Point Lookout: a free weekly publication of Chaco Canyon Consulting
Volume 16, Issue 48;   November 30, 2016: How to Hijack Meetings

How to Hijack Meetings

by

Recognizing the tactics meeting hijackers use is the first step to reducing the incidence of this abuse. Here are some of those tactics.
A leopard stalking its prey

A leopard stalking its prey. In this slinking gait, leopards (and most cats) achieve stealth by limiting the ability of the prey animal to notice their movements. Other contributions to stealth include the leopard's coloration, and, in this instance, the use of the tree for cover.

Meeting hijackers can achieve stealth by means of seemingly innocent overt actions, and by undertaking less-than-innocent actions out of the awareness of most meeting participants. The former are analogous to the slinking gait of the cat, while the latter are analogous to using a tree for cover. Photo (cc) Sharp Photography courtesy WikiMedia.

Disclaimer: I am not advocating meeting hijacking. If meetings are orderly, and conducted fairly and with respect for all participants, hijacking is an unethical abuse. It's a means of achieving results disrespectfully and unfairly. Understanding the tactics of meeting hijackers is therefore a sound basis for controlling their behavior and limiting their success. With that goal, I offer this field manual for aspiring hijackers.

Be stealthy
Conceal your intentions. Stealth delays the response of anyone intent on keeping the meeting on track.
Various tactics seem innocent, but actually are helpful to you, the hijacker. For example, if the chair doesn't create an agenda, or if the agenda is weak, offer to write (or improve) the agenda before the meeting. Or to keep an item off the agenda, in advance of the meeting, propose other items that might pack the agenda, so there won't be time enough to address items you don't favor. Or encourage others to propose additional agenda items. If agenda packing doesn't work, don't oppose addressing the disfavored item. That just alerts people to your objective. Find other ways to freeze out the disfavored item. Pushing it off to the end of the meeting can work, if other items take longer than expected — a condition that you can bring about yourself.
Be judicious about personal attacks
It's important to undermine the credibility of any meeting participants who oppose your maneuvers. Because doing so in public is a tad risky, do it privately in advance. Find ways to suggest arguments to others, or to raise questions about the integrity of your opponents, or to subtly encourage others to attack your opponents, either before or during the meeting.
The credibility-destroying Understanding the tactics of meeting
hijackers is a sound basis for
controlling their behavior
and limiting their success
information you provide need not actually be true. To protect yourself, you can cite unnamed sources: "I heard that…" or "I saw a report somewhere that…"
Disrupt the parking lot or not-agenda
If a topic you want to address has been allocated to the parking lot or not-agenda, raise it anyway, along with a persuasive case for addressing it immediately. This tactic is also helpful for agenda packing to prevent discussion of disfavored items.
Caution: using this tactic more than once per meeting risks exposing your hijacking attempt for what it is.
Exploit the power to write history
Volunteer to be the meeting scribe or secretary. In case all your attempts failed, and the disfavored item was actually addressed, or an item you did favor was not addressed, you can "adjust" the meeting minutes to reflect your favored outcome, whatever that was. You can do this even if you aren't the official scribe, if you distribute your version first.
As the official scribe, don't be too heavy-handed. The minutes must bear some resemblance to reality, if you ever want another opportunity to use this tactic. Bend the truth — twist it into knots if necessary — but don't break it in any undisputable way.

Have you seen these tactics in use in your meetings? Next time, we'll explore some preventative tactics. First in this series | Next in this series Go to top Top  Next issue: Preventing Meeting Hijacking  Next Issue

101 Tips for Effective MeetingsDo you spend your days scurrying from meeting to meeting? Do you ever wonder if all these meetings are really necessary? (They aren't) Or whether there isn't some better way to get this work done? (There is) Read 101 Tips for Effective Meetings to learn how to make meetings much more productive and less stressful — and a lot more rare. Order Now!

Your comments are welcome

Would you like to see your comments posted here? rbrendPtoGuFOkTSMQOzxner@ChacEgGqaylUnkmwIkkwoCanyon.comSend me your comments by email, or by Web form.

About Point Lookout

This article in its entirety was written by a 
          human being. No machine intelligence was involved in any way.Thank you for reading this article. I hope you enjoyed it and found it useful, and that you'll consider recommending it to a friend.

This article in its entirety was written by a human being. No machine intelligence was involved in any way.

