Point Lookout: a free weekly publication of Chaco Canyon Consulting
Volume 17, Issue 19;   May 10, 2017: Dealing with Deniable Intimidation

Dealing with Deniable Intimidation

by

Some people use intimidation so stealthily that only their targets recognize the behavior as abusive or intimidating. Targets are often so frustrated, angered, and confused that they cannot find suitable responses.
A Bengal Tiger

A Bengal Tiger (Panthera tigris tigris). Nature has little use for deniable intimidation. In Nature, intimidation is straightforward.

Deniable intimidation is stealthy. The intimidator-aggressor uses intimidation to manipulate others, but wants to avoid being caught at it. To onlookers, deniable intimidation looks innocent, but to the intimidator's target it can be maddening and humiliating. Responding to deniable intimidation with conventional counter-intimidation is risky, because onlookers tend to see the target's defensive behavior as gratuitous aggression. That's one reason why intimidators seek deniability.

How then can targets respond? In what follows, I'll refer to the intimidator as the aggressor and the target as the defender.

Centering helps
Defenders who center themselves can think more clearly and maintain self-control more easily. Knowing right from wrong and convincing themselves that their own behavior is appropriate are strategies helpful to defenders.
Be selective
Defenders needn't respond to every assault. They might have to acknowledge that an assault has occurred: "I hear you." But they don't have to mix it up with the aggressor every time.
Wait for it
Withstanding deniable intimidation and abuse with aplomb can sometimes compel the aggressor to adopt less deniable tactics. Frustrated that their stealthy approaches aren't working, some aggressors forget that their preferred strategy was based on deniability. They become impatient, lose composure, and attack more directly. When that happens, targets have much more freedom to choose counter-aggressive responses.
Remember the non-verbal options
Targets usually consider only verbal responses, especially when aggressors choose email as the medium for attacks. While verbal responses are often useful, non-verbal responses can be even more effective. For example, in email, delaying a response can fluster the attacker and give the target more time to devise effective responses. In face-to-face meetings, a brief, confident smile might be more effective than a blatant counter-insult.
Counter-intimidate the aggressor in private
In private, straightforward counter-intimidation is relatively low risk, because there are no observers. But since the aggressor might cite anything the defender does or says as evidence of the defender's aggressiveness, defenders must be prepared to convincingly deny anything that might reflect unfavorably upon them. Since the aggressor might make fraudulent accusations, defenders must also convincingly deny falsehoods. Their manner must be equally convincing for both true and false accusations.
Rattle the aggressor
Rattled, Targets usually consider only verbal
responses, especially when aggressors
choose email as the medium for attacks
the aggressor is more likely to engage in blatant intimidation. Techniques that rattle aggressors include a charming, affable manner, deft use of humor, a calm demeanor, keeping one's cool, comfortable and obvious alliances with others, and superior performance.
Seize the initiative
Letting the aggressor determine the tempo and content of the exchange cedes the advantage to the aggressor, who can choose favorable times and settings for deniable attacks. By seizing the initiative, defenders can choose times and settings favorable to them.

Seeking deniability is a strategy that is most appealing to aggressors who feel weak. Targets who can keep that in mind are more likely to recognize their own power. Go to top Top  Next issue: Unresponsive Suppliers: I  Next Issue

303 Secrets of Workplace PoliticsIs every other day a tense, anxious, angry misery as you watch people around you, who couldn't even think their way through a game of Jacks, win at workplace politics and steal the credit and glory for just about everyone's best work including yours? Read 303 Secrets of Workplace Politics, filled with tips and techniques for succeeding in workplace politics. More info

Your comments are welcome

Would you like to see your comments posted here? rbreniQMzlYNRDIQwMJgWner@ChacNwyFMDxvXwILhomcoCanyon.comSend me your comments by email, or by Web form.

About Point Lookout

Thank you for reading this article. I hope you enjoyed it and found it useful, and that you'll consider recommending it to a friend.

Point Lookout is a free weekly email newsletter. Browse the archive of past issues. Subscribe for free.

Support Point Lookout by joining the Friends of Point Lookout, as an individual or as an organization.

Do you face a complex interpersonal situation? Send it in, anonymously if you like, and I'll give you my two cents.

Related articles

More articles on Emotions at Work:

One negative outweighs a world of positivesWhen It Really Counts, Be Positive
When we express our ideas, we can usually choose between a positive construction and a negative one. We can advocate for one path, or against another. Even though these choices have nearly identical literal meanings, positive constructions are safer in tense situations.
Tragedy  — not comedyDown So Low the Only Place to Go Is Up
The past few years have been hard. Some of us have lost hope. What do you do when you're down so low the only place to go is up?
A spider plant, chlorophytum comosum.What Enough to Do Is Like
Most of us have had way too much to do for so long that "too much to do" has become the new normal. We've forgotten what "enough to do" feels like. Here are some reminders.
Six atoms in a Schrödinger "cat" statePreventing Toxic Conflict: I
Conflict resolution skills are certainly useful. Even more advantageous are toxic conflict prevention skills, and skills that keep constructive conflict from turning toxic.
A vizsla in a pose called the play bowWhy Dogs Make the Best Teammates
Dogs make great teammates. It's in their constitutions. We can learn a lot from dogs about being good teammates.

