Point Lookout: a free weekly publication of Chaco Canyon Consulting
Volume 11, Issue 38;   September 21, 2011: Telephonic Deceptions: II

Telephonic Deceptions: II

by

Deception at work probably wasn't invented at work. Most likely it is a continuation of deception in the rest of life. But the technologies of the modern workplace offer new opportunities to practice the art. Here's Part II of a handy guide for telephonic self-defense.
Duma, a wolf at the UK Wolf Conservation Trust, rolls to capture a scent atop a mound

Nature has many versions of Caller ID spoofing, one of which is most familiar to dog owners. Pictured is Duma, a wolf at the UK Wolf Conservation Trust, as she rolls to capture a scent atop a mound. She's rolling on some aftershave sprinkled on the ground a few minutes earlier. Scent-rolling is believed to be a method for disguising the individual's own scent, as a means of avoiding detection by prey. It provides olfactory camouflage. Photo (cc) by 2.5 Retron courtesy Wikipedia.

Last time we looked at deceptions involved in faking calls, circumventing personal cell phone bans, and borrowing phones. Here is Part II of our catalog of telephonic deceptions.

Faux hang-ups
In these days of frequently broken cellular connections, we've all become accustomed to interrupted conversations. Usually, broken connections are due to malfunctions. But some people have taken advantage of the situation by actually terminating calls they no longer wish to continue. To avoid paying a social price if they do it angrily, they break the connection while they themselves are speaking calmly, as if engaged in the conversation. Their conversation partners then assume that the broken connection is a mishap, but the conversation breakers don't renew the connection, and they don't pick up if their partners try to renew.
Common mistakes: breaking the connection while the other person is speaking, or breaking it while audibly angry.
Background sounds made to order
Background sounds might not be what they seem. You can buy recordings of background sounds from airports, train stations, busy streets, traffic jams, sports events, arguing kids, and more. There are even apps for recording your own custom background sounds, to ensure, for example, that flight number announcements match what they are supposed to be, or that the arguing kids are actually your kids.
Common mistakes: re-using a recorded background sound once too often with the same person, or using a busy airport background when the airport in question is actually closed by weather or mishap.
Caller ID spoofing
Caller ID spoofing In telephone conversations,
background sounds might not
be what they seem
was the key technique used by the hackers working for News of the World. Using a paid service, the call initiator provides two phone numbers — the number to call, and the spoofed caller ID. The service then places the call to the first number in such a manner that it appears to have been originated from the second. This deception can make a call appear to come from a phone different from the originator's phone. Thus, for example, the originator can appear to be calling from work when actually calling from his or her mobile phone. If the originator's work phone is forwarded to his or her mobile phone, not even an immediate callback will unwrap the deception.
Common mistake: failing to control the background sounds of the originator's location well enough to match the location of the spoofed phone.

Caller ID spoofing can present real security concerns. For example, in the News of the World scandal, Caller ID spoofing gave abusers access to voice mailboxes that were not protected by password access. Most voicemail systems do provide this option, but most users never turn it on. Is your voice mailbox protected by a password? First in this series  Go to top Top  Next issue: The Reification Error and Performance Management  Next Issue

303 Secrets of Workplace PoliticsIs every other day a tense, anxious, angry misery as you watch people around you, who couldn't even think their way through a game of Jacks, win at workplace politics and steal the credit and glory for just about everyone's best work including yours? Read 303 Secrets of Workplace Politics, filled with tips and techniques for succeeding in workplace politics. More info

Your comments are welcome

Would you like to see your comments posted here? rbrendPtoGuFOkTSMQOzxner@ChacEgGqaylUnkmwIkkwoCanyon.comSend me your comments by email, or by Web form.

About Point Lookout

This article in its entirety was written by a 
          human being. No machine intelligence was involved in any way.Thank you for reading this article. I hope you enjoyed it and found it useful, and that you'll consider recommending it to a friend.

This article in its entirety was written by a human being. No machine intelligence was involved in any way.

Point Lookout is a free weekly email newsletter. Browse the archive of past issues. Subscribe for free.

Support Point Lookout by joining the Friends of Point Lookout, as an individual or as an organization.

Do you face a complex interpersonal situation? Send it in, anonymously if you like, and I'll give you my two cents.

