Point Lookout: a free weekly publication of Chaco Canyon Consulting
Volume 23, Issue 23;   June 7, 2023: Toxic Disrupters: Tactics

Toxic Disrupters: Tactics

by

Some people tend to disrupt meetings. Their motives vary, but they use techniques drawn from a limited collection. Examples: they violate norms, demand attention, mess with the agenda, and sow distrust. Response begins with recognizing their tactics.
A labyrinth. It's a good metaphor for what toxic disrupters try to erect in the path of the group.

A labyrinth. It's a good metaphor for what toxic disrupts try to erect in the path of the group.

Like all meetings, the meetings of small teams, boards, task forces, and commissions are vulnerable to disruption by determined individuals among their members. Disruption of these groups is sometimes helpful. Indeed, in many cases, disruption by a group member might be the only avenue that leads to a productive outcome. Usually, disruptions are unwelcome, even if they are productive and well intentioned.

But some unwelcome disruptions are toxic. They prevent the group — or, at least, they are intended to prevent the group — from producing a useful outcome. That's why it's important for members of small teams to be familiar with the strategies and tactics of toxic disrupters. In a post to come I'll address responses small groups can use to limit the damage toxic disrupters can do. In this post, I examine the tactics of toxic disrupters, and provide some insight into what makes them so effective.

A field guide for toxic disrupters

This post If members of small teams are familiar
with the strategies and tactics of toxic
disrupters, the team is better able to
limit the harm toxic disrupters can do
is written as a set of recommendations for disrupters who want to be truly effective at preventing the small group from producing anything useful. I wrote them this way to make them clear to people who are among the other members of groups disrupted by toxic disrupters. They aren't recommendations, though they do sound as if they are.

In what follows, I use the names Ted (he/him) and Trish (she/her) to refer to the toxic disrupter.

Know (and violate) the group's norms and customs
Most groups have sets of norms and customs that prescribe acceptable and unacceptable behavior of group members. These norms and customs may be written or unwritten, and they may be honored to various degrees. Example: Meetings will start and end on time. Or: We will not interrupt each other.
To prevent the groups' achieving a specific goal, Ted violates outrageously whatever norm or custom supports achieving that goal. For example, if the meeting Chair is facilitating the discussion, interrupting the Chair violates the norm, "We will not interrupt each other." By disrespecting the Chair, Ted reduces the Chair's authority. If Ted is persistent and rude enough, most Chairs are unwilling to do what's necessary to maintain their authority. Ted makes progess towards his goal by making the Chair appear to be feckless, rather than powerful.
Demand attention
Control the focus of the group's attention. If the group is addressing Issue #3, Trish raises Issue #79. If they somehow manage to stay on Issue #3, she raises questions about the manner in which they pursue Issue #3. If the group has formal rules of procedure, she uses parliamentary objections, quorum calls, or anything at all to throw sand in the gears. If necessary, she engages in specious personal attacks and name-calling. Political incorrectness is a useful tool in this effort.
Disrupters had best be aware, though, that counter-attacks are likely if their tactics are too obviously aimed at focusing attention. Connect objections and deflections as closely as possible to the stated objective of the group, without actually advancing the group toward that objective.
Insist on an agenda that conflicts with the stated agenda
In any given meeting, there are usually opportunities to amend the stated agenda. For example, there is the casual question, "Does everyone approve of this agenda?" But the more spontaneous, unanticipated moments are more likely to be disruptive.
For example, consider asking questions of the form, "Is anyone else uncomfortable addressing this item with X unavailable?" X can be a person, a piece of information, the results of a pending decision by another body, and so on. Unnecessary delay, disguised as prudence, can be very disruptive.
Sow distrust
As a toxic disrupter, if you know of personal alliances between or among some of the members of the group, be aware that these folks probably speak with each other privately, out of your awareness. They can coordinate their activities to limit your ability to disrupt the group.
Do what you can to break up these alliances. Question the motives of these people, privately if necessary. Misquote individuals to each other to create distrust among them.

Last words

This post has explored an approach for limiting the harm toxic disrupters can do by first recognizing their strategies and tactics, and then taking appropriate action. One note of caution: distinguishing between toxic disrupters and other well-intentioned disrupters is tricky business. Limiting the ability of a well-intentioned disrupter to disrupt can be just as damaging as failing to limit the ability of a toxic disrupter to disrupt. Much depends on what you know about the disruptive individual outside the context of the small team. Use what you know. If you know little of the person, get to know him or her better. Go to top Top  Next issue: Pseudo-Collaborations  Next Issue

101 Tips for Effective MeetingsDo you spend your days scurrying from meeting to meeting? Do you ever wonder if all these meetings are really necessary? (They aren't) Or whether there isn't some better way to get this work done? (There is) Read 101 Tips for Effective Meetings to learn how to make meetings much more productive and less stressful — and a lot more rare. Order Now!

