Point Lookout: a free weekly publication of Chaco Canyon Consulting
Volume 16, Issue 12;   March 23, 2016: Backstabbing

Backstabbing

by

Much of what we call backstabbing is actually just straightforward attack — nasty, unethical, even evil, but not backstabbing. What is backstabbing?
Erich Friedrich Wilhelm Ludendorff (1865-1937) was a German general and politician

Erich Friedrich Wilhelm Ludendorff (1865-1937) was a German general and politician. He is credited with popularizing the "stab-in-the-back" myth explaining the unbalanced terms of the Treaty of Versailles, a position that led him to affiliate with right-wing politicians and eventually the Nazi Party. See Wheeler-Bennett, John W. "Ludendorff: The Soldier and the Politician," Virginia Quarterly Review 14: pp. 187-202, for an account of the 1919 incident that led Ludendorff to adopt the stab-in-the-back metaphor to make his case to the German people. The non-hyphenated English word, backstabbing, didn't appear until about 1925. Photo courtesy U.S. Library of Congress.

Probably because just about anyone can do it, backstabbing is perhaps the most common form of workplace aggression. The art, of course, lies in executing the aggression undetected. When things haven't gone as well as you expected, almost certainly, once in a while, Chance or Misfortune were not the only cause. A backstabber might have been involved. Let's take a close look at backstabbing — what it is, what it isn't, and how it's done.

The fundamental elements of backstabbing are aggression and deception.

Aggression
An interaction can be backstabbing if one person, the attacker, mounts an attack on another, the target. The attack isn't physical, but it must be a genuine attempt to harm the target's social or professional position or prospects, or to deprive the target of something the target desires or needs. The attack can be backstabbing even if it it's unsuccessful.
Deception
By concealing preparations, by lying or other disinformation, or by "false flag" conduct, the attacker deceives the target. False flag conduct is that which is intended to create a false belief that the relationship between attacker and target is friendly. Typically, attackers pretend to befriend their targets, or to mentor their targets, or to be disinterested in their targets. By whatever means, the attacker leads the target to believe that no attack is imminent, that the attacker isn't preparing an attack, or that the attacker would never even consider attacking the target.

Some definitions of backstabbing require that the attack occur outside the target's awareness, such as by spreading rumors or lying to third parties in secret. But a direct attack on the target at a meeting, for example, could also be backstabbing if, for instance, the attacker led the target to expect the attacker's support for the target's views in that meeting.

Here are more examples of backstabbing tactics.

Disclosing confidences
The attacker By concealing preparations, by
lying or other disinformation,
or by "false flag" conduct, the
attacker deceives the target
promises to honor a confidence, planning to disclose it later to harm the target.
Withholding helpful information
The attacker intentionally withholds information from the target so as to cause harm. This tactic is deniable: "I was going to tell you tomorrow," or, "I thought you knew."
Exaggerating
The attacker intentionally distorts or exaggerates a report of an event or situation so as to cause harm.
Lying
The attacker makes or supports claims that he or she doesn't believe, and which are harmful to the target. See "The Costanza Matrix," Point Lookout for March 16, 2016, for more about lies.
Stealing or misallocating credit
The attacker claims credit for the target's contributions, or abets illegitimate claims of others to some of the target's contributions.
Shifting accountability
When something goes wrong, the attacker arranges for the target to be held accountable, whether or not the target had any role in the failure.
Fomenting backstabbing
The attacker encourages others to engage in any of the tactics above.

When attacked, try to determine whether the attacker used deception. If so, respond with care. Other undetected deceptions might remain active, ready to foil any response you might hastily choose. Go to top Top  Next issue: Still More Things I've Learned Along the Way  Next Issue

303 Secrets of Workplace PoliticsIs every other day a tense, anxious, angry misery as you watch people around you, who couldn't even think their way through a game of Jacks, win at workplace politics and steal the credit and glory for just about everyone's best work including yours? Read 303 Secrets of Workplace Politics, filled with tips and techniques for succeeding in workplace politics. More info

Your comments are welcome

Would you like to see your comments posted here? rbrenHZAHoQxAnjOsgygcner@ChacviEdlciBqPhiPPpVoCanyon.comSend me your comments by email, or by Web form.

About Point Lookout

Thank you for reading this article. I hope you enjoyed it and found it useful, and that you'll consider recommending it to a friend.

Point Lookout is a free weekly email newsletter. Browse the archive of past issues. Subscribe for free.

Support Point Lookout by joining the Friends of Point Lookout, as an individual or as an organization.

Do you face a complex interpersonal situation? Send it in, anonymously if you like, and I'll give you my two cents.

