Point Lookout: a free weekly publication of Chaco Canyon Consulting
Volume 13, Issue 27;   July 3, 2013:

Active Deceptions at Work

by

Among the vast family of workplace deceptions, those that involve presenting fiction as reality are among the most exasperating, because we sometimes feel fooled or gullible. Lies are the simplest example of this type, but there are others, and some are fiendishly clever.
An inflatable aircraft of the U.S. Ghost Army in World War II

An inflatable aircraft of the U.S. Ghost Army in World War II. That inflatable aircraft were used as part of the simulation of ghost divisions is interesting enough, but if you look closely, you'll notice that it is camouflaged with netting overhead. The camouflage that was used was intended to be ineffective enough that the dummy aircraft would be detectable by enemy reconnaissance aircraft. This deception thus conforms to the pattern we here call "Layers of the onion." the idea was that the enemy should be able to detect the dummy aircraft because the camouflage deception was ineffective. Having detected it, the enemy would then conclude that it was a real aircraft, and not examine it carefully enough to determine its true nature. Indeed, a dummy aircraft without camouflage would certainly have seemed suspicious. The stakes were actually much higher than simple detection of dummy aircraft. The enemy had no inkling that the Ghost Army was engaged in deception at all. If even one of their deceptions had been uncovered, their effectiveness overall would have been compromised.

So it is with workplace deception. Once one becomes known for engaging in deception, trusting relationships become difficult to maintain. Isolation is a serious risk.

Photo courtesy U.S. National Archives.

As we saw last time, passive deception disguises an actual capability, facility, or intention to make it difficult to detect, while active deception disguises a nonexistent capability, facility, or intention to make it appear real. Dozens of wonderful examples of active deception from the military domain come from the activities of the so-called Ghost Army in World War II.

The Ghost Army, officially the 23rd Headquarters Special Troops of the U.S. Army, deceived the enemy by creating the impression that forces were positioned where no forces actually were. They carried out missions in Britain before the Normandy landings, and staged 20 deceptions in Europe after the landings. Using inflatable dummy vehicles, sound trucks blaring recordings of mechanized vehicles, and false radio traffic mimicking actual units, they succeeded in distorting enemy positions and even drawing fire.

Here are two examples of active deceptions at work.

Layers of the onion
This ploy involves concealing a deception behind another deception. When the targets notice the frontmost deception, and see through it, they most often presume that what they find behind it is real. They rarely attempt to remove another layer of the onion.
For example, finding in the output tray of a shared printer a resume of a colleague, we often assume that he or she is quietly job-hunting. We assume that we've detected a deception. We rarely consider the possibility that someone else printed the resume and left it there to deceive the discoverer into believing that the resume's owner is job-hunting. When we think we've detected a deception, we assume that the most obvious alternative explanation is true.
False threats
In the context of When we notice a deception,
we usually assume that
whatever lies behind
it is truth
workplace politics, a threat is a statement of intent to inflict harm or discomfort. Threats are usually conditional; that is, unless the target complies with the wishes of the threatener, the threat will be executed. A false threat is a threat that the threatener doesn't intend to carry out. It appears to be a real threat, though, and that's what makes this tactic an active deception.
For example, to persuade a subordinate (Saul) to work six days a week for an extended period, a deceptive supervisor (Belinda) might threaten Saul with dismissal by saying, "If you won't do this, we'll find someone else who will." Some supervisors use this approach even when Saul has skills and knowledge that make him irreplaceable. If Belinda doesn't actually believe that Saul is replaceable, she's engaged in active deception. Sadly, the tactic often works. It's most effective when unemployment is high, because Saul fears losing his job.

These are simple examples. Some deceptions contain both active and passive elements. Understanding the nature of active and passive deceptions can reduce the chances of your being deceived. First in this series  Go to top Top  Next issue: Workplace Politics and Type III Errors  Next Issue

303 Secrets of Workplace PoliticsIs every other day a tense, anxious, angry misery as you watch people around you, who couldn't even think their way through a game of Jacks, win at workplace politics and steal the credit and glory for just about everyone's best work including yours? Read 303 Secrets of Workplace Politics, filled with tips and techniques for succeeding in workplace politics. More info

Your comments are welcome

Would you like to see your comments posted here? rbrenEQuetChPjwYBDxmgner@ChacxXTxBssoFmfDfMugoCanyon.comSend me your comments by email, or by Web form.

About Point Lookout

Thank you for reading this article. I hope you enjoyed it and found it useful, and that you'll consider recommending it to a friend.

Point Lookout is a free weekly email newsletter. Browse the archive of past issues. Subscribe for free.

Support Point Lookout by joining the Friends of Point Lookout, as an individual or as an organization.

Do you face a complex interpersonal situation? Send it in, anonymously if you like, and I'll give you my two cents.

