Point Lookout: a free weekly publication of Chaco Canyon Consulting
Volume 21, Issue 34;   August 25, 2021: Bad Trouble: Misdirection

Bad Trouble: Misdirection

by

When Bad Trouble develops at work we have a chance to see what our organizational cultures are made of. Many of our colleagues respond constructively. When they don't, misdirection tactics are popular. Here's a little catalog of misdirection responses.
A fictional tornado striking Manhattan

A fictional tornado striking Manhattan. There is a myth that tornadoes don't strike big cities. Such incidents are rare, but they're rare only because the total land area of urban environments is so much smaller than the total land area of rural environments. Image by Willgard, courtesy Pixabay.

On most days knowledge work consists of meetings, pick-up conversations, reading either from a screen or from paper, writing and transmitting information for others to read, participating in video calls, finding stuff out again that you once knew, helping colleagues figure out other stuff, getting help yourself, debating, drinking stimulant-laden fluids, and on and on. And every now and then there's a brushfire to put out. Sometimes, though, there's trouble for which the term brushfire doesn't seem adequate. Call it Bad Trouble.

Bad trouble is the kind of tangle that leaps across team boundaries and functional boundaries. It can last days, weeks, or longer. Truly Bad Trouble occupies top slots in the agendas of many meetings. If it's bad enough Bad Trouble, some of the conversations about it get classified Org Chart Level One Confidential. Level One is the most highly sensitive category, and that would be for really bad Bad Trouble, but even Level Three can produce significant anxiety for everyone.

How some people respond to Bad Trouble

When Bad Trouble appears, a few people see it as an opportunity to demonstrate their talents or abilities. But most people try to find ways to get through to the other side with their careers intact or slightly improved in some way. Below is part of a little catalog of coping styles I've seen in use when Bad Trouble appears. These styles emphasize misdirecting others to deflect corrective actions in the direction of someone else.

Concealing the existence of the trouble
Some choose to prevent those who don't yet know about the trouble from ever learning about it. They might form a Conspiracy of Silence. Certainly they avoid reporting the trouble, or discussing it in any medium that has a memory. They might deny knowing about it — not flatly, but in ways that limit their involvement with the trouble.
If you're When Bad Trouble appears, a few
people see it as an opportunity
to demonstrate their
talents or abilities
responsible, even in part, for developing responses to Bad Trouble, evaluate the veracity of reports that affect your decisions. And ensure that after-action reviews assess the quality of status reports generated either during the incident, or in the pre-acute time period.
Disguising
Some forms of trouble can adopt disguises, if they have a little help. People try to make the trouble look like not-trouble. Some of the less deceitful methods for doing this are sometimes known as "spin." But at the deceitful end of the spectrum are the techniques of making false reports, or submitting false financial data.
Among the least ethical and most damaging disguise-oriented tactics is retroactive altering of data and reports about the incident. Ensure that these materials are appropriately protected and that attempts to modify them trigger alarms.
Transferring
If the organization is searching for root causes of the trouble, the search can readily transform into a hunt for someone to blame, unless the organization understands and manages this risk. [Brenner 2005] But even if the organization takes pains to avoid blaming, those who feel vulnerable might sense an urge to protect themselves from blame by transferring attention from their own roles to the roles of others.
Efforts to transfer the focus of investigation can be general or specific. The general approach provides justification for a stance of "Not Me." The specific approach transfers attention to "Them." The means of transferring can be devious or straightforward — ethical or not. The cleverest tactics leave no audit trail, making it difficult to identify the person responsible for shifting the focus of investigation.
Weaponizing
A tactic that requires an element of ruthlessness is converting the Bad Trouble into a weapon to be used against political rivals. Blaming the rival for the trouble is among the less sophisticated forms of this approach. Another form involves manufacturing narratives that support resource reallocation away from the rival's control to some other use, typically to benefit the person doing the weaponizing.
For those least encumbered by ethical constraints, tactics are limited only by the bounds of creativity. Truth is an early victim. For example, if the Bad Trouble is a scandal of some sort, the political actor might suggest, without evidence, that the rival is implicated in a similar or related scandal.

Some people do respond to Bad Trouble constructively, more or less. Next time we'll survey some more constructive responses.  Next in this series Go to top Top  Next issue: Bad Trouble: Coping strategies  Next Issue

How to Spot a Troubled Project Before the Trouble StartsProjects never go quite as planned. We expect that, but we don't expect disaster. How can we get better at spotting disaster when there's still time to prevent it? How to Spot a Troubled Project Before the Trouble Starts is filled with tips for executives, senior managers, managers of project managers, and sponsors of projects in project-oriented organizations. It helps readers learn the subtle cues that indicate that a project is at risk for wreckage in time to do something about it. It's an ebook, but it's about 15% larger than "Who Moved My Cheese?" Just . Order Now! .

