
A leopard stalking its prey. In this slinking gait, leopards (and most cats) achieve stealth by limiting the ability of the prey animal to notice their movements. Other contributions to stealth include the leopard's coloration, and, in this instance, the use of the tree for cover.
Meeting hijackers can achieve stealth by means of seemingly innocent overt actions, and by undertaking less-than-innocent actions out of the awareness of most meeting participants. The former are analogous to the slinking gait of the cat, while the latter are analogous to using a tree for cover. Photo (cc) Sharp Photography courtesy WikiMedia.
Disclaimer: I am not advocating meeting hijacking. If meetings are orderly, and conducted fairly and with respect for all participants, hijacking is an unethical abuse. It's a means of achieving results disrespectfully and unfairly. Understanding the tactics of meeting hijackers is therefore a sound basis for controlling their behavior and limiting their success. With that goal, I offer this field manual for aspiring hijackers.
- Be stealthy
- Conceal your intentions. Stealth delays the response of anyone intent on keeping the meeting on track.
- Various tactics seem innocent, but actually are helpful to you, the hijacker. For example, if the chair doesn't create an agenda, or if the agenda is weak, offer to write (or improve) the agenda before the meeting. Or to keep an item off the agenda, in advance of the meeting, propose other items that might pack the agenda, so there won't be time enough to address items you don't favor. Or encourage others to propose additional agenda items. If agenda packing doesn't work, don't oppose addressing the disfavored item. That just alerts people to your objective. Find other ways to freeze out the disfavored item. Pushing it off to the end of the meeting can work, if other items take longer than expected — a condition that you can bring about yourself.
- Be judicious about personal attacks
- It's important to undermine the credibility of any meeting participants who oppose your maneuvers. Because doing so in public is a tad risky, do it privately in advance. Find ways to suggest arguments to others, or to raise questions about the integrity of your opponents, or to subtly encourage others to attack your opponents, either before or during the meeting.
- The credibility-destroying Understanding the tactics of meeting
hijackers is a sound basis for
controlling their behavior
and limiting their successinformation you provide need not actually be true. To protect yourself, you can cite unnamed sources: "I heard that…" or "I saw a report somewhere that…" - Disrupt the parking lot or not-agenda
- If a topic you want to address has been allocated to the parking lot or not-agenda, raise it anyway, along with a persuasive case for addressing it immediately. This tactic is also helpful for agenda packing to prevent discussion of disfavored items.
- Caution: using this tactic more than once per meeting risks exposing your hijacking attempt for what it is.
- Exploit the power to write history
- Volunteer to be the meeting scribe or secretary. In case all your attempts failed, and the disfavored item was actually addressed, or an item you did favor was not addressed, you can "adjust" the meeting minutes to reflect your favored outcome, whatever that was. You can do this even if you aren't the official scribe, if you distribute your version first.
- As the official scribe, don't be too heavy-handed. The minutes must bear some resemblance to reality, if you ever want another opportunity to use this tactic. Bend the truth — twist it into knots if necessary — but don't break it in any undisputable way.
Have you seen these tactics in use in your meetings? Next time, we'll explore some preventative tactics. First issue in this series
Next issue in this series
Top
Next Issue
Do you spend your days scurrying from meeting to meeting? Do you ever wonder if all these meetings are really necessary? (They aren't) Or whether there isn't some better way to get this work done? (There is) Read 101 Tips for Effective Meetings to learn how to make meetings much more productive and less stressful — and a lot more rare. Order Now!
Your comments are welcome
Would you like to see your comments posted here? rbrenubcqSvusyBsQaEDwner@ChacfhuriyFKgDguTpuYoCanyon.comSend me your comments by email, or by Web form.About Point Lookout
Thank you for reading this article. I hope you enjoyed it and
found it useful, and that you'll consider recommending it to a friend.
This article in its entirety was written by a human being. No machine intelligence was involved in any way.
Point Lookout is a free weekly email newsletter. Browse the archive of past issues. Subscribe for free.
Support Point Lookout by joining the Friends of Point Lookout, as an individual or as an organization.
Do you face a complex interpersonal situation? Send it in, anonymously if you like, and I'll give you my two cents.
Related articles
More articles on Effective Meetings:
Why Sidebars Happen
- Sidebar conversations between meeting participants, conducted while someone else has the floor, are
a distracting form of disorder that can waste time and reduce meeting effectiveness. Why do sidebars happen?
Chronic Peer Interrupters: II
- People use a variety of tactics when they're interrupted while making contributions in meetings. Some
tactics work well, while others carry risks of their own. Here's Part II of a little survey of those tactics.
Self-Importance and Conversational Narcissism at Work: I
- Conversational narcissism is a set of behaviors that participants use to focus the exchange on their
own self-interest rather than the shared objective. This post emphasizes the role of these behaviors
in advancing the participant's sense of self-importance.
Exploitation and Conversational Narcissism at Work: II
- Exploitation of others is one of four themes of conversational narcissism. Knowing how to recognize
the patterns of conversational narcissism is a fundamental skill needed for controlling it. Here are
six examples that emphasize exploitation of others.
Antipatterns for Time-Constrained Communication: I
- Knowing how to recognize just a few patterns that can lead to miscommunication can be helpful in reducing
the incidence of problems. Here is Part I of a collection of communication antipatterns that arise in
technical communication under time pressure.
See also Effective Meetings and Effective Meetings for more related articles.
Forthcoming issues of Point Lookout
Coming June 4: White-Collar Contractor Sabotage
- Modern firms in competitive, dynamic markets draw on many types of employer/employee relationships, including contractors. By providing privileges and perks preferentially among these different types, they risk creating a caldron of resentments that can reduce organizational effectiveness. Available here and by RSS on June 4.
And on June 11: More Things I've Learned Along the Way: VI
- When I gain an important insight, or when I learn a lesson, I make a note. Example: If you're interested in changing how a social construct operates, knowing how it came to be the way it is can be much less useful than knowing what keeps it the way it is. Available here and by RSS on June 11.
Coaching services
I offer email and telephone coaching at both corporate and individual rates. Contact Rick for details at rbrenubcqSvusyBsQaEDwner@ChacfhuriyFKgDguTpuYoCanyon.com or (650) 787-6475, or toll-free in the continental US at (866) 378-5470.
Get the ebook!
Past issues of Point Lookout are available in six ebooks:
- Get 2001-2 in Geese Don't Land on Twigs (PDF, )
- Get 2003-4 in Why Dogs Wag (PDF, )
- Get 2005-6 in Loopy Things We Do (PDF, )
- Get 2007-8 in Things We Believe That Maybe Aren't So True (PDF, )
- Get 2009-10 in The Questions Not Asked (PDF, )
- Get all of the first twelve years (2001-2012) in The Collected Issues of Point Lookout (PDF, )
Are you a writer, editor or publisher on deadline? Are you looking for an article that will get people talking and get compliments flying your way? You can have 500-1000 words in your inbox in one hour. License any article from this Web site. More info
Follow Rick
Recommend this issue to a friend
Send an email message to a friend
rbrenubcqSvusyBsQaEDwner@ChacfhuriyFKgDguTpuYoCanyon.comSend a message to Rick
A Tip A Day feed
Point Lookout weekly feed