Point Lookout is a free weekly email newsletter. Browse the archive of past issues. Subscribe for free.

Support Point Lookout by joining the Friends of Point Lookout, as an individual or as an organization.

Do you face a complex interpersonal situation? Send it in, anonymously if you like, and I'll give you my two cents.

Related articles

More articles on Effective Meetings:

King Pyrrhus of EpiroDivisive Debates and Virulent Victories
When groups decide divisive issues, harmful effects can linger for weeks, months, or forever. Although those who prevail might be ready to "move on," others might feel so alienated that they experience even daily routine as fresh insult and disparagement. How a group handles divisive issues can determine its success.
American dwarf mistletoe (Arceuthobium americanum)Action Item Avoidance
In some teams, members feel so overloaded that they try to avoid any additional tasks. Here are some of the most popular patterns of action item avoidance.
Gregory B. Jaczko, the Chairman of the U.S. Nuclear Regulatory Commission (NRC).When the Chair Is a Bully: I
Most meetings have chairs or "leads." Although the expression that the chair "owns" the meeting is usually innocent shorthand, some chairs actually believe that they own the meeting. This view is almost entirely destructive. What are the consequences of this attitude, and what can we do about it?
Dogs Fighting in a Wooded Clearing, by Frans SnydersOvertalking: II
Overtalking is a tactic for dominating a conversation by talking to stop others from talking. When it happens, what can we do about it?
A lonely chimpanzeeWorkplace Politics and Social Exclusion: II
In workplace politics, social exclusion can be based on the professional role of the target, the organizational role of the target, or personal attributes of the target. Each kind has its own effects. Each requires specific responses.

See also Effective Meetings and Devious Political Tactics for more related articles.

Forthcoming issues of Point Lookout

A meeting in a typical conference roomComing April 3: Recapping Factioned Meetings
A factioned meeting is one in which participants identify more closely with their factions, rather than with the meeting as a whole. Agreements reached in such meetings are at risk of instability as participants maneuver for advantage after the meeting. Available here and by RSS on April 3.
Franz Halder, German general and the chief of staff of the Army High Command (OKH) in Nazi Germany from 1938 until September 1942And on April 10: Managing Dunning-Kruger Risk
A cognitive bias called the Dunning-Kruger Effect can create risk for organizational missions that require expertise beyond the range of knowledge and experience of decision-makers. They might misjudge the organization's capacity to execute the mission successfully. They might even be unaware of the risk of so misjudging. Available here and by RSS on April 10.

Coaching services

I offer email and telephone coaching at both corporate and individual rates. Contact Rick for details at rbrendPtoGuFOkTSMQOzxner@ChacEgGqaylUnkmwIkkwoCanyon.com or (650) 787-6475, or toll-free in the continental US at (866) 378-5470.

Get the ebook!

Past issues of Point Lookout are available in six ebooks:

Reprinting this article

Are you a writer, editor or publisher on deadline? Are you looking for an article that will get people talking and get compliments flying your way? You can have 500-1000 words in your inbox in one hour. License any article from this Web site. More info

Follow Rick

Send email or subscribe to one of my newsletters Follow me at LinkedIn Follow me at X, or share a post Subscribe to RSS feeds Subscribe to RSS feeds
The message of Point Lookout is unique. Help get the message out. Please donate to help keep Point Lookout available for free to everyone.
Technical Debt for Policymakers BlogMy blog, Technical Debt for Policymakers, offers resources, insights, and conversations of interest to policymakers who are concerned with managing technical debt within their organizations. Get the millstone of technical debt off the neck of your organization!
Go For It: Sometimes It's Easier If You RunBad boss, long commute, troubling ethical questions, hateful colleague? Learn what we can do when we love the work but not the job.
303 Tips for Virtual and Global TeamsLearn how to make your virtual global team sing.
101 Tips for Managing ChangeAre you managing a change effort that faces rampant cynicism, passive non-cooperation, or maybe even outright revolt?
101 Tips for Effective MeetingsLearn how to make meetings more productive — and more rare.
Exchange your "personal trade secrets" — the tips, tricks and techniques that make you an ace — with other aces, anonymously. Visit the Library of Personal Trade Secrets.
If your teams don't yet consistently achieve state-of-the-art teamwork, check out this catalog. Help is just a few clicks/taps away!
Ebooks, booklets and tip books on project management, conflict, writing email, effective meetings and more.