Point Lookout: a free weekly publication of Chaco Canyon Consulting
Volume 13, Issue 51;   December 18, 2013: Projects as Proxy Targets: I

Projects as Proxy Targets: I

by

Some projects have detractors so determined to prevent project success that there's very little they won't do to create conditions for failure. Here's Part I of a catalog of tactics they use.
A Strangler Fig in Australia

A Strangler Fig (species Ficus watkinsiana) on Syzygium hemilampra, in Iluka, Australia. Strangler figs begin life, typically, by germinating in the bark of other trees. They send roots downward, and branches upward, enfolding their hosts. Gradually increasing in mass, they eventually strangle their hosts. This growth pattern is advantageous in dense tropical forests, where building a tree column from ground level is difficult because of the shade caused by existing foliage.

Detractors of large projects in organizations can use strategies similar to that of the Strangler Figs. Using any means at their disposal, they work to limit the operations of the project they've targeted. No one element of their overall attack is important, but the number and variety of their attacks can be too much for the advocates of the large project to bear.

Photo by Peter Woodard, courtesy Wikipedia.

Most major projects have both advocates and detractors. Even after organizations decide to fund enterprise-scale projects, even after staffing begins, and even during early execution, detractors can remain. In most cases though, voicing objections after the funding decision is in place entails considerable political risk. That's why detractors typically begin to limit their objections to confidential conversations with trusted allies. They might continue to oppose the project, and even try to subvert it, but always discretely, and usually under the cover of deniability.

In some rare cases, a major project's detractors might continue to operate openly even after the organization is committed to the project. They voice their skepticism, repeatedly predicting failure. They do so at extreme political risk, because the people who advocated for and approved funding for the project typically experience such opposition as attacks not only on the project, but also upon their own position and power in the organization. They know that if the project fails, they face embarrassment, possible demotion, termination, or other career-ending consequences.

Open opposition to projects underway often becomes protracted political conflict between advocates and detractors — a conflict in which the project becomes a proxy target.

Detractors know that unless they prevail, the advocates can use the project's success to consolidate their own power and influence, while they curtail the future influence of the detractors. When detractors commit to opposing the project openly, they do so with the understanding that project failure is the only outcome consistent with their own long-term well being within the organization. They must then act to ensure project failure. Here are some of the tactics available to project detractors.

Delay
At every phase of project development from initial proposal to late stage execution, delay can help detractors achieve their goal. They can raise issues to slow decisions and approvals, release shared resources later than expected, and if they supply deliverables to the project, they can supply them late.
Verbal assaults on leadership
Charges of At every phase of project development
from initial proposal to late
stage execution, delay can help
detractors achieve their goal
negligence, incompetence, ethical transgressions, and the like can distract project leaders and burden them with the need to respond. Such allegations also affect the project's ability to attract and retain highly capable personnel.
Budget constriction
Constraining the project's budget obviously degrades its ability to deliver against an aggressive schedule. But even more deviously, detractors can work to constrict the project's budget after the budget commitment for a given period is made and spending has begun. This causes even more delay because of the chaos introduced by replanning.
Vendor restrictions
By imposing restrictions on which vendors can supply material, staff, or services, detractors can limit the project's access to reliable outside vendors. Even more devious: change the restriction policy at a critical juncture, forcing the project to switch vendors.

We'll continue this catalog next time, emphasizing tactics for creating project chaos.  Projects as Proxy Targets: II Next issue in this series  Go to top Top  Next issue: Projects as Proxy Targets: II  Next Issue

303 Secrets of Workplace PoliticsIs every other day a tense, anxious, angry misery as you watch people around you, who couldn't even think their way through a game of Jacks, win at workplace politics and steal the credit and glory for just about everyone's best work including yours? Read 303 Secrets of Workplace Politics, filled with tips and techniques for succeeding in workplace politics. More info

More about OODA

George III, King of Great Britain and King of Ireland, 1738-1820What Is Workplace Bullying?  [March 3, 2010]
We're gradually becoming aware that workplace bullying is a significant deviant pattern in workplace relationships. To deal effectively with it, we must know how to recognize it. Here's a start.

