID was an “unfunded mandate.”
The significance of a mandate being unfunded is that contractors vie for many small to medium
contracts at the agency and military service branch level, and contracts are funded out of general
40. As the various customers that make up the DOD awarded their passive RFID
contracts, GlobeRanger stood alone, winning Defense Logistics Agency, Air Force, Marine,
Army, and Navy contracts. No competitor was in a position to catch up. If the barriers to entry
to the passive RFID market are many, the barriers to entry for the government passive RFID
contracts are nearly insurmountable. In addition to the considerable technical challenges, there is
a very long, very slow pay off for government contracts. There are months or even years of
working on the pursuit, presenting up the chain of command, and then months or even years of
pilot programs and testing. The reward is often multi-year contracts that require considerable
consults, and provides IT service support. Main Sail does not research, develop, or produce
technology.
42. Main Sail learned of GlobeRanger and its transformative technology in late 2005
when GlobeRanger and Main Sail worked on a project for the implementation of passive RFID
at the Navy’s Bangor, Maine site. Jack Rhyne, from Main Sail, was involved in the Bangor
RFID implementation project. GlobeRanger set up a server at Bangor with its iMotion software,
consults, and provides IT service support. Naniq does not research, develop, or produce
technology.
44. In 2007, Kim Gray, who serves as the Director of Defendant Naniq, worked with
GlobeRanger on a Defense Logistics Agency project in Alaska, which was another GlobeRanger
success.
45. GlobeRanger continued its dominance in the DOD. In 2006, the DLA and
adopted GlobeRanger across the board. The Air Force began substantial deployments of a
GlobeRanger RFID Solution (the Air Force would also adopt GlobeRanger enterprise-wide as of
2009). The Army and the Marine Corps awarded development contracts, and GlobeRanger
began deployments at Army and Marine Corps. All of these deployments were done in the midst
of two wars. When it came to seamless integration of RFID technology to get supplies to our
46. GlobeRanger also began to roll out the GlobeRanger RFID Solution adapted
specifically for the Navy (the “GlobeRanger Navy Solution”). The Navy contract would be by
far the largest client at the DOD. The Navy has more than 700 worldwide sites. The Navy
intended to use passive RFID to facilitate the supplying of these sites, the shipment of materials
to war zones, and the loading and unloading of city-size aircraft carriers. The GlobeRanger
Navy Solution was initially deployed at six Navy sites and received multiple commendations for
Identification Technology office (“Navy AIT”). Navy AIT Project Manager Bob Bacon was in
charge of the program. As the Navy’s passive RFID program progressed, a small player, Naniq,
began to gain considerable influence over Bob Bacon, who awarded a contract to Naniq to
48. In July of 2008, the Navy AIT planned to implement Enterprise Resource
Planning – or ERP. As part of its next generation, or NGEN (next generation) project, the Navy
49. The Navy’s Naval Supply (“NAVSUP”) Chief Information Officer, had thought
ahead as to how this future implementation of ERP would affect existing programs. The Navy’s
RFID system needed to be able to support both the Navy’s legacy IT systems and transition to a
new ERP Solution, such as Oracle and SAP, in the future. This is exactly what the GlobeRanger
50. The introduction of ERP meant that the Architecture of the GlobeRanger RFID
development and concomitant sleepless nights, testing, reviewing, and preparing a deck
(Powerpoint presentation) to present to the Navy. Once the go-ahead was given on the new
Architecture, GlobeRanger was prepared to begin rolling out deployments to the Navy’s 700
51. In August of 2008, GlobeRanger traveled to Navy AIT to present the results to
Bob Bacon. A copy of the briefing was given to Bob Bacon and to the two prime contractors for
the Navy IT, CACI and SAIC. After the presentation, GlobeRanger was expected to present up
52. For ten years, GlobeRanger and its employees were singularly focused on
perfecting cutting-edge, transformative RFID technology for its customers. In August 2008,
they were the star of the DOD’s passive RFID mandate and on the cusp of its largest opportunity
to date – the Navy contract. But then, GlobeRanger found itself in the midst of a civil conspiracy
B. The Sex.
53. Kim Gray at Naniq was unusually successful at winning Navy AIT contracts for
Naniq. She was also having an improper relationship with Bob Bacon, the married head of Navy
AIT.