Related articles

More articles on Workplace Politics:

Game ballsWorkplace Politics Is Not a Game
We often think about "playing the game" — either with relish or repugnance. Whatever your level of skill or interest, you'll do better if you see workplace politics as it is. It is not a game.
A straw-bale houseResponding to Threats: I
Threats are one form of communication common to many organizational cultures, especially as pressure mounts. Understanding the varieties of threats can be helpful in determining a response that fits for you.
A clockThe Artful Shirker
Most people who shirk work are fairly obvious about it, but some are so artful that the people around them don't realize what's happening. Here are a few of the more sophisticated shirking techniques.
Donald Trump, as a candidate for the nomination of the Republican Party for President in 2016Is It Arrogance or Confidence?
Confusing arrogance and confidence can cause real trouble — or lost opportunities. What exactly is the difference between them?
A question markI Don't Understand: I
When someone makes a statement or offers an explanation that's unclear or ambiguous, there are risks associated with asking for clarification. The risks can seem so terrifying that we decide not to ask. What keeps us from seeking clarification?

See also Workplace Politics and Devious Political Tactics for more related articles.

Forthcoming issues of Point Lookout

An exit signComing January 19: Comply, Resist, or Exploit?
When we encounter obstacles, we have choices about how we deal with them. Generally, we can comply, we can resist, or sometimes, we can find ways to use the obstacles — to exploit them — to advance to our objectives. The pandemic provides two examples. Available here and by RSS on January 19.
The iconic image of cyber code, as popularized in the film The MatrixAnd on January 26: Cyber Rumors in Organizations
Rumor management practices in organizations haven't kept up with rumor propagation technology. Rumors that propagate by digital means — cyber rumors — have longer lifetimes, spread faster, are more credible, and are better able to reinforce each other. Available here and by RSS on January 26.

Coaching services

I offer email and telephone coaching at both corporate and individual rates. Contact Rick for details at rbrenEQuetChPjwYBDxmgner@ChacxXTxBssoFmfDfMugoCanyon.com or (650) 787-6475, or toll-free in the continental US at (866) 378-5470.

Get the ebook!

Past issues of Point Lookout are available in six ebooks:

Reprinting this article

Are you a writer, editor or publisher on deadline? Are you looking for an article that will get people talking and get compliments flying your way? You can have 500-1000 words in your inbox in one hour. License any article from this Web site. More info

Public seminars

The Power Affect: How We Express Our Personal Power

Many The Power Affect: How We Express Personal Powerpeople who possess real organizational power have a characteristic demeanor. It's the way they project their presence. I call this the power affect. Some people — call them power pretenders — adopt the power affect well before they attain significant organizational power. Unfortunately for their colleagues, and for their organizations, power pretenders can attain organizational power out of proportion to their merit or abilities. Understanding the power affect is therefore important for anyone who aims to attain power, or anyone who works with power pretenders. Read more about this program.

Bullet Points: Mastery or Madness?

DecisBullet Point Madnession makers in modern organizations commonly demand briefings in the form of bullet points or a series of series of bullet points. But this form of presentation has limited value for complex decisions. We need something more. We actually need to think. Briefers who combine the bullet-point format with a variety of persuasion techniques can mislead decision makers, guiding them into making poor decisions. Read more about this program.

Follow Rick

Send email or subscribe to one of my newsletters Follow me at LinkedIn Follow me at Twitter, or share a tweet Subscribe to RSS feeds Subscribe to RSS feeds
Please donate!The message of Point Lookout is unique. Help get the message out. Please donate to help keep Point Lookout available for free to everyone.
Technical Debt for Policymakers BlogMy blog, Technical Debt for Policymakers, offers resources, insights, and conversations of interest to policymakers who are concerned with managing technical debt within their organizations. Get the millstone of technical debt off the neck of your organization!

Beware any resource that speaks of "winning" at workplace politics or "defeating" it. You can benefit or not, but there is no score-keeping, and it isn't a game.

303 Secrets of Workplace PoliticsIs every other day a tense, anxious, angry misery as you watch people around you, who couldn't even think their way through a game of Jacks, win at workplace politics and steal the credit and glory for just about everyone's best work including yours? Read 303 Secrets of Workplace Politics!
303 Tips for Virtual and Global TeamsLearn how to make your virtual global team sing.
My free weekly email newsletter gives concrete tips and suggestions for dealing with the challenging but everyday situations we all face.
A Tip A DayA Tip a Day arrives by email, or by RSS Feed, each business day. It's 20 to 30 words at most, and gives you a new perspective on the hassles and rewards of work life. Most tips also contain links to related articles. Free!
101 Tips for Effective MeetingsLearn how to make meetings more productive — and more rare.
Exchange your "personal trade secrets" — the tips, tricks and techniques that make you an ace — with other aces, anonymously. Visit the Library of Personal Trade Secrets.
If your teams don't yet consistently achieve state-of-the-art teamwork, check out this catalog. Help is just a few clicks/taps away!
Ebooks, booklets and tip books on project management, conflict, writing email, effective meetings and more.