The best evidence you could get is to inspect the last access time of the files in question, or perhaps the last access time of the top-level directory on the file system.
But first, a bit of background. A USB flash drive would be treated by the computer much like a disk. The drive (or, more precisely, the main partition within the drive) would be formatted as a filesystem. Most flash media come formatted out of the box with a VFAT filesystem, which is a lowest-common-denominator solution that works with nearly all devices, including OS X, Windows, Linux, and digital cameras. The next most likely alternatives to VFAT would be HFS+ (the native file system of OS X, which Windows doesn't support at all) or NTFS (the native file system of Windows, supported by any version of Windows released this century, but which has just read-only support in OS X, and is rarely supported on digital cameras).
That background is relevant because different filesystems store the last access time differently. I'm going to work with the assumption that your USB stick is formatted with VFAT. This is important because VFAT filesystems only store the last access date, not the time of day. That would be the best evidence you could hope to collect, assuming that everything else goes right.
To see last access dates in the Finder,
- Switch to List view (View → as List (⌘2))
- Show the View Options dialog (View → Show View Options (⌘J))
- Select "Date Last Opened"
Alternatively, instead of using the Finder, you could use the Terminal to run
stat -x /Volumes/USB-Stick-Name/Path/To/File
to see the Access time of a particular file.
There are some important caveats, though!
First, the act of plugging in the media on your Mac will cause it to be automatically mounted, thus altering the last access time of the top-level directory (and perhaps destroying even more evidence than that). A forensic analysis should require precautions such as mounting the media in read-only mode. Therefore, you would have to suppress the auto-mounting behaviour of OS X, which is not that easy.
Second, your suspected coworker / spy could have taken a similar countermeasure of mounting the media read-only, thus leaving no timestamp as evidence. (There is also no guarantee that the computer that the spy used had its clock set accurately, which would cast doubt on the validity of any timestamp.)
The moral of the story is, if you have any sensitive information to be stored on removable media, encrypt it! The easiest solution would be to use FileVault 2. Note, however, that such encryption would make the USB stick unreadable on any machine other than a Mac.
Best Answer
According to this article (sorry, german only) the iPhone - attached to a wall charger - detects that no data sync is possible and charges with the full specified power (±1000 mA).
Attached to an USB 2 interface (like your Mac) the power is reduced to ±500 mA to not interfere with the data stream.
Now the smart PCBs in USB cables as "SONICable" and "Doubletime" come in: Attached to an USB interface they trick the charging controller by simulating a wall charger on the data lines and the charging power is then increased to > 500 mA again if the interface can deliver that. As mentioned by bmike ♦ USB1/2 is specified with 500 mA and USB3 with 900 mA. But most interfaces have some upwards tolerance and deliver more power than specified and thus decrease charging time.
Due to the non-linearity of the charging process the charging time will NOT be halved though!
The conclusion of the linked (german) post:
In some combination (USB3 - Tablet, not necessarily Apple devices!) charging speed will be increased up to 100%. In most cases the charging speed increase is lower than 100%. Attached to a wall charger no significant speed increase is detected.
To answer your question(s):