Point Lookout: a free weekly publication of Chaco Canyon Consulting
Volume 23, Issue 23;   June 7, 2023: Toxic Disrupters: Tactics

Toxic Disrupters: Tactics


Some people tend to disrupt meetings. Their motives vary, but they use techniques drawn from a limited collection. Examples: they violate norms, demand attention, mess with the agenda, and sow distrust. Response begins with recognizing their tactics.
A labyrinth. It's a good metaphor for what toxic disrupters try to erect in the path of the group.

A labyrinth. It's a good metaphor for what toxic disrupts try to erect in the path of the group.

Like all meetings, the meetings of small teams, boards, task forces, and commissions are vulnerable to disruption by determined individuals among their members. Disruption of these groups is sometimes helpful. Indeed, in many cases, disruption by a group member might be the only avenue that leads to a productive outcome. Usually, disruptions are unwelcome, even if they are productive and well intentioned.

But some unwelcome disruptions are toxic. They prevent the group — or, at least, they are intended to prevent the group — from producing a useful outcome. That's why it's important for members of small teams to be familiar with the strategies and tactics of toxic disrupters. In a post to come I'll address responses small groups can use to limit the damage toxic disrupters can do. In this post, I examine the tactics of toxic disrupters, and provide some insight into what makes them so effective.

A field guide for toxic disrupters

This post If members of small teams are familiar
with the strategies and tactics of toxic
disrupters, the team is better able to
limit the harm toxic disrupters can do
is written as a set of recommendations for disrupters who want to be truly effective at preventing the small group from producing anything useful. I wrote them this way to make them clear to people who are among the other members of groups disrupted by toxic disrupters. They aren't recommendations, though they do sound as if they are.

In what follows, I use the names Ted (he/him) and Trish (she/her) to refer to the toxic disrupter.

Know (and violate) the group's norms and customs
Most groups have sets of norms and customs that prescribe acceptable and unacceptable behavior of group members. These norms and customs may be written or unwritten, and they may be honored to various degrees. Example: Meetings will start and end on time. Or: We will not interrupt each other.
To prevent the groups' achieving a specific goal, Ted violates outrageously whatever norm or custom supports achieving that goal. For example, if the meeting Chair is facilitating the discussion, interrupting the Chair violates the norm, "We will not interrupt each other." By disrespecting the Chair, Ted reduces the Chair's authority. If Ted is persistent and rude enough, most Chairs are unwilling to do what's necessary to maintain their authority. Ted makes progess towards his goal by making the Chair appear to be feckless, rather than powerful.
Demand attention
Control the focus of the group's attention. If the group is addressing Issue #3, Trish raises Issue #79. If they somehow manage to stay on Issue #3, she raises questions about the manner in which they pursue Issue #3. If the group has formal rules of procedure, she uses parliamentary objections, quorum calls, or anything at all to throw sand in the gears. If necessary, she engages in specious personal attacks and name-calling. Political incorrectness is a useful tool in this effort.
Disrupters had best be aware, though, that counter-attacks are likely if their tactics are too obviously aimed at focusing attention. Connect objections and deflections as closely as possible to the stated objective of the group, without actually advancing the group toward that objective.
Insist on an agenda that conflicts with the stated agenda
In any given meeting, there are usually opportunities to amend the stated agenda. For example, there is the casual question, "Does everyone approve of this agenda?" But the more spontaneous, unanticipated moments are more likely to be disruptive.
For example, consider asking questions of the form, "Is anyone else uncomfortable addressing this item with X unavailable?" X can be a person, a piece of information, the results of a pending decision by another body, and so on. Unnecessary delay, disguised as prudence, can be very disruptive.
Sow distrust
As a toxic disrupter, if you know of personal alliances between or among some of the members of the group, be aware that these folks probably speak with each other privately, out of your awareness. They can coordinate their activities to limit your ability to disrupt the group.
Do what you can to break up these alliances. Question the motives of these people, privately if necessary. Misquote individuals to each other to create distrust among them.

Last words

This post has explored an approach for limiting the harm toxic disrupters can do by first recognizing their strategies and tactics, and then taking appropriate action. One note of caution: distinguishing between toxic disrupters and other well-intentioned disrupters is tricky business. Limiting the ability of a well-intentioned disrupter to disrupt can be just as damaging as failing to limit the ability of a toxic disrupter to disrupt. Much depends on what you know about the disruptive individual outside the context of the small team. Use what you know. If you know little of the person, get to know him or her better. Go to top Top  Next issue: Pseudo-Collaborations  Next Issue

101 Tips for Effective MeetingsDo you spend your days scurrying from meeting to meeting? Do you ever wonder if all these meetings are really necessary? (They aren't) Or whether there isn't some better way to get this work done? (There is) Read 101 Tips for Effective Meetings to learn how to make meetings much more productive and less stressful — and a lot more rare. Order Now!