54. Just a week after GlobeRanger presented its research for a new Architecture to
Bob Bacon and handed Bob Bacon a copy of their presentation, Kim Gray from Naniq and Jack
Rhyne from Main Sail, two companies that re-sold third party software and provided help lines
for day-to-day support of systems built and deployed by others, were inexplicably in possession
of an RFID system Architecture for one of the most complex enterprises in the world – the
55. Despite the fact that GlobeRanger was deployed with massive success across the
DOD, Naniq and Main Sail, with the knowledge and consent of Bob Bacon, instead turned to
Software AG, who did not even have a commercial RFID Solution at the time, to build the
56. In February of 2009, a year and a half after the webMethods acquisition,
GlobeRanger – had RFID technology adapted for military use deploying throughout the
Department of Defense. The German government was determined to not let its private and
military sectors fall behind. Illustrating how critical RFID technology is becoming to world
commerce and military readiness, the German government created and funded ADiWa (Allianz
Digitaler Warenfluss).
58. ADiWa is a research consortium that includes the two largest software companies
in Germany, SAP and Software AG, as well as academics and various military and civil agencies
of the German government. The ADiWa website explains that the purpose of the public-private
consortium is to “fill in the gaps of knowledge” in order to closely integrate objects and products
describes Software AG’s main contribution to the ADiWa consortium as “RFID applications.”
Executive Committee member, Dr. Peter Kürpick, was on hand to receive the German
government’s notice of approval for ADiWa. As Chief Product Officer, Dr. Kürpick was in
charge of Software AG’s blockbuster product webMethods. He already had a mandate from the
company to develop and commercialize an RFID solution that would work with webMethods.
Now he had even more pressure – a mandate from the German government to contribute RFID
61. Just a few months later, in May of 2009, Software AG stepped from the shadows
to pursue a contract from Navy AIT to develop an RFID solution for the Navy, with Naniq and
time. In press releases from 2009, Software AG tells prospective clients it was envisioning the
future development of passive RFID for 40 foot by 10 foot shipping containers. Meanwhile, at
the same time, GlobeRanger’s RFID Solution was able to track an order of 10,000 individual
products within a container and report the location of each in the supply chain from the
warehouse in the United States to the soldier in Afghanistan. Software AG was years behind
GlobeRanger. And yet in May of 2009, Bob Bacon issued the Navy AIT purchase order to
Software AG.
62. For Software AG, this initial purchase order was less about the money to be
earned from the US Navy. It was more about the opportunity to be gained – an opportunity to
63. Kim Gray was also involved with a man at Software AG. Whether Ms. Gray
entered her relationship with Mr. Bacon to obtain concessions for both Naniq and Software AG
or whether these are just two unrelated affairs resulting in the granting of multi-year government
contract worth millions of dollars is a question that will have to be resolved through discovery.
Perhaps the Software AG affair was initiated in order to obtain the RFID contract concession
64. The harm that came from these illicit affairs and the improper influence of
Defendants over Navy AIT was not just harm to GlobeRanger. GlobeRanger had a passive
RFID product. GlobeRanger had an RFID Solution for the Navy. GlobeRanger had been
successfully tested at six Navy sites. GlobeRanger had the specialized knowledge it would take
to deploy at 700 Navy sites around the world within 60-90 days. Despite these qualifications,
despite the fact that the country is in the midst of two wars, Software AG, with no passive RFID
65. The U.S. Subs are the sales and marketing representatives of Software AG –
Germany in the United States. The U.S. Subs exist and conduct their activities solely for the
benefit of Software AG – Germany. The U.S. Subs’ operations are controlled by Software AG –
Germany. Software AG centralized its global products line under the Chief Product Officer in
Germany, Dr. Peter Kürpick. Software AG centralized its research and development under its
board, strategy, sales, marketing, research and development of webMethods and an RFID
66. These same centralized heads of products and research and development are
actively involved with ADiWa, and deal directly with ADiWa’s corporate, civil governmental
67. GlobeRanger’s RFID Solution, adapted for U.S. military use, was exported to
Germany and has been or will be handed over to SAP, the German government, the German
military, and any other government, military, or corporation that these parties decide to sell it to.
