Point Lookout: a free weekly publication of Chaco Canyon Consulting
Volume 22, Issue 53;   January 5, 2022: Covert Inter-Team Noncooperation

Covert Inter-Team Noncooperation


Occasionally teams find that they must cooperate with another team despite strong misgivings. Because noncooperation isn't an option, they find covert ways to avoid cooperating. Here's a little catalog of techniques of Covert Inter-Team Noncooperation.
Two football teams face off at the line of scrimmage

Two football teams face off at the line of scrimmage. At work, face-offs between teams are much less well defined than are face-offs on the football field. Few teams wear distinguishing uniforms. The issue at hand (the line of scrimmage) isn't as clear as a white stripe in the green grass. No player plays for both teams. The conflict is rarely physical. But given all that, the conflict can be almost as intense.

Photo by football wife from Pexels

From time to time one team (call it Team Reluctant) might be required to cooperate with another team (call it Team Requestor) to produce something that Team Requestor needs, but which Team Reluctant doesn't want to produce, or which Team Reluctant regards as a waste of time or as conflicting with other priorities. And in some of these situations Team Reluctant is required not merely to cooperate, but to cooperate enthusiastically, or, at least, to not get caught cooperating unenthusiastically. From the perspective of Team Reluctant, such situations call for what might be termed covert inter-team noncooperation.

The most important indicators of covert inter-team noncooperation are two. First, the actions of Team Reluctant do appear to be cooperative. That is, Team Reluctant fulfills its obligations in a technical sense. Second, Team Requestor doesn't receive what it actually needs. Even though Team Reluctant has executed actions that technically satisfy Team Requestor's needs to a reasonable degree, Team Requestor can make very little progress because what it has received from Team Reluctant is pseudo-cooperation. What Team Reluctant delivers to Team Requestor isn't useful in any practical sense.

What follows is a little catalog of tactics Team Reluctant can use to execute a strategy of covert inter-team noncooperation. Team Requestor can use this catalog as a guide for what to watch for. That knowledge can help Team Requestor manage the risk of Team Reluctant using such a strategy. For example, if Team Requestor frames its requests carefully enough and specifically enough, it can make pseudo-cooperation difficult.

For concreteness, I've written the catalog as if it applied to a context in which Team Requestor needs a package of information, including some data files that Team Reluctant created to make projections of the behavior of a system under study. But the tactics described in this catalog apply to many situations in which one team needs something from another.

Team Reluctant can dawdle in responding to Team Requestor's requests. Dawdling is an appealing tactic for Team Reluctant because it limits the total requests per unit time that Team Requestor can produce.
What Team In some situations teams are required not
merely to cooperate, but to cooperate
enthusiastically, or, at least, not get
caught cooperating unenthusiastically
Requestor wants should be readily available, because Team Reluctant should have "frozen" a copy of everything they used to produce their projections. For this reason, delays would be minimal if Team Reluctant were actually cooperating.
Configuration issues
The term "configuration management" denotes the practice of making certain that the different versions of the various components of a complex system are compatible. In this case, if Team Reluctant is actually cooperating, they will want to be certain to deliver to Team Requestor versions of files that are meant to work properly together. Things can go wrong when multiple "runs" of the system are executed with incompatible versions of some files. When configuration management is practiced effectively, we don't use incompatible versions of files to execute a run of the system.
An uncooperative Team Reluctant might deliver to Team Requestor a set of data files that are not meant to operate together. That is, although the files appear superficially to be a complete and compatible set, they include one or more files that are incompatible with the rest. If the incompatibility is discovered, a member of Team Reluctant might apologize and explain, "Sorry, in trying to respond to your request so quickly we got the wrong file in there. Here's the right one." The incident looks like an honest mistake.
Missing files
In response to Team Requestor's request for data files, Team Reluctant might deliver a package of data files, but that package might be incomplete. This too, can look like an honest mistake, even if it is not.
Incompleteness can be especially difficult to detect if the ability to recognize that some elements are missing depends on performing a significant piece of work. For example, if Team Requestor is attempting to replicate Team Reluctant's work, as they might if conducting an audit, Team Reluctant can omit an element that isn't actually required until late in the effort. In the interim, the system can produce results that are incorrect but mysteriously so. In some cases, Team Requestor might be able to determine that something is missing only by "debugging" the system.
Irrelevant files
The package delivered to Team Requestor might be a complete set of files, and they might be compatible with each other, but they might represent a run of the system that isn't the run Team Requestor wanted to receive. Another "honest" error.
Missing, incompatible, or incomplete documentation
Most data sets require accompanying documentation, explaining what file contains what data. Think of this documentation as engineer's notes. It tells anyone who wants to replicate the work exactly what to do, and where necessary information and data can be found. And the documentation must be compatible with the files.
Detecting missing documentation is relatively easy, because it isn't there. But detecting incomplete documentation can be difficult, because what you're looking for is what's missing from a possibly impressive looking assemblage of useful documentation. People don't usually notice missing elements until someone needs them. Likewise, incompatible document elements usually look like they fit in. Only when we actually need them do we recognize that they aren't compatible. These tactics often escape Team Requestor's notice until they have caused serious problems.