Related articles

More articles on Workplace Politics:

A harrow in actionWhen Others Curry Favor
When peers curry favor with the boss, many of us feel contempt, an urge for revenge, anger, or worse. Trying to stop those who curry favor probably isn't an effective strategy. What is?
President Harry S. Truman, and Gen. Douglas MacArthur, meeting at Wake Island, 14 October 1950Ground Level Sources of Scope Creep
We usually think of scope creep as having been induced by managerial decisions. And most often, it probably is. But most project team members — and others as well — can contribute to the problem.
Orient quad, photo by George H. Van NormanHow to Deal with Holding Back
When group members voluntarily restrict their contributions to group efforts, group success is threatened and high performance becomes impossible. How can we reduce the incidence of holding back?
What an implicit interrogation can look likeImplicit Interrogations
Investigations at work can begin with implicit interrogations — implicit because they're unannounced and unacknowledged. The goal is to determine what people did or knew without revealing that an investigation is underway. When asked, those conducting these interrogations often deny they're doing it. What's the nature of implicit interrogations?
A fictional tornado striking ManhattanBad Trouble: Misdirection
When Bad Trouble develops at work we have a chance to see what our organizational cultures are made of. Many of our colleagues respond constructively. When they don't, misdirection tactics are popular. Here's a little catalog of misdirection responses.

See also Workplace Politics and Ethics at Work for more related articles.

Forthcoming issues of Point Lookout

A meeting in a typical conference roomComing April 3: Recapping Factioned Meetings
A factioned meeting is one in which participants identify more closely with their factions, rather than with the meeting as a whole. Agreements reached in such meetings are at risk of instability as participants maneuver for advantage after the meeting. Available here and by RSS on April 3.
Franz Halder, German general and the chief of staff of the Army High Command (OKH) in Nazi Germany from 1938 until September 1942And on April 10: Managing Dunning-Kruger Risk
A cognitive bias called the Dunning-Kruger Effect can create risk for organizational missions that require expertise beyond the range of knowledge and experience of decision-makers. They might misjudge the organization's capacity to execute the mission successfully. They might even be unaware of the risk of so misjudging. Available here and by RSS on April 10.

Coaching services

I offer email and telephone coaching at both corporate and individual rates. Contact Rick for details at rbrendPtoGuFOkTSMQOzxner@ChacEgGqaylUnkmwIkkwoCanyon.com or (650) 787-6475, or toll-free in the continental US at (866) 378-5470.

Get the ebook!

Past issues of Point Lookout are available in six ebooks:

Reprinting this article

Are you a writer, editor or publisher on deadline? Are you looking for an article that will get people talking and get compliments flying your way? You can have 500-1000 words in your inbox in one hour. License any article from this Web site. More info

Follow Rick

Send email or subscribe to one of my newsletters Follow me at LinkedIn Follow me at X, or share a post Subscribe to RSS feeds Subscribe to RSS feeds
Please donate!The message of Point Lookout is unique. Help get the message out. Please donate to help keep Point Lookout available for free to everyone.
Technical Debt for Policymakers BlogMy blog, Technical Debt for Policymakers, offers resources, insights, and conversations of interest to policymakers who are concerned with managing technical debt within their organizations. Get the millstone of technical debt off the neck of your organization!

Beware any resource that speaks of "winning" at workplace politics or "defeating" it. You can benefit or not, but there is no score-keeping, and it isn't a game.

303 Secrets of Workplace PoliticsIs every other day a tense, anxious, angry misery as you watch people around you, who couldn't even think their way through a game of Jacks, win at workplace politics and steal the credit and glory for just about everyone's best work including yours? Read 303 Secrets of Workplace Politics!
303 Tips for Virtual and Global TeamsLearn how to make your virtual global team sing.
My free weekly email newsletter gives concrete tips and suggestions for dealing with the challenging but everyday situations we all face.
A Tip A DayA Tip a Day arrives by email, or by RSS Feed, each business day. It's 20 to 30 words at most, and gives you a new perspective on the hassles and rewards of work life. Most tips also contain links to related articles. Free!
101 Tips for Effective MeetingsLearn how to make meetings more productive — and more rare.
Exchange your "personal trade secrets" — the tips, tricks and techniques that make you an ace — with other aces, anonymously. Visit the Library of Personal Trade Secrets.
If your teams don't yet consistently achieve state-of-the-art teamwork, check out this catalog. Help is just a few clicks/taps away!
Ebooks, booklets and tip books on project management, conflict, writing email, effective meetings and more.