68. In any event, Kim Gray’s relationship with Bob Bacon did not end well. Bob
Bacon apparently subjected Kim Gray to harassment; perhaps the change of heart resulted from
his discovery of the Software AG relationship. Kim Gray sought protection from the authorities.
D. The Lies.
69. Before Kim Gray’s relationship with Bob Bacon soured, he set up a special lab at
Navy AIT in Mechanicsburg, Pennsylvania. Software AG, Naniq, and Main Sail began to work
70. Secreted away in the lab with the other co-conspirators, Software AG set out to
develop a passive RFID Solution that would work with its webMethods platform. Software AG
was at point zero. Software AG had no RFID solution when it obtained the Navy contract in
May of 2009. It had taken GlobeRanger a decade to develop the GlobeRanger RFID Solution.
Yet Software AG had, incredibly, agreed to develop its own in a matter of months. Software
AG thought it could make this timeline because it had already agreed with Naniq, Main Sail, and
71. Software AG sought to use webMethods, presumably to realize a return on its half
billion-dollar acquisition. But webMethods was fickle, and it was not developed for RFID like
GlobeRanger’s iMotion platform. It had taken GlobeRanger a decade to develop iMotion. But
again, Software AG had preternatural confidence in its ability to transform webMethods into an
RFID platform. The preternatural confidence came from its agreement with Naniq, Main Sail,
and Bob Bacon to obtain illegal access to peer inside of GlobeRanger’s iMotion platform.
72. The Defendants obtained access to the GlobeRanger RFID Solution through a
series of lies. On August 12, 2009, the Defendants caused Bob Bacon to request iMotion license
73. In reliance upon the representations that the license keys would be used for a
lawful purpose and in accordance with GlobeRanger’s EULA, GlobeRanger provided the
iMotion license keys. GlobeRanger was not, however, without its suspicions.
use of any GlobeRanger license keys or software shall be limited to the direct support of Navy
AIT’s existing installation of GlobeRanger software and for no other purpose and otherwise
subject to the terms of the GlobeRanger EULA, which is attached hereto as Exhibit A and
incorporated by reference; and (ii) upon the termination of Naniq’s support contract with respect
to Navy AIT’s installation, Naniq shall return, delete or destroy all such software and related
75. Naniq, through its support contract for Kaneohe Bay, a GlobeRanger Navy site,
had access to the GlobeRanger Navy Solution at that location (the “K-Bay Solution”).
GlobeRanger subsequently discovered that Defendants and their co-conspirator, Bob Bacon,
loaded a copy of the K-Bay Solution on a laptop, in violation of the GlobeRanger EULA.
76. While copying an image of the K-Bay Solution onto an unauthorized laptop is
technically possible, the image itself is useless. GlobeRanger had protections against access to
its confidential and trade secret information. The image of the K-Bay Solution was useless
without an iMotion license key. License keys are server-specific, and cannot be transferred from
77. As described above, through the Defendants’ August 12, 2009 lie, Defendants
circumvented these additional protections by acquiring the iMotion license keys under false
pretenses. Once the license key was installed, the K-Bay Solution went live on the laptop.
Defendants did not just have a copy of iMotion to look at, they had stolen and lied their way into
having access to a live, customized GlobeRanger RFID Solution. Defendants could peer at the
Business Processes, see the solution’s architecture and see how it was deployed at a specific site.
continued unabated for several months. At this point, the GlobeRanger Navy Solution could
have been deployed enterprise-wide across the Navy. The Defendants had caused the money
that should have gone to GlobeRanger Navy deployments to be misdirected to Software AG.