Your comments are welcome

Would you like to see your comments posted here? rbrenjTnUayrCbSnnEcYfner@ChacdcYpBKAaMJgMalFXoCanyon.comSend me your comments by email, or by Web form.

About Point Lookout

This article in its entirety was written by a 
          human being. No machine intelligence was involved in any way.Thank you for reading this article. I hope you enjoyed it and found it useful, and that you'll consider recommending it to a friend.

This article in its entirety was written by a human being. No machine intelligence was involved in any way.

Point Lookout is a free weekly email newsletter. Browse the archive of past issues. Subscribe for free.

Support Point Lookout by joining the Friends of Point Lookout, as an individual or as an organization.

Do you face a complex interpersonal situation? Send it in, anonymously if you like, and I'll give you my two cents.

Related articles

More articles on Personal, Team, and Organizational Effectiveness:

Stuffed bearsStart a Project Nursery
In a Project Nursery, professionals from across the entire organization collaborate to conceive of new projects. When all organizational elements help decide which projects to investigate, the menu they develop best suits organizational needs and capabilities.
A frost-covered spider webSome Limits of Root Cause Analysis
Root Cause Analysis uses powerful tools for finding the sources of process problems. The approach has been so successful that it has become a way of thinking about organizational patterns. Yet, resolving organizational problems this way sometimes works — and sometimes fails. Why?
A dwarf apple tree typical of modern commercial varietiesWacky Words of Wisdom
Words of wisdom are so often helpful that many of them have solidified into easily remembered capsules. We do tend to over-generalize them, though, and when we do, trouble follows. Here are a few of the more dangerous ones.
Terminal 3 of Beijing Capital International AirportRisk Creep: I
Risk creep is a term that describes the insidious and unrecognized increase in risk that occurs despite our every effort to mitigate risk or avoid it altogether. What are the dominant sources of risk creep?
An old-fashioned typewriterSix Traps in Email or Text: I
Most of us invest significant effort in communicating by email or any of the various forms of text messaging. Much of the effort is spent correcting confusions caused, in part, by a few traps. Knowing what those traps are can save much trouble.

See also Personal, Team, and Organizational Effectiveness and Personal, Team, and Organizational Effectiveness for more related articles.

Forthcoming issues of Point Lookout

A Crusader tank with its 'sunshield' lorry camouflage erected 26 October 1942Coming February 26: Devious Political Tactics: Bad Decisions
When workplace politics influences the exchanges that lead to important organizational decisions, we sometimes make decisions for reasons other than the best interests of the organization. Recognizing these tactics can limit the risk of bad decisions. Available here and by RSS on February 26.
A human shaking hands with an androidAnd on March 5: On Begging the Question
Some of our most expensive wrong decisions have come about because we've tricked ourselves as we debated our options. The tricks sometimes arise from rhetorical fallacies that tangle our thinking. One of the trickiest is called Begging the Question. Available here and by RSS on March 5.

Coaching services

I offer email and telephone coaching at both corporate and individual rates. Contact Rick for details at rbrenjTnUayrCbSnnEcYfner@ChacdcYpBKAaMJgMalFXoCanyon.com or (650) 787-6475, or toll-free in the continental US at (866) 378-5470.

Get the ebook!

Past issues of Point Lookout are available in six ebooks:

Reprinting this article

Are you a writer, editor or publisher on deadline? Are you looking for an article that will get people talking and get compliments flying your way? You can have 500-1000 words in your inbox in one hour. License any article from this Web site. More info

Follow Rick

Send email or subscribe to one of my newsletters Follow me at LinkedIn Follow me at X, or share a post Subscribe to RSS feeds Subscribe to RSS feeds
The message of Point Lookout is unique. Help get the message out. Please donate to help keep Point Lookout available for free to everyone.
Technical Debt for Policymakers BlogMy blog, Technical Debt for Policymakers, offers resources, insights, and conversations of interest to policymakers who are concerned with managing technical debt within their organizations. Get the millstone of technical debt off the neck of your organization!
Go For It: Sometimes It's Easier If You RunBad boss, long commute, troubling ethical questions, hateful colleague? Learn what we can do when we love the work but not the job.
303 Tips for Virtual and Global TeamsLearn how to make your virtual global team sing.
101 Tips for Managing ChangeAre you managing a change effort that faces rampant cynicism, passive non-cooperation, or maybe even outright revolt?
101 Tips for Effective MeetingsLearn how to make meetings more productive — and more rare.
Exchange your "personal trade secrets" — the tips, tricks and techniques that make you an ace — with other aces, anonymously. Visit the Library of Personal Trade Secrets.
If your teams don't yet consistently achieve state-of-the-art teamwork, check out this catalog. Help is just a few clicks/taps away!
Ebooks, booklets and tip books on project management, conflict, writing email, effective meetings and more.