Point Lookout: a free weekly publication of Chaco Canyon Consulting
Volume 23, Issue 23;   June 7, 2023: Toxic Disrupters: Tactics

Toxic Disrupters: Tactics

by

Some people tend to disrupt meetings. Their motives vary, but they use techniques drawn from a limited collection. Examples: they violate norms, demand attention, mess with the agenda, and sow distrust. Response begins with recognizing their tactics.
A labyrinth. It's a good metaphor for what toxic disrupters try to erect in the path of the group.

A labyrinth. It's a good metaphor for what toxic disrupts try to erect in the path of the group.

Like all meetings, the meetings of small teams, boards, task forces, and commissions are vulnerable to disruption by determined individuals among their members. Disruption of these groups is sometimes helpful. Indeed, in many cases, disruption by a group member might be the only avenue that leads to a productive outcome. Usually, disruptions are unwelcome, even if they are productive and well intentioned.

But some unwelcome disruptions are toxic. They prevent the group — or, at least, they are intended to prevent the group — from producing a useful outcome. That's why it's important for members of small teams to be familiar with the strategies and tactics of toxic disrupters. In a post to come I'll address responses small groups can use to limit the damage toxic disrupters can do. In this post, I examine the tactics of toxic disrupters, and provide some insight into what makes them so effective.

A field guide for toxic disrupters

This post If members of small teams are familiar
with the strategies and tactics of toxic
disrupters, the team is better able to
limit the harm toxic disrupters can do
is written as a set of recommendations for disrupters who want to be truly effective at preventing the small group from producing anything useful. I wrote them this way to make them clear to people who are among the other members of groups disrupted by toxic disrupters. They aren't recommendations, though they do sound as if they are.

In what follows, I use the names Ted (he/him) and Trish (she/her) to refer to the toxic disrupter.

Know (and violate) the group's norms and customs
Most groups have sets of norms and customs that prescribe acceptable and unacceptable behavior of group members. These norms and customs may be written or unwritten, and they may be honored to various degrees. Example: Meetings will start and end on time. Or: We will not interrupt each other.
To prevent the groups' achieving a specific goal, Ted violates outrageously whatever norm or custom supports achieving that goal. For example, if the meeting Chair is facilitating the discussion, interrupting the Chair violates the norm, "We will not interrupt each other." By disrespecting the Chair, Ted reduces the Chair's authority. If Ted is persistent and rude enough, most Chairs are unwilling to do what's necessary to maintain their authority. Ted makes progess towards his goal by making the Chair appear to be feckless, rather than powerful.
Demand attention
Control the focus of the group's attention. If the group is addressing Issue #3, Trish raises Issue #79. If they somehow manage to stay on Issue #3, she raises questions about the manner in which they pursue Issue #3. If the group has formal rules of procedure, she uses parliamentary objections, quorum calls, or anything at all to throw sand in the gears. If necessary, she engages in specious personal attacks and name-calling. Political incorrectness is a useful tool in this effort.
Disrupters had best be aware, though, that counter-attacks are likely if their tactics are too obviously aimed at focusing attention. Connect objections and deflections as closely as possible to the stated objective of the group, without actually advancing the group toward that objective.
Insist on an agenda that conflicts with the stated agenda
In any given meeting, there are usually opportunities to amend the stated agenda. For example, there is the casual question, "Does everyone approve of this agenda?" But the more spontaneous, unanticipated moments are more likely to be disruptive.
For example, consider asking questions of the form, "Is anyone else uncomfortable addressing this item with X unavailable?" X can be a person, a piece of information, the results of a pending decision by another body, and so on. Unnecessary delay, disguised as prudence, can be very disruptive.
Sow distrust
As a toxic disrupter, if you know of personal alliances between or among some of the members of the group, be aware that these folks probably speak with each other privately, out of your awareness. They can coordinate their activities to limit your ability to disrupt the group.
Do what you can to break up these alliances. Question the motives of these people, privately if necessary. Misquote individuals to each other to create distrust among them.

Last words

This post has explored an approach for limiting the harm toxic disrupters can do by first recognizing their strategies and tactics, and then taking appropriate action. One note of caution: distinguishing between toxic disrupters and other well-intentioned disrupters is tricky business. Limiting the ability of a well-intentioned disrupter to disrupt can be just as damaging as failing to limit the ability of a toxic disrupter to disrupt. Much depends on what you know about the disruptive individual outside the context of the small team. Use what you know. If you know little of the person, get to know him or her better. Go to top Top  Next issue: Pseudo-Collaborations  Next Issue

101 Tips for Effective MeetingsDo you spend your days scurrying from meeting to meeting? Do you ever wonder if all these meetings are really necessary? (They aren't) Or whether there isn't some better way to get this work done? (There is) Read 101 Tips for Effective Meetings to learn how to make meetings much more productive and less stressful — and a lot more rare. Order Now!