79. Software AG, a large German corporation, was receiving a U.S. government
subsidy to steal technology from a U.S. company and supply it to the German military, civil, and
corporate members of the ADiWa consortium. With this subsidy and at the expense of the
impact their actions on U.S. troops fighting two wars, Software AG would make hundreds of
millions of dollars. For their participation, Naniq and Main Sail will be awarded with millions of
dollars in support contracts and potentially tens of millions of dollars in re-seller licenses and
80. In January 2010, another lie resulted in the acquisition of GlobeRanger trade
secrets. Bob Bacon, on behalf of Defendants, falsely represented that Navy AIT required
GlobeRanger’s data dictionary, again ostensibly for support of GlobeRanger sites. A data
GlobeRanger, in reliance on the representations of Bob Bacon, sent portions of the data
dictionary.
81. Defendants then not only had access to GlobeRanger’s K-Bay Solution, but they
had also had gained unlawful access to GlobeRanger’s data dictionary and workflows,
information that would tell Defendants how the GlobeRanger Navy Solution and GlobeRanger’s
iMotion middleware were interrelated. As shown by the passages of many months since they
obtained their unlawful access to the K-Bay Solution, Software AG could not simply copy the
software and start rolling out at Naval Bases around the world. Software AG needed months to
Processes, and how it was deployed in a real world setting. Defendants had access to the sites
where GlobeRanger was installed. Defendants could see how GlobeRanger went about actually
deploying on site, how it set up its readers, how it tagged its product, how it incorporated
business processes into the design of the warehouse, and how it had trained the sailors.
82. Defendants used this improperly procured information to set up their lab.
Defendants installed an RFID reader, tagged product, and hooked it up to the GlobeRanger
iMotion server. Software AG could now poke and prod at will. As a result of their improper and
indeed unlawful acquisition of GlobeRanger’s trade secret information Defendants took a giant
leap, and began to test a Software AG Navy solution that included webMethods middleware.
83. Software AG did not have an RFID product in May of 2009. It took GlobeRanger
a decade and tens of millions of dollars to create their RFID System. It took Defendants,
the time – a 10x head start. And the Defendants had tricked the U.S. government, the U.S.
84. In April of 2010, GlobeRanger’s worst fears were confirmed: its decade of work,
its ultra-dominant position in the government market, its chameleon-like RFID Solution that had
the promise of becoming the next half a billion dollar acquisition target of a multi-national
E. The Audiotape.
85. On April 16, 2010, Bob Bacon participated in a panel discussion with other DOD
personnel at an annual RFID conference. It was no secret that Software AG had never
successfully developed an RFID solution for webMethods – unbelievably, the Navy, which
guinea pig. Given the absence of any track record for Software AG and the enormous stakes for
the troops deployed overseas to get this right, Bob Bacon was asked how webMethods could
even be trusted to properly translate each reading of each tag to the Navy’s complicated existing
86. After that statement, there was laughter from Bob Bacon and a few individuals,
and exclamations of surprise from others. Government contractors do not like the idea of having
their technology stolen by their peers. One of the meeting’s attendees quickly handed the
87. While Kim Gray’s relationship with Bob Bacon eventually ended, her relationship
with Software AG has been solidified and strengthened. They are now actively marketing the
88. In April of 2010 – shortly after the Defendants’ co-conspirator was caught on tape
admitting the theft – Software AG sponsored the 2010 Supply Chain Summit in Dallas, Texas.
Software AG and Kim Gray told attendees, who were customers, potential customers, and
market peers of GlobeRanger, that the Defendants had developed the Navy RFID Solution.
Software AG and Naniq used these misrepresentations and false attributions to gain an unlawful
89. As the sponsor of the summit, Software AG key personnel such as Software AG
Sr. Vice President and General Manager Bruce Williams and Dave Brooks, Software AG Senior
90. Software AG’s stolen RFID Solution was showcased in Kim Gray’s presentation
“Navy AIT & Asset Visibility Efforts: A Comprehensive Plan Forward.” Kim Gray and
Software AG falsely represented that the Navy’s passive RFID system was “the only [passive]
RFID enterprise system in industry today,” when in fact GlobeRanger was deployed across a
large spectrum of enterprises, and had been operating enterprise-wide, with multiple
commendations, at the DLA for years. Software AG and Ms. Gray sought to mislead
prospective and current customers and peers of GlobeRanger that Software AG was on top in
passive RFID systems for the government, when in fact the Marine Corps and Army were in the
process of adopting GlobeRanger, not Software AG, at that time, and Software AG had only
obtained their contract through unlawful means and at great expense to our service members.
