Point Lookout: a free weekly publication of Chaco Canyon Consulting
Volume 19, Issue 49;   December 4, 2019: Implicit Interrogation Tactics

Implicit Interrogation Tactics

by

When one person tries surreptitiously to extract information from another at work, an implicit interrogation is taking place. Here are seven tactics that people use to interrogate others without revealing what they're doing.
Benches at the beach

Two park benches at the beach. The setting for an implicit interrogation need not be an office or conference room. In some sense, the more unusual the setting, the less likely is the implicit interrogation to be recognized as such. This particular setting probably isn't the best, because it's so isolated. A setting with more people might be much better.

In the workplace, we use formal interrogations as components of investigations to determine whether or to what extent organizational policy has been violated. As we discussed last time, fairness is a goal of formal interrogations. The process is sanctioned by the organization and policies govern how they're conducted. For example, the person being interrogated knows that an interrogation is underway, and the organization might even provide assistance and advice to him or her. "Interview" might be a better term for the process.

But there's another form of workplace interrogation — one for which the term "interview" fits not at all well. I call it implicit interrogation because the person interrogated — whom I've been calling "Reese" (R for Responder) is rarely aware that an interrogation is underway. In implicit interrogations, the person seeking information — whom I've been calling "Alex" (A for Asker) — takes steps to conceal the interrogation, or failing that, to conceal the objective of the interrogation. When an implicit interrogation is well executed, Reese remains ignorant of what information Alex was seeking, and indeed, unaware that an implicit interrogation is happening.

In this The essence of implicit interrogation
is deceptive inquiry into what
a person knows or doesn't know
part of our exploration of implicit interrogation we describe seven examples of tactics and strategies the interrogator (Alex) can employ to obtain the desired information with a low probability of the respondent (Reese) recognizing that an interrogation has occurred. I'll also use the name Incident to denote the situation that is the subject of the Implicit Interrogation. By a coin flip, I determined that Alex is female and Reese male.

Choice of interrogator
Before the interrogation begins, those who seek the information must choose an interrogator. If Reese has a trusting relationship with someone among the people who want the information, then that trusted person will usually be the designated Alex. Otherwise, someone else Reese trusts will be recruited for the role of Alex.
If Reese notices that someone (Alex) with whom he ordinarily has little contact is suddenly interested in spending time together, and if Reese is aware that he knows something about the Incident, he would do well to approach with caution any conversations with Alex. Such a change in Alex's behavior could be an indicator that an implicit interrogation is underway.
Casual setting
To allay Reese's fears and to prevent him from suspecting that an interrogation is in process, Alex will choose a casual setting for their conversation — one that's familiar to Reese. The setting will be public, but it will be one in which they have "enterprise privacy" — no one from the organization is likely to be able to overhear their conversation. Examples: restaurants, cafes, or perhaps a walk outside on a nice day. Alex will adopt a casual demeanor, or she might even appear to be distracted by the scenery, the menu, or the food or drink.
Disclosing a "confidence"
By disclosing a confidence, Alex hopes to build Reese's trust in Alex. Such disclosure creates a pseudo-conspiracy between Alex and Reese. A naïve Reese will experience this conspiracy as power over Alex, because Reese would then be in a position to report to someone that Alex has disclosed the confidence. Confidences used in this way are rarely of any value. Although they might be secrets unknown to Reese, they're likely well known in the circles in which Alex travels.
Asking for advice
Alex can ask Reese for advice on a topic Reese regards as within his area of expertise. Alex might or might not actually need the requested advice — that isn't the point of the request. The point of the request is flattery. By flattering Reese, Alex hopes to further assuage any uneasiness on Reese's part.
Similarly, Alex can ask Reese to assess a situation or the performance of another person. Being asked for his views about a person or a matter not normally within his span of responsibility can induce in Reese a sense that his opinion matters, which can cause Reese to speculate that Alex respects his views and might be able to help advance Reese's career. Alex's purpose is to flatter Reese and distract him from the extraordinary nature of the interactions taking place in the context of the implicit interrogation.
Masking conversation and questions
At some point in the conversation, to elicit the information she seeks, Alex might need to ask Reese a direct question. To limit the probability that Reese might recognize that question, Alex can include it among other questions, conversation, and banter. For example, if Alex wants to know whether Don attended the afternoon session of the conference call, she might ask about Don only after asking about Cole and before asking about Ellie.
Making intentional misstatements
Maneuvering Reese into volunteering information is another technique for concealing that an implicit interrogation is taking place. One technique for doing this is to make an intentional misstatement, hoping that Reese will correct it. For example, to determine whether Don attended the afternoon session of the conference call, Alex might say, "I heard that Don was out at the client site yesterday and missed the conference call. How did it go without him?"
Changing the subject suddenly
Swift and sudden changes of subject can indicate an attempt to distract from whatever has just been said. Perhaps Alex felt that her previous statement was revealing, or perhaps Reese provided her with a piece of critical information, and she no longer needs to pursue the previous thread. Or perhaps Reese said or did something (or didn't say or didn't do something) that Alex interpreted as revealing that Reese might have grasped that an implicit interrogation is taking place. In any case, Alex probably wants to distract attention from the previous point.