Footnotes

Comprehensive list of all citations from all editions of Point Lookout
[Brenner 2005]
Richard Brenner. "Is It Blame or Is It Accountability?," Point Lookout blog, December 21, 2005. Available here. Back

Your comments are welcome

Would you like to see your comments posted here? rbrendPtoGuFOkTSMQOzxner@ChacEgGqaylUnkmwIkkwoCanyon.comSend me your comments by email, or by Web form.

About Point Lookout

This article in its entirety was written by a 
          human being. No machine intelligence was involved in any way.Thank you for reading this article. I hope you enjoyed it and found it useful, and that you'll consider recommending it to a friend.

This article in its entirety was written by a human being. No machine intelligence was involved in any way.

Point Lookout is a free weekly email newsletter. Browse the archive of past issues. Subscribe for free.

Support Point Lookout by joining the Friends of Point Lookout, as an individual or as an organization.

Do you face a complex interpersonal situation? Send it in, anonymously if you like, and I'll give you my two cents.

Related articles

More articles on Workplace Politics:

The game of chess, a strategic metaphorNasty Questions: I
Some of the questions we ask each other aren't intended to elicit information from the respondent. Rather, they're poorly disguised attacks intended to harm the respondent politically, and advance the questioner's political agenda. Here's part one a catalog of some favorite tactics.
Mustang stallions fightingWorst Practices
We hear a lot about best practices, but hardly anybody talks about worst practices. So as a public service, here are some of the best worst practices.
Monarch butterfly (top) and Viceroy (bottom)Deceptive Communications at Work
Most workplace communication training emphasizes constructive uses of communication. But when we also understand how communication can be abused, we're better able to defend ourselves from abusive communication. One form of abusive communication is deception.
A dense Lodgepole Pine stand in Yellowstone National Park in the United StatesConversation Despots
Some people insist that conversations reach their personally favored conclusions, no matter what others want. Here are some of their tactics.
Portrait of a woman titled "Monomania of Envy"Narcissistic Behavior at Work: VIII
Narcissistic behavior at work can have roots in attitudes and beliefs. Understanding which attitudes or beliefs underlie narcissistic behavior can sometimes have predictive value. Among such attitudes or beliefs are those related to envy.

See also Workplace Politics and Conflict Management for more related articles.

Forthcoming issues of Point Lookout

A dangerous curve in an icy roadComing May 1: Antipatterns for Time-Constrained Communication: 2
Recognizing just a few patterns that can lead to miscommunication can reduce the incidence of miscommunications. Here's Part 2 of a collection of antipatterns that arise in communication under time pressure, emphasizing those that depend on content. Available here and by RSS on May 1.
And on May 8: Antipatterns for Time-Constrained Communication: 3
Recognizing just a few patterns that can lead to miscommunication can reduce the incidence of problems. Here is Part 3 of a collection of antipatterns that arise in technical communication under time pressure, emphasizing past experiences of participants. Available here and by RSS on May 8.

Coaching services

I offer email and telephone coaching at both corporate and individual rates. Contact Rick for details at rbrendPtoGuFOkTSMQOzxner@ChacEgGqaylUnkmwIkkwoCanyon.com or (650) 787-6475, or toll-free in the continental US at (866) 378-5470.

Get the ebook!

Past issues of Point Lookout are available in six ebooks:

Reprinting this article

Are you a writer, editor or publisher on deadline? Are you looking for an article that will get people talking and get compliments flying your way? You can have 500-1000 words in your inbox in one hour. License any article from this Web site. More info

Follow Rick

Send email or subscribe to one of my newsletters Follow me at LinkedIn Follow me at X, or share a post Subscribe to RSS feeds Subscribe to RSS feeds
The message of Point Lookout is unique. Help get the message out. Please donate to help keep Point Lookout available for free to everyone.
Technical Debt for Policymakers BlogMy blog, Technical Debt for Policymakers, offers resources, insights, and conversations of interest to policymakers who are concerned with managing technical debt within their organizations. Get the millstone of technical debt off the neck of your organization!
Go For It: Sometimes It's Easier If You RunBad boss, long commute, troubling ethical questions, hateful colleague? Learn what we can do when we love the work but not the job.
303 Tips for Virtual and Global TeamsLearn how to make your virtual global team sing.
101 Tips for Managing ChangeAre you managing a change effort that faces rampant cynicism, passive non-cooperation, or maybe even outright revolt?
101 Tips for Effective MeetingsLearn how to make meetings more productive — and more rare.
Exchange your "personal trade secrets" — the tips, tricks and techniques that make you an ace — with other aces, anonymously. Visit the Library of Personal Trade Secrets.
If your teams don't yet consistently achieve state-of-the-art teamwork, check out this catalog. Help is just a few clicks/taps away!
Ebooks, booklets and tip books on project management, conflict, writing email, effective meetings and more.