As I started to look through the hard drives of computers I found a chain of the network and how all the computers were routed through one in the back room. This computer had the side of the case off of it with a box of software sitting beside it. The guts were exposed and an additional hard drive was mounted inside of it. I started eliminating possibilities of my paranoia one by one and noticed that I couldn't eliminate any computers from this process. For example, Macs are not known for being computers that people can easily install and execute spyware on. But as I looked I noticed a program on all the macs that showed every single screen shot of each mouse click throughout the entire day. Essentially the co-worker, Mike, could see anything I did on this machine all day long.
I then started digging into my computer and my e-mail. I thought at least my e-mail is safe. I found that my inbox had been cloned and that there was an unnamed additional user who had access to my e-mail. I deleted all the users except myself. Well at least I thought I had deleted all the other users until I noticed that every time I received an e-mail that a beep went off on my co-workers phone who sat in the cubicle beside me. I must be imagining things, I will do a test and send myself an e-mail I thought. As soon as the e-mail came in I heard the co-workers phone beep again. I'M RIGHT, I'm not imagining this.
Are you kidding me? I knew something wasn't right. I felt like the manger was in on it and I couldn't send any e-mails to HR as they had my e-mail cloned and would see what I sent. Doing the right thing was to gather the evidence and make an appointment to go to HR. I resigned as the Assistant Manager while building my case as I felt at the time this would show that I didn't want any part of this. I wanted to go back to just being an average worker as the stress of having a co-worker undermine me for a position that I deserved and he undeservedly wanted, was not worth my health. I have learned throughout my career stress can do bad things to one's body. By the time I got to HR and told them the story, they accused me of doing this for spite because I didn't do it while I was the Asst. Manager. Wait a minute, what about checking the computers first before listening to me about something an INSURANCE company would be liable for?
I could see that I was being railroaded. I invited the IT people to come and look at the history of the computers. They showed up one day and Mike was clearly nervous. They interviewed he and I independently of each other. I explained that he had switched out my computer with another one and I knew this because I had different desktops on each one and the desktop was the one from the other room. Why would someone want to exchange computers from another room in the first place? Mine wasn't broken. They looked at the User group and said no additional user was granted permissions. I explained that I deleted him as a user because I didn't want him to see my e-mails. They told me I should not have done that. I lost the proof. I was just trying to save my sanity. I didn't think about having to prove this as I was just trying to alleviate the espionage. They told me they couldn't find any evidence and left.
The next day I took a photo of the additional hard drive on the computer that Mike had all apart in the back room and was gaining access to at night. I waited until lunch time and sent an e-mail to IT and HR with the attached photo and explained that this is how he was doing it. When I returned from lunch, the computer case was put back together and the hard drive and additional software removed from the computer. So the computer had been like this for over sixty days and just miraculously within one hour of me sending photos and an e-mail proving the hardware and software existed enabling him to do what I had accused him of doing, the hardware and software suddenly disappeared?
Within two weeks, they notified us that the offsite facility was being closed. We were losing our jobs. I'm sure this was already in the works, I just moved the decision along a little faster. I now know that going to HR in big corporations will not make a difference unless you have a Mentor who can help you outside the department. Preferably it would be your manager but as you see, it is not always possible. When you don't have the support of your manager, you might as well find another job. This I learned through experience. Going around the manager only makes it look like you are not a "team" player. The false logic is that there is a real "team" at all in the beginning. I know there is no I in team but there is not I in "sabotage" either.
Sometimes knowing you are right is the only right thing to happen in this situation. The more you try to explain, the crazier you begin to sound. People who don't understand computers start to think the person bringing attention to the issue is somewhat paranoid. This is a big reason why I'm currently studying computers and networking security. I'll be able to explain how Mike tried to sabotage me when I'm done as I have kept all the documentation. I may not be able to do anything about that particular situation, but eventually I'll be in a position that I can protect someone else from the same victimization. There may be no "I" in team but there are two "I's" in "victim" and three "I's" in "liability".
Password: i dont have one
password is incorrect