91. Software AG had used the Navy to steal a passive RFID Solution from
GlobeRanger for commercial gain. On the conference agenda, available on Software AG’s 2010
AG used the Navy once more, falsely representing Kim Gray as “Kim Gray, Compliance
Officer, U.S. Navy,” when in fact Kim Gray is not an employee of the U.S. Navy and does not
92. Software AG – Germany directed and controlled this false marketing effort.
confidential and trade secret information of GlobeRanger through improper means and use this
information to knock GlobeRanger out of its superior market position in the government passive
RFID market and to enrich Defendants. Further, the Defendants and their co-conspirators
direct violation of GlobeRanger’s EULA provisions. The length of time that this has been
ongoing and the continued, ongoing involvement of Defendants indicate that this is a deliberate,
determined action amongst all of the parties. The admission – and laughter following – the
admission of the theft show that the Defendants were acting with malicious intent. As a result
of their unlawful conduct, Defendants gained a proprietary advantage with respect to the Navy
AIT contract, government RFID contracts and the RFID market in general.
V. DISCOVERY
94. Pursuant to Texas Rule of Civil Procedure 190.4, Plaintiff requests that the Court
96. Plaintiff owned certain trade secrets, including but not limited to its architecture,
1
All internet traffic for the U.S. Subs and webMethods is automatically redirected to Software AG – Germany’s
website.
contractual relationship with Plaintiff, after acquiring the trade secret by improper means, or
after acquiring the trade secret with notice that the disclosure was improper.
Plaintiff.
99. Plaintiff is further entitled to exemplary damages pursuant to Texas Civil Practice
& Remedies Code § 41.003(a), as the harm with respect to which it seeks recovery results from
COUNT II – CONVERSION
101. Plaintiff owned and had a legal entitlement to possession of its property.
dominion and control over Plaintiff’s property inconsistent with Plaintiff’s rights as owner.
Plaintiff.
105. Plaintiff is further entitled to exemplary damages pursuant to Texas Civil Practice
& Remedies Code § 41.003(a), as the harm with respect to which it seeks recovery results from
Plaintiff.
109. Plaintiff is further entitled to exemplary damages pursuant to Texas Civil Practice
& Remedies Code § 41.003(a), as the harm with respect to which it seeks recovery results from
COUNT IV – CONSPIRACY
111. Defendants entered into a combination to engage in fraud against Plaintiff for
their own personal gain. Defendants had a meeting of the minds with respect to those unlawful
purposes and committed one or more overt acts to further the conspiracy.
112. Defendants’ tortious conduct is also a direct and proximate cause of damages to
Plaintiff.
113. Plaintiff is further entitled to exemplary damages pursuant to Texas Civil Practice
& Remedies Code § 41.003(a), as the harm with respect to which it seeks recovery results from
115. Plaintiff had a valid contract(s) with Navy AIT, including but not limited to the
EULA.
116. Defendants willfully and intentionally interfered with the contract(s), without
privilege to do so.
117. Plaintiff incurred actual damage or loss due to breach of the contract(s).
118. Defendants’ tortious conduct is also a direct and proximate cause of damages to
Plaintiff.
119. Plaintiff is further entitled to exemplary damages pursuant to Texas Civil Practice
& Remedies Code § 41.003(a), as the harm with respect to which it seeks recovery results from
VII. PRAYER
judgment against Defendants Software AG, Software AG USA, Inc., Software AG, Inc., Naniq
Systems, LLC and Main Sail LLC on all counts, and award it:
e. Such other and further relief, at law or in equity, to which it may be justly
entitled.
_________________________________
Kerry C. Peterson
Texas State Bar No. 24012195
[email protected]
Matthew D. Rinaldi
Texas State Bar No. 24033122
[email protected]
4514 Cole Avenue, Suite 1250
Dallas, Texas 75205
Telephone: (214) 628-9500
Facsimile: (214) 628-9507