Red teams play with situational awareness or lack thereof.
Like an adversary, they identify patterns that link individuals to systems, systems to networks, and networks to the full target. They often expose alternative ways to probe the breaking point of policies and plans by creating false trails. They develop noisy attacks and let the target follow them, while having a secondary stealthy one ready to perform the actual attack. This disrupts the orderly way organizations perform their planning (and react to events).