Related articles

More articles on Conflict Management:

Lion, ready to spring, in Samburu National Reserve, KenyaUsing Indirectness at Work
Although many of us value directness, indirectness does have its place. At times, conveying information indirectly can be a safe way — sometimes the only safe way — to preserve or restore well-being and comity within the organization.
Freeway damage in the 1989 Loma Prieta, California, EarthquakeManaging Pressure: The Unexpected
When projects falter, we expect demands for status and explanations. What's puzzling is how often this happens to projects that aren't in trouble. Here's Part II of a catalog of strategies for managing pressure.
Rabin and Arafat shake handsCommunication Templates: I
Some communication patterns are so widely used that nearly everyone in a given cultural group knows them. These templates demand certain prescribed responses, and societal norms enforce them. In themselves, they're harmless, but there are risks.
HMS Latimer during her first cable-laying run from Shanklin to CherbourgThe Advantages of Political Attack: I
In workplace politics, attackers sometimes prevail even when the attacks are specious, and even when the attacker's job performance is substandard. Why are attacks so effective, and how can targets respond effectively?
Wilson's Bird-of-paradiseNew Ideas: Judging
When groups work together to solve problems, they eventually evaluate the ideas they generate. They sometimes reject perfectly good ideas, while accepting some really boneheaded ones. How can we judge new ideas more effectively?

See also Conflict Management and Workplace Politics for more related articles.

Forthcoming issues of Point Lookout

A review meetingComing December 13: Reframing Revision Resentment: II
When we're required to revise something previously produced — prose, designs, software, whatever, we sometimes experience frustration with those requiring the revisions. Here are some alternative perspectives that can be helpful. Available here and by RSS on December 13.
Raquel Welch (left) and Gilda Radner (right) from a @Cite{Saturday Night Live rehearsal, April 24, 1976And on December 20: Conceptual Mondegreens
When we disagree about abstractions, such as a problem solution, or a competitor's strategy, the cause can often be misunderstanding the abstraction. That misunderstanding can be a conceptual mondegreen. Available here and by RSS on December 20.

Coaching services

I offer email and telephone coaching at both corporate and individual rates. Contact Rick for details at rbrenWYLjAcRbZYrpxGbcner@ChacvXlSyUzImpwMeNhpoCanyon.com or (617) 491-6289, or toll-free in the continental US at (866) 378-5470.

Get the ebook!

Past issues of Point Lookout are available in six ebooks:

Reprinting this article

Are you a writer, editor or publisher on deadline? Are you looking for an article that will get people talking and get compliments flying your way? You can have 500 words in your inbox in one hour. License any article from this Web site. More info

Public seminars

Person-to-Person Communications: Models and Applications
When Person-to-Person Communications: Models and Applicationswe talk, listen, send or read emails, read or write memos, or when we leave or listen to voice mail messages, we're communicating person-to-person. And whenever we communicate person-to-person, we risk being misunderstood, offending others, feeling hurt, and being confused. There are so many ways for things to go wrong that we could never learn how to fix all the problems. A more effective approach avoids problems altogether, or at least minimizes their occurrence. In this very interactive program we'll explain — and show you how to use — a model of inter-personal communications that can help you stay out of the ditch. We'll place particular emphasis on a very tricky situation — expressing your personal power. In those moments of intense involvement, when we're most likely to slip, you'll have a new tool to use to keep things constructive. Read more about this program. Here's a date for this program:

Ten Project Management Fallacies: The Power of Avoiding Hazards
Most Ten Project Management Fallaciesof what we know about managing projects is useful and effective, but some of what we know "just ain't so." Identifying the fallacies of project management reduces risk and enhances your ability to complete projects successfully. Even more important, avoiding these traps can demonstrate the value and power of the project management profession in general, and your personal capabilities in particular. In this program we describe ten of these beliefs. There are almost certainly many more, but these ten are a good start. We'll explore the situations where these fallacies are most likely to expose projects to risk, and suggest techniques for avoiding them. Read more about this program. Here's a date for this program:

The Power Affect: How We Express Our Personal Power
Many The Power Affect: How We Express Personal Powerpeople who possess real organizational power have a characteristic demeanor. It's the way they project their presence. I call this the power affect. Some people — call them power pretenders — adopt the power affect well before they attain significant organizational power. Unfortunately for their colleagues, and for their organizations, power pretenders can attain organizational power out of proportion to their merit or abilities. Understanding the power affect is therefore important for anyone who aims to attain power, or anyone who works with power pretenders. Read more about this program.

Follow Rick

Send email or subscribe to one of my newsletters Follow me at LinkedIn Follow me at Twitter, or share a tweet Follow me at Google+ or share a post Subscribe to RSS feeds Subscribe to RSS feeds
The message of Point Lookout is unique. Help get the message out. Please donate to help keep Point Lookout available for free to everyone.
Technical Debt for Policymakers BlogMy blog, Technical Debt for Policymakers, offers resources, insights, and conversations of interest to policymakers who are concerned with managing technical debt within their organizations. Get the millstone of technical debt off the neck of your organization!
Go For It: Sometimes It's Easier If You RunBad boss, long commute, troubling ethical questions, hateful colleague? Learn what we can do when we love the work but not the job.
303 Tips for Virtual and Global TeamsLearn how to make your virtual global team sing.
101 Tips for Managing ChangeAre you managing a change effort that faces rampant cynicism, passive non-cooperation, or maybe even outright revolt?
101 Tips for Effective MeetingsLearn how to make meetings more productive — and more rare.
Exchange your "personal trade secrets" — the tips, tricks and techniques that make you an ace — with other aces, anonymously. Visit the Library of Personal Trade Secrets.