Your comments are welcome

Would you like to see your comments posted here? rbrendPtoGuFOkTSMQOzxner@ChacEgGqaylUnkmwIkkwoCanyon.comSend me your comments by email, or by Web form.

About Point Lookout

This article in its entirety was written by a 
          human being. No machine intelligence was involved in any way.Thank you for reading this article. I hope you enjoyed it and found it useful, and that you'll consider recommending it to a friend.

This article in its entirety was written by a human being. No machine intelligence was involved in any way.

Point Lookout is a free weekly email newsletter. Browse the archive of past issues. Subscribe for free.

Support Point Lookout by joining the Friends of Point Lookout, as an individual or as an organization.

Do you face a complex interpersonal situation? Send it in, anonymously if you like, and I'll give you my two cents.

Related articles

More articles on Effective Meetings:

Senator Susan Collins of MaineDiscussion Distractions: I
Meetings could be far more productive, if only we could learn to recognize and prevent the distractions that lead us off topic and into the woods. Here is Part I of a small catalog of distractions frequently seen in meetings.
Gregory B. Jaczko, the Chairman of the U.S. Nuclear Regulatory Commission (NRC).When the Chair Is a Bully: I
Most meetings have chairs or "leads." Although the expression that the chair "owns" the meeting is usually innocent shorthand, some chairs actually believe that they own the meeting. This view is almost entirely destructive. What are the consequences of this attitude, and what can we do about it?
A leopard stalking its preyHow to Hijack Meetings
Recognizing the tactics meeting hijackers use is the first step to reducing the incidence of this abuse. Here are some of those tactics.
President Obama meets with leaders about job creation, December 3, 2009Naming Ideas
Participants in group discussions sometimes reference each other's contributions using the contributor's name. This risks offending the contributor or others who believe the idea is theirs. Naming ideas is less risky.
A blue peacock of IndiaSelf-Importance and Conversational Narcissism at Work: I
Conversational narcissism is a set of behaviors that participants use to focus the exchange on their own self-interest rather than the shared objective. This post emphasizes the role of these behaviors in advancing the participant's sense of self-importance.

See also Effective Meetings and Conflict Management for more related articles.

Forthcoming issues of Point Lookout

A dangerous curve in an icy roadComing May 1: Antipatterns for Time-Constrained Communication: 2
Recognizing just a few patterns that can lead to miscommunication can reduce the incidence of miscommunications. Here's Part 2 of a collection of antipatterns that arise in communication under time pressure, emphasizing those that depend on content. Available here and by RSS on May 1.
And on May 8: Antipatterns for Time-Constrained Communication: 3
Recognizing just a few patterns that can lead to miscommunication can reduce the incidence of problems. Here is Part 3 of a collection of antipatterns that arise in technical communication under time pressure, emphasizing past experiences of participants. Available here and by RSS on May 8.

Coaching services

I offer email and telephone coaching at both corporate and individual rates. Contact Rick for details at rbrendPtoGuFOkTSMQOzxner@ChacEgGqaylUnkmwIkkwoCanyon.com or (650) 787-6475, or toll-free in the continental US at (866) 378-5470.

Get the ebook!

Past issues of Point Lookout are available in six ebooks:

Reprinting this article

Are you a writer, editor or publisher on deadline? Are you looking for an article that will get people talking and get compliments flying your way? You can have 500-1000 words in your inbox in one hour. License any article from this Web site. More info

Follow Rick

Send email or subscribe to one of my newsletters Follow me at LinkedIn Follow me at X, or share a post Subscribe to RSS feeds Subscribe to RSS feeds
The message of Point Lookout is unique. Help get the message out. Please donate to help keep Point Lookout available for free to everyone.
Technical Debt for Policymakers BlogMy blog, Technical Debt for Policymakers, offers resources, insights, and conversations of interest to policymakers who are concerned with managing technical debt within their organizations. Get the millstone of technical debt off the neck of your organization!
Go For It: Sometimes It's Easier If You RunBad boss, long commute, troubling ethical questions, hateful colleague? Learn what we can do when we love the work but not the job.
303 Tips for Virtual and Global TeamsLearn how to make your virtual global team sing.
101 Tips for Managing ChangeAre you managing a change effort that faces rampant cynicism, passive non-cooperation, or maybe even outright revolt?
101 Tips for Effective MeetingsLearn how to make meetings more productive — and more rare.
Exchange your "personal trade secrets" — the tips, tricks and techniques that make you an ace — with other aces, anonymously. Visit the Library of Personal Trade Secrets.
If your teams don't yet consistently achieve state-of-the-art teamwork, check out this catalog. Help is just a few clicks/taps away!
Ebooks, booklets and tip books on project management, conflict, writing email, effective meetings and more.