Your comments are welcome

Would you like to see your comments posted here? rbrendPtoGuFOkTSMQOzxner@ChacEgGqaylUnkmwIkkwoCanyon.comSend me your comments by email, or by Web form.

About Point Lookout

This article in its entirety was written by a 
          human being. No machine intelligence was involved in any way.Thank you for reading this article. I hope you enjoyed it and found it useful, and that you'll consider recommending it to a friend.

This article in its entirety was written by a human being. No machine intelligence was involved in any way.

Point Lookout is a free weekly email newsletter. Browse the archive of past issues. Subscribe for free.

Support Point Lookout by joining the Friends of Point Lookout, as an individual or as an organization.

Do you face a complex interpersonal situation? Send it in, anonymously if you like, and I'll give you my two cents.

Related articles

More articles on Effective Meetings:

A hearing in the U.S. Senate, in which Defense Secretary Donald Rumsfeld is responding to questions about appropriations.What Makes a Good Question?
In group discussion or group problem solving, many of us focus on being the first one to provide the answer. The right answer can be good; but often, the right question can be better.
King Pyrrhus of EpiroDivisive Debates and Virulent Victories
When groups decide divisive issues, harmful effects can linger for weeks, months, or forever. Although those who prevail might be ready to "move on," others might feel so alienated that they experience even daily routine as fresh insult and disparagement. How a group handles divisive issues can determine its success.
The Marx brothers: Chico, Harpo, Groucho and ZeppoTINOs: Teams in Name Only
Perhaps the most significant difference between face-to-face teams and virtual or distributed teams is their potential to develop from workgroups into true teams — an area in which virtual or distributed teams are at a decided disadvantage. Often, virtual and distributed teams are teams in name only.
Braided streams in Grewingk Glacier RiverWhy Sidebars Happen
Sidebar conversations between meeting participants, conducted while someone else has the floor, are a distracting form of disorder that can waste time and reduce meeting effectiveness. Why do sidebars happen?
What a videoconference looks like when all participants have their cameras offOff-Putting and Conversational Narcissism at Work: III
Having off-putting interactions is one of four themes of conversational narcissism. Here are six behavioral patterns that relate to off-putting interactions and how abusers use them to control conversations.

See also Effective Meetings and Conflict Management for more related articles.

Forthcoming issues of Point Lookout

A close-up view of a chipseal road surfaceComing July 3: Additive bias…or Not: II
Additive bias is a cognitive bias that many believe contributes to bloat of commercial products. When we change products to make them more capable, additive bias might not play a role, because economic considerations sometimes favor additive approaches. Available here and by RSS on July 3.
The standard conception of delegationAnd on July 10: On Delegating Accountability: I
As the saying goes, "You can't delegate your own accountability." Despite wide knowledge of this aphorism, people try it from time to time, especially when overcome by the temptation of a high-risk decision. What can you delegate, and how can you do it? Available here and by RSS on July 10.

Coaching services

I offer email and telephone coaching at both corporate and individual rates. Contact Rick for details at rbrendPtoGuFOkTSMQOzxner@ChacEgGqaylUnkmwIkkwoCanyon.com or (650) 787-6475, or toll-free in the continental US at (866) 378-5470.

Get the ebook!

Past issues of Point Lookout are available in six ebooks:

Reprinting this article

Are you a writer, editor or publisher on deadline? Are you looking for an article that will get people talking and get compliments flying your way? You can have 500-1000 words in your inbox in one hour. License any article from this Web site. More info

Follow Rick

Send email or subscribe to one of my newsletters Follow me at LinkedIn Follow me at X, or share a post Subscribe to RSS feeds Subscribe to RSS feeds
The message of Point Lookout is unique. Help get the message out. Please donate to help keep Point Lookout available for free to everyone.
Technical Debt for Policymakers BlogMy blog, Technical Debt for Policymakers, offers resources, insights, and conversations of interest to policymakers who are concerned with managing technical debt within their organizations. Get the millstone of technical debt off the neck of your organization!
Go For It: Sometimes It's Easier If You RunBad boss, long commute, troubling ethical questions, hateful colleague? Learn what we can do when we love the work but not the job.
303 Tips for Virtual and Global TeamsLearn how to make your virtual global team sing.
101 Tips for Managing ChangeAre you managing a change effort that faces rampant cynicism, passive non-cooperation, or maybe even outright revolt?
101 Tips for Effective MeetingsLearn how to make meetings more productive — and more rare.
Exchange your "personal trade secrets" — the tips, tricks and techniques that make you an ace — with other aces, anonymously. Visit the Library of Personal Trade Secrets.
If your teams don't yet consistently achieve state-of-the-art teamwork, check out this catalog. Help is just a few clicks/taps away!
Ebooks, booklets and tip books on project management, conflict, writing email, effective meetings and more.