A Turkey Vulture and its mimic, a Zone-Tailed HawkBiological Mimicry and Workplace Bullying  [March 31, 2010]
When targets of bullies decide to stand up to their bullies, to end the harassment, they frequently act before they're really ready. Here's a metaphor that explains the value of waiting for the right time to act.

Col. John Boyd, U.S. Air Force, in a photo taken during his time as a fighter pilotOODA at Work  [April 6, 2011]
OODA is a model of decision making that's especially useful in rapidly evolving environments, such as combat, marketing, politics, and emergency management. Here's a brief overview.

A mixed stand of aspen and pine in the Okanagan region of British Columbia and Washington stateHow Workplace Bullies Use OODA: I  [April 13, 2011]
Workplace bullies who succeed in carrying on their activities over a long period of time rely on more than mere intimidation to escape prosecution. They proactively shape their environments to make them safe for bullying. The OODA model gives us insights into how they accomplish this.

A modern roller coaster showing an inverted portion of the tripHow Workplace Bullies Use OODA: II  [April 20, 2011]
Workplace bullies who succeed in carrying on their activities over a long period of time are intuitive users of Boyd's OODA model. Here's Part II of an exploration of how bullies use the model.

A captive zebra of the species Equus quagga (plains zebra)How Targets of Bullies Can Use OODA: I  [April 27, 2011]
Most targets of bullies just want the bullying to stop, but most bullies don't stop unless they fear for their own welfare if they continue the bullying. To end the bullying, targets must turn the tables.

A U.S. Marine sniper wearing sniper camouflage gear known as a "ghillie" suitHow Targets of Bullies Can Use OODA: II  [May 4, 2011]
To make the bullying stop, many targets of bullies try to defend themselves. But defense alone is not sufficient — someone must ``Em''make``/Em'' the bully stop. That's why counterattack is much more likely to work.

An Africanized honeybee, also known as a killer beeRapid-Fire Attacks  [August 1, 2012]
Someone asks you a question. Within seconds of starting to reply, you're hit with another question, or a rejection of your reply. Abusively. The pattern repeats. And repeats again. And again. You're being attacked. What can you do?

A street sign at Maxwell Air Force Base, AlabamaJoint Leadership Teams: OODA  [December 28, 2022]
Some teams, business units, or enterprises are led not by individuals, but by joint leadership teams of two or more. They face special risks that arise from the organizations that host them, from the team they lead, or from within the joint leadership team itself.

Your comments are welcome

Would you like to see your comments posted here? rbrenubcqSvusyBsQaEDwner@ChacfhuriyFKgDguTpuYoCanyon.comSend me your comments by email, or by Web form.

About Point Lookout

This article in its entirety was written by a 
          human being. No machine intelligence was involved in any way.Thank you for reading this article. I hope you enjoyed it and found it useful, and that you'll consider recommending it to a friend.

This article in its entirety was written by a human being. No machine intelligence was involved in any way.

Point Lookout is a free weekly email newsletter. Browse the archive of past issues. Subscribe for free.

Support Point Lookout by joining the Friends of Point Lookout, as an individual or as an organization.

Do you face a complex interpersonal situation? Send it in, anonymously if you like, and I'll give you my two cents.