Certainly there are dozens more of these ploys. Whether they work by building trust or by deception, the goal is the same: make Reese comfortable enough to tell what he knows without arousing his suspicions. Implicit interrogation is therefore at or beyond the bounds of ethical behavior. If you find yourself conducting such an exercise, reconsideration might be in order.  Implicit Interrogations First issue in this series  Go to top Top  Next issue: The Rhyme-as-Reason Effect  Next Issue

303 Secrets of Workplace PoliticsIs every other day a tense, anxious, angry misery as you watch people around you, who couldn't even think their way through a game of Jacks, win at workplace politics and steal the credit and glory for just about everyone's best work including yours? Read 303 Secrets of Workplace Politics, filled with tips and techniques for succeeding in workplace politics. More info

Your comments are welcome

Would you like to see your comments posted here? rbrenyrWpTxHuyCrjZbUpner@ChacnoFNuSyWlVzCaGfooCanyon.comSend me your comments by email, or by Web form.

About Point Lookout

This article in its entirety was written by a 
          human being. No machine intelligence was involved in any way.Thank you for reading this article. I hope you enjoyed it and found it useful, and that you'll consider recommending it to a friend.

This article in its entirety was written by a human being. No machine intelligence was involved in any way.

Point Lookout is a free weekly email newsletter. Browse the archive of past issues. Subscribe for free.

Support Point Lookout by joining the Friends of Point Lookout, as an individual or as an organization.

Do you face a complex interpersonal situation? Send it in, anonymously if you like, and I'll give you my two cents.

Related articles

More articles on Devious Political Tactics:

Daffodils of the variety Narcissus 'Barrett Browning'Narcissistic Behavior at Work: I
Briefly, when people exhibit narcissistic behavior they're engaging in activity that systematically places their own interests and welfare ahead of the interests and welfare of anyone or anything else. It's behavior that threatens the welfare of the organization and everyone employed there.
George Orwell's 1933 press card photo issued by the Branch of the National Union of JournalistsNarcissistic Behavior at Work: II
Narcissistic behavior at work threatens the enterprise. People who behave narcissistically systematically place their own interests and welfare ahead of anyone or anything else. In this Part II of the series we consider the narcissistic preoccupation with superiority fantasies.
Mistletoe growing in abundance in the Wye Valley, WalesNarcissistic Behavior at Work: VI
Narcissistic behavior at work distorts decisions, disrupts relationships, and generates toxic conflict. These consequences limit the ability of the organization to achieve its goals. In this part of our series we examine the effects of exploiting others for personal ends.
Portrait of a woman titled "Monomania of Envy"Narcissistic Behavior at Work: VIII
Narcissistic behavior at work can have roots in attitudes and beliefs. Understanding which attitudes or beliefs underlie narcissistic behavior can sometimes have predictive value. Among such attitudes or beliefs are those related to envy.
An exit signComply, Resist, or Exploit?
When we encounter obstacles, we have choices about how we deal with them. Generally, we can comply, we can resist, or sometimes, we can find ways to use the obstacles — to exploit them — to advance to our objectives. The pandemic provides two examples.

See also Devious Political Tactics and Devious Political Tactics for more related articles.

Forthcoming issues of Point Lookout

Image of Hurricane Isabel by Astronaut Ed Lu, taken from the International Space Station, September 15, 2003Coming January 1: The Storming Puzzle: II
For some task-oriented work groups, Tuckman's model of small group development doesn't seem to fit. Storming seems to be absent, or Storming never ends. To learn how this illusion forms, look closely at Satir's Change Model and at what we call a task-oriented work group. Available here and by RSS on January 1.
National Weather Service Director Jack Kelly presents civil engineer Herbert Saffir (on right) with a framed poster of Hurricane Andrew depicting the Saffir-Simpson scale for rating the strength of hurricanesAnd on January 8: The Storming Puzzle: III
For some task-oriented work groups, Tuckman's model of small group development seems not to fit. Storming seems to be either absent or continuous. To learn how this illusion forms, look closely at the processes that can precipitate episodes of Storming in task-oriented work groups. Available here and by RSS on January 8.

Coaching services

I offer email and telephone coaching at both corporate and individual rates. Contact Rick for details at rbrenyrWpTxHuyCrjZbUpner@ChacnoFNuSyWlVzCaGfooCanyon.com or (650) 787-6475, or toll-free in the continental US at (866) 378-5470.

Get the ebook!

Past issues of Point Lookout are available in six ebooks:

Reprinting this article

Are you a writer, editor or publisher on deadline? Are you looking for an article that will get people talking and get compliments flying your way? You can have 500-1000 words in your inbox in one hour. License any article from this Web site. More info

Follow Rick

Send email or subscribe to one of my newsletters Follow me at LinkedIn Follow me at X, or share a post Subscribe to RSS feeds Subscribe to RSS feeds
The message of Point Lookout is unique. Help get the message out. Please donate to help keep Point Lookout available for free to everyone.
Technical Debt for Policymakers BlogMy blog, Technical Debt for Policymakers, offers resources, insights, and conversations of interest to policymakers who are concerned with managing technical debt within their organizations. Get the millstone of technical debt off the neck of your organization!
Go For It: Sometimes It's Easier If You RunBad boss, long commute, troubling ethical questions, hateful colleague? Learn what we can do when we love the work but not the job.
303 Tips for Virtual and Global TeamsLearn how to make your virtual global team sing.
101 Tips for Managing ChangeAre you managing a change effort that faces rampant cynicism, passive non-cooperation, or maybe even outright revolt?
101 Tips for Effective MeetingsLearn how to make meetings more productive — and more rare.
Exchange your "personal trade secrets" — the tips, tricks and techniques that make you an ace — with other aces, anonymously. Visit the Library of Personal Trade Secrets.
If your teams don't yet consistently achieve state-of-the-art teamwork, check out this catalog. Help is just a few clicks/taps away!
Ebooks, booklets and tip books on project management, conflict, writing email, effective meetings and more.