See also Emotions at Work and Conflict Management for more related articles.

Forthcoming issues of Point Lookout

Passing the baton in a relay raceComing January 24: Understanding Delegation
It's widely believed that managers delegate some of their own authority and responsibility to their subordinates, who then use that authority and responsibility to get their work done. That view is unfortunate. It breeds micromanagers. Available here and by RSS on January 24.
A serene mountain lakeAnd on January 31: Nine Brainstorming Demotivators: I
The quality of the output of brainstorming sessions is notoriously variable. One source of variation is the enthusiasm of contributors. Here's Part I of a set of nine phenomena that can limit contributions to brainstorm sessions. Available here and by RSS on January 31.

Coaching services

I offer email and telephone coaching at both corporate and individual rates. Contact Rick for details at rbrenMjOfqMulFBGNRbyMner@ChacSlqKHaLTViOrZPwVoCanyon.com or (617) 491-6289, or toll-free in the continental US at (866) 378-5470.

Get the ebook!

Past issues of Point Lookout are available in six ebooks:

Reprinting this article

Are you a writer, editor or publisher on deadline? Are you looking for an article that will get people talking and get compliments flying your way? You can have 500 words in your inbox in one hour. License any article from this Web site. More info

Public seminars

Person-to-Person Communications: Models and Applications
When Person-to-Person Communications: Models and Applicationswe talk, listen, send or read emails, read or write memos, or when we leave or listen to voice mail messages, we're communicating person-to-person. And whenever we communicate person-to-person, we risk being misunderstood, offending others, feeling hurt, and being confused. There are so many ways for things to go wrong that we could never learn how to fix all the problems. A more effective approach avoids problems altogether, or at least minimizes their occurrence. In this very interactive program we'll explain — and show you how to use — a model of inter-personal communications that can help you stay out of the ditch. We'll place particular emphasis on a very tricky situation — expressing your personal power. In those moments of intense involvement, when we're most likely to slip, you'll have a new tool to use to keep things constructive. Read more about this program. Here's a date for this program:

Ten Project Management Fallacies: The Power of Avoiding Hazards
Most Ten Project Management Fallaciesof what we know about managing projects is useful and effective, but some of what we know "just ain't so." Identifying the fallacies of project management reduces risk and enhances your ability to complete projects successfully. Even more important, avoiding these traps can demonstrate the value and power of the project management profession in general, and your personal capabilities in particular. In this program we describe ten of these beliefs. There are almost certainly many more, but these ten are a good start. We'll explore the situations where these fallacies are most likely to expose projects to risk, and suggest techniques for avoiding them. Read more about this program. Here's a date for this program:

The Power Affect: How We Express Our Personal Power
Many The Power Affect: How We Express Personal Powerpeople who possess real organizational power have a characteristic demeanor. It's the way they project their presence. I call this the power affect. Some people — call them power pretenders — adopt the power affect well before they attain significant organizational power. Unfortunately for their colleagues, and for their organizations, power pretenders can attain organizational power out of proportion to their merit or abilities. Understanding the power affect is therefore important for anyone who aims to attain power, or anyone who works with power pretenders. Read more about this program. Here's a date for this program:

Follow Rick

Send email or subscribe to one of my newsletters Follow me at LinkedIn Follow me at Twitter, or share a tweet Follow me at Google+ or share a post Subscribe to RSS feeds Subscribe to RSS feeds
The message of Point Lookout is unique. Help get the message out. Please donate to help keep Point Lookout available for free to everyone.
Technical Debt for Policymakers BlogMy blog, Technical Debt for Policymakers, offers resources, insights, and conversations of interest to policymakers who are concerned with managing technical debt within their organizations. Get the millstone of technical debt off the neck of your organization!
Go For It: Sometimes It's Easier If You RunBad boss, long commute, troubling ethical questions, hateful colleague? Learn what we can do when we love the work but not the job.
303 Tips for Virtual and Global TeamsLearn how to make your virtual global team sing.
101 Tips for Managing ChangeAre you managing a change effort that faces rampant cynicism, passive non-cooperation, or maybe even outright revolt?
101 Tips for Effective MeetingsLearn how to make meetings more productive — and more rare.
Exchange your "personal trade secrets" — the tips, tricks and techniques that make you an ace — with other aces, anonymously. Visit the Library of Personal Trade Secrets.