Ask a Computer Question, Get an Answer ASAP!
My name is David.
If you use a device, such as a laptop from work, then yes it is possible for them to redirect network traffic from your home to your place of work because they could install programs on a work laptop or device that enables such redirection to occur (such as a VPN service). However, if you do not use any devices from your workplace to connect to WiFi at your home then it is not likely that they are listening to conversations or looking at your home WiFi connections (that would be illegal).
If you have further questions just let me know.
They can access your phone if you connect to their network and also if it is used for work. If they have a BYOD program where you use your mobile for work they can access it.
If they have apps installed on your phone and your phone connects to WiFi then that could be how they do it.
If your laptop is used to connect to networks as your workplace from home, then they could use that connection to gather information.
Police departments vary in their digital forensic capability however if your police department has some good digital forensic people then yes they could prove that people at your work are eavesdropping on you. However to do so they would either need a warrant and probable cause, may be difficult to get in this case, or you could report it and ask them to inspect your laptop or mobile phone for services that listen and/or forward information to your workplace.
You could also use a network capture software such as wireshark to capture transmissions from your laptop and mobile while at home to see if any of the traffic is being sent over the Internet. Of course the phone could also have a service on it that records information and uploads the information every time you go to work.
If she is doing that you need to disable the Bluetooth on your phone. There are spy apps that can suck a massive amount of data from your phone to someone else's phone just by being within 15 or so meters of that phone. It sounds like that is how she is doing it is through a Bluetooth connection to your phone with a spy app on her phone.
Glad I could help.
Also, please provide a positive rating as that is how I receive credit for my work.
Yeah, I would as well. That's very shady and the IT folks should have detected that that app is on her phone.
Tough to fight that one - would need the ear of an insider on the board of directors that doesn't like her - or something similar - to out leverage her.
That's crazy! Based on your description I'm positive it has to be a Bluetooth app on her phone. Probably bought it online and installed it just for this purpose. It's very common. Turning off your phone, or at least disabling Bluetooth, in crowded public places is what many people do just for this reason.
There is an information security conference called Black Hat Briefings that is held every year at various locations around the world. One rule all attendees adhere to is never bring any electronic device, powered on or not, into the conference, because your data will get stolen. What she is using is a technique hackers have used for years that has developed into a mainstream spy app.