Corporate Menace — Eavesdropping Evelyne
CLASSIFIED
Outsmart Your Toxic Boss™ — HR Division — Confidential
Classified
Personnel
File
SubjectEavesdropping Evelyne
Employee ID9910-EE
Department
Filed By
Submitted to: HR DepartmentApril 2026
Employee 9910-EE
Outsmart Your Toxic Boss LLC — The Corporate Menace™
Classified Personnel File — Eavesdropping Evelyne
Photo on file
Employee ID9910-EE
Hire Date08/30/2014
DepartmentCompetitive Intelligence — Informal Networks Division
ClassificationRESTRICTED
Behavioral Pattern
Ref. Behavioral Code 8.5.2(c)
Employee has built a shadow intelligence operation from a combination of peripheral positioning, strategic social connection, and an uncanny ability to be near conversations she has no business being near. She does not gossip. She invests. Information is currency and Evelyne is running a surplus. Her leverage is invisible until it isn't.
Latest Reported Incident
Incident File #EE-9910
Employee was found to have precise knowledge of a confidential salary negotiation conducted behind a closed door. She deployed this information three days later in a meeting with the same manager, framed as market research. The colleague's negotiating position collapsed. Employee received a raise the following month. When asked how she knew, employee said she had done her research. This is technically accurate.
Status: UNRESOLVED. No one can prove how she found out. This is by design.
HR Recommendation
Conduct sensitive conversations off-site and off-calendar. Use written communication for all negotiations. Treat hallway proximity to Evelyne as a security event.
Assume Evelyne already knows. Operate accordingly.
— HR Division | The representative who filed this report has since left the organization.
outsmartyourtoxicboss.com — The Corporate Menace™
© 2026 Outsmart Your Toxic Boss LLC. All rights reserved. Unauthorized reproduction prohibited.
Outsmart Your Toxic Boss LLC — The Corporate Menace™
Known Aliases
The Peripheral Presence The One Who Already Knows The Research Department
Bureaucratic Risk Assessment
Threat Index — Office of Workforce Integrity
Information Acquisition
9.8
Selective Deployment
9.5
Deniability Index
9.1
Meeting Room Proximity
9.9
Known Associates — Surveillance Log
Identities redacted — cross-reference active case files to unlock
— Villain #5
Observed exchanging intelligence after team events. Scope of arrangement: under investigation.
Suspected
— Villain #13
Confirmed pre-meeting briefings before key one-on-ones. Payment in kind: social access.
Active
— Villain #19
Established information-sharing arrangement. Division of territories suspected.
Active
Documented Research
French & Raven (1959). The bases of social power. Studies in Social Power. [pp.]
Ferris & Kacmar (1992). Information asymmetry as organizational leverage. Journal of Management. [pp.]
(2001). Informal intelligence networks in professional settings. [Institution: ] [pp.]
Full citations available upon request. Requests will be denied.
Overall Threat Rating
Office of Workforce Integrity — Final Assessment
INTELLIGENCE RISK
Reviewed by:
Date:
CASE OPEN — UNRESOLVED
outsmartyourtoxicboss.com — The Corporate Menace™
© 2026 Outsmart Your Toxic Boss LLC. All rights reserved. Unauthorized reproduction prohibited.