Finally, there is at least one most delicate tactic. When both teams are elements of the same organization, some members of Team Requestor might actually be loyal to the mission of Team Reluctant — covertly, of course. They can introduce delays and confusion into Team Requestor's activities at any point, if they're carful enough and knowledgeable enough. Go to top Top  Next issue: On Gratuitous Harshness  Next Issue

101 Tips for Managing Conflict Are you fed up with tense, explosive meetings? Are you or a colleague the target of a bully? Destructive conflict can ruin organizations. But if we believe that all conflict is destructive, and that we can somehow eliminate conflict, or that conflict is an enemy of productivity, then we're in conflict with Conflict itself. Read 101 Tips for Managing Conflict to learn how to make peace with conflict and make it an organizational asset. Order Now!

Your comments are welcome

Would you like to see your comments posted here? rbrenogMhuqCxAnbfLvzbner@ChacigAthhhYwzZDgxshoCanyon.comSend me your comments by email, or by Web form.

About Point Lookout

This article in its entirety was written by a 
          human being. No machine intelligence was involved in any way.Thank you for reading this article. I hope you enjoyed it and found it useful, and that you'll consider recommending it to a friend.

This article in its entirety was written by a human being. No machine intelligence was involved in any way.

Point Lookout is a free weekly email newsletter. Browse the archive of past issues. Subscribe for free.

Support Point Lookout by joining the Friends of Point Lookout, as an individual or as an organization.

Do you face a complex interpersonal situation? Send it in, anonymously if you like, and I'll give you my two cents.

Related articles

More articles on Conflict Management:

Full disk view of the Earth taken on December 7, 1972Corrosive Buts
When we discuss what we care deeply about, and when we differ, the word "but" can lead us into destructive conflict. Such a little word, yet so corrosive. Why? What can we do instead?
A gray wolf. Animosity between wolves helps ensure balance.Animosity Patterns
Animosity between two people at work is often attributed to "personality clashes." While sometimes people can't get along, animosity can also be a tool for accomplishing strictly political ends. Here's a short catalog of some of its uses.
Comparison of energy consumption of compact fluorescent bulbs with incandescent bulbsWhat Insubordinate Nonsubordinates Want: II
When you're responsible for an organizational function, and someone not reporting to you won't recognize your authority, or doesn't comply with policies you rightfully established, you have a hard time carrying out your responsibilities. Why does this happen?
A mixed stand of aspen and pine in the Okanagan region of British Columbia and Washington stateHow Workplace Bullies Use OODA: I
Workplace bullies who succeed in carrying on their activities over a long period of time rely on more than mere intimidation to escape prosecution. They proactively shape their environments to make them safe for bullying. The OODA model gives us insights into how they accomplish this.
The Perito Moreno Glacier in ArgentinaUnresponsive Suppliers: II
When a project depends on external suppliers for some tasks and materials, supplier performance can affect our ability to meet deadlines. How can communication help us get what we need from unresponsive suppliers?

See also Conflict Management and Devious Political Tactics for more related articles.

Forthcoming issues of Point Lookout

A blue peacock of IndiaComing October 4: Self-Importance and Conversational Narcissism at Work: I
Conversational narcissism is a set of behaviors that participants use to focus the exchange on their own self-interest rather than the shared objective. This post emphasizes the role of these behaviors in advancing a narcissist's sense of self-importance. Available here and by RSS on October 4.
Men in conversation at an eventAnd on October 11: Self-Importance and Conversational Narcissism at Work: II
Self-importance is one of four major themes of conversational narcissism. Knowing how to recognize the patterns of conversational narcissism is a fundamental skill needed for controlling it. Here are eight examples that emphasize self-importance. Available here and by RSS on October 11.

Coaching services

I offer email and telephone coaching at both corporate and individual rates. Contact Rick for details at rbrenogMhuqCxAnbfLvzbner@ChacigAthhhYwzZDgxshoCanyon.com or (650) 787-6475, or toll-free in the continental US at (866) 378-5470.

Get the ebook!

Past issues of Point Lookout are available in six ebooks:

Reprinting this article

Are you a writer, editor or publisher on deadline? Are you looking for an article that will get people talking and get compliments flying your way? You can have 500-1000 words in your inbox in one hour. License any article from this Web site. More info

Follow Rick

Send email or subscribe to one of my newsletters Follow me at LinkedIn Follow me at Twitter, or share a tweet Subscribe to RSS feeds Subscribe to RSS feeds
The message of Point Lookout is unique. Help get the message out. Please donate to help keep Point Lookout available for free to everyone.
Technical Debt for Policymakers BlogMy blog, Technical Debt for Policymakers, offers resources, insights, and conversations of interest to policymakers who are concerned with managing technical debt within their organizations. Get the millstone of technical debt off the neck of your organization!
Go For It: Sometimes It's Easier If You RunBad boss, long commute, troubling ethical questions, hateful colleague? Learn what we can do when we love the work but not the job.
303 Tips for Virtual and Global TeamsLearn how to make your virtual global team sing.
101 Tips for Managing ChangeAre you managing a change effort that faces rampant cynicism, passive non-cooperation, or maybe even outright revolt?
101 Tips for Effective MeetingsLearn how to make meetings more productive — and more rare.
Exchange your "personal trade secrets" — the tips, tricks and techniques that make you an ace — with other aces, anonymously. Visit the Library of Personal Trade Secrets.
If your teams don't yet consistently achieve state-of-the-art teamwork, check out this catalog. Help is just a few clicks/taps away!
Ebooks, booklets and tip books on project management, conflict, writing email, effective meetings and more.