Related articles

More articles on Workplace Politics:

Seafood stewWhen You Think Your Boss Is Incompetent
After the boss commits even a few enormous blunders, some of us conclude that he or she is just incompetent. We begin to worry whether our careers are safe, whether the company is safe, or whether to start looking for another job. Beyond worrying, what else can we do?
The Lincoln Memorial at sunriseOrganizational Loss: Searching Behavior
When organizations suffer painful losses, their responses can sometimes be destructive, further harming the organization and its people. Here are some typical patterns of destructive responses to organizational loss.
The Niagara River and cantilever bridgeBottlenecks: I
Some people take on so much work that they become "bottlenecks." The people around them repeatedly find themselves stuck, awaiting responses or decisions. Why does this happen and what are the costs?
Margay cat (Leopardus wiedii)Fake Requests for Help
When a colleague asks for assistance, we can feel validated, even flattered. But not all requests for help are what they seem. The more devious amongst us can be endlessly creative in employing requests for help to achieve devious ends.
A horserace, which is a useful metaphor for the abuser's view of a conversationExploitation and Conversational Narcissism at Work: I
Exploitation of others is one of four themes of conversational narcissism. Knowing how to recognize the patterns of conversational narcissism is a fundamental skill needed for controlling it. Here are five examples that emphasize exploitation of others.

See also Workplace Politics and Workplace Politics for more related articles.

Forthcoming issues of Point Lookout

Pair of Wooden Shoes [right] (Sabots)Coming June 4: White-Collar Contractor Sabotage
Modern firms in competitive, dynamic markets draw on many types of employer/employee relationships, including contractors. By providing privileges and perks preferentially among these different types, they risk creating a caldron of resentments that can reduce organizational effectiveness. Available here and by RSS on June 4.
Horse Shoe Bend of the Colorado River in the Grand CanyonAnd on June 11: More Things I've Learned Along the Way: VI
When I gain an important insight, or when I learn a lesson, I make a note. Example: If you're interested in changing how a social construct operates, knowing how it came to be the way it is can be much less useful than knowing what keeps it the way it is. Available here and by RSS on June 11.

Coaching services

I offer email and telephone coaching at both corporate and individual rates. Contact Rick for details at rbrenubcqSvusyBsQaEDwner@ChacfhuriyFKgDguTpuYoCanyon.com or (650) 787-6475, or toll-free in the continental US at (866) 378-5470.

Get the ebook!

Past issues of Point Lookout are available in six ebooks:

Reprinting this article

Are you a writer, editor or publisher on deadline? Are you looking for an article that will get people talking and get compliments flying your way? You can have 500-1000 words in your inbox in one hour. License any article from this Web site. More info

Follow Rick

Send email or subscribe to one of my newsletters Follow me at LinkedIn Follow me at Bluesky, or share a post Subscribe to RSS feeds Subscribe to RSS feeds
Please donate!The message of Point Lookout is unique. Help get the message out. Please donate to help keep Point Lookout available for free to everyone.
Technical Debt for Policymakers BlogMy blog, Technical Debt for Policymakers, offers resources, insights, and conversations of interest to policymakers who are concerned with managing technical debt within their organizations. Get the millstone of technical debt off the neck of your organization!

Beware any resource that speaks of "winning" at workplace politics or "defeating" it. You can benefit or not, but there is no score-keeping, and it isn't a game.

303 Secrets of Workplace PoliticsIs every other day a tense, anxious, angry misery as you watch people around you, who couldn't even think their way through a game of Jacks, win at workplace politics and steal the credit and glory for just about everyone's best work including yours? Read 303 Secrets of Workplace Politics!
303 Tips for Virtual and Global TeamsLearn how to make your virtual global team sing.
My free weekly email newsletter gives concrete tips and suggestions for dealing with the challenging but everyday situations we all face.
A Tip A DayA Tip a Day arrives by email, or by RSS Feed, each business day. It's 20 to 30 words at most, and gives you a new perspective on the hassles and rewards of work life. Most tips also contain links to related articles. Free!
101 Tips for Effective MeetingsLearn how to make meetings more productive — and more rare.
Exchange your "personal trade secrets" — the tips, tricks and techniques that make you an ace — with other aces, anonymously. Visit the Library of Personal Trade Secrets.
If your teams don't yet consistently achieve state-of-the-art teamwork, check out this catalog. Help is just a few clicks/taps away!
Ebooks, booklets and tip books on project management, conflict, writing email, effective meetings and more.